e62076e53d
- added container_of() macro replacement - fixed unresolved symbol in netmod.cc - added MSVC-style structure packing pragmas - check for the presence of min / max macros - enabled slirp_new for MSVC in configure script TODO list: - check for more updates from Qemu - fix lots of compiler warnings - reduce code duplication with 'vnet' module (DHCP, TFTP, ARP) - add separate config file for slirp to make it more flexible (using the 'script' parameter) - update MSVC workspace files - add SMB support on Linux - remove slirp backend module after next Bochs release
1127 lines
31 KiB
C++
1127 lines
31 KiB
C++
/////////////////////////////////////////////////////////////////////////
|
|
// $Id$
|
|
/////////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Copyright (C) 2001-2014 The Bochs Project
|
|
//
|
|
// This library is free software; you can redistribute it and/or
|
|
// modify it under the terms of the GNU Lesser General Public
|
|
// License as published by the Free Software Foundation; either
|
|
// version 2 of the License, or (at your option) any later version.
|
|
//
|
|
// This library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
// Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public
|
|
// License along with this library; if not, write to the Free Software
|
|
// Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
//
|
|
|
|
// Common networking and helper code to find and create pktmover classes
|
|
|
|
// Peter Grehan (grehan@iprg.nokia.com) coded the initial version of the
|
|
// NE2000/ether stuff.
|
|
|
|
// Define BX_PLUGGABLE in files that can be compiled into plugins. For
|
|
// platforms that require a special tag on exported symbols, BX_PLUGGABLE
|
|
// is used to know when we are exporting symbols and when we are importing.
|
|
#define BX_PLUGGABLE
|
|
|
|
#include "iodev.h"
|
|
|
|
#if BX_NETWORKING
|
|
|
|
#include "netmod.h"
|
|
|
|
#if !defined(WIN32) || defined(__CYGWIN__)
|
|
#include <arpa/inet.h> /* ntohs, htons */
|
|
#else
|
|
#include <winsock2.h>
|
|
#endif
|
|
|
|
#define LOG_THIS theNetModCtl->
|
|
|
|
bx_netmod_ctl_c* theNetModCtl = NULL;
|
|
|
|
int libnetmod_LTX_plugin_init(plugin_t *plugin, plugintype_t type, int argc, char *argv[])
|
|
{
|
|
if (type == PLUGTYPE_CORE) {
|
|
theNetModCtl = new bx_netmod_ctl_c;
|
|
bx_devices.pluginNetModCtl = theNetModCtl;
|
|
return 0; // Success
|
|
} else {
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
void libnetmod_LTX_plugin_fini(void)
|
|
{
|
|
delete theNetModCtl;
|
|
}
|
|
|
|
bx_netmod_ctl_c::bx_netmod_ctl_c()
|
|
{
|
|
put("netmodctl", "NETCTL");
|
|
}
|
|
|
|
void* bx_netmod_ctl_c::init_module(bx_list_c *base, void *rxh, void *rxstat, bx_devmodel_c *netdev)
|
|
{
|
|
eth_pktmover_c *ethmod;
|
|
|
|
// Attach to the selected ethernet module
|
|
const char *modname = SIM->get_param_enum("ethmod", base)->get_selected();
|
|
ethmod = eth_locator_c::create(modname,
|
|
SIM->get_param_string("ethdev", base)->getptr(),
|
|
(const char *) SIM->get_param_string("mac", base)->getptr(),
|
|
(eth_rx_handler_t)rxh, (eth_rx_status_t)rxstat, netdev,
|
|
SIM->get_param_string("script", base)->getptr());
|
|
|
|
if (ethmod == NULL) {
|
|
BX_PANIC(("could not find eth module %s", modname));
|
|
// if they continue, use null.
|
|
BX_INFO(("could not find eth module %s - using null instead", modname));
|
|
|
|
ethmod = eth_locator_c::create("null", NULL,
|
|
(const char *) SIM->get_param_string("mac", base)->getptr(),
|
|
(eth_rx_handler_t)rxh, (eth_rx_status_t)rxstat, netdev, "");
|
|
if (ethmod == NULL)
|
|
BX_PANIC(("could not locate null module"));
|
|
}
|
|
return ethmod;
|
|
}
|
|
|
|
eth_locator_c *eth_locator_c::all;
|
|
|
|
//
|
|
// Each pktmover module has a static locator class that registers
|
|
// here
|
|
//
|
|
eth_locator_c::eth_locator_c(const char *type)
|
|
{
|
|
next = all;
|
|
all = this;
|
|
this->type = type;
|
|
}
|
|
|
|
extern class bx_null_locator_c bx_null_match;
|
|
