19454b2d8SWarner Losh /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1988, 1990, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 6df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 7df8bae1dSRodney W. Grimes * are met: 8df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 9df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 10df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 12df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 13df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 14df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 15df8bae1dSRodney W. Grimes * without specific prior written permission. 16df8bae1dSRodney W. Grimes * 17df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27df8bae1dSRodney W. Grimes * SUCH DAMAGE. 28df8bae1dSRodney W. Grimes * 29df8bae1dSRodney W. Grimes * @(#)uipc_socket2.c 8.1 (Berkeley) 6/10/93 30df8bae1dSRodney W. Grimes */ 31df8bae1dSRodney W. Grimes 32677b542eSDavid E. O'Brien #include <sys/cdefs.h> 33677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 34677b542eSDavid E. O'Brien 355b86eac4SJesper Skriver #include "opt_param.h" 36335654d7SRobert Watson 37df8bae1dSRodney W. Grimes #include <sys/param.h> 38960ed29cSSeigo Tanimura #include <sys/aio.h> /* for aio_swake proto */ 39ff5c09daSGarrett Wollman #include <sys/kernel.h> 40fb919e4dSMark Murray #include <sys/lock.h> 41df8bae1dSRodney W. Grimes #include <sys/mbuf.h> 42960ed29cSSeigo Tanimura #include <sys/mutex.h> 43fb919e4dSMark Murray #include <sys/proc.h> 44df8bae1dSRodney W. Grimes #include <sys/protosw.h> 452f9a2132SBrian Feldman #include <sys/resourcevar.h> 46960ed29cSSeigo Tanimura #include <sys/signalvar.h> 47df8bae1dSRodney W. Grimes #include <sys/socket.h> 48df8bae1dSRodney W. Grimes #include <sys/socketvar.h> 497abab911SRobert Watson #include <sys/sx.h> 50ff5c09daSGarrett Wollman #include <sys/sysctl.h> 5126f9a767SRodney W. Grimes 52f14cce87SRobert Watson /* 53f14cce87SRobert Watson * Function pointer set by the AIO routines so that the socket buffer code 54f14cce87SRobert Watson * can call back into the AIO module if it is loaded. 55f14cce87SRobert Watson */ 5621d56e9cSAlfred Perlstein void (*aio_swake)(struct socket *, struct sockbuf *); 5721d56e9cSAlfred Perlstein 58df8bae1dSRodney W. Grimes /* 59f14cce87SRobert Watson * Primitive routines for operating on socket buffers 60df8bae1dSRodney W. Grimes */ 61df8bae1dSRodney W. Grimes 6279cb7eb4SDavid Greenman u_long sb_max = SB_MAX; 6351da11a2SMark Murray static u_long sb_max_adj = 6479cb7eb4SDavid Greenman SB_MAX * MCLBYTES / (MSIZE + MCLBYTES); /* adjusted sb_max */ 65df8bae1dSRodney W. Grimes 664b29bc4fSGarrett Wollman static u_long sb_efficiency = 8; /* parameter for sbreserve() */ 674b29bc4fSGarrett Wollman 68050ac265SRobert Watson static void sbdrop_internal(struct sockbuf *sb, int len); 69050ac265SRobert Watson static void sbflush_internal(struct sockbuf *sb); 70eaa6dfbcSRobert Watson static void sbrelease_internal(struct sockbuf *sb, struct socket *so); 71eaa6dfbcSRobert Watson 72df8bae1dSRodney W. Grimes /* 73050ac265SRobert Watson * Socantsendmore indicates that no more data will be sent on the socket; it 74050ac265SRobert Watson * would normally be applied to a socket when the user informs the system 75050ac265SRobert Watson * that no more data is to be sent, by the protocol code (in case 76050ac265SRobert Watson * PRU_SHUTDOWN). Socantrcvmore indicates that no more data will be 77050ac265SRobert Watson * received, and will normally be applied to the socket by a protocol when it 78050ac265SRobert Watson * detects that the peer will send no more data. Data queued for reading in 79050ac265SRobert Watson * the socket may yet be read. 80df8bae1dSRodney W. Grimes */ 81a34b7046SRobert Watson void 82050ac265SRobert Watson socantsendmore_locked(struct socket *so) 83a34b7046SRobert Watson { 84a34b7046SRobert Watson 85a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(&so->so_snd); 86a34b7046SRobert Watson 87a34b7046SRobert Watson so->so_snd.sb_state |= SBS_CANTSENDMORE; 88a34b7046SRobert Watson sowwakeup_locked(so); 89a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_snd), MA_NOTOWNED); 90a34b7046SRobert Watson } 91df8bae1dSRodney W. Grimes 9226f9a767SRodney W. Grimes void 93050ac265SRobert Watson socantsendmore(struct socket *so) 94df8bae1dSRodney W. Grimes { 95df8bae1dSRodney W. Grimes 96a34b7046SRobert Watson SOCKBUF_LOCK(&so->so_snd); 97a34b7046SRobert Watson socantsendmore_locked(so); 98a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_snd), MA_NOTOWNED); 99a34b7046SRobert Watson } 100a34b7046SRobert Watson 101a34b7046SRobert Watson void 102050ac265SRobert Watson socantrcvmore_locked(struct socket *so) 103a34b7046SRobert Watson { 104a34b7046SRobert Watson 105a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(&so->so_rcv); 106a34b7046SRobert Watson 107a34b7046SRobert Watson so->so_rcv.sb_state |= SBS_CANTRCVMORE; 108a34b7046SRobert Watson sorwakeup_locked(so); 109a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_rcv), MA_NOTOWNED); 110df8bae1dSRodney W. Grimes } 111df8bae1dSRodney W. Grimes 11226f9a767SRodney W. Grimes void 113050ac265SRobert Watson socantrcvmore(struct socket *so) 114df8bae1dSRodney W. Grimes { 115df8bae1dSRodney W. Grimes 116a34b7046SRobert Watson SOCKBUF_LOCK(&so->so_rcv); 117a34b7046SRobert Watson socantrcvmore_locked(so); 118a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_rcv), MA_NOTOWNED); 119df8bae1dSRodney W. Grimes } 120df8bae1dSRodney W. Grimes 121df8bae1dSRodney W. Grimes /* 122df8bae1dSRodney W. Grimes * Wait for data to arrive at/drain from a socket buffer. 