]> git.ipfire.org Git - people/ms/u-boot.git/blob - net/nfs.c
net: Move common init into a new eth_common.c file
[people/ms/u-boot.git] / net / nfs.c
1 /*
2 * NFS support driver - based on etherboot and U-BOOT's tftp.c
3 *
4 * Masami Komiya <mkomiya@sonare.it> 2004
5 *
6 */
7
8 /* NOTE: the NFS code is heavily inspired by the NetBSD netboot code (read:
9 * large portions are copied verbatim) as distributed in OSKit 0.97. A few
10 * changes were necessary to adapt the code to Etherboot and to fix several
11 * inconsistencies. Also the RPC message preparation is done "by hand" to
12 * avoid adding netsprintf() which I find hard to understand and use. */
13
14 /* NOTE 2: Etherboot does not care about things beyond the kernel image, so
15 * it loads the kernel image off the boot server (ARP_SERVER) and does not
16 * access the client root disk (root-path in dhcpd.conf), which would use
17 * ARP_ROOTSERVER. The root disk is something the operating system we are
18 * about to load needs to use. This is different from the OSKit 0.97 logic. */
19
20 /* NOTE 3: Symlink handling introduced by Anselm M Hoffmeister, 2003-July-14
21 * If a symlink is encountered, it is followed as far as possible (recursion
22 * possible, maximum 16 steps). There is no clearing of ".."'s inside the
23 * path, so please DON'T DO THAT. thx. */
24
25 #include <common.h>
26 #include <command.h>
27 #include <net.h>
28 #include <malloc.h>
29 #include <mapmem.h>
30 #include "nfs.h"
31 #include "bootp.h"
32
33 #define HASHES_PER_LINE 65 /* Number of "loading" hashes per line */
34 #define NFS_RETRY_COUNT 30
35 #ifndef CONFIG_NFS_TIMEOUT
36 # define NFS_TIMEOUT 2000UL
37 #else
38 # define NFS_TIMEOUT CONFIG_NFS_TIMEOUT
39 #endif
40
41 #define NFS_RPC_ERR 1
42 #define NFS_RPC_DROP 124
43
44 static int fs_mounted;
45 static unsigned long rpc_id;
46 static int nfs_offset = -1;
47 static int nfs_len;
48 static ulong nfs_timeout = NFS_TIMEOUT;
49
50 static char dirfh[NFS_FHSIZE]; /* file handle of directory */
51 static char filefh[NFS_FHSIZE]; /* file handle of kernel image */
52
53 static enum net_loop_state nfs_download_state;
54 static struct in_addr nfs_server_ip;
55 static int nfs_server_mount_port;
56 static int nfs_server_port;
57 static int nfs_our_port;
58 static int nfs_timeout_count;
59 static int nfs_state;
60 #define STATE_PRCLOOKUP_PROG_MOUNT_REQ 1
61 #define STATE_PRCLOOKUP_PROG_NFS_REQ 2
62 #define STATE_MOUNT_REQ 3
63 #define STATE_UMOUNT_REQ 4
64 #define STATE_LOOKUP_REQ 5
65 #define STATE_READ_REQ 6
66 #define STATE_READLINK_REQ 7
67
68 static char default_filename[64];
69 static char *nfs_filename;
70 static char *nfs_path;
71 static char nfs_path_buff[2048];
72
73 static inline int store_block(uchar *src, unsigned offset, unsigned len)
74 {
75 ulong newsize = offset + len;
76 #ifdef CONFIG_SYS_DIRECT_FLASH_NFS
77 int i, rc = 0;
78
79 for (i = 0; i < CONFIG_SYS_MAX_FLASH_BANKS; i++) {
80 /* start address in flash? */
