1 /* 2 * Copyright (c) 1982, 1986, 1988, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * From: @(#)tcp_usrreq.c 8.2 (Berkeley) 1/3/94 34 * $Id: tcp_usrreq.c,v 1.18 1995/11/03 22:08:11 olah Exp $ 35 */ 36 37 #include <sys/param.h> 38 #include <sys/systm.h> 39 #include <sys/kernel.h> 40 #include <sys/sysctl.h> 41 #include <sys/malloc.h> 42 #include <sys/mbuf.h> 43 #include <sys/socket.h> 44 #include <sys/socketvar.h> 45 #include <sys/protosw.h> 46 #include <sys/errno.h> 47 #include <sys/stat.h> 48 #include <vm/vm.h> 49 50 #include <net/if.h> 51 #include <net/route.h> 52 53 #include <netinet/in.h> 54 #include <netinet/in_systm.h> 55 #include <netinet/ip.h> 56 #include <netinet/in_pcb.h> 57 #include <netinet/in_var.h> 58 #include <netinet/ip_var.h> 59 #include <netinet/tcp.h> 60 #include <netinet/tcp_fsm.h> 61 #include <netinet/tcp_seq.h> 62 #include <netinet/tcp_timer.h> 63 #include <netinet/tcp_var.h> 64 #include <netinet/tcpip.h> 65 #ifdef TCPDEBUG 66 #include <netinet/tcp_debug.h> 67 #endif 68 69 /* 70 * TCP protocol interface to socket abstraction. 71 */ 72 extern char *tcpstates[]; 73 74 /* 75 * Process a TCP user request for TCP tb. If this is a send request 76 * then m is the mbuf chain of send data. If this is a timer expiration 77 * (called from the software clock routine), then timertype tells which timer. 78 */ 79 /*ARGSUSED*/ 80 int 81 tcp_usrreq(so, req, m, nam, control) 82 struct socket *so; 83 int req; 84 struct mbuf *m, *nam, *control; 85 { 86 register struct inpcb *inp; 87 register struct tcpcb *tp = 0; 88 struct sockaddr_in *sinp; 89 int s; 90 int error = 0; 91 #ifdef TCPDEBUG 92 int ostate; 93 #endif 94 95 if (req == PRU_CONTROL) 96 return (in_control(so, (u_long)m, (caddr_t)nam, 97 (struct ifnet *)control)); 98 if (control && control->m_len) { 99 m_freem(control); 100 if (m) 101 m_freem(m); 102 return (EINVAL); 103 } 104 105 s = splnet(); 106 inp = sotoinpcb(so); 107 /* 108 * When a TCP is attached to a socket, then there will be 109 * a (struct inpcb) pointed at by the socket, and this 110 * structure will point at a subsidary (struct tcpcb). 111 */ 112 if (inp == 0 && req != PRU_ATTACH) { 113 splx(s); 114 #if 0 115 /* 116 * The following corrects an mbuf leak under rare 117 * circumstances, but has not been fully tested. 118 */ 119 if (m && req != PRU_SENSE) 120 m_freem(m); 121 #else 122 /* safer version of fix for mbuf leak */ 123 if (m && (req == PRU_SEND || req == PRU_SENDOOB)) 124 m_freem(m); 125 #endif 126 return (EINVAL); /* XXX */ 127 } 128 if (inp) { 129 tp = intotcpcb(inp); 130 /* WHAT IF TP IS 0? */ 131 #ifdef KPROF 132 tcp_acounts[tp->t_state][req]++; 133 #endif 134 #ifdef TCPDEBUG 135 ostate = tp->t_state; 136 } else 137 ostate = 0; 138 #else /* TCPDEBUG */ 139 } 140 #endif /* TCPDEBUG */ 141 142 switch (req) { 143 144 /* 145 * TCP attaches to socket via PRU_ATTACH, reserving space, 146 * and an internet control block. 147 */ 148 case PRU_ATTACH: 149 if (inp) { 150 error = EISCONN; 151 break; 152 } 153 error = tcp_attach(so); 154 if (error) 155 break; 156 if ((so->so_options & SO_LINGER) && so->so_linger == 0) 157 so->so_linger = TCP_LINGERTIME * hz; 158 tp = sototcpcb(so); 159 break; 160 161 /* 162 * PRU_DETACH detaches the TCP protocol from the socket. 