1 /* 2 * Copied from Linux Monitor (LiMon) - Networking. 3 * 4 * Copyright 1994 - 2000 Neil Russell. 5 * (See License) 6 * Copyright 2000 Roland Borde 7 * Copyright 2000 Paolo Scaffardi 8 * Copyright 2000-2002 Wolfgang Denk, wd@denx.de 9 */ 10 11 /* 12 * General Desription: 13 * 14 * The user interface supports commands for BOOTP, RARP, and TFTP. 15 * Also, we support ARP internally. Depending on available data, 16 * these interact as follows: 17 * 18 * BOOTP: 19 * 20 * Prerequisites: - own ethernet address 21 * We want: - own IP address 22 * - TFTP server IP address 23 * - name of bootfile 24 * Next step: ARP 25 * 26 * RARP: 27 * 28 * Prerequisites: - own ethernet address 29 * We want: - own IP address 30 * - TFTP server IP address 31 * Next step: ARP 32 * 33 * ARP: 34 * 35 * Prerequisites: - own ethernet address 36 * - own IP address 37 * - TFTP server IP address 38 * We want: - TFTP server ethernet address 39 * Next step: TFTP 40 * 41 * DHCP: 42 * 43 * Prerequisites: - own ethernet address 44 * We want: - IP, Netmask, ServerIP, Gateway IP 45 * - bootfilename, lease time 46 * Next step: - TFTP 47 * 48 * TFTP: 49 * 50 * Prerequisites: - own ethernet address 51 * - own IP address 52 * - TFTP server IP address 53 * - TFTP server ethernet address 54 * - name of bootfile (if unknown, we use a default name 55 * derived from our own IP address) 56 * We want: - load the boot file 57 * Next step: none 58 * 59 * NFS: 60 * 61 * Prerequisites: - own ethernet address 62 * - own IP address 63 * - name of bootfile (if unknown, we use a default name 64 * derived from our own IP address) 65 * We want: - load the boot file 66 * Next step: none 67 * 68 * SNTP: 69 * 70 * Prerequisites: - own ethernet address 71 * - own IP address 72 * We want: - network time 73 * Next step: none 74 */ 75 76 77 #include <common.h> 78 #include <watchdog.h> 79 #include <command.h> 80 #include <net.h> 81 #include "bootp.h" 82 #include "tftp.h" 83 #ifdef CONFIG_CMD_RARP 84 #include "rarp.h" 85 #endif 86 #include "nfs.h" 87 #ifdef CONFIG_STATUS_LED 88 #include <status_led.h> 89 #include <miiphy.h> 90 #endif 91 #if defined(CONFIG_CMD_SNTP) 92 #include "sntp.h" 93 #endif 94 #if defined(CONFIG_CDP_VERSION) 95 #include <timestamp.h> 96 #endif 97 #if defined(CONFIG_CMD_DNS) 98 #include "dns.h" 99 #endif 100 101 DECLARE_GLOBAL_DATA_PTR; 102 103 #ifndef CONFIG_ARP_TIMEOUT 104 /* Milliseconds before trying ARP again */ 105 # define ARP_TIMEOUT 5000UL 106 #else 107 # define ARP_TIMEOUT CONFIG_ARP_TIMEOUT 108 #endif 109 110 111 #ifndef CONFIG_NET_RETRY_COUNT 112 # define ARP_TIMEOUT_COUNT 5 /* # of timeouts before giving up */ 113 #else 114 # define ARP_TIMEOUT_COUNT CONFIG_NET_RETRY_COUNT 115 #endif 116 117 /** BOOTP EXTENTIONS **/ 118 119 /* Our subnet mask (0=unknown) */ 120 IPaddr_t NetOurSubnetMask; 121 /* Our gateways IP address */ 122 IPaddr_t NetOurGatewayIP; 123 /* Our DNS IP address */ 124 IPaddr_t NetOurDNSIP; 125 #if defined(CONFIG_BOOTP_DNS2) 126 /* Our 2nd DNS IP address */ 127 IPaddr_t NetOurDNS2IP; 128 #endif 129 /* Our NIS domain */ 130 char NetOurNISDomain[32] = {0,}; 131 /* Our hostname */ 132 char NetOurHostName[32] = {0,}; 133 /* Our bootpath */ 134 char NetOurRootPath[64] = {0,}; 135 /* Our bootfile size in blocks */ 136 ushort NetBootFileSize; 137 138 #ifdef CONFIG_MCAST_TFTP /* Multicast TFTP */ 139 IPaddr_t Mcast_addr; 140 #endif 141 142 /** END OF BOOTP EXTENTIONS **/ 143 144 /* The actual transferred size of the bootfile (in bytes) */ 145 ulong NetBootFileXferSize; 146 /* Our ethernet address */ 147 uchar NetOurEther[6]; 148 /* Boot server enet address */ 149 uchar NetServerEther[6]; 150 /* Our IP addr (0 = unknown) */ 151 IPaddr_t NetOurIP; 152 /* Server IP addr (0 = unknown) */ 153 IPaddr_t NetServerIP; 154 /* Current receive packet */ 155 volatile uchar *NetRxPacket; 156 /* Current rx packet length */ 157 int NetRxPacketLen; 158 /* IP packet ID */ 159 unsigned NetIPID; 160 /* Ethernet bcast address */ 161 uchar NetBcastAddr[6] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; 162 uchar NetEtherNullAddr[6]; 163 #ifdef CONFIG_API 164 void (*push_packet)(volatile void *, int len) = 0; 165 #endif 166 #if defined(CONFIG_CMD_CDP) 167 /* Ethernet bcast address */ 168 uchar NetCDPAddr[6] = { 0x01, 0x00, 0x0c, 0xcc, 0xcc, 0xcc }; 169 #endif 170 /* Network loop state */ 171 int NetState; 172 /* Tried all network devices */ 173 int NetRestartWrap; 174 /* Network loop restarted */ 175 static int NetRestarted; 176 /* At least one device configured */ 177 static int NetDevExists; 178 179 /* XXX in both little & big endian machines 0xFFFF == ntohs(-1) */ 180 /* default is without VLAN */ 181 ushort NetOurVLAN = 0xFFFF; 182 /* ditto */ 183 ushort NetOurNativeVLAN = 0xFFFF; 184 185 /* Boot File name */ 186 char BootFile[128]; 187 188 #if defined(CONFIG_CMD_PING) 189 /* the ip address to ping */ 190 IPaddr_t NetPingIP; 191 192 static void PingStart(void); 193 #endif 194 195 #if defined(CONFIG_CMD_CDP) 196 static void CDPStart(void); 197 #endif 198 199 #if defined(CONFIG_CMD_SNTP) 200 /* NTP server IP address */ 201 IPaddr_t NetNtpServerIP; 202 /* offset time from UTC */ 203 int NetTimeOffset; 204 #endif 205 206 #ifdef CONFIG_NETCONSOLE 207 void NcStart(void); 208 int nc_input_packet(uchar *pkt, unsigned dest, unsigned src, unsigned len); 209 #endif 210 211 volatile uchar PktBuf[(PKTBUFSRX+1) * PKTSIZE_ALIGN + PKTALIGN]; 212 213 /* Receive packet */ 214 volatile uchar *NetRxPackets[PKTBUFSRX]; 215 216 /* Current RX packet handler */ 217 static rxhand_f *packetHandler; 218 #ifdef CONFIG_CMD_TFTPPUT 219 static rxhand_icmp_f *packet_icmp_handler; /* Current ICMP rx handler */ 220 #endif 221 /* Current timeout handler */ 222 static thand_f *timeHandler; 223 /* Time base value */ 224 static ulong timeStart; 225 /* Current timeout value */ 226 static ulong timeDelta; 227 /* THE transmit packet */ 228 volatile uchar *NetTxPacket; 229 230 static int net_check_prereq(enum proto_t protocol); 231 232 static int NetTryCount; 233 234 /**********************************************************************/ 235 236 IPaddr_t NetArpWaitPacketIP; 237 IPaddr_t NetArpWaitReplyIP; 238 /* MAC address of waiting packet's destination */ 239 uchar *NetArpWaitPacketMAC; 240 /* THE transmit packet */ 241 uchar *NetArpWaitTxPacket; 242 int NetArpWaitTxPacketSize; 243 uchar NetArpWaitPacketBuf[PKTSIZE_ALIGN + PKTALIGN]; 244 ulong NetArpWaitTimerStart; 245 int NetArpWaitTry; 246 247 void ArpRequest(void) 248 { 249 volatile uchar *pkt; 250 ARP_t *arp; 