]> git.ipfire.org Git - people/ms/u-boot.git/blame - net/tftp.c
Fix ethernet timeouts on dbau1550 and other au1x00 systems
[people/ms/u-boot.git] / net / tftp.c
CommitLineData
fe8c2806
WD
1/*
2 * Copyright 1994, 1995, 2000 Neil Russell.
3 * (See License)
4 * Copyright 2000, 2001 DENX Software Engineering, Wolfgang Denk, wd@denx.de
5 */
6
7#include <common.h>
8#include <command.h>
9#include <net.h>
10#include "tftp.h"
11#include "bootp.h"
12
13#undef ET_DEBUG
14
15#if (CONFIG_COMMANDS & CFG_CMD_NET)
16
17#define WELL_KNOWN_PORT 69 /* Well known TFTP port # */
fbe4b5cb 18#define TIMEOUT 5 /* Seconds to timeout for a lost pkt */
fe8c2806
WD
19#ifndef CONFIG_NET_RETRY_COUNT
20# define TIMEOUT_COUNT 10 /* # of timeouts before giving up */
21#else
22# define TIMEOUT_COUNT (CONFIG_NET_RETRY_COUNT * 2)
23#endif
24 /* (for checking the image size) */
25#define HASHES_PER_LINE 65 /* Number of "loading" hashes per line */
26
27/*
28 * TFTP operations.
29 */
30#define TFTP_RRQ 1
31#define TFTP_WRQ 2
32#define TFTP_DATA 3
33#define TFTP_ACK 4
34#define TFTP_ERROR 5
fbe4b5cb 35#define TFTP_OACK 6
fe8c2806
WD
36
37
38static int TftpServerPort; /* The UDP port at their end */
39static int TftpOurPort; /* The UDP port at our end */
40static int TftpTimeoutCount;
3f85ce27
WD
41static ulong TftpBlock; /* packet sequence number */
42static ulong TftpLastBlock; /* last packet sequence number received */
43static ulong TftpBlockWrap; /* count of sequence number wraparounds */
44static ulong TftpBlockWrapOffset; /* memory offset due to wrapping */
fe8c2806 45static int TftpState;
3f85ce27 46
fe8c2806
WD
47#define STATE_RRQ 1
48#define STATE_DATA 2
49#define STATE_TOO_LARGE 3
50#define STATE_BAD_MAGIC 4
fbe4b5cb 51#define STATE_OACK 5
fe8c2806 52
3f85ce27
WD
53#define TFTP_BLOCK_SIZE 512 /* default TFTP block size */
54#define TFTP_SEQUENCE_SIZE ((ulong)(1<<16)) /* sequence number is 16 bit */
55
fe8c2806
WD
56#define DEFAULT_NAME_LEN (8 + 4 + 1)
57static char default_filename[DEFAULT_NAME_LEN];
58static char *tftp_filename;
59
60#ifdef CFG_DIRECT_FLASH_TFTP
61extern flash_info_t flash_info[CFG_MAX_FLASH_BANKS];
62#endif
63
64static __inline__ void
65store_block (unsigned block, uchar * src, unsigned len)
66{
3f85ce27
WD
67 ulong offset = block * TFTP_BLOCK_SIZE + TftpBlockWrapOffset;
68 ulong newsize = offset + len;
fe8c2806
WD
69#ifdef CFG_DIRECT_FLASH_TFTP
70 int i, rc = 0;
71
72 for (i=0; i<CFG_MAX_FLASH_BANKS; i++) {
73 /* start address in flash? */
74 if (load_addr + offset >= flash_info[i].start[0]) {
75 rc = 1;
76 break;
77 }
78 }
79
80 if (rc) { /* Flash is destination for this packet */
81 rc = flash_write ((uchar *)src, (ulong)(load_addr+offset), len);
82 if (rc) {
83 flash_perror (rc);
84 NetState = NETLOOP_FAIL;
85 return;
86 }
87 }
88 else
89#endif /* CFG_DIRECT_FLASH_TFTP */
90 {
91 (void)memcpy((void *)(load_addr + offset), src, len);
92 }
93
94 if (NetBootFileXferSize < newsize)
95 NetBootFileXferSize = newsize;
96}
97
98static void TftpSend (void);
99static void TftpTimeout (void);
100
101/**********************************************************************/
102
103static void
104TftpSend (void)
105{
106 volatile uchar * pkt;
107 volatile uchar * xp;
108 int len = 0;
7bc5ee07 109 volatile ushort *s;
fe8c2806
WD
110
111 /*
112 * We will always be sending some sort of packet, so
113 * cobble together the packet headers now.
