root / lab4 / .minix-src / include / sys / socketvar.h @ 13
History | View | Annotate | Download (18.9 KB)
1 | 13 | up20180614 | /* $NetBSD: socketvar.h,v 1.139 2015/05/09 15:22:47 rtr Exp $ */
|
---|---|---|---|
2 | |||
3 | /*-
|
||
4 | * Copyright (c) 2008, 2009 The NetBSD Foundation, Inc.
|
||
5 | * All rights reserved.
|
||
6 | *
|
||
7 | * This code is derived from software contributed to The NetBSD Foundation
|
||
8 | * by Andrew Doran.
|
||
9 | *
|
||
10 | * Redistribution and use in source and binary forms, with or without
|
||
11 | * modification, are permitted provided that the following conditions
|
||
12 | * are met:
|
||
13 | * 1. Redistributions of source code must retain the above copyright
|
||
14 | * notice, this list of conditions and the following disclaimer.
|
||
15 | * 2. Redistributions in binary form must reproduce the above copyright
|
||
16 | * notice, this list of conditions and the following disclaimer in the
|
||
17 | * documentation and/or other materials provided with the distribution.
|
||
18 | *
|
||
19 | * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
||
20 | * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
||
21 | * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||
22 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
||
23 | * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||
24 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||
25 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||
26 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
||
27 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||
28 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||
29 | * POSSIBILITY OF SUCH DAMAGE.
|
||
30 | */
|
||
31 | |||
32 | /*-
|
||
33 | * Copyright (c) 1982, 1986, 1990, 1993
|
||
34 | * The Regents of the University of California. All rights reserved.
|
||
35 | *
|
||
36 | * Redistribution and use in source and binary forms, with or without
|
||
37 | * modification, are permitted provided that the following conditions
|
||
38 | * are met:
|
||
39 | * 1. Redistributions of source code must retain the above copyright
|
||
40 | * notice, this list of conditions and the following disclaimer.
|
||
41 | * 2. Redistributions in binary form must reproduce the above copyright
|
||
42 | * notice, this list of conditions and the following disclaimer in the
|
||
43 | * documentation and/or other materials provided with the distribution.
|
||
44 | * 3. Neither the name of the University nor the names of its contributors
|
||
45 | * may be used to endorse or promote products derived from this software
|
||
46 | * without specific prior written permission.
|
||
47 | *
|
||
48 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||
49 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
50 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
51 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||
52 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
53 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
54 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
55 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
56 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
57 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
58 | * SUCH DAMAGE.
|
||
59 | *
|
||
60 | * @(#)socketvar.h 8.3 (Berkeley) 2/19/95
|
||
61 | */
|
||
62 | |||
63 | #ifndef _SYS_SOCKETVAR_H_
|
||
64 | #define _SYS_SOCKETVAR_H_
|
||
65 | |||
66 | #include <sys/select.h> |
||
67 | #include <sys/selinfo.h> /* for struct selinfo */ |
||
68 | #include <sys/queue.h> |
||
69 | #include <sys/mutex.h> |
||
70 | #include <sys/condvar.h> |
||
71 | |||
72 | #if !defined(_KERNEL)
|
||
73 | struct uio;
|
||
74 | struct lwp;
|
||
75 | struct uidinfo;
|
||
76 | #else
|
||
77 | #include <sys/uidinfo.h> |
||
78 | #endif
|
||
79 | |||
80 | TAILQ_HEAD(soqhead, socket); |
||
81 | |||
82 | /*
|
||
83 | * Variables for socket buffering.