123df8bae1dSRodney W. Grimes */ 12426f9a767SRodney W. Grimes int 125050ac265SRobert Watson sbwait(struct sockbuf *sb) 126df8bae1dSRodney W. Grimes { 127df8bae1dSRodney W. Grimes 12831f555a1SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 12931f555a1SRobert Watson 130df8bae1dSRodney W. Grimes sb->sb_flags |= SB_WAIT; 13131f555a1SRobert Watson return (msleep(&sb->sb_cc, &sb->sb_mtx, 13247daf5d5SBruce Evans (sb->sb_flags & SB_NOINTR) ? PSOCK : PSOCK | PCATCH, "sbwait", 133df8bae1dSRodney W. Grimes sb->sb_timeo)); 134df8bae1dSRodney W. Grimes } 135df8bae1dSRodney W. Grimes 13626f9a767SRodney W. Grimes int 1377abab911SRobert Watson sblock(struct sockbuf *sb, int flags) 138df8bae1dSRodney W. Grimes { 139df8bae1dSRodney W. Grimes 1407abab911SRobert Watson if (flags == M_WAITOK) { 1417abab911SRobert Watson sx_xlock(&sb->sb_sx); 142df8bae1dSRodney W. Grimes return (0); 1437abab911SRobert Watson } else { 1447abab911SRobert Watson if (sx_try_xlock(&sb->sb_sx) == 0) 1457abab911SRobert Watson return (EWOULDBLOCK); 1467abab911SRobert Watson return (0); 1477abab911SRobert Watson } 1487abab911SRobert Watson } 1497abab911SRobert Watson 1507abab911SRobert Watson void 1517abab911SRobert Watson sbunlock(struct sockbuf *sb) 1527abab911SRobert Watson { 1537abab911SRobert Watson 1547abab911SRobert Watson sx_xunlock(&sb->sb_sx); 155df8bae1dSRodney W. Grimes } 156df8bae1dSRodney W. Grimes 157df8bae1dSRodney W. Grimes /* 158050ac265SRobert Watson * Wakeup processes waiting on a socket buffer. Do asynchronous notification 159050ac265SRobert Watson * via SIGIO if the socket has the SS_ASYNC flag set. 160a34b7046SRobert Watson * 161a34b7046SRobert Watson * Called with the socket buffer lock held; will release the lock by the end 162a34b7046SRobert Watson * of the function. This allows the caller to acquire the socket buffer lock 163a34b7046SRobert Watson * while testing for the need for various sorts of wakeup and hold it through 164a34b7046SRobert Watson * to the point where it's no longer required. We currently hold the lock 165a34b7046SRobert Watson * through calls out to other subsystems (with the exception of kqueue), and 166a34b7046SRobert Watson * then release it to avoid lock order issues. It's not clear that's 167a34b7046SRobert Watson * correct. 168df8bae1dSRodney W. Grimes */ 16926f9a767SRodney W. Grimes void 170050ac265SRobert Watson sowakeup(struct socket *so, struct sockbuf *sb) 171df8bae1dSRodney W. Grimes { 172d48d4b25SSeigo Tanimura 173a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 174a34b7046SRobert Watson 175512824f8SSeigo Tanimura selwakeuppri(&sb->sb_sel, PSOCK); 176df8bae1dSRodney W. Grimes sb->sb_flags &= ~SB_SEL; 177df8bae1dSRodney W. Grimes if (sb->sb_flags & SB_WAIT) { 178df8bae1dSRodney W. Grimes sb->sb_flags &= ~SB_WAIT; 17980208239SAlfred Perlstein wakeup(&sb->sb_cc); 180df8bae1dSRodney W. Grimes } 181ad3b9257SJohn-Mark Gurney KNOTE_LOCKED(&sb->sb_sel.si_note, 0); 182a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 1834cc20ab1SSeigo Tanimura if ((so->so_state & SS_ASYNC) && so->so_sigio != NULL) 184f1320723SAlfred Perlstein pgsigio(&so->so_sigio, SIGIO, 0); 1854cc20ab1SSeigo Tanimura if (sb->sb_flags & SB_UPCALL) 186a163d034SWarner Losh (*so->so_upcall)(so, so->so_upcallarg, M_DONTWAIT); 1874cc20ab1SSeigo Tanimura if (sb->sb_flags & SB_AIO) 188bfbbc4aaSJason Evans aio_swake(so, sb); 189a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(sb), MA_NOTOWNED); 190df8bae1dSRodney W. Grimes } 191df8bae1dSRodney W. Grimes 192df8bae1dSRodney W. Grimes /* 193df8bae1dSRodney W. Grimes * Socket buffer (struct sockbuf) utility routines. 194df8bae1dSRodney W. Grimes * 195050ac265SRobert Watson * Each socket contains two socket buffers: one for sending data and one for 196050ac265SRobert Watson * receiving data. Each buffer contains a queue of mbufs, information about 197050ac265SRobert Watson * the number of mbufs and amount of data in the queue, and other fields 198050ac265SRobert Watson * allowing select() statements and notification on data availability to be 199050ac265SRobert Watson * implemented. 200df8bae1dSRodney W. Grimes * 201050ac265SRobert Watson * Data stored in a socket buffer is maintained as a list of records. Each 202050ac265SRobert Watson * record is a list of mbufs chained together with the m_next field. Records 203050ac265SRobert Watson * are chained together with the m_nextpkt field. The upper level routine 204050ac265SRobert Watson * soreceive() expects the following conventions to be observed when placing 205050ac265SRobert Watson * information in the receive buffer: 206df8bae1dSRodney W. Grimes * 207050ac265SRobert Watson * 1. If the protocol requires each message be preceded by the sender's name, 208050ac265SRobert Watson * then a record containing that name must be present before any 209050ac265SRobert Watson * associated data (mbuf's must be of type MT_SONAME). 210050ac265SRobert Watson * 2. If the protocol supports the exchange of ``access rights'' (really just 211050ac265SRobert Watson * additional data associated with the message), and there are ``rights'' 212050ac265SRobert Watson * to be received, then a record containing this data should be present 213050ac265SRobert Watson * (mbuf's must be of type MT_RIGHTS). 214050ac265SRobert Watson * 3. If a name or rights record exists, then it must be followed by a data 215050ac265SRobert Watson * record, perhaps of zero length. 216df8bae1dSRodney W. Grimes * 217df8bae1dSRodney W. Grimes * Before using a new socket structure it is first necessary to reserve 218df8bae1dSRodney W. Grimes * buffer space to the socket, by calling sbreserve(). This should commit 219df8bae1dSRodney W. Grimes * some of the available buffer space in the system buffer pool for the 220050ac265SRobert Watson * socket (currently, it does nothing but enforce limits). The space should 221050ac265SRobert Watson * be released by calling sbrelease() when the socket is destroyed. 222df8bae1dSRodney W. Grimes */ 22326f9a767SRodney W. Grimes int 224050ac265SRobert Watson soreserve(struct socket *so, u_long sndcc, u_long rcvcc) 225df8bae1dSRodney W. Grimes { 226b40ce416SJulian Elischer struct thread *td = curthread; 227df8bae1dSRodney W. Grimes 2283f11a2f3SRobert Watson SOCKBUF_LOCK(&so->so_snd); 2299535efc0SRobert Watson SOCKBUF_LOCK(&so->so_rcv); 2303f11a2f3SRobert Watson if (sbreserve_locked(&so->so_snd, sndcc, so, td) == 0) 2313f11a2f3SRobert Watson goto bad; 2323f11a2f3SRobert Watson if (sbreserve_locked(&so->so_rcv, rcvcc, so, td) == 0) 2333f11a2f3SRobert Watson goto bad2; 234df8bae1dSRodney W. Grimes if (so->so_rcv.sb_lowat == 0) 235df8bae1dSRodney W. Grimes so->so_rcv.sb_lowat = 1; 236df8bae1dSRodney W. Grimes if (so->so_snd.sb_lowat == 0) 237df8bae1dSRodney W. Grimes so->so_snd.sb_lowat = MCLBYTES; 238df8bae1dSRodney W. Grimes if (so->so_snd.sb_lowat > so->so_snd.sb_hiwat) 239df8bae1dSRodney W. Grimes so->so_snd.sb_lowat = so->so_snd.sb_hiwat; 2403f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_rcv); 2419535efc0SRobert Watson SOCKBUF_UNLOCK(&so->so_snd); 242df8bae1dSRodney W. Grimes return (0); 243df8bae1dSRodney W. Grimes bad2: 2443f11a2f3SRobert Watson sbrelease_locked(&so->so_snd, so); 245df8bae1dSRodney W. Grimes