123443Smckusick /* 247647Skarels * Copyright (c) 1982, 1986, 1989, 1991 Regents of the University of California. 333288Sbostic * All rights reserved. 423443Smckusick * 544453Sbostic * %sccs.include.redist.c% 633288Sbostic * 7*55665Smckusick * @(#)uipc_usrreq.c 7.37 (Berkeley) 07/24/92 823443Smckusick */ 98925Sroot 1017105Sbloom #include "param.h" 1152953Storek #include "systm.h" 1245914Smckusick #include "proc.h" 1345914Smckusick #include "filedesc.h" 1417105Sbloom #include "domain.h" 1517105Sbloom #include "protosw.h" 1617105Sbloom #include "socket.h" 1717105Sbloom #include "socketvar.h" 1817105Sbloom #include "unpcb.h" 1917105Sbloom #include "un.h" 2048022Smckusick #include "namei.h" 2137616Smckusick #include "vnode.h" 2217105Sbloom #include "file.h" 2317105Sbloom #include "stat.h" 2441381Smckusick #include "mbuf.h" 258925Sroot 268925Sroot /* 278925Sroot * Unix communications domain. 2812760Ssam * 2912760Ssam * TODO: 3012760Ssam * SEQPACKET, RDM 3113119Ssam * rethink name space problems 3212760Ssam * need a proper out-of-band 338925Sroot */ 3437617Smckusick struct sockaddr sun_noname = { sizeof(sun_noname), AF_UNIX }; 3540800Ssklower ino_t unp_ino; /* prototype for fake inode numbers */ 368925Sroot 378925Sroot /*ARGSUSED*/ 3840800Ssklower uipc_usrreq(so, req, m, nam, control) 398925Sroot struct socket *so; 408925Sroot int req; 4140800Ssklower struct mbuf *m, *nam, *control; 428925Sroot { 438925Sroot struct unpcb *unp = sotounpcb(so); 448925Sroot register struct socket *so2; 4540937Skarels register int error = 0; 4648022Smckusick struct proc *p = curproc; /* XXX */ 478925Sroot 4825555Skarels if (req == PRU_CONTROL) 4925555Skarels return (EOPNOTSUPP); 5040800Ssklower if (req != PRU_SEND && control && control->m_len) { 5112760Ssam error = EOPNOTSUPP; 5212760Ssam goto release; 5312760Ssam } 5412760Ssam if (unp == 0 && req != PRU_ATTACH) { 5512760Ssam error = EINVAL; 5612760Ssam goto release; 5712760Ssam } 588925Sroot switch (req) { 598925Sroot 608925Sroot case PRU_ATTACH: 618925Sroot if (unp) { 629169Ssam error = EISCONN; 638925Sroot break; 648925Sroot } 659028Sroot error = unp_attach(so); 668925Sroot break; 678925Sroot 688925Sroot case PRU_DETACH: 698925Sroot unp_detach(unp); 708925Sroot break; 718925Sroot 729169Ssam case PRU_BIND: 7348022Smckusick error = unp_bind(unp, nam, p); 749169Ssam break; 759169Ssam 769169Ssam case PRU_LISTEN: 7737616Smckusick if (unp->unp_vnode == 0) 789169Ssam error = EINVAL; 799169Ssam break; 809169Ssam 818925Sroot case PRU_CONNECT: 8248022Smckusick error = unp_connect(so, nam, p); 838925Sroot break; 848925Sroot 8512760Ssam case PRU_CONNECT2: 8626281Skarels error = unp_connect2(so, (struct socket *)nam); 8712760Ssam break; 8812760Ssam 898925Sroot case PRU_DISCONNECT: 908925Sroot unp_disconnect(unp); 918925Sroot break; 928925Sroot 939169Ssam case PRU_ACCEPT: 9425899Skarels /* 9525899Skarels * Pass back name of connected socket, 9625899Skarels * if it was bound and we are still connected 9725899Skarels * (our peer may have closed already!). 