Learn the network protocol stack in ARM-uboot from scratch

Learn the network protocol stack in ARM-uboot from scratch

[[401440]]

Network protocol stack in uboot

The network card driver has already encapsulated the interface for sending and receiving data for the upper-layer protocol. Therefore, the upper-layer protocol stack only needs to call the corresponding network card driver functions in sequence to send and receive network data.

The protocol stack in uboot is relatively simple and has the following characteristics:

The transport layer only supports the UDP protocol;

  • Currently only several protocols are supported, including ICMP, TFTP, NFS, DNS, DHCP, CDP, and SNTP;
  • The network card uses poll to receive data packets instead of interrupt mode;
  • The sending and receiving of data packets are serial operations and do not support concurrency.

1. Network protocol stack architecture

The following is the function calling process of the uboot network protocol stack:

2. Use DNS commands to analyze the sending and receiving process of a data packet

In uboot, all commands are defined by the macro U_BOOT_CMD. The definition of the dns command is as follows:

  1. 426 U_BOOT_CMD(
  2. 427 dns, 3, 1, do_dns,
  3. 428 "lookup the IP of a hostname" ,
  4. 429 "hostname [envvar]"  
  5. 430 );

When we enter the command dns in the uboot command terminal, the command parsing function will call the dns execution function do_dns()

  1. 389 int do_dns(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
  2. 390 {
  3. 406 if (strlen(argv[1]) >= 255) {
  4. 407 printf( "dns error: hostname too long\n" );
  5. 408 return 1;
  6. 409 }
  7. 410
  8. 411 NetDNSResolve = argv[1];
  9. 412
  10. 413 if (argc == 3)
  11. 414 NetDNSenvvar = argv[2];
  12. 415 else  
  13. 416 NetDNSenvvar = NULL ;
  14. 417
  15. 418 if (NetLoop(DNS) < 0) {
  16. 419 printf( "dns lookup of %s failed, check setup\n" , argv[1]);
  17. 420 return 1;
  18. 421 }
  19. 422
  20. 423 return 0;
  21. 424 }

Line 406 determines the length of the parameter string. If it is greater than 255, it is illegal. Line 411 parameter 1 must be the host to be resolved, which is stored in NetDNSResolve. Lines 413 to 416 store the environment parameters of the dns command. This parameter can be missing. Line 418 enters the network protocol processing function entry NetLoop() and passes the corresponding protocol DNS to the function.

The NetLoop() code is quite long, so we will only analyze a few important sections of it.

  1. 316 /************************************************************************/
  2. 317 /*
  3. 318 * Main network processing loop.
  4. 319 */
  5. 320
  6. 321 int NetLoop(enum proto_t protocol)
  7. 322 {
  8. 323 bd_t *bd = gd->bd;
  9. 324 int ret = -1;
  10. …………
  11. 352 NetInitLoop();
  12. …………
  13. 367 switch (protocol) {
  14. 368 case TFTPGET:
  15. 369 #ifdef CONFIG_CMD_TFTPPUT
  16. 370 case TFTPPUT:
  17. 371 #endif
  18. 372 /* always use ARP to get server ethernet address */
  19. 373 TftpStart(protocol);
  20. 374 break;
  21. …………
  22. 426 #if defined(CONFIG_CMD_DNS)
  23. 427 case DNS:
  24. 428 DnsStart();
  25. 429 break;
  26. 430 #endif
  27. 438 }
  28. …………
  29. 461 for (;;) {
  30. 462 WATCHDOG_RESET();
  31. 463 #ifdef CONFIG_SHOW_ACTIVITY
  32. 464 show_activity(1);
  33. 465 #endif
  34. 466 /*
  35. 467 * Check the ethernet for a new packet. The ethernet
  36. 468 * receive routine will process it.
  37. 469 */
  38. 470 eth_rx();
  39. 471
  40. 472 /*
  41. 473 * Abort if ctrl-c was pressed.
  42. 474 */
  43. 475 if (ctrlc()) {
  44. 476 /* cancel any ARP that may not have completed */
  45. 477 NetArpWaitPacketIP = 0;
  46. 478
  47. 479 net_cleanup_loop();
  48. 480 eth_halt();
  49. 481 /* Invalidate the last protocol */
  50. 482 eth_set_last_protocol(BOOTP);
  51. 483
  52. 484 puts( "\nAbort\n" );
  53. 485 /* include a debug print as well as incase the debug
  54. 486 messages are directed to stderr */
  55. 487 debug_cond(DEBUG_INT_STATE, "--- NetLoop Abort!\n" );
  56. 488 goto done;
  57. 489 }
  58. …………
  59. 522 switch (net_state) {
  60. 523
  61. 524 case NETLOOP_RESTART:
  62. 525 NetRestarted = 1;
  63. 526 goto restart;
  64. 527
  65. 528 case NETLOOP_SUCCESS:
  66. 529 net_cleanup_loop();
  67. 530 if (NetBootFileXferSize > 0) {
  68. 531 char buf[20];
  69. 532 printf( "Bytes transferred = %ld (%lx hex)\n" ,
  70. 533 NetBootFileXferSize,
  71. 534 NetBootFileXferSize);
  72. 535 sprintf(buf, "%lX" , NetBootFileXferSize);
  73. 536 setenv( "filesize" , buf);
  74. 537
  75. 538 sprintf(buf, "%lX" , (unsigned long)load_addr);
  76. 539 setenv( "fileaddr" , buf);
  77. 540 }
  78. 541 if (protocol != NETCONS)
  79. 542 eth_halt();
  80. 543 else  
  81. 544 eth_halt_state_only();
  82. 545
  83. 546 eth_set_last_protocol(protocol);
  84. 547
  85. 548 ret = NetBootFileXferSize;
  86. 549 debug_cond(DEBUG_INT_STATE, "--- NetLoop Success!\n" );
  87. 550 goto done;
  88. 551
  89. 552 case NETLOOP_FAIL:
  90. 553 net_cleanup_loop();
  91. 554 /* Invalidate the last protocol */
  92. 555 eth_set_last_protocol(BOOTP);
  93. 556 debug_cond(DEBUG_INT_STATE, "--- NetLoop Fail!\n" );
  94. 557 goto done;
  95. 558
  96. 559 case NETLOOP_CONTINUE:
  97. 560 continue ;
  98. 561 }
  99. 562 }
  100. 563
  101. 564 done:
  102. 565 #ifdef CONFIG_CMD_TFTPPUT
  103. 566 /* Clear out the handlers */
  104. 567 net_set_udp_handler( NULL );
  105. 568 net_set_icmp_handler( NULL );
  106. 569 #endif
  107. 570 return ret;
  108. 571 }

