1 /* 2 * Copyright (c) 1982, 1986, 1988, 1990 Regents of the University of California. 3 * All rights reserved. 4 * 5 * %sccs.include.redist.c% 6 * 7 * @(#)uipc_socket.c 7.23 (Berkeley) 06/29/90 8 */ 9 10 #include "param.h" 11 #include "user.h" 12 #include "proc.h" 13 #include "file.h" 14 #include "malloc.h" 15 #include "mbuf.h" 16 #include "domain.h" 17 #include "kernel.h" 18 #include "protosw.h" 19 #include "socket.h" 20 #include "socketvar.h" 21 #include "time.h" 22 23 /* 24 * Socket operation routines. 25 * These routines are called by the routines in 26 * sys_socket.c or from a system process, and 27 * implement the semantics of socket operations by 28 * switching out to the protocol specific routines. 29 * 30 * TODO: 31 * test socketpair 32 * clean up async 33 * out-of-band is a kludge 34 */ 35 /*ARGSUSED*/ 36 socreate(dom, aso, type, proto) 37 struct socket **aso; 38 register int type; 39 int proto; 40 { 41 register struct protosw *prp; 42 register struct socket *so; 43 register int error; 44 45 if (proto) 46 prp = pffindproto(dom, proto, type); 47 else 48 prp = pffindtype(dom, type); 49 if (prp == 0) 50 return (EPROTONOSUPPORT); 51 if (prp->pr_type != type) 52 return (EPROTOTYPE); 53 MALLOC(so, struct socket *, sizeof(*so), M_SOCKET, M_WAIT); 54 bzero((caddr_t)so, sizeof(*so)); 55 so->so_type = type; 56 if (u.u_uid == 0) 57 so->so_state = SS_PRIV; 58 so->so_proto = prp; 59 error = 60 (*prp->pr_usrreq)(so, PRU_ATTACH, 61 (struct mbuf *)0, (struct mbuf *)proto, (struct mbuf *)0); 62 if (error) { 63 so->so_state |= SS_NOFDREF; 64 sofree(so); 65 return (error); 66 } 67 *aso = so; 68 return (0); 69 } 70 71 sobind(so, nam) 72 struct socket *so; 73 struct mbuf *nam; 74 { 75 int s = splnet(); 76 int error; 77 78 error = 79 (*so->so_proto->pr_usrreq)(so, PRU_BIND, 80 (struct mbuf *)0, nam, (struct mbuf *)0); 81 splx(s); 82 return (error); 83 } 84 85 solisten(so, backlog) 86 register struct socket *so; 87 int backlog; 88 { 89 int s = splnet(), error; 90 91 error = 92 (*so->so_proto->pr_usrreq)(so, PRU_LISTEN, 93 (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0); 94 if (error) { 95 splx(s); 96 return (error); 97 } 98 if (so->so_q == 0) 99 so->so_options |= SO_ACCEPTCONN; 100 if (backlog < 0) 101 backlog = 0; 102 so->so_qlimit = min(backlog, SOMAXCONN); 103 splx(s); 104 return (0); 105 } 106 107 sofree(so) 108 register struct socket *so; 109 { 110 111 if (so->so_pcb || (so->so_state & SS_NOFDREF) == 0) 112 return; 113 if (so->so_head) { 114 if (!soqremque(so, 0) && !soqremque(so, 1)) 115 panic("sofree dq"); 116 so->so_head = 0; 117 } 118 sbrelease(&so->so_snd); 119 sorflush(so); 120 FREE(so, M_SOCKET); 121 } 122 123 /* 124 * Close a socket on last file table reference removal. 125 * Initiate disconnect if connected. 126 * Free socket when disconnect complete. 