mirror of https://github.com/acidanthera/audk.git
2421 lines
88 KiB
C
2421 lines
88 KiB
C
/** @file
|
|
This implementation of EFI_PXE_BASE_CODE_PROTOCOL and EFI_LOAD_FILE_PROTOCOL.
|
|
|
|
Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>
|
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
**/
|
|
|
|
#include "PxeBcImpl.h"
|
|
|
|
|
|
/**
|
|
Enables the use of the PXE Base Code Protocol functions.
|
|
|
|
This function enables the use of the PXE Base Code Protocol functions. If the
|
|
Started field of the EFI_PXE_BASE_CODE_MODE structure is already TRUE, then
|
|
EFI_ALREADY_STARTED will be returned. If UseIpv6 is TRUE, then IPv6 formatted
|
|
addresses will be used in this session. If UseIpv6 is FALSE, then IPv4 formatted
|
|
addresses will be used in this session. If UseIpv6 is TRUE, and the Ipv6Supported
|
|
field of the EFI_PXE_BASE_CODE_MODE structure is FALSE, then EFI_UNSUPPORTED will
|
|
be returned. If there is not enough memory or other resources to start the PXE
|
|
Base Code Protocol, then EFI_OUT_OF_RESOURCES will be returned. Otherwise, the
|
|
PXE Base Code Protocol will be started.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] UseIpv6 Specifies the type of IP addresses that are to be
|
|
used during the session that is being started.
|
|
Set to TRUE for IPv6, and FALSE for IPv4.
|
|
|
|
@retval EFI_SUCCESS The PXE Base Code Protocol was started.
|
|
@retval EFI_DEVICE_ERROR The network device encountered an error during this operation.
|
|
@retval EFI_UNSUPPORTED UseIpv6 is TRUE, but the Ipv6Supported field of the
|
|
EFI_PXE_BASE_CODE_MODE structure is FALSE.
|
|
@retval EFI_ALREADY_STARTED The PXE Base Code Protocol is already in the started state.
|
|
@retval EFI_INVALID_PARAMETER The This parameter is NULL or does not point to a valid
|
|
EFI_PXE_BASE_CODE_PROTOCOL structure.
|
|
@retval EFI_OUT_OF_RESOURCES Could not allocate enough memory or other resources to start the
|
|
PXE Base Code Protocol.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcStart (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN BOOLEAN UseIpv6
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
UINTN Index;
|
|
EFI_STATUS Status;
|
|
|
|
if (This == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
|
|
if (Mode->Started) {
|
|
return EFI_ALREADY_STARTED;
|
|
}
|
|
|
|
//
|
|
// Detect whether using IPv6 or not, and set it into mode data.
|
|
//
|
|
if (UseIpv6 && Mode->Ipv6Available && Mode->Ipv6Supported && Private->Ip6Nic != NULL) {
|
|
Mode->UsingIpv6 = TRUE;
|
|
} else if (!UseIpv6 && Private->Ip4Nic != NULL) {
|
|
Mode->UsingIpv6 = FALSE;
|
|
} else {
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
if (Mode->UsingIpv6) {
|
|
AsciiPrint ("\n>>Start PXE over IPv6");
|
|
//
|
|
// Configure udp6 instance to receive data.
|
|
//
|
|
Status = Private->Udp6Read->Configure (
|
|
Private->Udp6Read,
|
|
&Private->Udp6CfgData
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_ERROR;
|
|
}
|
|
|
|
//
|
|
// Configure block size for TFTP as a default value to handle all link layers.
|
|
//
|
|
Private->BlockSize = Private->Ip6MaxPacketSize -
|
|
PXEBC_DEFAULT_UDP_OVERHEAD_SIZE - PXEBC_DEFAULT_TFTP_OVERHEAD_SIZE;
|
|
|
|
//
|
|
// PXE over IPv6 starts here, initialize the fields and list header.
|
|
//
|
|
Private->Ip6Policy = PXEBC_IP6_POLICY_MAX;
|
|
Private->ProxyOffer.Dhcp6.Packet.Offer.Size = PXEBC_CACHED_DHCP6_PACKET_MAX_SIZE;
|
|
Private->DhcpAck.Dhcp6.Packet.Ack.Size = PXEBC_CACHED_DHCP6_PACKET_MAX_SIZE;
|
|
Private->PxeReply.Dhcp6.Packet.Ack.Size = PXEBC_CACHED_DHCP6_PACKET_MAX_SIZE;
|
|
|
|
for (Index = 0; Index < PXEBC_OFFER_MAX_NUM; Index++) {
|
|
Private->OfferBuffer[Index].Dhcp6.Packet.Offer.Size = PXEBC_CACHED_DHCP6_PACKET_MAX_SIZE;
|
|
}
|
|
|
|
//
|
|
// Create event and set status for token to capture ICMP6 error message.
|
|
//
|
|
Private->Icmp6Token.Status = EFI_NOT_READY;
|
|
Status = gBS->CreateEvent (
|
|
EVT_NOTIFY_SIGNAL,
|
|
TPL_NOTIFY,
|
|
PxeBcIcmp6ErrorUpdate,
|
|
Private,
|
|
&Private->Icmp6Token.Event
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_ERROR;
|
|
}
|
|
|
|
//
|
|
// Set Ip6 policy to Automatic to start the IP6 router discovery.
|
|
//
|
|
Status = PxeBcSetIp6Policy (Private);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_ERROR;
|
|
}
|
|
} else {
|
|
AsciiPrint ("\n>>Start PXE over IPv4");
|
|
//
|
|
// Configure udp4 instance to receive data.
|
|
//
|
|
Status = Private->Udp4Read->Configure (
|
|
Private->Udp4Read,
|
|
&Private->Udp4CfgData
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_ERROR;
|
|
}
|
|
|
|
//
|
|
// Configure block size for TFTP as a default value to handle all link layers.
|
|
//
|
|
Private->BlockSize = Private->Ip4MaxPacketSize -
|
|
PXEBC_DEFAULT_UDP_OVERHEAD_SIZE - PXEBC_DEFAULT_TFTP_OVERHEAD_SIZE;
|
|
|
|
//
|
|
// PXE over IPv4 starts here, initialize the fields.
|
|
//
|
|
Private->ProxyOffer.Dhcp4.Packet.Offer.Size = PXEBC_CACHED_DHCP4_PACKET_MAX_SIZE;
|
|
Private->DhcpAck.Dhcp4.Packet.Ack.Size = PXEBC_CACHED_DHCP4_PACKET_MAX_SIZE;
|
|
Private->PxeReply.Dhcp4.Packet.Ack.Size = PXEBC_CACHED_DHCP4_PACKET_MAX_SIZE;
|
|
|
|
for (Index = 0; Index < PXEBC_OFFER_MAX_NUM; Index++) {
|
|
Private->OfferBuffer[Index].Dhcp4.Packet.Offer.Size = PXEBC_CACHED_DHCP4_PACKET_MAX_SIZE;
|
|
}
|
|
|
|
PxeBcSeedDhcp4Packet (&Private->SeedPacket, Private->Udp4Read);
|
|
|
|
//
|
|
// Create the event for Arp cache update.
|
|
//
|
|
Status = gBS->CreateEvent (
|
|
EVT_TIMER | EVT_NOTIFY_SIGNAL,
|
|
TPL_CALLBACK,
|
|
PxeBcArpCacheUpdate,
|
|
Private,
|
|
&Private->ArpUpdateEvent
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_ERROR;
|
|
}
|
|
|
|
//
|
|
// Start a periodic timer by second to update Arp cache.
|
|
//
|
|
Status = gBS->SetTimer (
|
|
Private->ArpUpdateEvent,
|
|
TimerPeriodic,
|
|
TICKS_PER_SECOND
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_ERROR;
|
|
}
|
|
|
|
//
|
|
// Create event and set status for token to capture ICMP error message.
|
|
//
|
|
Private->Icmp6Token.Status = EFI_NOT_READY;
|
|
Status = gBS->CreateEvent (
|
|
EVT_NOTIFY_SIGNAL,
|
|
TPL_NOTIFY,
|
|
PxeBcIcmpErrorUpdate,
|
|
Private,
|
|
&Private->IcmpToken.Event
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_ERROR;
|
|
}
|
|
|
|
//
|
|
//DHCP4 service allows only one of its children to be configured in
|
|
//the active state, If the DHCP4 D.O.R.A started by IP4 auto
|
|
//configuration and has not been completed, the Dhcp4 state machine
|
|
//will not be in the right state for the PXE to start a new round D.O.R.A.
|
|
//so we need to switch its policy to static.
|
|
//
|
|
Status = PxeBcSetIp4Policy (Private);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_ERROR;
|
|
}
|
|
}
|
|
|
|
//
|
|
// If PcdTftpBlockSize is set to non-zero, override the default value.
|
|
//
|
|
if (PcdGet64 (PcdTftpBlockSize) != 0) {
|
|
Private->BlockSize = (UINTN) PcdGet64 (PcdTftpBlockSize);
|
|
}
|
|
|
|
//
|
|
// Create event for UdpRead/UdpWrite timeout since they are both blocking API.
|
|
//
|
|
Status = gBS->CreateEvent (
|
|
EVT_TIMER,
|
|
TPL_CALLBACK,
|
|
NULL,
|
|
NULL,
|
|
&Private->UdpTimeOutEvent
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_ERROR;
|
|
}
|
|
|
|
Private->IsAddressOk = FALSE;
|
|
Mode->Started = TRUE;
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
ON_ERROR:
|
|
if (Mode->UsingIpv6) {
|
|
if (Private->Icmp6Token.Event != NULL) {
|
|
gBS->CloseEvent (Private->Icmp6Token.Event);
|
|
Private->Icmp6Token.Event = NULL;
|
|
}
|
|
Private->Udp6Read->Configure (Private->Udp6Read, NULL);
|
|
Private->Ip6->Configure (Private->Ip6, NULL);
|
|
} else {
|
|
if (Private->ArpUpdateEvent != NULL) {
|
|
gBS->CloseEvent (Private->ArpUpdateEvent);
|
|
Private->ArpUpdateEvent = NULL;
|
|
}
|
|
if (Private->IcmpToken.Event != NULL) {
|
|
gBS->CloseEvent (Private->IcmpToken.Event);
|
|
Private->IcmpToken.Event = NULL;
|
|
}
|
|
Private->Udp4Read->Configure (Private->Udp4Read, NULL);
|
|
Private->Ip4->Configure (Private->Ip4, NULL);
|
|
}
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Disable the use of the PXE Base Code Protocol functions.
|
|
|
|
This function stops all activity on the network device. All the resources allocated
|
|
in Start() are released, the Started field of the EFI_PXE_BASE_CODE_MODE structure is
|
|
set to FALSE, and EFI_SUCCESS is returned. If the Started field of the EFI_PXE_BASE_CODE_MODE
|
|
structure is already FALSE, then EFI_NOT_STARTED will be returned.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
|
|
@retval EFI_SUCCESS The PXE Base Code Protocol was stopped.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is already in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER The This parameter is NULL or does not point to a valid
|
|
EFI_PXE_BASE_CODE_PROTOCOL structure.
|
|
@retval Others
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcStop (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
BOOLEAN Ipv6Supported;
|
|
BOOLEAN Ipv6Available;
|
|
|
|
if (This == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
Ipv6Supported = Mode->Ipv6Supported;
|
|
Ipv6Available = Mode->Ipv6Available;
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
if (Mode->UsingIpv6) {
|
|
//
|
|
// Configure all the instances for IPv6 as NULL.
|
|
//
|
|
ZeroMem (&Private->Udp6CfgData.StationAddress, sizeof (EFI_IPv6_ADDRESS));
|
|
ZeroMem (&Private->Ip6CfgData.StationAddress, sizeof (EFI_IPv6_ADDRESS));
|
|
Private->Dhcp6->Stop (Private->Dhcp6);
|
|
Private->Dhcp6->Configure (Private->Dhcp6, NULL);
|
|
Private->Udp6Write->Configure (Private->Udp6Write, NULL);
|
|
Private->Udp6Read->Groups (Private->Udp6Read, FALSE, NULL);
|
|
Private->Udp6Read->Configure (Private->Udp6Read, NULL);
|
|
Private->Ip6->Cancel (Private->Ip6, &Private->Icmp6Token);
|
|
Private->Ip6->Configure (Private->Ip6, NULL);
|
|
PxeBcUnregisterIp6Address (Private);
|
|
if (Private->Icmp6Token.Event != NULL) {
|
|
gBS->CloseEvent (Private->Icmp6Token.Event);
|
|
Private->Icmp6Token.Event = NULL;
|
|
}
|
|
if (Private->Dhcp6Request != NULL) {
|
|
FreePool (Private->Dhcp6Request);
|
|
Private->Dhcp6Request = NULL;
|
|
}
|
|
if (Private->BootFileName != NULL) {
|
|
FreePool (Private->BootFileName);
|
|
Private->BootFileName = NULL;
|
|
}
|
|
} else {
|
|
//
|
|
// Configure all the instances for IPv4 as NULL.
