2007-09-03 22:34:44 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* net/recvfrom.c
|
|
|
|
*
|
2009-03-15 17:02:25 +01:00
|
|
|
* Copyright (C) 2007-2009 Gregory Nutt. All rights reserved.
|
2007-09-03 22:34:44 +02:00
|
|
|
* Author: Gregory Nutt <spudmonkey@racsa.co.cr>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name NuttX nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
#ifdef CONFIG_NET
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
2007-11-06 00:04:16 +01:00
|
|
|
#include <debug.h>
|
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
#include <arch/irq.h>
|
2007-09-09 13:58:50 +02:00
|
|
|
#include <nuttx/clock.h>
|
2007-09-16 00:45:45 +02:00
|
|
|
#include <net/uip/uip-arch.h>
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2008-12-12 19:33:36 +01:00
|
|
|
#include "net_internal.h"
|
2008-12-12 20:02:28 +01:00
|
|
|
#include "uip/uip_internal.h"
|
2007-09-03 22:34:44 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Definitions
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-09-09 21:47:52 +02:00
|
|
|
#define TCP_TIMEO 10 /* Deciseconds after data received before recv() returns */
|
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
#define UDPBUF ((struct uip_udpip_hdr *)&dev->d_buf[UIP_LLH_LEN])
|
|
|
|
#define TCPBUF ((struct uip_tcpip_hdr *)&dev->d_buf[UIP_LLH_LEN])
|
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2007-09-03 22:34:44 +02:00
|
|
|
struct recvfrom_s
|
|
|
|
{
|
2008-09-01 15:59:54 +02:00
|
|
|
FAR struct socket *rf_sock; /* The parent socket structure */
|
2008-12-12 17:55:51 +01:00
|
|
|
#if defined(CONFIG_NET_SOCKOPTS) && !defined(CONFIG_DISABLE_CLOCK)
|
2008-09-01 15:59:54 +02:00
|
|
|
uint32 rf_starttime; /* rcv start time for determining timeout */
|
2007-09-08 23:54:43 +02:00
|
|
|
#endif
|
2008-09-01 15:59:54 +02:00
|
|
|
FAR struct uip_callback_s *rf_cb; /* Reference to callback instance */
|
|
|
|
sem_t rf_sem; /* Semaphore signals recv completion */
|
|
|
|
size_t rf_buflen; /* Length of receive buffer */
|
|
|
|
char *rf_buffer; /* Pointer to receive buffer */
|
2007-11-23 20:25:39 +01:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
2008-09-01 15:59:54 +02:00
|
|
|
FAR struct sockaddr_in6 *rf_from; /* Address of sender */
|
2007-11-23 20:25:39 +01:00
|
|
|
#else
|
2008-09-01 15:59:54 +02:00
|
|
|
FAR struct sockaddr_in *rf_from; /* Address of sender */
|
2007-11-23 20:25:39 +01:00
|
|
|
#endif
|
2008-09-01 15:59:54 +02:00
|
|
|
size_t rf_recvlen; /* The received length */
|
|
|
|
int rf_result; /* OK:success, failure:negated errno */
|
2007-09-03 22:34:44 +02:00
|
|
|
};
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-09-16 00:45:45 +02:00
|
|
|
/****************************************************************************
|
2007-11-08 17:01:18 +01:00
|
|
|
* Function: recvfrom_newdata
|
2007-09-16 00:45:45 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2007-11-08 17:01:18 +01:00
|
|
|
* Copy the read data from the packet
|
2007-09-16 00:45:45 +02:00
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* dev The sructure of the network driver that caused the interrupt
|
2007-11-08 17:01:18 +01:00
|
|
|
* pstate recvfrom state structure
|
2007-09-16 00:45:45 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2007-11-08 17:01:18 +01:00
|
|
|
static void recvfrom_newdata(struct uip_driver_s *dev, struct recvfrom_s *pstate)
|
2007-09-03 22:34:44 +02:00
|
|
|
{
|
|
|
|
size_t recvlen;
|
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Get the length of the data to return */
|
2007-09-05 02:13:18 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
if (dev->d_len > pstate->rf_buflen)
|
|
|
|
{
|
|
|
|
recvlen = pstate->rf_buflen;
|
|
|
|
}
|
|
|
|
else
|
2007-09-03 22:34:44 +02:00
|
|
|
{
|
2007-11-08 17:01:18 +01:00
|
|
|
recvlen = dev->d_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy the new appdata into the user buffer */
|
|
|
|
|
|
|
|
memcpy(pstate->rf_buffer, dev->d_appdata, recvlen);
|
2009-03-15 17:02:25 +01:00
|
|
|
nvdbg("Received %d bytes (of %d)\n", (int)recvlen, (int)dev->d_len);
|
2007-11-08 17:01:18 +01:00
|
|
|
|
|
|
|
/* Update the accumulated size of the data read */
|
|
|
|
|
|
|
|
pstate->rf_recvlen += recvlen;
|
|
|
|
pstate->rf_buffer += recvlen;
|
|
|
|
pstate->rf_buflen -= recvlen;
|
2007-11-15 23:38:32 +01:00
|
|
|
|
|
|
|
/* Indicate no data in the buffer */
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
2007-11-08 17:01:18 +01:00
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-11-08 17:01:18 +01:00
|
|
|
|
2007-11-20 00:09:39 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_readahead
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Copy the read data from the packet
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* dev The sructure of the network driver that caused the interrupt
|
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_TCP) && CONFIG_NET_NTCP_READAHEAD_BUFFERS > 0
|
2007-11-20 00:09:39 +01:00
|
|
|
static inline void recvfrom_readahead(struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
struct uip_conn *conn = (struct uip_conn *)pstate->rf_sock->s_conn;
|
|
|
|
struct uip_readahead_s *readahead;
|
|
|
|
size_t recvlen;
|
|
|
|
|
|
|
|
/* Check there is any TCP data already buffered in a read-ahead
|
|
|
|
* buffer.
