2014-06-21 23:23:39 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* net/tcp/tcp.h
|
|
|
|
*
|
2019-09-01 16:47:01 +02:00
|
|
|
* Copyright (C) 2014-2016, 2018-2019 Gregory Nutt. All rights reserved.
|
2014-06-21 23:23:39 +02:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name NuttX nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifndef _NET_TCP_TCP_H
|
|
|
|
#define _NET_TCP_TCP_H
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
2014-06-24 16:03:44 +02:00
|
|
|
#include <sys/types.h>
|
2014-07-06 20:34:27 +02:00
|
|
|
#include <queue.h>
|
|
|
|
|
2018-03-12 17:59:46 +01:00
|
|
|
#include <nuttx/clock.h>
|
2017-05-09 15:34:59 +02:00
|
|
|
#include <nuttx/mm/iob.h>
|
2014-07-06 20:34:27 +02:00
|
|
|
#include <nuttx/net/ip.h>
|
2014-06-24 16:03:44 +02:00
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_NOTIFIER
|
2018-09-09 23:01:44 +02:00
|
|
|
# include <nuttx/wqueue.h>
|
|
|
|
#endif
|
|
|
|
|
2017-03-31 16:58:14 +02:00
|
|
|
#if defined(CONFIG_NET_TCP) && !defined(CONFIG_NET_TCP_NO_STACK)
|
2014-06-21 23:23:39 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Pre-processor Definitions
|
|
|
|
****************************************************************************/
|
2017-03-31 16:58:14 +02:00
|
|
|
|
|
|
|
#define NET_TCP_HAVE_STACK 1
|
|
|
|
|
2014-06-29 02:36:09 +02:00
|
|
|
/* Allocate a new TCP data callback */
|
|
|
|
|
2015-05-30 19:29:47 +02:00
|
|
|
/* These macros allocate and free callback structures used for receiving
|
|
|
|
* notifications of TCP data-related events.
|
|
|
|
*/
|
|
|
|
|
2017-08-08 22:24:12 +02:00
|
|
|
#define tcp_callback_alloc(conn) \
|
|
|
|
devif_callback_alloc((conn)->dev, &(conn)->list)
|
|
|
|
#define tcp_callback_free(conn,cb) \
|
|
|
|
devif_conn_callback_free((conn)->dev, (cb), &(conn)->list)
|
2015-05-30 19:29:47 +02:00
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
|
|
|
/* TCP write buffer access macros */
|
|
|
|
|
2018-01-23 02:33:14 +01:00
|
|
|
# define TCP_WBSEQNO(wrb) ((wrb)->wb_seqno)
|
|
|
|
# define TCP_WBPKTLEN(wrb) ((wrb)->wb_iob->io_pktlen)
|
|
|
|
# define TCP_WBSENT(wrb) ((wrb)->wb_sent)
|
|
|
|
# define TCP_WBNRTX(wrb) ((wrb)->wb_nrtx)
|
|
|
|
# define TCP_WBIOB(wrb) ((wrb)->wb_iob)
|
|
|
|
# define TCP_WBCOPYOUT(wrb,dest,n) (iob_copyout(dest,(wrb)->wb_iob,(n),0))
|
|
|
|
# define TCP_WBCOPYIN(wrb,src,n) \
|
2019-08-17 00:42:25 +02:00
|
|
|
(iob_copyin((wrb)->wb_iob,src,(n),0,false,\
|
|
|
|
IOBUSER_NET_TCP_WRITEBUFFER))
|
2018-01-23 02:33:14 +01:00
|
|
|
# define TCP_WBTRYCOPYIN(wrb,src,n) \
|
2019-08-17 00:42:25 +02:00
|
|
|
(iob_trycopyin((wrb)->wb_iob,src,(n),0,false,\
|
|
|
|
IOBUSER_NET_TCP_WRITEBUFFER))
|
2014-07-06 20:34:27 +02:00
|
|
|
|
2018-01-23 02:33:14 +01:00
|
|
|
# define TCP_WBTRIM(wrb,n) \
|
2019-08-17 00:42:25 +02:00
|
|
|
do { (wrb)->wb_iob = iob_trimhead((wrb)->wb_iob,(n),\
|
|
|
|
IOBUSER_NET_TCP_WRITEBUFFER); } while (0)
|
2014-07-06 20:34:27 +02:00
|
|
|
|
2016-06-11 22:14:08 +02:00
|
|
|
#ifdef CONFIG_DEBUG_FEATURES
|
2018-01-23 02:33:14 +01:00
|
|
|
# define TCP_WBDUMP(msg,wrb,len,offset) \
|
2014-07-06 20:34:27 +02:00
|
|
|
tcp_wrbuffer_dump(msg,wrb,len,offset)
|
2018-01-22 18:11:23 +01:00
|
|
|
# else
|
2018-01-23 02:33:14 +01:00
|
|
|
# define TCP_WBDUMP(msg,wrb,len,offset)
|
2018-01-22 18:11:23 +01:00
|
|
|
# endif
|
2014-07-06 20:34:27 +02:00
|
|
|
#endif
|
|
|
|
|
2014-06-21 23:23:39 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Public Type Definitions
|
|
|
|
****************************************************************************/
|
2016-02-26 14:35:55 +01:00
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
struct file; /* Forward reference */
|
|
|
|
struct sockaddr; /* Forward reference */
|
|
|
|
struct socket; /* Forward reference */
|
|
|
|
struct pollfd; /* Forward reference */
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/* Representation of a TCP connection.
|
|
|
|
*
|
|
|
|
* The tcp_conn_s structure is used for identifying a connection. All
|
|
|
|
* but one field in the structure are to be considered read-only by an
|
|
|
|
* application. The only exception is the 'private' fields whose purpose
|
|
|
|
* is to let the application store application-specific state (e.g.,
|
|
|
|
* file pointers) for the connection.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct net_driver_s; /* Forward reference */
|
|
|
|
struct devif_callback_s; /* Forward reference */
|
|
|
|
struct tcp_backlog_s; /* Forward reference */
|
2015-01-15 22:06:46 +01:00
|
|
|
struct tcp_hdr_s; /* Forward reference */
|
2014-07-06 20:34:27 +02:00
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
/* This is a container that holds the poll-related information */
|
|
|
|
|
|
|
|
struct tcp_poll_s
|
|
|
|
{
|
|
|
|
FAR struct socket *psock; /* Needed to handle loss of connection */
|
|
|
|
struct pollfd *fds; /* Needed to handle poll events */
|
|
|
|
FAR struct devif_callback_s *cb; /* Needed to teardown the poll */
|
|
|
|
};
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
struct tcp_conn_s
|
|
|
|
{
|
2019-09-01 16:47:01 +02:00
|
|
|
/* Common prologue of all connection structures. */
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
dq_entry_t node; /* Implements a doubly linked list */
|
2019-09-01 16:47:01 +02:00
|
|
|
|
|
|
|
/* TCP callbacks:
|
|
|
|
*
|
|
|
|
* Data transfer events are retained in 'list'. Event handlers in 'list'
|
|
|
|
* are called for events specified in the flags set within struct
|
|
|
|
* devif_callback_s
|
|
|
|
*
|
|
|
|
* When an callback is executed from 'list', the input flags are normally
|
|
|
|
* returned, however, the implementation may set one of the following:
|
|
|
|
*
|
|
|
|
* TCP_CLOSE - Gracefully close the current connection
|
|
|
|
* TCP_ABORT - Abort (reset) the current connection on an error that
|
|
|
|
* prevents TCP_CLOSE from working.
|
|
|
|
*
|
|
|
|
* And/Or set/clear the following:
|
|
|
|
*
|
|
|
|
* TCP_NEWDATA - May be cleared to indicate that the data was consumed
|
|
|
|
* and that no further process of the new data should be
|
|
|
|
* attempted.
|
2019-12-31 07:44:44 +01:00
|
|
|
* TCP_SNDACK - If TCP_NEWDATA is cleared, then TCP_SNDACK may be set to
|
|
|
|
* indicate that an ACK should be included in the response.
|
|
|
|
* (In TCP_NEWDATA is cleared bu TCP_SNDACK is not set,
|
|
|
|
* then dev->d_len should also be cleared).
