2007-09-03 22:34:44 +02:00
|
|
|
/****************************************************************************
|
2014-06-29 01:25:18 +02:00
|
|
|
* net/socket/recvfrom.c
|
2007-09-03 22:34:44 +02:00
|
|
|
*
|
2015-01-18 15:56:05 +01:00
|
|
|
* Copyright (C) 2007-2009, 2011-2015 Gregory Nutt. All rights reserved.
|
2012-01-30 22:29:59 +01:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
2007-09-03 22:34:44 +02:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name NuttX nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
2012-02-23 03:07:38 +01:00
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
#ifdef CONFIG_NET
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
2009-12-15 16:57:25 +01:00
|
|
|
#include <stdint.h>
|
2007-09-03 22:34:44 +02:00
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
2007-11-06 00:04:16 +01:00
|
|
|
#include <debug.h>
|
2014-07-22 02:46:47 +02:00
|
|
|
#include <assert.h>
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2014-06-12 19:52:06 +02:00
|
|
|
#ifdef CONFIG_NET_PKT
|
|
|
|
# include <netpacket/packet.h>
|
|
|
|
#endif
|
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
#include <arch/irq.h>
|
2014-07-05 03:13:08 +02:00
|
|
|
|
2007-09-09 13:58:50 +02:00
|
|
|
#include <nuttx/clock.h>
|
2014-07-05 00:38:51 +02:00
|
|
|
#include <nuttx/net/net.h>
|
2014-06-26 17:32:39 +02:00
|
|
|
#include <nuttx/net/iob.h>
|
2014-06-24 17:28:44 +02:00
|
|
|
#include <nuttx/net/netdev.h>
|
2014-07-05 03:13:08 +02:00
|
|
|
#include <nuttx/net/ip.h>
|
2014-06-26 17:32:39 +02:00
|
|
|
#include <nuttx/net/tcp.h>
|
|
|
|
#include <nuttx/net/udp.h>
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2014-06-27 17:56:45 +02:00
|
|
|
#include "netdev/netdev.h"
|
2014-06-29 02:07:02 +02:00
|
|
|
#include "devif/devif.h"
|
2014-06-25 02:12:49 +02:00
|
|
|
#include "tcp/tcp.h"
|
2014-06-25 02:55:01 +02:00
|
|
|
#include "udp/udp.h"
|
2014-06-25 18:34:52 +02:00
|
|
|
#include "pkt/pkt.h"
|
2015-01-27 01:47:48 +01:00
|
|
|
#include "local/local.h"
|
2014-07-05 00:38:51 +02:00
|
|
|
#include "socket/socket.h"
|
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
/****************************************************************************
|
2014-11-15 20:13:23 +01:00
|
|
|
* Pre-processor Definitions
|
2007-09-03 22:34:44 +02:00
|
|
|
****************************************************************************/
|
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
#define IPv4BUF ((struct ipv4_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev)])
|
|
|
|
#define IPv6BUF ((struct ipv6_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev)])
|
|
|
|
|
|
|
|
#define UDPIPv4BUF ((struct udp_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev) + IPv4_HDRLEN])
|
|
|
|
#define UDPIPv6BUF ((struct udp_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev) + IPv6_HDRLEN])
|
|
|
|
|
|
|
|
#define TCPIPv4BUF ((struct tcp_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev) + IPv4_HDRLEN])
|
|
|
|
#define TCPIPv6BUF ((struct tcp_hdr_s *)&dev->d_buf[NET_LL_HDRLEN(dev) + IPv6_HDRLEN])
|
2007-11-23 20:25:39 +01:00
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2007-09-03 22:34:44 +02:00
|
|
|
struct recvfrom_s
|
|
|
|
{
|
2014-06-29 20:59:34 +02:00
|
|
|
FAR struct socket *rf_sock; /* The parent socket structure */
|
2014-08-07 20:35:24 +02:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
2014-06-29 20:59:34 +02:00
|
|
|
uint32_t rf_starttime; /* rcv start time for determining timeout */
|
2007-09-08 23:54:43 +02:00
|
|
|
#endif
|
2014-06-29 20:59:34 +02:00
|
|
|
FAR struct devif_callback_s *rf_cb; /* Reference to callback instance */
|
|
|
|
sem_t rf_sem; /* Semaphore signals recv completion */
|
|
|
|
size_t rf_buflen; /* Length of receive buffer */
|
|
|
|
uint8_t *rf_buffer; /* Pointer to receive buffer */
|
2015-01-18 16:23:22 +01:00
|
|
|
FAR struct sockaddr *rf_from; /* Address of sender */
|
2014-06-29 20:59:34 +02:00
|
|
|
size_t rf_recvlen; /* The received length */
|
|
|
|
int rf_result; /* Success:OK, failure:negated errno */
|
2007-09-03 22:34:44 +02:00
|
|
|
};
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-09-16 00:45:45 +02:00
|
|
|
/****************************************************************************
|
2007-11-08 17:01:18 +01:00
|
|
|
* Function: recvfrom_newdata
|
2007-09-16 00:45:45 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2007-11-08 17:01:18 +01:00
|
|
|
* Copy the read data from the packet
|
2007-09-16 00:45:45 +02:00
|
|
|
*
|
|
|
|
* Parameters:
|
2015-01-27 21:14:53 +01:00
|
|
|
* dev The structure of the network driver that caused the interrupt
|
2007-11-08 17:01:18 +01:00
|
|
|
* pstate recvfrom state structure
|
2007-09-16 00:45:45 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
2012-02-23 03:07:38 +01:00
|
|
|
* The number of bytes taken from the packet.
|
2007-09-16 00:45:45 +02:00
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2014-06-28 00:48:12 +02:00
|
|
|
static size_t recvfrom_newdata(FAR struct net_driver_s *dev,
|
2012-02-23 03:07:38 +01:00
|
|
|
FAR struct recvfrom_s *pstate)
|
2007-09-03 22:34:44 +02:00
|
|
|
{
|
|
|
|
size_t recvlen;
|
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Get the length of the data to return */
|
2007-09-05 02:13:18 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
if (dev->d_len > pstate->rf_buflen)
|
|
|
|
{
|
|
|
|
recvlen = pstate->rf_buflen;
|
|
|
|
}
|
|
|
|
else
|
2007-09-03 22:34:44 +02:00
|
|
|
{
|
2007-11-08 17:01:18 +01:00
|
|
|
recvlen = dev->d_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy the new appdata into the user buffer */
|
|
|
|
|
|
|
|
memcpy(pstate->rf_buffer, dev->d_appdata, recvlen);
|
2009-09-15 17:44:14 +02:00
|
|
|
nllvdbg("Received %d bytes (of %d)\n", (int)recvlen, (int)dev->d_len);
|
2007-11-08 17:01:18 +01:00
|
|
|
|
|
|
|
/* Update the accumulated size of the data read */
|
|
|
|
|
|
|
|
pstate->rf_recvlen += recvlen;
|
|
|
|
pstate->rf_buffer += recvlen;
|
|
|
|
pstate->rf_buflen -= recvlen;
|
2007-11-15 23:38:32 +01:00
|
|
|
|
2012-02-23 03:07:38 +01:00
|
|
|
return recvlen;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
|
|
|
|
2014-06-12 19:52:06 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_newpktdata
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the read data from the packet
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* dev The structure of the network driver that caused the interrupt
|
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_PKT
|
2014-06-28 00:48:12 +02:00
|
|
|
static void recvfrom_newpktdata(FAR struct net_driver_s *dev,
|
2014-06-12 19:52:06 +02:00
|
|
|
FAR struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
size_t recvlen;
|
|
|
|
|
|
|
|
if (dev->d_len > pstate->rf_buflen)
|
|
|
|
{
|
|
|
|
recvlen = pstate->rf_buflen;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
recvlen = dev->d_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy the new packet data into the user buffer */
|
|
|
|
|
|
|
|
memcpy(pstate->rf_buffer, dev->d_buf, recvlen);
|
|
|
|
nllvdbg("Received %d bytes (of %d)\n", (int)recvlen, (int)dev->d_len);
|
|
|
|
|
|
|
|
/* Update the accumulated size of the data read */
|
|
|
|
|
|
|
|
pstate->rf_recvlen += recvlen;
|
|
|
|
pstate->rf_buffer += recvlen;
|
|
|
|
pstate->rf_buffer -= recvlen;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_PKT */
|
|
|
|
|
2012-02-23 03:07:38 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_newtcpdata
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the read data from the packet
|
|
|
|
*
|
|
|
|
* Parameters:
|
2015-01-22 14:50:31 +01:00
|
|
|
* dev The structure of the network driver that caused the interrupt
|
2012-02-23 03:07:38 +01:00
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP
|
2014-06-28 00:48:12 +02:00
|
|
|
static inline void recvfrom_newtcpdata(FAR struct net_driver_s *dev,
|
2012-02-23 03:07:38 +01:00
|
|
|
FAR struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
/* Take as much data from the packet as we can */
|
|
|
|
|
|
|
|
size_t recvlen = recvfrom_newdata(dev, pstate);
|
|
|
|
|
|
|
|
/* If there is more data left in the packet that we could not buffer, than
|
|
|
|
* add it to the read-ahead buffers.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (recvlen < dev->d_len)
|
|
|
|
{
|
2014-01-13 20:55:51 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_READAHEAD
|
2014-06-25 02:12:49 +02:00
|
|
|
FAR struct tcp_conn_s *conn = (FAR struct tcp_conn_s *)pstate->rf_sock->s_conn;
|
|
|
|
FAR uint8_t *buffer = (FAR uint8_t *)dev->d_appdata + recvlen;
|
|
|
|
uint16_t buflen = dev->d_len - recvlen;
|
2013-10-05 20:05:51 +02:00
|
|
|
#ifdef CONFIG_DEBUG_NET
|
2014-06-25 02:12:49 +02:00
|
|
|
uint16_t nsaved;
|
2012-02-23 03:07:38 +01:00
|
|
|
|
2014-06-25 02:12:49 +02:00
|
|
|
nsaved = tcp_datahandler(conn, buffer, buflen);
|
2013-10-05 20:05:51 +02:00
|
|
|
#else
|
2014-06-25 02:12:49 +02:00
|
|
|
(void)tcp_datahandler(conn, buffer, buflen);
|
2013-10-05 20:05:51 +02:00
|
|
|
#endif
|
2012-02-23 03:07:38 +01:00
|
|
|
|
2012-02-23 16:53:27 +01:00
|
|
|
/* There are complicated buffering issues that are not addressed fully
|
|
|
|
* here. For example, what if up_datahandler() cannot buffer the
|
|
|
|
* remainder of the packet? In that case, the data will be dropped but
|
|
|
|
* still ACKed. Therefore it would not be resent.
