xref: /csrg-svn/sys/kern/uipc_socket.c (revision 16992)
1 /*	uipc_socket.c	6.5	84/08/21	*/
2 
3 #include "../h/param.h"
4 #include "../h/systm.h"
5 #include "../h/dir.h"
6 #include "../h/user.h"
7 #include "../h/proc.h"
8 #include "../h/file.h"
9 #include "../h/inode.h"
10 #include "../h/buf.h"
11 #include "../h/mbuf.h"
12 #include "../h/un.h"
13 #include "../h/protosw.h"
14 #include "../h/socket.h"
15 #include "../h/socketvar.h"
16 #include "../h/stat.h"
17 #include "../h/ioctl.h"
18 #include "../h/uio.h"
19 #include "../net/route.h"
20 #include "../netinet/in.h"
21 #include "../net/if.h"
22 
23 /*
24  * Socket operation routines.
25  * These routines are called by the routines in
26  * sys_socket.c or from a system process, and
27  * implement the semantics of socket operations by
28  * switching out to the protocol specific routines.
29  *
30  * TODO:
31  *	sostat
32  *	test socketpair
33  *	PR_RIGHTS
34  *	clean up select, async
35  *	out-of-band is a kludge
36  */
37 /*ARGSUSED*/
38 socreate(dom, aso, type, proto)
39 	struct socket **aso;
40 	register int type;
41 	int proto;
42 {
43 	register struct protosw *prp;
44 	register struct socket *so;
45 	register struct mbuf *m;
46 	register int error;
47 
48 	if (proto)
49 		prp = pffindproto(dom, proto);
50 	else
51 		prp = pffindtype(dom, type);
52 	if (prp == 0)
53 		return (EPROTONOSUPPORT);
54 	if (prp->pr_type != type)
55 		return (EPROTOTYPE);
56 	m = m_getclr(M_WAIT, MT_SOCKET);
57 	if (m == 0)
58 		return (ENOBUFS);
59 	so = mtod(m, struct socket *);
60 	so->so_options = 0;
61 	so->so_state = 0;
62 	so->so_type = type;
63 	if (u.u_uid == 0)
64 		so->so_state = SS_PRIV;
65 	so->so_proto = prp;
66 	error =
67 	    (*prp->pr_usrreq)(so, PRU_ATTACH,
68 		(struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0);
69 	if (error) {
70 		so->so_state |= SS_NOFDREF;
71 		sofree(so);
72 		return (error);
73 	}
74 	*aso = so;
75 	return (0);
76 }
77 
78 sobind(so, nam)
79 	struct socket *so;
80 	struct mbuf *nam;
81 {
82 	int s = splnet();
83 	int error;
84 
85 	error =
86 	    (*so->so_proto->pr_usrreq)(so, PRU_BIND,
87 		(struct mbuf *)0, nam, (struct mbuf *)0);
88 	splx(s);
89 	return (error);
90 }
91 
92 solisten(so, backlog)
93 	register struct socket *so;
94 	int backlog;
95 {
96 	int s = splnet(), error;
97 
98 	error =
99 	    (*so->so_proto->pr_usrreq)(so, PRU_LISTEN,
100 		(struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0);
101 	if (error) {
102 		splx(s);
103 		return (error);
104 	}
105 	if (so->so_q == 0) {
106 		so->so_q = so;
107 		so->so_q0 = so;
108 		so->so_options |= SO_ACCEPTCONN;
109 	}
110 	if (backlog < 0)
111 		backlog = 0;
112 	so->so_qlimit = MIN(backlog, SOMAXCONN);
113 	splx(s);
114 	return (0);
115 }
116 
117 sofree(so)
118 	register struct socket *so;
119 {
120 
121 	if (so->so_head) {
122 		if (!soqremque(so, 0) && !soqremque(so, 1))
123 			panic("sofree dq");
124 		so->so_head = 0;
125 	}
126 	if (so->so_pcb || (so->so_state & SS_NOFDREF) == 0)
127 		return;
128 	sbrelease(&so->so_snd);
129 	sorflush(so);
130 	(void) m_free(dtom(so));
131 }
132 
133 /*
134  * Close a socket on last file table reference removal.
135  * Initiate disconnect if connected.
136  * Free socket when disconnect complete.
