Home | History | Annotate | Line # | Download | only in dev
kttcp.c revision 1.13
      1  1.13      fvdl /*	$NetBSD: kttcp.c,v 1.13 2003/06/29 22:29:59 fvdl Exp $	*/
      2   1.1   thorpej 
      3   1.1   thorpej /*
      4   1.1   thorpej  * Copyright (c) 2002 Wasabi Systems, Inc.
      5   1.1   thorpej  * All rights reserved.
      6   1.1   thorpej  *
      7   1.1   thorpej  * Written by Frank van der Linden and Jason R. Thorpe for
      8   1.1   thorpej  * Wasabi Systems, Inc.
      9   1.1   thorpej  *
     10   1.1   thorpej  * Redistribution and use in source and binary forms, with or without
     11   1.1   thorpej  * modification, are permitted provided that the following conditions
     12   1.1   thorpej  * are met:
     13   1.1   thorpej  * 1. Redistributions of source code must retain the above copyright
     14   1.1   thorpej  *    notice, this list of conditions and the following disclaimer.
     15   1.1   thorpej  * 2. Redistributions in binary form must reproduce the above copyright
     16   1.1   thorpej  *    notice, this list of conditions and the following disclaimer in the
     17   1.1   thorpej  *    documentation and/or other materials provided with the distribution.
     18   1.1   thorpej  * 3. All advertising materials mentioning features or use of this software
     19   1.1   thorpej  *    must display the following acknowledgement:
     20   1.1   thorpej  *	This product includes software developed for the NetBSD Project by
     21   1.1   thorpej  *	Wasabi Systems, Inc.
     22   1.1   thorpej  * 4. The name of Wasabi Systems, Inc. may not be used to endorse
     23   1.1   thorpej  *    or promote products derived from this software without specific prior
     24   1.1   thorpej  *    written permission.
     25   1.1   thorpej  *
     26   1.1   thorpej  * THIS SOFTWARE IS PROVIDED BY WASABI SYSTEMS, INC. ``AS IS'' AND
     27   1.1   thorpej  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     28   1.1   thorpej  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     29   1.1   thorpej  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL WASABI SYSTEMS, INC
     30   1.1   thorpej  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     31   1.1   thorpej  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     32   1.1   thorpej  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     33   1.1   thorpej  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     34   1.1   thorpej  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     35   1.1   thorpej  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     36   1.1   thorpej  * POSSIBILITY OF SUCH DAMAGE.
     37   1.1   thorpej  */
     38   1.1   thorpej 
     39   1.1   thorpej /*
     40   1.1   thorpej  * kttcp.c --
     41   1.1   thorpej  *
     42   1.1   thorpej  *	This module provides kernel support for testing network
     43   1.1   thorpej  *	throughput from the perspective of the kernel.  It is
     44   1.1   thorpej  *	similar in spirit to the classic ttcp network benchmark
     45   1.1   thorpej  *	program, the main difference being that with kttcp, the
     46   1.1   thorpej  *	kernel is the source and sink of the data.
     47   1.1   thorpej  *
     48   1.1   thorpej  *	Testing like this is useful for a few reasons:
     49   1.1   thorpej  *
     50   1.1   thorpej  *	1. This allows us to know what kind of performance we can
     51   1.1   thorpej  *	   expect from network applications that run in the kernel
     52   1.1   thorpej  *	   space, such as the NFS server or the NFS client.  These
     53   1.1   thorpej  *	   applications don't have to move the data to/from userspace,
     54   1.1   thorpej  *	   and so benchmark programs which run in userspace don't
     55   1.1   thorpej  *	   give us an accurate model.
     56   1.1   thorpej  *
     57   1.1   thorpej  *	2. Since data received is just thrown away, the receiver
     58   1.1   thorpej  *	   is very fast.  This can provide better exercise for the
     59   1.1   thorpej  *	   sender at the other end.
     60   1.1   thorpej  *
     61   1.1   thorpej  *	3. Since the NetBSD kernel currently uses a run-to-completion
     62   1.1   thorpej  *	   scheduling model, kttcp provides a benchmark model where
     63   1.1   thorpej  *	   preemption of the benchmark program is not an issue.
