blob: b9cb67b25cefc0435fb8bfdde267196f549e1d6b [file] [log] [blame]
wdenk2d966952002-10-31 22:12:35 +00001/*
2 * Copied from Linux Monitor (LiMon) - Networking.
3 *
4 * Copyright 1994 - 2000 Neil Russell.
5 * (See License)
6 * Copyright 2000 Roland Borde
7 * Copyright 2000 Paolo Scaffardi
8 * Copyright 2000-2002 Wolfgang Denk, wd@denx.de
9 */
10
11/*
12 * General Desription:
13 *
14 * The user interface supports commands for BOOTP, RARP, and TFTP.
15 * Also, we support ARP internally. Depending on available data,
16 * these interact as follows:
17 *
18 * BOOTP:
19 *
20 * Prerequisites: - own ethernet address
21 * We want: - own IP address
22 * - TFTP server IP address
23 * - name of bootfile
24 * Next step: ARP
25 *
26 * RARP:
27 *
28 * Prerequisites: - own ethernet address
29 * We want: - own IP address
30 * - TFTP server IP address
31 * Next step: ARP
32 *
33 * ARP:
34 *
35 * Prerequisites: - own ethernet address
36 * - own IP address
37 * - TFTP server IP address
38 * We want: - TFTP server ethernet address
39 * Next step: TFTP
40 *
41 * DHCP:
42 *
43 * Prerequisites: - own ethernet address
44 * We want: - IP, Netmask, ServerIP, Gateway IP
45 * - bootfilename, lease time
46 * Next step: - TFTP
47 *
48 * TFTP:
49 *
50 * Prerequisites: - own ethernet address
51 * - own IP address
52 * - TFTP server IP address
53 * - TFTP server ethernet address
54 * - name of bootfile (if unknown, we use a default name
55 * derived from our own IP address)
56 * We want: - load the boot file
57 * Next step: none
58 */
59
60
61#include <common.h>
62#include <watchdog.h>
63#include <command.h>
64#include <net.h>
65#include "bootp.h"
66#include "tftp.h"
67#include "rarp.h"
68#include "arp.h"
69
70#if (CONFIG_COMMANDS & CFG_CMD_NET)
71
72#if 0
73#define ET_DEBUG
74#endif
75
76/** BOOTP EXTENTIONS **/
77
78IPaddr_t NetOurSubnetMask=0; /* Our subnet mask (0=unknown) */
79IPaddr_t NetOurGatewayIP=0; /* Our gateways IP address */
80IPaddr_t NetOurDNSIP=0; /* Our DNS IP address */
81char NetOurNISDomain[32]={0,}; /* Our NIS domain */
82char NetOurHostName[32]={0,}; /* Our hostname */
83char NetOurRootPath[64]={0,}; /* Our bootpath */
84ushort NetBootFileSize=0; /* Our bootfile size in blocks */
85
86/** END OF BOOTP EXTENTIONS **/
87
88ulong NetBootFileXferSize; /* The actual transferred size of the bootfile (in bytes) */
89uchar NetOurEther[6]; /* Our ethernet address */
90uchar NetServerEther[6] = /* Boot server enet address */
91 { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
92IPaddr_t NetOurIP; /* Our IP addr (0 = unknown) */
93IPaddr_t NetServerIP; /* Our IP addr (0 = unknown) */
94volatile uchar *NetRxPkt; /* Current receive packet */
95int NetRxPktLen; /* Current rx packet length */
96unsigned NetIPID; /* IP packet ID */
97uchar NetBcastAddr[6] = /* Ethernet bcast address */
98 { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
99int NetState; /* Network loop state */
100#ifdef CONFIG_NET_MULTI
101int NetRestartWrap = 0; /* Tried all network devices */
102static int NetRestarted = 0; /* Network loop restarted */
103static int NetDevExists = 0; /* At least one device configured */
104#endif
105
106char BootFile[128]; /* Boot File name */
107
108volatile uchar PktBuf[(PKTBUFSRX+1) * PKTSIZE_ALIGN + PKTALIGN];
109
110volatile uchar *NetRxPackets[PKTBUFSRX]; /* Receive packets */
111
112static rxhand_f *packetHandler; /* Current RX packet handler */
113static thand_f *timeHandler; /* Current timeout handler */
114static ulong timeValue; /* Current timeout value */
115volatile uchar *NetTxPacket = 0; /* THE transmit packet */
116
117static int net_check_prereq (proto_t protocol);
118
119/**********************************************************************/
120/*
121 * Main network processing loop.
