Home | History | Annotate | Line # | Download | only in netinet
tcp_usrreq.c revision 1.166.4.1
      1  1.166.4.1     rmind /*	$NetBSD: tcp_usrreq.c,v 1.166.4.1 2013/07/17 03:16:31 rmind Exp $	*/
      2       1.40    itojun 
      3       1.40    itojun /*
      4       1.40    itojun  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
      5       1.40    itojun  * All rights reserved.
      6       1.71    itojun  *
      7       1.40    itojun  * Redistribution and use in source and binary forms, with or without
      8       1.40    itojun  * modification, are permitted provided that the following conditions
      9       1.40    itojun  * are met:
     10       1.40    itojun  * 1. Redistributions of source code must retain the above copyright
     11       1.40    itojun  *    notice, this list of conditions and the following disclaimer.
     12       1.40    itojun  * 2. Redistributions in binary form must reproduce the above copyright
     13       1.40    itojun  *    notice, this list of conditions and the following disclaimer in the
     14       1.40    itojun  *    documentation and/or other materials provided with the distribution.
     15       1.40    itojun  * 3. Neither the name of the project nor the names of its contributors
     16       1.40    itojun  *    may be used to endorse or promote products derived from this software
     17       1.40    itojun  *    without specific prior written permission.
     18       1.71    itojun  *
     19       1.40    itojun  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
     20       1.40    itojun  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     21       1.40    itojun  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     22       1.40    itojun  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
     23       1.40    itojun  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     24       1.40    itojun  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     25       1.40    itojun  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     26       1.40    itojun  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     27       1.40    itojun  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     28       1.40    itojun  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     29       1.40    itojun  * SUCH DAMAGE.
     30       1.40    itojun  */
     31       1.34   thorpej 
     32       1.34   thorpej /*-
     33      1.120    rpaulo  * Copyright (c) 1997, 1998, 2005, 2006 The NetBSD Foundation, Inc.
     34       1.34   thorpej  * All rights reserved.
     35       1.34   thorpej  *
     36       1.34   thorpej  * This code is derived from software contributed to The NetBSD Foundation
     37       1.34   thorpej  * by Jason R. Thorpe and Kevin M. Lahey of the Numerical Aerospace Simulation
     38       1.34   thorpej  * Facility, NASA Ames Research Center.
     39       1.95   mycroft  * This code is derived from software contributed to The NetBSD Foundation
     40       1.95   mycroft  * by Charles M. Hannum.
     41      1.120    rpaulo  * This code is derived from software contributed to The NetBSD Foundation
     42      1.120    rpaulo  * by Rui Paulo.
     43       1.34   thorpej  *
     44       1.34   thorpej  * Redistribution and use in source and binary forms, with or without
     45       1.34   thorpej  * modification, are permitted provided that the following conditions
     46       1.34   thorpej  * are met:
     47       1.34   thorpej  * 1. Redistributions of source code must retain the above copyright
     48       1.34   thorpej  *    notice, this list of conditions and the following disclaimer.
     49       1.34   thorpej  * 2. Redistributions in binary form must reproduce the above copyright
     50       1.34   thorpej  *    notice, this list of conditions and the following disclaimer in the
     51       1.34   thorpej  *    documentation and/or other materials provided with the distribution.
     52       1.34   thorpej  *
     53       1.34   thorpej  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     54       1.34   thorpej  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     55       1.34   thorpej  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     56       1.34   thorpej  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     57       1.34   thorpej  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     58       1.34   thorpej  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     59       1.34   thorpej  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     60       1.34   thorpej  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     61       1.34   thorpej  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     62       1.34   thorpej  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     63       1.34   thorpej  * POSSIBILITY OF SUCH DAMAGE.
     64       1.34   thorpej  */
     65       1.10       cgd 
     66        1.1       cgd /*
     67       1.33   thorpej  * Copyright (c) 1982, 1986, 1988, 1993, 1995
     68        1.9   mycroft  *	The Regents of the University of California.  All rights reserved.
     69        1.1       cgd  *
     70        1.1       cgd  * Redistribution and use in source and binary forms, with or without
     71        1.1       cgd  * modification, are permitted provided that the following conditions
     72        1.1       cgd  * are met:
     73        1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     74        1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     75        1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     76        1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     77        1.1       cgd  *    documentation and/or other materials provided with the distribution.
     78       1.82       agc  * 3. Neither the name of the University nor the names of its contributors
     79        1.1       cgd  *    may be used to endorse or promote products derived from this software
     80        1.1       cgd  *    without specific prior written permission.
     81        1.1       cgd  *
     82        1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     83        1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     84        1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     85        1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     86        1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     87        1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     88        1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     89        1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     90        1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     91        1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     92        1.1       cgd  * SUCH DAMAGE.
     93        1.1       cgd  *
     94       1.33   thorpej  *	@(#)tcp_usrreq.c	8.5 (Berkeley) 6/21/95
     95        1.1       cgd  */
     96       1.67     lukem 
     97       1.67     lukem #include <sys/cdefs.h>
     98  1.166.4.1     rmind __KERNEL_RCSID(0, "$NetBSD: tcp_usrreq.c,v 1.166.4.1 2013/07/17 03:16:31 rmind Exp $");
     99        1.1       cgd 
    100       1.40    itojun #include "opt_inet.h"
    101       1.42   thorpej #include "opt_ipsec.h"
    102       1.63       abs #include "opt_tcp_debug.h"
    103       1.77    martin #include "opt_mbuftrace.h"
    104      1.162       tls 
    105       1.40    itojun 
    106        1.5   mycroft #include <sys/param.h>
    107        1.5   mycroft #include <sys/systm.h>
    108       1.13     glass #include <sys/kernel.h>
    109        1.5   mycroft #include <sys/malloc.h>
    110        1.5   mycroft #include <sys/mbuf.h>
    111        1.5   mycroft #include <sys/socket.h>
    112        1.5   mycroft #include <sys/socketvar.h>
    113        1.5   mycroft #include <sys/protosw.h>
    114        1.5   mycroft #include <sys/errno.h>
    115        1.5   mycroft #include <sys/stat.h>
    116       1.20  christos #include <sys/proc.h>
    117       1.40    itojun #include <sys/domain.h>
    118       1.20  christos #include <sys/sysctl.h>
    119      1.117      elad #include <sys/kauth.h>
    120      1.149     pooka #include <sys/uidinfo.h>
    121        1.1       cgd 
    122        1.5   mycroft #include <net/if.h>
    123        1.5   mycroft #include <net/route.h>
    124        1.1       cgd 
    125        1.5   mycroft #include <netinet/in.h>
    126        1.5   mycroft #include <netinet/in_systm.h>
    127       1.14       cgd #include <netinet/in_var.h>
    128        1.5   mycroft #include <netinet/ip.h>
    129        1.5   mycroft #include <netinet/in_pcb.h>
    130        1.5   mycroft #include <netinet/ip_var.h>
    131      1.108      yamt #include <netinet/in_offload.h>
    132       1.40    itojun 
    133       1.40    itojun #ifdef INET6
    134       1.40    itojun #ifndef INET
    135       1.40    itojun #include <netinet/in.h>
    136       1.40    itojun #endif
    137       1.40    itojun #include <netinet/ip6.h>
    138       1.40    itojun #include <netinet6/in6_pcb.h>
    139       1.40    itojun #include <netinet6/ip6_var.h>
    140      1.135  christos #include <netinet6/scope6_var.h>
    141       1.40    itojun #endif
    142       1.40    itojun 
    143        1.5   mycroft #include <netinet/tcp.h>
    144        1.5   mycroft #include <netinet/tcp_fsm.h>
    145        1.5   mycroft #include <netinet/tcp_seq.h>
    146        1.5   mycroft #include <netinet/tcp_timer.h>
    147        1.5   mycroft #include <netinet/tcp_var.h>
    148      1.142   thorpej #include <netinet/tcp_private.h>
    149      1.124    rpaulo #include <netinet/tcp_congctl.h>
    150        1.5   mycroft #include <netinet/tcpip.h>
    151        1.5   mycroft #include <netinet/tcp_debug.h>
    152      1.159    dyoung #include <netinet/tcp_vtw.h>
    153       1.26   thorpej 
    154       1.68     lukem #include "opt_tcp_space.h"
    155        1.1       cgd 
    156        1.1       cgd /*
    157        1.1       cgd  * TCP protocol interface to socket abstraction.
    158        1.1       cgd  */
    159        1.1       cgd 
    160        1.1       cgd /*
    161        1.1       cgd  * Process a TCP user request for TCP tb.  If this is a send request
    162        1.1       cgd  * then m is the mbuf chain of send data.  If this is a timer expiration
    163        1.1       cgd  * (called from the software clock routine), then timertype tells which timer.
    164        1.1       cgd  */
    165        1.6   mycroft int
    166  1.166.4.1     rmind tcp_usrreq(struct socket *so, int req, struct mbuf *m, struct mbuf *nam,
    167  1.166.4.1     rmind     struct mbuf *control, struct lwp *l)
    168       1.79   darrenr {
    169  1.166.4.1     rmind 	inpcb_t *inp;
    170       1.40    itojun #ifdef INET6
    171       1.49  augustss 	struct in6pcb *in6p;
    172       1.40    itojun #endif
    173       1.49  augustss 	struct tcpcb *tp = NULL;
    174        1.1       cgd 	int s;
    175        1.1       cgd 	int error = 0;
    176       1.74    simonb #ifdef TCP_DEBUG
    177       1.74    simonb 	int ostate = 0;
    178       1.74    simonb #endif
    179       1.40    itojun 	int family;	/* family of the socket */
    180       1.40    itojun 
    181       1.40    itojun 	family = so->so_proto->pr_domain->dom_family;
    182        1.1       cgd 
    183       1.40    itojun 	if (req == PRU_CONTROL) {
    184       1.40    itojun 		switch (family) {
    185       1.56    itojun #ifdef INET
    186       1.40    itojun 		case PF_INET:
    187      1.131  christos 			return (in_control(so, (long)m, (void *)nam,
    188      1.119        ad 			    (struct ifnet *)control, l));
    189       1.56    itojun #endif
    190       1.40    itojun #ifdef INET6
    191       1.40    itojun 		case PF_INET6:
    192      1.131  christos 			return (in6_control(so, (long)m, (void *)nam,
    193      1.119        ad 			    (struct ifnet *)control, l));
    194       1.40    itojun #endif
    195       1.40    itojun 		default:
    196       1.40    itojun 			return EAFNOSUPPORT;
    197       1.40    itojun 		}
    198       1.45   thorpej 	}
    199       1.45   thorpej 
    200      1.123       tls 	s = splsoftnet();
    201      1.123       tls 
    202       1.46   thorpej 	if (req == PRU_PURGEIF) {
    203      1.144        ad 		mutex_enter(softnet_lock);
    204       1.54     enami 		switch (family) {
    205       1.56    itojun #ifdef INET
    206       1.54     enami 		case PF_INET:
    207  1.166.4.1     rmind 			inpcb_purgeif0(tcbtable, (struct ifnet *)control);
    208       1.54     enami 			in_purgeif((struct ifnet *)control);
    209  1.166.4.1     rmind 			inpcb_purgeif(tcbtable, (struct ifnet *)control);
    210       1.55     enami 			break;
    211       1.56    itojun #endif
    212       1.46   thorpej #ifdef INET6
    213       1.54     enami 		case PF_INET6:
    214  1.166.4.1     rmind 			in6_pcbpurgeif0(tcbtable, (struct ifnet *)control);
    215       1.54     enami 			in6_purgeif((struct ifnet *)control);
    216  1.166.4.1     rmind 			in6_pcbpurgeif(tcbtable, (struct ifnet *)control);
    217       1.55     enami 			break;
    218       1.46   thorpej #endif
    219       1.54     enami 		default:
    220      1.144        ad 			mutex_exit(softnet_lock);
    221      1.123       tls 			splx(s);
    222       1.54     enami 			return (EAFNOSUPPORT);
    223       1.54     enami 		}
    224      1.144        ad 		mutex_exit(softnet_lock);
    225      1.123       tls 		splx(s);
    226       1.45   thorpej 		return (0);
    227       1.40    itojun 	}
    228       1.22   mycroft 
    229  1.166.4.1     rmind 	KASSERT(req == PRU_ATTACH || solocked(so));
    230  1.166.4.1     rmind 
    231      1.144        ad 	if (req == PRU_ATTACH)
    232      1.144        ad 		sosetlock(so);
    233      1.144        ad 
    234       1.40    itojun 	switch (family) {
    235       1.56    itojun #ifdef INET
    236       1.40    itojun 	case PF_INET:
    237       1.40    itojun 		inp = sotoinpcb(so);
    238       1.40    itojun #ifdef INET6
    239       1.40    itojun 		in6p = NULL;
    240       1.40    itojun #endif
    241       1.40    itojun 		break;
    242       1.56    itojun #endif
    243       1.40    itojun #ifdef INET6
    244       1.40    itojun 	case PF_INET6:
    245       1.40    itojun 		inp = NULL;
    246       1.40    itojun 		in6p = sotoin6pcb(so);
    247       1.40    itojun 		break;
    248       1.40    itojun #endif
    249       1.40    itojun 	default:
    250       1.40    itojun 		splx(s);
    251       1.40    itojun 		return EAFNOSUPPORT;
    252       1.40    itojun 	}
    253       1.40    itojun 
    254       1.23   mycroft #ifdef DIAGNOSTIC
    255       1.57    itojun #ifdef INET6
    256       1.56    itojun 	if (inp && in6p)
    257       1.56    itojun 		panic("tcp_usrreq: both inp and in6p set to non-NULL");
    258       1.57    itojun #endif
    259       1.23   mycroft 	if (req != PRU_SEND && req != PRU_SENDOOB && control)
    260       1.23   mycroft 		panic("tcp_usrreq: unexpected control mbuf");
    261       1.23   mycroft #endif
    262        1.1       cgd 	/*
    263        1.1       cgd 	 * When a TCP is attached to a socket, then there will be
    264        1.1       cgd 	 * a (struct inpcb) pointed at by the socket, and this
    265        1.1       cgd 	 * structure will point at a subsidary (struct tcpcb).
