[PATCH v4 10/14] net-lwip: add wget command

Jon Humphreys jhumphreysti at gmail.com
Tue Jun 25 05:20:02 CEST 2024


Jerome Forissier <jerome.forissier at linaro.org> writes:

> On 6/24/24 08:21, Jon Humphreys wrote:
>> Jerome Forissier <jerome.forissier at linaro.org> writes:
>> 
>>> Add support for the wget command with NET_LWIP.
>>>
>>> Based on code initially developed by Maxim U.
>>>
>>> Signed-off-by: Jerome Forissier <jerome.forissier at linaro.org>
>>> Co-developed-by: Maxim Uvarov <muvarov at gmail.com>
>>> Cc: Maxim Uvarov <muvarov at gmail.com>
>>> Signed-off-by: Jerome Forissier <jerome.forissier at linaro.org>
>>> ---
>>>  cmd/Kconfig        |   7 ++
>>>  cmd/net-lwip.c     |   8 ++
>>>  include/net-lwip.h |  18 +++
>>>  net-lwip/Makefile  |   1 +
>>>  net-lwip/wget.c    | 269 +++++++++++++++++++++++++++++++++++++++++++++
>>>  5 files changed, 303 insertions(+)
>>>  create mode 100644 net-lwip/wget.c
>>>
>>> diff --git a/cmd/Kconfig b/cmd/Kconfig
>>> index 6ef0b52cd34..d9a86540be6 100644
>>> --- a/cmd/Kconfig
>>> +++ b/cmd/Kconfig
>>> @@ -2117,6 +2117,13 @@ config CMD_TFTPBOOT
>>>  	help
>>>  	  tftpboot - load file via network using TFTP protocol
>>>  
>>> +config CMD_WGET
>>> +	bool "wget"
>>> +	select PROT_TCP_LWIP
>>> +	help
>>> +	  wget is a simple command to download kernel, or other files,
>>> +	  from a http server over TCP.
>>> +
>>>  endif
>>>  
>>>  endif
>>> diff --git a/cmd/net-lwip.c b/cmd/net-lwip.c
>>> index c021da6a674..42f8bd6b259 100644
>>> --- a/cmd/net-lwip.c
>>> +++ b/cmd/net-lwip.c
>>> @@ -35,3 +35,11 @@ U_BOOT_CMD(
>>>  	"hostname [envvar]"
>>>  );
>>>  #endif
>>> +
>>> +#if defined(CONFIG_CMD_WGET)
>>> +U_BOOT_CMD(
>>> +	wget,   3,      1,      do_wget,
>>> +	"boot image via network using HTTP protocol",
>>> +	"[loadAddress] URL"
>>> +);
>>> +#endif
>>> diff --git a/include/net-lwip.h b/include/net-lwip.h
>>> index 4d41b0208a3..ddf25e61417 100644
>>> --- a/include/net-lwip.h
>>> +++ b/include/net-lwip.h
>>> @@ -11,8 +11,26 @@ struct netif *net_lwip_new_netif_noip(void);
>>>  void net_lwip_remove_netif(struct netif *netif);
>>>  struct netif *net_lwip_get_netif(void);
>>>  
>>> +/**
>>> + * wget_with_dns() - runs dns host IP address resulution before wget
>>> + *
>>> + * @dst_addr:	destination address to download the file
>>> + * @uri:	uri string of target file of wget
>>> + * Return:	downloaded file size, negative if failed
>>> + */
>>> +
>>> +int wget_with_dns(ulong dst_addr, char *uri);
>>> +/**
>>> + * wget_validate_uri() - varidate the uri
>>> + *
>>> + * @uri:	uri string of target file of wget
>>> + * Return:	true if uri is valid, false if uri is invalid
>>> + */
>>> +bool wget_validate_uri(char *uri);
>>> +
>>>  int do_dhcp(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[]);
>>>  int do_dns(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[]);
>>>  int do_ping(struct cmd_tbl *cmdtp, int flag, int argc, char *const argv[]);
>>> +int do_wget(struct cmd_tbl *cmdtp, int flag, int argc, char * const argv[]);
>>>  
>>>  #endif /* __NET_LWIP_H__ */
>>> diff --git a/net-lwip/Makefile b/net-lwip/Makefile
