1*49338274Sfgsch /* $OpenBSD: nfs_boot.c,v 1.29 2013/09/20 23:51:44 fgsch Exp $ */ 209d901c0Sderaadt /* $NetBSD: nfs_boot.c,v 1.26 1996/05/07 02:51:25 thorpej Exp $ */ 3df930be7Sderaadt 4df930be7Sderaadt /* 5df930be7Sderaadt * Copyright (c) 1995 Adam Glass, Gordon Ross 6df930be7Sderaadt * All rights reserved. 7df930be7Sderaadt * 8df930be7Sderaadt * Redistribution and use in source and binary forms, with or without 9df930be7Sderaadt * modification, are permitted provided that the following conditions 10df930be7Sderaadt * are met: 11df930be7Sderaadt * 1. Redistributions of source code must retain the above copyright 12df930be7Sderaadt * notice, this list of conditions and the following disclaimer. 13df930be7Sderaadt * 2. Redistributions in binary form must reproduce the above copyright 14df930be7Sderaadt * notice, this list of conditions and the following disclaimer in the 15df930be7Sderaadt * documentation and/or other materials provided with the distribution. 16df930be7Sderaadt * 3. The name of the authors may not be used to endorse or promote products 17df930be7Sderaadt * derived from this software without specific prior written permission. 18df930be7Sderaadt * 19df930be7Sderaadt * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR 20df930be7Sderaadt * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 21df930be7Sderaadt * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 22df930be7Sderaadt * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, 23df930be7Sderaadt * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 24df930be7Sderaadt * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 25df930be7Sderaadt * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 26df930be7Sderaadt * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 27df930be7Sderaadt * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 28df930be7Sderaadt * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29df930be7Sderaadt */ 30df930be7Sderaadt 31df930be7Sderaadt #include <sys/param.h> 32df930be7Sderaadt #include <sys/systm.h> 33df930be7Sderaadt #include <sys/kernel.h> 34df930be7Sderaadt #include <sys/conf.h> 35df930be7Sderaadt #include <sys/ioctl.h> 36df930be7Sderaadt #include <sys/proc.h> 37df930be7Sderaadt #include <sys/mount.h> 38df930be7Sderaadt #include <sys/mbuf.h> 39df930be7Sderaadt #include <sys/reboot.h> 40df930be7Sderaadt #include <sys/socket.h> 41df930be7Sderaadt #include <sys/socketvar.h> 42d8c62b08Sblambert #include <sys/queue.h> 43df930be7Sderaadt 44df930be7Sderaadt #include <net/if.h> 45df930be7Sderaadt #include <net/route.h> 46df930be7Sderaadt 47df930be7Sderaadt #include <netinet/in.h> 484b69f2cbSmpi #include <netinet/in_var.h> 49df930be7Sderaadt #include <netinet/if_ether.h> 50df930be7Sderaadt 51df930be7Sderaadt #include <nfs/rpcv2.h> 5278530d46Smickey #include <nfs/nfsproto.h> 53df930be7Sderaadt #include <nfs/nfs.h> 54df930be7Sderaadt #include <nfs/nfsdiskless.h> 55df930be7Sderaadt #include <nfs/krpc.h> 56df930be7Sderaadt #include <nfs/xdr_subs.h> 57370decb4Sniklas #include <nfs/nfs_var.h> 58df930be7Sderaadt 59ddde6caeSderaadt #include "ether.h" 60df930be7Sderaadt 61ddde6caeSderaadt #if !defined(NFSCLIENT) || (NETHER == 0 && NFDDI == 0) 62ddde6caeSderaadt 63ddde6caeSderaadt int 64906a9d53Sjsg nfs_boot_init(struct nfs_diskless *nd, struct proc *procp) 65df930be7Sderaadt { 66a0bbd24dSbriggs panic("nfs_boot_init: NFSCLIENT not enabled in kernel"); 67df930be7Sderaadt } 68df930be7Sderaadt 