]> git.ipfire.org Git - people/ms/u-boot.git/blame - net/nfs.c
Merge branch 'master' of git://git.denx.de/u-boot-sh
[people/ms/u-boot.git] / net / nfs.c
CommitLineData
cbd8a35c
WD
1/*
2 * NFS support driver - based on etherboot and U-BOOT's tftp.c
3 *
4 * Masami Komiya <mkomiya@sonare.it> 2004
5 *
6 */
7
8/* NOTE: the NFS code is heavily inspired by the NetBSD netboot code (read:
9 * large portions are copied verbatim) as distributed in OSKit 0.97. A few
10 * changes were necessary to adapt the code to Etherboot and to fix several
11 * inconsistencies. Also the RPC message preparation is done "by hand" to
12 * avoid adding netsprintf() which I find hard to understand and use. */
13
14/* NOTE 2: Etherboot does not care about things beyond the kernel image, so
15 * it loads the kernel image off the boot server (ARP_SERVER) and does not
16 * access the client root disk (root-path in dhcpd.conf), which would use
17 * ARP_ROOTSERVER. The root disk is something the operating system we are
18 * about to load needs to use. This is different from the OSKit 0.97 logic. */
19
20/* NOTE 3: Symlink handling introduced by Anselm M Hoffmeister, 2003-July-14
21 * If a symlink is encountered, it is followed as far as possible (recursion
22 * possible, maximum 16 steps). There is no clearing of ".."'s inside the
23 * path, so please DON'T DO THAT. thx. */
24
25#include <common.h>
26#include <command.h>
27#include <net.h>
28#include <malloc.h>
55d5fd9a 29#include <mapmem.h>
cbd8a35c
WD
30#include "nfs.h"
31#include "bootp.h"
32
cbd8a35c 33#define HASHES_PER_LINE 65 /* Number of "loading" hashes per line */
fe891ecf 34#define NFS_RETRY_COUNT 30
48a3e999
TK
35#ifndef CONFIG_NFS_TIMEOUT
36# define NFS_TIMEOUT 2000UL
37#else
38# define NFS_TIMEOUT CONFIG_NFS_TIMEOUT
39#endif
cbd8a35c 40
fa84fa70
MB
41#define NFS_RPC_ERR 1
42#define NFS_RPC_DROP 124
43
c9f6c91b
JH
44static int fs_mounted;
45static unsigned long rpc_id;
cbd8a35c
WD
46static int nfs_offset = -1;
47static int nfs_len;
fa84fa70 48static ulong nfs_timeout = NFS_TIMEOUT;
cbd8a35c
WD
49
50static char dirfh[NFS_FHSIZE]; /* file handle of directory */
51static char filefh[NFS_FHSIZE]; /* file handle of kernel image */
52
22f6e99d 53static enum net_loop_state nfs_download_state;
049a95a7 54static struct in_addr nfs_server_ip;
68c76a3a
JH
55static int nfs_server_mount_port;
56static int nfs_server_port;
57static int nfs_our_port;
58static int nfs_timeout_count;
59static int nfs_state;
cbd8a35c
WD
60#define STATE_PRCLOOKUP_PROG_MOUNT_REQ 1
61#define STATE_PRCLOOKUP_PROG_NFS_REQ 2
62#define STATE_MOUNT_REQ 3
63#define STATE_UMOUNT_REQ 4
64#define STATE_LOOKUP_REQ 5
65#define STATE_READ_REQ 6
66#define STATE_READLINK_REQ 7
67
68static char default_filename[64];
69static char *nfs_filename;
70static char *nfs_path;
71static char nfs_path_buff[2048];
72
68c76a3a 73static inline int store_block(uchar *src, unsigned offset, unsigned len)
cbd8a35c 74{
a084f7da 75 ulong newsize = offset + len;
6d0f6bcf 76#ifdef CONFIG_SYS_DIRECT_FLASH_NFS
cbd8a35c
WD
77 int i, rc = 0;
78
c9f6c91b 79 for (i = 0; i < CONFIG_SYS_MAX_FLASH_BANKS; i++) {
cbd8a35c
WD
80 /* start address in flash? */
81 if (load_addr + offset >= flash_info[i].start[0]) {
82 rc = 1;
83 break;
84 }
85 }
86
