Project

General

Profile

Statistics
| Revision:

root / lab4 / .minix-src / include / sys / socketvar.h @ 13

History | View | Annotate | Download (18.9 KB)

1
/*        $NetBSD: socketvar.h,v 1.139 2015/05/09 15:22:47 rtr Exp $        */
2

    
3
/*-
4
 * Copyright (c) 2008, 2009 The NetBSD Foundation, Inc.
5
 * All rights reserved.
6
 *
7
 * This code is derived from software contributed to The NetBSD Foundation
8
 * by Andrew Doran.
9
 *
10
 * Redistribution and use in source and binary forms, with or without
11
 * modification, are permitted provided that the following conditions
12
 * are met:
13
 * 1. Redistributions of source code must retain the above copyright
14
 *    notice, this list of conditions and the following disclaimer.
15
 * 2. Redistributions in binary form must reproduce the above copyright
16
 *    notice, this list of conditions and the following disclaimer in the
17
 *    documentation and/or other materials provided with the distribution.
18
 *
19
 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20
 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21
 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23
 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29
 * POSSIBILITY OF SUCH DAMAGE.
30
 */
31

    
32
/*-
33
 * Copyright (c) 1982, 1986, 1990, 1993
34
 *        The Regents of the University of California.  All rights reserved.
35
 *
36
 * Redistribution and use in source and binary forms, with or without
37
 * modification, are permitted provided that the following conditions
38
 * are met:
39
 * 1. Redistributions of source code must retain the above copyright
40
 *    notice, this list of conditions and the following disclaimer.
41
 * 2. Redistributions in binary form must reproduce the above copyright
42
 *    notice, this list of conditions and the following disclaimer in the
43
 *    documentation and/or other materials provided with the distribution.
44
 * 3. Neither the name of the University nor the names of its contributors
45
 *    may be used to endorse or promote products derived from this software
46
 *    without specific prior written permission.
47
 *
48
 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
49
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
50
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
51
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
52
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
53
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
54
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
55
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
56
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
57
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
58
 * SUCH DAMAGE.
59
 *
60
 *        @(#)socketvar.h        8.3 (Berkeley) 2/19/95
61
 */
62

    
63
#ifndef _SYS_SOCKETVAR_H_
64
#define        _SYS_SOCKETVAR_H_
65

    
66
#include <sys/select.h>
67
#include <sys/selinfo.h>                /* for struct selinfo */
68
#include <sys/queue.h>
69
#include <sys/mutex.h>
70
#include <sys/condvar.h>
71

    
72
#if !defined(_KERNEL)
73
struct uio;
74
struct lwp;
75
struct uidinfo;
76
#else
77
#include <sys/uidinfo.h>
78
#endif
79

    
80
TAILQ_HEAD(soqhead, socket);
81

    
82
/*
83
 * Variables for socket buffering.
84
 */
85
struct sockbuf {
86
        struct selinfo sb_sel;                /* process selecting read/write */
87
        struct mowner *sb_mowner;        /* who owns data for this sockbuf */
88
        struct socket *sb_so;                /* back pointer to socket */
89
        kcondvar_t sb_cv;                /* notifier */
90
        /* When re-zeroing this struct, we zero from sb_startzero to the end */
91
#define        sb_startzero        sb_cc
92
        u_long        sb_cc;                        /* actual chars in buffer */
93
        u_long        sb_hiwat;                /* max actual char count */
94
        u_long        sb_mbcnt;                /* chars of mbufs used */
95
        u_long        sb_mbmax;                /* max chars of mbufs to use */
96
        long        sb_lowat;                /* low water mark */
97
        struct mbuf *sb_mb;                /* the mbuf chain */
98
        struct mbuf *sb_mbtail;                /* the last mbuf in the chain */
99
        struct mbuf *sb_lastrecord;        /* first mbuf of last record in
100
                                           socket buffer */
101
        int        sb_flags;                /* flags, see below */
102
        int        sb_timeo;                /* timeout for read/write */
103
        u_long        sb_overflowed;                /* # of drops due to full buffer */
104
};
105

    
106
#ifndef SB_MAX
107
#define        SB_MAX                (256*1024)        /* default for max chars in sockbuf */
108
#endif
109