|
2013-09-06 18:19:07 +02:00
|
|
|
*
|
2012-02-23 16:53:27 +01:00
|
|
|
* This is probably not an issue here because we only get here if the
|
|
|
|
* read-ahead buffers are empty and there would have to be something
|
|
|
|
* serioulsy wrong with the configuration not to be able to buffer a
|
|
|
|
* partial packet in this context.
|
2012-02-23 03:07:38 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef CONFIG_DEBUG_NET
|
|
|
|
if (nsaved < buflen)
|
|
|
|
{
|
|
|
|
ndbg("ERROR: packet data not saved (%d bytes)\n", buflen - nsaved);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#else
|
|
|
|
ndbg("ERROR: packet data lost (%d bytes)\n", dev->d_len - recvlen);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2007-11-15 23:38:32 +01:00
|
|
|
/* Indicate no data in the buffer */
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
2007-11-08 17:01:18 +01:00
|
|
|
}
|
2012-02-23 03:07:38 +01:00
|
|
|
#endif /* CONFIG_NET_TCP */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_newudpdata
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the read data from the packet
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* dev The sructure of the network driver that caused the interrupt
|
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2012-04-25 17:16:45 +02:00
|
|
|
#ifdef CONFIG_NET_UDP
|
2014-06-28 00:48:12 +02:00
|
|
|
static inline void recvfrom_newudpdata(FAR struct net_driver_s *dev,
|
2012-02-23 03:07:38 +01:00
|
|
|
FAR struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
/* Take as much data from the packet as we can */
|
|
|
|
|
|
|
|
(void)recvfrom_newdata(dev, pstate);
|
|
|
|
|
|
|
|
/* Indicate no data in the buffer */
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_TCP */
|
2007-11-08 17:01:18 +01:00
|
|
|
|
2007-11-20 00:09:39 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_readahead
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the read data from the packet
|
|
|
|
*
|
|
|
|
* Parameters:
|
2014-06-12 19:52:06 +02:00
|
|
|
* dev The structure of the network driver that caused the interrupt
|
2007-11-20 00:09:39 +01:00
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-01-13 20:55:51 +01:00
|
|
|
#if defined(CONFIG_NET_TCP) && defined(CONFIG_NET_TCP_READAHEAD)
|
2007-11-20 00:09:39 +01:00
|
|
|
static inline void recvfrom_readahead(struct recvfrom_s *pstate)
|
|
|
|
{
|
2014-06-25 02:12:49 +02:00
|
|
|
FAR struct tcp_conn_s *conn = (FAR struct tcp_conn_s *)pstate->rf_sock->s_conn;
|
2014-06-24 23:38:00 +02:00
|
|
|
FAR struct iob_s *iob;
|
|
|
|
int recvlen;
|
2007-11-20 00:09:39 +01:00
|
|
|
|
|
|
|
/* Check there is any TCP data already buffered in a read-ahead
|
|
|
|
* buffer.
|
|
|
|
*/
|
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
while ((iob = iob_peek_queue(&conn->readahead)) != NULL &&
|
|
|
|
pstate->rf_buflen > 0)
|
2007-11-20 00:09:39 +01:00
|
|
|
{
|
2014-06-24 23:38:00 +02:00
|
|
|
DEBUGASSERT(iob->io_pktlen > 0);
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
/* Transfer that buffered data from the I/O buffer chain into
|
|
|
|
* the user buffer.
|
|
|
|
*/
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
recvlen = iob_copyout(pstate->rf_buffer, iob, pstate->rf_buflen, 0);
|
|
|
|
nllvdbg("Received %d bytes (of %d)\n", recvlen, iob->io_pktlen);
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
/* Update the accumulated size of the data read */
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
pstate->rf_recvlen += recvlen;
|
|
|
|
pstate->rf_buffer += recvlen;
|
|
|
|
pstate->rf_buflen -= recvlen;
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
/* If we took all of the ata from the I/O buffer chain is empty, then
|
|
|
|
* release it. If there is still data available in the I/O buffer
|
|
|
|
* chain, then just trim the data that we have taken from the
|
|
|
|
* beginning of the I/O buffer chain.
|
|
|
|
*/
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
if (recvlen >= iob->io_pktlen)
|
|
|
|
{
|
|
|
|
FAR struct iob_s *tmp;
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
/* Remove the I/O buffer chain from the head of the read-ahead
|
|
|
|
* buffer queue.
|
2007-11-20 00:09:39 +01:00
|
|
|
*/
|
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
tmp = iob_remove_queue(&conn->readahead);
|
|
|
|
DEBUGASSERT(tmp == iob);
|
|
|
|
UNUSED(tmp);
|
|
|
|
|
|
|
|
/* And free the I/O buffer chain */
|
|
|
|
|
|
|
|
(void)iob_free_chain(iob);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2014-07-07 15:28:17 +02:00
|
|
|
/* The bytes that we have received from the head of the I/O
|
|
|
|
* buffer chain (probably changing the head of the I/O
|
|
|
|
* buffer queue).
|
2014-06-24 23:38:00 +02:00
|
|
|
*/
|
|
|
|
|
2014-07-07 15:28:17 +02:00
|
|
|
(void)iob_trimhead_queue(&conn->readahead, recvlen);
|
2007-11-20 00:09:39 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_timeout
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Check for recvfrom timeout.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* TRUE:timeout FALSE:no timeout
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2014-08-07 20:35:24 +02:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
2007-11-08 17:01:18 +01:00
|
|
|
static int recvfrom_timeout(struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
FAR struct socket *psock = 0;
|
|
|
|
socktimeo_t timeo = 0;
|
|
|
|
|
2012-09-07 18:51:53 +02:00
|
|
|
/* Check for a timeout configured via setsockopts(SO_RCVTIMEO). If none...
|
|
|
|
* we well let the read hang forever (except for the special case below).
|
2007-11-08 17:01:18 +01:00
|
|
|
*/
|
|
|
|
|
2012-09-07 18:51:53 +02:00
|
|
|
/* Get the socket reference from the private data */
|
|
|
|
|
|
|
|
psock = pstate->rf_sock;
|
|
|
|
if (psock)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
2012-09-07 18:51:53 +02:00
|
|
|
/* Recover the timeout value (zero if no timeout) */
|
2007-11-08 17:01:18 +01:00
|
|
|
|
2012-09-07 18:51:53 +02:00
|
|
|
timeo = psock->s_rcvtimeo;
|
2007-11-08 17:01:18 +01:00
|
|
|
}
|
|
|
|
|
2012-09-07 18:51:53 +02:00
|
|
|
/* Use a fixed, configurable delay under the following circumstances:
|
|
|
|
*
|
|
|
|
* 1) This delay function has been enabled with CONFIG_NET_TCP_RECVDELAY > 0
|
|
|
|
* 2) Some data has already been received from the socket. Since this can
|
|
|
|
* only be true for a TCP/IP socket, this logic applies only to TCP/IP
|
2012-09-07 21:29:21 +02:00
|
|
|
* sockets. And either
|
2012-09-07 18:51:53 +02:00
|
|
|
* 3) There is no configured receive timeout, or
|
|
|
|
* 4) The configured receive timeout is greater than than the delay
|
2007-11-08 17:01:18 +01:00
|
|
|
*/
|
|
|
|
|
2012-09-07 18:51:53 +02:00
|
|
|
#if CONFIG_NET_TCP_RECVDELAY > 0
|
|
|
|
if ((timeo == 0 || timeo > CONFIG_NET_TCP_RECVDELAY) &&
|
|
|
|
pstate->rf_recvlen > 0)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
2012-09-07 18:51:53 +02:00
|
|
|
/* Use the configured timeout */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2012-09-07 18:51:53 +02:00
|
|
|
timeo = CONFIG_NET_TCP_RECVDELAY;
|
2007-11-08 17:01:18 +01:00
|
|
|
}
|
2012-09-07 18:51:53 +02:00
|
|
|
#endif
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Is there an effective timeout? */
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
if (timeo)
|
|
|
|
{
|
|
|
|
/* Yes.. Check if the timeout has elapsed */
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
return net_timeo(pstate->rf_starttime, timeo);
|
|
|
|
}
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2012-09-07 18:51:53 +02:00
|
|
|
/* No timeout -- hang forever waiting for data. */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
return FALSE;
|
|
|
|
}
|
2014-08-07 20:35:24 +02:00
|
|
|
#endif /* CONFIG_NET_SOCKOPTS */
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2014-06-12 19:52:06 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_pktsender
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* Returned Values:
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_PKT
|
2014-06-28 00:48:12 +02:00
|
|
|
static inline void recvfrom_pktsender(FAR struct net_driver_s *dev,
|
2014-06-12 19:52:06 +02:00
|
|
|
FAR struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_PKT */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_pktinterrupt
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* Returned Values:
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_PKT
|
2014-06-28 00:48:12 +02:00
|
|
|
static uint16_t recvfrom_pktinterrupt(FAR struct net_driver_s *dev,
|
2014-06-12 19:52:06 +02:00
|
|
|
FAR void *conn, FAR void *pvpriv,
|
|
|
|
uint16_t flags)
|
|
|
|
{
|
|
|
|
struct recvfrom_s *pstate = (struct recvfrom_s *)pvpriv;
|
|
|
|
|
|
|
|
nllvdbg("flags: %04x\n", flags);
|
|
|
|
|
|
|
|
/* 'priv' might be null in some race conditions (?) */
|
|
|
|
|
|
|
|
if (pstate)
|
|
|
|
{
|
|
|
|
/* If a new packet is available, then complete the read action. */
|
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
if ((flags & PKT_NEWDATA) != 0)
|
2014-06-12 19:52:06 +02:00
|
|
|
{
|
|
|
|
/* Copy the packet */
|
|
|
|
recvfrom_newpktdata(dev, pstate);
|
|
|
|
|
|
|
|
/* We are finished. */
|
|
|
|
|
|
|
|
nllvdbg("PKT done\n");
|
|
|
|
|
|
|
|
/* Don't allow any further call backs. */
|
|
|
|
|
|
|
|
pstate->rf_cb->flags = 0;
|
|
|
|
pstate->rf_cb->priv = NULL;
|
|
|
|
pstate->rf_cb->event = NULL;
|
|
|
|
#if 0
|
|
|
|
/* Save the sender's address in the caller's 'from' location */
|
|
|
|
|
|
|
|
recvfrom_pktsender(dev, pstate);
|
|
|
|
#endif
|
|
|
|
/* indicate that the data has been consumed */
|
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
flags &= ~PKT_NEWDATA;
|
2014-06-12 19:52:06 +02:00
|
|
|
|
|
|
|
/* Wake up the waiting thread, returning the number of bytes
|
|
|
|
* actually read.
