xref: /freebsd-14.2/lib/libc/sys/getsockopt.2 (revision bb197d4e)
1.\" Copyright (c) 1983, 1991, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 4. Neither the name of the University nor the names of its contributors
13.\"    may be used to endorse or promote products derived from this software
14.\"    without specific prior written permission.
15.\"
16.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
28.\"     @(#)getsockopt.2	8.4 (Berkeley) 5/2/95
29.\" $FreeBSD$
30.\"
31.Dd February 26, 2012
32.Dt GETSOCKOPT 2
33.Os
34.Sh NAME
35.Nm getsockopt ,
36.Nm setsockopt
37.Nd get and set options on sockets
38.Sh LIBRARY
39.Lb libc
40.Sh SYNOPSIS
41.In sys/types.h
42.In sys/socket.h
43.Ft int
44.Fn getsockopt "int s" "int level" "int optname" "void * restrict optval" "socklen_t * restrict optlen"
45.Ft int
46.Fn setsockopt "int s" "int level" "int optname" "const void *optval" "socklen_t optlen"
47.Sh DESCRIPTION
48The
49.Fn getsockopt
50and
51.Fn setsockopt
52system calls
53manipulate the
54.Em options
55associated with a socket.
56Options may exist at multiple
57protocol levels; they are always present at the uppermost
58.Dq socket
59level.
60.Pp
61When manipulating socket options the level at which the
62option resides and the name of the option must be specified.
63To manipulate options at the socket level,
64.Fa level
65is specified as
66.Dv SOL_SOCKET .
67To manipulate options at any
68other level the protocol number of the appropriate protocol
69controlling the option is supplied.
70For example,
71to indicate that an option is to be interpreted by the
72.Tn TCP
73protocol,
74.Fa level
75should be set to the protocol number of
76.Tn TCP ;
77see
78.Xr getprotoent 3 .
79.Pp
80The
81.Fa optval
82and
83.Fa optlen
84arguments
85are used to access option values for
86.Fn setsockopt .
87For
88.Fn getsockopt
89they identify a buffer in which the value for the
90requested option(s) are to be returned.
91For
92.Fn getsockopt ,
93.Fa optlen
94is a value-result argument, initially containing the
95size of the buffer pointed to by
96.Fa optval ,
97and modified on return to indicate the actual size of
98the value returned.
99If no option value is
100to be supplied or returned,
101.Fa optval
102may be NULL.
103.Pp
104The
105.Fa optname
106argument
107and any specified options are passed uninterpreted to the appropriate
108protocol module for interpretation.
109The include file
110.In sys/socket.h
111contains definitions for
112socket level options, described below.
113Options at other protocol levels vary in format and
114name; consult the appropriate entries in
115section
1164 of the manual.
117.Pp
118Most socket-level options utilize an
119.Vt int
120argument for
121.Fa optval .
122For
123.Fn setsockopt ,
124the argument should be non-zero to enable a boolean option,
125or zero if the option is to be disabled.
126.Dv SO_LINGER
127uses a
128.Vt "struct linger"
129argument, defined in
130.In sys/socket.h ,
131which specifies the desired state of the option and the
132linger interval (see below).
133.Dv SO_SNDTIMEO
134and
135.Dv SO_RCVTIMEO
136use a
137.Vt "struct timeval"
138argument, defined in
139.In sys/time.h .
140.Pp
141The following options are recognized at the socket level.
142For protocol-specific options, see protocol manual pages,
143e.g.
144.Xr ip 4
145or
146.Xr tcp 4 .
147Except as noted, each may be examined with
148.Fn getsockopt
149and set with
150.Fn setsockopt .
