]>
Commit | Line | Data |
---|---|---|
cbd8a35c WD |
1 | /* |
2 | * NFS support driver - based on etherboot and U-BOOT's tftp.c | |
3 | * | |
4 | * Masami Komiya <[email protected]> 2004 | |
5 | * | |
6 | */ | |
7 | ||
8 | /* NOTE: the NFS code is heavily inspired by the NetBSD netboot code (read: | |
9 | * large portions are copied verbatim) as distributed in OSKit 0.97. A few | |
10 | * changes were necessary to adapt the code to Etherboot and to fix several | |
11 | * inconsistencies. Also the RPC message preparation is done "by hand" to | |
12 | * avoid adding netsprintf() which I find hard to understand and use. */ | |
13 | ||
14 | /* NOTE 2: Etherboot does not care about things beyond the kernel image, so | |
15 | * it loads the kernel image off the boot server (ARP_SERVER) and does not | |
16 | * access the client root disk (root-path in dhcpd.conf), which would use | |
17 | * ARP_ROOTSERVER. The root disk is something the operating system we are | |
18 | * about to load needs to use. This is different from the OSKit 0.97 logic. */ | |
19 | ||
20 | /* NOTE 3: Symlink handling introduced by Anselm M Hoffmeister, 2003-July-14 | |
21 | * If a symlink is encountered, it is followed as far as possible (recursion | |
22 | * possible, maximum 16 steps). There is no clearing of ".."'s inside the | |
23 | * path, so please DON'T DO THAT. thx. */ | |
24 | ||
b0baca98 GG |
25 | /* NOTE 4: NFSv3 support added by Guillaume GARDET, 2016-June-20. |
26 | * NFSv2 is still used by default. But if server does not support NFSv2, then | |
27 | * NFSv3 is used, if available on NFS server. */ | |
28 | ||
cbd8a35c WD |
29 | #include <common.h> |
30 | #include <command.h> | |
31 | #include <net.h> | |
32 | #include <malloc.h> | |
55d5fd9a | 33 | #include <mapmem.h> |
cbd8a35c WD |
34 | #include "nfs.h" |
35 | #include "bootp.h" | |
36 | ||
cbd8a35c | 37 | #define HASHES_PER_LINE 65 /* Number of "loading" hashes per line */ |
fe891ecf | 38 | #define NFS_RETRY_COUNT 30 |
48a3e999 TK |
39 | #ifndef CONFIG_NFS_TIMEOUT |
40 | # define NFS_TIMEOUT 2000UL | |
41 | #else | |
42 | # define NFS_TIMEOUT CONFIG_NFS_TIMEOUT | |
43 | #endif | |
cbd8a35c | 44 | |
fa84fa70 MB |
45 | #define NFS_RPC_ERR 1 |
46 | #define NFS_RPC_DROP 124 | |
47 | ||
c9f6c91b JH |
48 | static int fs_mounted; |
49 | static unsigned long rpc_id; | |
cbd8a35c WD |
50 | static int nfs_offset = -1; |
51 | static int nfs_len; | |
fa84fa70 | 52 | static ulong nfs_timeout = NFS_TIMEOUT; |
cbd8a35c | 53 | |
b0baca98 | 54 | static char dirfh[NFS_FHSIZE]; /* NFSv2 / NFSv3 file handle of directory */ |
5280c769 JH |
55 | static char filefh[NFS3_FHSIZE]; /* NFSv2 / NFSv3 file handle */ |
56 | static int filefh3_length; /* (variable) length of filefh when NFSv3 */ | |
cbd8a35c | 57 | |
22f6e99d | 58 | static enum net_loop_state nfs_download_state; |
049a95a7 | 59 | static struct in_addr nfs_server_ip; |
68c76a3a JH |
60 | static int nfs_server_mount_port; |
61 | static int nfs_server_port; | |
62 | static int nfs_our_port; | |
63 | static int nfs_timeout_count; | |
64 | static int nfs_state; | |
cbd8a35c WD |
65 | #define STATE_PRCLOOKUP_PROG_MOUNT_REQ 1 |
66 | #define STATE_PRCLOOKUP_PROG_NFS_REQ 2 | |
67 | #define STATE_MOUNT_REQ 3 | |
68 | #define STATE_UMOUNT_REQ 4 | |
69 | #define STATE_LOOKUP_REQ 5 | |
70 | #define STATE_READ_REQ 6 | |