|
|
|
|
*/
|
|
|
|
|
|
|
|
do
|
|
|
|
{
|
|
|
|
/* Get the read-ahead buffer at the head of the list (if any) */
|
|
|
|
|
|
|
|
readahead = (struct uip_readahead_s *)sq_remfirst(&conn->readahead);
|
|
|
|
if (readahead)
|
|
|
|
{
|
|
|
|
/* We have a new buffer... transfer that buffered data into
|
|
|
|
* the user buffer.
|
|
|
|
*
|
|
|
|
* First, get the length of the data to transfer.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (readahead->rh_nbytes > pstate->rf_buflen)
|
|
|
|
{
|
|
|
|
recvlen = pstate->rf_buflen;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
recvlen = readahead->rh_nbytes;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (recvlen > 0)
|
|
|
|
{
|
|
|
|
/* Copy the read-ahead data into the user buffer */
|
|
|
|
|
|
|
|
memcpy(pstate->rf_buffer, readahead->rh_buffer, recvlen);
|
2007-11-23 23:32:52 +01:00
|
|
|
nvdbg("Received %d bytes (of %d)\n", recvlen, readahead->rh_nbytes);
|
2007-11-20 00:09:39 +01:00
|
|
|
|
|
|
|
/* Update the accumulated size of the data read */
|
|
|
|
|
|
|
|
pstate->rf_recvlen += recvlen;
|
|
|
|
pstate->rf_buffer += recvlen;
|
|
|
|
pstate->rf_buflen -= recvlen;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If the read-ahead buffer is empty, then release it. If not, then
|
|
|
|
* we will have to move the data down and return the buffer to the
|
|
|
|
* front of the list.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (recvlen < readahead->rh_nbytes)
|
|
|
|
{
|
|
|
|
readahead->rh_nbytes -= recvlen;
|
|
|
|
memcpy(readahead->rh_buffer, &readahead->rh_buffer[recvlen],
|
|
|
|
readahead->rh_nbytes);
|
|
|
|
sq_addfirst(&readahead->rh_node, &conn->readahead);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
uip_tcpreadaheadrelease(readahead);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
while (readahead && pstate->rf_buflen > 0);
|
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_timeout
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Check for recvfrom timeout.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* pstate recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* TRUE:timeout FALSE:no timeout
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2007-11-01 00:27:55 +01:00
|
|
|
#if defined(CONFIG_NET_SOCKOPTS) && !defined(CONFIG_DISABLE_CLOCK)
|
2007-11-08 17:01:18 +01:00
|
|
|
static int recvfrom_timeout(struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
FAR struct socket *psock = 0;
|
|
|
|
socktimeo_t timeo = 0;
|
|
|
|
|
|
|
|
/* If this is a TCP socket that has already received some data,
|
|
|
|
* than we will always use a short timeout.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (pstate->rf_recvlen > 0)
|
|
|
|
{
|
|
|
|
/* Use the short timeout */
|
|
|
|
|
|
|
|
timeo = TCP_TIMEO;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* No.. check for a timeout configured via setsockopts(SO_RCVTIMEO).
|
|
|
|
* If none... we well let the read hang forever.
|
|
|
|
*/
|
|
|
|
|
|
|
|
else
|
|
|
|
{
|
2007-09-09 21:47:52 +02:00
|
|
|
/* Get the socket reference from the private data */
|
|
|
|
|
|
|
|
psock = pstate->rf_sock;
|
2007-11-08 17:01:18 +01:00
|
|
|
if (psock)
|
|
|
|
{
|
|
|
|
timeo = psock->s_rcvtimeo;
|
|
|
|
}
|
|
|
|
}
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Is there an effective timeout? */
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
if (timeo)
|
|
|
|
{
|
|
|
|
/* Yes.. Check if the timeout has elapsed */
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
return net_timeo(pstate->rf_starttime, timeo);
|
|
|
|
}
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* No timeout */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_SOCKOPTS && !CONFIG_DISABLE_CLOCK */
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_tcpsender
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Getting the sender's address from the UDP packet
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* dev - The device driver data structure
|
|
|
|
* pstate - the recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_TCP
|
|
|
|
static inline void recvfrom_tcpsender(struct uip_driver_s *dev, struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
FAR struct sockaddr_in6 *infrom = pstate->rf_from;
|
|
|
|
#else
|
|
|
|
FAR struct sockaddr_in *infrom = pstate->rf_from;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
infrom->sin_family = AF_INET;
|
|
|
|
infrom->sin_port = TCPBUF->srcport;
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
uip_ipaddr_copy(infrom->sin_addr.s_addr, TCPBUF->srcipaddr);
|
|
|
|
#else
|
|
|
|
uip_ipaddr_copy(infrom->sin_addr.s_addr, uip_ip4addr_conv(TCPBUF->srcipaddr));
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_tcpinterrupt
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function is called from the interrupt level to perform the actual
|
|
|
|
* TCP receive operation via by the uIP layer.
