xref: /illumos-gate/usr/src/lib/libnsl/nsl/t_accept.c (revision 1da57d55)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 
23 /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
24 /*	  All Rights Reserved  	*/
25 
26 /*
27  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
28  * Use is subject to license terms.
29  */
30 
31 #include "mt.h"
32 #include <stdlib.h>
33 #include <errno.h>
34 #include <unistd.h>
35 #include <stropts.h>
36 #include <sys/stream.h>
37 #define	_SUN_TPI_VERSION 2
38 #include <sys/tihdr.h>
39 #include <sys/timod.h>
40 #include <xti.h>
41 #include <signal.h>
42 #include <syslog.h>
43 #include <assert.h>
44 #include "tx.h"
45 
46 int
_tx_accept(int fd,int resfd,const struct t_call * call,int api_semantics)47 _tx_accept(
48 	int fd,
49 	int resfd,
50 	const struct t_call *call,
51 	int api_semantics
52 )
53 {
54 	struct T_conn_res *cres;
55 	struct strfdinsert strfdinsert;
56 	int size, retval, sv_errno;
57 	struct _ti_user *tiptr;
58 	struct _ti_user *restiptr;
59 	sigset_t mask;
60 	struct strbuf ctlbuf;
61 	int didalloc;
62 	t_scalar_t conn_res_prim;
63 
64 	if ((tiptr = _t_checkfd(fd, 0, api_semantics)) == NULL)
65 		return (-1);
66 	if ((restiptr = _t_checkfd(resfd, 0, api_semantics)) == NULL)
67 		return (-1);
68 
69 	/*
70 	 * We need to block signals to perform the I_FDINSERT operation
71 	 * (sending T_CONN_RES downstream) which is non-idempotent.
72 	 * Note that sig_mutex_lock() only defers signals, it does not
73 	 * block them, so interruptible syscalls could still get EINTR.
74 	 */
75 	(void) thr_sigsetmask(SIG_SETMASK, &fillset, &mask);
76 	sig_mutex_lock(&tiptr->ti_lock);
77 
78 	if (tiptr->ti_servtype == T_CLTS) {
79 		t_errno = TNOTSUPPORT;
80 		sig_mutex_unlock(&tiptr->ti_lock);
81 		(void) thr_sigsetmask(SIG_SETMASK, &mask, NULL);
82 		return (-1);
83 	}
84 
85 	if (_T_IS_XTI(api_semantics)) {
86 		/*
87 		 * User level state verification only done for XTI
88 		 * because doing for TLI may break existing applications
89 		 *
90 		 * For fd == resfd, state should be T_INCON
91 		 * For fd != resfd,
92 		 *	    fd state should be T_INCON
93 		 *	    resfd state should be T_IDLE (bound endpoint) or
94 		 *	    it can be T_UNBND. The T_UNBND case is not (yet?)
95 		 *	    allowed in the published XTI spec but fixed by the
96 		 *	    corrigenda.
97 		 */
98 		if ((fd == resfd && tiptr->ti_state != T_INCON) ||
99 		    (fd != resfd &&
100 			((tiptr->ti_state != T_INCON) ||
101 		    !(restiptr->ti_state == T_IDLE ||
102 			restiptr->ti_state == T_UNBND)))) {
103 			t_errno = TOUTSTATE;
104 			sig_mutex_unlock(&tiptr->ti_lock);
105 			(void) thr_sigsetmask(SIG_SETMASK, &mask, NULL);
106 			return (-1);
107 		}
108 
109 		/*
110 		 * XTI says:
111 		 * If fd != resfd, and a resfd bound to a protocol address is
112 		 * passed, then it better not have a qlen > 0.
113 		 * That is, an endpoint bound as if it will be a listener
114 		 * cannot be used as an acceptor.
115 		 */
116 		if (fd != resfd && restiptr->ti_state == T_IDLE &&
117 		    restiptr->ti_qlen > 0) {
118 			t_errno = TRESQLEN;
119 			sig_mutex_unlock(&tiptr->ti_lock);
120 			(void) thr_sigsetmask(SIG_SETMASK, &mask, NULL);
121 			return (-1);
122 		}
123 
124 		if (fd == resfd && tiptr->ti_ocnt > 1) {
125 			t_errno = TINDOUT;
126 			sig_mutex_unlock(&tiptr->ti_lock);
127 			(void) thr_sigsetmask(SIG_SETMASK, &mask, NULL);
128 			return (-1);
129 		}
130 
131 		/*
132 		 * Note: TRESADDR error is specified by XTI. It happens
133 		 * when resfd is bound and fd and resfd are not BOUND to
134 		 * the same protocol address. TCP obviously does allow
135 		 * two endpoints to bind to the same address. Why is the
136 		 * need for this error considering there is an address switch
137 		 * that can be done for the endpoint at accept time ? Go
138 		 * figure and ask the XTI folks.