9825899Skarels */ 9925899Skarels if (unp->unp_conn && unp->unp_conn->unp_addr) { 10025632Skarels nam->m_len = unp->unp_conn->unp_addr->m_len; 10125632Skarels bcopy(mtod(unp->unp_conn->unp_addr, caddr_t), 10225632Skarels mtod(nam, caddr_t), (unsigned)nam->m_len); 10325632Skarels } else { 10425632Skarels nam->m_len = sizeof(sun_noname); 10525632Skarels *(mtod(nam, struct sockaddr *)) = sun_noname; 10625632Skarels } 1078925Sroot break; 1088925Sroot 1098925Sroot case PRU_SHUTDOWN: 1108925Sroot socantsendmore(so); 11145004Skarels unp_shutdown(unp); 1128925Sroot break; 1138925Sroot 1148925Sroot case PRU_RCVD: 1158925Sroot switch (so->so_type) { 1168925Sroot 1178925Sroot case SOCK_DGRAM: 1188925Sroot panic("uipc 1"); 11910139Ssam /*NOTREACHED*/ 1208925Sroot 12110139Ssam case SOCK_STREAM: 1228925Sroot #define rcv (&so->so_rcv) 1238925Sroot #define snd (&so2->so_snd) 1248925Sroot if (unp->unp_conn == 0) 1258925Sroot break; 1268925Sroot so2 = unp->unp_conn->unp_socket; 1278925Sroot /* 12825632Skarels * Adjust backpressure on sender 1298925Sroot * and wakeup any waiting to write. 1308925Sroot */ 13125632Skarels snd->sb_mbmax += unp->unp_mbcnt - rcv->sb_mbcnt; 13225632Skarels unp->unp_mbcnt = rcv->sb_mbcnt; 13325632Skarels snd->sb_hiwat += unp->unp_cc - rcv->sb_cc; 13425632Skarels unp->unp_cc = rcv->sb_cc; 13517543Skarels sowwakeup(so2); 1368925Sroot #undef snd 1378925Sroot #undef rcv 1388925Sroot break; 1398925Sroot 1408925Sroot default: 1418925Sroot panic("uipc 2"); 1428925Sroot } 1438925Sroot break; 1448925Sroot 1458925Sroot case PRU_SEND: 14648022Smckusick if (control && (error = unp_internalize(control, p))) 14740937Skarels break; 1488925Sroot switch (so->so_type) { 1498925Sroot 15025632Skarels case SOCK_DGRAM: { 15125632Skarels struct sockaddr *from; 15225632Skarels 1539028Sroot if (nam) { 1548925Sroot if (unp->unp_conn) { 1558925Sroot error = EISCONN; 1568925Sroot break; 1578925Sroot } 15848022Smckusick error = unp_connect(so, nam, p); 1598925Sroot if (error) 1608925Sroot break; 1618925Sroot } else { 1628925Sroot if (unp->unp_conn == 0) { 1638925Sroot error = ENOTCONN; 1648925Sroot break; 1658925Sroot } 1668925Sroot } 1678925Sroot so2 = unp->unp_conn->unp_socket; 16825632Skarels if (unp->unp_addr) 16925632Skarels from = mtod(unp->unp_addr, struct sockaddr *); 17025632Skarels else 17125632Skarels from = &sun_noname; 17240937Skarels if (sbappendaddr(&so2->so_rcv, from, m, control)) { 17325632Skarels sorwakeup(so2); 17425632Skarels m = 0; 17540937Skarels control = 0; 17625632Skarels } else 17725632Skarels error = ENOBUFS; 1789028Sroot if (nam) 1799169Ssam unp_disconnect(unp); 1808925Sroot break; 18125632Skarels } 1828925Sroot 1838925Sroot case SOCK_STREAM: 1848925Sroot #define rcv (&so2->so_rcv) 1858925Sroot #define snd (&so->so_snd) 18623524Skarels if (so->so_state & SS_CANTSENDMORE) { 18723524Skarels error = EPIPE; 18823524Skarels break; 18923524Skarels } 1908925Sroot if (unp->unp_conn == 0) 1918925Sroot panic("uipc 3"); 1928925Sroot so2 = unp->unp_conn->unp_socket; 1938925Sroot /* 19425632Skarels * Send to paired receive port, and then reduce 19525632Skarels * send buffer hiwater marks to maintain backpressure. 1968925Sroot * Wake up readers. 1978925Sroot */ 19840937Skarels if (control) { 19945004Skarels if (sbappendcontrol(rcv, m, control)) 20045004Skarels control = 0; 20140937Skarels } else 20225632Skarels sbappend(rcv, m); 20325632Skarels snd->sb_mbmax -= 20425632Skarels rcv->sb_mbcnt - unp->unp_conn->unp_mbcnt; 20525632Skarels unp->unp_conn->unp_mbcnt = rcv->sb_mbcnt; 20625632Skarels snd->sb_hiwat -= rcv->sb_cc - unp->unp_conn->unp_cc; 20725632Skarels unp->unp_conn->unp_cc = rcv->sb_cc; 20817543Skarels sorwakeup(so2); 20917543Skarels m = 0; 2108925Sroot #undef snd 2118925Sroot #undef rcv 2128925Sroot break; 2138925Sroot 2148925Sroot default: 2158925Sroot panic("uipc 4"); 2168925Sroot } 2178925Sroot break; 2188925Sroot 2198925Sroot case PRU_ABORT: 2208925Sroot unp_drop(unp, ECONNABORTED); 2218925Sroot break; 