251 252 debug("ARP broadcast %d\n", NetArpWaitTry); 253 254 pkt = NetTxPacket; 255 256 pkt += NetSetEther(pkt, NetBcastAddr, PROT_ARP); 257 258 arp = (ARP_t *) pkt; 259 260 arp->ar_hrd = htons(ARP_ETHER); 261 arp->ar_pro = htons(PROT_IP); 262 arp->ar_hln = 6; 263 arp->ar_pln = 4; 264 arp->ar_op = htons(ARPOP_REQUEST); 265 266 /* source ET addr */ 267 memcpy(&arp->ar_data[0], NetOurEther, 6); 268 /* source IP addr */ 269 NetWriteIP((uchar *) &arp->ar_data[6], NetOurIP); 270 /* dest ET addr = 0 */ 271 memset(&arp->ar_data[10], '\0', 6); 272 if ((NetArpWaitPacketIP & NetOurSubnetMask) != 273 (NetOurIP & NetOurSubnetMask)) { 274 if (NetOurGatewayIP == 0) { 275 puts("## Warning: gatewayip needed but not set\n"); 276 NetArpWaitReplyIP = NetArpWaitPacketIP; 277 } else { 278 NetArpWaitReplyIP = NetOurGatewayIP; 279 } 280 } else { 281 NetArpWaitReplyIP = NetArpWaitPacketIP; 282 } 283 284 NetWriteIP((uchar *) &arp->ar_data[16], NetArpWaitReplyIP); 285 (void) eth_send(NetTxPacket, (pkt - NetTxPacket) + ARP_HDR_SIZE); 286 } 287 288 void ArpTimeoutCheck(void) 289 { 290 ulong t; 291 292 if (!NetArpWaitPacketIP) 293 return; 294 295 t = get_timer(0); 296 297 /* check for arp timeout */ 298 if ((t - NetArpWaitTimerStart) > ARP_TIMEOUT) { 299 NetArpWaitTry++; 300 301 if (NetArpWaitTry >= ARP_TIMEOUT_COUNT) { 302 puts("\nARP Retry count exceeded; starting again\n"); 303 NetArpWaitTry = 0; 304 NetStartAgain(); 305 } else { 306 NetArpWaitTimerStart = t; 307 ArpRequest(); 308 } 309 } 310 } 311 312 /* 313 * Check if autoload is enabled. If so, use either NFS or TFTP to download 314 * the boot file. 315 */ 316 void net_auto_load(void) 317 { 318 const char *s = getenv("autoload"); 319 320 if (s != NULL) { 321 if (*s == 'n') { 322 /* 323 * Just use BOOTP/RARP to configure system; 324 * Do not use TFTP to load the bootfile. 325 */ 326 NetState = NETLOOP_SUCCESS; 327 return; 328 } 329 #if defined(CONFIG_CMD_NFS) 330 if (strcmp(s, "NFS") == 0) { 331 /* 332 * Use NFS to load the bootfile. 333 */ 334 NfsStart(); 335 return; 336 } 337 #endif 338 } 339 TftpStart(TFTPGET); 340 } 341 342 static void NetInitLoop(enum proto_t protocol) 343 { 344 static int env_changed_id; 345 bd_t *bd = gd->bd; 346 int env_id = get_env_id(); 347 348 /* update only when the environment has changed */ 349 if (env_changed_id != env_id) { 350 NetOurIP = getenv_IPaddr("ipaddr"); 351 NetCopyIP(&bd->bi_ip_addr, &NetOurIP); 352 NetOurGatewayIP = getenv_IPaddr("gatewayip"); 353 NetOurSubnetMask = getenv_IPaddr("netmask"); 354 NetServerIP = getenv_IPaddr("serverip"); 355 NetOurNativeVLAN = getenv_VLAN("nvlan"); 356 NetOurVLAN = getenv_VLAN("vlan"); 357 #if defined(CONFIG_CMD_DNS) 358 NetOurDNSIP = getenv_IPaddr("dnsip"); 359 #endif 360 env_changed_id = env_id; 361 } 362 363 return; 364 } 365 366 /**********************************************************************/ 367 /* 368 * Main network processing loop. 369 */ 370 371 int NetLoop(enum proto_t protocol) 372 { 373 bd_t *bd = gd->bd; 374 int ret = -1; 375 376 NetRestarted = 0; 377 NetDevExists = 0; 378 379 /* XXX problem with bss workaround */ 380 NetArpWaitPacketMAC = NULL; 381 NetArpWaitTxPacket = NULL; 382 NetArpWaitPacketIP = 0; 383 NetArpWaitReplyIP = 0; 384 NetArpWaitTxPacket = NULL; 385 NetTxPacket = NULL; 386 NetTryCount = 1; 387 388 if (!NetTxPacket) { 389 int i; 390 /* 391 * Setup packet buffers, aligned correctly. 392 */ 393 NetTxPacket = &PktBuf[0] + (PKTALIGN - 1); 394 NetTxPacket -= (ulong)NetTxPacket % PKTALIGN; 395 for (i = 0; i < PKTBUFSRX; i++) 396 NetRxPackets[i] = NetTxPacket + (i+1)*PKTSIZE_ALIGN; 397 } 398 399 if (!NetArpWaitTxPacket) { 400 NetArpWaitTxPacket = &NetArpWaitPacketBuf[0] + (PKTALIGN - 1); 401 NetArpWaitTxPacket -= (ulong)NetArpWaitTxPacket % PKTALIGN; 402 NetArpWaitTxPacketSize = 0; 403 } 404 405 bootstage_mark_name(BOOTSTAGE_ID_ETH_START, "eth_start"); 406 eth_halt(); 407 eth_set_current(); 408 if (eth_init(bd) < 0) { 409 eth_halt(); 410 return -1; 411 } 412 413 restart: 414 memcpy(NetOurEther, eth_get_dev()->enetaddr, 6); 415 416 NetState = NETLOOP_CONTINUE; 417 418 /* 419 * Start the ball rolling with the given start function. From 420 * here on, this code is a state machine driven by received 421 * packets and timer events. 422 */ 423 NetInitLoop(protocol); 424 425 switch (net_check_prereq(protocol)) { 426 case 1: 427 /* network not configured */ 428 eth_halt(); 429 return -1; 430 431 case 2: 432 /* network device not configured */ 433 break; 434 435 case 0: 436 NetDevExists = 1; 437 NetBootFileXferSize = 0; 438 switch (protocol) { 439 case TFTPGET: 440 #ifdef CONFIG_CMD_TFTPPUT 441 case TFTPPUT: 442 #endif 443 /* always use ARP to get server ethernet address */ 444 TftpStart(protocol); 445 break; 446 #ifdef CONFIG_CMD_TFTPSRV 447 case TFTPSRV: 448 TftpStartServer(); 449 break; 450 #endif 451 #if defined(CONFIG_CMD_DHCP) 452 case DHCP: 453 BootpTry = 0; 454 NetOurIP = 0; 455 DhcpRequest(); /* Basically same as BOOTP */ 456 break; 457 #endif 458 459 case BOOTP: 460 BootpTry = 0; 461 NetOurIP = 0; 462 BootpRequest(); 463 break; 464 465 #if defined(CONFIG_CMD_RARP) 466 case RARP: 467 RarpTry = 0; 468 NetOurIP = 0; 469 RarpRequest(); 470 break; 471 #endif 472 #if defined(CONFIG_CMD_PING) 473 case PING: 474 PingStart(); 475 break; 476 #endif 477 #if defined(CONFIG_CMD_NFS) 478 case NFS: 479 NfsStart(); 480 break; 481 #endif 482 #if defined(CONFIG_CMD_CDP) 483 case CDP: 484 CDPStart(); 485 break; 486 #endif 487 #ifdef CONFIG_NETCONSOLE 488 case NETCONS: 489 NcStart(); 490 break; 491 #endif 492 #if defined(CONFIG_CMD_SNTP) 493 case SNTP: 494 SntpStart(); 495 break; 496 #endif 497 #if defined(CONFIG_CMD_DNS) 498 case DNS: 499 DnsStart(); 500 break; 501 #endif 502 default: 503 break; 504 } 505 506 break; 507 } 508 509 #if defined(CONFIG_MII) || defined(CONFIG_CMD_MII) 510 #if defined(CONFIG_SYS_FAULT_ECHO_LINK_DOWN) && \ 511 defined(CONFIG_STATUS_LED) && \ 512 defined(STATUS_LED_RED) 513 /* 514 * Echo the inverted link state to the fault LED. 515 */ 516 if (miiphy_link(eth_get_dev()->name, CONFIG_SYS_FAULT_MII_ADDR)) 517 status_led_set(STATUS_LED_RED, STATUS_LED_OFF); 518 else 519 status_led_set(STATUS_LED_RED, STATUS_LED_ON); 520 #endif /* CONFIG_SYS_FAULT_ECHO_LINK_DOWN, ... */ 521 #endif /* CONFIG_MII, ... */ 522 523 /* 524 * Main packet reception loop. Loop receiving packets until 525 * someone sets `NetState' to a state that terminates. 