/**************************************************************************** (c) SYSTEC electronic GmbH, D-07973 Greiz, August-Bebel-Str. 29 www.systec-electronic.com Project: openPOWERLINK Description: source file for SDO/UDP-Protocolabstractionlayer module License: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of SYSTEC electronic GmbH nor the names of its contributors may be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact info@systec-electronic.com. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Severability Clause: If a provision of this License is or becomes illegal, invalid or unenforceable in any jurisdiction, that shall not affect: 1. the validity or enforceability in that jurisdiction of any other provision of this License; or 2. the validity or enforceability in other jurisdictions of that or any other provision of this License. ------------------------------------------------------------------------- $RCSfile: EplSdoUdpu.c,v $ $Author: D.Krueger $ $Revision: 1.8 $ $Date: 2008/10/17 15:32:32 $ $State: Exp $ Build Environment: GCC V3.4 ------------------------------------------------------------------------- Revision History: 2006/06/26 k.t.: start of the implementation ****************************************************************************/ #include "user/EplSdoUdpu.h" #if (((EPL_MODULE_INTEGRATION) & (EPL_MODULE_SDO_UDP)) != 0) #if (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) #include "SocketLinuxKernel.h" #include #include #endif /***************************************************************************/ /* */ /* */ /* G L O B A L D E F I N I T I O N S */ /* */ /* */ /***************************************************************************/ //--------------------------------------------------------------------------- // const defines //--------------------------------------------------------------------------- #ifndef EPL_SDO_MAX_CONNECTION_UDP #define EPL_SDO_MAX_CONNECTION_UDP 5 #endif //--------------------------------------------------------------------------- // local types //--------------------------------------------------------------------------- typedef struct { unsigned long m_ulIpAddr; // in network byte order unsigned int m_uiPort; // in network byte order } tEplSdoUdpCon; // instance table typedef struct { tEplSdoUdpCon m_aSdoAbsUdpConnection[EPL_SDO_MAX_CONNECTION_UDP]; tEplSequLayerReceiveCb m_fpSdoAsySeqCb; SOCKET m_UdpSocket; #if (TARGET_SYSTEM == _WIN32_) HANDLE m_ThreadHandle; LPCRITICAL_SECTION m_pCriticalSection; CRITICAL_SECTION m_CriticalSection; #elif (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) struct completion m_CompletionUdpThread; int m_ThreadHandle; int m_iTerminateThread; #endif } tEplSdoUdpInstance; //--------------------------------------------------------------------------- // modul globale vars //--------------------------------------------------------------------------- static tEplSdoUdpInstance SdoUdpInstance_g; //--------------------------------------------------------------------------- // local function prototypes //--------------------------------------------------------------------------- #if (TARGET_SYSTEM == _WIN32_) static DWORD PUBLIC EplSdoUdpThread(LPVOID lpParameter); #elif (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) static int EplSdoUdpThread(void *pArg_p); #endif /***************************************************************************/ /* */ /* */ /* C L A S S */ /* */ /* */ /***************************************************************************/ // // Description: Protocolabstraction layer for UDP // // /***************************************************************************/ //=========================================================================// // // // P