xref: /titanic_51/usr/src/uts/common/fs/sockfs/sockcommon.c (revision c0dd49bdd68c0d758a67d56f07826f3b45cfc664)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #include <sys/types.h>
28 #include <sys/param.h>
29 #include <sys/systm.h>
30 #include <sys/sysmacros.h>
31 #include <sys/debug.h>
32 #include <sys/cmn_err.h>
33 #include <sys/vfs.h>
34 #include <sys/policy.h>
35 #include <sys/modctl.h>
36 
37 #include <sys/sunddi.h>
38 
39 #include <sys/strsun.h>
40 #include <sys/stropts.h>
41 #include <sys/strsubr.h>
42 #include <sys/socket.h>
43 #include <sys/socketvar.h>
44 #include <sys/uio.h>
45 
46 #include <inet/ipclassifier.h>
47 #include <fs/sockfs/sockcommon.h>
48 #include <fs/sockfs/nl7c.h>
49 #include <fs/sockfs/socktpi.h>
50 #include <fs/sockfs/sodirect.h>
51 #include <inet/ip.h>
52 
53 extern int xnet_skip_checks, xnet_check_print, xnet_truncate_print;
54 
55 /*
56  * Common socket access functions.
57  *
58  * Instead of accessing the sonode switch directly (i.e., SOP_xxx()),
59  * the socket_xxx() function should be used.
60  */
61 
62 /*
63  * Try to create a new sonode of the requested <family, type, protocol>.
64  */
65 /* ARGSUSED */
66 struct sonode *
67 socket_create(int family, int type, int protocol, char *devpath, char *mod,
68     int flags, int version, struct cred *cr, int *errorp)
69 {
70 	struct sonode *so;
71 	struct sockparams *sp = NULL;
72 	int saved_error;
73 
74 	/*
75 	 * Look for a sockparams entry that match the given criteria.
76 	 * solookup() returns with the entry held.
77 	 */
78 	*errorp = solookup(family, type, protocol, &sp);
79 	saved_error = *errorp;
80 	if (sp == NULL) {
81 		int kmflags = (flags == SOCKET_SLEEP) ? KM_SLEEP : KM_NOSLEEP;
82 		/*
83 		 * There is no matching sockparams entry. An ephemeral entry is
84 		 * created if the caller specifies a device or a socket module.
85 		 */
86 		if (devpath != NULL) {
87 			saved_error = 0;
88 			sp = sockparams_hold_ephemeral_bydev(family, type,
89 			    protocol, devpath, kmflags, errorp);
90 		} else if (mod != NULL) {
91 			saved_error = 0;
92 			sp = sockparams_hold_ephemeral_bymod(family, type,
93 			    protocol, mod, kmflags, errorp);
94 		} else {
95 			*errorp = solookup(family, type, 0, &sp);
96 		}
97 
98 		if (sp == NULL) {
99 			if (saved_error && (*errorp == EPROTONOSUPPORT ||
100 			    *errorp == EPROTOTYPE || *errorp == ENOPROTOOPT))
101 				*errorp = saved_error;
102 			return (NULL);
103 		}
104 	}
105 
106 	ASSERT(sp->sp_smod_info != NULL);
107 	ASSERT(flags == SOCKET_SLEEP || flags == SOCKET_NOSLEEP);
108 	sp->sp_stats.sps_ncreate.value.ui64++;
109 	so = sp->sp_smod_info->smod_sock_create_func(sp, family, type,
110 	    protocol, version, flags, errorp, cr);
111 	if (so == NULL) {
112 		SOCKPARAMS_DEC_REF(sp);
113 	} else {
114 		if ((*errorp = SOP_INIT(so, NULL, cr, flags)) == 0) {
115 			/* Cannot fail, only bumps so_count */
116 			(void) VOP_OPEN(&SOTOV(so), FREAD|FWRITE, cr, NULL);
117 		} else {
