1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 1982, 1986, 1988, 1990, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the University of
|
|
|
|
* California, Berkeley and its contributors.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* @(#)uipc_socket.c 8.3 (Berkeley) 4/15/94
|
1999-08-28 01:08:13 +00:00
|
|
|
* $FreeBSD$
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
|
|
|
|
2000-11-20 01:35:25 +00:00
|
|
|
#include "opt_inet.h"
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
1997-03-23 03:37:54 +00:00
|
|
|
#include <sys/fcntl.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
#include <sys/lock.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
#include <sys/mutex.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/domain.h>
|
2000-04-16 18:53:38 +00:00
|
|
|
#include <sys/file.h> /* for struct knote */
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/kernel.h>
|
1999-06-17 23:54:50 +00:00
|
|
|
#include <sys/malloc.h>
|
2000-04-16 18:53:38 +00:00
|
|
|
#include <sys/event.h>
|
1997-09-14 02:34:14 +00:00
|
|
|
#include <sys/poll.h>
|
1999-06-17 23:54:50 +00:00
|
|
|
#include <sys/proc.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/protosw.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/socketvar.h>
|
|
|
|
#include <sys/resourcevar.h>
|
1994-10-02 17:35:40 +00:00
|
|
|
#include <sys/signalvar.h>
|
1995-11-03 18:33:46 +00:00
|
|
|
#include <sys/sysctl.h>
|
1998-03-28 10:33:27 +00:00
|
|
|
#include <sys/uio.h>
|
2000-06-04 04:28:31 +00:00
|
|
|
#include <sys/jail.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
|
1998-05-15 20:11:40 +00:00
|
|
|
#include <vm/vm_zone.h>
|
1995-11-03 18:33:46 +00:00
|
|
|
|
1997-08-21 20:33:42 +00:00
|
|
|
#include <machine/limits.h>
|
|
|
|
|
2000-11-20 01:35:25 +00:00
|
|
|
#ifdef INET
|
2000-06-20 01:09:23 +00:00
|
|
|
static int do_setopt_accept_filter(struct socket *so, struct sockopt *sopt);
|
2000-11-20 01:35:25 +00:00
|
|
|
#endif
|
2000-06-20 01:09:23 +00:00
|
|
|
|
2000-04-16 18:53:38 +00:00
|
|
|
static void filt_sordetach(struct knote *kn);
|
|
|
|
static int filt_soread(struct knote *kn, long hint);
|
|
|
|
static void filt_sowdetach(struct knote *kn);
|
|
|
|
static int filt_sowrite(struct knote *kn, long hint);
|
|
|
|
static int filt_solisten(struct knote *kn, long hint);
|
|
|
|
|
2001-11-12 20:51:40 +00:00
|
|
|
static struct filterops solisten_filtops =
|
2001-02-15 16:34:11 +00:00
|
|
|
{ 1, NULL, filt_sordetach, filt_solisten };
|
|
|
|
static struct filterops soread_filtops =
|
|
|
|
{ 1, NULL, filt_sordetach, filt_soread };
|
2001-11-12 20:51:40 +00:00
|
|
|
static struct filterops sowrite_filtops =
|
2001-02-15 16:34:11 +00:00
|
|
|
{ 1, NULL, filt_sowdetach, filt_sowrite };
|
2000-04-16 18:53:38 +00:00
|
|
|
|
1998-05-15 20:11:40 +00:00
|
|
|
struct vm_zone *socket_zone;
|
|
|
|
so_gen_t so_gencnt; /* generation count for sockets */
|
|
|
|
|
1997-10-12 20:26:33 +00:00
|
|
|
MALLOC_DEFINE(M_SONAME, "soname", "socket name");
|
|
|
|
MALLOC_DEFINE(M_PCB, "pcb", "protocol control block");
|
|
|
|
|
1999-02-16 10:49:55 +00:00
|
|
|
SYSCTL_DECL(_kern_ipc);
|
|
|
|
|
1995-11-03 18:33:46 +00:00
|
|
|
static int somaxconn = SOMAXCONN;
|
1999-11-22 02:45:11 +00:00
|
|
|
SYSCTL_INT(_kern_ipc, KIPC_SOMAXCONN, somaxconn, CTLFLAG_RW,
|
1999-05-03 23:57:32 +00:00
|
|
|
&somaxconn, 0, "Maximum pending socket connection queue size");
|
2001-11-17 03:07:11 +00:00
|
|
|
static int numopensockets;
|
|
|
|
SYSCTL_INT(_kern_ipc, OID_AUTO, numopensockets, CTLFLAG_RD,
|
|
|
|
&numopensockets, 0, "Number of open sockets");
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Socket operation routines.
|
|
|
|
* These routines are called by the routines in
|
|
|
|
* sys_socket.c or from a system process, and
|
|
|
|
* implement the semantics of socket operations by
|
|
|
|
* switching out to the protocol specific routines.
|
|
|
|
*/
|
1998-05-15 20:11:40 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Get a socket structure from our zone, and initialize it.
|
|
|
|
* We don't implement `waitok' yet (see comments in uipc_domain.c).
|
|
|
|
* Note that it would probably be better to allocate socket
|
|
|
|
* and PCB at the same time, but I'm not convinced that all
|
|
|
|
* the protocols can be easily modified to do this.
|
2001-11-17 03:07:11 +00:00
|
|
|
*
|
|
|
|
* soalloc() returns a socket with a ref count of 0.
|
1998-05-15 20:11:40 +00:00
|
|
|
*/
|
|
|
|
struct socket *
|
|
|
|
soalloc(waitok)
|
|
|
|
int waitok;
|
|
|
|
{
|
|
|
|
struct socket *so;
|
|
|
|
|
2001-01-21 22:23:11 +00:00
|
|
|
so = zalloc(socket_zone);
|
1998-05-15 20:11:40 +00:00
|
|
|
if (so) {
|
|
|
|
/* XXX race condition for reentrant kernel */
|
|
|
|
bzero(so, sizeof *so);
|
|
|
|
so->so_gencnt = ++so_gencnt;
|
|
|
|
so->so_zone = socket_zone;
|
2001-11-17 03:07:11 +00:00
|
|
|
/* sx_init(&so->so_sxlock, "socket sxlock"); */
|
2000-01-14 02:53:29 +00:00
|
|
|
TAILQ_INIT(&so->so_aiojobq);
|
2001-11-17 03:07:11 +00:00
|
|
|
++numopensockets;
|
1998-05-15 20:11:40 +00:00
|
|
|
}
|
|
|
|
return so;
|
|
|
|
}
|
|
|
|
|
2001-11-17 03:07:11 +00:00
|
|
|
/*
|
|
|
|
* socreate returns a socket with a ref count of 1. The socket should be
|
|
|
|
* closed with soclose().
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
socreate(dom, aso, type, proto, td)
|
1994-05-24 10:09:53 +00:00
|
|
|
int dom;
|
|
|
|
struct socket **aso;
|
|
|
|
register int type;
|
|
|
|
int proto;
|
2001-09-12 08:38:13 +00:00
|
|
|
struct thread *td;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
register struct protosw *prp;
|
|
|
|
register struct socket *so;
|
|
|
|
register int error;
|
|
|
|
|
|
|
|
if (proto)
|
|
|
|
prp = pffindproto(dom, proto, type);
|
|
|
|
else
|
|
|
|
prp = pffindtype(dom, type);
|
2000-06-04 04:28:31 +00:00
|
|
|
|
2000-06-13 15:44:04 +00:00
|
|
|
if (prp == 0 || prp->pr_usrreqs->pru_attach == 0)
|
|
|
|
return (EPROTONOSUPPORT);
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
if (jailed(td->td_proc->p_ucred) && jail_socket_unixiproute_only &&
|
2000-06-04 04:28:31 +00:00
|
|
|
prp->pr_domain->dom_family != PF_LOCAL &&
|
|
|
|
prp->pr_domain->dom_family != PF_INET &&
|
|
|
|
prp->pr_domain->dom_family != PF_ROUTE) {
|
|
|
|
return (EPROTONOSUPPORT);
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
if (prp->pr_type != type)
|
|
|
|
return (EPROTOTYPE);
|
2001-09-12 08:38:13 +00:00
|
|
|
so = soalloc(td != 0);
|
1998-05-15 20:11:40 +00:00
|
|
|
if (so == 0)
|
|
|
|
return (ENOBUFS);
|
|
|
|
|
1996-03-11 15:37:44 +00:00
|
|
|
TAILQ_INIT(&so->so_incomp);
|
|
|
|
TAILQ_INIT(&so->so_comp);
|
1994-05-24 10:09:53 +00:00
|
|
|
so->so_type = type;
|
2001-10-11 23:38:17 +00:00
|
|
|
so->so_cred = crhold(td->td_proc->p_ucred);
|
1994-05-24 10:09:53 +00:00
|
|
|
so->so_proto = prp;
|
2001-11-17 03:07:11 +00:00
|
|
|
soref(so);
|
2001-09-12 08:38:13 +00:00
|
|
|
error = (*prp->pr_usrreqs->pru_attach)(so, proto, td);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (error) {
|
|
|
|
so->so_state |= SS_NOFDREF;
|
2001-11-17 03:07:11 +00:00
|
|
|
sorele(so);
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
*aso = so;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
sobind(so, nam, td)
|
1994-05-24 10:09:53 +00:00
|
|
|
struct socket *so;
|
1997-08-16 19:16:27 +00:00
|
|
|
struct sockaddr *nam;
|
2001-09-12 08:38:13 +00:00
|
|
|
struct thread *td;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
int s = splnet();
|
|
|
|
int error;
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
error = (*so->so_proto->pr_usrreqs->pru_bind)(so, nam, td);
|
1994-05-24 10:09:53 +00:00
|
|
|
splx(s);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2001-11-17 03:07:11 +00:00
|
|
|
static void
|
|
|
|
sodealloc(struct socket *so)
|
1998-05-15 20:11:40 +00:00
|
|
|
{
|
1999-09-19 02:17:02 +00:00
|
|
|
|
2001-11-17 03:07:11 +00:00
|
|
|
KASSERT(so->so_count == 0, ("sodealloc(): so_count %d", so->so_count));
|
1998-05-15 20:11:40 +00:00
|
|
|
so->so_gencnt = ++so_gencnt;
|
1999-10-09 20:42:17 +00:00
|
|
|
if (so->so_rcv.sb_hiwat)
|
2000-09-05 22:11:13 +00:00
|
|
|
(void)chgsbsize(so->so_cred->cr_uidinfo,
|
2000-08-29 11:28:06 +00:00
|
|
|
&so->so_rcv.sb_hiwat, 0, RLIM_INFINITY);
|
1999-10-09 20:42:17 +00:00
|
|
|
if (so->so_snd.sb_hiwat)
|
2000-09-05 22:11:13 +00:00
|
|
|
(void)chgsbsize(so->so_cred->cr_uidinfo,
|
2000-08-29 11:28:06 +00:00
|
|
|
&so->so_snd.sb_hiwat, 0, RLIM_INFINITY);
|
2000-11-20 01:35:25 +00:00
|
|
|
#ifdef INET
|
2000-06-20 01:09:23 +00:00
|
|
|
if (so->so_accf != NULL) {
