2014-08-18 22:29:02 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* net/arp/arp_send.c
|
|
|
|
*
|
2016-11-03 19:17:02 +01:00
|
|
|
* Copyright (C) 2014-2016 Gregory Nutt. All rights reserved.
|
2014-08-18 22:29:02 +02:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* 3. Neither the name NuttX nor the names of its contributors may be
|
|
|
|
* used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
|
|
* ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <unistd.h>
|
2014-11-15 15:55:50 +01:00
|
|
|
#include <string.h>
|
2014-08-18 22:29:02 +02:00
|
|
|
#include <semaphore.h>
|
2014-08-19 15:47:32 +02:00
|
|
|
#include <time.h>
|
2014-08-18 22:29:02 +02:00
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <net/if.h>
|
|
|
|
|
2016-11-03 19:17:02 +01:00
|
|
|
#include <nuttx/semaphore.h>
|
2014-08-18 22:29:02 +02:00
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
#include <nuttx/net/netdev.h>
|
|
|
|
#include <nuttx/net/ip.h>
|
|
|
|
#include <nuttx/net/arp.h>
|
|
|
|
|
|
|
|
#include "netdev/netdev.h"
|
|
|
|
#include "devif/devif.h"
|
2014-08-20 15:09:02 +02:00
|
|
|
#include "route/route.h"
|
2014-08-18 22:29:02 +02:00
|
|
|
#include "arp/arp.h"
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_ARP_SEND
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Pre-processor Definitions
|
|
|
|
****************************************************************************/
|
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
#define CONFIG_ARP_SEND_DELAYSEC \
|
|
|
|
(CONFIG_ARP_SEND_DELAYMSEC / 1000)
|
|
|
|
#define CONFIG_ARP_SEND_DELAYNSEC \
|
2014-08-19 16:37:14 +02:00
|
|
|
((CONFIG_ARP_SEND_DELAYMSEC - 1000*CONFIG_ARP_SEND_DELAYSEC) * 1000000)
|
2014-08-19 15:47:32 +02:00
|
|
|
|
2014-08-18 22:29:02 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
2015-05-27 19:39:44 +02:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: arp_send_terminate
|
2015-05-27 19:39:44 +02:00
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static void arp_send_terminate(FAR struct arp_send_s *state, int result)
|
|
|
|
{
|
|
|
|
/* Don't allow any further call backs. */
|
|
|
|
|
|
|
|
state->snd_sent = true;
|
|
|
|
state->snd_result = (int16_t)result;
|
|
|
|
state->snd_cb->flags = 0;
|
|
|
|
state->snd_cb->priv = NULL;
|
|
|
|
state->snd_cb->event = NULL;
|
|
|
|
|
|
|
|
/* Wake up the waiting thread */
|
|
|
|
|
|
|
|
sem_post(&state->snd_sem);
|
|
|
|
}
|
|
|
|
|
2014-08-18 22:29:02 +02:00
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: arp_send_interrupt
|
2014-08-18 22:29:02 +02:00
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static uint16_t arp_send_interrupt(FAR struct net_driver_s *dev,
|
|
|
|
FAR void *pvconn,
|
|
|
|
FAR void *priv, uint16_t flags)
|
|
|
|
{
|
|
|
|
FAR struct arp_send_s *state = (FAR struct arp_send_s *)priv;
|
|
|
|
|
2016-06-20 19:59:15 +02:00
|
|
|
ninfo("flags: %04x sent: %d\n", flags, state->snd_sent);
|
2014-08-18 22:29:02 +02:00
|
|
|
|
|
|
|
if (state)
|
|
|
|
{
|
2015-05-27 19:39:44 +02:00
|
|
|
/* Check if the network is still up */
|
2014-08-18 22:29:02 +02:00
|
|
|
|
2015-05-27 19:39:44 +02:00
|
|
|
if ((flags & NETDEV_DOWN) != 0)
|
2014-08-18 22:29:02 +02:00
|
|
|
{
|
2016-06-20 20:44:38 +02:00
|
|
|
nerr("ERROR: Interface is down\n");
|
2015-05-27 19:39:44 +02:00
|
|
|
arp_send_terminate(state, -ENETUNREACH);
|
2014-08-18 22:29:02 +02:00
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if the outgoing packet is available. It may have been claimed
|
|
|
|
* by a send interrupt serving a different thread -OR- if the output
|
|
|
|
* buffer currently contains unprocessed incoming data. In these cases
|
|
|
|
* we will just have to wait for the next polling cycle.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (dev->d_sndlen > 0 || (flags & PKT_NEWDATA) != 0)
|
|
|
|
{
|
|
|
|
/* Another thread has beat us sending data or the buffer is busy,
|
|
|
|
* Check for a timeout. If not timed out, wait for the next
|
|
|
|
* polling cycle and check again.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* REVISIT: No timeout. Just wait for the next polling cycle */
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* It looks like we are good to send the data */
|
|
|
|
/* Copy the packet data into the device packet buffer and send it */
|
|
|
|
|
|
|
|
arp_format(dev, state->snd_ipaddr);
|
|
|
|
|
|
|
|
/* Make sure no ARP request overwrites this ARP request. This
|
|
|
|
* flag will be cleared in arp_out().