|
|
|
|
*
|
|
|
|
* Parameters:
|
2008-11-18 18:24:50 +01:00
|
|
|
* dev The structure of the network driver that caused the interrupt
|
2007-11-08 17:01:18 +01:00
|
|
|
* conn The connection structure associated with the socket
|
|
|
|
* flags Set of events describing why the callback was invoked
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#ifdef CONFIG_NET_TCP
|
2008-09-01 15:59:54 +02:00
|
|
|
static uint16 recvfrom_tcpinterrupt(struct uip_driver_s *dev, void *conn,
|
|
|
|
void *pvprivate, uint16 flags)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
2008-09-01 15:59:54 +02:00
|
|
|
struct recvfrom_s *pstate = (struct recvfrom_s *)pvprivate;
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
nvdbg("flags: %04x\n", flags);
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* 'private' might be null in some race conditions (?) */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
if (pstate)
|
|
|
|
{
|
|
|
|
/* If new data is available, then complete the read action. */
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2007-11-27 20:19:30 +01:00
|
|
|
if ((flags & UIP_NEWDATA) != 0)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
|
|
|
/* Copy the data from the packet */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
recvfrom_newdata(dev, pstate);
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/* Save the sender's address in the caller's 'from' location */
|
|
|
|
|
|
|
|
recvfrom_tcpsender(dev, pstate);
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Indicate that the data has been consumed and that an ACK
|
|
|
|
* should be sent.
|
|
|
|
*/
|
|
|
|
|
|
|
|
flags = (flags & ~UIP_NEWDATA) | UIP_SNDACK;
|
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* If the user buffer has been filled, then we are finished. */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
if (pstate->rf_buflen == 0)
|
|
|
|
{
|
2007-11-23 23:32:52 +01:00
|
|
|
nvdbg("TCP resume\n");
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2007-09-09 21:47:52 +02:00
|
|
|
/* The TCP receive buffer is full. Return now, perhaps truncating
|
|
|
|
* the received data (need to fix that).
|
|
|
|
*
|
|
|
|
* Don't allow any further TCP call backs.
|
|
|
|
*/
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
|
|
|
pstate->rf_cb->private = NULL;
|
|
|
|
pstate->rf_cb->event = NULL;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
/* Wake up the waiting thread, returning the number of bytes
|
|
|
|
* actually read.
|
|
|
|
*/
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-09-09 21:47:52 +02:00
|
|
|
sem_post(&pstate->rf_sem);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Reset the timeout. We will want a short timeout to terminate
|
2007-11-06 00:04:16 +01:00
|
|
|
* the TCP receive.
|
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-01 00:27:55 +01:00
|
|
|
#if defined(CONFIG_NET_SOCKOPTS) && !defined(CONFIG_DISABLE_CLOCK)
|
2007-09-09 21:47:52 +02:00
|
|
|
pstate->rf_starttime = g_system_timer;
|
|
|
|
#endif
|
2007-09-08 23:54:43 +02:00
|
|
|
}
|
|
|
|
|
2007-09-16 00:45:45 +02:00
|
|
|
/* Check for a loss of connection */
|
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
else if ((flags & (UIP_CLOSE|UIP_ABORT|UIP_TIMEDOUT)) != 0)
|
2007-09-16 00:45:45 +02:00
|
|
|
{
|
2007-11-23 23:32:52 +01:00
|
|
|
nvdbg("error\n");
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2007-09-16 00:45:45 +02:00
|
|
|
/* Stop further callbacks */
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
|
|
|
pstate->rf_cb->private = NULL;
|
|
|
|
pstate->rf_cb->event = NULL;
|
2007-09-16 00:45:45 +02:00
|
|
|
|
|
|
|
/* Report not connected */
|
|
|
|
|
|
|
|
pstate->rf_result = -ENOTCONN;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
|
|
|
sem_post(&pstate->rf_sem);
|
|
|
|
}
|
|
|
|
|
2007-09-09 00:41:00 +02:00
|
|
|
/* No data has been received -- this is some other event... probably a
|
|
|
|
* poll -- check for a timeout.