|
|
//
|
|
ZeroMem (&Private->Udp4CfgData.StationAddress, sizeof (EFI_IPv4_ADDRESS));
|
|
ZeroMem (&Private->Udp4CfgData.SubnetMask, sizeof (EFI_IPv4_ADDRESS));
|
|
ZeroMem (&Private->Ip4CfgData.StationAddress, sizeof (EFI_IPv4_ADDRESS));
|
|
ZeroMem (&Private->Ip4CfgData.SubnetMask, sizeof (EFI_IPv4_ADDRESS));
|
|
Private->Dhcp4->Stop (Private->Dhcp4);
|
|
Private->Dhcp4->Configure (Private->Dhcp4, NULL);
|
|
Private->Udp4Write->Configure (Private->Udp4Write, NULL);
|
|
Private->Udp4Read->Groups (Private->Udp4Read, FALSE, NULL);
|
|
Private->Udp4Read->Configure (Private->Udp4Read, NULL);
|
|
Private->Ip4->Cancel (Private->Ip4, &Private->IcmpToken);
|
|
Private->Ip4->Configure (Private->Ip4, NULL);
|
|
if (Private->ArpUpdateEvent != NULL) {
|
|
gBS->CloseEvent (Private->ArpUpdateEvent);
|
|
Private->ArpUpdateEvent = NULL;
|
|
}
|
|
if (Private->IcmpToken.Event != NULL) {
|
|
gBS->CloseEvent (Private->IcmpToken.Event);
|
|
Private->IcmpToken.Event = NULL;
|
|
}
|
|
Private->BootFileName = NULL;
|
|
}
|
|
|
|
gBS->CloseEvent (Private->UdpTimeOutEvent);
|
|
Private->CurSrcPort = 0;
|
|
Private->BootFileSize = 0;
|
|
Private->SolicitTimes = 0;
|
|
Private->ElapsedTime = 0;
|
|
ZeroMem (&Private->StationIp, sizeof (EFI_IP_ADDRESS));
|
|
ZeroMem (&Private->SubnetMask, sizeof (EFI_IP_ADDRESS));
|
|
ZeroMem (&Private->GatewayIp, sizeof (EFI_IP_ADDRESS));
|
|
ZeroMem (&Private->ServerIp, sizeof (EFI_IP_ADDRESS));
|
|
|
|
//
|
|
// Reset the mode data.
|
|
//
|
|
ZeroMem (Mode, sizeof (EFI_PXE_BASE_CODE_MODE));
|
|
Mode->Ipv6Available = Ipv6Available;
|
|
Mode->Ipv6Supported = Ipv6Supported;
|
|
Mode->AutoArp = TRUE;
|
|
Mode->TTL = DEFAULT_TTL;
|
|
Mode->ToS = DEFAULT_ToS;
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
|
|
/**
|
|
Attempts to complete a DHCPv4 D.O.R.A. (discover / offer / request / acknowledge) or DHCPv6
|
|
S.A.R.R (solicit / advertise / request / reply) sequence.
|
|
|
|
If SortOffers is TRUE, then the cached DHCP offer packets will be sorted before
|
|
they are tried. If SortOffers is FALSE, then the cached DHCP offer packets will
|
|
be tried in the order in which they are received. Please see the Preboot Execution
|
|
Environment (PXE) Specification and Unified Extensible Firmware Interface (UEFI)
|
|
Specification for additional details on the implementation of DHCP.
|
|
If the Callback Protocol does not return EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE,
|
|
then the DHCP sequence will be stopped and EFI_ABORTED will be returned.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] SortOffers TRUE if the offers received should be sorted. Set to FALSE to
|
|
try the offers in the order that they are received.
|
|
|
|
@retval EFI_SUCCESS Valid DHCP has completed.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER The This parameter is NULL or does not point to a valid
|
|
EFI_PXE_BASE_CODE_PROTOCOL structure.
|
|
@retval EFI_DEVICE_ERROR The network device encountered an error during this operation.
|
|
@retval EFI_OUT_OF_RESOURCES Could not allocate enough memory to complete the DHCP Protocol.
|
|
@retval EFI_ABORTED The callback function aborted the DHCP Protocol.
|
|
@retval EFI_TIMEOUT The DHCP Protocol timed out.
|
|
@retval EFI_ICMP_ERROR An ICMP error packet was received during the DHCP session.
|
|
@retval EFI_NO_RESPONSE Valid PXE offer was not received.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcDhcp (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN BOOLEAN SortOffers
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
EFI_STATUS Status;
|
|
EFI_PXE_BASE_CODE_IP_FILTER IpFilter;
|
|
|
|
if (This == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Status = EFI_SUCCESS;
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
Mode->IcmpErrorReceived = FALSE;
|
|
Private->Function = EFI_PXE_BASE_CODE_FUNCTION_DHCP;
|
|
Private->IsOfferSorted = SortOffers;
|
|
Private->SolicitTimes = 0;
|
|
Private->ElapsedTime = 0;
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
if (Mode->UsingIpv6) {
|
|
|
|
//
|
|
// Stop Udp6Read instance
|
|
//
|
|
Private->Udp6Read->Configure (Private->Udp6Read, NULL);
|
|
|
|
//
|
|
// Start S.A.R.R. process to get a IPv6 address and other boot information.
|
|
//
|
|
Status = PxeBcDhcp6Sarr (Private, Private->Dhcp6);
|
|
} else {
|
|
|
|
//
|
|
// Stop Udp4Read instance
|
|
//
|
|
Private->Udp4Read->Configure (Private->Udp4Read, NULL);
|
|
|
|
//
|
|
// Start D.O.R.A. process to get a IPv4 address and other boot information.
|
|
//
|
|
Status = PxeBcDhcp4Dora (Private, Private->Dhcp4);
|
|
}
|
|
|
|
//
|
|
// Reconfigure the UDP instance with the default configuration.
|
|
//
|
|
if (Mode->UsingIpv6) {
|
|
Private->Udp6Read->Configure (Private->Udp6Read, &Private->Udp6CfgData);
|
|
} else {
|
|
Private->Udp4Read->Configure (Private->Udp4Read, &Private->Udp4CfgData);
|
|
}
|
|
//
|
|
// Dhcp(), Discover(), and Mtftp() set the IP filter, and return with the IP
|
|
// receive filter list emptied and the filter set to EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP.
|
|
//
|
|
ZeroMem(&IpFilter, sizeof (EFI_PXE_BASE_CODE_IP_FILTER));
|
|
IpFilter.Filters = EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP;
|
|
This->SetIpFilter (This, &IpFilter);
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Attempts to complete the PXE Boot Server and/or boot image discovery sequence.
|
|
|
|
This function attempts to complete the PXE Boot Server and/or boot image discovery
|
|
sequence. If this sequence is completed, then EFI_SUCCESS is returned, and the
|
|
PxeDiscoverValid, PxeDiscover, PxeReplyReceived, and PxeReply fields of the
|
|
EFI_PXE_BASE_CODE_MODE structure are filled in. If UseBis is TRUE, then the
|
|
PxeBisReplyReceived and PxeBisReply fields of the EFI_PXE_BASE_CODE_MODE structure
|
|
will also be filled in. If UseBis is FALSE, then PxeBisReplyValid will be set to FALSE.
|
|
In the structure referenced by parameter Info, the PXE Boot Server list, SrvList[],
|
|
has two uses: It is the Boot Server IP address list used for unicast discovery
|
|
(if the UseUCast field is TRUE), and it is the list used for Boot Server verification
|
|
(if the MustUseList field is TRUE). Also, if the MustUseList field in that structure
|
|
is TRUE and the AcceptAnyResponse field in the SrvList[] array is TRUE, any Boot
|
|
Server reply of that type will be accepted. If the AcceptAnyResponse field is
|
|
FALSE, only responses from Boot Servers with matching IP addresses will be accepted.
|
|
This function can take at least 10 seconds to timeout and return control to the
|
|
caller. If the Discovery sequence does not complete, then EFI_TIMEOUT will be
|
|
returned. Please see the Preboot Execution Environment (PXE) Specification for
|
|
additional details on the implementation of the Discovery sequence.
|
|
If the Callback Protocol does not return EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE,
|
|
then the Discovery sequence is stopped and EFI_ABORTED will be returned.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] Type The type of bootstrap to perform.
|
|
@param[in] Layer Pointer to the boot server layer number to discover, which must be
|
|
PXE_BOOT_LAYER_INITIAL when a new server type is being
|
|
discovered.
|
|
@param[in] UseBis TRUE if Boot Integrity Services are to be used. FALSE otherwise.
|
|
@param[in] Info Pointer to a data structure that contains additional information
|
|
on the type of discovery operation that is to be performed.
|
|
It is optional.
|
|
|
|
@retval EFI_SUCCESS The Discovery sequence has been completed.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER One or more parameters are invalid.
|
|
@retval EFI_DEVICE_ERROR The network device encountered an error during this operation.
|
|
@retval EFI_OUT_OF_RESOURCES Could not allocate enough memory to complete Discovery.
|
|
@retval EFI_ABORTED The callback function aborted the Discovery sequence.
|
|
@retval EFI_TIMEOUT The Discovery sequence timed out.
|
|
@retval EFI_ICMP_ERROR An ICMP error packet was received during the PXE discovery
|
|
session.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcDiscover (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN UINT16 Type,
|
|
IN UINT16 *Layer,
|
|
IN BOOLEAN UseBis,
|
|
IN EFI_PXE_BASE_CODE_DISCOVER_INFO *Info OPTIONAL
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
EFI_PXE_BASE_CODE_DISCOVER_INFO DefaultInfo;
|
|
EFI_PXE_BASE_CODE_SRVLIST *SrvList;
|
|
PXEBC_BOOT_SVR_ENTRY *BootSvrEntry;
|
|
UINT16 Index;
|
|
EFI_STATUS Status;
|
|
EFI_PXE_BASE_CODE_IP_FILTER IpFilter;
|
|
EFI_PXE_BASE_CODE_DISCOVER_INFO *NewCreatedInfo;
|
|
|
|
if (This == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
Mode->IcmpErrorReceived = FALSE;
|
|
BootSvrEntry = NULL;
|
|
SrvList = NULL;
|
|
Status = EFI_DEVICE_ERROR;
|
|
Private->Function = EFI_PXE_BASE_CODE_FUNCTION_DISCOVER;
|
|
NewCreatedInfo = NULL;
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
//
|
|
// Station address should be ready before do discover.
|
|
//
|
|
if (!Private->IsAddressOk) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (Mode->UsingIpv6) {
|
|
|
|
//
|
|
// Stop Udp6Read instance
|
|
//
|
|
Private->Udp6Read->Configure (Private->Udp6Read, NULL);
|
|
} else {
|
|
|
|
//
|
|
// Stop Udp4Read instance
|
|
//
|
|
Private->Udp4Read->Configure (Private->Udp4Read, NULL);
|
|
}
|
|
|
|
//
|
|
// There are 3 methods to get the information for discover.
|
|
//
|
|
ZeroMem (&DefaultInfo, sizeof (EFI_PXE_BASE_CODE_DISCOVER_INFO));
|
|
if (*Layer != EFI_PXE_BASE_CODE_BOOT_LAYER_INITIAL) {
|
|
//
|
|
// 1. Take the previous setting as the discover info.
|
|
//
|
|
if (!Mode->PxeDiscoverValid ||
|
|
!Mode->PxeReplyReceived ||
|
|
(!Mode->PxeBisReplyReceived && UseBis)) {
|
|
Status = EFI_INVALID_PARAMETER;
|
|
goto ON_EXIT;
|
|
}
|
|
|
|
Info = &DefaultInfo;
|
|
Info->IpCnt = 1;
|
|
Info->UseUCast = TRUE;
|
|
SrvList = Info->SrvList;
|
|
SrvList[0].Type = Type;
|
|
SrvList[0].AcceptAnyResponse = FALSE;
|
|
|
|
CopyMem (&SrvList->IpAddr, &Private->ServerIp, sizeof (EFI_IP_ADDRESS));
|
|
|
|
} else if (Info == NULL) {
|
|
//
|
|
// 2. Extract the discover information from the cached packets if unspecified.
