1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License, Version 1.0 only 6 * (the "License"). You may not use this file except in compliance 7 * with the License. 8 * 9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 10 * or http://www.opensolaris.org/os/licensing. 11 * See the License for the specific language governing permissions 12 * and limitations under the License. 13 * 14 * When distributing Covered Code, include this CDDL HEADER in each 15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 16 * If applicable, add the following below this CDDL HEADER, with the 17 * fields enclosed by brackets "[]" replaced with your own identifying 18 * information: Portions Copyright [yyyy] [name of copyright owner] 19 * 20 * CDDL HEADER END 21 */ 22 /* 23 * Copyright 2004 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 * 26 * Standalone dhcp client. 27 */ 28 29 #pragma ident "%Z%%M% %I% %E% SMI" 30 31 #include <sys/types.h> 32 #include <sys/salib.h> 33 #include <sys/bootconf.h> 34 #include <sys/bootcmn.h> 35 #include <sys/socket.h> 36 #include <sys/isa_defs.h> 37 #include <netinet/in.h> 38 #include <netinet/in_systm.h> 39 #include <netinet/inetutil.h> 40 #include <netinet/dhcp.h> 41 #include <netinet/ip.h> 42 #include <netinet/udp.h> 43 #include <dhcp_impl.h> 44 #include <net/if_types.h> 45 #include <sys/promif.h> 46 #include <sys/platnames.h> 47 #include <socket_inet.h> 48 49 #include "ipv4.h" 50 #include "mac.h" 51 #include <sys/bootdebug.h> 52 #include "dhcpv4.h" 53 54 static char *s_n = "INIT"; 55 static enum DHCPSTATE dhcp_state = INIT; 56 57 static PKT *dhcp_snd_bufp, *dhcp_rcv_bufp; 58 static int dhcp_buf_size; 59 60 static const uint8_t magic[] = BOOTMAGIC; /* RFC1048 */ 61 static uint8_t opt_discover[] = { CD_DHCP_TYPE, 1, DISCOVER }; 62 static uint8_t opt_request[] = { CD_DHCP_TYPE, 1, REQUEST }; 63 static uint8_t opt_decline[] = { CD_DHCP_TYPE, 1, DECLINE }; 64 65 static uint8_t dhcp_classid[DHCP_MAX_OPT_SIZE + 3]; 66 static uint8_t dhcp_clientid[DHCP_MAX_CID_LEN]; 67 static uint8_t dhcp_clientid_len = 0; 68 69 static uint32_t dhcp_start_time; /* start time (msecs */ 70 static time_t dhcp_secs; 71 static uint32_t timeout; /* timeout in milliseconds */ 72 73 static int pkt_counter; 74 PKT_LIST *list_tl, *list_hd; 75 PKT_LIST *state_pl = NULL; 76 77 #define PROM_BOOT_CACHED "bootp-response" 78 #ifndef __i386 79 extern char *bootp_response; /* bootprop.c */ 80 #else 81 char *bootp_response; /* i386 has *real* bsetprop */ 82 #endif /* __i386 */ 83 extern int pagesize; 84 85 /* 86 * Do whatever reset actions/initialization actions are generic for every 87 * DHCP/bootp message. Set the message type. 88 * 89 * Returns: the updated options ptr. 90 */ 91 static uint8_t * 92 init_msg(PKT *pkt, uint8_t *pkttype) 93 { 94 static uint32_t xid; 95 96 bzero(pkt, dhcp_buf_size); 97 bcopy(magic, pkt->cookie, sizeof (pkt->cookie)); 98 pkt->op = BOOTREQUEST; 99 if (xid == 0) 100 bcopy(mac_get_addr_buf()+2, &xid, 4); 101 else 102 xid++; 103 pkt->xid = xid; 104 bcopy(pkttype, pkt->options, 3); 105 return ((uint8_t *)(pkt->options + 3)); 106 } 107 108 /* 109 * Parameter request list. 110 */ 111 static void 112 parameter_request_list(uint8_t **opt) 113 { 114 /* 115 * This parameter request list is used in the normal 4-packet 116 * DHCPDISCOVER/OFFER/REQUEST/ACK exchange; it must not contain 117 * CD_REQUESTED_IP_ADDR or CD_LEASE_TIME. 118 */ 119 static uint8_t prlist[] = { 120 CD_REQUEST_LIST, /* parameter request list option number */ 121 4, /* number of options requested */ 122 CD_SUBNETMASK, 123 CD_ROUTER, 124 CD_HOSTNAME, 125 CD_VENDOR_SPEC 126 }; 127 if (opt && *opt) { 128 bcopy(prlist, *opt, sizeof (prlist)); 129 *opt += sizeof (prlist); 130 } 131 } 132 133 /* 134 * Set hardware specific fields 135 */ 136 static void 137 set_hw_spec_data(PKT *p, uint8_t **opt, uint8_t *pkttype) 138 { 139 char mfg[DHCP_MAX_OPT_SIZE + 1], cbuf[DHCP_MAX_OPT_SIZE + 1]; 140 uint8_t *tp, *dp; 141 int adjust_len, len, i; 142 143 p->htype = mac_arp_type(mac_get_type()); 144 len = (uchar_t)mac_get_addr_len(); 145 if (len <= sizeof (p->chaddr)) { 146 p->hlen = len; 147 bcopy(mac_get_addr_buf(), p->chaddr, len); 148 } else { 149 uint8_t type = *(pkttype + 2); 150 /* 151 * The mac address does not fit in the chaddr 152 * field, thus it can not be sent to the server, 153 * thus server can not unicast the reply. Per 154 * RFC 2131 4.4.1, client can set this bit in 155 * DISCOVER/REQUEST. 