TFTP: add tftpsrv command
[platform/kernel/u-boot.git] / net / net.c
1 /*
2  *      Copied from Linux Monitor (LiMon) - Networking.
3  *
4  *      Copyright 1994 - 2000 Neil Russell.
5  *      (See License)
6  *      Copyright 2000 Roland Borde
7  *      Copyright 2000 Paolo Scaffardi
8  *      Copyright 2000-2002 Wolfgang Denk, wd@denx.de
9  */
10
11 /*
12  * General Desription:
13  *
14  * The user interface supports commands for BOOTP, RARP, and TFTP.
15  * Also, we support ARP internally. Depending on available data,
16  * these interact as follows:
17  *
18  * BOOTP:
19  *
20  *      Prerequisites:  - own ethernet address
21  *      We want:        - own IP address
22  *                      - TFTP server IP address
23  *                      - name of bootfile
24  *      Next step:      ARP
25  *
26  * RARP:
27  *
28  *      Prerequisites:  - own ethernet address
29  *      We want:        - own IP address
30  *                      - TFTP server IP address
31  *      Next step:      ARP
32  *
33  * ARP:
34  *
35  *      Prerequisites:  - own ethernet address
36  *                      - own IP address
37  *                      - TFTP server IP address
38  *      We want:        - TFTP server ethernet address
39  *      Next step:      TFTP
40  *
41  * DHCP:
42  *
43  *     Prerequisites:   - own ethernet address
44  *     We want:         - IP, Netmask, ServerIP, Gateway IP
45  *                      - bootfilename, lease time
46  *     Next step:       - TFTP
47  *
48  * TFTP:
49  *
50  *      Prerequisites:  - own ethernet address
51  *                      - own IP address
52  *                      - TFTP server IP address
53  *                      - TFTP server ethernet address
54  *                      - name of bootfile (if unknown, we use a default name
55  *                        derived from our own IP address)
56  *      We want:        - load the boot file
57  *      Next step:      none
58  *
59  * NFS:
60  *
61  *      Prerequisites:  - own ethernet address
62  *                      - own IP address
63  *                      - name of bootfile (if unknown, we use a default name
64  *                        derived from our own IP address)
65  *      We want:        - load the boot file
66  *      Next step:      none
67  *
68  * SNTP:
69  *
70  *      Prerequisites:  - own ethernet address
71  *                      - own IP address
72  *      We want:        - network time
73  *      Next step:      none
74  */
75
76
77 #include <common.h>
78 #include <watchdog.h>
79 #include <command.h>
80 #include <net.h>
81 #include "bootp.h"
82 #include "tftp.h"
83 #ifdef CONFIG_CMD_RARP
84 #include "rarp.h"
85 #endif
86 #include "nfs.h"
87 #ifdef CONFIG_STATUS_LED
88 #include <status_led.h>
89 #include <miiphy.h>
90 #endif
91 #if defined(CONFIG_CMD_SNTP)
92 #include "sntp.h"
93 #endif
94 #if defined(CONFIG_CDP_VERSION)
95 #include <timestamp.h>
96 #endif
97 #if defined(CONFIG_CMD_DNS)
98 #include "dns.h"
99 #endif
100
101 DECLARE_GLOBAL_DATA_PTR;
102
103 #ifndef CONFIG_ARP_TIMEOUT
104 /* Milliseconds before trying ARP again */
105 # define ARP_TIMEOUT            5000UL
106 #else
107 # define ARP_TIMEOUT            CONFIG_ARP_TIMEOUT
108 #endif
109
110
111 #ifndef CONFIG_NET_RETRY_COUNT
112 # define ARP_TIMEOUT_COUNT      5       /* # of timeouts before giving up  */
113 #else
114 # define ARP_TIMEOUT_COUNT      CONFIG_NET_RETRY_COUNT
115 #endif
116
117 /** BOOTP EXTENTIONS **/
118
119 /* Our subnet mask (0=unknown) */
120 IPaddr_t        NetOurSubnetMask;
121 /* Our gateways IP address */
122 IPaddr_t        NetOurGatewayIP;
123 /* Our DNS IP address */
124 IPaddr_t        NetOurDNSIP;
125 #if defined(CONFIG_BOOTP_DNS2)
126 /* Our 2nd DNS IP address */
127 IPaddr_t        NetOurDNS2IP;
128 #endif
129 /* Our NIS domain */
130 char            NetOurNISDomain[32] = {0,};
131 /* Our hostname */
132 char            NetOurHostName[32] = {0,};
133 /* Our bootpath */
134 char            NetOurRootPath[64] = {0,};
135 /* Our bootfile size in blocks */
136 ushort          NetBootFileSize;
137
138 #ifdef CONFIG_MCAST_TFTP        /* Multicast TFTP */
139 IPaddr_t Mcast_addr;
140 #endif
141
142 /** END OF BOOTP EXTENTIONS **/
143
144 /* The actual transferred size of the bootfile (in bytes) */
145 ulong           NetBootFileXferSize;
146 /* Our ethernet address */
147 uchar           NetOurEther[6];
148 /* Boot server enet address */
149 uchar           NetServerEther[6];
150 /* Our IP addr (0 = unknown) */
151 IPaddr_t        NetOurIP;
152 /* Server IP addr (0 = unknown) */
153 IPaddr_t        NetServerIP;
154 /* Current receive packet */
155 volatile uchar *NetRxPacket;
156 /* Current rx packet length */
157 int             NetRxPacketLen;
158 /* IP packet ID */
159 unsigned        NetIPID;
160 /* Ethernet bcast address */
161 uchar           NetBcastAddr[6] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
162 uchar           NetEtherNullAddr[6];
163 #ifdef CONFIG_API
164 void            (*push_packet)(volatile void *, int len) = 0;
165 #endif
166 #if defined(CONFIG_CMD_CDP)
167 /* Ethernet bcast address */
168 uchar           NetCDPAddr[6] = { 0x01, 0x00, 0x0c, 0xcc, 0xcc, 0xcc };
169 #endif
170 /* Network loop state */
171 int             NetState;
172 #ifdef CONFIG_NET_MULTI
173 /* Tried all network devices */
174 int             NetRestartWrap;
175 /* Network loop restarted */
176 static int      NetRestarted;
177 /* At least one device configured */
178 static int      NetDevExists;
179 #endif
180
181 /* XXX in both little & big endian machines 0xFFFF == ntohs(-1) */
182 /* default is without VLAN */
183 ushort          NetOurVLAN = 0xFFFF;
184 /* ditto */
185 ushort          NetOurNativeVLAN = 0xFFFF;
186
187 /* Boot File name */
188 char            BootFile[128];
189
190 #if defined(CONFIG_CMD_PING)
191 /* the ip address to ping */
192 IPaddr_t        NetPingIP;
193
194 static void PingStart(void);
195 #endif
196
197 #if defined(CONFIG_CMD_CDP)
198 static void CDPStart(void);
199 #endif
200
201 #if defined(CONFIG_CMD_SNTP)
202 /* NTP server IP address */
203 IPaddr_t        NetNtpServerIP;
204 /* offset time from UTC */
205 int             NetTimeOffset;
206 #endif
207
208 #ifdef CONFIG_NETCONSOLE
209 void NcStart(void);
210 int nc_input_packet(uchar *pkt, unsigned dest, unsigned src, unsigned len);
211 #endif
212
213 volatile uchar  PktBuf[(PKTBUFSRX+1) * PKTSIZE_ALIGN + PKTALIGN];
214
215 /* Receive packet */
216 volatile uchar *NetRxPackets[PKTBUFSRX];
217
218 /* Current RX packet handler */
219 static rxhand_f *packetHandler;
220 /* Current timeout handler */
221 static thand_f *timeHandler;
222 /* Time base value */
223 static ulong    timeStart;
224 /* Current timeout value */
225 static ulong    timeDelta;
226 /* THE transmit packet */
227 volatile uchar *NetTxPacket;
228
229 static int net_check_prereq(proto_t protocol);
230
231 static int NetTryCount;
232
233 /**********************************************************************/
234
235 IPaddr_t        NetArpWaitPacketIP;
236 IPaddr_t        NetArpWaitReplyIP;
237 /* MAC address of waiting packet's destination */
238 uchar          *NetArpWaitPacketMAC;
239 /* THE transmit packet */
240 uchar          *NetArpWaitTxPacket;
241 int             NetArpWaitTxPacketSize;
242 uchar           NetArpWaitPacketBuf[PKTSIZE_ALIGN + PKTALIGN];
243 ulong           NetArpWaitTimerStart;
244 int             NetArpWaitTry;
245
246 void ArpRequest(void)
247 {
248         int i;
249         volatile uchar *pkt;
250         ARP_t *arp;
251
252         debug("ARP broadcast %d\n", NetArpWaitTry);
253
254         pkt = NetTxPacket;
255
256         pkt += NetSetEther(pkt, NetBcastAddr, PROT_ARP);
257
258         arp = (ARP_t *) pkt;
259
260         arp->ar_hrd = htons(ARP_ETHER);
261         arp->ar_pro = htons(PROT_IP);
262         arp->ar_hln = 6;
263         arp->ar_pln = 4;
264         arp->ar_op = htons(ARPOP_REQUEST);
265
266         /* source ET addr */
267         memcpy(&arp->ar_data[0], NetOurEther, 6);
268         /* source IP addr */
269         NetWriteIP((uchar *) &arp->ar_data[6], NetOurIP);
270         for (i = 10; i < 16; ++i) {
271                 /* dest ET addr = 0 */
272                 arp->ar_data[i] = 0;
273         }
274
275         if ((NetArpWaitPacketIP & NetOurSubnetMask) !=
276             (NetOurIP & NetOurSubnetMask)) {
277                 if (NetOurGatewayIP == 0) {
278                         puts("## Warning: gatewayip needed but not set\n");
279                         NetArpWaitReplyIP = NetArpWaitPacketIP;
280                 } else {
281                         NetArpWaitReplyIP = NetOurGatewayIP;
282                 }
283         } else {