139 		 * We interpret this to be a transport specific error condition
140 		 * to be be coveyed by the transport provider in T_ERROR_ACK
141 		 * to T_CONN_RES on transports that allow two endpoints to
142 		 * be bound to the same address and have trouble with the
143 		 * idea of accepting connections on a resfd that has a qlen > 0
144 		 */
145 	}
146 
147 	if (fd != resfd) {
148 		if ((retval = ioctl(resfd, I_NREAD, &size)) < 0) {
149 			sv_errno = errno;
150 
151 			t_errno = TSYSERR;
152 			sig_mutex_unlock(&tiptr->ti_lock);
153 			(void) thr_sigsetmask(SIG_SETMASK, &mask, NULL);
154 			errno = sv_errno;
155 			return (-1);
156 		}
157 		if (retval > 0) {
158 			t_errno = TBADF;
159 			sig_mutex_unlock(&tiptr->ti_lock);
160 			(void) thr_sigsetmask(SIG_SETMASK, &mask, NULL);
161 			return (-1);
162 		}
163 	}
164 
165 	/*
166 	 * Acquire ctlbuf for use in sending/receiving control part
167 	 * of the message.
168 	 */
169 	if (_t_acquire_ctlbuf(tiptr, &ctlbuf, &didalloc) < 0) {
170 		sv_errno = errno;
171 		sig_mutex_unlock(&tiptr->ti_lock);
172 		(void) thr_sigsetmask(SIG_SETMASK, &mask, NULL);
173 		errno = sv_errno;
174 		return (-1);
175 	}
176 
177 	/*
178 	 * In Unix98 t_accept() need not return [TLOOK] if connect/disconnect
179 	 * indications are present. TLI and Unix95 need to return error.
180 	 */
181 	if (_T_API_VER_LT(api_semantics, TX_XTI_XNS5_API)) {
182 		if (_t_is_event(fd, tiptr) < 0)
183 			goto err_out;
184 	}
185 
186 	/* LINTED pointer cast */
187 	cres = (struct T_conn_res *)ctlbuf.buf;
188 	cres->OPT_length = call->opt.len;
189 	cres->OPT_offset = 0;
190 	cres->SEQ_number = call->sequence;
191 	if ((restiptr->ti_flags & V_ACCEPTOR_ID) != 0) {
192 		cres->ACCEPTOR_id = restiptr->acceptor_id;
193 		cres->PRIM_type = conn_res_prim = T_CONN_RES;
194 	} else {
195 		/* I_FDINSERT should use O_T_CONN_RES. */
196 		cres->ACCEPTOR_id = 0;
197 		cres->PRIM_type = conn_res_prim = O_T_CONN_RES;
198 	}
199 
200 	size = (int)sizeof (struct T_conn_res);
201 
202 	if (call->opt.len) {
203 		if (_t_aligned_copy(&ctlbuf, call->opt.len, size,
204 		    call->opt.buf, &cres->OPT_offset) < 0) {
205 			/*
206 			 * Aligned copy will overflow buffer allocated based
207 			 * transport maximum options length.
208 			 * return error.
209 			 */
210 			t_errno = TBADOPT;
211 			goto err_out;
212 		}
213 		size = cres->OPT_offset + cres->OPT_length;
214 	}
215 
216 	if (call->udata.len) {
217 		if ((tiptr->ti_cdatasize == T_INVALID /* -2 */) ||
218 		    ((tiptr->ti_cdatasize != T_INFINITE /* -1 */) &&
219 			(call->udata.len > (uint32_t)tiptr->ti_cdatasize))) {
220 			/*
221 			 * user data not valid with connect or it
222 			 * exceeds the limits specified by the transport
223 			 * provider
224 			 */
225 			t_errno = TBADDATA;
226 			goto err_out;
227 		}
228 	}
229 
230 
231 	ctlbuf.len = size;
232 
233 	/*
234 	 * Assumes signals are blocked so putmsg() will not block
235 	 * indefinitely
236 	 */
237 	if ((restiptr->ti_flags & V_ACCEPTOR_ID) != 0) {
238 		/*
239 		 * Assumes signals are blocked so putmsg() will not block
240 		 * indefinitely
241 		 */
242 		if (putmsg(fd, &ctlbuf,
243 		    (struct strbuf *)(call->udata.len? &call->udata: NULL), 0) <
244 		    0) {
245 			if (errno == EAGAIN)
246 				t_errno = TFLOW;
247 			else
248 				t_errno = TSYSERR;
249 			goto err_out;
250 		}
251 	} else {
252 		strfdinsert.ctlbuf.maxlen = ctlbuf.maxlen;
253 		strfdinsert.ctlbuf.len = ctlbuf.len;
254 		strfdinsert.ctlbuf.buf = ctlbuf.buf;
255 
256 		strfdinsert.databuf.maxlen = call->udata.maxlen;
257 		strfdinsert.databuf.len =
258 		    (call->udata.len? call->udata.len: -1);
259 		strfdinsert.databuf.buf = call->udata.buf;
260 		strfdinsert.fildes = resfd;
261 		strfdinsert.offset = (int)sizeof (t_scalar_t);
262 		strfdinsert.flags = 0;		/* could be EXPEDITED also */
263 
264 		if (ioctl(fd, I_FDINSERT, &strfdinsert) < 0) {
265 			if (errno == EAGAIN)
266 				t_errno = TFLOW;
267 			else
268 				t_errno = TSYSERR;
269 			goto err_out;
270 		}
271 	}
272 
273 	if (_t_is_ok(fd, tiptr, conn_res_prim) < 0) {
274 		/*
275 		 * At the TPI level, the error returned in a T_ERROR_ACK
276 		 * received in response to a T_CONN_RES for a listener and
277 		 * acceptor endpoints not being the same kind of endpoints
278 		 * has changed to a new t_errno code introduced with
279 		 * XTI (TPROVMISMATCH). We need to adjust TLI error code
280 		 * to be same as before.
