9
0
Fork 0
barebox/net/net.c

1499 lines
33 KiB
C
Raw Normal View History

2002-10-31 22:12:35 +00:00
/*
* Copied from Linux Monitor (LiMon) - Networking.
*
* Copyright 1994 - 2000 Neil Russell.
* (See License)
* Copyright 2000 Roland Borde
* Copyright 2000 Paolo Scaffardi
* Copyright 2000-2002 Wolfgang Denk, wd@denx.de
*/
/*
* General Desription:
*
* The user interface supports commands for BOOTP, RARP, and TFTP.
* Also, we support ARP internally. Depending on available data,
* these interact as follows:
*
* BOOTP:
*
* Prerequisites: - own ethernet address
* We want: - own IP address
* - TFTP server IP address
* - name of bootfile
* Next step: ARP
*
* RARP:
*
* Prerequisites: - own ethernet address
* We want: - own IP address
* - TFTP server IP address
* Next step: ARP
*
* ARP:
*
* Prerequisites: - own ethernet address
* - own IP address
* - TFTP server IP address
* We want: - TFTP server ethernet address
* Next step: TFTP
*
* DHCP:
*
2005-08-12 21:43:12 +00:00
* Prerequisites: - own ethernet address
* We want: - IP, Netmask, ServerIP, Gateway IP
* - bootfilename, lease time
* Next step: - TFTP
2002-10-31 22:12:35 +00:00
*
* TFTP:
*
* Prerequisites: - own ethernet address
* - own IP address
* - TFTP server IP address
* - TFTP server ethernet address
* - name of bootfile (if unknown, we use a default name
* derived from our own IP address)
* We want: - load the boot file
* Next step: none
*
* NFS:
*
* Prerequisites: - own ethernet address
* - own IP address
* - name of bootfile (if unknown, we use a default name
* derived from our own IP address)
* We want: - load the boot file
* Next step: none
*
2002-10-31 22:12:35 +00:00
*/
#include <common.h>
2007-07-05 16:01:15 +00:00
#include <clock.h>
2002-10-31 22:12:35 +00:00
#include <watchdog.h>
#include <command.h>
#include <environment.h>
2007-07-05 16:01:39 +00:00
#include <param.h>
2002-10-31 22:12:35 +00:00
#include <net.h>
#include <driver.h>
#include <errno.h>
#include <init.h>
#include <linux/ctype.h>
#include <linux/err.h>
2002-10-31 22:12:35 +00:00
#include "tftp.h"
#include "rarp.h"
#include "nfs.h"
2002-10-31 22:12:35 +00:00
2007-07-05 16:01:15 +00:00
#define ARP_TIMEOUT (5 * SECOND) /* Seconds before trying ARP again */
#ifndef CONFIG_NET_RETRY_COUNT
# define ARP_TIMEOUT_COUNT 5 /* # of timeouts before giving up */
#else
# define ARP_TIMEOUT_COUNT (CONFIG_NET_RETRY_COUNT)
#endif
2002-10-31 22:12:35 +00:00
/** BOOTP EXTENTIONS **/
IPaddr_t NetOurSubnetMask=0; /* Our subnet mask (0=unknown) */
IPaddr_t NetOurGatewayIP=0; /* Our gateways IP address */
IPaddr_t NetOurDNSIP=0; /* Our DNS IP address */
#ifdef CONFIG_BOOTP_DNS2
IPaddr_t NetOurDNS2IP=0; /* Our 2nd DNS IP address */
#endif
2002-10-31 22:12:35 +00:00
char NetOurNISDomain[32]={0,}; /* Our NIS domain */
char NetOurHostName[32]={0,}; /* Our hostname */
char NetOurRootPath[64]={0,}; /* Our bootpath */
/** END OF BOOTP EXTENTIONS **/
ulong NetBootFileXferSize; /* The actual transferred size of the bootfile (in bytes) */
uchar NetOurEther[6]; /* Our ethernet address */
uchar NetServerEther[6] = /* Boot server enet address */
{ 0, 0, 0, 0, 0, 0 };
2002-10-31 22:12:35 +00:00
IPaddr_t NetOurIP; /* Our IP addr (0 = unknown) */
IPaddr_t NetServerIP; /* Our IP addr (0 = unknown) */
uchar *NetRxPkt; /* Current receive packet */
2002-10-31 22:12:35 +00:00
int NetRxPktLen; /* Current rx packet length */
unsigned NetIPID; /* IP packet ID */
uchar NetBcastAddr[6] = /* Ethernet bcast address */
{ 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
uchar NetEtherNullAddr[6] =
{ 0, 0, 0, 0, 0, 0 };
2002-10-31 22:12:35 +00:00
int NetState; /* Network loop state */
/* XXX in both little & big endian machines 0xFFFF == ntohs(-1) */
ushort NetOurVLAN = 0xFFFF; /* default is without VLAN */
ushort NetOurNativeVLAN = 0xFFFF; /* ditto */
2002-10-31 22:12:35 +00:00
char BootFile[128]; /* Boot File name */
uchar PktBuf[(PKTBUFSRX+1) * PKTSIZE_ALIGN + PKTALIGN];
2002-10-31 22:12:35 +00:00
uchar *NetRxPackets[PKTBUFSRX]; /* Receive packets */
2002-10-31 22:12:35 +00:00
static rxhand_f *packetHandler; /* Current RX packet handler */
static thand_f *timeHandler; /* Current timeout handler */
static uint64_t timeStart; /* Time base value */
static uint64_t timeDelta; /* Current timeout value */
uchar *NetTxPacket = 0; /* THE transmit packet */
2002-10-31 22:12:35 +00:00
static int net_check_prereq (proto_t protocol);
/**********************************************************************/
IPaddr_t NetArpWaitPacketIP;
IPaddr_t NetArpWaitReplyIP;
uchar *NetArpWaitPacketMAC; /* MAC address of waiting packet's destination */
2005-08-12 21:43:12 +00:00
uchar *NetArpWaitTxPacket; /* THE transmit packet */
int NetArpWaitTxPacketSize;
uchar NetArpWaitPacketBuf[PKTSIZE_ALIGN + PKTALIGN];
uint64_t NetArpWaitTimerStart;
void ArpRequest (void)
{
int i;
uchar *pkt;
ARP_t *arp;
pr_debug("ARP broadcast\n");
pkt = NetTxPacket;
pkt += NetSetEther (pkt, NetBcastAddr, PROT_ARP);
arp = (ARP_t *) pkt;
arp->ar_hrd = htons (ARP_ETHER);
arp->ar_pro = htons (PROT_IP);
arp->ar_hln = 6;
arp->ar_pln = 4;
arp->ar_op = htons (ARPOP_REQUEST);
2005-08-12 21:43:12 +00:00
memcpy (&arp->ar_data[0], NetOurEther, 6); /* source ET addr */
NetWriteIP ((uchar *) & arp->ar_data[6], NetOurIP); /* source IP addr */
for (i = 10; i < 16; ++i) {
arp->ar_data[i] = 0; /* dest ET addr = 0 */
}
if ((NetArpWaitPacketIP & NetOurSubnetMask) !=
(NetOurIP & NetOurSubnetMask)) {
if (NetOurGatewayIP == 0) {
puts ("## Warning: gatewayip needed but not set\n");
NetArpWaitReplyIP = NetArpWaitPacketIP;
} else {
NetArpWaitReplyIP = NetOurGatewayIP;
}
} else {
NetArpWaitReplyIP = NetArpWaitPacketIP;
}
NetWriteIP ((uchar *) & arp->ar_data[16], NetArpWaitReplyIP);
(void) eth_send (NetTxPacket, (pkt - NetTxPacket) + ARP_HDR_SIZE);
}
2002-10-31 22:12:35 +00:00
/**********************************************************************/
/*
* Main network processing loop.