    266        1.1       cgd 	 */
    267      1.163  christos 	if ((inp == 0
    268      1.163  christos #ifdef INET6
    269      1.163  christos 	    && in6p == 0
    270       1.40    itojun #endif
    271      1.163  christos 	    ) && (req != PRU_ATTACH && req != PRU_SENSE))
    272       1.40    itojun 	{
    273       1.22   mycroft 		error = EINVAL;
    274       1.22   mycroft 		goto release;
    275        1.1       cgd 	}
    276       1.56    itojun #ifdef INET
    277        1.1       cgd 	if (inp) {
    278        1.1       cgd 		tp = intotcpcb(inp);
    279        1.1       cgd 		/* WHAT IF TP IS 0? */
    280        1.1       cgd #ifdef KPROF
    281        1.1       cgd 		tcp_acounts[tp->t_state][req]++;
    282        1.1       cgd #endif
    283       1.74    simonb #ifdef TCP_DEBUG
    284        1.1       cgd 		ostate = tp->t_state;
    285       1.74    simonb #endif
    286       1.40    itojun 	}
    287       1.56    itojun #endif
    288       1.40    itojun #ifdef INET6
    289       1.56    itojun 	if (in6p) {
    290       1.40    itojun 		tp = in6totcpcb(in6p);
    291       1.40    itojun 		/* WHAT IF TP IS 0? */
    292       1.40    itojun #ifdef KPROF
    293       1.40    itojun 		tcp_acounts[tp->t_state][req]++;
    294       1.40    itojun #endif
    295       1.74    simonb #ifdef TCP_DEBUG
    296       1.40    itojun 		ostate = tp->t_state;
    297       1.74    simonb #endif
    298       1.40    itojun 	}
    299       1.40    itojun #endif
    300       1.22   mycroft 
    301        1.1       cgd 	switch (req) {
    302        1.1       cgd 
    303        1.1       cgd 	/*
    304        1.1       cgd 	 * TCP attaches to socket via PRU_ATTACH, reserving space,
    305        1.1       cgd 	 * and an internet control block.
    306        1.1       cgd 	 */
    307        1.1       cgd 	case PRU_ATTACH:
    308       1.40    itojun #ifndef INET6
    309       1.40    itojun 		if (inp != 0)
    310       1.40    itojun #else
    311       1.40    itojun 		if (inp != 0 || in6p != 0)
    312       1.40    itojun #endif
    313       1.40    itojun 		{
    314        1.1       cgd 			error = EISCONN;
    315        1.1       cgd 			break;
    316        1.1       cgd 		}
    317        1.1       cgd 		error = tcp_attach(so);
    318        1.1       cgd 		if (error)
    319        1.1       cgd 			break;
    320        1.1       cgd 		if ((so->so_options & SO_LINGER) && so->so_linger == 0)
    321       1.32   thorpej 			so->so_linger = TCP_LINGERTIME;
    322        1.1       cgd 		tp = sototcpcb(so);
    323        1.1       cgd 		break;
    324        1.1       cgd 
    325        1.1       cgd 	/*
    326        1.1       cgd 	 * PRU_DETACH detaches the TCP protocol from the socket.
    327        1.1       cgd 	 */
    328        1.1       cgd 	case PRU_DETACH:
    329       1.24    kleink 		tp = tcp_disconnect(tp);
    330        1.1       cgd 		break;
    331        1.1       cgd 
    332        1.1       cgd 	/*
    333        1.1       cgd 	 * Give the socket an address.
    334        1.1       cgd 	 */
    335        1.1       cgd 	case PRU_BIND:
    336       1.40    itojun 		switch (family) {
    337       1.56    itojun #ifdef INET
    338       1.40    itojun 		case PF_INET:
    339  1.166.4.1     rmind 			error = inpcb_bind(inp, nam, l);
    340       1.40    itojun 			break;
    341       1.56    itojun #endif
    342       1.40    itojun #ifdef INET6
    343       1.40    itojun 		case PF_INET6:
    344      1.119        ad 			error = in6_pcbbind(in6p, nam, l);
    345       1.58    itojun 			if (!error) {
    346       1.58    itojun 				/* mapped addr case */
    347       1.58    itojun 				if (IN6_IS_ADDR_V4MAPPED(&in6p->in6p_laddr))
    348       1.58    itojun 					tp->t_family = AF_INET;
    349       1.58    itojun 				else
    350       1.58    itojun 					tp->t_family = AF_INET6;
    351       1.58    itojun 			}
    352       1.40    itojun 			break;
    353       1.40    itojun #endif
    354       1.40    itojun 		}
    355        1.1       cgd 		break;
    356        1.1       cgd 
    357        1.1       cgd 	/*
    358        1.1       cgd 	 * Prepare to accept connections.
    359        1.1       cgd 	 */
    360        1.1       cgd 	case PRU_LISTEN:
    361       1.56    itojun #ifdef INET
    362  1.166.4.1     rmind 		if (inp) {
    363  1.166.4.1     rmind 			in_port_t lport;
    364  1.166.4.1     rmind 
    365  1.166.4.1     rmind 			inpcb_get_ports(inp, &lport, NULL);
    366  1.166.4.1     rmind 			if (lport == 0) {
    367  1.166.4.1     rmind 				error = inpcb_bind(inp, NULL, l);
    368  1.166.4.1     rmind 				if (error)
    369  1.166.4.1     rmind 					break;
    370  1.166.4.1     rmind 			}
    371       1.22   mycroft 		}
    372       1.56    itojun #endif
    373       1.40    itojun #ifdef INET6
    374       1.56    itojun 		if (in6p && in6p->in6p_lport == 0) {
    375      1.154      elad 			error = in6_pcbbind(in6p, NULL, l);
    376       1.40    itojun 			if (error)
    377       1.40    itojun 				break;
    378       1.40    itojun 		}
    379       1.40    itojun #endif
    380       1.22   mycroft 		tp->t_state = TCPS_LISTEN;
    381        1.1       cgd 		break;
    382        1.1       cgd 
    383        1.1       cgd 	/*
    384        1.1       cgd 	 * Initiate connection to peer.
    385        1.1       cgd 	 * Create a template for use in transmissions on this connection.
    386        1.1       cgd 	 * Enter SYN_SENT state, and mark socket as connecting.
    387        1.1       cgd 	 * Start keep-alive timer, and seed output sequence space.
    388        1.1       cgd 	 * Send initial segment on connection.
    389        1.1       cgd 	 */
    390        1.1       cgd 	case PRU_CONNECT:
    391       1.56    itojun #ifdef INET
    392       1.40    itojun 		if (inp) {
    393  1.166.4.1     rmind 			in_port_t lport;
    394  1.166.4.1     rmind 
    395  1.166.4.1     rmind 			inpcb_get_ports(inp, &lport, NULL);
    396  1.166.4.1     rmind 			if (lport == 0) {
    397  1.166.4.1     rmind 				error = inpcb_bind(inp, NULL, l);
    398       1.40    itojun 				if (error)
    399       1.40    itojun 					break;
    400       1.40    itojun 			}
    401  1.166.4.1     rmind 			error = inpcb_connect(inp, nam, l);
    402       1.40    itojun 		}
    403       1.56    itojun #endif
    404       1.40    itojun #ifdef INET6
    405       1.56    itojun 		if (in6p) {
    406       1.40    itojun 			if (in6p->in6p_lport == 0) {
    407      1.154      elad 				error = in6_pcbbind(in6p, NULL, l);
    408       1.40    itojun 				if (error)
    409       1.40    itojun 					break;
    410       1.40    itojun 			}
    411      1.119        ad 			error = in6_pcbconnect(in6p, nam, l);
    412       1.58    itojun 			if (!error) {
    413       1.58    itojun 				/* mapped addr case */
    414       1.58    itojun 				if (IN6_IS_ADDR_V4MAPPED(&in6p->in6p_faddr))
    415       1.58    itojun 					tp->t_family = AF_INET;
    416       1.58    itojun 				else
    417       1.58    itojun 					tp->t_family = AF_INET6;
    418       1.58    itojun 			}
    419        1.1       cgd 		}
    420       1.40    itojun #endif
    421        1.1       cgd 		if (error)
    422        1.1       cgd 			break;
    423        1.1       cgd 		tp->t_template = tcp_template(tp);
    424        1.1       cgd 		if (tp->t_template == 0) {
    425       1.56    itojun #ifdef INET
    426       1.40    itojun 			if (inp)
    427  1.166.4.1     rmind 				inpcb_disconnect(inp);
    428       1.56    itojun #endif
    429       1.40    itojun #ifdef INET6
    430       1.56    itojun 			if (in6p)
    431       1.40    itojun 				in6_pcbdisconnect(in6p);
    432       1.40    itojun #endif
    433        1.1       cgd 			error = ENOBUFS;
    434        1.1       cgd 			break;
    435        1.1       cgd 		}
    436      1.136     rmind 		/*
    437      1.138     rmind 		 * Compute window scaling to request.
    438      1.138     rmind 		 * XXX: This should be moved to tcp_output().
    439      1.136     rmind 		 */
    440        1.9   mycroft 		while (tp->request_r_scale < TCP_MAX_WINSHIFT &&
    441      1.138     rmind 		    (TCP_MAXWIN << tp->request_r_scale) < sb_max)
    442        1.9   mycroft 			tp->request_r_scale++;
    443        1.1       cgd 		soisconnecting(so);
    444      1.142   thorpej 		TCP_STATINC(TCP_STAT_CONNATTEMPT);
    445        1.1       cgd 		tp->t_state = TCPS_SYN_SENT;
    446      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepinit);
    447       1.61   thorpej 		tp->iss = tcp_new_iss(tp, 0);
    448        1.1       cgd 		tcp_sendseqinit(tp);
    449        1.1       cgd 		error = tcp_output(tp);
    450        1.1       cgd 		break;
    451        1.1       cgd 
    452        1.1       cgd 	/*
    453        1.1       cgd 	 * Create a TCP connection between two sockets.
    454        1.1       cgd 	 */
    455        1.1       cgd 	case PRU_CONNECT2:
    456        1.1       cgd 		error = EOPNOTSUPP;
    457        1.1       cgd 		break;
    458        1.1       cgd 
    459        1.1       cgd 	/*
    460        1.1       cgd 	 * Initiate disconnect from peer.
    461        1.1       cgd 	 * If connection never passed embryonic stage, just drop;
    462        1.1       cgd 	 * else if don't need to let data drain, then can just drop anyways,
    463        1.1       cgd 	 * else have to begin TCP shutdown process: mark socket disconnecting,
    464        1.1       cgd 	 * drain unread data, state switch to reflect user close, and
    465        1.1       cgd 	 * send segment (e.g. FIN) to peer.  Socket will be really disconnected
    466        1.1       cgd 	 * when peer sends FIN and acks ours.
    467        1.1       cgd 	 *
    468        1.1       cgd 	 * SHOULD IMPLEMENT LATER PRU_CONNECT VIA REALLOC TCPCB.
    469        1.1       cgd 	 */
    470        1.1       cgd 	case PRU_DISCONNECT:
    471        1.1       cgd 		tp = tcp_disconnect(tp);
    472        1.1       cgd 		break;
    473        1.1       cgd 
    474        1.1       cgd 	/*
    475        1.1       cgd 	 * Accept a connection.  Essentially all the work is
    476        1.1       cgd 	 * done at higher levels; just return the address
    477        1.1       cgd 	 * of the peer, storing through addr.
    478        1.1       cgd 	 */
    479        1.8   mycroft 	case PRU_ACCEPT:
    480       1.56    itojun #ifdef INET
    481       1.40    itojun 		if (inp)
    482  1.166.4.1     rmind 			inpcb_fetch_peeraddr(inp, nam);
    483       1.56    itojun #endif
    484       1.40    itojun #ifdef INET6
    485       1.56    itojun 		if (in6p)
    486       1.40    itojun 			in6_setpeeraddr(in6p, nam);
    487       1.40    itojun #endif
    488        1.1       cgd 		break;
    489        1.1       cgd 
    490        1.1       cgd 	/*
    491        1.1       cgd 	 * Mark the connection as being incapable of further output.
    492        1.1       cgd 	 */
    493        1.1       cgd 	case PRU_SHUTDOWN:
    494        1.1       cgd 		socantsendmore(so);
    495        1.1       cgd 		tp = tcp_usrclosed(tp);
    496        1.1       cgd 		if (tp)
    497        1.1       cgd 			error = tcp_output(tp);
    498        1.1       cgd 		break;
    499        1.1       cgd 
    500        1.1       cgd 	/*
    501        1.1       cgd 	 * After a receive, possibly send window update to peer.
    502        1.1       cgd 	 */
    503        1.1       cgd 	case PRU_RCVD:
    504       1.60    itojun 		/*
    505       1.60    itojun 		 * soreceive() calls this function when a user receives
    506       1.60    itojun 		 * ancillary data on a listening socket. We don't call
    507       1.60    itojun 		 * tcp_output in such a case, since there is no header
    508       1.60    itojun 		 * template for a listening socket and hence the kernel
    509       1.60    itojun 		 * will panic.
    510       1.60    itojun 		 */
    511       1.60    itojun 		if ((so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) != 0)
    512       1.60    itojun 			(void) tcp_output(tp);
    513        1.1       cgd 		break;
    514        1.1       cgd 
    515        1.1       cgd 	/*
    516        1.1       cgd 	 * Do a send by putting data in output queue and updating urgent
    517        1.1       cgd 	 * marker if URG set.  Possibly send more data.
    518        1.1       cgd 	 */
    519        1.1       cgd 	case PRU_SEND:
    520       1.23   mycroft 		if (control && control->m_len) {
    521       1.23   mycroft 			m_freem(control);
    522       1.23   mycroft 			m_freem(m);
    523       1.23   mycroft 			error = EINVAL;
    524       1.23   mycroft 			break;
    525       1.23   mycroft 		}
    526       1.73   thorpej 		sbappendstream(&so->so_snd, m);
    527        1.1       cgd 		error = tcp_output(tp);
    528        1.1       cgd 		break;
    529        1.1       cgd 
    530        1.1       cgd 	/*
    531        1.1       cgd 	 * Abort the TCP.
