19454b2d8SWarner Losh /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1988, 1990, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 6df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 7df8bae1dSRodney W. Grimes * are met: 8df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 9df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 10df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 12df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 13df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 14df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 15df8bae1dSRodney W. Grimes * without specific prior written permission. 16df8bae1dSRodney W. Grimes * 17df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27df8bae1dSRodney W. Grimes * SUCH DAMAGE. 28df8bae1dSRodney W. Grimes * 29df8bae1dSRodney W. Grimes * @(#)uipc_socket2.c 8.1 (Berkeley) 6/10/93 30df8bae1dSRodney W. Grimes */ 31df8bae1dSRodney W. Grimes 32677b542eSDavid E. O'Brien #include <sys/cdefs.h> 33677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 34677b542eSDavid E. O'Brien 355b86eac4SJesper Skriver #include "opt_param.h" 36335654d7SRobert Watson 37df8bae1dSRodney W. Grimes #include <sys/param.h> 38960ed29cSSeigo Tanimura #include <sys/aio.h> /* for aio_swake proto */ 39ff5c09daSGarrett Wollman #include <sys/kernel.h> 40fb919e4dSMark Murray #include <sys/lock.h> 41df8bae1dSRodney W. Grimes #include <sys/mbuf.h> 42960ed29cSSeigo Tanimura #include <sys/mutex.h> 43fb919e4dSMark Murray #include <sys/proc.h> 44df8bae1dSRodney W. Grimes #include <sys/protosw.h> 452f9a2132SBrian Feldman #include <sys/resourcevar.h> 46960ed29cSSeigo Tanimura #include <sys/signalvar.h> 47df8bae1dSRodney W. Grimes #include <sys/socket.h> 48df8bae1dSRodney W. Grimes #include <sys/socketvar.h> 497abab911SRobert Watson #include <sys/sx.h> 50ff5c09daSGarrett Wollman #include <sys/sysctl.h> 5126f9a767SRodney W. Grimes 52f14cce87SRobert Watson /* 53f14cce87SRobert Watson * Function pointer set by the AIO routines so that the socket buffer code 54f14cce87SRobert Watson * can call back into the AIO module if it is loaded. 55f14cce87SRobert Watson */ 5621d56e9cSAlfred Perlstein void (*aio_swake)(struct socket *, struct sockbuf *); 5721d56e9cSAlfred Perlstein 58df8bae1dSRodney W. Grimes /* 59f14cce87SRobert Watson * Primitive routines for operating on socket buffers 60df8bae1dSRodney W. Grimes */ 61df8bae1dSRodney W. Grimes 6279cb7eb4SDavid Greenman u_long sb_max = SB_MAX; 6358d14daeSMohan Srinivasan u_long sb_max_adj = 64b233773bSBjoern A. Zeeb (quad_t)SB_MAX * MCLBYTES / (MSIZE + MCLBYTES); /* adjusted sb_max */ 65df8bae1dSRodney W. Grimes 664b29bc4fSGarrett Wollman static u_long sb_efficiency = 8; /* parameter for sbreserve() */ 674b29bc4fSGarrett Wollman 681d2df300SGleb Smirnoff static struct mbuf *sbcut_internal(struct sockbuf *sb, int len); 69050ac265SRobert Watson static void sbflush_internal(struct sockbuf *sb); 70eaa6dfbcSRobert Watson 71df8bae1dSRodney W. Grimes /* 72050ac265SRobert Watson * Socantsendmore indicates that no more data will be sent on the socket; it 73050ac265SRobert Watson * would normally be applied to a socket when the user informs the system 74050ac265SRobert Watson * that no more data is to be sent, by the protocol code (in case 75050ac265SRobert Watson * PRU_SHUTDOWN). Socantrcvmore indicates that no more data will be 76050ac265SRobert Watson * received, and will normally be applied to the socket by a protocol when it 77050ac265SRobert Watson * detects that the peer will send no more data. Data queued for reading in 78050ac265SRobert Watson * the socket may yet be read. 79df8bae1dSRodney W. Grimes */ 80a34b7046SRobert Watson void 81050ac265SRobert Watson socantsendmore_locked(struct socket *so) 82a34b7046SRobert Watson { 83a34b7046SRobert Watson 84a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(&so->so_snd); 85a34b7046SRobert Watson 86a34b7046SRobert Watson so->so_snd.sb_state |= SBS_CANTSENDMORE; 87a34b7046SRobert Watson sowwakeup_locked(so); 88a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_snd), MA_NOTOWNED); 89a34b7046SRobert Watson } 90df8bae1dSRodney W. Grimes 9126f9a767SRodney W. Grimes void 92050ac265SRobert Watson socantsendmore(struct socket *so) 93df8bae1dSRodney W. Grimes { 94df8bae1dSRodney W. Grimes 95a34b7046SRobert Watson SOCKBUF_LOCK(&so->so_snd); 96a34b7046SRobert Watson socantsendmore_locked(so); 97a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_snd), MA_NOTOWNED); 98a34b7046SRobert Watson } 99a34b7046SRobert Watson 100a34b7046SRobert Watson void 101050ac265SRobert Watson socantrcvmore_locked(struct socket *so) 102a34b7046SRobert Watson { 103a34b7046SRobert Watson 104a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(&so->so_rcv); 105a34b7046SRobert Watson 106a34b7046SRobert Watson so->so_rcv.sb_state |= SBS_CANTRCVMORE; 107a34b7046SRobert Watson sorwakeup_locked(so); 108a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_rcv), MA_NOTOWNED); 109df8bae1dSRodney W. Grimes } 110df8bae1dSRodney W. Grimes 11126f9a767SRodney W. Grimes void 112050ac265SRobert Watson socantrcvmore(struct socket *so) 113df8bae1dSRodney W. Grimes { 114df8bae1dSRodney W. Grimes 115a34b7046SRobert Watson SOCKBUF_LOCK(&so->so_rcv); 116a34b7046SRobert Watson socantrcvmore_locked(so); 117a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_rcv), MA_NOTOWNED); 118df8bae1dSRodney W. Grimes } 119df8bae1dSRodney W. Grimes 120df8bae1dSRodney W. Grimes /* 121df8bae1dSRodney W. Grimes * Wait for data to arrive at/drain from a socket buffer. 122df8bae1dSRodney W. Grimes */ 12326f9a767SRodney W. Grimes int 124050ac265SRobert Watson sbwait(struct sockbuf *sb) 125df8bae1dSRodney W. Grimes { 126df8bae1dSRodney W. Grimes 12731f555a1SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 12831f555a1SRobert Watson 129df8bae1dSRodney W. Grimes sb->sb_flags |= SB_WAIT; 1307729cbf1SDavide Italiano return (msleep_sbt(&sb->sb_cc, &sb->sb_mtx, 13147daf5d5SBruce Evans (sb->sb_flags & SB_NOINTR) ? PSOCK : PSOCK | PCATCH, "sbwait", 1327729cbf1SDavide Italiano sb->sb_timeo, 0, 0)); 133df8bae1dSRodney W. Grimes } 134df8bae1dSRodney W. Grimes 13526f9a767SRodney W. Grimes int 1367abab911SRobert Watson sblock(struct sockbuf *sb, int flags) 137df8bae1dSRodney W. Grimes { 138df8bae1dSRodney W. Grimes 139265de5bbSRobert Watson KASSERT((flags & SBL_VALID) == flags, 140265de5bbSRobert Watson ("sblock: flags invalid (0x%x)", flags)); 141265de5bbSRobert Watson 142265de5bbSRobert Watson if (flags & SBL_WAIT) { 143265de5bbSRobert Watson if ((sb->sb_flags & SB_NOINTR) || 144265de5bbSRobert Watson (flags & SBL_NOINTR)) { 1457abab911SRobert Watson sx_xlock(&sb->sb_sx); 146df8bae1dSRodney W. Grimes return (0); 147049c3b6cSRobert Watson } 148049c3b6cSRobert Watson return (sx_xlock_sig(&sb->sb_sx)); 1497abab911SRobert Watson } else { 1507abab911SRobert Watson if (sx_try_xlock(&sb->sb_sx) == 0) 1517abab911SRobert Watson return (EWOULDBLOCK); 1527abab911SRobert Watson return (0); 1537abab911SRobert Watson } 1547abab911SRobert Watson } 1557abab911SRobert Watson 1567abab911SRobert Watson void 1577abab911SRobert Watson sbunlock(struct sockbuf *sb) 1587abab911SRobert Watson { 1597abab911SRobert Watson 1607abab911SRobert Watson sx_xunlock(&sb->sb_sx); 161df8bae1dSRodney W. Grimes } 162df8bae1dSRodney W. Grimes 163df8bae1dSRodney W. Grimes /* 164050ac265SRobert Watson * Wakeup processes waiting on a socket buffer. Do asynchronous notification 165050ac265SRobert Watson * via SIGIO if the socket has the SS_ASYNC flag set. 166a34b7046SRobert Watson * 167a34b7046SRobert Watson * Called with the socket buffer lock held; will release the lock by the end 168a34b7046SRobert Watson * of the function. This allows the caller to acquire the socket buffer lock 169a34b7046SRobert Watson * while testing for the need for various sorts of wakeup and hold it through 170a34b7046SRobert Watson * to the point where it's no longer required. We currently hold the lock 171a34b7046SRobert Watson * through calls out to other subsystems (with the exception of kqueue), and 172a34b7046SRobert Watson * then release it to avoid lock order issues. It's not clear that's 173a34b7046SRobert Watson * correct. 