Home | History | Annotate | Line # | Download | only in netinet
tcp_usrreq.c revision 1.158.4.1
      1  1.158.4.1     rmind /*	$NetBSD: tcp_usrreq.c,v 1.158.4.1 2011/05/31 03:05:08 rmind Exp $	*/
      2       1.40    itojun 
      3       1.40    itojun /*
      4       1.40    itojun  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
      5       1.40    itojun  * All rights reserved.
      6       1.71    itojun  *
      7       1.40    itojun  * Redistribution and use in source and binary forms, with or without
      8       1.40    itojun  * modification, are permitted provided that the following conditions
      9       1.40    itojun  * are met:
     10       1.40    itojun  * 1. Redistributions of source code must retain the above copyright
     11       1.40    itojun  *    notice, this list of conditions and the following disclaimer.
     12       1.40    itojun  * 2. Redistributions in binary form must reproduce the above copyright
     13       1.40    itojun  *    notice, this list of conditions and the following disclaimer in the
     14       1.40    itojun  *    documentation and/or other materials provided with the distribution.
     15       1.40    itojun  * 3. Neither the name of the project nor the names of its contributors
     16       1.40    itojun  *    may be used to endorse or promote products derived from this software
     17       1.40    itojun  *    without specific prior written permission.
     18       1.71    itojun  *
     19       1.40    itojun  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
     20       1.40    itojun  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     21       1.40    itojun  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     22       1.40    itojun  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
     23       1.40    itojun  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24       1.40    itojun  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     25       1.40    itojun  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26       1.40    itojun  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27       1.40    itojun  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28       1.40    itojun  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29       1.40    itojun  * SUCH DAMAGE.
     30       1.40    itojun  */
     31       1.34   thorpej 
     32       1.34   thorpej /*-
     33      1.120    rpaulo  * Copyright (c) 1997, 1998, 2005, 2006 The NetBSD Foundation, Inc.
     34       1.34   thorpej  * All rights reserved.
     35       1.34   thorpej  *
     36       1.34   thorpej  * This code is derived from software contributed to The NetBSD Foundation
     37       1.34   thorpej  * by Jason R. Thorpe and Kevin M. Lahey of the Numerical Aerospace Simulation
     38       1.34   thorpej  * Facility, NASA Ames Research Center.
     39       1.95   mycroft  * This code is derived from software contributed to The NetBSD Foundation
     40       1.95   mycroft  * by Charles M. Hannum.
     41      1.120    rpaulo  * This code is derived from software contributed to The NetBSD Foundation
     42      1.120    rpaulo  * by Rui Paulo.
     43       1.34   thorpej  *
     44       1.34   thorpej  * Redistribution and use in source and binary forms, with or without
     45       1.34   thorpej  * modification, are permitted provided that the following conditions
     46       1.34   thorpej  * are met:
     47       1.34   thorpej  * 1. Redistributions of source code must retain the above copyright
     48       1.34   thorpej  *    notice, this list of conditions and the following disclaimer.
     49       1.34   thorpej  * 2. Redistributions in binary form must reproduce the above copyright
     50       1.34   thorpej  *    notice, this list of conditions and the following disclaimer in the
     51       1.34   thorpej  *    documentation and/or other materials provided with the distribution.
     52       1.34   thorpej  *
     53       1.34   thorpej  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     54       1.34   thorpej  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     55       1.34   thorpej  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     56       1.34   thorpej  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     57       1.34   thorpej  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     58       1.34   thorpej  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     59       1.34   thorpej  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     60       1.34   thorpej  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     61       1.34   thorpej  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     62       1.34   thorpej  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     63       1.34   thorpej  * POSSIBILITY OF SUCH DAMAGE.
     64       1.34   thorpej  */
     65       1.10       cgd 
     66        1.1       cgd /*
     67       1.33   thorpej  * Copyright (c) 1982, 1986, 1988, 1993, 1995
     68        1.9   mycroft  *	The Regents of the University of California.  All rights reserved.
     69        1.1       cgd  *
     70        1.1       cgd  * Redistribution and use in source and binary forms, with or without
     71        1.1       cgd  * modification, are permitted provided that the following conditions
     72        1.1       cgd  * are met:
     73        1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     74        1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     75        1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     76        1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     77        1.1       cgd  *    documentation and/or other materials provided with the distribution.
     78       1.82       agc  * 3. Neither the name of the University nor the names of its contributors
     79        1.1       cgd  *    may be used to endorse or promote products derived from this software
     80        1.1       cgd  *    without specific prior written permission.
     81        1.1       cgd  *
     82        1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     83        1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     84        1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     85        1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     86        1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     87        1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     88        1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     89        1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     90        1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     91        1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     92        1.1       cgd  * SUCH DAMAGE.
     93        1.1       cgd  *
     94       1.33   thorpej  *	@(#)tcp_usrreq.c	8.5 (Berkeley) 6/21/95
     95        1.1       cgd  */
     96       1.67     lukem 
     97       1.67     lukem #include <sys/cdefs.h>
     98  1.158.4.1     rmind __KERNEL_RCSID(0, "$NetBSD: tcp_usrreq.c,v 1.158.4.1 2011/05/31 03:05:08 rmind Exp $");
     99        1.1       cgd 
    100       1.40    itojun #include "opt_inet.h"
    101       1.42   thorpej #include "opt_ipsec.h"
    102       1.63       abs #include "opt_tcp_debug.h"
    103       1.77    martin #include "opt_mbuftrace.h"
    104      1.126    rpaulo #include "rnd.h"
    105       1.40    itojun 
    106        1.5   mycroft #include <sys/param.h>
    107        1.5   mycroft #include <sys/systm.h>
    108       1.13     glass #include <sys/kernel.h>
    109        1.5   mycroft #include <sys/malloc.h>
    110        1.5   mycroft #include <sys/mbuf.h>
    111        1.5   mycroft #include <sys/socket.h>
    112        1.5   mycroft #include <sys/socketvar.h>
    113        1.5   mycroft #include <sys/protosw.h>
    114        1.5   mycroft #include <sys/errno.h>
    115        1.5   mycroft #include <sys/stat.h>
    116       1.20  christos #include <sys/proc.h>
    117       1.40    itojun #include <sys/domain.h>
    118       1.20  christos #include <sys/sysctl.h>
    119      1.117      elad #include <sys/kauth.h>
    120      1.149     pooka #include <sys/uidinfo.h>
    121        1.1       cgd 
    122        1.5   mycroft #include <net/if.h>
    123        1.5   mycroft #include <net/route.h>
    124        1.1       cgd 
    125        1.5   mycroft #include <netinet/in.h>
    126        1.5   mycroft #include <netinet/in_systm.h>
    127       1.14       cgd #include <netinet/in_var.h>
    128        1.5   mycroft #include <netinet/ip.h>
    129        1.5   mycroft #include <netinet/in_pcb.h>
    130        1.5   mycroft #include <netinet/ip_var.h>
    131      1.108      yamt #include <netinet/in_offload.h>
    132       1.40    itojun 
    133       1.40    itojun #ifdef INET6
    134       1.40    itojun #ifndef INET
    135       1.40    itojun #include <netinet/in.h>
    136       1.40    itojun #endif
    137       1.40    itojun #include <netinet/ip6.h>
    138       1.40    itojun #include <netinet6/in6_pcb.h>
    139       1.40    itojun #include <netinet6/ip6_var.h>
    140      1.135  christos #include <netinet6/scope6_var.h>
    141       1.40    itojun #endif
    142       1.40    itojun 
    143        1.5   mycroft #include <netinet/tcp.h>
    144        1.5   mycroft #include <netinet/tcp_fsm.h>
    145        1.5   mycroft #include <netinet/tcp_seq.h>
    146        1.5   mycroft #include <netinet/tcp_timer.h>
    147        1.5   mycroft #include <netinet/tcp_var.h>
    148      1.142   thorpej #include <netinet/tcp_private.h>
    149      1.124    rpaulo #include <netinet/tcp_congctl.h>
    150        1.5   mycroft #include <netinet/tcpip.h>
    151        1.5   mycroft #include <netinet/tcp_debug.h>
    152  1.158.4.1     rmind #include <netinet/tcp_vtw.h>
    153       1.26   thorpej 
    154       1.68     lukem #include "opt_tcp_space.h"
    155        1.1       cgd 
    156       1.40    itojun #ifdef IPSEC
    157       1.40    itojun #include <netinet6/ipsec.h>
    158       1.40    itojun #endif /*IPSEC*/
    159       1.40    itojun 
    160        1.1       cgd /*
    161        1.1       cgd  * TCP protocol interface to socket abstraction.
    162        1.1       cgd  */
    163        1.1       cgd 
    164        1.1       cgd /*
    165        1.1       cgd  * Process a TCP user request for TCP tb.  If this is a send request
    166        1.1       cgd  * then m is the mbuf chain of send data.  If this is a timer expiration
    167        1.1       cgd  * (called from the software clock routine), then timertype tells which timer.
    168        1.1       cgd  */
    169        1.1       cgd /*ARGSUSED*/
    170        1.6   mycroft int
    171       1.94     perry tcp_usrreq(struct socket *so, int req,
    172      1.113  christos     struct mbuf *m, struct mbuf *nam, struct mbuf *control, struct lwp *l)
    173       1.79   darrenr {
    174       1.49  augustss 	struct inpcb *inp;
    175       1.40    itojun #ifdef INET6
    176       1.49  augustss 	struct in6pcb *in6p;
    177       1.40    itojun #endif
    178       1.49  augustss 	struct tcpcb *tp = NULL;
    179        1.1       cgd 	int s;
    180        1.1       cgd 	int error = 0;
    181       1.74    simonb #ifdef TCP_DEBUG
    182       1.74    simonb 	int ostate = 0;
    183       1.74    simonb #endif
    184       1.40    itojun 	int family;	/* family of the socket */
    185       1.40    itojun 
    186       1.40    itojun 	family = so->so_proto->pr_domain->dom_family;
    187        1.1       cgd 
    188       1.40    itojun 	if (req == PRU_CONTROL) {
    189       1.40    itojun 		switch (family) {
    190       1.56    itojun #ifdef INET
    191       1.40    itojun 		case PF_INET:
    192      1.131  christos 			return (in_control(so, (long)m, (void *)nam,
    193      1.119        ad 			    (struct ifnet *)control, l));
    194       1.56    itojun #endif
    195       1.40    itojun #ifdef INET6
    196       1.40    itojun 		case PF_INET6:
    197      1.131  christos 			return (in6_control(so, (long)m, (void *)nam,
    198      1.119        ad 			    (struct ifnet *)control, l));
    199       1.40    itojun #endif
    200       1.40    itojun 		default:
    201       1.40    itojun 			return EAFNOSUPPORT;
    202       1.40    itojun 		}
    203       1.45   thorpej 	}
    204       1.45   thorpej 
    205      1.123       tls 	s = splsoftnet();
    206      1.123       tls 
    207       1.46   thorpej 	if (req == PRU_PURGEIF) {
    208      1.144        ad 		mutex_enter(softnet_lock);
    209       1.54     enami 		switch (family) {
    210       1.56    itojun #ifdef INET
    211       1.54     enami 		case PF_INET:
    212       1.62    itojun 			in_pcbpurgeif0(&tcbtable, (struct ifnet *)control);
    213       1.54     enami 			in_purgeif((struct ifnet *)control);
    214       1.54     enami 			in_pcbpurgeif(&tcbtable, (struct ifnet *)control);
    215       1.55     enami 			break;
    216       1.56    itojun #endif
    217       1.46   thorpej #ifdef INET6
    218       1.54     enami 		case PF_INET6:
    219       1.83    itojun 			in6_pcbpurgeif0(&tcbtable, (struct ifnet *)control);
    220       1.54     enami 			in6_purgeif((struct ifnet *)control);
    221       1.83    itojun 			in6_pcbpurgeif(&tcbtable, (struct ifnet *)control);
    222       1.55     enami 			break;
    223       1.46   thorpej #endif
    224       1.54     enami 		default:
    225      1.144        ad 			mutex_exit(softnet_lock);
    226      1.123       tls 			splx(s);
    227       1.54     enami 			return (EAFNOSUPPORT);
    228       1.54     enami 		}
    229      1.144        ad 		mutex_exit(softnet_lock);
    230      1.123       tls 		splx(s);
    231       1.45   thorpej 		return (0);
    232       1.40    itojun 	}
    233       1.22   mycroft 
    234      1.144        ad 	if (req == PRU_ATTACH)
    235      1.144        ad 		sosetlock(so);
    236      1.144        ad 
    237       1.40    itojun 	switch (family) {
    238       1.56    itojun #ifdef INET
    239       1.40    itojun 	case PF_INET:
    240       1.40    itojun 		inp = sotoinpcb(so);
    241       1.40    itojun #ifdef INET6
    242       1.40    itojun 		in6p = NULL;
    243       1.40    itojun #endif
    244       1.40    itojun 		break;
    245       1.56    itojun #endif
    246       1.40    itojun #ifdef INET6
    247       1.40    itojun 	case PF_INET6:
    248       1.40    itojun 		inp = NULL;
    249       1.40    itojun 		in6p = sotoin6pcb(so);
    250       1.40    itojun 		break;
    251       1.40    itojun #endif
    252       1.40    itojun 	default:
    253       1.40    itojun 		splx(s);
    254       1.40    itojun 		return EAFNOSUPPORT;
    255       1.40    itojun 	}
    256       1.40    itojun 
    257       1.23   mycroft #ifdef DIAGNOSTIC
    258       1.57    itojun #ifdef INET6
    259       1.56    itojun 	if (inp && in6p)
    260       1.56    itojun 		panic("tcp_usrreq: both inp and in6p set to non-NULL");
    261       1.57    itojun #endif
    262       1.23   mycroft 	if (req != PRU_SEND && req != PRU_SENDOOB && control)
    263       1.23   mycroft 		panic("tcp_usrreq: unexpected control mbuf");
    264       1.23   mycroft #endif
    265        1.1       cgd 	/*
    266        1.1       cgd 	 * When a TCP is attached to a socket, then there will be
    267        1.1       cgd 	 * a (struct inpcb) pointed at by the socket, and this
    268        1.1       cgd 	 * structure will point at a subsidary (struct tcpcb).
    269        1.1       cgd 	 */
    270       1.40    itojun #ifndef INET6
    271       1.40    itojun 	if (inp == 0 && req != PRU_ATTACH)
    272       1.40    itojun #else
    273       1.40    itojun 	if ((inp == 0 && in6p == 0) && req != PRU_ATTACH)
    274       1.40    itojun #endif
    275       1.40    itojun 	{
    276       1.22   mycroft 		error = EINVAL;
    277       1.22   mycroft 		goto release;
    278        1.1       cgd 	}
    279       1.56    itojun #ifdef INET
    280        1.1       cgd 	if (inp) {
    281        1.1       cgd 		tp = intotcpcb(inp);
    282        1.1       cgd 		/* WHAT IF TP IS 0? */
    283        1.1       cgd #ifdef KPROF
    284        1.1       cgd 		tcp_acounts[tp->t_state][req]++;
    285        1.1       cgd #endif
    286       1.74    simonb #ifdef TCP_DEBUG
    287        1.1       cgd 		ostate = tp->t_state;
    288       1.74    simonb #endif
    289       1.40    itojun 	}
    290       1.56    itojun #endif
    291       1.40    itojun #ifdef INET6
    292       1.56    itojun 	if (in6p) {
    293       1.40    itojun 		tp = in6totcpcb(in6p);
    294       1.40    itojun 		/* WHAT IF TP IS 0? */
    295       1.40    itojun #ifdef KPROF
    296       1.40    itojun 		tcp_acounts[tp->t_state][req]++;
    297       1.40    itojun #endif
    298       1.74    simonb #ifdef TCP_DEBUG
    299       1.40    itojun 		ostate = tp->t_state;
    300       1.74    simonb #endif
    301       1.40    itojun 	}
    302       1.40    itojun #endif
    303       1.22   mycroft 
    304        1.1       cgd 	switch (req) {
    305        1.1       cgd 
    306        1.1       cgd 	/*
    307        1.1       cgd 	 * TCP attaches to socket via PRU_ATTACH, reserving space,
    308        1.1       cgd 	 * and an internet control block.