|
2001-11-12 20:51:40 +00:00
|
|
|
if (so->so_accf->so_accept_filter != NULL &&
|
2000-06-20 01:09:23 +00:00
|
|
|
so->so_accf->so_accept_filter->accf_destroy != NULL) {
|
|
|
|
so->so_accf->so_accept_filter->accf_destroy(so);
|
|
|
|
}
|
|
|
|
if (so->so_accf->so_accept_filter_str != NULL)
|
|
|
|
FREE(so->so_accf->so_accept_filter_str, M_ACCF);
|
|
|
|
FREE(so->so_accf, M_ACCF);
|
|
|
|
}
|
2000-11-20 01:35:25 +00:00
|
|
|
#endif
|
1999-09-19 02:17:02 +00:00
|
|
|
crfree(so->so_cred);
|
2001-11-17 03:07:11 +00:00
|
|
|
/* sx_destroy(&so->so_sxlock); */
|
2001-01-21 22:23:11 +00:00
|
|
|
zfree(so->so_zone, so);
|
2001-11-17 03:07:11 +00:00
|
|
|
--numopensockets;
|
1998-05-15 20:11:40 +00:00
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
solisten(so, backlog, td)
|
1994-05-24 10:09:53 +00:00
|
|
|
register struct socket *so;
|
|
|
|
int backlog;
|
2001-09-12 08:38:13 +00:00
|
|
|
struct thread *td;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
1998-05-15 20:11:40 +00:00
|
|
|
int s, error;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1998-05-15 20:11:40 +00:00
|
|
|
s = splnet();
|
2001-09-12 08:38:13 +00:00
|
|
|
error = (*so->so_proto->pr_usrreqs->pru_listen)(so, td);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (error) {
|
|
|
|
splx(s);
|
|
|
|
return (error);
|
|
|
|
}
|
1999-11-16 10:56:05 +00:00
|
|
|
if (TAILQ_EMPTY(&so->so_comp))
|
1994-05-24 10:09:53 +00:00
|
|
|
so->so_options |= SO_ACCEPTCONN;
|
1995-11-03 18:33:46 +00:00
|
|
|
if (backlog < 0 || backlog > somaxconn)
|
|
|
|
backlog = somaxconn;
|
|
|
|
so->so_qlimit = backlog;
|
1994-05-24 10:09:53 +00:00
|
|
|
splx(s);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
void
|
1994-05-24 10:09:53 +00:00
|
|
|
sofree(so)
|
|
|
|
register struct socket *so;
|
|
|
|
{
|
1996-03-11 15:37:44 +00:00
|
|
|
struct socket *head = so->so_head;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2001-11-17 03:07:11 +00:00
|
|
|
KASSERT(so->so_count == 0, ("socket %p so_count not 0", so));
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
if (so->so_pcb || (so->so_state & SS_NOFDREF) == 0)
|
|
|
|
return;
|
1996-03-11 15:37:44 +00:00
|
|
|
if (head != NULL) {
|
|
|
|
if (so->so_state & SS_INCOMP) {
|
|
|
|
TAILQ_REMOVE(&head->so_incomp, so, so_list);
|
1996-10-07 04:32:42 +00:00
|
|
|
head->so_incqlen--;
|
1996-03-11 15:37:44 +00:00
|
|
|
} else if (so->so_state & SS_COMP) {
|
1999-01-25 16:58:56 +00:00
|
|
|
/*
|
|
|
|
* We must not decommission a socket that's
|
|
|
|
* on the accept(2) queue. If we do, then
|
|
|
|
* accept(2) may hang after select(2) indicated
|
|
|
|
* that the listening socket was ready.
|
|
|
|
*/
|
1999-02-02 07:23:28 +00:00
|
|
|
return;
|
1996-03-11 15:37:44 +00:00
|
|
|
} else {
|
|
|
|
panic("sofree: not queued");
|
|
|
|
}
|
|
|
|
head->so_qlen--;
|
1999-02-02 07:23:28 +00:00
|
|
|
so->so_state &= ~SS_INCOMP;
|
1996-03-11 15:37:44 +00:00
|
|
|
so->so_head = NULL;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
1999-10-09 20:42:17 +00:00
|
|
|
sbrelease(&so->so_snd, so);
|
1994-05-24 10:09:53 +00:00
|
|
|
sorflush(so);
|
1998-05-15 20:11:40 +00:00
|
|
|
sodealloc(so);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Close a socket on last file table reference removal.
|
|
|
|
* Initiate disconnect if connected.
|
|
|
|
* Free socket when disconnect complete.
|
2001-11-17 03:07:11 +00:00
|
|
|
*
|
|
|
|
* This function will sorele() the socket. Note that soclose() may be
|
|
|
|
* called prior to the ref count reaching zero. The actual socket
|
|
|
|
* structure will not be freed until the ref count reaches zero.
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1994-05-24 10:09:53 +00:00
|
|
|
soclose(so)
|
|
|
|
register struct socket *so;
|
|
|
|
{
|
|
|
|
int s = splnet(); /* conservative */
|
|
|
|
int error = 0;
|
|
|
|
|
Installed the second patch attached to kern/7899 with some changes suggested
by bde, a few other tweaks to get the patch to apply cleanly again and
some improvements to the comments.
This change closes some fairly minor security holes associated with
F_SETOWN, fixes a few bugs, and removes some limitations that F_SETOWN
had on tty devices. For more details, see the description on the PR.
Because this patch increases the size of the proc and pgrp structures,
it is necessary to re-install the includes and recompile libkvm,
the vinum lkm, fstat, gcore, gdb, ipfilter, ps, top, and w.
PR: kern/7899
Reviewed by: bde, elvind
1998-11-11 10:04:13 +00:00
|
|
|
funsetown(so->so_sigio);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (so->so_options & SO_ACCEPTCONN) {
|
1996-04-16 03:50:08 +00:00
|
|
|
struct socket *sp, *sonext;
|
1996-03-11 15:37:44 +00:00
|
|
|
|
1999-11-16 10:56:05 +00:00
|
|
|
sp = TAILQ_FIRST(&so->so_incomp);
|
|
|
|
for (; sp != NULL; sp = sonext) {
|
|
|
|
sonext = TAILQ_NEXT(sp, so_list);
|
1996-03-11 15:37:44 +00:00
|
|
|
(void) soabort(sp);
|
1996-04-16 03:50:08 +00:00
|
|
|
}
|
1999-11-16 10:56:05 +00:00
|
|
|
for (sp = TAILQ_FIRST(&so->so_comp); sp != NULL; sp = sonext) {
|
|
|
|
sonext = TAILQ_NEXT(sp, so_list);
|
1999-02-02 07:23:28 +00:00
|
|
|
/* Dequeue from so_comp since sofree() won't do it */
|
1999-01-25 16:58:56 +00:00
|
|
|
TAILQ_REMOVE(&so->so_comp, sp, so_list);
|
1999-02-02 07:23:28 +00:00
|
|
|
so->so_qlen--;
|
|
|
|
sp->so_state &= ~SS_COMP;
|
|
|
|
sp->so_head = NULL;
|
1996-03-11 15:37:44 +00:00
|
|
|
(void) soabort(sp);
|
1996-04-16 03:50:08 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
if (so->so_pcb == 0)
|
|
|
|
goto discard;
|
|
|
|
if (so->so_state & SS_ISCONNECTED) {
|
|
|
|
if ((so->so_state & SS_ISDISCONNECTING) == 0) {
|
|
|
|
error = sodisconnect(so);
|
|
|
|
if (error)
|
|
|
|
goto drop;
|
|
|
|
}
|
|
|
|
if (so->so_options & SO_LINGER) {
|
|
|
|
if ((so->so_state & SS_ISDISCONNECTING) &&
|
|
|
|
(so->so_state & SS_NBIO))
|
|
|
|
goto drop;
|
1994-10-02 17:35:40 +00:00
|
|
|
while (so->so_state & SS_ISCONNECTED) {
|
|
|
|
error = tsleep((caddr_t)&so->so_timeo,
|
1999-04-24 18:22:34 +00:00
|
|
|
PSOCK | PCATCH, "soclos", so->so_linger * hz);
|
1994-10-02 17:35:40 +00:00
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
1994-10-02 17:35:40 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
drop:
|
|
|
|
if (so->so_pcb) {
|
1996-07-11 16:32:50 +00:00
|
|
|
int error2 = (*so->so_proto->pr_usrreqs->pru_detach)(so);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (error == 0)
|
|
|
|
error = error2;
|
|
|
|
}
|
|
|
|
discard:
|
|
|
|
if (so->so_state & SS_NOFDREF)
|
|
|
|
panic("soclose: NOFDREF");
|
|
|
|
so->so_state |= SS_NOFDREF;
|
2001-11-17 03:07:11 +00:00
|
|
|
sorele(so);
|
1994-05-24 10:09:53 +00:00
|
|
|
splx(s);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Must be called at splnet...
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1994-05-24 10:09:53 +00:00
|
|
|
soabort(so)
|
|
|
|
struct socket *so;
|
|
|
|
{
|
2000-03-18 08:56:56 +00:00
|
|
|
int error;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
2000-03-18 08:56:56 +00:00
|
|
|
error = (*so->so_proto->pr_usrreqs->pru_abort)(so);
|
|
|
|
if (error) {
|
2001-11-17 03:07:11 +00:00
|
|
|
sotryfree(so); /* note: does not decrement the ref count */
|
2000-03-18 08:56:56 +00:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
return (0);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1994-05-24 10:09:53 +00:00
|
|
|
soaccept(so, nam)
|
|
|
|
register struct socket *so;
|
1997-08-16 19:16:27 +00:00
|
|
|
struct sockaddr **nam;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
int s = splnet();
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if ((so->so_state & SS_NOFDREF) == 0)
|
|
|
|
panic("soaccept: !NOFDREF");
|
|
|
|
so->so_state &= ~SS_NOFDREF;
|
2001-03-09 08:16:40 +00:00
|
|
|
error = (*so->so_proto->pr_usrreqs->pru_accept)(so, nam);
|
1994-05-24 10:09:53 +00:00
|
|
|
splx(s);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
soconnect(so, nam, td)
|
1994-05-24 10:09:53 +00:00
|
|
|
register struct socket *so;
|
1997-08-16 19:16:27 +00:00
|
|
|
struct sockaddr *nam;
|
2001-09-12 08:38:13 +00:00
|
|
|
struct thread *td;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
int s;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (so->so_options & SO_ACCEPTCONN)
|
|
|
|
return (EOPNOTSUPP);
|
|
|
|
s = splnet();
|
|
|
|
/*
|
|
|
|
* If protocol is connection-based, can only connect once.
|
|
|
|
* Otherwise, if connected, try to disconnect first.
|
|
|
|
* This allows user to disconnect by connecting to, e.g.,
|
|
|
|
* a null address.
