]> git.proxmox.com Git - mirror_edk2.git/blob - NetworkPkg/Mtftp6Dxe/Mtftp6Support.c
NetworkPkg:Replace unsafe string functions.
[mirror_edk2.git] / NetworkPkg / Mtftp6Dxe / Mtftp6Support.c
1 /** @file
2 Mtftp6 support functions implementation.
3
4 Copyright (c) 2009 - 2015, Intel Corporation. All rights reserved.<BR>
5
6 This program and the accompanying materials
7 are licensed and made available under the terms and conditions of the BSD License
8 which accompanies this distribution. The full text of the license may be found at
9 http://opensource.org/licenses/bsd-license.php.
10
11 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13
14 **/
15
16 #include "Mtftp6Impl.h"
17
18
19 /**
20 Allocate a MTFTP block range, then init it to the range of [Start, End].
21
22 @param[in] Start The start block number.
23 @param[in] End The last block number in the range.
24
25 @return Range The range of the allocated block buffer.
26
27 **/
28 MTFTP6_BLOCK_RANGE *
29 Mtftp6AllocateRange (
30 IN UINT16 Start,
31 IN UINT16 End
32 )
33 {
34 MTFTP6_BLOCK_RANGE *Range;
35
36 Range = AllocateZeroPool (sizeof (MTFTP6_BLOCK_RANGE));
37
38 if (Range == NULL) {
39 return NULL;
40 }
41
42 InitializeListHead (&Range->Link);
43 Range->Start = Start;
44 Range->End = End;
45 Range->Bound = End;
46
47 return Range;
48 }
49
50
51 /**
52 Initialize the block range for either RRQ or WRQ. RRQ and WRQ have
53 different requirements for Start and End. For example, during startup,
54 WRQ initializes its whole valid block range to [0, 0xffff]. This
55 is bacause the server will send an ACK0 to inform the user to start the
56 upload. When the client receives an ACK0, it will remove 0 from the range,
57 get the next block number, which is 1, then upload the BLOCK1. For RRQ
58 without option negotiation, the server will directly send the BLOCK1
59 in response to the client's RRQ. When received BLOCK1, the client will
60 remove it from the block range and send an ACK. It also works if there
61 is option negotiation.
62
63 @param[in] Head The block range head to initialize.
64 @param[in] Start The Start block number.
65 @param[in] End The last block number.
66
67 @retval EFI_OUT_OF_RESOURCES Failed to allocate memory for initial block range.
68 @retval EFI_SUCCESS The initial block range is created.
69
70 **/
71 EFI_STATUS
72 Mtftp6InitBlockRange (
73 IN LIST_ENTRY *Head,
74 IN UINT16 Start,
75 IN UINT16 End
76 )
77 {
78 MTFTP6_BLOCK_RANGE *Range;
79
80 Range = Mtftp6AllocateRange (Start, End);
81
82 if (Range == NULL) {
83 return EFI_OUT_OF_RESOURCES;
84 }
85
86 InsertTailList (Head, &Range->Link);
87 return EFI_SUCCESS;
88 }
89
90
91 /**
92 Get the first valid block number on the range list.
93
94 @param[in] Head The block range head.
95
96 @retval ==-1 If the block range is empty.
97 @retval >-1 The first valid block number.
98
99 **/
100 INTN
101 Mtftp6GetNextBlockNum (
102 IN LIST_ENTRY *Head
103 )
104 {
105 MTFTP6_BLOCK_RANGE *Range;
106
107 if (IsListEmpty (Head)) {
108 return -1;
109 }
110
111 Range = NET_LIST_HEAD (Head, MTFTP6_BLOCK_RANGE, Link);
112 return Range->Start;
113 }
114
115
116 /**
117 Set the last block number of the block range list. It
118 removes all the blocks after the Last. MTFTP initialize the
119 block range to the maximum possible range, such as [0, 0xffff]
120 for WRQ. When it gets the last block number, it calls
121 this function to set the last block number.
122
123 @param[in] Head The block range list.
124 @param[in] Last The last block number.
125
126 **/
127 VOID
128 Mtftp6SetLastBlockNum (
129 IN LIST_ENTRY *Head,
130 IN UINT16 Last
131 )
132 {
133 MTFTP6_BLOCK_RANGE *Range;
134
135 //
136 // Iterate from the tail to head to remove the block number
137 // after the last.
138 //
139 while (!IsListEmpty (Head)) {
140 Range = NET_LIST_TAIL (Head, MTFTP6_BLOCK_RANGE, Link);
141
142 if (Range->Start > Last) {
143 RemoveEntryList (&Range->Link);
144 FreePool (Range);
145 continue;
146 }
147
148 if (Range->End > Last) {
149 Range->End = Last;
150 }
151 return ;
152 }
153 }
154
155
156 /**
157 Remove the block number from the block range list.
158
159 @param[in] Head The block range list to remove from.
160 @param[in] Num The block number to remove.
161 @param[in] Completed Whether Num is the last block number
162 @param[out] TotalBlock The continuous block number in all
163
164 @retval EFI_NOT_FOUND The block number isn't in the block range list.
165 @retval EFI_SUCCESS The block number has been removed from the list.
