2017-10-23 16:45:12 +02:00
|
|
|
/****************************************************************************
|
2020-12-01 07:55:16 +01:00
|
|
|
* net/icmp/icmp_sendmsg.c
|
2017-10-23 16:45:12 +02:00
|
|
|
*
|
2024-09-11 14:39:39 +02:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*
|
2020-05-17 16:47:40 +02:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2017-10-23 16:45:12 +02:00
|
|
|
*
|
2020-05-17 16:47:40 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2017-10-23 16:45:12 +02:00
|
|
|
*
|
2020-05-17 16:47:40 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2017-10-23 16:45:12 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
|
|
|
#include <nuttx/semaphore.h>
|
|
|
|
#include <nuttx/mm/iob.h>
|
|
|
|
#include <nuttx/net/netconfig.h>
|
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
#include <nuttx/net/netdev.h>
|
|
|
|
#include <nuttx/net/netstats.h>
|
|
|
|
#include <nuttx/net/ip.h>
|
|
|
|
#include <nuttx/net/icmp.h>
|
|
|
|
|
|
|
|
#include "utils/utils.h"
|
|
|
|
#include "socket/socket.h"
|
|
|
|
#include "netdev/netdev.h"
|
|
|
|
#include "devif/devif.h"
|
|
|
|
#include "inet/inet.h"
|
|
|
|
#include "arp/arp.h"
|
|
|
|
#include "icmp/icmp.h"
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_ICMP_SOCKET
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
struct icmp_sendto_s
|
|
|
|
{
|
|
|
|
FAR struct devif_callback_s *snd_cb; /* Reference to callback instance */
|
2020-05-17 16:47:40 +02:00
|
|
|
sem_t snd_sem; /* Use to manage the wait for send
|
|
|
|
* complete */
|
|
|
|
in_addr_t snd_toaddr; /* The peer to send the request to */
|
|
|
|
FAR const uint8_t *snd_buf; /* ICMP header + data payload */
|
|
|
|
uint16_t snd_buflen; /* Size of the ICMP header + data
|
|
|
|
* payload */
|
|
|
|
int16_t snd_result; /* 0: success; <0:negated errno on
|
|
|
|
* fail */
|
2017-10-23 16:45:12 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: sendto_request
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Setup to send an ICMP request packet
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-10-23 16:45:12 +02:00
|
|
|
* dev - The device driver structure to use in the send operation
|
|
|
|
* pstate - Reference to an instance of the ICMP sendto state structure
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2017-10-23 16:45:12 +02:00
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static void sendto_request(FAR struct net_driver_s *dev,
|
|
|
|
FAR struct icmp_sendto_s *pstate)
|
|
|
|
{
|
|
|
|
FAR struct icmp_hdr_s *icmp;
|
|
|
|
|
2024-05-09 09:55:24 +02:00
|
|
|
#ifdef CONFIG_NET_JUMBO_FRAME
|
|
|
|
netdev_iob_prepare_dynamic(dev, pstate->snd_buflen + IPv4_HDRLEN);
|
|
|
|
#endif
|
|
|
|
|
2023-01-11 06:57:05 +01:00
|
|
|
/* Set-up to send that amount of data. */
|
|
|
|
|
|
|
|
devif_send(dev, pstate->snd_buf, pstate->snd_buflen, IPv4_HDRLEN);
|
|
|
|
if (dev->d_sndlen != pstate->snd_buflen)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-10-23 16:45:12 +02:00
|
|
|
IFF_SET_IPv4(dev->d_flags);
|
|
|
|
|
|
|
|
/* The total length to send is the size of the application data plus the
|
|
|
|
* IP and ICMP headers (and, eventually, the Ethernet header)