The function parameter is DNS. Line 352 initializes network information, reads the values ​​of environment variables such as ipaddr, gatewayip, netmask, serverip, dnsip, etc. and copies them to the corresponding global variables.

  1. static void NetInitLoop(void)
  2. {
  3. static   int env_changed_id;
  4. int env_id = get_env_id();
  5.  
  6. /* update   only   when the environment has changed */
  7. if (env_changed_id != env_id) {
  8. NetOurIP = getenv_IPaddr( "ipaddr" );
  9. NetOurGatewayIP = getenv_IPaddr( "gatewayip" );
  10. NetOurSubnetMask = getenv_IPaddr( "netmask" );
  11. NetServerIP = getenv_IPaddr( "serverip" );
  12. NetOurNativeVLAN = getenv_VLAN( "nvlan" );
  13. NetOurVLAN = getenv_VLAN( "vlan" );
  14. #if defined(CONFIG_CMD_DNS)
  15. NetOurDNSIP = getenv_IPaddr( "dnsip" );
  16. #endif
  17. env_changed_id = env_id;
  18. }
  19. memcpy(NetOurEther, eth_get_dev()->enetaddr, 6);
  20.  
  21. return ;
  22. }

Line 367 performs a switch operation on the incoming parameters, and different protocols enter different processing flows. Line 428 executes DnsStart().

  1. 197 void
  2. 198 DnsStart(void)
  3. 199 {
  4. 200 debug( "%s\n" , __func__);
  5. 201
  6. 202 NetSetTimeout(DNS_TIMEOUT, DnsTimeout);
  7. 203 net_set_udp_handler(DnsHandler);
  8. 204
  9. 205 DnsSend();
  10. 206 }

The function net_set_udp_handler() on line 203 mainly registers the callback function DnsHandler() of the DNS protocol to the callback pointer udp_packet_handler of the UDP protocol.

  1. void net_set_udp_handler(rxhand_f *f)
  2. {
  3. debug_cond(DEBUG_INT_STATE, "--- NetLoop UDP handler set (%p)\n" , f);
  4. if (f == NULL )
  5. udp_packet_handler = dummy_handler; //Register to udp protocol callback function pointer
  6. else  
  7. udp_packet_handler = f;
  8. }

DnsStart() will eventually call the function DnsSend() to send the DNS protocol data packet, which fills the UDP data packet according to the DNS protocol.