174df8bae1dSRodney W. Grimes */ 17526f9a767SRodney W. Grimes void 176050ac265SRobert Watson sowakeup(struct socket *so, struct sockbuf *sb) 177df8bae1dSRodney W. Grimes { 17874fb0ba7SJohn Baldwin int ret; 179d48d4b25SSeigo Tanimura 180a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 181a34b7046SRobert Watson 182512824f8SSeigo Tanimura selwakeuppri(&sb->sb_sel, PSOCK); 183ace8398dSJeff Roberson if (!SEL_WAITING(&sb->sb_sel)) 184df8bae1dSRodney W. Grimes sb->sb_flags &= ~SB_SEL; 185df8bae1dSRodney W. Grimes if (sb->sb_flags & SB_WAIT) { 186df8bae1dSRodney W. Grimes sb->sb_flags &= ~SB_WAIT; 18780208239SAlfred Perlstein wakeup(&sb->sb_cc); 188df8bae1dSRodney W. Grimes } 189ad3b9257SJohn-Mark Gurney KNOTE_LOCKED(&sb->sb_sel.si_note, 0); 19074fb0ba7SJohn Baldwin if (sb->sb_upcall != NULL) { 191eb1b1807SGleb Smirnoff ret = sb->sb_upcall(so, sb->sb_upcallarg, M_NOWAIT); 19274fb0ba7SJohn Baldwin if (ret == SU_ISCONNECTED) { 19374fb0ba7SJohn Baldwin KASSERT(sb == &so->so_rcv, 19474fb0ba7SJohn Baldwin ("SO_SND upcall returned SU_ISCONNECTED")); 19574fb0ba7SJohn Baldwin soupcall_clear(so, SO_RCV); 19674fb0ba7SJohn Baldwin } 19774fb0ba7SJohn Baldwin } else 19874fb0ba7SJohn Baldwin ret = SU_OK; 1994cc20ab1SSeigo Tanimura if (sb->sb_flags & SB_AIO) 200bfbbc4aaSJason Evans aio_swake(so, sb); 20174fb0ba7SJohn Baldwin SOCKBUF_UNLOCK(sb); 20274fb0ba7SJohn Baldwin if (ret == SU_ISCONNECTED) 20374fb0ba7SJohn Baldwin soisconnected(so); 20474fb0ba7SJohn Baldwin if ((so->so_state & SS_ASYNC) && so->so_sigio != NULL) 20574fb0ba7SJohn Baldwin pgsigio(&so->so_sigio, SIGIO, 0); 206a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(sb), MA_NOTOWNED); 207df8bae1dSRodney W. Grimes } 208df8bae1dSRodney W. Grimes 209df8bae1dSRodney W. Grimes /* 210df8bae1dSRodney W. Grimes * Socket buffer (struct sockbuf) utility routines. 211df8bae1dSRodney W. Grimes * 212050ac265SRobert Watson * Each socket contains two socket buffers: one for sending data and one for 213050ac265SRobert Watson * receiving data. Each buffer contains a queue of mbufs, information about 214050ac265SRobert Watson * the number of mbufs and amount of data in the queue, and other fields 215050ac265SRobert Watson * allowing select() statements and notification on data availability to be 216050ac265SRobert Watson * implemented. 217df8bae1dSRodney W. Grimes * 218050ac265SRobert Watson * Data stored in a socket buffer is maintained as a list of records. Each 219050ac265SRobert Watson * record is a list of mbufs chained together with the m_next field. Records 220050ac265SRobert Watson * are chained together with the m_nextpkt field. The upper level routine 221050ac265SRobert Watson * soreceive() expects the following conventions to be observed when placing 222050ac265SRobert Watson * information in the receive buffer: 223df8bae1dSRodney W. Grimes * 224050ac265SRobert Watson * 1. If the protocol requires each message be preceded by the sender's name, 225050ac265SRobert Watson * then a record containing that name must be present before any 226050ac265SRobert Watson * associated data (mbuf's must be of type MT_SONAME). 227050ac265SRobert Watson * 2. If the protocol supports the exchange of ``access rights'' (really just 228050ac265SRobert Watson * additional data associated with the message), and there are ``rights'' 229050ac265SRobert Watson * to be received, then a record containing this data should be present 230050ac265SRobert Watson * (mbuf's must be of type MT_RIGHTS). 231050ac265SRobert Watson * 3. If a name or rights record exists, then it must be followed by a data 232050ac265SRobert Watson * record, perhaps of zero length. 233df8bae1dSRodney W. Grimes * 234df8bae1dSRodney W. Grimes * Before using a new socket structure it is first necessary to reserve 235df8bae1dSRodney W. Grimes * buffer space to the socket, by calling sbreserve(). This should commit 236df8bae1dSRodney W. Grimes * some of the available buffer space in the system buffer pool for the 237050ac265SRobert Watson * socket (currently, it does nothing but enforce limits). The space should 238050ac265SRobert Watson * be released by calling sbrelease() when the socket is destroyed. 239df8bae1dSRodney W. Grimes */ 24026f9a767SRodney W. Grimes int 241050ac265SRobert Watson soreserve(struct socket *so, u_long sndcc, u_long rcvcc) 242df8bae1dSRodney W. Grimes { 243b40ce416SJulian Elischer struct thread *td = curthread; 244df8bae1dSRodney W. Grimes 2453f11a2f3SRobert Watson SOCKBUF_LOCK(&so->so_snd); 2469535efc0SRobert Watson SOCKBUF_LOCK(&so->so_rcv); 2473f11a2f3SRobert Watson if (sbreserve_locked(&so->so_snd, sndcc, so, td) == 0) 2483f11a2f3SRobert Watson goto bad; 2493f11a2f3SRobert Watson if (sbreserve_locked(&so->so_rcv, rcvcc, so, td) == 0) 2503f11a2f3SRobert Watson goto bad2; 251df8bae1dSRodney W. Grimes if (so->so_rcv.sb_lowat == 0) 252df8bae1dSRodney W. Grimes so->so_rcv.sb_lowat = 1; 253df8bae1dSRodney W. Grimes if (so->so_snd.sb_lowat == 0) 254df8bae1dSRodney W. Grimes so->so_snd.sb_lowat = MCLBYTES; 255df8bae1dSRodney W. Grimes if (so->so_snd.sb_lowat > so->so_snd.sb_hiwat) 256df8bae1dSRodney W. Grimes so->so_snd.sb_lowat = so->so_snd.sb_hiwat; 2573f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_rcv); 2589535efc0SRobert Watson SOCKBUF_UNLOCK(&so->so_snd); 259df8bae1dSRodney W. Grimes return (0); 260df8bae1dSRodney W. Grimes bad2: 2613f11a2f3SRobert Watson sbrelease_locked(&so->so_snd, so); 262df8bae1dSRodney W. Grimes bad: 2633f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_rcv); 2643f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_snd); 265df8bae1dSRodney W. Grimes return (ENOBUFS); 266df8bae1dSRodney W. Grimes } 267df8bae1dSRodney W. Grimes 26879cb7eb4SDavid Greenman static int 26979cb7eb4SDavid Greenman sysctl_handle_sb_max(SYSCTL_HANDLER_ARGS) 27079cb7eb4SDavid Greenman { 27179cb7eb4SDavid Greenman int error = 0; 27286a93d51SJohn Baldwin u_long tmp_sb_max = sb_max; 27379cb7eb4SDavid Greenman 27486a93d51SJohn Baldwin error = sysctl_handle_long(oidp, &tmp_sb_max, arg2, req); 27579cb7eb4SDavid Greenman if (error || !req->newptr) 27679cb7eb4SDavid