     64   1.1   thorpej  */
     65   1.1   thorpej 
     66   1.1   thorpej #include <sys/param.h>
     67   1.1   thorpej #include <sys/types.h>
     68   1.1   thorpej #include <sys/ioctl.h>
     69   1.1   thorpej #include <sys/file.h>
     70   1.1   thorpej #include <sys/filedesc.h>
     71   1.1   thorpej #include <sys/conf.h>
     72   1.1   thorpej #include <sys/systm.h>
     73   1.1   thorpej #include <sys/protosw.h>
     74   1.1   thorpej #include <sys/proc.h>
     75   1.1   thorpej #include <sys/resourcevar.h>
     76   1.1   thorpej #include <sys/signal.h>
     77   1.1   thorpej #include <sys/socketvar.h>
     78   1.1   thorpej #include <sys/socket.h>
     79   1.1   thorpej #include <sys/mbuf.h>
     80   1.7   thorpej #include <sys/sa.h>
     81   1.1   thorpej #include <sys/mount.h>
     82   1.1   thorpej #include <sys/syscallargs.h>
     83   1.1   thorpej 
     84   1.1   thorpej #include <dev/kttcpio.h>
     85   1.1   thorpej 
     86  1.13      fvdl static int kttcp_send(struct proc *p, struct kttcp_io_args *);
     87  1.13      fvdl static int kttcp_recv(struct proc *p, struct kttcp_io_args *);
     88   1.1   thorpej static int kttcp_sosend(struct socket *, unsigned long long,
     89  1.13      fvdl 			unsigned long long *, struct proc *, int);
     90   1.1   thorpej static int kttcp_soreceive(struct socket *, unsigned long long,
     91  1.13      fvdl 			   unsigned long long *, struct proc *, int *);
     92   1.1   thorpej 
     93   1.1   thorpej void	kttcpattach(int);
     94   1.1   thorpej 
     95   1.5   gehenna dev_type_ioctl(kttcpioctl);
     96   1.5   gehenna 
     97   1.5   gehenna const struct cdevsw kttcp_cdevsw = {
     98   1.5   gehenna 	nullopen, nullclose, noread, nowrite, kttcpioctl,
     99   1.6  jdolecek 	nostop, notty, nopoll, nommap, nokqfilter,
    100   1.5   gehenna };
    101   1.1   thorpej 
    102   1.1   thorpej void
    103   1.1   thorpej kttcpattach(int count)
    104   1.1   thorpej {
    105   1.1   thorpej 	/* Do nothing. */
    106   1.1   thorpej }
    107   1.1   thorpej 
    108   1.1   thorpej int
    109  1.13      fvdl kttcpioctl(dev_t dev, u_long cmd, caddr_t data, int flag, struct proc *p)
    110   1.1   thorpej {
    111   1.1   thorpej 	int error;
    112   1.1   thorpej 
    113   1.1   thorpej 	if ((flag & FWRITE) == 0)
    114   1.1   thorpej 		return EPERM;
    115   1.1   thorpej 
    116   1.1   thorpej 	switch (cmd) {
    117   1.1   thorpej 	case KTTCP_IO_SEND:
    118  1.13      fvdl 		error = kttcp_send(p, (struct kttcp_io_args *) data);
    119   1.1   thorpej 		break;
    120   1.1   thorpej 
    121   1.1   thorpej 	case KTTCP_IO_RECV:
    122  1.13      fvdl 		error = kttcp_recv(p, (struct kttcp_io_args *) data);
    123   1.1   thorpej 		break;
    124   1.1   thorpej 
    125   1.1   thorpej 	default:
    126   1.1   thorpej 		return EINVAL;
    127   1.1   thorpej 	}
    128   1.1   thorpej 
    129   1.1   thorpej 	return error;
    130   1.1   thorpej }
    131   1.1   thorpej 
    132   1.1   thorpej static int
    133  1.13      fvdl kttcp_send(struct proc *p, struct kttcp_io_args *kio)
    134   1.1   thorpej {
    135   1.1   thorpej 	struct file *fp;
    136   1.1   thorpej 	int error;
    137   1.1   thorpej 	struct timeval t0, t1;
    138   1.1   thorpej 	unsigned long long len, done;
    139   1.1   thorpej 
    140   1.1   thorpej 	if (kio->kio_totalsize >= KTTCP_MAX_XMIT)
    141   1.1   thorpej 		return EINVAL;
    142   1.1   thorpej 
    143  1.13      fvdl 	fp = fd_getfile(p->p_fd, kio->kio_socket);
    144   1.1   thorpej 	if (fp == NULL)
    145   1.1   thorpej 		return EBADF;
    146   1.8    briggs 	FILE_USE(fp);
    147   1.8    briggs 	if (fp->f_type != DTYPE_SOCKET) {
    148  1.13      fvdl 		FILE_UNUSE(fp, p);
    149   1.1   thorpej 		return EFTYPE;
    150   1.8    briggs 	}
    151   1.1   thorpej 
    152   1.1   thorpej 	len = kio->kio_totalsize;
    153   1.1   thorpej 	microtime(&t0);
    154   1.1   thorpej 	do {
    155   1.1   thorpej 		error = kttcp_sosend((struct socket *)fp->f_data, len,
    156  1.13      fvdl 		    &done, p, 0);
    157   1.1   thorpej 		len -= done;
    158   1.1   thorpej 	} while (error == 0 && len > 0);
    159   1.8    briggs 
    160  1.13      fvdl 	FILE_UNUSE(fp, p);
    161   1.8    briggs 
    162   1.1   thorpej 	microtime(&t1);
    163   1.1   thorpej 	if (error != 0)
    164   1.1   thorpej 		return error;
    165   1.1   thorpej 	timersub(&t1, &t0, &kio->kio_elapsed);
    166   1.1   thorpej 
    167   1.1   thorpej 	kio->kio_bytesdone = kio->kio_totalsize - len;
    168   1.1   thorpej 
    169   1.1   thorpej 	return 0;
    170   1.1   thorpej }
    171   1.1   thorpej 
    172   1.1   thorpej static int
    173  1.13      fvdl kttcp_recv(struct proc *p, struct kttcp_io_args *kio)
    174   1.1   thorpej {
    175   1.1   thorpej 	struct file *fp;