151.Bl -column SO_ACCEPTFILTER -offset indent
152.It Dv SO_DEBUG Ta "enables recording of debugging information"
153.It Dv SO_REUSEADDR Ta "enables local address reuse"
154.It Dv SO_REUSEPORT Ta "enables duplicate address and port bindings"
155.It Dv SO_KEEPALIVE Ta "enables keep connections alive"
156.It Dv SO_DONTROUTE Ta "enables routing bypass for outgoing messages"
157.It Dv SO_LINGER  Ta "linger on close if data present"
158.It Dv SO_BROADCAST Ta "enables permission to transmit broadcast messages"
159.It Dv SO_OOBINLINE Ta "enables reception of out-of-band data in band"
160.It Dv SO_SNDBUF Ta "set buffer size for output"
161.It Dv SO_RCVBUF Ta "set buffer size for input"
162.It Dv SO_SNDLOWAT Ta "set minimum count for output"
163.It Dv SO_RCVLOWAT Ta "set minimum count for input"
164.It Dv SO_SNDTIMEO Ta "set timeout value for output"
165.It Dv SO_RCVTIMEO Ta "set timeout value for input"
166.It Dv SO_ACCEPTFILTER Ta "set accept filter on listening socket"
167.It Dv SO_NOSIGPIPE Ta
168controls generation of
169.Dv SIGPIPE
170for the socket
171.It Dv SO_TIMESTAMP Ta "enables reception of a timestamp with datagrams"
172.It Dv SO_BINTIME Ta "enables reception of a timestamp with datagrams"
173.It Dv SO_ACCEPTCONN Ta "get listening status of the socket (get only)"
174.It Dv SO_TYPE Ta "get the type of the socket (get only)"
175.It Dv SO_PROTOCOL Ta "get the protocol number for the socket (get only)"
176.It Dv SO_PROTOTYPE Ta "SunOS alias for the Linux SO_PROTOCOL (get only)"
177.It Dv SO_ERROR Ta "get and clear error on the socket (get only)"
178.It Dv SO_SETFIB Ta "set the associated FIB (routing table) for the socket (set only)"
179.El
180.Pp
181The following options are recognized in
182.Fx :
183.Bl -column SO_LISTENINCQLEN -offset indent
184.It Dv SO_LABEL Ta "get MAC label of the socket (get only)"
185.It Dv SO_PEERLABEL Ta "get socket's peer's MAC label (get only)"
186.It Dv SO_LISTENQLIMIT Ta "get backlog limit of the socket (get only)"
187.It Dv SO_LISTENQLEN Ta "get complete queue length of the socket (get only)"
188.It Dv SO_LISTENINCQLEN Ta "get incomplete queue length of the socket (get only)"
189.It Dv SO_USER_COOKIE Ta "set the 'so_user_cookie' value for the socket (uint32_t, set only)"
190.El
191.Pp
192.Dv SO_DEBUG
193enables debugging in the underlying protocol modules.
194.Pp
195.Dv SO_REUSEADDR
196indicates that the rules used in validating addresses supplied
197in a
198.Xr bind 2
199system call should allow reuse of local addresses.
200.Pp
201.Dv SO_REUSEPORT
202allows completely duplicate bindings by multiple processes
203if they all set
204.Dv SO_REUSEPORT
205before binding the port.
206This option permits multiple instances of a program to each
207receive UDP/IP multicast or broadcast datagrams destined for the bound port.
208.Pp
209.Dv SO_KEEPALIVE
210enables the
211periodic transmission of messages on a connected socket.
212Should the
213connected party fail to respond to these messages, the connection is
214considered broken and processes using the socket are notified via a
215.Dv SIGPIPE
216signal when attempting to send data.
217.Pp
218.Dv SO_DONTROUTE
219indicates that outgoing messages should
220bypass the standard routing facilities.
221Instead, messages are directed
222to the appropriate network interface according to the network portion
223of the destination address.
224.Pp
225.Dv SO_LINGER
226controls the action taken when unsent messages
227are queued on socket and a
228.Xr close 2
229is performed.
230If the socket promises reliable delivery of data and
231.Dv SO_LINGER
232is set,
233the system will block the process on the
234.Xr close 2
235attempt until it is able to transmit the data or until it decides it
236is unable to deliver the information (a timeout period, termed the
237linger interval, is specified in seconds in the
238.Fn setsockopt
239system call when
240.Dv SO_LINGER
241is requested).
242If
243.Dv SO_LINGER
244is disabled and a
245.Xr close 2
246is issued, the system will process the close in a manner that allows
247the process to continue as quickly as possible.
248.Pp
249The option
250.Dv SO_BROADCAST
251requests permission to send broadcast datagrams
252on the socket.
253Broadcast was a privileged operation in earlier versions of the system.
254.Pp
255With protocols that support out-of-band data, the
256.Dv SO_OOBINLINE
257option
258requests that out-of-band data be placed in the normal data input queue
259as received; it will then be accessible with
260.Xr recv 2
261or
262.Xr read 2
263calls without the
264.Dv MSG_OOB
265flag.
266Some protocols always behave as if this option is set.
