sshlockout - Improve manual page
[dragonfly.git] / sys / net / raw_usrreq.c
blob2c6bdd06502a9bffd19eb1f22e10ae6571cc5b7e
1 /*
2 * Copyright (c) 1980, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
29 * @(#)raw_usrreq.c 8.1 (Berkeley) 6/10/93
30 * $FreeBSD: src/sys/net/raw_usrreq.c,v 1.18 1999/08/28 00:48:28 peter Exp $
33 #include <sys/param.h>
34 #include <sys/systm.h>
35 #include <sys/mbuf.h>
36 #include <sys/proc.h>
37 #include <sys/priv.h>
38 #include <sys/protosw.h>
39 #include <sys/socket.h>
40 #include <sys/socketvar.h>
42 #include <sys/socketvar2.h>
43 #include <sys/msgport2.h>
45 #include <net/raw_cb.h>
48 static struct lwkt_token raw_token = LWKT_TOKEN_INITIALIZER(raw_token);
51 * Initialize raw connection block q.
53 void
54 raw_init(void)
56 LIST_INIT(&rawcb_list);
59 /************************************************************************
60 * RAW PROTOCOL INTERFACE *
61 ************************************************************************/
64 * Raw protocol input routine. Find the socket associated with the packet(s)
65 * and move them over. If nothing exists for this packet, drop it. This
66 * routine is indirect called via rts_input() and will be serialized on
67 * cpu 0.
69 * Most other raw protocol interface functions are also serialized XXX.
71 void
72 raw_input(struct mbuf *m0, const struct sockproto *proto,
73 const struct sockaddr *src, const struct sockaddr *dst,
74 const struct rawcb *skip)
76 struct rawcb *rp;
77 struct mbuf *m = m0;
78 struct socket *last;
80 lwkt_gettoken(&raw_token);
82 last = NULL;
83 LIST_FOREACH(rp, &rawcb_list, list) {
84 if (rp == skip)
85 continue;
86 if (rp->rcb_proto.sp_family != proto->sp_family)
87 continue;
88 if (rp->rcb_proto.sp_protocol &&
89 rp->rcb_proto.sp_protocol != proto->sp_protocol)
90 continue;
92 * We assume the lower level routines have
93 * placed the address in a canonical format
94 * suitable for a structure comparison.
96 * Note that if the lengths are not the same
97 * the comparison will fail at the first byte.
99 if (rp->rcb_laddr && !sa_equal(rp->rcb_laddr, dst))
100 continue;
101 if (rp->rcb_faddr && !sa_equal(rp->rcb_faddr, src))
102 continue;
103 if (last) {
104 struct mbuf *n;
106 n = m_copypacket(m, M_NOWAIT);
107 if (n != NULL) {
108 lwkt_gettoken(&last->so_rcv.ssb_token);
109 if (ssb_appendaddr(&last->so_rcv, src, n,
110 NULL) == 0) {
111 /* should notify about lost packet */
112 m_freem(n);
113 } else {
114 sorwakeup(last);
116 lwkt_reltoken(&last->so_rcv.ssb_token);
119 last = rp->rcb_socket;
121 if (last) {
122 lwkt_gettoken(&last->so_rcv.ssb_token);
123 if (ssb_appendaddr(&last->so_rcv, src, m, NULL) == 0)
124 m_freem(m);
125 else
126 sorwakeup(last);
127 lwkt_reltoken(&last->so_rcv.ssb_token);
128 } else {
129 m_freem(m);
131 lwkt_reltoken(&raw_token);
135 * nm_cmd, nm_arg, nm_extra
137 void
138 raw_ctlinput(netmsg_t msg)
140 int error = 0;
142 if (msg->ctlinput.nm_cmd < 0 || msg->ctlinput.nm_cmd > PRC_NCMDS)
144 lwkt_replymsg(&msg->lmsg, error);
148 * NOTE: (so) is referenced from soabort*() and netmsg_pru_abort()
149 * will sofree() it when we return.
