]> git.ipfire.org Git - people/ms/u-boot.git/blob - net/nfs.c
net: allow setting env enetaddr from net device setting
[people/ms/u-boot.git] / net / nfs.c
1 /*
2 * NFS support driver - based on etherboot and U-BOOT's tftp.c
3 *
4 * Masami Komiya <mkomiya@sonare.it> 2004
5 *
6 */
7
8 /* NOTE: the NFS code is heavily inspired by the NetBSD netboot code (read:
9 * large portions are copied verbatim) as distributed in OSKit 0.97. A few
10 * changes were necessary to adapt the code to Etherboot and to fix several
11 * inconsistencies. Also the RPC message preparation is done "by hand" to
12 * avoid adding netsprintf() which I find hard to understand and use. */
13
14 /* NOTE 2: Etherboot does not care about things beyond the kernel image, so
15 * it loads the kernel image off the boot server (ARP_SERVER) and does not
16 * access the client root disk (root-path in dhcpd.conf), which would use
17 * ARP_ROOTSERVER. The root disk is something the operating system we are
18 * about to load needs to use. This is different from the OSKit 0.97 logic. */
19
20 /* NOTE 3: Symlink handling introduced by Anselm M Hoffmeister, 2003-July-14
21 * If a symlink is encountered, it is followed as far as possible (recursion
22 * possible, maximum 16 steps). There is no clearing of ".."'s inside the
23 * path, so please DON'T DO THAT. thx. */
24
25 #include <common.h>
26 #include <command.h>
27 #include <net.h>
28 #include <malloc.h>
29 #include "nfs.h"
30 #include "bootp.h"
31
32 #define HASHES_PER_LINE 65 /* Number of "loading" hashes per line */
33 #define NFS_RETRY_COUNT 30
34 #define NFS_TIMEOUT 2000UL
35
36 static int fs_mounted;
37 static unsigned long rpc_id;
38 static int nfs_offset = -1;
39 static int nfs_len;
40
41 static char dirfh[NFS_FHSIZE]; /* file handle of directory */
42 static char filefh[NFS_FHSIZE]; /* file handle of kernel image */
43
44 static enum net_loop_state nfs_download_state;
45 static IPaddr_t NfsServerIP;
46 static int NfsSrvMountPort;
47 static int NfsSrvNfsPort;
48 static int NfsOurPort;
49 static int NfsTimeoutCount;
50 static int NfsState;
51 #define STATE_PRCLOOKUP_PROG_MOUNT_REQ 1
52 #define STATE_PRCLOOKUP_PROG_NFS_REQ 2
53 #define STATE_MOUNT_REQ 3
54 #define STATE_UMOUNT_REQ 4
55 #define STATE_LOOKUP_REQ 5
56 #define STATE_READ_REQ 6
57 #define STATE_READLINK_REQ 7
58
59 static char default_filename[64];
60 static char *nfs_filename;
61 static char *nfs_path;
62 static char nfs_path_buff[2048];
63
64 static inline int
65 store_block(uchar *src, unsigned offset, unsigned len)
66 {
67 ulong newsize = offset + len;
68 #ifdef CONFIG_SYS_DIRECT_FLASH_NFS
69 int i, rc = 0;
70
71 for (i = 0; i < CONFIG_SYS_MAX_FLASH_BANKS; i++) {
72 /* start address in flash? */
73 if (load_addr + offset >= flash_info[i].start[0]) {
74 rc = 1;
75 break;
76 }
77 }
78
79 if (rc) { /* Flash is destination for this packet */
80 rc = flash_write((uchar *)src, (ulong)(load_addr+offset), len);
81 if (rc) {
82 flash_perror(rc);
83 return -1;
84 }
85 } else
86 #endif /* CONFIG_SYS_DIRECT_FLASH_NFS */
87 {
88 (void)memcpy((void *)(load_addr + offset), src, len);
89 }
90
91 if (NetBootFileXferSize < (offset+len))
92 NetBootFileXferSize = newsize;
93 return 0;
94 }
95
96 static char*
97 basename(char *path)
98 {
99 char *fname;
100
101 fname = path + strlen(path) - 1;
102 while (fname >= path) {
