| 1 | /* $NetBSD: socketvar.h,v 1.141 2016/09/13 07:01:08 martin Exp $ */ |
| 2 | |
| 3 | /*- |
| 4 | * Copyright (c) 2008, 2009 The NetBSD Foundation, Inc. |
| 5 | * All rights reserved. |
| 6 | * |
| 7 | * This code is derived from software contributed to The NetBSD Foundation |
| 8 | * by Andrew Doran. |
| 9 | * |
| 10 | * Redistribution and use in source and binary forms, with or without |
| 11 | * modification, are permitted provided that the following conditions |
| 12 | * are met: |
| 13 | * 1. Redistributions of source code must retain the above copyright |
| 14 | * notice, this list of conditions and the following disclaimer. |
| 15 | * 2. Redistributions in binary form must reproduce the above copyright |
| 16 | * notice, this list of conditions and the following disclaimer in the |
| 17 | * documentation and/or other materials provided with the distribution. |
| 18 | * |
| 19 | * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS |
| 20 | * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED |
| 21 | * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| 22 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS |
| 23 | * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| 24 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| 25 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| 26 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| 27 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 28 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
| 29 | * POSSIBILITY OF SUCH DAMAGE. |
| 30 | */ |
| 31 | |
| 32 | /*- |
| 33 | * Copyright (c) 1982, 1986, 1990, 1993 |
| 34 | * The Regents of the University of California. All rights reserved. |
| 35 | * |
| 36 | * Redistribution and use in source and binary forms, with or without |
| 37 | * modification, are permitted provided that the following conditions |
| 38 | * are met: |
| 39 | * 1. Redistributions of source code must retain the above copyright |
| 40 | * notice, this list of conditions and the following disclaimer. |
| 41 | * 2. Redistributions in binary form must reproduce the above copyright |
| 42 | * notice, this list of conditions and the following disclaimer in the |
| 43 | * documentation and/or other materials provided with the distribution. |
| 44 | * 3. Neither the name of the University nor the names of its contributors |
| 45 | * may be used to endorse or promote products derived from this software |
| 46 | * without specific prior written permission. |
| 47 | * |
| 48 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
| 49 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 50 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 51 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
| 52 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 53 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 54 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 55 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 56 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 57 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 58 | * SUCH DAMAGE. |
| 59 | * |
| 60 | * @(#)socketvar.h 8.3 (Berkeley) 2/19/95 |
| 61 | */ |
| 62 | |
| 63 | #ifndef _SYS_SOCKETVAR_H_ |
| 64 | #define _SYS_SOCKETVAR_H_ |
| 65 | |
| 66 | #include <sys/select.h> |
| 67 | #include <sys/selinfo.h> /* for struct selinfo */ |
| 68 | #include <sys/queue.h> |
| 69 | #include <sys/mutex.h> |