166 @retval EFI_OUT_OF_RESOURCES Failed to allocate resources.
167
168 **/
169 EFI_STATUS
170 Mtftp6RemoveBlockNum (
171 IN LIST_ENTRY *Head,
172 IN UINT16 Num,
173 IN BOOLEAN Completed,
174 OUT UINT64 *TotalBlock
175 )
176 {
177 MTFTP6_BLOCK_RANGE *Range;
178 MTFTP6_BLOCK_RANGE *NewRange;
179 LIST_ENTRY *Entry;
180
181 NET_LIST_FOR_EACH (Entry, Head) {
182
183 //
184 // Each block represents a hole [Start, End] in the file,
185 // skip to the first range with End >= Num
186 //
187 Range = NET_LIST_USER_STRUCT (Entry, MTFTP6_BLOCK_RANGE, Link);
188
189 if (Range->End < Num) {
190 continue;
191 }
192
193 //
194 // There are three different cases for Start
195 // 1. (Start > Num) && (End >= Num):
196 // because all the holes before this one has the condition of
197 // End < Num, so this block number has been removed.
198 //
199 // 2. (Start == Num) && (End >= Num):
200 // Need to increase the Start by one, and if End == Num, this
201 // hole has been removed completely, remove it.
202 //
203 // 3. (Start < Num) && (End >= Num):
204 // if End == Num, only need to decrease the End by one because
205 // we have (Start < Num) && (Num == End), so (Start <= End - 1).
206 // if (End > Num), the hold is splited into two holes, with
207 // [Start, Num - 1] and [Num + 1, End].
208 //
209 if (Range->Start > Num) {
210 return EFI_NOT_FOUND;
211
212 } else if (Range->Start == Num) {
213 Range->Start++;
214
215 //
216 // Note that: RFC 1350 does not mention block counter roll-over,
217 // but several TFTP hosts implement the roll-over be able to accept
218 // transfers of unlimited size. There is no consensus, however, whether
219 // the counter should wrap around to zero or to one. Many implementations
220 // wrap to zero, because this is the simplest to implement. Here we choose
221 // this solution.
222 //
223 *TotalBlock = Num;
224
225 if (Range->Round > 0) {
226 *TotalBlock += Range->Bound + MultU64x32 ((UINT64) (Range->Round -1), (UINT32)(Range->Bound + 1)) + 1;
227 }
228
229 if (Range->Start > Range->Bound) {
230 Range->Start = 0;
231 Range->Round ++;
232 }
233
234 if ((Range->Start > Range->End) || Completed) {
235 RemoveEntryList (&Range->Link);
236 FreePool (Range);
237 }
238
239 return EFI_SUCCESS;
240
241 } else {
242 if (Range->End == Num) {
243 Range->End--;
244 } else {
245 NewRange = Mtftp6AllocateRange ((UINT16) (Num + 1), (UINT16) Range->End);
246
247 if (NewRange == NULL) {
248 return EFI_OUT_OF_RESOURCES;
249 }
250
251 Range->End = Num - 1;
252 NetListInsertAfter (&Range->Link, &NewRange->Link);
253 }
254
255 return EFI_SUCCESS;
256 }
257 }
258
259 return EFI_NOT_FOUND;
260 }
261
262
263 /**
264 Configure the opened Udp6 instance until the corresponding Ip6 instance
265 has been configured.
266
267 @param[in] UdpIo The pointer to the Udp6 Io.
268 @param[in] UdpCfgData The pointer to the Udp6 configure data.
269
270 @retval EFI_SUCCESS Configure the Udp6 instance successfully.
271 @retval EFI_NO_MAPPING The corresponding Ip6 instance has not
272 been configured yet.
273
274 **/
275 EFI_STATUS
276 Mtftp6GetMapping (
277 IN UDP_IO *UdpIo,
278 IN EFI_UDP6_CONFIG_DATA *UdpCfgData
279 )
280 {
281 EFI_IP6_MODE_DATA Ip6Mode;
282 EFI_UDP6_PROTOCOL *Udp6;
283 EFI_STATUS Status;
284 EFI_EVENT Event;
285
286 Event = NULL;
287 Udp6 = UdpIo->Protocol.Udp6;
288
289 //
290 // Create a timer to check whether the Ip6 instance configured or not.
291 //
292 Status = gBS->CreateEvent (
293 EVT_TIMER,
294 TPL_CALLBACK,
295 NULL,
296 NULL,
297 &Event
298 );
299 if (EFI_ERROR (Status)) {
300 goto ON_EXIT;
301 }
302
303 Status = gBS->SetTimer (
304 Event,
305 TimerRelative,
306 MTFTP6_GET_MAPPING_TIMEOUT * MTFTP6_TICK_PER_SECOND
307 );
308 if (EFI_ERROR (Status)) {
309 goto ON_EXIT;
310 }
311
312 //
313 // Check the Ip6 mode data till timeout.
314 //
315 while (EFI_ERROR (gBS->CheckEvent (Event))) {
316
317 Udp6->Poll (Udp6);
318
319 Status = Udp6->GetModeData (Udp6, NULL, &Ip6Mode, NULL, NULL);
320
321 if (!EFI_ERROR (Status)) {
322
323 if (Ip6Mode.IsConfigured) {
324 //
325 // Continue to configure the Udp6 instance.