122 */
123
124int
125NetLoop(proto_t protocol)
126{
127 DECLARE_GLOBAL_DATA_PTR;
128
129 bd_t *bd = gd->bd;
130
131#ifdef CONFIG_NET_MULTI
132 NetRestarted = 0;
133 NetDevExists = 0;
134#endif
135
136 if (!NetTxPacket) {
137 int i;
138
139 /*
140 * Setup packet buffers, aligned correctly.
141 */
142 NetTxPacket = &PktBuf[0] + (PKTALIGN - 1);
143 NetTxPacket -= (ulong)NetTxPacket % PKTALIGN;
144 for (i = 0; i < PKTBUFSRX; i++) {
145 NetRxPackets[i] = NetTxPacket + (i+1)*PKTSIZE_ALIGN;
146 }
147 }
148
149 eth_halt();
150 eth_init(bd);
151
152restart:
153#ifdef CONFIG_NET_MULTI
154 memcpy (NetOurEther, eth_get_dev()->enetaddr, 6);
155#else
156 memcpy (NetOurEther, bd->bi_enetaddr, 6);
157#endif
158
159 NetState = NETLOOP_CONTINUE;
160
161 /*
162 * Start the ball rolling with the given start function. From
163 * here on, this code is a state machine driven by received
164 * packets and timer events.
165 */
166
167 switch (protocol) {
168 case TFTP:
169 NetCopyIP(&NetOurIP, &bd->bi_ip_addr);
170 NetServerIP = getenv_IPaddr ("serverip");
171 NetOurGatewayIP = getenv_IPaddr ("gatewayip");
172 NetOurSubnetMask= getenv_IPaddr ("netmask");
173 break;
174 case BOOTP:
175 case RARP:
176 /*
177 * initialize our IP addr to 0 in order to accept ANY
178 * IP addr assigned to us by the BOOTP / RARP server
179 */
180 NetOurIP = 0;
181 NetServerIP = 0;
182 break;
183 default:
184 break;
185 }
186
187 switch (net_check_prereq (protocol)) {
188 case 1:
189 /* network not configured */
wdenk1d0350e2002-11-11 21:14:20 +0000190 return (-1);
wdenk2d966952002-10-31 22:12:35 +0000191
192#ifdef CONFIG_NET_MULTI
193 case 2:
194 /* network device not configured */
195 break;
196#endif /* CONFIG_NET_MULTI */
197
198 case 0:
199#ifdef CONFIG_NET_MULTI
200 NetDevExists = 1;
201#endif
202 switch (protocol) {
203 case TFTP:
204 /* always use ARP to get server ethernet address */
205 ArpTry = 0;
206 ArpRequest ();
207 break;
208
209#if (CONFIG_COMMANDS & CFG_CMD_DHCP)
210 case DHCP:
211 /* Start with a clean slate... */
212 NetOurIP = 0;
213 NetServerIP = 0;
214 DhcpRequest(); /* Basically same as BOOTP */
215 break;
216#endif /* CFG_CMD_DHCP */
217
218 case BOOTP:
219 BootpTry = 0;
220 BootpRequest ();
221 break;
222
223 case RARP:
224 RarpTry = 0;
225 RarpRequest ();
226 break;
227 default:
228 break;
229 }
230
231 NetBootFileXferSize = 0;
232 break;
233 }
234
235
236 /*
237 * Main packet reception loop. Loop receiving packets until
238 * someone sets `NetQuit'.
