Home | History | Annotate | Line # | Download | only in libsockin
sockin.c revision 1.15.2.4
      1  1.15.2.4  yamt /*	$NetBSD: sockin.c,v 1.15.2.4 2010/03/11 15:04:40 yamt Exp $	*/
      2  1.15.2.2  yamt 
      3  1.15.2.2  yamt /*
      4  1.15.2.2  yamt  * Copyright (c) 2008, 2009 Antti Kantee.  All Rights Reserved.
      5  1.15.2.2  yamt  *
      6  1.15.2.2  yamt  * Redistribution and use in source and binary forms, with or without
      7  1.15.2.2  yamt  * modification, are permitted provided that the following conditions
      8  1.15.2.2  yamt  * are met:
      9  1.15.2.2  yamt  * 1. Redistributions of source code must retain the above copyright
     10  1.15.2.2  yamt  *    notice, this list of conditions and the following disclaimer.
     11  1.15.2.2  yamt  * 2. Redistributions in binary form must reproduce the above copyright
     12  1.15.2.2  yamt  *    notice, this list of conditions and the following disclaimer in the
     13  1.15.2.2  yamt  *    documentation and/or other materials provided with the distribution.
     14  1.15.2.2  yamt  *
     15  1.15.2.2  yamt  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
     16  1.15.2.2  yamt  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
     17  1.15.2.2  yamt  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
     18  1.15.2.2  yamt  * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     19  1.15.2.2  yamt  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     20  1.15.2.2  yamt  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
     21  1.15.2.2  yamt  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     22  1.15.2.2  yamt  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     23  1.15.2.2  yamt  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     24  1.15.2.2  yamt  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     25  1.15.2.2  yamt  * SUCH DAMAGE.
     26  1.15.2.2  yamt  */
     27  1.15.2.2  yamt 
     28  1.15.2.2  yamt #include <sys/cdefs.h>
     29  1.15.2.4  yamt __KERNEL_RCSID(0, "$NetBSD: sockin.c,v 1.15.2.4 2010/03/11 15:04:40 yamt Exp $");
     30  1.15.2.2  yamt 
     31  1.15.2.2  yamt #include <sys/param.h>
     32  1.15.2.2  yamt #include <sys/condvar.h>
     33  1.15.2.2  yamt #include <sys/domain.h>
     34  1.15.2.2  yamt #include <sys/kmem.h>
     35  1.15.2.2  yamt #include <sys/kthread.h>
     36  1.15.2.2  yamt #include <sys/mbuf.h>
     37  1.15.2.2  yamt #include <sys/mutex.h>
     38  1.15.2.2  yamt #include <sys/poll.h>
     39  1.15.2.2  yamt #include <sys/protosw.h>
     40  1.15.2.2  yamt #include <sys/queue.h>
     41  1.15.2.2  yamt #include <sys/socket.h>
     42  1.15.2.2  yamt #include <sys/socketvar.h>
     43  1.15.2.2  yamt #include <sys/time.h>
     44  1.15.2.2  yamt 
     45  1.15.2.4  yamt #include <net/bpf.h>
     46  1.15.2.4  yamt #include <net/if.h>
     47  1.15.2.2  yamt #include <net/radix.h>
     48  1.15.2.2  yamt 
     49  1.15.2.2  yamt #include <netinet/in.h>
     50  1.15.2.2  yamt #include <netinet/in_systm.h>
     51  1.15.2.2  yamt #include <netinet/ip.h>
     52  1.15.2.2  yamt 
     53  1.15.2.2  yamt #include <rump/rumpuser.h>
     54  1.15.2.2  yamt 
     55  1.15.2.2  yamt #include "rump_private.h"
     56  1.15.2.2  yamt 
     57  1.15.2.2  yamt /*
     58  1.15.2.2  yamt  * An inet communication domain which uses the socket interface.
     59  1.15.2.2  yamt  * Currently supports only IPv4 UDP, but could easily be extended to
     60  1.15.2.2  yamt  * support IPv6 and TCP by adding more stuff to the protosw.