|
|
|
|
*/
|
|
|
|
|
2015-01-20 22:59:52 +01:00
|
|
|
IFF_SET_NOARP(dev->d_flags);
|
2014-08-18 23:24:51 +02:00
|
|
|
|
2014-08-18 22:29:02 +02:00
|
|
|
/* Don't allow any further call backs. */
|
|
|
|
|
2015-05-27 19:39:44 +02:00
|
|
|
arp_send_terminate(state, OK);
|
2014-08-18 22:29:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-04-22 00:33:14 +02:00
|
|
|
* Name: arp_send
|
2014-08-18 22:29:02 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The arp_send() call may be to send an ARP request to resolve an IP
|
|
|
|
* address. This function first checks if the IP address is already in
|
|
|
|
* ARP table. If so, then it returns success immediately.
|
|
|
|
*
|
|
|
|
* If the requested IP address in not in the ARP table, then this function
|
|
|
|
* will send an ARP request, delay, then check if the IP address is now in
|
|
|
|
* the ARP table. It will repeat this sequence until either (1) the IP
|
|
|
|
* address mapping is now in the ARP table, or (2) a configurable number
|
|
|
|
* of timeouts occur without receiving the ARP replay.
|
|
|
|
*
|
|
|
|
* Parameters:
|
2014-08-20 15:09:02 +02:00
|
|
|
* ipaddr The IP address to be queried (in network order).
|
2014-08-18 22:29:02 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Zero (OK) is returned on success and the IP address mapping can now be
|
|
|
|
* found in the ARP table. On error a negated errno value is returned:
|
|
|
|
*
|
|
|
|
* -ETIMEDOUT: The number or retry counts has been exceed.
|
|
|
|
* -EHOSTUNREACH: Could not find a route to the host
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* This function is called from the normal tasking context.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int arp_send(in_addr_t ipaddr)
|
|
|
|
{
|
|
|
|
FAR struct net_driver_s *dev;
|
2014-08-19 15:47:32 +02:00
|
|
|
struct arp_notify_s notify;
|
|
|
|
struct timespec delay;
|
2014-08-18 22:29:02 +02:00
|
|
|
struct arp_send_s state;
|
|
|
|
int ret;
|
|
|
|
|
2014-08-20 15:09:02 +02:00
|
|
|
/* First check if destination is a local broadcast. */
|
|
|
|
|
|
|
|
if (ipaddr == INADDR_BROADCAST)
|
|
|
|
{
|
|
|
|
/* We don't need to send the ARP request */
|
|
|
|
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
|
2015-01-15 19:19:44 +01:00
|
|
|
#ifdef CONFIG_NET_IGMP
|
2014-08-20 15:09:02 +02:00
|
|
|
/* Check if the destination address is a multicast address
|
|
|
|
*
|
|
|
|
* - IPv4: multicast addresses lie in the class D group -- The address range
|
|
|
|
* 224.0.0.0 to 239.255.255.255 (224.0.0.0/4)
|
|
|
|
*
|
|
|
|
* - IPv6 multicast addresses are have the high-order octet of the
|
|
|
|
* addresses=0xff (ff00::/8.)
