2017-07-12 23:07:32 +02:00
|
|
|
/****************************************************************************
|
2017-08-06 22:48:19 +02:00
|
|
|
* net/inet/inet_sockif.c
|
2017-07-12 23:07:32 +02:00
|
|
|
*
|
net/udp: Resolve race condition in connection-less UDP sockets with read-ahead buffering.
In connection-mode UDP sockets, a remote address is retained in the UDP connection structure. This determines both there send() will send the packets and which packets recv() will accept.
This same mechanism is used for connection-less UDP sendto: A temporary remote address is written into the connection structure to support the sendto() operation. That address persists until the next recvfrom() when it is reset to accept any address.
When UDP read-ahead buffering is enabled, however, that means that the old, invalid remote address can be left in the connection structure for some time. This can cause read-ahead buffer to fail, dropping UDP packets.
Shortening the time between when he remote address is reset (i.e., immediately after the sendto() completes) is not a solution, that does not eliminate the race condition; in only makes it smaller.
With this change, a flag was added to the connection structure to indicate if the UDP socket is in connection mode or if it is connection-less. This change effects only UDP receive operations: The remote address in the UDP connection is always ignored if the UDP socket is not in connection-mode.
No for connection-mode sockets, that remote address behaves as before. But for connection-less sockets, it is only used by sendto().
2018-05-13 17:57:34 +02:00
|
|
|
* Copyright (C) 2017-2018 Gregory Nutt. All rights reserved.
|
2017-07-12 23:07:32 +02:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name NuttX nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
2017-07-14 18:57:38 +02:00
|
|
|
#include <stdbool.h>
|
2017-07-12 23:07:32 +02:00
|
|
|
#include <assert.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
|
|
|
|
#include "tcp/tcp.h"
|
|
|
|
#include "udp/udp.h"
|
2017-10-23 16:45:12 +02:00
|
|
|
#include "icmp/icmp.h"
|
2017-10-24 19:23:08 +02:00
|
|
|
#include "icmpv6/icmpv6.h"
|
2017-07-16 21:05:41 +02:00
|
|
|
#include "sixlowpan/sixlowpan.h"
|
2017-07-12 23:07:32 +02:00
|
|
|
#include "socket/socket.h"
|
2017-08-06 22:48:19 +02:00
|
|
|
#include "inet/inet.h"
|
2017-07-12 23:07:32 +02:00
|
|
|
|
2017-07-14 23:24:18 +02:00
|
|
|
#ifdef HAVE_INET_SOCKETS
|
2017-07-12 23:07:32 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Function Prototypes
|
|
|
|
****************************************************************************/
|
|
|
|
|
2017-07-13 21:36:18 +02:00
|
|
|
static int inet_setup(FAR struct socket *psock, int protocol);
|
|
|
|
static sockcaps_t inet_sockcaps(FAR struct socket *psock);
|
|
|
|
static void inet_addref(FAR struct socket *psock);
|
|
|
|
static int inet_bind(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr, socklen_t addrlen);
|
2017-07-14 17:04:19 +02:00
|
|
|
static int inet_getsockname(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr, FAR socklen_t *addrlen);
|
2018-07-19 15:16:30 +02:00
|
|
|
static int inet_getpeername(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr, FAR socklen_t *addrlen);
|
2017-07-13 21:36:18 +02:00
|
|
|
static int inet_listen(FAR struct socket *psock, int backlog);
|
2017-08-29 17:25:22 +02:00
|
|
|
static int inet_connect(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr, socklen_t addrlen);
|
2017-07-13 21:36:18 +02:00
|
|
|
static int inet_accept(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr, FAR socklen_t *addrlen,
|
|
|
|
FAR struct socket *newsock);
|
2017-07-14 18:57:38 +02:00
|
|
|
#ifndef CONFIG_DISABLE_POLL
|
|
|
|
static int inet_poll(FAR struct socket *psock,
|
|
|
|
FAR struct pollfd *fds, bool setup);
|
|
|
|
#endif
|
2017-07-13 21:36:18 +02:00
|
|
|
static ssize_t inet_send(FAR struct socket *psock, FAR const void *buf,
|
|
|
|
size_t len, int flags);
|
|
|
|
static ssize_t inet_sendto(FAR struct socket *psock, FAR const void *buf,
|
|
|
|
size_t len, int flags, FAR const struct sockaddr *to,
|
|
|
|
socklen_t tolen);
|
2017-08-29 17:25:22 +02:00
|
|
|
#ifdef CONFIG_NET_SENDFILE
|
|
|
|
static ssize_t inet_sendfile(FAR struct socket *psock, FAR struct file *infile,
|
|
|
|
FAR off_t *offset, size_t count);
|
|
|
|
#endif
|
2017-07-12 23:07:32 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
2017-10-23 16:45:12 +02:00
|
|
|
* Private Data
|
2017-07-12 23:07:32 +02:00
|
|
|
****************************************************************************/
|
|
|
|
|
2017-10-23 16:45:12 +02:00
|
|
|
static const struct sock_intf_s g_inet_sockif =
|
2017-07-12 23:07:32 +02:00
|
|
|
{
|
2017-07-14 17:04:19 +02:00
|
|
|
inet_setup, /* si_setup */
|
|
|
|
inet_sockcaps, /* si_sockcaps */
|
|
|
|
inet_addref, /* si_addref */
|
|
|
|
inet_bind, /* si_bind */
|
|
|
|
inet_getsockname, /* si_getsockname */
|
2018-07-19 15:16:30 +02:00
|
|
|
inet_getpeername, /* si_getpeername */
|
2017-07-14 17:04:19 +02:00
|
|
|
inet_listen, /* si_listen */
|
|
|
|
inet_connect, /* si_connect */
|
|
|
|
inet_accept, /* si_accept */
|
2017-07-14 18:57:38 +02:00
|
|
|
#ifndef CONFIG_DISABLE_POLL
|
|
|
|
inet_poll, /* si_poll */
|
|
|
|
#endif
|
2017-07-14 17:04:19 +02:00
|
|
|
inet_send, /* si_send */
|
|
|
|
inet_sendto, /* si_sendto */
|
2017-07-14 18:57:38 +02:00
|
|
|
#ifdef CONFIG_NET_SENDFILE
|
|
|
|
inet_sendfile, /* si_sendfile */
|
|
|
|
#endif
|
2017-07-14 17:04:19 +02:00
|
|
|
inet_recvfrom, /* si_recvfrom */
|
|
|
|
inet_close /* si_close */
|
2017-07-12 23:07:32 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_tcp_alloc
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Allocate and attach a TCP connection structure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
static int inet_tcp_alloc(FAR struct socket *psock)
|
|
|
|
{
|
|
|
|
/* Allocate the TCP connection structure */
|
|
|
|
|
|
|
|
FAR struct tcp_conn_s *conn = tcp_alloc(psock->s_domain);
|
|
|
|
if (conn == NULL)
|
|
|
|
{
|
|
|
|
/* Failed to reserve a connection structure */
|
|
|
|
|
|
|
|
nerr("ERROR: Failed to reserve TCP connection structure\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set the reference count on the connection structure. This reference
|
|
|
|
* count will be incremented only if the socket is dup'ed
|
|
|
|
*/
|
|
|
|
|
|
|
|
DEBUGASSERT(conn->crefs == 0);
|
|
|
|
conn->crefs = 1;
|
|
|
|
|
|
|
|
/* Save the pre-allocated connection in the socket structure */
|
|
|
|
|
|
|
|
psock->s_conn = conn;
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_udp_alloc
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Allocate and attach a UDP connection structure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
static int inet_udp_alloc(FAR struct socket *psock)
|
|
|
|
{
|
|
|
|
/* Allocate the UDP connection structure */
|
|
|
|
|
|
|
|
FAR struct udp_conn_s *conn = udp_alloc(psock->s_domain);
|
|
|
|
if (conn == NULL)
|
|
|
|
{
|
|
|
|
/* Failed to reserve a connection structure */
|
|
|
|
|
|
|
|
nerr("ERROR: Failed to reserve UDP connection structure\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set the reference count on the connection structure. This reference
|
|
|
|
* count will be incremented only if the socket is dup'ed
|
|
|
|
*/
|
|
|
|
|
|
|
|
DEBUGASSERT(conn->crefs == 0);
|
|
|
|
conn->crefs = 1;
|
|
|
|
|
|
|
|
/* Save the pre-allocated connection in the socket structure */
|
|
|
|
|
|
|
|
psock->s_conn = conn;
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
#endif /* NET_UDP_HAVE_STACK */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_setup
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Called for socket() to verify that the provided socket type and
|
|
|
|
* protocol are usable by this address family. Perform any family-
|
|
|
|
* specific socket fields.
