19454b2d8SWarner Losh /*- 2df8bae1dSRodney W. Grimes * Copyright (c) 1982, 1986, 1988, 1990, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * 5df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 6df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 7df8bae1dSRodney W. Grimes * are met: 8df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 9df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 10df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 11df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 12df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 1369a28758SEd Maste * 3. Neither the name of the University nor the names of its contributors 14df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 15df8bae1dSRodney W. Grimes * without specific prior written permission. 16df8bae1dSRodney W. Grimes * 17df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27df8bae1dSRodney W. Grimes * SUCH DAMAGE. 28df8bae1dSRodney W. Grimes * 29df8bae1dSRodney W. Grimes * @(#)uipc_socket2.c 8.1 (Berkeley) 6/10/93 30df8bae1dSRodney W. Grimes */ 31df8bae1dSRodney W. Grimes 32677b542eSDavid E. O'Brien #include <sys/cdefs.h> 33677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 34677b542eSDavid E. O'Brien 355b86eac4SJesper Skriver #include "opt_param.h" 36335654d7SRobert Watson 37df8bae1dSRodney W. Grimes #include <sys/param.h> 38960ed29cSSeigo Tanimura #include <sys/aio.h> /* for aio_swake proto */ 39ff5c09daSGarrett Wollman #include <sys/kernel.h> 40fb919e4dSMark Murray #include <sys/lock.h> 418ec07310SGleb Smirnoff #include <sys/malloc.h> 42df8bae1dSRodney W. Grimes #include <sys/mbuf.h> 43960ed29cSSeigo Tanimura #include <sys/mutex.h> 44fb919e4dSMark Murray #include <sys/proc.h> 45df8bae1dSRodney W. Grimes #include <sys/protosw.h> 462f9a2132SBrian Feldman #include <sys/resourcevar.h> 47960ed29cSSeigo Tanimura #include <sys/signalvar.h> 48df8bae1dSRodney W. Grimes #include <sys/socket.h> 49df8bae1dSRodney W. Grimes #include <sys/socketvar.h> 507abab911SRobert Watson #include <sys/sx.h> 51ff5c09daSGarrett Wollman #include <sys/sysctl.h> 5226f9a767SRodney W. Grimes 53f14cce87SRobert Watson /* 54f14cce87SRobert Watson * Function pointer set by the AIO routines so that the socket buffer code 55f14cce87SRobert Watson * can call back into the AIO module if it is loaded. 56f14cce87SRobert Watson */ 5721d56e9cSAlfred Perlstein void (*aio_swake)(struct socket *, struct sockbuf *); 5821d56e9cSAlfred Perlstein 59df8bae1dSRodney W. Grimes /* 60f14cce87SRobert Watson * Primitive routines for operating on socket buffers 61df8bae1dSRodney W. Grimes */ 62df8bae1dSRodney W. Grimes 6379cb7eb4SDavid Greenman u_long sb_max = SB_MAX; 6458d14daeSMohan Srinivasan u_long sb_max_adj = 65b233773bSBjoern A. Zeeb (quad_t)SB_MAX * MCLBYTES / (MSIZE + MCLBYTES); /* adjusted sb_max */ 66df8bae1dSRodney W. Grimes 674b29bc4fSGarrett Wollman static u_long sb_efficiency = 8; /* parameter for sbreserve() */ 684b29bc4fSGarrett Wollman 691d2df300SGleb Smirnoff static struct mbuf *sbcut_internal(struct sockbuf *sb, int len); 70050ac265SRobert Watson static void sbflush_internal(struct sockbuf *sb); 71eaa6dfbcSRobert Watson 72df8bae1dSRodney W. Grimes /* 73829fae90SGleb Smirnoff * Our own version of m_clrprotoflags(), that can preserve M_NOTREADY. 74829fae90SGleb Smirnoff */ 75829fae90SGleb Smirnoff static void 76829fae90SGleb Smirnoff sbm_clrprotoflags(struct mbuf *m, int flags) 77829fae90SGleb Smirnoff { 78829fae90SGleb Smirnoff int mask; 79829fae90SGleb Smirnoff 80829fae90SGleb Smirnoff mask = ~M_PROTOFLAGS; 81829fae90SGleb Smirnoff if (flags & PRUS_NOTREADY) 82829fae90SGleb Smirnoff mask |= M_NOTREADY; 83829fae90SGleb Smirnoff while (m) { 84829fae90SGleb Smirnoff m->m_flags &= mask; 85829fae90SGleb Smirnoff m = m->m_next; 86829fae90SGleb Smirnoff } 87829fae90SGleb Smirnoff } 88829fae90SGleb Smirnoff 89829fae90SGleb Smirnoff /* 900f9d0a73SGleb Smirnoff * Mark ready "count" mbufs starting with "m". 910f9d0a73SGleb Smirnoff */ 920f9d0a73SGleb Smirnoff int 930f9d0a73SGleb Smirnoff sbready(struct sockbuf *sb, struct mbuf *m, int count) 940f9d0a73SGleb Smirnoff { 950f9d0a73SGleb Smirnoff u_int blocker; 960f9d0a73SGleb Smirnoff 970f9d0a73SGleb Smirnoff SOCKBUF_LOCK_ASSERT(sb); 980f9d0a73SGleb Smirnoff KASSERT(sb->sb_fnrdy != NULL, ("%s: sb %p NULL fnrdy", __func__, sb)); 990f9d0a73SGleb Smirnoff 1000f9d0a73SGleb Smirnoff blocker = (sb->sb_fnrdy == m) ? M_BLOCKED : 0; 1010f9d0a73SGleb Smirnoff 1020f9d0a73SGleb Smirnoff for (int i = 0; i < count; i++, m = m->m_next) { 1030f9d0a73SGleb Smirnoff KASSERT(m->m_flags & M_NOTREADY, 1040f9d0a73SGleb Smirnoff ("%s: m %p !M_NOTREADY", __func__, m)); 1050f9d0a73SGleb Smirnoff m->m_flags &= ~(M_NOTREADY | blocker); 1060f9d0a73SGleb Smirnoff if (blocker) 1070f9d0a73SGleb Smirnoff sb->sb_acc += m->m_len; 1080f9d0a73SGleb Smirnoff } 1090f9d0a73SGleb Smirnoff 1100f9d0a73SGleb Smirnoff if (!blocker) 1110f9d0a73SGleb Smirnoff return (EINPROGRESS); 1120f9d0a73SGleb Smirnoff 1130f9d0a73SGleb Smirnoff /* This one was blocking all the queue. */ 1140f9d0a73SGleb Smirnoff for (; m && (m->m_flags & M_NOTREADY) == 0; m = m->m_next) { 1150f9d0a73SGleb Smirnoff KASSERT(m->m_flags & M_BLOCKED, 1160f9d0a73SGleb Smirnoff ("%s: m %p !M_BLOCKED", __func__, m)); 1170f9d0a73SGleb Smirnoff m->m_flags &= ~M_BLOCKED; 1180f9d0a73SGleb Smirnoff sb->sb_acc += m->m_len; 1190f9d0a73SGleb Smirnoff } 1200f9d0a73SGleb Smirnoff 1210f9d0a73SGleb Smirnoff sb->sb_fnrdy = m; 1220f9d0a73SGleb Smirnoff 1230f9d0a73SGleb Smirnoff return (0); 1240f9d0a73SGleb Smirnoff } 1250f9d0a73SGleb Smirnoff 1260f9d0a73SGleb Smirnoff /* 1278967b220SGleb Smirnoff * Adjust sockbuf state reflecting allocation of m. 1288967b220SGleb Smirnoff */ 1298967b220SGleb Smirnoff void 1308967b220SGleb Smirnoff sballoc(struct sockbuf *sb, struct mbuf *m) 1318967b220SGleb Smirnoff { 1328967b220SGleb Smirnoff 1338967b220SGleb Smirnoff SOCKBUF_LOCK_ASSERT(sb); 1348967b220SGleb Smirnoff 1350f9d0a73SGleb Smirnoff sb->sb_ccc += m->m_len; 1360f9d0a73SGleb Smirnoff 1370f9d0a73SGleb Smirnoff if (sb->sb_fnrdy == NULL) { 1380f9d0a73SGleb Smirnoff if (m->m_flags & M_NOTREADY) 1390f9d0a73SGleb Smirnoff sb->sb_fnrdy = m; 1400f9d0a73SGleb Smirnoff else 1410f9d0a73SGleb Smirnoff sb->sb_acc += m->m_len; 1420f9d0a73SGleb Smirnoff } else 1430f9d0a73SGleb Smirnoff m->m_flags |= M_BLOCKED; 1448967b220SGleb Smirnoff 1458967b220SGleb Smirnoff if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 1468967b220SGleb Smirnoff sb->sb_ctl += m->m_len; 1478967b220SGleb Smirnoff 1488967b220SGleb Smirnoff sb->sb_mbcnt += MSIZE; 1498967b220SGleb Smirnoff sb->sb_mcnt += 1; 1508967b220SGleb Smirnoff 1518967b220SGleb Smirnoff if (m->m_flags & M_EXT) { 1528967b220SGleb Smirnoff sb->sb_mbcnt += m->m_ext.ext_size; 1538967b220SGleb Smirnoff sb->sb_ccnt += 1; 1548967b220SGleb Smirnoff } 1558967b220SGleb Smirnoff } 1568967b220SGleb Smirnoff 1578967b220SGleb Smirnoff /* 1588967b220SGleb Smirnoff * Adjust sockbuf state reflecting freeing of m. 1598967b220SGleb Smirnoff */ 1608967b220SGleb Smirnoff void 1618967b220SGleb Smirnoff sbfree(struct sockbuf *sb, struct mbuf *m) 1628967b220SGleb Smirnoff { 1638967b220SGleb Smirnoff 1648967b220SGleb Smirnoff #if 0 /* XXX: not yet: soclose() call path comes here w/o lock. */ 1658967b220SGleb Smirnoff SOCKBUF_LOCK_ASSERT(sb); 1668967b220SGleb Smirnoff #endif 1678967b220SGleb Smirnoff 1680f9d0a73SGleb Smirnoff sb->sb_ccc -= m->m_len; 1690f9d0a73SGleb Smirnoff 1700f9d0a73SGleb Smirnoff if (!(m->m_flags & M_NOTAVAIL)) 1710f9d0a73SGleb Smirnoff sb->sb_acc -= m->m_len; 1720f9d0a73SGleb Smirnoff 1730f9d0a73SGleb Smirnoff if (m == sb->sb_fnrdy) { 1740f9d0a73SGleb Smirnoff struct mbuf *n; 1750f9d0a73SGleb Smirnoff 1760f9d0a73SGleb Smirnoff KASSERT(m->m_flags & M_NOTREADY, 1770f9d0a73SGleb Smirnoff ("%s: m %p !M_NOTREADY", __func__, m)); 1780f9d0a73SGleb Smirnoff 1790f9d0a73SGleb Smirnoff n = m->m_next; 1800f9d0a73SGleb Smirnoff while (n != NULL && !