19454b2d8SWarner Losh /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1988, 1990, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 6df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 7df8bae1dSRodney W. Grimes * are met: 8df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 9df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 10df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 12df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 13df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 14df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 15df8bae1dSRodney W. Grimes * without specific prior written permission. 16df8bae1dSRodney W. Grimes * 17df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27df8bae1dSRodney W. Grimes * SUCH DAMAGE. 28df8bae1dSRodney W. Grimes * 29df8bae1dSRodney W. Grimes * @(#)uipc_socket2.c 8.1 (Berkeley) 6/10/93 30df8bae1dSRodney W. Grimes */ 31df8bae1dSRodney W. Grimes 32677b542eSDavid E. O'Brien #include <sys/cdefs.h> 33677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 34677b542eSDavid E. O'Brien 355b86eac4SJesper Skriver #include "opt_param.h" 36335654d7SRobert Watson 37df8bae1dSRodney W. Grimes #include <sys/param.h> 38960ed29cSSeigo Tanimura #include <sys/aio.h> /* for aio_swake proto */ 39ff5c09daSGarrett Wollman #include <sys/kernel.h> 40fb919e4dSMark Murray #include <sys/lock.h> 41df8bae1dSRodney W. Grimes #include <sys/mbuf.h> 42960ed29cSSeigo Tanimura #include <sys/mutex.h> 43fb919e4dSMark Murray #include <sys/proc.h> 44df8bae1dSRodney W. Grimes #include <sys/protosw.h> 452f9a2132SBrian Feldman #include <sys/resourcevar.h> 46960ed29cSSeigo Tanimura #include <sys/signalvar.h> 47df8bae1dSRodney W. Grimes #include <sys/socket.h> 48df8bae1dSRodney W. Grimes #include <sys/socketvar.h> 497abab911SRobert Watson #include <sys/sx.h> 50ff5c09daSGarrett Wollman #include <sys/sysctl.h> 5126f9a767SRodney W. Grimes 52f14cce87SRobert Watson /* 53f14cce87SRobert Watson * Function pointer set by the AIO routines so that the socket buffer code 54f14cce87SRobert Watson * can call back into the AIO module if it is loaded. 55f14cce87SRobert Watson */ 5621d56e9cSAlfred Perlstein void (*aio_swake)(struct socket *, struct sockbuf *); 5721d56e9cSAlfred Perlstein 58df8bae1dSRodney W. Grimes /* 59f14cce87SRobert Watson * Primitive routines for operating on socket buffers 60df8bae1dSRodney W. Grimes */ 61df8bae1dSRodney W. Grimes 6279cb7eb4SDavid Greenman u_long sb_max = SB_MAX; 6358d14daeSMohan Srinivasan u_long sb_max_adj = 64b233773bSBjoern A. Zeeb (quad_t)SB_MAX * MCLBYTES / (MSIZE + MCLBYTES); /* adjusted sb_max */ 65df8bae1dSRodney W. Grimes 664b29bc4fSGarrett Wollman static u_long sb_efficiency = 8; /* parameter for sbreserve() */ 674b29bc4fSGarrett Wollman 681d2df300SGleb Smirnoff static struct mbuf *sbcut_internal(struct sockbuf *sb, int len); 69050ac265SRobert Watson static void sbflush_internal(struct sockbuf *sb); 70eaa6dfbcSRobert Watson 71df8bae1dSRodney W. Grimes /* 728967b220SGleb Smirnoff * Adjust sockbuf state reflecting allocation of m. 738967b220SGleb Smirnoff */ 748967b220SGleb Smirnoff void 758967b220SGleb Smirnoff sballoc(struct sockbuf *sb, struct mbuf *m) 768967b220SGleb Smirnoff { 778967b220SGleb Smirnoff 788967b220SGleb Smirnoff SOCKBUF_LOCK_ASSERT(sb); 798967b220SGleb Smirnoff 808967b220SGleb Smirnoff sb->sb_cc += m->m_len; 818967b220SGleb Smirnoff 828967b220SGleb Smirnoff if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 838967b220SGleb Smirnoff sb->sb_ctl += m->m_len; 848967b220SGleb Smirnoff 858967b220SGleb Smirnoff sb->sb_mbcnt += MSIZE; 868967b220SGleb Smirnoff sb->sb_mcnt += 1; 878967b220SGleb Smirnoff 888967b220SGleb Smirnoff if (m->m_flags & M_EXT) { 898967b220SGleb Smirnoff sb->sb_mbcnt += m->m_ext.ext_size; 908967b220SGleb Smirnoff sb->sb_ccnt += 1; 918967b220SGleb Smirnoff } 928967b220SGleb Smirnoff } 938967b220SGleb Smirnoff 948967b220SGleb Smirnoff /* 958967b220SGleb Smirnoff * Adjust sockbuf state reflecting freeing of m. 968967b220SGleb Smirnoff */ 978967b220SGleb Smirnoff void 988967b220SGleb Smirnoff sbfree(struct sockbuf *sb, struct mbuf *m) 998967b220SGleb Smirnoff { 1008967b220SGleb Smirnoff 1018967b220SGleb Smirnoff #if 0 /* XXX: not yet: soclose() call path comes here w/o lock. */ 1028967b220SGleb Smirnoff SOCKBUF_LOCK_ASSERT(sb); 1038967b220SGleb Smirnoff #endif 1048967b220SGleb Smirnoff 1058967b220SGleb Smirnoff sb->sb_cc -= m->m_len; 1068967b220SGleb Smirnoff 1078967b220SGleb Smirnoff if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 1088967b220SGleb Smirnoff sb->sb_ctl -= m->m_len; 1098967b220SGleb Smirnoff 1108967b220SGleb Smirnoff sb->sb_mbcnt -= MSIZE; 1118967b220SGleb Smirnoff sb->sb_mcnt -= 1; 1128967b220SGleb Smirnoff if (m->m_flags & M_EXT) { 1138967b220SGleb Smirnoff sb->sb_mbcnt -= m->m_ext.ext_size; 1148967b220SGleb Smirnoff sb->sb_ccnt -= 1; 1158967b220SGleb Smirnoff } 1168967b220SGleb Smirnoff 1178967b220SGleb Smirnoff if (sb->sb_sndptr == m) { 1188967b220SGleb Smirnoff sb->sb_sndptr = NULL; 1198967b220SGleb Smirnoff sb->sb_sndptroff = 0; 1208967b220SGleb Smirnoff } 1218967b220SGleb Smirnoff if (sb->sb_sndptroff != 0) 1228967b220SGleb Smirnoff sb->sb_sndptroff -= m->m_len; 1238967b220SGleb Smirnoff } 1248967b220SGleb Smirnoff 1258967b220SGleb Smirnoff /* 126050ac265SRobert Watson * Socantsendmore indicates that no more data will be sent on the socket; it 127050ac265SRobert Watson * would normally be applied to a socket when the user informs the system 128050ac265SRobert Watson * that no more data is to be sent, by the protocol code (in case 129050ac265SRobert Watson * PRU_SHUTDOWN). Socantrcvmore indicates that no more data will be 130050ac265SRobert Watson * received, and will normally be applied to the socket by a protocol when it 131050ac265SRobert Watson * detects that the peer will send no more data. Data queued for reading in 132050ac265SRobert Watson * the socket may yet be read. 133df8bae1dSRodney W. Grimes */ 134a34b7046SRobert Watson void 135050ac265SRobert Watson socantsendmore_locked(struct socket *so) 136a34b7046SRobert Watson { 137a34b7046SRobert Watson 138a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(&so->so_snd); 139a34b7046SRobert Watson 140a34b7046SRobert Watson so->so_snd.sb_state |= SBS_CANTSENDMORE; 141a34b7046SRobert Watson sowwakeup_locked(so); 142a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_snd), MA_NOTOWNED); 143a34b7046SRobert Watson } 144df8bae1dSRodney W. Grimes 14526f9a767SRodney W. Grimes void 146050ac265SRobert Watson socantsendmore(struct socket *so) 147df8bae1dSRodney W. Grimes { 148df8bae1dSRodney W. Grimes 149a34b7046SRobert Watson SOCKBUF_LOCK(&so->so_snd); 150a34b7046SRobert Watson socantsendmore_locked(so); 151a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_snd), MA_NOTOWNED); 152a34b7046SRobert Watson } 153a34b7046SRobert Watson 154a34b7046SRobert Watson void 155050ac265SRobert Watson socantrcvmore_locked(struct socket *so) 156a34b7046SRobert Watson { 157a34b7046SRobert Watson 158a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(&so->so_rcv); 159a34b7046SRobert Watson 160a34b7046SRobert Watson so->so_rcv.sb_state |= SBS_CANTRCVMORE; 161a34b7046SRobert Watson sorwakeup_locked(so); 162a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_rcv), MA_NOTOWNED); 163df8bae1dSRodney W. Grimes } 164df8bae1dSRodney W. Grimes 16526f9a767SRodney W. Grimes void 166050ac265SRobert Watson socantrcvmore(struct socket *so) 167df8bae1dSRodney W. Grimes { 168df8bae1dSRodney W. Grimes 169a34b7046SRobert Watson SOCKBUF_LOCK(&so->so_rcv); 170a34b7046SRobert Watson socantrcvmore_locked(so); 171a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_rcv), MA_NOTOWNED); 172df8bae1dSRodney W. Grimes } 173df8bae1dSRodney W. Grimes 174df8bae1dSRodney W. Grimes /* 175df8bae1dSRodney W. Grimes * Wait for data to arrive at/drain from a socket buffer. 