]>
git.saurik.com Git - apple/xnu.git/blob - bsd/nfs/nfs_boot.c
98dbc23675ebfb427b2bda6353664edc0f0b5902
2 * Copyright (c) 2000-2002 Apple Computer, Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * The contents of this file constitute Original Code as defined in and
7 * are subject to the Apple Public Source License Version 1.1 (the
8 * "License"). You may not use this file except in compliance with the
9 * License. Please obtain a copy of the License at
10 * http://www.apple.com/publicsource and read it before using this file.
12 * This Original Code and all software distributed under the License are
13 * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
14 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
17 * License for the specific language governing rights and limitations
20 * @APPLE_LICENSE_HEADER_END@
22 /* Copyright (c) 1995, 1997 NeXT Computer, Inc. All Rights Reserved */
24 * Copyright (c) 1994 Adam Glass, Gordon Ross
25 * All rights reserved.
27 * This software was developed by the Computer Systems Engineering group
28 * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
29 * contributed to Berkeley.
31 * Redistribution and use in source and binary forms, with or without
32 * modification, are permitted provided that the following conditions
34 * 1. Redistributions of source code must retain the above copyright
35 * notice, this list of conditions and the following disclaimer.
36 * 2. Redistributions in binary form must reproduce the above copyright
37 * notice, this list of conditions and the following disclaimer in the
38 * documentation and/or other materials provided with the distribution.
39 * 3. All advertising materials mentioning features or use of this software
40 * must display the following acknowledgement:
41 * This product includes software developed by the University of
42 * California, Lawrence Berkeley Laboratory and its contributors.
43 * 4. Neither the name of the University nor the names of its contributors
44 * may be used to endorse or promote products derived from this software
45 * without specific prior written permission.
47 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
48 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
49 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
50 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
51 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
52 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
53 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
54 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
55 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
56 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
60 * 14-March-97 Dieter Siegmund (dieter@next.com)
61 * - Use BOOTP instead of RARP to get the IP address at boot time
63 * 23-May-97 Umesh Vaishampayan (umeshv@apple.com)
64 * - Added the ability to mount "/private" separately.
66 * 30-May-97 Dieter Siegmund (dieter@next.com)
67 * - Clear out the ireq structure before using it to prevent
68 * our sending using a bogus source IP address, we should use
69 * an IP address of all zeroes
70 * - Right after BOOTP, get the correct netmask using AUTONETMASK
71 * 18-Jul-97 Dieter Siegmund (dieter@apple.com)
72 * - we can't restrict the netmask until we have a default route,
73 * removed AUTONETMASK call (ifdef'd out)
74 * 5-Aug-97 Dieter Siegmund (dieter@apple.com)
75 * - use the default route from the bpwhoami call, enabled autonetmask
77 * 19-Feb-1999 Dieter Siegmund (dieter@apple.com)
78 * - use new BOOTP routine to get the subnet mask and router
79 * and stop using SIOCAUTOADDR
80 * - don't bother mounting private separately if it's not
81 * specified or not required because they are substrings of
82 * one another ie. root=host:/A and private=host:/A/private
83 * - allow the root path to be specified in the boot variable
84 * "rp" (AKA "rootpath")
85 * 19-Jul-1999 Dieter Siegmund (dieter@apple.com)
86 * - replaced big automatic arrays with MALLOC'd data
89 #include <sys/param.h>
90 #include <sys/systm.h>
91 #include <sys/kernel.h>
93 #include <sys/ioctl.h>
95 #include <sys/mount.h>
98 #include <sys/malloc.h>
99 #include <sys/socket.h>
100 #include <sys/reboot.h>
103 #include <net/if_dl.h>
104 #include <net/if_types.h>
105 #include <net/route.h>
107 #include <netinet/in.h>
108 #include <netinet/if_ether.h>
110 #include <nfs/rpcv2.h>
111 #include <nfs/nfsproto.h>
113 #include <nfs/nfsdiskless.h>
114 #include <nfs/krpc.h>
116 #include <pexpert/pexpert.h>
120 #include <libkern/libkern.h>
122 extern char *strchr(const char *str
, int ch
);
126 int nfs_boot_init(nd
, procp
)
127 struct nfs_diskless
*nd
;
130 panic("nfs_boot_init: no ether");
133 int nfs_boot_getfh(nd
, procp
, v3
)
134 struct nfs_diskless
*nd
;
138 panic("nfs_boot_getfh: no ether");
144 * Support for NFS diskless booting, specifically getting information
145 * about where to boot from, what pathnames, etc.
147 * This implememtation uses RARP and the bootparam RPC.
