]> git.ipfire.org Git - people/ms/u-boot.git/blob - net/nfs.c
Merge branch 'master' of git://git.denx.de/u-boot-mpc83xx
[people/ms/u-boot.git] / net / nfs.c
1 /*
2 * NFS support driver - based on etherboot and U-BOOT's tftp.c
3 *
4 * Masami Komiya <mkomiya@sonare.it> 2004
5 *
6 */
7
8 /* NOTE: the NFS code is heavily inspired by the NetBSD netboot code (read:
9 * large portions are copied verbatim) as distributed in OSKit 0.97. A few
10 * changes were necessary to adapt the code to Etherboot and to fix several
11 * inconsistencies. Also the RPC message preparation is done "by hand" to
12 * avoid adding netsprintf() which I find hard to understand and use. */
13
14 /* NOTE 2: Etherboot does not care about things beyond the kernel image, so
15 * it loads the kernel image off the boot server (ARP_SERVER) and does not
16 * access the client root disk (root-path in dhcpd.conf), which would use
17 * ARP_ROOTSERVER. The root disk is something the operating system we are
18 * about to load needs to use. This is different from the OSKit 0.97 logic. */
19
20 /* NOTE 3: Symlink handling introduced by Anselm M Hoffmeister, 2003-July-14
21 * If a symlink is encountered, it is followed as far as possible (recursion
22 * possible, maximum 16 steps). There is no clearing of ".."'s inside the
23 * path, so please DON'T DO THAT. thx. */
24
25 #include <common.h>
26 #include <command.h>
27 #include <net.h>
28 #include <malloc.h>
29 #include "nfs.h"
30 #include "bootp.h"
31
32 #define HASHES_PER_LINE 65 /* Number of "loading" hashes per line */
33 #define NFS_RETRY_COUNT 30
34 #define NFS_TIMEOUT 2000UL
35
36 static int fs_mounted = 0;
37 static unsigned long rpc_id = 0;
38 static int nfs_offset = -1;
39 static int nfs_len;
40
41 static char dirfh[NFS_FHSIZE]; /* file handle of directory */
42 static char filefh[NFS_FHSIZE]; /* file handle of kernel image */
43
44 static int NfsDownloadState;
45 static IPaddr_t NfsServerIP;
46 static int NfsSrvMountPort;
47 static int NfsSrvNfsPort;
48 static int NfsOurPort;
49 static int NfsTimeoutCount;
50 static int NfsState;
51 #define STATE_PRCLOOKUP_PROG_MOUNT_REQ 1
52 #define STATE_PRCLOOKUP_PROG_NFS_REQ 2
53 #define STATE_MOUNT_REQ 3
54 #define STATE_UMOUNT_REQ 4
55 #define STATE_LOOKUP_REQ 5
56 #define STATE_READ_REQ 6
57 #define STATE_READLINK_REQ 7
58
59 static char default_filename[64];
60 static char *nfs_filename;
61 static char *nfs_path;
62 static char nfs_path_buff[2048];
63
64 static __inline__ int
65 store_block (uchar * src, unsigned offset, unsigned len)
66 {
67 ulong newsize = offset + len;
68 #ifdef CONFIG_SYS_DIRECT_FLASH_NFS
69 int i, rc = 0;
70
71 for (i=0; i<CONFIG_SYS_MAX_FLASH_BANKS; i++) {
72 /* start address in flash? */
73 if (load_addr + offset >= flash_info[i].start[0]) {
74 rc = 1;
75 break;
76 }
77 }
78
79 if (rc) { /* Flash is destination for this packet */
80 rc = flash_write ((uchar *)src, (ulong)(load_addr+offset), len);
81 if (rc) {
82 flash_perror (rc);
83 return -1;
84 }
85 } else
86 #endif /* CONFIG_SYS_DIRECT_FLASH_NFS */
87 {
88 (void)memcpy ((void *)(load_addr + offset), src, len);
89 }
90
91 if (NetBootFileXferSize < (offset+len))
92 NetBootFileXferSize = newsize;
93 return 0;
94 }
95
96 static char*
97 basename (char *path)
98 {
99 char *fname;
100
101 fname = path + strlen(path) - 1;
102 while (fname >= path) {
103 if (*fname == '/') {