176df8bae1dSRodney W. Grimes */ 17726f9a767SRodney W. Grimes int 178050ac265SRobert Watson sbwait(struct sockbuf *sb) 179df8bae1dSRodney W. Grimes { 180df8bae1dSRodney W. Grimes 18131f555a1SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 18231f555a1SRobert Watson 183df8bae1dSRodney W. Grimes sb->sb_flags |= SB_WAIT; 1847729cbf1SDavide Italiano return (msleep_sbt(&sb->sb_cc, &sb->sb_mtx, 18547daf5d5SBruce Evans (sb->sb_flags & SB_NOINTR) ? PSOCK : PSOCK | PCATCH, "sbwait", 1867729cbf1SDavide Italiano sb->sb_timeo, 0, 0)); 187df8bae1dSRodney W. Grimes } 188df8bae1dSRodney W. Grimes 18926f9a767SRodney W. Grimes int 1907abab911SRobert Watson sblock(struct sockbuf *sb, int flags) 191df8bae1dSRodney W. Grimes { 192df8bae1dSRodney W. Grimes 193265de5bbSRobert Watson KASSERT((flags & SBL_VALID) == flags, 194265de5bbSRobert Watson ("sblock: flags invalid (0x%x)", flags)); 195265de5bbSRobert Watson 196265de5bbSRobert Watson if (flags & SBL_WAIT) { 197265de5bbSRobert Watson if ((sb->sb_flags & SB_NOINTR) || 198265de5bbSRobert Watson (flags & SBL_NOINTR)) { 1997abab911SRobert Watson sx_xlock(&sb->sb_sx); 200df8bae1dSRodney W. Grimes return (0); 201049c3b6cSRobert Watson } 202049c3b6cSRobert Watson return (sx_xlock_sig(&sb->sb_sx)); 2037abab911SRobert Watson } else { 2047abab911SRobert Watson if (sx_try_xlock(&sb->sb_sx) == 0) 2057abab911SRobert Watson return (EWOULDBLOCK); 2067abab911SRobert Watson return (0); 2077abab911SRobert Watson } 2087abab911SRobert Watson } 2097abab911SRobert Watson 2107abab911SRobert Watson void 2117abab911SRobert Watson sbunlock(struct sockbuf *sb) 2127abab911SRobert Watson { 2137abab911SRobert Watson 2147abab911SRobert Watson sx_xunlock(&sb->sb_sx); 215df8bae1dSRodney W. Grimes } 216df8bae1dSRodney W. Grimes 217df8bae1dSRodney W. Grimes /* 218050ac265SRobert Watson * Wakeup processes waiting on a socket buffer. Do asynchronous notification 219050ac265SRobert Watson * via SIGIO if the socket has the SS_ASYNC flag set. 220a34b7046SRobert Watson * 221a34b7046SRobert Watson * Called with the socket buffer lock held; will release the lock by the end 222a34b7046SRobert Watson * of the function. This allows the caller to acquire the socket buffer lock 223a34b7046SRobert Watson * while testing for the need for various sorts of wakeup and hold it through 224a34b7046SRobert Watson * to the point where it's no longer required. We currently hold the lock 225a34b7046SRobert Watson * through calls out to other subsystems (with the exception of kqueue), and 226a34b7046SRobert Watson * then release it to avoid lock order issues. It's not clear that's 227a34b7046SRobert Watson * correct. 228df8bae1dSRodney W. Grimes */ 22926f9a767SRodney W. Grimes void 230050ac265SRobert Watson sowakeup(struct socket *so, struct sockbuf *sb) 231df8bae1dSRodney W. Grimes { 23274fb0ba7SJohn Baldwin int ret; 233d48d4b25SSeigo Tanimura 234a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 235a34b7046SRobert Watson 236512824f8SSeigo Tanimura selwakeuppri(&sb->sb_sel, PSOCK); 237ace8398dSJeff Roberson if (!SEL_WAITING(&sb->sb_sel)) 238df8bae1dSRodney W. Grimes sb->sb_flags &= ~SB_SEL; 239df8bae1dSRodney W. Grimes if (sb->sb_flags & SB_WAIT) { 240df8bae1dSRodney W. Grimes sb->sb_flags &= ~SB_WAIT; 24180208239SAlfred Perlstein wakeup(&sb->sb_cc); 242df8bae1dSRodney W. Grimes } 243ad3b9257SJohn-Mark Gurney KNOTE_LOCKED(&sb->sb_sel.si_note, 0); 24474fb0ba7SJohn Baldwin if (sb->sb_upcall != NULL) { 245eb1b1807SGleb Smirnoff ret = sb->sb_upcall(so, sb->sb_upcallarg, M_NOWAIT); 24674fb0ba7SJohn Baldwin if (ret == SU_ISCONNECTED) { 24774fb0ba7SJohn Baldwin KASSERT(sb == &so->so_rcv, 24874fb0ba7SJohn Baldwin ("SO_SND upcall returned SU_ISCONNECTED")); 24974fb0ba7SJohn Baldwin soupcall_clear(so, SO_RCV); 25074fb0ba7SJohn Baldwin } 25174fb0ba7SJohn Baldwin } else 25274fb0ba7SJohn Baldwin ret = SU_OK; 2534cc20ab1SSeigo Tanimura if (sb->sb_flags & SB_AIO) 254bfbbc4aaSJason Evans aio_swake(so, sb); 25574fb0ba7SJohn Baldwin SOCKBUF_UNLOCK(sb); 25674fb0ba7SJohn Baldwin if (ret == SU_ISCONNECTED) 25774fb0ba7SJohn Baldwin soisconnected(so); 25874fb0ba7SJohn Baldwin if ((so->so_state & SS_ASYNC) && so->so_sigio != NULL) 25974fb0ba7SJohn Baldwin pgsigio(&so->so_sigio, SIGIO, 0); 260a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(sb), MA_NOTOWNED); 261df8bae1dSRodney W. Grimes } 262df8bae1dSRodney W. Grimes 263df8bae1dSRodney W. Grimes /* 264df8bae1dSRodney W. Grimes * Socket buffer (struct sockbuf) utility routines. 265df8bae1dSRodney W. Grimes * 266050ac265SRobert Watson * Each socket contains two socket buffers: one for sending data and one for 267050ac265SRobert Watson * receiving data. Each buffer contains a queue of mbufs, information about 268050ac265SRobert Watson * the number of mbufs and amount of data in the queue, and other fields 269050ac265SRobert Watson * allowing select() statements and notification on data availability to be 270050ac265SRobert Watson * implemented. 271df8bae1dSRodney W. Grimes * 272050ac265SRobert Watson * Data stored in a socket buffer is maintained as a list of records. Each 273050ac265SRobert Watson * record is a list of mbufs chained together with the m_next field. Records 274050ac265SRobert Watson * are chained together with the m_nextpkt field. The upper level routine 275050ac265SRobert Watson * soreceive() expects the following conventions to be observed when placing 276050ac265SRobert Watson * information in the receive buffer: 277df8bae1dSRodney W. Grimes * 278050ac265SRobert Watson * 1. If the protocol requires each message be preceded by the sender's name, 279050ac265SRobert Watson * then a record containing that name must be present before any 280050ac265SRobert Watson * associated data (mbuf's must be of type MT_SONAME). 281050ac265SRobert Watson * 2. If the protocol supports the exchange of ``access rights'' (really just 282050ac265SRobert Watson * additional data associated with the message), and there are ``rights'' 283050ac265SRobert Watson * to be received, then a record containing this data should be present 284050ac265SRobert Watson * (mbuf's must be of type MT_RIGHTS). 285050ac265SRobert Watson * 3. If a name or rights record exists, then it must be followed by a data 286050ac265SRobert Watson * record, perhaps of zero length. 287df8bae1dSRodney W. Grimes * 288df8bae1dSRodney W. Grimes * Before using a new socket structure it is first necessary to reserve 289df8bae1dSRodney W. Grimes * buffer space to the socket, by calling sbreserve(). This should commit 290df8bae1dSRodney W. Grimes * some of the available buffer space in the system buffer pool for the 291050ac265SRobert Watson * socket (currently, it does nothing but enforce limits). The space should 292050ac265SRobert Watson * be released by calling sbrelease() when the socket is destroyed. 