kernel - TMPFS - Features, don't sync on umount, enforce snocache on root
[dragonfly.git] / sys / kern / sys_socket.c
blob6ce1948d18e7ebf5a282bab3ced1b497e2ac2f05
1 /*
2 * Copyright (c) 1982, 1986, 1990, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
33 * @(#)sys_socket.c 8.1 (Berkeley) 6/10/93
34 * $FreeBSD: src/sys/kern/sys_socket.c,v 1.28.2.2 2001/02/26 04:23:16 jlemon Exp $
35 * $DragonFly: src/sys/kern/sys_socket.c,v 1.14 2007/04/22 01:13:10 dillon Exp $
38 #include <sys/param.h>
39 #include <sys/systm.h>
40 #include <sys/file.h>
41 #include <sys/lock.h>
42 #include <sys/protosw.h>
43 #include <sys/socket.h>
44 #include <sys/socketvar.h>
45 #include <sys/socketops.h>
46 #include <sys/filio.h> /* XXX */
47 #include <sys/sockio.h>
48 #include <sys/vnode.h>
49 #include <sys/stat.h>
50 #include <sys/uio.h>
51 #include <sys/filedesc.h>
52 #include <sys/ucred.h>
54 #include <sys/mplock2.h>
56 #include <net/if.h>
57 #include <net/route.h>
59 struct fileops socketops = {
60 .fo_read = soo_read,
61 .fo_write = soo_write,
62 .fo_ioctl = soo_ioctl,
63 .fo_poll = soo_poll,
64 .fo_kqfilter = sokqfilter,
65 .fo_stat = soo_stat,
66 .fo_close = soo_close,
67 .fo_shutdown = soo_shutdown
71 * MPALMOSTSAFE - acquires mplock
73 int
74 soo_read(struct file *fp, struct uio *uio, struct ucred *cred, int fflags)
76 struct socket *so;
77 int error;
78 int msgflags;
80 get_mplock();
81 so = (struct socket *)fp->f_data;
83 if (fflags & O_FBLOCKING)
84 msgflags = 0;
85 else if (fflags & O_FNONBLOCKING)
86 msgflags = MSG_FNONBLOCKING;
87 else if (fp->f_flag & FNONBLOCK)
88 msgflags = MSG_FNONBLOCKING;
89 else
90 msgflags = 0;
92 error = so_pru_soreceive(so, NULL, uio, NULL, NULL, &msgflags);
93 rel_mplock();
94 return (error);
98 * MPALMOSTSAFE - acquires mplock
101 soo_write(struct file *fp, struct uio *uio, struct ucred *cred, int fflags)
103 struct socket *so;
104 int error;
105 int msgflags;
107 get_mplock();
108 so = (struct socket *)fp->f_data;
110 if (fflags & O_FBLOCKING)
111 msgflags = 0;
112 else if (fflags & O_FNONBLOCKING)
113 msgflags = MSG_FNONBLOCKING;
114 else if (fp->f_flag & FNONBLOCK)
115 msgflags = MSG_FNONBLOCKING;
116 else
117 msgflags = 0;
119 error = so_pru_sosend(so, NULL, uio, NULL, NULL, msgflags, uio->uio_td);
120 rel_mplock();
121 return (error);
125 * MPALMOSTSAFE - acquires mplock
128 soo_ioctl(struct file *fp, u_long cmd, caddr_t data,
129 struct ucred *cred, struct sysmsg *msg)
131 struct socket *so;
132 int error;
134 get_mplock();
135 so = (struct socket *)fp->f_data;
137 switch (cmd) {
138 case FIOASYNC:
139 if (*(int *)data) {
140 so->so_state |= SS_ASYNC;
141 so->so_rcv.ssb_flags |= SSB_ASYNC;
142 so->so_snd.ssb_flags |= SSB_ASYNC;
143 } else {
144 so->so_state &= ~SS_ASYNC;
145 so->so_rcv.ssb_flags &= ~SSB_ASYNC;
146 so->so_snd.ssb_flags &= ~SSB_ASYNC;
148 error = 0;
149 break;
150 case FIONREAD:
151 *(int *)data = so->so_rcv.ssb_cc;
152 error = 0;
153 break;
154 case FIOSETOWN:
155 error = fsetown(*(int *)data, &so->so_sigio);
156 break;
157 case FIOGETOWN:
158 *(int *)data = fgetown(so->so_sigio);
159 error = 0;
160 break;
161 case SIOCSPGRP:
162 error = fsetown(-(*(int *)data), &so->so_sigio);
163 break;
164 case SIOCGPGRP:
165 *(int *)data = -fgetown(so->so_sigio);
166 error = 0;
167 break;
168 case SIOCATMARK:
169 *(int *)data = (so->so_state&SS_RCVATMARK) != 0;
170 error = 0;
171 break;
172 default:
174 * Interface/routing/protocol specific ioctls:
175 * interface and routing ioctls should have a
176 * different entry since a socket's unnecessary
178 if (IOCGROUP(cmd) == 'i')
179 error = ifioctl(so, cmd, data, cred);
180 else if (IOCGROUP(cmd) == 'r')
181 error = rtioctl(cmd, data, cred);
182 else
183 error = so_pru_control(so, cmd, data, NULL);
184 break;
186 rel_mplock();
187 return (error);
191 * MPALMOSTSAFE - acquires mplock
194 soo_poll(struct file *fp, int events, struct ucred *cred)
196 struct socket *so;
197 int error;
199 get_mplock();
200 so = (struct socket *)fp->f_data;
201 error = so_pru_sopoll(so, events, cred);
202 rel_mplock();
203 return (error);
207 * MPSAFE - acquires mplock
210 soo_stat(struct file *fp, struct stat *ub, struct ucred *cred)
212 struct socket *so;
213 int error;
215 bzero((caddr_t)ub, sizeof (*ub));
216 ub->st_mode = S_IFSOCK;
217 so = (struct socket *)fp->f_data;
220 * If SS_CANTRCVMORE is set, but there's still data left in the
221 * receive buffer, the socket is still readable.
223 if ((so->so_state & SS_CANTRCVMORE) == 0 ||
224 so->so_rcv.ssb_cc != 0)
225 ub->st_mode |= S_IRUSR | S_IRGRP | S_IROTH;
226 if ((so->so_state & SS_CANTSENDMORE) == 0)
227 ub->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH;
228 ub->st_size = so->so_rcv.ssb_cc;
229 ub->st_uid = so->so_cred->cr_uid;
230 ub->st_gid = so->so_cred->cr_gid;
231 error = so_pru_sense(so, ub);
232 return (error);
236 * MPALMOSTSAFE - acquires mplock
239 soo_close(struct file *fp)
241 int error;
243 get_mplock();
244 fp->f_ops = &badfileops;
245 if (fp->f_data)
246 error = soclose((struct socket *)fp->f_data, fp->f_flag);
247 else
248 error = 0;
249 fp->f_data = NULL;
250 rel_mplock();
251 return (error);
255 * MPALMOSTSAFE - acquires mplock
258 soo_shutdown(struct file *fp, int how)
260 int error;
262 get_mplock();
263 if (fp->f_data)
264 error = soshutdown((struct socket *)fp->f_data, how);
265 else
266 error = 0;
267 rel_mplock();
268 return (error);