|
|
|
|
*
|
|
|
|
* NOTE: This is common logic for both the AF_INET and AF_INET6 address
|
|
|
|
* families.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-12 23:07:32 +02:00
|
|
|
* psock A pointer to a user allocated socket structure to be initialized.
|
|
|
|
* protocol (see sys/socket.h)
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Zero (OK) is returned on success. Otherwise, a negater errno value is
|
|
|
|
* returned.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int inet_setup(FAR struct socket *psock, int protocol)
|
|
|
|
{
|
|
|
|
/* Allocate the appropriate connection structure. This reserves the
|
|
|
|
* the connection structure is is unallocated at this point. It will
|
|
|
|
* not actually be initialized until the socket is connected.
|
|
|
|
*
|
2018-06-23 14:20:25 +02:00
|
|
|
* REVISIT: Only SOCK_STREAM and SOCK_DGRAM are supported.
|
2017-07-12 23:07:32 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
switch (psock->s_type)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_TCP
|
|
|
|
case SOCK_STREAM:
|
|
|
|
if (protocol != 0 && protocol != IPPROTO_TCP)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Unsupported stream protocol: %d\n", protocol);
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
/* Allocate and attach the TCP connection structure */
|
|
|
|
|
|
|
|
return inet_tcp_alloc(psock);
|
|
|
|
#else
|
2017-07-14 23:24:18 +02:00
|
|
|
nwarn("WARNING: SOCK_STREAM disabled\n");
|
|
|
|
return -ENETDOWN;
|
2017-07-12 23:07:32 +02:00
|
|
|
#endif
|
|
|
|
#endif /* CONFIG_NET_TCP */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
|
|
|
case SOCK_DGRAM:
|
|
|
|
if (protocol != 0 && protocol != IPPROTO_UDP)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Unsupported datagram protocol: %d\n", protocol);
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
/* Allocate and attach the UDP connection structure */
|
|
|
|
|
|
|
|
return inet_udp_alloc(psock);
|
|
|
|
#else
|
2017-07-14 23:24:18 +02:00
|
|
|
nwarn("WARNING: SOCK_DGRAM disabled\n");
|
2017-07-12 23:07:32 +02:00
|
|
|
return -ENETDOWN;
|
|
|
|
#endif
|
|
|
|
#endif /* CONFIG_NET_UDP */
|
|
|
|
|
|
|
|
default:
|
|
|
|
nerr("ERROR: Unsupported type: %d\n", psock->s_type);
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-13 21:36:18 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_sockcaps
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Return the bit encoded capabilities of this socket.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-13 21:36:18 +02:00
|
|
|
* psock - Socket structure of the socket whose capabilities are being
|
|
|
|
* queried.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* The non-negative set of socket cababilities is returned.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static sockcaps_t inet_sockcaps(FAR struct socket *psock)
|
|
|
|
{
|
|
|
|
switch (psock->s_type)
|
|
|
|
{
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
case SOCK_STREAM:
|
2018-01-24 13:50:20 +01:00
|
|
|
/* REVISIT: Non-blocking recv() depends on CONFIG_NET_TCP_READAHEAD,
|
|
|
|
* but non-blocking send() depends on CONFIG_NET_TCP_WRITE_BUFFERS.
|
|
|
|
*/
|
|
|
|
|
2017-07-13 21:36:18 +02:00
|
|
|
#ifdef CONFIG_NET_TCP_READAHEAD
|
|
|
|
return SOCKCAP_NONBLOCKING;
|
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
case SOCK_DGRAM:
|
2018-01-24 13:50:20 +01:00
|
|
|
/* REVISIT: Non-blocking recvfrom() depends on CONFIG_NET_UDP_READAHEAD,
|
|
|
|
* but non-blocking sendto() depends on CONFIG_NET_UDP_WRITE_BUFFERS.
|
|
|
|
*/
|
|
|
|
|
2017-07-13 21:36:18 +02:00
|
|
|
#ifdef CONFIG_NET_UDP_READAHEAD
|
|
|
|
return SOCKCAP_NONBLOCKING;
|
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_addref
|
|
|
|
*
|
|
|
|
* Description:
|
2017-07-31 17:33:59 +02:00
|
|
|
* Increment the reference count on the underlying connection structure.