81 if (load_addr + offset >= flash_info[i].start[0]) {
82 rc = 1;
83 break;
84 }
85 }
86
87 if (rc) { /* Flash is destination for this packet */
88 rc = flash_write((uchar *)src, (ulong)(load_addr+offset), len);
89 if (rc) {
90 flash_perror(rc);
91 return -1;
92 }
93 } else
94 #endif /* CONFIG_SYS_DIRECT_FLASH_NFS */
95 {
96 void *ptr = map_sysmem(load_addr + offset, len);
97
98 memcpy(ptr, src, len);
99 unmap_sysmem(ptr);
100 }
101
102 if (net_boot_file_size < (offset + len))
103 net_boot_file_size = newsize;
104 return 0;
105 }
106
107 static char *basename(char *path)
108 {
109 char *fname;
110
111 fname = path + strlen(path) - 1;
112 while (fname >= path) {
113 if (*fname == '/') {
114 fname++;
115 break;
116 }
117 fname--;
118 }
119 return fname;
120 }
121
122 static char *dirname(char *path)
123 {
124 char *fname;
125
126 fname = basename(path);
127 --fname;
128 *fname = '\0';
129 return path;
130 }
131
132 /**************************************************************************
133 RPC_ADD_CREDENTIALS - Add RPC authentication/verifier entries
134 **************************************************************************/
135 static long *rpc_add_credentials(long *p)
136 {
137 int hl;
138 int hostnamelen;
139 char hostname[256];
140
141 strcpy(hostname, "");
142 hostnamelen = strlen(hostname);
143
144 /* Here's the executive summary on authentication requirements of the
145 * various NFS server implementations: Linux accepts both AUTH_NONE
146 * and AUTH_UNIX authentication (also accepts an empty hostname field
147 * in the AUTH_UNIX scheme). *BSD refuses AUTH_NONE, but accepts
148 * AUTH_UNIX (also accepts an empty hostname field in the AUTH_UNIX
149 * scheme). To be safe, use AUTH_UNIX and pass the hostname if we have
150 * it (if the BOOTP/DHCP reply didn't give one, just use an empty
151 * hostname). */
152
153 hl = (hostnamelen + 3) & ~3;
154
155 /* Provide an AUTH_UNIX credential. */
156 *p++ = htonl(1); /* AUTH_UNIX */
157 *p++ = htonl(hl+20); /* auth length */
158 *p++ = htonl(0); /* stamp */
159 *p++ = htonl(hostnamelen); /* hostname string */
160 if (hostnamelen & 3)
161 *(p + hostnamelen / 4) = 0; /* add zero padding */
162 memcpy(p, hostname, hostnamelen);
163 p += hl / 4;
164 *p++ = 0; /* uid */
165 *p++ = 0; /* gid */
166 *p++ = 0; /* auxiliary gid list */
167
168 /* Provide an AUTH_NONE verifier. */
169 *p++ = 0; /* AUTH_NONE */
170 *p++ = 0; /* auth length */
171
172 return p;
173 }
174
175 /**************************************************************************
176 RPC_LOOKUP - Lookup RPC Port numbers
177 **************************************************************************/
178 static void rpc_req(int rpc_prog, int rpc_proc, uint32_t *data, int datalen)
179 {
180 struct rpc_t pkt;
181 unsigned long id;
182 uint32_t *p;
183 int pktlen;
184 int sport;
185
186 id = ++rpc_id;
187 pkt.u.call.id = htonl(id);
188 pkt.u.call.type = htonl(MSG_CALL);
189 pkt.u.call.rpcvers = htonl(2); /* use RPC version 2 */
