xref: /freebsd/sys/netgraph/ng_ksocket.c (revision facfd88935dd5bb53536cb4594ddfcb64bd4bd72)
1cb3c7a5dSArchie Cobbs 
2cb3c7a5dSArchie Cobbs /*
3cb3c7a5dSArchie Cobbs  * ng_ksocket.c
4cb3c7a5dSArchie Cobbs  *
5cb3c7a5dSArchie Cobbs  * Copyright (c) 1996-1999 Whistle Communications, Inc.
6cb3c7a5dSArchie Cobbs  * All rights reserved.
7cb3c7a5dSArchie Cobbs  *
8cb3c7a5dSArchie Cobbs  * Subject to the following obligations and disclaimer of warranty, use and
9cb3c7a5dSArchie Cobbs  * redistribution of this software, in source or object code forms, with or
10cb3c7a5dSArchie Cobbs  * without modifications are expressly permitted by Whistle Communications;
11cb3c7a5dSArchie Cobbs  * provided, however, that:
12cb3c7a5dSArchie Cobbs  * 1. Any and all reproductions of the source or object code must include the
13cb3c7a5dSArchie Cobbs  *    copyright notice above and the following disclaimer of warranties; and
14cb3c7a5dSArchie Cobbs  * 2. No rights are granted, in any manner or form, to use Whistle
15cb3c7a5dSArchie Cobbs  *    Communications, Inc. trademarks, including the mark "WHISTLE
16cb3c7a5dSArchie Cobbs  *    COMMUNICATIONS" on advertising, endorsements, or otherwise except as
17cb3c7a5dSArchie Cobbs  *    such appears in the above copyright notice or in the software.
18cb3c7a5dSArchie Cobbs  *
19cb3c7a5dSArchie Cobbs  * THIS SOFTWARE IS BEING PROVIDED BY WHISTLE COMMUNICATIONS "AS IS", AND
20cb3c7a5dSArchie Cobbs  * TO THE MAXIMUM EXTENT PERMITTED BY LAW, WHISTLE COMMUNICATIONS MAKES NO
21cb3c7a5dSArchie Cobbs  * REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, REGARDING THIS SOFTWARE,
22cb3c7a5dSArchie Cobbs  * INCLUDING WITHOUT LIMITATION, ANY AND ALL IMPLIED WARRANTIES OF
23cb3c7a5dSArchie Cobbs  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
24cb3c7a5dSArchie Cobbs  * WHISTLE COMMUNICATIONS DOES NOT WARRANT, GUARANTEE, OR MAKE ANY
25cb3c7a5dSArchie Cobbs  * REPRESENTATIONS REGARDING THE USE OF, OR THE RESULTS OF THE USE OF THIS
26cb3c7a5dSArchie Cobbs  * SOFTWARE IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY OR OTHERWISE.
27cb3c7a5dSArchie Cobbs  * IN NO EVENT SHALL WHISTLE COMMUNICATIONS BE LIABLE FOR ANY DAMAGES
28cb3c7a5dSArchie Cobbs  * RESULTING FROM OR ARISING OUT OF ANY USE OF THIS SOFTWARE, INCLUDING
29cb3c7a5dSArchie Cobbs  * WITHOUT LIMITATION, ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
30cb3c7a5dSArchie Cobbs  * PUNITIVE, OR CONSEQUENTIAL DAMAGES, PROCUREMENT OF SUBSTITUTE GOODS OR
31cb3c7a5dSArchie Cobbs  * SERVICES, LOSS OF USE, DATA OR PROFITS, HOWEVER CAUSED AND UNDER ANY
32cb3c7a5dSArchie Cobbs  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
33cb3c7a5dSArchie Cobbs  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34cb3c7a5dSArchie Cobbs  * THIS SOFTWARE, EVEN IF WHISTLE COMMUNICATIONS IS ADVISED OF THE POSSIBILITY
35cb3c7a5dSArchie Cobbs  * OF SUCH DAMAGE.
36cb3c7a5dSArchie Cobbs  *
37cc3bbd68SJulian Elischer  * Author: Archie Cobbs <archie@freebsd.org>
38cb3c7a5dSArchie Cobbs  *
39cb3c7a5dSArchie Cobbs  * $FreeBSD$
40cb3c7a5dSArchie Cobbs  * $Whistle: ng_ksocket.c,v 1.1 1999/11/16 20:04:40 archie Exp $
41cb3c7a5dSArchie Cobbs  */
42cb3c7a5dSArchie Cobbs 
43cb3c7a5dSArchie Cobbs /*
44cb3c7a5dSArchie Cobbs  * Kernel socket node type.  This node type is basically a kernel-mode
45cb3c7a5dSArchie Cobbs  * version of a socket... kindof like the reverse of the socket node type.
46cb3c7a5dSArchie Cobbs  */
47cb3c7a5dSArchie Cobbs 
48cb3c7a5dSArchie Cobbs #include <sys/param.h>
49cb3c7a5dSArchie Cobbs #include <sys/systm.h>
50cb3c7a5dSArchie Cobbs #include <sys/kernel.h>
51cb3c7a5dSArchie Cobbs #include <sys/mbuf.h>
52cb3c7a5dSArchie Cobbs #include <sys/proc.h>
53cb3c7a5dSArchie Cobbs #include <sys/malloc.h>
54f8307e12SArchie Cobbs #include <sys/ctype.h>
55cb3c7a5dSArchie Cobbs #include <sys/protosw.h>
56cb3c7a5dSArchie Cobbs #include <sys/errno.h>
57cb3c7a5dSArchie Cobbs #include <sys/socket.h>
58cb3c7a5dSArchie Cobbs #include <sys/socketvar.h>
59cb3c7a5dSArchie Cobbs #include <sys/uio.h>
60f8307e12SArchie Cobbs #include <sys/un.h>
61cb3c7a5dSArchie Cobbs 
62cb3c7a5dSArchie Cobbs #include <netgraph/ng_message.h>
63cb3c7a5dSArchie Cobbs #include <netgraph/netgraph.h>
64f8307e12SArchie Cobbs #include <netgraph/ng_parse.h>
65cb3c7a5dSArchie Cobbs #include <netgraph/ng_ksocket.h>
66cb3c7a5dSArchie Cobbs 
67cb3c7a5dSArchie Cobbs #include <netinet/in.h>
68cb3c7a5dSArchie Cobbs #include <netatalk/at.h>
69cb3c7a5dSArchie Cobbs 
709c8c302fSJulian Elischer #ifdef NG_SEPARATE_MALLOC
719c8c302fSJulian Elischer MALLOC_DEFINE(M_NETGRAPH_KSOCKET, "netgraph_ksock", "netgraph ksock node ");
729c8c302fSJulian Elischer #else
739c8c302fSJulian Elischer #define M_NETGRAPH_KSOCKET M_NETGRAPH
749c8c302fSJulian Elischer #endif
759c8c302fSJulian Elischer 
76f8307e12SArchie Cobbs #define OFFSETOF(s, e) ((char *)&((s *)0)->e - (char *)((s *)0))
77f8307e12SArchie Cobbs #define SADATA_OFFSET	(OFFSETOF(struct sockaddr, sa_data))
78f8307e12SArchie Cobbs 
79cb3c7a5dSArchie Cobbs /* Node private data */
8019bff684SArchie Cobbs struct ng_ksocket_private {
81f97e0a07SJulian Elischer 	node_p		node;
82cb3c7a5dSArchie Cobbs 	hook_p		hook;
83cb3c7a5dSArchie Cobbs 	struct socket	*so;
84f97e0a07SJulian Elischer 	LIST_HEAD(, ng_ksocket_private)	embryos;
85f97e0a07SJulian Elischer 	LIST_ENTRY(ng_ksocket_private)	siblings;
86f97e0a07SJulian Elischer 	u_int32_t	flags;
87f97e0a07SJulian Elischer 	u_int32_t	response_token;
88f97e0a07SJulian Elischer 	ng_ID_t		response_addr;
89cb3c7a5dSArchie Cobbs };
9019bff684SArchie Cobbs typedef struct ng_ksocket_private *priv_p;
91cb3c7a5dSArchie Cobbs 
92f97e0a07SJulian Elischer /* Flags for priv_p */
93f97e0a07SJulian Elischer #define	KSF_CONNECTING	0x00000001	/* Waiting for connection complete */
94f97e0a07SJulian Elischer #define	KSF_ACCEPTING	0x00000002	/* Waiting for accept complete */
95f97e0a07SJulian Elischer #define	KSF_EOFSEEN	0x00000004	/* Have sent 0-length EOF mbuf */
96f97e0a07SJulian Elischer #define	KSF_CLONED	0x00000008	/* Cloned from an accepting socket */
97f97e0a07SJulian Elischer #define	KSF_EMBRYONIC	0x00000010	/* Cloned node with no hooks yet */
98dc9c2e01SArchie Cobbs #define	KSF_SENDING	0x00000020	/* Sending on socket */
99f97e0a07SJulian Elischer 
100cb3c7a5dSArchie Cobbs /* Netgraph node methods */
101cb3c7a5dSArchie Cobbs static ng_constructor_t	ng_ksocket_constructor;
102cb3c7a5dSArchie Cobbs static ng_rcvmsg_t	ng_ksocket_rcvmsg;
103069154d5SJulian Elischer static ng_shutdown_t	ng_ksocket_shutdown;
104cb3c7a5dSArchie Cobbs static ng_newhook_t	ng_ksocket_newhook;
105cb3c7a5dSArchie Cobbs static ng_rcvdata_t	ng_ksocket_rcvdata;
106f97e0a07SJulian Elischer static ng_connect_t	ng_ksocket_connect;
107cb3c7a5dSArchie Cobbs static ng_disconnect_t	ng_ksocket_disconnect;
108cb3c7a5dSArchie Cobbs 
109cb3c7a5dSArchie Cobbs /* Alias structure */
110cb3c7a5dSArchie Cobbs struct ng_ksocket_alias {
111cb3c7a5dSArchie Cobbs 	const char	*name;
112cb3c7a5dSArchie Cobbs 	const int	value;
113cb3c7a5dSArchie Cobbs 	const int	family;
114cb3c7a5dSArchie Cobbs };
115cb3c7a5dSArchie Cobbs 
116cb3c7a5dSArchie Cobbs /* Protocol family aliases */
117cb3c7a5dSArchie Cobbs static const struct ng_ksocket_alias ng_ksocket_families[] = {
118cb3c7a5dSArchie Cobbs 	{ "local",	PF_LOCAL	},
119cb3c7a5dSArchie Cobbs 	{ "inet",	PF_INET		},
120cb3c7a5dSArchie Cobbs 	{ "inet6",	PF_INET6	},
121cb3c7a5dSArchie Cobbs 	{ "atalk",	PF_APPLETALK	},
122cb3c7a5dSArchie Cobbs 	{ "ipx",	PF_IPX		},
123cb3c7a5dSArchie Cobbs 	{ "atm",	PF_ATM		},
124cb3c7a5dSArchie Cobbs 	{ NULL,		-1		},
125cb3c7a5dSArchie Cobbs };
126cb3c7a5dSArchie Cobbs 
127cb3c7a5dSArchie Cobbs /* Socket type aliases */
128cb3c7a5dSArchie Cobbs static const struct ng_ksocket_alias ng_ksocket_types[] = {
129cb3c7a5dSArchie Cobbs 	{ "stream",	SOCK_STREAM	},
130cb3c7a5dSArchie Cobbs 	{ "dgram",	SOCK_DGRAM	},
131cb3c7a5dSArchie Cobbs 	{ "raw",	SOCK_RAW	},
132cb3c7a5dSArchie Cobbs 	{ "rdm",	SOCK_RDM	},
133cb3c7a5dSArchie Cobbs 	{ "seqpacket",	SOCK_SEQPACKET	},
134cb3c7a5dSArchie Cobbs 	{ NULL,		-1		},
135cb3c7a5dSArchie Cobbs };
136cb3c7a5dSArchie Cobbs 
137cb3c7a5dSArchie Cobbs /* Protocol aliases */