239 */
240 for (;;) {
241 WATCHDOG_RESET();
242#ifdef CONFIG_SHOW_ACTIVITY
243 {
244 extern void show_activity(int arg);
245 show_activity(1);
246 }
247#endif
248 /*
249 * Check the ethernet for a new packet. The ethernet
250 * receive routine will process it.
251 */
252 eth_rx();
253
254 /*
255 * Abort if ctrl-c was pressed.
256 */
257 if (ctrlc()) {
258 eth_halt();
259 printf("\nAbort\n");
wdenk1d0350e2002-11-11 21:14:20 +0000260 return (-1);
wdenk2d966952002-10-31 22:12:35 +0000261 }
262
263
264 /*
265 * Check for a timeout, and run the timeout handler
266 * if we have one.
267 */
268 if (timeHandler && (get_timer(0) > timeValue)) {
269 thand_f *x;
270
271 x = timeHandler;
272 timeHandler = (thand_f *)0;
273 (*x)();
274 }
275
276
277 switch (NetState) {
278
279 case NETLOOP_RESTART:
280#ifdef CONFIG_NET_MULTI
281 NetRestarted = 1;
282#endif
283 goto restart;
284
285 case NETLOOP_SUCCESS:
286 if (NetBootFileXferSize > 0) {
287 char buf[10];
288 printf("Bytes transferred = %ld (%lx hex)\n",
289 NetBootFileXferSize,
290 NetBootFileXferSize);
291 sprintf(buf, "%lx", NetBootFileXferSize);
292 setenv("filesize", buf);
293 }
294 eth_halt();
295 return NetBootFileXferSize;
296
297 case NETLOOP_FAIL:
wdenk1d0350e2002-11-11 21:14:20 +0000298 return (-1);
wdenk2d966952002-10-31 22:12:35 +0000299 }
300 }
301}
302
303/**********************************************************************/
304
305static void
306startAgainTimeout(void)
307{
308 NetState = NETLOOP_RESTART;
309}
310
311static void
312startAgainHandler(uchar * pkt, unsigned dest, unsigned src, unsigned len)
313{
314 /* Totally ignore the packet */
315}
316
317void
318NetStartAgain(void)
319{
320#ifndef CONFIG_NET_MULTI
321 NetSetTimeout(10 * CFG_HZ, startAgainTimeout);
322 NetSetHandler(startAgainHandler);
323#else
324 DECLARE_GLOBAL_DATA_PTR;
325
326 eth_halt();
327 eth_try_another(!NetRestarted);
328 eth_init(gd->bd);
329 if (NetRestartWrap)
330 {
331 NetRestartWrap = 0;
332 if (NetDevExists)
333 {
334 NetSetTimeout(10 * CFG_HZ, startAgainTimeout);
335 NetSetHandler(startAgainHandler);
336 }
337 else
338 {
339 NetState = NETLOOP_FAIL;
340 }
341 }
342 else
343 {
344 NetState = NETLOOP_RESTART;
345 }
346#endif
347}
348
349/**********************************************************************/
350/*
351 * Miscelaneous bits.
352 */
353
354void
355NetSetHandler(rxhand_f * f)
356{
357 packetHandler = f;
358}
359
360
361void
362NetSetTimeout(int iv, thand_f * f)
363{
364 if (iv == 0) {
365 timeHandler = (thand_f *)0;
366 } else {
367 timeHandler = f;
368 timeValue = get_timer(0) + iv;
369 }
370}
371
372
373void
374NetSendPacket(volatile uchar * pkt, int len)
375{
376 (void) eth_send(pkt, len);
377}
378
379
380
381void
382NetReceive(volatile uchar * pkt, int len)
383{
384 Ethernet_t *et;
385 IP_t *ip;
386 ARP_t *arp;
387 IPaddr_t tmp;
388 int x;
389
390
391 NetRxPkt = pkt;
392 NetRxPktLen = len;
393 et = (Ethernet_t *)pkt;
394
395 x = ntohs(et->et_protlen);
396
397 if (x < 1514) {
398 /*
399 * Got a 802 packet. Check the other protocol field.