526 */ 527 for (;;) { 528 WATCHDOG_RESET(); 529 #ifdef CONFIG_SHOW_ACTIVITY 530 { 531 extern void show_activity(int arg); 532 show_activity(1); 533 } 534 #endif 535 /* 536 * Check the ethernet for a new packet. The ethernet 537 * receive routine will process it. 538 */ 539 eth_rx(); 540 541 /* 542 * Abort if ctrl-c was pressed. 543 */ 544 if (ctrlc()) { 545 eth_halt(); 546 puts("\nAbort\n"); 547 goto done; 548 } 549 550 ArpTimeoutCheck(); 551 552 /* 553 * Check for a timeout, and run the timeout handler 554 * if we have one. 555 */ 556 if (timeHandler && ((get_timer(0) - timeStart) > timeDelta)) { 557 thand_f *x; 558 559 #if defined(CONFIG_MII) || defined(CONFIG_CMD_MII) 560 #if defined(CONFIG_SYS_FAULT_ECHO_LINK_DOWN) && \ 561 defined(CONFIG_STATUS_LED) && \ 562 defined(STATUS_LED_RED) 563 /* 564 * Echo the inverted link state to the fault LED. 565 */ 566 if (miiphy_link(eth_get_dev()->name, 567 CONFIG_SYS_FAULT_MII_ADDR)) { 568 status_led_set(STATUS_LED_RED, STATUS_LED_OFF); 569 } else { 570 status_led_set(STATUS_LED_RED, STATUS_LED_ON); 571 } 572 #endif /* CONFIG_SYS_FAULT_ECHO_LINK_DOWN, ... */ 573 #endif /* CONFIG_MII, ... */ 574 x = timeHandler; 575 timeHandler = (thand_f *)0; 576 (*x)(); 577 } 578 579 580 switch (NetState) { 581 582 case NETLOOP_RESTART: 583 NetRestarted = 1; 584 goto restart; 585 586 case NETLOOP_SUCCESS: 587 if (NetBootFileXferSize > 0) { 588 char buf[20]; 589 printf("Bytes transferred = %ld (%lx hex)\n", 590 NetBootFileXferSize, 591 NetBootFileXferSize); 592 sprintf(buf, "%lX", NetBootFileXferSize); 593 setenv("filesize", buf); 594 595 sprintf(buf, "%lX", (unsigned long)load_addr); 596 setenv("fileaddr", buf); 597 } 598 eth_halt(); 599 ret = NetBootFileXferSize; 600 goto done; 601 602 case NETLOOP_FAIL: 603 goto done; 604 } 605 } 606 607 done: 608 #ifdef CONFIG_CMD_TFTPPUT 609 /* Clear out the handlers */ 610 NetSetHandler(NULL); 611 net_set_icmp_handler(NULL); 612 #endif 613 return ret; 614 } 615 616 /**********************************************************************/ 617 618 static void 619 startAgainTimeout(void) 620 { 621 NetState = NETLOOP_RESTART; 622 } 623 624 static void 625 startAgainHandler(uchar *pkt, unsigned dest, IPaddr_t sip, 626 unsigned src, unsigned len) 627 { 628 /* Totally ignore the packet */ 629 } 630 631 void NetStartAgain(void) 632 { 633 char *nretry; 634 int retry_forever = 0; 635 unsigned long retrycnt = 0; 636 637 nretry = getenv("netretry"); 638 if (nretry) { 639 if (!strcmp(nretry, "yes")) 640 retry_forever = 1; 641 else if (!strcmp(nretry, "no")) 642 retrycnt = 0; 643 else if (!strcmp(nretry, "once")) 644 retrycnt = 1; 645 else 646 retrycnt = simple_strtoul(nretry, NULL, 0); 647 } else 648 retry_forever = 1; 649 650 if ((!retry_forever) && (NetTryCount >= retrycnt)) { 651 eth_halt(); 652 NetState = NETLOOP_FAIL; 653 return; 654 } 655 656 NetTryCount++; 657 658 eth_halt(); 659 #if !defined(CONFIG_NET_DO_NOT_TRY_ANOTHER) 660 eth_try_another(!NetRestarted); 661 #endif 662 eth_init(gd->bd); 663 if (NetRestartWrap) { 664 NetRestartWrap = 0; 665 if (NetDevExists) { 666 NetSetTimeout(10000UL, startAgainTimeout); 667 NetSetHandler(startAgainHandler); 668 } else { 669 NetState = NETLOOP_FAIL; 670 } 671 } else { 672 NetState = NETLOOP_RESTART; 673 } 674 } 675 676 /**********************************************************************/ 677 /* 678 * Miscelaneous bits. 679 */ 680 681 void 682 NetSetHandler(rxhand_f *f) 683 { 684 packetHandler = f; 685 } 686 687 #ifdef CONFIG_CMD_TFTPPUT 688 void net_set_icmp_handler(rxhand_icmp_f *f) 689 { 690 packet_icmp_handler = f; 691 } 692 #endif 693 694 void 695 NetSetTimeout(ulong iv, thand_f *f) 696 { 697 if (iv == 0) { 698 timeHandler = (thand_f *)0; 699 } else { 700 timeHandler = f; 701 timeStart = get_timer(0); 702 timeDelta = iv; 703 } 704 } 705 706 707 void 708 NetSendPacket(volatile uchar *pkt, int len) 709 { 710 (void) eth_send(pkt, len); 711 } 712 713 int 714 NetSendUDPPacket(uchar *ether, IPaddr_t dest, int dport, int sport, int len) 715 { 716 uchar *pkt; 717 718 /* convert to new style broadcast */ 719 if (dest == 0) 720 dest = 0xFFFFFFFF; 721 722 /* if broadcast, make the ether address a broadcast and don't do ARP */ 723 if (dest == 0xFFFFFFFF) 724 ether = NetBcastAddr; 725 726 /* 727 * if MAC address was not discovered yet, save the packet and do 728 * an ARP request 729 */ 730 if (memcmp(ether, NetEtherNullAddr, 6) == 0) { 731 732 debug("sending ARP for %08x\n", dest); 733 734 NetArpWaitPacketIP = dest; 735 NetArpWaitPacketMAC = ether; 736 737 pkt = NetArpWaitTxPacket; 738 pkt += NetSetEther(pkt, NetArpWaitPacketMAC, PROT_IP); 739 740 NetSetIP(pkt, dest, dport, sport, len); 741 memcpy(pkt + IP_HDR_SIZE, (uchar *)NetTxPacket + 742 (pkt - (uchar *)NetArpWaitTxPacket) + IP_HDR_SIZE, len); 743 744 /* size of the waiting packet */ 745 NetArpWaitTxPacketSize = (pkt - NetArpWaitTxPacket) + 746 IP_HDR_SIZE + len; 747 748 /* and do the ARP request */ 749 NetArpWaitTry = 1; 750 NetArpWaitTimerStart = get_timer(0); 751 ArpRequest(); 752 return 1; /* waiting */ 753 } 754 755 debug("sending UDP to %08x/%pM\n", dest, ether); 756 757 pkt = (uchar *)NetTxPacket; 758 pkt += NetSetEther(pkt, ether, PROT_IP); 759 NetSetIP(pkt, dest, dport, sport, len); 760 (void) eth_send(NetTxPacket, (pkt - NetTxPacket) + IP_HDR_SIZE + len); 761 762 return 0; /* transmitted */ 763 } 764 765 #if defined(CONFIG_CMD_PING) 766 static ushort PingSeqNo; 767 768 int PingSend(void) 769 { 770 static uchar mac[6]; 771 volatile IP_t *ip; 772 volatile ushort *s; 773 uchar *pkt; 774 775 /* XXX always send arp request */ 776 777 memcpy(mac, NetEtherNullAddr, 6); 778 779 debug("sending ARP for %08x\n", NetPingIP); 780 781 NetArpWaitPacketIP = NetPingIP; 782 NetArpWaitPacketMAC = mac; 783 784 pkt = NetArpWaitTxPacket; 785 pkt += NetSetEther(pkt, mac, PROT_IP); 786 787 ip = (volatile IP_t *)pkt; 788 789 /* 790 * Construct an IP and ICMP header. 