    532        1.1       cgd 	 */
    533        1.1       cgd 	case PRU_ABORT:
    534        1.1       cgd 		tp = tcp_drop(tp, ECONNABORTED);
    535        1.1       cgd 		break;
    536        1.1       cgd 
    537        1.1       cgd 	case PRU_SENSE:
    538       1.22   mycroft 		/*
    539       1.22   mycroft 		 * stat: don't bother with a blocksize.
    540       1.22   mycroft 		 */
    541       1.22   mycroft 		splx(s);
    542        1.1       cgd 		return (0);
    543        1.1       cgd 
    544        1.1       cgd 	case PRU_RCVOOB:
    545       1.23   mycroft 		if (control && control->m_len) {
    546       1.23   mycroft 			m_freem(control);
    547       1.23   mycroft 			m_freem(m);
    548       1.23   mycroft 			error = EINVAL;
    549       1.23   mycroft 			break;
    550       1.23   mycroft 		}
    551        1.1       cgd 		if ((so->so_oobmark == 0 &&
    552        1.1       cgd 		    (so->so_state & SS_RCVATMARK) == 0) ||
    553        1.1       cgd 		    so->so_options & SO_OOBINLINE ||
    554        1.1       cgd 		    tp->t_oobflags & TCPOOB_HADDATA) {
    555        1.1       cgd 			error = EINVAL;
    556        1.1       cgd 			break;
    557        1.1       cgd 		}
    558        1.1       cgd 		if ((tp->t_oobflags & TCPOOB_HAVEDATA) == 0) {
    559        1.1       cgd 			error = EWOULDBLOCK;
    560        1.1       cgd 			break;
    561        1.1       cgd 		}
    562        1.1       cgd 		m->m_len = 1;
    563      1.131  christos 		*mtod(m, char *) = tp->t_iobc;
    564       1.14       cgd 		if (((long)nam & MSG_PEEK) == 0)
    565        1.1       cgd 			tp->t_oobflags ^= (TCPOOB_HAVEDATA | TCPOOB_HADDATA);
    566        1.1       cgd 		break;
    567        1.1       cgd 
    568        1.1       cgd 	case PRU_SENDOOB:
    569        1.1       cgd 		if (sbspace(&so->so_snd) < -512) {
    570        1.1       cgd 			m_freem(m);
    571        1.1       cgd 			error = ENOBUFS;
    572        1.1       cgd 			break;
    573        1.1       cgd 		}
    574        1.1       cgd 		/*
    575        1.1       cgd 		 * According to RFC961 (Assigned Protocols),
    576        1.1       cgd 		 * the urgent pointer points to the last octet
    577        1.1       cgd 		 * of urgent data.  We continue, however,
    578        1.1       cgd 		 * to consider it to indicate the first octet
    579        1.1       cgd 		 * of data past the urgent section.
    580        1.1       cgd 		 * Otherwise, snd_up should be one lower.
    581        1.1       cgd 		 */
    582       1.73   thorpej 		sbappendstream(&so->so_snd, m);
    583        1.1       cgd 		tp->snd_up = tp->snd_una + so->so_snd.sb_cc;
    584        1.1       cgd 		tp->t_force = 1;
    585        1.1       cgd 		error = tcp_output(tp);
    586        1.1       cgd 		tp->t_force = 0;
    587        1.1       cgd 		break;
    588        1.1       cgd 
    589        1.1       cgd 	case PRU_SOCKADDR:
    590       1.56    itojun #ifdef INET
    591       1.40    itojun 		if (inp)
    592  1.166.4.1     rmind 			inpcb_fetch_sockaddr(inp, nam);
    593       1.56    itojun #endif
    594       1.40    itojun #ifdef INET6
    595       1.56    itojun 		if (in6p)
    596       1.40    itojun 			in6_setsockaddr(in6p, nam);
    597       1.40    itojun #endif
    598        1.1       cgd 		break;
    599        1.1       cgd 
    600        1.1       cgd 	case PRU_PEERADDR:
    601       1.56    itojun #ifdef INET
    602       1.40    itojun 		if (inp)
    603  1.166.4.1     rmind 			inpcb_fetch_peeraddr(inp, nam);
    604       1.56    itojun #endif
    605       1.40    itojun #ifdef INET6
    606       1.56    itojun 		if (in6p)
    607       1.40    itojun 			in6_setpeeraddr(in6p, nam);
    608       1.40    itojun #endif
    609        1.1       cgd 		break;
    610        1.1       cgd 
    611        1.1       cgd 	default:
    612        1.1       cgd 		panic("tcp_usrreq");
    613        1.1       cgd 	}
    614       1.63       abs #ifdef TCP_DEBUG
    615        1.1       cgd 	if (tp && (so->so_options & SO_DEBUG))
    616       1.40    itojun 		tcp_trace(TA_USER, ostate, tp, NULL, req);
    617       1.63       abs #endif
    618       1.22   mycroft 
    619       1.22   mycroft release:
    620        1.1       cgd 	splx(s);
    621        1.1       cgd 	return (error);
    622        1.1       cgd }
    623        1.1       cgd 
    624      1.132  christos static void
    625      1.132  christos change_keepalive(struct socket *so, struct tcpcb *tp)
    626      1.132  christos {
    627      1.132  christos 	tp->t_maxidle = tp->t_keepcnt * tp->t_keepintvl;
    628      1.132  christos 	TCP_TIMER_DISARM(tp, TCPT_KEEP);
    629      1.132  christos 	TCP_TIMER_DISARM(tp, TCPT_2MSL);
    630      1.132  christos 
    631      1.132  christos 	if (tp->t_state == TCPS_SYN_RECEIVED ||
    632      1.132  christos 	    tp->t_state == TCPS_SYN_SENT) {
    633      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepinit);
    634      1.132  christos 	} else if (so->so_options & SO_KEEPALIVE &&
    635      1.132  christos 	    tp->t_state <= TCPS_CLOSE_WAIT) {
    636      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepintvl);
    637      1.132  christos 	} else {
    638      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_KEEP, tp->t_keepidle);
    639      1.132  christos 	}
    640      1.132  christos 
    641      1.132  christos 	if ((tp->t_state == TCPS_FIN_WAIT_2) && (tp->t_maxidle > 0))
    642      1.132  christos 		TCP_TIMER_ARM(tp, TCPT_2MSL, tp->t_maxidle);
    643      1.132  christos }
    644      1.132  christos 
    645      1.132  christos 
    646        1.6   mycroft int
    647      1.147    plunky tcp_ctloutput(int op, struct socket *so, struct sockopt *sopt)
    648        1.1       cgd {
    649        1.9   mycroft 	int error = 0, s;
    650  1.166.4.1     rmind 	inpcb_t *inp;
    651       1.40    itojun #ifdef INET6
    652       1.49  augustss 	struct in6pcb *in6p;
    653       1.40    itojun #endif
    654       1.49  augustss 	struct tcpcb *tp;
    655      1.132  christos 	u_int ui;
    656       1.40    itojun 	int family;	/* family of the socket */
    657      1.147    plunky 	int level, optname, optval;
    658      1.147    plunky 
    659      1.147    plunky 	level = sopt->sopt_level;
    660      1.147    plunky 	optname = sopt->sopt_name;
    661       1.40    itojun 
    662       1.40    itojun 	family = so->so_proto->pr_domain->dom_family;
    663        1.1       cgd 
    664       1.16   mycroft 	s = splsoftnet();
    665       1.40    itojun 	switch (family) {
    666       1.56    itojun #ifdef INET
    667       1.40    itojun 	case PF_INET:
    668       1.40    itojun 		inp = sotoinpcb(so);
    669       1.40    itojun #ifdef INET6
    670       1.40    itojun 		in6p = NULL;
    671       1.40    itojun #endif
    672       1.40    itojun 		break;
    673       1.56    itojun #endif
    674       1.40    itojun #ifdef INET6
    675       1.40    itojun 	case PF_INET6:
    676       1.40    itojun 		inp = NULL;
    677       1.40    itojun 		in6p = sotoin6pcb(so);
    678       1.40    itojun 		break;
    679       1.40    itojun #endif
    680       1.40    itojun 	default:
    681       1.40    itojun 		splx(s);
    682      1.129      yamt 		panic("%s: af %d", __func__, family);
    683       1.40    itojun 	}
    684       1.40    itojun #ifndef INET6
    685       1.40    itojun 	if (inp == NULL)
    686       1.40    itojun #else
    687       1.40    itojun 	if (inp == NULL && in6p == NULL)
    688       1.40    itojun #endif
    689       1.40    itojun 	{
    690        1.9   mycroft 		splx(s);
    691        1.9   mycroft 		return (ECONNRESET);
    692        1.9   mycroft 	}
    693        1.9   mycroft 	if (level != IPPROTO_TCP) {
    694       1.40    itojun 		switch (family) {
    695       1.56    itojun #ifdef INET
    696       1.40    itojun 		case PF_INET:
    697      1.147    plunky 			error = ip_ctloutput(op, so, sopt);
    698       1.40    itojun 			break;
    699       1.56    itojun #endif
    700       1.40    itojun #ifdef INET6
    701       1.40    itojun 		case PF_INET6:
    702      1.147    plunky 			error = ip6_ctloutput(op, so, sopt);
    703       1.40    itojun 			break;
    704       1.40    itojun #endif
    705       1.40    itojun 		}
    706        1.9   mycroft 		splx(s);
    707        1.9   mycroft 		return (error);
    708        1.9   mycroft 	}
    709       1.40    itojun 	if (inp)
    710       1.40    itojun 		tp = intotcpcb(inp);
    711       1.40    itojun #ifdef INET6
    712       1.40    itojun 	else if (in6p)
    713       1.40    itojun 		tp = in6totcpcb(in6p);
    714       1.40    itojun #endif
    715       1.40    itojun 	else
    716       1.40    itojun 		tp = NULL;
    717        1.1       cgd 
    718        1.1       cgd 	switch (op) {
    719        1.1       cgd 	case PRCO_SETOPT:
    720        1.1       cgd 		switch (optname) {
    721       1.90  jonathan #ifdef TCP_SIGNATURE
    722       1.90  jonathan 		case TCP_MD5SIG:
    723      1.147    plunky 			error = sockopt_getint(sopt, &optval);
    724       1.90  jonathan 			if (error)
    725       1.90  jonathan 				break;
    726      1.147    plunky 			if (optval > 0)
    727       1.90  jonathan 				tp->t_flags |= TF_SIGNATURE;
    728       1.91    itojun 			else
    729       1.90  jonathan 				tp->t_flags &= ~TF_SIGNATURE;
    730       1.90  jonathan 			break;
    731       1.90  jonathan #endif /* TCP_SIGNATURE */
    732       1.90  jonathan 
    733        1.1       cgd 		case TCP_NODELAY:
    734      1.147    plunky 			error = sockopt_getint(sopt, &optval);
    735      1.147    plunky 			if (error)
    736      1.147    plunky 				break;
    737      1.147    plunky 			if (optval)
    738        1.1       cgd 				tp->t_flags |= TF_NODELAY;
    739        1.1       cgd 			else
    740        1.1       cgd 				tp->t_flags &= ~TF_NODELAY;
    741        1.1       cgd 			break;
    742        1.1       cgd 
    743        1.9   mycroft 		case TCP_MAXSEG:
    744      1.147    plunky 			error = sockopt_getint(sopt, &optval);
    745      1.147    plunky 			if (error)
    746      1.147    plunky 				break;
    747      1.147    plunky 			if (optval > 0 && optval <= tp->t_peermss)
    748      1.147    plunky 				tp->t_peermss = optval; /* limit on send size */
    749        1.9   mycroft 			else
    750        1.9   mycroft 				error = EINVAL;
    751        1.9   mycroft 			break;
    752      1.124    rpaulo #ifdef notyet
    753      1.124    rpaulo 		case TCP_CONGCTL:
    754      1.147    plunky 			/* XXX string overflow XXX */
    755      1.147    plunky 			error = tcp_congctl_select(tp, sopt->sopt_data);
    756      1.147    plunky 			break;
    757      1.124    rpaulo #endif
    758        1.9   mycroft 
    759      1.132  christos 		case TCP_KEEPIDLE:
    760      1.147    plunky 			error = sockopt_get(sopt, &ui, sizeof(ui));
    761      1.147    plunky 			if (error)
    762      1.147    plunky 				break;
    763      1.147    plunky 			if (ui > 0) {
    764      1.132  christos 				tp->t_keepidle = ui;
    765      1.132  christos 				change_keepalive(so, tp);
    766      1.132  christos 			} else
    767      1.132  christos 				error = EINVAL;
    768      1.132  christos 			break;
    769      1.132  christos 
    770      1.132  christos 		case TCP_KEEPINTVL:
    771      1.147    plunky 			error = sockopt_get(sopt, &ui, sizeof(ui));
    772      1.147    plunky 			if (error)
    773      1.147    plunky 				break;
    774      1.147    plunky 			if (ui > 0) {
    775      1.132  christos 				tp->t_keepintvl = ui;
    776      1.132  christos 				change_keepalive(so, tp);
    777      1.132  christos 			} else
    778      1.132  christos 				error = EINVAL;
    779      1.132  christos 			break;
    780      1.132  christos 
    781      1.132  christos 		case TCP_KEEPCNT:
    782      1.147    plunky 			error = sockopt_get(sopt, &ui, sizeof(ui));
    783      1.147    plunky 			if (error)
    784      1.147    plunky 				break;
    785      1.147    plunky 			if (ui > 0) {
    786      1.132  christos 				tp->t_keepcnt = ui;
    787      1.132  christos 				change_keepalive(so, tp);
    788      1.132  christos 			} else
    789      1.132  christos 				error = EINVAL;
    790      1.132  christos 			break;
    791      1.132  christos 
    792      1.132  christos 		case TCP_KEEPINIT:
    793      1.147    plunky 			error = sockopt_get(sopt, &ui, sizeof(ui));
    794      1.147    plunky 			if (error)
    795      1.147    plunky 				break;
    796      1.147    plunky 			if (ui > 0) {
    797      1.132  christos 				tp->t_keepinit = ui;
    798      1.132  christos 				change_keepalive(so, tp);
    799      1.132  christos 			} else
    800      1.132  christos 				error = EINVAL;
    801      1.132  christos 			break;
    802      1.132  christos 
    803        1.1       cgd 		default:
    804        1.9   mycroft 			error = ENOPROTOOPT;
    805        1.1       cgd 			break;
    806        1.1       cgd 		}
    807        1.1       cgd 		break;
    808        1.1       cgd 
    809        1.1       cgd 	case PRCO_GETOPT:
    810        1.1       cgd 		switch (optname) {
    811       1.90  jonathan #ifdef TCP_SIGNATURE
    812       1.90  jonathan 		case TCP_MD5SIG:
    813      1.147    plunky 			optval = (tp->t_flags & TF_SIGNATURE) ? 1 : 0;
    814      1.147    plunky 			error = sockopt_set(sopt, &optval, sizeof(optval));
    815       1.90  jonathan 			break;
    816       1.90  jonathan #endif
    817        1.1       cgd 		case TCP_NODELAY:
    818      1.147    plunky 			optval = tp->t_flags & TF_NODELAY;
    819      1.147    plunky 			error = sockopt_set(sopt, &optval, sizeof(optval));
    820        1.1       cgd 			break;
    821        1.1       cgd 		case TCP_MAXSEG:
    822      1.147    plunky 			optval = tp->t_peermss;
    823      1.147    plunky 			error = sockopt_set(sopt, &optval, sizeof(optval));
    824        1.1       cgd 			break;
    825      1.124    rpaulo #ifdef notyet
    826      1.124    rpaulo 		case TCP_CONGCTL:
    827      1.124    rpaulo 			break;
    828      1.124    rpaulo #endif
    829        1.1       cgd 		default:
    830        1.9   mycroft 			error = ENOPROTOOPT;
    831        1.1       cgd 			break;
    832        1.1       cgd 		}
    833        1.1       cgd 		break;
    834        1.1       cgd 	}
    835        1.9   mycroft 	splx(s);
    836        1.1       cgd 	return (error);
    837        1.1       cgd }
    838        1.1       cgd 
    839       1.11   mycroft #ifndef TCP_SENDSPACE
    840       1.84       tls #define	TCP_SENDSPACE	1024*32
    841       1.11   mycroft #endif
    842       1.25   thorpej int	tcp_sendspace = TCP_SENDSPACE;
    843       1.11   mycroft #ifndef TCP_RECVSPACE
    844       1.84       tls #define	TCP_RECVSPACE	1024*32
    845       1.11   mycroft #endif
    846       1.25   thorpej int	tcp_recvspace = TCP_RECVSPACE;
    847        1.1       cgd 
    848        1.1       cgd /*
    849        1.1       cgd  * Attach TCP protocol to socket, allocating
    850        1.1       cgd  * internet protocol control block, tcp control block,
    851        1.1       cgd  * bufer space, and entering LISTEN state if to accept connections.