87 if (rc) { /* Flash is destination for this packet */
c9f6c91b 88 rc = flash_write((uchar *)src, (ulong)(load_addr+offset), len);
cbd8a35c 89 if (rc) {
c9f6c91b 90 flash_perror(rc);
23a7a32d 91 return -1;
cbd8a35c
WD
92 }
93 } else
6d0f6bcf 94#endif /* CONFIG_SYS_DIRECT_FLASH_NFS */
cbd8a35c 95 {
55d5fd9a
JH
96 void *ptr = map_sysmem(load_addr + offset, len);
97
98 memcpy(ptr, src, len);
99 unmap_sysmem(ptr);
cbd8a35c 100 }
a084f7da 101
1411157d
JH
102 if (net_boot_file_size < (offset + len))
103 net_boot_file_size = newsize;
23a7a32d 104 return 0;
cbd8a35c
WD
105}
106
68c76a3a 107static char *basename(char *path)
cbd8a35c
WD
108{
109 char *fname;
110
111 fname = path + strlen(path) - 1;
112 while (fname >= path) {
113 if (*fname == '/') {
114 fname++;
115 break;
116 }
117 fname--;
118 }
119 return fname;
120}
121
68c76a3a 122static char *dirname(char *path)
cbd8a35c
WD
123{
124 char *fname;
125
c9f6c91b 126 fname = basename(path);
cbd8a35c
WD
127 --fname;
128 *fname = '\0';
129 return path;
130}
131
cbd8a35c
WD
132/**************************************************************************
133RPC_ADD_CREDENTIALS - Add RPC authentication/verifier entries
134**************************************************************************/
e4ead4a2 135static uint32_t *rpc_add_credentials(uint32_t *p)
cbd8a35c
WD
136{
137 int hl;
138 int hostnamelen;
139 char hostname[256];
140
c9f6c91b
JH
141 strcpy(hostname, "");
142 hostnamelen = strlen(hostname);
cbd8a35c
WD
143
144 /* Here's the executive summary on authentication requirements of the
145 * various NFS server implementations: Linux accepts both AUTH_NONE
146 * and AUTH_UNIX authentication (also accepts an empty hostname field
147 * in the AUTH_UNIX scheme). *BSD refuses AUTH_NONE, but accepts
148 * AUTH_UNIX (also accepts an empty hostname field in the AUTH_UNIX
149 * scheme). To be safe, use AUTH_UNIX and pass the hostname if we have
150 * it (if the BOOTP/DHCP reply didn't give one, just use an empty
151 * hostname). */
152
153 hl = (hostnamelen + 3) & ~3;
154
155 /* Provide an AUTH_UNIX credential. */
156 *p++ = htonl(1); /* AUTH_UNIX */
157 *p++ = htonl(hl+20); /* auth length */
158 *p++ = htonl(0); /* stamp */
159 *p++ = htonl(hostnamelen); /* hostname string */
c9f6c91b 160 if (hostnamelen & 3)
cbd8a35c 161 *(p + hostnamelen / 4) = 0; /* add zero padding */
c9f6c91b 162 memcpy(p, hostname, hostnamelen);
cbd8a35c
WD
163 p += hl / 4;
164 *p++ = 0; /* uid */
165 *p++ = 0; /* gid */
166 *p++ = 0; /* auxiliary gid list */
167
168 /* Provide an AUTH_NONE verifier. */
169 *p++ = 0; /* AUTH_NONE */
170 *p++ = 0; /* auth length */
171
172 return p;
173}
174
175/**************************************************************************
176RPC_LOOKUP - Lookup RPC Port numbers
177**************************************************************************/
68c76a3a 178static void rpc_req(int rpc_prog, int rpc_proc, uint32_t *data, int datalen)
cbd8a35c
WD
179{
180 struct rpc_t pkt;
181 unsigned long id;
182 uint32_t *p;
183 int pktlen;
184 int sport;
185
c3f9d493 186 id = ++rpc_id;
cbd8a35c
WD
187 pkt.u.call.id = htonl(id);
188 pkt.u.call.type = htonl(MSG_CALL);
189 pkt.u.call.rpcvers = htonl(2); /* use RPC version 2 */
190 pkt.u.call.prog = htonl(rpc_prog);