    176   1.1   thorpej 	int error;
    177   1.1   thorpej 	struct timeval t0, t1;
    178   1.1   thorpej 	unsigned long long len, done;
    179   1.1   thorpej 
    180   1.1   thorpej 	if (kio->kio_totalsize > KTTCP_MAX_XMIT)
    181   1.1   thorpej 		return EINVAL;
    182   1.1   thorpej 
    183  1.13      fvdl 	fp = fd_getfile(p->p_fd, kio->kio_socket);
    184   1.8    briggs 	if (fp == NULL)
    185   1.1   thorpej 		return EBADF;
    186   1.8    briggs 	FILE_USE(fp);
    187   1.8    briggs 	if (fp->f_type != DTYPE_SOCKET) {
    188  1.13      fvdl 		FILE_UNUSE(fp, p);
    189   1.8    briggs 		return EBADF;
    190   1.8    briggs 	}
    191   1.1   thorpej 	len = kio->kio_totalsize;
    192   1.1   thorpej 	microtime(&t0);
    193   1.1   thorpej 	do {
    194   1.1   thorpej 		error = kttcp_soreceive((struct socket *)fp->f_data,
    195  1.13      fvdl 		    len, &done, p, NULL);
    196   1.1   thorpej 		len -= done;
    197   1.1   thorpej 	} while (error == 0 && len > 0 && done > 0);
    198   1.8    briggs 
    199  1.13      fvdl 	FILE_UNUSE(fp, p);
    200   1.8    briggs 
    201   1.1   thorpej 	microtime(&t1);
    202   1.1   thorpej 	if (error == EPIPE)
    203   1.1   thorpej 		error = 0;
    204   1.1   thorpej 	if (error != 0)
    205   1.1   thorpej 		return error;
    206   1.1   thorpej 	timersub(&t1, &t0, &kio->kio_elapsed);
    207   1.1   thorpej 
    208   1.1   thorpej 	kio->kio_bytesdone = kio->kio_totalsize - len;
    209   1.1   thorpej 
    210   1.1   thorpej 	return 0;
    211   1.1   thorpej }
    212   1.1   thorpej 
    213   1.1   thorpej #define SBLOCKWAIT(f)   (((f) & MSG_DONTWAIT) ? M_NOWAIT : M_WAITOK)
    214   1.1   thorpej 
    215   1.1   thorpej /*
    216   1.1   thorpej  * Slightly changed version of sosend()
    217   1.1   thorpej  */
    218   1.1   thorpej static int
    219   1.1   thorpej kttcp_sosend(struct socket *so, unsigned long long slen,
    220  1.13      fvdl 	     unsigned long long *done, struct proc *p, int flags)
    221   1.1   thorpej {
    222   1.1   thorpej 	struct mbuf **mp, *m, *top;
    223   1.1   thorpej 	long space, len, mlen;
    224   1.1   thorpej 	int error, s, dontroute, atomic;
    225   1.1   thorpej 	long long resid;
    226   1.1   thorpej 
    227   1.1   thorpej 	atomic = sosendallatonce(so);
    228   1.1   thorpej 	resid = slen;
    229   1.1   thorpej 	top = NULL;
    230   1.1   thorpej 	/*
    231   1.1   thorpej 	 * In theory resid should be unsigned.
    232   1.1   thorpej 	 * However, space must be signed, as it might be less than 0
    233   1.1   thorpej 	 * if we over-committed, and we must use a signed comparison
    234   1.1   thorpej 	 * of space and resid.  On the other hand, a negative resid
    235   1.1   thorpej 	 * causes us to loop sending 0-length segments to the protocol.
    236   1.1   thorpej 	 */
    237   1.1   thorpej 	if (resid < 0) {
    238   1.1   thorpej 		error = EINVAL;
    239   1.1   thorpej 		goto out;
    240   1.1   thorpej 	}
    241   1.1   thorpej 	dontroute =
    242   1.1   thorpej 	    (flags & MSG_DONTROUTE) && (so->so_options & SO_DONTROUTE) == 0 &&
    243   1.1   thorpej 	    (so->so_proto->pr_flags & PR_ATOMIC);
    244  1.13      fvdl 	p->p_stats->p_ru.ru_msgsnd++;
    245   1.1   thorpej #define	snderr(errno)	{ error = errno; splx(s); goto release; }
    246   1.1   thorpej 
    247   1.1   thorpej  restart:
    248   1.1   thorpej 	if ((error = sblock(&so->so_snd, SBLOCKWAIT(flags))) != 0)
    249   1.1   thorpej 		goto out;
    250   1.1   thorpej 	do {
    251   1.1   thorpej 		s = splsoftnet();
    252   1.1   thorpej 		if (so->so_state & SS_CANTSENDMORE)
    253   1.1   thorpej 			snderr(EPIPE);
    254   1.1   thorpej 		if (so->so_error) {
    255   1.1   thorpej 			error = so->so_error;
    256   1.1   thorpej 			so->so_error = 0;
    257   1.1   thorpej 			splx(s);
    258   1.1   thorpej 			goto release;
    259   1.1   thorpej 		}
    260   1.1   thorpej 		if ((so->so_state & SS_ISCONNECTED) == 0) {
    261   1.1   thorpej 			if (so->so_proto->pr_flags & PR_CONNREQUIRED) {
    262   1.1   thorpej 				if ((so->so_state & SS_ISCONFIRMING) == 0)
    263   1.1   thorpej 					snderr(ENOTCONN);
    264   1.1   thorpej 			} else
    265   1.1   thorpej 				snderr(EDESTADDRREQ);
    266   1.1   thorpej 		}
    267   1.1   thorpej 		space = sbspace(&so->so_snd);
    268   1.1   thorpej 		if (flags & MSG_OOB)
    269   1.1   thorpej 			space += 1024;
    270   1.1   thorpej 		if ((atomic && resid > so->so_snd.sb_hiwat))
    271   1.1   thorpej 			snderr(EMSGSIZE);
    272   1.1   thorpej 		if (space < resid && (atomic || space < so->so_snd.sb_lowat)) {
    273   1.1   thorpej 			if (so->so_state & SS_NBIO)
    274   1.1   thorpej 				snderr(EWOULDBLOCK);
    275   1.2   thorpej 			SBLASTRECORDCHK(&so->so_rcv,