(n->m_flags & M_NOTREADY)) { 1810f9d0a73SGleb Smirnoff n->m_flags &= ~M_BLOCKED; 1820f9d0a73SGleb Smirnoff sb->sb_acc += n->m_len; 1830f9d0a73SGleb Smirnoff n = n->m_next; 1840f9d0a73SGleb Smirnoff } 1850f9d0a73SGleb Smirnoff sb->sb_fnrdy = n; 1860f9d0a73SGleb Smirnoff } 1878967b220SGleb Smirnoff 1888967b220SGleb Smirnoff if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 1898967b220SGleb Smirnoff sb->sb_ctl -= m->m_len; 1908967b220SGleb Smirnoff 1918967b220SGleb Smirnoff sb->sb_mbcnt -= MSIZE; 1928967b220SGleb Smirnoff sb->sb_mcnt -= 1; 1938967b220SGleb Smirnoff if (m->m_flags & M_EXT) { 1948967b220SGleb Smirnoff sb->sb_mbcnt -= m->m_ext.ext_size; 1958967b220SGleb Smirnoff sb->sb_ccnt -= 1; 1968967b220SGleb Smirnoff } 1978967b220SGleb Smirnoff 1988967b220SGleb Smirnoff if (sb->sb_sndptr == m) { 1998967b220SGleb Smirnoff sb->sb_sndptr = NULL; 2008967b220SGleb Smirnoff sb->sb_sndptroff = 0; 2018967b220SGleb Smirnoff } 2028967b220SGleb Smirnoff if (sb->sb_sndptroff != 0) 2038967b220SGleb Smirnoff sb->sb_sndptroff -= m->m_len; 2048967b220SGleb Smirnoff } 2058967b220SGleb Smirnoff 2068967b220SGleb Smirnoff /* 207050ac265SRobert Watson * Socantsendmore indicates that no more data will be sent on the socket; it 208050ac265SRobert Watson * would normally be applied to a socket when the user informs the system 209050ac265SRobert Watson * that no more data is to be sent, by the protocol code (in case 210050ac265SRobert Watson * PRU_SHUTDOWN). Socantrcvmore indicates that no more data will be 211050ac265SRobert Watson * received, and will normally be applied to the socket by a protocol when it 212050ac265SRobert Watson * detects that the peer will send no more data. Data queued for reading in 213050ac265SRobert Watson * the socket may yet be read. 214df8bae1dSRodney W. Grimes */ 215a34b7046SRobert Watson void 216050ac265SRobert Watson socantsendmore_locked(struct socket *so) 217a34b7046SRobert Watson { 218a34b7046SRobert Watson 219a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(&so->so_snd); 220a34b7046SRobert Watson 221a34b7046SRobert Watson so->so_snd.sb_state |= SBS_CANTSENDMORE; 222a34b7046SRobert Watson sowwakeup_locked(so); 223a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_snd), MA_NOTOWNED); 224a34b7046SRobert Watson } 225df8bae1dSRodney W. Grimes 22626f9a767SRodney W. Grimes void 227050ac265SRobert Watson socantsendmore(struct socket *so) 228df8bae1dSRodney W. Grimes { 229df8bae1dSRodney W. Grimes 230a34b7046SRobert Watson SOCKBUF_LOCK(&so->so_snd); 231a34b7046SRobert Watson socantsendmore_locked(so); 232a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_snd), MA_NOTOWNED); 233a34b7046SRobert Watson } 234a34b7046SRobert Watson 235a34b7046SRobert Watson void 236050ac265SRobert Watson socantrcvmore_locked(struct socket *so) 237a34b7046SRobert Watson { 238a34b7046SRobert Watson 239a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(&so->so_rcv); 240a34b7046SRobert Watson 241a34b7046SRobert Watson so->so_rcv.sb_state |= SBS_CANTRCVMORE; 242a34b7046SRobert Watson sorwakeup_locked(so); 243a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_rcv), MA_NOTOWNED); 244df8bae1dSRodney W. Grimes } 245df8bae1dSRodney W. Grimes 24626f9a767SRodney W. Grimes void 247050ac265SRobert Watson socantrcvmore(struct socket *so) 248df8bae1dSRodney W. Grimes { 249df8bae1dSRodney W. Grimes 250a34b7046SRobert Watson SOCKBUF_LOCK(&so->so_rcv); 251a34b7046SRobert Watson socantrcvmore_locked(so); 252a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(&so->so_rcv), MA_NOTOWNED); 253df8bae1dSRodney W. Grimes } 254df8bae1dSRodney W. Grimes 255df8bae1dSRodney W. Grimes /* 256df8bae1dSRodney W. Grimes * Wait for data to arrive at/drain from a socket buffer. 257df8bae1dSRodney W. Grimes */ 25826f9a767SRodney W. Grimes int 259050ac265SRobert Watson sbwait(struct sockbuf *sb) 260df8bae1dSRodney W. Grimes { 261df8bae1dSRodney W. Grimes 26231f555a1SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 26331f555a1SRobert Watson 264df8bae1dSRodney W. Grimes sb->sb_flags |= SB_WAIT; 2650f9d0a73SGleb Smirnoff return (msleep_sbt(&sb->sb_acc, &sb->sb_mtx, 26647daf5d5SBruce Evans (sb->sb_flags & SB_NOINTR) ? PSOCK : PSOCK | PCATCH, "sbwait", 2677729cbf1SDavide Italiano sb->sb_timeo, 0, 0)); 268df8bae1dSRodney W. Grimes } 269df8bae1dSRodney W. Grimes 27026f9a767SRodney W. Grimes int 2717abab911SRobert Watson sblock(struct sockbuf *sb, int flags) 272df8bae1dSRodney W. Grimes { 273df8bae1dSRodney W. Grimes 274265de5bbSRobert Watson KASSERT((flags & SBL_VALID) == flags, 275265de5bbSRobert Watson ("sblock: flags invalid (0x%x)", flags)); 276265de5bbSRobert Watson 277265de5bbSRobert Watson if (flags & SBL_WAIT) { 278265de5bbSRobert Watson if ((sb->sb_flags & SB_NOINTR) || 279265de5bbSRobert Watson (flags & SBL_NOINTR)) { 2807abab911SRobert Watson sx_xlock(&sb->sb_sx); 281df8bae1dSRodney W. Grimes return (0); 282049c3b6cSRobert Watson } 283049c3b6cSRobert Watson return (sx_xlock_sig(&sb->sb_sx)); 2847abab911SRobert Watson } else { 2857abab911SRobert Watson if (sx_try_xlock(&sb->sb_sx) == 0) 2867abab911SRobert Watson return (EWOULDBLOCK); 2877abab911SRobert Watson return (0); 2887abab911SRobert Watson } 2897abab911SRobert Watson } 2907abab911SRobert Watson 2917abab911SRobert Watson void 2927abab911SRobert Watson sbunlock(struct sockbuf *sb) 2937abab911SRobert Watson { 2947abab911SRobert Watson 2957abab911SRobert Watson sx_xunlock(&sb->sb_sx); 296df8bae1dSRodney W. Grimes } 297df8bae1dSRodney W. Grimes 298df8bae1dSRodney W. Grimes /* 299050ac265SRobert Watson * Wakeup processes waiting on a socket buffer. Do asynchronous notification 300050ac265SRobert Watson * via SIGIO if the socket has the SS_ASYNC flag set. 301a34b7046SRobert Watson * 302a34b7046SRobert Watson * Called with the socket buffer lock held; will release the lock by the end 303a34b7046SRobert Watson * of the function. This allows the caller to acquire the socket buffer lock 304a34b7046SRobert Watson * while testing for the need for various sorts of wakeup and hold it through 305a34b7046SRobert Watson * to the point where it's no longer required. We currently hold the lock 306a34b7046SRobert Watson * through calls out to other subsystems (with the exception of kqueue), and 307a34b7046SRobert Watson * then release it to avoid lock order issues. It's not clear that's 308a34b7046SRobert Watson * correct. 309df8bae1dSRodney W. Grimes */ 31026f9a767SRodney W. Grimes void 311050ac265SRobert Watson sowakeup(struct socket *so, struct sockbuf *sb) 312df8bae1dSRodney W. Grimes { 31374fb0ba7SJohn Baldwin int ret; 314d48d4b25SSeigo Tanimura 315a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 316a34b7046SRobert Watson 317512824f8SSeigo Tanimura selwakeuppri(&sb->sb_sel, PSOCK); 318ace8398dSJeff Roberson if (!SEL_WAITING(&sb->sb_sel)) 319df8bae1dSRodney W. Grimes sb->sb_flags &= ~SB_SEL; 320df8bae1dSRodney W. Grimes if (sb->sb_flags & SB_WAIT) { 321df8bae1dSRodney W. Grimes sb->sb_flags &= ~SB_WAIT; 3220f9d0a73SGleb Smirnoff wakeup(&sb->sb_acc); 323df8bae1dSRodney W. Grimes } 324ad3b9257SJohn-Mark Gurney KNOTE_LOCKED(&sb->sb_sel.si_note, 0); 32574fb0ba7SJohn Baldwin if (sb->sb_upcall != NULL) { 326eb1b1807SGleb Smirnoff ret = sb->sb_upcall(so, sb->sb_upcallarg, M_NOWAIT); 32774fb0ba7SJohn Baldwin if (ret == SU_ISCONNECTED) { 32874fb0ba7SJohn Baldwin KASSERT(sb == &so->so_rcv, 32974fb0ba7SJohn Baldwin ("SO_SND upcall returned SU_ISCONNECTED")); 33074fb0ba7SJohn Baldwin soupcall_clear(so, SO_RCV); 33174fb0ba7SJohn Baldwin } 33274fb0ba7SJohn Baldwin } else 33374fb0ba7SJohn Baldwin ret = SU_OK; 3344cc20ab1SSeigo Tanimura if (sb->sb_flags & SB_AIO) 335f3215338SJohn Baldwin sowakeup_aio(so, sb); 33674fb0ba7SJohn Baldwin SOCKBUF_UNLOCK(sb); 33774fb0ba7SJohn Baldwin if (ret == SU_ISCONNECTED) 33874fb0ba7SJohn Baldwin soisconnected(so); 33974fb0ba7SJohn Baldwin if ((so->so_state & SS_ASYNC) && so->so_sigio != NULL) 34074fb0ba7SJohn Baldwin pgsigio(&so->so_sigio, SIGIO, 0); 341a34b7046SRobert Watson mtx_assert(SOCKBUF_MTX(sb), MA_NOTOWNED); 342df8bae1dSRodney W. Grimes } 343df8bae1dSRodney W. Grimes 344df8bae1dSRodney W. Grimes /* 345df8bae1dSRodney W. Grimes * Socket buffer (struct sockbuf) utility routines. 346df8bae1dSRodney W. Grimes * 347050ac265SRobert Watson * Each socket contains two socket buffers: one for sending data and one for 348050ac265SRobert Watson * receiving data. Each buffer contains a queue of mbufs, information about 349050ac265SRobert Watson * the number of mbufs and amount of data in the queue, and other fields 350050ac265SRobert Watson * allowing select() statements and notification on data availability to be 351050ac265SRobert Watson * implemented. 