191 pkt.u.call.vers = htonl(2); /* portmapper is version 2 */
192 pkt.u.call.proc = htonl(rpc_proc);
193 p = (uint32_t *)&(pkt.u.call.data);
194
195 if (datalen)
c9f6c91b 196 memcpy((char *)p, (char *)data, datalen*sizeof(uint32_t));
cbd8a35c
WD
197
198 pktlen = (char *)p + datalen*sizeof(uint32_t) - (char *)&pkt;
199
1203fcce
JH
200 memcpy((char *)net_tx_packet + net_eth_hdr_size() + IP_UDP_HDR_SIZE,
201 (char *)&pkt, pktlen);
cbd8a35c
WD
202
203 if (rpc_prog == PROG_PORTMAP)
204 sport = SUNRPC_PORT;
205 else if (rpc_prog == PROG_MOUNT)
68c76a3a 206 sport = nfs_server_mount_port;
cbd8a35c 207 else
68c76a3a 208 sport = nfs_server_port;
cbd8a35c 209
1203fcce 210 net_send_udp_packet(net_server_ethaddr, nfs_server_ip, sport,
68c76a3a 211 nfs_our_port, pktlen);
cbd8a35c
WD
212}
213
214/**************************************************************************
215RPC_LOOKUP - Lookup RPC Port numbers
216**************************************************************************/
68c76a3a 217static void rpc_lookup_req(int prog, int ver)
cbd8a35c
WD
218{
219 uint32_t data[16];
220
221 data[0] = 0; data[1] = 0; /* auth credential */
222 data[2] = 0; data[3] = 0; /* auth verifier */
223 data[4] = htonl(prog);
224 data[5] = htonl(ver);
225 data[6] = htonl(17); /* IP_UDP */
226 data[7] = 0;
227
c9f6c91b 228 rpc_req(PROG_PORTMAP, PORTMAP_GETPORT, data, 8);
cbd8a35c
WD
229}
230
231/**************************************************************************
232NFS_MOUNT - Mount an NFS Filesystem
233**************************************************************************/
68c76a3a 234static void nfs_mount_req(char *path)
cbd8a35c
WD
235{
236 uint32_t data[1024];
237 uint32_t *p;
238 int len;
239 int pathlen;
240
c9f6c91b 241 pathlen = strlen(path);
cbd8a35c
WD
242
243 p = &(data[0]);
e4ead4a2 244 p = rpc_add_credentials(p);
cbd8a35c
WD
245
246 *p++ = htonl(pathlen);
c9f6c91b
JH
247 if (pathlen & 3)
248 *(p + pathlen / 4) = 0;
249 memcpy(p, path, pathlen);
cbd8a35c
WD
250 p += (pathlen + 3) / 4;
251
252 len = (uint32_t *)p - (uint32_t *)&(data[0]);
253
c9f6c91b 254 rpc_req(PROG_MOUNT, MOUNT_ADDENTRY, data, len);
cbd8a35c
WD
255}
256
257/**************************************************************************
258NFS_UMOUNTALL - Unmount all our NFS Filesystems on the Server
259**************************************************************************/
68c76a3a 260static void nfs_umountall_req(void)
cbd8a35c
WD
261{
262 uint32_t data[1024];
263 uint32_t *p;
264 int len;
265
68c76a3a 266 if ((nfs_server_mount_port == -1) || (!fs_mounted))
cbd8a35c
WD
267 /* Nothing mounted, nothing to umount */
268 return;
cbd8a35c
WD
269
270 p = &(data[0]);
e4ead4a2 271 p = rpc_add_credentials(p);
cbd8a35c
WD
272
273 len = (uint32_t *)p - (uint32_t *)&(data[0]);
274
c9f6c91b 275 rpc_req(PROG_MOUNT, MOUNT_UMOUNTALL, data, len);
cbd8a35c
WD
276}
277
278/***************************************************************************
279 * NFS_READLINK (AH 2003-07-14)
280 * This procedure is called when read of the first block fails -
281 * this probably happens when it's a directory or a symlink
282 * In case of successful readlink(), the dirname is manipulated,
283 * so that inside the nfs() function a recursion can be done.
