1*16412Skarels /* uipc_socket.c 6.3 84/04/24 */ 24786Swnj 34786Swnj #include "../h/param.h" 44829Swnj #include "../h/systm.h" 54786Swnj #include "../h/dir.h" 64786Swnj #include "../h/user.h" 74829Swnj #include "../h/proc.h" 84829Swnj #include "../h/file.h" 94786Swnj #include "../h/inode.h" 104829Swnj #include "../h/buf.h" 114786Swnj #include "../h/mbuf.h" 1212757Ssam #include "../h/un.h" 134829Swnj #include "../h/protosw.h" 144829Swnj #include "../h/socket.h" 154829Swnj #include "../h/socketvar.h" 164916Swnj #include "../h/stat.h" 175281Sroot #include "../h/ioctl.h" 188391Swnj #include "../h/uio.h" 196355Ssam #include "../net/route.h" 2012757Ssam #include "../netinet/in.h" 2111571Ssam #include "../net/if.h" 224786Swnj 234786Swnj /* 248300Sroot * Socket operation routines. 258300Sroot * These routines are called by the routines in 268300Sroot * sys_socket.c or from a system process, and 278300Sroot * implement the semantics of socket operations by 288300Sroot * switching out to the protocol specific routines. 2912757Ssam * 3012757Ssam * TODO: 3112757Ssam * sostat 3212757Ssam * test socketpair 3312757Ssam * PR_RIGHTS 3412757Ssam * clean up select, async 3512757Ssam * out-of-band is a kludge 364786Swnj */ 378594Sroot /*ARGSUSED*/ 3810267Ssam socreate(dom, aso, type, proto) 394786Swnj struct socket **aso; 4012757Ssam register int type; 4112757Ssam int proto; 424786Swnj { 434786Swnj register struct protosw *prp; 444786Swnj register struct socket *so; 4512757Ssam register struct mbuf *m; 4612757Ssam register int error; 474786Swnj 484890Swnj if (proto) 499168Ssam prp = pffindproto(dom, proto); 504890Swnj else 519168Ssam prp = pffindtype(dom, type); 524890Swnj if (prp == 0) 534890Swnj return (EPROTONOSUPPORT); 548300Sroot if (prp->pr_type != type) 558300Sroot return (EPROTOTYPE); 569635Ssam m = m_getclr(M_WAIT, MT_SOCKET); 574786Swnj if (m == 0) 584786Swnj return (ENOBUFS); 594786Swnj so = mtod(m, struct socket *); 6012757Ssam so->so_options = 0; 616214Swnj so->so_state = 0; 629168Ssam so->so_type = type; 636214Swnj if (u.u_uid == 0) 646214Swnj so->so_state = SS_PRIV; 654786Swnj so->so_proto = prp; 6612757Ssam error = 6712757Ssam (*prp->pr_usrreq)(so, PRU_ATTACH, 6812757Ssam (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0); 694979Swnj if (error) { 707507Sroot so->so_state |= SS_NOFDREF; 717180Swnj sofree(so); 724890Swnj return (error); 734786Swnj } 744786Swnj *aso = so; 754786Swnj return (0); 764786Swnj } 774786Swnj 7810267Ssam sobind(so, nam) 798300Sroot struct socket *so; 808300Sroot struct mbuf *nam; 818300Sroot { 828300Sroot int s = splnet(); 838300Sroot int error; 848300Sroot 858300Sroot error = 8612757Ssam (*so->so_proto->pr_usrreq)(so, PRU_BIND, 8712757Ssam (struct mbuf *)0, nam, (struct mbuf *)0); 888300Sroot splx(s); 898300Sroot return (error); 908300Sroot } 918300Sroot 928300Sroot solisten(so, backlog) 9312757Ssam register struct socket *so; 948300Sroot int backlog; 958300Sroot { 9612757Ssam int s = splnet(), error; 978300Sroot 9812757Ssam error = 9912757Ssam (*so->so_proto->pr_usrreq)(so, PRU_LISTEN, 10012757Ssam (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0); 