791 * (need to set no fragment bit - XXX) 792 */ 793 /* IP_HDR_SIZE / 4 (not including UDP) */ 794 ip->ip_hl_v = 0x45; 795 ip->ip_tos = 0; 796 ip->ip_len = htons(IP_HDR_SIZE_NO_UDP + 8); 797 ip->ip_id = htons(NetIPID++); 798 ip->ip_off = htons(IP_FLAGS_DFRAG); /* Don't fragment */ 799 ip->ip_ttl = 255; 800 ip->ip_p = 0x01; /* ICMP */ 801 ip->ip_sum = 0; 802 /* already in network byte order */ 803 NetCopyIP((void *)&ip->ip_src, &NetOurIP); 804 /* - "" - */ 805 NetCopyIP((void *)&ip->ip_dst, &NetPingIP); 806 ip->ip_sum = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2); 807 808 s = &ip->udp_src; /* XXX ICMP starts here */ 809 s[0] = htons(0x0800); /* echo-request, code */ 810 s[1] = 0; /* checksum */ 811 s[2] = 0; /* identifier */ 812 s[3] = htons(PingSeqNo++); /* sequence number */ 813 s[1] = ~NetCksum((uchar *)s, 8/2); 814 815 /* size of the waiting packet */ 816 NetArpWaitTxPacketSize = 817 (pkt - NetArpWaitTxPacket) + IP_HDR_SIZE_NO_UDP + 8; 818 819 /* and do the ARP request */ 820 NetArpWaitTry = 1; 821 NetArpWaitTimerStart = get_timer(0); 822 ArpRequest(); 823 return 1; /* waiting */ 824 } 825 826 static void 827 PingTimeout(void) 828 { 829 eth_halt(); 830 NetState = NETLOOP_FAIL; /* we did not get the reply */ 831 } 832 833 static void 834 PingHandler(uchar *pkt, unsigned dest, IPaddr_t sip, unsigned src, 835 unsigned len) 836 { 837 if (sip != NetPingIP) 838 return; 839 840 NetState = NETLOOP_SUCCESS; 841 } 842 843 static void PingStart(void) 844 { 845 printf("Using %s device\n", eth_get_name()); 846 NetSetTimeout(10000UL, PingTimeout); 847 NetSetHandler(PingHandler); 848 849 PingSend(); 850 } 851 #endif 852 853 #if defined(CONFIG_CMD_CDP) 854 855 #define CDP_DEVICE_ID_TLV 0x0001 856 #define CDP_ADDRESS_TLV 0x0002 857 #define CDP_PORT_ID_TLV 0x0003 858 #define CDP_CAPABILITIES_TLV 0x0004 859 #define CDP_VERSION_TLV 0x0005 860 #define CDP_PLATFORM_TLV 0x0006 861 #define CDP_NATIVE_VLAN_TLV 0x000a 862 #define CDP_APPLIANCE_VLAN_TLV 0x000e 863 #define CDP_TRIGGER_TLV 0x000f 864 #define CDP_POWER_CONSUMPTION_TLV 0x0010 865 #define CDP_SYSNAME_TLV 0x0014 866 #define CDP_SYSOBJECT_TLV 0x0015 867 #define CDP_MANAGEMENT_ADDRESS_TLV 0x0016 868 869 #define CDP_TIMEOUT 250UL /* one packet every 250ms */ 870 871 static int CDPSeq; 872 static int CDPOK; 873 874 ushort CDPNativeVLAN; 875 ushort CDPApplianceVLAN; 876 877 static const uchar CDP_SNAP_hdr[8] = { 0xAA, 0xAA, 0x03, 0x00, 0x00, 0x0C, 0x20, 878 0x00 }; 879 880 static ushort CDP_compute_csum(const uchar *buff, ushort len) 881 { 882 ushort csum; 883 int odd; 884 ulong result = 0; 885 ushort leftover; 886 ushort *p; 887 888 if (len > 0) { 889 odd = 1 & (ulong)buff; 890 if (odd) { 891 result = *buff << 8; 892 len--; 893 buff++; 894 } 895 while (len > 1) { 896 p = (ushort *)buff; 897 result += *p++; 898 buff = (uchar *)p; 899 if (result & 0x80000000) 900 result = (result & 0xFFFF) + (result >> 16); 901 len -= 2; 902 } 903 if (len) { 904 leftover = (signed short)(*(const signed char *)buff); 905 /* CISCO SUCKS big time! (and blows too): 906 * CDP uses the IP checksum algorithm with a twist; 907 * for the last byte it *sign* extends and sums. 908 */ 909 result = (result & 0xffff0000) | 910 ((result + leftover) & 0x0000ffff); 911 } 912 while (result >> 16) 913 result = (result & 0xFFFF) + (result >> 16); 914 915 if (odd) 916 result = ((result >> 8) & 0xff) | 917 ((result & 0xff) << 8); 918 } 919 920 /* add up 16-bit and 17-bit words for 17+c bits */ 921 result = (result & 0xffff) + (result >> 16); 922 /* add up 16-bit and 2-bit for 16+c bit */ 923 result = (result & 0xffff) + (result >> 16); 924 /* add up carry.. */ 925 result = (result & 0xffff) + (result >> 16); 926 927 /* negate */ 928 csum = ~(ushort)result; 929 930 /* run time endian detection */ 931 if (csum != htons(csum)) /* little endian */ 932 csum = htons(csum); 933 934 return csum; 935 } 936 937 int CDPSendTrigger(void) 938 { 939 volatile uchar *pkt; 940 volatile ushort *s; 941 volatile ushort *cp; 942 Ethernet_t *et; 943 int len; 944 ushort chksum; 945 #if defined(CONFIG_CDP_DEVICE_ID) || defined(CONFIG_CDP_PORT_ID) || \ 946 defined(CONFIG_CDP_VERSION) || defined(CONFIG_CDP_PLATFORM) 947 char buf[32]; 948 #endif 949 950 pkt = NetTxPacket; 951 et = (Ethernet_t *)pkt; 952 953 /* NOTE: trigger sent not on any VLAN */ 954 955 /* form ethernet header */ 956 memcpy(et->et_dest, NetCDPAddr, 6); 957 memcpy(et->et_src, NetOurEther, 6); 958 959 pkt += ETHER_HDR_SIZE; 960 961 /* SNAP header */ 962 memcpy((uchar *)pkt, CDP_SNAP_hdr, sizeof(CDP_SNAP_hdr)); 963 pkt += sizeof(CDP_SNAP_hdr); 964 965 /* CDP header */ 966 *pkt++ = 0x02; /* CDP version 2 */ 967 *pkt++ = 180; /* TTL */ 968 s = (volatile ushort *)pkt; 969 cp = s; 970 /* checksum (0 for later calculation) */ 971 *s++ = htons(0); 972 973 /* CDP fields */ 974 #ifdef CONFIG_CDP_DEVICE_ID 975 *s++ = htons(CDP_DEVICE_ID_TLV); 976 *s++ = htons(CONFIG_CDP_DEVICE_ID); 977 sprintf(buf, CONFIG_CDP_DEVICE_ID_PREFIX "%pm", NetOurEther); 978 memcpy((uchar *)s, buf, 16); 979 s += 16 / 2; 980 #endif 981 982 #ifdef CONFIG_CDP_PORT_ID 983 *s++ = htons(CDP_PORT_ID_TLV); 984 memset(buf, 0, sizeof(buf)); 985 sprintf(buf, CONFIG_CDP_PORT_ID, eth_get_dev_index()); 986 len = strlen(buf); 987 if (len & 1) /* make it even */ 988 len++; 989 *s++ = htons(len + 4); 990 memcpy((uchar *)s, buf, len); 991 s += len / 2; 992 #endif 993 994 #ifdef CONFIG_CDP_CAPABILITIES 995 *s++ = htons(CDP_CAPABILITIES_TLV); 996 *s++ = htons(8); 997 *(ulong *)s = htonl(CONFIG_CDP_CAPABILITIES); 998 s += 2; 999 #endif 1000 1001 #ifdef CONFIG_CDP_VERSION 1002 *s++ = htons(CDP_VERSION_TLV); 1003 memset(buf, 0, sizeof(buf)); 1004 strcpy(buf, CONFIG_CDP_VERSION); 1005 len = strlen(buf); 1006 if (len & 1) /* make it even */ 1007 len++; 1008 *s++ = htons(len + 4); 1009 memcpy((uchar *)s, buf, len); 1010 s += len / 2; 1011 #endif 1012 1013 #ifdef CONFIG_CDP_PLATFORM 1014 *s++ = htons(CDP_PLATFORM_TLV); 1015 memset(buf, 0, sizeof(buf)); 1016 strcpy(buf, CONFIG_CDP_PLATFORM); 1017 len = strlen(buf); 1018 if (len & 1) /* make it even */ 1019 len++; 1020 *s++ = htons(len + 4); 1021 memcpy((uchar *)s, buf, len); 1022 s += len / 2; 1023 #endif 1024 1025 #ifdef CONFIG_CDP_TRIGGER 1026 *s++ = htons(CDP_TRIGGER_TLV); 1027 *s++ = htons(8); 1028 *(ulong *)s = htonl(CONFIG_CDP_TRIGGER); 1029 s += 2; 1030 #endif 1031 1032 #ifdef CONFIG_CDP_POWER_CONSUMPTION 1033 *s++ = htons(CDP_POWER_CONSUMPTION_TLV); 1034 *s++ = htons(6); 1035 *s++ = htons(CONFIG_CDP_POWER_CONSUMPTION); 1036 #endif 1037 1038 /* length of ethernet packet */ 1039 len = (uchar *)s - ((uchar *)NetTxPacket + ETHER_HDR_SIZE); 1040 et->et_protlen = htons(len); 1041 1042 len = ETHER_HDR_SIZE + sizeof(CDP_SNAP_hdr); 1043 chksum = CDP_compute_csum((uchar *)NetTxPacket + len, 1044 (uchar *)s - (NetTxPacket + len)); 1045 if (chksum == 0) 1046 chksum = 0xFFFF; 1047 *cp = htons(chksum); 1048 1049 (void) eth_send(NetTxPacket, (uchar *)s - NetTxPacket); 1050 return 0; 1051 } 1052 1053 static void 1054 CDPTimeout(void) 1055 { 1056 CDPSeq++; 1057 1058 if (CDPSeq < 3) { 1059 NetSetTimeout(CDP_TIMEOUT, CDPTimeout); 1060 CDPSendTrigger(); 1061 return; 1062 } 1063 1064 /* if not OK try again */ 1065 if (!CDPOK) 1066 NetStartAgain(); 1067 else 1068 NetState = NETLOOP_SUCCESS; 