]> sigrok.org Git - libsigrok.git/blobdiff - src/serial.c
serial: extend stream detect for variable length packet checkers
[libsigrok.git] / src / serial.c
index 1b76c935e3a0e1b73874b875185a18105f1f7f37..c87c3a3347fc3a45ef4c2824a7e797ff692bf41e 100644 (file)
@@ -787,14 +787,24 @@ SR_PRIV int serial_readline(struct sr_serial_dev_inst *serial,
 /**
  * Try to find a valid packet in a serial data stream.
  *
- * @param serial Previously initialized serial port structure.
- * @param buf Buffer containing the bytes to write.
- * @param buflen Size of the buffer.
+ * @param[in] serial Previously initialized serial port structure.
+ * @param[in] buf Buffer containing the bytes to write.
+ * @param[in] buflen Size of the buffer.
  * @param[in] packet_size Size, in bytes, of a valid packet.
- * @param is_valid Callback that assesses whether the packet is valid or not.
+ * @param[in] is_valid Callback that assesses whether the packet is valid or not.
+ * @param[in] is_valid_len Callback which checks a variable length packet.
+ * @param[out] return_size Detected packet size in case of successful match.
  * @param[in] timeout_ms The timeout after which, if no packet is detected, to
  *                       abort scanning.
  *
+ * Data is received from the serial port and into the caller provided
+ * buffer, until the buffer is exhausted, or the timeout has expired,
+ * or a valid packet was found. Receive data is passed to the caller
+ * provided validity check routine, assuming either fixed size packets
+ * (#is_valid parameter, exact match to the #packet_size length) or
+ * packets of variable length (#is_valid_len parameter, minimum length
+ * #packet_size required for first invocation).
+ *
  * @retval SR_OK Valid packet was found within the given timeout.
  * @retval SR_ERR Failure.
  *
@@ -802,72 +812,115 @@ SR_PRIV int serial_readline(struct sr_serial_dev_inst *serial,
  */
 SR_PRIV int serial_stream_detect(struct sr_serial_dev_inst *serial,
        uint8_t *buf, size_t *buflen,
-       size_t packet_size,
-       packet_valid_callback is_valid,
+       size_t packet_size, packet_valid_callback is_valid,
+       packet_valid_len_callback is_valid_len, size_t *return_size,
        uint64_t timeout_ms)
 {
-       uint64_t start, time, byte_delay_us;
-       size_t ibuf, i, maxlen;
-       ssize_t len;
-
-       maxlen = *buflen;
+       uint64_t start_us, elapsed_ms, byte_delay_us;
+       size_t fill_idx, check_idx, max_fill_idx;
+       ssize_t recv_len;
+       const uint8_t *check_ptr;
+       size_t check_len, pkt_len;
+       gboolean do_dump;
+       int ret;
 
        sr_dbg("Detecting packets on %s (timeout = %" PRIu64 "ms).",
                serial->port, timeout_ms);
 
-       if (maxlen < (packet_size * 2) ) {
-               sr_err("Buffer size must be at least twice the packet size.");
-               return SR_ERR;
+       max_fill_idx = *buflen;
+       if (max_fill_idx < 2 * packet_size) {
+               /*
+                * The heuristics in this check is only useful for fixed
+                * packet length scenarios, but for variable length setups
+                * we don't know the packets' sizes up front.
+                */
+               sr_err("Small stream detect RX buffer, want 2x packet size.");
+               return SR_ERR_ARG;
        }
 
-       /* Assume 8n1 transmission. That is 10 bits for every byte. */
        byte_delay_us = serial_timeout(serial, 1) * 1000;
-       start = g_get_monotonic_time();
+       start_us = g_get_monotonic_time();
+
+       check_idx = fill_idx = 0;
+       while (fill_idx < max_fill_idx) {
+               /*
+                * Read bytes individually. Lets callers continue to
+                * successfully process next RX data after first match.
+                * Run full loop bodies for empty or failed reception
+                * in an iteration, to have timeouts checked.
+                */
+               recv_len = serial_read_nonblocking(serial, &buf[fill_idx], 1);
+               if (recv_len > 0)
+                       fill_idx += recv_len;
+
+               /* Dump receive data when (a minimum) size is reached. */
+               check_ptr = &buf[check_idx];
+               check_len = fill_idx - check_idx;
+               do_dump = check_len >= packet_size;
+               do_dump &= sr_log_loglevel_get() >= SR_LOG_SPEW;
+               if (do_dump) {
+                       GString *text;
 
