MFC r1.27:
[dragonfly.git] / sys / kern / sys_socket.c
blob0cc3b7803a29573f81205670624eac01716a7b58
1 /*
2 * Copyright (c) 1982, 1986, 1990, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
33 * @(#)sys_socket.c 8.1 (Berkeley) 6/10/93
34 * $FreeBSD: src/sys/kern/sys_socket.c,v 1.28.2.2 2001/02/26 04:23:16 jlemon Exp $
35 * $DragonFly: src/sys/kern/sys_socket.c,v 1.14 2007/04/22 01:13:10 dillon Exp $
38 #include <sys/param.h>
39 #include <sys/systm.h>
40 #include <sys/file.h>
41 #include <sys/lock.h>
42 #include <sys/protosw.h>
43 #include <sys/socket.h>
44 #include <sys/socketvar.h>
45 #include <sys/socketops.h>
46 #include <sys/filio.h> /* XXX */
47 #include <sys/sockio.h>
48 #include <sys/vnode.h>
49 #include <sys/stat.h>
50 #include <sys/uio.h>
51 #include <sys/filedesc.h>
52 #include <sys/ucred.h>
54 #include <net/if.h>
55 #include <net/route.h>
57 struct fileops socketops = {
58 .fo_read = soo_read,
59 .fo_write = soo_write,
60 .fo_ioctl = soo_ioctl,
61 .fo_poll = soo_poll,
62 .fo_kqfilter = sokqfilter,
63 .fo_stat = soo_stat,
64 .fo_close = soo_close,
65 .fo_shutdown = soo_shutdown
69 * MPALMOSTSAFE - acquires mplock
71 int
72 soo_read(struct file *fp, struct uio *uio, struct ucred *cred, int fflags)
74 struct socket *so;
75 int error;
76 int msgflags;
78 get_mplock();
79 so = (struct socket *)fp->f_data;
81 if (fflags & O_FBLOCKING)
82 msgflags = 0;
83 else if (fflags & O_FNONBLOCKING)
84 msgflags = MSG_FNONBLOCKING;
85 else if (fp->f_flag & FNONBLOCK)
86 msgflags = MSG_FNONBLOCKING;
87 else
88 msgflags = 0;
90 error = so_pru_soreceive(so, NULL, uio, NULL, NULL, &msgflags);
91 rel_mplock();
92 return (error);
96 * MPALMOSTSAFE - acquires mplock
98 int
99 soo_write(struct file *fp, struct uio *uio, struct ucred *cred, int fflags)
101 struct socket *so;
102 int error;
103 int msgflags;
105 get_mplock();
106 so = (struct socket *)fp->f_data;
108 if (fflags & O_FBLOCKING)
109 msgflags = 0;
110 else if (fflags & O_FNONBLOCKING)
111 msgflags = MSG_FNONBLOCKING;
112 else if (fp->f_flag & FNONBLOCK)
113 msgflags = MSG_FNONBLOCKING;
114 else
115 msgflags = 0;
117 error = so_pru_sosend(so, NULL, uio, NULL, NULL, msgflags, uio->uio_td);
118 rel_mplock();
119 return (error);
123 * MPALMOSTSAFE - acquires mplock
126 soo_ioctl(struct file *fp, u_long cmd, caddr_t data, struct ucred *cred)
128 struct socket *so;
129 int error;
131 get_mplock();
132 so = (struct socket *)fp->f_data;
134 switch (cmd) {
135 case FIOASYNC:
136 if (*(int *)data) {
137 so->so_state |= SS_ASYNC;
138 so->so_rcv.ssb_flags |= SSB_ASYNC;
139 so->so_snd.ssb_flags |= SSB_ASYNC;
140 } else {
141 so->so_state &= ~SS_ASYNC;
142 so->so_rcv.ssb_flags &= ~SSB_ASYNC;
143 so->so_snd.ssb_flags &= ~SSB_ASYNC;
145 error = 0;
146 break;
147 case FIONREAD:
148 *(int *)data = so->so_rcv.ssb_cc;
149 error = 0;
150 break;
151 case FIOSETOWN:
152 error = fsetown(*(int *)data, &so->so_sigio);
153 break;
154 case FIOGETOWN:
155 *(int *)data = fgetown(so->so_sigio);
156 error = 0;
157 break;
158 case SIOCSPGRP:
159 error = fsetown(-(*(int *)data), &so->so_sigio);
160 break;
161 case SIOCGPGRP:
162 *(int *)data = -fgetown(so->so_sigio);
163 error = 0;
164 break;
165 case SIOCATMARK:
166 *(int *)data = (so->so_state&SS_RCVATMARK) != 0;
167 error = 0;
168 break;
169 default:
171 * Interface/routing/protocol specific ioctls:
172 * interface and routing ioctls should have a
173 * different entry since a socket's unnecessary
175 if (IOCGROUP(cmd) == 'i')
176 error = ifioctl(so, cmd, data, cred);
177 else if (IOCGROUP(cmd) == 'r')
178 error = rtioctl(cmd, data, cred);
179 else
180 error = so_pru_control(so, cmd, data, NULL);
181 break;
183 rel_mplock();
184 return (error);
188 * MPALMOSTSAFE - acquires mplock
191 soo_poll(struct file *fp, int events, struct ucred *cred)
193 struct socket *so;
194 int error;
196 get_mplock();
197 so = (struct socket *)fp->f_data;
198 error = so_pru_sopoll(so, events, cred);
199 rel_mplock();
200 return (error);
204 * MPALMOSTSAFE - acquires mplock
207 soo_stat(struct file *fp, struct stat *ub, struct ucred *cred)
209 struct socket *so;
210 int error;
212 bzero((caddr_t)ub, sizeof (*ub));
213 ub->st_mode = S_IFSOCK;
214 get_mplock();
215 so = (struct socket *)fp->f_data;
217 * If SS_CANTRCVMORE is set, but there's still data left in the
218 * receive buffer, the socket is still readable.
220 if ((so->so_state & SS_CANTRCVMORE) == 0 ||
221 so->so_rcv.ssb_cc != 0)
222 ub->st_mode |= S_IRUSR | S_IRGRP | S_IROTH;
223 if ((so->so_state & SS_CANTSENDMORE) == 0)
224 ub->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH;
225 ub->st_size = so->so_rcv.ssb_cc;
226 ub->st_uid = so->so_cred->cr_uid;
227 ub->st_gid = so->so_cred->cr_gid;
228 error = so_pru_sense(so, ub);
229 rel_mplock();
230 return (error);
234 * MPALMOSTSAFE - acquires mplock
237 soo_close(struct file *fp)
239 int error;
241 get_mplock();
242 fp->f_ops = &badfileops;
243 if (fp->f_data)
244 error = soclose((struct socket *)fp->f_data, fp->f_flag);
245 else
246 error = 0;
247 fp->f_data = NULL;
248 rel_mplock();
249 return (error);
253 * MPALMOSTSAFE - acquires mplock
256 soo_shutdown(struct file *fp, int how)
258 int error;
260 get_mplock();
261 if (fp->f_data)
262 error = soshutdown((struct socket *)fp->f_data, how);
263 else
264 error = 0;
265 rel_mplock();
266 return (error);