123443Smckusick /* 2*47647Skarels * Copyright (c) 1982, 1986, 1989, 1991 Regents of the University of California. 333288Sbostic * All rights reserved. 423443Smckusick * 544453Sbostic * %sccs.include.redist.c% 633288Sbostic * 7*47647Skarels * @(#)uipc_usrreq.c 7.24 (Berkeley) 03/24/91 823443Smckusick */ 98925Sroot 1017105Sbloom #include "param.h" 1145914Smckusick #include "proc.h" 1245914Smckusick #include "filedesc.h" 1317105Sbloom #include "domain.h" 1417105Sbloom #include "protosw.h" 1517105Sbloom #include "socket.h" 1617105Sbloom #include "socketvar.h" 1717105Sbloom #include "unpcb.h" 1817105Sbloom #include "un.h" 1937616Smckusick #include "vnode.h" 2017105Sbloom #include "file.h" 2117105Sbloom #include "stat.h" 2241381Smckusick #include "mbuf.h" 238925Sroot 248925Sroot /* 258925Sroot * Unix communications domain. 2612760Ssam * 2712760Ssam * TODO: 2812760Ssam * SEQPACKET, RDM 2913119Ssam * rethink name space problems 3012760Ssam * need a proper out-of-band 318925Sroot */ 3237617Smckusick struct sockaddr sun_noname = { sizeof(sun_noname), AF_UNIX }; 3340800Ssklower ino_t unp_ino; /* prototype for fake inode numbers */ 348925Sroot 358925Sroot /*ARGSUSED*/ 3640800Ssklower uipc_usrreq(so, req, m, nam, control) 378925Sroot struct socket *so; 388925Sroot int req; 3940800Ssklower struct mbuf *m, *nam, *control; 408925Sroot { 418925Sroot struct unpcb *unp = sotounpcb(so); 428925Sroot register struct socket *so2; 4340937Skarels register int error = 0; 448925Sroot 4525555Skarels if (req == PRU_CONTROL) 4625555Skarels return (EOPNOTSUPP); 4740800Ssklower if (req != PRU_SEND && control && control->m_len) { 4812760Ssam error = EOPNOTSUPP; 4912760Ssam goto release; 5012760Ssam } 5112760Ssam if (unp == 0 && req != PRU_ATTACH) { 5212760Ssam error = EINVAL; 5312760Ssam goto release; 5412760Ssam } 558925Sroot switch (req) { 568925Sroot 578925Sroot case PRU_ATTACH: 588925Sroot if (unp) { 599169Ssam error = EISCONN; 608925Sroot break; 618925Sroot } 629028Sroot error = unp_attach(so); 638925Sroot break; 648925Sroot 658925Sroot case PRU_DETACH: 668925Sroot unp_detach(unp); 678925Sroot break; 688925Sroot 699169Ssam case PRU_BIND: 709169Ssam error = unp_bind(unp, nam); 719169Ssam break; 729169Ssam 739169Ssam case PRU_LISTEN: 7437616Smckusick if (unp->unp_vnode == 0) 759169Ssam error = EINVAL; 769169Ssam break; 779169Ssam 788925Sroot case PRU_CONNECT: 799028Sroot error = unp_connect(so, nam); 808925Sroot break; 818925Sroot 8212760Ssam case PRU_CONNECT2: 8326281Skarels error = unp_connect2(so, (struct socket *)nam); 8412760Ssam break; 8512760Ssam 868925Sroot case PRU_DISCONNECT: 878925Sroot unp_disconnect(unp); 888925Sroot break; 898925Sroot 909169Ssam case PRU_ACCEPT: 9125899Skarels /* 9225899Skarels * Pass back name of connected socket, 9325899Skarels * if it was bound and we are still connected 9425899Skarels * (our peer may have closed already!). 