  1. 37 static void
  2. 38 DnsSend(void)
  3. 39 {
  4. 40 struct header *header;
  5. 41 int n, name_len;
  6. 42 uchar *p, *pkt;
  7. 43 const char *s;
  8. 44 const char * name ;
  9. 45 enum dns_query_type qtype = DNS_A_RECORD;
  10. 46
  11. 47 name = NetDNSResolve;
  12. 48 pkt = p = (uchar *)(NetTxPacket + NetEthHdrSize() + IP_UDP_HDR_SIZE);
  13. 49
  14. 50 /* Prepare DNS packet header */
  15. 51 header = (struct header *) pkt;
  16. 52 header->tid = 1;
  17. 53 header->flags = htons(0x100); /* standard query */
  18. 54 header->nqueries = htons(1); /* Just one query */
  19. 55 header->nanswers = 0;
  20. 56 header->nauth = 0;
  21. 57 header->nother = 0;
  22. 58
  23. 59 /* Encode DNS name */
  24. 60 name_len = strlen( name );
  25. 61 p = (uchar *) &header->data; /* For encoding host name   into packet */
  26. 62
  27. 63 do {
  28. 64 s = strchr( name , '.' );
  29. 65 if (!s)
  30. 66 s = name + name_len;
  31. 67
  32. 68 n = s - name ; /* Chunk length */
  33. 69 *p++ = n; /* Copy length */
  34. 70 memcpy(p, name , n); /* Copy chunk */
  35. 71 p += n;
  36. 72
  37. 73 if (*s == '.' )
  38. 74 n++;
  39. 75
  40. 76 name += n;
  41. 77 name_len -= n;
  42. 78 } while (*s != '\0' );
  43. 79
  44. 80 *p++ = 0; /* Mark end   of host name */
  45. 81 *p++ = 0; /* Some servers require double   null */
  46. 82 *p++ = (unsigned char ) qtype; /* Query Type */
  47. 83
  48. 84 *p++ = 0;
  49. 85 *p++ = 1; /* Class: inet, 0x0001 */
  50. 86
  51. 87 n = p - pkt; /* Total packet length */
  52. 88 debug( "Packet size %d\n" , n);
  53. 89
  54. 90 DnsOurPort = random_port();
  55. 91
  56. 92 NetSendUDPPacket(NetServerEther, NetOurDNSIP, DNS_SERVICE_PORT,
  57. 93 DnsOurPort, n);
  58. 94 debug( "DNS packet sent\n" );
  59. 95 }

Lines 51-57 fill the DNS protocol header according to the DNS protocol. The first address of the data frame is NetTxPacket. Here, the pointers pkt and p are used to fill the DNS data frame. Lines 60-85 fill the host name to be parsed into the data packet according to the protocol format requirements. Line 87 calculates the length of the data packet. Line 90 generates a random port number. Lines 92-93 call the UDP protocol sending function NetSendUDPPacket(). The parameters are: Ethernet header information, DNS server IP address, DNS server port number, our DNS service port number, and data packet length.

  1. 688 int NetSendUDPPacket(uchar *ether, IPaddr_t dest, int dport, int sport,
  2. 689 int payload_len)
  3. 690 {
  4. 691 uchar *pkt;
  5. 692 int eth_hdr_size;
  6. 693 int pkt_hdr_size;
  7. 694
  8. 695 /* make sure the NetTxPacket is initialized (NetInit() was called) */
  9. 696 assert(NetTxPacket != NULL );
  10. 697 if (NetTxPacket == NULL )
  11. 698 return -1;
  12. 699
  13. 700 /* convert   to new style broadcast */
  14. 701 if (dest == 0)
  15. 702 dest = 0xFFFFFFFF;
  16. 703
  17. 704 /* if broadcast, make the ether address a broadcast and don't do ARP */
  18. 705 if (dest == 0xFFFFFFFF)
  19. 706 ether = NetBcastAddr;
  20. 707
  21. 708 pkt = (uchar *)NetTxPacket;
  22. 709
  23. 710 eth_hdr_size = NetSetEther(pkt, ether, PROT_IP);
  24. 711 pkt += eth_hdr_size;
  25. 712 net_set_udp_header(pkt, dest, dport, sport, payload_len);
  26. 713 pkt_hdr_size = eth_hdr_size + IP_UDP_HDR_SIZE;
  27. 714
  28. 715 /* if MAC address was not discovered yet, do an ARP request */
  29. 716 if (memcmp(ether, NetEtherNullAddr, 6) == 0) {
  30. 717 debug_cond(DEBUG_DEV_PKT, "sending ARP for %pI4\n" , &dest);
  31. 718
  32. 719 /* save the ip and eth addr for the packet to send after arp */
  33. 720 NetArpWaitPacketIP = dest;
  34. 721 NetArpWaitPacketMAC = ether;
  35. 722
  36. 723 /* size   of the waiting packet */
  37. 724 NetArpWaitTxPacketSize = pkt_hdr_size + payload_len;
  38. 725
  39. 726 /* and do the ARP request */
  40. 727 NetArpWaitTry = 1;
  41. 728 NetArpWaitTimerStart = get_timer(0);
  42. 729 ArpRequest();
  43. 730 return 1; /* waiting */
  44. 731 } else {
  45. 732 debug_cond(DEBUG_DEV_PKT, "sending UDP to %pI4/%pM\n" ,
  46. 733 &dest, ether);
  47. 734 NetSendPacket(NetTxPacket, pkt_hdr_size + payload_len);
  48. 735 return 0; /* transmitted */
  49. 736 }
  50. 737 }

