Home | History | Annotate | Line # | Download | only in dev
kttcp.c revision 1.2
      1  1.2  thorpej /*	$NetBSD: kttcp.c,v 1.2 2002/07/03 19:06:47 thorpej Exp $	*/
      2  1.1  thorpej 
      3  1.1  thorpej /*
      4  1.1  thorpej  * Copyright (c) 2002 Wasabi Systems, Inc.
      5  1.1  thorpej  * All rights reserved.
      6  1.1  thorpej  *
      7  1.1  thorpej  * Written by Frank van der Linden and Jason R. Thorpe for
      8  1.1  thorpej  * Wasabi Systems, Inc.
      9  1.1  thorpej  *
     10  1.1  thorpej  * Redistribution and use in source and binary forms, with or without
     11  1.1  thorpej  * modification, are permitted provided that the following conditions
     12  1.1  thorpej  * are met:
     13  1.1  thorpej  * 1. Redistributions of source code must retain the above copyright
     14  1.1  thorpej  *    notice, this list of conditions and the following disclaimer.
     15  1.1  thorpej  * 2. Redistributions in binary form must reproduce the above copyright
     16  1.1  thorpej  *    notice, this list of conditions and the following disclaimer in the
     17  1.1  thorpej  *    documentation and/or other materials provided with the distribution.
     18  1.1  thorpej  * 3. All advertising materials mentioning features or use of this software
     19  1.1  thorpej  *    must display the following acknowledgement:
     20  1.1  thorpej  *	This product includes software developed for the NetBSD Project by
     21  1.1  thorpej  *	Wasabi Systems, Inc.
     22  1.1  thorpej  * 4. The name of Wasabi Systems, Inc. may not be used to endorse
     23  1.1  thorpej  *    or promote products derived from this software without specific prior
     24  1.1  thorpej  *    written permission.
     25  1.1  thorpej  *
     26  1.1  thorpej  * THIS SOFTWARE IS PROVIDED BY WASABI SYSTEMS, INC. ``AS IS'' AND
     27  1.1  thorpej  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     28  1.1  thorpej  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     29  1.1  thorpej  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL WASABI SYSTEMS, INC
     30  1.1  thorpej  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     31  1.1  thorpej  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     32  1.1  thorpej  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     33  1.1  thorpej  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     34  1.1  thorpej  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     35  1.1  thorpej  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     36  1.1  thorpej  * POSSIBILITY OF SUCH DAMAGE.
     37  1.1  thorpej  */
     38  1.1  thorpej 
     39  1.1  thorpej /*
     40  1.1  thorpej  * kttcp.c --
     41  1.1  thorpej  *
     42  1.1  thorpej  *	This module provides kernel support for testing network
     43  1.1  thorpej  *	throughput from the perspective of the kernel.  It is
     44  1.1  thorpej  *	similar in spirit to the classic ttcp network benchmark
     45  1.1  thorpej  *	program, the main difference being that with kttcp, the
     46  1.1  thorpej  *	kernel is the source and sink of the data.
     47  1.1  thorpej  *
     48  1.1  thorpej  *	Testing like this is useful for a few reasons:
     49  1.1  thorpej  *
     50  1.1  thorpej  *	1. This allows us to know what kind of performance we can
     51  1.1  thorpej  *	   expect from network applications that run in the kernel
     52  1.1  thorpej  *	   space, such as the NFS server or the NFS client.  These
     53  1.1  thorpej  *	   applications don't have to move the data to/from userspace,
     54  1.1  thorpej  *	   and so benchmark programs which run in userspace don't
     55  1.1  thorpej  *	   give us an accurate model.
     56  1.1  thorpej  *
     57  1.1  thorpej  *	2. Since data received is just thrown away, the receiver
     58  1.1  thorpej  *	   is very fast.  This can provide better exercise for the
     59  1.1  thorpej  *	   sender at the other end.
     60  1.1  thorpej  *
     61  1.1  thorpej  *	3. Since the NetBSD kernel currently uses a run-to-completion
     62  1.1  thorpej  *	   scheduling model, kttcp provides a benchmark model where
     63  1.1  thorpej  *	   preemption of the benchmark program is not an issue.