|
2019-09-01 16:47:01 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
FAR struct devif_callback_s *list;
|
|
|
|
|
|
|
|
/* TCP-specific content follows */
|
|
|
|
|
2015-01-16 17:01:54 +01:00
|
|
|
union ip_binding_u u; /* IP address binding */
|
2014-07-06 20:34:27 +02:00
|
|
|
uint8_t rcvseq[4]; /* The sequence number that we expect to
|
|
|
|
* receive next */
|
|
|
|
uint8_t sndseq[4]; /* The sequence number that was last sent by us */
|
|
|
|
uint8_t crefs; /* Reference counts on this instance */
|
2015-01-17 21:13:56 +01:00
|
|
|
#if defined(CONFIG_NET_IPv4) && defined(CONFIG_NET_IPv6)
|
2016-02-26 13:45:37 +01:00
|
|
|
uint8_t domain; /* IP domain: PF_INET or PF_INET6 */
|
2015-01-17 21:13:56 +01:00
|
|
|
#endif
|
2014-07-06 20:34:27 +02:00
|
|
|
uint8_t sa; /* Retransmission time-out calculation state
|
|
|
|
* variable */
|
|
|
|
uint8_t sv; /* Retransmission time-out calculation state
|
|
|
|
* variable */
|
|
|
|
uint8_t rto; /* Retransmission time-out */
|
|
|
|
uint8_t tcpstateflags; /* TCP state and flags */
|
|
|
|
uint8_t timer; /* The retransmission timer (units: half-seconds) */
|
|
|
|
uint8_t nrtx; /* The number of retransmissions for the last
|
|
|
|
* segment sent */
|
2019-12-08 20:13:51 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_DELAYED_ACK
|
|
|
|
uint8_t rx_unackseg; /* Number of un-ACKed received segments */
|
|
|
|
uint8_t rx_acktimer; /* Time since last ACK sent (units: half-seconds) */
|
|
|
|
#endif
|
2014-07-06 20:34:27 +02:00
|
|
|
uint16_t lport; /* The local TCP port, in network byte order */
|
|
|
|
uint16_t rport; /* The remoteTCP port, in network byte order */
|
|
|
|
uint16_t mss; /* Current maximum segment size for the
|
|
|
|
* connection */
|
|
|
|
uint16_t winsize; /* Current window size of the connection */
|
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
2019-12-08 20:13:51 +01:00
|
|
|
uint32_t tx_unacked; /* Number bytes sent but not yet ACKed */
|
2014-07-06 20:34:27 +02:00
|
|
|
#else
|
2019-12-08 20:13:51 +01:00
|
|
|
uint16_t tx_unacked; /* Number bytes sent but not yet ACKed */
|
2014-07-06 20:34:27 +02:00
|
|
|
#endif
|
|
|
|
|
2015-05-30 17:12:27 +02:00
|
|
|
/* If the TCP socket is bound to a local address, then this is
|
|
|
|
* a reference to the device that routes traffic on the corresponding
|
|
|
|
* network.
|
|
|
|
*/
|
|
|
|
|
|
|
|
FAR struct net_driver_s *dev;
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/* Read-ahead buffering.
|
|
|
|
*
|
|
|
|
* readahead - A singly linked list of type struct iob_qentry_s
|
|
|
|
* where the TCP/IP read-ahead data is retained.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct iob_queue_s readahead; /* Read-ahead buffering */
|
|
|
|
|
2015-05-30 17:12:27 +02:00
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
2014-07-06 20:34:27 +02:00
|
|
|
/* Write buffering
|
|
|
|
*
|
|
|
|
* write_q - The queue of unsent I/O buffers. The head of this
|
|
|
|
* list may be partially sent. FIFO ordering.
|
|
|
|
* unacked_q - A queue of completely sent, but unacked I/O buffer
|
|
|
|
* chains. Sequence number ordering.
|
|
|
|
*/
|
|
|
|
|
|
|
|
sq_queue_t write_q; /* Write buffering for segments */
|
|
|
|
sq_queue_t unacked_q; /* Write buffering for un-ACKed segments */
|
|
|
|
uint16_t expired; /* Number segments retransmitted but not yet ACKed,
|
2014-07-07 00:10:26 +02:00
|
|
|
* it can only be updated at TCP_ESTABLISHED state */
|
2015-05-11 15:14:25 +02:00
|
|
|
uint32_t sent; /* The number of bytes sent (ACKed and un-ACKed) */
|
2014-07-06 20:34:27 +02:00
|
|
|
uint32_t isn; /* Initial sequence number */
|
While working with version 7.10 I discovered a problem in TCP stack that could be observed on high network load. Generally speaking, the problem is that RST flag is set in unnecessary case, in which between loss of some TCP packet and its proper retransmission, another packets had been successfully sent. The scenario is as follows: NuttX did not receive ACK for some sent packet, so it has been probably lost somewhere. But before its retransmission starts, NuttX is correctly issuing next TCP packets, with sequence numbers increasing properly. When the retransmission of previously lost packet finally succeeds, tcp_input receives the accumulated ACK value, which acknowledges also the packets sent in the meantime (i.e. between unsuccessful sending of lost packet and its proper retransmission). However, variable unackseq is still set to conn->isn + conn->sent, which is truth only if no further packets transmission occurred in the meantime. Because of incorrect (in such specific case) unackseq value, few lines further condition if (ackseq <= unackseq)is not met, and, as a result, we are going to reset label.
2016-06-20 14:55:29 +02:00
|
|
|
uint32_t sndseq_max; /* The sequence number of next not-retransmitted
|
|
|
|
* segment (next greater sndseq) */
|
2014-07-06 20:34:27 +02:00
|
|
|
#endif
|
|
|
|
|
2015-05-30 17:12:27 +02:00
|
|
|
#ifdef CONFIG_NET_TCPBACKLOG
|
2014-07-06 20:34:27 +02:00
|
|
|
/* Listen backlog support
|
|
|
|
*
|
|
|
|
* blparent - The backlog parent. If this connection is backlogged,
|
|
|
|
* this field will be non-null and will refer to the TCP connection
|
|
|
|
* structure in which this connection is backlogged.
|
|
|
|
* backlog - The pending connection backlog. If this connection is
|
|
|
|
* configured as a listener with backlog, then this refers to the
|
|
|
|
* struct tcp_backlog_s tear-off structure that manages that backlog.
|
|
|
|
*/
|
|
|
|
|
|
|
|
FAR struct tcp_conn_s *blparent;
|
|
|
|
FAR struct tcp_backlog_s *backlog;
|
|
|
|
#endif
|
|
|
|
|
2018-03-12 17:59:46 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_KEEPALIVE
|
|
|
|
/* There fields manage TCP/IP keep-alive. All times are in units of the
|
|
|
|
* system clock tick.
|
|
|
|
*/
|
|
|
|
|
2018-06-16 20:16:13 +02:00
|
|
|
clock_t keeptime; /* Last time that the TCP socket was known to be
|
2018-03-12 17:59:46 +01:00
|
|
|
* alive (ACK or data received) OR time that the
|
|
|
|
* last probe was sent. */
|
|
|
|
uint16_t keepidle; /* Elapsed idle time before first probe sent (dsec) */
|
|
|
|
uint16_t keepintvl; /* Interval between probes (dsec) */
|
|
|
|
bool keepalive; /* True: KeepAlive enabled; false: disabled */
|
|
|
|
uint8_t keepcnt; /* Number of retries before the socket is closed */
|
|
|
|
uint8_t keepretries; /* Number of retries attempted */
|
|
|
|
#endif
|
|
|
|
|
2017-08-29 18:38:01 +02:00
|
|
|
/* connevents is a list of callbacks for each socket the uses this
|
|
|
|
* connection (there can be more that one in the event that the the socket
|
|
|
|
* was dup'ed). It is used with the network monitor to handle
|
|
|
|
* asynchronous loss-of-connection events.
|
|
|
|
*/
|
|
|
|
|
|
|
|
FAR struct devif_callback_s *connevents;
|
|
|
|
|
2015-05-30 19:29:47 +02:00
|
|
|
/* accept() is called when the TCP logic has created a connection
|
|
|
|
*
|
|
|
|
* accept_private: This is private data that will be available to the
|
|
|
|
* accept() handler when it is invoked with a point to this structure
|
|
|
|
* as an argument.
|
2017-05-11 21:35:56 +02:00
|
|
|
* accept: This is the pointer to the accept handler.
