xref: /openbmc/u-boot/net/net.c (revision 85829017)
1 /*
2  *	Copied from Linux Monitor (LiMon) - Networking.
3  *
4  *	Copyright 1994 - 2000 Neil Russell.
5  *	(See License)
6  *	Copyright 2000 Roland Borde
7  *	Copyright 2000 Paolo Scaffardi
8  *	Copyright 2000-2002 Wolfgang Denk, wd@denx.de
9  */
10 
11 /*
12  * General Desription:
13  *
14  * The user interface supports commands for BOOTP, RARP, and TFTP.
15  * Also, we support ARP internally. Depending on available data,
16  * these interact as follows:
17  *
18  * BOOTP:
19  *
20  *	Prerequisites:	- own ethernet address
21  *	We want:	- own IP address
22  *			- TFTP server IP address
23  *			- name of bootfile
24  *	Next step:	ARP
25  *
26  * RARP:
27  *
28  *	Prerequisites:	- own ethernet address
29  *	We want:	- own IP address
30  *			- TFTP server IP address
31  *	Next step:	ARP
32  *
33  * ARP:
34  *
35  *	Prerequisites:	- own ethernet address
36  *			- own IP address
37  *			- TFTP server IP address
38  *	We want:	- TFTP server ethernet address
39  *	Next step:	TFTP
40  *
41  * DHCP:
42  *
43  *     Prerequisites:	- own ethernet address
44  *     We want:		- IP, Netmask, ServerIP, Gateway IP
45  *			- bootfilename, lease time
46  *     Next step:	- TFTP
47  *
48  * TFTP:
49  *
50  *	Prerequisites:	- own ethernet address
51  *			- own IP address
52  *			- TFTP server IP address
53  *			- TFTP server ethernet address
54  *			- name of bootfile (if unknown, we use a default name
55  *			  derived from our own IP address)
56  *	We want:	- load the boot file
57  *	Next step:	none
58  *
59  * NFS:
60  *
61  *	Prerequisites:	- own ethernet address
62  *			- own IP address
63  *			- name of bootfile (if unknown, we use a default name
64  *			  derived from our own IP address)
65  *	We want:	- load the boot file
66  *	Next step:	none
67  *
68  * SNTP:
69  *
70  *	Prerequisites:	- own ethernet address
71  *			- own IP address
72  *	We want:	- network time
73  *	Next step:	none
74  */
75 
76 
77 #include <common.h>
78 #include <watchdog.h>
79 #include <command.h>
80 #include <net.h>
81 #include "bootp.h"
82 #include "tftp.h"
83 #include "rarp.h"
84 #include "nfs.h"
85 #ifdef CONFIG_STATUS_LED
86 #include <status_led.h>
87 #include <miiphy.h>
88 #endif
89 #if defined(CONFIG_CMD_SNTP)
90 #include "sntp.h"
91 #endif
92 #if defined(CONFIG_CDP_VERSION)
93 #include <timestamp.h>
94 #endif
95 #if defined(CONFIG_CMD_DNS)
96 #include "dns.h"
97 #endif
98 
99 #if defined(CONFIG_CMD_NET)
100 
101 DECLARE_GLOBAL_DATA_PTR;
102 
103 #ifndef	CONFIG_ARP_TIMEOUT
104 # define ARP_TIMEOUT		5000UL	/* Milliseconds before trying ARP again */
105 #else
106 # define ARP_TIMEOUT		CONFIG_ARP_TIMEOUT
107 #endif
108 
109 
110 #ifndef	CONFIG_NET_RETRY_COUNT
111 # define ARP_TIMEOUT_COUNT	5	/* # of timeouts before giving up  */
112 #else
113 # define ARP_TIMEOUT_COUNT	CONFIG_NET_RETRY_COUNT
114 #endif
115 
116 /** BOOTP EXTENTIONS **/
117 
118 IPaddr_t	NetOurSubnetMask=0;		/* Our subnet mask (0=unknown)	*/
119 IPaddr_t	NetOurGatewayIP=0;		/* Our gateways IP address	*/
120 IPaddr_t	NetOurDNSIP=0;			/* Our DNS IP address		*/
121 #if defined(CONFIG_BOOTP_DNS2)
122 IPaddr_t	NetOurDNS2IP=0;			/* Our 2nd DNS IP address	*/
123 #endif
124 char		NetOurNISDomain[32]={0,};	/* Our NIS domain		*/
125 char		NetOurHostName[32]={0,};	/* Our hostname			*/
126 char		NetOurRootPath[64]={0,};	/* Our bootpath			*/
127 ushort		NetBootFileSize=0;		/* Our bootfile size in blocks	*/
128 
129 #ifdef CONFIG_MCAST_TFTP	/* Multicast TFTP */
130 IPaddr_t Mcast_addr;
131 #endif
132 
133 /** END OF BOOTP EXTENTIONS **/
134 
135 ulong		NetBootFileXferSize;	/* The actual transferred size of the bootfile (in bytes) */
136 uchar		NetOurEther[6];		/* Our ethernet address			*/
137 uchar		NetServerEther[6] =	/* Boot server enet address		*/
138 			{ 0, 0, 0, 0, 0, 0 };
139 IPaddr_t	NetOurIP;		/* Our IP addr (0 = unknown)		*/
140 IPaddr_t	NetServerIP;		/* Server IP addr (0 = unknown)		*/
141 volatile uchar *NetRxPacket;		/* Current receive packet		*/
142 int		NetRxPacketLen;		/* Current rx packet length		*/
143 unsigned	NetIPID;		/* IP packet ID				*/
144 uchar		NetBcastAddr[6] =	/* Ethernet bcast address		*/
145 			{ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
146 uchar		NetEtherNullAddr[6] =
147 			{ 0, 0, 0, 0, 0, 0 };
148 #ifdef CONFIG_API
149 void		(*push_packet)(volatile void *, int len) = 0;
150 #endif
151 #if defined(CONFIG_CMD_CDP)
152 uchar		NetCDPAddr[6] =		/* Ethernet bcast address		*/
153 			{ 0x01, 0x00, 0x0c, 0xcc, 0xcc, 0xcc };
154 #endif
155 int		NetState;		/* Network loop state			*/
156 #ifdef CONFIG_NET_MULTI
157 int		NetRestartWrap = 0;	/* Tried all network devices		*/
158 static int	NetRestarted = 0;	/* Network loop restarted		*/
159 static int	NetDevExists = 0;	/* At least one device configured	*/
160 #endif
161 
162 /* XXX in both little & big endian machines 0xFFFF == ntohs(-1) */
163 ushort		NetOurVLAN = 0xFFFF;		/* default is without VLAN	*/
164 ushort		NetOurNativeVLAN = 0xFFFF;	/* ditto			*/
165 
166 char		BootFile[128];		/* Boot File name			*/
167 
168 #if defined(CONFIG_CMD_PING)
169 IPaddr_t	NetPingIP;		/* the ip address to ping		*/
170 
171 static void PingStart(void);
172 #endif
173 
174 #if defined(CONFIG_CMD_CDP)
175 static void CDPStart(void);
176 #endif
177 
178 #if defined(CONFIG_CMD_SNTP)
179 IPaddr_t	NetNtpServerIP;		/* NTP server IP address		*/
180 int		NetTimeOffset=0;	/* offset time from UTC			*/
181 #endif
182 
183 #ifdef CONFIG_NETCONSOLE
184 void NcStart(void);
185 int nc_input_packet(uchar *pkt, unsigned dest, unsigned src, unsigned len);
186 #endif
187 
188 volatile uchar	PktBuf[(PKTBUFSRX+1) * PKTSIZE_ALIGN + PKTALIGN];
189 
190 volatile uchar *NetRxPackets[PKTBUFSRX]; /* Receive packets			*/
191 
192 static rxhand_f *packetHandler;		/* Current RX packet handler		*/
193 static thand_f *timeHandler;		/* Current timeout handler		*/
194 static ulong	timeStart;		/* Time base value			*/
195 static ulong	timeDelta;		/* Current timeout value		*/
196 volatile uchar *NetTxPacket = 0;	/* THE transmit packet			*/
197 
198 static int net_check_prereq (proto_t protocol);
199 
200 /**********************************************************************/
201 
202 IPaddr_t	NetArpWaitPacketIP;
203 IPaddr_t	NetArpWaitReplyIP;
204 uchar	       *NetArpWaitPacketMAC;	/* MAC address of waiting packet's destination	*/
205 uchar	       *NetArpWaitTxPacket;	/* THE transmit packet			*/
206 int		NetArpWaitTxPacketSize;
207 uchar		NetArpWaitPacketBuf[PKTSIZE_ALIGN + PKTALIGN];
208 ulong		NetArpWaitTimerStart;
209 int		NetArpWaitTry;
210 
211 void ArpRequest (void)
212 {
213 	int i;
214 	volatile uchar *pkt;
215 	ARP_t *arp;
216 
217 	debug("ARP broadcast %d\n", NetArpWaitTry);
218 
219 	pkt = NetTxPacket;
220 
221 	pkt += NetSetEther (pkt, NetBcastAddr, PROT_ARP);
222 
223 	arp = (ARP_t *) pkt;
224 
225 	arp->ar_hrd = htons (ARP_ETHER);