400 */
401 x = ntohs(et->et_prot);
402 ip = (IP_t *)(pkt + E802_HDR_SIZE);
403 len -= E802_HDR_SIZE;
404 } else {
405 ip = (IP_t *)(pkt + ETHER_HDR_SIZE);
406 len -= ETHER_HDR_SIZE;
407 }
408
409#ifdef ET_DEBUG
410 printf("Receive from protocol 0x%x\n", x);
411#endif
412
413 switch (x) {
414
415 case PROT_ARP:
416 /*
417 * We have to deal with two types of ARP packets:
418 * - REQUEST packets will be answered by sending our
419 * IP address - if we know it.
420 * - REPLY packates are expected only after we asked
421 * for the TFTP server's or the gateway's ethernet
422 * address; so if we receive such a packet, we set
423 * the server ethernet address
424 */
425#ifdef ET_DEBUG
426 printf("Got ARP\n");
427#endif
428 arp = (ARP_t *)ip;
429 if (len < ARP_HDR_SIZE) {
430 printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
431 return;
432 }
433 if (ntohs(arp->ar_hrd) != ARP_ETHER) {
434 return;
435 }
436 if (ntohs(arp->ar_pro) != PROT_IP) {
437 return;
438 }
439 if (arp->ar_hln != 6) {
440 return;
441 }
442 if (arp->ar_pln != 4) {
443 return;
444 }
445
446 if (NetOurIP == 0) {
447 return;
448 }
449
450 if (NetReadIP(&arp->ar_data[16]) != NetOurIP) {
451 return;
452 }
453
454 switch (ntohs(arp->ar_op)) {
455 case ARPOP_REQUEST: /* reply with our IP address */
456#ifdef ET_DEBUG
457 printf("Got ARP REQUEST, return our IP\n");
458#endif
459 NetSetEther((uchar *)et, et->et_src, PROT_ARP);
460 arp->ar_op = htons(ARPOP_REPLY);
461 memcpy (&arp->ar_data[10], &arp->ar_data[0], 6);
462 NetCopyIP(&arp->ar_data[16], &arp->ar_data[6]);
463 memcpy (&arp->ar_data[ 0], NetOurEther, 6);
464 NetCopyIP(&arp->ar_data[ 6], &NetOurIP);
465 NetSendPacket((uchar *)et,((uchar *)arp-pkt)+ARP_HDR_SIZE);
466 return;
467 case ARPOP_REPLY: /* set TFTP server eth addr */
468#ifdef ET_DEBUG
469 printf("Got ARP REPLY, set server/gtwy eth addr\n");
470#endif
471 memcpy (NetServerEther, &arp->ar_data[0], 6);
472 (*packetHandler)(0,0,0,0); /* start TFTP */
473 return;
474 default:
475#ifdef ET_DEBUG
476 printf("Unexpected ARP opcode 0x%x\n", ntohs(arp->ar_op));
477#endif
478 return;
479 }
480
481 case PROT_RARP:
482#ifdef ET_DEBUG
483 printf("Got RARP\n");
484#endif
485 arp = (ARP_t *)ip;
486 if (len < ARP_HDR_SIZE) {
487 printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
488 return;
489 }
490
491 if ((ntohs(arp->ar_op) != RARPOP_REPLY) ||
492 (ntohs(arp->ar_hrd) != ARP_ETHER) ||
493 (ntohs(arp->ar_pro) != PROT_IP) ||
494 (arp->ar_hln != 6) || (arp->ar_pln != 4)) {
495
496 printf("invalid RARP header\n");
497 } else {
498 NetCopyIP(&NetOurIP, &arp->ar_data[16]);
499 NetCopyIP(&NetServerIP, &arp->ar_data[ 6]);
500 memcpy (NetServerEther, &arp->ar_data[ 0], 6);
501
502 (*packetHandler)(0,0,0,0);
503 }
504 break;
505
506 case PROT_IP:
507#ifdef ET_DEBUG
508 printf("Got IP\n");
509#endif
510 if (len < IP_HDR_SIZE) {