156 */ 157 if ((type == DISCOVER) || (type == REQUEST)) 158 p->flags = htons(BCAST_MASK); 159 } 160 161 if (opt && *opt) { 162 if (dhcp_classid[0] == '\0') { 163 /* 164 * Classids based on mfg name: Commas (,) are 165 * converted to periods (.), and spaces ( ) are removed. 166 */ 167 dhcp_classid[0] = CD_CLASS_ID; 168 169 (void) strncpy(mfg, get_mfg_name(), sizeof (mfg)); 170 if (strncmp(mfg, "SUNW", strlen("SUNW")) != 0) { 171 len = strlen("SUNW."); 172 (void) strcpy(cbuf, "SUNW."); 173 } else { 174 len = 0; 175 cbuf[0] = '\0'; 176 } 177 len += strlen(mfg); 178 179 if ((len + 2) < DHCP_MAX_OPT_SIZE) { 180 tp = (uint8_t *)strcat(cbuf, mfg); 181 dp = &dhcp_classid[2]; 182 adjust_len = 0; 183 for (i = 0; i < len; i++, tp++) { 184 if (*tp == ',') { 185 *dp++ = '.'; 186 } else if (*tp == ' ') { 187 adjust_len++; 188 } else { 189 *dp++ = *tp; 190 } 191 } 192 len -= adjust_len; 193 dhcp_classid[1] = (uint8_t)len; 194 } else 195 prom_panic("Not enough space for class id"); 196 #ifdef DHCP_DEBUG 197 printf("%s: Classid: %s\n", s_n, &dhcp_classid[2]); 198 #endif /* DHCP_DEBUG */ 199 } 200 bcopy(dhcp_classid, *opt, dhcp_classid[1] + 2); 201 *opt += dhcp_classid[1] + 2; 202 } 203 } 204 205 static void 206 flush_list(void) 207 { 208 PKT_LIST *wk, *tmp; 209 210 wk = list_hd; 211 while (wk != NULL) { 212 tmp = wk; 213 wk = wk->next; 214 bkmem_free((char *)tmp->pkt, tmp->len); 215 bkmem_free((char *)tmp, sizeof (PKT_LIST)); 216 } 217 list_hd = list_tl = NULL; 218 pkt_counter = 0; 219 } 220 221 static void 222 remove_list(PKT_LIST *pl, int flag) 223 { 224 if (list_hd == NULL) 225 return; 226 227 if (list_hd == list_tl) { 228 list_hd = list_tl = NULL; 229 } else if (list_hd == pl) { 230 list_hd = pl->next; 231 list_hd->prev = NULL; 232 } else if (list_tl == pl) { 233 list_tl = list_tl->prev; 234 list_tl->next = NULL; 235 } else { 236 pl->prev->next = pl->next; 237 pl->next->prev = pl->prev; 238 } 239 pkt_counter--; 240 if (flag) { 241 bkmem_free((char *)pl->pkt, pl->len); 242 bkmem_free((char *)pl, sizeof (PKT_LIST)); 243 } 244 } 245 246 /* 247 * Collects BOOTP responses. Length has to be right, it has to be 248 * a BOOTP reply pkt, with the same XID and HW address as ours. Adds 249 * them to the pkt list. 250 * 251 * Returns 0 if no error processing packet, 1 if an error occurred and/or 252 * collection of replies should stop. Used in inet() calls. 253 */ 254 static int 255 bootp_collect(int len) 256 { 257 PKT *s = (PKT *)dhcp_snd_bufp; 258 PKT *r = (PKT *)dhcp_rcv_bufp; 259 PKT_LIST *pl; 260 261 if (len < sizeof (PKT)) { 262 dprintf("%s: BOOTP reply too small: %d\n", s_n, len); 263 return (1); 264 } 265 if (r->op == BOOTREPLY && r->xid == s->xid && 266 bcmp((caddr_t)s->chaddr, (caddr_t)r->chaddr, s->hlen) == 0) { 267 /* Add a packet to the pkt list */ 268 if (pkt_counter > (MAX_PKT_LIST - 1)) 269 return (1); /* got enough packets already */ 270 if (((pl = (PKT_LIST *)bkmem_zalloc(sizeof (PKT_LIST))) == 271 NULL) || ((pl->pkt = (PKT *)bkmem_zalloc(len)) == NULL)) { 272 errno = ENOMEM; 273 if (pl != NULL) 274 bkmem_free((char *)pl, sizeof (PKT_LIST)); 275 return (1); 276 } 277 bcopy(dhcp_rcv_bufp, pl->pkt, len); 278 pl->len = len; 279 if (list_hd == NULL) { 280 list_hd = list_tl = pl; 281 pl->prev = NULL; 282 } else { 283 list_tl->next = pl; 284 pl->prev = list_tl; 285 list_tl = pl; 286 } 287 pkt_counter++; 288 pl->next = NULL; 289 } 290 return (0); 291 } 292 293 /* 294 * Checks if BOOTP exchange(s) were successful. Returns 1 if they 295 * were, 0 otherwise. Used in inet() calls. 296 */ 297 static int 298 bootp_success(void) 299 { 300 PKT *s = (PKT *)dhcp_snd_bufp; 301 302 if (list_hd != NULL) { 303 /* remember the secs - we may need them later */ 304 dhcp_secs = ntohs(s->secs); 305 return (1); 306 } 307 s->secs = htons((uint16_t)((prom_gettime() - dhcp_start_time)/1000)); 308 return (0); 309 } 310 311 /* 312 * This function accesses the network. Opens a connection, and binds to 313 * it if a client binding doesn't already exist. If 'tries' is 0, then 314 * no reply is expected/returned. If 'tries' is non-zero, then 'tries' 315 * attempts are made to get a valid response. If 'tol' is not zero, 316 * then this function will wait for 'tol' milliseconds for more than one 317 * response to a transmit. 318 * 319 * Returns 0 for success, errno otherwise. 