xref: /titanic_50/usr/src/grub/grub-0.97/netboot/nic.c (revision 2506833e104b0230265b2060e907afe5b224df6c)
1 /**************************************************************************
2 Etherboot -  Network Bootstrap Program
3 
4 Literature dealing with the network protocols:
5 	ARP - RFC826
6 	RARP - RFC903
7         IP - RFC791
8 	UDP - RFC768
9 	BOOTP - RFC951, RFC2132 (vendor extensions)
10 	DHCP - RFC2131, RFC2132 (options)
11 	TFTP - RFC1350, RFC2347 (options), RFC2348 (blocksize), RFC2349 (tsize)
12 	RPC - RFC1831, RFC1832 (XDR), RFC1833 (rpcbind/portmapper)
13 	NFS - RFC1094, RFC1813 (v3, useful for clarifications, not implemented)
14 	IGMP - RFC1112, RFC2113, RFC2365, RFC2236, RFC3171
15 
16 **************************************************************************/
17 #include "etherboot.h"
18 #include "grub.h"
19 #include "nic.h"
20 #include "elf.h" /* FOR EM_CURRENT */
21 #include "bootp.h"
22 #include "if_arp.h"
23 #include "tftp.h"
24 #include "timer.h"
25 #include "ip.h"
26 #include "udp.h"
27 
28 /* Currently no other module uses rom, but it is available */
29 struct rom_info		rom;
30 struct arptable_t	arptable[MAX_ARP];
31 #ifdef MULTICAST_LEVEL2
32 unsigned long last_igmpv1 = 0;
33 struct igmptable_t	igmptable[MAX_IGMP];
34 #endif
35 static unsigned long	netmask;
36 /* Used by nfs.c */
37 char *hostname = "";
38 int hostnamelen = 0;
39 /* Used by fsys_tftp.c */
40 int use_bios_pxe = 0;
41 static uint32_t xid;
42 static unsigned char *end_of_rfc1533 = NULL;
43 static const unsigned char broadcast[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
44 static const in_addr zeroIP = { 0L };
45 static char rfc1533_venddata[MAX_RFC1533_VENDLEN];
46 static unsigned char rfc1533_cookie[4] = { RFC1533_COOKIE };
47 static unsigned char rfc1533_cookie_bootp[5] = { RFC1533_COOKIE, RFC1533_END };
48 static unsigned char rfc1533_cookie_dhcp[] = { RFC1533_COOKIE };
49 static int dhcp_reply;
50 static in_addr dhcp_server = { 0L };
51 static in_addr dhcp_addr = { 0L };
52 
53 static const unsigned char dhcpdiscover[] = {
54 	RFC2132_MSG_TYPE, 1, DHCPDISCOVER,
55 	RFC2132_MAX_SIZE, 2,	/* request as much as we can */
56 	ETH_MAX_MTU / 256, ETH_MAX_MTU % 256,
57 	/* Vendor class identifier */
58 #ifdef SOLARIS_NETBOOT
59 	RFC2132_VENDOR_CLASS_ID,32,'P','X','E','C','l','i','e','n','t',':',
60 	'A','r','c','h',':','0','0','0','0','0',':','U','N','D','I',':',
61 	'0','0','2','0','0','1',
62 #else
63 	RFC2132_VENDOR_CLASS_ID, 10, 'G', 'R', 'U', 'B', 'C', 'l', 'i', 'e', 'n', 't',
64 #endif
65 	RFC2132_PARAM_LIST, 4, RFC1533_NETMASK, RFC1533_GATEWAY,
66 	RFC1533_HOSTNAME, RFC1533_EXTENSIONPATH, RFC1533_END
67 };
68 static const unsigned char dhcprequest [] = {
69 	RFC2132_MSG_TYPE,1,DHCPREQUEST,
70 	RFC2132_SRV_ID,4,0,0,0,0,
71 	RFC2132_REQ_ADDR,4,0,0,0,0,
72 	RFC2132_MAX_SIZE,2,	/* request as much as we can */
73 	ETH_MAX_MTU / 256, ETH_MAX_MTU % 256,
74 	/* Vendor class identifier */
75 #ifdef SOLARIS_NETBOOT
76 	RFC2132_VENDOR_CLASS_ID,32,'P','X','E','C','l','i','e','n','t',':',
77 	'A','r','c','h',':','0','0','0','0','0',':','U','N','D','I',':',
78 	'0','0','2','0','0','1',
79 #else
80 	RFC2132_VENDOR_CLASS_ID, 10, 'G', 'R', 'U', 'B', 'C', 'l', 'i', 'e', 'n', 't',
81 #endif
82 	RFC2132_PARAM_LIST,
83 	/* 4 standard + 2 vendortags */
84 	4 + 2,
85 	/* Standard parameters */
86 	RFC1533_NETMASK, RFC1533_GATEWAY,
87 	RFC1533_HOSTNAME, RFC1533_EXTENSIONPATH,
88 	/* Etherboot vendortags */
89 	RFC1533_VENDOR_MAGIC,
90 	RFC1533_VENDOR_CONFIGFILE,
91 	RFC1533_END
92 };
93 
94 /* See nic.h */
95 int user_abort = 0;
96 int network_ready = 0;
97 
98 #ifdef	REQUIRE_VCI_ETHERBOOT
99 int	vci_etherboot;
100 #endif
101 
102 char *bootfile = NULL;
103 configfile_origin_t configfile_origin = CFG_HARDCODED;
104 char *vendor_configfile = NULL;
105 char vendor_configfile_len;
106 
107 static void update_network_configuration(void);
108 
dummy(void * unused __unused)109 static int dummy(void *unused __unused)
110 {
111 	return (0);
112 }
113 
114 /* Careful.  We need an aligned buffer to avoid problems on machines
115  * that care about alignment.  To trivally align the ethernet data
116  * (the ip hdr and arp requests) we offset the packet by 2 bytes.
117  * leaving the ethernet data 16 byte aligned.  Beyond this
118  * we use memmove but this makes the common cast simple and fast.