|
|
|
|
*/
|
|
|
|
|
|
|
|
sem_post(&pstate->rf_sem);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_PKT */
|
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_tcpsender
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Getting the sender's address from the UDP packet
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* dev - The device driver data structure
|
2013-09-06 18:19:07 +02:00
|
|
|
* pstate - the recvfrom state structure
|
2007-11-23 20:25:39 +01:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP
|
2014-06-28 00:48:12 +02:00
|
|
|
static inline void recvfrom_tcpsender(FAR struct net_driver_s *dev,
|
2014-06-12 20:29:58 +02:00
|
|
|
FAR struct recvfrom_s *pstate)
|
2007-11-23 20:25:39 +01:00
|
|
|
{
|
2015-01-18 15:56:05 +01:00
|
|
|
/* Get the family from the packet type, IP address from the IP header, and
|
|
|
|
* the port number from the TCP header.
|
|
|
|
*/
|
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
2015-01-18 15:56:05 +01:00
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
2007-11-23 20:25:39 +01:00
|
|
|
#endif
|
|
|
|
{
|
2015-01-18 16:23:22 +01:00
|
|
|
FAR struct sockaddr_in6 *infrom =
|
|
|
|
(FAR struct sockaddr_in6 *)pstate->rf_from;
|
2015-01-18 15:56:05 +01:00
|
|
|
|
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
FAR struct tcp_hdr_s *tcp = TCPIPv6BUF;
|
|
|
|
FAR struct ipv6_hdr_s *ipv6 = IPv6BUF;
|
2007-11-23 20:25:39 +01:00
|
|
|
|
2015-01-21 01:14:09 +01:00
|
|
|
infrom->sin6_family = AF_INET6;
|
|
|
|
infrom->sin6_port = tcp->srcport;
|
2015-01-18 15:56:05 +01:00
|
|
|
|
|
|
|
net_ipv6addr_copy(infrom->sin6_addr.s6_addr, ipv6->srcipaddr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
2007-11-23 20:25:39 +01:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
2015-01-18 15:56:05 +01:00
|
|
|
else
|
2007-11-23 20:25:39 +01:00
|
|
|
#endif
|
2015-01-18 15:56:05 +01:00
|
|
|
{
|
2015-01-18 16:23:22 +01:00
|
|
|
FAR struct sockaddr_in *infrom =
|
|
|
|
(FAR struct sockaddr_in *)pstate->rf_from;
|
2015-01-18 15:56:05 +01:00
|
|
|
|
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
FAR struct tcp_hdr_s *tcp = TCPIPv4BUF;
|
|
|
|
FAR struct ipv4_hdr_s *ipv4 = IPv4BUF;
|
|
|
|
|
|
|
|
infrom->sin_family = AF_INET;
|
|
|
|
infrom->sin_port = tcp->srcport;
|
|
|
|
|
|
|
|
net_ipv4addr_copy(infrom->sin_addr.s_addr,
|
|
|
|
net_ip4addr_conv32(ipv4->srcipaddr));
|
|
|
|
}
|
2007-11-23 20:25:39 +01:00
|
|
|
}
|
2015-01-18 15:56:05 +01:00
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
2007-11-23 20:25:39 +01:00
|
|
|
}
|
2015-01-18 15:56:05 +01:00
|
|
|
#endif /* CONFIG_NET_TCP */
|
2007-11-23 20:25:39 +01:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_tcpinterrupt
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function is called from the interrupt level to perform the actual
|
2014-07-07 01:22:02 +02:00
|
|
|
* TCP receive operation via by the lower, device interfacing layer.
|
2007-11-08 17:01:18 +01:00
|
|
|
*
|
|
|
|
* Parameters:
|
2008-11-18 18:24:50 +01:00
|
|
|
* dev The structure of the network driver that caused the interrupt
|
2007-11-08 17:01:18 +01:00
|
|
|
* conn The connection structure associated with the socket
|
|
|
|
* flags Set of events describing why the callback was invoked
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#ifdef CONFIG_NET_TCP
|
2014-06-28 00:48:12 +02:00
|
|
|
static uint16_t recvfrom_tcpinterrupt(FAR struct net_driver_s *dev,
|
2013-01-20 18:21:42 +01:00
|
|
|
FAR void *conn, FAR void *pvpriv,
|
|
|
|
uint16_t flags)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
2013-01-20 18:21:42 +01:00
|
|
|
FAR struct recvfrom_s *pstate = (struct recvfrom_s *)pvpriv;
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2009-09-15 17:44:14 +02:00
|
|
|
nllvdbg("flags: %04x\n", flags);
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2009-06-17 01:23:31 +02:00
|
|
|
/* 'priv' might be null in some race conditions (?) */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
if (pstate)
|
|
|
|
{
|
|
|
|
/* If new data is available, then complete the read action. */
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
if ((flags & TCP_NEWDATA) != 0)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
2012-02-23 16:53:27 +01:00
|
|
|
/* Copy the data from the packet (saving any unused bytes from the
|
|
|
|
* packet in the read-ahead buffer).
|
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2012-02-23 03:07:38 +01:00
|
|
|
recvfrom_newtcpdata(dev, pstate);
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/* Save the sender's address in the caller's 'from' location */
|
|
|
|
|
|
|
|
recvfrom_tcpsender(dev, pstate);
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Indicate that the data has been consumed and that an ACK
|
|
|
|
* should be sent.
|
|
|
|
*/
|
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
flags = (flags & ~TCP_NEWDATA) | TCP_SNDACK;
|
2008-09-01 15:59:54 +02:00
|
|
|
|
2012-09-07 18:51:53 +02:00
|
|
|
/* Check for transfer complete. We will consider the transfer
|
|
|
|
* complete in own of two different ways, depending on the setting
|
|
|
|
* of CONFIG_NET_TCP_RECVDELAY.
|
|
|
|
*
|
|
|
|
* 1) If CONFIG_NET_TCP_RECVDELAY == 0 then we will consider the
|
|
|
|
* TCP/IP transfer complete as soon as any data has been received.
|
|
|
|
* This is safe because if any additional data is received, it
|
2015-01-27 21:14:53 +01:00
|
|
|
* will be retained in the TCP/IP read-ahead buffer until the
|
2012-09-07 18:51:53 +02:00
|
|
|
* next receive is performed.
|
|
|
|
* 2) CONFIG_NET_TCP_RECVDELAY > 0 may be set to wait a little
|
|
|
|
* bit to determine if more data will be received. You might
|
2015-01-27 21:14:53 +01:00
|
|
|
* do this if read-ahead buffering is disabled and we want to
|
2012-09-07 18:51:53 +02:00
|
|
|
* minimize the loss of back-to-back packets. In this case,
|
2013-09-06 18:19:07 +02:00
|
|
|
* the transfer is complete when either a) the entire user buffer
|
2012-09-07 18:51:53 +02:00
|
|
|
* is full or 2) when the receive timeout occurs (below).
|
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2012-09-07 18:51:53 +02:00
|
|
|
#if CONFIG_NET_TCP_RECVDELAY > 0
|
2007-09-09 21:47:52 +02:00
|
|
|
if (pstate->rf_buflen == 0)
|
2012-09-07 18:51:53 +02:00
|
|
|
#else
|
|
|
|
if (pstate->rf_recvlen > 0)
|
|
|
|
#endif
|
2007-09-09 21:47:52 +02:00
|
|
|
{
|
2009-09-15 17:44:14 +02:00
|
|
|
nllvdbg("TCP resume\n");
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2012-02-23 16:53:27 +01:00
|
|
|
/* The TCP receive buffer is full. Return now and don't allow
|
|
|
|
* any further TCP call backs.
|
2007-09-09 21:47:52 +02:00
|
|
|
*/
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
2009-06-17 01:23:31 +02:00
|
|
|
pstate->rf_cb->priv = NULL;
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->event = NULL;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
/* Wake up the waiting thread, returning the number of bytes
|
|
|
|
* actually read.
|
|
|
|
*/
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-09-09 21:47:52 +02:00
|
|
|
sem_post(&pstate->rf_sem);
|
|
|
|
}
|
|
|
|
|
2014-08-07 20:35:24 +02:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
2007-09-09 21:47:52 +02:00
|
|
|
/* Reset the timeout. We will want a short timeout to terminate
|
2007-11-06 00:04:16 +01:00
|
|
|
* the TCP receive.
|
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2011-04-13 23:44:24 +02:00
|
|
|
pstate->rf_starttime = clock_systimer();
|
2007-09-09 21:47:52 +02:00
|
|
|
#endif
|
2007-09-08 23:54:43 +02:00
|
|
|
}
|
|
|
|
|
2012-02-18 19:13:30 +01:00
|
|
|
/* Check for a loss of connection.