1018300Sroot if (error) { 1028300Sroot splx(s); 1038300Sroot return (error); 1048300Sroot } 1058300Sroot if (so->so_q == 0) { 1068300Sroot so->so_q = so; 1078300Sroot so->so_q0 = so; 1088300Sroot so->so_options |= SO_ACCEPTCONN; 1098300Sroot } 1108300Sroot if (backlog < 0) 1118300Sroot backlog = 0; 11210137Ssam so->so_qlimit = MIN(backlog, SOMAXCONN); 11312493Ssam splx(s); 1148300Sroot return (0); 1158300Sroot } 1168300Sroot 1174916Swnj sofree(so) 11812757Ssam register struct socket *so; 1194916Swnj { 1204916Swnj 1217507Sroot if (so->so_head) { 1227507Sroot if (!soqremque(so, 0) && !soqremque(so, 1)) 1237507Sroot panic("sofree dq"); 1247507Sroot so->so_head = 0; 1257507Sroot } 1267507Sroot if (so->so_pcb || (so->so_state & SS_NOFDREF) == 0) 1274950Swnj return; 1284950Swnj sbrelease(&so->so_snd); 12912757Ssam sorflush(so); 1304971Swnj (void) m_free(dtom(so)); 1314916Swnj } 1324916Swnj 1334786Swnj /* 1344890Swnj * Close a socket on last file table reference removal. 1354890Swnj * Initiate disconnect if connected. 1364890Swnj * Free socket when disconnect complete. 1374829Swnj */ 13812757Ssam soclose(so) 1394829Swnj register struct socket *so; 1404829Swnj { 1414890Swnj int s = splnet(); /* conservative */ 1428713Sroot int error; 1434829Swnj 1447507Sroot if (so->so_options & SO_ACCEPTCONN) { 1457507Sroot while (so->so_q0 != so) 14610399Ssam (void) soabort(so->so_q0); 1477507Sroot while (so->so_q != so) 14810399Ssam (void) soabort(so->so_q); 1497507Sroot } 1504890Swnj if (so->so_pcb == 0) 1514890Swnj goto discard; 1524890Swnj if (so->so_state & SS_ISCONNECTED) { 1534890Swnj if ((so->so_state & SS_ISDISCONNECTING) == 0) { 1548725Sroot error = sodisconnect(so, (struct mbuf *)0); 15512757Ssam if (error) 15612757Ssam goto drop; 1574890Swnj } 15810267Ssam if (so->so_options & SO_LINGER) { 1595281Sroot if ((so->so_state & SS_ISDISCONNECTING) && 16012757Ssam (so->so_state & SS_NBIO)) 16112757Ssam goto drop; 1625281Sroot while (so->so_state & SS_ISCONNECTED) 1635281Sroot sleep((caddr_t)&so->so_timeo, PZERO+1); 1644890Swnj } 1654890Swnj } 1665580Sroot drop: 1676880Ssam if (so->so_pcb) { 16812757Ssam int error2 = 16912757Ssam (*so->so_proto->pr_usrreq)(so, PRU_DETACH, 17012757Ssam (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0); 17112757Ssam if (error == 0) 17212757Ssam error = error2; 1736880Ssam } 1744890Swnj discard: 17510399Ssam if (so->so_state & SS_NOFDREF) 17610399Ssam panic("soclose: NOFDREF"); 1777507Sroot so->so_state |= SS_NOFDREF; 1784950Swnj sofree(so); 1794890Swnj splx(s); 18012757Ssam return (error); 1814829Swnj } 1824829Swnj 18310399Ssam /* 18410399Ssam * Must be called at splnet... 18510399Ssam */ 18610399Ssam soabort(so) 18710399Ssam struct socket *so; 18810399Ssam { 18910399Ssam 19012757Ssam return ( 19112757Ssam (*so->so_proto->pr_usrreq)(so, PRU_ABORT, 19212757Ssam (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0)); 19310399Ssam } 19410399Ssam 19510267Ssam soaccept(so, nam) 19612757Ssam register struct socket *so; 1978300Sroot struct mbuf *nam; 1984927Swnj { 1994927Swnj int s = splnet(); 2004927Swnj int error; 2014927Swnj 20210399Ssam if ((so->so_state & SS_NOFDREF) == 0) 20310399Ssam panic("soaccept: !NOFDREF"); 20410267Ssam so->so_state &= ~SS_NOFDREF; 2058300Sroot error = (*so->so_proto->pr_usrreq)(so, PRU_ACCEPT, 20612757Ssam (struct mbuf *)0, nam, (struct mbuf *)0); 2074927Swnj splx(s); 2084927Swnj return (error); 2094927Swnj } 2104927Swnj 21110267Ssam soconnect(so, nam) 21212757Ssam register struct socket *so; 2138300Sroot struct mbuf *nam; 2144786Swnj { 2154890Swnj int s = splnet(); 2164890Swnj int error; 2174786Swnj 2184890Swnj if (so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) { 2194890Swnj error = EISCONN; 2204890Swnj goto bad; 2214890Swnj } 2228300Sroot error = (*so->so_proto->pr_usrreq)(so, PRU_CONNECT, 22312757Ssam (struct mbuf *)0, nam, (struct mbuf *)0); 2244890Swnj bad: 2254890Swnj splx(s); 2264890Swnj return (error); 2274786Swnj } 2284786Swnj 22912757Ssam soconnect2(so1, so2) 23012757Ssam register struct socket *so1; 23112757Ssam struct socket *so2; 23212757Ssam { 23312757Ssam int s = splnet(); 23412757Ssam int error; 23512757Ssam 23613113Ssam error = (*so1->so_proto->pr_usrreq)(so1, PRU_CONNECT2, 23713113Ssam (struct mbuf *)0, (struct mbuf *)so2, (struct mbuf *)0); 23812757Ssam splx(s); 23912757Ssam return (error); 24012757Ssam } 24112757Ssam 2428300Sroot sodisconnect(so, nam) 24312757Ssam register struct socket *so; 2448300Sroot struct mbuf *nam; 2454786Swnj { 2464890Swnj int s = splnet(); 2474890Swnj int error; 2484786Swnj 2494890Swnj if ((so->so_state & SS_ISCONNECTED) == 0) { 2504890Swnj error = ENOTCONN; 2514890Swnj goto bad; 2524890Swnj } 2534890Swnj if (so->so_state & SS_ISDISCONNECTING) { 2544890Swnj error = EALREADY; 2554890Swnj goto bad; 2564890Swnj } 2578300Sroot error = (*so->so_proto->pr_usrreq)(so, PRU_DISCONNECT, 25812757Ssam (struct mbuf *)0, nam, (struct mbuf *)0); 2594890Swnj bad: 2604890Swnj splx(s); 2614890Swnj return (error); 2624786Swnj } 2634786Swnj 2644786Swnj /* 2654890Swnj * Send on a socket. 2664890Swnj * If send must go all at once and message is larger than 2674890Swnj * send buffering, then hard error. 2684890Swnj * Lock against other senders. 2694890Swnj * If must go all at once and not enough room now, then 2704890Swnj * inform user that this would block and do nothing. 271*16412Skarels * Otherwise, if nonblocking, send as much as possible. 2724786Swnj */ 27312757Ssam sosend(so, nam, uio, flags, rights) 2744786Swnj register struct socket *so; 2758300Sroot struct mbuf *nam; 27612757Ssam register struct uio *uio; 2778319Sroot int flags; 27812757Ssam struct mbuf *rights; 2794786Swnj { 2804890Swnj struct mbuf *top = 0; 281*16412Skarels register struct mbuf *m, **mp; 28212757Ssam register int space; 283*16412Skarels int len, error = 0, s, dontroute, first = 1; 2844786Swnj 2857827Sroot if (sosendallatonce(so) && uio->uio_resid > so->so_snd.sb_hiwat) 2864890Swnj return (EMSGSIZE); 28712757Ssam dontroute = 28812757Ssam (flags & MSG_DONTROUTE) && (so->so_options & SO_DONTROUTE) == 0 && 28912757Ssam (so->so_proto->pr_flags & PR_ATOMIC); 290*16412Skarels u.u_ru.ru_msgsnd++; 291*16412Skarels #define snderr(errno) { error = errno; splx(s); goto release; } 292*16412Skarels 