190 pkt.u.call.prog = htonl(rpc_prog);
191 pkt.u.call.vers = htonl(2); /* portmapper is version 2 */
192 pkt.u.call.proc = htonl(rpc_proc);
193 p = (uint32_t *)&(pkt.u.call.data);
194
195 if (datalen)
196 memcpy((char *)p, (char *)data, datalen*sizeof(uint32_t));
197
198 pktlen = (char *)p + datalen*sizeof(uint32_t) - (char *)&pkt;
199
200 memcpy((char *)net_tx_packet + net_eth_hdr_size() + IP_UDP_HDR_SIZE,
201 (char *)&pkt, pktlen);
202
203 if (rpc_prog == PROG_PORTMAP)
204 sport = SUNRPC_PORT;
205 else if (rpc_prog == PROG_MOUNT)
206 sport = nfs_server_mount_port;
207 else
208 sport = nfs_server_port;
209
210 net_send_udp_packet(net_server_ethaddr, nfs_server_ip, sport,
211 nfs_our_port, pktlen);
212 }
213
214 /**************************************************************************
215 RPC_LOOKUP - Lookup RPC Port numbers
216 **************************************************************************/
217 static void rpc_lookup_req(int prog, int ver)
218 {
219 uint32_t data[16];
220
221 data[0] = 0; data[1] = 0; /* auth credential */
222 data[2] = 0; data[3] = 0; /* auth verifier */
223 data[4] = htonl(prog);
224 data[5] = htonl(ver);
225 data[6] = htonl(17); /* IP_UDP */
226 data[7] = 0;
227
228 rpc_req(PROG_PORTMAP, PORTMAP_GETPORT, data, 8);
229 }
230
231 /**************************************************************************
232 NFS_MOUNT - Mount an NFS Filesystem
233 **************************************************************************/
234 static void nfs_mount_req(char *path)
235 {
236 uint32_t data[1024];
237 uint32_t *p;
238 int len;
239 int pathlen;
240
241 pathlen = strlen(path);
242
243 p = &(data[0]);
244 p = (uint32_t *)rpc_add_credentials((long *)p);
245
246 *p++ = htonl(pathlen);
247 if (pathlen & 3)
248 *(p + pathlen / 4) = 0;
249 memcpy(p, path, pathlen);
250 p += (pathlen + 3) / 4;
251
252 len = (uint32_t *)p - (uint32_t *)&(data[0]);
253
254 rpc_req(PROG_MOUNT, MOUNT_ADDENTRY, data, len);
255 }
256
257 /**************************************************************************
258 NFS_UMOUNTALL - Unmount all our NFS Filesystems on the Server
259 **************************************************************************/
260 static void nfs_umountall_req(void)
261 {
262 uint32_t data[1024];
263 uint32_t *p;
264 int len;
265
266 if ((nfs_server_mount_port == -1) || (!fs_mounted))
267 /* Nothing mounted, nothing to umount */
268 return;
269
270 p = &(data[0]);
271 p = (uint32_t *)rpc_add_credentials((long *)p);
272
273 len = (uint32_t *)p - (uint32_t *)&(data[0]);
274
275 rpc_req(PROG_MOUNT, MOUNT_UMOUNTALL, data, len);
276 }
277
278 /***************************************************************************
279 * NFS_READLINK (AH 2003-07-14)
280 * This procedure is called when read of the first block fails -
281 * this probably happens when it's a directory or a symlink
282 * In case of successful readlink(), the dirname is manipulated,
283 * so that inside the nfs() function a recursion can be done.