148 * We are forced to implement RPC anyway (to get file handles)
149 * so we might as well take advantage of it for bootparam too.
151 * The diskless boot sequence goes as follows:
152 * (1) Use RARP to get our interface address
153 * (2) Use RPC/bootparam/whoami to get our hostname,
154 * our IP address, and the server's IP address.
155 * (3) Use RPC/bootparam/getfile to get the root path
156 * (4) Use RPC/mountd to get the root file handle
157 * (5) Use RPC/bootparam/getfile to get the swap path
158 * (6) Use RPC/mountd to get the swap file handle
160 * (This happens to be the way Sun does it too.)
164 static int bp_whoami
__P((struct sockaddr_in
*bpsin
,
165 struct in_addr
*my_ip
, struct in_addr
*gw_ip
));
166 static int bp_getfile
__P((struct sockaddr_in
*bpsin
, char *key
,
167 struct sockaddr_in
*mdsin
, char *servname
, char *path
));
170 static int md_mount
__P((struct sockaddr_in
*mdsin
, char *path
, int v3
,
171 u_char
*fhp
, u_long
*fhlenp
));
174 static int get_file_handle
__P((struct nfs_dlmount
*ndmntp
));
177 #define IP_FORMAT "%d.%d.%d.%d"
178 #define IP_CH(ip) ((u_char *)ip)
179 #define IP_LIST(ip) IP_CH(ip)[0],IP_CH(ip)[1],IP_CH(ip)[2],IP_CH(ip)[3]
182 netboot_iaddr(struct in_addr
* iaddr_p
);
185 netboot_rootpath(struct in_addr
* server_ip
,
186 char * name
, int name_len
,
187 char * path
, int path_len
);
190 * Called with an empty nfs_diskless struct to be filled in.
193 nfs_boot_init(nd
, procp
)
194 struct nfs_diskless
*nd
;
197 struct sockaddr_in bp_sin
;
198 boolean_t do_bpwhoami
= TRUE
;
199 boolean_t do_bpgetfile
= TRUE
;
201 struct in_addr my_ip
;
202 struct sockaddr_in
* sin_p
;
204 /* by this point, networking must already have been configured */
205 if (netboot_iaddr(&my_ip
) == FALSE
) {
206 printf("nfs_boot: networking is not initialized\n");
211 /* get the root path information */
212 MALLOC_ZONE(nd
->nd_root
.ndm_path
, char *, MAXPATHLEN
, M_NAMEI
, M_WAITOK
);
213 sin_p
= &nd
->nd_root
.ndm_saddr
;
214 bzero((caddr_t
)sin_p
, sizeof(*sin_p
));
215 sin_p
->sin_len
= sizeof(*sin_p
);
216 sin_p
->sin_family
= AF_INET
;
217 if (netboot_rootpath(&sin_p
->sin_addr
, nd
->nd_root
.ndm_host
,
218 sizeof(nd
->nd_root
.ndm_host
),
219 nd
->nd_root
.ndm_path
, MAXPATHLEN
) == TRUE
) {
220 do_bpgetfile
= FALSE
;
223 nd
->nd_private
.ndm_saddr
.sin_addr
.s_addr
= 0;
225 thread_funnel_switch(KERNEL_FUNNEL
, NETWORK_FUNNEL
);
228 struct in_addr router
;
230 * Get client name and gateway address.
231 * RPC: bootparam/whoami
232 * Use the old broadcast address for the WHOAMI
233 * call because we do not yet know our netmask.
234 * The server address returned by the WHOAMI call
235 * is used for all subsequent booptaram RPCs.
