1 /*- 2 * Copyright (c) 1995 Gordon Ross, Adam Glass 3 * Copyright (c) 1992 Regents of the University of California. 4 * All rights reserved. 5 * 6 * This software was developed by the Computer Systems Engineering group 7 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and 8 * contributed to Berkeley. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the University of 21 * California, Lawrence Berkeley Laboratory and its contributors. 22 * 4. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 * 38 * based on: 39 * nfs/krpc_subr.c 40 * $NetBSD: krpc_subr.c,v 1.10 1995/08/08 20:43:43 gwr Exp $ 41 */ 42 43 #include <sys/cdefs.h> 44 __FBSDID("$FreeBSD$"); 45 46 #include "opt_bootp.h" 47 #include "opt_nfs.h" 48 49 #include <sys/param.h> 50 #include <sys/systm.h> 51 #include <sys/jail.h> 52 #include <sys/kernel.h> 53 #include <sys/sockio.h> 54 #include <sys/malloc.h> 55 #include <sys/mount.h> 56 #include <sys/mbuf.h> 57 #include <sys/proc.h> 58 #include <sys/socket.h> 59 #include <sys/socketvar.h> 60 #include <sys/sysctl.h> 61 #include <sys/uio.h> 62 63 #include <net/if.h> 64 #include <net/route.h> 65 66 #include <netinet/in.h> 67 #include <netinet/in_var.h> 68 #include <net/if_types.h> 69 #include <net/if_dl.h> 70 #include <net/vnet.h> 71 72 #include <nfs/nfsproto.h> 73 #include <nfsclient/nfs.h> 74 #include <nfs/nfsdiskless.h> 75 #include <nfs/krpc.h> 76 #include <nfs/xdr_subs.h> 77 78 79 #define BOOTP_MIN_LEN 300 /* Minimum size of bootp udp packet */ 80 81 #ifndef BOOTP_SETTLE_DELAY 82 #define BOOTP_SETTLE_DELAY 3 83 #endif 84 85 /* 86 * What is the longest we will wait before re-sending a request? 87 * Note this is also the frequency of "RPC timeout" messages. 88 * The re-send loop count sup linearly to this maximum, so the 89 * first complaint will happen after (1+2+3+4+5)=15 seconds. 90 */ 91 #define MAX_RESEND_DELAY 5 /* seconds */ 92 93 /* Definitions from RFC951 */ 94 struct bootp_packet { 95 u_int8_t op; 96 u_int8_t htype; 97 u_int8_t hlen; 98 u_int8_t hops; 99 u_int32_t xid; 100 u_int16_t secs; 101 u_int16_t flags; 102 struct in_addr ciaddr; 103 struct in_addr yiaddr; 104 struct in_addr siaddr; 105 struct in_addr giaddr; 106 unsigned char chaddr[16]; 107 char sname[64]; 108 char file[128]; 109 unsigned char vend[1222]; 110 }; 111 112 struct bootpc_ifcontext { 113 STAILQ_ENTRY(bootpc_ifcontext) next; 114 struct bootp_packet call; 115 struct bootp_packet reply; 116 int replylen; 117 int overload; 118 union { 119 struct ifreq _ifreq; 120 struct in_aliasreq _in_alias_req; 121 } _req; 122 #define ireq _req._ifreq 123 #define iareq _req._in_alias_req 124 struct ifnet *ifp; 125 struct sockaddr_dl *sdl; 126 struct sockaddr_in myaddr; 127 struct sockaddr_in netmask; 128 struct sockaddr_in gw; 129 int gotgw; 130 int gotnetmask; 131 int gotrootpath; 132 int outstanding; 133 int sentmsg; 134 u_int32_t xid; 135 enum { 136 IF_BOOTP_UNRESOLVED, 137 IF_BOOTP_RESOLVED, 138 IF_BOOTP_FAILED, 139 IF_DHCP_UNRESOLVED, 140 IF_DHCP_OFFERED, 141 IF_DHCP_RESOLVED, 142 IF_DHCP_FAILED, 143 } state; 144 int dhcpquerytype; /* dhcp type sent */ 145 struct in_addr dhcpserver; 146 int gotdhcpserver; 147 }; 148 149 #define TAG_MAXLEN 1024 150 struct bootpc_tagcontext { 151 char buf[TAG_MAXLEN + 1]; 152 int overload; 153 int badopt; 154 int badtag; 155 int foundopt; 156 int taglen; 157 }; 158 159 struct bootpc_globalcontext { 160 STAILQ_HEAD(, bootpc_ifcontext) interfaces; 161 u_int32_t xid; 162 int gotrootpath; 163 int gotgw; 164 int ifnum; 165 int secs; 166 int starttime; 167 struct bootp_packet reply; 168 int replylen; 169 struct bootpc_ifcontext *setrootfs; 170 struct bootpc_ifcontext *sethostname; 171 struct bootpc_tagcontext tmptag; 172 struct bootpc_tagcontext tag; 173 }; 174 175 #define IPPORT_BOOTPC 68 176 #define IPPORT_BOOTPS 67 177 178 #define BOOTP_REQUEST 1 179 #define BOOTP_REPLY 2 180 181 /* Common tags */ 182 #define TAG_PAD 0 /* Pad option, implicit length 1 */ 183 #define TAG_SUBNETMASK 1 /* RFC 950 subnet mask */ 184 #define TAG_ROUTERS 3 /* Routers (in order of preference) */ 185 #define TAG_HOSTNAME 12 /* Client host name */ 186 #define TAG_ROOT 17 /* Root path */ 187 188 /* DHCP specific tags */ 189 #define TAG_OVERLOAD 52 /* Option Overload */ 190 #define TAG_MAXMSGSIZE 57 /* Maximum DHCP Message Size */ 191 192 #define TAG_END 255 /* End Option (i.e. no more options) */ 193 194 /* Overload values */ 195 #define OVERLOAD_FILE 1 196 #define OVERLOAD_SNAME 2 197 198 /* Site specific tags: */ 199 #define TAG_ROOTOPTS 130 200 #define TAG_COOKIE 134 /* ascii info for userland, via sysctl */ 201 202 #define TAG_DHCP_MSGTYPE 53 203 #define TAG_DHCP_REQ_ADDR 50 204 #define TAG_DHCP_SERVERID 54 205 #define TAG_DHCP_LEASETIME 51 206 207 #define TAG_VENDOR_INDENTIFIER 60 208 209 #define DHCP_NOMSG 0 210 #define DHCP_DISCOVER 1 211 #define DHCP_OFFER 2 212 #define DHCP_REQUEST 3 213 #define DHCP_ACK 5 214 215 /* NFS read/write block size */ 216 #ifndef BOOTP_BLOCKSIZE 217 #define BOOTP_BLOCKSIZE 8192 218 #endif 219 220 static char bootp_cookie[128]; 221 static struct socket *bootp_so; 222 SYSCTL_STRING(_kern, OID_AUTO, bootp_cookie, CTLFLAG_RD, 223 bootp_cookie, 0, "Cookie (T134) supplied by bootp server"); 224 225 /* mountd RPC */ 226 static int md_mount(struct sockaddr_in *mdsin, char *path, u_char *fhp, 227 int *fhsizep, struct nfs_args *args, struct thread *td); 228 static int setfs(struct sockaddr_in *addr, char *path, char *p, 229 const struct in_addr *siaddr); 230 static int getdec(char **ptr); 231 static int getip(char **ptr, struct in_addr *ip); 232 static void mountopts(struct nfs_args *args, char *p); 233 static int xdr_opaque_decode(struct mbuf **ptr, u_char *buf, int len); 234 static int xdr_int_decode(struct mbuf **ptr, int *iptr); 235 static void print_in_addr(struct in_addr addr); 236 static void print_sin_addr(struct sockaddr_in *addr); 237 static void clear_sinaddr(struct sockaddr_in *sin); 238 static void allocifctx(struct bootpc_globalcontext *gctx); 239 static void bootpc_compose_query(struct bootpc_ifcontext *ifctx, 240 struct thread *td); 241 static unsigned char *bootpc_tag(struct bootpc_tagcontext *tctx, 242 struct bootp_packet *bp, int len, int tag); 243 static void bootpc_tag_helper(struct bootpc_tagcontext *tctx, 244 unsigned char *start, int len, int tag); 245 246 #ifdef BOOTP_DEBUG 247 void bootpboot_p_sa(struct sockaddr *sa, struct sockaddr *ma); 248 void bootpboot_p_rtentry(struct rtentry *rt); 249 void bootpboot_p_tree(struct radix_node *rn); 250 void bootpboot_p_rtlist(void); 251 void bootpboot_p_if(struct ifnet *ifp, struct ifaddr *ifa); 252 void bootpboot_p_iflist(void); 253 #endif 254 255 static int bootpc_call(struct bootpc_globalcontext *gctx, 256 struct thread *td); 257 258 static void bootpc_fakeup_interface(struct bootpc_ifcontext *ifctx, 259 struct thread *td); 260 261 static int bootpc_adjust_interface(struct bootpc_ifcontext *ifctx, 262 struct bootpc_globalcontext *gctx, struct thread *td); 263 264 static void bootpc_decode_reply(struct nfsv3_diskless *nd, 265 struct bootpc_ifcontext *ifctx, 266 struct bootpc_globalcontext *gctx); 267 268 static int bootpc_received(struct bootpc_globalcontext *gctx, 269 struct bootpc_ifcontext *ifctx); 270 271 static __inline int bootpc_ifctx_isresolved(struct bootpc_ifcontext *ifctx); 272 static __inline int bootpc_ifctx_isunresolved(struct bootpc_ifcontext *ifctx); 273 static __inline int bootpc_ifctx_isfailed(struct bootpc_ifcontext *ifctx); 274 275 /* 276 * In order to have multiple active interfaces with address 0.0.0.0 277 * and be able to send data to a selected interface, we first set 278 * mask to /8 on all interfaces, and temporarily set it to /0 when 279 * doing sosend(). 280 */ 281 282 #ifdef BOOTP_DEBUG 283 void 284 bootpboot_p_sa(struct sockaddr *sa, struct sockaddr *ma) 285 { 286 287 if (sa == NULL) { 288 printf("(sockaddr *) <null>"); 289 return; 290 } 291 switch (sa->sa_family) { 292 case AF_INET: 293 { 294 struct sockaddr_in *sin; 295 296 sin = (struct sockaddr_in *) sa; 297 printf("inet "); 298 print_sin_addr(sin); 299 if (ma != NULL) { 300 sin = (struct sockaddr_in *) ma; 301 printf(" mask "); 302 print_sin_addr(sin); 303 } 304 } 305 break; 306 case AF_LINK: 307 { 308 struct sockaddr_dl *sli; 309 int i; 310 311 sli = (struct sockaddr_dl *) sa; 312 printf("link %.*s ", sli->sdl_nlen, sli->sdl_data); 313 for (i = 0; i < sli->sdl_alen; i++) { 314 if (i > 0) 315 printf(":"); 316 printf("%x", ((unsigned char *) LLADDR(sli))[i]); 317 } 318 } 319 break; 320 default: 321 printf("af%d", sa->sa_family); 322 } 323 } 324 325 void 326 bootpboot_p_rtentry(struct rtentry *rt) 327 { 328 329 bootpboot_p_sa(rt_key(rt), rt_mask(rt)); 330 printf(" "); 331 bootpboot_p_sa(rt->rt_gateway, NULL); 332 printf(" "); 333 printf("flags %x", (unsigned short) rt->rt_flags); 334 printf(" %d", (int) rt->rt_rmx.rmx_expire); 335 printf(" %s\n", rt->rt_ifp->if_xname); 336 } 337 338 void 339 bootpboot_p_tree(struct radix_node *rn) 340 { 341 342 while (rn != NULL) { 343 if (rn->rn_bit < 0) { 344 if ((rn->rn_flags & RNF_ROOT) != 0) { 345 } else { 346 bootpboot_p_rtentry((struct rtentry *) rn); 347 } 348 rn = rn->rn_dupedkey; 349 } else { 350 bootpboot_p_tree(rn->rn_left); 351 bootpboot_p_tree(rn->rn_right); 352 return; 353 } 354 } 355 } 356 357 void 358 bootpboot_p_rtlist(void) 359 { 360 struct radix_node_head *rnh; 361 362 printf("Routing table:\n"); 363 rnh = rt_tables_get_rnh(0, AF_INET); 364 if (rnh == NULL) 365 return; 366 RADIX_NODE_HEAD_RLOCK(rnh); /* could sleep XXX */ 367 bootpboot_p_tree(rnh->rnh_treetop); 368 RADIX_NODE_HEAD_RUNLOCK(rnh); 369 } 370 371 void 372 bootpboot_p_if(struct ifnet *ifp, struct ifaddr *ifa) 373 { 374 375 printf("%s flags %x, addr ", 376 ifp->if_xname, ifp->if_flags); 377 print_sin_addr((struct sockaddr_in *) ifa->ifa_addr); 378 printf(", broadcast "); 379 print_sin_addr((struct sockaddr_in *) ifa->ifa_dstaddr); 380 printf(", netmask "); 381 print_sin_addr((struct sockaddr_in *) ifa->ifa_netmask); 382 printf("\n"); 383 } 384 385 void 386 bootpboot_p_iflist(void) 387 { 388 struct ifnet *ifp; 389 struct ifaddr *ifa; 390 391 printf("Interface list:\n"); 392 IFNET_RLOCK(); 393 for (ifp = TAILQ_FIRST(&V_ifnet); 394 ifp != NULL; 395 ifp = TAILQ_NEXT(ifp, if_link)) { 396 for (ifa = TAILQ_FIRST(&ifp->if_addrhead); 397 ifa != NULL; 398 ifa = TAILQ_NEXT(ifa, ifa_link)) 399 if (ifa->ifa_addr->sa_family == AF_INET) 400 bootpboot_p_if(ifp, ifa); 401 } 402 IFNET_RUNLOCK(); 403 } 404 #endif /* defined(BOOTP_DEBUG) */ 405 406 static void 407 clear_sinaddr(struct sockaddr_in *sin) 408 { 409 410 bzero(sin, sizeof(*sin)); 411 sin->sin_len = sizeof(*sin); 412 sin->sin_family = AF_INET; 413 sin->sin_addr.s_addr = INADDR_ANY; /* XXX: htonl(INAADDR_ANY) ? */ 414 sin->sin_port = 0; 415 } 416 417 static void 418 allocifctx(struct bootpc_globalcontext *gctx) 419 { 420 struct bootpc_ifcontext *ifctx; 421 422 ifctx = malloc(sizeof(*ifctx), M_TEMP, M_WAITOK | M_ZERO); 423 ifctx->xid = gctx->xid; 424 #ifdef BOOTP_NO_DHCP 425 ifctx->state = IF_BOOTP_UNRESOLVED; 426 #else 427 ifctx->state = IF_DHCP_UNRESOLVED; 428 #endif 429 gctx->xid += 0x100; 430 STAILQ_INSERT_TAIL(&gctx->interfaces, ifctx, next); 431 } 432 433 static __inline int 434 bootpc_ifctx_isresolved(struct bootpc_ifcontext *ifctx) 435 { 436 437 if (ifctx->state == IF_BOOTP_RESOLVED || 438 ifctx->state == IF_DHCP_RESOLVED) 439 return 1; 440 return 0; 441 } 442 443 static __inline int 444 bootpc_ifctx_isunresolved(struct bootpc_ifcontext *ifctx) 445 { 446 447 if (ifctx->state == IF_BOOTP_UNRESOLVED || 448 ifctx->state == IF_DHCP_UNRESOLVED) 449 return 1; 450 return 0; 451 } 452 453 static __inline int 454 bootpc_ifctx_isfailed(struct bootpc_ifcontext *ifctx) 455 { 456 457 if (ifctx->state == IF_BOOTP_FAILED || 458 ifctx->state == IF_DHCP_FAILED) 459 return 1; 460 return 0; 461 } 462 463 static int 464 bootpc_received(struct bootpc_globalcontext *gctx, 465 struct bootpc_ifcontext *ifctx) 466 { 467 unsigned char dhcpreplytype; 468 char *p; 469 470 /* 471 * Need timeout for fallback to less 472 * desirable alternative. 