2019-11-08 16:31:41 +01:00
|
|
|
/****************************************************************************
|
2020-05-06 14:47:39 +02:00
|
|
|
* apps/netutils/usrsock_rpmsg/usrsock_rpmsg_server.c
|
2019-11-08 16:31:41 +01:00
|
|
|
*
|
2020-08-22 18:45:58 +02:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2019-11-08 16:31:41 +01:00
|
|
|
*
|
2020-08-22 18:45:58 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2019-11-08 16:31:41 +01:00
|
|
|
*
|
2020-08-22 18:45:58 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2019-11-08 16:31:41 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <poll.h>
|
|
|
|
#include <pthread.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include <nuttx/net/dns.h>
|
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
#include <nuttx/rptun/openamp.h>
|
|
|
|
|
|
|
|
#include "usrsock_rpmsg.h"
|
|
|
|
|
|
|
|
struct usrsock_rpmsg_s
|
|
|
|
{
|
|
|
|
pid_t pid;
|
|
|
|
pthread_mutex_t mutex;
|
|
|
|
pthread_cond_t cond;
|
|
|
|
struct socket socks[CONFIG_NSOCKET_DESCRIPTORS];
|
|
|
|
struct rpmsg_endpoint *epts[CONFIG_NSOCKET_DESCRIPTORS];
|
|
|
|
struct pollfd pfds[CONFIG_NSOCKET_DESCRIPTORS];
|
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Function Prototypes
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_send_ack(struct rpmsg_endpoint *ept,
|
|
|
|
uint8_t xid, int32_t result);
|
|
|
|
static int usrsock_rpmsg_send_data_ack(struct rpmsg_endpoint *ept,
|
2020-04-27 06:36:06 +02:00
|
|
|
struct usrsock_message_datareq_ack_s *ack,
|
|
|
|
uint8_t xid, int32_t result,
|
|
|
|
uint16_t valuelen,
|
|
|
|
uint16_t valuelen_nontrunc);
|
2019-11-08 16:31:41 +01:00
|
|
|
static int usrsock_rpmsg_send_event(struct rpmsg_endpoint *ept,
|
|
|
|
int16_t usockid, uint16_t events);
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_socket_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_close_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_connect_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_sendto_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_recvfrom_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_setsockopt_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_getsockopt_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_getsockname_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_getpeername_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_bind_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_listen_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_accept_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
static int usrsock_rpmsg_ioctl_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_);
|
|
|
|
|
|
|
|
static void usrsock_rpmsg_ns_bind(struct rpmsg_device *rdev, void *priv_,
|
|
|
|
const char *name, uint32_t dest);
|
|
|
|
static void usrsock_rpmsg_ns_unbind(struct rpmsg_endpoint *ept);
|
|
|
|
static int usrsock_rpmsg_ept_cb(struct rpmsg_endpoint *ept, void *data,
|
|
|
|
size_t len, uint32_t src, void *priv);
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_prepare_poll(struct usrsock_rpmsg_s *priv,
|
|
|
|
struct pollfd *pfds);
|
|
|
|
static void usrsock_rpmsg_process_poll(struct usrsock_rpmsg_s *priv,
|
|
|
|
struct pollfd *pfds, int count);
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Data
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static const rpmsg_ept_cb g_usrsock_rpmsg_handler[] =