bad: 2463f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_rcv); 2473f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_snd); 248df8bae1dSRodney W. Grimes return (ENOBUFS); 249df8bae1dSRodney W. Grimes } 250df8bae1dSRodney W. Grimes 25179cb7eb4SDavid Greenman static int 25279cb7eb4SDavid Greenman sysctl_handle_sb_max(SYSCTL_HANDLER_ARGS) 25379cb7eb4SDavid Greenman { 25479cb7eb4SDavid Greenman int error = 0; 25586a93d51SJohn Baldwin u_long tmp_sb_max = sb_max; 25679cb7eb4SDavid Greenman 25786a93d51SJohn Baldwin error = sysctl_handle_long(oidp, &tmp_sb_max, arg2, req); 25879cb7eb4SDavid Greenman if (error || !req->newptr) 25979cb7eb4SDavid Greenman return (error); 26086a93d51SJohn Baldwin if (tmp_sb_max < MSIZE + MCLBYTES) 26179cb7eb4SDavid Greenman return (EINVAL); 26286a93d51SJohn Baldwin sb_max = tmp_sb_max; 26379cb7eb4SDavid Greenman sb_max_adj = (u_quad_t)sb_max * MCLBYTES / (MSIZE + MCLBYTES); 26479cb7eb4SDavid Greenman return (0); 26579cb7eb4SDavid Greenman } 26679cb7eb4SDavid Greenman 267df8bae1dSRodney W. Grimes /* 268050ac265SRobert Watson * Allot mbufs to a sockbuf. Attempt to scale mbmax so that mbcnt doesn't 269050ac265SRobert Watson * become limiting if buffering efficiency is near the normal case. 270df8bae1dSRodney W. Grimes */ 27126f9a767SRodney W. Grimes int 272050ac265SRobert Watson sbreserve_locked(struct sockbuf *sb, u_long cc, struct socket *so, 273050ac265SRobert Watson struct thread *td) 274df8bae1dSRodney W. Grimes { 27591d5354aSJohn Baldwin rlim_t sbsize_limit; 276ecf72308SBrian Feldman 2773f11a2f3SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 2783f11a2f3SRobert Watson 279ecf72308SBrian Feldman /* 280050ac265SRobert Watson * td will only be NULL when we're in an interrupt (e.g. in 281050ac265SRobert Watson * tcp_input()). 282050ac265SRobert Watson * 283050ac265SRobert Watson * XXXRW: This comment needs updating, as might the code. 284ecf72308SBrian Feldman */ 28579cb7eb4SDavid Greenman if (cc > sb_max_adj) 286df8bae1dSRodney W. Grimes return (0); 28791d5354aSJohn Baldwin if (td != NULL) { 28891d5354aSJohn Baldwin PROC_LOCK(td->td_proc); 28991d5354aSJohn Baldwin sbsize_limit = lim_cur(td->td_proc, RLIMIT_SBSIZE); 29091d5354aSJohn Baldwin PROC_UNLOCK(td->td_proc); 29191d5354aSJohn Baldwin } else 29291d5354aSJohn Baldwin sbsize_limit = RLIM_INFINITY; 293f535380cSDon Lewis if (!chgsbsize(so->so_cred->cr_uidinfo, &sb->sb_hiwat, cc, 29491d5354aSJohn Baldwin sbsize_limit)) 295ecf72308SBrian Feldman return (0); 2964b29bc4fSGarrett Wollman sb->sb_mbmax = min(cc * sb_efficiency, sb_max); 297df8bae1dSRodney W. Grimes if (sb->sb_lowat > sb->sb_hiwat) 298df8bae1dSRodney W. Grimes sb->sb_lowat = sb->sb_hiwat; 299df8bae1dSRodney W. Grimes return (1); 300df8bae1dSRodney W. Grimes } 301df8bae1dSRodney W. Grimes 3023f11a2f3SRobert Watson int 303050ac265SRobert Watson sbreserve(struct sockbuf *sb, u_long cc, struct socket *so, 304050ac265SRobert Watson struct thread *td) 3053f11a2f3SRobert Watson { 3063f11a2f3SRobert Watson int error; 3073f11a2f3SRobert Watson 3083f11a2f3SRobert Watson SOCKBUF_LOCK(sb); 3093f11a2f3SRobert Watson error = sbreserve_locked(sb, cc, so, td); 3103f11a2f3SRobert Watson SOCKBUF_UNLOCK(sb); 3113f11a2f3SRobert Watson return (error); 3123f11a2f3SRobert Watson } 3133f11a2f3SRobert Watson 314df8bae1dSRodney W. Grimes /* 315df8bae1dSRodney W. Grimes * Free mbufs held by a socket, and reserved mbuf space. 316df8bae1dSRodney W. Grimes */ 317eaa6dfbcSRobert Watson static void 318050ac265SRobert Watson sbrelease_internal(struct sockbuf *sb, struct socket *so) 319eaa6dfbcSRobert Watson { 320eaa6dfbcSRobert Watson 321eaa6dfbcSRobert Watson sbflush_internal(sb); 322eaa6dfbcSRobert Watson (void)chgsbsize(so->so_cred->cr_uidinfo, &sb->sb_hiwat, 0, 323eaa6dfbcSRobert Watson RLIM_INFINITY); 324eaa6dfbcSRobert Watson sb->sb_mbmax = 0; 325eaa6dfbcSRobert Watson } 326eaa6dfbcSRobert Watson 32726f9a767SRodney W. Grimes void 328050ac265SRobert Watson sbrelease_locked(struct sockbuf *sb, struct socket *so) 329df8bae1dSRodney W. Grimes { 330df8bae1dSRodney W. Grimes 331a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 332a34b7046SRobert Watson 333eaa6dfbcSRobert Watson sbrelease_internal(sb, so); 334df8bae1dSRodney W. Grimes } 335df8bae1dSRodney W. Grimes 336a34b7046SRobert Watson void 337050ac265SRobert Watson sbrelease(struct sockbuf *sb, struct socket *so) 338a34b7046SRobert Watson { 339a34b7046SRobert Watson 340a34b7046SRobert Watson SOCKBUF_LOCK(sb); 341a34b7046SRobert Watson sbrelease_locked(sb, so); 342a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 343a34b7046SRobert Watson } 344eaa6dfbcSRobert Watson 345eaa6dfbcSRobert Watson void 346050ac265SRobert Watson sbdestroy(struct sockbuf *sb, struct socket *so) 347eaa6dfbcSRobert Watson { 348eaa6dfbcSRobert Watson 349eaa6dfbcSRobert Watson sbrelease_internal(sb, so); 350eaa6dfbcSRobert Watson } 351eaa6dfbcSRobert Watson 352df8bae1dSRodney W. Grimes /* 353050ac265SRobert Watson * Routines to add and remove data from an mbuf queue. 354df8bae1dSRodney W. Grimes * 355050ac265SRobert Watson * The routines sbappend() or sbappendrecord() are normally called to append 356050ac265SRobert Watson * new mbufs to a socket buffer, after checking that adequate space is 357050ac265SRobert Watson * available, comparing the function sbspace() with the amount of data to be 358050ac265SRobert Watson * added. sbappendrecord() differs from sbappend() in that data supplied is 359050ac265SRobert Watson * treated as the beginning of a new record. To place a sender's address, 360050ac265SRobert Watson * optional access rights, and data in a socket receive buffer, 361050ac265SRobert Watson * sbappendaddr() should be used. To place access rights and data in a 362050ac265SRobert Watson * socket receive buffer, sbappendrights() should be used. In either case, 363050ac265SRobert Watson * the new data begins a new record. Note that unlike sbappend() and 364050ac265SRobert Watson * sbappendrecord(), these routines check for the caller that there will be 365050ac265SRobert Watson * enough space to store the data. Each fails if there is not enough space, 366050ac265SRobert Watson * or if it cannot find mbufs to store additional information in. 367df8bae1dSRodney W. Grimes * 368050ac265SRobert Watson * Reliable protocols may use the socket send buffer to hold data awaiting 369050ac265SRobert Watson * acknowledgement. Data is normally copied