226 	arp->ar_pro = htons (PROT_IP);
227 	arp->ar_hln = 6;
228 	arp->ar_pln = 4;
229 	arp->ar_op = htons (ARPOP_REQUEST);
230 
231 	memcpy (&arp->ar_data[0], NetOurEther, 6);		/* source ET addr	*/
232 	NetWriteIP ((uchar *) & arp->ar_data[6], NetOurIP);	/* source IP addr	*/
233 	for (i = 10; i < 16; ++i) {
234 		arp->ar_data[i] = 0;				/* dest ET addr = 0     */
235 	}
236 
237 	if ((NetArpWaitPacketIP & NetOurSubnetMask) !=
238 	    (NetOurIP & NetOurSubnetMask)) {
239 		if (NetOurGatewayIP == 0) {
240 			puts ("## Warning: gatewayip needed but not set\n");
241 			NetArpWaitReplyIP = NetArpWaitPacketIP;
242 		} else {
243 			NetArpWaitReplyIP = NetOurGatewayIP;
244 		}
245 	} else {
246 		NetArpWaitReplyIP = NetArpWaitPacketIP;
247 	}
248 
249 	NetWriteIP ((uchar *) & arp->ar_data[16], NetArpWaitReplyIP);
250 	(void) eth_send (NetTxPacket, (pkt - NetTxPacket) + ARP_HDR_SIZE);
251 }
252 
253 void ArpTimeoutCheck(void)
254 {
255 	ulong t;
256 
257 	if (!NetArpWaitPacketIP)
258 		return;
259 
260 	t = get_timer(0);
261 
262 	/* check for arp timeout */
263 	if ((t - NetArpWaitTimerStart) > ARP_TIMEOUT) {
264 		NetArpWaitTry++;
265 
266 		if (NetArpWaitTry >= ARP_TIMEOUT_COUNT) {
267 			puts ("\nARP Retry count exceeded; starting again\n");
268 			NetArpWaitTry = 0;
269 			NetStartAgain();
270 		} else {
271 			NetArpWaitTimerStart = t;
272 			ArpRequest();
273 		}
274 	}
275 }
276 
277 static void
278 NetInitLoop(proto_t protocol)
279 {
280 	static int env_changed_id = 0;
281 	bd_t *bd = gd->bd;
282 	int env_id = get_env_id ();
283 
284 	/* update only when the environment has changed */
285 	if (env_changed_id != env_id) {
286 		NetCopyIP(&NetOurIP, &bd->bi_ip_addr);
287 		NetOurGatewayIP = getenv_IPaddr ("gatewayip");
288 		NetOurSubnetMask= getenv_IPaddr ("netmask");
289 		NetServerIP = getenv_IPaddr ("serverip");
290 		NetOurNativeVLAN = getenv_VLAN("nvlan");
291 		NetOurVLAN = getenv_VLAN("vlan");
292 #if defined(CONFIG_CMD_DNS)
293 		NetOurDNSIP = getenv_IPaddr("dnsip");
294 #endif
295 		env_changed_id = env_id;
296 	}
297 
298 	return;
299 }
300 
301 /**********************************************************************/
302 /*
303  *	Main network processing loop.
304  */
305 
306 int
307 NetLoop(proto_t protocol)
308 {
309 	bd_t *bd = gd->bd;
310 
311 #ifdef CONFIG_NET_MULTI
312 	NetRestarted = 0;
313 	NetDevExists = 0;
314 #endif
315 
316 	/* XXX problem with bss workaround */
317 	NetArpWaitPacketMAC = NULL;
318 	NetArpWaitTxPacket = NULL;
319 	NetArpWaitPacketIP = 0;
320 	NetArpWaitReplyIP = 0;
321 	NetArpWaitTxPacket = NULL;
322 	NetTxPacket = NULL;
323 
324 	if (!NetTxPacket) {
325 		int	i;
326 		/*
327 		 *	Setup packet buffers, aligned correctly.
328 		 */
329 		NetTxPacket = &PktBuf[0] + (PKTALIGN - 1);
330 		NetTxPacket -= (ulong)NetTxPacket % PKTALIGN;
331 		for (i = 0; i < PKTBUFSRX; i++) {
332 			NetRxPackets[i] = NetTxPacket + (i+1)*PKTSIZE_ALIGN;
333 		}
334 	}
335 
336 	if (!NetArpWaitTxPacket) {
337 		NetArpWaitTxPacket = &NetArpWaitPacketBuf[0] + (PKTALIGN - 1);
338 		NetArpWaitTxPacket -= (ulong)NetArpWaitTxPacket % PKTALIGN;
339 		NetArpWaitTxPacketSize = 0;
340 	}
341 
342 	eth_halt();
343 #ifdef CONFIG_NET_MULTI
344 	eth_set_current();
345 #endif
346 	if (eth_init(bd) < 0) {
347 		eth_halt();
348 		return(-1);
349 	}
350 
351 restart:
352 #ifdef CONFIG_NET_MULTI
353 	memcpy (NetOurEther, eth_get_dev()->enetaddr, 6);
354 #else
355 	eth_getenv_enetaddr("ethaddr", NetOurEther);
356 #endif
357 
358 	NetState = NETLOOP_CONTINUE;
359 
360 	/*
361 	 *	Start the ball rolling with the given start function.  From
362 	 *	here on, this code is a state machine driven by received
363 	 *	packets and timer events.
364 	 */
365 	NetInitLoop(protocol);
366 
367 	switch (net_check_prereq (protocol)) {
368 	case 1:
369 		/* network not configured */
370 		eth_halt();
371 		return (-1);
372 
373 #ifdef CONFIG_NET_MULTI
374 	case 2:
375 		/* network device not configured */
376 		break;
377 #endif /* CONFIG_NET_MULTI */
378 
379 	case 0:
380 #ifdef CONFIG_NET_MULTI
381 		NetDevExists = 1;
382 #endif
383 		switch (protocol) {
384 		case TFTP:
385 			/* always use ARP to get server ethernet address */
386 			TftpStart();
387 			break;
388 
389 #if defined(CONFIG_CMD_DHCP)
390 		case DHCP:
391 			BootpTry = 0;
392 			NetOurIP = 0;
393 			DhcpRequest();		/* Basically same as BOOTP */
394 			break;
395 #endif
396 
397 		case BOOTP:
398 			BootpTry = 0;
399 			NetOurIP = 0;
400 			BootpRequest ();
401 			break;
402 
403 		case RARP:
404 			RarpTry = 0;
405 			NetOurIP = 0;
406 			RarpRequest ();
407 			break;
408 #if defined(CONFIG_CMD_PING)
409 		case PING:
410 			PingStart();
411 			break;
412 #endif
413 #if defined(CONFIG_CMD_NFS)
414 		case NFS:
415 			NfsStart();
416 			break;
417 #endif
418 #if defined(CONFIG_CMD_CDP)
419 		case CDP:
420 			CDPStart();
421 			break;
422 #endif
423 #ifdef CONFIG_NETCONSOLE
424 		case NETCONS:
425 			NcStart();
426 			break;
427 #endif
428 #if defined(CONFIG_CMD_SNTP)
429 		case SNTP:
430 			SntpStart();
431 			break;
432 #endif
433 #if defined(CONFIG_CMD_DNS)
434 		case DNS:
435 			DnsStart();
436 			break;
437 #endif
438 		default:
439 			break;
440 		}
441 
442 		NetBootFileXferSize = 0;
443 		break;
444 	}
445 
446 #if defined(CONFIG_MII) || defined(CONFIG_CMD_MII)
447 #if defined(CONFIG_SYS_FAULT_ECHO_LINK_DOWN) && defined(CONFIG_STATUS_LED) && defined(STATUS_LED_RED)
448 	/*
449 	 * Echo the inverted link state to the fault LED.
450 	 */
451 	if(miiphy_link(eth_get_dev()->name, CONFIG_SYS_FAULT_MII_ADDR)) {
452 		status_led_set (STATUS_LED_RED, STATUS_LED_OFF);
453 	} else {
454 		status_led_set (STATUS_LED_RED, STATUS_LED_ON);
455 	}
456 #endif /* CONFIG_SYS_FAULT_ECHO_LINK_DOWN, ... */
457 #endif /* CONFIG_MII, ... */
458 
459 	/*
460 	 *	Main packet reception loop.  Loop receiving packets until
461 	 *	someone sets `NetState' to a state that terminates.
462 	 */
463 	for (;;) {
464 		WATCHDOG_RESET();
465 #ifdef CONFIG_SHOW_ACTIVITY
466 		{
467 			extern void show_activity(int arg);
468 			show_activity(1);
469 		}
470 #endif
471 		/*
472 		 *	Check the ethernet for a new packet.  The ethernet
473 		 *	receive routine will process it.
474 		 */
475 		eth_rx();
476 
477 		/*
478 		 *	Abort if ctrl-c was pressed.
479 		 */
480 		if (ctrlc()) {
481 			eth_halt();
482 			puts ("\nAbort\n");
483 			return (-1);
484 		}
485 
486 		ArpTimeoutCheck();
487 
488 		/*
489 		 *	Check for a timeout, and run the timeout handler
490 		 *	if we have one.
491 		 */
492 		if (timeHandler && ((get_timer(0) - timeStart) > timeDelta)) {
493 			thand_f *x;
494 
495 #if defined(CONFIG_MII) || defined(CONFIG_CMD_MII)
496 #  if defined(CONFIG_SYS_FAULT_ECHO_LINK_DOWN) && \
497       defined(CONFIG_STATUS_LED) &&	   \
498       defined(STATUS_LED_RED)
499 			/*
500 			 * Echo the inverted link state to the fault LED.