284 **************************************************************************/
285 static void nfs_readlink_req(void)
286 {
287 uint32_t data[1024];
288 uint32_t *p;
289 int len;
290
291 p = &(data[0]);
292 p = (uint32_t *)rpc_add_credentials((long *)p);
293
294 memcpy(p, filefh, NFS_FHSIZE);
295 p += (NFS_FHSIZE / 4);
296
297 len = (uint32_t *)p - (uint32_t *)&(data[0]);
298
299 rpc_req(PROG_NFS, NFS_READLINK, data, len);
300 }
301
302 /**************************************************************************
303 NFS_LOOKUP - Lookup Pathname
304 **************************************************************************/
305 static void nfs_lookup_req(char *fname)
306 {
307 uint32_t data[1024];
308 uint32_t *p;
309 int len;
310 int fnamelen;
311
312 fnamelen = strlen(fname);
313
314 p = &(data[0]);
315 p = (uint32_t *)rpc_add_credentials((long *)p);
316
317 memcpy(p, dirfh, NFS_FHSIZE);
318 p += (NFS_FHSIZE / 4);
319 *p++ = htonl(fnamelen);
320 if (fnamelen & 3)
321 *(p + fnamelen / 4) = 0;
322 memcpy(p, fname, fnamelen);
323 p += (fnamelen + 3) / 4;
324
325 len = (uint32_t *)p - (uint32_t *)&(data[0]);
326
327 rpc_req(PROG_NFS, NFS_LOOKUP, data, len);
328 }
329
330 /**************************************************************************
331 NFS_READ - Read File on NFS Server
332 **************************************************************************/
333 static void nfs_read_req(int offset, int readlen)
334 {
335 uint32_t data[1024];
336 uint32_t *p;
337 int len;
338
339 p = &(data[0]);
340 p = (uint32_t *)rpc_add_credentials((long *)p);
341
342 memcpy(p, filefh, NFS_FHSIZE);
343 p += (NFS_FHSIZE / 4);
344 *p++ = htonl(offset);
345 *p++ = htonl(readlen);
346 *p++ = 0;
347
348 len = (uint32_t *)p - (uint32_t *)&(data[0]);
349
350 rpc_req(PROG_NFS, NFS_READ, data, len);
351 }
352
353 /**************************************************************************
354 RPC request dispatcher
355 **************************************************************************/
356 static void nfs_send(void)
357 {
358 debug("%s\n", __func__);
359
360 switch (nfs_state) {
361 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
362 rpc_lookup_req(PROG_MOUNT, 1);
363 break;
364 case STATE_PRCLOOKUP_PROG_NFS_REQ:
365 rpc_lookup_req(PROG_NFS, 2);
366 break;
367 case STATE_MOUNT_REQ:
368 nfs_mount_req(nfs_path);
369 break;
370 case STATE_UMOUNT_REQ:
371 nfs_umountall_req();
372 break;
373 case STATE_LOOKUP_REQ:
374 nfs_lookup_req(nfs_filename);
375 break;
376 case STATE_READ_REQ:
377 nfs_read_req(nfs_offset, nfs_len);
378 break;
379 case STATE_READLINK_REQ:
380 nfs_readlink_req();
381 break;
382 }
383 }
384
385 /**************************************************************************
386 Handlers for the reply from server
387 **************************************************************************/
388
389 static int rpc_lookup_reply(int prog, uchar *pkt, unsigned len)
390 {
391 struct rpc_t rpc_pkt;
392
393 memcpy((unsigned char *)&rpc_pkt, pkt, len);
394
395 debug("%s\n", __func__);
396
397 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
398 return -NFS_RPC_ERR;
399 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
400 return -NFS_RPC_DROP;
