uipc_domain.c revision 298796
1/*-
2 * Copyright (c) 1982, 1986, 1993
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 4. Neither the name of the University nor the names of its contributors
14 *    may be used to endorse or promote products derived from this software
15 *    without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 *
29 *	@(#)uipc_domain.c	8.2 (Berkeley) 10/18/93
30 */
31
32#include <sys/cdefs.h>
33__FBSDID("$FreeBSD: head/sys/kern/uipc_domain.c 298796 2016-04-29 20:11:09Z jhb $");
34
35#include <sys/param.h>
36#include <sys/socket.h>
37#include <sys/protosw.h>
38#include <sys/domain.h>
39#include <sys/eventhandler.h>
40#include <sys/mbuf.h>
41#include <sys/kernel.h>
42#include <sys/lock.h>
43#include <sys/mutex.h>
44#include <sys/socketvar.h>
45#include <sys/systm.h>
46
47#include <net/vnet.h>
48
49/*
50 * System initialization
51 *
52 * Note: domain initialization takes place on a per domain basis
53 * as a result of traversing a SYSINIT linker set.  Most likely,
54 * each domain would want to call DOMAIN_SET(9) itself, which
55 * would cause the domain to be added just after domaininit()
56 * is called during startup.
57 *
58 * See DOMAIN_SET(9) for details on its use.
59 */
60
61static void domaininit(void *);
62SYSINIT(domain, SI_SUB_PROTO_DOMAININIT, SI_ORDER_ANY, domaininit, NULL);
63
64static void domainfinalize(void *);
65SYSINIT(domainfin, SI_SUB_PROTO_IFATTACHDOMAIN, SI_ORDER_FIRST, domainfinalize,
66    NULL);
67
68static struct callout pffast_callout;
69static struct callout pfslow_callout;
70
71static void	pffasttimo(void *);
72static void	pfslowtimo(void *);
73
74struct domain *domains;		/* registered protocol domains */
75int domain_init_status = 0;
76static struct mtx dom_mtx;		/* domain list lock */
77MTX_SYSINIT(domain, &dom_mtx, "domain list", MTX_DEF);
78
79/*
80 * Dummy protocol specific user requests function pointer array.
81 * All functions return EOPNOTSUPP.
82 */
83struct pr_usrreqs nousrreqs = {
84	.pru_accept =		pru_accept_notsupp,
85	.pru_attach =		pru_attach_notsupp,
86	.pru_bind =		pru_bind_notsupp,
87	.pru_connect =		pru_connect_notsupp,
88	.pru_connect2 =		pru_connect2_notsupp,
89	.pru_control =		pru_control_notsupp,
90	.pru_disconnect	=	pru_disconnect_notsupp,
91	.pru_listen =		pru_listen_notsupp,
92	.pru_peeraddr =		pru_peeraddr_notsupp,
93	.pru_rcvd =		pru_rcvd_notsupp,
94	.pru_rcvoob =		pru_rcvoob_notsupp,
95	.pru_send =		pru_send_notsupp,
96	.pru_sense =		pru_sense_null,
97	.pru_shutdown =		pru_shutdown_notsupp,
98	.pru_sockaddr =		pru_sockaddr_notsupp,
99	.pru_sosend =		pru_sosend_notsupp,
100	.pru_soreceive =	pru_soreceive_notsupp,
101	.pru_sopoll =		pru_sopoll_notsupp,
102};
103
104static void
105protosw_init(struct protosw *pr)
106{
107	struct pr_usrreqs *pu;
108
109	pu = pr->pr_usrreqs;
110	KASSERT(pu != NULL, ("protosw_init: %ssw[%d] has no usrreqs!",
111	    pr->pr_domain->dom_name,
112	    (int)(pr - pr->pr_domain->dom_protosw)));
113
114	/*
115	 * Protocol switch methods fall into three categories: mandatory,
116	 * mandatory but protosw_init() provides a default, and optional.
117	 *
118	 * For true protocols (i.e., pru_attach != NULL), KASSERT truly
119	 * mandatory methods with no defaults, and initialize defaults for
120	 * other mandatory methods if the protocol hasn't defined an
121	 * implementation (NULL function pointer).