|
|
|
|
*/
|
|
|
|
if (so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING) &&
|
|
|
|
((so->so_proto->pr_flags & PR_CONNREQUIRED) ||
|
|
|
|
(error = sodisconnect(so))))
|
|
|
|
error = EISCONN;
|
|
|
|
else
|
2001-09-12 08:38:13 +00:00
|
|
|
error = (*so->so_proto->pr_usrreqs->pru_connect)(so, nam, td);
|
1994-05-24 10:09:53 +00:00
|
|
|
splx(s);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1994-05-24 10:09:53 +00:00
|
|
|
soconnect2(so1, so2)
|
|
|
|
register struct socket *so1;
|
|
|
|
struct socket *so2;
|
|
|
|
{
|
|
|
|
int s = splnet();
|
|
|
|
int error;
|
|
|
|
|
1996-07-11 16:32:50 +00:00
|
|
|
error = (*so1->so_proto->pr_usrreqs->pru_connect2)(so1, so2);
|
1994-05-24 10:09:53 +00:00
|
|
|
splx(s);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1994-05-24 10:09:53 +00:00
|
|
|
sodisconnect(so)
|
|
|
|
register struct socket *so;
|
|
|
|
{
|
|
|
|
int s = splnet();
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if ((so->so_state & SS_ISCONNECTED) == 0) {
|
|
|
|
error = ENOTCONN;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
if (so->so_state & SS_ISDISCONNECTING) {
|
|
|
|
error = EALREADY;
|
|
|
|
goto bad;
|
|
|
|
}
|
1996-07-11 16:32:50 +00:00
|
|
|
error = (*so->so_proto->pr_usrreqs->pru_disconnect)(so);
|
1994-05-24 10:09:53 +00:00
|
|
|
bad:
|
|
|
|
splx(s);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1995-02-06 02:22:12 +00:00
|
|
|
#define SBLOCKWAIT(f) (((f) & MSG_DONTWAIT) ? M_NOWAIT : M_WAITOK)
|
1994-05-24 10:09:53 +00:00
|
|
|
/*
|
|
|
|
* Send on a socket.
|
|
|
|
* If send must go all at once and message is larger than
|
|
|
|
* send buffering, then hard error.
|
|
|
|
* Lock against other senders.
|
|
|
|
* If must go all at once and not enough room now, then
|
|
|
|
* inform user that this would block and do nothing.
|
|
|
|
* Otherwise, if nonblocking, send as much as possible.
|
|
|
|
* The data to be sent is described by "uio" if nonzero,
|
|
|
|
* otherwise by the mbuf chain "top" (which must be null
|
|
|
|
* if uio is not). Data provided in mbuf chain must be small
|
|
|
|
* enough to send all at once.
|
|
|
|
*
|
|
|
|
* Returns nonzero on error, timeout or signal; callers
|
|
|
|
* must check for short counts if EINTR/ERESTART are returned.
|
|
|
|
* Data and control buffers are freed on return.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
sosend(so, addr, uio, top, control, flags, td)
|
1994-05-24 10:09:53 +00:00
|
|
|
register struct socket *so;
|
1997-08-16 19:16:27 +00:00
|
|
|
struct sockaddr *addr;
|
1994-05-24 10:09:53 +00:00
|
|
|
struct uio *uio;
|
|
|
|
struct mbuf *top;
|
|
|
|
struct mbuf *control;
|
|
|
|
int flags;
|
2001-09-12 08:38:13 +00:00
|
|
|
struct thread *td;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
|
|
|
struct mbuf **mp;
|
|
|
|
register struct mbuf *m;
|
|
|
|
register long space, len, resid;
|
|
|
|
int clen = 0, error, s, dontroute, mlen;
|
|
|
|
int atomic = sosendallatonce(so) || top;
|
|
|
|
|
|
|
|
if (uio)
|
|
|
|
resid = uio->uio_resid;
|
|
|
|
else
|
|
|
|
resid = top->m_pkthdr.len;
|
|
|
|
/*
|
|
|
|
* In theory resid should be unsigned.
|
|
|
|
* However, space must be signed, as it might be less than 0
|
|
|
|
* if we over-committed, and we must use a signed comparison
|
|
|
|
* of space and resid. On the other hand, a negative resid
|
|
|
|
* causes us to loop sending 0-length segments to the protocol.
|
1997-11-09 05:07:40 +00:00
|
|
|
*
|
|
|
|
* Also check to make sure that MSG_EOR isn't used on SOCK_STREAM
|
|
|
|
* type sockets since that's an error.
|
1994-05-24 10:09:53 +00:00
|
|
|
*/
|
1999-01-27 21:50:00 +00:00
|
|
|
if (resid < 0 || (so->so_type == SOCK_STREAM && (flags & MSG_EOR))) {
|
1997-11-09 05:07:40 +00:00
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
dontroute =
|
|
|
|
(flags & MSG_DONTROUTE) && (so->so_options & SO_DONTROUTE) == 0 &&
|
|
|
|
(so->so_proto->pr_flags & PR_ATOMIC);
|
2001-09-12 08:38:13 +00:00
|
|
|
if (td)
|
|
|
|
td->td_proc->p_stats->p_ru.ru_msgsnd++;
|
1994-05-24 10:09:53 +00:00
|
|
|
if (control)
|
|
|
|
clen = control->m_len;
|
|
|
|
#define snderr(errno) { error = errno; splx(s); goto release; }
|
|
|
|
|
|
|
|
restart:
|
1994-10-02 17:35:40 +00:00
|
|
|
error = sblock(&so->so_snd, SBLOCKWAIT(flags));
|
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
goto out;
|
|
|
|
do {
|
|
|
|
s = splnet();
|
|
|
|
if (so->so_state & SS_CANTSENDMORE)
|
|
|
|
snderr(EPIPE);
|
1998-02-19 19:38:20 +00:00
|
|
|
if (so->so_error) {
|
|
|
|
error = so->so_error;
|
|
|
|
so->so_error = 0;
|
|
|
|
splx(s);
|
|
|
|
goto release;
|
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((so->so_state & SS_ISCONNECTED) == 0) {
|
1995-02-07 02:01:16 +00:00
|
|
|
/*
|
|
|
|
* `sendto' and `sendmsg' is allowed on a connection-
|
|
|
|
* based socket if it supports implied connect.
|
|
|
|
* Return ENOTCONN if not connected and no address is
|
|
|
|
* supplied.
|
|
|
|
*/
|
|
|
|
if ((so->so_proto->pr_flags & PR_CONNREQUIRED) &&
|
|
|
|
(so->so_proto->pr_flags & PR_IMPLOPCL) == 0) {
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((so->so_state & SS_ISCONFIRMING) == 0 &&
|
|
|
|
!(resid == 0 && clen != 0))
|
|
|
|
snderr(ENOTCONN);
|
|
|
|
} else if (addr == 0)
|
1995-02-07 02:01:16 +00:00
|
|
|
snderr(so->so_proto->pr_flags & PR_CONNREQUIRED ?
|
|
|
|
ENOTCONN : EDESTADDRREQ);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
space = sbspace(&so->so_snd);
|
|
|
|
if (flags & MSG_OOB)
|
|
|
|
space += 1024;
|
1994-10-02 17:35:40 +00:00
|
|
|
if ((atomic && resid > so->so_snd.sb_hiwat) ||
|
1994-05-24 10:09:53 +00:00
|
|
|
clen > so->so_snd.sb_hiwat)
|
|
|
|
snderr(EMSGSIZE);
|
|
|
|
if (space < resid + clen && uio &&
|
|
|
|
(atomic || space < so->so_snd.sb_lowat || space < clen)) {
|
|
|
|
if (so->so_state & SS_NBIO)
|
|
|
|
snderr(EWOULDBLOCK);
|
|
|
|
sbunlock(&so->so_snd);
|
|
|
|
error = sbwait(&so->so_snd);
|
|
|
|
splx(s);
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
splx(s);
|
|
|
|
mp = ⊤
|
|
|
|
space -= clen;
|
|
|
|
do {
|
|
|
|
if (uio == NULL) {
|
|
|
|
/*
|
|
|
|
* Data is prepackaged in "top".
|
|
|
|
*/
|
|
|
|
resid = 0;
|
|
|
|
if (flags & MSG_EOR)
|
|
|
|
top->m_flags |= M_EOR;
|
|
|
|
} else do {
|
|
|
|
if (top == 0) {
|
2000-12-21 21:44:31 +00:00
|
|
|
MGETHDR(m, M_TRYWAIT, MT_DATA);
|
1999-12-12 05:52:51 +00:00
|
|
|
if (m == NULL) {
|
|
|
|
error = ENOBUFS;
|
|
|
|
goto release;
|
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
mlen = MHLEN;
|
|
|
|
m->m_pkthdr.len = 0;
|
|
|
|
m->m_pkthdr.rcvif = (struct ifnet *)0;
|
|
|
|
} else {
|
2000-12-21 21:44:31 +00:00
|
|
|
MGET(m, M_TRYWAIT, MT_DATA);
|
1999-12-12 05:52:51 +00:00
|
|
|
if (m == NULL) {
|
|
|
|
error = ENOBUFS;
|
|
|
|
goto release;
|
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
mlen = MLEN;
|
|
|
|
}
|
1994-05-29 07:48:17 +00:00
|
|
|
if (resid >= MINCLSIZE) {
|
2000-12-21 21:44:31 +00:00
|
|
|
MCLGET(m, M_TRYWAIT);
|
1994-05-24 10:09:53 +00:00
|
|
|
if ((m->m_flags & M_EXT) == 0)
|
|
|
|
goto nopages;
|
|
|
|
mlen = MCLBYTES;
|
1994-05-29 07:48:17 +00:00
|
|
|
len = min(min(mlen, resid), space);
|
1994-05-24 10:09:53 +00:00
|
|
|
} else {
|
|
|
|
nopages:
|
|
|
|
len = min(min(mlen, resid), space);
|
|
|
|
/*
|
|
|
|
* For datagram protocols, leave room
|
|
|
|
* for protocol headers in first mbuf.
|
|
|
|
*/
|
|
|
|
if (atomic && top == 0 && len < mlen)
|
|
|
|
MH_ALIGN(m, len);
|
|
|
|
}
|
1994-05-29 07:48:17 +00:00
|
|
|
space -= len;
|
1994-05-24 10:09:53 +00:00
|
|
|
error = uiomove(mtod(m, caddr_t), (int)len, uio);
|
|
|
|
resid = uio->uio_resid;
|
|
|
|
m->m_len = len;
|
|
|
|
*mp = m;
|
|
|
|
top->m_pkthdr.len += len;
|
|
|
|
if (error)
|
|
|
|
goto release;
|
|
|
|
mp = &m->m_next;
|
|
|
|
if (resid <= 0) {
|
|
|
|
if (flags & MSG_EOR)
|
|
|
|
top->m_flags |= M_EOR;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} while (space > 0 && atomic);
|
|
|
|
if (dontroute)
|
|
|
|
so->so_options |= SO_DONTROUTE;
|
|
|
|
s = splnet(); /* XXX */
|
1999-06-04 02:27:06 +00:00
|
|
|
/*
|
|
|
|
* XXX all the SS_CANTSENDMORE checks previously
|
|
|
|
* done could be out of date. We could have recieved
|
|
|
|
* a reset packet in an interrupt or maybe we slept
|
|
|
|
* while doing page faults in uiomove() etc. We could
|
|
|
|
* probably recheck again inside the splnet() protection
|
|
|
|
* here, but there are probably other places that this
|
|
|
|
* also happens. We must rethink this.
