2017-07-12 17:36:05 -06:00
|
|
|
/****************************************************************************
|
2017-08-06 14:48:19 -06:00
|
|
|
* net/inet/inet_recvfrom.c
|
2017-07-12 17:36:05 -06:00
|
|
|
*
|
net/udp: Resolve race condition in connection-less UDP sockets with read-ahead buffering.
In connection-mode UDP sockets, a remote address is retained in the UDP connection structure. This determines both there send() will send the packets and which packets recv() will accept.
This same mechanism is used for connection-less UDP sendto: A temporary remote address is written into the connection structure to support the sendto() operation. That address persists until the next recvfrom() when it is reset to accept any address.
When UDP read-ahead buffering is enabled, however, that means that the old, invalid remote address can be left in the connection structure for some time. This can cause read-ahead buffer to fail, dropping UDP packets.
Shortening the time between when he remote address is reset (i.e., immediately after the sendto() completes) is not a solution, that does not eliminate the race condition; in only makes it smaller.
With this change, a flag was added to the connection structure to indicate if the UDP socket is in connection mode or if it is connection-less. This change effects only UDP receive operations: The remote address in the UDP connection is always ignored if the UDP socket is not in connection-mode.
No for connection-mode sockets, that remote address behaves as before. But for connection-less sockets, it is only used by sendto().
2018-05-13 09:57:34 -06:00
|
|
|
* Copyright (C) 2007-2009, 2011-2018 Gregory Nutt. All rights reserved.
|
2017-07-12 17:36:05 -06:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name NuttX nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <debug.h>
|
|
|
|
#include <assert.h>
|
|
|
|
|
|
|
|
#include <arch/irq.h>
|
|
|
|
|
|
|
|
#include <nuttx/semaphore.h>
|
|
|
|
#include <nuttx/cancelpt.h>
|
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
#include <nuttx/mm/iob.h>
|
|
|
|
#include <nuttx/net/netdev.h>
|
|
|
|
#include <nuttx/net/ip.h>
|
|
|
|
#include <nuttx/net/tcp.h>
|
|
|
|
#include <nuttx/net/udp.h>
|
|
|
|
|
|
|
|
#include "netdev/netdev.h"
|
|
|
|
#include "devif/devif.h"
|
|
|
|
#include "tcp/tcp.h"
|
|
|
|
#include "udp/udp.h"
|
|
|
|
#include "pkt/pkt.h"
|
|
|
|
#include "local/local.h"
|
|
|
|
#include "socket/socket.h"
|
|
|
|
#include "usrsock/usrsock.h"
|
2017-08-06 14:48:19 -06:00
|
|
|
#include "inet/inet.h"
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Pre-processor Definitions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#define IPv4BUF ((struct ipv4_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev)])
|
|
|
|
#define IPv6BUF ((struct ipv6_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev)])
|
|
|
|
|
|
|
|
#define UDPIPv4BUF ((struct udp_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev) + IPv4_HDRLEN])
|
|
|
|
#define UDPIPv6BUF ((struct udp_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev) + IPv6_HDRLEN])
|
|
|
|
|
|
|
|
#define TCPIPv4BUF ((struct tcp_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev) + IPv4_HDRLEN])
|
|
|
|
#define TCPIPv6BUF ((struct tcp_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev) + IPv6_HDRLEN])
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if defined(NET_UDP_HAVE_STACK) || defined(NET_TCP_HAVE_STACK)
|
|
|
|
struct inet_recvfrom_s
|
|
|
|
{
|
|
|
|
FAR struct socket *ir_sock; /* The parent socket structure */
|
|
|
|
FAR struct devif_callback_s *ir_cb; /* Reference to callback instance */
|
|
|
|
sem_t ir_sem; /* Semaphore signals recv completion */
|
|
|
|
size_t ir_buflen; /* Length of receive buffer */
|
|
|
|
uint8_t *ir_buffer; /* Pointer to receive buffer */
|
|
|
|
FAR struct sockaddr *ir_from; /* Address of sender */
|
|
|
|
FAR socklen_t *ir_fromlen; /* Number of bytes allocated for address of sender */
|
|
|
|
ssize_t ir_recvlen; /* The received length */
|
|
|
|
int ir_result; /* Success:OK, failure:negated errno */
|
|
|
|
};
|
|
|
|
#endif /* NET_UDP_HAVE_STACK || NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_update_recvlen
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Update information about space available for new data and update size
|
|
|
|
* of data in buffer, This logic accounts for the case where
|
|
|
|
* inet_udp_readahead() sets state.ir_recvlen == -1 .
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2017-07-12 17:36:05 -06:00
|
|
|
* pstate recvfrom state structure
|
|
|
|
* recvlen size of new data appended to buffer
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if defined(NET_UDP_HAVE_STACK) || defined(NET_TCP_HAVE_STACK)
|
|
|
|
|
|
|
|
static inline void inet_update_recvlen(FAR struct inet_recvfrom_s *pstate,
|
|
|
|
size_t recvlen)
|
|
|
|
{
|
|
|
|
if (pstate->ir_recvlen < 0)
|
|
|
|
{
|
|
|
|
pstate->ir_recvlen = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
pstate->ir_recvlen += recvlen;
|
|
|
|
pstate->ir_buffer += recvlen;
|
|
|
|
pstate->ir_buflen -= recvlen;
|
|
|
|
}
|
|
|
|
#endif /* NET_UDP_HAVE_STACK || NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_recvfrom_newdata
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the read data from the packet
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2018-06-23 14:09:06 -06:00
|
|
|
* dev The structure of the network driver that generated the event.