    309        1.1       cgd 	 */
    310        1.1       cgd 	case PRU_ATTACH:
    311       1.40    itojun #ifndef INET6
    312       1.40    itojun 		if (inp != 0)
    313       1.40    itojun #else
    314       1.40    itojun 		if (inp != 0 || in6p != 0)
    315       1.40    itojun #endif
    316       1.40    itojun 		{
    317        1.1       cgd 			error = EISCONN;
    318        1.1       cgd 			break;
    319        1.1       cgd 		}
    320        1.1       cgd 		error = tcp_attach(so);
    321        1.1       cgd 		if (error)
    322        1.1       cgd 			break;
    323        1.1       cgd 		if ((so->so_options & SO_LINGER) && so->so_linger == 0)
    324       1.32   thorpej 			so->so_linger = TCP_LINGERTIME;
    325        1.1       cgd 		tp = sototcpcb(so);
    326        1.1       cgd 		break;
    327        1.1       cgd 
    328        1.1       cgd 	/*
    329        1.1       cgd 	 * PRU_DETACH detaches the TCP protocol from the socket.
    330        1.1       cgd 	 */
    331        1.1       cgd 	case PRU_DETACH:
    332       1.24    kleink 		tp = tcp_disconnect(tp);
    333        1.1       cgd 		break;
    334        1.1       cgd 
    335        1.1       cgd 	/*
    336        1.1       cgd 	 * Give the socket an address.
    337        1.1       cgd 	 */
    338        1.1       cgd 	case PRU_BIND:
    339       1.40    itojun 		switch (family) {
    340       1.56    itojun #ifdef INET
    341       1.40    itojun 		case PF_INET:
    342      1.119        ad 			error = in_pcbbind(inp, nam, l);
    343       1.40    itojun 			break;
    344       1.56    itojun #endif
    345       1.40    itojun #ifdef INET6
    346       1.40    itojun 		case PF_INET6:
    347      1.119        ad 			error = in6_pcbbind(in6p, nam, l);
    348       1.58    itojun 			if (!error) {
    349       1.58    itojun 				/* mapped addr case */
    350       1.58    itojun 				if (IN6_IS_ADDR_V4MAPPED(&in6p->in6p_laddr))
    351       1.58    itojun 					tp->t_family = AF_INET;
    352       1.58    itojun 				else
    353       1.58    itojun 					tp->t_family = AF_INET6;
    354       1.58    itojun 			}
    355       1.40    itojun 			break;
    356       1.40    itojun #endif
    357       1.40    itojun 		}
    358        1.1       cgd 		break;
    359        1.1       cgd 
    360        1.1       cgd 	/*
    361        1.1       cgd 	 * Prepare to accept connections.
    362        1.1       cgd 	 */
    363        1.1       cgd 	case PRU_LISTEN:
    364       1.56    itojun #ifdef INET
    365       1.40    itojun 		if (inp && inp->inp_lport == 0) {
    366      1.150    dyoung 			error = in_pcbbind(inp, NULL, l);
    367       1.22   mycroft 			if (error)
    368       1.22   mycroft 				break;
    369       1.22   mycroft 		}
    370       1.56    itojun #endif
    371       1.40    itojun #ifdef INET6
    372       1.56    itojun 		if (in6p && in6p->in6p_lport == 0) {
    373      1.154      elad 			error = in6_pcbbind(in6p, NULL, l);
    374       1.40    itojun 			if (error)
    375       1.40    itojun 				break;
    376       1.40    itojun 		}
    377       1.40    itojun #endif
    378       1.22   mycroft 		tp->t_state = TCPS_LISTEN;
    379        1.1       cgd 		break;
    380        1.1       cgd 
    381        1.1       cgd 	/*
    382        1.1       cgd 	 * Initiate connection to peer.
    383        1.1       cgd 	 * Create a template for use in transmissions on this connection.
    384        1.1       cgd 	 * Enter SYN_SENT state, and mark socket as connecting.
    385        1.1       cgd 	 * Start keep-alive timer, and seed output sequence space.
    386        1.1       cgd 	 * Send initial segment on connection.
    387        1.1       cgd 	 */
    388        1.1       cgd 	case PRU_CONNECT:
    389       1.56    itojun #ifdef INET
    390       1.40    itojun 		if (inp) {
    391       1.40    itojun 			if (inp->inp_lport == 0) {
    392      1.150    dyoung 				error = in_pcbbind(inp, NULL, l);
    393       1.40    itojun 				if (error)
    394       1.40    itojun 					break;
    395       1.40    itojun 			}
    396      1.119        ad 			error = in_pcbconnect(inp, nam, l);
    397       1.40    itojun 		}
    398       1.56    itojun #endif
    399       1.40    itojun #ifdef INET6
    400       1.56    itojun 		if (in6p) {
    401       1.40    itojun 			if (in6p->in6p_lport == 0) {
    402      1.154      elad 				error = in6_pcbbind(in6p, NULL, l);
    403       1.40    itojun 				if (error)
    404       1.40    itojun 					break;
    405       1.40    itojun 			}
    406      1.119        ad 			error = in6_pcbconnect(in6p, nam, l);
    407       1.58    itojun 			if (!error) {
    408       1.58    itojun 				/* mapped addr case */
    409       1.58    itojun 				if (IN6_IS_ADDR_V4MAPPED(&in6p->in6p_faddr))
    410       1.58    itojun 					tp->t_family = AF_INET;
    411       1.58    itojun 				else
    412       1.58    itojun 					tp->t_family = AF_INET6;
    413       1.58    itojun 			}
    414        1.1       cgd 		}
    415       1.40    itojun #endif
    416        1.1       cgd 		if (error)
    417        1.1       cgd 			break;
    418        1.1       cgd 		tp->t_template = tcp_template(tp);
    419        1.1       cgd 		if (tp->t_template == 0) {
    420       1.56    itojun #ifdef INET
    421       1.40    itojun 			if (inp)
    422       1.40    itojun 				in_pcbdisconnect(inp);
    423       1.56    itojun #endif
    424       1.40    itojun #ifdef INET6
    425       1.56    itojun 			if (in6p)
    426       1.40    itojun 				in6_pcbdisconnect(in6p);
    427       1.40    itojun #endif
    428        1.1       cgd 			error = ENOBUFS;
    429        1.1       cgd 			break;
    430        1.1       cgd 		}
    431      1.136     rmind 		/*
    432      1.138     rmind 		 * Compute window scaling to request.
    433      1.138     rmind 		 * XXX: This should be moved to tcp_output().
    434      1.136     rmind 		 */
    435        1.9   mycroft 		while (tp->request_r_scale < TCP_MAX_WINSHIFT &&
    436      1.138     rmind 		    (TCP_MAXWIN << tp->request_r_scale) < sb_max)
    437        1.9   mycroft 			tp->request_r_scale++;
    438        1.1       cgd 		soisconnecting(so);
    439      1.142   thorpej 		TCP_STATINC(TCP_STAT_CONNATTEMPT);
    440        1.1       cgd 		tp->t_state = TCPS_SYN_SENT;
    441      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepinit);
    442       1.61   thorpej 		tp->iss = tcp_new_iss(tp, 0);
    443        1.1       cgd 		tcp_sendseqinit(tp);
    444        1.1       cgd 		error = tcp_output(tp);
    445        1.1       cgd 		break;
    446        1.1       cgd 
    447        1.1       cgd 	/*
    448        1.1       cgd 	 * Create a TCP connection between two sockets.
    449        1.1       cgd 	 */
    450        1.1       cgd 	case PRU_CONNECT2:
    451        1.1       cgd 		error = EOPNOTSUPP;
    452        1.1       cgd 		break;
    453        1.1       cgd 
    454        1.1       cgd 	/*
    455        1.1       cgd 	 * Initiate disconnect from peer.
    456        1.1       cgd 	 * If connection never passed embryonic stage, just drop;
    457        1.1       cgd 	 * else if don't need to let data drain, then can just drop anyways,
    458        1.1       cgd 	 * else have to begin TCP shutdown process: mark socket disconnecting,
    459        1.1       cgd 	 * drain unread data, state switch to reflect user close, and
    460        1.1       cgd 	 * send segment (e.g. FIN) to peer.  Socket will be really disconnected
    461        1.1       cgd 	 * when peer sends FIN and acks ours.
    462        1.1       cgd 	 *
    463        1.1       cgd 	 * SHOULD IMPLEMENT LATER PRU_CONNECT VIA REALLOC TCPCB.
    464        1.1       cgd 	 */
    465        1.1       cgd 	case PRU_DISCONNECT:
    466        1.1       cgd 		tp = tcp_disconnect(tp);
    467        1.1       cgd 		break;
    468        1.1       cgd 
    469        1.1       cgd 	/*
    470        1.1       cgd 	 * Accept a connection.  Essentially all the work is
    471        1.1       cgd 	 * done at higher levels; just return the address
    472        1.1       cgd 	 * of the peer, storing through addr.
    473        1.1       cgd 	 */
    474        1.8   mycroft 	case PRU_ACCEPT:
    475       1.56    itojun #ifdef INET
    476       1.40    itojun 		if (inp)
    477       1.40    itojun 			in_setpeeraddr(inp, nam);
    478       1.56    itojun #endif
    479       1.40    itojun #ifdef INET6
    480       1.56    itojun 		if (in6p)
    481       1.40    itojun 			in6_setpeeraddr(in6p, nam);
    482       1.40    itojun #endif
    483        1.1       cgd 		break;
    484        1.1       cgd 
    485        1.1       cgd 	/*
    486        1.1       cgd 	 * Mark the connection as being incapable of further output.
    487        1.1       cgd 	 */
    488        1.1       cgd 	case PRU_SHUTDOWN:
    489        1.1       cgd 		socantsendmore(so);
    490        1.1       cgd 		tp = tcp_usrclosed(tp);
    491        1.1       cgd 		if (tp)
    492        1.1       cgd 			error = tcp_output(tp);
    493        1.1       cgd 		break;
    494        1.1       cgd 
    495        1.1       cgd 	/*
    496        1.1       cgd 	 * After a receive, possibly send window update to peer.
    497        1.1       cgd 	 */
    498        1.1       cgd 	case PRU_RCVD:
    499       1.60    itojun 		/*
    500       1.60    itojun 		 * soreceive() calls this function when a user receives
    501       1.60    itojun 		 * ancillary data on a listening socket. We don't call
    502       1.60    itojun 		 * tcp_output in such a case, since there is no header
    503       1.60    itojun 		 * template for a listening socket and hence the kernel
    504       1.60    itojun 		 * will panic.
    505       1.60    itojun 		 */
    506       1.60    itojun 		if ((so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) != 0)
    507       1.60    itojun 			(void) tcp_output(tp);
    508        1.1       cgd 		break;
    509        1.1       cgd 
    510        1.1       cgd 	/*
    511        1.1       cgd 	 * Do a send by putting data in output queue and updating urgent
    512        1.1       cgd 	 * marker if URG set.  Possibly send more data.
    513        1.1       cgd 	 */
    514        1.1       cgd 	case PRU_SEND:
    515       1.23   mycroft 		if (control && control->m_len) {
    516       1.23   mycroft 			m_freem(control);
    517       1.23   mycroft 			m_freem(m);
    518       1.23   mycroft 			error = EINVAL;
    519       1.23   mycroft 			break;
    520       1.23   mycroft 		}
    521       1.73   thorpej 		sbappendstream(&so->so_snd, m);
    522        1.1       cgd 		error = tcp_output(tp);
    523        1.1       cgd 		break;
    524        1.1       cgd 
    525        1.1       cgd 	/*
    526        1.1       cgd 	 * Abort the TCP.
    527        1.1       cgd 	 */
    528        1.1       cgd 	case PRU_ABORT:
    529        1.1       cgd 		tp = tcp_drop(tp, ECONNABORTED);
    530        1.1       cgd 		break;
    531        1.1       cgd 
    532        1.1       cgd 	case PRU_SENSE:
    533       1.22   mycroft 		/*
    534       1.22   mycroft 		 * stat: don't bother with a blocksize.
    535       1.22   mycroft 		 */
    536       1.22   mycroft 		splx(s);
    537        1.1       cgd 		return (0);
    538        1.1       cgd 
    539        1.1       cgd 	case PRU_RCVOOB:
    540       1.23   mycroft 		if (control && control->m_len) {
    541       1.23   mycroft 			m_freem(control);
    542       1.23   mycroft 			m_freem(m);
    543       1.23   mycroft 			error = EINVAL;
    544       1.23   mycroft 			break;
    545       1.23   mycroft 		}
    546        1.1       cgd 		if ((so->so_oobmark == 0 &&
    547        1.1       cgd 		    (so->so_state & SS_RCVATMARK) == 0) ||
    548        1.1       cgd 		    so->so_options & SO_OOBINLINE ||
    549        1.1       cgd 		    tp->t_oobflags & TCPOOB_HADDATA) {
    550        1.1       cgd 			error = EINVAL;
    551        1.1       cgd 			break;
    552        1.1       cgd 		}
    553        1.1       cgd 		if ((tp->t_oobflags & TCPOOB_HAVEDATA) == 0) {
    554        1.1       cgd 			error = EWOULDBLOCK;
    555        1.1       cgd 			break;
    556        1.1       cgd 		}
    557        1.1       cgd 		m->m_len = 1;
    558      1.131  christos 		*mtod(m, char *) = tp->t_iobc;
    559       1.14       cgd 		if (((long)nam & MSG_PEEK) == 0)
    560        1.1       cgd 			tp->t_oobflags ^= (TCPOOB_HAVEDATA | TCPOOB_HADDATA);
    561        1.1       cgd 		break;
    562        1.1       cgd 
    563        1.1       cgd 	case PRU_SENDOOB:
    564        1.1       cgd 		if (sbspace(&so->so_snd) < -512) {
    565        1.1       cgd 			m_freem(m);
    566        1.1       cgd 			error = ENOBUFS;
    567        1.1       cgd 			break;
    568        1.1       cgd 		}
    569        1.1       cgd 		/*
    570        1.1       cgd 		 * According to RFC961 (Assigned Protocols),
    571        1.1       cgd 		 * the urgent pointer points to the last octet
    572        1.1       cgd 		 * of urgent data.  We continue, however,
    573        1.1       cgd 		 * to consider it to indicate the first octet
    574        1.1       cgd 		 * of data past the urgent section.
    575        1.1       cgd 		 * Otherwise, snd_up should be one lower.