9525899Skarels */ 9625899Skarels if (unp->unp_conn && unp->unp_conn->unp_addr) { 9725632Skarels nam->m_len = unp->unp_conn->unp_addr->m_len; 9825632Skarels bcopy(mtod(unp->unp_conn->unp_addr, caddr_t), 9925632Skarels mtod(nam, caddr_t), (unsigned)nam->m_len); 10025632Skarels } else { 10125632Skarels nam->m_len = sizeof(sun_noname); 10225632Skarels *(mtod(nam, struct sockaddr *)) = sun_noname; 10325632Skarels } 1048925Sroot break; 1058925Sroot 1068925Sroot case PRU_SHUTDOWN: 1078925Sroot socantsendmore(so); 10845004Skarels unp_shutdown(unp); 1098925Sroot break; 1108925Sroot 1118925Sroot case PRU_RCVD: 1128925Sroot switch (so->so_type) { 1138925Sroot 1148925Sroot case SOCK_DGRAM: 1158925Sroot panic("uipc 1"); 11610139Ssam /*NOTREACHED*/ 1178925Sroot 11810139Ssam case SOCK_STREAM: 1198925Sroot #define rcv (&so->so_rcv) 1208925Sroot #define snd (&so2->so_snd) 1218925Sroot if (unp->unp_conn == 0) 1228925Sroot break; 1238925Sroot so2 = unp->unp_conn->unp_socket; 1248925Sroot /* 12525632Skarels * Adjust backpressure on sender 1268925Sroot * and wakeup any waiting to write. 1278925Sroot */ 12825632Skarels snd->sb_mbmax += unp->unp_mbcnt - rcv->sb_mbcnt; 12925632Skarels unp->unp_mbcnt = rcv->sb_mbcnt; 13025632Skarels snd->sb_hiwat += unp->unp_cc - rcv->sb_cc; 13125632Skarels unp->unp_cc = rcv->sb_cc; 13217543Skarels sowwakeup(so2); 1338925Sroot #undef snd 1348925Sroot #undef rcv 1358925Sroot break; 1368925Sroot 1378925Sroot default: 1388925Sroot panic("uipc 2"); 1398925Sroot } 1408925Sroot break; 1418925Sroot 1428925Sroot case PRU_SEND: 14340937Skarels if (control && (error = unp_internalize(control))) 14440937Skarels break; 1458925Sroot switch (so->so_type) { 1468925Sroot 14725632Skarels case SOCK_DGRAM: { 14825632Skarels struct sockaddr *from; 14925632Skarels 1509028Sroot if (nam) { 1518925Sroot if (unp->unp_conn) { 1528925Sroot error = EISCONN; 1538925Sroot break; 1548925Sroot } 1559028Sroot error = unp_connect(so, nam); 1568925Sroot if (error) 1578925Sroot break; 1588925Sroot } else { 1598925Sroot if (unp->unp_conn == 0) { 1608925Sroot error = ENOTCONN; 1618925Sroot break; 1628925Sroot } 1638925Sroot } 1648925Sroot so2 = unp->unp_conn->unp_socket; 16525632Skarels if (unp->unp_addr) 16625632Skarels from = mtod(unp->unp_addr, struct sockaddr *); 16725632Skarels else 16825632Skarels from = &sun_noname; 16940937Skarels if (sbappendaddr(&so2->so_rcv, from, m, control)) { 17025632Skarels sorwakeup(so2); 17125632Skarels m = 0; 17240937Skarels control = 0; 17325632Skarels } else 17425632Skarels error = ENOBUFS; 1759028Sroot if (nam) 1769169Ssam unp_disconnect(unp); 1778925Sroot break; 17825632Skarels } 1798925Sroot 1808925Sroot case SOCK_STREAM: 1818925Sroot #define rcv (&so2->so_rcv) 1828925Sroot #define snd (&so->so_snd) 18323524Skarels if (so->so_state & SS_CANTSENDMORE) { 18423524Skarels error = EPIPE; 18523524Skarels break; 18623524Skarels } 1878925Sroot if (unp->unp_conn == 0) 1888925Sroot panic("uipc 3"); 1898925Sroot so2 = unp->unp_conn->unp_socket; 1908925Sroot /* 19125632Skarels * Send to paired receive port, and then reduce 19225632Skarels * send buffer hiwater marks to maintain backpressure. 1938925Sroot * Wake up readers. 