| 70 | #include <sys/condvar.h> |
| 71 | |
| 72 | #if !defined(_KERNEL) |
| 73 | struct uio; |
| 74 | struct lwp; |
| 75 | struct uidinfo; |
| 76 | #else |
| 77 | #include <sys/uidinfo.h> |
| 78 | #endif |
| 79 | |
| 80 | TAILQ_HEAD(soqhead, socket); |
| 81 | |
| 82 | /* |
| 83 | * Variables for socket buffering. |
| 84 | */ |
| 85 | struct sockbuf { |
| 86 | struct selinfo sb_sel; /* process selecting read/write */ |
| 87 | struct mowner *sb_mowner; /* who owns data for this sockbuf */ |
| 88 | struct socket *sb_so; /* back pointer to socket */ |
| 89 | kcondvar_t sb_cv; /* notifier */ |
| 90 | /* When re-zeroing this struct, we zero from sb_startzero to the end */ |
| 91 | #define sb_startzero sb_cc |
| 92 | u_long sb_cc; /* actual chars in buffer */ |
| 93 | u_long sb_hiwat; /* max actual char count */ |
| 94 | u_long sb_mbcnt; /* chars of mbufs used */ |
| 95 | u_long sb_mbmax; /* max chars of mbufs to use */ |
| 96 | long sb_lowat; /* low water mark */ |
| 97 | struct mbuf *sb_mb; /* the mbuf chain */ |
| 98 | struct mbuf *sb_mbtail; /* the last mbuf in the chain */ |
| 99 | struct mbuf *sb_lastrecord; /* first mbuf of last record in |
| 100 | socket buffer */ |
| 101 | int sb_flags; /* flags, see below */ |
| 102 | int sb_timeo; /* timeout for read/write */ |
| 103 | u_long sb_overflowed; /* # of drops due to full buffer */ |
| 104 | }; |
| 105 | |
| 106 | #ifndef SB_MAX |
| 107 | #define SB_MAX (256*1024) /* default for max chars in sockbuf */ |
| 108 | #endif |
| 109 | |
| 110 | #define SB_LOCK 0x01 /* lock on data queue */ |
| 111 | #define SB_NOTIFY 0x04 /* someone is waiting for data/space */ |
| 112 | #define SB_ASYNC 0x10 /* ASYNC I/O, need signals */ |
| 113 | #define SB_UPCALL 0x20 /* someone wants an upcall */ |
| 114 | #define SB_NOINTR 0x40 /* operations not interruptible */ |
| 115 | #define SB_KNOTE 0x100 /* kernel note attached */ |
| 116 | #define SB_AUTOSIZE 0x800 /* automatically size socket buffer */ |
| 117 | |
| 118 | /* |
| 119 | * Kernel structure per socket. |
| 120 | * Contains send and receive buffer queues, |
| 121 | * handle on protocol and pointer to protocol |
| 122 | * private data and error information. |
| 123 | */ |
| 124 | struct so_accf { |
| 125 | struct accept_filter *so_accept_filter; |
| 126 | void *so_accept_filter_arg; /* saved filter args */ |
| 127 | char *so_accept_filter_str; /* saved user args */ |
| 128 | }; |
| 129 | |
| 130 | struct sockaddr; |
| 131 | |
| 132 | struct socket { |
| 133 | kmutex_t * volatile so_lock; /* pointer to lock on structure */ |
| 134 | kcondvar_t so_cv; /* notifier */ |
| 135 | short so_type; /* generic type, see socket.h */ |
| 136 | short so_options; /* from socket call, see socket.h */ |
| 137 | u_short so_linger; /* time to linger while closing */ |
| 138 | short so_state; /* internal state flags SS_*, below */ |
| 139 | int so_unused; /* used to be so_nbio */ |
| 140 | void *so_pcb; /* protocol control block */ |
| 141 | const struct protosw *so_proto; /* protocol handle */ |
| 142 | /* |
| 143 | * Variables for connection queueing. |
| 144 | * Socket where accepts occur is so_head in all subsidiary sockets. |
| 145 | * If so_head is 0, socket is not related to an accept. |
| 146 | * For head socket so_q0 queues partially completed connections, |
| 147 | * while so_q is a queue of connections ready to be accepted. |
| 148 | * If a connection is aborted and it has so_head set, then |