320 */ 321 static int 322 inet(uint32_t size, struct in_addr *src, struct in_addr *dest, uint32_t tries, 323 uint32_t tol) 324 { 325 int done = B_FALSE, flags, len; 326 uint32_t attempts = 0; 327 int sd; 328 uint32_t wait_time; /* Max time collect replies */ 329 uint32_t init_timeout; /* Max time wait ANY reply */ 330 uint32_t now; 331 struct sockaddr_in saddr, daddr; 332 333 if ((sd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) { 334 dprintf("%s: Can't open a socket.\n", s_n); 335 return (errno); 336 } 337 338 flags = 0; 339 340 bzero(&saddr, sizeof (struct sockaddr_in)); 341 saddr.sin_family = AF_INET; 342 saddr.sin_port = htons(IPPORT_BOOTPC); 343 saddr.sin_addr.s_addr = htonl(src->s_addr); 344 345 if (bind(sd, (struct sockaddr *)&saddr, sizeof (saddr)) < 0) { 346 dprintf("%s: Cannot bind to port %d, errno: %d\n", 347 s_n, IPPORT_BOOTPC, errno); 348 (void) socket_close(sd); 349 return (errno); 350 } 351 352 if (ntohl(dest->s_addr) == INADDR_BROADCAST) { 353 int dontroute = B_TRUE; 354 (void) setsockopt(sd, SOL_SOCKET, SO_DONTROUTE, 355 (const void *)&dontroute, sizeof (dontroute)); 356 } 357 358 bzero(&daddr, sizeof (struct sockaddr_in)); 359 daddr.sin_family = AF_INET; 360 daddr.sin_port = htons(IPPORT_BOOTPS); 361 daddr.sin_addr.s_addr = htonl(dest->s_addr); 362 wait_time = prom_gettime() + tol; 363 364 do { 365 if (sendto(sd, (char *)dhcp_snd_bufp, size, flags, 366 (struct sockaddr *)&daddr, sizeof (daddr)) < 0) { 367 dprintf("%s: sendto failed with errno: %d\n", 368 s_n, errno); 369 (void) socket_close(sd); 370 return (errno); 371 } 372 if (!tries) 373 break; /* don't bother to check for reply */ 374 375 now = prom_gettime(); 376 if (timeout == 0) 377 timeout = 4000; 378 else { 379 timeout <<= 1; 380 if (timeout > 64000) 381 timeout = 64000; 382 } 383 init_timeout = now + timeout; 384 wait_time = now + tol; 385 do { 386 if ((len = recvfrom(sd, (char *)dhcp_rcv_bufp, 387 (int)dhcp_buf_size, MSG_DONTWAIT, NULL, 388 NULL)) < 0) { 389 if (errno == EWOULDBLOCK) 390 continue; /* DONT WAIT */ 391 (void) socket_close(sd); 392 flush_list(); 393 return (errno); 394 } 395 396 if (bootp_collect(len)) 397 break; /* Stop collecting */ 398 399 if (tol != 0) { 400 if (wait_time < prom_gettime()) 401 break; /* collection timeout */ 402 } 403 } while (prom_gettime() < init_timeout); 404 405 if (bootp_success()) { 406 done = B_TRUE; 407 break; /* got the goods */ 408 } 409 } while (++attempts < tries); 410 411 (void) socket_close(sd); 412 413 return (done ? 0 : DHCP_NO_DATA); 414 } 415 416 /* 417 * Print the message from the server. 418 */ 419 static void 420 prt_server_msg(DHCP_OPT *p) 421 { 422 int len = p->len; 423 char scratch[DHCP_MAX_OPT_SIZE + 1]; 424 425 if (p->len > DHCP_MAX_OPT_SIZE) 426 len = DHCP_MAX_OPT_SIZE; 427 bcopy(p->value, scratch, len); 428 scratch[len] = '\0'; 429 printf("%s: Message from server: '%s'\n", s_n, scratch); 430 } 431 432 /* 433 * This function scans the list of OFFERS, and returns the "best" offer. 434 * The criteria used for determining this is: 435 * 436 * The best: 437 * DHCP OFFER (not BOOTP), same client_id as ours, same class_id, 438 * Longest lease, all the options we need. 439 * 440 * Not quite as good: 441 * DHCP OFFER, no class_id, short lease, only some of the options we need. 442 * 443 * We're really reach'in 444 * BOOTP reply. 445 * 446 * DON'T select an offer from a server that gave us a configuration we 447 * couldn't use. Take this server off the "bad" list when this is done. 448 * Next time, we could potentially retry this server's configuration. 449 * 450 * NOTE: perhaps this bad server should have a counter associated with it. 451 */ 452 static PKT_LIST * 453 select_best(void) 454 { 455 PKT_LIST *wk, *tk, *best; 456 int err = 0; 457 458 /* Pass one. Scan for options, set appropriate opt field. */ 459 wk = list_hd; 460 while (wk != NULL) { 461 if ((err = dhcp_options_scan(wk, B_TRUE)) != 0) { 462 /* Garbled Options. Nuke this pkt. */ 463 if (boothowto & RB_DEBUG) { 464 switch (err) { 465 case DHCP_WRONG_MSG_TYPE: 466 printf("%s: Unexpected DHCP message.\n", 467 s_n); 468 break; 469 case DHCP_GARBLED_MSG_TYPE: 470 printf( 471 "%s: Garbled DHCP message type.\n", 472 s_n); 473 break; 474 case DHCP_BAD_OPT_OVLD: 475 printf("%s: Bad option overload.\n", 476 s_n); 477 break; 478 } 479 } 480 tk = wk; 481 wk = wk->next; 482 remove_list(tk, B_TRUE); 483 continue; 484 } 485 wk = wk->next; 486 } 487 488 /* 489 * Pass two. Pick out the best offer. Point system. 