2936419Sroot restart: 2944890Swnj sblock(&so->so_snd); 295*16412Skarels do { 296*16412Skarels s = splnet(); 297*16412Skarels if (so->so_state & SS_CANTSENDMORE) { 298*16412Skarels psignal(u.u_procp, SIGPIPE); 299*16412Skarels snderr(EPIPE); 300*16412Skarels } 301*16412Skarels if (so->so_error) { 302*16412Skarels error = so->so_error; 303*16412Skarels so->so_error = 0; /* ??? */ 304*16412Skarels splx(s); 305*16412Skarels goto release; 306*16412Skarels } 307*16412Skarels if ((so->so_state & SS_ISCONNECTED) == 0) { 308*16412Skarels if (so->so_proto->pr_flags & PR_CONNREQUIRED) 309*16412Skarels snderr(ENOTCONN); 310*16412Skarels if (nam == 0) 311*16412Skarels snderr(EDESTADDRREQ); 312*16412Skarels } 313*16412Skarels if (flags & MSG_OOB) 314*16412Skarels space = 1024; 315*16412Skarels else { 316*16412Skarels space = sbspace(&so->so_snd); 317*16412Skarels if (space <= 0 || 318*16412Skarels sosendallatonce(so) && space < uio->uio_resid) { 319*16412Skarels if (so->so_state & SS_NBIO) { 320*16412Skarels if (first) 321*16412Skarels error = EWOULDBLOCK; 322*16412Skarels splx(s); 323*16412Skarels goto release; 324*16412Skarels } 325*16412Skarels sbunlock(&so->so_snd); 326*16412Skarels sbwait(&so->so_snd); 327*16412Skarels splx(s); 328*16412Skarels goto restart; 329*16412Skarels } 330*16412Skarels } 331*16412Skarels splx(s); 332*16412Skarels mp = ⊤ 333*16412Skarels while (uio->uio_resid > 0 && space > 0) { 334*16412Skarels register struct iovec *iov = uio->uio_iov; 3354890Swnj 336*16412Skarels if (iov->iov_len == 0) { 337*16412Skarels uio->uio_iov++; 338*16412Skarels uio->uio_iovcnt--; 339*16412Skarels if (uio->uio_iovcnt < 0) 340*16412Skarels panic("sosend"); 341*16412Skarels continue; 342*16412Skarels } 343*16412Skarels MGET(m, M_WAIT, MT_DATA); 344*16412Skarels if (m == NULL) { 345*16412Skarels error = ENOBUFS; /* SIGPIPE? */ 346*16412Skarels goto release; 347*16412Skarels } 348*16412Skarels if (iov->iov_len >= CLBYTES && space >= CLBYTES) { 349*16412Skarels register struct mbuf *p; 350*16412Skarels MCLGET(p, 1); 351*16412Skarels if (p == 0) 352*16412Skarels goto nopages; 353*16412Skarels m->m_off = (int)p - (int)m; 354*16412Skarels len = CLBYTES; 355*16412Skarels } else { 356*16412Skarels nopages: 357*16412Skarels len = MIN(MLEN, iov->iov_len); 358*16412Skarels } 359*16412Skarels error = uiomove(mtod(m, caddr_t), len, UIO_WRITE, uio); 360*16412Skarels m->m_len = len; 361*16412Skarels *mp = m; 362*16412Skarels if (error) 363*16412Skarels goto release; 364*16412Skarels mp = &m->m_next; 365*16412Skarels space -= len; 366*16412Skarels } 36710267Ssam if (dontroute) 36810267Ssam so->so_options |= SO_DONTROUTE; 3698319Sroot error = (*so->so_proto->pr_usrreq)(so, 37012757Ssam (flags & MSG_OOB) ? PRU_SENDOOB : PRU_SEND, 37112757Ssam top, (caddr_t)nam, rights); 37210267Ssam if (dontroute) 37310267Ssam so->so_options &= ~SO_DONTROUTE; 3746419Sroot top = 0; 375*16412Skarels first = 0; 37614781Ssam if (error) 377*16412Skarels break; 378*16412Skarels } while (uio->uio_resid); 3794890Swnj 3804786Swnj release: 3814890Swnj sbunlock(&so->so_snd); 3826419Sroot if (top) 3836419Sroot m_freem(top); 3844786Swnj