Greenman return (error); 27786a93d51SJohn Baldwin if (tmp_sb_max < MSIZE + MCLBYTES) 27879cb7eb4SDavid Greenman return (EINVAL); 27986a93d51SJohn Baldwin sb_max = tmp_sb_max; 28079cb7eb4SDavid Greenman sb_max_adj = (u_quad_t)sb_max * MCLBYTES / (MSIZE + MCLBYTES); 28179cb7eb4SDavid Greenman return (0); 28279cb7eb4SDavid Greenman } 28379cb7eb4SDavid Greenman 284df8bae1dSRodney W. Grimes /* 285050ac265SRobert Watson * Allot mbufs to a sockbuf. Attempt to scale mbmax so that mbcnt doesn't 286050ac265SRobert Watson * become limiting if buffering efficiency is near the normal case. 287df8bae1dSRodney W. Grimes */ 28826f9a767SRodney W. Grimes int 289050ac265SRobert Watson sbreserve_locked(struct sockbuf *sb, u_long cc, struct socket *so, 290050ac265SRobert Watson struct thread *td) 291df8bae1dSRodney W. Grimes { 29291d5354aSJohn Baldwin rlim_t sbsize_limit; 293ecf72308SBrian Feldman 2943f11a2f3SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 2953f11a2f3SRobert Watson 296ecf72308SBrian Feldman /* 2977978014dSRobert Watson * When a thread is passed, we take into account the thread's socket 2987978014dSRobert Watson * buffer size limit. The caller will generally pass curthread, but 2997978014dSRobert Watson * in the TCP input path, NULL will be passed to indicate that no 3007978014dSRobert Watson * appropriate thread resource limits are available. In that case, 3017978014dSRobert Watson * we don't apply a process limit. 302ecf72308SBrian Feldman */ 30379cb7eb4SDavid Greenman if (cc > sb_max_adj) 304df8bae1dSRodney W. Grimes return (0); 30591d5354aSJohn Baldwin if (td != NULL) { 30691d5354aSJohn Baldwin PROC_LOCK(td->td_proc); 30791d5354aSJohn Baldwin sbsize_limit = lim_cur(td->td_proc, RLIMIT_SBSIZE); 30891d5354aSJohn Baldwin PROC_UNLOCK(td->td_proc); 30991d5354aSJohn Baldwin } else 31091d5354aSJohn Baldwin sbsize_limit = RLIM_INFINITY; 311f535380cSDon Lewis if (!chgsbsize(so->so_cred->cr_uidinfo, &sb->sb_hiwat, cc, 31291d5354aSJohn Baldwin sbsize_limit)) 313ecf72308SBrian Feldman return (0); 3144b29bc4fSGarrett Wollman sb->sb_mbmax = min(cc * sb_efficiency, sb_max); 315df8bae1dSRodney W. Grimes if (sb->sb_lowat > sb->sb_hiwat) 316df8bae1dSRodney W. Grimes sb->sb_lowat = sb->sb_hiwat; 317df8bae1dSRodney W. Grimes return (1); 318df8bae1dSRodney W. Grimes } 319df8bae1dSRodney W. Grimes 3203f11a2f3SRobert Watson int 321050ac265SRobert Watson sbreserve(struct sockbuf *sb, u_long cc, struct socket *so, 322050ac265SRobert Watson struct thread *td) 3233f11a2f3SRobert Watson { 3243f11a2f3SRobert Watson int error; 3253f11a2f3SRobert Watson 3263f11a2f3SRobert Watson SOCKBUF_LOCK(sb); 3273f11a2f3SRobert Watson error = sbreserve_locked(sb, cc, so, td); 3283f11a2f3SRobert Watson SOCKBUF_UNLOCK(sb); 3293f11a2f3SRobert Watson return (error); 3303f11a2f3SRobert Watson } 3313f11a2f3SRobert Watson 332df8bae1dSRodney W. Grimes /* 333df8bae1dSRodney W. Grimes * Free mbufs held by a socket, and reserved mbuf space. 334df8bae1dSRodney W. Grimes */ 3353f0bfcccSRobert Watson void 336050ac265SRobert Watson sbrelease_internal(struct sockbuf *sb, struct socket *so) 337eaa6dfbcSRobert Watson { 338eaa6dfbcSRobert Watson 339eaa6dfbcSRobert Watson sbflush_internal(sb); 340eaa6dfbcSRobert Watson (void)chgsbsize(so->so_cred->cr_uidinfo, &sb->sb_hiwat, 0, 341eaa6dfbcSRobert Watson RLIM_INFINITY); 342eaa6dfbcSRobert Watson sb->sb_mbmax = 0; 343eaa6dfbcSRobert Watson } 344eaa6dfbcSRobert Watson 34526f9a767SRodney W. Grimes void 346050ac265SRobert Watson sbrelease_locked(struct sockbuf *sb, struct socket *so) 347df8bae1dSRodney W. Grimes { 348df8bae1dSRodney W. Grimes 349a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 350a34b7046SRobert Watson 351eaa6dfbcSRobert Watson sbrelease_internal(sb, so); 352df8bae1dSRodney W. Grimes } 353df8bae1dSRodney W. Grimes 354a34b7046SRobert Watson void 355050ac265SRobert Watson sbrelease(struct sockbuf *sb, struct socket *so) 356a34b7046SRobert Watson { 357a34b7046SRobert Watson 358a34b7046SRobert Watson SOCKBUF_LOCK(sb); 359a34b7046SRobert Watson sbrelease_locked(sb, so); 360a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 361a34b7046SRobert Watson } 362eaa6dfbcSRobert Watson 363eaa6dfbcSRobert Watson void 364050ac265SRobert Watson sbdestroy(struct sockbuf *sb, struct socket *so) 365eaa6dfbcSRobert Watson { 366eaa6dfbcSRobert Watson 367eaa6dfbcSRobert Watson sbrelease_internal(sb, so); 368eaa6dfbcSRobert Watson } 369eaa6dfbcSRobert Watson 370df8bae1dSRodney W. Grimes /* 371050ac265SRobert Watson * Routines to add and remove data from an mbuf queue. 372df8bae1dSRodney W. Grimes * 373050ac265SRobert Watson * The routines sbappend() or sbappendrecord() are normally called to append 374050ac265SRobert Watson * new mbufs to a socket buffer, after checking that adequate space is 375050ac265SRobert Watson * available, comparing the function sbspace() with the amount of data to be 376050ac265SRobert Watson * added. sbappendrecord() differs from sbappend() in that data supplied is 377050ac265SRobert Watson * treated as the beginning of a new record. To place a sender's address, 378050ac265SRobert Watson * optional access rights, and data in a socket receive buffer, 379050ac265SRobert Watson * sbappendaddr() should be used. To place access rights and data in a 380050ac265SRobert Watson * socket receive buffer, sbappendrights() should be used. In either case, 381050ac265SRobert Watson * the new data begins a new record. Note that unlike sbappend() and 382050ac265SRobert Watson * sbappendrecord(), these routines check for the caller that there will be 383050ac265SRobert Watson * enough space to store the data. Each fails if there is not enough space, 384050ac265SRobert Watson * or if it cannot find mbufs to store additional information in. 385df8bae1dSRodney W. Grimes * 386050ac265SRobert Watson * Reliable protocols may use the socket send buffer to hold data awaiting 387050ac265SRobert Watson * acknowledgement. Data is normally copied from a socket send buffer in a 388050ac265SRobert Watson * protocol with m_copy for output to a peer, and then removing the data from 389050ac265SRobert Watson * the socket buffer with sbdrop() or sbdroprecord() when the data is 390050ac265SRobert Watson * acknowledged by the peer. 391df8bae1dSRodney W. Grimes */ 392395bb186SSam Leffler #ifdef SOCKBUF_DEBUG 393395bb186SSam Leffler void 394395bb186SSam Leffler sblastrecordchk(struct sockbuf *sb, const char *file, int line) 395395bb186SSam Leffler { 396395bb186SSam Leffler struct mbuf *m = sb->sb_mb; 397395bb186SSam Leffler 398a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 399a34b7046SRobert Watson 400395bb186SSam Leffler while (m && m->m_nextpkt) 401395bb186SSam Leffler m = m->m_nextpkt; 402395bb186SSam Leffler 403395bb186SSam Leffler if (m != sb->sb_lastrecord) { 404395bb186SSam Leffler printf("%s: sb_mb %p sb_lastrecord %p last %p\n", 405395bb186SSam Leffler __func__, sb->sb_mb, sb->sb_lastrecord, m); 406395bb186SSam Leffler printf("packet chain:\n"); 407395bb186SSam Leffler for (m = sb->sb_mb; m != NULL; m = m->m_nextpkt) 408395bb186SSam Leffler printf("\t%p\n", m); 409395bb186SSam Leffler panic("%s from %s:%u", __func__, file, line); 410395bb186SSam Leffler } 411395bb186SSam Leffler } 412395bb186SSam Leffler 413395bb186SSam Leffler void 414395bb186SSam Leffler sblastmbufchk(struct sockbuf *sb, const char *file, int line) 415395bb186SSam Leffler { 416395bb186SSam Leffler struct mbuf *m = sb->sb_mb; 417395bb186SSam Leffler struct mbuf *n; 418395bb186SSam Leffler 419a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 420a34b7046SRobert Watson 421395bb186SSam Leffler while (m && m->m_nextpkt) 422395bb186SSam Leffler m = m->m_nextpkt; 423395bb186SSam Leffler 424395bb186SSam Leffler while (m && m->m_next) 425395bb186SSam Leffler m = m->m_next; 426395bb186SSam Leffler 427395bb186SSam Leffler if (m != sb->sb_mbtail) { 428395bb186SSam Leffler printf("%s: sb_mb %p sb_mbtail %p last %p\n", 429395bb186SSam Leffler __func__, sb->sb_mb, sb->sb_mbtail, m); 430395bb186SSam Leffler printf("packet tree:\n"); 431395bb186SSam Leffler for (m = sb->sb_mb; m != NULL; m = m->m_nextpkt) { 432395bb186SSam Leffler printf("\t"); 433395bb186SSam Leffler for (n = m; n != NULL; n = n->m_next) 434395bb186SSam Leffler printf("%p ", n); 435395bb186SSam Leffler printf("\n"); 436395bb186SSam Leffler } 437395bb186SSam Leffler panic("%s from %s:%u", __func__, file, line); 438395bb186SSam Leffler } 439395bb186SSam Leffler } 440395bb186SSam Leffler #endif /* SOCKBUF_DEBUG */ 441395bb186SSam Leffler 442395bb186SSam Leffler #define SBLINKRECORD(sb, m0) do { \ 443a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); \ 444395bb186SSam Leffler if ((sb)->sb_lastrecord != NULL) \ 445395bb186SSam Leffler (sb)->sb_lastrecord->m_nextpkt = (m0); \ 446395bb186SSam Leffler else \ 447395bb186SSam Leffler (sb)->sb_mb = (m0); \ 448395bb186SSam Leffler (sb)->sb_lastrecord = (m0); \ 449395bb186SSam Leffler } while (/*CONSTCOND*/0) 450395bb186SSam Leffler 451df8bae1dSRodney W. Grimes /* 452050ac265SRobert Watson * Append mbuf chain m to the last record in the socket buffer sb. The 453050ac265SRobert Watson * additional space associated the mbuf chain is recorded in sb. Empty mbufs 454050ac265SRobert Watson * are discarded and mbufs are compacted where possible. 455df8bae1dSRodney W. Grimes */ 45626f9a767SRodney W. Grimes void 457050ac265SRobert Watson sbappend_locked(struct sockbuf *sb, struct mbuf *m) 458df8bae1dSRodney W. Grimes { 459050ac265SRobert Watson struct mbuf *n; 460df8bae1dSRodney W. Grimes 461a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 462a34b7046SRobert Watson 463df8bae1dSRodney W. Grimes if (m == 0) 464df8bae1dSRodney W. Grimes return; 465a34b7046SRobert Watson 466395bb186SSam Leffler SBLASTRECORDCHK(sb); 467797f2d22SPoul-Henning Kamp n = sb->sb_mb; 468797f2d22SPoul-Henning Kamp if (n) { 469df8bae1dSRodney W. Grimes while (n->m_nextpkt) 470df8bae1dSRodney W. Grimes n = n->m_nextpkt; 471df8bae1dSRodney W. Grimes do { 472df8bae1dSRodney W. Grimes if (n->m_flags & M_EOR) { 473a34b7046SRobert Watson sbappendrecord_locked(sb, m); /* XXXXXX!!!! */ 474df8bae1dSRodney W. Grimes return; 475df8bae1dSRodney W. Grimes } 476df8bae1dSRodney W. Grimes } while (n->m_next && (n = n->m_next)); 477395bb186SSam Leffler } else { 478395bb186SSam Leffler /* 479395bb186SSam Leffler * XXX Would like to simply use sb_mbtail here, but 480395bb186SSam Leffler * XXX I need to verify that I won't miss an EOR that 481395bb186SSam Leffler * XXX way. 482395bb186SSam Leffler */ 483395bb186SSam Leffler if ((n = sb->sb_lastrecord) != NULL) { 484395bb186SSam Leffler do { 485395bb186SSam Leffler if (n->m_flags & M_EOR) { 486a34b7046SRobert Watson sbappendrecord_locked(sb, m); /* XXXXXX!!!! */ 487395bb186SSam Leffler return; 488395bb186SSam Leffler } 489395bb186SSam Leffler } while (n->m_next && (n = n->m_next)); 490395bb186SSam Leffler } else { 491395bb186SSam Leffler /* 492395bb186SSam Leffler * If this is the first record in the socket buffer, 493395bb186SSam Leffler * it's also the last record. 494395bb186SSam Leffler */ 495395bb186SSam Leffler sb->sb_lastrecord = m; 496395bb186SSam Leffler } 497df8bae1dSRodney W. Grimes } 498df8bae1dSRodney W. Grimes sbcompress(sb, m, n); 499395bb186SSam Leffler SBLASTRECORDCHK(sb); 500395bb186SSam Leffler } 501395bb186SSam Leffler 502395bb186SSam Leffler /* 503050ac265SRobert Watson * Append mbuf chain m to the last record in the socket buffer sb. The 504050ac265SRobert Watson * additional space associated the mbuf chain is recorded in sb. Empty mbufs 505050ac265SRobert Watson * are discarded and mbufs are compacted where possible. 506a34b7046SRobert Watson */ 507a34b7046SRobert Watson void 508050ac265SRobert Watson sbappend(struct sockbuf *sb, struct mbuf *m) 509a34b7046SRobert Watson { 510a34b7046SRobert Watson 511a34b7046SRobert Watson SOCKBUF_LOCK(sb); 512a34b7046SRobert Watson sbappend_locked(sb, m); 513a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 514a34b7046SRobert Watson } 515a34b7046SRobert Watson 516a34b7046SRobert Watson /* 517050ac265SRobert Watson * This version of sbappend() should only be used when the caller absolutely 518050ac265SRobert Watson * knows that there will never be more than one record in the socket buffer, 519050ac265SRobert Watson * that is, a stream protocol (such as TCP). 520395bb186SSam Leffler */ 521395bb186SSam Leffler void 522a34b7046SRobert Watson sbappendstream_locked(struct sockbuf *sb, struct mbuf *m) 523395bb186SSam Leffler { 524a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 525395bb186SSam Leffler 526395bb186SSam Leffler KASSERT(m->m_nextpkt == NULL,("sbappendstream 0")); 527395bb186SSam Leffler KASSERT(sb->sb_mb == sb->sb_lastrecord,("sbappendstream 1")); 528395bb186SSam Leffler 529395bb186SSam Leffler SBLASTMBUFCHK(sb); 530395bb186SSam Leffler 531844cacd1SGleb Smirnoff /* Remove all packet headers and mbuf tags to get a pure data chain. */ 532844cacd1SGleb Smirnoff m_demote(m, 1); 533844cacd1SGleb Smirnoff 534395bb186SSam Leffler sbcompress(sb, m, sb->sb_mbtail); 535395bb186SSam Leffler 536395bb186SSam Leffler sb->sb_lastrecord = sb->sb_mb; 537395bb186SSam Leffler SBLASTRECORDCHK(sb); 538df8bae1dSRodney W. Grimes } 539df8bae1dSRodney W. Grimes 540a34b7046SRobert Watson /* 541050ac265SRobert Watson * This version of sbappend() should only be used when the caller absolutely 542050ac265SRobert Watson * knows that there will never be more than one record in the socket buffer, 543050ac265SRobert Watson * that is, a stream protocol (such as TCP). 