473 */ 474 475 /* This call used for the side effect (badopt flag) */ 476 (void) bootpc_tag(&gctx->tmptag, &gctx->reply, 477 gctx->replylen, 478 TAG_END); 479 480 /* If packet is invalid, ignore it */ 481 if (gctx->tmptag.badopt != 0) 482 return 0; 483 484 p = bootpc_tag(&gctx->tmptag, &gctx->reply, 485 gctx->replylen, TAG_DHCP_MSGTYPE); 486 if (p != NULL) 487 dhcpreplytype = *p; 488 else 489 dhcpreplytype = DHCP_NOMSG; 490 491 switch (ifctx->dhcpquerytype) { 492 case DHCP_DISCOVER: 493 if (dhcpreplytype != DHCP_OFFER /* Normal DHCP offer */ 494 #ifndef BOOTP_FORCE_DHCP 495 && dhcpreplytype != DHCP_NOMSG /* Fallback to BOOTP */ 496 #endif 497 ) 498 return 0; 499 break; 500 case DHCP_REQUEST: 501 if (dhcpreplytype != DHCP_ACK) 502 return 0; 503 case DHCP_NOMSG: 504 break; 505 } 506 507 /* Ignore packet unless it gives us a root tag we didn't have */ 508 509 if ((ifctx->state == IF_BOOTP_RESOLVED || 510 (ifctx->dhcpquerytype == DHCP_DISCOVER && 511 (ifctx->state == IF_DHCP_OFFERED || 512 ifctx->state == IF_DHCP_RESOLVED))) && 513 (bootpc_tag(&gctx->tmptag, &ifctx->reply, 514 ifctx->replylen, 515 TAG_ROOT) != NULL || 516 bootpc_tag(&gctx->tmptag, &gctx->reply, 517 gctx->replylen, 518 TAG_ROOT) == NULL)) 519 return 0; 520 521 bcopy(&gctx->reply, &ifctx->reply, gctx->replylen); 522 ifctx->replylen = gctx->replylen; 523 524 /* XXX: Only reset if 'perfect' response */ 525 if (ifctx->state == IF_BOOTP_UNRESOLVED) 526 ifctx->state = IF_BOOTP_RESOLVED; 527 else if (ifctx->state == IF_DHCP_UNRESOLVED && 528 ifctx->dhcpquerytype == DHCP_DISCOVER) { 529 if (dhcpreplytype == DHCP_OFFER) 530 ifctx->state = IF_DHCP_OFFERED; 531 else 532 ifctx->state = IF_BOOTP_RESOLVED; /* Fallback */ 533 } else if (ifctx->state == IF_DHCP_OFFERED && 534 ifctx->dhcpquerytype == DHCP_REQUEST) 535 ifctx->state = IF_DHCP_RESOLVED; 536 537 538 if (ifctx->dhcpquerytype == DHCP_DISCOVER && 539 ifctx->state != IF_BOOTP_RESOLVED) { 540 p = bootpc_tag(&gctx->tmptag, &ifctx->reply, 541 ifctx->replylen, TAG_DHCP_SERVERID); 542 if (p != NULL && gctx->tmptag.taglen == 4) { 543 memcpy(&ifctx->dhcpserver, p, 4); 544 ifctx->gotdhcpserver = 1; 545 } else 546 ifctx->gotdhcpserver = 0; 547 return 1; 548 } 549 550 ifctx->gotrootpath = (bootpc_tag(&gctx->tmptag, &ifctx->reply, 551 ifctx->replylen, 552 TAG_ROOT) != NULL); 553 ifctx->gotgw = (bootpc_tag(&gctx->tmptag, &ifctx->reply, 554 ifctx->replylen, 555 TAG_ROUTERS) != NULL); 556 ifctx->gotnetmask = (bootpc_tag(&gctx->tmptag, &ifctx->reply, 557 ifctx->replylen, 558 TAG_SUBNETMASK) != NULL); 559 return 1; 560 } 561 562 static int 563 bootpc_call(struct bootpc_globalcontext *gctx, struct thread *td) 564 { 565 struct sockaddr_in *sin, dst; 566 struct uio auio; 567 struct sockopt sopt; 568 struct iovec aio; 569 int error, on, rcvflg, timo, len; 570 time_t atimo; 571 time_t rtimo; 572 struct timeval tv; 573 struct bootpc_ifcontext *ifctx; 574 int outstanding; 575 int gotrootpath; 576 int retry; 577 const char *s; 578 579 tv.tv_sec = 1; 580 tv.tv_usec = 0; 581 bzero(&sopt, sizeof(sopt)); 582 sopt.sopt_dir = SOPT_SET; 583 sopt.sopt_level = SOL_SOCKET; 584 sopt.sopt_name = SO_RCVTIMEO; 585 sopt.sopt_val = &tv; 586 sopt.sopt_valsize = sizeof tv; 587 588 error = sosetopt(bootp_so, &sopt); 589 if (error != 0) 590 goto out; 591 592 /* 593 * Enable broadcast. 594 */ 595 on = 1; 596 sopt.sopt_name = SO_BROADCAST; 597 sopt.sopt_val = &on; 598 sopt.sopt_valsize = sizeof on; 599 600 error = sosetopt(bootp_so, &sopt); 601 if (error != 0) 602 goto out; 603 604 /* 605 * Disable routing. 606 */ 607 608 on = 1; 609 sopt.sopt_name = SO_DONTROUTE; 610 sopt.sopt_val = &on; 611 sopt.sopt_valsize = sizeof on; 612 613 error = sosetopt(bootp_so, &sopt); 614 if (error != 0) 615 goto out; 616 617 /* 618 * Bind the local endpoint to a bootp client port. 619 */ 620 sin = &dst; 621 clear_sinaddr(sin); 622 sin->sin_port = htons(IPPORT_BOOTPC); 623 error = sobind(bootp_so, (struct sockaddr *)sin, td); 624 if (error != 0) { 625 printf("bind failed\n"); 626 goto out; 627 } 628 629 /* 630 * Setup socket address for the server. 631 */ 632 sin = &dst; 633 clear_sinaddr(sin); 634 sin->sin_addr.s_addr = INADDR_BROADCAST; 635 sin->sin_port = htons(IPPORT_BOOTPS); 636 637 /* 638 * Send it, repeatedly, until a reply is received, 639 * but delay each re-send by an increasing amount. 640 * If the delay hits the maximum, start complaining. 641 */ 642 timo = 0; 643 rtimo = 0; 644 for (;;) { 645 646 outstanding = 0; 647 gotrootpath = 0; 648 649 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) { 650 if (bootpc_ifctx_isresolved(ifctx) != 0 && 651 bootpc_tag(&gctx->tmptag, &ifctx->reply, 652 ifctx->replylen, 653 TAG_ROOT) != NULL) 654 gotrootpath = 1; 655 } 656 657 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) { 658 struct in_aliasreq *ifra = &ifctx->iareq; 659 sin = (struct sockaddr_in *)&ifra->ifra_mask; 660 661 ifctx->outstanding = 0; 662 if (bootpc_ifctx_isresolved(ifctx) != 0 && 663 gotrootpath != 0) { 664 continue; 665 } 666 if (bootpc_ifctx_isfailed(ifctx) != 0) 667 continue; 668 669 outstanding++; 670 ifctx->outstanding = 1; 671 672 /* Proceed to next step in DHCP negotiation */ 673 if ((ifctx->state == IF_DHCP_OFFERED && 674 ifctx->dhcpquerytype != DHCP_REQUEST) || 675 (ifctx->state == IF_DHCP_UNRESOLVED && 676 ifctx->dhcpquerytype != DHCP_DISCOVER) || 677 (ifctx->state == IF_BOOTP_UNRESOLVED && 678 ifctx->dhcpquerytype != DHCP_NOMSG)) { 679 ifctx->sentmsg = 0; 680 bootpc_compose_query(ifctx, td); 681 } 682 683 /* Send BOOTP request (or re-send). */ 684 685 if (ifctx->sentmsg == 0) { 686 switch(ifctx->dhcpquerytype) { 687 case DHCP_DISCOVER: 688 s = "DHCP Discover"; 689 