/*
- * Copyright (c) 2000-2007 Apple Inc. All rights reserved.
+ * Copyright (c) 2000-2013 Apple Inc. All rights reserved.
*
* @APPLE_OSREFERENCE_LICENSE_HEADER_START@
- *
+ *
* This file contains Original Code and/or Modifications of Original Code
* as defined in and that are subject to the Apple Public Source License
* Version 2.0 (the 'License'). You may not use this file except in
* unlawful or unlicensed copies of an Apple operating system, or to
* circumvent, violate, or enable the circumvention or violation of, any
* terms of an Apple operating system software license agreement.
- *
+ *
* Please obtain a copy of the License at
* http://www.opensource.apple.com/apsl/ and read it before using this file.
- *
+ *
* The Original Code and all software distributed under the License are
* distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
* EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
* FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
* Please see the License for the specific language governing rights and
* limitations under the License.
- *
+ *
* @APPLE_OSREFERENCE_LICENSE_HEADER_END@
*/
/*
#include <sys/protosw.h>
#include <sys/socket.h>
#include <sys/socketvar.h>
-#include <sys/filio.h> /* XXX */
+#include <sys/filio.h> /* XXX */
#include <sys/sockio.h>
#include <sys/stat.h>
#include <sys/uio.h>
static int soo_close(struct fileglob *, vfs_context_t ctx);
static int soo_drain(struct fileproc *, vfs_context_t ctx);
-/* TODO: these should be in header file */
-extern int soo_ioctl(struct fileproc *, u_long, caddr_t, vfs_context_t ctx);
-extern int soo_stat(struct socket *, void *, int);
-extern int soo_select(struct fileproc *, int, void *, vfs_context_t ctx);
-extern int soo_kqfilter(struct fileproc *, struct knote *, vfs_context_t ctx);
-
-struct fileops socketops = {
- soo_read, soo_write, soo_ioctl, soo_select, soo_close,
- soo_kqfilter, soo_drain
+const struct fileops socketops = {
+ .fo_type = DTYPE_SOCKET,
+ .fo_read = soo_read,
+ .fo_write = soo_write,
+ .fo_ioctl = soo_ioctl,
+ .fo_select = soo_select,
+ .fo_close = soo_close,
+ .fo_drain = soo_drain,
+ .fo_kqfilter = soo_kqfilter,
};
/* ARGSUSED */
static int
soo_read(struct fileproc *fp, struct uio *uio, __unused int flags,
#if !CONFIG_MACF_SOCKET
- __unused
+ __unused
#endif
- vfs_context_t ctx)
+ vfs_context_t ctx)
{
struct socket *so;
int stat;
if ((so = (struct socket *)fp->f_fglob->fg_data) == NULL) {
/* This is not a valid open file descriptor */
- return (EBADF);
+ return EBADF;
}
#if CONFIG_MACF_SOCKET
error = mac_socket_check_receive(vfs_context_ucred(ctx), so);
- if (error)
- return (error);
+ if (error) {
+ return error;
+ }
#endif /* CONFIG_MACF_SOCKET */
-//###LD will have to change
fsoreceive = so->so_proto->pr_usrreqs->pru_soreceive;
stat = (*fsoreceive)(so, 0, uio, 0, 0, 0);
- return (stat);
+ return stat;
}
/* ARGSUSED */
static int
soo_write(struct fileproc *fp, struct uio *uio, __unused int flags,
- vfs_context_t ctx)
+ vfs_context_t ctx)
{
struct socket *so;
int stat;
if ((so = (struct socket *)fp->f_fglob->fg_data) == NULL) {
/* This is not a valid open file descriptor */
- return (EBADF);
+ return EBADF;
}
#if CONFIG_MACF_SOCKET
/* JMM - have to fetch the socket's remote addr */
error = mac_socket_check_send(vfs_context_ucred(ctx), so, NULL);
- if (error)
- return (error);
+ if (error) {
+ return error;
+ }
#endif /* CONFIG_MACF_SOCKET */
fsosend = so->so_proto->pr_usrreqs->pru_sosend;
/* Generation of SIGPIPE can be controlled per socket */
procp = vfs_context_proc(ctx);
- if (stat == EPIPE && procp && !(so->so_flags & SOF_NOSIGPIPE))
+ if (stat == EPIPE && !(so->so_flags & SOF_NOSIGPIPE)) {
psignal(procp, SIGPIPE);
+ }
- return (stat);
+ return stat;
}
__private_extern__ int
soioctl(struct socket *so, u_long cmd, caddr_t data, struct proc *p)
{
- struct sockopt sopt;
int error = 0;
- int dropsockref = -1;
-
- socket_lock(so, 1);
+ int int_arg;
- sopt.sopt_level = cmd;
- sopt.sopt_name = (int)data;
- sopt.sopt_p = p;
+#if CONFIG_MACF_SOCKET_SUBSET
+ error = mac_socket_check_ioctl(kauth_cred_get(), so, cmd);
+ if (error) {
+ return error;
+ }
+#endif
+
+ socket_lock(so, 1);
- /* Call the socket filter's ioctl handler for most ioctls */
+ /* call the socket filter's ioctl handler anything but ours */
if (IOCGROUP(cmd) != 'i' && IOCGROUP(cmd) != 'r') {
- int filtered = 0;
- struct socket_filter_entry *filter;
-
- for (filter = so->so_filt; filter && error == 0;
- filter = filter->sfe_next_onsocket) {
- if (filter->sfe_filter->sf_filter.sf_ioctl) {
- if (filtered == 0) {
- sflt_use(so);
- socket_unlock(so, 0);
- filtered = 1;
- }
- error = filter->sfe_filter->sf_filter.