544a34b7046SRobert Watson */ 545a34b7046SRobert Watson void 546a34b7046SRobert Watson sbappendstream(struct sockbuf *sb, struct mbuf *m) 547a34b7046SRobert Watson { 548a34b7046SRobert Watson 549a34b7046SRobert Watson SOCKBUF_LOCK(sb); 550a34b7046SRobert Watson sbappendstream_locked(sb, m); 551a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 552a34b7046SRobert Watson } 553a34b7046SRobert Watson 554df8bae1dSRodney W. Grimes #ifdef SOCKBUF_DEBUG 55526f9a767SRodney W. Grimes void 556050ac265SRobert Watson sbcheck(struct sockbuf *sb) 557df8bae1dSRodney W. Grimes { 5587ed60de8SPoul-Henning Kamp struct mbuf *m; 5597ed60de8SPoul-Henning Kamp struct mbuf *n = 0; 5607ed60de8SPoul-Henning Kamp u_long len = 0, mbcnt = 0; 561df8bae1dSRodney W. Grimes 562a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 563a34b7046SRobert Watson 5640931333fSBill Fenner for (m = sb->sb_mb; m; m = n) { 5650931333fSBill Fenner n = m->m_nextpkt; 5660931333fSBill Fenner for (; m; m = m->m_next) { 567df8bae1dSRodney W. Grimes len += m->m_len; 568df8bae1dSRodney W. Grimes mbcnt += MSIZE; 569313861b8SJulian Elischer if (m->m_flags & M_EXT) /*XXX*/ /* pretty sure this is bogus */ 570df8bae1dSRodney W. Grimes mbcnt += m->m_ext.ext_size; 5710931333fSBill Fenner } 572df8bae1dSRodney W. Grimes } 573df8bae1dSRodney W. Grimes if (len != sb->sb_cc || mbcnt != sb->sb_mbcnt) { 574395bb186SSam Leffler printf("cc %ld != %u || mbcnt %ld != %u\n", len, sb->sb_cc, 575df8bae1dSRodney W. Grimes mbcnt, sb->sb_mbcnt); 576df8bae1dSRodney W. Grimes panic("sbcheck"); 577df8bae1dSRodney W. Grimes } 578df8bae1dSRodney W. Grimes } 579df8bae1dSRodney W. Grimes #endif 580df8bae1dSRodney W. Grimes 581df8bae1dSRodney W. Grimes /* 582050ac265SRobert Watson * As above, except the mbuf chain begins a new record. 583df8bae1dSRodney W. Grimes */ 58426f9a767SRodney W. Grimes void 585050ac265SRobert Watson sbappendrecord_locked(struct sockbuf *sb, struct mbuf *m0) 586df8bae1dSRodney W. Grimes { 587050ac265SRobert Watson struct mbuf *m; 588df8bae1dSRodney W. Grimes 589a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 590a34b7046SRobert Watson 591df8bae1dSRodney W. Grimes if (m0 == 0) 592df8bae1dSRodney W. Grimes return; 593df8bae1dSRodney W. Grimes /* 594050ac265SRobert Watson * Put the first mbuf on the queue. Note this permits zero length 595050ac265SRobert Watson * records. 596df8bae1dSRodney W. Grimes */ 597df8bae1dSRodney W. Grimes sballoc(sb, m0); 598395bb186SSam Leffler SBLASTRECORDCHK(sb); 599395bb186SSam Leffler SBLINKRECORD(sb, m0); 600e72a94adSMaksim Yevmenkin sb->sb_mbtail = m0; 601df8bae1dSRodney W. Grimes m = m0->m_next; 602df8bae1dSRodney W. Grimes m0->m_next = 0; 603df8bae1dSRodney W. Grimes if (m && (m0->m_flags & M_EOR)) { 604df8bae1dSRodney W. Grimes m0->m_flags &= ~M_EOR; 605df8bae1dSRodney W. Grimes m->m_flags |= M_EOR; 606df8bae1dSRodney W. Grimes } 607e72a94adSMaksim Yevmenkin /* always call sbcompress() so it can do SBLASTMBUFCHK() */ 608df8bae1dSRodney W. Grimes sbcompress(sb, m, m0); 609df8bae1dSRodney W. Grimes } 610df8bae1dSRodney W. Grimes 611df8bae1dSRodney W. Grimes /* 612050ac265SRobert Watson * As above, except the mbuf chain begins a new record. 613a34b7046SRobert Watson */ 614a34b7046SRobert Watson void 615050ac265SRobert Watson sbappendrecord(struct sockbuf *sb, struct mbuf *m0) 616a34b7046SRobert Watson { 617a34b7046SRobert Watson 618a34b7046SRobert Watson SOCKBUF_LOCK(sb); 619a34b7046SRobert Watson sbappendrecord_locked(sb, m0); 620a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 621a34b7046SRobert Watson } 622a34b7046SRobert Watson 6238de34a88SAlan Somers /* Helper routine that appends data, control, and address to a sockbuf. */ 6248de34a88SAlan Somers static int 6258de34a88SAlan Somers sbappendaddr_locked_internal(struct sockbuf *sb, const struct sockaddr *asa, 6268de34a88SAlan Somers struct mbuf *m0, struct mbuf *control, struct mbuf *ctrl_last) 627df8bae1dSRodney W. Grimes { 628395bb186SSam Leffler struct mbuf *m, *n, *nlast; 629c43cad1aSScott Long #if MSIZE <= 256 630df8bae1dSRodney W. Grimes if (asa->sa_len > MLEN) 631df8bae1dSRodney W. Grimes return (0); 632c43cad1aSScott Long #endif 633c8b59ea7SGleb Smirnoff m = m_get(M_NOWAIT, MT_SONAME); 634c8b59ea7SGleb Smirnoff if (m == NULL) 635df8bae1dSRodney W. Grimes return (0); 636df8bae1dSRodney W. Grimes m->m_len = asa->sa_len; 63780208239SAlfred Perlstein bcopy(asa, mtod(m, caddr_t), asa->sa_len); 6388de34a88SAlan Somers if (ctrl_last) 6398de34a88SAlan Somers ctrl_last->m_next = m0; /* concatenate data to control */ 640df8bae1dSRodney W. Grimes else 641df8bae1dSRodney W. Grimes control = m0; 642df8bae1dSRodney W. Grimes m->m_next = control; 643395bb186SSam Leffler for (n = m; n->m_next != NULL; n = n->m_next) 644df8bae1dSRodney W. Grimes sballoc(sb, n); 645395bb186SSam Leffler sballoc(sb, n); 646395bb186SSam Leffler nlast = n; 647395bb186SSam Leffler SBLINKRECORD(sb, m); 648395bb186SSam Leffler 649395bb186SSam Leffler sb->sb_mbtail = nlast; 650395bb186SSam Leffler SBLASTMBUFCHK(sb); 651395bb186SSam Leffler 652395bb186SSam Leffler SBLASTRECORDCHK(sb); 653df8bae1dSRodney W. Grimes return (1); 654df8bae1dSRodney W. Grimes } 655df8bae1dSRodney W. Grimes 656a34b7046SRobert Watson /* 657050ac265SRobert Watson * Append address and data, and optionally, control (ancillary) data to the 658050ac265SRobert Watson * receive queue of a socket. If present, m0 must include a packet header 659050ac265SRobert Watson * with total length. Returns 0 if no space in sockbuf or insufficient 660050ac265SRobert Watson * mbufs. 661a34b7046SRobert Watson */ 66226f9a767SRodney W. Grimes int 6638de34a88SAlan Somers sbappendaddr_locked(struct sockbuf *sb, const struct sockaddr *asa, 6648de34a88SAlan Somers struct mbuf *m0, struct mbuf *control) 6658de34a88SAlan Somers { 6668de34a88SAlan Somers struct mbuf *ctrl_last; 6678de34a88SAlan Somers int space = asa->sa_len; 6688de34a88SAlan Somers 6698de34a88SAlan Somers SOCKBUF_LOCK_ASSERT(sb); 6708de34a88SAlan Somers 6718de34a88SAlan Somers if (m0 && (m0->m_flags & M_PKTHDR) == 0) 6728de34a88SAlan Somers panic("sbappendaddr_locked"); 6738de34a88SAlan Somers if (m0) 6748de34a88SAlan Somers space += m0->m_pkthdr.len; 6758de34a88SAlan Somers space += m_length(control, &ctrl_last); 6768de34a88SAlan Somers 6778de34a88SAlan Somers if (space > sbspace(sb)) 6788de34a88SAlan Somers return (0); 6798de34a88SAlan Somers return (sbappendaddr_locked_internal(sb, asa, m0, control, ctrl_last)); 6808de34a88SAlan Somers } 6818de34a88SAlan Somers 6828de34a88SAlan Somers /* 6838de34a88SAlan Somers * Append address and data, and optionally, control (ancillary) data to the 6848de34a88SAlan Somers * receive queue of a socket. If present, m0 must include a packet header 6858de34a88SAlan Somers * with total length. Returns 0 if insufficient mbufs. Does not validate space 6868de34a88SAlan Somers * on the receiving sockbuf. 6878de34a88SAlan Somers */ 6888de34a88SAlan Somers int 6898de34a88SAlan Somers sbappendaddr_nospacecheck_locked(struct sockbuf *sb, const struct sockaddr *asa, 6908de34a88SAlan Somers struct mbuf *m0, struct mbuf *control) 6918de34a88SAlan Somers { 6928de34a88SAlan Somers struct mbuf *ctrl_last; 6938de34a88SAlan Somers 6948de34a88SAlan Somers SOCKBUF_LOCK_ASSERT(sb); 6958de34a88SAlan Somers 6968de34a88SAlan Somers ctrl_last = (control == NULL) ? NULL : m_last(control); 6978de34a88SAlan Somers return (sbappendaddr_locked_internal(sb, asa, m0, control, ctrl_last)); 6988de34a88SAlan Somers } 6998de34a88SAlan Somers 7008de34a88SAlan Somers /* 7018de34a88SAlan Somers * Append address and data, and optionally, control (ancillary) data to the 7028de34a88SAlan Somers * receive queue of a socket. If present, m0 must include a packet header 7038de34a88SAlan Somers * with total length. Returns 0 if no space in sockbuf or insufficient 7048de34a88SAlan Somers * mbufs. 