Home | History | Annotate | Line # | Download | only in dev
kttcp.c revision 1.8
      1  1.8    briggs /*	$NetBSD: kttcp.c,v 1.8 2003/02/25 23:29:14 briggs Exp $	*/
      2  1.1   thorpej 
      3  1.1   thorpej /*
      4  1.1   thorpej  * Copyright (c) 2002 Wasabi Systems, Inc.
      5  1.1   thorpej  * All rights reserved.
      6  1.1   thorpej  *
      7  1.1   thorpej  * Written by Frank van der Linden and Jason R. Thorpe for
      8  1.1   thorpej  * Wasabi Systems, Inc.
      9  1.1   thorpej  *
     10  1.1   thorpej  * Redistribution and use in source and binary forms, with or without
     11  1.1   thorpej  * modification, are permitted provided that the following conditions
     12  1.1   thorpej  * are met:
     13  1.1   thorpej  * 1. Redistributions of source code must retain the above copyright
     14  1.1   thorpej  *    notice, this list of conditions and the following disclaimer.
     15  1.1   thorpej  * 2. Redistributions in binary form must reproduce the above copyright
     16  1.1   thorpej  *    notice, this list of conditions and the following disclaimer in the
     17  1.1   thorpej  *    documentation and/or other materials provided with the distribution.
     18  1.1   thorpej  * 3. All advertising materials mentioning features or use of this software
     19  1.1   thorpej  *    must display the following acknowledgement:
     20  1.1   thorpej  *	This product includes software developed for the NetBSD Project by
     21  1.1   thorpej  *	Wasabi Systems, Inc.
     22  1.1   thorpej  * 4. The name of Wasabi Systems, Inc. may not be used to endorse
     23  1.1   thorpej  *    or promote products derived from this software without specific prior
     24  1.1   thorpej  *    written permission.
     25  1.1   thorpej  *
     26  1.1   thorpej  * THIS SOFTWARE IS PROVIDED BY WASABI SYSTEMS, INC. ``AS IS'' AND
     27  1.1   thorpej  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     28  1.1   thorpej  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     29  1.1   thorpej  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL WASABI SYSTEMS, INC
     30  1.1   thorpej  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     31  1.1   thorpej  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     32  1.1   thorpej  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     33  1.1   thorpej  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     34  1.1   thorpej  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     35  1.1   thorpej  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     36  1.1   thorpej  * POSSIBILITY OF SUCH DAMAGE.
     37  1.1   thorpej  */
     38  1.1   thorpej 
     39  1.1   thorpej /*
     40  1.1   thorpej  * kttcp.c --
     41  1.1   thorpej  *
     42  1.1   thorpej  *	This module provides kernel support for testing network
     43  1.1   thorpej  *	throughput from the perspective of the kernel.  It is
     44  1.1   thorpej  *	similar in spirit to the classic ttcp network benchmark
     45  1.1   thorpej  *	program, the main difference being that with kttcp, the
     46  1.1   thorpej  *	kernel is the source and sink of the data.
     47  1.1   thorpej  *
     48  1.1   thorpej  *	Testing like this is useful for a few reasons:
     49  1.1   thorpej  *
     50  1.1   thorpej  *	1. This allows us to know what kind of performance we can
     51  1.1   thorpej  *	   expect from network applications that run in the kernel
     52  1.1   thorpej  *	   space, such as the NFS server or the NFS client.  These
     53  1.1   thorpej  *	   applications don't have to move the data to/from userspace,
     54  1.1   thorpej  *	   and so benchmark programs which run in userspace don't
     55  1.1   thorpej  *	   give us an accurate model.
     56  1.1   thorpej  *
     57  1.1   thorpej  *	2. Since data received is just thrown away, the receiver
     58  1.1   thorpej  *	   is very fast.  This can provide better exercise for the
     59  1.1   thorpej  *	   sender at the other end.
     60  1.1   thorpej  *
     61  1.1   thorpej  *	3. Since the NetBSD kernel currently uses a run-to-completion
     62  1.1   thorpej  *	   scheduling model, kttcp provides a benchmark model where
     63  1.1   thorpej  *	   preemption of the benchmark program is not an issue.
