blob: d56e30b5b5c28a16a50912d864cba18d86492375 [file] [log] [blame]
wdenkfe8c2802002-11-03 00:38:21 +00001/*
2 * Copyright 1994, 1995, 2000 Neil Russell.
3 * (See License)
4 * Copyright 2000, 2001 DENX Software Engineering, Wolfgang Denk, wd@denx.de
5 */
6
7#include <common.h>
8#include <command.h>
9#include <net.h>
10#include "tftp.h"
11#include "bootp.h"
12
13#undef ET_DEBUG
14
Jon Loeliger54f35c22007-07-09 17:45:14 -050015#if defined(CONFIG_CMD_NET)
wdenkfe8c2802002-11-03 00:38:21 +000016
17#define WELL_KNOWN_PORT 69 /* Well known TFTP port # */
wdenk7182b0f2003-10-06 21:55:32 +000018#define TIMEOUT 5 /* Seconds to timeout for a lost pkt */
wdenkfe8c2802002-11-03 00:38:21 +000019#ifndef CONFIG_NET_RETRY_COUNT
20# define TIMEOUT_COUNT 10 /* # of timeouts before giving up */
21#else
22# define TIMEOUT_COUNT (CONFIG_NET_RETRY_COUNT * 2)
23#endif
24 /* (for checking the image size) */
25#define HASHES_PER_LINE 65 /* Number of "loading" hashes per line */
26
27/*
28 * TFTP operations.
29 */
30#define TFTP_RRQ 1
31#define TFTP_WRQ 2
32#define TFTP_DATA 3
33#define TFTP_ACK 4
34#define TFTP_ERROR 5
wdenk7182b0f2003-10-06 21:55:32 +000035#define TFTP_OACK 6
wdenkfe8c2802002-11-03 00:38:21 +000036
37
38static int TftpServerPort; /* The UDP port at their end */
39static int TftpOurPort; /* The UDP port at our end */
40static int TftpTimeoutCount;
wdenkef893942004-02-23 16:11:30 +000041static ulong TftpBlock; /* packet sequence number */
42static ulong TftpLastBlock; /* last packet sequence number received */
43static ulong TftpBlockWrap; /* count of sequence number wraparounds */
44static ulong TftpBlockWrapOffset; /* memory offset due to wrapping */
wdenkfe8c2802002-11-03 00:38:21 +000045static int TftpState;
wdenkef893942004-02-23 16:11:30 +000046
wdenkfe8c2802002-11-03 00:38:21 +000047#define STATE_RRQ 1
48#define STATE_DATA 2
49#define STATE_TOO_LARGE 3
50#define STATE_BAD_MAGIC 4
wdenk7182b0f2003-10-06 21:55:32 +000051#define STATE_OACK 5
wdenkfe8c2802002-11-03 00:38:21 +000052
wdenkef893942004-02-23 16:11:30 +000053#define TFTP_BLOCK_SIZE 512 /* default TFTP block size */
54#define TFTP_SEQUENCE_SIZE ((ulong)(1<<16)) /* sequence number is 16 bit */
55
wdenkfe8c2802002-11-03 00:38:21 +000056#define DEFAULT_NAME_LEN (8 + 4 + 1)
57static char default_filename[DEFAULT_NAME_LEN];
58static char *tftp_filename;
59
60#ifdef CFG_DIRECT_FLASH_TFTP
Marian Balakowicz513b4a12005-10-11 19:09:42 +020061extern flash_info_t flash_info[];
wdenkfe8c2802002-11-03 00:38:21 +000062#endif
63
64static __inline__ void
65store_block (unsigned block, uchar * src, unsigned len)
66{
wdenkef893942004-02-23 16:11:30 +000067 ulong offset = block * TFTP_BLOCK_SIZE + TftpBlockWrapOffset;
68 ulong newsize = offset + len;
wdenkfe8c2802002-11-03 00:38:21 +000069#ifdef CFG_DIRECT_FLASH_TFTP
70 int i, rc = 0;
71
72 for (i=0; i<CFG_MAX_FLASH_BANKS; i++) {
73 /* start address in flash? */
74 if (load_addr + offset >= flash_info[i].start[0]) {
75 rc = 1;
76 break;
77 }
78 }
79
80 if (rc) { /* Flash is destination for this packet */
Wolfgang Denk7fb52662005-10-13 16:45:02 +020081 rc = flash_write ((char *)src, (ulong)(load_addr+offset), len);
wdenkfe8c2802002-11-03 00:38:21 +000082 if (rc) {
83 flash_perror (rc);
84 NetState = NETLOOP_FAIL;
85 return;
86 }
87 }
88 else
89#endif /* CFG_DIRECT_FLASH_TFTP */
90 {
91 (void)memcpy((void *)(load_addr + offset), src, len);
92 }
93
94 if (NetBootFileXferSize < newsize)
95 NetBootFileXferSize = newsize;
96}
97
98static void TftpSend (void);
99static void TftpTimeout (void);
100
101/**********************************************************************/
102
103static void
104TftpSend (void)
105{
106 volatile uchar * pkt;
107 volatile uchar * xp;
108 int len = 0;
Wolfgang Denk3135c542005-08-26 01:36:03 +0200109 volatile ushort *s;
wdenkfe8c2802002-11-03 00:38:21 +0000110
111 /*
112 * We will always be sending some sort of packet, so
113 * cobble together the packet headers now.