103 if (*fname == '/') {
104 fname++;
105 break;
106 }
107 fname--;
108 }
109 return fname;
110 }
111
112 static char*
113 dirname(char *path)
114 {
115 char *fname;
116
117 fname = basename(path);
118 --fname;
119 *fname = '\0';
120 return path;
121 }
122
123 /**************************************************************************
124 RPC_ADD_CREDENTIALS - Add RPC authentication/verifier entries
125 **************************************************************************/
126 static long *rpc_add_credentials(long *p)
127 {
128 int hl;
129 int hostnamelen;
130 char hostname[256];
131
132 strcpy(hostname, "");
133 hostnamelen = strlen(hostname);
134
135 /* Here's the executive summary on authentication requirements of the
136 * various NFS server implementations: Linux accepts both AUTH_NONE
137 * and AUTH_UNIX authentication (also accepts an empty hostname field
138 * in the AUTH_UNIX scheme). *BSD refuses AUTH_NONE, but accepts
139 * AUTH_UNIX (also accepts an empty hostname field in the AUTH_UNIX
140 * scheme). To be safe, use AUTH_UNIX and pass the hostname if we have
141 * it (if the BOOTP/DHCP reply didn't give one, just use an empty
142 * hostname). */
143
144 hl = (hostnamelen + 3) & ~3;
145
146 /* Provide an AUTH_UNIX credential. */
147 *p++ = htonl(1); /* AUTH_UNIX */
148 *p++ = htonl(hl+20); /* auth length */
149 *p++ = htonl(0); /* stamp */
150 *p++ = htonl(hostnamelen); /* hostname string */
151 if (hostnamelen & 3)
152 *(p + hostnamelen / 4) = 0; /* add zero padding */
153 memcpy(p, hostname, hostnamelen);
154 p += hl / 4;
155 *p++ = 0; /* uid */
156 *p++ = 0; /* gid */
157 *p++ = 0; /* auxiliary gid list */
158
159 /* Provide an AUTH_NONE verifier. */
160 *p++ = 0; /* AUTH_NONE */
161 *p++ = 0; /* auth length */
162
163 return p;
164 }
165
166 /**************************************************************************
167 RPC_LOOKUP - Lookup RPC Port numbers
168 **************************************************************************/
169 static void
170 rpc_req(int rpc_prog, int rpc_proc, uint32_t *data, int datalen)
171 {
172 struct rpc_t pkt;
173 unsigned long id;
174 uint32_t *p;
175 int pktlen;
176 int sport;
177
178 id = ++rpc_id;
179 pkt.u.call.id = htonl(id);
180 pkt.u.call.type = htonl(MSG_CALL);
181 pkt.u.call.rpcvers = htonl(2); /* use RPC version 2 */
182 pkt.u.call.prog = htonl(rpc_prog);
183 pkt.u.call.vers = htonl(2); /* portmapper is version 2 */
184 pkt.u.call.proc = htonl(rpc_proc);
185 p = (uint32_t *)&(pkt.u.call.data);
186
187 if (datalen)
188 memcpy((char *)p, (char *)data, datalen*sizeof(uint32_t));
189
190 pktlen = (char *)p + datalen*sizeof(uint32_t) - (char *)&pkt;
191
192 memcpy((char *)NetTxPacket + NetEthHdrSize() + IP_UDP_HDR_SIZE,
193 (char *)&pkt, pktlen);
194
195 if (rpc_prog == PROG_PORTMAP)
196 sport = SUNRPC_PORT;
197 else if (rpc_prog == PROG_MOUNT)
198 sport = NfsSrvMountPort;
199 else
200 sport = NfsSrvNfsPort;
201
202 NetSendUDPPacket(NetServerEther, NfsServerIP, sport, NfsOurPort,
203 pktlen);
204 }
205
206 /**************************************************************************
207 RPC_LOOKUP - Lookup RPC Port numbers
208 **************************************************************************/
209 static void
210 rpc_lookup_req(int prog, int ver)
211 {
212 uint32_t data[16];
213
214 data[0] = 0; data[1] = 0; /* auth credential */