|
|
|
|
*/
|
1996-07-11 16:32:50 +00:00
|
|
|
error = (*so->so_proto->pr_usrreqs->pru_send)(so,
|
|
|
|
(flags & MSG_OOB) ? PRUS_OOB :
|
1995-02-07 02:01:16 +00:00
|
|
|
/*
|
|
|
|
* If the user set MSG_EOF, the protocol
|
|
|
|
* understands this flag and nothing left to
|
|
|
|
* send then use PRU_SEND_EOF instead of PRU_SEND.
|
|
|
|
*/
|
|
|
|
((flags & MSG_EOF) &&
|
|
|
|
(so->so_proto->pr_flags & PR_IMPLOPCL) &&
|
|
|
|
(resid <= 0)) ?
|
1999-01-20 17:32:01 +00:00
|
|
|
PRUS_EOF :
|
|
|
|
/* If there is more to send set PRUS_MORETOCOME */
|
1999-01-20 17:45:22 +00:00
|
|
|
(resid > 0 && space > 0) ? PRUS_MORETOCOME : 0,
|
2001-09-12 08:38:13 +00:00
|
|
|
top, addr, control, td);
|
1994-05-24 10:09:53 +00:00
|
|
|
splx(s);
|
|
|
|
if (dontroute)
|
|
|
|
so->so_options &= ~SO_DONTROUTE;
|
|
|
|
clen = 0;
|
|
|
|
control = 0;
|
|
|
|
top = 0;
|
|
|
|
mp = ⊤
|
|
|
|
if (error)
|
|
|
|
goto release;
|
|
|
|
} while (resid && space > 0);
|
|
|
|
} while (resid);
|
|
|
|
|
|
|
|
release:
|
|
|
|
sbunlock(&so->so_snd);
|
|
|
|
out:
|
|
|
|
if (top)
|
|
|
|
m_freem(top);
|
|
|
|
if (control)
|
|
|
|
m_freem(control);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Implement receive operations on a socket.
|
|
|
|
* We depend on the way that records are added to the sockbuf
|
|
|
|
* by sbappend*. In particular, each record (mbufs linked through m_next)
|
|
|
|
* must begin with an address if the protocol so specifies,
|
|
|
|
* followed by an optional mbuf or mbufs containing ancillary data,
|
|
|
|
* and then zero or more mbufs of data.
|
|
|
|
* In order to avoid blocking network interrupts for the entire time here,
|
|
|
|
* we splx() while doing the actual copy to user space.
|
|
|
|
* Although the sockbuf is locked, new data may still be appended,
|
|
|
|
* and thus we must maintain consistency of the sockbuf during that time.
|
|
|
|
*
|
|
|
|
* The caller may receive the data as a single mbuf chain by supplying
|
|
|
|
* an mbuf **mp0 for use in returning the chain. The uio is then used
|
|
|
|
* only for the count in uio_resid.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1997-08-16 19:16:27 +00:00
|
|
|
soreceive(so, psa, uio, mp0, controlp, flagsp)
|
1994-05-24 10:09:53 +00:00
|
|
|
register struct socket *so;
|
1997-08-16 19:16:27 +00:00
|
|
|
struct sockaddr **psa;
|
1994-05-24 10:09:53 +00:00
|
|
|
struct uio *uio;
|
|
|
|
struct mbuf **mp0;
|
|
|
|
struct mbuf **controlp;
|
|
|
|
int *flagsp;
|
|
|
|
{
|
2001-10-04 13:11:48 +00:00
|
|
|
struct mbuf *m, **mp;
|
1994-05-24 10:09:53 +00:00
|
|
|
register int flags, len, error, s, offset;
|
|
|
|
struct protosw *pr = so->so_proto;
|
|
|
|
struct mbuf *nextrecord;
|
1994-05-25 09:21:21 +00:00
|
|
|
int moff, type = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
int orig_resid = uio->uio_resid;
|
|
|
|
|
|
|
|
mp = mp0;
|
1997-08-16 19:16:27 +00:00
|
|
|
if (psa)
|
|
|
|
*psa = 0;
|
1994-05-24 10:09:53 +00:00
|
|
|
if (controlp)
|
|
|
|
*controlp = 0;
|
|
|
|
if (flagsp)
|
|
|
|
flags = *flagsp &~ MSG_EOR;
|
|
|
|
else
|
|
|
|
flags = 0;
|
|
|
|
if (flags & MSG_OOB) {
|
2000-12-21 21:44:31 +00:00
|
|
|
m = m_get(M_TRYWAIT, MT_DATA);
|
1999-12-27 06:31:53 +00:00
|
|
|
if (m == NULL)
|
|
|
|
return (ENOBUFS);
|
1996-07-11 16:32:50 +00:00
|
|
|
error = (*pr->pr_usrreqs->pru_rcvoob)(so, m, flags & MSG_PEEK);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (error)
|
|
|
|
goto bad;
|
|
|
|
do {
|
|
|
|
error = uiomove(mtod(m, caddr_t),
|
|
|
|
(int) min(uio->uio_resid, m->m_len), uio);
|
|
|
|
m = m_free(m);
|
|
|
|
} while (uio->uio_resid && error == 0 && m);
|
|
|
|
bad:
|
|
|
|
if (m)
|
|
|
|
m_freem(m);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
if (mp)
|
|
|
|
*mp = (struct mbuf *)0;
|
|
|
|
if (so->so_state & SS_ISCONFIRMING && uio->uio_resid)
|
1996-07-11 16:32:50 +00:00
|
|
|
(*pr->pr_usrreqs->pru_rcvd)(so, 0);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
restart:
|
1994-10-02 17:35:40 +00:00
|
|
|
error = sblock(&so->so_rcv, SBLOCKWAIT(flags));
|
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
return (error);
|
|
|
|
s = splnet();
|
|
|
|
|
|
|
|
m = so->so_rcv.sb_mb;
|
|
|
|
/*
|
|
|
|
* If we have less data than requested, block awaiting more
|
|
|
|
* (subject to any timeout) if:
|
|
|
|
* 1. the current count is less than the low water mark, or
|
|
|
|
* 2. MSG_WAITALL is set, and it is possible to do the entire
|
|
|
|
* receive operation at once if we block (resid <= hiwat).
|
|
|
|
* 3. MSG_DONTWAIT is not set
|
|
|
|
* If MSG_WAITALL is set but resid is larger than the receive buffer,
|
|
|
|
* we have to do the receive in sections, and thus risk returning
|
|
|
|
* a short count if a timeout or signal occurs after we start.
|
|
|
|
*/
|
1994-10-02 17:35:40 +00:00
|
|
|
if (m == 0 || (((flags & MSG_DONTWAIT) == 0 &&
|
1994-05-24 10:09:53 +00:00
|
|
|
so->so_rcv.sb_cc < uio->uio_resid) &&
|
|
|
|
(so->so_rcv.sb_cc < so->so_rcv.sb_lowat ||
|
|
|
|
((flags & MSG_WAITALL) && uio->uio_resid <= so->so_rcv.sb_hiwat)) &&
|
1994-10-02 17:35:40 +00:00
|
|
|
m->m_nextpkt == 0 && (pr->pr_flags & PR_ATOMIC) == 0)) {
|
2001-04-27 13:42:50 +00:00
|
|
|
KASSERT(m != 0 || !so->so_rcv.sb_cc,
|
|
|
|
("receive: m == %p so->so_rcv.sb_cc == %lu",
|
|
|
|
m, so->so_rcv.sb_cc));
|
1994-05-24 10:09:53 +00:00
|
|
|
if (so->so_error) {
|
|
|
|
if (m)
|
|
|
|
goto dontblock;
|
|
|
|
error = so->so_error;
|
|
|
|
if ((flags & MSG_PEEK) == 0)
|
|
|
|
so->so_error = 0;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
if (so->so_state & SS_CANTRCVMORE) {
|
|
|
|
if (m)
|
|
|
|
goto dontblock;
|
|
|
|
else
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
for (; m; m = m->m_next)
|
|
|
|
if (m->m_type == MT_OOBDATA || (m->m_flags & M_EOR)) {
|
|
|
|
m = so->so_rcv.sb_mb;
|
|
|
|
goto dontblock;
|
|
|
|
}
|
|
|
|
if ((so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) == 0 &&
|
|
|
|
(so->so_proto->pr_flags & PR_CONNREQUIRED)) {
|
|
|
|
error = ENOTCONN;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
if (uio->uio_resid == 0)
|
|
|
|
goto release;
|
|
|
|
if ((so->so_state & SS_NBIO) || (flags & MSG_DONTWAIT)) {
|
|
|
|
error = EWOULDBLOCK;
|
|
|
|
goto release;
|
|
|
|
}
|
|
|
|
sbunlock(&so->so_rcv);
|
|
|
|
error = sbwait(&so->so_rcv);
|
|
|
|
splx(s);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
dontblock:
|
2001-09-12 08:38:13 +00:00
|
|
|
if (uio->uio_td)
|
|
|
|
uio->uio_td->td_proc->p_stats->p_ru.ru_msgrcv++;
|
1994-05-24 10:09:53 +00:00
|
|
|
nextrecord = m->m_nextpkt;
|
|
|
|
if (pr->pr_flags & PR_ADDR) {
|
2001-11-12 20:50:06 +00:00
|
|
|
KASSERT(m->m_type == MT_SONAME,
|
|
|
|
("m->m_type == %d", m->m_type));
|
1994-05-24 10:09:53 +00:00
|
|
|
orig_resid = 0;
|
1997-08-16 19:16:27 +00:00
|
|
|
if (psa)
|
|
|
|
*psa = dup_sockaddr(mtod(m, struct sockaddr *),
|
|
|
|
mp0 == 0);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (flags & MSG_PEEK) {
|
|
|
|
m = m->m_next;
|
|
|
|
} else {
|
|
|
|
sbfree(&so->so_rcv, m);
|
1997-08-16 19:16:27 +00:00
|
|
|
MFREE(m, so->so_rcv.sb_mb);
|
|
|
|
m = so->so_rcv.sb_mb;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
while (m && m->m_type == MT_CONTROL && error == 0) {
|
|
|
|
if (flags & MSG_PEEK) {
|
|
|
|
if (controlp)
|
|
|
|
*controlp = m_copy(m, 0, m->m_len);
|
|
|
|
m = m->m_next;
|
|
|
|
} else {
|
|
|
|
sbfree(&so->so_rcv, m);
|
2001-10-04 13:11:48 +00:00
|
|
|
so->so_rcv.sb_mb = m->m_next;
|
|
|
|
m->m_next = NULL;
|
|
|
|
if (pr->pr_domain->dom_externalize)
|
|
|
|
error =
|
|
|
|
(*pr->pr_domain->dom_externalize)(m, controlp);
|
|
|
|
else if (controlp)
|
1994-05-24 10:09:53 +00:00
|
|
|
*controlp = m;
|
2001-10-04 13:11:48 +00:00
|
|
|
else
|
|
|
|
m_freem(m);
|
|
|
|
m = so->so_rcv.sb_mb;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
if (controlp) {
|
|
|
|
orig_resid = 0;
|
2001-10-04 13:11:48 +00:00
|
|
|
do
|
|
|
|
controlp = &(*controlp)->m_next;
|
|
|
|
while (*controlp != NULL);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (m) {
|
|
|
|
if ((flags & MSG_PEEK) == 0)
|
|
|
|
m->m_nextpkt = nextrecord;
|
|
|
|
type = m->m_type;
|
|
|
|
if (type == MT_OOBDATA)
|
|
|
|
flags |= MSG_OOB;
|
|
|
|
}
|
|
|
|
moff = 0;
|
|
|
|
offset = 0;
|
|
|
|
while (m && uio->uio_resid > 0 && error == 0) {
|
|
|
|
if (m->m_type == MT_OOBDATA) {
|
|
|
|
if (type != MT_OOBDATA)
|
|
|
|
break;
|
|
|
|
} else if (type == MT_OOBDATA)
|
|
|
|
break;
|
1999-01-08 17:31:30 +00:00
|
|
|
else
|
|
|
|
KASSERT(m->m_type == MT_DATA || m->m_type == MT_HEADER,
|
2001-11-12 20:50:06 +00:00
|
|
|
("m->m_type == %d", m->m_type));
|
1994-05-24 10:09:53 +00:00
|
|
|
so->so_state &= ~SS_RCVATMARK;
|
|
|
|
len = uio->uio_resid;
|
|
|
|
if (so->so_oobmark && len > so->so_oobmark - offset)
|
|
|
|
len = so->so_oobmark - offset;
|
|
|
|
if (len > m->m_len - moff)
|
|
|
|
len = m->m_len - moff;
|
|
|
|
/*
|
|
|
|
* If mp is set, just pass back the mbufs.