119  */
120 static char	packet[ETH_FRAME_LEN + ETH_DATA_ALIGN] __aligned;
121 
122 struct nic	nic =
123 {
124 	{
125 		0,				/* dev.disable */
126 		{
127 			0,
128 			0,
129 			PCI_BUS_TYPE,
130 		},				/* dev.devid */
131 		0,				/* index */
132 		0,				/* type */
133 		PROBE_FIRST,			/* how_pobe */
134 		PROBE_NONE,			/* to_probe */
135 		0,				/* failsafe */
136 		0,				/* type_index */
137 		{},				/* state */
138 	},
139 	(int (*)(struct nic *, int))dummy,      /* poll */
140 	(void (*)(struct nic *, const char *,
141 		unsigned int, unsigned int,
142 		const char *))dummy,		/* transmit */
143 	(void (*)(struct nic *, irq_action_t))dummy, /* irq */
144 	0,					/* flags */
145 	&rom,					/* rom_info */
146 	arptable[ARP_CLIENT].node,		/* node_addr */
147 	packet + ETH_DATA_ALIGN,		/* packet */
148 	0,					/* packetlen */
149 	0,			/* ioaddr */
150 	0,			/* irqno */
151 	NULL,					/* priv_data */
152 };
153 
154 
155 
grub_eth_probe(void)156 int grub_eth_probe(void)
157 {
158 	static int probed = 0;
159 	struct dev *dev;
160 
161 	EnterFunction("grub_eth_probe");
162 
163 	if (probed)
164 		return 1;
165 
166 	network_ready = 0;
167 	grub_memset((char *)arptable, 0, MAX_ARP * sizeof(struct arptable_t));
168 	dev = &nic.dev;
169 	dev->how_probe = -1;
170 	dev->type = NIC_DRIVER;
171 	dev->failsafe = 1;
172 	rom = *((struct rom_info *)ROM_INFO_LOCATION);
173 
174 	probed = (eth_probe(dev) == PROBE_WORKED);
175 
176 	LeaveFunction("grub_eth_probe");
177 	return probed;
178 }
179 
eth_probe(struct dev * dev)180 int eth_probe(struct dev *dev)
181 {
182 	return probe(dev);
183 }
184 
eth_poll(int retrieve)185 int eth_poll(int retrieve)
186 {
187 	return ((*nic.poll)(&nic, retrieve));
188 }
189 
eth_transmit(const char * d,unsigned int t,unsigned int s,const void * p)190 void eth_transmit(const char *d, unsigned int t, unsigned int s, const void *p)
191 {
192 	(*nic.transmit)(&nic, d, t, s, p);
193 	if (t == IP) twiddle();
194 }
195 
eth_disable(void)196 void eth_disable(void)
197 {
198 #ifdef MULTICAST_LEVEL2
199 	int i;
200 	for(i = 0; i < MAX_IGMP; i++) {
201 		leave_group(i);
202 	}
203 #endif
204 	disable(&nic.dev);
205 }
206 
eth_irq(irq_action_t action)207 void eth_irq (irq_action_t action)
208 {
209 	(*nic.irq)(&nic,action);
210 }
211 
212 /**************************************************************************
213 IPCHKSUM - Checksum IP Header
214 **************************************************************************/
ipchksum(const void * data,unsigned long length)215 uint16_t ipchksum(const void *data, unsigned long length)
216 {
217 	unsigned long sum;
218 	unsigned long i;
219 	const uint8_t *ptr;
220 
221 	/* In the most straight forward way possible,
222 	 * compute an ip style checksum.
223 	 */
224 	sum = 0;
225 	ptr = data;
226 	for(i = 0; i < length; i++) {
227 		unsigned long value;
228 		value = ptr[i];
229 		if (i & 1) {
230 			value <<= 8;
231 		}
232 		/* Add the new value */
233 		sum += value;
234 		/* Wrap around the carry */
235 		if (sum > 0xFFFF) {
236 			sum = (sum + (sum >> 16)) & 0xFFFF;
237 		}
238 	}
239 	return (~cpu_to_le16(sum)) & 0xFFFF;
240 }
241 
add_ipchksums(unsigned long offset,uint16_t sum,uint16_t new)242 uint16_t add_ipchksums(unsigned long offset, uint16_t sum, uint16_t new)
243 {
244 	unsigned long checksum;
245 	sum = ~sum & 0xFFFF;
246 	new = ~new & 0xFFFF;
247 	if (offset & 1) {
248 		/* byte swap the sum if it came from an odd offset
249 		 * since the computation is endian independant this
250 		 * works.
251 		 */
252 		new = bswap_16(new);
253 	}
254 	checksum = sum + new;
255 	if (checksum > 0xFFFF) {
256 		checksum -= 0xFFFF;
257 	}
258 	return (~checksum) & 0xFFFF;
259 }
260 
261 /**************************************************************************
262 DEFAULT_NETMASK - Return default netmask for IP address
263 **************************************************************************/
default_netmask(void)264 static inline unsigned long default_netmask(void)
265 {
266 	int net = ntohl(arptable[ARP_CLIENT].ipaddr.s_addr) >> 24;
267 	if (net <= 127)
268 		return(htonl(0xff000000));
269 	else if (net < 192)
270 		return(htonl(0xffff0000));
271 	else
272 		return(htonl(0xffffff00));
273 }
274 
275 /**************************************************************************
276 IP_TRANSMIT - Send an IP datagram
277 **************************************************************************/
await_arp(int ival,void * ptr,unsigned short ptype,struct iphdr * ip __unused,struct udphdr * udp __unused)278 static int await_arp(int ival, void *ptr,
279 	unsigned short ptype, struct iphdr *ip __unused, struct udphdr *udp __unused)
280 {
281 	struct	arprequest *arpreply;
282 	if (ptype != ARP)
283 		return 0;
284 	if (nic.packetlen < ETH_HLEN + sizeof(struct arprequest))
285 		return 0;
286 	arpreply = (struct arprequest *)&nic.packet[ETH_HLEN];
287 
288 	if (arpreply->opcode != htons(ARP_REPLY))
289 		return 0;
290 	if (memcmp(arpreply->sipaddr, ptr, sizeof(in_addr)) != 0)
291 		return 0;
292 	memcpy(arptable[ival].node, arpreply->shwaddr, ETH_ALEN);
293 	return 1;
294 }
295 
ip_transmit(int len,const void * buf)296 int ip_transmit(int len, const void *buf)
297 {
298 	unsigned long destip;
299 	struct iphdr *ip;
300 	struct arprequest arpreq;
301 	int arpentry, i;
302 	int retry;
303 
304 	ip = (struct iphdr *)buf;
305 	destip = ip->dest.s_addr;
306 	if (destip == IP_BROADCAST) {
307 		eth_transmit(broadcast, IP, len, buf);
308 #ifdef MULTICAST_LEVEL1
309 	} else if ((destip & htonl(MULTICAST_MASK)) == htonl(MULTICAST_NETWORK)) {
310 		unsigned char multicast[6];
311 		unsigned long hdestip;
312 		hdestip = ntohl(destip);
313 		multicast[0] = 0x01;
314 		multicast[1] = 0x00;
315 		multicast[2] = 0x5e;
316 		multicast[3] = (hdestip >> 16) & 0x7;
317 		multicast[4] = (hdestip >> 8) & 0xff;
318 		multicast[5] = hdestip & 0xff;
319 		eth_transmit(multicast, IP, len, buf);
320 #endif
321 	} else {
322 		if (((destip & netmask) !=
323 		     (arptable[ARP_CLIENT].ipaddr.s_addr & netmask)) &&
324 		    arptable[ARP_GATEWAY].ipaddr.s_addr)
325 			destip = arptable[ARP_GATEWAY].ipaddr.s_addr;
326 		for(arpentry = 0; arpentry<MAX_ARP; arpentry++)
327 			if (arptable[arpentry].ipaddr.s_addr == destip) break;
328 		if (arpentry == MAX_ARP) {
329 			printf("%@ is not in my arp table!\n", destip);
330 			return(0);
331 		}
332 		for (i = 0; i < ETH_ALEN; i++)
333 			if (arptable[arpentry].node[i])
334 				break;
335 		if (i == ETH_ALEN) {	/* Need to do arp request */
336 			arpreq.hwtype = htons(1);
337 			arpreq.protocol = htons(IP);
338 			arpreq.hwlen = ETH_ALEN;
