mirror of
https://github.com/AsahiLinux/u-boot
synced 2024-11-10 23:24:38 +00:00
f1d2d28469
Don't force ARP clients to return the MAC address if they don't care (such as ping) Signed-off-by: Joe Hershberger <joe.hershberger@ni.com> Acked-by: Mike Frysinger <vapier@gentoo.org>
217 lines
5.1 KiB
C
217 lines
5.1 KiB
C
/*
|
|
* Copied from Linux Monitor (LiMon) - Networking.
|
|
*
|
|
* Copyright 1994 - 2000 Neil Russell.
|
|
* (See License)
|
|
* Copyright 2000 Roland Borde
|
|
* Copyright 2000 Paolo Scaffardi
|
|
* Copyright 2000-2002 Wolfgang Denk, wd@denx.de
|
|
*/
|
|
|
|
#include <common.h>
|
|
|
|
#include "arp.h"
|
|
|
|
#ifndef CONFIG_ARP_TIMEOUT
|
|
/* Milliseconds before trying ARP again */
|
|
# define ARP_TIMEOUT 5000UL
|
|
#else
|
|
# define ARP_TIMEOUT CONFIG_ARP_TIMEOUT
|
|
#endif
|
|
|
|
|
|
#ifndef CONFIG_NET_RETRY_COUNT
|
|
# define ARP_TIMEOUT_COUNT 5 /* # of timeouts before giving up */
|
|
#else
|
|
# define ARP_TIMEOUT_COUNT CONFIG_NET_RETRY_COUNT
|
|
#endif
|
|
|
|
IPaddr_t NetArpWaitPacketIP;
|
|
IPaddr_t NetArpWaitReplyIP;
|
|
/* MAC address of waiting packet's destination */
|
|
uchar *NetArpWaitPacketMAC;
|
|
/* THE transmit packet */
|
|
uchar *NetArpWaitTxPacket;
|
|
int NetArpWaitTxPacketSize;
|
|
uchar NetArpWaitPacketBuf[PKTSIZE_ALIGN + PKTALIGN];
|
|
ulong NetArpWaitTimerStart;
|
|
int NetArpWaitTry;
|
|
|
|
void ArpInit(void)
|
|
{
|
|
/* XXX problem with bss workaround */
|
|
NetArpWaitPacketMAC = NULL;
|
|
NetArpWaitPacketIP = 0;
|
|
NetArpWaitReplyIP = 0;
|
|
NetArpWaitTxPacket = &NetArpWaitPacketBuf[0] + (PKTALIGN - 1);
|
|
NetArpWaitTxPacket -= (ulong)NetArpWaitTxPacket % PKTALIGN;
|
|
NetArpWaitTxPacketSize = 0;
|
|
}
|
|
|
|
void ArpRequest(void)
|
|
{
|
|
uchar *pkt;
|
|
struct arp_hdr *arp;
|
|
int eth_hdr_size;
|
|
|
|
debug("ARP broadcast %d\n", NetArpWaitTry);
|
|
|
|
pkt = NetTxPacket;
|
|
|
|
eth_hdr_size = NetSetEther(pkt, NetBcastAddr, PROT_ARP);
|
|
pkt += eth_hdr_size;
|
|
|
|
arp = (struct arp_hdr *) pkt;
|
|
|
|
arp->ar_hrd = htons(ARP_ETHER);
|
|
arp->ar_pro = htons(PROT_IP);
|
|
arp->ar_hln = ARP_HLEN;
|
|
arp->ar_pln = ARP_PLEN;
|
|
arp->ar_op = htons(ARPOP_REQUEST);
|
|
|
|
/* source ET addr */
|
|
memcpy(&arp->ar_sha, NetOurEther, ARP_HLEN);
|
|
/* source IP addr */
|
|
NetWriteIP(&arp->ar_spa, NetOurIP);
|
|
/* dest ET addr = 0 */
|
|
memset(&arp->ar_tha, 0, ARP_HLEN);
|
|
if ((NetArpWaitPacketIP & NetOurSubnetMask) !=
|
|
(NetOurIP & NetOurSubnetMask)) {
|
|
if (NetOurGatewayIP == 0) {
|
|
puts("## Warning: gatewayip needed but not set\n");
|
|
NetArpWaitReplyIP = NetArpWaitPacketIP;
|
|
} else {
|
|
NetArpWaitReplyIP = NetOurGatewayIP;
|
|
}
|
|
} else {
|
|
NetArpWaitReplyIP = NetArpWaitPacketIP;
|
|
}
|
|
|
|
NetWriteIP(&arp->ar_tpa, NetArpWaitReplyIP);
|
|
NetSendPacket(NetTxPacket, eth_hdr_size + ARP_HDR_SIZE);
|
|
}
|
|
|
|
void ArpTimeoutCheck(void)
|
|
{
|
|
ulong t;
|
|
|
|
if (!NetArpWaitPacketIP)
|
|
return;
|
|
|
|
t = get_timer(0);
|
|
|
|
/* check for arp timeout */
|
|
if ((t - NetArpWaitTimerStart) > ARP_TIMEOUT) {
|
|
NetArpWaitTry++;
|
|
|
|
if (NetArpWaitTry >= ARP_TIMEOUT_COUNT) {
|
|
puts("\nARP Retry count exceeded; starting again\n");
|
|
NetArpWaitTry = 0;
|
|
NetStartAgain();
|
|
} else {
|
|
NetArpWaitTimerStart = t;
|
|
ArpRequest();
|
|
}
|
|
}
|
|
}
|
|
|
|
void ArpReceive(struct ethernet_hdr *et, struct ip_udp_hdr *ip, int len)
|
|
{
|
|
struct arp_hdr *arp;
|
|
IPaddr_t reply_ip_addr;
|
|
uchar *pkt;
|
|
int eth_hdr_size;
|
|
|
|
/*
|
|
* We have to deal with two types of ARP packets:
|
|
* - REQUEST packets will be answered by sending our
|
|
* IP address - if we know it.