326 //
327 Status = Udp6->Configure (Udp6, UdpCfgData);
328 } else {
329 Status = EFI_NO_MAPPING;
330 }
331 }
332 }
333
334 ON_EXIT:
335
336 if (Event != NULL) {
337 gBS->CloseEvent (Event);
338 }
339
340 return Status;
341 }
342
343
344 /**
345 The dummy configure routine for create a new Udp6 Io.
346
347 @param[in] UdpIo The pointer to the Udp6 Io.
348 @param[in] Context The pointer to the context.
349
350 @retval EFI_SUCCESS This value is always returned.
351
352 **/
353 EFI_STATUS
354 EFIAPI
355 Mtftp6ConfigDummyUdpIo (
356 IN UDP_IO *UdpIo,
357 IN VOID *Context
358 )
359 {
360 return EFI_SUCCESS;
361 }
362
363
364 /**
365 The configure routine for Mtftp6 instance to transmit/receive.
366
367 @param[in] UdpIo The pointer to the Udp6 Io.
368 @param[in] ServerIp The pointer to the server address.
369 @param[in] ServerPort The pointer to the server port.
370 @param[in] LocalIp The pointer to the local address.
371 @param[in] LocalPort The pointer to the local port.
372
373 @retval EFI_SUCCESS Configured the Udp6 Io for Mtftp6 successfully.
374 @retval EFI_NO_MAPPING The corresponding Ip6 instance has not been
375 configured yet.
376
377 **/
378 EFI_STATUS
379 Mtftp6ConfigUdpIo (
380 IN UDP_IO *UdpIo,
381 IN EFI_IPv6_ADDRESS *ServerIp,
382 IN UINT16 ServerPort,
383 IN EFI_IPv6_ADDRESS *LocalIp,
384 IN UINT16 LocalPort
385 )
386 {
387 EFI_STATUS Status;
388 EFI_UDP6_PROTOCOL *Udp6;
389 EFI_UDP6_CONFIG_DATA *Udp6Cfg;
390
391 Udp6 = UdpIo->Protocol.Udp6;
392 Udp6Cfg = &(UdpIo->Config.Udp6);
393
394 ZeroMem (Udp6Cfg, sizeof (EFI_UDP6_CONFIG_DATA));
395
396 //
397 // Set the Udp6 Io configure data.
398 //
399 Udp6Cfg->AcceptPromiscuous = FALSE;
400 Udp6Cfg->AcceptAnyPort = FALSE;
401 Udp6Cfg->AllowDuplicatePort = FALSE;
402 Udp6Cfg->TrafficClass = 0;
403 Udp6Cfg->HopLimit = 128;
404 Udp6Cfg->ReceiveTimeout = 0;
405 Udp6Cfg->TransmitTimeout = 0;
406 Udp6Cfg->StationPort = LocalPort;
407 Udp6Cfg->RemotePort = ServerPort;
408
409 CopyMem (
410 &Udp6Cfg->StationAddress,
411 LocalIp,
412 sizeof (EFI_IPv6_ADDRESS)
413 );
414
415 CopyMem (
416 &Udp6Cfg->RemoteAddress,
417 ServerIp,
418 sizeof (EFI_IPv6_ADDRESS)
419 );
420
421 //
422 // Configure the Udp6 instance with current configure data.
423 //
424 Status = Udp6->Configure (Udp6, Udp6Cfg);
425
426 if (Status == EFI_NO_MAPPING) {
427
428 return Mtftp6GetMapping (UdpIo, Udp6Cfg);
429 }
430
431 return Status;
432 }
433
434
435 /**
436 Build and transmit the request packet for the Mtftp6 instance.
437
438 @param[in] Instance The pointer to the Mtftp6 instance.
439 @param[in] Operation The operation code of this packet.
440
441 @retval EFI_OUT_OF_RESOURCES Failed to allocate memory for the request.
442 @retval EFI_SUCCESS The request is built and sent.
443 @retval Others Failed to transmit the packet.
444
445 **/
446 EFI_STATUS
447 Mtftp6SendRequest (
448 IN MTFTP6_INSTANCE *Instance,
449 IN UINT16 Operation
450 )
451 {
452 EFI_MTFTP6_PACKET *Packet;
453 EFI_MTFTP6_OPTION *Options;
454 EFI_MTFTP6_TOKEN *Token;
455 NET_BUF *Nbuf;
456 UINT8 *Mode;
457 UINT8 *Cur;
458 UINT32 Len1;
459 UINT32 Len2;
460 UINT32 Len;
461 UINTN Index;
462
463 Token = Instance->Token;
464 Options = Token->OptionList;
465 Mode = Token->ModeStr;
466
467 if (Mode == NULL) {
468 Mode = (UINT8 *) "octet";
469 }
470
471 //
472 // The header format of RRQ/WRQ packet is:
473 //
474 // 2 bytes string 1 byte string 1 byte
475 // ------------------------------------------------
476 // | Opcode | Filename | 0 | Mode | 0 |
477 // ------------------------------------------------
478 //
479 // The common option format is:
480 //
481 // string 1 byte string 1 byte
482 // ---------------------------------------
483 // | OptionStr | 0 | ValueStr | 0 |
484 // ---------------------------------------
485 //
486
487 //
488 // Compute the size of new Mtftp6 packet.
