xref: /dragonfly/sys/kern/sys_socket.c (revision 36a3d1d6)
1 /*
2  * Copyright (c) 1982, 1986, 1990, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  *
33  *	@(#)sys_socket.c	8.1 (Berkeley) 6/10/93
34  * $FreeBSD: src/sys/kern/sys_socket.c,v 1.28.2.2 2001/02/26 04:23:16 jlemon Exp $
35  * $DragonFly: src/sys/kern/sys_socket.c,v 1.14 2007/04/22 01:13:10 dillon Exp $
36  */
37 
38 #include <sys/param.h>
39 #include <sys/systm.h>
40 #include <sys/file.h>
41 #include <sys/lock.h>
42 #include <sys/protosw.h>
43 #include <sys/socket.h>
44 #include <sys/socketvar.h>
45 #include <sys/socketops.h>
46 #include <sys/filio.h>			/* XXX */
47 #include <sys/sockio.h>
48 #include <sys/vnode.h>
49 #include <sys/stat.h>
50 #include <sys/uio.h>
51 #include <sys/filedesc.h>
52 #include <sys/ucred.h>
53 
54 #include <sys/mplock2.h>
55 
56 #include <net/if.h>
57 #include <net/route.h>
58 
59 struct	fileops socketops = {
60 	.fo_read = soo_read,
61 	.fo_write = soo_write,
62 	.fo_ioctl = soo_ioctl,
63 	.fo_kqfilter = sokqfilter,
64 	.fo_stat = soo_stat,
65 	.fo_close = soo_close,
66 	.fo_shutdown = soo_shutdown
67 };
68 
69 /*
70  * MPALMOSTSAFE - acquires mplock
71  */
72 int
73 soo_read(struct file *fp, struct uio *uio, struct ucred *cred, int fflags)
74 {
75 	struct socket *so;
76 	int error;
77 	int msgflags;
78 
79 	get_mplock();
80 	so = (struct socket *)fp->f_data;
81 
82 	if (fflags & O_FBLOCKING)
83 		msgflags = 0;
84 	else if (fflags & O_FNONBLOCKING)
85 		msgflags = MSG_FNONBLOCKING;
86 	else if (fp->f_flag & FNONBLOCK)
87 		msgflags = MSG_FNONBLOCKING;
88 	else
89 		msgflags = 0;
90 
91 	error = so_pru_soreceive(so, NULL, uio, NULL, NULL, &msgflags);
92 	rel_mplock();
93 	return (error);
94 }
95 
96 /*
97  * MPALMOSTSAFE - acquires mplock
98  */
99 int
100 soo_write(struct file *fp, struct uio *uio, struct ucred *cred, int fflags)
101 {
102 	struct socket *so;
103 	int error;
104 	int msgflags;
105 
106 	get_mplock();
107 	so = (struct socket *)fp->f_data;
108 
109 	if (fflags & O_FBLOCKING)
110 		msgflags = 0;
111 	else if (fflags & O_FNONBLOCKING)
112 		msgflags = MSG_FNONBLOCKING;
113 	else if (fp->f_flag & FNONBLOCK)
114 		msgflags = MSG_FNONBLOCKING;
115 	else
116 		msgflags = 0;
117 
118 	error = so_pru_sosend(so, NULL, uio, NULL, NULL, msgflags, uio->uio_td);
119 	rel_mplock();
120 	return (error);
121 }
122 
123 /*
124  * MPALMOSTSAFE - acquires mplock
125  */
126 int
127 soo_ioctl(struct file *fp, u_long cmd, caddr_t data,
128 	  struct ucred *cred, struct sysmsg *msg)
129 {
130 	struct socket *so;
131 	int error;
132 
133 	get_mplock();
134 	so = (struct socket *)fp->f_data;
135 
136 	switch (cmd) {
137 	case FIOASYNC:
138 		if (*(int *)data) {
139 			so->so_state |= SS_ASYNC;
140 			atomic_set_int(&so->so_rcv.ssb_flags,  SSB_ASYNC);