-       i = ibuf = len = 0;
-       while (ibuf < maxlen) {
-               len = serial_read_nonblocking(serial, &buf[ibuf], 1);
-               if (len > 0) {
-                       ibuf += len;
-               } else if (len == 0) {
-                       /* No logging, already done in serial_read(). */
-               } else {
-                       /* Error reading byte, but continuing anyway. */
+                       text = sr_hexdump_new(check_ptr, check_len);
+                       sr_spew("Trying packet: len %zu, bytes %s",
+                               check_len, text->str);
+                       sr_hexdump_free(text);
                }
 
-               time = g_get_monotonic_time() - start;
-               time /= 1000;
-
-               if ((ibuf - i) >= packet_size) {
-                       GString *text;
-                       /* We have at least a packet's worth of data. */
-                       text = sr_hexdump_new(&buf[i], packet_size);
-                       sr_spew("Trying packet: %s", text->str);
-                       sr_hexdump_free(text);
-                       if (is_valid(&buf[i])) {
-                               sr_spew("Found valid %zu-byte packet after "
-                                       "%" PRIu64 "ms.", (ibuf - i), time);
-                               *buflen = ibuf;
+               /* A packet's (minimum) length was received, check its data. */
+               elapsed_ms = g_get_monotonic_time() - start_us;
+               elapsed_ms /= 1000;
+               if (is_valid_len && check_len >= packet_size) {
+                       pkt_len = packet_size;
+                       ret = is_valid_len(NULL, check_ptr, check_len, &pkt_len);
+                       if (ret == SR_PACKET_VALID) {
+                               /* Exact match. Terminate with success. */
+                               sr_spew("Valid packet after %" PRIu64 "ms.",
+                                       elapsed_ms);
+                               sr_spew("RX count %zu, packet len %zu.",
+                                       fill_idx, pkt_len);
+                               *buflen = fill_idx;
+                               if (return_size)
+                                       *return_size = pkt_len;
                                return SR_OK;
+                       }
+                       if (ret == SR_PACKET_NEED_RX) {
+                               /* Incomplete, keep accumulating RX data. */
+                               sr_spew("Checker needs more RX data.");
                        } else {
-                               sr_spew("Got %zu bytes, but not a valid "
-                                       "packet.", (ibuf - i));
+                               /* Not a valid packet. Continue searching. */
+                               sr_spew("Invalid packet, advancing read pos.");
+                               check_idx++;
+                       }
+               }
+               if (is_valid && check_len >= packet_size) {
+                       if (is_valid(check_ptr)) {
+                               /* Exact match. Terminate with success. */
+                               sr_spew("Valid packet after %" PRIu64 "ms.",
+                                       elapsed_ms);
+                               sr_spew("RX count %zu, packet len %zu.",
+                                       fill_idx, packet_size);
+                               *buflen = fill_idx;
+                               if (return_size)
+                                       *return_size = packet_size;
+                               return SR_OK;
                        }
                        /* Not a valid packet. Continue searching. */
-                       i++;
+                       sr_spew("Invalid packet, advancing read pointer.");
+                       check_idx++;
                }
-               if (time >= timeout_ms) {
-                       /* Timeout */
-                       sr_dbg("Detection timed out after %" PRIu64 "ms.", time);
+
+               /* Check for packet search timeout. */
+               if (elapsed_ms >= timeout_ms) {
+                       sr_dbg("Detection timed out after %" PRIu64 "ms.",
+                               elapsed_ms);
                        break;
                }
-               if (len < 1)
+               if (recv_len < 1)
                        g_usleep(byte_delay_us);
        }
-
-       *buflen = ibuf;
-
-       sr_info("Didn't find a valid packet (read %zu bytes).", *buflen);
+       sr_info("Didn't find a valid packet (read %zu bytes).", fill_idx);
+       *buflen = fill_idx;
 
        return SR_ERR;
 }