2228925Sroot 2238925Sroot case PRU_SENSE: 22416973Skarels ((struct stat *) m)->st_blksize = so->so_snd.sb_hiwat; 22516973Skarels if (so->so_type == SOCK_STREAM && unp->unp_conn != 0) { 22616973Skarels so2 = unp->unp_conn->unp_socket; 22716973Skarels ((struct stat *) m)->st_blksize += so2->so_rcv.sb_cc; 22816973Skarels } 22921110Skarels ((struct stat *) m)->st_dev = NODEV; 23040800Ssklower if (unp->unp_ino == 0) 23140800Ssklower unp->unp_ino = unp_ino++; 23240800Ssklower ((struct stat *) m)->st_ino = unp->unp_ino; 23316973Skarels return (0); 2348925Sroot 2358925Sroot case PRU_RCVOOB: 23616774Sbloom return (EOPNOTSUPP); 2378925Sroot 2388925Sroot case PRU_SENDOOB: 23917543Skarels error = EOPNOTSUPP; 2408925Sroot break; 2418925Sroot 2428925Sroot case PRU_SOCKADDR: 24337617Smckusick if (unp->unp_addr) { 24437617Smckusick nam->m_len = unp->unp_addr->m_len; 24537617Smckusick bcopy(mtod(unp->unp_addr, caddr_t), 24637617Smckusick mtod(nam, caddr_t), (unsigned)nam->m_len); 24737617Smckusick } else 24837617Smckusick nam->m_len = 0; 2498925Sroot break; 2508925Sroot 25114121Ssam case PRU_PEERADDR: 25228292Skarels if (unp->unp_conn && unp->unp_conn->unp_addr) { 25328292Skarels nam->m_len = unp->unp_conn->unp_addr->m_len; 25428292Skarels bcopy(mtod(unp->unp_conn->unp_addr, caddr_t), 25533287Sbostic mtod(nam, caddr_t), (unsigned)nam->m_len); 25637617Smckusick } else 25737617Smckusick nam->m_len = 0; 25814121Ssam break; 25914121Ssam 2608925Sroot case PRU_SLOWTIMO: 2618925Sroot break; 2628925Sroot 2638925Sroot default: 2648925Sroot panic("piusrreq"); 2658925Sroot } 26612760Ssam release: 26740937Skarels if (control) 26840937Skarels m_freem(control); 26912760Ssam if (m) 27012760Ssam m_freem(m); 27111709Ssam return (error); 2728925Sroot } 2738925Sroot 27416973Skarels /* 27525632Skarels * Both send and receive buffers are allocated PIPSIZ bytes of buffering 27625632Skarels * for stream sockets, although the total for sender and receiver is 27725632Skarels * actually only PIPSIZ. 27816973Skarels * Datagram sockets really use the sendspace as the maximum datagram size, 27916973Skarels * and don't really want to reserve the sendspace. Their recvspace should 28016973Skarels * be large enough for at least one max-size datagram plus address. 28116973Skarels */ 28216973Skarels #define PIPSIZ 4096 28337617Smckusick u_long unpst_sendspace = PIPSIZ; 28437617Smckusick u_long unpst_recvspace = PIPSIZ; 28537617Smckusick u_long unpdg_sendspace = 2*1024; /* really max datagram size */ 28637617Smckusick u_long unpdg_recvspace = 4*1024; 2878925Sroot 28825632Skarels int unp_rights; /* file descriptors in flight */ 28925632Skarels 2909169Ssam unp_attach(so) 2918925Sroot struct socket *so; 2928925Sroot { 2939169Ssam register struct mbuf *m; 2948925Sroot register struct unpcb *unp; 2958925Sroot int error; 2968925Sroot 29737617Smckusick if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) { 29837617Smckusick switch (so->so_type) { 29916973Skarels 30037617Smckusick case SOCK_STREAM: 30137617Smckusick error = soreserve(so, unpst_sendspace, unpst_recvspace); 30237617Smckusick break; 30316973Skarels 30437617Smckusick case SOCK_DGRAM: 30537617Smckusick error = soreserve(so, unpdg_sendspace, unpdg_recvspace); 30637617Smckusick break; 30752921Smckusick 30852921Smckusick default: 30952921Smckusick panic("unp_attach"); 31037617Smckusick } 31137617Smckusick if (error) 31237617Smckusick return (error); 31316973Skarels } 3149637Ssam m = m_getclr(M_DONTWAIT, MT_PCB); 31510139Ssam if (m == NULL) 31610139Ssam return (ENOBUFS); 3178925Sroot unp = mtod(m, struct unpcb *); 3188925Sroot so->so_pcb = (caddr_t)unp; 3198925Sroot unp->unp_socket = so; 3208925Sroot return (0); 3218925Sroot } 3228925Sroot 3238925Sroot unp_detach(unp) 3249169Ssam register struct unpcb *unp; 3258925Sroot { 3268925Sroot 32737616Smckusick if (unp->unp_vnode) { 32837616Smckusick unp->unp_vnode->v_socket = 0; 32937616Smckusick vrele(unp->unp_vnode); 33037616Smckusick unp->unp_vnode = 0; 3318925Sroot } 3328925Sroot if (unp->unp_conn) 3338925Sroot unp_disconnect(unp); 3348925Sroot while (unp->unp_refs) 3358925Sroot unp_drop(unp->unp_refs, ECONNRESET); 3368925Sroot soisdisconnected(unp->unp_socket); 3378925Sroot unp->unp_socket->so_pcb = 0; 33825632Skarels m_freem(unp->unp_addr); 3399169Ssam (void) m_free(dtom(unp)); 34025632Skarels if (unp_rights) 34125632Skarels unp_gc(); 3428925Sroot } 3438925Sroot 34448022Smckusick unp_bind(unp, nam, p) 3458925Sroot struct unpcb *unp; 3469169Ssam struct mbuf *nam; 34748022Smckusick struct proc *p; 3488925Sroot { 3499169Ssam struct sockaddr_un *soun = mtod(nam, struct sockaddr_un *); 35037616Smckusick register struct vnode *vp; 35137616Smckusick struct vattr vattr; 3528925Sroot int error; 35347540Skarels struct nameidata nd; 3548925Sroot 35552309Smckusick NDINIT(&nd, CREATE, FOLLOW | LOCKPARENT, UIO_SYSSPACE, 35652309Smckusick soun->sun_path, p); 35737617Smckusick if (unp->unp_vnode != NULL) 35812760Ssam return (EINVAL); 35937617Smckusick if (nam->m_len == MLEN) { 36037617Smckusick if (*(mtod(nam, caddr_t) + nam->m_len - 1) != 0) 36137617Smckusick return (EINVAL); 36237617Smckusick } else 36337617Smckusick *(mtod(nam, caddr_t) + nam->m_len) = 0; 36412760Ssam /* SHOULD BE ABLE TO ADOPT EXISTING AND wakeup() ALA FIFO's */ 36552309Smckusick if (error = namei(&nd)) 36637616Smckusick return (error); 36752309Smckusick vp = nd.ni_vp; 36837616Smckusick if (vp != NULL) { 36952309Smckusick VOP_ABORTOP(nd.ni_dvp, &nd.ni_cnd); 37052309Smckusick if (nd.ni_dvp == vp) 37152309Smckusick vrele(nd.ni_dvp); 37243342Smckusick else 37352309Smckusick vput(nd.ni_dvp); 37442465Smckusick vrele(vp); 37510139Ssam return (EADDRINUSE); 3768925Sroot } 37741362Smckusick VATTR_NULL(&vattr); 37837616Smckusick vattr.va_type = VSOCK; 37937616Smckusick vattr.va_mode = 0777; 38052309Smckusick LEASE_CHECK(nd.ni_dvp, p, p->p_ucred, LEASE_WRITE); 38152309Smckusick if (error = VOP_CREATE(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr)) 38211828Ssam return (error); 38352309Smckusick vp = nd.ni_vp; 38437616Smckusick vp->v_socket = unp->unp_socket; 38537616Smckusick unp->unp_vnode = vp; 38625632Skarels unp->unp_addr = m_copy(nam, 0, (int)M_COPYALL); 38737728Smckusick VOP_UNLOCK(vp); 3888925Sroot return (0); 3898925Sroot } 3908925Sroot 39148022Smckusick unp_connect(so, nam, p) 3928925Sroot struct socket *so; 3939169Ssam struct mbuf *nam; 39448022Smckusick struct proc *p; 3958925Sroot { 3969169Ssam register struct sockaddr_un *soun = mtod(nam, struct sockaddr_un *); 39737616Smckusick register struct vnode *vp; 39837617Smckusick register struct socket *so2, *so3; 39937617Smckusick struct unpcb *unp2, *unp3; 40037616Smckusick int error; 40147540Skarels struct nameidata nd; 4028925Sroot 40352309Smckusick NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_SYSSPACE, soun->sun_path, p); 40437617Smckusick if (nam->m_data + nam->m_len == &nam->m_dat[MLEN]) { /* XXX */ 40537617Smckusick if (*(mtod(nam, caddr_t) + nam->m_len - 1) != 0) 40637617Smckusick return (EMSGSIZE); 40737617Smckusick } else 40837617Smckusick *(mtod(nam, caddr_t) + nam->m_len) = 0; 40952309Smckusick if (error = namei(&nd)) 41037616Smckusick return (error); 41152309Smckusick vp = nd.ni_vp; 41237616Smckusick if (vp->v_type != VSOCK) { 4138925Sroot error = ENOTSOCK; 4148925Sroot goto bad; 4158925Sroot } 41648022Smckusick if (error = VOP_ACCESS(vp, VWRITE, p->p_ucred, p)) 41738396Smckusick goto bad; 41837616Smckusick so2 = vp->v_socket; 4198925Sroot if (so2 == 0) { 4208925Sroot error = ECONNREFUSED; 4218925Sroot goto bad; 4228925Sroot } 42313115Ssam if (so->so_type != so2->so_type) { 42413115Ssam error = EPROTOTYPE; 42513115Ssam goto bad; 42613115Ssam } 42737617Smckusick if (so->so_proto->pr_flags & PR_CONNREQUIRED) { 42837617Smckusick if ((so2->so_options & SO_ACCEPTCONN) == 0 || 42940800Ssklower (so3 = sonewconn(so2, 0)) == 0) { 43037617Smckusick error = ECONNREFUSED; 43137617Smckusick goto bad; 43237617Smckusick } 43337617Smckusick unp2 = sotounpcb(so2); 43437617Smckusick unp3 = sotounpcb(so3); 43537617Smckusick if (unp2->unp_addr) 43637617Smckusick unp3->unp_addr = 43737617Smckusick m_copy(unp2->unp_addr, 0, (int)M_COPYALL); 43837617Smckusick so2 = so3; 43913115Ssam } 44026281Skarels error = unp_connect2(so, so2); 44112760Ssam bad: 44237728Smckusick vput(vp); 44312760Ssam return (error); 44412760Ssam } 44512760Ssam 44626281Skarels unp_connect2(so, so2) 44712760Ssam register struct socket *so; 44812760Ssam register struct socket *so2; 44912760Ssam { 45012760Ssam register struct unpcb *unp = sotounpcb(so); 45112760Ssam register struct unpcb *unp2; 45212760Ssam 45312760Ssam if (so2->so_type != so->so_type) 45412760Ssam return (EPROTOTYPE); 45514049Ssam unp2 = sotounpcb(so2); 45614049Ssam unp->unp_conn = unp2; 4578925Sroot switch (so->so_type) { 4588925Sroot 4598925Sroot case SOCK_DGRAM: 4608925Sroot unp->unp_nextref = unp2->unp_refs; 4618925Sroot unp2->unp_refs = unp; 46217543Skarels soisconnected(so); 4638925Sroot break; 4648925Sroot 4658925Sroot case SOCK_STREAM: 4669169Ssam unp2->unp_conn = unp; 46740800Ssklower soisconnected(so); 46814049Ssam soisconnected(so2); 4698925Sroot break; 4708925Sroot 4718925Sroot default: 47212760Ssam panic("unp_connect2"); 4738925Sroot } 4748925Sroot return (0); 4758925Sroot } 4769169Ssam 4779169Ssam unp_disconnect(unp) 4789169Ssam struct unpcb *unp; 4799169Ssam { 4809169Ssam register struct unpcb *unp2 = unp->unp_conn; 4819169Ssam 4829169Ssam if (unp2 == 0) 4839169Ssam return; 4849169Ssam unp->unp_conn = 0; 4859169Ssam switch (unp->unp_socket->so_type) { 4869169Ssam 4879169Ssam case SOCK_DGRAM: 4889169Ssam if (unp2->unp_refs == unp) 4899169Ssam unp2->unp_refs = unp->unp_nextref; 4909169Ssam else { 4919169Ssam unp2 = unp2->unp_refs; 4929169Ssam for (;;) { 4939169Ssam if (unp2 == 0) 4949169Ssam panic("unp_disconnect"); 4959169Ssam if (unp2->unp_nextref == unp) 4969169Ssam break; 4979169Ssam unp2 = unp2->unp_nextref; 4989169Ssam } 4999169Ssam unp2->unp_nextref = unp->unp_nextref; 5009169Ssam } 5019169Ssam unp->unp_nextref = 0; 50221768Skarels unp->unp_socket->so_state &= ~SS_ISCONNECTED; 5039169Ssam break; 5049169Ssam 5059169Ssam case SOCK_STREAM: 50614049Ssam soisdisconnected(unp->unp_socket); 5079169Ssam unp2->unp_conn = 0; 5089169Ssam soisdisconnected(unp2->unp_socket); 5099169Ssam break; 5109169Ssam } 5119169Ssam } 5129169Ssam 51312760Ssam #ifdef notdef 5149169Ssam unp_abort(unp) 5159169Ssam struct unpcb *unp; 5169169Ssam { 5179169Ssam 5189169Ssam unp_detach(unp); 5199169Ssam } 52012760Ssam #endif 