Subversion Repositories HelenOS

Rev

Rev 4738 | Go to most recent revision | Blame | Compare with Previous | Last modification | View Log | Download | RSS feed

  1. /*
  2.  * Copyright (c) 2008 Lukas Mejdrech
  3.  * All rights reserved.
  4.  *
  5.  * Redistribution and use in source and binary forms, with or without
  6.  * modification, are permitted provided that the following conditions
  7.  * are met:
  8.  *
  9.  * - Redistributions of source code must retain the above copyright
  10.  *   notice, this list of conditions and the following disclaimer.
  11.  * - Redistributions in binary form must reproduce the above copyright
  12.  *   notice, this list of conditions and the following disclaimer in the
  13.  *   documentation and/or other materials provided with the distribution.
  14.  * - The name of the author may not be used to endorse or promote products
  15.  *   derived from this software without specific prior written permission.
  16.  *
  17.  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
  18.  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  19.  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
  20.  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
  21.  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  22.  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  23.  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  24.  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  25.  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
  26.  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  27.  */
  28.  
  29. /** @addtogroup udp
  30.  *  @{
  31.  */
  32.  
  33. /** @file
  34.  *  UDP module implementation.
  35.  *  @see udp.h
  36.  */
  37.  
  38. #include <async.h>
  39. #include <fibril_sync.h>
  40. #include <malloc.h>
  41. #include <stdio.h>
  42.  
  43. #include <ipc/ipc.h>
  44. #include <ipc/services.h>
  45.  
  46. #include "../../err.h"
  47. #include "../../messages.h"
  48. #include "../../modules.h"
  49.  
  50. #include "../../structures/dynamic_fifo.h"
  51. #include "../../structures/packet/packet_client.h"
  52.  
  53. #include "../../include/checksum.h"
  54. #include "../../include/in.h"
  55. #include "../../include/in6.h"
  56. #include "../../include/inet.h"
  57. #include "../../include/ip_client.h"
  58. #include "../../include/ip_interface.h"
  59. #include "../../include/ip_protocols.h"
  60. #include "../../include/icmp_client.h"
  61. #include "../../include/icmp_interface.h"
  62. #include "../../include/net_interface.h"
  63. #include "../../include/socket_codes.h"
  64. #include "../../include/socket_errno.h"
  65.  
  66. #include "../../socket/socket_core.h"
  67. #include "../../socket/socket_messages.h"
  68.  
  69. #include "../tl_common.h"
  70. #include "../tl_messages.h"
  71.  
  72. #include "udp.h"
  73. #include "udp_header.h"
  74. #include "udp_module.h"
  75.  
  76. /** Default UDP checksum computing.
  77.  */
  78. #define NET_DEFAULT_UDP_CHECKSUM_COMPUTING  true
  79.  
  80. /** Default UDP autobind when sending via unbound sockets.
  81.  */
  82. #define NET_DEFAULT_UDP_AUTOBINDING true
  83.  
  84. /** Maximum UDP fragment size.
  85.  */
  86. #define MAX_UDP_FRAGMENT_SIZE   65535
  87.  
  88. /** Free ports pool start.
  89.  */
  90. #define UDP_FREE_PORTS_START    1025
  91.  
  92. /** Free ports pool end.
  93.  */
  94. #define UDP_FREE_PORTS_END      65535
  95.  
  96. /** Processes the received UDP packet queue.
  97.  *  Is used as an entry point from the underlying IP module.
  98.  *  Locks the global lock and calls udp_process_packet() function.
  99.  *  @param device_id The device identifier. Ignored parameter.
  100.  *  @param packet The received packet queue. Input/output parameter.
  101.  *  @param receiver The target service. Ignored parameter.
  102.  *  @param error The packet error reporting service. Prefixes the received packet. Input parameter.
  103.  *  @returns EOK on success.
  104.  *  @returns Other error codes as defined for the udp_process_packet() function.
  105.  */
  106. int udp_received_msg( device_id_t device_id, packet_t packet, services_t receiver, services_t error );
  107.  
  108. /** Processes the received UDP packet queue.
  109.  *  Notifies the destination socket application.
