1 /* uipc_socket.c 4.34 82/03/15 */ 2 3 #include "../h/param.h" 4 #include "../h/systm.h" 5 #include "../h/dir.h" 6 #include "../h/user.h" 7 #include "../h/proc.h" 8 #include "../h/file.h" 9 #include "../h/inode.h" 10 #include "../h/buf.h" 11 #include "../h/mbuf.h" 12 #include "../h/protosw.h" 13 #include "../h/socket.h" 14 #include "../h/socketvar.h" 15 #include "../h/stat.h" 16 #include "../h/ioctl.h" 17 #include "../net/in.h" 18 #include "../net/in_systm.h" 19 20 /* 21 * Socket support routines. 22 * 23 * DEAL WITH INTERRUPT NOTIFICATION. 24 */ 25 26 /* 27 * Create a socket. 28 */ 29 socreate(aso, type, asp, asa, options) 30 struct socket **aso; 31 int type; 32 struct sockproto *asp; 33 struct sockaddr *asa; 34 int options; 35 { 36 register struct protosw *prp; 37 register struct socket *so; 38 struct mbuf *m; 39 int pf, proto, error; 40 COUNT(SOCREATE); 41 42 /* 43 * Use process standard protocol/protocol family if none 44 * specified by address argument. 45 */ 46 if (asp == 0) { 47 pf = PF_INET; /* should be u.u_protof */ 48 proto = 0; 49 } else { 50 pf = asp->sp_family; 51 proto = asp->sp_protocol; 52 } 53 54 /* 55 * If protocol specified, look for it, otherwise 56 * for a protocol of the correct type in the right family. 57 */ 58 if (proto) 59 prp = pffindproto(pf, proto); 60 else 61 prp = pffindtype(pf, type); 62 if (prp == 0) 63 return (EPROTONOSUPPORT); 64 65 /* 66 * Get a socket structure. 67 */ 68 m = m_getclr(M_WAIT); 69 if (m == 0) 70 return (ENOBUFS); 71 so = mtod(m, struct socket *); 72 so->so_options = options; 73 so->so_state = 0; 74 if (u.u_uid == 0) 75 so->so_state = SS_PRIV; 76 77 /* 78 * Attach protocol to socket, initializing 79 * and reserving resources. 80 */ 81 so->so_proto = prp; 82 error = (*prp->pr_usrreq)(so, PRU_ATTACH, 0, asa); 83 if (error) { 84 (void) m_free(dtom(so)); 85 return (error); 86 } 87 *aso = so; 88 return (0); 89 } 90 91 sofree(so) 92 struct socket *so; 93 { 94 95 COUNT(SOFREE); 96 if (so->so_pcb || (so->so_state & SS_USERGONE) == 0) 97 return; 98 sbrelease(&so->so_snd); 99 sbrelease(&so->so_rcv); 100 (void) m_free(dtom(so)); 101 } 102 103 /* 104 * Close a socket on last file table reference removal. 105 * Initiate disconnect if connected. 106 * Free socket when disconnect complete. 107 * 108 * THIS IS REALLY A UNIX INTERFACE ROUTINE 109 */ 110 soclose(so, exiting) 111 register struct socket *so; 112 int exiting; 113 { 114 int s = splnet(); /* conservative */ 115 116 COUNT(SOCLOSE); 117 if (so->so_pcb == 0) 118 goto discard; 119 if (so->so_state & SS_ISCONNECTED) { 120 if ((so->so_state & SS_ISDISCONNECTING) == 0) { 121 u.u_error = sodisconnect(so, (struct sockaddr *)0); 122 if (u.u_error) { 123 if (exiting) 124 goto drop; 125 splx(s); 126 return; 127 } 128 } 129 if ((so->so_options & SO_DONTLINGER) == 0) { 130 if ((so->so_state & SS_ISDISCONNECTING) && 131 (so->so_state & SS_NBIO) && 132 exiting == 0) { 133 u.u_error = EINPROGRESS; 134 splx(s); 135 return; 136 } 137 /* should use tsleep here, for at most linger */ 138 while (so->so_state & SS_ISCONNECTED) 139 sleep((caddr_t)&so->so_timeo, PZERO+1); 140 } 141 } 142 drop: 143 u.u_error = (*so->so_proto->pr_usrreq)(so, PRU_DETACH, 0, 0); 144 discard: 145 so->so_state |= SS_USERGONE; 146 sofree(so); 147 splx(s); 148 } 149 150 sosplice(pso, so) 151 struct socket *pso, *so; 152 { 153 154 COUNT(SOSPLICE); 155 if (pso->so_proto->pr_family != PF_UNIX) { 156 struct socket *tso; 157 tso = pso; pso = so; so = tso; 158 } 159 if (pso->so_proto->pr_family != PF_UNIX) 160 return (EOPNOTSUPP); 161 /* check types and buffer space */ 162 /* merge buffers */ 163 return (0); 164 } 165 166 /*ARGSUSED*/ 167 sostat(so, sb) 168 struct socket *so; 169 struct stat *sb; 170 { 171 172 COUNT(SOSTAT); 173 bzero((caddr_t)sb, sizeof (*sb)); /* XXX */ 174 return (0); /* XXX */ 175 } 176 177 /* 178 * Accept connection on a socket. 179 */ 180 soaccept(so, asa) 181 struct socket *so; 182 struct sockaddr *asa; 183 { 184 int s = splnet(); 185 int error; 186 187 COUNT(SOACCEPT); 188 if ((so->so_options & SO_ACCEPTCONN) == 0) { 189 error = EINVAL; /* XXX */ 190 goto bad; 191 } 192 if ((so->so_state & SS_CONNAWAITING) == 0) { 193 error = ENOTCONN; 194 goto bad; 195 } 196 so->so_state &= ~SS_CONNAWAITING; 197 error = (*so->so_proto->pr_usrreq)(so, PRU_ACCEPT, 0, (caddr_t)asa); 198 bad: 199 splx(s); 200 return (error); 201 } 202 203 /* 204 * Connect socket to a specified address. 205 * If already connected or connecting, then avoid 206 * the protocol entry, to keep its job simpler. 207 */ 208 soconnect(so, asa) 209 struct socket *so; 210 struct sockaddr *asa; 211 { 212 int s = splnet(); 213 int error; 214 215 COUNT(SOCONNECT); 216 if (so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) { 217 error = EISCONN; 218 goto bad; 219 } 220 error = (*so->so_proto->pr_usrreq)(so, PRU_CONNECT, 0, (caddr_t)asa); 221 bad: 222 splx(s); 223 return (error); 224 } 225 226 /* 227 * Disconnect from a socket. 228 * Address parameter is from system call for later multicast 229 * protocols. Check to make sure that connected and no disconnect 230 * in progress (for protocol's sake), and then invoke protocol. 231 */ 232 sodisconnect(so, asa) 233 struct socket *so; 234 struct sockaddr *asa; 235 { 236 int s = splnet(); 237 int error; 238 239 COUNT(SODISCONNECT); 240 if ((so->so_state & SS_ISCONNECTED) == 0) { 241 error = ENOTCONN; 242 goto bad; 243 } 244 if (so->so_state & SS_ISDISCONNECTING) { 245 error = EALREADY; 246 goto bad; 247 } 248 error = (*so->so_proto->pr_usrreq)(so, PRU_DISCONNECT, 0, asa); 249 bad: 250 splx(s); 251 return (error); 252 } 253 254 /* 255 * Send on a socket. 