501 			 */
502 			if(miiphy_link(eth_get_dev()->name, CONFIG_SYS_FAULT_MII_ADDR)) {
503 				status_led_set (STATUS_LED_RED, STATUS_LED_OFF);
504 			} else {
505 				status_led_set (STATUS_LED_RED, STATUS_LED_ON);
506 			}
507 #  endif /* CONFIG_SYS_FAULT_ECHO_LINK_DOWN, ... */
508 #endif /* CONFIG_MII, ... */
509 			x = timeHandler;
510 			timeHandler = (thand_f *)0;
511 			(*x)();
512 		}
513 
514 
515 		switch (NetState) {
516 
517 		case NETLOOP_RESTART:
518 #ifdef CONFIG_NET_MULTI
519 			NetRestarted = 1;
520 #endif
521 			goto restart;
522 
523 		case NETLOOP_SUCCESS:
524 			if (NetBootFileXferSize > 0) {
525 				char buf[20];
526 				printf("Bytes transferred = %ld (%lx hex)\n",
527 					NetBootFileXferSize,
528 					NetBootFileXferSize);
529 				sprintf(buf, "%lX", NetBootFileXferSize);
530 				setenv("filesize", buf);
531 
532 				sprintf(buf, "%lX", (unsigned long)load_addr);
533 				setenv("fileaddr", buf);
534 			}
535 			eth_halt();
536 			return NetBootFileXferSize;
537 
538 		case NETLOOP_FAIL:
539 			return (-1);
540 		}
541 	}
542 }
543 
544 /**********************************************************************/
545 
546 static void
547 startAgainTimeout(void)
548 {
549 	NetState = NETLOOP_RESTART;
550 }
551 
552 static void
553 startAgainHandler(uchar * pkt, unsigned dest, unsigned src, unsigned len)
554 {
555 	/* Totally ignore the packet */
556 }
557 
558 void NetStartAgain (void)
559 {
560 	char *nretry;
561 	int noretry = 0, once = 0;
562 
563 	if ((nretry = getenv ("netretry")) != NULL) {
564 		noretry = (strcmp (nretry, "no") == 0);
565 		once = (strcmp (nretry, "once") == 0);
566 	}
567 	if (noretry) {
568 		eth_halt ();
569 		NetState = NETLOOP_FAIL;
570 		return;
571 	}
572 #ifndef CONFIG_NET_MULTI
573 	NetSetTimeout (10000UL, startAgainTimeout);
574 	NetSetHandler (startAgainHandler);
575 #else	/* !CONFIG_NET_MULTI*/
576 	eth_halt ();
577 #if !defined(CONFIG_NET_DO_NOT_TRY_ANOTHER)
578 	eth_try_another (!NetRestarted);
579 #endif
580 	eth_init (gd->bd);
581 	if (NetRestartWrap) {
582 		NetRestartWrap = 0;
583 		if (NetDevExists && !once) {
584 			NetSetTimeout (10000UL, startAgainTimeout);
585 			NetSetHandler (startAgainHandler);
586 		} else {
587 			NetState = NETLOOP_FAIL;
588 		}
589 	} else {
590 		NetState = NETLOOP_RESTART;
591 	}
592 #endif	/* CONFIG_NET_MULTI */
593 }
594 
595 /**********************************************************************/
596 /*
597  *	Miscelaneous bits.
598  */
599 
600 void
601 NetSetHandler(rxhand_f * f)
602 {
603 	packetHandler = f;
604 }
605 
606 
607 void
608 NetSetTimeout(ulong iv, thand_f * f)
609 {
610 	if (iv == 0) {
611 		timeHandler = (thand_f *)0;
612 	} else {
613 		timeHandler = f;
614 		timeStart = get_timer(0);
615 		timeDelta = iv;
616 	}
617 }
618 
619 
620 void
621 NetSendPacket(volatile uchar * pkt, int len)
622 {
623 	(void) eth_send(pkt, len);
624 }
625 
626 int
627 NetSendUDPPacket(uchar *ether, IPaddr_t dest, int dport, int sport, int len)
628 {
629 	uchar *pkt;
630 
631 	/* convert to new style broadcast */
632 	if (dest == 0)
633 		dest = 0xFFFFFFFF;
634 
635 	/* if broadcast, make the ether address a broadcast and don't do ARP */
636 	if (dest == 0xFFFFFFFF)
637 		ether = NetBcastAddr;
638 
639 	/* if MAC address was not discovered yet, save the packet and do an ARP request */
640 	if (memcmp(ether, NetEtherNullAddr, 6) == 0) {
641 
642 		debug("sending ARP for %08lx\n", dest);
643 
644 		NetArpWaitPacketIP = dest;
645 		NetArpWaitPacketMAC = ether;
646 
647 		pkt = NetArpWaitTxPacket;
648 		pkt += NetSetEther (pkt, NetArpWaitPacketMAC, PROT_IP);
649 
650 		NetSetIP (pkt, dest, dport, sport, len);
651 		memcpy(pkt + IP_HDR_SIZE, (uchar *)NetTxPacket + (pkt - (uchar *)NetArpWaitTxPacket) + IP_HDR_SIZE, len);
652 
653 		/* size of the waiting packet */
654 		NetArpWaitTxPacketSize = (pkt - NetArpWaitTxPacket) + IP_HDR_SIZE + len;
655 
656 		/* and do the ARP request */
657 		NetArpWaitTry = 1;
658 		NetArpWaitTimerStart = get_timer(0);
659 		ArpRequest();
660 		return 1;	/* waiting */
661 	}
662 
663 	debug("sending UDP to %08lx/%pM\n", dest, ether);
664 
665 	pkt = (uchar *)NetTxPacket;
666 	pkt += NetSetEther (pkt, ether, PROT_IP);
667 	NetSetIP (pkt, dest, dport, sport, len);
668 	(void) eth_send(NetTxPacket, (pkt - NetTxPacket) + IP_HDR_SIZE + len);
669 
670 	return 0;	/* transmitted */
671 }
672 
673 #if defined(CONFIG_CMD_PING)
674 static ushort PingSeqNo;
675 
676 int PingSend(void)
677 {
678 	static uchar mac[6];
679 	volatile IP_t *ip;
680 	volatile ushort *s;
681 	uchar *pkt;
682 
683 	/* XXX always send arp request */
684 
685 	memcpy(mac, NetEtherNullAddr, 6);
686 
687 	debug("sending ARP for %08lx\n", NetPingIP);
688 
689 	NetArpWaitPacketIP = NetPingIP;
690 	NetArpWaitPacketMAC = mac;
691 
692 	pkt = NetArpWaitTxPacket;
693 	pkt += NetSetEther(pkt, mac, PROT_IP);
694 
695 	ip = (volatile IP_t *)pkt;
696 
697 	/*
698 	 *	Construct an IP and ICMP header.  (need to set no fragment bit - XXX)
699 	 */
700 	ip->ip_hl_v  = 0x45;		/* IP_HDR_SIZE / 4 (not including UDP) */
701 	ip->ip_tos   = 0;
702 	ip->ip_len   = htons(IP_HDR_SIZE_NO_UDP + 8);
703 	ip->ip_id    = htons(NetIPID++);
704 	ip->ip_off   = htons(IP_FLAGS_DFRAG);	/* Don't fragment */
705 	ip->ip_ttl   = 255;
706 	ip->ip_p     = 0x01;		/* ICMP */
707 	ip->ip_sum   = 0;
708 	NetCopyIP((void*)&ip->ip_src, &NetOurIP); /* already in network byte order */
709 	NetCopyIP((void*)&ip->ip_dst, &NetPingIP);	   /* - "" - */
710 	ip->ip_sum   = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2);
711 
712 	s = &ip->udp_src;		/* XXX ICMP starts here */
713 	s[0] = htons(0x0800);		/* echo-request, code */
714 	s[1] = 0;			/* checksum */
715 	s[2] = 0;			/* identifier */
716 	s[3] = htons(PingSeqNo++);	/* sequence number */
717 	s[1] = ~NetCksum((uchar *)s, 8/2);
718 
719 	/* size of the waiting packet */
720 	NetArpWaitTxPacketSize = (pkt - NetArpWaitTxPacket) + IP_HDR_SIZE_NO_UDP + 8;
721 
722 	/* and do the ARP request */
723 	NetArpWaitTry = 1;
724 	NetArpWaitTimerStart = get_timer(0);
725 	ArpRequest();
726 	return 1;	/* waiting */
727 }
728 
729 static void
730 PingTimeout (void)
731 {
732 	eth_halt();
733 	NetState = NETLOOP_FAIL;	/* we did not get the reply */
734 }
735 
736 static void
737 PingHandler (uchar * pkt, unsigned dest, unsigned src, unsigned len)
738 {
739 	IPaddr_t tmp;
740 	volatile IP_t *ip = (volatile IP_t *)pkt;
741 
742 	tmp = NetReadIP((void *)&ip->ip_src);
743 	if (tmp != NetPingIP)
744 		return;
745 
746 	NetState = NETLOOP_SUCCESS;
747 }
748 
749 static void PingStart(void)
750 {
751 #if defined(CONFIG_NET_MULTI)
752 	printf ("Using %s device\n", eth_get_name());
753 #endif	/* CONFIG_NET_MULTI */
754 	NetSetTimeout (10000UL, PingTimeout);
755 	NetSetHandler (PingHandler);
756 
757 	PingSend();
758 }
759 #endif
760 
761 #if defined(CONFIG_CMD_CDP)
762 
763 #define CDP_DEVICE_ID_TLV		0x0001
764 #define CDP_ADDRESS_TLV			0x0002
765 #define CDP_PORT_ID_TLV			0x0003
766 #define CDP_CAPABILITIES_TLV		0x0004
767 #define CDP_VERSION_TLV			0x0005
768 #define CDP_PLATFORM_TLV		0x0006
769 #define CDP_NATIVE_VLAN_TLV		0x000a
770 #define CDP_APPLIANCE_VLAN_TLV		0x000e
771 #define CDP_TRIGGER_TLV			0x000f
772 #define CDP_POWER_CONSUMPTION_TLV	0x0010
773 #define CDP_SYSNAME_TLV			0x0014
774 #define CDP_SYSOBJECT_TLV		0x0015
775 #define CDP_MANAGEMENT_ADDRESS_TLV	0x0016
776 
777 #define CDP_TIMEOUT			250UL	/* one packet every 250ms */
778 
779 static int CDPSeq;
780 static int CDPOK;
781 
782 ushort CDPNativeVLAN;
783 ushort CDPApplianceVLAN;
784 
785 static const uchar CDP_SNAP_hdr[8] = { 0xAA, 0xAA, 0x03, 0x00, 0x00, 0x0C, 0x20, 0x00 };
786 
787 static ushort CDP_compute_csum(const uchar *buff, ushort len)
788 {
789 	ushort csum;
790 	int     odd;
791 	ulong   result = 0;
792 	ushort  leftover;
793 	ushort *p;
794 
795 	if (len > 0) {
796 		odd = 1 & (ulong)buff;
797 		if (odd) {
798 			result = *buff << 8;
799 			len--;
800 			buff++;
801 		}
802 		while (len > 1) {
803 			p = (ushort *)buff;
804 			result += *p++;
805 			buff = (uchar *)p;
806 			if (result & 0x80000000)
807 				result = (result & 0xFFFF) + (result >> 16);
808 			len -= 2;
809 		}
810 		if (len) {
811 			leftover = (signed short)(*(const signed char *)buff);
812 			/* CISCO SUCKS big time! (and blows too):
813 			 * CDP uses the IP checksum algorithm with a twist;
814 			 * for the last byte it *sign* extends and sums.