490 * What's important? 491 * 0) DHCP 492 * 1) No option overload 493 * 2) Encapsulated vendor option 494 * 3) Non-null sname and siaddr fields 495 * 4) Non-null file field 496 * 5) Hostname 497 * 6) Subnetmask 498 * 7) Router 499 */ 500 best = NULL; 501 for (wk = list_hd; wk != NULL; wk = wk->next) { 502 wk->offset = 0; 503 if (wk->opts[CD_DHCP_TYPE] && 504 wk->opts[CD_DHCP_TYPE]->len == 1) { 505 if (*wk->opts[CD_DHCP_TYPE]->value != OFFER) { 506 dprintf("%s: Unexpected DHCP message." 507 " Expected OFFER message.\n", s_n); 508 continue; 509 } 510 if (!wk->opts[CD_LEASE_TIME]) { 511 dprintf("%s: DHCP OFFER message without lease " 512 "time parameter.\n", s_n); 513 continue; 514 } else { 515 if (wk->opts[CD_LEASE_TIME]->len != 4) { 516 dprintf("%s: Lease expiration time is " 517 "garbled.\n", s_n); 518 continue; 519 } 520 } 521 if (!wk->opts[CD_SERVER_ID]) { 522 dprintf("%s: DHCP OFFER message without server " 523 "id parameter.\n", s_n); 524 continue; 525 } else { 526 if (wk->opts[CD_SERVER_ID]->len != 4) { 527 dprintf("%s: Server identifier " 528 "parameter is garbled.\n", s_n); 529 continue; 530 } 531 } 532 /* Valid DHCP OFFER. See if we got our parameters. */ 533 dprintf("%s: Found valid DHCP OFFER message.\n", s_n); 534 535 wk->offset += 30; 536 537 /* 538 * Also could be faked, though more difficult 539 * because the encapsulation is hard to encode 540 * on a BOOTP server; plus there's not as much 541 * real estate in the packet for options, so 542 * it's likely this option would get dropped. 543 */ 544 if (wk->opts[CD_VENDOR_SPEC]) 545 wk->offset += 80; 546 } else 547 dprintf("%s: Found valid BOOTP reply.\n", s_n); 548 549 /* 550 * RFC1048 BOOTP? 551 */ 552 if (bcmp((caddr_t)wk->pkt->cookie, (caddr_t)magic, 553 sizeof (magic)) == 0) { 554 wk->offset += 5; 555 if (wk->opts[CD_SUBNETMASK]) 556 wk->offset++; 557 if (wk->opts[CD_ROUTER]) 558 wk->offset++; 559 if (wk->opts[CD_HOSTNAME]) 560 wk->offset += 5; 561 562 /* 563 * Prefer options that have diskless boot significance 564 */ 565 if (ntohl(wk->pkt->siaddr.s_addr) != INADDR_ANY) 566 wk->offset += 10; /* server ip */ 567 if (wk->opts[CD_OPTION_OVERLOAD] == NULL) { 568 if (wk->pkt->sname[0] != '\0') 569 wk->offset += 10; /* server name */ 570 if (wk->pkt->file[0] != '\0') 571 wk->offset += 5; /* File to load */ 572 } 573 } 574 #ifdef DHCP_DEBUG 575 printf("%s: This server configuration has '%d' points.\n", s_n, 576 wk->offset); 577 #endif /* DHCP_DEBUG */ 578 if (!best) 579 best = wk; 580 else { 581 if (best->offset < wk->offset) 582 best = wk; 583 } 584 } 585 if (best) { 586 #ifdef DHCP_DEBUG 587 printf("%s: Found best: points: %d\n", s_n, best->offset); 588 #endif /* DHCP_DEBUG */ 589 remove_list(best, B_FALSE); 590 } else { 591 dprintf("%s: No valid BOOTP reply or DHCP OFFER was found.\n", 592 s_n); 593 } 594 flush_list(); /* toss the remaining list */ 595 return (best); 596 } 597 598 /* 599 * Send a decline message to the generator of the DHCPACK. 600 */ 601 static void 602 dhcp_decline(char *msg, PKT_LIST *pl) 603 { 604 PKT *pkt; 605 uint8_t *opt, ulen; 606 int pkt_size; 607 struct in_addr nets, ours, t_server, t_yiaddr; 608 609 if (pl != NULL) { 610 if (pl->opts[CD_SERVER_ID] != NULL && 611 pl->opts[CD_SERVER_ID]->len == sizeof (struct in_addr)) { 612 bcopy(pl->opts[CD_SERVER_ID]->value, 613 &t_server, pl->opts[CD_SERVER_ID]->len); 614 } else 615 t_server.s_addr = htonl(INADDR_BROADCAST); 616 t_yiaddr.s_addr = pl->pkt->yiaddr.s_addr; 617 } 618 pkt = (PKT *)dhcp_snd_bufp; 619 opt = init_msg(pkt, opt_decline); 620 set_hw_spec_data(pkt, &opt, opt_decline); 621 622 *opt++ = CD_SERVER_ID; 623 *opt++ = sizeof (struct in_addr); 624 bcopy(&t_server, opt, sizeof (struct in_addr)); 625 opt += sizeof (struct in_addr); 626 nets.s_addr = htonl(INADDR_BROADCAST); 627 628 /* 629 * Use the given yiaddr in our ciaddr field so server can identify us. 630 */ 631 pkt->ciaddr.s_addr = t_yiaddr.s_addr; 632 633 ipv4_getipaddr(&ours); /* Could be 0, could be yiaddr */ 634 ours.s_addr = htonl(ours.s_addr); 635 636 ulen = (uint8_t)strlen(msg); 637 *opt++ = CD_MESSAGE; 638 *opt++ = ulen; 639 bcopy(msg, opt, ulen); 640 opt += ulen; 641 *opt++ = CD_END; 642 643 pkt_size = (uint8_t *)opt - (uint8_t *)pkt; 644 if (pkt_size < sizeof (PKT)) 645 pkt_size = sizeof (PKT); 646 647 timeout = 0; /* reset timeout */ 648 (void) inet(pkt_size, &ours, &nets, 0, 0L); 649 } 650 651 /* 652 * Implementings SELECTING state of DHCP client state machine. 