>>> index aa247859483..bc011bb0e32 100644
>>> --- a/net-lwip/Makefile
>>> +++ b/net-lwip/Makefile
>>> @@ -10,6 +10,7 @@ obj-$(CONFIG_CMD_DHCP) += dhcp.o
>>>  obj-$(CONFIG_CMD_DNS) += dns.o
>>>  obj-$(CONFIG_CMD_PING) += ping.o
>>>  obj-$(CONFIG_CMD_TFTPBOOT) += tftp.o
>>> +obj-$(CONFIG_CMD_WGET) += wget.o
>>>  
>>>  # Disable this warning as it is triggered by:
>>>  # sprintf(buf, index ? "foo%d" : "foo", index)
>>> diff --git a/net-lwip/wget.c b/net-lwip/wget.c
>>> new file mode 100644
>>> index 00000000000..069299bd469
>>> --- /dev/null
>>> +++ b/net-lwip/wget.c
>>> @@ -0,0 +1,269 @@
>>> +// SPDX-License-Identifier: GPL-2.0+
>>> +/* Copyright (C) 2024 Linaro Ltd. */
>>> +
>>> +#include <command.h>
>>> +#include <console.h>
>>> +#include <display_options.h>
>>> +#include <image.h>
>>> +#include <lwip/apps/http_client.h>
>>> +#include <lwip/timeouts.h>
>>> +#include <net.h>
>>> +#include <time.h>
>>> +
>>> +#define SERVER_NAME_SIZE 200
>>> +#define HTTP_PORT_DEFAULT 80
>>> +#define PROGRESS_PRINT_STEP_BYTES (100 * 1024)
>>> +
>>> +enum done_state {
>>> +        NOT_DONE = 0,
>>> +        SUCCESS = 1,
>>> +        FAILURE = 2
>>> +};
>>> +
>>> +struct wget_ctx {
>>> +	ulong daddr;
>>> +	ulong saved_daddr;
>>> +	ulong size;
>>> +	ulong prevsize;
>>> +	ulong start_time;
>>> +	enum done_state done;
>>> +};
>>> +
>>> +static int parse_url(char *url, char *host, u16 *port, char **path)
>>> +{
>>> +	char *p, *pp;
>>> +	long lport;
>>> +
>>> +	p = strstr(url, "http://");
>>> +	if (!p)
>>> +		return -EINVAL;
>>> +
>>> +	p += strlen("http://");
>>> +
>>> +	/* Parse hostname */
>>> +	pp = strchr(p, ':');
>>> +	if (!pp)
>>> +		pp = strchr(p, '/');
>>> +	if (!pp)
>>> +		return -EINVAL;
>>> +
>>> +	if (p + SERVER_NAME_SIZE <= pp)
>>> +		return -EINVAL;
>>> +
>>> +	memcpy(host, p, pp - p);
>>> +	host[pp - p + 1] = '\0';
>>> +
>>> +	if (*pp == ':') {
>>> +		/* Parse port number */
>>> +		p = pp + 1;
>>> +		lport = simple_strtol(p, &pp, 10);
>>> +		if (pp && *pp != '/')
>>> +			return -EINVAL;
>>> +		if (lport > 65535)
>>> +			return -EINVAL;
>>> +		*port = (u16)lport;
>>> +	} else {
>>> +		*port = HTTP_PORT_DEFAULT;
>>> +	}
>>> +	if (*pp != '/')
>>> +		return -EINVAL;
>>> +	*path = pp;
>>> +
>>> +	return 0;
>>> +}
>>> +
>>> +static err_t httpc_recv_cb(void *arg, struct altcp_pcb *pcb, struct pbuf *pbuf,
>>> +			   err_t err)
>>> +{
>>> +	struct wget_ctx *ctx = arg;
>>> +	struct pbuf *buf;
>>> +
>>> +	if (!pbuf)
>>> +		return ERR_BUF;
>>> +
>>> +	for (buf = pbuf; buf; buf = buf->next) {
>>> +		memcpy((void *)ctx->daddr, buf->payload, buf->len);
>>> +		ctx->daddr += buf->len;
>>> +		ctx->size += buf->len;
>>> +		if (ctx->size - ctx->prevsize > PROGRESS_PRINT_STEP_BYTES) {
>>> +			printf("#");
>>> +			ctx->prevsize = ctx->size;
>>> +		}
>>> +	}
>>> +
>>> +	altcp_recved(pcb, pbuf->tot_len);
>>> +	pbuf_free(pbuf);
>>> +	return ERR_OK;
>>> +}
>>> +
>>> +static void httpc_result_cb(void *arg, httpc_result_t httpc_result,
>>> +			    u32_t rx_content_len, u32_t srv_res, err_t err)
>>> +{
>>> +	struct wget_ctx *ctx = arg;