118 			if (saved_error && (*errorp == EPROTONOSUPPORT ||
119 			    *errorp == EPROTOTYPE || *errorp == ENOPROTOOPT))
120 				*errorp = saved_error;
121 			socket_destroy(so);
122 			so = NULL;
123 		}
124 	}
125 	return (so);
126 }
127 
128 struct sonode *
129 socket_newconn(struct sonode *parent, sock_lower_handle_t lh,
130     sock_downcalls_t *dc, int flags, int *errorp)
131 {
132 	struct sonode *so;
133 	struct sockparams *sp;
134 	struct cred *cr;
135 
136 	if ((cr = CRED()) == NULL)
137 		cr = kcred;
138 
139 	sp = parent->so_sockparams;
140 	ASSERT(sp != NULL);
141 
142 	sp->sp_stats.sps_ncreate.value.ui64++;
143 	so = sp->sp_smod_info->smod_sock_create_func(sp, parent->so_family,
144 	    parent->so_type, parent->so_protocol, parent->so_version, flags,
145 	    errorp, cr);
146 	if (so != NULL) {
147 		SOCKPARAMS_INC_REF(sp);
148 
149 		so->so_proto_handle = lh;
150 		so->so_downcalls = dc;
151 		/*
152 		 * This function may be called in interrupt context, and CRED()
153 		 * will be NULL. In this case, pass in kcred.
154 		 */
155 		if ((*errorp = SOP_INIT(so, parent, cr, flags)) == 0) {
156 			/* Cannot fail, only bumps so_count */
157 			(void) VOP_OPEN(&SOTOV(so), FREAD|FWRITE, cr, NULL);
158 		} else  {
159 			socket_destroy(so);
160 			so = NULL;
161 		}
162 	}
163 
164 	return (so);
165 }
166 
167 /*
168  * Bind local endpoint.
169  */
170 int
171 socket_bind(struct sonode *so, struct sockaddr *name, socklen_t namelen,
172     int flags, cred_t *cr)
173 {
174 	return (SOP_BIND(so, name, namelen, flags, cr));
175 }
176 
177 /*
178  * Turn socket into a listen socket.
179  */
180 int
181 socket_listen(struct sonode *so, int backlog, cred_t *cr)
182 {
183 	if (backlog < 0) {
184 		backlog = 0;
185 	}
186 
187 	/*
188 	 * Use the same qlimit as in BSD. BSD checks the qlimit
189 	 * before queuing the next connection implying that a
190 	 * listen(sock, 0) allows one connection to be queued.
191 	 * BSD also uses 1.5 times the requested backlog.
192 	 *
193 	 * XNS Issue 4 required a strict interpretation of the backlog.
194 	 * This has been waived subsequently for Issue 4 and the change
195 	 * incorporated in XNS Issue 5. So we aren't required to do
196 	 * anything special for XPG apps.
197 	 */
198 	if (backlog >= (INT_MAX - 1) / 3)
199 		backlog = INT_MAX;
200 	else
201 		backlog = backlog * 3 / 2 + 1;
202 
203 	return (SOP_LISTEN(so, backlog, cr));
204 }
205 
206 /*
207  * Accept incoming connection.
208  */
209 int
210 socket_accept(struct sonode *lso, int fflag, cred_t *cr, struct sonode **nsop)
211 {
212 	return (SOP_ACCEPT(lso, fflag, cr, nsop));
213 }
214 
215 /*
216  * Active open.
217  */
218 int
219 socket_connect(struct sonode *so, const struct sockaddr *name,
220     socklen_t namelen, int fflag, int flags, cred_t *cr)
221 {
222 	int error;
223 
224 	/*
225 	 * Handle a connect to a name parameter of type AF_UNSPEC like a
226 	 * connect to a null address. This is the portable method to
227 	 * unconnect a socket.