114 */
a3d991bd 115 pkt = NetTxPacket + NetEthHdrSize() + IP_HDR_SIZE;
fe8c2806
WD
116
117 switch (TftpState) {
118
119 case STATE_RRQ:
120 xp = pkt;
7bc5ee07
WD
121 s = (ushort *)pkt;
122 *s++ = htons(TFTP_RRQ);
123 pkt = (uchar *)s;
fe8c2806
WD
124 strcpy ((char *)pkt, tftp_filename);
125 pkt += strlen(tftp_filename) + 1;
126 strcpy ((char *)pkt, "octet");
127 pkt += 5 /*strlen("octet")*/ + 1;
fbe4b5cb
WD
128 strcpy ((char *)pkt, "timeout");
129 pkt += 7 /*strlen("timeout")*/ + 1;
130 sprintf((char *)pkt, "%d", TIMEOUT);
131#ifdef ET_DEBUG
132 printf("send option \"timeout %s\"\n", (char *)pkt);
133#endif
134 pkt += strlen((char *)pkt) + 1;
fe8c2806
WD
135 len = pkt - xp;
136 break;
137
138 case STATE_DATA:
fbe4b5cb 139 case STATE_OACK:
fe8c2806 140 xp = pkt;
7bc5ee07
WD
141 s = (ushort *)pkt;
142 *s++ = htons(TFTP_ACK);
143 *s++ = htons(TftpBlock);
144 pkt = (uchar *)s;
fe8c2806
WD
145 len = pkt - xp;
146 break;
147
148 case STATE_TOO_LARGE:
149 xp = pkt;
7bc5ee07
WD
150 s = (ushort *)pkt;
151 *s++ = htons(TFTP_ERROR);
152 *s++ = htons(3);
153 pkt = (uchar *)s;
fe8c2806
WD
154 strcpy ((char *)pkt, "File too large");
155 pkt += 14 /*strlen("File too large")*/ + 1;
156 len = pkt - xp;
157 break;
158
159 case STATE_BAD_MAGIC:
160 xp = pkt;
7bc5ee07
WD
161 s = (ushort *)pkt;
162 *s++ = htons(TFTP_ERROR);
163 *s++ = htons(2);
164 pkt = (uchar *)s;
fe8c2806
WD
165 strcpy ((char *)pkt, "File has bad magic");
166 pkt += 18 /*strlen("File has bad magic")*/ + 1;
167 len = pkt - xp;
168 break;
169 }
170
73a8b27c 171 NetSendUDPPacket(NetServerEther, NetServerIP, TftpServerPort, TftpOurPort, len);
fe8c2806
WD
172}
173
174
175static void
176TftpHandler (uchar * pkt, unsigned dest, unsigned src, unsigned len)
177{
178 ushort proto;
7bc5ee07 179 ushort *s;
fe8c2806
WD
180
181 if (dest != TftpOurPort) {
182 return;
183 }
184 if (TftpState != STATE_RRQ && src != TftpServerPort) {
185 return;
186 }
187
188 if (len < 2) {
189 return;
190 }
191 len -= 2;
192 /* warning: don't use increment (++) in ntohs() macros!! */
7bc5ee07
WD
193 s = (ushort *)pkt;
194 proto = *s++;
195 pkt = (uchar *)s;
fe8c2806
WD
196 switch (ntohs(proto)) {
197
198 case TFTP_RRQ:
199 case TFTP_WRQ:
200 case TFTP_ACK:
201 break;
202 default:
203 break;
204
fbe4b5cb
WD
205 case TFTP_OACK:
206#ifdef ET_DEBUG
207 printf("Got OACK: %s %s\n", pkt, pkt+strlen(pkt)+1);
208#endif
209 TftpState = STATE_OACK;
210 TftpServerPort = src;
211 TftpSend (); /* Send ACK */
212 break;
fe8c2806
WD
213 case TFTP_DATA:
214 if (len < 2)
215 return;
216 len -= 2;
217 TftpBlock = ntohs(*(ushort *)pkt);
3f85ce27
WD
218
219 /*
cd0a9de6
WD
220 * RFC1350 specifies that the first data packet will
221 * have sequence number 1. If we receive a sequence
222 * number of 0 this means that there was a wrap
223 * around of the (16 bit) counter.