     64  1.1  thorpej  */
     65  1.1  thorpej 
     66  1.1  thorpej #include <sys/param.h>
     67  1.1  thorpej #include <sys/types.h>
     68  1.1  thorpej #include <sys/ioctl.h>
     69  1.1  thorpej #include <sys/file.h>
     70  1.1  thorpej #include <sys/filedesc.h>
     71  1.1  thorpej #include <sys/conf.h>
     72  1.1  thorpej #include <sys/systm.h>
     73  1.1  thorpej #include <sys/protosw.h>
     74  1.1  thorpej #include <sys/proc.h>
     75  1.1  thorpej #include <sys/resourcevar.h>
     76  1.1  thorpej #include <sys/signal.h>
     77  1.1  thorpej #include <sys/socketvar.h>
     78  1.1  thorpej #include <sys/socket.h>
     79  1.1  thorpej #include <sys/mbuf.h>
     80  1.1  thorpej #include <sys/mount.h>
     81  1.1  thorpej #include <sys/syscallargs.h>
     82  1.1  thorpej 
     83  1.1  thorpej #include <dev/kttcpio.h>
     84  1.1  thorpej 
     85  1.1  thorpej static int kttcp_send(struct proc *p, struct kttcp_io_args *);
     86  1.1  thorpej static int kttcp_recv(struct proc *p, struct kttcp_io_args *);
     87  1.1  thorpej static int kttcp_sosend(struct socket *, unsigned long long,
     88  1.1  thorpej 			unsigned long long *, struct proc *, int);
     89  1.1  thorpej static int kttcp_soreceive(struct socket *, unsigned long long,
     90  1.1  thorpej 			   unsigned long long *, struct proc *, int *);
     91  1.1  thorpej 
     92  1.1  thorpej void	kttcpattach(int);
     93  1.1  thorpej 
     94  1.1  thorpej cdev_decl(kttcp);
     95  1.1  thorpej 
     96  1.1  thorpej void
     97  1.1  thorpej kttcpattach(int count)
     98  1.1  thorpej {
     99  1.1  thorpej 	/* Do nothing. */
    100  1.1  thorpej }
    101  1.1  thorpej 
    102  1.1  thorpej int
    103  1.1  thorpej kttcpopen(dev_t dev, int flags, int fmt, struct proc *p)
    104  1.1  thorpej {
    105  1.1  thorpej 
    106  1.1  thorpej 	/* Always succeeds. */
    107  1.1  thorpej 	return (0);
    108  1.1  thorpej }
    109  1.1  thorpej 
    110  1.1  thorpej int
    111  1.1  thorpej kttcpclose(dev_t dev, int flags, int fmt, struct proc *p)
    112  1.1  thorpej {
    113  1.1  thorpej 
    114  1.1  thorpej 	/* Always succeeds. */
    115  1.1  thorpej 	return (0);
    116  1.1  thorpej }
    117  1.1  thorpej 
    118  1.1  thorpej int
    119  1.1  thorpej kttcpioctl(dev_t dev, u_long cmd, caddr_t data, int flag, struct proc *p)
    120  1.1  thorpej {
    121  1.1  thorpej 	int error;
    122  1.1  thorpej 
    123  1.1  thorpej 	if ((flag & FWRITE) == 0)
    124  1.1  thorpej 		return EPERM;
    125  1.1  thorpej 
    126  1.1  thorpej 	switch (cmd) {
    127  1.1  thorpej 	case KTTCP_IO_SEND:
    128  1.1  thorpej 		error = kttcp_send(p, (struct kttcp_io_args *) data);
    129  1.1  thorpej 		break;
    130  1.1  thorpej 
    131  1.1  thorpej 	case KTTCP_IO_RECV:
    132  1.1  thorpej 		error = kttcp_recv(p, (struct kttcp_io_args *) data);
    133  1.1  thorpej 		break;
    134  1.1  thorpej 
    135  1.1  thorpej 	default:
    136  1.1  thorpej 		return EINVAL;
    137  1.1  thorpej 	}
    138  1.1  thorpej 
    139  1.1  thorpej 	return error;
    140  1.1  thorpej }
    141  1.1  thorpej 
    142  1.1  thorpej static int
    143  1.1  thorpej kttcp_send(struct proc *p, struct kttcp_io_args *kio)
    144  1.1  thorpej {
    145  1.1  thorpej 	struct file *fp;
    146  1.1  thorpej 	int error;
    147  1.1  thorpej 	struct timeval t0, t1;
    148  1.1  thorpej 	unsigned long long len, done;
    149  1.1  thorpej 
    150  1.1  thorpej 	if (kio->kio_totalsize >= KTTCP_MAX_XMIT)
    151  1.1  thorpej 		return EINVAL;
    152  1.1  thorpej 
    153  1.1  thorpej 	fp = fd_getfile(p->p_fd, kio->kio_socket);
    154  1.1  thorpej 	if (fp == NULL)
    155  1.1  thorpej 		return EBADF;
    156  1.1  thorpej 	if (fp->f_type != DTYPE_SOCKET)
    157  1.1  thorpej 		return EFTYPE;
    158  1.1  thorpej 
    159  1.1  thorpej 	len = kio->kio_totalsize;
    160  1.1  thorpej 	microtime(&t0);
    161  1.1  thorpej 	do {
    162  1.1  thorpej 		error = kttcp_sosend((struct socket *)fp->f_data, len,
    163  1.1  thorpej 		    &done, p, 0);
    164  1.1  thorpej 		len -= done;
    165  1.1  thorpej 	} while (error == 0 && len > 0);
    166  1.1  thorpej 	microtime(&t1);
    167  1.1  thorpej 	if (error != 0)
    168  1.1  thorpej 		return error;
    169  1.1  thorpej 	timersub(&t1, &t0, &kio->kio_elapsed);
    170  1.1  thorpej 
    171  1.1  thorpej 	kio->kio_bytesdone = kio->kio_totalsize - len;
    172  1.1  thorpej 
    173  1.1  thorpej 	return 0;
    174  1.1  thorpej }
    175  1.1  thorpej 
    176  1.1  thorpej static int
    177  1.1  thorpej kttcp_recv(struct proc *p, struct kttcp_io_args *kio)
