sys_socket.c revision 132554
1/*
2 * Copyright (c) 1982, 1986, 1990, 1993
3 *	The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 4. Neither the name of the University nor the names of its contributors
14 *    may be used to endorse or promote products derived from this software
15 *    without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 *
29 *	@(#)sys_socket.c	8.1 (Berkeley) 6/10/93
30 */
31
32#include <sys/cdefs.h>
33__FBSDID("$FreeBSD: head/sys/kern/sys_socket.c 132554 2004-07-22 20:40:23Z rwatson $");
34
35#include "opt_mac.h"
36
37#include <sys/param.h>
38#include <sys/systm.h>
39#include <sys/file.h>
40#include <sys/filedesc.h>
41#include <sys/mac.h>
42#include <sys/protosw.h>
43#include <sys/sigio.h>
44#include <sys/socket.h>
45#include <sys/socketvar.h>
46#include <sys/filio.h>			/* XXX */
47#include <sys/sockio.h>
48#include <sys/stat.h>
49#include <sys/uio.h>
50#include <sys/ucred.h>
51
52#include <net/if.h>
53#include <net/route.h>
54
55struct	fileops socketops = {
56	.fo_read = soo_read,
57	.fo_write = soo_write,
58	.fo_ioctl = soo_ioctl,
59	.fo_poll = soo_poll,
60	.fo_kqfilter = soo_kqfilter,
61	.fo_stat = soo_stat,
62	.fo_close = soo_close,
63	.fo_flags = DFLAG_PASSABLE
64};
65
66/* ARGSUSED */
67int
68soo_read(fp, uio, active_cred, flags, td)
69	struct file *fp;
70	struct uio *uio;
71	struct ucred *active_cred;
72	struct thread *td;
73	int flags;
74{
75	struct socket *so = fp->f_data;
76	int error;
77
78	NET_LOCK_GIANT();
79#ifdef MAC
80	SOCK_LOCK(so);
81	error = mac_check_socket_receive(active_cred, so);
82	SOCK_UNLOCK(so);
83	if (error) {
84		NET_UNLOCK_GIANT();
85		return (error);
86	}
87#endif
88	error = so->so_proto->pr_usrreqs->pru_soreceive(so, 0, uio, 0, 0, 0);
89	NET_UNLOCK_GIANT();
90	return (error);
91}
92
93/* ARGSUSED */
94int
95soo_write(fp, uio, active_cred, flags, td)
96	struct file *fp;
97	struct uio *uio;
98	struct ucred *active_cred;
99	struct thread *td;
100	int flags;
101{
102	struct socket *so = fp->f_data;
103	int error;
104
105	NET_LOCK_GIANT();
106#ifdef MAC
107	SOCK_LOCK(so);
108	error = mac_check_socket_send(active_cred, so);
109	SOCK_UNLOCK(so);
110	if (error) {
111		NET_UNLOCK_GIANT();
112		return (error);
113	}
114#endif
115	error = so->so_proto->pr_usrreqs->pru_sosend(so, 0, uio, 0, 0, 0,
116						    uio->uio_td);
117	NET_UNLOCK_GIANT();
118	return (error);
119}
120
121int
122soo_ioctl(fp, cmd, data, active_cred, td)
123	struct file *fp;
124	u_long cmd;
125	void *data;
126	struct ucred *active_cred;
127	struct thread *td;
128{
129	register struct socket *so = fp->f_data;
130
131	switch (cmd) {
132
133	case FIONBIO:
134		SOCK_LOCK(so);
135		if (*(int *)data)
136			so->so_state |= SS_NBIO;
137		else
138			so->so_state &= ~SS_NBIO;
139		SOCK_UNLOCK(so);
140		return (0);
141
142	case FIOASYNC:
143		/*
144		 * XXXRW: This code separately acquires SOCK_LOCK(so)
145		 * and SOCKBUF_LOCK(&so->so_rcv) even though they are
146		 * the same mutex to avoid introducing the assumption
147		 * that they are the same.