352df8bae1dSRodney W. Grimes * 353050ac265SRobert Watson * Data stored in a socket buffer is maintained as a list of records. Each 354050ac265SRobert Watson * record is a list of mbufs chained together with the m_next field. Records 355050ac265SRobert Watson * are chained together with the m_nextpkt field. The upper level routine 356050ac265SRobert Watson * soreceive() expects the following conventions to be observed when placing 357050ac265SRobert Watson * information in the receive buffer: 358df8bae1dSRodney W. Grimes * 359050ac265SRobert Watson * 1. If the protocol requires each message be preceded by the sender's name, 360050ac265SRobert Watson * then a record containing that name must be present before any 361050ac265SRobert Watson * associated data (mbuf's must be of type MT_SONAME). 362050ac265SRobert Watson * 2. If the protocol supports the exchange of ``access rights'' (really just 363050ac265SRobert Watson * additional data associated with the message), and there are ``rights'' 364050ac265SRobert Watson * to be received, then a record containing this data should be present 365050ac265SRobert Watson * (mbuf's must be of type MT_RIGHTS). 366050ac265SRobert Watson * 3. If a name or rights record exists, then it must be followed by a data 367050ac265SRobert Watson * record, perhaps of zero length. 368df8bae1dSRodney W. Grimes * 369df8bae1dSRodney W. Grimes * Before using a new socket structure it is first necessary to reserve 370df8bae1dSRodney W. Grimes * buffer space to the socket, by calling sbreserve(). This should commit 371df8bae1dSRodney W. Grimes * some of the available buffer space in the system buffer pool for the 372050ac265SRobert Watson * socket (currently, it does nothing but enforce limits). The space should 373050ac265SRobert Watson * be released by calling sbrelease() when the socket is destroyed. 374df8bae1dSRodney W. Grimes */ 37526f9a767SRodney W. Grimes int 376050ac265SRobert Watson soreserve(struct socket *so, u_long sndcc, u_long rcvcc) 377df8bae1dSRodney W. Grimes { 378b40ce416SJulian Elischer struct thread *td = curthread; 379df8bae1dSRodney W. Grimes 3803f11a2f3SRobert Watson SOCKBUF_LOCK(&so->so_snd); 3819535efc0SRobert Watson SOCKBUF_LOCK(&so->so_rcv); 3823f11a2f3SRobert Watson if (sbreserve_locked(&so->so_snd, sndcc, so, td) == 0) 3833f11a2f3SRobert Watson goto bad; 3843f11a2f3SRobert Watson if (sbreserve_locked(&so->so_rcv, rcvcc, so, td) == 0) 3853f11a2f3SRobert Watson goto bad2; 386df8bae1dSRodney W. Grimes if (so->so_rcv.sb_lowat == 0) 387df8bae1dSRodney W. Grimes so->so_rcv.sb_lowat = 1; 388df8bae1dSRodney W. Grimes if (so->so_snd.sb_lowat == 0) 389df8bae1dSRodney W. Grimes so->so_snd.sb_lowat = MCLBYTES; 390df8bae1dSRodney W. Grimes if (so->so_snd.sb_lowat > so->so_snd.sb_hiwat) 391df8bae1dSRodney W. Grimes so->so_snd.sb_lowat = so->so_snd.sb_hiwat; 3923f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_rcv); 3939535efc0SRobert Watson SOCKBUF_UNLOCK(&so->so_snd); 394df8bae1dSRodney W. Grimes return (0); 395df8bae1dSRodney W. Grimes bad2: 3963f11a2f3SRobert Watson sbrelease_locked(&so->so_snd, so); 397df8bae1dSRodney W. Grimes bad: 3983f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_rcv); 3993f11a2f3SRobert Watson SOCKBUF_UNLOCK(&so->so_snd); 400df8bae1dSRodney W. Grimes return (ENOBUFS); 401df8bae1dSRodney W. Grimes } 402df8bae1dSRodney W. Grimes 40379cb7eb4SDavid Greenman static int 40479cb7eb4SDavid Greenman sysctl_handle_sb_max(SYSCTL_HANDLER_ARGS) 40579cb7eb4SDavid Greenman { 40679cb7eb4SDavid Greenman int error = 0; 40786a93d51SJohn Baldwin u_long tmp_sb_max = sb_max; 40879cb7eb4SDavid Greenman 40986a93d51SJohn Baldwin error = sysctl_handle_long(oidp, &tmp_sb_max, arg2, req); 41079cb7eb4SDavid Greenman if (error || !req->newptr) 41179cb7eb4SDavid Greenman return (error); 41286a93d51SJohn Baldwin if (tmp_sb_max < MSIZE + MCLBYTES) 41379cb7eb4SDavid Greenman return (EINVAL); 41486a93d51SJohn Baldwin sb_max = tmp_sb_max; 41579cb7eb4SDavid Greenman sb_max_adj = (u_quad_t)sb_max * MCLBYTES / (MSIZE + MCLBYTES); 41679cb7eb4SDavid Greenman return (0); 41779cb7eb4SDavid Greenman } 41879cb7eb4SDavid Greenman 419df8bae1dSRodney W. Grimes /* 420050ac265SRobert Watson * Allot mbufs to a sockbuf. Attempt to scale mbmax so that mbcnt doesn't 421050ac265SRobert Watson * become limiting if buffering efficiency is near the normal case. 422df8bae1dSRodney W. Grimes */ 42326f9a767SRodney W. Grimes int 424050ac265SRobert Watson sbreserve_locked(struct sockbuf *sb, u_long cc, struct socket *so, 425050ac265SRobert Watson struct thread *td) 426df8bae1dSRodney W. Grimes { 42791d5354aSJohn Baldwin rlim_t sbsize_limit; 428ecf72308SBrian Feldman 4293f11a2f3SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 4303f11a2f3SRobert Watson 431ecf72308SBrian Feldman /* 4327978014dSRobert Watson * When a thread is passed, we take into account the thread's socket 4337978014dSRobert Watson * buffer size limit. The caller will generally pass curthread, but 4347978014dSRobert Watson * in the TCP input path, NULL will be passed to indicate that no 4357978014dSRobert Watson * appropriate thread resource limits are available. In that case, 4367978014dSRobert Watson * we don't apply a process limit. 437ecf72308SBrian Feldman */ 43879cb7eb4SDavid Greenman if (cc > sb_max_adj) 439df8bae1dSRodney W. Grimes return (0); 44091d5354aSJohn Baldwin if (td != NULL) { 441f6f6d240SMateusz Guzik sbsize_limit = lim_cur(td, RLIMIT_SBSIZE); 44291d5354aSJohn Baldwin } else 44391d5354aSJohn Baldwin sbsize_limit = RLIM_INFINITY; 444f535380cSDon Lewis if (!chgsbsize(so->so_cred->cr_uidinfo, &sb->sb_hiwat, cc, 44591d5354aSJohn Baldwin sbsize_limit)) 446ecf72308SBrian Feldman return (0); 4474b29bc4fSGarrett Wollman sb->sb_mbmax = min(cc * sb_efficiency, sb_max); 448df8bae1dSRodney W. Grimes if (sb->sb_lowat > sb->sb_hiwat) 449df8bae1dSRodney W. Grimes sb->sb_lowat = sb->sb_hiwat; 450df8bae1dSRodney W. Grimes return (1); 451df8bae1dSRodney W. Grimes } 452df8bae1dSRodney W. Grimes 4533f11a2f3SRobert Watson int 454050ac265SRobert Watson sbreserve(struct sockbuf *sb, u_long cc, struct socket *so, 455050ac265SRobert Watson struct thread *td) 4563f11a2f3SRobert Watson { 4573f11a2f3SRobert Watson int error; 4583f11a2f3SRobert Watson 4593f11a2f3SRobert Watson SOCKBUF_LOCK(sb); 4603f11a2f3SRobert Watson error = sbreserve_locked(sb, cc, so, td); 4613f11a2f3SRobert Watson SOCKBUF_UNLOCK(sb); 4623f11a2f3SRobert Watson return (error); 4633f11a2f3SRobert Watson } 4643f11a2f3SRobert Watson 465df8bae1dSRodney W. Grimes /* 466df8bae1dSRodney W. Grimes * Free mbufs held by a socket, and reserved mbuf space. 467df8bae1dSRodney W. Grimes */ 4683f0bfcccSRobert Watson void 469050ac265SRobert Watson sbrelease_internal(struct sockbuf *sb, struct socket *so) 470eaa6dfbcSRobert Watson { 471eaa6dfbcSRobert Watson 472eaa6dfbcSRobert Watson sbflush_internal(sb); 473eaa6dfbcSRobert Watson (void)chgsbsize(so->so_cred->cr_uidinfo, &sb->sb_hiwat, 0, 474eaa6dfbcSRobert Watson RLIM_INFINITY); 475eaa6dfbcSRobert Watson sb->sb_mbmax = 0; 476eaa6dfbcSRobert Watson } 477eaa6dfbcSRobert Watson 47826f9a767SRodney W. Grimes void 479050ac265SRobert Watson sbrelease_locked(struct sockbuf *sb, struct socket *so) 480df8bae1dSRodney W. Grimes { 481df8bae1dSRodney W. Grimes 482a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 483a34b7046SRobert Watson 484eaa6dfbcSRobert Watson sbrelease_internal(sb, so); 485df8bae1dSRodney W. Grimes } 486df8bae1dSRodney W. Grimes 487a34b7046SRobert Watson void 488050ac265SRobert Watson sbrelease(struct sockbuf *sb, struct socket *so) 489a34b7046SRobert Watson { 490a34b7046SRobert Watson 491a34b7046SRobert Watson SOCKBUF_LOCK(sb); 492a34b7046SRobert Watson sbrelease_locked(sb, so); 493a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 494a34b7046SRobert Watson } 495eaa6dfbcSRobert Watson 496eaa6dfbcSRobert Watson void 497050ac265SRobert Watson sbdestroy(struct sockbuf *sb, struct socket *so) 498eaa6dfbcSRobert Watson { 499eaa6dfbcSRobert Watson 500eaa6dfbcSRobert Watson sbrelease_internal(sb, so); 501eaa6dfbcSRobert Watson } 502eaa6dfbcSRobert Watson 503df8bae1dSRodney W. Grimes /* 504050ac265SRobert Watson * Routines to add and remove data from an mbuf queue. 