237 bzero((caddr_t
)&bp_sin
, sizeof(bp_sin
));
238 bp_sin
.sin_len
= sizeof(bp_sin
);
239 bp_sin
.sin_family
= AF_INET
;
240 bp_sin
.sin_addr
.s_addr
= INADDR_BROADCAST
;
241 hostnamelen
= MAXHOSTNAMELEN
;
243 error
= bp_whoami(&bp_sin
, &my_ip
, &router
);
245 printf("nfs_boot: bootparam whoami, error=%d", error
);
248 printf("nfs_boot: BOOTPARAMS server " IP_FORMAT
"\n",
249 IP_LIST(&bp_sin
.sin_addr
));
250 printf("nfs_boot: hostname %s\n", hostname
);
253 error
= bp_getfile(&bp_sin
, "root", &nd
->nd_root
.ndm_saddr
,
254 nd
->nd_root
.ndm_host
, nd
->nd_root
.ndm_path
);
256 printf("nfs_boot: bootparam get root: %d\n", error
);
261 #if !defined(NO_MOUNT_PRIVATE)
262 if (do_bpgetfile
) { /* get private path */
263 MALLOC_ZONE(nd
->nd_private
.ndm_path
, char *, MAXPATHLEN
, M_NAMEI
, M_WAITOK
);
264 error
= bp_getfile(&bp_sin
, "private",
265 &nd
->nd_private
.ndm_saddr
,
266 nd
->nd_private
.ndm_host
,
267 nd
->nd_private
.ndm_path
);
269 char * check_path
= NULL
;
271 MALLOC_ZONE(check_path
, char *, MAXPATHLEN
, M_NAMEI
, M_WAITOK
);
272 snprintf(check_path
, MAXPATHLEN
, "%s/private", nd
->nd_root
.ndm_path
);
273 if ((nd
->nd_root
.ndm_saddr
.sin_addr
.s_addr
274 == nd
->nd_private
.ndm_saddr
.sin_addr
.s_addr
)
275 && (strcmp(check_path
, nd
->nd_private
.ndm_path
) == 0)) {
276 /* private path is prefix of root path, don't mount */
277 nd
->nd_private
.ndm_saddr
.sin_addr
.s_addr
= 0;
279 FREE_ZONE(check_path
, MAXPATHLEN
, M_NAMEI
);
282 /* private key not defined, don't mount */
283 nd
->nd_private
.ndm_saddr
.sin_addr
.s_addr
= 0;
289 #endif NO_MOUNT_PRIVATE
291 thread_funnel_switch(NETWORK_FUNNEL
, KERNEL_FUNNEL
);
296 * Called with a partially initialized nfs_diskless struct
297 * with file handles to be filled in.
300 nfs_boot_getfh(nd
, procp
, v3
)
301 struct nfs_diskless
*nd
;
307 thread_funnel_switch(KERNEL_FUNNEL
, NETWORK_FUNNEL
);
309 nd
->nd_root
.ndm_nfsv3
= v3
;
310 error
= get_file_handle(&nd
->nd_root
);
312 printf("nfs_boot: get_file_handle(v%d) root failed, %d\n",
317 #if !defined(NO_MOUNT_PRIVATE)
318 if (nd
->nd_private
.ndm_saddr
.sin_addr
.s_addr
) {
319 /* get private file handle */
320 nd
->nd_private
.ndm_nfsv3
= v3
;
321 error
= get_file_handle(&nd
->nd_private
);
323 printf("nfs_boot: get_file_handle(v%d) private failed, %d\n",
328 #endif NO_MOUNT_PRIVATE
330 thread_funnel_switch(NETWORK_FUNNEL
, KERNEL_FUNNEL
);
335 get_file_handle(ndmntp
)
336 struct nfs_dlmount
*ndmntp
;
338 char *sp
, *dp
, *endp
;
342 * Get file handle for "key" (root or swap)
343 * using RPC to mountd/mount
345 error
= md_mount(&ndmntp
->ndm_saddr
, ndmntp
->ndm_path
, ndmntp
->ndm_nfsv3
,
346 ndmntp
->ndm_fh
, &ndmntp
->ndm_fhlen
);
350 /* Construct remote path (for getmntinfo(3)) */
351 dp
= ndmntp
->ndm_host
;
352 endp
= dp
+ MNAMELEN
- 1;
355 for (sp
= ndmntp
->ndm_path
; *sp
&& dp
< endp
;)
364 * Get an mbuf with the given length, and
365 * initialize the pkthdr length field.
368 m_get_len(int msg_len
)
371 m
= m_gethdr(M_WAIT
, MT_DATA
);
374 if (msg_len
> MHLEN
) {
375 if (msg_len
> MCLBYTES
)
376 panic("nfs_boot: msg_len > MCLBYTES");
382 m
->m_pkthdr
.len
= m
->m_len
;
388 * String representation for RPC.
391 u_long len
; /* length without null or padding */
392 u_char data
[4]; /* data (longer, of course) */
393 /* data is padded to a long-word boundary */
395 /* Compute space used given string length. */
396 #define RPC_STR_SIZE(slen) (4 + ((slen + 3) & ~3))
399 * Inet address in RPC messages
400 * (Note, really four longs, NOT chars. Blech.)
409 * RPC: bootparam/whoami
410 * Given client IP address, get:
411 * client name (hostname)
412 * domain name (domainname)
415 * The hostname and domainname are set here for convenience.
417 * Note - bpsin is initialized to the broadcast address,
418 * and will be replaced with the bootparam server address
419 * after this call is complete. Have to use PMAP_PROC_CALL
420 * to make sure we get responses only from a servers that
421 * know about us (don't want to broadcast a getport call).