7058de34a88SAlan Somers */ 7068de34a88SAlan Somers int 707050ac265SRobert Watson sbappendaddr(struct sockbuf *sb, const struct sockaddr *asa, 708050ac265SRobert Watson struct mbuf *m0, struct mbuf *control) 709a34b7046SRobert Watson { 710a34b7046SRobert Watson int retval; 711a34b7046SRobert Watson 712a34b7046SRobert Watson SOCKBUF_LOCK(sb); 713a34b7046SRobert Watson retval = sbappendaddr_locked(sb, asa, m0, control); 714a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 715a34b7046SRobert Watson return (retval); 716a34b7046SRobert Watson } 717a34b7046SRobert Watson 718a34b7046SRobert Watson int 719050ac265SRobert Watson sbappendcontrol_locked(struct sockbuf *sb, struct mbuf *m0, 720050ac265SRobert Watson struct mbuf *control) 721df8bae1dSRodney W. Grimes { 722395bb186SSam Leffler struct mbuf *m, *n, *mlast; 7237ed60de8SPoul-Henning Kamp int space; 724df8bae1dSRodney W. Grimes 725a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 726a34b7046SRobert Watson 727df8bae1dSRodney W. Grimes if (control == 0) 728a34b7046SRobert Watson panic("sbappendcontrol_locked"); 7297ed60de8SPoul-Henning Kamp space = m_length(control, &n) + m_length(m0, NULL); 730a34b7046SRobert Watson 731df8bae1dSRodney W. Grimes if (space > sbspace(sb)) 732df8bae1dSRodney W. Grimes return (0); 733df8bae1dSRodney W. Grimes n->m_next = m0; /* concatenate data to control */ 734395bb186SSam Leffler 735395bb186SSam Leffler SBLASTRECORDCHK(sb); 736395bb186SSam Leffler 737395bb186SSam Leffler for (m = control; m->m_next; m = m->m_next) 738df8bae1dSRodney W. Grimes sballoc(sb, m); 739395bb186SSam Leffler sballoc(sb, m); 740395bb186SSam Leffler mlast = m; 741395bb186SSam Leffler SBLINKRECORD(sb, control); 742395bb186SSam Leffler 743395bb186SSam Leffler sb->sb_mbtail = mlast; 744395bb186SSam Leffler SBLASTMBUFCHK(sb); 745395bb186SSam Leffler 746395bb186SSam Leffler SBLASTRECORDCHK(sb); 747df8bae1dSRodney W. Grimes return (1); 748df8bae1dSRodney W. Grimes } 749df8bae1dSRodney W. Grimes 750a34b7046SRobert Watson int 751050ac265SRobert Watson sbappendcontrol(struct sockbuf *sb, struct mbuf *m0, struct mbuf *control) 752a34b7046SRobert Watson { 753a34b7046SRobert Watson int retval; 754a34b7046SRobert Watson 755a34b7046SRobert Watson SOCKBUF_LOCK(sb); 756a34b7046SRobert Watson retval = sbappendcontrol_locked(sb, m0, control); 757a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 758a34b7046SRobert Watson return (retval); 759a34b7046SRobert Watson } 760a34b7046SRobert Watson 761df8bae1dSRodney W. Grimes /* 7627da7362bSRobert Watson * Append the data in mbuf chain (m) into the socket buffer sb following mbuf 7637da7362bSRobert Watson * (n). If (n) is NULL, the buffer is presumed empty. 7647da7362bSRobert Watson * 7657da7362bSRobert Watson * When the data is compressed, mbufs in the chain may be handled in one of 7667da7362bSRobert Watson * three ways: 7677da7362bSRobert Watson * 7687da7362bSRobert Watson * (1) The mbuf may simply be dropped, if it contributes nothing (no data, no 7697da7362bSRobert Watson * record boundary, and no change in data type). 7707da7362bSRobert Watson * 7717da7362bSRobert Watson * (2) The mbuf may be coalesced -- i.e., data in the mbuf may be copied into 7727da7362bSRobert Watson * an mbuf already in the socket buffer. This can occur if an 7737da7362bSRobert Watson * appropriate mbuf exists, there is room, and no merging of data types 7747da7362bSRobert Watson * will occur. 7757da7362bSRobert Watson * 7767da7362bSRobert Watson * (3) The mbuf may be appended to the end of the existing mbuf chain. 7777da7362bSRobert Watson * 7787da7362bSRobert Watson * If any of the new mbufs is marked as M_EOR, mark the last mbuf appended as 7797da7362bSRobert Watson * end-of-record. 780df8bae1dSRodney W. Grimes */ 78126f9a767SRodney W. Grimes void 782050ac265SRobert Watson sbcompress(struct sockbuf *sb, struct mbuf *m, struct mbuf *n) 783df8bae1dSRodney W. Grimes { 784050ac265SRobert Watson int eor = 0; 785050ac265SRobert Watson struct mbuf *o; 786df8bae1dSRodney W. Grimes 787a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 788a34b7046SRobert Watson 789df8bae1dSRodney W. Grimes while (m) { 790df8bae1dSRodney W. Grimes eor |= m->m_flags & M_EOR; 791df8bae1dSRodney W. Grimes if (m->m_len == 0 && 792df8bae1dSRodney W. Grimes (eor == 0 || 793df8bae1dSRodney W. Grimes (((o = m->m_next) || (o = n)) && 794df8bae1dSRodney W. Grimes o->m_type == m->m_type))) { 795395bb186SSam Leffler if (sb->sb_lastrecord == m) 796395bb186SSam Leffler sb->sb_lastrecord = m->m_next; 797df8bae1dSRodney W. Grimes m = m_free(m); 798df8bae1dSRodney W. Grimes continue; 799df8bae1dSRodney W. Grimes } 80032af0d74SDavid Malone if (n && (n->m_flags & M_EOR) == 0 && 80132af0d74SDavid Malone M_WRITABLE(n) && 8025e0f5cfaSKip Macy ((sb->sb_flags & SB_NOCOALESCE) == 0) && 80332af0d74SDavid Malone m->m_len <= MCLBYTES / 4 && /* XXX: Don't copy too much */ 80432af0d74SDavid Malone m->m_len <= M_TRAILINGSPACE(n) && 805df8bae1dSRodney W. Grimes n->m_type == m->m_type) { 806df8bae1dSRodney W. Grimes bcopy(mtod(m, caddr_t), mtod(n, caddr_t) + n->m_len, 807df8bae1dSRodney W. Grimes (unsigned)m->m_len); 808df8bae1dSRodney W. Grimes n->m_len += m->m_len; 809df8bae1dSRodney W. Grimes sb->sb_cc += m->m_len; 81034333b16SAndre Oppermann if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 811b3f1af6bSTim J. Robbins /* XXX: Probably don't need.*/ 81204ac9b97SKelly Yancey sb->sb_ctl += m->m_len; 813df8bae1dSRodney W. Grimes m = m_free(m); 814df8bae1dSRodney W. Grimes continue; 815df8bae1dSRodney W. Grimes } 816df8bae1dSRodney W. Grimes if (n) 817df8bae1dSRodney W. Grimes n->m_next = m; 818df8bae1dSRodney W. Grimes else 819df8bae1dSRodney W. Grimes sb->sb_mb = m; 820395bb186SSam Leffler sb->sb_mbtail = m; 821df8bae1dSRodney W. Grimes sballoc(sb, m); 822df8bae1dSRodney W. Grimes n = m; 823df8bae1dSRodney W. Grimes m->m_flags &= ~M_EOR; 824df8bae1dSRodney W. Grimes m = m->m_next; 825df8bae1dSRodney W. Grimes n->m_next = 0; 826df8bae1dSRodney W. Grimes } 827df8bae1dSRodney W. Grimes if (eor) { 8287da7362bSRobert Watson KASSERT(n != NULL, ("sbcompress: eor && n == NULL")); 829df8bae1dSRodney W. Grimes n->m_flags |= eor; 830df8bae1dSRodney W. Grimes } 831395bb186SSam Leffler SBLASTMBUFCHK(sb); 832df8bae1dSRodney W. Grimes } 833df8bae1dSRodney W. Grimes 834df8bae1dSRodney W. Grimes /* 835050ac265SRobert Watson * Free all mbufs in a sockbuf. Check that all resources are reclaimed. 836df8bae1dSRodney W. Grimes */ 837eaa6dfbcSRobert Watson static void 838050ac265SRobert Watson sbflush_internal(struct sockbuf *sb) 839df8bae1dSRodney W. Grimes { 840df8bae1dSRodney W. Grimes 84123f84772SPierre Beyssac while (sb->sb_mbcnt) { 84223f84772SPierre Beyssac /* 843761a9a1fSGleb Smirnoff * Don't call sbcut(sb, 0) if the leading mbuf is non-empty: 84423f84772SPierre Beyssac * we would loop forever. Panic instead. 