blob: 39ffe8c47bbe97d9da91403bbe3b23510604cfb8 [file] [log] [blame]
wdenk2d966952002-10-31 22:12:35 +00001/*
2 * Copied from Linux Monitor (LiMon) - Networking.
3 *
4 * Copyright 1994 - 2000 Neil Russell.
5 * (See License)
6 * Copyright 2000 Roland Borde
7 * Copyright 2000 Paolo Scaffardi
8 * Copyright 2000-2002 Wolfgang Denk, wd@denx.de
9 */
10
11/*
12 * General Desription:
13 *
14 * The user interface supports commands for BOOTP, RARP, and TFTP.
15 * Also, we support ARP internally. Depending on available data,
16 * these interact as follows:
17 *
18 * BOOTP:
19 *
20 * Prerequisites: - own ethernet address
21 * We want: - own IP address
22 * - TFTP server IP address
23 * - name of bootfile
24 * Next step: ARP
25 *
26 * RARP:
27 *
28 * Prerequisites: - own ethernet address
29 * We want: - own IP address
30 * - TFTP server IP address
31 * Next step: ARP
32 *
33 * ARP:
34 *
35 * Prerequisites: - own ethernet address
36 * - own IP address
37 * - TFTP server IP address
38 * We want: - TFTP server ethernet address
39 * Next step: TFTP
40 *
41 * DHCP:
42 *
43 * Prerequisites: - own ethernet address
44 * We want: - IP, Netmask, ServerIP, Gateway IP
45 * - bootfilename, lease time
46 * Next step: - TFTP
47 *
48 * TFTP:
49 *
50 * Prerequisites: - own ethernet address
51 * - own IP address
52 * - TFTP server IP address
53 * - TFTP server ethernet address
54 * - name of bootfile (if unknown, we use a default name
55 * derived from our own IP address)
56 * We want: - load the boot file
57 * Next step: none
58 */
59
60
61#include <common.h>
62#include <watchdog.h>
63#include <command.h>
64#include <net.h>
65#include "bootp.h"
66#include "tftp.h"
67#include "rarp.h"
wdenkfc3e2162003-10-08 22:33:00 +000068#ifdef CONFIG_STATUS_LED
69#include <status_led.h>
70#include <miiphy.h>
71#endif
wdenk2d966952002-10-31 22:12:35 +000072
73#if (CONFIG_COMMANDS & CFG_CMD_NET)
74
wdenk73a8b272003-06-05 19:27:42 +000075#define ARP_TIMEOUT 5 /* Seconds before trying ARP again */
76#ifndef CONFIG_NET_RETRY_COUNT
77# define ARP_TIMEOUT_COUNT 5 /* # of timeouts before giving up */
78#else
79# define ARP_TIMEOUT_COUNT (CONFIG_NET_RETRY_COUNT)
80#endif
81
wdenk2d966952002-10-31 22:12:35 +000082#if 0
83#define ET_DEBUG
84#endif
85
86/** BOOTP EXTENTIONS **/
87
88IPaddr_t NetOurSubnetMask=0; /* Our subnet mask (0=unknown) */
89IPaddr_t NetOurGatewayIP=0; /* Our gateways IP address */
90IPaddr_t NetOurDNSIP=0; /* Our DNS IP address */
stroesefe389a82003-08-28 14:17:32 +000091#if (CONFIG_BOOTP_MASK & CONFIG_BOOTP_DNS2)
92IPaddr_t NetOurDNS2IP=0; /* Our 2nd DNS IP address */
93#endif
wdenk2d966952002-10-31 22:12:35 +000094char NetOurNISDomain[32]={0,}; /* Our NIS domain */
95char NetOurHostName[32]={0,}; /* Our hostname */
96char NetOurRootPath[64]={0,}; /* Our bootpath */
97ushort NetBootFileSize=0; /* Our bootfile size in blocks */
98
99/** END OF BOOTP EXTENTIONS **/
100
101ulong NetBootFileXferSize; /* The actual transferred size of the bootfile (in bytes) */
102uchar NetOurEther[6]; /* Our ethernet address */
103uchar NetServerEther[6] = /* Boot server enet address */
wdenk73a8b272003-06-05 19:27:42 +0000104 { 0, 0, 0, 0, 0, 0 };
wdenk2d966952002-10-31 22:12:35 +0000105IPaddr_t NetOurIP; /* Our IP addr (0 = unknown) */
106IPaddr_t NetServerIP; /* Our IP addr (0 = unknown) */
107volatile uchar *NetRxPkt; /* Current receive packet */
108int NetRxPktLen; /* Current rx packet length */
109unsigned NetIPID; /* IP packet ID */
110uchar NetBcastAddr[6] = /* Ethernet bcast address */
111 { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
wdenk73a8b272003-06-05 19:27:42 +0000112uchar NetEtherNullAddr[6] =
113 { 0, 0, 0, 0, 0, 0 };
wdenk2d966952002-10-31 22:12:35 +0000114int NetState; /* Network loop state */
115#ifdef CONFIG_NET_MULTI
116int NetRestartWrap = 0; /* Tried all network devices */
117static int NetRestarted = 0; /* Network loop restarted */