815 			 */
816 			result = (result & 0xffff0000) | ((result + leftover) & 0x0000ffff);
817 		}
818 		while (result >> 16)
819 			result = (result & 0xFFFF) + (result >> 16);
820 
821 		if (odd)
822 			result = ((result >> 8) & 0xff) | ((result & 0xff) << 8);
823 	}
824 
825 	/* add up 16-bit and 17-bit words for 17+c bits */
826 	result = (result & 0xffff) + (result >> 16);
827 	/* add up 16-bit and 2-bit for 16+c bit */
828 	result = (result & 0xffff) + (result >> 16);
829 	/* add up carry.. */
830 	result = (result & 0xffff) + (result >> 16);
831 
832 	/* negate */
833 	csum = ~(ushort)result;
834 
835 	/* run time endian detection */
836 	if (csum != htons(csum))	/* little endian */
837 		csum = htons(csum);
838 
839 	return csum;
840 }
841 
842 int CDPSendTrigger(void)
843 {
844 	volatile uchar *pkt;
845 	volatile ushort *s;
846 	volatile ushort *cp;
847 	Ethernet_t *et;
848 	int len;
849 	ushort chksum;
850 #if defined(CONFIG_CDP_DEVICE_ID) || defined(CONFIG_CDP_PORT_ID)   || \
851     defined(CONFIG_CDP_VERSION)   || defined(CONFIG_CDP_PLATFORM)
852 	char buf[32];
853 #endif
854 
855 	pkt = NetTxPacket;
856 	et = (Ethernet_t *)pkt;
857 
858 	/* NOTE: trigger sent not on any VLAN */
859 
860 	/* form ethernet header */
861 	memcpy(et->et_dest, NetCDPAddr, 6);
862 	memcpy(et->et_src, NetOurEther, 6);
863 
864 	pkt += ETHER_HDR_SIZE;
865 
866 	/* SNAP header */
867 	memcpy((uchar *)pkt, CDP_SNAP_hdr, sizeof(CDP_SNAP_hdr));
868 	pkt += sizeof(CDP_SNAP_hdr);
869 
870 	/* CDP header */
871 	*pkt++ = 0x02;				/* CDP version 2 */
872 	*pkt++ = 180;				/* TTL */
873 	s = (volatile ushort *)pkt;
874 	cp = s;
875 	*s++ = htons(0);			/* checksum (0 for later calculation) */
876 
877 	/* CDP fields */
878 #ifdef CONFIG_CDP_DEVICE_ID
879 	*s++ = htons(CDP_DEVICE_ID_TLV);
880 	*s++ = htons(CONFIG_CDP_DEVICE_ID);
881 	sprintf(buf, CONFIG_CDP_DEVICE_ID_PREFIX "%pm", NetOurEther);
882 	memcpy((uchar *)s, buf, 16);
883 	s += 16 / 2;
884 #endif
885 
886 #ifdef CONFIG_CDP_PORT_ID
887 	*s++ = htons(CDP_PORT_ID_TLV);
888 	memset(buf, 0, sizeof(buf));
889 	sprintf(buf, CONFIG_CDP_PORT_ID, eth_get_dev_index());
890 	len = strlen(buf);
891 	if (len & 1)	/* make it even */
892 		len++;
893 	*s++ = htons(len + 4);
894 	memcpy((uchar *)s, buf, len);
895 	s += len / 2;
896 #endif
897 
898 #ifdef CONFIG_CDP_CAPABILITIES
899 	*s++ = htons(CDP_CAPABILITIES_TLV);
900 	*s++ = htons(8);
901 	*(ulong *)s = htonl(CONFIG_CDP_CAPABILITIES);
902 	s += 2;
903 #endif
904 
905 #ifdef CONFIG_CDP_VERSION
906 	*s++ = htons(CDP_VERSION_TLV);
907 	memset(buf, 0, sizeof(buf));
908 	strcpy(buf, CONFIG_CDP_VERSION);
909 	len = strlen(buf);
910 	if (len & 1)	/* make it even */
911 		len++;
912 	*s++ = htons(len + 4);
913 	memcpy((uchar *)s, buf, len);
914 	s += len / 2;
915 #endif
916 
917 #ifdef CONFIG_CDP_PLATFORM
918 	*s++ = htons(CDP_PLATFORM_TLV);
919 	memset(buf, 0, sizeof(buf));
920 	strcpy(buf, CONFIG_CDP_PLATFORM);
921 	len = strlen(buf);
922 	if (len & 1)	/* make it even */
923 		len++;
924 	*s++ = htons(len + 4);
925 	memcpy((uchar *)s, buf, len);
926 	s += len / 2;
927 #endif
928 
929 #ifdef CONFIG_CDP_TRIGGER
930 	*s++ = htons(CDP_TRIGGER_TLV);
931 	*s++ = htons(8);
932 	*(ulong *)s = htonl(CONFIG_CDP_TRIGGER);
933 	s += 2;
934 #endif
935 
936 #ifdef CONFIG_CDP_POWER_CONSUMPTION
937 	*s++ = htons(CDP_POWER_CONSUMPTION_TLV);
938 	*s++ = htons(6);
939 	*s++ = htons(CONFIG_CDP_POWER_CONSUMPTION);
940 #endif
941 
942 	/* length of ethernet packet */
943 	len = (uchar *)s - ((uchar *)NetTxPacket + ETHER_HDR_SIZE);
944 	et->et_protlen = htons(len);
945 
946 	len = ETHER_HDR_SIZE + sizeof(CDP_SNAP_hdr);
947 	chksum = CDP_compute_csum((uchar *)NetTxPacket + len, (uchar *)s - (NetTxPacket + len));
948 	if (chksum == 0)
949 		chksum = 0xFFFF;
950 	*cp = htons(chksum);
951 
952 	(void) eth_send(NetTxPacket, (uchar *)s - NetTxPacket);
953 	return 0;
954 }
955 
956 static void
957 CDPTimeout (void)
958 {
959 	CDPSeq++;
960 
961 	if (CDPSeq < 3) {
962 		NetSetTimeout (CDP_TIMEOUT, CDPTimeout);
963 		CDPSendTrigger();
964 		return;
965 	}
966 
967 	/* if not OK try again */
968 	if (!CDPOK)
969 		NetStartAgain();
970 	else
971 		NetState = NETLOOP_SUCCESS;
972 }
973 
974 static void
975 CDPDummyHandler (uchar * pkt, unsigned dest, unsigned src, unsigned len)
976 {
977 	/* nothing */
978 }
979 
980 static void
981 CDPHandler(const uchar * pkt, unsigned len)
982 {
983 	const uchar *t;
984 	const ushort *ss;
985 	ushort type, tlen;
986 	uchar applid;
987 	ushort vlan, nvlan;
988 
989 	/* minimum size? */
990 	if (len < sizeof(CDP_SNAP_hdr) + 4)
991 		goto pkt_short;
992 
993 	/* check for valid CDP SNAP header */
994 	if (memcmp(pkt, CDP_SNAP_hdr, sizeof(CDP_SNAP_hdr)) != 0)
995 		return;
996 
997 	pkt += sizeof(CDP_SNAP_hdr);
998 	len -= sizeof(CDP_SNAP_hdr);
999 
1000 	/* Version of CDP protocol must be >= 2 and TTL != 0 */
1001 	if (pkt[0] < 0x02 || pkt[1] == 0)
1002 		return;
1003 
1004 	/* if version is greater than 0x02 maybe we'll have a problem; output a warning */
1005 	if (pkt[0] != 0x02)
1006 		printf("** WARNING: CDP packet received with a protocol version %d > 2\n",
1007 				pkt[0] & 0xff);
1008 
1009 	if (CDP_compute_csum(pkt, len) != 0)
1010 		return;
1011 
1012 	pkt += 4;
1013 	len -= 4;
1014 
1015 	vlan = htons(-1);
1016 	nvlan = htons(-1);
1017 	while (len > 0) {
1018 		if (len < 4)
1019 			goto pkt_short;
1020 
1021 		ss = (const ushort *)pkt;
1022 		type = ntohs(ss[0]);
1023 		tlen = ntohs(ss[1]);