    
110
#define        SB_LOCK                0x01                /* lock on data queue */
111
#define        SB_NOTIFY        0x04                /* someone is waiting for data/space */
112
#define        SB_ASYNC        0x10                /* ASYNC I/O, need signals */
113
#define        SB_UPCALL        0x20                /* someone wants an upcall */
114
#define        SB_NOINTR        0x40                /* operations not interruptible */
115
#define        SB_KNOTE        0x100                /* kernel note attached */
116
#define        SB_AUTOSIZE        0x800                /* automatically size socket buffer */
117

    
118
/*
119
 * Kernel structure per socket.
120
 * Contains send and receive buffer queues,
121
 * handle on protocol and pointer to protocol
122
 * private data and error information.
123
 */
124
struct so_accf {
125
        struct accept_filter        *so_accept_filter;
126
        void        *so_accept_filter_arg;        /* saved filter args */
127
        char        *so_accept_filter_str;        /* saved user args */
128
};
129

    
130
struct sockaddr;
131

    
132
struct socket {
133
        kmutex_t * volatile so_lock;        /* pointer to lock on structure */
134
        kcondvar_t        so_cv;                /* notifier */
135
        short                so_type;        /* generic type, see socket.h */
136
        short                so_options;        /* from socket call, see socket.h */
137
        u_short                so_linger;        /* time to linger while closing */
138
        short                so_state;        /* internal state flags SS_*, below */
139
        int                so_unused;        /* used to be so_nbio */
140
        void                *so_pcb;        /* protocol control block */
141
        const struct protosw *so_proto;        /* protocol handle */
142
/*
143
 * Variables for connection queueing.
144
 * Socket where accepts occur is so_head in all subsidiary sockets.
145
 * If so_head is 0, socket is not related to an accept.
146
 * For head socket so_q0 queues partially completed connections,
147
 * while so_q is a queue of connections ready to be accepted.
148
 * If a connection is aborted and it has so_head set, then
149
 * it has to be pulled out of either so_q0 or so_q.
150
 * We allow connections to queue up based on current queue lengths
151
 * and limit on number of queued connections for this socket.
152
 */
153
        struct socket        *so_head;        /* back pointer to accept socket */
154
        struct soqhead        *so_onq;        /* queue (q or q0) that we're on */
155
        struct soqhead        so_q0;                /* queue of partial connections */
156
        struct soqhead        so_q;                /* queue of incoming connections */
157
        TAILQ_ENTRY(socket) so_qe;        /* our queue entry (q or q0) */
158
        short                so_q0len;        /* partials on so_q0 */
159
        short                so_qlen;        /* number of connections on so_q */
160
        short                so_qlimit;        /* max number queued connections */
161
        short                so_timeo;        /* connection timeout */
162
        u_short                so_error;        /* error affecting connection */
163
        u_short                so_aborting;        /* references from soabort() */
164
        pid_t                so_pgid;        /* pgid for signals */
165
        u_long                so_oobmark;        /* chars to oob mark */
166
        struct sockbuf        so_snd;                /* send buffer */
167
        struct sockbuf        so_rcv;                /* receive buffer */
168

    
169
        void                *so_internal;        /* Space for svr4 stream data */
170
        void                (*so_upcall) (struct socket *, void *, int, int);
171
        void *                so_upcallarg;        /* Arg for above */
172
        int                (*so_send) (struct socket *, struct sockaddr *,
173
                                        struct uio *, struct mbuf *,
174
                                        struct mbuf *, int, struct lwp *);
175
        int                (*so_receive) (struct socket *,
176
                                        struct mbuf **,
177
                                        struct uio *, struct mbuf **,
178
                                        struct mbuf **, int *);
179
        struct mowner        *so_mowner;        /* who owns mbufs for this socket */
180
        struct uidinfo        *so_uidinfo;        /* who opened the socket */
181
        gid_t                so_egid;        /* creator effective gid */
182
        pid_t                so_cpid;        /* creator pid */
183
        struct so_accf        *so_accf;
184
        kauth_cred_t        so_cred;        /* socket credentials */
185
};
186