401
402 if (rpc_pkt.u.reply.rstatus ||
403 rpc_pkt.u.reply.verifier ||
404 rpc_pkt.u.reply.astatus)
405 return -1;
406
407 switch (prog) {
408 case PROG_MOUNT:
409 nfs_server_mount_port = ntohl(rpc_pkt.u.reply.data[0]);
410 break;
411 case PROG_NFS:
412 nfs_server_port = ntohl(rpc_pkt.u.reply.data[0]);
413 break;
414 }
415
416 return 0;
417 }
418
419 static int nfs_mount_reply(uchar *pkt, unsigned len)
420 {
421 struct rpc_t rpc_pkt;
422
423 debug("%s\n", __func__);
424
425 memcpy((unsigned char *)&rpc_pkt, pkt, len);
426
427 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
428 return -NFS_RPC_ERR;
429 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
430 return -NFS_RPC_DROP;
431
432 if (rpc_pkt.u.reply.rstatus ||
433 rpc_pkt.u.reply.verifier ||
434 rpc_pkt.u.reply.astatus ||
435 rpc_pkt.u.reply.data[0])
436 return -1;
437
438 fs_mounted = 1;
439 memcpy(dirfh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
440
441 return 0;
442 }
443
444 static int nfs_umountall_reply(uchar *pkt, unsigned len)
445 {
446 struct rpc_t rpc_pkt;
447
448 debug("%s\n", __func__);
449
450 memcpy((unsigned char *)&rpc_pkt, pkt, len);
451
452 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
453 return -NFS_RPC_ERR;
454 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
455 return -NFS_RPC_DROP;
456
457 if (rpc_pkt.u.reply.rstatus ||
458 rpc_pkt.u.reply.verifier ||
459 rpc_pkt.u.reply.astatus)
460 return -1;
461
462 fs_mounted = 0;
463 memset(dirfh, 0, sizeof(dirfh));
464
465 return 0;
466 }
467
468 static int nfs_lookup_reply(uchar *pkt, unsigned len)
469 {
470 struct rpc_t rpc_pkt;
471
472 debug("%s\n", __func__);
473
474 memcpy((unsigned char *)&rpc_pkt, pkt, len);
475
476 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
477 return -NFS_RPC_ERR;
478 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
479 return -NFS_RPC_DROP;
480
481 if (rpc_pkt.u.reply.rstatus ||
482 rpc_pkt.u.reply.verifier ||
483 rpc_pkt.u.reply.astatus ||
484 rpc_pkt.u.reply.data[0])
485 return -1;
486
487 memcpy(filefh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
488
489 return 0;
490 }
491
492 static int nfs_readlink_reply(uchar *pkt, unsigned len)
493 {
494 struct rpc_t rpc_pkt;
495 int rlen;
496
497 debug("%s\n", __func__);
498
499 memcpy((unsigned char *)&rpc_pkt, pkt, len);
500
501 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
502 return -NFS_RPC_ERR;
503 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
504 return -NFS_RPC_DROP;
505
506 if (rpc_pkt.u.reply.rstatus ||
507 rpc_pkt.u.reply.verifier ||
508 rpc_pkt.u.reply.astatus ||
509 rpc_pkt.u.reply.data[0])
510 return -1;
511
512 rlen = ntohl(rpc_pkt.u.reply.data[1]); /* new path length */
513
514 if (*((char *)&(rpc_pkt.u.reply.data[2])) != '/') {
515 int pathlen;
516 strcat(nfs_path, "/");
517 pathlen = strlen(nfs_path);
518 memcpy(nfs_path + pathlen, (uchar *)&(rpc_pkt.u.reply.data[2]),
519 rlen);
520 nfs_path[pathlen + rlen] = 0;
521 } else {
522 memcpy(nfs_path, (uchar *)&(rpc_pkt.u.reply.data[2]), rlen);
523 nfs_path[rlen] = 0;
524 }
525 return 0;
526 }
527
528 static int nfs_read_reply(uchar *pkt, unsigned len)
529 {
530 struct rpc_t rpc_pkt;
531 int rlen;
532
