2015-01-30 14:28:30 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* net/tcp/tcp_netpoll.c
|
|
|
|
*
|
2018-09-11 18:31:11 +02:00
|
|
|
* Copyright (C) 2008-2009, 2011-2016, 2018 Gregory Nutt. All rights
|
|
|
|
* reserved.
|
2015-01-30 14:28:30 +01:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name NuttX nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <stdint.h>
|
2019-12-31 16:26:14 +01:00
|
|
|
#include <assert.h>
|
2015-01-30 14:28:30 +01:00
|
|
|
#include <poll.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <nuttx/net/net.h>
|
2019-12-31 16:26:14 +01:00
|
|
|
#include <nuttx/semaphore.h>
|
2015-01-30 14:28:30 +01:00
|
|
|
|
2017-08-06 22:48:19 +02:00
|
|
|
#include "devif/devif.h"
|
2018-09-11 20:00:42 +02:00
|
|
|
#include "netdev/netdev.h"
|
2017-08-06 22:48:19 +02:00
|
|
|
#include "socket/socket.h"
|
|
|
|
#include "inet/inet.h"
|
2015-01-30 14:28:30 +01:00
|
|
|
#include "tcp/tcp.h"
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-08-29 22:08:04 +02:00
|
|
|
* Name: tcp_poll_eventhandler
|
2015-01-30 14:28:30 +01:00
|
|
|
*
|
|
|
|
* Description:
|
2017-08-29 20:27:58 +02:00
|
|
|
* This function is called to perform the actual TCP receive operation via
|
|
|
|
* the device interface layer.
|
2015-01-30 14:28:30 +01:00
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-09-02 18:27:03 +02:00
|
|
|
* dev The structure of the network driver that caused the event
|
2015-01-30 14:28:30 +01:00
|
|
|
* conn The connection structure associated with the socket
|
|
|
|
* flags Set of events describing why the callback was invoked
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 23:08:38 +02:00
|
|
|
* The network is locked
|
2015-01-30 14:28:30 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2017-08-29 22:08:04 +02:00
|
|
|
static uint16_t tcp_poll_eventhandler(FAR struct net_driver_s *dev,
|
|
|
|
FAR void *conn,
|
|
|
|
FAR void *pvpriv, uint16_t flags)
|
2015-01-30 14:28:30 +01:00
|
|
|
{
|
|
|
|
FAR struct tcp_poll_s *info = (FAR struct tcp_poll_s *)pvpriv;
|
|
|
|
|
2016-06-20 19:59:15 +02:00
|
|
|
ninfo("flags: %04x\n", flags);
|
2015-01-30 14:28:30 +01:00
|
|
|
|
2017-10-19 19:55:51 +02:00
|
|
|
DEBUGASSERT(info == NULL || (info->psock != NULL && info->fds != NULL));
|
2015-01-30 14:28:30 +01:00
|
|
|
|
|
|
|
/* 'priv' might be null in some race conditions (?) */
|
|
|
|
|
2017-10-19 19:55:51 +02:00
|
|
|
if (info != NULL)
|
2015-01-30 14:28:30 +01:00
|
|
|
{
|
|
|
|
pollevent_t eventset = 0;
|
|
|
|
|
|
|
|
/* Check for data or connection availability events. */
|
|
|
|
|
|
|
|
if ((flags & (TCP_NEWDATA | TCP_BACKLOG)) != 0)
|
|
|
|
{
|
|
|
|
eventset |= POLLIN & info->fds->events;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check for a loss of connection events. */
|
|
|
|
|
2015-05-30 17:12:27 +02:00
|
|
|
if ((flags & TCP_DISCONN_EVENTS) != 0)
|
2015-01-30 14:28:30 +01:00
|
|
|
{
|
2015-05-30 17:12:27 +02:00
|
|
|
/* Mark that the connection has been lost */
|
2015-01-30 14:28:30 +01:00
|
|
|
|
2017-09-01 19:56:48 +02:00
|
|
|
tcp_lost_connection(info->psock, info->cb, flags);
|
2015-01-30 14:28:30 +01:00
|
|
|
eventset |= (POLLERR | POLLHUP);
|
|
|
|
}
|
|
|
|
|
2019-11-25 16:59:50 +01:00
|
|
|
/* A poll is a sign that we are free to send data. */
|
|
|
|
|
2019-12-31 07:44:44 +01:00
|
|
|
else if (psock_tcp_cansend(info->psock) >= 0)
|
2019-11-25 16:59:50 +01:00
|
|
|
{
|
|
|
|
eventset |= (POLLOUT & info->fds->events);
|
|
|
|
}
|
|
|
|
|
2015-09-02 18:09:33 +02:00
|
|
|
/* Awaken the caller of poll() if requested event occurred. */
|
2015-01-30 14:28:30 +01:00
|
|
|
|
2017-08-29 20:27:58 +02:00
|
|
|
if (eventset != 0)
|
2015-01-30 14:28:30 +01:00
|
|
|
{
|
2017-08-29 20:27:58 +02:00
|
|
|
/* Stop further callbacks */
|
|
|
|
|
2017-09-01 19:56:48 +02:00