    
187
#define        SB_EMPTY_FIXUP(sb)                                                \
188
do {                                                                        \
189
        KASSERT(solocked((sb)->sb_so));                                        \
190
        if ((sb)->sb_mb == NULL) {                                        \
191
                (sb)->sb_mbtail = NULL;                                        \
192
                (sb)->sb_lastrecord = NULL;                                \
193
        }                                                                \
194
} while (/*CONSTCOND*/0)
195

    
196
/*
197
 * Socket state bits.
198
 */
199
#define        SS_NOFDREF                0x001        /* no file table ref any more */
200
#define        SS_ISCONNECTED                0x002        /* socket connected to a peer */
201
#define        SS_ISCONNECTING                0x004        /* in process of connecting to peer */
202
#define        SS_ISDISCONNECTING        0x008        /* in process of disconnecting */
203
#define        SS_CANTSENDMORE                0x010        /* can't send more data to peer */
204
#define        SS_CANTRCVMORE                0x020        /* can't receive more data from peer */
205
#define        SS_RCVATMARK                0x040        /* at mark on input */
206
#define        SS_ISABORTING                0x080        /* aborting fd references - close() */
207
#define        SS_RESTARTSYS                0x100        /* restart blocked system calls */
208
#define        SS_ISDISCONNECTED        0x800        /* socket disconnected from peer */
209

    
210
#define        SS_ASYNC                0x100        /* async i/o notify */
211
#define        SS_MORETOCOME                0x400        /*
212
                                         * hint from sosend to lower layer;
213
                                         * more data coming
214
                                         */
215
#define        SS_ISAPIPE                 0x1000        /* socket is implementing a pipe */
216
#define        SS_NBIO                        0x2000        /* socket is in non blocking I/O */
217

    
218
#ifdef _KERNEL
219

    
220
struct accept_filter {
221
        char        accf_name[16];
222
        void        (*accf_callback)
223
                (struct socket *, void *, int, int);
224
        void *        (*accf_create)
225
                (struct socket *, char *);
226
        void        (*accf_destroy)
227
                (struct socket *);
228
        LIST_ENTRY(accept_filter) accf_next;
229
        u_int        accf_refcnt;
230
};
231

    
232
struct sockopt {
233
        int                sopt_level;                /* option level */
234
        int                sopt_name;                /* option name */
235
        size_t                sopt_size;                /* data length */
236
        void *                sopt_data;                /* data pointer */
237
        uint8_t                sopt_buf[sizeof(int)];        /* internal storage */
238
};
239

    
240
extern u_long                sb_max;
241
extern int                somaxkva;
242
extern int                sock_loan_thresh;
243
extern kmutex_t                *softnet_lock;
244

    
245
struct mbuf;
246
struct lwp;
247
struct msghdr;
248
struct stat;
249
struct knote;
250

