* Copyright (c) 1991 The Regents of the University of California.
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* from: @(#)tp_usrreq.c 7.17 (Berkeley) 6/27/91
* $Id: tp_usrreq.c,v 1.3 1993/11/25 01:36:15 wollman Exp $
/***********************************************************
Copyright IBM Corporation 1987
Permission to use, copy, modify, and distribute this software and its
documentation for any purpose and without fee is hereby granted,
provided that the above copyright notice appear in all copies and that
both that copyright notice and this permission notice appear in
supporting documentation, and that the name of IBM not be
used in advertising or publicity pertaining to distribution of the
software without specific, written prior permission.
IBM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING
ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL
IBM BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
******************************************************************/
* ARGO Project, Computer Sciences Dept., University of Wisconsin - Madison
* tp_usrreq(), the fellow that gets called from most of the socket code.
* THe only really awful stuff here is the OOB processing, which is done
* tp_rcvoob() and tp_sendoob() are contained here and called by tp_usrreq().
int tp_confirm(struct tp_pcb
*);
int tp_attach(), tp_driver();
struct tp_pcb
*tp_listeners
, *tp_intercepts
;
* anywhere you want to debug...
* FUNCTION and ARGUMENTS:
* print (str) followed by the control info in the mbufs of an mbuf chain (n)
printf("dump %s\n", str
);
printf("%x : Len %x Data %x A %x Nx %x Tp %x\n",
n
, n
->m_len
, n
->m_data
, n
->m_act
, n
->m_next
, n
->m_type
);
register char *p
= mtod(n
, char *);
for (i
= 0; i
< n
->m_len
; i
++) {
* tp_usrreq(), PRU_RCVOOB
* FUNCTION and ARGUMENTS:
* Copy data from the expedited data socket buffer into
* the pre-allocated mbuf m.
* There is an isomorphism between XPD TPDUs and expedited data TSDUs.
* XPD tpdus are limited to 16 bytes of data so they fit in one mbuf.
* EINVAL if debugging is on and a disaster has occurred
* ENOTCONN if the socket isn't connected
* EWOULDBLOCK if the socket is in non-blocking mode and there's no
* E* whatever is returned from the fsm.
tp_rcvoob(tpcb
, so
, m
, outflags
, inflags
)
register struct socket
*so
;
register struct sockbuf
*sb
= &so
->so_rcv
;
register struct mbuf
**nn
;
printf("PRU_RCVOOB, sostate 0x%x\n", so
->so_state
);
/* if you use soreceive */
if ((((so
->so_state
& SS_ISCONNECTED
) == 0)
|| (so
->so_state
& SS_ISDISCONNECTING
) != 0) &&
(so
->so_proto
->pr_flags
& PR_CONNREQUIRED
)) {
/* Take the first mbuf off the chain.
* Each XPD TPDU gives you a complete TSDU so the chains don't get
* coalesced, but one TSDU may span several mbufs.
* Nevertheless, since n should have a most 16 bytes, it
* will fit into m. (size was checked in tp_input() )
* Code for excision of OOB data should be added to
* uipc_socket2.c (like sbappend).
for (nn
= &sb
->sb_mb
; n
= *nn
; nn
= &n
->m_act
)
if (n
->m_type
== MT_OOBDATA
)
printf("RCVOOB: empty queue!\n");
if (so
->so_state
& SS_NBIO
) {
/* Assuming at most one xpd tpdu is in the buffer at once */
bcopy(mtod(n
, caddr_t
), mtod(m
, caddr_t
), (unsigned)n
->m_len
);
m
->m_data
+= n
->m_len
; /* so mtod() in bcopy() above gives right addr */
printf("tp_rcvoob: xpdlen 0x%x\n", m
->m_len
);
dump_mbuf(so
->so_rcv
.sb_mb
, "RCVOOB: Rcv socketbuf");
dump_mbuf(sb
->sb_mb
, "RCVOOB: Xrcv socketbuf");
if ((inflags
& MSG_PEEK
) == 0) {
tptraceTPCB(TPPTmisc
, "PRU_RCVOOB @ release sb_cc m_len",
tpcb
->tp_Xrcv
.sb_cc
, m
->m_len
, 0, 0);
error
= DoEvent(T_USR_Xrcvd
);
* tp_usrreq(), PRU_SENDOOB
* FUNCTION and ARGUMENTS:
* Send what's in the mbuf chain (m) as an XPD TPDU.