339 			arpreq.protolen = 4;
340 			arpreq.opcode = htons(ARP_REQUEST);
341 			memcpy(arpreq.shwaddr, arptable[ARP_CLIENT].node, ETH_ALEN);
342 			memcpy(arpreq.sipaddr, &arptable[ARP_CLIENT].ipaddr, sizeof(in_addr));
343 			memset(arpreq.thwaddr, 0, ETH_ALEN);
344 			memcpy(arpreq.tipaddr, &destip, sizeof(in_addr));
345 			for (retry = 1; retry <= MAX_ARP_RETRIES; retry++) {
346 				long timeout;
347 				eth_transmit(broadcast, ARP, sizeof(arpreq),
348 					&arpreq);
349 				timeout = rfc2131_sleep_interval(TIMEOUT, retry);
350 				if (await_reply(await_arp, arpentry,
351 					arpreq.tipaddr, timeout)) goto xmit;
352 			}
353 			return(0);
354 		}
355 xmit:
356 		eth_transmit(arptable[arpentry].node, IP, len, buf);
357 	}
358 	return 1;
359 }
360 
build_ip_hdr(unsigned long destip,int ttl,int protocol,int option_len,int len,const void * buf)361 void build_ip_hdr(unsigned long destip, int ttl, int protocol, int option_len,
362 	int len, const void *buf)
363 {
364 	struct iphdr *ip;
365 	ip = (struct iphdr *)buf;
366 	ip->verhdrlen = 0x45;
367 	ip->verhdrlen += (option_len/4);
368 	ip->service = 0;
369 	ip->len = htons(len);
370 	ip->ident = 0;
371 	ip->frags = 0; /* Should we set don't fragment? */
372 	ip->ttl = ttl;
373 	ip->protocol = protocol;
374 	ip->chksum = 0;
375 	ip->src.s_addr = arptable[ARP_CLIENT].ipaddr.s_addr;
376 	ip->dest.s_addr = destip;
377 	ip->chksum = ipchksum(buf, sizeof(struct iphdr) + option_len);
378 }
379 
udpchksum(struct iphdr * ip,struct udphdr * udp)380 static uint16_t udpchksum(struct iphdr *ip, struct udphdr *udp)
381 {
382 	struct udp_pseudo_hdr pseudo;
383 	uint16_t checksum;
384 
385 	/* Compute the pseudo header */
386 	pseudo.src.s_addr  = ip->src.s_addr;
387 	pseudo.dest.s_addr = ip->dest.s_addr;
388 	pseudo.unused      = 0;
389 	pseudo.protocol    = IP_UDP;
390 	pseudo.len         = udp->len;
391 
392 	/* Sum the pseudo header */
393 	checksum = ipchksum(&pseudo, 12);
394 
395 	/* Sum the rest of the udp packet */
396 	checksum = add_ipchksums(12, checksum, ipchksum(udp, ntohs(udp->len)));
397 	return checksum;
398 }
399 
400 
build_udp_hdr(unsigned long destip,unsigned int srcsock,unsigned int destsock,int ttl,int len,const void * buf)401 void build_udp_hdr(unsigned long destip,
402 	unsigned int srcsock, unsigned int destsock, int ttl,
403 	int len, const void *buf)
404 {
405 	struct iphdr *ip;
406 	struct udphdr *udp;
407 	ip = (struct iphdr *)buf;
408 	build_ip_hdr(destip, ttl, IP_UDP, 0, len, buf);
409 	udp = (struct udphdr *)((char *)buf + sizeof(struct iphdr));
410 	udp->src = htons(srcsock);
411 	udp->dest = htons(destsock);
412 	udp->len = htons(len - sizeof(struct iphdr));
413 	udp->chksum = 0;
414 	if ((udp->chksum = udpchksum(ip, udp)) == 0)
415 		udp->chksum = 0xffff;
416 }
417 
418 
419 /**************************************************************************
420 UDP_TRANSMIT - Send an UDP datagram
421 **************************************************************************/
udp_transmit(unsigned long destip,unsigned int srcsock,unsigned int destsock,int len,const void * buf)422 int udp_transmit(unsigned long destip, unsigned int srcsock,
423 	unsigned int destsock, int len, const void *buf)
424 {
425 	build_udp_hdr(destip, srcsock, destsock, 60, len, buf);
426 	return ip_transmit(len, buf);
427 }
428 
429 /**************************************************************************
430 QDRAIN - clear the nic's receive queue
431 **************************************************************************/
await_qdrain(int ival __unused,void * ptr __unused,unsigned short ptype __unused,struct iphdr * ip __unused,struct udphdr * udp __unused)432 static int await_qdrain(int ival __unused, void *ptr __unused,
433 	unsigned short ptype __unused,
434 	struct iphdr *ip __unused, struct udphdr *udp __unused)
435 {
436 	return 0;
437 }
438 
rx_qdrain(void)439 void rx_qdrain(void)
440 {
441 	/* Clear out the Rx queue first.  It contains nothing of interest,
442 	 * except possibly ARP requests from the DHCP/TFTP server.  We use
443 	 * polling throughout Etherboot, so some time may have passed since we
444 	 * last polled the receive queue, which may now be filled with
445 	 * broadcast packets.  This will cause the reply to the packets we are
446 	 * about to send to be lost immediately.  Not very clever.  */
447 	await_reply(await_qdrain, 0, NULL, 0);
448 }
449 
450 /**
451  * rarp
452  *
453  * Get IP address by rarp. Just copy from etherboot
454  **/
await_rarp(int ival,void * ptr,unsigned short ptype,struct iphdr * ip,struct udphdr * udp)455 static int await_rarp(int ival, void *ptr, unsigned short ptype,
456 		      struct iphdr *ip, struct udphdr *udp)
457 {
458 	struct arprequest *arpreply;
459 	if (ptype != RARP)
460 		return 0;
461 	if (nic.packetlen < ETH_HLEN + sizeof(struct arprequest))
462 		return 0;
463 	arpreply = (struct arprequest *)&nic.packet[ETH_HLEN];
464 	if (arpreply->opcode != htons(RARP_REPLY))
465 		return 0;
466 	if (memcmp(arpreply->thwaddr, ptr, ETH_ALEN) == 0){
467 		memcpy(arptable[ARP_SERVER].node, arpreply->shwaddr, ETH_ALEN);
468 		memcpy(&arptable[ARP_SERVER].ipaddr, arpreply->sipaddr, sizeof(in_addr));
469 		memcpy(&arptable[ARP_CLIENT].ipaddr, arpreply->tipaddr, sizeof(in_addr));
470 		memset(&arptable[ARP_GATEWAY].ipaddr, 0, sizeof(in_addr));
471 		return 1;
472 	}
473 	return 0;
474 }
475 
rarp(void)476 int rarp(void)
477 {
478 	int retry;
479 
480 	/* arp and rarp requests share the same packet structure. */
481 	struct arprequest rarpreq;
482 
483 	if(!grub_eth_probe())
484 		return 0;
485 	network_ready = 0;
486 
487 	memset(&rarpreq, 0, sizeof(rarpreq));
488 
489 	rarpreq.hwtype = htons(1);
490 	rarpreq.protocol = htons(IP);
491 	rarpreq.hwlen = ETH_ALEN;
492 	rarpreq.protolen = 4;
493 	rarpreq.opcode = htons(RARP_REQUEST);
494 	memcpy(&rarpreq.shwaddr, arptable[ARP_CLIENT].node, ETH_ALEN);
495 	/* sipaddr is already zeroed out */
496 	memcpy(&rarpreq.thwaddr, arptable[ARP_CLIENT].node, ETH_ALEN);
497 	/* tipaddr is already zeroed out */
498 
499 	for (retry = 0; retry < MAX_ARP_RETRIES; ++retry) {
500 		long timeout;
501 		eth_transmit(broadcast, RARP, sizeof(rarpreq), &rarpreq);
502 
503 		timeout = rfc2131_sleep_interval(TIMEOUT, retry);
504 		if (await_reply(await_rarp, 0, rarpreq.shwaddr, timeout))
505 			break;
506 		if (user_abort)
507 			return 0;
508 	}
509 
510 	if (retry == MAX_ARP_RETRIES) {
511 		return (0);
512 	}
513 
514 	network_ready = 1;
515   	update_network_configuration();
516 	return (1);
517 }
518 
519 /**
520  * bootp
521  *
522  * Get IP address by bootp, segregate from bootp in etherboot.