1024 		if (tlen > len) {
1025 			goto pkt_short;
1026 		}
1027 
1028 		pkt += tlen;
1029 		len -= tlen;
1030 
1031 		ss += 2;	/* point ss to the data of the TLV */
1032 		tlen -= 4;
1033 
1034 		switch (type) {
1035 			case CDP_DEVICE_ID_TLV:
1036 				break;
1037 			case CDP_ADDRESS_TLV:
1038 				break;
1039 			case CDP_PORT_ID_TLV:
1040 				break;
1041 			case CDP_CAPABILITIES_TLV:
1042 				break;
1043 			case CDP_VERSION_TLV:
1044 				break;
1045 			case CDP_PLATFORM_TLV:
1046 				break;
1047 			case CDP_NATIVE_VLAN_TLV:
1048 				nvlan = *ss;
1049 				break;
1050 			case CDP_APPLIANCE_VLAN_TLV:
1051 				t = (const uchar *)ss;
1052 				while (tlen > 0) {
1053 					if (tlen < 3)
1054 						goto pkt_short;
1055 
1056 					applid = t[0];
1057 					ss = (const ushort *)(t + 1);
1058 
1059 #ifdef CONFIG_CDP_APPLIANCE_VLAN_TYPE
1060 					if (applid == CONFIG_CDP_APPLIANCE_VLAN_TYPE)
1061 						vlan = *ss;
1062 #else
1063 					vlan = ntohs(*ss);	/* XXX will this work; dunno */
1064 #endif
1065 					t += 3; tlen -= 3;
1066 				}
1067 				break;
1068 			case CDP_TRIGGER_TLV:
1069 				break;
1070 			case CDP_POWER_CONSUMPTION_TLV:
1071 				break;
1072 			case CDP_SYSNAME_TLV:
1073 				break;
1074 			case CDP_SYSOBJECT_TLV:
1075 				break;
1076 			case CDP_MANAGEMENT_ADDRESS_TLV:
1077 				break;
1078 		}
1079 	}
1080 
1081 	CDPApplianceVLAN = vlan;
1082 	CDPNativeVLAN = nvlan;
1083 
1084 	CDPOK = 1;
1085 	return;
1086 
1087  pkt_short:
1088 	printf("** CDP packet is too short\n");
1089 	return;
1090 }
1091 
1092 static void CDPStart(void)
1093 {
1094 #if defined(CONFIG_NET_MULTI)
1095 	printf ("Using %s device\n", eth_get_name());
1096 #endif
1097 	CDPSeq = 0;
1098 	CDPOK = 0;
1099 
1100 	CDPNativeVLAN = htons(-1);
1101 	CDPApplianceVLAN = htons(-1);
1102 
1103 	NetSetTimeout (CDP_TIMEOUT, CDPTimeout);
1104 	NetSetHandler (CDPDummyHandler);
1105 
1106 	CDPSendTrigger();
1107 }
1108 #endif
1109 
1110 #ifdef CONFIG_IP_DEFRAG
1111 /*
1112  * This function collects fragments in a single packet, according
1113  * to the algorithm in RFC815. It returns NULL or the pointer to
1114  * a complete packet, in static storage
1115  */
1116 #ifndef CONFIG_NET_MAXDEFRAG
1117 #define CONFIG_NET_MAXDEFRAG 16384
1118 #endif
1119 /*
1120  * MAXDEFRAG, above, is chosen in the config file and  is real data
1121  * so we need to add the NFS overhead, which is more than TFTP.
1122  * To use sizeof in the internal unnamed structures, we need a real
1123  * instance (can't do "sizeof(struct rpc_t.u.reply))", unfortunately).
1124  * The compiler doesn't complain nor allocates the actual structure
1125  */
1126 static struct rpc_t rpc_specimen;
1127 #define IP_PKTSIZE (CONFIG_NET_MAXDEFRAG + sizeof(rpc_specimen.u.reply))
1128 
1129 #define IP_MAXUDP (IP_PKTSIZE - IP_HDR_SIZE_NO_UDP)
1130 
1131 /*
1132  * this is the packet being assembled, either data or frag control.
1133  * Fragments go by 8 bytes, so this union must be 8 bytes long
1134  */
1135 struct hole {
1136 	/* first_byte is address of this structure */
1137 	u16 last_byte;	/* last byte in this hole + 1 (begin of next hole) */
1138 	u16 next_hole;	/* index of next (in 8-b blocks), 0 == none */
1139 	u16 prev_hole;	/* index of prev, 0 == none */
1140 	u16 unused;
1141 };
1142 
1143 static IP_t *__NetDefragment(IP_t *ip, int *lenp)
1144 {
1145 	static uchar pkt_buff[IP_PKTSIZE] __attribute__((aligned(PKTALIGN)));
1146 	static u16 first_hole, total_len;
1147 	struct hole *payload, *thisfrag, *h, *newh;
1148 	IP_t *localip = (IP_t *)pkt_buff;
1149 	uchar *indata = (uchar *)ip;
1150 	int offset8, start, len, done = 0;
1151 	u16 ip_off = ntohs(ip->ip_off);
1152 
1153 	/* payload starts after IP header, this fragment is in there */
1154 	payload = (struct hole *)(pkt_buff + IP_HDR_SIZE_NO_UDP);
1155 	offset8 =  (ip_off & IP_OFFS);
1156 	thisfrag = payload + offset8;
1157 	start = offset8 * 8;
1158 	len = ntohs(ip->ip_len) - IP_HDR_SIZE_NO_UDP;
1159 
1160 	if (start + len > IP_MAXUDP) /* fragment extends too far */
1161 		return NULL;
1162 
1163 	if (!total_len || localip->ip_id != ip->ip_id) {
1164 		/* new (or different) packet, reset structs */
1165 		total_len = 0xffff;
1166 		payload[0].last_byte = ~0;
1167 		payload[0].next_hole = 0;
1168 		payload[0].prev_hole = 0;
1169 		first_hole = 0;
1170 		/* any IP header will work, copy the first we received */
1171 		memcpy(localip, ip, IP_HDR_SIZE_NO_UDP);
1172 	}
1173 
1174 	/*
1175 	 * What follows is the reassembly algorithm. We use the payload
1176 	 * array as a linked list of hole descriptors, as each hole starts
1177 	 * at a multiple of 8 bytes. However, last byte can be whatever value,
1178 	 * so it is represented as byte count, not as 8-byte blocks.
1179 	 */
1180 
1181 	h = payload + first_hole;
1182 	while (h->last_byte < start) {
1183 		if (!h->next_hole) {
1184 			/* no hole that far away */
1185 			return NULL;
1186 		}
1187 		h = payload + h->next_hole;
1188 	}
1189 
1190 	if (offset8 + (len / 8) <= h - payload) {
1191 		/* no overlap with holes (dup fragment?) */
1192 		return NULL;
1193 	}
1194 
1195 	if (!(ip_off & IP_FLAGS_MFRAG)) {
1196 		/* no more fragmentss: truncate this (last) hole */
1197 		total_len = start + len;
1198 		h->last_byte = start + len;
1199 	}
1200 
1201 	/*
1202 	 * There is some overlap: fix the hole list. This code doesn't
1203 	 * deal with a fragment that overlaps with two different holes
1204 	 * (thus being a superset of a previously-received fragment).
