2008-06-20 19:27:50 +04:00
|
|
|
/* $NetBSD: uipc_usrreq.c,v 1.117 2008/06/20 15:27:50 christos Exp $ */
|
1998-01-08 01:57:09 +03:00
|
|
|
|
|
|
|
/*-
|
2008-03-22 00:54:58 +03:00
|
|
|
* Copyright (c) 1998, 2000, 2004, 2008 The NetBSD Foundation, Inc.
|
1998-01-08 01:57:09 +03:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to The NetBSD Foundation
|
|
|
|
* by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
|
|
|
|
* NASA Ames Research Center.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
1994-06-29 10:29:24 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
1994-05-04 13:50:11 +04:00
|
|
|
* Copyright (c) 1982, 1986, 1989, 1991, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
1993-03-21 12:45:37 +03:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2003-08-07 20:26:28 +04:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* @(#)uipc_usrreq.c 8.9 (Berkeley) 5/14/95
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1997 Christopher G. Demetriou. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
1993-03-21 12:45:37 +03:00
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the University of
|
|
|
|
* California, Berkeley and its contributors.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
1998-03-01 05:20:01 +03:00
|
|
|
* @(#)uipc_usrreq.c 8.9 (Berkeley) 5/14/95
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
|
|
|
|
2001-11-12 18:25:01 +03:00
|
|
|
#include <sys/cdefs.h>
|
2008-06-20 19:27:50 +04:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: uipc_usrreq.c,v 1.117 2008/06/20 15:27:50 christos Exp $");
|
2001-11-12 18:25:01 +03:00
|
|
|
|
1993-12-18 07:21:37 +03:00
|
|
|
#include <sys/param.h>
|
1994-05-04 13:50:11 +04:00
|
|
|
#include <sys/systm.h>
|
1993-12-18 07:21:37 +03:00
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/filedesc.h>
|
|
|
|
#include <sys/domain.h>
|
|
|
|
#include <sys/protosw.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/socketvar.h>
|
|
|
|
#include <sys/unpcb.h>
|
|
|
|
#include <sys/un.h>
|
|
|
|
#include <sys/namei.h>
|
|
|
|
#include <sys/vnode.h>
|
|
|
|
#include <sys/file.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/mbuf.h>
|
2006-05-15 01:15:11 +04:00
|
|
|
#include <sys/kauth.h>
|
2007-10-08 19:12:05 +04:00
|
|
|
#include <sys/kmem.h>
|
2008-03-22 00:54:58 +03:00
|
|
|
#include <sys/atomic.h>
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Unix communications domain.
|
|
|
|
*
|
|
|
|
* TODO:
|
|
|
|
* SEQPACKET, RDM
|
|
|
|
* rethink name space problems
|
|
|
|
* need a proper out-of-band
|
2008-04-24 15:38:36 +04:00
|
|
|
*
|
|
|
|
* Notes on locking:
|
|
|
|
*
|
|
|
|
* The generic rules noted in uipc_socket2.c apply. In addition:
|
|
|
|
*
|
|
|
|
* o We have a global lock, uipc_lock.
|
|
|
|
*
|
|
|
|
* o All datagram sockets are locked by uipc_lock.
|
|
|
|
*
|
|
|
|
* o For stream socketpairs, the two endpoints are created sharing the same
|
|
|
|
* independent lock. Sockets presented to PRU_CONNECT2 must already have
|
|
|
|
* matching locks.
|
|
|
|
*
|
|
|
|
* o Stream sockets created via socket() start life with their own
|
|
|
|
* independent lock.
|
|
|
|
*
|
|
|
|
* o Stream connections to a named endpoint are slightly more complicated.
|
|
|
|
* Sockets that have called listen() have their lock pointer mutated to
|
|
|
|
* the global uipc_lock. When establishing a connection, the connecting
|
|
|
|
* socket also has its lock mutated to uipc_lock, which matches the head
|
|
|
|
* (listening socket). We create a new socket for accept() to return, and
|
|
|
|
* that also shares the head's lock. Until the connection is completely
|
|
|
|
* done on both ends, all three sockets are locked by uipc_lock. Once the
|
|
|
|
* connection is complete, the association with the head's lock is broken.
|
|
|
|
* The connecting socket and the socket returned from accept() have their
|
|
|
|
* lock pointers mutated away from uipc_lock, and back to the connecting
|
|
|
|
* socket's original, independent lock. The head continues to be locked
|
|
|
|
* by uipc_lock.
|
|
|
|
*
|
|
|
|
* o If uipc_lock is determined to be a significant source of contention,
|
|
|
|
* it could easily be hashed out. It is difficult to simply make it an
|
|
|
|
* independent lock because of visibility / garbage collection issues:
|
|
|
|
* if a socket has been associated with a lock at any point, that lock
|
|
|
|
* must remain valid until the socket is no longer visible in the system.
|
|
|
|
* The lock must not be freed or otherwise destroyed until any sockets
|
|
|
|
* that had referenced it have also been destroyed.
|
1993-03-21 12:45:37 +03:00
|
|
|
*/
|
2006-09-04 01:12:14 +04:00
|
|
|
const struct sockaddr_un sun_noname = {
|
|
|
|
.sun_len = sizeof(sun_noname),
|
|
|
|
.sun_family = AF_LOCAL,
|
|
|
|
};
|
1993-03-21 12:45:37 +03:00
|
|
|
ino_t unp_ino; /* prototype for fake inode numbers */
|
|
|
|
|
2006-07-24 02:06:03 +04:00
|
|
|
struct mbuf *unp_addsockcred(struct lwp *, struct mbuf *);
|
2008-04-24 15:38:36 +04:00
|
|
|
static kmutex_t *uipc_lock;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initialize Unix protocols.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
uipc_init(void)
|
|
|
|
{
|
|
|
|
|
|
|
|
uipc_lock = mutex_obj_alloc(MUTEX_DEFAULT, IPL_NONE);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* A connection succeeded: disassociate both endpoints from the head's
|
|
|
|
* lock, and make them share their own lock. There is a race here: for
|
|
|
|
* a very brief time one endpoint will be locked by a different lock
|
|
|
|
* than the other end. However, since the current thread holds the old
|
|
|
|
* lock (the listening socket's lock, the head) access can still only be
|
|
|
|
* made to one side of the connection.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
unp_setpeerlocks(struct socket *so, struct socket *so2)
|
|
|
|
{
|
|
|
|
struct unpcb *unp;
|
|
|
|
kmutex_t *lock;
|
|
|
|
|
|
|
|
KASSERT(solocked2(so, so2));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Bail out if either end of the socket is not yet fully
|
|
|
|
* connected or accepted. We only break the lock association
|
|
|
|
* with the head when the pair of sockets stand completely
|
|
|
|
* on their own.
|
|
|
|
*/
|
|
|
|
if (so->so_head != NULL || so2->so_head != NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Drop references to old lock. A third reference (from the
|
|
|
|
* queue head) must be held as we still hold its lock. Bonus:
|
|
|
|
* we don't need to worry about garbage collecting the lock.
|
|
|
|
*/
|
|
|
|
lock = so->so_lock;
|
|
|
|
KASSERT(lock == uipc_lock);
|
|
|
|
mutex_obj_free(lock);
|
|
|
|
mutex_obj_free(lock);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Grab stream lock from the initiator and share between the two
|
|
|
|
* endpoints. Issue memory barrier to ensure all modifications
|
|
|
|
* become globally visible before the lock change. so2 is
|
|
|
|
* assumed not to have a stream lock, because it was created
|
|
|
|
* purely for the server side to accept this connection and
|
|
|
|
* started out life using the domain-wide lock.
|
|
|
|
*/
|
|
|
|
unp = sotounpcb(so);
|
|
|
|
KASSERT(unp->unp_streamlock != NULL);
|
|
|
|
KASSERT(sotounpcb(so2)->unp_streamlock == NULL);
|
|
|
|
lock = unp->unp_streamlock;
|
|
|
|
unp->unp_streamlock = NULL;
|
|
|
|
mutex_obj_hold(lock);
|
|
|
|
membar_exit();
|
2008-06-10 15:49:11 +04:00
|
|
|
solockreset(so, lock);
|
|
|
|
solockreset(so2, lock);
|
2008-04-24 15:38:36 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Reset a socket's lock back to the domain-wide lock.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
unp_resetlock(struct socket *so)
|
|
|
|
{
|
|
|
|
kmutex_t *olock, *nlock;
|
|
|
|
struct unpcb *unp;
|
|
|
|
|
|
|
|
KASSERT(solocked(so));
|
|
|
|
|
|
|
|
olock = so->so_lock;
|
|
|
|
nlock = uipc_lock;
|
|
|
|
if (olock == nlock)
|
|
|
|
return;
|
|
|
|
unp = sotounpcb(so);
|
|
|
|
KASSERT(unp->unp_streamlock == NULL);
|
|
|
|
unp->unp_streamlock = olock;
|
|
|
|
mutex_obj_hold(nlock);
|
|
|
|
mutex_enter(nlock);
|
2008-06-10 15:49:11 +04:00
|
|
|
solockreset(so, nlock);
|
2008-04-24 15:38:36 +04:00
|
|
|
mutex_exit(olock);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
unp_free(struct unpcb *unp)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (unp->unp_addr)
|
|
|
|
free(unp->unp_addr, M_SONAME);
|
|
|
|
if (unp->unp_streamlock != NULL)
|
|
|
|
mutex_obj_free(unp->unp_streamlock);
|
|
|
|
free(unp, M_PCB);
|
|
|
|
}
|
1998-01-08 01:57:09 +03:00
|
|
|
|
1996-05-23 20:03:45 +04:00
|
|
|
int
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_output(struct mbuf *m, struct mbuf *control, struct unpcb *unp,
|
2006-07-24 02:06:03 +04:00
|
|
|
struct lwp *l)
|
1996-05-23 20:03:45 +04:00
|
|
|
{
|
|
|
|
struct socket *so2;
|
2004-04-19 02:20:32 +04:00
|
|
|
const struct sockaddr_un *sun;
|
1996-05-23 20:03:45 +04:00
|
|
|
|
|
|
|
so2 = unp->unp_conn->unp_socket;
|
2008-04-24 15:38:36 +04:00
|
|
|
|
|
|
|
KASSERT(solocked(so2));
|
|
|
|
|
1996-05-23 20:03:45 +04:00
|
|
|
if (unp->unp_addr)
|
|
|
|
sun = unp->unp_addr;
|
|
|
|
else
|
|
|
|
sun = &sun_noname;
|
1998-01-08 01:57:09 +03:00
|
|
|
if (unp->unp_conn->unp_flags & UNP_WANTCRED)
|
2006-07-24 02:06:03 +04:00
|
|
|
control = unp_addsockcred(l, control);
|
2005-05-30 02:24:14 +04:00
|
|
|
if (sbappendaddr(&so2->so_rcv, (const struct sockaddr *)sun, m,
