The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/sys/socketvar.h

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 1982, 1986, 1990, 1993
    3  *      The Regents of the University of California.  All rights reserved.
    4  *
    5  * Redistribution and use in source and binary forms, with or without
    6  * modification, are permitted provided that the following conditions
    7  * are met:
    8  * 1. Redistributions of source code must retain the above copyright
    9  *    notice, this list of conditions and the following disclaimer.
   10  * 2. Redistributions in binary form must reproduce the above copyright
   11  *    notice, this list of conditions and the following disclaimer in the
   12  *    documentation and/or other materials provided with the distribution.
   13  * 4. Neither the name of the University nor the names of its contributors
   14  *    may be used to endorse or promote products derived from this software
   15  *    without specific prior written permission.
   16  *
   17  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
   18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
   21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   27  * SUCH DAMAGE.
   28  *
   29  *      @(#)socketvar.h 8.3 (Berkeley) 2/19/95
   30  * $FreeBSD: src/sys/sys/socketvar.h,v 1.133.2.4 2005/03/07 13:08:05 rwatson Exp $
   31  */
   32 
   33 #ifndef _SYS_SOCKETVAR_H_
   34 #define _SYS_SOCKETVAR_H_
   35 
   36 #include <sys/queue.h>                  /* for TAILQ macros */
   37 #include <sys/selinfo.h>                /* for struct selinfo */
   38 #include <sys/_lock.h>
   39 #include <sys/_mutex.h>
   40 
   41 /*
   42  * Kernel structure per socket.
   43  * Contains send and receive buffer queues,
   44  * handle on protocol and pointer to protocol
   45  * private data and error information.
   46  */
   47 typedef u_quad_t so_gen_t;
   48 
   49 /*-
   50  * Locking key to struct socket:
   51  * (a) constant after allocation, no locking required.
   52  * (b) locked by SOCK_LOCK(so).
   53  * (c) locked by SOCKBUF_LOCK(&so->so_rcv).
   54  * (d) locked by SOCKBUF_LOCK(&so->so_snd).
   55  * (e) locked by ACCEPT_LOCK().
   56  * (f) not locked since integer reads/writes are atomic.
   57  * (g) used only as a sleep/wakeup address, no value.
   58  * (h) locked by global mutex so_global_mtx.
   59  */
   60 struct socket {
   61         int     so_count;               /* (b) reference count */
   62         short   so_type;                /* (a) generic type, see socket.h */
   63         short   so_options;             /* from socket call, see socket.h */
   64         short   so_linger;              /* time to linger while closing */
   65         short   so_state;               /* (b) internal state flags SS_* */
   66         int     so_qstate;              /* (e) internal state flags SQ_* */
   67         void    *so_pcb;                /* protocol control block */
   68         struct  protosw *so_proto;      /* (a) protocol handle */
   69 /*
   70  * Variables for connection queuing.
   71  * Socket where accepts occur is so_head in all subsidiary sockets.
   72  * If so_head is 0, socket is not related to an accept.
   73  * For head socket so_incomp queues partially completed connections,
   74  * while so_comp is a queue of connections ready to be accepted.
   75  * If a connection is aborted and it has so_head set, then
   76  * it has to be pulled out of either so_incomp or so_comp.
   77  * We allow connections to queue up based on current queue lengths
   78  * and limit on number of queued connections for this socket.
   79  */
   80         struct  socket *so_head;        /* (e) back pointer to accept socket */
   81         TAILQ_HEAD(, socket) so_incomp; /* (e) queue of partial unaccepted connections */
   82         TAILQ_HEAD(, socket) so_comp;   /* (e) queue of complete unaccepted connections */
   83         TAILQ_ENTRY(socket) so_list;    /* (e) list of unaccepted connections */
   84         short   so_qlen;                /* (e) number of unaccepted connections */
   85         short   so_incqlen;             /* (e) number of unaccepted incomplete
   86                                            connections */
   87         short   so_qlimit;              /* (e) max number queued connections */
   88         short   so_timeo;               /* (g) connection timeout */
   89         u_short so_error;               /* (f) error affecting connection */
   90         struct  sigio *so_sigio;        /* [sg] information for async I/O or
   91                                            out of band data (SIGURG) */
   92         u_long  so_oobmark;             /* (c) chars to oob mark */
   93         TAILQ_HEAD(, aiocblist) so_aiojobq; /* AIO ops waiting on socket */
   94 /*
   95  * Variables for socket buffering.
