2 * Copyright (c) 2003, 2004 Jeffrey Hsu.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by Jeffrey M. Hsu.
16 * 4. The name of the author may not be used to endorse or promote products
17 * derived from this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 * $DragonFly: src/sys/kern/uipc_msg.c,v 1.10 2004/04/23 10:21:07 hsu Exp $
33 #include <sys/param.h>
34 #include <sys/systm.h>
35 #include <sys/msgport.h>
36 #include <sys/protosw.h>
37 #include <sys/socket.h>
38 #include <sys/socketvar.h>
39 #include <sys/socketops.h>
40 #include <sys/thread.h>
41 #include <sys/thread2.h>
42 #include <sys/msgport2.h>
44 #include <net/netisr.h>
45 #include <net/netmsg.h>
48 so_pru_abort(struct socket *so)
51 struct netmsg_pru_abort msg;
54 if (!so->so_proto->pr_mport)
55 return ((*so->so_proto->pr_usrreqs->pru_abort)(so));
57 port = so->so_proto->pr_mport(so, NULL, PRU_ABORT);
58 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
59 lwkt_cmd_func(netmsg_pru_abort), lwkt_cmd_op_none);
60 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_abort;
62 error = lwkt_domsg(port, &msg.nm_lmsg);
67 so_pru_accept(struct socket *so, struct sockaddr **nam)
70 struct netmsg_pru_accept msg;
73 if (!so->so_proto->pr_mport)
74 return ((*so->so_proto->pr_usrreqs->pru_accept)(so, nam));
76 port = so->so_proto->pr_mport(so, NULL, PRU_ACCEPT);
77 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
78 lwkt_cmd_func(netmsg_pru_accept), lwkt_cmd_op_none);
79 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_accept;
82 error = lwkt_domsg(port, &msg.nm_lmsg);
87 so_pru_attach(struct socket *so, int proto, struct pru_attach_info *ai)
90 struct netmsg_pru_attach msg;
93 if (!so->so_proto->pr_mport)
94 return ((*so->so_proto->pr_usrreqs->pru_attach)(so, proto, ai));
96 port = so->so_proto->pr_mport(NULL, NULL, PRU_ATTACH);
97 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
98 lwkt_cmd_func(netmsg_pru_attach), lwkt_cmd_op_none);
99 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_attach;
101 msg.nm_proto = proto;
103 error = lwkt_domsg(port, &msg.nm_lmsg);
108 so_pru_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
111 struct netmsg_pru_bind msg;
114 if (!so->so_proto->pr_mport)
115 return ((*so->so_proto->pr_usrreqs->pru_bind)(so, nam, td));
117 /* Send mesg to thread for new address. */
118 port = so->so_proto->pr_mport(NULL, nam, PRU_BIND);
119 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
120 lwkt_cmd_func(netmsg_pru_bind), lwkt_cmd_op_none);
121 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_bind;
124 msg.nm_td = td; /* used only for prison_ip() XXX JH */
125 error = lwkt_domsg(port, &msg.nm_lmsg);
130 so_pru_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
133 struct netmsg_pru_connect msg;
136 if (!so->so_proto->pr_mport)
137 return ((*so->so_proto->pr_usrreqs->pru_connect)(so, nam, td));
139 port = so->so_proto->pr_mport(so, nam, PRU_CONNECT);
140 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
141 lwkt_cmd_func(netmsg_pru_connect), lwkt_cmd_op_none);
142 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_connect;
146 error = lwkt_domsg(port, &msg.nm_lmsg);
151 so_pru_connect2(struct socket *so1, struct socket *so2)
154 struct netmsg_pru_connect2 msg;
157 if (!so1->so_proto->pr_mport)
158 return ((*so1->so_proto->pr_usrreqs->pru_connect2)(so1, so2));
161 * Actually, connect2() is only called for Unix domain sockets
162 * and we currently short-circuit that above, so the following
163 * code is never reached.