215 data[2] = 0; data[3] = 0; /* auth verifier */
216 data[4] = htonl(prog);
217 data[5] = htonl(ver);
218 data[6] = htonl(17); /* IP_UDP */
219 data[7] = 0;
220
221 rpc_req(PROG_PORTMAP, PORTMAP_GETPORT, data, 8);
222 }
223
224 /**************************************************************************
225 NFS_MOUNT - Mount an NFS Filesystem
226 **************************************************************************/
227 static void
228 nfs_mount_req(char *path)
229 {
230 uint32_t data[1024];
231 uint32_t *p;
232 int len;
233 int pathlen;
234
235 pathlen = strlen(path);
236
237 p = &(data[0]);
238 p = (uint32_t *)rpc_add_credentials((long *)p);
239
240 *p++ = htonl(pathlen);
241 if (pathlen & 3)
242 *(p + pathlen / 4) = 0;
243 memcpy(p, path, pathlen);
244 p += (pathlen + 3) / 4;
245
246 len = (uint32_t *)p - (uint32_t *)&(data[0]);
247
248 rpc_req(PROG_MOUNT, MOUNT_ADDENTRY, data, len);
249 }
250
251 /**************************************************************************
252 NFS_UMOUNTALL - Unmount all our NFS Filesystems on the Server
253 **************************************************************************/
254 static void
255 nfs_umountall_req(void)
256 {
257 uint32_t data[1024];
258 uint32_t *p;
259 int len;
260
261 if ((NfsSrvMountPort == -1) || (!fs_mounted))
262 /* Nothing mounted, nothing to umount */
263 return;
264
265 p = &(data[0]);
266 p = (uint32_t *)rpc_add_credentials((long *)p);
267
268 len = (uint32_t *)p - (uint32_t *)&(data[0]);
269
270 rpc_req(PROG_MOUNT, MOUNT_UMOUNTALL, data, len);
271 }
272
273 /***************************************************************************
274 * NFS_READLINK (AH 2003-07-14)
275 * This procedure is called when read of the first block fails -
276 * this probably happens when it's a directory or a symlink
277 * In case of successful readlink(), the dirname is manipulated,
278 * so that inside the nfs() function a recursion can be done.
279 **************************************************************************/
280 static void
281 nfs_readlink_req(void)
282 {
283 uint32_t data[1024];
284 uint32_t *p;
285 int len;
286
287 p = &(data[0]);
288 p = (uint32_t *)rpc_add_credentials((long *)p);
289
290 memcpy(p, filefh, NFS_FHSIZE);
291 p += (NFS_FHSIZE / 4);
292
293 len = (uint32_t *)p - (uint32_t *)&(data[0]);
294
295 rpc_req(PROG_NFS, NFS_READLINK, data, len);
296 }
297
298 /**************************************************************************
299 NFS_LOOKUP - Lookup Pathname
300 **************************************************************************/
301 static void
302 nfs_lookup_req(char *fname)
303 {
304 uint32_t data[1024];
305 uint32_t *p;
306 int len;
307 int fnamelen;
308
309 fnamelen = strlen(fname);
310
311 p = &(data[0]);
312 p = (uint32_t *)rpc_add_credentials((long *)p);
313
314 memcpy(p, dirfh, NFS_FHSIZE);
315 p += (NFS_FHSIZE / 4);
316 *p++ = htonl(fnamelen);
317 if (fnamelen & 3)
318 *(p + fnamelen / 4) = 0;
319 memcpy(p, fname, fnamelen);
320 p += (fnamelen + 3) / 4;
321
322 len = (uint32_t *)p - (uint32_t *)&(data[0]);
323
324 rpc_req(PROG_NFS, NFS_LOOKUP, data, len);
325 }
326
327 /**************************************************************************
328 NFS_READ - Read File on NFS Server
329 **************************************************************************/
330 static void
