mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-11-19 19:28:36 +00:00
72ff004258
The target will respond to pings while doing other network handling. Make sure that the response happens and is correct. This currently corrupts the ongoing operation of the device if it happens to be awaiting an ARP reply of its own to whatever serverip it is attempting to communicate with. In the test, add an expectation that the user operation (ping, in this case) will fail. A later patch will address this problem. Signed-off-by: Joe Hershberger <joe.hershberger@ni.com> Reviewed-by: Simon Glass <sjg@chromium.org> Reviewed-by: Bin Meng <bmeng.cn@gmail.com>
450 lines
11 KiB
C
450 lines
11 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Copyright (c) 2015 National Instruments
|
|
*
|
|
* (C) Copyright 2015
|
|
* Joe Hershberger <joe.hershberger@ni.com>
|
|
*/
|
|
|
|
#include <common.h>
|
|
#include <dm.h>
|
|
#include <malloc.h>
|
|
#include <net.h>
|
|
#include <asm/eth.h>
|
|
#include <asm/test.h>
|
|
|
|
DECLARE_GLOBAL_DATA_PTR;
|
|
|
|
static bool skip_timeout;
|
|
|
|
/*
|
|
* sandbox_eth_disable_response()
|
|
*
|
|
* index - The alias index (also DM seq number)
|
|
* disable - If non-zero, ignore sent packets and don't send mock response
|
|
*/
|
|
void sandbox_eth_disable_response(int index, bool disable)
|
|
{
|
|
struct udevice *dev;
|
|
struct eth_sandbox_priv *priv;
|
|
int ret;
|
|
|
|
ret = uclass_get_device(UCLASS_ETH, index, &dev);
|
|
if (ret)
|
|
return;
|
|
|
|
priv = dev_get_priv(dev);
|
|
priv->disabled = disable;
|
|
}
|
|
|
|
/*
|
|
* sandbox_eth_skip_timeout()
|
|
*
|
|
* When the first packet read is attempted, fast-forward time
|
|
*/
|
|
void sandbox_eth_skip_timeout(void)
|
|
{
|
|
skip_timeout = true;
|
|
}
|
|
|
|
/*
|
|
* sandbox_eth_arp_req_to_reply()
|
|
*
|
|
* Check for an arp request to be sent. If so, inject a reply
|
|
*
|
|
* returns 0 if injected, -EAGAIN if not
|
|
*/
|
|
int sandbox_eth_arp_req_to_reply(struct udevice *dev, void *packet,
|
|
unsigned int len)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
struct ethernet_hdr *eth = packet;
|
|
struct arp_hdr *arp;
|
|
struct ethernet_hdr *eth_recv;
|
|
struct arp_hdr *arp_recv;
|
|
|
|
if (ntohs(eth->et_protlen) != PROT_ARP)
|
|
return -EAGAIN;
|
|
|
|
arp = packet + ETHER_HDR_SIZE;
|
|
|
|
if (ntohs(arp->ar_op) != ARPOP_REQUEST)
|
|
return -EAGAIN;
|
|
|
|
/* Don't allow the buffer to overrun */
|
|
if (priv->recv_packets >= PKTBUFSRX)
|
|
return 0;
|
|
|
|
/* store this as the assumed IP of the fake host */
|
|
priv->fake_host_ipaddr = net_read_ip(&arp->ar_tpa);
|
|
|
|
/* Formulate a fake response */
|
|
eth_recv = (void *)priv->recv_packet_buffer[priv->recv_packets];
|
|
memcpy(eth_recv->et_dest, eth->et_src, ARP_HLEN);
|
|
memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN);
|
|
eth_recv->et_protlen = htons(PROT_ARP);
|
|
|
|
arp_recv = (void *)eth_recv + ETHER_HDR_SIZE;
|
|
arp_recv->ar_hrd = htons(ARP_ETHER);
|
|
arp_recv->ar_pro = htons(PROT_IP);
|
|
arp_recv->ar_hln = ARP_HLEN;
|
|
arp_recv->ar_pln = ARP_PLEN;
|
|
arp_recv->ar_op = htons(ARPOP_REPLY);
|
|
memcpy(&arp_recv->ar_sha, priv->fake_host_hwaddr, ARP_HLEN);
|
|
net_write_ip(&arp_recv->ar_spa, priv->fake_host_ipaddr);
|
|