165 panic("connect2 on socket type %d", so1->so_type);
166 port = so1->so_proto->pr_mport(so1, NULL, PRU_CONNECT2);
167 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
168 lwkt_cmd_func(netmsg_pru_connect2), lwkt_cmd_op_none);
169 msg.nm_prufn = so1->so_proto->pr_usrreqs->pru_connect2;
172 error = lwkt_domsg(port, &msg.nm_lmsg);
177 so_pru_control(struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp,
180 return ((*so->so_proto->pr_usrreqs->pru_control)(so, cmd, data, ifp,
182 #ifdef gag /* does copyin and copyout deep inside stack XXX JH */
184 struct netmsg_pru_control msg;
187 if (!so->so_proto->pr_mport)
188 return ((*so->so_proto->pr_usrreqs->pru_control)(so, cmd, data,
191 port = so->so_proto->pr_mport(so, NULL, PRU_CONTROL);
192 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
193 lwkt_cmd_func(netmsg_pru_control), lwkt_cmd_op_none);
194 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_control;
200 error = lwkt_domsg(port, &msg.nm_lmsg);
206 so_pru_detach(struct socket *so)
209 struct netmsg_pru_detach msg;
212 if (!so->so_proto->pr_mport)
213 return ((*so->so_proto->pr_usrreqs->pru_detach)(so));
215 port = so->so_proto->pr_mport(so, NULL, PRU_DETACH);
216 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
217 lwkt_cmd_func(netmsg_pru_detach), lwkt_cmd_op_none);
218 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_detach;
220 error = lwkt_domsg(port, &msg.nm_lmsg);
225 so_pru_disconnect(struct socket *so)
228 struct netmsg_pru_disconnect msg;
231 if (!so->so_proto->pr_mport)
232 return ((*so->so_proto->pr_usrreqs->pru_disconnect)(so));
234 port = so->so_proto->pr_mport(so, NULL, PRU_DISCONNECT);
235 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
236 lwkt_cmd_func(netmsg_pru_disconnect), lwkt_cmd_op_none);
237 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_disconnect;
239 error = lwkt_domsg(port, &msg.nm_lmsg);
244 so_pru_listen(struct socket *so, struct thread *td)
247 struct netmsg_pru_listen msg;
250 if (!so->so_proto->pr_mport)
251 return ((*so->so_proto->pr_usrreqs->pru_listen)(so, td));
253 port = so->so_proto->pr_mport(so, NULL, PRU_LISTEN);
254 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
255 lwkt_cmd_func(netmsg_pru_listen), lwkt_cmd_op_none);
256 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_listen;
258 msg.nm_td = td; /* used only for prison_ip() XXX JH */
259 error = lwkt_domsg(port, &msg.nm_lmsg);
264 so_pru_peeraddr(struct socket *so, struct sockaddr **nam)
267 struct netmsg_pru_peeraddr msg;
270 if (!so->so_proto->pr_mport)
271 return ((*so->so_proto->pr_usrreqs->pru_peeraddr)(so, nam));
273 port = so->so_proto->pr_mport(so, NULL, PRU_PEERADDR);
274 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
275 lwkt_cmd_func(netmsg_pru_peeraddr), lwkt_cmd_op_none);
276 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_peeraddr;
279 error = lwkt_domsg(port, &msg.nm_lmsg);
284 so_pru_rcvd(struct socket *so, int flags)
287 struct netmsg_pru_rcvd msg;
290 if (!so->so_proto->pr_mport)
291 return ((*so->so_proto->pr_usrreqs->pru_rcvd)(so, flags));
293 port = so->so_proto->pr_mport(so, NULL, PRU_RCVD);
294 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
295 lwkt_cmd_func(netmsg_pru_rcvd), lwkt_cmd_op_none);
296 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_rcvd;
298 msg.nm_flags = flags;
299 error = lwkt_domsg(port, &msg.nm_lmsg);
304 so_pru_rcvoob(struct socket *so, struct mbuf *m, int flags)
307 struct netmsg_pru_rcvoob msg;
310 if (!so->so_proto->pr_mport)
311 return ((*so->so_proto->pr_usrreqs->pru_rcvoob)(so, m, flags));