228 	 */
229 	if ((namelen >= sizeof (sa_family_t)) &&
230 	    (name->sa_family == AF_UNSPEC)) {
231 		name = NULL;
232 		namelen = 0;
233 	}
234 
235 	error = SOP_CONNECT(so, name, namelen, fflag, flags, cr);
236 
237 	if (error == EHOSTUNREACH && flags & _SOCONNECT_XPG4_2) {
238 		/*
239 		 * X/Open specification contains a requirement that
240 		 * ENETUNREACH be returned but does not require
241 		 * EHOSTUNREACH. In order to keep the test suite
242 		 * happy we mess with the errno here.
243 		 */
244 		error = ENETUNREACH;
245 	}
246 
247 	return (error);
248 }
249 
250 /*
251  * Get address of remote node.
252  */
253 int
254 socket_getpeername(struct sonode *so, struct sockaddr *addr,
255     socklen_t *addrlen, boolean_t accept, cred_t *cr)
256 {
257 	ASSERT(*addrlen > 0);
258 	return (SOP_GETPEERNAME(so, addr, addrlen, accept, cr));
259 
260 }
261 
262 /*
263  * Get local address.
264  */
265 int
266 socket_getsockname(struct sonode *so, struct sockaddr *addr,
267     socklen_t *addrlen, cred_t *cr)
268 {
269 	return (SOP_GETSOCKNAME(so, addr, addrlen, cr));
270 
271 }
272 
273 /*
274  * Called from shutdown().
275  */
276 int
277 socket_shutdown(struct sonode *so, int how, cred_t *cr)
278 {
279 	return (SOP_SHUTDOWN(so, how, cr));
280 }
281 
282 /*
283  * Get socket options.
284  */
285 /*ARGSUSED*/
286 int
287 socket_getsockopt(struct sonode *so, int level, int option_name,
288     void *optval, socklen_t *optlenp, int flags, cred_t *cr)
289 {
290 	return (SOP_GETSOCKOPT(so, level, option_name, optval,
291 	    optlenp, flags, cr));
292 }
293 
294 /*
295  * Set socket options
296  */
297 int
298 socket_setsockopt(struct sonode *so, int level, int option_name,
299     const void *optval, t_uscalar_t optlen, cred_t *cr)
300 {
301 	int val = 1;
302 	/* Caller allocates aligned optval, or passes null */
303 	ASSERT(((uintptr_t)optval & (sizeof (t_scalar_t) - 1)) == 0);
304 	/* If optval is null optlen is 0, and vice-versa */
305 	ASSERT(optval != NULL || optlen == 0);
306 	ASSERT(optlen != 0 || optval == NULL);
307 
308 	if (optval == NULL && optlen == 0)
309 		optval = &val;
310 
311 	return (SOP_SETSOCKOPT(so, level, option_name, optval, optlen, cr));
312 }
313 
314 int
315 socket_sendmsg(struct sonode *so, struct nmsghdr *msg, struct uio *uiop,
316     cred_t *cr)
317 {
318 	int error = 0;
319 	ssize_t orig_resid = uiop->uio_resid;
320 
321 	/*
322 	 * Do not bypass the cache if we are doing a local (AF_UNIX) write.
