bootparam.c revision 1.6 1 1.6 gwr /* $NetBSD: bootparam.c,v 1.6 1995/12/08 04:10:28 gwr Exp $ */
2 1.1 gwr
3 1.1 gwr /*
4 1.1 gwr * Copyright (c) 1995 Gordon W. Ross
5 1.1 gwr * All rights reserved.
6 1.1 gwr *
7 1.1 gwr * Redistribution and use in source and binary forms, with or without
8 1.1 gwr * modification, are permitted provided that the following conditions
9 1.1 gwr * are met:
10 1.1 gwr * 1. Redistributions of source code must retain the above copyright
11 1.1 gwr * notice, this list of conditions and the following disclaimer.
12 1.1 gwr * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 gwr * notice, this list of conditions and the following disclaimer in the
14 1.1 gwr * documentation and/or other materials provided with the distribution.
15 1.1 gwr * 3. The name of the author may not be used to endorse or promote products
16 1.1 gwr * derived from this software without specific prior written permission.
17 1.1 gwr * 4. All advertising materials mentioning features or use of this software
18 1.1 gwr * must display the following acknowledgement:
19 1.1 gwr * This product includes software developed by Gordon W. Ross
20 1.1 gwr *
21 1.1 gwr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
22 1.1 gwr * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
23 1.1 gwr * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
24 1.1 gwr * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
25 1.1 gwr * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
26 1.1 gwr * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 1.1 gwr * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 1.1 gwr * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 1.1 gwr * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
30 1.1 gwr * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 1.1 gwr */
32 1.1 gwr
33 1.1 gwr /*
34 1.1 gwr * RPC/bootparams
35 1.1 gwr */
36 1.1 gwr
37 1.1 gwr #include <sys/param.h>
38 1.1 gwr #include <sys/socket.h>
39 1.1 gwr
40 1.1 gwr #include <net/if.h>
41 1.1 gwr
42 1.1 gwr #include <netinet/in.h>
43 1.1 gwr #include <netinet/in_systm.h>
44 1.1 gwr
45 1.1 gwr #include <nfs/rpcv2.h>
46 1.1 gwr
47 1.1 gwr #include <string.h>
48 1.1 gwr
49 1.1 gwr #include "stand.h"
50 1.1 gwr #include "net.h"
51 1.1 gwr #include "netif.h"
52 1.1 gwr #include "rpc.h"
53 1.1 gwr #include "bootparam.h"
54 1.1 gwr
55 1.4 pk struct in_addr bp_server_addr; /* net order */
56 1.4 pk n_short bp_server_port; /* net order */
57 1.1 gwr
58 1.1 gwr /*
59 1.1 gwr * RPC definitions for bootparamd
60 1.1 gwr */
61 1.1 gwr #define BOOTPARAM_PROG 100026
62 1.1 gwr #define BOOTPARAM_VERS 1
63 1.1 gwr #define BOOTPARAM_WHOAMI 1
64 1.1 gwr #define BOOTPARAM_GETFILE 2
65 1.1 gwr
66 1.1 gwr /*
67 1.1 gwr * Inet address in RPC messages
68 1.1 gwr * (Note, really four ints, NOT chars. Blech.)
69 1.1 gwr */
70 1.1 gwr struct xdr_inaddr {
71 1.1 gwr u_int32_t atype;
72 1.1 gwr int32_t addr[4];
73 1.1 gwr };
74 1.1 gwr
75 1.5 gwr int xdr_inaddr_encode __P((char **p, struct in_addr ia));
76 1.5 gwr int xdr_inaddr_decode __P((char **p, struct in_addr *ia));
77 1.1 gwr
78 1.5 gwr int xdr_string_encode __P((char **p, char *str, int len));
79 1.5 gwr int xdr_string_decode __P((char **p, char *str, int *len_p));
80 1.1 gwr
81 1.1 gwr
82 1.1 gwr /*
83 1.1 gwr * RPC: bootparam/whoami
84 1.1 gwr * Given client IP address, get:
85 1.1 gwr * client name (hostname)
86 1.1 gwr * domain name (domainname)
87 1.1 gwr * gateway address
88 1.1 gwr *
89 1.1 gwr * The hostname and domainname are set here for convenience.
90 1.1 gwr *
91 1.1 gwr * Note - bpsin is initialized to the broadcast address,
92 1.1 gwr * and will be replaced with the bootparam server address
93 1.1 gwr * after this call is complete. Have to use PMAP_PROC_CALL
94 1.1 gwr * to make sure we get responses only from a servers that
95 1.1 gwr * know about us (don't want to broadcast a getport call).