|
|
|
|
{
|
|
|
|
[USRSOCK_REQUEST_SOCKET] = usrsock_rpmsg_socket_handler,
|
|
|
|
[USRSOCK_REQUEST_CLOSE] = usrsock_rpmsg_close_handler,
|
|
|
|
[USRSOCK_REQUEST_CONNECT] = usrsock_rpmsg_connect_handler,
|
|
|
|
[USRSOCK_REQUEST_SENDTO] = usrsock_rpmsg_sendto_handler,
|
|
|
|
[USRSOCK_REQUEST_RECVFROM] = usrsock_rpmsg_recvfrom_handler,
|
|
|
|
[USRSOCK_REQUEST_SETSOCKOPT] = usrsock_rpmsg_setsockopt_handler,
|
|
|
|
[USRSOCK_REQUEST_GETSOCKOPT] = usrsock_rpmsg_getsockopt_handler,
|
|
|
|
[USRSOCK_REQUEST_GETSOCKNAME] = usrsock_rpmsg_getsockname_handler,
|
|
|
|
[USRSOCK_REQUEST_GETPEERNAME] = usrsock_rpmsg_getpeername_handler,
|
|
|
|
[USRSOCK_REQUEST_BIND] = usrsock_rpmsg_bind_handler,
|
|
|
|
[USRSOCK_REQUEST_LISTEN] = usrsock_rpmsg_listen_handler,
|
|
|
|
[USRSOCK_REQUEST_ACCEPT] = usrsock_rpmsg_accept_handler,
|
|
|
|
[USRSOCK_REQUEST_IOCTL] = usrsock_rpmsg_ioctl_handler,
|
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_send_ack(struct rpmsg_endpoint *ept,
|
|
|
|
uint8_t xid, int32_t result)
|
|
|
|
{
|
|
|
|
struct usrsock_message_req_ack_s ack;
|
|
|
|
|
|
|
|
ack.head.msgid = USRSOCK_MESSAGE_RESPONSE_ACK;
|
|
|
|
ack.head.flags = (result == -EINPROGRESS);
|
|
|
|
|
|
|
|
ack.xid = xid;
|
|
|
|
ack.result = result;
|
|
|
|
|
|
|
|
return rpmsg_send(ept, &ack, sizeof(ack));
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_send_data_ack(struct rpmsg_endpoint *ept,
|
2020-04-27 06:36:06 +02:00
|
|
|
struct usrsock_message_datareq_ack_s *ack,
|
|
|
|
uint8_t xid, int32_t result,
|
|
|
|
uint16_t valuelen,
|
|
|
|
uint16_t valuelen_nontrunc)
|
2019-11-08 16:31:41 +01:00
|
|
|
{
|
|
|
|
ack->reqack.head.msgid = USRSOCK_MESSAGE_RESPONSE_DATA_ACK;
|
|
|
|
ack->reqack.head.flags = 0;
|
|
|
|
|
|
|
|
ack->reqack.xid = xid;
|
|
|
|
ack->reqack.result = result;
|
|
|
|
|
|
|
|
if (result < 0)
|
|
|
|
{
|
|
|
|
result = 0;
|
|
|
|
valuelen = 0;
|
|
|
|
valuelen_nontrunc = 0;
|
|
|
|
}
|
|
|
|
else if (valuelen > valuelen_nontrunc)
|
|
|
|
{
|
|
|
|
valuelen = valuelen_nontrunc;
|
|
|
|
}
|
|
|
|
|
|
|
|
ack->valuelen = valuelen;
|
|
|
|
ack->valuelen_nontrunc = valuelen_nontrunc;
|
|
|
|
|
|
|
|
return rpmsg_send_nocopy(ept, ack, sizeof(*ack) + valuelen + result);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_send_event(struct rpmsg_endpoint *ept,
|
|
|
|
int16_t usockid, uint16_t events)
|
|
|
|
{
|
|
|
|
struct usrsock_message_socket_event_s event;
|
|
|
|
|
|
|
|
event.head.msgid = USRSOCK_MESSAGE_SOCKET_EVENT;
|
|
|
|
event.head.flags = USRSOCK_MESSAGE_FLAG_EVENT;
|
|
|
|
|
|
|
|
event.usockid = usockid;
|
|
|
|
event.events = events;
|
|
|
|
|
|
|
|
return rpmsg_send(ept, &event, sizeof(event));
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_socket_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_socket_s *req = data;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
int i;
|
|
|
|
int retr;
|
|
|
|
int ret = -ENFILE;
|
|
|
|
|
|
|
|
for (i = 0; i < CONFIG_NSOCKET_DESCRIPTORS; i++)
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
if (priv->socks[i].s_crefs == 0)
|
|
|
|
{
|
|
|
|
priv->socks[i].s_crefs++;
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
|
|
|
|
ret = psock_socket(req->domain, req->type, req->protocol,
|
|
|
|
&priv->socks[i]);
|
|
|
|
if (ret >= 0)
|
|
|
|
{
|
|
|
|