    852        1.1       cgd  */
    853        1.6   mycroft int
    854       1.94     perry tcp_attach(struct socket *so)
    855        1.1       cgd {
    856       1.49  augustss 	struct tcpcb *tp;
    857  1.166.4.1     rmind 	inpcb_t *inp;
    858       1.40    itojun #ifdef INET6
    859       1.40    itojun 	struct in6pcb *in6p;
    860       1.40    itojun #endif
    861        1.1       cgd 	int error;
    862       1.40    itojun 	int family;	/* family of the socket */
    863       1.40    itojun 
    864       1.40    itojun 	family = so->so_proto->pr_domain->dom_family;
    865        1.1       cgd 
    866       1.75      matt #ifdef MBUFTRACE
    867      1.130      yamt 	so->so_mowner = &tcp_sock_mowner;
    868      1.130      yamt 	so->so_rcv.sb_mowner = &tcp_sock_rx_mowner;
    869      1.130      yamt 	so->so_snd.sb_mowner = &tcp_sock_tx_mowner;
    870       1.75      matt #endif
    871        1.1       cgd 	if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
    872        1.1       cgd 		error = soreserve(so, tcp_sendspace, tcp_recvspace);
    873        1.1       cgd 		if (error)
    874        1.1       cgd 			return (error);
    875        1.1       cgd 	}
    876      1.136     rmind 
    877      1.136     rmind 	so->so_rcv.sb_flags |= SB_AUTOSIZE;
    878      1.136     rmind 	so->so_snd.sb_flags |= SB_AUTOSIZE;
    879      1.136     rmind 
    880       1.40    itojun 	switch (family) {
    881       1.56    itojun #ifdef INET
    882       1.40    itojun 	case PF_INET:
    883  1.166.4.1     rmind 		error = inpcb_create(so, tcbtable);
    884       1.40    itojun 		if (error)
    885       1.40    itojun 			return (error);
    886       1.40    itojun 		inp = sotoinpcb(so);
    887       1.40    itojun #ifdef INET6
    888       1.40    itojun 		in6p = NULL;
    889       1.40    itojun #endif
    890       1.40    itojun 		break;
    891       1.56    itojun #endif
    892       1.40    itojun #ifdef INET6
    893       1.40    itojun 	case PF_INET6:
    894  1.166.4.1     rmind 		error = in6_pcballoc(so, tcbtable);
    895       1.40    itojun 		if (error)
    896       1.40    itojun 			return (error);
    897       1.40    itojun 		inp = NULL;
    898       1.40    itojun 		in6p = sotoin6pcb(so);
    899       1.40    itojun 		break;
    900       1.40    itojun #endif
    901       1.40    itojun 	default:
    902       1.40    itojun 		return EAFNOSUPPORT;
    903       1.40    itojun 	}
    904       1.40    itojun 	if (inp)
    905       1.40    itojun 		tp = tcp_newtcpcb(family, (void *)inp);
    906       1.40    itojun #ifdef INET6
    907       1.40    itojun 	else if (in6p)
    908       1.40    itojun 		tp = tcp_newtcpcb(family, (void *)in6p);
    909       1.40    itojun #endif
    910       1.41    itojun 	else
    911       1.41    itojun 		tp = NULL;
    912       1.40    itojun 
    913  1.166.4.1     rmind 	if (tp == NULL) {
    914        1.1       cgd 		int nofd = so->so_state & SS_NOFDREF;	/* XXX */
    915        1.1       cgd 
    916        1.1       cgd 		so->so_state &= ~SS_NOFDREF;	/* don't free the socket yet */
    917       1.56    itojun #ifdef INET
    918       1.40    itojun 		if (inp)
    919  1.166.4.1     rmind 			inpcb_destroy(inp);
    920       1.56    itojun #endif
    921       1.40    itojun #ifdef INET6
    922       1.56    itojun 		if (in6p)
    923       1.40    itojun 			in6_pcbdetach(in6p);
    924       1.40    itojun #endif
    925        1.1       cgd 		so->so_state |= nofd;
    926        1.1       cgd 		return (ENOBUFS);
    927        1.1       cgd 	}
    928        1.1       cgd 	tp->t_state = TCPS_CLOSED;
    929        1.1       cgd 	return (0);
    930        1.1       cgd }
    931        1.1       cgd 
    932        1.1       cgd /*
    933        1.1       cgd  * Initiate (or continue) disconnect.
    934        1.1       cgd  * If embryonic state, just send reset (once).
    935        1.1       cgd  * If in ``let data drain'' option and linger null, just drop.
    936        1.1       cgd  * Otherwise (hard), mark socket disconnecting and drop
    937        1.1       cgd  * current input data; switch states based on user close, and
    938        1.1       cgd  * send segment to peer (with FIN).
    939        1.1       cgd  */
    940        1.1       cgd struct tcpcb *
    941       1.94     perry tcp_disconnect(struct tcpcb *tp)
    942        1.1       cgd {
    943       1.40    itojun 	struct socket *so;
    944       1.40    itojun 
    945       1.40    itojun 	if (tp->t_inpcb)
    946  1.166.4.1     rmind 		so = inpcb_get_socket(tp->t_inpcb);
    947       1.40    itojun #ifdef INET6
    948       1.40    itojun 	else if (tp->t_in6pcb)
    949       1.40    itojun 		so = tp->t_in6pcb->in6p_socket;
    950       1.40    itojun #endif
    951       1.40    itojun 	else
    952       1.40    itojun 		so = NULL;
    953        1.1       cgd 
    954  1.166.4.1     rmind 	KASSERT(so != NULL);
    955  1.166.4.1     rmind 
    956       1.12   mycroft 	if (TCPS_HAVEESTABLISHED(tp->t_state) == 0)
    957        1.1       cgd 		tp = tcp_close(tp);
    958        1.1       cgd 	else if ((so->so_options & SO_LINGER) && so->so_linger == 0)
    959        1.1       cgd 		tp = tcp_drop(tp, 0);
    960        1.1       cgd 	else {
    961        1.1       cgd 		soisdisconnecting(so);
    962        1.1       cgd 		sbflush(&so->so_rcv);
    963        1.1       cgd 		tp = tcp_usrclosed(tp);
    964        1.1       cgd 		if (tp)
    965        1.1       cgd 			(void) tcp_output(tp);
    966        1.1       cgd 	}
    967        1.1       cgd 	return (tp);
    968        1.1       cgd }
    969        1.1       cgd 
    970        1.1       cgd /*
    971        1.1       cgd  * User issued close, and wish to trail through shutdown states:
    972        1.1       cgd  * if never received SYN, just forget it.  If got a SYN from peer,
    973        1.1       cgd  * but haven't sent FIN, then go to FIN_WAIT_1 state to send peer a FIN.
    974        1.1       cgd  * If already got a FIN from peer, then almost done; go to LAST_ACK
    975        1.1       cgd  * state.  In all other cases, have already sent FIN to peer (e.g.
    976        1.1       cgd  * after PRU_SHUTDOWN), and just have to play tedious game waiting
    977        1.1       cgd  * for peer to send FIN or not respond to keep-alives, etc.
    978        1.1       cgd  * We can let the user exit from the close as soon as the FIN is acked.
    979        1.1       cgd  */
    980        1.1       cgd struct tcpcb *
    981       1.94     perry tcp_usrclosed(struct tcpcb *tp)
    982        1.1       cgd {
    983        1.1       cgd 
    984        1.1       cgd 	switch (tp->t_state) {
    985        1.1       cgd 
    986        1.1       cgd 	case TCPS_CLOSED:
    987        1.1       cgd 	case TCPS_LISTEN:
    988        1.1       cgd 	case TCPS_SYN_SENT:
    989        1.1       cgd 		tp->t_state = TCPS_CLOSED;
    990        1.1       cgd 		tp = tcp_close(tp);
    991        1.1       cgd 		break;
    992        1.1       cgd 
    993        1.1       cgd 	case TCPS_SYN_RECEIVED:
    994        1.1       cgd 	case TCPS_ESTABLISHED:
    995        1.1       cgd 		tp->t_state = TCPS_FIN_WAIT_1;
    996        1.1       cgd 		break;
    997        1.1       cgd 
    998        1.1       cgd 	case TCPS_CLOSE_WAIT:
    999        1.1       cgd 		tp->t_state = TCPS_LAST_ACK;
   1000        1.1       cgd 		break;
   1001        1.1       cgd 	}
   1002       1.18   mycroft 	if (tp && tp->t_state >= TCPS_FIN_WAIT_2) {
   1003       1.40    itojun 		struct socket *so;
   1004       1.40    itojun 		if (tp->t_inpcb)
   1005  1.166.4.1     rmind 			so = inpcb_get_socket(tp->t_inpcb);
   1006       1.40    itojun #ifdef INET6
   1007       1.40    itojun 		else if (tp->t_in6pcb)
   1008       1.40    itojun 			so = tp->t_in6pcb->in6p_socket;
   1009       1.40    itojun #endif
   1010       1.40    itojun 		else
   1011       1.40    itojun 			so = NULL;
   1012      1.115  christos 		if (so)
   1013      1.115  christos 			soisdisconnected(so);
   1014       1.19   mycroft 		/*
   1015       1.19   mycroft 		 * If we are in FIN_WAIT_2, we arrived here because the
   1016       1.19   mycroft 		 * application did a shutdown of the send side.  Like the
   1017       1.19   mycroft 		 * case of a transition from FIN_WAIT_1 to FIN_WAIT_2 after
   1018       1.19   mycroft 		 * a full close, we start a timer to make sure sockets are
   1019       1.19   mycroft 		 * not left in FIN_WAIT_2 forever.
   1020       1.19   mycroft 		 */
   1021      1.132  christos 		if ((tp->t_state == TCPS_FIN_WAIT_2) && (tp->t_maxidle > 0))
   1022      1.132  christos 			TCP_TIMER_ARM(tp, TCPT_2MSL, tp->t_maxidle);
   1023      1.159    dyoung 		else if (tp->t_state == TCPS_TIME_WAIT
   1024      1.159    dyoung 			 && ((tp->t_inpcb
   1025      1.159    dyoung 			      && (tcp4_vtw_enable & 1)
   1026      1.159    dyoung 			      && vtw_add(AF_INET, tp))
   1027      1.159    dyoung 			     ||
   1028      1.159    dyoung 			     (tp->t_in6pcb
   1029      1.159    dyoung 			      && (tcp6_vtw_enable & 1)
   1030      1.159    dyoung 			      && vtw_add(AF_INET6, tp)))) {
   1031      1.159    dyoung 			tp = 0;
   1032      1.159    dyoung 		}
   1033       1.18   mycroft 	}
   1034        1.1       cgd 	return (tp);
   1035       1.17   thorpej }
   1036       1.17   thorpej 
   1037       1.86    atatat /*
   1038       1.86    atatat  * sysctl helper routine for net.inet.ip.mssdflt.  it can't be less
   1039       1.86    atatat  * than 32.
   1040       1.86    atatat  */
   1041       1.86    atatat static int
   1042       1.86    atatat sysctl_net_inet_tcp_mssdflt(SYSCTLFN_ARGS)
   1043       1.86    atatat {
   1044       1.86    atatat 	int error, mssdflt;
   1045       1.86    atatat 	struct sysctlnode node;
   1046       1.86    atatat 
   1047       1.86    atatat 	mssdflt = tcp_mssdflt;
   1048       1.86    atatat 	node = *rnode;
   1049       1.86    atatat 	node.sysctl_data = &mssdflt;
   1050       1.86    atatat 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1051       1.86    atatat 	if (error || newp == NULL)
   1052       1.86    atatat 		return (error);
   1053       1.86    atatat 
   1054       1.86    atatat 	if (mssdflt < 32)
   1055       1.86    atatat 		return (EINVAL);
   1056       1.86    atatat 	tcp_mssdflt = mssdflt;
   1057       1.86    atatat 
   1058       1.86    atatat 	return (0);
   1059       1.86    atatat }
   1060       1.36      matt 
   1061       1.17   thorpej /*
   1062       1.86    atatat  * sysctl helper routine for setting port related values under
   1063       1.86    atatat  * net.inet.ip and net.inet6.ip6.  does basic range checking and does
   1064       1.86    atatat  * additional checks for each type.  this code has placed in
   1065       1.86    atatat  * tcp_input.c since INET and INET6 both use the same tcp code.