    178  1.1  thorpej {
    179  1.1  thorpej 	struct file *fp;
    180  1.1  thorpej 	int error;
    181  1.1  thorpej 	struct timeval t0, t1;
    182  1.1  thorpej 	unsigned long long len, done;
    183  1.1  thorpej 
    184  1.1  thorpej 	if (kio->kio_totalsize > KTTCP_MAX_XMIT)
    185  1.1  thorpej 		return EINVAL;
    186  1.1  thorpej 
    187  1.1  thorpej 	fp = fd_getfile(p->p_fd, kio->kio_socket);
    188  1.1  thorpej 	if (fp == NULL || fp->f_type != DTYPE_SOCKET)
    189  1.1  thorpej 		return EBADF;
    190  1.1  thorpej 	len = kio->kio_totalsize;
    191  1.1  thorpej 	microtime(&t0);
    192  1.1  thorpej 	do {
    193  1.1  thorpej 		error = kttcp_soreceive((struct socket *)fp->f_data,
    194  1.1  thorpej 		    len, &done, p, NULL);
    195  1.1  thorpej 		len -= done;
    196  1.1  thorpej 	} while (error == 0 && len > 0 && done > 0);
    197  1.1  thorpej 	microtime(&t1);
    198  1.1  thorpej 	if (error == EPIPE)
    199  1.1  thorpej 		error = 0;
    200  1.1  thorpej 	if (error != 0)
    201  1.1  thorpej 		return error;
    202  1.1  thorpej 	timersub(&t1, &t0, &kio->kio_elapsed);
    203  1.1  thorpej 
    204  1.1  thorpej 	kio->kio_bytesdone = kio->kio_totalsize - len;
    205  1.1  thorpej 
    206  1.1  thorpej 	return 0;
    207  1.1  thorpej }
    208  1.1  thorpej 
    209  1.1  thorpej #define SBLOCKWAIT(f)   (((f) & MSG_DONTWAIT) ? M_NOWAIT : M_WAITOK)
    210  1.1  thorpej 
    211  1.1  thorpej /*
    212  1.1  thorpej  * Slightly changed version of sosend()
    213  1.1  thorpej  */
    214  1.1  thorpej static int
    215  1.1  thorpej kttcp_sosend(struct socket *so, unsigned long long slen,
    216  1.1  thorpej 	     unsigned long long *done, struct proc *p, int flags)
    217  1.1  thorpej {
    218  1.1  thorpej 	struct mbuf **mp, *m, *top;
    219  1.1  thorpej 	long space, len, mlen;
    220  1.1  thorpej 	int error, s, dontroute, atomic;
    221  1.1  thorpej 	long long resid;
    222  1.1  thorpej 
    223  1.1  thorpej 	atomic = sosendallatonce(so);
    224  1.1  thorpej 	resid = slen;
    225  1.1  thorpej 	top = NULL;
    226  1.1  thorpej 	/*
    227  1.1  thorpej 	 * In theory resid should be unsigned.
    228  1.1  thorpej 	 * However, space must be signed, as it might be less than 0
    229  1.1  thorpej 	 * if we over-committed, and we must use a signed comparison
    230  1.1  thorpej 	 * of space and resid.  On the other hand, a negative resid
    231  1.1  thorpej 	 * causes us to loop sending 0-length segments to the protocol.
    232  1.1  thorpej 	 */
    233  1.1  thorpej 	if (resid < 0) {
    234  1.1  thorpej 		error = EINVAL;
    235  1.1  thorpej 		goto out;
    236  1.1  thorpej 	}
    237  1.1  thorpej 	dontroute =
    238  1.1  thorpej 	    (flags & MSG_DONTROUTE) && (so->so_options & SO_DONTROUTE) == 0 &&
    239  1.1  thorpej 	    (so->so_proto->pr_flags & PR_ATOMIC);
    240  1.1  thorpej 	p->p_stats->p_ru.ru_msgsnd++;
    241  1.1  thorpej #define	snderr(errno)	{ error = errno; splx(s); goto release; }
    242  1.1  thorpej 
    243  1.1  thorpej  restart:
    244  1.1  thorpej 	if ((error = sblock(&so->so_snd, SBLOCKWAIT(flags))) != 0)
    245  1.1  thorpej 		goto out;
    246  1.1  thorpej 	do {
    247  1.1  thorpej 		s = splsoftnet();
    248  1.1  thorpej 		if (so->so_state & SS_CANTSENDMORE)
    249  1.1  thorpej 			snderr(EPIPE);
    250  1.1  thorpej 		if (so->so_error) {
    251  1.1  thorpej 			error = so->so_error;
    252  1.1  thorpej 			so->so_error = 0;
    253  1.1  thorpej 			splx(s);
    254  1.1  thorpej 			goto release;
    255  1.1  thorpej 		}
    256  1.1  thorpej 		if ((so->so_state & SS_ISCONNECTED) == 0) {
    257  1.1  thorpej 			if (so->so_proto->pr_flags & PR_CONNREQUIRED) {
    258  1.1  thorpej 				if ((so->so_state & SS_ISCONFIRMING) == 0)
    259  1.1  thorpej 					snderr(ENOTCONN);
    260  1.1  thorpej 			} else
    261  1.1  thorpej 				snderr(EDESTADDRREQ);
    262  1.1  thorpej 		}
    263  1.1  thorpej 		space = sbspace(&so->so_snd);
    264  1.1  thorpej 		if (flags & MSG_OOB)
    265  1.1  thorpej 			space += 1024;
    266  1.1  thorpej 		if ((atomic && resid > so->so_snd.sb_hiwat))
    267  1.1  thorpej 			snderr(EMSGSIZE);
    268  1.1  thorpej 		if (space < resid && (atomic || space < so->so_snd.sb_lowat)) {
    269  1.1  thorpej 			if (so->so_state & SS_NBIO)
    270  1.1  thorpej 				snderr(EWOULDBLOCK);
    271  1.2  thorpej 			SBLASTRECORDCHK(&so->so_rcv,
    272  1.2  thorpej 			    "kttcp_soreceive sbwait 1");
    273  1.2  thorpej 			SBLASTMBUFCHK(&so->so_rcv,
    274  1.2  thorpej 			    "kttcp_soreceive sbwait 1");
    275  1.1  thorpej 			sbunlock(&so->so_snd);