118static int NetDevExists = 0; /* At least one device configured */
119#endif
120
121char BootFile[128]; /* Boot File name */
122
wdenk73a8b272003-06-05 19:27:42 +0000123#if (CONFIG_COMMANDS & CFG_CMD_PING)
124IPaddr_t NetPingIP; /* the ip address to ping */
125
126static void PingStart(void);
127#endif
128
wdenk2d966952002-10-31 22:12:35 +0000129volatile uchar PktBuf[(PKTBUFSRX+1) * PKTSIZE_ALIGN + PKTALIGN];
130
131volatile uchar *NetRxPackets[PKTBUFSRX]; /* Receive packets */
132
133static rxhand_f *packetHandler; /* Current RX packet handler */
134static thand_f *timeHandler; /* Current timeout handler */
wdenke0ac62d2003-08-17 18:55:18 +0000135static ulong timeStart; /* Time base value */
136static ulong timeDelta; /* Current timeout value */
wdenk2d966952002-10-31 22:12:35 +0000137volatile uchar *NetTxPacket = 0; /* THE transmit packet */
138
139static int net_check_prereq (proto_t protocol);
140
141/**********************************************************************/
wdenk73a8b272003-06-05 19:27:42 +0000142
143IPaddr_t NetArpWaitPacketIP;
144IPaddr_t NetArpWaitReplyIP;
145uchar *NetArpWaitPacketMAC; /* MAC address of waiting packet's destination */
146uchar *NetArpWaitTxPacket; /* THE transmit packet */
147int NetArpWaitTxPacketSize;
148uchar NetArpWaitPacketBuf[PKTSIZE_ALIGN + PKTALIGN];
149ulong NetArpWaitTimerStart;
150int NetArpWaitTry;
151
152void ArpRequest(void)
153{
154 int i;
155 volatile uchar *pkt;
156 ARP_t * arp;
157
158#ifdef ET_DEBUG
159 printf("ARP broadcast %d\n", NetArpWaitTry);
160#endif
161 pkt = NetTxPacket;
162
163 NetSetEther(pkt, NetBcastAddr, PROT_ARP);
164 pkt += ETHER_HDR_SIZE;
165
166 arp = (ARP_t *)pkt;
167
168 arp->ar_hrd = htons(ARP_ETHER);
169 arp->ar_pro = htons(PROT_IP);
170 arp->ar_hln = 6;
171 arp->ar_pln = 4;
172 arp->ar_op = htons(ARPOP_REQUEST);
173
174 memcpy (&arp->ar_data[0], NetOurEther, 6); /* source ET addr */
175 NetWriteIP((uchar*)&arp->ar_data[6], NetOurIP); /* source IP addr */
176 for (i=10; i<16; ++i) {
177 arp->ar_data[i] = 0; /* dest ET addr = 0 */
178 }
179
180 if((NetArpWaitPacketIP & NetOurSubnetMask) != (NetOurIP & NetOurSubnetMask)) {
181 if (NetOurGatewayIP == 0) {
182 puts ("## Warning: gatewayip needed but not set\n");
183 }
184 NetArpWaitReplyIP = NetOurGatewayIP;
185 } else
wdenk8bde7f72003-06-27 21:31:46 +0000186 NetArpWaitReplyIP = NetArpWaitPacketIP;
wdenk73a8b272003-06-05 19:27:42 +0000187
wdenk8bde7f72003-06-27 21:31:46 +0000188 NetWriteIP((uchar*)&arp->ar_data[16], NetArpWaitReplyIP);
wdenk73a8b272003-06-05 19:27:42 +0000189 (void) eth_send(NetTxPacket, ETHER_HDR_SIZE + ARP_HDR_SIZE);
190}
191
192void ArpTimeoutCheck(void)
193{
194 ulong t;
195
196 if (!NetArpWaitPacketIP)
197 return;
198
199 t = get_timer(0);
200
201 /* check for arp timeout */
202 if ((t - NetArpWaitTimerStart) > ARP_TIMEOUT * CFG_HZ) {
203 NetArpWaitTry++;
204
205 if (NetArpWaitTry >= ARP_TIMEOUT_COUNT) {
206 puts ("\nARP Retry count exceeded; starting again\n");
207 NetArpWaitTry = 0;
208 NetStartAgain();
209 } else {
210 NetArpWaitTimerStart = t;
211 ArpRequest();
212 }
213 }
214}
215
216/**********************************************************************/
wdenk2d966952002-10-31 22:12:35 +0000217/*
218 * Main network processing loop.
219 */
220
221int
222NetLoop(proto_t protocol)
223{
224 DECLARE_GLOBAL_DATA_PTR;
225
226 bd_t *bd = gd->bd;
227
228#ifdef CONFIG_NET_MULTI
229 NetRestarted = 0;
230 NetDevExists = 0;
231#endif
232
wdenk73a8b272003-06-05 19:27:42 +0000233 /* XXX problem with bss workaround */
234 NetArpWaitPacketMAC = NULL;
235 NetArpWaitTxPacket = NULL;
236 NetArpWaitPacketIP = 0;
237 NetArpWaitReplyIP = 0;
238 NetArpWaitTxPacket = NULL;
239 NetTxPacket = NULL;
240
wdenk2d966952002-10-31 22:12:35 +0000241 if (!NetTxPacket) {
242 int i;
243
244 /*
245 * Setup packet buffers, aligned correctly.