>>> +	ulong elapsed;
>>> +
>>> +	if (httpc_result != HTTPC_RESULT_OK) {
>>> +		log_err("\nHTTP client error %d\n", httpc_result);
>>> +		ctx->done = FAILURE;
>>> +		return;
>>> +	}
>>> +
>>> +	elapsed = get_timer(ctx->start_time);
>>> +	if (rx_content_len > PROGRESS_PRINT_STEP_BYTES)
>>> +		printf("\n");
>>> +        printf("%u bytes transferred in %lu ms (", rx_content_len,
>>> +	       get_timer(ctx->start_time));
>>> +        print_size(rx_content_len / elapsed * 1000, "/s)\n");
>>> +
>>> +	if (env_set_hex("filesize", rx_content_len) ||
>>> +	    env_set_hex("fileaddr", ctx->saved_daddr)) {
>>> +		log_err("Could not set filesize or fileaddr\n");
>>> +		ctx->done = FAILURE;
>>> +		return;
>>> +	}
>>> +
>>> +	ctx->done = SUCCESS;
>>> +}
>>> +
>>> +int wget_with_dns(ulong dst_addr, char *uri)
>>> +{
>>> +	char server_name[SERVER_NAME_SIZE];
>>> +	httpc_connection_t conn;
>>> +	httpc_state_t *state;
>>> +	struct netif *netif;
>>> +	struct wget_ctx ctx;
>>> +	char *path;
>>> +	u16 port;
>>> +
>>> +	ctx.daddr = dst_addr;
>>> +	ctx.saved_daddr = dst_addr;
>>> +	ctx.done = NOT_DONE;
>>> +	ctx.size = 0;
>>> +	ctx.prevsize = 0;
>>> +
>>> +	if (parse_url(uri, server_name, &port, &path))
>>> +		return CMD_RET_USAGE;
>>> +
>>> +	netif = net_lwip_new_netif();
>>> +	if (!netif)
>>> +		return -1;
>>> +
>>> +	memset(&conn, 0, sizeof(conn));
>>> +	conn.result_fn = httpc_result_cb;
>>> +	ctx.start_time = get_timer(0);
>>> +	if (httpc_get_file_dns(server_name, port, path, &conn, httpc_recv_cb,
>>> +			       &ctx, &state)) {
>>> +		net_lwip_remove_netif(netif);
>>> +		return CMD_RET_FAILURE;
>>> +	}
>>> +
>>> +	while (!ctx.done) {
>>> +		eth_rx();
>>> +		sys_check_timeouts();
>>> +		if (ctrlc())
>>> +			break;
>>> +	}
>>> +
>>> +	net_lwip_remove_netif(netif);
>>> +
>>> +	if (ctx.done == SUCCESS)
>>> +		return 0;
>>> +
>>> +	return -1;
>>> +}
>>> +
>>> +int do_wget(struct cmd_tbl *cmdtp, int flag, int argc, char * const argv[])
>>> +{
>>> +	char *end;
>>> +	char *url;
>>> +	ulong dst_addr;
>>> +
>>> +	if (argc < 2 || argc > 3)
>>> +		return CMD_RET_USAGE;
>>> +
>>> +	dst_addr = hextoul(argv[1], &end);
>>> +        if (end == (argv[1] + strlen(argv[1]))) {
>>> +		if (argc < 3)
>>> +			return CMD_RET_USAGE;
>>> +		url = argv[2];
>>> +	} else {
>>> +		dst_addr = image_load_addr;
>>> +		url = argv[1];
>>> +	}
>>> +
>>> +	if (wget_with_dns(dst_addr, url))
>>> +		return CMD_RET_FAILURE;
>>> +
>>> +	return CMD_RET_SUCCESS;
>>> +}
>>> +
>>> +/**
>>> + * wget_validate_uri() - validate the uri for wget
>>> + *
>>> + * @uri:	uri string
>>> + *
>>> + * This function follows the current U-Boot wget implementation.
>>> + * scheme: only "http:" is supported
>>> + * authority:
>>> + *   - user information: not supported
>>> + *   - host: supported
>>> + *   - port: not supported(always use the default port)
>>> + *
>>> + * Uri is expected to be correctly percent encoded.
>>> + * This is the minimum check, control codes(0x1-0x19, 0x7F, except '\0')
>>> + * and space character(0x20) are not allowed.
>>> + *
>>> + * TODO: stricter uri conformance check
>>> + *