- sf_ioctl(filter->sfe_cookie, so, cmd, data);
+ switch (cmd) {
+ case SIOCGASSOCIDS32:
+ case SIOCGASSOCIDS64:
+ case SIOCGCONNIDS32:
+ case SIOCGCONNIDS64:
+ case SIOCGCONNINFO32:
+ case SIOCGCONNINFO64:
+ case SIOCSCONNORDER:
+ case SIOCGCONNORDER:
+ /* don't pass to filter */
+ break;
+
+ default:
+ error = sflt_ioctl(so, cmd, data);
+ if (error != 0) {
+ goto out;
}
+ break;
}
-
- if (filtered) {
- socket_lock(so, 0);
- sflt_unuse(so);
- }
-
- if (error != 0)
- goto out;
}
switch (cmd) {
-
- case FIONBIO:
- if (*(int *)data)
+ case FIONBIO: /* int */
+ bcopy(data, &int_arg, sizeof(int_arg));
+ if (int_arg) {
so->so_state |= SS_NBIO;
- else
+ } else {
so->so_state &= ~SS_NBIO;
+ }
goto out;
- case FIOASYNC:
- if (*(int *)data) {
+ case FIOASYNC: /* int */
+ bcopy(data, &int_arg, sizeof(int_arg));
+ if (int_arg) {
so->so_state |= SS_ASYNC;
so->so_rcv.sb_flags |= SB_ASYNC;
so->so_snd.sb_flags |= SB_ASYNC;
}
goto out;
- case FIONREAD:
- *(int *)data = so->so_rcv.sb_cc;
+ case FIONREAD: /* int */
+ bcopy(&so->so_rcv.sb_cc, data, sizeof(u_int32_t));
goto out;
- case SIOCSPGRP:
- so->so_pgid = *(int *)data;
+ case SIOCSPGRP: /* int */
+ bcopy(data, &so->so_pgid, sizeof(pid_t));
goto out;
- case SIOCGPGRP:
- *(int *)data = so->so_pgid;
+ case SIOCGPGRP: /* int */
+ bcopy(&so->so_pgid, data, sizeof(pid_t));
goto out;
- case SIOCATMARK:
- *(int *)data = (so->so_state&SS_RCVATMARK) != 0;
+ case SIOCATMARK: /* int */
+ int_arg = (so->so_state & SS_RCVATMARK) != 0;
+ bcopy(&int_arg, data, sizeof(int_arg));
goto out;
- case SIOCSETOT: {
- /*
- * Set socket level options here and then call protocol
- * specific routine.
- */
- struct socket *cloned_so = NULL;
- int cloned_fd = *(int *)data;
-
- /* let's make sure it's either -1 or a valid file descriptor */
- if (cloned_fd != -1) {
- error = file_socket(cloned_fd, &cloned_so);
- if (error) {
- goto out;
- }
- dropsockref = cloned_fd;
- }
-
- /* Always set socket non-blocking for OT */
- so->so_state |= SS_NBIO;
- so->so_options |= SO_DONTTRUNC | SO_WANTMORE;
- so->so_flags |= SOF_NOSIGPIPE;
-
- if (cloned_so && so != cloned_so) {
- /* Flags options */
- so->so_options |=
- cloned_so->so_options & ~SO_ACCEPTCONN;
-
- /* SO_LINGER */
- if (so->so_options & SO_LINGER)
- so->so_linger = cloned_so->so_linger;
-
- /* SO_SNDBUF, SO_RCVBUF */
- if (cloned_so->so_snd.sb_hiwat > 0) {
- if (sbreserve(&so->so_snd,
- cloned_so->so_snd.sb_hiwat) == 0) {
- error = ENOBUFS;
- goto out;
- }
- }
- if (cloned_so->so_rcv.sb_hiwat > 0) {
- if (sbreserve(&so->so_rcv,
- cloned_so->so_rcv.sb_hiwat) == 0) {
- error = ENOBUFS;
- goto out;
- }
- }
-
- /* SO_SNDLOWAT, SO_RCVLOWAT */
- so->so_snd.sb_lowat =
- (cloned_so->so_snd.sb_lowat > so->so_snd.sb_hiwat) ?