  110.  *  Releases the packet on error or sends an ICMP error notification..
  111.  *  @param packet The received packet queue. Input/output parameter.
  112.  *  @param error The packet error reporting service. Prefixes the received packet. Input parameter.
  113.  *  @returns EOK on success.
  114.  *  @returns EINVAL if the packet is not valid.
  115.  *  @returns EINVAL if the stored packet address is not the an_addr_t.
  116.  *  @returns EINVAL if the packet does not contain any data.
  117.  *  @returns NO_DATA if the packet content is shorter than the user datagram header.
  118.  *  @returns ENOMEM if there is not enough memory left.
  119.  *  @returns EADDRNOTAVAIL if the destination socket does not exist.
  120.  *  @returns Other error codes as defined for the ip_client_process_packet() function.
  121.  */
  122. int udp_process_packet( packet_t packet, services_t error );
  123.  
  124. /** Releases the packet and returns the result.
  125.  *  @param packet The packet queue to be released. Input parameter.
  126.  *  @param result The result to be returned. Input parameter.
  127.  *  @return The result parameter.
  128.  */
  129. int udp_release_and_return( packet_t packet, int result );
  130.  
  131. /** @name Socket messages processing functions
  132.  */
  133. /*@{*/
  134.  
  135. /** Processes the socket client messages.
  136.  *  Runs until the client module disconnects.
  137.  *  @param callid The message identifier. Input parameter.
  138.  *  @param call The message parameters. Input parameter.
  139.  *  @returns EOK on success.
  140.  *  @see socket.h
  141.  */
  142. int udp_process_client_messages( ipc_callid_t callid, ipc_call_t call );
  143.  
  144. /** Sends data from the socket to the remote address.
  145.  *  Binds the socket to a free port if not already connected/bound.
  146.  *  Handles the NET_SOCKET_SENDTO message.
  147.  *  Supports AF_INET and AF_INET6 address families.
  148.  *  @param local_sockets The application local sockets. Input/output parameter.
  149.  *  @param socket_id Socket identifier. Input parameter.
  150.  *  @param addr The destination address. Input parameter.
  151.  *  @param addrlen The address length. Input parameter.
  152.  *  @param fragments The number of data fragments. Input parameter.
  153.  *  @param data_fragment_size The data fragment size in bytes. Input parameter.
  154.  *  @param flags Various send flags. Input parameter.
  155.  *  @returns EOK on success.
  156.  *  @returns EAFNOTSUPPORT if the address family is not supported.
  157.  *  @returns ENOTSOCK if the socket is not found.
  158.  *  @returns EINVAL if the address is invalid.
  159.  *  @returns ENOTCONN if the sending socket is not and cannot be bound.
  160.  *  @returns ENOMEM if there is not enough memory left.
  161.  *  @returns Other error codes as defined for the socket_read_packet_data() function.
  162.  *  @returns Other error codes as defined for the ip_client_prepare_packet() function.
  163.  *  @returns Other error codes as defined for the ip_send_msg() function.
  164.  */
  165. int udp_sendto_message( socket_cores_ref local_sockets, int socket_id, const struct sockaddr * addr, socklen_t addrlen, int fragments, size_t data_fragment_size, int flags );
  166.  
  167. /** Receives data to the socket.
  168.  *  Handles the NET_SOCKET_RECVFROM message.
  169.  *  Replies the source address as well.
  170.  *  @param local_sockets The application local sockets. Input parameter.
  171.  *  @param socket_id Socket identifier. Input parameter.
  172.  *  @param flags Various receive flags. Input parameter.
  173.  *  @param addrlen The source address length. Output parameter.
  174.  *  @returns The number of bytes received.
  175.  *  @returns ENOTSOCK if the socket is not found.
  176.  *  @returns NO_DATA if there are no received packets or data.
  177.  *  @returns ENOMEM if there is not enough memory left.
  178.  *  @returns EINVAL if the received address is not an IP address.
  179.  *  @returns Other error codes as defined for the packet_translate() function.
  180.  *  @returns Other error codes as defined for the data_reply() function.
  181.  */
  182. int udp_recvfrom_message( socket_cores_ref local_sockets, int socket_id, int flags, size_t * addrlen );
  183.  