138cb3c7a5dSArchie Cobbs static const struct ng_ksocket_alias ng_ksocket_protos[] = {
139cb3c7a5dSArchie Cobbs 	{ "ip",		IPPROTO_IP,		PF_INET		},
140129bc895SArchie Cobbs 	{ "raw",	IPPROTO_RAW,		PF_INET		},
141cb3c7a5dSArchie Cobbs 	{ "icmp",	IPPROTO_ICMP,		PF_INET		},
142cb3c7a5dSArchie Cobbs 	{ "igmp",	IPPROTO_IGMP,		PF_INET		},
143cb3c7a5dSArchie Cobbs 	{ "tcp",	IPPROTO_TCP,		PF_INET		},
144cb3c7a5dSArchie Cobbs 	{ "udp",	IPPROTO_UDP,		PF_INET		},
145cb3c7a5dSArchie Cobbs 	{ "gre",	IPPROTO_GRE,		PF_INET		},
146cb3c7a5dSArchie Cobbs 	{ "esp",	IPPROTO_ESP,		PF_INET		},
147cb3c7a5dSArchie Cobbs 	{ "ah",		IPPROTO_AH,		PF_INET		},
148cb3c7a5dSArchie Cobbs 	{ "swipe",	IPPROTO_SWIPE,		PF_INET		},
149cb3c7a5dSArchie Cobbs 	{ "encap",	IPPROTO_ENCAP,		PF_INET		},
150cb3c7a5dSArchie Cobbs 	{ "divert",	IPPROTO_DIVERT,		PF_INET		},
151cb3c7a5dSArchie Cobbs 	{ "ddp",	ATPROTO_DDP,		PF_APPLETALK	},
152cb3c7a5dSArchie Cobbs 	{ "aarp",	ATPROTO_AARP,		PF_APPLETALK	},
153cb3c7a5dSArchie Cobbs 	{ NULL,		-1					},
154cb3c7a5dSArchie Cobbs };
155cb3c7a5dSArchie Cobbs 
156f8307e12SArchie Cobbs /* Helper functions */
157f97e0a07SJulian Elischer static int	ng_ksocket_check_accept(priv_p);
158f97e0a07SJulian Elischer static void	ng_ksocket_finish_accept(priv_p);
159f8307e12SArchie Cobbs static void	ng_ksocket_incoming(struct socket *so, void *arg, int waitflag);
160f8307e12SArchie Cobbs static int	ng_ksocket_parse(const struct ng_ksocket_alias *aliases,
161f8307e12SArchie Cobbs 			const char *s, int family);
162f97e0a07SJulian Elischer static void	ng_ksocket_incoming2(node_p node, hook_p hook,
163f97e0a07SJulian Elischer 			void *arg1, int waitflag);
164f8307e12SArchie Cobbs 
165f8307e12SArchie Cobbs /************************************************************************
166f8307e12SArchie Cobbs 			STRUCT SOCKADDR PARSE TYPE
167f8307e12SArchie Cobbs  ************************************************************************/
168f8307e12SArchie Cobbs 
169f8307e12SArchie Cobbs /* Get the length of the data portion of a generic struct sockaddr */
170f8307e12SArchie Cobbs static int
171f8307e12SArchie Cobbs ng_parse_generic_sockdata_getLength(const struct ng_parse_type *type,
172f8307e12SArchie Cobbs 	const u_char *start, const u_char *buf)
173f8307e12SArchie Cobbs {
174f8307e12SArchie Cobbs 	const struct sockaddr *sa;
175f8307e12SArchie Cobbs 
176f8307e12SArchie Cobbs 	sa = (const struct sockaddr *)(buf - SADATA_OFFSET);
1771baeddb8SArchie Cobbs 	return (sa->sa_len < SADATA_OFFSET) ? 0 : sa->sa_len - SADATA_OFFSET;
178f8307e12SArchie Cobbs }
179f8307e12SArchie Cobbs 
180f8307e12SArchie Cobbs /* Type for the variable length data portion of a generic struct sockaddr */
181f8307e12SArchie Cobbs static const struct ng_parse_type ng_ksocket_generic_sockdata_type = {
182f8307e12SArchie Cobbs 	&ng_parse_bytearray_type,
183f8307e12SArchie Cobbs 	&ng_parse_generic_sockdata_getLength
184f8307e12SArchie Cobbs };
185f8307e12SArchie Cobbs 
186f8307e12SArchie Cobbs /* Type for a generic struct sockaddr */
187f0184ff8SArchie Cobbs static const struct ng_parse_struct_field
188f0184ff8SArchie Cobbs     ng_parse_generic_sockaddr_type_fields[] = {
18957b57be3SArchie Cobbs 	  { "len",	&ng_parse_uint8_type			},
19057b57be3SArchie Cobbs 	  { "family",	&ng_parse_uint8_type			},
191f8307e12SArchie Cobbs 	  { "data",	&ng_ksocket_generic_sockdata_type	},
192f8307e12SArchie Cobbs 	  { NULL }
193f8307e12SArchie Cobbs };
194f8307e12SArchie Cobbs static const struct ng_parse_type ng_ksocket_generic_sockaddr_type = {
195f8307e12SArchie Cobbs 	&ng_parse_struct_type,
196f0184ff8SArchie Cobbs 	&ng_parse_generic_sockaddr_type_fields
197f8307e12SArchie Cobbs };
198f8307e12SArchie Cobbs 
199f8307e12SArchie Cobbs /* Convert a struct sockaddr from ASCII to binary.  If its a protocol
200f8307e12SArchie Cobbs    family that we specially handle, do that, otherwise defer to the
201f8307e12SArchie Cobbs    generic parse type ng_ksocket_generic_sockaddr_type. */
202f8307e12SArchie Cobbs static int
203f8307e12SArchie Cobbs ng_ksocket_sockaddr_parse(const struct ng_parse_type *type,
204f8307e12SArchie Cobbs 	const char *s, int *off, const u_char *const start,
205f8307e12SArchie Cobbs 	u_char *const buf, int *buflen)
206f8307e12SArchie Cobbs {
207f8307e12SArchie Cobbs 	struct sockaddr *const sa = (struct sockaddr *)buf;
208f8307e12SArchie Cobbs 	enum ng_parse_token tok;
209f8307e12SArchie Cobbs 	char fambuf[32];
210f8307e12SArchie Cobbs 	int family, len;
211f8307e12SArchie Cobbs 	char *t;
212f8307e12SArchie Cobbs 
213f8307e12SArchie Cobbs 	/* If next token is a left curly brace, use generic parse type */
214f8307e12SArchie Cobbs 	if ((tok = ng_parse_get_token(s, off, &len)) == T_LBRACE) {
215f8307e12SArchie Cobbs 		return (*ng_ksocket_generic_sockaddr_type.supertype->parse)
216f8307e12SArchie Cobbs 		    (&ng_ksocket_generic_sockaddr_type,
217f8307e12SArchie Cobbs 		    s, off, start, buf, buflen);
218f8307e12SArchie Cobbs 	}
219f8307e12SArchie Cobbs 
220f8307e12SArchie Cobbs 	/* Get socket address family followed by a slash */
221f8307e12SArchie Cobbs 	while (isspace(s[*off]))
222f8307e12SArchie Cobbs 		(*off)++;
223f8307e12SArchie Cobbs 	if ((t = index(s + *off, '/')) == NULL)
224f8307e12SArchie Cobbs 		return (EINVAL);
225f8307e12SArchie Cobbs 	if ((len = t - (s + *off)) > sizeof(fambuf) - 1)
226f8307e12SArchie Cobbs 		return (EINVAL);
227f8307e12SArchie Cobbs 	strncpy(fambuf, s + *off, len);
228f8307e12SArchie Cobbs 	fambuf[len] = '\0';
229f8307e12SArchie Cobbs 	*off += len + 1;
230f8307e12SArchie Cobbs 	if ((family = ng_ksocket_parse(ng_ksocket_families, fambuf, 0)) == -1)
231f8307e12SArchie Cobbs 		return (EINVAL);
232f8307e12SArchie Cobbs 
233f8307e12SArchie Cobbs 	/* Set family */
234f8307e12SArchie Cobbs 	if (*buflen < SADATA_OFFSET)
235f8307e12SArchie Cobbs 		return (ERANGE);
236f8307e12SArchie Cobbs 	sa->sa_family = family;
237f8307e12SArchie Cobbs 
238f8307e12SArchie Cobbs 	/* Set family-specific data and length */
239f8307e12SArchie Cobbs 	switch (sa->sa_family) {
240f8307e12SArchie Cobbs 	case PF_LOCAL:		/* Get pathname */
241f8307e12SArchie Cobbs 	    {
242f8307e12SArchie Cobbs 		const int pathoff = OFFSETOF(struct sockaddr_un, sun_path);
243f8307e12SArchie Cobbs 		struct sockaddr_un *const sun = (struct sockaddr_un *)sa;
244f8307e12SArchie Cobbs 		int toklen, pathlen;
245f8307e12SArchie Cobbs 		char *path;
246f8307e12SArchie Cobbs 
24727121ab1SBrian Somers 		if ((path = ng_get_string_token(s, off, &toklen, NULL)) == NULL)
248f8307e12SArchie Cobbs 			return (EINVAL);
249f8307e12SArchie Cobbs 		pathlen = strlen(path);
250f8307e12SArchie Cobbs 		if (pathlen > SOCK_MAXADDRLEN) {
2519c8c302fSJulian Elischer 			FREE(path, M_NETGRAPH_KSOCKET);
252f8307e12SArchie Cobbs 			return (E2BIG);
253f8307e12SArchie Cobbs 		}
254f8307e12SArchie Cobbs 		if (*buflen < pathoff + pathlen) {
2559c8c302fSJulian Elischer 			FREE(path, M_NETGRAPH_KSOCKET);
256f8307e12SArchie Cobbs 			return (ERANGE);
257f8307e12SArchie Cobbs 		}
258f8307e12SArchie Cobbs 		*off += toklen;
259f8307e12SArchie Cobbs 		bcopy(path, sun->sun_path, pathlen);
260f8307e12SArchie Cobbs 		sun->sun_len = pathoff + pathlen;
2619c8c302fSJulian Elischer 		FREE(path, M_NETGRAPH_KSOCKET);
262f8307e12SArchie Cobbs 		break;
263f8307e12SArchie Cobbs 	    }
264f8307e12SArchie Cobbs 
265f8307e12SArchie Cobbs 	case PF_INET:		/* Get an IP address with optional port */
266f8307e12SArchie Cobbs 	    {
267f8307e12SArchie Cobbs 		struct sockaddr_in *const sin = (struct sockaddr_in *)sa;
268f8307e12SArchie Cobbs 		int i;
269f8307e12SArchie Cobbs 
270f8307e12SArchie Cobbs 		/* Parse this: <ipaddress>[:port] */
271f8307e12SArchie Cobbs 		for (i = 0; i < 4; i++) {
272f8307e12SArchie Cobbs 			u_long val;
273f8307e12SArchie Cobbs 			char *eptr;
274f8307e12SArchie Cobbs 
275f8307e12SArchie Cobbs 			val = strtoul(s + *off, &eptr, 10);
276f8307e12SArchie Cobbs 			if (val > 0xff || eptr == s + *off)
277f8307e12SArchie Cobbs 				return (EINVAL);
278f8307e12SArchie Cobbs 			*off += (eptr - (s + *off));
279f8307e12SArchie Cobbs 			((u_char *)&sin->sin_addr)[i] = (u_char)val;
280f8307e12SArchie Cobbs 			if (i < 3) {
281f8307e12SArchie Cobbs 				if (s[*off] != '.')