psock_fcntl(&priv->socks[i], F_SETFL,
|
|
|
|
psock_fcntl(&priv->socks[i], F_GETFL) | O_NONBLOCK);
|
|
|
|
|
|
|
|
priv->epts[i] = ept;
|
|
|
|
ret = i; /* Return index as the usockid */
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
priv->socks[i].s_crefs--;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
retr = usrsock_rpmsg_send_ack(ept, req->head.xid, ret);
|
|
|
|
if (retr >= 0 && ret >= 0 &&
|
|
|
|
req->type != SOCK_STREAM && req->type != SOCK_SEQPACKET)
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
priv->pfds[ret].ptr = &priv->socks[ret];
|
|
|
|
priv->pfds[ret].events = POLLIN;
|
|
|
|
kill(priv->pid, SIGUSR1); /* Wakeup the poll thread */
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
retr = usrsock_rpmsg_send_event(ept, ret, USRSOCK_EVENT_SENDTO_READY);
|
|
|
|
}
|
|
|
|
|
|
|
|
return retr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_close_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_close_s *req = data;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
int ret = -EBADF;
|
|
|
|
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
priv->pfds[req->usockid].ptr = NULL;
|
|
|
|
priv->epts[req->usockid] = NULL;
|
|
|
|
|
|
|
|
/* Signal and wait the poll thread to wakeup */
|
|
|
|
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
kill(priv->pid, SIGUSR1);
|
|
|
|
pthread_cond_wait(&priv->cond, &priv->mutex);
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
|
|
|
|
/* It's safe to close sock here */
|
|
|
|
|
|
|
|
ret = psock_close(&priv->socks[req->usockid]);
|
|
|
|
}
|
|
|
|
|
|
|
|
return usrsock_rpmsg_send_ack(ept, req->head.xid, ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_connect_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_connect_s *req = data;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
bool inprogress = false;
|
|
|
|
int retr;
|
|
|
|
int ret = -EBADF;
|
|
|
|
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = psock_connect(&priv->socks[req->usockid],
|
|
|
|
(const struct sockaddr *)(req + 1), req->addrlen);
|
|
|
|
if (ret == -EINPROGRESS)
|
|
|
|
{
|
|
|
|
inprogress = true;
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
retr = usrsock_rpmsg_send_ack(ept, req->head.xid, ret);
|
|
|
|
if (retr >= 0 && ret >= 0 && priv->pfds[req->usockid].ptr == NULL)
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
priv->pfds[req->usockid].ptr = &priv->socks[req->usockid];
|
|
|
|
priv->pfds[req->usockid].events = POLLIN;
|
|
|
|
if (inprogress)
|
|
|
|
{
|
|
|
|
priv->pfds[req->usockid].events |= POLLOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
kill(priv->pid, SIGUSR1); /* Wakeup the poll thread */
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
if (!inprogress)
|
|
|
|
{
|
|
|
|
retr = usrsock_rpmsg_send_event(ept,
|
|
|
|
req->usockid, USRSOCK_EVENT_SENDTO_READY);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return retr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_sendto_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_sendto_s *req = data;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
ssize_t ret = -EBADF;
|
|
|
|
int retr;
|
|
|
|
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = psock_sendto(&priv->socks[req->usockid],
|
2020-08-06 03:50:56 +02:00
|
|
|
(const void *)(req + 1) + req->addrlen, req->buflen,
|
|
|
|
req->flags,
|
2019-11-08 16:31:41 +01:00
