Hi, > With the holidays in the rear view, I picked this project again > last night. I have not yet been successful. > > To recap - I'm trying to netboot NetBSD 10 an 360 using a > raspberry pi using the native OS. > > This is my status: > > Bootstrap loader to the HP: Success > bootp sending bootfile name to HP: Success > bootparamd sending filesystem info: Failure > tftp serving kernel, and then the rest of the fie system: Not there yet. The current NetBSD/hp300 bootloader doesn't use bootparamd or tftp to get a kernel (only Sun's firmware requires them to get a bootloader). Once the NetBSD bootloader is loaded, it just try to - get IP address and root file system info via BOOTP/DHCP (by default) - then tries to mount the specified root directory via NFS - then tries to load the specified kernel from the mounted NFS directory. > Question for the experts - is this the expected order? I'm > pretty sure it is, but sometimes I get the impression that tftp is step 3. > > Using tcpdump I can see inbound traffic on port 111, but nothing outbound: > > 00:38:54.842747 IP (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 104) 192.168.2.123.1023 > 192.168.2.23.111: [no cksum] UDP, length 76 > 00:38:54.842990 IP (tos 0x0, ttl 64, id 44675, offset 0, flags [DF], proto UDP (17), length 56) 192.168.2.23.111 > 192.168.2.123.1023: [bad udp cksum 0x8618 -> 0xf3b4!] UDP, length 28 I guess these sunrpc (on port 111) requests are for NFS mount. On my HP9000/425t boot, "tcpdump -i re0 -n ether host 08:00:09:27:86:a7" ("re0" is on my host's NIC and the Ethernet address is my 425t one) on my server shows: ``` 01:14:12.860400 08:00:09:27:86:a7 > 00:e0:4c:68:02:38 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 50 0x0000: f8f8 0300 0000 0608 0609 0100 ffcb 802b ...............+ 0x0010: 0000 0002 4850 5333 3030 2020 2020 2020 ....HPS300...... 0x0020: 2020 2020 2020 2020 0953 5953 5f55 424f .........SYS_UBO 0x0030: 4f54 OT 01:14:12.860534 00:e0:4c:68:02:38 > 08:00:09:27:86:a7 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 30 0x0000: f8f8 0300 0000 0609 0608 8100 ffcb 802b ...............+ 0x0010: 0003 0002 0953 5953 5f55 424f 4f54 .....SYS_UBOOT 01:14:12.863347 08:00:09:27:86:a7 > 00:e0:4c:68:02:38 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 46 0x0000: f8f8 0300 0000 0608 0609 0200 0000 0000 ................ 0x0010: 0003 0100 4850 5333 3030 2020 2020 2020 ....HPS300...... 0x0020: 2020 2020 2020 2020 0953 5953 5f55 .........SYS_U 01:14:12.863396 00:e0:4c:68:02:38 > 08:00:09:27:86:a7 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 274 0x0000: f8f8 0300 0000 0609 0608 8200 0000 0000 ................ 0x0010: 0003 8000 424f 4f54 3433 0000 0002 1000 ....BOOT43...... 0x0020: 0000 0000 0001 0001 0000 0000 0000 0000 ................ 0x0030: 0000 0000 013d 0000 0000 0000 0000 0000 .....=.......... 