|
2015-05-30 19:29:47 +02:00
|
|
|
*/
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
FAR void *accept_private;
|
2019-12-31 07:44:44 +01:00
|
|
|
int (*accept)(FAR struct tcp_conn_s *listener,
|
|
|
|
FAR struct tcp_conn_s *conn);
|
2019-12-31 16:26:14 +01:00
|
|
|
|
|
|
|
/* The following is a list of poll structures of threads waiting for
|
|
|
|
* socket events.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct tcp_poll_s pollinfo[CONFIG_NET_TCP_NPOLLWAITERS];
|
2014-07-06 20:34:27 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/* This structure supports TCP write buffering */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
|
|
|
struct tcp_wrbuffer_s
|
|
|
|
{
|
|
|
|
sq_entry_t wb_node; /* Supports a singly linked list */
|
|
|
|
uint32_t wb_seqno; /* Sequence number of the write segment */
|
|
|
|
uint16_t wb_sent; /* Number of bytes sent from the I/O buffer chain */
|
|
|
|
uint8_t wb_nrtx; /* The number of retransmissions for the last
|
|
|
|
* segment sent */
|
|
|
|
struct iob_s *wb_iob; /* Head of the I/O buffer chain */
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Support for listen backlog:
|
|
|
|
*
|
|
|
|
* struct tcp_blcontainer_s describes one backlogged connection
|
|
|
|
* struct tcp_backlog_s is a "tear-off" describing all backlog for a
|
|
|
|
* listener connection
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCPBACKLOG
|
|
|
|
struct tcp_blcontainer_s
|
|
|
|
{
|
|
|
|
sq_entry_t bc_node; /* Implements a singly linked list */
|
|
|
|
FAR struct tcp_conn_s *bc_conn; /* Holds reference to the new connection structure */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct tcp_backlog_s
|
|
|
|
{
|
|
|
|
sq_queue_t bl_free; /* Implements a singly-linked list of free containers */
|
|
|
|
sq_queue_t bl_pending; /* Implements a singly-linked list of pending connections */
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2014-06-21 23:23:39 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Public Data
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
# define EXTERN extern "C"
|
|
|
|
extern "C"
|
|
|
|
{
|
|
|
|
#else
|
|
|
|
# define EXTERN extern
|
|
|
|
#endif
|
|
|
|
|
2015-05-31 16:34:03 +02:00
|
|
|
/* List of registered Ethernet device drivers. You must have the network
|
|
|
|
* locked in order to access this list.
|
|
|
|
*
|
|
|
|
* NOTE that this duplicates a declaration in net/netdev/netdev.h
|
2015-05-30 17:12:27 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
EXTERN struct net_driver_s *g_netdevices;
|
|
|
|
|
2014-06-21 23:23:39 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Public Function Prototypes
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
2015-01-15 22:06:46 +01:00
|
|
|
* Name: tcp_initialize
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Initialize the TCP/IP connection structures. Called only once and only
|
2018-06-25 20:41:28 +02:00
|
|
|
* from the network layer at start-up.
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-25 02:12:49 +02:00
|
|
|
void tcp_initialize(void);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
2015-01-15 22:06:46 +01:00
|
|
|
* Name: tcp_alloc
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Find a free TCP/IP connection structure and allocate it
|
|
|
|
* for use. This is normally something done by the implementation of the
|
2018-07-05 18:54:45 +02:00
|
|
|
* socket() API but is also called from the event processing logic when a
|
|
|
|
* TCP packet is received while "listening"
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2015-01-17 20:07:48 +01:00
|
|
|
FAR struct tcp_conn_s *tcp_alloc(uint8_t domain);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
2015-01-15 22:06:46 +01:00
|
|
|
* Name: tcp_free
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Free a connection structure that is no longer in use. This should be
|
|
|
|
* done by the implementation of close()
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
void tcp_free(FAR struct tcp_conn_s *conn);
|
|
|
|
|
|
|
|
/****************************************************************************
|
2015-01-15 22:06:46 +01:00
|
|
|
* Name: tcp_active
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Find a connection structure that is the appropriate
|
|
|
|
* connection to be used with the provided TCP/IP header
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2015-01-15 22:06:46 +01:00
|
|
|
FAR struct tcp_conn_s *tcp_active(FAR struct net_driver_s *dev,
|
|
|
|
FAR struct tcp_hdr_s *tcp);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
2015-01-15 22:06:46 +01:00
|
|
|
* Name: tcp_nextconn
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Traverse the list of active TCP connections
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
FAR struct tcp_conn_s *tcp_nextconn(FAR struct tcp_conn_s *conn);
|
|
|
|
|
2015-05-30 17:12:27 +02:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_local_ipv4_device
|
2015-05-30 17:12:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2015-09-03 03:48:31 +02:00
|
|
|
* Select the network driver to use with the IPv4 TCP transaction based
|
|
|
|
* on the locally bound IPv4 address
|
2015-05-30 17:12:27 +02:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn - TCP connection structure. The locally bound address, laddr,
|
|
|
|
* should be set to a non-zero value in this structure.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Zero (OK) is returned on success. A negated errno value is returned
|
2015-09-03 04:03:28 +02:00
|
|
|
* on failure. -ENETUNREACH is the only expected error value.
|
2015-05-30 17:12:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
2015-09-03 03:48:31 +02:00
|
|
|
int tcp_local_ipv4_device(FAR struct tcp_conn_s *conn);
|
2015-05-30 17:12:27 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_remote_ipv4_device
|
2015-05-30 17:12:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2015-09-03 03:48:31 +02:00
|
|
|
* Select the network driver to use with the IPv4 TCP transaction based
|
|
|
|
* on the remotely connected IPv4 address
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
2020-02-14 15:50:45 +01:00
|
|
|
* conn - TCP connection structure. The remotely connected address, raddr,
|
2015-09-03 03:48:31 +02:00
|
|
|
* should be set to a non-zero value in this structure.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Zero (OK) is returned on success. A negated errno value is returned
|
2015-09-03 04:03:28 +02:00
|
|
|
* on failure. -ENETUNREACH is the only expected error value.
|
2015-09-03 03:48:31 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
int tcp_remote_ipv4_device(FAR struct tcp_conn_s *conn);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_local_ipv6_device
|
2015-09-03 03:48:31 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Select the network driver to use with the IPv6 TCP transaction based
|
|
|
|
* on the locally bound IPv6 address
|
2015-05-30 17:12:27 +02:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn - TCP connection structure. The locally bound address, laddr,
|
|
|
|
* should be set to a non-zero value in this structure.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Zero (OK) is returned on success. A negated errno value is returned
|
|
|
|
* on failure. -EHOSTUNREACH is the only expected error value.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
2015-09-03 03:48:31 +02:00
|
|
|
int tcp_local_ipv6_device(FAR struct tcp_conn_s *conn);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_remote_ipv6_device
|
2015-09-03 03:48:31 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Select the network driver to use with the IPv6 TCP transaction based
|
2018-01-22 18:11:23 +01:00
|
|
|
* on the remotely connected IPv6 address
|
2015-09-03 03:48:31 +02:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn - TCP connection structure. The remotely connected address, raddr,
|
|
|
|
* should be set to a non-zero value in this structure.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Zero (OK) is returned on success. A negated errno value is returned
|
|
|
|
* on failure. -EHOSTUNREACH is the only expected error value.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
int tcp_remote_ipv6_device(FAR struct tcp_conn_s *conn);
|
2015-05-30 17:12:27 +02:00
|
|
|
#endif
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
2015-01-15 22:06:46 +01:00
|
|
|
* Name: tcp_alloc_accept
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called when driver processing matches the incoming packet with a
|
|
|
|
* connection in LISTEN. In that case, this function will create a new
|
|
|
|
* connection and initialize it to send a SYNACK in return.
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-11-15 20:13:23 +01:00
|
|
|
FAR struct tcp_conn_s *tcp_alloc_accept(FAR struct net_driver_s *dev,
|
2015-01-15 22:06:46 +01:00
|
|
|
FAR struct tcp_hdr_s *tcp);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
2015-01-15 22:06:46 +01:00
|
|
|
* Name: tcp_bind
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function implements the lower level parts of the standard TCP
|
|
|
|
* bind() operation.