     64  1.1   thorpej  */
     65  1.1   thorpej 
     66  1.1   thorpej #include <sys/param.h>
     67  1.1   thorpej #include <sys/types.h>
     68  1.1   thorpej #include <sys/ioctl.h>
     69  1.1   thorpej #include <sys/file.h>
     70  1.1   thorpej #include <sys/filedesc.h>
     71  1.1   thorpej #include <sys/conf.h>
     72  1.1   thorpej #include <sys/systm.h>
     73  1.1   thorpej #include <sys/protosw.h>
     74  1.1   thorpej #include <sys/proc.h>
     75  1.1   thorpej #include <sys/resourcevar.h>
     76  1.1   thorpej #include <sys/signal.h>
     77  1.1   thorpej #include <sys/socketvar.h>
     78  1.1   thorpej #include <sys/socket.h>
     79  1.1   thorpej #include <sys/mbuf.h>
     80  1.7   thorpej #include <sys/sa.h>
     81  1.1   thorpej #include <sys/mount.h>
     82  1.1   thorpej #include <sys/syscallargs.h>
     83  1.1   thorpej 
     84  1.1   thorpej #include <dev/kttcpio.h>
     85  1.1   thorpej 
     86  1.1   thorpej static int kttcp_send(struct proc *p, struct kttcp_io_args *);
     87  1.1   thorpej static int kttcp_recv(struct proc *p, struct kttcp_io_args *);
     88  1.1   thorpej static int kttcp_sosend(struct socket *, unsigned long long,
     89  1.1   thorpej 			unsigned long long *, struct proc *, int);
     90  1.1   thorpej static int kttcp_soreceive(struct socket *, unsigned long long,
     91  1.1   thorpej 			   unsigned long long *, struct proc *, int *);
     92  1.1   thorpej 
     93  1.1   thorpej void	kttcpattach(int);
     94  1.1   thorpej 
     95  1.5   gehenna dev_type_ioctl(kttcpioctl);
     96  1.5   gehenna 
     97  1.5   gehenna const struct cdevsw kttcp_cdevsw = {
     98  1.5   gehenna 	nullopen, nullclose, noread, nowrite, kttcpioctl,
     99  1.6  jdolecek 	nostop, notty, nopoll, nommap, nokqfilter,
    100  1.5   gehenna };
    101  1.1   thorpej 
    102  1.1   thorpej void
    103  1.1   thorpej kttcpattach(int count)
    104  1.1   thorpej {
    105  1.1   thorpej 	/* Do nothing. */
    106  1.1   thorpej }
    107  1.1   thorpej 
    108  1.1   thorpej int
    109  1.1   thorpej kttcpioctl(dev_t dev, u_long cmd, caddr_t data, int flag, struct proc *p)
    110  1.1   thorpej {
    111  1.1   thorpej 	int error;
    112  1.1   thorpej 
    113  1.1   thorpej 	if ((flag & FWRITE) == 0)
    114  1.1   thorpej 		return EPERM;
    115  1.1   thorpej 
    116  1.1   thorpej 	switch (cmd) {
    117  1.1   thorpej 	case KTTCP_IO_SEND:
    118  1.1   thorpej 		error = kttcp_send(p, (struct kttcp_io_args *) data);
    119  1.1   thorpej 		break;
    120  1.1   thorpej 
    121  1.1   thorpej 	case KTTCP_IO_RECV:
    122  1.1   thorpej 		error = kttcp_recv(p, (struct kttcp_io_args *) data);
    123  1.1   thorpej 		break;
    124  1.1   thorpej 
    125  1.1   thorpej 	default:
    126  1.1   thorpej 		return EINVAL;
    127  1.1   thorpej 	}
    128  1.1   thorpej 
    129  1.1   thorpej 	return error;
    130  1.1   thorpej }
    131  1.1   thorpej 
    132  1.1   thorpej static int
    133  1.1   thorpej kttcp_send(struct proc *p, struct kttcp_io_args *kio)
    134  1.1   thorpej {
    135  1.1   thorpej 	struct file *fp;
    136  1.1   thorpej 	int error;
    137  1.1   thorpej 	struct timeval t0, t1;
    138  1.1   thorpej 	unsigned long long len, done;
    139  1.1   thorpej 
    140  1.1   thorpej 	if (kio->kio_totalsize >= KTTCP_MAX_XMIT)
    141  1.1   thorpej 		return EINVAL;
    142  1.1   thorpej 
    143  1.1   thorpej 	fp = fd_getfile(p->p_fd, kio->kio_socket);
    144  1.1   thorpej 	if (fp == NULL)
    145  1.1   thorpej 		return EBADF;
    146  1.8    briggs 	FILE_USE(fp);
    147  1.8    briggs 	if (fp->f_type != DTYPE_SOCKET) {
    148  1.8    briggs 		FILE_UNUSE(fp, p);
    149  1.1   thorpej 		return EFTYPE;
    150  1.8    briggs 	}
    151  1.1   thorpej 
    152  1.1   thorpej 	len = kio->kio_totalsize;
    153  1.1   thorpej 	microtime(&t0);
    154  1.1   thorpej 	do {
    155  1.1   thorpej 		error = kttcp_sosend((struct socket *)fp->f_data, len,
    156  1.1   thorpej 		    &done, p, 0);
    157  1.1   thorpej 		len -= done;
    158  1.1   thorpej 	} while (error == 0 && len > 0);
    159  1.8    briggs 
    160  1.8    briggs 	FILE_UNUSE(fp, p);
    161  1.8    briggs 
    162  1.1   thorpej 	microtime(&t1);
    163  1.1   thorpej 	if (error != 0)
    164  1.1   thorpej 		return error;
    165  1.1   thorpej 	timersub(&t1, &t0, &kio->kio_elapsed);
    166  1.1   thorpej 
    167  1.1   thorpej 	kio->kio_bytesdone = kio->kio_totalsize - len;
    168  1.1   thorpej 
    169  1.1   thorpej 	return 0;
    170  1.1   thorpej }
    171  1.1   thorpej 
    172  1.1   thorpej static int
    173  1.1   thorpej kttcp_recv(struct proc *p, struct kttcp_io_args *kio)
    174  1.1   thorpej {
    175  1.1   thorpej 	struct file *fp;
    176  1.1   thorpej 	int error;
