451 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			451 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			C
		
	
	
	
| // SPDX-License-Identifier: GPL-2.0
 | |
| /*
 | |
|  * Copyright (c) 2015 National Instruments
 | |
|  *
 | |
|  * (C) Copyright 2015
 | |
|  * Joe Hershberger <joe.hershberger@ni.com>
 | |
|  */
 | |
| 
 | |
| #include <common.h>
 | |
| #include <dm.h>
 | |
| #include <malloc.h>
 | |
| #include <net.h>
 | |
| #include <asm/eth.h>
 | |
| #include <asm/test.h>
 | |
| 
 | |
| DECLARE_GLOBAL_DATA_PTR;
 | |
| 
 | |
| static bool skip_timeout;
 | |
| 
 | |
| /*
 | |
|  * sandbox_eth_disable_response()
 | |
|  *
 | |
|  * index - The alias index (also DM seq number)
 | |
|  * disable - If non-zero, ignore sent packets and don't send mock response
 | |
|  */
 | |
| void sandbox_eth_disable_response(int index, bool disable)
 | |
| {
 | |
| 	struct udevice *dev;
 | |
| 	struct eth_sandbox_priv *priv;
 | |
| 	int ret;
 | |
| 
 | |
| 	ret = uclass_get_device(UCLASS_ETH, index, &dev);
 | |
| 	if (ret)
 | |
| 		return;
 | |
| 
 | |
| 	priv = dev_get_priv(dev);
 | |
| 	priv->disabled = disable;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * sandbox_eth_skip_timeout()
 | |
|  *
 | |
|  * When the first packet read is attempted, fast-forward time
 | |
|  */
 | |
| void sandbox_eth_skip_timeout(void)
 | |
| {
 | |
| 	skip_timeout = true;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * sandbox_eth_arp_req_to_reply()
 | |
|  *
 | |
|  * Check for an arp request to be sent. If so, inject a reply
 | |
|  *
 | |
|  * returns 0 if injected, -EAGAIN if not
 | |
|  */
 | |
| int sandbox_eth_arp_req_to_reply(struct udevice *dev, void *packet,
 | |
| 				 unsigned int len)
 | |
| {
 | |
| 	struct eth_sandbox_priv *priv = dev_get_priv(dev);
 | |
| 	struct ethernet_hdr *eth = packet;
 | |
| 	struct arp_hdr *arp;
 | |
| 	struct ethernet_hdr *eth_recv;
 | |
| 	struct arp_hdr *arp_recv;
 | |
| 
 | |
| 	if (ntohs(eth->et_protlen) != PROT_ARP)
 | |
| 		return -EAGAIN;
 | |
| 
 | |
| 	arp = packet + ETHER_HDR_SIZE;
 | |
| 
 | |
| 	if (ntohs(arp->ar_op) != ARPOP_REQUEST)
 | |
| 		return -EAGAIN;
 | |
| 
 | |
| 	/* Don't allow the buffer to overrun */
 | |
| 	if (priv->recv_packets >= PKTBUFSRX)
 | |
| 		return 0;
 | |
| 
 | |
| 	/* store this as the assumed IP of the fake host */
 | |
| 	priv->fake_host_ipaddr = net_read_ip(&arp->ar_tpa);
 | |
| 
 | |
| 	/* Formulate a fake response */
 | |
| 	eth_recv = (void *)priv->recv_packet_buffer[priv->recv_packets];
 | |
| 	memcpy(eth_recv->et_dest, eth->et_src, ARP_HLEN);
 | |
| 	memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN);
 | |
| 	eth_recv->et_protlen = htons(PROT_ARP);
 | |
| 
 | |
| 	arp_recv = (void *)eth_recv + ETHER_HDR_SIZE;
 | |
| 	arp_recv->ar_hrd = htons(ARP_ETHER);
 | |
| 	arp_recv->ar_pro = htons(PROT_IP);
 | |