|
|
|
info->cb->flags = 0;
|
|
|
|
info->cb->priv = NULL;
|
|
|
|
info->cb->event = NULL;
|
2017-08-29 20:27:58 +02:00
|
|
|
|
2015-01-30 14:28:30 +01:00
|
|
|
info->fds->revents |= eventset;
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(info->fds->sem);
|
2015-01-30 14:28:30 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_pollsetup
|
2015-01-30 14:28:30 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Setup to monitor events on one TCP/IP socket
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - The TCP/IP socket of interest
|
|
|
|
* fds - The structure describing the events to be monitored, OR NULL if
|
|
|
|
* this is a request to stop monitoring events.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0: Success; Negated errno on failure
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int tcp_pollsetup(FAR struct socket *psock, FAR struct pollfd *fds)
|
|
|
|
{
|
|
|
|
FAR struct tcp_conn_s *conn = psock->s_conn;
|
|
|
|
FAR struct tcp_poll_s *info;
|
|
|
|
FAR struct devif_callback_s *cb;
|
2020-01-02 15:52:28 +01:00
|
|
|
int ret = OK;
|
2015-01-30 14:28:30 +01:00
|
|
|
|
|
|
|
/* Sanity check */
|
|
|
|
|
2016-06-11 22:14:08 +02:00
|
|
|
#ifdef CONFIG_DEBUG_FEATURES
|
2015-01-30 14:28:30 +01:00
|
|
|
if (!conn || !fds)
|
|
|
|
{
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Some of the following must be atomic */
|
|
|
|
|
2016-12-03 23:28:19 +01:00
|
|
|
net_lock();
|
2015-01-30 14:28:30 +01:00
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
/* Find a container to hold the poll information */
|
|
|
|
|
|
|
|
info = conn->pollinfo;
|
|
|
|
while (info->psock != NULL)
|
|
|
|
{
|
|
|
|
if (++info >= &conn->pollinfo[CONFIG_NET_TCP_NPOLLWAITERS])
|
|
|
|
{
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto errout_with_lock;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-30 14:28:30 +01:00
|
|
|
/* Allocate a TCP/IP callback structure */
|
|
|
|
|
|
|
|
cb = tcp_callback_alloc(conn);
|
|
|
|
if (!cb)
|
|
|
|
{
|
|
|
|
ret = -EBUSY;
|
|
|
|
goto errout_with_lock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize the poll info container */
|
|
|
|
|
|
|
|
info->psock = psock;
|
|
|
|
info->fds = fds;
|
|
|
|
info->cb = cb;
|
|
|
|
|
|
|
|
/* Initialize the callback structure. Save the reference to the info
|
|
|
|
* structure as callback private data so that it will be available during
|
|
|
|
* callback processing.
|
|
|
|
*/
|
|
|
|
|
2019-11-24 17:20:01 +01:00
|
|
|
cb->flags = TCP_DISCONN_EVENTS;
|
2015-01-30 14:28:30 +01:00
|
|
|
cb->priv = (FAR void *)info;
|
2017-08-29 22:08:04 +02:00
|
|
|
cb->event = tcp_poll_eventhandler;
|
2015-01-30 14:28:30 +01:00
|
|
|
|
2019-11-24 17:20:01 +01:00
|
|
|
if ((fds->events & POLLOUT) != 0)
|
|
|
|
{
|
|
|
|
cb->flags |= TCP_POLL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((fds->events & POLLIN) != 0)
|
|
|
|
{
|
|
|
|
cb->flags |= TCP_NEWDATA | TCP_BACKLOG;
|
|
|
|
}
|
|
|
|
|
2015-01-30 14:28:30 +01:00
|
|
|
/* Save the reference in the poll info structure as fds private as well
|
2015-05-30 17:12:27 +02:00
|
|
|
* for use during poll teardown as well.
|
2015-01-30 14:28:30 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
fds->priv = (FAR void *)info;
|
|
|
|
|
|
|
|
/* Check for read data or backlogged connection availability now */
|
|
|
|
|
|
|
|
if (!IOB_QEMPTY(&conn->readahead) || tcp_backlogavailable(conn))
|
|
|
|
{
|
|
|
|
/* Normal data may be read without blocking. */
|
|
|
|
|
|
|
|
fds->revents |= (POLLRDNORM & fds->events);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check for a loss of connection events. We need to be careful here.
|
|
|
|
* There are four possibilities:
|
|
|
|
*
|
|
|
|
* 1) The socket is connected and we are waiting for data availability
|
|
|
|
* events.