282f8307e12SArchie Cobbs 					return (EINVAL);
283f8307e12SArchie Cobbs 				(*off)++;
284f8307e12SArchie Cobbs 			} else if (s[*off] == ':') {
285f8307e12SArchie Cobbs 				(*off)++;
286f8307e12SArchie Cobbs 				val = strtoul(s + *off, &eptr, 10);
287f8307e12SArchie Cobbs 				if (val > 0xffff || eptr == s + *off)
288f8307e12SArchie Cobbs 					return (EINVAL);
289f8307e12SArchie Cobbs 				*off += (eptr - (s + *off));
290f8307e12SArchie Cobbs 				sin->sin_port = htons(val);
291f8307e12SArchie Cobbs 			} else
292f8307e12SArchie Cobbs 				sin->sin_port = 0;
293f8307e12SArchie Cobbs 		}
294f8307e12SArchie Cobbs 		bzero(&sin->sin_zero, sizeof(sin->sin_zero));
295f8307e12SArchie Cobbs 		sin->sin_len = sizeof(*sin);
296f8307e12SArchie Cobbs 		break;
297f8307e12SArchie Cobbs 	    }
298f8307e12SArchie Cobbs 
299f8307e12SArchie Cobbs #if 0
300f8307e12SArchie Cobbs 	case PF_APPLETALK:	/* XXX implement these someday */
301f8307e12SArchie Cobbs 	case PF_INET6:
302f8307e12SArchie Cobbs 	case PF_IPX:
303f8307e12SArchie Cobbs #endif
304f8307e12SArchie Cobbs 
305f8307e12SArchie Cobbs 	default:
306f8307e12SArchie Cobbs 		return (EINVAL);
307f8307e12SArchie Cobbs 	}
308f8307e12SArchie Cobbs 
309f8307e12SArchie Cobbs 	/* Done */
310f8307e12SArchie Cobbs 	*buflen = sa->sa_len;
311f8307e12SArchie Cobbs 	return (0);
312f8307e12SArchie Cobbs }
313f8307e12SArchie Cobbs 
314f8307e12SArchie Cobbs /* Convert a struct sockaddr from binary to ASCII */
315f8307e12SArchie Cobbs static int
316f8307e12SArchie Cobbs ng_ksocket_sockaddr_unparse(const struct ng_parse_type *type,
317f8307e12SArchie Cobbs 	const u_char *data, int *off, char *cbuf, int cbuflen)
318f8307e12SArchie Cobbs {
319f8307e12SArchie Cobbs 	const struct sockaddr *sa = (const struct sockaddr *)(data + *off);
320f8307e12SArchie Cobbs 	int slen = 0;
321f8307e12SArchie Cobbs 
322f8307e12SArchie Cobbs 	/* Output socket address, either in special or generic format */
323f8307e12SArchie Cobbs 	switch (sa->sa_family) {
324f8307e12SArchie Cobbs 	case PF_LOCAL:
325f8307e12SArchie Cobbs 	    {
326f8307e12SArchie Cobbs 		const int pathoff = OFFSETOF(struct sockaddr_un, sun_path);
327f8307e12SArchie Cobbs 		const struct sockaddr_un *sun = (const struct sockaddr_un *)sa;
328f8307e12SArchie Cobbs 		const int pathlen = sun->sun_len - pathoff;
329f8307e12SArchie Cobbs 		char pathbuf[SOCK_MAXADDRLEN + 1];
330f8307e12SArchie Cobbs 		char *pathtoken;
331f8307e12SArchie Cobbs 
332f8307e12SArchie Cobbs 		bcopy(sun->sun_path, pathbuf, pathlen);
33327121ab1SBrian Somers 		if ((pathtoken = ng_encode_string(pathbuf, pathlen)) == NULL)
334f8307e12SArchie Cobbs 			return (ENOMEM);
335f8307e12SArchie Cobbs 		slen += snprintf(cbuf, cbuflen, "local/%s", pathtoken);
3369c8c302fSJulian Elischer 		FREE(pathtoken, M_NETGRAPH_KSOCKET);
337f8307e12SArchie Cobbs 		if (slen >= cbuflen)
338f8307e12SArchie Cobbs 			return (ERANGE);
339f8307e12SArchie Cobbs 		*off += sun->sun_len;
340f8307e12SArchie Cobbs 		return (0);
341f8307e12SArchie Cobbs 	    }
342f8307e12SArchie Cobbs 
343f8307e12SArchie Cobbs 	case PF_INET:
344f8307e12SArchie Cobbs 	    {
345f8307e12SArchie Cobbs 		const struct sockaddr_in *sin = (const struct sockaddr_in *)sa;
346f8307e12SArchie Cobbs 
347f8307e12SArchie Cobbs 		slen += snprintf(cbuf, cbuflen, "inet/%d.%d.%d.%d",
348f8307e12SArchie Cobbs 		  ((const u_char *)&sin->sin_addr)[0],
349f8307e12SArchie Cobbs 		  ((const u_char *)&sin->sin_addr)[1],
350f8307e12SArchie Cobbs 		  ((const u_char *)&sin->sin_addr)[2],
351f8307e12SArchie Cobbs 		  ((const u_char *)&sin->sin_addr)[3]);
352f8307e12SArchie Cobbs 		if (sin->sin_port != 0) {
353f8307e12SArchie Cobbs 			slen += snprintf(cbuf + strlen(cbuf),
354f8307e12SArchie Cobbs 			    cbuflen - strlen(cbuf), ":%d",
355f8307e12SArchie Cobbs 			    (u_int)ntohs(sin->sin_port));
356f8307e12SArchie Cobbs 		}
357f8307e12SArchie Cobbs 		if (slen >= cbuflen)
358f8307e12SArchie Cobbs 			return (ERANGE);
359f8307e12SArchie Cobbs 		*off += sizeof(*sin);
360f8307e12SArchie Cobbs 		return(0);
361f8307e12SArchie Cobbs 	    }
362f8307e12SArchie Cobbs 
363f8307e12SArchie Cobbs #if 0
364f8307e12SArchie Cobbs 	case PF_APPLETALK:	/* XXX implement these someday */
365f8307e12SArchie Cobbs 	case PF_INET6:
366f8307e12SArchie Cobbs 	case PF_IPX:
367f8307e12SArchie Cobbs #endif
368f8307e12SArchie Cobbs 
369f8307e12SArchie Cobbs 	default:
370f8307e12SArchie Cobbs 		return (*ng_ksocket_generic_sockaddr_type.supertype->unparse)
371f8307e12SArchie Cobbs 		    (&ng_ksocket_generic_sockaddr_type,
372f8307e12SArchie Cobbs 		    data, off, cbuf, cbuflen);
373f8307e12SArchie Cobbs 	}
374f8307e12SArchie Cobbs }
375f8307e12SArchie Cobbs 
376f8307e12SArchie Cobbs /* Parse type for struct sockaddr */
377f8307e12SArchie Cobbs static const struct ng_parse_type ng_ksocket_sockaddr_type = {
378f8307e12SArchie Cobbs 	NULL,
379f8307e12SArchie Cobbs 	NULL,
380f8307e12SArchie Cobbs 	NULL,
381f8307e12SArchie Cobbs 	&ng_ksocket_sockaddr_parse,
382f8307e12SArchie Cobbs 	&ng_ksocket_sockaddr_unparse,
383f8307e12SArchie Cobbs 	NULL		/* no such thing as a default struct sockaddr */
384f8307e12SArchie Cobbs };
385f8307e12SArchie Cobbs 
386f8307e12SArchie Cobbs /************************************************************************
387f8307e12SArchie Cobbs 		STRUCT NG_KSOCKET_SOCKOPT PARSE TYPE
388f8307e12SArchie Cobbs  ************************************************************************/
389f8307e12SArchie Cobbs 
390f8307e12SArchie Cobbs /* Get length of the struct ng_ksocket_sockopt value field, which is the
391f8307e12SArchie Cobbs    just the excess of the message argument portion over the length of
392f8307e12SArchie Cobbs    the struct ng_ksocket_sockopt. */
393f8307e12SArchie Cobbs static int
394f8307e12SArchie Cobbs ng_parse_sockoptval_getLength(const struct ng_parse_type *type,
395f8307e12SArchie Cobbs 	const u_char *start, const u_char *buf)
396f8307e12SArchie Cobbs {
397f8307e12SArchie Cobbs 	static const int offset = OFFSETOF(struct ng_ksocket_sockopt, value);
398f8307e12SArchie Cobbs 	const struct ng_ksocket_sockopt *sopt;
399f8307e12SArchie Cobbs 	const struct ng_mesg *msg;
400f8307e12SArchie Cobbs 
401f8307e12SArchie Cobbs 	sopt = (const struct ng_ksocket_sockopt *)(buf - offset);
402f8307e12SArchie Cobbs 	msg = (const struct ng_mesg *)((const u_char *)sopt - sizeof(*msg));
403f8307e12SArchie Cobbs 	return msg->header.arglen - sizeof(*sopt);
404f8307e12SArchie Cobbs }
405f8307e12SArchie Cobbs 
406f8307e12SArchie Cobbs /* Parse type for the option value part of a struct ng_ksocket_sockopt
407f8307e12SArchie Cobbs    XXX Eventually, we should handle the different socket options specially.
408f8307e12SArchie Cobbs    XXX This would avoid byte order problems, eg an integer value of 1 is
409f8307e12SArchie Cobbs    XXX going to be "[1]" for little endian or "[3=1]" for big endian. */
410f8307e12SArchie Cobbs static const struct ng_parse_type ng_ksocket_sockoptval_type = {
411f8307e12SArchie Cobbs 	&ng_parse_bytearray_type,
412f8307e12SArchie Cobbs 	&ng_parse_sockoptval_getLength
413f8307e12SArchie Cobbs };
414f8307e12SArchie Cobbs 
415f8307e12SArchie Cobbs /* Parse type for struct ng_ksocket_sockopt */
416f0184ff8SArchie Cobbs static const struct ng_parse_struct_field ng_ksocket_sockopt_type_fields[]
417f8307e12SArchie Cobbs 	= NG_KSOCKET_SOCKOPT_INFO(&ng_ksocket_sockoptval_type);
418f8307e12SArchie Cobbs static const struct ng_parse_type ng_ksocket_sockopt_type = {
419f8307e12SArchie Cobbs 	&ng_parse_struct_type,
420f0184ff8SArchie Cobbs 	&ng_ksocket_sockopt_type_fields
421f8307e12SArchie Cobbs };
422f8307e12SArchie Cobbs 
423f97e0a07SJulian Elischer /* Parse type for struct ng_ksocket_accept */
424f0184ff8SArchie Cobbs static const struct ng_parse_struct_field ng_ksocket_accept_type_fields[]
425f97e0a07SJulian Elischer 	= NGM_KSOCKET_ACCEPT_INFO;
426f97e0a07SJulian Elischer static const struct ng_parse_type ng_ksocket_accept_type = {
427f97e0a07SJulian Elischer 	&ng_parse_struct_type,
428f0184ff8SArchie Cobbs 	&ng_ksocket_accept_type_fields
429f97e0a07SJulian Elischer };
430f97e0a07SJulian Elischer 
431f8307e12SArchie Cobbs /* List of commands and how to convert arguments to/from ASCII */
432f8307e12SArchie Cobbs static const struct ng_cmdlist ng_ksocket_cmds[] = {
433f8307e12SArchie Cobbs 	{
434f8307e12SArchie Cobbs 	  NGM_KSOCKET_COOKIE,
435f8307e12SArchie Cobbs 	  NGM_KSOCKET_BIND,
436f8307e12SArchie Cobbs 	  "bind",
437f8307e12SArchie Cobbs 	  &ng_ksocket_sockaddr_type,
438f8307e12SArchie Cobbs 	  NULL
439f8307e12SArchie Cobbs 	},
440f8307e12SArchie Cobbs 	{
441f8307e12SArchie Cobbs 	  NGM_KSOCKET_COOKIE,
442f8307e12SArchie Cobbs 	  NGM_KSOCKET_LISTEN,
443f8307e12SArchie Cobbs 	  "listen",
444f8307e12SArchie Cobbs 	  &ng_parse_int32_type,
445f8307e12SArchie Cobbs 	  NULL
446f8307e12SArchie Cobbs 	},
447f8307e12SArchie Cobbs 	{
448f8307e12SArchie Cobbs 	  NGM_KSOCKET_COOKIE,
449f8307e12SArchie Cobbs 	  NGM_KSOCKET_ACCEPT,
450f8307e12SArchie Cobbs 	  "accept",