284 **************************************************************************/
68c76a3a 285static void nfs_readlink_req(void)
cbd8a35c
WD
286{
287 uint32_t data[1024];
288 uint32_t *p;
289 int len;
290
291 p = &(data[0]);
e4ead4a2 292 p = rpc_add_credentials(p);
cbd8a35c 293
c9f6c91b 294 memcpy(p, filefh, NFS_FHSIZE);
cbd8a35c
WD
295 p += (NFS_FHSIZE / 4);
296
297 len = (uint32_t *)p - (uint32_t *)&(data[0]);
298
c9f6c91b 299 rpc_req(PROG_NFS, NFS_READLINK, data, len);
cbd8a35c
WD
300}
301
302/**************************************************************************
303NFS_LOOKUP - Lookup Pathname
304**************************************************************************/
68c76a3a 305static void nfs_lookup_req(char *fname)
cbd8a35c
WD
306{
307 uint32_t data[1024];
308 uint32_t *p;
309 int len;
310 int fnamelen;
311
c9f6c91b 312 fnamelen = strlen(fname);
cbd8a35c
WD
313
314 p = &(data[0]);
e4ead4a2 315 p = rpc_add_credentials(p);
cbd8a35c 316
c9f6c91b 317 memcpy(p, dirfh, NFS_FHSIZE);
cbd8a35c
WD
318 p += (NFS_FHSIZE / 4);
319 *p++ = htonl(fnamelen);
c9f6c91b
JH
320 if (fnamelen & 3)
321 *(p + fnamelen / 4) = 0;
322 memcpy(p, fname, fnamelen);
cbd8a35c
WD
323 p += (fnamelen + 3) / 4;
324
325 len = (uint32_t *)p - (uint32_t *)&(data[0]);
326
c9f6c91b 327 rpc_req(PROG_NFS, NFS_LOOKUP, data, len);
cbd8a35c
WD
328}
329
330/**************************************************************************
331NFS_READ - Read File on NFS Server
332**************************************************************************/
68c76a3a 333static void nfs_read_req(int offset, int readlen)
cbd8a35c
WD
334{
335 uint32_t data[1024];
336 uint32_t *p;
337 int len;
338
339 p = &(data[0]);
e4ead4a2 340 p = rpc_add_credentials(p);
cbd8a35c 341
c9f6c91b 342 memcpy(p, filefh, NFS_FHSIZE);
cbd8a35c
WD
343 p += (NFS_FHSIZE / 4);
344 *p++ = htonl(offset);
345 *p++ = htonl(readlen);
346 *p++ = 0;
347
348 len = (uint32_t *)p - (uint32_t *)&(data[0]);
349
c9f6c91b 350 rpc_req(PROG_NFS, NFS_READ, data, len);
cbd8a35c
WD
351}
352
353/**************************************************************************
354RPC request dispatcher
355**************************************************************************/
68c76a3a 356static void nfs_send(void)
cbd8a35c 357{
0ebf04c6 358 debug("%s\n", __func__);
cbd8a35c 359
68c76a3a 360 switch (nfs_state) {
cbd8a35c 361 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
c9f6c91b 362 rpc_lookup_req(PROG_MOUNT, 1);
cbd8a35c
WD
363 break;
364 case STATE_PRCLOOKUP_PROG_NFS_REQ:
c9f6c91b 365 rpc_lookup_req(PROG_NFS, 2);
cbd8a35c
WD
366 break;
367 case STATE_MOUNT_REQ:
c9f6c91b 368 nfs_mount_req(nfs_path);
cbd8a35c
WD
369 break;
370 case STATE_UMOUNT_REQ:
c9f6c91b 371 nfs_umountall_req();
cbd8a35c
WD
372 break;
373 case STATE_LOOKUP_REQ:
c9f6c91b 374 nfs_lookup_req(nfs_filename);
cbd8a35c
WD
375 break;
376 case STATE_READ_REQ:
c9f6c91b 377 nfs_read_req(nfs_offset, nfs_len);
cbd8a35c
WD
378 break;
379 case STATE_READLINK_REQ:
c9f6c91b 380 nfs_readlink_req();
cbd8a35c
WD
381 break;
382 }
383}
384
385/**************************************************************************
386Handlers for the reply from server
387**************************************************************************/