331 nfs_read_req(int offset, int readlen)
332 {
333 uint32_t data[1024];
334 uint32_t *p;
335 int len;
336
337 p = &(data[0]);
338 p = (uint32_t *)rpc_add_credentials((long *)p);
339
340 memcpy(p, filefh, NFS_FHSIZE);
341 p += (NFS_FHSIZE / 4);
342 *p++ = htonl(offset);
343 *p++ = htonl(readlen);
344 *p++ = 0;
345
346 len = (uint32_t *)p - (uint32_t *)&(data[0]);
347
348 rpc_req(PROG_NFS, NFS_READ, data, len);
349 }
350
351 /**************************************************************************
352 RPC request dispatcher
353 **************************************************************************/
354
355 static void
356 NfsSend(void)
357 {
358 debug("%s\n", __func__);
359
360 switch (NfsState) {
361 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
362 rpc_lookup_req(PROG_MOUNT, 1);
363 break;
364 case STATE_PRCLOOKUP_PROG_NFS_REQ:
365 rpc_lookup_req(PROG_NFS, 2);
366 break;
367 case STATE_MOUNT_REQ:
368 nfs_mount_req(nfs_path);
369 break;
370 case STATE_UMOUNT_REQ:
371 nfs_umountall_req();
372 break;
373 case STATE_LOOKUP_REQ:
374 nfs_lookup_req(nfs_filename);
375 break;
376 case STATE_READ_REQ:
377 nfs_read_req(nfs_offset, nfs_len);
378 break;
379 case STATE_READLINK_REQ:
380 nfs_readlink_req();
381 break;
382 }
383 }
384
385 /**************************************************************************
386 Handlers for the reply from server
387 **************************************************************************/
388
389 static int
390 rpc_lookup_reply(int prog, uchar *pkt, unsigned len)
391 {
392 struct rpc_t rpc_pkt;
393
394 memcpy((unsigned char *)&rpc_pkt, pkt, len);
395
396 debug("%s\n", __func__);
397
398 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
399 return -1;
400
401 if (rpc_pkt.u.reply.rstatus ||
402 rpc_pkt.u.reply.verifier ||
403 rpc_pkt.u.reply.astatus)
404 return -1;
405
406 switch (prog) {
407 case PROG_MOUNT:
408 NfsSrvMountPort = ntohl(rpc_pkt.u.reply.data[0]);
409 break;
410 case PROG_NFS:
411 NfsSrvNfsPort = ntohl(rpc_pkt.u.reply.data[0]);
412 break;
413 }
414
415 return 0;
416 }
417
418 static int
419 nfs_mount_reply(uchar *pkt, unsigned len)
420 {
421 struct rpc_t rpc_pkt;
422
423 debug("%s\n", __func__);
424
425 memcpy((unsigned char *)&rpc_pkt, pkt, len);
426
427 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
428 return -1;
429
430 if (rpc_pkt.u.reply.rstatus ||
431 rpc_pkt.u.reply.verifier ||
432 rpc_pkt.u.reply.astatus ||
433 rpc_pkt.u.reply.data[0])
434 return -1;
435
436 fs_mounted = 1;
437 memcpy(dirfh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
438
439 return 0;
440 }
441
442 static int
443 nfs_umountall_reply(uchar *pkt, unsigned len)
444 {
445 struct rpc_t rpc_pkt;
446
447 debug("%s\n", __func__);
448
449 memcpy((unsigned char *)&rpc_pkt, pkt, len);
450
451 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
452 return -1;
453
454 if (rpc_pkt.u.reply.rstatus ||
455 rpc_pkt.u.reply.verifier ||
456 rpc_pkt.u.reply.astatus)
457 return -1;
458
459 fs_mounted = 0;
460 memset(dirfh, 0, sizeof(dirfh));
461
462 return 0;
463 }
464
465 static int
466 nfs_lookup_reply(uchar *pkt, unsigned len)
467 {
468 struct rpc_t rpc_pkt;
469
470 debug("%s\n", __func__);
471
472 memcpy((unsigned char *)&rpc_pkt, pkt, len);
473
474 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
475 return -1;
476
477 if (rpc_pkt.u.reply.rstatus ||