505df8bae1dSRodney W. Grimes * 506050ac265SRobert Watson * The routines sbappend() or sbappendrecord() are normally called to append 507050ac265SRobert Watson * new mbufs to a socket buffer, after checking that adequate space is 508050ac265SRobert Watson * available, comparing the function sbspace() with the amount of data to be 509050ac265SRobert Watson * added. sbappendrecord() differs from sbappend() in that data supplied is 510050ac265SRobert Watson * treated as the beginning of a new record. To place a sender's address, 511050ac265SRobert Watson * optional access rights, and data in a socket receive buffer, 512050ac265SRobert Watson * sbappendaddr() should be used. To place access rights and data in a 513050ac265SRobert Watson * socket receive buffer, sbappendrights() should be used. In either case, 514050ac265SRobert Watson * the new data begins a new record. Note that unlike sbappend() and 515050ac265SRobert Watson * sbappendrecord(), these routines check for the caller that there will be 516050ac265SRobert Watson * enough space to store the data. Each fails if there is not enough space, 517050ac265SRobert Watson * or if it cannot find mbufs to store additional information in. 518df8bae1dSRodney W. Grimes * 519050ac265SRobert Watson * Reliable protocols may use the socket send buffer to hold data awaiting 520050ac265SRobert Watson * acknowledgement. Data is normally copied from a socket send buffer in a 521050ac265SRobert Watson * protocol with m_copy for output to a peer, and then removing the data from 522050ac265SRobert Watson * the socket buffer with sbdrop() or sbdroprecord() when the data is 523050ac265SRobert Watson * acknowledged by the peer. 524df8bae1dSRodney W. Grimes */ 525395bb186SSam Leffler #ifdef SOCKBUF_DEBUG 526395bb186SSam Leffler void 527395bb186SSam Leffler sblastrecordchk(struct sockbuf *sb, const char *file, int line) 528395bb186SSam Leffler { 529395bb186SSam Leffler struct mbuf *m = sb->sb_mb; 530395bb186SSam Leffler 531a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 532a34b7046SRobert Watson 533395bb186SSam Leffler while (m && m->m_nextpkt) 534395bb186SSam Leffler m = m->m_nextpkt; 535395bb186SSam Leffler 536395bb186SSam Leffler if (m != sb->sb_lastrecord) { 537395bb186SSam Leffler printf("%s: sb_mb %p sb_lastrecord %p last %p\n", 538395bb186SSam Leffler __func__, sb->sb_mb, sb->sb_lastrecord, m); 539395bb186SSam Leffler printf("packet chain:\n"); 540395bb186SSam Leffler for (m = sb->sb_mb; m != NULL; m = m->m_nextpkt) 541395bb186SSam Leffler printf("\t%p\n", m); 542395bb186SSam Leffler panic("%s from %s:%u", __func__, file, line); 543395bb186SSam Leffler } 544395bb186SSam Leffler } 545395bb186SSam Leffler 546395bb186SSam Leffler void 547395bb186SSam Leffler sblastmbufchk(struct sockbuf *sb, const char *file, int line) 548395bb186SSam Leffler { 549395bb186SSam Leffler struct mbuf *m = sb->sb_mb; 550395bb186SSam Leffler struct mbuf *n; 551395bb186SSam Leffler 552a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 553a34b7046SRobert Watson 554395bb186SSam Leffler while (m && m->m_nextpkt) 555395bb186SSam Leffler m = m->m_nextpkt; 556395bb186SSam Leffler 557395bb186SSam Leffler while (m && m->m_next) 558395bb186SSam Leffler m = m->m_next; 559395bb186SSam Leffler 560395bb186SSam Leffler if (m != sb->sb_mbtail) { 561395bb186SSam Leffler printf("%s: sb_mb %p sb_mbtail %p last %p\n", 562395bb186SSam Leffler __func__, sb->sb_mb, sb->sb_mbtail, m); 563395bb186SSam Leffler printf("packet tree:\n"); 564395bb186SSam Leffler for (m = sb->sb_mb; m != NULL; m = m->m_nextpkt) { 565395bb186SSam Leffler printf("\t"); 566395bb186SSam Leffler for (n = m; n != NULL; n = n->m_next) 567395bb186SSam Leffler printf("%p ", n); 568395bb186SSam Leffler printf("\n"); 569395bb186SSam Leffler } 570395bb186SSam Leffler panic("%s from %s:%u", __func__, file, line); 571395bb186SSam Leffler } 572395bb186SSam Leffler } 573395bb186SSam Leffler #endif /* SOCKBUF_DEBUG */ 574395bb186SSam Leffler 575395bb186SSam Leffler #define SBLINKRECORD(sb, m0) do { \ 576a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); \ 577395bb186SSam Leffler if ((sb)->sb_lastrecord != NULL) \ 578395bb186SSam Leffler (sb)->sb_lastrecord->m_nextpkt = (m0); \ 579395bb186SSam Leffler else \ 580395bb186SSam Leffler (sb)->sb_mb = (m0); \ 581395bb186SSam Leffler (sb)->sb_lastrecord = (m0); \ 582395bb186SSam Leffler } while (/*CONSTCOND*/0) 583395bb186SSam Leffler 584df8bae1dSRodney W. Grimes /* 585050ac265SRobert Watson * Append mbuf chain m to the last record in the socket buffer sb. The 586050ac265SRobert Watson * additional space associated the mbuf chain is recorded in sb. Empty mbufs 587050ac265SRobert Watson * are discarded and mbufs are compacted where possible. 588df8bae1dSRodney W. Grimes */ 58926f9a767SRodney W. Grimes void 590829fae90SGleb Smirnoff sbappend_locked(struct sockbuf *sb, struct mbuf *m, int flags) 591df8bae1dSRodney W. Grimes { 592050ac265SRobert Watson struct mbuf *n; 593df8bae1dSRodney W. Grimes 594a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 595a34b7046SRobert Watson 596b85f65afSPedro F. Giffuni if (m == NULL) 597df8bae1dSRodney W. Grimes return; 598829fae90SGleb Smirnoff sbm_clrprotoflags(m, flags); 599395bb186SSam Leffler SBLASTRECORDCHK(sb); 600797f2d22SPoul-Henning Kamp n = sb->sb_mb; 601797f2d22SPoul-Henning Kamp if (n) { 602df8bae1dSRodney W. Grimes while (n->m_nextpkt) 603df8bae1dSRodney W. Grimes n = n->m_nextpkt; 604df8bae1dSRodney W. Grimes do { 605df8bae1dSRodney W. Grimes if (n->m_flags & M_EOR) { 606a34b7046SRobert Watson sbappendrecord_locked(sb, m); /* XXXXXX!!!! */ 607df8bae1dSRodney W. Grimes return; 608df8bae1dSRodney W. Grimes } 609df8bae1dSRodney W. Grimes } while (n->m_next && (n = n->m_next)); 610395bb186SSam Leffler } else { 611395bb186SSam Leffler /* 612395bb186SSam Leffler * XXX Would like to simply use sb_mbtail here, but 613395bb186SSam Leffler * XXX I need to verify that I won't miss an EOR that 614395bb186SSam Leffler * XXX way. 615395bb186SSam Leffler */ 616395bb186SSam Leffler if ((n = sb->sb_lastrecord) != NULL) { 617395bb186SSam Leffler do { 618395bb186SSam Leffler if (n->m_flags & M_EOR) { 619a34b7046SRobert Watson sbappendrecord_locked(sb, m); /* XXXXXX!!!! */ 620395bb186SSam Leffler return; 621395bb186SSam Leffler } 622395bb186SSam Leffler } while (n->m_next && (n = n->m_next)); 623395bb186SSam Leffler } else { 624395bb186SSam Leffler /* 625395bb186SSam Leffler * If this is the first record in the socket buffer, 626395bb186SSam Leffler * it's also the last record. 627395bb186SSam Leffler */ 628395bb186SSam Leffler sb->sb_lastrecord = m; 629395bb186SSam Leffler } 630df8bae1dSRodney W. Grimes } 631df8bae1dSRodney W. Grimes sbcompress(sb, m, n); 632395bb186SSam Leffler SBLASTRECORDCHK(sb); 633395bb186SSam Leffler } 634395bb186SSam Leffler 635395bb186SSam Leffler /* 636050ac265SRobert Watson * Append mbuf chain m to the last record in the socket buffer sb. The 637050ac265SRobert Watson * additional space associated the mbuf chain is recorded in sb. Empty mbufs 638050ac265SRobert Watson * are discarded and mbufs are compacted where possible. 639a34b7046SRobert Watson */ 640a34b7046SRobert Watson void 641829fae90SGleb Smirnoff sbappend(struct sockbuf *sb, struct mbuf *m, int flags) 642a34b7046SRobert Watson { 643a34b7046SRobert Watson 644a34b7046SRobert Watson SOCKBUF_LOCK(sb); 645829fae90SGleb Smirnoff sbappend_locked(sb, m, flags); 646a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 647a34b7046SRobert Watson } 648a34b7046SRobert Watson 649a34b7046SRobert Watson /* 650050ac265SRobert Watson * This version of sbappend() should only be used when the caller absolutely 651050ac265SRobert Watson * knows that there will never be more than one record in the socket buffer, 652050ac265SRobert Watson * that is, a stream protocol (such as TCP). 653395bb186SSam Leffler */ 654395bb186SSam Leffler void 655651e4e6aSGleb Smirnoff sbappendstream_locked(struct sockbuf *sb, struct mbuf *m, int flags) 656395bb186SSam Leffler { 657a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 658395bb186SSam Leffler 659395bb186SSam Leffler KASSERT(m->m_nextpkt == NULL,("sbappendstream 0")); 660395bb186SSam Leffler KASSERT(sb->sb_mb == sb->sb_lastrecord,("sbappendstream 1")); 661395bb186SSam Leffler 662395bb186SSam Leffler SBLASTMBUFCHK(sb); 663395bb186SSam Leffler 664844cacd1SGleb Smirnoff /* Remove all packet headers and mbuf tags to get a pure data chain. */ 665651e4e6aSGleb Smirnoff m_demote(m, 1, flags & PRUS_NOTREADY ? M_NOTREADY : 0); 666844cacd1SGleb Smirnoff 667395bb186SSam Leffler sbcompress(sb, m, sb->sb_mbtail); 668395bb186SSam Leffler 669395bb186SSam Leffler sb->sb_lastrecord = sb->sb_mb; 670395bb186SSam Leffler SBLASTRECORDCHK(sb); 671df8bae1dSRodney W. Grimes } 672df8bae1dSRodney W. Grimes 673a34b7046SRobert Watson /* 674050ac265SRobert Watson * This version of sbappend() should only be used when the caller absolutely 675050ac265SRobert Watson * knows that there will never be more than one record in the socket buffer, 676050ac265SRobert Watson * that is, a stream protocol (such as TCP). 