96 1.1 gwr */
97 1.1 gwr int
98 1.1 gwr bp_whoami(sockfd)
99 1.1 gwr int sockfd;
100 1.1 gwr {
101 1.1 gwr /* RPC structures for PMAPPROC_CALLIT */
102 1.1 gwr struct args {
103 1.1 gwr u_int32_t prog;
104 1.1 gwr u_int32_t vers;
105 1.1 gwr u_int32_t proc;
106 1.1 gwr u_int32_t arglen;
107 1.1 gwr struct xdr_inaddr xina;
108 1.1 gwr } *args;
109 1.1 gwr struct repl {
110 1.6 gwr u_int16_t _pad;
111 1.6 gwr u_int16_t port;
112 1.1 gwr u_int32_t encap_len;
113 1.1 gwr /* encapsulated data here */
114 1.1 gwr n_long capsule[64];
115 1.1 gwr } *repl;
116 1.1 gwr struct {
117 1.1 gwr n_long h[RPC_HEADER_WORDS];
118 1.1 gwr struct args d;
119 1.1 gwr } sdata;
120 1.1 gwr struct {
121 1.1 gwr n_long h[RPC_HEADER_WORDS];
122 1.1 gwr struct repl d;
123 1.1 gwr } rdata;
124 1.5 gwr char *send_tail, *recv_head;
125 1.1 gwr struct iodesc *d;
126 1.1 gwr int len, x;
127 1.1 gwr
128 1.1 gwr #ifdef RPC_DEBUG
129 1.4 pk printf("bp_whoami: myip=%s\n", inet_ntoa(myip));
130 1.1 gwr #endif
131 1.1 gwr
132 1.1 gwr if (!(d = socktodesc(sockfd))) {
133 1.5 gwr #ifdef RPC_DEBUG
134 1.1 gwr printf("bp_whoami: bad socket. %d\n", sockfd);
135 1.5 gwr #endif
136 1.4 pk return (-1);
137 1.1 gwr }
138 1.1 gwr args = &sdata.d;
139 1.1 gwr repl = &rdata.d;
140 1.1 gwr
141 1.1 gwr /*
142 1.1 gwr * Build request args for PMAPPROC_CALLIT.
143 1.1 gwr */
144 1.1 gwr args->prog = htonl(BOOTPARAM_PROG);
145 1.1 gwr args->vers = htonl(BOOTPARAM_VERS);
146 1.1 gwr args->proc = htonl(BOOTPARAM_WHOAMI);
147 1.1 gwr args->arglen = htonl(sizeof(struct xdr_inaddr));
148 1.5 gwr send_tail = (char*) &args->xina;
149 1.1 gwr
150 1.1 gwr /*
151 1.1 gwr * append encapsulated data (client IP address)
152 1.1 gwr */
153 1.1 gwr if (xdr_inaddr_encode(&send_tail, myip))
154 1.1 gwr return (-1);
155 1.1 gwr
156 1.1 gwr /* RPC: portmap/callit */
157 1.1 gwr d->myport = htons(--rpc_port);
158 1.4 pk d->destip.s_addr = INADDR_BROADCAST; /* XXX: subnet bcast? */
159 1.1 gwr /* rpc_call will set d->destport */
160 1.1 gwr
161 1.1 gwr len = rpc_call(d, PMAPPROG, PMAPVERS, PMAPPROC_CALLIT,
162 1.5 gwr args, send_tail - (char*)args,
163 1.1 gwr repl, sizeof(*repl));
164 1.1 gwr if (len < 8) {
165 1.1 gwr printf("bootparamd: 'whoami' call failed\n");
166 1.4 pk return (-1);
167 1.1 gwr }
168 1.1 gwr
169 1.1 gwr /* Save bootparam server address (from IP header). */
170 1.1 gwr rpc_fromaddr(repl, &bp_server_addr, &bp_server_port);
171 1.1 gwr
172 1.1 gwr /*
173 1.1 gwr * Note that bp_server_port is now 111 due to the
174 1.1 gwr * indirect call (using PMAPPROC_CALLIT), so get the
175 1.1 gwr * actual port number from the reply data.