489 //
490 Len1 = (UINT32) AsciiStrLen ((CHAR8 *) Token->Filename);
491 Len2 = (UINT32) AsciiStrLen ((CHAR8 *) Mode);
492 Len = Len1 + Len2 + 4;
493
494 for (Index = 0; Index < Token->OptionCount; Index++) {
495 Len1 = (UINT32) AsciiStrLen ((CHAR8 *) Options[Index].OptionStr);
496 Len2 = (UINT32) AsciiStrLen ((CHAR8 *) Options[Index].ValueStr);
497 Len += Len1 + Len2 + 2;
498 }
499
500 //
501 // Allocate a packet then copy the data.
502 //
503 if ((Nbuf = NetbufAlloc (Len)) == NULL) {
504 return EFI_OUT_OF_RESOURCES;
505 }
506
507 //
508 // Copy the opcode, filename and mode into packet.
509 //
510 Packet = (EFI_MTFTP6_PACKET *) NetbufAllocSpace (Nbuf, Len, FALSE);
511 ASSERT (Packet != NULL);
512
513 Packet->OpCode = HTONS (Operation);
514 Cur = Packet->Rrq.Filename;
515 Cur = (UINT8 *) AsciiStrCpyS ((CHAR8 *) Cur, Len - 2, (CHAR8 *) Token->Filename);
516 Cur += AsciiStrLen ((CHAR8 *) Token->Filename) + 1;
517 Cur = (UINT8 *) AsciiStrCpyS ((CHAR8 *) Cur, Len - 2 - (AsciiStrLen ((CHAR8 *) Token->Filename) + 1), (CHAR8 *) Mode);
518 Cur += AsciiStrLen ((CHAR8 *) Mode) + 1;
519 Len -= ((UINT32) AsciiStrLen ((CHAR8 *) Token->Filename) + (UINT32) AsciiStrLen ((CHAR8 *) Mode) + 4);
520
521 //
522 // Copy all the extension options into the packet.
523 //
524 for (Index = 0; Index < Token->OptionCount; ++Index) {
525 Cur = (UINT8 *) AsciiStrCpyS ((CHAR8 *) Cur, Len, (CHAR8 *) Options[Index].OptionStr);
526 Cur += AsciiStrLen ((CHAR8 *) Options[Index].OptionStr) + 1;
527 Len -= (UINT32)(AsciiStrLen ((CHAR8 *) Options[Index].OptionStr) + 1);
528 Cur = (UINT8 *) AsciiStrCpyS ((CHAR8 *) Cur, Len, (CHAR8 *) Options[Index].ValueStr);
529 Cur += AsciiStrLen ((CHAR8 *) (CHAR8 *) Options[Index].ValueStr) + 1;
530 Len -= (UINT32)(AsciiStrLen ((CHAR8 *) Options[Index].ValueStr) + 1);
531 }
532
533 //
534 // Save the packet buf for retransmit
535 //
536 if (Instance->LastPacket != NULL) {
537 NetbufFree (Instance->LastPacket);
538 }
539
540 Instance->LastPacket = Nbuf;
541 Instance->CurRetry = 0;
542
543 return Mtftp6TransmitPacket (Instance, Nbuf);
544 }
545
546
547 /**
548 Build and send an error packet.
549
550 @param[in] Instance The pointer to the Mtftp6 instance.
551 @param[in] ErrCode The error code in the packet.
552 @param[in] ErrInfo The error message in the packet.
553
554 @retval EFI_OUT_OF_RESOURCES Failed to allocate memory for the error packet.
555 @retval EFI_SUCCESS The error packet is transmitted.
556 @retval Others Failed to transmit the packet.
557
558 **/
559 EFI_STATUS
560 Mtftp6SendError (
561 IN MTFTP6_INSTANCE *Instance,
562 IN UINT16 ErrCode,
563 IN UINT8* ErrInfo
564 )
565 {
566 NET_BUF *Nbuf;
567 EFI_MTFTP6_PACKET *TftpError;
568 UINT32 Len;
569
570 //
571 // Allocate a packet then copy the data.
572 //
573 Len = (UINT32) (AsciiStrLen ((CHAR8 *) ErrInfo) + sizeof (EFI_MTFTP6_ERROR_HEADER));
574 Nbuf = NetbufAlloc (Len);
575
576 if (Nbuf == NULL) {
577 return EFI_OUT_OF_RESOURCES;
578 }
579
580 TftpError = (EFI_MTFTP6_PACKET *) NetbufAllocSpace (Nbuf, Len, FALSE);
581
582 if (TftpError == NULL) {
583 NetbufFree (Nbuf);
584 return EFI_OUT_OF_RESOURCES;
585 }
586
587 TftpError->OpCode = HTONS (EFI_MTFTP6_OPCODE_ERROR);
588 TftpError->Error.ErrorCode = HTONS (ErrCode);
589
590 AsciiStrCpyS ((CHAR8 *) TftpError->Error.ErrorMessage, sizeof (TftpError->Error.ErrorMessage) / sizeof (TftpError->Error.ErrorMessage[0]), (CHAR8 *) ErrInfo);
591
592 //
593 // Save the packet buf for retransmit
594 //
595 if (Instance->LastPacket != NULL) {
596 NetbufFree (Instance->LastPacket);
597 }
598
599 Instance->LastPacket = Nbuf;
600 Instance->CurRetry = 0;
601
602 return Mtftp6TransmitPacket (Instance, Nbuf);
603 }
604
605
606 /**
607 The callback function called when the packet is transmitted.
608
609 @param[in] Packet The pointer to the packet.