|
|
|
|
*
|
2014-07-07 01:22:02 +02:00
|
|
|
* TCP_CLOSE: The remote host has closed the connection
|
|
|
|
* TCP_ABORT: The remote host has aborted the connection
|
|
|
|
* TCP_TIMEDOUT: Connection aborted due to too many retransmissions.
|
2012-02-18 19:13:30 +01:00
|
|
|
*/
|
2007-09-16 00:45:45 +02:00
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
else if ((flags & (TCP_CLOSE | TCP_ABORT | TCP_TIMEDOUT)) != 0)
|
2007-09-16 00:45:45 +02:00
|
|
|
{
|
2013-01-20 18:21:42 +01:00
|
|
|
nllvdbg("Lost connection\n");
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2007-09-16 00:45:45 +02:00
|
|
|
/* Stop further callbacks */
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
2009-06-17 01:23:31 +02:00
|
|
|
pstate->rf_cb->priv = NULL;
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->event = NULL;
|
2007-09-16 00:45:45 +02:00
|
|
|
|
2013-01-20 18:21:42 +01:00
|
|
|
/* Handle loss-of-connection event */
|
2007-09-16 00:45:45 +02:00
|
|
|
|
2013-01-20 18:21:42 +01:00
|
|
|
net_lostconnection(pstate->rf_sock, flags);
|
2013-01-20 01:41:33 +01:00
|
|
|
|
2013-01-20 18:21:42 +01:00
|
|
|
/* Check if the peer gracefully closed the connection. */
|
2013-01-20 01:41:33 +01:00
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
if ((flags & TCP_CLOSE) != 0)
|
2013-01-20 18:21:42 +01:00
|
|
|
{
|
2013-01-20 01:41:33 +01:00
|
|
|
/* This case should always return success (zero)! The value of
|
|
|
|
* rf_recvlen, if zero, will indicate that the connection was
|
|
|
|
* gracefully closed.
|
|
|
|
*/
|
|
|
|
|
|
|
|
pstate->rf_result = 0;
|
2013-01-19 20:18:44 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2013-01-20 01:41:33 +01:00
|
|
|
/* If no data has been received, then return ENOTCONN.
|
|
|
|
* Otherwise, let this return success. The failure will
|
|
|
|
* be reported the next time that recv[from]() is called.
|
|
|
|
*/
|
2013-01-19 20:18:44 +01:00
|
|
|
|
2013-01-19 20:45:08 +01:00
|
|
|
#if CONFIG_NET_TCP_RECVDELAY > 0
|
2013-01-20 01:41:33 +01:00
|
|
|
if (pstate->rf_recvlen > 0)
|
|
|
|
{
|
|
|
|
pstate->rf_result = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
pstate->rf_result = -ENOTCONN;
|
|
|
|
}
|
2013-01-19 20:45:08 +01:00
|
|
|
#else
|
2013-01-20 01:41:33 +01:00
|
|
|
pstate->rf_result = -ENOTCONN;
|
2013-01-19 20:45:08 +01:00
|
|
|
#endif
|
2013-01-20 01:41:33 +01:00
|
|
|
}
|
2007-09-16 00:45:45 +02:00
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
|
|
|
sem_post(&pstate->rf_sem);
|
|
|
|
}
|
|
|
|
|
2014-08-07 20:35:24 +02:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
2007-09-09 00:41:00 +02:00
|
|
|
/* No data has been received -- this is some other event... probably a
|
|
|
|
* poll -- check for a timeout.
|
2007-09-05 02:13:18 +02:00
|
|
|
*/
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
else if (recvfrom_timeout(pstate))
|
2007-09-08 23:54:43 +02:00
|
|
|
{
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Yes.. the timeout has elapsed... do not allow any further
|
|
|
|
* callbacks
|
2007-09-09 21:47:52 +02:00
|
|
|
*/
|
|
|
|
|
2009-09-15 17:44:14 +02:00
|
|
|
nllvdbg("TCP timeout\n");
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
2009-06-17 01:23:31 +02:00
|
|
|
pstate->rf_cb->priv = NULL;
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->event = NULL;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2013-09-06 18:19:07 +02:00
|
|
|
/* Report an error only if no data has been received. (If
|
2012-09-09 17:43:18 +02:00
|
|
|
* CONFIG_NET_TCP_RECVDELAY then rf_recvlen should always be
|
|
|
|
* zero).
|
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2012-09-07 21:29:21 +02:00
|
|
|
#if CONFIG_NET_TCP_RECVDELAY > 0
|
2007-11-08 17:01:18 +01:00
|
|
|
if (pstate->rf_recvlen == 0)
|
2012-09-07 21:29:21 +02:00
|
|
|
#endif
|
2007-09-09 21:47:52 +02:00
|
|
|
{
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Report the timeout error */
|
|
|
|
|
|
|
|
pstate->rf_result = -EAGAIN;
|
2007-09-09 21:47:52 +02:00
|
|
|
}
|
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Wake up the waiting thread, returning either the error -EAGAIN
|
|
|
|
* that signals the timeout event or the data received up to
|
|
|
|
* the point tht the timeout occured (no error).
|
|
|
|
*/
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
sem_post(&pstate->rf_sem);
|
|
|
|
}
|
2014-08-07 20:35:24 +02:00
|
|
|
#endif /* CONFIG_NET_SOCKOPTS */
|
2007-11-08 17:01:18 +01:00
|
|
|
}
|
2014-06-12 19:52:06 +02:00
|
|
|
|
2007-11-15 23:38:32 +01:00
|
|
|
return flags;
|
2007-11-08 17:01:18 +01:00
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_TCP */
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_udpsender
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Getting the sender's address from the UDP packet
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* dev - The device driver data structure
|
2013-09-06 18:19:07 +02:00
|
|
|
* pstate - the recvfrom state structure
|
2007-11-23 20:25:39 +01:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
2014-06-28 00:48:12 +02:00
|
|
|
static inline void recvfrom_udpsender(struct net_driver_s *dev, struct recvfrom_s *pstate)
|
2007-11-23 20:25:39 +01:00
|
|
|
{
|
2015-01-18 15:56:05 +01:00
|
|
|
/* Get the family from the packet type, IP address from the IP header, and
|
|
|
|
* the port number from the UDP header.
|
|
|
|
*/
|
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
2015-01-18 15:56:05 +01:00
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
if (IFF_IS_IPv6(dev->d_flags))
|
2007-11-23 20:25:39 +01:00
|
|
|
#endif
|
|
|
|
{
|
2015-01-18 16:23:22 +01:00
|
|
|
FAR struct sockaddr_in6 *infrom =
|
|
|
|
(FAR struct sockaddr_in6 *)pstate->rf_from;
|
2007-11-23 20:25:39 +01:00
|
|
|
|
2015-01-18 15:56:05 +01:00
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
FAR struct udp_hdr_s *udp = UDPIPv6BUF;
|
|
|
|
FAR struct ipv6_hdr_s *ipv6 = IPv6BUF;
|
|
|
|
|
2015-01-21 01:14:09 +01:00
|
|
|
infrom->sin6_family = AF_INET6;
|
|
|
|
infrom->sin6_port = udp->srcport;
|
2015-01-18 15:56:05 +01:00
|
|
|
|
|
|
|
net_ipv6addr_copy(infrom->sin6_addr.s6_addr, ipv6->srcipaddr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
2007-11-23 20:25:39 +01:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
2015-01-18 15:56:05 +01:00
|
|
|
else
|
2007-11-23 20:25:39 +01:00
|
|
|
#endif
|
2015-01-18 15:56:05 +01:00
|
|
|
{
|
2015-01-18 16:23:22 +01:00
|
|
|
FAR struct sockaddr_in *infrom =
|
|
|
|
(FAR struct sockaddr_in *)pstate->rf_from;
|
2015-01-18 15:56:05 +01:00
|
|
|
|
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
FAR struct udp_hdr_s *udp = UDPIPv4BUF;
|
|
|
|
FAR struct ipv4_hdr_s *ipv4 = IPv4BUF;
|
|
|
|
|
|
|
|
infrom->sin_family = AF_INET;
|
|
|
|
infrom->sin_port = udp->srcport;
|
|
|
|
|
|
|
|
net_ipv4addr_copy(infrom->sin_addr.s_addr,
|
|
|
|
net_ip4addr_conv32(ipv4->srcipaddr));
|
|
|
|
}
|
2007-11-23 20:25:39 +01:00
|
|
|
}
|
2015-01-18 15:56:05 +01:00
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
2007-11-23 20:25:39 +01:00
|
|
|
}
|
2015-01-18 15:56:05 +01:00
|
|
|
#endif /* CONFIG_NET_UDP */
|
2007-11-23 20:25:39 +01:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_udpinterrupt
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function is called from the interrupt level to perform the actual
|
2014-07-07 01:22:02 +02:00
|
|
|
* UDP receive operation via by the lower, device interfacing layer.