|
2007-09-05 02:13:18 +02:00
|
|
|
*/
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-11-01 00:27:55 +01:00
|
|
|
#if defined(CONFIG_NET_SOCKOPTS) && !defined(CONFIG_DISABLE_CLOCK)
|
2007-11-08 17:01:18 +01:00
|
|
|
else if (recvfrom_timeout(pstate))
|
2007-09-08 23:54:43 +02:00
|
|
|
{
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Yes.. the timeout has elapsed... do not allow any further
|
|
|
|
* callbacks
|
2007-09-09 21:47:52 +02:00
|
|
|
*/
|
|
|
|
|
2007-11-23 23:32:52 +01:00
|
|
|
nvdbg("TCP timeout\n");
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
|
|
|
pstate->rf_cb->private = NULL;
|
|
|
|
pstate->rf_cb->event = NULL;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Report an error only if no data has been received */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
if (pstate->rf_recvlen == 0)
|
2007-09-09 21:47:52 +02:00
|
|
|
{
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Report the timeout error */
|
|
|
|
|
|
|
|
pstate->rf_result = -EAGAIN;
|
2007-09-09 21:47:52 +02:00
|
|
|
}
|
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Wake up the waiting thread, returning either the error -EAGAIN
|
|
|
|
* that signals the timeout event or the data received up to
|
|
|
|
* the point tht the timeout occured (no error).
|
|
|
|
*/
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
sem_post(&pstate->rf_sem);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_SOCKOPTS && !CONFIG_DISABLE_CLOCK */
|
|
|
|
}
|
2007-11-15 23:38:32 +01:00
|
|
|
return flags;
|
2007-11-08 17:01:18 +01:00
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_TCP */
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_udpsender
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Getting the sender's address from the UDP packet
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* dev - The device driver data structure
|
|
|
|
* pstate - the recvfrom state structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
|
|
|
static inline void recvfrom_udpsender(struct uip_driver_s *dev, struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
FAR struct sockaddr_in6 *infrom = pstate->rf_from;
|
|
|
|
#else
|
|
|
|
FAR struct sockaddr_in *infrom = pstate->rf_from;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (infrom)
|
|
|
|
{
|
|
|
|
infrom->sin_family = AF_INET;
|
|
|
|
infrom->sin_port = UDPBUF->srcport;
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
uip_ipaddr_copy(infrom->sin_addr.s_addr, UDPBUF->srcipaddr);
|
|
|
|
#else
|
|
|
|
uip_ipaddr_copy(infrom->sin_addr.s_addr, uip_ip4addr_conv(UDPBUF->srcipaddr));
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_udpinterrupt
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* This function is called from the interrupt level to perform the actual
|
|
|
|
* UDP receive operation via by the uIP layer.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* dev The sructure of the network driver that caused the interrupt
|
|
|
|
* conn The connection structure associated with the socket
|
|
|
|
* flags Set of events describing why the callback was invoked
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Running at the interrupt level
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
2008-09-01 15:59:54 +02:00
|
|
|
static uint16 recvfrom_udpinterrupt(struct uip_driver_s *dev, void *pvconn,
|
|
|
|
void *pvprivate, uint16 flags)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
2008-09-01 15:59:54 +02:00
|
|
|
struct recvfrom_s *pstate = (struct recvfrom_s *)pvprivate;
|
2007-11-08 17:01:18 +01:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
nvdbg("flags: %04x\n", flags);
|
2007-11-08 17:01:18 +01:00
|
|
|
|
|
|
|
/* 'private' might be null in some race conditions (?) */
|
|
|
|
|
|
|
|
if (pstate)
|
|
|
|
{
|
|
|
|
/* If new data is available, then complete the read action. */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-27 20:19:30 +01:00
|
|
|
if ((flags & UIP_NEWDATA) != 0)
|
2007-11-08 17:01:18 +01:00
|
|
|
{
|
|
|
|
/* Copy the data from the packet */
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
recvfrom_newdata(dev, pstate);
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* We are finished. */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-23 23:32:52 +01:00
|
|
|
nvdbg("UDP done\n");
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Don't allow any further UDP call backs. */
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
|
|
|
pstate->rf_cb->private = NULL;
|
|
|
|
pstate->rf_cb->event = NULL;
|
2007-11-08 17:01:18 +01:00
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/* Save the sender's address in the caller's 'from' location */
|
|
|
|
|
|
|
|
recvfrom_udpsender(dev, pstate);
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Indicate that the data has been consumed */
|
|
|
|
|
|
|
|
flags &= ~UIP_NEWDATA;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread, returning the number of bytes
|
2007-11-08 17:01:18 +01:00
|
|
|
* actually read.