176 1.1 gwr */
177 1.1 gwr bp_server_port = repl->port;
178 1.1 gwr
179 1.1 gwr #ifdef RPC_DEBUG
180 1.1 gwr printf("bp_whoami: server at %s:%d\n",
181 1.4 pk inet_ntoa(bp_server_addr), ntohs(bp_server_port));
182 1.1 gwr #endif
183 1.1 gwr
184 1.1 gwr /* We have just done a portmap call, so cache the portnum. */
185 1.1 gwr rpc_pmap_putcache(bp_server_addr,
186 1.1 gwr BOOTPARAM_PROG,
187 1.1 gwr BOOTPARAM_VERS,
188 1.5 gwr (int)ntohs(bp_server_port));
189 1.1 gwr
190 1.1 gwr /*
191 1.1 gwr * Parse the encapsulated results from bootparam/whoami
192 1.1 gwr */
193 1.1 gwr x = ntohl(repl->encap_len);
194 1.1 gwr if (len < x) {
195 1.1 gwr printf("bp_whoami: short reply, %d < %d\n", len, x);
196 1.4 pk return (-1);
197 1.1 gwr }
198 1.5 gwr recv_head = (char*) repl->capsule;
199 1.1 gwr
200 1.1 gwr /* client name */
201 1.1 gwr hostnamelen = MAXHOSTNAMELEN-1;
202 1.1 gwr if (xdr_string_decode(&recv_head, hostname, &hostnamelen)) {
203 1.1 gwr #ifdef RPC_DEBUG
204 1.1 gwr printf("bp_whoami: bad hostname\n");
205 1.1 gwr #endif
206 1.4 pk return (-1);
207 1.1 gwr }
208 1.1 gwr
209 1.1 gwr /* domain name */
210 1.1 gwr domainnamelen = MAXHOSTNAMELEN-1;
211 1.1 gwr if (xdr_string_decode(&recv_head, domainname, &domainnamelen)) {
212 1.1 gwr #ifdef RPC_DEBUG
213 1.1 gwr printf("bp_whoami: bad domainname\n");
214 1.1 gwr #endif
215 1.4 pk return (-1);
216 1.1 gwr }
217 1.1 gwr
218 1.1 gwr /* gateway address */
219 1.1 gwr if (xdr_inaddr_decode(&recv_head, &gateip)) {
220 1.1 gwr #ifdef RPC_DEBUG
221 1.1 gwr printf("bp_whoami: bad gateway\n");
222 1.1 gwr #endif
223 1.4 pk return (-1);
224 1.1 gwr }
225 1.1 gwr
226 1.1 gwr /* success */
227 1.1 gwr return(0);
228 1.1 gwr }
229 1.1 gwr
230 1.1 gwr
231 1.1 gwr /*
232 1.1 gwr * RPC: bootparam/getfile
233 1.1 gwr * Given client name and file "key", get:
234 1.1 gwr * server name
235 1.1 gwr * server IP address
236 1.1 gwr * server pathname
237 1.1 gwr */
238 1.1 gwr int
239 1.1 gwr bp_getfile(sockfd, key, serv_addr, pathname)
240 1.1 gwr int sockfd;
241 1.1 gwr char *key;
242 1.1 gwr char *pathname;
243 1.4 pk struct in_addr *serv_addr;
244 1.1 gwr {
245 1.1 gwr struct {
246 1.1 gwr n_long h[RPC_HEADER_WORDS];
247 1.1 gwr n_long d[64];
248 1.1 gwr } sdata;
249 1.1 gwr struct {
250 1.1 gwr n_long h[RPC_HEADER_WORDS];
251 1.1 gwr n_long d[128];
252 1.1 gwr } rdata;
253 1.1 gwr char serv_name[FNAME_SIZE];
254 1.5 gwr char *send_tail, *recv_head;
255 1.1 gwr /* misc... */
256 1.1 gwr struct iodesc *d;
257 1.1 gwr int sn_len, path_len, rlen;
258 1.1 gwr
259 1.1 gwr if (!(d = socktodesc(sockfd))) {
260 1.5 gwr #ifdef RPC_DEBUG
261 1.1 gwr printf("bp_getfile: bad socket. %d\n", sockfd);
262 1.5 gwr #endif
263 1.4 pk return (-1);
264 1.1 gwr }
265 1.1 gwr
266 1.5 gwr send_tail = (char*) sdata.d;
267 1.5 gwr recv_head = (char*) rdata.d;
268 1.1 gwr
269 1.1 gwr /*
270 1.1 gwr * Build request message.