#if BX_NETMOD_FBSD
|
|
extern class bx_fbsd_locator_c bx_fbsd_match;
|
|
#endif
|
|
#if BX_NETMOD_LINUX
|
|
extern class bx_linux_locator_c bx_linux_match;
|
|
#endif
|
|
#if BX_NETMOD_WIN32
|
|
extern class bx_win32_locator_c bx_win32_match;
|
|
#endif
|
|
#if BX_NETMOD_TAP
|
|
extern class bx_tap_locator_c bx_tap_match;
|
|
#endif
|
|
#if BX_NETMOD_TUNTAP
|
|
extern class bx_tuntap_locator_c bx_tuntap_match;
|
|
#endif
|
|
#if BX_NETMOD_VDE
|
|
extern class bx_vde_locator_c bx_vde_match;
|
|
#endif
|
|
#if BX_NETMOD_SLIRP
|
|
extern class bx_slirp_locator_c bx_slirp_match;
|
|
#endif
|
|
#if BX_NETMOD_SLIRP_NEW
|
|
extern class bx_slirp_new_locator_c bx_slirp_new_match;
|
|
#endif
|
|
extern class bx_vnet_locator_c bx_vnet_match;
|
|
|
|
//
|
|
// Called by ethernet chip emulations to locate and create a pktmover
|
|
// object
|
|
//
|
|
eth_pktmover_c *
|
|
eth_locator_c::create(const char *type, const char *netif,
|
|
const char *macaddr,
|
|
eth_rx_handler_t rxh, eth_rx_status_t rxstat,
|
|
bx_devmodel_c *dev, const char *script)
|
|
{
|
|
#ifdef eth_static_constructors
|
|
for (eth_locator_c *p = all; p != NULL; p = p->next) {
|
|
if (strcmp(type, p->type) == 0)
|
|
return (p->allocate(netif, macaddr, rxh, rxstat, dev, script));
|
|
}
|
|
#else
|
|
eth_locator_c *ptr = 0;
|
|
|
|
if (!strcmp(type, "null")) {
|
|
ptr = (eth_locator_c *) &bx_null_match;
|
|
}
|
|
#if BX_NETMOD_FBSD
|
|
{
|
|
if (!strcmp(type, "fbsd"))
|
|
ptr = (eth_locator_c *) &bx_fbsd_match;
|
|
}
|
|
#endif
|
|
#if BX_NETMOD_LINUX
|
|
{
|
|
if (!strcmp(type, "linux"))
|
|
ptr = (eth_locator_c *) &bx_linux_match;
|
|
}
|
|
#endif
|
|
#if BX_NETMOD_TUNTAP
|
|
{
|
|
if (!strcmp(type, "tuntap"))
|
|
ptr = (eth_locator_c *) &bx_tuntap_match;
|
|
}
|
|
#endif
|
|
#if BX_NETMOD_VDE
|
|
{
|
|
if (!strcmp(type, "vde"))
|
|
ptr = (eth_locator_c *) &bx_vde_match;
|
|
}
|
|
#endif
|
|
#if BX_NETMOD_SLIRP
|
|
{
|
|
if (!strcmp(type, "slirp"))
|
|
ptr = (eth_locator_c *) &bx_slirp_match;
|
|
}
|
|
#endif
|
|
#if BX_NETMOD_SLIRP_NEW
|
|
{
|
|
if (!strcmp(type, "slirp_new"))
|
|
ptr = (eth_locator_c *) &bx_slirp_new_match;
|
|
}
|
|
#endif
|
|
#if BX_NETMOD_TAP
|
|
{
|
|
if (!strcmp(type, "tap"))
|
|
ptr = (eth_locator_c *) &bx_tap_match;
|
|
}
|
|
#endif
|
|
#if BX_NETMOD_WIN32
|
|
{
|
|
if(!strcmp(type, "win32"))
|
|
ptr = (eth_locator_c *) &bx_win32_match;
|
|
}
|
|
#endif
|
|
if (!strcmp(type, "vnet")) {
|
|
ptr = (eth_locator_c *) &bx_vnet_match;
|
|
}
|
|
if (ptr) {
|
|
return (ptr->allocate(netif, macaddr, rxh, rxstat, dev, script));
|
|
}
|
|
#endif
|
|
|
|
return (NULL);
|
|
}
|
|
|
|
#if (BX_NETMOD_TAP==1) || (BX_NETMOD_TUNTAP==1) || (BX_NETMOD_VDE==1)
|
|
|
|
extern "C" {
|
|
#include <sys/wait.h>
|
|
};
|
|
|
|
// This is a utility script used for tuntap or ethertap
|
|
int execute_script(bx_devmodel_c *netdev, const char* scriptname, char* arg1)
|
|
{
|
|
int pid,status;
|
|
|
|
if (!(pid=fork())) {
|
|
char filename[BX_PATHNAME_LEN];
|
|
if (scriptname[0]=='/') {
|
|
strcpy(filename, scriptname);
|
|
}
|
|
else {
|
|
getcwd(filename, BX_PATHNAME_LEN);
|
|
strcat(filename, "/");
|
|
strcat(filename, scriptname);
|
|
}
|
|
|
|
// execute the script
|
|
BX_INFO(("Executing script '%s %s'", filename, arg1));
|
|
execle(filename, scriptname, arg1, NULL, NULL);
|
|
|
|
// if we get here there has been a problem
|
|
exit(-1);
|
|
}
|
|
|
|
wait (&status);
|
|
if (!WIFEXITED(status)) {
|
|
return -1;
|
|
}
|
|
return WEXITSTATUS(status);
|
|
}
|
|
|
|
#endif
|
|
|
|
void write_pktlog_txt(FILE *pktlog_txt, const Bit8u *buf, unsigned len, bx_bool host_to_guest)
|
|
{
|
|
Bit8u *charbuf = (Bit8u *)buf;
|
|
Bit8u rawbuf[18];
|
|
unsigned c, n;
|
|
|
|
if (!host_to_guest) {
|
|
fprintf(pktlog_txt, "a packet from guest to host, length %u\n", len);
|
|
} else {
|
|
fprintf(pktlog_txt, "a packet from host to guest, length %u\n", len);
|
|
}
|
|
n = 0;
|
|
c = 0;
|
|
while (n < len) {
|
|
fprintf(pktlog_txt, "%02x ", (unsigned)charbuf[n]);