246 */
247 NetTxPacket = &PktBuf[0] + (PKTALIGN - 1);
248 NetTxPacket -= (ulong)NetTxPacket % PKTALIGN;
249 for (i = 0; i < PKTBUFSRX; i++) {
250 NetRxPackets[i] = NetTxPacket + (i+1)*PKTSIZE_ALIGN;
251 }
wdenk73a8b272003-06-05 19:27:42 +0000252
253 }
254
255 if (!NetArpWaitTxPacket) {
256 NetArpWaitTxPacket = &NetArpWaitPacketBuf[0] + (PKTALIGN - 1);
257 NetArpWaitTxPacket -= (ulong)NetArpWaitTxPacket % PKTALIGN;
258 NetArpWaitTxPacketSize = 0;
wdenk2d966952002-10-31 22:12:35 +0000259 }
260
261 eth_halt();
wdenk0b97ab12003-06-19 23:58:30 +0000262 if(eth_init(bd) < 0)
263 return(-1);
wdenk2d966952002-10-31 22:12:35 +0000264
265restart:
266#ifdef CONFIG_NET_MULTI
267 memcpy (NetOurEther, eth_get_dev()->enetaddr, 6);
268#else
269 memcpy (NetOurEther, bd->bi_enetaddr, 6);
270#endif
271
272 NetState = NETLOOP_CONTINUE;
273
274 /*
275 * Start the ball rolling with the given start function. From
276 * here on, this code is a state machine driven by received
277 * packets and timer events.
278 */
279
280 switch (protocol) {
wdenk73a8b272003-06-05 19:27:42 +0000281#if (CONFIG_COMMANDS & CFG_CMD_PING)
282 case PING:
283#endif
wdenk2d966952002-10-31 22:12:35 +0000284 case TFTP:
285 NetCopyIP(&NetOurIP, &bd->bi_ip_addr);
wdenk2d966952002-10-31 22:12:35 +0000286 NetOurGatewayIP = getenv_IPaddr ("gatewayip");
287 NetOurSubnetMask= getenv_IPaddr ("netmask");
wdenk73a8b272003-06-05 19:27:42 +0000288
289 switch (protocol) {
290 case TFTP:
291 NetServerIP = getenv_IPaddr ("serverip");
292 break;
293#if (CONFIG_COMMANDS & CFG_CMD_PING)
294 case PING:
295 /* nothing */
296 break;
297#endif
298 default:
299 break;
300 }
301
wdenk2d966952002-10-31 22:12:35 +0000302 break;
303 case BOOTP:
304 case RARP:
305 /*
wdenk8bde7f72003-06-27 21:31:46 +0000306 * initialize our IP addr to 0 in order to accept ANY
307 * IP addr assigned to us by the BOOTP / RARP server
wdenk2d966952002-10-31 22:12:35 +0000308 */
309 NetOurIP = 0;
310 NetServerIP = 0;
311 break;
312 default:
313 break;
314 }
315
316 switch (net_check_prereq (protocol)) {
317 case 1:
318 /* network not configured */
wdenk1d0350e2002-11-11 21:14:20 +0000319 return (-1);
wdenk2d966952002-10-31 22:12:35 +0000320
321#ifdef CONFIG_NET_MULTI
322 case 2:
323 /* network device not configured */
324 break;
325#endif /* CONFIG_NET_MULTI */
326
327 case 0:
328#ifdef CONFIG_NET_MULTI
329 NetDevExists = 1;
330#endif
331 switch (protocol) {
332 case TFTP:
333 /* always use ARP to get server ethernet address */
wdenk73a8b272003-06-05 19:27:42 +0000334 TftpStart();
wdenk2d966952002-10-31 22:12:35 +0000335 break;
336
337#if (CONFIG_COMMANDS & CFG_CMD_DHCP)
338 case DHCP:
339 /* Start with a clean slate... */
340 NetOurIP = 0;
341 NetServerIP = 0;
342 DhcpRequest(); /* Basically same as BOOTP */
343 break;
344#endif /* CFG_CMD_DHCP */
345
346 case BOOTP:
347 BootpTry = 0;
348 BootpRequest ();
349 break;
350
351 case RARP:
352 RarpTry = 0;
353 RarpRequest ();
354 break;
wdenk73a8b272003-06-05 19:27:42 +0000355#if (CONFIG_COMMANDS & CFG_CMD_PING)
356 case PING:
357 PingStart();
358 break;
359#endif
wdenk2d966952002-10-31 22:12:35 +0000360 default:
361 break;
362 }
363
364 NetBootFileXferSize = 0;
365 break;
366 }
367
wdenkfc3e2162003-10-08 22:33:00 +0000368#if defined(CONFIG_MII) || (CONFIG_COMMANDS & CFG_CMD_MII)
369#if defined(CFG_FAULT_ECHO_LINK_DOWN) && defined(CONFIG_STATUS_LED) && defined(STATUS_LED_RED)
370 /*
wdenk42d1f032003-10-15 23:53:47 +0000371 * Echo the inverted link state to the fault LED.
wdenkfc3e2162003-10-08 22:33:00 +0000372 */
373 if(miiphy_link(CFG_FAULT_MII_ADDR)) {
374 status_led_set (STATUS_LED_RED, STATUS_LED_OFF);
375 } else {
376 status_led_set (STATUS_LED_RED, STATUS_LED_ON);
377 }
378#endif /* CFG_FAULT_ECHO_LINK_DOWN, ... */
379#endif /* CONFIG_MII, ... */
wdenk2d966952002-10-31 22:12:35 +0000380
381 /*
382 * Main packet reception loop. Loop receiving packets until
383 * someone sets `NetQuit'.