|
|
//
|
|
NewCreatedInfo = &DefaultInfo;
|
|
Status = PxeBcExtractDiscoverInfo (Private, Type, &NewCreatedInfo, &BootSvrEntry, &SrvList);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_EXIT;
|
|
}
|
|
ASSERT (NewCreatedInfo != NULL);
|
|
Info = NewCreatedInfo;
|
|
} else {
|
|
//
|
|
// 3. Take the pass-in information as the discover info, and validate the server list.
|
|
//
|
|
SrvList = Info->SrvList;
|
|
|
|
if (!SrvList[0].AcceptAnyResponse) {
|
|
for (Index = 1; Index < Info->IpCnt; Index++) {
|
|
if (SrvList[Index].AcceptAnyResponse) {
|
|
break;
|
|
}
|
|
}
|
|
if (Index != Info->IpCnt) {
|
|
//
|
|
// It's invalid if the first server doesn't accept any response
|
|
// but any of the other servers does accept any response.
|
|
//
|
|
Status = EFI_INVALID_PARAMETER;
|
|
goto ON_EXIT;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Info and BootSvrEntry/SrvList are all ready by now, so execute discover by UniCast/BroadCast/MultiCast.
|
|
//
|
|
if ((!Info->UseUCast && !Info->UseBCast && !Info->UseMCast) ||
|
|
(Info->MustUseList && Info->IpCnt == 0)) {
|
|
Status = EFI_INVALID_PARAMETER;
|
|
goto ON_EXIT;
|
|
}
|
|
|
|
Private->IsDoDiscover = TRUE;
|
|
|
|
if (Info->UseMCast) {
|
|
//
|
|
// Do discover by multicast.
|
|
//
|
|
Status = PxeBcDiscoverBootServer (
|
|
Private,
|
|
Type,
|
|
Layer,
|
|
UseBis,
|
|
&Info->ServerMCastIp,
|
|
Info->IpCnt,
|
|
SrvList
|
|
);
|
|
|
|
} else if (Info->UseBCast) {
|
|
//
|
|
// Do discover by broadcast, but only valid for IPv4.
|
|
//
|
|
ASSERT (!Mode->UsingIpv6);
|
|
Status = PxeBcDiscoverBootServer (
|
|
Private,
|
|
Type,
|
|
Layer,
|
|
UseBis,
|
|
NULL,
|
|
Info->IpCnt,
|
|
SrvList
|
|
);
|
|
|
|
} else if (Info->UseUCast) {
|
|
//
|
|
// Do discover by unicast.
|
|
//
|
|
for (Index = 0; Index < Info->IpCnt; Index++) {
|
|
if (BootSvrEntry == NULL) {
|
|
CopyMem (&Private->ServerIp, &SrvList[Index].IpAddr, sizeof (EFI_IP_ADDRESS));
|
|
} else {
|
|
ASSERT (!Mode->UsingIpv6);
|
|
ZeroMem (&Private->ServerIp, sizeof (EFI_IP_ADDRESS));
|
|
CopyMem (&Private->ServerIp, &BootSvrEntry->IpAddr[Index], sizeof (EFI_IPv4_ADDRESS));
|
|
}
|
|
|
|
Status = PxeBcDiscoverBootServer (
|
|
Private,
|
|
Type,
|
|
Layer,
|
|
UseBis,
|
|
&Private->ServerIp,
|
|
Info->IpCnt,
|
|
SrvList
|
|
);
|
|
}
|
|
}
|
|
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// Parse the cached PXE reply packet, and store it into mode data if valid.
|
|
//
|
|
if (Mode->UsingIpv6) {
|
|
Status = PxeBcParseDhcp6Packet (&Private->PxeReply.Dhcp6);
|
|
if (!EFI_ERROR (Status)) {
|
|
CopyMem (
|
|
&Mode->PxeReply.Dhcpv6,
|
|
&Private->PxeReply.Dhcp6.Packet.Ack.Dhcp6,
|
|
Private->PxeReply.Dhcp6.Packet.Ack.Length
|
|
);
|
|
Mode->PxeReplyReceived = TRUE;
|
|
Mode->PxeDiscoverValid = TRUE;
|
|
}
|
|
} else {
|
|
Status = PxeBcParseDhcp4Packet (&Private->PxeReply.Dhcp4);
|
|
if (!EFI_ERROR (Status)) {
|
|
CopyMem (
|
|
&Mode->PxeReply.Dhcpv4,
|
|
&Private->PxeReply.Dhcp4.Packet.Ack.Dhcp4,
|
|
Private->PxeReply.Dhcp4.Packet.Ack.Length
|
|
);
|
|
Mode->PxeReplyReceived = TRUE;
|
|
Mode->PxeDiscoverValid = TRUE;
|
|
}
|
|
}
|
|
}
|
|
|
|
ON_EXIT:
|
|
|
|
if (NewCreatedInfo != NULL && NewCreatedInfo != &DefaultInfo) {
|
|
FreePool (NewCreatedInfo);
|
|
}
|
|
|
|
if (Mode->UsingIpv6) {
|
|
Private->Udp6Read->Configure (Private->Udp6Read, &Private->Udp6CfgData);
|
|
} else {
|
|
Private->Udp4Read->Configure (Private->Udp4Read, &Private->Udp4CfgData);
|
|
}
|
|
|
|
//
|
|
// Dhcp(), Discover(), and Mtftp() set the IP filter, and return with the IP
|
|
// receive filter list emptied and the filter set to EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP.
|
|
//
|
|
ZeroMem(&IpFilter, sizeof (EFI_PXE_BASE_CODE_IP_FILTER));
|
|
IpFilter.Filters = EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP;
|
|
This->SetIpFilter (This, &IpFilter);
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Used to perform TFTP and MTFTP services.
|
|
|
|
This function is used to perform TFTP and MTFTP services. This includes the
|
|
TFTP operations to get the size of a file, read a directory, read a file, and
|
|
write a file. It also includes the MTFTP operations to get the size of a file,
|
|
read a directory, and read a file. The type of operation is specified by Operation.
|
|
If the callback function that is invoked during the TFTP/MTFTP operation does
|
|
not return EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE, then EFI_ABORTED will
|
|
be returned.
|
|
For read operations, the return data will be placed in the buffer specified by
|
|
BufferPtr. If BufferSize is too small to contain the entire downloaded file,
|
|
then EFI_BUFFER_TOO_SMALL will be returned and BufferSize will be set to zero,
|
|
or the size of the requested file. (NOTE: the size of the requested file is only returned
|
|
if the TFTP server supports TFTP options). If BufferSize is large enough for the
|
|
read operation, then BufferSize will be set to the size of the downloaded file,
|
|
and EFI_SUCCESS will be returned. Applications using the PxeBc.Mtftp() services
|
|
should use the get-file-size operations to determine the size of the downloaded
|
|
file prior to using the read-file operations-especially when downloading large
|
|
(greater than 64 MB) files-instead of making two calls to the read-file operation.
|
|
Following this recommendation will save time if the file is larger than expected
|
|
and the TFTP server does not support TFTP option extensions. Without TFTP option
|
|
extension support, the client must download the entire file, counting and discarding
|
|
the received packets, to determine the file size.
|
|
For write operations, the data to be sent is in the buffer specified by BufferPtr.
|
|
BufferSize specifies the number of bytes to send. If the write operation completes
|
|
successfully, then EFI_SUCCESS will be returned.
|
|
For TFTP "get file size" operations, the size of the requested file or directory
|
|
is returned in BufferSize, and EFI_SUCCESS will be returned. If the TFTP server
|
|
does not support options, the file will be downloaded into a bit bucket and the
|
|
length of the downloaded file will be returned. For MTFTP "get file size" operations,
|
|
if the MTFTP server does not support the "get file size" option, EFI_UNSUPPORTED
|
|
will be returned.
|
|
This function can take up to 10 seconds to timeout and return control to the caller.
|
|
If the TFTP sequence does not complete, EFI_TIMEOUT will be returned.
|
|
If the Callback Protocol does not return EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE,
|
|
then the TFTP sequence is stopped and EFI_ABORTED will be returned.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] Operation The type of operation to perform.
|
|
@param[in, out] BufferPtr A pointer to the data buffer.
|
|
@param[in] Overwrite Only used on write file operations. TRUE if a file on a remote
|
|
server can be overwritten.
|
|
@param[in, out] BufferSize For get-file-size operations, *BufferSize returns the size of the
|
|
requested file.
|
|
@param[in] BlockSize The requested block size to be used during a TFTP transfer.
|
|
@param[in] ServerIp The TFTP / MTFTP server IP address.
|
|
@param[in] Filename A Null-terminated ASCII string that specifies a directory name
|
|
or a file name.
|
|
@param[in] Info Pointer to the MTFTP information.
|
|
@param[in] DontUseBuffer Set to FALSE for normal TFTP and MTFTP read file operation.
|
|
|
|
@retval EFI_SUCCESS The TFTP/MTFTP operation was completed.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER One or more parameters are invalid.
|
|
@retval EFI_DEVICE_ERROR The network device encountered an error during this operation.
|
|
@retval EFI_BUFFER_TOO_SMALL The buffer is not large enough to complete the read operation.
|
|
@retval EFI_ABORTED The callback function aborted the TFTP/MTFTP operation.
|
|
@retval EFI_TIMEOUT The TFTP/MTFTP operation timed out.
|
|
@retval EFI_ICMP_ERROR An ICMP error packet was received during the MTFTP session.
|
|
@retval EFI_TFTP_ERROR A TFTP error packet was received during the MTFTP session.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcMtftp (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN EFI_PXE_BASE_CODE_TFTP_OPCODE Operation,
|
|
IN OUT VOID *BufferPtr OPTIONAL,
|
|
IN BOOLEAN Overwrite,
|
|
IN OUT UINT64 *BufferSize,
|
|
IN UINTN *BlockSize OPTIONAL,
|
|
IN EFI_IP_ADDRESS *ServerIp,
|
|
IN UINT8 *Filename,
|
|
IN EFI_PXE_BASE_CODE_MTFTP_INFO *Info OPTIONAL,
|
|
IN BOOLEAN DontUseBuffer
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
EFI_MTFTP4_CONFIG_DATA Mtftp4Config;
|
|
EFI_MTFTP6_CONFIG_DATA Mtftp6Config;
|
|
VOID *Config;
|
|
EFI_STATUS Status;
|
|
EFI_PXE_BASE_CODE_IP_FILTER IpFilter;
|
|
UINTN WindowSize;
|
|
|
|
if ((This == NULL) ||
|
|
(Filename == NULL) ||
|
|
(BufferSize == NULL) ||
|
|
(ServerIp == NULL) ||
|
|
((BlockSize != NULL) && (*BlockSize < PXE_MTFTP_DEFAULT_BLOCK_SIZE))) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (Operation == EFI_PXE_BASE_CODE_TFTP_READ_FILE ||
|
|
Operation == EFI_PXE_BASE_CODE_TFTP_READ_DIRECTORY ||
|
|
Operation == EFI_PXE_BASE_CODE_MTFTP_READ_FILE ||
|
|
Operation == EFI_PXE_BASE_CODE_MTFTP_READ_DIRECTORY) {
|
|
if (BufferPtr == NULL && !DontUseBuffer) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
|
|
Config = NULL;
|
|
Status = EFI_DEVICE_ERROR;
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
|
|
//
|
|
// Get PcdPxeTftpWindowSize.
|
|
//
|
|
WindowSize = (UINTN) PcdGet64 (PcdPxeTftpWindowSize);
|
|
|
|
if (Mode->UsingIpv6) {
|
|
if (!NetIp6IsValidUnicast (&ServerIp->v6)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
} else {
|
|
if (IP4_IS_UNSPECIFIED (NTOHL (ServerIp->Addr[0])) || IP4_IS_LOCAL_BROADCAST (NTOHL (ServerIp->Addr[0]))) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
|
|
if (Mode->UsingIpv6) {
|
|
//
|
|
// Set configuration data for Mtftp6 instance.
|
|
//
|
|
ZeroMem (&Mtftp6Config, sizeof (EFI_MTFTP6_CONFIG_DATA));
|
|
Config = &Mtftp6Config;
|
|
Mtftp6Config.TimeoutValue = PXEBC_MTFTP_TIMEOUT;
|
|
Mtftp6Config.TryCount = PXEBC_MTFTP_RETRIES;
|
|
CopyMem (&Mtftp6Config.StationIp, &Private->StationIp.v6, sizeof (EFI_IPv6_ADDRESS));
|
|
CopyMem (&Mtftp6Config.ServerIp, &ServerIp->v6, sizeof (EFI_IPv6_ADDRESS));
|
|
//
|
|
// Stop Udp6Read instance
|
|
//
|
|
Private->Udp6Read->Configure (Private->Udp6Read, NULL);
|
|
} else {
|
|
//
|
|
// Set configuration data for Mtftp4 instance.