| 149 | * it has to be pulled out of either so_q0 or so_q. |
| 150 | * We allow connections to queue up based on current queue lengths |
| 151 | * and limit on number of queued connections for this socket. |
| 152 | */ |
| 153 | struct socket *so_head; /* back pointer to accept socket */ |
| 154 | struct soqhead *so_onq; /* queue (q or q0) that we're on */ |
| 155 | struct soqhead so_q0; /* queue of partial connections */ |
| 156 | struct soqhead so_q; /* queue of incoming connections */ |
| 157 | TAILQ_ENTRY(socket) so_qe; /* our queue entry (q or q0) */ |
| 158 | short so_q0len; /* partials on so_q0 */ |
| 159 | short so_qlen; /* number of connections on so_q */ |
| 160 | short so_qlimit; /* max number queued connections */ |
| 161 | short so_timeo; /* connection timeout */ |
| 162 | u_short so_error; /* error affecting connection */ |
| 163 | u_short so_aborting; /* references from soabort() */ |
| 164 | pid_t so_pgid; /* pgid for signals */ |
| 165 | u_long so_oobmark; /* chars to oob mark */ |
| 166 | struct sockbuf so_snd; /* send buffer */ |
| 167 | struct sockbuf so_rcv; /* receive buffer */ |
| 168 | |
| 169 | void *so_internal; /* Space for svr4 stream data */ |
| 170 | void (*so_upcall) (struct socket *, void *, int, int); |
| 171 | void * so_upcallarg; /* Arg for above */ |
| 172 | int (*so_send) (struct socket *, struct sockaddr *, |
| 173 | struct uio *, struct mbuf *, |
| 174 | struct mbuf *, int, struct lwp *); |
| 175 | int (*so_receive) (struct socket *, |
| 176 | struct mbuf **, |
| 177 | struct uio *, struct mbuf **, |
| 178 | struct mbuf **, int *); |
| 179 | struct mowner *so_mowner; /* who owns mbufs for this socket */ |
| 180 | struct uidinfo *so_uidinfo; /* who opened the socket */ |
| 181 | gid_t so_egid; /* creator effective gid */ |
| 182 | pid_t so_cpid; /* creator pid */ |
| 183 | struct so_accf *so_accf; |
| 184 | kauth_cred_t so_cred; /* socket credentials */ |
| 185 | }; |
| 186 | |
| 187 | /* |
| 188 | * Socket state bits. |
| 189 | */ |
| 190 | #define SS_NOFDREF 0x001 /* no file table ref any more */ |
| 191 | #define SS_ISCONNECTED 0x002 /* socket connected to a peer */ |
| 192 | #define SS_ISCONNECTING 0x004 /* in process of connecting to peer */ |
| 193 | #define SS_ISDISCONNECTING 0x008 /* in process of disconnecting */ |
| 194 | #define SS_CANTSENDMORE 0x010 /* can't send more data to peer */ |
| 195 | #define SS_CANTRCVMORE 0x020 /* can't receive more data from peer */ |
| 196 | #define SS_RCVATMARK 0x040 /* at mark on input */ |
| 197 | #define SS_ISABORTING 0x080 /* aborting fd references - close() */ |
| 198 | #define SS_RESTARTSYS 0x100 /* restart blocked system calls */ |
| 199 | #define SS_ISDISCONNECTED 0x800 /* socket disconnected from peer */ |
| 200 | |
| 201 | #define SS_ASYNC 0x100 /* async i/o notify */ |
| 202 | #define SS_MORETOCOME 0x400 /* |
| 203 | * hint from sosend to lower layer; |
| 204 | * more data coming |
| 205 | */ |
| 206 | #define SS_ISAPIPE 0x1000 /* socket is implementing a pipe */ |
| 207 | #define SS_NBIO 0x2000 /* socket is in non blocking I/O */ |
| 208 | |
| 209 | #ifdef _KERNEL |
| 210 | |
| 211 | struct accept_filter { |
| 212 | char accf_name[16]; |
| 213 | void (*accf_callback) |
| 214 | (struct socket *, void *, int, int); |
| 215 | void * (*accf_create) |
| 216 | (struct socket *, char *); |
| 217 | void (*accf_destroy) |
| 218 | (struct socket *); |