|
2017-07-12 17:36:05 -06:00
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* The number of bytes taken from the packet.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if defined(NET_UDP_HAVE_STACK) || defined(NET_TCP_HAVE_STACK)
|
|
|
|
static size_t inet_recvfrom_newdata(FAR struct net_driver_s *dev,
|
|
|
|
FAR struct inet_recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
size_t recvlen;
|
|
|
|
|
|
|
|
/* Get the length of the data to return */
|
|
|
|
|
|
|
|
if (dev->d_len > pstate->ir_buflen)
|
|
|
|
{
|
|
|
|
recvlen = pstate->ir_buflen;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
recvlen = dev->d_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy the new appdata into the user buffer */
|
|
|
|
|
|
|
|
memcpy(pstate->ir_buffer, dev->d_appdata, recvlen);
|
|
|
|
ninfo("Received %d bytes (of %d)\n", (int)recvlen, (int)dev->d_len);
|
|
|
|
|
|
|
|
/* Update the accumulated size of the data read */
|
|
|
|
|
|
|
|
inet_update_recvlen(pstate, recvlen);
|
|
|
|
|
|
|
|
return recvlen;
|
|
|
|
}
|
|
|
|
#endif /* NET_UDP_HAVE_STACK || NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_tcp_newdata
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the read data from the packet
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2018-06-23 14:09:06 -06:00
|
|
|
* dev The structure of the network driver that generated the event
|
2017-07-12 17:36:05 -06:00
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
static inline void inet_tcp_newdata(FAR struct net_driver_s *dev,
|
|
|
|
FAR struct inet_recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
/* Take as much data from the packet as we can */
|
|
|
|
|
|
|
|
size_t recvlen = inet_recvfrom_newdata(dev, pstate);
|
|
|
|
|
|
|
|
/* If there is more data left in the packet that we could not buffer, then
|
|
|
|
* add it to the read-ahead buffers.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (recvlen < dev->d_len)
|
|
|
|
{
|
|
|
|
FAR struct tcp_conn_s *conn = (FAR struct tcp_conn_s *)pstate->ir_sock->s_conn;
|
|
|
|
FAR uint8_t *buffer = (FAR uint8_t *)dev->d_appdata + recvlen;
|
|
|
|
uint16_t buflen = dev->d_len - recvlen;
|
|
|
|
#ifdef CONFIG_DEBUG_NET
|
|
|
|
uint16_t nsaved;
|
|
|
|
|
|
|
|
nsaved = tcp_datahandler(conn, buffer, buflen);
|
|
|
|
#else
|
2020-01-02 10:49:34 -06:00
|
|
|
tcp_datahandler(conn, buffer, buflen);
|
2017-07-12 17:36:05 -06:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/* There are complicated buffering issues that are not addressed fully
|
|
|
|
* here. For example, what if up_datahandler() cannot buffer the
|
|
|
|
* remainder of the packet? In that case, the data will be dropped but
|
|
|
|
* still ACKed. Therefore it would not be resent.
|
|
|
|
*
|
|
|
|
* This is probably not an issue here because we only get here if the
|
|
|
|
* read-ahead buffers are empty and there would have to be something
|
|
|
|
* serioulsy wrong with the configuration not to be able to buffer a
|
|
|
|
* partial packet in this context.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef CONFIG_DEBUG_NET
|
|
|
|
if (nsaved < buflen)
|
|
|
|
{
|
|
|
|
nerr("ERROR: packet data not saved (%d bytes)\n", buflen - nsaved);
|
|
|
|
}
|
|
|
|
#endif
|
2019-07-02 18:02:23 -06:00
|
|
|
}
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
/* Indicate no data in the buffer */
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
|
|
|
}
|
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_udp_newdata
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the read data from the packet
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2018-06-23 14:09:06 -06:00
|
|
|
* dev The sructure of the network driver that generated the event
|
2017-07-12 17:36:05 -06:00
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
static inline void inet_udp_newdata(FAR struct net_driver_s *dev,
|
|
|
|
FAR struct inet_recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
/* Take as much data from the packet as we can */
|
|
|
|
|
2020-01-02 10:49:34 -06:00
|
|
|
inet_recvfrom_newdata(dev, pstate);
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
/* Indicate no data in the buffer */
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
|
|
|
}
|
|
|
|
#endif /* NET_UDP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-10-23 08:45:12 -06:00
|
|
|
* Name: inet_tcp_readahead and inet_udp_readahead
|
2017-07-12 17:36:05 -06:00
|
|
|
*
|
|
|
|
* Description:
|
2017-10-23 08:45:12 -06:00
|
|
|
* Copy the read-ahead data from the packet
|
2017-07-12 17:36:05 -06:00
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2017-07-12 17:36:05 -06:00
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2020-01-11 11:56:03 +08:00
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
2017-07-12 17:36:05 -06:00
|
|
|
static inline void inet_tcp_readahead(struct inet_recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
FAR struct tcp_conn_s *conn = (FAR struct tcp_conn_s *)pstate->ir_sock->s_conn;
|
|
|
|
FAR struct iob_s *iob;
|
|
|
|
int recvlen;
|
|
|
|
|
|
|
|
/* Check there is any TCP data already buffered in a read-ahead
|
|
|
|
* buffer.
|
|
|
|
*/
|
|
|
|
|
|
|
|
while ((iob = iob_peek_queue(&conn->readahead)) != NULL &&
|
|
|
|
pstate->ir_buflen > 0)
|
|
|
|
{
|
|
|
|
DEBUGASSERT(iob->io_pktlen > 0);
|
|
|
|
|
|
|
|
/* Transfer that buffered data from the I/O buffer chain into
|
|
|
|
* the user buffer.
|
|
|
|
*/
|
|
|
|
|
|
|
|
recvlen = iob_copyout(pstate->ir_buffer, iob, pstate->ir_buflen, 0);
|
|
|
|
ninfo("Received %d bytes (of %d)\n", recvlen, iob->io_pktlen);
|
|
|
|
|
|
|
|
/* Update the accumulated size of the data read */
|
|
|
|
|
|
|
|
inet_update_recvlen(pstate, recvlen);
|
|
|
|
|
2020-01-04 18:37:46 +08:00
|
|
|
/* If we took all of the data from the I/O buffer chain is empty, then
|
2017-07-12 17:36:05 -06:00
|
|
|
* release it. If there is still data available in the I/O buffer
|
|
|
|
* chain, then just trim the data that we have taken from the
|
|
|
|
* beginning of the I/O buffer chain.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (recvlen >= iob->io_pktlen)
|
|
|
|
{
|
|
|
|
FAR struct iob_s *tmp;
|
|
|
|
|
|
|
|
/* Remove the I/O buffer chain from the head of the read-ahead
|
|
|
|
* buffer queue.
|
|
|
|
*/
|
|
|
|
|
|
|
|
tmp = iob_remove_queue(&conn->readahead);
|
|
|
|
DEBUGASSERT(tmp == iob);
|
|
|
|
UNUSED(tmp);
|
|
|
|
|
|
|
|
/* And free the I/O buffer chain */
|
|
|
|
|
2020-01-02 10:49:34 -06:00
|
|
|
iob_free_chain(iob, IOBUSER_NET_TCP_READAHEAD);
|
2017-07-12 17:36:05 -06:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* The bytes that we have received from the head of the I/O
|
|
|
|
* buffer chain (probably changing the head of the I/O
|
|
|
|
* buffer queue).
