version 1.192, 2009/10/03 01:41:39 |
version 1.226, 2014/07/23 13:17:18 |
|
|
* @(#)uipc_socket.c 8.6 (Berkeley) 5/2/95 |
* @(#)uipc_socket.c 8.6 (Berkeley) 5/2/95 |
*/ |
*/ |
|
|
|
/* |
|
* Socket operation routines. |
|
* |
|
* These routines are called by the routines in sys_socket.c or from a |
|
* system process, and implement the semantics of socket operations by |
|
* switching out to the protocol specific routines. |
|
*/ |
|
|
#include <sys/cdefs.h> |
#include <sys/cdefs.h> |
__KERNEL_RCSID(0, "$NetBSD$"); |
__KERNEL_RCSID(0, "$NetBSD$"); |
|
|
Line 92 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 100 __KERNEL_RCSID(0, "$NetBSD$"); |
|
#include <sys/kauth.h> |
#include <sys/kauth.h> |
#include <sys/mutex.h> |
#include <sys/mutex.h> |
#include <sys/condvar.h> |
#include <sys/condvar.h> |
|
#include <sys/kthread.h> |
|
|
#ifdef COMPAT_50 |
#ifdef COMPAT_50 |
#include <compat/sys/time.h> |
#include <compat/sys/time.h> |
#include <compat/sys/socket.h> |
#include <compat/sys/socket.h> |
#endif |
#endif |
|
|
#include <uvm/uvm.h> |
#include <uvm/uvm_extern.h> |
|
#include <uvm/uvm_loan.h> |
|
#include <uvm/uvm_page.h> |
|
|
MALLOC_DEFINE(M_SOOPTS, "soopts", "socket options"); |
|
MALLOC_DEFINE(M_SONAME, "soname", "socket name"); |
MALLOC_DEFINE(M_SONAME, "soname", "socket name"); |
|
|
extern const struct fileops socketops; |
extern const struct fileops socketops; |
Line 133 EVCNT_ATTACH_STATIC(sosend_kvalimit); |
|
Line 143 EVCNT_ATTACH_STATIC(sosend_kvalimit); |
|
|
|
#endif /* SOSEND_COUNTERS */ |
#endif /* SOSEND_COUNTERS */ |
|
|
static struct callback_entry sokva_reclaimerentry; |
|
|
|
#if defined(SOSEND_NO_LOAN) || defined(MULTIPROCESSOR) |
#if defined(SOSEND_NO_LOAN) || defined(MULTIPROCESSOR) |
int sock_loan_thresh = -1; |
int sock_loan_thresh = -1; |
#else |
#else |
Line 142 int sock_loan_thresh = 4096; |
|
Line 150 int sock_loan_thresh = 4096; |
|
#endif |
#endif |
|
|
static kmutex_t so_pendfree_lock; |
static kmutex_t so_pendfree_lock; |
static struct mbuf *so_pendfree; |
static struct mbuf *so_pendfree = NULL; |
|
|
#ifndef SOMAXKVA |
#ifndef SOMAXKVA |
#define SOMAXKVA (16 * 1024 * 1024) |
#define SOMAXKVA (16 * 1024 * 1024) |
Line 155 static kauth_listener_t socket_listener; |
|
Line 163 static kauth_listener_t socket_listener; |
|
|
|
#define SOCK_LOAN_CHUNK 65536 |
#define SOCK_LOAN_CHUNK 65536 |
|
|
static size_t sodopendfree(void); |
static void sopendfree_thread(void *); |
static size_t sodopendfreel(void); |
static kcondvar_t pendfree_thread_cv; |
|
static lwp_t *sopendfree_lwp; |
|
|
static void sysctl_kern_somaxkva_setup(void); |
static void sysctl_kern_socket_setup(void); |
static struct sysctllog *socket_sysctllog; |
static struct sysctllog *socket_sysctllog; |
|
|
static vsize_t |
static vsize_t |
Line 168 sokvareserve(struct socket *so, vsize_t |
|
Line 177 sokvareserve(struct socket *so, vsize_t |
|
|
|
mutex_enter(&so_pendfree_lock); |
mutex_enter(&so_pendfree_lock); |
while (socurkva + len > somaxkva) { |
while (socurkva + len > somaxkva) { |
size_t freed; |
|
|
|
/* |
|
* try to do pendfree. |
|
*/ |
|
|
|
freed = sodopendfreel(); |
|
|
|
/* |
|
* if some kva was freed, try again. |
|
*/ |
|
|
|
if (freed) |
|
continue; |
|
|
|
SOSEND_COUNTER_INCR(&sosend_kvalimit); |
SOSEND_COUNTER_INCR(&sosend_kvalimit); |
error = cv_wait_sig(&socurkva_cv, &so_pendfree_lock); |
error = cv_wait_sig(&socurkva_cv, &so_pendfree_lock); |
if (error) { |
if (error) { |
Line 210 sokvaunreserve(vsize_t len) |
|
Line 204 sokvaunreserve(vsize_t len) |
|
*/ |
*/ |
|
|
vaddr_t |
vaddr_t |
sokvaalloc(vsize_t len, struct socket *so) |
sokvaalloc(vaddr_t sva, vsize_t len, struct socket *so) |
{ |
{ |
vaddr_t lva; |
vaddr_t lva; |
|
|
Line 225 sokvaalloc(vsize_t len, struct socket *s |
|
Line 219 sokvaalloc(vsize_t len, struct socket *s |
|
* allocate kva. |
* allocate kva. |
*/ |
*/ |
|
|
lva = uvm_km_alloc(kernel_map, len, 0, UVM_KMF_VAONLY | UVM_KMF_WAITVA); |
lva = uvm_km_alloc(kernel_map, len, atop(sva) & uvmexp.colormask, |
|
UVM_KMF_COLORMATCH | UVM_KMF_VAONLY | UVM_KMF_WAITVA); |
if (lva == 0) { |
if (lva == 0) { |
sokvaunreserve(len); |
sokvaunreserve(len); |
return (0); |
return (0); |
Line 275 sodoloanfree(struct vm_page **pgs, void |
|
Line 270 sodoloanfree(struct vm_page **pgs, void |
|
sokvafree(sva, len); |
sokvafree(sva, len); |
} |
} |
|
|
static size_t |
|
sodopendfree(void) |
|
{ |
|
size_t rv; |
|
|
|
if (__predict_true(so_pendfree == NULL)) |
|
return 0; |
|
|
|
mutex_enter(&so_pendfree_lock); |
|
rv = sodopendfreel(); |
|
mutex_exit(&so_pendfree_lock); |
|
|
|
return rv; |
|
} |
|
|
|
/* |
/* |
* sodopendfreel: free mbufs on "pendfree" list. |
