#include <sys/param.h>
#include <sys/systm.h>
#include <sys/kernel.h>
#include <sys/conf.h>
#include <sys/ioctl.h>
#include <sys/proc.h>
#include <sys/mount_internal.h>
#include <sys/kpi_mbuf.h>
#include <sys/malloc.h>
#include <sys/socket.h>
#include <net/if.h>
#include <net/if_dl.h>
#include <net/if_types.h>
#include <net/route.h>
#include <netinet/in.h>
#include <netinet/if_ether.h>
#include <nfs/rpcv2.h>
#include <nfs/nfsproto.h>
#include <nfs/nfs.h>
#include <nfs/nfsdiskless.h>
#include <nfs/krpc.h>
#include <pexpert/pexpert.h>
#include "ether.h"
#include <libkern/libkern.h>
#if NETHER == 0
int nfs_boot_init(__unused struct nfs_diskless *nd)
{
panic("nfs_boot_init: no ether");
}
int nfs_boot_getfh(__unused struct nfs_diskless *nd, __unused int v3, __unused int sotype)
{
panic("nfs_boot_getfh: no ether");
}
#else
static int bp_whoami(struct sockaddr_in *bpsin,
struct in_addr *my_ip, struct in_addr *gw_ip);
static int bp_getfile(struct sockaddr_in *bpsin, const char *key,
struct sockaddr_in *mdsin, char *servname, char *path);
static int md_mount(struct sockaddr_in *mdsin, char *path, int v3, int sotype,
u_char *fhp, u_int32_t *fhlenp);
static int get_file_handle(struct nfs_dlmount *ndmntp);
#define IP_FORMAT "%d.%d.%d.%d"
#define IP_CH(ip) ((u_char *)ip)
#define IP_LIST(ip) IP_CH(ip)[0],IP_CH(ip)[1],IP_CH(ip)[2],IP_CH(ip)[3]
#include <sys/netboot.h>
int
nfs_boot_init(struct nfs_diskless *nd)
{
struct sockaddr_in bp_sin;
boolean_t do_bpwhoami = TRUE;
boolean_t do_bpgetfile = TRUE;
int error = 0;
struct in_addr my_ip;
struct sockaddr_in * sin_p;
if (!nfs_mbuf_mhlen)
nfs_mbuf_init();
if (netboot_iaddr(&my_ip) == FALSE) {
printf("nfs_boot: networking is not initialized\n");
error = ENXIO;
goto failed;
}
MALLOC_ZONE(nd->nd_root.ndm_path, char *, MAXPATHLEN, M_NAMEI, M_WAITOK);
if (!nd->nd_root.ndm_path) {
printf("nfs_boot: can't allocate root path buffer\n");
error = ENOMEM;
goto failed;
}
MALLOC_ZONE(nd->nd_root.ndm_mntfrom, char *, MAXPATHLEN, M_NAMEI, M_WAITOK);
if (!nd->nd_root.ndm_mntfrom) {
printf("nfs_boot: can't allocate root mntfrom buffer\n");
error = ENOMEM;
goto failed;
}
sin_p = &nd->nd_root.ndm_saddr;
bzero((caddr_t)sin_p, sizeof(*sin_p));
sin_p->sin_len = sizeof(*sin_p);
sin_p->sin_family = AF_INET;
if (netboot_rootpath(&sin_p->sin_addr, nd->nd_root.ndm_host,
sizeof(nd->nd_root.ndm_host),
nd->nd_root.ndm_path, MAXPATHLEN) == TRUE) {
do_bpgetfile = FALSE;
do_bpwhoami = FALSE;
}
nd->nd_private.ndm_saddr.sin_addr.s_addr = 0;
if (do_bpwhoami) {
struct in_addr router;
bzero((caddr_t)&bp_sin, sizeof(bp_sin));
bp_sin.sin_len = sizeof(bp_sin);
bp_sin.sin_family = AF_INET;
bp_sin.sin_addr.s_addr = INADDR_BROADCAST;
hostnamelen = MAXHOSTNAMELEN;
router.s_addr = 0;
error = bp_whoami(&bp_sin, &my_ip, &router);
if (error) {
printf("nfs_boot: bootparam whoami, error=%d", error);
goto failed;
}
printf("nfs_boot: BOOTPARAMS server " IP_FORMAT "\n",
IP_LIST(&bp_sin.sin_addr));
printf("nfs_boot: hostname %s\n", hostname);
}
if (do_bpgetfile) {