451f8307e12SArchie Cobbs 	  NULL,
452f97e0a07SJulian Elischer 	  &ng_ksocket_accept_type
453f8307e12SArchie Cobbs 	},
454f8307e12SArchie Cobbs 	{
455f8307e12SArchie Cobbs 	  NGM_KSOCKET_COOKIE,
456f8307e12SArchie Cobbs 	  NGM_KSOCKET_CONNECT,
457f8307e12SArchie Cobbs 	  "connect",
458f8307e12SArchie Cobbs 	  &ng_ksocket_sockaddr_type,
459f97e0a07SJulian Elischer 	  &ng_parse_int32_type
460f8307e12SArchie Cobbs 	},
461f8307e12SArchie Cobbs 	{
462f8307e12SArchie Cobbs 	  NGM_KSOCKET_COOKIE,
463f8307e12SArchie Cobbs 	  NGM_KSOCKET_GETNAME,
464f8307e12SArchie Cobbs 	  "getname",
465f8307e12SArchie Cobbs 	  NULL,
466f8307e12SArchie Cobbs 	  &ng_ksocket_sockaddr_type
467f8307e12SArchie Cobbs 	},
468f8307e12SArchie Cobbs 	{
469f8307e12SArchie Cobbs 	  NGM_KSOCKET_COOKIE,
470f8307e12SArchie Cobbs 	  NGM_KSOCKET_GETPEERNAME,
471f8307e12SArchie Cobbs 	  "getpeername",
472f8307e12SArchie Cobbs 	  NULL,
473f8307e12SArchie Cobbs 	  &ng_ksocket_sockaddr_type
474f8307e12SArchie Cobbs 	},
475f8307e12SArchie Cobbs 	{
476f8307e12SArchie Cobbs 	  NGM_KSOCKET_COOKIE,
477f8307e12SArchie Cobbs 	  NGM_KSOCKET_SETOPT,
478f8307e12SArchie Cobbs 	  "setopt",
479f8307e12SArchie Cobbs 	  &ng_ksocket_sockopt_type,
480f8307e12SArchie Cobbs 	  NULL
481f8307e12SArchie Cobbs 	},
482f8307e12SArchie Cobbs 	{
483f8307e12SArchie Cobbs 	  NGM_KSOCKET_COOKIE,
484f8307e12SArchie Cobbs 	  NGM_KSOCKET_GETOPT,
485f8307e12SArchie Cobbs 	  "getopt",
486f8307e12SArchie Cobbs 	  &ng_ksocket_sockopt_type,
487f8307e12SArchie Cobbs 	  &ng_ksocket_sockopt_type
488f8307e12SArchie Cobbs 	},
489f8307e12SArchie Cobbs 	{ 0 }
490f8307e12SArchie Cobbs };
491f8307e12SArchie Cobbs 
492f8307e12SArchie Cobbs /* Node type descriptor */
493f8307e12SArchie Cobbs static struct ng_type ng_ksocket_typestruct = {
494589f6ed8SJulian Elischer 	NG_ABI_VERSION,
495f8307e12SArchie Cobbs 	NG_KSOCKET_NODE_TYPE,
496f8307e12SArchie Cobbs 	NULL,
497f8307e12SArchie Cobbs 	ng_ksocket_constructor,
498f8307e12SArchie Cobbs 	ng_ksocket_rcvmsg,
499069154d5SJulian Elischer 	ng_ksocket_shutdown,
500f8307e12SArchie Cobbs 	ng_ksocket_newhook,
501f8307e12SArchie Cobbs 	NULL,
502f97e0a07SJulian Elischer 	ng_ksocket_connect,
503f8307e12SArchie Cobbs 	ng_ksocket_rcvdata,
504f8307e12SArchie Cobbs 	ng_ksocket_disconnect,
505f8307e12SArchie Cobbs 	ng_ksocket_cmds
506f8307e12SArchie Cobbs };
507f8307e12SArchie Cobbs NETGRAPH_INIT(ksocket, &ng_ksocket_typestruct);
508f8307e12SArchie Cobbs 
5094cc20ab1SSeigo Tanimura #define ERROUT(x)	do { error = (x); goto done; } while (0)
510cb3c7a5dSArchie Cobbs 
511cb3c7a5dSArchie Cobbs /************************************************************************
512cb3c7a5dSArchie Cobbs 			NETGRAPH NODE STUFF
513cb3c7a5dSArchie Cobbs  ************************************************************************/
514cb3c7a5dSArchie Cobbs 
515cb3c7a5dSArchie Cobbs /*
516cb3c7a5dSArchie Cobbs  * Node type constructor
517f97e0a07SJulian Elischer  * The NODE part is assumed to be all set up.
518f97e0a07SJulian Elischer  * There is already a reference to the node for us.
519cb3c7a5dSArchie Cobbs  */
520cb3c7a5dSArchie Cobbs static int
521069154d5SJulian Elischer ng_ksocket_constructor(node_p node)
522cb3c7a5dSArchie Cobbs {
523cb3c7a5dSArchie Cobbs 	priv_p priv;
524cb3c7a5dSArchie Cobbs 
525cb3c7a5dSArchie Cobbs 	/* Allocate private structure */
52693caaaa7SArchie Cobbs 	MALLOC(priv, priv_p, sizeof(*priv),
52793caaaa7SArchie Cobbs 	    M_NETGRAPH_KSOCKET, M_NOWAIT | M_ZERO);
528cb3c7a5dSArchie Cobbs 	if (priv == NULL)
529cb3c7a5dSArchie Cobbs 		return (ENOMEM);
530cb3c7a5dSArchie Cobbs 
531f97e0a07SJulian Elischer 	LIST_INIT(&priv->embryos);
532f97e0a07SJulian Elischer 	/* cross link them */
533f97e0a07SJulian Elischer 	priv->node = node;
53430400f03SJulian Elischer 	NG_NODE_SET_PRIVATE(node, priv);
535cb3c7a5dSArchie Cobbs 
536cb3c7a5dSArchie Cobbs 	/* Done */
537cb3c7a5dSArchie Cobbs 	return (0);
538cb3c7a5dSArchie Cobbs }
539cb3c7a5dSArchie Cobbs 
540cb3c7a5dSArchie Cobbs /*
541cb3c7a5dSArchie Cobbs  * Give our OK for a hook to be added. The hook name is of the
54293caaaa7SArchie Cobbs  * form "<family>/<type>/<proto>" where the three components may
543cb3c7a5dSArchie Cobbs  * be decimal numbers or else aliases from the above lists.
544cb3c7a5dSArchie Cobbs  *
545cb3c7a5dSArchie Cobbs  * Connecting a hook amounts to opening the socket.  Disconnecting
546cb3c7a5dSArchie Cobbs  * the hook closes the socket and destroys the node as well.
547cb3c7a5dSArchie Cobbs  */
548cb3c7a5dSArchie Cobbs static int
549cb3c7a5dSArchie Cobbs ng_ksocket_newhook(node_p node, hook_p hook, const char *name0)
550cb3c7a5dSArchie Cobbs {
551079b7badSJulian Elischer 	struct thread *td = curthread ? curthread : &thread0;	/* XXX broken */
55230400f03SJulian Elischer 	const priv_p priv = NG_NODE_PRIVATE(node);
553cb3c7a5dSArchie Cobbs 	char *s1, *s2, name[NG_HOOKLEN+1];
554cb3c7a5dSArchie Cobbs 	int family, type, protocol, error;
555cb3c7a5dSArchie Cobbs 
556cb3c7a5dSArchie Cobbs 	/* Check if we're already connected */
557cb3c7a5dSArchie Cobbs 	if (priv->hook != NULL)
558cb3c7a5dSArchie Cobbs 		return (EISCONN);
559cb3c7a5dSArchie Cobbs 
560f97e0a07SJulian Elischer 	if (priv->flags & KSF_CLONED) {
561f97e0a07SJulian Elischer 		if (priv->flags & KSF_EMBRYONIC) {
562f97e0a07SJulian Elischer 			/* Remove ourselves from our parent's embryo list */
563f97e0a07SJulian Elischer 			LIST_REMOVE(priv, siblings);
564f97e0a07SJulian Elischer 			priv->flags &= ~KSF_EMBRYONIC;
565f97e0a07SJulian Elischer 		}
566f97e0a07SJulian Elischer 	} else {
567cb3c7a5dSArchie Cobbs 		/* Extract family, type, and protocol from hook name */
568cb3c7a5dSArchie Cobbs 		snprintf(name, sizeof(name), "%s", name0);
569cb3c7a5dSArchie Cobbs 		s1 = name;
570cb3c7a5dSArchie Cobbs 		if ((s2 = index(s1, '/')) == NULL)
571cb3c7a5dSArchie Cobbs 			return (EINVAL);
572cb3c7a5dSArchie Cobbs 		*s2++ = '\0';
573f97e0a07SJulian Elischer 		family = ng_ksocket_parse(ng_ksocket_families, s1, 0);
574f97e0a07SJulian Elischer 		if (family == -1)
575cb3c7a5dSArchie Cobbs 			return (EINVAL);
576cb3c7a5dSArchie Cobbs 		s1 = s2;
577cb3c7a5dSArchie Cobbs 		if ((s2 = index(s1, '/')) == NULL)
578cb3c7a5dSArchie Cobbs 			return (EINVAL);
579cb3c7a5dSArchie Cobbs 		*s2++ = '\0';
580f97e0a07SJulian Elischer 		type = ng_ksocket_parse(ng_ksocket_types, s1, 0);
581f97e0a07SJulian Elischer 		if (type == -1)
582cb3c7a5dSArchie Cobbs 			return (EINVAL);
583cb3c7a5dSArchie Cobbs 		s1 = s2;
584f97e0a07SJulian Elischer 		protocol = ng_ksocket_parse(ng_ksocket_protos, s1, family);
585f97e0a07SJulian Elischer 		if (protocol == -1)
586cb3c7a5dSArchie Cobbs 			return (EINVAL);
587cb3c7a5dSArchie Cobbs 
588cb3c7a5dSArchie Cobbs 		/* Create the socket */
5899c4d63daSRobert Watson 		error = socreate(family, &priv->so, type, protocol,
590a854ed98SJohn Baldwin 		   td->td_ucred, td);
591f97e0a07SJulian Elischer 		if (error != 0)
592cb3c7a5dSArchie Cobbs 			return (error);
593cb3c7a5dSArchie Cobbs 
594cb3c7a5dSArchie Cobbs 		/* XXX call soreserve() ? */
595cb3c7a5dSArchie Cobbs 
596f97e0a07SJulian Elischer 	}
597cb3c7a5dSArchie Cobbs 
598cb3c7a5dSArchie Cobbs 	/* OK */
599cb3c7a5dSArchie Cobbs 	priv->hook = hook;
600cb3c7a5dSArchie Cobbs 	return(0);
601cb3c7a5dSArchie Cobbs }
602cb3c7a5dSArchie Cobbs 
603f97e0a07SJulian Elischer static int
604f97e0a07SJulian Elischer ng_ksocket_connect(hook_p hook)
605f97e0a07SJulian Elischer {
606f97e0a07SJulian Elischer 	node_p node = NG_HOOK_NODE(hook);
607f97e0a07SJulian Elischer 	const priv_p priv = NG_NODE_PRIVATE(node);
608f97e0a07SJulian Elischer 	struct socket *const so = priv->so;
609f97e0a07SJulian Elischer 
610f97e0a07SJulian Elischer 	/* Add our hook for incoming data and other events */
611f97e0a07SJulian Elischer 	priv->so->so_upcallarg = (caddr_t)node;
612f97e0a07SJulian Elischer 	priv->so->so_upcall = ng_ksocket_incoming;
613f97e0a07SJulian Elischer 	priv->so->so_rcv.sb_flags |= SB_UPCALL;
614f97e0a07SJulian Elischer 	priv->so->so_snd.sb_flags |= SB_UPCALL;
615f97e0a07SJulian Elischer 	priv->so->so_state |= SS_NBIO;
616f97e0a07SJulian Elischer 	/*
617f97e0a07SJulian Elischer 	 * --Original comment--
618f97e0a07SJulian Elischer 	 * On a cloned socket we may have already received one or more
619f97e0a07SJulian Elischer 	 * upcalls which we couldn't handle without a hook.  Handle
620f97e0a07SJulian Elischer 	 * those now.
621f97e0a07SJulian Elischer 	 * We cannot call the upcall function directly
622f97e0a07SJulian Elischer 	 * from here, because until this function has returned our
623f97e0a07SJulian Elischer 	 * hook isn't connected.
624f97e0a07SJulian Elischer 	 *
625f97e0a07SJulian Elischer 	 * ---meta comment for -current ---
626f97e0a07SJulian Elischer 	 * XXX This is dubius.
627f97e0a07SJulian Elischer 	 * Upcalls between the time that the hook was
628f97e0a07SJulian Elischer 	 * first created and now (on another processesor) will
629f97e0a07SJulian Elischer 	 * be earlier on the queue than the request to finalise the hook.