69a28bd3cfSmickey int 70906a9d53Sjsg nfs_boot_getfh(struct sockaddr_in *bpsin, char *key, 71906a9d53Sjsg struct nfs_dlmount *ndmntp, int retries) 7278530d46Smickey { 7378530d46Smickey /* can not get here */ 74a28bd3cfSmickey return (EOPNOTSUPP); 7578530d46Smickey } 7678530d46Smickey 77ddde6caeSderaadt #else 78df930be7Sderaadt 79df930be7Sderaadt /* 80df930be7Sderaadt * Support for NFS diskless booting, specifically getting information 81df930be7Sderaadt * about where to boot from, what pathnames, etc. 82df930be7Sderaadt * 830eb08f42Spedro * This implementation uses RARP and the bootparam RPC. 84df930be7Sderaadt * We are forced to implement RPC anyway (to get file handles) 85df930be7Sderaadt * so we might as well take advantage of it for bootparam too. 86df930be7Sderaadt * 87df930be7Sderaadt * The diskless boot sequence goes as follows: 88df930be7Sderaadt * (1) Use RARP to get our interface address 89df930be7Sderaadt * (2) Use RPC/bootparam/whoami to get our hostname, 90df930be7Sderaadt * our IP address, and the server's IP address. 91df930be7Sderaadt * (3) Use RPC/bootparam/getfile to get the root path 92df930be7Sderaadt * (4) Use RPC/mountd to get the root file handle 93df930be7Sderaadt * (5) Use RPC/bootparam/getfile to get the swap path 94df930be7Sderaadt * (6) Use RPC/mountd to get the swap file handle 95df930be7Sderaadt * 96df930be7Sderaadt * (This happens to be the way Sun does it too.) 97df930be7Sderaadt */ 98df930be7Sderaadt 99df930be7Sderaadt /* bootparam RPC */ 100c4071fd1Smillert static int bp_whoami(struct sockaddr_in *bpsin, 101c4071fd1Smillert struct in_addr *my_ip, struct in_addr *gw_ip); 102c4071fd1Smillert static int bp_getfile(struct sockaddr_in *bpsin, char *key, 103c4071fd1Smillert struct sockaddr_in *mdsin, char *servname, char *path, int retries); 104df930be7Sderaadt 105df930be7Sderaadt /* mountd RPC */ 106c4071fd1Smillert static int md_mount(struct sockaddr_in *mdsin, char *path, 107*49338274Sfgsch struct nfs_args *argp); 108df930be7Sderaadt 109df930be7Sderaadt char *nfsbootdevname; 110df930be7Sderaadt 111df930be7Sderaadt /* 112df930be7Sderaadt * Called with an empty nfs_diskless struct to be filled in. 113df930be7Sderaadt */ 114df930be7Sderaadt int 115906a9d53Sjsg nfs_boot_init(struct nfs_diskless *nd, struct proc *procp) 116df930be7Sderaadt { 117df930be7Sderaadt struct ifreq ireq; 1184b69f2cbSmpi struct in_aliasreq ifra; 119df930be7Sderaadt struct in_addr my_ip, gw_ip; 120df930be7Sderaadt struct sockaddr_in bp_sin; 121df930be7Sderaadt struct sockaddr_in *sin; 122df930be7Sderaadt struct ifnet *ifp; 123df930be7Sderaadt struct socket *so; 124df930be7Sderaadt int error; 125df930be7Sderaadt 126df930be7Sderaadt /* 127df930be7Sderaadt * Find an interface, rarp for its ip address, stuff it, the 128df930be7Sderaadt * implied broadcast addr, and netmask into a nfs_diskless struct. 129df930be7Sderaadt * 130df930be7Sderaadt * This was moved here from nfs_vfsops.c because this procedure 131df930be7Sderaadt * would be quite different if someone decides to write (i.e.) a 132df930be7Sderaadt * BOOTP version of this file (might not use RARP, etc.) 133df930be7Sderaadt */ 134df930be7Sderaadt 135df930be7Sderaadt /* 136df930be7Sderaadt * Find a network interface. 