523  **/
await_bootp(int ival __unused,void * ptr __unused,unsigned short ptype __unused,struct iphdr * ip __unused,struct udphdr * udp)524 static int await_bootp(int ival __unused, void *ptr __unused,
525 	unsigned short ptype __unused, struct iphdr *ip __unused,
526 	struct udphdr *udp)
527 {
528 	struct	bootp_t *bootpreply;
529 	int len;		/* Length of vendor */
530 
531 	if (!udp) {
532 		return 0;
533 	}
534 	bootpreply = (struct bootp_t *)
535 		&nic.packet[ETH_HLEN + sizeof(struct iphdr) + sizeof(struct udphdr)];
536 	len = nic.packetlen - (ETH_HLEN + sizeof(struct iphdr) +
537 		sizeof(struct udphdr) + sizeof(struct bootp_t) - BOOTP_VENDOR_LEN);
538 	if (len < 0) {
539 		return 0;
540 	}
541 	if (udp->dest != htons(BOOTP_CLIENT))
542 		return 0;
543 	if (bootpreply->bp_op != BOOTP_REPLY)
544 		return 0;
545 	if (bootpreply->bp_xid != xid)
546 		return 0;
547 	if (memcmp((char *)&bootpreply->bp_siaddr, (char *)&zeroIP, sizeof(in_addr)) == 0)
548 		return 0;
549 	if ((memcmp(broadcast, bootpreply->bp_hwaddr, ETH_ALEN) != 0) &&
550 	    (memcmp(arptable[ARP_CLIENT].node, bootpreply->bp_hwaddr, ETH_ALEN) != 0)) {
551 		return 0;
552 	}
553 
554 #ifdef SOLARIS_NETBOOT
555 	/* fill in netinfo */
556 	dhcpack_length = len + sizeof (struct bootp_t) - BOOTP_VENDOR_LEN;
557 	memcpy((char *)dhcpack_buf, (char *)bootpreply, dhcpack_length);
558 #endif
559 
560 	arptable[ARP_CLIENT].ipaddr.s_addr = bootpreply->bp_yiaddr.s_addr;
561 	netmask = default_netmask();
562 	arptable[ARP_SERVER].ipaddr.s_addr = bootpreply->bp_siaddr.s_addr;
563 	memset(arptable[ARP_SERVER].node, 0, ETH_ALEN);  /* Kill arp */
564 	arptable[ARP_GATEWAY].ipaddr.s_addr = bootpreply->bp_giaddr.s_addr;
565 	memset(arptable[ARP_GATEWAY].node, 0, ETH_ALEN);  /* Kill arp */
566 	bootfile = bootpreply->bp_file;
567 	memcpy((char *)rfc1533_venddata, (char *)(bootpreply->bp_vend), len);
568 	decode_rfc1533(rfc1533_venddata, 0, len, 1);
569 	return(1);
570 }
571 
bootp(void)572 int bootp(void)
573 {
574 	int retry;
575 	struct bootpip_t ip;
576 	unsigned long  starttime;
577 
578 	EnterFunction("bootp");
579 
580 	if(!grub_eth_probe())
581 		return 0;
582 	network_ready = 0;
583 
584 	memset(&ip, 0, sizeof(struct bootpip_t));
585 	ip.bp.bp_op = BOOTP_REQUEST;
586 	ip.bp.bp_htype = 1;
587 	ip.bp.bp_hlen = ETH_ALEN;
588 	starttime = currticks();
589 	/* Use lower 32 bits of node address, more likely to be
590 	   distinct than the time since booting */
591 	memcpy(&xid, &arptable[ARP_CLIENT].node[2], sizeof(xid));
592 	ip.bp.bp_xid = xid += htonl(starttime);
593 	/* bp_secs defaults to zero */
594 	memcpy(ip.bp.bp_hwaddr, arptable[ARP_CLIENT].node, ETH_ALEN);
595 	memcpy(ip.bp.bp_vend, rfc1533_cookie_bootp, sizeof(rfc1533_cookie_bootp)); /* request RFC-style options */
596 
597 	for (retry = 0; retry < MAX_BOOTP_RETRIES; ) {
598 		long timeout;
599 
600 		rx_qdrain();
601 
602 		udp_transmit(IP_BROADCAST, BOOTP_CLIENT, BOOTP_SERVER,
603 			sizeof(struct bootpip_t), &ip);
604 		timeout = rfc2131_sleep_interval(TIMEOUT, retry++);
605 		if (await_reply(await_bootp, 0, NULL, timeout)){
606 			network_ready = 1;
607 			return(1);
608 		}
609 		if (user_abort)
610 			return 0;
611 		ip.bp.bp_secs = htons((currticks()-starttime)/TICKS_PER_SEC);
612 	}
613 	return(0);
614 }
615 
616 /**
617  * dhcp
618  *
619  * Get IP address by dhcp, segregate from bootp in etherboot.
620  **/
await_dhcp(int ival __unused,void * ptr __unused,unsigned short ptype __unused,struct iphdr * ip __unused,struct udphdr * udp)621 static int await_dhcp(int ival __unused, void *ptr __unused,
622 	unsigned short ptype __unused, struct iphdr *ip __unused,
623 	struct udphdr *udp)
624 {
625 	struct	dhcp_t *dhcpreply;
626 	int len;
627 
628 	if (!udp) {
629 		return 0;
630 	}
631 	dhcpreply = (struct dhcp_t *)
632 		&nic.packet[ETH_HLEN + sizeof(struct iphdr) + sizeof(struct udphdr)];
633 	len = nic.packetlen - (ETH_HLEN + sizeof(struct iphdr) +
634 		sizeof(struct udphdr) + sizeof(struct dhcp_t) - DHCP_OPT_LEN);
635 	if (len < 0){
636 		return 0;
637 	}
638 	if (udp->dest != htons(BOOTP_CLIENT))
639 		return 0;
640 	if (dhcpreply->bp_op != BOOTP_REPLY)
641 		return 0;
642 	if (dhcpreply->bp_xid != xid)
643 		return 0;
644 	if (memcmp((char *)&dhcpreply->bp_siaddr, (char *)&zeroIP, sizeof(in_addr)) == 0)
645 		return 0;
646 	if ((memcmp(broadcast, dhcpreply->bp_hwaddr, ETH_ALEN) != 0) &&
647 	    (memcmp(arptable[ARP_CLIENT].node, dhcpreply->bp_hwaddr, ETH_ALEN) != 0)) {
648 		return 0;
649 	}
650 
651 #ifdef SOLARIS_NETBOOT
652 	/* fill in netinfo */
653 	dhcpack_length = len + sizeof (struct dhcp_t) - DHCP_OPT_LEN;
654 	memcpy((char *)dhcpack_buf, (char *)dhcpreply, dhcpack_length);
655 #endif
656 	arptable[ARP_CLIENT].ipaddr.s_addr = dhcpreply->bp_yiaddr.s_addr;
657 	dhcp_addr.s_addr = dhcpreply->bp_yiaddr.s_addr;
658 	netmask = default_netmask();
659 	arptable[ARP_SERVER].ipaddr.s_addr = dhcpreply->bp_siaddr.s_addr;
660 	memset(arptable[ARP_SERVER].node, 0, ETH_ALEN);  /* Kill arp */
661 	arptable[ARP_GATEWAY].ipaddr.s_addr = dhcpreply->bp_giaddr.s_addr;
662 	memset(arptable[ARP_GATEWAY].node, 0, ETH_ALEN);  /* Kill arp */
663 	bootfile = dhcpreply->bp_file;
664 	memcpy((char *)rfc1533_venddata, (char *)(dhcpreply->bp_vend), len);
665 	decode_rfc1533(rfc1533_venddata, 0, len, 1);
666 	return(1);
667 }
668 
dhcp(void)669 int dhcp(void)
670 {
671 	int retry;
672 	int reqretry;
673 	struct dhcpip_t ip;
674 	unsigned long  starttime;
675 
676 	/* try bios pxe stack first */
677 	if (dhcp_undi())
678 		return 1;