error = bp_getfile(&bp_sin, "root", &nd->nd_root.ndm_saddr,
nd->nd_root.ndm_host, nd->nd_root.ndm_path);
if (error) {
printf("nfs_boot: bootparam get root: %d\n", error);
goto failed;
}
}
#if !defined(NO_MOUNT_PRIVATE)
if (do_bpgetfile) {
MALLOC_ZONE(nd->nd_private.ndm_path, char *, MAXPATHLEN, M_NAMEI, M_WAITOK);
if (!nd->nd_private.ndm_path) {
printf("nfs_boot: can't allocate private path buffer\n");
error = ENOMEM;
goto failed;
}
MALLOC_ZONE(nd->nd_private.ndm_mntfrom, char *, MAXPATHLEN, M_NAMEI, M_WAITOK);
if (!nd->nd_private.ndm_mntfrom) {
printf("nfs_boot: can't allocate private host buffer\n");
error = ENOMEM;
goto failed;
}
error = bp_getfile(&bp_sin, "private",
&nd->nd_private.ndm_saddr,
nd->nd_private.ndm_host,
nd->nd_private.ndm_path);
if (!error) {
char * check_path = NULL;
MALLOC_ZONE(check_path, char *, MAXPATHLEN, M_NAMEI, M_WAITOK);
if (!check_path) {
printf("nfs_boot: can't allocate check_path buffer\n");
error = ENOMEM;
goto failed;
}
snprintf(check_path, MAXPATHLEN, "%s/private", nd->nd_root.ndm_path);
if ((nd->nd_root.ndm_saddr.sin_addr.s_addr
== nd->nd_private.ndm_saddr.sin_addr.s_addr)
&& (strncmp(check_path, nd->nd_private.ndm_path, MAXPATHLEN) == 0)) {
nd->nd_private.ndm_saddr.sin_addr.s_addr = 0;
}
FREE_ZONE(check_path, MAXPATHLEN, M_NAMEI);
}
else {
nd->nd_private.ndm_saddr.sin_addr.s_addr = 0;
}
}
else {
error = 0;
}
#endif
failed:
return (error);
}
int
nfs_boot_getfh(struct nfs_diskless *nd, int v3, int sotype)
{
int error = 0;
nd->nd_root.ndm_nfsv3 = v3;
nd->nd_root.ndm_sotype = sotype;
error = get_file_handle(&nd->nd_root);
if (error) {
printf("nfs_boot: get_file_handle(v%d) root failed, %d\n",
v3 ? 3 : 2, error);
goto failed;
}
#if !defined(NO_MOUNT_PRIVATE)
if (nd->nd_private.ndm_saddr.sin_addr.s_addr) {
nd->nd_private.ndm_nfsv3 = v3;
nd->nd_private.ndm_sotype = sotype;
error = get_file_handle(&nd->nd_private);
if (error) {
printf("nfs_boot: get_file_handle(v%d) private failed, %d\n",
v3 ? 3 : 2, error);
goto failed;
}
}
#endif
failed:
return (error);
}
static int
get_file_handle(ndmntp)
struct nfs_dlmount *ndmntp;
{
char *sp, *dp, *endp;
int error;
error = md_mount(&ndmntp->ndm_saddr, ndmntp->ndm_path, ndmntp->ndm_nfsv3,
ndmntp->ndm_sotype, ndmntp->ndm_fh, &ndmntp->ndm_fhlen);
if (error)
return (error);
dp = ndmntp->ndm_mntfrom;
endp = dp + MAXPATHLEN - 1;
for (sp = ndmntp->ndm_host; *sp && dp < endp;)
*dp++ = *sp++;
if (dp < endp)
*dp++ = ':';
for (sp = ndmntp->ndm_path; *sp && dp < endp;)
*dp++ = *sp++;
*dp = '\0';
return (0);
}
static int
mbuf_get_with_len(size_t msg_len, mbuf_t *m)
{
int error;
error = mbuf_gethdr(MBUF_WAITOK, MBUF_TYPE_DATA, m);
if (error)
return (error);
if (msg_len > mbuf_maxlen(*m)) {
error = mbuf_mclget(MBUF_WAITOK, MBUF_TYPE_DATA, m);
if (error) {
mbuf_freem(*m);
return (error);
}
if (msg_len > mbuf_maxlen(*m))
panic("nfs_boot: msg_len > MCLBYTES");
}
mbuf_setlen(*m, msg_len);
mbuf_pkthdr_setlen(*m, msg_len);
return (0);
}
struct rpc_string {
u_int32_t len;