137  */
138 soclose(so)
139 	register struct socket *so;
140 {
141 	int s = splnet();		/* conservative */
142 	int error;
143 
144 	if (so->so_options & SO_ACCEPTCONN) {
145 		while (so->so_q0 != so)
146 			(void) soabort(so->so_q0);
147 		while (so->so_q != so)
148 			(void) soabort(so->so_q);
149 	}
150 	if (so->so_pcb == 0)
151 		goto discard;
152 	if (so->so_state & SS_ISCONNECTED) {
153 		if ((so->so_state & SS_ISDISCONNECTING) == 0) {
154 			error = sodisconnect(so, (struct mbuf *)0);
155 			if (error)
156 				goto drop;
157 		}
158 		if (so->so_options & SO_LINGER) {
159 			if ((so->so_state & SS_ISDISCONNECTING) &&
160 			    (so->so_state & SS_NBIO))
161 				goto drop;
162 			while (so->so_state & SS_ISCONNECTED)
163 				sleep((caddr_t)&so->so_timeo, PZERO+1);
164 		}
165 	}
166 drop:
167 	if (so->so_pcb) {
168 		int error2 =
169 		    (*so->so_proto->pr_usrreq)(so, PRU_DETACH,
170 			(struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0);
171 		if (error == 0)
172 			error = error2;
173 	}
174 discard:
175 	if (so->so_state & SS_NOFDREF)
176 		panic("soclose: NOFDREF");
177 	so->so_state |= SS_NOFDREF;
178 	sofree(so);
179 	splx(s);
180 	return (error);
181 }
182 
183 /*
184  * Must be called at splnet...
185  */
186 soabort(so)
187 	struct socket *so;
188 {
189 
190 	return (
191 	    (*so->so_proto->pr_usrreq)(so, PRU_ABORT,
192 		(struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0));
193 }
194 
195 soaccept(so, nam)
196 	register struct socket *so;
197 	struct mbuf *nam;
198 {
199 	int s = splnet();
200 	int error;
201 
202 	if ((so->so_state & SS_NOFDREF) == 0)
203 		panic("soaccept: !NOFDREF");
204 	so->so_state &= ~SS_NOFDREF;
205 	error = (*so->so_proto->pr_usrreq)(so, PRU_ACCEPT,
206 	    (struct mbuf *)0, nam, (struct mbuf *)0);
207 	splx(s);
208 	return (error);
209 }
210 
211 soconnect(so, nam)
212 	register struct socket *so;
213 	struct mbuf *nam;
214 {
215 	int s = splnet();
216 	int error;
217 
218 	if (so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) {
219 		error = EISCONN;
220 		goto bad;
221 	}
222 	error = (*so->so_proto->pr_usrreq)(so, PRU_CONNECT,
223 	    (struct mbuf *)0, nam, (struct mbuf *)0);
224 bad:
225 	splx(s);
226 	return (error);
227 }
228 
229 soconnect2(so1, so2)
230 	register struct socket *so1;
231 	struct socket *so2;
232 {
233 	int s = splnet();
234 	int error;
235 
236 	error = (*so1->so_proto->pr_usrreq)(so1, PRU_CONNECT2,
237 	    (struct mbuf *)0, (struct mbuf *)so2, (struct mbuf *)0);
238 	splx(s);
239 	return (error);
240 }
241 
242 sodisconnect(so, nam)
243 	register struct socket *so;
244 	struct mbuf *nam;
245 {
246 	int s = splnet();
247 	int error;
248 
249 	if ((so->so_state & SS_ISCONNECTED) == 0) {
250 		error = ENOTCONN;
251 		goto bad;
252 	}
253 	if (so->so_state & SS_ISDISCONNECTING) {
254 		error = EALREADY;
255 		goto bad;
256 	}
257 	error = (*so->so_proto->pr_usrreq)(so, PRU_DISCONNECT,
258 	    (struct mbuf *)0, nam, (struct mbuf *)0);
259 bad:
260 	splx(s);
261 	return (error);
262 }
263 
264 /*
265  * Send on a socket.
266  * If send must go all at once and message is larger than
267  * send buffering, then hard error.
268  * Lock against other senders.
269  * If must go all at once and not enough room now, then
270  * inform user that this would block and do nothing.
271  * Otherwise, if nonblocking, send as much as possible.