|
2007-11-08 17:01:18 +01:00
|
|
|
*
|
|
|
|
* Parameters:
|
2014-06-12 19:52:06 +02:00
|
|
|
* dev The structure of the network driver that caused the interrupt
|
2007-11-08 17:01:18 +01:00
|
|
|
* conn The connection structure associated with the socket
|
|
|
|
* flags Set of events describing why the callback was invoked
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
2014-06-28 00:48:12 +02:00
|
|
|
static uint16_t recvfrom_udpinterrupt(struct net_driver_s *dev, void *pvconn,
|
2009-12-15 16:57:25 +01:00
|
|
|
void *pvpriv, uint16_t flags)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
2009-06-17 01:23:31 +02:00
|
|
|
struct recvfrom_s *pstate = (struct recvfrom_s *)pvpriv;
|
2007-11-08 17:01:18 +01:00
|
|
|
|
2009-09-15 17:44:14 +02:00
|
|
|
nllvdbg("flags: %04x\n", flags);
|
2007-11-08 17:01:18 +01:00
|
|
|
|
2009-06-17 01:23:31 +02:00
|
|
|
/* 'priv' might be null in some race conditions (?) */
|
2007-11-08 17:01:18 +01:00
|
|
|
|
|
|
|
if (pstate)
|
|
|
|
{
|
|
|
|
/* If new data is available, then complete the read action. */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
if ((flags & UDP_NEWDATA) != 0)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
|
|
|
/* Copy the data from the packet */
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2012-02-23 03:07:38 +01:00
|
|
|
recvfrom_newudpdata(dev, pstate);
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* We are finished. */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2009-09-15 17:44:14 +02:00
|
|
|
nllvdbg("UDP done\n");
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Don't allow any further UDP call backs. */
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
2009-06-17 01:23:31 +02:00
|
|
|
pstate->rf_cb->priv = NULL;
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->event = NULL;
|
2007-11-08 17:01:18 +01:00
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/* Save the sender's address in the caller's 'from' location */
|
|
|
|
|
|
|
|
recvfrom_udpsender(dev, pstate);
|
|
|
|
|
2014-06-12 19:52:06 +02:00
|
|
|
/* Indicate that the data has been consumed */
|
2008-09-01 15:59:54 +02:00
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
flags &= ~UDP_NEWDATA;
|
2008-09-01 15:59:54 +02:00
|
|
|
|
2014-06-12 19:52:06 +02:00
|
|
|
/* Wake up the waiting thread, returning the number of bytes
|
2007-11-08 17:01:18 +01:00
|
|
|
* actually read.
|
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
sem_post(&pstate->rf_sem);
|
|
|
|
}
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2014-08-07 20:35:24 +02:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
2007-11-08 17:01:18 +01:00
|
|
|
/* No data has been received -- this is some other event... probably a
|
|
|
|
* poll -- check for a timeout.
|
|
|
|
*/
|
|
|
|
|
|
|
|
else if (recvfrom_timeout(pstate))
|
|
|
|
{
|
|
|
|
/* Yes.. the timeout has elapsed... do not allow any further
|
|
|
|
* callbacks
|
|
|
|
*/
|
|
|
|
|
2009-09-15 17:44:14 +02:00
|
|
|
nllvdbg("UDP timeout\n");
|
2007-11-08 17:01:18 +01:00
|
|
|
|
|
|
|
/* Stop further callbacks */
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
2009-06-17 01:23:31 +02:00
|
|
|
pstate->rf_cb->priv = NULL;
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->event = NULL;
|
2007-11-08 17:01:18 +01:00
|
|
|
|
|
|
|
/* Report a timeout error */
|
|
|
|
|
|
|
|
pstate->rf_result = -EAGAIN;
|
2007-11-30 22:45:41 +01:00
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
|
|
|
sem_post(&pstate->rf_sem);
|
2007-11-08 17:01:18 +01:00
|
|
|
}
|
2014-08-07 20:35:24 +02:00
|
|
|
#endif /* CONFIG_NET_SOCKOPTS */
|
2007-09-03 22:34:44 +02:00
|
|
|
}
|
2014-06-12 19:52:06 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
return flags;
|
2007-09-03 22:34:44 +02:00
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-09-09 21:47:52 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_init
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Initialize the state structure
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* psock Pointer to the socket structure for the socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* pstate A pointer to the state structure to be initialized
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2015-01-18 16:23:22 +01:00
|
|
|
static void recvfrom_init(FAR struct socket *psock, FAR void *buf,
|
|
|
|
size_t len, FAR struct sockaddr *infrom,
|
|
|
|
FAR struct recvfrom_s *pstate)
|
2007-09-09 21:47:52 +02:00
|
|
|
{
|
|
|
|
/* Initialize the state structure. */
|
|
|
|
|
|
|
|
memset(pstate, 0, sizeof(struct recvfrom_s));
|
|
|
|
(void)sem_init(&pstate->rf_sem, 0, 0); /* Doesn't really fail */
|
2007-11-20 00:09:39 +01:00
|
|
|
pstate->rf_buflen = len;
|
|
|
|
pstate->rf_buffer = buf;
|
2007-11-23 20:25:39 +01:00
|
|
|
pstate->rf_from = infrom;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
/* Set up the start time for the timeout */
|
|
|
|
|
2007-11-01 00:27:55 +01:00
|
|
|
pstate->rf_sock = psock;
|
2014-08-07 20:35:24 +02:00
|
|
|
#ifdef CONFIG_NET_SOCKOPTS
|
2011-04-13 23:44:24 +02:00
|
|
|
pstate->rf_starttime = clock_systimer();
|
2007-09-09 21:47:52 +02:00
|
|
|
#endif
|
|
|
|
}
|
2011-06-05 18:13:50 +02:00
|
|
|
|
2015-01-27 21:14:53 +01:00
|
|
|
/* The only un-initialization that has to be performed is destroying the
|
2011-06-05 18:13:50 +02:00
|
|
|
* semaphore.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define recvfrom_uninit(s) sem_destroy(&(s)->rf_sem)
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_result
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Evaluate the result of the recv operations
|
|
|
|
*
|
|
|
|
* Parameters:
|
2014-06-26 22:23:21 +02:00
|
|
|
* result The result of the net_lockedwait operation (may indicate EINTR)
|
2007-09-09 21:47:52 +02:00
|
|
|
* pstate A pointer to the state structure to be initialized
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* The result of the recv operation with errno set appropriately
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2007-09-09 21:47:52 +02:00
|
|
|
static ssize_t recvfrom_result(int result, struct recvfrom_s *pstate)
|
|
|
|
{
|
2009-08-15 19:19:08 +02:00
|
|
|
int save_errno = errno; /* In case something we do changes it */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
/* Check for a error/timeout detected by the interrupt handler. Errors are
|
|
|
|
* signaled by negative errno values for the rcv length
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (pstate->rf_result < 0)
|
|
|
|
{
|
2012-09-19 01:06:22 +02:00
|
|
|
/* This might return EAGAIN on a timeout or ENOTCONN on loss of
|
2012-02-18 19:13:30 +01:00
|
|
|
* connection (TCP only)
|
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
return pstate->rf_result;
|
|
|
|
}
|
|
|
|
|
2014-06-26 22:23:21 +02:00
|
|
|
/* If net_lockedwait failed, then we were probably reawakened by a signal. In
|
|
|
|
* this case, net_lockedwait will have set errno appropriately.
|
2007-09-09 21:47:52 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
if (result < 0)
|
|
|
|
{
|
|
|
|
return -save_errno;
|
|
|
|
}
|
|
|
|
|
|
|
|
return pstate->rf_recvlen;
|
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2015-01-17 15:33:14 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfromo_pkt_rxnotify
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Notify the appropriate device driver that we are ready to receive a
|
|
|
|
* packet (PKT)
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* conn - The PKT connection structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#if 0 /* Not implemented */
|
|
|
|
static void recvfromo_pkt_rxnotify(FAR struct pkt_conn_s *conn)
|
|
|
|
{
|
|
|
|
# warning Missing logic
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_udp_rxnotify
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Notify the appropriate device driver that we are ready to receive a
|
|
|
|
* packet (UDP)
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* psock - Socket state structure
|
|
|
|
* conn - The UDP connection structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2015-01-18 00:00:19 +01:00
|
|
|
#ifdef CONFIG_NET_UDP
|
2015-01-17 15:33:14 +01:00
|
|
|
static inline void recvfrom_udp_rxnotify(FAR struct socket *psock,
|
|
|
|
FAR struct udp_conn_s *conn)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
/* If both IPv4 and IPv6 support are enabled, then we will need to select
|
|
|
|
* the device driver using the appropriate IP domain.
|
|
|
|
*/
|
|
|
|
|
2015-01-17 16:27:05 +01:00
|
|
|
if (psock->s_domain == PF_INET)
|
2015-01-17 15:33:14 +01:00
|
|
|
#endif
|
|
|
|
{
|
|
|
|
/* Notify the device driver of the receive ready */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_MULTILINK
|
|
|
|
netdev_ipv4_rxnotify(conn->u.ipv4.laddr, conn->u.ipv4.raddr);
|
|
|
|
#else
|
|
|
|
netdev_ipv4_rxnotify(conn->u.ipv4.raddr);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
2015-01-17 16:27:05 +01:00
|
|
|
else /* if (psock->s_domain == PF_INET6) */
|
2015-01-17 15:33:14 +01:00
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
{
|
|
|
|
/* Notify the device driver of the receive ready */
|
|
|
|
|
2015-01-17 16:27:05 +01:00
|
|
|
DEBUGASSERT(psock->s_domain == PF_INET6);
|
2015-01-17 15:33:14 +01:00
|
|
|
#ifdef CONFIG_NET_MULTILINK
|
|
|
|
netdev_ipv6_rxnotify(conn->u.ipv6.laddr, conn->u.ipv6.raddr);
|
|
|
|
#else
|
|
|
|
netdev_ipv6_rxnotify(conn->u.ipv6.raddr);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
}
|
2015-01-18 00:00:19 +01:00
|
|
|
#endif /* CONFIG_NET_UDP */
|
2015-01-17 15:33:14 +01:00
|
|
|
|
2014-06-12 19:52:06 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: pkt_recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform the recvfrom operation for packet socket
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_PKT
|
|
|
|
static ssize_t pkt_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
2015-01-18 16:23:22 +01:00
|
|
|
FAR struct sockaddr *from)
|
2014-06-12 19:52:06 +02:00
|
|
|
{
|
2014-06-25 18:34:52 +02:00
|
|
|
FAR struct pkt_conn_s *conn = (FAR struct pkt_conn_s *)psock->s_conn;
|
2014-06-12 19:52:06 +02:00
|
|
|
struct recvfrom_s state;
|
2014-06-26 22:23:21 +02:00
|
|
|
net_lock_t save;
|
2014-06-12 19:52:06 +02:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Perform the packet recvfrom() operation */
|
|
|
|
|
|
|
|
/* Initialize the state structure. This is done with interrupts
|
|
|
|
* disabled because we don't want anything to happen until we
|
|
|
|
* are ready.