    276  1.1  thorpej 			error = sbwait(&so->so_snd);
    277  1.1  thorpej 			splx(s);
    278  1.1  thorpej 			if (error)
    279  1.1  thorpej 				goto out;
    280  1.1  thorpej 			goto restart;
    281  1.1  thorpej 		}
    282  1.1  thorpej 		splx(s);
    283  1.1  thorpej 		mp = &top;
    284  1.1  thorpej 		do {
    285  1.1  thorpej 			do {
    286  1.1  thorpej 				if (top == 0) {
    287  1.1  thorpej 					MGETHDR(m, M_WAIT, MT_DATA);
    288  1.1  thorpej 					mlen = MHLEN;
    289  1.1  thorpej 					m->m_pkthdr.len = 0;
    290  1.1  thorpej 					m->m_pkthdr.rcvif = (struct ifnet *)0;
    291  1.1  thorpej 				} else {
    292  1.1  thorpej 					MGET(m, M_WAIT, MT_DATA);
    293  1.1  thorpej 					mlen = MLEN;
    294  1.1  thorpej 				}
    295  1.1  thorpej 				if (resid >= MINCLSIZE && space >= MCLBYTES) {
    296  1.1  thorpej 					MCLGET(m, M_WAIT);
    297  1.1  thorpej 					if ((m->m_flags & M_EXT) == 0)
    298  1.1  thorpej 						goto nopages;
    299  1.1  thorpej 					mlen = MCLBYTES;
    300  1.1  thorpej #ifdef	MAPPED_MBUFS
    301  1.1  thorpej 					len = lmin(MCLBYTES, resid);
    302  1.1  thorpej #else
    303  1.1  thorpej 					if (atomic && top == 0) {
    304  1.1  thorpej 						len = lmin(MCLBYTES - max_hdr,
    305  1.1  thorpej 						    resid);
    306  1.1  thorpej 						m->m_data += max_hdr;
    307  1.1  thorpej 					} else
    308  1.1  thorpej 						len = lmin(MCLBYTES, resid);
    309  1.1  thorpej #endif
    310  1.1  thorpej 					space -= len;
    311  1.1  thorpej 				} else {
    312  1.1  thorpej nopages:
    313  1.1  thorpej 					len = lmin(lmin(mlen, resid), space);
    314  1.1  thorpej 					space -= len;
    315  1.1  thorpej 					/*
    316  1.1  thorpej 					 * For datagram protocols, leave room
    317  1.1  thorpej 					 * for protocol headers in first mbuf.
    318  1.1  thorpej 					 */
    319  1.1  thorpej 					if (atomic && top == 0 && len < mlen)
    320  1.1  thorpej 						MH_ALIGN(m, len);
    321  1.1  thorpej 				}
    322  1.1  thorpej 				resid -= len;
    323  1.1  thorpej 				m->m_len = len;
    324  1.1  thorpej 				*mp = m;
    325  1.1  thorpej 				top->m_pkthdr.len += len;
    326  1.1  thorpej 				if (error)
    327  1.1  thorpej 					goto release;
    328  1.1  thorpej 				mp = &m->m_next;
    329  1.1  thorpej 				if (resid <= 0) {
    330  1.1  thorpej 					if (flags & MSG_EOR)
    331  1.1  thorpej 						top->m_flags |= M_EOR;
    332  1.1  thorpej 					break;
    333  1.1  thorpej 				}
    334  1.1  thorpej 			} while (space > 0 && atomic);
    335  1.1  thorpej 
    336  1.1  thorpej 			s = splsoftnet();
    337  1.1  thorpej 
    338  1.1  thorpej 			if (so->so_state & SS_CANTSENDMORE)
    339  1.1  thorpej 				snderr(EPIPE);
    340  1.1  thorpej 
    341  1.1  thorpej 			if (dontroute)
    342  1.1  thorpej 				so->so_options |= SO_DONTROUTE;
    343  1.1  thorpej 			if (resid > 0)
    344  1.1  thorpej 				so->so_state |= SS_MORETOCOME;
    345  1.1  thorpej 			error = (*so->so_proto->pr_usrreq)(so,
    346  1.1  thorpej 			    (flags & MSG_OOB) ? PRU_SENDOOB : PRU_SEND,
    347  1.1  thorpej 			    top, NULL, NULL, p);
    348  1.1  thorpej 			if (dontroute)
    349  1.1  thorpej 				so->so_options &= ~SO_DONTROUTE;
    350  1.1  thorpej 			if (resid > 0)
    351  1.1  thorpej 				so->so_state &= ~SS_MORETOCOME;
    352  1.1  thorpej 			splx(s);
    353  1.1  thorpej 
    354  1.1  thorpej 			top = 0;
    355  1.1  thorpej 			mp = &top;
    356  1.1  thorpej 			if (error)
    357  1.1  thorpej 				goto release;
    358  1.1  thorpej 		} while (resid && space > 0);
    359  1.1  thorpej 	} while (resid);
    360  1.1  thorpej 
    361  1.1  thorpej  release:
    362  1.1  thorpej 	sbunlock(&so->so_snd);
    363  1.1  thorpej  out:
    364  1.1  thorpej 	if (top)
    365  1.1  thorpej 		m_freem(top);
    366  1.1  thorpej 	*done = slen - resid;
    367  1.1  thorpej #if 0
    368  1.1  thorpej 	printf("sosend: error %d slen %llu resid %lld\n", error, slen, resid);
    369  1.1  thorpej #endif
    370  1.1  thorpej 	return (error);
    371  1.1  thorpej }
    372  1.1  thorpej 
    373  1.1  thorpej static int
    374  1.1  thorpej kttcp_soreceive(struct socket *so, unsigned long long slen,
    375  1.1  thorpej 		unsigned long long *done, struct proc *p, int *flagsp)
    376  1.1  thorpej {
    377  1.1  thorpej 	struct mbuf *m, **mp;
    378  1.1  thorpej 	int flags, len, error, s, offset, moff, type;
    379  1.1  thorpej 	long long orig_resid, resid;
    380  1.1  thorpej 	struct protosw	*pr;
    381  1.1  thorpej 	struct mbuf *nextrecord;
    382  1.1  thorpej 
    383  1.1  thorpej 	pr = so->so_proto;