  184. /*@}*/
  185.  
  186. /** UDP global data.
  187.  */
  188. udp_globals_t   udp_globals;
  189.  
  190. int udp_initialize( async_client_conn_t client_connection ){
  191.     ERROR_DECLARE;
  192.  
  193.     measured_string_t   names[] = {{ "UDP_CHECKSUM_COMPUTING", 22 }, { "UDP_AUTOBINDING", 15 }};
  194.     measured_string_ref configuration;
  195.     size_t              count = sizeof( names ) / sizeof( measured_string_t );
  196.     char *              data;
  197.  
  198.     fibril_rwlock_initialize( & udp_globals.lock );
  199.     fibril_rwlock_write_lock( & udp_globals.lock );
  200.     udp_globals.icmp_phone = icmp_connect_module( SERVICE_ICMP );
  201.     if( udp_globals.icmp_phone < 0 ){
  202.         return udp_globals.icmp_phone;
  203.     }
  204.     udp_globals.ip_phone = ip_bind_service( SERVICE_IP, IPPROTO_UDP, SERVICE_UDP, client_connection, udp_received_msg );
  205.     if( udp_globals.ip_phone < 0 ){
  206.         return udp_globals.ip_phone;
  207.     }
  208.     ERROR_PROPAGATE( ip_packet_size_req( udp_globals.ip_phone, -1, & udp_globals.packet_dimension.addr_len, & udp_globals.packet_dimension.prefix, & udp_globals.packet_dimension.content, & udp_globals.packet_dimension.suffix ));
  209.     ERROR_PROPAGATE( socket_ports_initialize( & udp_globals.sockets ));
  210.     udp_globals.packet_dimension.prefix += sizeof( udp_header_t );
  211.     udp_globals.packet_dimension.content -= sizeof( udp_header_t );
  212.     udp_globals.last_used_port = UDP_FREE_PORTS_START - 1;
  213.     // get configuration
  214.     udp_globals.checksum_computing = NET_DEFAULT_UDP_CHECKSUM_COMPUTING;
  215.     udp_globals.autobinding = NET_DEFAULT_UDP_AUTOBINDING;
  216.     configuration = & names[ 0 ];
  217.     ERROR_PROPAGATE( net_get_conf_req( udp_globals.net_phone, & configuration, count, & data ));
  218.     if( configuration ){
  219.         if( configuration[ 0 ].value ){
  220.             udp_globals.checksum_computing = ( configuration[ 0 ].value[ 0 ] == 'y' );
  221.         }
  222.         if( configuration[ 1 ].value ){
  223.             udp_globals.autobinding = ( configuration[ 1 ].value[ 0 ] == 'y' );
  224.         }
  225.         net_free_settings( configuration, data );
  226.     }
  227.     fibril_rwlock_write_unlock( & udp_globals.lock );
  228.     return EOK;
  229. }
  230.  
  231. int udp_received_msg( device_id_t device_id, packet_t packet, services_t receiver, services_t error ){
  232.     int result;
  233.  
  234.     fibril_rwlock_write_lock( & udp_globals.lock );
  235.     result = udp_process_packet( packet, error );
  236.     if( result != EOK ){
  237.         fibril_rwlock_write_unlock( & udp_globals.lock );
  238.     }
  239.  
  240.     return result;
  241. }
  242.  
  243. int udp_process_packet( packet_t packet, services_t error ){
  244.     ERROR_DECLARE;
  245.  
  246.     size_t          length;
  247.     size_t          offset;
  248.     int             result;
  249.     udp_header_ref  header;
  250.     socket_core_ref socket;
  251.     packet_t        next_packet;
  252.     size_t          total_length;
  253.     uint32_t        checksum;
  254.     int             fragments;
  255.     packet_t        tmp_packet;
  256.     icmp_type_t     type;
  257.     icmp_code_t     code;
  258.     ip_pseudo_header_ref    ip_header;
  259.     struct sockaddr *       src;
  260.     struct sockaddr *       dest;
  261.  