256 * If send must go all at once and message is larger than 257 * send buffering, then hard error. 258 * Lock against other senders. 259 * If must go all at once and not enough room now, then 260 * inform user that this would block and do nothing. 261 */ 262 sosend(so, asa) 263 register struct socket *so; 264 struct sockaddr *asa; 265 { 266 struct mbuf *top = 0; 267 register struct mbuf *m, **mp = ⊤ 268 register u_int len; 269 int error = 0, space, s; 270 271 COUNT(SOSEND); 272 if (so->so_state & SS_CANTSENDMORE) { 273 psignal(u.u_procp, SIGPIPE); 274 return (EPIPE); 275 } 276 if (sosendallatonce(so) && u.u_count > so->so_snd.sb_hiwat) 277 return (EMSGSIZE); 278 if ((so->so_snd.sb_flags & SB_LOCK) && (so->so_state & SS_NBIO)) 279 return (EWOULDBLOCK); 280 sblock(&so->so_snd); 281 #define snderr(errno) { error = errno; splx(s); goto release; } 282 283 s = splnet(); 284 again: 285 if (so->so_error) { 286 error = so->so_error; 287 so->so_error = 0; 288 splx(s); 289 goto release; 290 } 291 if ((so->so_state & SS_ISCONNECTED) == 0) { 292 if (so->so_proto->pr_flags & PR_CONNREQUIRED) 293 snderr(ENOTCONN); 294 if (asa == 0) 295 snderr(EDESTADDRREQ); 296 } 297 if (top) { 298 error = (*so->so_proto->pr_usrreq)(so, PRU_SEND, top, asa); 299 if (error) { 300 splx(s); 301 goto release; 302 } 303 top = 0; 304 mp = ⊤ 305 } 306 if (u.u_count == 0) { 307 splx(s); 308 goto release; 309 } 310 space = sbspace(&so->so_snd); 311 if (space <= 0 || sosendallatonce(so) && space < u.u_count) { 312 if (so->so_state & SS_NBIO) 313 snderr(EWOULDBLOCK); 314 sbunlock(&so->so_snd); 315 sbwait(&so->so_snd); 316 splx(s); 317 goto again; 318 } 319 splx(s); 320 while (u.u_count && space > 0) { 321 MGET(m, 1); 322 if (m == NULL) { 323 error = ENOBUFS; 324 m_freem(top); 325 goto release; 326 } 327 if (u.u_count >= CLBYTES && space >= CLBYTES) { 328 register struct mbuf *p; 329 MCLGET(p, 1); 330 if (p == 0) 331 goto nopages; 332 m->m_off = (int)p - (int)m; 333 len = CLBYTES; 334 } else { 335 nopages: 336 m->m_off = MMINOFF; 337 len = MIN(MLEN, u.u_count); 338 } 339 iomove(mtod(m, caddr_t), len, B_WRITE); 340 m->m_len = len; 341 *mp = m; 342 mp = &m->m_next; 343 space = sbspace(&so->so_snd); 344 } 345 s = splnet(); 346 goto again; 347 348 release: 349 sbunlock(&so->so_snd); 350 return (error); 351 } 352 353 soreceive(so, asa) 354 register struct socket *so; 355 struct sockaddr *asa; 356 { 357 register struct mbuf *m, *n; 358 u_int len; 359 int eor, s, error = 0, cnt = u.u_count; 360 caddr_t base = u.u_base; 361 362 COUNT(SORECEIVE); 363 restart: 364 sblock(&so->so_rcv); 365 s = splnet(); 366 367 #define rcverr(errno) { error = errno; splx(s); goto release; } 368 if (so->so_rcv.sb_cc == 0) { 369 if (so->so_error) { 370 error = so->so_error; 371 so->so_error = 0; 372 splx(s); 373 goto release; 374 } 375 if (so->so_state & SS_CANTRCVMORE) { 376 splx(s); 377 goto release; 378 } 379 if ((so->so_state & SS_ISCONNECTED) == 0 && 380 (so->so_proto->pr_flags & PR_CONNREQUIRED)) 381 rcverr(ENOTCONN); 382 if (so->so_state & SS_NBIO) 383 rcverr(EWOULDBLOCK); 384 sbunlock(&so->so_rcv); 385 sbwait(&so->so_rcv); 386 splx(s); 387 goto restart; 388 } 389 m = so->so_rcv.sb_mb; 390 if (m == 0) 391 panic("receive"); 392 if (so->so_proto->pr_flags & PR_ADDR) { 393 if (m->m_len != sizeof (struct sockaddr)) 394 panic("soreceive addr"); 395 if (asa) 396 bcopy(mtod(m, caddr_t), (caddr_t)asa, sizeof (*asa)); 397 so->so_rcv.sb_cc -= m->m_len; 398 so->so_rcv.sb_mbcnt -= MSIZE; 399 m = m_free(m); 400 if (m == 0) 401 panic("receive 2"); 402 so->so_rcv.sb_mb = m; 403 } 404 so->so_state &= ~SS_RCVATMARK; 405 if (so->so_oobmark && cnt > so->so_oobmark) 406 cnt = so->so_oobmark; 407 eor = 0; 408 do { 409 len = MIN(m->m_len, cnt); 410 splx(s); 411 iomove(mtod(m, caddr_t), len, B_READ); 412 cnt -= len; 413 s = splnet(); 414 if (len == m->m_len) { 415 eor = (int)m->m_act; 416 sbfree(&so->so_rcv, m); 417 so->so_rcv.sb_mb = m->m_next; 418 MFREE(m, n); 419 } else { 420 m->m_off += len; 421 m->m_len -= len; 422 so->so_rcv.sb_cc -= len; 423 } 424 } while ((m = so->so_rcv.sb_mb) && cnt && !eor); 425 if ((so->so_proto->pr_flags & PR_ATOMIC) && eor == 0) 426 do { 427 if (m == 0) 428 panic("receive 3"); 429 sbfree(&so->so_rcv, m); 430 eor = (int)m->m_act; 431 so->so_rcv.sb_mb = m->m_next; 432 MFREE(m, n); 433 m = n; 434 } while (eor == 0); 435 if ((so->so_proto->pr_flags & PR_WANTRCVD) && so->so_pcb) 436 (*so->so_proto->pr_usrreq)(so, PRU_RCVD, 0, 0); 437 if (so->so_oobmark) { 438 so->so_oobmark -= u.u_base - base; 439 if (so->so_oobmark == 0) 440 so->so_state |= SS_RCVATMARK; 441 } 442 release: 443 sbunlock(&so->so_rcv); 444 splx(s); 445 return (error); 446 } 447 448 sohasoutofband(so) 449 struct socket *so; 450 { 451 452 if (so->so_pgrp == 0) 453 return; 454 if (so->so_pgrp > 0) 455 gsignal(so->so_pgrp, SIGURG); 456 else { 457 struct proc *p = pfind(-so->so_pgrp); 458 459 if (p) 460 psignal(p, SIGURG); 461 } 462 } 463 464 /*ARGSUSED*/ 465 soioctl(so, cmd, cmdp) 466 register struct socket *so; 467 int cmd; 468 register caddr_t cmdp; 469 { 470 471 COUNT(SOIOCTL); 472 switch (cmd) { 473 474 case FIONBIO: { 475 int nbio; 476 if (copyin(cmdp, (caddr_t)&nbio, sizeof (nbio))) { 477 u.u_error = EFAULT; 478 return; 479 } 480 if (nbio) 481 so->so_state |= SS_NBIO; 482 else 483 so->so_state &= ~SS_NBIO; 484 return; 485 } 486 487 case FIOASYNC: { 488 int async; 489 if (copyin(cmdp, (caddr_t)&async, sizeof (async))) { 490 u.u_error = EFAULT; 