1 /* 2 * Copyright (c) 1982, 1986, 1990, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)sys_socket.c 8.1 (Berkeley) 6/10/93 34 * $FreeBSD: src/sys/kern/sys_socket.c,v 1.28.2.2 2001/02/26 04:23:16 jlemon Exp $ 35 * $DragonFly: src/sys/kern/sys_socket.c,v 1.14 2007/04/22 01:13:10 dillon Exp $ 36 */ 37 38 #include <sys/param.h> 39 #include <sys/systm.h> 40 #include <sys/file.h> 41 #include <sys/lock.h> 42 #include <sys/protosw.h> 43 #include <sys/socket.h> 44 #include <sys/socketvar.h> 45 #include <sys/socketops.h> 46 #include <sys/filio.h> /* XXX */ 47 #include <sys/sockio.h> 48 #include <sys/vnode.h> 49 #include <sys/stat.h> 50 #include <sys/uio.h> 51 #include <sys/filedesc.h> 52 #include <sys/ucred.h> 53 54 #include <net/if.h> 55 #include <net/route.h> 56 57 struct fileops socketops = { 58 .fo_read = soo_read, 59 .fo_write = soo_write, 60 .fo_ioctl = soo_ioctl, 61 .fo_poll = soo_poll, 62 .fo_kqfilter = sokqfilter, 63 .fo_stat = soo_stat, 64 .fo_close = soo_close, 65 .fo_shutdown = soo_shutdown 66 }; 67 68 /* 69 * MPALMOSTSAFE - acquires mplock 70 */ 71 int 72 soo_read(struct file *fp, struct uio *uio, struct ucred *cred, int fflags) 73 { 74 struct socket *so; 75 int error; 76 int msgflags; 77 78 get_mplock(); 79 so = (struct socket *)fp->f_data; 80 81 if (fflags & O_FBLOCKING) 82 msgflags = 0; 83 else if (fflags & O_FNONBLOCKING) 84 msgflags = MSG_FNONBLOCKING; 85 else if (fp->f_flag & FNONBLOCK) 86 msgflags = MSG_FNONBLOCKING; 87 else 88 msgflags = 0; 89 90 error = so_pru_soreceive(so, NULL, uio, NULL, NULL, &msgflags); 91 rel_mplock(); 92 return (error); 93 } 94 95 /* 96 * MPALMOSTSAFE - acquires mplock 97 */ 98 int 99 soo_write(struct file *fp, struct uio *uio, struct ucred *cred, int fflags) 100 { 101 struct socket *so; 102 int error; 103 int msgflags; 104 105 get_mplock(); 106 so = (struct socket *)fp->f_data; 107 108 if (fflags & O_FBLOCKING) 109 msgflags = 0; 110 else if (fflags & O_FNONBLOCKING) 111 msgflags = MSG_FNONBLOCKING; 112 else if (fp->f_flag & FNONBLOCK) 113 msgflags = MSG_FNONBLOCKING; 114 else 115 msgflags = 0; 116 117 error = so_pru_sosend(so, NULL, uio, NULL, NULL, msgflags, uio->uio_td); 118 rel_mplock(); 119 return (error); 120 } 121 122 /* 123 * MPALMOSTSAFE - acquires mplock 124 */ 125 int 126 soo_ioctl(struct file *fp, u_long cmd, caddr_t data, struct ucred *cred) 127 { 128 struct socket *so; 129 int error; 130 131 get_mplock(); 132 so = (struct socket *)fp->f_data; 133 134 switch (cmd) { 135 case FIOASYNC: 136 if (*(int *)data) { 137 so->so_state |= SS_ASYNC; 138 so->so_rcv.ssb_flags |= SSB_ASYNC; 139 so->so_snd.ssb_flags |= SSB_ASYNC; 140 } else { 141 so->so_state &= ~SS_ASYNC; 142 so->so_rcv.ssb_flags &= ~SSB_ASYNC; 143 so->so_snd.ssb_flags &= ~SSB_ASYNC; 144 } 145 error = 0; 146 break; 147 