1 /* 2 * Copyright (c) 1982, 1986, 1990, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)sys_socket.c 8.1 (Berkeley) 6/10/93 34 * $FreeBSD: src/sys/kern/sys_socket.c,v 1.28.2.2 2001/02/26 04:23:16 jlemon Exp $ 35 * $DragonFly: src/sys/kern/sys_socket.c,v 1.12 2006/06/13 08:12:03 dillon Exp $ 36 */ 37 38 #include <sys/param.h> 39 #include <sys/systm.h> 40 #include <sys/file.h> 41 #include <sys/lock.h> 42 #include <sys/protosw.h> 43 #include <sys/socket.h> 44 #include <sys/socketvar.h> 45 #include <sys/socketops.h> 46 #include <sys/filio.h> /* XXX */ 47 #include <sys/sockio.h> 48 #include <sys/vnode.h> 49 #include <sys/stat.h> 50 #include <sys/uio.h> 51 #include <sys/filedesc.h> 52 #include <sys/ucred.h> 53 54 #include <net/if.h> 55 #include <net/route.h> 56 57 struct fileops socketops = { 58 NULL, /* port */ 59 NULL, /* clone */ 60 soo_read, soo_write, soo_ioctl, soo_poll, sokqfilter, 61 soo_stat, soo_close, soo_shutdown 62 }; 63 64 /* 65 * MPALMOSTSAFE - acquires mplock 66 */ 67 int 68 soo_read(struct file *fp, struct uio *uio, struct ucred *cred, int fflags) 69 { 70 struct socket *so; 71 int error; 72 int msgflags; 73 74 get_mplock(); 75 so = (struct socket *)fp->f_data; 76 77 if (fflags & O_FBLOCKING) 78 msgflags = 0; 79 else if (fflags & O_FNONBLOCKING) 80 msgflags = MSG_FNONBLOCKING; 81 else if (fp->f_flag & FNONBLOCK) 82 msgflags = MSG_FNONBLOCKING; 83 else 84 msgflags = 0; 85 86 error = so_pru_soreceive(so, NULL, uio, NULL, NULL, &msgflags); 87 rel_mplock(); 88 return (error); 89 } 90 91 /* 92 * MPALMOSTSAFE - acquires mplock 93 */ 94 int 95 soo_write(struct file *fp, struct uio *uio, struct ucred *cred, int fflags) 96 { 97 struct socket *so; 98 int error; 99 int msgflags; 100 101 get_mplock(); 102 so = (struct socket *)fp->f_data; 103 104 if (fflags & O_FBLOCKING) 105 msgflags = 0; 106 else if (fflags & O_FNONBLOCKING) 107 msgflags = MSG_FNONBLOCKING; 108 else if (fp->f_flag & FNONBLOCK) 109 msgflags = MSG_FNONBLOCKING; 110 else 111 msgflags = 0; 112 113 error = so_pru_sosend(so, NULL, uio, NULL, NULL, msgflags, uio->uio_td); 114 rel_mplock(); 115 return (error); 116 } 117 118 /* 119 * MPALMOSTSAFE - acquires mplock 120 */ 121 int 122 soo_ioctl(struct file *fp, u_long cmd, caddr_t data, struct ucred *cred) 123 { 124 struct socket *so; 125 int error; 126 127 get_mplock(); 128 so = (struct socket *)fp->f_data; 129 130 switch (cmd) { 131 case FIOASYNC: 132 if (*(int *)data) { 133 so->so_state |= SS_ASYNC; 134 so->so_rcv.sb_flags |= SB_ASYNC; 135 so->so_snd.sb_flags |= SB_ASYNC; 136 } else { 137 so->so_state &= ~SS_ASYNC; 138 so->so_rcv.sb_flags &= ~SB_ASYNC; 139 so->so_snd.sb_flags &= ~SB_ASYNC; 140 } 141 error = 0; 142 break; 143 case FIONREAD: 144 *(int *)data = so->so_rcv.sb_cc; 145 error = 0; 146 break; 147 case FIOSETOWN: 148 error = fsetown(*(int *)data, &so->so_sigio); 149 break; 150 case FIOGETOWN: 151 *(int *)data = fgetown(so->so_sigio); 152 error = 0; 153 break; 154 case SIOCSPGRP: 155 error = fsetown(-(*(int *)data), &so->so_sigio); 156 break; 157 case SIOCGPGRP: 158 *(int *)data = -fgetown(so->so_sigio); 159 error = 0; 160 break; 161 case SIOCATMARK: 162 *(int *)data = (so->so_state&SS_RCVATMARK) != 0; 163 error = 0; 164 break; 165 default: 166 /* 167 * Interface/routing/protocol specific ioctls: 168 * interface and routing ioctls should have a 169 * different entry since a socket's unnecessary 170 */ 171 if (IOCGROUP(cmd) == 'i') 172 error = ifioctl(so, cmd, data, cred); 173 else if (IOCGROUP(cmd) == 'r') 174 error = rtioctl(cmd, data, cred); 175 else 176 error = so_pru_control(so, cmd, data, NULL); 177 break; 178 } 179 rel_mplock(); 180 return (error); 181 } 182 183 /* 184 * MPALMOSTSAFE - acquires mplock 185 */ 186 int 187 soo_poll(struct file *fp, int events, struct ucred *cred) 188 { 189 struct socket *so; 190 int error; 191 192 get_mplock(); 193 so = (struct socket *)fp->f_data; 194 error = so_pru_sopoll(so, events, cred); 195 rel_mplock(); 196 return (error); 197 } 198 199 /* 200 * MPALMOSTSAFE - acquires mplock 201 */ 202 int 203 soo_stat(struct file *fp, struct stat *ub, struct ucred *cred) 204 { 205 struct socket *so; 206 int error; 207 208 bzero((caddr_t)ub, sizeof (*ub)); 209 ub->st_mode = S_IFSOCK; 210 get_mplock(); 211 so = (struct socket *)fp->f_data; 212 /* 213 * If SS_CANTRCVMORE is set, but there's still data left in the 214 * receive buffer, the socket is still readable. 215 */ 216 if ((so->so_state & SS_CANTRCVMORE) == 0 || 217 so->so_rcv.sb_cc != 0) 218 ub->st_mode |= S_IRUSR | S_IRGRP | S_IROTH; 219 if ((so->so_state & SS_CANTSENDMORE) == 0) 220 ub->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH; 221 ub->st_size = so->so_rcv.sb_cc; 222 ub->st_uid = so->so_cred->cr_uid; 223 ub->st_gid = so->so_cred->cr_gid; 224 error = so_pru_sense(so, ub); 225 rel_mplock(); 226 return (error); 227 } 228 229 /* 230 * MPALMOSTSAFE - acquires mplock 231 */ 232 int 233 soo_close(struct file *fp) 234 { 235 int error; 236 237 get_mplock(); 238 fp->f_ops = &badfileops; 239 if (fp->f_data) 240 error = soclose((struct socket *)fp->f_data, fp->f_flag); 241 else 242 error = 0; 243 fp->f_data = NULL; 244 rel_mplock(); 245 return (error); 246 } 247 248 /* 249 * MPALMOSTSAFE - acquires mplock 250 */ 251 int 252 soo_shutdown(struct file *fp, int how) 253 { 254 int error; 255 256 get_mplock(); 257 if (fp->f_data) 258 error = soshutdown((struct socket *)fp->f_data, how); 259 else 260 error = 0; 261 rel_mplock(); 262 return (error); 263 } 264 265