|
||
84 | */
|
||
85 | struct sockbuf {
|
||
86 | struct selinfo sb_sel; /* process selecting read/write */ |
||
87 | struct mowner *sb_mowner; /* who owns data for this sockbuf */ |
||
88 | struct socket *sb_so; /* back pointer to socket */ |
||
89 | kcondvar_t sb_cv; /* notifier */
|
||
90 | /* When re-zeroing this struct, we zero from sb_startzero to the end */
|
||
91 | #define sb_startzero sb_cc
|
||
92 | u_long sb_cc; /* actual chars in buffer */
|
||
93 | u_long sb_hiwat; /* max actual char count */
|
||
94 | u_long sb_mbcnt; /* chars of mbufs used */
|
||
95 | u_long sb_mbmax; /* max chars of mbufs to use */
|
||
96 | long sb_lowat; /* low water mark */ |
||
97 | struct mbuf *sb_mb; /* the mbuf chain */ |
||
98 | struct mbuf *sb_mbtail; /* the last mbuf in the chain */ |
||
99 | struct mbuf *sb_lastrecord; /* first mbuf of last record in |
||
100 | socket buffer */
|
||
101 | int sb_flags; /* flags, see below */ |
||
102 | int sb_timeo; /* timeout for read/write */ |
||
103 | u_long sb_overflowed; /* # of drops due to full buffer */
|
||
104 | }; |
||
105 | |||
106 | #ifndef SB_MAX
|
||
107 | #define SB_MAX (256*1024) /* default for max chars in sockbuf */ |
||
108 | #endif
|
||
109 | |||
110 | #define SB_LOCK 0x01 /* lock on data queue */ |
||
111 | #define SB_NOTIFY 0x04 /* someone is waiting for data/space */ |
||
112 | #define SB_ASYNC 0x10 /* ASYNC I/O, need signals */ |
||
113 | #define SB_UPCALL 0x20 /* someone wants an upcall */ |
||
114 | #define SB_NOINTR 0x40 /* operations not interruptible */ |
||
115 | #define SB_KNOTE 0x100 /* kernel note attached */ |
||
116 | #define SB_AUTOSIZE 0x800 /* automatically size socket buffer */ |
||
117 | |||
118 | /*
|
||
119 | * Kernel structure per socket.
|
||
120 | * Contains send and receive buffer queues,
|
||
121 | * handle on protocol and pointer to protocol
|
||
122 | * private data and error information.
|
||
123 | */
|
||
124 | struct so_accf {
|
||
125 | struct accept_filter *so_accept_filter;
|
||
126 | void *so_accept_filter_arg; /* saved filter args */ |
||
127 | char *so_accept_filter_str; /* saved user args */ |
||
128 | }; |
||
129 | |||
130 | struct sockaddr;
|
||
131 | |||
132 | struct socket {
|
||
133 | kmutex_t * volatile so_lock; /* pointer to lock on structure */ |
||
134 | kcondvar_t so_cv; /* notifier */
|
||
135 | short so_type; /* generic type, see socket.h */ |
||
136 | short so_options; /* from socket call, see socket.h */ |
||
137 | u_short so_linger; /* time to linger while closing */
|
||
138 | short so_state; /* internal state flags SS_*, below */ |
||
139 | int so_unused; /* used to be so_nbio */ |
||
140 | void *so_pcb; /* protocol control block */ |
||
141 | const struct protosw *so_proto; /* protocol handle */ |
||
142 | /*
|
||
143 | * Variables for connection queueing.
|
||
144 | * Socket where accepts occur is so_head in all subsidiary sockets.
|
||
145 | * If so_head is 0, socket is not related to an accept.
|
||
146 | * For head socket so_q0 queues partially completed connections,
|
||
147 | * while so_q is a queue of connections ready to be accepted.
|
||
148 | * If a connection is aborted and it has so_head set, then
|
||
149 | * it has to be pulled out of either so_q0 or so_q.
|
||
150 | * We allow connections to queue up based on current queue lengths
|
||
151 | * and limit on number of queued connections for this socket.