384 */
385 for (;;) {
386 WATCHDOG_RESET();
387#ifdef CONFIG_SHOW_ACTIVITY
388 {
389 extern void show_activity(int arg);
390 show_activity(1);
391 }
392#endif
393 /*
394 * Check the ethernet for a new packet. The ethernet
395 * receive routine will process it.
396 */
397 eth_rx();
398
399 /*
400 * Abort if ctrl-c was pressed.
401 */
402 if (ctrlc()) {
wdenk8bde7f72003-06-27 21:31:46 +0000403 eth_halt();
wdenk2d966952002-10-31 22:12:35 +0000404 printf("\nAbort\n");
wdenk1d0350e2002-11-11 21:14:20 +0000405 return (-1);
wdenk2d966952002-10-31 22:12:35 +0000406 }
407
wdenk73a8b272003-06-05 19:27:42 +0000408 ArpTimeoutCheck();
wdenk2d966952002-10-31 22:12:35 +0000409
410 /*
411 * Check for a timeout, and run the timeout handler
412 * if we have one.
413 */
wdenke0ac62d2003-08-17 18:55:18 +0000414 if (timeHandler && ((get_timer(0) - timeStart) > timeDelta)) {
wdenk2d966952002-10-31 22:12:35 +0000415 thand_f *x;
416
wdenkfc3e2162003-10-08 22:33:00 +0000417#if defined(CONFIG_MII) || (CONFIG_COMMANDS & CFG_CMD_MII)
418#if defined(CFG_FAULT_ECHO_LINK_DOWN) && defined(CONFIG_STATUS_LED) && defined(STATUS_LED_RED)
419 /*
wdenk42d1f032003-10-15 23:53:47 +0000420 * Echo the inverted link state to the fault LED.
wdenkfc3e2162003-10-08 22:33:00 +0000421 */
422 if(miiphy_link(CFG_FAULT_MII_ADDR)) {
423 status_led_set (STATUS_LED_RED, STATUS_LED_OFF);
424 } else {
425 status_led_set (STATUS_LED_RED, STATUS_LED_ON);
426 }
427#endif /* CFG_FAULT_ECHO_LINK_DOWN, ... */
428#endif /* CONFIG_MII, ... */
wdenk2d966952002-10-31 22:12:35 +0000429 x = timeHandler;
430 timeHandler = (thand_f *)0;
431 (*x)();
432 }
433
434
435 switch (NetState) {
436
437 case NETLOOP_RESTART:
438#ifdef CONFIG_NET_MULTI
439 NetRestarted = 1;
440#endif
441 goto restart;
442
443 case NETLOOP_SUCCESS:
444 if (NetBootFileXferSize > 0) {
445 char buf[10];
446 printf("Bytes transferred = %ld (%lx hex)\n",
447 NetBootFileXferSize,
448 NetBootFileXferSize);
449 sprintf(buf, "%lx", NetBootFileXferSize);
450 setenv("filesize", buf);
451 }
452 eth_halt();
453 return NetBootFileXferSize;
454
455 case NETLOOP_FAIL:
wdenk1d0350e2002-11-11 21:14:20 +0000456 return (-1);
wdenk2d966952002-10-31 22:12:35 +0000457 }
458 }
459}
460
461/**********************************************************************/
462
463static void
464startAgainTimeout(void)
465{
466 NetState = NETLOOP_RESTART;
467}
468
469static void
470startAgainHandler(uchar * pkt, unsigned dest, unsigned src, unsigned len)
471{
472 /* Totally ignore the packet */
473}
474
475void
476NetStartAgain(void)
477{
478#ifndef CONFIG_NET_MULTI
479 NetSetTimeout(10 * CFG_HZ, startAgainTimeout);
480 NetSetHandler(startAgainHandler);
481#else
482 DECLARE_GLOBAL_DATA_PTR;
483
484 eth_halt();
485 eth_try_another(!NetRestarted);
486 eth_init(gd->bd);
487 if (NetRestartWrap)
488 {
489 NetRestartWrap = 0;
490 if (NetDevExists)
491 {
492 NetSetTimeout(10 * CFG_HZ, startAgainTimeout);
493 NetSetHandler(startAgainHandler);
494 }
495 else
496 {
497 NetState = NETLOOP_FAIL;
498 }
499 }
500 else
501 {
502 NetState = NETLOOP_RESTART;
503 }
504#endif
505}
506
507/**********************************************************************/
508/*
509 * Miscelaneous bits.