| 219 | LIST_ENTRY(accept_filter) accf_next; |
| 220 | u_int accf_refcnt; |
| 221 | }; |
| 222 | |
| 223 | struct sockopt { |
| 224 | int sopt_level; /* option level */ |
| 225 | int sopt_name; /* option name */ |
| 226 | size_t sopt_size; /* data length */ |
| 227 | void * sopt_data; /* data pointer */ |
| 228 | uint8_t sopt_buf[sizeof(int)]; /* internal storage */ |
| 229 | }; |
| 230 | |
| 231 | #define SB_EMPTY_FIXUP(sb) \ |
| 232 | do { \ |
| 233 | KASSERT(solocked((sb)->sb_so)); \ |
| 234 | if ((sb)->sb_mb == NULL) { \ |
| 235 | (sb)->sb_mbtail = NULL; \ |
| 236 | (sb)->sb_lastrecord = NULL; \ |
| 237 | } \ |
| 238 | } while (/*CONSTCOND*/0) |
| 239 | |
| 240 | extern u_long sb_max; |
| 241 | extern int somaxkva; |
| 242 | extern int sock_loan_thresh; |
| 243 | extern kmutex_t *softnet_lock; |
| 244 | |
| 245 | struct mbuf; |
| 246 | struct lwp; |
| 247 | struct msghdr; |
| 248 | struct stat; |
| 249 | struct knote; |
| 250 | |
| 251 | struct mbuf *getsombuf(struct socket *, int); |
| 252 | |
| 253 | /* |
| 254 | * File operations on sockets. |
| 255 | */ |
| 256 | int soo_read(file_t *, off_t *, struct uio *, kauth_cred_t, int); |
| 257 | int soo_write(file_t *, off_t *, struct uio *, kauth_cred_t, int); |
| 258 | int soo_fcntl(file_t *, u_int cmd, void *); |
| 259 | int soo_ioctl(file_t *, u_long cmd, void *); |
| 260 | int soo_poll(file_t *, int); |
| 261 | int soo_kqfilter(file_t *, struct knote *); |
| 262 | int soo_close(file_t *); |
| 263 | int soo_stat(file_t *, struct stat *); |
| 264 | void soo_restart(file_t *); |
| 265 | void sbappend(struct sockbuf *, struct mbuf *); |
| 266 | void sbappendstream(struct sockbuf *, struct mbuf *); |
| 267 | int sbappendaddr(struct sockbuf *, const struct sockaddr *, struct mbuf *, |
| 268 | struct mbuf *); |
| 269 | int sbappendaddrchain(struct sockbuf *, const struct sockaddr *, |
| 270 | struct mbuf *, int); |
| 271 | int sbappendcontrol(struct sockbuf *, struct mbuf *, struct mbuf *); |
| 272 | void sbappendrecord(struct sockbuf *, struct mbuf *); |
| 273 | void sbcheck(struct sockbuf *); |
| 274 | void sbcompress(struct sockbuf *, struct mbuf *, struct mbuf *); |
| 275 | struct mbuf * |
| 276 | sbcreatecontrol(void *, int, int, int); |
| 277 | struct mbuf * |
| 278 | sbcreatecontrol1(void **, int, int, int, int); |
| 279 | void sbdrop(struct sockbuf *, int); |
| 280 | void sbdroprecord(struct sockbuf *); |
| 281 | void sbflush(struct sockbuf *); |
| 282 | void sbinsertoob(struct sockbuf *, struct mbuf *); |
| 283 | void sbrelease(struct sockbuf *, struct socket *); |
| 284 | int sbreserve(struct sockbuf *, u_long, struct socket *); |
| 285 | int sbwait(struct sockbuf *); |
| 286 | int sb_max_set(u_long); |
| 287 | void soinit(void); |
| 288 | void soinit1(void); |
| 289 | void soinit2(void); |
| 290 | int soabort(struct socket *); |
| 291 | int soaccept(struct socket *, struct sockaddr *); |
| 292 | int sofamily(const struct socket *); |
| 293 | int sobind(struct socket *, struct sockaddr *, struct lwp *); |
| 294 | void socantrcvmore(struct socket *); |
| 295 | void socantsendmore(struct socket *); |
| 296 | int soclose(struct socket *); |
| 297 | int soconnect(struct socket *, struct sockaddr *, struct lwp *); |
| 298 | int soconnect2(struct socket *, struct socket *); |
| 299 | int socreate(int, struct socket **, int, int, struct lwp *, |
| 300 | struct socket *); |