1069 } 1070 1071 static void 1072 CDPDummyHandler(uchar *pkt, unsigned dest, IPaddr_t sip, unsigned src, 1073 unsigned len) 1074 { 1075 /* nothing */ 1076 } 1077 1078 static void 1079 CDPHandler(const uchar *pkt, unsigned len) 1080 { 1081 const uchar *t; 1082 const ushort *ss; 1083 ushort type, tlen; 1084 ushort vlan, nvlan; 1085 1086 /* minimum size? */ 1087 if (len < sizeof(CDP_SNAP_hdr) + 4) 1088 goto pkt_short; 1089 1090 /* check for valid CDP SNAP header */ 1091 if (memcmp(pkt, CDP_SNAP_hdr, sizeof(CDP_SNAP_hdr)) != 0) 1092 return; 1093 1094 pkt += sizeof(CDP_SNAP_hdr); 1095 len -= sizeof(CDP_SNAP_hdr); 1096 1097 /* Version of CDP protocol must be >= 2 and TTL != 0 */ 1098 if (pkt[0] < 0x02 || pkt[1] == 0) 1099 return; 1100 1101 /* 1102 * if version is greater than 0x02 maybe we'll have a problem; 1103 * output a warning 1104 */ 1105 if (pkt[0] != 0x02) 1106 printf("** WARNING: CDP packet received with a protocol version %d > 2\n", 1107 pkt[0] & 0xff); 1108 1109 if (CDP_compute_csum(pkt, len) != 0) 1110 return; 1111 1112 pkt += 4; 1113 len -= 4; 1114 1115 vlan = htons(-1); 1116 nvlan = htons(-1); 1117 while (len > 0) { 1118 if (len < 4) 1119 goto pkt_short; 1120 1121 ss = (const ushort *)pkt; 1122 type = ntohs(ss[0]); 1123 tlen = ntohs(ss[1]); 1124 if (tlen > len) 1125 goto pkt_short; 1126 1127 pkt += tlen; 1128 len -= tlen; 1129 1130 ss += 2; /* point ss to the data of the TLV */ 1131 tlen -= 4; 1132 1133 switch (type) { 1134 case CDP_DEVICE_ID_TLV: 1135 break; 1136 case CDP_ADDRESS_TLV: 1137 break; 1138 case CDP_PORT_ID_TLV: 1139 break; 1140 case CDP_CAPABILITIES_TLV: 1141 break; 1142 case CDP_VERSION_TLV: 1143 break; 1144 case CDP_PLATFORM_TLV: 1145 break; 1146 case CDP_NATIVE_VLAN_TLV: 1147 nvlan = *ss; 1148 break; 1149 case CDP_APPLIANCE_VLAN_TLV: 1150 t = (const uchar *)ss; 1151 while (tlen > 0) { 1152 if (tlen < 3) 1153 goto pkt_short; 1154 1155 ss = (const ushort *)(t + 1); 1156 1157 #ifdef CONFIG_CDP_APPLIANCE_VLAN_TYPE 1158 if (t[0] == CONFIG_CDP_APPLIANCE_VLAN_TYPE) 1159 vlan = *ss; 1160 #else 1161 /* XXX will this work; dunno */ 1162 vlan = ntohs(*ss); 1163 #endif 1164 t += 3; tlen -= 3; 1165 } 1166 break; 1167 case CDP_TRIGGER_TLV: 1168 break; 1169 case CDP_POWER_CONSUMPTION_TLV: 1170 break; 1171 case CDP_SYSNAME_TLV: 1172 break; 1173 case CDP_SYSOBJECT_TLV: 1174 break; 1175 case CDP_MANAGEMENT_ADDRESS_TLV: 1176 break; 1177 } 1178 } 1179 1180 CDPApplianceVLAN = vlan; 1181 CDPNativeVLAN = nvlan; 1182 1183 CDPOK = 1; 1184 return; 1185 1186 pkt_short: 1187 printf("** CDP packet is too short\n"); 1188 return; 1189 } 1190 1191 static void CDPStart(void) 1192 { 1193 printf("Using %s device\n", eth_get_name()); 1194 CDPSeq = 0; 1195 CDPOK = 0; 1196 1197 CDPNativeVLAN = htons(-1); 1198 CDPApplianceVLAN = htons(-1); 1199 1200 NetSetTimeout(CDP_TIMEOUT, CDPTimeout); 1201 NetSetHandler(CDPDummyHandler); 1202 1203 CDPSendTrigger(); 1204 } 1205 #endif 1206 1207 #ifdef CONFIG_IP_DEFRAG 1208 /* 1209 * This function collects fragments in a single packet, according 1210 * to the algorithm in RFC815. It returns NULL or the pointer to 1211 * a complete packet, in static storage 1212 */ 1213 #ifndef CONFIG_NET_MAXDEFRAG 1214 #define CONFIG_NET_MAXDEFRAG 16384 1215 #endif 1216 /* 1217 * MAXDEFRAG, above, is chosen in the config file and is real data 1218 * so we need to add the NFS overhead, which is more than TFTP. 1219 * To use sizeof in the internal unnamed structures, we need a real 1220 * instance (can't do "sizeof(struct rpc_t.u.reply))", unfortunately). 1221 * The compiler doesn't complain nor allocates the actual structure 1222 */ 1223 static struct rpc_t rpc_specimen; 1224 #define IP_PKTSIZE (CONFIG_NET_MAXDEFRAG + sizeof(rpc_specimen.u.reply)) 1225 1226 #define IP_MAXUDP (IP_PKTSIZE - IP_HDR_SIZE_NO_UDP) 1227 1228 /* 1229 * this is the packet being assembled, either data or frag control. 1230 * Fragments go by 8 bytes, so this union must be 8 bytes long 1231 */ 1232 struct hole { 1233 /* first_byte is address of this structure */ 1234 u16 last_byte; /* last byte in this hole + 1 (begin of next hole) */ 1235 u16 next_hole; /* index of next (in 8-b blocks), 0 == none */ 1236 u16 prev_hole; /* index of prev, 0 == none */ 1237 u16 unused; 1238 }; 1239 1240 static IP_t *__NetDefragment(IP_t *ip, int *lenp) 1241 { 1242 static uchar pkt_buff[IP_PKTSIZE] __attribute__((aligned(PKTALIGN))); 1243 static u16 first_hole, total_len; 1244 struct hole *payload, *thisfrag, *h, *newh; 1245 IP_t *localip = (IP_t *)pkt_buff; 1246 uchar *indata = (uchar *)ip; 1247 int offset8, start, len, done = 0; 1248 u16 ip_off = ntohs(ip->ip_off); 1249 1250 /* payload starts after IP header, this fragment is in there */ 1251 payload = (struct hole *)(pkt_buff + IP_HDR_SIZE_NO_UDP); 1252 offset8 = (ip_off & IP_OFFS); 1253 thisfrag = payload + offset8; 1254 start = offset8 * 8; 1255 len = ntohs(ip->ip_len) - IP_HDR_SIZE_NO_UDP; 1256 1257 if (start + len > IP_MAXUDP) /* fragment extends too far */ 1258 return NULL; 1259 1260 if (!total_len || localip->ip_id != ip->ip_id) { 1261 /* new (or different) packet, reset structs */ 1262 total_len = 0xffff; 1263 payload[0].last_byte = ~0; 1264 payload[0].next_hole = 0; 1265 payload[0].prev_hole = 0; 1266 first_hole = 0; 1267 /* any IP header will work, copy the first we received */ 1268 memcpy(localip, ip, IP_HDR_SIZE_NO_UDP); 1269 } 1270 1271 /* 1272 * What follows is the reassembly algorithm. We use the payload 1273 * array as a linked list of hole descriptors, as each hole starts 1274 * at a multiple of 8 bytes. However, last byte can be whatever value, 1275 * so it is represented as byte count, not as 8-byte blocks. 1276 */ 1277 1278 h = payload + first_hole; 1279 while (h->last_byte < start) { 1280 if (!h->next_hole) { 1281 /* no hole that far away */ 1282 return NULL; 1283 } 1284 h = payload + h->next_hole; 1285 } 1286 1287 /* last fragment may be 1..7 bytes, the "+7" forces acceptance */ 1288 if (offset8 + ((len + 7) / 8) <= h - payload) { 1289 /* no overlap with holes (dup fragment?) */ 1290 return NULL; 1291 } 1292 1293 if (!(ip_off & IP_FLAGS_MFRAG)) { 1294 /* no more fragmentss: truncate this (last) hole */ 1295 total_len = start + len; 1296 h->last_byte = start + len; 1297 } 1298 1299 /* 1300 * There is some overlap: fix the hole list. This code doesn't 1301 * deal with a fragment that overlaps with two different holes 1302 * (thus being a superset of a previously-received fragment). 