1 /* 2 * Copyright (c) 1982, 1986, 1988 Regents of the University of California. 3 * All rights reserved. 4 * 5 * %sccs.include.redist.c% 6 * 7 * @(#)tcp_usrreq.c 7.20 (Berkeley) 06/04/93 8 */ 9 10 #include <sys/param.h> 11 #include <sys/systm.h> 12 #include <sys/malloc.h> 13 #include <sys/mbuf.h> 14 #include <sys/socket.h> 15 #include <sys/socketvar.h> 16 #include <sys/protosw.h> 17 #include <sys/errno.h> 18 #include <sys/stat.h> 19 20 #include <net/if.h> 21 #include <net/route.h> 22 23 #include <netinet/in.h> 24 #include <netinet/in_systm.h> 25 #include <netinet/ip.h> 26 #include <netinet/in_pcb.h> 27 #include <netinet/ip_var.h> 28 #include <netinet/tcp.h> 29 #include <netinet/tcp_fsm.h> 30 #include <netinet/tcp_seq.h> 31 #include <netinet/tcp_timer.h> 32 #include <netinet/tcp_var.h> 33 #include <netinet/tcpip.h> 34 #include <netinet/tcp_debug.h> 35 36 /* 37 * TCP protocol interface to socket abstraction. 38 */ 39 extern char *tcpstates[]; 40 41 /* 42 * Process a TCP user request for TCP tb. If this is a send request 43 * then m is the mbuf chain of send data. If this is a timer expiration 44 * (called from the software clock routine), then timertype tells which timer. 45 */ 46 /*ARGSUSED*/ 47 int 48 tcp_usrreq(so, req, m, nam, control) 49 struct socket *so; 50 int req; 51 struct mbuf *m, *nam, *control; 52 { 53 register struct inpcb *inp; 54 register struct tcpcb *tp; 55 int s; 56 int error = 0; 57 int ostate; 58 59 if (req == PRU_CONTROL) 60 return (in_control(so, (int)m, (caddr_t)nam, 61 (struct ifnet *)control)); 62 if (control && control->m_len) { 63 m_freem(control); 64 if (m) 65 m_freem(m); 66 return (EINVAL); 67 } 68 69 s = splnet(); 70 inp = sotoinpcb(so); 71 /* 72 * When a TCP is attached to a socket, then there will be 73 * a (struct inpcb) pointed at by the socket, and this 74 * structure will point at a subsidary (struct tcpcb). 75 */ 76 if (inp == 0 && req != PRU_ATTACH) { 77 splx(s); 78 return (EINVAL); /* XXX */ 79 } 80 if (inp) { 81 tp = intotcpcb(inp); 82 /* WHAT IF TP IS 0? */ 83 #ifdef KPROF 84 tcp_acounts[tp->t_state][req]++; 85 #endif 86 ostate = tp->t_state; 87 } else 88 ostate = 0; 89 switch (req) { 90 91 /* 92 * TCP attaches to socket via PRU_ATTACH, reserving space, 93 * and an internet control block. 94 */ 95 case PRU_ATTACH: 96 if (inp) { 97 error = EISCONN; 98 break; 99 } 100 error = tcp_attach(so); 101 if (error) 102 break; 103 if ((so->so_options & SO_LINGER) && so->so_linger == 0) 104 so->so_linger = TCP_LINGERTIME; 105 tp = sototcpcb(so); 106 break; 107 108 /* 109 * PRU_DETACH detaches the TCP protocol from the socket. 110 * If the protocol state is non-embryonic, then can't 111 * do this directly: have to initiate a PRU_DISCONNECT, 112 * which may finish later; embryonic TCB's can just 113 * be discarded here. 114 */ 115 case PRU_DETACH: 116 if (tp->t_state > TCPS_LISTEN) 117 tp = tcp_disconnect(tp); 118 else 119 tp = tcp_close(tp); 120 break; 121 122 /* 123 * Give the socket an address. 