from a socket send buffer in a 370050ac265SRobert Watson * protocol with m_copy for output to a peer, and then removing the data from 371050ac265SRobert Watson * the socket buffer with sbdrop() or sbdroprecord() when the data is 372050ac265SRobert Watson * acknowledged by the peer. 373df8bae1dSRodney W. Grimes */ 374395bb186SSam Leffler #ifdef SOCKBUF_DEBUG 375395bb186SSam Leffler void 376395bb186SSam Leffler sblastrecordchk(struct sockbuf *sb, const char *file, int line) 377395bb186SSam Leffler { 378395bb186SSam Leffler struct mbuf *m = sb->sb_mb; 379395bb186SSam Leffler 380a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 381a34b7046SRobert Watson 382395bb186SSam Leffler while (m && m->m_nextpkt) 383395bb186SSam Leffler m = m->m_nextpkt; 384395bb186SSam Leffler 385395bb186SSam Leffler if (m != sb->sb_lastrecord) { 386395bb186SSam Leffler printf("%s: sb_mb %p sb_lastrecord %p last %p\n", 387395bb186SSam Leffler __func__, sb->sb_mb, sb->sb_lastrecord, m); 388395bb186SSam Leffler printf("packet chain:\n"); 389395bb186SSam Leffler for (m = sb->sb_mb; m != NULL; m = m->m_nextpkt) 390395bb186SSam Leffler printf("\t%p\n", m); 391395bb186SSam Leffler panic("%s from %s:%u", __func__, file, line); 392395bb186SSam Leffler } 393395bb186SSam Leffler } 394395bb186SSam Leffler 395395bb186SSam Leffler void 396395bb186SSam Leffler sblastmbufchk(struct sockbuf *sb, const char *file, int line) 397395bb186SSam Leffler { 398395bb186SSam Leffler struct mbuf *m = sb->sb_mb; 399395bb186SSam Leffler struct mbuf *n; 400395bb186SSam Leffler 401a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 402a34b7046SRobert Watson 403395bb186SSam Leffler while (m && m->m_nextpkt) 404395bb186SSam Leffler m = m->m_nextpkt; 405395bb186SSam Leffler 406395bb186SSam Leffler while (m && m->m_next) 407395bb186SSam Leffler m = m->m_next; 408395bb186SSam Leffler 409395bb186SSam Leffler if (m != sb->sb_mbtail) { 410395bb186SSam Leffler printf("%s: sb_mb %p sb_mbtail %p last %p\n", 411395bb186SSam Leffler __func__, sb->sb_mb, sb->sb_mbtail, m); 412395bb186SSam Leffler printf("packet tree:\n"); 413395bb186SSam Leffler for (m = sb->sb_mb; m != NULL; m = m->m_nextpkt) { 414395bb186SSam Leffler printf("\t"); 415395bb186SSam Leffler for (n = m; n != NULL; n = n->m_next) 416395bb186SSam Leffler printf("%p ", n); 417395bb186SSam Leffler printf("\n"); 418395bb186SSam Leffler } 419395bb186SSam Leffler panic("%s from %s:%u", __func__, file, line); 420395bb186SSam Leffler } 421395bb186SSam Leffler } 422395bb186SSam Leffler #endif /* SOCKBUF_DEBUG */ 423395bb186SSam Leffler 424395bb186SSam Leffler #define SBLINKRECORD(sb, m0) do { \ 425a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); \ 426395bb186SSam Leffler if ((sb)->sb_lastrecord != NULL) \ 427395bb186SSam Leffler (sb)->sb_lastrecord->m_nextpkt = (m0); \ 428395bb186SSam Leffler else \ 429395bb186SSam Leffler (sb)->sb_mb = (m0); \ 430395bb186SSam Leffler (sb)->sb_lastrecord = (m0); \ 431395bb186SSam Leffler } while (/*CONSTCOND*/0) 432395bb186SSam Leffler 433df8bae1dSRodney W. Grimes /* 434050ac265SRobert Watson * Append mbuf chain m to the last record in the socket buffer sb. The 435050ac265SRobert Watson * additional space associated the mbuf chain is recorded in sb. Empty mbufs 436050ac265SRobert Watson * are discarded and mbufs are compacted where possible. 437df8bae1dSRodney W. Grimes */ 43826f9a767SRodney W. Grimes void 439050ac265SRobert Watson sbappend_locked(struct sockbuf *sb, struct mbuf *m) 440df8bae1dSRodney W. Grimes { 441050ac265SRobert Watson struct mbuf *n; 442df8bae1dSRodney W. Grimes 443a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 444a34b7046SRobert Watson 445df8bae1dSRodney W. Grimes if (m == 0) 446df8bae1dSRodney W. Grimes return; 447a34b7046SRobert Watson 448395bb186SSam Leffler SBLASTRECORDCHK(sb); 449797f2d22SPoul-Henning Kamp n = sb->sb_mb; 450797f2d22SPoul-Henning Kamp if (n) { 451df8bae1dSRodney W. Grimes while (n->m_nextpkt) 452df8bae1dSRodney W. Grimes n = n->m_nextpkt; 453df8bae1dSRodney W. Grimes do { 454df8bae1dSRodney W. Grimes if (n->m_flags & M_EOR) { 455a34b7046SRobert Watson sbappendrecord_locked(sb, m); /* XXXXXX!!!! */ 456df8bae1dSRodney W. Grimes return; 457df8bae1dSRodney W. Grimes } 458df8bae1dSRodney W. Grimes } while (n->m_next && (n = n->m_next)); 459395bb186SSam Leffler } else { 460395bb186SSam Leffler /* 461395bb186SSam Leffler * XXX Would like to simply use sb_mbtail here, but 462395bb186SSam Leffler * XXX I need to verify that I won't miss an EOR that 463395bb186SSam Leffler * XXX way. 464395bb186SSam Leffler */ 465395bb186SSam Leffler if ((n = sb->sb_lastrecord) != NULL) { 466395bb186SSam Leffler do { 467395bb186SSam Leffler if (n->m_flags & M_EOR) { 468a34b7046SRobert Watson sbappendrecord_locked(sb, m); /* XXXXXX!!!! */ 469395bb186SSam Leffler return; 470395bb186SSam Leffler } 471395bb186SSam Leffler } while (n->m_next && (n = n->m_next)); 472395bb186SSam Leffler } else { 473395bb186SSam Leffler /* 474395bb186SSam Leffler * If this is the first record in the socket buffer, 475395bb186SSam Leffler * it's also the last record. 476395bb186SSam Leffler */ 477395bb186SSam Leffler sb->sb_lastrecord = m; 478395bb186SSam Leffler } 479df8bae1dSRodney W. Grimes } 480df8bae1dSRodney W. Grimes sbcompress(sb, m, n); 481395bb186SSam Leffler SBLASTRECORDCHK(sb); 482395bb186SSam Leffler } 483395bb186SSam Leffler 484395bb186SSam Leffler /* 485050ac265SRobert Watson * Append mbuf chain m to the last record in the socket buffer sb. The 486050ac265SRobert Watson * additional space associated the mbuf chain is recorded in sb. Empty mbufs 487050ac265SRobert Watson * are discarded and mbufs are compacted where possible. 488a34b7046SRobert Watson */ 489a34b7046SRobert Watson void 490050ac265SRobert Watson sbappend(struct sockbuf *sb, struct mbuf *m) 491a34b7046SRobert Watson { 492a34b7046SRobert Watson 493a34b7046SRobert Watson SOCKBUF_LOCK(sb); 494a34b7046SRobert Watson sbappend_locked(sb, m); 495a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 496a34b7046SRobert Watson } 497a34b7046SRobert Watson 498a34b7046SRobert Watson /* 499050ac265SRobert Watson * This version of sbappend() should only be used when the caller absolutely 500050ac265SRobert Watson * knows that there will never be more than one record in the socket buffer, 501050ac265SRobert Watson * that is, a stream protocol (such as TCP). 