* sopendfree_thread: free mbufs on "pendfree" list. |
* unlock and relock so_pendfree_lock when freeing mbufs. |
* unlock and relock so_pendfree_lock when freeing mbufs. |
* |
|
* => called with so_pendfree_lock held. |
|
*/ |
*/ |
|
|
static size_t |
static void |
sodopendfreel(void) |
sopendfree_thread(void *v) |
{ |
{ |
struct mbuf *m, *next; |
struct mbuf *m, *next; |
size_t rv = 0; |
size_t rv; |
|
|
KASSERT(mutex_owned(&so_pendfree_lock)); |
|
|
|
while (so_pendfree != NULL) { |
mutex_enter(&so_pendfree_lock); |
m = so_pendfree; |
|
so_pendfree = NULL; |
|
mutex_exit(&so_pendfree_lock); |
|
|
|
for (; m != NULL; m = next) { |
for (;;) { |
next = m->m_next; |
rv = 0; |
KASSERT((~m->m_flags & (M_EXT|M_EXT_PAGES)) == 0); |
while (so_pendfree != NULL) { |
KASSERT(m->m_ext.ext_refcnt == 0); |
m = so_pendfree; |
|
so_pendfree = NULL; |
|
mutex_exit(&so_pendfree_lock); |
|
|
|
for (; m != NULL; m = next) { |
|
next = m->m_next; |
|
KASSERT((~m->m_flags & (M_EXT|M_EXT_PAGES)) == 0); |
|
KASSERT(m->m_ext.ext_refcnt == 0); |
|
|
|
rv += m->m_ext.ext_size; |
|
sodoloanfree(m->m_ext.ext_pgs, m->m_ext.ext_buf, |
|
m->m_ext.ext_size); |
|
pool_cache_put(mb_cache, m); |
|
} |
|
|
rv += m->m_ext.ext_size; |
mutex_enter(&so_pendfree_lock); |
sodoloanfree(m->m_ext.ext_pgs, m->m_ext.ext_buf, |
|
m->m_ext.ext_size); |
|
pool_cache_put(mb_cache, m); |
|
} |
} |
|
if (rv) |
mutex_enter(&so_pendfree_lock); |
cv_broadcast(&socurkva_cv); |
|
cv_wait(&pendfree_thread_cv, &so_pendfree_lock); |
} |
} |
|
panic("sopendfree_thread"); |
return (rv); |
/* NOTREACHED */ |
} |
} |
|
|
void |
void |
Line 343 soloanfree(struct mbuf *m, void *buf, si |
|
Line 327 soloanfree(struct mbuf *m, void *buf, si |
|
mutex_enter(&so_pendfree_lock); |
mutex_enter(&so_pendfree_lock); |
m->m_next = so_pendfree; |
m->m_next = so_pendfree; |
so_pendfree = m; |
so_pendfree = m; |
cv_broadcast(&socurkva_cv); |
cv_signal(&pendfree_thread_cv); |
mutex_exit(&so_pendfree_lock); |
mutex_exit(&so_pendfree_lock); |
} |
} |
|
|
Line 373 sosend_loan(struct socket *so, struct ui |
|
Line 357 sosend_loan(struct socket *so, struct ui |
|
|
|
KASSERT(npgs <= M_EXT_MAXPAGES); |
KASSERT(npgs <= M_EXT_MAXPAGES); |
|
|
lva = sokvaalloc(len, so); |
lva = sokvaalloc(sva, len, so); |
if (lva == 0) |
if (lva == 0) |
return 0; |
return 0; |
|
|
Line 386 sosend_loan(struct socket *so, struct ui |
|
Line 370 sosend_loan(struct socket *so, struct ui |
|
|
|
for (i = 0, va = lva; i < npgs; i++, va += PAGE_SIZE) |
for (i = 0, va = lva; i < npgs; i++, va += PAGE_SIZE) |
pmap_kenter_pa(va, VM_PAGE_TO_PHYS(m->m_ext.ext_pgs[i]), |
pmap_kenter_pa(va, VM_PAGE_TO_PHYS(m->m_ext.ext_pgs[i]), |
VM_PROT_READ); |
VM_PROT_READ, 0); |
pmap_update(pmap_kernel()); |
pmap_update(pmap_kernel()); |
|
|
lva += (vaddr_t) iov->iov_base & PAGE_MASK; |
lva += (vaddr_t) iov->iov_base & PAGE_MASK; |
Line 406 sosend_loan(struct socket *so, struct ui |
|
Line 390 sosend_loan(struct socket *so, struct ui |
|
return (space); |
return (space); |
} |
} |
|
|
static int |
|
sokva_reclaim_callback(struct callback_entry *ce, void *obj, void *arg) |
|
{ |
|
|
|
KASSERT(ce == &sokva_reclaimerentry); |
|
KASSERT(obj == NULL); |
|
|
|
sodopendfree(); |
|
if (!vm_map_starved_p(kernel_map)) { |
|
return CALLBACK_CHAIN_ABORT; |
|
} |
|
return CALLBACK_CHAIN_CONTINUE; |
|
} |
|
|
|
struct mbuf * |
struct mbuf * |
getsombuf(struct socket *so, int type) |
getsombuf(struct socket *so, int type) |
{ |
{ |
Line 440 socket_listener_cb(kauth_cred_t cred, ka |
|
Line 410 socket_listener_cb(kauth_cred_t cred, ka |
|
result = KAUTH_RESULT_DEFER; |
result = KAUTH_RESULT_DEFER; |
req = (enum kauth_network_req)arg0; |
req = (enum kauth_network_req)arg0; |
|
|
if (action != KAUTH_NETWORK_SOCKET) |
if ((action != KAUTH_NETWORK_SOCKET) && |
|
(action != KAUTH_NETWORK_BIND)) |
return result; |
return result; |
|
|
switch (req) { |
switch (req) { |
|
case KAUTH_REQ_NETWORK_BIND_PORT: |
|
result = KAUTH_RESULT_ALLOW; |
|
break; |
|
|
case KAUTH_REQ_NETWORK_SOCKET_DROP: { |
case KAUTH_REQ_NETWORK_SOCKET_DROP: { |
/* Normal users can only drop their own connections. */ |
/* Normal users can only drop their own connections. */ |
struct socket *so = (struct socket *)arg1; |
struct socket *so = (struct socket *)arg1; |
uid_t sockuid = so->so_uidinfo->ui_uid; |
|
|
|
if (sockuid == kauth_cred_getuid(cred) || |
if (so->so_cred && proc_uidmatch(cred, so->so_cred) == 0) |
sockuid == kauth_cred_geteuid(cred)) |
|
result = KAUTH_RESULT_ALLOW; |
result = KAUTH_RESULT_ALLOW; |
|
|
break; |
break; |
Line 458 socket_listener_cb(kauth_cred_t cred, ka |
|
Line 431 socket_listener_cb(kauth_cred_t cred, ka |
|
|
|
case KAUTH_REQ_NETWORK_SOCKET_OPEN: |