127 */ 128 soclose(so) 129 register struct socket *so; 130 { 131 int s = splnet(); /* conservative */ 132 int error = 0; 133 134 if (so->so_options & SO_ACCEPTCONN) { 135 while (so->so_q0) 136 (void) soabort(so->so_q0); 137 while (so->so_q) 138 (void) soabort(so->so_q); 139 } 140 if (so->so_pcb == 0) 141 goto discard; 142 if (so->so_state & SS_ISCONNECTED) { 143 if ((so->so_state & SS_ISDISCONNECTING) == 0) { 144 error = sodisconnect(so); 145 if (error) 146 goto drop; 147 } 148 if (so->so_options & SO_LINGER) { 149 if ((so->so_state & SS_ISDISCONNECTING) && 150 (so->so_state & SS_NBIO)) 151 goto drop; 152 while (so->so_state & SS_ISCONNECTED) 153 if (error = tsleep((caddr_t)&so->so_timeo, 154 PSOCK | PCATCH, netcls, so->so_linger)) 155 break; 156 } 157 } 158 drop: 159 if (so->so_pcb) { 160 int error2 = 161 (*so->so_proto->pr_usrreq)(so, PRU_DETACH, 162 (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0); 163 if (error == 0) 164 error = error2; 165 } 166 discard: 167 if (so->so_state & SS_NOFDREF) 168 panic("soclose: NOFDREF"); 169 so->so_state |= SS_NOFDREF; 170 sofree(so); 171 splx(s); 172 return (error); 173 } 174 175 /* 176 * Must be called at splnet... 177 */ 178 soabort(so) 179 struct socket *so; 180 { 181 182 return ( 183 (*so->so_proto->pr_usrreq)(so, PRU_ABORT, 184 (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0)); 185 } 186 187 soaccept(so, nam) 188 register struct socket *so; 189 struct mbuf *nam; 190 { 191 int s = splnet(); 192 int error; 193 194 if ((so->so_state & SS_NOFDREF) == 0) 195 panic("soaccept: !NOFDREF"); 196 so->so_state &= ~SS_NOFDREF; 197 error = (*so->so_proto->pr_usrreq)(so, PRU_ACCEPT, 198 (struct mbuf *)0, nam, (struct mbuf *)0); 199 splx(s); 200 return (error); 201 } 202 203 soconnect(so, nam) 204 register struct socket *so; 205 struct mbuf *nam; 206 { 207 int s; 208 int error; 209 210 if (so->so_options & SO_ACCEPTCONN) 211 return (EOPNOTSUPP); 212 s = splnet(); 213 /* 214 * If protocol is connection-based, can only connect once. 215 * Otherwise, if connected, try to disconnect first. 216 * This allows user to disconnect by connecting to, e.g., 217 * a null address. 218 */ 219 if (so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING) && 220 ((so->so_proto->pr_flags & PR_CONNREQUIRED) || 221 (error = sodisconnect(so)))) 222 error = EISCONN; 223 else 224 error = (*so->so_proto->pr_usrreq)(so, PRU_CONNECT, 225 (struct mbuf *)0, nam, (struct mbuf *)0); 226 splx(s); 227 return (error); 228 } 229 230 soconnect2(so1, so2) 231 register struct socket *so1; 232 struct socket *so2; 233 { 234 int s = splnet(); 235 int error; 236 237 error = (*so1->so_proto->pr_usrreq)(so1, PRU_CONNECT2, 238 (struct mbuf *)0, (struct mbuf *)so2, (struct mbuf *)0); 239 splx(s); 240 return (error); 241 } 242 243 sodisconnect(so) 244 register struct socket *so; 245 { 246 int s = splnet(); 247 int error; 248 249 if ((so->so_state & SS_ISCONNECTED) == 0) { 250 error = ENOTCONN; 251 goto bad; 252 } 253 if (so->so_state & SS_ISDISCONNECTING) { 254 error = EALREADY; 255 goto bad; 256 } 257 error = (*so->so_proto->pr_usrreq)(so, PRU_DISCONNECT, 258 (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0); 259 bad: 260 splx(s); 261 return (error); 262 } 263 264 /* 265 * Send on a socket. 