*/
int NetLoopInit(proto_t protocol)
2002-10-31 22:12:35 +00:00
{
2007-07-05 16:01:34 +00:00
struct eth_device *eth_current = eth_get_current();
IPaddr_t ip;
int ret;
int i;
2002-10-31 22:12:35 +00:00
if (!eth_current) {
printf("Current ethernet device not set!\n");
return -1;
}
ip = dev_get_param_ip(&eth_current->dev, "ipaddr");
NetCopyIP(&NetOurIP, &ip);
/* XXX problem with bss workaround */
NetArpWaitPacketMAC = NULL;
NetArpWaitTxPacket = NULL;
NetArpWaitPacketIP = 0;
NetArpWaitReplyIP = 0;
/*
* Setup packet buffers, aligned correctly.
*/
NetTxPacket = &PktBuf[0] + (PKTALIGN - 1);
NetTxPacket -= (ulong)NetTxPacket % PKTALIGN;
for (i = 0; i < PKTBUFSRX; i++) {
NetRxPackets[i] = NetTxPacket + (i+1)*PKTSIZE_ALIGN;
2002-10-31 22:12:35 +00:00
}
NetArpWaitTxPacket = &NetArpWaitPacketBuf[0] + (PKTALIGN - 1);
NetArpWaitTxPacket -= (ulong)NetArpWaitTxPacket % PKTALIGN;
NetArpWaitTxPacketSize = 0;
string_to_ethaddr(dev_get_param(&eth_get_current()->dev, "ethaddr"),
NetOurEther);
2002-10-31 22:12:35 +00:00
NetState = NETLOOP_CONTINUE;
NetOurGatewayIP = dev_get_param_ip(&eth_current->dev, "gateway");
NetOurSubnetMask = dev_get_param_ip(&eth_current->dev, "netmask");
NetOurVLAN = getenv_VLAN("vlan");
NetOurNativeVLAN = getenv_VLAN("nvlan");
NetServerIP = dev_get_param_ip(&eth_current->dev, "serverip");
ret = net_check_prereq(protocol);
return ret;
}
int NetLoop(void)
{
/*
* Start the ball rolling with the given start function. From
* here on, this code is a state machine driven by received
* packets and timer events.
*/
2002-10-31 22:12:35 +00:00
NetBootFileXferSize = 0;
2002-10-31 22:12:35 +00:00
/*
* Main packet reception loop. Loop receiving packets until
2005-04-03 14:18:51 +00:00
* someone sets `NetState' to a state that terminates.
2002-10-31 22:12:35 +00:00
*/
for (;;) {
WATCHDOG_RESET();
#ifdef CONFIG_SHOW_ACTIVITY
{
extern void show_activity(int arg);
show_activity(1);
}
#endif
/*
* Check the ethernet for a new packet. The ethernet
* receive routine will process it.
*/
2008-03-21 20:25:15 +00:00
eth_rx();
2002-10-31 22:12:35 +00:00
/*
* Abort if ctrl-c was pressed.
*/
if (ctrlc()) {
puts ("\nAbort\n");
return -1;
2002-10-31 22:12:35 +00:00
}
/* check for arp timeout */
if (NetArpWaitPacketIP &&
is_timeout(NetArpWaitTimerStart, ARP_TIMEOUT)) {
NetArpWaitTimerStart = get_time_ns();
ArpRequest();
}
2002-10-31 22:12:35 +00:00
/*
* Check for a timeout, and run the timeout handler
* if we have one.
*/
if (timeHandler && is_timeout(timeStart, timeDelta)) {
2002-10-31 22:12:35 +00:00
thand_f *x;
x = timeHandler;
timeHandler = (thand_f *)0;
(*x)();
}
switch (NetState) {
case NETLOOP_SUCCESS:
if (NetBootFileXferSize > 0) {
char buf[10];
printf("Bytes transferred = %ld (%lx hex)\n",
NetBootFileXferSize,
NetBootFileXferSize);
sprintf(buf, "0x%lx", NetBootFileXferSize);
2002-10-31 22:12:35 +00:00
setenv("filesize", buf);
}
return NetBootFileXferSize;
case NETLOOP_FAIL:
return -1;
2002-10-31 22:12:35 +00:00
}
}
}
/**********************************************************************/
/*
* Miscelaneous bits.