510 */
511
512void
513NetSetHandler(rxhand_f * f)
514{
515 packetHandler = f;
516}
517
518
519void
520NetSetTimeout(int iv, thand_f * f)
521{
522 if (iv == 0) {
523 timeHandler = (thand_f *)0;
524 } else {
525 timeHandler = f;
wdenke0ac62d2003-08-17 18:55:18 +0000526 timeStart = get_timer(0);
527 timeDelta = iv;
wdenk2d966952002-10-31 22:12:35 +0000528 }
529}
530
531
532void
533NetSendPacket(volatile uchar * pkt, int len)
534{
535 (void) eth_send(pkt, len);
536}
537
wdenk73a8b272003-06-05 19:27:42 +0000538int
539NetSendUDPPacket(uchar *ether, IPaddr_t dest, int dport, int sport, int len)
540{
541 /* convert to new style broadcast */
542 if (dest == 0)
543 dest = 0xFFFFFFFF;
wdenk2d966952002-10-31 22:12:35 +0000544
wdenk73a8b272003-06-05 19:27:42 +0000545 /* if broadcast, make the ether address a broadcast and don't do ARP */
546 if (dest == 0xFFFFFFFF)
547 ether = NetBcastAddr;
548
549 /* if MAC address was not discovered yet, save the packet and do an ARP request */
550 if (memcmp(ether, NetEtherNullAddr, 6) == 0) {
551
552#ifdef ET_DEBUG
553 printf("sending ARP for %08lx\n", dest);
554#endif
555
556 NetArpWaitPacketIP = dest;
557 NetArpWaitPacketMAC = ether;
558 NetSetEther (NetArpWaitTxPacket, NetArpWaitPacketMAC, PROT_IP);
559 NetSetIP (NetArpWaitTxPacket + ETHER_HDR_SIZE, dest, dport, sport, len);
560 memcpy(NetArpWaitTxPacket + ETHER_HDR_SIZE + IP_HDR_SIZE,
561 (uchar *)NetTxPacket + ETHER_HDR_SIZE + IP_HDR_SIZE, len);
562
563 /* size of the waiting packet */
564 NetArpWaitTxPacketSize = ETHER_HDR_SIZE + IP_HDR_SIZE + len;
565
566 /* and do the ARP request */
567 NetArpWaitTry = 1;
568 NetArpWaitTimerStart = get_timer(0);
569 ArpRequest();
570 return 1; /* waiting */
571 }
572
573#ifdef ET_DEBUG
574 printf("sending UDP to %08lx/%02x:%02x:%02x:%02x:%02x:%02x\n",
575 dest, ether[0], ether[1], ether[2], ether[3], ether[4], ether[5]);
576#endif
577
578 NetSetEther (NetTxPacket, ether, PROT_IP);
579 NetSetIP (NetTxPacket + ETHER_HDR_SIZE, dest, dport, sport, len);
580 (void) eth_send(NetTxPacket, ETHER_HDR_SIZE + IP_HDR_SIZE + len);
581
582 return 0; /* transmited */
583}
584
585#if (CONFIG_COMMANDS & CFG_CMD_PING)
586static ushort PingSeqNo;
587
588int PingSend(void)
589{
590 static uchar mac[6];
591 volatile IP_t *ip;
592 volatile ushort *s;
593
594 /* XXX always send arp request */
595
596 memcpy(mac, NetEtherNullAddr, 6);
597
598#ifdef ET_DEBUG
599 printf("sending ARP for %08lx\n", NetPingIP);
600#endif
601
602 NetArpWaitPacketIP = NetPingIP;
603 NetArpWaitPacketMAC = mac;
604
605 NetSetEther(NetArpWaitTxPacket, mac, PROT_IP);
606
607 ip = (volatile IP_t *)(NetArpWaitTxPacket + ETHER_HDR_SIZE);
608
609 /*
610 * Construct an IP and ICMP header. (need to set no fragment bit - XXX)
611 */
612 ip->ip_hl_v = 0x45; /* IP_HDR_SIZE / 4 (not including UDP) */
613 ip->ip_tos = 0;
614 ip->ip_len = htons(IP_HDR_SIZE_NO_UDP + 8);
615 ip->ip_id = htons(NetIPID++);
616 ip->ip_off = htons(0x4000); /* No fragmentation */
617 ip->ip_ttl = 255;
618 ip->ip_p = 0x01; /* ICMP */
619 ip->ip_sum = 0;
620 NetCopyIP((void*)&ip->ip_src, &NetOurIP); /* already in network byte order */
621 NetCopyIP((void*)&ip->ip_dst, &NetPingIP); /* - "" - */
622 ip->ip_sum = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2);
623
624 s = &ip->udp_src; /* XXX ICMP starts here */
625 s[0] = htons(0x0800); /* echo-request, code */
626 s[1] = 0; /* checksum */
627 s[2] = 0; /* identifier */
628 s[3] = htons(PingSeqNo++); /* sequence number */
629 s[1] = ~NetCksum((uchar *)s, 8/2);
630
631 /* size of the waiting packet */
632 NetArpWaitTxPacketSize = ETHER_HDR_SIZE + IP_HDR_SIZE_NO_UDP + 8;
633
634 /* and do the ARP request */
635 NetArpWaitTry = 1;
636 NetArpWaitTimerStart = get_timer(0);
637 ArpRequest();
638 return 1; /* waiting */
639}
640
641static void
642PingTimeout (void)
643{
644 eth_halt();
645 NetState = NETLOOP_FAIL; /* we did not get the reply */
646}
647
648static void
649PingHandler (uchar * pkt, unsigned dest, unsigned src, unsigned len)
650{
651 IPaddr_t tmp;
652 volatile IP_t *ip = (volatile IP_t *)pkt;
653
654 tmp = NetReadIP((void *)&ip->ip_src);
655 if (tmp != NetPingIP)
656 return;
657
658 NetState = NETLOOP_SUCCESS;
659}
660
661static void PingStart(void)
662{
663 NetSetTimeout (10 * CFG_HZ, PingTimeout);
664 NetSetHandler (PingHandler);
665
666 PingSend();
667}
668
669#endif
wdenk2d966952002-10-31 22:12:35 +0000670
671void
672NetReceive(volatile uchar * pkt, int len)
673{
674 Ethernet_t *et;
675 IP_t *ip;
676 ARP_t *arp;
677 IPaddr_t tmp;
678 int x;
679
wdenk2d966952002-10-31 22:12:35 +0000680 NetRxPkt = pkt;
681 NetRxPktLen = len;
682 et = (Ethernet_t *)pkt;
683
684 x = ntohs(et->et_protlen);
685
686 if (x < 1514) {
687 /*
688 * Got a 802 packet. Check the other protocol field.