|
|
|
|
*/
|
|
|
|
|
2020-01-02 10:49:34 -06:00
|
|
|
iob_trimhead_queue(&conn->readahead, recvlen,
|
|
|
|
IOBUSER_NET_TCP_READAHEAD);
|
2017-07-12 17:36:05 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-01-11 11:56:03 +08:00
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|
2017-07-12 17:36:05 -06:00
|
|
|
|
2020-01-11 11:56:03 +08:00
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
static inline void inet_udp_readahead(struct inet_recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
FAR struct udp_conn_s *conn = (FAR struct udp_conn_s *)pstate->ir_sock->s_conn;
|
|
|
|
FAR struct iob_s *iob;
|
|
|
|
int recvlen;
|
|
|
|
|
|
|
|
/* Check there is any UDP datagram already buffered in a read-ahead
|
|
|
|
* buffer.
|
|
|
|
*/
|
|
|
|
|
|
|
|
pstate->ir_recvlen = -1;
|
|
|
|
|
|
|
|
if ((iob = iob_peek_queue(&conn->readahead)) != NULL)
|
|
|
|
{
|
|
|
|
FAR struct iob_s *tmp;
|
|
|
|
uint8_t src_addr_size;
|
|
|
|
|
|
|
|
DEBUGASSERT(iob->io_pktlen > 0);
|
|
|
|
|
|
|
|
/* Transfer that buffered data from the I/O buffer chain into
|
|
|
|
* the user buffer.
|
|
|
|
*/
|
|
|
|
|
|
|
|
recvlen = iob_copyout(&src_addr_size, iob, sizeof(uint8_t), 0);
|
|
|
|
if (recvlen != sizeof(uint8_t))
|
|
|
|
{
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (0
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
|| src_addr_size == sizeof(struct sockaddr_in6)
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
|| src_addr_size == sizeof(struct sockaddr_in)
|
|
|
|
#endif
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if (pstate->ir_from)
|
|
|
|
{
|
|
|
|
socklen_t len = *pstate->ir_fromlen;
|
|
|
|
len = (socklen_t)src_addr_size > len ? len : (socklen_t)src_addr_size;
|
|
|
|
|
|
|
|
recvlen = iob_copyout((FAR uint8_t *)pstate->ir_from, iob,
|
|
|
|
len, sizeof(uint8_t));
|
|
|
|
if (recvlen != len)
|
|
|
|
{
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pstate->ir_buflen > 0)
|
|
|
|
{
|
|
|
|
recvlen = iob_copyout(pstate->ir_buffer, iob, pstate->ir_buflen,
|
|
|
|
src_addr_size + sizeof(uint8_t));
|
|
|
|
|
|
|
|
ninfo("Received %d bytes (of %d)\n", recvlen, iob->io_pktlen);
|
|
|
|
|
|
|
|
/* Update the accumulated size of the data read */
|
|
|
|
|
|
|
|
pstate->ir_recvlen = recvlen;
|
|
|
|
pstate->ir_buffer += recvlen;
|
|
|
|
pstate->ir_buflen -= recvlen;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
pstate->ir_recvlen = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
/* Remove the I/O buffer chain from the head of the read-ahead
|
|
|
|
* buffer queue.
|
|
|
|
*/
|
|
|
|
|
|
|
|
tmp = iob_remove_queue(&conn->readahead);
|
|
|
|
DEBUGASSERT(tmp == iob);
|
|
|
|
UNUSED(tmp);
|
|
|
|
|
|
|
|
/* And free the I/O buffer chain */
|
|
|
|
|
2020-01-02 10:49:34 -06:00
|
|
|
iob_free_chain(iob, IOBUSER_NET_UDP_READAHEAD);
|
2017-07-12 17:36:05 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_tcp_sender
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Getting the sender's address from the UDP packet
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2017-07-12 17:36:05 -06:00
|
|
|
* dev - The device driver data structure
|
|
|
|
* pstate - the recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 15:08:38 -06:00
|
|
|
* The network is locked
|
2017-07-12 17:36:05 -06:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
static inline void inet_tcp_sender(FAR struct net_driver_s *dev,
|
|
|
|
FAR struct inet_recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
/* Get the family from the packet type, IP address from the IP header, and
|
|
|
|
* the port number from the TCP header.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
FAR struct sockaddr_in6 *infrom =
|
|
|
|
(FAR struct sockaddr_in6 *)pstate->ir_from;
|
|
|
|
|
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
FAR struct tcp_hdr_s *tcp = TCPIPv6BUF;
|
|
|
|
FAR struct ipv6_hdr_s *ipv6 = IPv6BUF;
|
|
|
|
|
|
|
|
infrom->sin6_family = AF_INET6;
|
|
|
|
infrom->sin6_port = tcp->srcport;
|
|
|
|
|
|
|
|
net_ipv6addr_copy(infrom->sin6_addr.s6_addr, ipv6->srcipaddr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
FAR struct sockaddr_in *infrom =
|
|
|
|
(FAR struct sockaddr_in *)pstate->ir_from;
|
|
|
|
|
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
FAR struct tcp_hdr_s *tcp = TCPIPv4BUF;
|
|
|
|
FAR struct ipv4_hdr_s *ipv4 = IPv4BUF;
|
|
|
|
|
|
|
|
infrom->sin_family = AF_INET;
|
|
|
|
infrom->sin_port = tcp->srcport;
|
|
|
|
|
|
|
|
net_ipv4addr_copy(infrom->sin_addr.s_addr,
|
|
|
|
net_ip4addr_conv32(ipv4->srcipaddr));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
}
|
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-08-29 14:08:04 -06:00
|
|
|
* Name: inet_tcp_eventhandler
|
2017-07-12 17:36:05 -06:00
|
|
|
*
|
|
|
|
* Description:
|
2018-06-23 14:09:06 -06:00
|
|
|
* This function is called with the network locked to perform the actual
|
2017-07-12 17:36:05 -06:00
|
|
|
* TCP receive operation via by the lower, device interfacing layer.
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2018-06-23 14:09:06 -06:00
|
|
|
* dev The structure of the network driver that generated the event.
|
2017-07-12 17:36:05 -06:00
|
|
|
* pvconn The connection structure associated with the socket
|
|
|
|
* flags Set of events describing why the callback was invoked
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
2017-08-29 14:08:04 -06:00
|
|
|
static uint16_t inet_tcp_eventhandler(FAR struct net_driver_s *dev,
|
|
|
|
FAR void *pvconn, FAR void *pvpriv,
|
|
|
|
uint16_t flags)
|
2017-07-12 17:36:05 -06:00
|
|
|
{
|
|
|
|
FAR struct inet_recvfrom_s *pstate = (struct inet_recvfrom_s *)pvpriv;
|
|
|
|
|
|
|
|
#if 0 /* REVISIT: The assertion fires. Why? */
|
|
|
|
FAR struct tcp_conn_s *conn = (FAR struct tcp_conn_s *)pvconn;
|
|
|
|
|
|
|
|
/* The TCP socket is connected and, hence, should be bound to a device.