case KAUTH_REQ_NETWORK_SOCKET_OPEN: |
/* We allow "raw" routing/bluetooth sockets to anyone. */ |
/* We allow "raw" routing/bluetooth sockets to anyone. */ |
if ((u_long)arg1 == PF_ROUTE || (u_long)arg1 == PF_BLUETOOTH) |
if ((u_long)arg1 == PF_ROUTE || (u_long)arg1 == PF_OROUTE |
|
|| (u_long)arg1 == PF_BLUETOOTH) { |
result = KAUTH_RESULT_ALLOW; |
result = KAUTH_RESULT_ALLOW; |
else { |
} else { |
/* Privileged, let secmodel handle this. */ |
/* Privileged, let secmodel handle this. */ |
if ((u_long)arg2 == SOCK_RAW) |
if ((u_long)arg2 == SOCK_RAW) |
break; |
break; |
|
|
soinit(void) |
soinit(void) |
{ |
{ |
|
|
sysctl_kern_somaxkva_setup(); |
sysctl_kern_socket_setup(); |
|
|
mutex_init(&so_pendfree_lock, MUTEX_DEFAULT, IPL_VM); |
mutex_init(&so_pendfree_lock, MUTEX_DEFAULT, IPL_VM); |
softnet_lock = mutex_obj_alloc(MUTEX_DEFAULT, IPL_NONE); |
softnet_lock = mutex_obj_alloc(MUTEX_DEFAULT, IPL_NONE); |
cv_init(&socurkva_cv, "sokva"); |
cv_init(&socurkva_cv, "sokva"); |
|
cv_init(&pendfree_thread_cv, "sopendfr"); |
soinit2(); |
soinit2(); |
|
|
/* Set the initial adjusted socket buffer size. */ |
/* Set the initial adjusted socket buffer size. */ |
if (sb_max_set(sb_max)) |
if (sb_max_set(sb_max)) |
panic("bad initial sb_max value: %lu", sb_max); |
panic("bad initial sb_max value: %lu", sb_max); |
|
|
callback_register(&vm_map_to_kernel(kernel_map)->vmk_reclaim_callback, |
|
&sokva_reclaimerentry, NULL, sokva_reclaim_callback); |
|
|
|
socket_listener = kauth_listen_scope(KAUTH_SCOPE_NETWORK, |
socket_listener = kauth_listen_scope(KAUTH_SCOPE_NETWORK, |
socket_listener_cb, NULL); |
socket_listener_cb, NULL); |
} |
} |
|
|
|
void |
|
soinit1(void) |
|
{ |
|
int error = kthread_create(PRI_NONE, KTHREAD_MPSAFE, NULL, |
|
sopendfree_thread, NULL, &sopendfree_lwp, "sopendfree"); |
|
if (error) |
|
panic("soinit1 %d", error); |
|
} |
|
|
/* |
/* |
* Socket operation routines. |
* socreate: create a new socket of the specified type and the protocol. |
* These routines are called by the routines in |
* |
* sys_socket.c or from a system process, and |
* => Caller may specify another socket for lock sharing (must not be held). |
* implement the semantics of socket operations by |
* => Returns the new socket without lock held. |
* switching out to the protocol specific routines. |
|
*/ |
*/ |
/*ARGSUSED*/ |
|
int |
int |
socreate(int dom, struct socket **aso, int type, int proto, struct lwp *l, |
socreate(int dom, struct socket **aso, int type, int proto, struct lwp *l, |
struct socket *lockso) |
struct socket *lockso) |
Line 541 socreate(int dom, struct socket **aso, i |
|
Line 520 socreate(int dom, struct socket **aso, i |
|
return EPROTOTYPE; |
return EPROTOTYPE; |
return EPROTONOSUPPORT; |
return EPROTONOSUPPORT; |
} |
} |
if (prp->pr_usrreq == NULL) |
if (prp->pr_usrreqs == NULL) |
return EPROTONOSUPPORT; |
return EPROTONOSUPPORT; |
if (prp->pr_type != type) |
if (prp->pr_type != type) |
return EPROTOTYPE; |
return EPROTOTYPE; |
Line 556 socreate(int dom, struct socket **aso, i |
|
Line 535 socreate(int dom, struct socket **aso, i |
|
so->so_snd.sb_mowner = &prp->pr_domain->dom_mowner; |
so->so_snd.sb_mowner = &prp->pr_domain->dom_mowner; |
so->so_mowner = &prp->pr_domain->dom_mowner; |
so->so_mowner = &prp->pr_domain->dom_mowner; |
#endif |
#endif |
/* so->so_cred = kauth_cred_dup(l->l_cred); */ |
|
uid = kauth_cred_geteuid(l->l_cred); |
uid = kauth_cred_geteuid(l->l_cred); |
so->so_uidinfo = uid_find(uid); |
so->so_uidinfo = uid_find(uid); |
so->so_egid = kauth_cred_getegid(l->l_cred); |
|
so->so_cpid = l->l_proc->p_pid; |
so->so_cpid = l->l_proc->p_pid; |
if (lockso != NULL) { |
|
/* Caller wants us to share a lock. */ |
/* |
|
* Lock assigned and taken during PCB attach, unless we share |
|
* the lock with another socket, e.g. socketpair(2) case. |
|
*/ |
|
if (lockso) { |
lock = lockso->so_lock; |
lock = lockso->so_lock; |
so->so_lock = lock; |
so->so_lock = lock; |
mutex_obj_hold(lock); |
mutex_obj_hold(lock); |
mutex_enter(lock); |
mutex_enter(lock); |
} else { |
|
/* Lock assigned and taken during PRU_ATTACH. */ |
|
} |
} |
error = (*prp->pr_usrreq)(so, PRU_ATTACH, NULL, |
|
(struct mbuf *)(long)proto, NULL, l); |
/* Attach the PCB (returns with the socket lock held). */ |
|
error = (*prp->pr_usrreqs->pr_attach)(so, proto); |
KASSERT(solocked(so)); |
KASSERT(solocked(so)); |
if (error != 0) { |
|
|
if (error) { |
|
KASSERT(so->so_pcb == NULL); |
so->so_state |= SS_NOFDREF; |
so->so_state |= SS_NOFDREF; |
sofree(so); |
sofree(so); |
return error; |
return error; |
} |
} |
|
so->so_cred = kauth_cred_dup(l->l_cred); |
sounlock(so); |
sounlock(so); |
|
|
*aso = so; |