*/
void
NetSetHandler(rxhand_f * f)
{
packetHandler = f;
}
void
2007-07-05 16:01:15 +00:00
NetSetTimeout(uint64_t iv, thand_f * f)
2002-10-31 22:12:35 +00:00
{
if (iv == 0) {
timeHandler = (thand_f *)0;
} else {
timeHandler = f;
2007-07-05 16:01:15 +00:00
timeStart = get_time_ns();
timeDelta = iv;
2002-10-31 22:12:35 +00:00
}
}
void
NetSendPacket(uchar * pkt, int len)
2002-10-31 22:12:35 +00:00
{
(void) eth_send(pkt, len);
}
int
NetSendUDPPacket(uchar *ether, IPaddr_t dest, int dport, int sport, int len)
{
uchar *pkt;
/* convert to new style broadcast */
if (dest == 0)
dest = 0xFFFFFFFF;
/* if broadcast, make the ether address a broadcast and don't do ARP */
if (dest == 0xFFFFFFFF)
ether = NetBcastAddr;
/* if MAC address was not discovered yet, save the packet and do an ARP request */
if (memcmp(ether, NetEtherNullAddr, 6) == 0) {
pr_debug("sending ARP for %08lx\n", dest);
NetArpWaitPacketIP = dest;
NetArpWaitPacketMAC = ether;
pkt = NetArpWaitTxPacket;
pkt += NetSetEther (pkt, NetArpWaitPacketMAC, PROT_IP);
NetSetIP (pkt, dest, dport, sport, len);
memcpy(pkt + IP_HDR_SIZE, (uchar *)NetTxPacket + (pkt - (uchar *)NetArpWaitTxPacket) + IP_HDR_SIZE, len);
/* size of the waiting packet */
NetArpWaitTxPacketSize = (pkt - NetArpWaitTxPacket) + IP_HDR_SIZE + len;
/* and do the ARP request */
2007-07-05 16:01:15 +00:00
NetArpWaitTimerStart = get_time_ns();
ArpRequest();
return 1; /* waiting */
}
pr_debug("sending UDP to %08lx/%02x:%02x:%02x:%02x:%02x:%02x\n",
dest, ether[0], ether[1], ether[2], ether[3], ether[4], ether[5]);
pkt = (uchar *)NetTxPacket;
pkt += NetSetEther (pkt, ether, PROT_IP);
NetSetIP (pkt, dest, dport, sport, len);
(void) eth_send(NetTxPacket, (pkt - NetTxPacket) + IP_HDR_SIZE + len);
return 0; /* transmitted */
}
2002-10-31 22:12:35 +00:00
void
NetReceive(uchar * inpkt, int len)
2002-10-31 22:12:35 +00:00
{
Ethernet_t *et;
IP_t *ip;
ARP_t *arp;
IPaddr_t tmp;
int x;
uchar *pkt;
ushort cti = 0, vlanid = VLAN_NONE, myvlanid, mynvlanid;
pr_debug("packet received\n");
2002-10-31 22:12:35 +00:00
if (!net_receive(inpkt, len))
return;
NetRxPkt = inpkt;
2002-10-31 22:12:35 +00:00
NetRxPktLen = len;
et = (Ethernet_t *)inpkt;
/* too small packet? */
if (len < ETHER_HDR_SIZE)
return;
myvlanid = ntohs(NetOurVLAN);
if (myvlanid == (ushort)-1)
myvlanid = VLAN_NONE;
mynvlanid = ntohs(NetOurNativeVLAN);
if (mynvlanid == (ushort)-1)
mynvlanid = VLAN_NONE;
2002-10-31 22:12:35 +00:00
x = ntohs(et->et_protlen);
pr_debug("packet received\n");
2002-10-31 22:12:35 +00:00
if (x < 1514) {
/*
* Got a 802 packet. Check the other protocol field.
*/
x = ntohs(et->et_prot);
ip = (IP_t *)(inpkt + E802_HDR_SIZE);
2002-10-31 22:12:35 +00:00
len -= E802_HDR_SIZE;
} else if (x != PROT_VLAN) { /* normal packet */
ip = (IP_t *)(inpkt + ETHER_HDR_SIZE);
2002-10-31 22:12:35 +00:00
len -= ETHER_HDR_SIZE;
} else { /* VLAN packet */
VLAN_Ethernet_t *vet = (VLAN_Ethernet_t *)et;
pr_debug("VLAN packet received\n");
/* too small packet? */
if (len < VLAN_ETHER_HDR_SIZE)
return;
/* if no VLAN active */
if ((ntohs(NetOurVLAN) & VLAN_IDMASK) == VLAN_NONE
)
return;
cti = ntohs(vet->vet_tag);
vlanid = cti & VLAN_IDMASK;
x = ntohs(vet->vet_type);
ip = (IP_t *)(inpkt + VLAN_ETHER_HDR_SIZE);
len -= VLAN_ETHER_HDR_SIZE;
2002-10-31 22:12:35 +00:00
}
pr_debug("Receive from protocol 0x%x\n", x);
2002-10-31 22:12:35 +00:00
if ((myvlanid & VLAN_IDMASK) != VLAN_NONE) {
if (vlanid == VLAN_NONE)
vlanid = (mynvlanid & VLAN_IDMASK);
/* not matched? */
if (vlanid != (myvlanid & VLAN_IDMASK))
return;
}
2002-10-31 22:12:35 +00:00
switch (x) {
case PROT_ARP:
/*
* We have to deal with two types of ARP packets:
* - REQUEST packets will be answered by sending our
* IP address - if we know it.