    576        1.1       cgd 		 */
    577       1.73   thorpej 		sbappendstream(&so->so_snd, m);
    578        1.1       cgd 		tp->snd_up = tp->snd_una + so->so_snd.sb_cc;
    579        1.1       cgd 		tp->t_force = 1;
    580        1.1       cgd 		error = tcp_output(tp);
    581        1.1       cgd 		tp->t_force = 0;
    582        1.1       cgd 		break;
    583        1.1       cgd 
    584        1.1       cgd 	case PRU_SOCKADDR:
    585       1.56    itojun #ifdef INET
    586       1.40    itojun 		if (inp)
    587       1.40    itojun 			in_setsockaddr(inp, nam);
    588       1.56    itojun #endif
    589       1.40    itojun #ifdef INET6
    590       1.56    itojun 		if (in6p)
    591       1.40    itojun 			in6_setsockaddr(in6p, nam);
    592       1.40    itojun #endif
    593        1.1       cgd 		break;
    594        1.1       cgd 
    595        1.1       cgd 	case PRU_PEERADDR:
    596       1.56    itojun #ifdef INET
    597       1.40    itojun 		if (inp)
    598       1.40    itojun 			in_setpeeraddr(inp, nam);
    599       1.56    itojun #endif
    600       1.40    itojun #ifdef INET6
    601       1.56    itojun 		if (in6p)
    602       1.40    itojun 			in6_setpeeraddr(in6p, nam);
    603       1.40    itojun #endif
    604        1.1       cgd 		break;
    605        1.1       cgd 
    606        1.1       cgd 	default:
    607        1.1       cgd 		panic("tcp_usrreq");
    608        1.1       cgd 	}
    609       1.63       abs #ifdef TCP_DEBUG
    610        1.1       cgd 	if (tp && (so->so_options & SO_DEBUG))
    611       1.40    itojun 		tcp_trace(TA_USER, ostate, tp, NULL, req);
    612       1.63       abs #endif
    613       1.22   mycroft 
    614       1.22   mycroft release:
    615        1.1       cgd 	splx(s);
    616        1.1       cgd 	return (error);
    617        1.1       cgd }
    618        1.1       cgd 
    619      1.132  christos static void
    620      1.132  christos change_keepalive(struct socket *so, struct tcpcb *tp)
    621      1.132  christos {
    622      1.132  christos 	tp->t_maxidle = tp->t_keepcnt * tp->t_keepintvl;
    623      1.132  christos 	TCP_TIMER_DISARM(tp, TCPT_KEEP);
    624      1.132  christos 	TCP_TIMER_DISARM(tp, TCPT_2MSL);
    625      1.132  christos 
    626      1.132  christos 	if (tp->t_state == TCPS_SYN_RECEIVED ||
    627      1.132  christos 	    tp->t_state == TCPS_SYN_SENT) {
    628      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepinit);
    629      1.132  christos 	} else if (so->so_options & SO_KEEPALIVE &&
    630      1.132  christos 	    tp->t_state <= TCPS_CLOSE_WAIT) {
    631      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepintvl);
    632      1.132  christos 	} else {
    633      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepidle);
    634      1.132  christos 	}
    635      1.132  christos 
    636      1.132  christos 	if ((tp->t_state == TCPS_FIN_WAIT_2) && (tp->t_maxidle > 0))
    637      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_2MSL, tp->t_maxidle);
    638      1.132  christos }
    639      1.132  christos 
    640      1.132  christos 
    641        1.6   mycroft int
    642      1.147    plunky tcp_ctloutput(int op, struct socket *so, struct sockopt *sopt)
    643        1.1       cgd {
    644        1.9   mycroft 	int error = 0, s;
    645        1.9   mycroft 	struct inpcb *inp;
    646       1.40    itojun #ifdef INET6
    647       1.49  augustss 	struct in6pcb *in6p;
    648       1.40    itojun #endif
    649       1.49  augustss 	struct tcpcb *tp;
    650      1.132  christos 	u_int ui;
    651       1.40    itojun 	int family;	/* family of the socket */
    652      1.147    plunky 	int level, optname, optval;
    653      1.147    plunky 
    654      1.147    plunky 	level = sopt->sopt_level;
    655      1.147    plunky 	optname = sopt->sopt_name;
    656       1.40    itojun 
    657       1.40    itojun 	family = so->so_proto->pr_domain->dom_family;
    658        1.1       cgd 
    659       1.16   mycroft 	s = splsoftnet();
    660       1.40    itojun 	switch (family) {
    661       1.56    itojun #ifdef INET
    662       1.40    itojun 	case PF_INET:
    663       1.40    itojun 		inp = sotoinpcb(so);
    664       1.40    itojun #ifdef INET6
    665       1.40    itojun 		in6p = NULL;
    666       1.40    itojun #endif
    667       1.40    itojun 		break;
    668       1.56    itojun #endif
    669       1.40    itojun #ifdef INET6
    670       1.40    itojun 	case PF_INET6:
    671       1.40    itojun 		inp = NULL;
    672       1.40    itojun 		in6p = sotoin6pcb(so);
    673       1.40    itojun 		break;
    674       1.40    itojun #endif
    675       1.40    itojun 	default:
    676       1.40    itojun 		splx(s);
    677      1.129      yamt 		panic("%s: af %d", __func__, family);
    678       1.40    itojun 	}
    679       1.40    itojun #ifndef INET6
    680       1.40    itojun 	if (inp == NULL)
    681       1.40    itojun #else
    682       1.40    itojun 	if (inp == NULL && in6p == NULL)
    683       1.40    itojun #endif
    684       1.40    itojun 	{
    685        1.9   mycroft 		splx(s);
    686        1.9   mycroft 		return (ECONNRESET);
    687        1.9   mycroft 	}
    688        1.9   mycroft 	if (level != IPPROTO_TCP) {
    689       1.40    itojun 		switch (family) {
    690       1.56    itojun #ifdef INET
    691       1.40    itojun 		case PF_INET:
    692      1.147    plunky 			error = ip_ctloutput(op, so, sopt);
    693       1.40    itojun 			break;
    694       1.56    itojun #endif
    695       1.40    itojun #ifdef INET6
    696       1.40    itojun 		case PF_INET6:
    697      1.147    plunky 			error = ip6_ctloutput(op, so, sopt);
    698       1.40    itojun 			break;
    699       1.40    itojun #endif
    700       1.40    itojun 		}
    701        1.9   mycroft 		splx(s);
    702        1.9   mycroft 		return (error);
    703        1.9   mycroft 	}
    704       1.40    itojun 	if (inp)
    705       1.40    itojun 		tp = intotcpcb(inp);
    706       1.40    itojun #ifdef INET6
    707       1.40    itojun 	else if (in6p)
    708       1.40    itojun 		tp = in6totcpcb(in6p);
    709       1.40    itojun #endif
    710       1.40    itojun 	else
    711       1.40    itojun 		tp = NULL;
    712        1.1       cgd 
    713        1.1       cgd 	switch (op) {
    714        1.1       cgd 	case PRCO_SETOPT:
    715        1.1       cgd 		switch (optname) {
    716       1.90  jonathan #ifdef TCP_SIGNATURE
    717       1.90  jonathan 		case TCP_MD5SIG:
    718      1.147    plunky 			error = sockopt_getint(sopt, &optval);
    719       1.90  jonathan 			if (error)
    720       1.90  jonathan 				break;
    721      1.147    plunky 			if (optval > 0)
    722       1.90  jonathan 				tp->t_flags |= TF_SIGNATURE;
    723       1.91    itojun 			else
    724       1.90  jonathan 				tp->t_flags &= ~TF_SIGNATURE;
    725       1.90  jonathan 			break;
    726       1.90  jonathan #endif /* TCP_SIGNATURE */
    727       1.90  jonathan 
    728        1.1       cgd 		case TCP_NODELAY:
    729      1.147    plunky 			error = sockopt_getint(sopt, &optval);
    730      1.147    plunky 			if (error)
    731      1.147    plunky 				break;
    732      1.147    plunky 			if (optval)
    733        1.1       cgd 				tp->t_flags |= TF_NODELAY;
    734        1.1       cgd 			else
    735        1.1       cgd 				tp->t_flags &= ~TF_NODELAY;
    736        1.1       cgd 			break;
    737        1.1       cgd 
    738        1.9   mycroft 		case TCP_MAXSEG:
    739      1.147    plunky 			error = sockopt_getint(sopt, &optval);
    740      1.147    plunky 			if (error)
    741      1.147    plunky 				break;
    742      1.147    plunky 			if (optval > 0 && optval <= tp->t_peermss)
    743      1.147    plunky 				tp->t_peermss = optval; /* limit on send size */
    744        1.9   mycroft 			else
    745        1.9   mycroft 				error = EINVAL;
    746        1.9   mycroft 			break;
    747      1.124    rpaulo #ifdef notyet
    748      1.124    rpaulo 		case TCP_CONGCTL:
    749      1.147    plunky 			/* XXX string overflow XXX */
    750      1.147    plunky 			error = tcp_congctl_select(tp, sopt->sopt_data);
    751      1.147    plunky 			break;
    752      1.124    rpaulo #endif
    753        1.9   mycroft 
    754      1.132  christos 		case TCP_KEEPIDLE:
    755      1.147    plunky 			error = sockopt_get(sopt, &ui, sizeof(ui));
    756      1.147    plunky 			if (error)
    757      1.147    plunky 				break;
    758      1.147    plunky 			if (ui > 0) {
    759      1.132  christos 				tp->t_keepidle = ui;
    760      1.132  christos 				change_keepalive(so, tp);
    761      1.132  christos 			} else
    762      1.132  christos 				error = EINVAL;
    763      1.132  christos 			break;
    764      1.132  christos 
    765      1.132  christos 		case TCP_KEEPINTVL:
    766      1.147    plunky 			error = sockopt_get(sopt, &ui, sizeof(ui));
    767      1.147    plunky 			if (error)
    768      1.147    plunky 				break;
    769      1.147    plunky 			if (ui > 0) {
    770      1.132  christos 				tp->t_keepintvl = ui;
    771      1.132  christos 				change_keepalive(so, tp);
    772      1.132  christos 			} else
    773      1.132  christos 				error = EINVAL;
    774      1.132  christos 			break;
    775      1.132  christos 
    776      1.132  christos 		case TCP_KEEPCNT:
    777      1.147    plunky 			error = sockopt_get(sopt, &ui, sizeof(ui));
    778      1.147    plunky 			if (error)
    779      1.147    plunky 				break;
    780      1.147    plunky 			if (ui > 0) {
    781      1.132  christos 				tp->t_keepcnt = ui;
    782      1.132  christos 				change_keepalive(so, tp);
    783      1.132  christos 			} else
    784      1.132  christos 				error = EINVAL;
    785      1.132  christos 			break;
    786      1.132  christos 
    787      1.132  christos 		case TCP_KEEPINIT:
    788      1.147    plunky 			error = sockopt_get(sopt, &ui, sizeof(ui));
    789      1.147    plunky 			if (error)
    790      1.147    plunky 				break;
    791      1.147    plunky 			if (ui > 0) {
    792      1.132  christos 				tp->t_keepinit = ui;
    793      1.132  christos 				change_keepalive(so, tp);
    794      1.132  christos 			} else
    795      1.132  christos 				error = EINVAL;
    796      1.132  christos 			break;
    797      1.132  christos 
    798        1.1       cgd 		default:
    799        1.9   mycroft 			error = ENOPROTOOPT;
    800        1.1       cgd 			break;
    801        1.1       cgd 		}
    802        1.1       cgd 		break;
    803        1.1       cgd 
    804        1.1       cgd 	case PRCO_GETOPT:
    805        1.1       cgd 		switch (optname) {
    806       1.90  jonathan #ifdef TCP_SIGNATURE
    807       1.90  jonathan 		case TCP_MD5SIG:
    808      1.147    plunky 			optval = (tp->t_flags & TF_SIGNATURE) ? 1 : 0;
    809      1.147    plunky 			error = sockopt_set(sopt, &optval, sizeof(optval));
    810       1.90  jonathan 			break;
    811       1.90  jonathan #endif
    812        1.1       cgd 		case TCP_NODELAY:
    813      1.147    plunky 			optval = tp->t_flags & TF_NODELAY;
    814      1.147    plunky 			error = sockopt_set(sopt, &optval, sizeof(optval));
    815        1.1       cgd 			break;
    816        1.1       cgd 		case TCP_MAXSEG:
    817      1.147    plunky 			optval = tp->t_peermss;
    818      1.147    plunky 			error = sockopt_set(sopt, &optval, sizeof(optval));
    819        1.1       cgd 			break;
    820      1.124    rpaulo #ifdef notyet
    821      1.124    rpaulo 		case TCP_CONGCTL:
    822      1.124    rpaulo 			break;
    823      1.124    rpaulo #endif
    824        1.1       cgd 		default:
    825        1.9   mycroft 			error = ENOPROTOOPT;
    826        1.1       cgd 			break;
    827        1.1       cgd 		}
    828        1.1       cgd 		break;
    829        1.1       cgd 	}
    830        1.9   mycroft 	splx(s);
    831        1.1       cgd 	return (error);
    832        1.1       cgd }
    833        1.1       cgd 
    834       1.11   mycroft #ifndef TCP_SENDSPACE
    835       1.84       tls #define	TCP_SENDSPACE	1024*32
    836       1.11   mycroft #endif
    837       1.25   thorpej int	tcp_sendspace = TCP_SENDSPACE;
    838       1.11   mycroft #ifndef TCP_RECVSPACE
    839       1.84       tls #define	TCP_RECVSPACE	1024*32
    840       1.11   mycroft #endif
    841       1.25   thorpej int	tcp_recvspace = TCP_RECVSPACE;
    842        1.1       cgd 
    843        1.1       cgd /*
    844        1.1       cgd  * Attach TCP protocol to socket, allocating
    845        1.1       cgd  * internet protocol control block, tcp control block,
    846        1.1       cgd  * bufer space, and entering LISTEN state if to accept connections.