|
|
//
|
|
ZeroMem (&Mtftp4Config, sizeof (EFI_MTFTP4_CONFIG_DATA));
|
|
Config = &Mtftp4Config;
|
|
Mtftp4Config.UseDefaultSetting = FALSE;
|
|
Mtftp4Config.TimeoutValue = PXEBC_MTFTP_TIMEOUT;
|
|
Mtftp4Config.TryCount = PXEBC_MTFTP_RETRIES;
|
|
CopyMem (&Mtftp4Config.StationIp, &Private->StationIp.v4, sizeof (EFI_IPv4_ADDRESS));
|
|
CopyMem (&Mtftp4Config.SubnetMask, &Private->SubnetMask.v4, sizeof (EFI_IPv4_ADDRESS));
|
|
CopyMem (&Mtftp4Config.GatewayIp, &Private->GatewayIp.v4, sizeof (EFI_IPv4_ADDRESS));
|
|
CopyMem (&Mtftp4Config.ServerIp, &ServerIp->v4, sizeof (EFI_IPv4_ADDRESS));
|
|
//
|
|
// Stop Udp4Read instance
|
|
//
|
|
Private->Udp4Read->Configure (Private->Udp4Read, NULL);
|
|
}
|
|
|
|
Mode->TftpErrorReceived = FALSE;
|
|
Mode->IcmpErrorReceived = FALSE;
|
|
|
|
switch (Operation) {
|
|
|
|
case EFI_PXE_BASE_CODE_TFTP_GET_FILE_SIZE:
|
|
//
|
|
// Send TFTP request to get file size.
|
|
//
|
|
Status = PxeBcTftpGetFileSize (
|
|
Private,
|
|
Config,
|
|
Filename,
|
|
BlockSize,
|
|
(WindowSize > 1) ? &WindowSize : NULL,
|
|
BufferSize
|
|
);
|
|
|
|
break;
|
|
|
|
case EFI_PXE_BASE_CODE_TFTP_READ_FILE:
|
|
//
|
|
// Send TFTP request to read file.
|
|
//
|
|
Status = PxeBcTftpReadFile (
|
|
Private,
|
|
Config,
|
|
Filename,
|
|
BlockSize,
|
|
(WindowSize > 1) ? &WindowSize : NULL,
|
|
BufferPtr,
|
|
BufferSize,
|
|
DontUseBuffer
|
|
);
|
|
|
|
break;
|
|
|
|
case EFI_PXE_BASE_CODE_TFTP_WRITE_FILE:
|
|
//
|
|
// Send TFTP request to write file.
|
|
//
|
|
Status = PxeBcTftpWriteFile (
|
|
Private,
|
|
Config,
|
|
Filename,
|
|
Overwrite,
|
|
BlockSize,
|
|
BufferPtr,
|
|
BufferSize
|
|
);
|
|
|
|
break;
|
|
|
|
case EFI_PXE_BASE_CODE_TFTP_READ_DIRECTORY:
|
|
//
|
|
// Send TFTP request to read directory.
|
|
//
|
|
Status = PxeBcTftpReadDirectory (
|
|
Private,
|
|
Config,
|
|
Filename,
|
|
BlockSize,
|
|
(WindowSize > 1) ? &WindowSize : NULL,
|
|
BufferPtr,
|
|
BufferSize,
|
|
DontUseBuffer
|
|
);
|
|
|
|
break;
|
|
|
|
case EFI_PXE_BASE_CODE_MTFTP_GET_FILE_SIZE:
|
|
case EFI_PXE_BASE_CODE_MTFTP_READ_FILE:
|
|
case EFI_PXE_BASE_CODE_MTFTP_READ_DIRECTORY:
|
|
Status = EFI_UNSUPPORTED;
|
|
|
|
break;
|
|
|
|
default:
|
|
Status = EFI_INVALID_PARAMETER;
|
|
|
|
break;
|
|
}
|
|
|
|
if (Status == EFI_ICMP_ERROR) {
|
|
Mode->IcmpErrorReceived = TRUE;
|
|
}
|
|
|
|
//
|
|
// Reconfigure the UDP instance with the default configuration.
|
|
//
|
|
if (Mode->UsingIpv6) {
|
|
Private->Udp6Read->Configure (Private->Udp6Read, &Private->Udp6CfgData);
|
|
} else {
|
|
Private->Udp4Read->Configure (Private->Udp4Read, &Private->Udp4CfgData);
|
|
}
|
|
//
|
|
// Dhcp(), Discover(), and Mtftp() set the IP filter, and return with the IP
|
|
// receive filter list emptied and the filter set to EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP.
|
|
//
|
|
ZeroMem(&IpFilter, sizeof (EFI_PXE_BASE_CODE_IP_FILTER));
|
|
IpFilter.Filters = EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP;
|
|
This->SetIpFilter (This, &IpFilter);
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Writes a UDP packet to the network interface.
|
|
|
|
This function writes a UDP packet specified by the (optional HeaderPtr and)
|
|
BufferPtr parameters to the network interface. The UDP header is automatically
|
|
built by this routine. It uses the parameters OpFlags, DestIp, DestPort, GatewayIp,
|
|
SrcIp, and SrcPort to build this header. If the packet is successfully built and
|
|
transmitted through the network interface, then EFI_SUCCESS will be returned.
|
|
If a timeout occurs during the transmission of the packet, then EFI_TIMEOUT will
|
|
be returned. If an ICMP error occurs during the transmission of the packet, then
|
|
the IcmpErrorReceived field is set to TRUE, the IcmpError field is filled in and
|
|
EFI_ICMP_ERROR will be returned. If the Callback Protocol does not return
|
|
EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE, then EFI_ABORTED will be returned.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] OpFlags The UDP operation flags.
|
|
@param[in] DestIp The destination IP address.
|
|
@param[in] DestPort The destination UDP port number.
|
|
@param[in] GatewayIp The gateway IP address.
|
|
@param[in] SrcIp The source IP address.
|
|
@param[in, out] SrcPort The source UDP port number.
|
|
@param[in] HeaderSize An optional field which may be set to the length of a header
|
|
at HeaderPtr to be prefixed to the data at BufferPtr.
|
|
@param[in] HeaderPtr If HeaderSize is not NULL, a pointer to a header to be
|
|
prefixed to the data at BufferPtr.
|
|
@param[in] BufferSize A pointer to the size of the data at BufferPtr.
|
|
@param[in] BufferPtr A pointer to the data to be written.
|
|
|
|
@retval EFI_SUCCESS The UDP Write operation completed.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER One or more parameters are invalid.
|
|
@retval EFI_BAD_BUFFER_SIZE The buffer is too long to be transmitted.
|
|
@retval EFI_ABORTED The callback function aborted the UDP Write operation.
|
|
@retval EFI_TIMEOUT The UDP Write operation timed out.
|
|
@retval EFI_ICMP_ERROR An ICMP error packet was received during the UDP write session.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcUdpWrite (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN UINT16 OpFlags,
|
|
IN EFI_IP_ADDRESS *DestIp,
|
|
IN EFI_PXE_BASE_CODE_UDP_PORT *DestPort,
|
|
IN EFI_IP_ADDRESS *GatewayIp OPTIONAL,
|
|
IN EFI_IP_ADDRESS *SrcIp OPTIONAL,
|
|
IN OUT EFI_PXE_BASE_CODE_UDP_PORT *SrcPort OPTIONAL,
|
|
IN UINTN *HeaderSize OPTIONAL,
|
|
IN VOID *HeaderPtr OPTIONAL,
|
|
IN UINTN *BufferSize,
|
|
IN VOID *BufferPtr
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
EFI_UDP4_SESSION_DATA Udp4Session;
|
|
EFI_UDP6_SESSION_DATA Udp6Session;
|
|
EFI_STATUS Status;
|
|
BOOLEAN DoNotFragment;
|
|
|
|
if (This == NULL || DestIp == NULL || DestPort == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
|
|
if ((OpFlags & EFI_PXE_BASE_CODE_UDP_OPFLAGS_MAY_FRAGMENT) != 0) {
|
|
DoNotFragment = FALSE;
|
|
} else {
|
|
DoNotFragment = TRUE;
|
|
}
|
|
|
|
if (!Mode->UsingIpv6 && GatewayIp != NULL && Mode->SubnetMask.Addr[0] != 0 &&
|
|
!NetIp4IsUnicast (NTOHL (GatewayIp->Addr[0]), EFI_NTOHL(Mode->SubnetMask))) {
|
|
//
|
|
// Gateway is provided but it's not a unicast IPv4 address, while it will be ignored for IPv6.
|
|
//
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (HeaderSize != NULL && (*HeaderSize == 0 || HeaderPtr == NULL)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (BufferSize == NULL || (*BufferSize != 0 && BufferPtr == NULL)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
if (!Private->IsAddressOk && SrcIp == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (Private->CurSrcPort == 0 ||
|
|
(SrcPort != NULL && *SrcPort != Private->CurSrcPort)) {
|
|
//
|
|
// Reconfigure UDPv4/UDPv6 for UdpWrite if the source port changed.
|
|
//
|
|
if (SrcPort != NULL) {
|
|
Private->CurSrcPort = *SrcPort;
|
|
}
|
|
}
|
|
|
|
if (Mode->UsingIpv6) {
|
|
Status = PxeBcConfigUdp6Write (
|
|
Private->Udp6Write,
|
|
&Private->StationIp.v6,
|
|
&Private->CurSrcPort
|
|
);
|
|
} else {
|
|
//
|
|
// Configure the UDPv4 instance with gateway information from DHCP server as default.
|
|
//
|
|
Status = PxeBcConfigUdp4Write (
|
|
Private->Udp4Write,
|
|
&Private->StationIp.v4,
|
|
&Private->SubnetMask.v4,
|
|
&Private->GatewayIp.v4,
|
|
&Private->CurSrcPort,
|
|
DoNotFragment,
|
|
Private->Mode.TTL,
|
|
Private->Mode.ToS
|
|
);
|
|
}
|
|
|
|
if (EFI_ERROR (Status)) {
|
|
Private->CurSrcPort = 0;
|
|
return EFI_INVALID_PARAMETER;
|
|
} else if (SrcPort != NULL) {
|
|
*SrcPort = Private->CurSrcPort;
|
|
}
|
|
|
|
//
|
|
// Start a timer as timeout event for this blocking API.
|
|
//
|
|
gBS->SetTimer (Private->UdpTimeOutEvent, TimerRelative, PXEBC_UDP_TIMEOUT);
|
|
|
|
if (Mode->UsingIpv6) {
|
|
//
|
|
// Construct UDPv6 session data.
|
|
//
|
|
ZeroMem (&Udp6Session, sizeof (EFI_UDP6_SESSION_DATA));
|
|
CopyMem (&Udp6Session.DestinationAddress, DestIp, sizeof (EFI_IPv6_ADDRESS));
|
|
Udp6Session.DestinationPort = *DestPort;
|
|
if (SrcIp != NULL) {
|
|
CopyMem (&Udp6Session.SourceAddress, SrcIp, sizeof (EFI_IPv6_ADDRESS));
|
|
}
|
|
if (SrcPort != NULL) {
|
|
Udp6Session.SourcePort = *SrcPort;
|
|
}
|
|
|
|
Status = PxeBcUdp6Write (
|
|
Private->Udp6Write,
|
|
&Udp6Session,
|
|
Private->UdpTimeOutEvent,
|
|
HeaderSize,
|
|
HeaderPtr,
|
|
BufferSize,
|
|
BufferPtr
|
|
);
|
|
} else {
|
|
//
|
|
// Construct UDPv4 session data.
|
|
//
|
|
ZeroMem (&Udp4Session, sizeof (EFI_UDP4_SESSION_DATA));
|
|
CopyMem (&Udp4Session.DestinationAddress, DestIp, sizeof (EFI_IPv4_ADDRESS));
|
|
Udp4Session.DestinationPort = *DestPort;
|
|
if (SrcIp != NULL) {
|
|
CopyMem (&Udp4Session.SourceAddress, SrcIp, sizeof (EFI_IPv4_ADDRESS));
|
|
}
|
|
if (SrcPort != NULL) {
|
|
Udp4Session.SourcePort = *SrcPort;
|
|
}
|
|
//
|
|
// Override the gateway information if user specified.