679 
680 	if(!grub_eth_probe())
681 		return 0;
682 
683 	network_ready = 0;
684 
685 	memset(&ip, 0, sizeof(ip));
686 	ip.bp.bp_op = BOOTP_REQUEST;
687 	ip.bp.bp_htype = 1;
688 	ip.bp.bp_hlen = ETH_ALEN;
689 	starttime = currticks();
690 	/* Use lower 32 bits of node address, more likely to be
691 	   distinct than the time since booting */
692 	memcpy(&xid, &arptable[ARP_CLIENT].node[2], sizeof(xid));
693 	ip.bp.bp_xid = xid += htonl(starttime);
694 	memcpy(ip.bp.bp_hwaddr, arptable[ARP_CLIENT].node, ETH_ALEN);
695 	memcpy(ip.bp.bp_vend, rfc1533_cookie_dhcp, sizeof rfc1533_cookie_dhcp); /* request RFC-style options */
696 	memcpy(ip.bp.bp_vend + sizeof rfc1533_cookie_dhcp, dhcpdiscover, sizeof dhcpdiscover);
697 
698 	for (retry = 0; retry < MAX_BOOTP_RETRIES; ) {
699 		long timeout;
700 
701 		rx_qdrain();
702 
703 		udp_transmit(IP_BROADCAST, BOOTP_CLIENT, BOOTP_SERVER,
704 			     sizeof(ip), &ip);
705 		timeout = rfc2131_sleep_interval(TIMEOUT, retry++);
706 		if (await_reply(await_dhcp, 0, NULL, timeout)) {
707 			/* If not a DHCPOFFER then must be just a
708 			   BOOTP reply, be backward compatible with
709 			   BOOTP then. Jscott report a bug here, but I
710 			   don't know how it happened */
711 			if (dhcp_reply != DHCPOFFER){
712 				network_ready = 1;
713 				return(1);
714 			}
715 			dhcp_reply = 0;
716 			memcpy(ip.bp.bp_vend, rfc1533_cookie_dhcp, sizeof rfc1533_cookie_dhcp);
717 			memcpy(ip.bp.bp_vend + sizeof rfc1533_cookie_dhcp, dhcprequest, sizeof dhcprequest);
718 			/* Beware: the magic numbers 9 and 15 depend on
719 			   the layout of dhcprequest */
720 			memcpy(&ip.bp.bp_vend[9], &dhcp_server, sizeof(in_addr));
721 			memcpy(&ip.bp.bp_vend[15], &dhcp_addr, sizeof(in_addr));
722 			for (reqretry = 0; reqretry < MAX_BOOTP_RETRIES; ) {
723 				udp_transmit(IP_BROADCAST, BOOTP_CLIENT, BOOTP_SERVER,
724 					     sizeof(ip), &ip);
725 				dhcp_reply=0;
726 				timeout = rfc2131_sleep_interval(TIMEOUT, reqretry++);
727 				if (await_reply(await_dhcp, 0, NULL, timeout))
728 					if (dhcp_reply == DHCPACK){
729 						network_ready = 1;
730 						return(1);
731 					}
732 				if (user_abort)
733 					return 0;
734 			}
735 		}
736 		if (user_abort)
737 			return 0;
738 		ip.bp.bp_secs = htons((currticks()-starttime)/TICKS_PER_SEC);
739 	}
740 	return(0);
741 }
742 
743 #ifdef MULTICAST_LEVEL2
send_igmp_reports(unsigned long now)744 static void send_igmp_reports(unsigned long now)
745 {
746 	int i;
747 	for(i = 0; i < MAX_IGMP; i++) {
748 		if (igmptable[i].time && (now >= igmptable[i].time)) {
749 			struct igmp_ip_t igmp;
750 			igmp.router_alert[0] = 0x94;
751 			igmp.router_alert[1] = 0x04;
752 			igmp.router_alert[2] = 0;
753 			igmp.router_alert[3] = 0;
754 			build_ip_hdr(igmptable[i].group.s_addr,
755 				1, IP_IGMP, sizeof(igmp.router_alert), sizeof(igmp), &igmp);
756 			igmp.igmp.type = IGMPv2_REPORT;
757 			if (last_igmpv1 &&
758 				(now < last_igmpv1 + IGMPv1_ROUTER_PRESENT_TIMEOUT)) {
759 				igmp.igmp.type = IGMPv1_REPORT;
760 			}
761 			igmp.igmp.response_time = 0;
762 			igmp.igmp.chksum = 0;
763 			igmp.igmp.group.s_addr = igmptable[i].group.s_addr;
764 			igmp.igmp.chksum = ipchksum(&igmp.igmp, sizeof(igmp.igmp));
765 			ip_transmit(sizeof(igmp), &igmp);
766 #ifdef	MDEBUG
767 			printf("Sent IGMP report to: %@\n", igmp.igmp.group.s_addr);
768 #endif
769 			/* Don't send another igmp report until asked */
770 			igmptable[i].time = 0;
771 		}
772 	}
773 }
774 
process_igmp(struct iphdr * ip,unsigned long now)775 static void process_igmp(struct iphdr *ip, unsigned long now)
776 {
777 	struct igmp *igmp;
778 	int i;
779 	unsigned iplen = 0;
780 	if (!ip || (ip->protocol == IP_IGMP) ||
781 		(nic.packetlen < sizeof(struct iphdr) + sizeof(struct igmp))) {
782 		return;
783 	}
784 	iplen = (ip->verhdrlen & 0xf)*4;
785 	igmp = (struct igmp *)&nic.packet[sizeof(struct iphdr)];
786 	if (ipchksum(igmp, ntohs(ip->len) - iplen) != 0)
787 		return;
788 	if ((igmp->type == IGMP_QUERY) &&
789 		(ip->dest.s_addr == htonl(GROUP_ALL_HOSTS))) {
790 		unsigned long interval = IGMP_INTERVAL;
791 		if (igmp->response_time == 0) {
792 			last_igmpv1 = now;
793 		} else {
794 			interval = (igmp->response_time * TICKS_PER_SEC)/10;
795 		}
796 
797 #ifdef	MDEBUG
798 		printf("Received IGMP query for: %@\n", igmp->group.s_addr);
799 #endif
800 		for(i = 0; i < MAX_IGMP; i++) {
801 			uint32_t group = igmptable[i].group.s_addr;
802 			if ((group == 0) || (group == igmp->group.s_addr)) {
803 				unsigned long time;
804 				time = currticks() + rfc1112_sleep_interval(interval, 0);
805 				if (time < igmptable[i].time) {
806 					igmptable[i].time = time;
807 				}
808 			}
809 		}
810 	}
811 	if (((igmp->type == IGMPv1_REPORT) || (igmp->type == IGMPv2_REPORT)) &&
812 		(ip->dest.s_addr == igmp->group.s_addr)) {
813 #ifdef	MDEBUG
814 		printf("Received IGMP report for: %@\n", igmp->group.s_addr);
815 #endif
816 		for(i = 0; i < MAX_IGMP; i++) {
817 			if ((igmptable[i].group.s_addr == igmp->group.s_addr) &&
818 				igmptable[i].time != 0) {
819 				igmptable[i].time = 0;
820 			}
821 		}
822 	}
823 }
824 
leave_group(int slot)825 void leave_group(int slot)
826 {
827 	/* Be very stupid and always send a leave group message if
828 	 * I have subscribed.  Imperfect but it is standards
829 	 * compliant, easy and reliable to implement.
830 	 *
831 	 * The optimal group leave method is to only send leave when,
832 	 * we were the last host to respond to a query on this group,
833 	 * and igmpv1 compatibility is not enabled.