|
1996-05-23 20:03:45 +04:00
|
|
|
control) == 0) {
|
2008-04-24 15:38:36 +04:00
|
|
|
so2->so_rcv.sb_overflowed++;
|
|
|
|
sounlock(so2);
|
2007-08-04 00:49:45 +04:00
|
|
|
unp_dispose(control);
|
1996-05-23 20:03:45 +04:00
|
|
|
m_freem(control);
|
|
|
|
m_freem(m);
|
2008-04-24 15:38:36 +04:00
|
|
|
solock(so2);
|
2003-04-10 22:55:11 +04:00
|
|
|
return (ENOBUFS);
|
1996-05-23 20:03:45 +04:00
|
|
|
} else {
|
|
|
|
sorwakeup(so2);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2008-04-24 15:38:36 +04:00
|
|
|
unp_setaddr(struct socket *so, struct mbuf *nam, bool peeraddr)
|
1996-05-23 20:03:45 +04:00
|
|
|
{
|
2004-04-19 02:20:32 +04:00
|
|
|
const struct sockaddr_un *sun;
|
2008-04-24 15:38:36 +04:00
|
|
|
struct unpcb *unp;
|
|
|
|
bool ext;
|
1996-05-23 20:03:45 +04:00
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
unp = sotounpcb(so);
|
|
|
|
ext = false;
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
sun = NULL;
|
|
|
|
if (peeraddr) {
|
|
|
|
if (unp->unp_conn && unp->unp_conn->unp_addr)
|
|
|
|
sun = unp->unp_conn->unp_addr;
|
|
|
|
} else {
|
|
|
|
if (unp->unp_addr)
|
|
|
|
sun = unp->unp_addr;
|
|
|
|
}
|
|
|
|
if (sun == NULL)
|
|
|
|
sun = &sun_noname;
|
|
|
|
nam->m_len = sun->sun_len;
|
|
|
|
if (nam->m_len > MLEN && !ext) {
|
|
|
|
sounlock(so);
|
|
|
|
MEXTMALLOC(nam, MAXPATHLEN * 2, M_WAITOK);
|
|
|
|
solock(so);
|
|
|
|
ext = true;
|
|
|
|
} else {
|
|
|
|
KASSERT(nam->m_len <= MAXPATHLEN * 2);
|
|
|
|
memcpy(mtod(nam, void *), sun, (size_t)nam->m_len);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
1996-05-23 20:03:45 +04:00
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*ARGSUSED*/
|
1993-06-27 10:01:27 +04:00
|
|
|
int
|
2004-04-19 01:48:15 +04:00
|
|
|
uipc_usrreq(struct socket *so, int req, struct mbuf *m, struct mbuf *nam,
|
2005-12-11 15:16:03 +03:00
|
|
|
struct mbuf *control, struct lwp *l)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
|
|
|
struct unpcb *unp = sotounpcb(so);
|
2000-03-30 13:27:11 +04:00
|
|
|
struct socket *so2;
|
2005-12-11 15:16:03 +03:00
|
|
|
struct proc *p;
|
2004-04-17 19:15:29 +04:00
|
|
|
u_int newhiwat;
|
2000-03-30 13:27:11 +04:00
|
|
|
int error = 0;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
if (req == PRU_CONTROL)
|
|
|
|
return (EOPNOTSUPP);
|
1996-05-23 20:03:45 +04:00
|
|
|
|
1996-05-23 20:49:08 +04:00
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (req != PRU_SEND && req != PRU_SENDOOB && control)
|
|
|
|
panic("uipc_usrreq: unexpected control mbuf");
|
|
|
|
#endif
|
2005-12-11 15:16:03 +03:00
|
|
|
p = l ? l->l_proc : NULL;
|
2008-04-24 15:38:36 +04:00
|
|
|
if (req != PRU_ATTACH) {
|
|
|
|
if (unp == 0) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
KASSERT(solocked(so));
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1996-05-23 20:03:45 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
switch (req) {
|
|
|
|
|
|
|
|
case PRU_ATTACH:
|
1996-05-23 20:03:45 +04:00
|
|
|
if (unp != 0) {
|
1993-03-21 12:45:37 +03:00
|
|
|
error = EISCONN;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
error = unp_attach(so);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_DETACH:
|
|
|
|
unp_detach(unp);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_BIND:
|
2006-04-15 03:15:21 +04:00
|
|
|
KASSERT(l != NULL);
|
2008-04-24 15:38:36 +04:00
|
|
|
error = unp_bind(so, nam, l);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_LISTEN:
|
2008-04-24 15:38:36 +04:00
|
|
|
/*
|
|
|
|
* If the socket can accept a connection, it must be
|
|
|
|
* locked by uipc_lock.
|
|
|
|
*/
|
|
|
|
unp_resetlock(so);
|
1993-03-21 12:45:37 +03:00
|
|
|
if (unp->unp_vnode == 0)
|
|
|
|
error = EINVAL;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_CONNECT:
|
2006-04-15 03:15:21 +04:00
|
|
|
KASSERT(l != NULL);
|
2005-12-11 15:16:03 +03:00
|
|
|
error = unp_connect(so, nam, l);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_CONNECT2:
|
2003-11-29 13:02:42 +03:00
|
|
|
error = unp_connect2(so, (struct socket *)nam, PRU_CONNECT2);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_DISCONNECT:
|
|
|
|
unp_disconnect(unp);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_ACCEPT:
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(so->so_lock == uipc_lock);
|
2003-11-29 13:02:42 +03:00
|
|
|
/*
|
|
|
|
* Mark the initiating STREAM socket as connected *ONLY*
|
|
|
|
* after it's been accepted. This prevents a client from
|
|
|
|
* overrunning a server and receiving ECONNREFUSED.
|
|
|
|
*/
|
2008-04-24 15:38:36 +04:00
|
|
|
if (unp->unp_conn == NULL)
|
|
|
|
break;
|
|
|
|
so2 = unp->unp_conn->unp_socket;
|
|
|
|
if (so2->so_state & SS_ISCONNECTING) {
|
|
|
|
KASSERT(solocked2(so, so->so_head));
|
|
|
|
KASSERT(solocked2(so2, so->so_head));
|
|
|
|
soisconnected(so2);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If the connection is fully established, break the
|
|
|
|
* association with uipc_lock and give the connected
|
|
|
|
* pair a seperate lock to share.
|
|
|
|
*/
|
|
|
|
unp_setpeerlocks(so2, so);
|
|
|
|
/*
|
|
|
|
* Only now return peer's address, as we may need to
|
|
|
|
* block in order to allocate memory.
|
|
|
|
*
|
|
|
|
* XXX Minor race: connection can be broken while
|
|
|
|
* lock is dropped in unp_setaddr(). We will return
|
|
|
|
* error == 0 and sun_noname as the peer address.
|
|
|
|
*/
|
|
|
|
unp_setaddr(so, nam, true);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_SHUTDOWN:
|
|
|
|
socantsendmore(so);
|
|
|
|
unp_shutdown(unp);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_RCVD:
|
|
|
|
switch (so->so_type) {
|
|
|
|
|
|
|
|
case SOCK_DGRAM:
|
|
|
|
panic("uipc 1");
|
|
|
|
/*NOTREACHED*/
|
|
|
|
|
|
|
|
case SOCK_STREAM:
|
|
|
|
#define rcv (&so->so_rcv)
|
|
|
|
#define snd (&so2->so_snd)
|
|
|
|
if (unp->unp_conn == 0)
|
|
|
|
break;
|
|
|
|
so2 = unp->unp_conn->unp_socket;
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(solocked2(so, so2));
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Adjust backpressure on sender
|
|
|
|
* and wakeup any waiting to write.
|
|
|
|
*/
|
|
|
|
snd->sb_mbmax += unp->unp_mbcnt - rcv->sb_mbcnt;
|
|
|
|
unp->unp_mbcnt = rcv->sb_mbcnt;
|
2004-04-17 19:15:29 +04:00
|
|
|
newhiwat = snd->sb_hiwat + unp->unp_cc - rcv->sb_cc;
|
2005-05-07 21:42:09 +04:00
|
|
|
(void)chgsbsize(so2->so_uidinfo,
|
2004-04-17 19:15:29 +04:00
|
|
|
&snd->sb_hiwat, newhiwat, RLIM_INFINITY);
|
1993-03-21 12:45:37 +03:00
|
|
|
unp->unp_cc = rcv->sb_cc;
|
|
|
|
sowwakeup(so2);
|
|
|
|
#undef snd
|
|
|
|
#undef rcv
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
panic("uipc 2");
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_SEND:
|
1998-01-08 01:57:09 +03:00
|
|
|
/*
|
|
|
|
* Note: unp_internalize() rejects any control message
|
|
|
|
* other than SCM_RIGHTS, and only allows one. This
|
|
|
|
* has the side-effect of preventing a caller from
|
|
|
|
* forging SCM_CREDS.
|
|
|
|
*/
|
2006-04-15 03:15:21 +04:00
|
|
|
if (control) {
|
2008-04-24 15:38:36 +04:00
|
|
|
sounlock(so);
|
|
|
|
error = unp_internalize(&control);
|
|
|
|
solock(so);
|
|
|
|
if (error != 0) {
|
2008-04-20 11:47:18 +04:00
|
|
|
m_freem(control);
|
|
|
|
m_freem(m);
|
|
|
|
break;
|
|
|
|
}
|
2005-06-16 18:36:42 +04:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
switch (so->so_type) {
|
|
|
|
|
|
|
|
case SOCK_DGRAM: {
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(so->so_lock == uipc_lock);
|
1993-03-21 12:45:37 +03:00
|
|
|
if (nam) {
|
2008-04-20 11:47:18 +04:00
|
|
|
if ((so->so_state & SS_ISCONNECTED) != 0)
|
1993-03-21 12:45:37 +03:00
|
|
|
error = EISCONN;
|
2008-04-20 11:47:18 +04:00
|
|
|
else {
|
2008-04-24 15:38:36 +04:00
|
|
|
/*
|
|
|
|
* Note: once connected, the
|
|
|
|
* socket's lock must not be
|
|
|
|
* dropped until we have sent
|
|
|
|
* the message and disconnected.
|
|
|
|
* This is necessary to prevent
|
|
|
|
* intervening control ops, like
|
|
|
|
* another connection.
|
|
|
|
*/
|
2008-04-20 11:47:18 +04:00
|
|
|
error = unp_connect(so, nam, l);
|
1996-05-23 20:03:45 +04:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
} else {
|
2008-04-20 11:47:18 +04:00
|
|
|
if ((so->so_state & SS_ISCONNECTED) == 0)
|
1993-03-21 12:45:37 +03:00
|
|
|
error = ENOTCONN;
|
2008-04-20 11:47:18 +04:00
|
|
|
}
|
|
|
|
if (error) {
|
2008-04-24 15:38:36 +04:00
|
|
|
sounlock(so);
|
2008-04-20 11:47:18 +04:00
|
|
|
unp_dispose(control);
|
|
|
|
m_freem(control);
|
|
|
|
m_freem(m);
|
2008-04-24 15:38:36 +04:00
|
|
|
solock(so);
|
2008-04-20 11:47:18 +04:00
|
|
|
break;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2006-04-15 03:12:14 +04:00
|
|
|
KASSERT(p != NULL);
|
2006-07-24 02:06:03 +04:00
|
|
|
error = unp_output(m, control, unp, l);
|
1993-03-21 12:45:37 +03:00
|
|
|
if (nam)
|
|
|
|
unp_disconnect(unp);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case SOCK_STREAM:
|
|
|
|
#define rcv (&so2->so_rcv)
|
|
|
|
#define snd (&so->so_snd)
|
2006-03-01 05:06:11 +03:00
|
|
|
if (unp->unp_conn == NULL) {
|
|
|
|
error = ENOTCONN;
|
|
|
|
break;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
so2 = unp->unp_conn->unp_socket;
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(solocked2(so, so2));
|
1998-01-08 01:57:09 +03:00
|
|
|
if (unp->unp_conn->unp_flags & UNP_WANTCRED) {
|
|
|
|
/*
|
|
|
|
* Credentials are passed only once on
|
|
|
|
* SOCK_STREAM.