return (error); 3854786Swnj } 3864786Swnj 38712757Ssam soreceive(so, aname, uio, flags, rightsp) 3884786Swnj register struct socket *so; 3898300Sroot struct mbuf **aname; 39012757Ssam register struct uio *uio; 3918319Sroot int flags; 39212757Ssam struct mbuf **rightsp; 3934786Swnj { 3944786Swnj register struct mbuf *m, *n; 39512757Ssam register int len, error = 0, s, eor, tomark; 39612757Ssam struct protosw *pr = so->so_proto; 39712757Ssam int moff; 3984786Swnj 39912757Ssam if (rightsp) 40012757Ssam *rightsp = 0; 40112757Ssam if (aname) 40212757Ssam *aname = 0; 40312757Ssam if (flags & MSG_OOB) { 4049635Ssam m = m_get(M_WAIT, MT_DATA); 40512757Ssam if (m == 0) 40610137Ssam return (ENOBUFS); 40712757Ssam error = (*pr->pr_usrreq)(so, PRU_RCVOOB, 40812757Ssam m, (struct mbuf *)0, (struct mbuf *)0); 4098594Sroot if (error) 41010137Ssam goto bad; 4118319Sroot do { 41210137Ssam len = uio->uio_resid; 4138319Sroot if (len > m->m_len) 4148319Sroot len = m->m_len; 4158594Sroot error = 4168793Sroot uiomove(mtod(m, caddr_t), (int)len, UIO_READ, uio); 4178319Sroot m = m_free(m); 4188594Sroot } while (uio->uio_resid && error == 0 && m); 41910137Ssam bad: 4208319Sroot if (m) 4218771Sroot m_freem(m); 4228594Sroot return (error); 4238319Sroot } 4248319Sroot 4254890Swnj restart: 4264890Swnj sblock(&so->so_rcv); 4278835Sroot s = splnet(); 4284890Swnj 4294890Swnj #define rcverr(errno) { error = errno; splx(s); goto release; } 4304786Swnj if (so->so_rcv.sb_cc == 0) { 4315168Swnj if (so->so_error) { 4325168Swnj error = so->so_error; 4335168Swnj so->so_error = 0; 4345168Swnj splx(s); 4355168Swnj goto release; 4365168Swnj } 4374890Swnj if (so->so_state & SS_CANTRCVMORE) { 4384890Swnj splx(s); 4394890Swnj goto release; 4404890Swnj } 4415015Sroot if ((so->so_state & SS_ISCONNECTED) == 0 && 4425015Sroot (so->so_proto->pr_flags & PR_CONNREQUIRED)) 4435015Sroot rcverr(ENOTCONN); 4446214Swnj if (so->so_state & SS_NBIO) 4455168Swnj rcverr(EWOULDBLOCK); 4464890Swnj sbunlock(&so->so_rcv); 4474971Swnj sbwait(&so->so_rcv); 4485012Swnj splx(s); 4494890Swnj goto restart; 4504786Swnj } 4518041Sroot u.u_ru.ru_msgrcv++; 4524829Swnj m = so->so_rcv.sb_mb; 4534786Swnj if (m == 0) 4544786Swnj panic("receive"); 45512757Ssam if (pr->pr_flags & PR_ADDR) { 45612757Ssam if ((flags & MSG_PEEK) == 0) { 4578319Sroot so->so_rcv.sb_cc -= m->m_len; 4588319Sroot so->so_rcv.sb_mbcnt -= MSIZE; 4598319Sroot } 4608300Sroot if (aname) { 46112757Ssam if (flags & MSG_PEEK) { 4628319Sroot *aname = m_copy(m, 0, m->m_len); 46310137Ssam if (*aname == NULL) 46410137Ssam panic("receive 2"); 46510137Ssam } else 4668319Sroot *aname = m; 4678300Sroot m = m->m_next; 4688300Sroot (*aname)->m_next = 0; 4698300Sroot } else 47012757Ssam if (flags & MSG_PEEK) 4718319Sroot m = m->m_next; 4728319Sroot else 4738319Sroot m = m_free(m); 4744890Swnj if (m == 0) 47512757Ssam panic("receive 2a"); 47612757Ssam if (rightsp) { 47712757Ssam if (m->m_len) 47812757Ssam *rightsp = m_copy(m, 0, m->m_len); 47912757Ssam else { 48012757Ssam *rightsp = m_get(M_DONTWAIT, MT_SONAME); 48112757Ssam if (*rightsp) 48212757Ssam (*rightsp)->m_len = 0; 48312757Ssam } 48414813Ssam #ifdef notdef 48512757Ssam if (*rightsp == NULL) 48612757Ssam panic("receive 2b"); 48714813Ssam #endif 48812757Ssam } 48912757Ssam if (flags & MSG_PEEK) 49012757Ssam m = m->m_next; 49112757Ssam else { 49212757Ssam so->so_rcv.sb_cc -= m->m_len; 49312757Ssam so->so_rcv.sb_mbcnt -= MSIZE; 49412757Ssam m = m_free(m); 49512757Ssam } 49612757Ssam if (m == 0) 49710137Ssam panic("receive 3"); 49812757Ssam if ((flags & MSG_PEEK) == 0) 4998548Sroot so->so_rcv.sb_mb = m; 5004890Swnj } 5014786Swnj eor = 0; 5028319Sroot moff = 0; 5038319Sroot tomark = so->so_oobmark; 5044786Swnj do { 5057827Sroot if (uio->uio_resid <= 0) 5067747Sroot break; 5077827Sroot len = uio->uio_resid; 5087747Sroot so->so_state &= ~SS_RCVATMARK; 5098319Sroot if (tomark && len > tomark) 5108319Sroot len = tomark; 5118548Sroot if (moff+len > m->m_len - moff) 5128319Sroot len = m->m_len - moff; 5134786Swnj splx(s); 5148594Sroot error = 5158793Sroot uiomove(mtod(m, caddr_t) + moff, (int)len, UIO_READ, uio); 5164786Swnj s = splnet(); 5174786Swnj if (len == m->m_len) { 5186091Sroot eor = (int)m->m_act; 51912757Ssam if (flags & MSG_PEEK) 5208319Sroot m = m->m_next; 5218319Sroot else { 5228319Sroot sbfree(&so->so_rcv, m); 5238319Sroot MFREE(m, n); 5248319Sroot m = n; 5258548Sroot so->so_rcv.sb_mb = m; 5268319Sroot } 5278319Sroot moff = 0; 5284786Swnj } else { 52912757Ssam if (flags & MSG_PEEK) 5308319Sroot moff += len; 5318319Sroot else { 5328319Sroot m->m_off += len; 5338319Sroot m->m_len -= len; 5348319Sroot so->so_rcv.sb_cc -= len; 5358319Sroot } 5364786Swnj } 53712757Ssam if ((flags & MSG_PEEK) == 0 && so->so_oobmark) { 5387747Sroot so->so_oobmark -= len; 5397747Sroot if (so->so_oobmark == 0) { 5407747Sroot so->so_state |= SS_RCVATMARK; 5417747Sroot break; 5427747Sroot } 5437747Sroot } 5448319Sroot if (tomark) { 5458319Sroot tomark -= len; 5468319Sroot if (tomark == 0) 5478319Sroot break; 5488319Sroot } 5498594Sroot } while (m && error == 0 && !eor); 55012757Ssam if (flags & MSG_PEEK) 5518319Sroot goto release; 5524786Swnj if ((so->so_proto->pr_flags & PR_ATOMIC) && eor == 0) 5534786Swnj do { 5544786Swnj if (m == 0) 55510137Ssam panic("receive 4"); 5564890Swnj sbfree(&so->so_rcv, m); 5574786Swnj eor = (int)m->m_act; 5584786Swnj so->so_rcv.sb_mb = m->m_next; 5594786Swnj MFREE(m, n); 5604890Swnj m = n; 5614786Swnj } while (eor == 0); 5624890Swnj if ((so->so_proto->pr_flags & PR_WANTRCVD) && so->so_pcb) 5638300Sroot (*so->so_proto->pr_usrreq)(so, PRU_RCVD, 56412757Ssam (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0); 5654890Swnj release: 5664916Swnj sbunlock(&so->so_rcv); 56712757Ssam if (error == 0 && rightsp && 56812757Ssam *rightsp && so->so_proto->pr_family == AF_UNIX) 56912757Ssam error = unp_externalize(*rightsp); 5704890Swnj splx(s); 5714916Swnj return (error); 5724786Swnj } 5734786Swnj 57410267Ssam soshutdown(so, how) 57512757Ssam register struct socket *so; 57612757Ssam register int how; 57710267Ssam { 57812757Ssam register struct protosw *pr = so->so_proto; 57910267Ssam 58010267Ssam how++; 58112757Ssam if (how & FREAD) 58212757Ssam sorflush(so); 58310267Ssam if (how & FWRITE) 58412757Ssam return ((*pr->pr_usrreq)(so, PRU_SHUTDOWN, 58512757Ssam (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0)); 58610267Ssam return (0); 58710267Ssam } 58810267Ssam 58912757Ssam sorflush(so) 59012757Ssam register struct socket *so; 59112757Ssam { 59212757Ssam register struct sockbuf *sb = &so->so_rcv; 59312757Ssam register struct protosw *pr = so->so_proto; 59412757Ssam register int s; 59512757Ssam struct sockbuf asb; 59612757Ssam 59712757Ssam sblock(sb); 59812757Ssam s = splimp(); 59912757Ssam socantrcvmore(so); 60012757Ssam sbunlock(sb); 60112757Ssam asb = *sb; 60212757Ssam bzero((caddr_t)sb, sizeof (*sb)); 60312757Ssam splx(s); 60412757Ssam if (pr->pr_family == AF_UNIX && (pr->pr_flags & PR_RIGHTS)) 60512757Ssam unp_scan(asb.sb_mb, unp_discard); 60612757Ssam sbrelease(&asb); 60712757Ssam } 60812757Ssam 60910267Ssam sosetopt(so, level, optname, m) 61012757Ssam register struct socket *so; 61110267Ssam int level, optname; 61212757Ssam register struct mbuf *m; 61310267Ssam { 61410267Ssam 61510267Ssam if (level != SOL_SOCKET) 61610267Ssam return (EINVAL); /* XXX */ 61710267Ssam switch (optname) { 61810267Ssam 61910267Ssam case SO_DEBUG: 62010269Ssam case SO_KEEPALIVE: 62110599Ssam case SO_DONTROUTE: 62210599Ssam case SO_USELOOPBACK: 62310599Ssam case SO_REUSEADDR: 62410599Ssam so->so_options |= optname; 62510269Ssam break; 62610269Ssam 62710267Ssam case SO_LINGER: 62810269Ssam if (m == NULL || m->m_len != sizeof (int)) 62910269Ssam return (EINVAL); 63010267Ssam so->so_options |= SO_LINGER; 63110269Ssam so->so_linger = *mtod(m, int *); 63210267Ssam break; 63310267Ssam 63410267Ssam case SO_DONTLINGER: 63510267Ssam so->so_options &= ~SO_LINGER; 63610267Ssam so->so_linger = 0; 63710267Ssam break; 63810267Ssam 63910267Ssam default: 64010267Ssam return (EINVAL); 64110267Ssam } 64210267Ssam return (0); 64310267Ssam } 64410267Ssam 64510267Ssam sogetopt(so, level, optname, m) 64612757Ssam register struct socket *so; 64710267Ssam int level, optname; 64812757Ssam register struct mbuf *m; 64910267Ssam { 65010267Ssam 65110267Ssam if (level != SOL_SOCKET) 65210267Ssam return (EINVAL); /* XXX */ 65310267Ssam switch (optname) { 65410267Ssam 65510267Ssam case SO_USELOOPBACK: 65610267Ssam case SO_DONTROUTE: 65710267Ssam case SO_DEBUG: 65810267Ssam case SO_KEEPALIVE: 65910267Ssam case SO_LINGER: 66010599Ssam case SO_REUSEADDR: 66110267Ssam if ((so->so_options & optname) == 0) 66210267Ssam return (ENOPROTOOPT); 66310269Ssam if (optname == SO_LINGER && m != NULL) { 66410267Ssam *mtod(m, int *) = so->so_linger; 66510267Ssam m->m_len = sizeof (so->so_linger); 66610267Ssam } 66710267Ssam break; 66810267Ssam 66910267Ssam default: 67010267Ssam return (EINVAL); 67110267Ssam } 67210267Ssam return (0); 67310267Ssam } 67410267Ssam 6755423Swnj sohasoutofband(so) 67612757Ssam register struct socket *so; 6775423Swnj { 6785423Swnj 6795423Swnj if (so->so_pgrp == 0) 6805423Swnj return; 6815423Swnj if (so->so_pgrp > 0) 6825423Swnj gsignal(so->so_pgrp, SIGURG); 6835429Swnj else { 6845429Swnj struct proc *p = pfind(-so->so_pgrp); 6855429Swnj 6865429Swnj if (p) 6875429Swnj psignal(p, SIGURG); 6885429Swnj } 6895423Swnj } 690