272  */
273 sosend(so, nam, uio, flags, rights)
274 	register struct socket *so;
275 	struct mbuf *nam;
276 	register struct uio *uio;
277 	int flags;
278 	struct mbuf *rights;
279 {
280 	struct mbuf *top = 0;
281 	register struct mbuf *m, **mp;
282 	register int space;
283 	int len, error = 0, s, dontroute, first = 1;
284 
285 	if (sosendallatonce(so) && uio->uio_resid > so->so_snd.sb_hiwat)
286 		return (EMSGSIZE);
287 	dontroute =
288 	    (flags & MSG_DONTROUTE) && (so->so_options & SO_DONTROUTE) == 0 &&
289 	    (so->so_proto->pr_flags & PR_ATOMIC);
290 	u.u_ru.ru_msgsnd++;
291 #define	snderr(errno)	{ error = errno; splx(s); goto release; }
292 
293 restart:
294 	sblock(&so->so_snd);
295 	do {
296 		s = splnet();
297 		if (so->so_state & SS_CANTSENDMORE) {
298 			psignal(u.u_procp, SIGPIPE);
299 			snderr(EPIPE);
300 		}
301 		if (so->so_error) {
302 			error = so->so_error;
303 			so->so_error = 0;			/* ??? */
304 			splx(s);
305 			goto release;
306 		}
307 		if ((so->so_state & SS_ISCONNECTED) == 0) {
308 			if (so->so_proto->pr_flags & PR_CONNREQUIRED)
309 				snderr(ENOTCONN);
310 			if (nam == 0)
311 				snderr(EDESTADDRREQ);
312 		}
313 		if (flags & MSG_OOB)
314 			space = 1024;
315 		else {
316 			space = sbspace(&so->so_snd);
317 			if (space <= 0 ||
318 			   (sosendallatonce(so) && space < uio->uio_resid) ||
319 			   (uio->uio_resid >= CLBYTES && space < CLBYTES &&
320 			   so->so_snd.sb_cc >= CLBYTES &&
321 			   (so->so_state & SS_NBIO) == 0)) {
322 				if (so->so_state & SS_NBIO) {
323 					if (first)
324 						error = EWOULDBLOCK;
325 					splx(s);
326 					goto release;
327 				}
328 				sbunlock(&so->so_snd);
329 				sbwait(&so->so_snd);
330 				splx(s);
331 				goto restart;
332 			}
333 		}
334 		splx(s);
335 		mp = &top;
336 		while (uio->uio_resid > 0 && space > 0) {
337 			register struct iovec *iov = uio->uio_iov;
338 
339 			if (iov->iov_len == 0) {
340 				uio->uio_iov++;
341 				uio->uio_iovcnt--;
342 				if (uio->uio_iovcnt < 0)
343 					panic("sosend");
344 				continue;
345 			}
346 			MGET(m, M_WAIT, MT_DATA);
347 			if (m == NULL) {
348 				error = ENOBUFS;		/* SIGPIPE? */
349 				goto release;
350 			}
351 			if (iov->iov_len >= CLBYTES && space >= CLBYTES) {
352 				register struct mbuf *p;
353 				MCLGET(p, 1);
354 				if (p == 0)
355 					goto nopages;
356 				m->m_off = (int)p - (int)m;
357 				len = CLBYTES;
358 			} else {
359 nopages:
360 				len = MIN(MLEN, iov->iov_len);
361 			}
362 			error = uiomove(mtod(m, caddr_t), len, UIO_WRITE, uio);
363 			m->m_len = len;
364 			*mp = m;
365 			if (error)
366 				goto release;
367 			mp = &m->m_next;
368 			space -= len;
369 		}
370 		if (top) {
371 			if (dontroute)
372 				so->so_options |= SO_DONTROUTE;
373 			s = splnet();
374 			error = (*so->so_proto->pr_usrreq)(so,
375 			    (flags & MSG_OOB) ? PRU_SENDOOB : PRU_SEND,
376 			    top, (caddr_t)nam, rights);
377 			splx(s);
378 			if (dontroute)
379 				so->so_options &= ~SO_DONTROUTE;
380 		}
381 		top = 0;
382 		first = 0;
383 		if (error)
384 			break;
385 	} while (uio->uio_resid);
386 
387 release:
388 	sbunlock(&so->so_snd);
389 	if (top)
390 		m_freem(top);
391 	return (error);
392 }
393 
394 soreceive(so, aname, uio, flags, rightsp)
395 	register struct socket *so;
396 	struct mbuf **aname;
397 	register struct uio *uio;
398 	int flags;
399 	struct mbuf **rightsp;
400 {
401 	register struct mbuf *m, *n;
402 	register int len, error = 0, s, eor, tomark;
403 	struct protosw *pr = so->so_proto;