71 | #define STATE_READLINK_REQ 7 | |
72 | ||
cbd8a35c WD |
73 | static char *nfs_filename; |
74 | static char *nfs_path; | |
75 | static char nfs_path_buff[2048]; | |
76 | ||
b0baca98 GG |
77 | #define NFSV2_FLAG 1 |
78 | #define NFSV3_FLAG 1 << 1 | |
79 | static char supported_nfs_versions = NFSV2_FLAG | NFSV3_FLAG; | |
80 | ||
68c76a3a | 81 | static inline int store_block(uchar *src, unsigned offset, unsigned len) |
cbd8a35c | 82 | { |
a084f7da | 83 | ulong newsize = offset + len; |
6d0f6bcf | 84 | #ifdef CONFIG_SYS_DIRECT_FLASH_NFS |
cbd8a35c WD |
85 | int i, rc = 0; |
86 | ||
c9f6c91b | 87 | for (i = 0; i < CONFIG_SYS_MAX_FLASH_BANKS; i++) { |
cbd8a35c WD |
88 | /* start address in flash? */ |
89 | if (load_addr + offset >= flash_info[i].start[0]) { | |
90 | rc = 1; | |
91 | break; | |
92 | } | |
93 | } | |
94 | ||
95 | if (rc) { /* Flash is destination for this packet */ | |
c9f6c91b | 96 | rc = flash_write((uchar *)src, (ulong)(load_addr+offset), len); |
cbd8a35c | 97 | if (rc) { |
c9f6c91b | 98 | flash_perror(rc); |
23a7a32d | 99 | return -1; |
cbd8a35c WD |
100 | } |
101 | } else | |
6d0f6bcf | 102 | #endif /* CONFIG_SYS_DIRECT_FLASH_NFS */ |
cbd8a35c | 103 | { |
55d5fd9a JH |
104 | void *ptr = map_sysmem(load_addr + offset, len); |
105 | ||
106 | memcpy(ptr, src, len); | |
107 | unmap_sysmem(ptr); | |
cbd8a35c | 108 | } |
a084f7da | 109 | |
1411157d JH |
110 | if (net_boot_file_size < (offset + len)) |
111 | net_boot_file_size = newsize; | |
23a7a32d | 112 | return 0; |
cbd8a35c WD |
113 | } |
114 | ||
68c76a3a | 115 | static char *basename(char *path) |
cbd8a35c WD |
116 | { |
117 | char *fname; | |
118 | ||
119 | fname = path + strlen(path) - 1; | |
120 | while (fname >= path) { | |
121 | if (*fname == '/') { | |
122 | fname++; | |
123 | break; | |
124 | } | |
125 | fname--; | |
126 | } | |
127 | return fname; | |
128 | } | |
129 | ||
68c76a3a | 130 | static char *dirname(char *path) |
cbd8a35c WD |
131 | { |
132 | char *fname; | |
133 | ||
c9f6c91b | 134 | fname = basename(path); |
cbd8a35c WD |
135 | --fname; |
136 | *fname = '\0'; | |
137 | return path; | |
138 | } | |
139 | ||
cbd8a35c WD |
140 | /************************************************************************** |
141 | RPC_ADD_CREDENTIALS - Add RPC authentication/verifier entries | |
142 | **************************************************************************/ | |
e4ead4a2 | 143 | static uint32_t *rpc_add_credentials(uint32_t *p) |
cbd8a35c WD |
144 | { |
145 | int hl; | |
146 | int hostnamelen; | |
147 | char hostname[256]; | |
148 | ||
c9f6c91b JH |
149 | strcpy(hostname, ""); |
150 | hostnamelen = strlen(hostname); | |
cbd8a35c WD |
151 | |
152 | /* Here's the executive summary on authentication requirements of the | |
153 | * various NFS server implementations: Linux accepts both AUTH_NONE | |
154 | * and AUTH_UNIX authentication (also accepts an empty hostname field | |
155 | * in the AUTH_UNIX scheme). *BSD refuses AUTH_NONE, but accepts | |
156 | * AUTH_UNIX (also accepts an empty hostname field in the AUTH_UNIX | |
157 | * scheme). To be safe, use AUTH_UNIX and pass the hostname if we have | |
158 | * it (if the BOOTP/DHCP reply didn't give one, just use an empty | |
159 | * hostname). */ | |
160 | ||
161 | hl = (hostnamelen + 3) & ~3; | |
162 | ||
163 | /* Provide an AUTH_UNIX credential. */ | |