|
|
|
|
*/
|
|
|
|
unp->unp_conn->unp_flags &= ~UNP_WANTCRED;
|
2006-07-24 02:06:03 +04:00
|
|
|
control = unp_addsockcred(l, control);
|
1998-01-08 01:57:09 +03:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Send to paired receive port, and then reduce
|
|
|
|
* send buffer hiwater marks to maintain backpressure.
|
|
|
|
* Wake up readers.
|
|
|
|
*/
|
|
|
|
if (control) {
|
2008-04-24 15:38:36 +04:00
|
|
|
if (sbappendcontrol(rcv, m, control) != 0)
|
|
|
|
control = NULL;
|
1993-03-21 12:45:37 +03:00
|
|
|
} else
|
|
|
|
sbappend(rcv, m);
|
|
|
|
snd->sb_mbmax -=
|
|
|
|
rcv->sb_mbcnt - unp->unp_conn->unp_mbcnt;
|
|
|
|
unp->unp_conn->unp_mbcnt = rcv->sb_mbcnt;
|
2004-04-17 19:15:29 +04:00
|
|
|
newhiwat = snd->sb_hiwat -
|
|
|
|
(rcv->sb_cc - unp->unp_conn->unp_cc);
|
2005-05-07 21:42:09 +04:00
|
|
|
(void)chgsbsize(so->so_uidinfo,
|
2004-04-17 19:15:29 +04:00
|
|
|
&snd->sb_hiwat, newhiwat, RLIM_INFINITY);
|
1993-03-21 12:45:37 +03:00
|
|
|
unp->unp_conn->unp_cc = rcv->sb_cc;
|
|
|
|
sorwakeup(so2);
|
|
|
|
#undef snd
|
|
|
|
#undef rcv
|
2008-04-24 15:38:36 +04:00
|
|
|
if (control != NULL) {
|
|
|
|
sounlock(so);
|
|
|
|
unp_dispose(control);
|
|
|
|
m_freem(control);
|
|
|
|
solock(so);
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
panic("uipc 4");
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_ABORT:
|
2008-04-24 15:38:36 +04:00
|
|
|
(void)unp_drop(unp, ECONNABORTED);
|
1999-03-22 20:54:38 +03:00
|
|
|
|
2006-04-13 08:58:31 +04:00
|
|
|
KASSERT(so->so_head == NULL);
|
1999-03-22 20:54:38 +03:00
|
|
|
#ifdef DIAGNOSTIC
|
|
|
|
if (so->so_pcb == 0)
|
|
|
|
panic("uipc 5: drop killed pcb");
|
|
|
|
#endif
|
|
|
|
unp_detach(unp);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_SENSE:
|
|
|
|
((struct stat *) m)->st_blksize = so->so_snd.sb_hiwat;
|
|
|
|
if (so->so_type == SOCK_STREAM && unp->unp_conn != 0) {
|
|
|
|
so2 = unp->unp_conn->unp_socket;
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(solocked2(so, so2));
|
1993-03-21 12:45:37 +03:00
|
|
|
((struct stat *) m)->st_blksize += so2->so_rcv.sb_cc;
|
|
|
|
}
|
|
|
|
((struct stat *) m)->st_dev = NODEV;
|
|
|
|
if (unp->unp_ino == 0)
|
|
|
|
unp->unp_ino = unp_ino++;
|
1997-05-15 21:01:04 +04:00
|
|
|
((struct stat *) m)->st_atimespec =
|
|
|
|
((struct stat *) m)->st_mtimespec =
|
|
|
|
((struct stat *) m)->st_ctimespec = unp->unp_ctime;
|
1993-03-21 12:45:37 +03:00
|
|
|
((struct stat *) m)->st_ino = unp->unp_ino;
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
case PRU_RCVOOB:
|
1996-05-23 20:03:45 +04:00
|
|
|
error = EOPNOTSUPP;
|
|
|
|
break;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
case PRU_SENDOOB:
|
1996-05-23 20:49:08 +04:00
|
|
|
m_freem(control);
|
1996-05-23 20:03:45 +04:00
|
|
|
m_freem(m);
|
1993-03-21 12:45:37 +03:00
|
|
|
error = EOPNOTSUPP;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_SOCKADDR:
|
2008-04-24 15:38:36 +04:00
|
|
|
unp_setaddr(so, nam, false);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case PRU_PEERADDR:
|
2008-04-24 15:38:36 +04:00
|
|
|
unp_setaddr(so, nam, true);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
panic("piusrreq");
|
|
|
|
}
|
1996-05-23 20:03:45 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
release:
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1998-01-08 01:57:09 +03:00
|
|
|
/*
|
|
|
|
* Unix domain socket option processing.
|
|
|
|
*/
|
|
|
|
int
|
2004-04-19 01:48:15 +04:00
|
|
|
uipc_ctloutput(int op, struct socket *so, int level, int optname,
|
|
|
|
struct mbuf **mp)
|
1998-01-08 01:57:09 +03:00
|
|
|
{
|
|
|
|
struct unpcb *unp = sotounpcb(so);
|
|
|
|
struct mbuf *m = *mp;
|
|
|
|
int optval = 0, error = 0;
|
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(solocked(so));
|
|
|
|
|
1998-01-08 01:57:09 +03:00
|
|
|
if (level != 0) {
|
2007-09-19 10:23:53 +04:00
|
|
|
error = ENOPROTOOPT;
|
1998-01-08 01:57:09 +03:00
|
|
|
if (op == PRCO_SETOPT && m)
|
|
|
|
(void) m_free(m);
|
|
|
|
} else switch (op) {
|
|
|
|
|
|
|
|
case PRCO_SETOPT:
|
|
|
|
switch (optname) {
|
|
|
|
case LOCAL_CREDS:
|
2003-11-29 13:02:42 +03:00
|
|
|
case LOCAL_CONNWAIT:
|
1998-01-08 01:57:09 +03:00
|
|
|
if (m == NULL || m->m_len != sizeof(int))
|
|
|
|
error = EINVAL;
|
|
|
|
else {
|
|
|
|
optval = *mtod(m, int *);
|
|
|
|
switch (optname) {
|
|
|
|
#define OPTSET(bit) \
|
|
|
|
if (optval) \
|
|
|
|
unp->unp_flags |= (bit); \
|
|
|
|
else \
|
|
|
|
unp->unp_flags &= ~(bit);
|
|
|
|
|
|
|
|
case LOCAL_CREDS:
|
|
|
|
OPTSET(UNP_WANTCRED);
|
|
|
|
break;
|
2003-11-29 13:02:42 +03:00
|
|
|
case LOCAL_CONNWAIT:
|
|
|
|
OPTSET(UNP_CONNWAIT);
|
|
|
|
break;
|
1998-01-08 01:57:09 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#undef OPTSET
|
|
|
|
|
|
|
|
default:
|
|
|
|
error = ENOPROTOOPT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (m)
|
|
|
|
(void) m_free(m);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case PRCO_GETOPT:
|
2008-04-24 15:38:36 +04:00
|
|
|
sounlock(so);
|
1998-01-08 01:57:09 +03:00
|
|
|
switch (optname) {
|
2007-08-09 19:23:01 +04:00
|
|
|
case LOCAL_PEEREID:
|
|
|
|
if (unp->unp_flags & UNP_EIDSVALID) {
|
|
|
|
*mp = m = m_get(M_WAIT, MT_SOOPTS);
|
|
|
|
m->m_len = sizeof(struct unpcbid);
|
|
|
|
*mtod(m, struct unpcbid *) = unp->unp_connid;
|
|
|
|
} else {
|
|
|
|
error = EINVAL;
|
|
|
|
}
|
|
|
|
break;
|
1998-01-08 01:57:09 +03:00
|
|
|
case LOCAL_CREDS:
|
|
|
|
*mp = m = m_get(M_WAIT, MT_SOOPTS);
|
|
|
|
m->m_len = sizeof(int);
|
|
|
|
|
|
|
|
#define OPTBIT(bit) (unp->unp_flags & (bit) ? 1 : 0)
|
|
|
|
|
2007-08-09 19:23:01 +04:00
|
|
|
optval = OPTBIT(UNP_WANTCRED);
|
1998-01-08 01:57:09 +03:00
|
|
|
*mtod(m, int *) = optval;
|
|
|
|
break;
|
|
|
|
#undef OPTBIT
|
|
|
|
|
|
|
|
default:
|
|
|
|
error = ENOPROTOOPT;
|
|
|
|
break;
|
|
|
|
}
|
2008-04-24 15:38:36 +04:00
|
|
|
solock(so);
|
1998-01-08 01:57:09 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* Both send and receive buffers are allocated PIPSIZ bytes of buffering
|
|
|
|
* for stream sockets, although the total for sender and receiver is
|
|
|
|
* actually only PIPSIZ.
|
|
|
|
* Datagram sockets really use the sendspace as the maximum datagram size,
|
|
|
|
* and don't really want to reserve the sendspace. Their recvspace should
|
|
|
|
* be large enough for at least one max-size datagram plus address.
|
|
|
|
*/
|
|
|
|
#define PIPSIZ 4096
|
|
|
|
u_long unpst_sendspace = PIPSIZ;
|
|
|
|
u_long unpst_recvspace = PIPSIZ;
|
|
|
|
u_long unpdg_sendspace = 2*1024; /* really max datagram size */
|
|
|
|
u_long unpdg_recvspace = 4*1024;
|
|
|
|
|
2008-03-22 00:54:58 +03:00
|
|
|
u_int unp_rights; /* file descriptors in flight */
|
1993-03-21 12:45:37 +03:00
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
int
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_attach(struct socket *so)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 13:27:11 +04:00
|
|
|
struct unpcb *unp;
|
1993-03-21 12:45:37 +03:00
|
|
|
int error;
|
2005-02-27 00:34:55 +03:00
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
switch (so->so_type) {
|
|
|
|
case SOCK_STREAM:
|
|
|
|
if (so->so_lock == NULL) {
|
|
|
|
/*
|
|
|
|
* XXX Assuming that no socket locks are held,
|
|
|
|
* as this call may sleep.