|
|
|
|
*/
|
|
|
|
|
2015-10-04 23:04:00 +02:00
|
|
|
if (NTOHL(ipaddr) >= 0xe0000000 && NTOHL(ipaddr) <= 0xefffffff)
|
2014-08-20 15:09:02 +02:00
|
|
|
{
|
|
|
|
/* We don't need to send the ARP request */
|
|
|
|
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2014-08-18 22:29:02 +02:00
|
|
|
/* Get the device that can route this request */
|
|
|
|
|
2015-05-29 23:16:11 +02:00
|
|
|
dev = netdev_findby_ipv4addr(INADDR_ANY, ipaddr);
|
2014-08-18 22:29:02 +02:00
|
|
|
if (!dev)
|
|
|
|
{
|
2016-06-11 23:50:49 +02:00
|
|
|
nerr("ERROR: Unreachable: %08lx\n", (unsigned long)ipaddr);
|
2014-08-18 22:29:02 +02:00
|
|
|
ret = -EHOSTUNREACH;
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
2014-11-15 15:22:51 +01:00
|
|
|
/* ARP support is only built if the Ethernet data link is supported.
|
2017-08-08 22:24:12 +02:00
|
|
|
* Continue and send the ARP request only if this device uses the
|
|
|
|
* Ethernet data link protocol.
|
2014-11-15 01:25:33 +01:00
|
|
|
*/
|
|
|
|
|
2014-11-15 15:22:51 +01:00
|
|
|
if (dev->d_lltype != NET_LL_ETHERNET)
|
2014-11-15 01:25:33 +01:00
|
|
|
{
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
|
2014-08-20 15:09:02 +02:00
|
|
|
/* Check if the destination address is on the local network. */
|
|
|
|
|
2015-01-15 19:19:44 +01:00
|
|
|
if (!net_ipv4addr_maskcmp(ipaddr, dev->d_ipaddr, dev->d_netmask))
|
2014-08-20 15:09:02 +02:00
|
|
|
{
|
2015-01-15 19:19:44 +01:00
|
|
|
in_addr_t dripaddr;
|
2014-08-20 15:09:02 +02:00
|
|
|
|
|
|
|
/* Destination address is not on the local network */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_ROUTE
|
|
|
|
|
|
|
|
/* We have a routing table.. find the correct router to use in
|
|
|
|
* this case (or, as a fall-back, use the device's default router
|
|
|
|
* address). We will use the router IP address instead of the
|
|
|
|
* destination address when determining the MAC address.
|
|
|
|
*/
|
|
|
|
|
2015-01-20 20:48:42 +01:00
|
|
|
netdev_ipv4_router(dev, ipaddr, &dripaddr);
|
2014-08-20 15:09:02 +02:00
|
|
|
#else
|
|
|
|
/* Use the device's default router IP address instead of the
|
|
|
|
* destination address when determining the MAC address.
|
|
|
|
*/
|
|
|
|
|
2015-01-15 19:19:44 +01:00
|
|
|
net_ipv4addr_copy(dripaddr, dev->d_draddr);
|
2014-08-20 15:09:02 +02:00
|
|
|
#endif
|
|
|
|
ipaddr = dripaddr;
|
|
|
|
}
|
|
|
|
|
2014-08-18 22:29:02 +02:00
|
|
|
/* Allocate resources to receive a callback. This and the following
|
|
|
|
* initialization is performed with the network lock because we don't
|
|
|
|
* want anything to happen until we are ready.
|
|
|
|
*/
|
|
|
|
|
2016-12-03 23:28:19 +01:00
|
|
|
net_lock();
|
2015-05-27 19:39:44 +02:00
|
|
|
state.snd_cb = arp_callback_alloc(dev);
|
2014-08-18 22:29:02 +02:00
|
|
|
if (!state.snd_cb)
|
|
|
|
{
|
2016-06-11 23:50:49 +02:00
|
|
|
nerr("ERROR: Failed to allocate a callback\n");
|
2014-08-18 22:29:02 +02:00
|
|
|
ret = -ENOMEM;
|
|
|
|
goto errout_with_lock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize the state structure. This is done with interrupts
|
2014-08-18 23:24:51 +02:00
|
|
|
* disabled
|
2014-08-18 22:29:02 +02:00
|
|
|
*/
|
|
|
|
|
2016-11-03 19:17:02 +01:00
|
|
|
/* This semaphore is used for signaling and, hence, should not have
|
|
|
|
* priority inheritance enabled.