653 */ 654 static int 655 dhcp_selecting(void) 656 { 657 int pkt_size; 658 PKT *pkt; 659 uint8_t *opt; 660 uint16_t size; 661 uint32_t lease; 662 struct in_addr nets, ours; 663 664 pkt = (PKT *)dhcp_snd_bufp; 665 opt = init_msg(pkt, opt_discover); 666 pkt->secs = htons((uint16_t)((prom_gettime() - dhcp_start_time)/1000)); 667 668 *opt++ = CD_MAX_DHCP_SIZE; 669 *opt++ = sizeof (size); 670 size = (uint16_t)(dhcp_buf_size - sizeof (struct ip) - 671 sizeof (struct udphdr)); 672 size = htons(size); 673 bcopy(&size, opt, sizeof (size)); 674 opt += sizeof (size); 675 676 set_hw_spec_data(pkt, &opt, opt_discover); 677 678 *opt++ = CD_LEASE_TIME; 679 *opt++ = sizeof (lease); 680 lease = htonl(DHCP_PERM); /* ask for a permanent lease */ 681 bcopy(&lease, opt, sizeof (lease)); 682 opt += sizeof (lease); 683 684 /* 685 * If a clientid was set using dhcp_set_client_id(), add this 686 * to the options. 687 */ 688 if (dhcp_clientid_len > 0) { 689 *opt++ = CD_CLIENT_ID; 690 *opt++ = dhcp_clientid_len; 691 bcopy(dhcp_clientid, opt, dhcp_clientid_len); 692 opt += dhcp_clientid_len; 693 } 694 695 parameter_request_list(&opt); 696 697 *opt++ = CD_END; 698 699 pkt_size = (uint8_t *)opt - (uint8_t *)pkt; 700 if (pkt_size < sizeof (PKT)) 701 pkt_size = sizeof (PKT); 702 703 nets.s_addr = INADDR_BROADCAST; 704 ours.s_addr = INADDR_ANY; 705 timeout = 0; /* reset timeout */ 706 707 return (inet(pkt_size, &ours, &nets, DHCP_RETRIES, DHCP_WAIT)); 708 } 709 710 /* 711 * implements the REQUESTING state of the DHCP client state machine. 712 */ 713 static int 714 dhcp_requesting(void) 715 { 716 PKT_LIST *pl, *wk; 717 PKT *pkt, *pl_pkt; 718 uint8_t *opt; 719 int pkt_size, err; 720 uint32_t t_time; 721 struct in_addr nets, ours; 722 DHCP_OPT *doptp; 723 uint16_t size; 724 725 /* here we scan the list of OFFERS, select the best one. */ 726 state_pl = NULL; 727 728 if ((pl = select_best()) == NULL) { 729 dprintf("%s: No valid BOOTP reply or DHCP OFFER was found.\n", 730 s_n); 731 return (1); 732 } 733 734 pl_pkt = pl->pkt; 735 736 /* 737 * Check to see if we got an OFFER pkt(s). If not, then We only got 738 * a response from a BOOTP server. We'll go to the bound state and 739 * try to use that configuration. 740 */ 741 if (pl->opts[CD_DHCP_TYPE] == NULL) { 742 if (mac_call_arp(&pl_pkt->yiaddr, NULL, DHCP_ARP_TIMEOUT)) { 743 /* Someone responded! go back to SELECTING state. */ 744 printf("%s: Some host already using BOOTP %s.\n", s_n, 745 inet_ntoa(pl_pkt->yiaddr)); 746 bkmem_free((char *)pl->pkt, pl->len); 747 bkmem_free((char *)pl, sizeof (PKT_LIST)); 748 return (1); 749 } 750 state_pl = pl; 751 return (0); 752 } 753 754 /* 755 * if we got a message from the server, display it. 756 */ 757 if (pl->opts[CD_MESSAGE]) 758 prt_server_msg(pl->opts[CD_MESSAGE]); 759 /* 760 * Assemble a DHCPREQUEST, with the ciaddr field set to 0, since we 761 * got here from DISCOVER state. Keep secs field the same for relay 762 * agents. We start with the DHCPOFFER packet we got, and the 763 * options contained in it to make a requested option list. 764 */ 765 pkt = (PKT *)dhcp_snd_bufp; 766 opt = init_msg(pkt, opt_request); 767 768 /* Time from Successful DISCOVER message. */ 769 pkt->secs = htons((uint16_t)dhcp_secs); 770 771 size = (uint16_t)(dhcp_buf_size - sizeof (struct ip) - 772 sizeof (struct udphdr)); 773 size = htons(size); 774 *opt++ = CD_MAX_DHCP_SIZE; 775 *opt++ = sizeof (size); 776 bcopy(&size, opt, sizeof (size)); 777 opt += sizeof (size); 778 779 set_hw_spec_data(pkt, &opt, opt_request); 780 *opt++ = CD_SERVER_ID; 781 *opt++ = pl->opts[CD_SERVER_ID]->len; 782 bcopy(pl->opts[CD_SERVER_ID]->value, opt, 783 pl->opts[CD_SERVER_ID]->len); 784 opt += pl->opts[CD_SERVER_ID]->len; 785 786 /* our offered lease minus boot time */ 787 *opt++ = CD_LEASE_TIME; 788 *opt++ = 4; 789 bcopy(pl->opts[CD_LEASE_TIME]->value, &t_time, 790 sizeof (t_time)); 791 t_time = ntohl(t_time); 792 if ((uint32_t)t_time != DHCP_PERM) 793 t_time -= (uint32_t)dhcp_secs; 794 t_time = htonl(t_time); 795 bcopy(&t_time, opt, sizeof (t_time)); 796 opt += sizeof (t_time); 797 798 /* our offered IP address, as required. */ 799 *opt++ = CD_REQUESTED_IP_ADDR; 800 *opt++ = sizeof (struct in_addr); 801 bcopy(&pl_pkt->yiaddr, opt, sizeof (struct in_addr)); 802 opt += sizeof (struct in_addr); 803 804 /* 805 * If a clientid was set using dhcp_set_client_id(), add this 806 * to the options. 