284                 NetArpWaitReplyIP = NetArpWaitPacketIP;
285         }
286
287         NetWriteIP((uchar *) &arp->ar_data[16], NetArpWaitReplyIP);
288         (void) eth_send(NetTxPacket, (pkt - NetTxPacket) + ARP_HDR_SIZE);
289 }
290
291 void ArpTimeoutCheck(void)
292 {
293         ulong t;
294
295         if (!NetArpWaitPacketIP)
296                 return;
297
298         t = get_timer(0);
299
300         /* check for arp timeout */
301         if ((t - NetArpWaitTimerStart) > ARP_TIMEOUT) {
302                 NetArpWaitTry++;
303
304                 if (NetArpWaitTry >= ARP_TIMEOUT_COUNT) {
305                         puts("\nARP Retry count exceeded; starting again\n");
306                         NetArpWaitTry = 0;
307                         NetStartAgain();
308                 } else {
309                         NetArpWaitTimerStart = t;
310                         ArpRequest();
311                 }
312         }
313 }
314
315 static void
316 NetInitLoop(proto_t protocol)
317 {
318         static int env_changed_id;
319         bd_t *bd = gd->bd;
320         int env_id = get_env_id();
321
322         /* update only when the environment has changed */
323         if (env_changed_id != env_id) {
324                 NetCopyIP(&NetOurIP, &bd->bi_ip_addr);
325                 NetOurGatewayIP = getenv_IPaddr("gatewayip");
326                 NetOurSubnetMask = getenv_IPaddr("netmask");
327                 NetServerIP = getenv_IPaddr("serverip");
328                 NetOurNativeVLAN = getenv_VLAN("nvlan");
329                 NetOurVLAN = getenv_VLAN("vlan");
330 #if defined(CONFIG_CMD_DNS)
331                 NetOurDNSIP = getenv_IPaddr("dnsip");
332 #endif
333                 env_changed_id = env_id;
334         }
335
336         return;
337 }
338
339 /**********************************************************************/
340 /*
341  *      Main network processing loop.
342  */
343
344 int
345 NetLoop(proto_t protocol)
346 {
347         bd_t *bd = gd->bd;
348
349 #ifdef CONFIG_NET_MULTI
350         NetRestarted = 0;
351         NetDevExists = 0;
352 #endif
353
354         /* XXX problem with bss workaround */
355         NetArpWaitPacketMAC = NULL;
356         NetArpWaitTxPacket = NULL;
357         NetArpWaitPacketIP = 0;
358         NetArpWaitReplyIP = 0;
359         NetArpWaitTxPacket = NULL;
360         NetTxPacket = NULL;
361         NetTryCount = 1;
362
363         if (!NetTxPacket) {
364                 int     i;
365                 /*
366                  *      Setup packet buffers, aligned correctly.
367                  */
368                 NetTxPacket = &PktBuf[0] + (PKTALIGN - 1);
369                 NetTxPacket -= (ulong)NetTxPacket % PKTALIGN;
370                 for (i = 0; i < PKTBUFSRX; i++)
371                         NetRxPackets[i] = NetTxPacket + (i+1)*PKTSIZE_ALIGN;
372         }
373
374         if (!NetArpWaitTxPacket) {
375                 NetArpWaitTxPacket = &NetArpWaitPacketBuf[0] + (PKTALIGN - 1);
376                 NetArpWaitTxPacket -= (ulong)NetArpWaitTxPacket % PKTALIGN;
377                 NetArpWaitTxPacketSize = 0;
378         }
379
380         eth_halt();
381 #ifdef CONFIG_NET_MULTI
382         eth_set_current();
383 #endif
384         if (eth_init(bd) < 0) {
385                 eth_halt();
386                 return -1;
387         }
388
389 restart:
390 #ifdef CONFIG_NET_MULTI
391         memcpy(NetOurEther, eth_get_dev()->enetaddr, 6);
392 #else
393         eth_getenv_enetaddr("ethaddr", NetOurEther);
394 #endif
395
396         NetState = NETLOOP_CONTINUE;
397
398         /*
399          *      Start the ball rolling with the given start function.  From
400          *      here on, this code is a state machine driven by received
401          *      packets and timer events.
402          */
403         NetInitLoop(protocol);
404
405         switch (net_check_prereq(protocol)) {
406         case 1:
407                 /* network not configured */
408                 eth_halt();
409                 return -1;
410
411 #ifdef CONFIG_NET_MULTI
412         case 2:
413                 /* network device not configured */
414                 break;
415 #endif /* CONFIG_NET_MULTI */
416
417         case 0:
418 #ifdef CONFIG_NET_MULTI
419                 NetDevExists = 1;
420 #endif
421                 switch (protocol) {
422                 case TFTP:
423                         /* always use ARP to get server ethernet address */
424                         TftpStart();
425                         break;
426 #ifdef CONFIG_CMD_TFTPSRV
427                 case TFTPSRV:
428                         TftpStartServer();
429                         break;
430 #endif
431 #if defined(CONFIG_CMD_DHCP)
432                 case DHCP:
433                         BootpTry = 0;
434                         NetOurIP = 0;
435                         DhcpRequest();          /* Basically same as BOOTP */
436                         break;
437 #endif
438
439                 case BOOTP:
440                         BootpTry = 0;
441                         NetOurIP = 0;
442                         BootpRequest();
443                         break;
444
445 #if defined(CONFIG_CMD_RARP)
446                 case RARP:
447                         RarpTry = 0;
448                         NetOurIP = 0;
449                         RarpRequest();
450                         break;
451 #endif
452 #if defined(CONFIG_CMD_PING)
453                 case PING:
454                         PingStart();
455                         break;
456 #endif
457 #if defined(CONFIG_CMD_NFS)
458                 case NFS:
459                         NfsStart();
460                         break;
461 #endif
462 #if defined(CONFIG_CMD_CDP)
463                 case CDP:
464                         CDPStart();
465                         break;
466 #endif
467 #ifdef CONFIG_NETCONSOLE
468                 case NETCONS:
469                         NcStart();
470                         break;
471 #endif
472 #if defined(CONFIG_CMD_SNTP)
473                 case SNTP:
474                         SntpStart();
475                         break;
476 #endif
477 #if defined(CONFIG_CMD_DNS)
478                 case DNS:
479                         DnsStart();
480                         break;
481 #endif
482                 default:
483                         break;
484                 }
485
486                 NetBootFileXferSize = 0;
487                 break;
488         }
489
490 #if defined(CONFIG_MII) || defined(CONFIG_CMD_MII)
491 #if     defined(CONFIG_SYS_FAULT_ECHO_LINK_DOWN)        && \
492         defined(CONFIG_STATUS_LED)                      && \
493         defined(STATUS_LED_RED)
494         /*
495          * Echo the inverted link state to the fault LED.
496          */
497         if (miiphy_link(eth_get_dev()->name, CONFIG_SYS_FAULT_MII_ADDR))
498                 status_led_set(STATUS_LED_RED, STATUS_LED_OFF);
499         else
500                 status_led_set(STATUS_LED_RED, STATUS_LED_ON);
501 #endif /* CONFIG_SYS_FAULT_ECHO_LINK_DOWN, ... */
502 #endif /* CONFIG_MII, ... */
503
504         /*
505          *      Main packet reception loop.  Loop receiving packets until
506          *      someone sets `NetState' to a state that terminates.
507          */
508         for (;;) {
509                 WATCHDOG_RESET();
510 #ifdef CONFIG_SHOW_ACTIVITY
511                 {
512                         extern void show_activity(int arg);
513                         show_activity(1);
514                 }
515 #endif
516                 /*
517                  *      Check the ethernet for a new packet.  The ethernet
518                  *      receive routine will process it.
519                  */
520                 eth_rx();
521
522                 /*
523                  *      Abort if ctrl-c was pressed.
524                  */
525                 if (ctrlc()) {
526                         eth_halt();
527                         puts("\nAbort\n");
528                         return -1;
529                 }
530
531                 ArpTimeoutCheck();
532
533                 /*
534                  *      Check for a timeout, and run the timeout handler
535                  *      if we have one.
536                  */
537                 if (timeHandler && ((get_timer(0) - timeStart) > timeDelta)) {
538                         thand_f *x;
539
540 #if defined(CONFIG_MII) || defined(CONFIG_CMD_MII)
541 #if     defined(CONFIG_SYS_FAULT_ECHO_LINK_DOWN)        && \
542         defined(CONFIG_STATUS_LED)                      && \
543         defined(STATUS_LED_RED)
544                         /*
545                          * Echo the inverted link state to the fault LED.