case FIONREAD: 148 *(int *)data = so->so_rcv.ssb_cc; 149 error = 0; 150 break; 151 case FIOSETOWN: 152 error = fsetown(*(int *)data, &so->so_sigio); 153 break; 154 case FIOGETOWN: 155 *(int *)data = fgetown(so->so_sigio); 156 error = 0; 157 break; 158 case SIOCSPGRP: 159 error = fsetown(-(*(int *)data), &so->so_sigio); 160 break; 161 case SIOCGPGRP: 162 *(int *)data = -fgetown(so->so_sigio); 163 error = 0; 164 break; 165 case SIOCATMARK: 166 *(int *)data = (so->so_state&SS_RCVATMARK) != 0; 167 error = 0; 168 break; 169 default: 170 /* 171 * Interface/routing/protocol specific ioctls: 172 * interface and routing ioctls should have a 173 * different entry since a socket's unnecessary 174 */ 175 if (IOCGROUP(cmd) == 'i') 176 error = ifioctl(so, cmd, data, cred); 177 else if (IOCGROUP(cmd) == 'r') 178 error = rtioctl(cmd, data, cred); 179 else 180 error = so_pru_control(so, cmd, data, NULL); 181 break; 182 } 183 rel_mplock(); 184 return (error); 185 } 186 187 /* 188 * MPALMOSTSAFE - acquires mplock 189 */ 190 int 191 soo_poll(struct file *fp, int events, struct ucred *cred) 192 { 193 struct socket *so; 194 int error; 195 196 get_mplock(); 197 so = (struct socket *)fp->f_data; 198 error = so_pru_sopoll(so, events, cred); 199 rel_mplock(); 200 return (error); 201 } 202 203 /* 204 * MPALMOSTSAFE - acquires mplock 205 */ 206 int 207 soo_stat(struct file *fp, struct stat *ub, struct ucred *cred) 208 { 209 struct socket *so; 210 int error; 211 212 bzero((caddr_t)ub, sizeof (*ub)); 213 ub->st_mode = S_IFSOCK; 214 get_mplock(); 215 so = (struct socket *)fp->f_data; 216 /* 217 * If SS_CANTRCVMORE is set, but there's still data left in the 218 * receive buffer, the socket is still readable. 219 */ 220 if ((so->so_state & SS_CANTRCVMORE) == 0 || 221 so->so_rcv.ssb_cc != 0) 222 ub->st_mode |= S_IRUSR | S_IRGRP | S_IROTH; 223 if ((so->so_state & SS_CANTSENDMORE) == 0) 224 ub->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH; 225 ub->st_size = so->so_rcv.ssb_cc; 226 ub->st_uid = so->so_cred->cr_uid; 227 ub->st_gid = so->so_cred->cr_gid; 228 error = so_pru_sense(so, ub); 229 rel_mplock(); 230 return (error); 231 } 232 233 /* 234 * MPALMOSTSAFE - acquires mplock 235 */ 236 int 237 soo_close(struct file *fp) 238 { 239 int error; 240 241 get_mplock(); 242 fp->f_ops = &badfileops; 243 if (fp->f_data) 244 error = soclose((struct socket *)fp->f_data, fp->f_flag); 245 else 246 error = 0; 247 fp->f_data = NULL; 248 rel_mplock(); 249 return (error); 250 } 251 252 /* 253 * MPALMOSTSAFE - acquires mplock 254 */ 255 int 256 soo_shutdown(struct file *fp, int how) 257 { 258 int error; 259 260 get_mplock(); 261 if (fp->f_data) 262 error = soshutdown((struct socket *)fp->f_data, how); 263 else 264 error = 0; 265 rel_mplock(); 266 return (error); 267 } 268 269