  262.     if( error ){
  263.         switch( error ){
  264.             case SERVICE_ICMP:
  265.                 // ignore error
  266.                 // length = icmp_client_header_length( packet );
  267.                 // process error
  268.                 result = icmp_client_process_packet( packet, & type, & code, NULL, NULL );
  269.                 if( result < 0 ){
  270.                     return udp_release_and_return( packet, result );
  271.                 }
  272.                 length = ( size_t ) result;
  273.                 if( ERROR_OCCURRED( packet_trim( packet, length, 0 ))){
  274.                     return udp_release_and_return( packet, ERROR_CODE );
  275.                 }
  276.                 break;
  277.             default:
  278.                 return udp_release_and_return( packet, ENOTSUP );
  279.         }
  280.     }
  281.     // TODO process received ipopts?
  282.     result = ip_client_process_packet( packet, NULL, NULL, NULL, NULL, NULL );
  283.     if( result < 0 ){
  284.         return udp_release_and_return( packet, result );
  285.     }
  286.     offset = ( size_t ) result;
  287.  
  288.     length = packet_get_data_length( packet );
  289.     if( length <= 0 ){
  290.         return udp_release_and_return( packet, EINVAL );
  291.     }
  292.     if( length < sizeof( udp_header_t ) + offset ){
  293.         return udp_release_and_return( packet, NO_DATA );
  294.     }
  295.  
  296.     // trim all but UDP header
  297.     if( ERROR_OCCURRED( packet_trim( packet, offset, 0 ))){
  298.         return udp_release_and_return( packet, ERROR_CODE );
  299.     }
  300.  
  301.     // get udp header
  302.     header = ( udp_header_ref ) packet_get_data( packet );
  303.     if( ! header ){
  304.         return udp_release_and_return( packet, NO_DATA );
  305.     }
  306.     // find the destination socket
  307.     socket = socket_port_find( & udp_globals.sockets, ntohs( header->destination_port ), SOCKET_MAP_KEY_LISTENING, 0 );
  308.     if( ! socket ){
  309.         if( tl_prepare_icmp_packet( udp_globals.net_phone, udp_globals.icmp_phone, packet, error ) == EOK ){
  310.             icmp_destination_unreachable_msg( udp_globals.icmp_phone, ICMP_PORT_UNREACH, 0, packet );
  311.         }
  312.         return EADDRNOTAVAIL;
  313.     }
  314.  
  315.     // count the received packet fragments
  316.     next_packet = packet;
  317.     fragments = 0;
  318.     total_length = ntohs( header->total_length );
  319.     // compute header checksum if set
  320.     if( header->checksum && ( ! error )){
  321.         result = packet_get_addr( packet, ( uint8_t ** ) & src, ( uint8_t ** ) & dest );
  322.         if( result <= 0 ){
  323.             return udp_release_and_return( packet, result );
  324.         }
  325.         if( ERROR_OCCURRED( ip_client_get_pseudo_header( IPPROTO_UDP, src, result, dest, result, total_length, & ip_header, & length ))){
  326.             return udp_release_and_return( packet, ERROR_CODE );
  327.         }else{
  328.             checksum = compute_checksum( 0, ip_header, length );
  329.             // the udp header checksum will be added with the first fragment later
  330.             free( ip_header );
  331.         }
  332.     }else{
  333.         header->checksum = 0;
  334.         checksum = 0;
  335.     }
  336.  
  337.     do{
  338.         ++ fragments;
  339.         length = packet_get_data_length( next_packet );
  340.         if( length <= 0 ){
  341.             return udp_release_and_return( packet, NO_DATA );
  342.         }
  343.         if( total_length < length ){
  344.             if( ERROR_OCCURRED( packet_trim( next_packet, 0, length - total_length ))){
  345.                 return udp_release_and_return( packet, ERROR_CODE );
  346.             }
  347.             // add partial checksum if set
  348.             if( header->checksum ){
  349.                 checksum = compute_checksum( checksum, packet_get_data( packet ), packet_get_data_length( packet ));
  350.             }
  351.             // relese the rest of the packet fragments
  352.             tmp_packet = pq_next( next_packet );
  353.             while( tmp_packet ){
  354.                 next_packet = pq_detach( tmp_packet );
  355.                 pq_release( udp_globals.net_phone, packet_get_id( tmp_packet ));
  356.                 tmp_packet = next_packet;
  357.             }
  358.             // exit the loop
  359.             break;
  360.         }
  361.         total_length -= length;
  362.         // add partial checksum if set
  363.         if( header->checksum ){
  364.             checksum = compute_checksum( checksum, packet_get_data( packet ), packet_get_data_length( packet ));
  365.         }
  366.     }while(( next_packet = pq_next( next_packet )) && ( total_length > 0 ));
  367.  