137df930be7Sderaadt */ 138df930be7Sderaadt if (nfsbootdevname) 139df930be7Sderaadt ifp = ifunit(nfsbootdevname); 14004b702e4Sericj else { 141d8c62b08Sblambert TAILQ_FOREACH(ifp, &ifnet, if_list) { 142df930be7Sderaadt if ((ifp->if_flags & 143df930be7Sderaadt (IFF_LOOPBACK|IFF_POINTOPOINT)) == 0) 144df930be7Sderaadt break; 14504b702e4Sericj } 14604b702e4Sericj } 147df930be7Sderaadt if (ifp == NULL) 148df930be7Sderaadt panic("nfs_boot: no suitable interface"); 14909d901c0Sderaadt bcopy(ifp->if_xname, ireq.ifr_name, IFNAMSIZ); 150f72c60a5Sderaadt printf("nfs_boot: using interface %s, with revarp & bootparams\n", 151f72c60a5Sderaadt ireq.ifr_name); 152df930be7Sderaadt 153df930be7Sderaadt /* 154df930be7Sderaadt * Bring up the interface. 155df930be7Sderaadt * 156df930be7Sderaadt * Get the old interface flags and or IFF_UP into them; if 157df930be7Sderaadt * IFF_UP set blindly, interface selection can be clobbered. 158df930be7Sderaadt */ 159df930be7Sderaadt if ((error = socreate(AF_INET, &so, SOCK_DGRAM, 0)) != 0) 160df930be7Sderaadt panic("nfs_boot: socreate, error=%d", error); 161df930be7Sderaadt error = ifioctl(so, SIOCGIFFLAGS, (caddr_t)&ireq, procp); 162df930be7Sderaadt if (error) 163df930be7Sderaadt panic("nfs_boot: GIFFLAGS, error=%d", error); 164df930be7Sderaadt ireq.ifr_flags |= IFF_UP; 165df930be7Sderaadt error = ifioctl(so, SIOCSIFFLAGS, (caddr_t)&ireq, procp); 166df930be7Sderaadt if (error) 167df930be7Sderaadt panic("nfs_boot: SIFFLAGS, error=%d", error); 168df930be7Sderaadt 169df930be7Sderaadt /* 170df930be7Sderaadt * Do RARP for the interface address. 171df930be7Sderaadt */ 172df930be7Sderaadt if ((error = revarpwhoami(&my_ip, ifp)) != 0) 17339529570Sderaadt panic("reverse arp not answered by rarpd(8) or dhcpd(8)"); 17440777900Sderaadt printf("nfs_boot: client_addr=%s\n", inet_ntoa(my_ip)); 175df930be7Sderaadt 176df930be7Sderaadt /* 177df930be7Sderaadt * Do enough of ifconfig(8) so that the chosen interface 178df930be7Sderaadt * can talk to the servers. (just set the address) 179df930be7Sderaadt */ 1804b69f2cbSmpi bzero(&ifra, sizeof(ifra)); 1814b69f2cbSmpi bcopy(ifp->if_xname, ifra.ifra_name, sizeof(ifra.ifra_name)); 1824b69f2cbSmpi 1834b69f2cbSmpi sin = (struct sockaddr_in *)&ifra.ifra_addr; 184df930be7Sderaadt sin->sin_len = sizeof(*sin); 185df930be7Sderaadt sin->sin_family = AF_INET; 186df930be7Sderaadt sin->sin_addr.s_addr = my_ip.s_addr; 1874b69f2cbSmpi error = ifioctl(so, SIOCAIFADDR, (caddr_t)&ifra, procp); 188df930be7Sderaadt if (error) 189df930be7Sderaadt panic("nfs_boot: set if addr, error=%d", error); 190df930be7Sderaadt 191df930be7Sderaadt soclose(so); 192df930be7Sderaadt 193df930be7Sderaadt /* 194df930be7Sderaadt * Get client name and gateway address. 195df930be7Sderaadt * RPC: bootparam/whoami 196df930be7Sderaadt * Use the old broadcast address for the WHOAMI 197df930be7Sderaadt * call because we do not yet know our netmask. 198df930be7Sderaadt * The server address returned by the WHOAMI call 19998b25bc4Sderaadt * is used for all subsequent bootparam RPCs. 200df930be7Sderaadt */ 201df930be7Sderaadt bzero((caddr_t)&bp_sin, sizeof(bp_sin)); 202df930be7Sderaadt bp_sin.sin_len = sizeof(bp_sin); 203df930be7Sderaadt bp_sin.sin_family = AF_INET; 204df930be7Sderaadt bp_sin.sin_addr.s_addr = INADDR_BROADCAST; 205df930be7Sderaadt hostnamelen = MAXHOSTNAMELEN; 206df930be7Sderaadt 207df930be7Sderaadt /* this returns gateway IP address */ 208df930be7Sderaadt error = bp_whoami(&bp_sin, &my_ip, &gw_ip); 209df930be7Sderaadt if (error) 210df930be7Sderaadt panic("nfs_boot: bootparam whoami, error=%d", error); 21140777900Sderaadt printf("nfs_boot: server_addr=%s hostname=%s\n", 21240777900Sderaadt inet_ntoa(bp_sin.sin_addr), hostname); 213df930be7Sderaadt 214df930be7Sderaadt #ifdef NFS_BOOT_GATEWAY 215df930be7Sderaadt /* 216df930be7Sderaadt * XXX - This code is conditionally compiled only because 217df930be7Sderaadt * many bootparam servers (in particular, SunOS 4.1.3) 218df930be7Sderaadt * always set the gateway address to their own address. 