     61  1.15.2.2  yamt  */
     62  1.15.2.2  yamt 
     63  1.15.2.2  yamt DOMAIN_DEFINE(sockindomain);
     64  1.15.2.2  yamt 
     65  1.15.2.2  yamt static void	sockin_init(void);
     66  1.15.2.2  yamt static int	sockin_usrreq(struct socket *, int, struct mbuf *,
     67  1.15.2.2  yamt 			      struct mbuf *, struct mbuf *, struct lwp *);
     68  1.15.2.2  yamt static int	sockin_ctloutput(int op, struct socket *, struct sockopt *);
     69  1.15.2.2  yamt 
     70  1.15.2.2  yamt const struct protosw sockinsw[] = {
     71  1.15.2.2  yamt {
     72  1.15.2.2  yamt 	.pr_type = SOCK_DGRAM,
     73  1.15.2.2  yamt 	.pr_domain = &sockindomain,
     74  1.15.2.2  yamt 	.pr_protocol = IPPROTO_UDP,
     75  1.15.2.2  yamt 	.pr_flags = PR_ATOMIC|PR_ADDR,
     76  1.15.2.2  yamt 	.pr_usrreq = sockin_usrreq,
     77  1.15.2.2  yamt 	.pr_ctloutput = sockin_ctloutput,
     78  1.15.2.2  yamt },
     79  1.15.2.2  yamt {
     80  1.15.2.2  yamt 	.pr_type = SOCK_STREAM,
     81  1.15.2.2  yamt 	.pr_domain = &sockindomain,
     82  1.15.2.2  yamt 	.pr_protocol = IPPROTO_TCP,
     83  1.15.2.2  yamt 	.pr_flags = PR_CONNREQUIRED|PR_WANTRCVD|PR_LISTEN|PR_ABRTACPTDIS,
     84  1.15.2.2  yamt 	.pr_usrreq = sockin_usrreq,
     85  1.15.2.2  yamt 	.pr_ctloutput = sockin_ctloutput,
     86  1.15.2.2  yamt }};
     87  1.15.2.2  yamt 
     88  1.15.2.2  yamt struct domain sockindomain = {
     89  1.15.2.2  yamt 	.dom_family = PF_INET,
     90  1.15.2.2  yamt 	.dom_name = "socket_inet",
     91  1.15.2.2  yamt 	.dom_init = sockin_init,
     92  1.15.2.2  yamt 	.dom_externalize = NULL,
     93  1.15.2.2  yamt 	.dom_dispose = NULL,
     94  1.15.2.2  yamt 	.dom_protosw = sockinsw,
     95  1.15.2.2  yamt 	.dom_protoswNPROTOSW = &sockinsw[__arraycount(sockinsw)],
     96  1.15.2.2  yamt 	.dom_rtattach = rn_inithead,
     97  1.15.2.2  yamt 	.dom_rtoffset = 32,
     98  1.15.2.2  yamt 	.dom_maxrtkey = sizeof(struct sockaddr_in),
     99  1.15.2.2  yamt 	.dom_ifattach = NULL,
    100  1.15.2.2  yamt 	.dom_ifdetach = NULL,
    101  1.15.2.2  yamt 	.dom_ifqueues = { NULL },
    102  1.15.2.2  yamt 	.dom_link = { NULL },
    103  1.15.2.2  yamt 	.dom_mowner = MOWNER_INIT("",""),
    104  1.15.2.2  yamt 	.dom_rtcache = { NULL },
    105  1.15.2.2  yamt 	.dom_sockaddr_cmp = NULL
    106  1.15.2.2  yamt };
    107  1.15.2.2  yamt 
    108  1.15.2.2  yamt #define SO2S(so) ((intptr_t)(so->so_internal))
    109  1.15.2.2  yamt #define SOCKIN_SBSIZE 65536
    110  1.15.2.2  yamt 
    111  1.15.2.2  yamt struct sockin_unit {
    112  1.15.2.2  yamt 	struct socket *su_so;
    113  1.15.2.2  yamt 
    114  1.15.2.2  yamt 	LIST_ENTRY(sockin_unit) su_entries;
    115  1.15.2.2  yamt };
    116  1.15.2.2  yamt static LIST_HEAD(, sockin_unit) su_ent = LIST_HEAD_INITIALIZER(su_ent);
    117  1.15.2.2  yamt static kmutex_t su_mtx;
    118  1.15.2.2  yamt static bool rebuild;
    119  1.15.2.2  yamt static int nsock;
