1 /* 2 * Copyright (c) 1982, 1986, 1990, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)sys_socket.c 8.1 (Berkeley) 6/10/93 34 * $FreeBSD: src/sys/kern/sys_socket.c,v 1.28.2.2 2001/02/26 04:23:16 jlemon Exp $ 35 * $DragonFly: src/sys/kern/sys_socket.c,v 1.14 2007/04/22 01:13:10 dillon Exp $ 36 */ 37 38 #include <sys/param.h> 39 #include <sys/systm.h> 40 #include <sys/file.h> 41 #include <sys/lock.h> 42 #include <sys/protosw.h> 43 #include <sys/socket.h> 44 #include <sys/socketvar.h> 45 #include <sys/socketops.h> 46 #include <sys/filio.h> /* XXX */ 47 #include <sys/sockio.h> 48 #include <sys/vnode.h> 49 #include <sys/stat.h> 50 #include <sys/uio.h> 51 #include <sys/filedesc.h> 52 #include <sys/ucred.h> 53 54 #include <sys/mplock2.h> 55 56 #include <net/if.h> 57 #include <net/route.h> 58 59 struct fileops socketops = { 60 .fo_read = soo_read, 61 .fo_write = soo_write, 62 .fo_ioctl = soo_ioctl, 63 .fo_poll = soo_poll, 64 .fo_kqfilter = sokqfilter, 65 .fo_stat = soo_stat, 66 .fo_close = soo_close, 67 .fo_shutdown = soo_shutdown 68 }; 69 70 /* 71 * MPALMOSTSAFE - acquires mplock 72 */ 73 int 74 soo_read(struct file *fp, struct uio *uio, struct ucred *cred, int fflags) 75 { 76 struct socket *so; 77 int error; 78 int msgflags; 79 80 get_mplock(); 81 so = (struct socket *)fp->f_data; 82 83 if (fflags & O_FBLOCKING) 84 msgflags = 0; 85 else if (fflags & O_FNONBLOCKING) 86 msgflags = MSG_FNONBLOCKING; 87 else if (fp->f_flag & FNONBLOCK) 88 msgflags = MSG_FNONBLOCKING; 89 else 90 msgflags = 0; 91 92 error = so_pru_soreceive(so, NULL, uio, NULL, NULL, &msgflags); 93 rel_mplock(); 94 return (error); 95 } 96 97 /* 98 * MPALMOSTSAFE - acquires mplock 99 */ 100 int 101 soo_write(struct file *fp, struct uio *uio, struct ucred *cred, int fflags) 102 { 103 struct socket *so; 104 int error; 105 int msgflags; 106 107 get_mplock(); 108 so = (struct socket *)fp->f_data; 109 110 if (fflags & O_FBLOCKING) 111 msgflags = 0; 112 else if (fflags & O_FNONBLOCKING) 113 msgflags = MSG_FNONBLOCKING; 114 else if (fp->f_flag & FNONBLOCK) 115 msgflags = MSG_FNONBLOCKING; 116 else 117 msgflags = 0; 118 119 error = so_pru_sosend(so, NULL, uio, NULL, NULL, msgflags, uio->uio_td); 120 rel_mplock(); 121 return (error); 122 } 123 124 /* 125 * MPALMOSTSAFE - acquires mplock 126 */ 127 int 128 soo_ioctl(struct file *fp, u_long cmd, caddr_t data, 129 struct ucred *cred, struct sysmsg *msg) 130 { 131 struct socket *so; 132 int error; 133 134 get_mplock(); 135 so = (struct socket *)fp->f_data; 136 137 switch (cmd) { 138 case FIOASYNC: 139 if (*(int *)data) { 140 so->so_state |= SS_ASYNC; 141 so->so_rcv.ssb_flags |= SSB_ASYNC; 142 so->so_snd.ssb_flags |= SSB_ASYNC; 143 } else { 144 so->so_state &= ~SS_ASYNC; 145 so->so_rcv.ssb_flags &= ~SSB_ASYNC; 146 so->so_snd.ssb_flags &= ~SSB_ASYNC; 147 } 148 error = 0; 149 break; 150 case FIONREAD: 151 *(int *)data = so->so_rcv.ssb_cc; 152 error = 0; 153 break; 154 case FIOSETOWN: 155 error = fsetown(*(int *)data, &so->so_sigio); 156 break; 157 case FIOGETOWN: 158 *(int *)data = fgetown(so->so_sigio); 159 error = 0; 160 break; 161 case SIOCSPGRP: 162 error = fsetown(-(*(int *)data), &so->so_sigio); 163 break; 164 case SIOCGPGRP: 165 *(int *)data = -fgetown(so->so_sigio); 166 error = 0; 167 break; 168 case SIOCATMARK: 169 *(int *)data = (so->so_state&SS_RCVATMARK) != 0; 170 error = 0; 171 break; 172 default: 173 /* 174 * Interface/routing/protocol specific ioctls: 175 * interface and routing ioctls should have a 176 * different entry since a socket's unnecessary 177 */ 178 if (IOCGROUP(cmd) == 'i') 179 error = ifioctl(so, cmd, data, cred); 180 else if (IOCGROUP(cmd) == 'r') 181 error = rtioctl(cmd, data, cred); 182 else 183 error = so_pru_control(so, cmd, data, NULL); 184 break; 185 } 186 rel_mplock(); 187 return (error); 188 } 189 190 /* 191 * MPALMOSTSAFE - acquires mplock 192 */ 193 int 194 soo_poll(struct file *fp, int events, struct ucred *cred) 195 { 196 struct socket *so; 197 int error; 198 199 get_mplock(); 200 so = (struct socket *)fp->f_data; 201 error = so_pru_sopoll(so, events, cred); 202 rel_mplock(); 203 return (error); 204 } 205 206 /* 207 * MPSAFE - acquires mplock 208 */ 209 int 210 soo_stat(struct file *fp, struct stat *ub, struct ucred *cred) 211 { 212 struct socket *so; 213 int error; 214 215 bzero((caddr_t)ub, sizeof (*ub)); 216 ub->st_mode = S_IFSOCK; 217 so = (struct socket *)fp->f_data; 218 219 /* 220 * If SS_CANTRCVMORE is set, but there's still data left in the 221 * receive buffer, the socket is still readable. 222 */ 223 if ((so->so_state & SS_CANTRCVMORE) == 0 || 224 so->so_rcv.ssb_cc != 0) 225 ub->st_mode |= S_IRUSR | S_IRGRP | S_IROTH; 226 if ((so->so_state & SS_CANTSENDMORE) == 0) 227 ub->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH; 228 ub->st_size = so->so_rcv.ssb_cc; 229 ub->st_uid = so->so_cred->cr_uid; 230 ub->st_gid = so->so_cred->cr_gid; 231 error = so_pru_sense(so, ub); 232 return (error); 233 } 234 235 /* 236 * MPALMOSTSAFE - acquires mplock 237 */ 238 int 239 soo_close(struct file *fp) 240 { 241 int error; 242 243 get_mplock(); 244 fp->f_ops = &badfileops; 245 if (fp->f_data) 246 error = soclose((struct socket *)fp->f_data, fp->f_flag); 247 else 248 error = 0; 249 fp->f_data = NULL; 250 rel_mplock(); 251 return (error); 252 } 253 254 /* 255 * MPALMOSTSAFE - acquires mplock 256 */ 257 int 258 soo_shutdown(struct file *fp, int how) 259 { 260 int error; 261 262 get_mplock(); 263 if (fp->f_data) 264 error = soshutdown((struct socket *)fp->f_data, how); 265 else 266 error = 0; 267 rel_mplock(); 268 return (error); 269 } 270 271