|
||
152 | */
|
||
153 | struct socket *so_head; /* back pointer to accept socket */ |
||
154 | struct soqhead *so_onq; /* queue (q or q0) that we're on */ |
||
155 | struct soqhead so_q0; /* queue of partial connections */ |
||
156 | struct soqhead so_q; /* queue of incoming connections */ |
||
157 | TAILQ_ENTRY(socket) so_qe; /* our queue entry (q or q0) */
|
||
158 | short so_q0len; /* partials on so_q0 */ |
||
159 | short so_qlen; /* number of connections on so_q */ |
||
160 | short so_qlimit; /* max number queued connections */ |
||
161 | short so_timeo; /* connection timeout */ |
||
162 | u_short so_error; /* error affecting connection */
|
||
163 | u_short so_aborting; /* references from soabort() */
|
||
164 | pid_t so_pgid; /* pgid for signals */
|
||
165 | u_long so_oobmark; /* chars to oob mark */
|
||
166 | struct sockbuf so_snd; /* send buffer */ |
||
167 | struct sockbuf so_rcv; /* receive buffer */ |
||
168 | |||
169 | void *so_internal; /* Space for svr4 stream data */ |
||
170 | void (*so_upcall) (struct socket *, void *, int, int); |
||
171 | void * so_upcallarg; /* Arg for above */ |
||
172 | int (*so_send) (struct socket *, struct sockaddr *, |
||
173 | struct uio *, struct mbuf *, |
||
174 | struct mbuf *, int, struct lwp *); |
||
175 | int (*so_receive) (struct socket *, |
||
176 | struct mbuf **,
|
||
177 | struct uio *, struct mbuf **, |
||
178 | struct mbuf **, int *); |
||
179 | struct mowner *so_mowner; /* who owns mbufs for this socket */ |
||
180 | struct uidinfo *so_uidinfo; /* who opened the socket */ |
||
181 | gid_t so_egid; /* creator effective gid */
|
||
182 | pid_t so_cpid; /* creator pid */
|
||
183 | struct so_accf *so_accf;
|
||
184 | kauth_cred_t so_cred; /* socket credentials */
|
||
185 | }; |
||
186 | |||
187 | #define SB_EMPTY_FIXUP(sb) \
|
||
188 | do { \
|
||
189 | KASSERT(solocked((sb)->sb_so)); \ |
||
190 | if ((sb)->sb_mb == NULL) { \ |
||
191 | (sb)->sb_mbtail = NULL; \
|
||
192 | (sb)->sb_lastrecord = NULL; \
|
||
193 | } \ |
||
194 | } while (/*CONSTCOND*/0) |
||
195 | |||
196 | /*
|
||
197 | * Socket state bits.
|
||
198 | */
|
||
199 | #define SS_NOFDREF 0x001 /* no file table ref any more */ |
||
200 | #define SS_ISCONNECTED 0x002 /* socket connected to a peer */ |
||
201 | #define SS_ISCONNECTING 0x004 /* in process of connecting to peer */ |
||
202 | #define SS_ISDISCONNECTING 0x008 /* in process of disconnecting */ |
||
203 | #define SS_CANTSENDMORE 0x010 /* can't send more data to peer */ |
||
204 | #define SS_CANTRCVMORE 0x020 /* can't receive more data from peer */ |
||
205 | #define SS_RCVATMARK 0x040 /* at mark on input */ |
||
206 | #define SS_ISABORTING 0x080 /* aborting fd references - close() */ |
||
207 | #define SS_RESTARTSYS 0x100 /* restart blocked system calls */ |
||
208 | #define SS_ISDISCONNECTED 0x800 /* socket disconnected from peer */ |
||
209 | |||
210 | #define SS_ASYNC 0x100 /* async i/o notify */ |
||
211 | #define SS_MORETOCOME 0x400 /* |
||
212 | * hint from sosend to lower layer;
|
||
213 | * more data coming
|
||
214 | */
|
||
215 | #define SS_ISAPIPE 0x1000 /* socket is implementing a pipe */ |
||
216 | #define SS_NBIO 0x2000 /* socket is in non blocking I/O */ |
||
217 | |||
218 | #ifdef _KERNEL
|
||
219 | |||
220 | struct accept_filter {
|
||
221 | char accf_name[16]; |
||
222 | void (*accf_callback)
|
||
223 | (struct socket *, void *, int, int); |
||
224 | void * (*accf_create)
|
||
225 | (struct socket *, char *); |
||
226 | void (*accf_destroy)
|
||
227 | (struct socket *);
|
||
228 | LIST_ENTRY(accept_filter) accf_next; |
||
229 | u_int accf_refcnt; |
||
230 | }; |
||
231 | |||
232 | struct sockopt {
|
||
233 | int sopt_level; /* option level */ |
||
234 | int sopt_name; /* option name */ |
||
235 | size_t sopt_size; /* data length */
|
||
236 | void * sopt_data; /* data pointer */ |
||
237 | uint8_t sopt_buf[sizeof(int)]; /* internal storage */ |
||
238 | }; |
||
239 | |||
240 | extern u_long sb_max;
|
||
241 | extern int somaxkva; |
||
242 | extern int sock_loan_thresh; |
||
243 | extern kmutex_t *softnet_lock;
|
||
244 | |||
245 | struct mbuf;
|
||
246 | struct lwp;
|
||
247 | struct msghdr;
|
||
248 | struct stat;
|
||
249 | struct knote;
|
||
250 | |||
251 | struct mbuf *getsombuf(struct socket *, int); |
||
252 | |||
253 | /*
|
||
254 | * File operations on sockets.