    847        1.1       cgd  */
    848        1.6   mycroft int
    849       1.94     perry tcp_attach(struct socket *so)
    850        1.1       cgd {
    851       1.49  augustss 	struct tcpcb *tp;
    852        1.1       cgd 	struct inpcb *inp;
    853       1.40    itojun #ifdef INET6
    854       1.40    itojun 	struct in6pcb *in6p;
    855       1.40    itojun #endif
    856        1.1       cgd 	int error;
    857       1.40    itojun 	int family;	/* family of the socket */
    858       1.40    itojun 
    859       1.40    itojun 	family = so->so_proto->pr_domain->dom_family;
    860        1.1       cgd 
    861       1.75      matt #ifdef MBUFTRACE
    862      1.130      yamt 	so->so_mowner = &tcp_sock_mowner;
    863      1.130      yamt 	so->so_rcv.sb_mowner = &tcp_sock_rx_mowner;
    864      1.130      yamt 	so->so_snd.sb_mowner = &tcp_sock_tx_mowner;
    865       1.75      matt #endif
    866        1.1       cgd 	if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
    867        1.1       cgd 		error = soreserve(so, tcp_sendspace, tcp_recvspace);
    868        1.1       cgd 		if (error)
    869        1.1       cgd 			return (error);
    870        1.1       cgd 	}
    871      1.136     rmind 
    872      1.136     rmind 	so->so_rcv.sb_flags |= SB_AUTOSIZE;
    873      1.136     rmind 	so->so_snd.sb_flags |= SB_AUTOSIZE;
    874      1.136     rmind 
    875       1.40    itojun 	switch (family) {
    876       1.56    itojun #ifdef INET
    877       1.40    itojun 	case PF_INET:
    878       1.40    itojun 		error = in_pcballoc(so, &tcbtable);
    879       1.40    itojun 		if (error)
    880       1.40    itojun 			return (error);
    881       1.40    itojun 		inp = sotoinpcb(so);
    882       1.40    itojun #ifdef INET6
    883       1.40    itojun 		in6p = NULL;
    884       1.40    itojun #endif
    885       1.40    itojun 		break;
    886       1.56    itojun #endif
    887       1.40    itojun #ifdef INET6
    888       1.40    itojun 	case PF_INET6:
    889       1.83    itojun 		error = in6_pcballoc(so, &tcbtable);
    890       1.40    itojun 		if (error)
    891       1.40    itojun 			return (error);
    892       1.40    itojun 		inp = NULL;
    893       1.40    itojun 		in6p = sotoin6pcb(so);
    894       1.40    itojun 		break;
    895       1.40    itojun #endif
    896       1.40    itojun 	default:
    897       1.40    itojun 		return EAFNOSUPPORT;
    898       1.40    itojun 	}
    899       1.40    itojun 	if (inp)
    900       1.40    itojun 		tp = tcp_newtcpcb(family, (void *)inp);
    901       1.40    itojun #ifdef INET6
    902       1.40    itojun 	else if (in6p)
    903       1.40    itojun 		tp = tcp_newtcpcb(family, (void *)in6p);
    904       1.40    itojun #endif
    905       1.41    itojun 	else
    906       1.41    itojun 		tp = NULL;
    907       1.40    itojun 
    908        1.1       cgd 	if (tp == 0) {
    909        1.1       cgd 		int nofd = so->so_state & SS_NOFDREF;	/* XXX */
    910        1.1       cgd 
    911        1.1       cgd 		so->so_state &= ~SS_NOFDREF;	/* don't free the socket yet */
    912       1.56    itojun #ifdef INET
    913       1.40    itojun 		if (inp)
    914       1.40    itojun 			in_pcbdetach(inp);
    915       1.56    itojun #endif
    916       1.40    itojun #ifdef INET6
    917       1.56    itojun 		if (in6p)
    918       1.40    itojun 			in6_pcbdetach(in6p);
    919       1.40    itojun #endif
    920        1.1       cgd 		so->so_state |= nofd;
    921        1.1       cgd 		return (ENOBUFS);
    922        1.1       cgd 	}
    923        1.1       cgd 	tp->t_state = TCPS_CLOSED;
    924        1.1       cgd 	return (0);
    925        1.1       cgd }
    926        1.1       cgd 
    927        1.1       cgd /*
    928        1.1       cgd  * Initiate (or continue) disconnect.
    929        1.1       cgd  * If embryonic state, just send reset (once).
    930        1.1       cgd  * If in ``let data drain'' option and linger null, just drop.
    931        1.1       cgd  * Otherwise (hard), mark socket disconnecting and drop
    932        1.1       cgd  * current input data; switch states based on user close, and
    933        1.1       cgd  * send segment to peer (with FIN).
    934        1.1       cgd  */
    935        1.1       cgd struct tcpcb *
    936       1.94     perry tcp_disconnect(struct tcpcb *tp)
    937        1.1       cgd {
    938       1.40    itojun 	struct socket *so;
    939       1.40    itojun 
    940       1.40    itojun 	if (tp->t_inpcb)
    941       1.40    itojun 		so = tp->t_inpcb->inp_socket;
    942       1.40    itojun #ifdef INET6
    943       1.40    itojun 	else if (tp->t_in6pcb)
    944       1.40    itojun 		so = tp->t_in6pcb->in6p_socket;
    945       1.40    itojun #endif
    946       1.40    itojun 	else
    947       1.40    itojun 		so = NULL;
    948        1.1       cgd 
    949       1.12   mycroft 	if (TCPS_HAVEESTABLISHED(tp->t_state) == 0)
    950        1.1       cgd 		tp = tcp_close(tp);
    951        1.1       cgd 	else if ((so->so_options & SO_LINGER) && so->so_linger == 0)
    952        1.1       cgd 		tp = tcp_drop(tp, 0);
    953        1.1       cgd 	else {
    954        1.1       cgd 		soisdisconnecting(so);
    955        1.1       cgd 		sbflush(&so->so_rcv);
    956        1.1       cgd 		tp = tcp_usrclosed(tp);
    957        1.1       cgd 		if (tp)
    958        1.1       cgd 			(void) tcp_output(tp);
    959        1.1       cgd 	}
    960        1.1       cgd 	return (tp);
    961        1.1       cgd }
    962        1.1       cgd 
    963        1.1       cgd /*
    964        1.1       cgd  * User issued close, and wish to trail through shutdown states:
    965        1.1       cgd  * if never received SYN, just forget it.  If got a SYN from peer,
    966        1.1       cgd  * but haven't sent FIN, then go to FIN_WAIT_1 state to send peer a FIN.
    967        1.1       cgd  * If already got a FIN from peer, then almost done; go to LAST_ACK
    968        1.1       cgd  * state.  In all other cases, have already sent FIN to peer (e.g.
    969        1.1       cgd  * after PRU_SHUTDOWN), and just have to play tedious game waiting
    970        1.1       cgd  * for peer to send FIN or not respond to keep-alives, etc.
    971        1.1       cgd  * We can let the user exit from the close as soon as the FIN is acked.
    972        1.1       cgd  */
    973        1.1       cgd struct tcpcb *
    974       1.94     perry tcp_usrclosed(struct tcpcb *tp)
    975        1.1       cgd {
    976        1.1       cgd 
    977        1.1       cgd 	switch (tp->t_state) {
    978        1.1       cgd 
    979        1.1       cgd 	case TCPS_CLOSED:
    980        1.1       cgd 	case TCPS_LISTEN:
    981        1.1       cgd 	case TCPS_SYN_SENT:
    982        1.1       cgd 		tp->t_state = TCPS_CLOSED;
    983        1.1       cgd 		tp = tcp_close(tp);
    984        1.1       cgd 		break;
    985        1.1       cgd 
    986        1.1       cgd 	case TCPS_SYN_RECEIVED:
    987        1.1       cgd 	case TCPS_ESTABLISHED:
    988        1.1       cgd 		tp->t_state = TCPS_FIN_WAIT_1;
    989        1.1       cgd 		break;
    990        1.1       cgd 
    991        1.1       cgd 	case TCPS_CLOSE_WAIT:
    992        1.1       cgd 		tp->t_state = TCPS_LAST_ACK;
    993        1.1       cgd 		break;
    994        1.1       cgd 	}
    995       1.18   mycroft 	if (tp && tp->t_state >= TCPS_FIN_WAIT_2) {
    996       1.40    itojun 		struct socket *so;
    997       1.40    itojun 		if (tp->t_inpcb)
    998       1.40    itojun 			so = tp->t_inpcb->inp_socket;
    999       1.40    itojun #ifdef INET6
   1000       1.40    itojun 		else if (tp->t_in6pcb)
   1001       1.40    itojun 			so = tp->t_in6pcb->in6p_socket;
   1002       1.40    itojun #endif
   1003       1.40    itojun 		else
   1004       1.40    itojun 			so = NULL;
   1005      1.115  christos 		if (so)
   1006      1.115  christos 			soisdisconnected(so);
   1007       1.19   mycroft 		/*
   1008       1.19   mycroft 		 * If we are in FIN_WAIT_2, we arrived here because the
   1009       1.19   mycroft 		 * application did a shutdown of the send side.  Like the
   1010       1.19   mycroft 		 * case of a transition from FIN_WAIT_1 to FIN_WAIT_2 after
   1011       1.19   mycroft 		 * a full close, we start a timer to make sure sockets are
   1012       1.19   mycroft 		 * not left in FIN_WAIT_2 forever.
   1013       1.19   mycroft 		 */
   1014      1.132  christos 		if ((tp->t_state == TCPS_FIN_WAIT_2) && (tp->t_maxidle > 0))
   1015      1.132  christos 			TCP_TIMER_ARM(tp, TCPT_2MSL, tp->t_maxidle);
   1016  1.158.4.1     rmind 		else if (tp->t_state == TCPS_TIME_WAIT
   1017  1.158.4.1     rmind 			 && ((tp->t_inpcb
   1018  1.158.4.1     rmind 			      && (tcp4_vtw_enable & 1)
   1019  1.158.4.1     rmind 			      && vtw_add(AF_INET, tp))
   1020  1.158.4.1     rmind 			     ||
   1021  1.158.4.1     rmind 			     (tp->t_in6pcb
   1022  1.158.4.1     rmind 			      && (tcp6_vtw_enable & 1)
   1023  1.158.4.1     rmind 			      && vtw_add(AF_INET6, tp)))) {
   1024  1.158.4.1     rmind 			tp = 0;
   1025  1.158.4.1     rmind 		}
   1026       1.18   mycroft 	}
   1027        1.1       cgd 	return (tp);
   1028       1.17   thorpej }
   1029       1.17   thorpej 
   1030       1.86    atatat /*
   1031       1.86    atatat  * sysctl helper routine for net.inet.ip.mssdflt.  it can't be less
   1032       1.86    atatat  * than 32.
   1033       1.86    atatat  */
   1034       1.86    atatat static int
   1035       1.86    atatat sysctl_net_inet_tcp_mssdflt(SYSCTLFN_ARGS)
   1036       1.86    atatat {
   1037       1.86    atatat 	int error, mssdflt;
   1038       1.86    atatat 	struct sysctlnode node;
   1039       1.86    atatat 
   1040       1.86    atatat 	mssdflt = tcp_mssdflt;
   1041       1.86    atatat 	node = *rnode;
   1042       1.86    atatat 	node.sysctl_data = &mssdflt;
   1043       1.86    atatat 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1044       1.86    atatat 	if (error || newp == NULL)
   1045       1.86    atatat 		return (error);
   1046       1.86    atatat 
   1047       1.86    atatat 	if (mssdflt < 32)
   1048       1.86    atatat 		return (EINVAL);
   1049       1.86    atatat 	tcp_mssdflt = mssdflt;
   1050       1.86    atatat 
   1051       1.86    atatat 	return (0);
   1052       1.86    atatat }
   1053       1.36      matt 
   1054       1.17   thorpej /*
   1055       1.86    atatat  * sysctl helper routine for setting port related values under
   1056       1.86    atatat  * net.inet.ip and net.inet6.ip6.  does basic range checking and does
   1057       1.86    atatat  * additional checks for each type.  this code has placed in
   1058       1.86    atatat  * tcp_input.c since INET and INET6 both use the same tcp code.
   1059       1.86    atatat  *
   1060       1.86    atatat  * this helper is not static so that both inet and inet6 can use it.
   1061       1.17   thorpej  */
   1062       1.17   thorpej int
   1063       1.86    atatat sysctl_net_inet_ip_ports(SYSCTLFN_ARGS)
   1064       1.86    atatat {
   1065       1.86    atatat 	int error, tmp;
   1066       1.86    atatat 	int apmin, apmax;
   1067       1.86    atatat #ifndef IPNOPRIVPORTS
   1068       1.86    atatat 	int lpmin, lpmax;
   1069       1.86    atatat #endif /* IPNOPRIVPORTS */
   1070       1.86    atatat 	struct sysctlnode node;
   1071       1.86    atatat 
   1072       1.86    atatat 	if (namelen != 0)
   1073       1.86    atatat 		return (EINVAL);
   1074       1.86    atatat 
   1075       1.86    atatat 	switch (name[-3]) {
   1076       1.86    atatat #ifdef INET
   1077       1.86    atatat 	    case PF_INET:
   1078       1.86    atatat 		apmin = anonportmin;
   1079       1.86    atatat 		apmax = anonportmax;
   1080       1.86    atatat #ifndef IPNOPRIVPORTS
   1081       1.86    atatat 		lpmin = lowportmin;
   1082       1.86    atatat 		lpmax = lowportmax;
   1083       1.86    atatat #endif /* IPNOPRIVPORTS */
   1084       1.86    atatat 		break;
   1085       1.86    atatat #endif /* INET */
   1086       1.86    atatat #ifdef INET6
   1087       1.86    atatat 	    case PF_INET6:
   1088       1.86    atatat 		apmin = ip6_anonportmin;
   1089       1.86    atatat 		apmax = ip6_anonportmax;
   1090       1.86    atatat #ifndef IPNOPRIVPORTS
   1091       1.86    atatat 		lpmin = ip6_lowportmin;
   1092       1.86    atatat 		lpmax = ip6_lowportmax;
   1093       1.86    atatat #endif /* IPNOPRIVPORTS */
   1094       1.86    atatat 		break;
   1095       1.86    atatat #endif /* INET6 */
   1096       1.86    atatat 	    default:
   1097       1.86    atatat 		return (EINVAL);
   1098       1.86    atatat 	}
   1099       1.86    atatat 
   1100       1.86    atatat 	/*
   1101       1.86    atatat 	 * insert temporary copy into node, perform lookup on
   1102       1.86    atatat 	 * temporary, then restore pointer
   1103       1.86    atatat 	 */
   1104       1.86    atatat 	node = *rnode;
   1105       1.86    atatat 	tmp = *(int*)rnode->sysctl_data;
   1106       1.86    atatat 	node.sysctl_data = &tmp;
   1107       1.86    atatat 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1108       1.86    atatat 	if (error || newp == NULL)
   1109       1.86    atatat 		return (error);
   1110       1.86    atatat 
   1111       1.86    atatat 	/*
   1112       1.86    atatat 	 * simple port range check
   1113       1.86    atatat 	 */
   1114       1.86    atatat 	if (tmp < 0 || tmp > 65535)
   1115       1.86    atatat 		return (EINVAL);
   1116       1.86    atatat 
   1117       1.86    atatat 	/*
   1118       1.86    atatat 	 * per-node range checks
   1119       1.86    atatat 	 */
   1120       1.86    atatat 	switch (rnode->sysctl_num) {
   1121       1.86    atatat 	case IPCTL_ANONPORTMIN:
   1122      1.151      yamt 	case IPV6CTL_ANONPORTMIN:
   1123       1.86    atatat 		if (tmp >= apmax)
   1124       1.86    atatat 			return (EINVAL);
   1125       1.86    atatat #ifndef IPNOPRIVPORTS
   1126       1.86    atatat 		if (tmp < IPPORT_RESERVED)
   1127       1.86    atatat                         return (EINVAL);
   1128       1.86    atatat #endif /* IPNOPRIVPORTS */
   1129       1.86    atatat 		break;
   1130       1.86    atatat 
   1131       1.86    atatat 	case IPCTL_ANONPORTMAX:
   1132      1.151      yamt 	case IPV6CTL_ANONPORTMAX:
   1133       1.86    atatat                 if (apmin >= tmp)
   1134       1.86    atatat 			return (EINVAL);
   1135       1.86    atatat #ifndef IPNOPRIVPORTS
   1136       1.86    atatat 		if (tmp < IPPORT_RESERVED)
   1137       1.86    atatat                         return (EINVAL);
   1138       1.86    atatat #endif /* IPNOPRIVPORTS */
   1139       1.86    atatat 		break;
   1140       1.86    atatat 
   1141       1.86    atatat #ifndef IPNOPRIVPORTS
   1142       1.86    atatat 	case IPCTL_LOWPORTMIN:
   1143      1.151      yamt 	case IPV6CTL_LOWPORTMIN:
   1144       1.86    atatat 		if (tmp >= lpmax ||
   1145       1.86    atatat 		    tmp > IPPORT_RESERVEDMAX ||
   1146       1.86    atatat 		    tmp < IPPORT_RESERVEDMIN)
   1147       1.86    atatat 			return (EINVAL);
   1148       1.86    atatat 		break;
   1149       1.86    atatat 
   1150       1.86    atatat 	case IPCTL_LOWPORTMAX:
   1151      1.151      yamt 	case IPV6CTL_LOWPORTMAX:
   1152       1.86    atatat 		if (lpmin >= tmp ||
   1153       1.86    atatat 		    tmp > IPPORT_RESERVEDMAX ||
   1154       1.86    atatat 		    tmp < IPPORT_RESERVEDMIN)
   1155       1.86    atatat 			return (EINVAL);
   1156       1.86    atatat 		break;
   1157       1.86    atatat #endif /* IPNOPRIVPORTS */
   1158       1.86    atatat 
   1159       1.86    atatat 	default:
   1160       1.86    atatat 		return (EINVAL);
   1161       1.86    atatat 	}
   1162       1.86    atatat 
   1163       1.86    atatat 	*(int*)rnode->sysctl_data = tmp;
   1164       1.86    atatat 
   1165       1.86    atatat 	return (0);
   1166       1.86    atatat }
   1167       1.86    atatat 
   1168      1.133  christos static inline int
   1169      1.133  christos copyout_uid(struct socket *sockp, void *oldp, size_t *oldlenp)
   1170      1.133  christos {
   1171      1.133  christos 	size_t sz;
   1172      1.133  christos 	int error;
   1173      1.133  christos 	uid_t uid;
   1174      1.133  christos 
   1175      1.158      elad 	uid = kauth_cred_geteuid(sockp->so_cred);
   1176      1.133  christos 	if (oldp) {
   1177      1.133  christos 		sz = MIN(sizeof(uid), *oldlenp);
   1178      1.133  christos 		error = copyout(&uid, oldp, sz);
   1179      1.133  christos 		if (error)
   1180      1.133  christos 			return error;
   1181      1.133  christos 	}
   1182      1.133  christos 	*oldlenp = sizeof(uid);
   1183      1.133  christos 	return 0;
   1184      1.133  christos }
   1185      1.133  christos 
   1186      1.133  christos static inline int
   1187      1.133  christos inet4_ident_core(struct in_addr raddr, u_int rport,
   1188      1.133  christos     struct in_addr laddr, u_int lport,
   1189      1.133  christos     void *oldp, size_t *oldlenp,
   1190      1.133  christos     struct lwp *l, int dodrop)
   1191      1.133  christos {
   1192      1.133  christos 	struct inpcb *inp;
   1193      1.133  christos 	struct socket *sockp;
   1194      1.133  christos 
   1195  1.158.4.1     rmind 	inp = in_pcblookup_connect(&tcbtable, raddr, rport, laddr, lport, 0);
   1196      1.133  christos 
   1197      1.133  christos 	if (inp == NULL || (sockp = inp->inp_socket) == NULL)
   1198      1.133  christos 		return ESRCH;
   1199      1.133  christos 
   1200      1.133  christos 	if (dodrop) {
   1201      1.133  christos 		struct tcpcb *tp;
   1202      1.153      elad 		int error;
   1203      1.133  christos 
   1204      1.133  christos 		if (inp == NULL || (tp = intotcpcb(inp)) == NULL ||
   1205      1.133  christos 		    (inp->inp_socket->so_options & SO_ACCEPTCONN) != 0)
   1206      1.133  christos 			return ESRCH;
   1207      1.153      elad 
   1208      1.153      elad 		error = kauth_authorize_network(l->l_cred, KAUTH_NETWORK_SOCKET,
   1209      1.153      elad 		    KAUTH_REQ_NETWORK_SOCKET_DROP, inp->inp_socket, tp, NULL);
   1210      1.153      elad 		if (error)
   1211      1.153      elad 			return (error);
   1212      1.133  christos 
   1213      1.133  christos 		(void)tcp_drop(tp, ECONNABORTED);
   1214      1.133  christos 		return 0;
   1215      1.133  christos 	}
   1216      1.133  christos 	else
   1217      1.133  christos 		return copyout_uid(sockp, oldp, oldlenp);
   1218      1.133  christos }
   1219      1.133  christos 
   1220      1.134   xtraeme #ifdef INET6
   1221      1.133  christos static inline int
   1222      1.133  christos inet6_ident_core(struct in6_addr *raddr, u_int rport,
   1223      1.133  christos     struct in6_addr *laddr, u_int lport,
   1224      1.133  christos     void *oldp, size_t *oldlenp,
   1225      1.133  christos     struct lwp *l, int dodrop)
   1226      1.133  christos {
   1227      1.133  christos 	struct in6pcb *in6p;
   1228      1.133  christos 	struct socket *sockp;
   1229      1.133  christos 
   1230  1.158.4.1     rmind 	in6p = in6_pcblookup_connect(&tcbtable, raddr, rport, laddr, lport, 0, 0);
   1231      1.133  christos 
   1232      1.133  christos 	if (in6p == NULL || (sockp = in6p->in6p_socket) == NULL)
   1233      1.133  christos 		return ESRCH;
   1234      1.133  christos 
   1235      1.133  christos 	if (dodrop) {
   1236      1.133  christos 		struct tcpcb *tp;
   1237      1.153      elad 		int error;
   1238      1.133  christos 
   1239      1.133  christos 		if (in6p == NULL || (tp = in6totcpcb(in6p)) == NULL ||
   1240      1.133  christos 		    (in6p->in6p_socket->so_options & SO_ACCEPTCONN) != 0)
   1241      1.133  christos 			return ESRCH;
   1242      1.133  christos 
   1243      1.153      elad 		error = kauth_authorize_network(l->l_cred, KAUTH_NETWORK_SOCKET,
   1244      1.153      elad 		    KAUTH_REQ_NETWORK_SOCKET_DROP, in6p->in6p_socket, tp, NULL);
   1245      1.153      elad 		if (error)
   1246      1.153      elad 			return (error);
   1247      1.133  christos 
   1248      1.133  christos 		(void)tcp_drop(tp, ECONNABORTED);
   1249      1.133  christos 		return 0;
   1250      1.133  christos 	}
   1251      1.133  christos 	else
   1252      1.133  christos 		return copyout_uid(sockp, oldp, oldlenp);
   1253      1.133  christos }
   1254      1.134   xtraeme #endif
   1255      1.133  christos 
   1256      1.133  christos /*
   1257      1.133  christos  * sysctl helper routine for the net.inet.tcp.drop and
   1258      1.133  christos  * net.inet6.tcp6.drop nodes.
   1259      1.133  christos  */
   1260      1.133  christos #define sysctl_net_inet_tcp_drop sysctl_net_inet_tcp_ident
   1261      1.133  christos 
   1262      1.133  christos /*
   1263       1.86    atatat  * sysctl helper routine for the net.inet.tcp.ident and
   1264       1.86    atatat  * net.inet6.tcp6.ident nodes.  contains backwards compat code for the
   1265       1.86    atatat  * old way of looking up the ident information for ipv4 which involves
   1266       1.86    atatat  * stuffing the port/addr pairs into the mib lookup.
   1267       1.86    atatat  */
   1268       1.86    atatat static int
   1269       1.86    atatat sysctl_net_inet_tcp_ident(SYSCTLFN_ARGS)
   1270       1.86    atatat {
   1271       1.86    atatat #ifdef INET
   1272       1.86    atatat 	struct sockaddr_in *si4[2];
   1273       1.86    atatat #endif /* INET */
   1274       1.86    atatat #ifdef INET6
   1275       1.86    atatat 	struct sockaddr_in6 *si6[2];
   1276       1.86    atatat #endif /* INET6 */
   1277       1.86    atatat 	struct sockaddr_storage sa[2];
   1278      1.148      matt 	int error, pf, dodrop;
   1279       1.86    atatat 
   1280      1.133  christos 	dodrop = name[-1] == TCPCTL_DROP;
   1281      1.133  christos 	if (dodrop) {
   1282      1.133  christos 		if (oldp != NULL || *oldlenp != 0)
   1283      1.133  christos 			return EINVAL;
   1284      1.133  christos 		if (newp == NULL)
   1285      1.133  christos 			return EPERM;
   1286      1.133  christos 		if (newlen < sizeof(sa))
   1287      1.133  christos 			return ENOMEM;
   1288      1.133  christos 	}
   1289       1.86    atatat 	if (namelen != 4 && namelen != 0)
   1290      1.133  christos 		return EINVAL;
   1291       1.86    atatat 	if (name[-2] != IPPROTO_TCP)
   1292      1.133  christos 		return EINVAL;
   1293       1.86    atatat 	pf = name[-3];
   1294       1.86    atatat 
   1295       1.86    atatat 	/* old style lookup, ipv4 only */
   1296       1.86    atatat 	if (namelen == 4) {
   1297       1.86    atatat #ifdef INET
   1298       1.88    atatat 		struct in_addr laddr, raddr;
   1299       1.88    atatat 		u_int lport, rport;
   1300       1.88    atatat 
   1301       1.86    atatat 		if (pf != PF_INET)
   1302      1.133  christos 			return EPROTONOSUPPORT;
   1303       1.86    atatat 		raddr.s_addr = (uint32_t)name[0];
   1304       1.86    atatat 		rport = (u_int)name[1];
   1305       1.86    atatat 		laddr.s_addr = (uint32_t)name[2];
   1306       1.86    atatat 		lport = (u_int)name[3];
   1307      1.133  christos 
   1308      1.148      matt 		mutex_enter(softnet_lock);
   1309      1.133  christos 		error = inet4_ident_core(raddr, rport, laddr, lport,
   1310      1.133  christos 		    oldp, oldlenp, l, dodrop);
   1311      1.148      matt 		mutex_exit(softnet_lock);
   1312      1.133  christos 		return error;
   1313       1.86    atatat #else /* INET */
   1314      1.133  christos 		return EINVAL;
   1315       1.86    atatat #endif /* INET */
   1316       1.86    atatat 	}
   1317       1.86    atatat 
   1318       1.86    atatat 	if (newp == NULL || newlen != sizeof(sa))
   1319      1.133  christos 		return EINVAL;
   1320       1.86    atatat 	error = copyin(newp, &sa, newlen);
   1321       1.86    atatat 	if (error)
   1322      1.133  christos 		return error;
   1323       1.86    atatat 
   1324       1.86    atatat 	/*
   1325       1.86    atatat 	 * requested families must match
   1326       1.86    atatat 	 */
   1327       1.86    atatat 	if (pf != sa[0].ss_family || sa[0].ss_family != sa[1].ss_family)
   1328      1.133  christos 		return EINVAL;
   1329       1.86    atatat 
   1330       1.86    atatat 	switch (pf) {
   1331      1.135  christos #ifdef INET6
   1332      1.135  christos 	case PF_INET6:
   1333      1.135  christos 		si6[0] = (struct sockaddr_in6*)&sa[0];
   1334      1.135  christos 		si6[1] = (struct sockaddr_in6*)&sa[1];
   1335      1.135  christos 		if (si6[0]->sin6_len != sizeof(*si6[0]) ||
   1336      1.135  christos 		    si6[1]->sin6_len != sizeof(*si6[1]))
   1337      1.135  christos 			return EINVAL;
   1338      1.135  christos 
   1339      1.135  christos 		if (!IN6_IS_ADDR_V4MAPPED(&si6[0]->sin6_addr) &&
   1340      1.135  christos 		    !IN6_IS_ADDR_V4MAPPED(&si6[1]->sin6_addr)) {
   1341      1.135  christos 			error = sa6_embedscope(si6[0], ip6_use_defzone);
   1342      1.135  christos 			if (error)
   1343      1.135  christos 				return error;
   1344      1.135  christos 			error = sa6_embedscope(si6[1], ip6_use_defzone);
   1345      1.135  christos 			if (error)
   1346      1.135  christos 				return error;
   1347      1.135  christos 
   1348      1.148      matt 			mutex_enter(softnet_lock);
   1349      1.135  christos 			error = inet6_ident_core(&si6[0]->sin6_addr,
   1350      1.135  christos 			    si6[0]->sin6_port, &si6[1]->sin6_addr,
   1351      1.135  christos 			    si6[1]->sin6_port, oldp, oldlenp, l, dodrop);
   1352      1.148      matt 			mutex_exit(softnet_lock);
   1353      1.135  christos 			return error;
   1354      1.135  christos 		}
   1355      1.135  christos 
   1356      1.135  christos 		if (IN6_IS_ADDR_V4MAPPED(&si6[0]->sin6_addr) !=
   1357      1.135  christos 		    IN6_IS_ADDR_V4MAPPED(&si6[1]->sin6_addr))
   1358      1.135  christos 			return EINVAL;
   1359      1.135  christos 
   1360      1.135  christos 		in6_sin6_2_sin_in_sock((struct sockaddr *)&sa[0]);
   1361      1.135  christos 		in6_sin6_2_sin_in_sock((struct sockaddr *)&sa[1]);
   1362      1.135  christos 		/*FALLTHROUGH*/
   1363      1.135  christos #endif /* INET6 */
   1364       1.86    atatat #ifdef INET
   1365      1.133  christos 	case PF_INET:
   1366       1.86    atatat 		si4[0] = (struct sockaddr_in*)&sa[0];
   1367       1.86    atatat 		si4[1] = (struct sockaddr_in*)&sa[1];
   1368       1.86    atatat 		if (si4[0]->sin_len != sizeof(*si4[0]) ||
   1369      1.135  christos 		    si4[0]->sin_len != sizeof(*si4[1]))
   1370      1.133  christos 			return EINVAL;
   1371      1.133  christos 
   1372      1.148      matt 		mutex_enter(softnet_lock);
   1373      1.133  christos 		error = inet4_ident_core(si4[0]->sin_addr, si4[0]->sin_port,
   1374      1.133  christos 		    si4[1]->sin_addr, si4[1]->sin_port,
   1375      1.133  christos 		    oldp, oldlenp, l, dodrop);
   1376      1.148      matt 		mutex_exit(softnet_lock);
   1377      1.133  christos 		return error;
   1378       1.86    atatat #endif /* INET */
   1379      1.133  christos 	default:
   1380      1.133  christos 		return EPROTONOSUPPORT;
   1381       1.86    atatat 	}
   1382       1.76  christos }
   1383       1.76  christos 
   1384       1.86    atatat /*
   1385       1.97    atatat  * sysctl helper for the inet and inet6 pcblists.  handles tcp/udp and
   1386       1.97    atatat  * inet/inet6, as well as raw pcbs for each.  specifically not
   1387       1.97    atatat  * declared static so that raw sockets and udp/udp6 can use it as
   1388       1.97    atatat  * well.