    177  1.1   thorpej 	struct timeval t0, t1;
    178  1.1   thorpej 	unsigned long long len, done;
    179  1.1   thorpej 
    180  1.1   thorpej 	if (kio->kio_totalsize > KTTCP_MAX_XMIT)
    181  1.1   thorpej 		return EINVAL;
    182  1.1   thorpej 
    183  1.1   thorpej 	fp = fd_getfile(p->p_fd, kio->kio_socket);
    184  1.8    briggs 	if (fp == NULL)
    185  1.1   thorpej 		return EBADF;
    186  1.8    briggs 	FILE_USE(fp);
    187  1.8    briggs 	if (fp->f_type != DTYPE_SOCKET) {
    188  1.8    briggs 		FILE_UNUSE(fp, p);
    189  1.8    briggs 		return EBADF;
    190  1.8    briggs 	}
    191  1.1   thorpej 	len = kio->kio_totalsize;
    192  1.1   thorpej 	microtime(&t0);
    193  1.1   thorpej 	do {
    194  1.1   thorpej 		error = kttcp_soreceive((struct socket *)fp->f_data,
    195  1.1   thorpej 		    len, &done, p, NULL);
    196  1.1   thorpej 		len -= done;
    197  1.1   thorpej 	} while (error == 0 && len > 0 && done > 0);
    198  1.8    briggs 
    199  1.8    briggs 	FILE_UNUSE(fp, p);
    200  1.8    briggs 
    201  1.1   thorpej 	microtime(&t1);
    202  1.1   thorpej 	if (error == EPIPE)
    203  1.1   thorpej 		error = 0;
    204  1.1   thorpej 	if (error != 0)
    205  1.1   thorpej 		return error;
    206  1.1   thorpej 	timersub(&t1, &t0, &kio->kio_elapsed);
    207  1.1   thorpej 
    208  1.1   thorpej 	kio->kio_bytesdone = kio->kio_totalsize - len;
    209  1.1   thorpej 
    210  1.1   thorpej 	return 0;
    211  1.1   thorpej }
    212  1.1   thorpej 
    213  1.1   thorpej #define SBLOCKWAIT(f)   (((f) & MSG_DONTWAIT) ? M_NOWAIT : M_WAITOK)
    214  1.1   thorpej 
    215  1.1   thorpej /*
    216  1.1   thorpej  * Slightly changed version of sosend()
    217  1.1   thorpej  */
    218  1.1   thorpej static int
    219  1.1   thorpej kttcp_sosend(struct socket *so, unsigned long long slen,
    220  1.1   thorpej 	     unsigned long long *done, struct proc *p, int flags)
    221  1.1   thorpej {
    222  1.1   thorpej 	struct mbuf **mp, *m, *top;
    223  1.1   thorpej 	long space, len, mlen;
    224  1.1   thorpej 	int error, s, dontroute, atomic;
    225  1.1   thorpej 	long long resid;
    226  1.1   thorpej 
    227  1.1   thorpej 	atomic = sosendallatonce(so);
    228  1.1   thorpej 	resid = slen;
    229  1.1   thorpej 	top = NULL;
    230  1.1   thorpej 	/*
    231  1.1   thorpej 	 * In theory resid should be unsigned.
    232  1.1   thorpej 	 * However, space must be signed, as it might be less than 0
    233  1.1   thorpej 	 * if we over-committed, and we must use a signed comparison
    234  1.1   thorpej 	 * of space and resid.  On the other hand, a negative resid
    235  1.1   thorpej 	 * causes us to loop sending 0-length segments to the protocol.
    236  1.1   thorpej 	 */
    237  1.1   thorpej 	if (resid < 0) {
    238  1.1   thorpej 		error = EINVAL;
    239  1.1   thorpej 		goto out;
    240  1.1   thorpej 	}
    241  1.1   thorpej 	dontroute =
    242  1.1   thorpej 	    (flags & MSG_DONTROUTE) && (so->so_options & SO_DONTROUTE) == 0 &&
    243  1.1   thorpej 	    (so->so_proto->pr_flags & PR_ATOMIC);
    244  1.1   thorpej 	p->p_stats->p_ru.ru_msgsnd++;
    245  1.1   thorpej #define	snderr(errno)	{ error = errno; splx(s); goto release; }
    246  1.1   thorpej 
    247  1.1   thorpej  restart:
    248  1.1   thorpej 	if ((error = sblock(&so->so_snd, SBLOCKWAIT(flags))) != 0)
    249  1.1   thorpej 		goto out;
    250  1.1   thorpej 	do {
    251  1.1   thorpej 		s = splsoftnet();
    252  1.1   thorpej 		if (so->so_state & SS_CANTSENDMORE)
    253  1.1   thorpej 			snderr(EPIPE);
    254  1.1   thorpej 		if (so->so_error) {
    255  1.1   thorpej 			error = so->so_error;
    256  1.1   thorpej 			so->so_error = 0;
    257  1.1   thorpej 			splx(s);
    258  1.1   thorpej 			goto release;
    259  1.1   thorpej 		}
    260  1.1   thorpej 		if ((so->so_state & SS_ISCONNECTED) == 0) {
    261  1.1   thorpej 			if (so->so_proto->pr_flags & PR_CONNREQUIRED) {
    262  1.1   thorpej 				if ((so->so_state & SS_ISCONFIRMING) == 0)
    263  1.1   thorpej 					snderr(ENOTCONN);
    264  1.1   thorpej 			} else
    265  1.1   thorpej 				snderr(EDESTADDRREQ);
    266  1.1   thorpej 		}
    267  1.1   thorpej 		space = sbspace(&so->so_snd);
    268  1.1   thorpej 		if (flags & MSG_OOB)
    269  1.1   thorpej 			space += 1024;
    270  1.1   thorpej 		if ((atomic && resid > so->so_snd.sb_hiwat))
    271  1.1   thorpej 			snderr(EMSGSIZE);
    272  1.1   thorpej 		if (space < resid && (atomic || space < so->so_snd.sb_lowat)) {
    273  1.1   thorpej 			if (so->so_state & SS_NBIO)
    274  1.1   thorpej 				snderr(EWOULDBLOCK);
    275  1.2   thorpej 			SBLASTRECORDCHK(&so->so_rcv,
    276  1.2   thorpej 			    "kttcp_soreceive sbwait 1");
    277  1.2   thorpej 			SBLASTMBUFCHK(&so->so_rcv,