|
|
|
|
*/
|
|
|
|
|
2014-06-26 22:23:21 +02:00
|
|
|
save = net_lock();
|
2015-01-18 16:23:22 +01:00
|
|
|
recvfrom_init(psock, buf, len, from, &state);
|
2014-06-12 19:52:06 +02:00
|
|
|
|
|
|
|
/* TODO recvfrom_init() expects from to be of type sockaddr_in, but
|
|
|
|
* in our case is sockaddr_ll
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if 0
|
2014-06-25 18:34:52 +02:00
|
|
|
ret = pkt_connect(conn, NULL);
|
2014-06-12 19:52:06 +02:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
goto errout_with_state;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Set up the callback in the connection */
|
|
|
|
|
2014-06-29 02:36:09 +02:00
|
|
|
state.rf_cb = pkt_callback_alloc(conn);
|
2014-06-12 19:52:06 +02:00
|
|
|
if (state.rf_cb)
|
|
|
|
{
|
2014-07-07 01:22:02 +02:00
|
|
|
state.rf_cb->flags = (PKT_NEWDATA | PKT_POLL);
|
2014-06-12 19:52:06 +02:00
|
|
|
state.rf_cb->priv = (void*)&state;
|
|
|
|
state.rf_cb->event = recvfrom_pktinterrupt;
|
|
|
|
|
|
|
|
/* Notify the device driver of the receive call */
|
|
|
|
|
2015-01-17 15:33:14 +01:00
|
|
|
#if 0 /* Not implemented */
|
|
|
|
recvfromo_pkt_rxnotify(conn);
|
2014-11-23 18:00:22 +01:00
|
|
|
#endif
|
2014-06-12 19:52:06 +02:00
|
|
|
|
|
|
|
/* Wait for either the receive to complete or for an error/timeout to occur.
|
2014-06-26 22:23:21 +02:00
|
|
|
* NOTES: (1) net_lockedwait will also terminate if a signal is received, (2)
|
2014-06-12 19:52:06 +02:00
|
|
|
* interrupts are disabled! They will be re-enabled while the task sleeps
|
|
|
|
* and automatically re-enabled when the task restarts.
|
|
|
|
*/
|
|
|
|
|
2014-06-26 22:23:21 +02:00
|
|
|
ret = net_lockedwait(&state.rf_sem);
|
2014-06-12 19:52:06 +02:00
|
|
|
|
|
|
|
/* Make sure that no further interrupts are processed */
|
|
|
|
|
2014-06-29 02:36:09 +02:00
|
|
|
pkt_callback_free(conn, state.rf_cb);
|
2014-06-12 19:52:06 +02:00
|
|
|
ret = recvfrom_result(ret, &state);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = -EBUSY;
|
|
|
|
}
|
|
|
|
|
2014-06-12 20:29:58 +02:00
|
|
|
#if 0 /* Not used */
|
2014-06-12 19:52:06 +02:00
|
|
|
errout_with_state:
|
2014-06-12 20:29:58 +02:00
|
|
|
#endif
|
2014-06-26 22:23:21 +02:00
|
|
|
net_unlock(save);
|
2014-06-12 19:52:06 +02:00
|
|
|
recvfrom_uninit(&state);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_PKT */
|
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: udp_recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform the recvfrom operation for a UDP SOCK_DGRAM
|
|
|
|
*
|
|
|
|
* Parameters:
|
2015-01-18 16:23:22 +01:00
|
|
|
* psock Pointer to the socket structure for the SOCK_DRAM socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* from INET address of source (may be NULL)
|
2007-09-09 19:20:56 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error,
|
|
|
|
* -errno is returned (see recvfrom for list of errnos).
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
|
|
|
static ssize_t udp_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
2015-01-18 16:23:22 +01:00
|
|
|
FAR struct sockaddr *from)
|
2007-09-09 19:20:56 +02:00
|
|
|
{
|
2014-06-25 02:55:01 +02:00
|
|
|
FAR struct udp_conn_s *conn = (FAR struct udp_conn_s *)psock->s_conn;
|
|
|
|
struct recvfrom_s state;
|
2014-06-26 22:23:21 +02:00
|
|
|
net_lock_t save;
|
2014-06-25 02:55:01 +02:00
|
|
|
int ret;
|
2007-09-09 19:20:56 +02:00
|
|
|
|
|
|
|
/* Perform the UDP recvfrom() operation */
|
|
|
|
|
|
|
|
/* Initialize the state structure. This is done with interrupts
|
|
|
|
* disabled because we don't want anything to happen until we
|
|
|
|
* are ready.
|
|
|
|
*/
|
|
|
|
|
2014-06-26 22:23:21 +02:00
|
|
|
save = net_lock();
|
2015-01-18 16:23:22 +01:00
|
|
|
recvfrom_init(psock, buf, len, from, &state);
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/* Setup the UDP remote connection */
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2014-06-25 02:55:01 +02:00
|
|
|
ret = udp_connect(conn, NULL);
|
2007-09-09 21:47:52 +02:00
|
|
|
if (ret < 0)
|
2007-09-09 19:20:56 +02:00
|
|
|
{
|
2011-06-05 18:13:50 +02:00
|
|
|
goto errout_with_state;
|
2007-09-09 19:20:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Set up the callback in the connection */
|
|
|
|
|
2014-06-29 02:36:09 +02:00
|
|
|
state.rf_cb = udp_callback_alloc(conn);
|
2008-09-01 15:59:54 +02:00
|
|
|
if (state.rf_cb)
|
|
|
|
{
|
|
|
|
/* Set up the callback in the connection */
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
state.rf_cb->flags = (UDP_NEWDATA | UDP_POLL);
|
2009-06-17 01:23:31 +02:00
|
|
|
state.rf_cb->priv = (void*)&state;
|
2008-09-01 15:59:54 +02:00
|
|
|
state.rf_cb->event = recvfrom_udpinterrupt;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2013-09-06 18:19:07 +02:00
|
|
|
/* Notify the device driver of the receive call */
|
|
|
|
|
2015-01-17 15:33:14 +01:00
|
|
|
recvfrom_udp_rxnotify(psock, conn);
|
2013-09-06 18:19:07 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Wait for either the receive to complete or for an error/timeout to occur.
|
2014-06-26 22:23:21 +02:00
|
|
|
* NOTES: (1) net_lockedwait will also terminate if a signal is received, (2)
|
2008-09-01 15:59:54 +02:00
|
|
|
* interrupts are disabled! They will be re-enabled while the task sleeps
|
|
|
|
* and automatically re-enabled when the task restarts.
|
|
|
|
*/
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2014-06-26 22:23:21 +02:00
|
|
|
ret = net_lockedwait(&state. rf_sem);
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Make sure that no further interrupts are processed */
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2014-06-29 02:36:09 +02:00
|
|
|
udp_callback_free(conn, state.rf_cb);
|
2008-09-01 15:59:54 +02:00
|
|
|
ret = recvfrom_result(ret, &state);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = -EBUSY;
|
|
|
|
}
|
|
|
|
|
2011-06-05 18:13:50 +02:00
|
|
|
errout_with_state:
|
2014-06-26 22:23:21 +02:00
|
|
|
net_unlock(save);
|
2011-06-05 18:13:50 +02:00
|
|
|
recvfrom_uninit(&state);
|
2008-09-01 15:59:54 +02:00
|
|
|
return ret;
|
2007-09-09 19:20:56 +02:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_UDP */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Function: tcp_recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform the recvfrom operation for a TCP/IP SOCK_STREAM
|
|
|
|
*
|
|
|
|
* Parameters:
|
2015-01-18 16:23:22 +01:00
|
|
|
* psock Pointer to the socket structure for the SOCK_DRAM socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* from INET address of source (may be NULL)
|
2007-09-09 19:20:56 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error,
|
|
|
|
* -errno is returned (see recvfrom for list of errnos).
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#ifdef CONFIG_NET_TCP
|
2007-09-09 19:20:56 +02:00
|
|
|
static ssize_t tcp_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
2015-01-18 16:23:22 +01:00
|
|
|
FAR struct sockaddr *from)
|
2007-09-09 19:20:56 +02:00
|
|
|
{
|
2007-11-20 00:09:39 +01:00
|
|
|
struct recvfrom_s state;
|
2014-06-26 22:23:21 +02:00
|
|
|
net_lock_t save;
|
2011-06-06 01:29:38 +02:00
|
|
|
int ret;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
/* Initialize the state structure. This is done with interrupts
|
|
|
|
* disabled because we don't want anything to happen until we
|
|
|
|
* are ready.
|
|
|
|
*/
|
|
|
|
|
2014-06-26 22:23:21 +02:00
|
|
|
save = net_lock();
|
2015-01-18 16:23:22 +01:00
|
|
|
recvfrom_init(psock, buf, len, from, &state);
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2011-06-05 18:13:50 +02:00
|
|
|
/* Handle any any TCP data already buffered in a read-ahead buffer. NOTE
|
|
|
|
* that there may be read-ahead data to be retrieved even after the
|
|
|
|
* socket has been disconnected.
|
|
|
|
*/
|
|
|
|
|
2014-01-13 20:55:51 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_READAHEAD
|
2011-06-05 18:13:50 +02:00
|
|
|
recvfrom_readahead(&state);
|
2011-06-06 01:29:38 +02:00
|
|
|
|
2014-06-24 23:38:00 +02:00
|
|
|
/* The default return value is the number of bytes that we just copied
|
|
|
|
* into the user buffer. We will return this if the socket has become
|
|
|
|
* disconnected or if the user request was completely satisfied with
|
|
|
|
* data from the readahead buffers.
|
2011-06-06 01:29:38 +02:00
|
|
|
*/
|
2013-09-06 18:19:07 +02:00
|
|
|
|
2011-06-06 01:29:38 +02:00
|
|
|
ret = state.rf_recvlen;
|
|
|
|
|
|
|
|
#else
|
|
|
|
/* Otherwise, the default return value of zero is used (only for the case
|
|
|
|
* where len == state.rf_buflen is zero).
