1 1.26 rin /* $NetBSD: subr_tftproot.c,v 1.26 2024/07/05 04:31:53 rin Exp $ */ 2 1.1 manu 3 1.1 manu /*- 4 1.1 manu * Copyright (c) 2007 Emmanuel Dreyfus, all rights reserved. 5 1.1 manu * 6 1.1 manu * Redistribution and use in source and binary forms, with or without 7 1.1 manu * modification, are permitted provided that the following conditions 8 1.1 manu * are met: 9 1.1 manu * 1. Redistributions of source code must retain the above copyright 10 1.1 manu * notice, this list of conditions and the following disclaimer. 11 1.1 manu * 2. Redistributions in binary form must reproduce the above copyright 12 1.1 manu * notice, this list of conditions and the following disclaimer in the 13 1.1 manu * documentation and/or other materials provided with the distribution. 14 1.1 manu * 3. All advertising materials mentioning features or use of this software 15 1.1 manu * must display the following acknowledgement: 16 1.1 manu * This product includes software developed by Emmanuel Dreyfus 17 1.24 tnn * 4. The name of the author may not be used to endorse or promote 18 1.24 tnn * products derived from this software without specific prior written 19 1.1 manu * permission. 20 1.1 manu * 21 1.24 tnn * THIS SOFTWARE IS PROVIDED BY THE THE AUTHOR AND CONTRIBUTORS ``AS IS'' 22 1.24 tnn * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, 23 1.1 manu * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 24 1.24 tnn * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS 25 1.1 manu * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 26 1.1 manu * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 27 1.1 manu * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 28 1.1 manu * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 29 1.1 manu * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 30 1.1 manu * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 31 1.1 manu * POSSIBILITY OF SUCH DAMAGE. 32 1.1 manu */ 33 1.1 manu 34 1.1 manu /* 35 1.1 manu * Download the root RAMdisk through TFTP at root mount time 36 1.1 manu */ 37 1.1 manu 38 1.1 manu #include "opt_tftproot.h" 39 1.1 manu #include "opt_md.h" 40 1.1 manu 41 1.1 manu #include <sys/cdefs.h> 42 1.26 rin __KERNEL_RCSID(0, "$NetBSD: subr_tftproot.c,v 1.26 2024/07/05 04:31:53 rin Exp $"); 43 1.1 manu 44 1.1 manu #include <sys/param.h> 45 1.1 manu #include <sys/types.h> 46 1.13 manu #include <sys/vnode.h> 47 1.1 manu #include <sys/mount.h> 48 1.1 manu #include <sys/lwp.h> 49 1.2 yamt #include <sys/kmem.h> 50 1.1 manu #include <sys/mbuf.h> 51 1.1 manu #include <sys/socketvar.h> 52 1.1 manu 53 1.1 manu #include <net/if.h> 54 1.1 manu 55 1.1 manu #include <dev/md.h> 56 1.1 manu 57 1.1 manu #include <netinet/in.h> 58 1.1 manu 59 1.1 manu #include <nfs/rpcv2.h> 60 1.1 manu 61 1.1 manu #include <nfs/nfsproto.h> 62 1.1 manu #include <nfs/nfs.h> 63 1.1 manu #include <nfs/nfsmount.h> 64 1.1 manu #include <nfs/nfsdiskless.h> 65 1.1 manu #include <nfs/nfs_var.h> 66 1.1 manu 67 1.24 tnn /* 68 1.24 tnn * Copied from <lib/libsa/tftp.h> 69 1.1 manu */ 70 1.1 manu 71 1.1 manu #define SEGSIZE 512 /* data segment size */ 72 1.1 manu 73 1.1 manu /* 74 1.1 manu * Packet types. 