271 1.1 gwr */
272 1.1 gwr
273 1.1 gwr /* client name (hostname) */
274 1.1 gwr if (xdr_string_encode(&send_tail, hostname, hostnamelen)) {
275 1.1 gwr #ifdef RPC_DEBUG
276 1.1 gwr printf("bp_getfile: bad client\n");
277 1.1 gwr #endif
278 1.1 gwr return (-1);
279 1.1 gwr }
280 1.1 gwr
281 1.1 gwr /* key name (root or swap) */
282 1.1 gwr if (xdr_string_encode(&send_tail, key, strlen(key))) {
283 1.1 gwr #ifdef RPC_DEBUG
284 1.1 gwr printf("bp_getfile: bad key\n");
285 1.1 gwr #endif
286 1.1 gwr return (-1);
287 1.1 gwr }
288 1.1 gwr
289 1.1 gwr /* RPC: bootparam/getfile */
290 1.1 gwr d->myport = htons(--rpc_port);
291 1.1 gwr d->destip = bp_server_addr;
292 1.1 gwr /* rpc_call will set d->destport */
293 1.1 gwr
294 1.1 gwr rlen = rpc_call(d,
295 1.1 gwr BOOTPARAM_PROG, BOOTPARAM_VERS, BOOTPARAM_GETFILE,
296 1.5 gwr sdata.d, send_tail - (char*)sdata.d,
297 1.1 gwr rdata.d, sizeof(rdata.d));
298 1.1 gwr if (rlen < 4) {
299 1.1 gwr #ifdef RPC_DEBUG
300 1.1 gwr printf("bp_getfile: short reply\n");
301 1.1 gwr #endif
302 1.4 pk errno = EBADRPC;
303 1.4 pk return (-1);
304 1.1 gwr }
305 1.5 gwr recv_head = (char*) rdata.d;
306 1.1 gwr
307 1.1 gwr /*
308 1.1 gwr * Parse result message.
309 1.1 gwr */
310 1.1 gwr
311 1.1 gwr /* server name */
312 1.1 gwr sn_len = FNAME_SIZE-1;
313 1.1 gwr if (xdr_string_decode(&recv_head, serv_name, &sn_len)) {
314 1.1 gwr #ifdef RPC_DEBUG
315 1.1 gwr printf("bp_getfile: bad server name\n");
316 1.1 gwr #endif
317 1.4 pk return (-1);
318 1.1 gwr }
319 1.1 gwr
320 1.1 gwr /* server IP address (mountd/NFS) */
321 1.1 gwr if (xdr_inaddr_decode(&recv_head, serv_addr)) {
322 1.1 gwr #ifdef RPC_DEBUG
323 1.1 gwr printf("bp_getfile: bad server addr\n");
324 1.1 gwr #endif
325 1.4 pk return (-1);
326 1.1 gwr }
327 1.1 gwr
328 1.1 gwr /* server pathname */
329 1.1 gwr path_len = MAXPATHLEN-1;
330 1.1 gwr if (xdr_string_decode(&recv_head, pathname, &path_len)) {
331 1.1 gwr #ifdef RPC_DEBUG
332 1.1 gwr printf("bp_getfile: bad server path\n");
333 1.1 gwr #endif
334 1.4 pk return (-1);
335 1.1 gwr }
336 1.1 gwr
337 1.1 gwr /* success */
338 1.1 gwr return(0);
339 1.1 gwr }
340 1.1 gwr
341 1.1 gwr
342 1.1 gwr /*
343 1.1 gwr * eXternal Data Representation routines.
344 1.1 gwr * (but with non-standard args...)