U B L I C F U N C T I O N S // // // //=========================================================================// //--------------------------------------------------------------------------- // // Function: EplSdoUdpuInit // // Description: init first instance of the module // // // // Parameters: pReceiveCb_p = functionpointer to Sdo-Sequence layer // callback-function // // // Returns: tEplKernel = Errorcode // // // State: // //--------------------------------------------------------------------------- tEplKernel PUBLIC EplSdoUdpuInit(tEplSequLayerReceiveCb fpReceiveCb_p) { tEplKernel Ret; Ret = EplSdoUdpuAddInstance(fpReceiveCb_p); return Ret; } //--------------------------------------------------------------------------- // // Function: EplSdoUdpuAddInstance // // Description: init additional instance of the module // înit socket and start Listen-Thread // // // // Parameters: pReceiveCb_p = functionpointer to Sdo-Sequence layer // callback-function // // // Returns: tEplKernel = Errorcode // // // State: // //--------------------------------------------------------------------------- tEplKernel PUBLIC EplSdoUdpuAddInstance(tEplSequLayerReceiveCb fpReceiveCb_p) { tEplKernel Ret; #if (TARGET_SYSTEM == _WIN32_) int iError; WSADATA Wsa; #endif // set instance variables to 0 EPL_MEMSET(&SdoUdpInstance_g, 0x00, sizeof(SdoUdpInstance_g)); Ret = kEplSuccessful; // save pointer to callback-function if (fpReceiveCb_p != NULL) { SdoUdpInstance_g.m_fpSdoAsySeqCb = fpReceiveCb_p; } else { Ret = kEplSdoUdpMissCb; goto Exit; } #if (TARGET_SYSTEM == _WIN32_) // start winsock2 for win32 // windows specific start of socket iError = WSAStartup(MAKEWORD(2, 0), &Wsa); if (iError != 0) { Ret = kEplSdoUdpNoSocket; goto Exit; } // create critical section for acccess of instnace variables SdoUdpInstance_g.m_pCriticalSection = &SdoUdpInstance_g.m_CriticalSection; InitializeCriticalSection(SdoUdpInstance_g.m_pCriticalSection); #elif (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) init_completion(&SdoUdpInstance_g.m_CompletionUdpThread); SdoUdpInstance_g.m_iTerminateThread = 0; #endif SdoUdpInstance_g.m_ThreadHandle = 0; SdoUdpInstance_g.m_UdpSocket = INVALID_SOCKET; Ret = EplSdoUdpuConfig(INADDR_ANY, 0); Exit: return Ret; } //--------------------------------------------------------------------------- // // Function: EplSdoUdpuDelInstance // // Description: del instance of the module // del socket and del Listen-Thread // // // // Parameters: // // // Returns: tEplKernel = Errorcode // // // State: // //--------------------------------------------------------------------------- tEplKernel PUBLIC EplSdoUdpuDelInstance() { tEplKernel Ret; #if (TARGET_SYSTEM == _WIN32_) BOOL fTermError; #endif Ret = kEplSuccessful; if (SdoUdpInstance_g.m_ThreadHandle != 0) { // listen thread was started // close thread #if (TARGET_SYSTEM == _WIN32_) fTermError = TerminateThread(SdoUdpInstance_g.m_ThreadHandle, 0); if (fTermError == FALSE) { Ret = kEplSdoUdpThreadError; goto Exit; } #elif (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) SdoUdpInstance_g.m_iTerminateThread = 1; /* kill_proc(SdoUdpInstance_g.m_ThreadHandle, SIGTERM, 1 ); */ send_sig(SIGTERM, SdoUdpInstance_g.m_ThreadHandle, 1); wait_for_completion(&SdoUdpInstance_g.m_CompletionUdpThread); #endif SdoUdpInstance_g.m_ThreadHandle = 0; } if (SdoUdpInstance_g.m_UdpSocket != INVALID_SOCKET) { // close socket closesocket(SdoUdpInstance_g.m_UdpSocket); SdoUdpInstance_g.m_UdpSocket = INVALID_SOCKET; } #if (TARGET_SYSTEM == _WIN32_) // delete critical section DeleteCriticalSection(SdoUdpInstance_g.m_pCriticalSection); #endif #if (TARGET_SYSTEM == _WIN32_) // for win 32 WSACleanup(); #endif #if (TARGET_SYSTEM == _WIN32_) Exit: #endif return