    120  1.15.2.2  yamt 
    121  1.15.2.4  yamt /* XXX: for the bpf hack */
    122  1.15.2.4  yamt static struct ifnet sockin_if;
    123  1.15.2.4  yamt int ifpromisc(struct ifnet *ifp, int pswitch) { return 0; }
    124  1.15.2.4  yamt 
    125  1.15.2.2  yamt static int
    126  1.15.2.2  yamt registersock(struct socket *so, int news)
    127  1.15.2.2  yamt {
    128  1.15.2.2  yamt 	struct sockin_unit *su;
    129  1.15.2.2  yamt 
    130  1.15.2.2  yamt 	su = kmem_alloc(sizeof(*su), KM_NOSLEEP);
    131  1.15.2.2  yamt 	if (!su)
    132  1.15.2.2  yamt 		return ENOMEM;
    133  1.15.2.2  yamt 
    134  1.15.2.2  yamt 	so->so_internal = (void *)(intptr_t)news;
    135  1.15.2.2  yamt 	su->su_so = so;
    136  1.15.2.2  yamt 
    137  1.15.2.2  yamt 	mutex_enter(&su_mtx);
    138  1.15.2.2  yamt 	LIST_INSERT_HEAD(&su_ent, su, su_entries);
    139  1.15.2.2  yamt 	nsock++;
    140  1.15.2.2  yamt 	rebuild = true;
    141  1.15.2.2  yamt 	mutex_exit(&su_mtx);
    142  1.15.2.2  yamt 
    143  1.15.2.2  yamt 	return 0;
    144  1.15.2.2  yamt }
    145  1.15.2.2  yamt 
    146  1.15.2.2  yamt static void
    147  1.15.2.2  yamt removesock(struct socket *so)
    148  1.15.2.2  yamt {
    149  1.15.2.2  yamt 	struct sockin_unit *su_iter;
    150  1.15.2.2  yamt 	int error;
    151  1.15.2.2  yamt 
    152  1.15.2.2  yamt 	mutex_enter(&su_mtx);
    153  1.15.2.2  yamt 	LIST_FOREACH(su_iter, &su_ent, su_entries) {
    154  1.15.2.2  yamt 		if (su_iter->su_so == so)
    155  1.15.2.2  yamt 			break;
    156  1.15.2.2  yamt 	}
    157  1.15.2.2  yamt 	if (!su_iter)
    158  1.15.2.2  yamt 		panic("no such socket");
    159  1.15.2.2  yamt 
    160  1.15.2.2  yamt 	LIST_REMOVE(su_iter, su_entries);
    161  1.15.2.2  yamt 	nsock--;
    162  1.15.2.2  yamt 	rebuild = true;
    163  1.15.2.2  yamt 	mutex_exit(&su_mtx);
    164  1.15.2.2  yamt 
    165  1.15.2.2  yamt 	rumpuser_close(SO2S(su_iter->su_so), &error);
    166  1.15.2.2  yamt 	kmem_free(su_iter, sizeof(*su_iter));
    167  1.15.2.2  yamt }
    168  1.15.2.2  yamt 
    169  1.15.2.2  yamt static void
    170  1.15.2.2  yamt sockin_process(struct socket *so)
    171  1.15.2.2  yamt {
    172  1.15.2.2  yamt 	struct sockaddr_in from;
    173  1.15.2.2  yamt 	struct iovec io;
    174  1.15.2.2  yamt 	struct msghdr rmsg;
    175  1.15.2.2  yamt 	struct mbuf *m;
    176  1.15.2.2  yamt 	ssize_t n;
    177  1.15.2.2  yamt 	size_t plen;
    178  1.15.2.2  yamt 	int error;
    179  1.15.2.2  yamt 
    180  1.15.2.2  yamt 	m = m_gethdr(M_WAIT, MT_DATA);
    181  1.15.2.2  yamt 	if (so->so_proto->pr_type == SOCK_DGRAM) {
    182  1.15.2.2  yamt 		plen = IP_MAXPACKET;
    183  1.15.2.2  yamt 		MEXTMALLOC(m, plen, M_DONTWAIT);
    184  1.15.2.2  yamt 	} else {
    185  1.15.2.2  yamt 		plen = MCLBYTES;
    186  1.15.2.2  yamt 		MCLGET(m, M_DONTWAIT);
    187  1.15.2.2  yamt 	}
    188  1.15.2.2  yamt 	if ((m->m_flags & M_EXT) == 0) {