546                          */
547                         if (miiphy_link(eth_get_dev()->name,
548                                        CONFIG_SYS_FAULT_MII_ADDR)) {
549                                 status_led_set(STATUS_LED_RED, STATUS_LED_OFF);
550                         } else {
551                                 status_led_set(STATUS_LED_RED, STATUS_LED_ON);
552                         }
553 #endif /* CONFIG_SYS_FAULT_ECHO_LINK_DOWN, ... */
554 #endif /* CONFIG_MII, ... */
555                         x = timeHandler;
556                         timeHandler = (thand_f *)0;
557                         (*x)();
558                 }
559
560
561                 switch (NetState) {
562
563                 case NETLOOP_RESTART:
564 #ifdef CONFIG_NET_MULTI
565                         NetRestarted = 1;
566 #endif
567                         goto restart;
568
569                 case NETLOOP_SUCCESS:
570                         if (NetBootFileXferSize > 0) {
571                                 char buf[20];
572                                 printf("Bytes transferred = %ld (%lx hex)\n",
573                                         NetBootFileXferSize,
574                                         NetBootFileXferSize);
575                                 sprintf(buf, "%lX", NetBootFileXferSize);
576                                 setenv("filesize", buf);
577
578                                 sprintf(buf, "%lX", (unsigned long)load_addr);
579                                 setenv("fileaddr", buf);
580                         }
581                         eth_halt();
582                         return NetBootFileXferSize;
583
584                 case NETLOOP_FAIL:
585                         return -1;
586                 }
587         }
588 }
589
590 /**********************************************************************/
591
592 static void
593 startAgainTimeout(void)
594 {
595         NetState = NETLOOP_RESTART;
596 }
597
598 static void
599 startAgainHandler(uchar *pkt, unsigned dest, IPaddr_t sip,
600                   unsigned src, unsigned len)
601 {
602         /* Totally ignore the packet */
603 }
604
605 void NetStartAgain(void)
606 {
607         char *nretry;
608         int retry_forever = 0;
609         unsigned long retrycnt = 0;
610
611         nretry = getenv("netretry");
612         if (nretry) {
613                 if (!strcmp(nretry, "yes"))
614                         retry_forever = 1;
615                 else if (!strcmp(nretry, "no"))
616                         retrycnt = 0;
617                 else if (!strcmp(nretry, "once"))
618                         retrycnt = 1;
619                 else
620                         retrycnt = simple_strtoul(nretry, NULL, 0);
621         } else
622                 retry_forever = 1;
623
624         if ((!retry_forever) && (NetTryCount >= retrycnt)) {
625                 eth_halt();
626                 NetState = NETLOOP_FAIL;
627                 return;
628         }
629
630         NetTryCount++;
631
632 #ifndef CONFIG_NET_MULTI
633         NetSetTimeout(10000UL, startAgainTimeout);
634         NetSetHandler(startAgainHandler);
635 #else   /* !CONFIG_NET_MULTI*/
636         eth_halt();
637 #if !defined(CONFIG_NET_DO_NOT_TRY_ANOTHER)
638         eth_try_another(!NetRestarted);
639 #endif
640         eth_init(gd->bd);
641         if (NetRestartWrap) {
642                 NetRestartWrap = 0;
643                 if (NetDevExists) {
644                         NetSetTimeout(10000UL, startAgainTimeout);
645                         NetSetHandler(startAgainHandler);
646                 } else {
647                         NetState = NETLOOP_FAIL;
648                 }
649         } else {
650                 NetState = NETLOOP_RESTART;
651         }
652 #endif  /* CONFIG_NET_MULTI */
653 }
654
655 /**********************************************************************/
656 /*
657  *      Miscelaneous bits.
658  */
659
660 void
661 NetSetHandler(rxhand_f *f)
662 {
663         packetHandler = f;
664 }
665
666
667 void
668 NetSetTimeout(ulong iv, thand_f *f)
669 {
670         if (iv == 0) {
671                 timeHandler = (thand_f *)0;
672         } else {
673                 timeHandler = f;
674                 timeStart = get_timer(0);
675                 timeDelta = iv;
676         }
677 }
678
679
680 void
681 NetSendPacket(volatile uchar *pkt, int len)
682 {
683         (void) eth_send(pkt, len);
684 }
685
686 int
687 NetSendUDPPacket(uchar *ether, IPaddr_t dest, int dport, int sport, int len)
688 {
689         uchar *pkt;
690
691         /* convert to new style broadcast */
692         if (dest == 0)
693                 dest = 0xFFFFFFFF;
694
695         /* if broadcast, make the ether address a broadcast and don't do ARP */
696         if (dest == 0xFFFFFFFF)
697                 ether = NetBcastAddr;
698
699         /*
700          * if MAC address was not discovered yet, save the packet and do
701          * an ARP request
702          */
703         if (memcmp(ether, NetEtherNullAddr, 6) == 0) {
704
705                 debug("sending ARP for %08lx\n", dest);
706
707                 NetArpWaitPacketIP = dest;
708                 NetArpWaitPacketMAC = ether;
709
710                 pkt = NetArpWaitTxPacket;
711                 pkt += NetSetEther(pkt, NetArpWaitPacketMAC, PROT_IP);
712
713                 NetSetIP(pkt, dest, dport, sport, len);
714                 memcpy(pkt + IP_HDR_SIZE, (uchar *)NetTxPacket +
715                        (pkt - (uchar *)NetArpWaitTxPacket) + IP_HDR_SIZE, len);
716
717                 /* size of the waiting packet */
718                 NetArpWaitTxPacketSize = (pkt - NetArpWaitTxPacket) +
719                         IP_HDR_SIZE + len;
720
721                 /* and do the ARP request */
722                 NetArpWaitTry = 1;
723                 NetArpWaitTimerStart = get_timer(0);
724                 ArpRequest();
725                 return 1;       /* waiting */
726         }
727
728         debug("sending UDP to %08lx/%pM\n", dest, ether);
729
730         pkt = (uchar *)NetTxPacket;
731         pkt += NetSetEther(pkt, ether, PROT_IP);
732         NetSetIP(pkt, dest, dport, sport, len);
733         (void) eth_send(NetTxPacket, (pkt - NetTxPacket) + IP_HDR_SIZE + len);
734
735         return 0;       /* transmitted */
736 }
737
738 #if defined(CONFIG_CMD_PING)
739 static ushort PingSeqNo;
740
741 int PingSend(void)
742 {
743         static uchar mac[6];
744         volatile IP_t *ip;
745         volatile ushort *s;
746         uchar *pkt;
747
748         /* XXX always send arp request */
749
750         memcpy(mac, NetEtherNullAddr, 6);
751
752         debug("sending ARP for %08lx\n", NetPingIP);
753
754         NetArpWaitPacketIP = NetPingIP;
755         NetArpWaitPacketMAC = mac;
756
757         pkt = NetArpWaitTxPacket;
758         pkt += NetSetEther(pkt, mac, PROT_IP);
759
760         ip = (volatile IP_t *)pkt;
761
762         /*
763          * Construct an IP and ICMP header.