Lines 696-706 check parameters Line 710 sets the Ethernet header Line 713 sets the UDP protocol header Lines 716-730 If there is no destination MAC address, an ARP request must be sent first Line 734 calls the function NetSendPacket(), the parameters are: the first address of the data frame to be sent, the length of the data packet

  1. 529 /* Transmit a packet */
  2. 530 static inline void NetSendPacket(uchar *pkt, int len)
  3. 531 {
  4. 532 (void) eth_send(pkt, len);
  5. 533 }

Line 532 calls the function dm9000_send() that we registered. This function has been analyzed. According to the flowchart, we return to the function NetLoop().

Lines 461-562 loop to receive network packets. Line 470 calls the network card driver receiving function eth_rx()

  1. int eth_rx(void)
  2. {
  3. if (!eth_current)
  4. return -1;
  5.  
  6. return eth_current->recv(eth_current);
  7. }

The eth_current->recv(eth_current) function is the receiving function dm9000_rx() of the network card we registered. We have analyzed this function in the previous chapter. Finally, the data frame is uploaded to the protocol stack by calling the function NetReceive().

  1. 943 void
  2. 944 NetReceive(uchar *inpkt, int len)
  3. 945 {
  4. 946 struct ethernet_hdr *et;
  5. 947 struct ip_udp_hdr *ip;
  6. 948 IPaddr_t dst_ip;
  7. 949 IPaddr_t src_ip;
  8. 950 int eth_proto;
  9. 957
  10. 958 NetRxPacket = inpkt;
  11. 959 NetRxPacketLen = len;
  12. 960 et = (struct ethernet_hdr *)inpkt;
  13. 961
  14. 962 /* too small packet? */
  15. 963 if (len < ETHER_HDR_SIZE)
  16. 964 return ;
  17. 965
  18. 984
  19. 985 eth_proto = ntohs(et->et_protlen);
  20. 986
  21. 987 if (eth_proto < 1514) {
  22. 988 struct e802_hdr *et802 = (struct e802_hdr *)et;
  23. 997
  24. 998 } else if (eth_proto != PROT_VLAN) { /* normal packet */
  25. 999 ip = (struct ip_udp_hdr *)(inpkt + ETHER_HDR_SIZE);
  26. 1000 len -= ETHER_HDR_SIZE;
  27. 1001
  28. 1002 } else { /* VLAN packet */
  29. 1026 }
  30. 1027
  31. 1045 switch (eth_proto) {
  32. 1056 case PROT_IP:
  33. 1057 debug_cond(DEBUG_NET_PKT, "Got IP\n" );
  34. 1058 /* Before we start poking the header, make sure it is there */
  35. 1059 if (len < IP_UDP_HDR_SIZE) {
  36. 1060 debug( "len bad %d < %lu\n" , len,
  37. 1061 (ulong)IP_UDP_HDR_SIZE);
  38. 1062 return ;
  39. 1063 }
  40. 1064 /* Check the packet length */
  41. 1065 if (len < ntohs(ip->ip_len)) {
  42. 1066 debug( "len bad %d < %d\n" , len, ntohs(ip->ip_len));
  43. 1067 return ;
  44. 1068 }
  45. 1069 len = ntohs(ip->ip_len);
  46. 1070 debug_cond(DEBUG_NET_PKT, "len=%d, v=%02x\n" ,
  47. 1071 len, ip->ip_hl_v & 0xff);
  48. 1072
  49. 1073 /* Can't deal with anything except IPv4 */
  50. 1074 if ((ip->ip_hl_v & 0xf0) != 0x40)
  51. 1075 return ;
  52. 1076 /* Can't deal with IP options (headers != 20 bytes) */
  53. 1077 if ((ip->ip_hl_v & 0x0f) > 0x05)
  54. 1078 return ;
  55. 1079 /* Check the Checksum of the header */
  56. 1080 if (!NetCksumOk((uchar *)ip, IP_HDR_SIZE / 2)) {
  57. 1081 debug( "checksum bad\n" );
  58. 1082 return ;
  59. 1083 }
  60. 1084 /* If it is   not   for us, ignore it */
  61. 1085 dst_ip = NetReadIP(&ip->ip_dst);
  62.  
  63. 1092 /* Read source IP address for later use */
  64. 1093 src_ip = NetReadIP(&ip->ip_src);
  65.  
  66.  
  67. 1184 /*
  68. 1185 * IP header OK. Pass the packet to the current handler.
  69. 1186 */
  70. 1187 (*udp_packet_handler)((uchar *)ip + IP_UDP_HDR_SIZE,
  71. 1188ntohs(ip->udp_dst),
  72. 1189 src_ip,
  73. 1190ntohs(ip->udp_src),
  74. 1191 ntohs(ip->udp_len) - UDP_HDR_SIZE);
  75. 1192 break;
  76. 1193 }
  77. 1194 }