164 | *p++ = htonl(1); /* AUTH_UNIX */ | |
165 | *p++ = htonl(hl+20); /* auth length */ | |
166 | *p++ = htonl(0); /* stamp */ | |
167 | *p++ = htonl(hostnamelen); /* hostname string */ | |
c9f6c91b | 168 | if (hostnamelen & 3) |
cbd8a35c | 169 | *(p + hostnamelen / 4) = 0; /* add zero padding */ |
c9f6c91b | 170 | memcpy(p, hostname, hostnamelen); |
cbd8a35c WD |
171 | p += hl / 4; |
172 | *p++ = 0; /* uid */ | |
173 | *p++ = 0; /* gid */ | |
174 | *p++ = 0; /* auxiliary gid list */ | |
175 | ||
176 | /* Provide an AUTH_NONE verifier. */ | |
177 | *p++ = 0; /* AUTH_NONE */ | |
178 | *p++ = 0; /* auth length */ | |
179 | ||
180 | return p; | |
181 | } | |
182 | ||
183 | /************************************************************************** | |
184 | RPC_LOOKUP - Lookup RPC Port numbers | |
185 | **************************************************************************/ | |
68c76a3a | 186 | static void rpc_req(int rpc_prog, int rpc_proc, uint32_t *data, int datalen) |
cbd8a35c WD |
187 | { |
188 | struct rpc_t pkt; | |
189 | unsigned long id; | |
190 | uint32_t *p; | |
191 | int pktlen; | |
192 | int sport; | |
193 | ||
c3f9d493 | 194 | id = ++rpc_id; |
cbd8a35c WD |
195 | pkt.u.call.id = htonl(id); |
196 | pkt.u.call.type = htonl(MSG_CALL); | |
197 | pkt.u.call.rpcvers = htonl(2); /* use RPC version 2 */ | |
198 | pkt.u.call.prog = htonl(rpc_prog); | |
b0baca98 GG |
199 | switch (rpc_prog) { |
200 | case PROG_NFS: | |
201 | if (supported_nfs_versions & NFSV2_FLAG) | |
202 | pkt.u.call.vers = htonl(2); /* NFS v2 */ | |
203 | else /* NFSV3_FLAG */ | |
204 | pkt.u.call.vers = htonl(3); /* NFS v3 */ | |
205 | break; | |
206 | case PROG_PORTMAP: | |
207 | case PROG_MOUNT: | |
208 | default: | |
209 | pkt.u.call.vers = htonl(2); /* portmapper is version 2 */ | |
210 | } | |
cbd8a35c WD |
211 | pkt.u.call.proc = htonl(rpc_proc); |
212 | p = (uint32_t *)&(pkt.u.call.data); | |
213 | ||
214 | if (datalen) | |
c9f6c91b | 215 | memcpy((char *)p, (char *)data, datalen*sizeof(uint32_t)); |
cbd8a35c WD |
216 | |
217 | pktlen = (char *)p + datalen*sizeof(uint32_t) - (char *)&pkt; | |
218 | ||
1203fcce JH |
219 | memcpy((char *)net_tx_packet + net_eth_hdr_size() + IP_UDP_HDR_SIZE, |
220 | (char *)&pkt, pktlen); | |
cbd8a35c WD |
221 | |
222 | if (rpc_prog == PROG_PORTMAP) | |
223 | sport = SUNRPC_PORT; | |
224 | else if (rpc_prog == PROG_MOUNT) | |
68c76a3a | 225 | sport = nfs_server_mount_port; |
cbd8a35c | 226 | else |
68c76a3a | 227 | sport = nfs_server_port; |
cbd8a35c | 228 | |
1203fcce | 229 | net_send_udp_packet(net_server_ethaddr, nfs_server_ip, sport, |
68c76a3a | 230 | nfs_our_port, pktlen); |
cbd8a35c WD |
231 | } |
232 | ||
233 | /************************************************************************** | |
234 | RPC_LOOKUP - Lookup RPC Port numbers | |
235 | **************************************************************************/ | |
68c76a3a | 236 | static void rpc_lookup_req(int prog, int ver) |
cbd8a35c WD |
237 | { |
238 | uint32_t data[16]; | |
239 | ||
240 | data[0] = 0; data[1] = 0; /* auth credential */ | |
241 | data[2] = 0; data[3] = 0; /* auth verifier */ | |
242 | data[4] = htonl(prog); | |
243 | data[5] = htonl(ver); | |
244 | data[6] = htonl(17); /* IP_UDP */ | |
245 | data[7] = 0; | |
c9f6c91b | 246 | rpc_req(PROG_PORTMAP, PORTMAP_GETPORT, data, 8); |