*aso = so; |
return 0; |
return 0; |
} |
} |
|
|
/* On success, write file descriptor to fdout and return zero. On |
/* |
* failure, return non-zero; *fdout will be undefined. |
* fsocreate: create a socket and a file descriptor associated with it. |
|
* |
|
* => On success, write file descriptor to fdout and return zero. |
|
* => On failure, return non-zero; *fdout will be undefined. |
*/ |
*/ |
int |
int |
fsocreate(int domain, struct socket **sop, int type, int protocol, |
fsocreate(int domain, struct socket **sop, int type, int proto, int *fdout) |
struct lwp *l, int *fdout) |
|
{ |
{ |
struct socket *so; |
lwp_t *l = curlwp; |
struct file *fp; |
int error, fd, flags; |
int fd, error; |
struct socket *so; |
|
struct file *fp; |
|
|
if ((error = fd_allocfile(&fp, &fd)) != 0) |
if ((error = fd_allocfile(&fp, &fd)) != 0) { |
return (error); |
return error; |
fp->f_flag = FREAD|FWRITE; |
} |
|
flags = type & SOCK_FLAGS_MASK; |
|
fd_set_exclose(l, fd, (flags & SOCK_CLOEXEC) != 0); |
|
fp->f_flag = FREAD|FWRITE|((flags & SOCK_NONBLOCK) ? FNONBLOCK : 0)| |
|
((flags & SOCK_NOSIGPIPE) ? FNOSIGPIPE : 0); |
fp->f_type = DTYPE_SOCKET; |
fp->f_type = DTYPE_SOCKET; |
fp->f_ops = &socketops; |
fp->f_ops = &socketops; |
error = socreate(domain, &so, type, protocol, l, NULL); |
|
if (error != 0) { |
type &= ~SOCK_FLAGS_MASK; |
|
error = socreate(domain, &so, type, proto, l, NULL); |
|
if (error) { |
fd_abort(curproc, fp, fd); |
fd_abort(curproc, fp, fd); |
} else { |
return error; |
if (sop != NULL) |
} |
*sop = so; |
if (flags & SOCK_NONBLOCK) { |
fp->f_data = so; |
so->so_state |= SS_NBIO; |
fd_affix(curproc, fp, fd); |
} |
*fdout = fd; |
fp->f_data = so; |
|
fd_affix(curproc, fp, fd); |
|
|
|
if (sop != NULL) { |
|
*sop = so; |
} |
} |
|
*fdout = fd; |
return error; |
return error; |
} |
} |
|
|
Line 631 sobind(struct socket *so, struct mbuf *n |
|
Line 629 sobind(struct socket *so, struct mbuf *n |
|
int error; |
int error; |
|
|
solock(so); |
solock(so); |
error = (*so->so_proto->pr_usrreq)(so, PRU_BIND, NULL, nam, NULL, l); |
error = (*so->so_proto->pr_usrreqs->pr_generic)(so, |
|
PRU_BIND, NULL, nam, NULL, l); |
sounlock(so); |
sounlock(so); |
return error; |
return error; |
} |
} |
Line 644 solisten(struct socket *so, int backlog, |
|
Line 643 solisten(struct socket *so, int backlog, |
|
solock(so); |
solock(so); |
if ((so->so_state & (SS_ISCONNECTED | SS_ISCONNECTING | |
if ((so->so_state & (SS_ISCONNECTED | SS_ISCONNECTING | |
SS_ISDISCONNECTING)) != 0) { |
SS_ISDISCONNECTING)) != 0) { |
sounlock(so); |
sounlock(so); |
return (EOPNOTSUPP); |
return EINVAL; |
} |
} |
error = (*so->so_proto->pr_usrreq)(so, PRU_LISTEN, NULL, |
error = (*so->so_proto->pr_usrreqs->pr_generic)(so, |
NULL, NULL, l); |
PRU_LISTEN, NULL, NULL, NULL, l); |
if (error != 0) { |
if (error != 0) { |
sounlock(so); |
sounlock(so); |
return error; |
return error; |
Line 699 sofree(struct socket *so) |
|
Line 698 sofree(struct socket *so) |
|
/* Remove acccept filter if one is present. */ |
/* Remove acccept filter if one is present. */ |
if (so->so_accf != NULL) |
if (so->so_accf != NULL) |
(void)accept_filt_clear(so); |
(void)accept_filt_clear(so); |
/* kauth_cred_free(so->so_cred); */ |
|
sounlock(so); |
sounlock(so); |
if (refs == 0) /* XXX */ |
if (refs == 0) /* XXX */ |
soput(so); |
soput(so); |
} |
} |
|
|
/* |
/* |
* Close a socket on last file table reference removal. |
* soclose: close a socket on last file table reference removal. |
* Initiate disconnect if connected. |
* Initiate disconnect if connected. Free socket when disconnect complete. |
* Free socket when disconnect complete. |
|
*/ |
*/ |
int |
int |
soclose(struct socket *so) |
soclose(struct socket *so) |
{ |
{ |
struct socket *so2; |
struct socket *so2; |
int error; |
int error = 0; |
int error2; |
|
|
|
error = 0; |
|
solock(so); |
solock(so); |
if (so->so_options & SO_ACCEPTCONN) { |
if (so->so_options & SO_ACCEPTCONN) { |
for (;;) { |
for (;;) { |
Line 740 soclose(struct socket *so) |
|
Line 735 soclose(struct socket *so) |
|
break; |
break; |
} |
} |
} |
} |
if (so->so_pcb == 0) |
if (so->so_pcb == NULL) |
goto discard; |
goto discard; |
if (so->so_state & SS_ISCONNECTED) { |
if (so->so_state & SS_ISCONNECTED) { |
if ((so->so_state & SS_ISDISCONNECTING) == 0) { |
if ((so->so_state & SS_ISDISCONNECTING) == 0) { |
Line 749 soclose(struct socket *so) |
|
Line 744 soclose(struct socket *so) |
|
goto drop; |
goto drop; |
} |
} |
if (so->so_options & SO_LINGER) { |
if (so->so_options & SO_LINGER) { |
if ((so->so_state & SS_ISDISCONNECTING) && so->so_nbio) |
if ((so->so_state & (SS_ISDISCONNECTING|SS_NBIO)) == |
|
(SS_ISDISCONNECTING|SS_NBIO)) |