|
|
//
|
|
Status = PxeBcUdp4Write (
|
|
Private->Udp4Write,
|
|
&Udp4Session,
|
|
Private->UdpTimeOutEvent,
|
|
(EFI_IPv4_ADDRESS *) GatewayIp,
|
|
HeaderSize,
|
|
HeaderPtr,
|
|
BufferSize,
|
|
BufferPtr
|
|
);
|
|
}
|
|
|
|
gBS->SetTimer (Private->UdpTimeOutEvent, TimerCancel, 0);
|
|
|
|
|
|
//
|
|
// Reset the UdpWrite instance.
|
|
//
|
|
if (Mode->UsingIpv6) {
|
|
Private->Udp6Write->Configure (Private->Udp6Write, NULL);
|
|
} else {
|
|
Private->Udp4Write->Configure (Private->Udp4Write, NULL);
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Reads a UDP packet from the network interface.
|
|
+
|
|
This function reads a UDP packet from a network interface. The data contents
|
|
are returned in (the optional HeaderPtr and) BufferPtr, and the size of the
|
|
buffer received is returned in BufferSize . If the input BufferSize is smaller
|
|
than the UDP packet received (less optional HeaderSize), it will be set to the
|
|
required size, and EFI_BUFFER_TOO_SMALL will be returned. In this case, the
|
|
contents of BufferPtr are undefined, and the packet is lost. If a UDP packet is
|
|
successfully received, then EFI_SUCCESS will be returned, and the information
|
|
from the UDP header will be returned in DestIp, DestPort, SrcIp, and SrcPort if
|
|
they are not NULL. Depending on the values of OpFlags and the DestIp, DestPort,
|
|
SrcIp, and SrcPort input values, different types of UDP packet receive filtering
|
|
will be performed. The following tables summarize these receive filter operations.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] OpFlags The UDP operation flags.
|
|
@param[in, out] DestIp The destination IP address.
|
|
@param[in, out] DestPort The destination UDP port number.
|
|
@param[in, out] SrcIp The source IP address.
|
|
@param[in, out] SrcPort The source UDP port number.
|
|
@param[in] HeaderSize An optional field which may be set to the length of a
|
|
header at HeaderPtr to be prefixed to the data at BufferPtr.
|
|
@param[in] HeaderPtr If HeaderSize is not NULL, a pointer to a header to be
|
|
prefixed to the data at BufferPtr.
|
|
@param[in, out] BufferSize A pointer to the size of the data at BufferPtr.
|
|
@param[in] BufferPtr A pointer to the data to be read.
|
|
|
|
@retval EFI_SUCCESS The UDP Read operation was completed.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER One or more parameters are invalid.
|
|
@retval EFI_DEVICE_ERROR The network device encountered an error during this operation.
|
|
@retval EFI_BUFFER_TOO_SMALL The packet is larger than Buffer can hold.
|
|
@retval EFI_ABORTED The callback function aborted the UDP Read operation.
|
|
@retval EFI_TIMEOUT The UDP Read operation timed out.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcUdpRead (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN UINT16 OpFlags,
|
|
IN OUT EFI_IP_ADDRESS *DestIp OPTIONAL,
|
|
IN OUT EFI_PXE_BASE_CODE_UDP_PORT *DestPort OPTIONAL,
|
|
IN OUT EFI_IP_ADDRESS *SrcIp OPTIONAL,
|
|
IN OUT EFI_PXE_BASE_CODE_UDP_PORT *SrcPort OPTIONAL,
|
|
IN UINTN *HeaderSize OPTIONAL,
|
|
IN VOID *HeaderPtr OPTIONAL,
|
|
IN OUT UINTN *BufferSize,
|
|
IN VOID *BufferPtr
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
EFI_UDP4_COMPLETION_TOKEN Udp4Token;
|
|
EFI_UDP6_COMPLETION_TOKEN Udp6Token;
|
|
EFI_UDP4_RECEIVE_DATA *Udp4Rx;
|
|
EFI_UDP6_RECEIVE_DATA *Udp6Rx;
|
|
EFI_STATUS Status;
|
|
BOOLEAN IsDone;
|
|
BOOLEAN IsMatched;
|
|
UINTN CopiedLen;
|
|
UINTN HeaderLen;
|
|
UINTN HeaderCopiedLen;
|
|
UINTN BufferCopiedLen;
|
|
UINT32 FragmentLength;
|
|
UINTN FragmentIndex;
|
|
UINT8 *FragmentBuffer;
|
|
|
|
if (This == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
IsDone = FALSE;
|
|
IsMatched = FALSE;
|
|
Udp4Rx = NULL;
|
|
Udp6Rx = NULL;
|
|
|
|
if (((OpFlags & EFI_PXE_BASE_CODE_UDP_OPFLAGS_ANY_DEST_PORT) == 0 && DestPort == NULL) ||
|
|
((OpFlags & EFI_PXE_BASE_CODE_UDP_OPFLAGS_ANY_SRC_IP) == 0 && SrcIp == NULL) ||
|
|
((OpFlags & EFI_PXE_BASE_CODE_UDP_OPFLAGS_ANY_SRC_PORT) == 0 && SrcPort == NULL)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if ((HeaderSize != NULL && *HeaderSize == 0) || (HeaderSize != NULL && HeaderPtr == NULL)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if ((BufferSize == NULL) || (BufferPtr == NULL)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
ZeroMem (&Udp6Token, sizeof (EFI_UDP6_COMPLETION_TOKEN));
|
|
ZeroMem (&Udp4Token, sizeof (EFI_UDP4_COMPLETION_TOKEN));
|
|
|
|
if (Mode->UsingIpv6) {
|
|
Status = gBS->CreateEvent (
|
|
EVT_NOTIFY_SIGNAL,
|
|
TPL_NOTIFY,
|
|
PxeBcCommonNotify,
|
|
&IsDone,
|
|
&Udp6Token.Event
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
} else {
|
|
Status = gBS->CreateEvent (
|
|
EVT_NOTIFY_SIGNAL,
|
|
TPL_NOTIFY,
|
|
PxeBcCommonNotify,
|
|
&IsDone,
|
|
&Udp4Token.Event
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
return EFI_OUT_OF_RESOURCES;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Start a timer as timeout event for this blocking API.
|
|
//
|
|
gBS->SetTimer (Private->UdpTimeOutEvent, TimerRelative, PXEBC_UDP_TIMEOUT);
|
|
Mode->IcmpErrorReceived = FALSE;
|
|
|
|
//
|
|
// Read packet by Udp4Read/Udp6Read until matched or timeout.
|
|
//
|
|
while (!IsMatched && !EFI_ERROR (Status)) {
|
|
if (Mode->UsingIpv6) {
|
|
Status = PxeBcUdp6Read (
|
|
Private->Udp6Read,
|
|
&Udp6Token,
|
|
Mode,
|
|
Private->UdpTimeOutEvent,
|
|
OpFlags,
|
|
&IsDone,
|
|
&IsMatched,
|
|
DestIp,
|
|
DestPort,
|
|
SrcIp,
|
|
SrcPort
|
|
);
|
|
} else {
|
|
Status = PxeBcUdp4Read (
|
|
Private->Udp4Read,
|
|
&Udp4Token,
|
|
Mode,
|
|
Private->UdpTimeOutEvent,
|
|
OpFlags,
|
|
&IsDone,
|
|
&IsMatched,
|
|
DestIp,
|
|
DestPort,
|
|
SrcIp,
|
|
SrcPort
|
|
);
|
|
}
|
|
}
|
|
|
|
if (Status == EFI_ICMP_ERROR ||
|
|
Status == EFI_NETWORK_UNREACHABLE ||
|
|
Status == EFI_HOST_UNREACHABLE ||
|
|
Status == EFI_PROTOCOL_UNREACHABLE ||
|
|
Status == EFI_PORT_UNREACHABLE) {
|
|
//
|
|
// Get different return status for icmp error from Udp, refers to UEFI spec.
|
|
//
|
|
Mode->IcmpErrorReceived = TRUE;
|
|
}
|
|
gBS->SetTimer (Private->UdpTimeOutEvent, TimerCancel, 0);
|
|
|
|
if (IsMatched) {
|
|
//
|
|
// Copy the received packet to user if matched by filter.
|
|
//
|
|
if (Mode->UsingIpv6) {
|
|
Udp6Rx = Udp6Token.Packet.RxData;
|
|
ASSERT (Udp6Rx != NULL);
|
|
|
|
HeaderLen = 0;
|
|
if (HeaderSize != NULL) {
|
|
HeaderLen = MIN (*HeaderSize, Udp6Rx->DataLength);
|
|
}
|
|
|
|
if (Udp6Rx->DataLength - HeaderLen > *BufferSize) {
|
|
Status = EFI_BUFFER_TOO_SMALL;
|
|
} else {
|
|
if (HeaderSize != NULL) {
|
|
*HeaderSize = HeaderLen;
|
|
}
|
|
*BufferSize = Udp6Rx->DataLength - HeaderLen;
|
|
|
|
HeaderCopiedLen = 0;
|
|
BufferCopiedLen = 0;
|
|
for (FragmentIndex = 0; FragmentIndex < Udp6Rx->FragmentCount; FragmentIndex++) {
|
|
FragmentLength = Udp6Rx->FragmentTable[FragmentIndex].FragmentLength;
|
|
FragmentBuffer = Udp6Rx->FragmentTable[FragmentIndex].FragmentBuffer;
|
|
if (HeaderCopiedLen + FragmentLength < HeaderLen) {
|
|
//
|
|
// Copy the header part of received data.
|
|
//
|
|
CopyMem ((UINT8 *) HeaderPtr + HeaderCopiedLen, FragmentBuffer, FragmentLength);
|
|
HeaderCopiedLen += FragmentLength;
|
|
} else if (HeaderCopiedLen < HeaderLen) {
|
|
//
|
|
// Copy the header part of received data.
|
|
//
|
|
CopiedLen = HeaderLen - HeaderCopiedLen;
|
|
CopyMem ((UINT8 *) HeaderPtr + HeaderCopiedLen, FragmentBuffer, CopiedLen);
|
|
HeaderCopiedLen += CopiedLen;
|
|
|
|
//
|
|
// Copy the other part of received data.
|
|
//
|
|
CopyMem ((UINT8 *) BufferPtr + BufferCopiedLen, FragmentBuffer + CopiedLen, FragmentLength - CopiedLen);
|
|
BufferCopiedLen += (FragmentLength - CopiedLen);
|
|
} else {
|
|
//
|
|
// Copy the other part of received data.
|
|
//
|
|
CopyMem ((UINT8 *) BufferPtr + BufferCopiedLen, FragmentBuffer, FragmentLength);
|
|
BufferCopiedLen += FragmentLength;
|
|
}
|
|
}
|
|
}
|
|
//
|
|
// Recycle the receiving buffer after copy to user.
|
|
//
|
|
gBS->SignalEvent (Udp6Rx->RecycleSignal);
|
|
} else {
|
|
Udp4Rx = Udp4Token.Packet.RxData;
|
|
ASSERT (Udp4Rx != NULL);
|
|
|
|
HeaderLen = 0;
|
|
if (HeaderSize != NULL) {
|
|
HeaderLen = MIN (*HeaderSize, Udp4Rx->DataLength);
|
|
}
|
|
|
|
if (Udp4Rx->DataLength - HeaderLen > *BufferSize) {
|
|
Status = EFI_BUFFER_TOO_SMALL;
|
|
} else {
|
|
if (HeaderSize != NULL) {
|
|
*HeaderSize = HeaderLen;
|
|
}
|
|
*BufferSize = Udp4Rx->DataLength - HeaderLen;
|
|
|
|
HeaderCopiedLen = 0;
|
|
BufferCopiedLen = 0;
|
|
for (FragmentIndex = 0; FragmentIndex < Udp4Rx->FragmentCount; FragmentIndex++) {
|
|
FragmentLength = Udp4Rx->FragmentTable[FragmentIndex].FragmentLength;
|
|
FragmentBuffer = Udp4Rx->FragmentTable[FragmentIndex].FragmentBuffer;
|
|
if (HeaderCopiedLen + FragmentLength < HeaderLen) {
|
|
//
|
|
// Copy the header part of received data.
|
|
//
|
|
CopyMem ((UINT8 *) HeaderPtr + HeaderCopiedLen, FragmentBuffer, FragmentLength);
|
|
HeaderCopiedLen += FragmentLength;
|
|
} else if (HeaderCopiedLen < HeaderLen) {
|
|
//
|
|
// Copy the header part of received data.