|
|
|
|
* Make sure that the polling device is the own that we are bound to.
|
|
|
|
*/
|
|
|
|
|
|
|
|
DEBUGASSERT(conn->dev == NULL || conn->dev == dev);
|
|
|
|
if (conn->dev != NULL && conn->dev != dev)
|
|
|
|
{
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
ninfo("flags: %04x\n", flags);
|
|
|
|
|
|
|
|
/* 'priv' might be null in some race conditions (?) */
|
|
|
|
|
|
|
|
if (pstate)
|
|
|
|
{
|
|
|
|
/* If new data is available, then complete the read action. */
|
|
|
|
|
|
|
|
if ((flags & TCP_NEWDATA) != 0)
|
|
|
|
{
|
|
|
|
/* Copy the data from the packet (saving any unused bytes from the
|
|
|
|
* packet in the read-ahead buffer).
|
|
|
|
*/
|
|
|
|
|
|
|
|
inet_tcp_newdata(dev, pstate);
|
|
|
|
|
|
|
|
/* Save the sender's address in the caller's 'from' location */
|
|
|
|
|
|
|
|
inet_tcp_sender(dev, pstate);
|
|
|
|
|
|
|
|
/* Indicate that the data has been consumed and that an ACK
|
|
|
|
* should be sent.
|
|
|
|
*/
|
|
|
|
|
|
|
|
flags = (flags & ~TCP_NEWDATA) | TCP_SNDACK;
|
|
|
|
|
2020-01-11 11:56:03 +08:00
|
|
|
/* Check for transfer complete. We will consider the
|
|
|
|
* TCP/IP transfer complete as soon as any data has been received.
|
|
|
|
* This is safe because if any additional data is received, it
|
|
|
|
* will be retained in the TCP/IP read-ahead buffer until the
|
|
|
|
* next receive is performed.
|
2017-07-12 17:36:05 -06:00
|
|
|
*/
|
|
|
|
|
|
|
|
if (pstate->ir_recvlen > 0)
|
|
|
|
{
|
|
|
|
ninfo("TCP resume\n");
|
|
|
|
|
|
|
|
/* The TCP receive buffer is non-empty. Return now and don't
|
|
|
|
* allow any further TCP call backs.
|
|
|
|
*/
|
|
|
|
|
|
|
|
pstate->ir_cb->flags = 0;
|
|
|
|
pstate->ir_cb->priv = NULL;
|
|
|
|
pstate->ir_cb->event = NULL;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread, returning the number of bytes
|
|
|
|
* actually read.
|
|
|
|
*/
|
|
|
|
|
2017-10-03 15:35:24 -06:00
|
|
|
nxsem_post(&pstate->ir_sem);
|
2017-07-12 17:36:05 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check for a loss of connection.
|
|
|
|
*
|
|
|
|
* TCP_DISCONN_EVENTS:
|
|
|
|
* TCP_CLOSE: The remote host has closed the connection
|
|
|
|
* TCP_ABORT: The remote host has aborted the connection
|
|
|
|
* TCP_TIMEDOUT: Connection aborted due to too many retransmissions.
|
|
|
|
* NETDEV_DOWN: The network device went down
|
|
|
|
*/
|
|
|
|
|
|
|
|
else if ((flags & TCP_DISCONN_EVENTS) != 0)
|
|
|
|
{
|
2017-10-19 16:45:00 -06:00
|
|
|
FAR struct socket *psock = pstate->ir_sock;
|
2017-07-12 17:36:05 -06:00
|
|
|
|
2017-10-19 16:45:00 -06:00
|
|
|
nwarn("WARNING: Lost connection\n");
|
2017-07-12 17:36:05 -06:00
|
|
|
|
2017-10-19 16:45:00 -06:00
|
|
|
/* We could get here recursively through the callback actions of
|
|
|
|
* tcp_lost_connection(). So don't repeat that action if we have
|
|
|
|
* already been disconnected.
|
|
|
|
*/
|
|
|
|
|
|
|
|
DEBUGASSERT(psock != NULL);
|
|
|
|
if (_SS_ISCONNECTED(psock->s_flags))
|
|
|
|
{
|
|
|
|
/* Handle loss-of-connection event */
|
|
|
|
|
|
|
|
tcp_lost_connection(psock, pstate->ir_cb, flags);
|
|
|
|
}
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
/* Check if the peer gracefully closed the connection. */
|
|
|
|
|
|
|
|
if ((flags & TCP_CLOSE) != 0)
|
|
|
|
{
|
|
|
|
/* This case should always return success (zero)! The value of
|
|
|
|
* ir_recvlen, if zero, will indicate that the connection was
|
|
|
|
* gracefully closed.
|
|
|
|
*/
|
|
|
|
|
|
|
|
pstate->ir_result = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
pstate->ir_result = -ENOTCONN;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
2017-10-03 15:35:24 -06:00
|
|
|
nxsem_post(&pstate->ir_sem);
|
2017-07-12 17:36:05 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_udp_sender
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Getting the sender's address from the UDP packet
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2017-07-12 17:36:05 -06:00
|
|
|
* dev - The device driver data structure
|
|
|
|
* pstate - the recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
2019-10-25 11:31:42 -06:00
|
|
|
static inline void inet_udp_sender(FAR struct net_driver_s *dev,
|
|
|
|
FAR struct inet_recvfrom_s *pstate)
|
2017-07-12 17:36:05 -06:00
|
|
|
{
|
|
|
|
/* Get the family from the packet type, IP address from the IP header, and
|
|
|
|
* the port number from the UDP header.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
FAR struct sockaddr_in6 *infrom =
|
|
|
|
(FAR struct sockaddr_in6 *)pstate->ir_from;
|
|
|
|
FAR socklen_t *fromlen = pstate->ir_fromlen;
|
|
|
|
|
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
FAR struct udp_hdr_s *udp = UDPIPv6BUF;
|
|
|
|
FAR struct ipv6_hdr_s *ipv6 = IPv6BUF;
|
|
|
|
|
|
|
|
infrom->sin6_family = AF_INET6;
|
|
|
|
infrom->sin6_port = udp->srcport;
|
|
|
|
*fromlen = sizeof(struct sockaddr_in6);
|
|
|
|
|
|
|
|
net_ipv6addr_copy(infrom->sin6_addr.s6_addr, ipv6->srcipaddr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
FAR struct sockaddr_in *infrom =
|
|
|
|
(FAR struct sockaddr_in *)pstate->ir_from;
|
|
|
|
|
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
FAR struct udp_conn_s *conn =
|
|
|
|
(FAR struct udp_conn_s *)pstate->ir_sock->s_conn;
|
|
|
|
|
|
|
|
/* Hybrid dual-stack IPv6/IPv4 implementations recognize a special
|
|
|
|
* class of addresses, the IPv4-mapped IPv6 addresses.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (conn->domain == PF_INET6)
|
|
|
|
{
|
|
|
|
FAR struct sockaddr_in6 *infrom6 = (FAR struct sockaddr_in6 *)infrom;
|
|
|
|
FAR socklen_t *fromlen = pstate->ir_fromlen;
|
|
|
|
FAR struct udp_hdr_s *udp = UDPIPv6BUF;
|
|
|
|
FAR struct ipv6_hdr_s *ipv6 = IPv6BUF;
|
|
|
|
in_addr_t ipv4addr;
|
|
|
|
|
|
|
|
/* Encode the IPv4 address as an IPv4-mapped IPv6 address */
|
|
|
|
|
|
|
|
infrom6->sin6_family = AF_INET6;
|
|
|
|
infrom6->sin6_port = udp->srcport;
|
|
|
|
*fromlen = sizeof(struct sockaddr_in6);
|
|
|
|
|
|
|
|
ipv4addr = net_ip4addr_conv32(ipv6->srcipaddr);
|
|
|
|
ip6_map_ipv4addr(ipv4addr, infrom6->sin6_addr.s6_addr16);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
FAR struct udp_hdr_s *udp = UDPIPv4BUF;
|
|
|
|
FAR struct ipv4_hdr_s *ipv4 = IPv4BUF;
|
|
|
|
|
|
|
|
infrom->sin_family = AF_INET;
|
|
|
|
infrom->sin_port = udp->srcport;
|
|
|
|
|
|
|
|
net_ipv4addr_copy(infrom->sin_addr.s_addr,
|
|
|
|
net_ip4addr_conv32(ipv4->srcipaddr));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
}
|
|
|
|
#endif /* NET_UDP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_udp_terminate
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Terminate the UDP transfer.