    189  1.15.2.2  yamt 		m_freem(m);
    190  1.15.2.2  yamt 		return;
    191  1.15.2.2  yamt 	}
    192  1.15.2.2  yamt 
    193  1.15.2.2  yamt 	memset(&rmsg, 0, sizeof(rmsg));
    194  1.15.2.2  yamt 	io.iov_base = mtod(m, void *);
    195  1.15.2.2  yamt 	io.iov_len = plen;
    196  1.15.2.2  yamt 	rmsg.msg_iov = &io;
    197  1.15.2.2  yamt 	rmsg.msg_iovlen = 1;
    198  1.15.2.2  yamt 	rmsg.msg_name = (struct sockaddr *)&from;
    199  1.15.2.2  yamt 	rmsg.msg_namelen = sizeof(from);
    200  1.15.2.2  yamt 
    201  1.15.2.2  yamt 	n = rumpuser_net_recvmsg(SO2S(so), &rmsg, 0, &error);
    202  1.15.2.2  yamt 	if (n <= 0) {
    203  1.15.2.2  yamt 		m_freem(m);
    204  1.15.2.2  yamt 
    205  1.15.2.2  yamt 		/* Treat a TCP socket a goner */
    206  1.15.2.3  yamt 		if (error != EAGAIN && so->so_proto->pr_type == SOCK_STREAM) {
    207  1.15.2.2  yamt 			mutex_enter(softnet_lock);
    208  1.15.2.2  yamt 			soisdisconnected(so);
    209  1.15.2.2  yamt 			mutex_exit(softnet_lock);
    210  1.15.2.2  yamt 			removesock(so);
    211  1.15.2.2  yamt 		}
    212  1.15.2.2  yamt 		return;
    213  1.15.2.2  yamt 	}
    214  1.15.2.2  yamt 	m->m_len = m->m_pkthdr.len = n;
    215  1.15.2.2  yamt 
    216  1.15.2.4  yamt 	if (sockin_if.if_bpf)
    217  1.15.2.4  yamt 		bpf_ops->bpf_mtap_af(sockin_if.if_bpf, AF_UNSPEC, m);
    218  1.15.2.4  yamt 
    219  1.15.2.2  yamt 	mutex_enter(softnet_lock);
    220  1.15.2.2  yamt 	if (so->so_proto->pr_type == SOCK_DGRAM) {
    221  1.15.2.2  yamt 		if (!sbappendaddr(&so->so_rcv, rmsg.msg_name, m, NULL)) {
    222  1.15.2.2  yamt 			m_freem(m);
    223  1.15.2.2  yamt 		}
    224  1.15.2.2  yamt 	} else {
    225  1.15.2.2  yamt 		sbappendstream(&so->so_rcv, m);
    226  1.15.2.2  yamt 	}
    227  1.15.2.2  yamt 
    228  1.15.2.2  yamt 	sorwakeup(so);
    229  1.15.2.2  yamt 	mutex_exit(softnet_lock);
    230  1.15.2.2  yamt }
    231  1.15.2.2  yamt 
    232  1.15.2.2  yamt static void
    233  1.15.2.2  yamt sockin_accept(struct socket *so)
    234  1.15.2.2  yamt {
    235  1.15.2.2  yamt 	struct socket *nso;
    236  1.15.2.2  yamt 	struct sockaddr_in sin;
    237  1.15.2.2  yamt 	int news, error, slen;
    238  1.15.2.2  yamt 
    239  1.15.2.2  yamt 	slen = sizeof(sin);
    240  1.15.2.2  yamt 	news = rumpuser_net_accept(SO2S(so), (struct sockaddr *)&sin,
    241  1.15.2.2  yamt 	    &slen, &error);
    242  1.15.2.2  yamt 	if (news == -1)
    243  1.15.2.2  yamt 		return;
    244  1.15.2.2  yamt 
    245  1.15.2.2  yamt 	mutex_enter(softnet_lock);
    246  1.15.2.2  yamt 	nso = sonewconn(so, SS_ISCONNECTED);
    247  1.15.2.2  yamt 	if (nso == NULL)
    248  1.15.2.2  yamt 		goto errout;
    249  1.15.2.2  yamt 	if (registersock(nso, news) != 0)
    250  1.15.2.2  yamt 		goto errout;
    251  1.15.2.2  yamt 	mutex_exit(softnet_lock);
    252  1.15.2.2  yamt 	return;
    253  1.15.2.2  yamt 
    254  1.15.2.2  yamt  errout:
    255  1.15.2.2  yamt 	rumpuser_close(news, &error);
    256  1.15.2.2  yamt 	if (nso)
    257  1.15.2.2  yamt 		soclose(nso);
    258  1.15.2.2  yamt 	mutex_exit(softnet_lock);
    259  1.15.2.2  yamt }
    260  1.15.2.2  yamt 
    261  1.15.2.2  yamt #define POLLTIMEOUT 100	/* check for new entries every 100ms */
    262  1.15.2.2  yamt 
    263  1.15.2.2  yamt /* XXX: doesn't handle socket (kernel) locking properly? */
    264  1.15.2.2  yamt static void
    265  1.15.2.2  yamt sockinworker(void *arg)
    266  1.15.2.2  yamt {
    267  1.15.2.2  yamt 	struct pollfd *pfds = NULL, *npfds;
    268  1.15.2.2  yamt 	struct sockin_unit *su_iter;
    269  1.15.2.2  yamt 	struct socket *so;
    270  1.15.2.2  yamt 	int cursock = 0, i, rv, error;
    271  1.15.2.2  yamt 
    272  1.15.2.2  yamt 	/*
    273  1.15.2.2  yamt 	 * Loop reading requests.  Check for new sockets periodically
    274  1.15.2.2  yamt 	 * (could be smarter, but I'm lazy).
    275  1.15.2.2  yamt 	 */
    276  1.15.2.2  yamt 	for (;;) {
    277  1.15.2.2  yamt 		if (rebuild) {
    278  1.15.2.2  yamt 			npfds = NULL;
    279  1.15.2.2  yamt 			mutex_enter(&su_mtx);
    280  1.15.2.2  yamt 			if (nsock)
    281  1.15.2.2  yamt 				npfds = kmem_alloc(nsock * sizeof(*npfds),
    282  1.15.2.2  yamt 				    KM_NOSLEEP);
    283  1.15.2.2  yamt 			if (npfds || nsock == 0) {
    284  1.15.2.2  yamt 				if (pfds)
    285  1.15.2.2  yamt 					kmem_free(pfds, cursock*sizeof(*pfds));
    286  1.15.2.2  yamt 				pfds = npfds;
    287  1.15.2.2  yamt 				cursock = nsock;
    288  1.15.2.2  yamt 				rebuild = false;
    289  1.15.2.2  yamt 
    290  1.15.2.2  yamt 				i = 0;
    291  1.15.2.2  yamt 				LIST_FOREACH(su_iter, &su_ent, su_entries) {
    292  1.15.2.2  yamt 					pfds[i].fd = SO2S(su_iter->su_so);
    293  1.15.2.2  yamt 					pfds[i].events = POLLIN;
    294  1.15.2.2  yamt 					pfds[i].revents = 0;
    295  1.15.2.2  yamt 					i++;
    296  1.15.2.2  yamt 				}
    297  1.15.2.2  yamt 				KASSERT(i == nsock);
    298  1.15.2.2  yamt 			}
    299  1.15.2.2  yamt 			mutex_exit(&su_mtx);
    300  1.15.2.2  yamt 		}
    301  1.15.2.2  yamt 
    302  1.15.2.2  yamt 		/* find affected sockets & process */
    303  1.15.2.2  yamt 		rv = rumpuser_poll(pfds, cursock, POLLTIMEOUT, &error);
    304  1.15.2.2  yamt 		for (i = 0; i < cursock && rv > 0; i++) {
    305  1.15.2.2  yamt 			if (pfds[i].revents & POLLIN) {
    306  1.15.2.2  yamt 				mutex_enter(&su_mtx);
    307  1.15.2.2  yamt 				LIST_FOREACH(su_iter, &su_ent, su_entries) {
    308  1.15.2.2  yamt 					if (SO2S(su_iter->su_so)==pfds[i].fd) {
    309  1.15.2.2  yamt 						so = su_iter->su_so;
    310  1.15.2.2  yamt 						mutex_exit(&su_mtx);
    311  1.15.2.2  yamt 						if(so->so_options&SO_ACCEPTCONN)
    312  1.15.2.2  yamt 							sockin_accept(so);
    313  1.15.2.2  yamt 						else
    314  1.15.2.2  yamt 							sockin_process(so);