511 debug ("len bad %d < %d\n", len, IP_HDR_SIZE);
512 return;
513 }
514 if (len < ntohs(ip->ip_len)) {
515 printf("len bad %d < %d\n", len, ntohs(ip->ip_len));
516 return;
517 }
518 len = ntohs(ip->ip_len);
519#ifdef ET_DEBUG
520 printf("len=%d, v=%02x\n", len, ip->ip_hl_v & 0xff);
521#endif
522 if ((ip->ip_hl_v & 0xf0) != 0x40) {
523 return;
524 }
525 if (ip->ip_off & htons(0x1fff)) { /* Can't deal w/ fragments */
526 return;
527 }
528 if (!NetCksumOk((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2)) {
529 printf("checksum bad\n");
530 return;
531 }
532 tmp = NetReadIP(&ip->ip_dst);
533 if (NetOurIP && tmp != NetOurIP && tmp != 0xFFFFFFFF) {
534 return;
535 }
536 /*
537 * watch for ICMP host redirects
538 *
539 * There is no real handler code (yet). We just watch
540 * for ICMP host redirect messages. In case anybody
541 * sees these messages: please contact me
542 * (wd@denx.de), or - even better - send me the
543 * necessary fixes :-)
544 *
545 * Note: in all cases where I have seen this so far
546 * it was a problem with the router configuration,
547 * for instance when a router was configured in the
548 * BOOTP reply, but the TFTP server was on the same
549 * subnet. So this is probably a warning that your
550 * configuration might be wrong. But I'm not really
551 * sure if there aren't any other situations.
552 */
553 if (ip->ip_p == IPPROTO_ICMP) {
554 ICMP_t *icmph = (ICMP_t *)&(ip->udp_src);
555
556 if (icmph->type != ICMP_REDIRECT)
557 return;
558 if (icmph->code != ICMP_REDIR_HOST)
559 return;
560 puts (" ICMP Host Redirect to ");
561 print_IPaddr(icmph->un.gateway);
562 putc(' ');
563 } else if (ip->ip_p != IPPROTO_UDP) { /* Only UDP packets */
564 return;
565 }
566
567 /*
568 * IP header OK. Pass the packet to the current handler.
569 */
570 (*packetHandler)((uchar *)ip +IP_HDR_SIZE,
571 ntohs(ip->udp_dst),
572 ntohs(ip->udp_src),
573 ntohs(ip->udp_len) - 8);
574
575 break;
576 }
577}
578
579
580/**********************************************************************/
581
582static int net_check_prereq (proto_t protocol)
583{
584 switch (protocol) {
585 case ARP: /* nothing to do */
586 break;
587
588 case TFTP:
589 if (NetServerIP == 0) {
590 puts ("*** ERROR: `serverip' not set\n");
591 return (1);
592 }
593
594 if (NetOurIP == 0) {
595 puts ("*** ERROR: `ipaddr' not set\n");
596 return (1);
597 }
598 /* Fall through */
599
600 case DHCP:
601 case RARP:
602 case BOOTP:
603 if (memcmp(NetOurEther, "\0\0\0\0\0\0", 6) == 0) {
604#ifdef CONFIG_NET_MULTI
605 extern int eth_get_dev_index (void);
606 int num = eth_get_dev_index();
607
608 switch (num) {
609 case -1:
610 puts ("*** ERROR: No ethernet found.\n");
611 return (1);
612 case 0:
613 puts ("*** ERROR: `ethaddr' not set\n");
614 break;
615 default:
616 printf ("*** ERROR: `eth%daddr' not set\n",
617 num);
618 break;
619 }
620