break; 690 case DHCP_REQUEST: 691 s = "DHCP Request"; 692 break; 693 case DHCP_NOMSG: 694 default: 695 s = "BOOTP Query"; 696 break; 697 } 698 printf("Sending %s packet from " 699 "interface %s (%*D)\n", 700 s, 701 ifctx->ireq.ifr_name, 702 ifctx->sdl->sdl_alen, 703 (unsigned char *) LLADDR(ifctx->sdl), 704 ":"); 705 ifctx->sentmsg = 1; 706 } 707 708 aio.iov_base = (caddr_t) &ifctx->call; 709 aio.iov_len = sizeof(ifctx->call); 710 711 auio.uio_iov = &aio; 712 auio.uio_iovcnt = 1; 713 auio.uio_segflg = UIO_SYSSPACE; 714 auio.uio_rw = UIO_WRITE; 715 auio.uio_offset = 0; 716 auio.uio_resid = sizeof(ifctx->call); 717 auio.uio_td = td; 718 719 /* Set netmask to 0.0.0.0 */ 720 clear_sinaddr(sin); 721 error = ifioctl(bootp_so, SIOCAIFADDR, (caddr_t)ifra, 722 td); 723 if (error != 0) 724 panic("%s: SIOCAIFADDR, error=%d", __func__, 725 error); 726 727 error = sosend(bootp_so, (struct sockaddr *) &dst, 728 &auio, NULL, NULL, 0, td); 729 if (error != 0) 730 printf("%s: sosend: %d state %08x\n", __func__, 731 error, (int )bootp_so->so_state); 732 733 /* Set netmask to 255.0.0.0 */ 734 sin->sin_addr.s_addr = htonl(IN_CLASSA_NET); 735 error = ifioctl(bootp_so, SIOCAIFADDR, (caddr_t)ifra, 736 td); 737 if (error != 0) 738 panic("%s: SIOCAIFADDR, error=%d", __func__, 739 error); 740 } 741 742 if (outstanding == 0 && 743 (rtimo == 0 || time_second >= rtimo)) { 744 error = 0; 745 goto out; 746 } 747 748 /* Determine new timeout. */ 749 if (timo < MAX_RESEND_DELAY) 750 timo++; 751 else { 752 printf("DHCP/BOOTP timeout for server "); 753 print_sin_addr(&dst); 754 printf("\n"); 755 } 756 757 /* 758 * Wait for up to timo seconds for a reply. 759 * The socket receive timeout was set to 1 second. 760 */ 761 atimo = timo + time_second; 762 while (time_second < atimo) { 763 aio.iov_base = (caddr_t) &gctx->reply; 764 aio.iov_len = sizeof(gctx->reply); 765 766 auio.uio_iov = &aio; 767 auio.uio_iovcnt = 1; 768 auio.uio_segflg = UIO_SYSSPACE; 769 auio.uio_rw = UIO_READ; 770 auio.uio_offset = 0; 771 auio.uio_resid = sizeof(gctx->reply); 772 auio.uio_td = td; 773 774 rcvflg = 0; 775 error = soreceive(bootp_so, NULL, &auio, 776 NULL, NULL, &rcvflg); 777 gctx->secs = time_second - gctx->starttime; 778 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) { 779 if (bootpc_ifctx_isresolved(ifctx) != 0 || 780 bootpc_ifctx_isfailed(ifctx) != 0) 781 continue; 782 783 ifctx->call.secs = htons(gctx->secs); 784 } 785 if (error == EWOULDBLOCK) 786 continue; 787 if (error != 0) 788 goto out; 789 len = sizeof(gctx->reply) - auio.uio_resid; 790 791 /* Do we have the required number of bytes ? */ 792 if (len < BOOTP_MIN_LEN) 793 continue; 794 gctx->replylen = len; 795 796 /* Is it a reply? */ 797 if (gctx->reply.op != BOOTP_REPLY) 798 continue; 799 800 /* Is this an answer to our query */ 801 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) { 802 if (gctx->reply.xid != ifctx->call.xid) 803 continue; 804 805 /* Same HW address size ? */ 806 if (gctx->reply.hlen != ifctx->call.hlen) 807 continue; 808 809 /* Correct HW address ? */ 810 if (bcmp(gctx->reply.chaddr, 811 ifctx->call.chaddr, 812 ifctx->call.hlen) != 0) 813 continue; 814 815 break; 816 } 817 818 if (ifctx != NULL) { 819 s = bootpc_tag(&gctx->tmptag, 820 &gctx->reply, 821 gctx->replylen, 822 TAG_DHCP_MSGTYPE); 823 if (s != NULL) { 824 switch (*s) { 825 case DHCP_OFFER: 826 s = "DHCP Offer"; 827 break; 828 case DHCP_ACK: 829 s = "DHCP Ack"; 830 break; 831 default: 832 s = "DHCP (unexpected)"; 833 break; 834 } 835 } else 836 s = "BOOTP Reply"; 837 838 printf("Received %s packet" 839 " on %s from ", 840 s, 841 ifctx->ireq.ifr_name); 842 print_in_addr(gctx->reply.siaddr); 843 if (gctx->reply.giaddr.s_addr != 844 htonl(INADDR_ANY)) { 845 printf(" via "); 846 print_in_addr(gctx->reply.giaddr); 847 } 848 if (bootpc_received(gctx, ifctx) != 0) { 849 printf(" (accepted)"); 850 if (ifctx->outstanding) { 851 ifctx->outstanding = 0; 852 outstanding--; 853 } 854 /* Network settle delay */ 855 if (outstanding == 0) 856 atimo = time_second + 857 BOOTP_SETTLE_DELAY; 858 } else 859 printf(" (ignored)"); 860 if (ifctx->gotrootpath) { 861 gotrootpath = 1; 862 rtimo = time_second + 863 BOOTP_SETTLE_DELAY; 864 printf(" (got root path)"); 865 } else 866 printf(" (no root path)"); 867 printf("\n"); 868 } 869 } /* while secs */ 870 #ifdef BOOTP_TIMEOUT 871 if (gctx->secs > BOOTP_TIMEOUT && BOOTP_TIMEOUT > 0) 872 break; 873 #endif 874 /* Force a retry if halfway in DHCP negotiation */ 875 retry = 0; 876 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) 877 if (ifctx->state == IF_DHCP_OFFERED) { 878 if (ifctx->dhcpquerytype == DHCP_DISCOVER) 879 retry = 1; 880 else 881 ifctx->state = IF_DHCP_UNRESOLVED; 882 } 883 884 if (retry != 0) 885 continue; 886 887 if (gotrootpath != 0) { 888 gctx->gotrootpath = gotrootpath; 889 if (rtimo != 0 && time_second >= rtimo) 890 break; 891 } 892 } /* forever send/receive */ 893 894 /* 895 * XXX: These are errors of varying seriousness being silently 896 * ignored 897 */ 898 899 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) 900 if (bootpc_ifctx_isresolved(ifctx) == 0) { 901 printf("%s timeout for interface %s\n", 902 ifctx->dhcpquerytype != DHCP_NOMSG ? 903 "DHCP" : "BOOTP", 904 ifctx->ireq.ifr_name); 905 } 906 907 if (gctx->gotrootpath != 0) { 908 #if 0 909 printf("Got a root path, ignoring remaining timeout\n"); 910 #endif 911 error = 0; 912 goto out; 913 } 914 #ifndef BOOTP_NFSROOT 915 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) 916 if (bootpc_ifctx_isresolved(ifctx) != 0) { 917 error = 0; 918 goto out; 919 } 920 #endif 921 error = ETIMEDOUT; 922 923 out: 924 return (error); 925 } 926 927 static void 928 bootpc_fakeup_interface(struct bootpc_ifcontext *ifctx, struct thread *td) 929 { 930 struct ifreq *ifr; 931 struct in_aliasreq *ifra; 932 struct sockaddr_in *sin; 933 int error; 934 935 ifr = &ifctx->ireq; 936 ifra = &ifctx->iareq; 937 938 /* 939 * Bring up the interface. 