266 * If send must go all at once and message is larger than 267 * send buffering, then hard error. 268 * Lock against other senders. 269 * If must go all at once and not enough room now, then 270 * inform user that this would block and do nothing. 271 * Otherwise, if nonblocking, send as much as possible. 272 * The data to be sent is described by "uio" if nonzero, 273 * otherwise by the mbuf chain "top" (which must be null 274 * if uio is not). Data provided in mbuf chain must be small 275 * enough to send all at once. 276 * 277 * Returns nonzero on error, timeout or signal; callers 278 * must check for short counts if EINTR/ERESTART are returned. 279 * Data and control buffers are freed on return. 280 */ 281 sosend(so, addr, uio, top, control, flags) 282 register struct socket *so; 283 struct mbuf *addr; 284 struct uio *uio; 285 struct mbuf *top; 286 struct mbuf *control; 287 int flags; 288 { 289 struct mbuf **mp; 290 register struct mbuf *m; 291 register long space, len, resid; 292 int clen = 0, error, s, dontroute, mlen; 293 int atomic = sosendallatonce(so) || top; 294 295 if (uio) 296 resid = uio->uio_resid; 297 else 298 resid = top->m_pkthdr.len; 299 dontroute = 300 (flags & MSG_DONTROUTE) && (so->so_options & SO_DONTROUTE) == 0 && 301 (so->so_proto->pr_flags & PR_ATOMIC); 302 u.u_ru.ru_msgsnd++; 303 if (control) 304 clen = control->m_len; 305 #define snderr(errno) { error = errno; splx(s); goto release; } 306 307 restart: 308 if (error = sblock(&so->so_snd)) 309 goto out; 310 do { 311 s = splnet(); 312 if (so->so_state & SS_CANTSENDMORE) 313 snderr(EPIPE); 314 if (so->so_error) 315 snderr(so->so_error); 316 if ((so->so_state & SS_ISCONNECTED) == 0) { 317 if (so->so_proto->pr_flags & PR_CONNREQUIRED) { 318 if ((so->so_state & SS_ISCONFIRMING) == 0) 319 snderr(ENOTCONN); 320 } else if (addr == 0) 321 snderr(EDESTADDRREQ); 322 } 323 space = sbspace(&so->so_snd); 324 if (flags & MSG_OOB) 325 space += 1024; 326 if (space < resid + clen && 327 (atomic || space < so->so_snd.sb_lowat || space < clen)) { 328 if (atomic && resid > so->so_snd.sb_hiwat || 329 clen > so->so_snd.sb_hiwat) 330 snderr(EMSGSIZE); 331 if (so->so_state & SS_NBIO) 332 snderr(EWOULDBLOCK); 333 sbunlock(&so->so_snd); 334 error = sbwait(&so->so_snd); 335 splx(s); 336 if (error) 337 goto out; 338 goto restart; 339 } 340 splx(s); 341 mp = ⊤ 342 space -= clen; 343 do { 344 if (uio == NULL) { 345 /* 346 * Data is prepackaged in "top". 