621 NetStartAgain ();
622 return (2);
623#else
624 puts ("*** ERROR: `ethaddr' not set\n");
625 return (1);
626#endif
627 }
628 /* Fall through */
629 }
630 return (0); /* OK */
631}
632/**********************************************************************/
633
634int
635NetCksumOk(uchar * ptr, int len)
636{
637 return !((NetCksum(ptr, len) + 1) & 0xfffe);
638}
639
640
641unsigned
642NetCksum(uchar * ptr, int len)
643{
644 ulong xsum;
645
646 xsum = 0;
647 while (len-- > 0)
648 xsum += *((ushort *)ptr)++;
649 xsum = (xsum & 0xffff) + (xsum >> 16);
650 xsum = (xsum & 0xffff) + (xsum >> 16);
651 return (xsum & 0xffff);
652}
653
654
655void
656NetSetEther(volatile uchar * xet, uchar * addr, uint prot)
657{
658 Ethernet_t *et = (Ethernet_t *)xet;
659
660 memcpy (et->et_dest, addr, 6);
661 memcpy (et->et_src, NetOurEther, 6);
662 et->et_protlen = htons(prot);
663}
664
665
666void
667NetSetIP(volatile uchar * xip, IPaddr_t dest, int dport, int sport, int len)
668{
669 volatile IP_t *ip = (IP_t *)xip;
670
671 /*
672 * If the data is an odd number of bytes, zero the
673 * byte after the last byte so that the checksum
674 * will work.
675 */
676 if (len & 1)
677 xip[IP_HDR_SIZE + len] = 0;
678
679 /*
680 * Construct an IP and UDP header.
681 (need to set no fragment bit - XXX)
682 */
683 ip->ip_hl_v = 0x45; /* IP_HDR_SIZE / 4 (not including UDP) */
684 ip->ip_tos = 0;
685 ip->ip_len = htons(IP_HDR_SIZE + len);
686 ip->ip_id = htons(NetIPID++);
687 ip->ip_off = htons(0x4000); /* No fragmentation */
688 ip->ip_ttl = 255;
689 ip->ip_p = 17; /* UDP */
690 ip->ip_sum = 0;
691 NetCopyIP((void*)&ip->ip_src, &NetOurIP); /* already in network byte order */
692 NetCopyIP((void*)&ip->ip_dst, &dest); /* - "" - */
693 ip->udp_src = htons(sport);
694 ip->udp_dst = htons(dport);
695 ip->udp_len = htons(8 + len);
696 ip->udp_xsum = 0;
697 ip->ip_sum = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2);
698}
699
700void copy_filename (uchar *dst, uchar *src, int size)
701{
702 if (*src && (*src == '"')) {
703 ++src;
704 --size;
705 }
706
707 while ((--size > 0) && *src && (*src != '"')) {
708 *dst++ = *src++;
709 }
710 *dst = '\0';
711}
712
713#endif /* CFG_CMD_NET */
714
715void ip_to_string (IPaddr_t x, char *s)
716{
717 x = ntohl(x);
718 sprintf (s,"%d.%d.%d.%d",
719 (int)((x >> 24) & 0xff),
720 (int)((x >> 16) & 0xff),
721 (int)((x >> 8) & 0xff),
722 (int)((x >> 0) & 0xff)
723 );
724}
725
726void print_IPaddr (IPaddr_t x)
727{
728 char tmp[16];
729
730 ip_to_string(x, tmp);
731
732 puts(tmp);
733}
734
735IPaddr_t getenv_IPaddr (char *var)
736{
737 IPaddr_t addr;
738 char *s, *e;
739 int i;
740
741 s = getenv (var);
742
743 for (addr=0, i=0; i<4; ++i) {
744 ulong val = s ? simple_strtoul(s, &e, 10) : 0;
745 addr <<= 8;
746 addr |= (val & 0xFF);
747 if (s) {
748 s = (*e) ? e+1 : e;
749 }
750 }
751
752 return (htonl(addr));
753}