    315  1.15.2.2  yamt 						mutex_enter(&su_mtx);
    316  1.15.2.2  yamt 						break;
    317  1.15.2.2  yamt 					}
    318  1.15.2.2  yamt 				}
    319  1.15.2.2  yamt 				/* if we can't find it, just wing it */
    320  1.15.2.2  yamt 				KASSERT(rebuild || su_iter);
    321  1.15.2.2  yamt 				mutex_exit(&su_mtx);
    322  1.15.2.2  yamt 				pfds[i].revents = 0;
    323  1.15.2.2  yamt 				rv--;
    324  1.15.2.2  yamt 				i = -1;
    325  1.15.2.2  yamt 				continue;
    326  1.15.2.2  yamt 			}
    327  1.15.2.2  yamt 
    328  1.15.2.2  yamt 			/* something else?  ignore */
    329  1.15.2.2  yamt 			if (pfds[i].revents) {
    330  1.15.2.2  yamt 				pfds[i].revents = 0;
    331  1.15.2.2  yamt 				rv--;
    332  1.15.2.2  yamt 			}
    333  1.15.2.2  yamt 		}
    334  1.15.2.2  yamt 		KASSERT(rv <= 0);
    335  1.15.2.2  yamt 	}
    336  1.15.2.2  yamt 
    337  1.15.2.2  yamt }
    338  1.15.2.2  yamt 
    339  1.15.2.2  yamt static void
    340  1.15.2.2  yamt sockin_init(void)
    341  1.15.2.2  yamt {
    342  1.15.2.2  yamt 	int rv;
    343  1.15.2.2  yamt 
    344  1.15.2.2  yamt 	if (rump_threads) {
    345  1.15.2.2  yamt 		if ((rv = kthread_create(PRI_NONE, 0, NULL, sockinworker,
    346  1.15.2.2  yamt 		    NULL, NULL, "sockwork")) != 0)
    347  1.15.2.2  yamt 			panic("sockin_init: could not create worker thread\n");
    348  1.15.2.2  yamt 	} else {
    349  1.15.2.2  yamt 		printf("sockin_init: no threads => no worker thread\n");
    350  1.15.2.2  yamt 	}
    351  1.15.2.2  yamt 	mutex_init(&su_mtx, MUTEX_DEFAULT, IPL_NONE);
    352  1.15.2.4  yamt 	strlcpy(sockin_if.if_xname, "sockin0", sizeof(sockin_if.if_xname));
    353  1.15.2.4  yamt 	bpf_ops->bpf_attach(&sockin_if, DLT_NULL, 0, &sockin_if.if_bpf);
    354  1.15.2.2  yamt }
    355  1.15.2.2  yamt 
    356  1.15.2.2  yamt static int
    357  1.15.2.2  yamt sockin_usrreq(struct socket *so, int req, struct mbuf *m, struct mbuf *nam,
    358  1.15.2.2  yamt 	struct mbuf *control, struct lwp *l)
    359  1.15.2.2  yamt {
    360  1.15.2.2  yamt 	int error = 0, rv;
    361  1.15.2.2  yamt 
    362  1.15.2.2  yamt 	switch (req) {
    363  1.15.2.2  yamt 	case PRU_ATTACH:
    364  1.15.2.2  yamt 	{
    365  1.15.2.2  yamt 		int news, dummy;
    366  1.15.2.4  yamt 		int sbsize;
    367  1.15.2.2  yamt 
    368  1.15.2.2  yamt 		sosetlock(so);
    369  1.15.2.2  yamt 		if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
    370  1.15.2.2  yamt 			error = soreserve(so, SOCKIN_SBSIZE, SOCKIN_SBSIZE);
    371  1.15.2.2  yamt 			if (error)
    372  1.15.2.2  yamt 				break;
    373  1.15.2.2  yamt 		}
    374  1.15.2.2  yamt 
    375  1.15.2.2  yamt 		news = rumpuser_net_socket(PF_INET, so->so_proto->pr_type,
    376  1.15.2.2  yamt 		    0, &error);
    377  1.15.2.2  yamt 		if (news == -1)
    378  1.15.2.2  yamt 			break;
    379  1.15.2.2  yamt 
    380  1.15.2.4  yamt 		/* for UDP sockets, make sure we can send&recv max */
