003 File Manager
Current Path:
/usr/src/sys/netinet
usr
/
src
/
sys
/
netinet
/
📁
..
📄
accf_data.c
(1.95 KB)
📄
accf_dns.c
(3.37 KB)
📄
accf_http.c
(8.35 KB)
📁
cc
📄
dccp.h
(2.48 KB)
📄
icmp6.h
(26.97 KB)
📄
icmp_var.h
(3.78 KB)
📄
if_ether.c
(41.26 KB)
📄
if_ether.h
(4.62 KB)
📄
igmp.c
(98.93 KB)
📄
igmp.h
(5.36 KB)
📄
igmp_var.h
(8.69 KB)
📄
in.c
(43.68 KB)
📄
in.h
(25.81 KB)
📄
in_cksum.c
(4.09 KB)
📄
in_debug.c
(3.48 KB)
📄
in_fib.c
(8.62 KB)
📄
in_fib.h
(2.59 KB)
📄
in_fib_algo.c
(18.68 KB)
📄
in_gif.c
(11.76 KB)
📄
in_jail.c
(10.31 KB)
📄
in_kdtrace.c
(5.61 KB)
📄
in_kdtrace.h
(3.31 KB)
📄
in_mcast.c
(79.22 KB)
📄
in_pcb.c
(90.89 KB)
📄
in_pcb.h
(34.46 KB)
📄
in_pcbgroup.c
(17.28 KB)
📄
in_prot.c
(2.35 KB)
📄
in_proto.c
(9.36 KB)
📄
in_rmx.c
(4.99 KB)
📄
in_rss.c
(11.27 KB)
📄
in_rss.h
(2.42 KB)
📄
in_systm.h
(2.57 KB)
📄
in_var.h
(15.4 KB)
📄
ip.h
(7.37 KB)
📄
ip6.h
(8.93 KB)
📄
ip_carp.c
(53.25 KB)
📄
ip_carp.h
(6.79 KB)
📄
ip_divert.c
(21.74 KB)
📄
ip_divert.h
(2.32 KB)
📄
ip_dummynet.h
(8.94 KB)
📄
ip_ecn.c
(5.83 KB)
📄
ip_ecn.h
(2.1 KB)
📄
ip_encap.c
(10.59 KB)
📄
ip_encap.h
(3.13 KB)
📄
ip_fastfwd.c
(13.79 KB)
📄
ip_fw.h
(34.29 KB)
📄
ip_gre.c
(15.28 KB)
📄
ip_icmp.c
(31.15 KB)
📄
ip_icmp.h
(8.52 KB)
📄
ip_id.c
(9.78 KB)
📄
ip_input.c
(37.16 KB)
📄
ip_mroute.c
(75.86 KB)
📄
ip_mroute.h
(13.66 KB)
📄
ip_options.c
(19.9 KB)
📄
ip_options.h
(2.61 KB)
📄
ip_output.c
(40.67 KB)
📄
ip_reass.c
(22.42 KB)
📄
ip_var.h
(11.48 KB)
📁
khelp
📁
libalias
📁
netdump
📄
pim.h
(4.25 KB)
📄
pim_var.h
(3.14 KB)
📄
raw_ip.c
(28.58 KB)
📄
sctp.h
(22.97 KB)
📄
sctp_asconf.c
(100.05 KB)
📄
sctp_asconf.h
(3.31 KB)
📄
sctp_auth.c
(50.44 KB)
📄
sctp_auth.h
(8.52 KB)
📄
sctp_bsd_addr.c
(13.89 KB)
📄
sctp_bsd_addr.h
(2.45 KB)
📄
sctp_cc_functions.c
(68.75 KB)
📄
sctp_constants.h
(34.12 KB)
📄
sctp_crc32.c
(4.5 KB)
📄
sctp_crc32.h
(2.07 KB)
📄
sctp_header.h
(17.48 KB)
📄
sctp_indata.c
(175.36 KB)
📄
sctp_indata.h
(4.18 KB)
📄
sctp_input.c
(183.57 KB)
📄
sctp_input.h
(2.43 KB)
📄
sctp_kdtrace.c
(7.51 KB)
📄
sctp_kdtrace.h
(3.6 KB)
📄
sctp_lock_bsd.h
(15.64 KB)
📄
sctp_module.c
(5.16 KB)
📄
sctp_os.h
(2.73 KB)
📄
sctp_os_bsd.h
(15.04 KB)
📄
sctp_output.c
(362.89 KB)
📄
sctp_output.h
(6.38 KB)
📄
sctp_pcb.c
(198.87 KB)
📄
sctp_pcb.h
(19.31 KB)
📄
sctp_peeloff.c
(5.74 KB)
📄
sctp_peeloff.h
(2.05 KB)
📄
sctp_ss_functions.c
(30.72 KB)
📄
sctp_structs.h
(38.29 KB)
📄
sctp_syscalls.c
(13.94 KB)
📄
sctp_sysctl.c
(37.45 KB)
📄
sctp_sysctl.h
(22.9 KB)
📄
sctp_timer.c
(47.92 KB)
📄
sctp_timer.h
(3.07 KB)
📄
sctp_uio.h
(38.07 KB)
📄
sctp_usrreq.c
(216.08 KB)
📄
sctp_var.h
(12.21 KB)
📄
sctputil.c
(212.13 KB)
📄
sctputil.h
(11.69 KB)
📄
siftr.c
(45.2 KB)
📄
tcp.h
(18.3 KB)
📄
tcp_debug.c
(5.9 KB)
📄
tcp_debug.h