388
68c76a3a 389static int rpc_lookup_reply(int prog, uchar *pkt, unsigned len)
cbd8a35c
WD
390{
391 struct rpc_t rpc_pkt;
392
c9f6c91b 393 memcpy((unsigned char *)&rpc_pkt, pkt, len);
cbd8a35c 394
0ebf04c6 395 debug("%s\n", __func__);
cbd8a35c 396
fa84fa70
MB
397 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
398 return -NFS_RPC_ERR;
399 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
400 return -NFS_RPC_DROP;
c3f9d493 401
cbd8a35c
WD
402 if (rpc_pkt.u.reply.rstatus ||
403 rpc_pkt.u.reply.verifier ||
c9f6c91b 404 rpc_pkt.u.reply.astatus)
c3f9d493 405 return -1;
cbd8a35c
WD
406
407 switch (prog) {
408 case PROG_MOUNT:
68c76a3a 409 nfs_server_mount_port = ntohl(rpc_pkt.u.reply.data[0]);
cbd8a35c
WD
410 break;
411 case PROG_NFS:
68c76a3a 412 nfs_server_port = ntohl(rpc_pkt.u.reply.data[0]);
cbd8a35c
WD
413 break;
414 }
415
416 return 0;
417}
418
68c76a3a 419static int nfs_mount_reply(uchar *pkt, unsigned len)
cbd8a35c
WD
420{
421 struct rpc_t rpc_pkt;
422
0ebf04c6 423 debug("%s\n", __func__);
cbd8a35c 424
c9f6c91b 425 memcpy((unsigned char *)&rpc_pkt, pkt, len);
cbd8a35c 426
fa84fa70
MB
427 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
428 return -NFS_RPC_ERR;
429 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
430 return -NFS_RPC_DROP;
c3f9d493 431
cbd8a35c
WD
432 if (rpc_pkt.u.reply.rstatus ||
433 rpc_pkt.u.reply.verifier ||
434 rpc_pkt.u.reply.astatus ||
c9f6c91b 435 rpc_pkt.u.reply.data[0])
cbd8a35c 436 return -1;
cbd8a35c
WD
437
438 fs_mounted = 1;
c9f6c91b 439 memcpy(dirfh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
cbd8a35c
WD
440
441 return 0;
442}
443
68c76a3a 444static int nfs_umountall_reply(uchar *pkt, unsigned len)
cbd8a35c
WD
445{
446 struct rpc_t rpc_pkt;
447
0ebf04c6 448 debug("%s\n", __func__);
cbd8a35c 449
c9f6c91b 450 memcpy((unsigned char *)&rpc_pkt, pkt, len);
cbd8a35c 451
fa84fa70
MB
452 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
453 return -NFS_RPC_ERR;
454 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
455 return -NFS_RPC_DROP;
c3f9d493 456
cbd8a35c
WD
457 if (rpc_pkt.u.reply.rstatus ||
458 rpc_pkt.u.reply.verifier ||
c9f6c91b 459 rpc_pkt.u.reply.astatus)
cbd8a35c 460 return -1;
cbd8a35c
WD
461
462 fs_mounted = 0;
c9f6c91b 463 memset(dirfh, 0, sizeof(dirfh));
cbd8a35c
WD
464
465 return 0;
466}
467
68c76a3a 468static int nfs_lookup_reply(uchar *pkt, unsigned len)
cbd8a35c
WD
469{
470 struct rpc_t rpc_pkt;
471
0ebf04c6 472 debug("%s\n", __func__);
cbd8a35c 473
c9f6c91b 474 memcpy((unsigned char *)&rpc_pkt, pkt, len);
cbd8a35c 475
fa84fa70
MB
476 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
477 return -NFS_RPC_ERR;
478 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
479 return -NFS_RPC_DROP;
c3f9d493 480
cbd8a35c
WD
481 if (rpc_pkt.u.reply.rstatus ||
482 rpc_pkt.u.reply.verifier ||
483 rpc_pkt.u.reply.astatus ||
69fd0d41
GG
484 rpc_pkt.u.reply.data[0]) {
485 switch (ntohl(rpc_pkt.u.reply.astatus)) {
486 case 0: /* Not an error */
487 break;
488 case 2: /* Remote can't support NFS version */
489 printf("*** ERROR: NFS version not supported: Requested: V%d, accepted: min V%d - max V%d\n",
490 2,
491 ntohl(rpc_pkt.u.reply.data[0]),