   96  */
   97         struct sockbuf {
   98                 struct  selinfo sb_sel; /* process selecting read/write */
   99                 struct  mtx sb_mtx;     /* sockbuf lock */
  100 #define sb_startzero    sb_mb
  101                 struct  mbuf *sb_mb;    /* (c/d) the mbuf chain */
  102                 struct  mbuf *sb_mbtail; /* (c/d) the last mbuf in the chain */
  103                 struct  mbuf *sb_lastrecord;    /* (c/d) first mbuf of last
  104                                                  * record in socket buffer */
  105                 u_int   sb_cc;          /* (c/d) actual chars in buffer */
  106                 u_int   sb_hiwat;       /* (c/d) max actual char count */
  107                 u_int   sb_mbcnt;       /* (c/d) chars of mbufs used */
  108                 u_int   sb_mbmax;       /* (c/d) max chars of mbufs to use */
  109                 u_int   sb_ctl;         /* (c/d) non-data chars in buffer */
  110                 int     sb_lowat;       /* (c/d) low water mark */
  111                 int     sb_timeo;       /* (c/d) timeout for read/write */
  112                 short   sb_flags;       /* (c/d) flags, see below */
  113                 short   sb_state;       /* (c/d) socket state on sockbuf */
  114         } so_rcv, so_snd;
  115 /*
  116  * Constants for sb_flags field of struct sockbuf.
  117  */
  118 #define SB_MAX          (256*1024)      /* default for max chars in sockbuf */
  119 /*
  120  * Constants for sb_flags field of struct sockbuf.
  121  */
  122 #define SB_LOCK         0x01            /* lock on data queue */
  123 #define SB_WANT         0x02            /* someone is waiting to lock */
  124 #define SB_WAIT         0x04            /* someone is waiting for data/space */
  125 #define SB_SEL          0x08            /* someone is selecting */
  126 #define SB_ASYNC        0x10            /* ASYNC I/O, need signals */
  127 #define SB_UPCALL       0x20            /* someone wants an upcall */
  128 #define SB_NOINTR       0x40            /* operations not interruptible */
  129 #define SB_AIO          0x80            /* AIO operations queued */
  130 #define SB_KNOTE        0x100           /* kernel note attached */
  131 
  132         void    (*so_upcall)(struct socket *, void *, int);
  133         void    *so_upcallarg;
  134         struct  ucred *so_cred;         /* (a) user credentials */
  135         struct  label *so_label;        /* (b) MAC label for socket */
  136         struct  label *so_peerlabel;    /* (b) cached MAC label for peer */
  137         /* NB: generation count must not be first; easiest to make it last. */
  138         so_gen_t so_gencnt;             /* (h) generation count */
  139         void    *so_emuldata;           /* private data for emulators */
  140         struct so_accf {
  141                 struct  accept_filter *so_accept_filter;
  142                 void    *so_accept_filter_arg;  /* saved filter args */
  143                 char    *so_accept_filter_str;  /* saved user args */
  144         } *so_accf;
  145 };
  146 
  147 #define SB_EMPTY_FIXUP(sb) do {                                         \
  148         if ((sb)->sb_mb == NULL) {                                      \
  149                 (sb)->sb_mbtail = NULL;                                 \
  150                 (sb)->sb_lastrecord = NULL;                             \
  151         }                                                               \
  152 } while (/*CONSTCOND*/0)
  153 
  154 /*
  155  * Global accept mutex to serialize access to accept queues and
  156  * fields associated with multiple sockets.  This allows us to
  157  * avoid defining a lock order between listen and accept sockets
  158  * until such time as it proves to be a good idea.
  159  */
  160 extern struct mtx accept_mtx;
  161 #define ACCEPT_LOCK_ASSERT()            mtx_assert(&accept_mtx, MA_OWNED)
  162 #define ACCEPT_UNLOCK_ASSERT()          mtx_assert(&accept_mtx, MA_NOTOWNED)
  163 #define ACCEPT_LOCK()                   mtx_lock(&accept_mtx)
  164 #define ACCEPT_UNLOCK()                 mtx_unlock(&accept_mtx)
  165 
  166 /*
  167  * Per-socket buffer mutex used to protect most fields in the socket
  168  * buffer.