834 	 */
835 	if (igmptable[slot].group.s_addr) {
836 		struct igmp_ip_t igmp;
837 		igmp.router_alert[0] = 0x94;
838 		igmp.router_alert[1] = 0x04;
839 		igmp.router_alert[2] = 0;
840 		igmp.router_alert[3] = 0;
841 		build_ip_hdr(htonl(GROUP_ALL_HOSTS),
842 			1, IP_IGMP, sizeof(igmp.router_alert), sizeof(igmp), &igmp);
843 		igmp.igmp.type = IGMP_LEAVE;
844 		igmp.igmp.response_time = 0;
845 		igmp.igmp.chksum = 0;
846 		igmp.igmp.group.s_addr = igmptable[slot].group.s_addr;
847 		igmp.igmp.chksum = ipchksum(&igmp.igmp, sizeof(igmp));
848 		ip_transmit(sizeof(igmp), &igmp);
849 #ifdef	MDEBUG
850 		printf("Sent IGMP leave for: %@\n", igmp.igmp.group.s_addr);
851 #endif
852 	}
853 	memset(&igmptable[slot], 0, sizeof(igmptable[0]));
854 }
855 
join_group(int slot,unsigned long group)856 void join_group(int slot, unsigned long group)
857 {
858 	/* I have already joined */
859 	if (igmptable[slot].group.s_addr == group)
860 		return;
861 	if (igmptable[slot].group.s_addr) {
862 		leave_group(slot);
863 	}
864 	/* Only join a group if we are given a multicast ip, this way
865 	 * code can be given a non-multicast (broadcast or unicast ip)
866 	 * and still work...
867 	 */
868 	if ((group & htonl(MULTICAST_MASK)) == htonl(MULTICAST_NETWORK)) {
869 		igmptable[slot].group.s_addr = group;
870 		igmptable[slot].time = currticks();
871 	}
872 }
873 #else
874 #define send_igmp_reports(now);
875 #define process_igmp(ip, now)
876 #endif
877 
878 /**************************************************************************
879 AWAIT_REPLY - Wait until we get a response for our request
880 ************f**************************************************************/
await_reply(reply_t reply,int ival,void * ptr,long timeout)881 int await_reply(reply_t reply, int ival, void *ptr, long timeout)
882 {
883 	unsigned long time, now;
884 	struct	iphdr *ip;
885 	unsigned iplen = 0;
886 	struct	udphdr *udp;
887 	unsigned short ptype;
888 	int result;
889 
890 	user_abort = 0;
891 
892 	time = timeout + currticks();
893 	/* The timeout check is done below.  The timeout is only checked if
894 	 * there is no packet in the Rx queue.  This assumes that eth_poll()
895 	 * needs a negligible amount of time.
896 	 */
897 	for (;;) {
898 		now = currticks();
899 		send_igmp_reports(now);
900 		result = eth_poll(1);
901 		if (result == 0) {
902 			/* We don't have anything */
903 
904 			/* Check for abort key only if the Rx queue is empty -
905 			 * as long as we have something to process, don't
906 			 * assume that something failed.  It is unlikely that
907 			 * we have no processing time left between packets.  */
908 			poll_interruptions();
909 			/* Do the timeout after at least a full queue walk.  */
910 			if ((timeout == 0) || (currticks() > time) || user_abort == 1) {
911 				break;
912 			}
913 			continue;
914 		}
915 
916 		/* We have something! */
917 
918 		/* Find the Ethernet packet type */
919 		if (nic.packetlen >= ETH_HLEN) {
920 			ptype = ((unsigned short) nic.packet[12]) << 8
921 				| ((unsigned short) nic.packet[13]);
922 		} else continue; /* what else could we do with it? */
923 		/* Verify an IP header */
924 		ip = 0;
925 		if ((ptype == IP) && (nic.packetlen >= ETH_HLEN + sizeof(struct iphdr))) {
926 			unsigned ipoptlen;
927 			ip = (struct iphdr *)&nic.packet[ETH_HLEN];
928 			if ((ip->verhdrlen < 0x45) || (ip->verhdrlen > 0x4F))
929 				continue;
930 			iplen = (ip->verhdrlen & 0xf) * 4;
931 			if (ipchksum(ip, iplen) != 0)
932 				continue;
933 			if (ip->frags & htons(0x3FFF)) {
934 				static int warned_fragmentation = 0;
935 				if (!warned_fragmentation) {
936 					printf("ALERT: got a fragmented packet - reconfigure your server\n");
937 					warned_fragmentation = 1;
938 				}
939 				continue;
940 			}
941 			if (ntohs(ip->len) > ETH_MAX_MTU)
942 				continue;
943 
944 			ipoptlen = iplen - sizeof(struct iphdr);
945 			if (ipoptlen) {
946 				/* Delete the ip options, to guarantee
947 				 * good alignment, and make etherboot simpler.
948 				 */
949 				memmove(&nic.packet[ETH_HLEN + sizeof(struct iphdr)],
950 					&nic.packet[ETH_HLEN + iplen],
951 					nic.packetlen - ipoptlen);
952 				nic.packetlen -= ipoptlen;
953 			}
954 		}
955 		udp = 0;
956 		if (ip && (ip->protocol == IP_UDP) &&
957 		    (nic.packetlen >= ETH_HLEN + sizeof(struct iphdr) + sizeof(struct udphdr))) {
958 			udp = (struct udphdr *)&nic.packet[ETH_HLEN + sizeof(struct iphdr)];
959 
960 			/* Make certain we have a reasonable packet length */
961 			if (ntohs(udp->len) > (ntohs(ip->len) - iplen))
962 				continue;
963 
964 			if (udp->chksum && udpchksum(ip, udp)) {
965 				printf("UDP checksum error\n");
966 				continue;
967 			}
968 		}
969 		result = reply(ival, ptr, ptype, ip, udp);
970 		if (result > 0) {
971 			return result;
972 		}
973 
974 		/* If it isn't a packet the upper layer wants see if there is a default
975 		 * action.  This allows us reply to arp and igmp queryies.