764          * (need to set no fragment bit - XXX)
765          */
766         /* IP_HDR_SIZE / 4 (not including UDP) */
767         ip->ip_hl_v  = 0x45;
768         ip->ip_tos   = 0;
769         ip->ip_len   = htons(IP_HDR_SIZE_NO_UDP + 8);
770         ip->ip_id    = htons(NetIPID++);
771         ip->ip_off   = htons(IP_FLAGS_DFRAG);   /* Don't fragment */
772         ip->ip_ttl   = 255;
773         ip->ip_p     = 0x01;            /* ICMP */
774         ip->ip_sum   = 0;
775         /* already in network byte order */
776         NetCopyIP((void *)&ip->ip_src, &NetOurIP);
777         /* - "" - */
778         NetCopyIP((void *)&ip->ip_dst, &NetPingIP);
779         ip->ip_sum   = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2);
780
781         s = &ip->udp_src;               /* XXX ICMP starts here */
782         s[0] = htons(0x0800);           /* echo-request, code */
783         s[1] = 0;                       /* checksum */
784         s[2] = 0;                       /* identifier */
785         s[3] = htons(PingSeqNo++);      /* sequence number */
786         s[1] = ~NetCksum((uchar *)s, 8/2);
787
788         /* size of the waiting packet */
789         NetArpWaitTxPacketSize =
790                 (pkt - NetArpWaitTxPacket) + IP_HDR_SIZE_NO_UDP + 8;
791
792         /* and do the ARP request */
793         NetArpWaitTry = 1;
794         NetArpWaitTimerStart = get_timer(0);
795         ArpRequest();
796         return 1;       /* waiting */
797 }
798
799 static void
800 PingTimeout(void)
801 {
802         eth_halt();
803         NetState = NETLOOP_FAIL;        /* we did not get the reply */
804 }
805
806 static void
807 PingHandler(uchar *pkt, unsigned dest, IPaddr_t sip, unsigned src,
808             unsigned len)
809 {
810         if (sip != NetPingIP)
811                 return;
812
813         NetState = NETLOOP_SUCCESS;
814 }
815
816 static void PingStart(void)
817 {
818 #if defined(CONFIG_NET_MULTI)
819         printf("Using %s device\n", eth_get_name());
820 #endif  /* CONFIG_NET_MULTI */
821         NetSetTimeout(10000UL, PingTimeout);
822         NetSetHandler(PingHandler);
823
824         PingSend();
825 }
826 #endif
827
828 #if defined(CONFIG_CMD_CDP)
829
830 #define CDP_DEVICE_ID_TLV               0x0001
831 #define CDP_ADDRESS_TLV                 0x0002
832 #define CDP_PORT_ID_TLV                 0x0003
833 #define CDP_CAPABILITIES_TLV            0x0004
834 #define CDP_VERSION_TLV                 0x0005
835 #define CDP_PLATFORM_TLV                0x0006
836 #define CDP_NATIVE_VLAN_TLV             0x000a
837 #define CDP_APPLIANCE_VLAN_TLV          0x000e
838 #define CDP_TRIGGER_TLV                 0x000f
839 #define CDP_POWER_CONSUMPTION_TLV       0x0010
840 #define CDP_SYSNAME_TLV                 0x0014
841 #define CDP_SYSOBJECT_TLV               0x0015
842 #define CDP_MANAGEMENT_ADDRESS_TLV      0x0016
843
844 #define CDP_TIMEOUT                     250UL   /* one packet every 250ms */
845
846 static int CDPSeq;
847 static int CDPOK;
848
849 ushort CDPNativeVLAN;
850 ushort CDPApplianceVLAN;
851
852 static const uchar CDP_SNAP_hdr[8] = { 0xAA, 0xAA, 0x03, 0x00, 0x00, 0x0C, 0x20,
853                                        0x00 };
854
855 static ushort CDP_compute_csum(const uchar *buff, ushort len)
856 {
857         ushort csum;
858         int     odd;
859         ulong   result = 0;
860         ushort  leftover;
861         ushort *p;
862
863         if (len > 0) {
864                 odd = 1 & (ulong)buff;
865                 if (odd) {
866                         result = *buff << 8;
867                         len--;
868                         buff++;
869                 }
870                 while (len > 1) {
871                         p = (ushort *)buff;
872                         result += *p++;
873                         buff = (uchar *)p;
874                         if (result & 0x80000000)
875                                 result = (result & 0xFFFF) + (result >> 16);
876                         len -= 2;
877                 }
878                 if (len) {
879                         leftover = (signed short)(*(const signed char *)buff);
880                         /* CISCO SUCKS big time! (and blows too):
881                          * CDP uses the IP checksum algorithm with a twist;
882                          * for the last byte it *sign* extends and sums.
883                          */
884                         result = (result & 0xffff0000) |
885                                  ((result + leftover) & 0x0000ffff);
886                 }
887                 while (result >> 16)
888                         result = (result & 0xFFFF) + (result >> 16);
889
890                 if (odd)
891                         result = ((result >> 8) & 0xff) |
892                                  ((result & 0xff) << 8);
893         }
894
895         /* add up 16-bit and 17-bit words for 17+c bits */
896         result = (result & 0xffff) + (result >> 16);
897         /* add up 16-bit and 2-bit for 16+c bit */
898         result = (result & 0xffff) + (result >> 16);
899         /* add up carry.. */
900         result = (result & 0xffff) + (result >> 16);
901
902         /* negate */
903         csum = ~(ushort)result;
904
905         /* run time endian detection */
906         if (csum != htons(csum))        /* little endian */
907                 csum = htons(csum);
908
909         return csum;
910 }
911
912 int CDPSendTrigger(void)
913 {
914         volatile uchar *pkt;
915         volatile ushort *s;
916         volatile ushort *cp;
917         Ethernet_t *et;
918         int len;
919         ushort chksum;
920 #if     defined(CONFIG_CDP_DEVICE_ID) || defined(CONFIG_CDP_PORT_ID)   || \
921         defined(CONFIG_CDP_VERSION)   || defined(CONFIG_CDP_PLATFORM)
922         char buf[32];
923 #endif
924
925         pkt = NetTxPacket;
926         et = (Ethernet_t *)pkt;
927
928         /* NOTE: trigger sent not on any VLAN */
929
930         /* form ethernet header */
931         memcpy(et->et_dest, NetCDPAddr, 6);
932         memcpy(et->et_src, NetOurEther, 6);
933
934         pkt += ETHER_HDR_SIZE;
935
936         /* SNAP header */
937         memcpy((uchar *)pkt, CDP_SNAP_hdr, sizeof(CDP_SNAP_hdr));
938         pkt += sizeof(CDP_SNAP_hdr);
939
940         /* CDP header */
941         *pkt++ = 0x02;                          /* CDP version 2 */
942         *pkt++ = 180;                           /* TTL */
943         s = (volatile ushort *)pkt;
944         cp = s;
945         /* checksum (0 for later calculation) */
946         *s++ = htons(0);
947
948         /* CDP fields */
949 #ifdef CONFIG_CDP_DEVICE_ID
950         *s++ = htons(CDP_DEVICE_ID_TLV);
951         *s++ = htons(CONFIG_CDP_DEVICE_ID);
952         sprintf(buf, CONFIG_CDP_DEVICE_ID_PREFIX "%pm", NetOurEther);
953         memcpy((uchar *)s, buf, 16);
954         s += 16 / 2;
955 #endif
956
957 #ifdef CONFIG_CDP_PORT_ID
958         *s++ = htons(CDP_PORT_ID_TLV);
959         memset(buf, 0, sizeof(buf));
960         sprintf(buf, CONFIG_CDP_PORT_ID, eth_get_dev_index());
961         len = strlen(buf);
962         if (len & 1)    /* make it even */
963                 len++;
964         *s++ = htons(len + 4);
965         memcpy((uchar *)s, buf, len);
966         s += len / 2;
967 #endif
968
969 #ifdef CONFIG_CDP_CAPABILITIES
970         *s++ = htons(CDP_CAPABILITIES_TLV);
971         *s++ = htons(8);
972         *(ulong *)s = htonl(CONFIG_CDP_CAPABILITIES);
973         s += 2;
974 #endif
975
976 #ifdef CONFIG_CDP_VERSION
977         *s++ = htons(CDP_VERSION_TLV);
978         memset(buf, 0, sizeof(buf));
979         strcpy(buf, CONFIG_CDP_VERSION);
980         len = strlen(buf);
981         if (len & 1)    /* make it even */
982                 len++;
983         *s++ = htons(len + 4);
984         memcpy((uchar *)s, buf, len);
985         s += len / 2;
986 #endif
987
988 #ifdef CONFIG_CDP_PLATFORM
989         *s++ = htons(CDP_PLATFORM_TLV);
990         memset(buf, 0, sizeof(buf));
991         strcpy(buf, CONFIG_CDP_PLATFORM);
992         len = strlen(buf);
993         if (len & 1)    /* make it even */
994                 len++;
995         *s++ = htons(len + 4);
996         memcpy((uchar *)s, buf, len);
997         s += len / 2;
998 #endif
999
1000 #ifdef CONFIG_CDP_TRIGGER
1001         *s++ = htons(CDP_TRIGGER_TLV);
1002         *s++ = htons(8);
1003         *(ulong *)s = htonl(CONFIG_CDP_TRIGGER);
1004         s += 2;
1005 #endif
1006
1007 #ifdef CONFIG_CDP_POWER_CONSUMPTION
1008         *s++ = htons(CDP_POWER_CONSUMPTION_TLV);
1009         *s++ = htons(6);
1010         *s++ = htons(CONFIG_CDP_POWER_CONSUMPTION);
1011 #endif
1012
1013         /* length of ethernet packet */
1014         len = (uchar *)s - ((uchar *)NetTxPacket + ETHER_HDR_SIZE);
1015         et->et_protlen = htons(len);
1016
1017         len = ETHER_HDR_SIZE + sizeof(CDP_SNAP_hdr);
1018         chksum = CDP_compute_csum((uchar *)NetTxPacket + len,
1019                                   (uchar *)s - (NetTxPacket + len));
1020         if (chksum == 0)
1021                 chksum = 0xFFFF;
1022         *cp = htons(chksum);
1023
1024         (void) eth_send(NetTxPacket, (uchar *)s - NetTxPacket);