2008-03-21 20:25:15 +00:00
* - REPLY packets are expected only after we asked
* for the TFTP server's or the gateway's ethernet
* address; so if we receive such a packet, we set
* the server ethernet address
2002-10-31 22:12:35 +00:00
*/
pr_debug("Got ARP\n");
2002-10-31 22:12:35 +00:00
arp = (ARP_t *)ip;
if (len < ARP_HDR_SIZE) {
printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
return;
}
if (ntohs(arp->ar_hrd) != ARP_ETHER) {
return;
}
if (ntohs(arp->ar_pro) != PROT_IP) {
return;
}
if (arp->ar_hln != 6) {
return;
}
if (arp->ar_pln != 4) {
return;
}
if (NetOurIP == 0) {
return;
}
if (NetReadIP(&arp->ar_data[16]) != NetOurIP) {
return;
}
switch (ntohs(arp->ar_op)) {
case ARPOP_REQUEST: /* reply with our IP address */
pr_debug("Got ARP REQUEST, return our IP\n");
pkt = (uchar *)et;
pkt += NetSetEther(pkt, et->et_src, PROT_ARP);
2002-10-31 22:12:35 +00:00
arp->ar_op = htons(ARPOP_REPLY);
memcpy (&arp->ar_data[10], &arp->ar_data[0], 6);
NetCopyIP(&arp->ar_data[16], &arp->ar_data[6]);
memcpy (&arp->ar_data[ 0], NetOurEther, 6);
NetCopyIP(&arp->ar_data[ 6], &NetOurIP);
memcpy(NetTxPacket, et, (pkt - (uchar *)et) + ARP_HDR_SIZE);
eth_send((uchar *)NetTxPacket, (pkt - (uchar *)et) + ARP_HDR_SIZE);
2002-10-31 22:12:35 +00:00
return;
case ARPOP_REPLY: /* arp reply */
/* are we waiting for a reply */
if (!NetArpWaitPacketIP || !NetArpWaitPacketMAC)
break;
pr_debug("Got ARP REPLY, set server/gtwy eth addr (%02x:%02x:%02x:%02x:%02x:%02x)\n",
arp->ar_data[0], arp->ar_data[1],
arp->ar_data[2], arp->ar_data[3],
arp->ar_data[4], arp->ar_data[5]);
tmp = NetReadIP(&arp->ar_data[6]);
/* matched waiting packet's address */
if (tmp == NetArpWaitReplyIP) {
pr_debug("Got it\n");
/* save address for later use */
memcpy(NetArpWaitPacketMAC, &arp->ar_data[0], 6);
/* modify header, and transmit it */
memcpy(((Ethernet_t *)NetArpWaitTxPacket)->et_dest, NetArpWaitPacketMAC, 6);
(void) eth_send(NetArpWaitTxPacket, NetArpWaitTxPacketSize);
/* no arp request pending now */
NetArpWaitPacketIP = 0;
NetArpWaitTxPacketSize = 0;
NetArpWaitPacketMAC = NULL;
}
2002-10-31 22:12:35 +00:00
return;
default:
pr_debug("Unexpected ARP opcode 0x%x\n", ntohs(arp->ar_op));
2002-10-31 22:12:35 +00:00
return;
}
break;
2002-10-31 22:12:35 +00:00
case PROT_RARP:
pr_debug("Got RARP\n");
2002-10-31 22:12:35 +00:00
arp = (ARP_t *)ip;
if (len < ARP_HDR_SIZE) {
printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
return;
}
if ((ntohs(arp->ar_op) != RARPOP_REPLY) ||
(ntohs(arp->ar_hrd) != ARP_ETHER) ||
(ntohs(arp->ar_pro) != PROT_IP) ||
(arp->ar_hln != 6) || (arp->ar_pln != 4)) {
puts ("invalid RARP header\n");
2002-10-31 22:12:35 +00:00
} else {
NetCopyIP(&NetOurIP, &arp->ar_data[16]);
if (NetServerIP == 0)
NetCopyIP(&NetServerIP, &arp->ar_data[ 6]);
2002-10-31 22:12:35 +00:00
memcpy (NetServerEther, &arp->ar_data[ 0], 6);
if (packetHandler)
(*packetHandler)(0,0,0,0);
2002-10-31 22:12:35 +00:00
}
break;
case PROT_IP:
pr_debug("Got IP\n");
2002-10-31 22:12:35 +00:00
if (len < IP_HDR_SIZE) {
debug ("len bad %d < %d\n", len, IP_HDR_SIZE);
return;
}
if (len < ntohs(ip->ip_len)) {
printf("len bad %d < %d\n", len, ntohs(ip->ip_len));
return;
}
len = ntohs(ip->ip_len);
pr_debug("len=%d, v=%02x\n", len, ip->ip_hl_v & 0xff);
2002-10-31 22:12:35 +00:00
if ((ip->ip_hl_v & 0xf0) != 0x40) {
return;
}
if (ip->ip_off & htons(0x1fff)) { /* Can't deal w/ fragments */
return;
}
if (!NetCksumOk((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2)) {
puts ("checksum bad\n");
2002-10-31 22:12:35 +00:00
return;
}
tmp = NetReadIP(&ip->ip_dst);
if (NetOurIP && tmp != NetOurIP && tmp != 0xFFFFFFFF) {
return;
}
/*
* watch for ICMP host redirects
*
* There is no real handler code (yet). We just watch
* for ICMP host redirect messages. In case anybody
* sees these messages: please contact me
* (wd@denx.de), or - even better - send me the
* necessary fixes :-)
2002-10-31 22:12:35 +00:00
*
* Note: in all cases where I have seen this so far
* it was a problem with the router configuration,
* for instance when a router was configured in the
* BOOTP reply, but the TFTP server was on the same
* subnet. So this is probably a warning that your
* configuration might be wrong. But I'm not really
* sure if there aren't any other situations.
2002-10-31 22:12:35 +00:00
*/
if (ip->ip_p == IPPROTO_ICMP) {
ICMP_t *icmph = (ICMP_t *)&(ip->udp_src);
switch (icmph->type) {
case ICMP_REDIRECT:
if (icmph->code != ICMP_REDIR_HOST)
return;
puts (" ICMP Host Redirect to ");
print_IPaddr(icmph->un.gateway);
putchar(' ');
return;
#ifdef CONFIG_NET_PING
case ICMP_ECHO_REPLY:
/*
* IP header OK. Pass the packet to the current handler.