219df930be7Sderaadt * The bootparam server is not necessarily the gateway. 220df930be7Sderaadt * We could just believe the server, and at worst you would 221df930be7Sderaadt * need to delete the incorrect default route before adding 222df930be7Sderaadt * the correct one, but for simplicity, ignore the gateway. 223df930be7Sderaadt * If your server is OK, you can turn on this option. 224df930be7Sderaadt * 225df930be7Sderaadt * If the gateway address is set, add a default route. 226df930be7Sderaadt * (The mountd RPCs may go across a gateway.) 227df930be7Sderaadt */ 228df930be7Sderaadt if (gw_ip.s_addr) { 229df930be7Sderaadt struct sockaddr dst, gw, mask; 230a5dd9203Sclaudio struct rt_addrinfo info; 231df930be7Sderaadt /* Destination: (default) */ 232df930be7Sderaadt bzero((caddr_t)&dst, sizeof(dst)); 233df930be7Sderaadt dst.sa_len = sizeof(dst); 234df930be7Sderaadt dst.sa_family = AF_INET; 235df930be7Sderaadt /* Gateway: */ 236df930be7Sderaadt bzero((caddr_t)&gw, sizeof(gw)); 237df930be7Sderaadt sin = (struct sockaddr_in *)&gw; 238df930be7Sderaadt sin->sin_len = sizeof(gw); 239df930be7Sderaadt sin->sin_family = AF_INET; 240df930be7Sderaadt sin->sin_addr.s_addr = gw_ip.s_addr; 241df930be7Sderaadt /* Mask: (zero length) */ 242df930be7Sderaadt bzero(&mask, sizeof(mask)); 243a5dd9203Sclaudio bzero(&info, sizeof(info)); 244a5dd9203Sclaudio info.rti_info[RTAX_DST] = &dst; 245a5dd9203Sclaudio info.rti_info[RTAX_GATEWAY] = &gw; 246a5dd9203Sclaudio info.rti_info[RTAX_NETMASK] = &mask; 247a5dd9203Sclaudio info.rti_flags = (RTF_UP | RTF_GATEWAY | RTF_STATIC); 248df930be7Sderaadt 24940777900Sderaadt printf("nfs_boot: gateway=%s\n", inet_ntoa(gw_ip)); 250df930be7Sderaadt /* add, dest, gw, mask, flags, 0 */ 25111db67baSclaudio error = rtrequest1(RTM_ADD, &info, RTP_STATIC, NULL, 0); 252df930be7Sderaadt if (error) 253df930be7Sderaadt printf("nfs_boot: add route, error=%d\n", error); 254df930be7Sderaadt } 255df930be7Sderaadt #endif 256df930be7Sderaadt 257370decb4Sniklas bcopy(&bp_sin, &nd->nd_boot, sizeof(bp_sin)); 258df930be7Sderaadt 259df930be7Sderaadt return (0); 260df930be7Sderaadt } 261df930be7Sderaadt 262906a9d53Sjsg /* 263906a9d53Sjsg * bpsin: bootparam server 264906a9d53Sjsg * key: root or swap 265906a9d53Sjsg * ndmntp: output 266906a9d53Sjsg */ 267a28bd3cfSmickey int 268906a9d53Sjsg nfs_boot_getfh(struct sockaddr_in *bpsin, char *key, 269906a9d53Sjsg struct nfs_dlmount *ndmntp, int retries) 270df930be7Sderaadt { 271*49338274Sfgsch struct nfs_args *args; 272df930be7Sderaadt char pathname[MAXPATHLEN]; 273df930be7Sderaadt char *sp, *dp, *endp; 274370decb4Sniklas struct sockaddr_in *sin; 275df930be7Sderaadt int error; 276df930be7Sderaadt 277*49338274Sfgsch args = &ndmntp->ndm_args; 278*49338274Sfgsch 279*49338274Sfgsch /* Initialize mount args. */ 280*49338274Sfgsch bzero((caddr_t) args, sizeof(*args)); 281*49338274Sfgsch args->addr = (struct sockaddr *)&ndmntp->ndm_saddr; 282*49338274Sfgsch args->addrlen = args->addr->sa_len; 283*49338274Sfgsch args->sotype = SOCK_DGRAM; 284*49338274Sfgsch args->fh = ndmntp->ndm_fh; 285*49338274Sfgsch args->hostname = ndmntp->ndm_host; 286*49338274Sfgsch args->flags = NFSMNT_NFSV3; 287*49338274Sfgsch #ifdef NFS_BOOT_OPTIONS 288*49338274Sfgsch args->flags |= NFS_BOOT_OPTIONS; 289*49338274Sfgsch #endif 290*49338274Sfgsch #ifdef NFS_BOOT_RWSIZE 291*49338274Sfgsch /* 292*49338274Sfgsch * Reduce rsize,wsize for interfaces that consistently 293*49338274Sfgsch * drop fragments of long UDP messages. (i.e. wd8003). 