- so->so_snd.sb_hiwat : cloned_so->so_snd.sb_lowat;
- so->so_rcv.sb_lowat =
- (cloned_so->so_rcv.sb_lowat > so->so_rcv.sb_hiwat) ?
- so->so_rcv.sb_hiwat : cloned_so->so_rcv.sb_lowat;
-
- /* SO_SNDTIMEO, SO_RCVTIMEO */
- so->so_snd.sb_timeo = cloned_so->so_snd.sb_timeo;
- so->so_rcv.sb_timeo = cloned_so->so_rcv.sb_timeo;
- }
-
- error = (*so->so_proto->pr_usrreqs->pru_control)(so, cmd,
- data, 0, p);
- /* Just ignore protocols that do not understand it */
- if (error == EOPNOTSUPP)
- error = 0;
+ case SIOCSETOT: /* int; deprecated */
+ error = EOPNOTSUPP;
+ goto out;
+ case SIOCGASSOCIDS32: /* so_aidreq32 */
+ case SIOCGASSOCIDS64: /* so_aidreq64 */
+ case SIOCGCONNIDS32: /* so_cidreq32 */
+ case SIOCGCONNIDS64: /* so_cidreq64 */
+ case SIOCGCONNINFO32: /* so_cinforeq32 */
+ case SIOCGCONNINFO64: /* so_cinforeq64 */
+ case SIOCSCONNORDER: /* so_cordreq */
+ case SIOCGCONNORDER: /* so_cordreq */
+ error = (*so->so_proto->pr_usrreqs->pru_control)(so,
+ cmd, data, NULL, p);
goto out;
}
- }
+
/*
* Interface/routing/protocol specific ioctls:
* interface and routing ioctls should have a
if (IOCGROUP(cmd) == 'i') {
error = ifioctllocked(so, cmd, data, p);
} else {
- if (IOCGROUP(cmd) == 'r')
+ if (IOCGROUP(cmd) == 'r') {
error = rtioctl(cmd, data, p);
- else
+ } else {
error = (*so->so_proto->pr_usrreqs->pru_control)(so,
- cmd, data, 0, p);
+ cmd, data, NULL, p);
+ }
}
out:
- if (dropsockref != -1)
- file_drop(dropsockref);
socket_unlock(so, 1);
- if (error == EJUSTRETURN)
+ if (error == EJUSTRETURN) {
error = 0;
+ }
- return (error);
+ return error;
}
int
soo_ioctl(struct fileproc *fp, u_long cmd, caddr_t data, vfs_context_t ctx)
{
struct socket *so;
- int error;
proc_t procp = vfs_context_proc(ctx);
if ((so = (struct socket *)fp->f_fglob->fg_data) == NULL) {
/* This is not a valid open file descriptor */
- return (EBADF);
+ return EBADF;
}
- error = soioctl(so, cmd, data, procp);
-
- if (error == 0 && cmd == SIOCSETOT)
- fp->f_fglob->fg_flag |= FNONBLOCK;
-
- return (error);
+ return soioctl(so, cmd, data, procp);
}
int
int retnum = 0;
proc_t procp;
- if (so == NULL || so == (struct socket *)-1)
- return (0);
-
+ if (so == NULL || so == (struct socket *)-1) {
+ return 0;
+ }
+
procp = vfs_context_proc(ctx);
#if CONFIG_MACF_SOCKET
- if (mac_socket_check_select(vfs_context_ucred(ctx), so, which) != 0);
- return (0);
+ if (mac_socket_check_select(vfs_context_ucred(ctx), so, which) != 0) {
+ return 0;
+ }
#endif /* CONFIG_MACF_SOCKET */
socket_lock(so, 1);
switch (which) {
-
case FREAD:
so->so_rcv.sb_flags |= SB_SEL;
if (soreadable(so)) {
done:
socket_unlock(so, 1);
- return (retnum);
+ return retnum;
}
int
/* warning avoidance ; protected by isstat64 */
struct stat64 *sb64 = (struct stat64 *)0;
-#if CONFIG_MACF_SOCKET
+#if CONFIG_MACF_SOCKET_SUBSET
ret = mac_socket_check_stat(kauth_cred_get(), so);
- if (ret)
- return (ret);
+ if (ret) {
+ return ret;