163 * If the protocol state is non-embryonic, then can't 164 * do this directly: have to initiate a PRU_DISCONNECT, 165 * which may finish later; embryonic TCB's can just 166 * be discarded here. 167 */ 168 case PRU_DETACH: 169 if (tp->t_state > TCPS_LISTEN) 170 tp = tcp_disconnect(tp); 171 else 172 tp = tcp_close(tp); 173 break; 174 175 /* 176 * Give the socket an address. 177 */ 178 case PRU_BIND: 179 /* 180 * Must check for multicast addresses and disallow binding 181 * to them. 182 */ 183 sinp = mtod(nam, struct sockaddr_in *); 184 if (sinp->sin_family == AF_INET && 185 IN_MULTICAST(ntohl(sinp->sin_addr.s_addr))) { 186 error = EAFNOSUPPORT; 187 break; 188 } 189 error = in_pcbbind(inp, nam); 190 if (error) 191 break; 192 break; 193 194 /* 195 * Prepare to accept connections. 196 */ 197 case PRU_LISTEN: 198 if (inp->inp_lport == 0) 199 error = in_pcbbind(inp, NULL); 200 if (error == 0) 201 tp->t_state = TCPS_LISTEN; 202 break; 203 204 /* 205 * Initiate connection to peer. 206 * Create a template for use in transmissions on this connection. 207 * Enter SYN_SENT state, and mark socket as connecting. 208 * Start keep-alive timer, and seed output sequence space. 209 * Send initial segment on connection. 210 */ 211 case PRU_CONNECT: 212 /* 213 * Must disallow TCP ``connections'' to multicast addresses. 214 */ 215 sinp = mtod(nam, struct sockaddr_in *); 216 if (sinp->sin_family == AF_INET 217 && IN_MULTICAST(ntohl(sinp->sin_addr.s_addr))) { 218 error = EAFNOSUPPORT; 219 break; 220 } 221 222 if ((error = tcp_connect(tp, nam)) != 0) 223 break; 224 error = tcp_output(tp); 225 break; 226 227 /* 228 * Create a TCP connection between two sockets. 229 */ 230 case PRU_CONNECT2: 231 error = EOPNOTSUPP; 232 break; 233 234 /* 235 * Initiate disconnect from peer. 236 * If connection never passed embryonic stage, just drop; 237 * else if don't need to let data drain, then can just drop anyways, 238 * else have to begin TCP shutdown process: mark socket disconnecting, 239 * drain unread data, state switch to reflect user close, and 240 * send segment (e.g. FIN) to peer. Socket will be really disconnected 241 * when peer sends FIN and acks ours. 242 * 243 * SHOULD IMPLEMENT LATER PRU_CONNECT VIA REALLOC TCPCB. 244 */ 245 case PRU_DISCONNECT: 246 tp = tcp_disconnect(tp); 247 break; 248 249 /* 250 * Accept a connection. Essentially all the work is 251 * done at higher levels; just return the address 252 * of the peer, storing through addr. 253 */ 254 case PRU_ACCEPT: 255 in_setpeeraddr(inp, nam); 256 break; 257 258 /* 259 * Mark the connection as being incapable of further output. 