0x0040: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0050: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0060: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0070: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0080: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0090: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00b0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00c0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00d0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00e0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x00f0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0100: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0110: 0000 .. ==> HP LIF directory info is xfered, and then the HP firmware tries to load specified SYS_UBOOT (actually "BOOT43" in LIF) is transfered from host's rbootd(8) to hp425t firmware [..snip..] 01:14:13.282431 00:e0:4c:68:02:38 > 08:00:09:27:86:a7 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 1478 0x0000: f8f8 0300 0000 0609 0608 8200 0001 36e0 ..............6. 0x0010: 0003 0000 0000 0000 0000 0000 0000 0000 ................ 0x0020: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0030: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0040: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0050: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0060: 007b 007d 0000 0000 0000 0000 0000 0000 .{.}............ 0x0070: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0080: 005b 005d 0000 ffff ffff ffff ffff ffff .[.]............ 0x0090: ffff ffff ffff ffff ffff ffff ffff ffff ................ 0x00a0: ffff ffff ffff ffff ffff ffff ffff ffff ................ 0x00b0: ffff ffff ffff ffff ffff ffff ffff ffff ................ 0x00c0: ffff ffff ffff ffff ffff ffff ffff 5c7c ..............\| 0x00d0: 090a 2fff ffff ffff ffff ffff ffff ffff ../............. 0x00e0: ffff 3fff 08ff ffff ffff ffff ffff ffff ..?............. 0x00f0: ffff ffff ffff ffff ffff ffff ffff ffff ................ 0x0100: ffff ffff ffff 0060 3c1b 007f 0000 0a09 .......`<....... 0x0110: 0000 0000 0000 000a 0000 0000 0000 0009 ................ 0x0120: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0130: 0000 0000 0800 0000 0000 0000 0000 1b0d ................ 0x0140: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78 0x0150: 392f 4528 291e 3132 3334 3536 3738 3930 9/E().1234567890 0x0160: 2b27 1b1d 2a1c 2c2e 2f20 0f10 0b0c 1117 +'..*.,./....... 0x0170: 0512 1419 1509 0113 0406 0708 0a0d 1a18 ................ 0x0180: 0316 020e 0000 007e 3e7f 007f 0000 0a09 .......~>....... 0x0190: 0000 0000 0000 000a 0000 0000 0000 0009 ................ 0x01a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x01b0: 0000 0000 7f00 0000 0000 0000 0000 1b0d ................ 0x01c0: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78 0x01d0: 392f 607c 5c7e 2122 2324 2526 5e28 293d 9/`|\~!"#$%&^()= 0x01e0: 3f2f 7b7d 407c 3b3a 5f20 4f50 4b4c 5157 ?/{}@|;:_.OPKLQW 0x01f0: 4552 5459 5549 4153 4446 4748 4a4d 5a58 ERTYUIASDFGHJMZX 0x0200: 4356 424e 0000 0060 3c1b 007f 0000 0a09 CVBN...`<....... 0x0210: 0000 0000 0000 000a 0000 0000 0000 0009 ................ 0x0220: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0230: 0000 0000 0800 0000 0000 0000 0000 1b0d ................ 0x0240: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78 0x0250: 392f 4528 295e 3132 3334 3536 3738 3930 9/E()^1234567890 0x0260: 2b27 5b5d 2a5c 2c2e 2d20 6f70 6b6c 7177 +'[]*\,.-.opklqw 0x0270: 6572 7479 7569 6173 6466 6768 6a6d 7a78 ertyuiasdfghjmzx 0x0280: 6376 626e 0000 0060 1c1b 007f 0000 0a09 cvbn...`........ 0x0290: 0000 0000 0000 000a 0000 0000 0000 0009 ................ 0x02a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x02b0: 0000 0000 0800 0000 0000 0000 0000 1b0d ................ 