u_char data[4];
};
#define RPC_STR_SIZE(slen) (4 + ((slen + 3) & ~3))
struct bp_inaddr {
u_int32_t atype;
int32_t addr[4];
};
static int
bp_whoami(bpsin, my_ip, gw_ip)
struct sockaddr_in *bpsin;
struct in_addr *my_ip;
struct in_addr *gw_ip;
{
struct whoami_call {
u_int32_t call_prog;
u_int32_t call_vers;
u_int32_t call_proc;
u_int32_t call_arglen;
struct bp_inaddr call_ia;
} *call;
struct rpc_string *str;
struct bp_inaddr *bia;
mbuf_t m;
struct sockaddr_in sin;
int error;
size_t msg_len, cn_len, dn_len;
u_char *p;
int32_t *lp;
msg_len = sizeof(*call);
error = mbuf_get_with_len(msg_len, &m);
if (error)
return error;
call = mbuf_data(m);
call->call_prog = htonl(BOOTPARAM_PROG);
call->call_vers = htonl(BOOTPARAM_VERS);
call->call_proc = htonl(BOOTPARAM_WHOAMI);
call->call_arglen = htonl(sizeof(struct bp_inaddr));
call->call_ia.atype = htonl(1);
p = (u_char*)my_ip;
lp = call->call_ia.addr;
*lp++ = htonl(*p); p++;
*lp++ = htonl(*p); p++;
*lp++ = htonl(*p); p++;
*lp++ = htonl(*p); p++;
bpsin->sin_port = htons(PMAPPORT);
error = krpc_call(bpsin, SOCK_DGRAM, PMAPPROG, PMAPVERS, PMAPPROC_CALLIT, &m, &sin);
if (error)
return error;
msg_len = mbuf_len(m);
lp = mbuf_data(m);
if (msg_len < sizeof(*lp))
goto bad;
msg_len -= sizeof(*lp);
bpsin->sin_port = htons((short)ntohl(*lp++));
bpsin->sin_addr.s_addr = sin.sin_addr.s_addr;
if (msg_len < (ntohl(*lp) + sizeof(*lp)))
goto bad;
msg_len = ntohl(*lp++);
p = (u_char*)lp;
if (msg_len < sizeof(*str))
goto bad;
str = (struct rpc_string *)p;
cn_len = ntohl(str->len);
if (msg_len < cn_len)
goto bad;
if (cn_len >= MAXHOSTNAMELEN)
goto bad;
bcopy(str->data, hostname, cn_len);
hostname[cn_len] = '\0';
hostnamelen = cn_len;
p += RPC_STR_SIZE(cn_len);
msg_len -= RPC_STR_SIZE(cn_len);
if (msg_len < sizeof(*str))
goto bad;
str = (struct rpc_string *)p;
dn_len = ntohl(str->len);
if (msg_len < dn_len)
goto bad;
if (dn_len >= MAXHOSTNAMELEN)
goto bad;
bcopy(str->data, domainname, dn_len);
domainname[dn_len] = '\0';
domainnamelen = dn_len;
p += RPC_STR_SIZE(dn_len);
msg_len -= RPC_STR_SIZE(dn_len);
if (msg_len < sizeof(*bia))
goto bad;
bia = (struct bp_inaddr *)p;
if (bia->atype != htonl(1))
goto bad;
p = (u_char*)gw_ip;
*p++ = ntohl(bia->addr[0]);
*p++ = ntohl(bia->addr[1]);
*p++ = ntohl(bia->addr[2]);
*p++ = ntohl(bia->addr[3]);
goto out;
bad:
printf("nfs_boot: bootparam_whoami: bad reply\n");
error = EBADRPC;
out:
mbuf_freem(m);
return(error);
}
static int
bp_getfile(bpsin, key, md_sin, serv_name, pathname)
struct sockaddr_in *bpsin;
const char *key;
struct sockaddr_in *md_sin;
char *serv_name;
char *pathname;
{
struct rpc_string *str;
mbuf_t m;
struct bp_inaddr *bia;
struct sockaddr_in *sin;
u_char *p, *q;
int error, msg_len;
int cn_len, key_len, sn_len, path_len;
cn_len = hostnamelen;
key_len = strlen(key);
msg_len = 0;
msg_len += RPC_STR_SIZE(cn_len);
msg_len += RPC_STR_SIZE(key_len);
error = mbuf_get_with_len(msg_len, &m);
if (error)
return error;
p = mbuf_data(m);
bzero(p, msg_len);
str = (struct rpc_string *)p;