630f97e0a07SJulian Elischer 	 * By the time the hook is finalised,
631f97e0a07SJulian Elischer 	 * The queued upcalls will have happenned and the code
632f97e0a07SJulian Elischer 	 * will have discarded them because of a lack of a hook.
633f97e0a07SJulian Elischer 	 * (socket not open).
634f97e0a07SJulian Elischer 	 *
635f97e0a07SJulian Elischer 	 * This is a bad byproduct of the complicated way in which hooks
636f97e0a07SJulian Elischer 	 * are now created (3 daisy chained async events).
637f97e0a07SJulian Elischer 	 *
638f97e0a07SJulian Elischer 	 * Since we are a netgraph operation
639f97e0a07SJulian Elischer 	 * We know that we hold a lock on this node. This forces the
640f97e0a07SJulian Elischer 	 * request we make below to be queued rather than implemented
641f97e0a07SJulian Elischer 	 * immediatly which will cause the upcall function to be called a bit
642f97e0a07SJulian Elischer 	 * later.
643f97e0a07SJulian Elischer 	 * However, as we will run any waiting queued operations immediatly
644f97e0a07SJulian Elischer 	 * after doing this one, if we have not finalised the other end
645f97e0a07SJulian Elischer 	 * of the hook, those queued operations will fail.
646f97e0a07SJulian Elischer 	 */
647f97e0a07SJulian Elischer 	if (priv->flags & KSF_CLONED) {
648f97e0a07SJulian Elischer 		ng_send_fn(node, NULL, &ng_ksocket_incoming2, so, M_NOWAIT);
649f97e0a07SJulian Elischer 	}
650f97e0a07SJulian Elischer 
651f97e0a07SJulian Elischer 	return (0);
652f97e0a07SJulian Elischer }
653f97e0a07SJulian Elischer 
654cb3c7a5dSArchie Cobbs /*
655cb3c7a5dSArchie Cobbs  * Receive a control message
656cb3c7a5dSArchie Cobbs  */
657cb3c7a5dSArchie Cobbs static int
658069154d5SJulian Elischer ng_ksocket_rcvmsg(node_p node, item_p item, hook_p lasthook)
659cb3c7a5dSArchie Cobbs {
660079b7badSJulian Elischer 	struct thread *td = curthread ? curthread : &thread0;	/* XXX broken */
66130400f03SJulian Elischer 	const priv_p priv = NG_NODE_PRIVATE(node);
662f8307e12SArchie Cobbs 	struct socket *const so = priv->so;
663cb3c7a5dSArchie Cobbs 	struct ng_mesg *resp = NULL;
664cb3c7a5dSArchie Cobbs 	int error = 0;
665069154d5SJulian Elischer 	struct ng_mesg *msg;
666f97e0a07SJulian Elischer 	ng_ID_t raddr;
667cb3c7a5dSArchie Cobbs 
668069154d5SJulian Elischer 	NGI_GET_MSG(item, msg);
669cb3c7a5dSArchie Cobbs 	switch (msg->header.typecookie) {
670cb3c7a5dSArchie Cobbs 	case NGM_KSOCKET_COOKIE:
671cb3c7a5dSArchie Cobbs 		switch (msg->header.cmd) {
672cb3c7a5dSArchie Cobbs 		case NGM_KSOCKET_BIND:
673cb3c7a5dSArchie Cobbs 		    {
674f8307e12SArchie Cobbs 			struct sockaddr *const sa
675f8307e12SArchie Cobbs 			    = (struct sockaddr *)msg->data;
676cb3c7a5dSArchie Cobbs 
677f8307e12SArchie Cobbs 			/* Sanity check */
678f8307e12SArchie Cobbs 			if (msg->header.arglen < SADATA_OFFSET
679f8307e12SArchie Cobbs 			    || msg->header.arglen < sa->sa_len)
680f8307e12SArchie Cobbs 				ERROUT(EINVAL);
681f8307e12SArchie Cobbs 			if (so == NULL)
682f8307e12SArchie Cobbs 				ERROUT(ENXIO);
683cb3c7a5dSArchie Cobbs 
684f8307e12SArchie Cobbs 			/* Bind */
685b40ce416SJulian Elischer 			error = sobind(so, sa, td);
686cb3c7a5dSArchie Cobbs 			break;
687cb3c7a5dSArchie Cobbs 		    }
688cb3c7a5dSArchie Cobbs 		case NGM_KSOCKET_LISTEN:
689cb3c7a5dSArchie Cobbs 		    {
690f8307e12SArchie Cobbs 			/* Sanity check */
691f97e0a07SJulian Elischer 			if (msg->header.arglen != sizeof(int32_t))
692cb3c7a5dSArchie Cobbs 				ERROUT(EINVAL);
693f8307e12SArchie Cobbs 			if (so == NULL)
694f8307e12SArchie Cobbs 				ERROUT(ENXIO);
695cb3c7a5dSArchie Cobbs 
696f8307e12SArchie Cobbs 			/* Listen */
697b40ce416SJulian Elischer 			error = solisten(so, *((int32_t *)msg->data), td);
698cb3c7a5dSArchie Cobbs 			break;
699cb3c7a5dSArchie Cobbs 		    }
700cb3c7a5dSArchie Cobbs 
701cb3c7a5dSArchie Cobbs 		case NGM_KSOCKET_ACCEPT:
702cb3c7a5dSArchie Cobbs 		    {
703f8307e12SArchie Cobbs 			/* Sanity check */
704f8307e12SArchie Cobbs 			if (msg->header.arglen != 0)
705f8307e12SArchie Cobbs 				ERROUT(EINVAL);
706f8307e12SArchie Cobbs 			if (so == NULL)
707f8307e12SArchie Cobbs 				ERROUT(ENXIO);
708f8307e12SArchie Cobbs 
709f97e0a07SJulian Elischer 			/* Make sure the socket is capable of accepting */
710f97e0a07SJulian Elischer 			if (!(so->so_options & SO_ACCEPTCONN))
7114cc20ab1SSeigo Tanimura 				ERROUT(EINVAL);
712f97e0a07SJulian Elischer 			if (priv->flags & KSF_ACCEPTING)
713f97e0a07SJulian Elischer 				ERROUT(EALREADY);
714f8307e12SArchie Cobbs 
715f97e0a07SJulian Elischer 			error = ng_ksocket_check_accept(priv);
716f97e0a07SJulian Elischer 			if (error != 0 && error != EWOULDBLOCK)
717f97e0a07SJulian Elischer 				ERROUT(error);
718f8307e12SArchie Cobbs 
719f97e0a07SJulian Elischer 			/*
720f97e0a07SJulian Elischer 			 * If a connection is already complete, take it.
721f97e0a07SJulian Elischer 			 * Otherwise let the upcall function deal with
722f97e0a07SJulian Elischer 			 * the connection when it comes in.
723f97e0a07SJulian Elischer 			 */
724f97e0a07SJulian Elischer 			priv->response_token = msg->header.token;
725f97e0a07SJulian Elischer 			raddr = priv->response_addr;
726f97e0a07SJulian Elischer 			if (error == 0) {
727f97e0a07SJulian Elischer 				ng_ksocket_finish_accept(priv);
728f97e0a07SJulian Elischer 			} else
729f97e0a07SJulian Elischer 				priv->flags |= KSF_ACCEPTING;
730cb3c7a5dSArchie Cobbs 			break;
731cb3c7a5dSArchie Cobbs 		    }
732cb3c7a5dSArchie Cobbs 
733cb3c7a5dSArchie Cobbs 		case NGM_KSOCKET_CONNECT:
734cb3c7a5dSArchie Cobbs 		    {
735f8307e12SArchie Cobbs 			struct sockaddr *const sa
736f8307e12SArchie Cobbs 			    = (struct sockaddr *)msg->data;
737cb3c7a5dSArchie Cobbs 
738f8307e12SArchie Cobbs 			/* Sanity check */
739f8307e12SArchie Cobbs 			if (msg->header.arglen < SADATA_OFFSET
740f8307e12SArchie Cobbs 			    || msg->header.arglen < sa->sa_len)
741f8307e12SArchie Cobbs 				ERROUT(EINVAL);
742f8307e12SArchie Cobbs 			if (so == NULL)
743f8307e12SArchie Cobbs 				ERROUT(ENXIO);
744cb3c7a5dSArchie Cobbs 
745cb3c7a5dSArchie Cobbs 			/* Do connect */
746cb3c7a5dSArchie Cobbs 			if ((so->so_state & SS_ISCONNECTING) != 0)
7474cc20ab1SSeigo Tanimura 				ERROUT(EALREADY);
748b40ce416SJulian Elischer 			if ((error = soconnect(so, sa, td)) != 0) {
749cb3c7a5dSArchie Cobbs 				so->so_state &= ~SS_ISCONNECTING;
7504cc20ab1SSeigo Tanimura 				ERROUT(error);
751cb3c7a5dSArchie Cobbs 			}
7524cc20ab1SSeigo Tanimura 			if ((so->so_state & SS_ISCONNECTING) != 0)
753f97e0a07SJulian Elischer 				/* We will notify the sender when we connect */
754f97e0a07SJulian Elischer 				priv->response_token = msg->header.token;
755f97e0a07SJulian Elischer 				raddr = priv->response_addr;
756f97e0a07SJulian Elischer 				priv->flags |= KSF_CONNECTING;
7574cc20ab1SSeigo Tanimura 				ERROUT(EINPROGRESS);
758cb3c7a5dSArchie Cobbs 			break;
759cb3c7a5dSArchie Cobbs 		    }
760cb3c7a5dSArchie Cobbs 
761cb3c7a5dSArchie Cobbs 		case NGM_KSOCKET_GETNAME:
762cb3c7a5dSArchie Cobbs 		case NGM_KSOCKET_GETPEERNAME:
763cb3c7a5dSArchie Cobbs 		    {
764f8307e12SArchie Cobbs 			int (*func)(struct socket *so, struct sockaddr **nam);
765f8307e12SArchie Cobbs 			struct sockaddr *sa = NULL;
766f8307e12SArchie Cobbs 			int len;
767f8307e12SArchie Cobbs 
768f8307e12SArchie Cobbs 			/* Sanity check */
769f8307e12SArchie Cobbs 			if (msg->header.arglen != 0)
770f8307e12SArchie Cobbs 				ERROUT(EINVAL);
771f8307e12SArchie Cobbs 			if (so == NULL)
772f8307e12SArchie Cobbs 				ERROUT(ENXIO);
773f8307e12SArchie Cobbs 
774f8307e12SArchie Cobbs 			/* Get function */
775f8307e12SArchie Cobbs 			if (msg->header.cmd == NGM_KSOCKET_GETPEERNAME) {
776f8307e12SArchie Cobbs 				if ((so->so_state
777f8307e12SArchie Cobbs 				    & (SS_ISCONNECTED|SS_ISCONFIRMING)) == 0)
7784cc20ab1SSeigo Tanimura 					ERROUT(ENOTCONN);
779f8307e12SArchie Cobbs 				func = so->so_proto->pr_usrreqs->pru_peeraddr;
780f8307e12SArchie Cobbs 			} else
781f8307e12SArchie Cobbs 				func = so->so_proto->pr_usrreqs->pru_sockaddr;
782f8307e12SArchie Cobbs 
783f8307e12SArchie Cobbs 			/* Get local or peer address */
784f8307e12SArchie Cobbs 			if ((error = (*func)(so, &sa)) != 0)
785f8307e12SArchie Cobbs 				goto bail;
786f8307e12SArchie Cobbs 			len = (sa == NULL) ? 0 : sa->sa_len;
787f8307e12SArchie Cobbs 
788f8307e12SArchie Cobbs 			/* Send it back in a response */
789f8307e12SArchie Cobbs 			NG_MKRESPONSE(resp, msg, len, M_NOWAIT);
790f8307e12SArchie Cobbs 			if (resp == NULL) {
791f8307e12SArchie Cobbs 				error = ENOMEM;
792f8307e12SArchie Cobbs 				goto bail;
793f8307e12SArchie Cobbs 			}
794f8307e12SArchie Cobbs 			bcopy(sa, resp->data, len);
795f8307e12SArchie Cobbs 
796f8307e12SArchie Cobbs 		bail:
797f8307e12SArchie Cobbs 			/* Cleanup */
798f8307e12SArchie Cobbs 			if (sa != NULL)
799f8307e12SArchie Cobbs 				FREE(sa, M_SONAME);
800cb3c7a5dSArchie Cobbs 			break;
801cb3c7a5dSArchie Cobbs 		    }
802cb3c7a5dSArchie Cobbs 
803cb3c7a5dSArchie Cobbs 		case NGM_KSOCKET_GETOPT:
804cb3c7a5dSArchie Cobbs 		    {
805f8307e12SArchie Cobbs 			struct ng_ksocket_sockopt *ksopt =
806f8307e12SArchie Cobbs 			    (struct ng_ksocket_sockopt *)msg->data;