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* 0 on success or -EADDRINUSE on failure
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* This function is called from normal user level code.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2015-01-18 00:07:54 +01:00
|
|
|
int tcp_bind(FAR struct tcp_conn_s *conn, FAR const struct sockaddr *addr);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_connect
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function implements the lower level parts of the standard
|
|
|
|
* TCP connect() operation: It connects to a remote host using TCP.
|
|
|
|
*
|
|
|
|
* This function is used to start a new connection to the specified
|
|
|
|
* port on the specified host. It uses the connection structure that was
|
|
|
|
* allocated by a preceding socket() call. It sets the connection to
|
|
|
|
* the SYN_SENT state and sets the retransmission timer to 0. This will
|
|
|
|
* cause a TCP SYN segment to be sent out the next time this connection
|
|
|
|
* is periodically processed, which usually is done within 0.5 seconds
|
|
|
|
* after the call to tcp_connect().
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* This function is called from normal user level code.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-31 07:44:44 +01:00
|
|
|
int tcp_connect(FAR struct tcp_conn_s *conn,
|
|
|
|
FAR const struct sockaddr *addr);
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2017-08-29 17:25:22 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: psock_tcp_connect
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform a TCP connection
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2019-12-31 07:44:44 +01:00
|
|
|
* psock - A reference to the structure of the socket to be connected
|
2017-08-29 17:25:22 +02:00
|
|
|
* addr - The address of the remote server to connect to
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 22:08:04 +02:00
|
|
|
* The network is locked
|
2017-08-29 17:25:22 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int psock_tcp_connect(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr);
|
|
|
|
|
2017-08-29 16:40:13 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_start_monitor
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Set up to receive TCP connection state changes for a given socket
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - The socket of interest
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, tcp_start_monitor returns OK; On any failure,
|
|
|
|
* tcp_start_monitor will return a negated errno value. The only failure
|
|
|
|
* that can occur is if the socket has already been closed and, in this
|
|
|
|
* case, -ENOTCONN is returned.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The caller holds the network lock (if not, it will be locked momentarily
|
|
|
|
* by this function).
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int tcp_start_monitor(FAR struct socket *psock);
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_stop_monitor
|
|
|
|
*
|
|
|
|
* Description:
|
2017-08-29 20:27:58 +02:00
|
|
|
* Stop monitoring TCP connection changes for a sockets associated with
|
2018-01-22 18:11:23 +01:00
|
|
|
* a given TCP connection structure.
|
2017-08-29 16:40:13 +02:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn - The TCP connection of interest
|
2017-08-29 20:27:58 +02:00
|
|
|
* flags Set of disconnection events
|
2017-08-29 16:40:13 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The caller holds the network lock (if not, it will be locked momentarily
|
|
|
|
* by this function).
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2017-08-29 20:27:58 +02:00
|
|
|
void tcp_stop_monitor(FAR struct tcp_conn_s *conn, uint16_t flags);
|
2017-08-29 16:40:13 +02:00
|
|
|
|
2017-08-29 21:24:49 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_close_monitor
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* One socket in a group of dup'ed sockets has been closed. We need to
|
|
|
|
* selectively terminate just those things that are waiting of events
|
|
|
|
* from this specific socket. And also recover any resources that are
|
|
|
|
* committed to monitoring this socket.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - The TCP socket structure that is closed
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The caller holds the network lock (if not, it will be locked momentarily
|
|
|
|
* by this function).
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
void tcp_close_monitor(FAR struct socket *psock);
|
|
|
|
|
2017-08-29 16:40:13 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_lost_connection
|
|
|
|
*
|
|
|
|
* Description:
|
2017-08-29 20:27:58 +02:00
|
|
|
* Called when a loss-of-connection event has been detected by network
|
2017-08-29 22:08:04 +02:00
|
|
|
* event handling logic. Perform operations like tcp_stop_monitor but
|
|
|
|
* (1) explicitly mark this socket and (2) disable further callbacks
|
|
|
|
* the event handler.
|
2017-08-29 16:40:13 +02:00
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-08-29 20:27:58 +02:00
|
|
|
* psock - The TCP socket structure associated.
|
|
|
|
* cb - devif callback structure
|
|
|
|
* flags - Set of connection events events
|
2017-08-29 16:40:13 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 20:27:58 +02:00
|
|
|
* The caller holds the network lock (if not, it will be locked momentarily
|
|
|
|
* by this function).
|
2017-08-29 16:40:13 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2017-08-29 20:27:58 +02:00
|
|
|
void tcp_lost_connection(FAR struct socket *psock,
|
|
|
|
FAR struct devif_callback_s *cb, uint16_t flags);
|
2017-08-29 16:40:13 +02:00
|
|
|
|
2020-01-21 07:11:29 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_close
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Break any current TCP connection
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - An instance of the internal socket structure.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from normal user-level logic
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int tcp_close(FAR struct socket *psock);
|
|
|
|
|
2015-01-17 14:42:09 +01:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_ipv4_select
|
2015-01-17 14:42:09 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Configure to send or receive an TCP IPv4 packet
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
void tcp_ipv4_select(FAR struct net_driver_s *dev);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_ipv6_select
|
2015-01-17 14:42:09 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Configure to send or receive an TCP IPv6 packet
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
void tcp_ipv6_select(FAR struct net_driver_s *dev);
|
|
|
|
#endif
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_setsequence
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Set the TCP/IP sequence number
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
2014-06-25 02:12:49 +02:00
|
|
|
|
|
|
|
void tcp_setsequence(FAR uint8_t *seqno, uint32_t value);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_getsequence
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Get the TCP/IP sequence number
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-25 02:12:49 +02:00
|
|
|
uint32_t tcp_getsequence(FAR uint8_t *seqno);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_addsequence
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Add the length to get the next TCP sequence number.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-25 02:12:49 +02:00
|
|
|
uint32_t tcp_addsequence(FAR uint8_t *seqno, uint16_t len);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_initsequence
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Set the (initial) the TCP/IP sequence number when a TCP connection is
|
|
|
|
* established.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-25 02:12:49 +02:00
|
|
|
void tcp_initsequence(FAR uint8_t *seqno);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_nextsequence
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Increment the TCP/IP sequence number
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-25 02:12:49 +02:00
|
|
|
void tcp_nextsequence(void);
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_poll
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Poll a TCP connection structure for availability of TX data
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-07-06 20:34:27 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* conn - The TCP "connection" to poll for TX data
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
void tcp_poll(FAR struct net_driver_s *dev, FAR struct tcp_conn_s *conn);
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_timer
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle a TCP timer expiration for the provided TCP connection
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-07-06 20:34:27 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* conn - The TCP "connection" to poll for TX data
|
While working with version 7.10 I discovered a problem in TCP stack that could be observed on high network load. Generally speaking, the problem is that RST flag is set in unnecessary case, in which between loss of some TCP packet and its proper retransmission, another packets had been successfully sent. The scenario is as follows: NuttX did not receive ACK for some sent packet, so it has been probably lost somewhere. But before its retransmission starts, NuttX is correctly issuing next TCP packets, with sequence numbers increasing properly. When the retransmission of previously lost packet finally succeeds, tcp_input receives the accumulated ACK value, which acknowledges also the packets sent in the meantime (i.e. between unsuccessful sending of lost packet and its proper retransmission). However, variable unackseq is still set to conn->isn + conn->sent, which is truth only if no further packets transmission occurred in the meantime. Because of incorrect (in such specific case) unackseq value, few lines further condition if (ackseq <= unackseq)is not met, and, as a result, we are going to reset label.