    
251
struct        mbuf *getsombuf(struct socket *, int);
252

    
253
/*
254
 * File operations on sockets.
255
 */
256
int        soo_read(file_t *, off_t *, struct uio *, kauth_cred_t, int);
257
int        soo_write(file_t *, off_t *, struct uio *, kauth_cred_t, int);
258
int        soo_fcntl(file_t *, u_int cmd, void *);
259
int        soo_ioctl(file_t *, u_long cmd, void *);
260
int        soo_poll(file_t *, int);
261
int        soo_kqfilter(file_t *, struct knote *);
262
int         soo_close(file_t *);
263
int        soo_stat(file_t *, struct stat *);
264
void        soo_restart(file_t *);
265
void        sbappend(struct sockbuf *, struct mbuf *);
266
void        sbappendstream(struct sockbuf *, struct mbuf *);
267
int        sbappendaddr(struct sockbuf *, const struct sockaddr *, struct mbuf *,
268
            struct mbuf *);
269
int        sbappendaddrchain(struct sockbuf *, const struct sockaddr *,
270
             struct mbuf *, int);
271
int        sbappendcontrol(struct sockbuf *, struct mbuf *, struct mbuf *);
272
void        sbappendrecord(struct sockbuf *, struct mbuf *);
273
void        sbcheck(struct sockbuf *);
274
void        sbcompress(struct sockbuf *, struct mbuf *, struct mbuf *);
275
struct mbuf *
276
        sbcreatecontrol(void *, int, int, int);
277
struct mbuf *
278
        sbcreatecontrol1(void **, int, int, int, int);
279
void        sbdrop(struct sockbuf *, int);
280
void        sbdroprecord(struct sockbuf *);
281
void        sbflush(struct sockbuf *);
282
void        sbinsertoob(struct sockbuf *, struct mbuf *);
283
void        sbrelease(struct sockbuf *, struct socket *);
284
int        sbreserve(struct sockbuf *, u_long, struct socket *);
285
int        sbwait(struct sockbuf *);
286
int        sb_max_set(u_long);
287
void        soinit(void);
288
void        soinit1(void);
289
void        soinit2(void);
290
int        soabort(struct socket *);
291
int        soaccept(struct socket *, struct sockaddr *);
292
int        sofamily(const struct socket *);
293
int        sobind(struct socket *, struct sockaddr *, struct lwp *);
294
void        socantrcvmore(struct socket *);
295
void        socantsendmore(struct socket *);
296
int        soclose(struct socket *);
297
int        soconnect(struct socket *, struct sockaddr *, struct lwp *);
298
int        soconnect2(struct socket *, struct socket *);
299
int        socreate(int, struct socket **, int, int, struct lwp *,
300
                 struct socket *);
301
int        fsocreate(int, struct socket **, int, int, int *);
302
int        sodisconnect(struct socket *);
303
void        sofree(struct socket *);
304
int        sogetopt(struct socket *, struct sockopt *);
305
void        sohasoutofband(struct socket *);
306
void        soisconnected(struct socket *);
307
void        soisconnecting(struct socket *);
308
void        soisdisconnected(struct socket *);
309
void        soisdisconnecting(struct socket *);
310
int        solisten(struct socket *, int, struct lwp *);
311
struct socket *
312
        sonewconn(struct socket *, bool);
313
void        soqinsque(struct socket *, struct socket *, int);
314
bool        soqremque(struct socket *, int);
315
int        soreceive(struct socket *, struct mbuf **, struct uio *,
316
            struct mbuf **, struct mbuf **, int *);
317
int        soreserve(struct socket *, u_long, u_long);
318
void        sorflush(struct socket *);
319
int        sosend(struct socket *, struct sockaddr *, struct uio *,
320
            struct mbuf *, struct mbuf *, int, struct lwp *);
321
int        sosetopt(struct socket *, struct sockopt *);
322
int        so_setsockopt(struct lwp *, struct socket *, int, int, const void *, size_t);
323
int        soshutdown(struct socket *, int);
324
void        sorestart(struct socket *);
325
void        sowakeup(struct socket *, struct sockbuf *, int);
326
int        sockargs(struct mbuf **, const void *, size_t, int);
327
int        sopoll(struct socket *, int);
328
struct        socket *soget(bool);
329
void        soput(struct socket *);
330
bool        solocked(struct socket *);
331
bool        solocked2(struct socket *, struct socket *);
332
int        sblock(struct sockbuf *, int);
333
void        sbunlock(struct sockbuf *);
334
int        sowait(struct socket *, bool, int);
335
void        solockretry(struct socket *, kmutex_t *);
336
void        sosetlock(struct socket *);
337
void        solockreset(struct socket *, kmutex_t *);
338

    
339
void        sockopt_init(struct sockopt *, int, int, size_t);
340
void        sockopt_destroy(struct sockopt *);
341
int        sockopt_set(struct sockopt *, const void *, size_t);
342
int        sockopt_setint(struct sockopt *, int);
343
int        sockopt_get(const struct sockopt *, void *, size_t);
344
int        sockopt_getint(const struct sockopt *, int *);
345
int        sockopt_setmbuf(struct sockopt *, struct mbuf *);
346
struct mbuf *sockopt_getmbuf(const struct sockopt *);
347

    
348
int        copyout_sockname(struct sockaddr *, unsigned int *, int, struct mbuf *);
349
int        copyout_msg_control(struct lwp *, struct msghdr *, struct mbuf *);
350
void        free_control_mbuf(struct lwp *, struct mbuf *, struct mbuf *);
351