  368.     // check checksum
  369.     if( header->checksum ){
  370.         if( flip_checksum( compact_checksum( checksum ))){
  371.             if( tl_prepare_icmp_packet( udp_globals.net_phone, udp_globals.icmp_phone, packet, error ) == EOK ){
  372.                 // checksum error ICMP
  373.                 icmp_parameter_problem_msg( udp_globals.icmp_phone, ICMP_PARAM_POINTER, (( size_t ) (( void * ) & header->checksum )) - (( size_t ) (( void * ) header )), packet );
  374.             }
  375.             return EINVAL;
  376.         }
  377.     }
  378.  
  379.     // queue the received packet
  380.     if( ERROR_OCCURRED( dyn_fifo_push( & socket->received, packet_get_id( packet ), SOCKET_MAX_RECEIVED_SIZE ))){
  381.         return udp_release_and_return( packet, ERROR_CODE );
  382.     }
  383.  
  384.     // notify the destination socket
  385.     fibril_rwlock_write_unlock( & udp_globals.lock );
  386.     async_msg_5( socket->phone, NET_SOCKET_RECEIVED, ( ipcarg_t ) socket->socket_id, 0, 0, 0, ( ipcarg_t ) fragments );
  387.     return EOK;
  388. }
  389.  
  390. int udp_message( ipc_callid_t callid, ipc_call_t * call, ipc_call_t * answer, int * answer_count ){
  391.     ERROR_DECLARE;
  392.  
  393.     packet_t    packet;
  394.  
  395.     * answer_count = 0;
  396.     switch( IPC_GET_METHOD( * call )){
  397.         case NET_TL_RECEIVED:
  398.             if( ! ERROR_OCCURRED( packet_translate( udp_globals.net_phone, & packet, IPC_GET_PACKET( call )))){
  399.                 ERROR_CODE = udp_received_msg( IPC_GET_DEVICE( call ), packet, SERVICE_UDP, IPC_GET_ERROR( call ));
  400.             }
  401.             return ERROR_CODE;
  402.         case IPC_M_CONNECT_TO_ME:
  403.             return udp_process_client_messages( callid, * call );
  404.     }
  405.     return ENOTSUP;
  406. }
  407.  
  408. int udp_process_client_messages( ipc_callid_t callid, ipc_call_t call ){
  409.     int                     res;
  410.     bool                    keep_on_going = true;
  411.     socket_cores_t          local_sockets;
  412.     int                     app_phone = IPC_GET_PHONE( & call );
  413.     struct sockaddr *       addr;
  414.     size_t                  addrlen;
  415.     fibril_rwlock_t         lock;
  416.     ipc_call_t              answer;
  417.     int                     answer_count;
  418.  
  419.     /*
  420.      * Accept the connection
  421.      *  - Answer the first IPC_M_CONNECT_TO_ME call.
  422.      */
  423.     ipc_answer_0( callid, EOK );
  424.  
  425.     // The client connection is only in one fibril and therefore no additional locks are needed.
  426.  
  427.     socket_cores_initialize( & local_sockets );
  428.     fibril_rwlock_initialize( & lock );
  429.  
  430.     while( keep_on_going ){
  431.         // refresh data
  432.         refresh_answer( & answer, & answer_count );
  433.  
  434.         callid = async_get_call( & call );
  435. //      printf( "message %d\n", IPC_GET_METHOD( * call ));
  436.  