0x02c0: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78 0x02d0: 392f 4528 291e 3132 3334 3536 3738 3930 9/E().1234567890 0x02e0: 2d3d 1b1d 3b27 2c2e 2f20 0f10 0b0c 1117 -=..;',./....... 0x02f0: 0512 1419 1509 0113 0406 0708 0a0d 1a18 ................ 0x0300: 0316 020e 0000 007e 7c7f 007f 0000 0a09 .......~|....... 0x0310: 0000 0000 0000 000a 0000 0000 0000 0009 ................ 0x0320: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0330: 0000 0000 7f00 0000 0000 0000 0000 1b0d ................ 0x0340: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78 0x0350: 392f 607c 5c7e 2140 2324 255e 262a 2829 9/`|\~!@#$%^&*() 0x0360: 5f2b 7b7d 3a22 3c3e 3f20 4f50 4b4c 5157 _+{}:"<>?.OPKLQW 0x0370: 4552 5459 5549 4153 4446 4748 4a4d 5a58 ERTYUIASDFGHJMZX 0x0380: 4356 424e 0000 0060 5c1b 007f 0000 0a09 CVBN...`\....... 0x0390: 0000 0000 0000 000a 0000 0000 0000 0009 ................ 0x03a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x03b0: 0000 0000 0800 0000 0000 0000 0000 1b0d ................ 0x03c0: 000a 302e 2c2b 3132 332d 3435 362a 3738 ..0.,+123-456*78 0x03d0: 392f 4528 295e 3132 3334 3536 3738 3930 9/E()^1234567890 0x03e0: 2d3d 5b5d 3b27 2c2e 2f20 6f70 6b6c 7177 -=[];',./.opklqw 0x03f0: 6572 7479 7569 6173 6466 6768 6a6d 7a78 ertyuiasdfghjmzx 0x0400: 6376 626e 0000 fff1 194c fff1 19cc fff1 cvbn.....L...... 0x0410: 1a4c 0000 001f fff0 f517 fff1 1a4c fff1 .L...........L.. 0x0420: 19cc fff1 194c 0000 0000 0000 0000 0000 .....L.......... 0x0430: 0017 fff0 f517 fff1 18cc fff1 184c fff1 .............L.. 0x0440: 17cc 0000 0000 0000 0000 0000 0000 fff0 ................ 0x0450: f517 0000 0000 0000 0000 0000 0000 0000 ................ 0x0460: 0000 0000 0000 0047 8000 0000 0000 0000 .......G........ 0x0470: 4000 0000 8000 0000 c008 0000 0001 0000 @............... 0x0480: 000a fff0 fb9c fff0 2dd4 fff0 2d98 fff0 ........-...-... 0x0490: 2ef0 fff0 3106 fff0 32c6 fff0 2d9c fff1 ....1...2...-... 0x04a0: 1b6c 0000 0001 0000 0000 0000 0001 fff1 .l.............. 0x04b0: 1dac fff1 1b30 0000 0000 ffff ffff fff0 .....0.......... 0x04c0: 27ec fff0 285a fff0 2890 fff0 2374 fff0 '...(Z..(...#t.. 0x04d0: 23ce fff0 23d0 0000 0000 0000 0000 0000 #...#........... 0x04e0: 0000 1200 0000 0000 2500 0000 0000 0000 ........%....... 0x04f0: 0000 0300 0000 0000 0000 0000 c350 0000 .............P.. 0x0500: c350 fff0 fa15 fff0 fa1d fff0 f9e2 fff0 .P.............. 0x0510: f9ed fff0 f9fb fff0 fa06 fff0 fa14 fff0 ................ 0x0520: fa1c 0000 0000 6382 5363 0000 0400 6469 ......c.Sc....di 0x0530: 736b 206c 6162 656c 2063 6f72 7275 7074 sk.label.corrupt 0x0540: 6564 006e 6f20 6469 736b 206c 6162 656c ed.no.disk.label 0x0550: 0000 0000 0001 ffff ffff ffff ffff ffff ................ 0x0560: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0570: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0580: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x0590: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x05a0: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 0x05b0: 0000 0000 0000 ffff ff00 ffff ffff ffff ................ 0x05c0: 0000 fff4 34d0 ....4. 01:14:13.290966 08:00:09:27:86:a7 > 00:e0:4c:68:02:38 Unknown DSAP 0xf8 Unnumbered, ui, Flags [Command], length 46 0x0000: f8f8 0300 0000 0608 0609 0300 0000 0000 ................ 