|
||
255 | */
|
||
256 | int soo_read(file_t *, off_t *, struct uio *, kauth_cred_t, int); |
||
257 | int soo_write(file_t *, off_t *, struct uio *, kauth_cred_t, int); |
||
258 | int soo_fcntl(file_t *, u_int cmd, void *); |
||
259 | int soo_ioctl(file_t *, u_long cmd, void *); |
||
260 | int soo_poll(file_t *, int); |
||
261 | int soo_kqfilter(file_t *, struct knote *); |
||
262 | int soo_close(file_t *);
|
||
263 | int soo_stat(file_t *, struct stat *); |
||
264 | void soo_restart(file_t *);
|
||
265 | void sbappend(struct sockbuf *, struct mbuf *); |
||
266 | void sbappendstream(struct sockbuf *, struct mbuf *); |
||
267 | int sbappendaddr(struct sockbuf *, const struct sockaddr *, struct mbuf *, |
||
268 | struct mbuf *);
|
||
269 | int sbappendaddrchain(struct sockbuf *, const struct sockaddr *, |
||
270 | struct mbuf *, int); |
||
271 | int sbappendcontrol(struct sockbuf *, struct mbuf *, struct mbuf *); |
||
272 | void sbappendrecord(struct sockbuf *, struct mbuf *); |
||
273 | void sbcheck(struct sockbuf *); |
||
274 | void sbcompress(struct sockbuf *, struct mbuf *, struct mbuf *); |
||
275 | struct mbuf *
|
||
276 | sbcreatecontrol(void *, int, int, int); |
||
277 | struct mbuf *
|
||
278 | sbcreatecontrol1(void **, int, int, int, int); |
||
279 | void sbdrop(struct sockbuf *, int); |
||
280 | void sbdroprecord(struct sockbuf *); |
||
281 | void sbflush(struct sockbuf *); |
||
282 | void sbinsertoob(struct sockbuf *, struct mbuf *); |
||
283 | void sbrelease(struct sockbuf *, struct socket *); |
||
284 | int sbreserve(struct sockbuf *, u_long, struct socket *); |
||
285 | int sbwait(struct sockbuf *); |
||
286 | int sb_max_set(u_long);
|
||
287 | void soinit(void); |
||
288 | void soinit1(void); |
||
289 | void soinit2(void); |
||
290 | int soabort(struct socket *); |
||
291 | int soaccept(struct socket *, struct sockaddr *); |
||
292 | int sofamily(const struct socket *); |
||
293 | int sobind(struct socket *, struct sockaddr *, struct lwp *); |
||
294 | void socantrcvmore(struct socket *); |
||
295 | void socantsendmore(struct socket *); |
||
296 | int soclose(struct socket *); |
||
297 | int soconnect(struct socket *, struct sockaddr *, struct lwp *); |
||
298 | int soconnect2(struct socket *, struct socket *); |
||
299 | int socreate(int, struct socket **, int, int, struct lwp *, |
||
300 | struct socket *);
|
||
301 | int fsocreate(int, struct socket **, int, int, int *); |
||
302 | int sodisconnect(struct socket *); |
||
303 | void sofree(struct socket *); |
||
304 | int sogetopt(struct socket *, struct sockopt *); |
||
305 | void sohasoutofband(struct socket *); |
||
306 | void soisconnected(struct socket *); |
||
307 | void soisconnecting(struct socket *); |
||
308 | void soisdisconnected(struct socket *); |
||
309 | void soisdisconnecting(struct socket *); |
||
310 | int solisten(struct socket *, int, struct lwp *); |
||
311 | struct socket *
|
||
312 | sonewconn(struct socket *, bool); |
||
313 | void soqinsque(struct socket *, struct socket *, int); |
||
314 | bool soqremque(struct socket *, int); |
||
315 | int soreceive(struct socket *, struct mbuf **, struct uio *, |
||
316 | struct mbuf **, struct mbuf **, int *); |
||
317 | int soreserve(struct socket *, u_long, u_long); |
||