  437.         switch( IPC_GET_METHOD( call )){
  438.             case IPC_M_PHONE_HUNGUP:
  439.                 keep_on_going = false;
  440.                 res = EOK;
  441.                 break;
  442.             case NET_SOCKET:
  443.                 fibril_rwlock_write_lock( & lock );
  444.                 res = socket_create( & local_sockets, app_phone, NULL, SOCKET_SET_SOCKET_ID( answer ));
  445.                 fibril_rwlock_write_unlock( & lock );
  446.                 // TODO max fragment size
  447.                 * SOCKET_SET_DATA_FRAGMENT_SIZE( answer ) = MAX_UDP_FRAGMENT_SIZE;
  448.                 * SOCKET_SET_HEADER_SIZE( answer ) = sizeof( udp_header_t );
  449.                 answer_count = 3;
  450.                 break;
  451.             case NET_SOCKET_BIND:
  452.                 res = data_receive(( void ** ) & addr, & addrlen );
  453.                 if( res == EOK ){
  454.                     fibril_rwlock_read_lock( & lock );
  455.                     fibril_rwlock_write_lock( & udp_globals.lock );
  456.                     res = socket_bind( & local_sockets, & udp_globals.sockets, SOCKET_GET_SOCKET_ID( call ), addr, addrlen, UDP_FREE_PORTS_START, UDP_FREE_PORTS_END, udp_globals.last_used_port );
  457.                     fibril_rwlock_write_unlock( & udp_globals.lock );
  458.                     fibril_rwlock_read_unlock( & lock );
  459.                     free( addr );
  460.                 }
  461.                 break;
  462.             case NET_SOCKET_SENDTO:
  463.                 res = data_receive(( void ** ) & addr, & addrlen );
  464.                 if( res == EOK ){
  465.                     fibril_rwlock_read_lock( & lock );
  466.                     fibril_rwlock_write_lock( & udp_globals.lock );
  467.                     res = udp_sendto_message( & local_sockets, SOCKET_GET_SOCKET_ID( call ), addr, addrlen, SOCKET_GET_DATA_FRAGMENTS( call ), SOCKET_GET_DATA_FRAGMENT_SIZE( call ), SOCKET_GET_FLAGS( call ));
  468.                     if( res != EOK ){
  469.                         fibril_rwlock_write_unlock( & udp_globals.lock );
  470.                     }
  471.                     fibril_rwlock_read_unlock( & lock );
  472.                     free( addr );
  473.                 }
  474.                 break;
  475.             case NET_SOCKET_RECVFROM:
  476.                 fibril_rwlock_read_lock( & lock );
  477.                 fibril_rwlock_write_lock( & udp_globals.lock );
  478.                 res = udp_recvfrom_message( & local_sockets, SOCKET_GET_SOCKET_ID( call ), SOCKET_GET_FLAGS( call ), & addrlen );
  479.                 fibril_rwlock_write_unlock( & udp_globals.lock );
  480.                 fibril_rwlock_read_unlock( & lock );
  481.                 if( res > 0 ){
  482.                     * SOCKET_SET_READ_DATA_LENGTH( answer ) = res;
  483.                     * SOCKET_SET_ADDRESS_LENGTH( answer ) = addrlen;
  484.                     answer_count = 2;
  485.                     res = EOK;
  486.                 }
  487.                 break;
  488.             case NET_SOCKET_CLOSE:
  489.                 fibril_rwlock_write_lock( & lock );
  490.                 fibril_rwlock_write_lock( & udp_globals.lock );
  491.                 res = socket_destroy( udp_globals.net_phone, SOCKET_GET_SOCKET_ID( call ), & local_sockets, & udp_globals.sockets, NULL );
  492.                 fibril_rwlock_write_unlock( & udp_globals.lock );
  493.                 fibril_rwlock_write_unlock( & lock );
  494.                 break;
  495.             case NET_SOCKET_GETSOCKOPT:
  496.             case NET_SOCKET_SETSOCKOPT:
  497.             default:
  498.                 res = ENOTSUP;
  499.                 break;
  500.         }
  501.  
  502. //      printf( "res = %d\n", res );
  503.  
  504.         answer_call( callid, res, & answer, answer_count );
  505.     }
  506.  
  507.     // release all local sockets
  508.     socket_cores_release( udp_globals.net_phone, & local_sockets, & udp_globals.sockets, NULL );
  509.  