122	 */
123#if 0
124	if (pu->pru_attach != NULL) {
125		KASSERT(pu->pru_abort != NULL,
126		    ("protosw_init: %ssw[%d] pru_abort NULL",
127		    pr->pr_domain->dom_name,
128		    (int)(pr - pr->pr_domain->dom_protosw)));
129		KASSERT(pu->pru_send != NULL,
130		    ("protosw_init: %ssw[%d] pru_send NULL",
131		    pr->pr_domain->dom_name,
132		    (int)(pr - pr->pr_domain->dom_protosw)));
133	}
134#endif
135
136#define DEFAULT(foo, bar)	if ((foo) == NULL)  (foo) = (bar)
137	DEFAULT(pu->pru_accept, pru_accept_notsupp);
138	DEFAULT(pu->pru_aio_queue, pru_aio_queue_notsupp);
139	DEFAULT(pu->pru_bind, pru_bind_notsupp);
140	DEFAULT(pu->pru_bindat, pru_bindat_notsupp);
141	DEFAULT(pu->pru_connect, pru_connect_notsupp);
142	DEFAULT(pu->pru_connect2, pru_connect2_notsupp);
143	DEFAULT(pu->pru_connectat, pru_connectat_notsupp);
144	DEFAULT(pu->pru_control, pru_control_notsupp);
145	DEFAULT(pu->pru_disconnect, pru_disconnect_notsupp);
146	DEFAULT(pu->pru_listen, pru_listen_notsupp);
147	DEFAULT(pu->pru_peeraddr, pru_peeraddr_notsupp);
148	DEFAULT(pu->pru_rcvd, pru_rcvd_notsupp);
149	DEFAULT(pu->pru_rcvoob, pru_rcvoob_notsupp);
150	DEFAULT(pu->pru_sense, pru_sense_null);
151	DEFAULT(pu->pru_shutdown, pru_shutdown_notsupp);
152	DEFAULT(pu->pru_sockaddr, pru_sockaddr_notsupp);
153	DEFAULT(pu->pru_sosend, sosend_generic);
154	DEFAULT(pu->pru_soreceive, soreceive_generic);
155	DEFAULT(pu->pru_sopoll, sopoll_generic);
156	DEFAULT(pu->pru_ready, pru_ready_notsupp);
157#undef DEFAULT
158	if (pr->pr_init)
159		(*pr->pr_init)();
160}
161
162/*
163 * Add a new protocol domain to the list of supported domains
164 * Note: you cant unload it again because a socket may be using it.
165 * XXX can't fail at this time.
166 */
167void
168domain_init(void *arg)
169{
170	struct domain *dp = arg;
171	struct protosw *pr;
172
173	if (dp->dom_init)
174		(*dp->dom_init)();
175	for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
176		protosw_init(pr);
177	/*
178	 * update global information about maximums
179	 */
180	max_hdr = max_linkhdr + max_protohdr;
181	max_datalen = MHLEN - max_hdr;
182	if (max_datalen < 1)
183		panic("%s: max_datalen < 1", __func__);
184}
185
186#ifdef VIMAGE
187void
188vnet_domain_init(void *arg)
189{
190
191	/* Virtualized case is no different -- call init functions. */
192	domain_init(arg);
193}
194
195void
196vnet_domain_uninit(void *arg)
197{
198	struct domain *dp = arg;
199	struct protosw *pr;
200
201	for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
202		if (pr->pr_destroy)
203			(*pr->pr_destroy)();
204	if (dp->dom_destroy)
205		(*dp->dom_destroy)();
206}
207#endif
208
209/*
210 * Add a new protocol domain to the list of supported domains
211 * Note: you cant unload it again because a socket may be using it.
212 * XXX can't fail at this time.