610 @param[in] UdpEpt The pointer to the Udp6 access point.
611 @param[in] IoStatus The result of the transmission.
612 @param[in] Context The pointer to the context.
613
614 **/
615 VOID
616 EFIAPI
617 Mtftp6OnPacketSent (
618 IN NET_BUF *Packet,
619 IN UDP_END_POINT *UdpEpt,
620 IN EFI_STATUS IoStatus,
621 IN VOID *Context
622 )
623 {
624 NetbufFree (Packet);
625 *(BOOLEAN *) Context = TRUE;
626 }
627
628
629 /**
630 Send the packet for the Mtftp6 instance.
631
632 @param[in] Instance The pointer to the Mtftp6 instance.
633 @param[in] Packet The pointer to the packet to be sent.
634
635 @retval EFI_SUCCESS The packet was sent out
636 @retval Others Failed to transmit the packet.
637
638 **/
639 EFI_STATUS
640 Mtftp6TransmitPacket (
641 IN MTFTP6_INSTANCE *Instance,
642 IN NET_BUF *Packet
643 )
644 {
645 EFI_UDP6_PROTOCOL *Udp6;
646 EFI_UDP6_CONFIG_DATA Udp6CfgData;
647 EFI_STATUS Status;
648 UINT16 *Temp;
649 UINT16 Value;
650 UINT16 OpCode;
651
652 ZeroMem (&Udp6CfgData, sizeof(EFI_UDP6_CONFIG_DATA));
653 Udp6 = Instance->UdpIo->Protocol.Udp6;
654
655 //
656 // Set the live time of the packet.
657 //
658 Instance->PacketToLive = Instance->IsMaster ? Instance->Timeout : (Instance->Timeout * 2);
659
660 Temp = (UINT16 *) NetbufGetByte (Packet, 0, NULL);
661 ASSERT (Temp != NULL);
662
663 Value = *Temp;
664 OpCode = NTOHS (Value);
665
666 if (OpCode == EFI_MTFTP6_OPCODE_RRQ || OpCode == EFI_MTFTP6_OPCODE_DIR || OpCode == EFI_MTFTP6_OPCODE_WRQ) {
667 //
668 // For the Rrq, Dir, Wrq requests of the operation, configure the Udp6Io as
669 // (serverip, 69, localip, localport) to send.
670 // Usually local address and local port are both default as zero.
671 //
672 Status = Udp6->Configure (Udp6, NULL);
673
674 if (EFI_ERROR (Status)) {
675 return Status;
676 }
677
678 Status = Mtftp6ConfigUdpIo (
679 Instance->UdpIo,
680 &Instance->ServerIp,
681 Instance->ServerCmdPort,
682 &Instance->Config->StationIp,
683 Instance->Config->LocalPort
684 );
685
686 if (EFI_ERROR (Status)) {
687 return Status;
688 }
689
690 //
691 // Get the current local address and port by get Udp6 mode data.
692 //
693 Status = Udp6->GetModeData (Udp6, &Udp6CfgData, NULL, NULL, NULL);
694 if (EFI_ERROR (Status)) {
695 return Status;
696 }
697
698 NET_GET_REF (Packet);
699
700 Instance->IsTransmitted = FALSE;
701
702 Status = UdpIoSendDatagram (
703 Instance->UdpIo,
704 Packet,
705 NULL,
706 NULL,
707 Mtftp6OnPacketSent,
708 &Instance->IsTransmitted
709 );
710
711 if (EFI_ERROR (Status)) {
712 NET_PUT_REF (Packet);
713 return Status;
714 }
715
716 //
717 // Poll till the packet sent out from the ip6 queue.
718 //
719 gBS->RestoreTPL (Instance->OldTpl);
720
721 while (!Instance->IsTransmitted) {
722 Udp6->Poll (Udp6);
723 }
724
725 Instance->OldTpl = gBS->RaiseTPL (TPL_CALLBACK);
726
727 //
728 // For the subsequent exchange of such requests, reconfigure the Udp6Io as
729 // (serverip, 0, localip, localport) to receive.
730 // Currently local address and local port are specified by Udp6 mode data.
731 //
732 Status = Udp6->Configure (Udp6, NULL);
733
734 if (EFI_ERROR (Status)) {
735 return Status;
736 }
737
738 Status = Mtftp6ConfigUdpIo (
739 Instance->UdpIo,
740 &Instance->ServerIp,
741 Instance->ServerDataPort,
742 &Udp6CfgData.StationAddress,
743 Udp6CfgData.StationPort
744 );
745 } else {
746 //
747 // For the data exchange, configure the Udp6Io as (serverip, dataport,
748 // localip, localport) to send/receive.