502395bb186SSam Leffler */ 503395bb186SSam Leffler void 504a34b7046SRobert Watson sbappendstream_locked(struct sockbuf *sb, struct mbuf *m) 505395bb186SSam Leffler { 506a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 507395bb186SSam Leffler 508395bb186SSam Leffler KASSERT(m->m_nextpkt == NULL,("sbappendstream 0")); 509395bb186SSam Leffler KASSERT(sb->sb_mb == sb->sb_lastrecord,("sbappendstream 1")); 510395bb186SSam Leffler 511395bb186SSam Leffler SBLASTMBUFCHK(sb); 512395bb186SSam Leffler 513395bb186SSam Leffler sbcompress(sb, m, sb->sb_mbtail); 514395bb186SSam Leffler 515395bb186SSam Leffler sb->sb_lastrecord = sb->sb_mb; 516395bb186SSam Leffler SBLASTRECORDCHK(sb); 517df8bae1dSRodney W. Grimes } 518df8bae1dSRodney W. Grimes 519a34b7046SRobert Watson /* 520050ac265SRobert Watson * This version of sbappend() should only be used when the caller absolutely 521050ac265SRobert Watson * knows that there will never be more than one record in the socket buffer, 522050ac265SRobert Watson * that is, a stream protocol (such as TCP). 523a34b7046SRobert Watson */ 524a34b7046SRobert Watson void 525a34b7046SRobert Watson sbappendstream(struct sockbuf *sb, struct mbuf *m) 526a34b7046SRobert Watson { 527a34b7046SRobert Watson 528a34b7046SRobert Watson SOCKBUF_LOCK(sb); 529a34b7046SRobert Watson sbappendstream_locked(sb, m); 530a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 531a34b7046SRobert Watson } 532a34b7046SRobert Watson 533df8bae1dSRodney W. Grimes #ifdef SOCKBUF_DEBUG 53426f9a767SRodney W. Grimes void 535050ac265SRobert Watson sbcheck(struct sockbuf *sb) 536df8bae1dSRodney W. Grimes { 5377ed60de8SPoul-Henning Kamp struct mbuf *m; 5387ed60de8SPoul-Henning Kamp struct mbuf *n = 0; 5397ed60de8SPoul-Henning Kamp u_long len = 0, mbcnt = 0; 540df8bae1dSRodney W. Grimes 541a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 542a34b7046SRobert Watson 5430931333fSBill Fenner for (m = sb->sb_mb; m; m = n) { 5440931333fSBill Fenner n = m->m_nextpkt; 5450931333fSBill Fenner for (; m; m = m->m_next) { 546df8bae1dSRodney W. Grimes len += m->m_len; 547df8bae1dSRodney W. Grimes mbcnt += MSIZE; 548313861b8SJulian Elischer if (m->m_flags & M_EXT) /*XXX*/ /* pretty sure this is bogus */ 549df8bae1dSRodney W. Grimes mbcnt += m->m_ext.ext_size; 5500931333fSBill Fenner } 551df8bae1dSRodney W. Grimes } 552df8bae1dSRodney W. Grimes if (len != sb->sb_cc || mbcnt != sb->sb_mbcnt) { 553395bb186SSam Leffler printf("cc %ld != %u || mbcnt %ld != %u\n", len, sb->sb_cc, 554df8bae1dSRodney W. Grimes mbcnt, sb->sb_mbcnt); 555df8bae1dSRodney W. Grimes panic("sbcheck"); 556df8bae1dSRodney W. Grimes } 557df8bae1dSRodney W. Grimes } 558df8bae1dSRodney W. Grimes #endif 559df8bae1dSRodney W. Grimes 560df8bae1dSRodney W. Grimes /* 561050ac265SRobert Watson * As above, except the mbuf chain begins a new record. 562df8bae1dSRodney W. Grimes */ 56326f9a767SRodney W. Grimes void 564050ac265SRobert Watson sbappendrecord_locked(struct sockbuf *sb, struct mbuf *m0) 565df8bae1dSRodney W. Grimes { 566050ac265SRobert Watson struct mbuf *m; 567df8bae1dSRodney W. Grimes 568a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 569a34b7046SRobert Watson 570df8bae1dSRodney W. Grimes if (m0 == 0) 571df8bae1dSRodney W. Grimes return; 572797f2d22SPoul-Henning Kamp m = sb->sb_mb; 573797f2d22SPoul-Henning Kamp if (m) 574df8bae1dSRodney W. Grimes while (m->m_nextpkt) 575df8bae1dSRodney W. Grimes m = m->m_nextpkt; 576df8bae1dSRodney W. Grimes /* 577050ac265SRobert Watson * Put the first mbuf on the queue. Note this permits zero length 578050ac265SRobert Watson * records. 579df8bae1dSRodney W. Grimes */ 580df8bae1dSRodney W. Grimes sballoc(sb, m0); 581395bb186SSam Leffler SBLASTRECORDCHK(sb); 582395bb186SSam Leffler SBLINKRECORD(sb, m0); 583df8bae1dSRodney W. Grimes if (m) 584df8bae1dSRodney W. Grimes m->m_nextpkt = m0; 585df8bae1dSRodney W. Grimes else 586df8bae1dSRodney W. Grimes sb->sb_mb = m0; 587df8bae1dSRodney W. Grimes m = m0->m_next; 588df8bae1dSRodney W. Grimes m0->m_next = 0; 589df8bae1dSRodney W. Grimes if (m && (m0->m_flags & M_EOR)) { 590df8bae1dSRodney W. Grimes m0->m_flags &= ~M_EOR; 591df8bae1dSRodney W. Grimes m->m_flags |= M_EOR; 592df8bae1dSRodney W. Grimes } 593df8bae1dSRodney W. Grimes sbcompress(sb, m, m0); 594df8bae1dSRodney W. Grimes } 595df8bae1dSRodney W. Grimes 596df8bae1dSRodney W. Grimes /* 597050ac265SRobert Watson * As above, except the mbuf chain begins a new record. 598a34b7046SRobert Watson */ 599a34b7046SRobert Watson void 600050ac265SRobert Watson sbappendrecord(struct sockbuf *sb, struct mbuf *m0) 601a34b7046SRobert Watson { 602a34b7046SRobert Watson 603a34b7046SRobert Watson SOCKBUF_LOCK(sb); 604a34b7046SRobert Watson sbappendrecord_locked(sb, m0); 605a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 606a34b7046SRobert Watson } 607a34b7046SRobert Watson 608a34b7046SRobert Watson /* 609050ac265SRobert Watson * Append address and data, and optionally, control (ancillary) data to the 610050ac265SRobert Watson * receive queue of a socket. If present, m0 must include a packet header 611050ac265SRobert Watson * with total length. Returns 0 if no space in sockbuf or insufficient 612050ac265SRobert Watson * mbufs. 613df8bae1dSRodney W. Grimes */ 61426f9a767SRodney W. Grimes int 615050ac265SRobert Watson sbappendaddr_locked(struct sockbuf *sb, const struct sockaddr *asa, 616050ac265SRobert Watson struct mbuf *m0, struct mbuf *control) 617df8bae1dSRodney W. Grimes { 618395bb186SSam Leffler struct mbuf *m, *n, *nlast; 619df8bae1dSRodney W. Grimes int space = asa->sa_len; 620df8bae1dSRodney W. Grimes 621a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 622a34b7046SRobert Watson 623df8bae1dSRodney W. Grimes if (m0 && (m0->m_flags & M_PKTHDR) == 0) 624a34b7046SRobert Watson panic("sbappendaddr_locked"); 625df8bae1dSRodney W. Grimes if (m0) 626df8bae1dSRodney W. Grimes space += m0->m_pkthdr.len; 6277ed60de8SPoul-Henning Kamp space += m_length(control, &n); 628a34b7046SRobert Watson 629df8bae1dSRodney W. Grimes if (space > sbspace(sb)) 630df8bae1dSRodney W. Grimes return (0); 631c43cad1aSScott Long #if MSIZE <= 256 632df8bae1dSRodney W. Grimes if (asa->sa_len > MLEN) 633df8bae1dSRodney W. Grimes return (0); 634c43cad1aSScott Long #endif 635a163d034SWarner Losh MGET(m, M_DONTWAIT, MT_SONAME); 636df8bae1dSRodney W. Grimes if (m == 0) 637df8bae1dSRodney W. Grimes return (0); 638df8bae1dSRodney W. Grimes m->m_len = asa->sa_len; 63980208239SAlfred Perlstein