294*49338274Sfgsch * You can always change these later via remount. 295*49338274Sfgsch */ 296*49338274Sfgsch args->flags |= NFSMNT_WSIZE | NFSMNT_RSIZE; 297*49338274Sfgsch args->wsize = NFS_BOOT_RWSIZE; 298*49338274Sfgsch args->rsize = NFS_BOOT_RWSIZE; 299*49338274Sfgsch #endif 300*49338274Sfgsch 301370decb4Sniklas sin = &ndmntp->ndm_saddr; 302370decb4Sniklas 303df930be7Sderaadt /* 304df930be7Sderaadt * Get server:pathname for "key" (root or swap) 305df930be7Sderaadt * using RPC to bootparam/getfile 306df930be7Sderaadt */ 307a28bd3cfSmickey error = bp_getfile(bpsin, key, sin, ndmntp->ndm_host, pathname, 308a28bd3cfSmickey retries); 309a28bd3cfSmickey if (error) { 310a28bd3cfSmickey printf("nfs_boot: bootparam get %s: %d\n", key, error); 311a28bd3cfSmickey return (error); 312a28bd3cfSmickey } 313df930be7Sderaadt 314df930be7Sderaadt /* 315df930be7Sderaadt * Get file handle for "key" (root or swap) 316df930be7Sderaadt * using RPC to mountd/mount 317df930be7Sderaadt */ 318*49338274Sfgsch error = md_mount(sin, pathname, args); 319a28bd3cfSmickey if (error) { 320a28bd3cfSmickey printf("nfs_boot: mountd %s, error=%d\n", key, error); 321a28bd3cfSmickey return (error); 322a28bd3cfSmickey } 323df930be7Sderaadt 324370decb4Sniklas /* Set port number for NFS use. */ 325370decb4Sniklas /* XXX: NFS port is always 2049, right? */ 326*49338274Sfgsch error = krpc_portmap(sin, NFS_PROG, 327*49338274Sfgsch (args->flags & NFSMNT_NFSV3) ? NFS_VER3 : NFS_VER2, 328*49338274Sfgsch &sin->sin_port); 329a28bd3cfSmickey if (error) { 330*49338274Sfgsch printf("nfs_boot: portmap NFS, error=%d\n", error); 331a28bd3cfSmickey return (error); 332a28bd3cfSmickey } 333370decb4Sniklas 334df930be7Sderaadt /* Construct remote path (for getmntinfo(3)) */ 335df930be7Sderaadt dp = ndmntp->ndm_host; 336df930be7Sderaadt endp = dp + MNAMELEN - 1; 337df930be7Sderaadt dp += strlen(dp); 338df930be7Sderaadt *dp++ = ':'; 339df930be7Sderaadt for (sp = pathname; *sp && dp < endp;) 340df930be7Sderaadt *dp++ = *sp++; 341df930be7Sderaadt *dp = '\0'; 342df930be7Sderaadt 343a28bd3cfSmickey return (0); 344df930be7Sderaadt } 345df930be7Sderaadt 346df930be7Sderaadt 347df930be7Sderaadt /* 348df930be7Sderaadt * RPC: bootparam/whoami 349df930be7Sderaadt * Given client IP address, get: 350df930be7Sderaadt * client name (hostname) 351df930be7Sderaadt * domain name (domainname) 352df930be7Sderaadt * gateway address 353df930be7Sderaadt * 354df930be7Sderaadt * The hostname and domainname are set here for convenience. 355df930be7Sderaadt * 356df930be7Sderaadt * Note - bpsin is initialized to the broadcast address, 357df930be7Sderaadt * and will be replaced with the bootparam server address 358df930be7Sderaadt * after this call is complete. Have to use PMAP_PROC_CALL 359df930be7Sderaadt * to make sure we get responses only from a servers that 360df930be7Sderaadt * know about us (don't want to broadcast a getport call). 