318 | void sorflush(struct socket *); |
||
319 | int sosend(struct socket *, struct sockaddr *, struct uio *, |
||
320 | struct mbuf *, struct mbuf *, int, struct lwp *); |
||
321 | int sosetopt(struct socket *, struct sockopt *); |
||
322 | int so_setsockopt(struct lwp *, struct socket *, int, int, const void *, size_t); |
||
323 | int soshutdown(struct socket *, int); |
||
324 | void sorestart(struct socket *); |
||
325 | void sowakeup(struct socket *, struct sockbuf *, int); |
||
326 | int sockargs(struct mbuf **, const void *, size_t, int); |
||
327 | int sopoll(struct socket *, int); |
||
328 | struct socket *soget(bool); |
||
329 | void soput(struct socket *); |
||
330 | bool solocked(struct socket *); |
||
331 | bool solocked2(struct socket *, struct socket *); |
||
332 | int sblock(struct sockbuf *, int); |
||
333 | void sbunlock(struct sockbuf *); |
||
334 | int sowait(struct socket *, bool, int); |
||
335 | void solockretry(struct socket *, kmutex_t *); |
||
336 | void sosetlock(struct socket *); |
||
337 | void solockreset(struct socket *, kmutex_t *); |
||
338 | |||
339 | void sockopt_init(struct sockopt *, int, int, size_t); |
||
340 | void sockopt_destroy(struct sockopt *); |
||
341 | int sockopt_set(struct sockopt *, const void *, size_t); |
||
342 | int sockopt_setint(struct sockopt *, int); |
||
343 | int sockopt_get(const struct sockopt *, void *, size_t); |
||
344 | int sockopt_getint(const struct sockopt *, int *); |
||
345 | int sockopt_setmbuf(struct sockopt *, struct mbuf *); |
||
346 | struct mbuf *sockopt_getmbuf(const struct sockopt *); |
||
347 | |||
348 | int copyout_sockname(struct sockaddr *, unsigned int *, int, struct mbuf *); |
||
349 | int copyout_msg_control(struct lwp *, struct msghdr *, struct mbuf *); |
||
350 | void free_control_mbuf(struct lwp *, struct mbuf *, struct mbuf *); |
||
351 | |||
352 | int do_sys_getpeername(int, struct sockaddr *); |
||
353 | int do_sys_getsockname(int, struct sockaddr *); |
||
354 | int do_sys_sendmsg(struct lwp *, int, struct msghdr *, int, register_t *); |
||
355 | int do_sys_recvmsg(struct lwp *, int, struct msghdr *, struct mbuf **, |
||
356 | struct mbuf **, register_t *);
|
||
357 | |||
358 | int do_sys_bind(struct lwp *, int, struct sockaddr *); |
||
359 | int do_sys_connect(struct lwp *, int, struct sockaddr *); |
||
360 | int do_sys_accept(struct lwp *, int, struct sockaddr *, register_t *, |
||
361 | const sigset_t *, int, int); |
||
362 | |||
363 | /*
|
||
364 | * Inline functions for sockets and socket buffering.
|
||
365 | */
|
||
366 | |||
367 | #include <sys/protosw.h> |
||
368 | #include <sys/mbuf.h> |
||
369 | |||
370 | /*
|
||
371 | * Do we need to notify the other side when I/O is possible?
|
||
372 | */
|
||
373 | static inline int |
||
374 | sb_notify(struct sockbuf *sb)
|
||
375 | { |
||
376 | |||
377 | KASSERT(solocked(sb->sb_so)); |
||
378 | |||
379 | return sb->sb_flags & (SB_NOTIFY | SB_ASYNC | SB_UPCALL | SB_KNOTE);
|
||
380 | } |
||
381 | |||
382 | /*
|
||
383 | * How much space is there in a socket buffer (so->so_snd or so->so_rcv)?
|
||
384 | * This is problematical if the fields are unsigned, as the space might
|
||
385 | * still be negative (cc > hiwat or mbcnt > mbmax). Should detect
|
||
386 | * overflow and return 0.