  169  */
  170 #define SOCKBUF_MTX(_sb)                (&(_sb)->sb_mtx)
  171 #define SOCKBUF_LOCK_INIT(_sb, _name) \
  172         mtx_init(SOCKBUF_MTX(_sb), _name, NULL, MTX_DEF)
  173 #define SOCKBUF_LOCK_DESTROY(_sb)       mtx_destroy(SOCKBUF_MTX(_sb))
  174 #define SOCKBUF_LOCK(_sb)               mtx_lock(SOCKBUF_MTX(_sb))
  175 #define SOCKBUF_OWNED(_sb)              mtx_owned(SOCKBUF_MTX(_sb))
  176 #define SOCKBUF_UNLOCK(_sb)             mtx_unlock(SOCKBUF_MTX(_sb))
  177 #define SOCKBUF_LOCK_ASSERT(_sb)        mtx_assert(SOCKBUF_MTX(_sb), MA_OWNED)
  178 #define SOCKBUF_UNLOCK_ASSERT(_sb)      mtx_assert(SOCKBUF_MTX(_sb), MA_NOTOWNED)
  179 
  180 /*
  181  * Per-socket mutex: we reuse the receive socket buffer mutex for space
  182  * efficiency.  This decision should probably be revisited as we optimize
  183  * locking for the socket code.
  184  */
  185 #define SOCK_MTX(_so)                   SOCKBUF_MTX(&(_so)->so_rcv)
  186 #define SOCK_LOCK(_so)                  SOCKBUF_LOCK(&(_so)->so_rcv)
  187 #define SOCK_OWNED(_so)                 SOCKBUF_OWNED(&(_so)->so_rcv)
  188 #define SOCK_UNLOCK(_so)                SOCKBUF_UNLOCK(&(_so)->so_rcv)
  189 #define SOCK_LOCK_ASSERT(_so)           SOCKBUF_LOCK_ASSERT(&(_so)->so_rcv)
  190 
  191 /*
  192  * Socket state bits.
  193  *
  194  * Historically, this bits were all kept in the so_state field.  For
  195  * locking reasons, they are now in multiple fields, as they are
  196  * locked differently.  so_state maintains basic socket state protected
  197  * by the socket lock.  so_qstate holds information about the socket
  198  * accept queues.  Each socket buffer also has a state field holding
  199  * information relevant to that socket buffer (can't send, rcv).  Many
  200  * fields will be read without locks to improve performance and avoid
  201  * lock order issues.  However, this approach must be used with caution.
  202  */
  203 #define SS_NOFDREF              0x0001  /* no file table ref any more */
  204 #define SS_ISCONNECTED          0x0002  /* socket connected to a peer */
  205 #define SS_ISCONNECTING         0x0004  /* in process of connecting to peer */
  206 #define SS_ISDISCONNECTING      0x0008  /* in process of disconnecting */
  207 #define SS_NBIO                 0x0100  /* non-blocking ops */
  208 #define SS_ASYNC                0x0200  /* async i/o notify */
  209 #define SS_ISCONFIRMING         0x0400  /* deciding to accept connection req */
  210 #define SS_ISDISCONNECTED       0x2000  /* socket disconnected from peer */
  211 
  212 /*
  213  * Socket state bits now stored in the socket buffer state field.
  214  */
  215 #define SBS_CANTSENDMORE        0x0010  /* can't send more data to peer */
  216 #define SBS_CANTRCVMORE         0x0020  /* can't receive more data from peer */
  217 #define SBS_RCVATMARK           0x0040  /* at mark on input */
  218 
  219 /*
  220  * Socket state bits stored in so_qstate.
  221  */
  222 #define SQ_INCOMP               0x0800  /* unaccepted, incomplete connection */
  223 #define SQ_COMP                 0x1000  /* unaccepted, complete connection */
  224 
  225 /*
  226  * Externalized form of struct socket used by the sysctl(3) interface.