    276   1.2   thorpej 			    "kttcp_soreceive sbwait 1");
    277   1.2   thorpej 			SBLASTMBUFCHK(&so->so_rcv,
    278   1.2   thorpej 			    "kttcp_soreceive sbwait 1");
    279   1.1   thorpej 			sbunlock(&so->so_snd);
    280   1.1   thorpej 			error = sbwait(&so->so_snd);
    281   1.1   thorpej 			splx(s);
    282   1.1   thorpej 			if (error)
    283   1.1   thorpej 				goto out;
    284   1.1   thorpej 			goto restart;
    285   1.1   thorpej 		}
    286   1.1   thorpej 		splx(s);
    287   1.1   thorpej 		mp = &top;
    288   1.1   thorpej 		do {
    289   1.1   thorpej 			do {
    290   1.1   thorpej 				if (top == 0) {
    291   1.9      matt 					m = m_gethdr(M_WAIT, MT_DATA);
    292   1.1   thorpej 					mlen = MHLEN;
    293   1.1   thorpej 					m->m_pkthdr.len = 0;
    294  1.12    simonb 					m->m_pkthdr.rcvif = NULL;
    295   1.1   thorpej 				} else {
    296   1.9      matt 					m = m_get(M_WAIT, MT_DATA);
    297   1.1   thorpej 					mlen = MLEN;
    298   1.1   thorpej 				}
    299   1.1   thorpej 				if (resid >= MINCLSIZE && space >= MCLBYTES) {
    300   1.9      matt 					m_clget(m, M_WAIT);
    301   1.1   thorpej 					if ((m->m_flags & M_EXT) == 0)
    302   1.1   thorpej 						goto nopages;
    303   1.1   thorpej 					mlen = MCLBYTES;
    304   1.1   thorpej #ifdef	MAPPED_MBUFS
    305   1.1   thorpej 					len = lmin(MCLBYTES, resid);
    306   1.1   thorpej #else
    307   1.1   thorpej 					if (atomic && top == 0) {
    308   1.1   thorpej 						len = lmin(MCLBYTES - max_hdr,
    309   1.1   thorpej 						    resid);
    310   1.1   thorpej 						m->m_data += max_hdr;
    311   1.1   thorpej 					} else
    312   1.1   thorpej 						len = lmin(MCLBYTES, resid);
    313   1.1   thorpej #endif
    314   1.1   thorpej 					space -= len;
    315   1.1   thorpej 				} else {
    316   1.1   thorpej nopages:
    317   1.1   thorpej 					len = lmin(lmin(mlen, resid), space);
    318   1.1   thorpej 					space -= len;
    319   1.1   thorpej 					/*
    320   1.1   thorpej 					 * For datagram protocols, leave room
    321   1.1   thorpej 					 * for protocol headers in first mbuf.
    322   1.1   thorpej 					 */
    323   1.1   thorpej 					if (atomic && top == 0 && len < mlen)
    324   1.1   thorpej 						MH_ALIGN(m, len);
    325   1.1   thorpej 				}
    326   1.1   thorpej 				resid -= len;
    327   1.1   thorpej 				m->m_len = len;
    328   1.1   thorpej 				*mp = m;
    329   1.1   thorpej 				top->m_pkthdr.len += len;
    330   1.1   thorpej 				if (error)
    331   1.1   thorpej 					goto release;
    332   1.1   thorpej 				mp = &m->m_next;
    333   1.1   thorpej 				if (resid <= 0) {
    334   1.1   thorpej 					if (flags & MSG_EOR)
    335   1.1   thorpej 						top->m_flags |= M_EOR;
    336   1.1   thorpej 					break;
    337   1.1   thorpej 				}
    338   1.1   thorpej 			} while (space > 0 && atomic);
    339   1.1   thorpej 
    340   1.1   thorpej 			s = splsoftnet();
    341   1.1   thorpej 
    342   1.1   thorpej 			if (so->so_state & SS_CANTSENDMORE)
    343   1.1   thorpej 				snderr(EPIPE);
    344   1.1   thorpej 
    345   1.1   thorpej 			if (dontroute)
    346   1.1   thorpej 				so->so_options |= SO_DONTROUTE;
    347   1.1   thorpej 			if (resid > 0)
    348   1.1   thorpej 				so->so_state |= SS_MORETOCOME;
    349   1.1   thorpej 			error = (*so->so_proto->pr_usrreq)(so,
    350   1.1   thorpej 			    (flags & MSG_OOB) ? PRU_SENDOOB : PRU_SEND,
    351  1.13      fvdl 			    top, NULL, NULL, p);
    352   1.1   thorpej 			if (dontroute)
    353   1.1   thorpej 				so->so_options &= ~SO_DONTROUTE;
    354   1.1   thorpej 			if (resid > 0)
    355   1.1   thorpej 				so->so_state &= ~SS_MORETOCOME;
    356   1.1   thorpej 			splx(s);
    357   1.1   thorpej 
    358   1.1   thorpej 			top = 0;
    359   1.1   thorpej 			mp = &top;
    360   1.1   thorpej 			if (error)
    361   1.1   thorpej 				goto release;
    362   1.1   thorpej 		} while (resid && space > 0);
    363   1.1   thorpej 	} while (resid);
    364   1.1   thorpej 
    365   1.1   thorpej  release:
    366   1.1   thorpej 	sbunlock(&so->so_snd);
    367   1.1   thorpej  out:
    368   1.1   thorpej 	if (top)
    369   1.1   thorpej 		m_freem(top);
    370   1.1   thorpej 	*done = slen - resid;
    371   1.1   thorpej #if 0
    372   1.1   thorpej 	printf("sosend: error %d slen %llu resid %lld\n", error, slen, resid);
    373   1.1   thorpej #endif
    374   1.1   thorpej 	return (error);
    375   1.1   thorpej }
    376   1.1   thorpej 
    377   1.1   thorpej static int
    378   1.1   thorpej kttcp_soreceive(struct socket *so, unsigned long long slen,
    379  1.13      fvdl 		unsigned long long *done, struct proc *p, int *flagsp)
    380   1.1   thorpej {
    381   1.1   thorpej 	struct mbuf *m, **mp;
    382   1.1   thorpej 	int flags, len, error, s, offset, moff, type;
    383   1.1   thorpej 	long long orig_resid, resid;