1303 */ 1304 1305 if ((h >= thisfrag) && (h->last_byte <= start + len)) { 1306 /* complete overlap with hole: remove hole */ 1307 if (!h->prev_hole && !h->next_hole) { 1308 /* last remaining hole */ 1309 done = 1; 1310 } else if (!h->prev_hole) { 1311 /* first hole */ 1312 first_hole = h->next_hole; 1313 payload[h->next_hole].prev_hole = 0; 1314 } else if (!h->next_hole) { 1315 /* last hole */ 1316 payload[h->prev_hole].next_hole = 0; 1317 } else { 1318 /* in the middle of the list */ 1319 payload[h->next_hole].prev_hole = h->prev_hole; 1320 payload[h->prev_hole].next_hole = h->next_hole; 1321 } 1322 1323 } else if (h->last_byte <= start + len) { 1324 /* overlaps with final part of the hole: shorten this hole */ 1325 h->last_byte = start; 1326 1327 } else if (h >= thisfrag) { 1328 /* overlaps with initial part of the hole: move this hole */ 1329 newh = thisfrag + (len / 8); 1330 *newh = *h; 1331 h = newh; 1332 if (h->next_hole) 1333 payload[h->next_hole].prev_hole = (h - payload); 1334 if (h->prev_hole) 1335 payload[h->prev_hole].next_hole = (h - payload); 1336 else 1337 first_hole = (h - payload); 1338 1339 } else { 1340 /* fragment sits in the middle: split the hole */ 1341 newh = thisfrag + (len / 8); 1342 *newh = *h; 1343 h->last_byte = start; 1344 h->next_hole = (newh - payload); 1345 newh->prev_hole = (h - payload); 1346 if (newh->next_hole) 1347 payload[newh->next_hole].prev_hole = (newh - payload); 1348 } 1349 1350 /* finally copy this fragment and possibly return whole packet */ 1351 memcpy((uchar *)thisfrag, indata + IP_HDR_SIZE_NO_UDP, len); 1352 if (!done) 1353 return NULL; 1354 1355 localip->ip_len = htons(total_len); 1356 *lenp = total_len + IP_HDR_SIZE_NO_UDP; 1357 return localip; 1358 } 1359 1360 static inline IP_t *NetDefragment(IP_t *ip, int *lenp) 1361 { 1362 u16 ip_off = ntohs(ip->ip_off); 1363 if (!(ip_off & (IP_OFFS | IP_FLAGS_MFRAG))) 1364 return ip; /* not a fragment */ 1365 return __NetDefragment(ip, lenp); 1366 } 1367 1368 #else /* !CONFIG_IP_DEFRAG */ 1369 1370 static inline IP_t *NetDefragment(IP_t *ip, int *lenp) 1371 { 1372 u16 ip_off = ntohs(ip->ip_off); 1373 if (!(ip_off & (IP_OFFS | IP_FLAGS_MFRAG))) 1374 return ip; /* not a fragment */ 1375 return NULL; 1376 } 1377 #endif 1378 1379 /** 1380 * Receive an ICMP packet. We deal with REDIRECT and PING here, and silently 1381 * drop others. 1382 * 1383 * @parma ip IP packet containing the ICMP 1384 */ 1385 static void receive_icmp(IP_t *ip, int len, IPaddr_t src_ip, Ethernet_t *et) 1386 { 1387 ICMP_t *icmph = (ICMP_t *)&ip->udp_src; 1388 1389 switch (icmph->type) { 1390 case ICMP_REDIRECT: 1391 if (icmph->code != ICMP_REDIR_HOST) 1392 return; 1393 printf(" ICMP Host Redirect to %pI4 ", 1394 &icmph->un.gateway); 1395 break; 1396 #if defined(CONFIG_CMD_PING) 1397 case ICMP_ECHO_REPLY: 1398 /* 1399 * IP header OK. Pass the packet to the 1400 * current handler. 1401 */ 1402 /* 1403 * XXX point to ip packet - should this use 1404 * packet_icmp_handler? 1405 */ 1406 (*packetHandler)((uchar *)ip, 0, src_ip, 0, 0); 1407 break; 1408 case ICMP_ECHO_REQUEST: 1409 debug("Got ICMP ECHO REQUEST, return %d bytes\n", 1410 ETHER_HDR_SIZE + len); 1411 1412 memcpy(&et->et_dest[0], &et->et_src[0], 6); 1413 memcpy(&et->et_src[0], NetOurEther, 6); 1414 1415 ip->ip_sum = 0; 1416 ip->ip_off = 0; 1417 NetCopyIP((void *)&ip->ip_dst, &ip->ip_src); 1418 NetCopyIP((void *)&ip->ip_src, &NetOurIP); 1419 ip->ip_sum = ~NetCksum((uchar *)ip, 1420 IP_HDR_SIZE_NO_UDP >> 1); 1421 1422 icmph->type = ICMP_ECHO_REPLY; 1423 icmph->checksum = 0; 1424 icmph->checksum = ~NetCksum((uchar *)icmph, 1425 (len - IP_HDR_SIZE_NO_UDP) >> 1); 1426 (void) eth_send((uchar *)et, 1427 ETHER_HDR_SIZE + len); 1428 break; 1429 #endif 1430 default: 1431 #ifdef CONFIG_CMD_TFTPPUT 1432 if (packet_icmp_handler) 1433 packet_icmp_handler(icmph->type, icmph->code, 1434 ntohs(ip->udp_dst), src_ip, ntohs(ip->udp_src), 1435 icmph->un.data, ntohs(ip->udp_len)); 1436 #endif 1437 break; 1438 } 1439 } 1440 1441 void 1442 NetReceive(volatile uchar *inpkt, int len) 1443 { 1444 Ethernet_t *et; 1445 IP_t *ip; 1446 ARP_t *arp; 1447 IPaddr_t tmp; 1448 IPaddr_t src_ip; 1449 int x; 1450 uchar *pkt; 1451 #if defined(CONFIG_CMD_CDP) 1452 int iscdp; 1453 #endif 1454 ushort cti = 0, vlanid = VLAN_NONE, myvlanid, mynvlanid; 1455 1456 debug("packet received\n"); 1457 1458 NetRxPacket = inpkt; 1459 NetRxPacketLen = len; 1460 et = (Ethernet_t *)inpkt; 1461 1462 /* too small packet? */ 1463 if (len < ETHER_HDR_SIZE) 1464 return; 1465 1466 #ifdef CONFIG_API 1467 if (push_packet) { 1468 (*push_packet)(inpkt, len); 1469 return; 1470 } 1471 #endif 1472 1473 #if defined(CONFIG_CMD_CDP) 1474 /* keep track if packet is CDP */ 1475 iscdp = memcmp(et->et_dest, NetCDPAddr, 6) == 0; 1476 #endif 1477 1478 myvlanid = ntohs(NetOurVLAN); 1479 if (myvlanid == (ushort)-1) 1480 myvlanid = VLAN_NONE; 1481 mynvlanid = ntohs(NetOurNativeVLAN); 1482 if (mynvlanid == (ushort)-1) 1483 mynvlanid = VLAN_NONE; 1484 1485 x = ntohs(et->et_protlen); 1486 1487 debug("packet received\n"); 1488 1489 if (x < 1514) { 1490 /* 1491 * Got a 802 packet. Check the other protocol field. 1492 */ 1493 x = ntohs(et->et_prot); 1494 1495 ip = (IP_t *)(inpkt + E802_HDR_SIZE); 1496 len -= E802_HDR_SIZE; 1497 1498 } else if (x != PROT_VLAN) { /* normal packet */ 1499 ip = (IP_t *)(inpkt + ETHER_HDR_SIZE); 1500 len -= ETHER_HDR_SIZE; 1501 1502 } else { /* VLAN packet */ 1503 VLAN_Ethernet_t *vet = (VLAN_Ethernet_t *)et; 1504 1505 debug("VLAN packet received\n"); 1506 1507 /* too small packet? */ 1508 if (len < VLAN_ETHER_HDR_SIZE) 1509 return; 1510 1511 /* if no VLAN active */ 1512 if ((ntohs(NetOurVLAN) & VLAN_IDMASK) == VLAN_NONE 1513 #if defined(CONFIG_CMD_CDP) 1514 && iscdp == 0 1515 #endif 1516 ) 1517 return; 1518 1519 cti = ntohs(vet->vet_tag); 1520 vlanid = cti & VLAN_IDMASK; 1521 x = ntohs(vet->vet_type); 1522 1523 ip = (IP_t *)(inpkt + VLAN_ETHER_HDR_SIZE); 1524 len -= VLAN_ETHER_HDR_SIZE; 1525 } 1526 1527 debug("Receive from protocol 0x%x\n", x); 1528 1529 #if defined(CONFIG_CMD_CDP) 1530 if (iscdp) { 1531 CDPHandler((uchar *)ip, len); 1532 return; 1533 } 1534 #endif 1535 1536 if ((myvlanid & VLAN_IDMASK) != VLAN_NONE) { 1537 if (vlanid == VLAN_NONE) 1538 vlanid = (mynvlanid & VLAN_IDMASK); 1539 /* not matched? */ 1540 if (vlanid != (myvlanid & VLAN_IDMASK)) 1541 return; 1542 } 1543 1544 switch (x) { 1545 1546 case PROT_ARP: 1547 /* 1548 * We have to deal with two types of ARP packets: 1549 * - REQUEST packets will be answered by sending our 1550 * IP address - if we know it. 1551 * - REPLY packates are expected