323 	 */
324 	if (so->so_family == AF_UNIX)
325 		uiop->uio_extflg |= UIO_COPY_CACHED;
326 	else
327 		uiop->uio_extflg &= ~UIO_COPY_CACHED;
328 
329 	error = SOP_SENDMSG(so, msg, uiop, cr);
330 	switch (error) {
331 	default:
332 		break;
333 	case EINTR:
334 	case ENOMEM:
335 	/* EAGAIN is EWOULDBLOCK */
336 	case EWOULDBLOCK:
337 		/* We did a partial send */
338 		if (uiop->uio_resid != orig_resid)
339 			error = 0;
340 		break;
341 	case EPIPE:
342 		if ((so->so_mode & SM_KERNEL) == 0)
343 			tsignal(curthread, SIGPIPE);
344 		break;
345 	}
346 
347 	return (error);
348 }
349 
350 int
351 socket_sendmblk(struct sonode *so, struct nmsghdr *msg, int fflag,
352     struct cred *cr, mblk_t **mpp)
353 {
354 	int error = 0;
355 
356 	error = SOP_SENDMBLK(so, msg, fflag, cr, mpp);
357 	if (error == EPIPE) {
358 		tsignal(curthread, SIGPIPE);
359 	}
360 	return (error);
361 }
362 
363 int
364 socket_recvmsg(struct sonode *so, struct nmsghdr *msg, struct uio *uiop,
365     cred_t *cr)
366 {
367 	int error;
368 	ssize_t orig_resid = uiop->uio_resid;
369 
370 	/*
371 	 * Do not bypass the cache when reading data, as the application
372 	 * is likely to access the data shortly.
373 	 */
374 	uiop->uio_extflg |= UIO_COPY_CACHED;
375 
376 	error = SOP_RECVMSG(so, msg, uiop, cr);
377 
378 	switch (error) {
379 	case EINTR:
380 	/* EAGAIN is EWOULDBLOCK */
381 	case EWOULDBLOCK:
382 		/* We did a partial read */
383 		if (uiop->uio_resid != orig_resid)
384 			error = 0;
385 		break;
386 	default:
387 		break;
388 	}
389 	return (error);
390 }
391 
392 int
393 socket_ioctl(struct sonode *so, int cmd, intptr_t arg, int mode,
394     struct cred *cr, int32_t *rvalp)
395 {
396 	return (SOP_IOCTL(so, cmd, arg, mode, cr, rvalp));
397 }
398 
399 int
400 socket_poll(struct sonode *so, short events, int anyyet, short *reventsp,
401     struct pollhead **phpp)
402 {
403 	return (SOP_POLL(so, events, anyyet, reventsp, phpp));
404 }
405 
406 int
407 socket_close(struct sonode *so, int flag, struct cred *cr)
408 {
409 	return (VOP_CLOSE(SOTOV(so), flag, 1, 0, cr, NULL));
410 }
411 
412 int
413 socket_close_internal(struct sonode *so, int flag, cred_t *cr)
414 {
415 	ASSERT(so->so_count == 0);
416 
417 	return (SOP_CLOSE(so, flag, cr));
418 }
419 
420 void
421 socket_destroy(struct sonode *so)
422 {
423 	vn_invalid(SOTOV(so));
424 	VN_RELE(SOTOV(so));
425 }
426 
427 /* ARGSUSED */
428 void
429 socket_destroy_internal(struct sonode *so, cred_t *cr)
430 {
431 	struct sockparams *sp = so->so_sockparams;
432 	ASSERT(so->so_count == 0 && sp != NULL);
433 
434 	sp->sp_smod_info->smod_sock_destroy_func(so);
435 
436 	SOCKPARAMS_DEC_REF(sp);
437 }
438 
439 /*
440  * TODO Once the common vnode ops is available, then the vnops argument
441  * should be removed.