347 */ 348 resid = 0; 349 if (flags & MSG_EOR) 350 top->m_flags |= M_EOR; 351 } else do { 352 if (top == 0) { 353 MGETHDR(m, M_WAIT, MT_DATA); 354 mlen = MHLEN; 355 m->m_pkthdr.len = 0; 356 m->m_pkthdr.rcvif = (struct ifnet *)0; 357 } else { 358 MGET(m, M_WAIT, MT_DATA); 359 mlen = MLEN; 360 } 361 if (resid >= MINCLSIZE && space >= MCLBYTES) { 362 MCLGET(m, M_WAIT); 363 if ((m->m_flags & M_EXT) == 0) 364 goto nopages; 365 mlen = MCLBYTES; 366 #ifdef MAPPED_MBUFS 367 len = min(MCLBYTES, resid); 368 #else 369 if (top == 0) { 370 len = min(MCLBYTES - max_hdr, resid); 371 m->m_data += max_hdr; 372 } 373 #endif 374 space -= MCLBYTES; 375 } else { 376 nopages: 377 len = min(min(mlen, resid), space); 378 space -= len; 379 /* 380 * For datagram protocols, leave room 381 * for protocol headers in first mbuf. 382 */ 383 if (atomic && top == 0 && len < mlen) 384 MH_ALIGN(m, len); 385 } 386 error = uiomove(mtod(m, caddr_t), len, uio); 387 resid = uio->uio_resid; 388 m->m_len = len; 389 *mp = m; 390 top->m_pkthdr.len += len; 391 if (error) 392 goto release; 393 mp = &m->m_next; 394 if (resid <= 0) { 395 if (flags & MSG_EOR) 396 top->m_flags |= M_EOR; 397 break; 398 } 399 } while (space > 0 && atomic); 400 if (dontroute) 401 so->so_options |= SO_DONTROUTE; 402 s = splnet(); /* XXX */ 403 error = (*so->so_proto->pr_usrreq)(so, 404 (flags & MSG_OOB) ? PRU_SENDOOB : PRU_SEND, 405 top, addr, control); 406 splx(s); 407 if (dontroute) 408 so->so_options &= ~SO_DONTROUTE; 409 clen = 0; 410 control = 0; 411 top = 0; 412 mp = ⊤ 413 if (error) 414 goto release; 415 } while (resid && space > 0); 416 } while (resid); 417 418 release: 419 sbunlock(&so->so_snd); 420 out: 421 if (top) 422 m_freem(top); 423 if (control) 424 m_freem(control); 425 return (error); 426 } 427 428 /* 429 * Implement receive operations on a socket. 430 * We depend on the way that records are added to the sockbuf 431 * by sbappend*. In particular, each record (mbufs linked through m_next) 432 * must begin with an address if the protocol so specifies, 433 * followed by an optional mbuf or mbufs containing ancillary data, 434 * and then zero or more mbufs of data. 435 * In order to avoid blocking network interrupts for the entire time here, 436 * we splx() while doing the actual copy to user space. 437 * Although the sockbuf is locked, new data may still be appended, 438 * and thus we must maintain consistency of the sockbuf during that time. 439 * 440 * The caller may receive the data as a single mbuf chain by supplying 441 * an mbuf **mp0 for use in returning the chain. The uio is then used 442 * only for the count in uio_resid. 443 */ 444 soreceive(so, paddr, uio, mp0, controlp, flagsp) 445 register struct socket *so; 446 struct mbuf **paddr; 447 struct uio *uio; 448 struct mbuf **mp0; 449 struct mbuf **controlp; 450 int *flagsp; 451 { 452 register struct mbuf *m, **mp; 453 register int flags, len, error, s, offset; 454 struct protosw *pr = so->so_proto; 455 struct mbuf *nextrecord; 456 int moff, type; 457 458 mp = mp0; 459 if (paddr) 460 *paddr = 0; 461 if (controlp) 462 *controlp = 0; 463 if (flagsp) 464 flags = *flagsp &~ MSG_EOR; 