677a34b7046SRobert Watson */ 678a34b7046SRobert Watson void 679651e4e6aSGleb Smirnoff sbappendstream(struct sockbuf *sb, struct mbuf *m, int flags) 680a34b7046SRobert Watson { 681a34b7046SRobert Watson 682a34b7046SRobert Watson SOCKBUF_LOCK(sb); 683651e4e6aSGleb Smirnoff sbappendstream_locked(sb, m, flags); 684a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 685a34b7046SRobert Watson } 686a34b7046SRobert Watson 687df8bae1dSRodney W. Grimes #ifdef SOCKBUF_DEBUG 68826f9a767SRodney W. Grimes void 68957f43a45SGleb Smirnoff sbcheck(struct sockbuf *sb, const char *file, int line) 690df8bae1dSRodney W. Grimes { 6910f9d0a73SGleb Smirnoff struct mbuf *m, *n, *fnrdy; 6920f9d0a73SGleb Smirnoff u_long acc, ccc, mbcnt; 693df8bae1dSRodney W. Grimes 694a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 695a34b7046SRobert Watson 6960f9d0a73SGleb Smirnoff acc = ccc = mbcnt = 0; 6970f9d0a73SGleb Smirnoff fnrdy = NULL; 69857f43a45SGleb Smirnoff 6990931333fSBill Fenner for (m = sb->sb_mb; m; m = n) { 7000931333fSBill Fenner n = m->m_nextpkt; 7010931333fSBill Fenner for (; m; m = m->m_next) { 70257f43a45SGleb Smirnoff if (m->m_len == 0) { 70357f43a45SGleb Smirnoff printf("sb %p empty mbuf %p\n", sb, m); 70457f43a45SGleb Smirnoff goto fail; 70557f43a45SGleb Smirnoff } 7060f9d0a73SGleb Smirnoff if ((m->m_flags & M_NOTREADY) && fnrdy == NULL) { 7070f9d0a73SGleb Smirnoff if (m != sb->sb_fnrdy) { 7080f9d0a73SGleb Smirnoff printf("sb %p: fnrdy %p != m %p\n", 7090f9d0a73SGleb Smirnoff sb, sb->sb_fnrdy, m); 7100f9d0a73SGleb Smirnoff goto fail; 7110f9d0a73SGleb Smirnoff } 7120f9d0a73SGleb Smirnoff fnrdy = m; 7130f9d0a73SGleb Smirnoff } 7140f9d0a73SGleb Smirnoff if (fnrdy) { 7150f9d0a73SGleb Smirnoff if (!(m->m_flags & M_NOTAVAIL)) { 7160f9d0a73SGleb Smirnoff printf("sb %p: fnrdy %p, m %p is avail\n", 7170f9d0a73SGleb Smirnoff sb, sb->sb_fnrdy, m); 7180f9d0a73SGleb Smirnoff goto fail; 7190f9d0a73SGleb Smirnoff } 7200f9d0a73SGleb Smirnoff } else 7210f9d0a73SGleb Smirnoff acc += m->m_len; 7220f9d0a73SGleb Smirnoff ccc += m->m_len; 723df8bae1dSRodney W. Grimes mbcnt += MSIZE; 724313861b8SJulian Elischer if (m->m_flags & M_EXT) /*XXX*/ /* pretty sure this is bogus */ 725df8bae1dSRodney W. Grimes mbcnt += m->m_ext.ext_size; 7260931333fSBill Fenner } 727df8bae1dSRodney W. Grimes } 7280f9d0a73SGleb Smirnoff if (acc != sb->sb_acc || ccc != sb->sb_ccc || mbcnt != sb->sb_mbcnt) { 7290f9d0a73SGleb Smirnoff printf("acc %ld/%u ccc %ld/%u mbcnt %ld/%u\n", 7300f9d0a73SGleb Smirnoff acc, sb->sb_acc, ccc, sb->sb_ccc, mbcnt, sb->sb_mbcnt); 73157f43a45SGleb Smirnoff goto fail; 732df8bae1dSRodney W. Grimes } 73357f43a45SGleb Smirnoff return; 73457f43a45SGleb Smirnoff fail: 73557f43a45SGleb Smirnoff panic("%s from %s:%u", __func__, file, line); 736df8bae1dSRodney W. Grimes } 737df8bae1dSRodney W. Grimes #endif 738df8bae1dSRodney W. Grimes 739df8bae1dSRodney W. Grimes /* 740050ac265SRobert Watson * As above, except the mbuf chain begins a new record. 741df8bae1dSRodney W. Grimes */ 74226f9a767SRodney W. Grimes void 743050ac265SRobert Watson sbappendrecord_locked(struct sockbuf *sb, struct mbuf *m0) 744df8bae1dSRodney W. Grimes { 745050ac265SRobert Watson struct mbuf *m; 746df8bae1dSRodney W. Grimes 747a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 748a34b7046SRobert Watson 749b85f65afSPedro F. Giffuni if (m0 == NULL) 750df8bae1dSRodney W. Grimes return; 75153b680caSGleb Smirnoff m_clrprotoflags(m0); 752df8bae1dSRodney W. Grimes /* 753050ac265SRobert Watson * Put the first mbuf on the queue. Note this permits zero length 754050ac265SRobert Watson * records. 755df8bae1dSRodney W. Grimes */ 756df8bae1dSRodney W. Grimes sballoc(sb, m0); 757395bb186SSam Leffler SBLASTRECORDCHK(sb); 758395bb186SSam Leffler SBLINKRECORD(sb, m0); 759e72a94adSMaksim Yevmenkin sb->sb_mbtail = m0; 760df8bae1dSRodney W. Grimes m = m0->m_next; 761df8bae1dSRodney W. Grimes m0->m_next = 0; 762df8bae1dSRodney W. Grimes if (m && (m0->m_flags & M_EOR)) { 763df8bae1dSRodney W. Grimes m0->m_flags &= ~M_EOR; 764df8bae1dSRodney W. Grimes m->m_flags |= M_EOR; 765df8bae1dSRodney W. Grimes } 766e72a94adSMaksim Yevmenkin /* always call sbcompress() so it can do SBLASTMBUFCHK() */ 767df8bae1dSRodney W. Grimes sbcompress(sb, m, m0); 768df8bae1dSRodney W. Grimes } 769df8bae1dSRodney W. Grimes 770df8bae1dSRodney W. Grimes /* 771050ac265SRobert Watson * As above, except the mbuf chain begins a new record. 772a34b7046SRobert Watson */ 773a34b7046SRobert Watson void 774050ac265SRobert Watson sbappendrecord(struct sockbuf *sb, struct mbuf *m0) 775a34b7046SRobert Watson { 776a34b7046SRobert Watson 777a34b7046SRobert Watson SOCKBUF_LOCK(sb); 778a34b7046SRobert Watson sbappendrecord_locked(sb, m0); 779a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 780a34b7046SRobert Watson } 781a34b7046SRobert Watson 7828de34a88SAlan Somers /* Helper routine that appends data, control, and address to a sockbuf. */ 7838de34a88SAlan Somers static int 7848de34a88SAlan Somers sbappendaddr_locked_internal(struct sockbuf *sb, const struct sockaddr *asa, 7858de34a88SAlan Somers struct mbuf *m0, struct mbuf *control, struct mbuf *ctrl_last) 786df8bae1dSRodney W. Grimes { 787395bb186SSam Leffler struct mbuf *m, *n, *nlast; 788c43cad1aSScott Long #if MSIZE <= 256 789df8bae1dSRodney W. Grimes if (asa->sa_len > MLEN) 790df8bae1dSRodney W. Grimes return (0); 791c43cad1aSScott Long #endif 792c8b59ea7SGleb Smirnoff m = m_get(M_NOWAIT, MT_SONAME); 793c8b59ea7SGleb Smirnoff if (m == NULL) 794df8bae1dSRodney W. Grimes return (0); 795df8bae1dSRodney W. Grimes m->m_len = asa->sa_len; 79680208239SAlfred Perlstein bcopy(asa, mtod(m, caddr_t), asa->sa_len); 79753b680caSGleb Smirnoff if (m0) 79853b680caSGleb Smirnoff m_clrprotoflags(m0); 7998de34a88SAlan Somers if (ctrl_last) 8008de34a88SAlan Somers ctrl_last->m_next = m0; /* concatenate data to control */ 801df8bae1dSRodney W. Grimes else 802df8bae1dSRodney W. Grimes control = m0; 803df8bae1dSRodney W. Grimes m->m_next = control; 804395bb186SSam Leffler for (n = m; n->m_next != NULL; n = n->m_next) 805df8bae1dSRodney W. Grimes sballoc(sb, n); 806395bb186SSam Leffler sballoc(sb, n); 807395bb186SSam Leffler nlast = n; 808395bb186SSam Leffler SBLINKRECORD(sb, m); 809395bb186SSam Leffler 810395bb186SSam Leffler sb->sb_mbtail = nlast; 811395bb186SSam Leffler SBLASTMBUFCHK(sb); 812395bb186SSam Leffler 813395bb186SSam Leffler SBLASTRECORDCHK(sb); 814df8bae1dSRodney W. Grimes return (1); 815df8bae1dSRodney W. Grimes } 816df8bae1dSRodney W. Grimes 817a34b7046SRobert Watson /* 818050ac265SRobert Watson * Append address and data, and optionally, control (ancillary) data to the 819050ac265SRobert Watson * receive queue of a socket. If present, m0 must include a packet header 820050ac265SRobert Watson * with total length. Returns 0 if no space in sockbuf or insufficient 821050ac265SRobert Watson * mbufs. 822a34b7046SRobert Watson */ 82326f9a767SRodney W. Grimes int 8248de34a88SAlan Somers sbappendaddr_locked(struct sockbuf *sb, const struct sockaddr *asa, 8258de34a88SAlan Somers struct mbuf *m0, struct mbuf *control) 8268de34a88SAlan Somers { 8278de34a88SAlan Somers struct mbuf *ctrl_last; 8288de34a88SAlan Somers int space = asa->sa_len; 8298de34a88SAlan Somers 8308de34a88SAlan Somers SOCKBUF_LOCK_ASSERT(sb); 8318de34a88SAlan Somers 8328de34a88SAlan Somers if (m0 && (m0->m_flags & M_PKTHDR) == 0) 8338de34a88SAlan Somers panic("sbappendaddr_locked"); 8348de34a88SAlan Somers if (m0) 8358de34a88SAlan Somers space += m0->m_pkthdr.len; 8368de34a88SAlan Somers space += m_length(control, &ctrl_last); 8378de34a88SAlan Somers 8388de34a88SAlan Somers if (space > sbspace(sb)) 8398de34a88SAlan Somers return (0); 8408de34a88SAlan Somers return (sbappendaddr_locked_internal(sb, asa, m0, control, ctrl_last)); 8418de34a88SAlan Somers } 8428de34a88SAlan Somers 8438de34a88SAlan Somers /* 8448de34a88SAlan Somers * Append address and data, and optionally, control (ancillary) data to the 8458de34a88SAlan Somers * receive queue of a socket. If present, m0 must include a packet header 8468de34a88SAlan Somers * with total length. Returns 0 if insufficient mbufs. Does not validate space 8478de34a88SAlan Somers * on the receiving sockbuf. 