    
352
int        do_sys_getpeername(int, struct sockaddr *);
353
int        do_sys_getsockname(int, struct sockaddr *);
354
int        do_sys_sendmsg(struct lwp *, int, struct msghdr *, int, register_t *);
355
int        do_sys_recvmsg(struct lwp *, int, struct msghdr *, struct mbuf **,
356
            struct mbuf **, register_t *);
357

    
358
int        do_sys_bind(struct lwp *, int, struct sockaddr *);
359
int        do_sys_connect(struct lwp *, int, struct sockaddr *);
360
int        do_sys_accept(struct lwp *, int, struct sockaddr *, register_t *,
361
            const sigset_t *, int, int);
362

    
363
/*
364
 * Inline functions for sockets and socket buffering.
365
 */
366

    
367
#include <sys/protosw.h>
368
#include <sys/mbuf.h>
369

    
370
/*
371
 * Do we need to notify the other side when I/O is possible?
372
 */
373
static inline int
374
sb_notify(struct sockbuf *sb)
375
{
376

    
377
        KASSERT(solocked(sb->sb_so));
378

    
379
        return sb->sb_flags & (SB_NOTIFY | SB_ASYNC | SB_UPCALL | SB_KNOTE);
380
}
381

    
382
/*
383
 * How much space is there in a socket buffer (so->so_snd or so->so_rcv)?
384
 * This is problematical if the fields are unsigned, as the space might
385
 * still be negative (cc > hiwat or mbcnt > mbmax).  Should detect
386
 * overflow and return 0.
387
 */
388
static inline long
389
sbspace(struct sockbuf *sb)
390
{
391

    
392
        KASSERT(solocked(sb->sb_so));
393

    
394
        return lmin(sb->sb_hiwat - sb->sb_cc, sb->sb_mbmax - sb->sb_mbcnt);
395
}
396

    
397
/* do we have to send all at once on a socket? */
398
static inline int
399
sosendallatonce(struct socket *so)
400
{
401

    
402
        return so->so_proto->pr_flags & PR_ATOMIC;
403
}
404

    
405
/* can we read something from so? */
406
static inline int
407
soreadable(struct socket *so)
408
{
409

    
410
        KASSERT(solocked(so));
411

    
412
        return so->so_rcv.sb_cc >= so->so_rcv.sb_lowat ||
413
            (so->so_state & SS_CANTRCVMORE) != 0 ||
414
            so->so_qlen != 0 || so->so_error != 0;
415
}
416

    
417
/* can we write something to so? */
418
static inline int
419
sowritable(struct socket *so)
420
{
421

    
422
        KASSERT(solocked(so));
423

    
424
        return (sbspace(&so->so_snd) >= so->so_snd.sb_lowat &&
425
            ((so->so_state & SS_ISCONNECTED) != 0 ||
426
            (so->so_proto->pr_flags & PR_CONNREQUIRED) == 0)) ||
427
            (so->so_state & SS_CANTSENDMORE) != 0 ||
428
            so->so_error != 0;
429
}
430

    
431
/* adjust counters in sb reflecting allocation of m */
432
static inline void
433
sballoc(struct sockbuf *sb, struct mbuf *m)
434
{
435

    
436
        KASSERT(solocked(sb->sb_so));
437

    
438
        sb->sb_cc += m->m_len;
439
        sb->sb_mbcnt += MSIZE;
440
        if (m->m_flags & M_EXT)
441
                sb->sb_mbcnt += m->m_ext.ext_size;
442
}
443

    
444
/* adjust counters in sb reflecting freeing of m */
445
static inline void
446
sbfree(struct sockbuf *sb, struct mbuf *m)
447
{
448

    
449
        KASSERT(solocked(sb->sb_so));
450

    
451
        sb->sb_cc -= m->m_len;
452
        sb->sb_mbcnt -= MSIZE;
453
        if (m->m_flags & M_EXT)
454
                sb->sb_mbcnt -= m->m_ext.ext_size;
455
}
456

    
457
static inline void
458
sorwakeup(struct socket *so)
459
{
460

    
461
        KASSERT(solocked(so));
462

    
463
        if (sb_notify(&so->so_rcv))
464
                sowakeup(so, &so->so_rcv, POLL_IN);
465
}
466