|
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
sem_post(&pstate->rf_sem);
|
|
|
|
}
|
2007-11-06 00:04:16 +01:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Check for a loss of connection */
|
|
|
|
|
|
|
|
else if ((flags & (UIP_CLOSE|UIP_ABORT|UIP_TIMEDOUT)) != 0)
|
|
|
|
{
|
2007-11-23 23:32:52 +01:00
|
|
|
nvdbg("error\n");
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Stop further callbacks */
|
2007-09-09 00:41:00 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
|
|
|
pstate->rf_cb->private = NULL;
|
|
|
|
pstate->rf_cb->event = NULL;
|
2007-09-09 00:41:00 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Report not connected */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
pstate->rf_result = -ENOTCONN;
|
2007-09-09 00:41:00 +02:00
|
|
|
|
2007-11-08 17:01:18 +01:00
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
|
|
|
sem_post(&pstate->rf_sem);
|
2007-09-08 23:54:43 +02:00
|
|
|
}
|
2007-11-08 17:01:18 +01:00
|
|
|
|
|
|
|
/* No data has been received -- this is some other event... probably a
|
|
|
|
* poll -- check for a timeout.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if defined(CONFIG_NET_SOCKOPTS) && !defined(CONFIG_DISABLE_CLOCK)
|
|
|
|
else if (recvfrom_timeout(pstate))
|
|
|
|
{
|
|
|
|
/* Yes.. the timeout has elapsed... do not allow any further
|
|
|
|
* callbacks
|
|
|
|
*/
|
|
|
|
|
2007-11-23 23:32:52 +01:00
|
|
|
nvdbg("UDP timeout\n");
|
2007-11-08 17:01:18 +01:00
|
|
|
|
|
|
|
/* Stop further callbacks */
|
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
pstate->rf_cb->flags = 0;
|
|
|
|
pstate->rf_cb->private = NULL;
|
|
|
|
pstate->rf_cb->event = NULL;
|
2007-11-08 17:01:18 +01:00
|
|
|
|
|
|
|
/* Report a timeout error */
|
|
|
|
|
|
|
|
pstate->rf_result = -EAGAIN;
|
2007-11-30 22:45:41 +01:00
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
|
|
|
sem_post(&pstate->rf_sem);
|
2007-11-08 17:01:18 +01:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_SOCKOPTS && !CONFIG_DISABLE_CLOCK */
|
2007-09-03 22:34:44 +02:00
|
|
|
}
|
2008-09-01 15:59:54 +02:00
|
|
|
return flags;
|
2007-09-03 22:34:44 +02:00
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-09-09 21:47:52 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_init
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Initialize the state structure
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* psock Pointer to the socket structure for the socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* pstate A pointer to the state structure to be initialized
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2007-09-09 21:47:52 +02:00
|
|
|
static void recvfrom_init(FAR struct socket *psock, FAR void *buf, size_t len,
|
2007-11-23 20:25:39 +01:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
FAR struct sockaddr_in6 *infrom,
|
|
|
|
#else
|
|
|
|
FAR struct sockaddr_in *infrom,
|
|
|
|
#endif
|
2007-09-09 21:47:52 +02:00
|
|
|
struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
/* Initialize the state structure. */
|
|
|
|
|
|
|
|
memset(pstate, 0, sizeof(struct recvfrom_s));
|
|
|
|
(void)sem_init(&pstate->rf_sem, 0, 0); /* Doesn't really fail */
|
2007-11-20 00:09:39 +01:00
|
|
|
pstate->rf_buflen = len;
|
|
|
|
pstate->rf_buffer = buf;
|
2007-11-23 20:25:39 +01:00
|
|
|
pstate->rf_from = infrom;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
/* Set up the start time for the timeout */
|
|
|
|
|
2007-11-01 00:27:55 +01:00
|
|
|
pstate->rf_sock = psock;
|
2008-12-12 17:55:51 +01:00
|
|
|
#if defined(CONFIG_NET_SOCKOPTS) && !defined(CONFIG_DISABLE_CLOCK)
|
2007-09-09 21:47:52 +02:00
|
|
|
pstate->rf_starttime = g_system_timer;
|
|
|
|
#endif
|
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom_result
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Evaluate the result of the recv operations
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* result The result of the sem_wait operation (may indicate EINTR)
|
|
|
|
* pstate A pointer to the state structure to be initialized
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* The result of the recv operation with errno set appropriately
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2007-09-09 21:47:52 +02:00
|
|
|
static ssize_t recvfrom_result(int result, struct recvfrom_s *pstate)
|
|
|
|
{
|
|
|
|
int save_errno = *get_errno_ptr(); /* In case something we do changes it */
|
|
|
|
|
|
|
|
/* Release semaphore in the state structure */
|
|
|
|
|
|
|
|
sem_destroy(&pstate->rf_sem);
|
|
|
|
|
|
|
|
/* Check for a error/timeout detected by the interrupt handler. Errors are
|
|
|
|
* signaled by negative errno values for the rcv length
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (pstate->rf_result < 0)
|
|
|
|
{
|
2007-09-16 00:45:45 +02:00
|
|
|
/* Return EGAIN on a timeout or ENOTCONN on loss of connection */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
return pstate->rf_result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If sem_wait failed, then we were probably reawakened by a signal. In
|
|
|
|
* this case, sem_wait will have set errno appropriately.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (result < 0)
|
|
|
|
{
|
|
|
|
return -save_errno;
|
|
|
|
}
|
|
|
|
|
|
|
|
return pstate->rf_recvlen;
|
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_UDP || CONFIG_NET_TCP */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Function: udp_recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform the recvfrom operation for a UDP SOCK_DGRAM
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* psock Pointer to the socket structure for the SOCK_DRAM socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
2007-10-27 20:56:04 +02:00
|
|
|
* infrom INET ddress of source (may be NULL)
|
2007-09-09 19:20:56 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error,
|
|
|
|
* -errno is returned (see recvfrom for list of errnos).