bcopy(asa, mtod(m, caddr_t), asa->sa_len); 640df8bae1dSRodney W. Grimes if (n) 641df8bae1dSRodney W. Grimes n->m_next = m0; /* concatenate data to control */ 642df8bae1dSRodney W. Grimes else 643df8bae1dSRodney W. Grimes control = m0; 644df8bae1dSRodney W. Grimes m->m_next = control; 645395bb186SSam Leffler for (n = m; n->m_next != NULL; n = n->m_next) 646df8bae1dSRodney W. Grimes sballoc(sb, n); 647395bb186SSam Leffler sballoc(sb, n); 648395bb186SSam Leffler nlast = n; 649395bb186SSam Leffler SBLINKRECORD(sb, m); 650395bb186SSam Leffler 651395bb186SSam Leffler sb->sb_mbtail = nlast; 652395bb186SSam Leffler SBLASTMBUFCHK(sb); 653395bb186SSam Leffler 654395bb186SSam Leffler SBLASTRECORDCHK(sb); 655df8bae1dSRodney W. Grimes return (1); 656df8bae1dSRodney W. Grimes } 657df8bae1dSRodney W. Grimes 658a34b7046SRobert Watson /* 659050ac265SRobert Watson * Append address and data, and optionally, control (ancillary) data to the 660050ac265SRobert Watson * receive queue of a socket. If present, m0 must include a packet header 661050ac265SRobert Watson * with total length. Returns 0 if no space in sockbuf or insufficient 662050ac265SRobert Watson * mbufs. 663a34b7046SRobert Watson */ 66426f9a767SRodney W. Grimes int 665050ac265SRobert Watson sbappendaddr(struct sockbuf *sb, const struct sockaddr *asa, 666050ac265SRobert Watson struct mbuf *m0, struct mbuf *control) 667a34b7046SRobert Watson { 668a34b7046SRobert Watson int retval; 669a34b7046SRobert Watson 670a34b7046SRobert Watson SOCKBUF_LOCK(sb); 671a34b7046SRobert Watson retval = sbappendaddr_locked(sb, asa, m0, control); 672a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 673a34b7046SRobert Watson return (retval); 674a34b7046SRobert Watson } 675a34b7046SRobert Watson 676a34b7046SRobert Watson int 677050ac265SRobert Watson sbappendcontrol_locked(struct sockbuf *sb, struct mbuf *m0, 678050ac265SRobert Watson struct mbuf *control) 679df8bae1dSRodney W. Grimes { 680395bb186SSam Leffler struct mbuf *m, *n, *mlast; 6817ed60de8SPoul-Henning Kamp int space; 682df8bae1dSRodney W. Grimes 683a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 684a34b7046SRobert Watson 685df8bae1dSRodney W. Grimes if (control == 0) 686a34b7046SRobert Watson panic("sbappendcontrol_locked"); 6877ed60de8SPoul-Henning Kamp space = m_length(control, &n) + m_length(m0, NULL); 688a34b7046SRobert Watson 689df8bae1dSRodney W. Grimes if (space > sbspace(sb)) 690df8bae1dSRodney W. Grimes return (0); 691df8bae1dSRodney W. Grimes n->m_next = m0; /* concatenate data to control */ 692395bb186SSam Leffler 693395bb186SSam Leffler SBLASTRECORDCHK(sb); 694395bb186SSam Leffler 695395bb186SSam Leffler for (m = control; m->m_next; m = m->m_next) 696df8bae1dSRodney W. Grimes sballoc(sb, m); 697395bb186SSam Leffler sballoc(sb, m); 698395bb186SSam Leffler mlast = m; 699395bb186SSam Leffler SBLINKRECORD(sb, control); 700395bb186SSam Leffler 701395bb186SSam Leffler sb->sb_mbtail = mlast; 702395bb186SSam Leffler SBLASTMBUFCHK(sb); 703395bb186SSam Leffler 704395bb186SSam Leffler SBLASTRECORDCHK(sb); 705df8bae1dSRodney W. Grimes return (1); 706df8bae1dSRodney W. Grimes } 707df8bae1dSRodney W. Grimes 708a34b7046SRobert Watson int 709050ac265SRobert Watson sbappendcontrol(struct sockbuf *sb, struct mbuf *m0, struct mbuf *control) 710a34b7046SRobert Watson { 711a34b7046SRobert Watson int retval; 712a34b7046SRobert Watson 713a34b7046SRobert Watson SOCKBUF_LOCK(sb); 714a34b7046SRobert Watson retval = sbappendcontrol_locked(sb, m0, control); 715a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 716a34b7046SRobert Watson return (retval); 717a34b7046SRobert Watson } 718a34b7046SRobert Watson 719df8bae1dSRodney W. Grimes /* 7207da7362bSRobert Watson * Append the data in mbuf chain (m) into the socket buffer sb following mbuf 7217da7362bSRobert Watson * (n). If (n) is NULL, the buffer is presumed empty. 7227da7362bSRobert Watson * 7237da7362bSRobert Watson * When the data is compressed, mbufs in the chain may be handled in one of 7247da7362bSRobert Watson * three ways: 7257da7362bSRobert Watson * 7267da7362bSRobert Watson * (1) The mbuf may simply be dropped, if it contributes nothing (no data, no 7277da7362bSRobert Watson * record boundary, and no change in data type). 7287da7362bSRobert Watson * 7297da7362bSRobert Watson * (2) The mbuf may be coalesced -- i.e., data in the mbuf may be copied into 7307da7362bSRobert Watson * an mbuf already in the socket buffer. This can occur if an 7317da7362bSRobert Watson * appropriate mbuf exists, there is room, and no merging of data types 7327da7362bSRobert Watson * will occur. 7337da7362bSRobert Watson * 7347da7362bSRobert Watson * (3) The mbuf may be appended to the end of the existing mbuf chain. 7357da7362bSRobert Watson * 7367da7362bSRobert Watson * If any of the new mbufs is marked as M_EOR, mark the last mbuf appended as 7377da7362bSRobert Watson * end-of-record. 738df8bae1dSRodney W. Grimes */ 73926f9a767SRodney W. Grimes void 740050ac265SRobert Watson sbcompress(struct sockbuf *sb, struct mbuf *m, struct mbuf *n) 741df8bae1dSRodney W. Grimes { 742050ac265SRobert Watson int eor = 0; 743050ac265SRobert Watson struct mbuf *o; 744df8bae1dSRodney W. Grimes 745a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 746a34b7046SRobert Watson 747df8bae1dSRodney W. Grimes while (m) { 748df8bae1dSRodney W. Grimes eor |= m->m_flags & M_EOR; 749df8bae1dSRodney W. Grimes if (m->m_len == 0 && 750df8bae1dSRodney W. Grimes (eor == 0 || 751df8bae1dSRodney W. Grimes (((o = m->m_next) || (o = n)) && 752df8bae1dSRodney W. Grimes o->m_type == m->m_type))) { 753395bb186SSam Leffler if (sb->sb_lastrecord == m) 754395bb186SSam Leffler sb->sb_lastrecord = m->m_next; 755df8bae1dSRodney W. Grimes m = m_free(m); 756df8bae1dSRodney W. Grimes continue; 757df8bae1dSRodney W. Grimes } 75832af0d74SDavid Malone if (n && (n->m_flags & M_EOR) == 0 && 75932af0d74SDavid Malone M_WRITABLE(n) && 76032af0d74SDavid Malone m->m_len <= MCLBYTES / 4 && /* XXX: Don't copy too much */ 76132af0d74SDavid Malone m->m_len <= M_TRAILINGSPACE(n) && 762df8bae1dSRodney W. Grimes n->m_type == m->m_type) { 763df8bae1dSRodney W. Grimes bcopy(mtod(m, caddr_t), mtod(n, caddr_t) + n->m_len, 764df8bae1dSRodney W. Grimes (unsigned)m->m_len); 765df8bae1dSRodney W. Grimes n->m_len += m->m_len; 766df8bae1dSRodney W. Grimes sb->sb_cc += m->m_len; 76734333b16SAndre Oppermann if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 768b3f1af6bSTim J. Robbins /* XXX: Probably don't need.