    384   1.1   thorpej 	struct protosw	*pr;
    385   1.1   thorpej 	struct mbuf *nextrecord;
    386   1.1   thorpej 
    387   1.1   thorpej 	pr = so->so_proto;
    388   1.1   thorpej 	mp = NULL;
    389   1.1   thorpej 	type = 0;
    390   1.1   thorpej 	resid = orig_resid = slen;
    391   1.1   thorpej 	if (flagsp)
    392   1.1   thorpej 		flags = *flagsp &~ MSG_EOR;
    393   1.1   thorpej 	else
    394   1.1   thorpej  		flags = 0;
    395   1.1   thorpej 	if (flags & MSG_OOB) {
    396   1.1   thorpej 		m = m_get(M_WAIT, MT_DATA);
    397   1.1   thorpej 		error = (*pr->pr_usrreq)(so, PRU_RCVOOB, m,
    398  1.12    simonb 		    (struct mbuf *)(long)(flags & MSG_PEEK), NULL, NULL);
    399   1.1   thorpej 		if (error)
    400   1.1   thorpej 			goto bad;
    401   1.1   thorpej 		do {
    402   1.1   thorpej 			resid -= min(resid, m->m_len);
    403   1.1   thorpej 			m = m_free(m);
    404   1.1   thorpej 		} while (resid && error == 0 && m);
    405   1.1   thorpej  bad:
    406   1.1   thorpej 		if (m)
    407   1.1   thorpej 			m_freem(m);
    408   1.1   thorpej 		return (error);
    409   1.1   thorpej 	}
    410   1.1   thorpej 	if (mp)
    411  1.12    simonb 		*mp = NULL;
    412   1.1   thorpej 	if (so->so_state & SS_ISCONFIRMING && resid)
    413  1.12    simonb 		(*pr->pr_usrreq)(so, PRU_RCVD, NULL, NULL, NULL, NULL);
    414   1.1   thorpej 
    415   1.1   thorpej  restart:
    416   1.1   thorpej 	if ((error = sblock(&so->so_rcv, SBLOCKWAIT(flags))) != 0)
    417   1.1   thorpej 		return (error);
    418   1.1   thorpej 	s = splsoftnet();
    419   1.1   thorpej 
    420   1.1   thorpej 	m = so->so_rcv.sb_mb;
    421   1.1   thorpej 	/*
    422   1.1   thorpej 	 * If we have less data than requested, block awaiting more
    423   1.1   thorpej 	 * (subject to any timeout) if:
    424   1.1   thorpej 	 *   1. the current count is less than the low water mark,
    425   1.1   thorpej 	 *   2. MSG_WAITALL is set, and it is possible to do the entire
    426   1.1   thorpej 	 *	receive operation at once if we block (resid <= hiwat), or
    427   1.1   thorpej 	 *   3. MSG_DONTWAIT is not set.
    428   1.1   thorpej 	 * If MSG_WAITALL is set but resid is larger than the receive buffer,
    429   1.1   thorpej 	 * we have to do the receive in sections, and thus risk returning
    430   1.1   thorpej 	 * a short count if a timeout or signal occurs after we start.
    431   1.1   thorpej 	 */
    432  1.13      fvdl 	if (m == NULL || (((flags & MSG_DONTWAIT) == 0 &&
    433   1.1   thorpej 	    so->so_rcv.sb_cc < resid) &&
    434   1.1   thorpej 	    (so->so_rcv.sb_cc < so->so_rcv.sb_lowat ||
    435   1.1   thorpej 	    ((flags & MSG_WAITALL) && resid <= so->so_rcv.sb_hiwat)) &&
    436  1.13      fvdl 	    m->m_nextpkt == NULL && (pr->pr_flags & PR_ATOMIC) == 0)) {
    437   1.1   thorpej #ifdef DIAGNOSTIC
    438  1.13      fvdl 		if (m == NULL && so->so_rcv.sb_cc)
    439   1.1   thorpej 			panic("receive 1");
    440   1.1   thorpej #endif
    441   1.1   thorpej 		if (so->so_error) {
    442   1.1   thorpej 			if (m)
    443   1.1   thorpej 				goto dontblock;
    444   1.1   thorpej 			error = so->so_error;
    445   1.1   thorpej 			if ((flags & MSG_PEEK) == 0)
    446   1.1   thorpej 				so->so_error = 0;
    447   1.1   thorpej 			goto release;
    448   1.1   thorpej 		}
    449   1.1   thorpej 		if (so->so_state & SS_CANTRCVMORE) {
    450   1.1   thorpej 			if (m)
    451   1.1   thorpej 				goto dontblock;
    452   1.1   thorpej 			else
    453   1.1   thorpej 				goto release;
    454   1.1   thorpej 		}
    455   1.1   thorpej 		for (; m; m = m->m_next)
    456   1.1   thorpej 			if (m->m_type == MT_OOBDATA  || (m->m_flags & M_EOR)) {
    457   1.1   thorpej 				m = so->so_rcv.sb_mb;
    458   1.1   thorpej 				goto dontblock;
    459   1.1   thorpej 			}
    460   1.1   thorpej 		if ((so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) == 0 &&
    461   1.1   thorpej 		    (so->so_proto->pr_flags & PR_CONNREQUIRED)) {
    462   1.1   thorpej 			error = ENOTCONN;
    463   1.1   thorpej 			goto release;
    464   1.1   thorpej 		}
    465   1.1   thorpej 		if (resid == 0)
    466   1.1   thorpej 			goto release;
    467   1.1   thorpej 		if ((so->so_state & SS_NBIO) || (flags & MSG_DONTWAIT)) {
    468   1.1   thorpej 			error = EWOULDBLOCK;
    469   1.1   thorpej 			goto release;
    470   1.1   thorpej 		}
    471   1.1   thorpej 		sbunlock(&so->so_rcv);
    472   1.1   thorpej 		error = sbwait(&so->so_rcv);
    473   1.1   thorpej 		splx(s);
    474   1.1   thorpej 		if (error)
    475   1.1   thorpej 			return (error);
    476   1.1   thorpej 		goto restart;
    477   1.1   thorpej 	}
    478   1.1   thorpej  dontblock:
    479   1.2   thorpej 	/*
    480   1.2   thorpej 	 * On entry here, m points to the first record of the socket buffer.