293df8bae1dSRodney W. Grimes */ 29426f9a767SRodney W. Grimes int 295050ac265SRobert Watson soreserve(struct socket *so, u_long sndcc, u_long rcvcc) 296df8bae1dSRodney W. Grimes { 297b40ce416SJulian Elischer struct thread *td = curthread; 298df8bae1dSRodney W. Grimes 2993f11a2f3SRobert Watson SOCKBUF_LOCK(&so->so_snd); 3009535efc0SRobert Watson SOCKBUF_LOCK(&so->so_rcv); 3013f11a2f3SRobert Watson if (sbreserve_locked(&so->so_snd, sndcc, so, td) == 0) 3023f11a2f3SRobert Watson goto bad; 3033f11a2f3SRobert Watson if (sbreserve_locked(&so->so_rcv, rcvcc, so, td) == 0) 3043f11a2f3SRobert Watson goto bad2; 305df8bae1dSRodney W. Grimes if (so->so_rcv.sb_lowat == 0) 306df8bae1dSRodney W. Grimes so->so_rcv.sb_lowat = 1; 307df8bae1dSRodney W. Grimes if (so->so_snd.sb_lowat == 0) 308df8bae1dSRodney W. Grimes so->so_snd.sb_lowat = MCLBYTES; 309df8bae1dSRodney W. Grimes if (so->so_snd.sb_lowat > so->so_snd.sb_hiwat) 310df8bae1dSRodney W. Grimes so->so_snd.sb_lowat = so->so_snd.sb_hiwat; 3113f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_rcv); 3129535efc0SRobert Watson SOCKBUF_UNLOCK(&so->so_snd); 313df8bae1dSRodney W. Grimes return (0); 314df8bae1dSRodney W. Grimes bad2: 3153f11a2f3SRobert Watson sbrelease_locked(&so->so_snd, so); 316df8bae1dSRodney W. Grimes bad: 3173f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_rcv); 3183f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_snd); 319df8bae1dSRodney W. Grimes return (ENOBUFS); 320df8bae1dSRodney W. Grimes } 321df8bae1dSRodney W. Grimes 32279cb7eb4SDavid Greenman static int 32379cb7eb4SDavid Greenman sysctl_handle_sb_max(SYSCTL_HANDLER_ARGS) 32479cb7eb4SDavid Greenman { 32579cb7eb4SDavid Greenman int error = 0; 32686a93d51SJohn Baldwin u_long tmp_sb_max = sb_max; 32779cb7eb4SDavid Greenman 32886a93d51SJohn Baldwin error = sysctl_handle_long(oidp, &tmp_sb_max, arg2, req); 32979cb7eb4SDavid Greenman if (error || !req->newptr) 33079cb7eb4SDavid Greenman return (error); 33186a93d51SJohn Baldwin if (tmp_sb_max < MSIZE + MCLBYTES) 33279cb7eb4SDavid Greenman return (EINVAL); 33386a93d51SJohn Baldwin sb_max = tmp_sb_max; 33479cb7eb4SDavid Greenman sb_max_adj = (u_quad_t)sb_max * MCLBYTES / (MSIZE + MCLBYTES); 33579cb7eb4SDavid Greenman return (0); 33679cb7eb4SDavid Greenman } 33779cb7eb4SDavid Greenman 338df8bae1dSRodney W. Grimes /* 339050ac265SRobert Watson * Allot mbufs to a sockbuf. Attempt to scale mbmax so that mbcnt doesn't 340050ac265SRobert Watson * become limiting if buffering efficiency is near the normal case. 341df8bae1dSRodney W. Grimes */ 34226f9a767SRodney W. Grimes int 343050ac265SRobert Watson sbreserve_locked(struct sockbuf *sb, u_long cc, struct socket *so, 344050ac265SRobert Watson struct thread *td) 345df8bae1dSRodney W. Grimes { 34691d5354aSJohn Baldwin rlim_t sbsize_limit; 347ecf72308SBrian Feldman 3483f11a2f3SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 3493f11a2f3SRobert Watson 350ecf72308SBrian Feldman /* 3517978014dSRobert Watson * When a thread is passed, we take into account the thread's socket 3527978014dSRobert Watson * buffer size limit. The caller will generally pass curthread, but 3537978014dSRobert Watson * in the TCP input path, NULL will be passed to indicate that no 3547978014dSRobert Watson * appropriate thread resource limits are available. In that case, 3557978014dSRobert Watson * we don't apply a process limit. 356ecf72308SBrian Feldman */ 35779cb7eb4SDavid Greenman if (cc > sb_max_adj) 358df8bae1dSRodney W. Grimes return (0); 35991d5354aSJohn Baldwin if (td != NULL) { 36091d5354aSJohn Baldwin PROC_LOCK(td->td_proc); 36191d5354aSJohn Baldwin sbsize_limit = lim_cur(td->td_proc, RLIMIT_SBSIZE); 36291d5354aSJohn Baldwin PROC_UNLOCK(td->td_proc); 36391d5354aSJohn Baldwin } else 36491d5354aSJohn Baldwin sbsize_limit = RLIM_INFINITY; 365f535380cSDon Lewis if (!chgsbsize(so->so_cred->cr_uidinfo, &sb->sb_hiwat, cc, 36691d5354aSJohn Baldwin sbsize_limit)) 367ecf72308SBrian Feldman return (0); 3684b29bc4fSGarrett Wollman sb->sb_mbmax = min(cc * sb_efficiency, sb_max); 369df8bae1dSRodney W. Grimes if (sb->sb_lowat > sb->sb_hiwat) 370df8bae1dSRodney W. Grimes sb->sb_lowat = sb->sb_hiwat; 371df8bae1dSRodney W. Grimes return (1); 372df8bae1dSRodney W. Grimes } 373df8bae1dSRodney W. Grimes 3743f11a2f3SRobert Watson int 375050ac265SRobert Watson sbreserve(struct sockbuf *sb, u_long cc, struct socket *so, 376050ac265SRobert Watson struct thread *td) 3773f11a2f3SRobert Watson { 3783f11a2f3SRobert Watson int error; 3793f11a2f3SRobert Watson 3803f11a2f3SRobert Watson SOCKBUF_LOCK(sb); 3813f11a2f3SRobert Watson error = sbreserve_locked(sb, cc, so, td); 3823f11a2f3SRobert Watson SOCKBUF_UNLOCK(sb); 3833f11a2f3SRobert Watson return (error); 3843f11a2f3SRobert Watson } 3853f11a2f3SRobert Watson 386df8bae1dSRodney W. Grimes /* 387df8bae1dSRodney W. Grimes * Free mbufs held by a socket, and reserved mbuf space. 388df8bae1dSRodney W. Grimes */ 3893f0bfcccSRobert Watson void 390050ac265SRobert Watson sbrelease_internal(struct sockbuf *sb, struct socket *so) 391eaa6dfbcSRobert Watson { 392eaa6dfbcSRobert Watson 393eaa6dfbcSRobert Watson sbflush_internal(sb); 394eaa6dfbcSRobert Watson (void)chgsbsize(so->so_cred->cr_uidinfo, &sb->sb_hiwat, 0, 395eaa6dfbcSRobert Watson RLIM_INFINITY); 396eaa6dfbcSRobert Watson sb->sb_mbmax = 0; 397eaa6dfbcSRobert Watson } 398eaa6dfbcSRobert Watson 39926f9a767SRodney W. Grimes void 400050ac265SRobert Watson sbrelease_locked(struct sockbuf *sb, struct socket *so) 401df8bae1dSRodney W. Grimes { 402df8bae1dSRodney W. Grimes 403a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 404a34b7046SRobert Watson 405eaa6dfbcSRobert Watson sbrelease_internal(sb, so); 406df8bae1dSRodney W. Grimes } 407df8bae1dSRodney W. Grimes 408a34b7046SRobert Watson void 409050ac265SRobert Watson sbrelease(struct sockbuf *sb, struct socket *so) 410a34b7046SRobert Watson { 411a34b7046SRobert Watson 412a34b7046SRobert Watson SOCKBUF_LOCK(sb); 413a34b7046SRobert Watson sbrelease_locked(sb, so); 414a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 415a34b7046SRobert Watson } 416eaa6dfbcSRobert Watson 417eaa6dfbcSRobert Watson void 418050ac265SRobert Watson sbdestroy(struct sockbuf *sb, struct socket *so) 419eaa6dfbcSRobert Watson { 420eaa6dfbcSRobert Watson 421eaa6dfbcSRobert Watson sbrelease_internal(sb, so); 422eaa6dfbcSRobert Watson } 423eaa6dfbcSRobert Watson 424df8bae1dSRodney W. Grimes /* 425050ac265SRobert Watson * Routines to add and remove data from an mbuf queue. 426df8bae1dSRodney W. Grimes * 427050ac265SRobert Watson * The routines sbappend() or sbappendrecord() are normally called to append 428050ac265SRobert Watson * new mbufs to a socket buffer, after checking that adequate space is 429050ac265SRobert Watson * available, comparing the function sbspace() with the amount of data to be 430050ac265SRobert Watson * added. sbappendrecord() differs from sbappend() in that data supplied is 431050ac265SRobert Watson * treated as the beginning of a new record. To place a sender's address, 432050ac265SRobert Watson * optional access rights, and data in a socket receive buffer, 433050ac265SRobert Watson * sbappendaddr() should be used. To place access rights and data in a 434050ac265SRobert Watson * socket receive buffer, sbappendrights() should be used. In either case, 435050ac265SRobert Watson * the new data begins a new record. Note that unlike sbappend() and 436050ac265SRobert Watson * sbappendrecord(), these routines check for the caller that there will be 437050ac265SRobert Watson * enough space to store the data. Each fails if there is not enough space, 438050ac265SRobert Watson * or if it cannot find mbufs to store additional information in. 439df8bae1dSRodney W. Grimes * 440050ac265SRobert Watson * Reliable protocols may use the