|
|
|
|
*/
|
|
|
|
|
2014-08-18 22:29:02 +02:00
|
|
|
(void)sem_init(&state.snd_sem, 0, 0); /* Doesn't really fail */
|
2016-11-03 19:17:02 +01:00
|
|
|
sem_setprotocol(&state.snd_sem, SEM_PRIO_NONE);
|
|
|
|
|
2014-08-18 22:29:02 +02:00
|
|
|
state.snd_retries = 0; /* No retries yet */
|
|
|
|
state.snd_ipaddr = ipaddr; /* IP address to query */
|
|
|
|
|
|
|
|
/* Remember the routing device name */
|
|
|
|
|
2014-11-15 15:55:50 +01:00
|
|
|
strncpy((FAR char *)state.snd_ifname, (FAR const char *)dev->d_ifname, IFNAMSIZ);
|
2014-08-18 22:29:02 +02:00
|
|
|
|
|
|
|
/* Now loop, testing if the address mapping is in the ARP table and re-sending the ARP request if it is not.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = -ETIMEDOUT; /* Assume a timeout failure */
|
2014-08-18 23:24:51 +02:00
|
|
|
|
2014-08-18 22:29:02 +02:00
|
|
|
while (state.snd_retries < CONFIG_ARP_SEND_MAXTRIES)
|
|
|
|
{
|
2014-08-19 15:47:32 +02:00
|
|
|
/* Check if the address mapping is present in the ARP table. This
|
|
|
|
* is only really meaningful on the first time through the loop.
|
|
|
|
*
|
|
|
|
* NOTE: If the ARP table is large than this could be a performance
|
|
|
|
* issue.
|
|
|
|
*/
|
2014-08-18 22:29:02 +02:00
|
|
|
|
|
|
|
if (arp_find(ipaddr))
|
|
|
|
{
|
|
|
|
/* We have it! Break out with success */
|
|
|
|
|
|
|
|
ret = OK;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
/* Set up the ARP response wait BEFORE we send the ARP request */
|
|
|
|
|
|
|
|
arp_wait_setup(ipaddr, ¬ify);
|
|
|
|
|
2014-08-18 22:29:02 +02:00
|
|
|
/* Arm/re-arm the callback */
|
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
state.snd_sent = false;
|
2015-05-27 19:39:44 +02:00
|
|
|
state.snd_result = -EBUSY;
|
2015-05-27 20:22:07 +02:00
|
|
|
state.snd_cb->flags = (ARP_POLL | NETDEV_DOWN);
|
2014-08-19 15:47:32 +02:00
|
|
|
state.snd_cb->priv = (FAR void *)&state;
|
|
|
|
state.snd_cb->event = arp_send_interrupt;
|
|
|
|
|
|
|
|
/* Notify the device driver that new TX data is available.
|
2015-01-16 19:30:18 +01:00
|
|
|
* NOTES: This is in essence what netdev_ipv4_txnotify() does, which
|
2015-01-15 19:19:44 +01:00
|
|
|
* is not possible to call since it expects a in_addr_t as
|
2014-08-19 15:47:32 +02:00
|
|
|
* its single argument to lookup the network interface.
|
|
|
|
*/
|
|
|
|
|
SUMMARY
-------
This patch enhances networking support for the simulation under Linux.
Includes updated support for Linux TUN/TAP, and the addition of support for
Linux bridge devices.
CHANGES
-------
o Check to see if the d_txavail callback is present before calling it in
the arp send code. This prevents a segfault when simulating the telnetd
daemon with arp send enabled.
o Adjust the simulation's netdriver_loop() so it will detect and respond to
ARP requests.
o Do not attempt to take the tap device's hardware address for use by the
simulation. That hardware address belongs to the host end of the link,
not the simulation end. Generate a randomized MAC address instead.
o Do not assign an IP address to the interface on the host side of the TAP
link.
+ Provide two modes: "host route" and "bridge".
+ In host route mode, maintain a host route that points any traffic for the
simulation's IP address to the tap device. In this mode, so long as the
simulation's IP is a free address in the same subnet as the host, no
additional configuration will be required to talk to it from the host.
Note that address changes are handled automatically if they follow the
rule of if-down/set-address/if-up, which everything seems to.
+ In bridge mode, add the tap device to the specified bridge instance. See
configs/sim/NETWORK-LINUX.txt for information and usage examples. This
enables much more flexible configurations (with fewer headaches), such as
running multiple simulations on a single host, all of which can access
the network the host is connected to.
o Refresh configurations in configs/sim where CONFIG_NET=y. They default
to "host route" mode.
o Add configs/sim/NETWORK-LINUX.txt
CAVEATS
-------
- The MAC address generation code is extremely simplistic, and does not
check for potential conflicts on the network. Probably not an issue, but
something to be aware of.
