2017-03-31 16:58:14 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* net/usrsock/usrsock_sendto.c
|
|
|
|
*
|
|
|
|
* Copyright (C) 2015, 2017 Haltian Ltd. All rights reserved.
|
|
|
|
* Author: Jussi Kivilinna <jussi.kivilinna@haltian.com>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name NuttX nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
#if defined(CONFIG_NET) && defined(CONFIG_NET_USRSOCK)
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <arch/irq.h>
|
|
|
|
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
#include <nuttx/net/usrsock.h>
|
|
|
|
|
|
|
|
#include "usrsock/usrsock.h"
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static uint16_t sendto_event(FAR struct net_driver_s *dev, FAR void *pvconn,
|
|
|
|
FAR void *pvpriv, uint16_t flags)
|
|
|
|
{
|
|
|
|
FAR struct usrsock_reqstate_s *pstate = pvpriv;
|
|
|
|
FAR struct usrsock_conn_s *conn = pvconn;
|
|
|
|
|
|
|
|
if (flags & USRSOCK_EVENT_ABORT)
|
|
|
|
{
|
|
|
|
ninfo("socket aborted.\n");
|
|
|
|
|
|
|
|
pstate->result = -ECONNABORTED;
|
|
|
|
|
|
|
|
/* Stop further callbacks */
|
|
|
|
|
|
|
|
pstate->cb->flags = 0;
|
|
|
|
pstate->cb->priv = NULL;
|
|
|
|
pstate->cb->event = NULL;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&pstate->recvsem);
|
2017-03-31 16:58:14 +02:00
|
|
|
}
|
|
|
|
else if (flags & USRSOCK_EVENT_REQ_COMPLETE)
|
|
|
|
{
|
|
|
|
ninfo("request completed.\n");
|
|
|
|
|
|
|
|
pstate->result = conn->resp.result;
|
|
|
|
|
|
|
|
if (pstate->result >= 0 || pstate->result == -EAGAIN)
|
|
|
|
{
|
|
|
|
/* After reception of data, mark input not ready. Daemon will
|
2019-03-11 19:48:17 +01:00
|
|
|
* send event to restore this flag.
|
|
|
|
*/
|
2017-03-31 16:58:14 +02:00
|
|
|
|
|
|
|
conn->flags &= ~USRSOCK_EVENT_SENDTO_READY;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Stop further callbacks */
|
|
|
|
|
|
|
|
pstate->cb->flags = 0;
|
|
|
|
pstate->cb->priv = NULL;
|
|
|
|
pstate->cb->event = NULL;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&pstate->recvsem);
|
2017-03-31 16:58:14 +02:00
|
|
|
}
|
|
|
|
else if (flags & USRSOCK_EVENT_REMOTE_CLOSED)
|
|
|
|
{
|
|
|
|
ninfo("remote closed.\n");
|
|
|
|
|
|
|
|
pstate->result = -EPIPE;
|
|
|
|
|
|
|
|
/* Stop further callbacks */
|
|
|
|
|
|
|
|
pstate->cb->flags = 0;
|
|
|
|
pstate->cb->priv = NULL;
|
|
|
|
pstate->cb->event = NULL;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&pstate->recvsem);
|
2017-03-31 16:58:14 +02:00
|
|
|
}
|
|
|
|
else if (flags & USRSOCK_EVENT_SENDTO_READY)
|
|
|
|
{
|
|
|
|
ninfo("sendto ready.\n");
|
|
|
|
|
|
|
|
/* Do not let other waiters to claim new data. */
|
|
|
|
|
|
|
|
flags &= ~USRSOCK_EVENT_SENDTO_READY;
|
|
|
|
|
|
|
|
/* Stop further callbacks */
|
|
|
|
|
|
|
|
pstate->cb->flags = 0;
|
|
|
|
pstate->cb->priv = NULL;
|
|
|
|
pstate->cb->event = NULL;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&pstate->recvsem);
|
2017-03-31 16:58:14 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: do_sendto_request
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int do_sendto_request(FAR struct usrsock_conn_s *conn,
|
|
|
|
FAR const void *buf, size_t buflen,
|
|
|
|
FAR const struct sockaddr *addr,
|
2020-07-22 10:20:32 +02:00
|
|
|
socklen_t addrlen, int32_t flags)
|
2017-03-31 16:58:14 +02:00
|
|
|
{
|
2019-03-11 19:48:17 +01:00
|
|
|
struct usrsock_request_sendto_s req =
|
|
|
|
{
|
|
|
|
};
|
2019-10-25 19:31:42 +02:00
|
|
|
|
2017-03-31 16:58:14 +02:00
|
|
|
struct iovec bufs[3];
|
|
|
|
|
|
|
|
if (addrlen > UINT16_MAX)
|
|
|
|
{
|
|
|
|
addrlen = UINT16_MAX;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (buflen > UINT16_MAX)
|
|
|
|
{
|
|
|
|