|
2017-07-13 21:36:18 +02:00
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-13 21:36:18 +02:00
|
|
|
* psock - Socket structure of the socket whose reference count will be
|
|
|
|
* incremented.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static void inet_addref(FAR struct socket *psock)
|
|
|
|
{
|
|
|
|
DEBUGASSERT(psock != NULL && psock->s_conn != NULL);
|
|
|
|
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
if (psock->s_type == SOCK_STREAM)
|
|
|
|
{
|
|
|
|
FAR struct tcp_conn_s *conn = psock->s_conn;
|
|
|
|
DEBUGASSERT(conn->crefs > 0 && conn->crefs < 255);
|
|
|
|
conn->crefs++;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
if (psock->s_type == SOCK_DGRAM)
|
|
|
|
{
|
|
|
|
FAR struct udp_conn_s *conn = psock->s_conn;
|
|
|
|
DEBUGASSERT(conn->crefs > 0 && conn->crefs < 255);
|
|
|
|
conn->crefs++;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
nerr("ERROR: Unsupported type: %d\n", psock->s_type);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-13 17:27:56 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_bind
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* inet_bind() gives the socket 'psock' the local address 'addr'. 'addr'
|
|
|
|
* is 'addrlen' bytes long. Traditionally, this is called "assigning a
|
|
|
|
* name to a socket." When a socket is created with socket(), it exists
|
|
|
|
* in a name space (address family) but has no name assigned.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-13 17:27:56 +02:00
|
|
|
* psock Socket structure of the socket to bind
|
|
|
|
* addr Socket local address
|
|
|
|
* addrlen Length of 'addr'
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0 on success; A negated errno value is returned on failure. See
|
|
|
|
* bind() for a list a appropriate error values.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int inet_bind(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr, socklen_t addrlen)
|
|
|
|
{
|
|
|
|
int minlen;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Verify that a valid address has been provided */
|
|
|
|
|
|
|
|
switch (addr->sa_family)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
case AF_INET:
|
|
|
|
minlen = sizeof(struct sockaddr_in);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
case AF_INET6:
|
|
|
|
minlen = sizeof(struct sockaddr_in6);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
|
|
|
nerr("ERROR: Unrecognized address family: %d\n", addr->sa_family);
|
|
|
|
return -EAFNOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (addrlen < minlen)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Invalid address length: %d < %d\n", addrlen, minlen);
|
|
|
|
return -EBADF;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Perform the binding depending on the protocol type */
|
|
|
|
|
|
|
|
switch (psock->s_type)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_TCP
|
|
|
|
case SOCK_STREAM:
|
|
|
|
{
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
/* Bind a TCP/IP stream socket. */
|
|
|
|
|
|
|
|
ret = tcp_bind(psock->s_conn, addr);
|
|
|
|
|
|
|
|
/* Mark the socket bound */
|
|
|
|
|
|
|
|
if (ret >= 0)
|
|
|
|
{
|
|
|
|
psock->s_flags |= _SF_BOUND;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
nwarn("WARNING: TCP/IP stack is not available in this configuration\n");
|
|
|
|
return -ENOSYS;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_TCP */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
|
|
|
case SOCK_DGRAM:
|
|
|
|
{
|
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
/* Bind a UDP/IP datagram socket */
|
|
|
|
|
|
|
|
ret = udp_bind(psock->s_conn, addr);
|
|
|
|
|
|
|
|
/* Mark the socket bound */
|
|
|
|
|
|
|
|
if (ret >= 0)
|
|
|
|
{
|
|
|
|
psock->s_flags |= _SF_BOUND;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
nwarn("WARNING: UDP stack is not available in this configuration\n");
|
|
|
|
ret = -ENOSYS;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_UDP */
|
|
|
|
|
|
|
|
default:
|
|
|
|
nerr("ERROR: Unsupported socket type: %d\n", psock->s_type);
|
|
|
|
ret = -EBADF;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-07-14 17:04:19 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_getsockname
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The inet_getsockname() function retrieves the locally-bound name of
|
|
|
|
* the specified INET socket, stores this address in the sockaddr
|
|
|
|
* structure pointed to by the 'addr' argument, and stores the length of
|
|
|
|
* this address in the object pointed to by the 'addrlen' argument.
|
|
|
|
*
|
|
|
|
* If the actual length of the address is greater than the length of the
|
|
|
|
* supplied sockaddr structure, the stored address will be truncated.
|
|
|
|
*
|
|
|
|
* If the socket has not been bound to a local name, the value stored in
|
|
|
|
* the object pointed to by address is unspecified.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-14 17:04:19 +02:00
|
|
|
* psock Socket structure of the socket to be queried
|
|
|
|
* addr sockaddr structure to receive data [out]
|
|
|
|
* addrlen Length of sockaddr structure [in/out]
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, 0 is returned, the 'addr' argument points to the address
|
|
|
|
* of the socket, and the 'addrlen' argument points to the length of the
|
|
|
|
* address. Otherwise, a negated errno value is returned. See
|
|
|
|
* getsockname() for the list of appropriate error numbers.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int inet_getsockname(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr,
|
|
|
|
FAR socklen_t *addrlen)
|
|
|
|
{
|
|
|
|
/* Handle by address domain */
|
|
|
|
|
|
|
|
switch (psock->s_domain)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
case PF_INET:
|
|
|
|
return ipv4_getsockname(psock, addr, addrlen);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
case PF_INET6:
|
|
|
|
return ipv6_getsockname(psock, addr, addrlen);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -EAFNOSUPPORT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-19 15:16:30 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_getpeername
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The inet_getpeername() function retrieves the remote-connected name of
|
|
|
|
* the specified INET socket, stores this address in the sockaddr
|
|
|
|
* structure pointed to by the 'addr' argument, and stores the length of
|
|
|
|
* this address in the object pointed to by the 'addrlen' argument.
|
|
|
|
*
|
|
|
|
* If the actual length of the address is greater than the length of the
|
|
|
|
* supplied sockaddr structure, the stored address will be truncated.
|
|
|
|
*
|
|
|
|
* If the socket has not been bound to a local name, the value stored in
|
|
|
|
* the object pointed to by address is unspecified.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* psock Socket structure of the socket to be queried
|
|
|
|
* addr sockaddr structure to receive data [out]
|
|
|
|
* addrlen Length of sockaddr structure [in/out]
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, 0 is returned, the 'addr' argument points to the address
|
|
|
|
* of the socket, and the 'addrlen' argument points to the length of the
|
|
|
|
* address. Otherwise, a negated errno value is returned. See
|
|
|
|
* getpeername() for the list of appropriate error numbers.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int inet_getpeername(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr,
|
|
|
|
FAR socklen_t *addrlen)
|
|
|
|
{
|
|
|
|
/* Handle by address domain */
|
|
|
|
|
|
|
|
switch (psock->s_domain)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
case PF_INET:
|
|
|
|
return ipv4_getpeername(psock, addr, addrlen);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
case PF_INET6:
|
|
|
|
return ipv6_getpeername(psock, addr, addrlen);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -EAFNOSUPPORT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-13 19:15:00 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_listen
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* To accept connections, a socket is first created with psock_socket(), a
|
|
|
|
* willingness to accept incoming connections and a queue limit for
|
|
|
|
* incoming connections are specified with psock_listen(), and then the
|
|
|
|
* connections are accepted with psock_accept(). For the case of AFINET
|
|
|
|
* and AFINET6 sockets, psock_listen() calls this function. The
|
|
|
|
* psock_listen() call applies only to sockets of type SOCK_STREAM or
|
|
|
|
* SOCK_SEQPACKET.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-13 19:15:00 +02:00
|
|
|
* psock Reference to an internal, boound socket structure.