   1066       1.86    atatat  *
   1067       1.86    atatat  * this helper is not static so that both inet and inet6 can use it.
   1068       1.17   thorpej  */
   1069       1.17   thorpej int
   1070       1.86    atatat sysctl_net_inet_ip_ports(SYSCTLFN_ARGS)
   1071       1.86    atatat {
   1072       1.86    atatat 	int error, tmp;
   1073       1.86    atatat 	int apmin, apmax;
   1074       1.86    atatat #ifndef IPNOPRIVPORTS
   1075       1.86    atatat 	int lpmin, lpmax;
   1076       1.86    atatat #endif /* IPNOPRIVPORTS */
   1077       1.86    atatat 	struct sysctlnode node;
   1078       1.86    atatat 
   1079       1.86    atatat 	if (namelen != 0)
   1080       1.86    atatat 		return (EINVAL);
   1081       1.86    atatat 
   1082       1.86    atatat 	switch (name[-3]) {
   1083       1.86    atatat #ifdef INET
   1084       1.86    atatat 	    case PF_INET:
   1085       1.86    atatat 		apmin = anonportmin;
   1086       1.86    atatat 		apmax = anonportmax;
   1087       1.86    atatat #ifndef IPNOPRIVPORTS
   1088       1.86    atatat 		lpmin = lowportmin;
   1089       1.86    atatat 		lpmax = lowportmax;
   1090       1.86    atatat #endif /* IPNOPRIVPORTS */
   1091       1.86    atatat 		break;
   1092       1.86    atatat #endif /* INET */
   1093       1.86    atatat #ifdef INET6
   1094       1.86    atatat 	    case PF_INET6:
   1095       1.86    atatat 		apmin = ip6_anonportmin;
   1096       1.86    atatat 		apmax = ip6_anonportmax;
   1097       1.86    atatat #ifndef IPNOPRIVPORTS
   1098       1.86    atatat 		lpmin = ip6_lowportmin;
   1099       1.86    atatat 		lpmax = ip6_lowportmax;
   1100       1.86    atatat #endif /* IPNOPRIVPORTS */
   1101       1.86    atatat 		break;
   1102       1.86    atatat #endif /* INET6 */
   1103       1.86    atatat 	    default:
   1104       1.86    atatat 		return (EINVAL);
   1105       1.86    atatat 	}
   1106       1.86    atatat 
   1107       1.86    atatat 	/*
   1108       1.86    atatat 	 * insert temporary copy into node, perform lookup on
   1109       1.86    atatat 	 * temporary, then restore pointer
   1110       1.86    atatat 	 */
   1111       1.86    atatat 	node = *rnode;
   1112       1.86    atatat 	tmp = *(int*)rnode->sysctl_data;
   1113       1.86    atatat 	node.sysctl_data = &tmp;
   1114       1.86    atatat 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1115       1.86    atatat 	if (error || newp == NULL)
   1116       1.86    atatat 		return (error);
   1117       1.86    atatat 
   1118       1.86    atatat 	/*
   1119       1.86    atatat 	 * simple port range check
   1120       1.86    atatat 	 */
   1121       1.86    atatat 	if (tmp < 0 || tmp > 65535)
   1122       1.86    atatat 		return (EINVAL);
   1123       1.86    atatat 
   1124       1.86    atatat 	/*
   1125       1.86    atatat 	 * per-node range checks
   1126       1.86    atatat 	 */
   1127       1.86    atatat 	switch (rnode->sysctl_num) {
   1128       1.86    atatat 	case IPCTL_ANONPORTMIN:
   1129      1.151      yamt 	case IPV6CTL_ANONPORTMIN:
   1130       1.86    atatat 		if (tmp >= apmax)
   1131       1.86    atatat 			return (EINVAL);
   1132       1.86    atatat #ifndef IPNOPRIVPORTS
   1133       1.86    atatat 		if (tmp < IPPORT_RESERVED)
   1134       1.86    atatat                         return (EINVAL);
   1135       1.86    atatat #endif /* IPNOPRIVPORTS */
   1136       1.86    atatat 		break;
   1137       1.86    atatat 
   1138       1.86    atatat 	case IPCTL_ANONPORTMAX:
   1139      1.151      yamt 	case IPV6CTL_ANONPORTMAX:
   1140       1.86    atatat                 if (apmin >= tmp)
   1141       1.86    atatat 			return (EINVAL);
   1142       1.86    atatat #ifndef IPNOPRIVPORTS
   1143       1.86    atatat 		if (tmp < IPPORT_RESERVED)
   1144       1.86    atatat                         return (EINVAL);
   1145       1.86    atatat #endif /* IPNOPRIVPORTS */
   1146       1.86    atatat 		break;
   1147       1.86    atatat 
   1148       1.86    atatat #ifndef IPNOPRIVPORTS
   1149       1.86    atatat 	case IPCTL_LOWPORTMIN:
   1150      1.151      yamt 	case IPV6CTL_LOWPORTMIN:
   1151       1.86    atatat 		if (tmp >= lpmax ||
   1152       1.86    atatat 		    tmp > IPPORT_RESERVEDMAX ||
   1153       1.86    atatat 		    tmp < IPPORT_RESERVEDMIN)
   1154       1.86    atatat 			return (EINVAL);
   1155       1.86    atatat 		break;
   1156       1.86    atatat 
   1157       1.86    atatat 	case IPCTL_LOWPORTMAX:
   1158      1.151      yamt 	case IPV6CTL_LOWPORTMAX:
   1159       1.86    atatat 		if (lpmin >= tmp ||
   1160       1.86    atatat 		    tmp > IPPORT_RESERVEDMAX ||
   1161       1.86    atatat 		    tmp < IPPORT_RESERVEDMIN)
   1162       1.86    atatat 			return (EINVAL);
   1163       1.86    atatat 		break;
   1164       1.86    atatat #endif /* IPNOPRIVPORTS */
   1165       1.86    atatat 
   1166       1.86    atatat 	default:
   1167       1.86    atatat 		return (EINVAL);
   1168       1.86    atatat 	}
   1169       1.86    atatat 
   1170       1.86    atatat 	*(int*)rnode->sysctl_data = tmp;
   1171       1.86    atatat 
   1172       1.86    atatat 	return (0);
   1173       1.86    atatat }
   1174       1.86    atatat 
   1175      1.133  christos static inline int
   1176      1.133  christos copyout_uid(struct socket *sockp, void *oldp, size_t *oldlenp)
   1177      1.133  christos {
   1178      1.133  christos 	size_t sz;
   1179      1.133  christos 	int error;
   1180      1.133  christos 	uid_t uid;
   1181      1.133  christos 
   1182      1.158      elad 	uid = kauth_cred_geteuid(sockp->so_cred);
   1183      1.133  christos 	if (oldp) {
   1184      1.133  christos 		sz = MIN(sizeof(uid), *oldlenp);
   1185      1.133  christos 		error = copyout(&uid, oldp, sz);
   1186      1.133  christos 		if (error)
   1187      1.133  christos 			return error;
   1188      1.133  christos 	}
   1189      1.133  christos 	*oldlenp = sizeof(uid);
   1190      1.133  christos 	return 0;
   1191      1.133  christos }
   1192      1.133  christos 
   1193      1.133  christos static inline int
   1194      1.133  christos inet4_ident_core(struct in_addr raddr, u_int rport,
   1195      1.133  christos     struct in_addr laddr, u_int lport,
   1196      1.133  christos     void *oldp, size_t *oldlenp,
   1197      1.133  christos     struct lwp *l, int dodrop)
   1198      1.133  christos {
   1199  1.166.4.1     rmind 	inpcb_t *inp;
   1200  1.166.4.1     rmind 	struct socket *so;
   1201      1.133  christos 
   1202  1.166.4.1     rmind 	inp = inpcb_lookup_connect(tcbtable, raddr, rport, laddr, lport, 0);
   1203  1.166.4.1     rmind 	if (inp == NULL || (so = inpcb_get_socket(inp)) == NULL)
   1204      1.133  christos 		return ESRCH;
   1205      1.133  christos 
   1206      1.133  christos 	if (dodrop) {
   1207      1.133  christos 		struct tcpcb *tp;
   1208      1.153      elad 		int error;
   1209  1.166.4.1     rmind 
   1210  1.166.4.1     rmind 		if ((tp = intotcpcb(inp)) == NULL ||
   1211  1.166.4.1     rmind 		    (so->so_options & SO_ACCEPTCONN) != 0)
   1212      1.133  christos 			return ESRCH;
   1213      1.153      elad 
   1214      1.153      elad 		error = kauth_authorize_network(l->l_cred, KAUTH_NETWORK_SOCKET,
   1215  1.166.4.1     rmind 		    KAUTH_REQ_NETWORK_SOCKET_DROP, so, tp, NULL);
   1216  1.166.4.1     rmind 		if (error) {
   1217  1.166.4.1     rmind 			return error;
   1218  1.166.4.1     rmind 		}
   1219  1.166.4.1     rmind 
   1220      1.133  christos 		(void)tcp_drop(tp, ECONNABORTED);
   1221      1.133  christos 		return 0;
   1222      1.133  christos 	}
   1223  1.166.4.1     rmind 
   1224  1.166.4.1     rmind 	return copyout_uid(so, oldp, oldlenp);
   1225      1.133  christos }
   1226      1.133  christos 
   1227      1.134   xtraeme #ifdef INET6
   1228      1.133  christos static inline int
   1229      1.133  christos inet6_ident_core(struct in6_addr *raddr, u_int rport,
   1230      1.133  christos     struct in6_addr *laddr, u_int lport,
   1231      1.133  christos     void *oldp, size_t *oldlenp,
   1232      1.133  christos     struct lwp *l, int dodrop)
   1233      1.133  christos {
   1234      1.133  christos 	struct in6pcb *in6p;
   1235      1.133  christos 	struct socket *sockp;
   1236      1.133  christos 
   1237  1.166.4.1     rmind 	in6p = in6_pcblookup_connect(tcbtable, raddr, rport, laddr, lport, 0, 0);
   1238      1.133  christos 
   1239      1.133  christos 	if (in6p == NULL || (sockp = in6p->in6p_socket) == NULL)
   1240      1.133  christos 		return ESRCH;
   1241      1.133  christos 
   1242      1.133  christos 	if (dodrop) {
   1243      1.133  christos 		struct tcpcb *tp;
   1244      1.153      elad 		int error;
   1245      1.133  christos 
   1246      1.133  christos 		if (in6p == NULL || (tp = in6totcpcb(in6p)) == NULL ||
   1247      1.133  christos 		    (in6p->in6p_socket->so_options & SO_ACCEPTCONN) != 0)
   1248      1.133  christos 			return ESRCH;
   1249      1.133  christos 
   1250      1.153      elad 		error = kauth_authorize_network(l->l_cred, KAUTH_NETWORK_SOCKET,
   1251      1.153      elad 		    KAUTH_REQ_NETWORK_SOCKET_DROP, in6p->in6p_socket, tp, NULL);
   1252      1.153      elad 		if (error)
   1253      1.153      elad 			return (error);
   1254      1.133  christos 
   1255      1.133  christos 		(void)tcp_drop(tp, ECONNABORTED);
   1256      1.133  christos 		return 0;
   1257      1.133  christos 	}
   1258      1.133  christos 	else
   1259      1.133  christos 		return copyout_uid(sockp, oldp, oldlenp);
   1260      1.133  christos }
   1261      1.134   xtraeme #endif
   1262      1.133  christos 
   1263      1.133  christos /*
   1264      1.133  christos  * sysctl helper routine for the net.inet.tcp.drop and
   1265      1.133  christos  * net.inet6.tcp6.drop nodes.
   1266      1.133  christos  */
   1267      1.133  christos #define sysctl_net_inet_tcp_drop sysctl_net_inet_tcp_ident
   1268      1.133  christos 
   1269      1.133  christos /*
   1270       1.86    atatat  * sysctl helper routine for the net.inet.tcp.ident and
   1271       1.86    atatat  * net.inet6.tcp6.ident nodes.  contains backwards compat code for the
   1272       1.86    atatat  * old way of looking up the ident information for ipv4 which involves
   1273       1.86    atatat  * stuffing the port/addr pairs into the mib lookup.