260 */ 261 case PRU_SHUTDOWN: 262 socantsendmore(so); 263 tp = tcp_usrclosed(tp); 264 if (tp) 265 error = tcp_output(tp); 266 break; 267 268 /* 269 * After a receive, possibly send window update to peer. 270 */ 271 case PRU_RCVD: 272 (void) tcp_output(tp); 273 break; 274 275 /* 276 * Do a send by putting data in output queue and updating urgent 277 * marker if URG set. Possibly send more data. 278 */ 279 case PRU_SEND_EOF: 280 case PRU_SEND: 281 sbappend(&so->so_snd, m); 282 if (nam && tp->t_state < TCPS_SYN_SENT) { 283 /* 284 * Do implied connect if not yet connected, 285 * initialize window to default value, and 286 * initialize maxseg/maxopd using peer's cached 287 * MSS. 288 */ 289 error = tcp_connect(tp, nam); 290 if (error) 291 break; 292 tp->snd_wnd = TTCP_CLIENT_SND_WND; 293 tcp_mss(tp, -1); 294 } 295 296 if (req == PRU_SEND_EOF) { 297 /* 298 * Close the send side of the connection after 299 * the data is sent. 300 */ 301 socantsendmore(so); 302 tp = tcp_usrclosed(tp); 303 } 304 if (tp != NULL) 305 error = tcp_output(tp); 306 break; 307 308 /* 309 * Abort the TCP. 310 */ 311 case PRU_ABORT: 312 tp = tcp_drop(tp, ECONNABORTED); 313 break; 314 315 case PRU_SENSE: 316 ((struct stat *) m)->st_blksize = so->so_snd.sb_hiwat; 317 (void) splx(s); 318 return (0); 319 320 case PRU_RCVOOB: 321 if ((so->so_oobmark == 0 && 322 (so->so_state & SS_RCVATMARK) == 0) || 323 so->so_options & SO_OOBINLINE || 324 tp->t_oobflags & TCPOOB_HADDATA) { 325 error = EINVAL; 326 break; 327 } 328 if ((tp->t_oobflags & TCPOOB_HAVEDATA) == 0) { 329 error = EWOULDBLOCK; 330 break; 331 } 332 m->m_len = 1; 333 *mtod(m, caddr_t) = tp->t_iobc; 334 if (((int)nam & MSG_PEEK) == 0) 335 tp->t_oobflags ^= (TCPOOB_HAVEDATA | TCPOOB_HADDATA); 336 break; 337 338 case PRU_SENDOOB: 339 if (sbspace(&so->so_snd) < -512) { 340 m_freem(m); 341 error = ENOBUFS; 342 break; 343 } 344 /* 345 * According to RFC961 (Assigned Protocols), 346 * the urgent pointer points to the last octet 347 * of urgent data. We continue, however, 348 * to consider it to indicate the first octet 349 * of data past the urgent section. 350 * Otherwise, snd_up should be one lower. 351 */ 352 sbappend(&so->so_snd, m); 353 tp->snd_up = tp->snd_una + so->so_snd.sb_cc; 354 tp->t_force = 1; 355 error = tcp_output(tp); 356 tp->t_force = 0; 357 break; 358 359 case PRU_SOCKADDR: 360 in_setsockaddr(inp, nam); 361 break; 362 363 case PRU_PEERADDR: 364 in_setpeeraddr(inp, nam); 365 break; 366 367 /* 368 * TCP slow timer went off; going through this 369 * routine for tracing's sake. 370 */ 371 case PRU_SLOWTIMO: 372 tp = tcp_timers(tp, (int)nam); 373 #ifdef TCPDEBUG 374 req |= (int)nam << 8; /* for debug's sake */ 375 #endif 376 break; 377 378 default: 379 panic("tcp_usrreq"); 380 } 381 #ifdef TCPDEBUG 382 if (tp && (so->so_options & SO_DEBUG)) 383 tcp_trace(TA_USER, ostate, tp, (struct tcpiphdr *)0, req); 384 #endif 385 splx(s); 386 return (error); 387 } 388 389 /* 390 * Common subroutine to open a TCP connection to remote host specified 391 * by struct sockaddr_in in mbuf *nam. Call in_pcbbind to assign a local 392 * port number if needed. Call in_pcbladdr to do the routing and to choose 393 * a local host address (interface). If there is an existing incarnation 394 * of the same connection in TIME-WAIT state and if the remote host was 395 * sending CC options and if the connection duration was < MSL, then 396 * truncate the previous TIME-WAIT state and proceed. 397 * Initialize connection parameters and enter SYN-SENT state. 