1948925Sroot */ 19540937Skarels if (control) { 19645004Skarels if (sbappendcontrol(rcv, m, control)) 19745004Skarels control = 0; 19840937Skarels } else 19925632Skarels sbappend(rcv, m); 20025632Skarels snd->sb_mbmax -= 20125632Skarels rcv->sb_mbcnt - unp->unp_conn->unp_mbcnt; 20225632Skarels unp->unp_conn->unp_mbcnt = rcv->sb_mbcnt; 20325632Skarels snd->sb_hiwat -= rcv->sb_cc - unp->unp_conn->unp_cc; 20425632Skarels unp->unp_conn->unp_cc = rcv->sb_cc; 20517543Skarels sorwakeup(so2); 20617543Skarels m = 0; 2078925Sroot #undef snd 2088925Sroot #undef rcv 2098925Sroot break; 2108925Sroot 2118925Sroot default: 2128925Sroot panic("uipc 4"); 2138925Sroot } 2148925Sroot break; 2158925Sroot 2168925Sroot case PRU_ABORT: 2178925Sroot unp_drop(unp, ECONNABORTED); 2188925Sroot break; 2198925Sroot 2208925Sroot case PRU_SENSE: 22116973Skarels ((struct stat *) m)->st_blksize = so->so_snd.sb_hiwat; 22216973Skarels if (so->so_type == SOCK_STREAM && unp->unp_conn != 0) { 22316973Skarels so2 = unp->unp_conn->unp_socket; 22416973Skarels ((struct stat *) m)->st_blksize += so2->so_rcv.sb_cc; 22516973Skarels } 22621110Skarels ((struct stat *) m)->st_dev = NODEV; 22740800Ssklower if (unp->unp_ino == 0) 22840800Ssklower unp->unp_ino = unp_ino++; 22940800Ssklower ((struct stat *) m)->st_ino = unp->unp_ino; 23016973Skarels return (0); 2318925Sroot 2328925Sroot case PRU_RCVOOB: 23316774Sbloom return (EOPNOTSUPP); 2348925Sroot 2358925Sroot case PRU_SENDOOB: 23617543Skarels error = EOPNOTSUPP; 2378925Sroot break; 2388925Sroot 2398925Sroot case PRU_SOCKADDR: 24037617Smckusick if (unp->unp_addr) { 24137617Smckusick nam->m_len = unp->unp_addr->m_len; 24237617Smckusick bcopy(mtod(unp->unp_addr, caddr_t), 24337617Smckusick mtod(nam, caddr_t), (unsigned)nam->m_len); 24437617Smckusick } else 24537617Smckusick nam->m_len = 0; 2468925Sroot break; 2478925Sroot 24814121Ssam case PRU_PEERADDR: 24928292Skarels if (unp->unp_conn && unp->unp_conn->unp_addr) { 25028292Skarels nam->m_len = unp->unp_conn->unp_addr->m_len; 25128292Skarels bcopy(mtod(unp->unp_conn->unp_addr, caddr_t), 25233287Sbostic mtod(nam, caddr_t), (unsigned)nam->m_len); 25337617Smckusick } else 25437617Smckusick nam->m_len = 0; 25514121Ssam break; 25614121Ssam 2578925Sroot case PRU_SLOWTIMO: 2588925Sroot break; 2598925Sroot 2608925Sroot default: 2618925Sroot panic("piusrreq"); 2628925Sroot } 26312760Ssam release: 26440937Skarels if (control) 26540937Skarels m_freem(control); 26612760Ssam if (m) 26712760Ssam m_freem(m); 26811709Ssam return (error); 2698925Sroot } 2708925Sroot 27116973Skarels /* 27225632Skarels * Both send and receive buffers are allocated PIPSIZ bytes of buffering 27325632Skarels * for stream sockets, although the total for sender and receiver is 27425632Skarels * actually only PIPSIZ. 27516973Skarels * Datagram sockets really use the sendspace as the maximum datagram size, 27616973Skarels * and don't really want to reserve the sendspace. Their recvspace should 27716973Skarels * be large enough for at least one max-size datagram plus address. 