* The mbuf may not contain more then 16 bytes of data.
* XPD TSDUs aren't segmented, so they translate into
* exactly one XPD TPDU, with EOT bit set.
* EWOULDBLOCK if socket is in non-blocking mode and the previous
* xpd data haven't been acked yet.
* EMSGSIZE if trying to send > max-xpd bytes (16)
* ENOBUFS if ran out of mbufs
tp_sendoob(tpcb
, so
, xdata
, outflags
)
register struct socket
*so
;
register struct mbuf
*xdata
;
int *outflags
; /* not used */
* Each mbuf chain represents a sequence # in the XPD seq space.
* The first one in the queue has sequence # tp_Xuna.
* When we add to the XPD queue, we stuff a zero-length
* mbuf (mark) into the DATA queue, with its sequence number in m_next
* to be assigned to this XPD tpdu, so data xfer can stop
* when it reaches the zero-length mbuf if this XPD TPDU hasn't
register struct sockbuf
*sb
= &(tpcb
->tp_Xsnd
);
register struct mbuf
*xmark
;
printf("xdata len 0x%x\n", xdata
->m_len
);
/* DO NOT LOCK the Xsnd buffer!!!! You can have at MOST one
* socket buf locked at any time!!! (otherwise you might
* sleep() in sblock() w/ a signal pending and cause the
* system call to be aborted w/ a locked socketbuf, which
* is a problem. So the so_snd buffer lock
* (done in sosend()) serves as the lock for Xpd.
if (sb
->sb_mb
) { /* Anything already in eXpedited data sockbuf? */
if (so
->so_state
& SS_NBIO
) {
sbunlock(&so
->so_snd
); /* already locked by sosend */
sblock(&so
->so_snd
); /* sosend will unlock on return */
if (xdata
== (struct mbuf
*)0) {
MGETHDR(xdata
, M_WAIT
, MT_OOBDATA
);
printf("xdata len 0x%x\n", xdata
->m_len
);
xmark
= xdata
; /* temporary use of variable xmark */
if (len
> TP_MAX_XPD_DATA
) {
printf("xdata len 0x%x\n", len
);
tptraceTPCB(TPPTmisc
, "XPD mark m_next ", xdata
->m_next
, 0, 0, 0);
sbappendrecord(sb
, xdata
);
printf("tp_sendoob len 0x%x\n", len
);
dump_mbuf(so
->so_snd
.sb_mb
, "XPD request Regular sndbuf:");
dump_mbuf(tpcb
->tp_Xsnd
.sb_mb
, "XPD request Xsndbuf:");
return DoEvent(T_XPD_req
);
* FUNCTION and ARGUMENTS:
* Handles all "user requests" except the [gs]ockopts() requests.
* The argument (req) is the request type (PRU*),
* (m) is an mbuf chain, generally used for send and
* receive type requests only.
* (nam) is used for addresses usually, in particular for the bind request.