   1274       1.86    atatat  */
   1275       1.86    atatat static int
   1276       1.86    atatat sysctl_net_inet_tcp_ident(SYSCTLFN_ARGS)
   1277       1.86    atatat {
   1278       1.86    atatat #ifdef INET
   1279       1.86    atatat 	struct sockaddr_in *si4[2];
   1280       1.86    atatat #endif /* INET */
   1281       1.86    atatat #ifdef INET6
   1282       1.86    atatat 	struct sockaddr_in6 *si6[2];
   1283       1.86    atatat #endif /* INET6 */
   1284       1.86    atatat 	struct sockaddr_storage sa[2];
   1285      1.148      matt 	int error, pf, dodrop;
   1286       1.86    atatat 
   1287      1.133  christos 	dodrop = name[-1] == TCPCTL_DROP;
   1288      1.133  christos 	if (dodrop) {
   1289      1.133  christos 		if (oldp != NULL || *oldlenp != 0)
   1290      1.133  christos 			return EINVAL;
   1291      1.133  christos 		if (newp == NULL)
   1292      1.133  christos 			return EPERM;
   1293      1.133  christos 		if (newlen < sizeof(sa))
   1294      1.133  christos 			return ENOMEM;
   1295      1.133  christos 	}
   1296       1.86    atatat 	if (namelen != 4 && namelen != 0)
   1297      1.133  christos 		return EINVAL;
   1298       1.86    atatat 	if (name[-2] != IPPROTO_TCP)
   1299      1.133  christos 		return EINVAL;
   1300       1.86    atatat 	pf = name[-3];
   1301       1.86    atatat 
   1302       1.86    atatat 	/* old style lookup, ipv4 only */
   1303       1.86    atatat 	if (namelen == 4) {
   1304       1.86    atatat #ifdef INET
   1305       1.88    atatat 		struct in_addr laddr, raddr;
   1306       1.88    atatat 		u_int lport, rport;
   1307       1.88    atatat 
   1308       1.86    atatat 		if (pf != PF_INET)
   1309      1.133  christos 			return EPROTONOSUPPORT;
   1310       1.86    atatat 		raddr.s_addr = (uint32_t)name[0];
   1311       1.86    atatat 		rport = (u_int)name[1];
   1312       1.86    atatat 		laddr.s_addr = (uint32_t)name[2];
   1313       1.86    atatat 		lport = (u_int)name[3];
   1314      1.133  christos 
   1315      1.148      matt 		mutex_enter(softnet_lock);
   1316      1.133  christos 		error = inet4_ident_core(raddr, rport, laddr, lport,
   1317      1.133  christos 		    oldp, oldlenp, l, dodrop);
   1318      1.148      matt 		mutex_exit(softnet_lock);
   1319      1.133  christos 		return error;
   1320       1.86    atatat #else /* INET */
   1321      1.133  christos 		return EINVAL;
   1322       1.86    atatat #endif /* INET */
   1323       1.86    atatat 	}
   1324       1.86    atatat 
   1325       1.86    atatat 	if (newp == NULL || newlen != sizeof(sa))
   1326      1.133  christos 		return EINVAL;
   1327       1.86    atatat 	error = copyin(newp, &sa, newlen);
   1328       1.86    atatat 	if (error)
   1329      1.133  christos 		return error;
   1330       1.86    atatat 
   1331       1.86    atatat 	/*
   1332       1.86    atatat 	 * requested families must match
   1333       1.86    atatat 	 */
   1334       1.86    atatat 	if (pf != sa[0].ss_family || sa[0].ss_family != sa[1].ss_family)
   1335      1.133  christos 		return EINVAL;
   1336       1.86    atatat 
   1337       1.86    atatat 	switch (pf) {
   1338      1.135  christos #ifdef INET6
   1339      1.135  christos 	case PF_INET6:
   1340      1.135  christos 		si6[0] = (struct sockaddr_in6*)&sa[0];
   1341      1.135  christos 		si6[1] = (struct sockaddr_in6*)&sa[1];
   1342      1.135  christos 		if (si6[0]->sin6_len != sizeof(*si6[0]) ||
   1343      1.135  christos 		    si6[1]->sin6_len != sizeof(*si6[1]))
   1344      1.135  christos 			return EINVAL;
   1345      1.135  christos 
   1346      1.135  christos 		if (!IN6_IS_ADDR_V4MAPPED(&si6[0]->sin6_addr) &&
   1347      1.135  christos 		    !IN6_IS_ADDR_V4MAPPED(&si6[1]->sin6_addr)) {
   1348      1.135  christos 			error = sa6_embedscope(si6[0], ip6_use_defzone);
   1349      1.135  christos 			if (error)
   1350      1.135  christos 				return error;
   1351      1.135  christos 			error = sa6_embedscope(si6[1], ip6_use_defzone);
   1352      1.135  christos 			if (error)
   1353      1.135  christos 				return error;
   1354      1.135  christos 
   1355      1.148      matt 			mutex_enter(softnet_lock);
   1356      1.135  christos 			error = inet6_ident_core(&si6[0]->sin6_addr,
   1357      1.135  christos 			    si6[0]->sin6_port, &si6[1]->sin6_addr,
   1358      1.135  christos 			    si6[1]->sin6_port, oldp, oldlenp, l, dodrop);
   1359      1.148      matt 			mutex_exit(softnet_lock);
   1360      1.135  christos 			return error;
   1361      1.135  christos 		}
   1362      1.135  christos 
   1363      1.135  christos 		if (IN6_IS_ADDR_V4MAPPED(&si6[0]->sin6_addr) !=
   1364      1.135  christos 		    IN6_IS_ADDR_V4MAPPED(&si6[1]->sin6_addr))
   1365      1.135  christos 			return EINVAL;
   1366      1.135  christos 
   1367      1.135  christos 		in6_sin6_2_sin_in_sock((struct sockaddr *)&sa[0]);
   1368      1.135  christos 		in6_sin6_2_sin_in_sock((struct sockaddr *)&sa[1]);
   1369      1.135  christos 		/*FALLTHROUGH*/
   1370      1.135  christos #endif /* INET6 */
   1371       1.86    atatat #ifdef INET
   1372      1.133  christos 	case PF_INET:
   1373       1.86    atatat 		si4[0] = (struct sockaddr_in*)&sa[0];
   1374       1.86    atatat 		si4[1] = (struct sockaddr_in*)&sa[1];
   1375       1.86    atatat 		if (si4[0]->sin_len != sizeof(*si4[0]) ||
   1376      1.135  christos 		    si4[0]->sin_len != sizeof(*si4[1]))
   1377      1.133  christos 			return EINVAL;
   1378      1.133  christos 
   1379      1.148      matt 		mutex_enter(softnet_lock);
   1380      1.133  christos 		error = inet4_ident_core(si4[0]->sin_addr, si4[0]->sin_port,
   1381      1.133  christos 		    si4[1]->sin_addr, si4[1]->sin_port,
   1382      1.133  christos 		    oldp, oldlenp, l, dodrop);
   1383      1.148      matt 		mutex_exit(softnet_lock);
   1384      1.133  christos 		return error;
   1385       1.86    atatat #endif /* INET */
   1386      1.133  christos 	default:
   1387      1.133  christos 		return EPROTONOSUPPORT;
   1388       1.86    atatat 	}
   1389       1.76  christos }
   1390       1.76  christos 
   1391      1.124    rpaulo static int
   1392      1.124    rpaulo sysctl_tcp_congctl(SYSCTLFN_ARGS)
   1393      1.124    rpaulo {
   1394      1.124    rpaulo 	struct sysctlnode node;
   1395      1.148      matt 	int error;
   1396      1.124    rpaulo 	char newname[TCPCC_MAXLEN];
   1397      1.124    rpaulo 
   1398      1.124    rpaulo 	strlcpy(newname, tcp_congctl_global_name, sizeof(newname) - 1);
   1399      1.124    rpaulo 
   1400      1.124    rpaulo 	node = *rnode;
   1401      1.124    rpaulo 	node.sysctl_data = newname;
   1402      1.124    rpaulo 	node.sysctl_size = sizeof(newname);
   1403      1.124    rpaulo 
   1404      1.124    rpaulo 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1405      1.124    rpaulo 
   1406      1.124    rpaulo 	if (error ||
   1407      1.124    rpaulo 	    newp == NULL ||
   1408      1.124    rpaulo 	    strncmp(newname, tcp_congctl_global_name, sizeof(newname)) == 0)
   1409      1.124    rpaulo 		return error;
   1410      1.124    rpaulo 
   1411      1.148      matt 	mutex_enter(softnet_lock);
   1412      1.148      matt 	error = tcp_congctl_select(NULL, newname);
   1413      1.148      matt 	mutex_exit(softnet_lock);
   1414      1.148      matt 
   1415      1.124    rpaulo 	return error;
   1416      1.124    rpaulo }
   1417      1.124    rpaulo 
   1418      1.132  christos static int
   1419      1.166  christos sysctl_tcp_init_win(SYSCTLFN_ARGS)
   1420      1.166  christos {
   1421      1.166  christos 	int error;
   1422      1.166  christos 	u_int iw;
   1423      1.166  christos 	struct sysctlnode node;
   1424      1.166  christos 
   1425      1.166  christos 	iw = *(u_int *)rnode->sysctl_data;
   1426      1.166  christos 	node = *rnode;
   1427      1.166  christos 	node.sysctl_data = &iw;
   1428      1.166  christos 	node.sysctl_size = sizeof(iw);
   1429      1.166  christos 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1430      1.166  christos 	if (error || newp == NULL)
   1431      1.166  christos 		return error;
   1432      1.166  christos 
   1433      1.166  christos 	if (iw >= __arraycount(tcp_init_win_max))
   1434      1.166  christos 		return EINVAL;
   1435      1.166  christos 	*(u_int *)rnode->sysctl_data = iw;
   1436      1.166  christos 	return 0;
   1437      1.166  christos }
   1438      1.166  christos 
   1439      1.166  christos static int
   1440      1.132  christos sysctl_tcp_keep(SYSCTLFN_ARGS)
   1441      1.132  christos {
   1442      1.132  christos 	int error;
   1443      1.132  christos 	u_int tmp;
   1444      1.132  christos 	struct sysctlnode node;
   1445      1.132  christos 
   1446      1.132  christos 	node = *rnode;
   1447      1.132  christos 	tmp = *(u_int *)rnode->sysctl_data;
   1448      1.132  christos 	node.sysctl_data = &tmp;
   1449      1.132  christos 
   1450      1.132  christos 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
   1451      1.132  christos 	if (error || newp == NULL)
   1452      1.132  christos 		return error;
   1453      1.132  christos 
   1454      1.148      matt 	mutex_enter(softnet_lock);
   1455      1.148      matt 
   1456      1.132  christos 	*(u_int *)rnode->sysctl_data = tmp;
   1457      1.132  christos 	tcp_tcpcb_template();	/* update the template */
   1458      1.148      matt 
   1459      1.148      matt 	mutex_exit(softnet_lock);
   1460      1.132  christos 	return 0;
   1461      1.132  christos }
   1462      1.132  christos 
   1463      1.142   thorpej static int
   1464      1.142   thorpej sysctl_net_inet_tcp_stats(SYSCTLFN_ARGS)
   1465      1.142   thorpej {
   1466      1.142   thorpej 
   1467      1.146   thorpej 	return (NETSTAT_SYSCTL(tcpstat_percpu, TCP_NSTATS));
   1468      1.142   thorpej }
   1469      1.132  christos 
   1470       1.97    atatat /*
   1471       1.86    atatat  * this (second stage) setup routine is a replacement for tcp_sysctl()
   1472       1.86    atatat  * (which is currently used for ipv4 and ipv6)
   1473       1.86    atatat  */
   1474       1.86    atatat static void
   1475       1.87    atatat sysctl_net_inet_tcp_setup2(struct sysctllog **clog, int pf, const char *pfname,
   1476       1.87    atatat 			   const char *tcpname)
   1477       1.86    atatat {
   1478      1.128    rpaulo 	const struct sysctlnode *sack_node;
   1479      1.127      yamt 	const struct sysctlnode *abc_node;
   1480      1.128    rpaulo 	const struct sysctlnode *ecn_node;
   1481      1.128    rpaulo 	const struct sysctlnode *congctl_node;
   1482      1.159    dyoung 	const struct sysctlnode *mslt_node;
   1483      1.159    dyoung 	const struct sysctlnode *vtw_node;
   1484      1.109    rpaulo #ifdef TCP_DEBUG
   1485      1.109    rpaulo 	extern struct tcp_debug tcp_debug[TCP_NDEBUG];
   1486      1.109    rpaulo 	extern int tcp_debx;
   1487      1.109    rpaulo #endif
   1488       1.76  christos 
   1489       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1490       1.87    atatat 		       CTLFLAG_PERMANENT,
   1491       1.86    atatat 		       CTLTYPE_NODE, "net", NULL,
   1492       1.86    atatat 		       NULL, 0, NULL, 0,
   1493       1.86    atatat 		       CTL_NET, CTL_EOL);
   1494       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1495       1.87    atatat 		       CTLFLAG_PERMANENT,
   1496       1.86    atatat 		       CTLTYPE_NODE, pfname, NULL,
   1497       1.86    atatat 		       NULL, 0, NULL, 0,
   1498       1.86    atatat 		       CTL_NET, pf, CTL_EOL);
   1499       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1500       1.87    atatat 		       CTLFLAG_PERMANENT,
   1501       1.92    atatat 		       CTLTYPE_NODE, tcpname,
   1502       1.92    atatat 		       SYSCTL_DESCR("TCP related settings"),
   1503       1.86    atatat 		       NULL, 0, NULL, 0,
   1504       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, CTL_EOL);
   1505       1.86    atatat 
   1506       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1507       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1508       1.92    atatat 		       CTLTYPE_INT, "rfc1323",
   1509       1.92    atatat 		       SYSCTL_DESCR("Enable RFC1323 TCP extensions"),
   1510       1.86    atatat 		       NULL, 0, &tcp_do_rfc1323, 0,
   1511       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_RFC1323, CTL_EOL);
   1512       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1513       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1514       1.92    atatat 		       CTLTYPE_INT, "sendspace",
   1515       1.92    atatat 		       SYSCTL_DESCR("Default TCP send buffer size"),
   1516       1.86    atatat 		       NULL, 0, &tcp_sendspace, 0,
   1517       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SENDSPACE, CTL_EOL);
   1518       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1519       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1520       1.92    atatat 		       CTLTYPE_INT, "recvspace",
   1521       1.92    atatat 		       SYSCTL_DESCR("Default TCP receive buffer size"),
   1522       1.86    atatat 		       NULL, 0, &tcp_recvspace, 0,
   1523       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_RECVSPACE, CTL_EOL);
   1524       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1525       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1526       1.92    atatat 		       CTLTYPE_INT, "mssdflt",
   1527       1.92    atatat 		       SYSCTL_DESCR("Default maximum segment size"),
   1528       1.86    atatat 		       sysctl_net_inet_tcp_mssdflt, 0, &tcp_mssdflt, 0,
   1529       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_MSSDFLT, CTL_EOL);
   1530       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1531       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1532      1.136     rmind 		       CTLTYPE_INT, "minmss",
   1533      1.136     rmind 		       SYSCTL_DESCR("Lower limit for TCP maximum segment size"),
   1534      1.136     rmind 		       NULL, 0, &tcp_minmss, 0,
   1535      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1536      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1537      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1538      1.156    darran 		       CTLTYPE_INT, "msl",