| 301 | int fsocreate(int, struct socket **, int, int, int *); |
| 302 | int sodisconnect(struct socket *); |
| 303 | void sofree(struct socket *); |
| 304 | int sogetopt(struct socket *, struct sockopt *); |
| 305 | void sohasoutofband(struct socket *); |
| 306 | void soisconnected(struct socket *); |
| 307 | void soisconnecting(struct socket *); |
| 308 | void soisdisconnected(struct socket *); |
| 309 | void soisdisconnecting(struct socket *); |
| 310 | int solisten(struct socket *, int, struct lwp *); |
| 311 | struct socket * |
| 312 | sonewconn(struct socket *, bool); |
| 313 | void soqinsque(struct socket *, struct socket *, int); |
| 314 | bool soqremque(struct socket *, int); |
| 315 | int soreceive(struct socket *, struct mbuf **, struct uio *, |
| 316 | struct mbuf **, struct mbuf **, int *); |
| 317 | int soreserve(struct socket *, u_long, u_long); |
| 318 | void sorflush(struct socket *); |
| 319 | int sosend(struct socket *, struct sockaddr *, struct uio *, |
| 320 | struct mbuf *, struct mbuf *, int, struct lwp *); |
| 321 | int sosetopt(struct socket *, struct sockopt *); |
| 322 | int so_setsockopt(struct lwp *, struct socket *, int, int, const void *, size_t); |
| 323 | int soshutdown(struct socket *, int); |
| 324 | void sorestart(struct socket *); |
| 325 | void sowakeup(struct socket *, struct sockbuf *, int); |
| 326 | int sockargs(struct mbuf **, const void *, size_t, int); |
| 327 | int sopoll(struct socket *, int); |
| 328 | struct socket *soget(bool); |
| 329 | void soput(struct socket *); |
| 330 | bool solocked(struct socket *); |
| 331 | bool solocked2(struct socket *, struct socket *); |
| 332 | int sblock(struct sockbuf *, int); |
| 333 | void sbunlock(struct sockbuf *); |
| 334 | int sowait(struct socket *, bool, int); |
| 335 | void solockretry(struct socket *, kmutex_t *); |
| 336 | void sosetlock(struct socket *); |
| 337 | void solockreset(struct socket *, kmutex_t *); |
| 338 | |
| 339 | void sockopt_init(struct sockopt *, int, int, size_t); |
| 340 | void sockopt_destroy(struct sockopt *); |
| 341 | int sockopt_set(struct sockopt *, const void *, size_t); |
| 342 | int sockopt_setint(struct sockopt *, int); |
| 343 | int sockopt_get(const struct sockopt *, void *, size_t); |
| 344 | int sockopt_getint(const struct sockopt *, int *); |
| 345 | int sockopt_setmbuf(struct sockopt *, struct mbuf *); |
| 346 | struct mbuf *sockopt_getmbuf(const struct sockopt *); |
| 347 | |
| 348 | int copyout_sockname(struct sockaddr *, unsigned int *, int, struct mbuf *); |
| 349 | int copyout_msg_control(struct lwp *, struct msghdr *, struct mbuf *); |
| 350 | void free_control_mbuf(struct lwp *, struct mbuf *, struct mbuf *); |
| 351 | |
| 352 | int do_sys_getpeername(int, struct sockaddr *); |
| 353 | int do_sys_getsockname(int, struct sockaddr *); |
| 354 | int do_sys_sendmsg(struct lwp *, int, struct msghdr *, int, |
| 355 | const void *, size_t, register_t *); |
| 356 | int do_sys_recvmsg(struct lwp *, int, struct msghdr *, |
| 357 | const void *, size_t, |
| 358 | struct mbuf **, struct mbuf **, register_t *); |
| 359 | |
| 360 | int do_sys_bind(struct lwp *, int, struct sockaddr *); |
| 361 | int do_sys_connect(struct lwp *, int, struct sockaddr *); |
| 362 | int do_sys_accept(struct lwp *, int, struct sockaddr *, register_t *, |
| 363 | const sigset_t *, int, int); |
| 364 | |
| 365 | /* |
| 366 | * Inline functions for sockets and socket buffering. |