465 else 466 flags = 0; 467 if (flags & MSG_OOB) { 468 m = m_get(M_WAIT, MT_DATA); 469 error = (*pr->pr_usrreq)(so, PRU_RCVOOB, 470 m, (struct mbuf *)(flags & MSG_PEEK), (struct mbuf *)0); 471 if (error) 472 goto bad; 473 do { 474 error = uiomove(mtod(m, caddr_t), 475 (int) min(uio->uio_resid, m->m_len), uio); 476 m = m_free(m); 477 } while (uio->uio_resid && error == 0 && m); 478 bad: 479 if (m) 480 m_freem(m); 481 return (error); 482 } 483 if (mp) 484 *mp = (struct mbuf *)0; 485 if (so->so_state & SS_ISCONFIRMING && uio->uio_resid) 486 (*pr->pr_usrreq)(so, PRU_RCVD, (struct mbuf *)0, 487 (struct mbuf *)0, (struct mbuf *)0); 488 489 restart: 490 if (error = sblock(&so->so_rcv)) 491 return (error); 492 s = splnet(); 493 494 m = so->so_rcv.sb_mb; 495 /* 496 * If we have less data than requested, block awaiting more 497 * (subject to any timeout) if: 498 * 1. the current count is less than the low water mark, or 499 * 2. MSG_WAITALL is set, and it is possible to do the entire 500 * receive operation at once if we block (resid <= hiwat). 501 * If MSG_WAITALL is set but resid is larger than the receive buffer, 502 * we have to do the receive in sections, and thus risk returning 503 * a short count if a timeout or signal occurs after we start. 504 */ 505 if (m == 0 || so->so_rcv.sb_cc < uio->uio_resid && 506 (so->so_rcv.sb_cc < so->so_rcv.sb_lowat || 507 ((flags & MSG_WAITALL) && uio->uio_resid <= so->so_rcv.sb_hiwat))) { 508 #ifdef DIAGNOSTIC 509 if (m == 0 && so->so_rcv.sb_cc) 510 panic("receive 1"); 511 #endif 512 if (so->so_error) { 513 error = so->so_error; 514 so->so_error = 0; 515 goto release; 516 } 517 if (so->so_state & SS_CANTRCVMORE) 518 goto release; 519 if ((so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) == 0 && 520 (so->so_proto->pr_flags & PR_CONNREQUIRED)) { 521 error = ENOTCONN; 522 goto release; 523 } 524 if (uio->uio_resid == 0) 525 goto release; 526 if (so->so_state & SS_NBIO) { 527 error = EWOULDBLOCK; 528 goto release; 529 } 530 sbunlock(&so->so_rcv); 531 error = sbwait(&so->so_rcv); 532 splx(s); 533 if (error) 534 return (error); 535 goto restart; 536 } 537 u.u_ru.ru_msgrcv++; 538 nextrecord = m->m_nextpkt; 539 if (pr->pr_flags & PR_ADDR) { 540 #ifdef DIAGNOSTIC 541 if (m->m_type != MT_SONAME) 542 panic("receive 1a"); 543 #endif 544 if (flags & MSG_PEEK) { 545 if (paddr) 546 *paddr = m_copy(m, 0, m->m_len); 547 m = m->m_next; 548 } else { 549 sbfree(&so->so_rcv, m); 550 if (paddr) { 551 *paddr = m; 552 so->so_rcv.sb_mb = m->m_next; 553 m->m_next = 0; 554 m = so->so_rcv.sb_mb; 555 } else { 556 MFREE(m, so->so_rcv.sb_mb); 557 m = so->so_rcv.sb_mb; 558 } 559 } 560 } 561 while (m && m->m_type == MT_CONTROL && error == 0) { 562 if (flags & MSG_PEEK) { 563 if (controlp) 564 *controlp = m_copy(m, 0, m->m_len); 565 m = m->m_next; 566 } else { 567 sbfree(&so->so_rcv, m); 568 if (controlp) { 569 if (pr->pr_domain->dom_externalize && 570 