2016-06-20 14:55:29 +02:00
|
|
|
* hsec - The polling interval in halves of a second
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
void tcp_timer(FAR struct net_driver_s *dev, FAR struct tcp_conn_s *conn,
|
2014-06-25 02:12:49 +02:00
|
|
|
int hsec);
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_listen_initialize
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Setup the listening data structures
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called early in the initialization phase while the system is still
|
|
|
|
* single-threaded.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
void tcp_listen_initialize(void);
|
|
|
|
|
2017-05-14 18:56:25 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_findlistener
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Return the connection listener for connections on this port (if any)
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 22:08:04 +02:00
|
|
|
* The network is locked
|
2017-05-14 18:56:25 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2017-05-25 09:48:55 +02:00
|
|
|
#if defined(CONFIG_NET_IPv4) && defined(CONFIG_NET_IPv6)
|
|
|
|
FAR struct tcp_conn_s *tcp_findlistener(uint16_t portno, uint8_t domain);
|
|
|
|
#else
|
2017-05-14 18:56:25 +02:00
|
|
|
FAR struct tcp_conn_s *tcp_findlistener(uint16_t portno);
|
2017-05-25 09:48:55 +02:00
|
|
|
#endif
|
2017-05-14 18:56:25 +02:00
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_unlisten
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Stop listening to the port bound to the specified TCP connection
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from normal user code.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int tcp_unlisten(FAR struct tcp_conn_s *conn);
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_listen
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Start listening to the port bound to the specified TCP connection
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from normal user code.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int tcp_listen(FAR struct tcp_conn_s *conn);
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_islistener
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Return true is there is a listener for the specified port
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2017-05-25 09:48:55 +02:00
|
|
|
#if defined(CONFIG_NET_IPv4) && defined(CONFIG_NET_IPv6)
|
|
|
|
bool tcp_islistener(uint16_t portno, uint8_t domain);
|
|
|
|
#else
|
2014-07-06 20:34:27 +02:00
|
|
|
bool tcp_islistener(uint16_t portno);
|
2017-05-25 09:48:55 +02:00
|
|
|
#endif
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_accept_connection
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Accept the new connection for the specified listening port.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
int tcp_accept_connection(FAR struct net_driver_s *dev,
|
2014-06-25 02:12:49 +02:00
|
|
|
FAR struct tcp_conn_s *conn, uint16_t portno);
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_send
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Setup to send a TCP packet
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-07-06 20:34:27 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* conn - The TCP connection structure holding connection information
|
|
|
|
* flags - flags to apply to the TCP header
|
|
|
|
* len - length of the message
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
void tcp_send(FAR struct net_driver_s *dev, FAR struct tcp_conn_s *conn,
|
2014-06-25 02:12:49 +02:00
|
|
|
uint16_t flags, uint16_t len);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
2017-08-29 17:25:22 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_sendfile
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The tcp_sendfile() call may be used only when the INET socket is in a
|
|
|
|
* connected state (so that the intended recipient is known).
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-08-29 17:25:22 +02:00
|
|
|
* psock An instance of the internal socket structure.
|
|
|
|
* buf Data to send
|
|
|
|
* len Length of data to send
|
|
|
|
* flags Send flags
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error,
|
|
|
|
* a negated errno value is returned. See sendfile() for a list
|
|
|
|
* appropriate error return values.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_SENDFILE
|
|
|
|
ssize_t tcp_sendfile(FAR struct socket *psock, FAR struct file *infile,
|
|
|
|
FAR off_t *offset, size_t count);
|
|
|
|
#endif
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_reset
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Send a TCP reset (no-data) message
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-07-06 20:34:27 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
void tcp_reset(FAR struct net_driver_s *dev);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
2019-12-08 20:13:51 +01:00
|
|
|
* Name: tcp_synack
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Send the SYN or SYNACK response.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-07-06 20:34:27 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* conn - The TCP connection structure holding connection information
|
|
|
|
* ack - The ACK response to send
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-08 20:13:51 +01:00
|
|
|
void tcp_synack(FAR struct net_driver_s *dev, FAR struct tcp_conn_s *conn,
|
|
|
|
uint8_t ack);
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_appsend
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle application or TCP protocol response. If this function is called
|
|
|
|
* with dev->d_sndlen > 0, then this is an application attempting to send
|
|
|
|
* packet.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-07-06 20:34:27 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* conn - The TCP connection structure holding connection information
|
|
|
|
* result - App result event sent
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
void tcp_appsend(FAR struct net_driver_s *dev, FAR struct tcp_conn_s *conn,
|
2014-06-25 02:12:49 +02:00
|
|
|
uint16_t result);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_rexmit
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle application retransmission
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-07-06 20:34:27 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* conn - The TCP connection structure holding connection information
|
|
|
|
* result - App result event sent
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
void tcp_rexmit(FAR struct net_driver_s *dev, FAR struct tcp_conn_s *conn,
|
2014-06-25 02:12:49 +02:00
|
|
|
uint16_t result);
|
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
2015-01-15 22:06:46 +01:00
|
|
|
* Name: tcp_ipv4_input
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Handle incoming TCP input with IPv4 header
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-07-06 20:34:27 +02:00
|
|
|
* dev - The device driver structure containing the received TCP packet.
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from the Ethernet driver with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2015-01-15 22:06:46 +01:00
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
void tcp_ipv4_input(FAR struct net_driver_s *dev);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_ipv6_input
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle incoming TCP input with IPv4 header
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2018-11-03 00:50:01 +01:00
|
|
|
* dev - The device driver structure containing the received TCP packet.
|
|
|
|
* iplen - The size of the IPv6 header. This may be larger than
|
|
|
|
* IPv6_HDRLEN the IPv6 header if IPv6 extension headers are
|
|
|
|
* present.
|
2015-01-15 22:06:46 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2015-01-15 22:06:46 +01:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from the Ethernet driver with the network stack locked
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
2018-11-03 00:50:01 +01:00
|
|
|
void tcp_ipv6_input(FAR struct net_driver_s *dev, unsigned int iplen);
|
2015-01-15 22:06:46 +01:00
|
|
|
#endif
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2014-07-06 20:34:27 +02:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_callback
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Inform the application holding the TCP socket of a change in state.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
2014-06-25 02:12:49 +02:00
|
|
|
|
2014-06-28 00:48:12 +02:00
|
|
|
uint16_t tcp_callback(FAR struct net_driver_s *dev,
|
2014-06-25 02:12:49 +02:00
|
|
|
FAR struct tcp_conn_s *conn, uint16_t flags);
|
2014-07-06 20:34:27 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_datahandler
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Handle data that is not accepted by the application. This may be called
|
|
|
|
* either (1) from the data receive logic if it cannot buffer the data, or
|
|
|
|
* (2) from the TCP event logic is there is no listener in place ready to
|
|
|
|
* receive the data.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn - A pointer to the TCP connection structure
|
|
|
|
* buffer - A pointer to the buffer to be copied to the read-ahead
|
|
|
|
* buffers
|
|
|
|
* buflen - The number of bytes to copy to the read-ahead buffer.
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2014-07-06 20:34:27 +02:00
|
|
|
* The number of bytes actually buffered is returned. This will be either
|
|
|
|
* zero or equal to buflen; partial packets are not buffered.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2014-07-07 01:22:02 +02:00
|
|
|
* - The caller has checked that TCP_NEWDATA is set in flags and that is no
|
2014-07-06 20:34:27 +02:00
|
|
|
* other handler available to process the incoming data.
|
2015-01-15 22:06:46 +01:00
|
|
|
* - Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
uint16_t tcp_datahandler(FAR struct tcp_conn_s *conn, FAR uint8_t *buffer,
|
|
|
|
uint16_t nbytes);
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_backlogcreate
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Called from the listen() logic to setup the backlog as specified in the
|
|
|
|
* the listen arguments.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-31 15:23:19 +02:00
|
|
|
* Called from network socket logic. The network may or may not be locked.
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCPBACKLOG
|
|
|
|
int tcp_backlogcreate(FAR struct tcp_conn_s *conn, int nblg);
|
|
|
|
#else
|
|
|
|
# define tcp_backlogcreate(c,n) (-ENOSYS)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_backlogdestroy
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* (1) Called from tcp_free() whenever a connection is freed.
|
|
|
|
* (2) Called from tcp_backlogcreate() to destroy any old backlog
|
|
|
|
*
|
|
|
|
* NOTE: This function may re-enter tcp_free when a connection that
|
|
|
|
* is freed that has pending connections.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-31 15:23:19 +02:00
|
|
|
* Called from network socket logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCPBACKLOG
|
|
|
|
int tcp_backlogdestroy(FAR struct tcp_conn_s *conn);
|
|
|
|
#else
|
|
|
|
# define tcp_backlogdestroy(conn) (-ENOSYS)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_backlogadd
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Called tcp_listen when a new connection is made with a listener socket
|
|
|
|
* but when there is no accept() in place to receive the connection. This
|
|
|
|
* function adds the new connection to the backlog.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCPBACKLOG
|
|
|
|
int tcp_backlogadd(FAR struct tcp_conn_s *conn,
|
|
|
|
FAR struct tcp_conn_s *blconn);
|
|
|
|
#else
|
|
|
|
# define tcp_backlogadd(conn,blconn) (-ENOSYS)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_backlogavailable
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2017-08-29 22:08:04 +02:00
|
|
|
* Called from poll(). Before waiting for a new connection, poll will
|
|
|
|
* call this API to see if there are pending connections in the backlog.