424 bp_whoami(bpsin
, my_ip
, gw_ip
)
425 struct sockaddr_in
*bpsin
;
426 struct in_addr
*my_ip
;
427 struct in_addr
*gw_ip
;
429 /* RPC structures for PMAPPROC_CALLIT */
435 struct bp_inaddr call_ia
;
438 struct rpc_string
*str
;
439 struct bp_inaddr
*bia
;
441 struct sockaddr_in
*sin
;
448 * Get message buffer of sufficient size.
450 msg_len
= sizeof(*call
);
451 m
= m_get_len(msg_len
);
456 * Build request message for PMAPPROC_CALLIT.
458 call
= mtod(m
, struct whoami_call
*);
459 call
->call_prog
= htonl(BOOTPARAM_PROG
);
460 call
->call_vers
= htonl(BOOTPARAM_VERS
);
461 call
->call_proc
= htonl(BOOTPARAM_WHOAMI
);
462 call
->call_arglen
= htonl(sizeof(struct bp_inaddr
));
464 /* client IP address */
465 call
->call_ia
.atype
= htonl(1);
467 lp
= call
->call_ia
.addr
;
468 *lp
++ = htonl(*p
); p
++;
469 *lp
++ = htonl(*p
); p
++;
470 *lp
++ = htonl(*p
); p
++;
471 *lp
++ = htonl(*p
); p
++;
473 /* RPC: portmap/callit */
474 bpsin
->sin_port
= htons(PMAPPORT
);
476 error
= krpc_call(bpsin
, PMAPPROG
, PMAPVERS
,
477 PMAPPROC_CALLIT
, &m
, &sin
);
482 * Parse result message.
485 lp
= mtod(m
, long *);
487 /* bootparam server port (also grab from address). */
488 if (msg_len
< sizeof(*lp
))
490 msg_len
-= sizeof(*lp
);
491 bpsin
->sin_port
= htons((short)ntohl(*lp
++));
492 bpsin
->sin_addr
.s_addr
= sin
->sin_addr
.s_addr
;
494 /* length of encapsulated results */
495 if (msg_len
< (ntohl(*lp
) + sizeof(*lp
)))
497 msg_len
= ntohl(*lp
++);
501 if (msg_len
< sizeof(*str
))
503 str
= (struct rpc_string
*)p
;
504 cn_len
= ntohl(str
->len
);
505 if (msg_len
< cn_len
)
507 if (cn_len
>= MAXHOSTNAMELEN
)
509 bcopy(str
->data
, hostname
, cn_len
);
510 hostname
[cn_len
] = '\0';
511 hostnamelen
= cn_len
;
512 p
+= RPC_STR_SIZE(cn_len
);
513 msg_len
-= RPC_STR_SIZE(cn_len
);
516 if (msg_len
< sizeof(*str
))
518 str
= (struct rpc_string
*)p
;
519 dn_len
= ntohl(str
->len
);
520 if (msg_len
< dn_len
)
522 if (dn_len
>= MAXHOSTNAMELEN
)
524 bcopy(str
->data
, domainname
, dn_len
);
525 domainname
[dn_len
] = '\0';
526 domainnamelen
= dn_len
;
527 p
+= RPC_STR_SIZE(dn_len
);
528 msg_len
-= RPC_STR_SIZE(dn_len
);
530 /* gateway address */
531 if (msg_len
< sizeof(*bia
))
533 bia
= (struct bp_inaddr
*)p
;
534 if (bia
->atype
!= htonl(1))
537 *p
++ = ntohl(bia
->addr
[0]);
538 *p
++ = ntohl(bia
->addr
[1]);
539 *p
++ = ntohl(bia
->addr
[2]);
540 *p
++ = ntohl(bia
->addr
[3]);
544 printf("nfs_boot: bootparam_whoami: bad reply\n");
557 * RPC: bootparam/getfile
558 * Given client name and file "key", get:
564 bp_getfile(bpsin
, key
, md_sin
, serv_name
, pathname
)
565 struct sockaddr_in
*bpsin
;
567 struct sockaddr_in
*md_sin
;
571 struct rpc_string
*str
;
573 struct bp_inaddr
*bia
;
574 struct sockaddr_in
*sin
;
577 int cn_len
, key_len
, sn_len
, path_len
;
580 * Get message buffer of sufficient size.
582 cn_len
= hostnamelen
;
583 key_len
= strlen(key
);
585 msg_len
+= RPC_STR_SIZE(cn_len
);
586 msg_len
+= RPC_STR_SIZE(key_len
);
587 m
= m_get_len(msg_len
);
592 * Build request message.