socket send buffer to hold data awaiting 441050ac265SRobert Watson * acknowledgement. Data is normally copied from a socket send buffer in a 442050ac265SRobert Watson * protocol with m_copy for output to a peer, and then removing the data from 443050ac265SRobert Watson * the socket buffer with sbdrop() or sbdroprecord() when the data is 444050ac265SRobert Watson * acknowledged by the peer. 445df8bae1dSRodney W. Grimes */ 446395bb186SSam Leffler #ifdef SOCKBUF_DEBUG 447395bb186SSam Leffler void 448395bb186SSam Leffler sblastrecordchk(struct sockbuf *sb, const char *file, int line) 449395bb186SSam Leffler { 450395bb186SSam Leffler struct mbuf *m = sb->sb_mb; 451395bb186SSam Leffler 452a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 453a34b7046SRobert Watson 454395bb186SSam Leffler while (m && m->m_nextpkt) 455395bb186SSam Leffler m = m->m_nextpkt; 456395bb186SSam Leffler 457395bb186SSam Leffler if (m != sb->sb_lastrecord) { 458395bb186SSam Leffler printf("%s: sb_mb %p sb_lastrecord %p last %p\n", 459395bb186SSam Leffler __func__, sb->sb_mb, sb->sb_lastrecord, m); 460395bb186SSam Leffler printf("packet chain:\n"); 461395bb186SSam Leffler for (m = sb->sb_mb; m != NULL; m = m->m_nextpkt) 462395bb186SSam Leffler printf("\t%p\n", m); 463395bb186SSam Leffler panic("%s from %s:%u", __func__, file, line); 464395bb186SSam Leffler } 465395bb186SSam Leffler } 466395bb186SSam Leffler 467395bb186SSam Leffler void 468395bb186SSam Leffler sblastmbufchk(struct sockbuf *sb, const char *file, int line) 469395bb186SSam Leffler { 470395bb186SSam Leffler struct mbuf *m = sb->sb_mb; 471395bb186SSam Leffler struct mbuf *n; 472395bb186SSam Leffler 473a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 474a34b7046SRobert Watson 475395bb186SSam Leffler while (m && m->m_nextpkt) 476395bb186SSam Leffler m = m->m_nextpkt; 477395bb186SSam Leffler 478395bb186SSam Leffler while (m && m->m_next) 479395bb186SSam Leffler m = m->m_next; 480395bb186SSam Leffler 481395bb186SSam Leffler if (m != sb->sb_mbtail) { 482395bb186SSam Leffler printf("%s: sb_mb %p sb_mbtail %p last %p\n", 483395bb186SSam Leffler __func__, sb->sb_mb, sb->sb_mbtail, m); 484395bb186SSam Leffler printf("packet tree:\n"); 485395bb186SSam Leffler for (m = sb->sb_mb; m != NULL; m = m->m_nextpkt) { 486395bb186SSam Leffler printf("\t"); 487395bb186SSam Leffler for (n = m; n != NULL; n = n->m_next) 488395bb186SSam Leffler printf("%p ", n); 489395bb186SSam Leffler printf("\n"); 490395bb186SSam Leffler } 491395bb186SSam Leffler panic("%s from %s:%u", __func__, file, line); 492395bb186SSam Leffler } 493395bb186SSam Leffler } 494395bb186SSam Leffler #endif /* SOCKBUF_DEBUG */ 495395bb186SSam Leffler 496395bb186SSam Leffler #define SBLINKRECORD(sb, m0) do { \ 497a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); \ 498395bb186SSam Leffler if ((sb)->sb_lastrecord != NULL) \ 499395bb186SSam Leffler (sb)->sb_lastrecord->m_nextpkt = (m0); \ 500395bb186SSam Leffler else \ 501395bb186SSam Leffler (sb)->sb_mb = (m0); \ 502395bb186SSam Leffler (sb)->sb_lastrecord = (m0); \ 503395bb186SSam Leffler } while (/*CONSTCOND*/0) 504395bb186SSam Leffler 505df8bae1dSRodney W. Grimes /* 506050ac265SRobert Watson * Append mbuf chain m to the last record in the socket buffer sb. The 507050ac265SRobert Watson * additional space associated the mbuf chain is recorded in sb. Empty mbufs 508050ac265SRobert Watson * are discarded and mbufs are compacted where possible. 509df8bae1dSRodney W. Grimes */ 51026f9a767SRodney W. Grimes void 511050ac265SRobert Watson sbappend_locked(struct sockbuf *sb, struct mbuf *m) 512df8bae1dSRodney W. Grimes { 513050ac265SRobert Watson struct mbuf *n; 514df8bae1dSRodney W. Grimes 515a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 516a34b7046SRobert Watson 517df8bae1dSRodney W. Grimes if (m == 0) 518df8bae1dSRodney W. Grimes return; 519a34b7046SRobert Watson 520395bb186SSam Leffler SBLASTRECORDCHK(sb); 521797f2d22SPoul-Henning Kamp n = sb->sb_mb; 522797f2d22SPoul-Henning Kamp if (n) { 523df8bae1dSRodney W. Grimes while (n->m_nextpkt) 524df8bae1dSRodney W. Grimes n = n->m_nextpkt; 525df8bae1dSRodney W. Grimes do { 526df8bae1dSRodney W. Grimes if (n->m_flags & M_EOR) { 527a34b7046SRobert Watson sbappendrecord_locked(sb, m); /* XXXXXX!!!! */ 528df8bae1dSRodney W. Grimes return; 529df8bae1dSRodney W. Grimes } 530df8bae1dSRodney W. Grimes } while (n->m_next && (n = n->m_next)); 531395bb186SSam Leffler } else { 532395bb186SSam Leffler /* 533395bb186SSam Leffler * XXX Would like to simply use sb_mbtail here, but 534395bb186SSam Leffler * XXX I need to verify that I won't miss an EOR that 535395bb186SSam Leffler * XXX way. 536395bb186SSam Leffler */ 537395bb186SSam Leffler if ((n = sb->sb_lastrecord) != NULL) { 538395bb186SSam Leffler do { 539395bb186SSam Leffler if (n->m_flags & M_EOR) { 540a34b7046SRobert Watson sbappendrecord_locked(sb, m); /* XXXXXX!!!! */ 541395bb186SSam Leffler return; 542395bb186SSam Leffler } 543395bb186SSam Leffler } while (n->m_next && (n = n->m_next)); 544395bb186SSam Leffler } else { 545395bb186SSam Leffler /* 546395bb186SSam Leffler * If this is the first record in the socket buffer, 547395bb186SSam Leffler * it's also the last record. 548395bb186SSam Leffler */ 549395bb186SSam Leffler sb->sb_lastrecord = m; 550395bb186SSam Leffler } 551df8bae1dSRodney W. Grimes } 552df8bae1dSRodney W. Grimes sbcompress(sb, m, n); 553395bb186SSam Leffler SBLASTRECORDCHK(sb); 554395bb186SSam Leffler } 555395bb186SSam Leffler 556395bb186SSam Leffler /* 557050ac265SRobert Watson * Append mbuf chain m to the last record in the socket buffer sb. The 558050ac265SRobert Watson * additional space associated the mbuf chain is recorded in sb. Empty mbufs 559050ac265SRobert Watson * are discarded and mbufs are compacted where possible. 560a34b7046SRobert Watson */ 561a34b7046SRobert Watson void 562050ac265SRobert Watson sbappend(struct sockbuf *sb, struct mbuf *m) 563a34b7046SRobert Watson { 564a34b7046SRobert Watson 565a34b7046SRobert Watson SOCKBUF_LOCK(sb); 566a34b7046SRobert Watson sbappend_locked(sb, m); 567a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 568a34b7046SRobert Watson } 569a34b7046SRobert Watson 570a34b7046SRobert Watson /* 571050ac265SRobert Watson * This version of sbappend() should only be used when the caller absolutely 572050ac265SRobert Watson * knows that there will never be more than one record in the socket buffer, 573050ac265SRobert Watson * that is, a stream protocol (such as TCP). 574395bb186SSam Leffler */ 575395bb186SSam Leffler void 576a34b7046SRobert Watson sbappendstream_locked(struct sockbuf *sb, struct mbuf *m) 577395bb186SSam Leffler { 578a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 579395bb186SSam Leffler 580395bb186SSam Leffler KASSERT(m->m_nextpkt == NULL,("sbappendstream 0")); 581395bb186SSam Leffler KASSERT(sb->sb_mb == sb->sb_lastrecord,("sbappendstream 1")); 582395bb186SSam Leffler 583395bb186SSam Leffler SBLASTMBUFCHK(sb); 584395bb186SSam Leffler 585844cacd1SGleb Smirnoff /* Remove all packet headers and mbuf tags to get a pure data chain. */ 586844cacd1SGleb Smirnoff m_demote(m, 1); 587844cacd1SGleb Smirnoff 588395bb186SSam Leffler sbcompress(sb, m, sb->sb_mbtail); 589395bb186SSam Leffler 590395bb186SSam Leffler sb->sb_lastrecord = sb->sb_mb; 591395bb186SSam Leffler SBLASTRECORDCHK(sb); 592df8bae1dSRodney W. Grimes } 593df8bae1dSRodney W. Grimes 594a34b7046SRobert Watson /* 595050ac265SRobert Watson * This version of sbappend() should only be used when the caller absolutely 596050ac265SRobert Watson * knows that there will never be more than one record in the socket buffer, 597050ac265SRobert Watson * that is, a stream protocol (such as TCP). 