FreeBSD/Linux Kernel Cross Reference
sys/kern/sys_socket.c
1 /*
2 * Copyright (c) 1982, 1986, 1990, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 4. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 *
29 * @(#)sys_socket.c 8.1 (Berkeley) 6/10/93
30 */
31
32 #include <sys/cdefs.h>
33 __FBSDID("$FreeBSD: releng/5.3/sys/kern/sys_socket.c 136588 2004-10-16 08:43:07Z cvs2svn $");
34
35 #include "opt_mac.h"
36
37 #include <sys/param.h>
38 #include <sys/systm.h>
39 #include <sys/file.h>
40 #include <sys/filedesc.h>
41 #include <sys/mac.h>
42 #include <sys/protosw.h>
43 #include <sys/sigio.h>
44 #include <sys/socket.h>
45 #include <sys/socketvar.h>
46 #include <sys/filio.h> /* XXX */
47 #include <sys/sockio.h>
48 #include <sys/stat.h>
49 #include <sys/uio.h>
50 #include <sys/ucred.h>
51
52 #include <net/if.h>
53 #include <net/route.h>
54
55 struct fileops socketops = {
56 .fo_read = soo_read,
57 .fo_write = soo_write,
58 .fo_ioctl = soo_ioctl,
59 .fo_poll = soo_poll,
60 .fo_kqfilter = soo_kqfilter,
61 .fo_stat = soo_stat,
62 .fo_close = soo_close,
63 .fo_flags = DFLAG_PASSABLE
64 };
65
66 /* ARGSUSED */
67 int
68 soo_read(fp, uio, active_cred, flags, td)
69 struct file *fp;
70 struct uio *uio;
71 struct ucred *active_cred;
72 struct thread *td;
73 int flags;
74 {
75 struct socket *so = fp->f_data;
76 int error;
77
78 NET_LOCK_GIANT();
79 #ifdef MAC
80 SOCK_LOCK(so);
81 error = mac_check_socket_receive(active_cred, so);
82 SOCK_UNLOCK(so);
83 if (error) {
84 NET_UNLOCK_GIANT();
85 return (error);
86 }
87 #endif
88 error = so->so_proto->pr_usrreqs->pru_soreceive(so, 0, uio, 0, 0, 0);
89 NET_UNLOCK_GIANT();
90 return (error);
91 }
92
93 /* ARGSUSED */
94 int
95 soo_write(fp, uio, active_cred, flags, td)
96 struct file *fp;
97 struct uio *uio;
98 struct ucred *active_cred;
99 struct thread *td;
100 int flags;
101 {
102 struct socket *so = fp->f_data;
103 int error;
104
105 NET_LOCK_GIANT();
106 #ifdef MAC
107 SOCK_LOCK(so);
108 error = mac_check_socket_send(active_cred, so);
109 SOCK_UNLOCK(so);
110 if (error) {
111 NET_UNLOCK_GIANT();
112 return (error);
113 }
114 #endif
115 error = so->so_proto->pr_usrreqs->pru_sosend(so, 0, uio, 0, 0, 0,
116 uio->uio_td);
117 NET_UNLOCK_GIANT();
118 return (error);
119 }
120
121 int
122 soo_ioctl(fp, cmd, data, active_cred, td)
123 struct file *fp;
124 u_long cmd;
125 void *data;
126 struct ucred *active_cred;
127 struct thread *td;
128 {
129 register struct socket *so = fp->f_data;
130
131 switch (cmd) {
132
133 case FIONBIO:
134 SOCK_LOCK(so);
135 if (*(int *)data)
136 so->so_state |= SS_NBIO;
137 else
138 so->so_state &= ~SS_NBIO;
139 SOCK_UNLOCK(so);
140 return (0);
141
142 case FIOASYNC:
143 /*
144 * XXXRW: This code separately acquires SOCK_LOCK(so)
145 * and SOCKBUF_LOCK(&so->so_rcv) even though they are
146 * the same mutex to avoid introducing the assumption
147 * that they are the same.