689 */
690 x = ntohs(et->et_prot);
691 ip = (IP_t *)(pkt + E802_HDR_SIZE);
692 len -= E802_HDR_SIZE;
693 } else {
694 ip = (IP_t *)(pkt + ETHER_HDR_SIZE);
695 len -= ETHER_HDR_SIZE;
696 }
697
698#ifdef ET_DEBUG
699 printf("Receive from protocol 0x%x\n", x);
700#endif
701
702 switch (x) {
703
704 case PROT_ARP:
705 /*
706 * We have to deal with two types of ARP packets:
wdenk8bde7f72003-06-27 21:31:46 +0000707 * - REQUEST packets will be answered by sending our
708 * IP address - if we know it.
709 * - REPLY packates are expected only after we asked
710 * for the TFTP server's or the gateway's ethernet
711 * address; so if we receive such a packet, we set
712 * the server ethernet address
wdenk2d966952002-10-31 22:12:35 +0000713 */
714#ifdef ET_DEBUG
715 printf("Got ARP\n");
716#endif
717 arp = (ARP_t *)ip;
718 if (len < ARP_HDR_SIZE) {
719 printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
720 return;
721 }
722 if (ntohs(arp->ar_hrd) != ARP_ETHER) {
723 return;
724 }
725 if (ntohs(arp->ar_pro) != PROT_IP) {
726 return;
727 }
728 if (arp->ar_hln != 6) {
729 return;
730 }
731 if (arp->ar_pln != 4) {
732 return;
733 }
734
735 if (NetOurIP == 0) {
736 return;
737 }
738
739 if (NetReadIP(&arp->ar_data[16]) != NetOurIP) {
740 return;
741 }
742
743 switch (ntohs(arp->ar_op)) {
744 case ARPOP_REQUEST: /* reply with our IP address */
745#ifdef ET_DEBUG
746 printf("Got ARP REQUEST, return our IP\n");
747#endif
748 NetSetEther((uchar *)et, et->et_src, PROT_ARP);
749 arp->ar_op = htons(ARPOP_REPLY);
750 memcpy (&arp->ar_data[10], &arp->ar_data[0], 6);
751 NetCopyIP(&arp->ar_data[16], &arp->ar_data[6]);
752 memcpy (&arp->ar_data[ 0], NetOurEther, 6);
753 NetCopyIP(&arp->ar_data[ 6], &NetOurIP);
wdenk73a8b272003-06-05 19:27:42 +0000754 (void) eth_send((uchar *)et, ((uchar *)arp-pkt) + ARP_HDR_SIZE);
wdenk2d966952002-10-31 22:12:35 +0000755 return;
wdenk73a8b272003-06-05 19:27:42 +0000756
757 case ARPOP_REPLY: /* arp reply */
758 /* are we waiting for a reply */
759 if (!NetArpWaitPacketIP || !NetArpWaitPacketMAC)
760 break;
wdenk2d966952002-10-31 22:12:35 +0000761#ifdef ET_DEBUG
wdenk73a8b272003-06-05 19:27:42 +0000762 printf("Got ARP REPLY, set server/gtwy eth addr (%02x:%02x:%02x:%02x:%02x:%02x)\n",
763 arp->ar_data[0], arp->ar_data[1],
764 arp->ar_data[2], arp->ar_data[3],
765 arp->ar_data[4], arp->ar_data[5]);
wdenk2d966952002-10-31 22:12:35 +0000766#endif
wdenk73a8b272003-06-05 19:27:42 +0000767
768 tmp = NetReadIP(&arp->ar_data[6]);
769
770 /* matched waiting packet's address */
771 if (tmp == NetArpWaitReplyIP) {
772#ifdef ET_DEBUG
773 printf("Got it\n");
774#endif
775 /* save address for later use */
776 memcpy(NetArpWaitPacketMAC, &arp->ar_data[0], 6);
777
778 /* modify header, and transmit it */
779 memcpy(((Ethernet_t *)NetArpWaitTxPacket)->et_dest, NetArpWaitPacketMAC, 6);
780 (void) eth_send(NetArpWaitTxPacket, NetArpWaitTxPacketSize);
781
782 /* no arp request pending now */
783 NetArpWaitPacketIP = 0;
784 NetArpWaitTxPacketSize = 0;
785 NetArpWaitPacketMAC = NULL;
786
787 }
wdenk2d966952002-10-31 22:12:35 +0000788 return;
789 default:
790#ifdef ET_DEBUG
791 printf("Unexpected ARP opcode 0x%x\n", ntohs(arp->ar_op));
792#endif
793 return;
794 }
795
796 case PROT_RARP:
797#ifdef ET_DEBUG
798 printf("Got RARP\n");
799#endif
800 arp = (ARP_t *)ip;
801 if (len < ARP_HDR_SIZE) {
802 printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
803 return;
804 }
805
806 if ((ntohs(arp->ar_op) != RARPOP_REPLY) ||
807 (ntohs(arp->ar_hrd) != ARP_ETHER) ||
808 (ntohs(arp->ar_pro) != PROT_IP) ||
809 (arp->ar_hln != 6) || (arp->ar_pln != 4)) {
810
811 printf("invalid RARP header\n");
812 } else {
813 NetCopyIP(&NetOurIP, &arp->ar_data[16]);
814 NetCopyIP(&NetServerIP, &arp->ar_data[ 6]);