*/
/* XXX point to ip packet */
if (packetHandler)
(*packetHandler)((uchar *)ip, 0, 0, 0);
return;
#endif
default:
return;
}
2002-10-31 22:12:35 +00:00
} else if (ip->ip_p != IPPROTO_UDP) { /* Only UDP packets */
return;
}
#ifdef CONFIG_UDP_CHECKSUM
if (ip->udp_xsum != 0) {
2005-08-12 21:43:12 +00:00
ulong xsum;
ushort *sumptr;
ushort sumlen;
xsum = ip->ip_p;
xsum += (ntohs(ip->udp_len));
xsum += (ntohl(ip->ip_src) >> 16) & 0x0000ffff;
xsum += (ntohl(ip->ip_src) >> 0) & 0x0000ffff;
xsum += (ntohl(ip->ip_dst) >> 16) & 0x0000ffff;
xsum += (ntohl(ip->ip_dst) >> 0) & 0x0000ffff;
sumlen = ntohs(ip->udp_len);
sumptr = (ushort *) &(ip->udp_src);
while (sumlen > 1) {
2005-08-12 21:43:12 +00:00
ushort sumdata;
sumdata = *sumptr++;
xsum += ntohs(sumdata);
sumlen -= 2;
}
if (sumlen > 0) {
2005-08-12 21:43:12 +00:00
ushort sumdata;
sumdata = *(unsigned char *) sumptr;
2005-08-12 21:43:12 +00:00
sumdata = (sumdata << 8) & 0xff00;
xsum += sumdata;
}
while ((xsum >> 16) != 0) {
2005-08-12 21:43:12 +00:00
xsum = (xsum & 0x0000ffff) + ((xsum >> 16) & 0x0000ffff);
}
if ((xsum != 0x00000000) && (xsum != 0x0000ffff)) {
2005-08-12 21:43:12 +00:00
printf(" UDP wrong checksum %08x %08x\n", xsum, ntohs(ip->udp_xsum));
return;
}
}
#endif
2002-10-31 22:12:35 +00:00
/*
* IP header OK. Pass the packet to the current handler.
*/
if (packetHandler)
(*packetHandler)((uchar *)ip +IP_HDR_SIZE,
2002-10-31 22:12:35 +00:00
ntohs(ip->udp_dst),
ntohs(ip->udp_src),
ntohs(ip->udp_len) - 8);
break;
}
}
/**********************************************************************/
static int net_check_prereq (proto_t protocol)
{
struct eth_device *edev = eth_get_current();
2002-10-31 22:12:35 +00:00
switch (protocol) {
/* Fall through */
#ifdef CONFIG_NET_NFS
case NFS:
#endif
case NETCONS:
2002-10-31 22:12:35 +00:00
case TFTP:
if (NetServerIP == 0) {
printf("*** ERROR: `%s.serverip' not set\n", dev_id(&edev->dev));
return -1;
}
if (NetOurIP == 0) {
printf("*** ERROR: `%s.ipaddr' not set\n", dev_id(&edev->dev));
return -1;
}
/* Fall through */
2002-10-31 22:12:35 +00:00
case DHCP:
case RARP:
case BOOTP:
if (memcmp (NetOurEther, "\0\0\0\0\0\0", 6) == 0) {
printf("*** ERROR: `%s.ethaddr' not set\n", dev_id(&edev->dev));
return -1;
}
/* Fall through */
default:
return 0;
2002-10-31 22:12:35 +00:00
}
return -1; /* not reached */
2002-10-31 22:12:35 +00:00
}
/**********************************************************************/
int
NetCksumOk(uchar * ptr, int len)
{
return !((NetCksum(ptr, len) + 1) & 0xfffe);
}
unsigned
NetCksum(uchar * ptr, int len)
{
ulong xsum;
ushort *p = (ushort *)ptr;
2002-10-31 22:12:35 +00:00
xsum = 0;
while (len-- > 0)
2005-08-25 23:36:03 +00:00
xsum += *p++;
2002-10-31 22:12:35 +00:00
xsum = (xsum & 0xffff) + (xsum >> 16);
xsum = (xsum & 0xffff) + (xsum >> 16);
return xsum & 0xffff;
2002-10-31 22:12:35 +00:00
}
int
NetEthHdrSize(void)
{
ushort myvlanid;
2002-10-31 22:12:35 +00:00
myvlanid = ntohs(NetOurVLAN);
if (myvlanid == (ushort)-1)
myvlanid = VLAN_NONE;
return ((myvlanid & VLAN_IDMASK) == VLAN_NONE) ? ETHER_HDR_SIZE : VLAN_ETHER_HDR_SIZE;
}
int
NetSetEther(uchar * xet, uchar * addr, uint prot)
2002-10-31 22:12:35 +00:00
{
Ethernet_t *et = (Ethernet_t *)xet;
ushort myvlanid;
myvlanid = ntohs(NetOurVLAN);
if (myvlanid == (ushort)-1)
myvlanid = VLAN_NONE;
2002-10-31 22:12:35 +00:00
memcpy (et->et_dest, addr, 6);
memcpy (et->et_src, NetOurEther, 6);
if ((myvlanid & VLAN_IDMASK) == VLAN_NONE) {
2002-10-31 22:12:35 +00:00
et->et_protlen = htons(prot);
return ETHER_HDR_SIZE;
} else {
VLAN_Ethernet_t *vet = (VLAN_Ethernet_t *)xet;
2002-10-31 22:12:35 +00:00
vet->vet_vlan_type = htons(PROT_VLAN);
vet->vet_tag = htons((0 << 5) | (myvlanid & VLAN_IDMASK));
vet->vet_type = htons(prot);
return VLAN_ETHER_HDR_SIZE;
}
}
2002-10-31 22:12:35 +00:00
void
NetSetIP(uchar * xip, IPaddr_t dest, int dport, int sport, int len)
2002-10-31 22:12:35 +00:00
{
IP_t *ip = (IP_t *)xip;
2002-10-31 22:12:35 +00:00
/*
* If the data is an odd number of bytes, zero the
* byte after the last byte so that the checksum
* will work.
*/
if (len & 1)
xip[IP_HDR_SIZE + len] = 0;
/*
* Construct an IP and UDP header.