|
|
|
|
* backlog The maximum length the queue of pending connections may grow.
|
|
|
|
* If a connection request arrives with the queue full, the client
|
|
|
|
* may receive an error with an indication of ECONNREFUSED or,
|
|
|
|
* if the underlying protocol supports retransmission, the request
|
|
|
|
* may be ignored so that retries succeed.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, zero is returned. On error, a negated errno value is
|
|
|
|
* returned. See list() for the set of appropriate error values.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int inet_listen(FAR struct socket *psock, int backlog)
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_NET_TCP) && defined(NET_TCP_HAVE_STACK)
|
|
|
|
FAR struct tcp_conn_s *conn;
|
|
|
|
int ret;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Verify that the sockfd corresponds to a connected SOCK_STREAM */
|
|
|
|
|
|
|
|
if (psock->s_type != SOCK_STREAM)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Unsupported socket type: %d\n",
|
|
|
|
psock->s_type);
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
conn = (FAR struct tcp_conn_s *)psock->s_conn;
|
|
|
|
|
|
|
|
if (conn->lport <= 0)
|
|
|
|
{
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCPBACKLOG
|
|
|
|
/* Set up the backlog for this connection */
|
|
|
|
|
|
|
|
ret = tcp_backlogcreate(conn, backlog);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
nerr("ERROR: tcp_backlogcreate failed: %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Start listening to the bound port. This enables callbacks when
|
|
|
|
* accept() is called and enables poll()/select() logic.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = tcp_listen(conn);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
nerr("ERROR: tcp_listen failed: %d\n", ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
#else
|
|
|
|
nwarn("WARNING: Stream socket support not available\n");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|
|
|
|
#else
|
|
|
|
nwarn("WARNING: Stream socket support not enabled\n");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
#endif /* CONFIG_NET_TCP */
|
|
|
|
}
|
|
|
|
|
2017-08-29 17:25:22 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_connect
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* inet_connect() connects the local socket referred to by the structure
|
|
|
|
* 'psock' to the address specified by 'addr'. The addrlen argument
|
|
|
|
* specifies the size of 'addr'. The format of the address in 'addr' is
|
|
|
|
* determined by the address space of the socket 'psock'.
|
|
|
|
*
|
|
|
|
* If the socket 'psock' is of type SOCK_DGRAM then 'addr' is the address
|
|
|
|
* to which datagrams are sent by default, and the only address from which
|
|
|
|
* datagrams are received. If the socket is of type SOCK_STREAM or
|
|
|
|
* SOCK_SEQPACKET, this call attempts to make a connection to the socket
|
|
|
|
* that is bound to the address specified by 'addr'.
|
|
|
|
*
|
|
|
|
* Generally, connection-based protocol sockets may successfully
|
|
|
|
* inet_connect() only once; connectionless protocol sockets may use
|
|
|
|
* inet_connect() multiple times to change their association.
|
|
|
|
* Connectionless sockets may dissolve the association by connecting to
|
|
|
|
* an address with the sa_family member of sockaddr set to AF_UNSPEC.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-09-13 21:04:26 +02:00
|
|
|
* psock - Pointer to a socket structure initialized by psock_socket()
|
|
|
|
* addr - Server address (form depends on type of socket). The upper
|
|
|
|
* socket layer has verified that this address is non-NULL.
|
|
|
|
* addrlen - Length of actual 'addr'
|
2017-08-29 17:25:22 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0 on success; a negated errno value on failue. See connect() for the
|
|
|
|
* list of appropriate errno values to be returned.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int inet_connect(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr, socklen_t addrlen)
|
|
|
|
{
|
|
|
|
FAR const struct sockaddr_in *inaddr = (FAR const struct sockaddr_in *)addr;
|
|
|
|
|
|
|
|
/* Verify that a valid address has been provided */
|
|
|
|
|
|
|
|
switch (inaddr->sin_family)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
case AF_INET:
|
|
|
|
{
|
|
|
|
if (addrlen < sizeof(struct sockaddr_in))
|
|
|
|
{
|
|
|
|
return -EBADF;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
case AF_INET6:
|
|
|
|
{
|
|
|
|
if (addrlen < sizeof(struct sockaddr_in6))
|
|
|
|
{
|
|
|
|
return -EBADF;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
|
|
|
DEBUGPANIC();
|
|
|
|
return -EAFNOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Perform the connection depending on the protocol type */
|
|
|
|
|
|
|
|
switch (psock->s_type)
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_NET_TCP) && defined(NET_TCP_HAVE_STACK)
|
|
|
|
case SOCK_STREAM:
|
|
|
|
{
|
|
|
|
/* Verify that the socket is not already connected */
|
|
|
|
|
|
|
|
if (_SS_ISCONNECTED(psock->s_flags))
|
|
|
|
{
|
|
|
|
return -EISCONN;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* It's not ... Connect the TCP/IP socket */
|
|
|
|
|
|
|
|
return psock_tcp_connect(psock, addr);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_TCP */
|
|
|
|
|
|
|
|
#if defined(CONFIG_NET_UDP) && defined(NET_UDP_HAVE_STACK)
|
|
|
|
case SOCK_DGRAM:
|
|
|
|
{
|
net/udp: Resolve race condition in connection-less UDP sockets with read-ahead buffering.
In connection-mode UDP sockets, a remote address is retained in the UDP connection structure. This determines both there send() will send the packets and which packets recv() will accept.
This same mechanism is used for connection-less UDP sendto: A temporary remote address is written into the connection structure to support the sendto() operation. That address persists until the next recvfrom() when it is reset to accept any address.
When UDP read-ahead buffering is enabled, however, that means that the old, invalid remote address can be left in the connection structure for some time. This can cause read-ahead buffer to fail, dropping UDP packets.
Shortening the time between when he remote address is reset (i.e., immediately after the sendto() completes) is not a solution, that does not eliminate the race condition; in only makes it smaller.
With this change, a flag was added to the connection structure to indicate if the UDP socket is in connection mode or if it is connection-less. This change effects only UDP receive operations: The remote address in the UDP connection is always ignored if the UDP socket is not in connection-mode.
No for connection-mode sockets, that remote address behaves as before. But for connection-less sockets, it is only used by sendto().