   1539      1.156    darran 		       SYSCTL_DESCR("Maximum Segment Life"),
   1540      1.156    darran 		       NULL, 0, &tcp_msl, 0,
   1541      1.156    darran 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_MSL, CTL_EOL);
   1542      1.156    darran 	sysctl_createv(clog, 0, NULL, NULL,
   1543      1.156    darran 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1544       1.92    atatat 		       CTLTYPE_INT, "syn_cache_limit",
   1545       1.92    atatat 		       SYSCTL_DESCR("Maximum number of entries in the TCP "
   1546       1.92    atatat 				    "compressed state engine"),
   1547       1.86    atatat 		       NULL, 0, &tcp_syn_cache_limit, 0,
   1548       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SYN_CACHE_LIMIT,
   1549       1.86    atatat 		       CTL_EOL);
   1550       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1551       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1552       1.92    atatat 		       CTLTYPE_INT, "syn_bucket_limit",
   1553       1.92    atatat 		       SYSCTL_DESCR("Maximum number of entries per hash "
   1554       1.92    atatat 				    "bucket in the TCP compressed state "
   1555       1.92    atatat 				    "engine"),
   1556       1.86    atatat 		       NULL, 0, &tcp_syn_bucket_limit, 0,
   1557       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SYN_BUCKET_LIMIT,
   1558       1.86    atatat 		       CTL_EOL);
   1559       1.86    atatat #if 0 /* obsoleted */
   1560       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1561       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1562       1.92    atatat 		       CTLTYPE_INT, "syn_cache_interval",
   1563       1.92    atatat 		       SYSCTL_DESCR("TCP compressed state engine's timer interval"),
   1564       1.86    atatat 		       NULL, 0, &tcp_syn_cache_interval, 0,
   1565       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SYN_CACHE_INTER,
   1566       1.86    atatat 		       CTL_EOL);
   1567       1.86    atatat #endif
   1568       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1569       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1570       1.92    atatat 		       CTLTYPE_INT, "init_win",
   1571       1.92    atatat 		       SYSCTL_DESCR("Initial TCP congestion window"),
   1572      1.166  christos 		       sysctl_tcp_init_win, 0, &tcp_init_win, 0,
   1573       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_INIT_WIN, CTL_EOL);
   1574       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1575       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1576       1.92    atatat 		       CTLTYPE_INT, "mss_ifmtu",
   1577       1.92    atatat 		       SYSCTL_DESCR("Use interface MTU for calculating MSS"),
   1578       1.86    atatat 		       NULL, 0, &tcp_mss_ifmtu, 0,
   1579       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_MSS_IFMTU, CTL_EOL);
   1580      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1581      1.102  kurahone 		       CTLFLAG_PERMANENT,
   1582      1.102  kurahone 		       CTLTYPE_NODE, "sack",
   1583      1.102  kurahone 		       SYSCTL_DESCR("RFC2018 Selective ACKnowledgement tunables"),
   1584      1.102  kurahone 		       NULL, 0, NULL, 0,
   1585       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_EOL);
   1586      1.128    rpaulo 
   1587      1.128    rpaulo 	/* Congctl subtree */
   1588      1.128    rpaulo 	sysctl_createv(clog, 0, NULL, &congctl_node,
   1589      1.124    rpaulo 		       CTLFLAG_PERMANENT,
   1590      1.124    rpaulo 		       CTLTYPE_NODE, "congctl",
   1591      1.124    rpaulo 		       SYSCTL_DESCR("TCP Congestion Control"),
   1592      1.128    rpaulo 	    	       NULL, 0, NULL, 0,
   1593      1.124    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1594      1.128    rpaulo 	sysctl_createv(clog, 0, &congctl_node, NULL,
   1595      1.124    rpaulo 		       CTLFLAG_PERMANENT,
   1596      1.124    rpaulo 		       CTLTYPE_STRING, "available",
   1597      1.124    rpaulo 		       SYSCTL_DESCR("Available Congestion Control Mechanisms"),
   1598      1.165       dsl 		       NULL, 0, tcp_congctl_avail, 0, CTL_CREATE, CTL_EOL);
   1599      1.128    rpaulo 	sysctl_createv(clog, 0, &congctl_node, NULL,
   1600      1.124    rpaulo 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1601      1.124    rpaulo 		       CTLTYPE_STRING, "selected",
   1602      1.124    rpaulo 		       SYSCTL_DESCR("Selected Congestion Control Mechanism"),
   1603      1.124    rpaulo 		       sysctl_tcp_congctl, 0, NULL, TCPCC_MAXLEN,
   1604      1.124    rpaulo 		       CTL_CREATE, CTL_EOL);
   1605      1.124    rpaulo 
   1606       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1607       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1608       1.92    atatat 		       CTLTYPE_INT, "win_scale",
   1609       1.92    atatat 		       SYSCTL_DESCR("Use RFC1323 window scale options"),
   1610       1.86    atatat 		       NULL, 0, &tcp_do_win_scale, 0,
   1611       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_WSCALE, CTL_EOL);
   1612       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1613       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1614       1.92    atatat 		       CTLTYPE_INT, "timestamps",
   1615       1.92    atatat 		       SYSCTL_DESCR("Use RFC1323 time stamp options"),
   1616       1.86    atatat 		       NULL, 0, &tcp_do_timestamps, 0,
   1617       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_TSTAMP, CTL_EOL);
   1618       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1619       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1620       1.92    atatat 		       CTLTYPE_INT, "compat_42",
   1621       1.92    atatat 		       SYSCTL_DESCR("Enable workarounds for 4.2BSD TCP bugs"),
   1622       1.86    atatat 		       NULL, 0, &tcp_compat_42, 0,
   1623       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_COMPAT_42, CTL_EOL);
   1624       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1625       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1626       1.92    atatat 		       CTLTYPE_INT, "cwm",
   1627       1.92    atatat 		       SYSCTL_DESCR("Hughes/Touch/Heidemann Congestion Window "
   1628       1.92    atatat 				    "Monitoring"),
   1629       1.86    atatat 		       NULL, 0, &tcp_cwm, 0,
   1630       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_CWM, CTL_EOL);
   1631       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1632       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1633       1.92    atatat 		       CTLTYPE_INT, "cwm_burstsize",
   1634       1.92    atatat 		       SYSCTL_DESCR("Congestion Window Monitoring allowed "
   1635       1.92    atatat 				    "burst count in packets"),
   1636       1.86    atatat 		       NULL, 0, &tcp_cwm_burstsize, 0,
   1637       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_CWM_BURSTSIZE,
   1638       1.86    atatat 		       CTL_EOL);
   1639       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1640       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1641       1.92    atatat 		       CTLTYPE_INT, "ack_on_push",
   1642       1.92    atatat 		       SYSCTL_DESCR("Immediately return ACK when PSH is "
   1643       1.92    atatat 				    "received"),
   1644       1.86    atatat 		       NULL, 0, &tcp_ack_on_push, 0,
   1645       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_ACK_ON_PUSH, CTL_EOL);
   1646       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1647       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1648       1.92    atatat 		       CTLTYPE_INT, "keepidle",
   1649       1.92    atatat 		       SYSCTL_DESCR("Allowed connection idle ticks before a "
   1650       1.92    atatat 				    "keepalive probe is sent"),
   1651      1.132  christos 		       sysctl_tcp_keep, 0, &tcp_keepidle, 0,
   1652       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_KEEPIDLE, CTL_EOL);
   1653       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1654       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1655       1.92    atatat 		       CTLTYPE_INT, "keepintvl",
   1656       1.92    atatat 		       SYSCTL_DESCR("Ticks before next keepalive probe is sent"),
   1657      1.132  christos 		       sysctl_tcp_keep, 0, &tcp_keepintvl, 0,
   1658       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_KEEPINTVL, CTL_EOL);
   1659       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1660       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1661       1.92    atatat 		       CTLTYPE_INT, "keepcnt",
   1662       1.92    atatat 		       SYSCTL_DESCR("Number of keepalive probes to send"),
   1663      1.132  christos 		       sysctl_tcp_keep, 0, &tcp_keepcnt, 0,
   1664       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_KEEPCNT, CTL_EOL);
   1665       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1666       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_IMMEDIATE,
   1667       1.92    atatat 		       CTLTYPE_INT, "slowhz",
   1668       1.92    atatat 		       SYSCTL_DESCR("Keepalive ticks per second"),
   1669       1.86    atatat 		       NULL, PR_SLOWHZ, NULL, 0,
   1670       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SLOWHZ, CTL_EOL);
   1671       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1672       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1673       1.92    atatat 		       CTLTYPE_INT, "log_refused",
   1674       1.92    atatat 		       SYSCTL_DESCR("Log refused TCP connections"),
   1675       1.86    atatat 		       NULL, 0, &tcp_log_refused, 0,
   1676       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_LOG_REFUSED, CTL_EOL);
   1677       1.86    atatat #if 0 /* obsoleted */
   1678       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1679       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1680       1.86    atatat 		       CTLTYPE_INT, "rstratelimit", NULL,
   1681       1.86    atatat 		       NULL, 0, &tcp_rst_ratelim, 0,
   1682       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_RSTRATELIMIT, CTL_EOL);
   1683       1.86    atatat #endif
   1684       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1685       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1686       1.92    atatat 		       CTLTYPE_INT, "rstppslimit",
   1687       1.92    atatat 		       SYSCTL_DESCR("Maximum number of RST packets to send "
   1688       1.92    atatat 				    "per second"),
   1689       1.86    atatat 		       NULL, 0, &tcp_rst_ppslim, 0,
   1690       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_RSTPPSLIMIT, CTL_EOL);
   1691       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1692       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1693       1.92    atatat 		       CTLTYPE_INT, "delack_ticks",
   1694       1.92    atatat 		       SYSCTL_DESCR("Number of ticks to delay sending an ACK"),
   1695       1.86    atatat 		       NULL, 0, &tcp_delack_ticks, 0,
   1696       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_DELACK_TICKS, CTL_EOL);
   1697       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1698       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1699       1.92    atatat 		       CTLTYPE_INT, "init_win_local",
   1700       1.92    atatat 		       SYSCTL_DESCR("Initial TCP window size (in segments)"),
   1701      1.166  christos 		       sysctl_tcp_init_win, 0, &tcp_init_win_local, 0,
   1702       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_INIT_WIN_LOCAL,
   1703       1.86    atatat 		       CTL_EOL);
   1704       1.87    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1705       1.87    atatat 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1706       1.92    atatat 		       CTLTYPE_STRUCT, "ident",
   1707       1.92    atatat 		       SYSCTL_DESCR("RFC1413 Identification Protocol lookups"),
   1708       1.86    atatat 		       sysctl_net_inet_tcp_ident, 0, NULL, sizeof(uid_t),
   1709       1.86    atatat 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_IDENT, CTL_EOL);
   1710       1.93   thorpej 	sysctl_createv(clog, 0, NULL, NULL,
   1711       1.93   thorpej 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1712       1.93   thorpej 		       CTLTYPE_INT, "do_loopback_cksum",
   1713       1.93   thorpej 		       SYSCTL_DESCR("Perform TCP checksum on loopback"),
   1714       1.93   thorpej 		       NULL, 0, &tcp_do_loopback_cksum, 0,
   1715       1.93   thorpej 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_LOOPBACKCKSUM,
   1716       1.93   thorpej 		       CTL_EOL);
   1717       1.97    atatat 	sysctl_createv(clog, 0, NULL, NULL,
   1718       1.97    atatat 		       CTLFLAG_PERMANENT,
   1719      1.100    atatat 		       CTLTYPE_STRUCT, "pcblist",
   1720       1.97    atatat 		       SYSCTL_DESCR("TCP protocol control block list"),
   1721  1.166.4.1     rmind 		       sysctl_inpcblist, 0, tcbtable, 0,
   1722       1.97    atatat 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE,
   1723       1.97    atatat 		       CTL_EOL);
   1724      1.132  christos 	sysctl_createv(clog, 0, NULL, NULL,
   1725      1.132  christos 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1726      1.132  christos 		       CTLTYPE_INT, "keepinit",
   1727      1.132  christos 		       SYSCTL_DESCR("Ticks before initial tcp connection times out"),
   1728      1.132  christos 		       sysctl_tcp_keep, 0, &tcp_keepinit, 0,
   1729      1.132  christos 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1730      1.102  kurahone 
   1731      1.136     rmind 	/* TCP socket buffers auto-sizing nodes */
   1732      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1733      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1734      1.136     rmind 		       CTLTYPE_INT, "recvbuf_auto",
   1735      1.136     rmind 		       SYSCTL_DESCR("Enable automatic receive "
   1736      1.136     rmind 		           "buffer sizing (experimental)"),
   1737      1.136     rmind 		       NULL, 0, &tcp_do_autorcvbuf, 0,
   1738      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1739      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1740      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1741      1.136     rmind 		       CTLTYPE_INT, "recvbuf_inc",