598a34b7046SRobert Watson */ 599a34b7046SRobert Watson void 600a34b7046SRobert Watson sbappendstream(struct sockbuf *sb, struct mbuf *m) 601a34b7046SRobert Watson { 602a34b7046SRobert Watson 603a34b7046SRobert Watson SOCKBUF_LOCK(sb); 604a34b7046SRobert Watson sbappendstream_locked(sb, m); 605a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 606a34b7046SRobert Watson } 607a34b7046SRobert Watson 608df8bae1dSRodney W. Grimes #ifdef SOCKBUF_DEBUG 60926f9a767SRodney W. Grimes void 610*57f43a45SGleb Smirnoff sbcheck(struct sockbuf *sb, const char *file, int line) 611df8bae1dSRodney W. Grimes { 612*57f43a45SGleb Smirnoff struct mbuf *m, *n; 613*57f43a45SGleb Smirnoff u_long cc, mbcnt; 614df8bae1dSRodney W. Grimes 615a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 616a34b7046SRobert Watson 617*57f43a45SGleb Smirnoff cc = mbcnt = 0; 618*57f43a45SGleb Smirnoff 6190931333fSBill Fenner for (m = sb->sb_mb; m; m = n) { 6200931333fSBill Fenner n = m->m_nextpkt; 6210931333fSBill Fenner for (; m; m = m->m_next) { 622*57f43a45SGleb Smirnoff if (m->m_len == 0) { 623*57f43a45SGleb Smirnoff printf("sb %p empty mbuf %p\n", sb, m); 624*57f43a45SGleb Smirnoff goto fail; 625*57f43a45SGleb Smirnoff } 626*57f43a45SGleb Smirnoff cc += m->m_len; 627df8bae1dSRodney W. Grimes mbcnt += MSIZE; 628313861b8SJulian Elischer if (m->m_flags & M_EXT) /*XXX*/ /* pretty sure this is bogus */ 629df8bae1dSRodney W. Grimes mbcnt += m->m_ext.ext_size; 6300931333fSBill Fenner } 631df8bae1dSRodney W. Grimes } 632*57f43a45SGleb Smirnoff if (cc != sb->sb_cc || mbcnt != sb->sb_mbcnt) { 633*57f43a45SGleb Smirnoff printf("cc %ld != %u || mbcnt %ld != %u\n", cc, sb->sb_cc, 634df8bae1dSRodney W. Grimes mbcnt, sb->sb_mbcnt); 635*57f43a45SGleb Smirnoff goto fail; 636df8bae1dSRodney W. Grimes } 637*57f43a45SGleb Smirnoff return; 638*57f43a45SGleb Smirnoff fail: 639*57f43a45SGleb Smirnoff panic("%s from %s:%u", __func__, file, line); 640df8bae1dSRodney W. Grimes } 641df8bae1dSRodney W. Grimes #endif 642df8bae1dSRodney W. Grimes 643df8bae1dSRodney W. Grimes /* 644050ac265SRobert Watson * As above, except the mbuf chain begins a new record. 645df8bae1dSRodney W. Grimes */ 64626f9a767SRodney W. Grimes void 647050ac265SRobert Watson sbappendrecord_locked(struct sockbuf *sb, struct mbuf *m0) 648df8bae1dSRodney W. Grimes { 649050ac265SRobert Watson struct mbuf *m; 650df8bae1dSRodney W. Grimes 651a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 652a34b7046SRobert Watson 653df8bae1dSRodney W. Grimes if (m0 == 0) 654df8bae1dSRodney W. Grimes return; 655df8bae1dSRodney W. Grimes /* 656050ac265SRobert Watson * Put the first mbuf on the queue. Note this permits zero length 657050ac265SRobert Watson * records. 658df8bae1dSRodney W. Grimes */ 659df8bae1dSRodney W. Grimes sballoc(sb, m0); 660395bb186SSam Leffler SBLASTRECORDCHK(sb); 661395bb186SSam Leffler SBLINKRECORD(sb, m0); 662e72a94adSMaksim Yevmenkin sb->sb_mbtail = m0; 663df8bae1dSRodney W. Grimes m = m0->m_next; 664df8bae1dSRodney W. Grimes m0->m_next = 0; 665df8bae1dSRodney W. Grimes if (m && (m0->m_flags & M_EOR)) { 666df8bae1dSRodney W. Grimes m0->m_flags &= ~M_EOR; 667df8bae1dSRodney W. Grimes m->m_flags |= M_EOR; 668df8bae1dSRodney W. Grimes } 669e72a94adSMaksim Yevmenkin /* always call sbcompress() so it can do SBLASTMBUFCHK() */ 670df8bae1dSRodney W. Grimes sbcompress(sb, m, m0); 671df8bae1dSRodney W. Grimes } 672df8bae1dSRodney W. Grimes 673df8bae1dSRodney W. Grimes /* 674050ac265SRobert Watson * As above, except the mbuf chain begins a new record. 675a34b7046SRobert Watson */ 676a34b7046SRobert Watson void 677050ac265SRobert Watson sbappendrecord(struct sockbuf *sb, struct mbuf *m0) 678a34b7046SRobert Watson { 679a34b7046SRobert Watson 680a34b7046SRobert Watson SOCKBUF_LOCK(sb); 681a34b7046SRobert Watson sbappendrecord_locked(sb, m0); 682a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 683a34b7046SRobert Watson } 684a34b7046SRobert Watson 6858de34a88SAlan Somers /* Helper routine that appends data, control, and address to a sockbuf. */ 6868de34a88SAlan Somers static int 6878de34a88SAlan Somers sbappendaddr_locked_internal(struct sockbuf *sb, const struct sockaddr *asa, 6888de34a88SAlan Somers struct mbuf *m0, struct mbuf *control, struct mbuf *ctrl_last) 689df8bae1dSRodney W. Grimes { 690395bb186SSam Leffler struct mbuf *m, *n, *nlast; 691c43cad1aSScott Long #if MSIZE <= 256 692df8bae1dSRodney W. Grimes if (asa->sa_len > MLEN) 693df8bae1dSRodney W. Grimes return (0); 694c43cad1aSScott Long #endif 695c8b59ea7SGleb Smirnoff m = m_get(M_NOWAIT, MT_SONAME); 696c8b59ea7SGleb Smirnoff if (m == NULL) 697df8bae1dSRodney W. Grimes return (0); 698df8bae1dSRodney W. Grimes m->m_len = asa->sa_len; 69980208239SAlfred Perlstein bcopy(asa, mtod(m, caddr_t), asa->sa_len); 7008de34a88SAlan Somers if (ctrl_last) 7018de34a88SAlan Somers ctrl_last->m_next = m0; /* concatenate data to control */ 702df8bae1dSRodney W. Grimes else 703df8bae1dSRodney W. Grimes control = m0; 704df8bae1dSRodney W. Grimes m->m_next = control; 705395bb186SSam Leffler for (n = m; n->m_next != NULL; n = n->m_next) 706df8bae1dSRodney W. Grimes sballoc(sb, n); 707395bb186SSam Leffler sballoc(sb, n); 708395bb186SSam Leffler nlast = n; 709395bb186SSam Leffler SBLINKRECORD(sb, m); 710395bb186SSam Leffler 711395bb186SSam Leffler sb->sb_mbtail = nlast; 712395bb186SSam Leffler SBLASTMBUFCHK(sb); 713395bb186SSam Leffler 714395bb186SSam Leffler SBLASTRECORDCHK(sb); 715df8bae1dSRodney W. Grimes return (1); 716df8bae1dSRodney W. Grimes } 717df8bae1dSRodney W. Grimes 718a34b7046SRobert Watson /* 719050ac265SRobert Watson * Append address and data, and optionally, control (ancillary) data to the 720050ac265SRobert Watson * receive queue of a socket. If present, m0 must include a packet header 721050ac265SRobert Watson * with total length. Returns 0 if no space in sockbuf or insufficient 722050ac265SRobert Watson * mbufs. 723a34b7046SRobert Watson */ 72426f9a767SRodney W. Grimes int 7258de34a88SAlan Somers sbappendaddr_locked(struct sockbuf *sb, const struct sockaddr *asa, 7268de34a88SAlan Somers struct mbuf *m0, struct mbuf *control) 7278de34a88SAlan Somers { 7288de34a88SAlan Somers struct mbuf *ctrl_last; 7298de34a88SAlan Somers int space = asa->sa_len; 7308de34a88SAlan Somers 7318de34a88SAlan Somers SOCKBUF_LOCK_ASSERT(sb); 7328de34a88SAlan Somers 7338de34a88SAlan Somers if (m0 && (m0->m_flags & M_PKTHDR) == 0) 7348de34a88SAlan Somers panic("sbappendaddr_locked"); 7358de34a88SAlan Somers if (m0) 7368de34a88SAlan Somers space += m0->m_pkthdr.len; 7378de34a88SAlan Somers space += m_length(control, &ctrl_last); 7388de34a88SAlan Somers 7398de34a88SAlan Somers if (space > sbspace(sb)) 7408de34a88SAlan Somers return (0); 7418de34a88SAlan Somers return (sbappendaddr_locked_internal(sb, asa, m0, control, ctrl_last)); 7428de34a88SAlan Somers } 7438de34a88SAlan Somers 7448de34a88SAlan Somers /* 7458de34a88SAlan Somers * Append address and data, and optionally, control (ancillary) data to the 7468de34a88SAlan Somers * receive queue of a socket. If present, m0 must include a packet header 7478de34a88SAlan Somers * with total length. Returns 0 if insufficient mbufs. Does not validate space 7488de34a88SAlan Somers * on the receiving sockbuf. 