533 debug("%s\n", __func__);
534
535 memcpy((uchar *)&rpc_pkt, pkt, sizeof(rpc_pkt.u.reply));
536
537 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
538 return -NFS_RPC_ERR;
539 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
540 return -NFS_RPC_DROP;
541
542 if (rpc_pkt.u.reply.rstatus ||
543 rpc_pkt.u.reply.verifier ||
544 rpc_pkt.u.reply.astatus ||
545 rpc_pkt.u.reply.data[0]) {
546 if (rpc_pkt.u.reply.rstatus)
547 return -9999;
548 if (rpc_pkt.u.reply.astatus)
549 return -9999;
550 return -ntohl(rpc_pkt.u.reply.data[0]);
551 }
552
553 if ((nfs_offset != 0) && !((nfs_offset) %
554 (NFS_READ_SIZE / 2 * 10 * HASHES_PER_LINE)))
555 puts("\n\t ");
556 if (!(nfs_offset % ((NFS_READ_SIZE / 2) * 10)))
557 putc('#');
558
559 rlen = ntohl(rpc_pkt.u.reply.data[18]);
560 if (store_block((uchar *)pkt + sizeof(rpc_pkt.u.reply),
561 nfs_offset, rlen))
562 return -9999;
563
564 return rlen;
565 }
566
567 /**************************************************************************
568 Interfaces of U-BOOT
569 **************************************************************************/
570 static void nfs_timeout_handler(void)
571 {
572 if (++nfs_timeout_count > NFS_RETRY_COUNT) {
573 puts("\nRetry count exceeded; starting again\n");
574 net_start_again();
575 } else {
576 puts("T ");
577 net_set_timeout_handler(nfs_timeout +
578 NFS_TIMEOUT * nfs_timeout_count,
579 nfs_timeout_handler);
580 nfs_send();
581 }
582 }
583
584 static void nfs_handler(uchar *pkt, unsigned dest, struct in_addr sip,
585 unsigned src, unsigned len)
586 {
587 int rlen;
588 int reply;
589
590 debug("%s\n", __func__);
591
592 if (dest != nfs_our_port)
593 return;
594
595 switch (nfs_state) {
596 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
597 if (rpc_lookup_reply(PROG_MOUNT, pkt, len) == -NFS_RPC_DROP)
598 break;
599 nfs_state = STATE_PRCLOOKUP_PROG_NFS_REQ;
600 nfs_send();
601 break;
602
603 case STATE_PRCLOOKUP_PROG_NFS_REQ:
604 if (rpc_lookup_reply(PROG_NFS, pkt, len) == -NFS_RPC_DROP)
605 break;
606 nfs_state = STATE_MOUNT_REQ;
607 nfs_send();
608 break;
609
610 case STATE_MOUNT_REQ:
611 reply = nfs_mount_reply(pkt, len);
612 if (reply == -NFS_RPC_DROP) {
613 break;
614 } else if (reply == -NFS_RPC_ERR) {
615 puts("*** ERROR: Cannot mount\n");
616 /* just to be sure... */
617 nfs_state = STATE_UMOUNT_REQ;
618 nfs_send();
619 } else {
620 nfs_state = STATE_LOOKUP_REQ;
621 nfs_send();
622 }
623 break;
624
625 case STATE_UMOUNT_REQ:
626 reply = nfs_umountall_reply(pkt, len);
627 if (reply == -NFS_RPC_DROP) {
628 break;
629 } else if (reply == -NFS_RPC_ERR) {
630 puts("*** ERROR: Cannot umount\n");
631 net_set_state(NETLOOP_FAIL);
632 } else {
633 puts("\ndone\n");
634 net_set_state(nfs_download_state);
635 }
636 break;
637
638 case STATE_LOOKUP_REQ:
639 reply = nfs_lookup_reply(pkt, len);
640 if (reply == -NFS_RPC_DROP) {
641 break;
642 } else if (reply == -NFS_RPC_ERR) {
643 puts("*** ERROR: File lookup fail\n");
644 nfs_state = STATE_UMOUNT_REQ;
645 nfs_send();
646 } else {
647 nfs_state = STATE_READ_REQ;
648 nfs_offset = 0;
649 nfs_len = NFS_READ_SIZE;
650 nfs_send();
651 }
652 break;
653
654 case STATE_READLINK_REQ:
655 reply = nfs_readlink_reply(pkt, len);