361df930be7Sderaadt */ 362df930be7Sderaadt static int 363906a9d53Sjsg bp_whoami(struct sockaddr_in *bpsin, struct in_addr *my_ip, 364906a9d53Sjsg struct in_addr *gw_ip) 365df930be7Sderaadt { 366df930be7Sderaadt /* RPC structures for PMAPPROC_CALLIT */ 367df930be7Sderaadt struct whoami_call { 368df930be7Sderaadt u_int32_t call_prog; 369df930be7Sderaadt u_int32_t call_vers; 370df930be7Sderaadt u_int32_t call_proc; 371df930be7Sderaadt u_int32_t call_arglen; 372df930be7Sderaadt } *call; 373df930be7Sderaadt struct callit_reply { 374df930be7Sderaadt u_int32_t port; 375df930be7Sderaadt u_int32_t encap_len; 376df930be7Sderaadt /* encapsulated data here */ 377df930be7Sderaadt } *reply; 378df930be7Sderaadt 379df930be7Sderaadt struct mbuf *m, *from; 380df930be7Sderaadt struct sockaddr_in *sin; 381df930be7Sderaadt int error, msg_len; 382df930be7Sderaadt int16_t port; 383df930be7Sderaadt 384df930be7Sderaadt /* 385df930be7Sderaadt * Build request message for PMAPPROC_CALLIT. 386df930be7Sderaadt */ 387df930be7Sderaadt m = m_get(M_WAIT, MT_DATA); 388df930be7Sderaadt call = mtod(m, struct whoami_call *); 389df930be7Sderaadt m->m_len = sizeof(*call); 390df930be7Sderaadt call->call_prog = txdr_unsigned(BOOTPARAM_PROG); 391df930be7Sderaadt call->call_vers = txdr_unsigned(BOOTPARAM_VERS); 392df930be7Sderaadt call->call_proc = txdr_unsigned(BOOTPARAM_WHOAMI); 393df930be7Sderaadt 394df930be7Sderaadt /* 395df930be7Sderaadt * append encapsulated data (client IP address) 396df930be7Sderaadt */ 397df930be7Sderaadt m->m_next = xdr_inaddr_encode(my_ip); 398df930be7Sderaadt call->call_arglen = txdr_unsigned(m->m_next->m_len); 399df930be7Sderaadt 400df930be7Sderaadt /* RPC: portmap/callit */ 401df930be7Sderaadt bpsin->sin_port = htons(PMAPPORT); 402df930be7Sderaadt from = NULL; 403df930be7Sderaadt error = krpc_call(bpsin, PMAPPROG, PMAPVERS, 404a28bd3cfSmickey PMAPPROC_CALLIT, &m, &from, -1); 405df930be7Sderaadt if (error) 406df930be7Sderaadt return error; 407df930be7Sderaadt 408df930be7Sderaadt /* 409df930be7Sderaadt * Parse result message. 410df930be7Sderaadt */ 411df930be7Sderaadt if (m->m_len < sizeof(*reply)) { 412df930be7Sderaadt m = m_pullup(m, sizeof(*reply)); 413df930be7Sderaadt if (m == NULL) 414df930be7Sderaadt goto bad; 415df930be7Sderaadt } 416df930be7Sderaadt reply = mtod(m, struct callit_reply *); 417df930be7Sderaadt port = fxdr_unsigned(u_int32_t, reply->port); 418df930be7Sderaadt msg_len = fxdr_unsigned(u_int32_t, reply->encap_len); 419df930be7Sderaadt m_adj(m, sizeof(*reply)); 420df930be7Sderaadt 421df930be7Sderaadt /* 422df930be7Sderaadt * Save bootparam server address 423df930be7Sderaadt */ 424df930be7Sderaadt sin = mtod(from, struct sockaddr_in *); 425df930be7Sderaadt bpsin->sin_port = htons(port); 426df930be7Sderaadt bpsin->sin_addr.s_addr = sin->sin_addr.s_addr; 427df930be7Sderaadt 428df930be7Sderaadt /* client name */ 429df930be7Sderaadt hostnamelen = MAXHOSTNAMELEN-1; 430df930be7Sderaadt m = xdr_string_decode(m, hostname, &hostnamelen); 431df930be7Sderaadt if (m == NULL) 432df930be7Sderaadt goto bad; 433df930be7Sderaadt 434df930be7Sderaadt /* domain name */ 435df930be7Sderaadt domainnamelen = MAXHOSTNAMELEN-1; 436df930be7Sderaadt m = xdr_string_decode(m, domainname, &domainnamelen); 437df930be7Sderaadt if (m == NULL) 438df930be7Sderaadt goto bad; 439df930be7Sderaadt 440df930be7Sderaadt /* gateway address */ 441df930be7Sderaadt m = xdr_inaddr_decode(m, gw_ip); 442df930be7Sderaadt if (m == NULL) 443df930be7Sderaadt goto bad; 444df930be7Sderaadt 445df930be7Sderaadt /* success */ 446df930be7Sderaadt goto out; 447df930be7Sderaadt 