267.Pp
268.Dv SO_SNDBUF
269and
270.Dv SO_RCVBUF
271are options to adjust the normal
272buffer sizes allocated for output and input buffers, respectively.
273The buffer size may be increased for high-volume connections,
274or may be decreased to limit the possible backlog of incoming data.
275The system places an absolute maximum on these values, which is accessible
276through the
277.Xr sysctl 3
278MIB variable
279.Dq Li kern.ipc.maxsockbuf .
280.Pp
281.Dv SO_SNDLOWAT
282is an option to set the minimum count for output operations.
283Most output operations process all of the data supplied
284by the call, delivering data to the protocol for transmission
285and blocking as necessary for flow control.
286Nonblocking output operations will process as much data as permitted
287subject to flow control without blocking, but will process no data
288if flow control does not allow the smaller of the low water mark value
289or the entire request to be processed.
290A
291.Xr select 2
292operation testing the ability to write to a socket will return true
293only if the low water mark amount could be processed.
294The default value for
295.Dv SO_SNDLOWAT
296is set to a convenient size for network efficiency, often 1024.
297.Pp
298.Dv SO_RCVLOWAT
299is an option to set the minimum count for input operations.
300In general, receive calls will block until any (non-zero) amount of data
301is received, then return with the smaller of the amount available or the amount
302requested.
303The default value for
304.Dv SO_RCVLOWAT
305is 1.
306If
307.Dv SO_RCVLOWAT
308is set to a larger value, blocking receive calls normally
309wait until they have received the smaller of the low water mark value
310or the requested amount.
311Receive calls may still return less than the low water mark if an error
312occurs, a signal is caught, or the type of data next in the receive queue
313is different from that which was returned.
314.Pp
315.Dv SO_SNDTIMEO
316is an option to set a timeout value for output operations.
317It accepts a
318.Vt "struct timeval"
319argument with the number of seconds and microseconds
320used to limit waits for output operations to complete.
321If a send operation has blocked for this much time,
322it returns with a partial count
323or with the error
324.Er EWOULDBLOCK
325if no data were sent.
326In the current implementation, this timer is restarted each time additional
327data are delivered to the protocol,
328implying that the limit applies to output portions ranging in size
329from the low water mark to the high water mark for output.
330.Pp
331.Dv SO_RCVTIMEO
332is an option to set a timeout value for input operations.
333It accepts a
334.Vt "struct timeval"
335argument with the number of seconds and microseconds
336used to limit waits for input operations to complete.
337In the current implementation, this timer is restarted each time additional
338data are received by the protocol,
339and thus the limit is in effect an inactivity timer.
340If a receive operation has been blocked for this much time without
341receiving additional data, it returns with a short count
342or with the error
343.Er EWOULDBLOCK
344if no data were received.
345.Pp
346.Dv SO_SETFIB
347can be used to over-ride the default FIB (routing table) for the given socket.
348The value must be from 0 to one less than the number returned from
349the sysctl
350.Em net.fibs .
351.Pp
352.Dv SO_USER_COOKIE
353can be used to set the uint32_t so_user_cookie field in the socket.
354The value is an uint32_t, and can be used in the kernel code that
355manipulates traffic related to the socket.
356The default value for the field is 0.
357As an example, the value can be used as the skipto target or
358pipe number in
359.Nm ipfw/dummynet .
360.Pp
361.Dv SO_ACCEPTFILTER
362places an
363.Xr accept_filter 9
364on the socket,
365which will filter incoming connections
366on a listening stream socket before being presented for
367.Xr accept 2 .
368Once more,
369.Xr listen 2
370must be called on the socket before
371trying to install the filter on it,
372or else the
373.Fn setsockopt
374system call will fail.
375.Bd -literal
376struct  accept_filter_arg {
377        char    af_name[16];
378        char    af_arg[256-16];
379};
380.Ed
381.Pp
382The
383.Fa optval
384argument
385should point to a
386.Fa struct accept_filter_arg
387that will select and configure the
388.Xr accept_filter 9 .
389The
390.Fa af_name
391argument
392should be filled with the name of the accept filter
393that the application wishes to place on the listening socket.
394The optional argument
395.Fa af_arg
396can be passed to the accept
397filter specified by
398.Fa af_name
399to provide additional configuration options at attach time.
400Passing in an
401.Fa optval
402of NULL will remove the filter.