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2017-07-12 17:36:05 -06:00
|
|
|
* pstate - The recvfrom state structure
|
|
|
|
* result - The result of the operation
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
static void inet_udp_terminate(FAR struct inet_recvfrom_s *pstate, int result)
|
|
|
|
{
|
|
|
|
/* Don't allow any further UDP call backs. */
|
|
|
|
|
|
|
|
pstate->ir_cb->flags = 0;
|
|
|
|
pstate->ir_cb->priv = NULL;
|
|
|
|
pstate->ir_cb->event = NULL;
|
|
|
|
|
|
|
|
/* Save the result of the transfer */
|
|
|
|
|
|
|
|
pstate->ir_result = result;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread, returning the number of bytes
|
|
|
|
* actually read.
|
|
|
|
*/
|
|
|
|
|
2017-10-03 15:35:24 -06:00
|
|
|
nxsem_post(&pstate->ir_sem);
|
2017-07-12 17:36:05 -06:00
|
|
|
}
|
|
|
|
#endif /* NET_UDP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-08-29 14:08:04 -06:00
|
|
|
* Name: inet_udp_eventhandler
|
2017-07-12 17:36:05 -06:00
|
|
|
*
|
|
|
|
* Description:
|
2018-06-23 14:09:06 -06:00
|
|
|
* This function is called with the network locked to perform the actual
|
2017-07-12 17:36:05 -06:00
|
|
|
* UDP receive operation via by the lower, device interfacing layer.
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2018-06-23 14:09:06 -06:00
|
|
|
* dev The structure of the network driver that generated the event.
|
2017-07-12 17:36:05 -06:00
|
|
|
* pvconn The connection structure associated with the socket
|
|
|
|
* flags Set of events describing why the callback was invoked
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
2017-08-29 14:08:04 -06:00
|
|
|
static uint16_t inet_udp_eventhandler(FAR struct net_driver_s *dev,
|
|
|
|
FAR void *pvconn, FAR void *pvpriv,
|
|
|
|
uint16_t flags)
|
2017-07-12 17:36:05 -06:00
|
|
|
{
|
|
|
|
FAR struct inet_recvfrom_s *pstate = (FAR struct inet_recvfrom_s *)pvpriv;
|
|
|
|
|
|
|
|
ninfo("flags: %04x\n", flags);
|
|
|
|
|
|
|
|
/* 'priv' might be null in some race conditions (?) */
|
|
|
|
|
|
|
|
if (pstate)
|
|
|
|
{
|
|
|
|
/* If the network device has gone down, then we will have terminate
|
|
|
|
* the wait now with an error.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ((flags & NETDEV_DOWN) != 0)
|
|
|
|
{
|
|
|
|
/* Terminate the transfer with an error. */
|
|
|
|
|
|
|
|
nerr("ERROR: Network is down\n");
|
|
|
|
inet_udp_terminate(pstate, -ENETUNREACH);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If new data is available, then complete the read action. */
|
|
|
|
|
|
|
|
else if ((flags & UDP_NEWDATA) != 0)
|
|
|
|
{
|
|
|
|
/* Copy the data from the packet */
|
|
|
|
|
|
|
|
inet_udp_newdata(dev, pstate);
|
|
|
|
|
|
|
|
/* We are finished. */
|
|
|
|
|
|
|
|
ninfo("UDP done\n");
|
|
|
|
|
|
|
|
/* Save the sender's address in the caller's 'from' location */
|
|
|
|
|
|
|
|
inet_udp_sender(dev, pstate);
|
|
|
|
|
|
|
|
/* Don't allow any further UDP call backs. */
|
|
|
|
|
|
|
|
inet_udp_terminate(pstate, OK);
|
|
|
|
|
|
|
|
/* Indicate that the data has been consumed */
|
|
|
|
|
|
|
|
flags &= ~UDP_NEWDATA;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
#endif /* NET_UDP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_recvfrom_initialize
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Initialize the state structure
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2017-07-12 17:36:05 -06:00
|
|
|
* psock Pointer to the socket structure for the socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* pstate A pointer to the state structure to be initialized
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if defined(NET_UDP_HAVE_STACK) || defined(NET_TCP_HAVE_STACK)
|
|
|
|
static void inet_recvfrom_initialize(FAR struct socket *psock, FAR void *buf,
|
|
|
|
size_t len, FAR struct sockaddr *infrom,
|
|
|
|
FAR socklen_t *fromlen,
|
|
|
|
FAR struct inet_recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
/* Initialize the state structure. */
|
|
|
|
|
|
|
|
memset(pstate, 0, sizeof(struct inet_recvfrom_s));
|
|
|
|
|
|
|
|
/* This semaphore is used for signaling and, hence, should not have
|
|
|
|
* priority inheritance enabled.