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_UDP
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
static ssize_t udp_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
2007-11-23 20:25:39 +01:00
|
|
|
FAR struct sockaddr_in6 *infrom )
|
2007-09-09 19:20:56 +02:00
|
|
|
#else
|
|
|
|
static ssize_t udp_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
2007-11-23 20:25:39 +01:00
|
|
|
FAR struct sockaddr_in *infrom )
|
2007-09-09 19:20:56 +02:00
|
|
|
#endif
|
|
|
|
{
|
2008-09-01 17:22:54 +02:00
|
|
|
struct uip_udp_conn *conn = (struct uip_udp_conn *)psock->s_conn;
|
2007-11-20 00:09:39 +01:00
|
|
|
struct recvfrom_s state;
|
|
|
|
irqstate_t save;
|
|
|
|
int ret;
|
2007-09-09 19:20:56 +02:00
|
|
|
|
|
|
|
/* Perform the UDP recvfrom() operation */
|
|
|
|
|
|
|
|
/* Initialize the state structure. This is done with interrupts
|
|
|
|
* disabled because we don't want anything to happen until we
|
|
|
|
* are ready.
|
|
|
|
*/
|
|
|
|
|
|
|
|
save = irqsave();
|
2007-11-23 20:25:39 +01:00
|
|
|
recvfrom_init(psock, buf, len, infrom, &state);
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/* Setup the UDP remote connection */
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2008-09-06 18:45:28 +02:00
|
|
|
ret = uip_udpconnect(conn, NULL);
|
2007-09-09 21:47:52 +02:00
|
|
|
if (ret < 0)
|
2007-09-09 19:20:56 +02:00
|
|
|
{
|
|
|
|
irqrestore(save);
|
2007-09-09 21:47:52 +02:00
|
|
|
return ret;
|
2007-09-09 19:20:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Set up the callback in the connection */
|
|
|
|
|
2008-09-01 17:22:54 +02:00
|
|
|
state.rf_cb = uip_udpcallbackalloc(conn);
|
2008-09-01 15:59:54 +02:00
|
|
|
if (state.rf_cb)
|
|
|
|
{
|
|
|
|
/* Set up the callback in the connection */
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
state.rf_cb->flags = UIP_NEWDATA|UIP_POLL|UIP_CLOSE|UIP_ABORT|UIP_TIMEDOUT;
|
|
|
|
state.rf_cb->private = (void*)&state;
|
|
|
|
state.rf_cb->event = recvfrom_udpinterrupt;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Enable the UDP socket */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2008-09-01 17:22:54 +02:00
|
|
|
uip_udpenable(conn);
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Wait for either the receive to complete or for an error/timeout to occur.
|
|
|
|
* NOTES: (1) sem_wait will also terminate if a signal is received, (2)
|
|
|
|
* interrupts are disabled! They will be re-enabled while the task sleeps
|
|
|
|
* and automatically re-enabled when the task restarts.
|
|
|
|
*/
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
ret = sem_wait(&state. rf_sem);
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Make sure that no further interrupts are processed */
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2008-09-01 17:22:54 +02:00
|
|
|
uip_udpdisable(conn);
|
|
|
|
uip_udpcallbackfree(conn, state.rf_cb);
|
2008-09-01 15:59:54 +02:00
|
|
|
irqrestore(save);
|
|
|
|
ret = recvfrom_result(ret, &state);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = -EBUSY;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2007-09-09 19:20:56 +02:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_UDP */
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Function: tcp_recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform the recvfrom operation for a TCP/IP SOCK_STREAM
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* psock Pointer to the socket structure for the SOCK_DRAM socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
2007-10-27 20:56:04 +02:00
|
|
|
* infrom INET ddress of source (may be NULL)
|
2007-09-09 19:20:56 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error,
|
|
|
|
* -errno is returned (see recvfrom for list of errnos).
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#ifdef CONFIG_NET_TCP
|
2007-09-09 19:20:56 +02:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
static ssize_t tcp_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
2007-11-23 20:25:39 +01:00
|
|
|
FAR struct sockaddr_in6 *infrom )
|
2007-09-09 19:20:56 +02:00
|
|
|
#else
|
|
|
|
static ssize_t tcp_recvfrom(FAR struct socket *psock, FAR void *buf, size_t len,
|
2007-11-23 20:25:39 +01:00
|
|
|
FAR struct sockaddr_in *infrom )
|
2007-09-09 19:20:56 +02:00
|
|
|
#endif
|
|
|
|
{
|
2007-11-20 00:09:39 +01:00
|
|
|
struct recvfrom_s state;
|
|
|
|
irqstate_t save;
|
2007-12-02 19:18:59 +01:00
|
|
|
int ret = OK;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/* Verify that the SOCK_STREAM has been connected */
|
|
|
|
|
2007-11-06 17:17:50 +01:00
|
|
|
if (!_SS_ISCONNECTED(psock->s_flags))
|
2007-09-09 19:20:56 +02:00
|
|
|
{
|
2007-10-31 01:13:07 +01:00
|
|
|
/* The SOCK_STREAM must be connected in order to receive */
|
2007-09-09 19:20:56 +02:00
|
|
|
|
|
|
|
return -ENOTCONN;
|
|
|
|
}
|
|
|
|
|
2007-09-09 21:47:52 +02:00
|
|
|
|
|
|
|
/* Initialize the state structure. This is done with interrupts
|
|
|
|
* disabled because we don't want anything to happen until we
|
|
|
|
* are ready.