114 */
wdenk145d2c12004-04-15 21:48:45 +0000115 pkt = NetTxPacket + NetEthHdrSize() + IP_HDR_SIZE;
wdenkfe8c2802002-11-03 00:38:21 +0000116
117 switch (TftpState) {
118
119 case STATE_RRQ:
120 xp = pkt;
Wolfgang Denk3135c542005-08-26 01:36:03 +0200121 s = (ushort *)pkt;
122 *s++ = htons(TFTP_RRQ);
123 pkt = (uchar *)s;
wdenkfe8c2802002-11-03 00:38:21 +0000124 strcpy ((char *)pkt, tftp_filename);
125 pkt += strlen(tftp_filename) + 1;
126 strcpy ((char *)pkt, "octet");
127 pkt += 5 /*strlen("octet")*/ + 1;
wdenk7182b0f2003-10-06 21:55:32 +0000128 strcpy ((char *)pkt, "timeout");
129 pkt += 7 /*strlen("timeout")*/ + 1;
130 sprintf((char *)pkt, "%d", TIMEOUT);
131#ifdef ET_DEBUG
132 printf("send option \"timeout %s\"\n", (char *)pkt);
133#endif
134 pkt += strlen((char *)pkt) + 1;
wdenkfe8c2802002-11-03 00:38:21 +0000135 len = pkt - xp;
136 break;
137
138 case STATE_DATA:
wdenk7182b0f2003-10-06 21:55:32 +0000139 case STATE_OACK:
wdenkfe8c2802002-11-03 00:38:21 +0000140 xp = pkt;
Wolfgang Denk3135c542005-08-26 01:36:03 +0200141 s = (ushort *)pkt;
142 *s++ = htons(TFTP_ACK);
143 *s++ = htons(TftpBlock);
144 pkt = (uchar *)s;
wdenkfe8c2802002-11-03 00:38:21 +0000145 len = pkt - xp;
146 break;
147
148 case STATE_TOO_LARGE:
149 xp = pkt;
Wolfgang Denk3135c542005-08-26 01:36:03 +0200150 s = (ushort *)pkt;
151 *s++ = htons(TFTP_ERROR);
152 *s++ = htons(3);
153 pkt = (uchar *)s;
wdenkfe8c2802002-11-03 00:38:21 +0000154 strcpy ((char *)pkt, "File too large");
155 pkt += 14 /*strlen("File too large")*/ + 1;
156 len = pkt - xp;
157 break;
158
159 case STATE_BAD_MAGIC:
160 xp = pkt;
Wolfgang Denk3135c542005-08-26 01:36:03 +0200161 s = (ushort *)pkt;
162 *s++ = htons(TFTP_ERROR);
163 *s++ = htons(2);
164 pkt = (uchar *)s;
wdenkfe8c2802002-11-03 00:38:21 +0000165 strcpy ((char *)pkt, "File has bad magic");
166 pkt += 18 /*strlen("File has bad magic")*/ + 1;
167 len = pkt - xp;
168 break;
169 }
170
wdenke6466f62003-06-05 19:27:42 +0000171 NetSendUDPPacket(NetServerEther, NetServerIP, TftpServerPort, TftpOurPort, len);
wdenkfe8c2802002-11-03 00:38:21 +0000172}
173
174
175static void
176TftpHandler (uchar * pkt, unsigned dest, unsigned src, unsigned len)
177{
178 ushort proto;
Wolfgang Denk3135c542005-08-26 01:36:03 +0200179 ushort *s;
wdenkfe8c2802002-11-03 00:38:21 +0000180
181 if (dest != TftpOurPort) {
182 return;
183 }
184 if (TftpState != STATE_RRQ && src != TftpServerPort) {
185 return;
186 }
187
188 if (len < 2) {
189 return;
190 }
191 len -= 2;
192 /* warning: don't use increment (++) in ntohs() macros!! */
Wolfgang Denk3135c542005-08-26 01:36:03 +0200193 s = (ushort *)pkt;
194 proto = *s++;
195 pkt = (uchar *)s;
wdenkfe8c2802002-11-03 00:38:21 +0000196 switch (ntohs(proto)) {
197
198 case TFTP_RRQ:
199 case TFTP_WRQ:
200 case TFTP_ACK:
201 break;
202 default:
203 break;
204
wdenk7182b0f2003-10-06 21:55:32 +0000205 case TFTP_OACK:
206#ifdef ET_DEBUG
207 printf("Got OACK: %s %s\n", pkt, pkt+strlen(pkt)+1);
208#endif
209 TftpState = STATE_OACK;
210 TftpServerPort = src;
211 TftpSend (); /* Send ACK */
212 break;
wdenkfe8c2802002-11-03 00:38:21 +0000213 case TFTP_DATA:
214 if (len < 2)
215 return;
216 len -= 2;
217 TftpBlock = ntohs(*(ushort *)pkt);
wdenkef893942004-02-23 16:11:30 +0000218
219 /*
wdenkf70cbb22004-02-23 20:48:38 +0000220 * RFC1350 specifies that the first data packet will
221 * have sequence number 1. If we receive a sequence
222 * number of 0 this means that there was a wrap
223 * around of the (16 bit) counter.
wdenkef893942004-02-23 16:11:30 +0000224 */
225 if (TftpBlock == 0) {
226 TftpBlockWrap++;
227 TftpBlockWrapOffset += TFTP_BLOCK_SIZE * TFTP_SEQUENCE_SIZE;
Wolfgang Denk26442ac2006-08-14 22:43:13 +0200228 printf ("\n\t %lu MB received\n\t ", TftpBlockWrapOffset>>20);
wdenkef893942004-02-23 16:11:30 +0000229 } else {
230 if (((TftpBlock - 1) % 10) == 0) {
231 putc ('#');
232 } else if ((TftpBlock % (10 * HASHES_PER_LINE)) == 0) {
233 puts ("\n\t ");
234 }
wdenkfe8c2802002-11-03 00:38:21 +0000235 }
236
wdenk7182b0f2003-10-06 21:55:32 +0000237#ifdef ET_DEBUG
wdenkfe8c2802002-11-03 00:38:21 +0000238 if (TftpState == STATE_RRQ) {
wdenk42c05472004-03-23 22:14:11 +0000239 puts ("Server did not acknowledge timeout option!\n");
wdenk7182b0f2003-10-06 21:55:32 +0000240 }
241#endif
242
243 if (TftpState == STATE_RRQ || TftpState == STATE_OACK) {
wdenkef893942004-02-23 16:11:30 +0000244 /* first block received */
wdenkfe8c2802002-11-03 00:38:21 +0000245 TftpState = STATE_DATA;
246 TftpServerPort = src;
247 TftpLastBlock = 0;
wdenkef893942004-02-23 16:11:30 +0000248 TftpBlockWrap = 0;
249 TftpBlockWrapOffset = 0;
wdenkfe8c2802002-11-03 00:38:21 +0000250
251 if (TftpBlock != 1) { /* Assertion */
252 printf ("\nTFTP error: "
wdenkef893942004-02-23 16:11:30 +0000253 "First block is not block 1 (%ld)\n"
wdenkfe8c2802002-11-03 00:38:21 +0000254 "Starting again\n\n",
255 TftpBlock);
256 NetStartAgain ();
257 break;
258 }
259 }
260
261 if (TftpBlock == TftpLastBlock) {
262 /*
263 * Same block again; ignore it.
264 */
265 break;
266 }
267
268 TftpLastBlock = TftpBlock;
269 NetSetTimeout (TIMEOUT * CFG_HZ, TftpTimeout);
270
271 store_block (TftpBlock - 1, pkt + 2, len);
272
273 /*
274 * Acknoledge the block just received, which will prompt
275 * the server for the next one.
276 */
277 TftpSend ();
278
wdenkef893942004-02-23 16:11:30 +0000279 if (len < TFTP_BLOCK_SIZE) {
wdenkfe8c2802002-11-03 00:38:21 +0000280 /*
281 * We received the whole thing. Try to
282 * run it.