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Assumptions:
|
2020-02-22 19:31:14 +01:00
|
|
|
* The network is locked.
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-05-22 02:57:54 +02:00
|
|
|
#ifdef CONFIG_NET_TCPBACKLOG
|
2014-07-06 20:34:27 +02:00
|
|
|
bool tcp_backlogavailable(FAR struct tcp_conn_s *conn);
|
|
|
|
#else
|
2019-12-31 23:04:39 +01:00
|
|
|
# define tcp_backlogavailable(c) (false)
|
2014-07-06 20:34:27 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_backlogremove
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2017-08-29 22:08:04 +02:00
|
|
|
* Called from accept(). Before waiting for a new connection, accept will
|
|
|
|
* call this API to see if there are pending connections in the backlog.
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Assumptions:
|
2017-08-29 22:08:04 +02:00
|
|
|
* The network is locked.
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCPBACKLOG
|
|
|
|
FAR struct tcp_conn_s *tcp_backlogremove(FAR struct tcp_conn_s *conn);
|
|
|
|
#else
|
|
|
|
# define tcp_backlogremove(c) (NULL)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_backlogdelete
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Called from tcp_free() when a connection is freed that this also
|
|
|
|
* retained in the pending connection list of a listener. We simply need
|
|
|
|
* to remove the defunct connection from the list.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-07-06 20:34:27 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCPBACKLOG
|
|
|
|
int tcp_backlogdelete(FAR struct tcp_conn_s *conn,
|
2014-07-07 01:58:36 +02:00
|
|
|
FAR struct tcp_conn_s *blconn);
|
2014-07-06 20:34:27 +02:00
|
|
|
#else
|
|
|
|
# define tcp_backlogdelete(c,b) (-ENOSYS)
|
2014-06-25 02:12:49 +02:00
|
|
|
#endif
|
|
|
|
|
2015-01-25 22:46:05 +01:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_accept
|
2015-01-25 22:46:05 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function implements accept() for TCP/IP sockets. See the
|
|
|
|
* description of accept() for further information.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2015-01-25 22:46:05 +01:00
|
|
|
* psock The listening TCP socket structure
|
|
|
|
* addr Receives the address of the connecting client
|
2019-12-31 07:44:44 +01:00
|
|
|
* addrlen Input: allocated size of 'addr'
|
|
|
|
* Return: returned size of 'addr'
|
2015-01-25 22:46:05 +01:00
|
|
|
* newconn The new, accepted TCP connection structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Returns zero (OK) on success or a negated errno value on failure.
|
|
|
|
* See the description of accept of the possible errno values in the
|
|
|
|
* description of accept().
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int psock_tcp_accept(FAR struct socket *psock, FAR struct sockaddr *addr,
|
|
|
|
FAR socklen_t *addrlen, FAR void **newconn);
|
|
|
|
|
2020-01-21 08:50:39 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: psock_tcp_recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform the recvfrom operation for a TCP/IP SOCK_STREAM
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
2020-02-19 19:21:28 +01:00
|
|
|
* psock Pointer to the socket structure for the SOCK_DRAM socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* flags Receive flags
|
|
|
|
* from INET address of source (may be NULL)
|
|
|
|
* fromlen The length of the address structure
|
2020-01-21 08:50:39 +01:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters received. On error,
|
|
|
|
* -errno is returned (see recvfrom for list of errnos).
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
ssize_t psock_tcp_recvfrom(FAR struct socket *psock, FAR void *buf,
|
2020-02-19 19:21:28 +01:00
|
|
|
size_t len, int flags, FAR struct sockaddr *from,
|
2020-01-21 08:50:39 +01:00
|
|
|
FAR socklen_t *fromlen);
|
|
|
|
|
2014-06-24 16:03:44 +02:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: psock_tcp_send
|
2014-06-24 16:03:44 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2014-06-25 02:12:49 +02:00
|
|
|
* The psock_tcp_send() call may be used only when the TCP socket is in a
|
2014-06-24 16:03:44 +02:00
|
|
|
* connected state (so that the intended recipient is known).
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2014-06-24 16:03:44 +02:00
|
|
|
* psock An instance of the internal socket structure.
|
|
|
|
* buf Data to send
|
|
|
|
* len Length of data to send
|
2020-02-19 19:21:28 +01:00
|
|
|
* flags Send flags
|
2014-06-24 16:03:44 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error,
|
|
|
|
* -1 is returned, and errno is set appropriately:
|
|
|
|
*
|
|
|
|
* EAGAIN or EWOULDBLOCK
|
|
|
|
* The socket is marked non-blocking and the requested operation
|
|
|
|
* would block.
|
|
|
|
* EBADF
|
|
|
|
* An invalid descriptor was specified.
|
|
|
|
* ECONNRESET
|
|
|
|
* Connection reset by peer.
|
|
|
|
* EDESTADDRREQ
|
|
|
|
* The socket is not connection-mode, and no peer address is set.
|
|
|
|
* EFAULT
|
|
|
|
* An invalid user space address was specified for a parameter.
|
|
|
|
* EINTR
|
|
|
|
* A signal occurred before any data was transmitted.
|
|
|
|
* EINVAL
|
|
|
|
* Invalid argument passed.
|
|
|
|
* EISCONN
|
|
|
|
* The connection-mode socket was connected already but a recipient
|
|
|
|
* was specified. (Now either this error is returned, or the recipient
|
|
|
|
* specification is ignored.)
|
|
|
|
* EMSGSIZE
|
|
|
|
* The socket type requires that message be sent atomically, and the
|
|
|
|
* size of the message to be sent made this impossible.
|
|
|
|
* ENOBUFS
|
|
|
|
* The output queue for a network interface was full. This generally
|
|
|
|
* indicates that the interface has stopped sending, but may be
|
|
|
|
* caused by transient congestion.
|
|
|
|
* ENOMEM
|
|
|
|
* No memory available.
|
|
|
|
* ENOTCONN
|
|
|
|
* The socket is not connected, and no target has been given.
|
|
|
|
* ENOTSOCK
|
|
|
|
* The argument s is not a socket.
|
|
|
|
* EPIPE
|
|
|
|
* The local end has been shut down on a connection oriented socket.
|
|
|
|
* In this case the process will also receive a SIGPIPE unless
|
|
|
|
* MSG_NOSIGNAL is set.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
struct socket;
|
2014-06-25 02:12:49 +02:00
|
|
|
ssize_t psock_tcp_send(FAR struct socket *psock, FAR const void *buf,
|
2020-02-19 19:21:28 +01:00
|
|
|
size_t len, int flags);
|
2014-06-24 16:03:44 +02:00
|
|
|
|
2018-03-12 17:59:46 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_setsockopt
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* tcp_setsockopt() sets the TCP-protocol option specified by the
|
|
|
|
* 'option' argument to the value pointed to by the 'value' argument for
|
|
|
|
* the socket specified by the 'psock' argument.
|
|
|
|
*
|
|
|
|
* See <netinet/tcp.h> for the a complete list of values of TCP protocol
|
|
|
|
* options.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock Socket structure of socket to operate on
|
|
|
|
* option identifies the option to set
|
|
|
|
* value Points to the argument value
|
|
|
|
* value_len The length of the argument value
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Returns zero (OK) on success. On failure, it returns a negated errno
|
|
|
|
* value to indicate the nature of the error. See psock_setcockopt() for
|
|
|
|
* the list of possible error values.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCPPROTO_OPTIONS
|
|
|
|
int tcp_setsockopt(FAR struct socket *psock, int option,
|
|
|
|
FAR const void *value, socklen_t value_len);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_getsockopt
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* tcp_getsockopt() retrieves the value for the option specified by the
|
|
|
|
* 'option' argument for the socket specified by the 'psock' argument. If
|
|
|
|
* the size of the option value is greater than 'value_len', the value
|
|
|
|
* stored in the object pointed to by the 'value' argument will be silently
|
|
|
|
* truncated. Otherwise, the length pointed to by the 'value_len' argument
|
|
|
|
* will be modified to indicate the actual length of the 'value'.
|
|
|
|
*
|
|
|
|
* The 'level' argument specifies the protocol level of the option. To
|
|
|
|
* retrieve options at the socket level, specify the level argument as
|
|
|
|
* SOL_SOCKET; to retrieve options at the TCP-protocol level, the level
|
|
|
|
* argument is SOL_CP.
|
|
|
|
*
|
|
|
|
* See <sys/socket.h> a complete list of values for the socket-level
|
|
|
|
* 'option' argument. Protocol-specific options are are protocol specific
|
|
|
|
* header files (such as netinet/tcp.h for the case of the TCP protocol).