976 		 */
977 		if ((ptype == ARP) &&
978 		    (nic.packetlen >= ETH_HLEN + sizeof(struct arprequest))) {
979 			struct	arprequest *arpreply;
980 			unsigned long tmp;
981 
982 			arpreply = (struct arprequest *)&nic.packet[ETH_HLEN];
983 			memcpy(&tmp, arpreply->tipaddr, sizeof(in_addr));
984 			if ((arpreply->opcode == htons(ARP_REQUEST)) &&
985 			    (tmp == arptable[ARP_CLIENT].ipaddr.s_addr)) {
986 				arpreply->opcode = htons(ARP_REPLY);
987 				memcpy(arpreply->tipaddr, arpreply->sipaddr, sizeof(in_addr));
988 				memcpy(arpreply->thwaddr, arpreply->shwaddr, ETH_ALEN);
989 				memcpy(arpreply->sipaddr, &arptable[ARP_CLIENT].ipaddr, sizeof(in_addr));
990 				memcpy(arpreply->shwaddr, arptable[ARP_CLIENT].node, ETH_ALEN);
991 				eth_transmit(arpreply->thwaddr, ARP,
992 					     sizeof(struct  arprequest),
993 					     arpreply);
994 #ifdef	MDEBUG
995 				memcpy(&tmp, arpreply->tipaddr, sizeof(in_addr));
996 				printf("Sent ARP reply to: %@\n",tmp);
997 #endif	/* MDEBUG */
998 			}
999 		}
1000 		process_igmp(ip, now);
1001 	}
1002 	return(0);
1003 }
1004 
1005 #ifdef	REQUIRE_VCI_ETHERBOOT
1006 /**************************************************************************
1007 FIND_VCI_ETHERBOOT - Looks for "Etherboot" in Vendor Encapsulated Identifiers
1008 On entry p points to byte count of VCI options
1009 **************************************************************************/
find_vci_etherboot(unsigned char * p)1010 static int find_vci_etherboot(unsigned char *p)
1011 {
1012 	unsigned char	*end = p + 1 + *p;
1013 
1014 	for (p++; p < end; ) {
1015 		if (*p == RFC2132_VENDOR_CLASS_ID) {
1016 			if (strncmp("Etherboot", p + 2, sizeof("Etherboot") - 1) == 0)
1017 				return (1);
1018 		} else if (*p == RFC1533_END)
1019 			return (0);
1020 		p += TAG_LEN(p) + 2;
1021 	}
1022 	return (0);
1023 }
1024 #endif	/* REQUIRE_VCI_ETHERBOOT */
1025 
1026 /**
1027  * decode_rfc1533
1028  *
1029  * Decodes RFC1533 header
1030  **/
decode_rfc1533(unsigned char * p,unsigned int block,unsigned int len,int eof)1031 int decode_rfc1533(unsigned char *p, unsigned int block, unsigned int len, int eof)
1032 {
1033 	static unsigned char *extdata = NULL, *extend = NULL;
1034 	unsigned char        *extpath = NULL;
1035 	unsigned char        *endp;
1036 
1037 	if (block == 0) {
1038 		end_of_rfc1533 = NULL;
1039 		if (memcmp(p, rfc1533_cookie, sizeof(rfc1533_cookie)))
1040 			return(0); /* no RFC 1533 header found */
1041 		p += 4;
1042 		endp = p + len;
1043 	} else {
1044 		if (block == 1) {
1045 			if (memcmp(p, rfc1533_cookie, sizeof(rfc1533_cookie)))
1046 				return(0); /* no RFC 1533 header found */
1047 			p += 4;
1048 			len -= 4; }
1049 		if (extend + len <= (unsigned char *)
1050 		    rfc1533_venddata + sizeof(rfc1533_venddata)) {
1051 			memcpy(extend, p, len);
1052 			extend += len;
1053 		} else {
1054 			printf("Overflow in vendor data buffer! Aborting...\n");
1055 			*extdata = RFC1533_END;
1056 			return(0);
1057 		}
1058 		p = extdata; endp = extend;
1059 	}
1060 	if (!eof)
1061 		return 1;
1062 	while (p < endp) {
1063 		unsigned char c = *p;
1064 		if (c == RFC1533_PAD) {
1065 			p++;
1066 			continue;
1067 		}
1068 		else if (c == RFC1533_END) {
1069 			end_of_rfc1533 = endp = p;
1070 			continue;
1071 		}
1072 		else if (c == RFC1533_NETMASK)
1073 			memcpy(&netmask, p+2, sizeof(in_addr));
1074 		else if (c == RFC1533_GATEWAY) {
1075 			/* This is a little simplistic, but it will
1076 			   usually be sufficient.
1077 			   Take only the first entry */
1078 			if (TAG_LEN(p) >= sizeof(in_addr))
1079 				memcpy(&arptable[ARP_GATEWAY].ipaddr, p+2, sizeof(in_addr));
1080 		}
1081 		else if (c == RFC1533_EXTENSIONPATH)
1082 			extpath = p;
1083 		else if (c == RFC2132_MSG_TYPE)
1084 			dhcp_reply=*(p+2);
1085 		else if (c == RFC2132_SRV_ID)
1086 			memcpy(&dhcp_server, p+2, sizeof(in_addr));
1087 		else if (c == RFC1533_HOSTNAME) {
1088 			hostname = p + 2;
1089 			hostnamelen = *(p + 1);
1090 		}
1091 		else if (c == RFC1533_VENDOR_CONFIGFILE){
1092 			int l = TAG_LEN (p);
1093 
1094 			/* Eliminate the trailing NULs according to RFC 2132.  */
1095 			while (*(p + 2 + l - 1) == '\000' && l > 0)
1096 				l--;
1097 
1098 			/* XXX: Should check if LEN is less than the maximum length
1099 			   of CONFIG_FILE. This kind of robustness will be a goal
1100 			   in GRUB 1.0.  */
1101 			memcpy (config_file, p + 2, l);
1102 			config_file[l] = 0;
1103 			vendor_configfile = p + 2;
1104 			vendor_configfile_len = l;
1105 			configfile_origin = CFG_150;
1106 		}
1107 		else {
1108 			;
1109 		}
1110 		p += TAG_LEN(p) + 2;
1111 	}
1112 	extdata = extend = endp;
1113 	if (block <= 0 && extpath != NULL) {
1114 		char fname[64];
1115 		if (TAG_LEN(extpath) >= sizeof(fname)){
1116 			printf("Overflow in vendor data buffer! Aborting...\n");
1117 			*extdata = RFC1533_END;
1118 			return(0);
1119 		}
1120 		memcpy(fname, extpath+2, TAG_LEN(extpath));
1121 		fname[(int)TAG_LEN(extpath)] = '\0';
1122 		printf("Loading BOOTP-extension file: %s\n",fname);
1123 		tftp_file_read(fname, decode_rfc1533);
1124 	}
1125 	return 1;	/* proceed with next block */
1126 }
1127 
1128 
1129 /* FIXME double check TWO_SECOND_DIVISOR */
1130 #define TWO_SECOND_DIVISOR (RAND_MAX/TICKS_PER_SEC)
1131 /**************************************************************************
1132 RFC2131_SLEEP_INTERVAL - sleep for expotentially longer times (base << exp) +- 1 sec)
1133 **************************************************************************/
rfc2131_sleep_interval(long base,int exp)1134 long rfc2131_sleep_interval(long base, int exp)
1135 {
1136 	unsigned long tmo;
1137 #ifdef BACKOFF_LIMIT
1138 	if (exp > BACKOFF_LIMIT)
1139 		exp = BACKOFF_LIMIT;
1140 #endif
1141 	tmo = (base << exp) + (TICKS_PER_SEC - (random()/TWO_SECOND_DIVISOR));
1142 	return tmo;
1143 }
1144 
1145 #ifdef MULTICAST_LEVEL2
1146 /**************************************************************************
1147 RFC1112_SLEEP_INTERVAL - sleep for expotentially longer times, up to (base << exp)
1148 **************************************************************************/
rfc1112_sleep_interval(long base,int exp)1149 long rfc1112_sleep_interval(long base, int exp)
1150 {
1151 	unsigned long divisor, tmo;
1152 #ifdef BACKOFF_LIMIT
1153 	if (exp > BACKOFF_LIMIT)
1154 		exp = BACKOFF_LIMIT;
1155 #endif
1156 	divisor = RAND_MAX/(base << exp);
1157 	tmo = random()/divisor;