|
|
if ((charbuf[n] >= 0x20) && (charbuf[n] < 0x80)) {
|
|
rawbuf[c++] = charbuf[n];
|
|
} else {
|
|
rawbuf[c++] = '.';
|
|
}
|
|
n++;
|
|
if (((n % 16) == 0) || (n == len)) {
|
|
rawbuf[c] = 0;
|
|
if (n == len) {
|
|
while (c++ < 16) fprintf(pktlog_txt, " ");
|
|
}
|
|
fprintf(pktlog_txt, " %s\n", rawbuf);
|
|
c = 0;
|
|
}
|
|
}
|
|
fprintf(pktlog_txt, "--\n");
|
|
fflush(pktlog_txt);
|
|
}
|
|
|
|
Bit16u ip_checksum(const Bit8u *buf, unsigned buf_len)
|
|
{
|
|
Bit32u sum = 0;
|
|
unsigned n;
|
|
|
|
for (n = 0; n < buf_len; n++) {
|
|
if (n & 1) {
|
|
sum += (Bit32u)(*buf++);
|
|
} else {
|
|
sum += (Bit32u)(*buf++) << 8;
|
|
}
|
|
}
|
|
while (sum > 0xffff) {
|
|
sum = (sum >> 16) + (sum & 0xffff);
|
|
}
|
|
|
|
return (Bit16u)sum;
|
|
}
|
|
|
|
// ARP support
|
|
|
|
#if defined(_MSC_VER)
|
|
#pragma pack(push, 1)
|
|
#elif defined(__MWERKS__) && defined(macintosh)
|
|
#pragma options align=packed
|
|
#endif
|
|
|
|
#define ARP_OPCODE_REQUEST 1
|
|
#define ARP_OPCODE_REPLY 2
|
|
|
|
typedef struct arp_header {
|
|
#if defined(_MSC_VER) && (_MSC_VER>=1300)
|
|
__declspec(align(1))
|
|
#endif
|
|
Bit16u hw_addr_space;
|
|
Bit16u proto_addr_space;
|
|
Bit8u hw_addr_len;
|
|
Bit8u proto_addr_len;
|
|
Bit16u opcode;
|
|
/* HW address of sender */
|
|
/* Protocol address of sender */
|
|
/* HW address of target*/
|
|
/* Protocol address of target */
|
|
}
|
|
#if !defined(_MSC_VER)
|
|
GCC_ATTRIBUTE((packed))
|
|
#endif
|
|
arp_header_t;
|
|
|
|
#if defined(_MSC_VER)
|
|
#pragma pack(pop)
|
|
#elif defined(__MWERKS__) && defined(macintosh)
|
|
#pragma options align=reset
|
|
#endif
|
|
|
|
// DHCP server
|
|
|
|
#define BOOTREQUEST 1
|
|
#define BOOTREPLY 2
|
|
|
|
#define BOOTPOPT_PADDING 0
|
|
#define BOOTPOPT_END 255
|
|
#define BOOTPOPT_SUBNETMASK 1
|
|
#define BOOTPOPT_TIMEOFFSET 2
|
|
#define BOOTPOPT_ROUTER_OPTION 3
|
|
#define BOOTPOPT_DOMAIN_NAMESERVER 6
|
|
#define BOOTPOPT_HOST_NAME 12
|
|
#define BOOTPOPT_DOMAIN_NAME 15
|
|
#define BOOTPOPT_MAX_DATAGRAM_SIZE 22
|
|
#define BOOTPOPT_DEFAULT_IP_TTL 23
|
|
#define BOOTPOPT_BROADCAST_ADDRESS 28
|
|
#define BOOTPOPT_ARPCACHE_TIMEOUT 35
|
|
#define BOOTPOPT_DEFAULT_TCP_TTL 37
|
|
#define BOOTPOPT_NTP_SERVER 42
|
|
#define BOOTPOPT_NETBIOS_NAMESERVER 44
|
|
#define BOOTPOPT_X_FONTSERVER 48
|
|
#define BOOTPOPT_REQUESTED_IP_ADDRESS 50
|
|
#define BOOTPOPT_IP_ADDRESS_LEASE_TIME 51
|
|
#define BOOTPOPT_OPTION_OVRLOAD 52
|
|
#define BOOTPOPT_DHCP_MESSAGETYPE 53
|
|
#define BOOTPOPT_SERVER_IDENTIFIER 54
|
|
#define BOOTPOPT_PARAMETER_REQUEST_LIST 55
|
|
#define BOOTPOPT_MAX_DHCP_MESSAGE_SIZE 57
|
|
#define BOOTPOPT_RENEWAL_TIME 58
|
|
#define BOOTPOPT_REBINDING_TIME 59
|
|
#define BOOTPOPT_CLASS_IDENTIFIER 60
|
|
#define BOOTPOPT_CLIENT_IDENTIFIER 61
|
|
|
|
#define DHCPDISCOVER 1
|
|
#define DHCPOFFER 2
|
|
#define DHCPREQUEST 3
|
|
#define DHCPDECLINE 4
|
|
#define DHCPACK 5
|
|
#define DHCPNAK 6
|
|
#define DHCPRELEASE 7
|
|
#define DHCPINFORM 8
|
|
|
|
#define DEFAULT_LEASE_TIME 28800
|
|
|
|
// TFTP server support by EaseWay <easeway@123.com>
|
|
|
|
#define TFTP_RRQ 1
|
|
#define TFTP_WRQ 2
|
|
#define TFTP_DATA 3
|
|
#define TFTP_ACK 4
|
|
#define TFTP_ERROR 5
|
|
#define TFTP_OPTACK 6
|
|
|
|
#define TFTP_OPTION_OCTET 0x1
|
|
#define TFTP_OPTION_BLKSIZE 0x2
|
|
#define TFTP_OPTION_TSIZE 0x4
|
|
#define TFTP_OPTION_TIMEOUT 0x8
|
|
|
|
#define TFTP_DEFAULT_BLKSIZE 512
|
|
#define TFTP_DEFAULT_TIMEOUT 5
|
|
|
|
static const Bit8u subnetmask_ipv4addr[4] = {0xff,0xff,0xff,0x00};
|
|
static const Bit8u broadcast_ipv4addr1[4] = {0xff,0xff,0xff,0xff};
|
|
|
|
int process_arp(bx_devmodel_c *netdev, const Bit8u *data, unsigned data_len, Bit8u *reply, dhcp_cfg_t *dhcp)
|
|
{
|
|
int reply_size = 0;
|
|
|
|
arp_header_t *arphdr = (arp_header_t *)((Bit8u *)data +
|
|
sizeof(ethernet_header_t));
|
|
|
|
if ((ntohs(arphdr->hw_addr_space) != 0x0001) ||
|
|
(ntohs(arphdr->proto_addr_space) != 0x0800) ||
|
|
(arphdr->hw_addr_len != ETHERNET_MAC_ADDR_LEN) ||