tp_usrreq(so
, req
, m
, nam
, controlp
)
struct mbuf
*m
, *nam
, *controlp
;
register struct tp_pcb
*tpcb
= sototpcb(so
);
int flags
, *outflags
= &flags
;
printf("usrreq(0x%x,%d,0x%x,0x%x,0x%x)\n",so
,req
,m
,nam
,outflags
);
printf("WARNING!!! so->so_error is 0x%x\n", so
->so_error
);
tptraceTPCB(TPPTusrreq
, "req so m state [", req
, so
, m
,
if ((u_int
)tpcb
== 0 && req
!= PRU_ATTACH
) {
tptraceTPCB(TPPTusrreq
, "req failed NO TPCB[", 0, 0, 0, 0);
if (error
= tp_attach(so
, so
->so_proto
->pr_domain
->dom_family
))
case PRU_ABORT
: /* called from close() */
/* called for each incoming connect queued on the
* parent (accepting) socket
if (tpcb
->tp_state
== TP_OPEN
) {
E
.ATTR(T_DISC_req
).e_reason
= E_TP_NO_SESSION
;
error
= DoEvent(T_DISC_req
); /* pretend it was a close() */
} /* else DROP THROUGH */
case PRU_DETACH
: /* called from close() */
/* called only after disconnect was called */
if (tpcb
->tp_state
== TP_LISTENING
) {
register struct tp_pcb
**tt
;
for (tt
= &tp_listeners
; *tt
; tt
= &((*tt
)->tp_nextlisten
))
*tt
= tpcb
->tp_nextlisten
;
for (tt
= &tp_intercepts
; *tt
; tt
= &((*tt
)->tp_nextlisten
))
*tt
= tpcb
->tp_nextlisten
;
printf("tp_usrreq - detach: should panic\n");
error
= DoEvent(T_DETACH
);
if (tpcb
->tp_state
== TP_CLOSED
) {
free((caddr_t
)tpcb
, M_PCB
);
/* recv end may have been released; local credit might be zero */
E
.ATTR(T_DISC_req
).e_reason
= E_TP_NORMAL_DISC
;
error
= DoEvent(T_DISC_req
);
error
= (tpcb
->tp_nlproto
->nlp_pcbbind
)(so
->so_pcb
, nam
);
(tpcb
->tp_nlproto
->nlp_getsufx
)(so
->so_pcb
, &tpcb
->tp_lsuffixlen
,
tpcb
->tp_lsuffix
, TP_LOCAL
);
if (tpcb
->tp_lsuffixlen
== 0) {
if (error
= (tpcb
->tp_nlproto
->nlp_pcbbind
)(so
->so_pcb
, MNULL
))
(tpcb
->tp_nlproto
->nlp_getsufx
)(so
->so_pcb
, &tpcb
->tp_lsuffixlen
,
tpcb
->tp_lsuffix
, TP_LOCAL
);
if (tpcb
->tp_next
== 0) {
tpcb
->tp_next
= tpcb
->tp_prev
= tpcb
;
tpcb
->tp_nextlisten
= tp_listeners
;
if (tpcb
->tp_state
!= TP_CLOSED
)
printf("LISTEN ERROR: state 0x%x\n", tpcb
->tp_state
);
error
= DoEvent(T_LISTEN_req
);
error
= EOPNOTSUPP
; /* for unix domain sockets */
"PRU_CONNECT: so 0x%x *SHORT_LSUFXP(tpcb) 0x%x lsuflen 0x%x, class 0x%x",
tpcb
->tp_sock
, *SHORT_LSUFXP(tpcb
), tpcb
->tp_lsuffixlen
,
printf("PRU_CONNECT: so *SHORT_LSUFXP(tpcb) 0x%x lsuflen 0x%x, class 0x%x",
tpcb
->tp_sock
, *SHORT_LSUFXP(tpcb
), tpcb
->tp_lsuffixlen
,
if (tpcb
->tp_lsuffixlen
== 0) {
if (error
= (tpcb
->tp_nlproto
->nlp_pcbbind
)(so
->so_pcb
, MNULL
)) {
printf("pcbbind returns error 0x%x\n", error
);
(tpcb
->tp_nlproto
->nlp_getsufx
)(so
->so_pcb
, &tpcb
->tp_lsuffixlen
,
tpcb
->tp_lsuffix