27816973Skarels */ 27916973Skarels #define PIPSIZ 4096 28037617Smckusick u_long unpst_sendspace = PIPSIZ; 28137617Smckusick u_long unpst_recvspace = PIPSIZ; 28237617Smckusick u_long unpdg_sendspace = 2*1024; /* really max datagram size */ 28337617Smckusick u_long unpdg_recvspace = 4*1024; 2848925Sroot 28525632Skarels int unp_rights; /* file descriptors in flight */ 28625632Skarels 2879169Ssam unp_attach(so) 2888925Sroot struct socket *so; 2898925Sroot { 2909169Ssam register struct mbuf *m; 2918925Sroot register struct unpcb *unp; 2928925Sroot int error; 2938925Sroot 29437617Smckusick if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) { 29537617Smckusick switch (so->so_type) { 29616973Skarels 29737617Smckusick case SOCK_STREAM: 29837617Smckusick error = soreserve(so, unpst_sendspace, unpst_recvspace); 29937617Smckusick break; 30016973Skarels 30137617Smckusick case SOCK_DGRAM: 30237617Smckusick error = soreserve(so, unpdg_sendspace, unpdg_recvspace); 30337617Smckusick break; 30437617Smckusick } 30537617Smckusick if (error) 30637617Smckusick return (error); 30716973Skarels } 3089637Ssam m = m_getclr(M_DONTWAIT, MT_PCB); 30910139Ssam if (m == NULL) 31010139Ssam return (ENOBUFS); 3118925Sroot unp = mtod(m, struct unpcb *); 3128925Sroot so->so_pcb = (caddr_t)unp; 3138925Sroot unp->unp_socket = so; 3148925Sroot return (0); 3158925Sroot } 3168925Sroot 3178925Sroot unp_detach(unp) 3189169Ssam register struct unpcb *unp; 3198925Sroot { 3208925Sroot 32137616Smckusick if (unp->unp_vnode) { 32237616Smckusick unp->unp_vnode->v_socket = 0; 32337616Smckusick vrele(unp->unp_vnode); 32437616Smckusick unp->unp_vnode = 0; 3258925Sroot } 3268925Sroot if (unp->unp_conn) 3278925Sroot unp_disconnect(unp); 3288925Sroot while (unp->unp_refs) 3298925Sroot unp_drop(unp->unp_refs, ECONNRESET); 3308925Sroot soisdisconnected(unp->unp_socket); 3318925Sroot unp->unp_socket->so_pcb = 0; 33225632Skarels m_freem(unp->unp_addr); 3339169Ssam (void) m_free(dtom(unp)); 33425632Skarels if (unp_rights) 33525632Skarels unp_gc(); 3368925Sroot } 3378925Sroot 3389169Ssam unp_bind(unp, nam) 3398925Sroot struct unpcb *unp; 3409169Ssam struct mbuf *nam; 3418925Sroot { 3429169Ssam struct sockaddr_un *soun = mtod(nam, struct sockaddr_un *); 34337616Smckusick register struct vnode *vp; 34447540Skarels register struct nameidata *ndp; 34537616Smckusick struct vattr vattr; 3468925Sroot int error; 34747540Skarels struct nameidata nd; 3488925Sroot 34947540Skarels ndp = &nd; 35016695Smckusick ndp->ni_dirp = soun->sun_path; 35137617Smckusick if (unp->unp_vnode != NULL) 35212760Ssam return (EINVAL); 35337617Smckusick if (nam->m_len == MLEN) { 35437617Smckusick if (*(mtod(nam, caddr_t) + nam->m_len - 1) != 0) 35537617Smckusick return (EINVAL); 35637617Smckusick } else 35737617Smckusick *(mtod(nam, caddr_t) + nam->m_len) = 0; 35812760Ssam /* SHOULD BE ABLE TO ADOPT EXISTING AND wakeup() ALA FIFO's */ 35937616Smckusick ndp->ni_nameiop = CREATE | FOLLOW | LOCKPARENT; 36016695Smckusick ndp->ni_segflg = UIO_SYSSPACE; 36147540Skarels if (error = namei(ndp, curproc)) /* XXX */ 36237616Smckusick return (error); 36337616Smckusick vp = ndp->ni_vp; 36437616Smckusick if (vp != NULL) { 36537728Smckusick VOP_ABORTOP(ndp); 36643342Smckusick if (ndp->ni_dvp == vp) 36743342Smckusick vrele(ndp->ni_dvp); 36843342Smckusick else 36943342Smckusick vput(ndp->ni_dvp); 37042465Smckusick vrele(vp); 37110139Ssam return (EADDRINUSE); 3728925Sroot } 37341362Smckusick VATTR_NULL(&vattr); 37437616Smckusick vattr.va_type = VSOCK; 37537616Smckusick vattr.va_mode = 0777; 37637728Smckusick if (error = VOP_CREATE(ndp, &vattr)) 37711828Ssam return (error); 37837616Smckusick vp = ndp->ni_vp; 37937616Smckusick vp->v_socket = unp->unp_socket; 38037616Smckusick unp->unp_vnode = vp; 38125632Skarels unp->unp_addr = m_copy(nam, 0, (int)M_COPYALL); 38237728Smckusick VOP_UNLOCK(vp); 3838925Sroot return (0); 3848925Sroot } 3858925Sroot 3869169Ssam unp_connect(so, nam) 3878925Sroot struct socket *so; 3889169Ssam struct mbuf *nam; 3898925Sroot { 3909169Ssam register struct sockaddr_un *soun = mtod(nam, struct sockaddr_un *); 39137616Smckusick register struct vnode *vp; 39237617Smckusick register struct socket *so2, *so3; 39347540Skarels register struct nameidata *ndp; 39437617Smckusick struct unpcb *unp2, *unp3; 39537616Smckusick int error; 39647540Skarels struct nameidata nd; 3978925Sroot 39847540Skarels ndp = &nd; 39916695Smckusick ndp->ni_dirp = soun->sun_path; 40037617Smckusick if (nam->m_data + nam->m_len == &nam->m_dat[MLEN]) { /* XXX */ 40137617Smckusick if (*(mtod(nam, caddr_t) + nam->m_len - 1) != 0) 40237617Smckusick return (EMSGSIZE); 40337617Smckusick } else 40437617Smckusick *(mtod(nam, caddr_t) + nam->m_len) = 0; 40537728Smckusick ndp->ni_nameiop = LOOKUP | FOLLOW | LOCKLEAF; 40616695Smckusick ndp->ni_segflg = UIO_SYSSPACE; 40747540Skarels if (error = namei(ndp, curproc)) /* XXX */ 40837616Smckusick return (error); 40937616Smckusick vp = ndp->ni_vp; 41037616Smckusick if (vp->v_type != VSOCK) { 4118925Sroot error = ENOTSOCK; 4128925Sroot goto bad; 4138925Sroot } 41447540Skarels if (error = VOP_ACCESS(vp, VWRITE, curproc->p_ucred)) 41538396Smckusick goto bad; 41637616Smckusick so2 = vp->v_socket; 4178925Sroot if (so2 == 0) { 4188925Sroot error = ECONNREFUSED; 4198925Sroot goto bad; 4208925Sroot } 42113115Ssam if (so->so_type != so2->so_type) { 42213115Ssam error = EPROTOTYPE; 42313115Ssam goto bad; 42413115Ssam } 42537617Smckusick if (so->so_proto->pr_flags & PR_CONNREQUIRED) { 42637617Smckusick if ((so2->so_options & SO_ACCEPTCONN) == 0 || 42740800Ssklower (so3 = sonewconn(so2, 0)) == 0) { 42837617Smckusick error = ECONNREFUSED; 42937617Smckusick goto bad; 43037617Smckusick } 43137617Smckusick unp2 = sotounpcb(so2); 43237617Smckusick unp3 = sotounpcb(so3); 43337617Smckusick if (unp2->unp_addr) 43437617Smckusick unp3->unp_addr = 43537617Smckusick m_copy(unp2->unp_addr, 0, (int)M_COPYALL); 43637617Smckusick so2 = so3; 43713115Ssam } 43826281Skarels error = unp_connect2(so, so2); 43912760Ssam bad: 44037728Smckusick vput(vp); 44112760Ssam return (error); 44212760Ssam } 44312760Ssam 44426281Skarels unp_connect2(so, so2) 44512760Ssam register struct socket *so; 44612760Ssam register struct socket *so2; 44712760Ssam { 44812760Ssam register struct unpcb *unp = sotounpcb(so); 44912760Ssam register struct unpcb *unp2; 45012760Ssam 45112760Ssam if (so2->so_type != so->so_type) 45212760Ssam return (EPROTOTYPE); 45314049Ssam unp2 = sotounpcb(so2); 45414049Ssam unp->unp_conn = unp2; 4558925Sroot switch (so->so_type) { 4568925Sroot 4578925Sroot case SOCK_DGRAM: 4588925Sroot unp->unp_nextref = unp2->unp_refs; 4598925Sroot unp2->unp_refs = unp; 46017543Skarels soisconnected(so); 4618925Sroot break; 4628925Sroot 4638925Sroot case SOCK_STREAM: 4649169Ssam unp2->unp_conn = unp; 46540800Ssklower soisconnected(so); 46614049Ssam soisconnected(so2); 4678925Sroot break; 4688925Sroot 4698925Sroot default: 47012760Ssam panic("unp_connect2"); 4718925Sroot } 4728925Sroot return (0); 4738925Sroot } 4749169Ssam 4759169Ssam unp_disconnect(unp) 4769169Ssam struct unpcb *unp; 4779169Ssam { 4789169Ssam register struct unpcb *unp2 = unp->unp_conn; 4799169Ssam 4809169Ssam if (unp2 == 0) 4819169Ssam return; 4829169Ssam unp->unp_conn = 0; 4839169Ssam switch (unp->unp_socket->so_type) { 4849169Ssam 4859169Ssam case SOCK_DGRAM: 4869169Ssam if (unp2->unp_refs == unp) 4879169Ssam unp2->unp_refs = unp->unp_nextref; 4889169Ssam else { 4899169Ssam unp2 = unp2->unp_refs; 4909169Ssam for (;;) { 4919169Ssam if (unp2 == 0) 4929169Ssam panic("unp_disconnect"); 4939169Ssam if (unp2->unp_nextref == unp) 4949169Ssam break; 4959169Ssam unp2 = unp2->unp_nextref; 4969169Ssam } 4979169Ssam unp2->unp_nextref = unp->unp_nextref; 4989169Ssam } 4999169Ssam unp->unp_nextref = 0; 50021768Skarels unp->unp_socket->so_state &= ~SS_ISCONNECTED; 5019169Ssam break; 5029169Ssam 5039169Ssam case SOCK_STREAM: 50414049Ssam soisdisconnected(unp->unp_socket); 5059169Ssam unp2->unp_conn = 0; 5069169Ssam soisdisconnected(unp2->unp_socket); 5079169Ssam break; 5089169Ssam } 5099169Ssam } 5109169Ssam 51112760Ssam #ifdef notdef 5129169Ssam unp_abort(unp) 5139169Ssam struct unpcb *unp; 5149169Ssam { 5159169Ssam 5169169Ssam unp_detach(unp); 5179169Ssam } 51812760Ssam #endif 5199169Ssam 52045004Skarels unp_shutdown(unp) 5219169Ssam struct unpcb *unp; 5229169Ssam { 52345004Skarels struct socket *so; 5249169Ssam 52545004Skarels if (unp->unp_socket->so_type == SOCK_STREAM && unp->unp_conn && 52645004Skarels (so = unp->unp_conn->unp_socket)) 52745004Skarels socantrcvmore(so); 5289169Ssam } 5299169Ssam 5309169Ssam unp_drop(unp, errno) 5319169Ssam struct unpcb *unp; 5329169Ssam int errno; 5339169Ssam { 53416054Skarels struct socket *so = unp->unp_socket; 5359169Ssam 53616054Skarels so->so_error = errno; 5379169Ssam unp_disconnect(unp); 53816054Skarels if (so->so_head) { 53916054Skarels so->so_pcb = (caddr_t) 0; 54025632Skarels m_freem(unp->unp_addr); 54116054Skarels (void) m_free(dtom(unp)); 54216054Skarels sofree(so); 54316054Skarels } 5449169Ssam } 5459169Ssam 54612760Ssam #ifdef notdef 5479169Ssam unp_drain() 5489169Ssam { 5499169Ssam 5509169Ssam } 55112760Ssam #endif 55212760Ssam 55312760Ssam unp_externalize(rights) 55412760Ssam struct mbuf *rights; 55512760Ssam { 55647540Skarels struct proc *p = curproc; /* XXX */ 55712760Ssam register int i; 55840800Ssklower register struct cmsghdr *cm = mtod(rights, struct cmsghdr *); 55940800Ssklower register struct file **rp = (struct file **)(cm + 1); 56012760Ssam register struct file *fp; 56140800Ssklower int newfds = (cm->cmsg_len - sizeof(*cm)) / sizeof (int); 56212760Ssam int f; 56312760Ssam 56447540Skarels if (fdavail(p, newfds)) { 56512760Ssam for (i = 0; i < newfds; i++) { 56612760Ssam fp = *rp; 56712760Ssam unp_discard(fp); 56812760Ssam *rp++ = 0; 56912760Ssam } 57012760Ssam return (EMSGSIZE); 57112760Ssam } 57212760Ssam for (i = 0; i < newfds; i++) { 57347540Skarels if (fdalloc(p, 0, &f)) 57412760Ssam panic("unp_externalize"); 57512760Ssam fp = *rp; 576*47647Skarels p->p_fd->fd_ofiles[f] = fp; 57712760Ssam fp->f_msgcount--; 57825632Skarels unp_rights--; 57914927Smckusick *(int *)rp++ = f; 58012760Ssam } 58112760Ssam return (0); 58212760Ssam } 58312760Ssam 58440937Skarels unp_internalize(control) 58540937Skarels struct mbuf *control; 58612760Ssam { 58747540Skarels struct filedesc *fdp = curproc->p_fd; /* XXX */ 58840937Skarels register struct cmsghdr *cm = mtod(control, struct cmsghdr *); 58912760Ssam register struct file **rp; 59040937Skarels register struct file *fp; 59137728Smckusick register int i, fd; 59240937Skarels int oldfds; 59312760Ssam 59440937Skarels if (cm->cmsg_type != SCM_RIGHTS || cm->cmsg_level != SOL_SOCKET || 59540937Skarels cm->cmsg_len != control->m_len) 59640800Ssklower return (EINVAL); 59740800Ssklower oldfds = (cm->cmsg_len - sizeof (*cm)) / sizeof (int); 59840800Ssklower rp = (struct file **)(cm + 1); 59937728Smckusick for (i = 0; i < oldfds; i++) { 60037728Smckusick fd = *(int *)rp++; 601*47647Skarels if ((unsigned)fd >= fdp->fd_nfiles || 602*47647Skarels fdp->fd_ofiles[fd] == NULL) 60312760Ssam return (EBADF); 60437728Smckusick } 60540800Ssklower rp = (struct file **)(cm + 1); 60613084Ssam for (i = 0; i < oldfds; i++) { 607*47647Skarels fp = fdp->fd_ofiles[*(int *)rp]; 60812760Ssam *rp++ = fp; 60912760Ssam fp->f_count++; 61012760Ssam fp->f_msgcount++; 61125632Skarels unp_rights++; 61212760Ssam } 61312760Ssam return (0); 61412760Ssam } 61512760Ssam 61612760Ssam int unp_defer, unp_gcing; 61712760Ssam int unp_mark(); 61816995Skarels extern struct domain unixdomain; 61912760Ssam 62012760Ssam unp_gc() 62112760Ssam { 62212760Ssam register struct file *fp; 62312760Ssam register struct socket *so; 62412760Ssam 62512760Ssam if (unp_gcing) 62612760Ssam return; 62712760Ssam unp_gcing = 1; 62812760Ssam restart: 62912760Ssam unp_defer = 0; 63012760Ssam for (fp = file; fp < fileNFILE; fp++) 63112760Ssam fp->f_flag &= ~(FMARK|FDEFER); 63212760Ssam do { 63312760Ssam for (fp = file; fp < fileNFILE; fp++) { 63412760Ssam if (fp->f_count == 0) 63512760Ssam continue; 63612760Ssam if (fp->f_flag & FDEFER) { 63712760Ssam fp->f_flag &= ~FDEFER; 63812760Ssam unp_defer--; 63912760Ssam } else { 64012760Ssam if (fp->f_flag & FMARK) 64112760Ssam continue; 64212760Ssam if (fp->f_count == fp->f_msgcount) 64312760Ssam continue; 64412760Ssam fp->f_flag |= FMARK; 