+ }
#endif
if (isstat64 != 0) {
sb64 = (struct stat64 *)ub;
- bzero((caddr_t)sb64, sizeof (*sb64));
+ bzero((caddr_t)sb64, sizeof(*sb64));
} else {
sb = (struct stat *)ub;
- bzero((caddr_t)sb, sizeof (*sb));
+ bzero((caddr_t)sb, sizeof(*sb));
}
socket_lock(so, 1);
if (isstat64 != 0) {
sb64->st_mode = S_IFSOCK;
if ((so->so_state & SS_CANTRCVMORE) == 0 ||
- so->so_rcv.sb_cc != 0)
+ so->so_rcv.sb_cc != 0) {
sb64->st_mode |= S_IRUSR | S_IRGRP | S_IROTH;
- if ((so->so_state & SS_CANTSENDMORE) == 0)
+ }
+ if ((so->so_state & SS_CANTSENDMORE) == 0) {
sb64->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH;
+ }
sb64->st_size = so->so_rcv.sb_cc - so->so_rcv.sb_ctl;
- sb64->st_uid = so->so_uid;
- sb64->st_gid = -1; /* XXX -- what else to do? */
+ sb64->st_uid = kauth_cred_getuid(so->so_cred);
+ sb64->st_gid = kauth_cred_getgid(so->so_cred);
} else {
sb->st_mode = S_IFSOCK;
if ((so->so_state & SS_CANTRCVMORE) == 0 ||
- so->so_rcv.sb_cc != 0)
+ so->so_rcv.sb_cc != 0) {
sb->st_mode |= S_IRUSR | S_IRGRP | S_IROTH;
- if ((so->so_state & SS_CANTSENDMORE) == 0)
+ }
+ if ((so->so_state & SS_CANTSENDMORE) == 0) {
sb->st_mode |= S_IWUSR | S_IWGRP | S_IWOTH;
+ }
sb->st_size = so->so_rcv.sb_cc - so->so_rcv.sb_ctl;
- sb->st_uid = so->so_uid;
- sb->st_gid = -1; /* XXX -- what else to do? */
+ sb->st_uid = kauth_cred_getuid(so->so_cred);
+ sb->st_gid = kauth_cred_getgid(so->so_cred);
}
ret = (*so->so_proto->pr_usrreqs->pru_sense)(so, ub, isstat64);
socket_unlock(so, 1);
- return (ret);
+ return ret;
}
/* ARGSUSED */
sp = (struct socket *)fg->fg_data;
fg->fg_data = NULL;
- if (sp)
+ if (sp) {
error = soclose(sp);
+ }
- return (error);
+ return error;
}
static int
wakeup((caddr_t)&so->so_timeo);
sorwakeup(so);
sowwakeup(so);
+ soevent(so, SO_FILT_HINT_LOCKED);
socket_unlock(so, 1);
}
- return (error);
+ return error;
+}
+
+/*
+ * 's' group ioctls.
+ *
+ * The switch statement below does nothing at runtime, as it serves as a
+ * compile time check to ensure that all of the socket 's' ioctls (those
+ * in the 's' group going thru soo_ioctl) that are made available by the
+ * networking stack is unique. This works as long as this routine gets
+ * updated each time a new interface ioctl gets added.
+ *
+ * Any failures at compile time indicates duplicated ioctl values.
+ */
+static __attribute__((unused)) void
+soioctl_cassert(void)
+{
+ /*
+ * This is equivalent to _CASSERT() and the compiler wouldn't
+ * generate any instructions, thus for compile time only.
+ */
+ switch ((u_long)0) {
+ case 0:
+
+ /* bsd/sys/sockio.h */
+ case SIOCSHIWAT:
+ case SIOCGHIWAT:
+ case SIOCSLOWAT:
+ case SIOCGLOWAT:
+ case SIOCATMARK:
+ case SIOCSPGRP:
+ case SIOCGPGRP:
+ case SIOCSETOT:
+ case SIOCGASSOCIDS32:
+ case SIOCGASSOCIDS64:
+ case SIOCGCONNIDS32:
+ case SIOCGCONNIDS64:
+ case SIOCGCONNINFO32:
+ case SIOCGCONNINFO64:
+ case SIOCSCONNORDER:
+ case SIOCGCONNORDER:
+ ;
+ }
}