398 */ 399 int 400 tcp_connect(tp, nam) 401 register struct tcpcb *tp; 402 struct mbuf *nam; 403 { 404 struct inpcb *inp = tp->t_inpcb, *oinp; 405 struct socket *so = inp->inp_socket; 406 struct tcpcb *otp; 407 struct sockaddr_in *sin = mtod(nam, struct sockaddr_in *); 408 struct sockaddr_in *ifaddr; 409 int error; 410 struct rmxp_tao *taop; 411 struct rmxp_tao tao_noncached; 412 413 if (inp->inp_lport == 0) { 414 error = in_pcbbind(inp, NULL); 415 if (error) 416 return error; 417 } 418 419 /* 420 * Cannot simply call in_pcbconnect, because there might be an 421 * earlier incarnation of this same connection still in 422 * TIME_WAIT state, creating an ADDRINUSE error. 423 */ 424 error = in_pcbladdr(inp, nam, &ifaddr); 425 if (error) 426 return error; 427 oinp = in_pcblookup(inp->inp_pcbinfo->listhead, 428 sin->sin_addr, sin->sin_port, 429 inp->inp_laddr.s_addr != INADDR_ANY ? inp->inp_laddr 430 : ifaddr->sin_addr, 431 inp->inp_lport, 0); 432 if (oinp) { 433 if (oinp != inp && (otp = intotcpcb(oinp)) != NULL && 434 otp->t_state == TCPS_TIME_WAIT && 435 otp->t_duration < TCPTV_MSL && 436 (otp->t_flags & TF_RCVD_CC)) 437 otp = tcp_close(otp); 438 else 439 return EADDRINUSE; 440 } 441 if (inp->inp_laddr.s_addr == INADDR_ANY) 442 inp->inp_laddr = ifaddr->sin_addr; 443 inp->inp_faddr = sin->sin_addr; 444 inp->inp_fport = sin->sin_port; 445 in_pcbrehash(inp); 446 447 tp->t_template = tcp_template(tp); 448 if (tp->t_template == 0) { 449 in_pcbdisconnect(inp); 450 return ENOBUFS; 451 } 452 453 /* Compute window scaling to request. */ 454 while (tp->request_r_scale < TCP_MAX_WINSHIFT && 455 (TCP_MAXWIN << tp->request_r_scale) < so->so_rcv.sb_hiwat) 456 tp->request_r_scale++; 457 458 soisconnecting(so); 459 tcpstat.tcps_connattempt++; 460 tp->t_state = TCPS_SYN_SENT; 461 tp->t_timer[TCPT_KEEP] = TCPTV_KEEP_INIT; 462 tp->iss = tcp_iss; tcp_iss += TCP_ISSINCR/2; 463 tcp_sendseqinit(tp); 464 465 /* 466 * Generate a CC value for this connection and 467 * check whether CC or CCnew should be used. 468 */ 469 if ((taop = tcp_gettaocache(tp->t_inpcb)) == NULL) { 470 taop = &tao_noncached; 471 bzero(taop, sizeof(*taop)); 472 } 473 474 tp->cc_send = CC_INC(tcp_ccgen); 475 if (taop->tao_ccsent != 0 && 476 CC_GEQ(tp->cc_send, taop->tao_ccsent)) { 477 taop->tao_ccsent = tp->cc_send; 478 } else { 479 taop->tao_ccsent = 0; 480 tp->t_flags |= TF_SENDCCNEW; 481 } 482 483 return 0; 484 } 485 486 int 487 tcp_ctloutput(op, so, level, optname, mp) 488 int op; 489 struct socket *so; 490 int level, optname; 491 struct mbuf **mp; 492 { 493 int error = 0, s; 494 struct inpcb *inp; 495 register struct tcpcb *tp; 496 register struct mbuf *m; 497 register int i; 498 499 s = splnet(); 500 inp = sotoinpcb(so); 501 if (inp == NULL) { 502 splx(s); 503 if (op == PRCO_SETOPT && *mp) 504 (void) m_free(*mp); 505 return (ECONNRESET); 506 } 507 if (level != IPPROTO_TCP) { 508 error = ip_ctloutput(op, so, level, optname, mp); 509 splx(s); 510 return (error); 511 } 512 tp = intotcpcb(inp); 513 514 switch (op) { 515 516 case PRCO_SETOPT: 517 m = *mp; 518 switch (optname) { 519 