|
|
|
|
*
|
|
|
|
* __SS_ISCONNECTED(f) == true
|
|
|
|
* __SS_ISLISTENING(f) == false
|
|
|
|
* __SS_ISCLOSED(f) == false
|
|
|
|
*
|
|
|
|
* Action: Wait for data availability events
|
|
|
|
*
|
|
|
|
* 2) This is a listener socket that was never connected and we are
|
|
|
|
* waiting for connection events.
|
|
|
|
*
|
|
|
|
* __SS_ISCONNECTED(f) == false
|
|
|
|
* __SS_ISLISTENING(f) == true
|
|
|
|
* __SS_ISCLOSED(f) == false
|
|
|
|
*
|
|
|
|
* Action: Wait for connection events
|
|
|
|
*
|
|
|
|
* 3) This socket was previously connected, but the peer has gracefully
|
|
|
|
* closed the connection.
|
|
|
|
*
|
|
|
|
* __SS_ISCONNECTED(f) == false
|
|
|
|
* __SS_ISLISTENING(f) == false
|
|
|
|
* __SS_ISCLOSED(f) == true
|
|
|
|
*
|
|
|
|
* Action: Return with POLLHUP|POLLERR events
|
|
|
|
*
|
|
|
|
* 4) This socket was previously connected, but we lost the connection
|
|
|
|
* due to some exceptional event.
|
|
|
|
*
|
|
|
|
* __SS_ISCONNECTED(f) == false
|
|
|
|
* __SS_ISLISTENING(f) == false
|
|
|
|
* __SS_ISCLOSED(f) == false
|
|
|
|
*
|
|
|
|
* Action: Return with POLLHUP|POLLERR events
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!_SS_ISCONNECTED(psock->s_flags) && !_SS_ISLISTENING(psock->s_flags))
|
|
|
|
{
|
|
|
|
/* We were previously connected but lost the connection either due
|
|
|
|
* to a graceful shutdown by the remote peer or because of some
|
|
|
|
* exceptional event.
|
|
|
|
*/
|
|
|
|
|
|
|
|
fds->revents |= (POLLERR | POLLHUP);
|
|
|
|
}
|
2016-01-22 22:52:14 +01:00
|
|
|
else if (_SS_ISCONNECTED(psock->s_flags) && psock_tcp_cansend(psock) >= 0)
|
|
|
|
{
|
|
|
|
fds->revents |= (POLLWRNORM & fds->events);
|
|
|
|
}
|
2015-01-30 14:28:30 +01:00
|
|
|
|
|
|
|
/* Check if any requested events are already in effect */
|
|
|
|
|
|
|
|
if (fds->revents != 0)
|
|
|
|
{
|
|
|
|
/* Yes.. then signal the poll logic */
|
|
|
|
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(fds->sem);
|
2015-01-30 14:28:30 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
errout_with_lock:
|
2016-12-03 23:28:19 +01:00
|
|
|
net_unlock();
|
2015-01-30 14:28:30 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_pollteardown
|
2015-01-30 14:28:30 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Teardown monitoring of events on an TCP/IP socket
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - The TCP/IP socket of interest
|
|
|
|
* fds - The structure describing the events to be monitored, OR NULL if
|
|
|
|
* this is a request to stop monitoring events.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0: Success; Negated errno on failure
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int tcp_pollteardown(FAR struct socket *psock, FAR struct pollfd *fds)
|
|
|
|
{
|
|
|
|
FAR struct tcp_conn_s *conn = psock->s_conn;
|
|
|
|
FAR struct tcp_poll_s *info;
|
|
|
|
|
|
|
|
/* Sanity check */
|
|
|
|
|
2016-06-11 22:14:08 +02:00
|
|
|
#ifdef CONFIG_DEBUG_FEATURES
|
2015-01-30 14:28:30 +01:00
|
|
|
if (!conn || !fds->priv)
|
|
|
|
{
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Recover the socket descriptor poll state info from the poll structure */
|
|
|
|
|
|
|
|
info = (FAR struct tcp_poll_s *)fds->priv;
|
2018-09-11 20:00:42 +02:00
|
|
|
DEBUGASSERT(info != NULL && info->fds != NULL && info->cb != NULL);
|
|
|
|
if (info != NULL)
|
2015-01-30 14:28:30 +01:00
|
|
|
{
|
|
|
|
/* Release the callback */
|
|
|
|
|
|
|
|
tcp_callback_free(conn, info->cb);
|
|
|
|
|
|
|
|
/* Release the poll/select data slot */
|
|
|
|
|
|
|
|
info->fds->priv = NULL;
|
|
|
|
|
|
|
|
/* Then free the poll info container */
|
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
info->psock = NULL;
|
2015-01-30 14:28:30 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return OK;
|
|
|
|
}
|