2 * Copyright (c) 1984, 1985, 1986, 1987, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * @(#)idp_usrreq.c 8.1 (Berkeley) 6/10/93
34 * $FreeBSD: src/sys/netns/idp_usrreq.c,v 1.9 1999/08/28 00:49:47 peter Exp $
35 * $DragonFly: src/sys/netproto/ns/idp_usrreq.c,v 1.11 2005/06/10 22:44:01 dillon Exp $
38 #include <sys/param.h>
39 #include <sys/systm.h>
40 #include <sys/malloc.h>
42 #include <sys/protosw.h>
43 #include <sys/socket.h>
44 #include <sys/socketvar.h>
45 #include <sys/errno.h>
47 #include <sys/thread2.h>
50 #include <net/route.h>
59 extern int idpcksum; /* from ns_input.c */
60 extern long ns_pexseq; /* from ns_input.c */
61 extern struct nspcb nsrawpcb; /* from ns_input.c */
63 struct idpstat idpstat;
66 * IDP protocol implementation.
69 struct sockaddr_ns idp_ns = { sizeof(idp_ns), AF_NS };
72 * This may also be called for raw listeners.
75 idp_input(struct mbuf *m, ...)
77 struct idp *idp = mtod(m, struct idp *);
78 struct ifnet *ifp = m->m_pkthdr.rcvif;
83 nsp = __va_arg(ap, struct nspcb *);
89 * Construct sockaddr format source address.
90 * Stuff source address and datagram in user buffer.
92 idp_ns.sns_addr = idp->idp_sna;
93 if (ns_neteqnn(idp->idp_sna.x_net, ns_zeronet) && ifp) {
97 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
98 if (ifa->ifa_addr->sa_family == AF_NS) {
99 idp_ns.sns_addr.x_net =
100 IA_SNS(ifa)->sns_addr.x_net;
105 nsp->nsp_rpt = idp->idp_pt;
106 if ( ! (nsp->nsp_flags & NSP_RAWIN) ) {
107 m->m_len -= sizeof (struct idp);
108 m->m_pkthdr.len -= sizeof (struct idp);
109 m->m_data += sizeof (struct idp);
111 if (sbappendaddr(&nsp->nsp_socket->so_rcv, (struct sockaddr *)&idp_ns,
112 m, (struct mbuf *)0) == 0)
114 sorwakeup(nsp->nsp_socket);
124 struct socket *so = nsp->nsp_socket;
126 ns_pcbdisconnect(nsp);
127 soisdisconnected(so);
130 * Drop connection, reporting
131 * the specified error.
138 struct socket *so = nsp->nsp_socket;
141 * someday, in the xerox world
142 * we will generate error protocol packets
143 * announcing that the socket has gone away.
145 /*if (TCPS_HAVERCVDSYN(tp->t_state)) {
146 tp->t_state = TCPS_CLOSED;
147 (void) tcp_output(tp);
149 so->so_error = errno;
150 ns_pcbdisconnect(nsp);
151 soisdisconnected(so);
157 idp_output(struct mbuf *m0, struct socket *so, ...)
159 struct nspcb *nsp = sotonspcb(so);
164 struct mbuf *mprev = NULL;
167 * Calculate data length.
169 for (m = m0; m; m = m->m_next) {
174 * Make sure packet is actually of even length.
179 if ((m->m_flags & M_EXT) == 0 &&
180 (m->m_len + m->m_data < &m->m_dat[MLEN])) {
183 struct mbuf *m1 = m_get(MB_DONTWAIT, MT_DATA);
190 * mtod(m1, char *) = 0;
197 * Fill in mbuf with extended IDP header
198 * and addresses and length put into network format.
201 if (nsp->nsp_flags & NSP_RAWOUT) {
202 idp = mtod(m, struct idp *);
204 M_PREPEND(m, sizeof (struct idp), MB_DONTWAIT);
207 idp = mtod(m, struct idp *);
209 idp->idp_pt = nsp->nsp_dpt;
210 idp->idp_sna = nsp->nsp_laddr;
211 idp->idp_dna = nsp->nsp_faddr;
212 len += sizeof (struct idp);
215 idp->idp_len = htons((u_short)len);
219 len = ((len - 1) | 1) + 1;
220 idp->idp_sum = ns_cksum(m, len);
222 idp->idp_sum = 0xffff;
227 if (so->so_options & SO_DONTROUTE)
228 return (ns_output(m, (struct route *)0,
229 (so->so_options & SO_BROADCAST) | NS_ROUTETOIF));
231 * Use cached route for previous datagram if
232 * possible. If the previous net was the same
233 * and the interface was a broadcast medium, or
234 * if the previous destination was identical,
237 * NB: We don't handle broadcasts because that
238 * would require 3 subroutine calls.
240 ro = &nsp->nsp_route;
241 #ifdef ancient_history
243 * I think that this will all be handled in ns_pcbconnect!
246 if(ns_neteq(nsp->nsp_lastdst, idp->idp_dna)) {
248 * This assumes we have no GH type routes
250 if (ro->ro_rt->rt_flags & RTF_HOST) {
251 if (!ns_hosteq(nsp->nsp_lastdst, idp->idp_dna))
255 if ((ro->ro_rt->rt_flags & RTF_GATEWAY) == 0) {
256 struct ns_addr *dst =
257 &satons_addr(ro->ro_dst);
258 dst->x_host = idp->idp_dna.x_host;
261 * Otherwise, we go through the same gateway
262 * and dst is already set up.