491 return; 492 } 493 if (async) 494 so->so_state |= SS_ASYNC; 495 else 496 so->so_state &= ~SS_ASYNC; 497 return; 498 } 499 500 case SIOCSKEEP: { 501 int keep; 502 if (copyin(cmdp, (caddr_t)&keep, sizeof (keep))) { 503 u.u_error = EFAULT; 504 return; 505 } 506 if (keep) 507 so->so_options &= ~SO_KEEPALIVE; 508 else 509 so->so_options |= SO_KEEPALIVE; 510 return; 511 } 512 513 case SIOCGKEEP: { 514 int keep = (so->so_options & SO_KEEPALIVE) != 0; 515 if (copyout((caddr_t)&keep, cmdp, sizeof (keep))) 516 u.u_error = EFAULT; 517 return; 518 } 519 520 case SIOCSLINGER: { 521 int linger; 522 if (copyin(cmdp, (caddr_t)&linger, sizeof (linger))) { 523 u.u_error = EFAULT; 524 return; 525 } 526 so->so_linger = linger; 527 if (so->so_linger) 528 so->so_options &= ~SO_DONTLINGER; 529 else 530 so->so_options |= SO_DONTLINGER; 531 return; 532 } 533 534 case SIOCGLINGER: { 535 int linger = so->so_linger; 536 if (copyout((caddr_t)&linger, cmdp, sizeof (linger))) { 537 u.u_error = EFAULT; 538 return; 539 } 540 } 541 case SIOCSPGRP: { 542 int pgrp; 543 if (copyin(cmdp, (caddr_t)&pgrp, sizeof (pgrp))) { 544 u.u_error = EFAULT; 545 return; 546 } 547 so->so_pgrp = pgrp; 548 return; 549 } 550 551 case SIOCGPGRP: { 552 int pgrp = so->so_pgrp; 553 if (copyout((caddr_t)&pgrp, cmdp, sizeof (pgrp))) { 554 u.u_error = EFAULT; 555 return; 556 } 557 } 558 559 case SIOCDONE: { 560 int flags; 561 if (copyin(cmdp, (caddr_t)&flags, sizeof (flags))) { 562 u.u_error = EFAULT; 563 return; 564 } 565 flags++; 566 if (flags & FREAD) { 567 int s = splimp(); 568 socantrcvmore(so); 569 sbflush(&so->so_rcv); 570 splx(s); 571 } 572 if (flags & FWRITE) 573 u.u_error = (*so->so_proto->pr_usrreq)(so, PRU_SHUTDOWN, (struct mbuf *)0, 0); 574 return; 575 } 576 577 case SIOCSENDOOB: { 578 char oob; 579 struct mbuf *m; 580 if (copyin(cmdp, (caddr_t)&oob, sizeof (oob))) { 581 u.u_error = EFAULT; 582 return; 583 } 584 m = m_get(M_DONTWAIT); 585 if (m == 0) { 586 u.u_error = ENOBUFS; 587 return; 588 } 589 m->m_off = MMINOFF; 590 m->m_len = 1; 591 *mtod(m, caddr_t) = oob; 592 (*so->so_proto->pr_usrreq)(so, PRU_SENDOOB, m, 0); 593 return; 594 } 595 596 case SIOCRCVOOB: { 597 struct mbuf *m = m_get(M_DONTWAIT); 598 if (m == 0) { 599 u.u_error = ENOBUFS; 600 return; 601 } 602 m->m_off = MMINOFF; *mtod(m, caddr_t) = 0; 603 (*so->so_proto->pr_usrreq)(so, PRU_RCVOOB, m, 0); 604 if (copyout(mtod(m, caddr_t), cmdp, sizeof (char))) { 605 u.u_error = EFAULT; 606 return; 607 } 608 m_free(m); 609 return; 610 } 611 612 case SIOCATMARK: { 613 int atmark = (so->so_state&SS_RCVATMARK) != 0; 614 if (copyout((caddr_t)&atmark, cmdp, sizeof (atmark))) { 615 u.u_error = EFAULT; 616 return; 617 } 618 return; 619 } 620 /* type/protocol specific ioctls */ 621 } 622 u.u_error = EOPNOTSUPP; 623 } 624