|
|
|
|
*/
|
|
|
|
so->so_lock = mutex_obj_alloc(MUTEX_DEFAULT, IPL_NONE);
|
|
|
|
solock(so);
|
|
|
|
}
|
|
|
|
if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
|
1993-03-21 12:45:37 +03:00
|
|
|
error = soreserve(so, unpst_sendspace, unpst_recvspace);
|
2008-04-24 15:38:36 +04:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
break;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
case SOCK_DGRAM:
|
|
|
|
if (so->so_lock == NULL) {
|
|
|
|
mutex_obj_hold(uipc_lock);
|
|
|
|
so->so_lock = uipc_lock;
|
|
|
|
solock(so);
|
|
|
|
}
|
|
|
|
if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
|
1993-03-21 12:45:37 +03:00
|
|
|
error = soreserve(so, unpdg_sendspace, unpdg_recvspace);
|
2008-04-24 15:38:36 +04:00
|
|
|
if (error != 0)
|
|
|
|
return (error);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2008-04-24 15:38:36 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
panic("unp_attach");
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(solocked(so));
|
1995-08-16 04:29:50 +04:00
|
|
|
unp = malloc(sizeof(*unp), M_PCB, M_NOWAIT);
|
|
|
|
if (unp == NULL)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (ENOBUFS);
|
2007-03-04 08:59:00 +03:00
|
|
|
memset((void *)unp, 0, sizeof(*unp));
|
1993-03-21 12:45:37 +03:00
|
|
|
unp->unp_socket = so;
|
1995-08-17 06:57:20 +04:00
|
|
|
so->so_pcb = unp;
|
2005-11-11 10:07:42 +03:00
|
|
|
nanotime(&unp->unp_ctime);
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1996-02-04 23:32:15 +03:00
|
|
|
void
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_detach(struct unpcb *unp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2008-04-24 15:38:36 +04:00
|
|
|
struct socket *so;
|
|
|
|
vnode_t *vp;
|
2005-02-27 00:34:55 +03:00
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
so = unp->unp_socket;
|
|
|
|
|
|
|
|
retry:
|
|
|
|
if ((vp = unp->unp_vnode) != NULL) {
|
|
|
|
sounlock(so);
|
|
|
|
/* Acquire v_interlock to protect against unp_connect(). */
|
2008-04-27 15:29:12 +04:00
|
|
|
/* XXXAD racy */
|
2008-04-24 15:38:36 +04:00
|
|
|
mutex_enter(&vp->v_interlock);
|
|
|
|
vp->v_socket = NULL;
|
|
|
|
vrelel(vp, 0);
|
|
|
|
solock(so);
|
|
|
|
unp->unp_vnode = NULL;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
if (unp->unp_conn)
|
|
|
|
unp_disconnect(unp);
|
2008-04-24 15:38:36 +04:00
|
|
|
while (unp->unp_refs) {
|
|
|
|
KASSERT(solocked2(so, unp->unp_refs->unp_socket));
|
|
|
|
if (unp_drop(unp->unp_refs, ECONNRESET)) {
|
|
|
|
solock(so);
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
soisdisconnected(so);
|
|
|
|
so->so_pcb = NULL;
|
1994-05-04 13:50:11 +04:00
|
|
|
if (unp_rights) {
|
|
|
|
/*
|
|
|
|
* Normally the receive buffer is flushed later,
|
|
|
|
* in sofree, but if our receive buffer holds references
|
|
|
|
* to descriptors that are now garbage, we will dispose
|
|
|
|
* of those descriptor references after the garbage collector
|
|
|
|
* gets them (resulting in a "panic: closef: count < 0").
|
|
|
|
*/
|
2008-04-24 15:38:36 +04:00
|
|
|
sorflush(so);
|
|
|
|
unp_free(unp);
|
|
|
|
sounlock(so);
|
1993-03-21 12:45:37 +03:00
|
|
|
unp_gc();
|
2008-04-24 15:38:36 +04:00
|
|
|
solock(so);
|
1995-08-16 04:29:50 +04:00
|
|
|
} else
|
2008-04-24 15:38:36 +04:00
|
|
|
unp_free(unp);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
int
|
2008-04-24 15:38:36 +04:00
|
|
|
unp_bind(struct socket *so, struct mbuf *nam, struct lwp *l)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
1997-06-26 10:06:40 +04:00
|
|
|
struct sockaddr_un *sun;
|
2008-04-24 15:38:36 +04:00
|
|
|
struct unpcb *unp;
|
2008-03-22 00:54:58 +03:00
|
|
|
vnode_t *vp;
|
1993-03-21 12:45:37 +03:00
|
|
|
struct vattr vattr;
|
1997-06-26 10:06:40 +04:00
|
|
|
size_t addrlen;
|
1993-03-21 12:45:37 +03:00
|
|
|
int error;
|
|
|
|
struct nameidata nd;
|
2008-04-24 15:38:36 +04:00
|
|
|
proc_t *p;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
unp = sotounpcb(so);
|
|
|
|
if (unp->unp_vnode != NULL)
|
1993-03-21 12:45:37 +03:00
|
|
|
return (EINVAL);
|
2008-03-28 15:14:22 +03:00
|
|
|
if ((unp->unp_flags & UNP_BUSY) != 0) {
|
|
|
|
/*
|
|
|
|
* EALREADY may not be strictly accurate, but since this
|
|
|
|
* is a major application error it's hardly a big deal.
|
|
|
|
*/
|
|
|
|
return (EALREADY);
|
|
|
|
}
|
|
|
|
unp->unp_flags |= UNP_BUSY;
|
2008-04-24 15:38:36 +04:00
|
|
|
sounlock(so);
|
2008-03-28 15:14:22 +03:00
|
|
|
|
1997-06-26 10:06:40 +04:00
|
|
|
/*
|
|
|
|
* Allocate the new sockaddr. We have to allocate one
|
|
|
|
* extra byte so that we can ensure that the pathname
|
|
|
|
* is nul-terminated.
|
|
|
|
*/
|
2008-04-24 15:38:36 +04:00
|
|
|
p = l->l_proc;
|
1997-06-26 10:06:40 +04:00
|
|
|
addrlen = nam->m_len + 1;
|
|
|
|
sun = malloc(addrlen, M_SONAME, M_WAITOK);
|
2007-03-04 08:59:00 +03:00
|
|
|
m_copydata(nam, 0, nam->m_len, (void *)sun);
|
1997-06-26 10:06:40 +04:00
|
|
|
*(((char *)sun) + nam->m_len) = '\0';
|
|
|
|
|
2007-04-22 12:29:55 +04:00
|
|
|
NDINIT(&nd, CREATE, FOLLOW | LOCKPARENT | TRYEMULROOT, UIO_SYSSPACE,
|
2007-12-08 22:29:36 +03:00
|
|
|
sun->sun_path);
|
1997-06-26 10:06:40 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
/* SHOULD BE ABLE TO ADOPT EXISTING AND wakeup() ALA FIFO's */
|
1996-02-04 05:17:43 +03:00
|
|
|
if ((error = namei(&nd)) != 0)
|
1997-06-26 10:06:40 +04:00
|
|
|
goto bad;
|
1994-06-08 15:28:29 +04:00
|
|
|
vp = nd.ni_vp;
|
2007-04-03 20:11:31 +04:00
|
|
|
if (vp != NULL) {
|
1994-06-08 15:28:29 +04:00
|
|
|
VOP_ABORTOP(nd.ni_dvp, &nd.ni_cnd);
|
|
|
|
if (nd.ni_dvp == vp)
|
|
|
|
vrele(nd.ni_dvp);
|
1993-03-21 12:45:37 +03:00
|
|
|
else
|
1994-06-08 15:28:29 +04:00
|
|
|
vput(nd.ni_dvp);
|
1993-03-21 12:45:37 +03:00
|
|
|
vrele(vp);
|
2007-04-03 20:11:31 +04:00
|
|
|
error = EADDRINUSE;
|
|
|
|
goto bad;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
VATTR_NULL(&vattr);
|
|
|
|
vattr.va_type = VSOCK;
|
2005-08-30 19:03:04 +04:00
|
|
|
vattr.va_mode = ACCESSPERMS & ~(p->p_cwdi->cwdi_cmask);
|
1996-02-04 05:17:43 +03:00
|
|
|
error = VOP_CREATE(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr);
|
|
|
|
if (error)
|
1997-06-26 10:06:40 +04:00
|
|
|
goto bad;
|
1994-06-08 15:28:29 +04:00
|
|
|
vp = nd.ni_vp;
|
2008-04-24 15:38:36 +04:00
|
|
|
solock(so);
|
1993-03-21 12:45:37 +03:00
|
|
|
vp->v_socket = unp->unp_socket;
|
|
|
|
unp->unp_vnode = vp;
|
1997-06-26 10:06:40 +04:00
|
|
|
unp->unp_addrlen = addrlen;
|
|
|
|
unp->unp_addr = sun;
|
2007-08-09 19:23:01 +04:00
|
|
|
unp->unp_connid.unp_pid = p->p_pid;
|
2008-04-24 15:38:36 +04:00
|
|
|
unp->unp_connid.unp_euid = kauth_cred_geteuid(l->l_cred);
|
|
|
|
unp->unp_connid.unp_egid = kauth_cred_getegid(l->l_cred);
|
2007-08-09 19:23:01 +04:00
|
|
|
unp->unp_flags |= UNP_EIDSBIND;
|
1998-03-01 05:20:01 +03:00
|
|
|
VOP_UNLOCK(vp, 0);
|
2008-03-28 15:14:22 +03:00
|
|
|
unp->unp_flags &= ~UNP_BUSY;
|
1993-03-21 12:45:37 +03:00
|
|
|
return (0);
|
1997-06-26 10:06:40 +04:00
|
|
|
|
|
|
|
bad:
|
|
|
|
free(sun, M_SONAME);
|
2008-04-24 15:38:36 +04:00
|
|
|
solock(so);
|
2008-03-28 15:14:22 +03:00
|
|
|
unp->unp_flags &= ~UNP_BUSY;
|
1997-06-26 10:06:40 +04:00
|
|
|
return (error);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
int
|
2005-12-11 15:16:03 +03:00
|
|
|
unp_connect(struct socket *so, struct mbuf *nam, struct lwp *l)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 13:27:11 +04:00
|
|
|
struct sockaddr_un *sun;
|
2008-03-22 00:54:58 +03:00
|
|
|
vnode_t *vp;
|
2000-03-30 13:27:11 +04:00
|
|
|
struct socket *so2, *so3;
|
2007-08-09 19:23:01 +04:00
|
|
|
struct unpcb *unp, *unp2, *unp3;
|
1997-06-26 10:06:40 +04:00
|
|
|
size_t addrlen;
|
1993-03-21 12:45:37 +03:00
|
|
|
int error;
|
|
|
|
struct nameidata nd;
|
|
|
|
|
2008-03-28 15:14:22 +03:00
|
|
|
unp = sotounpcb(so);
|
|
|
|
if ((unp->unp_flags & UNP_BUSY) != 0) {
|
|
|
|
/*
|
|
|
|
* EALREADY may not be strictly accurate, but since this
|
|
|
|
* is a major application error it's hardly a big deal.
|
|
|
|
*/
|
|
|
|
return (EALREADY);
|
|
|
|
}
|
|
|
|
unp->unp_flags |= UNP_BUSY;
|
2008-04-24 15:38:36 +04:00
|
|
|
sounlock(so);
|
2008-03-28 15:14:22 +03:00
|
|
|
|
1997-06-26 10:06:40 +04:00
|
|
|
/*
|
|
|
|
* Allocate a temporary sockaddr. We have to allocate one extra
|
|
|
|
* byte so that we can ensure that the pathname is nul-terminated.
|
|
|
|
* When we establish the connection, we copy the other PCB's
|
|
|
|
* sockaddr to our own.