   1742      1.136     rmind 		       SYSCTL_DESCR("Incrementor step size of "
   1743      1.136     rmind 		           "automatic receive buffer"),
   1744      1.136     rmind 		       NULL, 0, &tcp_autorcvbuf_inc, 0,
   1745      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1746      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1747      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1748      1.136     rmind 		       CTLTYPE_INT, "recvbuf_max",
   1749      1.136     rmind 		       SYSCTL_DESCR("Max size of automatic receive buffer"),
   1750      1.136     rmind 		       NULL, 0, &tcp_autorcvbuf_max, 0,
   1751      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1752      1.136     rmind 
   1753      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1754      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1755      1.136     rmind 		       CTLTYPE_INT, "sendbuf_auto",
   1756      1.136     rmind 		       SYSCTL_DESCR("Enable automatic send "
   1757      1.136     rmind 		           "buffer sizing (experimental)"),
   1758      1.136     rmind 		       NULL, 0, &tcp_do_autosndbuf, 0,
   1759      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1760      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1761      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1762      1.136     rmind 		       CTLTYPE_INT, "sendbuf_inc",
   1763      1.136     rmind 		       SYSCTL_DESCR("Incrementor step size of "
   1764      1.136     rmind 		           "automatic send buffer"),
   1765      1.136     rmind 		       NULL, 0, &tcp_autosndbuf_inc, 0,
   1766      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1767      1.136     rmind 	sysctl_createv(clog, 0, NULL, NULL,
   1768      1.136     rmind 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1769      1.136     rmind 		       CTLTYPE_INT, "sendbuf_max",
   1770      1.136     rmind 		       SYSCTL_DESCR("Max size of automatic send buffer"),
   1771      1.136     rmind 		       NULL, 0, &tcp_autosndbuf_max, 0,
   1772      1.136     rmind 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1773      1.136     rmind 
   1774      1.128    rpaulo 	/* ECN subtree */
   1775      1.128    rpaulo 	sysctl_createv(clog, 0, NULL, &ecn_node,
   1776      1.128    rpaulo 	    	       CTLFLAG_PERMANENT,
   1777      1.128    rpaulo 		       CTLTYPE_NODE, "ecn",
   1778      1.128    rpaulo 	    	       SYSCTL_DESCR("RFC3168 Explicit Congestion Notification"),
   1779      1.128    rpaulo 	    	       NULL, 0, NULL, 0,
   1780      1.128    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1781      1.128    rpaulo 	sysctl_createv(clog, 0, &ecn_node, NULL,
   1782      1.120    rpaulo 	    	       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1783      1.120    rpaulo 		       CTLTYPE_INT, "enable",
   1784      1.120    rpaulo 		       SYSCTL_DESCR("Enable TCP Explicit Congestion "
   1785      1.120    rpaulo 			   "Notification"),
   1786      1.128    rpaulo 	    	       NULL, 0, &tcp_do_ecn, 0, CTL_CREATE, CTL_EOL);
   1787      1.128    rpaulo 	sysctl_createv(clog, 0, &ecn_node, NULL,
   1788      1.120    rpaulo 	    	       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1789      1.120    rpaulo 		       CTLTYPE_INT, "maxretries",
   1790      1.120    rpaulo 		       SYSCTL_DESCR("Number of times to retry ECN setup "
   1791      1.120    rpaulo 			       "before disabling ECN on the connection"),
   1792      1.128    rpaulo 	    	       NULL, 0, &tcp_ecn_maxretries, 0, CTL_CREATE, CTL_EOL);
   1793      1.128    rpaulo 
   1794      1.102  kurahone 	/* SACK gets it's own little subtree. */
   1795      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1796      1.102  kurahone 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1797      1.102  kurahone 		       CTLTYPE_INT, "enable",
   1798      1.102  kurahone 		       SYSCTL_DESCR("Enable RFC2018 Selective ACKnowledgement"),
   1799      1.102  kurahone 		       NULL, 0, &tcp_do_sack, 0,
   1800      1.102  kurahone 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_CREATE, CTL_EOL);
   1801      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1802      1.102  kurahone 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1803      1.102  kurahone 		       CTLTYPE_INT, "maxholes",
   1804      1.102  kurahone 		       SYSCTL_DESCR("Maximum number of TCP SACK holes allowed per connection"),
   1805      1.102  kurahone 		       NULL, 0, &tcp_sack_tp_maxholes, 0,
   1806      1.102  kurahone 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_CREATE, CTL_EOL);
   1807      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1808      1.102  kurahone 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1809      1.102  kurahone 		       CTLTYPE_INT, "globalmaxholes",
   1810      1.102  kurahone 		       SYSCTL_DESCR("Global maximum number of TCP SACK holes"),
   1811      1.102  kurahone 		       NULL, 0, &tcp_sack_globalmaxholes, 0,
   1812      1.102  kurahone 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_CREATE, CTL_EOL);
   1813      1.102  kurahone 	sysctl_createv(clog, 0, NULL, &sack_node,
   1814      1.102  kurahone 		       CTLFLAG_PERMANENT,
   1815      1.102  kurahone 		       CTLTYPE_INT, "globalholes",
   1816      1.102  kurahone 		       SYSCTL_DESCR("Global number of TCP SACK holes"),
   1817      1.102  kurahone 		       NULL, 0, &tcp_sack_globalholes, 0,
   1818      1.102  kurahone 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_SACK, CTL_CREATE, CTL_EOL);
   1819      1.107      elad 
   1820      1.107      elad 	sysctl_createv(clog, 0, NULL, NULL,
   1821      1.107      elad 		       CTLFLAG_PERMANENT,
   1822      1.107      elad 		       CTLTYPE_STRUCT, "stats",
   1823      1.107      elad 		       SYSCTL_DESCR("TCP statistics"),
   1824      1.142   thorpej 		       sysctl_net_inet_tcp_stats, 0, NULL, 0,
   1825      1.107      elad 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_STATS,
   1826      1.107      elad 		       CTL_EOL);
   1827      1.159    dyoung         sysctl_createv(clog, 0, NULL, NULL,
   1828      1.159    dyoung                        CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1829      1.159    dyoung                        CTLTYPE_INT, "local_by_rtt",
   1830      1.159    dyoung                        SYSCTL_DESCR("Use RTT estimator to decide which hosts "
   1831      1.159    dyoung 				    "are local"),
   1832      1.159    dyoung 		       NULL, 0, &tcp_rttlocal, 0,
   1833      1.159    dyoung 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1834      1.109    rpaulo #ifdef TCP_DEBUG
   1835      1.109    rpaulo 	sysctl_createv(clog, 0, NULL, NULL,
   1836      1.109    rpaulo 		       CTLFLAG_PERMANENT,
   1837      1.109    rpaulo 		       CTLTYPE_STRUCT, "debug",
   1838      1.109    rpaulo 		       SYSCTL_DESCR("TCP sockets debug information"),
   1839      1.109    rpaulo 		       NULL, 0, &tcp_debug, sizeof(tcp_debug),
   1840      1.109    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_DEBUG,
   1841      1.109    rpaulo 		       CTL_EOL);
   1842      1.109    rpaulo 	sysctl_createv(clog, 0, NULL, NULL,
   1843      1.109    rpaulo 		       CTLFLAG_PERMANENT,
   1844      1.109    rpaulo 		       CTLTYPE_INT, "debx",
   1845      1.110    rpaulo 		       SYSCTL_DESCR("Number of TCP debug sockets messages"),
   1846      1.109    rpaulo 		       NULL, 0, &tcp_debx, sizeof(tcp_debx),
   1847      1.109    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_DEBX,
   1848      1.109    rpaulo 		       CTL_EOL);
   1849      1.109    rpaulo #endif
   1850      1.133  christos 	sysctl_createv(clog, 0, NULL, NULL,
   1851      1.133  christos 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1852      1.133  christos 		       CTLTYPE_STRUCT, "drop",
   1853      1.133  christos 		       SYSCTL_DESCR("TCP drop connection"),
   1854      1.133  christos 		       sysctl_net_inet_tcp_drop, 0, NULL, 0,
   1855      1.133  christos 		       CTL_NET, pf, IPPROTO_TCP, TCPCTL_DROP, CTL_EOL);
   1856      1.126    rpaulo 	sysctl_createv(clog, 0, NULL, NULL,
   1857      1.126    rpaulo 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1858      1.126    rpaulo 		       CTLTYPE_INT, "iss_hash",
   1859      1.126    rpaulo 		       SYSCTL_DESCR("Enable RFC 1948 ISS by cryptographic "
   1860      1.126    rpaulo 				    "hash computation"),
   1861      1.126    rpaulo 		       NULL, 0, &tcp_do_rfc1948, sizeof(tcp_do_rfc1948),
   1862      1.126    rpaulo 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE,
   1863      1.126    rpaulo 		       CTL_EOL);
   1864      1.109    rpaulo 
   1865      1.127      yamt 	/* ABC subtree */
   1866      1.127      yamt 
   1867      1.127      yamt 	sysctl_createv(clog, 0, NULL, &abc_node,
   1868      1.127      yamt 		       CTLFLAG_PERMANENT, CTLTYPE_NODE, "abc",
   1869      1.127      yamt 		       SYSCTL_DESCR("RFC3465 Appropriate Byte Counting (ABC)"),
   1870      1.127      yamt 		       NULL, 0, NULL, 0,
   1871      1.127      yamt 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1872      1.127      yamt 	sysctl_createv(clog, 0, &abc_node, NULL,
   1873      1.127      yamt 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1874      1.127      yamt 		       CTLTYPE_INT, "enable",
   1875      1.127      yamt 		       SYSCTL_DESCR("Enable RFC3465 Appropriate Byte Counting"),
   1876      1.127      yamt 		       NULL, 0, &tcp_do_abc, 0, CTL_CREATE, CTL_EOL);
   1877      1.127      yamt 	sysctl_createv(clog, 0, &abc_node, NULL,
   1878      1.127      yamt 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1879      1.127      yamt 		       CTLTYPE_INT, "aggressive",
   1880      1.127      yamt 		       SYSCTL_DESCR("1: L=2*SMSS 0: L=1*SMSS"),
   1881      1.127      yamt 		       NULL, 0, &tcp_abc_aggressive, 0, CTL_CREATE, CTL_EOL);
   1882      1.159    dyoung 
   1883      1.159    dyoung 	/* MSL tuning subtree */
   1884      1.159    dyoung 
   1885      1.159    dyoung 	sysctl_createv(clog, 0, NULL, &mslt_node,
   1886      1.159    dyoung 		       CTLFLAG_PERMANENT, CTLTYPE_NODE, "mslt",
   1887      1.159    dyoung 		       SYSCTL_DESCR("MSL Tuning for TIME_WAIT truncation"),
   1888      1.159    dyoung 		       NULL, 0, NULL, 0,
   1889      1.159    dyoung 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1890      1.159    dyoung 	sysctl_createv(clog, 0, &mslt_node, NULL,
   1891      1.159    dyoung 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1892      1.159    dyoung 		       CTLTYPE_INT, "enable",
   1893      1.159    dyoung 		       SYSCTL_DESCR("Enable TIME_WAIT truncation"),
   1894      1.159    dyoung 		       NULL, 0, &tcp_msl_enable, 0, CTL_CREATE, CTL_EOL);
   1895      1.159    dyoung 	sysctl_createv(clog, 0, &mslt_node, NULL,
   1896      1.159    dyoung 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1897      1.159    dyoung 		       CTLTYPE_INT, "loopback",
   1898      1.159    dyoung 		       SYSCTL_DESCR("MSL value to use for loopback connections"),
   1899      1.159    dyoung 		       NULL, 0, &tcp_msl_loop, 0, CTL_CREATE, CTL_EOL);
   1900      1.159    dyoung 	sysctl_createv(clog, 0, &mslt_node, NULL,
   1901      1.159    dyoung 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1902      1.159    dyoung 		       CTLTYPE_INT, "local",
   1903      1.159    dyoung 		       SYSCTL_DESCR("MSL value to use for local connections"),
   1904      1.159    dyoung 		       NULL, 0, &tcp_msl_local, 0, CTL_CREATE, CTL_EOL);
   1905      1.159    dyoung 	sysctl_createv(clog, 0, &mslt_node, NULL,
   1906      1.159    dyoung 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1907      1.159    dyoung 		       CTLTYPE_INT, "remote",
   1908      1.159    dyoung 		       SYSCTL_DESCR("MSL value to use for remote connections"),
   1909      1.159    dyoung 		       NULL, 0, &tcp_msl_remote, 0, CTL_CREATE, CTL_EOL);
   1910      1.159    dyoung 	sysctl_createv(clog, 0, &mslt_node, NULL,
   1911      1.159    dyoung 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1912      1.159    dyoung 		       CTLTYPE_INT, "remote_threshold",
   1913      1.159    dyoung 		       SYSCTL_DESCR("RTT estimate value to promote local to remote"),
   1914      1.159    dyoung 		       NULL, 0, &tcp_msl_remote_threshold, 0, CTL_CREATE, CTL_EOL);
   1915      1.159    dyoung 
   1916      1.159    dyoung 	/* vestigial TIME_WAIT tuning subtree */
   1917      1.159    dyoung 
   1918      1.159    dyoung 	sysctl_createv(clog, 0, NULL, &vtw_node,
   1919      1.159    dyoung 		       CTLFLAG_PERMANENT, CTLTYPE_NODE, "vtw",
   1920      1.159    dyoung 		       SYSCTL_DESCR("Tuning for Vestigial TIME_WAIT"),
   1921      1.159    dyoung 		       NULL, 0, NULL, 0,
   1922      1.159    dyoung 		       CTL_NET, pf, IPPROTO_TCP, CTL_CREATE, CTL_EOL);
   1923      1.159    dyoung 	sysctl_createv(clog, 0, &vtw_node, NULL,
   1924      1.159    dyoung 		       CTLFLAG_PERMANENT|CTLFLAG_READWRITE,
   1925      1.159    dyoung 		       CTLTYPE_INT, "enable",
   1926      1.159    dyoung 		       SYSCTL_DESCR("Enable Vestigial TIME_WAIT"),
   1927      1.160    dyoung 		       sysctl_tcp_vtw_enable, 0,
   1928      1.159    dyoung 	               (pf == AF_INET) ? &tcp4_vtw_enable : &tcp6_vtw_enable,
   1929      1.159    dyoung 		       0, CTL_CREATE, CTL_EOL);
   1930      1.159    dyoung 	sysctl_createv(clog, 0, &vtw_node, NULL,
   1931      1.159    dyoung 		       CTLFLAG_PERMANENT|CTLFLAG_READONLY,
   1932      1.159    dyoung 		       CTLTYPE_INT, "entries",
   1933      1.159    dyoung 		       SYSCTL_DESCR("Maximum number of vestigial TIME_WAIT entries"),
   1934      1.159    dyoung 		       NULL, 0, &tcp_vtw_entries, 0, CTL_CREATE, CTL_EOL);
   1935       1.86    atatat }
   1936       1.86    atatat 
   1937      1.157     pooka void
   1938      1.157     pooka tcp_usrreq_init(void)
   1939       1.76  christos {
   1940       1.76  christos 
   1941      1.157     pooka #ifdef INET
   1942      1.157     pooka 	sysctl_net_inet_tcp_setup2(NULL, PF_INET, "inet", "tcp");
   1943      1.157     pooka #endif
   1944       1.86    atatat #ifdef INET6
   1945      1.157     pooka 	sysctl_net_inet_tcp_setup2(NULL, PF_INET6, "inet6", "tcp6");
   1946      1.157     pooka #endif
   1947        1.1       cgd }
   1948