1205 	 */
1206 
1207 	if ( (h >= thisfrag) && (h->last_byte <= start + len) ) {
1208 		/* complete overlap with hole: remove hole */
1209 		if (!h->prev_hole && !h->next_hole) {
1210 			/* last remaining hole */
1211 			done = 1;
1212 		} else if (!h->prev_hole) {
1213 			/* first hole */
1214 			first_hole = h->next_hole;
1215 			payload[h->next_hole].prev_hole = 0;
1216 		} else if (!h->next_hole) {
1217 			/* last hole */
1218 			payload[h->prev_hole].next_hole = 0;
1219 		} else {
1220 			/* in the middle of the list */
1221 			payload[h->next_hole].prev_hole = h->prev_hole;
1222 			payload[h->prev_hole].next_hole = h->next_hole;
1223 		}
1224 
1225 	} else if (h->last_byte <= start + len) {
1226 		/* overlaps with final part of the hole: shorten this hole */
1227 		h->last_byte = start;
1228 
1229 	} else if (h >= thisfrag) {
1230 		/* overlaps with initial part of the hole: move this hole */
1231 		newh = thisfrag + (len / 8);
1232 		*newh = *h;
1233 		h = newh;
1234 		if (h->next_hole)
1235 			payload[h->next_hole].prev_hole = (h - payload);
1236 		if (h->prev_hole)
1237 			payload[h->prev_hole].next_hole = (h - payload);
1238 		else
1239 			first_hole = (h - payload);
1240 
1241 	} else {
1242 		/* fragment sits in the middle: split the hole */
1243 		newh = thisfrag + (len / 8);
1244 		*newh = *h;
1245 		h->last_byte = start;
1246 		h->next_hole = (newh - payload);
1247 		newh->prev_hole = (h - payload);
1248 		if (newh->next_hole)
1249 			payload[newh->next_hole].prev_hole = (newh - payload);
1250 	}
1251 
1252 	/* finally copy this fragment and possibly return whole packet */
1253 	memcpy((uchar *)thisfrag, indata + IP_HDR_SIZE_NO_UDP, len);
1254 	if (!done)
1255 		return NULL;
1256 
1257 	localip->ip_len = htons(total_len);
1258 	*lenp = total_len + IP_HDR_SIZE_NO_UDP;
1259 	return localip;
1260 }
1261 
1262 static inline IP_t *NetDefragment(IP_t *ip, int *lenp)
1263 {
1264 	u16 ip_off = ntohs(ip->ip_off);
1265 	if (!(ip_off & (IP_OFFS | IP_FLAGS_MFRAG)))
1266 		return ip; /* not a fragment */
1267 	return __NetDefragment(ip, lenp);
1268 }
1269 
1270 #else /* !CONFIG_IP_DEFRAG */
1271 
1272 static inline IP_t *NetDefragment(IP_t *ip, int *lenp)
1273 {
1274 	u16 ip_off = ntohs(ip->ip_off);
1275 	if (!(ip_off & (IP_OFFS | IP_FLAGS_MFRAG)))
1276 		return ip; /* not a fragment */
1277 	return NULL;
1278 }
1279 #endif
1280 
1281 void
1282 NetReceive(volatile uchar * inpkt, int len)
1283 {
1284 	Ethernet_t *et;
1285 	IP_t	*ip;
1286 	ARP_t	*arp;
1287 	IPaddr_t tmp;
1288 	int	x;
1289 	uchar *pkt;
1290 #if defined(CONFIG_CMD_CDP)
1291 	int iscdp;
1292 #endif
1293 	ushort cti = 0, vlanid = VLAN_NONE, myvlanid, mynvlanid;
1294 
1295 	debug("packet received\n");
1296 
1297 	NetRxPacket = inpkt;
1298 	NetRxPacketLen = len;
1299 	et = (Ethernet_t *)inpkt;
1300 
1301 	/* too small packet? */
1302 	if (len < ETHER_HDR_SIZE)
1303 		return;
1304 
1305 #ifdef CONFIG_API
1306 	if (push_packet) {
1307 		(*push_packet)(inpkt, len);
1308 		return;
1309 	}
1310 #endif
1311 
1312 #if defined(CONFIG_CMD_CDP)
1313 	/* keep track if packet is CDP */
1314 	iscdp = memcmp(et->et_dest, NetCDPAddr, 6) == 0;
1315 #endif
1316 
1317 	myvlanid = ntohs(NetOurVLAN);
1318 	if (myvlanid == (ushort)-1)
1319 		myvlanid = VLAN_NONE;
1320 	mynvlanid = ntohs(NetOurNativeVLAN);
1321 	if (mynvlanid == (ushort)-1)
1322 		mynvlanid = VLAN_NONE;
1323 
1324 	x = ntohs(et->et_protlen);
1325 
1326 	debug("packet received\n");
1327 
1328 	if (x < 1514) {
1329 		/*
1330 		 *	Got a 802 packet.  Check the other protocol field.
1331 		 */
1332 		x = ntohs(et->et_prot);
1333 
1334 		ip = (IP_t *)(inpkt + E802_HDR_SIZE);
1335 		len -= E802_HDR_SIZE;
1336 
1337 	} else if (x != PROT_VLAN) {	/* normal packet */
1338 		ip = (IP_t *)(inpkt + ETHER_HDR_SIZE);
1339 		len -= ETHER_HDR_SIZE;
1340 
1341 	} else {			/* VLAN packet */
1342 		VLAN_Ethernet_t *vet = (VLAN_Ethernet_t *)et;
1343 
1344 		debug("VLAN packet received\n");
1345 
1346 		/* too small packet? */
1347 		if (len < VLAN_ETHER_HDR_SIZE)
1348 			return;
1349 
1350 		/* if no VLAN active */
1351 		if ((ntohs(NetOurVLAN) & VLAN_IDMASK) == VLAN_NONE
1352 #if defined(CONFIG_CMD_CDP)
1353 				&& iscdp == 0
1354 #endif
1355 				)
1356 			return;
1357 
1358 		cti = ntohs(vet->vet_tag);
1359 		vlanid = cti & VLAN_IDMASK;
1360 		x = ntohs(vet->vet_type);
1361 
1362 		ip = (IP_t *)(inpkt + VLAN_ETHER_HDR_SIZE);
1363 		len -= VLAN_ETHER_HDR_SIZE;
1364 	}
1365 
1366 	debug("Receive from protocol 0x%x\n", x);
1367 
1368 #if defined(CONFIG_CMD_CDP)
1369 	if (iscdp) {
1370 		CDPHandler((uchar *)ip, len);
1371 		return;
1372 	}
1373 #endif
1374 
1375 	if ((myvlanid & VLAN_IDMASK) != VLAN_NONE) {
1376 		if (vlanid == VLAN_NONE)
1377 			vlanid = (mynvlanid & VLAN_IDMASK);
1378 		/* not matched? */
1379 		if (vlanid != (myvlanid & VLAN_IDMASK))
1380 			return;
1381 	}
1382 
1383 	switch (x) {
1384 
1385 	case PROT_ARP:
1386 		/*
1387 		 * We have to deal with two types of ARP packets:
1388 		 * - REQUEST packets will be answered by sending  our
1389 		 *   IP address - if we know it.
1390 		 * - REPLY packates are expected only after we asked
1391 		 *   for the TFTP server's or the gateway's ethernet
1392 		 *   address; so if we receive such a packet, we set
1393 		 *   the server ethernet address
1394 		 */
1395 		debug("Got ARP\n");
1396 
1397 		arp = (ARP_t *)ip;
1398 		if (len < ARP_HDR_SIZE) {
1399 			printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
1400 			return;
1401 		}
1402 		if (ntohs(arp->ar_hrd) != ARP_ETHER) {
1403 			return;
1404 		}
1405 		if (ntohs(arp->ar_pro) != PROT_IP) {
1406 			return;
1407 		}
1408 		if (arp->ar_hln != 6) {
1409 			return;
1410 		}
1411 		if (arp->ar_pln != 4) {
1412 			return;
1413 		}
1414 
1415 		if (NetOurIP == 0) {
1416 			return;
1417 		}
1418 
1419 		if (NetReadIP(&arp->ar_data[16]) != NetOurIP) {
1420 			return;
1421 		}
1422 
1423 		switch (ntohs(arp->ar_op)) {
1424 		case ARPOP_REQUEST:		/* reply with our IP address	*/
1425 			debug("Got ARP REQUEST, return our IP\n");
1426 			pkt = (uchar *)et;
1427 			pkt += NetSetEther(pkt, et->et_src, PROT_ARP);
1428 			arp->ar_op = htons(ARPOP_REPLY);
1429 			memcpy   (&arp->ar_data[10], &arp->ar_data[0], 6);
1430 			NetCopyIP(&arp->ar_data[16], &arp->ar_data[6]);
1431 			memcpy   (&arp->ar_data[ 0], NetOurEther, 6);
1432 			NetCopyIP(&arp->ar_data[ 6], &NetOurIP);
1433 			(void) eth_send((uchar *)et, (pkt - (uchar *)et) + ARP_HDR_SIZE);
1434 			return;
1435 
1436 		case ARPOP_REPLY:		/* arp reply */
1437 			/* are we waiting for a reply */
1438 			if (!NetArpWaitPacketIP || !NetArpWaitPacketMAC)
1439 				break;
1440 
1441 #ifdef CONFIG_KEEP_SERVERADDR
1442 			if (NetServerIP == NetArpWaitPacketIP) {
1443 				char buf[20];
1444 				sprintf(buf, "%pM", arp->ar_data);
1445 				setenv("serveraddr", buf);