1158 	return tmo;
1159 }
1160 #endif /* MULTICAST_LEVEL_2 */
1161 /* ifconfig - configure network interface.  */
1162 int
ifconfig(char * ip,char * sm,char * gw,char * svr)1163 ifconfig (char *ip, char *sm, char *gw, char *svr)
1164 {
1165   in_addr tmp;
1166 
1167   if (sm)
1168     {
1169       if (! inet_aton (sm, &tmp))
1170 	return 0;
1171 
1172       netmask = tmp.s_addr;
1173     }
1174 
1175   if (ip)
1176     {
1177       if (! inet_aton (ip, &arptable[ARP_CLIENT].ipaddr))
1178 	return 0;
1179 
1180       if (! netmask && ! sm)
1181 	netmask = default_netmask ();
1182     }
1183 
1184   if (gw && ! inet_aton (gw, &arptable[ARP_GATEWAY].ipaddr))
1185     return 0;
1186 
1187   /* Clear out the ARP entry.  */
1188   grub_memset (arptable[ARP_GATEWAY].node, 0, ETH_ALEN);
1189 
1190   if (svr && ! inet_aton (svr, &arptable[ARP_SERVER].ipaddr))
1191     return 0;
1192 
1193   /* Likewise.  */
1194   grub_memset (arptable[ARP_SERVER].node, 0, ETH_ALEN);
1195 
1196   if (ip || sm)
1197     {
1198       if (IP_BROADCAST == (netmask | arptable[ARP_CLIENT].ipaddr.s_addr)
1199 	  || netmask == (netmask | arptable[ARP_CLIENT].ipaddr.s_addr)
1200 	  || ! netmask)
1201 	network_ready = 0;
1202       else
1203 	network_ready = 1;
1204     }
1205 
1206   update_network_configuration();
1207   return 1;
1208 }
1209 
1210 /*
1211  * print_network_configuration
1212  *
1213  * Output the network configuration. It may broke the graphic console now.:-(
1214  */
print_network_configuration(void)1215 void print_network_configuration (void)
1216 {
1217 	EnterFunction("print_network_configuration");
1218 	if (! network_ready)
1219 		grub_printf ("Network interface not initialized yet.\n");
1220 	else {
1221 		if (hostnamelen == 0)
1222 			etherboot_printf ("Hostname: not set\n");
1223 		else
1224 			etherboot_printf ("Hostname: %s\n", hostname);
1225 
1226 		etherboot_printf ("Address: %@\n", arptable[ARP_CLIENT].ipaddr.s_addr);
1227 		etherboot_printf ("Netmask: %@\n", netmask);
1228 		etherboot_printf ("Gateway: %@\n", arptable[ARP_GATEWAY].ipaddr.s_addr);
1229 		etherboot_printf ("Server: %@\n", arptable[ARP_SERVER].ipaddr.s_addr);
1230 		if (vendor_configfile == NULL) {
1231 			etherboot_printf ("Site Option 150: not set\n");
1232 		} else {
1233 			/*
1234 			 * vendor_configfile points into the packet and
1235 			 * is not NULL terminated, so it needs to be
1236 			 * patched up before printing it out
1237 			 */
1238 			char c = vendor_configfile[vendor_configfile_len];
1239 			vendor_configfile[vendor_configfile_len] = '\0';
1240 			etherboot_printf ("Site Option 150: %s\n",
1241 			    vendor_configfile);
1242 			vendor_configfile[vendor_configfile_len] = c;
1243 		}
1244 
1245 		if (bootfile == NULL)
1246 			etherboot_printf ("BootFile: not set\n");
1247 		else
1248 			etherboot_printf ("BootFile: %s\n", bootfile);
1249 
1250 		etherboot_printf ("GRUB menu file: %s", config_file);
1251 		switch (configfile_origin) {
1252 		case CFG_HARDCODED:
1253 			etherboot_printf (" from hardcoded default\n");
1254 			break;
1255 		case CFG_150:
1256 			etherboot_printf (" from Site Option 150\n");
1257 			break;
1258 		case CFG_MAC:
1259 			etherboot_printf (" inferred from system MAC\n");
1260 			break;
1261 		case CFG_BOOTFILE:
1262 			etherboot_printf (" inferred from BootFile\n");
1263 			break;
1264 		default:
1265 			etherboot_printf ("\n");
1266 		}
1267 	}
1268 	LeaveFunction("print_network_configuration");
1269 }
1270 
1271 /*
1272  * update_network_configuration
1273  *
1274  * Update network configuration for diskless clients (Solaris only)
1275  */
update_network_configuration(void)1276 static void update_network_configuration (void)
1277 {
1278 #ifdef SOLARIS_NETBOOT
1279   	struct sol_netinfo {
1280 	  	uint8_t sn_infotype;
1281 		uint8_t sn_mactype;
1282 		uint8_t sn_maclen;
1283 	  	uint8_t sn_padding;
1284 		unsigned long sn_ciaddr;
1285 		unsigned long sn_siaddr;
1286 		unsigned long sn_giaddr;
1287 		unsigned long sn_netmask;
1288 		uint8_t sn_macaddr[1];
1289 	} *sip;
1290 
1291 	if (! network_ready)
1292 	  	return;
1293 
1294 	sip = (struct sol_netinfo *)dhcpack_buf;
1295 	sip->sn_infotype = 0xf0;	/* something not BOOTP_REPLY */
1296 	sip->sn_mactype = 4;		/* DL_ETHER */
1297 	sip->sn_maclen = ETH_ALEN;
1298 	sip->sn_ciaddr = arptable[ARP_CLIENT].ipaddr.s_addr;
1299 	sip->sn_siaddr = arptable[ARP_SERVER].ipaddr.s_addr;
1300 	sip->sn_giaddr = arptable[ARP_GATEWAY].ipaddr.s_addr;
1301 	sip->sn_netmask = netmask;
1302 	memcpy(sip->sn_macaddr, arptable[ARP_CLIENT].node, ETH_ALEN);
1303 	dhcpack_length = sizeof (*sip) + sip->sn_maclen - 1;
1304 #endif /* SOLARIS_NETBOOT */
1305 }
1306 
1307 /**
1308  * cleanup_net
1309  *
1310  * Mark network unusable, and disable NICs
1311  */
cleanup_net(void)1312 void cleanup_net (void)
1313 {
1314 	if (network_ready){
1315 		/* Stop receiving packets.  */
1316 		if (use_bios_pxe)
1317 			undi_pxe_disable();
1318 		else
1319 			eth_disable ();
1320 		network_ready = 0;
1321 	}
1322 }
1323 
1324 /*******************************************************************
1325  * dhcp implementation reusing the BIOS pxe stack
1326  */
1327 static void
dhcp_copy(struct dhcp_t * dhcpreply)1328 dhcp_copy(struct dhcp_t *dhcpreply)
1329 {
1330 	unsigned long time;
1331 	int ret, len = DHCP_OPT_LEN;
1332 
1333 	/* fill in netinfo */
1334 	dhcpack_length = sizeof (struct dhcp_t);
1335 	memcpy((char *)dhcpack_buf, (char *)dhcpreply, dhcpack_length);
1336 
1337 	memcpy(arptable[ARP_CLIENT].node, dhcpreply->bp_hwaddr, ETH_ALEN);
1338 	arptable[ARP_CLIENT].ipaddr.s_addr = dhcpreply->bp_yiaddr.s_addr;
1339 	dhcp_addr.s_addr = dhcpreply->bp_yiaddr.s_addr;
1340 	netmask = default_netmask();
1341 	arptable[ARP_SERVER].ipaddr.s_addr = dhcpreply->bp_siaddr.s_addr;
1342 	memset(arptable[ARP_SERVER].node, 0, ETH_ALEN);  /* Kill arp */
1343 	arptable[ARP_GATEWAY].ipaddr.s_addr = dhcpreply->bp_giaddr.s_addr;
1344 	memset(arptable[ARP_GATEWAY].node, 0, ETH_ALEN);  /* Kill arp */
1345 	bootfile = dhcpreply->bp_file;
1346 	memcpy((char *)rfc1533_venddata, (char *)(dhcpreply->bp_vend), len);
1347 	decode_rfc1533(rfc1533_venddata, 0, len, 1);
1348 }
1349 
dhcp_undi(void)1350 int dhcp_undi(void)
1351 {
1352 	struct dhcp_t *dhcpreply;
1353 
1354 	if (!undi_bios_pxe((void **)&dhcpreply))
1355 		return 0;
1356 
1357 	dhcp_copy(dhcpreply);
1358 	network_ready = 1;
1359 	use_bios_pxe = 1;
1360 	return (1);
1361 }
1362