   1389       1.97    atatat  */
   1390       1.97    atatat int
   1391       1.97    atatat sysctl_inpcblist(SYSCTLFN_ARGS)
   1392       1.97    atatat {
   1393       1.97    atatat #ifdef INET
   1394       1.97    atatat 	struct sockaddr_in *in;
   1395      1.104  christos 	const struct inpcb *inp;
   1396       1.97    atatat #endif
   1397       1.97    atatat #ifdef INET6
   1398       1.97    atatat 	struct sockaddr_in6 *in6;
   1399      1.104  christos 	const struct in6pcb *in6p;
   1400       1.97    atatat #endif
   1401      1.106    atatat 	/*
   1402      1.106    atatat 	 * sysctl_data is const, but CIRCLEQ_FOREACH can't use a const
   1403      1.106    atatat 	 * struct inpcbtable pointer, so we have to discard const.  :-/
   1404      1.106    atatat 	 */
   1405      1.104  christos 	struct inpcbtable *pcbtbl = __UNCONST(rnode->sysctl_data);
   1406      1.104  christos 	const struct inpcb_hdr *inph;
   1407       1.97    atatat 	struct tcpcb *tp;
   1408       1.97    atatat 	struct kinfo_pcb pcb;
   1409       1.97    atatat 	char *dp;
   1410       1.97    atatat 	u_int op, arg;
   1411       1.97    atatat 	size_t len, needed, elem_size, out_size;
   1412       1.97    atatat 	int error, elem_count, pf, proto, pf2;
   1413       1.97    atatat 
   1414       1.97    atatat 	if (namelen != 4)
   1415       1.97    atatat 		return (EINVAL);
   1416       1.97    atatat 
   1417      1.114  christos 	if (oldp != NULL) {
   1418      1.114  christos 		    len = *oldlenp;
   1419      1.114  christos 		    elem_size = name[2];
   1420      1.114  christos 		    elem_count = name[3];
   1421      1.114  christos 		    if (elem_size != sizeof(pcb))
   1422      1.114  christos 			    return EINVAL;
   1423      1.114  christos 	} else {
   1424      1.114  christos 		    len = 0;
   1425      1.114  christos 		    elem_count = INT_MAX;
   1426      1.114  christos 		    elem_size = sizeof(pcb);
   1427      1.114  christos 	}
   1428       1.97    atatat 	error = 0;
   1429       1.97    atatat 	dp = oldp;
   1430       1.97    atatat 	op = name[0];
   1431       1.97    atatat 	arg = name[1];
   1432      1.114  christos 	out_size = elem_size;
   1433       1.97    atatat 	needed = 0;
   1434       1.97    atatat 
   1435       1.97    atatat 	if (namelen == 1 && name[0] == CTL_QUERY)
   1436      1.105    atatat 		return (sysctl_query(SYSCTLFN_CALL(rnode)));
   1437       1.97    atatat 
   1438       1.97    atatat 	if (name - oname != 4)
   1439       1.97    atatat 		return (EINVAL);
   1440       1.97    atatat 
   1441       1.97    atatat 	pf = oname[1];
   1442       1.97    atatat 	proto = oname[2];
   1443      1.116  christos 	pf2 = (oldp != NULL) ? pf : 0;
   1444       1.97    atatat 
   1445      1.148      matt 	mutex_enter(softnet_lock);
   1446      1.148      matt 
   1447       1.97    atatat 	CIRCLEQ_FOREACH(inph, &pcbtbl->inpt_queue, inph_queue) {
   1448       1.99    atatat #ifdef INET
   1449      1.104  christos 		inp = (const struct inpcb *)inph;
   1450       1.99    atatat #endif
   1451       1.99    atatat #ifdef INET6
   1452      1.104  christos 		in6p = (const struct in6pcb *)inph;
   1453       1.99    atatat #endif
   1454       1.97    atatat 
   1455       1.99    atatat 		if (inph->inph_af != pf)
   1456       1.97    atatat 			continue;
   1457       1.97    atatat 
   1458      1.125      elad 		if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_SOCKET,
   1459      1.125      elad 		    KAUTH_REQ_NETWORK_SOCKET_CANSEE, inph->inph_socket, NULL,
   1460      1.125      elad 		    NULL) != 0)
   1461      1.111      elad 			continue;
   1462      1.111      elad 
   1463       1.97    atatat 		memset(&pcb, 0, sizeof(pcb));
   1464       1.97    atatat 
   1465       1.97    atatat 		pcb.ki_family = pf;
   1466       1.97    atatat 		pcb.ki_type = proto;
   1467       1.97    atatat 
   1468       1.97    atatat 		switch (pf2) {
   1469       1.97    atatat 		case 0:
   1470       1.97    atatat 			/* just probing for size */
   1471       1.97    atatat 			break;
   1472       1.97    atatat #ifdef INET
   1473       1.97    atatat 		case PF_INET:
   1474       1.97    atatat 			pcb.ki_family = inp->inp_socket->so_proto->
   1475       1.97    atatat 			    pr_domain->dom_family;
   1476       1.97    atatat 			pcb.ki_type = inp->inp_socket->so_proto->
   1477       1.97    atatat 			    pr_type;
   1478       1.97    atatat 			pcb.ki_protocol = inp->inp_socket->so_proto->
   1479       1.97    atatat 			    pr_protocol;
   1480       1.97    atatat 			pcb.ki_pflags = inp->inp_flags;
   1481       1.97    atatat 
   1482       1.97    atatat 			pcb.ki_sostate = inp->inp_socket->so_state;
   1483       1.97    atatat 			pcb.ki_prstate = inp->inp_state;
   1484       1.97    atatat 			if (proto == IPPROTO_TCP) {
   1485       1.97    atatat 				tp = intotcpcb(inp);
   1486       1.97    atatat 				pcb.ki_tstate = tp->t_state;
   1487       1.97    atatat 				pcb.ki_tflags = tp->t_flags;
   1488       1.97    atatat 			}
   1489       1.97    atatat 
   1490       1.97    atatat 			pcb.ki_pcbaddr = PTRTOUINT64(inp);
   1491       1.97    atatat 			pcb.ki_ppcbaddr = PTRTOUINT64(inp->inp_ppcb);
   1492       1.97    atatat 			pcb.ki_sockaddr = PTRTOUINT64(inp->inp_socket);
   1493       1.97    atatat 
   1494       1.97    atatat 			pcb.ki_rcvq = inp->inp_socket->so_rcv.sb_cc;
   1495       1.97    atatat 			pcb.ki_sndq = inp->inp_socket->so_snd.sb_cc;
   1496       1.97    atatat 
   1497       1.97    atatat 			in = satosin(&pcb.ki_src);
   1498       1.97    atatat 			in->sin_len = sizeof(*in);
   1499       1.97    atatat 			in->sin_family = pf;
   1500       1.97    atatat 			in->sin_port = inp->inp_lport;
   1501       1.97    atatat 			in->sin_addr = inp->inp_laddr;
   1502       1.97    atatat 			if (pcb.ki_prstate >= INP_CONNECTED) {
   1503       1.97    atatat 				in = satosin(&pcb.ki_dst);
   1504       1.97    atatat 				in->sin_len = sizeof(*in);
   1505       1.97    atatat 				in->sin_family = pf;
   1506       1.97    atatat 				in->sin_port = inp->inp_fport;
   1507       1.97    atatat 				in->sin_addr = inp->inp_faddr;
   1508       1.97    atatat 			}
   1509       1.97    atatat 			break;
   1510       1.97    atatat #endif
   1511       1.97    atatat #ifdef INET6
   1512       1.97    atatat 		case PF_INET6:
   1513       1.97    atatat 			pcb.ki_family = in6p->in6p_socket->so_proto->
   1514       1.97    atatat 			    pr_domain->dom_family;
   1515       1.97    atatat 			pcb.ki_type = in6p->in6p_socket->so_proto->pr_type;
   1516       1.97    atatat 			pcb.ki_protocol = in6p->in6p_socket->so_proto->
   1517       1.97    atatat 			    pr_protocol;
   1518       1.97    atatat 			pcb.ki_pflags = in6p->in6p_flags;
   1519       1.97    atatat 
   1520       1.97    atatat 			pcb.ki_sostate = in6p->in6p_socket->so_state;
   1521       1.97    atatat 			pcb.ki_prstate = in6p->in6p_state;
   1522       1.97    atatat 			if (proto == IPPROTO_TCP) {
   1523       1.97    atatat 				tp = in6totcpcb(in6p);
   1524       1.97    atatat 				pcb.ki_tstate = tp->t_state;
   1525       1.97    atatat 				pcb.ki_tflags = tp->t_flags;
   1526       1.97    atatat 			}
   1527       1.97    atatat 
   1528       1.97    atatat 			pcb.ki_pcbaddr = PTRTOUINT64(in6p);
   1529       1.97    atatat 			pcb.ki_ppcbaddr = PTRTOUINT64(in6p->in6p_ppcb);
   1530       1.97    atatat 			pcb.ki_sockaddr = PTRTOUINT64(in6p->in6p_socket);
   1531       1.97    atatat 
   1532       1.97    atatat 			pcb.ki_rcvq = in6p->in6p_socket->so_rcv.sb_cc;
   1533       1.97    atatat 			pcb.ki_sndq = in6p->in6p_socket->so_snd.sb_cc;
   1534       1.97    atatat 
   1535       1.97    atatat 			in6 = satosin6(&pcb.ki_src);
   1536       1.97    atatat 			in6->sin6_len = sizeof(*in6);
   1537       1.97    atatat 			in6->sin6_family = pf;
   1538       1.97    atatat 			in6->sin6_port = in6p->in6p_lport;
   1539       1.97    atatat 			in6->sin6_flowinfo = in6p->in6p_flowinfo;
   1540       1.97    atatat 			in6->sin6_addr = in6p->in6p_laddr;
   1541       1.97    atatat 			in6->sin6_scope_id = 0; /* XXX? */
   1542       1.97    atatat 
   1543       1.97    atatat 			if (pcb.ki_prstate >= IN6P_CONNECTED) {
   1544       1.97    atatat 				in6 = satosin6(&pcb.ki_dst);
   1545       1.97    atatat 				in6->sin6_len = sizeof(*in6);
   1546       1.97    atatat 				in6->sin6_family = pf;
   1547       1.97    atatat 				in6->sin6_port = in6p->in6p_fport;
   1548       1.97    atatat 				in6->sin6_flowinfo = in6p->in6p_flowinfo;
   1549       1.97    atatat 				in6->sin6_addr = in6p->in6p_faddr;
   1550       1.97    atatat 				in6->sin6_scope_id = 0; /* XXX? */
   1551       1.97    atatat 			}
   1552       1.97    atatat 			break;
   1553       1.97    atatat #endif
   1554       1.97    atatat 		}
   1555       1.97    atatat 
   1556       1.97    atatat 		if (len >= elem_size && elem_count > 0) {
   1557       1.97    atatat 			error = copyout(&pcb, dp, out_size);
   1558      1.155     rmind 			if (error) {
   1559      1.155     rmind 				mutex_exit(softnet_lock);
   1560       1.97    atatat 				return (error);
   1561      1.155     rmind 			}
   1562       1.97    atatat 			dp += elem_size;
   1563       1.97    atatat 			len -= elem_size;
   1564       1.97    atatat 		}
   1565      1.152       mrg 		needed += elem_size;
   1566      1.152       mrg 		if (elem_count > 0 && elem_count != INT_MAX)
   1567      1.152       mrg 			elem_count--;
   1568       1.97    atatat 	}
   1569       1.97    atatat 
   1570       1.97    atatat 	*oldlenp = needed;
   1571       1.97    atatat 	if (oldp == NULL)
   1572       1.97    atatat 		*oldlenp += PCB_SLOP * sizeof(struct kinfo_pcb);
   1573       1.97    atatat 
   1574      1.148      matt 	mutex_exit(softnet_lock);
   1575      1.148      matt 
   1576       1.97    atatat 	return (error);
   1577       1.97    atatat }
   1578       1.97    atatat 
   1579      1.124    rpaulo static int
   1580      1.124    rpaulo sysctl_tcp_congctl(SYSCTLFN_ARGS)
   1581      1.124    rpaulo {
   1582      1.124    rpaulo 	struct sysctlnode node;
   1583      1.148      matt 	int error;
   1584      1.124    rpaulo 	char newname[TCPCC_MAXLEN];
   1585      1.124    rpaulo 
   1586      1.124    rpaulo 	strlcpy(newname, tcp_congctl_global_name, sizeof(newname) - 1);
   1587      1.124    rpaulo 
   1588      1.124    rpaulo 	node = *rnode;
   1589      1.124    rpaulo 	node.sysctl_data = newname;
   1590      1.124    rpaulo 	node.sysctl_size = sizeof(newname);
   1591      1.124    rpaulo 
   1592      1.124    rpaulo 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1593      1.124    rpaulo 
   1594      1.124    rpaulo 	if (error ||
   1595      1.124    rpaulo 	    newp == NULL ||
   1596      1.124    rpaulo 	    strncmp(newname, tcp_congctl_global_name, sizeof(newname)) == 0)
   1597      1.124    rpaulo 		return error;
   1598      1.124    rpaulo 
   1599      1.148      matt 	mutex_enter(softnet_lock);
   1600      1.148      matt 	error = tcp_congctl_select(NULL, newname);
   1601      1.148      matt 	mutex_exit(softnet_lock);
   1602      1.148      matt 
   1603      1.124    rpaulo 	return error;
   1604      1.124    rpaulo }
   1605      1.124    rpaulo 
   1606      1.132  christos static int
   1607      1.132  christos sysctl_tcp_keep(SYSCTLFN_ARGS)
   1608      1.132  christos {
   1609      1.132  christos 	int error;
   1610      1.132  christos 	u_int tmp;
   1611      1.132  christos 	struct sysctlnode node;
   1612      1.132  christos 
   1613      1.132  christos 	node = *rnode;
   1614      1.132  christos 	tmp = *(u_int *)rnode->sysctl_data;
   1615      1.132  christos 	node.sysctl_data = &tmp;
   1616      1.132  christos 
   1617      1.132  christos 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1618      1.132  christos 	if (error || newp == NULL)
   1619      1.132  christos 		return error;
   1620      1.132  christos 
   1621      1.148      matt 	mutex_enter(softnet_lock);
   1622      1.148      matt 
   1623      1.132  christos 	*(u_int *)rnode->sysctl_data = tmp;
   1624      1.132  christos 	tcp_tcpcb_template();	/* update the template */
   1625      1.148      matt 
   1626      1.148      matt 	mutex_exit(softnet_lock);
   1627      1.132  christos 	return 0;
   1628      1.132  christos }
   1629      1.132  christos 
   1630      1.142   thorpej static int
   1631      1.142   thorpej sysctl_net_inet_tcp_stats(SYSCTLFN_ARGS)
   1632      1.142   thorpej {
   1633      1.142   thorpej 
   1634      1.146   thorpej 	return (NETSTAT_SYSCTL(tcpstat_percpu, TCP_NSTATS));
   1635      1.142   thorpej }
   1636      1.132  christos 
   1637       1.97    atatat /*
   1638       1.86    atatat  * this (second stage) setup routine is a replacement for tcp_sysctl()
   1639       1.86    atatat  * (which is currently used for ipv4 and ipv6)
   1640       1.86    atatat  */
   1641       1.86    atatat static void
   1642       1.87    atatat sysctl_net_inet_tcp_setup2(struct sysctllog **clog, int pf, const char *pfname,
   1643       1.87    atatat 			   const char *tcpname)
   1644       1.86    atatat {
   1645      1.128    rpaulo 	const struct sysctlnode *sack_node;
   1646      1.127      yamt 	const struct sysctlnode *abc_node;
   1647      1.128    rpaulo 	const struct sysctlnode *ecn_node;
   1648      1.128    rpaulo 	const struct sysctlnode *congctl_node;
   1649  1.158.4.1     rmind 	const struct sysctlnode *mslt_node;
   1650  1.158.4.1     rmind 	const struct sysctlnode *vtw_node;
   1651      1.109    rpaulo #ifdef TCP_DEBUG
   1652      1.109    rpaulo 	extern struct tcp_debug tcp_debug[TCP_NDEBUG];
   1653      1.109    rpaulo 	extern int tcp_debx;
   1654      1.109    rpaulo #endif
   1655       1.76  christos 
   1656       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1657       1.87    atatat 		       CTLFLAG_PERMANENT,
   1658       1.86    atatat 		       CTLTYPE_NODE, "net", NULL,
   1659       1.86    atatat 		       NULL, 0, NULL, 0,
   1660       1.86    atatat 		       CTL_NET, CTL_EOL);
   1661       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1662       1.87    atatat 		       CTLFLAG_PERMANENT,
   1663       1.86    atatat 		       CTLTYPE_NODE, pfname, NULL,
   1664       1.86    atatat 		       NULL, 0, NULL, 0,
   1665       1.86    atatat 		       CTL_NET, pf, CTL_EOL);
   1666       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1667       1.87    atatat 		       CTLFLAG_PERMANENT,
   1668       1.92    atatat 		       CTLTYPE_NODE, tcpname,
   1669       1.92    atatat 		       SYSCTL_DESCR("TCP related settings"),
   1670       1.86    atatat 		       NULL, 0, NULL, 0,
   1671       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, CTL_EOL);
   1672       1.86    atatat 
   1673       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1674       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1675       1.92    atatat 		       CTLTYPE_INT, "rfc1323",
   1676       1.92    atatat 		       SYSCTL_DESCR("Enable RFC1323 TCP extensions"),
   1677       1.86    atatat 		       NULL, 0, &tcp_do_rfc1323, 0,
   1678       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_RFC1323, CTL_EOL);