1025         return 0;
1026 }
1027
1028 static void
1029 CDPTimeout(void)
1030 {
1031         CDPSeq++;
1032
1033         if (CDPSeq < 3) {
1034                 NetSetTimeout(CDP_TIMEOUT, CDPTimeout);
1035                 CDPSendTrigger();
1036                 return;
1037         }
1038
1039         /* if not OK try again */
1040         if (!CDPOK)
1041                 NetStartAgain();
1042         else
1043                 NetState = NETLOOP_SUCCESS;
1044 }
1045
1046 static void
1047 CDPDummyHandler(uchar *pkt, unsigned dest, IPaddr_t sip, unsigned src,
1048                 unsigned len)
1049 {
1050         /* nothing */
1051 }
1052
1053 static void
1054 CDPHandler(const uchar *pkt, unsigned len)
1055 {
1056         const uchar *t;
1057         const ushort *ss;
1058         ushort type, tlen;
1059         uchar applid;
1060         ushort vlan, nvlan;
1061
1062         /* minimum size? */
1063         if (len < sizeof(CDP_SNAP_hdr) + 4)
1064                 goto pkt_short;
1065
1066         /* check for valid CDP SNAP header */
1067         if (memcmp(pkt, CDP_SNAP_hdr, sizeof(CDP_SNAP_hdr)) != 0)
1068                 return;
1069
1070         pkt += sizeof(CDP_SNAP_hdr);
1071         len -= sizeof(CDP_SNAP_hdr);
1072
1073         /* Version of CDP protocol must be >= 2 and TTL != 0 */
1074         if (pkt[0] < 0x02 || pkt[1] == 0)
1075                 return;
1076
1077         /*
1078          * if version is greater than 0x02 maybe we'll have a problem;
1079          * output a warning
1080          */
1081         if (pkt[0] != 0x02)
1082                 printf("** WARNING: CDP packet received with a protocol version %d > 2\n",
1083                                 pkt[0] & 0xff);
1084
1085         if (CDP_compute_csum(pkt, len) != 0)
1086                 return;
1087
1088         pkt += 4;
1089         len -= 4;
1090
1091         vlan = htons(-1);
1092         nvlan = htons(-1);
1093         while (len > 0) {
1094                 if (len < 4)
1095                         goto pkt_short;
1096
1097                 ss = (const ushort *)pkt;
1098                 type = ntohs(ss[0]);
1099                 tlen = ntohs(ss[1]);
1100                 if (tlen > len)
1101                         goto pkt_short;
1102
1103                 pkt += tlen;
1104                 len -= tlen;
1105
1106                 ss += 2;        /* point ss to the data of the TLV */
1107                 tlen -= 4;
1108
1109                 switch (type) {
1110                 case CDP_DEVICE_ID_TLV:
1111                         break;
1112                 case CDP_ADDRESS_TLV:
1113                         break;
1114                 case CDP_PORT_ID_TLV:
1115                         break;
1116                 case CDP_CAPABILITIES_TLV:
1117                         break;
1118                 case CDP_VERSION_TLV:
1119                         break;
1120                 case CDP_PLATFORM_TLV:
1121                         break;
1122                 case CDP_NATIVE_VLAN_TLV:
1123                         nvlan = *ss;
1124                         break;
1125                 case CDP_APPLIANCE_VLAN_TLV:
1126                         t = (const uchar *)ss;
1127                         while (tlen > 0) {
1128                                 if (tlen < 3)
1129                                         goto pkt_short;
1130
1131                                 applid = t[0];
1132                                 ss = (const ushort *)(t + 1);
1133
1134 #ifdef CONFIG_CDP_APPLIANCE_VLAN_TYPE
1135                                 if (applid == CONFIG_CDP_APPLIANCE_VLAN_TYPE)
1136                                         vlan = *ss;
1137 #else
1138                                 /* XXX will this work; dunno */
1139                                 vlan = ntohs(*ss);
1140 #endif
1141                                 t += 3; tlen -= 3;
1142                         }
1143                         break;
1144                 case CDP_TRIGGER_TLV:
1145                         break;
1146                 case CDP_POWER_CONSUMPTION_TLV:
1147                         break;
1148                 case CDP_SYSNAME_TLV:
1149                         break;
1150                 case CDP_SYSOBJECT_TLV:
1151                         break;
1152                 case CDP_MANAGEMENT_ADDRESS_TLV:
1153                         break;
1154                 }
1155         }
1156
1157         CDPApplianceVLAN = vlan;
1158         CDPNativeVLAN = nvlan;
1159
1160         CDPOK = 1;
1161         return;
1162
1163  pkt_short:
1164         printf("** CDP packet is too short\n");
1165         return;
1166 }
1167
1168 static void CDPStart(void)
1169 {
1170 #if defined(CONFIG_NET_MULTI)
1171         printf("Using %s device\n", eth_get_name());
1172 #endif
1173         CDPSeq = 0;
1174         CDPOK = 0;
1175
1176         CDPNativeVLAN = htons(-1);
1177         CDPApplianceVLAN = htons(-1);
1178
1179         NetSetTimeout(CDP_TIMEOUT, CDPTimeout);
1180         NetSetHandler(CDPDummyHandler);
1181
1182         CDPSendTrigger();
1183 }
1184 #endif
1185
1186 #ifdef CONFIG_IP_DEFRAG
1187 /*
1188  * This function collects fragments in a single packet, according
1189  * to the algorithm in RFC815. It returns NULL or the pointer to
1190  * a complete packet, in static storage
1191  */
1192 #ifndef CONFIG_NET_MAXDEFRAG
1193 #define CONFIG_NET_MAXDEFRAG 16384
1194 #endif
1195 /*
1196  * MAXDEFRAG, above, is chosen in the config file and  is real data
1197  * so we need to add the NFS overhead, which is more than TFTP.
1198  * To use sizeof in the internal unnamed structures, we need a real
1199  * instance (can't do "sizeof(struct rpc_t.u.reply))", unfortunately).
1200  * The compiler doesn't complain nor allocates the actual structure
1201  */
1202 static struct rpc_t rpc_specimen;
1203 #define IP_PKTSIZE (CONFIG_NET_MAXDEFRAG + sizeof(rpc_specimen.u.reply))
1204
1205 #define IP_MAXUDP (IP_PKTSIZE - IP_HDR_SIZE_NO_UDP)
1206
1207 /*
1208  * this is the packet being assembled, either data or frag control.
1209  * Fragments go by 8 bytes, so this union must be 8 bytes long
1210  */
1211 struct hole {
1212         /* first_byte is address of this structure */
1213         u16 last_byte;  /* last byte in this hole + 1 (begin of next hole) */
1214         u16 next_hole;  /* index of next (in 8-b blocks), 0 == none */
1215         u16 prev_hole;  /* index of prev, 0 == none */
1216         u16 unused;
1217 };
1218
1219 static IP_t *__NetDefragment(IP_t *ip, int *lenp)
1220 {
1221         static uchar pkt_buff[IP_PKTSIZE] __attribute__((aligned(PKTALIGN)));
1222         static u16 first_hole, total_len;
1223         struct hole *payload, *thisfrag, *h, *newh;
1224         IP_t *localip = (IP_t *)pkt_buff;
1225         uchar *indata = (uchar *)ip;
1226         int offset8, start, len, done = 0;
1227         u16 ip_off = ntohs(ip->ip_off);
1228
1229         /* payload starts after IP header, this fragment is in there */
1230         payload = (struct hole *)(pkt_buff + IP_HDR_SIZE_NO_UDP);
1231         offset8 =  (ip_off & IP_OFFS);
1232         thisfrag = payload + offset8;
1233         start = offset8 * 8;
1234         len = ntohs(ip->ip_len) - IP_HDR_SIZE_NO_UDP;
1235
1236         if (start + len > IP_MAXUDP) /* fragment extends too far */
1237                 return NULL;
1238
1239         if (!total_len || localip->ip_id != ip->ip_id) {
1240                 /* new (or different) packet, reset structs */
1241                 total_len = 0xffff;
1242                 payload[0].last_byte = ~0;
1243                 payload[0].next_hole = 0;
1244                 payload[0].prev_hole = 0;
1245                 first_hole = 0;
1246                 /* any IP header will work, copy the first we received */
1247                 memcpy(localip, ip, IP_HDR_SIZE_NO_UDP);
1248         }
1249
1250         /*
1251          * What follows is the reassembly algorithm. We use the payload
1252          * array as a linked list of hole descriptors, as each hole starts
1253          * at a multiple of 8 bytes. However, last byte can be whatever value,
1254          * so it is represented as byte count, not as 8-byte blocks.
1255          */
1256
1257         h = payload + first_hole;
1258         while (h->last_byte < start) {
1259                 if (!h->next_hole) {
1260                         /* no hole that far away */
1261                         return NULL;
1262                 }
1263                 h = payload + h->next_hole;
1264         }
1265
1266         /* last fragment may be 1..7 bytes, the "+7" forces acceptance */
1267         if (offset8 + ((len + 7) / 8) <= h - payload) {
1268                 /* no overlap with holes (dup fragment?) */
1269                 return NULL;
1270         }
1271
1272         if (!(ip_off & IP_FLAGS_MFRAG)) {
1273                 /* no more fragmentss: truncate this (last) hole */
1274                 total_len = start + len;
1275                 h->last_byte = start + len;
1276         }
1277
1278         /*
1279          * There is some overlap: fix the hole list. This code doesn't
1280          * deal with a fragment that overlaps with two different holes
1281          * (thus being a superset of a previously-received fragment).