594 p
= mtod(m
, u_char
*);
596 /* client name (hostname) */
597 str
= (struct rpc_string
*)p
;
598 str
->len
= htonl(cn_len
);
599 bcopy(hostname
, str
->data
, cn_len
);
600 p
+= RPC_STR_SIZE(cn_len
);
601 /* key name (root or swap) */
602 str
= (struct rpc_string
*)p
;
603 str
->len
= htonl(key_len
);
604 bcopy(key
, str
->data
, key_len
);
606 /* RPC: bootparam/getfile */
607 error
= krpc_call(bpsin
, BOOTPARAM_PROG
, BOOTPARAM_VERS
,
608 BOOTPARAM_GETFILE
, &m
, NULL
);
613 * Parse result message.
615 p
= mtod(m
, u_char
*);
619 if (msg_len
< sizeof(*str
))
621 str
= (struct rpc_string
*)p
;
622 sn_len
= ntohl(str
->len
);
623 if (msg_len
< sn_len
)
625 if (sn_len
>= MNAMELEN
)
627 bcopy(str
->data
, serv_name
, sn_len
);
628 serv_name
[sn_len
] = '\0';
629 p
+= RPC_STR_SIZE(sn_len
);
630 msg_len
-= RPC_STR_SIZE(sn_len
);
632 /* server IP address (mountd) */
633 if (msg_len
< sizeof(*bia
))
635 bia
= (struct bp_inaddr
*)p
;
636 if (bia
->atype
!= htonl(1))
639 bzero((caddr_t
)sin
, sizeof(*sin
));
640 sin
->sin_len
= sizeof(*sin
);
641 sin
->sin_family
= AF_INET
;
642 q
= (u_char
*) &sin
->sin_addr
;
643 *q
++ = ntohl(bia
->addr
[0]);
644 *q
++ = ntohl(bia
->addr
[1]);
645 *q
++ = ntohl(bia
->addr
[2]);
646 *q
++ = ntohl(bia
->addr
[3]);
648 msg_len
-= sizeof(*bia
);
650 /* server pathname */
651 if (msg_len
< sizeof(*str
))
653 str
= (struct rpc_string
*)p
;
654 path_len
= ntohl(str
->len
);
655 if (msg_len
< path_len
)
657 if (path_len
>= MAXPATHLEN
)
659 bcopy(str
->data
, pathname
, path_len
);
660 pathname
[path_len
] = '\0';
664 printf("nfs_boot: bootparam_getfile: bad reply\n");
675 * Given a server pathname, get an NFS file handle.
676 * Also, sets sin->sin_port to the NFS service port.
679 md_mount(mdsin
, path
, v3
, fhp
, fhlenp
)
680 struct sockaddr_in
*mdsin
; /* mountd server address */
686 /* The RPC structures */
687 struct rpc_string
*str
;
690 u_char data
[NFSX_V3FHMAX
+ sizeof(u_long
)];
693 int error
, mlen
, slen
;
694 int mntversion
= v3
? RPCMNT_VER3
: RPCMNT_VER1
;
696 /* Get port number for MOUNTD. */
697 error
= krpc_portmap(mdsin
, RPCPROG_MNT
, mntversion
,
699 if (error
) return error
;
702 mlen
= RPC_STR_SIZE(slen
);
707 str
= mtod(m
, struct rpc_string
*);
708 str
->len
= htonl(slen
);
709 bcopy(path
, str
->data
, slen
);
711 /* Do RPC to mountd. */
712 error
= krpc_call(mdsin
, RPCPROG_MNT
, mntversion
,
713 RPCMNT_MOUNT
, &m
, NULL
);
715 return error
; /* message already freed */
718 * the reply must be long enough to hold the errno plus either of:
720 * + a v3 filehandle length + a v3 filehandle
723 if (mlen
< sizeof(u_long
))
725 rdata
= mtod(m
, struct rdata
*);
726 error
= ntohl(rdata
->errno
);
732 if (mlen
< sizeof(u_long
)*2)
734 fhlen
= ntohl(*(u_long
*)rdata
->data
);
735 fh
= rdata
->data
+ sizeof(u_long
);
736 if (mlen
< (sizeof(u_long
)*2 + fhlen
))
738 bcopy(fh
, fhp
, fhlen
);
741 if (mlen
< (sizeof(u_long
) + NFSX_V2FH
))
743 bcopy(rdata
->data
, fhp
, NFSX_V2FH
);
747 /* Set port number for NFS use. */
748 error
= krpc_portmap(mdsin
, NFS_PROG
, v3
? NFS_VER3
: NFS_VER2
,