mtod(m, struct cmsghdr *)->cmsg_type == 571 SCM_RIGHTS) 572 error = (*pr->pr_domain->dom_externalize)(m); 573 *controlp = m; 574 so->so_rcv.sb_mb = m->m_next; 575 m->m_next = 0; 576 m = so->so_rcv.sb_mb; 577 } else { 578 MFREE(m, so->so_rcv.sb_mb); 579 m = so->so_rcv.sb_mb; 580 } 581 } 582 if (controlp) 583 controlp = &(*controlp)->m_next; 584 } 585 if (m) { 586 if ((flags & MSG_PEEK) == 0) 587 m->m_nextpkt = nextrecord; 588 type = m->m_type; 589 } 590 moff = 0; 591 offset = 0; 592 while (m && m->m_type == type && uio->uio_resid > 0 && error == 0) { 593 if (m->m_type == MT_OOBDATA) 594 flags |= MSG_OOB; 595 #ifdef DIAGNOSTIC 596 else if (m->m_type != MT_DATA && m->m_type != MT_HEADER) 597 panic("receive 3"); 598 #endif 599 type = m->m_type; 600 so->so_state &= ~SS_RCVATMARK; 601 len = uio->uio_resid; 602 if (so->so_oobmark && len > so->so_oobmark - offset) 603 len = so->so_oobmark - offset; 604 if (len > m->m_len - moff) 605 len = m->m_len - moff; 606 /* 607 * If mp is set, just pass back the mbufs. 608 * Otherwise copy them out via the uio, then free. 609 * Sockbuf must be consistent here (points to current mbuf, 610 * it points to next record) when we drop priority; 611 * we must note any additions to the sockbuf when we 612 * block interrupts again. 613 */ 614 if (mp == 0) { 615 splx(s); 616 error = uiomove(mtod(m, caddr_t) + moff, (int)len, uio); 617 s = splnet(); 618 } else 619 uio->uio_resid -= len; 620 if (len == m->m_len - moff) { 621 if (m->m_flags & M_EOR) 622 flags |= MSG_EOR; 623 if (flags & MSG_PEEK) { 624 m = m->m_next; 625 moff = 0; 626 } else { 627 nextrecord = m->m_nextpkt; 628 sbfree(&so->so_rcv, m); 629 if (mp) { 630 *mp = m; 631 mp = &m->m_next; 632 so->so_rcv.sb_mb = m = m->m_next; 633 *mp = (struct mbuf *)0; 634 } else { 635 MFREE(m, so->so_rcv.sb_mb); 636 m = so->so_rcv.sb_mb; 637 } 638 if (m) 639 m->m_nextpkt = nextrecord; 640 } 641 } else { 642 if (flags & MSG_PEEK) 643 moff += len; 644 else { 645 if (mp) 646 *mp = m_copym(m, 0, len, M_WAIT); 647 m->m_data += len; 648 m->m_len -= len; 649 so->so_rcv.sb_cc -= len; 650 } 651 } 652 if (so->so_oobmark) { 653 if ((flags & MSG_PEEK) == 0) { 654 so->so_oobmark -= len; 655 if (so->so_oobmark == 0) { 656 so->so_state |= SS_RCVATMARK; 657 break; 658 } 659 } else 660 offset += len; 661 } 662 if (flags & MSG_EOR) 663 break; 664 /* 665 * If the MSG_WAITALL flag is set (for non-atomic socket), 666 * we must not quit until "uio->uio_resid == 0" or an error 667 * termination. If a signal/timeout occurs, return 668 * with a short count but without error. 669 * Keep sockbuf locked against other readers. 