8488de34a88SAlan Somers */ 8498de34a88SAlan Somers int 8508de34a88SAlan Somers sbappendaddr_nospacecheck_locked(struct sockbuf *sb, const struct sockaddr *asa, 8518de34a88SAlan Somers struct mbuf *m0, struct mbuf *control) 8528de34a88SAlan Somers { 8538de34a88SAlan Somers struct mbuf *ctrl_last; 8548de34a88SAlan Somers 8558de34a88SAlan Somers SOCKBUF_LOCK_ASSERT(sb); 8568de34a88SAlan Somers 8578de34a88SAlan Somers ctrl_last = (control == NULL) ? NULL : m_last(control); 8588de34a88SAlan Somers return (sbappendaddr_locked_internal(sb, asa, m0, control, ctrl_last)); 8598de34a88SAlan Somers } 8608de34a88SAlan Somers 8618de34a88SAlan Somers /* 8628de34a88SAlan Somers * Append address and data, and optionally, control (ancillary) data to the 8638de34a88SAlan Somers * receive queue of a socket. If present, m0 must include a packet header 8648de34a88SAlan Somers * with total length. Returns 0 if no space in sockbuf or insufficient 8658de34a88SAlan Somers * mbufs. 8668de34a88SAlan Somers */ 8678de34a88SAlan Somers int 868050ac265SRobert Watson sbappendaddr(struct sockbuf *sb, const struct sockaddr *asa, 869050ac265SRobert Watson struct mbuf *m0, struct mbuf *control) 870a34b7046SRobert Watson { 871a34b7046SRobert Watson int retval; 872a34b7046SRobert Watson 873a34b7046SRobert Watson SOCKBUF_LOCK(sb); 874a34b7046SRobert Watson retval = sbappendaddr_locked(sb, asa, m0, control); 875a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 876a34b7046SRobert Watson return (retval); 877a34b7046SRobert Watson } 878a34b7046SRobert Watson 879a34b7046SRobert Watson int 880050ac265SRobert Watson sbappendcontrol_locked(struct sockbuf *sb, struct mbuf *m0, 881050ac265SRobert Watson struct mbuf *control) 882df8bae1dSRodney W. Grimes { 883395bb186SSam Leffler struct mbuf *m, *n, *mlast; 8847ed60de8SPoul-Henning Kamp int space; 885df8bae1dSRodney W. Grimes 886a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 887a34b7046SRobert Watson 888b85f65afSPedro F. Giffuni if (control == NULL) 889a34b7046SRobert Watson panic("sbappendcontrol_locked"); 8907ed60de8SPoul-Henning Kamp space = m_length(control, &n) + m_length(m0, NULL); 891a34b7046SRobert Watson 892df8bae1dSRodney W. Grimes if (space > sbspace(sb)) 893df8bae1dSRodney W. Grimes return (0); 89453b680caSGleb Smirnoff m_clrprotoflags(m0); 895df8bae1dSRodney W. Grimes n->m_next = m0; /* concatenate data to control */ 896395bb186SSam Leffler 897395bb186SSam Leffler SBLASTRECORDCHK(sb); 898395bb186SSam Leffler 899395bb186SSam Leffler for (m = control; m->m_next; m = m->m_next) 900df8bae1dSRodney W. Grimes sballoc(sb, m); 901395bb186SSam Leffler sballoc(sb, m); 902395bb186SSam Leffler mlast = m; 903395bb186SSam Leffler SBLINKRECORD(sb, control); 904395bb186SSam Leffler 905395bb186SSam Leffler sb->sb_mbtail = mlast; 906395bb186SSam Leffler SBLASTMBUFCHK(sb); 907395bb186SSam Leffler 908395bb186SSam Leffler SBLASTRECORDCHK(sb); 909df8bae1dSRodney W. Grimes return (1); 910df8bae1dSRodney W. Grimes } 911df8bae1dSRodney W. Grimes 912a34b7046SRobert Watson int 913050ac265SRobert Watson sbappendcontrol(struct sockbuf *sb, struct mbuf *m0, struct mbuf *control) 914a34b7046SRobert Watson { 915a34b7046SRobert Watson int retval; 916a34b7046SRobert Watson 917a34b7046SRobert Watson SOCKBUF_LOCK(sb); 918a34b7046SRobert Watson retval = sbappendcontrol_locked(sb, m0, control); 919a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 920a34b7046SRobert Watson return (retval); 921a34b7046SRobert Watson } 922a34b7046SRobert Watson 923df8bae1dSRodney W. Grimes /* 9247da7362bSRobert Watson * Append the data in mbuf chain (m) into the socket buffer sb following mbuf 9257da7362bSRobert Watson * (n). If (n) is NULL, the buffer is presumed empty. 9267da7362bSRobert Watson * 9277da7362bSRobert Watson * When the data is compressed, mbufs in the chain may be handled in one of 9287da7362bSRobert Watson * three ways: 9297da7362bSRobert Watson * 9307da7362bSRobert Watson * (1) The mbuf may simply be dropped, if it contributes nothing (no data, no 9317da7362bSRobert Watson * record boundary, and no change in data type). 9327da7362bSRobert Watson * 9337da7362bSRobert Watson * (2) The mbuf may be coalesced -- i.e., data in the mbuf may be copied into 9347da7362bSRobert Watson * an mbuf already in the socket buffer. This can occur if an 9350f9d0a73SGleb Smirnoff * appropriate mbuf exists, there is room, both mbufs are not marked as 9360f9d0a73SGleb Smirnoff * not ready, and no merging of data types will occur. 9377da7362bSRobert Watson * 9387da7362bSRobert Watson * (3) The mbuf may be appended to the end of the existing mbuf chain. 9397da7362bSRobert Watson * 9407da7362bSRobert Watson * If any of the new mbufs is marked as M_EOR, mark the last mbuf appended as 9417da7362bSRobert Watson * end-of-record. 942df8bae1dSRodney W. Grimes */ 94326f9a767SRodney W. Grimes void 944050ac265SRobert Watson sbcompress(struct sockbuf *sb, struct mbuf *m, struct mbuf *n) 945df8bae1dSRodney W. Grimes { 946050ac265SRobert Watson int eor = 0; 947050ac265SRobert Watson struct mbuf *o; 948df8bae1dSRodney W. Grimes 949a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 950a34b7046SRobert Watson 951df8bae1dSRodney W. Grimes while (m) { 952df8bae1dSRodney W. Grimes eor |= m->m_flags & M_EOR; 953df8bae1dSRodney W. Grimes if (m->m_len == 0 && 954df8bae1dSRodney W. Grimes (eor == 0 || 955df8bae1dSRodney W. Grimes (((o = m->m_next) || (o = n)) && 956df8bae1dSRodney W. Grimes o->m_type == m->m_type))) { 957395bb186SSam Leffler if (sb->sb_lastrecord == m) 958395bb186SSam Leffler sb->sb_lastrecord = m->m_next; 959df8bae1dSRodney W. Grimes m = m_free(m); 960df8bae1dSRodney W. Grimes continue; 961df8bae1dSRodney W. Grimes } 96232af0d74SDavid Malone if (n && (n->m_flags & M_EOR) == 0 && 96332af0d74SDavid Malone M_WRITABLE(n) && 9645e0f5cfaSKip Macy ((sb->sb_flags & SB_NOCOALESCE) == 0) && 9650f9d0a73SGleb Smirnoff !(m->m_flags & M_NOTREADY) && 9660f9d0a73SGleb Smirnoff !(n->m_flags & M_NOTREADY) && 96732af0d74SDavid Malone m->m_len <= MCLBYTES / 4 && /* XXX: Don't copy too much */ 96832af0d74SDavid Malone m->m_len <= M_TRAILINGSPACE(n) && 969df8bae1dSRodney W. Grimes n->m_type == m->m_type) { 970df8bae1dSRodney W. Grimes bcopy(mtod(m, caddr_t), mtod(n, caddr_t) + n->m_len, 971df8bae1dSRodney W. Grimes (unsigned)m->m_len); 972df8bae1dSRodney W. Grimes n->m_len += m->m_len; 9730f9d0a73SGleb Smirnoff sb->sb_ccc += m->m_len; 9740f9d0a73SGleb Smirnoff if (sb->sb_fnrdy == NULL) 9750f9d0a73SGleb Smirnoff sb->sb_acc += m->m_len; 97634333b16SAndre Oppermann if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 977b3f1af6bSTim J. Robbins /* XXX: Probably don't need.*/ 97804ac9b97SKelly Yancey sb->sb_ctl += m->m_len; 979df8bae1dSRodney W. Grimes m = m_free(m); 980df8bae1dSRodney W. Grimes continue; 981df8bae1dSRodney W. Grimes } 982df8bae1dSRodney W. Grimes if (n) 983df8bae1dSRodney W. Grimes n->m_next = m; 984df8bae1dSRodney W. Grimes else 985df8bae1dSRodney W. Grimes sb->sb_mb = m; 986395bb186SSam Leffler sb->sb_mbtail = m; 987df8bae1dSRodney W. Grimes sballoc(sb, m); 988df8bae1dSRodney W. Grimes n = m; 989df8bae1dSRodney W. Grimes m->m_flags &= ~M_EOR; 990df8bae1dSRodney W. Grimes m = m->m_next; 991df8bae1dSRodney W. Grimes n->m_next = 0; 992df8bae1dSRodney W. Grimes } 993df8bae1dSRodney W. Grimes if (eor) { 9947da7362bSRobert Watson KASSERT(n != NULL, ("sbcompress: eor && n == NULL")); 995df8bae1dSRodney W. Grimes n->m_flags |= eor; 996df8bae1dSRodney W. Grimes } 997395bb186SSam Leffler SBLASTMBUFCHK(sb); 998df8bae1dSRodney W. Grimes } 999df8bae1dSRodney W. Grimes 1000df8bae1dSRodney W. Grimes /* 1001050ac265SRobert Watson * Free all mbufs in a sockbuf. Check that all resources are reclaimed. 