1282          */
1283
1284         if ((h >= thisfrag) && (h->last_byte <= start + len)) {
1285                 /* complete overlap with hole: remove hole */
1286                 if (!h->prev_hole && !h->next_hole) {
1287                         /* last remaining hole */
1288                         done = 1;
1289                 } else if (!h->prev_hole) {
1290                         /* first hole */
1291                         first_hole = h->next_hole;
1292                         payload[h->next_hole].prev_hole = 0;
1293                 } else if (!h->next_hole) {
1294                         /* last hole */
1295                         payload[h->prev_hole].next_hole = 0;
1296                 } else {
1297                         /* in the middle of the list */
1298                         payload[h->next_hole].prev_hole = h->prev_hole;
1299                         payload[h->prev_hole].next_hole = h->next_hole;
1300                 }
1301
1302         } else if (h->last_byte <= start + len) {
1303                 /* overlaps with final part of the hole: shorten this hole */
1304                 h->last_byte = start;
1305
1306         } else if (h >= thisfrag) {
1307                 /* overlaps with initial part of the hole: move this hole */
1308                 newh = thisfrag + (len / 8);
1309                 *newh = *h;
1310                 h = newh;
1311                 if (h->next_hole)
1312                         payload[h->next_hole].prev_hole = (h - payload);
1313                 if (h->prev_hole)
1314                         payload[h->prev_hole].next_hole = (h - payload);
1315                 else
1316                         first_hole = (h - payload);
1317
1318         } else {
1319                 /* fragment sits in the middle: split the hole */
1320                 newh = thisfrag + (len / 8);
1321                 *newh = *h;
1322                 h->last_byte = start;
1323                 h->next_hole = (newh - payload);
1324                 newh->prev_hole = (h - payload);
1325                 if (newh->next_hole)
1326                         payload[newh->next_hole].prev_hole = (newh - payload);
1327         }
1328
1329         /* finally copy this fragment and possibly return whole packet */
1330         memcpy((uchar *)thisfrag, indata + IP_HDR_SIZE_NO_UDP, len);
1331         if (!done)
1332                 return NULL;
1333
1334         localip->ip_len = htons(total_len);
1335         *lenp = total_len + IP_HDR_SIZE_NO_UDP;
1336         return localip;
1337 }
1338
1339 static inline IP_t *NetDefragment(IP_t *ip, int *lenp)
1340 {
1341         u16 ip_off = ntohs(ip->ip_off);
1342         if (!(ip_off & (IP_OFFS | IP_FLAGS_MFRAG)))
1343                 return ip; /* not a fragment */
1344         return __NetDefragment(ip, lenp);
1345 }
1346
1347 #else /* !CONFIG_IP_DEFRAG */
1348
1349 static inline IP_t *NetDefragment(IP_t *ip, int *lenp)
1350 {
1351         u16 ip_off = ntohs(ip->ip_off);
1352         if (!(ip_off & (IP_OFFS | IP_FLAGS_MFRAG)))
1353                 return ip; /* not a fragment */
1354         return NULL;
1355 }
1356 #endif
1357
1358 void
1359 NetReceive(volatile uchar *inpkt, int len)
1360 {
1361         Ethernet_t *et;
1362         IP_t    *ip;
1363         ARP_t   *arp;
1364         IPaddr_t tmp;
1365         IPaddr_t src_ip;
1366         int     x;
1367         uchar *pkt;
1368 #if defined(CONFIG_CMD_CDP)
1369         int iscdp;
1370 #endif
1371         ushort cti = 0, vlanid = VLAN_NONE, myvlanid, mynvlanid;
1372
1373         debug("packet received\n");
1374
1375         NetRxPacket = inpkt;
1376         NetRxPacketLen = len;
1377         et = (Ethernet_t *)inpkt;
1378
1379         /* too small packet? */
1380         if (len < ETHER_HDR_SIZE)
1381                 return;
1382
1383 #ifdef CONFIG_API
1384         if (push_packet) {
1385                 (*push_packet)(inpkt, len);
1386                 return;
1387         }
1388 #endif
1389
1390 #if defined(CONFIG_CMD_CDP)
1391         /* keep track if packet is CDP */
1392         iscdp = memcmp(et->et_dest, NetCDPAddr, 6) == 0;
1393 #endif
1394
1395         myvlanid = ntohs(NetOurVLAN);
1396         if (myvlanid == (ushort)-1)
1397                 myvlanid = VLAN_NONE;
1398         mynvlanid = ntohs(NetOurNativeVLAN);
1399         if (mynvlanid == (ushort)-1)
1400                 mynvlanid = VLAN_NONE;
1401
1402         x = ntohs(et->et_protlen);
1403
1404         debug("packet received\n");
1405
1406         if (x < 1514) {
1407                 /*
1408                  *      Got a 802 packet.  Check the other protocol field.
1409                  */
1410                 x = ntohs(et->et_prot);
1411
1412                 ip = (IP_t *)(inpkt + E802_HDR_SIZE);
1413                 len -= E802_HDR_SIZE;
1414
1415         } else if (x != PROT_VLAN) {    /* normal packet */
1416                 ip = (IP_t *)(inpkt + ETHER_HDR_SIZE);
1417                 len -= ETHER_HDR_SIZE;
1418
1419         } else {                        /* VLAN packet */
1420                 VLAN_Ethernet_t *vet = (VLAN_Ethernet_t *)et;
1421
1422                 debug("VLAN packet received\n");
1423
1424                 /* too small packet? */
1425                 if (len < VLAN_ETHER_HDR_SIZE)
1426                         return;
1427
1428                 /* if no VLAN active */
1429                 if ((ntohs(NetOurVLAN) & VLAN_IDMASK) == VLAN_NONE
1430 #if defined(CONFIG_CMD_CDP)
1431                                 && iscdp == 0
1432 #endif
1433                                 )
1434                         return;
1435
1436                 cti = ntohs(vet->vet_tag);
1437                 vlanid = cti & VLAN_IDMASK;
1438                 x = ntohs(vet->vet_type);
1439
1440                 ip = (IP_t *)(inpkt + VLAN_ETHER_HDR_SIZE);
1441                 len -= VLAN_ETHER_HDR_SIZE;
1442         }
1443
1444         debug("Receive from protocol 0x%x\n", x);
1445
1446 #if defined(CONFIG_CMD_CDP)
1447         if (iscdp) {
1448                 CDPHandler((uchar *)ip, len);
1449                 return;
1450         }
1451 #endif
1452
1453         if ((myvlanid & VLAN_IDMASK) != VLAN_NONE) {
1454                 if (vlanid == VLAN_NONE)
1455                         vlanid = (mynvlanid & VLAN_IDMASK);
1456                 /* not matched? */
1457                 if (vlanid != (myvlanid & VLAN_IDMASK))
1458                         return;
1459         }
1460
1461         switch (x) {
1462
1463         case PROT_ARP:
1464                 /*
1465                  * We have to deal with two types of ARP packets:
1466                  * - REQUEST packets will be answered by sending  our
1467                  *   IP address - if we know it.
1468                  * - REPLY packates are expected only after we asked
1469                  *   for the TFTP server's or the gateway's ethernet
1470                  *   address; so if we receive such a packet, we set
1471                  *   the server ethernet address
1472                  */
1473                 debug("Got ARP\n");
1474
1475                 arp = (ARP_t *)ip;
1476                 if (len < ARP_HDR_SIZE) {
1477                         printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
1478                         return;
1479                 }
1480                 if (ntohs(arp->ar_hrd) != ARP_ETHER)
1481                         return;
1482                 if (ntohs(arp->ar_pro) != PROT_IP)
1483                         return;
1484                 if (arp->ar_hln != 6)
1485                         return;
1486                 if (arp->ar_pln != 4)
1487                         return;
1488
1489                 if (NetOurIP == 0)
1490                         return;
1491
1492                 if (NetReadIP(&arp->ar_data[16]) != NetOurIP)
1493                         return;
1494
1495                 switch (ntohs(arp->ar_op)) {
1496                 case ARPOP_REQUEST:
1497                         /* reply with our IP address */
1498                         debug("Got ARP REQUEST, return our IP\n");
1499                         pkt = (uchar *)et;
1500                         pkt += NetSetEther(pkt, et->et_src, PROT_ARP);
1501                         arp->ar_op = htons(ARPOP_REPLY);
1502                         memcpy(&arp->ar_data[10], &arp->ar_data[0], 6);
1503                         NetCopyIP(&arp->ar_data[16], &arp->ar_data[6]);
1504                         memcpy(&arp->ar_data[0], NetOurEther, 6);
1505                         NetCopyIP(&arp->ar_data[6], &NetOurIP);
1506                         (void) eth_send((uchar *)et,
1507                                         (pkt - (uchar *)et) + ARP_HDR_SIZE);
1508                         return;
1509
1510                 case ARPOP_REPLY:               /* arp reply */
1511                         /* are we waiting for a reply */
1512                         if (!NetArpWaitPacketIP || !NetArpWaitPacketMAC)
1513                                 break;
1514
1515 #ifdef CONFIG_KEEP_SERVERADDR
1516                         if (NetServerIP == NetArpWaitPacketIP) {
1517                                 char buf[20];
1518                                 sprintf(buf, "%pM", arp->ar_data);
1519                                 setenv("serveraddr", buf);
1520                         }
1521 #endif
1522
1523                         debug("Got ARP REPLY, set server/gtwy eth addr (%pM)\n",
1524                                 arp->ar_data);
1525
1526                         tmp = NetReadIP(&arp->ar_data[6]);
1527
1528                         /* matched waiting packet's address */
1529                         if (tmp == NetArpWaitReplyIP) {
1530                                 debug("Got it\n");
1531                                 /* save address for later use */
1532                                 memcpy(NetArpWaitPacketMAC,
1533                                        &arp->ar_data[0], 6);
1534
1535 #ifdef CONFIG_NETCONSOLE
1536                                 (*packetHandler)(0, 0, 0, 0, 0);
1537 #endif
1538                                 /* modify header, and transmit it */