5219169Ssam 52245004Skarels unp_shutdown(unp) 5239169Ssam struct unpcb *unp; 5249169Ssam { 52545004Skarels struct socket *so; 5269169Ssam 52745004Skarels if (unp->unp_socket->so_type == SOCK_STREAM && unp->unp_conn && 52845004Skarels (so = unp->unp_conn->unp_socket)) 52945004Skarels socantrcvmore(so); 5309169Ssam } 5319169Ssam 5329169Ssam unp_drop(unp, errno) 5339169Ssam struct unpcb *unp; 5349169Ssam int errno; 5359169Ssam { 53616054Skarels struct socket *so = unp->unp_socket; 5379169Ssam 53816054Skarels so->so_error = errno; 5399169Ssam unp_disconnect(unp); 54016054Skarels if (so->so_head) { 54116054Skarels so->so_pcb = (caddr_t) 0; 54225632Skarels m_freem(unp->unp_addr); 54316054Skarels (void) m_free(dtom(unp)); 54416054Skarels sofree(so); 54516054Skarels } 5469169Ssam } 5479169Ssam 54812760Ssam #ifdef notdef 5499169Ssam unp_drain() 5509169Ssam { 5519169Ssam 5529169Ssam } 55312760Ssam #endif 55412760Ssam 55512760Ssam unp_externalize(rights) 55612760Ssam struct mbuf *rights; 55712760Ssam { 55847540Skarels struct proc *p = curproc; /* XXX */ 55912760Ssam register int i; 56040800Ssklower register struct cmsghdr *cm = mtod(rights, struct cmsghdr *); 56140800Ssklower register struct file **rp = (struct file **)(cm + 1); 56212760Ssam register struct file *fp; 56340800Ssklower int newfds = (cm->cmsg_len - sizeof(*cm)) / sizeof (int); 56412760Ssam int f; 56512760Ssam 56655090Spendry if (!fdavail(p, newfds)) { 56712760Ssam for (i = 0; i < newfds; i++) { 56812760Ssam fp = *rp; 56912760Ssam unp_discard(fp); 57012760Ssam *rp++ = 0; 57112760Ssam } 57212760Ssam return (EMSGSIZE); 57312760Ssam } 57412760Ssam for (i = 0; i < newfds; i++) { 57547540Skarels if (fdalloc(p, 0, &f)) 57612760Ssam panic("unp_externalize"); 57712760Ssam fp = *rp; 57847647Skarels p->p_fd->fd_ofiles[f] = fp; 57912760Ssam fp->f_msgcount--; 58025632Skarels unp_rights--; 58114927Smckusick *(int *)rp++ = f; 58212760Ssam } 58312760Ssam return (0); 58412760Ssam } 58512760Ssam 58648022Smckusick unp_internalize(control, p) 58740937Skarels struct mbuf *control; 58848022Smckusick struct proc *p; 58912760Ssam { 59048022Smckusick struct filedesc *fdp = p->p_fd; 59140937Skarels register struct cmsghdr *cm = mtod(control, struct cmsghdr *); 59212760Ssam register struct file **rp; 59340937Skarels register struct file *fp; 59437728Smckusick register int i, fd; 59540937Skarels int oldfds; 59612760Ssam 59740937Skarels if (cm->cmsg_type != SCM_RIGHTS || cm->cmsg_level != SOL_SOCKET || 59840937Skarels cm->cmsg_len != control->m_len) 59940800Ssklower return (EINVAL); 60040800Ssklower oldfds = (cm->cmsg_len - sizeof (*cm)) / sizeof (int); 60140800Ssklower rp = (struct file **)(cm + 1); 60237728Smckusick for (i = 0; i < oldfds; i++) { 60337728Smckusick fd = *(int *)rp++; 60447647Skarels if ((unsigned)fd >= fdp->fd_nfiles || 60547647Skarels fdp->fd_ofiles[fd] == NULL) 60612760Ssam return (EBADF); 60737728Smckusick } 60840800Ssklower rp = (struct file **)(cm + 1); 60913084Ssam for (i = 0; i < oldfds; i++) { 61047647Skarels fp = fdp->fd_ofiles[*(int *)rp]; 61112760Ssam *rp++ = fp; 61212760Ssam fp->f_count++; 61312760Ssam fp->f_msgcount++; 61425632Skarels unp_rights++; 61512760Ssam } 61612760Ssam return (0); 61712760Ssam } 61812760Ssam 61912760Ssam int unp_defer, unp_gcing; 62012760Ssam int unp_mark(); 62116995Skarels extern struct domain unixdomain; 62212760Ssam 62312760Ssam unp_gc() 62412760Ssam { 62553484Smckusick register struct file *fp, *nextfp; 62612760Ssam register struct socket *so; 