313 port = so->so_proto->pr_mport(so, NULL, PRU_RCVOOB);
314 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
315 lwkt_cmd_func(netmsg_pru_rcvoob), lwkt_cmd_op_none);
316 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_rcvoob;
319 msg.nm_flags = flags;
320 error = lwkt_domsg(port, &msg.nm_lmsg);
325 so_pru_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *addr,
326 struct mbuf *control, struct thread *td)
329 struct netmsg_pru_send msg;
332 if (!so->so_proto->pr_mport)
333 return ((*so->so_proto->pr_usrreqs->pru_send)(so, flags, m,
336 port = so->so_proto->pr_mport(so, NULL, PRU_SEND);
337 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
338 lwkt_cmd_func(netmsg_pru_send), lwkt_cmd_op_none);
339 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_send;
341 msg.nm_flags = flags;
344 msg.nm_control = control;
346 error = lwkt_domsg(port, &msg.nm_lmsg);
351 so_pru_sense(struct socket *so, struct stat *sb)
354 struct netmsg_pru_sense msg;
357 if (!so->so_proto->pr_mport)
358 return ((*so->so_proto->pr_usrreqs->pru_sense)(so, sb));
360 port = so->so_proto->pr_mport(so, NULL, PRU_SENSE);
361 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
362 lwkt_cmd_func(netmsg_pru_sense), lwkt_cmd_op_none);
363 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_sense;
366 error = lwkt_domsg(port, &msg.nm_lmsg);
371 so_pru_shutdown(struct socket *so)
374 struct netmsg_pru_shutdown msg;
377 if (!so->so_proto->pr_mport)
378 return ((*so->so_proto->pr_usrreqs->pru_shutdown)(so));
380 port = so->so_proto->pr_mport(so, NULL, PRU_SHUTDOWN);
381 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
382 lwkt_cmd_func(netmsg_pru_shutdown), lwkt_cmd_op_none);
383 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_shutdown;
385 error = lwkt_domsg(port, &msg.nm_lmsg);
390 so_pru_sockaddr(struct socket *so, struct sockaddr **nam)
393 struct netmsg_pru_sockaddr msg;
396 if (!so->so_proto->pr_mport)
397 return ((*so->so_proto->pr_usrreqs->pru_sockaddr)(so, nam));
399 port = so->so_proto->pr_mport(so, NULL, PRU_SOCKADDR);
400 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
401 lwkt_cmd_func(netmsg_pru_sockaddr), lwkt_cmd_op_none);
402 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_sockaddr;
405 error = lwkt_domsg(port, &msg.nm_lmsg);
410 so_pru_sopoll(struct socket *so, int events, struct ucred *cred,
414 struct netmsg_pru_sopoll msg;
417 if (!so->so_proto->pr_mport)
418 return ((*so->so_proto->pr_usrreqs->pru_sopoll)(so, events,
421 port = so->so_proto->pr_mport(so, NULL, PRU_SOPOLL);
422 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
423 lwkt_cmd_func(netmsg_pru_sopoll), lwkt_cmd_op_none);
424 msg.nm_prufn = so->so_proto->pr_usrreqs->pru_sopoll;
426 msg.nm_events = events;
429 error = lwkt_domsg(port, &msg.nm_lmsg);
434 so_pr_ctloutput(struct socket *so, struct sockopt *sopt)
436 return ((*so->so_proto->pr_ctloutput)(so, sopt));
437 #ifdef gag /* does copyin and copyout deep inside stack XXX JH */
438 struct netmsg_pr_ctloutput msg;
442 if (!so->so_proto->pr_mport)
443 return ((*so->so_proto->pr_ctloutput)(so, sopt));
445 port = so->so_proto->pr_mport(so, NULL);
446 lwkt_initmsg(&msg.nm_lmsg, &curthread->td_msgport, 0,
447 lwkt_cmd_func(netmsg_pru_ctloutput), lwkt_cmd_op_none);
448 msg.nm_prfn = so->so_proto->pr_ctloutput;
451 error = lwkt_domsg(port, &msg.nm_lmsg);
457 * If we convert all the protosw pr_ functions for all the protocols
458 * to take a message directly, this layer can go away. For the moment
459 * our dispatcher ignores the return value, but since we are handling
460 * the replymsg ourselves we return EASYNC by convention.