1002df8bae1dSRodney W. Grimes */ 1003eaa6dfbcSRobert Watson static void 1004050ac265SRobert Watson sbflush_internal(struct sockbuf *sb) 1005df8bae1dSRodney W. Grimes { 1006df8bae1dSRodney W. Grimes 100723f84772SPierre Beyssac while (sb->sb_mbcnt) { 100823f84772SPierre Beyssac /* 1009761a9a1fSGleb Smirnoff * Don't call sbcut(sb, 0) if the leading mbuf is non-empty: 101023f84772SPierre Beyssac * we would loop forever. Panic instead. 101123f84772SPierre Beyssac */ 10120f9d0a73SGleb Smirnoff if (sb->sb_ccc == 0 && (sb->sb_mb == NULL || sb->sb_mb->m_len)) 101323f84772SPierre Beyssac break; 10140f9d0a73SGleb Smirnoff m_freem(sbcut_internal(sb, (int)sb->sb_ccc)); 101523f84772SPierre Beyssac } 10160f9d0a73SGleb Smirnoff KASSERT(sb->sb_ccc == 0 && sb->sb_mb == 0 && sb->sb_mbcnt == 0, 10170f9d0a73SGleb Smirnoff ("%s: ccc %u mb %p mbcnt %u", __func__, 10180f9d0a73SGleb Smirnoff sb->sb_ccc, (void *)sb->sb_mb, sb->sb_mbcnt)); 1019a34b7046SRobert Watson } 1020a34b7046SRobert Watson 1021a34b7046SRobert Watson void 1022050ac265SRobert Watson sbflush_locked(struct sockbuf *sb) 1023eaa6dfbcSRobert Watson { 1024eaa6dfbcSRobert Watson 1025eaa6dfbcSRobert Watson SOCKBUF_LOCK_ASSERT(sb); 1026eaa6dfbcSRobert Watson sbflush_internal(sb); 1027eaa6dfbcSRobert Watson } 1028eaa6dfbcSRobert Watson 1029eaa6dfbcSRobert Watson void 1030050ac265SRobert Watson sbflush(struct sockbuf *sb) 1031a34b7046SRobert Watson { 1032a34b7046SRobert Watson 1033a34b7046SRobert Watson SOCKBUF_LOCK(sb); 1034a34b7046SRobert Watson sbflush_locked(sb); 1035a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 1036df8bae1dSRodney W. Grimes } 1037df8bae1dSRodney W. Grimes 1038df8bae1dSRodney W. Grimes /* 10391d2df300SGleb Smirnoff * Cut data from (the front of) a sockbuf. 1040df8bae1dSRodney W. Grimes */ 10411d2df300SGleb Smirnoff static struct mbuf * 10421d2df300SGleb Smirnoff sbcut_internal(struct sockbuf *sb, int len) 1043df8bae1dSRodney W. Grimes { 10440f9d0a73SGleb Smirnoff struct mbuf *m, *next, *mfree; 1045df8bae1dSRodney W. Grimes 1046*f41b2de7SHiren Panchasara KASSERT(len >= 0, ("%s: len is %d but it is supposed to be >= 0", 1047b5b023b9SHiren Panchasara __func__, len)); 1048b5b023b9SHiren Panchasara KASSERT(len <= sb->sb_ccc, ("%s: len: %d is > ccc: %u", 1049b5b023b9SHiren Panchasara __func__, len, sb->sb_ccc)); 1050b5b023b9SHiren Panchasara 1051df8bae1dSRodney W. Grimes next = (m = sb->sb_mb) ? m->m_nextpkt : 0; 10521d2df300SGleb Smirnoff mfree = NULL; 10531d2df300SGleb Smirnoff 1054df8bae1dSRodney W. Grimes while (len > 0) { 10558146bcfeSGleb Smirnoff if (m == NULL) { 10568146bcfeSGleb Smirnoff KASSERT(next, ("%s: no next, len %d", __func__, len)); 1057df8bae1dSRodney W. Grimes m = next; 1058df8bae1dSRodney W. Grimes next = m->m_nextpkt; 1059df8bae1dSRodney W. Grimes } 1060df8bae1dSRodney W. Grimes if (m->m_len > len) { 10610f9d0a73SGleb Smirnoff KASSERT(!(m->m_flags & M_NOTAVAIL), 10620f9d0a73SGleb Smirnoff ("%s: m %p M_NOTAVAIL", __func__, m)); 1063df8bae1dSRodney W. Grimes m->m_len -= len; 1064df8bae1dSRodney W. Grimes m->m_data += len; 10650f9d0a73SGleb Smirnoff sb->sb_ccc -= len; 10660f9d0a73SGleb Smirnoff sb->sb_acc -= len; 10674e023759SAndre Oppermann if (sb->sb_sndptroff != 0) 10684e023759SAndre Oppermann sb->sb_sndptroff -= len; 106934333b16SAndre Oppermann if (m->m_type != MT_DATA && m->m_type != MT_OOBDATA) 107004ac9b97SKelly Yancey sb->sb_ctl -= len; 1071df8bae1dSRodney W. Grimes break; 1072df8bae1dSRodney W. Grimes } 1073df8bae1dSRodney W. Grimes len -= m->m_len; 1074df8bae1dSRodney W. Grimes sbfree(sb, m); 10750f9d0a73SGleb Smirnoff /* 10760f9d0a73SGleb Smirnoff * Do not put M_NOTREADY buffers to the free list, they 10770f9d0a73SGleb Smirnoff * are referenced from outside. 10780f9d0a73SGleb Smirnoff */ 10790f9d0a73SGleb Smirnoff if (m->m_flags & M_NOTREADY) 10800f9d0a73SGleb Smirnoff m = m->m_next; 10810f9d0a73SGleb Smirnoff else { 10820f9d0a73SGleb Smirnoff struct mbuf *n; 10830f9d0a73SGleb Smirnoff 10841d2df300SGleb Smirnoff n = m->m_next; 10851d2df300SGleb Smirnoff m->m_next = mfree; 10861d2df300SGleb Smirnoff mfree = m; 10871d2df300SGleb Smirnoff m = n; 1088df8bae1dSRodney W. Grimes } 10890f9d0a73SGleb Smirnoff } 1090e834a840SGleb Smirnoff /* 1091e834a840SGleb Smirnoff * Free any zero-length mbufs from the buffer. 1092e834a840SGleb Smirnoff * For SOCK_DGRAM sockets such mbufs represent empty records. 1093e834a840SGleb Smirnoff * XXX: For SOCK_STREAM sockets such mbufs can appear in the buffer, 1094e834a840SGleb Smirnoff * when sosend_generic() needs to send only control data. 1095e834a840SGleb Smirnoff */ 1096e834a840SGleb Smirnoff while (m && m->m_len == 0) { 1097e834a840SGleb Smirnoff struct mbuf *n; 1098e834a840SGleb Smirnoff 1099e834a840SGleb Smirnoff sbfree(sb, m); 1100e834a840SGleb Smirnoff n = m->m_next; 1101e834a840SGleb Smirnoff m->m_next = mfree; 1102e834a840SGleb Smirnoff mfree = m; 1103e834a840SGleb Smirnoff m = n; 1104e834a840SGleb Smirnoff } 1105df8bae1dSRodney W. Grimes if (m) { 1106df8bae1dSRodney W. Grimes sb->sb_mb = m; 1107df8bae1dSRodney W. Grimes m->m_nextpkt = next; 1108df8bae1dSRodney W. Grimes } else 1109df8bae1dSRodney W. Grimes sb->sb_mb = next; 1110395bb186SSam Leffler /* 1111050ac265SRobert Watson * First part is an inline SB_EMPTY_FIXUP(). Second part makes sure 1112050ac265SRobert Watson * sb_lastrecord is up-to-date if we dropped part of the last record. 1113395bb186SSam Leffler */ 1114395bb186SSam Leffler m = sb->sb_mb; 1115395bb186SSam Leffler if (m == NULL) { 1116395bb186SSam Leffler sb->sb_mbtail = NULL; 1117395bb186SSam Leffler sb->sb_lastrecord = NULL; 1118395bb186SSam Leffler } else if (m->m_nextpkt == NULL) { 1119395bb186SSam Leffler sb->sb_lastrecord = m; 1120395bb186SSam Leffler } 11211d2df300SGleb Smirnoff 11221d2df300SGleb Smirnoff return (mfree); 1123df8bae1dSRodney W. Grimes } 1124df8bae1dSRodney W. Grimes 1125df8bae1dSRodney W. Grimes /* 1126a34b7046SRobert Watson * Drop data from (the front of) a sockbuf. 1127a34b7046SRobert Watson */ 1128a34b7046SRobert Watson void 1129050ac265SRobert Watson sbdrop_locked(struct sockbuf *sb, int len) 1130eaa6dfbcSRobert Watson { 1131eaa6dfbcSRobert Watson 1132eaa6dfbcSRobert Watson SOCKBUF_LOCK_ASSERT(sb); 11331d2df300SGleb Smirnoff m_freem(sbcut_internal(sb, len)); 11341d2df300SGleb Smirnoff } 1135eaa6dfbcSRobert Watson 11361d2df300SGleb Smirnoff /* 11371d2df300SGleb Smirnoff * Drop data from (the front of) a sockbuf, 11381d2df300SGleb Smirnoff * and return it to caller. 11391d2df300SGleb Smirnoff */ 11401d2df300SGleb Smirnoff struct mbuf * 11411d2df300SGleb Smirnoff sbcut_locked(struct sockbuf *sb, int len) 11421d2df300SGleb Smirnoff { 11431d2df300SGleb Smirnoff 11441d2df300SGleb Smirnoff SOCKBUF_LOCK_ASSERT(sb); 11451d2df300SGleb Smirnoff return (sbcut_internal(sb, len)); 1146eaa6dfbcSRobert Watson } 1147eaa6dfbcSRobert Watson 1148eaa6dfbcSRobert Watson void 1149050ac265SRobert Watson sbdrop(struct sockbuf *sb, int len) 1150a34b7046SRobert Watson { 11511d2df300SGleb Smirnoff struct mbuf *mfree; 1152a34b7046SRobert Watson 1153a34b7046SRobert Watson SOCKBUF_LOCK(sb); 11541d2df300SGleb Smirnoff mfree = sbcut_internal(sb, len); 1155a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 11561d2df300SGleb Smirnoff 11571d2df300SGleb Smirnoff m_freem(mfree); 1158a34b7046SRobert Watson } 1159a34b7046SRobert Watson 11604e023759SAndre Oppermann /* 11614e023759SAndre Oppermann * Maintain a pointer and offset pair into the socket buffer mbuf chain to 11624e023759SAndre Oppermann * avoid traversal of the entire socket buffer for larger offsets. 11634e023759SAndre Oppermann */ 11644e023759SAndre Oppermann struct mbuf * 11654e023759SAndre Oppermann sbsndptr(struct sockbuf *sb, u_int off, u_int len, u_int *moff) 11664e023759SAndre Oppermann { 11674e023759SAndre Oppermann struct mbuf *m, *ret; 11684e023759SAndre Oppermann 11694e023759SAndre Oppermann KASSERT(sb->sb_mb != NULL, ("%s: sb_mb is NULL", __func__)); 11700f9d0a73SGleb Smirnoff KASSERT(off + len <= sb->sb_acc, ("%s: beyond sb", __func__)); 11710f9d0a73SGleb Smirnoff KASSERT(sb->sb_sndptroff <= sb->sb_acc, ("%s: sndptroff broken", __func__)); 11724e023759SAndre Oppermann 11734e023759SAndre Oppermann /* 11744e023759SAndre Oppermann * Is off below stored offset? Happens on retransmits. 