104 fname++;
105 break;
106 }
107 fname--;
108 }
109 return fname;
110 }
111
112 static char*
113 dirname (char *path)
114 {
115 char *fname;
116
117 fname = basename (path);
118 --fname;
119 *fname = '\0';
120 return path;
121 }
122
123 /**************************************************************************
124 RPC_ADD_CREDENTIALS - Add RPC authentication/verifier entries
125 **************************************************************************/
126 static long *rpc_add_credentials (long *p)
127 {
128 int hl;
129 int hostnamelen;
130 char hostname[256];
131
132 strcpy (hostname, "");
133 hostnamelen=strlen (hostname);
134
135 /* Here's the executive summary on authentication requirements of the
136 * various NFS server implementations: Linux accepts both AUTH_NONE
137 * and AUTH_UNIX authentication (also accepts an empty hostname field
138 * in the AUTH_UNIX scheme). *BSD refuses AUTH_NONE, but accepts
139 * AUTH_UNIX (also accepts an empty hostname field in the AUTH_UNIX
140 * scheme). To be safe, use AUTH_UNIX and pass the hostname if we have
141 * it (if the BOOTP/DHCP reply didn't give one, just use an empty
142 * hostname). */
143
144 hl = (hostnamelen + 3) & ~3;
145
146 /* Provide an AUTH_UNIX credential. */
147 *p++ = htonl(1); /* AUTH_UNIX */
148 *p++ = htonl(hl+20); /* auth length */
149 *p++ = htonl(0); /* stamp */
150 *p++ = htonl(hostnamelen); /* hostname string */
151 if (hostnamelen & 3) {
152 *(p + hostnamelen / 4) = 0; /* add zero padding */
153 }
154 memcpy (p, hostname, hostnamelen);
155 p += hl / 4;
156 *p++ = 0; /* uid */
157 *p++ = 0; /* gid */
158 *p++ = 0; /* auxiliary gid list */
159
160 /* Provide an AUTH_NONE verifier. */
161 *p++ = 0; /* AUTH_NONE */
162 *p++ = 0; /* auth length */
163
164 return p;
165 }
166
167 /**************************************************************************
168 RPC_LOOKUP - Lookup RPC Port numbers
169 **************************************************************************/
170 static void
171 rpc_req (int rpc_prog, int rpc_proc, uint32_t *data, int datalen)
172 {
173 struct rpc_t pkt;
174 unsigned long id;
175 uint32_t *p;
176 int pktlen;
177 int sport;
178
179 id = ++rpc_id;
180 pkt.u.call.id = htonl(id);
181 pkt.u.call.type = htonl(MSG_CALL);
182 pkt.u.call.rpcvers = htonl(2); /* use RPC version 2 */
183 pkt.u.call.prog = htonl(rpc_prog);
184 pkt.u.call.vers = htonl(2); /* portmapper is version 2 */
185 pkt.u.call.proc = htonl(rpc_proc);
186 p = (uint32_t *)&(pkt.u.call.data);
187
188 if (datalen)
189 memcpy ((char *)p, (char *)data, datalen*sizeof(uint32_t));
190
191 pktlen = (char *)p + datalen*sizeof(uint32_t) - (char *)&pkt;
192
193 memcpy ((char *)NetTxPacket + NetEthHdrSize() + IP_HDR_SIZE, (char *)&pkt, pktlen);
194
195 if (rpc_prog == PROG_PORTMAP)
196 sport = SUNRPC_PORT;
197 else if (rpc_prog == PROG_MOUNT)
198 sport = NfsSrvMountPort;
199 else
200 sport = NfsSrvNfsPort;
201
202 NetSendUDPPacket (NetServerEther, NfsServerIP, sport, NfsOurPort, pktlen);
203 }
204
205 /**************************************************************************
206 RPC_LOOKUP - Lookup RPC Port numbers
207 **************************************************************************/
208 static void
209 rpc_lookup_req (int prog, int ver)
210 {
211 uint32_t data[16];
212
213 data[0] = 0; data[1] = 0; /* auth credential */
214 data[2] = 0; data[3] = 0; /* auth verifier */