Ret; } //--------------------------------------------------------------------------- // // Function: EplSdoUdpuConfig // // Description: reconfigurate socket with new IP-Address // -> needed for NMT ResetConfiguration // // Parameters: ulIpAddr_p = IpAddress in platform byte order // uiPort_p = port number in platform byte order // // // Returns: tEplKernel = Errorcode // // // State: // //--------------------------------------------------------------------------- tEplKernel PUBLIC EplSdoUdpuConfig(unsigned long ulIpAddr_p, unsigned int uiPort_p) { tEplKernel Ret; struct sockaddr_in Addr; int iError; #if (TARGET_SYSTEM == _WIN32_) BOOL fTermError; unsigned long ulThreadId; #endif Ret = kEplSuccessful; if (uiPort_p == 0) { // set UDP port to default port number uiPort_p = EPL_C_SDO_EPL_PORT; } else if (uiPort_p > 65535) { Ret = kEplSdoUdpSocketError; goto Exit; } if (SdoUdpInstance_g.m_ThreadHandle != 0) { // listen thread was started // close old thread #if (TARGET_SYSTEM == _WIN32_) fTermError = TerminateThread(SdoUdpInstance_g.m_ThreadHandle, 0); if (fTermError == FALSE) { Ret = kEplSdoUdpThreadError; goto Exit; } #elif (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) SdoUdpInstance_g.m_iTerminateThread = 1; /* kill_proc(SdoUdpInstance_g.m_ThreadHandle, SIGTERM, 1 ); */ send_sig(SIGTERM, SdoUdpInstance_g.m_ThreadHandle, 1); wait_for_completion(&SdoUdpInstance_g.m_CompletionUdpThread); SdoUdpInstance_g.m_iTerminateThread = 0; #endif SdoUdpInstance_g.m_ThreadHandle = 0; } if (SdoUdpInstance_g.m_UdpSocket != INVALID_SOCKET) { // close socket iError = closesocket(SdoUdpInstance_g.m_UdpSocket); SdoUdpInstance_g.m_UdpSocket = INVALID_SOCKET; if (iError != 0) { Ret = kEplSdoUdpSocketError; goto Exit; } } // create Socket SdoUdpInstance_g.m_UdpSocket = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP); if (SdoUdpInstance_g.m_UdpSocket == INVALID_SOCKET) { Ret = kEplSdoUdpNoSocket; EPL_DBGLVL_SDO_TRACE0("EplSdoUdpuConfig: socket() failed\n"); goto Exit; } // bind socket Addr.sin_family = AF_INET; Addr.sin_port = htons((unsigned short)uiPort_p); Addr.sin_addr.s_addr = htonl(ulIpAddr_p); iError = bind(SdoUdpInstance_g.m_UdpSocket, (struct sockaddr *)&Addr, sizeof(Addr)); if (iError < 0) { //iError = WSAGetLastError(); EPL_DBGLVL_SDO_TRACE1 ("EplSdoUdpuConfig: bind() finished with %i\n", iError); Ret = kEplSdoUdpNoSocket; goto Exit; } // create Listen-Thread #if (TARGET_SYSTEM == _WIN32_) // for win32 // create thread SdoUdpInstance_g.m_ThreadHandle = CreateThread(NULL, 0, EplSdoUdpThread, &SdoUdpInstance_g, 0, &ulThreadId); if (SdoUdpInstance_g.m_ThreadHandle == NULL) { Ret = kEplSdoUdpThreadError; goto Exit; } #elif (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) SdoUdpInstance_g.m_ThreadHandle = kernel_thread(EplSdoUdpThread, &SdoUdpInstance_g, CLONE_KERNEL); if (SdoUdpInstance_g.m_ThreadHandle == 0) { Ret = kEplSdoUdpThreadError; goto Exit; } #endif Exit: return Ret; } //--------------------------------------------------------------------------- // // Function: EplSdoUdpuInitCon // // Description: init a new connect // // // // Parameters: pSdoConHandle_p = pointer for the new connection handle // uiTargetNodeId_p = NodeId of the target node // // // Returns: tEplKernel = Errorcode // // // State: // //--------------------------------------------------------------------------- tEplKernel PUBLIC EplSdoUdpuInitCon(tEplSdoConHdl * pSdoConHandle_p, unsigned int uiTargetNodeId_p) { tEplKernel Ret; unsigned int uiCount; unsigned int uiFreeCon; tEplSdoUdpCon *pSdoUdpCon; Ret = kEplSuccessful; // get free entry in control structure uiCount = 0; uiFreeCon = EPL_SDO_MAX_CONNECTION_UDP; pSdoUdpCon = &SdoUdpInstance_g.m_aSdoAbsUdpConnection[0]; while (uiCount < EPL_SDO_MAX_CONNECTION_UDP) { if ((pSdoUdpCon->m_ulIpAddr & htonl(0xFF)) == htonl(uiTargetNodeId_p)) { // existing connection to target node found // set handle *pSdoConHandle_p = (uiCount | EPL_SDO_UDP_HANDLE); goto Exit; } else if ((pSdoUdpCon->m_ulIpAddr == 0) && (pSdoUdpCon->m_uiPort == 0)) { uiFreeCon = uiCount; } uiCount++; pSdoUdpCon++; } if (uiFreeCon == EPL_SDO_MAX_CONNECTION_UDP) { // error no free handle Ret = kEplSdoUdpNoFreeHandle; } else { pSdoUdpCon = &SdoUdpInstance_g.m_aSdoAbsUdpConnection[uiFreeCon]; // save infos for connection pSdoUdpCon->m_uiPort = htons(EPL_C_SDO_EPL_PORT); pSdoUdpCon->m_ulIpAddr = htonl(0xC0A86400 | uiTargetNodeId_p); // 192.168.100.uiTargetNodeId_p // set handle *pSdoConHandle_p = (uiFreeCon | EPL_SDO_UDP_HANDLE); } Exit: return Ret; } //--------------------------------------------------------------------------- // // Function: EplSdoUdpuSendData // // Description: send data using exisiting connection // // // // Parameters: SdoConHandle_p = connection handle // pSrcData_p = pointer to data // dwDataSize_p = number of databyte // -> without asend-header!!! // // Returns: tEplKernel = Errorcode // // // State: // //--------------------------------------------------------------------------- tEplKernel PUBLIC EplSdoUdpuSendData(tEplSdoConHdl SdoConHandle_p, tEplFrame * pSrcData_p, DWORD dwDataSize_p) { tEplKernel Ret; int iError; unsigned int uiArray; struct sockaddr_in Addr; Ret = kEplSuccessful; uiArray = (SdoConHandle_p & ~EPL_SDO_ASY_HANDLE_MASK); if (uiArray >= EPL_SDO_MAX_CONNECTION_UDP) { Ret = kEplSdoUdpInvalidHdl; goto Exit; } //set message type AmiSetByteToLe(&pSrcData_p->m_le_bMessageType, 0x06); // SDO // target node id (for Udp = 0) AmiSetByteToLe(&pSrcData_p->m_le_bDstNodeId, 0x00); // set source-nodeid (for Udp = 0) AmiSetByteToLe(&pSrcData_p->m_le_bSrcNodeId, 0x00); // calc size dwDataSize_p += EPL_ASND_HEADER_SIZE; // call sendto Addr.sin_family = AF_INET; #if (TARGET_SYSTEM == _WIN32_) // enter critical section for process function EnterCriticalSection(SdoUdpInstance_g.m_pCriticalSection); #endif Addr.sin_port = (unsigned short)SdoUdpInstance_g.m_aSdoAbsUdpConnection[uiArray]. m_uiPort; Addr.sin_addr.s_addr = SdoUdpInstance_g.m_aSdoAbsUdpConnection[uiArray].m_ulIpAddr; #if (TARGET_SYSTEM == _WIN32_) // leave critical section for process function LeaveCriticalSection(SdoUdpInstance_g.m_pCriticalSection); #endif iError = sendto(SdoUdpInstance_g.m_UdpSocket, // sockethandle (const char *)&pSrcData_p->m_le_bMessageType, // data to send dwDataSize_p, // number of bytes to send 0, // flags (struct sockaddr *)&Addr, // target sizeof(struct sockaddr_in)); // sizeof targetadress if (iError < 0) { EPL_DBGLVL_SDO_TRACE1 ("EplSdoUdpuSendData: sendto() finished with %i\n", iError); Ret = kEplSdoUdpSendError; goto Exit; } Exit: return Ret; } //--------------------------------------------------------------------------- // // Function: EplSdoUdpuDelCon // // Description: delete connection from intern structure // // // // Parameters: SdoConHandle_p = connection handle // // Returns: tEplKernel = Errorcode // // // State: // //--------------------------------------------------------------------------- tEplKernel PUBLIC EplSdoUdpuDelCon(tEplSdoConHdl SdoConHandle_p) { tEplKernel Ret; unsigned int uiArray; uiArray = (SdoConHandle_p & ~EPL_SDO_ASY_HANDLE_MASK); if (uiArray >= EPL_SDO_MAX_CONNECTION_UDP) { Ret = kEplSdoUdpInvalidHdl; goto Exit; } else { Ret = kEplSuccessful; } // delete connection SdoUdpInstance_g.m_aSdoAbsUdpConnection[uiArray].m_ulIpAddr = 0; SdoUdpInstance_g.m_aSdoAbsUdpConnection[uiArray].m_uiPort = 0; Exit: return Ret; } //=========================================================================// // // // P R I V A T E F U N C T I O N S // // // //=========================================================================// //--------------------------------------------------------------------------- // // Function: EplSdoUdpThread // // Description: thread check socket for new data // // // // Parameters: lpParameter = pointer to parameter type tEplSdoUdpThreadPara // // // Returns: DWORD = errorcode // // // State: // //--------------------------------------------------------------------------- #if (TARGET_SYSTEM == _WIN32_) static DWORD PUBLIC EplSdoUdpThread(LPVOID lpParameter) #elif (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) static int EplSdoUdpThread(void *pArg_p) #endif { tEplSdoUdpInstance *pInstance; struct sockaddr_in RemoteAddr; int iError; int iCount; int iFreeEntry; BYTE abBuffer[EPL_MAX_SDO_REC_FRAME_SIZE]; unsigned int uiSize; tEplSdoConHdl SdoConHdl; #if (TARGET_SYSTEM == _WIN32_) pInstance = (tEplSdoUdpInstance *) lpParameter; for (;;) #elif (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) pInstance = (tEplSdoUdpInstance *) pArg_p; daemonize("EplSdoUdpThread"); allow_signal(SIGTERM); for (; pInstance->m_iTerminateThread == 0;) #endif { // wait for data uiSize = sizeof(struct sockaddr); iError = recvfrom(pInstance->m_UdpSocket, // Socket (char *)&abBuffer[0], // buffer for data sizeof(abBuffer), // size of the buffer 0, // flags (struct sockaddr *)&RemoteAddr, (int *)&uiSize); #if (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) if (iError == -ERESTARTSYS) { break; } #endif if (iError > 0) { // get handle for higher layer iCount = 0; iFreeEntry = 0xFFFF; #if (TARGET_SYSTEM == _WIN32_) // enter critical section for process function EnterCriticalSection(SdoUdpInstance_g. m_pCriticalSection); #endif while (iCount < EPL_SDO_MAX_CONNECTION_UDP) { // check if this connection is already known if ((pInstance->m_aSdoAbsUdpConnection[iCount]. m_ulIpAddr == RemoteAddr.sin_addr.s_addr) && (pInstance-> m_aSdoAbsUdpConnection[iCount]. m_uiPort == RemoteAddr.sin_port)) { break; } if ((pInstance->m_aSdoAbsUdpConnection[iCount]. m_ulIpAddr == 0) && (pInstance-> m_aSdoAbsUdpConnection[iCount]. m_uiPort == 0) && (iFreeEntry == 0xFFFF)) { iFreeEntry = iCount; } iCount++; } if (iCount == EPL_SDO_MAX_CONNECTION_UDP) { // connection unknown // see if there is a free handle if (iFreeEntry != 0xFFFF) { // save adress infos pInstance-> m_aSdoAbsUdpConnection[iFreeEntry]. m_ulIpAddr = RemoteAddr.sin_addr.s_addr; pInstance-> m_aSdoAbsUdpConnection[iFreeEntry]. m_uiPort = RemoteAddr.sin_port; #if (TARGET_SYSTEM == _WIN32_) // leave critical section for process function LeaveCriticalSection(SdoUdpInstance_g. m_pCriticalSection); #endif // call callback SdoConHdl = iFreeEntry; SdoConHdl |= EPL_SDO_UDP_HANDLE; // offset 4 -> start of SDO Sequence header pInstance->m_fpSdoAsySeqCb(SdoConHdl, (tEplAsySdoSeq *) & abBuffer[4], (iError - 4)); } else { EPL_DBGLVL_SDO_TRACE0 ("Error in EplSdoUdpThread() no free handle\n"); #if (TARGET_SYSTEM == _WIN32_) // leave critical section for process function LeaveCriticalSection(SdoUdpInstance_g. m_pCriticalSection); #endif } } else { // known connection // call callback with correct handle SdoConHdl = iCount; SdoConHdl |= EPL_SDO_UDP_HANDLE; #if (TARGET_SYSTEM == _WIN32_) // leave critical section for process function LeaveCriticalSection(SdoUdpInstance_g. m_pCriticalSection); #endif // offset 4 -> start of SDO Sequence header pInstance->m_fpSdoAsySeqCb(SdoConHdl, (tEplAsySdoSeq *) & abBuffer[4], (iError - 4)); } } // end of if(iError!=SOCKET_ERROR) } // end of for(;;) #if (TARGET_SYSTEM == _LINUX_) && defined(__KERNEL__) complete_and_exit(&SdoUdpInstance_g.m_CompletionUdpThread, 0); #endif return 0; } #endif // end of #if(((EPL_MODULE_INTEGRATION) & (EPL_MODULE_SDO_UDP)) != 0) // EOF