520 case TCP_NODELAY: 521 if (m == NULL || m->m_len < sizeof (int)) 522 error = EINVAL; 523 else if (*mtod(m, int *)) 524 tp->t_flags |= TF_NODELAY; 525 else 526 tp->t_flags &= ~TF_NODELAY; 527 break; 528 529 case TCP_MAXSEG: 530 if (m && (i = *mtod(m, int *)) > 0 && i <= tp->t_maxseg) 531 tp->t_maxseg = i; 532 else 533 error = EINVAL; 534 break; 535 536 case TCP_NOOPT: 537 if (m == NULL || m->m_len < sizeof (int)) 538 error = EINVAL; 539 else if (*mtod(m, int *)) 540 tp->t_flags |= TF_NOOPT; 541 else 542 tp->t_flags &= ~TF_NOOPT; 543 break; 544 545 case TCP_NOPUSH: 546 if (m == NULL || m->m_len < sizeof (int)) 547 error = EINVAL; 548 else if (*mtod(m, int *)) 549 tp->t_flags |= TF_NOPUSH; 550 else 551 tp->t_flags &= ~TF_NOPUSH; 552 break; 553 554 default: 555 error = ENOPROTOOPT; 556 break; 557 } 558 if (m) 559 (void) m_free(m); 560 break; 561 562 case PRCO_GETOPT: 563 *mp = m = m_get(M_WAIT, MT_SOOPTS); 564 m->m_len = sizeof(int); 565 566 switch (optname) { 567 case TCP_NODELAY: 568 *mtod(m, int *) = tp->t_flags & TF_NODELAY; 569 break; 570 case TCP_MAXSEG: 571 *mtod(m, int *) = tp->t_maxseg; 572 break; 573 case TCP_NOOPT: 574 *mtod(m, int *) = tp->t_flags & TF_NOOPT; 575 break; 576 case TCP_NOPUSH: 577 *mtod(m, int *) = tp->t_flags & TF_NOPUSH; 578 break; 579 default: 580 error = ENOPROTOOPT; 581 break; 582 } 583 break; 584 } 585 splx(s); 586 return (error); 587 } 588 589 /* 590 * tcp_sendspace and tcp_recvspace are the default send and receive window 591 * sizes, respectively. These are obsolescent (this information should 592 * be set by the route). 593 */ 594 u_long tcp_sendspace = 1024*16; 595 SYSCTL_INT(_net_inet_tcp, TCPCTL_SENDSPACE, sendspace, 596 CTLFLAG_RW, &tcp_sendspace , 0, ""); 597 u_long tcp_recvspace = 1024*16; 598 SYSCTL_INT(_net_inet_tcp, TCPCTL_RECVSPACE, recvspace, 599 CTLFLAG_RW, &tcp_recvspace , 0, ""); 600 601 /* 602 * Attach TCP protocol to socket, allocating 603 * internet protocol control block, tcp control block, 604 * bufer space, and entering LISTEN state if to accept connections. 605 */ 606 int 607 tcp_attach(so) 608 struct socket *so; 609 { 610 register struct tcpcb *tp; 611 struct inpcb *inp; 612 int error; 613 614 if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) { 615 error = soreserve(so, tcp_sendspace, tcp_recvspace); 616 if (error) 617 return (error); 618 } 619 error = in_pcballoc(so, &tcbinfo); 620 if (error) 621 return (error); 622 inp = sotoinpcb(so); 623 tp = tcp_newtcpcb(inp); 624 if (tp == 0) { 625 int nofd = so->so_state & SS_NOFDREF; /* XXX */ 626 627 so->so_state &= ~SS_NOFDREF; /* don't free the socket yet */ 628 in_pcbdetach(inp); 629 so->so_state |= nofd; 630 return (ENOBUFS); 631 } 632 tp->t_state = TCPS_CLOSED; 633 return (0); 634 } 635 636 /* 637 * Initiate (or continue) disconnect. 638 * If embryonic state, just send reset (once). 639 * If in ``let data drain'' option and linger null, just drop. 640 * Otherwise (hard), mark socket disconnecting and drop 641 * current input data; switch states based on user close, and 642 * send segment to peer (with FIN). 