213 */
214void
215domain_add(void *data)
216{
217	struct domain *dp;
218
219	dp = (struct domain *)data;
220	mtx_lock(&dom_mtx);
221	dp->dom_next = domains;
222	domains = dp;
223
224	KASSERT(domain_init_status >= 1,
225	    ("attempt to domain_add(%s) before domaininit()",
226	    dp->dom_name));
227#ifndef INVARIANTS
228	if (domain_init_status < 1)
229		printf("WARNING: attempt to domain_add(%s) before "
230		    "domaininit()\n", dp->dom_name);
231#endif
232#ifdef notyet
233	KASSERT(domain_init_status < 2,
234	    ("attempt to domain_add(%s) after domainfinalize()",
235	    dp->dom_name));
236#else
237	if (domain_init_status >= 2)
238		printf("WARNING: attempt to domain_add(%s) after "
239		    "domainfinalize()\n", dp->dom_name);
240#endif
241	mtx_unlock(&dom_mtx);
242}
243
244/* ARGSUSED*/
245static void
246domaininit(void *dummy)
247{
248
249	if (max_linkhdr < 16)		/* XXX */
250		max_linkhdr = 16;
251
252	callout_init(&pffast_callout, 1);
253	callout_init(&pfslow_callout, 1);
254
255	mtx_lock(&dom_mtx);
256	KASSERT(domain_init_status == 0, ("domaininit called too late!"));
257	domain_init_status = 1;
258	mtx_unlock(&dom_mtx);
259}
260
261/* ARGSUSED*/
262static void
263domainfinalize(void *dummy)
264{
265
266	mtx_lock(&dom_mtx);
267	KASSERT(domain_init_status == 1, ("domainfinalize called too late!"));
268	domain_init_status = 2;
269	mtx_unlock(&dom_mtx);
270
271	callout_reset(&pffast_callout, 1, pffasttimo, NULL);
272	callout_reset(&pfslow_callout, 1, pfslowtimo, NULL);
273}
274
275struct domain *
276pffinddomain(int family)
277{
278	struct domain *dp;
279
280	for (dp = domains; dp != NULL; dp = dp->dom_next)
281		if (dp->dom_family == family)
282			return (dp);
283	return (NULL);
284}
285
286struct protosw *
287pffindtype(int family, int type)
288{
289	struct domain *dp;
290	struct protosw *pr;
291
292	dp = pffinddomain(family);
293	if (dp == NULL)
294		return (NULL);
295
296	for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
297		if (pr->pr_type && pr->pr_type == type)
298			return (pr);
299	return (NULL);
300}
301
302struct protosw *
303pffindproto(int family, int protocol, int type)
304{
305	struct domain *dp;
306	struct protosw *pr;
307	struct protosw *maybe;
308
309	maybe = NULL;
310	if (family == 0)
311		return (NULL);
312
313	dp = pffinddomain(family);
314	if (dp == NULL)
315		return (NULL);
316
317	for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++) {
318		if ((pr->pr_protocol == protocol) && (pr->pr_type == type))
319			return (pr);
320
321		if (type == SOCK_RAW && pr->pr_type == SOCK_RAW &&
322		    pr->pr_protocol == 0 && maybe == NULL)
323			maybe = pr;
324	}
325	return (maybe);
326}
327
328/*
329 * The caller must make sure that the new protocol is fully set up and ready to
330 * accept requests before it is registered.
331 */
332int
333pf_proto_register(int family, struct protosw *npr)
334{
335	VNET_ITERATOR_DECL(vnet_iter);
336	struct domain *dp;
337	struct protosw *pr, *fpr;
338
339	/* Sanity checks. */
340	if (family == 0)
341		return (EPFNOSUPPORT);
342	if (npr->pr_type == 0)
343		return (EPROTOTYPE);
344	if (npr->pr_protocol == 0)
345		return (EPROTONOSUPPORT);
346	if (npr->pr_usrreqs == NULL)
347		return (ENXIO);
348
349	/* Try to find the specified domain based on the family. */
350	dp = pffinddomain(family);
351	if (dp == NULL)
352		return (EPFNOSUPPORT);
353
354	/* Initialize backpointer to struct domain. */
355	npr->pr_domain = dp;
356	fpr = NULL;
357
358	/*
359	 * Protect us against races when two protocol registrations for
360	 * the same protocol happen at the same time.
361	 */
362	mtx_lock(&dom_mtx);
363
364	/* The new protocol must not yet exist. */
365	for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++) {
366		if ((pr->pr_type == npr->pr_type) &&
367		    (pr->pr_protocol == npr->pr_protocol)) {
368			mtx_unlock(&dom_mtx);
369			return (EEXIST);	/* XXX: Check only protocol? */
370		}
371		/* While here, remember the first free spacer. */
372		if ((fpr == NULL) && (pr->pr_protocol == PROTO_SPACER))
373			fpr = pr;
374	}
375
376	/* If no free spacer is found we can't add the new protocol. */
377	if (fpr == NULL) {
378		mtx_unlock(&dom_mtx);
379		return (ENOMEM);
380	}
381
382	/* Copy the new struct protosw over the spacer. */
383	bcopy(npr, fpr, sizeof(*fpr));
384
385	/* Job is done, no more protection required. */
386	mtx_unlock(&dom_mtx);
387
388	/* Initialize and activate the protocol. */
389	VNET_LIST_RLOCK();
390	VNET_FOREACH(vnet_iter) {
391		CURVNET_SET_QUIET(vnet_iter);
392		protosw_init(fpr);
393		CURVNET_RESTORE();
394	}
395	VNET_LIST_RUNLOCK();
396
397	return (0);
398}
399
400/*
401 * The caller must make sure the protocol and its functions correctly shut down
402 * all sockets and release all locks and memory references.