    278  1.2   thorpej 			    "kttcp_soreceive sbwait 1");
    279  1.1   thorpej 			sbunlock(&so->so_snd);
    280  1.1   thorpej 			error = sbwait(&so->so_snd);
    281  1.1   thorpej 			splx(s);
    282  1.1   thorpej 			if (error)
    283  1.1   thorpej 				goto out;
    284  1.1   thorpej 			goto restart;
    285  1.1   thorpej 		}
    286  1.1   thorpej 		splx(s);
    287  1.1   thorpej 		mp = &top;
    288  1.1   thorpej 		do {
    289  1.1   thorpej 			do {
    290  1.1   thorpej 				if (top == 0) {
    291  1.1   thorpej 					MGETHDR(m, M_WAIT, MT_DATA);
    292  1.1   thorpej 					mlen = MHLEN;
    293  1.1   thorpej 					m->m_pkthdr.len = 0;
    294  1.1   thorpej 					m->m_pkthdr.rcvif = (struct ifnet *)0;
    295  1.1   thorpej 				} else {
    296  1.1   thorpej 					MGET(m, M_WAIT, MT_DATA);
    297  1.1   thorpej 					mlen = MLEN;
    298  1.1   thorpej 				}
    299  1.1   thorpej 				if (resid >= MINCLSIZE && space >= MCLBYTES) {
    300  1.1   thorpej 					MCLGET(m, M_WAIT);
    301  1.1   thorpej 					if ((m->m_flags & M_EXT) == 0)
    302  1.1   thorpej 						goto nopages;
    303  1.1   thorpej 					mlen = MCLBYTES;
    304  1.1   thorpej #ifdef	MAPPED_MBUFS
    305  1.1   thorpej 					len = lmin(MCLBYTES, resid);
    306  1.1   thorpej #else
    307  1.1   thorpej 					if (atomic && top == 0) {
    308  1.1   thorpej 						len = lmin(MCLBYTES - max_hdr,
    309  1.1   thorpej 						    resid);
    310  1.1   thorpej 						m->m_data += max_hdr;
    311  1.1   thorpej 					} else
    312  1.1   thorpej 						len = lmin(MCLBYTES, resid);
    313  1.1   thorpej #endif
    314  1.1   thorpej 					space -= len;
    315  1.1   thorpej 				} else {
    316  1.1   thorpej nopages:
    317  1.1   thorpej 					len = lmin(lmin(mlen, resid), space);
    318  1.1   thorpej 					space -= len;
    319  1.1   thorpej 					/*
    320  1.1   thorpej 					 * For datagram protocols, leave room
    321  1.1   thorpej 					 * for protocol headers in first mbuf.
    322  1.1   thorpej 					 */
    323  1.1   thorpej 					if (atomic && top == 0 && len < mlen)
    324  1.1   thorpej 						MH_ALIGN(m, len);
    325  1.1   thorpej 				}
    326  1.1   thorpej 				resid -= len;
    327  1.1   thorpej 				m->m_len = len;
    328  1.1   thorpej 				*mp = m;
    329  1.1   thorpej 				top->m_pkthdr.len += len;
    330  1.1   thorpej 				if (error)
    331  1.1   thorpej 					goto release;
    332  1.1   thorpej 				mp = &m->m_next;
    333  1.1   thorpej 				if (resid <= 0) {
    334  1.1   thorpej 					if (flags & MSG_EOR)
    335  1.1   thorpej 						top->m_flags |= M_EOR;
    336  1.1   thorpej 					break;
    337  1.1   thorpej 				}
    338  1.1   thorpej 			} while (space > 0 && atomic);
    339  1.1   thorpej 
    340  1.1   thorpej 			s = splsoftnet();
    341  1.1   thorpej 
    342  1.1   thorpej 			if (so->so_state & SS_CANTSENDMORE)
    343  1.1   thorpej 				snderr(EPIPE);
    344  1.1   thorpej 
    345  1.1   thorpej 			if (dontroute)
    346  1.1   thorpej 				so->so_options |= SO_DONTROUTE;
    347  1.1   thorpej 			if (resid > 0)
    348  1.1   thorpej 				so->so_state |= SS_MORETOCOME;
    349  1.1   thorpej 			error = (*so->so_proto->pr_usrreq)(so,
    350  1.1   thorpej 			    (flags & MSG_OOB) ? PRU_SENDOOB : PRU_SEND,
    351  1.1   thorpej 			    top, NULL, NULL, p);
    352  1.1   thorpej 			if (dontroute)
    353  1.1   thorpej 				so->so_options &= ~SO_DONTROUTE;
    354  1.1   thorpej 			if (resid > 0)
    355  1.1   thorpej 				so->so_state &= ~SS_MORETOCOME;
    356  1.1   thorpej 			splx(s);
    357  1.1   thorpej 
    358  1.1   thorpej 			top = 0;
    359  1.1   thorpej 			mp = &top;
    360  1.1   thorpej 			if (error)
    361  1.1   thorpej 				goto release;
    362  1.1   thorpej 		} while (resid && space > 0);
    363  1.1   thorpej 	} while (resid);
    364  1.1   thorpej 
    365  1.1   thorpej  release:
    366  1.1   thorpej 	sbunlock(&so->so_snd);
    367  1.1   thorpej  out:
    368  1.1   thorpej 	if (top)
    369  1.1   thorpej 		m_freem(top);
    370  1.1   thorpej 	*done = slen - resid;
    371  1.1   thorpej #if 0
    372  1.1   thorpej 	printf("sosend: error %d slen %llu resid %lld\n", error, slen, resid);
    373  1.1   thorpej #endif
    374  1.1   thorpej 	return (error);
    375  1.1   thorpej }
    376  1.1   thorpej 
    377  1.1   thorpej static int
    378  1.1   thorpej kttcp_soreceive(struct socket *so, unsigned long long slen,
    379  1.1   thorpej 		unsigned long long *done, struct proc *p, int *flagsp)
    380  1.1   thorpej {
    381  1.1   thorpej 	struct mbuf *m, **mp;
    382  1.1   thorpej 	int flags, len, error, s, offset, moff, type;
    383  1.1   thorpej 	long long orig_resid, resid;
    384  1.1   thorpej 	struct protosw	*pr;
    385  1.1   thorpej 	struct mbuf *nextrecord;