1446 			}
1447 #endif
1448 
1449 			debug("Got ARP REPLY, set server/gtwy eth addr (%pM)\n",
1450 				arp->ar_data);
1451 
1452 			tmp = NetReadIP(&arp->ar_data[6]);
1453 
1454 			/* matched waiting packet's address */
1455 			if (tmp == NetArpWaitReplyIP) {
1456 				debug("Got it\n");
1457 				/* save address for later use */
1458 				memcpy(NetArpWaitPacketMAC, &arp->ar_data[0], 6);
1459 
1460 #ifdef CONFIG_NETCONSOLE
1461 				(*packetHandler)(0,0,0,0);
1462 #endif
1463 				/* modify header, and transmit it */
1464 				memcpy(((Ethernet_t *)NetArpWaitTxPacket)->et_dest, NetArpWaitPacketMAC, 6);
1465 				(void) eth_send(NetArpWaitTxPacket, NetArpWaitTxPacketSize);
1466 
1467 				/* no arp request pending now */
1468 				NetArpWaitPacketIP = 0;
1469 				NetArpWaitTxPacketSize = 0;
1470 				NetArpWaitPacketMAC = NULL;
1471 
1472 			}
1473 			return;
1474 		default:
1475 			debug("Unexpected ARP opcode 0x%x\n", ntohs(arp->ar_op));
1476 			return;
1477 		}
1478 		break;
1479 
1480 	case PROT_RARP:
1481 		debug("Got RARP\n");
1482 		arp = (ARP_t *)ip;
1483 		if (len < ARP_HDR_SIZE) {
1484 			printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
1485 			return;
1486 		}
1487 
1488 		if ((ntohs(arp->ar_op) != RARPOP_REPLY) ||
1489 			(ntohs(arp->ar_hrd) != ARP_ETHER)   ||
1490 			(ntohs(arp->ar_pro) != PROT_IP)     ||
1491 			(arp->ar_hln != 6) || (arp->ar_pln != 4)) {
1492 
1493 			puts ("invalid RARP header\n");
1494 		} else {
1495 			NetCopyIP(&NetOurIP,    &arp->ar_data[16]);
1496 			if (NetServerIP == 0)
1497 				NetCopyIP(&NetServerIP, &arp->ar_data[ 6]);
1498 			memcpy (NetServerEther, &arp->ar_data[ 0], 6);
1499 
1500 			(*packetHandler)(0,0,0,0);
1501 		}
1502 		break;
1503 
1504 	case PROT_IP:
1505 		debug("Got IP\n");
1506 		/* Before we start poking the header, make sure it is there */
1507 		if (len < IP_HDR_SIZE) {
1508 			debug("len bad %d < %lu\n", len, (ulong)IP_HDR_SIZE);
1509 			return;
1510 		}
1511 		/* Check the packet length */
1512 		if (len < ntohs(ip->ip_len)) {
1513 			printf("len bad %d < %d\n", len, ntohs(ip->ip_len));
1514 			return;
1515 		}
1516 		len = ntohs(ip->ip_len);
1517 		debug("len=%d, v=%02x\n", len, ip->ip_hl_v & 0xff);
1518 
1519 		/* Can't deal with anything except IPv4 */
1520 		if ((ip->ip_hl_v & 0xf0) != 0x40) {
1521 			return;
1522 		}
1523 		/* Can't deal with IP options (headers != 20 bytes) */
1524 		if ((ip->ip_hl_v & 0x0f) > 0x05) {
1525 			return;
1526 		}
1527 		/* Check the Checksum of the header */
1528 		if (!NetCksumOk((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2)) {
1529 			puts ("checksum bad\n");
1530 			return;
1531 		}
1532 		/* If it is not for us, ignore it */
1533 		tmp = NetReadIP(&ip->ip_dst);
1534 		if (NetOurIP && tmp != NetOurIP && tmp != 0xFFFFFFFF) {
1535 #ifdef CONFIG_MCAST_TFTP
1536 			if (Mcast_addr != tmp)
1537 #endif
1538 			return;
1539 		}
1540 		/*
1541 		 * The function returns the unchanged packet if it's not
1542 		 * a fragment, and either the complete packet or NULL if
1543 		 * it is a fragment (if !CONFIG_IP_DEFRAG, it returns NULL)
1544 		 */
1545 		if (!(ip = NetDefragment(ip, &len)))
1546 			return;
1547 		/*
1548 		 * watch for ICMP host redirects
1549 		 *
1550 		 * There is no real handler code (yet). We just watch
1551 		 * for ICMP host redirect messages. In case anybody
1552 		 * sees these messages: please contact me
1553 		 * (wd@denx.de), or - even better - send me the
1554 		 * necessary fixes :-)
1555 		 *
1556 		 * Note: in all cases where I have seen this so far
1557 		 * it was a problem with the router configuration,
1558 		 * for instance when a router was configured in the
1559 		 * BOOTP reply, but the TFTP server was on the same
1560 		 * subnet. So this is probably a warning that your
1561 		 * configuration might be wrong. But I'm not really
1562 		 * sure if there aren't any other situations.
1563 		 */
1564 		if (ip->ip_p == IPPROTO_ICMP) {
1565 			ICMP_t *icmph = (ICMP_t *)&(ip->udp_src);
1566 
1567 			switch (icmph->type) {
1568 			case ICMP_REDIRECT:
1569 				if (icmph->code != ICMP_REDIR_HOST)
1570 					return;
1571 				printf (" ICMP Host Redirect to %pI4 ", &icmph->un.gateway);
1572 				return;
1573 #if defined(CONFIG_CMD_PING)
1574 			case ICMP_ECHO_REPLY:
1575 				/*
1576 				 *	IP header OK.  Pass the packet to the current handler.
1577 				 */
1578 				/* XXX point to ip packet */
1579 				(*packetHandler)((uchar *)ip, 0, 0, 0);
1580 				return;
1581 			case ICMP_ECHO_REQUEST:
1582 				debug("Got ICMP ECHO REQUEST, return %d bytes \n",
1583 					ETHER_HDR_SIZE + len);
1584 
1585 				memcpy (&et->et_dest[0], &et->et_src[0], 6);
1586 				memcpy (&et->et_src[ 0], NetOurEther, 6);
1587 
1588 				ip->ip_sum = 0;
1589 				ip->ip_off = 0;
1590 				NetCopyIP((void*)&ip->ip_dst, &ip->ip_src);
1591 				NetCopyIP((void*)&ip->ip_src, &NetOurIP);
1592 				ip->ip_sum = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP >> 1);
1593 
1594 				icmph->type = ICMP_ECHO_REPLY;
1595 				icmph->checksum = 0;
1596 				icmph->checksum = ~NetCksum((uchar *)icmph,
1597 						(len - IP_HDR_SIZE_NO_UDP) >> 1);
1598 				(void) eth_send((uchar *)et, ETHER_HDR_SIZE + len);
1599 				return;
1600 #endif
1601 			default:
1602 				return;
1603 			}
1604 		} else if (ip->ip_p != IPPROTO_UDP) {	/* Only UDP packets */
1605 			return;
1606 		}
1607 
1608 #ifdef CONFIG_UDP_CHECKSUM
1609 		if (ip->udp_xsum != 0) {
1610 			ulong   xsum;
1611 			ushort *sumptr;
1612 			ushort  sumlen;
1613 
1614 			xsum  = ip->ip_p;
1615 			xsum += (ntohs(ip->udp_len));
1616 			xsum += (ntohl(ip->ip_src) >> 16) & 0x0000ffff;
1617 			xsum += (ntohl(ip->ip_src) >>  0) & 0x0000ffff;
1618 			xsum += (ntohl(ip->ip_dst) >> 16) & 0x0000ffff;
1619 			xsum += (ntohl(ip->ip_dst) >>  0) & 0x0000ffff;
1620 
1621 			sumlen = ntohs(ip->udp_len);
1622 			sumptr = (ushort *) &(ip->udp_src);
1623 
1624 			while (sumlen > 1) {
1625 				ushort sumdata;
1626 
1627 				sumdata = *sumptr++;
1628 				xsum += ntohs(sumdata);
1629 				sumlen -= 2;
1630 			}
1631 			if (sumlen > 0) {
1632 				ushort sumdata;
1633 
1634 				sumdata = *(unsigned char *) sumptr;
1635 				sumdata = (sumdata << 8) & 0xff00;
1636 				xsum += sumdata;
1637 			}
1638 			while ((xsum >> 16) != 0) {
1639 				xsum = (xsum & 0x0000ffff) + ((xsum >> 16) & 0x0000ffff);
1640 			}
1641 			if ((xsum != 0x00000000) && (xsum != 0x0000ffff)) {
1642 				printf(" UDP wrong checksum %08lx %08x\n",
1643 					xsum, ntohs(ip->udp_xsum));
1644 				return;
1645 			}
1646 		}
1647 #endif
1648 
1649 
1650 #ifdef CONFIG_NETCONSOLE
1651 		nc_input_packet((uchar *)ip +IP_HDR_SIZE,
1652 						ntohs(ip->udp_dst),
1653 						ntohs(ip->udp_src),
1654 						ntohs(ip->udp_len) - 8);
1655 #endif
1656 		/*
1657 		 *	IP header OK.  Pass the packet to the current handler.