|
|
|
|
* Otherwise copy them out via the uio, then free.
|
|
|
|
* Sockbuf must be consistent here (points to current mbuf,
|
|
|
|
* it points to next record) when we drop priority;
|
|
|
|
* we must note any additions to the sockbuf when we
|
|
|
|
* block interrupts again.
|
|
|
|
*/
|
|
|
|
if (mp == 0) {
|
|
|
|
splx(s);
|
|
|
|
error = uiomove(mtod(m, caddr_t) + moff, (int)len, uio);
|
|
|
|
s = splnet();
|
1996-11-29 19:03:42 +00:00
|
|
|
if (error)
|
|
|
|
goto release;
|
1994-05-24 10:09:53 +00:00
|
|
|
} else
|
|
|
|
uio->uio_resid -= len;
|
|
|
|
if (len == m->m_len - moff) {
|
|
|
|
if (m->m_flags & M_EOR)
|
|
|
|
flags |= MSG_EOR;
|
|
|
|
if (flags & MSG_PEEK) {
|
|
|
|
m = m->m_next;
|
|
|
|
moff = 0;
|
|
|
|
} else {
|
|
|
|
nextrecord = m->m_nextpkt;
|
|
|
|
sbfree(&so->so_rcv, m);
|
|
|
|
if (mp) {
|
|
|
|
*mp = m;
|
|
|
|
mp = &m->m_next;
|
|
|
|
so->so_rcv.sb_mb = m = m->m_next;
|
|
|
|
*mp = (struct mbuf *)0;
|
|
|
|
} else {
|
|
|
|
MFREE(m, so->so_rcv.sb_mb);
|
|
|
|
m = so->so_rcv.sb_mb;
|
|
|
|
}
|
|
|
|
if (m)
|
|
|
|
m->m_nextpkt = nextrecord;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (flags & MSG_PEEK)
|
|
|
|
moff += len;
|
|
|
|
else {
|
|
|
|
if (mp)
|
2000-12-21 21:44:31 +00:00
|
|
|
*mp = m_copym(m, 0, len, M_TRYWAIT);
|
1994-05-24 10:09:53 +00:00
|
|
|
m->m_data += len;
|
|
|
|
m->m_len -= len;
|
|
|
|
so->so_rcv.sb_cc -= len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (so->so_oobmark) {
|
|
|
|
if ((flags & MSG_PEEK) == 0) {
|
|
|
|
so->so_oobmark -= len;
|
|
|
|
if (so->so_oobmark == 0) {
|
|
|
|
so->so_state |= SS_RCVATMARK;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
offset += len;
|
|
|
|
if (offset == so->so_oobmark)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (flags & MSG_EOR)
|
|
|
|
break;
|
|
|
|
/*
|
|
|
|
* If the MSG_WAITALL flag is set (for non-atomic socket),
|
|
|
|
* we must not quit until "uio->uio_resid == 0" or an error
|
|
|
|
* termination. If a signal/timeout occurs, return
|
|
|
|
* with a short count but without error.
|
|
|
|
* Keep sockbuf locked against other readers.
|
|
|
|
*/
|
|
|
|
while (flags & MSG_WAITALL && m == 0 && uio->uio_resid > 0 &&
|
|
|
|
!sosendallatonce(so) && !nextrecord) {
|
|
|
|
if (so->so_error || so->so_state & SS_CANTRCVMORE)
|
|
|
|
break;
|
2001-03-16 22:37:06 +00:00
|
|
|
/*
|
|
|
|
* Notify the protocol that some data has been
|
|
|
|
* drained before blocking.
|
|
|
|
*/
|
|
|
|
if (pr->pr_flags & PR_WANTRCVD && so->so_pcb)
|
|
|
|
(*pr->pr_usrreqs->pru_rcvd)(so, flags);
|
1994-05-24 10:09:53 +00:00
|
|
|
error = sbwait(&so->so_rcv);
|
|
|
|
if (error) {
|
|
|
|
sbunlock(&so->so_rcv);
|
|
|
|
splx(s);
|
|
|
|
return (0);
|
|
|
|
}
|
1994-10-02 17:35:40 +00:00
|
|
|
m = so->so_rcv.sb_mb;
|
|
|
|
if (m)
|
1994-05-24 10:09:53 +00:00
|
|
|
nextrecord = m->m_nextpkt;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (m && pr->pr_flags & PR_ATOMIC) {
|
|
|
|
flags |= MSG_TRUNC;
|
|
|
|
if ((flags & MSG_PEEK) == 0)
|
|
|
|
(void) sbdroprecord(&so->so_rcv);
|
|
|
|
}
|
|
|
|
if ((flags & MSG_PEEK) == 0) {
|
|
|
|
if (m == 0)
|
|
|
|
so->so_rcv.sb_mb = nextrecord;
|
|
|
|
if (pr->pr_flags & PR_WANTRCVD && so->so_pcb)
|
1996-07-11 16:32:50 +00:00
|
|
|
(*pr->pr_usrreqs->pru_rcvd)(so, flags);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
if (orig_resid == uio->uio_resid && orig_resid &&
|
|
|
|
(flags & MSG_EOR) == 0 && (so->so_state & SS_CANTRCVMORE) == 0) {
|
|
|
|
sbunlock(&so->so_rcv);
|
|
|
|
splx(s);
|
|
|
|
goto restart;
|
|
|
|
}
|
1995-05-30 08:16:23 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
if (flagsp)
|
|
|
|
*flagsp |= flags;
|
|
|
|
release:
|
|
|
|
sbunlock(&so->so_rcv);
|
|
|
|
splx(s);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1994-05-24 10:09:53 +00:00
|
|
|
soshutdown(so, how)
|
|
|
|
register struct socket *so;
|
|
|
|
register int how;
|
|
|
|
{
|
|
|
|
register struct protosw *pr = so->so_proto;
|
|
|
|
|
2001-02-27 13:48:07 +00:00
|
|
|
if (!(how == SHUT_RD || how == SHUT_WR || how == SHUT_RDWR))
|
|
|
|
return (EINVAL);
|
|
|
|
|
|
|
|
if (how != SHUT_WR)
|
1994-05-24 10:09:53 +00:00
|
|
|
sorflush(so);
|
2001-02-27 13:48:07 +00:00
|
|
|
if (how != SHUT_RD)
|
1996-07-11 16:32:50 +00:00
|
|
|
return ((*pr->pr_usrreqs->pru_shutdown)(so));
|
1994-05-24 10:09:53 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
void
|
1994-05-24 10:09:53 +00:00
|
|
|
sorflush(so)
|
|
|
|
register struct socket *so;
|
|
|
|
{
|
|
|
|
register struct sockbuf *sb = &so->so_rcv;
|
|
|
|
register struct protosw *pr = so->so_proto;
|
|
|
|
register int s;
|
|
|
|
struct sockbuf asb;
|
|
|
|
|
|
|
|
sb->sb_flags |= SB_NOINTR;
|
|
|
|
(void) sblock(sb, M_WAITOK);
|
|
|
|
s = splimp();
|
|
|
|
socantrcvmore(so);
|
|
|
|
sbunlock(sb);
|
|
|
|
asb = *sb;
|
|
|
|
bzero((caddr_t)sb, sizeof (*sb));
|
|
|
|
splx(s);
|
|
|
|
if (pr->pr_flags & PR_RIGHTS && pr->pr_domain->dom_dispose)
|
|
|
|
(*pr->pr_domain->dom_dispose)(asb.sb_mb);
|
1999-10-09 20:42:17 +00:00
|
|
|
sbrelease(&asb, so);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
2000-11-20 01:35:25 +00:00
|
|
|
#ifdef INET
|
2000-06-20 01:09:23 +00:00
|
|
|
static int
|
|
|
|
do_setopt_accept_filter(so, sopt)
|
|
|
|
struct socket *so;
|
|
|
|
struct sockopt *sopt;
|
|
|
|
{
|
|
|
|
struct accept_filter_arg *afap = NULL;
|
|
|
|
struct accept_filter *afp;
|
|
|
|
struct so_accf *af = so->so_accf;
|
|
|
|
int error = 0;
|
|
|
|
|
2000-07-20 12:17:17 +00:00
|
|
|
/* do not set/remove accept filters on non listen sockets */
|
|
|
|
if ((so->so_options & SO_ACCEPTCONN) == 0) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2000-06-20 01:09:23 +00:00
|
|
|
/* removing the filter */
|
|
|
|
if (sopt == NULL) {
|
|
|
|
if (af != NULL) {
|
2001-11-12 20:51:40 +00:00
|
|
|
if (af->so_accept_filter != NULL &&
|
2000-06-20 01:09:23 +00:00
|
|
|
af->so_accept_filter->accf_destroy != NULL) {
|
|
|
|
af->so_accept_filter->accf_destroy(so);
|
|
|
|
}
|
|
|
|
if (af->so_accept_filter_str != NULL) {
|
|
|
|
FREE(af->so_accept_filter_str, M_ACCF);
|
|
|
|
}
|
|
|
|
FREE(af, M_ACCF);
|
|
|
|
so->so_accf = NULL;
|
|
|
|
}
|
|
|
|
so->so_options &= ~SO_ACCEPTFILTER;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
/* adding a filter */
|
|
|
|
/* must remove previous filter first */
|
|
|
|
if (af != NULL) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* don't put large objects on the kernel stack */
|
|
|
|
MALLOC(afap, struct accept_filter_arg *, sizeof(*afap), M_TEMP, M_WAITOK);
|
|
|
|
error = sooptcopyin(sopt, afap, sizeof *afap, sizeof *afap);
|
|
|
|
afap->af_name[sizeof(afap->af_name)-1] = '\0';
|
|
|
|
afap->af_arg[sizeof(afap->af_arg)-1] = '\0';
|
|
|
|
if (error)
|
|
|
|
goto out;
|
|
|
|
afp = accept_filt_get(afap->af_name);
|
|
|
|
if (afp == NULL) {
|
|
|
|
error = ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
2000-12-08 21:51:06 +00:00
|
|
|
MALLOC(af, struct so_accf *, sizeof(*af), M_ACCF, M_WAITOK | M_ZERO);
|
2000-06-20 01:09:23 +00:00
|
|
|
if (afp->accf_create != NULL) {
|
|
|
|
if (afap->af_name[0] != '\0') {
|
|
|
|
int len = strlen(afap->af_name) + 1;
|
|
|
|
|
|
|
|
MALLOC(af->so_accept_filter_str, char *, len, M_ACCF, M_WAITOK);
|
|
|
|
strcpy(af->so_accept_filter_str, afap->af_name);
|
|
|
|
}
|
|
|
|
af->so_accept_filter_arg = afp->accf_create(so, afap->af_arg);
|
|
|
|
if (af->so_accept_filter_arg == NULL) {
|
|
|
|
FREE(af->so_accept_filter_str, M_ACCF);
|
|
|
|
FREE(af, M_ACCF);
|
|
|
|
so->so_accf = NULL;
|
|
|
|
error = EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
af->so_accept_filter = afp;
|
|
|
|
so->so_accf = af;
|
|
|
|
so->so_options |= SO_ACCEPTFILTER;
|
|
|
|
out:
|
|
|
|
if (afap != NULL)
|
|
|
|
FREE(afap, M_TEMP);
|
|
|
|
return (error);
|
|
|
|
}
|
2000-11-20 01:35:25 +00:00
|
|
|
#endif /* INET */
|
2000-06-20 01:09:23 +00:00
|
|
|
|
1998-08-23 03:07:17 +00:00
|
|
|
/*
|
|
|
|
* Perhaps this routine, and sooptcopyout(), below, ought to come in
|
|
|
|
* an additional variant to handle the case where the option value needs
|
|
|
|
* to be some kind of integer, but not a specific size.