|
|
(arphdr->proto_addr_len != 4)) {
|
|
BX_ERROR(("Unhandled ARP message hw: %04x (%d) proto: %04x (%d)\n",
|
|
ntohs(arphdr->hw_addr_space), arphdr->hw_addr_len,
|
|
ntohs(arphdr->proto_addr_space), arphdr->proto_addr_len));
|
|
return 0;
|
|
}
|
|
|
|
arp_header_t *arprhdr = (arp_header_t *)((Bit8u *)reply +
|
|
sizeof(ethernet_header_t));
|
|
switch(ntohs(arphdr->opcode)) {
|
|
case ARP_OPCODE_REQUEST:
|
|
// Slirp uses addresses x.x.x.0 - x.x.x.3
|
|
if (((Bit8u *)arphdr)[27] > dhcp->max_guest_ipv4addr)
|
|
break;
|
|
memset(reply, 0, MIN_RX_PACKET_LEN);
|
|
arprhdr->hw_addr_space = htons(0x0001);
|
|
arprhdr->proto_addr_space = htons(0x0800);
|
|
arprhdr->hw_addr_len = ETHERNET_MAC_ADDR_LEN;
|
|
arprhdr->proto_addr_len = 4;
|
|
arprhdr->opcode = htons(ARP_OPCODE_REPLY);
|
|
memcpy((Bit8u *)arprhdr+8, dhcp->host_macaddr, ETHERNET_MAC_ADDR_LEN);
|
|
memcpy((Bit8u *)arprhdr+14, (Bit8u *)arphdr+24, 4);
|
|
memcpy((Bit8u *)arprhdr+18, dhcp->guest_macaddr, ETHERNET_MAC_ADDR_LEN);
|
|
memcpy((Bit8u *)arprhdr+24, (Bit8u *)arphdr+14, 4);
|
|
reply_size = MIN_RX_PACKET_LEN;
|
|
break;
|
|
case ARP_OPCODE_REPLY:
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
return reply_size;
|
|
}
|
|
|
|
int process_dhcp(bx_devmodel_c *netdev, const Bit8u *data, unsigned data_len, Bit8u *reply, dhcp_cfg_t *dhcp)
|
|
{
|
|
const Bit8u *opts;
|
|
unsigned opts_len;
|
|
unsigned extcode;
|
|
unsigned extlen;
|
|
const Bit8u *extdata;
|
|
unsigned dhcpmsgtype = 0;
|
|
bx_bool found_serverid = false;
|
|
bx_bool found_leasetime = false;
|
|
bx_bool found_guest_ipaddr = false;
|
|
bx_bool found_host_name = false;
|
|
Bit32u leasetime = BX_MAX_BIT32U;
|
|
const Bit8u *dhcpreqparams = NULL;
|
|
unsigned dhcpreqparams_len = 0;
|
|
Bit8u dhcpreqparam_default[8];
|
|
bx_bool dhcpreqparam_default_validflag = false;
|
|
unsigned dhcpreqparams_default_len = 0;
|
|
Bit8u *replyopts;
|
|
Bit8u replybuf[576];
|
|
char *hostname = NULL;
|
|
unsigned hostname_len = 0;
|
|
|
|
if (data_len < (236U+4U)) return 0;
|
|
if (data[0] != BOOTREQUEST) return 0;
|
|
if (data[1] != 1 || data[2] != 6) return 0;
|
|
if (memcmp(&data[28U], dhcp->guest_macaddr, 6)) return 0;
|
|
if (data[236] != 0x63 || data[237] != 0x82 ||
|
|
data[238] != 0x53 || data[239] != 0x63) return 0;
|
|
|
|
opts = &data[240];
|
|
opts_len = data_len - 240U;
|
|
|
|
while (1) {
|
|
if (opts_len < 1) {
|
|
BX_ERROR(("dhcp: invalid request"));
|
|
return 0;
|
|
}
|
|
extcode = *opts++;
|
|
opts_len--;
|
|
|
|
if (extcode == BOOTPOPT_PADDING) continue;
|
|
if (extcode == BOOTPOPT_END) break;
|
|
if (opts_len < 1) {
|
|
BX_ERROR(("dhcp: invalid request"));
|
|
return 0;
|
|
}
|
|
extlen = *opts++;
|
|
opts_len--;
|
|
if (opts_len < extlen) {
|
|
BX_ERROR(("dhcp: invalid request"));
|
|
return 0;
|
|
}
|
|
extdata = opts;
|
|
opts += extlen;
|
|
opts_len -= extlen;
|
|
|
|
switch (extcode)
|
|
{
|
|
case BOOTPOPT_DHCP_MESSAGETYPE:
|
|
if (extlen != 1)
|
|
break;
|
|
dhcpmsgtype = *extdata;
|
|
break;
|
|
case BOOTPOPT_PARAMETER_REQUEST_LIST:
|
|
if (extlen < 1)
|
|
break;
|
|
dhcpreqparams = extdata;
|
|
dhcpreqparams_len = extlen;
|
|
break;
|
|
case BOOTPOPT_SERVER_IDENTIFIER:
|
|
if (extlen != 4)
|
|
break;
|
|
if (memcmp(extdata, dhcp->host_ipv4addr, 4)) {
|
|
BX_INFO(("dhcp: request to another server"));
|
|
return 0;
|
|
}
|
|
found_serverid = true;
|
|
break;
|
|
case BOOTPOPT_IP_ADDRESS_LEASE_TIME:
|
|
if (extlen != 4)
|
|
break;
|
|
leasetime = get_net4(&extdata[0]);
|
|
found_leasetime = true;
|
|
break;
|
|
case BOOTPOPT_REQUESTED_IP_ADDRESS:
|
|
if (extlen != 4)
|
|
break;
|
|
if (!memcmp(extdata, dhcp->default_guest_ipv4addr,4)) {
|
|
found_guest_ipaddr = true;
|
|
memcpy(dhcp->guest_ipv4addr, dhcp->default_guest_ipv4addr, 4);
|
|
}
|
|
break;
|
|
case BOOTPOPT_HOST_NAME:
|
|
if (extlen < 1)
|
|
break;
|
|
hostname = (char*)malloc(extlen);
|
|
memcpy(hostname, extdata, extlen);
|
|
hostname_len = extlen;
|
|
found_host_name = true;
|
|
break;
|
|