|
||
387 | */
|
||
388 | static inline long |
||
389 | sbspace(struct sockbuf *sb)
|
||
390 | { |
||
391 | |||
392 | KASSERT(solocked(sb->sb_so)); |
||
393 | |||
394 | return lmin(sb->sb_hiwat - sb->sb_cc, sb->sb_mbmax - sb->sb_mbcnt);
|
||
395 | } |
||
396 | |||
397 | /* do we have to send all at once on a socket? */
|
||
398 | static inline int |
||
399 | sosendallatonce(struct socket *so)
|
||
400 | { |
||
401 | |||
402 | return so->so_proto->pr_flags & PR_ATOMIC;
|
||
403 | } |
||
404 | |||
405 | /* can we read something from so? */
|
||
406 | static inline int |
||
407 | soreadable(struct socket *so)
|
||
408 | { |
||
409 | |||
410 | KASSERT(solocked(so)); |
||
411 | |||
412 | return so->so_rcv.sb_cc >= so->so_rcv.sb_lowat ||
|
||
413 | (so->so_state & SS_CANTRCVMORE) != 0 ||
|
||
414 | so->so_qlen != 0 || so->so_error != 0; |
||
415 | } |
||
416 | |||
417 | /* can we write something to so? */
|
||
418 | static inline int |
||
419 | sowritable(struct socket *so)
|
||
420 | { |
||
421 | |||
422 | KASSERT(solocked(so)); |
||
423 | |||
424 | return (sbspace(&so->so_snd) >= so->so_snd.sb_lowat &&
|
||
425 | ((so->so_state & SS_ISCONNECTED) != 0 ||
|
||
426 | (so->so_proto->pr_flags & PR_CONNREQUIRED) == 0)) ||
|
||
427 | (so->so_state & SS_CANTSENDMORE) != 0 ||
|
||
428 | so->so_error != 0;
|
||
429 | } |
||
430 | |||
431 | /* adjust counters in sb reflecting allocation of m */
|
||
432 | static inline void |
||
433 | sballoc(struct sockbuf *sb, struct mbuf *m) |
||
434 | { |
||
435 | |||
436 | KASSERT(solocked(sb->sb_so)); |
||
437 | |||
438 | sb->sb_cc += m->m_len; |
||
439 | sb->sb_mbcnt += MSIZE; |
||
440 | if (m->m_flags & M_EXT)
|
||
441 | sb->sb_mbcnt += m->m_ext.ext_size; |
||
442 | } |
||
443 | |||
444 | /* adjust counters in sb reflecting freeing of m */
|
||
445 | static inline void |
||
446 | sbfree(struct sockbuf *sb, struct mbuf *m) |
||
447 | { |
||
448 | |||
449 | KASSERT(solocked(sb->sb_so)); |
||
450 | |||
451 | sb->sb_cc -= m->m_len; |
||
452 | sb->sb_mbcnt -= MSIZE; |
||
453 | if (m->m_flags & M_EXT)
|
||
454 | sb->sb_mbcnt -= m->m_ext.ext_size; |
||
455 | } |
||
456 | |||
457 | static inline void |
||
458 | sorwakeup(struct socket *so)
|
||
459 | { |
||
460 | |||
461 | KASSERT(solocked(so)); |
||
462 | |||
463 | if (sb_notify(&so->so_rcv))
|
||
464 | sowakeup(so, &so->so_rcv, POLL_IN); |
||
465 | } |
||
466 | |||
467 | static inline void |
||
468 | sowwakeup(struct socket *so)
|
||
469 | { |
||
470 | |||
471 | KASSERT(solocked(so)); |
||
472 | |||
473 | if (sb_notify(&so->so_snd))
|
||
474 | sowakeup(so, &so->so_snd, POLL_OUT); |
||
475 | } |
||
476 | |||
477 | static inline void |
||
478 | solock(struct socket *so)
|
||
479 | { |
||
480 | kmutex_t *lock; |
||
481 | |||
482 | lock = so->so_lock; |
||
483 | mutex_enter(lock); |
||
484 | if (__predict_false(lock != so->so_lock))
|
||
485 | solockretry(so, lock); |
||
486 | } |
||
487 | |||
488 | static inline void |
||
489 | sounlock(struct socket *so)
|
||
490 | { |
||
491 | |||
492 | mutex_exit(so->so_lock); |
||
493 | } |
||
494 | |||
495 | #ifdef SOCKBUF_DEBUG
|
||
496 | /*
|
||
497 | * SBLASTRECORDCHK: check sb->sb_lastrecord is maintained correctly.