807f8307e12SArchie Cobbs 			struct sockopt sopt;
808f8307e12SArchie Cobbs 
809f8307e12SArchie Cobbs 			/* Sanity check */
810f8307e12SArchie Cobbs 			if (msg->header.arglen != sizeof(*ksopt))
811f8307e12SArchie Cobbs 				ERROUT(EINVAL);
812f8307e12SArchie Cobbs 			if (so == NULL)
813f8307e12SArchie Cobbs 				ERROUT(ENXIO);
814f8307e12SArchie Cobbs 
815f8307e12SArchie Cobbs 			/* Get response with room for option value */
816f8307e12SArchie Cobbs 			NG_MKRESPONSE(resp, msg, sizeof(*ksopt)
817f8307e12SArchie Cobbs 			    + NG_KSOCKET_MAX_OPTLEN, M_NOWAIT);
818f8307e12SArchie Cobbs 			if (resp == NULL)
819f8307e12SArchie Cobbs 				ERROUT(ENOMEM);
820f8307e12SArchie Cobbs 
821f8307e12SArchie Cobbs 			/* Get socket option, and put value in the response */
822f8307e12SArchie Cobbs 			sopt.sopt_dir = SOPT_GET;
823f8307e12SArchie Cobbs 			sopt.sopt_level = ksopt->level;
824f8307e12SArchie Cobbs 			sopt.sopt_name = ksopt->name;
825b40ce416SJulian Elischer 			sopt.sopt_td = NULL;
826f8307e12SArchie Cobbs 			sopt.sopt_valsize = NG_KSOCKET_MAX_OPTLEN;
827f8307e12SArchie Cobbs 			ksopt = (struct ng_ksocket_sockopt *)resp->data;
828f8307e12SArchie Cobbs 			sopt.sopt_val = ksopt->value;
829f8307e12SArchie Cobbs 			if ((error = sogetopt(so, &sopt)) != 0) {
830069154d5SJulian Elischer 				NG_FREE_MSG(resp);
831f8307e12SArchie Cobbs 				break;
832f8307e12SArchie Cobbs 			}
833f8307e12SArchie Cobbs 
834f8307e12SArchie Cobbs 			/* Set actual value length */
835f8307e12SArchie Cobbs 			resp->header.arglen = sizeof(*ksopt)
836f8307e12SArchie Cobbs 			    + sopt.sopt_valsize;
837cb3c7a5dSArchie Cobbs 			break;
838cb3c7a5dSArchie Cobbs 		    }
839cb3c7a5dSArchie Cobbs 
840cb3c7a5dSArchie Cobbs 		case NGM_KSOCKET_SETOPT:
841cb3c7a5dSArchie Cobbs 		    {
842f8307e12SArchie Cobbs 			struct ng_ksocket_sockopt *const ksopt =
843f8307e12SArchie Cobbs 			    (struct ng_ksocket_sockopt *)msg->data;
844f8307e12SArchie Cobbs 			const int valsize = msg->header.arglen - sizeof(*ksopt);
845f8307e12SArchie Cobbs 			struct sockopt sopt;
846f8307e12SArchie Cobbs 
847f8307e12SArchie Cobbs 			/* Sanity check */
848f8307e12SArchie Cobbs 			if (valsize < 0)
849f8307e12SArchie Cobbs 				ERROUT(EINVAL);
850f8307e12SArchie Cobbs 			if (so == NULL)
851f8307e12SArchie Cobbs 				ERROUT(ENXIO);
852f8307e12SArchie Cobbs 
853f8307e12SArchie Cobbs 			/* Set socket option */
854f8307e12SArchie Cobbs 			sopt.sopt_dir = SOPT_SET;
855f8307e12SArchie Cobbs 			sopt.sopt_level = ksopt->level;
856f8307e12SArchie Cobbs 			sopt.sopt_name = ksopt->name;
857f8307e12SArchie Cobbs 			sopt.sopt_val = ksopt->value;
858f8307e12SArchie Cobbs 			sopt.sopt_valsize = valsize;
859b40ce416SJulian Elischer 			sopt.sopt_td = NULL;
860f8307e12SArchie Cobbs 			error = sosetopt(so, &sopt);
861cb3c7a5dSArchie Cobbs 			break;
862cb3c7a5dSArchie Cobbs 		    }
863cb3c7a5dSArchie Cobbs 
864cb3c7a5dSArchie Cobbs 		default:
865cb3c7a5dSArchie Cobbs 			error = EINVAL;
866cb3c7a5dSArchie Cobbs 			break;
867cb3c7a5dSArchie Cobbs 		}
868cb3c7a5dSArchie Cobbs 		break;
869cb3c7a5dSArchie Cobbs 	default:
870cb3c7a5dSArchie Cobbs 		error = EINVAL;
871cb3c7a5dSArchie Cobbs 		break;
872cb3c7a5dSArchie Cobbs 	}
873cb3c7a5dSArchie Cobbs done:
874069154d5SJulian Elischer 	NG_RESPOND_MSG(error, node, item, resp);
875069154d5SJulian Elischer 	NG_FREE_MSG(msg);
876cb3c7a5dSArchie Cobbs 	return (error);
877cb3c7a5dSArchie Cobbs }
878cb3c7a5dSArchie Cobbs 
879cb3c7a5dSArchie Cobbs /*
880cb3c7a5dSArchie Cobbs  * Receive incoming data on our hook.  Send it out the socket.
881cb3c7a5dSArchie Cobbs  */
882cb3c7a5dSArchie Cobbs static int
883069154d5SJulian Elischer ng_ksocket_rcvdata(hook_p hook, item_p item)
884cb3c7a5dSArchie Cobbs {
885079b7badSJulian Elischer 	struct thread *td = curthread ? curthread : &thread0;	/* XXX broken */
88630400f03SJulian Elischer 	const node_p node = NG_HOOK_NODE(hook);
88730400f03SJulian Elischer 	const priv_p priv = NG_NODE_PRIVATE(node);
888cb3c7a5dSArchie Cobbs 	struct socket *const so = priv->so;
88919ff9e5fSArchie Cobbs 	struct sockaddr *sa = NULL;
89019ff9e5fSArchie Cobbs 	meta_p meta;
891cb3c7a5dSArchie Cobbs 	int error;
892069154d5SJulian Elischer 	struct mbuf *m;
893cb3c7a5dSArchie Cobbs 
894dc9c2e01SArchie Cobbs 	/* Avoid reentrantly sending on the socket */
895dc9c2e01SArchie Cobbs 	if ((priv->flags & KSF_SENDING) != 0) {
896dc9c2e01SArchie Cobbs 		NG_FREE_ITEM(item);
897dc9c2e01SArchie Cobbs 		return (EDEADLK);
898dc9c2e01SArchie Cobbs 	}
899dc9c2e01SArchie Cobbs 
90019ff9e5fSArchie Cobbs 	/* Extract data and meta information */
901069154d5SJulian Elischer 	NGI_GET_M(item, m);
90219ff9e5fSArchie Cobbs 	NGI_GET_META(item, meta);
903069154d5SJulian Elischer 	NG_FREE_ITEM(item);
90419ff9e5fSArchie Cobbs 
90519ff9e5fSArchie Cobbs 	/* If any meta info, look for peer socket address */
90619ff9e5fSArchie Cobbs 	if (meta != NULL) {
90719ff9e5fSArchie Cobbs 		struct meta_field_header *field;
90819ff9e5fSArchie Cobbs 
90919ff9e5fSArchie Cobbs 		/* Look for peer socket address */
91019ff9e5fSArchie Cobbs 		for (field = &meta->options[0];
91119ff9e5fSArchie Cobbs 		    (caddr_t)field < (caddr_t)meta + meta->used_len;
91219ff9e5fSArchie Cobbs 		    field = (struct meta_field_header *)
91319ff9e5fSArchie Cobbs 		      ((caddr_t)field + field->len)) {
91419ff9e5fSArchie Cobbs 			if (field->cookie != NGM_KSOCKET_COOKIE
91519ff9e5fSArchie Cobbs 			    || field->type != NG_KSOCKET_META_SOCKADDR)
91619ff9e5fSArchie Cobbs 				continue;
91719ff9e5fSArchie Cobbs 			sa = (struct sockaddr *)field->data;
91819ff9e5fSArchie Cobbs 			break;
91919ff9e5fSArchie Cobbs 		}
92019ff9e5fSArchie Cobbs 	}
92119ff9e5fSArchie Cobbs 
92219ff9e5fSArchie Cobbs 	/* Send packet */
923dc9c2e01SArchie Cobbs 	priv->flags |= KSF_SENDING;
92419ff9e5fSArchie Cobbs 	error = (*so->so_proto->pr_usrreqs->pru_sosend)(so, sa, 0, m, 0, 0, td);
925dc9c2e01SArchie Cobbs 	priv->flags &= ~KSF_SENDING;
92619ff9e5fSArchie Cobbs 
92719ff9e5fSArchie Cobbs 	/* Clean up and exit */
92819ff9e5fSArchie Cobbs 	NG_FREE_META(meta);
929cb3c7a5dSArchie Cobbs 	return (error);
930cb3c7a5dSArchie Cobbs }
931cb3c7a5dSArchie Cobbs 
932cb3c7a5dSArchie Cobbs /*
933cb3c7a5dSArchie Cobbs  * Destroy node
934cb3c7a5dSArchie Cobbs  */
935cb3c7a5dSArchie Cobbs static int
936069154d5SJulian Elischer ng_ksocket_shutdown(node_p node)
937cb3c7a5dSArchie Cobbs {
93830400f03SJulian Elischer 	const priv_p priv = NG_NODE_PRIVATE(node);
939f97e0a07SJulian Elischer 	priv_p embryo;
940cb3c7a5dSArchie Cobbs 
94119bff684SArchie Cobbs 	/* Close our socket (if any) */
94219bff684SArchie Cobbs 	if (priv->so != NULL) {
943f8307e12SArchie Cobbs 		priv->so->so_upcall = NULL;
944f8307e12SArchie Cobbs 		priv->so->so_rcv.sb_flags &= ~SB_UPCALL;
945f97e0a07SJulian Elischer 		priv->so->so_snd.sb_flags &= ~SB_UPCALL;
94619bff684SArchie Cobbs 		soclose(priv->so);
94719bff684SArchie Cobbs 		priv->so = NULL;
94819bff684SArchie Cobbs 	}
94919bff684SArchie Cobbs 
950f97e0a07SJulian Elischer 	/* If we are an embryo, take ourselves out of the parent's list */
951f97e0a07SJulian Elischer 	if (priv->flags & KSF_EMBRYONIC) {
952f97e0a07SJulian Elischer 		LIST_REMOVE(priv, siblings);
953f97e0a07SJulian Elischer 		priv->flags &= ~KSF_EMBRYONIC;
954f97e0a07SJulian Elischer 	}
955f97e0a07SJulian Elischer 
956f97e0a07SJulian Elischer 	/* Remove any embryonic children we have */
957f97e0a07SJulian Elischer 	while (!LIST_EMPTY(&priv->embryos)) {
958f97e0a07SJulian Elischer 		embryo = LIST_FIRST(&priv->embryos);
959f97e0a07SJulian Elischer 		ng_rmnode_self(embryo->node);
960f97e0a07SJulian Elischer 	}
961f97e0a07SJulian Elischer 
962cb3c7a5dSArchie Cobbs 	/* Take down netgraph node */
963cb3c7a5dSArchie Cobbs 	bzero(priv, sizeof(*priv));
9649c8c302fSJulian Elischer 	FREE(priv, M_NETGRAPH_KSOCKET);
96530400f03SJulian Elischer 	NG_NODE_SET_PRIVATE(node, NULL);
96630400f03SJulian Elischer 	NG_NODE_UNREF(node);		/* let the node escape */
967cb3c7a5dSArchie Cobbs 	return (0);
968cb3c7a5dSArchie Cobbs }
969cb3c7a5dSArchie Cobbs 
970cb3c7a5dSArchie Cobbs /*
971cb3c7a5dSArchie Cobbs  * Hook disconnection
972cb3c7a5dSArchie Cobbs  */
973cb3c7a5dSArchie Cobbs static int
974cb3c7a5dSArchie Cobbs ng_ksocket_disconnect(hook_p hook)
975cb3c7a5dSArchie Cobbs {
97630400f03SJulian Elischer 	KASSERT(NG_NODE_NUMHOOKS(NG_HOOK_NODE(hook)) == 0,
9776e551fb6SDavid E. O'Brien 	    ("%s: numhooks=%d?", __func__,
97893caaaa7SArchie Cobbs 	    NG_NODE_NUMHOOKS(NG_HOOK_NODE(hook))));
97930400f03SJulian Elischer 	if (NG_NODE_IS_VALID(NG_HOOK_NODE(hook)))
98030400f03SJulian Elischer 		ng_rmnode_self(NG_HOOK_NODE(hook));
981cb3c7a5dSArchie Cobbs 	return (0);
982cb3c7a5dSArchie Cobbs }
983cb3c7a5dSArchie Cobbs 
984cb3c7a5dSArchie Cobbs /************************************************************************
985cb3c7a5dSArchie Cobbs 			HELPER STUFF
986cb3c7a5dSArchie Cobbs  ************************************************************************/
987cb3c7a5dSArchie Cobbs /*
988f97e0a07SJulian Elischer  * You should no-longer "just call" a netgraph node function
989f97e0a07SJulian Elischer  * from an external asynchronous event.