default:
|
|
BX_ERROR(("extcode %d not supported yet", extcode));
|
|
break;
|
|
}
|
|
}
|
|
|
|
memset(&dhcpreqparam_default,0,sizeof(dhcpreqparam_default));
|
|
memset(&replybuf[0],0,sizeof(replybuf));
|
|
replybuf[0] = BOOTREPLY;
|
|
replybuf[1] = 1;
|
|
replybuf[2] = 6;
|
|
memcpy(&replybuf[4],&data[4],4);
|
|
memcpy(&replybuf[16], dhcp->default_guest_ipv4addr, 4);
|
|
memcpy(&replybuf[20], dhcp->host_ipv4addr, 4);
|
|
memcpy(&replybuf[28],&data[28],6);
|
|
memcpy(&replybuf[44],"vnet",4);
|
|
memcpy(&replybuf[108],"pxelinux.0",10);
|
|
replybuf[236] = 0x63;
|
|
replybuf[237] = 0x82;
|
|
replybuf[238] = 0x53;
|
|
replybuf[239] = 0x63;
|
|
replyopts = &replybuf[240];
|
|
opts_len = sizeof(replybuf)/sizeof(replybuf[0])-240;
|
|
switch (dhcpmsgtype) {
|
|
case DHCPDISCOVER:
|
|
BX_INFO(("dhcp server: DHCPDISCOVER"));
|
|
// reset guest address; answer must be broadcasted to unconfigured IP
|
|
memcpy(dhcp->guest_ipv4addr, broadcast_ipv4addr1, 4);
|
|
*replyopts ++ = BOOTPOPT_DHCP_MESSAGETYPE;
|
|
*replyopts ++ = 1;
|
|
*replyopts ++ = DHCPOFFER;
|
|
opts_len -= 3;
|
|
dhcpreqparam_default[0] = BOOTPOPT_IP_ADDRESS_LEASE_TIME;
|
|
dhcpreqparam_default[1] = BOOTPOPT_SERVER_IDENTIFIER;
|
|
if (found_host_name) {
|
|
dhcpreqparam_default[2] = BOOTPOPT_HOST_NAME;
|
|
}
|
|
dhcpreqparam_default_validflag = true;
|
|
break;
|
|
case DHCPREQUEST:
|
|
BX_INFO(("dhcp server: DHCPREQUEST"));
|
|
// check ciaddr.
|
|
if (found_serverid || found_guest_ipaddr || (!memcmp(&data[12], dhcp->default_guest_ipv4addr, 4))) {
|
|
*replyopts ++ = BOOTPOPT_DHCP_MESSAGETYPE;
|
|
*replyopts ++ = 1;
|
|
*replyopts ++ = DHCPACK;
|
|
opts_len -= 3;
|
|
dhcpreqparam_default[0] = BOOTPOPT_IP_ADDRESS_LEASE_TIME;
|
|
if (!found_serverid) {
|
|
dhcpreqparam_default[1] = BOOTPOPT_SERVER_IDENTIFIER;
|
|
}
|
|
dhcpreqparam_default_validflag = true;
|
|
} else {
|
|
*replyopts ++ = BOOTPOPT_DHCP_MESSAGETYPE;
|
|
*replyopts ++ = 1;
|
|
*replyopts ++ = DHCPNAK;
|
|
opts_len -= 3;
|
|
if (found_leasetime) {
|
|
dhcpreqparam_default[dhcpreqparams_default_len++] = BOOTPOPT_IP_ADDRESS_LEASE_TIME;
|
|
dhcpreqparam_default_validflag = true;
|
|
}
|
|
if (!found_serverid) {
|
|
dhcpreqparam_default[dhcpreqparams_default_len++] = BOOTPOPT_SERVER_IDENTIFIER;
|
|
dhcpreqparam_default_validflag = true;
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
BX_ERROR(("dhcp server: unsupported message type %u",dhcpmsgtype));
|
|
return 0;
|
|
}
|
|
|
|
while (1) {
|
|
while (dhcpreqparams_len-- > 0) {
|
|
switch (*dhcpreqparams++) {
|
|
case BOOTPOPT_SUBNETMASK:
|
|
BX_INFO(("provide BOOTPOPT_SUBNETMASK"));
|
|
if (opts_len < 6) {
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= 6;
|
|
*replyopts ++ = BOOTPOPT_SUBNETMASK;
|
|
*replyopts ++ = 4;
|
|
memcpy(replyopts,subnetmask_ipv4addr,4);
|
|
replyopts += 4;
|
|
break;
|
|
case BOOTPOPT_ROUTER_OPTION:
|
|
BX_INFO(("provide BOOTPOPT_ROUTER_OPTION"));
|
|
if (opts_len < 6) {
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= 6;
|
|
*replyopts ++ = BOOTPOPT_ROUTER_OPTION;
|
|
*replyopts ++ = 4;
|
|
memcpy(replyopts, dhcp->host_ipv4addr, 4);
|
|
replyopts += 4;
|
|
break;
|
|
case BOOTPOPT_DOMAIN_NAMESERVER:
|
|
if (dhcp->dns_ipv4addr[0] != 0) {
|
|
BX_INFO(("provide BOOTPOPT_DOMAIN_NAMESERVER"));
|
|
if (opts_len < 6) {
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= 6;
|
|
*replyopts ++ = BOOTPOPT_DOMAIN_NAMESERVER;
|
|
*replyopts ++ = 4;
|
|
memcpy(replyopts, dhcp->dns_ipv4addr, 4);
|
|
replyopts += 4;
|
|
}
|
|
break;
|
|
case BOOTPOPT_BROADCAST_ADDRESS:
|
|
BX_INFO(("provide BOOTPOPT_BROADCAST_ADDRESS"));
|
|
if (opts_len < 6) {
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= 6;
|
|
*replyopts ++ = BOOTPOPT_BROADCAST_ADDRESS;
|
|
*replyopts ++ = 4;
|
|
memcpy(replyopts, dhcp->host_ipv4addr, 3);
|
|
replyopts += 3;
|
|
*replyopts ++ = 0xff;
|
|
break;
|
|
case BOOTPOPT_IP_ADDRESS_LEASE_TIME:
|
|
BX_INFO(("provide BOOTPOPT_IP_ADDRESS_LEASE_TIME"));
|
|
if (opts_len < 6) {