267 ro->ro_rt = (struct rtentry *)0;
270 nsp->nsp_lastdst = idp->idp_dna;
271 #endif /* ancient_history */
272 if (noIdpRoute) ro = 0;
273 return (ns_output(m, ro, so->so_options & SO_BROADCAST));
278 idp_ctloutput(req, so, level, name, value)
285 struct nspcb *nsp = sotonspcb(so);
296 m = m_get(MB_DONTWAIT, MT_DATA);
302 mask = NSP_ALL_PACKETS;
305 case SO_HEADERS_ON_INPUT:
309 case SO_HEADERS_ON_OUTPUT:
312 m->m_len = sizeof(short);
313 *mtod(m, short *) = nsp->nsp_flags & mask;
316 case SO_DEFAULT_HEADERS:
317 m->m_len = sizeof(struct idp);
319 struct idp *idp = mtod(m, struct idp *);
323 idp->idp_pt = nsp->nsp_dpt;
324 idp->idp_dna = nsp->nsp_faddr;
325 idp->idp_sna = nsp->nsp_laddr;
330 m->m_len = sizeof(long);
331 *mtod(m, long *) = ns_pexseq++;
345 mask = NSP_ALL_PACKETS;
348 case SO_HEADERS_ON_INPUT:
352 case SO_HEADERS_ON_OUTPUT:
355 if (value && *value) {
356 ok = mtod(*value, int *);
358 nsp->nsp_flags |= mask;
360 nsp->nsp_flags &= ~mask;
361 } else error = EINVAL;
364 case SO_DEFAULT_HEADERS:
367 = mtod(*value, struct idp *);
368 nsp->nsp_dpt = idp->idp_pt;
374 error = nsip_route(*value);
389 * IDP_USRREQ PROCEDURES
393 idp_usr_abort(struct socket *so)
395 struct nspcb *nsp = sotonspcb(so);
401 soisdisconnected(so);
410 idp_attach(struct socket *so, int proto, struct pru_attach_info *ai)
412 struct nspcb *nsp = sotonspcb(so);
417 if ((error = ns_pcballoc(so, &nspcb)) != 0)
419 error = soreserve(so, 2048, 2048, ai->sb_rlimit);
424 idp_raw_attach(struct socket *so, int proto, struct pru_attach_info *ai)
426 struct nspcb *nsp = sotonspcb(so);
429 #ifdef NS_PRIV_SOCKETS
430 if ((so->so_state & SS_PRIV) == 0)
435 if ((error = ns_pcballoc(so, &nsrawpcb)) != 0)
437 if ((error = soreserve(so, 2048, 2048, ai->sb_rlimit)) != 0)
440 nsp->nsp_faddr.x_host = ns_broadhost;
441 nsp->nsp_flags = NSP_RAWIN | NSP_RAWOUT;
446 idp_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
448 struct nspcb *nsp = sotonspcb(so);
452 error = ns_pcbbind(nsp, nam);
459 idp_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
461 struct nspcb *nsp = sotonspcb(so);
465 if (!ns_nullhost(nsp->nsp_faddr))
467 else if ((error = ns_pcbconnect(nsp, nam)) == 0)
476 idp_detach(struct socket *so)
478 struct nspcb *nsp = sotonspcb(so);
491 idp_usr_disconnect(struct socket *so)
493 struct nspcb *nsp = sotonspcb(so);
497 if (ns_nullhost(nsp->nsp_faddr)) {
501 ns_pcbdisconnect(nsp);
502 soisdisconnected(so);
511 idp_peeraddr(struct socket *so, struct sockaddr **pnam)
513 struct nspcb *nsp = sotonspcb(so);
517 ns_setpeeraddr(nsp, pnam);
526 idp_send(struct socket *so, int flags, struct mbuf *m,
527 struct sockaddr *addr, struct mbuf *control,
530 struct nspcb *nsp = sotonspcb(so);
531 struct ns_addr laddr;
536 if (control && control->m_len) {
543 laddr = nsp->nsp_laddr;
544 if (!ns_nullhost(nsp->nsp_faddr))
547 error = ns_pcbconnect(nsp, addr);
549 if (ns_nullhost(nsp->nsp_faddr))
555 error = idp_output(m, so);
558 ns_pcbdisconnect(nsp);
559 nsp->nsp_laddr.x_host = laddr.x_host;
560 nsp->nsp_laddr.x_port = laddr.x_port;
573 idp_sockaddr(struct socket *so, struct sockaddr **pnam)
575 struct nspcb *nsp = sotonspcb(so);
579 ns_setsockaddr(nsp, pnam);
588 idp_shutdown(struct socket *so)
594 struct pr_usrreqs idp_usrreqs = {
595 idp_usr_abort, pru_accept_notsupp, idp_attach, idp_bind,
596 idp_connect, pru_connect2_notsupp, ns_control, idp_detach,
597 idp_usr_disconnect, pru_listen_notsupp, idp_peeraddr, pru_rcvd_notsupp,
598 pru_rcvoob_notsupp, idp_send, pru_sense_null, idp_shutdown,
599 idp_sockaddr, sosend, soreceive, sopoll
602 struct pr_usrreqs idp_raw_usrreqs = {
603 idp_usr_abort, pru_accept_notsupp, idp_raw_attach, idp_bind,
604 idp_connect, pru_connect2_notsupp, ns_control, idp_detach,
605 idp_usr_disconnect, pru_listen_notsupp, idp_peeraddr, pru_rcvd_notsupp,
606 pru_rcvoob_notsupp, idp_send, pru_sense_null, idp_shutdown,
607 idp_sockaddr, sosend, soreceive, sopoll