    386  1.1   thorpej 
    387  1.1   thorpej 	pr = so->so_proto;
    388  1.1   thorpej 	mp = NULL;
    389  1.1   thorpej 	type = 0;
    390  1.1   thorpej 	resid = orig_resid = slen;
    391  1.1   thorpej 	if (flagsp)
    392  1.1   thorpej 		flags = *flagsp &~ MSG_EOR;
    393  1.1   thorpej 	else
    394  1.1   thorpej  		flags = 0;
    395  1.1   thorpej 	if (flags & MSG_OOB) {
    396  1.1   thorpej 		m = m_get(M_WAIT, MT_DATA);
    397  1.1   thorpej 		error = (*pr->pr_usrreq)(so, PRU_RCVOOB, m,
    398  1.1   thorpej 		    (struct mbuf *)(long)(flags & MSG_PEEK), (struct mbuf *)0,
    399  1.1   thorpej 		    (struct proc *)0);
    400  1.1   thorpej 		if (error)
    401  1.1   thorpej 			goto bad;
    402  1.1   thorpej 		do {
    403  1.1   thorpej 			resid -= min(resid, m->m_len);
    404  1.1   thorpej 			m = m_free(m);
    405  1.1   thorpej 		} while (resid && error == 0 && m);
    406  1.1   thorpej  bad:
    407  1.1   thorpej 		if (m)
    408  1.1   thorpej 			m_freem(m);
    409  1.1   thorpej 		return (error);
    410  1.1   thorpej 	}
    411  1.1   thorpej 	if (mp)
    412  1.1   thorpej 		*mp = (struct mbuf *)0;
    413  1.1   thorpej 	if (so->so_state & SS_ISCONFIRMING && resid)
    414  1.1   thorpej 		(*pr->pr_usrreq)(so, PRU_RCVD, (struct mbuf *)0,
    415  1.1   thorpej 		    (struct mbuf *)0, (struct mbuf *)0, (struct proc *)0);
    416  1.1   thorpej 
    417  1.1   thorpej  restart:
    418  1.1   thorpej 	if ((error = sblock(&so->so_rcv, SBLOCKWAIT(flags))) != 0)
    419  1.1   thorpej 		return (error);
    420  1.1   thorpej 	s = splsoftnet();
    421  1.1   thorpej 
    422  1.1   thorpej 	m = so->so_rcv.sb_mb;
    423  1.1   thorpej 	/*
    424  1.1   thorpej 	 * If we have less data than requested, block awaiting more
    425  1.1   thorpej 	 * (subject to any timeout) if:
    426  1.1   thorpej 	 *   1. the current count is less than the low water mark,
    427  1.1   thorpej 	 *   2. MSG_WAITALL is set, and it is possible to do the entire
    428  1.1   thorpej 	 *	receive operation at once if we block (resid <= hiwat), or
    429  1.1   thorpej 	 *   3. MSG_DONTWAIT is not set.
    430  1.1   thorpej 	 * If MSG_WAITALL is set but resid is larger than the receive buffer,
    431  1.1   thorpej 	 * we have to do the receive in sections, and thus risk returning
    432  1.1   thorpej 	 * a short count if a timeout or signal occurs after we start.
    433  1.1   thorpej 	 */
    434  1.1   thorpej 	if (m == 0 || (((flags & MSG_DONTWAIT) == 0 &&
    435  1.1   thorpej 	    so->so_rcv.sb_cc < resid) &&
    436  1.1   thorpej 	    (so->so_rcv.sb_cc < so->so_rcv.sb_lowat ||
    437  1.1   thorpej 	    ((flags & MSG_WAITALL) && resid <= so->so_rcv.sb_hiwat)) &&
    438  1.1   thorpej 	    m->m_nextpkt == 0 && (pr->pr_flags & PR_ATOMIC) == 0)) {
    439  1.1   thorpej #ifdef DIAGNOSTIC
    440  1.1   thorpej 		if (m == 0 && so->so_rcv.sb_cc)
    441  1.1   thorpej 			panic("receive 1");
    442  1.1   thorpej #endif
    443  1.1   thorpej 		if (so->so_error) {
    444  1.1   thorpej 			if (m)
    445  1.1   thorpej 				goto dontblock;
    446  1.1   thorpej 			error = so->so_error;
    447  1.1   thorpej 			if ((flags & MSG_PEEK) == 0)
    448  1.1   thorpej 				so->so_error = 0;
    449  1.1   thorpej 			goto release;
    450  1.1   thorpej 		}
    451  1.1   thorpej 		if (so->so_state & SS_CANTRCVMORE) {
    452  1.1   thorpej 			if (m)
    453  1.1   thorpej 				goto dontblock;
    454  1.1   thorpej 			else
    455  1.1   thorpej 				goto release;
    456  1.1   thorpej 		}
    457  1.1   thorpej 		for (; m; m = m->m_next)
    458  1.1   thorpej 			if (m->m_type == MT_OOBDATA  || (m->m_flags & M_EOR)) {
    459  1.1   thorpej 				m = so->so_rcv.sb_mb;
    460  1.1   thorpej 				goto dontblock;
    461  1.1   thorpej 			}
    462  1.1   thorpej 		if ((so->so_state & (SS_ISCONNECTED|SS_ISCONNECTING)) == 0 &&
    463  1.1   thorpej 		    (so->so_proto->pr_flags & PR_CONNREQUIRED)) {
    464  1.1   thorpej 			error = ENOTCONN;
    465  1.1   thorpej 			goto release;
    466  1.1   thorpej 		}
    467  1.1   thorpej 		if (resid == 0)
    468  1.1   thorpej 			goto release;
    469  1.1   thorpej 		if ((so->so_state & SS_NBIO) || (flags & MSG_DONTWAIT)) {
    470  1.1   thorpej 			error = EWOULDBLOCK;
    471  1.1   thorpej 			goto release;
    472  1.1   thorpej 		}
    473  1.1   thorpej 		sbunlock(&so->so_rcv);
    474  1.1   thorpej 		error = sbwait(&so->so_rcv);
    475  1.1   thorpej 		splx(s);
    476  1.1   thorpej 		if (error)
    477  1.1   thorpej 			return (error);
    478  1.1   thorpej 		goto restart;
    479  1.1   thorpej 	}
    480  1.1   thorpej  dontblock:
    481  1.2   thorpej 	/*
    482  1.2   thorpej 	 * On entry here, m points to the first record of the socket buffer.