| 367 | */ |
| 368 | |
| 369 | #include <sys/protosw.h> |
| 370 | #include <sys/mbuf.h> |
| 371 | |
| 372 | /* |
| 373 | * Do we need to notify the other side when I/O is possible? |
| 374 | */ |
| 375 | static inline int |
| 376 | sb_notify(struct sockbuf *sb) |
| 377 | { |
| 378 | |
| 379 | KASSERT(solocked(sb->sb_so)); |
| 380 | |
| 381 | return sb->sb_flags & (SB_NOTIFY | SB_ASYNC | SB_UPCALL | SB_KNOTE); |
| 382 | } |
| 383 | |
| 384 | /* |
| 385 | * How much space is there in a socket buffer (so->so_snd or so->so_rcv)? |
| 386 | * This is problematical if the fields are unsigned, as the space might |
| 387 | * still be negative (cc > hiwat or mbcnt > mbmax). Should detect |
| 388 | * overflow and return 0. |
| 389 | */ |
| 390 | static inline long |
| 391 | sbspace(struct sockbuf *sb) |
| 392 | { |
| 393 | |
| 394 | KASSERT(solocked(sb->sb_so)); |
| 395 | |
| 396 | return lmin(sb->sb_hiwat - sb->sb_cc, sb->sb_mbmax - sb->sb_mbcnt); |
| 397 | } |
| 398 | |
| 399 | /* do we have to send all at once on a socket? */ |
| 400 | static inline int |
| 401 | sosendallatonce(struct socket *so) |
| 402 | { |
| 403 | |
| 404 | return so->so_proto->pr_flags & PR_ATOMIC; |
| 405 | } |
| 406 | |
| 407 | /* can we read something from so? */ |
| 408 | static inline int |
| 409 | soreadable(struct socket *so) |
| 410 | { |
| 411 | |
| 412 | KASSERT(solocked(so)); |
| 413 | |
| 414 | return so->so_rcv.sb_cc >= so->so_rcv.sb_lowat || |
| 415 | (so->so_state & SS_CANTRCVMORE) != 0 || |
| 416 | so->so_qlen != 0 || so->so_error != 0; |
| 417 | } |
| 418 | |
| 419 | /* can we write something to so? */ |
| 420 | static inline int |
| 421 | sowritable(struct socket *so) |
| 422 | { |
| 423 | |
| 424 | KASSERT(solocked(so)); |
| 425 | |
| 426 | return (sbspace(&so->so_snd) >= so->so_snd.sb_lowat && |
| 427 | ((so->so_state & SS_ISCONNECTED) != 0 || |
| 428 | (so->so_proto->pr_flags & PR_CONNREQUIRED) == 0)) || |
| 429 | (so->so_state & SS_CANTSENDMORE) != 0 || |
| 430 | so->so_error != 0; |
| 431 | } |
| 432 | |
| 433 | /* adjust counters in sb reflecting allocation of m */ |
| 434 | static inline void |
| 435 | sballoc(struct sockbuf *sb, struct mbuf *m) |
| 436 | { |
| 437 | |
| 438 | KASSERT(solocked(sb->sb_so)); |
| 439 | |
| 440 | sb->sb_cc += m->m_len; |
| 441 | sb->sb_mbcnt += MSIZE; |
| 442 | if (m->m_flags & M_EXT) |
| 443 | sb->sb_mbcnt += m->m_ext.ext_size; |
| 444 | } |
| 445 | |
| 446 | /* adjust counters in sb reflecting freeing of m */ |
| 447 | static inline void |
| 448 | sbfree(struct sockbuf *sb, struct mbuf *m) |
| 449 | { |
| 450 | |
| 451 | KASSERT(solocked(sb->sb_so)); |
| 452 | |
| 453 | sb->sb_cc -= m->m_len; |
| 454 | sb->sb_mbcnt -= MSIZE; |
| 455 | if (m->m_flags & M_EXT) |
| 456 | sb->sb_mbcnt -= m->m_ext.ext_size; |
| 457 | } |
| 458 | |
| 459 | static inline void |
| 460 | sorwakeup(struct socket *so) |
| 461 | { |
| 462 | |
| 463 | KASSERT(solocked(so)); |
| 464 | |
| 465 | if (sb_notify(&so->so_rcv)) |
| 466 | sowakeup(so, &so->so_rcv, POLL_IN); |
| 467 | } |
| 468 | |
| 469 | static inline void |
| 470 | sowwakeup(struct socket *so) |
| 471 | { |
| 472 | |
| 473 | KASSERT(solocked(so)); |
| 474 | |
| 475 | if (sb_notify(&so->so_snd)) |
| 476 | sowakeup(so, &so->so_snd, POLL_OUT); |
| 477 | } |
| 478 | |
| 479 | static inline void |
| 480 | solock(struct socket *so) |
| 481 | { |
| 482 | kmutex_t *lock; |
| 483 | |