643 */ 644 struct tcpcb * 645 tcp_disconnect(tp) 646 register struct tcpcb *tp; 647 { 648 struct socket *so = tp->t_inpcb->inp_socket; 649 650 if (tp->t_state < TCPS_ESTABLISHED) 651 tp = tcp_close(tp); 652 else if ((so->so_options & SO_LINGER) && so->so_linger == 0) 653 tp = tcp_drop(tp, 0); 654 else { 655 soisdisconnecting(so); 656 sbflush(&so->so_rcv); 657 tp = tcp_usrclosed(tp); 658 if (tp) 659 (void) tcp_output(tp); 660 } 661 return (tp); 662 } 663 664 /* 665 * User issued close, and wish to trail through shutdown states: 666 * if never received SYN, just forget it. If got a SYN from peer, 667 * but haven't sent FIN, then go to FIN_WAIT_1 state to send peer a FIN. 668 * If already got a FIN from peer, then almost done; go to LAST_ACK 669 * state. In all other cases, have already sent FIN to peer (e.g. 670 * after PRU_SHUTDOWN), and just have to play tedious game waiting 671 * for peer to send FIN or not respond to keep-alives, etc. 672 * We can let the user exit from the close as soon as the FIN is acked. 673 */ 674 struct tcpcb * 675 tcp_usrclosed(tp) 676 register struct tcpcb *tp; 677 { 678 679 switch (tp->t_state) { 680 681 case TCPS_CLOSED: 682 case TCPS_LISTEN: 683 tp->t_state = TCPS_CLOSED; 684 tp = tcp_close(tp); 685 break; 686 687 case TCPS_SYN_SENT: 688 case TCPS_SYN_RECEIVED: 689 tp->t_flags |= TF_NEEDFIN; 690 break; 691 692 case TCPS_ESTABLISHED: 693 tp->t_state = TCPS_FIN_WAIT_1; 694 break; 695 696 case TCPS_CLOSE_WAIT: 697 tp->t_state = TCPS_LAST_ACK; 698 break; 699 } 700 if (tp && tp->t_state >= TCPS_FIN_WAIT_2) { 701 soisdisconnected(tp->t_inpcb->inp_socket); 702 /* To prevent the connection hanging in FIN_WAIT_2 forever. */ 703 if (tp->t_state == TCPS_FIN_WAIT_2) 704 tp->t_timer[TCPT_2MSL] = tcp_maxidle; 705 } 706 return (tp); 707 } 708 709 /* 710 * Sysctl for tcp variables. 711 */ 712 int 713 tcp_sysctl(name, namelen, oldp, oldlenp, newp, newlen) 714 int *name; 715 u_int namelen; 716 void *oldp; 717 size_t *oldlenp; 718 void *newp; 719 size_t newlen; 720 { 721 /* All sysctl names at this level are terminal. */ 722 if (namelen != 1) 723 return (ENOTDIR); 724 725 switch (name[0]) { 726 case TCPCTL_DO_RFC1323: 727 return (sysctl_int(oldp, oldlenp, newp, newlen, 728 &tcp_do_rfc1323)); 729 case TCPCTL_DO_RFC1644: 730 return (sysctl_int(oldp, oldlenp, newp, newlen, 731 &tcp_do_rfc1644)); 732 case TCPCTL_MSSDFLT: 733 return (sysctl_int(oldp, oldlenp, newp, newlen, 734 &tcp_mssdflt)); 735 case TCPCTL_STATS: 736 return (sysctl_rdstruct(oldp, oldlenp, newp, &tcpstat, 737 sizeof tcpstat)); 738 case TCPCTL_RTTDFLT: 739 return (sysctl_int(oldp, oldlenp, newp, newlen, &tcp_rttdflt)); 740 case TCPCTL_KEEPIDLE: 741 return (sysctl_int(oldp, oldlenp, newp, newlen, 742 &tcp_keepidle)); 743 case TCPCTL_KEEPINTVL: 744 return (sysctl_int(oldp, oldlenp, newp, newlen, 745 &tcp_keepintvl)); 746 case TCPCTL_SENDSPACE: 747 return (sysctl_int(oldp, oldlenp, newp, newlen, 748 (int *)&tcp_sendspace)); /* XXX */ 749 case TCPCTL_RECVSPACE: 750 return (sysctl_int(oldp, oldlenp, newp, newlen, 751 (int *)&tcp_recvspace)); /* XXX */ 752 default: 753 return (ENOPROTOOPT); 754 } 755 /* NOTREACHED */ 756 } 757