|
|
|
|
*/
|
|
|
|
|
|
|
|
save = irqsave();
|
2007-11-23 20:25:39 +01:00
|
|
|
recvfrom_init(psock, buf, len, infrom, &state);
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-20 00:09:39 +01:00
|
|
|
#if CONFIG_NET_NTCP_READAHEAD_BUFFERS > 0
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-20 00:09:39 +01:00
|
|
|
/* Handle any any TCP data already buffered in a read-ahead buffer. */
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2007-11-20 00:09:39 +01:00
|
|
|
recvfrom_readahead(&state);
|
|
|
|
|
|
|
|
/* If there is space to receive anything more, then we will
|
|
|
|
* wait to receive the data.
|
2007-09-09 21:47:52 +02:00
|
|
|
*/
|
|
|
|
|
2007-11-20 00:09:39 +01:00
|
|
|
if (state.rf_buflen > 0)
|
|
|
|
#endif
|
|
|
|
{
|
2008-09-01 15:59:54 +02:00
|
|
|
struct uip_conn *conn = (struct uip_conn *)psock->s_conn;
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Set up the callback in the connection */
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
state.rf_cb = uip_tcpcallbackalloc(conn);
|
|
|
|
if (state.rf_cb)
|
|
|
|
{
|
|
|
|
state.rf_cb->flags = UIP_NEWDATA|UIP_POLL|UIP_CLOSE|UIP_ABORT|UIP_TIMEDOUT;
|
|
|
|
state.rf_cb->private = (void*)&state;
|
|
|
|
state.rf_cb->event = recvfrom_tcpinterrupt;
|
|
|
|
|
|
|
|
/* Wait for either the receive to complete or for an error/timeout to occur.
|
|
|
|
* NOTES: (1) sem_wait will also terminate if a signal is received, (2)
|
|
|
|
* interrupts are disabled! They will be re-enabled while the task sleeps
|
|
|
|
* and automatically re-enabled when the task restarts.
|
|
|
|
*/
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
ret = sem_wait(&state.rf_sem);
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
/* Make sure that no further interrupts are processed */
|
2007-11-20 00:09:39 +01:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
uip_tcpcallbackfree(conn, state.rf_cb);
|
|
|
|
ret = recvfrom_result(ret, &state);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = -EBUSY;
|
|
|
|
}
|
2007-11-20 00:09:39 +01:00
|
|
|
}
|
2007-09-09 21:47:52 +02:00
|
|
|
|
2008-09-01 15:59:54 +02:00
|
|
|
irqrestore(save);
|
|
|
|
return ret;
|
2007-09-09 19:20:56 +02:00
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif /* CONFIG_NET_TCP */
|
2007-09-09 19:20:56 +02:00
|
|
|
|
2007-09-03 22:34:44 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Global Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Function: recvfrom
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* recvfrom() receives messages from a socket, and may be used to receive
|
|
|
|
* data on a socket whether or not it is connection-oriented.
|
|
|
|
*
|
|
|
|
* If from is not NULL, and the underlying protocol provides the source
|
|
|
|
* address, this source address is filled in. The argument fromlen
|
|
|
|
* initialized to the size of the buffer associated with from, and modified
|
|
|
|
* on return to indicate the actual size of the address stored there.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* sockfd Socket descriptor of socket
|
|
|
|
* buf Buffer to receive data
|
|
|
|
* len Length of buffer
|
|
|
|
* flags Receive flags
|
2007-10-27 20:56:04 +02:00
|
|
|
* from Address of source (may be NULL)
|
2007-09-03 22:34:44 +02:00
|
|
|
* fromlen The length of the address structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error,
|
|
|
|
* -1 is returned, and errno is set appropriately:
|
|
|
|
*
|
|
|
|
* EAGAIN
|
|
|
|
* The socket is marked non-blocking and the receive operation would block,
|
|
|
|
* or a receive timeout had been set and the timeout expired before data
|
|
|
|
* was received.
|
|
|
|
* EBADF
|
|
|
|
* The argument sockfd is an invalid descriptor.
|
|
|
|
* ECONNREFUSED
|
|
|
|
* A remote host refused to allow the network connection (typically because
|
|
|
|
* it is not running the requested service).
|
|
|
|
* EFAULT
|
|
|
|
* The receive buffer pointer(s) point outside the process's address space.
|
|
|
|
* EINTR
|
|
|
|
* The receive was interrupted by delivery of a signal before any data were
|
|
|
|
* available.
|
|
|
|
* EINVAL
|
|
|
|
* Invalid argument passed.
|
|
|
|
* ENOMEM
|
2007-09-08 17:26:55 +02:00
|
|
|
* Could not allocate memory.
|
2007-09-03 22:34:44 +02:00
|
|
|
* ENOTCONN
|
|
|
|
* The socket is associated with a connection-oriented protocol and has
|
|
|
|
* not been connected.