492 ntohl(rpc_pkt.u.reply.data[1]));
493 break;
494 default: /* Unknown error on 'accept state' flag */
495 printf("*** ERROR: accept state error (%d)\n",
496 ntohl(rpc_pkt.u.reply.astatus));
497 break;
498 }
cbd8a35c 499 return -1;
69fd0d41 500 }
cbd8a35c 501
c9f6c91b 502 memcpy(filefh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
cbd8a35c
WD
503
504 return 0;
505}
506
68c76a3a 507static int nfs_readlink_reply(uchar *pkt, unsigned len)
cbd8a35c
WD
508{
509 struct rpc_t rpc_pkt;
510 int rlen;
511
0ebf04c6 512 debug("%s\n", __func__);
cbd8a35c 513
c9f6c91b 514 memcpy((unsigned char *)&rpc_pkt, pkt, len);
cbd8a35c 515
fa84fa70
MB
516 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
517 return -NFS_RPC_ERR;
518 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
519 return -NFS_RPC_DROP;
c3f9d493 520
cbd8a35c
WD
521 if (rpc_pkt.u.reply.rstatus ||
522 rpc_pkt.u.reply.verifier ||
523 rpc_pkt.u.reply.astatus ||
c9f6c91b 524 rpc_pkt.u.reply.data[0])
cbd8a35c 525 return -1;
cbd8a35c 526
c9f6c91b 527 rlen = ntohl(rpc_pkt.u.reply.data[1]); /* new path length */
cbd8a35c
WD
528
529 if (*((char *)&(rpc_pkt.u.reply.data[2])) != '/') {
530 int pathlen;
c9f6c91b 531 strcat(nfs_path, "/");
cbd8a35c 532 pathlen = strlen(nfs_path);
c9f6c91b 533 memcpy(nfs_path + pathlen, (uchar *)&(rpc_pkt.u.reply.data[2]),
68c76a3a 534 rlen);
f64ef9bb 535 nfs_path[pathlen + rlen] = 0;
cbd8a35c 536 } else {
c9f6c91b 537 memcpy(nfs_path, (uchar *)&(rpc_pkt.u.reply.data[2]), rlen);
cbd8a35c
WD
538 nfs_path[rlen] = 0;
539 }
540 return 0;
541}
542
68c76a3a 543static int nfs_read_reply(uchar *pkt, unsigned len)
cbd8a35c
WD
544{
545 struct rpc_t rpc_pkt;
546 int rlen;
547
0ebf04c6 548 debug("%s\n", __func__);
cbd8a35c 549
c9f6c91b 550 memcpy((uchar *)&rpc_pkt, pkt, sizeof(rpc_pkt.u.reply));
cbd8a35c 551
fa84fa70
MB
552 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
553 return -NFS_RPC_ERR;
554 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
555 return -NFS_RPC_DROP;
c3f9d493 556
cbd8a35c
WD
557 if (rpc_pkt.u.reply.rstatus ||
558 rpc_pkt.u.reply.verifier ||
559 rpc_pkt.u.reply.astatus ||
560 rpc_pkt.u.reply.data[0]) {
c9f6c91b 561 if (rpc_pkt.u.reply.rstatus)
cbd8a35c 562 return -9999;
c9f6c91b 563 if (rpc_pkt.u.reply.astatus)
cbd8a35c 564 return -9999;
c9f6c91b 565 return -ntohl(rpc_pkt.u.reply.data[0]);
cbd8a35c
WD
566 }
567
c9f6c91b
JH
568 if ((nfs_offset != 0) && !((nfs_offset) %
569 (NFS_READ_SIZE / 2 * 10 * HASHES_PER_LINE)))
570 puts("\n\t ");
571 if (!(nfs_offset % ((NFS_READ_SIZE / 2) * 10)))
572 putc('#');
cbd8a35c
WD
573
574 rlen = ntohl(rpc_pkt.u.reply.data[18]);
c9f6c91b
JH
575 if (store_block((uchar *)pkt + sizeof(rpc_pkt.u.reply),
576 nfs_offset, rlen))
23a7a32d 577 return -9999;
cbd8a35c
WD
578
579 return rlen;
580}
581
582/**************************************************************************
583Interfaces of U-BOOT
584**************************************************************************/
68c76a3a 585static void nfs_timeout_handler(void)
a5725fab 586{
68c76a3a 587 if (++nfs_timeout_count > NFS_RETRY_COUNT) {
c9f6c91b 588 puts("\nRetry count exceeded; starting again\n");
bc0571fc 589 net_start_again();
aabb8cb0
ES
590 } else {
591 puts("T ");