815 memcpy (NetServerEther, &arp->ar_data[ 0], 6);
816
817 (*packetHandler)(0,0,0,0);
818 }
819 break;
820
821 case PROT_IP:
822#ifdef ET_DEBUG
823 printf("Got IP\n");
824#endif
825 if (len < IP_HDR_SIZE) {
826 debug ("len bad %d < %d\n", len, IP_HDR_SIZE);
827 return;
828 }
829 if (len < ntohs(ip->ip_len)) {
830 printf("len bad %d < %d\n", len, ntohs(ip->ip_len));
831 return;
832 }
833 len = ntohs(ip->ip_len);
834#ifdef ET_DEBUG
835 printf("len=%d, v=%02x\n", len, ip->ip_hl_v & 0xff);
836#endif
837 if ((ip->ip_hl_v & 0xf0) != 0x40) {
838 return;
839 }
840 if (ip->ip_off & htons(0x1fff)) { /* Can't deal w/ fragments */
841 return;
842 }
843 if (!NetCksumOk((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2)) {
844 printf("checksum bad\n");
845 return;
846 }
847 tmp = NetReadIP(&ip->ip_dst);
848 if (NetOurIP && tmp != NetOurIP && tmp != 0xFFFFFFFF) {
849 return;
850 }
851 /*
852 * watch for ICMP host redirects
853 *
wdenk8bde7f72003-06-27 21:31:46 +0000854 * There is no real handler code (yet). We just watch
855 * for ICMP host redirect messages. In case anybody
856 * sees these messages: please contact me
857 * (wd@denx.de), or - even better - send me the
858 * necessary fixes :-)
wdenk2d966952002-10-31 22:12:35 +0000859 *
wdenk8bde7f72003-06-27 21:31:46 +0000860 * Note: in all cases where I have seen this so far
861 * it was a problem with the router configuration,
862 * for instance when a router was configured in the
863 * BOOTP reply, but the TFTP server was on the same
864 * subnet. So this is probably a warning that your
865 * configuration might be wrong. But I'm not really
866 * sure if there aren't any other situations.
wdenk2d966952002-10-31 22:12:35 +0000867 */
868 if (ip->ip_p == IPPROTO_ICMP) {
869 ICMP_t *icmph = (ICMP_t *)&(ip->udp_src);
870
wdenk73a8b272003-06-05 19:27:42 +0000871 switch (icmph->type) {
872 case ICMP_REDIRECT:
wdenk2d966952002-10-31 22:12:35 +0000873 if (icmph->code != ICMP_REDIR_HOST)
874 return;
875 puts (" ICMP Host Redirect to ");
876 print_IPaddr(icmph->un.gateway);
877 putc(' ');
wdenk73a8b272003-06-05 19:27:42 +0000878 break;
879#if (CONFIG_COMMANDS & CFG_CMD_PING)
880 case ICMP_ECHO_REPLY:
881 /*
882 * IP header OK. Pass the packet to the current handler.
883 */
884 /* XXX point to ip packet */
885 (*packetHandler)((uchar *)ip, 0, 0, 0);
886 break;
887#endif
888 default:
889 return;
890 }
wdenk2d966952002-10-31 22:12:35 +0000891 } else if (ip->ip_p != IPPROTO_UDP) { /* Only UDP packets */
892 return;
893 }
894
895 /*
896 * IP header OK. Pass the packet to the current handler.
897 */
898 (*packetHandler)((uchar *)ip +IP_HDR_SIZE,
899 ntohs(ip->udp_dst),
900 ntohs(ip->udp_src),
901 ntohs(ip->udp_len) - 8);
902
903 break;
904 }
905}
906
907
908/**********************************************************************/
909
910static int net_check_prereq (proto_t protocol)
911{
912 switch (protocol) {
wdenk73a8b272003-06-05 19:27:42 +0000913 /* Fall through */
914#if (CONFIG_COMMANDS & CFG_CMD_PING)
915 case PING:
916 if (NetPingIP == 0) {
917 puts ("*** ERROR: ping address not given\n");
918 return (1);
919 }
920 goto common;
921#endif
wdenk2d966952002-10-31 22:12:35 +0000922 case TFTP:
923 if (NetServerIP == 0) {
924 puts ("*** ERROR: `serverip' not set\n");
925 return (1);
926 }
927
wdenk73a8b272003-06-05 19:27:42 +0000928#if (CONFIG_COMMANDS & CFG_CMD_PING)
929 common:
930#endif
931
wdenk2d966952002-10-31 22:12:35 +0000932 if (NetOurIP == 0) {
933 puts ("*** ERROR: `ipaddr' not set\n");
934 return (1);
935 }
936 /* Fall through */
937
938 case DHCP:
939 case RARP:
940 case BOOTP:
941 if (memcmp(NetOurEther, "\0\0\0\0\0\0", 6) == 0) {
942#ifdef CONFIG_NET_MULTI
943 extern int eth_get_dev_index (void);
944 int num = eth_get_dev_index();
945
946 switch (num) {
947 case -1:
