1 /*-
2 * Copyright (c) 1998 Mark Newton
3 * Copyright (c) 1996 Christos Zoulas.
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * 3. All advertising materials mentioning features or use of this software
15 * must display the following acknowledgement:
16 * This product includes software developed by Christos Zoulas.
17 * 4. The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
22 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
23 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
24 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
25 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
29 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 /*
33 * In SVR4 unix domain sockets are referenced sometimes
34 * (in putmsg(2) for example) as a [device, inode] pair instead of a pathname.
35 * Since there is no iname() routine in the kernel, and we need access to
36 * a mapping from inode to pathname, we keep our own table. This is a simple
37 * linked list that contains the pathname, the [device, inode] pair, the
38 * file corresponding to that socket and the process. When the
39 * socket gets closed we remove the item from the list. The list gets loaded
40 * every time a stat(2) call finds a socket.
41 */
42
43 #include <sys/cdefs.h>
44 __FBSDID("$FreeBSD: releng/8.1/sys/compat/svr4/svr4_socket.c 193015 2009-05-29 06:04:26Z delphij $");
45
46 #include <sys/param.h>
47 #include <sys/systm.h>
48 #include <sys/queue.h>
49 #include <sys/eventhandler.h>
50 #include <sys/file.h>
51 #include <sys/kernel.h>
52 #include <sys/lock.h>
53 #include <sys/mutex.h>
54 #include <sys/socket.h>
55 #include <sys/socketvar.h>
56 #include <sys/sysproto.h>
57 #include <sys/un.h>
58 #include <sys/stat.h>
59 #include <sys/proc.h>
60 #include <sys/malloc.h>
61
62 #include <compat/svr4/svr4.h>
63 #include <compat/svr4/svr4_types.h>
64 #include <compat/svr4/svr4_util.h>
65 #include <compat/svr4/svr4_socket.h>
66 #include <compat/svr4/svr4_signal.h>
67 #include <compat/svr4/svr4_sockmod.h>
68 #include <compat/svr4/svr4_proto.h>
69
70 struct svr4_sockcache_entry {
71 struct proc *p; /* Process for the socket */
72 void *cookie; /* Internal cookie used for matching */
73 struct sockaddr_un sock;/* Pathname for the socket */
74 dev_t dev; /* Device where the socket lives on */
75 ino_t ino; /* Inode where the socket lives on */
76 TAILQ_ENTRY(svr4_sockcache_entry) entries;
77 };
78
79 static TAILQ_HEAD(, svr4_sockcache_entry) svr4_head;
80 static struct mtx svr4_sockcache_lock;
81 static eventhandler_tag svr4_sockcache_exit_tag, svr4_sockcache_exec_tag;
82
83 static void svr4_purge_sockcache(void *arg, struct proc *p);
84
85 int
86 svr4_find_socket(td, fp, dev, ino, saun)
87 struct thread *td;
88 struct file *fp;
89 dev_t dev;
90 ino_t ino;
91 struct sockaddr_un *saun;
92 {
93 struct svr4_sockcache_entry *e;
94 void *cookie = ((struct socket *)fp->f_data)->so_emuldata;
95
96 DPRINTF(("svr4_find_socket: [%p,%d,%d]: ", td, dev, ino));
97 mtx_lock(&svr4_sockcache_lock);
98 TAILQ_FOREACH(e, &svr4_head, entries)
99 if (e->p == td->td_proc && e->dev == dev && e->ino == ino) {
100 #ifdef DIAGNOSTIC
101 if (e->cookie != NULL && e->cookie != cookie)
102 panic("svr4 socket cookie mismatch");
103 #endif
104 e->cookie = cookie;
105 DPRINTF(("%s\n", e->sock.sun_path));
106 *saun = e->sock;
107 mtx_unlock(&svr4_sockcache_lock);