11754e023759SAndre Oppermann * Just return, we can't help here. 11764e023759SAndre Oppermann */ 11774e023759SAndre Oppermann if (sb->sb_sndptroff > off) { 11784e023759SAndre Oppermann *moff = off; 11794e023759SAndre Oppermann return (sb->sb_mb); 11804e023759SAndre Oppermann } 11814e023759SAndre Oppermann 11824e023759SAndre Oppermann /* Return closest mbuf in chain for current offset. */ 11834e023759SAndre Oppermann *moff = off - sb->sb_sndptroff; 11844e023759SAndre Oppermann m = ret = sb->sb_sndptr ? sb->sb_sndptr : sb->sb_mb; 11850963c8e4SLawrence Stewart if (*moff == m->m_len) { 11860963c8e4SLawrence Stewart *moff = 0; 11870963c8e4SLawrence Stewart sb->sb_sndptroff += m->m_len; 11880963c8e4SLawrence Stewart m = ret = m->m_next; 11890963c8e4SLawrence Stewart KASSERT(ret->m_len > 0, 11900963c8e4SLawrence Stewart ("mbuf %p in sockbuf %p chain has no valid data", ret, sb)); 11910963c8e4SLawrence Stewart } 11924e023759SAndre Oppermann 11934e023759SAndre Oppermann /* Advance by len to be as close as possible for the next transmit. */ 11944e023759SAndre Oppermann for (off = off - sb->sb_sndptroff + len - 1; 11956f4745d5SBjoern A. Zeeb off > 0 && m != NULL && off >= m->m_len; 11964e023759SAndre Oppermann m = m->m_next) { 11974e023759SAndre Oppermann sb->sb_sndptroff += m->m_len; 11984e023759SAndre Oppermann off -= m->m_len; 11994e023759SAndre Oppermann } 12006f4745d5SBjoern A. Zeeb if (off > 0 && m == NULL) 12016f4745d5SBjoern A. Zeeb panic("%s: sockbuf %p and mbuf %p clashing", __func__, sb, ret); 12024e023759SAndre Oppermann sb->sb_sndptr = m; 12034e023759SAndre Oppermann 12044e023759SAndre Oppermann return (ret); 12054e023759SAndre Oppermann } 12064e023759SAndre Oppermann 1207a34b7046SRobert Watson /* 12089fd573c3SHans Petter Selasky * Return the first mbuf and the mbuf data offset for the provided 12099fd573c3SHans Petter Selasky * send offset without changing the "sb_sndptroff" field. 12109fd573c3SHans Petter Selasky */ 12119fd573c3SHans Petter Selasky struct mbuf * 12129fd573c3SHans Petter Selasky sbsndmbuf(struct sockbuf *sb, u_int off, u_int *moff) 12139fd573c3SHans Petter Selasky { 12149fd573c3SHans Petter Selasky struct mbuf *m; 12159fd573c3SHans Petter Selasky 12169fd573c3SHans Petter Selasky KASSERT(sb->sb_mb != NULL, ("%s: sb_mb is NULL", __func__)); 12179fd573c3SHans Petter Selasky 12189fd573c3SHans Petter Selasky /* 12199fd573c3SHans Petter Selasky * If the "off" is below the stored offset, which happens on 12209fd573c3SHans Petter Selasky * retransmits, just use "sb_mb": 12219fd573c3SHans Petter Selasky */ 12229fd573c3SHans Petter Selasky if (sb->sb_sndptr == NULL || sb->sb_sndptroff > off) { 12239fd573c3SHans Petter Selasky m = sb->sb_mb; 12249fd573c3SHans Petter Selasky } else { 12259fd573c3SHans Petter Selasky m = sb->sb_sndptr; 12269fd573c3SHans Petter Selasky off -= sb->sb_sndptroff; 12279fd573c3SHans Petter Selasky } 12289fd573c3SHans Petter Selasky while (off > 0 && m != NULL) { 12299fd573c3SHans Petter Selasky if (off < m->m_len) 12309fd573c3SHans Petter Selasky break; 12319fd573c3SHans Petter Selasky off -= m->m_len; 12329fd573c3SHans Petter Selasky m = m->m_next; 12339fd573c3SHans Petter Selasky } 12349fd573c3SHans Petter Selasky *moff = off; 12359fd573c3SHans Petter Selasky return (m); 12369fd573c3SHans Petter Selasky } 12379fd573c3SHans Petter Selasky 12389fd573c3SHans Petter Selasky /* 1239050ac265SRobert Watson * Drop a record off the front of a sockbuf and move the next record to the 1240050ac265SRobert Watson * front. 1241df8bae1dSRodney W. Grimes */ 124226f9a767SRodney W. Grimes void 1243050ac265SRobert Watson sbdroprecord_locked(struct sockbuf *sb) 1244df8bae1dSRodney W. Grimes { 1245050ac265SRobert Watson struct mbuf *m; 1246df8bae1dSRodney W. Grimes 1247a34b7046SRobert Watson SOCKBUF_LOCK_ASSERT(sb); 1248a34b7046SRobert Watson 1249df8bae1dSRodney W. Grimes m = sb->sb_mb; 1250df8bae1dSRodney W. Grimes if (m) { 1251df8bae1dSRodney W. Grimes sb->sb_mb = m->m_nextpkt; 1252df8bae1dSRodney W. Grimes do { 1253df8bae1dSRodney W. Grimes sbfree(sb, m); 1254ecde8f7cSMatthew Dillon m = m_free(m); 1255797f2d22SPoul-Henning Kamp } while (m); 1256df8bae1dSRodney W. Grimes } 1257395bb186SSam Leffler SB_EMPTY_FIXUP(sb); 1258df8bae1dSRodney W. Grimes } 12591e4ad9ceSGarrett Wollman 126082c23ebaSBill Fenner /* 1261050ac265SRobert Watson * Drop a record off the front of a sockbuf and move the next record to the 1262050ac265SRobert Watson * front. 1263a34b7046SRobert Watson */ 1264a34b7046SRobert Watson void 1265050ac265SRobert Watson sbdroprecord(struct sockbuf *sb) 1266a34b7046SRobert Watson { 1267a34b7046SRobert Watson 1268a34b7046SRobert Watson SOCKBUF_LOCK(sb); 1269a34b7046SRobert Watson sbdroprecord_locked(sb); 1270a34b7046SRobert Watson SOCKBUF_UNLOCK(sb); 1271a34b7046SRobert Watson } 1272a34b7046SRobert Watson 127320d9e5e8SRobert Watson /* 12748c799760SRobert Watson * Create a "control" mbuf containing the specified data with the specified 12758c799760SRobert Watson * type for presentation on a socket buffer. 127620d9e5e8SRobert Watson */ 127720d9e5e8SRobert Watson struct mbuf * 1278d19e16a7SRobert Watson sbcreatecontrol(caddr_t p, int size, int type, int level) 127920d9e5e8SRobert Watson { 1280d19e16a7SRobert Watson struct cmsghdr *cp; 128120d9e5e8SRobert Watson struct mbuf *m; 128220d9e5e8SRobert Watson 128320d9e5e8SRobert Watson if (CMSG_SPACE((u_int)size) > MCLBYTES) 128420d9e5e8SRobert Watson return ((struct mbuf *) NULL); 128520d9e5e8SRobert Watson if (CMSG_SPACE((u_int)size) > MLEN) 1286eb1b1807SGleb Smirnoff m = m_getcl(M_NOWAIT, MT_CONTROL, 0); 128720d9e5e8SRobert Watson else 1288eb1b1807SGleb Smirnoff m = m_get(M_NOWAIT, MT_CONTROL); 128920d9e5e8SRobert Watson if (m == NULL) 129020d9e5e8SRobert Watson return ((struct mbuf *) NULL); 129120d9e5e8SRobert Watson cp = mtod(m, struct cmsghdr *); 129220d9e5e8SRobert Watson m->m_len = 0; 129320d9e5e8SRobert Watson KASSERT(CMSG_SPACE((u_int)size) <= M_TRAILINGSPACE(m), 129420d9e5e8SRobert Watson ("sbcreatecontrol: short mbuf")); 12952827952eSXin LI /* 12962827952eSXin LI * Don't leave the padding between the msg header and the 12972827952eSXin LI * cmsg data and the padding after the cmsg data un-initialized. 12982827952eSXin LI */ 12992827952eSXin LI bzero(cp, CMSG_SPACE((u_int)size)); 130020d9e5e8SRobert Watson if (p != NULL) 130120d9e5e8SRobert Watson (void)memcpy(CMSG_DATA(cp), p, size); 130220d9e5e8SRobert Watson m->m_len = CMSG_SPACE(size); 130320d9e5e8SRobert Watson cp->cmsg_len = CMSG_LEN(size); 130420d9e5e8SRobert Watson cp->cmsg_level = level; 130520d9e5e8SRobert Watson cp->cmsg_type = type; 130620d9e5e8SRobert Watson return (m); 130720d9e5e8SRobert Watson } 130820d9e5e8SRobert Watson 130920d9e5e8SRobert Watson /* 13108c799760SRobert Watson * This does the same for socket buffers that sotoxsocket does for sockets: 13118c799760SRobert Watson * generate an user-format data structure describing the socket buffer. Note 13128c799760SRobert Watson * that the xsockbuf structure, since it is always embedded in a socket, does 13138c799760SRobert Watson * not include a self pointer nor a length. We make this entry point public 13148c799760SRobert Watson * in case some other mechanism needs it. 131520d9e5e8SRobert Watson */ 131620d9e5e8SRobert Watson void 131720d9e5e8SRobert Watson sbtoxsockbuf(struct sockbuf *sb, struct xsockbuf *xsb) 131820d9e5e8SRobert Watson { 1319d19e16a7SRobert Watson 13200f9d0a73SGleb Smirnoff xsb->sb_cc = sb->sb_ccc; 132120d9e5e8SRobert Watson xsb->sb_hiwat = sb->sb_hiwat; 132220d9e5e8SRobert Watson xsb->sb_mbcnt = sb->sb_mbcnt; 132349f287f8SGeorge V. Neville-Neil xsb->sb_mcnt = sb->sb_mcnt; 132449f287f8SGeorge V. Neville-Neil xsb->sb_ccnt = sb->sb_ccnt; 132520d9e5e8SRobert Watson xsb->sb_mbmax = sb->sb_mbmax; 132620d9e5e8SRobert Watson xsb->sb_lowat = sb->sb_lowat; 132720d9e5e8SRobert Watson xsb->sb_flags = sb->sb_flags; 132820d9e5e8SRobert Watson xsb->sb_timeo = sb->sb_timeo; 132920d9e5e8SRobert Watson } 133020d9e5e8SRobert Watson 1331639acc13SGarrett Wollman /* This takes the place of kern.maxsockbuf, which moved to kern.ipc. */ 1332639acc13SGarrett Wollman static int dummy; 1333639acc13SGarrett Wollman SYSCTL_INT(_kern, KERN_DUMMY, dummy, CTLFLAG_RW, &dummy, 0, ""); 13341b978d45SHartmut Brandt SYSCTL_OID(_kern_ipc, KIPC_MAXSOCKBUF, maxsockbuf, CTLTYPE_ULONG|CTLFLAG_RW, 13351b978d45SHartmut Brandt &sb_max, 0, sysctl_handle_sb_max, "LU", "Maximum socket buffer size"); 13361b978d45SHartmut Brandt SYSCTL_ULONG(_kern_ipc, KIPC_SOCKBUF_WASTE, sockbuf_waste_factor, CTLFLAG_RW, 13373eb9ab52SEitan Adler &sb_efficiency, 0, "Socket buffer size waste factor"); 1338