| 484 | lock = so->so_lock; |
| 485 | mutex_enter(lock); |
| 486 | if (__predict_false(lock != so->so_lock)) |
| 487 | solockretry(so, lock); |
| 488 | } |
| 489 | |
| 490 | static inline void |
| 491 | sounlock(struct socket *so) |
| 492 | { |
| 493 | |
| 494 | mutex_exit(so->so_lock); |
| 495 | } |
| 496 | |
| 497 | #ifdef SOCKBUF_DEBUG |
| 498 | /* |
| 499 | * SBLASTRECORDCHK: check sb->sb_lastrecord is maintained correctly. |
| 500 | * SBLASTMBUFCHK: check sb->sb_mbtail is maintained correctly. |
| 501 | * |
| 502 | * => panic if the socket buffer is inconsistent. |
| 503 | * => 'where' is used for a panic message. |
| 504 | */ |
| 505 | void sblastrecordchk(struct sockbuf *, const char *); |
| 506 | #define SBLASTRECORDCHK(sb, where) sblastrecordchk((sb), (where)) |
| 507 | |
| 508 | void sblastmbufchk(struct sockbuf *, const char *); |
| 509 | #define SBLASTMBUFCHK(sb, where) sblastmbufchk((sb), (where)) |
| 510 | #define SBCHECK(sb) sbcheck(sb) |
| 511 | #else |
| 512 | #define SBLASTRECORDCHK(sb, where) /* nothing */ |
| 513 | #define SBLASTMBUFCHK(sb, where) /* nothing */ |
| 514 | #define SBCHECK(sb) /* nothing */ |
| 515 | #endif /* SOCKBUF_DEBUG */ |
| 516 | |
| 517 | /* sosend loan */ |
| 518 | vaddr_t sokvaalloc(vaddr_t, vsize_t, struct socket *); |
| 519 | void sokvafree(vaddr_t, vsize_t); |
| 520 | void soloanfree(struct mbuf *, void *, size_t, void *); |
| 521 | |
| 522 | /* |
| 523 | * Values for socket-buffer-append priority argument to sbappendaddrchain(). |
| 524 | * The following flags are reserved for future implementation: |
| 525 | * |
| 526 | * SB_PRIO_NONE: honour normal socket-buffer limits. |
| 527 | * |
| 528 | * SB_PRIO_ONESHOT_OVERFLOW: if the socket has any space, |
| 529 | * deliver the entire chain. Intended for large requests |
| 530 | * that should be delivered in their entirety, or not at all. |
| 531 | * |
| 532 | * SB_PRIO_OVERDRAFT: allow a small (2*MLEN) overflow, over and |
| 533 | * aboce normal socket limits. Intended messages indicating |
| 534 | * buffer overflow in earlier normal/lower-priority messages . |
| 535 | * |
| 536 | * SB_PRIO_BESTEFFORT: Ignore limits entirely. Intended only for |
| 537 | * kernel-generated messages to specially-marked scokets which |
| 538 | * require "reliable" delivery, nd where the source socket/protocol |
| 539 | * message generator enforce some hard limit (but possibly well |
| 540 | * above kern.sbmax). It is entirely up to the in-kernel source to |
| 541 | * avoid complete mbuf exhaustion or DoS scenarios. |
| 542 | */ |
| 543 | #define SB_PRIO_NONE 0 |
| 544 | #define SB_PRIO_ONESHOT_OVERFLOW 1 |
| 545 | #define SB_PRIO_OVERDRAFT 2 |
| 546 | #define SB_PRIO_BESTEFFORT 3 |
| 547 | |
| 548 | /* |
| 549 | * Accept filter functions (duh). |
| 550 | */ |
| 551 | int accept_filt_getopt(struct socket *, struct sockopt *); |
| 552 | int accept_filt_setopt(struct socket *, const struct sockopt *); |
| 553 | int accept_filt_clear(struct socket *); |
| 554 | int accept_filt_add(struct accept_filter *); |
| 555 | int accept_filt_del(struct accept_filter *); |
| 556 | struct accept_filter *accept_filt_get(char *); |
| 557 | #ifdef ACCEPT_FILTER_MOD |
| 558 | #ifdef SYSCTL_DECL |
| 559 | SYSCTL_DECL(_net_inet_accf); |
| 560 | #endif |
| 561 | void accept_filter_init(void); |
| 562 | #endif |
| 563 | |
| 564 | #endif /* _KERNEL */ |
| 565 | |
| 566 | #endif /* !_SYS_SOCKETVAR_H_ */ |
| 567 | |