75 1.1 manu */ 76 1.1 manu #define RRQ 01 /* read request */ 77 1.1 manu #define WRQ 02 /* write request */ 78 1.1 manu #define DATA 03 /* data packet */ 79 1.1 manu #define ACK 04 /* acknowledgement */ 80 1.1 manu #define ERROR 05 /* error code */ 81 1.1 manu 82 1.1 manu struct tftphdr { 83 1.1 manu short th_opcode; /* packet type */ 84 1.1 manu union { 85 1.1 manu unsigned short tu_block; /* block # */ 86 1.1 manu short tu_code; /* error code */ 87 1.1 manu char tu_stuff[1]; /* request packet stuff */ 88 1.1 manu } th_u; 89 1.1 manu char th_data[1]; /* data or error string */ 90 1.1 manu } __packed; 91 1.1 manu 92 1.1 manu #define th_block th_u.tu_block 93 1.1 manu #define th_code th_u.tu_code 94 1.1 manu #define th_stuff th_u.tu_stuff 95 1.1 manu #define th_msg th_data 96 1.1 manu 97 1.1 manu #define IPPORT_TFTP 69 98 1.1 manu 99 1.1 manu #ifdef TFTPROOT_DEBUG 100 1.1 manu #define DPRINTF(x) printf x 101 1.1 manu #else 102 1.1 manu #define DPRINTF(x) 103 1.1 manu #endif 104 1.1 manu 105 1.1 manu struct tftproot_handle { 106 1.1 manu struct nfs_diskless *trh_nd; 107 1.1 manu void *trh_base; 108 1.1 manu size_t trh_len; 109 1.1 manu unsigned short trh_block; 110 1.1 manu int trh_flags; 111 1.1 manu }; 112 1.1 manu 113 1.1 manu #define TRH_FINISHED 1 114 1.1 manu 115 1.11 chs int tftproot_dhcpboot(device_t); 116 1.1 manu 117 1.1 manu static int tftproot_getfile(struct tftproot_handle *, struct lwp *); 118 1.14 hikaru static int tftproot_recv(struct mbuf **, void *); 119 1.1 manu 120 1.1 manu int 121 1.11 chs tftproot_dhcpboot(device_t bootdv) 122 1.1 manu { 123 1.1 manu struct nfs_diskless *nd = NULL; 124 1.1 manu struct ifnet *ifp = NULL; 125 1.1 manu struct lwp *l; 126 1.1 manu struct tftproot_handle trh; 127 1.11 chs device_t dv; 128 1.1 manu int error = -1; 129 1.1 manu 130 1.10 manu if (rootspec != NULL) { 131 1.17 ozaki int s = pserialize_read_enter(); 132 1.17 ozaki IFNET_READER_FOREACH(ifp) 133 1.10 manu if (strcmp(rootspec, ifp->if_xname) == 0) 134 1.10 manu break; 135 1.17 ozaki pserialize_read_exit(s); 136 1.24 tnn } 137 1.10 manu 138 1.10 manu if ((ifp == NULL) && 139 1.10 manu (bootdv != NULL && device_class(bootdv) == DV_IFNET)) { 140 1.17 ozaki int s = pserialize_read_enter(); 141 1.17 ozaki IFNET_READER_FOREACH(ifp) 142 1.4 cegger if (strcmp(device_xname(bootdv), ifp->if_xname) == 0) 143 1.1 manu break; 144 1.17 ozaki pserialize_read_exit(s); 145 1.1 manu } 146 1.1 manu 147 1.1 manu if (ifp == NULL) { 148 1.1 manu DPRINTF(("%s():%d ifp is NULL\n", __func__, __LINE__)); 149 1.1 manu goto out; 150 1.1 manu } 151 1.1 manu 152 1.3 joerg dv = device_find_by_xname(ifp->if_xname); 153 1.1 manu 154 1.1 manu if ((dv == NULL) || (device_class(dv) != DV_IFNET)) { 155 1.1 manu DPRINTF(("%s():%d cannot find device for interface %s\n", 156 1.1 manu __func__, __LINE__, ifp->if_xname)); 157 1.1 manu goto out; 158 1.1 manu } 159 1.1 manu 160 1.1 manu root_device = dv; 161 1.1 manu 162 1.1 manu l = curlwp; /* XXX */ 163 1.1 manu 164 1.2 yamt nd = kmem_zalloc(sizeof(*nd), KM_SLEEP); 165 1.1 manu nd->nd_ifp = ifp; 166 1.1 manu nd->nd_nomount = 1; 167 1.1 manu 168 1.1 manu if ((error = nfs_boot_init(nd, l)) != 0) { 169 1.24 tnn DPRINTF(("%s():%d nfs_boot_init returned %d\n", 170 1.1 manu __func__, __LINE__, error)); 171 1.1 manu goto out; 172 1.1 manu } 173 1.1 manu 174 1.24 tnn /* 175 1.1 manu * Strip leading "tftp:" 176 1.1 manu */ 177 1.1 manu #define PREFIX "tftp:" 178 1.1 manu if (strstr(nd->nd_bootfile, PREFIX) == nd->nd_bootfile) 179 1.1 manu (void)memmove(nd->nd_bootfile, 180 1.1 manu nd->nd_bootfile + (sizeof(PREFIX) - 1), 181 1.1 manu sizeof(nd->nd_bootfile) - sizeof(PREFIX)); 182 1.1 manu #undef PREFIX 183 1.1 manu 184 1.1 manu printf("tftproot: bootfile=%s\n", nd->nd_bootfile); 185 1.1 manu 186 1.8 cegger memset(&trh, 0, sizeof(trh)); 187 1.1 manu trh.trh_nd = nd; 188 1.1 manu trh.trh_block = 1; 189 1.1 manu 190 1.1 manu if ((error = tftproot_getfile(&trh, l)) != 0) { 191 1.24 tnn DPRINTF(("%s():%d tftproot_getfile returned %d\n", 192 1.1 manu __func__, __LINE__, error)); 193 1.1 manu goto out; 194 1.1 manu } 195 1.1 manu 196 1.1 manu error = 0; 197 1.1 manu 198 1.1 manu out: 199 1.1 manu if (nd) 200 1.2 yamt kmem_free(nd, sizeof(*nd)); 201 1.1 manu 202 1.1 manu return error; 203 1.1 manu } 204 1.1 manu 205 1.24 tnn static int 206 1.7 dsl tftproot_getfile(struct tftproot_handle *trh, struct lwp *l) 207 1.1 manu { 208 1.1 manu struct socket *so = NULL; 209 1.1 manu struct mbuf *m_serv = NULL; 210 1.1 manu struct mbuf *m_outbuf = NULL; 211 1.16 rtr struct sockaddr_in sin; 212 1.1 manu struct tftphdr *tftp; 213 1.1 manu size_t packetlen, namelen; 214 1.1 manu int error = -1; 215 1.1 manu const char octetstr[] = "octet"; 216 1.1 manu size_t hdrlen = sizeof(*tftp) - sizeof(tftp->th_data); 217 1.1 manu char *cp; 218 1.1 manu 219 1.5 ad if ((error = socreate(AF_INET, &so, SOCK_DGRAM, 0, l, NULL)) != 0) { 220 1.24 tnn DPRINTF(("%s():%d socreate returned %d\n", 221 1.1 manu __func__, __LINE__, error)); 222 1.1 manu goto out; 223 1.1 manu } 224 1.1 manu 225 1.1 manu /* 226 1.1 manu * Set timeout 227 1.1 manu */ 228 1.1 manu if ((error = nfs_boot_setrecvtimo(so))) { 229 1.24 tnn DPRINTF(("%s():%d SO_RCVTIMEO failed %d\n", 230 1.1 manu __func__, __LINE__, error)); 231 1.1 manu goto out; 232 1.1 manu } 233 1.1 manu 234 1.1 manu /* 235 1.1 manu * Set server address and port 236 1.1 manu */ 237 1.16 rtr memcpy(&sin, &trh->trh_nd->nd_root.ndm_saddr, sizeof(sin)); 238 1.16 rtr sin.sin_port = htons(IPPORT_TFTP); 239 1.1 manu 240 1.1 manu /* 241 1.1 manu * Set send buffer, prepare the TFTP packet 242 1.1 manu */ 243 1.1 manu namelen = strlen(trh->trh_nd->nd_bootfile) + 1; 244 1.1 manu packetlen = sizeof(tftp->th_opcode) + namelen + sizeof(octetstr); 245 1.1 manu if (packetlen > MSIZE) { 246 1.24 tnn DPRINTF(("%s():%d boot filename too long (%ld bytes)\n", 247 1.1 manu __func__, __LINE__, (long)namelen)); 248 1.23 bad error = E2BIG; 249 1.1 manu goto out; 250 1.1 manu } 251 1.1 manu 252 1.1 manu m_outbuf = m_gethdr(M_WAIT, MT_DATA); 253 1.1 manu m_clget(m_outbuf, M_WAIT); 254 1.1 manu m_outbuf->m_len = packetlen; 255 1.1 manu m_outbuf->m_pkthdr.len = packetlen; 256 1.18 ozaki m_reset_rcvif(m_outbuf); 257 1.1 manu 258 1.1 manu tftp = mtod(m_outbuf, struct tftphdr *); 259 1.1 manu memset(tftp, 0, packetlen); 260 1.1 manu 261 1.1 manu tftp->th_opcode = htons((short)RRQ); 262 1.1 manu cp = tftp->th_stuff; 263 1.1 manu (void)strncpy(cp, trh->trh_nd->nd_bootfile, namelen); 264 1.1 manu cp += namelen; 265 1.1 manu (void)strncpy(cp, octetstr, sizeof(octetstr)); 266 1.1 manu 267 1.24 tnn /* 268 1.1 manu * Perform the file transfer 269 1.1 manu */ 270 1.24 tnn printf("tftproot: download %s:%s ", 271 1.16 rtr inet_ntoa(sin.sin_addr), trh->trh_nd->nd_bootfile); 272 1.1 manu 273 1.1 manu do { 274 1.1 manu /* 275 1.1 manu * Show progress for every 200 blocks (100kB) 276 1.1 manu */ 277 1.1 manu #ifndef TFTPROOT_PROGRESS 278 1.1 manu #define TFTPROOT_PROGRESS 200 279 1.1 manu #endif 280 1.1 manu if ((trh->trh_block % TFTPROOT_PROGRESS) == 0) 281 1.1 manu twiddle(); 282 1.1 manu 283 1.24 tnn /* 284 1.24 tnn * Send the packet and receive the answer. 285 1.1 manu * We get the sender address here, which should be 286 1.1 manu * the same server with a different port 287 1.1 manu */ 288 1.16 rtr if ((error = nfs_boot_sendrecv(so, &sin, NULL, m_outbuf, 289 1.1 manu tftproot_recv, NULL, &m_serv, trh, l)) != 0) { 290 1.24 tnn DPRINTF(("%s():%d sendrecv failed %d\n", 291 1.1 manu __func__, __LINE__, error)); 292 1.1 manu goto out; 293 1.1 manu } 294 1.1 manu 295 1.24 tnn /* 296 1.21 dholland * Accommodate the packet length for acks. 297 1.1 manu * This is really needed only on first pass 298 1.1 manu */ 299 1.1 manu m_outbuf->m_len = hdrlen; 300 1.1 manu m_outbuf->m_pkthdr.len = hdrlen; 301 1.1 manu tftp->th_opcode = htons((short)ACK); 302 1.1 manu tftp->th_block = htons(trh->trh_block); 303 1.1 manu 304 1.1 manu 305 1.1 manu /* 306 1.1 manu * Check for termination 307 1.1 manu */ 308 1.1 manu if (trh->trh_flags & TRH_FINISHED) 309 1.1 manu break; 310 1.1 manu 311 1.1 manu trh->trh_block++; 312 1.1 manu } while (1/* CONSTCOND */); 313 1.1 manu 314 1.1 manu printf("\n"); 315 1.1 manu 316 1.1 manu /* 317 1.19 maxv * Ack the last block. Ignore errors, as we already have the whole 318 1.19 maxv * file. 319 1.1 manu */ 320 1.15 rtr if ((error = (*so->so_send)(so, mtod(m_serv, struct sockaddr *), NULL, 321 1.22 mlelstv m_outbuf, NULL, 0, l)) != 0) { 322 1.24 tnn DPRINTF(("%s():%d tftproot: sosend returned %d\n", 323 1.1 manu __func__, __LINE__, error)); 324 1.22 mlelstv } 325 1.19 maxv 326 1.19 maxv /* Freed by the protocol */ 327 1.19 maxv m_outbuf = NULL; 328 1.1 manu 329 1.24 tnn /* 330 1.24 tnn * And use it as the root ramdisk. 331 1.1 manu */ 332 1.24 tnn DPRINTF(("%s():%d RAMdisk loaded: %ld@%p\n", 333 1.1 manu __func__, __LINE__, trh->trh_len, trh->trh_base)); 334 1.1 manu md_root_setconf(trh->trh_base, trh->trh_len); 335 1.1 manu 336 1.1 manu error = 0; 337 1.1 manu out: 338 1.26 rin m_freem(m_serv); 339 1.1 manu 340 1.26 rin m_freem(m_outbuf); 341 1.1 manu 342 1.1 manu if (so) 343 1.1 manu soclose(so); 344 1.1 manu 345 1.1 manu return error; 346 1.1 manu } 347 1.1 manu 348 1.1 manu static int 349 1.14 hikaru tftproot_recv(struct mbuf **mp, void *ctx) 350 1.1 manu { 351 1.1 manu struct tftproot_handle *trh = ctx; 352 1.1 manu struct tftphdr *tftp; 353 1.14 hikaru struct mbuf *m = *mp; 354 1.1 manu size_t newlen; 355 1.1 manu size_t hdrlen = sizeof(*tftp) - sizeof(tftp->th_data); 356 1.1 manu 357 1.1 manu /* 358 1.1 manu * Check for short packet 359 1.1 manu */ 360 1.1 manu if (m->m_pkthdr.len < hdrlen) { 