|
|
* - REPLY packates are expected only after we asked
|
|
* for the TFTP server's or the gateway's ethernet
|
|
* address; so if we receive such a packet, we set
|
|
* the server ethernet address
|
|
*/
|
|
debug("Got ARP\n");
|
|
|
|
arp = (struct arp_hdr *)ip;
|
|
if (len < ARP_HDR_SIZE) {
|
|
printf("bad length %d < %d\n", len, ARP_HDR_SIZE);
|
|
return;
|
|
}
|
|
if (ntohs(arp->ar_hrd) != ARP_ETHER)
|
|
return;
|
|
if (ntohs(arp->ar_pro) != PROT_IP)
|
|
return;
|
|
if (arp->ar_hln != ARP_HLEN)
|
|
return;
|
|
if (arp->ar_pln != ARP_PLEN)
|
|
return;
|
|
|
|
if (NetOurIP == 0)
|
|
return;
|
|
|
|
if (NetReadIP(&arp->ar_tpa) != NetOurIP)
|
|
return;
|
|
|
|
switch (ntohs(arp->ar_op)) {
|
|
case ARPOP_REQUEST:
|
|
/* reply with our IP address */
|
|
debug("Got ARP REQUEST, return our IP\n");
|
|
pkt = (uchar *)et;
|
|
eth_hdr_size = net_update_ether(et, et->et_src, PROT_ARP);
|
|
pkt += eth_hdr_size;
|
|
arp->ar_op = htons(ARPOP_REPLY);
|
|
memcpy(&arp->ar_tha, &arp->ar_sha, ARP_HLEN);
|
|
NetCopyIP(&arp->ar_tpa, &arp->ar_spa);
|
|
memcpy(&arp->ar_sha, NetOurEther, ARP_HLEN);
|
|
NetCopyIP(&arp->ar_spa, &NetOurIP);
|
|
NetSendPacket((uchar *)et, eth_hdr_size + ARP_HDR_SIZE);
|
|
return;
|
|
|
|
case ARPOP_REPLY: /* arp reply */
|
|
/* are we waiting for a reply */
|
|
if (!NetArpWaitPacketIP)
|
|
break;
|
|
|
|
#ifdef CONFIG_KEEP_SERVERADDR
|
|
if (NetServerIP == NetArpWaitPacketIP) {
|
|
char buf[20];
|
|
sprintf(buf, "%pM", arp->ar_sha);
|
|
setenv("serveraddr", buf);
|
|
}
|
|
#endif
|
|
|
|
reply_ip_addr = NetReadIP(&arp->ar_spa);
|
|
|
|
/* matched waiting packet's address */
|
|
if (reply_ip_addr == NetArpWaitReplyIP) {
|
|
debug("Got ARP REPLY, set eth addr (%pM)\n",
|
|
arp->ar_data);
|
|
|
|
/* save address for later use */
|
|
if (NetArpWaitPacketMAC != NULL)
|
|
memcpy(NetArpWaitPacketMAC,
|
|
&arp->ar_sha, ARP_HLEN);
|
|
|
|
net_get_arp_handler()((uchar *)arp, 0, reply_ip_addr,
|
|
0, len);
|
|
|
|
/* modify header, and transmit it */
|
|
memcpy(((struct ethernet_hdr *)NetArpWaitTxPacket)->
|
|
et_dest, &arp->ar_sha, ARP_HLEN);
|
|
NetSendPacket(NetArpWaitTxPacket,
|
|
NetArpWaitTxPacketSize);
|
|
|
|
/* no arp request pending now */
|
|
NetArpWaitPacketIP = 0;
|
|
NetArpWaitTxPacketSize = 0;
|
|
NetArpWaitPacketMAC = NULL;
|
|
|
|
}
|
|
return;
|
|
default:
|
|
debug("Unexpected ARP opcode 0x%x\n",
|
|
ntohs(arp->ar_op));
|
|
return;
|
|
}
|
|
}
|