| 	arp_recv->ar_hln = ARP_HLEN;
 | |
| 	arp_recv->ar_pln = ARP_PLEN;
 | |
| 	arp_recv->ar_op = htons(ARPOP_REPLY);
 | |
| 	memcpy(&arp_recv->ar_sha, priv->fake_host_hwaddr, ARP_HLEN);
 | |
| 	net_write_ip(&arp_recv->ar_spa, priv->fake_host_ipaddr);
 | |
| 	memcpy(&arp_recv->ar_tha, &arp->ar_sha, ARP_HLEN);
 | |
| 	net_copy_ip(&arp_recv->ar_tpa, &arp->ar_spa);
 | |
| 
 | |
| 	priv->recv_packet_length[priv->recv_packets] =
 | |
| 		ETHER_HDR_SIZE + ARP_HDR_SIZE;
 | |
| 	++priv->recv_packets;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * sandbox_eth_ping_req_to_reply()
 | |
|  *
 | |
|  * Check for a ping request to be sent. If so, inject a reply
 | |
|  *
 | |
|  * returns 0 if injected, -EAGAIN if not
 | |
|  */
 | |
| int sandbox_eth_ping_req_to_reply(struct udevice *dev, void *packet,
 | |
| 				  unsigned int len)
 | |
| {
 | |
| 	struct eth_sandbox_priv *priv = dev_get_priv(dev);
 | |
| 	struct ethernet_hdr *eth = packet;
 | |
| 	struct ip_udp_hdr *ip;
 | |
| 	struct icmp_hdr *icmp;
 | |
| 	struct ethernet_hdr *eth_recv;
 | |
| 	struct ip_udp_hdr *ipr;
 | |
| 	struct icmp_hdr *icmpr;
 | |
| 
 | |
| 	if (ntohs(eth->et_protlen) != PROT_IP)
 | |
| 		return -EAGAIN;
 | |
| 
 | |
| 	ip = packet + ETHER_HDR_SIZE;
 | |
| 
 | |
| 	if (ip->ip_p != IPPROTO_ICMP)
 | |
| 		return -EAGAIN;
 | |
| 
 | |
| 	icmp = (struct icmp_hdr *)&ip->udp_src;
 | |
| 
 | |
| 	if (icmp->type != ICMP_ECHO_REQUEST)
 | |
| 		return -EAGAIN;
 | |
| 
 | |
| 	/* Don't allow the buffer to overrun */
 | |
| 	if (priv->recv_packets >= PKTBUFSRX)
 | |
| 		return 0;
 | |
| 
 | |
| 	/* reply to the ping */
 | |
| 	eth_recv = (void *)priv->recv_packet_buffer[priv->recv_packets];
 | |
| 	memcpy(eth_recv, packet, len);
 | |
| 	ipr = (void *)eth_recv + ETHER_HDR_SIZE;
 | |
| 	icmpr = (struct icmp_hdr *)&ipr->udp_src;
 | |
| 	memcpy(eth_recv->et_dest, eth->et_src, ARP_HLEN);
 | |
| 	memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN);
 | |
| 	ipr->ip_sum = 0;
 | |
| 	ipr->ip_off = 0;
 | |
| 	net_copy_ip((void *)&ipr->ip_dst, &ip->ip_src);
 | |
| 	net_write_ip((void *)&ipr->ip_src, priv->fake_host_ipaddr);
 | |
| 	ipr->ip_sum = compute_ip_checksum(ipr, IP_HDR_SIZE);
 | |
| 
 | |
| 	icmpr->type = ICMP_ECHO_REPLY;
 | |
| 	icmpr->checksum = 0;
 | |
| 	icmpr->checksum = compute_ip_checksum(icmpr, ICMP_HDR_SIZE);
 | |
| 
 | |
| 	priv->recv_packet_length[priv->recv_packets] = len;
 | |
| 	++priv->recv_packets;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * sandbox_eth_recv_arp_req()
 | |
|  *
 | |
|  * Inject an ARP request for this target
 | |
|  *
 | |
|  * returns 0 if injected, -EOVERFLOW if not
 | |
|  */
 | |
| int sandbox_eth_recv_arp_req(struct udevice *dev)
 | |
| {
 | |
| 	struct eth_sandbox_priv *priv = dev_get_priv(dev);
 | |
| 	struct ethernet_hdr *eth_recv;
 | |
| 	struct arp_hdr *arp_recv;
 | |
| 
 | |