*/ 76904ac9b97SKelly Yancey sb->sb_ctl += m->m_len; 770df8bae1dSRodney W. Grimes m = m_free(m); 771df8bae1dSRodney W. Grimes continue; 772df8bae1dSRodney W. Grimes } 773df8bae1dSRodney W. Grimes if (n) 774df8bae1dSRodney W. Grimes n->m_next = m; 775df8bae1dSRodney W. Grimes else 776df8bae1dSRodney W. Grimes sb->sb_mb = m; 777395bb186SSam Leffler sb->sb_mbtail = m; 778df8bae1dSRodney W. Grimes sballoc(sb, m); 779df8bae1dSRodney W. Grimes n = m; 780df8bae1dSRodney W. Grimes m->m_flags &= ~M_EOR; 781df8bae1dSRodney W. Grimes m = m->m_next; 782df8bae1dSRodney W. Grimes n->m_next = 0; 783df8bae1dSRodney W. Grimes } 784df8bae1dSRodney W. Grimes if (eor) { 7857da7362bSRobert Watson KASSERT(n != NULL, ("sbcompress: eor && n == NULL")); 786df8bae1dSRodney W. Grimes n->m_flags |= eor; 787df8bae1dSRodney W. Grimes } 788395bb186SSam Leffler SBLASTMBUFCHK(sb); 789df8bae1dSRodney W. Grimes } 790df8bae1dSRodney W. Grimes 791df8bae1dSRodney W. Grimes /* 792050ac265SRobert Watson * Free all mbufs in a sockbuf. Check that all resources are reclaimed. 793df8bae1dSRodney W. Grimes */ 794eaa6dfbcSRobert Watson static void 795050ac265SRobert Watson sbflush_internal(struct sockbuf *sb) 796df8bae1dSRodney W. Grimes { 797df8bae1dSRodney W. Grimes 79823f84772SPierre Beyssac while (sb->sb_mbcnt) { 79923f84772SPierre Beyssac /* 80023f84772SPierre Beyssac * Don't call sbdrop(sb, 0) if the leading mbuf is non-empty: 80123f84772SPierre Beyssac * we would loop forever. Panic instead. 80223f84772SPierre Beyssac */ 80323f84772SPierre Beyssac if (!sb->sb_cc && (sb->sb_mb == NULL || sb->sb_mb->m_len)) 80423f84772SPierre Beyssac break; 805eaa6dfbcSRobert Watson sbdrop_internal(sb, (int)sb->sb_cc); 80623f84772SPierre Beyssac } 8070931333fSBill Fenner if (sb->sb_cc || sb->sb_mb || sb->sb_mbcnt) 808050ac265SRobert Watson panic("sbflush_internal: cc %u || mb %p || mbcnt %u", 809050ac265SRobert Watson sb->sb_cc, (void *)sb->sb_mb, sb->sb_mbcnt); 810a34b7046SRobert Watson } 811a34b7046SRobert Watson 812a34b7046SRobert Watson void 813050ac265SRobert Watson sbflush_locked(struct sockbuf *sb) 814eaa6dfbcSRobert Watson { 815eaa6dfbcSRobert Watson 816eaa6dfbcSRobert Watson SOCKBUF_LOCK_ASSERT(sb); 817eaa6dfbcSRobert Watson sbflush_internal(sb); 818eaa6dfbcSRobert Watson } 819eaa6dfbcSRobert Watson 820eaa6dfbcSRobert Watson void 821050ac265SRobert Watson sbflush(struct sockbuf *sb) 822a34b7046SRobert Watson { 823a34b7046SRobert Watson 824a34b7046SRobert Watson SOCKBUF_LOCK(sb); 825a34b7046SRobert Watson sbflush_locked(sb); 826a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 827df8bae1dSRodney W. Grimes } 828df8bae1dSRodney W. Grimes 829df8bae1dSRodney W. Grimes /* 830df8bae1dSRodney W. Grimes * Drop data from (the front of) a sockbuf. 831df8bae1dSRodney W. Grimes */ 832eaa6dfbcSRobert Watson static void 833050ac265SRobert Watson sbdrop_internal(struct sockbuf *sb, int len) 834df8bae1dSRodney W. Grimes { 835050ac265SRobert Watson struct mbuf *m; 836df8bae1dSRodney W. Grimes struct mbuf *next; 837df8bae1dSRodney W. Grimes 838df8bae1dSRodney W. Grimes next = (m = sb->sb_mb) ? m->m_nextpkt : 0; 839df8bae1dSRodney W. Grimes while (len > 0) { 840df8bae1dSRodney W. Grimes if (m == 0) { 841df8bae1dSRodney W. Grimes if (next == 0) 842df8bae1dSRodney W. Grimes panic("sbdrop"); 843df8bae1dSRodney W. Grimes m = next; 844df8bae1dSRodney W. Grimes next = m->m_nextpkt; 845df8bae1dSRodney W. Grimes continue; 846df8bae1dSRodney W. Grimes } 847df8bae1dSRodney W. Grimes if (m->m_len > len) { 848df8bae1dSRodney W. Grimes m->m_len -= len; 849df8bae1dSRodney W. Grimes m->m_data += len; 850df8bae1dSRodney W. Grimes sb->sb_cc -= len; 8514e023759SAndre Oppermann if (sb->sb_sndptroff != 0) 8524e023759SAndre Oppermann sb->sb_sndptroff -= len; 85334333b16SAndre Oppermann if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 85404ac9b97SKelly Yancey sb->sb_ctl -= len; 855df8bae1dSRodney W. Grimes break; 856df8bae1dSRodney W. Grimes } 857df8bae1dSRodney W. Grimes len -= m->m_len; 858df8bae1dSRodney W. Grimes sbfree(sb, m); 859ecde8f7cSMatthew Dillon m = m_free(m); 860df8bae1dSRodney W. Grimes } 861df8bae1dSRodney W. Grimes while (m && m->m_len == 0) { 862df8bae1dSRodney W. Grimes sbfree(sb, m); 863ecde8f7cSMatthew Dillon m = m_free(m); 864df8bae1dSRodney W. Grimes } 865df8bae1dSRodney W. Grimes if (m) { 866df8bae1dSRodney W. Grimes sb->sb_mb = m; 867df8bae1dSRodney W. Grimes m->m_nextpkt = next; 868df8bae1dSRodney W. Grimes } else 869df8bae1dSRodney W. Grimes sb->sb_mb = next; 870395bb186SSam Leffler /* 871050ac265SRobert Watson * First part is an inline SB_EMPTY_FIXUP(). Second part makes sure 872050ac265SRobert Watson * sb_lastrecord is up-to-date if we dropped part of the last record. 873395bb186SSam Leffler */ 874395bb186SSam Leffler m = sb->sb_mb; 875395bb186SSam Leffler if (m == NULL) { 876395bb186SSam Leffler sb->sb_mbtail = NULL; 877395bb186SSam Leffler sb->sb_lastrecord = NULL; 878395bb186SSam Leffler } else if (m->m_nextpkt == NULL) { 879395bb186SSam Leffler sb->sb_lastrecord = m; 880395bb186SSam Leffler } 881df8bae1dSRodney W. Grimes } 882df8bae1dSRodney W. Grimes 883df8bae1dSRodney W. Grimes /* 884a34b7046SRobert Watson * Drop data from (the front of) a sockbuf. 885a34b7046SRobert Watson */ 886a34b7046SRobert Watson void 887050ac265SRobert Watson sbdrop_locked(struct sockbuf *sb, int len) 888eaa6dfbcSRobert Watson { 889eaa6dfbcSRobert Watson 890eaa6dfbcSRobert Watson SOCKBUF_LOCK_ASSERT(sb); 891eaa6dfbcSRobert Watson 892eaa6dfbcSRobert Watson sbdrop_internal(sb, len); 893eaa6dfbcSRobert Watson } 894eaa6dfbcSRobert Watson 895eaa6dfbcSRobert Watson void 896050ac265SRobert Watson sbdrop(struct sockbuf *sb, int len) 897a34b7046SRobert Watson { 898a34b7046SRobert Watson 899a34b7046SRobert Watson SOCKBUF_LOCK(sb); 900a34b7046SRobert Watson sbdrop_locked(sb, len); 901a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 902a34b7046SRobert Watson } 903a34b7046SRobert Watson 9044e023759SAndre Oppermann /* 9054e023759SAndre Oppermann * Maintain a pointer and offset pair into the socket buffer mbuf chain to 9064e023759SAndre Oppermann * avoid traversal of the entire socket buffer for larger offsets. 