|
|
|
|
* In addition to their use here, these functions are also called by the
|
|
|
|
* protocol-level pr_ctloutput() routines.
|
|
|
|
*/
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1998-08-23 03:07:17 +00:00
|
|
|
sooptcopyin(sopt, buf, len, minlen)
|
|
|
|
struct sockopt *sopt;
|
|
|
|
void *buf;
|
|
|
|
size_t len;
|
|
|
|
size_t minlen;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
1998-08-23 03:07:17 +00:00
|
|
|
size_t valsize;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the user gives us more than we wanted, we ignore it,
|
|
|
|
* but if we don't get the minimum length the caller
|
|
|
|
* wants, we return EINVAL. On success, sopt->sopt_valsize
|
|
|
|
* is set to however much we actually retrieved.
|
|
|
|
*/
|
|
|
|
if ((valsize = sopt->sopt_valsize) < minlen)
|
|
|
|
return EINVAL;
|
|
|
|
if (valsize > len)
|
|
|
|
sopt->sopt_valsize = valsize = len;
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
if (sopt->sopt_td != 0)
|
1998-08-23 03:07:17 +00:00
|
|
|
return (copyin(sopt->sopt_val, buf, valsize));
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1998-08-23 03:07:17 +00:00
|
|
|
bcopy(sopt->sopt_val, buf, valsize);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
sosetopt(so, sopt)
|
|
|
|
struct socket *so;
|
|
|
|
struct sockopt *sopt;
|
|
|
|
{
|
|
|
|
int error, optval;
|
|
|
|
struct linger l;
|
|
|
|
struct timeval tv;
|
1999-05-21 15:54:40 +00:00
|
|
|
u_long val;
|
1998-08-23 03:07:17 +00:00
|
|
|
|
|
|
|
error = 0;
|
|
|
|
if (sopt->sopt_level != SOL_SOCKET) {
|
1994-05-24 10:09:53 +00:00
|
|
|
if (so->so_proto && so->so_proto->pr_ctloutput)
|
|
|
|
return ((*so->so_proto->pr_ctloutput)
|
1998-08-23 03:07:17 +00:00
|
|
|
(so, sopt));
|
1994-05-24 10:09:53 +00:00
|
|
|
error = ENOPROTOOPT;
|
|
|
|
} else {
|
1998-08-23 03:07:17 +00:00
|
|
|
switch (sopt->sopt_name) {
|
2000-11-20 01:35:25 +00:00
|
|
|
#ifdef INET
|
|
|
|
case SO_ACCEPTFILTER:
|
|
|
|
error = do_setopt_accept_filter(so, sopt);
|
|
|
|
if (error)
|
|
|
|
goto bad;
|
|
|
|
break;
|
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
case SO_LINGER:
|
1998-08-23 03:07:17 +00:00
|
|
|
error = sooptcopyin(sopt, &l, sizeof l, sizeof l);
|
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
goto bad;
|
1998-08-23 03:07:17 +00:00
|
|
|
|
|
|
|
so->so_linger = l.l_linger;
|
|
|
|
if (l.l_onoff)
|
|
|
|
so->so_options |= SO_LINGER;
|
|
|
|
else
|
|
|
|
so->so_options &= ~SO_LINGER;
|
|
|
|
break;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SO_DEBUG:
|
|
|
|
case SO_KEEPALIVE:
|
|
|
|
case SO_DONTROUTE:
|
|
|
|
case SO_USELOOPBACK:
|
|
|
|
case SO_BROADCAST:
|
|
|
|
case SO_REUSEADDR:
|
|
|
|
case SO_REUSEPORT:
|
|
|
|
case SO_OOBINLINE:
|
1996-05-09 20:15:26 +00:00
|
|
|
case SO_TIMESTAMP:
|
1998-08-23 03:07:17 +00:00
|
|
|
error = sooptcopyin(sopt, &optval, sizeof optval,
|
|
|
|
sizeof optval);
|
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
goto bad;
|
1998-08-23 03:07:17 +00:00
|
|
|
if (optval)
|
|
|
|
so->so_options |= sopt->sopt_name;
|
1994-05-24 10:09:53 +00:00
|
|
|
else
|
1998-08-23 03:07:17 +00:00
|
|
|
so->so_options &= ~sopt->sopt_name;
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SO_SNDBUF:
|
|
|
|
case SO_RCVBUF:
|
|
|
|
case SO_SNDLOWAT:
|
|
|
|
case SO_RCVLOWAT:
|
1998-08-23 03:07:17 +00:00
|
|
|
error = sooptcopyin(sopt, &optval, sizeof optval,
|
|
|
|
sizeof optval);
|
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
goto bad;
|
1997-06-27 15:28:54 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Values < 1 make no sense for any of these
|
|
|
|
* options, so disallow them.
|
|
|
|
*/
|
|
|
|
if (optval < 1) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
1998-08-23 03:07:17 +00:00
|
|
|
switch (sopt->sopt_name) {
|
1994-05-24 10:09:53 +00:00
|
|
|
case SO_SNDBUF:
|
|
|
|
case SO_RCVBUF:
|
1998-08-23 03:07:17 +00:00
|
|
|
if (sbreserve(sopt->sopt_name == SO_SNDBUF ?
|
1999-10-09 20:42:17 +00:00
|
|
|
&so->so_snd : &so->so_rcv, (u_long)optval,
|
2001-09-12 08:38:13 +00:00
|
|
|
so, curthread) == 0) {
|
1994-05-24 10:09:53 +00:00
|
|
|
error = ENOBUFS;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
1997-06-27 15:28:54 +00:00
|
|
|
/*
|
|
|
|
* Make sure the low-water is never greater than
|
|
|
|
* the high-water.
|
|
|
|
*/
|
1994-05-24 10:09:53 +00:00
|
|
|
case SO_SNDLOWAT:
|
1997-06-27 15:28:54 +00:00
|
|
|
so->so_snd.sb_lowat =
|
|
|
|
(optval > so->so_snd.sb_hiwat) ?
|
|
|
|
so->so_snd.sb_hiwat : optval;
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
case SO_RCVLOWAT:
|
1997-06-27 15:28:54 +00:00
|
|
|
so->so_rcv.sb_lowat =
|
|
|
|
(optval > so->so_rcv.sb_hiwat) ?
|
|
|
|
so->so_rcv.sb_hiwat : optval;
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SO_SNDTIMEO:
|
|
|
|
case SO_RCVTIMEO:
|
1998-08-23 03:07:17 +00:00
|
|
|
error = sooptcopyin(sopt, &tv, sizeof tv,
|
|
|
|
sizeof tv);
|
|
|
|
if (error)
|
1994-05-24 10:09:53 +00:00
|
|
|
goto bad;
|
1998-08-23 03:07:17 +00:00
|
|
|
|
1999-05-21 15:54:40 +00:00
|
|
|
/* assert(hz > 0); */
|
|
|
|
if (tv.tv_sec < 0 || tv.tv_sec > SHRT_MAX / hz ||
|
|
|
|
tv.tv_usec < 0 || tv.tv_usec >= 1000000) {
|
|
|
|
error = EDOM;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
/* assert(tick > 0); */
|
|
|
|
/* assert(ULONG_MAX - SHRT_MAX >= 1000000); */
|
|
|
|
val = (u_long)(tv.tv_sec * hz) + tv.tv_usec / tick;
|
|
|
|
if (val > SHRT_MAX) {
|
1994-05-24 10:09:53 +00:00
|
|
|
error = EDOM;
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
|
1998-08-23 03:07:17 +00:00
|
|
|
switch (sopt->sopt_name) {
|
1994-05-24 10:09:53 +00:00
|
|
|
case SO_SNDTIMEO:
|
|
|
|
so->so_snd.sb_timeo = val;
|
|
|
|
break;
|
|
|
|
case SO_RCVTIMEO:
|
|
|
|
so->so_rcv.sb_timeo = val;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
error = ENOPROTOOPT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (error == 0 && so->so_proto && so->so_proto->pr_ctloutput) {
|
|
|
|
(void) ((*so->so_proto->pr_ctloutput)
|
1998-08-23 03:07:17 +00:00
|
|
|
(so, sopt));
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
bad:
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
1998-08-23 03:07:17 +00:00
|
|
|
/* Helper routine for getsockopt */
|
1994-05-25 09:21:21 +00:00
|
|
|
int
|
1998-08-23 03:07:17 +00:00
|
|
|
sooptcopyout(sopt, buf, len)
|
|
|
|
struct sockopt *sopt;
|
|
|
|
void *buf;
|
|
|
|
size_t len;
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
1998-08-23 03:07:17 +00:00
|
|
|
int error;
|
|
|
|
size_t valsize;
|
|
|
|
|
|
|
|
error = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Documented get behavior is that we always return a value,
|
|
|
|
* possibly truncated to fit in the user's buffer.