404 	int moff;
405 
406 	if (rightsp)
407 		*rightsp = 0;
408 	if (aname)
409 		*aname = 0;
410 	if (flags & MSG_OOB) {
411 		m = m_get(M_WAIT, MT_DATA);
412 		if (m == 0)
413 			return (ENOBUFS);
414 		error = (*pr->pr_usrreq)(so, PRU_RCVOOB,
415 		    m, (struct mbuf *)0, (struct mbuf *)0);
416 		if (error)
417 			goto bad;
418 		do {
419 			len = uio->uio_resid;
420 			if (len > m->m_len)
421 				len = m->m_len;
422 			error =
423 			    uiomove(mtod(m, caddr_t), (int)len, UIO_READ, uio);
424 			m = m_free(m);
425 		} while (uio->uio_resid && error == 0 && m);
426 bad:
427 		if (m)
428 			m_freem(m);
429 		return (error);
430 	}
431 
432 restart:
433 	sblock(&so->so_rcv);
434 	s = splnet();
435 
436 #define	rcverr(errno)	{ error = errno; splx(s); goto release; }
437 	if (so->so_rcv.sb_cc == 0) {
438 		if (so->so_error) {
439 			error = so->so_error;
440 			so->so_error = 0;
441 			splx(s);
442 			goto release;
443 		}
444 		if (so->so_state & SS_CANTRCVMORE) {
445 			splx(s);
446 			goto release;
447 		}
448 		if ((so->so_state & SS_ISCONNECTED) == 0 &&
449 		    (so->so_proto->pr_flags & PR_CONNREQUIRED))
450 			rcverr(ENOTCONN);
451 		if (so->so_state & SS_NBIO)
452 			rcverr(EWOULDBLOCK);
453 		sbunlock(&so->so_rcv);
454 		sbwait(&so->so_rcv);
455 		splx(s);
456 		goto restart;
457 	}
458 	u.u_ru.ru_msgrcv++;
459 	m = so->so_rcv.sb_mb;
460 	if (m == 0)
461 		panic("receive");
462 	if (pr->pr_flags & PR_ADDR) {
463 		if ((flags & MSG_PEEK) == 0) {
464 			so->so_rcv.sb_cc -= m->m_len;
465 			so->so_rcv.sb_mbcnt -= MSIZE;
466 		}
467 		if (aname) {
468 			if (flags & MSG_PEEK) {
469 				*aname = m_copy(m, 0, m->m_len);
470 				if (*aname == NULL)
471 					panic("receive 2");
472 			} else
473 				*aname = m;
474 			m = m->m_next;
475 			(*aname)->m_next = 0;
476 		} else
477 			if (flags & MSG_PEEK)
478 				m = m->m_next;
479 			else
480 				m = m_free(m);
481 		if (m == 0)
482 			panic("receive 2a");
483 		if (rightsp) {
484 			if (m->m_len)
485 				*rightsp = m_copy(m, 0, m->m_len);
486 			else {
487 				*rightsp = m_get(M_DONTWAIT, MT_SONAME);
488 				if (*rightsp)
489 					(*rightsp)->m_len = 0;
490 			}
491 #ifdef notdef
492 			if (*rightsp == NULL)
493 				panic("receive 2b");
494 #endif
495 		}
496 		if (flags & MSG_PEEK)
497 			m = m->m_next;
498 		else {
499 			so->so_rcv.sb_cc -= m->m_len;
500 			so->so_rcv.sb_mbcnt -= MSIZE;
501 			m = m_free(m);
502 		}
503 		if (m == 0)
504 			panic("receive 3");
505 		if ((flags & MSG_PEEK) == 0)
506 			so->so_rcv.sb_mb = m;
507 	}
508 	eor = 0;
509 	moff = 0;
510 	tomark = so->so_oobmark;
511 	do {
512 		if (uio->uio_resid <= 0)
513 			break;
514 		len = uio->uio_resid;
515 		so->so_state &= ~SS_RCVATMARK;
516 		if (tomark && len > tomark)
517 			len = tomark;
518 		if (moff+len > m->m_len - moff)
519 			len = m->m_len - moff;
520 		splx(s);
521 		error =
522 		    uiomove(mtod(m, caddr_t) + moff, (int)len, UIO_READ, uio);
523 		s = splnet();
524 		if (len == m->m_len) {
525 			eor = (int)m->m_act;
526 			if (flags & MSG_PEEK)
527 				m = m->m_next;
528 			else {
529 				sbfree(&so->so_rcv, m);
530 				MFREE(m, n);
531 				m = n;
532 				so->so_rcv.sb_mb = m;
533 			}
534 			moff = 0;
535 		} else {
536 			if (flags & MSG_PEEK)
537 				moff += len;
538 			else {
539 				m->m_off += len;
540 				m->m_len -= len;
541 				so->so_rcv.sb_cc -= len;
542 			}
543 		}
544 		if ((flags & MSG_PEEK) == 0 && so->so_oobmark) {
545 			so->so_oobmark -= len;
546 			if (so->so_oobmark == 0) {