|
|
//
|
|
CopiedLen = HeaderLen - HeaderCopiedLen;
|
|
CopyMem ((UINT8 *) HeaderPtr + HeaderCopiedLen, FragmentBuffer, CopiedLen);
|
|
HeaderCopiedLen += CopiedLen;
|
|
|
|
//
|
|
// Copy the other part of received data.
|
|
//
|
|
CopyMem ((UINT8 *) BufferPtr + BufferCopiedLen, FragmentBuffer + CopiedLen, FragmentLength - CopiedLen);
|
|
BufferCopiedLen += (FragmentLength - CopiedLen);
|
|
} else {
|
|
//
|
|
// Copy the other part of received data.
|
|
//
|
|
CopyMem ((UINT8 *) BufferPtr + BufferCopiedLen, FragmentBuffer, FragmentLength);
|
|
BufferCopiedLen += FragmentLength;
|
|
}
|
|
}
|
|
}
|
|
//
|
|
// Recycle the receiving buffer after copy to user.
|
|
//
|
|
gBS->SignalEvent (Udp4Rx->RecycleSignal);
|
|
}
|
|
}
|
|
|
|
if (Mode->UsingIpv6) {
|
|
Private->Udp6Read->Cancel (Private->Udp6Read, &Udp6Token);
|
|
gBS->CloseEvent (Udp6Token.Event);
|
|
} else {
|
|
Private->Udp4Read->Cancel (Private->Udp4Read, &Udp4Token);
|
|
gBS->CloseEvent (Udp4Token.Event);
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Updates the IP receive filters of a network device and enables software filtering.
|
|
|
|
The NewFilter field is used to modify the network device's current IP receive
|
|
filter settings and to enable a software filter. This function updates the IpFilter
|
|
field of the EFI_PXE_BASE_CODE_MODE structure with the contents of NewIpFilter.
|
|
The software filter is used when the USE_FILTER in OpFlags is set to UdpRead().
|
|
The current hardware filter remains in effect no matter what the settings of OpFlags.
|
|
This is so that the meaning of ANY_DEST_IP set in OpFlags to UdpRead() is from those
|
|
packets whose reception is enabled in hardware-physical NIC address (unicast),
|
|
broadcast address, logical address or addresses (multicast), or all (promiscuous).
|
|
UdpRead() does not modify the IP filter settings.
|
|
Dhcp(), Discover(), and Mtftp() set the IP filter, and return with the IP receive
|
|
filter list emptied and the filter set to EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP.
|
|
If an application or driver wishes to preserve the IP receive filter settings,
|
|
it will have to preserve the IP receive filter settings before these calls, and
|
|
use SetIpFilter() to restore them after the calls. If incompatible filtering is
|
|
requested (for example, PROMISCUOUS with anything else), or if the device does not
|
|
support a requested filter setting and it cannot be accommodated in software
|
|
(for example, PROMISCUOUS not supported), EFI_INVALID_PARAMETER will be returned.
|
|
The IPlist field is used to enable IPs other than the StationIP. They may be
|
|
multicast or unicast. If IPcnt is set as well as EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP,
|
|
then both the StationIP and the IPs from the IPlist will be used.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] NewFilter Pointer to the new set of IP receive filters.
|
|
|
|
@retval EFI_SUCCESS The IP receive filter settings were updated.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER One or more parameters are invalid.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcSetIpFilter (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN EFI_PXE_BASE_CODE_IP_FILTER *NewFilter
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
EFI_UDP4_CONFIG_DATA *Udp4Cfg;
|
|
EFI_UDP6_CONFIG_DATA *Udp6Cfg;
|
|
UINTN Index;
|
|
BOOLEAN NeedPromiscuous;
|
|
BOOLEAN AcceptPromiscuous;
|
|
BOOLEAN AcceptBroadcast;
|
|
BOOLEAN MultiCastUpdate;
|
|
|
|
if (This == NULL || NewFilter == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
Status = EFI_SUCCESS;
|
|
NeedPromiscuous = FALSE;
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
for (Index = 0; Index < NewFilter->IpCnt; Index++) {
|
|
ASSERT (Index < EFI_PXE_BASE_CODE_MAX_IPCNT);
|
|
if (!Mode->UsingIpv6 &&
|
|
IP4_IS_LOCAL_BROADCAST (EFI_IP4 (NewFilter->IpList[Index].v4))) {
|
|
//
|
|
// IPv4 broadcast address should not be in IP filter.
|
|
//
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
if (Mode->UsingIpv6) {
|
|
if ((NewFilter->Filters & EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP) != 0 &&
|
|
NetIp6IsValidUnicast (&NewFilter->IpList[Index].v6)) {
|
|
NeedPromiscuous = TRUE;
|
|
}
|
|
} else if ((EFI_NTOHL(Mode->StationIp) != 0) &&
|
|
(EFI_NTOHL(Mode->SubnetMask) != 0) &&
|
|
IP4_NET_EQUAL(EFI_NTOHL(Mode->StationIp), EFI_NTOHL(NewFilter->IpList[Index].v4), EFI_NTOHL(Mode->SubnetMask.v4)) &&
|
|
NetIp4IsUnicast (EFI_IP4 (NewFilter->IpList[Index].v4), EFI_NTOHL(Mode->SubnetMask)) &&
|
|
((NewFilter->Filters & EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP) != 0)) {
|
|
NeedPromiscuous = TRUE;
|
|
}
|
|
}
|
|
|
|
AcceptPromiscuous = FALSE;
|
|
AcceptBroadcast = FALSE;
|
|
MultiCastUpdate = FALSE;
|
|
|
|
if (NeedPromiscuous ||
|
|
(NewFilter->Filters & EFI_PXE_BASE_CODE_IP_FILTER_PROMISCUOUS) != 0 ||
|
|
(NewFilter->Filters & EFI_PXE_BASE_CODE_IP_FILTER_PROMISCUOUS_MULTICAST) != 0) {
|
|
//
|
|
// Configure UDPv4/UDPv6 as promiscuous mode to receive all packets.
|
|
//
|
|
AcceptPromiscuous = TRUE;
|
|
} else if ((NewFilter->Filters & EFI_PXE_BASE_CODE_IP_FILTER_BROADCAST) != 0) {
|
|
//
|
|
// Configure UDPv4 to receive all broadcast packets.
|
|
//
|
|
AcceptBroadcast = TRUE;
|
|
}
|
|
|
|
//
|
|
// In multicast condition when Promiscuous FALSE and IpCnt no-zero.
|
|
// Here check if there is any update of the multicast ip address. If yes,
|
|
// we need leave the old multicast group (by Config UDP instance to NULL),
|
|
// and join the new multicast group.
|
|
//
|
|
if (!AcceptPromiscuous) {
|
|
if ((NewFilter->Filters & EFI_PXE_BASE_CODE_IP_FILTER_STATION_IP) != 0) {
|
|
if (Mode->IpFilter.IpCnt != NewFilter->IpCnt) {
|
|
MultiCastUpdate = TRUE;
|
|
} else if (CompareMem (Mode->IpFilter.IpList, NewFilter->IpList, NewFilter->IpCnt * sizeof (EFI_IP_ADDRESS)) != 0 ) {
|
|
MultiCastUpdate = TRUE;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!Mode->UsingIpv6) {
|
|
//
|
|
// Check whether we need reconfigure the UDP4 instance.
|
|
//
|
|
Udp4Cfg = &Private->Udp4CfgData;
|
|
if ((AcceptPromiscuous != Udp4Cfg->AcceptPromiscuous) ||
|
|
(AcceptBroadcast != Udp4Cfg->AcceptBroadcast) || MultiCastUpdate) {
|
|
//
|
|
// Clear the UDP4 instance configuration, all joined groups will be left
|
|
// during the operation.
|
|
//
|
|
Private->Udp4Read->Configure (Private->Udp4Read, NULL);
|
|
|
|
//
|
|
// Configure the UDP instance with the new configuration.
|
|
//
|
|
Udp4Cfg->AcceptPromiscuous = AcceptPromiscuous;
|
|
Udp4Cfg->AcceptBroadcast = AcceptBroadcast;
|
|
Status = Private->Udp4Read->Configure (Private->Udp4Read, Udp4Cfg);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
|
|
//
|
|
// In not Promiscuous mode, need to join the new multicast group.
|
|
//
|
|
if (!AcceptPromiscuous) {
|
|
for (Index = 0; Index < NewFilter->IpCnt; ++Index) {
|
|
if (IP4_IS_MULTICAST (EFI_NTOHL (NewFilter->IpList[Index].v4))) {
|
|
//
|
|
// Join the multicast group.
|
|
//
|
|
Status = Private->Udp4Read->Groups (Private->Udp4Read, TRUE, &NewFilter->IpList[Index].v4);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
//
|
|
// Check whether we need reconfigure the UDP6 instance.
|
|
//
|
|
Udp6Cfg = &Private->Udp6CfgData;
|
|
if ((AcceptPromiscuous != Udp6Cfg->AcceptPromiscuous) || MultiCastUpdate) {
|
|
//
|
|
// Clear the UDP6 instance configuration, all joined groups will be left
|
|
// during the operation.
|
|
//
|
|
Private->Udp6Read->Configure (Private->Udp6Read, NULL);
|
|
|
|
//
|
|
// Configure the UDP instance with the new configuration.
|
|
//
|
|
Udp6Cfg->AcceptPromiscuous = AcceptPromiscuous;
|
|
Status = Private->Udp6Read->Configure (Private->Udp6Read, Udp6Cfg);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
|
|
//
|
|
// In not Promiscuous mode, need to join the new multicast group.
|
|
//
|
|
if (!AcceptPromiscuous) {
|
|
for (Index = 0; Index < NewFilter->IpCnt; ++Index) {
|
|
if (IP6_IS_MULTICAST (&NewFilter->IpList[Index].v6)) {
|
|
//
|
|
// Join the multicast group.
|
|
//
|
|
Status = Private->Udp6Read->Groups (Private->Udp6Read, TRUE, &NewFilter->IpList[Index].v6);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Save the new IP filter into mode data.
|
|
//
|
|
CopyMem (&Mode->IpFilter, NewFilter, sizeof (Mode->IpFilter));
|
|
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Uses the ARP protocol to resolve a MAC address. It is not supported for IPv6.
|
|
|
|
This function uses the ARP protocol to resolve a MAC address. The IP address specified
|
|
by IpAddr is used to resolve a MAC address. If the ARP protocol succeeds in resolving
|
|
the specified address, then the ArpCacheEntries and ArpCache fields of the mode data
|
|
are updated, and EFI_SUCCESS is returned. If MacAddr is not NULL, the resolved
|
|
MAC address is placed there as well. If the PXE Base Code protocol is in the
|
|
stopped state, then EFI_NOT_STARTED is returned. If the ARP protocol encounters
|
|
a timeout condition while attempting to resolve an address, then EFI_TIMEOUT is
|
|
returned. If the Callback Protocol does not return EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE,
|
|
then EFI_ABORTED is returned.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] IpAddr Pointer to the IP address that is used to resolve a MAC address.
|
|
@param[in] MacAddr If not NULL, a pointer to the MAC address that was resolved with the
|
|
ARP protocol.
|
|
|
|
@retval EFI_SUCCESS The IP or MAC address was resolved.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER One or more parameters are invalid.
|
|
@retval EFI_DEVICE_ERROR The network device encountered an error during this operation.
|
|
@retval EFI_ICMP_ERROR An error occur with the ICMP packet message.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcArp (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN EFI_IP_ADDRESS *IpAddr,
|
|
IN EFI_MAC_ADDRESS *MacAddr OPTIONAL
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
EFI_EVENT ResolvedEvent;
|
|
EFI_STATUS Status;
|
|
EFI_MAC_ADDRESS TempMac;
|
|
EFI_MAC_ADDRESS ZeroMac;
|
|
BOOLEAN IsResolved;
|
|
|
|
if (This == NULL || IpAddr == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
ResolvedEvent = NULL;
|
|
Status = EFI_SUCCESS;
|
|
IsResolved = FALSE;
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
if (Mode->UsingIpv6) {
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
//
|
|
// Station address should be ready before do arp.
|
|
//
|
|
if (!Private->IsAddressOk) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Mode->IcmpErrorReceived = FALSE;
|
|
ZeroMem (&TempMac, sizeof (EFI_MAC_ADDRESS));
|
|
ZeroMem (&ZeroMac, sizeof (EFI_MAC_ADDRESS));
|
|
|
|
if (!Mode->AutoArp) {
|
|
//
|
|
// If AutoArp is FALSE, only search in the current Arp cache.