2018-05-13 17:57:34 +02:00
|
|
|
FAR struct udp_conn_s *conn;
|
2018-04-25 16:43:38 +02:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* We will accept connecting to a addr == NULL for disconnection.
|
|
|
|
* However, the correct way is to disconnect is to provide an
|
|
|
|
* address with sa_family == AF_UNSPEC.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (addr != NULL && addr->sa_family == AF_UNSPEC)
|
|
|
|
{
|
|
|
|
addr = NULL;
|
|
|
|
}
|
|
|
|
|
2018-04-25 18:13:59 +02:00
|
|
|
/* Perform the connect/disconnect operation */
|
2018-04-25 16:43:38 +02:00
|
|
|
|
net/udp: Resolve race condition in connection-less UDP sockets with read-ahead buffering.
In connection-mode UDP sockets, a remote address is retained in the UDP connection structure. This determines both there send() will send the packets and which packets recv() will accept.
This same mechanism is used for connection-less UDP sendto: A temporary remote address is written into the connection structure to support the sendto() operation. That address persists until the next recvfrom() when it is reset to accept any address.
When UDP read-ahead buffering is enabled, however, that means that the old, invalid remote address can be left in the connection structure for some time. This can cause read-ahead buffer to fail, dropping UDP packets.
Shortening the time between when he remote address is reset (i.e., immediately after the sendto() completes) is not a solution, that does not eliminate the race condition; in only makes it smaller.
With this change, a flag was added to the connection structure to indicate if the UDP socket is in connection mode or if it is connection-less. This change effects only UDP receive operations: The remote address in the UDP connection is always ignored if the UDP socket is not in connection-mode.
No for connection-mode sockets, that remote address behaves as before. But for connection-less sockets, it is only used by sendto().
2018-05-13 17:57:34 +02:00
|
|
|
conn = (FAR struct udp_conn_s *)psock->s_conn;
|
|
|
|
ret = udp_connect(conn, addr);
|
2018-04-25 18:13:59 +02:00
|
|
|
if (ret < 0 || addr == NULL)
|
2017-08-29 17:25:22 +02:00
|
|
|
{
|
2018-04-25 18:13:59 +02:00
|
|
|
/* Failed to connect or explicitly disconnected */
|
|
|
|
|
2017-08-29 17:25:22 +02:00
|
|
|
psock->s_flags &= ~_SF_CONNECTED;
|
net/udp: Resolve race condition in connection-less UDP sockets with read-ahead buffering.
In connection-mode UDP sockets, a remote address is retained in the UDP connection structure. This determines both there send() will send the packets and which packets recv() will accept.
This same mechanism is used for connection-less UDP sendto: A temporary remote address is written into the connection structure to support the sendto() operation. That address persists until the next recvfrom() when it is reset to accept any address.
When UDP read-ahead buffering is enabled, however, that means that the old, invalid remote address can be left in the connection structure for some time. This can cause read-ahead buffer to fail, dropping UDP packets.
Shortening the time between when he remote address is reset (i.e., immediately after the sendto() completes) is not a solution, that does not eliminate the race condition; in only makes it smaller.
With this change, a flag was added to the connection structure to indicate if the UDP socket is in connection mode or if it is connection-less. This change effects only UDP receive operations: The remote address in the UDP connection is always ignored if the UDP socket is not in connection-mode.
No for connection-mode sockets, that remote address behaves as before. But for connection-less sockets, it is only used by sendto().
2018-05-13 17:57:34 +02:00
|
|
|
conn->flags &= ~_UDP_FLAG_CONNECTMODE;
|
2017-08-29 17:25:22 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-04-25 18:13:59 +02:00
|
|
|
/* Successfully connected */
|
|
|
|
|
2017-08-29 17:25:22 +02:00
|
|
|
psock->s_flags |= _SF_CONNECTED;
|
net/udp: Resolve race condition in connection-less UDP sockets with read-ahead buffering.
In connection-mode UDP sockets, a remote address is retained in the UDP connection structure. This determines both there send() will send the packets and which packets recv() will accept.
This same mechanism is used for connection-less UDP sendto: A temporary remote address is written into the connection structure to support the sendto() operation. That address persists until the next recvfrom() when it is reset to accept any address.
When UDP read-ahead buffering is enabled, however, that means that the old, invalid remote address can be left in the connection structure for some time. This can cause read-ahead buffer to fail, dropping UDP packets.
Shortening the time between when he remote address is reset (i.e., immediately after the sendto() completes) is not a solution, that does not eliminate the race condition; in only makes it smaller.
With this change, a flag was added to the connection structure to indicate if the UDP socket is in connection mode or if it is connection-less. This change effects only UDP receive operations: The remote address in the UDP connection is always ignored if the UDP socket is not in connection-mode.
No for connection-mode sockets, that remote address behaves as before. But for connection-less sockets, it is only used by sendto().
2018-05-13 17:57:34 +02:00
|
|
|
conn->flags |= _UDP_FLAG_CONNECTMODE;
|
2017-08-29 17:25:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_UDP */
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -EBADF;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-13 19:15:00 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_accept
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The inet_accept function is used with connection-based socket types
|
|
|
|
* (SOCK_STREAM, SOCK_SEQPACKET and SOCK_RDM). It extracts the first
|
|
|
|
* connection request on the queue of pending connections, creates a new
|
|
|
|
* connected socket with mostly the same properties as 'sockfd', and
|
|
|
|
* allocates a new socket descriptor for the socket, which is returned. The
|
|
|
|
* newly created socket is no longer in the listening state. The original
|
|
|
|
* socket 'sockfd' is unaffected by this call. Per file descriptor flags
|
|
|
|
* are not inherited across an inet_accept.
|
|
|
|
*
|
|
|
|
* The 'sockfd' argument is a socket descriptor that has been created with
|
|
|
|
* socket(), bound to a local address with bind(), and is listening for
|
|
|
|
* connections after a call to listen().
|
|
|
|
*
|
|
|
|
* On return, the 'addr' structure is filled in with the address of the
|
|
|
|
* connecting entity. The 'addrlen' argument initially contains the size
|
|
|
|
* of the structure pointed to by 'addr'; on return it will contain the
|
|
|
|
* actual length of the address returned.
|
|
|
|
*
|
|
|
|
* If no pending connections are present on the queue, and the socket is
|
|
|
|
* not marked as non-blocking, inet_accept blocks the caller until a
|
|
|
|
* connection is present. If the socket is marked non-blocking and no
|
|
|
|
* pending connections are present on the queue, inet_accept returns
|
|
|
|
* EAGAIN.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-13 19:15:00 +02:00
|
|
|
* psock Reference to the listening socket structure
|
|
|
|
* addr Receives the address of the connecting client
|
|
|
|
* addrlen Input: allocated size of 'addr', Return: returned size of 'addr'
|
|
|
|
* newsock Location to return the accepted socket information.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Returns 0 (OK) on success. On failure, it returns a negated errno
|
|
|
|
* value. See accept() for a desrciption of the approriate error value.