3f85ce27
WD
224 */
225 if (TftpBlock == 0) {
226 TftpBlockWrap++;
227 TftpBlockWrapOffset += TFTP_BLOCK_SIZE * TFTP_SEQUENCE_SIZE;
228 printf ("\n\t %lu MB reveived\n\t ", TftpBlockWrapOffset>>20);
229 } else {
230 if (((TftpBlock - 1) % 10) == 0) {
231 putc ('#');
232 } else if ((TftpBlock % (10 * HASHES_PER_LINE)) == 0) {
233 puts ("\n\t ");
234 }
fe8c2806
WD
235 }
236
fbe4b5cb 237#ifdef ET_DEBUG
fe8c2806 238 if (TftpState == STATE_RRQ) {
4b9206ed 239 puts ("Server did not acknowledge timeout option!\n");
fbe4b5cb
WD
240 }
241#endif
242
243 if (TftpState == STATE_RRQ || TftpState == STATE_OACK) {
3f85ce27 244 /* first block received */
fe8c2806
WD
245 TftpState = STATE_DATA;
246 TftpServerPort = src;
247 TftpLastBlock = 0;
3f85ce27
WD
248 TftpBlockWrap = 0;
249 TftpBlockWrapOffset = 0;
fe8c2806
WD
250
251 if (TftpBlock != 1) { /* Assertion */
252 printf ("\nTFTP error: "
3f85ce27 253 "First block is not block 1 (%ld)\n"
fe8c2806
WD
254 "Starting again\n\n",
255 TftpBlock);
256 NetStartAgain ();
257 break;
258 }
259 }
260
261 if (TftpBlock == TftpLastBlock) {
262 /*
263 * Same block again; ignore it.
264 */
265 break;
266 }
267
268 TftpLastBlock = TftpBlock;
269 NetSetTimeout (TIMEOUT * CFG_HZ, TftpTimeout);
270
271 store_block (TftpBlock - 1, pkt + 2, len);
272
273 /*
274 * Acknoledge the block just received, which will prompt
275 * the server for the next one.
276 */
277 TftpSend ();
278
3f85ce27 279 if (len < TFTP_BLOCK_SIZE) {
fe8c2806
WD
280 /*
281 * We received the whole thing. Try to
282 * run it.
283 */
284 puts ("\ndone\n");
285 NetState = NETLOOP_SUCCESS;
286 }
287 break;
288
289 case TFTP_ERROR:
290 printf ("\nTFTP error: '%s' (%d)\n",
291 pkt + 2, ntohs(*(ushort *)pkt));
292 puts ("Starting again\n\n");
293 NetStartAgain ();
294 break;
295 }
296}
297
298
299static void
300TftpTimeout (void)
301{
e0ac62d7 302 if (++TftpTimeoutCount > TIMEOUT_COUNT) {
fe8c2806
WD
303 puts ("\nRetry count exceeded; starting again\n");
304 NetStartAgain ();
305 } else {
306 puts ("T ");
307 NetSetTimeout (TIMEOUT * CFG_HZ, TftpTimeout);
308 TftpSend ();
309 }
310}
311
312
313void
314TftpStart (void)
315{
fe8c2806 316 if (BootFile[0] == '\0') {
fe8c2806 317 sprintf(default_filename, "%02lX%02lX%02lX%02lX.img",
c43352cc
WD
318 NetOurIP & 0xFF,
319 (NetOurIP >> 8) & 0xFF,
320 (NetOurIP >> 16) & 0xFF,
321 (NetOurIP >> 24) & 0xFF );
fe8c2806
WD
322 tftp_filename = default_filename;
323
324 printf ("*** Warning: no boot file name; using '%s'\n",
325 tftp_filename);
326 } else {
327 tftp_filename = BootFile;
328 }
329
5bb226e8
WD
330#if defined(CONFIG_NET_MULTI)
331 printf ("Using %s device\n", eth_get_name());
332#endif
fe8c2806
WD
333 puts ("TFTP from server "); print_IPaddr (NetServerIP);
334 puts ("; our IP address is "); print_IPaddr (NetOurIP);
335
336 /* Check if we need to send across this subnet */
337 if (NetOurGatewayIP && NetOurSubnetMask) {
338 IPaddr_t OurNet = NetOurIP & NetOurSubnetMask;
339 IPaddr_t ServerNet = NetServerIP & NetOurSubnetMask;
340
341 if (OurNet != ServerNet) {
342 puts ("; sending through gateway ");
343 print_IPaddr (NetOurGatewayIP) ;
344 }
345 }
346 putc ('\n');
347
348 printf ("Filename '%s'.", tftp_filename);
349
350 if (NetBootFileSize) {
351 printf (" Size is 0x%x Bytes = ", NetBootFileSize<<9);
352 print_size (NetBootFileSize<<9, "");
353 }
354
355 putc ('\n');
356
357 printf ("Load address: 0x%lx\n", load_addr);
358
359 puts ("Loading: *\b");
360
361 NetSetTimeout (TIMEOUT * CFG_HZ, TftpTimeout);
362 NetSetHandler (TftpHandler);
363
364 TftpServerPort = WELL_KNOWN_PORT;
365 TftpTimeoutCount = 0;
366 TftpState = STATE_RRQ;
367 TftpOurPort = 1024 + (get_timer(0) % 3072);
fbe4b5cb 368 TftpBlock = 0;
fe8c2806 369
73a8b27c
WD
370 /* zero out server ether in case the server ip has changed */
371 memset(NetServerEther, 0, 6);
372
fe8c2806
WD
373 TftpSend ();
374}
375
376#endif /* CFG_CMD_NET */