    483  1.2   thorpej 	 * While we process the initial mbufs containing address and control
    484  1.2   thorpej 	 * info, we save a copy of m->m_nextpkt into nextrecord.
    485  1.2   thorpej 	 */
    486  1.1   thorpej #ifdef notyet /* XXXX */
    487  1.1   thorpej 	if (uio->uio_procp)
    488  1.1   thorpej 		uio->uio_procp->p_stats->p_ru.ru_msgrcv++;
    489  1.1   thorpej #endif
    490  1.2   thorpej 	KASSERT(m == so->so_rcv.sb_mb);
    491  1.2   thorpej 	SBLASTRECORDCHK(&so->so_rcv, "kttcp_soreceive 1");
    492  1.2   thorpej 	SBLASTMBUFCHK(&so->so_rcv, "kttcp_soreceive 1");
    493  1.1   thorpej 	nextrecord = m->m_nextpkt;
    494  1.1   thorpej 	if (pr->pr_flags & PR_ADDR) {
    495  1.1   thorpej #ifdef DIAGNOSTIC
    496  1.1   thorpej 		if (m->m_type != MT_SONAME)
    497  1.1   thorpej 			panic("receive 1a");
    498  1.1   thorpej #endif
    499  1.1   thorpej 		orig_resid = 0;
    500  1.1   thorpej 		if (flags & MSG_PEEK) {
    501  1.1   thorpej 			m = m->m_next;
    502  1.1   thorpej 		} else {
    503  1.1   thorpej 			sbfree(&so->so_rcv, m);
    504  1.1   thorpej 			MFREE(m, so->so_rcv.sb_mb);
    505  1.1   thorpej 			m = so->so_rcv.sb_mb;
    506  1.1   thorpej 		}
    507  1.1   thorpej 	}
    508  1.1   thorpej 	while (m && m->m_type == MT_CONTROL && error == 0) {
    509  1.1   thorpej 		if (flags & MSG_PEEK) {
    510  1.1   thorpej 			m = m->m_next;
    511  1.1   thorpej 		} else {
    512  1.1   thorpej 			sbfree(&so->so_rcv, m);
    513  1.1   thorpej 			MFREE(m, so->so_rcv.sb_mb);
    514  1.1   thorpej 			m = so->so_rcv.sb_mb;
    515  1.1   thorpej 		}
    516  1.1   thorpej 	}
    517  1.2   thorpej 
    518  1.2   thorpej 	/*
    519  1.2   thorpej 	 * If m is non-NULL, we have some data to read.  From now on,
    520  1.2   thorpej 	 * make sure to keep sb_lastrecord consistent when working on
    521  1.2   thorpej 	 * the last packet on the chain (nextrecord == NULL) and we
    522  1.2   thorpej 	 * change m->m_nextpkt.
    523  1.2   thorpej 	 */
    524  1.1   thorpej 	if (m) {
    525  1.2   thorpej 		if ((flags & MSG_PEEK) == 0) {
    526  1.1   thorpej 			m->m_nextpkt = nextrecord;
    527  1.2   thorpej 			/*
    528  1.2   thorpej 			 * If nextrecord == NULL (this is a single chain),
    529  1.2   thorpej 			 * then sb_lastrecord may not be valid here if m
    530  1.2   thorpej 			 * was changed earlier.
    531  1.2   thorpej 			 */
    532  1.2   thorpej 			if (nextrecord == NULL) {
    533  1.2   thorpej 				KASSERT(so->so_rcv.sb_mb == m);
    534  1.2   thorpej 				so->so_rcv.sb_lastrecord = m;
    535  1.2   thorpej 			}
    536  1.2   thorpej 		}
    537  1.1   thorpej 		type = m->m_type;
    538  1.1   thorpej 		if (type == MT_OOBDATA)
    539  1.1   thorpej 			flags |= MSG_OOB;
    540  1.2   thorpej 	} else {
    541  1.2   thorpej 		if ((flags & MSG_PEEK) == 0) {
    542  1.2   thorpej 			KASSERT(so->so_rcv.sb_mb == m);
    543  1.2   thorpej 			so->so_rcv.sb_mb = nextrecord;
    544  1.4   thorpej 			SB_EMPTY_FIXUP(&so->so_rcv);
    545  1.2   thorpej 		}
    546  1.1   thorpej 	}
    547  1.2   thorpej 	SBLASTRECORDCHK(&so->so_rcv, "kttcp_soreceive 2");
    548  1.2   thorpej 	SBLASTMBUFCHK(&so->so_rcv, "kttcp_soreceive 2");
    549  1.2   thorpej 
    550  1.1   thorpej 	moff = 0;
    551  1.1   thorpej 	offset = 0;
    552  1.1   thorpej 	while (m && resid > 0 && error == 0) {
    553  1.1   thorpej 		if (m->m_type == MT_OOBDATA) {
    554  1.1   thorpej 			if (type != MT_OOBDATA)
    555  1.1   thorpej 				break;
    556  1.1   thorpej 		} else if (type == MT_OOBDATA)
    557  1.1   thorpej 			break;
    558  1.1   thorpej #ifdef DIAGNOSTIC
    559  1.1   thorpej 		else if (m->m_type != MT_DATA && m->m_type != MT_HEADER)
    560  1.1   thorpej 			panic("receive 3");
    561  1.1   thorpej #endif
    562  1.1   thorpej 		so->so_state &= ~SS_RCVATMARK;
    563  1.1   thorpej 		len = resid;
    564  1.1   thorpej 		if (so->so_oobmark && len > so->so_oobmark - offset)
    565  1.1   thorpej 			len = so->so_oobmark - offset;
    566  1.1   thorpej 		if (len > m->m_len - moff)
    567  1.1   thorpej 			len = m->m_len - moff;
    568  1.1   thorpej 		/*
    569  1.1   thorpej 		 * If mp is set, just pass back the mbufs.