    384  1.1  thorpej 	mp = NULL;
    385  1.1  thorpej 	type = 0;
    386  1.1  thorpej 	resid = orig_resid = slen;
    387  1.1  thorpej 	if (flagsp)
    388  1.1  thorpej 		flags = *flagsp &~ MSG_EOR;
    389  1.1  thorpej 	else
    390  1.1  thorpej  		flags = 0;
    391  1.1  thorpej 	if (flags & MSG_OOB) {
    392  1.1  thorpej 		m = m_get(M_WAIT, MT_DATA);
    393  1.1  thorpej 		error = (*pr->pr_usrreq)(so, PRU_RCVOOB, m,
    394  1.1  thorpej 		    (struct mbuf *)(long)(flags & MSG_PEEK), (struct mbuf *)0,
    395  1.1  thorpej 		    (struct proc *)0);
    396  1.1  thorpej 		if (error)
    397  1.1  thorpej 			goto bad;
    398  1.1  thorpej 		do {
    399  1.1  thorpej 			resid -= min(resid, m->m_len);
    400  1.1  thorpej 			m = m_free(m);
    401  1.1  thorpej 		} while (resid && error == 0 && m);
    402  1.1  thorpej  bad:
    403  1.1  thorpej 		if (m)
    404  1.1  thorpej 			m_freem(m);
    405  1.1  thorpej 		return (error);
    406  1.1  thorpej 	}
    407  1.1  thorpej 	if (mp)
    408  1.1  thorpej 		*mp = (struct mbuf *)0;
    409  1.1  thorpej 	if (so->so_state & SS_ISCONFIRMING && resid)
    410  1.1  thorpej 		(*pr->pr_usrreq)(so, PRU_RCVD, (struct mbuf *)0,
    411  1.1  thorpej 		    (struct mbuf *)0, (struct mbuf *)0, (struct proc *)0);
    412  1.1  thorpej 
    413  1.1  thorpej  restart:
    414  1.1  thorpej 	if ((error = sblock(&so->so_rcv, SBLOCKWAIT(flags))) != 0)
    415  1.1  thorpej 		return (error);
    416  1.1  thorpej 	s = splsoftnet();
    417  1.1  thorpej 
    418  1.1  thorpej 	m = so->so_rcv.sb_mb;
    419  1.1  thorpej 	/*
    420  1.1  thorpej 	 * If we have less data than requested, block awaiting more
    421  1.1  thorpej 	 * (subject to any timeout) if:
    422  1.1  thorpej 	 *   1. the current count is less than the low water mark,
    423  1.1  thorpej 	 *   2. MSG_WAITALL is set, and it is possible to do the entire
    424  1.1  thorpej 	 *	receive operation at once if we block (resid <= hiwat), or
    425  1.1  thorpej 	 *   3. MSG_DONTWAIT is not set.
    426  1.1  thorpej 	 * If MSG_WAITALL is set but resid is larger than the receive buffer,
    427  1.1  thorpej 	 * we have to do the receive in sections, and thus risk returning
    428  1.1  thorpej 	 * a short count if a timeout or signal occurs after we start.
    429  1.1  thorpej 	 */
    430  1.1  thorpej 	if (m == 0 || (((flags & MSG_DONTWAIT) == 0 &&
    431  1.1  thorpej 	    so->so_rcv.sb_cc < resid) &&
    432  1.1  thorpej 	    (so->so_rcv.sb_cc < so->so_rcv.sb_lowat ||
    433  1.1  thorpej 	    ((flags & MSG_WAITALL) && resid <= so->so_rcv.sb_hiwat)) &&
    434  1.1  thorpej 	    m->m_nextpkt == 0 && (pr->pr_flags & PR_ATOMIC) == 0)) {
    435  1.1  thorpej #ifdef DIAGNOSTIC
    436  1.1  thorpej 		if (m == 0 && so->so_rcv.sb_cc)
    437  1.1  thorpej 			panic("receive 1");
    438  1.1  thorpej #endif
    439  1.1  thorpej 		if (so->so_error) {
    440  1.1  thorpej 			if (m)
    441  1.1  thorpej 				goto dontblock;
    442  1.1  thorpej 			error = so->so_error;
    443  1.1  thorpej 			if ((flags & MSG_PEEK) == 0)
    444  1.1  thorpej 				so->so_error = 0;
    445  1.1  thorpej 			goto release;
    446  1.1  thorpej 		}
    447  1.1  thorpej 		if (so->so_state & SS_CANTRCVMORE) {
    448  1.1  thorpej 			if (m)
    449  1.1  thorpej 				goto dontblock;
    450  1.1  thorpej 			else
    451  1.1  thorpej 				goto release;
    452  1.1  thorpej 		}
    453  1.1  thorpej 		for (; m; m = m->m_next)
    454  1.1  thorpej 			if (m->m_type == MT_OOBDATA  || (m->m_flags & M_EOR)) {
    455  1.1  thorpej 				m = so->so_rcv.sb_mb;
    456  1.1  thorpej 				goto dontblock;
    457  1.1  thorpej 			}
    458  1.1  thorpej 		if ((so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) == 0 &&
    459  1.1  thorpej 		    (so->so_proto->pr_flags & PR_CONNREQUIRED)) {
    460  1.1  thorpej 			error = ENOTCONN;
    461  1.1  thorpej 			goto release;
    462  1.1  thorpej 		}
    463  1.1  thorpej 		if (resid == 0)
    464  1.1  thorpej 			goto release;
    465  1.1  thorpej 		if ((so->so_state & SS_NBIO) || (flags & MSG_DONTWAIT)) {
    466  1.1  thorpej 			error = EWOULDBLOCK;
    467  1.1  thorpej 			goto release;
    468  1.1  thorpej 		}
    469  1.1  thorpej 		sbunlock(&so->so_rcv);
    470  1.1  thorpej 		error = sbwait(&so->so_rcv);
    471  1.1  thorpej 		splx(s);
    472  1.1  thorpej 		if (error)
    473  1.1  thorpej 			return (error);
    474  1.1  thorpej 		goto restart;
    475  1.1  thorpej 	}
    476  1.1  thorpej  dontblock:
    477  1.2  thorpej 	/*
    478  1.2  thorpej 	 * On entry here, m points to the first record of the socket buffer.