1539                                 memcpy(((Ethernet_t *)NetArpWaitTxPacket)->et_dest, NetArpWaitPacketMAC, 6);
1540                                 (void) eth_send(NetArpWaitTxPacket,
1541                                                 NetArpWaitTxPacketSize);
1542
1543                                 /* no arp request pending now */
1544                                 NetArpWaitPacketIP = 0;
1545                                 NetArpWaitTxPacketSize = 0;
1546                                 NetArpWaitPacketMAC = NULL;
1547
1548                         }
1549                         return;
1550                 default:
1551                         debug("Unexpected ARP opcode 0x%x\n",
1552                               ntohs(arp->ar_op));
1553                         return;
1554                 }
1555                 break;
1556
1557 #ifdef CONFIG_CMD_RARP
1558         case PROT_RARP:
1559                 debug("Got RARP\n");
1560                 arp = (ARP_t *)ip;
1561                 if (len < ARP_HDR_SIZE) {
1562                         printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
1563                         return;
1564                 }
1565
1566                 if ((ntohs(arp->ar_op) != RARPOP_REPLY) ||
1567                         (ntohs(arp->ar_hrd) != ARP_ETHER)   ||
1568                         (ntohs(arp->ar_pro) != PROT_IP)     ||
1569                         (arp->ar_hln != 6) || (arp->ar_pln != 4)) {
1570
1571                         puts("invalid RARP header\n");
1572                 } else {
1573                         NetCopyIP(&NetOurIP, &arp->ar_data[16]);
1574                         if (NetServerIP == 0)
1575                                 NetCopyIP(&NetServerIP, &arp->ar_data[6]);
1576                         memcpy(NetServerEther, &arp->ar_data[0], 6);
1577
1578                         (*packetHandler)(0, 0, 0, 0, 0);
1579                 }
1580                 break;
1581 #endif
1582         case PROT_IP:
1583                 debug("Got IP\n");
1584                 /* Before we start poking the header, make sure it is there */
1585                 if (len < IP_HDR_SIZE) {
1586                         debug("len bad %d < %lu\n", len, (ulong)IP_HDR_SIZE);
1587                         return;
1588                 }
1589                 /* Check the packet length */
1590                 if (len < ntohs(ip->ip_len)) {
1591                         printf("len bad %d < %d\n", len, ntohs(ip->ip_len));
1592                         return;
1593                 }
1594                 len = ntohs(ip->ip_len);
1595                 debug("len=%d, v=%02x\n", len, ip->ip_hl_v & 0xff);
1596
1597                 /* Can't deal with anything except IPv4 */
1598                 if ((ip->ip_hl_v & 0xf0) != 0x40)
1599                         return;
1600                 /* Can't deal with IP options (headers != 20 bytes) */
1601                 if ((ip->ip_hl_v & 0x0f) > 0x05)
1602                         return;
1603                 /* Check the Checksum of the header */
1604                 if (!NetCksumOk((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2)) {
1605                         puts("checksum bad\n");
1606                         return;
1607                 }
1608                 /* If it is not for us, ignore it */
1609                 tmp = NetReadIP(&ip->ip_dst);
1610                 if (NetOurIP && tmp != NetOurIP && tmp != 0xFFFFFFFF) {
1611 #ifdef CONFIG_MCAST_TFTP
1612                         if (Mcast_addr != tmp)
1613 #endif
1614                                 return;
1615                 }
1616                 /* Read source IP address for later use */
1617                 src_ip = NetReadIP(&ip->ip_src);
1618                 /*
1619                  * The function returns the unchanged packet if it's not
1620                  * a fragment, and either the complete packet or NULL if
1621                  * it is a fragment (if !CONFIG_IP_DEFRAG, it returns NULL)
1622                  */
1623                 ip = NetDefragment(ip, &len);
1624                 if (!ip)
1625                         return;
1626                 /*
1627                  * watch for ICMP host redirects
1628                  *
1629                  * There is no real handler code (yet). We just watch
1630                  * for ICMP host redirect messages. In case anybody
1631                  * sees these messages: please contact me
1632                  * (wd@denx.de), or - even better - send me the
1633                  * necessary fixes :-)
1634                  *
1635                  * Note: in all cases where I have seen this so far
1636                  * it was a problem with the router configuration,
1637                  * for instance when a router was configured in the
1638                  * BOOTP reply, but the TFTP server was on the same
1639                  * subnet. So this is probably a warning that your
1640                  * configuration might be wrong. But I'm not really
1641                  * sure if there aren't any other situations.
1642                  */
1643                 if (ip->ip_p == IPPROTO_ICMP) {
1644                         ICMP_t *icmph = (ICMP_t *)&(ip->udp_src);
1645
1646                         switch (icmph->type) {
1647                         case ICMP_REDIRECT:
1648                                 if (icmph->code != ICMP_REDIR_HOST)
1649                                         return;
1650                                 printf(" ICMP Host Redirect to %pI4 ",
1651                                         &icmph->un.gateway);
1652                                 return;
1653 #if defined(CONFIG_CMD_PING)
1654                         case ICMP_ECHO_REPLY:
1655                                 /*
1656                                  * IP header OK.  Pass the packet to the
1657                                  * current handler.
1658                                  */
1659                                 /* XXX point to ip packet */
1660                                 (*packetHandler)((uchar *)ip, 0, src_ip, 0, 0);
1661                                 return;
1662                         case ICMP_ECHO_REQUEST:
1663                                 debug("Got ICMP ECHO REQUEST, return %d bytes\n",
1664                                       ETHER_HDR_SIZE + len);
1665
1666                                 memcpy(&et->et_dest[0], &et->et_src[0], 6);
1667                                 memcpy(&et->et_src[0], NetOurEther, 6);
1668
1669                                 ip->ip_sum = 0;
1670                                 ip->ip_off = 0;
1671                                 NetCopyIP((void *)&ip->ip_dst, &ip->ip_src);
1672                                 NetCopyIP((void *)&ip->ip_src, &NetOurIP);
1673                                 ip->ip_sum = ~NetCksum((uchar *)ip,
1674                                                        IP_HDR_SIZE_NO_UDP >> 1);
1675
1676                                 icmph->type = ICMP_ECHO_REPLY;
1677                                 icmph->checksum = 0;
1678                                 icmph->checksum = ~NetCksum((uchar *)icmph,
1679                                         (len - IP_HDR_SIZE_NO_UDP) >> 1);
1680                                 (void) eth_send((uchar *)et,
1681                                                 ETHER_HDR_SIZE + len);
1682                                 return;
1683 #endif
1684                         default:
1685                                 return;
1686                         }
1687                 } else if (ip->ip_p != IPPROTO_UDP) {   /* Only UDP packets */
1688                         return;
1689                 }
1690
1691 #ifdef CONFIG_UDP_CHECKSUM
1692                 if (ip->udp_xsum != 0) {
1693                         ulong   xsum;
1694                         ushort *sumptr;
1695                         ushort  sumlen;
1696
1697                         xsum  = ip->ip_p;
1698                         xsum += (ntohs(ip->udp_len));
1699                         xsum += (ntohl(ip->ip_src) >> 16) & 0x0000ffff;
1700                         xsum += (ntohl(ip->ip_src) >>  0) & 0x0000ffff;
1701                         xsum += (ntohl(ip->ip_dst) >> 16) & 0x0000ffff;
1702                         xsum += (ntohl(ip->ip_dst) >>  0) & 0x0000ffff;
1703
1704                         sumlen = ntohs(ip->udp_len);
1705                         sumptr = (ushort *) &(ip->udp_src);
1706
1707                         while (sumlen > 1) {
1708                                 ushort sumdata;
1709
1710                                 sumdata = *sumptr++;
1711                                 xsum += ntohs(sumdata);
1712                                 sumlen -= 2;
1713                         }
1714                         if (sumlen > 0) {
1715                                 ushort sumdata;
1716
1717                                 sumdata = *(unsigned char *) sumptr;
1718                                 sumdata = (sumdata << 8) & 0xff00;
1719                                 xsum += sumdata;
1720                         }
1721                         while ((xsum >> 16) != 0) {
1722                                 xsum = (xsum & 0x0000ffff) +
1723                                        ((xsum >> 16) & 0x0000ffff);
1724                         }
1725                         if ((xsum != 0x00000000) && (xsum != 0x0000ffff)) {
1726                                 printf(" UDP wrong checksum %08lx %08x\n",
1727                                         xsum, ntohs(ip->udp_xsum));
1728                                 return;
1729                         }
1730                 }
1731 #endif
1732
1733
1734 #ifdef CONFIG_NETCONSOLE
1735                 nc_input_packet((uchar *)ip + IP_HDR_SIZE,
1736                                                 ntohs(ip->udp_dst),
1737                                                 ntohs(ip->udp_src),
1738                                                 ntohs(ip->udp_len) - 8);
1739 #endif
1740                 /*
1741                  *      IP header OK.  Pass the packet to the current handler.