463 netmsg_pru_abort(lwkt_msg_t msg)
465 struct netmsg_pru_abort *nm = (void *)msg;
467 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so));
472 netmsg_pru_accept(lwkt_msg_t msg)
474 struct netmsg_pru_accept *nm = (void *)msg;
476 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_nam));
481 netmsg_pru_attach(lwkt_msg_t msg)
483 struct netmsg_pru_attach *nm = (void *)msg;
485 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_proto, nm->nm_ai));
490 netmsg_pru_bind(lwkt_msg_t msg)
492 struct netmsg_pru_bind *nm = (void *)msg;
494 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_nam, nm->nm_td));
499 netmsg_pru_connect(lwkt_msg_t msg)
501 struct netmsg_pru_connect *nm = (void *)msg;
503 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_nam, nm->nm_td));
508 netmsg_pru_connect2(lwkt_msg_t msg)
510 struct netmsg_pru_connect2 *nm = (void *)msg;
512 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so1, nm->nm_so2));
517 netmsg_pru_control(lwkt_msg_t msg)
519 struct netmsg_pru_control *nm = (void *)msg;
522 error = nm->nm_prufn(nm->nm_so, nm->nm_cmd, nm->nm_data,
523 nm->nm_ifp, nm->nm_td);
524 lwkt_replymsg(msg, error);
529 netmsg_pru_detach(lwkt_msg_t msg)
531 struct netmsg_pru_detach *nm = (void *)msg;
533 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so));
538 netmsg_pru_disconnect(lwkt_msg_t msg)
540 struct netmsg_pru_disconnect *nm = (void *)msg;
542 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so));
547 netmsg_pru_listen(lwkt_msg_t msg)
549 struct netmsg_pru_listen *nm = (void *)msg;
551 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_td));
556 netmsg_pru_peeraddr(lwkt_msg_t msg)
558 struct netmsg_pru_peeraddr *nm = (void *)msg;
560 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_nam));
565 netmsg_pru_rcvd(lwkt_msg_t msg)
567 struct netmsg_pru_rcvd *nm = (void *)msg;
569 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_flags));
574 netmsg_pru_rcvoob(lwkt_msg_t msg)
576 struct netmsg_pru_rcvoob *nm = (void *)msg;
578 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_m, nm->nm_flags));
583 netmsg_pru_send(lwkt_msg_t msg)
585 struct netmsg_pru_send *nm = (void *)msg;
588 error = nm->nm_prufn(nm->nm_so, nm->nm_flags, nm->nm_m,
589 nm->nm_addr, nm->nm_control, nm->nm_td);
590 lwkt_replymsg(msg, error);
595 netmsg_pru_sense(lwkt_msg_t msg)
597 struct netmsg_pru_sense *nm = (void *)msg;
599 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_stat));
604 netmsg_pru_shutdown(lwkt_msg_t msg)
606 struct netmsg_pru_shutdown *nm = (void *)msg;
608 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so));
613 netmsg_pru_sockaddr(lwkt_msg_t msg)
615 struct netmsg_pru_sockaddr *nm = (void *)msg;
617 lwkt_replymsg(msg, nm->nm_prufn(nm->nm_so, nm->nm_nam));
622 netmsg_pru_sopoll(lwkt_msg_t msg)
624 struct netmsg_pru_sopoll *nm = (void *)msg;
627 error = nm->nm_prufn(nm->nm_so, nm->nm_events, nm->nm_cred, nm->nm_td);
628 lwkt_replymsg(msg, error);
633 netmsg_pr_ctloutput(lwkt_msg_t msg)
635 struct netmsg_pr_ctloutput *nm = (void *)msg;
637 lwkt_replymsg(msg, nm->nm_prfn(nm->nm_so, nm->nm_sopt));
642 netmsg_pr_timeout(lwkt_msg_t msg)
644 struct netmsg_pr_timeout *nm = (void *)msg;
646 lwkt_replymsg(msg, nm->nm_prfn());
651 * Handle a predicate event request. This function is only called once
652 * when the predicate message queueing request is received.
655 netmsg_so_notify(lwkt_msg_t lmsg)
657 struct netmsg_so_notify *msg = (void *)lmsg;
660 sb = (msg->nm_etype & NM_REVENT) ?
661 &msg->nm_so->so_rcv :
665 * Reply immediately if the event has occured, otherwise queue the
668 if (msg->nm_predicate((struct netmsg *)msg)) {
669 lwkt_replymsg(lmsg, lmsg->ms_error);
671 TAILQ_INSERT_TAIL(&sb->sb_sel.si_mlist, msg, nm_list);
672 sb->sb_flags |= SB_MEVENT;
678 * Predicate requests can be aborted. This function is only called once
679 * and will interlock against processing/reply races (since such races
680 * occur on the same thread that controls the port where the abort is
684 netmsg_so_notify_abort(lwkt_msg_t lmsg)
686 struct netmsg_so_notify *msg = (void *)lmsg;
689 sb = (msg->nm_etype & NM_REVENT) ?
690 &msg->nm_so->so_rcv :
692 TAILQ_REMOVE(&sb->sb_sel.si_mlist, msg, nm_list);
693 lwkt_replymsg(lmsg, EINTR);