|
|
|
|
*/
|
|
|
|
|
2020-01-02 10:49:34 -06:00
|
|
|
nxsem_init(&pstate->ir_sem, 0, 0); /* Doesn't really fail */
|
|
|
|
nxsem_setprotocol(&pstate->ir_sem, SEM_PRIO_NONE);
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
pstate->ir_buflen = len;
|
|
|
|
pstate->ir_buffer = buf;
|
|
|
|
pstate->ir_from = infrom;
|
|
|
|
pstate->ir_fromlen = fromlen;
|
|
|
|
|
|
|
|
/* Set up the start time for the timeout */
|
|
|
|
|
|
|
|
pstate->ir_sock = psock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The only un-initialization that has to be performed is destroying the
|
|
|
|
* semaphore.
|
|
|
|
*/
|
|
|
|
|
2017-10-03 15:35:24 -06:00
|
|
|
#define inet_recvfrom_uninitialize(s) nxsem_destroy(&(s)->ir_sem)
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
#endif /* NET_UDP_HAVE_STACK || NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_recvfrom_result
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Evaluate the result of the recv operations
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2020-01-04 18:37:46 +08:00
|
|
|
* result The result of the net_timedwait operation (may indicate EINTR)
|
2017-07-12 17:36:05 -06:00
|
|
|
* pstate A pointer to the state structure to be initialized
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* The result of the recv operation with errno set appropriately
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if defined(NET_UDP_HAVE_STACK) || defined(NET_TCP_HAVE_STACK)
|
|
|
|
static ssize_t inet_recvfrom_result(int result, struct inet_recvfrom_s *pstate)
|
|
|
|
{
|
2018-06-23 14:09:06 -06:00
|
|
|
/* Check for a error/timeout detected by the event handler. Errors are
|
2017-07-12 17:36:05 -06:00
|
|
|
* signaled by negative errno values for the rcv length
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (pstate->ir_result < 0)
|
|
|
|
{
|
|
|
|
/* This might return EAGAIN on a timeout or ENOTCONN on loss of
|
|
|
|
* connection (TCP only)
|
|
|
|
*/
|
|
|
|
|
|
|
|
return pstate->ir_result;
|
|
|
|
}
|
|
|
|
|
2020-01-04 18:37:46 +08:00
|
|
|
/* If net_timedwait failed, then we were probably reawakened by a signal. In
|
|
|
|
* this case, net_timedwait will have returned negated errno appropriately.
|
2017-07-12 17:36:05 -06:00
|
|
|
*/
|
|
|
|
|
|
|
|
if (result < 0)
|
|
|
|
{
|
2017-09-04 06:55:28 -06:00
|
|
|
return result;
|
2017-07-12 17:36:05 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
return pstate->ir_recvlen;
|
|
|
|
}
|
|
|
|
#endif /* NET_UDP_HAVE_STACK || NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_udp_recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform the recvfrom operation for a UDP SOCK_DGRAM
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2017-07-12 17:36:05 -06:00
|
|
|
* psock Pointer to the socket structure for the SOCK_DRAM socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* from INET address of source (may be NULL)
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters received. On error,
|
|
|
|
* -errno is returned (see recvfrom for list of errnos).
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
static ssize_t inet_udp_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
|
|
|
FAR struct sockaddr *from, FAR socklen_t *fromlen)
|
|
|
|
{
|
|
|
|
FAR struct udp_conn_s *conn = (FAR struct udp_conn_s *)psock->s_conn;
|
|
|
|
FAR struct net_driver_s *dev;
|
|
|
|
struct inet_recvfrom_s state;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Perform the UDP recvfrom() operation */
|
|
|
|
|
2018-06-23 14:09:06 -06:00
|
|
|
/* Initialize the state structure. This is done with the network locked
|
|
|
|
* because we don't want anything to happen until we are ready.
|
2017-07-12 17:36:05 -06:00
|
|
|
*/
|
|
|
|
|
|
|
|
net_lock();
|
|
|
|
inet_recvfrom_initialize(psock, buf, len, from, fromlen, &state);
|
|
|
|
|
net/udp: Resolve race condition in connection-less UDP sockets with read-ahead buffering.
In connection-mode UDP sockets, a remote address is retained in the UDP connection structure. This determines both there send() will send the packets and which packets recv() will accept.
This same mechanism is used for connection-less UDP sendto: A temporary remote address is written into the connection structure to support the sendto() operation. That address persists until the next recvfrom() when it is reset to accept any address.
When UDP read-ahead buffering is enabled, however, that means that the old, invalid remote address can be left in the connection structure for some time. This can cause read-ahead buffer to fail, dropping UDP packets.
Shortening the time between when he remote address is reset (i.e., immediately after the sendto() completes) is not a solution, that does not eliminate the race condition; in only makes it smaller.
With this change, a flag was added to the connection structure to indicate if the UDP socket is in connection mode or if it is connection-less. This change effects only UDP receive operations: The remote address in the UDP connection is always ignored if the UDP socket is not in connection-mode.
No for connection-mode sockets, that remote address behaves as before. But for connection-less sockets, it is only used by sendto().
2018-05-13 09:57:34 -06:00
|
|
|
/* Copy the read-ahead data from the packet */
|
|
|
|
|
2017-07-12 17:36:05 -06:00
|
|
|
inet_udp_readahead(&state);
|
|
|
|
|
|
|
|
/* The default return value is the number of bytes that we just copied
|
|
|
|
* into the user buffer. We will return this if the socket has become
|
|
|
|
* disconnected or if the user request was completely satisfied with
|
|
|
|
* data from the readahead buffers.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = state.ir_recvlen;
|
|
|
|
|
net/udp: Resolve race condition in connection-less UDP sockets with read-ahead buffering.
In connection-mode UDP sockets, a remote address is retained in the UDP connection structure. This determines both there send() will send the packets and which packets recv() will accept.
This same mechanism is used for connection-less UDP sendto: A temporary remote address is written into the connection structure to support the sendto() operation. That address persists until the next recvfrom() when it is reset to accept any address.
When UDP read-ahead buffering is enabled, however, that means that the old, invalid remote address can be left in the connection structure for some time. This can cause read-ahead buffer to fail, dropping UDP packets.
Shortening the time between when he remote address is reset (i.e., immediately after the sendto() completes) is not a solution, that does not eliminate the race condition; in only makes it smaller.
With this change, a flag was added to the connection structure to indicate if the UDP socket is in connection mode or if it is connection-less. This change effects only UDP receive operations: The remote address in the UDP connection is always ignored if the UDP socket is not in connection-mode.
No for connection-mode sockets, that remote address behaves as before. But for connection-less sockets, it is only used by sendto().