  227  */
  228 struct xsocket {
  229         size_t  xso_len;        /* length of this structure */
  230         struct  socket *xso_so; /* makes a convenient handle sometimes */
  231         short   so_type;
  232         short   so_options;
  233         short   so_linger;
  234         short   so_state;
  235         caddr_t so_pcb;         /* another convenient handle */
  236         int     xso_protocol;
  237         int     xso_family;
  238         short   so_qlen;
  239         short   so_incqlen;
  240         short   so_qlimit;
  241         short   so_timeo;
  242         u_short so_error;
  243         pid_t   so_pgid;
  244         u_long  so_oobmark;
  245         struct xsockbuf {
  246                 u_int   sb_cc;
  247                 u_int   sb_hiwat;
  248                 u_int   sb_mbcnt;
  249                 u_int   sb_mbmax;
  250                 int     sb_lowat;
  251                 int     sb_timeo;
  252                 short   sb_flags;
  253         } so_rcv, so_snd;
  254         uid_t   so_uid;         /* XXX */
  255 };
  256 
  257 #ifdef _KERNEL
  258 
  259 /*
  260  * Macros for sockets and socket buffering.
  261  */
  262 
  263 /*
  264  * Do we need to notify the other side when I/O is possible?
  265  */
  266 #define sb_notify(sb)   (((sb)->sb_flags & (SB_WAIT | SB_SEL | SB_ASYNC | \
  267     SB_UPCALL | SB_AIO | SB_KNOTE)) != 0)
  268 
  269 /*
  270  * How much space is there in a socket buffer (so->so_snd or so->so_rcv)?
  271  * This is problematical if the fields are unsigned, as the space might
  272  * still be negative (cc > hiwat or mbcnt > mbmax).  Should detect
  273  * overflow and return 0.  Should use "lmin" but it doesn't exist now.
  274  */
  275 #define sbspace(sb) \
  276     ((long) imin((int)((sb)->sb_hiwat - (sb)->sb_cc), \
  277          (int)((sb)->sb_mbmax - (sb)->sb_mbcnt)))
  278 
  279 /* do we have to send all at once on a socket? */
  280 #define sosendallatonce(so) \
  281     ((so)->so_proto->pr_flags & PR_ATOMIC)
  282 
  283 /* can we read something from so? */
  284 #define soreadable(so) \
  285     ((so)->so_rcv.sb_cc >= (so)->so_rcv.sb_lowat || \
  286         ((so)->so_rcv.sb_state & SBS_CANTRCVMORE) || \
  287         !TAILQ_EMPTY(&(so)->so_comp) || (so)->so_error)
  288 
  289 /* can we write something to so? */
  290 #define sowriteable(so) \
  291     ((sbspace(&(so)->so_snd) >= (so)->so_snd.sb_lowat && \
  292         (((so)->so_state&SS_ISCONNECTED) || \
  293           ((so)->so_proto->pr_flags&PR_CONNREQUIRED)==0)) || \
  294      ((so)->so_snd.sb_state & SBS_CANTSENDMORE) || \
  295      (so)->so_error)
  296 
  297 /* adjust counters in sb reflecting allocation of m */
  298 #define sballoc(sb, m) { \
  299         (sb)->sb_cc += (m)->m_len; \
  300         if ((m)->m_type != MT_DATA && (m)->m_type != MT_HEADER && \
  301             (m)->m_type != MT_OOBDATA) \
  302                 (sb)->sb_ctl += (m)->m_len; \
  303         (sb)->sb_mbcnt += MSIZE; \
  304         if ((m)->m_flags & M_EXT) \
  305                 (sb)->sb_mbcnt += (m)->m_ext.ext_size; \
  306 }
  307 
  308 /* adjust counters in sb reflecting freeing of m */
  309 #define sbfree(sb, m) { \
  310         (sb)->sb_cc -= (m)->m_len; \
  311         if ((m)->m_type != MT_DATA && (m)->m_type != MT_HEADER && \
  312             (m)->m_type != MT_OOBDATA) \
  313                 (sb)->sb_ctl -= (m)->m_len; \
  314         (sb)->sb_mbcnt -= MSIZE; \
  315         if ((m)->m_flags & M_EXT) \
  316                 (sb)->sb_mbcnt -= (m)->m_ext.ext_size; \
  317 }
  318 
  319 /*
  320  * Set lock on sockbuf sb; sleep if lock is already held.
  321  * Unless SB_NOINTR is set on sockbuf, sleep is interruptible.
  322  * Returns error without lock if sleep is interrupted.