283 */
284 puts ("\ndone\n");
285 NetState = NETLOOP_SUCCESS;
286 }
287 break;
288
289 case TFTP_ERROR:
290 printf ("\nTFTP error: '%s' (%d)\n",
291 pkt + 2, ntohs(*(ushort *)pkt));
292 puts ("Starting again\n\n");
293 NetStartAgain ();
294 break;
295 }
296}
297
298
299static void
300TftpTimeout (void)
301{
wdenk5d841732003-08-17 18:55:18 +0000302 if (++TftpTimeoutCount > TIMEOUT_COUNT) {
wdenkfe8c2802002-11-03 00:38:21 +0000303 puts ("\nRetry count exceeded; starting again\n");
304 NetStartAgain ();
305 } else {
306 puts ("T ");
307 NetSetTimeout (TIMEOUT * CFG_HZ, TftpTimeout);
308 TftpSend ();
309 }
310}
311
312
313void
314TftpStart (void)
315{
Wolfgang Denke3cfce52005-09-24 22:37:32 +0200316#ifdef CONFIG_TFTP_PORT
317 char *ep; /* Environment pointer */
318#endif
319
wdenkfe8c2802002-11-03 00:38:21 +0000320 if (BootFile[0] == '\0') {
wdenkfe8c2802002-11-03 00:38:21 +0000321 sprintf(default_filename, "%02lX%02lX%02lX%02lX.img",
Wolfgang Denkdec97322005-08-04 01:09:44 +0200322 NetOurIP & 0xFF,
323 (NetOurIP >> 8) & 0xFF,
324 (NetOurIP >> 16) & 0xFF,
325 (NetOurIP >> 24) & 0xFF );
wdenkfe8c2802002-11-03 00:38:21 +0000326 tftp_filename = default_filename;
327
328 printf ("*** Warning: no boot file name; using '%s'\n",
329 tftp_filename);
330 } else {
331 tftp_filename = BootFile;
332 }
333
wdenkc6abb7e2003-11-17 21:14:37 +0000334#if defined(CONFIG_NET_MULTI)
335 printf ("Using %s device\n", eth_get_name());
336#endif
wdenkfe8c2802002-11-03 00:38:21 +0000337 puts ("TFTP from server "); print_IPaddr (NetServerIP);
338 puts ("; our IP address is "); print_IPaddr (NetOurIP);
339
340 /* Check if we need to send across this subnet */
341 if (NetOurGatewayIP && NetOurSubnetMask) {
342 IPaddr_t OurNet = NetOurIP & NetOurSubnetMask;
343 IPaddr_t ServerNet = NetServerIP & NetOurSubnetMask;
344
345 if (OurNet != ServerNet) {
346 puts ("; sending through gateway ");
347 print_IPaddr (NetOurGatewayIP) ;
348 }
349 }
350 putc ('\n');
351
352 printf ("Filename '%s'.", tftp_filename);
353
354 if (NetBootFileSize) {
355 printf (" Size is 0x%x Bytes = ", NetBootFileSize<<9);
356 print_size (NetBootFileSize<<9, "");
357 }
358
359 putc ('\n');
360
361 printf ("Load address: 0x%lx\n", load_addr);
362
363 puts ("Loading: *\b");
364
365 NetSetTimeout (TIMEOUT * CFG_HZ, TftpTimeout);
366 NetSetHandler (TftpHandler);
367
368 TftpServerPort = WELL_KNOWN_PORT;
369 TftpTimeoutCount = 0;
370 TftpState = STATE_RRQ;
Wolfgang Denke3cfce52005-09-24 22:37:32 +0200371 /* Use a pseudo-random port unless a specific port is set */
wdenkfe8c2802002-11-03 00:38:21 +0000372 TftpOurPort = 1024 + (get_timer(0) % 3072);
Wolfgang Denke3cfce52005-09-24 22:37:32 +0200373#ifdef CONFIG_TFTP_PORT
Wolfgang Denk227b5192005-09-24 23:25:46 +0200374 if ((ep = getenv("tftpdstp")) != NULL) {
375 TftpServerPort = simple_strtol(ep, NULL, 10);
376 }
377 if ((ep = getenv("tftpsrcp")) != NULL) {
Wolfgang Denke3cfce52005-09-24 22:37:32 +0200378 TftpOurPort= simple_strtol(ep, NULL, 10);
379 }
380#endif
wdenk7182b0f2003-10-06 21:55:32 +0000381 TftpBlock = 0;
wdenkfe8c2802002-11-03 00:38:21 +0000382
wdenke6466f62003-06-05 19:27:42 +0000383 /* zero out server ether in case the server ip has changed */
384 memset(NetServerEther, 0, 6);
385
wdenkfe8c2802002-11-03 00:38:21 +0000386 TftpSend ();
387}
388
Jon Loeligera9807e52007-07-10 11:05:02 -0500389#endif