2 * Copyright (c) 1980, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 4. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * @(#)raw_usrreq.c 8.1 (Berkeley) 6/10/93
30 * $FreeBSD: src/sys/net/raw_usrreq.c,v 1.18 1999/08/28 00:48:28 peter Exp $
31 * $DragonFly: src/sys/net/raw_usrreq.c,v 1.14 2007/06/24 20:00:00 dillon Exp $
34 #include <sys/param.h>
35 #include <sys/systm.h>
39 #include <sys/protosw.h>
40 #include <sys/socket.h>
41 #include <sys/socketvar.h>
43 #include <sys/socketvar2.h>
44 #include <sys/msgport2.h>
46 #include <net/raw_cb.h>
49 static struct lwkt_token raw_token = LWKT_TOKEN_INITIALIZER(raw_token);
52 * Initialize raw connection block q.
57 LIST_INIT(&rawcb_list);
60 /************************************************************************
61 * RAW PROTOCOL INTERFACE *
62 ************************************************************************/
65 * Raw protocol input routine. Find the socket associated with the packet(s)
66 * and move them over. If nothing exists for this packet, drop it. This
67 * routine is indirect called via rts_input() and will be serialized on
70 * Most other raw protocol interface functions are also serialized XXX.
73 raw_input(struct mbuf *m0, const struct sockproto *proto,
74 const struct sockaddr *src, const struct sockaddr *dst,
75 const struct rawcb *skip)
81 lwkt_gettoken(&raw_token);
84 LIST_FOREACH(rp, &rawcb_list, list) {
87 if (rp->rcb_proto.sp_family != proto->sp_family)
89 if (rp->rcb_proto.sp_protocol &&
90 rp->rcb_proto.sp_protocol != proto->sp_protocol)
93 * We assume the lower level routines have
94 * placed the address in a canonical format
95 * suitable for a structure comparison.
97 * Note that if the lengths are not the same
98 * the comparison will fail at the first byte.
100 if (rp->rcb_laddr && !sa_equal(rp->rcb_laddr, dst))
102 if (rp->rcb_faddr && !sa_equal(rp->rcb_faddr, src))
107 n = m_copypacket(m, MB_DONTWAIT);
109 lwkt_gettoken(&last->so_rcv.ssb_token);
110 if (ssb_appendaddr(&last->so_rcv, src, n,
112 /* should notify about lost packet */
117 lwkt_reltoken(&last->so_rcv.ssb_token);
120 last = rp->rcb_socket;
123 lwkt_gettoken(&last->so_rcv.ssb_token);
124 if (ssb_appendaddr(&last->so_rcv, src, m, NULL) == 0)
128 lwkt_reltoken(&last->so_rcv.ssb_token);
132 lwkt_reltoken(&raw_token);
136 * nm_cmd, nm_arg, nm_extra
139 raw_ctlinput(netmsg_t msg)
143 if (msg->ctlinput.nm_cmd < 0 || msg->ctlinput.nm_cmd > PRC_NCMDS)
145 lwkt_replymsg(&msg->lmsg, error);
149 * NOTE: (so) is referenced from soabort*() and netmsg_pru_abort()
150 * will sofree() it when we return.
153 raw_uabort(netmsg_t msg)
155 struct rawcb *rp = sotorawcb(msg->base.nm_so);
160 soisdisconnected(msg->base.nm_so);
165 lwkt_replymsg(&msg->lmsg, error);
168 /* pru_accept is EOPNOTSUPP */
171 raw_uattach(netmsg_t msg)
173 struct socket *so = msg->base.nm_so;
174 int proto = msg->attach.nm_proto;
175 struct pru_attach_info *ai = msg->attach.nm_ai;
181 error = priv_check_cred(ai->p_ucred, PRIV_ROOT, NULL_CRED_OKAY);
183 error = raw_attach(so, proto, ai->sb_rlimit);
187 lwkt_replymsg(&msg->lmsg, error);
191 raw_ubind(netmsg_t msg)
193 lwkt_replymsg(&msg->lmsg, EINVAL);
197 raw_uconnect(netmsg_t msg)
199 lwkt_replymsg(&msg->lmsg, EINVAL);
202 /* pru_connect2 is EOPNOTSUPP */
203 /* pru_control is EOPNOTSUPP */
206 raw_udetach(netmsg_t msg)
208 struct rawcb *rp = sotorawcb(msg->base.nm_so);
217 lwkt_replymsg(&msg->lmsg, error);
221 raw_udisconnect(netmsg_t msg)
223 struct socket *so = msg->base.nm_so;
230 } else if (rp->rcb_faddr == NULL) {
235 soisdisconnected(so);
239 lwkt_replymsg(&msg->lmsg, error);
242 /* pru_listen is EOPNOTSUPP */
245 raw_upeeraddr(netmsg_t msg)
247 struct rawcb *rp = sotorawcb(msg->base.nm_so);
252 } else if (rp->rcb_faddr == NULL) {
255 *msg->peeraddr.nm_nam = dup_sockaddr(rp->rcb_faddr);
258 lwkt_replymsg(&msg->lmsg, error);
261 /* pru_rcvd is EOPNOTSUPP */
262 /* pru_rcvoob is EOPNOTSUPP */
265 raw_usend(netmsg_t msg)
267 struct socket *so = msg->base.nm_so;
268 struct mbuf *m = msg->send.nm_m;
269 struct mbuf *control = msg->send.nm_control;
270 struct rawcb *rp = sotorawcb(so);
271 struct pr_output_info oi;
272 int flags = msg->send.nm_flags;
280 if (flags & PRUS_OOB) {
285 if (control && control->m_len) {
289 if (msg->send.nm_addr) {
294 rp->rcb_faddr = msg->send.nm_addr;
295 } else if (rp->rcb_faddr == NULL) {
299 oi.p_pid = msg->send.nm_td->td_proc->p_pid;
300 error = (*so->so_proto->pr_output)(m, so, &oi);
302 if (msg->send.nm_addr)
303 rp->rcb_faddr = NULL;
307 lwkt_replymsg(&msg->lmsg, error);
310 /* pru_sense is null */
313 raw_ushutdown(netmsg_t msg)
315 struct rawcb *rp = sotorawcb(msg->base.nm_so);
319 socantsendmore(msg->base.nm_so);
324 lwkt_replymsg(&msg->lmsg, error);
328 raw_usockaddr(netmsg_t msg)
330 struct rawcb *rp = sotorawcb(msg->base.nm_so);
335 } else if (rp->rcb_laddr == NULL) {
338 *msg->sockaddr.nm_nam = dup_sockaddr(rp->rcb_laddr);
341 lwkt_replymsg(&msg->lmsg, error);
344 struct pr_usrreqs raw_usrreqs = {
345 .pru_abort = raw_uabort,
346 .pru_accept = pr_generic_notsupp,
347 .pru_attach = raw_uattach,
348 .pru_bind = raw_ubind,
349 .pru_connect = raw_uconnect,
350 .pru_connect2 = pr_generic_notsupp,
351 .pru_control = pr_generic_notsupp,
352 .pru_detach = raw_udetach,
353 .pru_disconnect = raw_udisconnect,
354 .pru_listen = pr_generic_notsupp,
355 .pru_peeraddr = raw_upeeraddr,
356 .pru_rcvd = pr_generic_notsupp,
357 .pru_rcvoob = pr_generic_notsupp,
358 .pru_send = raw_usend,
359 .pru_sense = pru_sense_null,
360 .pru_shutdown = raw_ushutdown,
361 .pru_sockaddr = raw_usockaddr,
362 .pru_sosend = sosend,
363 .pru_soreceive = soreceive