    
467
static inline void
468
sowwakeup(struct socket *so)
469
{
470

    
471
        KASSERT(solocked(so));
472

    
473
        if (sb_notify(&so->so_snd))
474
                sowakeup(so, &so->so_snd, POLL_OUT);
475
}
476

    
477
static inline void
478
solock(struct socket *so)
479
{
480
        kmutex_t *lock;
481

    
482
        lock = so->so_lock;
483
        mutex_enter(lock);
484
        if (__predict_false(lock != so->so_lock))
485
                solockretry(so, lock);
486
}
487
        
488
static inline void
489
sounlock(struct socket *so)
490
{
491

    
492
        mutex_exit(so->so_lock);
493
}
494

    
495
#ifdef SOCKBUF_DEBUG
496
/*
497
 * SBLASTRECORDCHK: check sb->sb_lastrecord is maintained correctly.
498
 * SBLASTMBUFCHK: check sb->sb_mbtail is maintained correctly.
499
 *
500
 * => panic if the socket buffer is inconsistent.
501
 * => 'where' is used for a panic message.
502
 */
503
void        sblastrecordchk(struct sockbuf *, const char *);
504
#define        SBLASTRECORDCHK(sb, where)        sblastrecordchk((sb), (where))
505

    
506
void        sblastmbufchk(struct sockbuf *, const char *);
507
#define        SBLASTMBUFCHK(sb, where)        sblastmbufchk((sb), (where))
508
#define        SBCHECK(sb)                        sbcheck(sb)
509
#else
510
#define        SBLASTRECORDCHK(sb, where)        /* nothing */
511
#define        SBLASTMBUFCHK(sb, where)        /* nothing */
512
#define        SBCHECK(sb)                        /* nothing */
513
#endif /* SOCKBUF_DEBUG */
514

    
515
/* sosend loan */
516
vaddr_t        sokvaalloc(vaddr_t, vsize_t, struct socket *);
517
void        sokvafree(vaddr_t, vsize_t);
518
void        soloanfree(struct mbuf *, void *, size_t, void *);
519

    
520
/*
521
 * Values for socket-buffer-append priority argument to sbappendaddrchain().
522
 * The following flags are reserved for future implementation:
523
 *
524
 *  SB_PRIO_NONE:  honour normal socket-buffer limits.
525
 *
526
 *  SB_PRIO_ONESHOT_OVERFLOW:  if the socket has any space,
527
 *        deliver the entire chain. Intended for large requests
528
 *      that should be delivered in their entirety, or not at all.
529
 *
530
 * SB_PRIO_OVERDRAFT:  allow a small (2*MLEN) overflow, over and
531
 *        aboce normal socket limits. Intended messages indicating
532
 *      buffer overflow in earlier normal/lower-priority messages .
533
 *
534
 * SB_PRIO_BESTEFFORT: Ignore  limits entirely.  Intended only for
535
 *         kernel-generated messages to specially-marked scokets which
536
 *        require "reliable" delivery, nd where the source socket/protocol
537
 *        message generator enforce some hard limit (but possibly well
538
 *        above kern.sbmax). It is entirely up to the in-kernel source to
539
 *        avoid complete mbuf exhaustion or DoS scenarios.
540
 */
541
#define SB_PRIO_NONE                  0
542
#define SB_PRIO_ONESHOT_OVERFLOW 1
543
#define SB_PRIO_OVERDRAFT        2
544
#define SB_PRIO_BESTEFFORT        3
545

    
546
/*
547
 * Accept filter functions (duh).
548
 */
549
int        accept_filt_getopt(struct socket *, struct sockopt *);
550
int        accept_filt_setopt(struct socket *, const struct sockopt *);
551
int        accept_filt_clear(struct socket *);
552
int        accept_filt_add(struct accept_filter *);
553
int        accept_filt_del(struct accept_filter *);
554
struct        accept_filter *accept_filt_get(char *);
555
#ifdef ACCEPT_FILTER_MOD
556
#ifdef SYSCTL_DECL
557
SYSCTL_DECL(_net_inet_accf);
558
#endif
559
void        accept_filter_init(void);
560
#endif
561

    
562
#endif /* _KERNEL */
563

    
564
#endif /* !_SYS_SOCKETVAR_H_ */