|
|
//
|
|
PxeBcArpCacheUpdate (NULL, Private);
|
|
if (!PxeBcCheckArpCache (Mode, &IpAddr->v4, &TempMac)) {
|
|
Status = EFI_DEVICE_ERROR;
|
|
goto ON_EXIT;
|
|
}
|
|
} else {
|
|
Status = gBS->CreateEvent (
|
|
EVT_NOTIFY_SIGNAL,
|
|
TPL_NOTIFY,
|
|
PxeBcCommonNotify,
|
|
&IsResolved,
|
|
&ResolvedEvent
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_EXIT;
|
|
}
|
|
|
|
//
|
|
// If AutoArp is TRUE, try to send Arp request on initiative.
|
|
//
|
|
Status = Private->Arp->Request (Private->Arp, &IpAddr->v4, ResolvedEvent, &TempMac);
|
|
if (EFI_ERROR (Status) && Status != EFI_NOT_READY) {
|
|
goto ON_EXIT;
|
|
}
|
|
|
|
while (!IsResolved) {
|
|
if (CompareMem (&TempMac, &ZeroMac, sizeof (EFI_MAC_ADDRESS)) != 0) {
|
|
break;
|
|
}
|
|
}
|
|
if (CompareMem (&TempMac, &ZeroMac, sizeof (EFI_MAC_ADDRESS)) != 0) {
|
|
Status = EFI_SUCCESS;
|
|
} else {
|
|
Status = EFI_TIMEOUT;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Copy the Mac address to user if needed.
|
|
//
|
|
if (MacAddr != NULL && !EFI_ERROR (Status)) {
|
|
CopyMem (MacAddr, &TempMac, sizeof (EFI_MAC_ADDRESS));
|
|
}
|
|
|
|
ON_EXIT:
|
|
if (ResolvedEvent != NULL) {
|
|
gBS->CloseEvent (ResolvedEvent);
|
|
}
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Updates the parameters that affect the operation of the PXE Base Code Protocol.
|
|
|
|
This function sets parameters that affect the operation of the PXE Base Code Protocol.
|
|
The parameter specified by NewAutoArp is used to control the generation of ARP
|
|
protocol packets. If NewAutoArp is TRUE, then ARP Protocol packets will be generated
|
|
as required by the PXE Base Code Protocol. If NewAutoArp is FALSE, then no ARP
|
|
Protocol packets will be generated. In this case, the only mappings that are
|
|
available are those stored in the ArpCache of the EFI_PXE_BASE_CODE_MODE structure.
|
|
If there are not enough mappings in the ArpCache to perform a PXE Base Code Protocol
|
|
service, then the service will fail. This function updates the AutoArp field of
|
|
the EFI_PXE_BASE_CODE_MODE structure to NewAutoArp.
|
|
The SetParameters() call must be invoked after a Callback Protocol is installed
|
|
to enable the use of callbacks.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] NewAutoArp If not NULL, a pointer to a value that specifies whether to replace the
|
|
current value of AutoARP.
|
|
@param[in] NewSendGUID If not NULL, a pointer to a value that specifies whether to replace the
|
|
current value of SendGUID.
|
|
@param[in] NewTTL If not NULL, a pointer to be used in place of the current value of TTL,
|
|
the "time to live" field of the IP header.
|
|
@param[in] NewToS If not NULL, a pointer to be used in place of the current value of ToS,
|
|
the "type of service" field of the IP header.
|
|
@param[in] NewMakeCallback If not NULL, a pointer to a value that specifies whether to replace the
|
|
current value of the MakeCallback field of the Mode structure.
|
|
|
|
@retval EFI_SUCCESS The new parameters values were updated.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER One or more parameters are invalid.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcSetParameters (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN BOOLEAN *NewAutoArp OPTIONAL,
|
|
IN BOOLEAN *NewSendGUID OPTIONAL,
|
|
IN UINT8 *NewTTL OPTIONAL,
|
|
IN UINT8 *NewToS OPTIONAL,
|
|
IN BOOLEAN *NewMakeCallback OPTIONAL
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
EFI_GUID SystemGuid;
|
|
EFI_STATUS Status;
|
|
|
|
if (This == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
if (NewMakeCallback != NULL) {
|
|
if (*NewMakeCallback) {
|
|
//
|
|
// Update the previous PxeBcCallback protocol.
|
|
//
|
|
Status = gBS->HandleProtocol (
|
|
Mode->UsingIpv6 ? Private->Ip6Nic->Controller : Private->Ip4Nic->Controller,
|
|
&gEfiPxeBaseCodeCallbackProtocolGuid,
|
|
(VOID **) &Private->PxeBcCallback
|
|
);
|
|
|
|
if (EFI_ERROR (Status) || (Private->PxeBcCallback->Callback == NULL)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
} else {
|
|
Private->PxeBcCallback = NULL;
|
|
}
|
|
Mode->MakeCallbacks = *NewMakeCallback;
|
|
}
|
|
|
|
if (NewSendGUID != NULL) {
|
|
if (*NewSendGUID && EFI_ERROR (NetLibGetSystemGuid (&SystemGuid))) {
|
|
DEBUG ((DEBUG_WARN, "PXE: Failed to read system GUID from the smbios table!\n"));
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
Mode->SendGUID = *NewSendGUID;
|
|
}
|
|
|
|
if (NewAutoArp != NULL) {
|
|
Mode->AutoArp = *NewAutoArp;
|
|
}
|
|
|
|
if (NewTTL != NULL) {
|
|
Mode->TTL = *NewTTL;
|
|
}
|
|
|
|
if (NewToS != NULL) {
|
|
Mode->ToS = *NewToS;
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
|
|
/**
|
|
Updates the station IP address and/or subnet mask values of a network device.
|
|
|
|
This function updates the station IP address and/or subnet mask values of a network
|
|
device. The NewStationIp field is used to modify the network device's current IP address.
|
|
If NewStationIP is NULL, then the current IP address will not be modified. Otherwise,
|
|
this function updates the StationIp field of the EFI_PXE_BASE_CODE_MODE structure
|
|
with NewStationIp. The NewSubnetMask field is used to modify the network device's current subnet
|
|
mask. If NewSubnetMask is NULL, then the current subnet mask will not be modified.
|
|
Otherwise, this function updates the SubnetMask field of the EFI_PXE_BASE_CODE_MODE
|
|
structure with NewSubnetMask.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] NewStationIp Pointer to the new IP address to be used by the network device.
|
|
@param[in] NewSubnetMask Pointer to the new subnet mask to be used by the network device.
|
|
|
|
@retval EFI_SUCCESS The new station IP address and/or subnet mask were updated.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER One or more parameters are invalid.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcSetStationIP (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN EFI_IP_ADDRESS *NewStationIp OPTIONAL,
|
|
IN EFI_IP_ADDRESS *NewSubnetMask OPTIONAL
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
|
|
if (This == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (NewStationIp != NULL && !NetIp6IsValidUnicast (&NewStationIp->v6)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
Status = EFI_SUCCESS;
|
|
|
|
if (!Mode->UsingIpv6 &&
|
|
NewSubnetMask != NULL &&
|
|
!IP4_IS_VALID_NETMASK (NTOHL (NewSubnetMask->Addr[0]))) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (!Mode->UsingIpv6 && NewStationIp != NULL) {
|
|
if (IP4_IS_UNSPECIFIED(NTOHL (NewStationIp->Addr[0])) ||
|
|
IP4_IS_LOCAL_BROADCAST(NTOHL (NewStationIp->Addr[0])) ||
|
|
(NewSubnetMask != NULL && NewSubnetMask->Addr[0] != 0 && !NetIp4IsUnicast (NTOHL (NewStationIp->Addr[0]), NTOHL (NewSubnetMask->Addr[0])))) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
if (Mode->UsingIpv6 && NewStationIp != NULL) {
|
|
//
|
|
// Set the IPv6 address by Ip6Config protocol.
|
|
//
|
|
Status = PxeBcRegisterIp6Address (Private, &NewStationIp->v6);
|
|
if (EFI_ERROR (Status)) {
|
|
goto ON_EXIT;
|
|
}
|
|
}
|
|
|
|
if (NewStationIp != NULL) {
|
|
CopyMem (&Mode->StationIp, NewStationIp, sizeof (EFI_IP_ADDRESS));
|
|
CopyMem (&Private->StationIp, NewStationIp, sizeof (EFI_IP_ADDRESS));
|
|
}
|
|
|
|
if (!Mode->UsingIpv6 && NewSubnetMask != NULL) {
|
|
CopyMem (&Mode->SubnetMask, NewSubnetMask, sizeof (EFI_IP_ADDRESS));
|
|
CopyMem (&Private->SubnetMask ,NewSubnetMask, sizeof (EFI_IP_ADDRESS));
|
|
}
|
|
|
|
Status = PxeBcFlushStationIp (Private, NewStationIp, NewSubnetMask);
|
|
if (!EFI_ERROR (Status)) {
|
|
Private->IsAddressOk = TRUE;
|
|
}
|
|
|
|
ON_EXIT:
|
|
return Status;
|
|
}
|
|
|
|
|
|
/**
|
|
Updates the contents of the cached DHCP and Discover packets.
|
|
|
|
The pointers to the new packets are used to update the contents of the cached
|
|
packets in the EFI_PXE_BASE_CODE_MODE structure.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_PROTOCOL instance.
|
|
@param[in] NewDhcpDiscoverValid Pointer to a value that will replace the current
|
|
DhcpDiscoverValid field.
|
|
@param[in] NewDhcpAckReceived Pointer to a value that will replace the current
|
|
DhcpAckReceived field.
|
|
@param[in] NewProxyOfferReceived Pointer to a value that will replace the current
|
|
ProxyOfferReceived field.
|
|
@param[in] NewPxeDiscoverValid Pointer to a value that will replace the current
|
|
ProxyOfferReceived field.
|
|
@param[in] NewPxeReplyReceived Pointer to a value that will replace the current
|
|
PxeReplyReceived field.
|
|
@param[in] NewPxeBisReplyReceived Pointer to a value that will replace the current
|
|
PxeBisReplyReceived field.
|
|
@param[in] NewDhcpDiscover Pointer to the new cached DHCP Discover packet contents.
|
|
@param[in] NewDhcpAck Pointer to the new cached DHCP Ack packet contents.
|
|
@param[in] NewProxyOffer Pointer to the new cached Proxy Offer packet contents.
|
|
@param[in] NewPxeDiscover Pointer to the new cached PXE Discover packet contents.
|
|
@param[in] NewPxeReply Pointer to the new cached PXE Reply packet contents.
|
|
@param[in] NewPxeBisReply Pointer to the new cached PXE BIS Reply packet contents.
|
|
|
|
@retval EFI_SUCCESS The cached packet contents were updated.
|
|
@retval EFI_NOT_STARTED The PXE Base Code Protocol is in the stopped state.