  323  */
  324 #define sblock(sb, wf) ((sb)->sb_flags & SB_LOCK ? \
  325                 (((wf) == M_WAITOK) ? sb_lock(sb) : EWOULDBLOCK) : \
  326                 ((sb)->sb_flags |= SB_LOCK), 0)
  327 
  328 /* release lock on sockbuf sb */
  329 #define sbunlock(sb) do { \
  330         SOCKBUF_LOCK_ASSERT(sb); \
  331         (sb)->sb_flags &= ~SB_LOCK; \
  332         if ((sb)->sb_flags & SB_WANT) { \
  333                 (sb)->sb_flags &= ~SB_WANT; \
  334                 wakeup(&(sb)->sb_flags); \
  335         } \
  336 } while (0)
  337 
  338 /*
  339  * soref()/sorele() ref-count the socket structure.  Note that you must
  340  * still explicitly close the socket, but the last ref count will free
  341  * the structure.
  342  */
  343 #define soref(so) do {                                                  \
  344         SOCK_LOCK_ASSERT(so);                                           \
  345         ++(so)->so_count;                                               \
  346 } while (0)
  347 
  348 #define sorele(so) do {                                                 \
  349         ACCEPT_LOCK_ASSERT();                                           \
  350         SOCK_LOCK_ASSERT(so);                                           \
  351         if ((so)->so_count <= 0)                                        \
  352                 panic("sorele");                                        \
  353         if (--(so)->so_count == 0)                                      \
  354                 sofree(so);                                             \
  355         else {                                                          \
  356                 SOCK_UNLOCK(so);                                        \
  357                 ACCEPT_UNLOCK();                                        \
  358         }                                                               \
  359 } while (0)
  360 
  361 #define sotryfree(so) do {                                              \
  362         ACCEPT_LOCK_ASSERT();                                           \
  363         SOCK_LOCK_ASSERT(so);                                           \
  364         if ((so)->so_count == 0)                                        \
  365                 sofree(so);                                             \
  366         else {                                                          \
  367                 SOCK_UNLOCK(so);                                        \
  368                 ACCEPT_UNLOCK();                                        \
  369         }                                                               \
  370 } while(0)
  371 
  372 /*
  373  * In sorwakeup() and sowwakeup(), acquire the socket buffer lock to
  374  * avoid a non-atomic test-and-wakeup.  However, sowakeup is
  375  * responsible for releasing the lock if it is called.  We unlock only
  376  * if we don't call into sowakeup.  If any code is introduced that
  377  * directly invokes the underlying sowakeup() primitives, it must
  378  * maintain the same semantics.
  379  */
  380 #define sorwakeup_locked(so) do {                                       \
  381         SOCKBUF_LOCK_ASSERT(&(so)->so_rcv);                             \
  382         if (sb_notify(&(so)->so_rcv))                                   \
  383                 sowakeup((so), &(so)->so_rcv);                          \
  384         else                                                            \
  385                 SOCKBUF_UNLOCK(&(so)->so_rcv);                          \
  386 } while (0)
  387 
  388 #define sorwakeup(so) do {                                              \
  389         SOCKBUF_LOCK(&(so)->so_rcv);                                    \
  390         sorwakeup_locked(so);                                           \
  391 } while (0)
  392 
  393 #define sowwakeup_locked(so) do {                                       \
  394         SOCKBUF_LOCK_ASSERT(&(so)->so_snd);                             \
  395         if (sb_notify(&(so)->so_snd))                                   \
  396                 sowakeup((so), &(so)->so_snd);                          \
  397         else                                                            \
  398                 SOCKBUF_UNLOCK(&(so)->so_snd);                          \
  399 } while (0)
  400 
  401 #define sowwakeup(so) do {                                              \
  402         SOCKBUF_LOCK(&(so)->so_snd);                                    \
  403         sowwakeup_locked(so);                                           \
  404 } while (0)
  405 
  406 /*
  407  * Argument structure for sosetopt et seq.  This is in the KERNEL
  408  * section because it will never be visible to user code.