    481   1.2   thorpej 	 * While we process the initial mbufs containing address and control
    482   1.2   thorpej 	 * info, we save a copy of m->m_nextpkt into nextrecord.
    483   1.2   thorpej 	 */
    484   1.1   thorpej #ifdef notyet /* XXXX */
    485  1.13      fvdl 	if (uio->uio_procp)
    486  1.13      fvdl 		uio->uio_procp->p_stats->p_ru.ru_msgrcv++;
    487   1.1   thorpej #endif
    488   1.2   thorpej 	KASSERT(m == so->so_rcv.sb_mb);
    489   1.2   thorpej 	SBLASTRECORDCHK(&so->so_rcv, "kttcp_soreceive 1");
    490   1.2   thorpej 	SBLASTMBUFCHK(&so->so_rcv, "kttcp_soreceive 1");
    491   1.1   thorpej 	nextrecord = m->m_nextpkt;
    492   1.1   thorpej 	if (pr->pr_flags & PR_ADDR) {
    493   1.1   thorpej #ifdef DIAGNOSTIC
    494   1.1   thorpej 		if (m->m_type != MT_SONAME)
    495   1.1   thorpej 			panic("receive 1a");
    496   1.1   thorpej #endif
    497   1.1   thorpej 		orig_resid = 0;
    498   1.1   thorpej 		if (flags & MSG_PEEK) {
    499   1.1   thorpej 			m = m->m_next;
    500   1.1   thorpej 		} else {
    501   1.1   thorpej 			sbfree(&so->so_rcv, m);
    502   1.1   thorpej 			MFREE(m, so->so_rcv.sb_mb);
    503   1.1   thorpej 			m = so->so_rcv.sb_mb;
    504   1.1   thorpej 		}
    505   1.1   thorpej 	}
    506   1.1   thorpej 	while (m && m->m_type == MT_CONTROL && error == 0) {
    507   1.1   thorpej 		if (flags & MSG_PEEK) {
    508   1.1   thorpej 			m = m->m_next;
    509   1.1   thorpej 		} else {
    510   1.1   thorpej 			sbfree(&so->so_rcv, m);
    511   1.1   thorpej 			MFREE(m, so->so_rcv.sb_mb);
    512   1.1   thorpej 			m = so->so_rcv.sb_mb;
    513   1.1   thorpej 		}
    514   1.1   thorpej 	}
    515   1.2   thorpej 
    516   1.2   thorpej 	/*
    517   1.2   thorpej 	 * If m is non-NULL, we have some data to read.  From now on,
    518   1.2   thorpej 	 * make sure to keep sb_lastrecord consistent when working on
    519   1.2   thorpej 	 * the last packet on the chain (nextrecord == NULL) and we
    520   1.2   thorpej 	 * change m->m_nextpkt.
    521   1.2   thorpej 	 */
    522   1.1   thorpej 	if (m) {
    523   1.2   thorpej 		if ((flags & MSG_PEEK) == 0) {
    524   1.1   thorpej 			m->m_nextpkt = nextrecord;
    525   1.2   thorpej 			/*
    526   1.2   thorpej 			 * If nextrecord == NULL (this is a single chain),
    527   1.2   thorpej 			 * then sb_lastrecord may not be valid here if m
    528   1.2   thorpej 			 * was changed earlier.
    529   1.2   thorpej 			 */
    530   1.2   thorpej 			if (nextrecord == NULL) {
    531   1.2   thorpej 				KASSERT(so->so_rcv.sb_mb == m);
    532   1.2   thorpej 				so->so_rcv.sb_lastrecord = m;
    533   1.2   thorpej 			}
    534   1.2   thorpej 		}
    535   1.1   thorpej 		type = m->m_type;
    536   1.1   thorpej 		if (type == MT_OOBDATA)
    537   1.1   thorpej 			flags |= MSG_OOB;
    538   1.2   thorpej 	} else {
    539   1.2   thorpej 		if ((flags & MSG_PEEK) == 0) {
    540   1.2   thorpej 			KASSERT(so->so_rcv.sb_mb == m);
    541   1.2   thorpej 			so->so_rcv.sb_mb = nextrecord;
    542   1.4   thorpej 			SB_EMPTY_FIXUP(&so->so_rcv);
    543   1.2   thorpej 		}
    544   1.1   thorpej 	}
    545   1.2   thorpej 	SBLASTRECORDCHK(&so->so_rcv, "kttcp_soreceive 2");
    546   1.2   thorpej 	SBLASTMBUFCHK(&so->so_rcv, "kttcp_soreceive 2");
    547   1.2   thorpej 
    548   1.1   thorpej 	moff = 0;
    549   1.1   thorpej 	offset = 0;
    550   1.1   thorpej 	while (m && resid > 0 && error == 0) {
    551   1.1   thorpej 		if (m->m_type == MT_OOBDATA) {
    552   1.1   thorpej 			if (type != MT_OOBDATA)
    553   1.1   thorpej 				break;
    554   1.1   thorpej 		} else if (type == MT_OOBDATA)
    555   1.1   thorpej 			break;
    556   1.1   thorpej #ifdef DIAGNOSTIC
    557   1.1   thorpej 		else if (m->m_type != MT_DATA && m->m_type != MT_HEADER)
    558   1.1   thorpej 			panic("receive 3");
    559   1.1   thorpej #endif
    560   1.1   thorpej 		so->so_state &= ~SS_RCVATMARK;
    561   1.1   thorpej 		len = resid;
    562   1.1   thorpej 		if (so->so_oobmark && len > so->so_oobmark - offset)
    563   1.1   thorpej 			len = so->so_oobmark - offset;
    564   1.1   thorpej 		if (len > m->m_len - moff)
    565   1.1   thorpej 			len = m->m_len - moff;
    566   1.1   thorpej 		/*
    567   1.1   thorpej 		 * If mp is set, just pass back the mbufs.