148 */
149 if (*(int *)data) {
150 SOCK_LOCK(so);
151 so->so_state |= SS_ASYNC;
152 SOCK_UNLOCK(so);
153 SOCKBUF_LOCK(&so->so_rcv);
154 so->so_rcv.sb_flags |= SB_ASYNC;
155 SOCKBUF_UNLOCK(&so->so_rcv);
156 SOCKBUF_LOCK(&so->so_snd);
157 so->so_snd.sb_flags |= SB_ASYNC;
158 SOCKBUF_UNLOCK(&so->so_snd);
159 } else {
160 SOCK_LOCK(so);
161 so->so_state &= ~SS_ASYNC;
162 SOCK_UNLOCK(so);
163 SOCKBUF_LOCK(&so->so_rcv);
164 so->so_rcv.sb_flags &= ~SB_ASYNC;
165 SOCKBUF_UNLOCK(&so->so_rcv);
166 SOCKBUF_LOCK(&so->so_snd);
167 so->so_snd.sb_flags &= ~SB_ASYNC;
168 SOCKBUF_UNLOCK(&so->so_snd);
169 }
170 return (0);
171
172 case FIONREAD:
173 /* Unlocked read. */
174 *(int *)data = so->so_rcv.sb_cc;
175 return (0);
176
177 case FIOSETOWN:
178 return (fsetown(*(int *)data, &so->so_sigio));
179
180 case FIOGETOWN:
181 *(int *)data = fgetown(&so->so_sigio);
182 return (0);
183
184 case SIOCSPGRP:
185 return (fsetown(-(*(int *)data), &so->so_sigio));
186
187 case SIOCGPGRP:
188 *(int *)data = -fgetown(&so->so_sigio);
189 return (0);
190
191 case SIOCATMARK:
192 /* Unlocked read. */
193 *(int *)data = (so->so_rcv.sb_state & SBS_RCVATMARK) != 0;
194 return (0);
195 }
196 /*
197 * Interface/routing/protocol specific ioctls:
198 * interface and routing ioctls should have a
199 * different entry since a socket's unnecessary
200 */
201 if (IOCGROUP(cmd) == 'i')
202 return (ifioctl(so, cmd, data, td));
203 if (IOCGROUP(cmd) == 'r')
204 return (rtioctl(cmd, data));
205 return ((*so->so_proto->pr_usrreqs->pru_control)(so, cmd, data, 0, td));
206 }
207
208 int
209 soo_poll(fp, events, active_cred, td)
210 struct file *fp;
211 int events;
212 struct ucred *active_cred;
213 struct thread *td;
214 {
215 struct socket *so = fp->f_data;
216 return so->so_proto->pr_usrreqs->pru_sopoll(so, events,
217 fp->f_cred, td);
218 }
219
220 int
221 soo_stat(fp, ub, active_cred, td)
222 struct file *fp;
223 struct stat *ub;
224 struct ucred *active_cred;
225 struct thread *td;
226 {
227 struct socket *so = fp->f_data;
228 int error;
229
230 bzero((caddr_t)ub, sizeof (*ub));
231 ub->st_mode = S_IFSOCK;
232 NET_LOCK_GIANT();
233 /*
234 * If SBS_CANTRCVMORE is set, but there's still data left in the
235 * receive buffer, the socket is still readable.
236 *
237 * XXXRW: perhaps should lock socket buffer so st_size result
238 * is consistent.
239 */
240 /* Unlocked read. */
241 if ((so->so_rcv.sb_state & SBS_CANTRCVMORE) == 0 ||
242 so->so_rcv.sb_cc != 0)
243 ub->st_mode |= S_IRUSR | S_IRGRP | S_IROTH;
244 if ((so->so_snd.sb_state & SBS_CANTSENDMORE) == 0)
245 ub->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH;
246 ub->st_size = so->so_rcv.sb_cc - so->so_rcv.sb_ctl;
247 ub->st_uid = so->so_cred->cr_uid;
248 ub->st_gid = so->so_cred->cr_gid;
249 error = (*so->so_proto->pr_usrreqs->pru_sense)(so, ub);
250 NET_UNLOCK_GIANT();
251 return (error);
252 }
253
254 /*
255 * API socket close on file pointer. We call soclose() to close the
256 * socket (including initiating closing protocols). soclose() will
257 * sorele() the file reference but the actual socket will not go away
258 * until the socket's ref count hits 0.
259 */
260 /* ARGSUSED */
261 int
262 soo_close(fp, td)
263 struct file *fp;
264 struct thread *td;
265 {
266 int error = 0;
267 struct socket *so;
268
269 NET_LOCK_GIANT();
270 so = fp->f_data;
271 fp->f_ops = &badfileops;
272 fp->f_data = NULL;
273
274 if (so)
275 error = soclose(so);
276 NET_UNLOCK_GIANT();
277 return (error);
278 }
Cache object: 2e00ce556e730f4db93907d4ab7b9f72
|