148		 */
149		if (*(int *)data) {
150			SOCK_LOCK(so);
151			so->so_state |= SS_ASYNC;
152			SOCK_UNLOCK(so);
153			SOCKBUF_LOCK(&so->so_rcv);
154			so->so_rcv.sb_flags |= SB_ASYNC;
155			SOCKBUF_UNLOCK(&so->so_rcv);
156			SOCKBUF_LOCK(&so->so_snd);
157			so->so_snd.sb_flags |= SB_ASYNC;
158			SOCKBUF_UNLOCK(&so->so_snd);
159		} else {
160			SOCK_LOCK(so);
161			so->so_state &= ~SS_ASYNC;
162			SOCK_UNLOCK(so);
163			SOCKBUF_LOCK(&so->so_rcv);
164			so->so_rcv.sb_flags &= ~SB_ASYNC;
165			SOCKBUF_UNLOCK(&so->so_rcv);
166			SOCKBUF_LOCK(&so->so_snd);
167			so->so_snd.sb_flags &= ~SB_ASYNC;
168			SOCKBUF_UNLOCK(&so->so_snd);
169		}
170		return (0);
171
172	case FIONREAD:
173		/* Unlocked read. */
174		*(int *)data = so->so_rcv.sb_cc;
175		return (0);
176
177	case FIOSETOWN:
178		return (fsetown(*(int *)data, &so->so_sigio));
179
180	case FIOGETOWN:
181		*(int *)data = fgetown(&so->so_sigio);
182		return (0);
183
184	case SIOCSPGRP:
185		return (fsetown(-(*(int *)data), &so->so_sigio));
186
187	case SIOCGPGRP:
188		*(int *)data = -fgetown(&so->so_sigio);
189		return (0);
190
191	case SIOCATMARK:
192		/* Unlocked read. */
193		*(int *)data = (so->so_rcv.sb_state & SBS_RCVATMARK) != 0;
194		return (0);
195	}
196	/*
197	 * Interface/routing/protocol specific ioctls:
198	 * interface and routing ioctls should have a
199	 * different entry since a socket's unnecessary
200	 */
201	if (IOCGROUP(cmd) == 'i')
202		return (ifioctl(so, cmd, data, td));
203	if (IOCGROUP(cmd) == 'r')
204		return (rtioctl(cmd, data));
205	return ((*so->so_proto->pr_usrreqs->pru_control)(so, cmd, data, 0, td));
206}
207
208int
209soo_poll(fp, events, active_cred, td)
210	struct file *fp;
211	int events;
212	struct ucred *active_cred;
213	struct thread *td;
214{
215	struct socket *so = fp->f_data;
216	return so->so_proto->pr_usrreqs->pru_sopoll(so, events,
217	    fp->f_cred, td);
218}
219
220int
221soo_stat(fp, ub, active_cred, td)
222	struct file *fp;
223	struct stat *ub;
224	struct ucred *active_cred;
225	struct thread *td;
226{
227	struct socket *so = fp->f_data;
228	int error;
229
230	bzero((caddr_t)ub, sizeof (*ub));
231	ub->st_mode = S_IFSOCK;
232	NET_LOCK_GIANT();
233	/*
234	 * If SBS_CANTRCVMORE is set, but there's still data left in the
235	 * receive buffer, the socket is still readable.
236	 *
237	 * XXXRW: perhaps should lock socket buffer so st_size result
238	 * is consistent.
239	 */
240	/* Unlocked read. */
241	if ((so->so_rcv.sb_state & SBS_CANTRCVMORE) == 0 ||
242	    so->so_rcv.sb_cc != 0)
243		ub->st_mode |= S_IRUSR | S_IRGRP | S_IROTH;
244	if ((so->so_snd.sb_state & SBS_CANTSENDMORE) == 0)
245		ub->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH;
246	ub->st_size = so->so_rcv.sb_cc - so->so_rcv.sb_ctl;
247	ub->st_uid = so->so_cred->cr_uid;
248	ub->st_gid = so->so_cred->cr_gid;
249	error = (*so->so_proto->pr_usrreqs->pru_sense)(so, ub);
250	NET_UNLOCK_GIANT();
251	return (error);
252}
253
254/*
255 * API socket close on file pointer.  We call soclose() to close the
256 * socket (including initiating closing protocols).  soclose() will
257 * sorele() the file reference but the actual socket will not go away
258 * until the socket's ref count hits 0.
259 */
260/* ARGSUSED */
261int
262soo_close(fp, td)
263	struct file *fp;
264	struct thread *td;
265{
266	int error = 0;
267	struct socket *so;
268
269	NET_LOCK_GIANT();
270	so = fp->f_data;
271	fp->f_ops = &badfileops;
272	fp->f_data = NULL;
273
274	if (so)
275		error = soclose(so);
276	NET_UNLOCK_GIANT();
277	return (error);
278}
279