7498de34a88SAlan Somers */ 7508de34a88SAlan Somers int 7518de34a88SAlan Somers sbappendaddr_nospacecheck_locked(struct sockbuf *sb, const struct sockaddr *asa, 7528de34a88SAlan Somers struct mbuf *m0, struct mbuf *control) 7538de34a88SAlan Somers { 7548de34a88SAlan Somers struct mbuf *ctrl_last; 7558de34a88SAlan Somers 7568de34a88SAlan Somers SOCKBUF_LOCK_ASSERT(sb); 7578de34a88SAlan Somers 7588de34a88SAlan Somers ctrl_last = (control == NULL) ? NULL : m_last(control); 7598de34a88SAlan Somers return (sbappendaddr_locked_internal(sb, asa, m0, control, ctrl_last)); 7608de34a88SAlan Somers } 7618de34a88SAlan Somers 7628de34a88SAlan Somers /* 7638de34a88SAlan Somers * Append address and data, and optionally, control (ancillary) data to the 7648de34a88SAlan Somers * receive queue of a socket. If present, m0 must include a packet header 7658de34a88SAlan Somers * with total length. Returns 0 if no space in sockbuf or insufficient 7668de34a88SAlan Somers * mbufs. 7678de34a88SAlan Somers */ 7688de34a88SAlan Somers int 769050ac265SRobert Watson sbappendaddr(struct sockbuf *sb, const struct sockaddr *asa, 770050ac265SRobert Watson struct mbuf *m0, struct mbuf *control) 771a34b7046SRobert Watson { 772a34b7046SRobert Watson int retval; 773a34b7046SRobert Watson 774a34b7046SRobert Watson SOCKBUF_LOCK(sb); 775a34b7046SRobert Watson retval = sbappendaddr_locked(sb, asa, m0, control); 776a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 777a34b7046SRobert Watson return (retval); 778a34b7046SRobert Watson } 779a34b7046SRobert Watson 780a34b7046SRobert Watson int 781050ac265SRobert Watson sbappendcontrol_locked(struct sockbuf *sb, struct mbuf *m0, 782050ac265SRobert Watson struct mbuf *control) 783df8bae1dSRodney W. Grimes { 784395bb186SSam Leffler struct mbuf *m, *n, *mlast; 7857ed60de8SPoul-Henning Kamp int space; 786df8bae1dSRodney W. Grimes 787a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 788a34b7046SRobert Watson 789df8bae1dSRodney W. Grimes if (control == 0) 790a34b7046SRobert Watson panic("sbappendcontrol_locked"); 7917ed60de8SPoul-Henning Kamp space = m_length(control, &n) + m_length(m0, NULL); 792a34b7046SRobert Watson 793df8bae1dSRodney W. Grimes if (space > sbspace(sb)) 794df8bae1dSRodney W. Grimes return (0); 795df8bae1dSRodney W. Grimes n->m_next = m0; /* concatenate data to control */ 796395bb186SSam Leffler 797395bb186SSam Leffler SBLASTRECORDCHK(sb); 798395bb186SSam Leffler 799395bb186SSam Leffler for (m = control; m->m_next; m = m->m_next) 800df8bae1dSRodney W. Grimes sballoc(sb, m); 801395bb186SSam Leffler sballoc(sb, m); 802395bb186SSam Leffler mlast = m; 803395bb186SSam Leffler SBLINKRECORD(sb, control); 804395bb186SSam Leffler 805395bb186SSam Leffler sb->sb_mbtail = mlast; 806395bb186SSam Leffler SBLASTMBUFCHK(sb); 807395bb186SSam Leffler 808395bb186SSam Leffler SBLASTRECORDCHK(sb); 809df8bae1dSRodney W. Grimes return (1); 810df8bae1dSRodney W. Grimes } 811df8bae1dSRodney W. Grimes 812a34b7046SRobert Watson int 813050ac265SRobert Watson sbappendcontrol(struct sockbuf *sb, struct mbuf *m0, struct mbuf *control) 814a34b7046SRobert Watson { 815a34b7046SRobert Watson int retval; 816a34b7046SRobert Watson 817a34b7046SRobert Watson SOCKBUF_LOCK(sb); 818a34b7046SRobert Watson retval = sbappendcontrol_locked(sb, m0, control); 819a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 820a34b7046SRobert Watson return (retval); 821a34b7046SRobert Watson } 822a34b7046SRobert Watson 823df8bae1dSRodney W. Grimes /* 8247da7362bSRobert Watson * Append the data in mbuf chain (m) into the socket buffer sb following mbuf 8257da7362bSRobert Watson * (n). If (n) is NULL, the buffer is presumed empty. 8267da7362bSRobert Watson * 8277da7362bSRobert Watson * When the data is compressed, mbufs in the chain may be handled in one of 8287da7362bSRobert Watson * three ways: 8297da7362bSRobert Watson * 8307da7362bSRobert Watson * (1) The mbuf may simply be dropped, if it contributes nothing (no data, no 8317da7362bSRobert Watson * record boundary, and no change in data type). 8327da7362bSRobert Watson * 8337da7362bSRobert Watson * (2) The mbuf may be coalesced -- i.e., data in the mbuf may be copied into 8347da7362bSRobert Watson * an mbuf already in the socket buffer. This can occur if an 8357da7362bSRobert Watson * appropriate mbuf exists, there is room, and no merging of data types 8367da7362bSRobert Watson * will occur. 8377da7362bSRobert Watson * 8387da7362bSRobert Watson * (3) The mbuf may be appended to the end of the existing mbuf chain. 8397da7362bSRobert Watson * 8407da7362bSRobert Watson * If any of the new mbufs is marked as M_EOR, mark the last mbuf appended as 8417da7362bSRobert Watson * end-of-record. 842df8bae1dSRodney W. Grimes */ 84326f9a767SRodney W. Grimes void 844050ac265SRobert Watson sbcompress(struct sockbuf *sb, struct mbuf *m, struct mbuf *n) 845df8bae1dSRodney W. Grimes { 846050ac265SRobert Watson int eor = 0; 847050ac265SRobert Watson struct mbuf *o; 848df8bae1dSRodney W. Grimes 849a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 850a34b7046SRobert Watson 851df8bae1dSRodney W. Grimes while (m) { 852df8bae1dSRodney W. Grimes eor |= m->m_flags & M_EOR; 853df8bae1dSRodney W. Grimes if (m->m_len == 0 && 854df8bae1dSRodney W. Grimes (eor == 0 || 855df8bae1dSRodney W. Grimes (((o = m->m_next) || (o = n)) && 856df8bae1dSRodney W. Grimes o->m_type == m->m_type))) { 857395bb186SSam Leffler if (sb->sb_lastrecord == m) 858395bb186SSam Leffler sb->sb_lastrecord = m->m_next; 859df8bae1dSRodney W. Grimes m = m_free(m); 860df8bae1dSRodney W. Grimes continue; 861df8bae1dSRodney W. Grimes } 86232af0d74SDavid Malone if (n && (n->m_flags & M_EOR) == 0 && 86332af0d74SDavid Malone M_WRITABLE(n) && 8645e0f5cfaSKip Macy ((sb->sb_flags & SB_NOCOALESCE) == 0) && 86532af0d74SDavid Malone m->m_len <= MCLBYTES / 4 && /* XXX: Don't copy too much */ 86632af0d74SDavid Malone m->m_len <= M_TRAILINGSPACE(n) && 867df8bae1dSRodney W. Grimes n->m_type == m->m_type) { 868df8bae1dSRodney W. Grimes bcopy(mtod(m, caddr_t), mtod(n, caddr_t) + n->m_len, 869df8bae1dSRodney W. Grimes (unsigned)m->m_len); 870df8bae1dSRodney W. Grimes n->m_len += m->m_len; 871df8bae1dSRodney W. Grimes sb->sb_cc += m->m_len; 87234333b16SAndre Oppermann if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 873b3f1af6bSTim J. Robbins /* XXX: Probably don't need.*/ 87404ac9b97SKelly Yancey sb->sb_ctl += m->m_len; 875df8bae1dSRodney W. Grimes m = m_free(m); 876df8bae1dSRodney W. Grimes continue; 877df8bae1dSRodney W. Grimes } 878df8bae1dSRodney W. Grimes if (n) 879df8bae1dSRodney W. Grimes n->m_next = m; 880df8bae1dSRodney W. Grimes else 881df8bae1dSRodney W. Grimes sb->sb_mb = m; 882395bb186SSam Leffler sb->sb_mbtail = m; 883df8bae1dSRodney W. Grimes sballoc(sb, m); 884df8bae1dSRodney W. Grimes n = m; 885df8bae1dSRodney W. Grimes m->m_flags &= ~M_EOR; 886df8bae1dSRodney W. Grimes m = m->m_next; 887df8bae1dSRodney W. Grimes n->m_next = 0; 888df8bae1dSRodney W. Grimes } 889df8bae1dSRodney W. Grimes if (eor) { 8907da7362bSRobert Watson KASSERT(n != NULL, ("sbcompress: eor && n == NULL")); 891df8bae1dSRodney W. Grimes n->m_flags |= eor; 892df8bae1dSRodney W. Grimes } 893395bb186SSam Leffler SBLASTMBUFCHK(sb); 894df8bae1dSRodney W. Grimes } 895df8bae1dSRodney W. Grimes 896df8bae1dSRodney W. Grimes /* 897050ac265SRobert Watson * Free all mbufs in a sockbuf. Check that all resources are reclaimed. 