| 	/* Don't allow the buffer to overrun */
 | |
| 	if (priv->recv_packets >= PKTBUFSRX)
 | |
| 		return -EOVERFLOW;
 | |
| 
 | |
| 	/* Formulate a fake request */
 | |
| 	eth_recv = (void *)priv->recv_packet_buffer[priv->recv_packets];
 | |
| 	memcpy(eth_recv->et_dest, net_bcast_ethaddr, ARP_HLEN);
 | |
| 	memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN);
 | |
| 	eth_recv->et_protlen = htons(PROT_ARP);
 | |
| 
 | |
| 	arp_recv = (void *)eth_recv + ETHER_HDR_SIZE;
 | |
| 	arp_recv->ar_hrd = htons(ARP_ETHER);
 | |
| 	arp_recv->ar_pro = htons(PROT_IP);
 | |
| 	arp_recv->ar_hln = ARP_HLEN;
 | |
| 	arp_recv->ar_pln = ARP_PLEN;
 | |
| 	arp_recv->ar_op = htons(ARPOP_REQUEST);
 | |
| 	memcpy(&arp_recv->ar_sha, priv->fake_host_hwaddr, ARP_HLEN);
 | |
| 	net_write_ip(&arp_recv->ar_spa, priv->fake_host_ipaddr);
 | |
| 	memcpy(&arp_recv->ar_tha, net_null_ethaddr, ARP_HLEN);
 | |
| 	net_write_ip(&arp_recv->ar_tpa, net_ip);
 | |
| 
 | |
| 	priv->recv_packet_length[priv->recv_packets] =
 | |
| 		ETHER_HDR_SIZE + ARP_HDR_SIZE;
 | |
| 	++priv->recv_packets;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * sandbox_eth_recv_ping_req()
 | |
|  *
 | |
|  * Inject a ping request for this target
 | |
|  *
 | |
|  * returns 0 if injected, -EOVERFLOW if not
 | |
|  */
 | |
| int sandbox_eth_recv_ping_req(struct udevice *dev)
 | |
| {
 | |
| 	struct eth_sandbox_priv *priv = dev_get_priv(dev);
 | |
| 	struct ethernet_hdr *eth_recv;
 | |
| 	struct ip_udp_hdr *ipr;
 | |
| 	struct icmp_hdr *icmpr;
 | |
| 
 | |
| 	/* Don't allow the buffer to overrun */
 | |
| 	if (priv->recv_packets >= PKTBUFSRX)
 | |
| 		return -EOVERFLOW;
 | |
| 
 | |
| 	/* Formulate a fake ping */
 | |
| 	eth_recv = (void *)priv->recv_packet_buffer[priv->recv_packets];
 | |
| 
 | |
| 	memcpy(eth_recv->et_dest, net_ethaddr, ARP_HLEN);
 | |
| 	memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN);
 | |
| 	eth_recv->et_protlen = htons(PROT_IP);
 | |
| 
 | |
| 	ipr = (void *)eth_recv + ETHER_HDR_SIZE;
 | |
| 	ipr->ip_hl_v = 0x45;
 | |
| 	ipr->ip_len = htons(IP_ICMP_HDR_SIZE);
 | |
| 	ipr->ip_off = htons(IP_FLAGS_DFRAG);
 | |
| 	ipr->ip_p = IPPROTO_ICMP;
 | |
| 	ipr->ip_sum = 0;
 | |
| 	net_write_ip(&ipr->ip_src, priv->fake_host_ipaddr);
 | |
| 	net_write_ip(&ipr->ip_dst, net_ip);
 | |
| 	ipr->ip_sum = compute_ip_checksum(ipr, IP_HDR_SIZE);
 | |
| 
 | |
| 	icmpr = (struct icmp_hdr *)&ipr->udp_src;
 | |
| 
 | |
| 	icmpr->type = ICMP_ECHO_REQUEST;
 | |
| 	icmpr->code = 0;
 | |
| 	icmpr->checksum = 0;
 | |
| 	icmpr->un.echo.id = 0;
 | |
| 	icmpr->un.echo.sequence = htons(1);
 | |
| 	icmpr->checksum = compute_ip_checksum(icmpr, ICMP_HDR_SIZE);
 | |
| 
 | |
| 	priv->recv_packet_length[priv->recv_packets] =
 | |
| 		ETHER_HDR_SIZE + IP_ICMP_HDR_SIZE;
 | |
| 	++priv->recv_packets;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * sb_default_handler()
 | |