124 */ 125 case PRU_BIND: 126 error = in_pcbbind(inp, nam); 127 if (error) 128 break; 129 break; 130 131 /* 132 * Prepare to accept connections. 133 */ 134 case PRU_LISTEN: 135 if (inp->inp_lport == 0) 136 error = in_pcbbind(inp, (struct mbuf *)0); 137 if (error == 0) 138 tp->t_state = TCPS_LISTEN; 139 break; 140 141 /* 142 * Initiate connection to peer. 143 * Create a template for use in transmissions on this connection. 144 * Enter SYN_SENT state, and mark socket as connecting. 145 * Start keep-alive timer, and seed output sequence space. 146 * Send initial segment on connection. 147 */ 148 case PRU_CONNECT: 149 if (inp->inp_lport == 0) { 150 error = in_pcbbind(inp, (struct mbuf *)0); 151 if (error) 152 break; 153 } 154 error = in_pcbconnect(inp, nam); 155 if (error) 156 break; 157 tp->t_template = tcp_template(tp); 158 if (tp->t_template == 0) { 159 in_pcbdisconnect(inp); 160 error = ENOBUFS; 161 break; 162 } 163 /* Compute window scaling to request. */ 164 while (tp->request_r_scale < TCP_MAX_WINSHIFT && 165 (TCP_MAXWIN << tp->request_r_scale) < so->so_rcv.sb_hiwat) 166 tp->request_r_scale++; 167 soisconnecting(so); 168 tcpstat.tcps_connattempt++; 169 tp->t_state = TCPS_SYN_SENT; 170 tp->t_timer[TCPT_KEEP] = TCPTV_KEEP_INIT; 171 tp->iss = tcp_iss; tcp_iss += TCP_ISSINCR/2; 172 tcp_sendseqinit(tp); 173 error = tcp_output(tp); 174 break; 175 176 /* 177 * Create a TCP connection between two sockets. 178 */ 179 case PRU_CONNECT2: 180 error = EOPNOTSUPP; 181 break; 182 183 /* 184 * Initiate disconnect from peer. 185 * If connection never passed embryonic stage, just drop; 186 * else if don't need to let data drain, then can just drop anyways, 187 * else have to begin TCP shutdown process: mark socket disconnecting, 188 * drain unread data, state switch to reflect user close, and 189 * send segment (e.g. FIN) to peer. Socket will be really disconnected 190 * when peer sends FIN and acks ours. 191 * 192 * SHOULD IMPLEMENT LATER PRU_CONNECT VIA REALLOC TCPCB. 193 */ 194 case PRU_DISCONNECT: 195 tp = tcp_disconnect(tp); 196 break; 197 198 /* 199 * Accept a connection. Essentially all the work is 200 * done at higher levels; just return the address 201 * of the peer, storing through addr. 202 */ 203 case PRU_ACCEPT: 204 in_setpeeraddr(inp, nam); 205 break; 206 207 /* 208 * Mark the connection as being incapable of further output. 209 */ 210 case PRU_SHUTDOWN: 211 socantsendmore(so); 212 tp = tcp_usrclosed(tp); 213 if (tp) 214 error = tcp_output(tp); 215 break; 216 217 /* 218 * After a receive, possibly send window update to peer. 219 */ 220 case PRU_RCVD: 221 (void) tcp_output(tp); 222 break; 223 224 /* 225 * Do a send by putting data in output queue and updating urgent 226 * marker if URG set. Possibly send more data. 227 */ 228 case PRU_SEND: 229 sbappend(&so->so_snd, m); 230 error = tcp_output(tp); 231 break; 232 233 /* 234 * Abort the TCP. 235 */ 236 case PRU_ABORT: 237 tp = tcp_drop(tp, ECONNABORTED); 238 break; 239 240 case PRU_SENSE: 241 ((struct