|
|
|
|
*
|
2017-08-31 15:23:19 +02:00
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
2017-07-13 19:15:00 +02:00
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int inet_accept(FAR struct socket *psock, FAR struct sockaddr *addr,
|
|
|
|
FAR socklen_t *addrlen, FAR struct socket *newsock)
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_NET_TCP) && defined(NET_TCP_HAVE_STACK)
|
|
|
|
int ret;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Is the socket a stream? */
|
|
|
|
|
|
|
|
if (psock->s_type != SOCK_STREAM)
|
|
|
|
{
|
2017-08-31 15:29:44 +02:00
|
|
|
nerr("ERROR: Inappropriate socket type: %d\n", psock->s_type);
|
2017-07-13 19:15:00 +02:00
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Verify that a valid memory block has been provided to receive the
|
|
|
|
* address
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (addr != NULL)
|
|
|
|
{
|
|
|
|
/* If an address is provided, then the length must also be provided. */
|
|
|
|
|
|
|
|
DEBUGASSERT(addrlen > 0);
|
|
|
|
|
|
|
|
/* A valid length depends on the address domain */
|
|
|
|
|
|
|
|
switch (psock->s_domain)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
case PF_INET:
|
|
|
|
{
|
|
|
|
if (*addrlen < sizeof(struct sockaddr_in))
|
|
|
|
{
|
|
|
|
return -EBADF;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
case PF_INET6:
|
|
|
|
{
|
|
|
|
if (*addrlen < sizeof(struct sockaddr_in6))
|
|
|
|
{
|
|
|
|
return -EBADF;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
default:
|
|
|
|
DEBUGPANIC();
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize the socket structure. */
|
|
|
|
|
|
|
|
newsock->s_domain = psock->s_domain;
|
|
|
|
newsock->s_type = SOCK_STREAM;
|
|
|
|
newsock->s_sockif = psock->s_sockif;
|
|
|
|
|
|
|
|
/* Perform the correct accept operation for this address domain */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
2017-08-31 15:29:44 +02:00
|
|
|
/* Perform the local accept operation (the network locked must be locked
|
|
|
|
* by the caller).
|
|
|
|
*/
|
2017-07-13 19:15:00 +02:00
|
|
|
|
|
|
|
ret = psock_tcp_accept(psock, addr, addrlen, &newsock->s_conn);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
nerr("ERROR: psock_tcp_accept failed: %d\n", ret);
|
2017-08-31 15:29:44 +02:00
|
|
|
return ret;
|
2017-07-13 19:15:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Begin monitoring for TCP connection events on the newly connected
|
|
|
|
* socket
|
|
|
|
*/
|
|
|
|
|
2017-08-29 16:40:13 +02:00
|
|
|
ret = tcp_start_monitor(newsock);
|
2017-07-13 19:15:00 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2017-08-29 16:40:13 +02:00
|
|
|
/* tcp_start_monitor() can only fail on certain race conditions where
|
2017-07-13 19:15:00 +02:00
|
|
|
* the connection was lost just before this function was called. Undo
|
|
|
|
* everything we have done and return a failure.
|
|
|
|
*/
|
|
|
|
|
2017-08-31 15:29:44 +02:00
|
|
|
psock_close(newsock);
|
|
|
|
return ret;
|
2017-07-13 19:15:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return OK;
|
|
|
|
|
|
|
|
#else
|
|
|
|
nwarn("WARNING: SOCK_STREAM not supported in this configuration\n");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|
2017-08-31 15:29:44 +02:00
|
|
|
|
2017-07-13 19:15:00 +02:00
|
|
|
#else
|
|
|
|
nwarn("WARNING: TCP/IP not supported in this configuration\n");
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
#endif /* CONFIG_NET_TCP */
|
|
|
|
}
|
|
|
|
|
2017-07-14 18:57:38 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_pollsetup
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Setup to monitor events on one socket
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - The socket of interest
|
|
|
|
* fds - The structure describing the events to be monitored, OR NULL if
|
|
|
|
* this is a request to stop monitoring events.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0: Success; Negated errno on failure
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if defined(HAVE_TCP_POLL) || defined(HAVE_UDP_POLL)
|
|
|
|
static inline int inet_pollsetup(FAR struct socket *psock,
|
|
|
|
FAR struct pollfd *fds)
|
|
|
|
{
|
|
|
|
#ifdef HAVE_TCP_POLL
|
|
|
|
if (psock->s_type == SOCK_STREAM)
|
|
|
|
{
|
|
|
|
return tcp_pollsetup(psock, fds);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* HAVE_TCP_POLL */
|
|
|
|
#ifdef HAVE_UDP_POLL
|
|
|
|
if (psock->s_type != SOCK_STREAM)
|
|
|
|
{
|
|
|
|
return udp_pollsetup(psock, fds);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* HAVE_UDP_POLL */
|
|
|
|
{
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* HAVE_TCP_POLL || HAVE_UDP_POLL */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_pollteardown
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Teardown monitoring of events on an socket
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - The TCP/IP socket of interest
|
|
|
|
* fds - The structure describing the events to be monitored, OR NULL if
|
|
|
|
* this is a request to stop monitoring events.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0: Success; Negated errno on failure
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if defined(HAVE_TCP_POLL) || defined(HAVE_UDP_POLL)
|
|
|
|
static inline int inet_pollteardown(FAR struct socket *psock,
|
|
|
|
FAR struct pollfd *fds)
|
|
|
|
{
|
|
|
|
#ifdef HAVE_TCP_POLL
|
|
|
|
if (psock->s_type == SOCK_STREAM)
|
|
|
|
{
|
|
|
|
return tcp_pollteardown(psock, fds);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* HAVE_TCP_POLL */
|
|
|
|
#ifdef HAVE_UDP_POLL
|
|
|
|
if (psock->s_type == SOCK_DGRAM)
|
|
|
|
{
|
|
|
|
return udp_pollteardown(psock, fds);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif /* HAVE_UDP_POLL */
|
|
|
|
{
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* HAVE_TCP_POLL || HAVE_UDP_POLL */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_poll
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The standard poll() operation redirects operations on socket descriptors
|
|
|
|
* to net_poll which, indiectly, calls to function.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - An instance of the internal socket structure.
|
|
|
|
* fds - The structure describing the events to be monitored, OR NULL if
|
|
|
|
* this is a request to stop monitoring events.