|
|
|
req->addrlen ? (const struct sockaddr *)(req + 1) : NULL,
|
|
|
|
req->addrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
retr = usrsock_rpmsg_send_ack(ept, req->head.xid, ret);
|
|
|
|
if (retr >= 0 && ret >= 0)
|
|
|
|
{
|
|
|
|
/* Assume the new buffer can be accepted until return -EAGAIN */
|
|
|
|
|
|
|
|
retr = usrsock_rpmsg_send_event(ept,
|
|
|
|
req->usockid, USRSOCK_EVENT_SENDTO_READY);
|
|
|
|
}
|
|
|
|
else if (ret == -EAGAIN)
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
priv->pfds[req->usockid].events |= POLLOUT;
|
|
|
|
kill(priv->pid, SIGUSR1); /* Wakeup the poll thread */
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
return retr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_recvfrom_handler(struct rpmsg_endpoint *ept,
|
2020-04-27 06:36:06 +02:00
|
|
|
void *data, size_t len_,
|
2019-11-08 16:31:41 +01:00
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_recvfrom_s *req = data;
|
|
|
|
struct usrsock_message_datareq_ack_s *ack;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
socklen_t outaddrlen = req->max_addrlen;
|
|
|
|
socklen_t inaddrlen = req->max_addrlen;
|
|
|
|
size_t buflen = req->max_buflen;
|
|
|
|
ssize_t ret = -EBADF;
|
2020-04-27 06:36:06 +02:00
|
|
|
uint32_t len;
|
2019-11-08 16:31:41 +01:00
|
|
|
int retr;
|
|
|
|
|
|
|
|
ack = rpmsg_get_tx_payload_buffer(ept, &len, true);
|
|
|
|
if (sizeof(*ack) + inaddrlen + buflen > len)
|
|
|
|
{
|
|
|
|
buflen = len - sizeof(*ack) - inaddrlen;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = psock_recvfrom(&priv->socks[req->usockid],
|
2020-08-06 03:50:56 +02:00
|
|
|
(void *)(ack + 1) + inaddrlen, buflen, req->flags,
|
2019-11-08 16:31:41 +01:00
|
|
|
outaddrlen ? (struct sockaddr *)(ack + 1) : NULL,
|
|
|
|
outaddrlen ? &outaddrlen : NULL);
|
|
|
|
if (ret > 0 && outaddrlen < inaddrlen)
|
|
|
|
{
|
|
|
|
memcpy((void *)(ack + 1) + outaddrlen,
|
|
|
|
(void *)(ack + 1) + inaddrlen, ret);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
retr = usrsock_rpmsg_send_data_ack(ept,
|
|
|
|
ack, req->head.xid, ret, inaddrlen, outaddrlen);
|
|
|
|
if (retr >= 0 && (ret >= 0 || ret == -EAGAIN))
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
priv->pfds[req->usockid].events |= POLLIN;
|
|
|
|
kill(priv->pid, SIGUSR1); /* Wakeup the poll thread */
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
return retr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_setsockopt_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_setsockopt_s *req = data;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
int ret = -EBADF;
|
|
|
|
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = psock_setsockopt(&priv->socks[req->usockid],
|
|
|
|
req->level, req->option, req + 1, req->valuelen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return usrsock_rpmsg_send_ack(ept, req->head.xid, ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_getsockopt_handler(struct rpmsg_endpoint *ept,
|
2020-04-27 06:36:06 +02:00
|
|
|
void *data, size_t len_,
|
2019-11-08 16:31:41 +01:00
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_getsockopt_s *req = data;
|
|
|
|
struct usrsock_message_datareq_ack_s *ack;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
socklen_t optlen = req->max_valuelen;
|
|
|
|
int ret = -EBADF;
|
2020-04-27 06:36:06 +02:00
|
|
|
uint32_t len;