bc0571fc
JH
592 net_set_timeout_handler(nfs_timeout +
593 NFS_TIMEOUT * nfs_timeout_count,
594 nfs_timeout_handler);
68c76a3a 595 nfs_send();
fe891ecf 596 }
a5725fab
WD
597}
598
049a95a7
JH
599static void nfs_handler(uchar *pkt, unsigned dest, struct in_addr sip,
600 unsigned src, unsigned len)
cbd8a35c
WD
601{
602 int rlen;
fa84fa70 603 int reply;
cbd8a35c 604
0ebf04c6 605 debug("%s\n", __func__);
cbd8a35c 606
68c76a3a 607 if (dest != nfs_our_port)
c9f6c91b 608 return;
cbd8a35c 609
68c76a3a 610 switch (nfs_state) {
cbd8a35c 611 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
fa84fa70
MB
612 if (rpc_lookup_reply(PROG_MOUNT, pkt, len) == -NFS_RPC_DROP)
613 break;
68c76a3a
JH
614 nfs_state = STATE_PRCLOOKUP_PROG_NFS_REQ;
615 nfs_send();
cbd8a35c
WD
616 break;
617
618 case STATE_PRCLOOKUP_PROG_NFS_REQ:
fa84fa70
MB
619 if (rpc_lookup_reply(PROG_NFS, pkt, len) == -NFS_RPC_DROP)
620 break;
68c76a3a
JH
621 nfs_state = STATE_MOUNT_REQ;
622 nfs_send();
cbd8a35c
WD
623 break;
624
625 case STATE_MOUNT_REQ:
fa84fa70 626 reply = nfs_mount_reply(pkt, len);
68c76a3a 627 if (reply == -NFS_RPC_DROP) {
fa84fa70 628 break;
68c76a3a 629 } else if (reply == -NFS_RPC_ERR) {
c9f6c91b 630 puts("*** ERROR: Cannot mount\n");
cbd8a35c 631 /* just to be sure... */
68c76a3a
JH
632 nfs_state = STATE_UMOUNT_REQ;
633 nfs_send();
cbd8a35c 634 } else {
68c76a3a
JH
635 nfs_state = STATE_LOOKUP_REQ;
636 nfs_send();
cbd8a35c
WD
637 }
638 break;
639
640 case STATE_UMOUNT_REQ:
fa84fa70 641 reply = nfs_umountall_reply(pkt, len);
68c76a3a 642 if (reply == -NFS_RPC_DROP) {
fa84fa70 643 break;
68c76a3a 644 } else if (reply == -NFS_RPC_ERR) {
c9f6c91b 645 puts("*** ERROR: Cannot umount\n");
22f6e99d 646 net_set_state(NETLOOP_FAIL);
cbd8a35c 647 } else {
c9f6c91b 648 puts("\ndone\n");
22f6e99d 649 net_set_state(nfs_download_state);
cbd8a35c
WD
650 }
651 break;
652
653 case STATE_LOOKUP_REQ:
fa84fa70 654 reply = nfs_lookup_reply(pkt, len);
68c76a3a 655 if (reply == -NFS_RPC_DROP) {
fa84fa70 656 break;
68c76a3a 657 } else if (reply == -NFS_RPC_ERR) {
c9f6c91b 658 puts("*** ERROR: File lookup fail\n");
68c76a3a
JH
659 nfs_state = STATE_UMOUNT_REQ;
660 nfs_send();
cbd8a35c 661 } else {
68c76a3a 662 nfs_state = STATE_READ_REQ;
cbd8a35c
WD
663 nfs_offset = 0;
664 nfs_len = NFS_READ_SIZE;
68c76a3a 665 nfs_send();
cbd8a35c
WD
666 }
667 break;
668
669 case STATE_READLINK_REQ:
fa84fa70 670 reply = nfs_readlink_reply(pkt, len);
68c76a3a 671 if (reply == -NFS_RPC_DROP) {
fa84fa70 672 break;
68c76a3a 673 } else if (reply == -NFS_RPC_ERR) {
c9f6c91b 674 puts("*** ERROR: Symlink fail\n");
68c76a3a
JH
675 nfs_state = STATE_UMOUNT_REQ;
676 nfs_send();
cbd8a35c 677 } else {
0ebf04c6 678 debug("Symlink --> %s\n", nfs_path);
c9f6c91b
JH
679 nfs_filename = basename(nfs_path);
680 nfs_path = dirname(nfs_path);
cbd8a35c 681
68c76a3a
JH
682 nfs_state = STATE_MOUNT_REQ;
683 nfs_send();
cbd8a35c
WD
684 }
685 break;
686
687 case STATE_READ_REQ:
c9f6c91b 688 rlen = nfs_read_reply(pkt, len);
bc0571fc 689 net_set_timeout_handler(nfs_timeout, nfs_timeout_handler);
cbd8a35c
WD
690 if (rlen > 0) {
691 nfs_offset += rlen;
68c76a3a 692 nfs_send();
c9f6c91b 693 } else if ((rlen == -NFSERR_ISDIR) || (rlen == -NFSERR_INVAL)) {