656 if (reply == -NFS_RPC_DROP) {
657 break;
658 } else if (reply == -NFS_RPC_ERR) {
659 puts("*** ERROR: Symlink fail\n");
660 nfs_state = STATE_UMOUNT_REQ;
661 nfs_send();
662 } else {
663 debug("Symlink --> %s\n", nfs_path);
664 nfs_filename = basename(nfs_path);
665 nfs_path = dirname(nfs_path);
666
667 nfs_state = STATE_MOUNT_REQ;
668 nfs_send();
669 }
670 break;
671
672 case STATE_READ_REQ:
673 rlen = nfs_read_reply(pkt, len);
674 net_set_timeout_handler(nfs_timeout, nfs_timeout_handler);
675 if (rlen > 0) {
676 nfs_offset += rlen;
677 nfs_send();
678 } else if ((rlen == -NFSERR_ISDIR) || (rlen == -NFSERR_INVAL)) {
679 /* symbolic link */
680 nfs_state = STATE_READLINK_REQ;
681 nfs_send();
682 } else {
683 if (!rlen)
684 nfs_download_state = NETLOOP_SUCCESS;
685 nfs_state = STATE_UMOUNT_REQ;
686 nfs_send();
687 }
688 break;
689 }
690 }
691
692
693 void nfs_start(void)
694 {
695 debug("%s\n", __func__);
696 nfs_download_state = NETLOOP_FAIL;
697
698 nfs_server_ip = net_server_ip;
699 nfs_path = (char *)nfs_path_buff;
700
701 if (nfs_path == NULL) {
702 net_set_state(NETLOOP_FAIL);
703 puts("*** ERROR: Fail allocate memory\n");
704 return;
705 }
706
707 if (net_boot_file_name[0] == '\0') {
708 sprintf(default_filename, "/nfsroot/%02X%02X%02X%02X.img",
709 net_ip.s_addr & 0xFF,
710 (net_ip.s_addr >> 8) & 0xFF,
711 (net_ip.s_addr >> 16) & 0xFF,
712 (net_ip.s_addr >> 24) & 0xFF);
713 strcpy(nfs_path, default_filename);
714
715 printf("*** Warning: no boot file name; using '%s'\n",
716 nfs_path);
717 } else {
718 char *p = net_boot_file_name;
719
720 p = strchr(p, ':');
721
722 if (p != NULL) {
723 nfs_server_ip = string_to_ip(net_boot_file_name);
724 ++p;
725 strcpy(nfs_path, p);
726 } else {
727 strcpy(nfs_path, net_boot_file_name);
728 }
729 }
730
731 nfs_filename = basename(nfs_path);
732 nfs_path = dirname(nfs_path);
733
734 printf("Using %s device\n", eth_get_name());
735
736 printf("File transfer via NFS from server %pI4; our IP address is %pI4",
737 &nfs_server_ip, &net_ip);
738
739 /* Check if we need to send across this subnet */
740 if (net_gateway.s_addr && net_netmask.s_addr) {
741 struct in_addr our_net;
742 struct in_addr server_net;
743
744 our_net.s_addr = net_ip.s_addr & net_netmask.s_addr;
745 server_net.s_addr = net_server_ip.s_addr & net_netmask.s_addr;
746 if (our_net.s_addr != server_net.s_addr)
747 printf("; sending through gateway %pI4",
748 &net_gateway);
749 }
750 printf("\nFilename '%s/%s'.", nfs_path, nfs_filename);
751
752 if (net_boot_file_expected_size_in_blocks) {
753 printf(" Size is 0x%x Bytes = ",
754 net_boot_file_expected_size_in_blocks << 9);
755 print_size(net_boot_file_expected_size_in_blocks << 9, "");
756 }
757 printf("\nLoad address: 0x%lx\n"
758 "Loading: *\b", load_addr);
759
760 net_set_timeout_handler(nfs_timeout, nfs_timeout_handler);
761 net_set_udp_handler(nfs_handler);
762
763 nfs_timeout_count = 0;
764 nfs_state = STATE_PRCLOOKUP_PROG_MOUNT_REQ;
765
766 /*nfs_our_port = 4096 + (get_ticks() % 3072);*/
767 /*FIX ME !!!*/
768 nfs_our_port = 1000;
769
770 /* zero out server ether in case the server ip has changed */
771 memset(net_server_ethaddr, 0, 6);
772
773 nfs_send();
774 }