* (need to set no fragment bit - XXX)
2002-10-31 22:12:35 +00:00
*/
ip->ip_hl_v = 0x45; /* IP_HDR_SIZE / 4 (not including UDP) */
ip->ip_tos = 0;
ip->ip_len = htons(IP_HDR_SIZE + len);
ip->ip_id = htons(NetIPID++);
ip->ip_off = htons(0x4000); /* No fragmentation */
ip->ip_ttl = 255;
ip->ip_p = 17; /* UDP */
ip->ip_sum = 0;
NetCopyIP((void*)&ip->ip_src, &NetOurIP); /* already in network byte order */
NetCopyIP((void*)&ip->ip_dst, &dest); /* - "" - */
ip->udp_src = htons(sport);
ip->udp_dst = htons(dport);
ip->udp_len = htons(8 + len);
ip->udp_xsum = 0;
ip->ip_sum = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2);
}
char *ip_to_string (IPaddr_t x, char *s)
2002-10-31 22:12:35 +00:00
{
x = ntohl (x);
sprintf (s, "%d.%d.%d.%d",
(int) ((x >> 24) & 0xff),
(int) ((x >> 16) & 0xff),
(int) ((x >> 8) & 0xff), (int) ((x >> 0) & 0xff)
);
return s;
2002-10-31 22:12:35 +00:00
}
int string_to_ip(const char *s, IPaddr_t *ip)
2002-10-31 22:12:35 +00:00
{
IPaddr_t addr = 0;
char *e;
2002-10-31 22:12:35 +00:00
int i;
if (!s)
return -EINVAL;
2002-10-31 22:12:35 +00:00
for (i = 0; i < 4; i++) {
ulong val;
if (!isdigit(*s))
return -EINVAL;
val = simple_strtoul(s, &e, 10);
2002-10-31 22:12:35 +00:00
addr <<= 8;
addr |= (val & 0xFF);
if (*e != '.' && i != 3)
return -EINVAL;
s = e + 1;
2002-10-31 22:12:35 +00:00
}
*ip = htonl(addr);
return 0;
2002-10-31 22:12:35 +00:00
}
IPaddr_t getenv_ip(const char *name)
{
IPaddr_t ip;
const char *var = getenv(name);
if (!var)
return 0;
string_to_ip(var, &ip);
return ip;
}
int setenv_ip(const char *name, IPaddr_t ip)
{
char str[sizeof("xxx.xxx.xxx.xxx")];
ip_to_string(ip, str);
setenv(name, str);
return 0;
}
void VLAN_to_string(ushort x, char *s)
{
x = ntohs(x);
if (x == (ushort)-1)
x = VLAN_NONE;
if (x == VLAN_NONE)
strcpy(s, "none");
else
sprintf(s, "%d", x & VLAN_IDMASK);
}
ushort string_to_VLAN(const char *s)
{
ushort id;
if (s == NULL)
return htons(VLAN_NONE);
if (*s < '0' || *s > '9')
id = VLAN_NONE;
else
id = (ushort)simple_strtoul(s, NULL, 10);
return htons(id);
}
void print_IPaddr (IPaddr_t x)
{
char tmp[16];
ip_to_string (x, tmp);
puts (tmp);
}
ushort getenv_VLAN(char *var)
{
return string_to_VLAN(getenv(var));
}
int string_to_ethaddr(const char *str, char *enetaddr)
{
ulong reg;
char *e;
if (!str || strlen(str) != 17)
return -1;
if (str[2] != ':' || str[5] != ':' || str[8] != ':' ||
str[11] != ':' || str[14] != ':')
return -1;
for (reg = 0; reg < 6; ++reg) {
enetaddr[reg] = simple_strtoul (str, &e, 16);
str = e + 1;
}
return 0;
}
void ethaddr_to_string(const unsigned char *enetaddr, char *str)
{
sprintf (str, "%02X:%02X:%02X:%02X:%02X:%02X",
enetaddr[0], enetaddr[1], enetaddr[2], enetaddr[3],
enetaddr[4], enetaddr[5]);
}
static IPaddr_t net_netmask; /* Our subnet mask (0=unknown) */
static IPaddr_t net_gateway; /* Our gateways IP address */
static unsigned char net_ether[6]; /* Our ethernet address */
static IPaddr_t net_ip; /* Our IP addr (0 = unknown) */
static IPaddr_t net_serverip; /* Our IP addr (0 = unknown) */
unsigned char *NetRxPackets[PKTBUFSRX]; /* Receive packets */
static unsigned int net_ip_id;
void net_update_env(void)
{
struct eth_device *edev = eth_get_current();
net_ip = dev_get_param_ip(&edev->dev, "ipaddr");
net_serverip = dev_get_param_ip(&edev->dev, "serverip");
net_gateway = dev_get_param_ip(&edev->dev, "gateway");
net_netmask = dev_get_param_ip(&edev->dev, "netmask");
string_to_ethaddr(dev_get_param(&edev->dev, "ethaddr"),
net_ether);
NetOurIP = dev_get_param_ip(&edev->dev, "ipaddr");
NetServerIP = dev_get_param_ip(&edev->dev, "serverip");
NetOurGatewayIP = dev_get_param_ip(&edev->dev, "gateway");
NetOurSubnetMask = dev_get_param_ip(&edev->dev, "netmask");
string_to_ethaddr(dev_get_param(&edev->dev, "ethaddr"),
NetOurEther);
}
int net_checksum_ok(unsigned char *ptr, int len)
{
return net_checksum(ptr, len) + 1;
}
uint16_t net_checksum(unsigned char *ptr, int len)
{
uint32_t xsum = 0;
uint16_t *p = (uint16_t *)ptr;
if (len & 1)
ptr[len] = 0;
len = (len + 1) >> 1;
while (len-- > 0)
xsum += *p++;
xsum = (xsum & 0xffff) + (xsum >> 16);
xsum = (xsum & 0xffff) + (xsum >> 16);
return xsum & 0xffff;
}
static unsigned char *arp_ether;
static IPaddr_t arp_wait_ip;
static void arp_handler(struct arprequest *arp)
{
IPaddr_t tmp;
/* are we waiting for a reply */
if (!arp_wait_ip)
return;
tmp = net_read_ip(&arp->ar_data[6]);
/* matched waiting packet's address */
if (tmp == arp_wait_ip) {
/* save address for later use */
memcpy(arp_ether, &arp->ar_data[0], 6);