141 			atomic_set_int(&so->so_snd.ssb_flags, SSB_ASYNC);
142 		} else {
143 			so->so_state &= ~SS_ASYNC;
144 			atomic_clear_int(&so->so_rcv.ssb_flags, SSB_ASYNC);
145 			atomic_clear_int(&so->so_snd.ssb_flags, SSB_ASYNC);
146 		}
147 		error = 0;
148 		break;
149 	case FIONREAD:
150 		*(int *)data = so->so_rcv.ssb_cc;
151 		error = 0;
152 		break;
153 	case FIOSETOWN:
154 		error = fsetown(*(int *)data, &so->so_sigio);
155 		break;
156 	case FIOGETOWN:
157 		*(int *)data = fgetown(so->so_sigio);
158 		error = 0;
159 		break;
160 	case SIOCSPGRP:
161 		error = fsetown(-(*(int *)data), &so->so_sigio);
162 		break;
163 	case SIOCGPGRP:
164 		*(int *)data = -fgetown(so->so_sigio);
165 		error = 0;
166 		break;
167 	case SIOCATMARK:
168 		*(int *)data = (so->so_state&SS_RCVATMARK) != 0;
169 		error = 0;
170 		break;
171 	default:
172 		/*
173 		 * Interface/routing/protocol specific ioctls:
174 		 * interface and routing ioctls should have a
175 		 * different entry since a socket's unnecessary
176 		 */
177 		if (IOCGROUP(cmd) == 'i')
178 			error = ifioctl(so, cmd, data, cred);
179 		else if (IOCGROUP(cmd) == 'r')
180 			error = rtioctl(cmd, data, cred);
181 		else
182 			error = so_pru_control(so, cmd, data, NULL);
183 		break;
184 	}
185 	rel_mplock();
186 	return (error);
187 }
188 
189 /*
190  * MPSAFE - acquires mplock
191  */
192 int
193 soo_stat(struct file *fp, struct stat *ub, struct ucred *cred)
194 {
195 	struct socket *so;
196 	int error;
197 
198 	bzero((caddr_t)ub, sizeof (*ub));
199 	ub->st_mode = S_IFSOCK;
200 	so = (struct socket *)fp->f_data;
201 
202 	/*
203 	 * If SS_CANTRCVMORE is set, but there's still data left in the
204 	 * receive buffer, the socket is still readable.
205 	 */
206 	if ((so->so_state & SS_CANTRCVMORE) == 0 ||
207 	    so->so_rcv.ssb_cc != 0)
208 		ub->st_mode |= S_IRUSR | S_IRGRP | S_IROTH;
209 	if ((so->so_state & SS_CANTSENDMORE) == 0)
210 		ub->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH;
211 	ub->st_size = so->so_rcv.ssb_cc;
212 	ub->st_uid = so->so_cred->cr_uid;
213 	ub->st_gid = so->so_cred->cr_gid;
214 	error = so_pru_sense(so, ub);
215 	return (error);
216 }
217 
218 /*
219  * MPALMOSTSAFE - acquires mplock
220  */
221 int
222 soo_close(struct file *fp)
223 {
224 	int error;
225 
226 	get_mplock();
227 	fp->f_ops = &badfileops;
228 	if (fp->f_data)
229 		error = soclose((struct socket *)fp->f_data, fp->f_flag);
230 	else
231 		error = 0;
232 	fp->f_data = NULL;
233 	rel_mplock();
234 	return (error);
235 }
236 
237 /*
238  * MPALMOSTSAFE - acquires mplock
239  */
240 int
241 soo_shutdown(struct file *fp, int how)
242 {
243 	int error;
244 
245 	get_mplock();
246 	if (fp->f_data)
247 		error = soshutdown((struct socket *)fp->f_data, how);
248 	else
249 		error = 0;
250 	rel_mplock();
251 	return (error);
252 }
253 
254