807 */ 808 if (dhcp_clientid_len > 0) { 809 *opt++ = CD_CLIENT_ID; 810 *opt++ = dhcp_clientid_len; 811 bcopy(dhcp_clientid, opt, dhcp_clientid_len); 812 opt += dhcp_clientid_len; 813 } 814 815 parameter_request_list(&opt); 816 817 *opt++ = CD_END; 818 819 /* Done with the OFFER pkt. */ 820 bkmem_free((char *)pl->pkt, pl->len); 821 bkmem_free((char *)pl, sizeof (PKT_LIST)); 822 823 /* 824 * We make 4 attempts here. We wait for 2 seconds to accumulate 825 * requests, just in case a BOOTP server is too fast! 826 */ 827 pkt_size = (uint8_t *)opt - (uint8_t *)pkt; 828 if (pkt_size < sizeof (PKT)) 829 pkt_size = sizeof (PKT); 830 831 nets.s_addr = INADDR_BROADCAST; 832 ours.s_addr = INADDR_ANY; 833 timeout = 0; /* reset timeout */ 834 835 if ((err = inet(pkt_size, &ours, &nets, 4, (time_t)2L)) != 0) 836 return (err); 837 for (wk = list_hd; wk != NULL && state_pl == NULL; wk = wk->next) { 838 if (dhcp_options_scan(wk, B_TRUE) != 0 || 839 !wk->opts[CD_DHCP_TYPE]) 840 continue; /* garbled options */ 841 switch (*wk->opts[CD_DHCP_TYPE]->value) { 842 case ACK: 843 remove_list(wk, B_FALSE); 844 state_pl = wk; 845 break; 846 case NAK: 847 printf("%s: rejected by DHCP server: %s\n", 848 s_n, inet_ntoa(*((struct in_addr *)wk-> 849 opts[CD_SERVER_ID]->value))); 850 if (wk->opts[CD_MESSAGE]) 851 prt_server_msg(wk->opts[CD_MESSAGE]); 852 break; 853 default: 854 dprintf("%s: Unexpected DHCP message type.\n", s_n); 855 break; 856 } 857 } 858 flush_list(); 859 if (state_pl != NULL) { 860 if (state_pl->opts[CD_MESSAGE]) 861 prt_server_msg(state_pl->opts[CD_MESSAGE]); 862 pl_pkt = state_pl->pkt; 863 /* arp our new address, just to make sure */ 864 if (!mac_call_arp(&pl_pkt->yiaddr, NULL, DHCP_ARP_TIMEOUT)) { 865 /* 866 * No response. Check if lease is ok. 867 */ 868 doptp = state_pl->opts[CD_LEASE_TIME]; 869 if (state_pl->opts[CD_DHCP_TYPE] && (!doptp || 870 (doptp->len % 4) != 0)) { 871 dhcp_decline("Missing or corrupted lease time", 872 state_pl); 873 err++; 874 } 875 } else { 876 dhcp_decline("IP Address already being used!", 877 state_pl); 878 err++; 879 } 880 if (err) { 881 bkmem_free((char *)state_pl->pkt, state_pl->len); 882 bkmem_free((char *)state_pl, sizeof (PKT_LIST)); 883 state_pl = NULL; 884 } else 885 return (0); /* passes the tests! */ 886 } 887 dprintf("%s: No valid DHCP acknowledge messages received.\n", s_n); 888 return (1); 889 } 890 891 /* 892 * Implements BOUND state of DHCP client state machine. 893 */ 894 static int 895 dhcp_bound(void) 896 { 897 PKT *pl_pkt = state_pl->pkt; 898 DHCP_OPT *doptp; 899 uint8_t *tp, *hp; 900 int items, i, fnd, k; 901 char hostname[MAXHOSTNAMELEN+1]; 902 struct in_addr subnet, defr, savr, *ipp, xip; 903 904 #ifdef DHCP_DEBUG 905 if (dhcp_classid[0] != 0) { 906 char scratch[DHCP_MAX_OPT_SIZE + 1]; 907 908 bcopy(&dhcp_classid[2], scratch, dhcp_classid[1]); 909 scratch[dhcp_classid[1]] = '\0'; 910 printf("Your machine is of the class: '%s'.\n", scratch); 911 } 912 #endif /* DHCP_DEBUG */ 913 914 /* First, set the bare essentials. (IP layer parameters) */ 915 916 ipv4_getipaddr(&xip); 917 if (xip.s_addr != INADDR_ANY) 918 ipp = &xip; 919 else { 920 ipp = &pl_pkt->yiaddr; 921 ipp->s_addr = ntohl(ipp->s_addr); 922 ipv4_setipaddr(ipp); 923 } 924 925 ipp->s_addr = htonl(ipp->s_addr); 926 927 if (boothowto & RB_VERBOSE) 928 printf("%s: IP address is: %s\n", s_n, inet_ntoa(*ipp)); 929 930 /* 931 * Ensure that the Boot NFS READ size, if given, is an int16_t. 932 */ 933 if (state_pl->vs[VS_BOOT_NFS_READSIZE] != NULL) { 934 doptp = state_pl->vs[VS_BOOT_NFS_READSIZE]; 935 if (doptp->len != sizeof (int16_t)) 936 state_pl->vs[VS_BOOT_NFS_READSIZE] = NULL; 937 } 938 939 /* 940 * Set subnetmask. Nice, but not required. 941 */ 942 if (state_pl->opts[CD_SUBNETMASK] != NULL) { 943 doptp = state_pl->opts[CD_SUBNETMASK]; 944 if (doptp->len != 4) 945 state_pl->opts[CD_SUBNETMASK] = NULL; 946 else { 947 bcopy(doptp->value, &subnet, 948 sizeof (struct in_addr)); 949 dprintf("%s: Setting netmask to: %s\n", s_n, 950 inet_ntoa(subnet)); 951 subnet.s_addr = ntohl(subnet.s_addr); 952 ipv4_setnetmask(&subnet); 953 } 954 } 955 956 /* 957 * Set default IP TTL. Nice, but not required. 