749 // Currently local address and local port are specified by Udp6 mode data.
750 //
751 Status = Udp6->GetModeData (Udp6, &Udp6CfgData, NULL, NULL, NULL);
752 if (EFI_ERROR (Status)) {
753 return Status;
754 }
755
756 if (Udp6CfgData.RemotePort != Instance->ServerDataPort) {
757
758 Status = Udp6->Configure (Udp6, NULL);
759
760 if (EFI_ERROR (Status)) {
761 return Status;
762 }
763
764 Status = Mtftp6ConfigUdpIo (
765 Instance->UdpIo,
766 &Instance->ServerIp,
767 Instance->ServerDataPort,
768 &Udp6CfgData.StationAddress,
769 Udp6CfgData.StationPort
770 );
771
772 if (EFI_ERROR (Status)) {
773 return Status;
774 }
775 }
776
777 NET_GET_REF (Packet);
778
779 Instance->IsTransmitted = FALSE;
780
781 Status = UdpIoSendDatagram (
782 Instance->UdpIo,
783 Packet,
784 NULL,
785 NULL,
786 Mtftp6OnPacketSent,
787 &Instance->IsTransmitted
788 );
789
790 if (EFI_ERROR (Status)) {
791 NET_PUT_REF (Packet);
792 }
793
794 //
795 // Poll till the packet sent out from the ip6 queue.
796 //
797 gBS->RestoreTPL (Instance->OldTpl);
798
799 while (!Instance->IsTransmitted) {
800 Udp6->Poll (Udp6);
801 }
802
803 Instance->OldTpl = gBS->RaiseTPL (TPL_CALLBACK);
804 }
805
806 return Status;
807 }
808
809
810 /**
811 Check packet for GetInfo callback routine.
812
813 GetInfo is implemented with EfiMtftp6ReadFile. It's used to inspect
814 the first packet from server, then abort the session.
815
816 @param[in] This The pointer to the Mtftp6 protocol.
817 @param[in] Token The pointer to the Mtftp6 token.
818 @param[in] PacketLen The length of the packet.
819 @param[in] Packet The pointer to the received packet.
820
821 @retval EFI_ABORTED Abort the Mtftp6 operation.
822
823 **/
824 EFI_STATUS
825 EFIAPI
826 Mtftp6CheckPacket (
827 IN EFI_MTFTP6_PROTOCOL *This,
828 IN EFI_MTFTP6_TOKEN *Token,
829 IN UINT16 PacketLen,
830 IN EFI_MTFTP6_PACKET *Packet
831 )
832 {
833 MTFTP6_GETINFO_CONTEXT *Context;
834 UINT16 OpCode;
835
836 Context = (MTFTP6_GETINFO_CONTEXT *) Token->Context;
837 OpCode = NTOHS (Packet->OpCode);
838
839 //
840 // Set the GetInfo's return status according to the OpCode.
841 //
842 switch (OpCode) {
843 case EFI_MTFTP6_OPCODE_ERROR:
844 Context->Status = EFI_TFTP_ERROR;
845 break;
846
847 case EFI_MTFTP6_OPCODE_OACK:
848 Context->Status = EFI_SUCCESS;
849 break;
850
851 default:
852 Context->Status = EFI_PROTOCOL_ERROR;
853 }
854
855 //
856 // Allocate buffer then copy the packet over. Use gBS->AllocatePool
857 // in case NetAllocatePool will implements something tricky.
858 //
859 *(Context->Packet) = AllocateZeroPool (PacketLen);
860
861 if (*(Context->Packet) == NULL) {
862 Context->Status = EFI_OUT_OF_RESOURCES;
863 return EFI_ABORTED;
864 }
865
866 *(Context->PacketLen) = PacketLen;
867 CopyMem (*(Context->Packet), Packet, PacketLen);
868
869 return EFI_ABORTED;
870 }
871
872
873 /**
874 Clean up the current Mtftp6 operation.
875
876 @param[in] Instance The pointer to the Mtftp6 instance.
877 @param[in] Result The result to be returned to the user.
878
879 **/
880 VOID
881 Mtftp6OperationClean (
882 IN MTFTP6_INSTANCE *Instance,
883 IN EFI_STATUS Result
884 )
885 {
886 LIST_ENTRY *Entry;
887 LIST_ENTRY *Next;
888 MTFTP6_BLOCK_RANGE *Block;
889
890 //
891 // Clean up the current token and event.
892 //
893 if (Instance->Token != NULL) {
894 Instance->Token->Status = Result;
895 if (Instance->Token->Event != NULL) {
896 gBS->SignalEvent (Instance->Token->Event);
897 }
898 Instance->Token = NULL;
899 }
900
901 //
902 // Clean up the corresponding Udp6Io.