215 data[4] = htonl(prog);
216 data[5] = htonl(ver);
217 data[6] = htonl(17); /* IP_UDP */
218 data[7] = 0;
219
220 rpc_req (PROG_PORTMAP, PORTMAP_GETPORT, data, 8);
221 }
222
223 /**************************************************************************
224 NFS_MOUNT - Mount an NFS Filesystem
225 **************************************************************************/
226 static void
227 nfs_mount_req (char *path)
228 {
229 uint32_t data[1024];
230 uint32_t *p;
231 int len;
232 int pathlen;
233
234 pathlen = strlen (path);
235
236 p = &(data[0]);
237 p = (uint32_t *)rpc_add_credentials((long *)p);
238
239 *p++ = htonl(pathlen);
240 if (pathlen & 3) *(p + pathlen / 4) = 0;
241 memcpy (p, path, pathlen);
242 p += (pathlen + 3) / 4;
243
244 len = (uint32_t *)p - (uint32_t *)&(data[0]);
245
246 rpc_req (PROG_MOUNT, MOUNT_ADDENTRY, data, len);
247 }
248
249 /**************************************************************************
250 NFS_UMOUNTALL - Unmount all our NFS Filesystems on the Server
251 **************************************************************************/
252 static void
253 nfs_umountall_req (void)
254 {
255 uint32_t data[1024];
256 uint32_t *p;
257 int len;
258
259 if ((NfsSrvMountPort == -1) || (!fs_mounted)) {
260 /* Nothing mounted, nothing to umount */
261 return;
262 }
263
264 p = &(data[0]);
265 p = (uint32_t *)rpc_add_credentials ((long *)p);
266
267 len = (uint32_t *)p - (uint32_t *)&(data[0]);
268
269 rpc_req (PROG_MOUNT, MOUNT_UMOUNTALL, data, len);
270 }
271
272 /***************************************************************************
273 * NFS_READLINK (AH 2003-07-14)
274 * This procedure is called when read of the first block fails -
275 * this probably happens when it's a directory or a symlink
276 * In case of successful readlink(), the dirname is manipulated,
277 * so that inside the nfs() function a recursion can be done.
278 **************************************************************************/
279 static void
280 nfs_readlink_req (void)
281 {
282 uint32_t data[1024];
283 uint32_t *p;
284 int len;
285
286 p = &(data[0]);
287 p = (uint32_t *)rpc_add_credentials ((long *)p);
288
289 memcpy (p, filefh, NFS_FHSIZE);
290 p += (NFS_FHSIZE / 4);
291
292 len = (uint32_t *)p - (uint32_t *)&(data[0]);
293
294 rpc_req (PROG_NFS, NFS_READLINK, data, len);
295 }
296
297 /**************************************************************************
298 NFS_LOOKUP - Lookup Pathname
299 **************************************************************************/
300 static void
301 nfs_lookup_req (char *fname)
302 {
303 uint32_t data[1024];
304 uint32_t *p;
305 int len;
306 int fnamelen;
307
308 fnamelen = strlen (fname);
309
310 p = &(data[0]);
311 p = (uint32_t *)rpc_add_credentials ((long *)p);
312
313 memcpy (p, dirfh, NFS_FHSIZE);
314 p += (NFS_FHSIZE / 4);
315 *p++ = htonl(fnamelen);
316 if (fnamelen & 3) *(p + fnamelen / 4) = 0;
317 memcpy (p, fname, fnamelen);
318 p += (fnamelen + 3) / 4;
319
320 len = (uint32_t *)p - (uint32_t *)&(data[0]);
321
322 rpc_req (PROG_NFS, NFS_LOOKUP, data, len);
323 }
324
325 /**************************************************************************
326 NFS_READ - Read File on NFS Server
327 **************************************************************************/
328 static void
329 nfs_read_req (int offset, int readlen)