1658 		 */
1659 		(*packetHandler)((uchar *)ip +IP_HDR_SIZE,
1660 						ntohs(ip->udp_dst),
1661 						ntohs(ip->udp_src),
1662 						ntohs(ip->udp_len) - 8);
1663 		break;
1664 	}
1665 }
1666 
1667 
1668 /**********************************************************************/
1669 
1670 static int net_check_prereq (proto_t protocol)
1671 {
1672 	switch (protocol) {
1673 		/* Fall through */
1674 #if defined(CONFIG_CMD_PING)
1675 	case PING:
1676 		if (NetPingIP == 0) {
1677 			puts ("*** ERROR: ping address not given\n");
1678 			return (1);
1679 		}
1680 		goto common;
1681 #endif
1682 #if defined(CONFIG_CMD_SNTP)
1683 	case SNTP:
1684 		if (NetNtpServerIP == 0) {
1685 			puts ("*** ERROR: NTP server address not given\n");
1686 			return (1);
1687 		}
1688 		goto common;
1689 #endif
1690 #if defined(CONFIG_CMD_DNS)
1691 	case DNS:
1692 		if (NetOurDNSIP == 0) {
1693 			puts("*** ERROR: DNS server address not given\n");
1694 			return 1;
1695 		}
1696 		goto common;
1697 #endif
1698 #if defined(CONFIG_CMD_NFS)
1699 	case NFS:
1700 #endif
1701 	case NETCONS:
1702 	case TFTP:
1703 		if (NetServerIP == 0) {
1704 			puts ("*** ERROR: `serverip' not set\n");
1705 			return (1);
1706 		}
1707 #if defined(CONFIG_CMD_PING) || defined(CONFIG_CMD_SNTP)
1708     common:
1709 #endif
1710 
1711 		if (NetOurIP == 0) {
1712 			puts ("*** ERROR: `ipaddr' not set\n");
1713 			return (1);
1714 		}
1715 		/* Fall through */
1716 
1717 	case DHCP:
1718 	case RARP:
1719 	case BOOTP:
1720 	case CDP:
1721 		if (memcmp (NetOurEther, "\0\0\0\0\0\0", 6) == 0) {
1722 #ifdef CONFIG_NET_MULTI
1723 			extern int eth_get_dev_index (void);
1724 			int num = eth_get_dev_index ();
1725 
1726 			switch (num) {
1727 			case -1:
1728 				puts ("*** ERROR: No ethernet found.\n");
1729 				return (1);
1730 			case 0:
1731 				puts ("*** ERROR: `ethaddr' not set\n");
1732 				break;
1733 			default:
1734 				printf ("*** ERROR: `eth%daddr' not set\n",
1735 					num);
1736 				break;
1737 			}
1738 
1739 			NetStartAgain ();
1740 			return (2);
1741 #else
1742 			puts ("*** ERROR: `ethaddr' not set\n");
1743 			return (1);
1744 #endif
1745 		}
1746 		/* Fall through */
1747 	default:
1748 		return (0);
1749 	}
1750 	return (0);		/* OK */
1751 }
1752 /**********************************************************************/
1753 
1754 int
1755 NetCksumOk(uchar * ptr, int len)
1756 {
1757 	return !((NetCksum(ptr, len) + 1) & 0xfffe);
1758 }
1759 
1760 
1761 unsigned
1762 NetCksum(uchar * ptr, int len)
1763 {
1764 	ulong	xsum;
1765 	ushort *p = (ushort *)ptr;
1766 
1767 	xsum = 0;
1768 	while (len-- > 0)
1769 		xsum += *p++;
1770 	xsum = (xsum & 0xffff) + (xsum >> 16);
1771 	xsum = (xsum & 0xffff) + (xsum >> 16);
1772 	return (xsum & 0xffff);
1773 }
1774 
1775 int
1776 NetEthHdrSize(void)
1777 {
1778 	ushort myvlanid;
1779 
1780 	myvlanid = ntohs(NetOurVLAN);
1781 	if (myvlanid == (ushort)-1)
1782 		myvlanid = VLAN_NONE;
1783 
1784 	return ((myvlanid & VLAN_IDMASK) == VLAN_NONE) ? ETHER_HDR_SIZE : VLAN_ETHER_HDR_SIZE;
1785 }
1786 
1787 int
1788 NetSetEther(volatile uchar * xet, uchar * addr, uint prot)
1789 {
1790 	Ethernet_t *et = (Ethernet_t *)xet;
1791 	ushort myvlanid;
1792 
1793 	myvlanid = ntohs(NetOurVLAN);
1794 	if (myvlanid == (ushort)-1)
1795 		myvlanid = VLAN_NONE;
1796 
1797 	memcpy (et->et_dest, addr, 6);
1798 	memcpy (et->et_src, NetOurEther, 6);
1799 	if ((myvlanid & VLAN_IDMASK) == VLAN_NONE) {
1800 	et->et_protlen = htons(prot);
1801 		return ETHER_HDR_SIZE;
1802 	} else {
1803 		VLAN_Ethernet_t *vet = (VLAN_Ethernet_t *)xet;
1804 
1805 		vet->vet_vlan_type = htons(PROT_VLAN);
1806 		vet->vet_tag = htons((0 << 5) | (myvlanid & VLAN_IDMASK));
1807 		vet->vet_type = htons(prot);
1808 		return VLAN_ETHER_HDR_SIZE;
1809 	}
1810 }
1811 
1812 void
1813 NetSetIP(volatile uchar * xip, IPaddr_t dest, int dport, int sport, int len)
1814 {
1815 	IP_t *ip = (IP_t *)xip;
1816 
1817 	/*
1818 	 *	If the data is an odd number of bytes, zero the
1819 	 *	byte after the last byte so that the checksum
1820 	 *	will work.
1821 	 */
1822 	if (len & 1)
1823 		xip[IP_HDR_SIZE + len] = 0;
1824 
1825 	/*
1826 	 *	Construct an IP and UDP header.
1827 	 *	(need to set no fragment bit - XXX)
1828 	 */
1829 	ip->ip_hl_v  = 0x45;		/* IP_HDR_SIZE / 4 (not including UDP) */
1830 	ip->ip_tos   = 0;
1831 	ip->ip_len   = htons(IP_HDR_SIZE + len);
1832 	ip->ip_id    = htons(NetIPID++);
1833 	ip->ip_off   = htons(IP_FLAGS_DFRAG);	/* Don't fragment */
1834 	ip->ip_ttl   = 255;
1835 	ip->ip_p     = 17;		/* UDP */
1836 	ip->ip_sum   = 0;
1837 	NetCopyIP((void*)&ip->ip_src, &NetOurIP); /* already in network byte order */
1838 	NetCopyIP((void*)&ip->ip_dst, &dest);	   /* - "" - */
1839 	ip->udp_src  = htons(sport);
1840 	ip->udp_dst  = htons(dport);
1841 	ip->udp_len  = htons(8 + len);
1842 	ip->udp_xsum = 0;
1843 	ip->ip_sum   = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2);
1844 }
1845 
1846 void copy_filename (char *dst, char *src, int size)
1847 {
1848 	if (*src && (*src == '"')) {
1849 		++src;
1850 		--size;
1851 	}
1852 
1853 	while ((--size > 0) && *src && (*src != '"')) {
1854 		*dst++ = *src++;
1855 	}
1856 	*dst = '\0';
1857 }
1858 
1859 #endif
1860 
1861 #if defined(CONFIG_CMD_NFS) || defined(CONFIG_CMD_SNTP) || defined(CONFIG_CMD_DNS)
1862 /*
1863  * make port a little random, but use something trivial to compute
1864  */
1865 unsigned int random_port(void)
1866 {
1867 	return 1024 + (get_timer(0) % 0x8000);;
1868 }
1869 #endif
1870 
1871 void ip_to_string (IPaddr_t x, char *s)
1872 {
1873 	x = ntohl (x);
1874 	sprintf (s, "%d.%d.%d.%d",
1875 		 (int) ((x >> 24) & 0xff),
1876 		 (int) ((x >> 16) & 0xff),
1877 		 (int) ((x >> 8) & 0xff), (int) ((x >> 0) & 0xff)
1878 	);
1879 }
1880 
1881 IPaddr_t string_to_ip(char *s)
1882 {
1883 	IPaddr_t addr;
1884 	char *e;
1885 	int i;
1886 
1887 	if (s == NULL)
1888 		return(0);
1889 
1890 	for (addr=0, i=0; i<4; ++i) {
1891 		ulong val = s ? simple_strtoul(s, &e, 10) : 0;
1892 		addr <<= 8;
1893 		addr |= (val & 0xFF);
1894 		if (s) {
1895 			s = (*e) ? e+1 : e;
1896 		}
1897 	}
1898 
1899 	return (htonl(addr));
1900 }
1901 
1902 void VLAN_to_string(ushort x, char *s)
1903 {
1904 	x = ntohs(x);
1905 
1906 	if (x == (ushort)-1)
1907 		x = VLAN_NONE;
1908 
1909 	if (x == VLAN_NONE)
1910 		strcpy(s, "none");
1911 	else
1912 		sprintf(s, "%d", x & VLAN_IDMASK);
1913 }
1914 
1915 ushort string_to_VLAN(char *s)
1916 {
1917 	ushort id;
1918 
1919 	if (s == NULL)
1920 		return htons(VLAN_NONE);
1921 
1922 	if (*s < '0' || *s > '9')
1923 		id = VLAN_NONE;
1924 	else
1925 		id = (ushort)simple_strtoul(s, NULL, 10);
1926 
1927 	return htons(id);
1928 }
1929 
1930 IPaddr_t getenv_IPaddr (char *var)
1931 {
1932 	return (string_to_ip(getenv(var)));
1933 }
1934 
1935 ushort getenv_VLAN(char *var)
1936 {
1937 	return (string_to_VLAN(getenv(var)));
1938 }
1939