1*acd193d7Smvs /* $OpenBSD: nfs_boot.c,v 1.47 2021/01/19 19:35:59 mvs Exp $ */ 209d901c0Sderaadt /* $NetBSD: nfs_boot.c,v 1.26 1996/05/07 02:51:25 thorpej Exp $ */ 3df930be7Sderaadt 4df930be7Sderaadt /* 5df930be7Sderaadt * Copyright (c) 1995 Adam Glass, Gordon Ross 6df930be7Sderaadt * All rights reserved. 7df930be7Sderaadt * 8df930be7Sderaadt * Redistribution and use in source and binary forms, with or without 9df930be7Sderaadt * modification, are permitted provided that the following conditions 10df930be7Sderaadt * are met: 11df930be7Sderaadt * 1. Redistributions of source code must retain the above copyright 12df930be7Sderaadt * notice, this list of conditions and the following disclaimer. 13df930be7Sderaadt * 2. Redistributions in binary form must reproduce the above copyright 14df930be7Sderaadt * notice, this list of conditions and the following disclaimer in the 15df930be7Sderaadt * documentation and/or other materials provided with the distribution. 16df930be7Sderaadt * 3. The name of the authors may not be used to endorse or promote products 17df930be7Sderaadt * derived from this software without specific prior written permission. 18df930be7Sderaadt * 19df930be7Sderaadt * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR 20df930be7Sderaadt * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 21df930be7Sderaadt * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 22df930be7Sderaadt * IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, 23df930be7Sderaadt * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 24df930be7Sderaadt * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 25df930be7Sderaadt * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 26df930be7Sderaadt * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 27df930be7Sderaadt * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 28df930be7Sderaadt * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29df930be7Sderaadt */ 30df930be7Sderaadt 31df930be7Sderaadt #include <sys/param.h> 32df930be7Sderaadt #include <sys/systm.h> 33df930be7Sderaadt #include <sys/kernel.h> 34df930be7Sderaadt #include <sys/conf.h> 35df930be7Sderaadt #include <sys/ioctl.h> 36df930be7Sderaadt #include <sys/mount.h> 37df930be7Sderaadt #include <sys/mbuf.h> 38df930be7Sderaadt #include <sys/reboot.h> 39df930be7Sderaadt #include <sys/socket.h> 40df930be7Sderaadt #include <sys/socketvar.h> 41d8c62b08Sblambert #include <sys/queue.h> 42df930be7Sderaadt 43df930be7Sderaadt #include <net/if.h> 440deb6685Smpi #include <net/if_var.h> 45df930be7Sderaadt 46df930be7Sderaadt #include <netinet/in.h> 474b69f2cbSmpi #include <netinet/in_var.h> 48df930be7Sderaadt #include <netinet/if_ether.h> 49df930be7Sderaadt 50df930be7Sderaadt #include <nfs/rpcv2.h> 5178530d46Smickey #include <nfs/nfsproto.h> 52df930be7Sderaadt #include <nfs/nfs.h> 53df930be7Sderaadt #include <nfs/nfsdiskless.h> 54df930be7Sderaadt #include <nfs/krpc.h> 55df930be7Sderaadt #include <nfs/xdr_subs.h> 56370decb4Sniklas #include <nfs/nfs_var.h> 57df930be7Sderaadt 58ddde6caeSderaadt #include "ether.h" 59df930be7Sderaadt 60ddde6caeSderaadt #if !defined(NFSCLIENT) || (NETHER == 0 && NFDDI == 0) 