627*55665Smckusick struct file **extra_ref, **fpp; 628*55665Smckusick int nunref, i; 62912760Ssam 63012760Ssam if (unp_gcing) 63112760Ssam return; 63212760Ssam unp_gcing = 1; 63312760Ssam restart: 63412760Ssam unp_defer = 0; 63549978Smckusick for (fp = filehead; fp; fp = fp->f_filef) 63612760Ssam fp->f_flag &= ~(FMARK|FDEFER); 63712760Ssam do { 63849978Smckusick for (fp = filehead; fp; fp = fp->f_filef) { 63912760Ssam if (fp->f_count == 0) 64012760Ssam continue; 64112760Ssam if (fp->f_flag & FDEFER) { 64212760Ssam fp->f_flag &= ~FDEFER; 64312760Ssam unp_defer--; 64412760Ssam } else { 64512760Ssam if (fp->f_flag & FMARK) 64612760Ssam continue; 64712760Ssam if (fp->f_count == fp->f_msgcount) 64812760Ssam continue; 64912760Ssam fp->f_flag |= FMARK; 65012760Ssam } 65137617Smckusick if (fp->f_type != DTYPE_SOCKET || 65237617Smckusick (so = (struct socket *)fp->f_data) == 0) 65312760Ssam continue; 65416995Skarels if (so->so_proto->pr_domain != &unixdomain || 65521768Skarels (so->so_proto->pr_flags&PR_RIGHTS) == 0) 65612760Ssam continue; 65745004Skarels #ifdef notdef 65812760Ssam if (so->so_rcv.sb_flags & SB_LOCK) { 65945004Skarels /* 66045004Skarels * This is problematical; it's not clear 66145004Skarels * we need to wait for the sockbuf to be 66245004Skarels * unlocked (on a uniprocessor, at least), 66345004Skarels * and it's also not clear what to do 66445004Skarels * if sbwait returns an error due to receipt 66545004Skarels * of a signal. If sbwait does return 66645004Skarels * an error, we'll go into an infinite 66745004Skarels * loop. Delete all of this for now. 66845004Skarels */ 66945004Skarels (void) sbwait(&so->so_rcv); 67012760Ssam goto restart; 67112760Ssam } 67245004Skarels #endif 67312760Ssam unp_scan(so->so_rcv.sb_mb, unp_mark); 67412760Ssam } 67512760Ssam } while (unp_defer); 676*55665Smckusick /* 677*55665Smckusick * We grab an extra reference to each of the file table entries 678*55665Smckusick * that are not otherwise accessible and then free the rights 679*55665Smckusick * that are stored in messages on them. 680*55665Smckusick * 681*55665Smckusick * The bug in the orginal code is a little tricky, so I'll describe 682*55665Smckusick * what's wrong with it here. 683*55665Smckusick * 684*55665Smckusick * It is incorrect to simply unp_discard each entry for f_msgcount 685*55665Smckusick * times -- consider the case of sockets A and B that contain 686*55665Smckusick * references to each other. On a last close of some other socket, 687*55665Smckusick * we trigger a gc since the number of outstanding rights (unp_rights) 688*55665Smckusick * is non-zero. If during the sweep phase the gc code un_discards, 689*55665Smckusick * we end up doing a (full) closef on the descriptor. A closef on A 690*55665Smckusick * results in the following chain. Closef calls soo_close, which 691*55665Smckusick * calls soclose. Soclose calls first (through the switch 692*55665Smckusick * uipc_usrreq) unp_detach, which re-invokes unp_gc. Unp_gc simply 693*55665Smckusick * returns because the previous instance had set unp_gcing, and 694*55665Smckusick * we return all the way back to soclose, which marks the socket 695*55665Smckusick * with SS_NOFDREF, and then calls sofree. Sofree calls sorflush 696*55665Smckusick * to free up the rights that are queued in messages on the socket A, 697*55665Smckusick * i.e., the reference on B. The sorflush calls via the dom_dispose 698*55665Smckusick * switch unp_dispose, which unp_scans with unp_discard. This second 699*55665Smckusick * instance of unp_discard just calls closef on B. 700*55665Smckusick * 701*55665Smckusick * Well, a similar chain occurs on B, resulting in a sorflush on B, 702*55665Smckusick * which results in another closef on A. Unfortunately, A is already 703*55665Smckusick * being closed, and the descriptor has already been marked with 704*55665Smckusick * SS_NOFDREF, and soclose panics at this point. 