|
2019-11-08 16:31:41 +01:00
|
|
|
|
|
|
|
ack = rpmsg_get_tx_payload_buffer(ept, &len, true);
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = psock_getsockopt(&priv->socks[req->usockid],
|
|
|
|
req->level, req->option, ack + 1, &optlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return usrsock_rpmsg_send_data_ack(ept,
|
|
|
|
ack, req->head.xid, ret, optlen, optlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_getsockname_handler(struct rpmsg_endpoint *ept,
|
2020-04-27 06:36:06 +02:00
|
|
|
void *data, size_t len_,
|
2019-11-08 16:31:41 +01:00
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_getsockname_s *req = data;
|
|
|
|
struct usrsock_message_datareq_ack_s *ack;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
socklen_t outaddrlen = req->max_addrlen;
|
|
|
|
socklen_t inaddrlen = req->max_addrlen;
|
|
|
|
int ret = -EBADF;
|
2020-04-27 06:36:06 +02:00
|
|
|
uint32_t len;
|
2019-11-08 16:31:41 +01:00
|
|
|
|
|
|
|
ack = rpmsg_get_tx_payload_buffer(ept, &len, true);
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = psock_getsockname(&priv->socks[req->usockid],
|
|
|
|
(struct sockaddr *)(ack + 1), &outaddrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return usrsock_rpmsg_send_data_ack(ept,
|
|
|
|
ack, req->head.xid, ret, inaddrlen, outaddrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_getpeername_handler(struct rpmsg_endpoint *ept,
|
2020-04-27 06:36:06 +02:00
|
|
|
void *data, size_t len_,
|
2019-11-08 16:31:41 +01:00
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_getpeername_s *req = data;
|
|
|
|
struct usrsock_message_datareq_ack_s *ack;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
socklen_t outaddrlen = req->max_addrlen;
|
|
|
|
socklen_t inaddrlen = req->max_addrlen;
|
|
|
|
int ret = -EBADF;
|
2020-04-27 06:36:06 +02:00
|
|
|
uint32_t len;
|
2019-11-08 16:31:41 +01:00
|
|
|
|
|
|
|
ack = rpmsg_get_tx_payload_buffer(ept, &len, true);
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = psock_getpeername(&priv->socks[req->usockid],
|
|
|
|
(struct sockaddr *)(ack + 1), &outaddrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return usrsock_rpmsg_send_data_ack(ept,
|
|
|
|
ack, req->head.xid, ret, inaddrlen, outaddrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_bind_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_bind_s *req = data;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
int ret = -EBADF;
|
|
|
|
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = psock_bind(&priv->socks[req->usockid],
|
|
|
|
(const struct sockaddr *)(req + 1), req->addrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return usrsock_rpmsg_send_ack(ept, req->head.xid, ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_listen_handler(struct rpmsg_endpoint *ept,
|
|
|
|
void *data, size_t len,
|
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_listen_s *req = data;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
int retr;
|
|
|
|
int ret = -EBADF;
|
|
|
|
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = psock_listen(&priv->socks[req->usockid], req->backlog);
|
|
|
|
}
|
|
|
|
|
|
|
|
retr = usrsock_rpmsg_send_ack(ept, req->head.xid, ret);
|
|
|
|
if (retr >= 0 && ret >= 0)
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
priv->pfds[req->usockid].ptr = &priv->socks[req->usockid];
|
|
|
|