940 * 941 * Get the old interface flags and or IFF_UP into them; if 942 * IFF_UP set blindly, interface selection can be clobbered. 943 */ 944 error = ifioctl(bootp_so, SIOCGIFFLAGS, (caddr_t)ifr, td); 945 if (error != 0) 946 panic("%s: SIOCGIFFLAGS, error=%d", __func__, error); 947 ifr->ifr_flags |= IFF_UP; 948 error = ifioctl(bootp_so, SIOCSIFFLAGS, (caddr_t)ifr, td); 949 if (error != 0) 950 panic("%s: SIOCSIFFLAGS, error=%d", __func__, error); 951 952 /* 953 * Do enough of ifconfig(8) so that the chosen interface 954 * can talk to the servers. Set address to 0.0.0.0/8 and 955 * broadcast address to local broadcast. 956 */ 957 sin = (struct sockaddr_in *)&ifra->ifra_addr; 958 clear_sinaddr(sin); 959 sin = (struct sockaddr_in *)&ifra->ifra_mask; 960 clear_sinaddr(sin); 961 sin->sin_addr.s_addr = htonl(IN_CLASSA_NET); 962 sin = (struct sockaddr_in *)&ifra->ifra_broadaddr; 963 clear_sinaddr(sin); 964 sin->sin_addr.s_addr = htonl(INADDR_BROADCAST); 965 error = ifioctl(bootp_so, SIOCAIFADDR, (caddr_t)ifra, td); 966 if (error != 0) 967 panic("%s: SIOCAIFADDR, error=%d", __func__, error); 968 } 969 970 static void 971 bootpc_shutdown_interface(struct bootpc_ifcontext *ifctx, struct thread *td) 972 { 973 struct ifreq *ifr; 974 struct sockaddr_in *sin; 975 int error; 976 977 ifr = &ifctx->ireq; 978 979 printf("Shutdown interface %s\n", ifctx->ireq.ifr_name); 980 error = ifioctl(bootp_so, SIOCGIFFLAGS, (caddr_t)ifr, td); 981 if (error != 0) 982 panic("%s: SIOCGIFFLAGS, error=%d", __func__, error); 983 ifr->ifr_flags &= ~IFF_UP; 984 error = ifioctl(bootp_so, SIOCSIFFLAGS, (caddr_t)ifr, td); 985 if (error != 0) 986 panic("%s: SIOCSIFFLAGS, error=%d", __func__, error); 987 988 sin = (struct sockaddr_in *) &ifr->ifr_addr; 989 clear_sinaddr(sin); 990 error = ifioctl(bootp_so, SIOCDIFADDR, (caddr_t) ifr, td); 991 if (error != 0) 992 panic("%s: SIOCDIFADDR, error=%d", __func__, error); 993 } 994 995 static int 996 bootpc_adjust_interface(struct bootpc_ifcontext *ifctx, 997 struct bootpc_globalcontext *gctx, struct thread *td) 998 { 999 int error; 1000 struct sockaddr_in defdst; 1001 struct sockaddr_in defmask; 1002 struct sockaddr_in *sin; 1003 struct ifreq *ifr; 1004 struct in_aliasreq *ifra; 1005 struct sockaddr_in *myaddr; 1006 struct sockaddr_in *netmask; 1007 struct sockaddr_in *gw; 1008 1009 ifr = &ifctx->ireq; 1010 ifra = &ifctx->iareq; 1011 myaddr = &ifctx->myaddr; 1012 netmask = &ifctx->netmask; 1013 gw = &ifctx->gw; 1014 1015 if (bootpc_ifctx_isresolved(ifctx) == 0) { 1016 /* Shutdown interfaces where BOOTP failed */ 1017 bootpc_shutdown_interface(ifctx, td); 1018 return (0); 1019 } 1020 1021 printf("Adjusted interface %s\n", ifctx->ireq.ifr_name); 1022 /* 1023 * Do enough of ifconfig(8) so that the chosen interface 1024 * can talk to the servers. (just set the address) 1025 */ 1026 sin = (struct sockaddr_in *) &ifr->ifr_addr; 1027 clear_sinaddr(sin); 1028 error = ifioctl(bootp_so, SIOCDIFADDR, (caddr_t) ifr, td); 1029 if (error != 0) 1030 panic("%s: SIOCDIFADDR, error=%d", __func__, error); 1031 1032 bcopy(myaddr, &ifra->ifra_addr, sizeof(*myaddr)); 1033 bcopy(netmask, &ifra->ifra_mask, sizeof(*netmask)); 1034 clear_sinaddr(&ifra->ifra_broadaddr); 1035 ifra->ifra_broadaddr.sin_addr.s_addr = myaddr->sin_addr.s_addr | 1036 ~netmask->sin_addr.s_addr; 1037 1038 error = ifioctl(bootp_so, SIOCAIFADDR, (caddr_t)ifra, td); 1039 if (error != 0) 1040 panic("%s: SIOCAIFADDR, error=%d", __func__, error); 1041 1042 /* Add new default route */ 1043 1044 if (ifctx->gotgw != 0 || gctx->gotgw == 0) { 1045 clear_sinaddr(&defdst); 1046 clear_sinaddr(&defmask); 1047 /* XXX MRT just table 0 */ 1048 error = rtrequest_fib(RTM_ADD, 1049 (struct sockaddr *) &defdst, 1050 (struct sockaddr *) gw, 1051 (struct sockaddr *) &defmask, 1052 (RTF_UP | RTF_GATEWAY | RTF_STATIC), NULL, 0); 1053 if (error != 0) { 1054 printf("%s: RTM_ADD, error=%d\n", __func__, error); 1055 return (error); 1056 } 1057 } 1058 1059 return (0); 1060 } 1061 1062 static int 1063 setfs(struct sockaddr_in *addr, char *path, char *p, 1064 const struct in_addr *siaddr) 1065 { 1066 1067 if (getip(&p, &addr->sin_addr) == 0) { 1068 if (siaddr != NULL && *p == '/') 1069 bcopy(siaddr, &addr->sin_addr, sizeof(struct in_addr)); 1070 else 1071 return 0; 1072 } else { 1073 if (*p != ':') 1074 return 0; 1075 p++; 1076 } 1077 1078 addr->sin_len = sizeof(struct sockaddr_in); 1079 addr->sin_family = AF_INET; 1080 1081 strlcpy(path, p, MNAMELEN); 1082 return 1; 1083 } 1084 1085 static int 1086 getip(char **ptr, struct in_addr *addr) 1087 { 1088 char *p; 1089 unsigned int ip; 1090 int val; 1091 1092 p = *ptr; 1093 ip = 0; 1094 if (((val = getdec(&p)) < 0) || (val > 255)) 1095 return 0; 1096 ip = val << 24; 1097 if (*p != '.') 1098 return 0; 1099 p++; 1100 if (((val = getdec(&p)) < 0) || (val > 255)) 1101 return 0; 1102 ip |= (val << 16); 1103 if (*p != '.') 1104 return 0; 1105 p++; 1106 if (((val = getdec(&p)) < 0) || (val > 255)) 1107 return 0; 1108 ip |= (val << 8); 1109 if (*p != '.') 