memcpy(&arp_recv->ar_tha, &arp->ar_sha, ARP_HLEN);
|
|
net_copy_ip(&arp_recv->ar_tpa, &arp->ar_spa);
|
|
|
|
priv->recv_packet_length[priv->recv_packets] =
|
|
ETHER_HDR_SIZE + ARP_HDR_SIZE;
|
|
++priv->recv_packets;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* sandbox_eth_ping_req_to_reply()
|
|
*
|
|
* Check for a ping request to be sent. If so, inject a reply
|
|
*
|
|
* returns 0 if injected, -EAGAIN if not
|
|
*/
|
|
int sandbox_eth_ping_req_to_reply(struct udevice *dev, void *packet,
|
|
unsigned int len)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
struct ethernet_hdr *eth = packet;
|
|
struct ip_udp_hdr *ip;
|
|
struct icmp_hdr *icmp;
|
|
struct ethernet_hdr *eth_recv;
|
|
struct ip_udp_hdr *ipr;
|
|
struct icmp_hdr *icmpr;
|
|
|
|
if (ntohs(eth->et_protlen) != PROT_IP)
|
|
return -EAGAIN;
|
|
|
|
ip = packet + ETHER_HDR_SIZE;
|
|
|
|
if (ip->ip_p != IPPROTO_ICMP)
|
|
return -EAGAIN;
|
|
|
|
icmp = (struct icmp_hdr *)&ip->udp_src;
|
|
|
|
if (icmp->type != ICMP_ECHO_REQUEST)
|
|
return -EAGAIN;
|
|
|
|
/* Don't allow the buffer to overrun */
|
|
if (priv->recv_packets >= PKTBUFSRX)
|
|
return 0;
|
|
|
|
/* reply to the ping */
|
|
eth_recv = (void *)priv->recv_packet_buffer[priv->recv_packets];
|
|
memcpy(eth_recv, packet, len);
|
|
ipr = (void *)eth_recv + ETHER_HDR_SIZE;
|
|
icmpr = (struct icmp_hdr *)&ipr->udp_src;
|
|
memcpy(eth_recv->et_dest, eth->et_src, ARP_HLEN);
|
|
memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN);
|
|
ipr->ip_sum = 0;
|
|
ipr->ip_off = 0;
|
|
net_copy_ip((void *)&ipr->ip_dst, &ip->ip_src);
|
|
net_write_ip((void *)&ipr->ip_src, priv->fake_host_ipaddr);
|
|
ipr->ip_sum = compute_ip_checksum(ipr, IP_HDR_SIZE);
|
|
|
|
icmpr->type = ICMP_ECHO_REPLY;
|
|
icmpr->checksum = 0;
|
|
icmpr->checksum = compute_ip_checksum(icmpr, ICMP_HDR_SIZE);
|
|
|
|
priv->recv_packet_length[priv->recv_packets] = len;
|
|
++priv->recv_packets;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* sandbox_eth_recv_arp_req()
|
|
*
|
|
* Inject an ARP request for this target
|
|
*
|
|
* returns 0 if injected, -EOVERFLOW if not
|
|
*/
|
|
int sandbox_eth_recv_arp_req(struct udevice *dev)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
struct ethernet_hdr *eth_recv;
|
|
struct arp_hdr *arp_recv;
|
|
|
|
/* Don't allow the buffer to overrun */
|
|
if (priv->recv_packets >= PKTBUFSRX)
|
|
return -EOVERFLOW;
|
|
|
|
/* Formulate a fake request */
|
|
eth_recv = (void *)priv->recv_packet_buffer[priv->recv_packets];
|
|
memcpy(eth_recv->et_dest, net_bcast_ethaddr, ARP_HLEN);
|
|
memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN);
|
|
eth_recv->et_protlen = htons(PROT_ARP);
|
|
|
|
arp_recv = (void *)eth_recv + ETHER_HDR_SIZE;
|
|
arp_recv->ar_hrd = htons(ARP_ETHER);
|
|
arp_recv->ar_pro = htons(PROT_IP);
|
|
arp_recv->ar_hln = ARP_HLEN;
|
|
arp_recv->ar_pln = ARP_PLEN;
|
|
arp_recv->ar_op = htons(ARPOP_REQUEST);
|
|
memcpy(&arp_recv->ar_sha, priv->fake_host_hwaddr, ARP_HLEN);
|
|
net_write_ip(&arp_recv->ar_spa, priv->fake_host_ipaddr);
|
|
memcpy(&arp_recv->ar_tha, net_null_ethaddr, ARP_HLEN);
|
|
net_write_ip(&arp_recv->ar_tpa, net_ip);
|
|
|
|
priv->recv_packet_length[priv->recv_packets] =
|
|
ETHER_HDR_SIZE + ARP_HDR_SIZE;
|
|