    479  1.2  thorpej 	 * While we process the initial mbufs containing address and control
    480  1.2  thorpej 	 * info, we save a copy of m->m_nextpkt into nextrecord.
    481  1.2  thorpej 	 */
    482  1.1  thorpej #ifdef notyet /* XXXX */
    483  1.1  thorpej 	if (uio->uio_procp)
    484  1.1  thorpej 		uio->uio_procp->p_stats->p_ru.ru_msgrcv++;
    485  1.1  thorpej #endif
    486  1.2  thorpej 	KASSERT(m == so->so_rcv.sb_mb);
    487  1.2  thorpej 	SBLASTRECORDCHK(&so->so_rcv, "kttcp_soreceive 1");
    488  1.2  thorpej 	SBLASTMBUFCHK(&so->so_rcv, "kttcp_soreceive 1");
    489  1.1  thorpej 	nextrecord = m->m_nextpkt;
    490  1.1  thorpej 	if (pr->pr_flags & PR_ADDR) {
    491  1.1  thorpej #ifdef DIAGNOSTIC
    492  1.1  thorpej 		if (m->m_type != MT_SONAME)
    493  1.1  thorpej 			panic("receive 1a");
    494  1.1  thorpej #endif
    495  1.1  thorpej 		orig_resid = 0;
    496  1.1  thorpej 		if (flags & MSG_PEEK) {
    497  1.1  thorpej 			m = m->m_next;
    498  1.1  thorpej 		} else {
    499  1.1  thorpej 			sbfree(&so->so_rcv, m);
    500  1.1  thorpej 			MFREE(m, so->so_rcv.sb_mb);
    501  1.1  thorpej 			m = so->so_rcv.sb_mb;
    502  1.1  thorpej 		}
    503  1.1  thorpej 	}
    504  1.1  thorpej 	while (m && m->m_type == MT_CONTROL && error == 0) {
    505  1.1  thorpej 		if (flags & MSG_PEEK) {
    506  1.1  thorpej 			m = m->m_next;
    507  1.1  thorpej 		} else {
    508  1.1  thorpej 			sbfree(&so->so_rcv, m);
    509  1.1  thorpej 			MFREE(m, so->so_rcv.sb_mb);
    510  1.1  thorpej 			m = so->so_rcv.sb_mb;
    511  1.1  thorpej 		}
    512  1.1  thorpej 	}
    513  1.2  thorpej 
    514  1.2  thorpej 	/*
    515  1.2  thorpej 	 * If m is non-NULL, we have some data to read.  From now on,
    516  1.2  thorpej 	 * make sure to keep sb_lastrecord consistent when working on
    517  1.2  thorpej 	 * the last packet on the chain (nextrecord == NULL) and we
    518  1.2  thorpej 	 * change m->m_nextpkt.
    519  1.2  thorpej 	 */
    520  1.1  thorpej 	if (m) {
    521  1.2  thorpej 		if ((flags & MSG_PEEK) == 0) {
    522  1.1  thorpej 			m->m_nextpkt = nextrecord;
    523  1.2  thorpej 			/*
    524  1.2  thorpej 			 * If nextrecord == NULL (this is a single chain),
    525  1.2  thorpej 			 * then sb_lastrecord may not be valid here if m
    526  1.2  thorpej 			 * was changed earlier.