442  */
443 /*ARGSUSED*/
444 int
445 sonode_constructor(void *buf, void *cdrarg, int kmflags)
446 {
447 	struct sonode *so = buf;
448 	struct vnode *vp;
449 
450 	vp = so->so_vnode = vn_alloc(kmflags);
451 	if (vp == NULL) {
452 		return (-1);
453 	}
454 	vp->v_data = so;
455 	vn_setops(vp, socket_vnodeops);
456 
457 	so->so_priv 		= NULL;
458 	so->so_oobmsg		= NULL;
459 
460 	so->so_proto_handle	= NULL;
461 
462 	so->so_peercred 	= NULL;
463 
464 	so->so_rcv_queued	= 0;
465 	so->so_rcv_q_head 	= NULL;
466 	so->so_rcv_q_last_head 	= NULL;
467 	so->so_rcv_head		= NULL;
468 	so->so_rcv_last_head	= NULL;
469 	so->so_rcv_wanted	= 0;
470 	so->so_rcv_timer_interval = SOCKET_NO_RCVTIMER;
471 	so->so_rcv_timer_tid	= 0;
472 	so->so_rcv_thresh	= 0;
473 
474 	so->so_acceptq_head	= NULL;
475 	so->so_acceptq_tail	= &so->so_acceptq_head;
476 	so->so_acceptq_next	= NULL;
477 	so->so_acceptq_len	= 0;
478 	so->so_backlog		= 0;
479 
480 	so->so_snd_qfull	= B_FALSE;
481 
482 	mutex_init(&so->so_lock, NULL, MUTEX_DEFAULT, NULL);
483 	mutex_init(&so->so_acceptq_lock, NULL, MUTEX_DEFAULT, NULL);
484 	rw_init(&so->so_fallback_rwlock, NULL, RW_DEFAULT, NULL);
485 	cv_init(&so->so_state_cv, NULL, CV_DEFAULT, NULL);
486 	cv_init(&so->so_single_cv, NULL, CV_DEFAULT, NULL);
487 	cv_init(&so->so_read_cv, NULL, CV_DEFAULT, NULL);
488 
489 	cv_init(&so->so_acceptq_cv, NULL, CV_DEFAULT, NULL);
490 	cv_init(&so->so_snd_cv, NULL, CV_DEFAULT, NULL);
491 	cv_init(&so->so_rcv_cv, NULL, CV_DEFAULT, NULL);
492 	cv_init(&so->so_copy_cv, NULL, CV_DEFAULT, NULL);
493 	cv_init(&so->so_closing_cv, NULL, CV_DEFAULT, NULL);
494 
495 	return (0);
496 }
497 
498 /*ARGSUSED*/
499 void
500 sonode_destructor(void *buf, void *cdrarg)
501 {
502 	struct sonode *so = buf;
503 	struct vnode *vp = SOTOV(so);
504 
505 	ASSERT(so->so_priv == NULL);
506 	ASSERT(so->so_peercred == NULL);
507 
508 	ASSERT(so->so_oobmsg == NULL);
509 
510 	ASSERT(so->so_rcv_q_head == NULL);
511 
512 	ASSERT(so->so_acceptq_head == NULL);
513 	ASSERT(so->so_acceptq_tail == &so->so_acceptq_head);
514 	ASSERT(so->so_acceptq_next == NULL);
515 
516 	ASSERT(vp->v_data == so);
517 	ASSERT(vn_matchops(vp, socket_vnodeops));
518 
519 	vn_free(vp);
520 
521 	mutex_destroy(&so->so_lock);
522 	mutex_destroy(&so->so_acceptq_lock);
523 	rw_destroy(&so->so_fallback_rwlock);
524 
525 	cv_destroy(&so->so_state_cv);
526 	cv_destroy(&so->so_single_cv);
527 	cv_destroy(&so->so_read_cv);
528 	cv_destroy(&so->so_acceptq_cv);
529 	cv_destroy(&so->so_snd_cv);
530 	cv_destroy(&so->so_rcv_cv);
531 	cv_destroy(&so->so_closing_cv);
532 }
533 
534 void
535 sonode_init(struct sonode *so, struct sockparams *sp, int family,
536     int type, int protocol, sonodeops_t *sops)
537 {
538 	vnode_t *vp;
539 