478 rpc_pkt.u.reply.verifier ||
479 rpc_pkt.u.reply.astatus ||
480 rpc_pkt.u.reply.data[0])
481 return -1;
482
483 memcpy(filefh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
484
485 return 0;
486 }
487
488 static int
489 nfs_readlink_reply(uchar *pkt, unsigned len)
490 {
491 struct rpc_t rpc_pkt;
492 int rlen;
493
494 debug("%s\n", __func__);
495
496 memcpy((unsigned char *)&rpc_pkt, pkt, len);
497
498 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
499 return -1;
500
501 if (rpc_pkt.u.reply.rstatus ||
502 rpc_pkt.u.reply.verifier ||
503 rpc_pkt.u.reply.astatus ||
504 rpc_pkt.u.reply.data[0])
505 return -1;
506
507 rlen = ntohl(rpc_pkt.u.reply.data[1]); /* new path length */
508
509 if (*((char *)&(rpc_pkt.u.reply.data[2])) != '/') {
510 int pathlen;
511 strcat(nfs_path, "/");
512 pathlen = strlen(nfs_path);
513 memcpy(nfs_path + pathlen, (uchar *)&(rpc_pkt.u.reply.data[2]),
514 rlen);
515 nfs_path[pathlen + rlen] = 0;
516 } else {
517 memcpy(nfs_path, (uchar *)&(rpc_pkt.u.reply.data[2]), rlen);
518 nfs_path[rlen] = 0;
519 }
520 return 0;
521 }
522
523 static int
524 nfs_read_reply(uchar *pkt, unsigned len)
525 {
526 struct rpc_t rpc_pkt;
527 int rlen;
528
529 debug("%s\n", __func__);
530
531 memcpy((uchar *)&rpc_pkt, pkt, sizeof(rpc_pkt.u.reply));
532
533 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
534 return -1;
535
536 if (rpc_pkt.u.reply.rstatus ||
537 rpc_pkt.u.reply.verifier ||
538 rpc_pkt.u.reply.astatus ||
539 rpc_pkt.u.reply.data[0]) {
540 if (rpc_pkt.u.reply.rstatus)
541 return -9999;
542 if (rpc_pkt.u.reply.astatus)
543 return -9999;
544 return -ntohl(rpc_pkt.u.reply.data[0]);
545 }
546
547 if ((nfs_offset != 0) && !((nfs_offset) %
548 (NFS_READ_SIZE / 2 * 10 * HASHES_PER_LINE)))
549 puts("\n\t ");
550 if (!(nfs_offset % ((NFS_READ_SIZE / 2) * 10)))
551 putc('#');
552
553 rlen = ntohl(rpc_pkt.u.reply.data[18]);
554 if (store_block((uchar *)pkt + sizeof(rpc_pkt.u.reply),
555 nfs_offset, rlen))
556 return -9999;
557
558 return rlen;
559 }
560
561 /**************************************************************************
562 Interfaces of U-BOOT
563 **************************************************************************/
564
565 static void
566 NfsTimeout(void)
567 {
568 if (++NfsTimeoutCount > NFS_RETRY_COUNT) {
569 puts("\nRetry count exceeded; starting again\n");
570 NetStartAgain();
571 } else {
572 puts("T ");
573 NetSetTimeout(NFS_TIMEOUT, NfsTimeout);
574 NfsSend();
575 }
576 }
577
578 static void
579 NfsHandler(uchar *pkt, unsigned dest, IPaddr_t sip, unsigned src, unsigned len)
580 {
581 int rlen;
582
583 debug("%s\n", __func__);
584
585 if (dest != NfsOurPort)
586 return;
587
588 switch (NfsState) {
589 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
590 rpc_lookup_reply(PROG_MOUNT, pkt, len);
591 NfsState = STATE_PRCLOOKUP_PROG_NFS_REQ;
592 NfsSend();
593 break;
594
595 case STATE_PRCLOOKUP_PROG_NFS_REQ:
596 rpc_lookup_reply(PROG_NFS, pkt, len);
597 NfsState = STATE_MOUNT_REQ;
598 NfsSend();
599 break;
600
601 case STATE_MOUNT_REQ:
602 if (nfs_mount_reply(pkt, len)) {
603 puts("*** ERROR: Cannot mount\n");
604 /* just to be sure... */
605 NfsState = STATE_UMOUNT_REQ;
606 NfsSend();
607 } else {
608 NfsState = STATE_LOOKUP_REQ;
609 NfsSend();
610 }
611 break;
612
613 case STATE_UMOUNT_REQ:
614 if (nfs_umountall_reply(pkt, len)) {