    527  1.2  thorpej 			 */
    528  1.2  thorpej 			if (nextrecord == NULL) {
    529  1.2  thorpej 				KASSERT(so->so_rcv.sb_mb == m);
    530  1.2  thorpej 				so->so_rcv.sb_lastrecord = m;
    531  1.2  thorpej 			}
    532  1.2  thorpej 		}
    533  1.1  thorpej 		type = m->m_type;
    534  1.1  thorpej 		if (type == MT_OOBDATA)
    535  1.1  thorpej 			flags |= MSG_OOB;
    536  1.2  thorpej 	} else {
    537  1.2  thorpej 		if ((flags & MSG_PEEK) == 0) {
    538  1.2  thorpej 			KASSERT(so->so_rcv.sb_mb == m);
    539  1.2  thorpej 			so->so_rcv.sb_mb = nextrecord;
    540  1.2  thorpej 			SB_UPDATE_TAIL(&so->so_rcv);
    541  1.2  thorpej 		}
    542  1.1  thorpej 	}
    543  1.2  thorpej 	SBLASTRECORDCHK(&so->so_rcv, "kttcp_soreceive 2");
    544  1.2  thorpej 	SBLASTMBUFCHK(&so->so_rcv, "kttcp_soreceive 2");
    545  1.2  thorpej 
    546  1.1  thorpej 	moff = 0;
    547  1.1  thorpej 	offset = 0;
    548  1.1  thorpej 	while (m && resid > 0 && error == 0) {
    549  1.1  thorpej 		if (m->m_type == MT_OOBDATA) {
    550  1.1  thorpej 			if (type != MT_OOBDATA)
    551  1.1  thorpej 				break;
    552  1.1  thorpej 		} else if (type == MT_OOBDATA)
    553  1.1  thorpej 			break;
    554  1.1  thorpej #ifdef DIAGNOSTIC
    555  1.1  thorpej 		else if (m->m_type != MT_DATA && m->m_type != MT_HEADER)
    556  1.1  thorpej 			panic("receive 3");
    557  1.1  thorpej #endif
    558  1.1  thorpej 		so->so_state &= ~SS_RCVATMARK;
    559  1.1  thorpej 		len = resid;
    560  1.1  thorpej 		if (so->so_oobmark && len > so->so_oobmark - offset)
    561  1.1  thorpej 			len = so->so_oobmark - offset;
    562  1.1  thorpej 		if (len > m->m_len - moff)
    563  1.1  thorpej 			len = m->m_len - moff;
    564  1.1  thorpej 		/*
    565  1.1  thorpej 		 * If mp is set, just pass back the mbufs.
    566  1.1  thorpej 		 * Otherwise copy them out via the uio, then free.
    567  1.1  thorpej 		 * Sockbuf must be consistent here (points to current mbuf,
    568  1.1  thorpej 		 * it points to next record) when we drop priority;
    569  1.1  thorpej 		 * we must note any additions to the sockbuf when we
    570  1.1  thorpej 		 * block interrupts again.
    571  1.1  thorpej 		 */
    572  1.1  thorpej 		resid -= len;
    573  1.1  thorpej 		if (len == m->m_len - moff) {
    574  1.1  thorpej 			if (m->m_flags & M_EOR)
    575  1.1  thorpej 				flags |= MSG_EOR;
    576  1.1  thorpej 			if (flags & MSG_PEEK) {
    577  1.1  thorpej 				m = m->m_next;
    578  1.1  thorpej 				moff = 0;
    579  1.1  thorpej 			} else {
    580  1.1  thorpej 				nextrecord = m->m_nextpkt;
    581  1.1  thorpej 				sbfree(&so->so_rcv, m);
    582  1.1  thorpej 				if (mp) {
    583  1.1  thorpej 					*mp = m;
    584  1.1  thorpej 					mp = &m->m_next;
    585  1.1  thorpej 					so->so_rcv.sb_mb = m = m->m_next;
    586  1.1  thorpej 					*mp = (struct mbuf *)0;
    587  1.1  thorpej 				} else {
    588  1.1  thorpej 					MFREE(m, so->so_rcv.sb_mb);
    589  1.1  thorpej 					m = so->so_rcv.sb_mb;
    590  1.1  thorpej 				}
    591  1.2  thorpej 				/*
    592  1.2  thorpej 				 * If m != NULL, we also know that
    593  1.2  thorpej 				 * so->so_rcv.sb_mb != NULL.
    594  1.2  thorpej 				 */
    595  1.2  thorpej 				KASSERT(so->so_rcv.sb_mb == m);
    596  1.2  thorpej 				if (m) {
    597  1.1  thorpej 					m->m_nextpkt = nextrecord;
    598  1.2  thorpej 					if (nextrecord == NULL)
    599  1.2  thorpej 						so->so_rcv.sb_lastrecord = m;
    600  1.2  thorpej 				} else {
    601  1.2  thorpej 					so->so_rcv.sb_mb = nextrecord;
    602  1.2  thorpej 					SB_UPDATE_TAIL(&so->so_rcv);
    603  1.2  thorpej 				}
    604  1.2  thorpej 				SBLASTRECORDCHK(&so->so_rcv,
    605  1.2  thorpej 				    "kttcp_soreceive 3");
    606  1.2  thorpej 				SBLASTMBUFCHK(&so->so_rcv,
    607  1.2  thorpej 				    "kttcp_soreceive 3");
    608  1.1  thorpej 			}
    609  1.1  thorpej 		} else {
    610  1.1  thorpej 			if (flags & MSG_PEEK)
    611  1.1  thorpej 				moff += len;
    612  1.1  thorpej 			else {
    613  1.1  thorpej 				if (mp)
    614  1.1  thorpej 					*mp = m_copym(m, 0, len, M_WAIT);
    615  1.1  thorpej 				m->m_data += len;
    616  1.1  thorpej 				m->m_len -= len;
    617  1.1  thorpej 				so->so_rcv.sb_cc -= len;
    618  1.1  thorpej 			}
    619  1.1  thorpej 		}
    620  1.1  thorpej 		if (so->so_oobmark) {
    621  1.1  thorpej 			if ((flags & MSG_PEEK) == 0) {
    622  1.1  thorpej 				so->so_oobmark -= len;
    623  1.1  thorpej 				if (so->so_oobmark == 0) {
    624  1.1  thorpej 					so->so_state |= SS_RCVATMARK;
    625  1.1  thorpej 					break;
    626  1.1  thorpej 				}
    627  1.1  thorpej 			} else {
    628  1.1  thorpej 				offset += len;
    629  1.1  thorpej 				if (offset == so->so_oobmark)
    630  1.1  thorpej 					break;
    631  1.1  thorpej 			}
    632  1.1  thorpej 		}
    633  1.1  thorpej 		if (flags & MSG_EOR)
    634  1.1  thorpej 			break;
    635  1.1  thorpej 		/*
    636  1.1  thorpej 		 * If the MSG_WAITALL flag is set (for non-atomic socket),
    637  1.1  thorpej 		 * we must not quit until "uio->uio_resid == 0" or an error
    638  1.1  thorpej 		 * termination.  If a signal/timeout occurs, return
    639  1.1  thorpej 		 * with a short count but without error.