151 static void
152 raw_uabort(netmsg_t msg)
154 struct rawcb *rp = sotorawcb(msg->base.nm_so);
155 int error;
157 if (rp) {
158 raw_disconnect(rp);
159 soisdisconnected(msg->base.nm_so);
160 error = 0;
161 } else {
162 error = EINVAL;
164 lwkt_replymsg(&msg->lmsg, error);
167 /* pru_accept is EOPNOTSUPP */
169 static void
170 raw_uattach(netmsg_t msg)
172 struct socket *so = msg->base.nm_so;
173 int proto = msg->attach.nm_proto;
174 struct pru_attach_info *ai = msg->attach.nm_ai;
175 struct rawcb *rp;
176 int error;
178 rp = sotorawcb(so);
179 if (rp) {
180 error = priv_check_cred(ai->p_ucred, PRIV_ROOT, NULL_CRED_OKAY);
181 if (error == 0)
182 error = raw_attach(so, proto, ai->sb_rlimit);
183 } else {
184 error = EINVAL;
186 lwkt_replymsg(&msg->lmsg, error);
189 static void
190 raw_ubind(netmsg_t msg)
192 lwkt_replymsg(&msg->lmsg, EINVAL);
195 static void
196 raw_uconnect(netmsg_t msg)
198 lwkt_replymsg(&msg->lmsg, EINVAL);
201 /* pru_connect2 is EOPNOTSUPP */
202 /* pru_control is EOPNOTSUPP */
204 static void
205 raw_udetach(netmsg_t msg)
207 struct rawcb *rp = sotorawcb(msg->base.nm_so);
208 int error;
210 if (rp) {
211 raw_detach(rp);
212 error = 0;
213 } else {
214 error = EINVAL;
216 lwkt_replymsg(&msg->lmsg, error);
219 static void
220 raw_udisconnect(netmsg_t msg)
222 struct socket *so = msg->base.nm_so;
223 struct rawcb *rp;
224 int error;
226 rp = sotorawcb(so);
227 if (rp == NULL) {
228 error = EINVAL;
229 } else if (rp->rcb_faddr == NULL) {
230 error = ENOTCONN;
231 } else {
232 soreference(so);
233 raw_disconnect(rp);
234 soisdisconnected(so);
235 sofree(so);
236 error = 0;
238 lwkt_replymsg(&msg->lmsg, error);
241 /* pru_listen is EOPNOTSUPP */
243 static void
244 raw_upeeraddr(netmsg_t msg)
246 struct rawcb *rp = sotorawcb(msg->base.nm_so);
247 int error;
249 if (rp == NULL) {
250 error = EINVAL;
251 } else if (rp->rcb_faddr == NULL) {
252 error = ENOTCONN;
253 } else {
254 *msg->peeraddr.nm_nam = dup_sockaddr(rp->rcb_faddr);
255 error = 0;
257 lwkt_replymsg(&msg->lmsg, error);
260 /* pru_rcvd is EOPNOTSUPP */
261 /* pru_rcvoob is EOPNOTSUPP */
263 static void
264 raw_usend(netmsg_t msg)
266 struct socket *so = msg->base.nm_so;
267 struct mbuf *m = msg->send.nm_m;
268 struct mbuf *control = msg->send.nm_control;
269 struct rawcb *rp = sotorawcb(so);
270 struct pr_output_info oi;
271 int flags = msg->send.nm_flags;
272 int error;
274 if (rp == NULL) {
275 error = EINVAL;
276 goto release;
279 if (flags & PRUS_OOB) {
280 error = EOPNOTSUPP;
281 goto release;
284 if (control && control->m_len) {
285 error = EOPNOTSUPP;
286 goto release;
288 if (msg->send.nm_addr) {
289 if (rp->rcb_faddr) {
290 error = EISCONN;
291 goto release;
293 rp->rcb_faddr = msg->send.nm_addr;
294 } else if (rp->rcb_faddr == NULL) {
295 error = ENOTCONN;
296 goto release;
298 oi.p_pid = msg->send.nm_td->td_proc->p_pid;
299 error = (*so->so_proto->pr_output)(m, so, &oi);
300 m = NULL;
301 if (msg->send.nm_addr)
302 rp->rcb_faddr = NULL;
303 release:
304 if (m != NULL)
305 m_freem(m);
306 lwkt_replymsg(&msg->lmsg, error);
309 /* pru_sense is null */
311 static void
312 raw_ushutdown(netmsg_t msg)
314 struct rawcb *rp = sotorawcb(msg->base.nm_so);
315 int error;
317 if (rp) {
318 socantsendmore(msg->base.nm_so);
319 error = 0;
320 } else {
321 error = EINVAL;
323 lwkt_replymsg(&msg->lmsg, error);
326 static void
327 raw_usockaddr(netmsg_t msg)
329 struct rawcb *rp = sotorawcb(msg->base.nm_so);
330 int error;
332 if (rp == NULL) {
333 error = EINVAL;
334 } else if (rp->rcb_laddr == NULL) {
335 error = EINVAL;
336 } else {
337 *msg->sockaddr.nm_nam = dup_sockaddr(rp->rcb_laddr);
338 error = 0;
340 lwkt_replymsg(&msg->lmsg, error);
343 struct pr_usrreqs raw_usrreqs = {
344 .pru_abort = raw_uabort,
345 .pru_accept = pr_generic_notsupp,
346 .pru_attach = raw_uattach,
347 .pru_bind = raw_ubind,
348 .pru_connect = raw_uconnect,
349 .pru_connect2 = pr_generic_notsupp,
350 .pru_control = pr_generic_notsupp,
351 .pru_detach = raw_udetach,
352 .pru_disconnect = raw_udisconnect,
353 .pru_listen = pr_generic_notsupp,
354 .pru_peeraddr = raw_upeeraddr,
355 .pru_rcvd = pr_generic_notsupp,
356 .pru_rcvoob = pr_generic_notsupp,
357 .pru_send = raw_usend,
358 .pru_sense = pru_sense_null,
359 .pru_shutdown = raw_ushutdown,
360 .pru_sockaddr = raw_usockaddr,
361 .pru_sosend = sosend,
362 .pru_soreceive = soreceive