   1679       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1680       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1681       1.92    atatat 		       CTLTYPE_INT, "sendspace",
   1682       1.92    atatat 		       SYSCTL_DESCR("Default TCP send buffer size"),
   1683       1.86    atatat 		       NULL, 0, &tcp_sendspace, 0,
   1684       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SENDSPACE, CTL_EOL);
   1685       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1686       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1687       1.92    atatat 		       CTLTYPE_INT, "recvspace",
   1688       1.92    atatat 		       SYSCTL_DESCR("Default TCP receive buffer size"),
   1689       1.86    atatat 		       NULL, 0, &tcp_recvspace, 0,
   1690       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_RECVSPACE, CTL_EOL);
   1691       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1692       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1693       1.92    atatat 		       CTLTYPE_INT, "mssdflt",
   1694       1.92    atatat 		       SYSCTL_DESCR("Default maximum segment size"),
   1695       1.86    atatat 		       sysctl_net_inet_tcp_mssdflt, 0, &tcp_mssdflt, 0,
   1696       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_MSSDFLT, CTL_EOL);
   1697       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1698       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1699      1.136     rmind 		       CTLTYPE_INT, "minmss",
   1700      1.136     rmind 		       SYSCTL_DESCR("Lower limit for TCP maximum segment size"),
   1701      1.136     rmind 		       NULL, 0, &tcp_minmss, 0,
   1702      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1703      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1704      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1705      1.156    darran 		       CTLTYPE_INT, "msl",
   1706      1.156    darran 		       SYSCTL_DESCR("Maximum Segment Life"),
   1707      1.156    darran 		       NULL, 0, &tcp_msl, 0,
   1708      1.156    darran 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_MSL, CTL_EOL);
   1709      1.156    darran 	sysctl_createv(clog, 0, NULL, NULL,
   1710      1.156    darran 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1711       1.92    atatat 		       CTLTYPE_INT, "syn_cache_limit",
   1712       1.92    atatat 		       SYSCTL_DESCR("Maximum number of entries in the TCP "
   1713       1.92    atatat 				    "compressed state engine"),
   1714       1.86    atatat 		       NULL, 0, &tcp_syn_cache_limit, 0,
   1715       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SYN_CACHE_LIMIT,
   1716       1.86    atatat 		       CTL_EOL);
   1717       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1718       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1719       1.92    atatat 		       CTLTYPE_INT, "syn_bucket_limit",
   1720       1.92    atatat 		       SYSCTL_DESCR("Maximum number of entries per hash "
   1721       1.92    atatat 				    "bucket in the TCP compressed state "
   1722       1.92    atatat 				    "engine"),
   1723       1.86    atatat 		       NULL, 0, &tcp_syn_bucket_limit, 0,
   1724       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SYN_BUCKET_LIMIT,
   1725       1.86    atatat 		       CTL_EOL);
   1726       1.86    atatat #if 0 /* obsoleted */
   1727       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1728       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1729       1.92    atatat 		       CTLTYPE_INT, "syn_cache_interval",
   1730       1.92    atatat 		       SYSCTL_DESCR("TCP compressed state engine's timer interval"),
   1731       1.86    atatat 		       NULL, 0, &tcp_syn_cache_interval, 0,
   1732       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SYN_CACHE_INTER,
   1733       1.86    atatat 		       CTL_EOL);
   1734       1.86    atatat #endif
   1735       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1736       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1737       1.92    atatat 		       CTLTYPE_INT, "init_win",
   1738       1.92    atatat 		       SYSCTL_DESCR("Initial TCP congestion window"),
   1739       1.86    atatat 		       NULL, 0, &tcp_init_win, 0,
   1740       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_INIT_WIN, CTL_EOL);
   1741       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1742       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1743       1.92    atatat 		       CTLTYPE_INT, "mss_ifmtu",
   1744       1.92    atatat 		       SYSCTL_DESCR("Use interface MTU for calculating MSS"),
   1745       1.86    atatat 		       NULL, 0, &tcp_mss_ifmtu, 0,
   1746       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_MSS_IFMTU, CTL_EOL);
   1747      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1748      1.102  kurahone 		       CTLFLAG_PERMANENT,
   1749      1.102  kurahone 		       CTLTYPE_NODE, "sack",
   1750      1.102  kurahone 		       SYSCTL_DESCR("RFC2018 Selective ACKnowledgement tunables"),
   1751      1.102  kurahone 		       NULL, 0, NULL, 0,
   1752       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_EOL);
   1753      1.128    rpaulo 
   1754      1.128    rpaulo 	/* Congctl subtree */
   1755      1.128    rpaulo 	sysctl_createv(clog, 0, NULL, &congctl_node,
   1756      1.124    rpaulo 		       CTLFLAG_PERMANENT,
   1757      1.124    rpaulo 		       CTLTYPE_NODE, "congctl",
   1758      1.124    rpaulo 		       SYSCTL_DESCR("TCP Congestion Control"),
   1759      1.128    rpaulo 	    	       NULL, 0, NULL, 0,
   1760      1.124    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1761      1.128    rpaulo 	sysctl_createv(clog, 0, &congctl_node, NULL,
   1762      1.124    rpaulo 		       CTLFLAG_PERMANENT,
   1763      1.124    rpaulo 		       CTLTYPE_STRING, "available",
   1764      1.124    rpaulo 		       SYSCTL_DESCR("Available Congestion Control Mechanisms"),
   1765      1.128    rpaulo 		       NULL, 0, &tcp_congctl_avail, 0, CTL_CREATE, CTL_EOL);
   1766      1.128    rpaulo 	sysctl_createv(clog, 0, &congctl_node, NULL,
   1767      1.124    rpaulo 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1768      1.124    rpaulo 		       CTLTYPE_STRING, "selected",
   1769      1.124    rpaulo 		       SYSCTL_DESCR("Selected Congestion Control Mechanism"),
   1770      1.124    rpaulo 		       sysctl_tcp_congctl, 0, NULL, TCPCC_MAXLEN,
   1771      1.124    rpaulo 		       CTL_CREATE, CTL_EOL);
   1772      1.124    rpaulo 
   1773       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1774       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1775       1.92    atatat 		       CTLTYPE_INT, "win_scale",
   1776       1.92    atatat 		       SYSCTL_DESCR("Use RFC1323 window scale options"),
   1777       1.86    atatat 		       NULL, 0, &tcp_do_win_scale, 0,
   1778       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_WSCALE, CTL_EOL);
   1779       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1780       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1781       1.92    atatat 		       CTLTYPE_INT, "timestamps",
   1782       1.92    atatat 		       SYSCTL_DESCR("Use RFC1323 time stamp options"),
   1783       1.86    atatat 		       NULL, 0, &tcp_do_timestamps, 0,
   1784       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_TSTAMP, CTL_EOL);
   1785       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1786       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1787       1.92    atatat 		       CTLTYPE_INT, "compat_42",
   1788       1.92    atatat 		       SYSCTL_DESCR("Enable workarounds for 4.2BSD TCP bugs"),
   1789       1.86    atatat 		       NULL, 0, &tcp_compat_42, 0,
   1790       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_COMPAT_42, CTL_EOL);
   1791       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1792       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1793       1.92    atatat 		       CTLTYPE_INT, "cwm",
   1794       1.92    atatat 		       SYSCTL_DESCR("Hughes/Touch/Heidemann Congestion Window "
   1795       1.92    atatat 				    "Monitoring"),
   1796       1.86    atatat 		       NULL, 0, &tcp_cwm, 0,
   1797       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_CWM, CTL_EOL);
   1798       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1799       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1800       1.92    atatat 		       CTLTYPE_INT, "cwm_burstsize",
   1801       1.92    atatat 		       SYSCTL_DESCR("Congestion Window Monitoring allowed "
   1802       1.92    atatat 				    "burst count in packets"),
   1803       1.86    atatat 		       NULL, 0, &tcp_cwm_burstsize, 0,
   1804       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_CWM_BURSTSIZE,
   1805       1.86    atatat 		       CTL_EOL);
   1806       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1807       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1808       1.92    atatat 		       CTLTYPE_INT, "ack_on_push",
   1809       1.92    atatat 		       SYSCTL_DESCR("Immediately return ACK when PSH is "
   1810       1.92    atatat 				    "received"),
   1811       1.86    atatat 		       NULL, 0, &tcp_ack_on_push, 0,
   1812       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_ACK_ON_PUSH, CTL_EOL);
   1813       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1814       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1815       1.92    atatat 		       CTLTYPE_INT, "keepidle",
   1816       1.92    atatat 		       SYSCTL_DESCR("Allowed connection idle ticks before a "
   1817       1.92    atatat 				    "keepalive probe is sent"),
   1818      1.132  christos 		       sysctl_tcp_keep, 0, &tcp_keepidle, 0,
   1819       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_KEEPIDLE, CTL_EOL);
   1820       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1821       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1822       1.92    atatat 		       CTLTYPE_INT, "keepintvl",
   1823       1.92    atatat 		       SYSCTL_DESCR("Ticks before next keepalive probe is sent"),
   1824      1.132  christos 		       sysctl_tcp_keep, 0, &tcp_keepintvl, 0,
   1825       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_KEEPINTVL, CTL_EOL);
   1826       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1827       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1828       1.92    atatat 		       CTLTYPE_INT, "keepcnt",
   1829       1.92    atatat 		       SYSCTL_DESCR("Number of keepalive probes to send"),
   1830      1.132  christos 		       sysctl_tcp_keep, 0, &tcp_keepcnt, 0,
   1831       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_KEEPCNT, CTL_EOL);
   1832       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1833       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_IMMEDIATE,
   1834       1.92    atatat 		       CTLTYPE_INT, "slowhz",
   1835       1.92    atatat 		       SYSCTL_DESCR("Keepalive ticks per second"),
   1836       1.86    atatat 		       NULL, PR_SLOWHZ, NULL, 0,
   1837       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SLOWHZ, CTL_EOL);
   1838       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1839       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1840       1.92    atatat 		       CTLTYPE_INT, "log_refused",
   1841       1.92    atatat 		       SYSCTL_DESCR("Log refused TCP connections"),
   1842       1.86    atatat 		       NULL, 0, &tcp_log_refused, 0,
   1843       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_LOG_REFUSED, CTL_EOL);
   1844       1.86    atatat #if 0 /* obsoleted */
   1845       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1846       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1847       1.86    atatat 		       CTLTYPE_INT, "rstratelimit", NULL,
   1848       1.86    atatat 		       NULL, 0, &tcp_rst_ratelim, 0,
   1849       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_RSTRATELIMIT, CTL_EOL);
   1850       1.86    atatat #endif
   1851       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1852       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1853       1.92    atatat 		       CTLTYPE_INT, "rstppslimit",
   1854       1.92    atatat 		       SYSCTL_DESCR("Maximum number of RST packets to send "
   1855       1.92    atatat 				    "per second"),
   1856       1.86    atatat 		       NULL, 0, &tcp_rst_ppslim, 0,
   1857       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_RSTPPSLIMIT, CTL_EOL);
   1858       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1859       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1860       1.92    atatat 		       CTLTYPE_INT, "delack_ticks",
   1861       1.92    atatat 		       SYSCTL_DESCR("Number of ticks to delay sending an ACK"),
   1862       1.86    atatat 		       NULL, 0, &tcp_delack_ticks, 0,
   1863       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_DELACK_TICKS, CTL_EOL);
   1864       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1865       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1866       1.92    atatat 		       CTLTYPE_INT, "init_win_local",
   1867       1.92    atatat 		       SYSCTL_DESCR("Initial TCP window size (in segments)"),
   1868       1.86    atatat 		       NULL, 0, &tcp_init_win_local, 0,
   1869       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_INIT_WIN_LOCAL,
   1870       1.86    atatat 		       CTL_EOL);
   1871       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1872       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1873       1.92    atatat 		       CTLTYPE_STRUCT, "ident",
   1874       1.92    atatat 		       SYSCTL_DESCR("RFC1413 Identification Protocol lookups"),
   1875       1.86    atatat 		       sysctl_net_inet_tcp_ident, 0, NULL, sizeof(uid_t),
   1876       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_IDENT, CTL_EOL);
   1877       1.93   thorpej 	sysctl_createv(clog, 0, NULL, NULL,
   1878       1.93   thorpej 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1879       1.93   thorpej 		       CTLTYPE_INT, "do_loopback_cksum",
   1880       1.93   thorpej 		       SYSCTL_DESCR("Perform TCP checksum on loopback"),
   1881       1.93   thorpej 		       NULL, 0, &tcp_do_loopback_cksum, 0,
   1882       1.93   thorpej 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_LOOPBACKCKSUM,
   1883       1.93   thorpej 		       CTL_EOL);
   1884       1.97    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1885       1.97    atatat 		       CTLFLAG_PERMANENT,
   1886      1.100    atatat 		       CTLTYPE_STRUCT, "pcblist",
   1887       1.97    atatat 		       SYSCTL_DESCR("TCP protocol control block list"),
   1888       1.97    atatat 		       sysctl_inpcblist, 0, &tcbtable, 0,
   1889       1.97    atatat 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE,
   1890       1.97    atatat 		       CTL_EOL);
   1891      1.132  christos 	sysctl_createv(clog, 0, NULL, NULL,
   1892      1.132  christos 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1893      1.132  christos 		       CTLTYPE_INT, "keepinit",
   1894      1.132  christos 		       SYSCTL_DESCR("Ticks before initial tcp connection times out"),