61ddde6caeSderaadt 62ddde6caeSderaadt int 63906a9d53Sjsg nfs_boot_init(struct nfs_diskless *nd, struct proc *procp) 64df930be7Sderaadt { 65a0bbd24dSbriggs panic("nfs_boot_init: NFSCLIENT not enabled in kernel"); 66df930be7Sderaadt } 67df930be7Sderaadt 68a28bd3cfSmickey int 69906a9d53Sjsg nfs_boot_getfh(struct sockaddr_in *bpsin, char *key, 70906a9d53Sjsg struct nfs_dlmount *ndmntp, int retries) 7178530d46Smickey { 7278530d46Smickey /* can not get here */ 73a28bd3cfSmickey return (EOPNOTSUPP); 7478530d46Smickey } 7578530d46Smickey 76ddde6caeSderaadt #else 77df930be7Sderaadt 78df930be7Sderaadt /* 79df930be7Sderaadt * Support for NFS diskless booting, specifically getting information 80df930be7Sderaadt * about where to boot from, what pathnames, etc. 81df930be7Sderaadt * 820eb08f42Spedro * This implementation uses RARP and the bootparam RPC. 83df930be7Sderaadt * We are forced to implement RPC anyway (to get file handles) 84df930be7Sderaadt * so we might as well take advantage of it for bootparam too. 85df930be7Sderaadt * 86df930be7Sderaadt * The diskless boot sequence goes as follows: 87df930be7Sderaadt * (1) Use RARP to get our interface address 88df930be7Sderaadt * (2) Use RPC/bootparam/whoami to get our hostname, 89df930be7Sderaadt * our IP address, and the server's IP address. 90df930be7Sderaadt * (3) Use RPC/bootparam/getfile to get the root path 91df930be7Sderaadt * (4) Use RPC/mountd to get the root file handle 92df930be7Sderaadt * (5) Use RPC/bootparam/getfile to get the swap path 93df930be7Sderaadt * (6) Use RPC/mountd to get the swap file handle 94df930be7Sderaadt * 95df930be7Sderaadt * (This happens to be the way Sun does it too.) 96df930be7Sderaadt */ 97df930be7Sderaadt 98df930be7Sderaadt /* bootparam RPC */ 99c4071fd1Smillert static int bp_whoami(struct sockaddr_in *bpsin, 100c4071fd1Smillert struct in_addr *my_ip, struct in_addr *gw_ip); 101c4071fd1Smillert static int bp_getfile(struct sockaddr_in *bpsin, char *key, 102c4071fd1Smillert struct sockaddr_in *mdsin, char *servname, char *path, int retries); 103df930be7Sderaadt 104df930be7Sderaadt /* mountd RPC */ 105c4071fd1Smillert static int md_mount(struct sockaddr_in *mdsin, char *path, 10649338274Sfgsch struct nfs_args *argp); 107df930be7Sderaadt 108df930be7Sderaadt char *nfsbootdevname; 109df930be7Sderaadt 110df930be7Sderaadt /* 111df930be7Sderaadt * Called with an empty nfs_diskless struct to be filled in. 112df930be7Sderaadt */ 113df930be7Sderaadt int 114906a9d53Sjsg nfs_boot_init(struct nfs_diskless *nd, struct proc *procp) 115df930be7Sderaadt { 116df930be7Sderaadt struct ifreq ireq; 1174b69f2cbSmpi struct in_aliasreq ifra; 118df930be7Sderaadt struct in_addr my_ip, gw_ip; 119df930be7Sderaadt struct sockaddr_in bp_sin; 120df930be7Sderaadt struct sockaddr_in *sin; 121df930be7Sderaadt struct ifnet *ifp; 122df930be7Sderaadt struct socket *so; 123c6e49a3dSmpi struct ifaddr *ifa; 124bbcf0337Smpi char addr[INET_ADDRSTRLEN]; 125aa28b9a6Smpi int error; 126df930be7Sderaadt 127df930be7Sderaadt /* 128df930be7Sderaadt * Find an interface, rarp for its ip address, stuff it, the 129df930be7Sderaadt * implied broadcast addr, and netmask into a nfs_diskless struct. 