0x0010: 0003 05b4 4850 5333 3030 2020 2020 2020 ....HPS300...... 0x0020: 2020 2020 2020 2020 0953 5953 5f55 .........SYS_U ==> SYS_UBOOT has been xfered, and then the loaded bootloader starts here 01:14:19.693754 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 08:00:09:27:86:a7, length 300 01:14:19.694144 IP 192.168.20.1.67 > 192.168.20.29.68: BOOTP/DHCP, Reply, length 300 ==> The loaded NetBSD/hp300 bootloader gets its IP address via BOOTP/DHCP 01:14:19.797818 ARP, Request who-has 192.168.20.1 tell 192.168.20.29, length 50 01:14:19.797829 ARP, Reply 192.168.20.1 is-at 00:e0:4c:68:02:38, length 28 01:14:19.799021 IP 192.168.20.29.1023 > 192.168.20.1.111: UDP, length 76 01:14:19.799088 IP 192.168.20.1.111 > 192.168.20.29.1023: UDP, length 28 01:14:19.800629 IP 192.168.20.29.1023 > 192.168.20.1.1008: UDP, length 92 01:14:19.800795 IP 192.168.20.1.1008 > 192.168.20.29.1023: UDP, length 68 01:14:19.803201 IP 192.168.20.29.1023 > 192.168.20.1.111: UDP, length 76 01:14:19.803249 IP 192.168.20.1.111 > 192.168.20.29.1023: UDP, length 28 ==> The bootloader tries to mount the server's directory via NFS 01:14:19.804862 IP 192.168.20.29.1023 > 192.168.20.1.2049: NFS request xid 4 104 lookup fh 18,0/74402693 "netbsd" 01:14:19.804908 IP 192.168.20.1.2049 > 192.168.20.29.1023: NFS reply xid 4 reply ok 236 lookup fh 18,0/74394689 ==> The bootloader looks up "netbsd" as a kernel to be loaded 01:14:19.809743 IP 192.168.20.29.1023 > 192.168.20.1.2049: NFS request xid 5 104 read fh 18,0/74394689 1024 bytes @ 0 01:14:19.809810 IP 192.168.20.1.2049 > 192.168.20.29.1023: NFS reply xid 5 reply ok 1152 read 01:14:19.820229 IP 192.168.20.29.1023 > 192.168.20.1.2049: NFS request xid 6 104 read fh 18,0/74394689 1024 bytes @ 1024 01:14:19.820274 IP 192.168.20.1.2049 > 192.168.20.29.1023: NFS reply xid 6 reply ok 1152 read : ==> The bootloader loads the "netbsd" kernel file I should update netboot descriptions in www.NetBSD.org page, but maybe you have to check the following settings on your Pi server: BTW, it would be nice to try Ebihara-san's NetBSD/evbarm image on your Pi (so that I don't have to investigate Linux specific server settings :-) https://mail-index.netbsd.org/port-arm/2025/12/02/msg009481.html1) /etc/exports file to specify NFS root dir to be exported like: ``` /nfsroot -maproot=root:wheel ``` (the directory name should be replaced per your settings) 2) /etc/rc.conf file to start necessary daemons: ``` rpcbind=YES rpcbind_flags="-l" # -l logs libwrap mountd=YES mountd_flags="" # NFS mount requests daemon nfs_server=YES # enable server daemons dhcpd=YES dhcpd_flags="" ``` 3) /etc/dhcpd.conf to start dhcpd (maybe your settings are ok): ``` ddns-update-style none; default-lease-time 600; max-lease-time 28000; subnet 192.168.20.0 netmask 255.255.255.0 { server-name="192.168.20.1"; next-server 192.168.20.1; range dynamic-bootp 192.168.20.200 192.168.20.220; option broadcast-address 192.168.20.255; option routers 192.168.20.1; } host hp425t { use-host-decl-names off; hardware ethernet 08:00:09:27:86:a7; fixed-address 192.168.20.29; server-name "server-name"; option root-path "/nfsroot"; } ``` or so. You can also check NFS export settings on your Pi server by "showmount -e" command (at least on NetBSD) like: ``` # showmount -e Exports list on local host: /nfsroot hp425t ``` Thanks, --- Izumi Tsutsui