958 */ 959 if (state_pl->opts[CD_IPTTL] != NULL) { 960 doptp = state_pl->opts[CD_IPTTL]; 961 if (doptp->len > 1) 962 state_pl->opts[CD_IPTTL] = NULL; 963 else { 964 doptp = state_pl->opts[CD_IPTTL]; 965 ipv4_setmaxttl(*(uint8_t *)doptp->value); 966 dprintf("%s: Setting IP TTL to: %d\n", s_n, 967 *(uint8_t *)doptp->value); 968 } 969 } 970 971 /* 972 * Set default router. Not required, although we'll know soon 973 * enough... 974 */ 975 if (state_pl->opts[CD_ROUTER] != NULL) { 976 doptp = state_pl->opts[CD_ROUTER]; 977 if ((doptp->len % 4) != 0) { 978 state_pl->opts[CD_ROUTER] = NULL; 979 } else { 980 if ((hp = (uint8_t *)bkmem_alloc( 981 mac_get_hdr_len())) == NULL) { 982 errno = ENOMEM; 983 return (-1); 984 } 985 items = doptp->len / sizeof (struct in_addr); 986 tp = doptp->value; 987 bcopy(tp, &savr, sizeof (struct in_addr)); 988 for (i = 0, fnd = 0; i < items; i++) { 989 bcopy(tp, &defr, sizeof (struct in_addr)); 990 for (k = 0, fnd = 0; k < 2 && fnd == 0; k++) { 991 fnd = mac_get_arp(&defr, hp, 992 mac_get_hdr_len(), 993 mac_get_arp_timeout()); 994 } 995 if (fnd) 996 break; 997 dprintf( 998 "%s: Warning: Router %s is unreachable.\n", 999 s_n, inet_ntoa(defr)); 1000 tp += sizeof (struct in_addr); 1001 } 1002 bkmem_free((char *)hp, mac_get_hdr_len()); 1003 1004 /* 1005 * If fnd is 0, we didn't find a working router. We'll 1006 * still try to use first default router. If we got 1007 * a bad router address (like not on the same net), 1008 * we're hosed anyway. 1009 */ 1010 if (!fnd) { 1011 dprintf( 1012 "%s: Warning: Using default router: %s\n", 1013 s_n, inet_ntoa(savr)); 1014 defr.s_addr = savr.s_addr; 1015 } 1016 /* ipv4_route expects network order IP addresses */ 1017 (void) ipv4_route(IPV4_ADD_ROUTE, RT_DEFAULT, NULL, 1018 &defr); 1019 } 1020 } 1021 1022 /* 1023 * Set hostname. Not required. 1024 */ 1025 if (state_pl->opts[CD_HOSTNAME] != NULL) { 1026 doptp = state_pl->opts[CD_HOSTNAME]; 1027 i = doptp->len; 1028 if (i > MAXHOSTNAMELEN) 1029 i = MAXHOSTNAMELEN; 1030 bcopy(doptp->value, hostname, i); 1031 hostname[i] = '\0'; 1032 (void) sethostname(hostname, i); 1033 if (boothowto & RB_VERBOSE) 1034 printf("%s: Hostname is %s\n", s_n, hostname); 1035 } 1036 1037 /* 1038 * We don't care about the lease time.... We can't enforce it anyway. 1039 */ 1040 return (0); 1041 } 1042 1043 /* 1044 * Convert the DHCPACK into a pure ASCII boot property for use by the kernel 1045 * later in the boot process. 1046 */ 1047 static void 1048 create_bootpresponse_bprop(PKT_LIST *pl) 1049 { 1050 uint_t buflen; 1051 #if defined(__i386) 1052 extern struct bootops bootops; 1053 extern int bsetprop(struct bootops *, char *, caddr_t, int, phandle_t); 1054 #endif /* __i386 */ 1055 1056 if (pl == NULL || bootp_response != NULL) 1057 return; 1058 1059 buflen = (pl->len * 2) + 1; /* extra space for null (1) */ 1060 if ((bootp_response = bkmem_alloc(buflen)) == NULL) 1061 return; 1062 1063 if (octet_to_hexascii((uint8_t *)pl->pkt, pl->len, bootp_response, 1064 &buflen) != 0) { 1065 bkmem_free(bootp_response, (pl->len * 2) + 1); 1066 bootp_response = NULL; 1067 } 1068 1069 #if defined(__i386) 1070 /* Use bsetprop to create the bootp-response property */ 1071 if (bsetprop(&bootops, "bootp-response", bootp_response, 0, 0) != 1072 BOOT_SUCCESS) { 1073 bkmem_free(bootp_response, (pl->len * 2) + 1); 1074 bootp_response = NULL; 1075 } 1076 #elif defined(__sparc) 1077 prom_create_encoded_prop("bootp-response", pl->pkt, pl->len, 1078 ENCODE_BYTES); 1079 #endif /* __i386 */ 1080 } 1081 1082 /* 1083 * Examines /chosen node for "bootp-response" property. If it exists, this 1084 * property is the DHCPACK cached there by the PROM's DHCP implementation. 1085 * 1086 * If cache_present is B_TRUE, we simply return B_TRUE if the property exists 1087 * w/o decoding it. If cache_present is B_FALSE, we decode the packet and 1088 * use it as our state packet for the jump to BOUND mode. Note that it's good 1089 * enough that the cache exists w/o validation for determining if that's what 1090 * the user intended. 1091 * 1092 * We'll short-circuit the DHCP exchange by accepting this packet. We build a 1093 * PKT_LIST structure, and copy the bootp-response property value into a 1094 * PKT buffer we allocated. We then scan the PKT for options, and then 1095 * set state_pl to point to it. 1096 * 1097 * Returns B_TRUE if a packet was cached (and was processed correctly), false 1098 * otherwise. The caller needs to make the state change from SELECTING to 1099 * BOUND upon a B_TRUE return from this function. 