130df930be7Sderaadt * 131df930be7Sderaadt * This was moved here from nfs_vfsops.c because this procedure 132df930be7Sderaadt * would be quite different if someone decides to write (i.e.) a 133df930be7Sderaadt * BOOTP version of this file (might not use RARP, etc.) 134df930be7Sderaadt */ 135df930be7Sderaadt 136df930be7Sderaadt /* 137df930be7Sderaadt * Find a network interface. 138df930be7Sderaadt */ 139*acd193d7Smvs if (nfsbootdevname == NULL || (ifp = if_unit(nfsbootdevname)) == NULL) 140df930be7Sderaadt panic("nfs_boot: no suitable interface"); 141f812a531Smvs 14209d901c0Sderaadt bcopy(ifp->if_xname, ireq.ifr_name, IFNAMSIZ); 143f72c60a5Sderaadt printf("nfs_boot: using interface %s, with revarp & bootparams\n", 144f72c60a5Sderaadt ireq.ifr_name); 145df930be7Sderaadt 146df930be7Sderaadt /* 147df930be7Sderaadt * Bring up the interface. 148df930be7Sderaadt * 149df930be7Sderaadt * Get the old interface flags and or IFF_UP into them; if 150df930be7Sderaadt * IFF_UP set blindly, interface selection can be clobbered. 151df930be7Sderaadt */ 152df930be7Sderaadt if ((error = socreate(AF_INET, &so, SOCK_DGRAM, 0)) != 0) 153df930be7Sderaadt panic("nfs_boot: socreate, error=%d", error); 154df930be7Sderaadt error = ifioctl(so, SIOCGIFFLAGS, (caddr_t)&ireq, procp); 155df930be7Sderaadt if (error) 156df930be7Sderaadt panic("nfs_boot: GIFFLAGS, error=%d", error); 157df930be7Sderaadt ireq.ifr_flags |= IFF_UP; 158df930be7Sderaadt error = ifioctl(so, SIOCSIFFLAGS, (caddr_t)&ireq, procp); 159df930be7Sderaadt if (error) 160df930be7Sderaadt panic("nfs_boot: SIFFLAGS, error=%d", error); 161df930be7Sderaadt 162df930be7Sderaadt /* 163df930be7Sderaadt * Do RARP for the interface address. 164df930be7Sderaadt */ 165df930be7Sderaadt if ((error = revarpwhoami(&my_ip, ifp)) != 0) 16639529570Sderaadt panic("reverse arp not answered by rarpd(8) or dhcpd(8)"); 167bbcf0337Smpi inet_ntop(AF_INET, &my_ip, addr, sizeof(addr)); 168bbcf0337Smpi printf("nfs_boot: client_addr=%s\n", addr); 169df930be7Sderaadt 170df930be7Sderaadt /* 171df930be7Sderaadt * Do enough of ifconfig(8) so that the chosen interface 172df930be7Sderaadt * can talk to the servers. (just set the address) 173df930be7Sderaadt */ 174851e11faStedu memset(&ifra, 0, sizeof(ifra)); 1754b69f2cbSmpi bcopy(ifp->if_xname, ifra.ifra_name, sizeof(ifra.ifra_name)); 1764b69f2cbSmpi 1775dd46ca9Sbluhm sin = &ifra.ifra_addr; 178df930be7Sderaadt sin->sin_len = sizeof(*sin); 179df930be7Sderaadt sin->sin_family = AF_INET; 180df930be7Sderaadt sin->sin_addr.s_addr = my_ip.s_addr; 1814b69f2cbSmpi error = ifioctl(so, SIOCAIFADDR, (caddr_t)&ifra, procp); 182df930be7Sderaadt if (error) 183df930be7Sderaadt panic("nfs_boot: set if addr, error=%d", error); 184df930be7Sderaadt 1854a4dc3eaSmpi soclose(so, 0); 186df930be7Sderaadt 187c6e49a3dSmpi TAILQ_FOREACH(ifa, &ifp->if_addrlist, ifa_list) { 188c6e49a3dSmpi if (ifa->ifa_addr->sa_family == AF_INET) 189c6e49a3dSmpi break; 190c6e49a3dSmpi } 191c6e49a3dSmpi if (ifa == NULL) 192c6e49a3dSmpi panic("nfs_boot: address not configured on %s", ifp->if_xname); 193*acd193d7Smvs if_put(ifp); 194c6e49a3dSmpi 195df930be7Sderaadt /* 196df930be7Sderaadt * Get client name and gateway address. 