/* no arp request pending now */
arp_wait_ip = 0;
}
}
int arp_request(IPaddr_t dest, unsigned char *ether)
{
char *pkt;
struct arprequest *arp;
uint64_t arp_start;
static char *arp_packet;
struct ethernet *et;
if (!arp_packet) {
arp_packet = net_alloc_packet();
if (!arp_packet)
return -ENOMEM;
}
pkt = arp_packet;
et = (struct ethernet *)arp_packet;
arp_wait_ip = dest;
pr_debug("ARP broadcast\n");
memset(et->et_dest, 0xff, 6);
memcpy(et->et_src, net_ether, 6);
et->et_protlen = htons(PROT_ARP);
arp = (struct arprequest *)(pkt + ETHER_HDR_SIZE);
arp->ar_hrd = htons(ARP_ETHER);
arp->ar_pro = htons(PROT_IP);
arp->ar_hln = 6;
arp->ar_pln = 4;
arp->ar_op = htons(ARPOP_REQUEST);
memcpy(arp->ar_data, net_ether, 6); /* source ET addr */
net_write_ip(arp->ar_data + 6, net_ip); /* source IP addr */
memset(arp->ar_data + 10, 0, 6); /* dest ET addr = 0 */
if ((dest & net_netmask) != (net_ip & net_netmask)) {
if (!net_gateway)
arp_wait_ip = dest;
else
arp_wait_ip = net_gateway;
} else {
arp_wait_ip = dest;
}
net_write_ip(arp->ar_data + 16, arp_wait_ip);
arp_ether = ether;
eth_send(arp_packet, ETHER_HDR_SIZE + ARP_HDR_SIZE);
arp_start = get_time_ns();
while (arp_wait_ip) {
if (ctrlc())
return -EINTR;
if (is_timeout(arp_start, 3 * SECOND)) {
printf("T ");
arp_start = get_time_ns();
eth_send(arp_packet, ETHER_HDR_SIZE + ARP_HDR_SIZE);
}
net_poll();
}
pr_debug("Got ARP REPLY, set server/gtwy eth addr (%02x:%02x:%02x:%02x:%02x:%02x)\n",
ether[0], ether[1],
ether[2], ether[3],
ether[4], ether[5]);
return 0;
}
void net_poll(void)
{
eth_rx();
}
static uint16_t net_udp_new_localport(void)
{
static uint16_t localport;
localport++;
if (localport < 1024)
localport = 1024;
return localport;
}
IPaddr_t net_get_serverip(void)
{
return net_serverip;
}
void net_set_serverip(IPaddr_t ip)
{
struct eth_device *edev = eth_get_current();
net_serverip = ip;
dev_set_param_ip(&edev->dev, "serverip", net_serverip);
}
void net_set_ip(IPaddr_t ip)
{
struct eth_device *edev = eth_get_current();
net_ip = ip;
dev_set_param_ip(&edev->dev, "ipaddr", net_ip);
}
IPaddr_t net_get_ip(void)
{
return net_ip;
}
void net_set_netmask(IPaddr_t nm)
{
struct eth_device *edev = eth_get_current();
net_netmask = nm;
dev_set_param_ip(&edev->dev, "netmask", net_netmask);
}
void net_set_gateway(IPaddr_t gw)
{
struct eth_device *edev = eth_get_current();
net_gateway = gw;
dev_set_param_ip(&edev->dev, "gateway", net_gateway);
}
static LIST_HEAD(connection_list);
static struct net_connection *net_new(IPaddr_t dest, rx_handler_f *handler)
{
struct net_connection *con;
int ret;
if (!is_valid_ether_addr(net_ether))
return ERR_PTR(-ENETDOWN);
/* If we don't have an ip only broadcast is allowed */
if (!net_ip && dest != 0xffffffff)
return ERR_PTR(-ENETDOWN);
con = xzalloc(sizeof(*con));
con->packet = memalign(32, PKTSIZE);
memset(con->packet, 0, PKTSIZE);
con->et = (struct ethernet *)con->packet;
con->ip = (struct iphdr *)(con->packet + ETHER_HDR_SIZE);
con->udp = (struct udphdr *)(con->packet + ETHER_HDR_SIZE + sizeof(struct iphdr));
con->icmp = (struct icmphdr *)(con->packet + ETHER_HDR_SIZE + sizeof(struct iphdr));
con->handler = handler;
if (dest == 0xffffffff) {
memset(con->et->et_dest, 0xff, 6);
} else {
ret = arp_request(dest, con->et->et_dest);
if (ret)
goto out;
}
con->et->et_protlen = htons(PROT_IP);
memcpy(con->et->et_src, net_ether, 6);
con->ip->hl_v = 0x45;
con->ip->tos = 0;
con->ip->frag_off = htons(0x4000); /* No fragmentation */;
con->ip->ttl = 255;
net_copy_ip(&con->ip->daddr, &dest);
net_copy_ip(&con->ip->saddr, &net_ip);
list_add_tail(&con->list, &connection_list);
return con;
out:
free(con->packet);
free(con);
return ERR_PTR(ret);
}
struct net_connection *net_udp_new(IPaddr_t dest, uint16_t dport,
rx_handler_f *handler)
{
struct net_connection *con = net_new(dest, handler);
if (IS_ERR(con))
return con;
con->proto = IPPROTO_UDP;
con->udp->uh_dport = htons(dport);
con->udp->uh_sport = htons(net_udp_new_localport());
con->ip->protocol = IPPROTO_UDP;
return con;
}
struct net_connection *net_icmp_new(IPaddr_t dest, rx_handler_f *handler)
{
struct net_connection *con = net_new(dest, handler);
if (IS_ERR(con))
return con;
con->proto = IPPROTO_ICMP;
con->ip->protocol = IPPROTO_ICMP;
return con;
}
void net_unregister(struct net_connection *con)
{
list_del(&con->list);
free(con->packet);
free(con);
}
int net_ip_send(struct net_connection *con, int len)
{
con->ip->tot_len = htons(sizeof(struct iphdr) + len);
con->ip->id = htons(net_ip_id++);;