(2.65 KB)
📄
tcp_fastopen.c
(37.98 KB)
📄
tcp_fastopen.h
(3.7 KB)
📄
tcp_fsm.h
(4.25 KB)
📄
tcp_hostcache.c
(21.43 KB)
📄
tcp_hostcache.h
(2.92 KB)
📄
tcp_hpts.c
(57.55 KB)
📄
tcp_hpts.h
(9.89 KB)
📄
tcp_input.c
(115.95 KB)
📄
tcp_log_buf.c
(76.37 KB)
📄
tcp_log_buf.h
(14.88 KB)
📄
tcp_lro.c
(36.38 KB)
📄
tcp_lro.h
(4.43 KB)
📄
tcp_offload.c
(5.48 KB)
📄
tcp_offload.h
(2.09 KB)
📄
tcp_output.c
(60.16 KB)
📄
tcp_pcap.c
(12.67 KB)
📄
tcp_pcap.h
(1.76 KB)
📄
tcp_ratelimit.c
(43.8 KB)
📄
tcp_ratelimit.h
(5.07 KB)
📄
tcp_reass.c
(30.75 KB)
📄
tcp_sack.c
(26.74 KB)
📄
tcp_seq.h
(3.57 KB)
📁
tcp_stacks
📄
tcp_stats.c
(8.47 KB)
📄
tcp_subr.c
(92.74 KB)
📄
tcp_syncache.c
(73 KB)
📄
tcp_syncache.h
(5.16 KB)
📄
tcp_timer.c
(31.04 KB)
📄
tcp_timer.h
(9.29 KB)
📄
tcp_timewait.c
(19.06 KB)
📄
tcp_usrreq.c
(71.35 KB)
📄
tcp_var.h
(43.48 KB)
📄
tcpip.h
(2.29 KB)
📄
toecore.c
(13.51 KB)
📄
toecore.h
(5.13 KB)
📄
udp.h
(2.49 KB)
📄
udp_usrreq.c
(44.57 KB)
📄
udp_var.h
(6.48 KB)
📄
udplite.h
(1.91 KB)
Editing: sctp_syscalls.c
/*- * Copyright (c) 1982, 1986, 1989, 1990, 1993 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * */ #include <sys/cdefs.h> __FBSDID("$FreeBSD$"); #include "opt_capsicum.h" #include "opt_sctp.h" #include "opt_ktrace.h" #include <sys/param.h> #include <sys/systm.h> #include <sys/capsicum.h> #include <sys/kernel.h> #include <sys/lock.h> #include <sys/mutex.h> #include <sys/sysproto.h> #include <sys/malloc.h> #include <sys/filedesc.h> #include <sys/event.h> #include <sys/proc.h> #include <sys/fcntl.h> #include <sys/file.h> #include <sys/filio.h> #include <sys/jail.h> #include <sys/mount.h> #include <sys/mbuf.h> #include <sys/protosw.h> #include <sys/sf_buf.h> #include <sys/sysent.h> #include <sys/socket.h> #include <sys/socketvar.h> #include <sys/signalvar.h> #include <sys/syscall.h> #include <sys/syscallsubr.h> #include <sys/sysctl.h> #include <sys/uio.h> #include <sys/vnode.h> #ifdef KTRACE #include <sys/ktrace.h> #endif #ifdef COMPAT_FREEBSD32 #include <compat/freebsd32/freebsd32.h> #include <compat/freebsd32/freebsd32_syscall.h> #include <compat/freebsd32/freebsd32_util.h> #endif #include <net/vnet.h> #include <security/audit/audit.h> #include <security/mac/mac_framework.h> #include <netinet/sctp.h> #include <netinet/sctp_os_bsd.h> #include <netinet/sctp_peeloff.h> static struct syscall_helper_data sctp_syscalls[] = { SYSCALL_INIT_HELPER_F(sctp_peeloff, SYF_CAPENABLED), SYSCALL_INIT_HELPER_F(sctp_generic_sendmsg, SYF_CAPENABLED), SYSCALL_INIT_HELPER_F(sctp_generic_sendmsg_iov, SYF_CAPENABLED), SYSCALL_INIT_HELPER_F(sctp_generic_recvmsg, SYF_CAPENABLED), SYSCALL_INIT_LAST }; #ifdef COMPAT_FREEBSD32 