670 */ 671 while (flags & MSG_WAITALL && m == 0 && uio->uio_resid > 0 && 672 !sosendallatonce(so)) { 673 error = sbwait(&so->so_rcv); 674 if (error) { 675 sbunlock(&so->so_rcv); 676 splx(s); 677 return (0); 678 } 679 if (m = so->so_rcv.sb_mb) 680 nextrecord = m->m_nextpkt; 681 if (so->so_error || so->so_state & SS_CANTRCVMORE) 682 break; 683 continue; 684 } 685 } 686 if ((flags & MSG_PEEK) == 0) { 687 if (m == 0) 688 so->so_rcv.sb_mb = nextrecord; 689 else if (pr->pr_flags & PR_ATOMIC) { 690 flags |= MSG_TRUNC; 691 (void) sbdroprecord(&so->so_rcv); 692 } 693 if (pr->pr_flags & PR_WANTRCVD && so->so_pcb) 694 (*pr->pr_usrreq)(so, PRU_RCVD, (struct mbuf *)0, 695 (struct mbuf *)flags, (struct mbuf *)0, 696 (struct mbuf *)0); 697 } 698 if (flagsp) 699 *flagsp |= flags; 700 release: 701 sbunlock(&so->so_rcv); 702 splx(s); 703 return (error); 704 } 705 706 soshutdown(so, how) 707 register struct socket *so; 708 register int how; 709 { 710 register struct protosw *pr = so->so_proto; 711 712 how++; 713 if (how & FREAD) 714 sorflush(so); 715 if (how & FWRITE) 716 return ((*pr->pr_usrreq)(so, PRU_SHUTDOWN, 717 (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0)); 718 return (0); 719 } 720 721 sorflush(so) 722 register struct socket *so; 723 { 724 register struct sockbuf *sb = &so->so_rcv; 725 register struct protosw *pr = so->so_proto; 726 register int s; 727 struct sockbuf asb; 728 729 sb->sb_flags |= SB_NOINTR; 730 (void) sblock(sb); 731 s = splimp(); 732 socantrcvmore(so); 733 sbunlock(sb); 734 asb = *sb; 735 bzero((caddr_t)sb, sizeof (*sb)); 736 splx(s); 737 if (pr->pr_flags & PR_RIGHTS && pr->pr_domain->dom_dispose) 738 (*pr->pr_domain->dom_dispose)(asb.sb_mb); 739 sbrelease(&asb); 740 } 741 742 sosetopt(so, level, optname, m0) 743 register struct socket *so; 744 int level, optname; 745 struct mbuf *m0; 746 { 747 int error = 0; 748 register struct mbuf *m = m0; 749 750 if (level != SOL_SOCKET) { 751 if (so->so_proto && so->so_proto->pr_ctloutput) 752 return ((*so->so_proto->pr_ctloutput) 753 (PRCO_SETOPT, so, level, optname, &m0)); 754 error = ENOPROTOOPT; 755 } else { 756 switch (optname) { 757 758 case SO_LINGER: 759 if (m == NULL || m->m_len != sizeof (struct linger)) { 760 error = EINVAL; 761 goto bad; 762 } 763 so->so_linger = mtod(m, struct linger *)->l_linger; 764 /* fall thru... */ 765 766 case SO_DEBUG: 767 case SO_KEEPALIVE: 768 case SO_DONTROUTE: 769 case SO_USELOOPBACK: 770 case SO_BROADCAST: 771 case SO_REUSEADDR: 772 case SO_OOBINLINE: 773 if (m == NULL || m->m_len < sizeof (int)) { 774 error = EINVAL; 775 goto bad; 776 } 777 if (*mtod(m, int *)) 778 so->so_options |= optname; 779 else 780 so->so_options &= ~optname; 781 break; 782 783 case SO_SNDBUF: 784 case SO_RCVBUF: 785 case SO_SNDLOWAT: 786 case SO_RCVLOWAT: 787 if (m == NULL || m->m_len < sizeof (int)) { 788 error = EINVAL; 789 goto bad; 790 } 791 switch (optname) { 792 793 case SO_SNDBUF: 794 case SO_RCVBUF: 795 if (sbreserve(optname == SO_SNDBUF ? 