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = 0;
|
2011-06-05 18:13:50 +02:00
|
|
|
#endif
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2011-06-06 01:29:38 +02:00
|
|
|
/* Verify that the SOCK_STREAM has been and still is connected */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2011-06-05 18:13:50 +02:00
|
|
|
if (!_SS_ISCONNECTED(psock->s_flags))
|
|
|
|
{
|
|
|
|
/* Was any data transferred from the readahead buffer after we were
|
2012-02-18 19:13:30 +01:00
|
|
|
* disconnected? If so, then return the number of bytes received. We
|
|
|
|
* will wait to return end disconnection indications the next time that
|
|
|
|
* recvfrom() is called.
|
|
|
|
*
|
|
|
|
* If no data was received (i.e., ret == 0 -- it will not be negative)
|
|
|
|
* and the connection was gracefully closed by the remote peer, then return
|
|
|
|
* success. If rf_recvlen is zero, the caller of recvfrom() will get an
|
|
|
|
* end-of-file indication.
|
2011-06-05 18:13:50 +02:00
|
|
|
*/
|
|
|
|
|
2014-01-13 20:55:51 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_READAHEAD
|
2012-02-18 19:13:30 +01:00
|
|
|
if (ret <= 0 && !_SS_ISCLOSED(psock->s_flags))
|
|
|
|
#else
|
|
|
|
if (!_SS_ISCLOSED(psock->s_flags))
|
2011-06-06 01:29:38 +02:00
|
|
|
#endif
|
2011-06-05 18:13:50 +02:00
|
|
|
{
|
2011-06-06 01:29:38 +02:00
|
|
|
/* Nothing was previously received from the readahead buffers.
|
|
|
|
* The SOCK_STREAM must be (re-)connected in order to receive any
|
|
|
|
* additional data.
|
2011-06-05 18:13:50 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
ret = -ENOTCONN;
|
|
|
|
}
|
|
|
|
}
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2009-08-03 01:35:27 +02:00
|
|
|
/* In general, this uIP-based implementation will not support non-blocking
|
|
|
|
* socket operations... except in a few cases: Here for TCP receive with read-ahead
|
2009-07-19 15:50:08 +02:00
|
|
|
* enabled. If this socket is configured as non-blocking then return EAGAIN
|
|
|
|
* if no data was obtained from the read-ahead buffers.
|
|
|
|
*/
|
|
|
|
|
2011-06-06 01:29:38 +02:00
|
|
|
else
|
2014-01-13 20:55:51 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_READAHEAD
|
2009-07-19 15:50:08 +02:00
|
|
|
if (_SS_ISNONBLOCK(psock->s_flags))
|
|
|
|
{
|
2011-06-06 01:29:38 +02:00
|
|
|
/* Return the number of bytes read from the read-ahead buffer if
|
2012-09-19 01:06:22 +02:00
|
|
|
* something was received (already in 'ret'); EAGAIN if not.
|
2011-06-06 01:29:38 +02:00
|
|
|
*/
|
2009-07-19 15:50:08 +02:00
|
|
|
|
2011-06-06 01:29:38 +02:00
|
|
|
if (ret <= 0)
|
2009-07-19 15:50:08 +02:00
|
|
|
{
|
|
|
|
/* Nothing was received */
|
|
|
|
|
2009-08-15 19:19:08 +02:00
|
|
|
ret = -EAGAIN;
|
|
|
|
}
|
2009-07-19 15:50:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* It is okay to block if we need to. If there is space to receive anything
|
2011-06-06 01:29:38 +02:00
|
|
|
* more, then we will wait to receive the data. Otherwise return the number
|
|
|
|
* of bytes read from the read-ahead buffer (already in 'ret').
|
2007-09-09 21:47:52 +02:00
|
|
|
*/
|
|
|
|
|
2011-06-06 01:29:38 +02:00
|
|
|
else
|
2007-11-20 00:09:39 +01:00
|
|
|
#endif
|
2012-09-13 22:37:24 +02:00
|
|
|
|
|
|
|
/* We get here when we we decide that we need to setup the wait for incoming
|
|
|
|
* TCP/IP data. Just a few more conditions to check:
|
|
|
|
*
|
|
|
|
* 1) Make sure thet there is buffer space to receive additional data
|
|
|
|
* (state.rf_buflen > 0). This could be zero, for example, if read-ahead
|
|
|
|
* buffering was enabled and we filled the user buffer with data from
|
2014-06-12 19:52:06 +02:00
|
|
|
* the read-ahead buffers. And
|
2014-01-13 20:55:51 +01:00
|
|
|
* 2) if read-ahead buffering is enabled (CONFIG_NET_TCP_READAHEAD)
|
2012-09-13 22:37:24 +02:00
|
|
|
* and delay logic is disabled (CONFIG_NET_TCP_RECVDELAY == 0), then we
|
|
|
|
* not want to wait if we already obtained some data from the read-ahead
|
2012-09-14 00:04:47 +02:00
|
|
|
* buffer. In that case, return now with what we have (don't want for more
|
|
|
|
* because there may be no timeout).
|
2012-09-13 22:37:24 +02:00
|
|
|
*/
|
|
|
|
|
2014-01-13 20:55:51 +01:00
|
|
|
#if CONFIG_NET_TCP_RECVDELAY == 0 && defined(CONFIG_NET_TCP_READAHEAD)
|
2012-09-13 22:37:24 +02:00
|
|
|
if (state.rf_recvlen == 0 && state.rf_buflen > 0)
|
|
|
|
#else
|
2011-06-06 01:29:38 +02:00
|
|
|
if (state.rf_buflen > 0)
|
2012-09-13 22:37:24 +02:00
|
|
|
#endif
|
2007-11-20 00:09:39 +01:00
|
|
|
{
|
2014-06-25 02:12:49 +02:00
|
|
|
FAR struct tcp_conn_s *conn = (FAR struct tcp_conn_s *)psock->s_conn;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Set up the callback in the connection */
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2014-06-29 02:36:09 +02:00
|
|
|
state.rf_cb = tcp_callback_alloc(conn);
|
2008-09-01 15:59:54 +02:00
|
|
|
if (state.rf_cb)
|
|
|
|
{
|
2014-07-07 01:22:02 +02:00
|
|
|
state.rf_cb->flags = (TCP_NEWDATA | TCP_POLL | TCP_CLOSE |
|
|
|
|
TCP_ABORT | TCP_TIMEDOUT);
|
2009-06-17 01:23:31 +02:00
|
|
|
state.rf_cb->priv = (void*)&state;
|
2008-09-01 15:59:54 +02:00
|
|
|
state.rf_cb->event = recvfrom_tcpinterrupt;
|
|
|
|
|
2014-07-07 01:22:02 +02:00
|
|
|
/* Wait for either the receive to complete or for an error/timeout
|
|
|
|
* to occur.
|
|
|
|
*
|
|
|
|
* NOTES: (1) net_lockedwait will also terminate if a signal is
|
|
|
|
* received, (2) interrupts may be disabled! They will be re-
|
|
|
|
* enabled while the task sleeps and automatically re-enabled when
|
|
|
|
* the task restarts.
|
2008-09-01 15:59:54 +02:00
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2014-06-26 22:23:21 +02:00
|
|
|
ret = net_lockedwait(&state.rf_sem);
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Make sure that no further interrupts are processed */
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2014-06-29 02:36:09 +02:00
|
|
|
tcp_callback_free(conn, state.rf_cb);
|
2008-09-01 15:59:54 +02:00
|
|
|
ret = recvfrom_result(ret, &state);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = -EBUSY;
|
|
|
|
}
|
2007-11-20 00:09:39 +01:00
|
|
|
}
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2014-06-26 22:23:21 +02:00
|
|
|
net_unlock(save);
|
2011-06-05 18:13:50 +02:00
|
|
|
recvfrom_uninit(&state);
|
2011-06-06 01:29:38 +02:00
|
|
|
return (ssize_t)ret;
|
2007-09-09 19:20:56 +02:00
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_TCP */
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
/****************************************************************************
|
2015-01-19 23:02:56 +01:00
|
|
|
* Public Functions
|
2007-09-03 22:34:44 +02:00
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2012-01-30 22:29:59 +01:00
|
|
|
* Function: psock_recvfrom
|
2007-09-03 22:34:44 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* recvfrom() receives messages from a socket, and may be used to receive
|
|
|
|
* data on a socket whether or not it is connection-oriented.
|
|
|
|
*
|
|
|
|
* If from is not NULL, and the underlying protocol provides the source
|
|
|
|
* address, this source address is filled in. The argument fromlen
|
|
|
|
* initialized to the size of the buffer associated with from, and modified
|
|
|
|
* on return to indicate the actual size of the address stored there.
|
|
|
|
*
|
|
|
|
* Parameters:
|
2012-01-30 22:29:59 +01:00
|
|
|
* psock A pointer to a NuttX-specific, internal socket structure
|
2007-09-03 22:34:44 +02:00
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* flags Receive flags
|
2007-10-27 20:56:04 +02:00
|
|
|
* from Address of source (may be NULL)
|
2007-09-03 22:34:44 +02:00
|
|
|
* fromlen The length of the address structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
2012-02-18 19:13:30 +01:00
|
|
|
* On success, returns the number of characters sent. If no data is
|
|
|
|
* available to be received and the peer has performed an orderly shutdown,
|
2014-06-12 19:52:06 +02:00
|
|
|
* recv() will return 0. Otherwise, on errors, -1 is returned, and errno
|
2012-02-18 19:13:30 +01:00
|
|
|
* is set appropriately:
|
2007-09-03 22:34:44 +02:00
|
|
|
*
|
|
|
|
* EAGAIN
|
|
|
|
* The socket is marked non-blocking and the receive operation would block,
|
|
|
|
* or a receive timeout had been set and the timeout expired before data
|
|
|
|
* was received.
|
|
|
|
* EBADF
|
|
|
|
* The argument sockfd is an invalid descriptor.
|
|
|
|
* ECONNREFUSED
|
|
|
|
* A remote host refused to allow the network connection (typically because
|
|
|
|
* it is not running the requested service).
|
|
|
|
* EFAULT
|
|
|
|
* The receive buffer pointer(s) point outside the process's address space.