    381  1.15.2.4  yamt 		if (so->so_proto->pr_type == SOCK_DGRAM) {
    382  1.15.2.4  yamt 			sbsize = SOCKIN_SBSIZE;
    383  1.15.2.4  yamt 			rumpuser_net_setsockopt(news, SOL_SOCKET, SO_SNDBUF,
    384  1.15.2.4  yamt 			    &sbsize, sizeof(sbsize), &error);
    385  1.15.2.4  yamt 			sbsize = SOCKIN_SBSIZE;
    386  1.15.2.4  yamt 			rumpuser_net_setsockopt(news, SOL_SOCKET, SO_RCVBUF,
    387  1.15.2.4  yamt 			    &sbsize, sizeof(sbsize), &error);
    388  1.15.2.4  yamt 		}
    389  1.15.2.4  yamt 
    390  1.15.2.2  yamt 		if ((error = registersock(so, news)) != 0)
    391  1.15.2.2  yamt 			rumpuser_close(news, &dummy);
    392  1.15.2.2  yamt 
    393  1.15.2.2  yamt 		break;
    394  1.15.2.2  yamt 	}
    395  1.15.2.2  yamt 
    396  1.15.2.2  yamt 	case PRU_ACCEPT:
    397  1.15.2.2  yamt 		/* we do all the work in the worker thread */
    398  1.15.2.2  yamt 		break;
    399  1.15.2.2  yamt 
    400  1.15.2.2  yamt 	case PRU_BIND:
    401  1.15.2.2  yamt 		rumpuser_net_bind(SO2S(so), mtod(nam, const struct sockaddr *),
    402  1.15.2.2  yamt 		    sizeof(struct sockaddr_in), &error);
    403  1.15.2.2  yamt 		break;
    404  1.15.2.2  yamt 
    405  1.15.2.2  yamt 	case PRU_CONNECT:
    406  1.15.2.2  yamt 		rv = rumpuser_net_connect(SO2S(so),
    407  1.15.2.2  yamt 		    mtod(nam, struct sockaddr *), sizeof(struct sockaddr_in),
    408  1.15.2.2  yamt 		    &error);
    409  1.15.2.2  yamt 		if (rv == 0)
    410  1.15.2.2  yamt 			soisconnected(so);
    411  1.15.2.2  yamt 		break;
    412  1.15.2.2  yamt 
    413  1.15.2.2  yamt 	case PRU_LISTEN:
    414  1.15.2.2  yamt 		rumpuser_net_listen(SO2S(so), so->so_qlimit, &error);
    415  1.15.2.2  yamt 		break;
    416  1.15.2.2  yamt 
    417  1.15.2.2  yamt 	case PRU_SEND:
    418  1.15.2.2  yamt 	{
    419  1.15.2.2  yamt 		struct sockaddr *saddr;
    420  1.15.2.2  yamt 		struct msghdr mhdr;
    421  1.15.2.4  yamt 		size_t iov_max, i;
    422  1.15.2.4  yamt 		struct iovec iov_buf[32], *iov;
    423  1.15.2.2  yamt 		struct mbuf *m2;
    424  1.15.2.2  yamt 		size_t tot;
    425  1.15.2.4  yamt 		int s;
    426  1.15.2.4  yamt 
    427  1.15.2.4  yamt 		if (sockin_if.if_bpf)
    428  1.15.2.4  yamt 			bpf_ops->bpf_mtap_af(sockin_if.if_bpf, AF_UNSPEC, m);
    429  1.15.2.2  yamt 
    430  1.15.2.2  yamt 		memset(&mhdr, 0, sizeof(mhdr));
    431  1.15.2.2  yamt 
    432  1.15.2.4  yamt 		iov_max = 0;
    433  1.15.2.4  yamt 		for (m2 = m; m2 != NULL; m2 = m2->m_next) {
    434  1.15.2.4  yamt 			iov_max++;
    435  1.15.2.4  yamt 		}
    436  1.15.2.4  yamt 
    437  1.15.2.4  yamt 		if (iov_max <= __arraycount(iov_buf)) {
    438  1.15.2.4  yamt 			iov = iov_buf;
    439  1.15.2.4  yamt 		} else {
    440  1.15.2.4  yamt 			iov = kmem_alloc(sizeof(struct iovec) * iov_max,
    441  1.15.2.4  yamt 			    KM_SLEEP);
    442  1.15.2.4  yamt 		}
    443  1.15.2.4  yamt 
    444  1.15.2.2  yamt 		tot = 0;