2018-05-13 09:57:34 -06:00
|
|
|
/* Handle non-blocking UDP sockets */
|
|
|
|
|
2017-07-12 17:36:05 -06:00
|
|
|
if (_SS_ISNONBLOCK(psock->s_flags))
|
|
|
|
{
|
|
|
|
/* Return the number of bytes read from the read-ahead buffer if
|
|
|
|
* something was received (already in 'ret'); EAGAIN if not.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* Nothing was received */
|
|
|
|
|
|
|
|
ret = -EAGAIN;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* It is okay to block if we need to. If there is space to receive anything
|
|
|
|
* more, then we will wait to receive the data. Otherwise return the number
|
|
|
|
* of bytes read from the read-ahead buffer (already in 'ret').
|
|
|
|
*
|
|
|
|
* NOTE: that inet_udp_readahead() may set state.ir_recvlen == -1.
|
|
|
|
*/
|
|
|
|
|
|
|
|
else if (state.ir_recvlen <= 0)
|
|
|
|
{
|
|
|
|
/* Get the device that will handle the packet transfers. This may be
|
|
|
|
* NULL if the UDP socket is bound to INADDR_ANY. In that case, no
|
|
|
|
* NETDEV_DOWN notifications will be received.
|
|
|
|
*/
|
|
|
|
|
|
|
|
dev = udp_find_laddr_device(conn);
|
|
|
|
|
|
|
|
/* Set up the callback in the connection */
|
|
|
|
|
|
|
|
state.ir_cb = udp_callback_alloc(dev, conn);
|
|
|
|
if (state.ir_cb)
|
|
|
|
{
|
|
|
|
/* Set up the callback in the connection */
|
|
|
|
|
2019-11-24 10:41:11 -06:00
|
|
|
state.ir_cb->flags = (UDP_NEWDATA | NETDEV_DOWN);
|
2017-07-12 17:36:05 -06:00
|
|
|
state.ir_cb->priv = (FAR void *)&state;
|
2017-08-29 14:08:04 -06:00
|
|
|
state.ir_cb->event = inet_udp_eventhandler;
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
/* Wait for either the receive to complete or for an error/timeout
|
2020-01-04 18:37:46 +08:00
|
|
|
* to occur. net_timedwait will also terminate if a signal is
|
2018-06-23 14:09:06 -06:00
|
|
|
* received.
|
2017-07-12 17:36:05 -06:00
|
|
|
*/
|
|
|
|
|
2020-01-04 18:37:46 +08:00
|
|
|
ret = net_timedwait(&state. ir_sem, _SO_TIMEOUT(psock->s_rcvtimeo));
|
2020-01-17 09:26:47 -08:00
|
|
|
if (ret == -ETIMEDOUT)
|
|
|
|
{
|
|
|
|
ret = -EAGAIN;
|
|
|
|
}
|
2017-07-12 17:36:05 -06:00
|
|
|
|
2018-06-23 14:09:06 -06:00
|
|
|
/* Make sure that no further events are processed */
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
udp_callback_free(dev, conn, state.ir_cb);
|
|
|
|
ret = inet_recvfrom_result(ret, &state);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = -EBUSY;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
net_unlock();
|
|
|
|
inet_recvfrom_uninitialize(&state);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif /* NET_UDP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_tcp_recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform the recvfrom operation for a TCP/IP SOCK_STREAM
|
|
|
|
*
|
2018-03-13 09:52:27 -06:00
|
|
|
* Input Parameters:
|
2017-07-12 17:36:05 -06:00
|
|
|
* psock Pointer to the socket structure for the SOCK_DRAM socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* from INET address of source (may be NULL)
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters received. On error,
|
|
|
|
* -errno is returned (see recvfrom for list of errnos).
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
static ssize_t inet_tcp_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
|
|
|
FAR struct sockaddr *from, FAR socklen_t *fromlen)
|
|
|
|
{
|
|
|
|
struct inet_recvfrom_s state;
|
|
|
|
int ret;
|
|
|
|
|
2018-06-23 14:09:06 -06:00
|
|
|
/* Initialize the state structure. This is done with the network locked
|
|
|
|
* because we don't want anything to happen until we are ready.
|
2017-07-12 17:36:05 -06:00
|
|
|
*/
|
|
|
|
|
|
|
|
net_lock();
|
|
|
|
inet_recvfrom_initialize(psock, buf, len, from, fromlen, &state);
|
|
|
|
|
|
|
|
/* Handle any any TCP data already buffered in a read-ahead buffer. NOTE
|
|
|
|
* that there may be read-ahead data to be retrieved even after the
|
|
|
|
* socket has been disconnected.
|
|
|
|
*/
|
|
|
|
|
|
|
|
inet_tcp_readahead(&state);
|
|
|
|
|
|
|
|
/* The default return value is the number of bytes that we just copied
|
|
|
|
* into the user buffer. We will return this if the socket has become
|
|
|
|
* disconnected or if the user request was completely satisfied with
|
|
|
|
* data from the readahead buffers.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = state.ir_recvlen;
|
|
|
|
|
|
|
|
/* Verify that the SOCK_STREAM has been and still is connected */
|
|
|
|
|
|
|
|
if (!_SS_ISCONNECTED(psock->s_flags))
|
|
|
|
{
|
|
|
|
/* Was any data transferred from the readahead buffer after we were
|
|
|
|
* disconnected? If so, then return the number of bytes received. We
|
|
|
|
* will wait to return end disconnection indications the next time that
|
|
|
|
* recvfrom() is called.
|
|
|
|
*
|
|
|
|
* If no data was received (i.e., ret == 0 -- it will not be negative)
|
|
|
|
* and the connection was gracefully closed by the remote peer, then return
|
|
|
|
* success. If ir_recvlen is zero, the caller of recvfrom() will get an
|
|
|
|
* end-of-file indication.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (ret <= 0 && !_SS_ISCLOSED(psock->s_flags))
|
|
|
|
{
|
|
|
|
/* Nothing was previously received from the readahead buffers.
|
|
|
|
* The SOCK_STREAM must be (re-)connected in order to receive any
|
|
|
|
* additional data.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = -ENOTCONN;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* In general, this implementation will not support non-blocking socket
|
|
|
|
* operations... except in a few cases: Here for TCP receive with read-ahead
|
|
|
|
* enabled. If this socket is configured as non-blocking then return EAGAIN
|
|
|
|
* if no data was obtained from the read-ahead buffers.