priv->pfds[req->usockid].events = POLLIN;
|
|
|
|
kill(priv->pid, SIGUSR1); /* Wakeup the poll thread */
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
return retr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_accept_handler(struct rpmsg_endpoint *ept,
|
2020-04-27 06:36:06 +02:00
|
|
|
void *data, size_t len_,
|
2019-11-08 16:31:41 +01:00
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_accept_s *req = data;
|
|
|
|
struct usrsock_message_datareq_ack_s *ack;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
socklen_t outaddrlen = req->max_addrlen;
|
|
|
|
socklen_t inaddrlen = req->max_addrlen;
|
2020-04-27 06:36:06 +02:00
|
|
|
int ret = -EBADF;
|
|
|
|
uint32_t len;
|
2019-11-11 16:06:18 +01:00
|
|
|
int i = 0;
|
2019-11-08 16:31:41 +01:00
|
|
|
int retr;
|
|
|
|
|
|
|
|
ack = rpmsg_get_tx_payload_buffer(ept, &len, true);
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
ret = -ENFILE; /* Assume no free socket handler */
|
|
|
|
for (i = 0; i < CONFIG_NSOCKET_DESCRIPTORS; i++)
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
if (priv->socks[i].s_crefs == 0)
|
|
|
|
{
|
|
|
|
priv->socks[i].s_crefs++;
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
|
|
|
|
ret = psock_accept(&priv->socks[req->usockid],
|
|
|
|
outaddrlen ? (struct sockaddr *)(ack + 1) : NULL,
|
|
|
|
outaddrlen ? &outaddrlen : NULL, &priv->socks[i]);
|
|
|
|
if (ret >= 0)
|
|
|
|
{
|
|
|
|
psock_fcntl(&priv->socks[i], F_SETFL,
|
|
|
|
psock_fcntl(&priv->socks[i], F_GETFL) | O_NONBLOCK);
|
|
|
|
|
|
|
|
priv->epts[i] = ept;
|
|
|
|
|
|
|
|
/* Append index as usockid to the payload */
|
|
|
|
|
|
|
|
if (outaddrlen <= inaddrlen)
|
|
|
|
{
|
|
|
|
*(int16_t *)((void *)(ack + 1) + outaddrlen) = i;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*(int16_t *)((void *)(ack + 1) + inaddrlen) = i;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = sizeof(int16_t); /* Return usockid size */
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
priv->socks[i].s_crefs--;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
retr = usrsock_rpmsg_send_data_ack(ept,
|
|
|
|
ack, req->head.xid, ret, inaddrlen, outaddrlen);
|
|
|
|
if (retr >= 0 && ret >= 0)
|
|
|
|
{
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
priv->pfds[i].ptr = &priv->socks[i];
|
|
|
|
priv->pfds[i].events = POLLIN;
|
|
|
|
kill(priv->pid, SIGUSR1); /* Wakeup the poll thread */
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
usrsock_rpmsg_send_event(ept, i, USRSOCK_EVENT_SENDTO_READY);
|
|
|
|
}
|
|
|
|
|
|
|
|
return retr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_ioctl_handler(struct rpmsg_endpoint *ept,
|
2020-04-27 06:36:06 +02:00
|
|
|
void *data, size_t len_,
|
2019-11-08 16:31:41 +01:00
|
|
|
uint32_t src, void *priv_)
|
|
|
|
{
|
|
|
|
struct usrsock_request_ioctl_s *req = data;
|
|
|
|
struct usrsock_message_datareq_ack_s *ack;
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
int ret = -EBADF;
|
2020-04-27 06:36:06 +02:00
|
|
|
uint32_t len;
|
2019-11-08 16:31:41 +01:00
|
|
|
|
|
|
|
ack = rpmsg_get_tx_payload_buffer(ept, &len, true);
|
|
|
|
if (req->usockid >= 0 && req->usockid < CONFIG_NSOCKET_DESCRIPTORS)
|
|
|
|
{
|
|
|
|
memcpy(ack + 1, req + 1, req->arglen);
|
|
|
|
ret = psock_ioctl(&priv->socks[req->usockid],
|
|
|
|
req->cmd, (unsigned long)(ack + 1));
|
|
|
|
}
|
|
|
|
|
|