948 puts ("*** ERROR: No ethernet found.\n");
949 return (1);
950 case 0:
951 puts ("*** ERROR: `ethaddr' not set\n");
952 break;
953 default:
wdenk8bde7f72003-06-27 21:31:46 +0000954 printf ("*** ERROR: `eth%daddr' not set\n",
wdenk2d966952002-10-31 22:12:35 +0000955 num);
956 break;
957 }
958
959 NetStartAgain ();
960 return (2);
961#else
962 puts ("*** ERROR: `ethaddr' not set\n");
963 return (1);
964#endif
965 }
966 /* Fall through */
wdenk73a8b272003-06-05 19:27:42 +0000967 default:
968 return(0);
wdenk2d966952002-10-31 22:12:35 +0000969 }
970 return (0); /* OK */
971}
972/**********************************************************************/
973
974int
975NetCksumOk(uchar * ptr, int len)
976{
977 return !((NetCksum(ptr, len) + 1) & 0xfffe);
978}
979
980
981unsigned
982NetCksum(uchar * ptr, int len)
983{
984 ulong xsum;
985
986 xsum = 0;
987 while (len-- > 0)
988 xsum += *((ushort *)ptr)++;
989 xsum = (xsum & 0xffff) + (xsum >> 16);
990 xsum = (xsum & 0xffff) + (xsum >> 16);
991 return (xsum & 0xffff);
992}
993
994
995void
996NetSetEther(volatile uchar * xet, uchar * addr, uint prot)
997{
998 Ethernet_t *et = (Ethernet_t *)xet;
999
1000 memcpy (et->et_dest, addr, 6);
1001 memcpy (et->et_src, NetOurEther, 6);
1002 et->et_protlen = htons(prot);
1003}
1004
1005
1006void
1007NetSetIP(volatile uchar * xip, IPaddr_t dest, int dport, int sport, int len)
1008{
1009 volatile IP_t *ip = (IP_t *)xip;
1010
1011 /*
1012 * If the data is an odd number of bytes, zero the
1013 * byte after the last byte so that the checksum
1014 * will work.
1015 */
1016 if (len & 1)
1017 xip[IP_HDR_SIZE + len] = 0;
1018
1019 /*
1020 * Construct an IP and UDP header.
1021 (need to set no fragment bit - XXX)
1022 */
1023 ip->ip_hl_v = 0x45; /* IP_HDR_SIZE / 4 (not including UDP) */
1024 ip->ip_tos = 0;
1025 ip->ip_len = htons(IP_HDR_SIZE + len);
1026 ip->ip_id = htons(NetIPID++);
1027 ip->ip_off = htons(0x4000); /* No fragmentation */
1028 ip->ip_ttl = 255;
1029 ip->ip_p = 17; /* UDP */
1030 ip->ip_sum = 0;
1031 NetCopyIP((void*)&ip->ip_src, &NetOurIP); /* already in network byte order */
1032 NetCopyIP((void*)&ip->ip_dst, &dest); /* - "" - */
1033 ip->udp_src = htons(sport);
1034 ip->udp_dst = htons(dport);
1035 ip->udp_len = htons(8 + len);
1036 ip->udp_xsum = 0;
1037 ip->ip_sum = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2);
1038}
1039
1040void copy_filename (uchar *dst, uchar *src, int size)
1041{
1042 if (*src && (*src == '"')) {
1043 ++src;
1044 --size;
1045 }
1046
1047 while ((--size > 0) && *src && (*src != '"')) {
1048 *dst++ = *src++;
1049 }
1050 *dst = '\0';
1051}
1052
1053#endif /* CFG_CMD_NET */
1054
1055void ip_to_string (IPaddr_t x, char *s)
1056{
1057 x = ntohl(x);
1058 sprintf (s,"%d.%d.%d.%d",
wdenk8bde7f72003-06-27 21:31:46 +00001059 (int)((x >> 24) & 0xff),
wdenk2d966952002-10-31 22:12:35 +00001060 (int)((x >> 16) & 0xff),
1061 (int)((x >> 8) & 0xff),
1062 (int)((x >> 0) & 0xff)
1063 );
1064}
1065
wdenk73a8b272003-06-05 19:27:42 +00001066IPaddr_t string_to_ip(char *s)
wdenk2d966952002-10-31 22:12:35 +00001067{
1068 IPaddr_t addr;
wdenk73a8b272003-06-05 19:27:42 +00001069 char *e;
wdenk2d966952002-10-31 22:12:35 +00001070 int i;
1071
wdenk73a8b272003-06-05 19:27:42 +00001072 if (s == NULL)
1073 return(0);
wdenk2d966952002-10-31 22:12:35 +00001074
1075 for (addr=0, i=0; i<4; ++i) {
1076 ulong val = s ? simple_strtoul(s, &e, 10) : 0;
1077 addr <<= 8;
1078 addr |= (val & 0xFF);
1079 if (s) {
1080 s = (*e) ? e+1 : e;
1081 }
1082 }
1083
1084 return (htonl(addr));
1085}
wdenk73a8b272003-06-05 19:27:42 +00001086
1087void print_IPaddr (IPaddr_t x)
1088{
1089 char tmp[16];
1090
1091 ip_to_string(x, tmp);
1092
1093 puts(tmp);
1094}
1095
1096IPaddr_t getenv_IPaddr (char *var)
1097{
1098 return (string_to_ip(getenv(var)));
1099}