361 1.24 tnn DPRINTF(("%s():%d short reply (%d bytes)\n", 362 1.1 manu __func__, __LINE__, m->m_pkthdr.len)); 363 1.1 manu return -1; 364 1.1 manu } 365 1.1 manu 366 1.1 manu /* 367 1.1 manu * Check for packet too large for being a TFTP packet 368 1.1 manu */ 369 1.1 manu if (m->m_pkthdr.len > hdrlen + SEGSIZE) { 370 1.24 tnn DPRINTF(("%s():%d packet too big (%d bytes)\n", 371 1.1 manu __func__, __LINE__, m->m_pkthdr.len)); 372 1.1 manu return -1; 373 1.1 manu } 374 1.1 manu 375 1.1 manu 376 1.1 manu /* 377 1.1 manu * Examine the TFTP header 378 1.1 manu */ 379 1.1 manu if (m->m_len > sizeof(*tftp)) { 380 1.14 hikaru if ((m = *mp = m_pullup(m, sizeof(*tftp))) == NULL) { 381 1.1 manu DPRINTF(("%s():%d m_pullup failed\n", 382 1.1 manu __func__, __LINE__)); 383 1.1 manu return -1; 384 1.1 manu } 385 1.1 manu } 386 1.1 manu tftp = mtod(m, struct tftphdr *); 387 1.1 manu 388 1.1 manu /* 389 1.1 manu * We handle data or error 390 1.1 manu */ 391 1.1 manu switch(ntohs(tftp->th_opcode)) { 392 1.1 manu case DATA: 393 1.1 manu break; 394 1.1 manu 395 1.1 manu case ERROR: { 396 1.1 manu char errbuf[SEGSIZE + 1]; 397 1.1 manu int i; 398 1.1 manu 399 1.1 manu for (i = 0; i < SEGSIZE; i++) { 400 1.1 manu if ((tftp->th_data[i] < ' ') || 401 1.1 manu (tftp->th_data[i] > '~')) { 402 1.1 manu errbuf[i] = '\0'; 403 1.1 manu break; 404 1.1 manu } 405 1.1 manu errbuf[i] = tftp->th_data[i]; 406 1.1 manu } 407 1.1 manu errbuf[SEGSIZE] = '\0'; 408 1.1 manu 409 1.1 manu printf("tftproot: TFTP server returned error %d, %s\n", 410 1.1 manu ntohs(tftp->th_code), errbuf); 411 1.1 manu 412 1.1 manu return -1; 413 1.1 manu break; 414 1.1 manu } 415 1.1 manu 416 1.1 manu default: 417 1.24 tnn DPRINTF(("%s():%d unexpected tftp reply opcode %d\n", 418 1.1 manu __func__, __LINE__, ntohs(tftp->th_opcode))); 419 1.1 manu return -1; 420 1.1 manu break; 421 1.1 manu } 422 1.1 manu 423 1.1 manu /* 424 1.1 manu * Check for last packet, which does not fill the whole space 425 1.1 manu */ 426 1.1 manu if (m->m_pkthdr.len < hdrlen + SEGSIZE) { 427 1.24 tnn DPRINTF(("%s():%d last chunk (%d bytes)\n", 428 1.1 manu __func__, __LINE__, m->m_pkthdr.len)); 429 1.1 manu trh->trh_flags |= TRH_FINISHED; 430 1.1 manu } 431 1.1 manu 432 1.1 manu 433 1.1 manu if (ntohs(tftp->th_block) != trh->trh_block) { 434 1.1 manu DPRINTF(("%s():%d expected block %d, got block %d\n", 435 1.1 manu __func__, __LINE__, trh->trh_block, ntohs(tftp->th_block))); 436 1.1 manu return -1; 437 1.1 manu } 438 1.1 manu 439 1.24 tnn /* 440 1.12 mbalmer * Grow the receiving buffer to accommodate new data 441 1.1 manu */ 442 1.1 manu newlen = trh->trh_len + (m->m_pkthdr.len - hdrlen); 443 1.24 tnn if ((trh->trh_base = realloc(trh->trh_base, 444 1.1 manu newlen, M_TEMP, M_WAITOK)) == NULL) { 445 1.24 tnn DPRINTF(("%s():%d failed to realloc %ld bytes\n", 446 1.1 manu __func__, __LINE__, (long)newlen)); 447 1.1 manu return -1; 448 1.1 manu } 449 1.1 manu 450 1.1 manu /* 451 1.1 manu * Copy the data 452 1.1 manu */ 453 1.1 manu m_copydata(m, hdrlen, m->m_pkthdr.len - hdrlen, 454 1.1 manu (char *)trh->trh_base + trh->trh_len); 455 1.1 manu trh->trh_len = newlen; 456 1.1 manu 457 1.1 manu return 0; 458 1.1 manu } 459 1.1 manu 460