898df8bae1dSRodney W. Grimes */ 899eaa6dfbcSRobert Watson static void 900050ac265SRobert Watson sbflush_internal(struct sockbuf *sb) 901df8bae1dSRodney W. Grimes { 902df8bae1dSRodney W. Grimes 90323f84772SPierre Beyssac while (sb->sb_mbcnt) { 90423f84772SPierre Beyssac /* 905761a9a1fSGleb Smirnoff * Don't call sbcut(sb, 0) if the leading mbuf is non-empty: 90623f84772SPierre Beyssac * we would loop forever. Panic instead. 90723f84772SPierre Beyssac */ 90823f84772SPierre Beyssac if (!sb->sb_cc && (sb->sb_mb == NULL || sb->sb_mb->m_len)) 90923f84772SPierre Beyssac break; 9101d2df300SGleb Smirnoff m_freem(sbcut_internal(sb, (int)sb->sb_cc)); 91123f84772SPierre Beyssac } 9120931333fSBill Fenner if (sb->sb_cc || sb->sb_mb || sb->sb_mbcnt) 913050ac265SRobert Watson panic("sbflush_internal: cc %u || mb %p || mbcnt %u", 914050ac265SRobert Watson sb->sb_cc, (void *)sb->sb_mb, sb->sb_mbcnt); 915a34b7046SRobert Watson } 916a34b7046SRobert Watson 917a34b7046SRobert Watson void 918050ac265SRobert Watson sbflush_locked(struct sockbuf *sb) 919eaa6dfbcSRobert Watson { 920eaa6dfbcSRobert Watson 921eaa6dfbcSRobert Watson SOCKBUF_LOCK_ASSERT(sb); 922eaa6dfbcSRobert Watson sbflush_internal(sb); 923eaa6dfbcSRobert Watson } 924eaa6dfbcSRobert Watson 925eaa6dfbcSRobert Watson void 926050ac265SRobert Watson sbflush(struct sockbuf *sb) 927a34b7046SRobert Watson { 928a34b7046SRobert Watson 929a34b7046SRobert Watson SOCKBUF_LOCK(sb); 930a34b7046SRobert Watson sbflush_locked(sb); 931a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 932df8bae1dSRodney W. Grimes } 933df8bae1dSRodney W. Grimes 934df8bae1dSRodney W. Grimes /* 9351d2df300SGleb Smirnoff * Cut data from (the front of) a sockbuf. 936df8bae1dSRodney W. Grimes */ 9371d2df300SGleb Smirnoff static struct mbuf * 9381d2df300SGleb Smirnoff sbcut_internal(struct sockbuf *sb, int len) 939df8bae1dSRodney W. Grimes { 9401d2df300SGleb Smirnoff struct mbuf *m, *n, *next, *mfree; 941df8bae1dSRodney W. Grimes 942df8bae1dSRodney W. Grimes next = (m = sb->sb_mb) ? m->m_nextpkt : 0; 9431d2df300SGleb Smirnoff mfree = NULL; 9441d2df300SGleb Smirnoff 945df8bae1dSRodney W. Grimes while (len > 0) { 9468146bcfeSGleb Smirnoff if (m == NULL) { 9478146bcfeSGleb Smirnoff KASSERT(next, ("%s: no next, len %d", __func__, len)); 948df8bae1dSRodney W. Grimes m = next; 949df8bae1dSRodney W. Grimes next = m->m_nextpkt; 950df8bae1dSRodney W. Grimes } 951df8bae1dSRodney W. Grimes if (m->m_len > len) { 952df8bae1dSRodney W. Grimes m->m_len -= len; 953df8bae1dSRodney W. Grimes m->m_data += len; 954df8bae1dSRodney W. Grimes sb->sb_cc -= len; 9554e023759SAndre Oppermann if (sb->sb_sndptroff != 0) 9564e023759SAndre Oppermann sb->sb_sndptroff -= len; 95734333b16SAndre Oppermann if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 95804ac9b97SKelly Yancey sb->sb_ctl -= len; 959df8bae1dSRodney W. Grimes break; 960df8bae1dSRodney W. Grimes } 961df8bae1dSRodney W. Grimes len -= m->m_len; 962df8bae1dSRodney W. Grimes sbfree(sb, m); 9631d2df300SGleb Smirnoff n = m->m_next; 9641d2df300SGleb Smirnoff m->m_next = mfree; 9651d2df300SGleb Smirnoff mfree = m; 9661d2df300SGleb Smirnoff m = n; 967df8bae1dSRodney W. Grimes } 968df8bae1dSRodney W. Grimes if (m) { 969df8bae1dSRodney W. Grimes sb->sb_mb = m; 970df8bae1dSRodney W. Grimes m->m_nextpkt = next; 971df8bae1dSRodney W. Grimes } else 972df8bae1dSRodney W. Grimes sb->sb_mb = next; 973395bb186SSam Leffler /* 974050ac265SRobert Watson * First part is an inline SB_EMPTY_FIXUP(). Second part makes sure 975050ac265SRobert Watson * sb_lastrecord is up-to-date if we dropped part of the last record. 976395bb186SSam Leffler */ 977395bb186SSam Leffler m = sb->sb_mb; 978395bb186SSam Leffler if (m == NULL) { 979395bb186SSam Leffler sb->sb_mbtail = NULL; 980395bb186SSam Leffler sb->sb_lastrecord = NULL; 981395bb186SSam Leffler } else if (m->m_nextpkt == NULL) { 982395bb186SSam Leffler sb->sb_lastrecord = m; 983395bb186SSam Leffler } 9841d2df300SGleb Smirnoff 9851d2df300SGleb Smirnoff return (mfree); 986df8bae1dSRodney W. Grimes } 987df8bae1dSRodney W. Grimes 988df8bae1dSRodney W. Grimes /* 989a34b7046SRobert Watson * Drop data from (the front of) a sockbuf. 990a34b7046SRobert Watson */ 991a34b7046SRobert Watson void 992050ac265SRobert Watson sbdrop_locked(struct sockbuf *sb, int len) 993eaa6dfbcSRobert Watson { 994eaa6dfbcSRobert Watson 995eaa6dfbcSRobert Watson SOCKBUF_LOCK_ASSERT(sb); 9961d2df300SGleb Smirnoff m_freem(sbcut_internal(sb, len)); 9971d2df300SGleb Smirnoff } 998eaa6dfbcSRobert Watson 9991d2df300SGleb Smirnoff /* 10001d2df300SGleb Smirnoff * Drop data from (the front of) a sockbuf, 10011d2df300SGleb Smirnoff * and return it to caller. 10021d2df300SGleb Smirnoff */ 10031d2df300SGleb Smirnoff struct mbuf * 10041d2df300SGleb Smirnoff sbcut_locked(struct sockbuf *sb, int len) 10051d2df300SGleb Smirnoff { 10061d2df300SGleb Smirnoff 10071d2df300SGleb Smirnoff SOCKBUF_LOCK_ASSERT(sb); 10081d2df300SGleb Smirnoff return (sbcut_internal(sb, len)); 1009eaa6dfbcSRobert Watson } 1010eaa6dfbcSRobert Watson 1011eaa6dfbcSRobert Watson void 1012050ac265SRobert Watson sbdrop(struct sockbuf *sb, int len) 1013a34b7046SRobert Watson { 10141d2df300SGleb Smirnoff struct mbuf *mfree; 1015a34b7046SRobert Watson 1016a34b7046SRobert Watson SOCKBUF_LOCK(sb); 10171d2df300SGleb Smirnoff mfree = sbcut_internal(sb, len); 1018a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 10191d2df300SGleb Smirnoff 10201d2df300SGleb Smirnoff m_freem(mfree); 1021a34b7046SRobert Watson } 1022a34b7046SRobert Watson 10234e023759SAndre Oppermann /* 10244e023759SAndre Oppermann * Maintain a pointer and offset pair into the socket buffer mbuf chain to 10254e023759SAndre Oppermann * avoid traversal of the entire socket buffer for larger offsets. 10264e023759SAndre Oppermann */ 10274e023759SAndre Oppermann struct mbuf * 10284e023759SAndre Oppermann sbsndptr(struct sockbuf *sb, u_int off, u_int len, u_int *moff) 10294e023759SAndre Oppermann { 10304e023759SAndre Oppermann struct mbuf *m, *ret; 10314e023759SAndre Oppermann 10324e023759SAndre Oppermann KASSERT(sb->sb_mb != NULL, ("%s: sb_mb is NULL", __func__)); 10334e023759SAndre Oppermann KASSERT(off + len <= sb->sb_cc, ("%s: beyond sb", __func__)); 10344e023759SAndre Oppermann KASSERT(sb->sb_sndptroff <= sb->sb_cc, ("%s: sndptroff broken", __func__)); 10354e023759SAndre Oppermann 10364e023759SAndre Oppermann /* 10374e023759SAndre Oppermann * Is off below stored offset? Happens on retransmits. 10384e023759SAndre Oppermann * Just return, we can't help here. 10394e023759SAndre Oppermann */ 10404e023759SAndre Oppermann if (sb->sb_sndptroff > off) { 10414e023759SAndre Oppermann *moff = off; 10424e023759SAndre Oppermann return (sb->sb_mb); 10434e023759SAndre Oppermann } 10444e023759SAndre Oppermann 10454e023759SAndre Oppermann /* Return closest mbuf in chain for current offset. */ 10464e023759SAndre Oppermann *moff = off - sb->sb_sndptroff; 10474e023759SAndre Oppermann m = ret = sb->sb_sndptr ? sb->sb_sndptr : sb->sb_mb; 10480963c8e4SLawrence Stewart if (*moff == m->m_len) { 10490963c8e4SLawrence Stewart *moff = 0; 10500963c8e4SLawrence Stewart sb->sb_sndptroff += m->m_len; 10510963c8e4SLawrence Stewart m = ret = m->m_next; 10520963c8e4SLawrence Stewart KASSERT(ret->m_len > 0, 10530963c8e4SLawrence Stewart ("mbuf %p in sockbuf %p chain has no valid data", ret, sb)); 10540963c8e4SLawrence Stewart } 10554e023759SAndre Oppermann 10564e023759SAndre Oppermann /* Advance by len to be as close as possible for the next transmit. */ 10574e023759SAndre Oppermann for (off = off - sb->sb_sndptroff + len - 1; 10586f4745d5SBjoern A. Zeeb off > 0 && m != NULL && off >= m->m_len; 10594e023759SAndre Oppermann m = m->m_next) { 10604e023759SAndre Oppermann sb->sb_sndptroff += m->m_len; 10614e023759SAndre Oppermann off -= m->m_len; 10624e023759SAndre Oppermann } 10636f4745d5SBjoern A. Zeeb if (off > 0 && m == NULL) 10646f4745d5SBjoern A. Zeeb panic("%s: sockbuf %p and mbuf %p clashing", __func__, sb, ret); 10654e023759SAndre Oppermann sb->sb_sndptr = m; 10664e023759SAndre Oppermann 10674e023759SAndre Oppermann return (ret); 10684e023759SAndre Oppermann } 10694e023759SAndre Oppermann 1070a34b7046SRobert Watson /* 10719fd573c3SHans Petter Selasky * Return the first mbuf and the mbuf data offset for the provided 10729fd573c3SHans Petter Selasky * send offset without changing the "sb_sndptroff" field. 