448df930be7Sderaadt bad: 449df930be7Sderaadt printf("nfs_boot: bootparam_whoami: bad reply\n"); 450df930be7Sderaadt error = EBADRPC; 451df930be7Sderaadt 452df930be7Sderaadt out: 453df930be7Sderaadt if (from) 454df930be7Sderaadt m_freem(from); 455df930be7Sderaadt if (m) 456df930be7Sderaadt m_freem(m); 457df930be7Sderaadt return(error); 458df930be7Sderaadt } 459df930be7Sderaadt 460df930be7Sderaadt 461df930be7Sderaadt /* 462df930be7Sderaadt * RPC: bootparam/getfile 463df930be7Sderaadt * Given client name and file "key", get: 464df930be7Sderaadt * server name 465df930be7Sderaadt * server IP address 466df930be7Sderaadt * server pathname 467df930be7Sderaadt */ 468df930be7Sderaadt static int 469906a9d53Sjsg bp_getfile(struct sockaddr_in *bpsin, char *key, struct sockaddr_in *md_sin, 470906a9d53Sjsg char *serv_name, char *pathname, int retries) 471df930be7Sderaadt { 472df930be7Sderaadt struct mbuf *m; 473df930be7Sderaadt struct sockaddr_in *sin; 474df930be7Sderaadt struct in_addr inaddr; 475df930be7Sderaadt int error, sn_len, path_len; 476df930be7Sderaadt 477df930be7Sderaadt /* 478df930be7Sderaadt * Build request message. 479df930be7Sderaadt */ 480df930be7Sderaadt 481df930be7Sderaadt /* client name (hostname) */ 482df930be7Sderaadt m = xdr_string_encode(hostname, hostnamelen); 483370decb4Sniklas if (m == NULL) 484370decb4Sniklas return (ENOMEM); 485df930be7Sderaadt 486df930be7Sderaadt /* key name (root or swap) */ 487df930be7Sderaadt m->m_next = xdr_string_encode(key, strlen(key)); 488370decb4Sniklas if (m->m_next == NULL) 489370decb4Sniklas return (ENOMEM); 490df930be7Sderaadt 491df930be7Sderaadt /* RPC: bootparam/getfile */ 492df930be7Sderaadt error = krpc_call(bpsin, BOOTPARAM_PROG, BOOTPARAM_VERS, 493a28bd3cfSmickey BOOTPARAM_GETFILE, &m, NULL, retries); 494df930be7Sderaadt if (error) 495df930be7Sderaadt return error; 496df930be7Sderaadt 497df930be7Sderaadt /* 498df930be7Sderaadt * Parse result message. 499df930be7Sderaadt */ 500df930be7Sderaadt 501df930be7Sderaadt /* server name */ 502df930be7Sderaadt sn_len = MNAMELEN-1; 503df930be7Sderaadt m = xdr_string_decode(m, serv_name, &sn_len); 504df930be7Sderaadt if (m == NULL) 505df930be7Sderaadt goto bad; 506df930be7Sderaadt 507df930be7Sderaadt /* server IP address (mountd/NFS) */ 508df930be7Sderaadt m = xdr_inaddr_decode(m, &inaddr); 509df930be7Sderaadt if (m == NULL) 510df930be7Sderaadt goto bad; 511df930be7Sderaadt 512df930be7Sderaadt /* server pathname */ 513df930be7Sderaadt path_len = MAXPATHLEN-1; 514df930be7Sderaadt m = xdr_string_decode(m, pathname, &path_len); 515df930be7Sderaadt if (m == NULL) 516df930be7Sderaadt goto bad; 517df930be7Sderaadt 518df930be7Sderaadt /* setup server socket address */ 519df930be7Sderaadt sin = md_sin; 520df930be7Sderaadt bzero((caddr_t)sin, sizeof(*sin)); 521df930be7Sderaadt sin->sin_len = sizeof(*sin); 522df930be7Sderaadt sin->sin_family = AF_INET; 523df930be7Sderaadt sin->sin_addr = inaddr; 524df930be7Sderaadt 525df930be7Sderaadt /* success */ 526df930be7Sderaadt goto out; 527df930be7Sderaadt 528df930be7Sderaadt bad: 529df930be7Sderaadt printf("nfs_boot: bootparam_getfile: bad reply\n"); 530df930be7Sderaadt error = EBADRPC; 531df930be7Sderaadt 532df930be7Sderaadt out: 533df930be7Sderaadt m_freem(m); 534838ec05fSkrw return(error); 535df930be7Sderaadt } 536df930be7Sderaadt 537df930be7Sderaadt 538df930be7Sderaadt /* 539df930be7Sderaadt * RPC: mountd/mount 540df930be7Sderaadt * Given a server pathname, get an NFS file handle. 