static struct syscall_helper_data sctp32_syscalls[] = { SYSCALL32_INIT_HELPER_COMPAT(sctp_peeloff), SYSCALL32_INIT_HELPER_COMPAT(sctp_generic_sendmsg), SYSCALL32_INIT_HELPER_COMPAT(sctp_generic_sendmsg_iov), SYSCALL32_INIT_HELPER_COMPAT(sctp_generic_recvmsg), SYSCALL_INIT_LAST }; #endif int sctp_syscalls_init(void) { int error; error = syscall_helper_register(sctp_syscalls, SY_THR_STATIC_KLD); if (error != 0) return (error); #ifdef COMPAT_FREEBSD32 error = syscall32_helper_register(sctp32_syscalls, SY_THR_STATIC_KLD); if (error != 0) return (error); #endif return (0); } #ifdef SCTP SYSINIT(sctp_syscalls, SI_SUB_SYSCALLS, SI_ORDER_ANY, sctp_syscalls_init, NULL); #endif int sctp_syscalls_uninit(void) { int error; #ifdef COMPAT_FREEBSD32 error = syscall32_helper_unregister(sctp32_syscalls); if (error != 0) return (error); #endif error = syscall_helper_unregister(sctp_syscalls); if (error != 0) return (error); return (0); } /* * SCTP syscalls. */ int sys_sctp_peeloff(td, uap) struct thread *td; struct sctp_peeloff_args /* { int sd; caddr_t name; } */ *uap; { struct file *headfp, *nfp = NULL; struct socket *head, *so; cap_rights_t rights; u_int fflag; int error, fd; AUDIT_ARG_FD(uap->sd); error = getsock_cap(td, uap->sd, cap_rights_init_one(&rights, CAP_PEELOFF), &headfp, &fflag, NULL); if (error != 0) goto done2; head = headfp->f_data; if (head->so_proto->pr_protocol != IPPROTO_SCTP) { error = EOPNOTSUPP; goto done; } error = sctp_can_peel_off(head, (sctp_assoc_t)uap->name); if (error != 0) goto done; /* * At this point we know we do have a assoc to pull * we proceed to get the fd setup. This may block * but that is ok. */ error = falloc(td, &nfp, &fd, 0); if (error != 0) goto done; td->td_retval[0] = fd; CURVNET_SET(head->so_vnet); so = sopeeloff(head); if (so == NULL) { error = ENOMEM; goto noconnection; } finit(nfp, fflag, DTYPE_SOCKET, so, &socketops); error = sctp_do_peeloff(head, so, (sctp_assoc_t)uap->name); if (error != 0) goto noconnection; if (head->so_sigio != NULL) fsetown(fgetown(&head->so_sigio), &so->so_sigio); noconnection: /* * close the new descriptor, assuming someone hasn't ripped it * out from under us. */ if (error != 0) fdclose(td, nfp, fd); /* * Release explicitly held references before returning. */ CURVNET_RESTORE(); done: if (nfp != NULL) fdrop(nfp, td); fdrop(headfp, td); done2: return (error); } int sys_sctp_generic_sendmsg (td, uap) struct thread *td; struct sctp_generic_sendmsg_args /* { int sd, caddr_t msg, int mlen, caddr_t to, __socklen_t tolen, struct sctp_sndrcvinfo *sinfo, int flags } */ *uap; { struct sctp_sndrcvinfo sinfo, *u_sinfo = NULL; struct socket *so; struct file *fp = NULL; struct sockaddr *to = NULL; #ifdef KTRACE struct uio *ktruio = NULL; #endif struct uio auio; struct iovec iov[1]; cap_rights_t rights; int error = 0, len; if (uap->sinfo != NULL) { error = copyin(uap->sinfo, &sinfo, sizeof (sinfo)); if (error != 0) return (error); u_sinfo = &sinfo; } cap_rights_init_one(&rights, CAP_SEND); if (uap->tolen != 0) { error = getsockaddr(&to, uap->to, uap->tolen); if (error != 0) { to = NULL; goto sctp_bad2; } cap_rights_set_one(&rights, CAP_CONNECT); } AUDIT_ARG_FD(uap->sd); error = getsock_cap(td, uap->sd, &rights, &fp, NULL, NULL); if (error != 0) goto sctp_bad; #ifdef KTRACE if (to && (KTRPOINT(td, KTR_STRUCT))) ktrsockaddr(to); #endif iov[0].iov_base = uap->msg; iov[0].iov_len = uap->mlen; so = (struct socket *)fp->f_data; if (so->so_proto->pr_protocol != IPPROTO_SCTP) { error = EOPNOTSUPP; goto sctp_bad; } #ifdef MAC error = mac_socket_check_send(td->td_ucred, so); if (error != 0) goto sctp_bad; #endif /* MAC */ auio.uio_iov = iov; auio.uio_iovcnt = 1; auio.uio_segflg = UIO_USERSPACE; auio.uio_rw = UIO_WRITE; auio.uio_td = td; auio.uio_offset = 0; /* XXX */ auio.uio_resid = 0; #ifdef KTRACE if (KTRPOINT(td, KTR_GENIO)) ktruio = cloneuio(&auio); #endif /* KTRACE */ len = auio.uio_resid = uap->mlen; CURVNET_SET(so->so_vnet); error = sctp_lower_sosend(so, to, &auio, (struct mbuf *)NULL, (struct mbuf *)NULL, uap->flags, u_sinfo, td); CURVNET_RESTORE(); if (error != 0) { if (auio.uio_resid != len && (error == ERESTART || error == EINTR || error == EWOULDBLOCK)) error = 0; /* Generation of SIGPIPE can be controlled per socket. */ if (error == EPIPE && !(so->so_options & SO_NOSIGPIPE) && !(uap->flags & MSG_NOSIGNAL)) { PROC_LOCK(td->td_proc); tdsignal(td, SIGPIPE); PROC_UNLOCK(td->td_proc); } } if (error == 0) td->td_retval[0] = len - auio.uio_resid; #ifdef KTRACE if (ktruio != NULL) { ktruio->uio_resid = td->td_retval[0]; ktrgenio(uap->sd, UIO_WRITE, ktruio, error); } #endif /* KTRACE */ sctp_bad: if (fp != NULL) fdrop(fp, td); sctp_bad2: free(to, M_SONAME); return (error); } int sys_sctp_generic_sendmsg_iov(td, uap) struct thread *td; struct sctp_generic_sendmsg_iov_args /* { int sd, struct iovec *iov, int iovlen, caddr_t to, __socklen_t tolen, struct sctp_sndrcvinfo *sinfo, int flags } */ *uap; { struct sctp_sndrcvinfo sinfo, *u_sinfo = NULL; struct socket *so; struct file *fp = NULL; struct sockaddr *to = NULL; #ifdef KTRACE struct uio *ktruio = NULL; #endif struct uio auio; struct iovec *iov, *tiov; cap_rights_t rights; ssize_t len; int error, i; if (uap->sinfo != NULL) { error = copyin(uap->sinfo, &sinfo, sizeof (sinfo)); if (error != 0) return (error); u_sinfo = &sinfo; } cap_rights_init_one(&rights, CAP_SEND); if (uap->tolen != 0) { error = getsockaddr(&to, uap->to, uap->tolen); if (error != 0) { to = NULL; goto sctp_bad2; } cap_rights_set_one(&rights, CAP_CONNECT); } AUDIT_ARG_FD(uap->sd); error = getsock_cap(td, uap->sd, &rights, &fp, NULL, NULL); if (error != 0) goto sctp_bad1; #ifdef COMPAT_FREEBSD32 if (SV_CURPROC_FLAG(SV_ILP32)) error = freebsd32_copyiniov((struct iovec32 *)uap->iov, uap->iovlen, &iov, EMSGSIZE); else #endif error = copyiniov(uap->iov, uap->iovlen, &iov, EMSGSIZE); if (error != 0) goto sctp_bad1; #ifdef KTRACE if (to && (KTRPOINT(td, KTR_STRUCT))) ktrsockaddr(to); #endif so = (struct socket *)fp->f_data; if (so->so_proto->pr_protocol != IPPROTO_SCTP) { error = EOPNOTSUPP; goto sctp_bad; } #ifdef MAC error = mac_socket_check_send(td->td_ucred, so); if (error != 0) goto sctp_bad; #endif /* MAC */ auio.uio_iov = iov; auio.uio_iovcnt = uap->iovlen; auio.uio_segflg = UIO_USERSPACE; auio.uio_rw = UIO_WRITE; auio.uio_td = td; auio.uio_offset = 0; /* XXX */ auio.uio_resid = 0; tiov = iov; for (i = 0; i <uap->iovlen; i++, tiov++) { if ((auio.uio_resid += tiov->iov_len) < 0) { error = EINVAL; goto sctp_bad; } } #ifdef KTRACE if (KTRPOINT(td, KTR_GENIO)) ktruio = cloneuio(&auio); #endif /* KTRACE */ len = auio.uio_resid; CURVNET_SET(so->so_vnet); error = sctp_lower_sosend(so, to, &auio, (struct mbuf *)NULL, (struct mbuf *)NULL, uap->flags, u_sinfo, td); CURVNET_RESTORE(); if (error != 0) { if (auio.uio_resid != len && (error == ERESTART || error == EINTR || error == EWOULDBLOCK)) error = 0; /* Generation of SIGPIPE can be controlled per socket */ if (error == EPIPE && !(so->so_options & SO_NOSIGPIPE) && !(uap->flags & MSG_NOSIGNAL)) { PROC_LOCK(td->td_proc); tdsignal(td, SIGPIPE); PROC_UNLOCK(td->td_proc); } } if (error == 0) td->td_retval[0] = len - auio.uio_resid; #ifdef KTRACE if (ktruio != NULL) { ktruio->uio_resid = td->td_retval[0]; ktrgenio(uap->sd, UIO_WRITE, ktruio, error); } #endif /* KTRACE */ sctp_bad: free(iov, M_IOV); sctp_bad1: if (fp != NULL) fdrop(fp, td); sctp_bad2: free(to, M_SONAME); return (error); } int sys_sctp_generic_recvmsg(td, uap) struct thread *td; struct sctp_generic_recvmsg_args /* { int sd, struct iovec *iov, int iovlen, struct sockaddr *from, __socklen_t *fromlenaddr, struct sctp_sndrcvinfo *sinfo, int *msg_flags } */ *uap; { uint8_t sockbufstore[256]; struct uio auio; struct iovec *iov, *tiov; struct sctp_sndrcvinfo sinfo; struct socket *so; struct file *fp = NULL; struct sockaddr *fromsa; cap_rights_t rights; #ifdef