, TP_LOCAL
);
printf("isop 0x%x isop->isop_socket offset 12 :\n", tpcb
->tp_npcb
);
dump_buf(tpcb
->tp_npcb
, 16);
if (error
= tp_route_to(nam
, tpcb
, /* channel */0))
"PRU_CONNECT after tpcb 0x%x so 0x%x npcb 0x%x flags 0x%x\n",
tpcb
, so
, tpcb
->tp_npcb
, tpcb
->tp_flags
);
printf("isop 0x%x isop->isop_socket offset 12 :\n", tpcb
->tp_npcb
);
dump_buf(tpcb
->tp_npcb
, 16);
if (tpcb
->tp_fsuffixlen
== 0) {
/* didn't set peer extended suffix */
(tpcb
->tp_nlproto
->nlp_getsufx
)(so
->so_pcb
, &tpcb
->tp_fsuffixlen
,
tpcb
->tp_fsuffix
, TP_FOREIGN
);
(void) (tpcb
->tp_nlproto
->nlp_mtu
)(so
, so
->so_pcb
,
&tpcb
->tp_l_tpdusize
, &tpcb
->tp_tpdusize
, 0);
if (tpcb
->tp_state
== TP_CLOSED
) {
error
= DoEvent(T_CONN_req
);
(tpcb
->tp_nlproto
->nlp_pcbdisc
)(so
->so_pcb
);
lsufx
= *(u_short
*)(tpcb
->tp_lsuffix
);
fsufx
= *(u_short
*)(tpcb
->tp_fsuffix
);
TPtime_open
| (tpcb
->tp_xtd_format
<< 4),
&time
, lsufx
, fsufx
, tpcb
->tp_fref
);
(tpcb
->tp_nlproto
->nlp_getnetaddr
)(so
->so_pcb
, nam
, TP_FOREIGN
);
printf("ACCEPT PEERADDDR:");
dump_buf(mtod(nam
, char *), nam
->m_len
);
lsufx
= *(u_short
*)(tpcb
->tp_lsuffix
);
fsufx
= *(u_short
*)(tpcb
->tp_fsuffix
);
tpmeas(tpcb
->tp_lref
, TPtime_open
,
&time
, lsufx
, fsufx
, tpcb
->tp_fref
);
if (so
->so_state
& SS_ISCONFIRMING
) {
if (tpcb
->tp_state
== TP_CONFIRMING
)
error
= tp_confirm(tpcb
);
"RCVD BF: lcredit sent_lcdt cc hiwat \n",
tpcb
->tp_lcredit
, tpcb
->tp_sent_lcdt
,
so
->so_rcv
.sb_cc
, so
->so_rcv
.sb_hiwat
);
"PRU_RCVD AF sbspace lcredit hiwat cc",
sbspace(&so
->so_rcv
), tpcb
->tp_lcredit
,
so
->so_rcv
.sb_cc
, so
->so_rcv
.sb_hiwat
);
printf("RCVD: cc %d space %d hiwat %d\n",
so
->so_rcv
.sb_cc
, sbspace(&so
->so_rcv
),
if (((int)nam
) & MSG_OOB
)
error
= DoEvent(T_USR_Xrcvd
);
error
= DoEvent(T_USR_rcvd
);
if ((so
->so_state
& SS_ISCONNECTED
) == 0) {
if (! tpcb
->tp_xpd_service
) {
/* kludge - nam is really flags here */
error
= tp_rcvoob(tpcb
, so
, m
, outflags
, (int)nam
);
error
= tp_snd_control(controlp
, so
, &m
);
if ((so
->so_state
& SS_ISCONFIRMING
) &&
(tpcb
->tp_state
== TP_CONFIRMING
) &&
(error
= tp_confirm(tpcb
)))
if (req
== PRU_SENDOOB
) {
error
= (tpcb
->tp_xpd_service
== 0) ?
EOPNOTSUPP
: tp_sendoob(tpcb
, so
, m
, outflags
);
if (m
->m_flags
& M_EOR
) {
if (eotsdu
== 0 && m
->m_pkthdr
.len
== 0)
if (tpcb
->tp_state
!= TP_AKWAIT
&& tpcb
->tp_state
!= TP_OPEN
) {
* The protocol machine copies mbuf chains,
* prepends headers, assigns seq numbers, and
* puts the packets on the device.
* When they are acked they are removed from the socket buf.
* sosend calls this up until sbspace goes negative.