stat *) m)->st_blksize = so->so_snd.sb_hiwat; 242 (void) splx(s); 243 return (0); 244 245 case PRU_RCVOOB: 246 if ((so->so_oobmark == 0 && 247 (so->so_state & SS_RCVATMARK) == 0) || 248 so->so_options & SO_OOBINLINE || 249 tp->t_oobflags & TCPOOB_HADDATA) { 250 error = EINVAL; 251 break; 252 } 253 if ((tp->t_oobflags & TCPOOB_HAVEDATA) == 0) { 254 error = EWOULDBLOCK; 255 break; 256 } 257 m->m_len = 1; 258 *mtod(m, caddr_t) = tp->t_iobc; 259 if (((int)nam & MSG_PEEK) == 0) 260 tp->t_oobflags ^= (TCPOOB_HAVEDATA | TCPOOB_HADDATA); 261 break; 262 263 case PRU_SENDOOB: 264 if (sbspace(&so->so_snd) < -512) { 265 m_freem(m); 266 error = ENOBUFS; 267 break; 268 } 269 /* 270 * According to RFC961 (Assigned Protocols), 271 * the urgent pointer points to the last octet 272 * of urgent data. We continue, however, 273 * to consider it to indicate the first octet 274 * of data past the urgent section. 275 * Otherwise, snd_up should be one lower. 276 */ 277 sbappend(&so->so_snd, m); 278 tp->snd_up = tp->snd_una + so->so_snd.sb_cc; 279 tp->t_force = 1; 280 error = tcp_output(tp); 281 tp->t_force = 0; 282 break; 283 284 case PRU_SOCKADDR: 285 in_setsockaddr(inp, nam); 286 break; 287 288 case PRU_PEERADDR: 289 in_setpeeraddr(inp, nam); 290 break; 291 292 /* 293 * TCP slow timer went off; going through this 294 * routine for tracing's sake. 295 */ 296 case PRU_SLOWTIMO: 297 tp = tcp_timers(tp, (int)nam); 298 req |= (int)nam << 8; /* for debug's sake */ 299 break; 300 301 default: 302 panic("tcp_usrreq"); 303 } 304 if (tp && (so->so_options & SO_DEBUG)) 305 tcp_trace(TA_USER, ostate, tp, (struct tcpiphdr *)0, req); 306 splx(s); 307 return (error); 308 } 309 310 int 311 tcp_ctloutput(op, so, level, optname, mp) 312 int op; 313 struct socket *so; 314 int level, optname; 315 struct mbuf **mp; 316 { 317 int error = 0, s; 318 struct inpcb *inp; 319 register struct tcpcb *tp; 320 register struct mbuf *m; 321 register int i; 322 323 s = splnet(); 324 inp = sotoinpcb(so); 325 if (inp == NULL) { 326 splx(s); 327 return (ECONNRESET); 328 } 329 if (level != IPPROTO_TCP) { 330 error = ip_ctloutput(op, so, level, optname, mp); 331 splx(s); 332 return (error); 333 } 334 tp = intotcpcb(inp); 335 336 switch (op) { 337 338 case PRCO_SETOPT: 339 m = *mp; 340 switch (optname) { 341 342 case TCP_NODELAY: 343 if (m == NULL || m->m_len < sizeof (int)) 344 error = EINVAL; 345 else if (*mtod(m, int *)) 346 tp->t_flags |= TF_NODELAY; 347 else 348 tp->t_flags &= ~TF_NODELAY; 349 break; 350 351 case TCP_MAXSEG: 352 if (m && (i = *mtod(m, int *)) > 0 && i <= tp->t_maxseg) 353 tp->t_maxseg = i; 354 else 355 error = EINVAL; 356 break; 357 358 default: 359 error = EINVAL; 360 break; 361 } 362 if (m) 363 (void) m_free(m); 364 break; 365 366 case PRCO_GETOPT: 367 *mp = m = m_get(M_WAIT, MT_SOOPTS); 368 m->m_len = sizeof(int); 369 370 switch (optname) { 371 case TCP_NODELAY: 372 *mtod(m, int *) = tp->t_flags & TF_NODELAY; 373 break; 374 case TCP_MAXSEG: 375 *mtod(m, int *) = tp->t_maxseg; 376 break; 377 default: 378 error = EINVAL; 379 break; 380 } 381 break; 382 } 383 splx(s); 384 return (error); 385 } 386 387 u_long tcp_sendspace = 1024*8; 388 u_long tcp_recvspace = 1024*8; 389 390 /* 391 * Attach TCP protocol to socket, allocating 392 * internet protocol control block, tcp control block, 393 * bufer space, and entering LISTEN state if to accept connections. 