|
|
|
|
*/
|
|
|
|
|
2020-01-11 11:56:03 +08:00
|
|
|
else if (_SS_ISNONBLOCK(psock->s_flags))
|
2017-07-12 17:36:05 -06:00
|
|
|
{
|
|
|
|
/* Return the number of bytes read from the read-ahead buffer if
|
|
|
|
* something was received (already in 'ret'); EAGAIN if not.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (ret <= 0)
|
|
|
|
{
|
|
|
|
/* Nothing was received */
|
|
|
|
|
|
|
|
ret = -EAGAIN;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* It is okay to block if we need to. If there is space to receive anything
|
|
|
|
* more, then we will wait to receive the data. Otherwise return the number
|
|
|
|
* of bytes read from the read-ahead buffer (already in 'ret').
|
|
|
|
*/
|
|
|
|
|
|
|
|
else
|
|
|
|
|
|
|
|
/* We get here when we we decide that we need to setup the wait for incoming
|
|
|
|
* TCP/IP data. Just a few more conditions to check:
|
|
|
|
*
|
|
|
|
* 1) Make sure thet there is buffer space to receive additional data
|
2020-01-11 11:56:03 +08:00
|
|
|
* (state.ir_buflen > 0). This could be zero, for example, we filled
|
|
|
|
* the user buffer with data from the read-ahead buffers. And
|
|
|
|
* 2) then we not want to wait if we already obtained some data from the
|
|
|
|
* read-ahead buffer. In that case, return now with what we have (don't
|
|
|
|
* want for more because there may be no timeout).
|
2017-07-12 17:36:05 -06:00
|
|
|
*/
|
|
|
|
|
|
|
|
if (state.ir_recvlen == 0 && state.ir_buflen > 0)
|
|
|
|
{
|
|
|
|
FAR struct tcp_conn_s *conn = (FAR struct tcp_conn_s *)psock->s_conn;
|
|
|
|
|
|
|
|
/* Set up the callback in the connection */
|
|
|
|
|
|
|
|
state.ir_cb = tcp_callback_alloc(conn);
|
|
|
|
if (state.ir_cb)
|
|
|
|
{
|
2019-11-24 10:41:11 -06:00
|
|
|
state.ir_cb->flags = (TCP_NEWDATA | TCP_DISCONN_EVENTS);
|
2017-07-12 17:36:05 -06:00
|
|
|
state.ir_cb->priv = (FAR void *)&state;
|
2017-08-29 14:08:04 -06:00
|
|
|
state.ir_cb->event = inet_tcp_eventhandler;
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
/* Wait for either the receive to complete or for an error/timeout
|
2020-01-04 18:37:46 +08:00
|
|
|
* to occur. net_timedwait will also terminate if a signal isi
|
2018-06-23 14:09:06 -06:00
|
|
|
* received.
|
2017-07-12 17:36:05 -06:00
|
|
|
*/
|
|
|
|
|
2020-01-04 18:37:46 +08:00
|
|
|
ret = net_timedwait(&state.ir_sem, _SO_TIMEOUT(psock->s_rcvtimeo));
|
2020-01-17 09:26:47 -08:00
|
|
|
if (ret == -ETIMEDOUT)
|
|
|
|
{
|
|
|
|
ret = -EAGAIN;
|
|
|
|
}
|
2017-07-12 17:36:05 -06:00
|
|
|
|
2018-06-23 14:09:06 -06:00
|
|
|
/* Make sure that no further events are processed */
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
tcp_callback_free(conn, state.ir_cb);
|
|
|
|
ret = inet_recvfrom_result(ret, &state);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = -EBUSY;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
net_unlock();
|
|
|
|
inet_recvfrom_uninitialize(&state);
|
|
|
|
return (ssize_t)ret;
|
|
|
|
}
|
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Implements the socket recvfrom interface for the case of the AF_INET
|
|
|
|
* and AF_INET6 address families. inet_recvfrom() receives messages from
|
|
|
|
* a socket, and may be used to receive data on a socket whether or not it
|
|
|
|
* is connection-oriented.
|
|
|
|
*
|
|
|
|
* If 'from' is not NULL, and the underlying protocol provides the source
|
|
|
|
* address, this source address is filled in. The argument 'fromlen' is
|
|
|
|
* initialized to the size of the buffer associated with from, and
|
|
|
|
* modified on return to indicate the actual size of the address stored
|
|
|
|
* there.
|
|
|
|
*
|
2017-10-23 08:45:12 -06:00
|
|
|
* Input Parameters:
|
2017-07-12 17:36:05 -06:00
|
|
|
* psock A pointer to a NuttX-specific, internal socket structure
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* flags Receive flags
|
|
|
|
* from Address of source (may be NULL)
|
|
|
|
* fromlen The length of the address structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters received. If no data is
|
|
|
|
* available to be received and the peer has performed an orderly shutdown,
|
|
|
|
* recv() will return 0. Otherwise, on errors, a negated errno value is
|
|
|
|
* returned (see recvfrom() for the list of appropriate error values).
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
ssize_t inet_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
|
|
|
int flags, FAR struct sockaddr *from,
|
|
|
|
FAR socklen_t *fromlen)
|
|
|
|
{
|
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
/* If a 'from' address has been provided, verify that it is large
|
|
|
|
* enough to hold this address family.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (from)
|
|
|
|
{
|
|
|
|
socklen_t minlen;
|
|
|
|
|
|
|
|
/* Get the minimum socket length */
|
|
|
|
|
|
|
|
switch (psock->s_domain)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
case PF_INET:
|
|
|
|
{
|
|
|
|
minlen = sizeof(struct sockaddr_in);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
case PF_INET6:
|
|
|
|
{
|
|
|
|
minlen = sizeof(struct sockaddr_in6);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
|
|
|
DEBUGPANIC();
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*fromlen < minlen)
|
|
|
|
{
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-11 12:48:17 -06:00
|
|
|
/* Read from the network interface driver buffer.
|
|
|
|
* Or perform the TCP/IP or UDP recv() operation.
|
|
|
|
*/
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
switch (psock->s_type)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_TCP
|
|
|
|
case SOCK_STREAM:
|
|
|
|
{
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
ret = inet_tcp_recvfrom(psock, buf, len, from, fromlen);
|
|
|
|
#else
|
|
|
|
ret = -ENOSYS;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_TCP */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
|
|
|
case SOCK_DGRAM:
|
|
|
|
{
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
ret = inet_udp_recvfrom(psock, buf, len, from, fromlen);
|
|
|
|
#else
|
|
|
|
ret = -ENOSYS;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
2017-07-13 13:36:18 -06:00
|
|
|
#endif /* CONFIG_NET_UDP */
|
2017-07-12 17:36:05 -06:00
|
|
|
|
|
|
|
default:
|
|
|
|
{
|
|
|
|
nerr("ERROR: Unsupported socket type: %d\n", psock->s_type);
|
|
|
|
ret = -ENOSYS;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NET */
|