705*55665Smckusick * 706*55665Smckusick * Here, we first take an extra reference to each inaccessible 707*55665Smckusick * descriptor. Then, we call sorflush ourself, since we know 708*55665Smckusick * it is a Unix domain socket anyhow. After we destroy all the 709*55665Smckusick * rights carried in messages, we do a last closef to get rid 710*55665Smckusick * of our extra reference. This is the last close, and the 711*55665Smckusick * unp_detach etc will shut down the socket. 712*55665Smckusick * 713*55665Smckusick * 91/09/19, bsy@cs.cmu.edu 714*55665Smckusick */ 715*55665Smckusick extra_ref = malloc(nfiles * sizeof(struct file *), M_FILE, M_WAITOK); 716*55665Smckusick for (nunref = 0, fp = filehead, fpp = extra_ref; fp; fp = nextfp) { 71753484Smckusick nextfp = fp->f_filef; 71812760Ssam if (fp->f_count == 0) 71912760Ssam continue; 720*55665Smckusick if (fp->f_count == fp->f_msgcount && !(fp->f_flag & FMARK)) { 721*55665Smckusick *fpp++ = fp; 722*55665Smckusick nunref++; 723*55665Smckusick fp->f_count++; 724*55665Smckusick } 72512760Ssam } 726*55665Smckusick for (i = nunref, fpp = extra_ref; --i >= 0; ++fpp) 727*55665Smckusick sorflush((struct socket *)(*fpp)->f_data); 728*55665Smckusick for (i = nunref, fpp = extra_ref; --i >= 0; ++fpp) 729*55665Smckusick closef(*fpp); 730*55665Smckusick free((caddr_t)extra_ref, M_FILE); 73112760Ssam unp_gcing = 0; 73212760Ssam } 73312760Ssam 73416995Skarels unp_dispose(m) 73516995Skarels struct mbuf *m; 73616995Skarels { 73716995Skarels int unp_discard(); 73816995Skarels 73917020Skarels if (m) 74017020Skarels unp_scan(m, unp_discard); 74116995Skarels } 74216995Skarels 74316995Skarels unp_scan(m0, op) 74416995Skarels register struct mbuf *m0; 74512760Ssam int (*op)(); 74612760Ssam { 74716995Skarels register struct mbuf *m; 74812760Ssam register struct file **rp; 74940937Skarels register struct cmsghdr *cm; 75012760Ssam register int i; 75117020Skarels int qfds; 75212760Ssam 75316995Skarels while (m0) { 75416995Skarels for (m = m0; m; m = m->m_next) 75540937Skarels if (m->m_type == MT_CONTROL && 75640937Skarels m->m_len >= sizeof(*cm)) { 75740800Ssklower cm = mtod(m, struct cmsghdr *); 75840937Skarels if (cm->cmsg_level != SOL_SOCKET || 75940937Skarels cm->cmsg_type != SCM_RIGHTS) 76040937Skarels continue; 76140800Ssklower qfds = (cm->cmsg_len - sizeof *cm) 76240800Ssklower / sizeof (struct file *); 76340800Ssklower rp = (struct file **)(cm + 1); 76416995Skarels for (i = 0; i < qfds; i++) 76516995Skarels (*op)(*rp++); 76616995Skarels break; /* XXX, but saves time */ 76716995Skarels } 76817020Skarels m0 = m0->m_act; 76912760Ssam } 77012760Ssam } 77112760Ssam 77212760Ssam unp_mark(fp) 77312760Ssam struct file *fp; 77412760Ssam { 77512760Ssam 77612760Ssam if (fp->f_flag & FMARK) 77712760Ssam return; 77812760Ssam unp_defer++; 77912760Ssam fp->f_flag |= (FMARK|FDEFER); 78012760Ssam } 78112760Ssam 78212760Ssam unp_discard(fp) 78312760Ssam struct file *fp; 78412760Ssam { 78512760Ssam 78612760Ssam fp->f_msgcount--; 78725632Skarels unp_rights--; 78852033Skarels (void) closef(fp, (struct proc *)NULL); 78912760Ssam } 790