cbd8a35c 694 /* symbolic link */
68c76a3a
JH
695 nfs_state = STATE_READLINK_REQ;
696 nfs_send();
cbd8a35c 697 } else {
c9f6c91b 698 if (!rlen)
22f6e99d 699 nfs_download_state = NETLOOP_SUCCESS;
68c76a3a
JH
700 nfs_state = STATE_UMOUNT_REQ;
701 nfs_send();
cbd8a35c
WD
702 }
703 break;
704 }
705}
706
cbd8a35c 707
68c76a3a 708void nfs_start(void)
cbd8a35c 709{
0ebf04c6 710 debug("%s\n", __func__);
22f6e99d 711 nfs_download_state = NETLOOP_FAIL;
cbd8a35c 712
049a95a7 713 nfs_server_ip = net_server_ip;
cbd8a35c
WD
714 nfs_path = (char *)nfs_path_buff;
715
716 if (nfs_path == NULL) {
22f6e99d 717 net_set_state(NETLOOP_FAIL);
c9f6c91b 718 puts("*** ERROR: Fail allocate memory\n");
cbd8a35c
WD
719 return;
720 }
721
1411157d 722 if (net_boot_file_name[0] == '\0') {
ea45cb0a 723 sprintf(default_filename, "/nfsroot/%02X%02X%02X%02X.img",
049a95a7
JH
724 net_ip.s_addr & 0xFF,
725 (net_ip.s_addr >> 8) & 0xFF,
726 (net_ip.s_addr >> 16) & 0xFF,
727 (net_ip.s_addr >> 24) & 0xFF);
c9f6c91b 728 strcpy(nfs_path, default_filename);
cbd8a35c 729
c9f6c91b 730 printf("*** Warning: no boot file name; using '%s'\n",
68c76a3a 731 nfs_path);
cbd8a35c 732 } else {
1411157d 733 char *p = net_boot_file_name;
cbd8a35c 734
c9f6c91b 735 p = strchr(p, ':');
cbd8a35c
WD
736
737 if (p != NULL) {
1411157d 738 nfs_server_ip = string_to_ip(net_boot_file_name);
cbd8a35c 739 ++p;
c9f6c91b 740 strcpy(nfs_path, p);
cbd8a35c 741 } else {
1411157d 742 strcpy(nfs_path, net_boot_file_name);
cbd8a35c
WD
743 }
744 }
745
c9f6c91b
JH
746 nfs_filename = basename(nfs_path);
747 nfs_path = dirname(nfs_path);
cbd8a35c 748
c9f6c91b 749 printf("Using %s device\n", eth_get_name());
cbd8a35c 750
049a95a7
JH
751 printf("File transfer via NFS from server %pI4; our IP address is %pI4",
752 &nfs_server_ip, &net_ip);
cbd8a35c
WD
753
754 /* Check if we need to send across this subnet */
049a95a7
JH
755 if (net_gateway.s_addr && net_netmask.s_addr) {
756 struct in_addr our_net;
757 struct in_addr server_net;
cbd8a35c 758
049a95a7
JH
759 our_net.s_addr = net_ip.s_addr & net_netmask.s_addr;
760 server_net.s_addr = net_server_ip.s_addr & net_netmask.s_addr;
761 if (our_net.s_addr != server_net.s_addr)
c9f6c91b 762 printf("; sending through gateway %pI4",
68c76a3a 763 &net_gateway);
cbd8a35c 764 }
c9f6c91b 765 printf("\nFilename '%s/%s'.", nfs_path, nfs_filename);
cbd8a35c 766
1411157d
JH
767 if (net_boot_file_expected_size_in_blocks) {
768 printf(" Size is 0x%x Bytes = ",
769 net_boot_file_expected_size_in_blocks << 9);
770 print_size(net_boot_file_expected_size_in_blocks << 9, "");
cbd8a35c 771 }
c9f6c91b 772 printf("\nLoad address: 0x%lx\n"
4b9206ed 773 "Loading: *\b", load_addr);
cbd8a35c 774
bc0571fc 775 net_set_timeout_handler(nfs_timeout, nfs_timeout_handler);
049a95a7 776 net_set_udp_handler(nfs_handler);
cbd8a35c 777
68c76a3a
JH
778 nfs_timeout_count = 0;
779 nfs_state = STATE_PRCLOOKUP_PROG_MOUNT_REQ;
cbd8a35c 780
68c76a3a 781 /*nfs_our_port = 4096 + (get_ticks() % 3072);*/
cbd8a35c 782 /*FIX ME !!!*/
68c76a3a 783 nfs_our_port = 1000;
cbd8a35c
WD
784
785 /* zero out server ether in case the server ip has changed */
0adb5b76 786 memset(net_server_ethaddr, 0, 6);
cbd8a35c 787
68c76a3a 788 nfs_send();
cbd8a35c 789}