1110 return 0; 1111 p++; 1112 if (((val = getdec(&p)) < 0) || (val > 255)) 1113 return 0; 1114 ip |= val; 1115 1116 addr->s_addr = htonl(ip); 1117 *ptr = p; 1118 return 1; 1119 } 1120 1121 static int 1122 getdec(char **ptr) 1123 { 1124 char *p; 1125 int ret; 1126 1127 p = *ptr; 1128 ret = 0; 1129 if ((*p < '0') || (*p > '9')) 1130 return -1; 1131 while ((*p >= '0') && (*p <= '9')) { 1132 ret = ret * 10 + (*p - '0'); 1133 p++; 1134 } 1135 *ptr = p; 1136 return ret; 1137 } 1138 1139 static void 1140 mountopts(struct nfs_args *args, char *p) 1141 { 1142 args->version = NFS_ARGSVERSION; 1143 args->rsize = BOOTP_BLOCKSIZE; 1144 args->wsize = BOOTP_BLOCKSIZE; 1145 args->flags = NFSMNT_RSIZE | NFSMNT_WSIZE | NFSMNT_RESVPORT; 1146 args->sotype = SOCK_DGRAM; 1147 if (p != NULL) 1148 nfs_parse_options(p, args); 1149 } 1150 1151 static int 1152 xdr_opaque_decode(struct mbuf **mptr, u_char *buf, int len) 1153 { 1154 struct mbuf *m; 1155 int alignedlen; 1156 1157 m = *mptr; 1158 alignedlen = ( len + 3 ) & ~3; 1159 1160 if (m->m_len < alignedlen) { 1161 m = m_pullup(m, alignedlen); 1162 if (m == NULL) { 1163 *mptr = NULL; 1164 return EBADRPC; 1165 } 1166 } 1167 bcopy(mtod(m, u_char *), buf, len); 1168 m_adj(m, alignedlen); 1169 *mptr = m; 1170 return 0; 1171 } 1172 1173 static int 1174 xdr_int_decode(struct mbuf **mptr, int *iptr) 1175 { 1176 u_int32_t i; 1177 1178 if (xdr_opaque_decode(mptr, (u_char *) &i, sizeof(u_int32_t)) != 0) 1179 return EBADRPC; 1180 *iptr = fxdr_unsigned(u_int32_t, i); 1181 return 0; 1182 } 1183 1184 static void 1185 print_sin_addr(struct sockaddr_in *sin) 1186 { 1187 1188 print_in_addr(sin->sin_addr); 1189 } 1190 1191 static void 1192 print_in_addr(struct in_addr addr) 1193 { 1194 unsigned int ip; 1195 1196 ip = ntohl(addr.s_addr); 1197 printf("%d.%d.%d.%d", 1198 ip >> 24, (ip >> 16) & 255, (ip >> 8) & 255, ip & 255); 1199 } 1200 1201 static void 1202 bootpc_compose_query(struct bootpc_ifcontext *ifctx, struct thread *td) 1203 { 1204 unsigned char *vendp; 1205 unsigned char vendor_client[64]; 1206 uint32_t leasetime; 1207 uint8_t vendor_client_len; 1208 1209 ifctx->gotrootpath = 0; 1210 1211 bzero((caddr_t) &ifctx->call, sizeof(ifctx->call)); 1212 1213 /* bootpc part */ 1214 ifctx->call.op = BOOTP_REQUEST; /* BOOTREQUEST */ 1215 ifctx->call.htype = 1; /* 10mb ethernet */ 1216 ifctx->call.hlen = ifctx->sdl->sdl_alen;/* Hardware address length */ 1217 ifctx->call.hops = 0; 1218 if (bootpc_ifctx_isunresolved(ifctx) != 0) 1219 ifctx->xid++; 1220 ifctx->call.xid = txdr_unsigned(ifctx->xid); 1221 bcopy(LLADDR(ifctx->sdl), &ifctx->call.chaddr, ifctx->sdl->sdl_alen); 1222 1223 vendp = ifctx->call.vend; 1224 *vendp++ = 99; /* RFC1048 cookie */ 1225 *vendp++ = 130; 1226 *vendp++ = 83; 1227 *vendp++ = 99; 1228 *vendp++ = TAG_MAXMSGSIZE; 1229 *vendp++ = 2; 1230 *vendp++ = (sizeof(struct bootp_packet) >> 8) & 255; 1231 *vendp++ = sizeof(struct bootp_packet) & 255; 1232 1233 snprintf(vendor_client, sizeof(vendor_client), "%s:%s:%s", 1234 ostype, MACHINE, osrelease); 1235 vendor_client_len = strlen(vendor_client); 1236 *vendp++ = TAG_VENDOR_INDENTIFIER; 1237 *vendp++ = vendor_client_len; 1238 memcpy(vendp, vendor_client, vendor_client_len); 1239 vendp += vendor_client_len; 1240 ifctx->dhcpquerytype = DHCP_NOMSG; 1241 switch (ifctx->state) { 1242 case IF_DHCP_UNRESOLVED: 1243 *vendp++ = TAG_DHCP_MSGTYPE; 1244 *vendp++ = 1; 1245 *vendp++ = DHCP_DISCOVER; 1246 ifctx->dhcpquerytype = DHCP_DISCOVER; 1247 ifctx->gotdhcpserver = 0; 1248 break; 1249 case IF_DHCP_OFFERED: 1250 *vendp++ = TAG_DHCP_MSGTYPE; 1251 *vendp++ = 1; 1252 *vendp++ = DHCP_REQUEST; 1253 ifctx->dhcpquerytype = DHCP_REQUEST; 1254 *vendp++ = TAG_DHCP_REQ_ADDR; 1255 *vendp++ = 4; 1256 memcpy(vendp, &ifctx->reply.yiaddr, 4); 1257 vendp += 4; 1258 if (ifctx->gotdhcpserver != 0) { 1259 *vendp++ = TAG_DHCP_SERVERID; 1260 *vendp++ = 4; 1261 memcpy(vendp, &ifctx->dhcpserver, 4); 1262 vendp += 4; 1263 } 1264 *vendp++ = TAG_DHCP_LEASETIME; 1265 *vendp++ = 4; 1266 leasetime = htonl(300); 1267 memcpy(vendp, &leasetime, 4); 1268 vendp += 4; 1269 break; 1270 default: 1271 break; 1272 } 1273 *vendp = TAG_END; 1274 1275 ifctx->call.secs = 0; 1276 ifctx->call.flags = htons(0x8000); /* We need a broadcast answer */ 1277 } 1278 1279 static int 1280 bootpc_hascookie(struct bootp_packet *bp) 1281 { 1282 1283 return (bp->vend[0] == 99 && bp->vend[1] == 130 && 1284 bp->vend[2] == 83 && bp->vend[3] == 99); 1285 } 1286 1287 static void 1288 bootpc_tag_helper(struct bootpc_tagcontext *tctx, 1289 unsigned char *start, int len, int tag) 1290 { 1291 unsigned char *j; 1292 unsigned char *ej; 1293 unsigned char code; 1294 1295 if (tctx->badtag != 0 || tctx->badopt != 0) 1296 return; 1297 1298 j = start; 1299 ej = j + len; 1300 1301 while (j < ej) { 1302 code = *j++; 1303 if (code == TAG_PAD) 1304 continue; 1305 if (code == TAG_END) 1306 return; 1307 if (j >= ej || j + *j + 1 > ej) { 1308 tctx->badopt = 1; 1309 return; 1310 } 1311 len = *j++; 1312 if (code == tag) { 1313 if (tctx->taglen + len > TAG_MAXLEN) { 1314 tctx->badtag = 1; 1315 return; 1316 } 1317 tctx->foundopt = 1; 1318 if (len > 0) 1319 memcpy(tctx->buf + tctx->taglen, 1320 j, len); 1321 tctx->taglen += len; 1322 } 1323 if (code == TAG_OVERLOAD) 1324 tctx->overload = *j; 1325 1326 j += len; 1327 } 1328 } 1329 1330 static unsigned char * 1331 bootpc_tag(struct bootpc_tagcontext *tctx, 1332 struct bootp_packet *bp, int len, int tag) 1333 { 1334 tctx->overload = 0; 1335 tctx->badopt = 0; 1336 tctx->badtag = 0; 1337 tctx->foundopt = 0; 1338 tctx->taglen = 0; 1339 1340 if (bootpc_hascookie(bp) == 0) 1341 return NULL; 1342 1343 bootpc_tag_helper(tctx, &bp->vend[4], 1344 (unsigned char *) bp + len - &bp->vend[4], tag); 1345 1346 if ((tctx->overload & OVERLOAD_FILE) != 0) 1347 bootpc_tag_helper(tctx, 1348 (unsigned char *) bp->file, 1349 sizeof(bp->file), 1350 tag); 1351 if ((tctx->overload & OVERLOAD_SNAME) != 0) 1352 bootpc_tag_helper(tctx, 1353 (unsigned char *) bp->sname, 1354 sizeof(bp->sname), 1355 tag); 1356 1357 if (tctx->badopt != 0 || tctx->badtag != 0 || tctx->foundopt == 0) 1358 return NULL; 1359 tctx->buf[tctx->taglen] = '\0'; 1360 return tctx->buf; 1361 } 1362 1363 static void 1364 bootpc_decode_reply(struct nfsv3_diskless *nd, struct bootpc_ifcontext *ifctx, 1365 struct bootpc_globalcontext *gctx) 1366 { 1367 char *p; 1368 unsigned int ip; 1369 1370 ifctx->gotgw = 0; 1371 ifctx->gotnetmask = 0; 1372 1373 clear_sinaddr(&ifctx->myaddr); 1374 clear_sinaddr(&ifctx->netmask); 1375 clear_sinaddr(&ifctx->gw); 1376 1377 ifctx->myaddr.sin_addr = ifctx->reply.yiaddr; 1378 1379 ip = ntohl(ifctx->myaddr.sin_addr.s_addr); 1380 1381 printf("%s at ", ifctx->ireq.ifr_name); 1382 print_sin_addr(&ifctx->myaddr); 1383 printf(" server "); 1384 print_in_addr(ifctx->reply.siaddr); 