  510.     return EOK;
  511. }
  512.  
  513. int udp_sendto_message( socket_cores_ref local_sockets, int socket_id, const struct sockaddr * addr, socklen_t addrlen, int fragments, size_t data_fragment_size, int flags ){
  514.     ERROR_DECLARE;
  515.  
  516.     socket_core_ref         socket;
  517.     packet_t                packet;
  518.     packet_t                next_packet;
  519.     udp_header_ref          header;
  520.     int                     index;
  521.     size_t                  total_length;
  522.     int                     result;
  523.     uint16_t                dest_port;
  524.     uint32_t                checksum;
  525.     ip_pseudo_header_ref    ip_header;
  526.     size_t                  headerlen;
  527.     device_id_t             device_id;
  528.  
  529.     ERROR_PROPAGATE( tl_get_address_port( addr, addrlen, & dest_port ));
  530.  
  531.     socket = socket_cores_find( local_sockets, socket_id );
  532.     if( ! socket ) return ENOTSOCK;
  533.  
  534.     if(( socket->port <= 0 ) && udp_globals.autobinding ){
  535.         // bind the socket to a random free port if not bound
  536. //      do{
  537.             // try to find a free port
  538. //          fibril_rwlock_read_unlock( & udp_globals.lock );
  539. //          fibril_rwlock_write_lock( & udp_globals.lock );
  540.             // might be changed in the meantime
  541. //          if( socket->port <= 0 ){
  542.                 if( ERROR_OCCURRED( socket_bind_free_port( & udp_globals.sockets, socket, UDP_FREE_PORTS_START, UDP_FREE_PORTS_END, udp_globals.last_used_port ))){
  543. //                  fibril_rwlock_write_unlock( & udp_globals.lock );
  544. //                  fibril_rwlock_read_lock( & udp_globals.lock );
  545.                     return ERROR_CODE;
  546.                 }
  547.                 // set the next port as the search starting port number
  548.                 udp_globals.last_used_port = socket->port;
  549. //          }
  550. //          fibril_rwlock_write_unlock( & udp_globals.lock );
  551. //          fibril_rwlock_read_lock( & udp_globals.lock );
  552.             // might be changed in the meantime
  553. //      }while( socket->port <= 0 );
  554.     }
  555.  
  556.     // TODO do not ask all the time
  557.     ERROR_PROPAGATE( ip_packet_size_req( udp_globals.ip_phone, -1, & udp_globals.packet_dimension.addr_len, & udp_globals.packet_dimension.prefix, & udp_globals.packet_dimension.content, & udp_globals.packet_dimension.suffix ));
  558.  
  559.     // read the first packet fragment
  560.     result = tl_socket_read_packet_data( udp_globals.net_phone, & packet, sizeof( udp_header_t ), & udp_globals.packet_dimension, addr, addrlen );
  561.     if( result < 0 ) return result;
  562.     total_length = ( size_t ) result;
  563.     if( udp_globals.checksum_computing ){
  564.         checksum = compute_checksum( 0, packet_get_data( packet ), packet_get_data_length( packet ));
  565.     }else{
  566.         checksum = 0;
  567.     }
  568.     // prefix the udp header
  569.     header = PACKET_PREFIX( packet, udp_header_t );
  570.     if( ! header ){
  571.         return udp_release_and_return( packet, ENOMEM );
  572.     }
  573.     bzero( header, sizeof( * header ));
  574.     // read the rest of the packet fragments
  575.     for( index = 1; index < fragments; ++ index ){
  576.         result = tl_socket_read_packet_data( udp_globals.net_phone, & next_packet, 0, & udp_globals.packet_dimension, addr, addrlen );
  577.         if( result < 0 ){
  578.             return udp_release_and_return( packet, result );
  579.         }
  580.         packet = pq_add( packet, next_packet, index, 0 );
  581.         total_length += ( size_t ) result;
  582.         if( udp_globals.checksum_computing ){
  583.             checksum = compute_checksum( checksum, packet_get_data( next_packet ), packet_get_data_length( next_packet ));