goto drop; |
goto drop; |
while (so->so_state & SS_ISCONNECTED) { |
while (so->so_state & SS_ISCONNECTED) { |
error = sowait(so, true, so->so_linger * hz); |
error = sowait(so, true, so->so_linger * hz); |
Line 760 soclose(struct socket *so) |
|
Line 756 soclose(struct socket *so) |
|
} |
} |
drop: |
drop: |
if (so->so_pcb) { |
if (so->so_pcb) { |
error2 = (*so->so_proto->pr_usrreq)(so, PRU_DETACH, |
KASSERT(solocked(so)); |
NULL, NULL, NULL, NULL); |
(*so->so_proto->pr_usrreqs->pr_detach)(so); |
if (error == 0) |
|
error = error2; |
|
} |
} |
discard: |
discard: |
if (so->so_state & SS_NOFDREF) |
KASSERT((so->so_state & SS_NOFDREF) == 0); |
panic("soclose: NOFDREF"); |
kauth_cred_free(so->so_cred); |
so->so_state |= SS_NOFDREF; |
so->so_state |= SS_NOFDREF; |
sofree(so); |
sofree(so); |
return (error); |
return error; |
} |
} |
|
|
/* |
/* |
Line 786 soabort(struct socket *so) |
|
Line 780 soabort(struct socket *so) |
|
KASSERT(so->so_head == NULL); |
KASSERT(so->so_head == NULL); |
|
|
so->so_aborting++; /* XXX */ |
so->so_aborting++; /* XXX */ |
error = (*so->so_proto->pr_usrreq)(so, PRU_ABORT, NULL, |
error = (*so->so_proto->pr_usrreqs->pr_generic)(so, |
NULL, NULL, NULL); |
PRU_ABORT, NULL, NULL, NULL, NULL); |
refs = --so->so_aborting; /* XXX */ |
refs = --so->so_aborting; /* XXX */ |
if (error || (refs == 0)) { |
if (error || (refs == 0)) { |
sofree(so); |
sofree(so); |
Line 800 soabort(struct socket *so) |
|
Line 794 soabort(struct socket *so) |
|
int |
int |
soaccept(struct socket *so, struct mbuf *nam) |
soaccept(struct socket *so, struct mbuf *nam) |
{ |
{ |
int error; |
int error; |
|
|
KASSERT(solocked(so)); |
KASSERT(solocked(so)); |
|
KASSERT((so->so_state & SS_NOFDREF) != 0); |
|
|
error = 0; |
|
if ((so->so_state & SS_NOFDREF) == 0) |
|
panic("soaccept: !NOFDREF"); |
|
so->so_state &= ~SS_NOFDREF; |
so->so_state &= ~SS_NOFDREF; |
if ((so->so_state & SS_ISDISCONNECTED) == 0 || |
if ((so->so_state & SS_ISDISCONNECTED) == 0 || |
(so->so_proto->pr_flags & PR_ABRTACPTDIS) == 0) |
(so->so_proto->pr_flags & PR_ABRTACPTDIS) == 0) |
error = (*so->so_proto->pr_usrreq)(so, PRU_ACCEPT, |
error = (*so->so_proto->pr_usrreqs->pr_accept)(so, nam); |
NULL, nam, NULL, NULL); |
|
else |
else |
error = ECONNABORTED; |
error = ECONNABORTED; |
|
|
return (error); |
return error; |
} |
} |
|
|
int |
int |
soconnect(struct socket *so, struct mbuf *nam, struct lwp *l) |
soconnect(struct socket *so, struct mbuf *nam, struct lwp *l) |
{ |
{ |
int error; |
int error; |
|
|
KASSERT(solocked(so)); |
KASSERT(solocked(so)); |
|
|
if (so->so_options & SO_ACCEPTCONN) |
if (so->so_options & SO_ACCEPTCONN) |
return (EOPNOTSUPP); |
return EOPNOTSUPP; |
/* |
/* |
* If protocol is connection-based, can only connect once. |
* If protocol is connection-based, can only connect once. |
* Otherwise, if connected, try to disconnect first. |
* Otherwise, if connected, try to disconnect first. |
Line 838 soconnect(struct socket *so, struct mbuf |
|
Line 829 soconnect(struct socket *so, struct mbuf |
|
(error = sodisconnect(so)))) |
(error = sodisconnect(so)))) |
error = EISCONN; |
error = EISCONN; |
else |
else |
error = (*so->so_proto->pr_usrreq)(so, PRU_CONNECT, |
error = (*so->so_proto->pr_usrreqs->pr_generic)(so, |
NULL, nam, NULL, l); |
PRU_CONNECT, NULL, nam, NULL, l); |
return (error); |
|
|
return error; |
} |
} |
|
|
int |
int |
soconnect2(struct socket *so1, struct socket *so2) |
soconnect2(struct socket *so1, struct socket *so2) |
{ |
{ |
int error; |
|
|
|
KASSERT(solocked2(so1, so2)); |
KASSERT(solocked2(so1, so2)); |
|
|
error = (*so1->so_proto->pr_usrreq)(so1, PRU_CONNECT2, |
return (*so1->so_proto->pr_usrreqs->pr_generic)(so1, |
NULL, (struct mbuf *)so2, NULL, NULL); |
PRU_CONNECT2, NULL, (struct mbuf *)so2, NULL, NULL); |
return (error); |
|
} |
} |
|
|
int |
int |
Line 867 sodisconnect(struct socket *so) |
|
Line 856 sodisconnect(struct socket *so) |
|
} else if (so->so_state & SS_ISDISCONNECTING) { |
} else if (so->so_state & SS_ISDISCONNECTING) { |
error = EALREADY; |
error = EALREADY; |
} else { |
} else { |
error = (*so->so_proto->pr_usrreq)(so, PRU_DISCONNECT, |
error = (*so->so_proto->pr_usrreqs->pr_generic)(so, |
NULL, NULL, NULL, NULL); |
PRU_DISCONNECT, NULL, NULL, NULL, NULL); |
} |
} |
sodopendfree(); |
|
return (error); |
return (error); |
} |
} |
|
|
Line 897 sosend(struct socket *so, struct mbuf *a |
|
Line 885 sosend(struct socket *so, struct mbuf *a |
|
struct mbuf *control, int flags, struct lwp *l) |
struct mbuf *control, int flags, struct lwp *l) |
{ |
{ |
struct mbuf **mp, *m; |
struct mbuf **mp, *m; |
struct proc *p; |
|
long space, len, resid, clen, mlen; |