   1895      1.132  christos 		       sysctl_tcp_keep, 0, &tcp_keepinit, 0,
   1896      1.132  christos 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1897      1.102  kurahone 
   1898      1.136     rmind 	/* TCP socket buffers auto-sizing nodes */
   1899      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1900      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1901      1.136     rmind 		       CTLTYPE_INT, "recvbuf_auto",
   1902      1.136     rmind 		       SYSCTL_DESCR("Enable automatic receive "
   1903      1.136     rmind 		           "buffer sizing (experimental)"),
   1904      1.136     rmind 		       NULL, 0, &tcp_do_autorcvbuf, 0,
   1905      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1906      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1907      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1908      1.136     rmind 		       CTLTYPE_INT, "recvbuf_inc",
   1909      1.136     rmind 		       SYSCTL_DESCR("Incrementor step size of "
   1910      1.136     rmind 		           "automatic receive buffer"),
   1911      1.136     rmind 		       NULL, 0, &tcp_autorcvbuf_inc, 0,
   1912      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1913      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1914      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1915      1.136     rmind 		       CTLTYPE_INT, "recvbuf_max",
   1916      1.136     rmind 		       SYSCTL_DESCR("Max size of automatic receive buffer"),
   1917      1.136     rmind 		       NULL, 0, &tcp_autorcvbuf_max, 0,
   1918      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1919      1.136     rmind 
   1920      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1921      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1922      1.136     rmind 		       CTLTYPE_INT, "sendbuf_auto",
   1923      1.136     rmind 		       SYSCTL_DESCR("Enable automatic send "
   1924      1.136     rmind 		           "buffer sizing (experimental)"),
   1925      1.136     rmind 		       NULL, 0, &tcp_do_autosndbuf, 0,
   1926      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1927      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1928      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1929      1.136     rmind 		       CTLTYPE_INT, "sendbuf_inc",
   1930      1.136     rmind 		       SYSCTL_DESCR("Incrementor step size of "
   1931      1.136     rmind 		           "automatic send buffer"),
   1932      1.136     rmind 		       NULL, 0, &tcp_autosndbuf_inc, 0,
   1933      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1934      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1935      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1936      1.136     rmind 		       CTLTYPE_INT, "sendbuf_max",
   1937      1.136     rmind 		       SYSCTL_DESCR("Max size of automatic send buffer"),
   1938      1.136     rmind 		       NULL, 0, &tcp_autosndbuf_max, 0,
   1939      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1940      1.136     rmind 
   1941      1.128    rpaulo 	/* ECN subtree */
   1942      1.128    rpaulo 	sysctl_createv(clog, 0, NULL, &ecn_node,
   1943      1.128    rpaulo 	    	       CTLFLAG_PERMANENT,
   1944      1.128    rpaulo 		       CTLTYPE_NODE, "ecn",
   1945      1.128    rpaulo 	    	       SYSCTL_DESCR("RFC3168 Explicit Congestion Notification"),
   1946      1.128    rpaulo 	    	       NULL, 0, NULL, 0,
   1947      1.128    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1948      1.128    rpaulo 	sysctl_createv(clog, 0, &ecn_node, NULL,
   1949      1.120    rpaulo 	    	       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1950      1.120    rpaulo 		       CTLTYPE_INT, "enable",
   1951      1.120    rpaulo 		       SYSCTL_DESCR("Enable TCP Explicit Congestion "
   1952      1.120    rpaulo 			   "Notification"),
   1953      1.128    rpaulo 	    	       NULL, 0, &tcp_do_ecn, 0, CTL_CREATE, CTL_EOL);
   1954      1.128    rpaulo 	sysctl_createv(clog, 0, &ecn_node, NULL,
   1955      1.120    rpaulo 	    	       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1956      1.120    rpaulo 		       CTLTYPE_INT, "maxretries",
   1957      1.120    rpaulo 		       SYSCTL_DESCR("Number of times to retry ECN setup "
   1958      1.120    rpaulo 			       "before disabling ECN on the connection"),
   1959      1.128    rpaulo 	    	       NULL, 0, &tcp_ecn_maxretries, 0, CTL_CREATE, CTL_EOL);
   1960      1.128    rpaulo 
   1961      1.102  kurahone 	/* SACK gets it's own little subtree. */
   1962      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1963      1.102  kurahone 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1964      1.102  kurahone 		       CTLTYPE_INT, "enable",
   1965      1.102  kurahone 		       SYSCTL_DESCR("Enable RFC2018 Selective ACKnowledgement"),
   1966      1.102  kurahone 		       NULL, 0, &tcp_do_sack, 0,
   1967      1.102  kurahone 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_CREATE, CTL_EOL);
   1968      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1969      1.102  kurahone 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1970      1.102  kurahone 		       CTLTYPE_INT, "maxholes",
   1971      1.102  kurahone 		       SYSCTL_DESCR("Maximum number of TCP SACK holes allowed per connection"),
   1972      1.102  kurahone 		       NULL, 0, &tcp_sack_tp_maxholes, 0,
   1973      1.102  kurahone 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_CREATE, CTL_EOL);
   1974      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1975      1.102  kurahone 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1976      1.102  kurahone 		       CTLTYPE_INT, "globalmaxholes",
   1977      1.102  kurahone 		       SYSCTL_DESCR("Global maximum number of TCP SACK holes"),
   1978      1.102  kurahone 		       NULL, 0, &tcp_sack_globalmaxholes, 0,
   1979      1.102  kurahone 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_CREATE, CTL_EOL);
   1980      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1981      1.102  kurahone 		       CTLFLAG_PERMANENT,
   1982      1.102  kurahone 		       CTLTYPE_INT, "globalholes",
   1983      1.102  kurahone 		       SYSCTL_DESCR("Global number of TCP SACK holes"),
   1984      1.102  kurahone 		       NULL, 0, &tcp_sack_globalholes, 0,
   1985      1.102  kurahone 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_CREATE, CTL_EOL);
   1986      1.107      elad 
   1987      1.107      elad 	sysctl_createv(clog, 0, NULL, NULL,
   1988      1.107      elad 		       CTLFLAG_PERMANENT,
   1989      1.107      elad 		       CTLTYPE_STRUCT, "stats",
   1990      1.107      elad 		       SYSCTL_DESCR("TCP statistics"),
   1991      1.142   thorpej 		       sysctl_net_inet_tcp_stats, 0, NULL, 0,
   1992      1.107      elad 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_STATS,
   1993      1.107      elad 		       CTL_EOL);
   1994  1.158.4.1     rmind         sysctl_createv(clog, 0, NULL, NULL,
   1995  1.158.4.1     rmind                        CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1996  1.158.4.1     rmind                        CTLTYPE_INT, "local_by_rtt",
   1997  1.158.4.1     rmind                        SYSCTL_DESCR("Use RTT estimator to decide which hosts "
   1998  1.158.4.1     rmind 				    "are local"),
   1999  1.158.4.1     rmind 		       NULL, 0, &tcp_rttlocal, 0,
   2000  1.158.4.1     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   2001      1.109    rpaulo #ifdef TCP_DEBUG
   2002      1.109    rpaulo 	sysctl_createv(clog, 0, NULL, NULL,
   2003      1.109    rpaulo 		       CTLFLAG_PERMANENT,
   2004      1.109    rpaulo 		       CTLTYPE_STRUCT, "debug",
   2005      1.109    rpaulo 		       SYSCTL_DESCR("TCP sockets debug information"),
   2006      1.109    rpaulo 		       NULL, 0, &tcp_debug, sizeof(tcp_debug),
   2007      1.109    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_DEBUG,
   2008      1.109    rpaulo 		       CTL_EOL);
   2009      1.109    rpaulo 	sysctl_createv(clog, 0, NULL, NULL,
   2010      1.109    rpaulo 		       CTLFLAG_PERMANENT,
   2011      1.109    rpaulo 		       CTLTYPE_INT, "debx",
   2012      1.110    rpaulo 		       SYSCTL_DESCR("Number of TCP debug sockets messages"),
   2013      1.109    rpaulo 		       NULL, 0, &tcp_debx, sizeof(tcp_debx),
   2014      1.109    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_DEBX,
   2015      1.109    rpaulo 		       CTL_EOL);
   2016      1.109    rpaulo #endif
   2017      1.133  christos 	sysctl_createv(clog, 0, NULL, NULL,
   2018      1.133  christos 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2019      1.133  christos 		       CTLTYPE_STRUCT, "drop",
   2020      1.133  christos 		       SYSCTL_DESCR("TCP drop connection"),
   2021      1.133  christos 		       sysctl_net_inet_tcp_drop, 0, NULL, 0,
   2022      1.133  christos 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_DROP, CTL_EOL);
   2023      1.126    rpaulo #if NRND > 0
   2024      1.126    rpaulo 	sysctl_createv(clog, 0, NULL, NULL,
   2025      1.126    rpaulo 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2026      1.126    rpaulo 		       CTLTYPE_INT, "iss_hash",
   2027      1.126    rpaulo 		       SYSCTL_DESCR("Enable RFC 1948 ISS by cryptographic "
   2028      1.126    rpaulo 				    "hash computation"),
   2029      1.126    rpaulo 		       NULL, 0, &tcp_do_rfc1948, sizeof(tcp_do_rfc1948),
   2030      1.126    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE,
   2031      1.126    rpaulo 		       CTL_EOL);
   2032      1.126    rpaulo #endif
   2033      1.109    rpaulo 
   2034      1.127      yamt 	/* ABC subtree */
   2035      1.127      yamt 
   2036      1.127      yamt 	sysctl_createv(clog, 0, NULL, &abc_node,
   2037      1.127      yamt 		       CTLFLAG_PERMANENT, CTLTYPE_NODE, "abc",
   2038      1.127      yamt 		       SYSCTL_DESCR("RFC3465 Appropriate Byte Counting (ABC)"),
   2039      1.127      yamt 		       NULL, 0, NULL, 0,
   2040      1.127      yamt 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   2041      1.127      yamt 	sysctl_createv(clog, 0, &abc_node, NULL,
   2042      1.127      yamt 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2043      1.127      yamt 		       CTLTYPE_INT, "enable",
   2044      1.127      yamt 		       SYSCTL_DESCR("Enable RFC3465 Appropriate Byte Counting"),
   2045      1.127      yamt 		       NULL, 0, &tcp_do_abc, 0, CTL_CREATE, CTL_EOL);
   2046      1.127      yamt 	sysctl_createv(clog, 0, &abc_node, NULL,
   2047      1.127      yamt 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2048      1.127      yamt 		       CTLTYPE_INT, "aggressive",
   2049      1.127      yamt 		       SYSCTL_DESCR("1: L=2*SMSS 0: L=1*SMSS"),
   2050      1.127      yamt 		       NULL, 0, &tcp_abc_aggressive, 0, CTL_CREATE, CTL_EOL);
   2051  1.158.4.1     rmind 
   2052  1.158.4.1     rmind 	/* MSL tuning subtree */
   2053  1.158.4.1     rmind 
   2054  1.158.4.1     rmind 	sysctl_createv(clog, 0, NULL, &mslt_node,
   2055  1.158.4.1     rmind 		       CTLFLAG_PERMANENT, CTLTYPE_NODE, "mslt",
   2056  1.158.4.1     rmind 		       SYSCTL_DESCR("MSL Tuning for TIME_WAIT truncation"),
   2057  1.158.4.1     rmind 		       NULL, 0, NULL, 0,
   2058  1.158.4.1     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   2059  1.158.4.1     rmind 	sysctl_createv(clog, 0, &mslt_node, NULL,
   2060  1.158.4.1     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2061  1.158.4.1     rmind 		       CTLTYPE_INT, "enable",
   2062  1.158.4.1     rmind 		       SYSCTL_DESCR("Enable TIME_WAIT truncation"),
   2063  1.158.4.1     rmind 		       NULL, 0, &tcp_msl_enable, 0, CTL_CREATE, CTL_EOL);
   2064  1.158.4.1     rmind 	sysctl_createv(clog, 0, &mslt_node, NULL,
   2065  1.158.4.1     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2066  1.158.4.1     rmind 		       CTLTYPE_INT, "loopback",
   2067  1.158.4.1     rmind 		       SYSCTL_DESCR("MSL value to use for loopback connections"),
   2068  1.158.4.1     rmind 		       NULL, 0, &tcp_msl_loop, 0, CTL_CREATE, CTL_EOL);
   2069  1.158.4.1     rmind 	sysctl_createv(clog, 0, &mslt_node, NULL,
   2070  1.158.4.1     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2071  1.158.4.1     rmind 		       CTLTYPE_INT, "local",
   2072  1.158.4.1     rmind 		       SYSCTL_DESCR("MSL value to use for local connections"),
   2073  1.158.4.1     rmind 		       NULL, 0, &tcp_msl_local, 0, CTL_CREATE, CTL_EOL);
   2074  1.158.4.1     rmind 	sysctl_createv(clog, 0, &mslt_node, NULL,
   2075  1.158.4.1     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2076  1.158.4.1     rmind 		       CTLTYPE_INT, "remote",
   2077  1.158.4.1     rmind 		       SYSCTL_DESCR("MSL value to use for remote connections"),
   2078  1.158.4.1     rmind 		       NULL, 0, &tcp_msl_remote, 0, CTL_CREATE, CTL_EOL);
   2079  1.158.4.1     rmind 	sysctl_createv(clog, 0, &mslt_node, NULL,
   2080  1.158.4.1     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2081  1.158.4.1     rmind 		       CTLTYPE_INT, "remote_threshold",
   2082  1.158.4.1     rmind 		       SYSCTL_DESCR("RTT estimate value to promote local to remote"),
   2083  1.158.4.1     rmind 		       NULL, 0, &tcp_msl_remote_threshold, 0, CTL_CREATE, CTL_EOL);
   2084  1.158.4.1     rmind 
   2085  1.158.4.1     rmind 	/* vestigial TIME_WAIT tuning subtree */
   2086  1.158.4.1     rmind 
   2087  1.158.4.1     rmind 	sysctl_createv(clog, 0, NULL, &vtw_node,
   2088  1.158.4.1     rmind 		       CTLFLAG_PERMANENT, CTLTYPE_NODE, "vtw",
   2089  1.158.4.1     rmind 		       SYSCTL_DESCR("Tuning for Vestigial TIME_WAIT"),
   2090  1.158.4.1     rmind 		       NULL, 0, NULL, 0,
   2091  1.158.4.1     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   2092  1.158.4.1     rmind 	sysctl_createv(clog, 0, &vtw_node, NULL,
   2093  1.158.4.1     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   2094  1.158.4.1     rmind 		       CTLTYPE_INT, "enable",
   2095  1.158.4.1     rmind 		       SYSCTL_DESCR("Enable Vestigial TIME_WAIT"),
   2096  1.158.4.1     rmind 		       NULL, 0,
   2097  1.158.4.1     rmind 	               (pf == AF_INET) ? &tcp4_vtw_enable : &tcp6_vtw_enable,
   2098  1.158.4.1     rmind 		       0, CTL_CREATE, CTL_EOL);
   2099  1.158.4.1     rmind 	sysctl_createv(clog, 0, &vtw_node, NULL,
   2100  1.158.4.1     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READONLY,
   2101  1.158.4.1     rmind 		       CTLTYPE_INT, "entries",
   2102  1.158.4.1     rmind 		       SYSCTL_DESCR("Maximum number of vestigial TIME_WAIT entries"),
   2103  1.158.4.1     rmind 		       NULL, 0, &tcp_vtw_entries, 0, CTL_CREATE, CTL_EOL);
   2104       1.86    atatat }
   2105       1.86    atatat 
   2106      1.157     pooka void
   2107      1.157     pooka tcp_usrreq_init(void)
   2108       1.76  christos {
   2109       1.76  christos 
   2110      1.157     pooka #ifdef INET
   2111      1.157     pooka 	sysctl_net_inet_tcp_setup2(NULL, PF_INET, "inet", "tcp");
   2112      1.157     pooka #endif
   2113       1.86    atatat #ifdef INET6
   2114      1.157     pooka 	sysctl_net_inet_tcp_setup2(NULL, PF_INET6, "inet6", "tcp6");
   2115      1.157     pooka #endif
   2116        1.1       cgd }
   2117