1385 1386 ifctx->gw.sin_addr = ifctx->reply.giaddr; 1387 if (ifctx->reply.giaddr.s_addr != htonl(INADDR_ANY)) { 1388 printf(" via gateway "); 1389 print_in_addr(ifctx->reply.giaddr); 1390 } 1391 1392 /* This call used for the side effect (overload flag) */ 1393 (void) bootpc_tag(&gctx->tmptag, 1394 &ifctx->reply, ifctx->replylen, TAG_END); 1395 1396 if ((gctx->tmptag.overload & OVERLOAD_SNAME) == 0) 1397 if (ifctx->reply.sname[0] != '\0') 1398 printf(" server name %s", ifctx->reply.sname); 1399 if ((gctx->tmptag.overload & OVERLOAD_FILE) == 0) 1400 if (ifctx->reply.file[0] != '\0') 1401 printf(" boot file %s", ifctx->reply.file); 1402 1403 printf("\n"); 1404 1405 p = bootpc_tag(&gctx->tag, &ifctx->reply, ifctx->replylen, 1406 TAG_SUBNETMASK); 1407 if (p != NULL) { 1408 if (gctx->tag.taglen != 4) 1409 panic("bootpc: subnet mask len is %d", 1410 gctx->tag.taglen); 1411 bcopy(p, &ifctx->netmask.sin_addr, 4); 1412 ifctx->gotnetmask = 1; 1413 printf("subnet mask "); 1414 print_sin_addr(&ifctx->netmask); 1415 printf(" "); 1416 } 1417 1418 p = bootpc_tag(&gctx->tag, &ifctx->reply, ifctx->replylen, 1419 TAG_ROUTERS); 1420 if (p != NULL) { 1421 /* Routers */ 1422 if (gctx->tag.taglen % 4) 1423 panic("bootpc: Router Len is %d", gctx->tag.taglen); 1424 if (gctx->tag.taglen > 0) { 1425 bcopy(p, &ifctx->gw.sin_addr, 4); 1426 printf("router "); 1427 print_sin_addr(&ifctx->gw); 1428 printf(" "); 1429 ifctx->gotgw = 1; 1430 gctx->gotgw = 1; 1431 } 1432 } 1433 1434 p = bootpc_tag(&gctx->tag, &ifctx->reply, ifctx->replylen, 1435 TAG_ROOT); 1436 if (p != NULL) { 1437 if (gctx->setrootfs != NULL) { 1438 printf("rootfs %s (ignored) ", p); 1439 } else if (setfs(&nd->root_saddr, 1440 nd->root_hostnam, p, &ifctx->reply.siaddr)) { 1441 if (*p == '/') { 1442 printf("root_server "); 1443 print_sin_addr(&nd->root_saddr); 1444 printf(" "); 1445 } 1446 printf("rootfs %s ", p); 1447 gctx->gotrootpath = 1; 1448 ifctx->gotrootpath = 1; 1449 gctx->setrootfs = ifctx; 1450 1451 p = bootpc_tag(&gctx->tag, &ifctx->reply, 1452 ifctx->replylen, 1453 TAG_ROOTOPTS); 1454 if (p != NULL) { 1455 mountopts(&nd->root_args, p); 1456 printf("rootopts %s ", p); 1457 } 1458 } else 1459 panic("Failed to set rootfs to %s", p); 1460 } 1461 1462 p = bootpc_tag(&gctx->tag, &ifctx->reply, ifctx->replylen, 1463 TAG_HOSTNAME); 1464 if (p != NULL) { 1465 if (gctx->tag.taglen >= MAXHOSTNAMELEN) 1466 panic("bootpc: hostname >= %d bytes", 1467 MAXHOSTNAMELEN); 1468 if (gctx->sethostname != NULL) { 1469 printf("hostname %s (ignored) ", p); 1470 } else { 1471 strcpy(nd->my_hostnam, p); 1472 mtx_lock(&prison0.pr_mtx); 1473 strcpy(prison0.pr_hostname, p); 1474 mtx_unlock(&prison0.pr_mtx); 1475 printf("hostname %s ", p); 1476 gctx->sethostname = ifctx; 1477 } 1478 } 1479 p = bootpc_tag(&gctx->tag, &ifctx->reply, ifctx->replylen, 1480 TAG_COOKIE); 1481 if (p != NULL) { /* store in a sysctl variable */ 1482 int i, l = sizeof(bootp_cookie) - 1; 1483 for (i = 0; i < l && p[i] != '\0'; i++) 1484 bootp_cookie[i] = p[i]; 1485 p[i] = '\0'; 1486 } 1487 1488 1489 printf("\n"); 1490 1491 if (ifctx->gotnetmask == 0) { 1492 if (IN_CLASSA(ntohl(ifctx->myaddr.sin_addr.s_addr))) 1493 ifctx->netmask.sin_addr.s_addr = htonl(IN_CLASSA_NET); 1494 else if (IN_CLASSB(ntohl(ifctx->myaddr.sin_addr.s_addr))) 1495 ifctx->netmask.sin_addr.s_addr = htonl(IN_CLASSB_NET); 1496 else 1497 ifctx->netmask.sin_addr.s_addr = htonl(IN_CLASSC_NET); 1498 } 1499 if (ifctx->gotgw == 0) { 1500 /* Use proxyarp */ 1501 ifctx->gw.sin_addr.s_addr = ifctx->myaddr.sin_addr.s_addr; 1502 } 1503 } 1504 1505 void 1506 bootpc_init(void) 1507 { 1508 struct bootpc_ifcontext *ifctx; /* Interface BOOTP contexts */ 1509 struct bootpc_globalcontext *gctx; /* Global BOOTP context */ 1510 struct ifnet *ifp; 1511 struct sockaddr_dl *sdl; 1512 struct ifaddr *ifa; 1513 int error; 1514 #ifndef BOOTP_WIRED_TO 1515 int ifcnt; 1516 #endif 1517 struct nfsv3_diskless *nd; 1518 struct thread *td; 1519 1520 nd = &nfsv3_diskless; 1521 td = curthread; 1522 1523 /* 1524 * If already filled in, don't touch it here 1525 */ 1526 if (nfs_diskless_valid != 0) 1527 return; 1528 1529 gctx = malloc(sizeof(*gctx), M_TEMP, M_WAITOK | M_ZERO); 1530 STAILQ_INIT(&gctx->interfaces); 1531 gctx->xid = ~0xFFFF; 1532 gctx->starttime = time_second; 1533 1534 /* 1535 * Find a network interface. 1536 */ 1537 CURVNET_SET(TD_TO_VNET(td)); 1538 #ifdef BOOTP_WIRED_TO 1539 printf("%s: wired to interface '%s'\n", __func__, 1540 __XSTRING(BOOTP_WIRED_TO)); 1541 allocifctx(gctx); 1542 #else 1543 /* 1544 * Preallocate interface context storage, if another interface 1545 * attaches and wins the race, it won't be eligible for bootp. 1546 */ 1547 ifcnt = 0; 1548 IFNET_RLOCK(); 1549 TAILQ_FOREACH(ifp, &V_ifnet, if_link) { 1550 if ((ifp->if_flags & 1551 (IFF_LOOPBACK | IFF_POINTOPOINT | IFF_BROADCAST)) != 1552 IFF_BROADCAST) 1553 continue; 1554 switch (ifp->if_alloctype) { 1555 case IFT_ETHER: 1556 case IFT_FDDI: 1557 case IFT_ISO88025: 1558 break; 1559 default: 1560 continue; 1561 } 1562 ifcnt++; 1563 } 1564 IFNET_RUNLOCK(); 1565 if (ifcnt == 0) 1566 panic("%s: no eligible interfaces", __func__); 1567 for (; ifcnt > 0; ifcnt--) 1568 allocifctx(gctx); 1569 #endif 1570 1571 ifctx = STAILQ_FIRST(&gctx->interfaces); 1572 IFNET_RLOCK(); 1573 TAILQ_FOREACH(ifp, &V_ifnet, if_link) { 1574 if (ifctx == NULL) 1575 break; 1576 #ifdef BOOTP_WIRED_TO 1577 if (strcmp(ifp->if_xname, __XSTRING(BOOTP_WIRED_TO)) != 0) 1578 continue; 1579 #else 1580 if ((ifp->if_flags & 1581 (IFF_LOOPBACK | IFF_POINTOPOINT | IFF_BROADCAST)) != 1582 IFF_BROADCAST) 1583 continue; 1584 switch (ifp->if_alloctype) { 1585 case IFT_ETHER: 1586 case IFT_FDDI: 1587 case IFT_ISO88025: 1588 break; 1589 default: 1590 continue; 1591 } 1592 #endif 1593 strlcpy(ifctx->ireq.ifr_name, ifp->if_xname, 1594 sizeof(ifctx->ireq.ifr_name)); 1595 ifctx->ifp = ifp; 1596 1597 /* Get HW address */ 1598 sdl = NULL; 