903 //
904 if (Instance->UdpIo != NULL) {
905 UdpIoCleanIo (Instance->UdpIo);
906 }
907
908 if (Instance->McastUdpIo != NULL) {
909 gBS->CloseProtocol (
910 Instance->McastUdpIo->UdpHandle,
911 &gEfiUdp6ProtocolGuid,
912 Instance->McastUdpIo->Image,
913 Instance->Handle
914 );
915 UdpIoFreeIo (Instance->McastUdpIo);
916 Instance->McastUdpIo = NULL;
917 }
918
919 //
920 // Clean up the stored last packet.
921 //
922 if (Instance->LastPacket != NULL) {
923 NetbufFree (Instance->LastPacket);
924 Instance->LastPacket = NULL;
925 }
926
927 NET_LIST_FOR_EACH_SAFE (Entry, Next, &Instance->BlkList) {
928 Block = NET_LIST_USER_STRUCT (Entry, MTFTP6_BLOCK_RANGE, Link);
929 RemoveEntryList (Entry);
930 FreePool (Block);
931 }
932
933 //
934 // Reinitialize the corresponding fields of the Mtftp6 operation.
935 //
936 ZeroMem (&Instance->ExtInfo, sizeof (MTFTP6_EXT_OPTION_INFO));
937 ZeroMem (&Instance->ServerIp, sizeof (EFI_IPv6_ADDRESS));
938 ZeroMem (&Instance->McastIp, sizeof (EFI_IPv6_ADDRESS));
939
940 Instance->ServerCmdPort = 0;
941 Instance->ServerDataPort = 0;
942 Instance->McastPort = 0;
943 Instance->BlkSize = 0;
944 Instance->LastBlk = 0;
945 Instance->PacketToLive = 0;
946 Instance->MaxRetry = 0;
947 Instance->CurRetry = 0;
948 Instance->Timeout = 0;
949 Instance->IsMaster = TRUE;
950 }
951
952
953 /**
954 Start the Mtftp6 instance to perform the operation, such as read file,
955 write file, and read directory.
956
957 @param[in] This The MTFTP session.
958 @param[in] Token The token than encapsues the user's request.
959 @param[in] OpCode The operation to perform.
960
961 @retval EFI_INVALID_PARAMETER Some of the parameters are invalid.
962 @retval EFI_NOT_STARTED The MTFTP session hasn't been configured.
963 @retval EFI_ALREADY_STARTED There is pending operation for the session.
964 @retval EFI_SUCCESS The operation is successfully started.
965
966 **/
967 EFI_STATUS
968 Mtftp6OperationStart (
969 IN EFI_MTFTP6_PROTOCOL *This,
970 IN EFI_MTFTP6_TOKEN *Token,
971 IN UINT16 OpCode
972 )
973 {
974 MTFTP6_INSTANCE *Instance;
975 EFI_STATUS Status;
976
977 if (This == NULL ||
978 Token == NULL ||
979 Token->Filename == NULL ||
980 (Token->OptionCount != 0 && Token->OptionList == NULL) ||
981 (Token->OverrideData != NULL && !NetIp6IsValidUnicast (&Token->OverrideData->ServerIp))
982 ) {
983 return EFI_INVALID_PARAMETER;
984 }
985
986 //
987 // At least define one method to collect the data for download.
988 //
989 if ((OpCode == EFI_MTFTP6_OPCODE_RRQ || OpCode == EFI_MTFTP6_OPCODE_DIR) &&
990 Token->Buffer == NULL &&
991 Token->CheckPacket == NULL
992 ) {
993 return EFI_INVALID_PARAMETER;
994 }
995
996 //
997 // At least define one method to provide the data for upload.
998 //
999 if (OpCode == EFI_MTFTP6_OPCODE_WRQ && Token->Buffer == NULL && Token->PacketNeeded == NULL) {
1000 return EFI_INVALID_PARAMETER;
1001 }
1002
1003 Instance = MTFTP6_INSTANCE_FROM_THIS (This);
1004
1005 if (Instance->Config == NULL) {
1006 return EFI_NOT_STARTED;
1007 }
1008
1009 if (Instance->Token != NULL) {
1010 return EFI_ACCESS_DENIED;
1011 }
1012
1013 Status = EFI_SUCCESS;
1014 Instance->OldTpl = gBS->RaiseTPL (TPL_CALLBACK);
1015
1016 //
1017 // Parse the extension options in the request packet.
1018 //
1019 if (Token->OptionCount != 0) {
1020
1021 Status = Mtftp6ParseExtensionOption (
1022 Token->OptionList,
1023 Token->OptionCount,
1024 TRUE,
1025 &Instance->ExtInfo
1026 );
1027
1028 if (EFI_ERROR (Status)) {
1029 goto ON_ERROR;
1030 }
1031 }
1032
1033 //
1034 // Initialize runtime data from config data or override data.
1035 //
1036 Instance->Token = Token;
1037 Instance->ServerCmdPort = Instance->Config->InitialServerPort;
1038 Instance->ServerDataPort = 0;
1039 Instance->MaxRetry = Instance->Config->TryCount;
1040 Instance->Timeout = Instance->Config->TimeoutValue;
1041 Instance->IsMaster = TRUE;
1042
1043 CopyMem (
1044 &Instance->ServerIp,
1045 &Instance->Config->ServerIp,
1046 sizeof (EFI_IPv6_ADDRESS)
1047 );
1048
1049 if (Token->OverrideData != NULL) {
1050 Instance->ServerCmdPort = Token->OverrideData->ServerPort;
1051 Instance->MaxRetry = Token->OverrideData->TryCount;
1052 Instance->Timeout = Token->OverrideData->TimeoutValue;
1053
1054 CopyMem (
1055 &Instance->ServerIp,
1056 &Token->OverrideData->ServerIp,
1057 sizeof (EFI_IPv6_ADDRESS)
1058 );
1059 }
1060
1061 //
1062 // Set default value for undefined parameters.