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2018-03-12 17:59:46 +01:00
|
|
|
* psock Socket structure of the socket to query
|
|
|
|
* level Protocol level to set the option
|
|
|
|
* option identifies the option to get
|
|
|
|
* value Points to the argument value
|
|
|
|
* value_len The length of the argument value
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Returns zero (OK) on success. On failure, it returns a negated errno
|
|
|
|
* value to indicate the nature of the error. See psock_getsockopt() for
|
|
|
|
* the complete list of appropriate return error codes.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCPPROTO_OPTIONS
|
|
|
|
int tcp_getsockopt(FAR struct socket *psock, int option,
|
|
|
|
FAR void *value, FAR socklen_t *value_len);
|
|
|
|
#endif
|
|
|
|
|
2018-07-01 04:50:07 +02:00
|
|
|
/****************************************************************************
|
2018-07-01 15:59:33 +02:00
|
|
|
* Name: tcp_get_recvwindow
|
2018-07-01 04:50:07 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2018-07-01 15:59:33 +02:00
|
|
|
* Calculate the TCP receive window for the specified device.
|
2018-07-01 04:50:07 +02:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* dev - The device whose TCP receive window will be updated.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
2018-07-01 15:59:33 +02:00
|
|
|
* The value of the TCP receive window to use.
|
2018-07-01 04:50:07 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2018-07-01 15:59:33 +02:00
|
|
|
uint16_t tcp_get_recvwindow(FAR struct net_driver_s *dev);
|
2018-07-01 04:50:07 +02:00
|
|
|
|
2016-01-22 22:52:14 +01:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: psock_tcp_cansend
|
2016-01-22 22:52:14 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* psock_tcp_cansend() returns a value indicating if a write to the socket
|
|
|
|
* would block. No space in the buffer is actually reserved, so it is
|
|
|
|
* possible that the write may still block if the buffer is filled by
|
|
|
|
* another means.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2016-01-22 22:52:14 +01:00
|
|
|
* psock An instance of the internal socket structure.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* OK
|
2018-01-22 18:11:23 +01:00
|
|
|
* At least one byte of data could be successfully written.
|
2016-01-22 22:52:14 +01:00
|
|
|
* -EWOULDBLOCK
|
|
|
|
* There is no room in the output buffer.
|
|
|
|
* -EBADF
|
|
|
|
* An invalid descriptor was specified.
|
|
|
|
* -ENOTCONN
|
|
|
|
* The socket is not connected.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int psock_tcp_cansend(FAR struct socket *psock);
|
|
|
|
|
2014-06-21 23:23:39 +02:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_wrbuffer_initialize
|
2014-06-21 23:23:39 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Initialize the list of free write buffers
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called once early initialization.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
|
|
|
void tcp_wrbuffer_initialize(void);
|
|
|
|
#endif /* CONFIG_NET_TCP_WRITE_BUFFERS */
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_wrbuffer_alloc
|
2014-06-21 23:23:39 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Allocate a TCP write buffer by taking a pre-allocated buffer from
|
|
|
|
* the free list. This function is called from TCP logic when a buffer
|
|
|
|
* of TCP data is about to sent
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Input Parameters:
|
2014-06-24 19:53:19 +02:00
|
|
|
* None
|
|
|
|
*
|
2014-06-21 23:23:39 +02:00
|
|
|
* Assumptions:
|
2015-01-28 18:56:11 +01:00
|
|
|
* Called from user logic with the network locked.
|
2014-06-21 23:23:39 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
|
|
|
struct tcp_wrbuffer_s;
|
2014-06-22 19:27:57 +02:00
|
|
|
FAR struct tcp_wrbuffer_s *tcp_wrbuffer_alloc(void);
|
2018-04-20 15:37:51 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_wrbuffer_tryalloc
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Try to allocate a TCP write buffer by taking a pre-allocated buffer from
|
|
|
|
* the free list. This function is called from TCP logic when a buffer
|
|
|
|
* of TCP data is about to be sent if the socket is non-blocking. Returns
|
|
|
|
* immediately if allocation fails.
|
|
|
|
*
|
|
|
|
* Input parameters:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from user logic with the network locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
FAR struct tcp_wrbuffer_s *tcp_wrbuffer_tryalloc(void);
|
2014-06-21 23:23:39 +02:00
|
|
|
#endif /* CONFIG_NET_TCP_WRITE_BUFFERS */
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_wrbuffer_release
|
2014-06-21 23:23:39 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Release a TCP write buffer by returning the buffer to the free list.
|
|
|
|
* This function is called from user logic after it is consumed the
|
|
|
|
* buffered data.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
2015-01-15 22:06:46 +01:00
|
|
|
* Called from network stack logic with the network stack locked
|
2014-06-21 23:23:39 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
2014-06-22 19:27:57 +02:00
|
|
|
void tcp_wrbuffer_release(FAR struct tcp_wrbuffer_s *wrb);
|
|
|
|
#endif /* CONFIG_NET_TCP_WRITE_BUFFERS */
|
|
|
|
|
2016-01-22 22:52:14 +01:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_wrbuffer_test
|
2016-01-22 22:52:14 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Check if there is room in the write buffer. Does not reserve any space.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
|
|
|
int tcp_wrbuffer_test(void);
|
|
|
|
#endif /* CONFIG_NET_TCP_WRITE_BUFFERS */
|
|
|
|
|
2014-06-22 19:27:57 +02:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_wrbuffer_dump
|
2014-06-22 19:27:57 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Dump the contents of a write buffer.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
2016-06-11 22:14:08 +02:00
|
|
|
#ifdef CONFIG_DEBUG_FEATURES
|
2014-06-23 17:40:17 +02:00
|
|
|
void tcp_wrbuffer_dump(FAR const char *msg, FAR struct tcp_wrbuffer_s *wrb,
|
|
|
|
unsigned int len, unsigned int offset);
|
2014-06-22 19:27:57 +02:00
|
|
|
#else
|
2014-06-23 02:53:18 +02:00
|
|
|
# define tcp_wrbuffer_dump(msg,wrb)
|
2014-06-22 19:27:57 +02:00
|
|
|
#endif
|
2014-06-21 23:23:39 +02:00
|
|
|
#endif /* CONFIG_NET_TCP_WRITE_BUFFERS */
|
|
|
|
|
2015-01-30 14:25:01 +01:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_pollsetup
|
2015-01-30 14:25:01 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Setup to monitor events on one TCP/IP socket
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - The TCP/IP socket of interest
|
|
|
|
* fds - The structure describing the events to be monitored, OR NULL if
|
|
|
|
* this is a request to stop monitoring events.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0: Success; Negated errno on failure
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int tcp_pollsetup(FAR struct socket *psock, FAR struct pollfd *fds);
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: tcp_pollteardown
|
2015-01-30 14:25:01 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Teardown monitoring of events on an TCP/IP socket
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - The TCP/IP socket of interest
|
|
|
|
* fds - The structure describing the events to be monitored, OR NULL if
|
|
|
|
* this is a request to stop monitoring events.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0: Success; Negated errno on failure
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int tcp_pollteardown(FAR struct socket *psock, FAR struct pollfd *fds);
|
|
|
|
|
2018-09-09 17:21:39 +02:00
|
|
|
/****************************************************************************
|
2018-09-10 01:32:10 +02:00
|
|
|
* Name: tcp_readahead_notifier_setup
|
2018-09-09 17:21:39 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2018-09-09 23:01:44 +02:00
|
|
|
* Set up to perform a callback to the worker function when an TCP data
|
|
|
|
* is added to the read-ahead buffer. The worker function will execute
|
|
|
|
* on the high priority worker thread.
|
2018-09-09 19:57:25 +02:00
|
|
|
*
|
2018-09-09 17:21:39 +02:00
|
|
|
* Input Parameters:
|
2018-09-09 23:01:44 +02:00
|
|
|
* worker - The worker function to execute on the high priority work
|
2018-09-10 01:32:10 +02:00
|
|
|
* queue when data is available in the TCP read-ahead buffer.