|
|
|
|
*/
|
|
|
|
addrlen = nam->m_len + 1;
|
|
|
|
sun = malloc(addrlen, M_SONAME, M_WAITOK);
|
2007-03-04 08:59:00 +03:00
|
|
|
m_copydata(nam, 0, nam->m_len, (void *)sun);
|
1997-06-26 10:06:40 +04:00
|
|
|
*(((char *)sun) + nam->m_len) = '\0';
|
|
|
|
|
2007-12-08 22:29:36 +03:00
|
|
|
NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | TRYEMULROOT, UIO_SYSSPACE,
|
|
|
|
sun->sun_path);
|
1997-06-26 10:06:40 +04:00
|
|
|
|
1996-02-04 05:17:43 +03:00
|
|
|
if ((error = namei(&nd)) != 0)
|
1997-06-26 10:06:40 +04:00
|
|
|
goto bad2;
|
1994-06-08 15:28:29 +04:00
|
|
|
vp = nd.ni_vp;
|
1993-03-21 12:45:37 +03:00
|
|
|
if (vp->v_type != VSOCK) {
|
|
|
|
error = ENOTSOCK;
|
|
|
|
goto bad;
|
|
|
|
}
|
2007-11-26 22:01:26 +03:00
|
|
|
if ((error = VOP_ACCESS(vp, VWRITE, l->l_cred)) != 0)
|
1993-03-21 12:45:37 +03:00
|
|
|
goto bad;
|
2008-04-24 15:38:36 +04:00
|
|
|
/* Acquire v_interlock to protect against unp_detach(). */
|
|
|
|
mutex_enter(&vp->v_interlock);
|
1993-03-21 12:45:37 +03:00
|
|
|
so2 = vp->v_socket;
|
2008-04-24 15:38:36 +04:00
|
|
|
if (so2 == NULL) {
|
|
|
|
mutex_exit(&vp->v_interlock);
|
1993-03-21 12:45:37 +03:00
|
|
|
error = ECONNREFUSED;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
if (so->so_type != so2->so_type) {
|
2008-04-24 15:38:36 +04:00
|
|
|
mutex_exit(&vp->v_interlock);
|
1993-03-21 12:45:37 +03:00
|
|
|
error = EPROTOTYPE;
|
|
|
|
goto bad;
|
|
|
|
}
|
2008-04-24 15:38:36 +04:00
|
|
|
solock(so);
|
|
|
|
unp_resetlock(so);
|
|
|
|
mutex_exit(&vp->v_interlock);
|
|
|
|
if ((so->so_proto->pr_flags & PR_CONNREQUIRED) != 0) {
|
|
|
|
/*
|
|
|
|
* This may seem somewhat fragile but is OK: if we can
|
|
|
|
* see SO_ACCEPTCONN set on the endpoint, then it must
|
|
|
|
* be locked by the domain-wide uipc_lock.
|
|
|
|
*/
|
|
|
|
KASSERT((so->so_options & SO_ACCEPTCONN) == 0 ||
|
|
|
|
so2->so_lock == uipc_lock);
|
1993-03-21 12:45:37 +03:00
|
|
|
if ((so2->so_options & SO_ACCEPTCONN) == 0 ||
|
|
|
|
(so3 = sonewconn(so2, 0)) == 0) {
|
|
|
|
error = ECONNREFUSED;
|
2008-04-24 15:38:36 +04:00
|
|
|
sounlock(so);
|
1993-03-21 12:45:37 +03:00
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
unp2 = sotounpcb(so2);
|
|
|
|
unp3 = sotounpcb(so3);
|
1997-06-24 23:12:53 +04:00
|
|
|
if (unp2->unp_addr) {
|
|
|
|
unp3->unp_addr = malloc(unp2->unp_addrlen,
|
|
|
|
M_SONAME, M_WAITOK);
|
Abolition of bcopy, ovbcopy, bcmp, and bzero, phase one.
bcopy(x, y, z) -> memcpy(y, x, z)
ovbcopy(x, y, z) -> memmove(y, x, z)
bcmp(x, y, z) -> memcmp(x, y, z)
bzero(x, y) -> memset(x, 0, y)
1998-08-04 08:03:10 +04:00
|
|
|
memcpy(unp3->unp_addr, unp2->unp_addr,
|
1997-06-24 23:12:53 +04:00
|
|
|
unp2->unp_addrlen);
|
|
|
|
unp3->unp_addrlen = unp2->unp_addrlen;
|
|
|
|
}
|
1998-01-08 01:57:09 +03:00
|
|
|
unp3->unp_flags = unp2->unp_flags;
|
2008-04-24 15:38:36 +04:00
|
|
|
unp3->unp_connid.unp_pid = l->l_proc->p_pid;
|
|
|
|
unp3->unp_connid.unp_euid = kauth_cred_geteuid(l->l_cred);
|
|
|
|
unp3->unp_connid.unp_egid = kauth_cred_getegid(l->l_cred);
|
2007-08-09 19:23:01 +04:00
|
|
|
unp3->unp_flags |= UNP_EIDSVALID;
|
|
|
|
if (unp2->unp_flags & UNP_EIDSBIND) {
|
|
|
|
unp->unp_connid = unp2->unp_connid;
|
|
|
|
unp->unp_flags |= UNP_EIDSVALID;
|
|
|
|
}
|
2008-04-24 15:38:36 +04:00
|
|
|
so2 = so3;
|
1998-07-16 04:46:50 +04:00
|
|
|
}
|
2003-11-29 13:02:42 +03:00
|
|
|
error = unp_connect2(so, so2, PRU_CONNECT);
|
2008-04-24 15:38:36 +04:00
|
|
|
sounlock(so);
|
1997-06-26 10:06:40 +04:00
|
|
|
bad:
|
1993-03-21 12:45:37 +03:00
|
|
|
vput(vp);
|
1997-06-26 10:06:40 +04:00
|
|
|
bad2:
|
|
|
|
free(sun, M_SONAME);
|
2008-04-24 15:38:36 +04:00
|
|
|
solock(so);
|
2008-03-28 15:14:22 +03:00
|
|
|
unp->unp_flags &= ~UNP_BUSY;
|
1993-03-21 12:45:37 +03:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
int
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_connect2(struct socket *so, struct socket *so2, int req)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 13:27:11 +04:00
|
|
|
struct unpcb *unp = sotounpcb(so);
|
|
|
|
struct unpcb *unp2;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
if (so2->so_type != so->so_type)
|
|
|
|
return (EPROTOTYPE);
|
2008-04-24 15:38:36 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* All three sockets involved must be locked by same lock:
|
|
|
|
*
|
|
|
|
* local endpoint (so)
|
|
|
|
* remote endpoint (so2)
|
|
|
|
* queue head (so->so_head, only if PR_CONNREQUIRED)
|
|
|
|
*/
|
|
|
|
KASSERT(solocked2(so, so2));
|
|
|
|
if (so->so_head != NULL) {
|
|
|
|
KASSERT(so->so_lock == uipc_lock);
|
|
|
|
KASSERT(solocked2(so, so->so_head));
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
unp2 = sotounpcb(so2);
|
|
|
|
unp->unp_conn = unp2;
|
|
|
|
switch (so->so_type) {
|
|
|
|
|
|
|
|
case SOCK_DGRAM:
|
|
|
|
unp->unp_nextref = unp2->unp_refs;
|
|
|
|
unp2->unp_refs = unp;
|
|
|
|
soisconnected(so);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SOCK_STREAM:
|
|
|
|
unp2->unp_conn = unp;
|
2003-11-29 13:02:42 +03:00
|
|
|
if (req == PRU_CONNECT &&
|
|
|
|
((unp->unp_flags | unp2->unp_flags) & UNP_CONNWAIT))
|
|
|
|
soisconnecting(so);
|
|
|
|
else
|
|
|
|
soisconnected(so);
|
1993-03-21 12:45:37 +03:00
|
|
|
soisconnected(so2);
|
2008-04-24 15:38:36 +04:00
|
|
|
/*
|
|
|
|
* If the connection is fully established, break the
|
|
|
|
* association with uipc_lock and give the connected
|
|
|
|
* pair a seperate lock to share. For CONNECT2, we
|
|
|
|
* require that the locks already match (the sockets
|
|
|
|
* are created that way).
|
|
|
|
*/
|
|
|
|
if (req == PRU_CONNECT)
|
|
|
|
unp_setpeerlocks(so, so2);
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
panic("unp_connect2");
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
void
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_disconnect(struct unpcb *unp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 13:27:11 +04:00
|
|
|
struct unpcb *unp2 = unp->unp_conn;
|
2008-04-24 15:38:36 +04:00
|
|
|
struct socket *so;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
|
|
|
if (unp2 == 0)
|
|
|
|
return;
|
|
|
|
unp->unp_conn = 0;
|
2008-04-24 15:38:36 +04:00
|
|
|
so = unp->unp_socket;
|
|
|
|
switch (so->so_type) {
|
1993-03-21 12:45:37 +03:00
|
|
|
case SOCK_DGRAM:
|
|
|
|
if (unp2->unp_refs == unp)
|
|
|
|
unp2->unp_refs = unp->unp_nextref;
|
|
|
|
else {
|
|
|
|
unp2 = unp2->unp_refs;
|
|
|
|
for (;;) {
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(solocked2(so, unp2->unp_socket));
|
1993-03-21 12:45:37 +03:00
|
|
|
if (unp2 == 0)
|
|
|
|
panic("unp_disconnect");
|
|
|
|
if (unp2->unp_nextref == unp)
|
|
|
|
break;
|
|
|
|
unp2 = unp2->unp_nextref;
|
|
|
|
}
|
|
|
|
unp2->unp_nextref = unp->unp_nextref;
|
|
|
|
}
|
|
|
|
unp->unp_nextref = 0;
|
2008-04-24 15:38:36 +04:00
|
|
|
so->so_state &= ~SS_ISCONNECTED;
|
1993-03-21 12:45:37 +03:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SOCK_STREAM:
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(solocked2(so, unp2->unp_socket));
|
|
|
|
soisdisconnected(so);
|
1993-03-21 12:45:37 +03:00
|
|
|
unp2->unp_conn = 0;
|
|
|
|
soisdisconnected(unp2->unp_socket);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef notdef
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_abort(struct unpcb *unp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
|
|
|
unp_detach(unp);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
void
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_shutdown(struct unpcb *unp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
|
|
|
struct socket *so;
|
|
|
|
|
|
|
|
if (unp->unp_socket->so_type == SOCK_STREAM && unp->unp_conn &&
|
|
|
|
(so = unp->unp_conn->unp_socket))
|
|
|
|
socantrcvmore(so);
|
|
|
|
}
|
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
bool
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_drop(struct unpcb *unp, int errno)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
|
|
|
struct socket *so = unp->unp_socket;
|
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
KASSERT(solocked(so));
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
so->so_error = errno;
|
|
|
|
unp_disconnect(unp);
|
|
|
|
if (so->so_head) {
|
2008-04-24 15:38:36 +04:00
|
|
|
so->so_pcb = NULL;
|
|
|
|
/* sofree() drops the socket lock */
|
1993-03-21 12:45:37 +03:00
|
|
|
sofree(so);
|
2008-04-24 15:38:36 +04:00
|
|
|
unp_free(unp);
|
|
|
|
return true;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2008-04-24 15:38:36 +04:00
|
|
|
return false;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef notdef
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_drain(void)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
|
|
|
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
int
|
2005-12-11 15:16:03 +03:00
|
|
|
unp_externalize(struct mbuf *rights, struct lwp *l)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 13:27:11 +04:00
|
|
|
struct cmsghdr *cm = mtod(rights, struct cmsghdr *);
|
2005-12-11 15:16:03 +03:00
|
|
|
struct proc *p = l->l_proc;
|
2000-06-05 10:06:07 +04:00
|
|
|
int i, *fdp;
|
2008-03-22 00:54:58 +03:00
|
|
|
file_t **rp;
|
|
|
|
file_t *fp;
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
int nfds, error = 0;
|
2000-06-05 10:06:07 +04:00
|
|
|
|
|
|
|
nfds = (cm->cmsg_len - CMSG_ALIGN(sizeof(*cm))) /
|
2008-03-22 00:54:58 +03:00
|
|
|
sizeof(file_t *);
|
|
|
|
rp = (file_t **)CMSG_DATA(cm);
|
1993-03-21 12:45:37 +03:00
|
|
|
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
fdp = malloc(nfds * sizeof(int), M_TEMP, M_WAITOK);
|
2007-10-08 19:12:05 +04:00
|
|
|
rw_enter(&p->p_cwdi->cwdi_lock, RW_READER);
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
|
1999-03-22 20:54:38 +03:00
|
|
|
/* Make sure the recipient should be able to see the descriptors.. */
|
1999-04-30 22:42:58 +04:00
|
|
|
if (p->p_cwdi->cwdi_rdir != NULL) {
|
2008-03-22 00:54:58 +03:00
|
|
|
rp = (file_t **)CMSG_DATA(cm);
|
1999-03-22 20:54:38 +03:00
|
|
|
for (i = 0; i < nfds; i++) {
|
|
|
|
fp = *rp++;
|
|
|
|
/*
|
|
|
|
* If we are in a chroot'ed directory, and
|
|
|
|
* someone wants to pass us a directory, make
|
|
|
|
* sure it's inside the subtree we're allowed
|
|
|
|
* to access.