615 puts("*** ERROR: Cannot umount\n");
616 net_set_state(NETLOOP_FAIL);
617 } else {
618 puts("\ndone\n");
619 net_set_state(nfs_download_state);
620 }
621 break;
622
623 case STATE_LOOKUP_REQ:
624 if (nfs_lookup_reply(pkt, len)) {
625 puts("*** ERROR: File lookup fail\n");
626 NfsState = STATE_UMOUNT_REQ;
627 NfsSend();
628 } else {
629 NfsState = STATE_READ_REQ;
630 nfs_offset = 0;
631 nfs_len = NFS_READ_SIZE;
632 NfsSend();
633 }
634 break;
635
636 case STATE_READLINK_REQ:
637 if (nfs_readlink_reply(pkt, len)) {
638 puts("*** ERROR: Symlink fail\n");
639 NfsState = STATE_UMOUNT_REQ;
640 NfsSend();
641 } else {
642 debug("Symlink --> %s\n", nfs_path);
643 nfs_filename = basename(nfs_path);
644 nfs_path = dirname(nfs_path);
645
646 NfsState = STATE_MOUNT_REQ;
647 NfsSend();
648 }
649 break;
650
651 case STATE_READ_REQ:
652 rlen = nfs_read_reply(pkt, len);
653 NetSetTimeout(NFS_TIMEOUT, NfsTimeout);
654 if (rlen > 0) {
655 nfs_offset += rlen;
656 NfsSend();
657 } else if ((rlen == -NFSERR_ISDIR) || (rlen == -NFSERR_INVAL)) {
658 /* symbolic link */
659 NfsState = STATE_READLINK_REQ;
660 NfsSend();
661 } else {
662 if (!rlen)
663 nfs_download_state = NETLOOP_SUCCESS;
664 NfsState = STATE_UMOUNT_REQ;
665 NfsSend();
666 }
667 break;
668 }
669 }
670
671
672 void
673 NfsStart(void)
674 {
675 debug("%s\n", __func__);
676 nfs_download_state = NETLOOP_FAIL;
677
678 NfsServerIP = NetServerIP;
679 nfs_path = (char *)nfs_path_buff;
680
681 if (nfs_path == NULL) {
682 net_set_state(NETLOOP_FAIL);
683 puts("*** ERROR: Fail allocate memory\n");
684 return;
685 }
686
687 if (BootFile[0] == '\0') {
688 sprintf(default_filename, "/nfsroot/%02X%02X%02X%02X.img",
689 NetOurIP & 0xFF,
690 (NetOurIP >> 8) & 0xFF,
691 (NetOurIP >> 16) & 0xFF,
692 (NetOurIP >> 24) & 0xFF);
693 strcpy(nfs_path, default_filename);
694
695 printf("*** Warning: no boot file name; using '%s'\n",
696 nfs_path);
697 } else {
698 char *p = BootFile;
699
700 p = strchr(p, ':');
701
702 if (p != NULL) {
703 NfsServerIP = string_to_ip(BootFile);
704 ++p;
705 strcpy(nfs_path, p);
706 } else {
707 strcpy(nfs_path, BootFile);
708 }
709 }
710
711 nfs_filename = basename(nfs_path);
712 nfs_path = dirname(nfs_path);
713
714 printf("Using %s device\n", eth_get_name());
715
716 printf("File transfer via NFS from server %pI4"
717 "; our IP address is %pI4", &NfsServerIP, &NetOurIP);
718
719 /* Check if we need to send across this subnet */
720 if (NetOurGatewayIP && NetOurSubnetMask) {
721 IPaddr_t OurNet = NetOurIP & NetOurSubnetMask;
722 IPaddr_t ServerNet = NetServerIP & NetOurSubnetMask;
723
724 if (OurNet != ServerNet)
725 printf("; sending through gateway %pI4",
726 &NetOurGatewayIP);
727 }
728 printf("\nFilename '%s/%s'.", nfs_path, nfs_filename);
729
730 if (NetBootFileSize) {
731 printf(" Size is 0x%x Bytes = ", NetBootFileSize<<9);
732 print_size(NetBootFileSize<<9, "");
733 }
734 printf("\nLoad address: 0x%lx\n"
735 "Loading: *\b", load_addr);
736
737 NetSetTimeout(NFS_TIMEOUT, NfsTimeout);
738 net_set_udp_handler(NfsHandler);
739
740 NfsTimeoutCount = 0;
741 NfsState = STATE_PRCLOOKUP_PROG_MOUNT_REQ;
742
743 /*NfsOurPort = 4096 + (get_ticks() % 3072);*/
744 /*FIX ME !!!*/
745 NfsOurPort = 1000;
746
747 /* zero out server ether in case the server ip has changed */
748 memset(NetServerEther, 0, 6);
749
750 NfsSend();
751 }