KTRACE struct uio *ktruio = NULL; #endif ssize_t len; int error, fromlen, i, msg_flags; AUDIT_ARG_FD(uap->sd); error = getsock_cap(td, uap->sd, cap_rights_init_one(&rights, CAP_RECV), &fp, NULL, NULL); if (error != 0) return (error); #ifdef COMPAT_FREEBSD32 if (SV_CURPROC_FLAG(SV_ILP32)) error = freebsd32_copyiniov((struct iovec32 *)uap->iov, uap->iovlen, &iov, EMSGSIZE); else #endif error = copyiniov(uap->iov, uap->iovlen, &iov, EMSGSIZE); if (error != 0) goto out1; so = fp->f_data; if (so->so_proto->pr_protocol != IPPROTO_SCTP) { error = EOPNOTSUPP; goto out; } #ifdef MAC error = mac_socket_check_receive(td->td_ucred, so); if (error != 0) goto out; #endif /* MAC */ if (uap->fromlenaddr != NULL) { error = copyin(uap->fromlenaddr, &fromlen, sizeof (fromlen)); if (error != 0) goto out; } else { fromlen = 0; } if (uap->msg_flags) { error = copyin(uap->msg_flags, &msg_flags, sizeof (int)); if (error != 0) goto out; } else { msg_flags = 0; } auio.uio_iov = iov; auio.uio_iovcnt = uap->iovlen; auio.uio_segflg = UIO_USERSPACE; auio.uio_rw = UIO_READ; auio.uio_td = td; auio.uio_offset = 0; /* XXX */ auio.uio_resid = 0; tiov = iov; for (i = 0; i <uap->iovlen; i++, tiov++) { if ((auio.uio_resid += tiov->iov_len) < 0) { error = EINVAL; goto out; } } len = auio.uio_resid; fromsa = (struct sockaddr *)sockbufstore; #ifdef KTRACE if (KTRPOINT(td, KTR_GENIO)) ktruio = cloneuio(&auio); #endif /* KTRACE */ memset(&sinfo, 0, sizeof(struct sctp_sndrcvinfo)); CURVNET_SET(so->so_vnet); error = sctp_sorecvmsg(so, &auio, (struct mbuf **)NULL, fromsa, fromlen, &msg_flags, (struct sctp_sndrcvinfo *)&sinfo, 1); CURVNET_RESTORE(); if (error != 0) { if (auio.uio_resid != len && (error == ERESTART || error == EINTR || error == EWOULDBLOCK)) error = 0; } else { if (uap->sinfo) error = copyout(&sinfo, uap->sinfo, sizeof (sinfo)); } #ifdef KTRACE if (ktruio != NULL) { ktruio->uio_resid = len - auio.uio_resid; ktrgenio(uap->sd, UIO_READ, ktruio, error); } #endif /* KTRACE */ if (error != 0) goto out; td->td_retval[0] = len - auio.uio_resid; if (fromlen && uap->from) { len = fromlen; if (len <= 0 || fromsa == NULL) len = 0; else { len = MIN(len, fromsa->sa_len); error = copyout(fromsa, uap->from, (size_t)len); if (error != 0) goto out; } error = copyout(&len, uap->fromlenaddr, sizeof (socklen_t)); if (error != 0) goto out; } #ifdef KTRACE if (KTRPOINT(td, KTR_STRUCT)) ktrsockaddr(fromsa); #endif if (uap->msg_flags) { error = copyout(&msg_flags, uap->msg_flags, sizeof (int)); if (error != 0) goto out; } out: free(iov, M_IOV); out1: if (fp != NULL) fdrop(fp, td); return (error); }
Upload File
Create Folder