990f97e0a07SJulian Elischer  * This is because in doing so you are ignoring the locking on the netgraph
991f97e0a07SJulian Elischer  * nodes. Instead call your function via
992f97e0a07SJulian Elischer  * "int ng_send_fn(node_p node, hook_p hook, ng_item_fn *fn,
993f97e0a07SJulian Elischer  *	 void *arg1, int arg2);"
994f97e0a07SJulian Elischer  * this will call the function you chose, but will first do all the
995f97e0a07SJulian Elischer  * locking rigmarole. Your function MAY only be called at some distant future
996f97e0a07SJulian Elischer  * time (several millisecs away) so don't give it any arguments
997f97e0a07SJulian Elischer  * that may be revoked soon (e.g. on your stack).
998f97e0a07SJulian Elischer  * In this case even the 'so' argument is doubtful.
999f97e0a07SJulian Elischer  * While the function request is being processed the node
1000f97e0a07SJulian Elischer  * has an extra reference and as such will not disappear until
1001f97e0a07SJulian Elischer  * the request has at least been done, but the 'so' may not be so lucky.
1002f97e0a07SJulian Elischer  * handle this by checking the validity of the node in the target function
1003f97e0a07SJulian Elischer  * before dereferencing the socket pointer.
1004cb3c7a5dSArchie Cobbs  */
1005f97e0a07SJulian Elischer 
1006cb3c7a5dSArchie Cobbs static void
1007cb3c7a5dSArchie Cobbs ng_ksocket_incoming(struct socket *so, void *arg, int waitflag)
1008cb3c7a5dSArchie Cobbs {
1009cb3c7a5dSArchie Cobbs 	const node_p node = arg;
1010f97e0a07SJulian Elischer 
1011f97e0a07SJulian Elischer 	ng_send_fn(node, NULL, &ng_ksocket_incoming2, so, waitflag);
1012f97e0a07SJulian Elischer }
1013f97e0a07SJulian Elischer 
1014f97e0a07SJulian Elischer 
1015f97e0a07SJulian Elischer /*
1016f97e0a07SJulian Elischer  * When incoming data is appended to the socket, we get notified here.
1017f97e0a07SJulian Elischer  * This is also called whenever a significant event occurs for the socket.
1018f97e0a07SJulian Elischer  * We know that HOOK is NULL. Because of how we were called we know we have a
1019f97e0a07SJulian Elischer  * lock on this node an are participating inthe netgraph locking.
1020f97e0a07SJulian Elischer  * Our original caller may have queued this even some time ago and
1021f97e0a07SJulian Elischer  * we cannot trust that he even still exists. The node however is being
1022f97e0a07SJulian Elischer  * held with a reference by the queueing code, at least until we finish,
1023f97e0a07SJulian Elischer  * even if it has been zapped, so first check it's validiy
1024f97e0a07SJulian Elischer  * before we trust the socket (which was derived from it).
1025f97e0a07SJulian Elischer  */
1026f97e0a07SJulian Elischer static void
1027f97e0a07SJulian Elischer ng_ksocket_incoming2(node_p node, hook_p hook, void *arg1, int waitflag)
1028f97e0a07SJulian Elischer {
1029f97e0a07SJulian Elischer 	struct socket *so = arg1;
103030400f03SJulian Elischer 	const priv_p priv = NG_NODE_PRIVATE(node);
1031cb3c7a5dSArchie Cobbs 	struct mbuf *m;
1032f97e0a07SJulian Elischer 	struct ng_mesg *response;
1033cb3c7a5dSArchie Cobbs 	struct uio auio;
103419bff684SArchie Cobbs 	int s, flags, error;
103519bff684SArchie Cobbs 
103619bff684SArchie Cobbs 	s = splnet();
1037cb3c7a5dSArchie Cobbs 
1038cb3c7a5dSArchie Cobbs 	/* Sanity check */
103930400f03SJulian Elischer 	if (NG_NODE_NOT_VALID(node)) {
104019bff684SArchie Cobbs 		splx(s);
1041cb3c7a5dSArchie Cobbs 		return;
104219bff684SArchie Cobbs 	}
1043f97e0a07SJulian Elischer 	/* so = priv->so; *//* XXX could have derived this like so */
10446e551fb6SDavid E. O'Brien 	KASSERT(so == priv->so, ("%s: wrong socket", __func__));
1045f97e0a07SJulian Elischer 
1046f97e0a07SJulian Elischer 	/* Check whether a pending connect operation has completed */
1047f97e0a07SJulian Elischer 	if (priv->flags & KSF_CONNECTING) {
1048f97e0a07SJulian Elischer 		if ((error = so->so_error) != 0) {
1049f97e0a07SJulian Elischer 			so->so_error = 0;
1050f97e0a07SJulian Elischer 			so->so_state &= ~SS_ISCONNECTING;
1051f97e0a07SJulian Elischer 		}
1052f97e0a07SJulian Elischer 		if (!(so->so_state & SS_ISCONNECTING)) {
1053f97e0a07SJulian Elischer 			NG_MKMESSAGE(response, NGM_KSOCKET_COOKIE,
1054f97e0a07SJulian Elischer 			    NGM_KSOCKET_CONNECT, sizeof(int32_t), waitflag);
1055f97e0a07SJulian Elischer 			if (response != NULL) {
1056f97e0a07SJulian Elischer 				response->header.flags |= NGF_RESP;
1057f97e0a07SJulian Elischer 				response->header.token = priv->response_token;
1058f97e0a07SJulian Elischer 				*(int32_t *)response->data = error;
1059f97e0a07SJulian Elischer 				/*
1060f97e0a07SJulian Elischer 				 * send an async "response" message
1061f97e0a07SJulian Elischer 				 * to the node that set us up
1062f97e0a07SJulian Elischer 				 * (if it still exists)
1063f97e0a07SJulian Elischer 				 */
1064facfd889SArchie Cobbs 				NG_SEND_MSG_ID(error, node,
1065facfd889SArchie Cobbs 				    response, priv->response_addr, 0);
1066f97e0a07SJulian Elischer 			}
1067f97e0a07SJulian Elischer 			priv->flags &= ~KSF_CONNECTING;
10684cc20ab1SSeigo Tanimura 		}
1069f97e0a07SJulian Elischer 	}
1070f97e0a07SJulian Elischer 
1071f97e0a07SJulian Elischer 	/* Check whether a pending accept operation has completed */
1072f97e0a07SJulian Elischer 	if (priv->flags & KSF_ACCEPTING) {
1073f97e0a07SJulian Elischer 		error = ng_ksocket_check_accept(priv);
1074f97e0a07SJulian Elischer 		if (error != EWOULDBLOCK)
1075f97e0a07SJulian Elischer 			priv->flags &= ~KSF_ACCEPTING;
1076f97e0a07SJulian Elischer 		if (error == 0)
1077f97e0a07SJulian Elischer 			ng_ksocket_finish_accept(priv);
1078f97e0a07SJulian Elischer 	}
1079f97e0a07SJulian Elischer 
1080f97e0a07SJulian Elischer 	/*
1081f97e0a07SJulian Elischer 	 * If we don't have a hook, we must handle data events later.  When
1082f97e0a07SJulian Elischer 	 * the hook gets created and is connected, this upcall function
1083f97e0a07SJulian Elischer 	 * will be called again.
1084f97e0a07SJulian Elischer 	 */
1085f97e0a07SJulian Elischer 	if (priv->hook == NULL) {
1086f97e0a07SJulian Elischer 		splx(s);
1087f97e0a07SJulian Elischer 		return;
1088f97e0a07SJulian Elischer 	}
1089cb3c7a5dSArchie Cobbs 
1090cb3c7a5dSArchie Cobbs 	/* Read and forward available mbuf's */
1091b40ce416SJulian Elischer 	auio.uio_td = NULL;
1092cb3c7a5dSArchie Cobbs 	auio.uio_resid = 1000000000;
1093cb3c7a5dSArchie Cobbs 	flags = MSG_DONTWAIT;
109419ff9e5fSArchie Cobbs 	while (1) {
109519ff9e5fSArchie Cobbs 		struct sockaddr *sa = NULL;
109619ff9e5fSArchie Cobbs 		meta_p meta = NULL;
1097f8307e12SArchie Cobbs 		struct mbuf *n;
1098f8307e12SArchie Cobbs 
109919ff9e5fSArchie Cobbs 		/* Try to get next packet from socket */
110019ff9e5fSArchie Cobbs 		if ((error = (*so->so_proto->pr_usrreqs->pru_soreceive)
11014cc20ab1SSeigo Tanimura 		    (so, (so->so_state & SS_ISCONNECTED) ? NULL : &sa,
110219ff9e5fSArchie Cobbs 		    &auio, &m, (struct mbuf **)0, &flags)) != 0)
110319ff9e5fSArchie Cobbs 			break;
110419ff9e5fSArchie Cobbs 
110519ff9e5fSArchie Cobbs 		/* See if we got anything */
110619ff9e5fSArchie Cobbs 		if (m == NULL) {
110719ff9e5fSArchie Cobbs 			if (sa != NULL)
110819ff9e5fSArchie Cobbs 				FREE(sa, M_SONAME);
110919ff9e5fSArchie Cobbs 			break;
111019ff9e5fSArchie Cobbs 		}
111119ff9e5fSArchie Cobbs 
1112f8307e12SArchie Cobbs 		/* Don't trust the various socket layers to get the
1113f8307e12SArchie Cobbs 		   packet header and length correct (eg. kern/15175) */
111419ff9e5fSArchie Cobbs 		for (n = m, m->m_pkthdr.len = 0; n != NULL; n = n->m_next)
1115f8307e12SArchie Cobbs 			m->m_pkthdr.len += n->m_len;
111619ff9e5fSArchie Cobbs 
111719ff9e5fSArchie Cobbs 		/* Put peer's socket address (if any) into a meta info blob */
111819ff9e5fSArchie Cobbs 		if (sa != NULL) {
111919ff9e5fSArchie Cobbs 			struct meta_field_header *mhead;
112019ff9e5fSArchie Cobbs 			u_int len;
112119ff9e5fSArchie Cobbs 
112219ff9e5fSArchie Cobbs 			len = sizeof(*meta) + sizeof(*mhead) + sa->sa_len;
112319ff9e5fSArchie Cobbs 			MALLOC(meta, meta_p, len, M_NETGRAPH_META, M_NOWAIT);
112419ff9e5fSArchie Cobbs 			if (meta == NULL) {
112519ff9e5fSArchie Cobbs 				FREE(sa, M_SONAME);
112619ff9e5fSArchie Cobbs 				goto sendit;
1127f8307e12SArchie Cobbs 			}
112819ff9e5fSArchie Cobbs 			mhead = &meta->options[0];
112919ff9e5fSArchie Cobbs 			bzero(meta, sizeof(*meta));
113019ff9e5fSArchie Cobbs 			bzero(mhead, sizeof(*mhead));
113119ff9e5fSArchie Cobbs 			meta->allocated_len = len;
113219ff9e5fSArchie Cobbs 			meta->used_len = len;
113319ff9e5fSArchie Cobbs 			mhead->cookie = NGM_KSOCKET_COOKIE;
113419ff9e5fSArchie Cobbs 			mhead->type = NG_KSOCKET_META_SOCKADDR;
113519ff9e5fSArchie Cobbs 			mhead->len = sizeof(*mhead) + sa->sa_len;
113619ff9e5fSArchie Cobbs 			bcopy(sa, mhead->data, sa->sa_len);
113719ff9e5fSArchie Cobbs 			FREE(sa, M_SONAME);
113819ff9e5fSArchie Cobbs 		}
113919ff9e5fSArchie Cobbs 
114019ff9e5fSArchie Cobbs sendit:		/* Forward data with optional peer sockaddr as meta info */
114119ff9e5fSArchie Cobbs 		NG_SEND_DATA(error, priv->hook, m, meta);
114219ff9e5fSArchie Cobbs 	}
1143f97e0a07SJulian Elischer 
1144f97e0a07SJulian Elischer 	/*
1145f97e0a07SJulian Elischer 	 * If the peer has closed the connection, forward a 0-length mbuf
1146f97e0a07SJulian Elischer 	 * to indicate end-of-file.