only after we asked 1552 * for the TFTP server's or the gateway's ethernet 1553 * address; so if we receive such a packet, we set 1554 * the server ethernet address 1555 */ 1556 debug("Got ARP\n"); 1557 1558 arp = (ARP_t *)ip; 1559 if (len < ARP_HDR_SIZE) { 1560 printf("bad length %d < %d\n", len, ARP_HDR_SIZE); 1561 return; 1562 } 1563 if (ntohs(arp->ar_hrd) != ARP_ETHER) 1564 return; 1565 if (ntohs(arp->ar_pro) != PROT_IP) 1566 return; 1567 if (arp->ar_hln != 6) 1568 return; 1569 if (arp->ar_pln != 4) 1570 return; 1571 1572 if (NetOurIP == 0) 1573 return; 1574 1575 if (NetReadIP(&arp->ar_data[16]) != NetOurIP) 1576 return; 1577 1578 switch (ntohs(arp->ar_op)) { 1579 case ARPOP_REQUEST: 1580 /* reply with our IP address */ 1581 debug("Got ARP REQUEST, return our IP\n"); 1582 pkt = (uchar *)et; 1583 pkt += NetSetEther(pkt, et->et_src, PROT_ARP); 1584 arp->ar_op = htons(ARPOP_REPLY); 1585 memcpy(&arp->ar_data[10], &arp->ar_data[0], 6); 1586 NetCopyIP(&arp->ar_data[16], &arp->ar_data[6]); 1587 memcpy(&arp->ar_data[0], NetOurEther, 6); 1588 NetCopyIP(&arp->ar_data[6], &NetOurIP); 1589 (void) eth_send((uchar *)et, 1590 (pkt - (uchar *)et) + ARP_HDR_SIZE); 1591 return; 1592 1593 case ARPOP_REPLY: /* arp reply */ 1594 /* are we waiting for a reply */ 1595 if (!NetArpWaitPacketIP || !NetArpWaitPacketMAC) 1596 break; 1597 1598 #ifdef CONFIG_KEEP_SERVERADDR 1599 if (NetServerIP == NetArpWaitPacketIP) { 1600 char buf[20]; 1601 sprintf(buf, "%pM", arp->ar_data); 1602 setenv("serveraddr", buf); 1603 } 1604 #endif 1605 1606 debug("Got ARP REPLY, set server/gtwy eth addr (%pM)\n", 1607 arp->ar_data); 1608 1609 tmp = NetReadIP(&arp->ar_data[6]); 1610 1611 /* matched waiting packet's address */ 1612 if (tmp == NetArpWaitReplyIP) { 1613 debug("Got it\n"); 1614 /* save address for later use */ 1615 memcpy(NetArpWaitPacketMAC, 1616 &arp->ar_data[0], 6); 1617 1618 #ifdef CONFIG_NETCONSOLE 1619 (*packetHandler)(0, 0, 0, 0, 0); 1620 #endif 1621 /* modify header, and transmit it */ 1622 memcpy(((Ethernet_t *)NetArpWaitTxPacket)->et_dest, NetArpWaitPacketMAC, 6); 1623 (void) eth_send(NetArpWaitTxPacket, 1624 NetArpWaitTxPacketSize); 1625 1626 /* no arp request pending now */ 1627 NetArpWaitPacketIP = 0; 1628 NetArpWaitTxPacketSize = 0; 1629 NetArpWaitPacketMAC = NULL; 1630 1631 } 1632 return; 1633 default: 1634 debug("Unexpected ARP opcode 0x%x\n", 1635 ntohs(arp->ar_op)); 1636 return; 1637 } 1638 break; 1639 1640 #ifdef CONFIG_CMD_RARP 1641 case PROT_RARP: 1642 debug("Got RARP\n"); 1643 arp = (ARP_t *)ip; 1644 if (len < ARP_HDR_SIZE) { 1645 printf("bad length %d < %d\n", len, ARP_HDR_SIZE); 1646 return; 1647 } 1648 1649 if ((ntohs(arp->ar_op) != RARPOP_REPLY) || 1650 (ntohs(arp->ar_hrd) != ARP_ETHER) || 1651 (ntohs(arp->ar_pro) != PROT_IP) || 1652 (arp->ar_hln != 6) || (arp->ar_pln != 4)) { 1653 1654 puts("invalid RARP header\n"); 1655 } else { 1656 NetCopyIP(&NetOurIP, &arp->ar_data[16]); 1657 if (NetServerIP == 0) 1658 NetCopyIP(&NetServerIP, &arp->ar_data[6]); 1659 memcpy(NetServerEther, &arp->ar_data[0], 6); 1660 1661 (*packetHandler)(0, 0, 0, 0, 0); 1662 } 1663 break; 1664 #endif 1665 case PROT_IP: 1666 debug("Got IP\n"); 1667 /* Before we start poking the header, make sure it is there */ 1668 if (len < IP_HDR_SIZE) { 1669 debug("len bad %d < %lu\n", len, (ulong)IP_HDR_SIZE); 1670 return; 1671 } 1672 /* Check the packet length */ 1673 if (len < ntohs(ip->ip_len)) { 1674 printf("len bad %d < %d\n", len, ntohs(ip->ip_len)); 1675 return; 1676 } 1677 len = ntohs(ip->ip_len); 1678 debug("len=%d, v=%02x\n", len, ip->ip_hl_v & 0xff); 1679 1680 /* Can't deal with anything except IPv4 */ 1681 if ((ip->ip_hl_v & 0xf0) != 0x40) 1682 return; 1683 /* Can't deal with IP options (headers != 20 bytes) */ 1684 if ((ip->ip_hl_v & 0x0f) > 0x05) 1685 return; 1686 /* Check the Checksum of the header */ 1687 if (!NetCksumOk((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2)) { 1688 puts("checksum bad\n"); 1689 return; 1690 } 1691 /* If it is not for us, ignore it */ 1692 tmp = NetReadIP(&ip->ip_dst); 1693 if (NetOurIP && tmp != NetOurIP && tmp != 0xFFFFFFFF) { 1694 #ifdef CONFIG_MCAST_TFTP 1695 if (Mcast_addr != tmp) 1696 #endif 1697 return; 1698 } 1699 /* Read source IP address for later use */ 1700 src_ip = NetReadIP(&ip->ip_src); 1701 /* 1702 * The function returns the unchanged packet if it's not 1703 * a fragment, and either the complete packet or NULL if 1704 * it is a fragment (if !CONFIG_IP_DEFRAG, it returns NULL) 1705 */ 1706 ip = NetDefragment(ip, &len); 1707 if (!ip) 1708 return; 1709 /* 1710 * watch for ICMP host redirects 1711 * 1712 * There is no real handler code (yet). We just watch 1713 * for ICMP host redirect messages. In case anybody 1714 * sees these messages: please contact me 1715 * (wd@denx.de), or - even better - send me the 1716 * necessary fixes :-) 1717 * 1718 * Note: in all cases where I have seen this so far 1719 * it was a problem with the router configuration, 1720 * for instance when a router was configured in the 1721 * BOOTP reply, but the TFTP server was on the same 1722 * subnet. So this is probably a warning that your 1723 * configuration might be wrong. But I'm not really 1724 * sure if there aren't any other situations. 1725 * 1726 * Simon Glass <sjg@chromium.org>: We get an ICMP when 1727 * we send a tftp packet to a dead connection, or when 1728 * there is no server at the other end. 1729 */ 1730 if (ip->ip_p == IPPROTO_ICMP) { 1731 receive_icmp(ip, len, src_ip, et); 1732 return; 1733 } else if (ip->ip_p != IPPROTO_UDP) { /* Only UDP packets */ 1734 return; 1735 } 1736 1737 #ifdef CONFIG_UDP_CHECKSUM 1738 if (ip->udp_xsum != 0) { 1739 ulong xsum; 1740 ushort *sumptr; 1741 ushort sumlen; 1742 1743 xsum = ip->ip_p; 1744 xsum += (ntohs(ip->udp_len)); 1745 xsum += (ntohl(ip->ip_src) >> 16) & 0x0000ffff; 1746 xsum += (ntohl(ip->ip_src) >> 0) & 0x0000ffff; 1747 xsum += (ntohl(ip->ip_dst) >> 16) & 0x0000ffff; 1748 xsum += (ntohl(ip->ip_dst) >> 0) & 0x0000ffff; 1749 1750 sumlen = ntohs(ip->udp_len); 1751 sumptr = (ushort *) &(ip->udp_src); 1752 1753 while (sumlen > 1) { 1754 ushort sumdata; 1755 1756 sumdata = *sumptr++; 1757 xsum += ntohs(sumdata); 1758 sumlen -= 2; 1759 } 1760 if (sumlen > 0) { 1761 ushort sumdata; 1762 1763 sumdata = *(unsigned char *) sumptr; 1764 sumdata = (sumdata << 8) & 0xff00; 1765 xsum += sumdata; 1766 } 1767 while ((xsum >> 16) != 0) { 1768 xsum = (xsum & 0x0000ffff) + 1769 ((xsum >> 16) & 0x0000ffff); 1770 } 1771 if ((xsum != 0x00000000) && (xsum != 0x0000ffff)) { 1772 printf(" UDP wrong checksum %08lx %08x\n", 1773 xsum, ntohs(ip->udp_xsum)); 1774 return; 1775 } 1776 } 1777 #endif 1778 1779 1780 #ifdef CONFIG_NETCONSOLE 1781 nc_input_packet((uchar *)ip + IP_HDR_SIZE, 1782 ntohs(ip->udp_dst), 1783 ntohs(ip->udp_src), 1784 ntohs(ip->udp_len) - 8); 1785 #endif 1786 /* 1787 * IP header OK. Pass the packet to the current handler. 