|
|
|
|
*/
|
|
|
|
|
|
|
|
dev->d_len = IPv4_HDRLEN + pstate->snd_buflen;
|
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
/* Initialize the IP header. */
|
2017-10-23 16:45:12 +02:00
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
ipv4_build_header(IPv4BUF, dev->d_len, IP_PROTO_ICMP,
|
|
|
|
&dev->d_ipaddr, &pstate->snd_toaddr,
|
2022-12-21 05:40:42 +01:00
|
|
|
IP_TTL_DEFAULT, 0, NULL);
|
2017-10-23 16:45:12 +02:00
|
|
|
|
2023-01-11 06:57:05 +01:00
|
|
|
/* Copy the ICMP header and payload into place after the IPv4 header */
|
|
|
|
|
|
|
|
icmp = IPBUF(IPv4_HDRLEN);
|
|
|
|
|
2017-10-23 16:45:12 +02:00
|
|
|
/* Calculate the ICMP checksum. */
|
|
|
|
|
2023-01-11 06:57:05 +01:00
|
|
|
icmp->icmpchksum = 0;
|
2024-04-24 05:06:52 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_ICMP_CHECKSUMS
|
2023-01-11 06:57:05 +01:00
|
|
|
icmp->icmpchksum = ~icmp_chksum_iob(dev->d_iob);
|
2017-10-23 16:45:12 +02:00
|
|
|
if (icmp->icmpchksum == 0)
|
|
|
|
{
|
|
|
|
icmp->icmpchksum = 0xffff;
|
|
|
|
}
|
2024-04-24 05:06:52 +02:00
|
|
|
#endif
|
2017-10-23 16:45:12 +02:00
|
|
|
|
2022-11-29 04:23:43 +01:00
|
|
|
ninfo("Outgoing ICMP packet length: %d\n", dev->d_len);
|
2017-10-23 16:45:12 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_STATISTICS
|
|
|
|
g_netstats.icmp.sent++;
|
|
|
|
g_netstats.ipv4.sent++;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: sendto_eventhandler
|
|
|
|
*
|
|
|
|
* Description:
|
2018-06-23 22:09:06 +02:00
|
|
|
* This function is called with the network locked to perform the actual
|
2017-10-23 16:45:12 +02:00
|
|
|
* ECHO request and/or ECHO reply actions when polled by the lower, device
|
|
|
|
* interfacing layer.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2018-06-23 22:09:06 +02:00
|
|
|
* dev The structure of the network driver that generated the
|
|
|
|
* event.
|
|
|
|
* pvpriv An instance of struct icmp_sendto_s cast to (void *)
|
2017-10-23 16:45:12 +02:00
|
|
|
* flags Set of events describing why the callback was invoked
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Modified value of the input flags
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static uint16_t sendto_eventhandler(FAR struct net_driver_s *dev,
|
2022-08-25 15:17:57 +02:00
|
|
|
FAR void *pvpriv, uint16_t flags)
|
2017-10-23 16:45:12 +02:00
|
|
|
{
|
2022-08-25 15:17:57 +02:00
|
|
|
FAR struct icmp_sendto_s *pstate = pvpriv;
|
2017-10-23 16:45:12 +02:00
|
|
|
|
|
|
|
ninfo("flags: %04x\n", flags);
|
|
|
|
|
|
|
|
if (pstate != NULL)
|
|
|
|
{
|
|
|
|
/* Check if the network is still up */
|
|
|
|
|
|
|
|
if ((flags & NETDEV_DOWN) != 0)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Interface is down\n");
|
|
|
|
pstate->snd_result = -ENETUNREACH;
|
|
|
|
goto end_wait;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check:
|
|
|
|
* If the outgoing packet is available (it may have been claimed
|
2018-06-23 22:09:06 +02:00
|
|
|
* by a sendto event handler serving a different thread)
|
2017-10-23 16:45:12 +02:00
|
|
|
* -OR-
|
|
|
|
* If the output buffer currently contains unprocessed incoming
|
|
|
|
* data.