|  *
 | |
|  * perform typical responses to simple ping
 | |
|  *
 | |
|  * dev - device pointer
 | |
|  * pkt - "sent" packet buffer
 | |
|  * len - length of packet
 | |
|  */
 | |
| static int sb_default_handler(struct udevice *dev, void *packet,
 | |
| 			      unsigned int len)
 | |
| {
 | |
| 	if (!sandbox_eth_arp_req_to_reply(dev, packet, len))
 | |
| 		return 0;
 | |
| 	if (!sandbox_eth_ping_req_to_reply(dev, packet, len))
 | |
| 		return 0;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * sandbox_eth_set_tx_handler()
 | |
|  *
 | |
|  * Set a custom response to a packet being sent through the sandbox eth test
 | |
|  *	driver
 | |
|  *
 | |
|  * index - interface to set the handler for
 | |
|  * handler - The func ptr to call on send. If NULL, set to default handler
 | |
|  */
 | |
| void sandbox_eth_set_tx_handler(int index, sandbox_eth_tx_hand_f *handler)
 | |
| {
 | |
| 	struct udevice *dev;
 | |
| 	struct eth_sandbox_priv *priv;
 | |
| 	int ret;
 | |
| 
 | |
| 	ret = uclass_get_device(UCLASS_ETH, index, &dev);
 | |
| 	if (ret)
 | |
| 		return;
 | |
| 
 | |
| 	priv = dev_get_priv(dev);
 | |
| 	if (handler)
 | |
| 		priv->tx_handler = handler;
 | |
| 	else
 | |
| 		priv->tx_handler = sb_default_handler;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * Set priv ptr
 | |
|  *
 | |
|  * priv - priv void ptr to store in the device
 | |
|  */
 | |
| void sandbox_eth_set_priv(int index, void *priv)
 | |
| {
 | |
| 	struct udevice *dev;
 | |
| 	struct eth_sandbox_priv *dev_priv;
 | |
| 	int ret;
 | |
| 
 | |
| 	ret = uclass_get_device(UCLASS_ETH, index, &dev);
 | |
| 	if (ret)
 | |
| 		return;
 | |
| 
 | |
| 	dev_priv = dev_get_priv(dev);
 | |
| 
 | |
| 	dev_priv->priv = priv;
 | |
| }
 | |
| 
 | |
| static int sb_eth_start(struct udevice *dev)
 | |
| {
 | |
| 	struct eth_sandbox_priv *priv = dev_get_priv(dev);
 | |
| 
 | |
| 	debug("eth_sandbox: Start\n");
 | |
| 
 | |
| 	priv->recv_packets = 0;
 | |
| 	for (int i = 0; i < PKTBUFSRX; i++) {
 | |
| 		priv->recv_packet_buffer[i] = net_rx_packets[i];
 | |
| 		priv->recv_packet_length[i] = 0;
 | |
| 	}
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int sb_eth_send(struct udevice *dev, void *packet, int length)
 | |
| {
 | |
| 	struct eth_sandbox_priv *priv = dev_get_priv(dev);
 | |
| 
 | |
| 	debug("eth_sandbox: Send packet %d\n", length);
 | |
| 
 | |
| 	if (priv->disabled)
 | |
| 		return 0;
 | |
| 
 | |
| 	return priv->tx_handler(dev, packet, length);
 | |
| }
 | |
| 
 | |
| static int sb_eth_recv(struct udevice *dev, int flags, uchar **packetp)
 | |
| {
 | |
| 	struct eth_sandbox_priv *priv = dev_get_priv(dev);
 | |
| 
 | |
| 	if (skip_timeout) {
 | |
| 		timer_test_add_offset(11000UL);
 | |
| 		skip_timeout = false;
 | |
| 	}
 | |
| 
 | |
| 	if (priv->recv_packets) {
 | |
| 		int lcl_recv_packet_length = priv->recv_packet_length[0];