64512760Ssam } 64637617Smckusick if (fp->f_type != DTYPE_SOCKET || 64737617Smckusick (so = (struct socket *)fp->f_data) == 0) 64812760Ssam continue; 64916995Skarels if (so->so_proto->pr_domain != &unixdomain || 65021768Skarels (so->so_proto->pr_flags&PR_RIGHTS) == 0) 65112760Ssam continue; 65245004Skarels #ifdef notdef 65312760Ssam if (so->so_rcv.sb_flags & SB_LOCK) { 65445004Skarels /* 65545004Skarels * This is problematical; it's not clear 65645004Skarels * we need to wait for the sockbuf to be 65745004Skarels * unlocked (on a uniprocessor, at least), 65845004Skarels * and it's also not clear what to do 65945004Skarels * if sbwait returns an error due to receipt 66045004Skarels * of a signal. If sbwait does return 66145004Skarels * an error, we'll go into an infinite 66245004Skarels * loop. Delete all of this for now. 66345004Skarels */ 66445004Skarels (void) sbwait(&so->so_rcv); 66512760Ssam goto restart; 66612760Ssam } 66745004Skarels #endif 66812760Ssam unp_scan(so->so_rcv.sb_mb, unp_mark); 66912760Ssam } 67012760Ssam } while (unp_defer); 67112760Ssam for (fp = file; fp < fileNFILE; fp++) { 67212760Ssam if (fp->f_count == 0) 67312760Ssam continue; 67425632Skarels if (fp->f_count == fp->f_msgcount && (fp->f_flag & FMARK) == 0) 67525632Skarels while (fp->f_msgcount) 67625632Skarels unp_discard(fp); 67712760Ssam } 67812760Ssam unp_gcing = 0; 67912760Ssam } 68012760Ssam 68116995Skarels unp_dispose(m) 68216995Skarels struct mbuf *m; 68316995Skarels { 68416995Skarels int unp_discard(); 68516995Skarels 68617020Skarels if (m) 68717020Skarels unp_scan(m, unp_discard); 68816995Skarels } 68916995Skarels 69016995Skarels unp_scan(m0, op) 69116995Skarels register struct mbuf *m0; 69212760Ssam int (*op)(); 69312760Ssam { 69416995Skarels register struct mbuf *m; 69512760Ssam register struct file **rp; 69640937Skarels register struct cmsghdr *cm; 69712760Ssam register int i; 69817020Skarels int qfds; 69912760Ssam 70016995Skarels while (m0) { 70116995Skarels for (m = m0; m; m = m->m_next) 70240937Skarels if (m->m_type == MT_CONTROL && 70340937Skarels m->m_len >= sizeof(*cm)) { 70440800Ssklower cm = mtod(m, struct cmsghdr *); 70540937Skarels if (cm->cmsg_level != SOL_SOCKET || 70640937Skarels cm->cmsg_type != SCM_RIGHTS) 70740937Skarels continue; 70840800Ssklower qfds = (cm->cmsg_len - sizeof *cm) 70940800Ssklower / sizeof (struct file *); 71040800Ssklower rp = (struct file **)(cm + 1); 71116995Skarels for (i = 0; i < qfds; i++) 71216995Skarels (*op)(*rp++); 71316995Skarels break; /* XXX, but saves time */ 71416995Skarels } 71517020Skarels m0 = m0->m_act; 71612760Ssam } 71712760Ssam } 71812760Ssam 71912760Ssam unp_mark(fp) 72012760Ssam struct file *fp; 72112760Ssam { 72212760Ssam 72312760Ssam if (fp->f_flag & FMARK) 72412760Ssam return; 72512760Ssam unp_defer++; 72612760Ssam fp->f_flag |= (FMARK|FDEFER); 72712760Ssam } 72812760Ssam 72912760Ssam unp_discard(fp) 73012760Ssam struct file *fp; 73112760Ssam { 73212760Ssam 73312760Ssam fp->f_msgcount--; 73425632Skarels unp_rights--; 73539353Smckusick (void) closef(fp); 73612760Ssam } 737