108 return (0);
109 }
110
111 mtx_unlock(&svr4_sockcache_lock);
112 DPRINTF(("not found\n"));
113 return (ENOENT);
114 }
115
116 int
117 svr4_add_socket(td, path, st)
118 struct thread *td;
119 const char *path;
120 struct stat *st;
121 {
122 struct svr4_sockcache_entry *e;
123 size_t len;
124 int error;
125
126 e = malloc(sizeof(*e), M_TEMP, M_WAITOK);
127 e->cookie = NULL;
128 e->dev = st->st_dev;
129 e->ino = st->st_ino;
130 e->p = td->td_proc;
131
132 if ((error = copyinstr(path, e->sock.sun_path,
133 sizeof(e->sock.sun_path), &len)) != 0) {
134 DPRINTF(("svr4_add_socket: copyinstr failed %d\n", error));
135 free(e, M_TEMP);
136 return error;
137 }
138
139 e->sock.sun_family = AF_LOCAL;
140 e->sock.sun_len = len;
141
142 mtx_lock(&svr4_sockcache_lock);
143 TAILQ_INSERT_HEAD(&svr4_head, e, entries);
144 mtx_unlock(&svr4_sockcache_lock);
145 DPRINTF(("svr4_add_socket: %s [%p,%d,%d]\n", e->sock.sun_path,
146 td->td_proc, e->dev, e->ino));
147 return 0;
148 }
149
150 void
151 svr4_delete_socket(p, fp)
152 struct proc *p;
153 struct file *fp;
154 {
155 struct svr4_sockcache_entry *e;
156 void *cookie = ((struct socket *)fp->f_data)->so_emuldata;
157
158 mtx_lock(&svr4_sockcache_lock);
159 TAILQ_FOREACH(e, &svr4_head, entries)
160 if (e->p == p && e->cookie == cookie) {
161 TAILQ_REMOVE(&svr4_head, e, entries);
162 mtx_unlock(&svr4_sockcache_lock);
163 DPRINTF(("svr4_delete_socket: %s [%p,%d,%d]\n",
164 e->sock.sun_path, p, (int)e->dev, e->ino));
165 free(e, M_TEMP);
166 return;
167 }
168 mtx_unlock(&svr4_sockcache_lock);
169 }
170
171 void
172 svr4_purge_sockcache(arg, p)
173 void *arg;
174 struct proc *p;
175 {
176 struct svr4_sockcache_entry *e, *ne;
177
178 mtx_lock(&svr4_sockcache_lock);
179 TAILQ_FOREACH_SAFE(e, &svr4_head, entries, ne) {
180 if (e->p == p) {
181 TAILQ_REMOVE(&svr4_head, e, entries);
182 DPRINTF(("svr4_purge_sockcache: %s [%p,%d,%d]\n",
183 e->sock.sun_path, p, (int)e->dev, e->ino));
184 free(e, M_TEMP);
185 }
186 }
187 mtx_unlock(&svr4_sockcache_lock);
188 }
189
190 void
191 svr4_sockcache_init(void)
192 {
193
194 TAILQ_INIT(&svr4_head);
195 mtx_init(&svr4_sockcache_lock, "svr4 socket cache", NULL, MTX_DEF);
196 svr4_sockcache_exit_tag = EVENTHANDLER_REGISTER(process_exit,
197 svr4_purge_sockcache, NULL, EVENTHANDLER_PRI_ANY);
198 svr4_sockcache_exec_tag = EVENTHANDLER_REGISTER(process_exec,
199 svr4_purge_sockcache, NULL, EVENTHANDLER_PRI_ANY);
200 }
201
202 void
203 svr4_sockcache_destroy(void)
204 {
205
206 KASSERT(TAILQ_EMPTY(&svr4_head),
207 ("%s: sockcache entries still around", __func__));
208 EVENTHANDLER_DEREGISTER(process_exec, svr4_sockcache_exec_tag);
209 EVENTHANDLER_DEREGISTER(process_exit, svr4_sockcache_exit_tag);
210 mtx_destroy(&svr4_sockcache_lock);
211 }
212
213 int
214 svr4_sys_socket(td, uap)
215 struct thread *td;
216 struct svr4_sys_socket_args *uap;
217 {
218 switch (uap->type) {
219 case SVR4_SOCK_DGRAM:
220 uap->type = SOCK_DGRAM;
221 break;
222
223 case SVR4_SOCK_STREAM:
224 uap->type = SOCK_STREAM;
225 break;
226
227 case SVR4_SOCK_RAW:
228 uap->type = SOCK_RAW;
229 break;
230
231 case SVR4_SOCK_RDM:
232 uap->type = SOCK_RDM;
233 break;
234
235 case SVR4_SOCK_SEQPACKET:
236 uap->type = SOCK_SEQPACKET;
237 break;
238 default:
239 return EINVAL;
240 }
241 return socket(td, (struct socket_args *)uap);
242 }
Cache object: b06c3b02f1e0040fedd4d958cfe4c697
|