buflen = UINT16_MAX;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Prepare request for daemon to read. */
|
|
|
|
|
|
|
|
req.head.reqid = USRSOCK_REQUEST_SENDTO;
|
|
|
|
req.usockid = conn->usockid;
|
2020-07-22 10:20:32 +02:00
|
|
|
req.flags = flags;
|
2017-03-31 16:58:14 +02:00
|
|
|
req.addrlen = addrlen;
|
|
|
|
req.buflen = buflen;
|
|
|
|
|
|
|
|
bufs[0].iov_base = (FAR void *)&req;
|
|
|
|
bufs[0].iov_len = sizeof(req);
|
|
|
|
bufs[1].iov_base = (FAR void *)addr;
|
|
|
|
bufs[1].iov_len = addrlen;
|
|
|
|
bufs[2].iov_base = (FAR void *)buf;
|
|
|
|
bufs[2].iov_len = buflen;
|
|
|
|
|
|
|
|
return usrsockdev_do_request(conn, bufs, ARRAY_SIZE(bufs));
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: usrsock_sendto
|
2017-03-31 16:58:14 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* If sendto() is used on a connection-mode (SOCK_STREAM, SOCK_SEQPACKET)
|
|
|
|
* socket, the parameters to and 'tolen' are ignored (and the error EISCONN
|
|
|
|
* may be returned when they are not NULL and 0), and the error ENOTCONN is
|
|
|
|
* returned when the socket was not actually connected.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2020-12-13 14:58:02 +01:00
|
|
|
* psock A reference to the socket structure of the socket
|
2017-03-31 16:58:14 +02:00
|
|
|
* buf Data to send
|
|
|
|
* len Length of data to send
|
2017-07-31 17:33:59 +02:00
|
|
|
* flags Send flags (ignored)
|
2017-03-31 16:58:14 +02:00
|
|
|
* to Address of recipient
|
|
|
|
* tolen The length of the address structure
|
|
|
|
*
|
2020-12-13 14:58:02 +01:00
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On any failure, a
|
|
|
|
* negated errno value is returned.
|
|
|
|
*
|
2017-03-31 16:58:14 +02:00
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
ssize_t usrsock_sendto(FAR struct socket *psock, FAR const void *buf,
|
2017-07-31 17:33:59 +02:00
|
|
|
size_t len, int flags, FAR const struct sockaddr *to,
|
2017-03-31 16:58:14 +02:00
|
|
|
socklen_t tolen)
|
|
|
|
{
|
|
|
|
FAR struct usrsock_conn_s *conn = psock->s_conn;
|
2019-03-11 19:48:17 +01:00
|
|
|
struct usrsock_reqstate_s state =
|
|
|
|
{
|
|
|
|
};
|
2019-10-25 19:31:42 +02:00
|
|
|
|
2017-03-31 16:58:14 +02:00
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
DEBUGASSERT(conn);
|
|
|
|
|
|
|
|
net_lock();
|
|
|
|
|
|
|
|
if (conn->state == USRSOCK_CONN_STATE_UNINITIALIZED ||
|
|
|
|
conn->state == USRSOCK_CONN_STATE_ABORTED)
|
|
|
|
{
|
|
|
|
/* Invalid state or closed by daemon. */
|
|
|
|
|
2020-09-21 13:43:39 +02:00
|
|
|
ninfo("usockid=%d; sendto() with uninitialized usrsock.\n",
|
2017-03-31 16:58:14 +02:00
|
|
|
conn->usockid);
|
|
|
|
|
2019-03-11 19:48:17 +01:00
|
|
|
ret = (conn->state == USRSOCK_CONN_STATE_ABORTED) ? -EPIPE :
|
|
|
|
-ECONNRESET;
|
2017-03-31 16:58:14 +02:00
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->type == SOCK_STREAM || conn->type == SOCK_SEQPACKET)
|
|
|
|
{
|
|
|
|
if (!conn->connected)
|
|
|
|
{
|
|
|
|
if (conn->state == USRSOCK_CONN_STATE_CONNECTING)
|
|
|
|
{
|
|
|
|
/* Connecting. */
|
|
|
|
|
|
|
|
ninfo("usockid=%d; socket still connecting.\n",
|
|
|
|
conn->usockid);
|
|
|
|
|
|
|
|
ret = -EAGAIN;
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Not connected. */
|
|
|
|
|
|
|
|
ret = -ENOTCONN;
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (to || tolen)
|
|
|
|
{
|
|
|
|
/* Address provided for connection-mode socket */
|
|
|
|
|
|
|
|
ret = -EISCONN;
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->state == USRSOCK_CONN_STATE_CONNECTING)
|
|
|
|
{
|
|
|
|
/* Non-blocking connecting. */
|
|
|
|
|
|
|
|
ninfo("usockid=%d; socket still connecting.\n", conn->usockid);
|
|
|
|
|
|
|
|
ret = -EAGAIN;
