1 /* 2 * Copyright (c) 1982, 1986, 1990, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)sys_socket.c 8.1 (Berkeley) 6/10/93 34 * $FreeBSD: src/sys/kern/sys_socket.c,v 1.28.2.2 2001/02/26 04:23:16 jlemon Exp $ 35 * $DragonFly: src/sys/kern/sys_socket.c,v 1.14 2007/04/22 01:13:10 dillon Exp $ 36 */ 37 38 #include <sys/param.h> 39 #include <sys/systm.h> 40 #include <sys/file.h> 41 #include <sys/lock.h> 42 #include <sys/protosw.h> 43 #include <sys/socket.h> 44 #include <sys/socketvar.h> 45 #include <sys/socketops.h> 46 #include <sys/filio.h> /* XXX */ 47 #include <sys/sockio.h> 48 #include <sys/vnode.h> 49 #include <sys/stat.h> 50 #include <sys/uio.h> 51 #include <sys/filedesc.h> 52 #include <sys/ucred.h> 53 54 #include <net/if.h> 55 #include <net/route.h> 56 57 struct fileops socketops = { 58 .fo_read = soo_read, 59 .fo_write = soo_write, 60 .fo_ioctl = soo_ioctl, 61 .fo_poll = soo_poll, 62 .fo_kqfilter = sokqfilter, 63 .fo_stat = soo_stat, 64 .fo_close = soo_close, 65 .fo_shutdown = soo_shutdown 66 }; 67 68 /* 69 * MPALMOSTSAFE - acquires mplock 70 */ 71 int 72 soo_read(struct file *fp, struct uio *uio, struct ucred *cred, int fflags) 73 { 74 struct socket *so; 75 int error; 76 int msgflags; 77 78 get_mplock(); 79 so = (struct socket *)fp->f_data; 80 81 if (fflags & O_FBLOCKING) 82 msgflags = 0; 83 else if (fflags & O_FNONBLOCKING) 84 msgflags = MSG_FNONBLOCKING; 85 else if (fp->f_flag & FNONBLOCK) 86 msgflags = MSG_FNONBLOCKING; 87 else 88 msgflags = 0; 89 90 error = so_pru_soreceive(so, NULL, uio, NULL, NULL, &msgflags); 91 rel_mplock(); 92 return (error); 93 } 94 95 /* 96 * MPALMOSTSAFE - acquires mplock 97 */ 98 int 99 soo_write(struct file *fp, struct uio *uio, struct ucred *cred, int fflags) 100 { 101 struct socket *so; 102 int error; 103 int msgflags; 104 105 get_mplock(); 106 so = (struct socket *)fp->f_data; 107 108 if (fflags & O_FBLOCKING) 109 msgflags = 0; 110 else if (fflags & O_FNONBLOCKING) 111 msgflags = MSG_FNONBLOCKING; 112 else if (fp->f_flag & FNONBLOCK) 113 msgflags = MSG_FNONBLOCKING; 114 else 115 msgflags = 0; 116 117 error = so_pru_sosend(so, NULL, uio, NULL, NULL, msgflags, uio->uio_td); 118 rel_mplock(); 119 return (error); 120 } 121 122 /* 123 * MPALMOSTSAFE - acquires mplock 124 */ 125 int 126 soo_ioctl(struct file *fp, u_long cmd, caddr_t data, 127 struct ucred *cred, struct sysmsg *msg) 128 { 129 struct socket *so; 130 int error; 131 132 get_mplock(); 133 so = (struct socket *)fp->f_data; 134 135 switch (cmd) { 136 case FIOASYNC: 137 if (*(int *)data) { 138 so->so_state |= SS_ASYNC; 139 so->so_rcv.ssb_flags |= SSB_ASYNC; 140 so->so_snd.ssb_flags |= SSB_ASYNC; 141 } else { 142 so->so_state &= ~SS_ASYNC; 143 so->so_rcv.ssb_flags &= ~SSB_ASYNC; 144 so->so_snd.ssb_flags &= ~SSB_ASYNC; 145 } 146 error = 0; 147 break; 148 case FIONREAD: 149 *(int *)data = so->so_rcv.ssb_cc; 150 error = 0; 151 break; 152 case FIOSETOWN: 153 error = fsetown(*(int *)data, &so->so_sigio); 154 break; 155 case FIOGETOWN: 156 *(int *)data = fgetown(so->so_sigio); 157 error = 0; 158 break; 159 case SIOCSPGRP: 160 error = fsetown(-(*(int *)data), &so->so_sigio); 161 break; 162 case SIOCGPGRP: 163 *(int *)data = -fgetown(so->so_sigio); 164 error = 0; 165 break; 166 case SIOCATMARK: 167 *(int *)data = (so->so_state&SS_RCVATMARK) != 0; 168 error = 0; 169 break; 170 default: 171 /* 172 * Interface/routing/protocol specific ioctls: 173 * interface and routing ioctls should have a 174 * different entry since a socket's unnecessary 175 */ 176 if (IOCGROUP(cmd) == 'i') 177 error = ifioctl(so, cmd, data, cred); 178 else if (IOCGROUP(cmd) == 'r') 179 error = rtioctl(cmd, data, cred); 180 else 181 error = so_pru_control(so, cmd, data, NULL); 182 break; 183 } 184 rel_mplock(); 185 return (error); 186 } 187 188 /* 189 * MPALMOSTSAFE - acquires mplock 190 */ 191 int 192 soo_poll(struct file *fp, int events, struct ucred *cred) 193 { 194 struct socket *so; 195 int error; 196 197 get_mplock(); 198 so = (struct socket *)fp->f_data; 199 error = so_pru_sopoll(so, events, cred); 200 rel_mplock(); 201 return (error); 202 } 203 204 /* 205 * MPSAFE - acquires mplock 206 */ 207 int 208 soo_stat(struct file *fp, struct stat *ub, struct ucred *cred) 209 { 210 struct socket *so; 211 int error; 212 213 bzero((caddr_t)ub, sizeof (*ub)); 214 ub->st_mode = S_IFSOCK; 215 so = (struct socket *)fp->f_data; 216 217 /* 218 * If SS_CANTRCVMORE is set, but there's still data left in the 219 * receive buffer, the socket is still readable. 220 */ 221 if ((so->so_state & SS_CANTRCVMORE) == 0 || 222 so->so_rcv.ssb_cc != 0) 223 ub->st_mode |= S_IRUSR | S_IRGRP | S_IROTH; 224 if ((so->so_state & SS_CANTSENDMORE) == 0) 225 ub->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH; 226 ub->st_size = so->so_rcv.ssb_cc; 227 ub->st_uid = so->so_cred->cr_uid; 228 ub->st_gid = so->so_cred->cr_gid; 229 error = so_pru_sense(so, ub); 230 return (error); 231 } 232 233 /* 234 * MPALMOSTSAFE - acquires mplock 235 */ 236 int 237 soo_close(struct file *fp) 238 { 239 int error; 240 241 get_mplock(); 242 fp->f_ops = &badfileops; 243 if (fp->f_data) 244 error = soclose((struct socket *)fp->f_data, fp->f_flag); 245 else 246 error = 0; 247 fp->f_data = NULL; 248 rel_mplock(); 249 return (error); 250 } 251 252 /* 253 * MPALMOSTSAFE - acquires mplock 254 */ 255 int 256 soo_shutdown(struct file *fp, int how) 257 { 258 int error; 259 260 get_mplock(); 261 if (fp->f_data) 262 error = soshutdown((struct socket *)fp->f_data, how); 263 else 264 error = 0; 265 rel_mplock(); 266 return (error); 267 } 268 269