|
|
|
|
* setup - true: Setup up the poll; false: Teardown the poll
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0: Success; Negated errno on failure
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifndef CONFIG_DISABLE_POLL
|
|
|
|
static int inet_poll(FAR struct socket *psock, FAR struct pollfd *fds,
|
|
|
|
bool setup)
|
|
|
|
{
|
|
|
|
#if defined(HAVE_TCP_POLL) || defined(HAVE_UDP_POLL)
|
|
|
|
|
|
|
|
/* Check if we are setting up or tearing down the poll */
|
|
|
|
|
|
|
|
if (setup)
|
|
|
|
{
|
|
|
|
/* Perform the TCP/IP poll() setup */
|
|
|
|
|
|
|
|
return inet_pollsetup(psock, fds);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Perform the TCP/IP poll() teardown */
|
|
|
|
|
|
|
|
return inet_pollteardown(psock, fds);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
{
|
|
|
|
return -ENOSYS;
|
|
|
|
}
|
|
|
|
#endif /* HAVE_TCP_POLL || !HAVE_UDP_POLL */
|
|
|
|
}
|
|
|
|
#endif /* !CONFIG_DISABLE_POLL */
|
|
|
|
|
2017-07-12 23:07:32 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_send
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The inet_send() call may be used only when the socket is in a connected
|
|
|
|
* state (so that the intended recipient is known).
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-12 23:07:32 +02:00
|
|
|
* psock An instance of the internal socket structure.
|
|
|
|
* buf Data to send
|
|
|
|
* len Length of data to send
|
|
|
|
* flags Send flags
|
|
|
|
*
|
|
|
|
* Returned Value:
|
2017-07-13 01:36:05 +02:00
|
|
|
* On success, returns the number of characters sent. On error, a negated
|
|
|
|
* errno value is returned (see send() for the list of appropriate error
|
|
|
|
* values.
|
2017-07-12 23:07:32 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static ssize_t inet_send(FAR struct socket *psock, FAR const void *buf,
|
|
|
|
size_t len, int flags)
|
|
|
|
{
|
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
switch (psock->s_type)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_TCP
|
|
|
|
case SOCK_STREAM:
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_6LOWPAN
|
|
|
|
/* Try 6LoWPAN TCP packet send */
|
|
|
|
|
|
|
|
ret = psock_6lowpan_tcp_send(psock, buf, len);
|
|
|
|
|
2017-08-08 22:24:12 +02:00
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
2017-07-12 23:07:32 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* TCP/IP packet send */
|
|
|
|
|
|
|
|
ret = psock_tcp_send(psock, buf, len);
|
|
|
|
}
|
2017-08-08 22:24:12 +02:00
|
|
|
#endif /* NET_TCP_HAVE_STACK */
|
2017-07-12 23:07:32 +02:00
|
|
|
#elif defined(NET_TCP_HAVE_STACK)
|
|
|
|
ret = psock_tcp_send(psock, buf, len);
|
|
|
|
#else
|
|
|
|
ret = -ENOSYS;
|
|
|
|
#endif /* CONFIG_NET_6LOWPAN */
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_TCP */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
|
|
|
case SOCK_DGRAM:
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_NET_6LOWPAN)
|
|
|
|
/* Try 6LoWPAN UDP packet send */
|
|
|
|
|
|
|
|
ret = psock_6lowpan_udp_send(psock, buf, len);
|
|
|
|
|
2017-08-08 22:24:12 +02:00
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
2017-07-12 23:07:32 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* UDP/IP packet send */
|
|
|
|
|
|
|
|
ret = psock_udp_send(psock, buf, len);
|
|
|
|
}
|
2017-08-08 22:24:12 +02:00
|
|
|
#endif /* NET_UDP_HAVE_STACK */
|
2017-07-12 23:07:32 +02:00
|
|
|
#elif defined(NET_UDP_HAVE_STACK)
|
|
|
|
/* Only UDP/IP packet send */
|
|
|
|
|
|
|
|
ret = psock_udp_send(psock, buf, len);
|
|
|
|
#else
|
|
|
|
ret = -ENOSYS;
|
|
|
|
#endif /* CONFIG_NET_6LOWPAN */
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_UDP */
|
|
|
|
|
|
|
|
default:
|
|
|
|
{
|
|
|
|
/* EDESTADDRREQ. Signifies that the socket is not connection-mode
|
|
|
|
* and no peer address is set.
|
|
|
|
*/
|
|
|
|
|
|
|
|
nerr("ERROR: Bad socket type: %d\n", psock->s_type);
|
|
|
|
ret = -EDESTADDRREQ;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_sendto
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Implements the sendto() operation for the case of the AF_INET and
|
|
|
|
* AF_INET6 sockets.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-12 23:07:32 +02:00
|
|
|
* psock A pointer to a NuttX-specific, internal socket structure
|
|
|
|
* buf Data to send
|
|
|
|
* len Length of data to send
|
|
|
|
* flags Send flags
|
|
|
|
* to Address of recipient
|
|
|
|
* tolen The length of the address structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
2017-07-13 01:36:05 +02:00
|
|
|
* On success, returns the number of characters sent. On error, a negated
|
|
|
|
* errno value is returned (see send_to() for the list of appropriate error
|
|
|
|
* values.