long space, len, resid, clen, mlen; |
int error, s, dontroute, atomic; |
int error, s, dontroute, atomic; |
|
short wakeup_state = 0; |
|
|
p = l->l_proc; |
|
sodopendfree(); |
|
clen = 0; |
clen = 0; |
|
|
/* |
/* |
Line 949 sosend(struct socket *so, struct mbuf *a |
|
Line 935 sosend(struct socket *so, struct mbuf *a |
|
} |
} |
if ((so->so_state & SS_ISCONNECTED) == 0) { |
if ((so->so_state & SS_ISCONNECTED) == 0) { |
if (so->so_proto->pr_flags & PR_CONNREQUIRED) { |
if (so->so_proto->pr_flags & PR_CONNREQUIRED) { |
if ((so->so_state & SS_ISCONFIRMING) == 0 && |
if (resid || clen == 0) { |
!(resid == 0 && clen != 0)) { |
|
error = ENOTCONN; |
error = ENOTCONN; |
goto release; |
goto release; |
} |
} |
Line 969 sosend(struct socket *so, struct mbuf *a |
|
Line 954 sosend(struct socket *so, struct mbuf *a |
|
} |
} |
if (space < resid + clen && |
if (space < resid + clen && |
(atomic || space < so->so_snd.sb_lowat || space < clen)) { |
(atomic || space < so->so_snd.sb_lowat || space < clen)) { |
if (so->so_nbio) { |
if ((so->so_state & SS_NBIO) || (flags & MSG_NBIO)) { |
error = EWOULDBLOCK; |
error = EWOULDBLOCK; |
goto release; |
goto release; |
} |
} |
sbunlock(&so->so_snd); |
sbunlock(&so->so_snd); |
|
if (wakeup_state & SS_RESTARTSYS) { |
|
error = ERESTART; |
|
goto out; |
|
} |
error = sbwait(&so->so_snd); |
error = sbwait(&so->so_snd); |
if (error) |
if (error) |
goto out; |
goto out; |
|
wakeup_state = so->so_state; |
goto restart; |
goto restart; |
} |
} |
|
wakeup_state = 0; |
mp = ⊤ |
mp = ⊤ |
space -= clen; |
space -= clen; |
do { |
do { |
Line 1013 sosend(struct socket *so, struct mbuf *a |
|
Line 1004 sosend(struct socket *so, struct mbuf *a |
|
} |
} |
if (resid >= MINCLSIZE && space >= MCLBYTES) { |
if (resid >= MINCLSIZE && space >= MCLBYTES) { |
SOSEND_COUNTER_INCR(&sosend_copy_big); |
SOSEND_COUNTER_INCR(&sosend_copy_big); |
m_clget(m, M_WAIT); |
m_clget(m, M_DONTWAIT); |
if ((m->m_flags & M_EXT) == 0) |
if ((m->m_flags & M_EXT) == 0) |
goto nopages; |
goto nopages; |
mlen = MCLBYTES; |
mlen = MCLBYTES; |
Line 1062 sosend(struct socket *so, struct mbuf *a |
|
Line 1053 sosend(struct socket *so, struct mbuf *a |
|
so->so_options |= SO_DONTROUTE; |
so->so_options |= SO_DONTROUTE; |
if (resid > 0) |
if (resid > 0) |
so->so_state |= SS_MORETOCOME; |
so->so_state |= SS_MORETOCOME; |
error = (*so->so_proto->pr_usrreq)(so, |
if (flags & MSG_OOB) |
(flags & MSG_OOB) ? PRU_SENDOOB : PRU_SEND, |
error = (*so->so_proto->pr_usrreqs->pr_sendoob)(so, |
top, addr, control, curlwp); |
top, control); |
|
else |
|
error = (*so->so_proto->pr_usrreqs->pr_generic)(so, |
|
PRU_SEND, top, addr, control, curlwp); |
if (dontroute) |
if (dontroute) |
so->so_options &= ~SO_DONTROUTE; |
so->so_options &= ~SO_DONTROUTE; |
if (resid > 0) |
if (resid > 0) |
Line 1149 soreceive(struct socket *so, struct mbuf |
|
Line 1143 soreceive(struct socket *so, struct mbuf |
|
{ |
{ |
struct lwp *l = curlwp; |
struct lwp *l = curlwp; |
struct mbuf *m, **mp, *mt; |
struct mbuf *m, **mp, *mt; |
int atomic, flags, len, error, s, offset, moff, type, orig_resid; |
size_t len, offset, moff, orig_resid; |
|
int atomic, flags, error, s, type; |
const struct protosw *pr; |
const struct protosw *pr; |
struct mbuf *nextrecord; |
struct mbuf *nextrecord; |
int mbuf_removed = 0; |
int mbuf_removed = 0; |
const struct domain *dom; |
const struct domain *dom; |
|
short wakeup_state = 0; |
|
|
pr = so->so_proto; |
pr = so->so_proto; |
atomic = pr->pr_flags & PR_ATOMIC; |
atomic = pr->pr_flags & PR_ATOMIC; |
Line 1171 soreceive(struct socket *so, struct mbuf |
|
Line 1167 soreceive(struct socket *so, struct mbuf |
|
else |
else |
flags = 0; |
flags = 0; |
|
|
if ((flags & MSG_DONTWAIT) == 0) |
|
sodopendfree(); |
|
|
|
if (flags & MSG_OOB) { |
if (flags & MSG_OOB) { |
m = m_get(M_WAIT, MT_DATA); |
m = m_get(M_WAIT, MT_DATA); |
solock(so); |
solock(so); |
error = (*pr->pr_usrreq)(so, PRU_RCVOOB, m, |
error = (*pr->pr_usrreqs->pr_recvoob)(so, m, flags & MSG_PEEK); |
(struct mbuf *)(long)(flags & MSG_PEEK), NULL, l); |
|
sounlock(so); |
sounlock(so); |
if (error) |
if (error) |
goto bad; |
goto bad; |
do { |
do { |
error = uiomove(mtod(m, void *), |
error = uiomove(mtod(m, void *), |
(int) min(uio->uio_resid, m->m_len), uio); |
MIN(uio->uio_resid, m->m_len), uio); |
m = m_free(m); |
m = m_free(m); |
} while (uio->uio_resid > 0 && error == 0 && m); |
} while (uio->uio_resid > 0 && error == 0 && m); |
bad: |
bad: |
Line 1202 soreceive(struct socket *so, struct mbuf |
|
Line 1194 soreceive(struct socket *so, struct mbuf |
|
*/ |
*/ |
s = splsoftnet(); |
s = splsoftnet(); |
solock(so); |
solock(so); |
if (so->so_state & SS_ISCONFIRMING && uio->uio_resid) |