84523f84772SPierre Beyssac */ 84623f84772SPierre Beyssac if (!sb->sb_cc && (sb->sb_mb == NULL || sb->sb_mb->m_len)) 84723f84772SPierre Beyssac break; 8481d2df300SGleb Smirnoff m_freem(sbcut_internal(sb, (int)sb->sb_cc)); 84923f84772SPierre Beyssac } 8500931333fSBill Fenner if (sb->sb_cc || sb->sb_mb || sb->sb_mbcnt) 851050ac265SRobert Watson panic("sbflush_internal: cc %u || mb %p || mbcnt %u", 852050ac265SRobert Watson sb->sb_cc, (void *)sb->sb_mb, sb->sb_mbcnt); 853a34b7046SRobert Watson } 854a34b7046SRobert Watson 855a34b7046SRobert Watson void 856050ac265SRobert Watson sbflush_locked(struct sockbuf *sb) 857eaa6dfbcSRobert Watson { 858eaa6dfbcSRobert Watson 859eaa6dfbcSRobert Watson SOCKBUF_LOCK_ASSERT(sb); 860eaa6dfbcSRobert Watson sbflush_internal(sb); 861eaa6dfbcSRobert Watson } 862eaa6dfbcSRobert Watson 863eaa6dfbcSRobert Watson void 864050ac265SRobert Watson sbflush(struct sockbuf *sb) 865a34b7046SRobert Watson { 866a34b7046SRobert Watson 867a34b7046SRobert Watson SOCKBUF_LOCK(sb); 868a34b7046SRobert Watson sbflush_locked(sb); 869a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 870df8bae1dSRodney W. Grimes } 871df8bae1dSRodney W. Grimes 872df8bae1dSRodney W. Grimes /* 8731d2df300SGleb Smirnoff * Cut data from (the front of) a sockbuf. 874df8bae1dSRodney W. Grimes */ 8751d2df300SGleb Smirnoff static struct mbuf * 8761d2df300SGleb Smirnoff sbcut_internal(struct sockbuf *sb, int len) 877df8bae1dSRodney W. Grimes { 8781d2df300SGleb Smirnoff struct mbuf *m, *n, *next, *mfree; 879df8bae1dSRodney W. Grimes 880df8bae1dSRodney W. Grimes next = (m = sb->sb_mb) ? m->m_nextpkt : 0; 8811d2df300SGleb Smirnoff mfree = NULL; 8821d2df300SGleb Smirnoff 883df8bae1dSRodney W. Grimes while (len > 0) { 884*8146bcfeSGleb Smirnoff if (m == NULL) { 885*8146bcfeSGleb Smirnoff KASSERT(next, ("%s: no next, len %d", __func__, len)); 886df8bae1dSRodney W. Grimes m = next; 887df8bae1dSRodney W. Grimes next = m->m_nextpkt; 888df8bae1dSRodney W. Grimes } 889df8bae1dSRodney W. Grimes if (m->m_len > len) { 890df8bae1dSRodney W. Grimes m->m_len -= len; 891df8bae1dSRodney W. Grimes m->m_data += len; 892df8bae1dSRodney W. Grimes sb->sb_cc -= len; 8934e023759SAndre Oppermann if (sb->sb_sndptroff != 0) 8944e023759SAndre Oppermann sb->sb_sndptroff -= len; 89534333b16SAndre Oppermann if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 89604ac9b97SKelly Yancey sb->sb_ctl -= len; 897df8bae1dSRodney W. Grimes break; 898df8bae1dSRodney W. Grimes } 899df8bae1dSRodney W. Grimes len -= m->m_len; 900df8bae1dSRodney W. Grimes sbfree(sb, m); 9011d2df300SGleb Smirnoff n = m->m_next; 9021d2df300SGleb Smirnoff m->m_next = mfree; 9031d2df300SGleb Smirnoff mfree = m; 9041d2df300SGleb Smirnoff m = n; 905df8bae1dSRodney W. Grimes } 906df8bae1dSRodney W. Grimes if (m) { 907df8bae1dSRodney W. Grimes sb->sb_mb = m; 908df8bae1dSRodney W. Grimes m->m_nextpkt = next; 909df8bae1dSRodney W. Grimes } else 910df8bae1dSRodney W. Grimes sb->sb_mb = next; 911395bb186SSam Leffler /* 912050ac265SRobert Watson * First part is an inline SB_EMPTY_FIXUP(). Second part makes sure 913050ac265SRobert Watson * sb_lastrecord is up-to-date if we dropped part of the last record. 914395bb186SSam Leffler */ 915395bb186SSam Leffler m = sb->sb_mb; 916395bb186SSam Leffler if (m == NULL) { 917395bb186SSam Leffler sb->sb_mbtail = NULL; 918395bb186SSam Leffler sb->sb_lastrecord = NULL; 919395bb186SSam Leffler } else if (m->m_nextpkt == NULL) { 920395bb186SSam Leffler sb->sb_lastrecord = m; 921395bb186SSam Leffler } 9221d2df300SGleb Smirnoff 9231d2df300SGleb Smirnoff return (mfree); 924df8bae1dSRodney W. Grimes } 925df8bae1dSRodney W. Grimes 926df8bae1dSRodney W. Grimes /* 927a34b7046SRobert Watson * Drop data from (the front of) a sockbuf. 928a34b7046SRobert Watson */ 929a34b7046SRobert Watson void 930050ac265SRobert Watson sbdrop_locked(struct sockbuf *sb, int len) 931eaa6dfbcSRobert Watson { 932eaa6dfbcSRobert Watson 933eaa6dfbcSRobert Watson SOCKBUF_LOCK_ASSERT(sb); 9341d2df300SGleb Smirnoff m_freem(sbcut_internal(sb, len)); 9351d2df300SGleb Smirnoff } 936eaa6dfbcSRobert Watson 9371d2df300SGleb Smirnoff /* 9381d2df300SGleb Smirnoff * Drop data from (the front of) a sockbuf, 9391d2df300SGleb Smirnoff * and return it to caller. 9401d2df300SGleb Smirnoff */ 9411d2df300SGleb Smirnoff struct mbuf * 9421d2df300SGleb Smirnoff sbcut_locked(struct sockbuf *sb, int len) 9431d2df300SGleb Smirnoff { 9441d2df300SGleb Smirnoff 9451d2df300SGleb Smirnoff SOCKBUF_LOCK_ASSERT(sb); 9461d2df300SGleb Smirnoff return (sbcut_internal(sb, len)); 947eaa6dfbcSRobert Watson } 948eaa6dfbcSRobert Watson 949eaa6dfbcSRobert Watson void 950050ac265SRobert Watson sbdrop(struct sockbuf *sb, int len) 951a34b7046SRobert Watson { 9521d2df300SGleb Smirnoff struct mbuf *mfree; 953a34b7046SRobert Watson 954a34b7046SRobert Watson SOCKBUF_LOCK(sb); 9551d2df300SGleb Smirnoff mfree = sbcut_internal(sb, len); 956a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 9571d2df300SGleb Smirnoff 9581d2df300SGleb Smirnoff m_freem(mfree); 959a34b7046SRobert Watson } 960a34b7046SRobert Watson 9614e023759SAndre Oppermann /* 9624e023759SAndre Oppermann * Maintain a pointer and offset pair into the socket buffer mbuf chain to 9634e023759SAndre Oppermann * avoid traversal of the entire socket buffer for larger offsets. 9644e023759SAndre Oppermann */ 9654e023759SAndre Oppermann struct mbuf * 9664e023759SAndre Oppermann sbsndptr(struct sockbuf *sb, u_int off, u_int len, u_int *moff) 9674e023759SAndre Oppermann { 9684e023759SAndre Oppermann struct mbuf *m, *ret; 9694e023759SAndre Oppermann 9704e023759SAndre Oppermann KASSERT(sb->sb_mb != NULL, ("%s: sb_mb is NULL", __func__)); 9714e023759SAndre Oppermann KASSERT(off + len <= sb->sb_cc, ("%s: beyond sb", __func__)); 9724e023759SAndre Oppermann KASSERT(sb->sb_sndptroff <= sb->sb_cc, ("%s: sndptroff broken", __func__)); 9734e023759SAndre Oppermann 9744e023759SAndre Oppermann /* 9754e023759SAndre Oppermann * Is off below stored offset? Happens on retransmits. 9764e023759SAndre Oppermann * Just return, we can't help here. 9774e023759SAndre Oppermann */ 9784e023759SAndre Oppermann if (sb->sb_sndptroff > off) { 9794e023759SAndre Oppermann *moff = off; 9804e023759SAndre Oppermann return (sb->sb_mb); 9814e023759SAndre Oppermann } 9824e023759SAndre Oppermann 9834e023759SAndre Oppermann /* Return closest mbuf in chain for current offset. */ 9844e023759SAndre Oppermann *moff = off - sb->sb_sndptroff; 9854e023759SAndre Oppermann m = ret = sb->sb_sndptr ? sb->sb_sndptr : sb->sb_mb; 9860963c8e4SLawrence Stewart if (*moff == m->m_len) { 9870963c8e4SLawrence Stewart *moff = 0; 9880963c8e4SLawrence Stewart sb->sb_sndptroff += m->m_len; 9890963c8e4SLawrence Stewart m = ret = m->m_next; 9900963c8e4SLawrence Stewart KASSERT(ret->m_len > 0, 9910963c8e4SLawrence Stewart ("mbuf %p in sockbuf %p chain has no valid data", ret, sb)); 9920963c8e4SLawrence Stewart } 9934e023759SAndre Oppermann 9944e023759SAndre Oppermann /* Advance by len to be as close as possible for the next transmit. */ 9954e023759SAndre Oppermann for (off = off - sb->sb_sndptroff + len - 1; 9966f4745d5SBjoern A. Zeeb off > 0 && m != NULL && off >= m->m_len; 9974e023759SAndre Oppermann m = m->m_next) { 9984e023759SAndre Oppermann sb->sb_sndptroff += m->m_len; 9994e023759SAndre Oppermann off -= m->m_len; 10004e023759SAndre Oppermann } 10016f4745d5SBjoern A. Zeeb if (off > 0 && m == NULL) 10026f4745d5SBjoern A. Zeeb panic("%s: sockbuf %p and mbuf %p clashing", __func__, sb, ret); 10034e023759SAndre Oppermann sb->sb_sndptr = m; 10044e023759SAndre Oppermann 10054e023759SAndre Oppermann return (ret); 10064e023759SAndre Oppermann } 10074e023759SAndre Oppermann 1008a34b7046SRobert Watson /* 10099fd573c3SHans Petter Selasky * Return the first mbuf and the mbuf data offset for the provided 10109fd573c3SHans Petter Selasky * send offset without changing the "sb_sndptroff" field. 