con->ip->check = 0;
con->ip->check = ~net_checksum((unsigned char *)con->ip, sizeof(struct iphdr));
eth_send(con->packet, ETHER_HDR_SIZE + sizeof(struct iphdr) + len);
return 0;
}
int net_udp_send(struct net_connection *con, int len)
{
con->udp->uh_ulen = htons(len + 8);
con->udp->uh_sum = 0;
return net_ip_send(con, sizeof(struct udphdr) + len);
}
int net_icmp_send(struct net_connection *con, int len)
{
con->icmp->checksum = ~net_checksum((unsigned char *)con->icmp,
sizeof(struct icmphdr) + len);
return net_ip_send(con, sizeof(struct icmphdr) + len);
}
static int net_answer_arp(unsigned char *pkt, int len)
{
struct arprequest *arp = (struct arprequest *)(pkt + ETHER_HDR_SIZE);
struct ethernet *et = (struct ethernet *)pkt;
unsigned char *packet;
debug("%s\n", __func__);
memcpy (et->et_dest, et->et_src, 6);
memcpy (et->et_src, net_ether, 6);
et->et_protlen = htons(PROT_ARP);
arp->ar_op = htons(ARPOP_REPLY);
memcpy(&arp->ar_data[10], &arp->ar_data[0], 6);
net_copy_ip(&arp->ar_data[16], &arp->ar_data[6]);
memcpy(&arp->ar_data[0], net_ether, 6);
net_copy_ip(&arp->ar_data[6], &net_ip);
packet = net_alloc_packet();
if (!packet)
return 0;
memcpy(packet, pkt, ETHER_HDR_SIZE + ARP_HDR_SIZE);
eth_send(packet, ETHER_HDR_SIZE + ARP_HDR_SIZE);
free(packet);
return 0;
}
static void net_bad_packet(unsigned char *pkt, int len)
{
#ifdef DEBUG
/*
* We received a bad packet. for now just dump it.
* We could add more sophisticated debugging here
*/
memory_display(pkt, 0, len, 1);
#endif
}
static int net_handle_arp(unsigned char *pkt, int len)
{
struct arprequest *arp;
debug("%s: got arp\n", __func__);
/*
* We have to deal with two types of ARP packets:
* - REQUEST packets will be answered by sending our
* IP address - if we know it.
* - REPLY packets are expected only after we asked
* for the TFTP server's or the gateway's ethernet
* address; so if we receive such a packet, we set
* the server ethernet address
*/
arp = (struct arprequest *)(pkt + ETHER_HDR_SIZE);
if (len < ARP_HDR_SIZE)
goto bad;
if (ntohs(arp->ar_hrd) != ARP_ETHER)
goto bad;
if (ntohs(arp->ar_pro) != PROT_IP)
goto bad;
if (arp->ar_hln != 6)
goto bad;
if (arp->ar_pln != 4)
goto bad;
if (net_ip == 0)
return 0;
if (net_read_ip(&arp->ar_data[16]) != net_ip)
return 0;
switch (ntohs(arp->ar_op)) {
case ARPOP_REQUEST:
return net_answer_arp(pkt, len);
case ARPOP_REPLY:
arp_handler(arp);
return 1;
default:
pr_debug("Unexpected ARP opcode 0x%x\n", ntohs(arp->ar_op));
return -EINVAL;
}
return 0;
bad:
net_bad_packet(pkt, len);
return -EINVAL;
}
static int net_handle_udp(unsigned char *pkt, int len)
{
struct iphdr *ip = (struct iphdr *)(pkt + ETHER_HDR_SIZE);
struct net_connection *con;
struct udphdr *udp;
int port;
udp = (struct udphdr *)(ip + 1);
port = ntohs(udp->uh_dport);
list_for_each_entry(con, &connection_list, list) {
if (con->proto == IPPROTO_UDP && port == ntohs(con->udp->uh_sport)) {
con->handler(pkt, len);
return 0;
}
}
return -EINVAL;
}
static int net_handle_icmp(unsigned char *pkt, int len)
{
struct net_connection *con;
debug("%s\n", __func__);
list_for_each_entry(con, &connection_list, list) {
if (con->proto == IPPROTO_ICMP) {
con->handler(pkt, len);
return 0;
}
}
return 0;
}
static int net_handle_ip(unsigned char *pkt, int len)
{
struct iphdr *ip = (struct iphdr *)(pkt + ETHER_HDR_SIZE);
IPaddr_t tmp;
debug("%s\n", __func__);
if (len < sizeof(struct ethernet) + sizeof(struct iphdr) ||
len < ETHER_HDR_SIZE + ntohs(ip->tot_len)) {
debug("%s: bad len\n", __func__);
goto bad;
}
if ((ip->hl_v & 0xf0) != 0x40)
goto bad;
if (ip->frag_off & htons(0x1fff)) /* Can't deal w/ fragments */
goto bad;
if (!net_checksum_ok((unsigned char *)ip, sizeof(struct iphdr)))
goto bad;
tmp = net_read_ip(&ip->daddr);
if (net_ip && tmp != net_ip && tmp != 0xffffffff)
return 0;
switch (ip->protocol) {
case IPPROTO_ICMP:
return net_handle_icmp(pkt, len);
case IPPROTO_UDP:
return net_handle_udp(pkt, len);
}
return 0;
bad:
net_bad_packet(pkt, len);
return 0;
}
int net_receive(unsigned char *pkt, int len)
{
struct ethernet *et = (struct ethernet *)pkt;
int et_protlen = ntohs(et->et_protlen);
if (len < ETHER_HDR_SIZE)
return 0;
switch (et_protlen) {
case PROT_ARP:
return net_handle_arp(pkt, len);
case PROT_IP:
return net_handle_ip(pkt, len);
default:
debug("%s: got unknown protocol type: %d\n", __func__, et_protlen);
return 1;
}
}
static int net_init(void)
{
int i;
for (i = 0; i < PKTBUFSRX; i++)
NetRxPackets[i] = memalign(32, PKTSIZE);
return 0;
}
postcore_initcall(net_init);