|
|
|
|
*/
|
|
|
|
if (fp->f_type == DTYPE_VNODE) {
|
2008-03-22 00:54:58 +03:00
|
|
|
vnode_t *vp = (vnode_t *)fp->f_data;
|
1999-03-22 20:54:38 +03:00
|
|
|
if ((vp->v_type == VDIR) &&
|
2005-12-11 15:16:03 +03:00
|
|
|
!vn_isunder(vp, p->p_cwdi->cwdi_rdir, l)) {
|
1999-03-22 20:54:38 +03:00
|
|
|
error = EPERM;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
|
|
|
|
restart:
|
2008-03-22 00:54:58 +03:00
|
|
|
rp = (file_t **)CMSG_DATA(cm);
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
if (error != 0) {
|
1997-04-10 05:51:21 +04:00
|
|
|
for (i = 0; i < nfds; i++) {
|
1993-03-21 12:45:37 +03:00
|
|
|
fp = *rp;
|
1999-03-22 20:54:38 +03:00
|
|
|
/*
|
|
|
|
* zero the pointer before calling unp_discard,
|
|
|
|
* since it may end up in unp_gc()..
|
|
|
|
*/
|
1993-03-21 12:45:37 +03:00
|
|
|
*rp++ = 0;
|
1999-03-22 20:54:38 +03:00
|
|
|
unp_discard(fp);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
goto out;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
|
1997-04-10 05:51:21 +04:00
|
|
|
/*
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
* First loop -- allocate file descriptor table slots for the
|
|
|
|
* new descriptors.
|
1997-04-10 05:51:21 +04:00
|
|
|
*/
|
|
|
|
for (i = 0; i < nfds; i++) {
|
1998-01-07 07:03:38 +03:00
|
|
|
fp = *rp++;
|
2008-03-22 00:54:58 +03:00
|
|
|
if ((error = fd_alloc(p, 0, &fdp[i])) != 0) {
|
2001-06-06 21:00:00 +04:00
|
|
|
/*
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
* Back out what we've done so far.
|
2001-06-06 21:00:00 +04:00
|
|
|
*/
|
2008-03-22 00:54:58 +03:00
|
|
|
for (--i; i >= 0; i--) {
|
|
|
|
fd_abort(p, NULL, fdp[i]);
|
|
|
|
}
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
if (error == ENOSPC) {
|
2008-03-22 00:54:58 +03:00
|
|
|
fd_tryexpand(p);
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
error = 0;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* This is the error that has historically
|
|
|
|
* been returned, and some callers may
|
|
|
|
* expect it.
|
|
|
|
*/
|
|
|
|
error = EMSGSIZE;
|
|
|
|
}
|
|
|
|
goto restart;
|
2001-06-06 21:00:00 +04:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1997-04-10 05:51:21 +04:00
|
|
|
|
|
|
|
/*
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
* Now that adding them has succeeded, update all of the
|
2008-04-24 15:38:36 +04:00
|
|
|
* descriptor passing state.
|
|
|
|
*/
|
2008-03-22 00:54:58 +03:00
|
|
|
rp = (file_t **)CMSG_DATA(cm);
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
for (i = 0; i < nfds; i++) {
|
|
|
|
fp = *rp++;
|
2008-03-22 00:54:58 +03:00
|
|
|
atomic_dec_uint(&unp_rights);
|
|
|
|
fd_affix(p, fp, fdp[i]);
|
|
|
|
mutex_enter(&fp->f_lock);
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
fp->f_msgcount--;
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
|
|
|
/*
|
|
|
|
* Note that fd_affix() adds a reference to the file.
|
|
|
|
* The file may already have been closed by another
|
|
|
|
* LWP in the process, so we must drop the reference
|
|
|
|
* added by unp_internalize() with closef().
|
|
|
|
*/
|
|
|
|
closef(fp);
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copy temporary array to message and adjust length, in case of
|
2008-03-22 00:54:58 +03:00
|
|
|
* transition from large file_t pointers to ints.
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
*/
|
|
|
|
memcpy(CMSG_DATA(cm), fdp, nfds * sizeof(int));
|
2000-06-05 10:06:07 +04:00
|
|
|
cm->cmsg_len = CMSG_LEN(nfds * sizeof(int));
|
|
|
|
rights->m_len = CMSG_SPACE(nfds * sizeof(int));
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
out:
|
2007-10-08 19:12:05 +04:00
|
|
|
rw_exit(&p->p_cwdi->cwdi_lock);
|
Rework fdalloc() even further: split fdalloc() into fdalloc() and
fdexpand(). The former will return ENOSPC if there is not space
in the current filedesc table. The latter performs the expansion
of the filedesc table. This means that fdalloc() won't ever block,
and it gives callers an opportunity to clean up before the
potentially-blocking fdexpand() call.
Update all fdalloc() callers to deal with the need-to-fdexpand() case.
Rewrite unp_externalize() to use fdalloc() and fdexpand() in a
safe way, using an algorithm suggested by Bill Sommerfeld:
- Use a temporary array of integers to hold the new filedesc table
indexes. This allows us to repeat the loop if necessary.
- Loop through the array of file *'s, assigning them to filedesc table
slots. If fdalloc() indicates expansion is necessary, undo the
assignments we've done so far, expand, and retry the whole process.
- Once all file *'s have been assigned to slots, update the f_msgcount
and unp_rights counters.
- Right before we return, copy the temporary integer array to the message
buffer, and trim the length as before.
Note that once locking is added to the filedesc array, this entire
operation will be `atomic', in that the lock will be held while
file *'s are assigned to embryonic table slots, thus preventing anything
else from using them.
2001-06-07 05:29:16 +04:00
|
|
|
free(fdp, M_TEMP);
|
|
|
|
return (error);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
int
|
2008-04-24 15:38:36 +04:00
|
|
|
unp_internalize(struct mbuf **controlp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2008-03-22 00:54:58 +03:00
|
|
|
struct filedesc *fdescp = curlwp->l_fd;
|
2008-03-24 15:24:37 +03:00
|
|
|
struct mbuf *control = *controlp;
|
2003-12-30 01:08:02 +03:00
|
|
|
struct cmsghdr *newcm, *cm = mtod(control, struct cmsghdr *);
|
2008-03-22 00:54:58 +03:00
|
|
|
file_t **rp, **files;
|
|
|
|
file_t *fp;
|
2000-03-30 13:27:11 +04:00
|
|
|
int i, fd, *fdp;
|
2008-03-22 00:54:58 +03:00
|
|
|
int nfds, error;
|
|
|
|
|
|
|
|
error = 0;
|
|
|
|
newcm = NULL;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2008-03-22 00:54:58 +03:00
|
|
|
/* Sanity check the control message header. */
|
2003-07-24 11:30:48 +04:00
|
|
|
if (cm->cmsg_type != SCM_RIGHTS || cm->cmsg_level != SOL_SOCKET ||
|
2008-06-20 19:27:50 +04:00
|
|
|
cm->cmsg_len > control->m_len ||
|
|
|
|
cm->cmsg_len < CMSG_ALIGN(sizeof(*cm)))
|
1993-03-21 12:45:37 +03:00
|
|
|
return (EINVAL);
|
1997-04-10 05:51:21 +04:00
|
|
|
|
2008-03-22 00:54:58 +03:00
|
|
|
/*
|
|
|
|
* Verify that the file descriptors are valid, and acquire
|
|
|
|
* a reference to each.
|
|
|
|
*/
|
2000-06-05 10:06:07 +04:00
|
|
|
nfds = (cm->cmsg_len - CMSG_ALIGN(sizeof(*cm))) / sizeof(int);
|
|
|
|
fdp = (int *)CMSG_DATA(cm);
|
1997-04-10 05:51:21 +04:00
|
|
|
for (i = 0; i < nfds; i++) {
|
|
|
|
fd = *fdp++;
|
2008-03-22 00:54:58 +03:00
|
|
|
if ((fp = fd_getfile(fd)) == NULL) {
|
|
|
|
nfds = i + 1;
|
|
|
|
error = EBADF;
|
|
|
|
goto out;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
1997-04-10 05:51:21 +04:00
|
|
|
|
2008-03-22 00:54:58 +03:00
|
|
|
/* Allocate new space and copy header into it. */
|
|
|
|
newcm = malloc(CMSG_SPACE(nfds * sizeof(file_t *)), M_MBUF, M_WAITOK);
|
|
|
|
if (newcm == NULL) {
|
|
|
|
error = E2BIG;
|
|
|
|
goto out;
|
1997-04-10 05:51:21 +04:00
|
|
|
}
|
2008-03-22 00:54:58 +03:00
|
|
|
memcpy(newcm, cm, sizeof(struct cmsghdr));
|
|
|
|
files = (file_t **)CMSG_DATA(newcm);
|
1997-04-10 05:51:21 +04:00
|
|
|
|
|
|
|
/*
|
2008-03-22 00:54:58 +03:00
|
|
|
* Transform the file descriptors into file_t pointers, in
|
1997-04-10 05:51:21 +04:00
|
|
|
* reverse order so that if pointers are bigger than ints, the
|
2008-03-22 00:54:58 +03:00
|
|
|
* int won't get until we're done. No need to lock, as we have
|
|
|
|
* already validated the descriptors with fd_getfile().
|
1997-04-10 05:51:21 +04:00
|
|
|
*/
|
2006-11-01 14:37:59 +03:00
|
|
|
fdp = (int *)CMSG_DATA(cm) + nfds;
|
|
|
|
rp = files + nfds;
|
1997-04-10 05:51:21 +04:00
|
|
|
for (i = 0; i < nfds; i++) {
|
2008-03-22 00:54:58 +03:00
|
|
|
fp = fdescp->fd_ofiles[*--fdp]->ff_file;
|
|
|
|
KASSERT(fp != NULL);
|
|
|
|
mutex_enter(&fp->f_lock);
|
2006-11-01 14:37:59 +03:00
|
|
|
*--rp = fp;
|
1993-03-21 12:45:37 +03:00
|
|
|
fp->f_count++;
|
|
|
|
fp->f_msgcount++;
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
|
|
|
atomic_inc_uint(&unp_rights);
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
/* Release descriptor references. */
|
|
|
|
fdp = (int *)CMSG_DATA(cm);
|
|
|
|
for (i = 0; i < nfds; i++) {
|
|
|
|
fd_putfile(*fdp++);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2003-12-30 01:08:02 +03:00
|
|
|
|
2008-03-22 00:54:58 +03:00
|
|
|
if (error == 0) {
|
2008-03-24 15:24:37 +03:00
|
|
|
if (control->m_flags & M_EXT) {
|
|
|
|
m_freem(control);
|
|
|
|
*controlp = control = m_get(M_WAIT, MT_CONTROL);
|
|
|
|
}
|
2008-03-22 00:54:58 +03:00
|
|
|
MEXTADD(control, newcm, CMSG_SPACE(nfds * sizeof(file_t *)),
|
2003-12-30 01:08:02 +03:00
|
|
|
M_MBUF, NULL, NULL);
|
|
|
|
cm = newcm;
|
2008-03-22 00:54:58 +03:00
|
|
|
/*
|
|
|
|
* Adjust message & mbuf to note amount of space
|
|
|
|
* actually used.