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= 6;
|
|
*replyopts ++ = BOOTPOPT_IP_ADDRESS_LEASE_TIME;
|
|
*replyopts ++ = 4;
|
|
if (leasetime < DEFAULT_LEASE_TIME) {
|
|
put_net4(replyopts, leasetime);
|
|
} else {
|
|
put_net4(replyopts, DEFAULT_LEASE_TIME);
|
|
}
|
|
replyopts += 4;
|
|
break;
|
|
case BOOTPOPT_SERVER_IDENTIFIER:
|
|
BX_INFO(("provide BOOTPOPT_SERVER_IDENTIFIER"));
|
|
if (opts_len < 6) {
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= 6;
|
|
*replyopts ++ = BOOTPOPT_SERVER_IDENTIFIER;
|
|
*replyopts ++ = 4;
|
|
memcpy(replyopts, dhcp->host_ipv4addr,4);
|
|
replyopts += 4;
|
|
break;
|
|
case BOOTPOPT_RENEWAL_TIME:
|
|
BX_INFO(("provide BOOTPOPT_RENEWAL_TIME"));
|
|
if (opts_len < 6) {
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= 6;
|
|
*replyopts ++ = BOOTPOPT_RENEWAL_TIME;
|
|
*replyopts ++ = 4;
|
|
put_net4(replyopts, 600);
|
|
replyopts += 4;
|
|
break;
|
|
case BOOTPOPT_REBINDING_TIME:
|
|
BX_INFO(("provide BOOTPOPT_REBINDING_TIME"));
|
|
if (opts_len < 6) {
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= 6;
|
|
*replyopts ++ = BOOTPOPT_REBINDING_TIME;
|
|
*replyopts ++ = 4;
|
|
put_net4(replyopts, 1800);
|
|
replyopts += 4;
|
|
break;
|
|
case BOOTPOPT_HOST_NAME:
|
|
if (hostname != NULL) {
|
|
BX_INFO(("provide BOOTPOPT_HOST_NAME"));
|
|
if (opts_len < (hostname_len + 2)) {
|
|
free(hostname);
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= (hostname_len + 2);
|
|
*replyopts ++ = BOOTPOPT_HOST_NAME;
|
|
*replyopts ++ = hostname_len;
|
|
memcpy(replyopts, hostname, hostname_len);
|
|
replyopts += hostname_len;
|
|
free(hostname);
|
|
hostname = NULL;
|
|
break;
|
|
}
|
|
default:
|
|
if (*(dhcpreqparams-1) != 0) {
|
|
BX_ERROR(("dhcp server: requested parameter %u not supported yet",*(dhcpreqparams-1)));
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!dhcpreqparam_default_validflag) break;
|
|
dhcpreqparams = &dhcpreqparam_default[0];
|
|
dhcpreqparams_len = sizeof(dhcpreqparam_default);
|
|
dhcpreqparam_default_validflag = false;
|
|
}
|
|
|
|
if (opts_len < 1) {
|
|
BX_ERROR(("option buffer is insufficient"));
|
|
return 0;
|
|
}
|
|
opts_len -= 2;
|
|
*replyopts ++ = BOOTPOPT_END;
|
|
|
|
opts_len = replyopts - &replybuf[0];
|
|
if (opts_len < (236U+64U)) {
|
|
opts_len = (236U+64U); // BOOTP
|
|
}
|
|
if (opts_len < (548U)) {
|
|
opts_len = 548U; // DHCP
|
|
}
|
|
memcpy(reply, replybuf, opts_len);
|
|
return opts_len;
|
|
}
|
|
|
|
// TFTP support
|
|
|
|
typedef struct tftp_session {
|
|
char filename[BX_PATHNAME_LEN];
|
|
Bit16u tid;
|
|
bx_bool write;
|
|
unsigned options;
|
|
size_t tsize_val;
|
|
unsigned blksize_val;
|
|
unsigned timeout_val;
|
|
unsigned timestamp;
|
|
struct tftp_session *next;
|
|
} tftp_session_t;
|
|
|
|
tftp_session_t *tftp_sessions = NULL;
|
|
|
|
tftp_session_t *tftp_new_session(Bit16u req_tid, bx_bool mode, const char *tpath, const char *tname)
|
|
{
|
|
tftp_session_t *s = new tftp_session_t;
|
|
s->tid = req_tid;
|
|
s->write = mode;
|
|
s->options = 0;
|
|
s->blksize_val = TFTP_DEFAULT_BLKSIZE;
|
|
s->timeout_val = TFTP_DEFAULT_TIMEOUT;
|
|
s->next = tftp_sessions;
|
|
tftp_sessions = s;
|
|
if ((strlen(tname) > 0) && ((strlen(tpath) + strlen(tname)) < BX_PATHNAME_LEN)) {
|
|
sprintf(s->filename, "%s/%s", tpath, tname);
|
|
} else {
|
|
s->filename[0] = 0;
|
|
}
|
|
return s;
|
|
}
|
|
|
|
tftp_session_t *tftp_find_session(Bit16u tid)
|
|
{
|
|
tftp_session_t *s = tftp_sessions;
|
|
while (s != NULL) {
|
|
if (s->tid != tid)
|
|
s = s->next;
|
|
else
|
|
break;
|
|
}
|
|
return s;
|
|
}
|
|
|
|
void tftp_remove_session(tftp_session_t *s)
|
|
{
|
|
tftp_session_t *last;
|
|
|
|
if (tftp_sessions == s) {
|
|
tftp_sessions = s->next;
|
|
} else {
|
|
last = tftp_sessions;
|
|
while (last != NULL) {
|
|
if (last->next != s)
|
|
last = last->next;
|
|
else
|
|
break;
|
|
}
|
|
if (last) {
|
|
last->next = s->next;
|
|
}
|
|
}
|
|
delete s;
|
|
}
|
|
|
|
void tftp_update_timestamp(tftp_session_t *s)