|
|
return usrsock_rpmsg_send_data_ack(ept,
|
|
|
|
ack, req->head.xid, ret, req->arglen, req->arglen);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_NETDB_DNSCLIENT
|
|
|
|
static int usrsock_rpmsg_send_dns_event(void *arg,
|
|
|
|
struct sockaddr *addr,
|
|
|
|
socklen_t addrlen)
|
|
|
|
{
|
|
|
|
struct rpmsg_endpoint *ept = arg;
|
|
|
|
struct usrsock_rpmsg_dns_event_s *dns;
|
|
|
|
uint32_t len;
|
|
|
|
|
|
|
|
dns = rpmsg_get_tx_payload_buffer(ept, &len, true);
|
|
|
|
|
|
|
|
dns->head.msgid = USRSOCK_RPMSG_DNS_EVENT;
|
|
|
|
dns->head.flags = USRSOCK_MESSAGE_FLAG_EVENT;
|
|
|
|
|
|
|
|
dns->addrlen = addrlen;
|
|
|
|
memcpy(dns + 1, addr, addrlen);
|
|
|
|
|
|
|
|
return rpmsg_send_nocopy(ept, dns, sizeof(*dns) + addrlen);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static void usrsock_rpmsg_ns_bind(struct rpmsg_device *rdev, void *priv_,
|
|
|
|
const char *name, uint32_t dest)
|
|
|
|
{
|
|
|
|
struct usrsock_rpmsg_s *priv = priv_;
|
|
|
|
struct rpmsg_endpoint *ept;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (strcmp(name, USRSOCK_RPMSG_EPT_NAME))
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ept = zalloc(sizeof(struct rpmsg_endpoint));
|
|
|
|
if (!ept)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ept->priv = priv;
|
|
|
|
|
|
|
|
ret = rpmsg_create_ept(ept, rdev, USRSOCK_RPMSG_EPT_NAME,
|
|
|
|
RPMSG_ADDR_ANY, dest,
|
|
|
|
usrsock_rpmsg_ept_cb, usrsock_rpmsg_ns_unbind);
|
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
free(ept);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_NETDB_DNSCLIENT
|
|
|
|
dns_register_notify(usrsock_rpmsg_send_dns_event, ept);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static void usrsock_rpmsg_ns_unbind(struct rpmsg_endpoint *ept)
|
|
|
|
{
|
|
|
|
struct usrsock_rpmsg_s *priv = ept->priv;
|
|
|
|
struct socket *socks[CONFIG_NSOCKET_DESCRIPTORS];
|
|
|
|
int count = 0;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
#ifdef CONFIG_NETDB_DNSCLIENT
|
|
|
|
dns_unregister_notify(usrsock_rpmsg_send_dns_event, ept);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Collect all socks belong to the dead client */
|
|
|
|
|
|
|
|
for (i = 0; i < CONFIG_NSOCKET_DESCRIPTORS; i++)
|
|
|
|
{
|
|
|
|
if (priv->epts[i] == ept)
|
|
|
|
{
|
|
|
|
socks[count++] = &priv->socks[i];
|
|
|
|
priv->pfds[i].ptr = NULL;
|
|
|
|
priv->epts[i] = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Signal and wait the poll thread to wakeup */
|
|
|
|
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
kill(priv->pid, SIGUSR1);
|
|
|
|
pthread_cond_wait(&priv->cond, &priv->mutex);
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
|
|
|
|
/* It's safe to close all socks here */
|
|
|
|
|
|
|
|
for (i = 0; i < count; i++)
|
|
|
|
{
|
|
|
|
psock_close(socks[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
rpmsg_destroy_ept(ept);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_ept_cb(struct rpmsg_endpoint *ept, void *data,
|
|
|
|
size_t len, uint32_t src, void *priv)
|
|
|
|
{
|
|
|
|
struct usrsock_request_common_s *common = data;
|
|
|
|
|
|
|
|
if (common->reqid >= 0 && common->reqid < USRSOCK_REQUEST__MAX)
|
|
|
|
{
|
|
|
|
return g_usrsock_rpmsg_handler[common->reqid](ept, data, len,
|
|
|
|
src, priv);
|
|
|
|
}
|
|
|
|
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int usrsock_rpmsg_prepare_poll(struct usrsock_rpmsg_s *priv,