1100 */ 1101 int 1102 prom_cached_reply(int cache_present) 1103 { 1104 PKT_LIST *pl; 1105 int len; 1106 #if defined(__i386) 1107 char *ack; 1108 int pxe_ack_cache(char **); 1109 1110 if ((len = pxe_ack_cache(&ack)) <= 0) 1111 return (B_FALSE); 1112 #else 1113 dnode_t chosen; 1114 char *prop = PROM_BOOT_CACHED; 1115 1116 chosen = prom_finddevice("/chosen"); 1117 if (chosen == OBP_NONODE || chosen == OBP_BADNODE) 1118 chosen = prom_nextnode((dnode_t)0); /* root node */ 1119 1120 if ((len = prom_getproplen(chosen, prop)) <= 0) 1121 return (B_FALSE); 1122 #endif /* __i386 */ 1123 1124 if (cache_present) 1125 return (B_TRUE); 1126 1127 if (((pl = (PKT_LIST *)bkmem_zalloc(sizeof (PKT_LIST))) == NULL) || 1128 ((pl->pkt = (PKT *)bkmem_zalloc(len)) == NULL)) { 1129 errno = ENOMEM; 1130 if (pl != NULL) 1131 bkmem_free((char *)pl, sizeof (PKT_LIST)); 1132 return (B_FALSE); 1133 } 1134 1135 #if defined(__i386) 1136 bcopy(ack, pl->pkt, len); 1137 #else 1138 (void) prom_getprop(chosen, prop, (caddr_t)pl->pkt); 1139 #endif /* __i386 */ 1140 1141 pl->len = len; 1142 1143 if (dhcp_options_scan(pl, B_TRUE) != 0) { 1144 /* garbled packet */ 1145 bkmem_free((char *)pl->pkt, pl->len); 1146 bkmem_free((char *)pl, sizeof (PKT_LIST)); 1147 return (B_FALSE); 1148 } 1149 1150 state_pl = pl; 1151 return (B_TRUE); 1152 } 1153 1154 /* 1155 * Perform DHCP to acquire what we used to get using rarp/bootparams. 1156 * Returns 0 for success, nonzero otherwise. 1157 * 1158 * DHCP client state machine. 1159 */ 1160 int 1161 dhcp(void) 1162 { 1163 int err = 0; 1164 int done = B_FALSE; 1165 1166 dhcp_buf_size = mac_get_mtu(); 1167 dhcp_snd_bufp = (PKT *)bkmem_alloc(dhcp_buf_size); 1168 dhcp_rcv_bufp = (PKT *)bkmem_alloc(dhcp_buf_size); 1169 1170 if (dhcp_snd_bufp == NULL || dhcp_rcv_bufp == NULL) { 1171 if (dhcp_snd_bufp != NULL) 1172 bkmem_free((char *)dhcp_snd_bufp, dhcp_buf_size); 1173 if (dhcp_rcv_bufp != NULL) 1174 bkmem_free((char *)dhcp_rcv_bufp, dhcp_buf_size); 1175 errno = ENOMEM; 1176 return (-1); 1177 } 1178 1179 while (err == 0 && !done) { 1180 switch (dhcp_state) { 1181 case INIT: 1182 1183 s_n = "INIT"; 1184 if (prom_cached_reply(B_FALSE)) { 1185 dprintf("%s: Using PROM cached BOOT reply...\n", 1186 s_n); 1187 dhcp_state = BOUND; 1188 } else { 1189 dhcp_state = SELECTING; 1190 dhcp_start_time = prom_gettime(); 1191 } 1192 break; 1193 1194 case SELECTING: 1195 1196 s_n = "SELECTING"; 1197 err = dhcp_selecting(); 1198 switch (err) { 1199 case 0: 1200 dhcp_state = REQUESTING; 1201 break; 1202 case DHCP_NO_DATA: 1203 dprintf( 1204 "%s: No DHCP response after %d tries.\n", 1205 s_n, DHCP_RETRIES); 1206 break; 1207 default: 1208 /* major network problems */ 1209 dprintf("%s: Network transaction failed: %d\n", 1210 s_n, err); 1211 break; 1212 } 1213 break; 1214 1215 case REQUESTING: 1216 1217 s_n = "REQUESTING"; 1218 err = dhcp_requesting(); 1219 switch (err) { 1220 case 0: 1221 dhcp_state = BOUND; 1222 break; 1223 case DHCP_NO_DATA: 1224 dprintf("%s: Request timed out.\n", s_n); 1225 dhcp_state = SELECTING; 1226 err = 0; 1227 (void) sleep(10); 1228 break; 1229 default: 1230 /* major network problems */ 1231 dprintf("%s: Network transaction failed: %d\n", 1232 s_n, err); 1233 break; 1234 } 1235 break; 1236 1237 case BOUND: 1238 1239 /* 1240 * We just "give up" if bound state fails. 1241 */ 1242 s_n = "BOUND"; 1243 if ((err = dhcp_bound()) == 0) { 1244 dhcp_state = CONFIGURED; 1245 } 1246 break; 1247 1248 case CONFIGURED: 1249 s_n = "CONFIGURED"; 1250 create_bootpresponse_bprop(state_pl); 1251 done = B_TRUE; 1252 break; 1253 } 1254 } 1255 bkmem_free((char *)dhcp_snd_bufp, dhcp_buf_size); 1256 bkmem_free((char *)dhcp_rcv_bufp, dhcp_buf_size); 1257 1258 return (err); 1259 } 1260 1261 /* 1262 * Returns a copy of the DHCP-supplied value of the parameter requested 1263 * by code. 1264 */ 1265 boolean_t 1266 dhcp_getinfo(uchar_t optcat, uint16_t code, uint16_t optsize, void *value, 1267 size_t *vallenp) 1268 { 1269 size_t len = *vallenp; 1270 1271 if (dhcp_getinfo_pl(state_pl, optcat, code, 1272 optsize, value, &len)) { 1273 1274 if (len <= *vallenp) { 1275 *vallenp = len; 1276 return (B_TRUE); 1277 } 1278 } 1279 1280 return (B_FALSE); 1281 } 1282 1283 /* 1284 * Sets the clientid option. 1285 */ 1286 void 1287 dhcp_set_client_id(uint8_t *clientid, uint8_t clientid_len) 1288 { 1289 bcopy(clientid, dhcp_clientid, clientid_len); 1290 dhcp_clientid_len = clientid_len; 1291 } 1292