Parameter inpkt: points to the received Ethernet packet header len: the length of the received packet Line 960 Variable NetRxPacket points to the received data header, the Ethernet packet header locates the Ethernet protocol header Line 985 Extract the protocol field from the Ethernet protocol header, which indicates whether the following is the IP protocol Line 999 Parse the IP protocol header Line 1045 Perform switch operation according to the Ethernet header protocol Lines 1059~1083 Check the legitimacy of the protocol header Line 1085 Read the destination IP address Line 1093 Read the source IP address, Line 1187 IP protocol header parsed successfully, call the udp protocol callback function udp_packet_handler(), which registered DnsHandler in the previous DnStart()

  1. 104 static void
  2. 105 DnsHandler(uchar *pkt, unsigned dest, IPaddr_t sip, unsigned src, unsigned len)
  3. 106 {
  4. 193
  5. 194 net_set_state(NETLOOP_SUCCESS);
  6. 195 }

This function is used to parse the DNS protocol. We will not explain it in detail here. After the successful parsing, line 194 sets the current execution state to NETLOOP_SUCCESS. The code returns to the function NetLoop(). Lines 470 and 475 determine whether the ctrl+c shortcut key is pressed and perform operations. Lines 522 to 562 process the execution results and include them in the statistical information. Line 564 If net_state is NETLOOP_SUCCESS or NETLOOP_FAIL, it will eventually enter done, thereby emptying the udp callback function. If net_state is NETLOOP_CONTINUE, it indicates that there are still subsequent data packets to be received, then it returns to line 461 and continues to receive the next data packet.

At this point, the analysis of the DNS protocol processing flow is completed. You can analyze the processing flows of several other protocols based on this flow.

Common problems

Sometimes the DM9000A ID can be read. Continuous operation can read the DM9000A ID, but after a while the operation cannot read the DM9000A ID. Through debugging, add a delay operation in the dm9000_reset function, and the DM9000A ID can be read normally.

  1. 277 do {
  2. 278 DM9000_DBG( "resetting the DM9000, 2nd reset\n" );
  3. 279 udelay(25); /* Wait at least 20 us */
  4. 280 } while (DM9000_ior(DM9000_NCR) & 1);
  5. 281 udelay(150);
  6. 282 /* Check whether the ethernet controller is present */
  7. 283 if ((DM9000_ior(DM9000_PIDL) != 0x0) ||
  8. 284 (DM9000_ior(DM9000_PIDH) != 0x90))
  9. 285 printf( "ERROR: resetting DM9000 -> not responding\n" );

<<:  I recommend 6 computer treasure softwares, which are practical and powerful, and turn your computer into black technology in seconds

>>:  Lenovo Nettop and GDS have reached a strategic cooperation to inject strong momentum into the development of the digital economy era

Recommend

Huawei fully supports Chinese operators in building China's 5G

This morning, the Ministry of Industry and Inform...

Why does WiFi 7 depend on the 6GHz band?

Over the past 20 years, as the most commonly used...

How big is the bandwidth of 1M cloud server? It is enough for 90% of websites

1M, as the lowest bandwidth configuration of clou...

Is 2021 really the first year of 5G toB?

"Do you still believe in the light?" Th...

Will enterprises have dedicated 5G networks in the future?

5G networks bring many benefits to smartphone use...

China Mobile: All new mobile terminals must support 700MHz from October 1

At the launch ceremony of China Mobile's 2021...

A survival guide for communications professionals

The situation in 2022 is more serious than expect...