540 	vp = SOTOV(so);
541 
542 	so->so_flag	= 0;
543 
544 	so->so_state	= 0;
545 	so->so_mode	= 0;
546 
547 	so->so_count	= 0;
548 
549 	so->so_family	= family;
550 	so->so_type	= type;
551 	so->so_protocol	= protocol;
552 
553 	SOCK_CONNID_INIT(so->so_proto_connid);
554 
555 	so->so_options	= 0;
556 	so->so_linger.l_onoff   = 0;
557 	so->so_linger.l_linger = 0;
558 	so->so_sndbuf	= 0;
559 	so->so_error	= 0;
560 	so->so_rcvtimeo	= 0;
561 	so->so_sndtimeo = 0;
562 	so->so_xpg_rcvbuf = 0;
563 
564 	ASSERT(so->so_oobmsg == NULL);
565 	so->so_oobmark	= 0;
566 	so->so_pgrp	= 0;
567 
568 	ASSERT(so->so_peercred == NULL);
569 
570 	so->so_zoneid = getzoneid();
571 
572 	so->so_sockparams = sp;
573 
574 	so->so_ops = sops;
575 
576 	so->so_not_str = (sops != &sotpi_sonodeops);
577 
578 	so->so_proto_handle = NULL;
579 
580 	so->so_downcalls = NULL;
581 
582 	so->so_copyflag = 0;
583 
584 	ASSERT(so->so_acceptq_head == NULL);
585 	ASSERT(so->so_acceptq_tail == &so->so_acceptq_head);
586 	ASSERT(so->so_acceptq_next == NULL);
587 
588 	vn_reinit(vp);
589 	vp->v_vfsp	= rootvfs;
590 	vp->v_type	= VSOCK;
591 	vp->v_rdev	= sockdev;
592 
593 	so->so_rcv_queued = 0;
594 	so->so_rcv_q_head = NULL;
595 	so->so_rcv_q_last_head = NULL;
596 	so->so_rcv_head	= NULL;
597 	so->so_rcv_last_head = NULL;
598 
599 	so->so_snd_qfull = B_FALSE;
600 	so->so_minpsz = 0;
601 
602 	so->so_rcv_wakeup = B_FALSE;
603 	so->so_snd_wakeup = B_FALSE;
604 	so->so_flowctrld = B_FALSE;
605 
606 	so->so_pollev = 0;
607 	bzero(&so->so_poll_list, sizeof (so->so_poll_list));
608 	bzero(&so->so_proto_props, sizeof (struct sock_proto_props));
609 
610 	bzero(&(so->so_ksock_callbacks), sizeof (ksocket_callbacks_t));
611 	so->so_ksock_cb_arg = NULL;
612 
613 	so->so_max_addr_len = sizeof (struct sockaddr_storage);
614 
615 	so->so_direct = NULL;
616 
617 	vn_exists(vp);
618 }
619 
620 void
621 sonode_fini(struct sonode *so)
622 {
623 	mblk_t *mp;
624 	vnode_t *vp;
625 
626 	ASSERT(so->so_count == 0);
627 
628 	if (so->so_rcv_timer_tid) {
629 		ASSERT(MUTEX_NOT_HELD(&so->so_lock));
630 		(void) untimeout(so->so_rcv_timer_tid);
631 		so->so_rcv_timer_tid = 0;
632 	}
633 
634 	so_acceptq_flush(so, B_FALSE);
635 
636 	if ((mp = so->so_oobmsg) != NULL) {
637 		freemsg(mp);
638 		so->so_oobmsg = NULL;
639 		so->so_state &= ~(SS_OOBPEND|SS_HAVEOOBDATA|SS_HADOOBDATA|
640 		    SS_RCVATMARK);
641 	}
642 
643 	if (so->so_poll_list.ph_list != NULL) {
644 		pollwakeup(&so->so_poll_list, POLLERR);
645 		pollhead_clean(&so->so_poll_list);
646 	}
647 
648 	if (so->so_direct != NULL)
649 		sod_sock_fini(so);
650 
651 	vp = SOTOV(so);
652 	vn_invalid(vp);
653 
654 	if (so->so_peercred != NULL) {
655 		crfree(so->so_peercred);
656 		so->so_peercred = NULL;
657 	}
658 }
659