1063 //
1064 if (Instance->ServerCmdPort == 0) {
1065 Instance->ServerCmdPort = MTFTP6_DEFAULT_SERVER_CMD_PORT;
1066 }
1067 if (Instance->BlkSize == 0) {
1068 Instance->BlkSize = MTFTP6_DEFAULT_BLK_SIZE;
1069 }
1070 if (Instance->MaxRetry == 0) {
1071 Instance->MaxRetry = MTFTP6_DEFAULT_MAX_RETRY;
1072 }
1073 if (Instance->Timeout == 0) {
1074 Instance->Timeout = MTFTP6_DEFAULT_TIMEOUT;
1075 }
1076
1077 Token->Status = EFI_NOT_READY;
1078
1079 //
1080 // Switch the routines by the operation code.
1081 //
1082 switch (OpCode) {
1083 case EFI_MTFTP6_OPCODE_RRQ:
1084 Status = Mtftp6RrqStart (Instance, OpCode);
1085 break;
1086
1087 case EFI_MTFTP6_OPCODE_DIR:
1088 Status = Mtftp6RrqStart (Instance, OpCode);
1089 break;
1090
1091 case EFI_MTFTP6_OPCODE_WRQ:
1092 Status = Mtftp6WrqStart (Instance, OpCode);
1093 break;
1094
1095 default:
1096 Status = EFI_DEVICE_ERROR;
1097 goto ON_ERROR;
1098 }
1099
1100 if (EFI_ERROR (Status)) {
1101 goto ON_ERROR;
1102 }
1103
1104 //
1105 // Return immediately for asynchronous or poll the instance for synchronous.
1106 //
1107 gBS->RestoreTPL (Instance->OldTpl);
1108
1109 if (Token->Event == NULL) {
1110 while (Token->Status == EFI_NOT_READY) {
1111 This->Poll (This);
1112 }
1113 return Token->Status;
1114 }
1115
1116 return EFI_SUCCESS;
1117
1118 ON_ERROR:
1119
1120 Mtftp6OperationClean (Instance, Status);
1121 gBS->RestoreTPL (Instance->OldTpl);
1122
1123 return Status;
1124 }
1125
1126
1127 /**
1128 The timer ticking routine for the Mtftp6 instance.
1129
1130 @param[in] Event The pointer to the ticking event.
1131 @param[in] Context The pointer to the context.
1132
1133 **/
1134 VOID
1135 EFIAPI
1136 Mtftp6OnTimerTick (
1137 IN EFI_EVENT Event,
1138 IN VOID *Context
1139 )
1140 {
1141 MTFTP6_SERVICE *Service;
1142 MTFTP6_INSTANCE *Instance;
1143 LIST_ENTRY *Entry;
1144 LIST_ENTRY *Next;
1145 EFI_MTFTP6_TOKEN *Token;
1146 EFI_STATUS Status;
1147
1148 Service = (MTFTP6_SERVICE *) Context;
1149
1150 //
1151 // Iterate through all the children of the Mtftp service instance. Time
1152 // out the packet. If maximum retries reached, clean the session up.
1153 //
1154 NET_LIST_FOR_EACH_SAFE (Entry, Next, &Service->Children) {
1155
1156 Instance = NET_LIST_USER_STRUCT (Entry, MTFTP6_INSTANCE, Link);
1157
1158 if (Instance->Token == NULL) {
1159 continue;
1160 }
1161
1162 if (Instance->PacketToLive > 0) {
1163 Instance->PacketToLive--;
1164 continue;
1165 }
1166
1167 Instance->CurRetry++;
1168 Token = Instance->Token;
1169
1170 if (Token->TimeoutCallback != NULL) {
1171 //
1172 // Call the timeout callback routine if has.
1173 //
1174 Status = Token->TimeoutCallback (&Instance->Mtftp6, Token);
1175
1176 if (EFI_ERROR (Status)) {
1177 Mtftp6SendError (
1178 Instance,
1179 EFI_MTFTP6_ERRORCODE_REQUEST_DENIED,
1180 (UINT8 *) "User aborted the transfer in time out"
1181 );
1182 Mtftp6OperationClean (Instance, EFI_ABORTED);
1183 continue;
1184 }
1185 }
1186
1187 //
1188 // Retransmit the packet if haven't reach the maxmium retry count,
1189 // otherwise exit the transfer.
1190 //
1191 if (Instance->CurRetry < Instance->MaxRetry) {
1192 Mtftp6TransmitPacket (Instance, Instance->LastPacket);
1193 } else {
1194 Mtftp6OperationClean (Instance, EFI_TIMEOUT);
1195 continue;
1196 }
1197 }
1198 }