1742                  */
1743                 (*packetHandler)((uchar *)ip + IP_HDR_SIZE,
1744                                                 ntohs(ip->udp_dst),
1745                                                 src_ip,
1746                                                 ntohs(ip->udp_src),
1747                                                 ntohs(ip->udp_len) - 8);
1748                 break;
1749         }
1750 }
1751
1752
1753 /**********************************************************************/
1754
1755 static int net_check_prereq(proto_t protocol)
1756 {
1757         switch (protocol) {
1758                 /* Fall through */
1759 #if defined(CONFIG_CMD_PING)
1760         case PING:
1761                 if (NetPingIP == 0) {
1762                         puts("*** ERROR: ping address not given\n");
1763                         return 1;
1764                 }
1765                 goto common;
1766 #endif
1767 #if defined(CONFIG_CMD_SNTP)
1768         case SNTP:
1769                 if (NetNtpServerIP == 0) {
1770                         puts("*** ERROR: NTP server address not given\n");
1771                         return 1;
1772                 }
1773                 goto common;
1774 #endif
1775 #if defined(CONFIG_CMD_DNS)
1776         case DNS:
1777                 if (NetOurDNSIP == 0) {
1778                         puts("*** ERROR: DNS server address not given\n");
1779                         return 1;
1780                 }
1781                 goto common;
1782 #endif
1783 #if defined(CONFIG_CMD_NFS)
1784         case NFS:
1785 #endif
1786         case TFTP:
1787                 if (NetServerIP == 0) {
1788                         puts("*** ERROR: `serverip' not set\n");
1789                         return 1;
1790                 }
1791 #if     defined(CONFIG_CMD_PING) || defined(CONFIG_CMD_SNTP) || \
1792         defined(CONFIG_CMD_DNS)
1793 common:
1794 #endif
1795                 /* Fall through */
1796
1797         case NETCONS:
1798         case TFTPSRV:
1799                 if (NetOurIP == 0) {
1800                         puts("*** ERROR: `ipaddr' not set\n");
1801                         return 1;
1802                 }
1803                 /* Fall through */
1804
1805 #ifdef CONFIG_CMD_RARP
1806         case RARP:
1807 #endif
1808         case BOOTP:
1809         case CDP:
1810         case DHCP:
1811                 if (memcmp(NetOurEther, "\0\0\0\0\0\0", 6) == 0) {
1812 #ifdef CONFIG_NET_MULTI
1813                         extern int eth_get_dev_index(void);
1814                         int num = eth_get_dev_index();
1815
1816                         switch (num) {
1817                         case -1:
1818                                 puts("*** ERROR: No ethernet found.\n");
1819                                 return 1;
1820                         case 0:
1821                                 puts("*** ERROR: `ethaddr' not set\n");
1822                                 break;
1823                         default:
1824                                 printf("*** ERROR: `eth%daddr' not set\n",
1825                                         num);
1826                                 break;
1827                         }
1828
1829                         NetStartAgain();
1830                         return 2;
1831 #else
1832                         puts("*** ERROR: `ethaddr' not set\n");
1833                         return 1;
1834 #endif
1835                 }
1836                 /* Fall through */
1837         default:
1838                 return 0;
1839         }
1840         return 0;               /* OK */
1841 }
1842 /**********************************************************************/
1843
1844 int
1845 NetCksumOk(uchar *ptr, int len)
1846 {
1847         return !((NetCksum(ptr, len) + 1) & 0xfffe);
1848 }
1849
1850
1851 unsigned
1852 NetCksum(uchar *ptr, int len)
1853 {
1854         ulong   xsum;
1855         ushort *p = (ushort *)ptr;
1856
1857         xsum = 0;
1858         while (len-- > 0)
1859                 xsum += *p++;
1860         xsum = (xsum & 0xffff) + (xsum >> 16);
1861         xsum = (xsum & 0xffff) + (xsum >> 16);
1862         return xsum & 0xffff;
1863 }
1864
1865 int
1866 NetEthHdrSize(void)
1867 {
1868         ushort myvlanid;
1869
1870         myvlanid = ntohs(NetOurVLAN);
1871         if (myvlanid == (ushort)-1)
1872                 myvlanid = VLAN_NONE;
1873
1874         return ((myvlanid & VLAN_IDMASK) == VLAN_NONE) ? ETHER_HDR_SIZE :
1875                 VLAN_ETHER_HDR_SIZE;
1876 }
1877
1878 int
1879 NetSetEther(volatile uchar *xet, uchar * addr, uint prot)
1880 {
1881         Ethernet_t *et = (Ethernet_t *)xet;
1882         ushort myvlanid;
1883
1884         myvlanid = ntohs(NetOurVLAN);
1885         if (myvlanid == (ushort)-1)
1886                 myvlanid = VLAN_NONE;
1887
1888         memcpy(et->et_dest, addr, 6);
1889         memcpy(et->et_src, NetOurEther, 6);
1890         if ((myvlanid & VLAN_IDMASK) == VLAN_NONE) {
1891                 et->et_protlen = htons(prot);
1892                 return ETHER_HDR_SIZE;
1893         } else {
1894                 VLAN_Ethernet_t *vet = (VLAN_Ethernet_t *)xet;
1895
1896                 vet->vet_vlan_type = htons(PROT_VLAN);
1897                 vet->vet_tag = htons((0 << 5) | (myvlanid & VLAN_IDMASK));
1898                 vet->vet_type = htons(prot);
1899                 return VLAN_ETHER_HDR_SIZE;
1900         }
1901 }
1902
1903 void
1904 NetSetIP(volatile uchar *xip, IPaddr_t dest, int dport, int sport, int len)
1905 {
1906         IP_t *ip = (IP_t *)xip;
1907
1908         /*
1909          *      If the data is an odd number of bytes, zero the
1910          *      byte after the last byte so that the checksum
1911          *      will work.
1912          */
1913         if (len & 1)
1914                 xip[IP_HDR_SIZE + len] = 0;
1915
1916         /*
1917          *      Construct an IP and UDP header.
1918          *      (need to set no fragment bit - XXX)
1919          */
1920         /* IP_HDR_SIZE / 4 (not including UDP) */
1921         ip->ip_hl_v  = 0x45;
1922         ip->ip_tos   = 0;
1923         ip->ip_len   = htons(IP_HDR_SIZE + len);
1924         ip->ip_id    = htons(NetIPID++);
1925         ip->ip_off   = htons(IP_FLAGS_DFRAG);   /* Don't fragment */
1926         ip->ip_ttl   = 255;
1927         ip->ip_p     = 17;              /* UDP */
1928         ip->ip_sum   = 0;
1929         /* already in network byte order */
1930         NetCopyIP((void *)&ip->ip_src, &NetOurIP);
1931         /* - "" - */
1932         NetCopyIP((void *)&ip->ip_dst, &dest);
1933         ip->udp_src  = htons(sport);
1934         ip->udp_dst  = htons(dport);
1935         ip->udp_len  = htons(8 + len);
1936         ip->udp_xsum = 0;
1937         ip->ip_sum   = ~NetCksum((uchar *)ip, IP_HDR_SIZE_NO_UDP / 2);
1938 }
1939
1940 void copy_filename(char *dst, const char *src, int size)
1941 {
1942         if (*src && (*src == '"')) {
1943                 ++src;
1944                 --size;
1945         }
1946
1947         while ((--size > 0) && *src && (*src != '"'))
1948                 *dst++ = *src++;
1949         *dst = '\0';
1950 }
1951
1952 #if     defined(CONFIG_CMD_NFS)         || \
1953         defined(CONFIG_CMD_SNTP)        || \
1954         defined(CONFIG_CMD_DNS)
1955 /*
1956  * make port a little random (1024-17407)
1957  * This keeps the math somewhat trivial to compute, and seems to work with
1958  * all supported protocols/clients/servers
1959  */
1960 unsigned int random_port(void)
1961 {
1962         return 1024 + (get_timer(0) % 0x4000);
1963 }
1964 #endif
1965
1966 void ip_to_string(IPaddr_t x, char *s)
1967 {
1968         x = ntohl(x);
1969         sprintf(s, "%d.%d.%d.%d",
1970                 (int) ((x >> 24) & 0xff),
1971                 (int) ((x >> 16) & 0xff),
1972                 (int) ((x >> 8) & 0xff), (int) ((x >> 0) & 0xff)
1973         );
1974 }
1975
1976 void VLAN_to_string(ushort x, char *s)
1977 {
1978         x = ntohs(x);
1979
1980         if (x == (ushort)-1)
1981                 x = VLAN_NONE;
1982
1983         if (x == VLAN_NONE)
1984                 strcpy(s, "none");
1985         else
1986                 sprintf(s, "%d", x & VLAN_IDMASK);
1987 }
1988
1989 ushort string_to_VLAN(const char *s)
1990 {
1991         ushort id;
1992
1993         if (s == NULL)
1994                 return htons(VLAN_NONE);
1995
1996         if (*s < '0' || *s > '9')
1997                 id = VLAN_NONE;
1998         else
1999                 id = (ushort)simple_strtoul(s, NULL, 10);
2000
2001         return htons(id);
2002 }
2003
2004 ushort getenv_VLAN(char *var)
2005 {
2006         return string_to_VLAN(getenv(var));
2007 }