++priv->recv_packets;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* sandbox_eth_recv_ping_req()
|
|
*
|
|
* Inject a ping request for this target
|
|
*
|
|
* returns 0 if injected, -EOVERFLOW if not
|
|
*/
|
|
int sandbox_eth_recv_ping_req(struct udevice *dev)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
struct ethernet_hdr *eth_recv;
|
|
struct ip_udp_hdr *ipr;
|
|
struct icmp_hdr *icmpr;
|
|
|
|
/* Don't allow the buffer to overrun */
|
|
if (priv->recv_packets >= PKTBUFSRX)
|
|
return -EOVERFLOW;
|
|
|
|
/* Formulate a fake ping */
|
|
eth_recv = (void *)priv->recv_packet_buffer[priv->recv_packets];
|
|
|
|
memcpy(eth_recv->et_dest, net_ethaddr, ARP_HLEN);
|
|
memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN);
|
|
eth_recv->et_protlen = htons(PROT_IP);
|
|
|
|
ipr = (void *)eth_recv + ETHER_HDR_SIZE;
|
|
ipr->ip_hl_v = 0x45;
|
|
ipr->ip_len = htons(IP_ICMP_HDR_SIZE);
|
|
ipr->ip_off = htons(IP_FLAGS_DFRAG);
|
|
ipr->ip_p = IPPROTO_ICMP;
|
|
ipr->ip_sum = 0;
|
|
net_write_ip(&ipr->ip_src, priv->fake_host_ipaddr);
|
|
net_write_ip(&ipr->ip_dst, net_ip);
|
|
ipr->ip_sum = compute_ip_checksum(ipr, IP_HDR_SIZE);
|
|
|
|
icmpr = (struct icmp_hdr *)&ipr->udp_src;
|
|
|
|
icmpr->type = ICMP_ECHO_REQUEST;
|
|
icmpr->code = 0;
|
|
icmpr->checksum = 0;
|
|
icmpr->un.echo.id = 0;
|
|
icmpr->un.echo.sequence = htons(1);
|
|
icmpr->checksum = compute_ip_checksum(icmpr, ICMP_HDR_SIZE);
|
|
|
|
priv->recv_packet_length[priv->recv_packets] =
|
|
ETHER_HDR_SIZE + IP_ICMP_HDR_SIZE;
|
|
++priv->recv_packets;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* sb_default_handler()
|
|
*
|
|
* perform typical responses to simple ping
|
|
*
|
|
* dev - device pointer
|
|
* pkt - "sent" packet buffer
|
|
* len - length of packet
|
|
*/
|
|
static int sb_default_handler(struct udevice *dev, void *packet,
|
|
unsigned int len)
|
|
{
|
|
if (!sandbox_eth_arp_req_to_reply(dev, packet, len))
|
|
return 0;
|
|
if (!sandbox_eth_ping_req_to_reply(dev, packet, len))
|
|
return 0;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* sandbox_eth_set_tx_handler()
|
|
*
|
|
* Set a custom response to a packet being sent through the sandbox eth test
|
|
* driver
|
|
*
|
|
* index - interface to set the handler for
|
|
* handler - The func ptr to call on send. If NULL, set to default handler
|
|
*/
|
|
void sandbox_eth_set_tx_handler(int index, sandbox_eth_tx_hand_f *handler)
|
|
{
|
|
struct udevice *dev;
|
|
struct eth_sandbox_priv *priv;
|
|
int ret;
|
|
|
|
ret = uclass_get_device(UCLASS_ETH, index, &dev);
|
|
if (ret)
|
|
return;
|
|
|
|
priv = dev_get_priv(dev);
|
|
if (handler)
|
|
priv->tx_handler = handler;
|
|
else
|
|
priv->tx_handler = sb_default_handler;
|
|
}
|
|
|
|
/*
|
|
* Set priv ptr
|
|
*
|
|
* priv - priv void ptr to store in the device
|
|
*/
|
|
void sandbox_eth_set_priv(int index, void *priv)
|
|
{
|
|
struct udevice *dev;
|
|
struct eth_sandbox_priv *dev_priv;
|
|
int ret;
|
|
|
|
ret = uclass_get_device(UCLASS_ETH, index, &dev);
|
|
if (ret)
|
|
return;
|
|
|
|
dev_priv = dev_get_priv(dev);
|
|
|
|
dev_priv->priv = priv;
|
|
}
|
|
|
|
static int sb_eth_start(struct udevice *dev)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
|
|
debug("eth_sandbox: Start\n");
|
|
|
|
priv->recv_packets = 0;