1147f97e0a07SJulian Elischer 	 */
1148f97e0a07SJulian Elischer 	if (so->so_state & SS_CANTRCVMORE && !(priv->flags & KSF_EOFSEEN)) {
1149f97e0a07SJulian Elischer 		MGETHDR(m, waitflag, MT_DATA);
1150f97e0a07SJulian Elischer 		if (m != NULL) {
1151f97e0a07SJulian Elischer 			m->m_len = m->m_pkthdr.len = 0;
1152f97e0a07SJulian Elischer 			NG_SEND_DATA_ONLY(error, priv->hook, m);
1153f97e0a07SJulian Elischer 		}
1154f97e0a07SJulian Elischer 		priv->flags |= KSF_EOFSEEN;
11554cc20ab1SSeigo Tanimura 	}
115619bff684SArchie Cobbs 	splx(s);
1157cb3c7a5dSArchie Cobbs }
1158cb3c7a5dSArchie Cobbs 
1159cb3c7a5dSArchie Cobbs /*
1160f97e0a07SJulian Elischer  * Check for a completed incoming connection and return 0 if one is found.
1161f97e0a07SJulian Elischer  * Otherwise return the appropriate error code.
1162f97e0a07SJulian Elischer  */
1163f97e0a07SJulian Elischer static int
1164f97e0a07SJulian Elischer ng_ksocket_check_accept(priv_p priv)
1165f97e0a07SJulian Elischer {
1166f97e0a07SJulian Elischer 	struct socket *const head = priv->so;
1167f97e0a07SJulian Elischer 	int error;
1168f97e0a07SJulian Elischer 
1169f97e0a07SJulian Elischer 	if ((error = head->so_error) != 0) {
1170f97e0a07SJulian Elischer 		head->so_error = 0;
1171f97e0a07SJulian Elischer 		return error;
1172f97e0a07SJulian Elischer 	}
1173f97e0a07SJulian Elischer 	if (TAILQ_EMPTY(&head->so_comp)) {
11744cc20ab1SSeigo Tanimura 		if (head->so_state & SS_CANTRCVMORE)
1175f97e0a07SJulian Elischer 			return ECONNABORTED;
1176f97e0a07SJulian Elischer 		return EWOULDBLOCK;
1177f97e0a07SJulian Elischer 	}
1178f97e0a07SJulian Elischer 	return 0;
1179f97e0a07SJulian Elischer }
1180f97e0a07SJulian Elischer 
1181f97e0a07SJulian Elischer /*
1182f97e0a07SJulian Elischer  * Handle the first completed incoming connection, assumed to be already
1183f97e0a07SJulian Elischer  * on the socket's so_comp queue.
1184f97e0a07SJulian Elischer  */
1185f97e0a07SJulian Elischer static void
1186f97e0a07SJulian Elischer ng_ksocket_finish_accept(priv_p priv)
1187f97e0a07SJulian Elischer {
1188f97e0a07SJulian Elischer 	struct socket *const head = priv->so;
1189f97e0a07SJulian Elischer 	struct socket *so;
1190f97e0a07SJulian Elischer 	struct sockaddr *sa = NULL;
1191f97e0a07SJulian Elischer 	struct ng_mesg *resp;
1192f97e0a07SJulian Elischer 	struct ng_ksocket_accept *resp_data;
1193f97e0a07SJulian Elischer 	node_p node;
1194f97e0a07SJulian Elischer 	priv_p priv2;
1195f97e0a07SJulian Elischer 	int len;
1196f97e0a07SJulian Elischer 	int error;
1197f97e0a07SJulian Elischer 
1198f97e0a07SJulian Elischer 	so = TAILQ_FIRST(&head->so_comp);
1199f97e0a07SJulian Elischer 	if (so == NULL)		/* Should never happen */
1200f97e0a07SJulian Elischer 		return;
1201f97e0a07SJulian Elischer 	TAILQ_REMOVE(&head->so_comp, so, so_list);
1202f97e0a07SJulian Elischer 	head->so_qlen--;
1203f97e0a07SJulian Elischer 
1204f97e0a07SJulian Elischer 	/* XXX KNOTE(&head->so_rcv.sb_sel.si_note, 0); */
1205f97e0a07SJulian Elischer 
1206f97e0a07SJulian Elischer 	so->so_state &= ~SS_COMP;
1207f97e0a07SJulian Elischer 	so->so_state |= SS_NBIO;
1208f97e0a07SJulian Elischer 	so->so_head = NULL;
1209f97e0a07SJulian Elischer 
1210f97e0a07SJulian Elischer 	soaccept(so, &sa);
1211f97e0a07SJulian Elischer 
1212f97e0a07SJulian Elischer 	len = OFFSETOF(struct ng_ksocket_accept, addr);
1213f97e0a07SJulian Elischer 	if (sa != NULL)
1214f97e0a07SJulian Elischer 		len += sa->sa_len;
1215f97e0a07SJulian Elischer 
1216f97e0a07SJulian Elischer 	NG_MKMESSAGE(resp, NGM_KSOCKET_COOKIE, NGM_KSOCKET_ACCEPT, len,
1217f97e0a07SJulian Elischer 	    M_NOWAIT);
1218f97e0a07SJulian Elischer 	if (resp == NULL) {
1219f97e0a07SJulian Elischer 		soclose(so);
1220f97e0a07SJulian Elischer 		goto out;
1221f97e0a07SJulian Elischer 	}
1222f97e0a07SJulian Elischer 	resp->header.flags |= NGF_RESP;
1223f97e0a07SJulian Elischer 	resp->header.token = priv->response_token;
1224f97e0a07SJulian Elischer 
1225f97e0a07SJulian Elischer 	/* Clone a ksocket node to wrap the new socket */
1226f97e0a07SJulian Elischer         error = ng_make_node_common(&ng_ksocket_typestruct, &node);
1227f97e0a07SJulian Elischer         if (error) {
1228f97e0a07SJulian Elischer 		FREE(resp, M_NETGRAPH);
1229f97e0a07SJulian Elischer 		soclose(so);
1230f97e0a07SJulian Elischer 		goto out;
1231f97e0a07SJulian Elischer 	}
1232f97e0a07SJulian Elischer 
1233f97e0a07SJulian Elischer 	if (ng_ksocket_constructor(node) != 0) {
1234f97e0a07SJulian Elischer 		NG_NODE_UNREF(node);
1235f97e0a07SJulian Elischer 		FREE(resp, M_NETGRAPH);
1236f97e0a07SJulian Elischer 		soclose(so);
1237f97e0a07SJulian Elischer 		goto out;
1238f97e0a07SJulian Elischer 	}
1239f97e0a07SJulian Elischer 
1240f97e0a07SJulian Elischer 	priv2 = NG_NODE_PRIVATE(node);
1241f97e0a07SJulian Elischer 	priv2->so = so;
1242f97e0a07SJulian Elischer 	priv2->flags |= KSF_CLONED | KSF_EMBRYONIC;
1243f97e0a07SJulian Elischer 
1244f97e0a07SJulian Elischer 	/*
1245f97e0a07SJulian Elischer 	 * Insert the cloned node into a list of embryonic children
1246f97e0a07SJulian Elischer 	 * on the parent node.  When a hook is created on the cloned
1247f97e0a07SJulian Elischer 	 * node it will be removed from this list.  When the parent
1248f97e0a07SJulian Elischer 	 * is destroyed it will destroy any embryonic children it has.
1249f97e0a07SJulian Elischer 	 */
1250f97e0a07SJulian Elischer 	LIST_INSERT_HEAD(&priv->embryos, priv2, siblings);
1251f97e0a07SJulian Elischer 
1252f97e0a07SJulian Elischer 	so->so_upcallarg = (caddr_t)node;
1253f97e0a07SJulian Elischer 	so->so_upcall = ng_ksocket_incoming;
1254f97e0a07SJulian Elischer 	so->so_rcv.sb_flags |= SB_UPCALL;
1255f97e0a07SJulian Elischer 	so->so_snd.sb_flags |= SB_UPCALL;
1256f97e0a07SJulian Elischer 
1257f97e0a07SJulian Elischer 	/* Fill in the response data and send it or return it to the caller */
1258f97e0a07SJulian Elischer 	resp_data = (struct ng_ksocket_accept *)resp->data;
1259f97e0a07SJulian Elischer 	resp_data->nodeid = NG_NODE_ID(node);
1260f97e0a07SJulian Elischer 	if (sa != NULL)
1261f97e0a07SJulian Elischer 		bcopy(sa, &resp_data->addr, sa->sa_len);
1262facfd889SArchie Cobbs 	NG_SEND_MSG_ID(error, node, resp, priv->response_addr, 0);
1263f97e0a07SJulian Elischer 
1264f97e0a07SJulian Elischer out:
1265f97e0a07SJulian Elischer 	if (sa != NULL)
1266f97e0a07SJulian Elischer 		FREE(sa, M_SONAME);
1267f97e0a07SJulian Elischer }
1268f97e0a07SJulian Elischer 
1269f97e0a07SJulian Elischer /*
1270cb3c7a5dSArchie Cobbs  * Parse out either an integer value or an alias.
1271cb3c7a5dSArchie Cobbs  */
1272cb3c7a5dSArchie Cobbs static int
1273cb3c7a5dSArchie Cobbs ng_ksocket_parse(const struct ng_ksocket_alias *aliases,
1274cb3c7a5dSArchie Cobbs 	const char *s, int family)
1275cb3c7a5dSArchie Cobbs {
1276cb3c7a5dSArchie Cobbs 	int k, val;
127725792ef3SArchie Cobbs 	char *eptr;
1278cb3c7a5dSArchie Cobbs 
1279cb3c7a5dSArchie Cobbs 	/* Try aliases */
1280cb3c7a5dSArchie Cobbs 	for (k = 0; aliases[k].name != NULL; k++) {
1281cb3c7a5dSArchie Cobbs 		if (strcmp(s, aliases[k].name) == 0
1282cb3c7a5dSArchie Cobbs 		    && aliases[k].family == family)
1283cb3c7a5dSArchie Cobbs 			return aliases[k].value;
1284cb3c7a5dSArchie Cobbs 	}
1285cb3c7a5dSArchie Cobbs 
1286cb3c7a5dSArchie Cobbs 	/* Try parsing as a number */
1287cb3c7a5dSArchie Cobbs 	val = (int)strtoul(s, &eptr, 10);
1288f8307e12SArchie Cobbs 	if (val < 0 || *eptr != '\0')
1289cb3c7a5dSArchie Cobbs 		return (-1);
1290cb3c7a5dSArchie Cobbs 	return (val);
1291cb3c7a5dSArchie Cobbs }
1292cb3c7a5dSArchie Cobbs 
1293