>>> + * Return:	true on success, false on failure
>>> + */
>>> +bool wget_validate_uri(char *uri)
>>> +{
>>> +	char c;
>>> +	bool ret = true;
>>> +	char *str_copy, *s, *authority;
>>> +
>>> +	for (c = 0x1; c < 0x21; c++) {
>>> +		if (strchr(uri, c)) {
>>> +			log_err("invalid character is used\n");
>>> +			return false;
>>> +		}
>>> +	}
>>> +	if (strchr(uri, 0x7f)) {
>>> +		log_err("invalid character is used\n");
>>> +		return false;
>>> +	}
>>> +
>>> +	if (strncmp(uri, "http://", 7)) {
>>> +		log_err("only http:// is supported\n");
>>> +		return false;
>>> +	}
>>> +	str_copy = strdup(uri);
>>> +	if (!str_copy)
>>> +		return false;
>>> +
>>> +	s = str_copy + strlen("http://");
>>> +	authority = strsep(&s, "/");
>>> +	if (!s) {
>>> +		log_err("invalid uri, no file path\n");
>>> +		ret = false;
>>> +		goto out;
>>> +	}
>>> +	s = strchr(authority, '@');
>>> +	if (s) {
>>> +		log_err("user information is not supported\n");
>>> +		ret = false;
>>> +		goto out;
>>> +	}
>>> +	s = strchr(authority, ':');
>>> +	if (s) {
>>> +		log_err("user defined port is not supported\n");
>>> +		ret = false;
>>> +		goto out;
>>> +	}
>>> +
>>> +out:
>>> +	free(str_copy);
>>> +
>>> +	return ret;
>>> +}
>>> -- 
>>> 2.40.1
>
> Hi Jon,
>
>> Hi Jerome, I am trying out the lwIP stack on TI boards.
>> 
>> For wget, I noticed a bug and a user experience improvement. The bug is an
>> off-by-one array access when parsing the url.
>
> Indeed, someone reported this bug to me off-list and it's already fixed in
> my WIP branch.
>
>> The improvement emits a
>> message if the url isn't an http://, since that is all we are supporting,
>> and without the message, the wget command silently fails, which is
>> confusing to the user.
>
> I agree.
>
>> I will post the 2 patches as a reply to this email. LMK if you want to use
>> another method to collaborate. I can already see that efi http boot support
>> will not work. wget_validate_uri() looks to be copied vertabim from the
>> current implementation, and IMO we should completely remove it.
>
> It is indeed copied. It is needed to avoid an unresolved symbol but I
> understand more work may be needed for EFI HTTP boot support (not tested by
> me).
>
> If you are willing to help with this then you are welcome to post patches as
> replies and I will integrate them in the series.
>
> Thanks,
> -- 
> Jerome

Jerome, here is a patch to allow a port specifier in wget's uri, which lwIP
supports.

thanks
Jon

Subject: [PATCH] net-lwip: lwIP wget supports user defined port in the uri, so
 allow it.

Signed-off-by: Jonathan Humphreys <j-humphreys at ti.com>
---
 net-lwip/wget.c | 6 ------
 1 file changed, 6 deletions(-)

diff --git a/net-lwip/wget.c b/net-lwip/wget.c
index 6b9c953ef51..d3fdd44a29e 100644
--- a/net-lwip/wget.c
+++ b/net-lwip/wget.c
@@ -257,12 +257,6 @@ bool wget_validate_uri(char *uri)
 		ret = false;
 		goto out;
 	}
-	s = strchr(authority, ':');
-	if (s) {
-		log_err("user defined port is not supported\n");
-		ret = false;
-		goto out;
-	}
 
 out:
 	free(str_copy);
-- 
2.34.1


More information about the U-Boot mailing list