|
2017-07-12 23:07:32 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static ssize_t inet_sendto(FAR struct socket *psock, FAR const void *buf,
|
|
|
|
size_t len, int flags, FAR const struct sockaddr *to,
|
|
|
|
socklen_t tolen)
|
|
|
|
{
|
|
|
|
socklen_t minlen;
|
|
|
|
ssize_t nsent;
|
|
|
|
|
2017-07-31 17:33:59 +02:00
|
|
|
/* Verify that a valid address has been provided */
|
2017-07-12 23:07:32 +02:00
|
|
|
|
2017-07-31 17:33:59 +02:00
|
|
|
switch (to->sa_family)
|
2017-07-12 23:07:32 +02:00
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
2017-07-31 17:33:59 +02:00
|
|
|
case AF_INET:
|
|
|
|
minlen = sizeof(struct sockaddr_in);
|
|
|
|
break;
|
2017-07-12 23:07:32 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
2017-07-31 17:33:59 +02:00
|
|
|
case AF_INET6:
|
|
|
|
minlen = sizeof(struct sockaddr_in6);
|
|
|
|
break;
|
2017-07-12 23:07:32 +02:00
|
|
|
#endif
|
|
|
|
|
2017-07-31 17:33:59 +02:00
|
|
|
default:
|
|
|
|
nerr("ERROR: Unrecognized address family: %d\n", to->sa_family);
|
|
|
|
return -EAFNOSUPPORT;
|
|
|
|
}
|
2017-07-12 23:07:32 +02:00
|
|
|
|
2017-07-31 17:33:59 +02:00
|
|
|
if (tolen < minlen)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Invalid address length: %d < %d\n", tolen, minlen);
|
|
|
|
return -EBADF;
|
|
|
|
}
|
2017-07-12 23:07:32 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
2017-07-31 17:33:59 +02:00
|
|
|
/* If this is a connected socket, then return EISCONN */
|
2017-07-12 23:07:32 +02:00
|
|
|
|
2017-07-31 17:33:59 +02:00
|
|
|
if (psock->s_type != SOCK_DGRAM)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Connected socket\n");
|
|
|
|
return -EBADF;
|
|
|
|
}
|
2017-07-12 23:07:32 +02:00
|
|
|
|
2017-07-31 17:33:59 +02:00
|
|
|
/* Now handle the INET sendto() operation */
|
2017-07-12 23:07:32 +02:00
|
|
|
|
|
|
|
#if defined(CONFIG_NET_6LOWPAN)
|
2017-07-31 17:33:59 +02:00
|
|
|
/* Try 6LoWPAN UDP packet sendto() */
|
2017-07-12 23:07:32 +02:00
|
|
|
|
2018-01-23 01:32:02 +01:00
|
|
|
nsent = psock_6lowpan_udp_sendto(psock, buf, len, flags, to, minlen);
|
2017-07-12 23:07:32 +02:00
|
|
|
|
2017-08-08 22:24:12 +02:00
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
2017-07-31 17:33:59 +02:00
|
|
|
if (nsent < 0)
|
|
|
|
{
|
|
|
|
/* UDP/IP packet sendto */
|
2017-07-12 23:07:32 +02:00
|
|
|
|
2017-07-31 17:33:59 +02:00
|
|
|
nsent = psock_udp_sendto(psock, buf, len, flags, to, tolen);
|
|
|
|
}
|
2017-08-08 22:24:12 +02:00
|
|
|
#endif /* NET_UDP_HAVE_STACK */
|
2017-07-12 23:07:32 +02:00
|
|
|
#elif defined(NET_UDP_HAVE_STACK)
|
2017-07-31 17:33:59 +02:00
|
|
|
nsent = psock_udp_sendto(psock, buf, len, flags, to, tolen);
|
2017-07-12 23:07:32 +02:00
|
|
|
#else
|
2017-07-31 17:33:59 +02:00
|
|
|
nwarn("WARNING: UDP not available in this configuiration\n");
|
|
|
|
nsent = -ENOSYS;
|
2017-07-12 23:07:32 +02:00
|
|
|
#endif /* CONFIG_NET_6LOWPAN */
|
|
|
|
#else
|
2017-07-31 17:33:59 +02:00
|
|
|
nwarn("WARNING: UDP not enabled in this configuiration\n");
|
|
|
|
nsent = -EISCONN;
|
2017-07-12 23:07:32 +02:00
|
|
|
#endif /* CONFIG_NET_UDP */
|
|
|
|
|
|
|
|
return nsent;
|
|
|
|
}
|
|
|
|
|
2017-08-29 17:25:22 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: inet_sendfile
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The inet_sendfile() call may be used only when the INET socket is in a
|
|
|
|
* connected state (so that the intended recipient is known).
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-08-29 17:25:22 +02:00
|
|
|
* psock An instance of the internal socket structure.
|
|
|
|
* buf Data to send
|
|
|
|
* len Length of data to send
|
|
|
|
* flags Send flags
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error,
|
|
|
|
* a negated errno value is returned. See sendfile() for a list
|
|
|
|
* appropriate error return values.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_SENDFILE
|
|
|
|
static ssize_t inet_sendfile(FAR struct socket *psock,
|
|
|
|
FAR struct file *infile, FAR off_t *offset,
|
|
|
|
size_t count)
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_NET_TCP) && !defined(CONFIG_NET_TCP_NO_STACK)
|
|
|
|
return tcp_sendfile(psock, infile, offset, size_t count);
|
|
|
|
#else
|
|
|
|
return -ENOSYS;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-07-12 23:07:32 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-10-23 16:45:12 +02:00
|
|
|
* Name: inet_sockif
|
2017-07-12 23:07:32 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2017-10-23 16:45:12 +02:00
|
|
|
* Return the socket interface associated with the inet address family.
|
2017-07-12 23:07:32 +02:00
|
|
|
*
|
2017-10-23 16:45:12 +02:00
|
|
|
* Input Parameters:
|
|
|
|
* family - Socket address family
|
|
|
|
* type - Socket type
|
|
|
|
* protocol - Socket protocol
|
2017-07-12 23:07:32 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
2017-10-23 16:45:12 +02:00
|
|
|
* On success, a non-NULL instance of struct sock_intf_s is returned. NULL
|
|
|
|
* is returned only if the address family is not supported.
|
2017-07-12 23:07:32 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2017-10-23 16:45:12 +02:00
|
|
|
FAR const struct sock_intf_s *
|
|
|
|
inet_sockif(sa_family_t family, int type, int protocol)
|
|
|
|
{
|
|
|
|
DEBUGASSERT(family == PF_INET || family == PF_INET6);
|
|
|
|
|
|
|
|
#if defined(HAVE_PFINET_SOCKETS) && defined(CONFIG_NET_ICMP_SOCKET)
|
|
|
|
/* PF_INET, ICMP data gram sockets are a special case of raw sockets */
|
|
|
|
|
|
|
|
if (family == PF_INET && type == SOCK_DGRAM && protocol == IPPROTO_ICMP)
|
|
|
|
{
|
|
|
|
return &g_icmp_sockif;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
2017-10-24 19:23:08 +02:00
|
|
|
#if defined(HAVE_PFINET6_SOCKETS) && defined(CONFIG_NET_ICMPv6_SOCKET)
|
|
|
|
/* PF_INET, ICMP data gram sockets are a special case of raw sockets */
|
|
|
|
|
|
|
|
if (family == PF_INET6 && type == SOCK_DGRAM && protocol == IPPROTO_ICMP6)
|
|
|
|
{
|
|
|
|
return &g_icmpv6_sockif;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
2017-10-23 17:58:11 +02:00
|
|
|
#ifdef NET_UDP_HAVE_STACK
|
|
|
|
if (type == SOCK_DGRAM && (protocol == 0 || protocol == IPPROTO_UDP))
|
2017-10-23 16:45:12 +02:00
|
|
|
{
|
|
|
|
return &g_inet_sockif;
|
|
|
|
}
|
2017-10-23 17:58:11 +02:00
|
|
|
else
|
|
|
|
#endif
|
|
|
|
#ifdef NET_TCP_HAVE_STACK
|
|
|
|
if (type == SOCK_STREAM && (protocol == 0 || protocol == IPPROTO_TCP))
|
|
|
|
{
|
|
|
|
return &g_inet_sockif;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
2017-10-23 16:45:12 +02:00
|
|
|
}
|
|
|
|
|
2017-07-14 23:24:18 +02:00
|
|
|
#endif /* HAVE_INET_SOCKETS */
|