|
1998-08-31 18:07:23 +00:00
|
|
|
* Traditional behavior is that we always tell the user
|
|
|
|
* precisely how much we copied, rather than something useful
|
|
|
|
* like the total amount we had available for her.
|
|
|
|
* Note that this interface is not idempotent; the entire answer must
|
1998-08-23 03:07:17 +00:00
|
|
|
* generated ahead of time.
|
|
|
|
*/
|
1998-08-31 15:34:55 +00:00
|
|
|
valsize = min(len, sopt->sopt_valsize);
|
1998-08-31 18:07:23 +00:00
|
|
|
sopt->sopt_valsize = valsize;
|
1998-08-23 03:07:17 +00:00
|
|
|
if (sopt->sopt_val != 0) {
|
2001-09-12 08:38:13 +00:00
|
|
|
if (sopt->sopt_td != 0)
|
1998-08-23 03:07:17 +00:00
|
|
|
error = copyout(buf, sopt->sopt_val, valsize);
|
|
|
|
else
|
|
|
|
bcopy(buf, sopt->sopt_val, valsize);
|
|
|
|
}
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
sogetopt(so, sopt)
|
|
|
|
struct socket *so;
|
|
|
|
struct sockopt *sopt;
|
|
|
|
{
|
|
|
|
int error, optval;
|
|
|
|
struct linger l;
|
|
|
|
struct timeval tv;
|
2000-11-20 01:35:25 +00:00
|
|
|
#ifdef INET
|
2000-06-20 01:09:23 +00:00
|
|
|
struct accept_filter_arg *afap;
|
2000-11-20 01:35:25 +00:00
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1998-08-23 03:07:17 +00:00
|
|
|
error = 0;
|
|
|
|
if (sopt->sopt_level != SOL_SOCKET) {
|
1994-05-24 10:09:53 +00:00
|
|
|
if (so->so_proto && so->so_proto->pr_ctloutput) {
|
|
|
|
return ((*so->so_proto->pr_ctloutput)
|
1998-08-23 03:07:17 +00:00
|
|
|
(so, sopt));
|
1994-05-24 10:09:53 +00:00
|
|
|
} else
|
|
|
|
return (ENOPROTOOPT);
|
|
|
|
} else {
|
1998-08-23 03:07:17 +00:00
|
|
|
switch (sopt->sopt_name) {
|
2000-11-20 01:35:25 +00:00
|
|
|
#ifdef INET
|
2000-06-20 01:09:23 +00:00
|
|
|
case SO_ACCEPTFILTER:
|
2000-07-20 12:17:17 +00:00
|
|
|
if ((so->so_options & SO_ACCEPTCONN) == 0)
|
|
|
|
return (EINVAL);
|
2000-06-20 01:09:23 +00:00
|
|
|
MALLOC(afap, struct accept_filter_arg *, sizeof(*afap),
|
2000-12-08 21:51:06 +00:00
|
|
|
M_TEMP, M_WAITOK | M_ZERO);
|
2000-06-20 01:09:23 +00:00
|
|
|
if ((so->so_options & SO_ACCEPTFILTER) != 0) {
|
|
|
|
strcpy(afap->af_name, so->so_accf->so_accept_filter->accf_name);
|
|
|
|
if (so->so_accf->so_accept_filter_str != NULL)
|
|
|
|
strcpy(afap->af_arg, so->so_accf->so_accept_filter_str);
|
|
|
|
}
|
|
|
|
error = sooptcopyout(sopt, afap, sizeof(*afap));
|
|
|
|
FREE(afap, M_TEMP);
|
|
|
|
break;
|
2000-11-20 01:35:25 +00:00
|
|
|
#endif
|
2001-11-12 20:51:40 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
case SO_LINGER:
|
1998-08-23 03:07:17 +00:00
|
|
|
l.l_onoff = so->so_options & SO_LINGER;
|
|
|
|
l.l_linger = so->so_linger;
|
|
|
|
error = sooptcopyout(sopt, &l, sizeof l);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SO_USELOOPBACK:
|
|
|
|
case SO_DONTROUTE:
|
|
|
|
case SO_DEBUG:
|
|
|
|
case SO_KEEPALIVE:
|
|
|
|
case SO_REUSEADDR:
|
|
|
|
case SO_REUSEPORT:
|
|
|
|
case SO_BROADCAST:
|
|
|
|
case SO_OOBINLINE:
|
1996-05-09 20:15:26 +00:00
|
|
|
case SO_TIMESTAMP:
|
1998-08-23 03:07:17 +00:00
|
|
|
optval = so->so_options & sopt->sopt_name;
|
|
|
|
integer:
|
|
|
|
error = sooptcopyout(sopt, &optval, sizeof optval);
|
1994-05-24 10:09:53 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SO_TYPE:
|
1998-08-23 03:07:17 +00:00
|
|
|
optval = so->so_type;
|
|
|
|
goto integer;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SO_ERROR:
|
1998-08-23 03:07:17 +00:00
|
|
|
optval = so->so_error;
|
1994-05-24 10:09:53 +00:00
|
|
|
so->so_error = 0;
|
1998-08-23 03:07:17 +00:00
|
|
|
goto integer;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SO_SNDBUF:
|
1998-08-23 03:07:17 +00:00
|
|
|
optval = so->so_snd.sb_hiwat;
|
|
|
|
goto integer;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SO_RCVBUF:
|
1998-08-23 03:07:17 +00:00
|
|
|
optval = so->so_rcv.sb_hiwat;
|
|
|
|
goto integer;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SO_SNDLOWAT:
|
1998-08-23 03:07:17 +00:00
|
|
|
optval = so->so_snd.sb_lowat;
|
|
|
|
goto integer;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SO_RCVLOWAT:
|
1998-08-23 03:07:17 +00:00
|
|
|
optval = so->so_rcv.sb_lowat;
|
|
|
|
goto integer;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
case SO_SNDTIMEO:
|
|
|
|
case SO_RCVTIMEO:
|
1998-08-23 03:07:17 +00:00
|
|
|
optval = (sopt->sopt_name == SO_SNDTIMEO ?
|
|
|
|
so->so_snd.sb_timeo : so->so_rcv.sb_timeo);
|
|
|
|
|
|
|
|
tv.tv_sec = optval / hz;
|
|
|
|
tv.tv_usec = (optval % hz) * tick;
|
|
|
|
error = sooptcopyout(sopt, &tv, sizeof tv);
|
2001-11-12 20:51:40 +00:00
|
|
|
break;
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
default:
|
1998-08-23 03:07:17 +00:00
|
|
|
error = ENOPROTOOPT;
|
|
|
|
break;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
1998-08-23 03:07:17 +00:00
|
|
|
return (error);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-11-22 02:45:11 +00:00
|
|
|
/* XXX; prepare mbuf for (__FreeBSD__ < 3) routines. */
|
|
|
|
int
|
|
|
|
soopt_getm(struct sockopt *sopt, struct mbuf **mp)
|
|
|
|
{
|
|
|
|
struct mbuf *m, *m_prev;
|
|
|
|
int sopt_size = sopt->sopt_valsize;
|
|
|
|
|
2001-09-12 08:38:13 +00:00
|
|
|
MGET(m, sopt->sopt_td ? M_TRYWAIT : M_DONTWAIT, MT_DATA);
|
1999-11-22 02:45:11 +00:00
|
|
|
if (m == 0)
|
|
|
|
return ENOBUFS;
|
|
|
|
if (sopt_size > MLEN) {
|
2001-09-12 08:38:13 +00:00
|
|
|
MCLGET(m, sopt->sopt_td ? M_TRYWAIT : M_DONTWAIT);
|
1999-11-22 02:45:11 +00:00
|
|
|
if ((m->m_flags & M_EXT) == 0) {
|
|
|
|
m_free(m);
|
|
|
|
return ENOBUFS;
|
|
|
|
}
|
|
|
|
m->m_len = min(MCLBYTES, sopt_size);
|
|
|
|
} else {
|
|
|
|
m->m_len = min(MLEN, sopt_size);
|
|
|
|
}
|
|
|
|
sopt_size -= m->m_len;
|
|
|
|
*mp = m;
|
|
|
|
m_prev = m;
|
|
|
|
|
|
|
|
while (sopt_size) {
|
2001-09-12 08:38:13 +00:00
|
|
|
MGET(m, sopt->sopt_td ? M_TRYWAIT : M_DONTWAIT, MT_DATA);
|
1999-11-22 02:45:11 +00:00
|
|
|
if (m == 0) {
|
|
|
|
m_freem(*mp);
|
|
|
|
return ENOBUFS;
|
|
|
|
}
|
|
|
|
if (sopt_size > MLEN) {
|
2001-09-12 08:38:13 +00:00
|
|
|
MCLGET(m, sopt->sopt_td ? M_TRYWAIT : M_DONTWAIT);
|
1999-11-22 02:45:11 +00:00
|
|
|
if ((m->m_flags & M_EXT) == 0) {
|
|
|
|
m_freem(*mp);
|
|
|
|
return ENOBUFS;
|
|
|
|
}
|
|
|
|
m->m_len = min(MCLBYTES, sopt_size);
|
|
|
|
} else {
|
|
|
|
m->m_len = min(MLEN, sopt_size);
|
|
|
|
}
|
|
|
|
sopt_size -= m->m_len;
|
|
|
|
m_prev->m_next = m;
|
|
|
|
m_prev = m;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* XXX; copyin sopt data into mbuf chain for (__FreeBSD__ < 3) routines. */
|
|
|
|
int
|
|
|
|
soopt_mcopyin(struct sockopt *sopt, struct mbuf *m)
|
|
|
|
{
|
|
|
|
struct mbuf *m0 = m;
|
|
|
|
|
|
|
|
if (sopt->sopt_val == NULL)
|
|
|
|
return 0;
|
|
|
|
while (m != NULL && sopt->sopt_valsize >= m->m_len) {
|
2001-09-12 08:38:13 +00:00
|
|
|
if (sopt->sopt_td != NULL) {
|
1999-11-22 02:45:11 +00:00
|
|
|
int error;
|
|
|
|
|
|
|
|
error = copyin(sopt->sopt_val, mtod(m, char *),
|
|
|
|
m->m_len);
|
|
|
|
if (error != 0) {
|
|
|
|
m_freem(m0);
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
bcopy(sopt->sopt_val, mtod(m, char *), m->m_len);
|
|
|
|
sopt->sopt_valsize -= m->m_len;
|
|
|
|
(caddr_t)sopt->sopt_val += m->m_len;
|
|
|
|
m = m->m_next;
|
|
|
|
}
|
|
|
|
if (m != NULL) /* should be allocated enoughly at ip6_sooptmcopyin() */
|
|
|
|
panic("ip6_sooptmcopyin");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* XXX; copyout mbuf chain data into soopt for (__FreeBSD__ < 3) routines. */
|
|
|
|
int
|
|
|
|
soopt_mcopyout(struct sockopt *sopt, struct mbuf *m)
|
|
|
|
{
|
|
|
|
struct mbuf *m0 = m;
|
|
|
|
size_t valsize = 0;
|
|
|
|
|
|
|
|
if (sopt->sopt_val == NULL)
|
|
|
|
return 0;
|
|
|
|
while (m != NULL && sopt->sopt_valsize >= m->m_len) {
|
2001-09-12 08:38:13 +00:00
|
|
|
if (sopt->sopt_td != NULL) {
|
1999-11-22 02:45:11 +00:00
|
|
|
int error;
|
|
|
|
|
|
|
|
error = copyout(mtod(m, char *), sopt->sopt_val,
|
|
|
|
m->m_len);
|
|
|
|
if (error != 0) {
|
|
|
|
m_freem(m0);
|
|
|
|
return(error);
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
bcopy(mtod(m, char *), sopt->sopt_val, m->m_len);
|
|
|
|
sopt->sopt_valsize -= m->m_len;
|
|
|
|
(caddr_t)sopt->sopt_val += m->m_len;
|
|
|
|
valsize += m->m_len;
|
|
|
|
m = m->m_next;
|
|
|
|
}
|
|
|
|
if (m != NULL) {
|
|
|
|
/* enough soopt buffer should be given from user-land */
|
|
|
|
m_freem(m0);
|
|
|
|
return(EINVAL);
|
|
|
|
}
|
|
|
|
sopt->sopt_valsize = valsize;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
1994-05-25 09:21:21 +00:00
|
|
|
void
|
1994-05-24 10:09:53 +00:00
|
|
|
sohasoutofband(so)
|
|
|
|
register struct socket *so;
|
|
|
|
{
|
Installed the second patch attached to kern/7899 with some changes suggested
by bde, a few other tweaks to get the patch to apply cleanly again and
some improvements to the comments.