|
|
|
|
*/
|
|
|
|
cm->cmsg_len = CMSG_LEN(nfds * sizeof(file_t *));
|
|
|
|
control->m_len = CMSG_SPACE(nfds * sizeof(file_t *));
|
2003-12-30 01:08:02 +03:00
|
|
|
}
|
|
|
|
|
2008-03-22 00:54:58 +03:00
|
|
|
return error;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
1998-01-08 01:57:09 +03:00
|
|
|
struct mbuf *
|
2006-07-24 02:06:03 +04:00
|
|
|
unp_addsockcred(struct lwp *l, struct mbuf *control)
|
1998-01-08 01:57:09 +03:00
|
|
|
{
|
|
|
|
struct cmsghdr *cmp;
|
|
|
|
struct sockcred *sc;
|
|
|
|
struct mbuf *m, *n;
|
2000-06-05 10:06:07 +04:00
|
|
|
int len, space, i;
|
1998-01-08 01:57:09 +03:00
|
|
|
|
2006-07-24 02:06:03 +04:00
|
|
|
len = CMSG_LEN(SOCKCREDSIZE(kauth_cred_ngroups(l->l_cred)));
|
|
|
|
space = CMSG_SPACE(SOCKCREDSIZE(kauth_cred_ngroups(l->l_cred)));
|
1998-01-08 01:57:09 +03:00
|
|
|
|
|
|
|
m = m_get(M_WAIT, MT_CONTROL);
|
2000-06-05 10:06:07 +04:00
|
|
|
if (space > MLEN) {
|
|
|
|
if (space > MCLBYTES)
|
|
|
|
MEXTMALLOC(m, space, M_WAITOK);
|
1998-01-08 01:57:09 +03:00
|
|
|
else
|
2003-02-26 09:31:08 +03:00
|
|
|
m_clget(m, M_WAIT);
|
1998-01-08 01:57:09 +03:00
|
|
|
if ((m->m_flags & M_EXT) == 0) {
|
|
|
|
m_free(m);
|
|
|
|
return (control);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-06-05 10:06:07 +04:00
|
|
|
m->m_len = space;
|
1998-01-08 01:57:09 +03:00
|
|
|
m->m_next = NULL;
|
|
|
|
cmp = mtod(m, struct cmsghdr *);
|
|
|
|
sc = (struct sockcred *)CMSG_DATA(cmp);
|
|
|
|
cmp->cmsg_len = len;
|
|
|
|
cmp->cmsg_level = SOL_SOCKET;
|
|
|
|
cmp->cmsg_type = SCM_CREDS;
|
2006-07-24 02:06:03 +04:00
|
|
|
sc->sc_uid = kauth_cred_getuid(l->l_cred);
|
|
|
|
sc->sc_euid = kauth_cred_geteuid(l->l_cred);
|
|
|
|
sc->sc_gid = kauth_cred_getgid(l->l_cred);
|
|
|
|
sc->sc_egid = kauth_cred_getegid(l->l_cred);
|
|
|
|
sc->sc_ngroups = kauth_cred_ngroups(l->l_cred);
|
1998-01-08 01:57:09 +03:00
|
|
|
for (i = 0; i < sc->sc_ngroups; i++)
|
2006-07-24 02:06:03 +04:00
|
|
|
sc->sc_groups[i] = kauth_cred_group(l->l_cred, i);
|
1998-01-08 01:57:09 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If a control message already exists, append us to the end.
|
|
|
|
*/
|
|
|
|
if (control != NULL) {
|
|
|
|
for (n = control; n->m_next != NULL; n = n->m_next)
|
|
|
|
;
|
|
|
|
n->m_next = m;
|
|
|
|
} else
|
|
|
|
control = m;
|
|
|
|
|
|
|
|
return (control);
|
|
|
|
}
|
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
int unp_defer, unp_gcing;
|
|
|
|
extern struct domain unixdomain;
|
|
|
|
|
1999-03-22 20:54:38 +03:00
|
|
|
/*
|
|
|
|
* Comment added long after the fact explaining what's going on here.
|
|
|
|
* Do a mark-sweep GC of file descriptors on the system, to free up
|
|
|
|
* any which are caught in flight to an about-to-be-closed socket.
|
|
|
|
*
|
|
|
|
* Traditional mark-sweep gc's start at the "root", and mark
|
|
|
|
* everything reachable from the root (which, in our case would be the
|
|
|
|
* process table). The mark bits are cleared during the sweep.
|
|
|
|
*
|
|
|
|
* XXX For some inexplicable reason (perhaps because the file
|
|
|
|
* descriptor tables used to live in the u area which could be swapped
|
|
|
|
* out and thus hard to reach), we do multiple scans over the set of
|
|
|
|
* descriptors, using use *two* mark bits per object (DEFER and MARK).
|
|
|
|
* Whenever we find a descriptor which references other descriptors,
|
|
|
|
* the ones it references are marked with both bits, and we iterate
|
|
|
|
* over the whole file table until there are no more DEFER bits set.
|
|
|
|
* We also make an extra pass *before* the GC to clear the mark bits,
|
|
|
|
* which could have been cleared at almost no cost during the previous
|
|
|
|
* sweep.
|
|
|
|
*/
|
1993-06-27 10:01:27 +04:00
|
|
|
void
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_gc(void)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2008-03-22 00:54:58 +03:00
|
|
|
file_t *fp, *nextfp;
|
2000-03-30 13:27:11 +04:00
|
|
|
struct socket *so, *so1;
|
2008-03-22 00:54:58 +03:00
|
|
|
file_t **extra_ref, **fpp;
|
|
|
|
int nunref, nslots, i;
|
1993-03-21 12:45:37 +03:00
|
|
|
|
2008-03-22 00:54:58 +03:00
|
|
|
if (atomic_swap_uint(&unp_gcing, 1) == 1)
|
1993-03-21 12:45:37 +03:00
|
|
|
return;
|
2008-03-22 00:54:58 +03:00
|
|
|
|
|
|
|
restart:
|
|
|
|
nslots = nfiles * 2;
|
|
|
|
extra_ref = kmem_alloc(nslots * sizeof(file_t *), KM_SLEEP);
|
1999-03-22 20:54:38 +03:00
|
|
|
|
2007-10-08 19:12:05 +04:00
|
|
|
mutex_enter(&filelist_lock);
|
2008-03-22 00:54:58 +03:00
|
|
|
unp_defer = 0;
|
2007-10-08 19:12:05 +04:00
|
|
|
|
1999-03-22 20:54:38 +03:00
|
|
|
/* Clear mark bits */
|
2008-03-22 00:54:58 +03:00
|
|
|
LIST_FOREACH(fp, &filehead, f_list) {
|
|
|
|
atomic_and_uint(&fp->f_flag, ~(FMARK|FDEFER));
|
|
|
|
}
|
1999-03-22 20:54:38 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Iterate over the set of descriptors, marking ones believed
|
|
|
|
* (based on refcount) to be referenced from a process, and
|
|
|
|
* marking for rescan descriptors which are queued on a socket.
|
|
|
|
*/
|
1993-03-21 12:45:37 +03:00
|
|
|
do {
|
2002-09-04 05:32:31 +04:00
|
|
|
LIST_FOREACH(fp, &filehead, f_list) {
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_enter(&fp->f_lock);
|
|
|
|
if (fp->f_flag & FDEFER) {
|
|
|
|
atomic_and_uint(&fp->f_flag, ~FDEFER);
|
1993-03-21 12:45:37 +03:00
|
|
|
unp_defer--;
|
2008-03-22 00:54:58 +03:00
|
|
|
KASSERT(fp->f_count != 0);
|
1993-03-21 12:45:37 +03:00
|
|
|
} else {
|
2007-10-08 19:12:05 +04:00
|
|
|
if (fp->f_count == 0 ||
|
|
|
|
(fp->f_flag & FMARK) ||
|
|
|
|
fp->f_count == fp->f_msgcount) {
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
1993-03-21 12:45:37 +03:00
|
|
|
continue;
|
2007-10-08 19:12:05 +04:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2008-03-22 00:54:58 +03:00
|
|
|
atomic_or_uint(&fp->f_flag, FMARK);
|
1999-03-22 20:54:38 +03:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
if (fp->f_type != DTYPE_SOCKET ||
|
2008-04-24 15:38:36 +04:00
|
|
|
(so = fp->f_data) == NULL ||
|
2007-10-08 19:12:05 +04:00
|
|
|
so->so_proto->pr_domain != &unixdomain ||
|
|
|
|
(so->so_proto->pr_flags&PR_RIGHTS) == 0) {
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
1993-03-21 12:45:37 +03:00
|
|
|
continue;
|
2007-10-08 19:12:05 +04:00
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
#ifdef notdef
|
|
|
|
if (so->so_rcv.sb_flags & SB_LOCK) {
|
2008-03-22 02:38:40 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
|
|
|
mutex_exit(&filelist_lock);
|
|
|
|
kmem_free(extra_ref, nslots * sizeof(file_t *));
|
1993-03-21 12:45:37 +03:00
|
|
|
/*
|
|
|
|
* This is problematical; it's not clear
|
|
|
|
* we need to wait for the sockbuf to be
|
|
|
|
* unlocked (on a uniprocessor, at least),
|
|
|
|
* and it's also not clear what to do
|
|
|
|
* if sbwait returns an error due to receipt
|
|
|
|
* of a signal. If sbwait does return
|
|
|
|
* an error, we'll go into an infinite
|
|
|
|
* loop. Delete all of this for now.
|
|
|
|
*/
|
|
|
|
(void) sbwait(&so->so_rcv);
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
#endif
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
2007-10-08 19:12:05 +04:00
|
|
|
|
2008-04-24 15:38:36 +04:00
|
|
|
/*
|
|
|
|
* XXX Locking a socket with filelist_lock held
|
|
|
|
* is ugly. filelist_lock can be taken by the
|
|
|
|
* pagedaemon when reclaiming items from file_cache.
|
|
|
|
* Socket activity could delay the pagedaemon.
|
|
|
|
*/
|
|
|
|
solock(so);
|
1999-03-22 20:54:38 +03:00
|
|
|
unp_scan(so->so_rcv.sb_mb, unp_mark, 0);
|
|
|
|
/*
|
2008-03-22 00:54:58 +03:00
|
|
|
* Mark descriptors referenced from sockets queued
|
|
|
|
* on the accept queue as well.