|
|
|
|
* -OR-
|
|
|
|
* If we have already sent the ECHO request
|
|
|
|
*
|
|
|
|
* In the first two cases, we will just have to wait for the next
|
|
|
|
* polling cycle.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (dev->d_sndlen <= 0 && /* Packet available */
|
|
|
|
(flags & ICMP_NEWDATA) == 0) /* No incoming data */
|
|
|
|
{
|
|
|
|
/* Send the ICMP echo request. */
|
|
|
|
|
|
|
|
ninfo("Send ICMP request\n");
|
|
|
|
|
|
|
|
sendto_request(dev, pstate);
|
2023-01-11 06:57:05 +01:00
|
|
|
if (dev->d_sndlen > 0)
|
|
|
|
{
|
|
|
|
pstate->snd_result = OK;
|
|
|
|
goto end_wait;
|
|
|
|
}
|
2017-10-23 16:45:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Continue waiting */
|
|
|
|
}
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
|
|
|
|
end_wait:
|
|
|
|
ninfo("Resuming\n");
|
|
|
|
|
|
|
|
/* Do not allow any further callbacks */
|
|
|
|
|
|
|
|
pstate->snd_cb->flags = 0;
|
|
|
|
pstate->snd_cb->priv = NULL;
|
|
|
|
pstate->snd_cb->event = NULL;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
|
|
|
nxsem_post(&pstate->snd_sem);
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2020-12-01 07:55:16 +01:00
|
|
|
* Name: icmp_sendmsg
|
2017-10-23 16:45:12 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2020-12-01 07:55:16 +01:00
|
|
|
* Implements the sendmsg() operation for the case of the IPPROTO_ICMP
|
2017-10-23 22:27:31 +02:00
|
|
|
* socket. The 'buf' parameter points to a block of memory that includes
|
|
|
|
* an ICMP request header, followed by any payload that accompanies the
|
|
|
|
* request. The 'len' parameter includes both the size of the ICMP header
|
|
|
|
* and the following payload.
|
2017-10-23 16:45:12 +02:00
|
|
|
*
|
2017-10-23 22:27:31 +02:00
|
|
|
* Input Parameters:
|
2017-10-23 16:45:12 +02:00
|
|
|
* psock A pointer to a NuttX-specific, internal socket structure
|
2020-12-01 07:55:16 +01:00
|
|
|
* msg Message to send
|
2017-10-23 16:45:12 +02:00
|
|
|
* flags Send flags
|
|
|
|
*
|
|
|
|
* Returned Value:
|
2020-12-01 07:55:16 +01:00
|
|
|
* On success, returns the number of characters sent. On error, a negated
|
|
|
|
* errno value is returned (see sendmsg() for the list of appropriate error
|
2017-10-23 16:45:12 +02:00
|
|
|
* values.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
ssize_t icmp_sendmsg(FAR struct socket *psock, FAR struct msghdr *msg,
|
|
|
|
int flags)
|
2017-10-23 16:45:12 +02:00
|
|
|
{
|
2020-12-01 07:55:16 +01:00
|
|
|
FAR const void *buf = msg->msg_iov->iov_base;
|
|
|
|
size_t len = msg->msg_iov->iov_len;
|
|
|
|
FAR const struct sockaddr *to = msg->msg_name;
|
|
|
|
socklen_t tolen = msg->msg_namelen;
|
2017-10-23 16:45:12 +02:00
|
|
|
FAR const struct sockaddr_in *inaddr;
|
|
|
|
FAR struct net_driver_s *dev;
|
|
|
|
FAR struct icmp_conn_s *conn;
|
|
|
|
FAR struct icmp_hdr_s *icmp;
|
|
|
|
struct icmp_sendto_s state;
|
2020-12-01 07:55:16 +01:00
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
/* Validity check, only single iov supported */
|
|
|
|
|
|
|
|
if (msg->msg_iovlen != 1)
|
|
|
|
{
|
|
|
|
return -ENOTSUP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (to == NULL)
|
|
|
|
{
|
|
|
|
/* icmp_send() */
|
|
|
|
|
|
|
|
/* ICMP sockets cannot be bound and, hence, cannot support any
|
|
|
|
* connection-oriented data transfer.