281 		 */
282 		if (_T_IS_TLI(api_semantics) && t_errno == TPROVMISMATCH) {
283 			/* TLI only */
284 			t_errno = TBADF;
285 		}
286 		goto err_out;
287 	}
288 
289 	if (tiptr->ti_ocnt == 1) {
290 		if (fd == resfd) {
291 			_T_TX_NEXTSTATE(T_ACCEPT1, tiptr,
292 				"t_accept: invalid state event T_ACCEPT1");
293 		} else {
294 			_T_TX_NEXTSTATE(T_ACCEPT2, tiptr,
295 				"t_accept: invalid state event T_ACCEPT2");
296 			/*
297 			 * XXX Here we lock the resfd lock also. This
298 			 * is an instance of holding two locks without
299 			 * any enforcement of a locking hiararchy.
300 			 * There is potential for deadlock in incorrect
301 			 * or buggy programs here but this is the safer
302 			 * choice in this case. Correct programs will not
303 			 * deadlock.
304 			 */
305 			sig_mutex_lock(&restiptr->ti_lock);
306 			_T_TX_NEXTSTATE(T_PASSCON, restiptr,
307 				"t_accept: invalid state event T_PASSCON");
308 			sig_mutex_unlock(&restiptr->ti_lock);
309 		}
310 	} else {
311 		_T_TX_NEXTSTATE(T_ACCEPT3, tiptr,
312 				"t_accept: invalid state event T_ACCEPT3");
313 		if (fd != resfd)
314 			sig_mutex_lock(&restiptr->ti_lock);
315 		_T_TX_NEXTSTATE(T_PASSCON, restiptr,
316 				"t_accept: invalid state event T_PASSCON");
317 		if (fd != resfd)
318 			sig_mutex_unlock(&restiptr->ti_lock);
319 	}
320 
321 	tiptr->ti_ocnt--;
322 	tiptr->ti_flags &= ~TX_TQFULL_NOTIFIED;
323 
324 	/*
325 	 * Update attributes which may have been negotiated during
326 	 * connection establishment for protocols where we suspect
327 	 * such negotiation is likely (e.g. OSI). We do not do it for
328 	 * all endpoints for performance reasons. Also, this code is
329 	 * deliberately done after user level state changes so even
330 	 * the (unlikely) failure case reflects a connected endpoint.
331 	 */
332 	if (restiptr->ti_tsdusize != 0) {
333 		if (_t_do_postconn_sync(resfd, restiptr) < 0)
334 			goto err_out;
335 	}
336 
337 	if (didalloc)
338 		free(ctlbuf.buf);
339 	else
340 		tiptr->ti_ctlbuf = ctlbuf.buf;
341 	sig_mutex_unlock(&tiptr->ti_lock);
342 	(void) thr_sigsetmask(SIG_SETMASK, &mask, NULL);
343 	return (0);
344 	/* NOTREACHED */
345 err_out:
346 	sv_errno = errno;
347 	if (didalloc)
348 		free(ctlbuf.buf);
349 	else
350 		tiptr->ti_ctlbuf = ctlbuf.buf;
351 	sig_mutex_unlock(&tiptr->ti_lock);
352 	(void) thr_sigsetmask(SIG_SETMASK, &mask, NULL);
353 	errno = sv_errno;
354 	return (-1);
355 }
356