  409  */
  410 enum sopt_dir { SOPT_GET, SOPT_SET };
  411 struct sockopt {
  412         enum    sopt_dir sopt_dir; /* is this a get or a set? */
  413         int     sopt_level;     /* second arg of [gs]etsockopt */
  414         int     sopt_name;      /* third arg of [gs]etsockopt */
  415         void   *sopt_val;       /* fourth arg of [gs]etsockopt */
  416         size_t  sopt_valsize;   /* (almost) fifth arg of [gs]etsockopt */
  417         struct  thread *sopt_td; /* calling thread or null if kernel */
  418 };
  419 
  420 struct accept_filter {
  421         char    accf_name[16];
  422         void    (*accf_callback)
  423                 (struct socket *so, void *arg, int waitflag);
  424         void *  (*accf_create)
  425                 (struct socket *so, char *arg);
  426         void    (*accf_destroy)
  427                 (struct socket *so);
  428         SLIST_ENTRY(accept_filter) accf_next;
  429 };
  430 
  431 #ifdef MALLOC_DECLARE
  432 MALLOC_DECLARE(M_ACCF);
  433 MALLOC_DECLARE(M_PCB);
  434 MALLOC_DECLARE(M_SONAME);
  435 #endif
  436 
  437 extern int      maxsockets;
  438 extern u_long   sb_max;
  439 extern struct uma_zone *socket_zone;
  440 extern so_gen_t so_gencnt;
  441 
  442 struct mbuf;
  443 struct sockaddr;
  444 struct ucred;
  445 struct uio;
  446 
  447 /*
  448  * From uipc_socket and friends
  449  */
  450 int     do_setopt_accept_filter(struct socket *so, struct sockopt *sopt);
  451 int     so_setsockopt(struct socket *so, int level, int optname,
  452             void *optval, size_t optlen);
  453 int     sockargs(struct mbuf **mp, caddr_t buf, int buflen, int type);
  454 int     getsockaddr(struct sockaddr **namp, caddr_t uaddr, size_t len);
  455 void    sbappend(struct sockbuf *sb, struct mbuf *m);
  456 void    sbappend_locked(struct sockbuf *sb, struct mbuf *m);
  457 void    sbappendstream(struct sockbuf *sb, struct mbuf *m);
  458 void    sbappendstream_locked(struct sockbuf *sb, struct mbuf *m);
  459 int     sbappendaddr(struct sockbuf *sb, const struct sockaddr *asa,
  460             struct mbuf *m0, struct mbuf *control);
  461 int     sbappendaddr_locked(struct sockbuf *sb, const struct sockaddr *asa,
  462             struct mbuf *m0, struct mbuf *control);
  463 int     sbappendcontrol(struct sockbuf *sb, struct mbuf *m0,
  464             struct mbuf *control);
  465 int     sbappendcontrol_locked(struct sockbuf *sb, struct mbuf *m0,
  466             struct mbuf *control);
  467 void    sbappendrecord(struct sockbuf *sb, struct mbuf *m0);
  468 void    sbappendrecord_locked(struct sockbuf *sb, struct mbuf *m0);
  469 void    sbcheck(struct sockbuf *sb);
  470 void    sbcompress(struct sockbuf *sb, struct mbuf *m, struct mbuf *n);
  471 struct mbuf *
  472         sbcreatecontrol(caddr_t p, int size, int type, int level);
  473 void    sbdrop(struct sockbuf *sb, int len);
  474 void    sbdrop_locked(struct sockbuf *sb, int len);
  475 void    sbdroprecord(struct sockbuf *sb);
  476 void    sbdroprecord_locked(struct sockbuf *sb);
  477 void    sbflush(struct sockbuf *sb);
  478 void    sbflush_locked(struct sockbuf *sb);
  479 void    sbinsertoob(struct sockbuf *sb, struct mbuf *m0);
  480 void    sbinsertoob_locked(struct sockbuf *sb, struct mbuf *m0);
  481 void    sbrelease(struct sockbuf *sb, struct socket *so);
  482 void    sbrelease_locked(struct sockbuf *sb, struct socket *so);
  483 int     sbreserve(struct sockbuf *sb, u_long cc, struct socket *so,
  484             struct thread *td);
  485 int     sbreserve_locked(struct sockbuf *sb, u_long cc, struct socket *so,
  486             struct thread *td);
  487 void    sbtoxsockbuf(struct sockbuf *sb, struct xsockbuf *xsb);
  488 int     sbwait(struct sockbuf *sb);
  489 int     sb_lock(struct sockbuf *sb);
  490 int     soabort(struct socket *so);
  491 int     soaccept(struct socket *so, struct sockaddr **nam);