547 				so->so_state |= SS_RCVATMARK;
548 				break;
549 			}
550 		}
551 		if (tomark) {
552 			tomark -= len;
553 			if (tomark == 0)
554 				break;
555 		}
556 	} while (m && error == 0 && !eor);
557 	if (flags & MSG_PEEK)
558 		goto release;
559 	if ((so->so_proto->pr_flags & PR_ATOMIC) && eor == 0)
560 		do {
561 			if (m == 0)
562 				panic("receive 4");
563 			sbfree(&so->so_rcv, m);
564 			eor = (int)m->m_act;
565 			so->so_rcv.sb_mb = m->m_next;
566 			MFREE(m, n);
567 			m = n;
568 		} while (eor == 0);
569 	if ((so->so_proto->pr_flags & PR_WANTRCVD) && so->so_pcb)
570 		(*so->so_proto->pr_usrreq)(so, PRU_RCVD,
571 		    (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0);
572 release:
573 	sbunlock(&so->so_rcv);
574 	if (error == 0 && rightsp &&
575 	    *rightsp && so->so_proto->pr_family == AF_UNIX)
576 		error = unp_externalize(*rightsp);
577 	splx(s);
578 	return (error);
579 }
580 
581 soshutdown(so, how)
582 	register struct socket *so;
583 	register int how;
584 {
585 	register struct protosw *pr = so->so_proto;
586 
587 	how++;
588 	if (how & FREAD)
589 		sorflush(so);
590 	if (how & FWRITE)
591 		return ((*pr->pr_usrreq)(so, PRU_SHUTDOWN,
592 		    (struct mbuf *)0, (struct mbuf *)0, (struct mbuf *)0));
593 	return (0);
594 }
595 
596 sorflush(so)
597 	register struct socket *so;
598 {
599 	register struct sockbuf *sb = &so->so_rcv;
600 	register struct protosw *pr = so->so_proto;
601 	register int s;
602 	struct sockbuf asb;
603 
604 	sblock(sb);
605 	s = splimp();
606 	socantrcvmore(so);
607 	sbunlock(sb);
608 	asb = *sb;
609 	bzero((caddr_t)sb, sizeof (*sb));
610 	splx(s);
611 	if (pr->pr_family == AF_UNIX && (pr->pr_flags & PR_RIGHTS))
612 		unp_scan(asb.sb_mb, unp_discard);
613 	sbrelease(&asb);
614 }
615 
616 sosetopt(so, level, optname, m)
617 	register struct socket *so;
618 	int level, optname;
619 	register struct mbuf *m;
620 {
621 
622 	if (level != SOL_SOCKET)
623 		return (EINVAL);	/* XXX */
624 	switch (optname) {
625 
626 	case SO_DEBUG:
627 	case SO_KEEPALIVE:
628 	case SO_DONTROUTE:
629 	case SO_USELOOPBACK:
630 	case SO_REUSEADDR:
631 		so->so_options |= optname;
632 		break;
633 
634 	case SO_LINGER:
635 		if (m == NULL || m->m_len != sizeof (int))
636 			return (EINVAL);
637 		so->so_options |= SO_LINGER;
638 		so->so_linger = *mtod(m, int *);
639 		break;
640 
641 	case SO_DONTLINGER:
642 		so->so_options &= ~SO_LINGER;
643 		so->so_linger = 0;
644 		break;
645 
646 	default:
647 		return (EINVAL);
648 	}
649 	return (0);
650 }
651 
652 sogetopt(so, level, optname, m)
653 	register struct socket *so;
654 	int level, optname;
655 	register struct mbuf *m;
656 {
657 
658 	if (level != SOL_SOCKET)
659 		return (EINVAL);	/* XXX */
660 	switch (optname) {
661 
662 	case SO_USELOOPBACK:
663 	case SO_DONTROUTE:
664 	case SO_DEBUG:
665 	case SO_KEEPALIVE:
666 	case SO_LINGER:
667 	case SO_REUSEADDR:
668 		if ((so->so_options & optname) == 0)
669 			return (ENOPROTOOPT);
670 		if (optname == SO_LINGER && m != NULL) {
671 			*mtod(m, int *) = so->so_linger;
672 			m->m_len = sizeof (so->so_linger);
673 		}
674 		break;
675 
676 	default:
677 		return (EINVAL);
678 	}
679 	return (0);
680 }
681 
682 sohasoutofband(so)
683 	register struct socket *so;
684 {
685 
686 	if (so->so_pgrp == 0)
687 		return;
688 	if (so->so_pgrp > 0)
689 		gsignal(so->so_pgrp, SIGURG);
690 	else {
691 		struct proc *p = pfind(-so->so_pgrp);
692 
693 		if (p)
694 			psignal(p, SIGURG);
695 	}
696 }
697