|
||
498 | * SBLASTMBUFCHK: check sb->sb_mbtail is maintained correctly.
|
||
499 | *
|
||
500 | * => panic if the socket buffer is inconsistent.
|
||
501 | * => 'where' is used for a panic message.
|
||
502 | */
|
||
503 | void sblastrecordchk(struct sockbuf *, const char *); |
||
504 | #define SBLASTRECORDCHK(sb, where) sblastrecordchk((sb), (where))
|
||
505 | |||
506 | void sblastmbufchk(struct sockbuf *, const char *); |
||
507 | #define SBLASTMBUFCHK(sb, where) sblastmbufchk((sb), (where))
|
||
508 | #define SBCHECK(sb) sbcheck(sb)
|
||
509 | #else
|
||
510 | #define SBLASTRECORDCHK(sb, where) /* nothing */ |
||
511 | #define SBLASTMBUFCHK(sb, where) /* nothing */ |
||
512 | #define SBCHECK(sb) /* nothing */ |
||
513 | #endif /* SOCKBUF_DEBUG */ |
||
514 | |||
515 | /* sosend loan */
|
||
516 | vaddr_t sokvaalloc(vaddr_t, vsize_t, struct socket *);
|
||
517 | void sokvafree(vaddr_t, vsize_t);
|
||
518 | void soloanfree(struct mbuf *, void *, size_t, void *); |
||
519 | |||
520 | /*
|
||
521 | * Values for socket-buffer-append priority argument to sbappendaddrchain().
|
||
522 | * The following flags are reserved for future implementation:
|
||
523 | *
|
||
524 | * SB_PRIO_NONE: honour normal socket-buffer limits.
|
||
525 | *
|
||
526 | * SB_PRIO_ONESHOT_OVERFLOW: if the socket has any space,
|
||
527 | * deliver the entire chain. Intended for large requests
|
||
528 | * that should be delivered in their entirety, or not at all.
|
||
529 | *
|
||
530 | * SB_PRIO_OVERDRAFT: allow a small (2*MLEN) overflow, over and
|
||
531 | * aboce normal socket limits. Intended messages indicating
|
||
532 | * buffer overflow in earlier normal/lower-priority messages .
|
||
533 | *
|
||
534 | * SB_PRIO_BESTEFFORT: Ignore limits entirely. Intended only for
|
||
535 | * kernel-generated messages to specially-marked scokets which
|
||
536 | * require "reliable" delivery, nd where the source socket/protocol
|
||
537 | * message generator enforce some hard limit (but possibly well
|
||
538 | * above kern.sbmax). It is entirely up to the in-kernel source to
|
||
539 | * avoid complete mbuf exhaustion or DoS scenarios.
|
||
540 | */
|
||
541 | #define SB_PRIO_NONE 0 |
||
542 | #define SB_PRIO_ONESHOT_OVERFLOW 1 |
||
543 | #define SB_PRIO_OVERDRAFT 2 |
||
544 | #define SB_PRIO_BESTEFFORT 3 |
||
545 | |||
546 | /*
|
||
547 | * Accept filter functions (duh).
|
||
548 | */
|
||
549 | int accept_filt_getopt(struct socket *, struct sockopt *); |
||
550 | int accept_filt_setopt(struct socket *, const struct sockopt *); |
||
551 | int accept_filt_clear(struct socket *); |
||
552 | int accept_filt_add(struct accept_filter *); |
||
553 | int accept_filt_del(struct accept_filter *); |
||
554 | struct accept_filter *accept_filt_get(char *); |
||
555 | #ifdef ACCEPT_FILTER_MOD
|
||
556 | #ifdef SYSCTL_DECL
|
||
557 | SYSCTL_DECL(_net_inet_accf); |
||
558 | #endif
|
||
559 | void accept_filter_init(void); |
||
560 | #endif
|
||
561 | |||
562 | #endif /* _KERNEL */ |
||
563 | |||
564 | #endif /* !_SYS_SOCKETVAR_H_ */ |