796 &so->so_snd : &so->so_rcv, 797 (u_long) *mtod(m, int *)) == 0) { 798 error = ENOBUFS; 799 goto bad; 800 } 801 break; 802 803 case SO_SNDLOWAT: 804 so->so_snd.sb_lowat = *mtod(m, int *); 805 break; 806 case SO_RCVLOWAT: 807 so->so_rcv.sb_lowat = *mtod(m, int *); 808 break; 809 } 810 break; 811 812 case SO_SNDTIMEO: 813 case SO_RCVTIMEO: 814 { 815 struct timeval *tv; 816 short val; 817 818 if (m == NULL || m->m_len < sizeof (*tv)) { 819 error = EINVAL; 820 goto bad; 821 } 822 tv = mtod(m, struct timeval *); 823 if (tv->tv_sec > SHRT_MAX / hz - hz) { 824 error = EDOM; 825 goto bad; 826 } 827 val = tv->tv_sec * hz + tv->tv_usec / tick; 828 829 switch (optname) { 830 831 case SO_SNDTIMEO: 832 so->so_snd.sb_timeo = val; 833 break; 834 case SO_RCVTIMEO: 835 so->so_rcv.sb_timeo = val; 836 break; 837 } 838 break; 839 } 840 841 default: 842 error = ENOPROTOOPT; 843 break; 844 } 845 } 846 bad: 847 if (m) 848 (void) m_free(m); 849 return (error); 850 } 851 852 sogetopt(so, level, optname, mp) 853 register struct socket *so; 854 int level, optname; 855 struct mbuf **mp; 856 { 857 register struct mbuf *m; 858 859 if (level != SOL_SOCKET) { 860 if (so->so_proto && so->so_proto->pr_ctloutput) { 861 return ((*so->so_proto->pr_ctloutput) 862 (PRCO_GETOPT, so, level, optname, mp)); 863 } else 864 return (ENOPROTOOPT); 865 } else { 866 m = m_get(M_WAIT, MT_SOOPTS); 867 m->m_len = sizeof (int); 868 869 switch (optname) { 870 871 case SO_LINGER: 872 m->m_len = sizeof (struct linger); 873 mtod(m, struct linger *)->l_onoff = 874 so->so_options & SO_LINGER; 875 mtod(m, struct linger *)->l_linger = so->so_linger; 876 break; 877 878 case SO_USELOOPBACK: 879 case SO_DONTROUTE: 880 case SO_DEBUG: 881 case SO_KEEPALIVE: 882 case SO_REUSEADDR: 883 case SO_BROADCAST: 884 case SO_OOBINLINE: 885 *mtod(m, int *) = so->so_options & optname; 886 break; 887 888 case SO_TYPE: 889 *mtod(m, int *) = so->so_type; 890 break; 891 892 case SO_ERROR: 893 *mtod(m, int *) = so->so_error; 894 so->so_error = 0; 895 break; 896 897 case SO_SNDBUF: 898 *mtod(m, int *) = so->so_snd.sb_hiwat; 899 break; 900 901 case SO_RCVBUF: 902 *mtod(m, int *) = so->so_rcv.sb_hiwat; 903 break; 904 905 case SO_SNDLOWAT: 906 *mtod(m, int *) = so->so_snd.sb_lowat; 907 break; 908 909 case SO_RCVLOWAT: 910 *mtod(m, int *) = so->so_rcv.sb_lowat; 911 break; 912 913 case SO_SNDTIMEO: 914 case SO_RCVTIMEO: 915 { 916 int val = (optname == SO_SNDTIMEO ? 917 so->so_snd.sb_timeo : so->so_rcv.sb_timeo); 918 919 m->m_len = sizeof(struct timeval); 920 mtod(m, struct timeval *)->tv_sec = val / hz; 921 mtod(m, struct timeval *)->tv_usec = 922 (val % hz) / tick; 923 break; 924 } 925 926 default: 927 (void)m_free(m); 928 return (ENOPROTOOPT); 929 } 930 *mp = m; 931 return (0); 932 } 933 } 934 935 sohasoutofband(so) 936 register struct socket *so; 937 { 938 struct proc *p; 939 940 if (so->so_pgid < 0) 941 gsignal(-so->so_pgid, SIGURG); 942 else if (so->so_pgid > 0 && (p = pfind(so->so_pgid)) != 0) 943 psignal(p, SIGURG); 944 if (so->so_rcv.sb_sel) { 945 selwakeup(so->so_rcv.sb_sel, so->so_rcv.sb_flags & SB_COLL); 946 so->so_rcv.sb_sel = 0; 947 so->so_rcv.sb_flags &= ~SB_COLL; 948 } 949 } 950