str->len = htonl(cn_len);
bcopy(hostname, str->data, cn_len);
p += RPC_STR_SIZE(cn_len);
str = (struct rpc_string *)p;
str->len = htonl(key_len);
bcopy(key, str->data, key_len);
error = krpc_call(bpsin, SOCK_DGRAM, BOOTPARAM_PROG, BOOTPARAM_VERS,
BOOTPARAM_GETFILE, &m, NULL);
if (error)
return error;
p = mbuf_data(m);
msg_len = mbuf_len(m);
if (msg_len < (int)sizeof(*str))
goto bad;
str = (struct rpc_string *)p;
sn_len = ntohl(str->len);
if (msg_len < sn_len)
goto bad;
if (sn_len >= MAXHOSTNAMELEN)
goto bad;
bcopy(str->data, serv_name, sn_len);
serv_name[sn_len] = '\0';
p += RPC_STR_SIZE(sn_len);
msg_len -= RPC_STR_SIZE(sn_len);
if (msg_len < (int)sizeof(*bia))
goto bad;
bia = (struct bp_inaddr *)p;
if (bia->atype != htonl(1))
goto bad;
sin = md_sin;
bzero((caddr_t)sin, sizeof(*sin));
sin->sin_len = sizeof(*sin);
sin->sin_family = AF_INET;
q = (u_char*) &sin->sin_addr;
*q++ = ntohl(bia->addr[0]);
*q++ = ntohl(bia->addr[1]);
*q++ = ntohl(bia->addr[2]);
*q++ = ntohl(bia->addr[3]);
p += sizeof(*bia);
msg_len -= sizeof(*bia);
if (msg_len < (int)sizeof(*str))
goto bad;
str = (struct rpc_string *)p;
path_len = ntohl(str->len);
if (msg_len < path_len)
goto bad;
if (path_len >= MAXPATHLEN)
goto bad;
bcopy(str->data, pathname, path_len);
pathname[path_len] = '\0';
goto out;
bad:
printf("nfs_boot: bootparam_getfile: bad reply\n");
error = EBADRPC;
out:
mbuf_freem(m);
return(0);
}
static int
md_mount(mdsin, path, v3, sotype, fhp, fhlenp)
struct sockaddr_in *mdsin;
char *path;
int v3;
int sotype;
u_char *fhp;
u_int32_t *fhlenp;
{
struct rpc_string *str;
struct rdata {
u_int32_t errno;
u_char data[NFSX_V3FHMAX + sizeof(u_int32_t)];
} *rdata;
mbuf_t m;
int error, mlen, slen;
int mntversion = v3 ? RPCMNT_VER3 : RPCMNT_VER1;
int proto = (sotype == SOCK_STREAM) ? IPPROTO_TCP : IPPROTO_UDP;
in_port_t mntport, nfsport;
error = krpc_portmap(mdsin, RPCPROG_MNT, mntversion, proto, &mntport);
if (error)
return error;
error = krpc_portmap(mdsin, NFS_PROG, v3 ? NFS_VER3 : NFS_VER2, proto, &nfsport);
if (error)
return error;
mdsin->sin_port = mntport;
slen = strlen(path);
mlen = RPC_STR_SIZE(slen);
error = mbuf_get_with_len(mlen, &m);
if (error)
return error;
str = mbuf_data(m);
str->len = htonl(slen);
bcopy(path, str->data, slen);
error = krpc_call(mdsin, sotype, RPCPROG_MNT, mntversion, RPCMNT_MOUNT, &m, NULL);
if (error)
return error;
mlen = mbuf_len(m);
if (mlen < (int)sizeof(u_int32_t))
goto bad;
rdata = mbuf_data(m);
error = ntohl(rdata->errno);
if (error)
goto out;
if (v3) {
u_int32_t fhlen;
u_char *fh;
if (mlen < (int)sizeof(u_int32_t)*2)
goto bad;
fhlen = ntohl(*(u_int32_t*)rdata->data);
fh = rdata->data + sizeof(u_int32_t);
if (mlen < (int)(sizeof(u_int32_t)*2 + fhlen))
goto bad;
bcopy(fh, fhp, fhlen);
*fhlenp = fhlen;
} else {
if (mlen < ((int)sizeof(u_int32_t) + NFSX_V2FH))
goto bad;
bcopy(rdata->data, fhp, NFSX_V2FH);
*fhlenp = NFSX_V2FH;
}
mdsin->sin_port = nfsport;
goto out;
bad:
error = EBADRPC;
out:
mbuf_freem(m);
return error;
}
#endif