This change closes some fairly minor security holes associated with
F_SETOWN, fixes a few bugs, and removes some limitations that F_SETOWN
had on tty devices. For more details, see the description on the PR.
Because this patch increases the size of the proc and pgrp structures,
it is necessary to re-install the includes and recompile libkvm,
the vinum lkm, fstat, gcore, gdb, ipfilter, ps, top, and w.
PR: kern/7899
Reviewed by: bde, elvind
1998-11-11 10:04:13 +00:00
|
|
|
if (so->so_sigio != NULL)
|
|
|
|
pgsigio(so->so_sigio, SIGURG, 0);
|
1994-05-24 10:09:53 +00:00
|
|
|
selwakeup(&so->so_rcv.sb_sel);
|
|
|
|
}
|
1997-04-27 20:01:29 +00:00
|
|
|
|
|
|
|
int
|
2001-09-12 08:38:13 +00:00
|
|
|
sopoll(struct socket *so, int events, struct ucred *cred, struct thread *td)
|
1997-04-27 20:01:29 +00:00
|
|
|
{
|
1997-09-14 02:34:14 +00:00
|
|
|
int revents = 0;
|
1997-04-27 20:01:29 +00:00
|
|
|
int s = splnet();
|
|
|
|
|
1997-09-14 02:34:14 +00:00
|
|
|
if (events & (POLLIN | POLLRDNORM))
|
|
|
|
if (soreadable(so))
|
|
|
|
revents |= events & (POLLIN | POLLRDNORM);
|
1997-04-27 20:01:29 +00:00
|
|
|
|
1997-09-14 02:34:14 +00:00
|
|
|
if (events & (POLLOUT | POLLWRNORM))
|
|
|
|
if (sowriteable(so))
|
|
|
|
revents |= events & (POLLOUT | POLLWRNORM);
|
|
|
|
|
|
|
|
if (events & (POLLPRI | POLLRDBAND))
|
|
|
|
if (so->so_oobmark || (so->so_state & SS_RCVATMARK))
|
|
|
|
revents |= events & (POLLPRI | POLLRDBAND);
|
|
|
|
|
|
|
|
if (revents == 0) {
|
|
|
|
if (events & (POLLIN | POLLPRI | POLLRDNORM | POLLRDBAND)) {
|
2001-09-21 22:46:54 +00:00
|
|
|
selrecord(td, &so->so_rcv.sb_sel);
|
1997-09-14 02:34:14 +00:00
|
|
|
so->so_rcv.sb_flags |= SB_SEL;
|
1997-04-27 20:01:29 +00:00
|
|
|
}
|
|
|
|
|
1997-09-14 02:34:14 +00:00
|
|
|
if (events & (POLLOUT | POLLWRNORM)) {
|
2001-09-21 22:46:54 +00:00
|
|
|
selrecord(td, &so->so_snd.sb_sel);
|
1997-09-14 02:34:14 +00:00
|
|
|
so->so_snd.sb_flags |= SB_SEL;
|
1997-04-27 20:01:29 +00:00
|
|
|
}
|
|
|
|
}
|
1997-09-14 02:34:14 +00:00
|
|
|
|
1997-04-27 20:01:29 +00:00
|
|
|
splx(s);
|
1997-09-14 02:34:14 +00:00
|
|
|
return (revents);
|
1997-04-27 20:01:29 +00:00
|
|
|
}
|
2000-04-16 18:53:38 +00:00
|
|
|
|
2001-02-15 16:34:11 +00:00
|
|
|
int
|
|
|
|
sokqfilter(struct file *fp, struct knote *kn)
|
2000-04-16 18:53:38 +00:00
|
|
|
{
|
|
|
|
struct socket *so = (struct socket *)kn->kn_fp->f_data;
|
2001-02-15 16:34:11 +00:00
|
|
|
struct sockbuf *sb;
|
|
|
|
int s;
|
2000-04-16 18:53:38 +00:00
|
|
|
|
2001-02-15 16:34:11 +00:00
|
|
|
switch (kn->kn_filter) {
|
|
|
|
case EVFILT_READ:
|
|
|
|
if (so->so_options & SO_ACCEPTCONN)
|
|
|
|
kn->kn_fop = &solisten_filtops;
|
|
|
|
else
|
|
|
|
kn->kn_fop = &soread_filtops;
|
|
|
|
sb = &so->so_rcv;
|
|
|
|
break;
|
|
|
|
case EVFILT_WRITE:
|
|
|
|
kn->kn_fop = &sowrite_filtops;
|
|
|
|
sb = &so->so_snd;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
s = splnet();
|
|
|
|
SLIST_INSERT_HEAD(&sb->sb_sel.si_note, kn, kn_selnext);
|
|
|
|
sb->sb_flags |= SB_KNOTE;
|
2000-04-16 18:53:38 +00:00
|
|
|
splx(s);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
filt_sordetach(struct knote *kn)
|
|
|
|
{
|
|
|
|
struct socket *so = (struct socket *)kn->kn_fp->f_data;
|
|
|
|
int s = splnet();
|
|
|
|
|
2000-05-26 02:09:24 +00:00
|
|
|
SLIST_REMOVE(&so->so_rcv.sb_sel.si_note, kn, knote, kn_selnext);
|
2000-04-16 18:53:38 +00:00
|
|
|
if (SLIST_EMPTY(&so->so_rcv.sb_sel.si_note))
|
|
|
|
so->so_rcv.sb_flags &= ~SB_KNOTE;
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
|
|
|
filt_soread(struct knote *kn, long hint)
|
|
|
|
{
|
|
|
|
struct socket *so = (struct socket *)kn->kn_fp->f_data;
|
|
|
|
|
|
|
|
kn->kn_data = so->so_rcv.sb_cc;
|
|
|
|
if (so->so_state & SS_CANTRCVMORE) {
|
2001-11-12 20:51:40 +00:00
|
|
|
kn->kn_flags |= EV_EOF;
|
2001-02-24 01:33:12 +00:00
|
|
|
kn->kn_fflags = so->so_error;
|
2000-04-16 18:53:38 +00:00
|
|
|
return (1);
|
|
|
|
}
|
2000-09-28 04:41:22 +00:00
|
|
|
if (so->so_error) /* temporary udp error */
|
|
|
|
return (1);
|
2001-02-24 01:41:31 +00:00
|
|
|
if (kn->kn_sfflags & NOTE_LOWAT)
|
|
|
|
return (kn->kn_data >= kn->kn_sdata);
|
2000-08-07 17:52:08 +00:00
|
|
|
return (kn->kn_data >= so->so_rcv.sb_lowat);
|
2000-04-16 18:53:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
filt_sowdetach(struct knote *kn)
|
|
|
|
{
|
|
|
|
struct socket *so = (struct socket *)kn->kn_fp->f_data;
|
|
|
|
int s = splnet();
|
|
|
|
|
2000-05-26 02:09:24 +00:00
|
|
|
SLIST_REMOVE(&so->so_snd.sb_sel.si_note, kn, knote, kn_selnext);
|
2000-04-16 18:53:38 +00:00
|
|
|
if (SLIST_EMPTY(&so->so_snd.sb_sel.si_note))
|
|
|
|
so->so_snd.sb_flags &= ~SB_KNOTE;
|
|
|
|
splx(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
|
|
|
filt_sowrite(struct knote *kn, long hint)
|
|
|
|
{
|
|
|
|
struct socket *so = (struct socket *)kn->kn_fp->f_data;
|
|
|
|
|
|
|
|
kn->kn_data = sbspace(&so->so_snd);
|
|
|
|
if (so->so_state & SS_CANTSENDMORE) {
|
2001-11-12 20:51:40 +00:00
|
|
|
kn->kn_flags |= EV_EOF;
|
2001-02-24 01:33:12 +00:00
|
|
|
kn->kn_fflags = so->so_error;
|
2000-04-16 18:53:38 +00:00
|
|
|
return (1);
|
|
|
|
}
|
2000-09-28 04:41:22 +00:00
|
|
|
if (so->so_error) /* temporary udp error */
|
|
|
|
return (1);
|
2000-04-16 18:53:38 +00:00
|
|
|
if (((so->so_state & SS_ISCONNECTED) == 0) &&
|
|
|
|
(so->so_proto->pr_flags & PR_CONNREQUIRED))
|
|
|
|
return (0);
|
2001-02-24 01:41:31 +00:00
|
|
|
if (kn->kn_sfflags & NOTE_LOWAT)
|
|
|
|
return (kn->kn_data >= kn->kn_sdata);
|
2000-04-16 18:53:38 +00:00
|
|
|
return (kn->kn_data >= so->so_snd.sb_lowat);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*ARGSUSED*/
|
|
|
|
static int
|
|
|
|
filt_solisten(struct knote *kn, long hint)
|
|
|
|
{
|
|
|
|
struct socket *so = (struct socket *)kn->kn_fp->f_data;
|
|
|
|
|
|
|
|
kn->kn_data = so->so_qlen - so->so_incqlen;
|
|
|
|
return (! TAILQ_EMPTY(&so->so_comp));
|
|
|
|
}
|
2001-10-05 07:06:32 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
socheckuid(struct socket *so, uid_t uid)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (so == NULL)
|
|
|
|
return (EPERM);
|
|
|
|
if (so->so_cred->cr_uid == uid)
|
|
|
|
return (0);
|
|
|
|
return (EPERM);
|
|
|
|
}
|