541df930be7Sderaadt * Also, sets sin->sin_port to the NFS service port. 542906a9d53Sjsg * mdsin: mountd server address 543df930be7Sderaadt */ 544df930be7Sderaadt static int 545*49338274Sfgsch md_mount(struct sockaddr_in *mdsin, char *path, struct nfs_args *argp) 546df930be7Sderaadt { 547df930be7Sderaadt /* The RPC structures */ 548df930be7Sderaadt struct rdata { 549df930be7Sderaadt u_int32_t errno; 550*49338274Sfgsch union { 551*49338274Sfgsch u_int8_t v2fh[NFSX_V2FH]; 552*49338274Sfgsch struct { 553*49338274Sfgsch u_int32_t fhlen; 554*49338274Sfgsch u_int8_t fh[1]; 555*49338274Sfgsch } v3fh; 556*49338274Sfgsch } fh; 557df930be7Sderaadt } *rdata; 558df930be7Sderaadt struct mbuf *m; 559*49338274Sfgsch u_int8_t *fh; 560*49338274Sfgsch int minlen, error; 561*49338274Sfgsch int mntver; 562df930be7Sderaadt 563*49338274Sfgsch mntver = (argp->flags & NFSMNT_NFSV3) ? 3 : 2; 564*49338274Sfgsch do { 565*49338274Sfgsch error = krpc_portmap(mdsin, RPCPROG_MNT, mntver, 566df930be7Sderaadt &mdsin->sin_port); 567*49338274Sfgsch if (error) 568*49338274Sfgsch continue; 569df930be7Sderaadt 570df930be7Sderaadt m = xdr_string_encode(path, strlen(path)); 571370decb4Sniklas if (m == NULL) 57278530d46Smickey return ENOMEM; 573df930be7Sderaadt 574df930be7Sderaadt /* Do RPC to mountd. */ 575*49338274Sfgsch error = krpc_call(mdsin, RPCPROG_MNT, mntver, 576a28bd3cfSmickey RPCMNT_MOUNT, &m, NULL, -1); 577*49338274Sfgsch 578*49338274Sfgsch if (error != EPROGMISMATCH) 579*49338274Sfgsch break; 580*49338274Sfgsch /* Try lower version of mountd. */ 581*49338274Sfgsch } while (--mntver >= 1); 582df930be7Sderaadt if (error) 583df930be7Sderaadt return error; /* message already freed */ 584df930be7Sderaadt 585*49338274Sfgsch if (mntver != 3) 586*49338274Sfgsch argp->flags &= ~NFSMNT_NFSV3; 587*49338274Sfgsch 588370decb4Sniklas /* The reply might have only the errno. */ 589370decb4Sniklas if (m->m_len < 4) 590370decb4Sniklas goto bad; 591370decb4Sniklas /* Have at least errno, so check that. */ 592370decb4Sniklas rdata = mtod(m, struct rdata *); 593370decb4Sniklas error = fxdr_unsigned(u_int32_t, rdata->errno); 594370decb4Sniklas if (error) 595370decb4Sniklas goto out; 596370decb4Sniklas 597370decb4Sniklas /* Have errno==0, so the fh must be there. */ 598*49338274Sfgsch if (mntver == 3) { 599*49338274Sfgsch argp->fhsize = fxdr_unsigned(u_int32_t, rdata->fh.v3fh.fhlen); 600*49338274Sfgsch if (argp->fhsize > NFSX_V3FHMAX) 601df930be7Sderaadt goto bad; 602*49338274Sfgsch minlen = 2 * sizeof(u_int32_t) + argp->fhsize; 603*49338274Sfgsch } else { 604*49338274Sfgsch argp->fhsize = NFSX_V2FH; 605*49338274Sfgsch minlen = sizeof(u_int32_t) + argp->fhsize; 606*49338274Sfgsch } 607*49338274Sfgsch 608*49338274Sfgsch if (m->m_len < minlen) { 609*49338274Sfgsch m = m_pullup(m, minlen); 610*49338274Sfgsch if (m == NULL) 611*49338274Sfgsch return (EBADRPC); 612df930be7Sderaadt rdata = mtod(m, struct rdata *); 613370decb4Sniklas } 614*49338274Sfgsch 615*49338274Sfgsch fh = (mntver == 3) ? rdata->fh.v3fh.fh : rdata->fh.v2fh; 616*49338274Sfgsch bcopy(fh, argp->fh, argp->fhsize); 617*49338274Sfgsch 618df930be7Sderaadt goto out; 619df930be7Sderaadt 620df930be7Sderaadt bad: 621df930be7Sderaadt error = EBADRPC; 622df930be7Sderaadt 623df930be7Sderaadt out: 624df930be7Sderaadt m_freem(m); 625df930be7Sderaadt return error; 626df930be7Sderaadt } 627df930be7Sderaadt 628f3f6cb75Sbriggs #endif /* ifdef NFSCLIENT */ 629