|
1999-03-22 20:54:38 +03:00
|
|
|
*/
|
|
|
|
if (so->so_options & SO_ACCEPTCONN) {
|
2002-09-04 05:32:31 +04:00
|
|
|
TAILQ_FOREACH(so1, &so->so_q0, so_qe) {
|
1999-03-22 20:54:38 +03:00
|
|
|
unp_scan(so1->so_rcv.sb_mb, unp_mark, 0);
|
|
|
|
}
|
2002-09-04 05:32:31 +04:00
|
|
|
TAILQ_FOREACH(so1, &so->so_q, so_qe) {
|
1999-03-22 20:54:38 +03:00
|
|
|
unp_scan(so1->so_rcv.sb_mb, unp_mark, 0);
|
|
|
|
}
|
|
|
|
}
|
2008-04-24 15:38:36 +04:00
|
|
|
sounlock(so);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
} while (unp_defer);
|
2007-10-08 19:12:05 +04:00
|
|
|
|
1994-05-04 13:50:11 +04:00
|
|
|
/*
|
1999-03-22 20:54:38 +03:00
|
|
|
* Sweep pass. Find unmarked descriptors, and free them.
|
|
|
|
*
|
1994-05-04 13:50:11 +04:00
|
|
|
* We grab an extra reference to each of the file table entries
|
|
|
|
* that are not otherwise accessible and then free the rights
|
|
|
|
* that are stored in messages on them.
|
|
|
|
*
|
2003-02-23 17:37:32 +03:00
|
|
|
* The bug in the original code is a little tricky, so I'll describe
|
1994-05-04 13:50:11 +04:00
|
|
|
* what's wrong with it here.
|
|
|
|
*
|
|
|
|
* It is incorrect to simply unp_discard each entry for f_msgcount
|
|
|
|
* times -- consider the case of sockets A and B that contain
|
|
|
|
* references to each other. On a last close of some other socket,
|
|
|
|
* we trigger a gc since the number of outstanding rights (unp_rights)
|
|
|
|
* is non-zero. If during the sweep phase the gc code un_discards,
|
|
|
|
* we end up doing a (full) closef on the descriptor. A closef on A
|
|
|
|
* results in the following chain. Closef calls soo_close, which
|
|
|
|
* calls soclose. Soclose calls first (through the switch
|
|
|
|
* uipc_usrreq) unp_detach, which re-invokes unp_gc. Unp_gc simply
|
|
|
|
* returns because the previous instance had set unp_gcing, and
|
|
|
|
* we return all the way back to soclose, which marks the socket
|
|
|
|
* with SS_NOFDREF, and then calls sofree. Sofree calls sorflush
|
|
|
|
* to free up the rights that are queued in messages on the socket A,
|
|
|
|
* i.e., the reference on B. The sorflush calls via the dom_dispose
|
|
|
|
* switch unp_dispose, which unp_scans with unp_discard. This second
|
|
|
|
* instance of unp_discard just calls closef on B.
|
|
|
|
*
|
|
|
|
* Well, a similar chain occurs on B, resulting in a sorflush on B,
|
|
|
|
* which results in another closef on A. Unfortunately, A is already
|
|
|
|
* being closed, and the descriptor has already been marked with
|
|
|
|
* SS_NOFDREF, and soclose panics at this point.
|
|
|
|
*
|
|
|
|
* Here, we first take an extra reference to each inaccessible
|
1999-03-22 20:54:38 +03:00
|
|
|
* descriptor. Then, if the inaccessible descriptor is a
|
|
|
|
* socket, we call sorflush in case it is a Unix domain
|
|
|
|
* socket. After we destroy all the rights carried in
|
|
|
|
* messages, we do a last closef to get rid of our extra
|
|
|
|
* reference. This is the last close, and the unp_detach etc
|
|
|
|
* will shut down the socket.
|
1994-05-04 13:50:11 +04:00
|
|
|
*
|
|
|
|
* 91/09/19, bsy@cs.cmu.edu
|
|
|
|
*/
|
2008-03-22 00:54:58 +03:00
|
|
|
if (nslots < nfiles) {
|
2008-03-22 02:38:40 +03:00
|
|
|
mutex_exit(&filelist_lock);
|
|
|
|
kmem_free(extra_ref, nslots * sizeof(file_t *));
|
|
|
|
goto restart;
|
2008-03-22 00:54:58 +03:00
|
|
|
}
|
2002-09-04 05:32:31 +04:00
|
|
|
for (nunref = 0, fp = LIST_FIRST(&filehead), fpp = extra_ref; fp != 0;
|
1994-08-30 07:04:28 +04:00
|
|
|
fp = nextfp) {
|
2002-09-04 05:32:31 +04:00
|
|
|
nextfp = LIST_NEXT(fp, f_list);
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_enter(&fp->f_lock);
|
2003-02-23 17:37:32 +03:00
|
|
|
if (fp->f_count != 0 &&
|
|
|
|
fp->f_count == fp->f_msgcount && !(fp->f_flag & FMARK)) {
|
1994-05-04 13:50:11 +04:00
|
|
|
*fpp++ = fp;
|
|
|
|
nunref++;
|
|
|
|
fp->f_count++;
|
|
|
|
}
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
2007-10-08 19:12:05 +04:00
|
|
|
mutex_exit(&filelist_lock);
|
|
|
|
|
1999-03-22 20:54:38 +03:00
|
|
|
for (i = nunref, fpp = extra_ref; --i >= 0; ++fpp) {
|
|
|
|
fp = *fpp;
|
2008-04-24 15:38:36 +04:00
|
|
|
if (fp->f_type == DTYPE_SOCKET) {
|
|
|
|
so = fp->f_data;
|
|
|
|
solock(so);
|
2008-03-22 00:54:58 +03:00
|
|
|
sorflush(fp->f_data);
|
2008-04-24 15:38:36 +04:00
|
|
|
sounlock(so);
|
|
|
|
}
|
1999-03-22 20:54:38 +03:00
|
|
|
}
|
1999-05-06 00:01:01 +04:00
|
|
|
for (i = nunref, fpp = extra_ref; --i >= 0; ++fpp) {
|
2008-03-22 00:54:58 +03:00
|
|
|
closef(*fpp);
|
1999-05-06 00:01:01 +04:00
|
|
|
}
|
2008-03-22 00:54:58 +03:00
|
|
|
kmem_free(extra_ref, nslots * sizeof(file_t *));
|
|
|
|
atomic_swap_uint(&unp_gcing, 0);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
void
|
2004-04-19 01:48:15 +04:00
|
|
|
unp_dispose(struct mbuf *m)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
1994-05-04 13:50:11 +04:00
|
|
|
|
1993-03-21 12:45:37 +03:00
|
|
|
if (m)
|
1999-03-22 20:54:38 +03:00
|
|
|
unp_scan(m, unp_discard, 1);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
void
|
2008-03-22 00:54:58 +03:00
|
|
|
unp_scan(struct mbuf *m0, void (*op)(file_t *), int discard)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2000-03-30 13:27:11 +04:00
|
|
|
struct mbuf *m;
|
2008-03-22 00:54:58 +03:00
|
|
|
file_t **rp;
|
2000-03-30 13:27:11 +04:00
|
|
|
struct cmsghdr *cm;
|
|
|
|
int i;
|
1993-03-21 12:45:37 +03:00
|
|
|
int qfds;
|
|
|
|
|
|
|
|
while (m0) {
|
2000-06-05 20:29:45 +04:00
|
|
|
for (m = m0; m; m = m->m_next) {
|
1993-03-21 12:45:37 +03:00
|
|
|
if (m->m_type == MT_CONTROL &&
|
|
|
|
m->m_len >= sizeof(*cm)) {
|
|
|
|
cm = mtod(m, struct cmsghdr *);
|
|
|
|
if (cm->cmsg_level != SOL_SOCKET ||
|
2008-04-20 11:47:18 +04:00
|
|
|
cm->cmsg_type != SCM_RIGHTS)
|
1993-03-21 12:45:37 +03:00
|
|
|
continue;
|
2000-06-05 20:29:45 +04:00
|
|
|
qfds = (cm->cmsg_len - CMSG_ALIGN(sizeof(*cm)))
|
2008-03-22 00:54:58 +03:00
|
|
|
/ sizeof(file_t *);
|
|
|
|
rp = (file_t **)CMSG_DATA(cm);
|
1999-03-22 20:54:38 +03:00
|
|
|
for (i = 0; i < qfds; i++) {
|
2008-03-22 00:54:58 +03:00
|
|
|
file_t *fp = *rp;
|
1999-03-22 20:54:38 +03:00
|
|
|
if (discard)
|
|
|
|
*rp = 0;
|
|
|
|
(*op)(fp);
|
|
|
|
rp++;
|
|
|
|
}
|
1993-03-21 12:45:37 +03:00
|
|
|
break; /* XXX, but saves time */
|
|
|
|
}
|
2000-06-05 20:29:45 +04:00
|
|
|
}
|
2001-10-19 00:17:24 +04:00
|
|
|
m0 = m0->m_nextpkt;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
void
|
2008-03-22 00:54:58 +03:00
|
|
|
unp_mark(file_t *fp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2005-02-27 00:34:55 +03:00
|
|
|
|
2007-10-08 19:12:05 +04:00
|
|
|
if (fp == NULL)
|
1993-03-21 12:45:37 +03:00
|
|
|
return;
|
1999-03-22 20:54:38 +03:00
|
|
|
|
|
|
|
/* If we're already deferred, don't screw up the defer count */
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_enter(&fp->f_lock);
|
2007-10-08 19:12:05 +04:00
|
|
|
if (fp->f_flag & (FMARK | FDEFER)) {
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
1999-03-22 20:54:38 +03:00
|
|
|
return;
|
2007-10-08 19:12:05 +04:00
|
|
|
}
|
1999-03-22 20:54:38 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Minimize the number of deferrals... Sockets are the only
|
|
|
|
* type of descriptor which can hold references to another
|
|
|
|
* descriptor, so just mark other descriptors, and defer
|
|
|
|
* unmarked sockets for the next pass.
|
|
|
|
*/
|
|
|
|
if (fp->f_type == DTYPE_SOCKET) {
|
|
|
|
unp_defer++;
|
2008-03-22 00:54:58 +03:00
|
|
|
KASSERT(fp->f_count != 0);
|
|
|
|
atomic_or_uint(&fp->f_flag, FDEFER);
|
1999-03-22 20:54:38 +03:00
|
|
|
} else {
|
2008-03-22 00:54:58 +03:00
|
|
|
atomic_or_uint(&fp->f_flag, FMARK);
|
1999-03-22 20:54:38 +03:00
|
|
|
}
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
1999-03-22 20:54:38 +03:00
|
|
|
return;
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|
|
|
|
|
1993-06-27 10:01:27 +04:00
|
|
|
void
|
2008-03-22 00:54:58 +03:00
|
|
|
unp_discard(file_t *fp)
|
1993-03-21 12:45:37 +03:00
|
|
|
{
|
2008-03-22 00:54:58 +03:00
|
|
|
|
1999-03-22 20:54:38 +03:00
|
|
|
if (fp == NULL)
|
|
|
|
return;
|
2008-03-22 00:54:58 +03:00
|
|
|
|
|
|
|
mutex_enter(&fp->f_lock);
|
|
|
|
KASSERT(fp->f_count > 0);
|
1993-03-21 12:45:37 +03:00
|
|
|
fp->f_msgcount--;
|
2008-03-22 00:54:58 +03:00
|
|
|
mutex_exit(&fp->f_lock);
|
|
|
|
atomic_dec_uint(&unp_rights);
|
|
|
|
(void)closef(fp);
|
1993-03-21 12:45:37 +03:00
|
|
|
}
|