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
do
|
|
|
|
{
|
|
|
|
/* Check if remote end has closed connection. */
|
|
|
|
|
|
|
|
if (conn->flags & USRSOCK_EVENT_REMOTE_CLOSED)
|
|
|
|
{
|
|
|
|
ninfo("usockid=%d; remote closed.\n", conn->usockid);
|
|
|
|
|
|
|
|
ret = -EPIPE;
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if need to wait for send to become ready. */
|
|
|
|
|
|
|
|
if (!(conn->flags & USRSOCK_EVENT_SENDTO_READY))
|
|
|
|
{
|
2020-02-19 19:21:28 +01:00
|
|
|
if (_SS_ISNONBLOCK(psock->s_flags) || (flags & MSG_DONTWAIT) != 0)
|
2017-03-31 16:58:14 +02:00
|
|
|
{
|
|
|
|
/* Send busy at daemon side. */
|
|
|
|
|
|
|
|
ret = -EAGAIN;
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Wait send to become ready. */
|
|
|
|
|
|
|
|
ret = usrsock_setup_request_callback(conn, &state, sendto_event,
|
|
|
|
USRSOCK_EVENT_ABORT |
|
|
|
|
USRSOCK_EVENT_SENDTO_READY |
|
|
|
|
USRSOCK_EVENT_REMOTE_CLOSED);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
nwarn("usrsock_setup_request_callback failed: %d\n", ret);
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Wait for send-ready (or abort, or timeout, or signal). */
|
|
|
|
|
2020-01-04 11:37:46 +01:00
|
|
|
ret = net_timedwait(&state.recvsem,
|
|
|
|
_SO_TIMEOUT(psock->s_sndtimeo));
|
2017-09-04 14:55:28 +02:00
|
|
|
if (ret < 0)
|
2017-03-31 16:58:14 +02:00
|
|
|
{
|
2017-09-04 14:55:28 +02:00
|
|
|
if (ret == -ETIMEDOUT)
|
2017-03-31 16:58:14 +02:00
|
|
|
{
|
|
|
|
ninfo("sendto timedout\n");
|
|
|
|
|
|
|
|
ret = -EAGAIN;
|
|
|
|
}
|
2017-09-04 14:55:28 +02:00
|
|
|
else if (ret == -EINTR)
|
2017-03-31 16:58:14 +02:00
|
|
|
{
|
|
|
|
ninfo("sendto interrupted\n");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
nerr("net_timedwait errno: %d\n", ret);
|
|
|
|
DEBUGASSERT(false);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
usrsock_teardown_request_callback(&state);
|
|
|
|
|
|
|
|
/* Did wait timeout or got signal? */
|
|
|
|
|
|
|
|
if (ret != 0)
|
|
|
|
{
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Was socket aborted? */
|
|
|
|
|
|
|
|
if (conn->state == USRSOCK_CONN_STATE_ABORTED)
|
|
|
|
{
|
|
|
|
ret = -EPIPE;
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Did remote disconnect? */
|
|
|
|
|
|
|
|
if (conn->flags & USRSOCK_EVENT_REMOTE_CLOSED)
|
|
|
|
{
|
|
|
|
ret = -EPIPE;
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
DEBUGASSERT(conn->flags & USRSOCK_EVENT_SENDTO_READY);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set up event callback for usrsock. */
|
|
|
|
|
|
|
|
ret = usrsock_setup_request_callback(conn, &state, sendto_event,
|
|
|
|
USRSOCK_EVENT_ABORT |
|
|
|
|
USRSOCK_EVENT_REQ_COMPLETE);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
nwarn("usrsock_setup_request_callback failed: %d\n", ret);
|
|
|
|
goto errout_unlock;
|
|
|
|
}
|
|
|
|
|
2020-07-22 10:20:32 +02:00
|
|
|
/* MSG_DONTWAIT is only use in usrsock. */
|
|
|
|
|
|
|
|
flags &= ~MSG_DONTWAIT;
|
|
|
|
|
2017-03-31 16:58:14 +02:00
|
|
|
/* Request user-space daemon to close socket. */
|
|
|
|
|
2020-07-22 10:20:32 +02:00
|
|
|
ret = do_sendto_request(conn, buf, len, to, tolen, flags);
|
2017-03-31 16:58:14 +02:00
|
|
|
if (ret >= 0)
|
|
|
|
{
|
|
|
|
/* Wait for completion of request. */
|
|
|
|
|
2020-01-02 17:49:34 +01:00
|
|
|
net_lockedwait_uninterruptible(&state.recvsem);
|
2017-03-31 16:58:14 +02:00
|
|
|
ret = state.result;
|
|
|
|
|
|
|
|
DEBUGASSERT(ret <= (ssize_t)len);
|
|
|
|
}
|
|
|
|
|
|
|
|
usrsock_teardown_request_callback(&state);
|
|
|
|
}
|
|
|
|
while (ret == -EAGAIN);
|
|
|
|
|
|
|
|
errout_unlock:
|
|
|
|
net_unlock();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NET && CONFIG_NET_USRSOCK */
|