|
2019-07-01 20:25:32 +02:00
|
|
|
* conn - The TCP connection where read-ahead data is needed.
|
2018-09-09 23:01:44 +02:00
|
|
|
* arg - A user-defined argument that will be available to the worker
|
|
|
|
* function when it runs.
|
2018-09-09 17:21:39 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* > 0 - The signal notification is in place. The returned value is a
|
|
|
|
* key that may be used later in a call to
|
|
|
|
* tcp_notifier_teardown().
|
|
|
|
* == 0 - There is already buffered read-ahead data. No signal
|
|
|
|
* notification will be provided.
|
|
|
|
* < 0 - An unexpected error occurred and no signal will be sent. The
|
|
|
|
* returned value is a negated errno value that indicates the
|
|
|
|
* nature of the failure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_NOTIFIER
|
2018-09-10 01:32:10 +02:00
|
|
|
int tcp_readahead_notifier_setup(worker_t worker,
|
|
|
|
FAR struct tcp_conn_s *conn,
|
|
|
|
FAR void *arg);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2019-07-01 20:25:32 +02:00
|
|
|
* Name: tcp_writebuffer_notifier_setup
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Set up to perform a callback to the worker function when an TCP write
|
|
|
|
* buffer is emptied. The worker function will execute on the high
|
|
|
|
* priority worker thread.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* worker - The worker function to execute on the high priority work
|
|
|
|
* queue when all buffer TX data has been sent.
|
|
|
|
* conn - The TCP connection where buffer write data is pending.
|
|
|
|
* arg - A user-defined argument that will be available to the worker
|
|
|
|
* function when it runs.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* > 0 - The signal notification is in place. The returned value is a
|
|
|
|
* key that may be used later in a call to
|
|
|
|
* tcp_notifier_teardown().
|
|
|
|
* == 0 - There is already buffered read-ahead data. No signal
|
|
|
|
* notification will be provided.
|
|
|
|
* < 0 - An unexpected error occurred and no signal will be sent. The
|
|
|
|
* returned value is a negated errno value that indicates the
|
|
|
|
* nature of the failure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_NOTIFIER
|
2019-07-01 20:25:32 +02:00
|
|
|
int tcp_writebuffer_notifier_setup(worker_t worker,
|
|
|
|
FAR struct tcp_conn_s *conn,
|
|
|
|
FAR void *arg);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_disconnect_notifier_setup
|
2018-09-10 01:32:10 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Set up to perform a callback to the worker function if the TCP
|
|
|
|
* connection is lost.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* worker - The worker function to execute on the high priority work
|
|
|
|
* queue when data is available in the TCP read-ahead buffer.
|
|
|
|
* conn - The TCP connection where read-ahead data is needed.
|
|
|
|
* arg - A user-defined argument that will be available to the worker
|
|
|
|
* function when it runs.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* > 0 - The signal notification is in place. The returned value is a
|
|
|
|
* key that may be used later in a call to
|
|
|
|
* tcp_notifier_teardown().
|
2019-07-27 18:26:52 +02:00
|
|
|
* == 0 - No connection has been established.
|
2018-09-10 01:32:10 +02:00
|
|
|
* < 0 - An unexpected error occurred and no signal will be sent. The
|
|
|
|
* returned value is a negated errno value that indicates the
|
|
|
|
* nature of the failure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_NOTIFIER
|
2019-07-01 20:25:32 +02:00
|
|
|
int tcp_disconnect_notifier_setup(worker_t worker,
|
|
|
|
FAR struct tcp_conn_s *conn,
|
|
|
|
FAR void *arg);
|
2018-09-09 17:21:39 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_notifier_teardown
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Eliminate a TCP read-ahead notification previously setup by
|
2018-09-10 01:32:10 +02:00
|
|
|
* tcp_readahead_notifier_setup(). This function should only be called
|
|
|
|
* if the notification should be aborted prior to the notification. The
|
2018-09-09 17:21:39 +02:00
|
|
|
* notification will automatically be torn down after the signal is sent.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* key - The key value returned from a previous call to
|
2018-09-10 01:32:10 +02:00
|
|
|
* tcp_readahead_notifier_setup().
|
2018-09-09 17:21:39 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Zero (OK) is returned on success; a negated errno value is returned on
|
|
|
|
* any failure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_NOTIFIER
|
2018-09-09 17:21:39 +02:00
|
|
|
int tcp_notifier_teardown(int key);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
2018-09-10 01:32:10 +02:00
|
|
|
* Name: tcp_readahead_signal
|
2018-09-09 17:21:39 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Read-ahead data has been buffered. Signal all threads waiting for
|
|
|
|
* read-ahead data to become available.
|
|
|
|
*
|
2018-09-09 23:01:44 +02:00
|
|
|
* When read-ahead data becomes available, *all* of the workers waiting
|
|
|
|
* for read-ahead data will be executed. If there are multiple workers
|
|
|
|
* waiting for read-ahead data then only the first to execute will get the
|
2018-09-10 01:32:10 +02:00
|
|
|
* data. Others will need to call tcp_readahead_notifier_setup() once
|
|
|
|
* again.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn - The TCP connection where read-ahead data was just buffered.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2020-01-11 04:56:03 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_NOTIFIER
|
2018-09-10 01:32:10 +02:00
|
|
|
void tcp_readahead_signal(FAR struct tcp_conn_s *conn);
|
|
|
|
#endif
|
|
|
|
|
2019-07-01 20:25:32 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_writebuffer_signal
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* All buffer Tx data has been sent. Signal all threads waiting for the
|
|
|
|
* write buffers to become empty.
|
|
|
|
*
|
|
|
|
* When write buffer becomes empty, *all* of the workers waiting
|
|
|
|
* for that event data will be executed. If there are multiple workers
|
|
|
|
* waiting for read-ahead data then only the first to execute will get the
|
|
|
|
* data. Others will need to call tcp_writebuffer_notifier_setup() once
|
|
|
|
* again.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* conn - The TCP connection where read-ahead data was just buffered.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
#if defined(CONFIG_NET_TCP_WRITE_BUFFERS) && defined(CONFIG_NET_TCP_NOTIFIER)
|
2019-07-01 20:25:32 +02:00
|
|
|
void tcp_writebuffer_signal(FAR struct tcp_conn_s *conn);
|
|
|
|
#endif
|
|
|
|
|
2018-09-10 01:32:10 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_disconnect_signal
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The TCP connection has been lost. Signal all threads monitoring TCP
|
|
|
|
* state events.
|
2018-09-09 19:57:25 +02:00
|
|
|
*
|
2018-09-09 17:21:39 +02:00
|
|
|
* Input Parameters:
|
|
|
|
* conn - The TCP connection where read-ahead data was just buffered.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_NOTIFIER
|
2018-09-10 01:32:10 +02:00
|
|
|
void tcp_disconnect_signal(FAR struct tcp_conn_s *conn);
|
2018-09-09 17:21:39 +02:00
|
|
|
#endif
|
|
|
|
|
2019-07-01 20:25:32 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_txdrain
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Wait for all write buffers to be sent (or for a timeout to occur).
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - An instance of the internal socket structure.
|
2020-01-04 11:37:46 +01:00
|
|
|
* timeout - The relative time when the timeout will occur
|
2019-07-01 20:25:32 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Zero (OK) is returned on success; a negated errno value is returned
|
|
|
|
* on any failure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-12-31 16:26:14 +01:00
|
|
|
#if defined(CONFIG_NET_TCP_WRITE_BUFFERS) && defined(CONFIG_NET_TCP_NOTIFIER)
|
2020-01-04 11:37:46 +01:00
|
|
|
int tcp_txdrain(FAR struct socket *psock, unsigned int timeout);
|
2019-07-01 20:25:32 +02:00
|
|
|
#else
|
2020-01-04 11:37:46 +01:00
|
|
|
# define tcp_txdrain(conn, timeout) (0)
|
2019-07-01 20:25:32 +02:00
|
|
|
#endif
|
|
|
|
|
2014-06-21 23:23:39 +02:00
|
|
|
#undef EXTERN
|
|
|
|
#ifdef __cplusplus
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-03-31 16:58:14 +02:00
|
|
|
#endif /* CONFIG_NET_TCP && !CONFIG_NET_TCP_NO_STACK */
|
2014-06-21 23:23:39 +02:00
|
|
|
#endif /* _NET_TCP_TCP_H */
|