394 */ 395 int 396 tcp_attach(so) 397 struct socket *so; 398 { 399 register struct tcpcb *tp; 400 struct inpcb *inp; 401 int error; 402 403 if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) { 404 error = soreserve(so, tcp_sendspace, tcp_recvspace); 405 if (error) 406 return (error); 407 } 408 error = in_pcballoc(so, &tcb); 409 if (error) 410 return (error); 411 inp = sotoinpcb(so); 412 tp = tcp_newtcpcb(inp); 413 if (tp == 0) { 414 int nofd = so->so_state & SS_NOFDREF; /* XXX */ 415 416 so->so_state &= ~SS_NOFDREF; /* don't free the socket yet */ 417 in_pcbdetach(inp); 418 so->so_state |= nofd; 419 return (ENOBUFS); 420 } 421 tp->t_state = TCPS_CLOSED; 422 return (0); 423 } 424 425 /* 426 * Initiate (or continue) disconnect. 427 * If embryonic state, just send reset (once). 428 * If in ``let data drain'' option and linger null, just drop. 429 * Otherwise (hard), mark socket disconnecting and drop 430 * current input data; switch states based on user close, and 431 * send segment to peer (with FIN). 432 */ 433 struct tcpcb * 434 tcp_disconnect(tp) 435 register struct tcpcb *tp; 436 { 437 struct socket *so = tp->t_inpcb->inp_socket; 438 439 if (tp->t_state < TCPS_ESTABLISHED) 440 tp = tcp_close(tp); 441 else if ((so->so_options & SO_LINGER) && so->so_linger == 0) 442 tp = tcp_drop(tp, 0); 443 else { 444 soisdisconnecting(so); 445 sbflush(&so->so_rcv); 446 tp = tcp_usrclosed(tp); 447 if (tp) 448 (void) tcp_output(tp); 449 } 450 return (tp); 451 } 452 453 /* 454 * User issued close, and wish to trail through shutdown states: 455 * if never received SYN, just forget it. If got a SYN from peer, 456 * but haven't sent FIN, then go to FIN_WAIT_1 state to send peer a FIN. 457 * If already got a FIN from peer, then almost done; go to LAST_ACK 458 * state. In all other cases, have already sent FIN to peer (e.g. 459 * after PRU_SHUTDOWN), and just have to play tedious game waiting 460 * for peer to send FIN or not respond to keep-alives, etc. 461 * We can let the user exit from the close as soon as the FIN is acked. 462 */ 463 struct tcpcb * 464 tcp_usrclosed(tp) 465 register struct tcpcb *tp; 466 { 467 468 switch (tp->t_state) { 469 470 case TCPS_CLOSED: 471 case TCPS_LISTEN: 472 case TCPS_SYN_SENT: 473 tp->t_state = TCPS_CLOSED; 474 tp = tcp_close(tp); 475 break; 476 477 case TCPS_SYN_RECEIVED: 478 case TCPS_ESTABLISHED: 479 tp->t_state = TCPS_FIN_WAIT_1; 480 break; 481 482 case TCPS_CLOSE_WAIT: 483 tp->t_state = TCPS_LAST_ACK; 484 break; 485 } 486 if (tp && tp->t_state >= TCPS_FIN_WAIT_2) 487 soisdisconnected(tp->t_inpcb->inp_socket); 488 return (tp); 489 } 490