1788 */ 1789 (*packetHandler)((uchar *)ip + IP_HDR_SIZE, 1790 ntohs(ip->udp_dst), 1791 src_ip, 1792 ntohs(ip->udp_src), 1793 ntohs(ip->udp_len) - 8); 1794 break; 1795 } 1796 } 1797 1798 1799 /**********************************************************************/ 1800 1801 static int net_check_prereq(enum proto_t protocol) 1802 { 1803 switch (protocol) { 1804 /* Fall through */ 1805 #if defined(CONFIG_CMD_PING) 1806 case PING: 1807 if (NetPingIP == 0) { 1808 puts("*** ERROR: ping address not given\n"); 1809 return 1; 1810 } 1811 goto common; 1812 #endif 1813 #if defined(CONFIG_CMD_SNTP) 1814 case SNTP: 1815 if (NetNtpServerIP == 0) { 1816 puts("*** ERROR: NTP server address not given\n"); 1817 return 1; 1818 } 1819 goto common; 1820 #endif 1821 #if defined(CONFIG_CMD_DNS) 1822 case DNS: 1823 if (NetOurDNSIP == 0) { 1824 puts("*** ERROR: DNS server address not given\n"); 1825 return 1; 1826 } 1827 goto common; 1828 #endif 1829 #if defined(CONFIG_CMD_NFS) 1830 case NFS: 1831 #endif 1832 case TFTPGET: 1833 case TFTPPUT: 1834 if (NetServerIP == 0) { 1835 puts("*** ERROR: `serverip' not set\n"); 1836 return 1; 1837 } 1838 #if defined(CONFIG_CMD_PING) || defined(CONFIG_CMD_SNTP) || \ 1839 defined(CONFIG_CMD_DNS) 1840 common: 1841 #endif 1842 /* Fall through */ 1843 1844 case NETCONS: 1845 case TFTPSRV: 1846 if (NetOurIP == 0) { 1847 puts("*** ERROR: `ipaddr' not set\n"); 1848 return 1; 1849 } 1850 /* Fall through */ 1851 1852 #ifdef CONFIG_CMD_RARP 1853 case RARP: 1854 #endif 1855 case BOOTP: 1856 case CDP: 1857 case DHCP: 1858 if (memcmp(NetOurEther, "\0\0\0\0\0\0", 6) == 0) { 1859 extern int eth_get_dev_index(void); 1860 int num = eth_get_dev_index(); 1861 1862 switch (num) { 1863 case -1: 1864 puts("*** ERROR: No ethernet found.\n"); 1865 return 1; 1866 case 0: 1867 puts("*** ERROR: `ethaddr' not set\n"); 1868 break; 1869 default: 1870 printf("*** ERROR: `eth%daddr' not set\n", 1871 num); 1872 break; 1873 } 1874 1875 NetStartAgain(); 1876 return 2; 1877 } 1878 /* Fall through */ 1879 default: 1880 return 0; 1881 } 1882 return 0; /* OK */ 1883 } 1884 /**********************************************************************/ 1885 1886 int 1887 NetCksumOk(uchar *ptr, int len) 1888 { 1889 return !((NetCksum(ptr, len) + 1) & 0xfffe); 1890 } 1891 1892 1893 unsigned 1894 NetCksum(uchar *ptr, int len) 1895 { 1896 ulong xsum; 1897 ushort *p = (ushort *)ptr; 1898 1899 xsum = 0; 1900 while (len-- > 0) 1901 xsum += *p++; 1902 xsum = (xsum & 0xffff) + (xsum >> 16); 1903 xsum = (xsum & 0xffff) + (xsum >> 16); 1904 return xsum & 0xffff; 1905 } 1906 1907 int 1908 NetEthHdrSize(void) 1909 { 1910 ushort myvlanid; 1911 1912 myvlanid = ntohs(NetOurVLAN); 1913 if (myvlanid == (ushort)-1) 1914 myvlanid = VLAN_NONE; 1915 1916 return ((myvlanid & VLAN_IDMASK) == VLAN_NONE) ? ETHER_HDR_SIZE : 1917 VLAN_ETHER_HDR_SIZE; 1918 } 1919 1920 int 1921 NetSetEther(volatile uchar *xet, uchar * addr, uint prot) 1922 { 1923 Ethernet_t *et = (Ethernet_t *)xet; 1924 ushort myvlanid; 1925 1926 myvlanid = ntohs(NetOurVLAN); 1927 if (myvlanid == (ushort)-1) 1928 myvlanid = VLAN_NONE; 1929 1930 memcpy(et->et_dest, addr, 6); 1931 memcpy(et->et_src, NetOurEther, 6); 1932 if ((myvlanid & VLAN_IDMASK) == VLAN_NONE) { 1933 et->et_protlen = htons(prot); 1934 return ETHER_HDR_SIZE; 1935 } else { 1936 VLAN_Ethernet_t *vet = (VLAN_Ethernet_t *)xet; 1937 1938 vet->vet_vlan_type = htons(PROT_VLAN); 1939 vet->vet_tag = htons((0 << 5) | (myvlanid & VLAN_IDMASK)); 1940 vet->vet_type = htons(prot); 1941 return VLAN_ETHER_HDR_SIZE; 1942 } 1943 } 1944 1945 void 1946 NetSetIP(volatile uchar *xip, IPaddr_t dest, int dport, int sport, int len) 1947 { 1948 IP_t *ip = (IP_t *)xip; 1949 1950 /* 1951 * If the data is an odd number of bytes, zero the 1952 * byte after the last byte so that the checksum 1953 * will work. 1954 */ 1955 if (len & 1) 1956 xip[IP_HDR_SIZE + len] = 0; 1957 1958 /* 1959 * Construct an IP and UDP header. 1960 * (need to set no fragment bit - XXX) 1961 */ 1962 /* IP_HDR_SIZE / 4 (not including UDP) */ 1963 ip->ip_hl_v = 0x45; 1964 ip->ip_tos = 0; 1965 ip->ip_len = htons(IP_HDR_SIZE + len); 1966 ip->ip_id = htons(NetIPID++); 1967 ip->ip_off = htons(IP_FLAGS_DFRAG); /* Don't fragment */ 1968 ip->ip_ttl = 255; 1969 ip->ip_p = 17; /* UDP */ 1970 ip->ip_sum = 0; 1971 /* already in network byte order */ 1972 NetCopyIP((void *)&ip->ip_src, &NetOurIP); 1973 /* - "" - */ 1974 NetCopyIP((void *)&ip->ip_dst, &dest); 1975 ip->udp_src = htons(sport); 1976 ip->udp_dst = htons(dport); 1977 ip->udp_len = htons(8 + len); 1978 ip->udp_xsum = 0; 1979 ip->ip_sum = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2); 1980 } 1981 1982 void copy_filename(char *dst, const char *src, int size) 1983 { 1984 if (*src && (*src == '"')) { 1985 ++src; 1986 --size; 1987 } 1988 1989 while ((--size > 0) && *src && (*src != '"')) 1990 *dst++ = *src++; 1991 *dst = '\0'; 1992 } 1993 1994 #if defined(CONFIG_CMD_NFS) || \ 1995 defined(CONFIG_CMD_SNTP) || \ 1996 defined(CONFIG_CMD_DNS) 1997 /* 1998 * make port a little random (1024-17407) 1999 * This keeps the math somewhat trivial to compute, and seems to work with 2000 * all supported protocols/clients/servers 2001 */ 2002 unsigned int random_port(void) 2003 { 2004 return 1024 + (get_timer(0) % 0x4000); 2005 } 2006 #endif 2007 2008 void ip_to_string(IPaddr_t x, char *s) 2009 { 2010 x = ntohl(x); 2011 sprintf(s, "%d.%d.%d.%d", 2012 (int) ((x >> 24) & 0xff), 2013 (int) ((x >> 16) & 0xff), 2014 (int) ((x >> 8) & 0xff), (int) ((x >> 0) & 0xff) 2015 ); 2016 } 2017 2018 void VLAN_to_string(ushort x, char *s) 2019 { 2020 x = ntohs(x); 2021 2022 if (x == (ushort)-1) 2023 x = VLAN_NONE; 2024 2025 if (x == VLAN_NONE) 2026 strcpy(s, "none"); 2027 else 2028 sprintf(s, "%d", x & VLAN_IDMASK); 2029 } 2030 2031 ushort string_to_VLAN(const char *s) 2032 { 2033 ushort id; 2034 2035 if (s == NULL) 2036 return htons(VLAN_NONE); 2037 2038 if (*s < '0' || *s > '9') 2039 id = VLAN_NONE; 2040 else 2041 id = (ushort)simple_strtoul(s, NULL, 10); 2042 2043 return htons(id); 2044 } 2045 2046 ushort getenv_VLAN(char *var) 2047 { 2048 return string_to_VLAN(getenv(var)); 2049 } 2050