403.Pp
404The
405.Dv SO_NOSIGPIPE
406option controls generation of the
407.Dv SIGPIPE
408signal normally sent
409when writing to a connected socket where the other end has been
410closed returns with the error
411.Er EPIPE .
412.Pp
413If the
414.Dv SO_TIMESTAMP
415or
416.Dv SO_BINTIME
417option is enabled on a
418.Dv SOCK_DGRAM
419socket, the
420.Xr recvmsg 2
421call will return a timestamp corresponding to when the datagram was received.
422The
423.Va msg_control
424field in the
425.Vt msghdr
426structure points to a buffer that contains a
427.Vt cmsghdr
428structure followed by a
429.Vt "struct timeval"
430for
431.Dv SO_TIMESTAMP
432and
433.Vt "struct bintime"
434for
435.Dv SO_BINTIME .
436The
437.Vt cmsghdr
438fields have the following values for TIMESTAMP:
439.Bd -literal
440     cmsg_len = sizeof(struct timeval);
441     cmsg_level = SOL_SOCKET;
442     cmsg_type = SCM_TIMESTAMP;
443.Ed
444.Pp
445and for
446.Dv SO_BINTIME :
447.Bd -literal
448     cmsg_len = sizeof(struct bintime);
449     cmsg_level = SOL_SOCKET;
450     cmsg_type = SCM_BINTIME;
451.Ed
452.Pp
453.Dv SO_ACCEPTCONN ,
454.Dv SO_TYPE ,
455.Dv SO_PROTOCOL
456(and its alias
457.Dv SO_PROTOTYPE )
458and
459.Dv SO_ERROR
460are options used only with
461.Fn getsockopt .
462.Dv SO_ACCEPTCONN
463returns whether the socket is currently accepting connections,
464that is, whether or not the
465.Xr listen 2
466system call was invoked on the socket.
467.Dv SO_TYPE
468returns the type of the socket, such as
469.Dv SOCK_STREAM ;
470it is useful for servers that inherit sockets on startup.
471.Dv SO_PROTOCOL
472returns the protocol number for the socket, for
473.Dv AF_INET
474and
475.Dv AF_INET6
476address families.
477.Dv SO_ERROR
478returns any pending error on the socket and clears
479the error status.
480It may be used to check for asynchronous errors on connected
481datagram sockets or for other asynchronous errors.
482.Pp
483Finally,
484.Dv SO_LABEL
485returns the MAC label of the socket.
486.Dv SO_PEERLABEL
487returns the MAC label of the socket's peer.
488Note that your kernel must be compiled with MAC support.
489See
490.Xr mac 3
491for more information.
492.Dv SO_LISTENQLIMIT
493returns the maximal number of queued connections, as set by
494.Xr listen 2 .
495.Dv SO_LISTENQLEN
496returns the number of unaccepted complete connections.
497.Dv SO_LISTENINCQLEN
498returns the number of unaccepted incomplete connections.
499.Sh RETURN VALUES
500.Rv -std
501.Sh ERRORS
502The call succeeds unless:
503.Bl -tag -width Er
504.It Bq Er EBADF
505The argument
506.Fa s
507is not a valid descriptor.
508.It Bq Er ENOTSOCK
509The argument
510.Fa s
511is a file, not a socket.
512.It Bq Er ENOPROTOOPT
513The option is unknown at the level indicated.
514.It Bq Er EFAULT
515The address pointed to by
516.Fa optval
517is not in a valid part of the process address space.
518For
519.Fn getsockopt ,
520this error may also be returned if
521.Fa optlen
522is not in a valid part of the process address space.
523.It Bq Er EINVAL
524Installing an
525.Xr accept_filter 9
526on a non-listening socket was attempted.
527.El
528.Sh SEE ALSO
529.Xr ioctl 2 ,
530.Xr listen 2 ,
531.Xr recvmsg 2 ,
532.Xr socket 2 ,
533.Xr getprotoent 3 ,
534.Xr mac 3 ,
535.Xr sysctl 3 ,
536.Xr ip 4 ,
537.Xr ip6 4 ,
538.Xr sctp 4 ,
539.Xr tcp 4 ,
540.Xr protocols 5 ,
541.Xr sysctl 8 ,
542.Xr accept_filter 9 ,
543.Xr bintime 9
544.Sh HISTORY
545The
546.Fn getsockopt
547and
548.Fn setsockopt
549system calls appeared in
550.Bx 4.2 .
551.Sh BUGS
552Several of the socket options should be handled at lower levels of the system.
553