197df930be7Sderaadt * RPC: bootparam/whoami 198df930be7Sderaadt * The server address returned by the WHOAMI call 19998b25bc4Sderaadt * is used for all subsequent bootparam RPCs. 200df930be7Sderaadt */ 201851e11faStedu memset(&bp_sin, 0, sizeof(bp_sin)); 202df930be7Sderaadt bp_sin.sin_len = sizeof(bp_sin); 203df930be7Sderaadt bp_sin.sin_family = AF_INET; 204c6e49a3dSmpi bp_sin.sin_addr.s_addr = ifatoia(ifa)->ia_broadaddr.sin_addr.s_addr; 205df930be7Sderaadt hostnamelen = MAXHOSTNAMELEN; 206df930be7Sderaadt 207df930be7Sderaadt /* this returns gateway IP address */ 208df930be7Sderaadt error = bp_whoami(&bp_sin, &my_ip, &gw_ip); 209df930be7Sderaadt if (error) 210df930be7Sderaadt panic("nfs_boot: bootparam whoami, error=%d", error); 211bbcf0337Smpi inet_ntop(AF_INET, &bp_sin.sin_addr, addr, sizeof(addr)); 212bbcf0337Smpi printf("nfs_boot: server_addr=%s hostname=%s\n", addr, hostname); 213df930be7Sderaadt 214370decb4Sniklas bcopy(&bp_sin, &nd->nd_boot, sizeof(bp_sin)); 215df930be7Sderaadt 216df930be7Sderaadt return (0); 217df930be7Sderaadt } 218df930be7Sderaadt 219906a9d53Sjsg /* 220906a9d53Sjsg * bpsin: bootparam server 221906a9d53Sjsg * key: root or swap 222906a9d53Sjsg * ndmntp: output 223906a9d53Sjsg */ 224a28bd3cfSmickey int 225906a9d53Sjsg nfs_boot_getfh(struct sockaddr_in *bpsin, char *key, 226906a9d53Sjsg struct nfs_dlmount *ndmntp, int retries) 227df930be7Sderaadt { 22849338274Sfgsch struct nfs_args *args; 229df930be7Sderaadt char pathname[MAXPATHLEN]; 230df930be7Sderaadt char *sp, *dp, *endp; 231370decb4Sniklas struct sockaddr_in *sin; 232df930be7Sderaadt int error; 233df930be7Sderaadt 23449338274Sfgsch args = &ndmntp->ndm_args; 23549338274Sfgsch 23649338274Sfgsch /* Initialize mount args. */ 237851e11faStedu memset(args, 0, sizeof(*args)); 2383e303383Sbluhm args->addr = sintosa(&ndmntp->ndm_saddr); 23949338274Sfgsch args->addrlen = args->addr->sa_len; 24049338274Sfgsch args->sotype = SOCK_DGRAM; 24149338274Sfgsch args->fh = ndmntp->ndm_fh; 24249338274Sfgsch args->hostname = ndmntp->ndm_host; 24349338274Sfgsch args->flags = NFSMNT_NFSV3; 24449338274Sfgsch #ifdef NFS_BOOT_OPTIONS 24549338274Sfgsch args->flags |= NFS_BOOT_OPTIONS; 24649338274Sfgsch #endif 24749338274Sfgsch #ifdef NFS_BOOT_RWSIZE 24849338274Sfgsch /* 24949338274Sfgsch * Reduce rsize,wsize for interfaces that consistently 25049338274Sfgsch * drop fragments of long UDP messages. (i.e. wd8003). 25149338274Sfgsch * You can always change these later via remount. 25249338274Sfgsch */ 25349338274Sfgsch args->flags |= NFSMNT_WSIZE | NFSMNT_RSIZE; 25449338274Sfgsch args->wsize = NFS_BOOT_RWSIZE; 25549338274Sfgsch args->rsize = NFS_BOOT_RWSIZE; 25649338274Sfgsch #endif 25749338274Sfgsch 258370decb4Sniklas sin = &ndmntp->ndm_saddr; 259370decb4Sniklas 260df930be7Sderaadt /* 261df930be7Sderaadt * Get server:pathname for "key" (root or swap) 262df930be7Sderaadt * using RPC to bootparam/getfile 263df930be7Sderaadt */ 264a28bd3cfSmickey error = bp_getfile(bpsin, key, sin, ndmntp->ndm_host, pathname, 265a28bd3cfSmickey retries); 266a28bd3cfSmickey if (error) { 267a28bd3cfSmickey printf("nfs_boot: bootparam get %s: %d\n", key, error); 268a28bd3cfSmickey return (error); 269a28bd3cfSmickey } 270df930be7Sderaadt 271df930be7Sderaadt /* 272df930be7Sderaadt * Get file handle for "key" (root or swap) 273df930be7Sderaadt * using RPC to mountd/mount 274df930be7Sderaadt */ 27549338274Sfgsch error = md_mount(sin, pathname, args); 276a28bd3cfSmickey if (error) { 277a28bd3cfSmickey printf("nfs_boot: mountd %s, error=%d\n", key, error); 278a28bd3cfSmickey return (error); 279a28bd3cfSmickey } 280df930be7Sderaadt 281370decb4Sniklas /* Set port number for NFS use. */ 282370decb4Sniklas /* XXX: NFS port is always 2049, right? */ 28349338274Sfgsch error = krpc_portmap(sin, NFS_PROG, 28449338274Sfgsch (args->flags & NFSMNT_NFSV3) ? NFS_VER3 : NFS_VER2, 28549338274Sfgsch &sin->sin_port); 286a28bd3cfSmickey if (error) { 28749338274Sfgsch printf("nfs_boot: portmap NFS, error=%d\n", error); 288a28bd3cfSmickey return (error); 289a28bd3cfSmickey } 290370decb4Sniklas 291df930be7Sderaadt /* Construct remote path (for getmntinfo(3)) */ 292df930be7Sderaadt dp = ndmntp->ndm_host; 293df930be7Sderaadt endp = dp + MNAMELEN - 1; 294df930be7Sderaadt dp += strlen(dp); 295df930be7Sderaadt *dp++ = ':'; 296df930be7Sderaadt for (sp = pathname; *sp && dp < endp;) 297df930be7Sderaadt *dp++ = *sp++; 298df930be7Sderaadt *dp = '\0'; 299df930be7Sderaadt 300a28bd3cfSmickey return (0); 301df930be7Sderaadt } 302df930be7Sderaadt 303df930be7Sderaadt 304df930be7Sderaadt /* 305df930be7Sderaadt * RPC: bootparam/whoami 306df930be7Sderaadt * Given client IP address, get: 307df930be7Sderaadt * client name (hostname) 308df930be7Sderaadt * domain name (domainname) 309df930be7Sderaadt * gateway address 310df930be7Sderaadt * 311df930be7Sderaadt * The hostname and domainname are set here for convenience. 312df930be7Sderaadt * 313df930be7Sderaadt * Note - bpsin is initialized to the broadcast address, 314df930be7Sderaadt * and will be replaced with the bootparam server address 315df930be7Sderaadt * after this call is complete. Have to use PMAP_PROC_CALL 316df930be7Sderaadt * to make sure we get responses only from a servers that 317df930be7Sderaadt * know about us (don't want to broadcast a getport call). 318df930be7Sderaadt */ 319df930be7Sderaadt static int 320906a9d53Sjsg bp_whoami(struct sockaddr_in *bpsin, struct in_addr *my_ip, 321906a9d53Sjsg struct in_addr *gw_ip) 322df930be7Sderaadt { 323df930be7Sderaadt /* RPC structures for PMAPPROC_CALLIT */ 324df930be7Sderaadt struct whoami_call { 325df930be7Sderaadt u_int32_t call_prog; 326df930be7Sderaadt u_int32_t call_vers; 327df930be7Sderaadt u_int32_t call_proc; 328df930be7Sderaadt u_int32_t call_arglen; 329df930be7Sderaadt } *call; 330df930be7Sderaadt struct callit_reply { 331df930be7Sderaadt u_int32_t port; 332df930be7Sderaadt u_int32_t encap_len; 333df930be7Sderaadt /* encapsulated data here */ 334df930be7Sderaadt } *reply; 335df930be7Sderaadt 336df930be7Sderaadt struct mbuf *m, *from; 337df930be7Sderaadt struct sockaddr_in *sin; 338df930be7Sderaadt int error, msg_len; 339df930be7Sderaadt int16_t port; 340df930be7Sderaadt 341df930be7Sderaadt /* 342df930be7Sderaadt * Build request message for PMAPPROC_CALLIT. 