|
|
|
|
* EINTR
|
|
|
|
* The receive was interrupted by delivery of a signal before any data were
|
|
|
|
* available.
|
|
|
|
* EINVAL
|
|
|
|
* Invalid argument passed.
|
|
|
|
* ENOMEM
|
2007-09-08 17:26:55 +02:00
|
|
|
* Could not allocate memory.
|
2007-09-03 22:34:44 +02:00
|
|
|
* ENOTCONN
|
|
|
|
* The socket is associated with a connection-oriented protocol and has
|
|
|
|
* not been connected.
|
|
|
|
* ENOTSOCK
|
|
|
|
* The argument sockfd does not refer to a socket.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2012-01-30 22:29:59 +01:00
|
|
|
ssize_t psock_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
2015-01-27 01:47:48 +01:00
|
|
|
int flags, FAR struct sockaddr *from,
|
2012-01-30 22:29:59 +01:00
|
|
|
FAR socklen_t *fromlen)
|
2007-09-03 22:34:44 +02:00
|
|
|
{
|
2007-09-09 19:20:56 +02:00
|
|
|
ssize_t ret;
|
2007-09-03 22:34:44 +02:00
|
|
|
int err;
|
2007-09-09 19:20:56 +02:00
|
|
|
|
|
|
|
/* Verify that non-NULL pointers were passed */
|
|
|
|
|
2008-11-18 18:24:50 +01:00
|
|
|
#ifdef CONFIG_DEBUG
|
2007-10-27 20:56:04 +02:00
|
|
|
if (!buf)
|
2007-09-09 19:20:56 +02:00
|
|
|
{
|
|
|
|
err = EINVAL;
|
|
|
|
goto errout;
|
|
|
|
}
|
2008-11-18 18:24:50 +01:00
|
|
|
#endif
|
2007-09-03 22:34:44 +02:00
|
|
|
|
|
|
|
/* Verify that the sockfd corresponds to valid, allocated socket */
|
|
|
|
|
|
|
|
if (!psock || psock->s_crefs <= 0)
|
|
|
|
{
|
|
|
|
err = EBADF;
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/* If a 'from' address has been provided, verify that it is large
|
|
|
|
* enough to hold this address family.
|
|
|
|
*/
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-10-27 20:56:04 +02:00
|
|
|
if (from)
|
|
|
|
{
|
2015-01-18 16:23:22 +01:00
|
|
|
socklen_t minlen;
|
|
|
|
|
|
|
|
/* Get the minimum socket length */
|
|
|
|
|
2015-01-27 21:26:10 +01:00
|
|
|
switch (psock->s_domain)
|
|
|
|
{
|
2015-01-18 16:23:22 +01:00
|
|
|
#ifdef CONFIG_NET_IPv4
|
2015-01-27 21:26:10 +01:00
|
|
|
case PF_INET:
|
|
|
|
{
|
|
|
|
minlen = sizeof(struct sockaddr_in);
|
|
|
|
}
|
|
|
|
break;
|
2007-09-09 19:20:56 +02:00
|
|
|
#endif
|
2015-01-18 16:23:22 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
2015-01-27 21:26:10 +01:00
|
|
|
case PF_INET6:
|
|
|
|
{
|
|
|
|
minlen = sizeof(struct sockaddr_in6);
|
|
|
|
}
|
|
|
|
break;
|
2015-01-18 16:23:22 +01:00
|
|
|
#endif
|
2015-01-27 21:26:10 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_LOCAL
|
|
|
|
case PF_LOCAL:
|
|
|
|
{
|
|
|
|
minlen = sizeof(sa_family_t);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
|
|
|
DEBUGPANIC();
|
|
|
|
err = EINVAL;
|
|
|
|
goto errout;
|
2015-01-18 16:23:22 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (*fromlen < minlen)
|
2007-10-27 20:56:04 +02:00
|
|
|
{
|
2007-11-23 20:25:39 +01:00
|
|
|
err = EINVAL;
|
2007-10-27 20:56:04 +02:00
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
}
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/* Set the socket state to receiving */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
psock->s_flags = _SS_SETSTATE(psock->s_flags, _SF_RECV);
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2014-06-12 19:52:06 +02:00
|
|
|
/* Read from the network interface driver buffer */
|
|
|
|
/* Or perform the TCP/IP or UDP recv() operation */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2015-01-27 01:47:48 +01:00
|
|
|
switch (psock->s_type)
|
2014-06-12 19:52:06 +02:00
|
|
|
{
|
2015-01-27 01:47:48 +01:00
|
|
|
#ifdef CONFIG_NET_PKT
|
|
|
|
case SOCK_RAW:
|
|
|
|
{
|
|
|
|
ret = pkt_recvfrom(psock, buf, len, from);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_PKT */
|
|
|
|
|
|
|
|
#if defined(CONFIG_NET_TCP) || defined(CONFIG_NET_LOCAL)
|
|
|
|
case SOCK_STREAM:
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_LOCAL
|
|
|
|
#ifdef CONFIG_NET_TCP
|
|
|
|
if (psock->s_domain == PF_LOCAL)
|
2014-06-12 19:52:06 +02:00
|
|
|
#endif
|
2015-01-27 01:47:48 +01:00
|
|
|
{
|
|
|
|
ret = psock_local_recvfrom(psock, buf, len, flags,
|
|
|
|
from, fromlen);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_LOCAL */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP
|
|
|
|
#ifdef CONFIG_NET_LOCAL
|
|
|
|
else
|
2014-06-12 19:52:06 +02:00
|
|
|
#endif
|
2015-01-27 01:47:48 +01:00
|
|
|
{
|
|
|
|
ret = tcp_recvfrom(psock, buf, len, from);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_TCP */
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_TCP || CONFIG_NET_LOCAL */
|
|
|
|
|
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_LOCAL)
|
|
|
|
case SOCK_DGRAM:
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_LOCAL
|
|
|
|
#ifdef CONFIG_NET_UDP
|
|
|
|
if (psock->s_domain == PF_LOCAL)
|
2007-09-08 23:54:43 +02:00
|
|
|
#endif
|
2015-01-27 01:47:48 +01:00
|
|
|
{
|
|
|
|
ret = psock_local_recvfrom(psock, buf, len, flags,
|
|
|
|
from, fromlen);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_LOCAL */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
|
|
|
#ifdef CONFIG_NET_LOCAL
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
ret = udp_recvfrom(psock, buf, len, from);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_UDP */
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_LOCAL */
|
|
|
|
|
|
|
|
default:
|
|
|
|
{
|
|
|
|
ndbg("ERROR: Unsupported socket type: %d\n", psock->s_type);
|
|
|
|
ret = -ENOSYS;
|
|
|
|
}
|
|
|
|
break;
|
2014-06-12 19:52:06 +02:00
|
|
|
}
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/* Set the socket state to idle */
|
|
|
|
|
|
|
|
psock->s_flags = _SS_SETSTATE(psock->s_flags, _SF_IDLE);
|
|
|
|
|
|
|
|
/* Handle returned errors */
|
2007-09-05 02:13:18 +02:00
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
2007-09-09 19:20:56 +02:00
|
|
|
err = -ret;
|
|
|
|
goto errout;
|
2007-09-05 02:13:18 +02:00
|
|
|
}
|
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/* Success return */
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
return ret;
|
2007-09-03 22:34:44 +02:00
|
|
|
|
|
|
|
errout:
|
2009-08-15 19:19:08 +02:00
|
|
|
errno = err;
|
2007-09-03 22:34:44 +02:00
|
|
|
return ERROR;
|
|
|
|
}
|
|
|
|
|
2012-01-30 22:29:59 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* recvfrom() receives messages from a socket, and may be used to receive
|
|
|
|
* data on a socket whether or not it is connection-oriented.
|
|
|
|
*
|
|
|
|
* If from is not NULL, and the underlying protocol provides the source
|
|
|
|
* address, this source address is filled in. The argument fromlen
|
|
|
|
* initialized to the size of the buffer associated with from, and modified
|
|
|
|
* on return to indicate the actual size of the address stored there.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* sockfd Socket descriptor of socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* flags Receive flags
|
|
|
|
* from Address of source (may be NULL)
|
|
|
|
* fromlen The length of the address structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error,
|
|
|
|
* -1 is returned, and errno is set appropriately:
|
|
|
|
*
|
|
|
|
* EAGAIN
|
|
|
|
* The socket is marked non-blocking and the receive operation would block,
|
|
|
|
* or a receive timeout had been set and the timeout expired before data
|
|
|
|
* was received.
|
|
|
|
* EBADF
|
|
|
|
* The argument sockfd is an invalid descriptor.
|
|
|
|
* ECONNREFUSED
|
|
|
|
* A remote host refused to allow the network connection (typically because
|
|
|
|
* it is not running the requested service).
|
|
|
|
* EFAULT
|
|
|
|
* The receive buffer pointer(s) point outside the process's address space.
|
|
|
|
* EINTR
|
|
|
|
* The receive was interrupted by delivery of a signal before any data were
|
|
|
|
* available.
|
|
|
|
* EINVAL
|
|
|
|
* Invalid argument passed.
|
|
|
|
* ENOMEM
|
|
|
|
* Could not allocate memory.
|
|
|
|
* ENOTCONN
|
|
|
|
* The socket is associated with a connection-oriented protocol and has
|
|
|
|
* not been connected.
|
|
|
|
* ENOTSOCK
|
|
|
|
* The argument sockfd does not refer to a socket.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
ssize_t recvfrom(int sockfd, FAR void *buf, size_t len, int flags,
|
|
|
|
FAR struct sockaddr *from, FAR socklen_t *fromlen)
|
|
|
|
{
|
|
|
|
FAR struct socket *psock;
|
|
|
|
|
|
|
|
/* Get the underlying socket structure */
|
|
|
|
|
|
|
|
psock = sockfd_socket(sockfd);
|
|
|
|
|
|
|
|
/* Then let psock_recvfrom() do all of the work */
|
|
|
|
|
|
|
|
return psock_recvfrom(psock, buf, len, flags, from, fromlen);
|
|
|
|
}
|
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
#endif /* CONFIG_NET */
|