    640  1.1  thorpej 		 * Keep sockbuf locked against other readers.
    641  1.1  thorpej 		 */
    642  1.1  thorpej 		while (flags & MSG_WAITALL && m == 0 && resid > 0 &&
    643  1.1  thorpej 		    !sosendallatonce(so) && !nextrecord) {
    644  1.1  thorpej 			if (so->so_error || so->so_state & SS_CANTRCVMORE)
    645  1.1  thorpej 				break;
    646  1.2  thorpej 			SBLASTRECORDCHK(&so->so_rcv,
    647  1.2  thorpej 			    "kttcp_soreceive sbwait 2");
    648  1.2  thorpej 			SBLASTMBUFCHK(&so->so_rcv,
    649  1.2  thorpej 			    "kttcp_soreceive sbwait 2");
    650  1.1  thorpej 			error = sbwait(&so->so_rcv);
    651  1.1  thorpej 			if (error) {
    652  1.1  thorpej 				sbunlock(&so->so_rcv);
    653  1.1  thorpej 				splx(s);
    654  1.1  thorpej 				return (0);
    655  1.1  thorpej 			}
    656  1.1  thorpej 			if ((m = so->so_rcv.sb_mb) != NULL)
    657  1.1  thorpej 				nextrecord = m->m_nextpkt;
    658  1.1  thorpej 		}
    659  1.1  thorpej 	}
    660  1.1  thorpej 
    661  1.1  thorpej 	if (m && pr->pr_flags & PR_ATOMIC) {
    662  1.1  thorpej 		flags |= MSG_TRUNC;
    663  1.1  thorpej 		if ((flags & MSG_PEEK) == 0)
    664  1.1  thorpej 			(void) sbdroprecord(&so->so_rcv);
    665  1.1  thorpej 	}
    666  1.1  thorpej 	if ((flags & MSG_PEEK) == 0) {
    667  1.2  thorpej 		if (m == 0) {
    668  1.2  thorpej 			/*
    669  1.2  thorpej 			 * First part is an SB_UPDATE_TAIL().  Second part
    670  1.2  thorpej 			 * makes sure sb_lastrecord is up-to-date if
    671  1.2  thorpej 			 * there is still data in the socket buffer.
    672  1.2  thorpej 			 */
    673  1.1  thorpej 			so->so_rcv.sb_mb = nextrecord;
    674  1.2  thorpej 			if (so->so_rcv.sb_mb == NULL) {
    675  1.2  thorpej 				so->so_rcv.sb_mbtail = NULL;
    676  1.2  thorpej 				so->so_rcv.sb_lastrecord = NULL;
    677  1.2  thorpej 			} else if (nextrecord->m_nextpkt == NULL)
    678  1.2  thorpej 				so->so_rcv.sb_lastrecord = nextrecord;
    679  1.2  thorpej 		}
    680  1.2  thorpej 		SBLASTRECORDCHK(&so->so_rcv, "kttcp_soreceive 4");
    681  1.2  thorpej 		SBLASTMBUFCHK(&so->so_rcv, "kttcp_soreceive 4");
    682  1.1  thorpej 		if (pr->pr_flags & PR_WANTRCVD && so->so_pcb)
    683  1.1  thorpej 			(*pr->pr_usrreq)(so, PRU_RCVD, (struct mbuf *)0,
    684  1.1  thorpej 			    (struct mbuf *)(long)flags, (struct mbuf *)0,
    685  1.1  thorpej 			    (struct proc *)0);
    686  1.1  thorpej 	}
    687  1.1  thorpej 	if (orig_resid == resid && orig_resid &&
    688  1.1  thorpej 	    (flags & MSG_EOR) == 0 && (so->so_state & SS_CANTRCVMORE) == 0) {
    689  1.1  thorpej 		sbunlock(&so->so_rcv);
    690  1.1  thorpej 		splx(s);
    691  1.1  thorpej 		goto restart;
    692  1.1  thorpej 	}
    693  1.1  thorpej 
    694  1.1  thorpej 	if (flagsp)
    695  1.1  thorpej 		*flagsp |= flags;
    696  1.1  thorpej  release:
    697  1.1  thorpej 	sbunlock(&so->so_rcv);
    698  1.1  thorpej 	splx(s);
    699  1.1  thorpej 	*done = slen - resid;
    700  1.1  thorpej #if 0
    701  1.1  thorpej 	printf("soreceive: error %d slen %llu resid %lld\n", error, slen, resid);
    702  1.1  thorpej #endif
    703  1.1  thorpej 	return (error);
    704  1.1  thorpej }
    705