|
|
|
|
struct pollfd *pfds)
|
|
|
|
{
|
|
|
|
int count = 0;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
|
|
|
|
/* Signal the worker it's safe to close sock */
|
|
|
|
|
|
|
|
pthread_cond_signal(&priv->cond);
|
|
|
|
|
|
|
|
for (i = 0; i < CONFIG_NSOCKET_DESCRIPTORS; i++)
|
|
|
|
{
|
|
|
|
if (priv->pfds[i].ptr)
|
|
|
|
{
|
|
|
|
pfds[count] = priv->pfds[i];
|
|
|
|
pfds[count++].events |= POLLERR | POLLHUP | POLLSOCK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void usrsock_rpmsg_process_poll(struct usrsock_rpmsg_s *priv,
|
|
|
|
struct pollfd *pfds, int count)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
int j;
|
|
|
|
|
|
|
|
for (i = 0; i < count; i++)
|
|
|
|
{
|
|
|
|
j = (struct socket *)pfds[i].ptr - priv->socks;
|
|
|
|
|
|
|
|
pthread_mutex_lock(&priv->mutex);
|
|
|
|
if (priv->epts[j] != NULL)
|
|
|
|
{
|
|
|
|
int events = 0;
|
|
|
|
|
|
|
|
if (pfds[i].revents & POLLIN)
|
|
|
|
{
|
|
|
|
events |= USRSOCK_EVENT_RECVFROM_AVAIL;
|
|
|
|
|
|
|
|
/* Stop poll in until recv get called */
|
|
|
|
|
|
|
|
priv->pfds[j].events &= ~POLLIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pfds[i].revents & POLLOUT)
|
|
|
|
{
|
|
|
|
events |= USRSOCK_EVENT_SENDTO_READY;
|
|
|
|
|
|
|
|
/* Stop poll out until send get called */
|
|
|
|
|
|
|
|
priv->pfds[j].events &= ~POLLOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pfds[i].revents & (POLLHUP | POLLERR))
|
|
|
|
{
|
|
|
|
events |= USRSOCK_EVENT_REMOTE_CLOSED;
|
|
|
|
|
|
|
|
/* Stop poll at all */
|
|
|
|
|
|
|
|
priv->pfds[j].ptr = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (events != 0)
|
|
|
|
{
|
|
|
|
usrsock_rpmsg_send_event(priv->epts[j], j, events);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&priv->mutex);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
|
|
|
struct pollfd pfds[CONFIG_NSOCKET_DESCRIPTORS];
|
|
|
|
struct usrsock_rpmsg_s *priv;
|
|
|
|
sigset_t sigmask;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
priv = calloc(1, sizeof(*priv));
|
|
|
|
if (priv == NULL)
|
|
|
|
{
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
priv->pid = getpid();
|
|
|
|
|
|
|
|
pthread_mutex_init(&priv->mutex, NULL);
|
|
|
|
pthread_cond_init(&priv->cond, NULL);
|
|
|
|
|
|
|
|
sigprocmask(SIG_SETMASK, NULL, &sigmask);
|
|
|
|
sigaddset(&sigmask, SIGUSR1);
|
|
|
|
sigprocmask(SIG_SETMASK, &sigmask, NULL);
|
|
|
|
sigdelset(&sigmask, SIGUSR1);
|
|
|
|
|
|
|
|
ret = rpmsg_register_callback(priv,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
usrsock_rpmsg_ns_bind);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto free_priv;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
/* Collect all socks which need monitor */
|
|
|
|
|
|
|
|
ret = usrsock_rpmsg_prepare_poll(priv, pfds);
|
|
|
|
|
|
|
|
/* Monitor the state change from them */
|
|
|
|
|
|
|
|
if (ppoll(pfds, ret, NULL, &sigmask) > 0)
|
|
|
|
{
|
|
|
|
/* Process all changed socks */
|
|
|
|
|
|
|
|
usrsock_rpmsg_process_poll(priv, pfds, ret);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rpmsg_unregister_callback(priv,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
usrsock_rpmsg_ns_bind);
|
|
|
|
free_priv:
|
|
|
|
pthread_cond_destroy(&priv->cond);
|
|
|
|
pthread_mutex_destroy(&priv->mutex);
|
|
|
|
free(priv);
|
|
|
|
return ret;
|
|
|
|
}
|