|
|
|
|
* ENOTSOCK
|
|
|
|
* The argument sockfd does not refer to a socket.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
ssize_t recvfrom(int sockfd, FAR void *buf, size_t len, int flags,
|
|
|
|
FAR struct sockaddr *from, FAR socklen_t *fromlen)
|
2007-09-03 22:34:44 +02:00
|
|
|
{
|
|
|
|
FAR struct socket *psock;
|
2007-11-22 19:36:46 +01:00
|
|
|
|
|
|
|
#if defined(CONFIG_NET_UDP) || defined(CONFIG_NET_TCP)
|
2007-09-03 22:34:44 +02:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
2007-11-23 20:25:39 +01:00
|
|
|
FAR struct sockaddr_in6 *infrom = (struct sockaddr_in6 *)from;
|
2007-09-03 22:34:44 +02:00
|
|
|
#else
|
2007-11-23 20:25:39 +01:00
|
|
|
FAR struct sockaddr_in *infrom = (struct sockaddr_in *)from;
|
2007-09-03 22:34:44 +02:00
|
|
|
#endif
|
2007-11-22 19:36:46 +01:00
|
|
|
#endif
|
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
ssize_t ret;
|
2007-09-03 22:34:44 +02:00
|
|
|
int err;
|
2007-09-09 19:20:56 +02:00
|
|
|
|
|
|
|
/* Verify that non-NULL pointers were passed */
|
|
|
|
|
2008-11-18 18:24:50 +01:00
|
|
|
#ifdef CONFIG_DEBUG
|
2007-10-27 20:56:04 +02:00
|
|
|
if (!buf)
|
2007-09-09 19:20:56 +02:00
|
|
|
{
|
|
|
|
err = EINVAL;
|
|
|
|
goto errout;
|
|
|
|
}
|
2008-11-18 18:24:50 +01:00
|
|
|
#endif
|
2007-09-03 22:34:44 +02:00
|
|
|
|
|
|
|
/* Get the underlying socket structure */
|
|
|
|
/* Verify that the sockfd corresponds to valid, allocated socket */
|
|
|
|
|
|
|
|
psock = sockfd_socket(sockfd);
|
|
|
|
if (!psock || psock->s_crefs <= 0)
|
|
|
|
{
|
|
|
|
err = EBADF;
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
2007-11-23 20:25:39 +01:00
|
|
|
/* If a 'from' address has been provided, verify that it is large
|
|
|
|
* enough to hold this address family.
|
|
|
|
*/
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-10-27 20:56:04 +02:00
|
|
|
if (from)
|
|
|
|
{
|
2007-09-09 19:20:56 +02:00
|
|
|
#ifdef CONFIG_NET_IPv6
|
2007-11-23 20:25:39 +01:00
|
|
|
if (*fromlen < sizeof(struct sockaddr_in6))
|
2007-09-09 19:20:56 +02:00
|
|
|
#else
|
2007-11-23 20:25:39 +01:00
|
|
|
if (*fromlen < sizeof(struct sockaddr_in))
|
2007-09-09 19:20:56 +02:00
|
|
|
#endif
|
2007-10-27 20:56:04 +02:00
|
|
|
{
|
2007-11-23 20:25:39 +01:00
|
|
|
err = EINVAL;
|
2007-10-27 20:56:04 +02:00
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
}
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/* Set the socket state to receiving */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
psock->s_flags = _SS_SETSTATE(psock->s_flags, _SF_RECV);
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/* Perform the TCP/IP or UDP recv() operation */
|
2007-09-03 22:34:44 +02:00
|
|
|
|
2007-11-22 19:36:46 +01:00
|
|
|
#if defined(CONFIG_NET_UDP) && defined(CONFIG_NET_TCP)
|
2007-09-09 19:20:56 +02:00
|
|
|
if (psock->s_type == SOCK_STREAM)
|
2007-09-03 22:34:44 +02:00
|
|
|
{
|
2007-09-09 19:20:56 +02:00
|
|
|
ret = tcp_recvfrom(psock, buf, len, infrom);
|
2007-09-03 22:34:44 +02:00
|
|
|
}
|
2007-09-09 19:20:56 +02:00
|
|
|
else
|
2007-09-08 23:54:43 +02:00
|
|
|
{
|
2007-09-09 19:20:56 +02:00
|
|
|
ret = udp_recvfrom(psock, buf, len, infrom);
|
2007-09-08 23:54:43 +02:00
|
|
|
}
|
2007-11-22 19:36:46 +01:00
|
|
|
#elif defined(CONFIG_NET_TCP)
|
|
|
|
ret = tcp_recvfrom(psock, buf, len, infrom);
|
|
|
|
#elif defined(CONFIG_NET_UDP)
|
|
|
|
ret = udp_recvfrom(psock, buf, len, infrom);
|
|
|
|
#else
|
|
|
|
ret = -ENOSYS;
|
2007-09-08 23:54:43 +02:00
|
|
|
#endif
|
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/* Set the socket state to idle */
|
|
|
|
|
|
|
|
psock->s_flags = _SS_SETSTATE(psock->s_flags, _SF_IDLE);
|
|
|
|
|
|
|
|
/* Handle returned errors */
|
2007-09-05 02:13:18 +02:00
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
2007-09-09 19:20:56 +02:00
|
|
|
err = -ret;
|
|
|
|
goto errout;
|
2007-09-05 02:13:18 +02:00
|
|
|
}
|
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
/* Success return */
|
2007-09-08 23:54:43 +02:00
|
|
|
|
2007-09-09 19:20:56 +02:00
|
|
|
return ret;
|
2007-09-03 22:34:44 +02:00
|
|
|
|
|
|
|
errout:
|
|
|
|
*get_errno_ptr() = err;
|
|
|
|
return ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NET */
|