2 * Linux ARCnet driver - "cap mode" packet encapsulation.
3 * It adds sequence numbers to packets for communicating between a user space
4 * application and the driver. After a transmit it sends a packet with protocol
5 * byte 0 back up to the userspace containing the sequence number of the packet
6 * plus the transmit-status on the ArcNet.
8 * Written 2002-4 by Esben Nielsen, Vestas Wind Systems A/S
9 * Derived from arc-rawmode.c by Avery Pennarun.
10 * arc-rawmode was in turned based on skeleton.c, see below.
12 * **********************
14 * The original copyright of skeleton.c was as follows:
16 * skeleton.c Written 1993 by Donald Becker.
17 * Copyright 1993 United States Government as represented by the
18 * Director, National Security Agency. This software may only be used
19 * and distributed according to the terms of the GNU General Public License as
20 * modified by SRC, incorporated herein by reference.
22 * **********************
24 * For more details, see drivers/net/arcnet.c
26 * **********************
29 #include <linux/module.h>
30 #include <linux/init.h>
31 #include <linux/if_arp.h>
33 #include <linux/netdevice.h>
34 #include <linux/skbuff.h>
35 #include <linux/arcdevice.h>
37 #define VERSION "arcnet: cap mode (`c') encapsulation support loaded.\n"
40 static void rx(struct net_device
*dev
, int bufnum
,
41 struct archdr
*pkthdr
, int length
);
42 static int build_header(struct sk_buff
*skb
,
43 struct net_device
*dev
,
46 static int prepare_tx(struct net_device
*dev
, struct archdr
*pkt
, int length
,
48 static int ack_tx(struct net_device
*dev
, int acked
);
51 static struct ArcProto capmode_proto
=
64 static void arcnet_cap_init(void)
68 for (count
= 1; count
<= 8; count
++)
69 if (arc_proto_map
[count
] == arc_proto_default
)
70 arc_proto_map
[count
] = &capmode_proto
;
72 /* for cap mode, we only set the bcast proto if there's no better one */
73 if (arc_bcast_proto
== arc_proto_default
)
74 arc_bcast_proto
= &capmode_proto
;
76 arc_proto_default
= &capmode_proto
;
77 arc_raw_proto
= &capmode_proto
;
83 static int __init
capmode_module_init(void)
90 static void __exit
capmode_module_exit(void)
92 arcnet_unregister_proto(&capmode_proto
);
94 module_init(capmode_module_init
);
95 module_exit(capmode_module_exit
);
97 MODULE_LICENSE("GPL");
102 /* packet receiver */
103 static void rx(struct net_device
*dev
, int bufnum
,
104 struct archdr
*pkthdr
, int length
)
106 struct arcnet_local
*lp
= netdev_priv(dev
);
108 struct archdr
*pkt
= pkthdr
;
109 char *pktbuf
, *pkthdrbuf
;
112 BUGMSG(D_DURING
, "it's a raw(cap) packet (length=%d)\n", length
);
119 skb
= alloc_skb(length
+ ARC_HDR_SIZE
+ sizeof(int), GFP_ATOMIC
);
121 BUGMSG(D_NORMAL
, "Memory squeeze, dropping packet.\n");
122 lp
->stats
.rx_dropped
++;
125 skb_put(skb
, length
+ ARC_HDR_SIZE
+ sizeof(int));
127 skb_reset_mac_header(skb
);
128 pkt
= (struct archdr
*)skb_mac_header(skb
);
129 skb_pull(skb
, ARC_HDR_SIZE
);
131 /* up to sizeof(pkt->soft) has already been copied from the card */
132 /* squeeze in an int for the cap encapsulation */
134 /* use these variables to be sure we count in bytes, not in
135 sizeof(struct archdr) */
137 pkthdrbuf
=(char*)pkthdr
;
138 memcpy(pktbuf
, pkthdrbuf
, ARC_HDR_SIZE
+sizeof(pkt
->soft
.cap
.proto
));
139 memcpy(pktbuf
+ARC_HDR_SIZE
+sizeof(pkt
->soft
.cap
.proto
)+sizeof(int),
140 pkthdrbuf
+ARC_HDR_SIZE
+sizeof(pkt
->soft
.cap
.proto
),
141 sizeof(struct archdr
)-ARC_HDR_SIZE
-sizeof(pkt
->soft
.cap
.proto
));
143 if (length
> sizeof(pkt
->soft
))
144 lp
->hw
.copy_from_card(dev
, bufnum
, ofs
+ sizeof(pkt
->soft
),
145 pkt
->soft
.raw
+ sizeof(pkt
->soft
)
147 length
- sizeof(pkt
->soft
));
149 BUGLVL(D_SKB
) arcnet_dump_skb(dev
, skb
, "rx");
151 skb
->protocol
= __constant_htons(ETH_P_ARCNET
);
158 * Create the ARCnet hard/soft headers for cap mode.
159 * There aren't any soft headers in cap mode - not even the protocol id.