1599 TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) 1600 if (ifa->ifa_addr->sa_family == AF_LINK) { 1601 sdl = (struct sockaddr_dl *)ifa->ifa_addr; 1602 if (sdl->sdl_type == IFT_ETHER) 1603 break; 1604 } 1605 if (sdl == NULL) 1606 panic("bootpc: Unable to find HW address for %s", 1607 ifctx->ireq.ifr_name); 1608 ifctx->sdl = sdl; 1609 1610 ifctx = STAILQ_NEXT(ifctx, next); 1611 } 1612 IFNET_RUNLOCK(); 1613 CURVNET_RESTORE(); 1614 1615 if (STAILQ_EMPTY(&gctx->interfaces) || 1616 STAILQ_FIRST(&gctx->interfaces)->ifp == NULL) { 1617 #ifdef BOOTP_WIRED_TO 1618 panic("%s: Could not find interface specified " 1619 "by BOOTP_WIRED_TO: " 1620 __XSTRING(BOOTP_WIRED_TO), __func__); 1621 #else 1622 panic("%s: no suitable interface", __func__); 1623 #endif 1624 } 1625 1626 error = socreate(AF_INET, &bootp_so, SOCK_DGRAM, 0, td->td_ucred, td); 1627 if (error != 0) 1628 panic("%s: socreate, error=%d", __func__, error); 1629 1630 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) 1631 bootpc_fakeup_interface(ifctx, td); 1632 1633 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) 1634 bootpc_compose_query(ifctx, td); 1635 1636 error = bootpc_call(gctx, td); 1637 1638 if (error != 0) { 1639 #ifdef BOOTP_NFSROOT 1640 panic("BOOTP call failed"); 1641 #else 1642 printf("BOOTP call failed\n"); 1643 #endif 1644 } 1645 1646 rootdevnames[0] = "nfs:"; 1647 #ifdef NFSCLIENT 1648 rootdevnames[1] = "oldnfs:"; 1649 #endif 1650 mountopts(&nd->root_args, NULL); 1651 1652 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) 1653 if (bootpc_ifctx_isresolved(ifctx) != 0) 1654 bootpc_decode_reply(nd, ifctx, gctx); 1655 1656 #ifdef BOOTP_NFSROOT 1657 if (gctx->gotrootpath == 0) 1658 panic("bootpc: No root path offered"); 1659 #endif 1660 1661 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) 1662 bootpc_adjust_interface(ifctx, gctx, td); 1663 1664 soclose(bootp_so); 1665 1666 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) 1667 if (ifctx->gotrootpath != 0) 1668 break; 1669 if (ifctx == NULL) { 1670 STAILQ_FOREACH(ifctx, &gctx->interfaces, next) 1671 if (bootpc_ifctx_isresolved(ifctx) != 0) 1672 break; 1673 } 1674 if (ifctx == NULL) 1675 goto out; 1676 1677 if (gctx->gotrootpath != 0) { 1678 1679 setenv("boot.netif.name", ifctx->ifp->if_xname); 1680 1681 error = md_mount(&nd->root_saddr, nd->root_hostnam, 1682 nd->root_fh, &nd->root_fhsize, 1683 &nd->root_args, td); 1684 if (error != 0) 1685 panic("nfs_boot: mountd root, error=%d", error); 1686 1687 nfs_diskless_valid = 3; 1688 } 1689 1690 strcpy(nd->myif.ifra_name, ifctx->ireq.ifr_name); 1691 bcopy(&ifctx->myaddr, &nd->myif.ifra_addr, sizeof(ifctx->myaddr)); 1692 bcopy(&ifctx->myaddr, &nd->myif.ifra_broadaddr, sizeof(ifctx->myaddr)); 1693 ((struct sockaddr_in *) &nd->myif.ifra_broadaddr)->sin_addr.s_addr = 1694 ifctx->myaddr.sin_addr.s_addr | 1695 ~ ifctx->netmask.sin_addr.s_addr; 1696 bcopy(&ifctx->netmask, &nd->myif.ifra_mask, sizeof(ifctx->netmask)); 1697 1698 out: 1699 while((ifctx = STAILQ_FIRST(&gctx->interfaces)) != NULL) { 1700 STAILQ_REMOVE_HEAD(&gctx->interfaces, next); 1701 free(ifctx, M_TEMP); 1702 } 1703 free(gctx, M_TEMP); 1704 } 1705 1706 /* 1707 * RPC: mountd/mount 1708 * Given a server pathname, get an NFS file handle. 1709 * Also, sets sin->sin_port to the NFS service port. 1710 */ 1711 static int 1712 md_mount(struct sockaddr_in *mdsin, char *path, u_char *fhp, int *fhsizep, 1713 struct nfs_args *args, struct thread *td) 1714 { 1715 struct mbuf *m; 1716 int error; 1717 int authunixok; 1718 int authcount; 1719 int authver; 1720 1721 #define RPCPROG_MNT 100005 1722 #define RPCMNT_VER1 1 1723 #define RPCMNT_VER3 3 1724 #define RPCMNT_MOUNT 1 1725 #define AUTH_SYS 1 /* unix style (uid, gids) */ 1726 #define AUTH_UNIX AUTH_SYS 1727 1728 /* XXX honor v2/v3 flags in args->flags? */ 1729 #ifdef BOOTP_NFSV3 1730 /* First try NFS v3 */ 1731 /* Get port number for MOUNTD. */ 1732 error = krpc_portmap(mdsin, RPCPROG_MNT, RPCMNT_VER3, 1733 &mdsin->sin_port, td); 1734 if (error == 0) { 1735 m = xdr_string_encode(path, strlen(path)); 1736 1737 /* Do RPC to mountd. */ 1738 error = krpc_call(mdsin, RPCPROG_MNT, RPCMNT_VER3, 1739 RPCMNT_MOUNT, &m, NULL, td); 1740 } 1741 if (error == 0) { 1742 args->flags |= NFSMNT_NFSV3; 1743 } else { 1744 #endif 1745 /* Fallback to NFS v2 */ 1746 1747 /* Get port number for MOUNTD. */ 1748 error = krpc_portmap(mdsin, RPCPROG_MNT, RPCMNT_VER1, 1749 &mdsin->sin_port, td); 1750 if (error != 0) 1751 return error; 1752 1753 m = xdr_string_encode(path, strlen(path)); 1754 1755 /* Do RPC to mountd. */ 1756 error = krpc_call(mdsin, RPCPROG_MNT, RPCMNT_VER1, 1757 RPCMNT_MOUNT, &m, NULL, td); 1758 if (error != 0) 1759 return error; /* message already freed */ 1760 1761 #ifdef BOOTP_NFSV3 1762 } 1763 #endif 1764 1765 if (xdr_int_decode(&m, &error) != 0 || error != 0) 1766 goto bad; 1767 1768 if ((args->flags & NFSMNT_NFSV3) != 0) { 1769 if (xdr_int_decode(&m, fhsizep) != 0 || 1770 *fhsizep > NFSX_V3FHMAX || 1771 *fhsizep <= 0) 1772 goto bad; 1773 } else 1774 *fhsizep = NFSX_V2FH; 1775 1776 if (xdr_opaque_decode(&m, fhp, *fhsizep) != 0) 1777 goto bad; 1778 1779 if (args->flags & NFSMNT_NFSV3) { 1780 if (xdr_int_decode(&m, &authcount) != 0) 1781 goto bad; 1782 authunixok = 0; 1783 if (authcount < 0 || authcount > 100) 1784 goto bad; 1785 while (authcount > 0) { 1786 if (xdr_int_decode(&m, &authver) != 0) 1787 goto bad; 1788 if (authver == AUTH_UNIX) 1789 authunixok = 1; 1790 authcount--; 1791 } 1792 if (authunixok == 0) 1793 goto bad; 1794 } 1795 1796 /* Set port number for NFS use. */ 1797 error = krpc_portmap(mdsin, NFS_PROG, 1798 (args->flags & 1799 NFSMNT_NFSV3) ? NFS_VER3 : NFS_VER2, 1800 &mdsin->sin_port, td); 1801 1802 goto out; 1803 1804 bad: 1805 error = EBADRPC; 1806 1807 out: 1808 m_freem(m); 1809 return error; 1810 } 1811 1812 SYSINIT(bootp_rootconf, SI_SUB_ROOT_CONF, SI_ORDER_FIRST, bootpc_init, NULL); 1813