  584.         }
  585.     }
  586.     // set the udp header
  587.     header->source_port = htons(( socket->port > 0 ) ? socket->port : 0 );
  588.     header->destination_port = htons( dest_port );
  589.     header->total_length = htons( total_length + sizeof( * header ));
  590.     header->checksum = 0;
  591.     if( udp_globals.checksum_computing ){
  592.         if( ERROR_OCCURRED( ip_get_route_req( udp_globals.ip_phone, IPPROTO_UDP, addr, addrlen, & device_id, & ip_header, & headerlen ))){
  593.             return udp_release_and_return( packet, ERROR_CODE );
  594.         }
  595.         if( ERROR_OCCURRED( ip_client_set_pseudo_header_data_length( ip_header, headerlen, total_length + sizeof( udp_header_t )))){
  596.             free( ip_header );
  597.             return udp_release_and_return( packet, ERROR_CODE );
  598.         }
  599.         checksum = compute_checksum( checksum, ip_header, headerlen );
  600.         checksum = compute_checksum( checksum, ( uint8_t * ) header, sizeof( * header ));
  601.         header->checksum = htons( flip_checksum( compact_checksum( checksum )));
  602.         free( ip_header );
  603.     }else{
  604.         device_id = -1;
  605.     }
  606.     // prepare the first packet fragment
  607.     if( ERROR_OCCURRED( ip_client_prepare_packet( packet, IPPROTO_UDP, 0, 0, 0, 0 ))){
  608.         return udp_release_and_return( packet, ERROR_CODE );
  609.     }
  610.     // send the packet
  611.     fibril_rwlock_write_unlock( & udp_globals.lock );
  612.     ip_send_msg( udp_globals.ip_phone, device_id, packet, SERVICE_UDP, 0 );
  613.     return EOK;
  614. }
  615.  
  616. int udp_recvfrom_message( socket_cores_ref local_sockets, int socket_id, int flags, size_t * addrlen ){
  617.     ERROR_DECLARE;
  618.  
  619.     socket_core_ref socket;
  620.     int             packet_id;
  621.     packet_t        packet;
  622.     udp_header_ref  header;
  623.     struct sockaddr *   addr;
  624.     size_t          length;
  625.     uint8_t *       data;
  626.     int             result;
  627.  
  628.     // find the socket
  629.     socket = socket_cores_find( local_sockets, socket_id );
  630.     if( ! socket ) return ENOTSOCK;
  631.     // get the next received packet
  632.     packet_id = dyn_fifo_value( & socket->received );
  633.     if( packet_id < 0 ) return NO_DATA;
  634.     ERROR_PROPAGATE( packet_translate( udp_globals.net_phone, & packet, packet_id ));
  635.     // get udp header
  636.     data = packet_get_data( packet );
  637.     if( ! data ){
  638.         pq_release( udp_globals.net_phone, packet_id );
  639.         return NO_DATA;
  640.     }
  641.     header = ( udp_header_ref ) data;
  642.  
  643.     // set the source address port
  644.     result = packet_get_addr( packet, ( uint8_t ** ) & addr, NULL );
  645.     if( ERROR_OCCURRED( tl_set_address_port( addr, result, ntohs( header->source_port )))){
  646.         pq_release( udp_globals.net_phone, packet_id );
  647.         return ERROR_CODE;
  648.     }
  649.     * addrlen = ( size_t ) result;
  650.     // send the source address
  651.     ERROR_PROPAGATE( data_reply( addr, * addrlen ));
  652.  
  653.     // trim the header
  654.     ERROR_PROPAGATE( packet_trim( packet, sizeof( udp_header_t ), 0 ));
  655.  
  656.     // reply the packets
  657.     ERROR_PROPAGATE( socket_reply_packets( packet, & length ));
  658.  
  659.     // release the packet
  660.     dyn_fifo_pop( & socket->received );
  661.     pq_release( udp_globals.net_phone, packet_get_id( packet ));
  662.     // return the total length
  663.     return ( int ) length;
  664. }
  665.  
  666. int udp_release_and_return( packet_t packet, int result ){
  667.     pq_release( udp_globals.net_phone, packet_get_id( packet ));
  668.     return result;
  669. }
  670.  
  671. /** @}
  672.  */
  673.