161 static int build_header(struct sk_buff
*skb
,
162 struct net_device
*dev
,
166 int hdr_size
= ARC_HDR_SIZE
;
167 struct archdr
*pkt
= (struct archdr
*) skb_push(skb
, hdr_size
);
169 BUGMSG(D_PROTO
, "Preparing header for cap packet %x.\n",
170 *((int*)&pkt
->soft
.cap
.cookie
[0]));
172 * Set the source hardware address.
174 * This is pretty pointless for most purposes, but it can help in
175 * debugging. ARCnet does not allow us to change the source address in
176 * the actual packet sent)
178 pkt
->hard
.source
= *dev
->dev_addr
;
180 /* see linux/net/ethernet/eth.c to see where I got the following */
182 if (dev
->flags
& (IFF_LOOPBACK
| IFF_NOARP
)) {
184 * FIXME: fill in the last byte of the dest ipaddr here to better
185 * comply with RFC1051 in "noarp" mode.
190 /* otherwise, just fill it in and go! */
191 pkt
->hard
.dest
= daddr
;
193 return hdr_size
; /* success */
197 static int prepare_tx(struct net_device
*dev
, struct archdr
*pkt
, int length
,
200 struct arcnet_local
*lp
= netdev_priv(dev
);
201 struct arc_hardware
*hard
= &pkt
->hard
;
205 /* hard header is not included in packet length */
206 length
-= ARC_HDR_SIZE
;
207 /* And neither is the cookie field */
208 length
-= sizeof(int);
210 BUGMSG(D_DURING
, "prepare_tx: txbufs=%d/%d/%d\n",
211 lp
->next_tx
, lp
->cur_tx
, bufnum
);
213 BUGMSG(D_PROTO
, "Sending for cap packet %x.\n",
214 *((int*)&pkt
->soft
.cap
.cookie
[0]));
217 /* should never happen! other people already check for this. */
218 BUGMSG(D_NORMAL
, "Bug! prepare_tx with size %d (> %d)\n",
222 if (length
> MinTU
) {
224 hard
->offset
[1] = ofs
= 512 - length
;
225 } else if (length
> MTU
) {
227 hard
->offset
[1] = ofs
= 512 - length
- 3;
229 hard
->offset
[0] = ofs
= 256 - length
;
231 BUGMSG(D_DURING
, "prepare_tx: length=%d ofs=%d\n",
234 // Copy the arcnet-header + the protocol byte down:
235 lp
->hw
.copy_to_card(dev
, bufnum
, 0, hard
, ARC_HDR_SIZE
);
236 lp
->hw
.copy_to_card(dev
, bufnum
, ofs
, &pkt
->soft
.cap
.proto
,
237 sizeof(pkt
->soft
.cap
.proto
));
239 // Skip the extra integer we have written into it as a cookie
240 // but write the rest of the message:
241 lp
->hw
.copy_to_card(dev
, bufnum
, ofs
+1,
242 ((unsigned char*)&pkt
->soft
.cap
.mes
),length
-1);
244 lp
->lastload_dest
= hard
->dest
;
250 static int ack_tx(struct net_device
*dev
, int acked
)
252 struct arcnet_local
*lp
= netdev_priv(dev
);
253 struct sk_buff
*ackskb
;
254 struct archdr
*ackpkt
;
255 int length
=sizeof(struct arc_cap
);
257 BUGMSG(D_DURING
, "capmode: ack_tx: protocol: %x: result: %d\n",
258 lp
->outgoing
.skb
->protocol
, acked
);
260 BUGLVL(D_SKB
) arcnet_dump_skb(dev
, lp
->outgoing
.skb
, "ack_tx");
262 /* Now alloc a skb to send back up through the layers: */
263 ackskb
= alloc_skb(length
+ ARC_HDR_SIZE
, GFP_ATOMIC
);
264 if (ackskb
== NULL
) {
265 BUGMSG(D_NORMAL
, "Memory squeeze, can't acknowledge.\n");
269 skb_put(ackskb
, length
+ ARC_HDR_SIZE
);
272 skb_reset_mac_header(ackskb
);
273 ackpkt
= (struct archdr
*)skb_mac_header(ackskb
);
274 /* skb_pull(ackskb, ARC_HDR_SIZE); */
277 skb_copy_from_linear_data(lp
->outgoing
.skb
, ackpkt
,
278 ARC_HDR_SIZE
+ sizeof(struct arc_cap
));
279 ackpkt
->soft
.cap
.proto
=0; /* using protocol 0 for acknowledge */
280 ackpkt
->soft
.cap
.mes
.ack
=acked
;
282 BUGMSG(D_PROTO
, "Ackknowledge for cap packet %x.\n",
283 *((int*)&ackpkt
->soft
.cap
.cookie
[0]));
285 ackskb
->protocol
= __constant_htons(ETH_P_ARCNET
);
287 BUGLVL(D_SKB
) arcnet_dump_skb(dev
, ackskb
, "ack_tx_recv");
291 dev_kfree_skb_irq(lp
->outgoing
.skb
);
292 lp
->outgoing
.proto
= NULL
; /* We are always finished when in this protocol */