|
|
@retval EFI_INVALID_PARAMETER This is NULL or does not point to a valid
|
|
EFI_PXE_BASE_CODE_PROTOCOL structure.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeBcSetPackets (
|
|
IN EFI_PXE_BASE_CODE_PROTOCOL *This,
|
|
IN BOOLEAN *NewDhcpDiscoverValid OPTIONAL,
|
|
IN BOOLEAN *NewDhcpAckReceived OPTIONAL,
|
|
IN BOOLEAN *NewProxyOfferReceived OPTIONAL,
|
|
IN BOOLEAN *NewPxeDiscoverValid OPTIONAL,
|
|
IN BOOLEAN *NewPxeReplyReceived OPTIONAL,
|
|
IN BOOLEAN *NewPxeBisReplyReceived OPTIONAL,
|
|
IN EFI_PXE_BASE_CODE_PACKET *NewDhcpDiscover OPTIONAL,
|
|
IN EFI_PXE_BASE_CODE_PACKET *NewDhcpAck OPTIONAL,
|
|
IN EFI_PXE_BASE_CODE_PACKET *NewProxyOffer OPTIONAL,
|
|
IN EFI_PXE_BASE_CODE_PACKET *NewPxeDiscover OPTIONAL,
|
|
IN EFI_PXE_BASE_CODE_PACKET *NewPxeReply OPTIONAL,
|
|
IN EFI_PXE_BASE_CODE_PACKET *NewPxeBisReply OPTIONAL
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
EFI_PXE_BASE_CODE_MODE *Mode;
|
|
|
|
if (This == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
Private = PXEBC_PRIVATE_DATA_FROM_PXEBC (This);
|
|
Mode = Private->PxeBc.Mode;
|
|
|
|
if (!Mode->Started) {
|
|
return EFI_NOT_STARTED;
|
|
}
|
|
|
|
if (NewDhcpDiscoverValid != NULL) {
|
|
Mode->DhcpDiscoverValid = *NewDhcpDiscoverValid;
|
|
}
|
|
|
|
if (NewDhcpAckReceived != NULL) {
|
|
Mode->DhcpAckReceived = *NewDhcpAckReceived;
|
|
}
|
|
|
|
if (NewProxyOfferReceived != NULL) {
|
|
Mode->ProxyOfferReceived = *NewProxyOfferReceived;
|
|
}
|
|
|
|
if (NewPxeDiscoverValid != NULL) {
|
|
Mode->PxeDiscoverValid = *NewPxeDiscoverValid;
|
|
}
|
|
|
|
if (NewPxeReplyReceived != NULL) {
|
|
Mode->PxeReplyReceived = *NewPxeReplyReceived;
|
|
}
|
|
|
|
if (NewPxeBisReplyReceived != NULL) {
|
|
Mode->PxeBisReplyReceived = *NewPxeBisReplyReceived;
|
|
}
|
|
|
|
if (NewDhcpDiscover != NULL) {
|
|
CopyMem (&Mode->DhcpDiscover, NewDhcpDiscover, sizeof (EFI_PXE_BASE_CODE_PACKET));
|
|
}
|
|
|
|
if (NewDhcpAck != NULL) {
|
|
CopyMem (&Mode->DhcpAck, NewDhcpAck, sizeof (EFI_PXE_BASE_CODE_PACKET));
|
|
}
|
|
|
|
if (NewProxyOffer != NULL) {
|
|
CopyMem (&Mode->ProxyOffer, NewProxyOffer, sizeof (EFI_PXE_BASE_CODE_PACKET));
|
|
}
|
|
|
|
if (NewPxeDiscover != NULL) {
|
|
CopyMem (&Mode->PxeDiscover, NewPxeDiscover, sizeof (EFI_PXE_BASE_CODE_PACKET));
|
|
}
|
|
|
|
if (NewPxeReply != NULL) {
|
|
CopyMem (&Mode->PxeReply, NewPxeReply, sizeof (EFI_PXE_BASE_CODE_PACKET));
|
|
}
|
|
|
|
if (NewPxeBisReply != NULL) {
|
|
CopyMem (&Mode->PxeBisReply, NewPxeBisReply, sizeof (EFI_PXE_BASE_CODE_PACKET));
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
EFI_PXE_BASE_CODE_PROTOCOL gPxeBcProtocolTemplate = {
|
|
EFI_PXE_BASE_CODE_PROTOCOL_REVISION,
|
|
EfiPxeBcStart,
|
|
EfiPxeBcStop,
|
|
EfiPxeBcDhcp,
|
|
EfiPxeBcDiscover,
|
|
EfiPxeBcMtftp,
|
|
EfiPxeBcUdpWrite,
|
|
EfiPxeBcUdpRead,
|
|
EfiPxeBcSetIpFilter,
|
|
EfiPxeBcArp,
|
|
EfiPxeBcSetParameters,
|
|
EfiPxeBcSetStationIP,
|
|
EfiPxeBcSetPackets,
|
|
NULL
|
|
};
|
|
|
|
|
|
/**
|
|
Callback function that is invoked when the PXE Base Code Protocol is about to transmit, has
|
|
received, or is waiting to receive a packet.
|
|
|
|
This function is invoked when the PXE Base Code Protocol is about to transmit, has received,
|
|
or is waiting to receive a packet. Parameters Function and Received specify the type of event.
|
|
Parameters PacketLen and Packet specify the packet that generated the event. If these fields
|
|
are zero and NULL respectively, then this is a status update callback. If the operation specified
|
|
by Function is to continue, then CALLBACK_STATUS_CONTINUE should be returned. If the operation
|
|
specified by Function should be aborted, then CALLBACK_STATUS_ABORT should be returned. Due to
|
|
the polling nature of UEFI device drivers, a callback function should not execute for more than 5 ms.
|
|
The SetParameters() function must be called after a Callback Protocol is installed to enable the
|
|
use of callbacks.
|
|
|
|
@param[in] This Pointer to the EFI_PXE_BASE_CODE_CALLBACK_PROTOCOL instance.
|
|
@param[in] Function The PXE Base Code Protocol function that is waiting for an event.
|
|
@param[in] Received TRUE if the callback is being invoked due to a receive event. FALSE if
|
|
the callback is being invoked due to a transmit event.
|
|
@param[in] PacketLength The length, in bytes, of Packet. This field will have a value of zero if
|
|
this is a wait for receive event.
|
|
@param[in] PacketPtr If Received is TRUE, a pointer to the packet that was just received;
|
|
otherwise a pointer to the packet that is about to be transmitted.
|
|
|
|
@retval EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE If Function specifies a continue operation.
|
|
@retval EFI_PXE_BASE_CODE_CALLBACK_STATUS_ABORT If Function specifies an abort operation.
|
|
|
|
**/
|
|
EFI_PXE_BASE_CODE_CALLBACK_STATUS
|
|
EFIAPI
|
|
EfiPxeLoadFileCallback (
|
|
IN EFI_PXE_BASE_CODE_CALLBACK_PROTOCOL *This,
|
|
IN EFI_PXE_BASE_CODE_FUNCTION Function,
|
|
IN BOOLEAN Received,
|
|
IN UINT32 PacketLength,
|
|
IN EFI_PXE_BASE_CODE_PACKET *PacketPtr OPTIONAL
|
|
)
|
|
{
|
|
EFI_INPUT_KEY Key;
|
|
EFI_STATUS Status;
|
|
|
|
//
|
|
// Catch Ctrl-C or ESC to abort.
|
|
//
|
|
Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
|
|
|
|
if (!EFI_ERROR (Status)) {
|
|
|
|
if (Key.ScanCode == SCAN_ESC || Key.UnicodeChar == (0x1F & 'c')) {
|
|
|
|
return EFI_PXE_BASE_CODE_CALLBACK_STATUS_ABORT;
|
|
}
|
|
}
|
|
//
|
|
// No print if receive packet
|
|
//
|
|
if (Received) {
|
|
return EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE;
|
|
}
|
|
//
|
|
// Print only for three functions
|
|
//
|
|
switch (Function) {
|
|
|
|
case EFI_PXE_BASE_CODE_FUNCTION_MTFTP:
|
|
//
|
|
// Print only for open MTFTP packets, not every MTFTP packets
|
|
//
|
|
if (PacketLength != 0 && PacketPtr != NULL) {
|
|
if (PacketPtr->Raw[0x1C] != 0x00 || PacketPtr->Raw[0x1D] != 0x01) {
|
|
return EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case EFI_PXE_BASE_CODE_FUNCTION_DHCP:
|
|
case EFI_PXE_BASE_CODE_FUNCTION_DISCOVER:
|
|
break;
|
|
|
|
default:
|
|
return EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE;
|
|
}
|
|
|
|
if (PacketLength != 0 && PacketPtr != NULL) {
|
|
//
|
|
// Print '.' when transmit a packet
|
|
//
|
|
AsciiPrint (".");
|
|
}
|
|
|
|
return EFI_PXE_BASE_CODE_CALLBACK_STATUS_CONTINUE;
|
|
}
|
|
|
|
EFI_PXE_BASE_CODE_CALLBACK_PROTOCOL gPxeBcCallBackTemplate = {
|
|
EFI_PXE_BASE_CODE_CALLBACK_PROTOCOL_REVISION,
|
|
EfiPxeLoadFileCallback
|
|
};
|
|
|
|
|
|
/**
|
|
Causes the driver to load a specified file.
|
|
|
|
@param[in] This Protocol instance pointer.
|
|
@param[in] FilePath The device specific path of the file to load.
|
|
@param[in] BootPolicy If TRUE, indicates that the request originates from the
|
|
boot manager is attempting to load FilePath as a boot
|
|
selection. If FALSE, then FilePath must match an exact file
|
|
to be loaded.
|
|
@param[in, out] BufferSize On input the size of Buffer in bytes. On output with a return
|
|
code of EFI_SUCCESS, the amount of data transferred to
|
|
Buffer. On output with a return code of EFI_BUFFER_TOO_SMALL,
|
|
the size of Buffer required to retrieve the requested file.
|
|
@param[in] Buffer The memory buffer to transfer the file to. IF Buffer is NULL,
|
|
then no the size of the requested file is returned in
|
|
BufferSize.
|
|
|
|
@retval EFI_SUCCESS The file was loaded.
|
|
@retval EFI_UNSUPPORTED The device does not support the provided BootPolicy.
|
|
@retval EFI_INVALID_PARAMETER FilePath is not a valid device path, or
|
|
BufferSize is NULL.
|
|
@retval EFI_NO_MEDIA No medium was present to load the file.
|
|
@retval EFI_DEVICE_ERROR The file was not loaded due to a device error.
|
|
@retval EFI_NO_RESPONSE The remote system did not respond.
|
|
@retval EFI_NOT_FOUND The file was not found.
|
|
@retval EFI_ABORTED The file load process was manually cancelled.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
EfiPxeLoadFile (
|
|
IN EFI_LOAD_FILE_PROTOCOL *This,
|
|
IN EFI_DEVICE_PATH_PROTOCOL *FilePath,
|
|
IN BOOLEAN BootPolicy,
|
|
IN OUT UINTN *BufferSize,
|
|
IN VOID *Buffer OPTIONAL
|
|
)
|
|
{
|
|
PXEBC_PRIVATE_DATA *Private;
|
|
PXEBC_VIRTUAL_NIC *VirtualNic;
|
|
EFI_PXE_BASE_CODE_PROTOCOL *PxeBc;
|
|
BOOLEAN UsingIpv6;
|
|
EFI_STATUS Status;
|
|
EFI_STATUS MediaStatus;
|
|
|
|
if (This == NULL || BufferSize == NULL || FilePath == NULL || !IsDevicePathEnd (FilePath)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// Only support BootPolicy
|
|
//
|
|
if (!BootPolicy) {
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
VirtualNic = PXEBC_VIRTUAL_NIC_FROM_LOADFILE (This);
|
|
Private = VirtualNic->Private;
|
|
PxeBc = &Private->PxeBc;
|
|
UsingIpv6 = FALSE;
|
|
Status = EFI_DEVICE_ERROR;
|
|
|
|
//
|
|
// Check media status before PXE start
|
|
//
|
|
MediaStatus = EFI_SUCCESS;
|
|
NetLibDetectMediaWaitTimeout (Private->Controller, PXEBC_CHECK_MEDIA_WAITING_TIME, &MediaStatus);
|
|
if (MediaStatus != EFI_SUCCESS) {
|
|
return EFI_NO_MEDIA;
|
|
}
|
|
|
|
//
|
|
// Check whether the virtual nic is using IPv6 or not.
|
|
//
|
|
if (VirtualNic == Private->Ip6Nic) {
|
|
UsingIpv6 = TRUE;
|
|
}
|
|
|
|
//
|
|
// Start Pxe Base Code to initialize PXE boot.
|
|
//
|
|
Status = PxeBc->Start (PxeBc, UsingIpv6);
|
|
if (Status == EFI_ALREADY_STARTED && UsingIpv6 != PxeBc->Mode->UsingIpv6) {
|
|
//
|
|
// PxeBc protocol has already been started but not on the required IP version, restart it.
|
|
//
|
|
Status = PxeBc->Stop (PxeBc);
|
|
if (!EFI_ERROR (Status)) {
|
|
Status = PxeBc->Start (PxeBc, UsingIpv6);
|
|
}
|
|
}
|
|
if (Status == EFI_SUCCESS || Status == EFI_ALREADY_STARTED) {
|
|
Status = PxeBcLoadBootFile (Private, BufferSize, Buffer);
|
|
}
|
|
|
|
if (Status != EFI_SUCCESS &&
|
|
Status != EFI_UNSUPPORTED &&
|
|
Status != EFI_BUFFER_TOO_SMALL) {
|
|
//
|
|
// There are three cases, which needn't stop pxebc here.
|
|
// 1. success to download file.
|
|
// 2. success to get file size.
|
|
// 3. unsupported.
|
|
//
|
|
PxeBc->Stop (PxeBc);
|
|
} else {
|
|
//
|
|
// The DHCP4 can have only one configured child instance so we need to stop
|
|
// reset the DHCP4 child before we return. Otherwise these programs which
|
|
// also need to use DHCP4 will be impacted.
|
|
//
|
|
if (!PxeBc->Mode->UsingIpv6) {
|
|
Private->Dhcp4->Stop (Private->Dhcp4);
|
|
Private->Dhcp4->Configure (Private->Dhcp4, NULL);
|
|
}
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
EFI_LOAD_FILE_PROTOCOL gLoadFileProtocolTemplate = { EfiPxeLoadFile };
|