10739fd573c3SHans Petter Selasky */ 10749fd573c3SHans Petter Selasky struct mbuf * 10759fd573c3SHans Petter Selasky sbsndmbuf(struct sockbuf *sb, u_int off, u_int *moff) 10769fd573c3SHans Petter Selasky { 10779fd573c3SHans Petter Selasky struct mbuf *m; 10789fd573c3SHans Petter Selasky 10799fd573c3SHans Petter Selasky KASSERT(sb->sb_mb != NULL, ("%s: sb_mb is NULL", __func__)); 10809fd573c3SHans Petter Selasky 10819fd573c3SHans Petter Selasky /* 10829fd573c3SHans Petter Selasky * If the "off" is below the stored offset, which happens on 10839fd573c3SHans Petter Selasky * retransmits, just use "sb_mb": 10849fd573c3SHans Petter Selasky */ 10859fd573c3SHans Petter Selasky if (sb->sb_sndptr == NULL || sb->sb_sndptroff > off) { 10869fd573c3SHans Petter Selasky m = sb->sb_mb; 10879fd573c3SHans Petter Selasky } else { 10889fd573c3SHans Petter Selasky m = sb->sb_sndptr; 10899fd573c3SHans Petter Selasky off -= sb->sb_sndptroff; 10909fd573c3SHans Petter Selasky } 10919fd573c3SHans Petter Selasky while (off > 0 && m != NULL) { 10929fd573c3SHans Petter Selasky if (off < m->m_len) 10939fd573c3SHans Petter Selasky break; 10949fd573c3SHans Petter Selasky off -= m->m_len; 10959fd573c3SHans Petter Selasky m = m->m_next; 10969fd573c3SHans Petter Selasky } 10979fd573c3SHans Petter Selasky *moff = off; 10989fd573c3SHans Petter Selasky return (m); 10999fd573c3SHans Petter Selasky } 11009fd573c3SHans Petter Selasky 11019fd573c3SHans Petter Selasky /* 1102050ac265SRobert Watson * Drop a record off the front of a sockbuf and move the next record to the 1103050ac265SRobert Watson * front. 1104df8bae1dSRodney W. Grimes */ 110526f9a767SRodney W. Grimes void 1106050ac265SRobert Watson sbdroprecord_locked(struct sockbuf *sb) 1107df8bae1dSRodney W. Grimes { 1108050ac265SRobert Watson struct mbuf *m; 1109df8bae1dSRodney W. Grimes 1110a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 1111a34b7046SRobert Watson 1112df8bae1dSRodney W. Grimes m = sb->sb_mb; 1113df8bae1dSRodney W. Grimes if (m) { 1114df8bae1dSRodney W. Grimes sb->sb_mb = m->m_nextpkt; 1115df8bae1dSRodney W. Grimes do { 1116df8bae1dSRodney W. Grimes sbfree(sb, m); 1117ecde8f7cSMatthew Dillon m = m_free(m); 1118797f2d22SPoul-Henning Kamp } while (m); 1119df8bae1dSRodney W. Grimes } 1120395bb186SSam Leffler SB_EMPTY_FIXUP(sb); 1121df8bae1dSRodney W. Grimes } 11221e4ad9ceSGarrett Wollman 112382c23ebaSBill Fenner /* 1124050ac265SRobert Watson * Drop a record off the front of a sockbuf and move the next record to the 1125050ac265SRobert Watson * front. 1126a34b7046SRobert Watson */ 1127a34b7046SRobert Watson void 1128050ac265SRobert Watson sbdroprecord(struct sockbuf *sb) 1129a34b7046SRobert Watson { 1130a34b7046SRobert Watson 1131a34b7046SRobert Watson SOCKBUF_LOCK(sb); 1132a34b7046SRobert Watson sbdroprecord_locked(sb); 1133a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 1134a34b7046SRobert Watson } 1135a34b7046SRobert Watson 113620d9e5e8SRobert Watson /* 11378c799760SRobert Watson * Create a "control" mbuf containing the specified data with the specified 11388c799760SRobert Watson * type for presentation on a socket buffer. 113920d9e5e8SRobert Watson */ 114020d9e5e8SRobert Watson struct mbuf * 1141d19e16a7SRobert Watson sbcreatecontrol(caddr_t p, int size, int type, int level) 114220d9e5e8SRobert Watson { 1143d19e16a7SRobert Watson struct cmsghdr *cp; 114420d9e5e8SRobert Watson struct mbuf *m; 114520d9e5e8SRobert Watson 114620d9e5e8SRobert Watson if (CMSG_SPACE((u_int)size) > MCLBYTES) 114720d9e5e8SRobert Watson return ((struct mbuf *) NULL); 114820d9e5e8SRobert Watson if (CMSG_SPACE((u_int)size) > MLEN) 1149eb1b1807SGleb Smirnoff m = m_getcl(M_NOWAIT, MT_CONTROL, 0); 115020d9e5e8SRobert Watson else 1151eb1b1807SGleb Smirnoff m = m_get(M_NOWAIT, MT_CONTROL); 115220d9e5e8SRobert Watson if (m == NULL) 115320d9e5e8SRobert Watson return ((struct mbuf *) NULL); 115420d9e5e8SRobert Watson cp = mtod(m, struct cmsghdr *); 115520d9e5e8SRobert Watson m->m_len = 0; 115620d9e5e8SRobert Watson KASSERT(CMSG_SPACE((u_int)size) <= M_TRAILINGSPACE(m), 115720d9e5e8SRobert Watson ("sbcreatecontrol: short mbuf")); 11582827952eSXin LI /* 11592827952eSXin LI * Don't leave the padding between the msg header and the 11602827952eSXin LI * cmsg data and the padding after the cmsg data un-initialized. 11612827952eSXin LI */ 11622827952eSXin LI bzero(cp, CMSG_SPACE((u_int)size)); 116320d9e5e8SRobert Watson if (p != NULL) 116420d9e5e8SRobert Watson (void)memcpy(CMSG_DATA(cp), p, size); 116520d9e5e8SRobert Watson m->m_len = CMSG_SPACE(size); 116620d9e5e8SRobert Watson cp->cmsg_len = CMSG_LEN(size); 116720d9e5e8SRobert Watson cp->cmsg_level = level; 116820d9e5e8SRobert Watson cp->cmsg_type = type; 116920d9e5e8SRobert Watson return (m); 117020d9e5e8SRobert Watson } 117120d9e5e8SRobert Watson 117220d9e5e8SRobert Watson /* 11738c799760SRobert Watson * This does the same for socket buffers that sotoxsocket does for sockets: 11748c799760SRobert Watson * generate an user-format data structure describing the socket buffer. Note 11758c799760SRobert Watson * that the xsockbuf structure, since it is always embedded in a socket, does 11768c799760SRobert Watson * not include a self pointer nor a length. We make this entry point public 11778c799760SRobert Watson * in case some other mechanism needs it. 117820d9e5e8SRobert Watson */ 117920d9e5e8SRobert Watson void 118020d9e5e8SRobert Watson sbtoxsockbuf(struct sockbuf *sb, struct xsockbuf *xsb) 118120d9e5e8SRobert Watson { 1182d19e16a7SRobert Watson 118320d9e5e8SRobert Watson xsb->sb_cc = sb->sb_cc; 118420d9e5e8SRobert Watson xsb->sb_hiwat = sb->sb_hiwat; 118520d9e5e8SRobert Watson xsb->sb_mbcnt = sb->sb_mbcnt; 118649f287f8SGeorge V. Neville-Neil xsb->sb_mcnt = sb->sb_mcnt; 118749f287f8SGeorge V. Neville-Neil xsb->sb_ccnt = sb->sb_ccnt; 118820d9e5e8SRobert Watson xsb->sb_mbmax = sb->sb_mbmax; 118920d9e5e8SRobert Watson xsb->sb_lowat = sb->sb_lowat; 119020d9e5e8SRobert Watson xsb->sb_flags = sb->sb_flags; 119120d9e5e8SRobert Watson xsb->sb_timeo = sb->sb_timeo; 119220d9e5e8SRobert Watson } 119320d9e5e8SRobert Watson 1194639acc13SGarrett Wollman /* This takes the place of kern.maxsockbuf, which moved to kern.ipc. */ 1195639acc13SGarrett Wollman static int dummy; 1196639acc13SGarrett Wollman SYSCTL_INT(_kern, KERN_DUMMY, dummy, CTLFLAG_RW, &dummy, 0, ""); 11971b978d45SHartmut Brandt SYSCTL_OID(_kern_ipc, KIPC_MAXSOCKBUF, maxsockbuf, CTLTYPE_ULONG|CTLFLAG_RW, 11981b978d45SHartmut Brandt &sb_max, 0, sysctl_handle_sb_max, "LU", "Maximum socket buffer size"); 11991b978d45SHartmut Brandt SYSCTL_ULONG(_kern_ipc, KIPC_SOCKBUF_WASTE, sockbuf_waste_factor, CTLFLAG_RW, 12003eb9ab52SEitan Adler &sb_efficiency, 0, "Socket buffer size waste factor"); 1201