343df930be7Sderaadt */ 344df930be7Sderaadt m = m_get(M_WAIT, MT_DATA); 345df930be7Sderaadt call = mtod(m, struct whoami_call *); 346df930be7Sderaadt m->m_len = sizeof(*call); 347df930be7Sderaadt call->call_prog = txdr_unsigned(BOOTPARAM_PROG); 348df930be7Sderaadt call->call_vers = txdr_unsigned(BOOTPARAM_VERS); 349df930be7Sderaadt call->call_proc = txdr_unsigned(BOOTPARAM_WHOAMI); 350df930be7Sderaadt 351df930be7Sderaadt /* 352df930be7Sderaadt * append encapsulated data (client IP address) 353df930be7Sderaadt */ 354df930be7Sderaadt m->m_next = xdr_inaddr_encode(my_ip); 355df930be7Sderaadt call->call_arglen = txdr_unsigned(m->m_next->m_len); 356df930be7Sderaadt 357df930be7Sderaadt /* RPC: portmap/callit */ 358df930be7Sderaadt bpsin->sin_port = htons(PMAPPORT); 359df930be7Sderaadt from = NULL; 360df930be7Sderaadt error = krpc_call(bpsin, PMAPPROG, PMAPVERS, 361a28bd3cfSmickey PMAPPROC_CALLIT, &m, &from, -1); 362df930be7Sderaadt if (error) 363df930be7Sderaadt return error; 364df930be7Sderaadt 365df930be7Sderaadt /* 366df930be7Sderaadt * Parse result message. 367df930be7Sderaadt */ 368df930be7Sderaadt if (m->m_len < sizeof(*reply)) { 369df930be7Sderaadt m = m_pullup(m, sizeof(*reply)); 370df930be7Sderaadt if (m == NULL) 371df930be7Sderaadt goto bad; 372df930be7Sderaadt } 373df930be7Sderaadt reply = mtod(m, struct callit_reply *); 374df930be7Sderaadt port = fxdr_unsigned(u_int32_t, reply->port); 375df930be7Sderaadt msg_len = fxdr_unsigned(u_int32_t, reply->encap_len); 376df930be7Sderaadt m_adj(m, sizeof(*reply)); 377df930be7Sderaadt 378df930be7Sderaadt /* 379df930be7Sderaadt * Save bootparam server address 380df930be7Sderaadt */ 381df930be7Sderaadt sin = mtod(from, struct sockaddr_in *); 382df930be7Sderaadt bpsin->sin_port = htons(port); 383df930be7Sderaadt bpsin->sin_addr.s_addr = sin->sin_addr.s_addr; 384df930be7Sderaadt 385df930be7Sderaadt /* client name */ 386df930be7Sderaadt hostnamelen = MAXHOSTNAMELEN-1; 387df930be7Sderaadt m = xdr_string_decode(m, hostname, &hostnamelen); 388df930be7Sderaadt if (m == NULL) 389df930be7Sderaadt goto bad; 390df930be7Sderaadt 391df930be7Sderaadt /* domain name */ 392df930be7Sderaadt domainnamelen = MAXHOSTNAMELEN-1; 393df930be7Sderaadt m = xdr_string_decode(m, domainname, &domainnamelen); 394df930be7Sderaadt if (m == NULL) 395df930be7Sderaadt goto bad; 396df930be7Sderaadt 397df930be7Sderaadt /* gateway address */ 398df930be7Sderaadt m = xdr_inaddr_decode(m, gw_ip); 399df930be7Sderaadt if (m == NULL) 400df930be7Sderaadt goto bad; 401df930be7Sderaadt 402df930be7Sderaadt /* success */ 403df930be7Sderaadt goto out; 404df930be7Sderaadt 405df930be7Sderaadt bad: 406df930be7Sderaadt printf("nfs_boot: bootparam_whoami: bad reply\n"); 407df930be7Sderaadt error = EBADRPC; 408df930be7Sderaadt 409df930be7Sderaadt out: 410df930be7Sderaadt m_freem(from); 411df930be7Sderaadt m_freem(m); 412df930be7Sderaadt return(error); 413df930be7Sderaadt } 414df930be7Sderaadt 415df930be7Sderaadt 416df930be7Sderaadt /* 417df930be7Sderaadt * RPC: bootparam/getfile 418df930be7Sderaadt * Given client name and file "key", get: 419df930be7Sderaadt * server name 420df930be7Sderaadt * server IP address 421df930be7Sderaadt * server pathname 422df930be7Sderaadt */ 423df930be7Sderaadt static int 424906a9d53Sjsg bp_getfile(struct sockaddr_in *bpsin, char *key, struct sockaddr_in *md_sin, 425906a9d53Sjsg char *serv_name, char *pathname, int retries) 426df930be7Sderaadt { 427df930be7Sderaadt struct mbuf *m; 428df930be7Sderaadt struct sockaddr_in *sin; 429df930be7Sderaadt struct in_addr inaddr; 430df930be7Sderaadt int error, sn_len, path_len; 431df930be7Sderaadt 432df930be7Sderaadt /* 433df930be7Sderaadt * Build request message. 434df930be7Sderaadt */ 435df930be7Sderaadt 436df930be7Sderaadt /* client name (hostname) */ 437df930be7Sderaadt m = xdr_string_encode(hostname, hostnamelen); 438370decb4Sniklas if (m == NULL) 439370decb4Sniklas return (ENOMEM); 440df930be7Sderaadt 441df930be7Sderaadt /* key name (root or swap) */ 442df930be7Sderaadt m->m_next = xdr_string_encode(key, strlen(key)); 4436dc9eaf1Sclaudio if (m->m_next == NULL) { 4446dc9eaf1Sclaudio m_freem(m); 445370decb4Sniklas return (ENOMEM); 4466dc9eaf1Sclaudio } 447df930be7Sderaadt 448df930be7Sderaadt /* RPC: bootparam/getfile */ 449df930be7Sderaadt error = krpc_call(bpsin, BOOTPARAM_PROG, BOOTPARAM_VERS, 450a28bd3cfSmickey BOOTPARAM_GETFILE, &m, NULL, retries); 451df930be7Sderaadt if (error) 452df930be7Sderaadt return error; 453df930be7Sderaadt 454df930be7Sderaadt /* 455df930be7Sderaadt * Parse result message. 456df930be7Sderaadt */ 457df930be7Sderaadt 458df930be7Sderaadt /* server name */ 459df930be7Sderaadt sn_len = MNAMELEN-1; 460df930be7Sderaadt m = xdr_string_decode(m, serv_name, &sn_len); 461df930be7Sderaadt if (m == NULL) 462df930be7Sderaadt goto bad; 463df930be7Sderaadt 464df930be7Sderaadt /* server IP address (mountd/NFS) */ 465df930be7Sderaadt m = xdr_inaddr_decode(m, &inaddr); 466df930be7Sderaadt if (m == NULL) 467df930be7Sderaadt goto bad; 468df930be7Sderaadt 469df930be7Sderaadt /* server pathname */ 470df930be7Sderaadt path_len = MAXPATHLEN-1; 471df930be7Sderaadt m = xdr_string_decode(m, pathname, &path_len); 472df930be7Sderaadt if (m == NULL) 473df930be7Sderaadt goto bad; 474df930be7Sderaadt 475df930be7Sderaadt /* setup server socket address */ 476df930be7Sderaadt sin = md_sin; 477851e11faStedu memset(sin, 0, sizeof(*sin)); 478df930be7Sderaadt sin->sin_len = sizeof(*sin); 479df930be7Sderaadt sin->sin_family = AF_INET; 480df930be7Sderaadt sin->sin_addr = inaddr; 481df930be7Sderaadt 482df930be7Sderaadt /* success */ 483df930be7Sderaadt goto out; 484df930be7Sderaadt 485df930be7Sderaadt bad: 486df930be7Sderaadt printf("nfs_boot: bootparam_getfile: bad reply\n"); 487df930be7Sderaadt error = EBADRPC; 488df930be7Sderaadt 489df930be7Sderaadt out: 490df930be7Sderaadt m_freem(m); 491838ec05fSkrw return(error); 492df930be7Sderaadt } 493df930be7Sderaadt 494df930be7Sderaadt 495df930be7Sderaadt /* 496df930be7Sderaadt * RPC: mountd/mount 497df930be7Sderaadt * Given a server pathname, get an NFS file handle. 