|
|
|
|
*/
|
|
|
|
|
|
|
|
return -EDESTADDRREQ;
|
|
|
|
}
|
2017-10-23 16:45:12 +02:00
|
|
|
|
|
|
|
/* Some sanity checks */
|
|
|
|
|
2023-08-30 08:46:41 +02:00
|
|
|
DEBUGASSERT(buf != NULL && to != NULL);
|
2017-10-23 16:45:12 +02:00
|
|
|
|
|
|
|
if (len < ICMP_HDRLEN || tolen < sizeof(struct sockaddr_in))
|
|
|
|
{
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
conn = psock->s_conn;
|
|
|
|
inaddr = (FAR const struct sockaddr_in *)to;
|
|
|
|
|
|
|
|
/* Get the device that will be used to route this ICMP ECHO request */
|
|
|
|
|
2022-11-10 07:44:17 +01:00
|
|
|
#ifdef CONFIG_NET_BINDTODEVICE
|
|
|
|
if (conn->sconn.s_boundto != 0)
|
|
|
|
{
|
2023-02-09 08:35:00 +01:00
|
|
|
dev = netdev_findbyindex(conn->sconn.s_boundto);
|
2022-11-10 07:44:17 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
dev = netdev_findby_ripv4addr(INADDR_ANY, inaddr->sin_addr.s_addr);
|
|
|
|
}
|
|
|
|
|
2017-10-23 16:45:12 +02:00
|
|
|
if (dev == NULL)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Not reachable\n");
|
|
|
|
ret = -ENETUNREACH;
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
2023-01-09 13:47:11 +01:00
|
|
|
#ifndef CONFIG_NET_IPFRAG
|
2020-11-24 04:38:06 +01:00
|
|
|
/* Sanity check if the request len is greater than the net payload len */
|
|
|
|
|
|
|
|
if (len > NETDEV_PKTSIZE(dev) - (NET_LL_HDRLEN(dev) + IPv4_HDRLEN))
|
|
|
|
{
|
|
|
|
nerr("ERROR: Invalid packet length\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2023-01-09 13:47:11 +01:00
|
|
|
#endif
|
2020-11-24 04:38:06 +01:00
|
|
|
|
2017-10-23 16:45:12 +02:00
|
|
|
/* If we are no longer processing the same ping ID, then flush any pending
|
|
|
|
* packets from the read-ahead buffer.
|
|
|
|
*
|
2020-02-22 19:31:14 +01:00
|
|
|
* REVISIT: How to we free up any lingering responses if there are no
|
2019-12-12 14:41:51 +01:00
|
|
|
* further pings?
|
2017-10-23 16:45:12 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
icmp = (FAR struct icmp_hdr_s *)buf;
|
2023-05-09 13:09:53 +02:00
|
|
|
if (psock->s_type != SOCK_RAW && (icmp->type != ICMP_ECHO_REQUEST ||
|
|
|
|
icmp->id != conn->id || dev != conn->dev))
|
2017-10-23 16:45:12 +02:00
|
|
|
{
|
2023-05-09 13:09:53 +02:00
|
|
|
conn->id = 0;
|
|
|
|
conn->dev = NULL;
|
2017-10-23 16:45:12 +02:00
|
|
|
|
2022-08-08 04:21:03 +02:00
|
|
|
iob_free_queue(&conn->readahead);
|
2017-10-23 16:45:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_ARP_SEND
|
|
|
|
/* Make sure that the IP address mapping is in the ARP table */
|
|
|
|
|
|
|
|
ret = arp_send(inaddr->sin_addr.s_addr);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Not reachable\n");
|
|
|
|
ret = -ENETUNREACH;
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Initialize the state structure */
|
|
|
|
|
|
|
|
nxsem_init(&state.snd_sem, 0, 0);
|
|
|
|
|
2020-05-17 16:47:40 +02:00
|
|
|
state.snd_result = -ENOMEM; /* Assume allocation failure */
|
|
|
|
state.snd_toaddr = inaddr->sin_addr.s_addr; /* Address of the peer to send
|
|
|
|
* the request */
|
|
|
|
state.snd_buf = buf; /* ICMP header + data payload */
|
|
|
|
state.snd_buflen = len; /* Size of the ICMP header +
|
|
|
|
* data payload */
|
2017-10-23 16:45:12 +02:00
|
|
|
|
|
|
|
net_lock();
|
|
|
|
|
|
|
|
/* Set up the callback */
|
|
|
|
|
2019-03-19 16:43:32 +01:00
|
|
|
state.snd_cb = icmp_callback_alloc(dev, conn);
|
|
|
|
if (state.snd_cb != NULL)
|
2017-10-23 16:45:12 +02:00
|
|
|
{
|
2023-05-09 13:09:53 +02:00
|
|
|
state.snd_cb->flags = (ICMP_POLL | NETDEV_DOWN);
|
|
|
|
state.snd_cb->priv = (FAR void *)&state;
|
|
|
|
state.snd_cb->event = sendto_eventhandler;
|
2017-10-23 16:45:12 +02:00
|
|
|
|
|
|
|
/* Setup to receive ICMP ECHO replies */
|
|
|
|
|
2023-05-09 13:09:53 +02:00
|
|
|
if (psock->s_type != SOCK_RAW && icmp->type == ICMP_ECHO_REQUEST)
|
2017-10-23 16:45:12 +02:00
|
|
|
{
|
2023-05-09 13:09:53 +02:00
|
|
|
conn->id = icmp->id;
|
2017-10-23 16:45:12 +02:00
|
|
|
}
|
|
|
|
|
2023-05-09 13:09:53 +02:00
|
|
|
conn->dev = dev;
|
2017-10-23 16:45:12 +02:00
|
|
|
|
|
|
|
/* Notify the device driver of the availability of TX data */
|
|
|
|
|
|
|
|
netdev_txnotify_dev(dev);
|
|
|
|
|
2018-06-23 23:03:01 +02:00
|
|
|
/* Wait for either the send to complete or for timeout to occur.