330 {
331 uint32_t data[1024];
332 uint32_t *p;
333 int len;
334
335 p = &(data[0]);
336 p = (uint32_t *)rpc_add_credentials ((long *)p);
337
338 memcpy (p, filefh, NFS_FHSIZE);
339 p += (NFS_FHSIZE / 4);
340 *p++ = htonl(offset);
341 *p++ = htonl(readlen);
342 *p++ = 0;
343
344 len = (uint32_t *)p - (uint32_t *)&(data[0]);
345
346 rpc_req (PROG_NFS, NFS_READ, data, len);
347 }
348
349 /**************************************************************************
350 RPC request dispatcher
351 **************************************************************************/
352
353 static void
354 NfsSend (void)
355 {
356 debug("%s\n", __func__);
357
358 switch (NfsState) {
359 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
360 rpc_lookup_req (PROG_MOUNT, 1);
361 break;
362 case STATE_PRCLOOKUP_PROG_NFS_REQ:
363 rpc_lookup_req (PROG_NFS, 2);
364 break;
365 case STATE_MOUNT_REQ:
366 nfs_mount_req (nfs_path);
367 break;
368 case STATE_UMOUNT_REQ:
369 nfs_umountall_req ();
370 break;
371 case STATE_LOOKUP_REQ:
372 nfs_lookup_req (nfs_filename);
373 break;
374 case STATE_READ_REQ:
375 nfs_read_req (nfs_offset, nfs_len);
376 break;
377 case STATE_READLINK_REQ:
378 nfs_readlink_req ();
379 break;
380 }
381 }
382
383 /**************************************************************************
384 Handlers for the reply from server
385 **************************************************************************/
386
387 static int
388 rpc_lookup_reply (int prog, uchar *pkt, unsigned len)
389 {
390 struct rpc_t rpc_pkt;
391
392 memcpy ((unsigned char *)&rpc_pkt, pkt, len);
393
394 debug("%s\n", __func__);
395
396 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
397 return -1;
398
399 if (rpc_pkt.u.reply.rstatus ||
400 rpc_pkt.u.reply.verifier ||
401 rpc_pkt.u.reply.astatus) {
402 return -1;
403 }
404
405 switch (prog) {
406 case PROG_MOUNT:
407 NfsSrvMountPort = ntohl(rpc_pkt.u.reply.data[0]);
408 break;
409 case PROG_NFS:
410 NfsSrvNfsPort = ntohl(rpc_pkt.u.reply.data[0]);
411 break;
412 }
413
414 return 0;
415 }
416
417 static int
418 nfs_mount_reply (uchar *pkt, unsigned len)
419 {
420 struct rpc_t rpc_pkt;
421
422 debug("%s\n", __func__);
423
424 memcpy ((unsigned char *)&rpc_pkt, pkt, len);
425
426 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
427 return -1;
428
429 if (rpc_pkt.u.reply.rstatus ||
430 rpc_pkt.u.reply.verifier ||
431 rpc_pkt.u.reply.astatus ||
432 rpc_pkt.u.reply.data[0]) {
433 return -1;
434 }
435
436 fs_mounted = 1;
437 memcpy (dirfh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
438
439 return 0;
440 }
441
442 static int
443 nfs_umountall_reply (uchar *pkt, unsigned len)
444 {
445 struct rpc_t rpc_pkt;
446
447 debug("%s\n", __func__);
448
449 memcpy ((unsigned char *)&rpc_pkt, pkt, len);
450
451 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
452 return -1;
453
454 if (rpc_pkt.u.reply.rstatus ||
455 rpc_pkt.u.reply.verifier ||
456 rpc_pkt.u.reply.astatus) {
457 return -1;
458 }
459
460 fs_mounted = 0;
461 memset (dirfh, 0, sizeof(dirfh));
462
463 return 0;
464 }
465
466 static int
467 nfs_lookup_reply (uchar *pkt, unsigned len)
468 {
469 struct rpc_t rpc_pkt;
470
471 debug("%s\n", __func__);
472
473 memcpy ((unsigned char *)&rpc_pkt, pkt, len);
474
475 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
476 return -1;
477
478 if (rpc_pkt.u.reply.rstatus ||