345 1.1 gwr */
346 1.1 gwr
347 1.1 gwr
348 1.1 gwr int
349 1.1 gwr xdr_string_encode(pkt, str, len)
350 1.5 gwr char **pkt;
351 1.1 gwr char *str;
352 1.1 gwr int len;
353 1.1 gwr {
354 1.1 gwr u_int32_t *lenp;
355 1.1 gwr char *datap;
356 1.1 gwr int padlen = (len + 3) & ~3; /* padded length */
357 1.1 gwr
358 1.5 gwr /* The data will be int aligned. */
359 1.5 gwr lenp = (u_int32_t*) *pkt;
360 1.5 gwr *pkt += sizeof(*lenp);
361 1.1 gwr *lenp = htonl(len);
362 1.1 gwr
363 1.1 gwr datap = *pkt;
364 1.5 gwr *pkt += padlen;
365 1.1 gwr bcopy(str, datap, len);
366 1.1 gwr
367 1.1 gwr return (0);
368 1.1 gwr }
369 1.1 gwr
370 1.1 gwr int
371 1.1 gwr xdr_string_decode(pkt, str, len_p)
372 1.5 gwr char **pkt;
373 1.1 gwr char *str;
374 1.1 gwr int *len_p; /* bufsize - 1 */
375 1.1 gwr {
376 1.1 gwr u_int32_t *lenp;
377 1.1 gwr char *datap;
378 1.1 gwr int slen; /* string length */
379 1.1 gwr int plen; /* padded length */
380 1.1 gwr
381 1.5 gwr /* The data will be int aligned. */
382 1.5 gwr lenp = (u_int32_t*) *pkt;
383 1.5 gwr *pkt += sizeof(*lenp);
384 1.1 gwr slen = ntohl(*lenp);
385 1.1 gwr plen = (slen + 3) & ~3;
386 1.1 gwr
387 1.1 gwr if (slen > *len_p)
388 1.1 gwr slen = *len_p;
389 1.1 gwr datap = *pkt;
390 1.5 gwr *pkt += plen;
391 1.1 gwr bcopy(datap, str, slen);
392 1.1 gwr
393 1.1 gwr str[slen] = '\0';
394 1.1 gwr *len_p = slen;
395 1.1 gwr
396 1.1 gwr return (0);
397 1.1 gwr }
398 1.1 gwr
399 1.1 gwr
400 1.1 gwr int
401 1.1 gwr xdr_inaddr_encode(pkt, ia)
402 1.5 gwr char **pkt;
403 1.5 gwr struct in_addr ia; /* network order */
404 1.1 gwr {
405 1.1 gwr struct xdr_inaddr *xi;
406 1.1 gwr u_char *cp;
407 1.1 gwr int32_t *ip;
408 1.1 gwr union {
409 1.5 gwr n_long l; /* network order */
410 1.1 gwr u_char c[4];
411 1.1 gwr } uia;
412 1.1 gwr
413 1.5 gwr /* The data will be int aligned. */
414 1.5 gwr xi = (struct xdr_inaddr *) *pkt;
415 1.5 gwr *pkt += sizeof(*xi);
416 1.1 gwr xi->atype = htonl(1);
417 1.4 pk uia.l = ia.s_addr;
418 1.1 gwr cp = uia.c;
419 1.1 gwr ip = xi->addr;
420 1.5 gwr /*
421 1.5 gwr * Note: the htonl() calls below DO NOT
422 1.5 gwr * imply that uia.l is in host order.
423 1.5 gwr * In fact this needs it in net order.
424 1.5 gwr */
425 1.4 pk *ip++ = htonl((unsigned int)*cp++);
426 1.4 pk *ip++ = htonl((unsigned int)*cp++);
427 1.4 pk *ip++ = htonl((unsigned int)*cp++);
428 1.4 pk *ip++ = htonl((unsigned int)*cp++);
429 1.1 gwr
430 1.1 gwr return (0);
431 1.1 gwr }
432 1.1 gwr
433 1.1 gwr int
434 1.1 gwr xdr_inaddr_decode(pkt, ia)
435 1.5 gwr char **pkt;
436 1.5 gwr struct in_addr *ia; /* network order */
437 1.1 gwr {
438 1.1 gwr struct xdr_inaddr *xi;
439 1.1 gwr u_char *cp;
440 1.1 gwr int32_t *ip;
441 1.1 gwr union {
442 1.5 gwr n_long l; /* network order */
443 1.1 gwr u_char c[4];
444 1.1 gwr } uia;
445 1.1 gwr
446 1.5 gwr /* The data will be int aligned. */
447 1.5 gwr xi = (struct xdr_inaddr *) *pkt;
448 1.5 gwr *pkt += sizeof(*xi);
449 1.1 gwr if (xi->atype != htonl(1)) {
450 1.1 gwr #ifdef RPC_DEBUG
451 1.1 gwr printf("xdr_inaddr_decode: bad addrtype=%d\n",
452 1.1 gwr ntohl(xi->atype));
453 1.1 gwr #endif
454 1.1 gwr return(-1);
455 1.1 gwr }
456 1.1 gwr
457 1.1 gwr cp = uia.c;
458 1.1 gwr ip = xi->addr;
459 1.5 gwr /*
460 1.5 gwr * Note: the ntohl() calls below DO NOT
461 1.5 gwr * imply that uia.l is in host order.
462 1.5 gwr * In fact this needs it in net order.
463 1.5 gwr */
464 1.4 pk *cp++ = ntohl(*ip++);
465 1.4 pk *cp++ = ntohl(*ip++);
466 1.4 pk *cp++ = ntohl(*ip++);
467 1.4 pk *cp++ = ntohl(*ip++);
468 1.4 pk ia->s_addr = uia.l;
469 1.1 gwr
470 1.1 gwr return (0);
471 1.1 gwr }
472