* Sbspace may be made negative by appending this mbuf chain,
* possibly by a whole cluster.
register struct mbuf
*n
= m
;
register struct sockbuf
*sb
= &so
->so_snd
;
int maxsize
= tpcb
->tp_l_tpdusize
- tp_headersize(DT_TPDU_type
, tpcb
)
- (tpcb
->tp_use_checksum
?4:0) ;
int totlen
= n
->m_pkthdr
.len
;
* Could have eotsdu and no data.(presently MUST have
* an mbuf though, even if its length == 0)
PStat(tpcb
, Nb_from_sess
) += totlen
;
tpmeas(tpcb
->tp_lref
, TPtime_from_session
, 0, 0,
PStat(tpcb
, Nb_from_sess
), totlen
);
"PRU_SEND: eot %d before sbappend 0x%x len 0x%x to sb @ 0x%x\n",
dump_mbuf(sb
->sb_mb
, "so_snd.sb_mb");
dump_mbuf(m
, "m : to be added");
* Pre-packetize the data in the sockbuf
* according to negotiated mtu. Do it here
* where we can safely wait for mbufs.
* This presumes knowledge of sockbuf conventions.
if ((nn
= n
) && n
->m_pkthdr
.len
< maxsize
) {
u_int space
= maxsize
- n
->m_pkthdr
.len
;
} while (n
->m_next
&& (n
= n
->m_next
));
nn
->m_pkthdr
.len
+= totlen
;
* Can't sleep here, because when you wake up
* packet you want to attach to may be gone!
if (TNew
&& (n
->m_next
= m_copym(m
, 0, space
, M_NOWAIT
))) {
nn
->m_pkthdr
.len
+= space
;
for (n
= m
; n
->m_pkthdr
.len
> maxsize
;) {
nn
= m_copym(n
, 0, maxsize
, M_WAIT
);
"SEND BF: maxsize totlen mbufcnt eotsdu",
maxsize
, totlen
, mbufcnt
, eotsdu
);
printf("PRU_SEND: eot %d after sbappend 0x%x mbufcnt 0x%x\n",
dump_mbuf(sb
->sb_mb
, "so_snd.sb_mb");
if (tpcb
->tp_state
== TP_OPEN
)
error
= DoEvent(T_DATA_req
);
printf("PRU_SEND: after driver error 0x%x \n",error
);
printf("so_snd 0x%x cc 0t%d mbcnt 0t%d\n",
sb
, sb
->sb_cc
, sb
->sb_mbcnt
);
dump_mbuf(sb
->sb_mb
, "so_snd.sb_mb after driver");
(tpcb
->tp_nlproto
->nlp_getnetaddr
)(so
->so_pcb
, nam
, TP_LOCAL
);
(tpcb
->tp_nlproto
->nlp_getnetaddr
)(so
->so_pcb
, nam
, TP_FOREIGN
);
printf("tp_usrreq UNKNOWN PRU %d\n", req
);
printf("%s, so 0x%x, tpcb 0x%x, error %d, state %d\n",
"returning from tp_usrreq", so
, tpcb
, error
,
tpcb
? 0 : tpcb
->tp_state
);
tptraceTPCB(TPPTusrreq
, "END req so m state [", req
, so
, m
,
printf("control data unexpectedly retained in tp_usrreq()");
register struct tp_pcb
*tpcb
= sototpcb(so
);
tptraceTPCB(TPPTmisc
, "sosend so resid iovcnt", so
,
uio
->uio_resid
, uio
->uio_iovcnt
, 0);
register struct tp_pcb
*tpcb
;
if (tpcb
->tp_state
== TP_CONFIRMING
)
return DoEvent(T_ACPT_req
);
printf("Tp confirm called when not confirming; tpcb 0x%x, state 0x%x\n",
* Process control data sent with sendmsg()
tp_snd_control(m
, so
, data
)
register struct mbuf
**data
;
register struct cmsghdr
*ch
;
ch
= mtod(m
, struct cmsghdr
*);
m
->m_len
-= sizeof (*ch
);
m
->m_data
+= sizeof (*ch
);
error
= tp_ctloutput(PRCO_SETOPT
,
so
, ch
->cmsg_level
, ch
->cmsg_type
, &m
);
if (ch
->cmsg_type
== TPOPT_DISC_DATA
) {
error
= tp_usrreq(so
, PRU_DISCONNECT
, (struct mbuf
*)0,
(caddr_t
)0, (struct mbuf
*)0);