2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
11 * rx_knet.c - RX kernel send, receive and timer routines.
13 * Linux implementation.
15 #include <afsconfig.h>
16 #include "afs/param.h"
19 #include <linux/version.h>
20 #include "rx/rx_kcommon.h"
22 #include "rx_atomic.h"
23 #include "rx_globals.h"
26 #include "rx_packet.h"
27 #include "rx_internal.h"
28 #if defined(HAVE_LINUX_UACCESS_H)
29 #include <linux/uaccess.h>
31 #include <asm/uaccess.h>
34 #include <linux/errqueue.h>
35 #include <linux/icmp.h>
37 #include "osi_compat.h"
40 * open and bind RX socket
43 rxk_NewSocketHost(afs_uint32 ahost, short aport)
46 struct sockaddr_in myaddr;
49 int pmtu = IP_PMTUDISC_WANT;
51 int pmtu = IP_PMTUDISC_DONT;
54 #ifdef HAVE_LINUX_SOCK_CREATE_KERN_NS
55 code = sock_create_kern(&init_net, AF_INET, SOCK_DGRAM, IPPROTO_UDP, &sockp);
56 #elif defined(HAVE_LINUX_SOCK_CREATE_KERN)
57 code = sock_create_kern(AF_INET, SOCK_DGRAM, IPPROTO_UDP, &sockp);
58 #elif defined(LINUX_KERNEL_SOCK_CREATE_V)
59 code = sock_create(AF_INET, SOCK_DGRAM, IPPROTO_UDP, &sockp, 0);
61 code = sock_create(AF_INET, SOCK_DGRAM, IPPROTO_UDP, &sockp);
67 myaddr.sin_family = AF_INET;
68 myaddr.sin_addr.s_addr = ahost;
69 myaddr.sin_port = aport;
71 sockp->ops->bind(sockp, (struct sockaddr *)&myaddr, sizeof(myaddr));
74 printk("sock_release(rx_socket) FIXME\n");
78 afs_linux_sock_set_mtu_discover(sockp, pmtu);
81 afs_linux_sock_set_recverr(sockp);
83 return (osi_socket *)sockp;
87 rxk_NewSocket(short aport)
89 return rxk_NewSocketHost(htonl(INADDR_ANY), aport);
92 /* free socket allocated by osi_NetSocket */
94 rxk_FreeSocket(struct socket *asocket)
96 AFS_STATCNT(osi_FreeSocket);
100 #ifdef AFS_RXERRQ_ENV
102 osi_HandleSocketError(osi_socket so, char *cmsgbuf, size_t cmsgbuf_len)
105 struct cmsghdr *cmsg;
106 struct sock_extended_err *err;
107 struct sockaddr_in addr;
109 struct socket *sop = (struct socket *)so;
111 msg.msg_name = &addr;
112 msg.msg_namelen = sizeof(addr);
113 msg.msg_control = cmsgbuf;
114 msg.msg_controllen = cmsgbuf_len;
117 code = kernel_recvmsg(sop, &msg, NULL, 0, 0,
118 MSG_ERRQUEUE|MSG_DONTWAIT|MSG_TRUNC);
120 if (code < 0 || !(msg.msg_flags & MSG_ERRQUEUE))
123 /* kernel_recvmsg changes msg_control to point at the _end_ of the buffer,
124 * and msg_controllen is set to the number of bytes remaining */
125 msg.msg_controllen = ((char*)msg.msg_control - (char*)cmsgbuf);
126 msg.msg_control = cmsgbuf;
128 for (cmsg = CMSG_FIRSTHDR(&msg); cmsg && CMSG_OK(&msg, cmsg);
129 cmsg = CMSG_NXTHDR(&msg, cmsg)) {
131 if (cmsg->cmsg_level != SOL_IP || cmsg->cmsg_type != IP_RECVERR) {
135 err = CMSG_DATA(cmsg);
136 rxi_ProcessNetError(err, addr.sin_addr.s_addr, addr.sin_port);
144 do_handlesocketerror(osi_socket so)
146 #ifdef AFS_RXERRQ_ENV
151 cmsgbuf = rxi_Alloc(cmsgbuf_len);
156 while (osi_HandleSocketError(so, cmsgbuf, cmsgbuf_len))
159 rxi_Free(cmsgbuf, cmsgbuf_len);
170 osi_NetSend(osi_socket sop, struct sockaddr_in *to, struct iovec *iovec,
171 int iovcnt, afs_int32 size, int istack)
178 msg.msg_namelen = sizeof(*to);
179 msg.msg_control = NULL;
180 msg.msg_controllen = 0;
183 code = kernel_sendmsg(sop, &msg, (struct kvec *) iovec, iovcnt, size);
186 do_handlesocketerror(sop);
189 return (code < 0) ? code : 0;
194 * OS dependent part of kernel RX listener thread.
197 * so socket to receive on, typically rx_socket
198 * from pointer to a sockaddr_in.
199 * iov array of iovecs to fill in.
200 * iovcnt how many iovecs there are.
201 * lengthp IN/OUT in: total space available in iovecs. out: size of read.
205 * error code (such as EINTER) if not
208 * Note that the maximum number of iovecs is 2 + RX_MAXWVECS. This is
209 * so we have a little space to look for packets larger than
212 int rxk_lastSocketError;
213 int rxk_nSocketErrors;
215 osi_NetReceive(osi_socket so, struct sockaddr_in *from, struct iovec *iov,
216 int iovcnt, int *lengthp)
220 struct iovec tmpvec[RX_MAXWVECS + 2];
221 struct socket *sop = (struct socket *)so;
223 if (iovcnt > RX_MAXWVECS + 2) {
224 osi_Panic("Too many (%d) iovecs passed to osi_NetReceive\n", iovcnt);
227 memcpy(tmpvec, iov, iovcnt * sizeof(struct iovec));
229 #if defined(STRUCT_MSGHDR_HAS_MSG_ITER)
230 msg.msg_iter.iov = tmpvec;
231 msg.msg_iter.nr_segs = iovcnt;
233 msg.msg_iov = tmpvec;
234 msg.msg_iovlen = iovcnt;
236 msg.msg_control = NULL;
237 msg.msg_controllen = 0;
240 code = kernel_recvmsg(sop, &msg, (struct kvec *)tmpvec, iovcnt,
245 /* Clear the error before using the socket again.
246 * Oh joy, Linux has hidden header files as well. It appears we can
247 * simply call again and have it clear itself via sock_error().
249 flush_signals(current); /* We don't want no stinkin' signals. */
250 rxk_lastSocketError = code;
253 do_handlesocketerror(so);
263 osi_StopListener(void)
265 extern struct task_struct *rxk_ListenerTask;
267 while (rxk_ListenerTask) {
268 if (rxk_ListenerTask) {
269 flush_signals(rxk_ListenerTask);
270 send_sig(SIGKILL, rxk_ListenerTask, 1);
272 if (!rxk_ListenerTask)
274 afs_osi_Sleep(&rxk_ListenerTask);
276 sock_release(rx_socket);