- I was careful to leave it in a state where Cygwin/pcap should still work,
but I don't have a Windows environment to test in. This should be
checked.
- I don't know if this was ever intended to work with OS X. I didn't even
try to test it there.
NOTES
-----
- Was able to get telnetd working and simulate nsh over telnet, but only so
long as listen backlogs were disabled.
There appears to be a bug in the backlog code where sockets are being
returned in SYN_RCVD state instead of waiting until they're ESTABLISHED;
if you perform an immediate send after accepting the connection, it will
confuse the stack and the send will hang; additionally, the connection
will never reach ESTABLISHED state.
Can be worked around by adding a sleep(1) after the accept in telnetd. I
don't have the necessary knowledge of the IP stack to know what the
correct fix is.
2016-05-21 01:36:14 +02:00
|
|
|
if (dev->d_txavail)
|
|
|
|
{
|
|
|
|
dev->d_txavail(dev);
|
|
|
|
}
|
2014-08-19 15:47:32 +02:00
|
|
|
|
|
|
|
/* Wait for the send to complete or an error to occur: NOTES: (1)
|
|
|
|
* net_lockedwait will also terminate if a signal is received, (2)
|
|
|
|
* interrupts may be disabled! They will be re-enabled while the
|
|
|
|
* task sleeps and automatically re-enabled when the task restarts.
|
|
|
|
*/
|
2014-08-18 22:29:02 +02:00
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
do
|
|
|
|
{
|
|
|
|
(void)net_lockedwait(&state.snd_sem);
|
|
|
|
}
|
|
|
|
while (!state.snd_sent);
|
2014-08-18 22:29:02 +02:00
|
|
|
|
2015-05-27 19:39:44 +02:00
|
|
|
/* Check the result of the send operation */
|
|
|
|
|
|
|
|
ret = state.snd_result;
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* Break out on a send failure */
|
|
|
|
|
2016-06-11 23:50:49 +02:00
|
|
|
nerr("ERROR: Send failed: %d\n", ret);
|
2015-05-27 19:39:44 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
/* Now wait for response to the ARP response to be received. The
|
|
|
|
* optimal delay would be the work case round trip time.
|
2015-02-02 21:48:11 +01:00
|
|
|
* NOTE: The network is locked.
|
2014-08-19 15:47:32 +02:00
|
|
|
*/
|
2014-08-18 22:29:02 +02:00
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
delay.tv_sec = CONFIG_ARP_SEND_DELAYSEC;
|
|
|
|
delay.tv_nsec = CONFIG_ARP_SEND_DELAYNSEC;
|
2014-08-18 22:29:02 +02:00
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
ret = arp_wait(¬ify, &delay);
|
2014-08-18 22:29:02 +02:00
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
/* arp_wait will return OK if and only if the matching ARP response
|
|
|
|
* is received. Otherwise, it will return -ETIMEDOUT.
|
|
|
|
*/
|
2014-08-18 22:29:02 +02:00
|
|
|
|
2015-05-29 22:32:56 +02:00
|
|
|
if (ret >= OK)
|
2014-08-19 15:47:32 +02:00
|
|
|
{
|
2015-05-27 19:39:44 +02:00
|
|
|
/* Break out if arp_wait() fails */
|
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
break;
|
|
|
|
}
|
2014-08-18 22:29:02 +02:00
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
/* Increment the retry count */
|
2014-08-18 22:29:02 +02:00
|
|
|
|
2014-08-19 15:47:32 +02:00
|
|
|
state.snd_retries++;
|
2016-06-11 23:50:49 +02:00
|
|
|
nerr("ERROR: arp_wait failed: %d\n", ret);
|
2014-08-18 22:29:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
sem_destroy(&state.snd_sem);
|
2015-05-27 19:39:44 +02:00
|
|
|
arp_callback_free(dev, state.snd_cb);
|
2014-08-18 22:29:02 +02:00
|
|
|
errout_with_lock:
|
2016-12-03 23:28:19 +01:00
|
|
|
net_unlock();
|
2014-08-18 22:29:02 +02:00
|
|
|
errout:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NET_ARP_SEND */
|