|
(*pr->pr_usrreq)(so, PRU_RCVD, NULL, NULL, NULL, l); |
|
|
|
restart: |
restart: |
if ((error = sblock(&so->so_rcv, SBLOCKWAIT(flags))) != 0) { |
if ((error = sblock(&so->so_rcv, SBLOCKWAIT(flags))) != 0) { |
sounlock(so); |
sounlock(so); |
Line 1261 soreceive(struct socket *so, struct mbuf |
|
Line 1250 soreceive(struct socket *so, struct mbuf |
|
} |
} |
if (uio->uio_resid == 0) |
if (uio->uio_resid == 0) |
goto release; |
goto release; |
if (so->so_nbio || (flags & MSG_DONTWAIT)) { |
if ((so->so_state & SS_NBIO) || |
|
(flags & (MSG_DONTWAIT|MSG_NBIO))) { |
error = EWOULDBLOCK; |
error = EWOULDBLOCK; |
goto release; |
goto release; |
} |
} |
SBLASTRECORDCHK(&so->so_rcv, "soreceive sbwait 1"); |
SBLASTRECORDCHK(&so->so_rcv, "soreceive sbwait 1"); |
SBLASTMBUFCHK(&so->so_rcv, "soreceive sbwait 1"); |
SBLASTMBUFCHK(&so->so_rcv, "soreceive sbwait 1"); |
sbunlock(&so->so_rcv); |
sbunlock(&so->so_rcv); |
error = sbwait(&so->so_rcv); |
if (wakeup_state & SS_RESTARTSYS) |
|
error = ERESTART; |
|
else |
|
error = sbwait(&so->so_rcv); |
if (error != 0) { |
if (error != 0) { |
sounlock(so); |
sounlock(so); |
splx(s); |
splx(s); |
return error; |
return error; |
} |
} |
|
wakeup_state = so->so_state; |
goto restart; |
goto restart; |
} |
} |
dontblock: |
dontblock: |
Line 1362 soreceive(struct socket *so, struct mbuf |
|
Line 1356 soreceive(struct socket *so, struct mbuf |
|
type == SCM_RIGHTS) { |
type == SCM_RIGHTS) { |
sounlock(so); |
sounlock(so); |
splx(s); |
splx(s); |
error = (*dom->dom_externalize)(cm, l); |
error = (*dom->dom_externalize)(cm, l, |
|
(flags & MSG_CMSG_CLOEXEC) ? |
|
O_CLOEXEC : 0); |
s = splsoftnet(); |
s = splsoftnet(); |
solock(so); |
solock(so); |
} |
} |
Line 1412 soreceive(struct socket *so, struct mbuf |
|
Line 1408 soreceive(struct socket *so, struct mbuf |
|
panic("receive 3"); |
panic("receive 3"); |
#endif |
#endif |
so->so_state &= ~SS_RCVATMARK; |
so->so_state &= ~SS_RCVATMARK; |
|
wakeup_state = 0; |
len = uio->uio_resid; |
len = uio->uio_resid; |
if (so->so_oobmark && len > so->so_oobmark - offset) |
if (so->so_oobmark && len > so->so_oobmark - offset) |
len = so->so_oobmark - offset; |
len = so->so_oobmark - offset; |
Line 1430 soreceive(struct socket *so, struct mbuf |
|
Line 1427 soreceive(struct socket *so, struct mbuf |
|
SBLASTMBUFCHK(&so->so_rcv, "soreceive uiomove"); |
SBLASTMBUFCHK(&so->so_rcv, "soreceive uiomove"); |
sounlock(so); |
sounlock(so); |
splx(s); |
splx(s); |
error = uiomove(mtod(m, char *) + moff, (int)len, uio); |
error = uiomove(mtod(m, char *) + moff, len, uio); |
s = splsoftnet(); |
s = splsoftnet(); |
solock(so); |
solock(so); |
if (error != 0) { |
if (error != 0) { |
Line 1540 soreceive(struct socket *so, struct mbuf |
|
Line 1537 soreceive(struct socket *so, struct mbuf |
|
* get it filled again. |
* get it filled again. |
*/ |
*/ |
if ((pr->pr_flags & PR_WANTRCVD) && so->so_pcb) |
if ((pr->pr_flags & PR_WANTRCVD) && so->so_pcb) |
(*pr->pr_usrreq)(so, PRU_RCVD, |
(*pr->pr_usrreqs->pr_generic)(so, PRU_RCVD, |
NULL, (struct mbuf *)(long)flags, NULL, l); |
NULL, (struct mbuf *)(long)flags, NULL, l); |
SBLASTRECORDCHK(&so->so_rcv, "soreceive sbwait 2"); |
SBLASTRECORDCHK(&so->so_rcv, "soreceive sbwait 2"); |
SBLASTMBUFCHK(&so->so_rcv, "soreceive sbwait 2"); |
SBLASTMBUFCHK(&so->so_rcv, "soreceive sbwait 2"); |
error = sbwait(&so->so_rcv); |
if (wakeup_state & SS_RESTARTSYS) |
|
error = ERESTART; |
|
else |
|
error = sbwait(&so->so_rcv); |
if (error != 0) { |
if (error != 0) { |
sbunlock(&so->so_rcv); |
sbunlock(&so->so_rcv); |
sounlock(so); |
sounlock(so); |
Line 1553 soreceive(struct socket *so, struct mbuf |
|
Line 1553 soreceive(struct socket *so, struct mbuf |
|
} |
} |
if ((m = so->so_rcv.sb_mb) != NULL) |
if ((m = so->so_rcv.sb_mb) != NULL) |
nextrecord = m->m_nextpkt; |
nextrecord = m->m_nextpkt; |
|
wakeup_state = so->so_state; |
} |
} |
} |
} |
|
|
Line 1578 soreceive(struct socket *so, struct mbuf |
|
Line 1579 soreceive(struct socket *so, struct mbuf |
|
SBLASTRECORDCHK(&so->so_rcv, "soreceive 4"); |
SBLASTRECORDCHK(&so->so_rcv, "soreceive 4"); |
SBLASTMBUFCHK(&so->so_rcv, "soreceive 4"); |
SBLASTMBUFCHK(&so->so_rcv, "soreceive 4"); |
if (pr->pr_flags & PR_WANTRCVD && so->so_pcb) |
if (pr->pr_flags & PR_WANTRCVD && so->so_pcb) |
(*pr->pr_usrreq)(so, PRU_RCVD, NULL, |
(*pr->pr_usrreqs->pr_generic)(so, PRU_RCVD, NULL, |
(struct mbuf *)(long)flags, NULL, l); |
(struct mbuf *)(long)flags, NULL, l); |
} |
} |
if (orig_resid == uio->uio_resid && orig_resid && |
if (orig_resid == uio->uio_resid && orig_resid && |
Line 1613 soshutdown(struct socket *so, int how) |
|
Line 1614 soshutdown(struct socket *so, int how) |