|
2023-01-13 07:51:38 +01:00
|
|
|
* net_sem_timedwait will also terminate if a signal is received.
|
2017-10-23 16:45:12 +02:00
|
|
|
*/
|
|
|
|
|
2023-01-13 07:51:38 +01:00
|
|
|
ret = net_sem_timedwait(&state.snd_sem,
|
2022-02-07 07:36:54 +01:00
|
|
|
_SO_TIMEOUT(conn->sconn.s_sndtimeo));
|
2020-01-04 11:37:46 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
if (ret == -ETIMEDOUT)
|
|
|
|
{
|
2020-05-17 16:47:40 +02:00
|
|
|
/* Check if this device is on the same network as the
|
|
|
|
* destination device.
|
2020-01-04 11:37:46 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
if (!net_ipv4addr_maskcmp(state.snd_toaddr, dev->d_ipaddr,
|
|
|
|
dev->d_netmask))
|
|
|
|
{
|
2020-05-17 16:47:40 +02:00
|
|
|
/* Destination address was not on the local network served
|
|
|
|
* by this device. If a timeout occurs, then the most
|
|
|
|
* likely reason is that the destination address is not
|
|
|
|
* reachable.
|
2020-01-04 11:37:46 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
ret = -ENETUNREACH;
|
|
|
|
}
|
2022-06-27 02:04:32 +02:00
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = -EAGAIN;
|
|
|
|
}
|
2020-01-04 11:37:46 +01:00
|
|
|
}
|
2020-01-11 16:40:32 +01:00
|
|
|
|
2020-01-04 11:37:46 +01:00
|
|
|
state.snd_result = ret;
|
|
|
|
}
|
2017-10-23 16:45:12 +02:00
|
|
|
|
2019-03-19 16:43:32 +01:00
|
|
|
icmp_callback_free(dev, conn, state.snd_cb);
|
2017-10-23 16:45:12 +02:00
|
|
|
}
|
|
|
|
|
2022-11-20 16:11:18 +01:00
|
|
|
nxsem_destroy(&state.snd_sem);
|
|
|
|
|
2017-10-23 16:45:12 +02:00
|
|
|
net_unlock();
|
|
|
|
|
|
|
|
/* Return the negated error number in the event of a failure, or the
|
|
|
|
* number of bytes sent on success.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (state.snd_result < 0)
|
|
|
|
{
|
|
|
|
nerr("ERROR: Return error=%d\n", state.snd_result);
|
|
|
|
ret = state.snd_result;
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
|
|
|
return len;
|
|
|
|
|
|
|
|
errout:
|
2023-05-09 13:09:53 +02:00
|
|
|
conn->id = 0;
|
|
|
|
conn->dev = NULL;
|
2017-10-23 16:45:12 +02:00
|
|
|
|
2022-08-08 04:21:03 +02:00
|
|
|
iob_free_queue(&conn->readahead);
|
2017-10-23 16:45:12 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NET_ICMP_SOCKET */
|