479 rpc_pkt.u.reply.verifier ||
480 rpc_pkt.u.reply.astatus ||
481 rpc_pkt.u.reply.data[0]) {
482 return -1;
483 }
484
485 memcpy (filefh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
486
487 return 0;
488 }
489
490 static int
491 nfs_readlink_reply (uchar *pkt, unsigned len)
492 {
493 struct rpc_t rpc_pkt;
494 int rlen;
495
496 debug("%s\n", __func__);
497
498 memcpy ((unsigned char *)&rpc_pkt, pkt, len);
499
500 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
501 return -1;
502
503 if (rpc_pkt.u.reply.rstatus ||
504 rpc_pkt.u.reply.verifier ||
505 rpc_pkt.u.reply.astatus ||
506 rpc_pkt.u.reply.data[0]) {
507 return -1;
508 }
509
510 rlen = ntohl (rpc_pkt.u.reply.data[1]); /* new path length */
511
512 if (*((char *)&(rpc_pkt.u.reply.data[2])) != '/') {
513 int pathlen;
514 strcat (nfs_path, "/");
515 pathlen = strlen(nfs_path);
516 memcpy (nfs_path+pathlen, (uchar *)&(rpc_pkt.u.reply.data[2]), rlen);
517 nfs_path[pathlen + rlen] = 0;
518 } else {
519 memcpy (nfs_path, (uchar *)&(rpc_pkt.u.reply.data[2]), rlen);
520 nfs_path[rlen] = 0;
521 }
522 return 0;
523 }
524
525 static int
526 nfs_read_reply (uchar *pkt, unsigned len)
527 {
528 struct rpc_t rpc_pkt;
529 int rlen;
530
531 debug("%s\n", __func__);
532
533 memcpy ((uchar *)&rpc_pkt, pkt, sizeof(rpc_pkt.u.reply));
534
535 if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
536 return -1;
537
538 if (rpc_pkt.u.reply.rstatus ||
539 rpc_pkt.u.reply.verifier ||
540 rpc_pkt.u.reply.astatus ||
541 rpc_pkt.u.reply.data[0]) {
542 if (rpc_pkt.u.reply.rstatus) {
543 return -9999;
544 }
545 if (rpc_pkt.u.reply.astatus) {
546 return -9999;
547 }
548 return -ntohl(rpc_pkt.u.reply.data[0]);;
549 }
550
551 if ((nfs_offset!=0) && !((nfs_offset) % (NFS_READ_SIZE/2*10*HASHES_PER_LINE))) {
552 puts ("\n\t ");
553 }
554 if (!(nfs_offset % ((NFS_READ_SIZE/2)*10))) {
555 putc ('#');
556 }
557
558 rlen = ntohl(rpc_pkt.u.reply.data[18]);
559 if ( store_block ((uchar *)pkt+sizeof(rpc_pkt.u.reply), nfs_offset, rlen) )
560 return -9999;
561
562 return rlen;
563 }
564
565 /**************************************************************************
566 Interfaces of U-BOOT
567 **************************************************************************/
568
569 static void
570 NfsTimeout (void)
571 {
572 if ( ++NfsTimeoutCount > NFS_RETRY_COUNT ) {
573 puts ("\nRetry count exceeded; starting again\n");
574 NetStartAgain ();
575 } else {
576 puts("T ");
577 NetSetTimeout (NFS_TIMEOUT, NfsTimeout);
578 NfsSend ();
579 }
580 }
581
582 static void
583 NfsHandler(uchar *pkt, unsigned dest, IPaddr_t sip, unsigned src, unsigned len)
584 {
585 int rlen;
586
587 debug("%s\n", __func__);
588
589 if (dest != NfsOurPort) return;
590
591 switch (NfsState) {
592 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
593 rpc_lookup_reply (PROG_MOUNT, pkt, len);
594 NfsState = STATE_PRCLOOKUP_PROG_NFS_REQ;
595 NfsSend ();
596 break;
597
598 case STATE_PRCLOOKUP_PROG_NFS_REQ:
599 rpc_lookup_reply (PROG_NFS, pkt, len);
600 NfsState = STATE_MOUNT_REQ;
601 NfsSend ();
602 break;
603
604 case STATE_MOUNT_REQ:
605 if (nfs_mount_reply(pkt, len)) {
606 puts ("*** ERROR: Cannot mount\n");
607 /* just to be sure... */
608 NfsState = STATE_UMOUNT_REQ;
609 NfsSend ();
610 } else {
611 NfsState = STATE_LOOKUP_REQ;
612 NfsSend ();
613 }
614 break;
615
616 case STATE_UMOUNT_REQ:
617 if (nfs_umountall_reply(pkt, len)) {
618 puts ("*** ERROR: Cannot umount\n");
619 NetState = NETLOOP_FAIL;
620 } else {
621 puts ("\ndone\n");
622 NetState = NfsDownloadState;
623 }
624 break;
625
626 case STATE_LOOKUP_REQ:
627 if (nfs_lookup_reply(pkt, len)) {
628 puts ("*** ERROR: File lookup fail\n");
629 NfsState = STATE_UMOUNT_REQ;
630 NfsSend ();
631 } else {
632 NfsState = STATE_READ_REQ;
633 nfs_offset = 0;
634 nfs_len = NFS_READ_SIZE;
635 NfsSend ();
636 }
637 break;
638
639 case STATE_READLINK_REQ:
640 if (nfs_readlink_reply(pkt, len)) {
641 puts ("*** ERROR: Symlink fail\n");
642 NfsState = STATE_UMOUNT_REQ;
643 NfsSend ();
644 } else {
645 debug("Symlink --> %s\n", nfs_path);
646 nfs_filename = basename (nfs_path);
647 nfs_path = dirname (nfs_path);
648
649 NfsState = STATE_MOUNT_REQ;
650 NfsSend ();
651 }
652 break;
653
654 case STATE_READ_REQ:
655 rlen = nfs_read_reply (pkt, len);
656 NetSetTimeout (NFS_TIMEOUT, NfsTimeout);
657 if (rlen > 0) {
658 nfs_offset += rlen;
659 NfsSend ();
660 }
661 else if ((rlen == -NFSERR_ISDIR)||(rlen == -NFSERR_INVAL)) {
662 /* symbolic link */
663 NfsState = STATE_READLINK_REQ;
664 NfsSend ();
665 } else {
666 if ( ! rlen ) NfsDownloadState = NETLOOP_SUCCESS;
667 NfsState = STATE_UMOUNT_REQ;
668 NfsSend ();
669 }
670 break;
671 }
672 }
673
674
675 void
676 NfsStart (void)
677 {
678 debug("%s\n", __func__);
679 NfsDownloadState = NETLOOP_FAIL;
680
681 NfsServerIP = NetServerIP;
682 nfs_path = (char *)nfs_path_buff;
683
684 if (nfs_path == NULL) {
685 NetState = NETLOOP_FAIL;
686 puts ("*** ERROR: Fail allocate memory\n");
687 return;
688 }
689
690 if (BootFile[0] == '\0') {
691 sprintf(default_filename, "/nfsroot/%02X%02X%02X%02X.img",
692 NetOurIP & 0xFF,
693 (NetOurIP >> 8) & 0xFF,
694 (NetOurIP >> 16) & 0xFF,
695 (NetOurIP >> 24) & 0xFF );
696 strcpy (nfs_path, default_filename);
697
698 printf ("*** Warning: no boot file name; using '%s'\n",
699 nfs_path);
700 } else {
701 char *p=BootFile;
702
703 p = strchr (p, ':');
704
705 if (p != NULL) {
706 NfsServerIP = string_to_ip (BootFile);
707 ++p;
708 strcpy (nfs_path, p);
709 } else {
710 strcpy (nfs_path, BootFile);
711 }
712 }
713
714 nfs_filename = basename (nfs_path);
715 nfs_path = dirname (nfs_path);
716
717 printf ("Using %s device\n", eth_get_name());
718
719 printf("File transfer via NFS from server %pI4"
720 "; our IP address is %pI4", &NfsServerIP, &NetOurIP);
721
722 /* Check if we need to send across this subnet */
723 if (NetOurGatewayIP && NetOurSubnetMask) {
724 IPaddr_t OurNet = NetOurIP & NetOurSubnetMask;
725 IPaddr_t ServerNet = NetServerIP & NetOurSubnetMask;
726
727 if (OurNet != ServerNet)
728 printf("; sending through gateway %pI4", &NetOurGatewayIP);
729 }
730 printf ("\nFilename '%s/%s'.", nfs_path, nfs_filename);
731
732 if (NetBootFileSize) {
733 printf (" Size is 0x%x Bytes = ", NetBootFileSize<<9);
734 print_size (NetBootFileSize<<9, "");
735 }
736 printf ("\nLoad address: 0x%lx\n"
737 "Loading: *\b", load_addr);
738
739 NetSetTimeout (NFS_TIMEOUT, NfsTimeout);
740 NetSetHandler (NfsHandler);
741
742 NfsTimeoutCount = 0;
743 NfsState = STATE_PRCLOOKUP_PROG_MOUNT_REQ;
744
745 /*NfsOurPort = 4096 + (get_ticks() % 3072);*/
746 /*FIX ME !!!*/
747 NfsOurPort = 1000;
748
749 /* zero out server ether in case the server ip has changed */
750 memset (NetServerEther, 0, 6);
751
752 NfsSend ();
753 }