10119fd573c3SHans Petter Selasky */ 10129fd573c3SHans Petter Selasky struct mbuf * 10139fd573c3SHans Petter Selasky sbsndmbuf(struct sockbuf *sb, u_int off, u_int *moff) 10149fd573c3SHans Petter Selasky { 10159fd573c3SHans Petter Selasky struct mbuf *m; 10169fd573c3SHans Petter Selasky 10179fd573c3SHans Petter Selasky KASSERT(sb->sb_mb != NULL, ("%s: sb_mb is NULL", __func__)); 10189fd573c3SHans Petter Selasky 10199fd573c3SHans Petter Selasky /* 10209fd573c3SHans Petter Selasky * If the "off" is below the stored offset, which happens on 10219fd573c3SHans Petter Selasky * retransmits, just use "sb_mb": 10229fd573c3SHans Petter Selasky */ 10239fd573c3SHans Petter Selasky if (sb->sb_sndptr == NULL || sb->sb_sndptroff > off) { 10249fd573c3SHans Petter Selasky m = sb->sb_mb; 10259fd573c3SHans Petter Selasky } else { 10269fd573c3SHans Petter Selasky m = sb->sb_sndptr; 10279fd573c3SHans Petter Selasky off -= sb->sb_sndptroff; 10289fd573c3SHans Petter Selasky } 10299fd573c3SHans Petter Selasky while (off > 0 && m != NULL) { 10309fd573c3SHans Petter Selasky if (off < m->m_len) 10319fd573c3SHans Petter Selasky break; 10329fd573c3SHans Petter Selasky off -= m->m_len; 10339fd573c3SHans Petter Selasky m = m->m_next; 10349fd573c3SHans Petter Selasky } 10359fd573c3SHans Petter Selasky *moff = off; 10369fd573c3SHans Petter Selasky return (m); 10379fd573c3SHans Petter Selasky } 10389fd573c3SHans Petter Selasky 10399fd573c3SHans Petter Selasky /* 1040050ac265SRobert Watson * Drop a record off the front of a sockbuf and move the next record to the 1041050ac265SRobert Watson * front. 1042df8bae1dSRodney W. Grimes */ 104326f9a767SRodney W. Grimes void 1044050ac265SRobert Watson sbdroprecord_locked(struct sockbuf *sb) 1045df8bae1dSRodney W. Grimes { 1046050ac265SRobert Watson struct mbuf *m; 1047df8bae1dSRodney W. Grimes 1048a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 1049a34b7046SRobert Watson 1050df8bae1dSRodney W. Grimes m = sb->sb_mb; 1051df8bae1dSRodney W. Grimes if (m) { 1052df8bae1dSRodney W. Grimes sb->sb_mb = m->m_nextpkt; 1053df8bae1dSRodney W. Grimes do { 1054df8bae1dSRodney W. Grimes sbfree(sb, m); 1055ecde8f7cSMatthew Dillon m = m_free(m); 1056797f2d22SPoul-Henning Kamp } while (m); 1057df8bae1dSRodney W. Grimes } 1058395bb186SSam Leffler SB_EMPTY_FIXUP(sb); 1059df8bae1dSRodney W. Grimes } 10601e4ad9ceSGarrett Wollman 106182c23ebaSBill Fenner /* 1062050ac265SRobert Watson * Drop a record off the front of a sockbuf and move the next record to the 1063050ac265SRobert Watson * front. 1064a34b7046SRobert Watson */ 1065a34b7046SRobert Watson void 1066050ac265SRobert Watson sbdroprecord(struct sockbuf *sb) 1067a34b7046SRobert Watson { 1068a34b7046SRobert Watson 1069a34b7046SRobert Watson SOCKBUF_LOCK(sb); 1070a34b7046SRobert Watson sbdroprecord_locked(sb); 1071a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 1072a34b7046SRobert Watson } 1073a34b7046SRobert Watson 107420d9e5e8SRobert Watson /* 10758c799760SRobert Watson * Create a "control" mbuf containing the specified data with the specified 10768c799760SRobert Watson * type for presentation on a socket buffer. 107720d9e5e8SRobert Watson */ 107820d9e5e8SRobert Watson struct mbuf * 1079d19e16a7SRobert Watson sbcreatecontrol(caddr_t p, int size, int type, int level) 108020d9e5e8SRobert Watson { 1081d19e16a7SRobert Watson struct cmsghdr *cp; 108220d9e5e8SRobert Watson struct mbuf *m; 108320d9e5e8SRobert Watson 108420d9e5e8SRobert Watson if (CMSG_SPACE((u_int)size) > MCLBYTES) 108520d9e5e8SRobert Watson return ((struct mbuf *) NULL); 108620d9e5e8SRobert Watson if (CMSG_SPACE((u_int)size) > MLEN) 1087eb1b1807SGleb Smirnoff m = m_getcl(M_NOWAIT, MT_CONTROL, 0); 108820d9e5e8SRobert Watson else 1089eb1b1807SGleb Smirnoff m = m_get(M_NOWAIT, MT_CONTROL); 109020d9e5e8SRobert Watson if (m == NULL) 109120d9e5e8SRobert Watson return ((struct mbuf *) NULL); 109220d9e5e8SRobert Watson cp = mtod(m, struct cmsghdr *); 109320d9e5e8SRobert Watson m->m_len = 0; 109420d9e5e8SRobert Watson KASSERT(CMSG_SPACE((u_int)size) <= M_TRAILINGSPACE(m), 109520d9e5e8SRobert Watson ("sbcreatecontrol: short mbuf")); 10962827952eSXin LI /* 10972827952eSXin LI * Don't leave the padding between the msg header and the 10982827952eSXin LI * cmsg data and the padding after the cmsg data un-initialized. 10992827952eSXin LI */ 11002827952eSXin LI bzero(cp, CMSG_SPACE((u_int)size)); 110120d9e5e8SRobert Watson if (p != NULL) 110220d9e5e8SRobert Watson (void)memcpy(CMSG_DATA(cp), p, size); 110320d9e5e8SRobert Watson m->m_len = CMSG_SPACE(size); 110420d9e5e8SRobert Watson cp->cmsg_len = CMSG_LEN(size); 110520d9e5e8SRobert Watson cp->cmsg_level = level; 110620d9e5e8SRobert Watson cp->cmsg_type = type; 110720d9e5e8SRobert Watson return (m); 110820d9e5e8SRobert Watson } 110920d9e5e8SRobert Watson 111020d9e5e8SRobert Watson /* 11118c799760SRobert Watson * This does the same for socket buffers that sotoxsocket does for sockets: 11128c799760SRobert Watson * generate an user-format data structure describing the socket buffer. Note 11138c799760SRobert Watson * that the xsockbuf structure, since it is always embedded in a socket, does 11148c799760SRobert Watson * not include a self pointer nor a length. We make this entry point public 11158c799760SRobert Watson * in case some other mechanism needs it. 111620d9e5e8SRobert Watson */ 111720d9e5e8SRobert Watson void 111820d9e5e8SRobert Watson sbtoxsockbuf(struct sockbuf *sb, struct xsockbuf *xsb) 111920d9e5e8SRobert Watson { 1120d19e16a7SRobert Watson 112120d9e5e8SRobert Watson xsb->sb_cc = sb->sb_cc; 112220d9e5e8SRobert Watson xsb->sb_hiwat = sb->sb_hiwat; 112320d9e5e8SRobert Watson xsb->sb_mbcnt = sb->sb_mbcnt; 112449f287f8SGeorge V. Neville-Neil xsb->sb_mcnt = sb->sb_mcnt; 112549f287f8SGeorge V. Neville-Neil xsb->sb_ccnt = sb->sb_ccnt; 112620d9e5e8SRobert Watson xsb->sb_mbmax = sb->sb_mbmax; 112720d9e5e8SRobert Watson xsb->sb_lowat = sb->sb_lowat; 112820d9e5e8SRobert Watson xsb->sb_flags = sb->sb_flags; 112920d9e5e8SRobert Watson xsb->sb_timeo = sb->sb_timeo; 113020d9e5e8SRobert Watson } 113120d9e5e8SRobert Watson 1132639acc13SGarrett Wollman /* This takes the place of kern.maxsockbuf, which moved to kern.ipc. */ 1133639acc13SGarrett Wollman static int dummy; 1134639acc13SGarrett Wollman SYSCTL_INT(_kern, KERN_DUMMY, dummy, CTLFLAG_RW, &dummy, 0, ""); 11351b978d45SHartmut Brandt SYSCTL_OID(_kern_ipc, KIPC_MAXSOCKBUF, maxsockbuf, CTLTYPE_ULONG|CTLFLAG_RW, 11361b978d45SHartmut Brandt &sb_max, 0, sysctl_handle_sb_max, "LU", "Maximum socket buffer size"); 11371b978d45SHartmut Brandt SYSCTL_ULONG(_kern_ipc, KIPC_SOCKBUF_WASTE, sockbuf_waste_factor, CTLFLAG_RW, 11383eb9ab52SEitan Adler &sb_efficiency, 0, "Socket buffer size waste factor"); 1139