9074e023759SAndre Oppermann */ 9084e023759SAndre Oppermann struct mbuf * 9094e023759SAndre Oppermann sbsndptr(struct sockbuf *sb, u_int off, u_int len, u_int *moff) 9104e023759SAndre Oppermann { 9114e023759SAndre Oppermann struct mbuf *m, *ret; 9124e023759SAndre Oppermann 9134e023759SAndre Oppermann KASSERT(sb->sb_mb != NULL, ("%s: sb_mb is NULL", __func__)); 9144e023759SAndre Oppermann KASSERT(off + len <= sb->sb_cc, ("%s: beyond sb", __func__)); 9154e023759SAndre Oppermann KASSERT(sb->sb_sndptroff <= sb->sb_cc, ("%s: sndptroff broken", __func__)); 9164e023759SAndre Oppermann 9174e023759SAndre Oppermann /* 9184e023759SAndre Oppermann * Is off below stored offset? Happens on retransmits. 9194e023759SAndre Oppermann * Just return, we can't help here. 9204e023759SAndre Oppermann */ 9214e023759SAndre Oppermann if (sb->sb_sndptroff > off) { 9224e023759SAndre Oppermann *moff = off; 9234e023759SAndre Oppermann return (sb->sb_mb); 9244e023759SAndre Oppermann } 9254e023759SAndre Oppermann 9264e023759SAndre Oppermann /* Return closest mbuf in chain for current offset. */ 9274e023759SAndre Oppermann *moff = off - sb->sb_sndptroff; 9284e023759SAndre Oppermann m = ret = sb->sb_sndptr ? sb->sb_sndptr : sb->sb_mb; 9294e023759SAndre Oppermann 9304e023759SAndre Oppermann /* Advance by len to be as close as possible for the next transmit. */ 9314e023759SAndre Oppermann for (off = off - sb->sb_sndptroff + len - 1; 9324e023759SAndre Oppermann off > 0 && off >= m->m_len; 9334e023759SAndre Oppermann m = m->m_next) { 9344e023759SAndre Oppermann sb->sb_sndptroff += m->m_len; 9354e023759SAndre Oppermann off -= m->m_len; 9364e023759SAndre Oppermann } 9374e023759SAndre Oppermann sb->sb_sndptr = m; 9384e023759SAndre Oppermann 9394e023759SAndre Oppermann return (ret); 9404e023759SAndre Oppermann } 9414e023759SAndre Oppermann 942a34b7046SRobert Watson /* 943050ac265SRobert Watson * Drop a record off the front of a sockbuf and move the next record to the 944050ac265SRobert Watson * front. 945df8bae1dSRodney W. Grimes */ 94626f9a767SRodney W. Grimes void 947050ac265SRobert Watson sbdroprecord_locked(struct sockbuf *sb) 948df8bae1dSRodney W. Grimes { 949050ac265SRobert Watson struct mbuf *m; 950df8bae1dSRodney W. Grimes 951a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 952a34b7046SRobert Watson 953df8bae1dSRodney W. Grimes m = sb->sb_mb; 954df8bae1dSRodney W. Grimes if (m) { 955df8bae1dSRodney W. Grimes sb->sb_mb = m->m_nextpkt; 956df8bae1dSRodney W. Grimes do { 957df8bae1dSRodney W. Grimes sbfree(sb, m); 958ecde8f7cSMatthew Dillon m = m_free(m); 959797f2d22SPoul-Henning Kamp } while (m); 960df8bae1dSRodney W. Grimes } 961395bb186SSam Leffler SB_EMPTY_FIXUP(sb); 962df8bae1dSRodney W. Grimes } 9631e4ad9ceSGarrett Wollman 96482c23ebaSBill Fenner /* 965050ac265SRobert Watson * Drop a record off the front of a sockbuf and move the next record to the 966050ac265SRobert Watson * front. 967a34b7046SRobert Watson */ 968a34b7046SRobert Watson void 969050ac265SRobert Watson sbdroprecord(struct sockbuf *sb) 970a34b7046SRobert Watson { 971a34b7046SRobert Watson 972a34b7046SRobert Watson SOCKBUF_LOCK(sb); 973a34b7046SRobert Watson sbdroprecord_locked(sb); 974a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 975a34b7046SRobert Watson } 976a34b7046SRobert Watson 97720d9e5e8SRobert Watson /* 9788c799760SRobert Watson * Create a "control" mbuf containing the specified data with the specified 9798c799760SRobert Watson * type for presentation on a socket buffer. 98020d9e5e8SRobert Watson */ 98120d9e5e8SRobert Watson struct mbuf * 982d19e16a7SRobert Watson sbcreatecontrol(caddr_t p, int size, int type, int level) 98320d9e5e8SRobert Watson { 984d19e16a7SRobert Watson struct cmsghdr *cp; 98520d9e5e8SRobert Watson struct mbuf *m; 98620d9e5e8SRobert Watson 98720d9e5e8SRobert Watson if (CMSG_SPACE((u_int)size) > MCLBYTES) 98820d9e5e8SRobert Watson return ((struct mbuf *) NULL); 98920d9e5e8SRobert Watson if (CMSG_SPACE((u_int)size) > MLEN) 99020d9e5e8SRobert Watson m = m_getcl(M_DONTWAIT, MT_CONTROL, 0); 99120d9e5e8SRobert Watson else 99220d9e5e8SRobert Watson m = m_get(M_DONTWAIT, MT_CONTROL); 99320d9e5e8SRobert Watson if (m == NULL) 99420d9e5e8SRobert Watson return ((struct mbuf *) NULL); 99520d9e5e8SRobert Watson cp = mtod(m, struct cmsghdr *); 99620d9e5e8SRobert Watson m->m_len = 0; 99720d9e5e8SRobert Watson KASSERT(CMSG_SPACE((u_int)size) <= M_TRAILINGSPACE(m), 99820d9e5e8SRobert Watson ("sbcreatecontrol: short mbuf")); 99920d9e5e8SRobert Watson if (p != NULL) 100020d9e5e8SRobert Watson (void)memcpy(CMSG_DATA(cp), p, size); 100120d9e5e8SRobert Watson m->m_len = CMSG_SPACE(size); 100220d9e5e8SRobert Watson cp->cmsg_len = CMSG_LEN(size); 100320d9e5e8SRobert Watson cp->cmsg_level = level; 100420d9e5e8SRobert Watson cp->cmsg_type = type; 100520d9e5e8SRobert Watson return (m); 100620d9e5e8SRobert Watson } 100720d9e5e8SRobert Watson 100820d9e5e8SRobert Watson /* 10098c799760SRobert Watson * This does the same for socket buffers that sotoxsocket does for sockets: 10108c799760SRobert Watson * generate an user-format data structure describing the socket buffer. Note 10118c799760SRobert Watson * that the xsockbuf structure, since it is always embedded in a socket, does 10128c799760SRobert Watson * not include a self pointer nor a length. We make this entry point public 10138c799760SRobert Watson * in case some other mechanism needs it. 101420d9e5e8SRobert Watson */ 101520d9e5e8SRobert Watson void 101620d9e5e8SRobert Watson sbtoxsockbuf(struct sockbuf *sb, struct xsockbuf *xsb) 101720d9e5e8SRobert Watson { 1018d19e16a7SRobert Watson 101920d9e5e8SRobert Watson xsb->sb_cc = sb->sb_cc; 102020d9e5e8SRobert Watson xsb->sb_hiwat = sb->sb_hiwat; 102120d9e5e8SRobert Watson xsb->sb_mbcnt = sb->sb_mbcnt; 102220d9e5e8SRobert Watson xsb->sb_mbmax = sb->sb_mbmax; 102320d9e5e8SRobert Watson xsb->sb_lowat = sb->sb_lowat; 102420d9e5e8SRobert Watson xsb->sb_flags = sb->sb_flags; 102520d9e5e8SRobert Watson xsb->sb_timeo = sb->sb_timeo; 102620d9e5e8SRobert Watson } 102720d9e5e8SRobert Watson 1028639acc13SGarrett Wollman /* This takes the place of kern.maxsockbuf, which moved to kern.ipc. */ 1029639acc13SGarrett Wollman static int dummy; 1030639acc13SGarrett Wollman SYSCTL_INT(_kern, KERN_DUMMY, dummy, CTLFLAG_RW, &dummy, 0, ""); 10311b978d45SHartmut Brandt SYSCTL_OID(_kern_ipc, KIPC_MAXSOCKBUF, maxsockbuf, CTLTYPE_ULONG|CTLFLAG_RW, 10321b978d45SHartmut Brandt &sb_max, 0, sysctl_handle_sb_max, "LU", "Maximum socket buffer size"); 10331b978d45SHartmut Brandt SYSCTL_ULONG(_kern_ipc, KIPC_SOCKBUF_WASTE, sockbuf_waste_factor, CTLFLAG_RW, 1034639acc13SGarrett Wollman &sb_efficiency, 0, ""); 1035