    568   1.1   thorpej 		 * Otherwise copy them out via the uio, then free.
    569   1.1   thorpej 		 * Sockbuf must be consistent here (points to current mbuf,
    570   1.1   thorpej 		 * it points to next record) when we drop priority;
    571   1.1   thorpej 		 * we must note any additions to the sockbuf when we
    572   1.1   thorpej 		 * block interrupts again.
    573   1.1   thorpej 		 */
    574   1.1   thorpej 		resid -= len;
    575   1.1   thorpej 		if (len == m->m_len - moff) {
    576   1.1   thorpej 			if (m->m_flags & M_EOR)
    577   1.1   thorpej 				flags |= MSG_EOR;
    578   1.1   thorpej 			if (flags & MSG_PEEK) {
    579   1.1   thorpej 				m = m->m_next;
    580   1.1   thorpej 				moff = 0;
    581   1.1   thorpej 			} else {
    582   1.1   thorpej 				nextrecord = m->m_nextpkt;
    583   1.1   thorpej 				sbfree(&so->so_rcv, m);
    584   1.1   thorpej 				if (mp) {
    585   1.1   thorpej 					*mp = m;
    586   1.1   thorpej 					mp = &m->m_next;
    587   1.1   thorpej 					so->so_rcv.sb_mb = m = m->m_next;
    588  1.12    simonb 					*mp = NULL;
    589   1.1   thorpej 				} else {
    590   1.1   thorpej 					MFREE(m, so->so_rcv.sb_mb);
    591   1.1   thorpej 					m = so->so_rcv.sb_mb;
    592   1.1   thorpej 				}
    593   1.2   thorpej 				/*
    594   1.2   thorpej 				 * If m != NULL, we also know that
    595   1.2   thorpej 				 * so->so_rcv.sb_mb != NULL.
    596   1.2   thorpej 				 */
    597   1.2   thorpej 				KASSERT(so->so_rcv.sb_mb == m);
    598   1.2   thorpej 				if (m) {
    599   1.1   thorpej 					m->m_nextpkt = nextrecord;
    600   1.2   thorpej 					if (nextrecord == NULL)
    601   1.2   thorpej 						so->so_rcv.sb_lastrecord = m;
    602   1.2   thorpej 				} else {
    603   1.2   thorpej 					so->so_rcv.sb_mb = nextrecord;
    604   1.4   thorpej 					SB_EMPTY_FIXUP(&so->so_rcv);
    605   1.2   thorpej 				}
    606   1.2   thorpej 				SBLASTRECORDCHK(&so->so_rcv,
    607   1.2   thorpej 				    "kttcp_soreceive 3");
    608   1.2   thorpej 				SBLASTMBUFCHK(&so->so_rcv,
    609   1.2   thorpej 				    "kttcp_soreceive 3");
    610   1.1   thorpej 			}
    611   1.1   thorpej 		} else {
    612   1.1   thorpej 			if (flags & MSG_PEEK)
    613   1.1   thorpej 				moff += len;
    614   1.1   thorpej 			else {
    615   1.1   thorpej 				if (mp)
    616   1.1   thorpej 					*mp = m_copym(m, 0, len, M_WAIT);
    617   1.1   thorpej 				m->m_data += len;
    618   1.1   thorpej 				m->m_len -= len;
    619   1.1   thorpej 				so->so_rcv.sb_cc -= len;
    620   1.1   thorpej 			}
    621   1.1   thorpej 		}
    622   1.1   thorpej 		if (so->so_oobmark) {
    623   1.1   thorpej 			if ((flags & MSG_PEEK) == 0) {
    624   1.1   thorpej 				so->so_oobmark -= len;
    625   1.1   thorpej 				if (so->so_oobmark == 0) {
    626   1.1   thorpej 					so->so_state |= SS_RCVATMARK;
    627   1.1   thorpej 					break;
    628   1.1   thorpej 				}
    629   1.1   thorpej 			} else {
    630   1.1   thorpej 				offset += len;
    631   1.1   thorpej 				if (offset == so->so_oobmark)
    632   1.1   thorpej 					break;
    633   1.1   thorpej 			}
    634   1.1   thorpej 		}
    635   1.1   thorpej 		if (flags & MSG_EOR)
    636   1.1   thorpej 			break;
    637   1.1   thorpej 		/*
    638   1.1   thorpej 		 * If the MSG_WAITALL flag is set (for non-atomic socket),
    639   1.1   thorpej 		 * we must not quit until "uio->uio_resid == 0" or an error
    640   1.1   thorpej 		 * termination.  If a signal/timeout occurs, return
    641   1.1   thorpej 		 * with a short count but without error.