    445  1.15.2.4  yamt 		for (i = 0, m2 = m; m2 != NULL; m2 = m2->m_next, i++) {
    446  1.15.2.2  yamt 			iov[i].iov_base = m2->m_data;
    447  1.15.2.2  yamt 			iov[i].iov_len = m2->m_len;
    448  1.15.2.2  yamt 			tot += m2->m_len;
    449  1.15.2.2  yamt 		}
    450  1.15.2.2  yamt 		mhdr.msg_iov = iov;
    451  1.15.2.2  yamt 		mhdr.msg_iovlen = i;
    452  1.15.2.2  yamt 		s = SO2S(so);
    453  1.15.2.2  yamt 
    454  1.15.2.4  yamt 		if (nam != NULL) {
    455  1.15.2.2  yamt 			saddr = mtod(nam, struct sockaddr *);
    456  1.15.2.2  yamt 			mhdr.msg_name = saddr;
    457  1.15.2.2  yamt 			mhdr.msg_namelen = saddr->sa_len;
    458  1.15.2.2  yamt 		}
    459  1.15.2.2  yamt 
    460  1.15.2.2  yamt 		rumpuser_net_sendmsg(s, &mhdr, 0, &error);
    461  1.15.2.2  yamt 
    462  1.15.2.4  yamt 		if (iov != iov_buf)
    463  1.15.2.4  yamt 			kmem_free(iov, sizeof(struct iovec) * iov_max);
    464  1.15.2.4  yamt 
    465  1.15.2.2  yamt 		m_freem(m);
    466  1.15.2.2  yamt 		m_freem(control);
    467  1.15.2.2  yamt 
    468  1.15.2.2  yamt 		/* this assumes too many things to list.. buthey, testing */
    469  1.15.2.2  yamt 		if (!rump_threads)
    470  1.15.2.2  yamt 			sockin_process(so);
    471  1.15.2.2  yamt 	}
    472  1.15.2.2  yamt 		break;
    473  1.15.2.2  yamt 
    474  1.15.2.2  yamt 	case PRU_SHUTDOWN:
    475  1.15.2.2  yamt 		removesock(so);
    476  1.15.2.2  yamt 		break;
    477  1.15.2.2  yamt 
    478  1.15.2.2  yamt 	case PRU_SOCKADDR:
    479  1.15.2.2  yamt 	case PRU_PEERADDR:
    480  1.15.2.2  yamt 	{
    481  1.15.2.2  yamt 		int slen = nam->m_len;
    482  1.15.2.2  yamt 		enum rumpuser_getnametype which;
    483  1.15.2.2  yamt 
    484  1.15.2.2  yamt 		if (req == PRU_SOCKADDR)
    485  1.15.2.2  yamt 			which = RUMPUSER_SOCKNAME;
    486  1.15.2.2  yamt 		else
    487  1.15.2.2  yamt 			which = RUMPUSER_PEERNAME;
    488  1.15.2.2  yamt 		rumpuser_net_getname(SO2S(so),
    489  1.15.2.2  yamt 		    mtod(nam, struct sockaddr *), &slen, which, &error);
    490  1.15.2.2  yamt 		if (error == 0)
    491  1.15.2.2  yamt 			nam->m_len = slen;
    492  1.15.2.2  yamt 		break;
    493  1.15.2.2  yamt 	}
    494  1.15.2.2  yamt 
    495  1.15.2.2  yamt 	default:
    496  1.15.2.2  yamt 		panic("sockin_usrreq: IMPLEMENT ME, req %d not supported", req);
    497  1.15.2.2  yamt 	}
    498  1.15.2.2  yamt 
    499  1.15.2.2  yamt 	return error;
    500  1.15.2.2  yamt }
    501  1.15.2.2  yamt 
    502  1.15.2.2  yamt static int
    503  1.15.2.2  yamt sockin_ctloutput(int op, struct socket *so, struct sockopt *sopt)
    504  1.15.2.2  yamt {
    505  1.15.2.3  yamt 	int error;
    506  1.15.2.2  yamt 
    507  1.15.2.3  yamt 	rumpuser_net_setsockopt(SO2S(so), sopt->sopt_level,
    508  1.15.2.3  yamt 	    sopt->sopt_name, sopt->sopt_data, sopt->sopt_size, &error);
    509  1.15.2.3  yamt 	return error;
    510  1.15.2.2  yamt }
    511