  492 struct  socket *soalloc(int mflags);
  493 int     socheckuid(struct socket *so, uid_t uid);
  494 int     sobind(struct socket *so, struct sockaddr *nam, struct thread *td);
  495 void    socantrcvmore(struct socket *so);
  496 void    socantrcvmore_locked(struct socket *so);
  497 void    socantsendmore(struct socket *so);
  498 void    socantsendmore_locked(struct socket *so);
  499 int     soclose(struct socket *so);
  500 int     soconnect(struct socket *so, struct sockaddr *nam, struct thread *td);
  501 int     soconnect2(struct socket *so1, struct socket *so2);
  502 int     socow_setup(struct mbuf *m0, struct uio *uio);
  503 int     socreate(int dom, struct socket **aso, int type, int proto,
  504             struct ucred *cred, struct thread *td);
  505 void    sodealloc(struct socket *so);
  506 int     sodisconnect(struct socket *so);
  507 struct  sockaddr *sodupsockaddr(const struct sockaddr *sa, int mflags);
  508 void    sofree(struct socket *so);
  509 int     sogetopt(struct socket *so, struct sockopt *sopt);
  510 void    sohasoutofband(struct socket *so);
  511 void    soisconnected(struct socket *so);
  512 void    soisconnecting(struct socket *so);
  513 void    soisdisconnected(struct socket *so);
  514 void    soisdisconnecting(struct socket *so);
  515 int     solisten(struct socket *so, int backlog, struct thread *td);
  516 void    solisten_proto(struct socket *so);
  517 int     solisten_proto_check(struct socket *so);
  518 struct socket *
  519         sonewconn(struct socket *head, int connstatus);
  520 int     sooptcopyin(struct sockopt *sopt, void *buf, size_t len, size_t minlen);
  521 int     sooptcopyout(struct sockopt *sopt, const void *buf, size_t len);
  522 
  523 /* XXX; prepare mbuf for (__FreeBSD__ < 3) routines. */
  524 int     soopt_getm(struct sockopt *sopt, struct mbuf **mp);
  525 int     soopt_mcopyin(struct sockopt *sopt, struct mbuf *m);
  526 int     soopt_mcopyout(struct sockopt *sopt, struct mbuf *m);
  527 
  528 int     sopoll(struct socket *so, int events, struct ucred *active_cred,
  529             struct thread *td);
  530 int     soreceive(struct socket *so, struct sockaddr **paddr, struct uio *uio,
  531             struct mbuf **mp0, struct mbuf **controlp, int *flagsp);
  532 int     soreserve(struct socket *so, u_long sndcc, u_long rcvcc);
  533 void    sorflush(struct socket *so);
  534 int     sosend(struct socket *so, struct sockaddr *addr, struct uio *uio,
  535             struct mbuf *top, struct mbuf *control, int flags,
  536             struct thread *td);
  537 int     sosetopt(struct socket *so, struct sockopt *sopt);
  538 int     soshutdown(struct socket *so, int how);
  539 void    sotoxsocket(struct socket *so, struct xsocket *xso);
  540 void    sowakeup(struct socket *so, struct sockbuf *sb);
  541 
  542 #ifdef SOCKBUF_DEBUG
  543 void    sblastrecordchk(struct sockbuf *, const char *, int);
  544 #define SBLASTRECORDCHK(sb)     sblastrecordchk((sb), __FILE__, __LINE__)
  545 
  546 void    sblastmbufchk(struct sockbuf *, const char *, int);
  547 #define SBLASTMBUFCHK(sb)       sblastmbufchk((sb), __FILE__, __LINE__)
  548 #else
  549 #define SBLASTRECORDCHK(sb)      /* nothing */
  550 #define SBLASTMBUFCHK(sb)        /* nothing */
  551 #endif /* SOCKBUF_DEBUG */
  552 
  553 /*
  554  * Accept filter functions (duh).
  555  */
  556 int     accept_filt_add(struct accept_filter *filt);
  557 int     accept_filt_del(char *name);
  558 struct  accept_filter *accept_filt_get(char *name);
  559 #ifdef ACCEPT_FILTER_MOD
  560 #ifdef SYSCTL_DECL
  561 SYSCTL_DECL(_net_inet_accf);
  562 #endif
  563 int     accept_filt_generic_mod_event(module_t mod, int event, void *data);
  564 #endif
  565 
  566 #endif /* _KERNEL */
  567 
  568 #endif /* !_SYS_SOCKETVAR_H_ */

Cache object: 3713bec95a206e38d66908213f6bebe9


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.