    570  1.1   thorpej 		 * Otherwise copy them out via the uio, then free.
    571  1.1   thorpej 		 * Sockbuf must be consistent here (points to current mbuf,
    572  1.1   thorpej 		 * it points to next record) when we drop priority;
    573  1.1   thorpej 		 * we must note any additions to the sockbuf when we
    574  1.1   thorpej 		 * block interrupts again.
    575  1.1   thorpej 		 */
    576  1.1   thorpej 		resid -= len;
    577  1.1   thorpej 		if (len == m->m_len - moff) {
    578  1.1   thorpej 			if (m->m_flags & M_EOR)
    579  1.1   thorpej 				flags |= MSG_EOR;
    580  1.1   thorpej 			if (flags & MSG_PEEK) {
    581  1.1   thorpej 				m = m->m_next;
    582  1.1   thorpej 				moff = 0;
    583  1.1   thorpej 			} else {
    584  1.1   thorpej 				nextrecord = m->m_nextpkt;
    585  1.1   thorpej 				sbfree(&so->so_rcv, m);
    586  1.1   thorpej 				if (mp) {
    587  1.1   thorpej 					*mp = m;
    588  1.1   thorpej 					mp = &m->m_next;
    589  1.1   thorpej 					so->so_rcv.sb_mb = m = m->m_next;
    590  1.1   thorpej 					*mp = (struct mbuf *)0;
    591  1.1   thorpej 				} else {
    592  1.1   thorpej 					MFREE(m, so->so_rcv.sb_mb);
    593  1.1   thorpej 					m = so->so_rcv.sb_mb;
    594  1.1   thorpej 				}
    595  1.2   thorpej 				/*
    596  1.2   thorpej 				 * If m != NULL, we also know that
    597  1.2   thorpej 				 * so->so_rcv.sb_mb != NULL.
    598  1.2   thorpej 				 */
    599  1.2   thorpej 				KASSERT(so->so_rcv.sb_mb == m);
    600  1.2   thorpej 				if (m) {
    601  1.1   thorpej 					m->m_nextpkt = nextrecord;
    602  1.2   thorpej 					if (nextrecord == NULL)
    603  1.2   thorpej 						so->so_rcv.sb_lastrecord = m;
    604  1.2   thorpej 				} else {
    605  1.2   thorpej 					so->so_rcv.sb_mb = nextrecord;
    606  1.4   thorpej 					SB_EMPTY_FIXUP(&so->so_rcv);
    607  1.2   thorpej 				}
    608  1.2   thorpej 				SBLASTRECORDCHK(&so->so_rcv,
    609  1.2   thorpej 				    "kttcp_soreceive 3");
    610  1.2   thorpej 				SBLASTMBUFCHK(&so->so_rcv,
    611  1.2   thorpej 				    "kttcp_soreceive 3");
    612  1.1   thorpej 			}
    613  1.1   thorpej 		} else {
    614  1.1   thorpej 			if (flags & MSG_PEEK)
    615  1.1   thorpej 				moff += len;
    616  1.1   thorpej 			else {
    617  1.1   thorpej 				if (mp)
    618  1.1   thorpej 					*mp = m_copym(m, 0, len, M_WAIT);
    619  1.1   thorpej 				m->m_data += len;
    620  1.1   thorpej 				m->m_len -= len;
    621  1.1   thorpej 				so->so_rcv.sb_cc -= len;
    622  1.1   thorpej 			}
    623  1.1   thorpej 		}
    624  1.1   thorpej 		if (so->so_oobmark) {
    625  1.1   thorpej 			if ((flags & MSG_PEEK) == 0) {
    626  1.1   thorpej 				so->so_oobmark -= len;
    627  1.1   thorpej 				if (so->so_oobmark == 0) {
    628  1.1   thorpej 					so->so_state |= SS_RCVATMARK;
    629  1.1   thorpej 					break;
    630  1.1   thorpej 				}
    631  1.1   thorpej 			} else {
    632  1.1   thorpej 				offset += len;
    633  1.1   thorpej 				if (offset == so->so_oobmark)
    634  1.1   thorpej 					break;
    635  1.1   thorpej 			}
    636  1.1   thorpej 		}
    637  1.1   thorpej 		if (flags & MSG_EOR)
    638  1.1   thorpej 			break;
    639  1.1   thorpej 		/*
    640  1.1   thorpej 		 * If the MSG_WAITALL flag is set (for non-atomic socket),
    641  1.1   thorpej 		 * we must not quit until "uio->uio_resid == 0" or an error
    642  1.1   thorpej 		 * termination.  If a signal/timeout occurs, return
    643  1.1   thorpej 		 * with a short count but without error.