    642   1.1   thorpej 		 * Keep sockbuf locked against other readers.
    643   1.1   thorpej 		 */
    644  1.13      fvdl 		while (flags & MSG_WAITALL && m == NULL && resid > 0 &&
    645   1.1   thorpej 		    !sosendallatonce(so) && !nextrecord) {
    646   1.1   thorpej 			if (so->so_error || so->so_state & SS_CANTRCVMORE)
    647   1.1   thorpej 				break;
    648   1.3   thorpej 			/*
    649   1.3   thorpej 			 * If we are peeking and the socket receive buffer is
    650   1.3   thorpej 			 * full, stop since we can't get more data to peek at.
    651   1.3   thorpej 			 */
    652   1.3   thorpej 			if ((flags & MSG_PEEK) && sbspace(&so->so_rcv) <= 0)
    653   1.3   thorpej 				break;
    654   1.3   thorpej 			/*
    655   1.3   thorpej 			 * If we've drained the socket buffer, tell the
    656   1.3   thorpej 			 * protocol in case it needs to do something to
    657   1.3   thorpej 			 * get it filled again.
    658   1.3   thorpej 			 */
    659   1.3   thorpej 			if ((pr->pr_flags & PR_WANTRCVD) && so->so_pcb)
    660  1.12    simonb 				(*pr->pr_usrreq)(so, PRU_RCVD, NULL,
    661  1.12    simonb 				    (struct mbuf *)(long)flags, NULL, NULL);
    662   1.2   thorpej 			SBLASTRECORDCHK(&so->so_rcv,
    663   1.2   thorpej 			    "kttcp_soreceive sbwait 2");
    664   1.2   thorpej 			SBLASTMBUFCHK(&so->so_rcv,
    665   1.2   thorpej 			    "kttcp_soreceive sbwait 2");
    666   1.1   thorpej 			error = sbwait(&so->so_rcv);
    667   1.1   thorpej 			if (error) {
    668   1.1   thorpej 				sbunlock(&so->so_rcv);
    669   1.1   thorpej 				splx(s);
    670   1.1   thorpej 				return (0);
    671   1.1   thorpej 			}
    672   1.1   thorpej 			if ((m = so->so_rcv.sb_mb) != NULL)
    673   1.1   thorpej 				nextrecord = m->m_nextpkt;
    674   1.1   thorpej 		}
    675   1.1   thorpej 	}
    676   1.1   thorpej 
    677   1.1   thorpej 	if (m && pr->pr_flags & PR_ATOMIC) {
    678   1.1   thorpej 		flags |= MSG_TRUNC;
    679   1.1   thorpej 		if ((flags & MSG_PEEK) == 0)
    680   1.1   thorpej 			(void) sbdroprecord(&so->so_rcv);
    681   1.1   thorpej 	}
    682   1.1   thorpej 	if ((flags & MSG_PEEK) == 0) {
    683  1.13      fvdl 		if (m == NULL) {
    684   1.2   thorpej 			/*
    685   1.4   thorpej 			 * First part is an SB_EMPTY_FIXUP().  Second part
    686   1.2   thorpej 			 * makes sure sb_lastrecord is up-to-date if
    687   1.2   thorpej 			 * there is still data in the socket buffer.
    688   1.2   thorpej 			 */
    689   1.1   thorpej 			so->so_rcv.sb_mb = nextrecord;
    690   1.2   thorpej 			if (so->so_rcv.sb_mb == NULL) {
    691   1.2   thorpej 				so->so_rcv.sb_mbtail = NULL;
    692   1.2   thorpej 				so->so_rcv.sb_lastrecord = NULL;
    693   1.2   thorpej 			} else if (nextrecord->m_nextpkt == NULL)
    694   1.2   thorpej 				so->so_rcv.sb_lastrecord = nextrecord;
    695   1.2   thorpej 		}
    696   1.2   thorpej 		SBLASTRECORDCHK(&so->so_rcv, "kttcp_soreceive 4");
    697   1.2   thorpej 		SBLASTMBUFCHK(&so->so_rcv, "kttcp_soreceive 4");
    698   1.1   thorpej 		if (pr->pr_flags & PR_WANTRCVD && so->so_pcb)
    699  1.12    simonb 			(*pr->pr_usrreq)(so, PRU_RCVD, NULL,
    700  1.12    simonb 			    (struct mbuf *)(long)flags, NULL, NULL);
    701   1.1   thorpej 	}
    702   1.1   thorpej 	if (orig_resid == resid && orig_resid &&
    703   1.1   thorpej 	    (flags & MSG_EOR) == 0 && (so->so_state & SS_CANTRCVMORE) == 0) {
    704   1.1   thorpej 		sbunlock(&so->so_rcv);
    705   1.1   thorpej 		splx(s);
    706   1.1   thorpej 		goto restart;
    707   1.1   thorpej 	}
    708   1.1   thorpej 
    709   1.1   thorpej 	if (flagsp)
    710   1.1   thorpej 		*flagsp |= flags;
    711   1.1   thorpej  release:
    712   1.1   thorpej 	sbunlock(&so->so_rcv);
    713   1.1   thorpej 	splx(s);
    714   1.1   thorpej 	*done = slen - resid;
    715   1.1   thorpej #if 0
    716   1.1   thorpej 	printf("soreceive: error %d slen %llu resid %lld\n", error, slen, resid);
    717   1.1   thorpej #endif
    718   1.1   thorpej 	return (error);
    719   1.1   thorpej }
    720