|
|
{
|
|
s->timestamp = (unsigned)(bx_pc_system.time_usec() / 1000000);
|
|
}
|
|
|
|
void tftp_timeout_check()
|
|
{
|
|
unsigned curtime = (unsigned)(bx_pc_system.time_usec() / 1000000);
|
|
tftp_session_t *next, *s = tftp_sessions;
|
|
|
|
while (s != NULL) {
|
|
if ((curtime - s->timestamp) > s->timeout_val) {
|
|
next = s->next;
|
|
tftp_remove_session(s);
|
|
s = next;
|
|
} else {
|
|
s = s->next;
|
|
}
|
|
}
|
|
}
|
|
|
|
int tftp_send_error(Bit8u *buffer, unsigned code, const char *msg, tftp_session_t *s)
|
|
{
|
|
put_net2(buffer, TFTP_ERROR);
|
|
put_net2(buffer + 2, code);
|
|
strcpy((char*)buffer + 4, msg);
|
|
if (s != NULL) {
|
|
tftp_remove_session(s);
|
|
}
|
|
return (strlen(msg) + 5);
|
|
}
|
|
|
|
int tftp_send_data(Bit8u *buffer, unsigned block_nr, tftp_session_t *s)
|
|
{
|
|
char msg[BX_PATHNAME_LEN];
|
|
int rd;
|
|
|
|
FILE *fp = fopen(s->filename, "rb");
|
|
if (!fp) {
|
|
sprintf(msg, "File not found: %s", s->filename);
|
|
return tftp_send_error(buffer, 1, msg, s);
|
|
}
|
|
|
|
if (fseek(fp, (block_nr - 1) * s->blksize_val, SEEK_SET) < 0) {
|
|
return tftp_send_error(buffer, 3, "Block not seekable", s);
|
|
}
|
|
|
|
rd = fread(buffer + 4, 1, s->blksize_val, fp);
|
|
fclose(fp);
|
|
|
|
if (rd < 0) {
|
|
return tftp_send_error(buffer, 3, "Block not readable", s);
|
|
}
|
|
|
|
put_net2(buffer, TFTP_DATA);
|
|
put_net2(buffer + 2, block_nr);
|
|
if (rd < (int)s->blksize_val) {
|
|
tftp_remove_session(s);
|
|
} else {
|
|
tftp_update_timestamp(s);
|
|
}
|
|
return (rd + 4);
|
|
}
|
|
|
|
int tftp_send_ack(Bit8u *buffer, unsigned block_nr)
|
|
{
|
|
put_net2(buffer, TFTP_ACK);
|
|
put_net2(buffer + 2, block_nr);
|
|
return 4;
|
|
}
|
|
|
|
int tftp_send_optack(Bit8u *buffer, tftp_session_t *s)
|
|
{
|
|
Bit8u *p = buffer;
|
|
put_net2(p, TFTP_OPTACK);
|
|
p += 2;
|
|
if (s->options & TFTP_OPTION_TSIZE) {
|
|
*p++='t'; *p++='s'; *p++='i'; *p++='z'; *p++='e'; *p++='\0';
|
|
sprintf((char *)p, "%lu", (unsigned long)s->tsize_val);
|
|
p += strlen((const char *)p) + 1;
|
|
}
|
|
if (s->options & TFTP_OPTION_BLKSIZE) {
|
|
*p++='b'; *p++='l'; *p++='k'; *p++='s'; *p++='i'; *p++='z'; *p++='e'; *p++='\0';
|
|
sprintf((char *)p, "%d", s->blksize_val);
|
|
p += strlen((const char *)p) + 1;
|
|
}
|
|
if (s->options & TFTP_OPTION_TIMEOUT) {
|
|
*p++='t'; *p++='i'; *p++='m'; *p++='e'; *p++='o'; *p++='u'; *p++='t'; *p++='\0';
|
|
sprintf((char *)p, "%d", s->timeout_val);
|
|
p += strlen((const char *)p) + 1;
|
|
}
|
|
tftp_update_timestamp(s);
|
|
return (p - buffer);
|
|
}
|
|
|
|
void tftp_parse_options(bx_devmodel_c *netdev, const char *mode, const Bit8u *data,
|
|
unsigned data_len, tftp_session_t *s)
|
|
{
|
|
while (mode < (const char*)data + data_len) {
|
|
if (memcmp(mode, "octet\0", 6) == 0) {
|
|
s->options |= TFTP_OPTION_OCTET;
|
|
mode += 6;
|
|
} else if (memcmp(mode, "tsize\0", 6) == 0) {
|
|
s->options |= TFTP_OPTION_TSIZE; // size needed
|
|
mode += 6;
|
|
if (s->write) {
|
|
s->tsize_val = atoi(mode);
|
|
}
|
|
mode += strlen(mode)+1;
|
|
} else if (memcmp(mode, "blksize\0", 8) == 0) {
|
|
s->options |= TFTP_OPTION_BLKSIZE;
|
|
mode += 8;
|
|
s->blksize_val = atoi(mode);
|
|
if (s->blksize_val > TFTP_BUFFER_SIZE) {
|
|
BX_ERROR(("tftp req: blksize value %d not supported - using %d instead",
|
|
s->blksize_val, TFTP_BUFFER_SIZE));
|
|
s->blksize_val = TFTP_BUFFER_SIZE;
|
|
}
|
|
mode += strlen(mode)+1;
|
|
} else if (memcmp(mode, "timeout\0", 8) == 0) {
|
|
s->options |= TFTP_OPTION_TIMEOUT;
|
|
mode += 8;
|
|
s->timeout_val = atoi(mode);
|
|
if ((s->timeout_val < 1) || (s->timeout_val > 255)) {
|
|
BX_ERROR(("tftp req: timeout value %d not supported - using %d instead",
|
|
s->timeout_val, TFTP_DEFAULT_TIMEOUT));
|
|
s->timeout_val = TFTP_DEFAULT_TIMEOUT;
|
|
}
|
|
mode += strlen(mode)+1;
|
|
} else {
|
|
BX_INFO(("tftp req: unknown option %s", mode));
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