498df930be7Sderaadt * Also, sets sin->sin_port to the NFS service port. 499906a9d53Sjsg * mdsin: mountd server address 500df930be7Sderaadt */ 501df930be7Sderaadt static int 50249338274Sfgsch md_mount(struct sockaddr_in *mdsin, char *path, struct nfs_args *argp) 503df930be7Sderaadt { 504df930be7Sderaadt /* The RPC structures */ 505df930be7Sderaadt struct rdata { 506df930be7Sderaadt u_int32_t errno; 50749338274Sfgsch union { 50849338274Sfgsch u_int8_t v2fh[NFSX_V2FH]; 50949338274Sfgsch struct { 51049338274Sfgsch u_int32_t fhlen; 51149338274Sfgsch u_int8_t fh[1]; 51249338274Sfgsch } v3fh; 51349338274Sfgsch } fh; 514df930be7Sderaadt } *rdata; 515df930be7Sderaadt struct mbuf *m; 51649338274Sfgsch u_int8_t *fh; 51749338274Sfgsch int minlen, error; 51849338274Sfgsch int mntver; 519df930be7Sderaadt 52049338274Sfgsch mntver = (argp->flags & NFSMNT_NFSV3) ? 3 : 2; 52149338274Sfgsch do { 52249338274Sfgsch error = krpc_portmap(mdsin, RPCPROG_MNT, mntver, 523df930be7Sderaadt &mdsin->sin_port); 52449338274Sfgsch if (error) 52549338274Sfgsch continue; 526df930be7Sderaadt 527df930be7Sderaadt m = xdr_string_encode(path, strlen(path)); 528370decb4Sniklas if (m == NULL) 52978530d46Smickey return ENOMEM; 530df930be7Sderaadt 531df930be7Sderaadt /* Do RPC to mountd. */ 53249338274Sfgsch error = krpc_call(mdsin, RPCPROG_MNT, mntver, 533a28bd3cfSmickey RPCMNT_MOUNT, &m, NULL, -1); 53449338274Sfgsch 53549338274Sfgsch if (error != EPROGMISMATCH) 53649338274Sfgsch break; 53749338274Sfgsch /* Try lower version of mountd. */ 53849338274Sfgsch } while (--mntver >= 1); 539df930be7Sderaadt if (error) 540df930be7Sderaadt return error; /* message already freed */ 541df930be7Sderaadt 54249338274Sfgsch if (mntver != 3) 54349338274Sfgsch argp->flags &= ~NFSMNT_NFSV3; 54449338274Sfgsch 545370decb4Sniklas /* The reply might have only the errno. */ 546370decb4Sniklas if (m->m_len < 4) 547370decb4Sniklas goto bad; 548370decb4Sniklas /* Have at least errno, so check that. */ 549370decb4Sniklas rdata = mtod(m, struct rdata *); 550370decb4Sniklas error = fxdr_unsigned(u_int32_t, rdata->errno); 551370decb4Sniklas if (error) 552370decb4Sniklas goto out; 553370decb4Sniklas 554370decb4Sniklas /* Have errno==0, so the fh must be there. */ 55549338274Sfgsch if (mntver == 3) { 55649338274Sfgsch argp->fhsize = fxdr_unsigned(u_int32_t, rdata->fh.v3fh.fhlen); 55749338274Sfgsch if (argp->fhsize > NFSX_V3FHMAX) 558df930be7Sderaadt goto bad; 55949338274Sfgsch minlen = 2 * sizeof(u_int32_t) + argp->fhsize; 56049338274Sfgsch } else { 56149338274Sfgsch argp->fhsize = NFSX_V2FH; 56249338274Sfgsch minlen = sizeof(u_int32_t) + argp->fhsize; 56349338274Sfgsch } 56449338274Sfgsch 56549338274Sfgsch if (m->m_len < minlen) { 56649338274Sfgsch m = m_pullup(m, minlen); 56749338274Sfgsch if (m == NULL) 56849338274Sfgsch return (EBADRPC); 569df930be7Sderaadt rdata = mtod(m, struct rdata *); 570370decb4Sniklas } 57149338274Sfgsch 57249338274Sfgsch fh = (mntver == 3) ? rdata->fh.v3fh.fh : rdata->fh.v2fh; 57349338274Sfgsch bcopy(fh, argp->fh, argp->fhsize); 57449338274Sfgsch 575df930be7Sderaadt goto out; 576df930be7Sderaadt 577df930be7Sderaadt bad: 578df930be7Sderaadt error = EBADRPC; 579df930be7Sderaadt 580df930be7Sderaadt out: 581df930be7Sderaadt m_freem(m); 582df930be7Sderaadt return error; 583df930be7Sderaadt } 584df930be7Sderaadt 585f3f6cb75Sbriggs #endif /* ifdef NFSCLIENT */ 586