403 */
404int
405pf_proto_unregister(int family, int protocol, int type)
406{
407	struct domain *dp;
408	struct protosw *pr, *dpr;
409
410	/* Sanity checks. */
411	if (family == 0)
412		return (EPFNOSUPPORT);
413	if (protocol == 0)
414		return (EPROTONOSUPPORT);
415	if (type == 0)
416		return (EPROTOTYPE);
417
418	/* Try to find the specified domain based on the family type. */
419	dp = pffinddomain(family);
420	if (dp == NULL)
421		return (EPFNOSUPPORT);
422
423	dpr = NULL;
424
425	/* Lock out everyone else while we are manipulating the protosw. */
426	mtx_lock(&dom_mtx);
427
428	/* The protocol must exist and only once. */
429	for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++) {
430		if ((pr->pr_type == type) && (pr->pr_protocol == protocol)) {
431			if (dpr != NULL) {
432				mtx_unlock(&dom_mtx);
433				return (EMLINK);   /* Should not happen! */
434			} else
435				dpr = pr;
436		}
437	}
438
439	/* Protocol does not exist. */
440	if (dpr == NULL) {
441		mtx_unlock(&dom_mtx);
442		return (EPROTONOSUPPORT);
443	}
444
445	/* De-orbit the protocol and make the slot available again. */
446	dpr->pr_type = 0;
447	dpr->pr_domain = dp;
448	dpr->pr_protocol = PROTO_SPACER;
449	dpr->pr_flags = 0;
450	dpr->pr_input = NULL;
451	dpr->pr_output = NULL;
452	dpr->pr_ctlinput = NULL;
453	dpr->pr_ctloutput = NULL;
454	dpr->pr_init = NULL;
455	dpr->pr_fasttimo = NULL;
456	dpr->pr_slowtimo = NULL;
457	dpr->pr_drain = NULL;
458	dpr->pr_usrreqs = &nousrreqs;
459
460	/* Job is done, not more protection required. */
461	mtx_unlock(&dom_mtx);
462
463	return (0);
464}
465
466void
467pfctlinput(int cmd, struct sockaddr *sa)
468{
469	struct domain *dp;
470	struct protosw *pr;
471
472	for (dp = domains; dp; dp = dp->dom_next)
473		for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
474			if (pr->pr_ctlinput)
475				(*pr->pr_ctlinput)(cmd, sa, (void *)0);
476}
477
478void
479pfctlinput2(int cmd, struct sockaddr *sa, void *ctlparam)
480{
481	struct domain *dp;
482	struct protosw *pr;
483
484	if (!sa)
485		return;
486	for (dp = domains; dp; dp = dp->dom_next) {
487		/*
488		 * the check must be made by xx_ctlinput() anyways, to
489		 * make sure we use data item pointed to by ctlparam in
490		 * correct way.  the following check is made just for safety.
491		 */
492		if (dp->dom_family != sa->sa_family)
493			continue;
494
495		for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
496			if (pr->pr_ctlinput)
497				(*pr->pr_ctlinput)(cmd, sa, ctlparam);
498	}
499}
500
501static void
502pfslowtimo(void *arg)
503{
504	struct domain *dp;
505	struct protosw *pr;
506
507	for (dp = domains; dp; dp = dp->dom_next)
508		for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
509			if (pr->pr_slowtimo)
510				(*pr->pr_slowtimo)();
511	callout_reset(&pfslow_callout, hz/2, pfslowtimo, NULL);
512}
513
514static void
515pffasttimo(void *arg)
516{
517	struct domain *dp;
518	struct protosw *pr;
519
520	for (dp = domains; dp; dp = dp->dom_next)
521		for (pr = dp->dom_protosw; pr < dp->dom_protoswNPROTOSW; pr++)
522			if (pr->pr_fasttimo)
523				(*pr->pr_fasttimo)();
524	callout_reset(&pffast_callout, hz/5, pffasttimo, NULL);
525}
526