|
|
for (int i = 0; i < PKTBUFSRX; i++) {
|
|
priv->recv_packet_buffer[i] = net_rx_packets[i];
|
|
priv->recv_packet_length[i] = 0;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int sb_eth_send(struct udevice *dev, void *packet, int length)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
|
|
debug("eth_sandbox: Send packet %d\n", length);
|
|
|
|
if (priv->disabled)
|
|
return 0;
|
|
|
|
return priv->tx_handler(dev, packet, length);
|
|
}
|
|
|
|
static int sb_eth_recv(struct udevice *dev, int flags, uchar **packetp)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
|
|
if (skip_timeout) {
|
|
sandbox_timer_add_offset(11000UL);
|
|
skip_timeout = false;
|
|
}
|
|
|
|
if (priv->recv_packets) {
|
|
int lcl_recv_packet_length = priv->recv_packet_length[0];
|
|
|
|
debug("eth_sandbox: received packet[%d], %d waiting\n",
|
|
lcl_recv_packet_length, priv->recv_packets - 1);
|
|
*packetp = priv->recv_packet_buffer[0];
|
|
return lcl_recv_packet_length;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int sb_eth_free_pkt(struct udevice *dev, uchar *packet, int length)
|
|
{
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
int i;
|
|
|
|
if (!priv->recv_packets)
|
|
return 0;
|
|
|
|
--priv->recv_packets;
|
|
for (i = 0; i < priv->recv_packets; i++) {
|
|
priv->recv_packet_length[i] = priv->recv_packet_length[i + 1];
|
|
memcpy(priv->recv_packet_buffer[i],
|
|
priv->recv_packet_buffer[i + 1],
|
|
priv->recv_packet_length[i + 1]);
|
|
}
|
|
priv->recv_packet_length[priv->recv_packets] = 0;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void sb_eth_stop(struct udevice *dev)
|
|
{
|
|
debug("eth_sandbox: Stop\n");
|
|
}
|
|
|
|
static int sb_eth_write_hwaddr(struct udevice *dev)
|
|
{
|
|
struct eth_pdata *pdata = dev_get_platdata(dev);
|
|
|
|
debug("eth_sandbox %s: Write HW ADDR - %pM\n", dev->name,
|
|
pdata->enetaddr);
|
|
return 0;
|
|
}
|
|
|
|
static const struct eth_ops sb_eth_ops = {
|
|
.start = sb_eth_start,
|
|
.send = sb_eth_send,
|
|
.recv = sb_eth_recv,
|
|
.free_pkt = sb_eth_free_pkt,
|
|
.stop = sb_eth_stop,
|
|
.write_hwaddr = sb_eth_write_hwaddr,
|
|
};
|
|
|
|
static int sb_eth_remove(struct udevice *dev)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int sb_eth_ofdata_to_platdata(struct udevice *dev)
|
|
{
|
|
struct eth_pdata *pdata = dev_get_platdata(dev);
|
|
struct eth_sandbox_priv *priv = dev_get_priv(dev);
|
|
const u8 *mac;
|
|
|
|
pdata->iobase = dev_read_addr(dev);
|
|
|
|
mac = dev_read_u8_array_ptr(dev, "fake-host-hwaddr", ARP_HLEN);
|
|
if (!mac) {
|
|
printf("'fake-host-hwaddr' is missing from the DT\n");
|
|
return -EINVAL;
|
|
}
|
|
memcpy(priv->fake_host_hwaddr, mac, ARP_HLEN);
|
|
priv->disabled = false;
|
|
priv->tx_handler = sb_default_handler;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct udevice_id sb_eth_ids[] = {
|
|
{ .compatible = "sandbox,eth" },
|
|
{ }
|
|
};
|
|
|
|
U_BOOT_DRIVER(eth_sandbox) = {
|
|
.name = "eth_sandbox",
|
|
.id = UCLASS_ETH,
|
|
.of_match = sb_eth_ids,
|
|
.ofdata_to_platdata = sb_eth_ofdata_to_platdata,
|
|
.remove = sb_eth_remove,
|
|
.ops = &sb_eth_ops,
|
|
.priv_auto_alloc_size = sizeof(struct eth_sandbox_priv),
|
|
.platdata_auto_alloc_size = sizeof(struct eth_pdata),
|
|
};
|