 | |
| 
 | |
| 		debug("eth_sandbox: received packet[%d], %d waiting\n",
 | |
| 		      lcl_recv_packet_length, priv->recv_packets - 1);
 | |
| 		*packetp = priv->recv_packet_buffer[0];
 | |
| 		return lcl_recv_packet_length;
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int sb_eth_free_pkt(struct udevice *dev, uchar *packet, int length)
 | |
| {
 | |
| 	struct eth_sandbox_priv *priv = dev_get_priv(dev);
 | |
| 	int i;
 | |
| 
 | |
| 	if (!priv->recv_packets)
 | |
| 		return 0;
 | |
| 
 | |
| 	--priv->recv_packets;
 | |
| 	for (i = 0; i < priv->recv_packets; i++) {
 | |
| 		priv->recv_packet_length[i] = priv->recv_packet_length[i + 1];
 | |
| 		memcpy(priv->recv_packet_buffer[i],
 | |
| 		       priv->recv_packet_buffer[i + 1],
 | |
| 		       priv->recv_packet_length[i + 1]);
 | |
| 	}
 | |
| 	priv->recv_packet_length[priv->recv_packets] = 0;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static void sb_eth_stop(struct udevice *dev)
 | |
| {
 | |
| 	debug("eth_sandbox: Stop\n");
 | |
| }
 | |
| 
 | |
| static int sb_eth_write_hwaddr(struct udevice *dev)
 | |
| {
 | |
| 	struct eth_pdata *pdata = dev_get_platdata(dev);
 | |
| 
 | |
| 	debug("eth_sandbox %s: Write HW ADDR - %pM\n", dev->name,
 | |
| 	      pdata->enetaddr);
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static const struct eth_ops sb_eth_ops = {
 | |
| 	.start			= sb_eth_start,
 | |
| 	.send			= sb_eth_send,
 | |
| 	.recv			= sb_eth_recv,
 | |
| 	.free_pkt		= sb_eth_free_pkt,
 | |
| 	.stop			= sb_eth_stop,
 | |
| 	.write_hwaddr		= sb_eth_write_hwaddr,
 | |
| };
 | |
| 
 | |
| static int sb_eth_remove(struct udevice *dev)
 | |
| {
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int sb_eth_ofdata_to_platdata(struct udevice *dev)
 | |
| {
 | |
| 	struct eth_pdata *pdata = dev_get_platdata(dev);
 | |
| 	struct eth_sandbox_priv *priv = dev_get_priv(dev);
 | |
| 	const u8 *mac;
 | |
| 
 | |
| 	pdata->iobase = dev_read_addr(dev);
 | |
| 
 | |
| 	mac = dev_read_u8_array_ptr(dev, "fake-host-hwaddr", ARP_HLEN);
 | |
| 	if (!mac) {
 | |
| 		printf("'fake-host-hwaddr' is missing from the DT\n");
 | |
| 		return -EINVAL;
 | |
| 	}
 | |
| 	memcpy(priv->fake_host_hwaddr, mac, ARP_HLEN);
 | |
| 	priv->disabled = false;
 | |
| 	priv->tx_handler = sb_default_handler;
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static const struct udevice_id sb_eth_ids[] = {
 | |
| 	{ .compatible = "sandbox,eth" },
 | |
| 	{ }
 | |
| };
 | |
| 
 | |
| U_BOOT_DRIVER(eth_sandbox) = {
 | |
| 	.name	= "eth_sandbox",
 | |
| 	.id	= UCLASS_ETH,
 | |
| 	.of_match = sb_eth_ids,
 | |
| 	.ofdata_to_platdata = sb_eth_ofdata_to_platdata,
 | |
| 	.remove	= sb_eth_remove,
 | |
| 	.ops	= &sb_eth_ops,
 | |
| 	.priv_auto_alloc_size = sizeof(struct eth_sandbox_priv),
 | |
| 	.platdata_auto_alloc_size = sizeof(struct eth_pdata),
 | |
| };
 |