|
error = 0; |
error = 0; |
} |
} |
if (how == SHUT_WR || how == SHUT_RDWR) |
if (how == SHUT_WR || how == SHUT_RDWR) |
error = (*pr->pr_usrreq)(so, PRU_SHUTDOWN, NULL, |
error = (*pr->pr_usrreqs->pr_generic)(so, |
NULL, NULL, NULL); |
PRU_SHUTDOWN, NULL, NULL, NULL, NULL); |
|
|
return error; |
return error; |
} |
} |
|
|
int |
void |
sodrain(struct socket *so) |
sorestart(struct socket *so) |
{ |
{ |
int error; |
/* |
|
* An application has called close() on an fd on which another |
|
* of its threads has called a socket system call. |
|
* Mark this and wake everyone up, and code that would block again |
|
* instead returns ERESTART. |
|
* On system call re-entry the fd is validated and EBADF returned. |
|
* Any other fd will block again on the 2nd syscall. |
|
*/ |
solock(so); |
solock(so); |
so->so_state |= SS_ISDRAINING; |
so->so_state |= SS_RESTARTSYS; |
cv_broadcast(&so->so_cv); |
cv_broadcast(&so->so_cv); |
error = soshutdown(so, SHUT_RDWR); |
cv_broadcast(&so->so_snd.sb_cv); |
|
cv_broadcast(&so->so_rcv.sb_cv); |
sounlock(so); |
sounlock(so); |
|
|
return error; |
|
} |
} |
|
|
void |
void |
Line 1668 sorflush(struct socket *so) |
|
Line 1674 sorflush(struct socket *so) |
|
static int |
static int |
sosetopt1(struct socket *so, const struct sockopt *sopt) |
sosetopt1(struct socket *so, const struct sockopt *sopt) |
{ |
{ |
int error = EINVAL, optval, opt; |
int error = EINVAL, opt; |
|
int optval = 0; /* XXX: gcc */ |
struct linger l; |
struct linger l; |
struct timeval tv; |
struct timeval tv; |
|
|
Line 1705 sosetopt1(struct socket *so, const struc |
|
Line 1712 sosetopt1(struct socket *so, const struc |
|
case SO_REUSEPORT: |
case SO_REUSEPORT: |
case SO_OOBINLINE: |
case SO_OOBINLINE: |
case SO_TIMESTAMP: |
case SO_TIMESTAMP: |
|
case SO_NOSIGPIPE: |
#ifdef SO_OTIMESTAMP |
#ifdef SO_OTIMESTAMP |
case SO_OTIMESTAMP: |
case SO_OTIMESTAMP: |
#endif |
#endif |
Line 1905 sogetopt1(struct socket *so, struct sock |
|
Line 1913 sogetopt1(struct socket *so, struct sock |
|
case SO_BROADCAST: |
case SO_BROADCAST: |
case SO_OOBINLINE: |
case SO_OOBINLINE: |
case SO_TIMESTAMP: |
case SO_TIMESTAMP: |
|
case SO_NOSIGPIPE: |
#ifdef SO_OTIMESTAMP |
#ifdef SO_OTIMESTAMP |
case SO_OTIMESTAMP: |
case SO_OTIMESTAMP: |
#endif |
#endif |
|
case SO_ACCEPTCONN: |
error = sockopt_setint(sopt, (so->so_options & opt) ? 1 : 0); |
error = sockopt_setint(sopt, (so->so_options & opt) ? 1 : 0); |
break; |
break; |
|
|
Line 2365 sopoll(struct socket *so, int events) |
|
Line 2375 sopoll(struct socket *so, int events) |
|
#include <sys/sysctl.h> |
#include <sys/sysctl.h> |
|
|
static int sysctl_kern_somaxkva(SYSCTLFN_PROTO); |
static int sysctl_kern_somaxkva(SYSCTLFN_PROTO); |
|
static int sysctl_kern_sbmax(SYSCTLFN_PROTO); |
|
|
/* |
/* |
* sysctl helper routine for kern.somaxkva. ensures that the given |
* sysctl helper routine for kern.somaxkva. ensures that the given |
Line 2395 sysctl_kern_somaxkva(SYSCTLFN_ARGS) |
|
Line 2406 sysctl_kern_somaxkva(SYSCTLFN_ARGS) |
|
return (error); |
return (error); |
} |
} |
|
|
|
/* |
|
* sysctl helper routine for kern.sbmax. Basically just ensures that |
|
* any new value is not too small. |
|
*/ |
|
static int |
|
sysctl_kern_sbmax(SYSCTLFN_ARGS) |
|
{ |
|
int error, new_sbmax; |
|
struct sysctlnode node; |
|
|
|
new_sbmax = sb_max; |
|
node = *rnode; |
|
node.sysctl_data = &new_sbmax; |
|
error = sysctl_lookup(SYSCTLFN_CALL(&node)); |
|
if (error || newp == NULL) |
|
return (error); |
|
|
|
KERNEL_LOCK(1, NULL); |
|
error = sb_max_set(new_sbmax); |
|
KERNEL_UNLOCK_ONE(NULL); |
|
|
|
return (error); |
|
} |
|
|
static void |
static void |
sysctl_kern_somaxkva_setup(void) |
sysctl_kern_socket_setup(void) |
{ |
{ |
|
|
KASSERT(socket_sysctllog == NULL); |
KASSERT(socket_sysctllog == NULL); |
sysctl_createv(&socket_sysctllog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT, |
|
CTLTYPE_NODE, "kern", NULL, |
|
NULL, 0, NULL, 0, |
|
CTL_KERN, CTL_EOL); |
|
|
|
sysctl_createv(&socket_sysctllog, 0, NULL, NULL, |
sysctl_createv(&socket_sysctllog, 0, NULL, NULL, |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
Line 2413 sysctl_kern_somaxkva_setup(void) |
|
Line 2443 sysctl_kern_somaxkva_setup(void) |
|
"used for socket buffers"), |
"used for socket buffers"), |
sysctl_kern_somaxkva, 0, NULL, 0, |
sysctl_kern_somaxkva, 0, NULL, 0, |
CTL_KERN, KERN_SOMAXKVA, CTL_EOL); |
CTL_KERN, KERN_SOMAXKVA, CTL_EOL); |
|
|
|
sysctl_createv(&socket_sysctllog, 0, NULL, NULL, |
|
CTLFLAG_PERMANENT|CTLFLAG_READWRITE, |
|
CTLTYPE_INT, "sbmax", |
|
SYSCTL_DESCR("Maximum socket buffer size"), |
|
sysctl_kern_sbmax, 0, NULL, 0, |
|
CTL_KERN, KERN_SBMAX, CTL_EOL); |
} |
} |