    644  1.1   thorpej 		 * Keep sockbuf locked against other readers.
    645  1.1   thorpej 		 */
    646  1.1   thorpej 		while (flags & MSG_WAITALL && m == 0 && resid > 0 &&
    647  1.1   thorpej 		    !sosendallatonce(so) && !nextrecord) {
    648  1.1   thorpej 			if (so->so_error || so->so_state & SS_CANTRCVMORE)
    649  1.1   thorpej 				break;
    650  1.3   thorpej 			/*
    651  1.3   thorpej 			 * If we are peeking and the socket receive buffer is
    652  1.3   thorpej 			 * full, stop since we can't get more data to peek at.
    653  1.3   thorpej 			 */
    654  1.3   thorpej 			if ((flags & MSG_PEEK) && sbspace(&so->so_rcv) <= 0)
    655  1.3   thorpej 				break;
    656  1.3   thorpej 			/*
    657  1.3   thorpej 			 * If we've drained the socket buffer, tell the
    658  1.3   thorpej 			 * protocol in case it needs to do something to
    659  1.3   thorpej 			 * get it filled again.
    660  1.3   thorpej 			 */
    661  1.3   thorpej 			if ((pr->pr_flags & PR_WANTRCVD) && so->so_pcb)
    662  1.3   thorpej 				(*pr->pr_usrreq)(so, PRU_RCVD,
    663  1.3   thorpej 				    (struct mbuf *)0,
    664  1.3   thorpej 				    (struct mbuf *)(long)flags,
    665  1.3   thorpej 				    (struct mbuf *)0,
    666  1.3   thorpej 				    (struct proc *)0);
    667  1.2   thorpej 			SBLASTRECORDCHK(&so->so_rcv,
    668  1.2   thorpej 			    "kttcp_soreceive sbwait 2");
    669  1.2   thorpej 			SBLASTMBUFCHK(&so->so_rcv,
    670  1.2   thorpej 			    "kttcp_soreceive sbwait 2");
    671  1.1   thorpej 			error = sbwait(&so->so_rcv);
    672  1.1   thorpej 			if (error) {
    673  1.1   thorpej 				sbunlock(&so->so_rcv);
    674  1.1   thorpej 				splx(s);
    675  1.1   thorpej 				return (0);
    676  1.1   thorpej 			}
    677  1.1   thorpej 			if ((m = so->so_rcv.sb_mb) != NULL)
    678  1.1   thorpej 				nextrecord = m->m_nextpkt;
    679  1.1   thorpej 		}
    680  1.1   thorpej 	}
    681  1.1   thorpej 
    682  1.1   thorpej 	if (m && pr->pr_flags & PR_ATOMIC) {
    683  1.1   thorpej 		flags |= MSG_TRUNC;
    684  1.1   thorpej 		if ((flags & MSG_PEEK) == 0)
    685  1.1   thorpej 			(void) sbdroprecord(&so->so_rcv);
    686  1.1   thorpej 	}
    687  1.1   thorpej 	if ((flags & MSG_PEEK) == 0) {
    688  1.2   thorpej 		if (m == 0) {
    689  1.2   thorpej 			/*
    690  1.4   thorpej 			 * First part is an SB_EMPTY_FIXUP().  Second part
    691  1.2   thorpej 			 * makes sure sb_lastrecord is up-to-date if
    692  1.2   thorpej 			 * there is still data in the socket buffer.
    693  1.2   thorpej 			 */
    694  1.1   thorpej 			so->so_rcv.sb_mb = nextrecord;
    695  1.2   thorpej 			if (so->so_rcv.sb_mb == NULL) {
    696  1.2   thorpej 				so->so_rcv.sb_mbtail = NULL;
    697  1.2   thorpej 				so->so_rcv.sb_lastrecord = NULL;
    698  1.2   thorpej 			} else if (nextrecord->m_nextpkt == NULL)
    699  1.2   thorpej 				so->so_rcv.sb_lastrecord = nextrecord;
    700  1.2   thorpej 		}
    701  1.2   thorpej 		SBLASTRECORDCHK(&so->so_rcv, "kttcp_soreceive 4");
    702  1.2   thorpej 		SBLASTMBUFCHK(&so->so_rcv, "kttcp_soreceive 4");
    703  1.1   thorpej 		if (pr->pr_flags & PR_WANTRCVD && so->so_pcb)
    704  1.1   thorpej 			(*pr->pr_usrreq)(so, PRU_RCVD, (struct mbuf *)0,
    705  1.1   thorpej 			    (struct mbuf *)(long)flags, (struct mbuf *)0,
    706  1.1   thorpej 			    (struct proc *)0);
    707  1.1   thorpej 	}
    708  1.1   thorpej 	if (orig_resid == resid && orig_resid &&
    709  1.1   thorpej 	    (flags & MSG_EOR) == 0 && (so->so_state & SS_CANTRCVMORE) == 0) {
    710  1.1   thorpej 		sbunlock(&so->so_rcv);
    711  1.1   thorpej 		splx(s);
    712  1.1   thorpej 		goto restart;
    713  1.1   thorpej 	}
    714  1.1   thorpej 
    715  1.1   thorpej 	if (flagsp)
    716  1.1   thorpej 		*flagsp |= flags;
    717  1.1   thorpej  release:
    718  1.1   thorpej 	sbunlock(&so->so_rcv);
    719  1.1   thorpej 	splx(s);
    720  1.1   thorpej 	*done = slen - resid;
    721  1.1   thorpej #if 0
    722  1.1   thorpej 	printf("soreceive: error %d slen %llu resid %lld\n", error, slen, resid);
    723  1.1   thorpej #endif
    724  1.1   thorpej 	return (error);
    725  1.1   thorpej }
    726