int process_tftp(bx_devmodel_c *netdev, const Bit8u *data, unsigned data_len, Bit16u req_tid, Bit8u *reply, const char *tftp_rootdir)
|
|
{
|
|
FILE *fp;
|
|
unsigned block_nr;
|
|
unsigned tftp_len;
|
|
tftp_session_t *s;
|
|
|
|
tftp_timeout_check();
|
|
s = tftp_find_session(req_tid);
|
|
switch (get_net2(data)) {
|
|
case TFTP_RRQ:
|
|
{
|
|
if (s != NULL) {
|
|
tftp_remove_session(s);
|
|
}
|
|
strncpy((char*)reply, (const char*)data + 2, data_len - 2);
|
|
reply[data_len - 4] = 0;
|
|
|
|
s = tftp_new_session(req_tid, 0, tftp_rootdir, (const char*)reply);
|
|
if (strlen(s->filename) == 0) {
|
|
return tftp_send_error(reply, 1, "Illegal file name", s);
|
|
}
|
|
// options
|
|
if (strlen((char*)reply) < data_len - 2) {
|
|
const char *mode = (const char*)data + 2 + strlen((char*)reply) + 1;
|
|
tftp_parse_options(netdev, mode, data, data_len, s);
|
|
}
|
|
if (!(s->options & TFTP_OPTION_OCTET)) {
|
|
return tftp_send_error(reply, 4, "Unsupported transfer mode", NULL);
|
|
}
|
|
if (s->options & TFTP_OPTION_TSIZE) {
|
|
struct stat stbuf;
|
|
if (stat(s->filename, &stbuf) < 0) {
|
|
s->options &= ~TFTP_OPTION_TSIZE;
|
|
} else {
|
|
s->tsize_val = (size_t)stbuf.st_size;
|
|
BX_INFO(("tftp filesize: %lu", (unsigned long)s->tsize_val));
|
|
}
|
|
}
|
|
if ((s->options & ~TFTP_OPTION_OCTET) > 0) {
|
|
return tftp_send_optack(reply, s);
|
|
} else {
|
|
return tftp_send_data(reply, 1, s);
|
|
}
|
|
}
|
|
break;
|
|
|
|
case TFTP_WRQ:
|
|
{
|
|
if (s != NULL) {
|
|
tftp_remove_session(s);
|
|
}
|
|
strncpy((char*)reply, (const char*)data + 2, data_len - 2);
|
|
reply[data_len - 4] = 0;
|
|
|
|
s = tftp_new_session(req_tid, 1, tftp_rootdir, (const char*)reply);
|
|
if (strlen(s->filename) == 0) {
|
|
return tftp_send_error(reply, 1, "Illegal file name", s);
|
|
}
|
|
// options
|
|
if (strlen((char*)reply) < data_len - 2) {
|
|
const char *mode = (const char*)data + 2 + strlen((char*)reply) + 1;
|
|
tftp_parse_options(netdev, mode, data, data_len, s);
|
|
}
|
|
if (!(s->options & TFTP_OPTION_OCTET)) {
|
|
return tftp_send_error(reply, 4, "Unsupported transfer mode", NULL);
|
|
}
|
|
|
|
fp = fopen(s->filename, "rb");
|
|
if (fp) {
|
|
fclose(fp);
|
|
return tftp_send_error(reply, 6, "File exists", s);
|
|
}
|
|
fp = fopen(s->filename, "wb");
|
|
if (!fp) {
|
|
return tftp_send_error(reply, 2, "Access violation", s);
|
|
}
|
|
fclose(fp);
|
|
|
|
if ((s->options & ~TFTP_OPTION_OCTET) > 0) {
|
|
return tftp_send_optack(reply, s);
|
|
} else {
|
|
tftp_update_timestamp(s);
|
|
return tftp_send_ack(reply, 0);
|
|
}
|
|
}
|
|
break;
|
|
|
|
case TFTP_DATA:
|
|
if (s != NULL) {
|
|
if (s->write == 1) {
|
|
block_nr = get_net2(data + 2);
|
|
strncpy((char*)reply, (const char*)data + 4, data_len - 4);
|
|
tftp_len = data_len - 4;
|
|
reply[tftp_len] = 0;
|
|
if (tftp_len <= s->blksize_val) {
|
|
fp = fopen(s->filename, "ab");
|
|
if (!fp) {
|
|
return tftp_send_error(reply, 2, "Access violation", s);
|
|
}
|
|
if (fseek(fp, (block_nr - 1) * TFTP_BUFFER_SIZE, SEEK_SET) < 0) {
|
|
return tftp_send_error(reply, 3, "Block not seekable", s);
|
|
}
|
|
fwrite(reply, 1, tftp_len, fp);
|
|
fclose(fp);
|
|
if (tftp_len < s->blksize_val) {
|
|
tftp_remove_session(s);
|
|
} else {
|
|
tftp_update_timestamp(s);
|
|
}
|
|
return tftp_send_ack(reply, block_nr);
|
|
} else {
|
|
return tftp_send_error(reply, 4, "Illegal request", s);
|
|
}
|
|
} else {
|
|
return tftp_send_error(reply, 4, "Illegal request", s);
|
|
}
|
|
} else {
|
|
return tftp_send_error(reply, 5, "Unknown transfer ID", s);
|
|
}
|
|
break;
|
|
|
|
case TFTP_ACK:
|
|
if (s != NULL) {
|
|
if (s->write == 0) {
|
|
return tftp_send_data(reply, get_net2(data + 2) + 1, s);
|
|
} else {
|
|
return tftp_send_error(reply, 4, "Illegal request", s);
|
|
}
|
|
}
|
|
break;
|
|
|
|
case TFTP_ERROR:
|
|
if (s != NULL) {
|
|
tftp_remove_session(s);
|
|
}
|
|
break;
|
|
|
|
default:
|
|
BX_ERROR(("TFTP unknown opt %d", get_net2(data)));
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#endif /* if BX_NETWORKING */
|