cbd8a35c WD |
247 | } |
248 | ||
249 | /************************************************************************** | |
250 | NFS_MOUNT - Mount an NFS Filesystem | |
251 | **************************************************************************/ | |
68c76a3a | 252 | static void nfs_mount_req(char *path) |
cbd8a35c WD |
253 | { |
254 | uint32_t data[1024]; | |
255 | uint32_t *p; | |
256 | int len; | |
257 | int pathlen; | |
258 | ||
c9f6c91b | 259 | pathlen = strlen(path); |
cbd8a35c WD |
260 | |
261 | p = &(data[0]); | |
e4ead4a2 | 262 | p = rpc_add_credentials(p); |
cbd8a35c WD |
263 | |
264 | *p++ = htonl(pathlen); | |
c9f6c91b JH |
265 | if (pathlen & 3) |
266 | *(p + pathlen / 4) = 0; | |
267 | memcpy(p, path, pathlen); | |
cbd8a35c WD |
268 | p += (pathlen + 3) / 4; |
269 | ||
270 | len = (uint32_t *)p - (uint32_t *)&(data[0]); | |
271 | ||
c9f6c91b | 272 | rpc_req(PROG_MOUNT, MOUNT_ADDENTRY, data, len); |
cbd8a35c WD |
273 | } |
274 | ||
275 | /************************************************************************** | |
276 | NFS_UMOUNTALL - Unmount all our NFS Filesystems on the Server | |
277 | **************************************************************************/ | |
68c76a3a | 278 | static void nfs_umountall_req(void) |
cbd8a35c WD |
279 | { |
280 | uint32_t data[1024]; | |
281 | uint32_t *p; | |
282 | int len; | |
283 | ||
68c76a3a | 284 | if ((nfs_server_mount_port == -1) || (!fs_mounted)) |
cbd8a35c WD |
285 | /* Nothing mounted, nothing to umount */ |
286 | return; | |
cbd8a35c WD |
287 | |
288 | p = &(data[0]); | |
e4ead4a2 | 289 | p = rpc_add_credentials(p); |
cbd8a35c WD |
290 | |
291 | len = (uint32_t *)p - (uint32_t *)&(data[0]); | |
292 | ||
c9f6c91b | 293 | rpc_req(PROG_MOUNT, MOUNT_UMOUNTALL, data, len); |
cbd8a35c WD |
294 | } |
295 | ||
296 | /*************************************************************************** | |
297 | * NFS_READLINK (AH 2003-07-14) | |
298 | * This procedure is called when read of the first block fails - | |
299 | * this probably happens when it's a directory or a symlink | |
300 | * In case of successful readlink(), the dirname is manipulated, | |
301 | * so that inside the nfs() function a recursion can be done. | |
302 | **************************************************************************/ | |
68c76a3a | 303 | static void nfs_readlink_req(void) |
cbd8a35c WD |
304 | { |
305 | uint32_t data[1024]; | |
306 | uint32_t *p; | |
307 | int len; | |
308 | ||
309 | p = &(data[0]); | |
e4ead4a2 | 310 | p = rpc_add_credentials(p); |
cbd8a35c | 311 | |
b0baca98 GG |
312 | if (supported_nfs_versions & NFSV2_FLAG) { |
313 | memcpy(p, filefh, NFS_FHSIZE); | |
314 | p += (NFS_FHSIZE / 4); | |
315 | } else { /* NFSV3_FLAG */ | |
316 | *p++ = htonl(filefh3_length); | |
5280c769 | 317 | memcpy(p, filefh, filefh3_length); |
b0baca98 GG |
318 | p += (filefh3_length / 4); |
319 | } | |
cbd8a35c WD |
320 | |
321 | len = (uint32_t *)p - (uint32_t *)&(data[0]); | |
322 | ||
c9f6c91b | 323 | rpc_req(PROG_NFS, NFS_READLINK, data, len); |
cbd8a35c WD |
324 | } |
325 | ||
326 | /************************************************************************** | |
327 | NFS_LOOKUP - Lookup Pathname | |
328 | **************************************************************************/ | |
68c76a3a | 329 | static void nfs_lookup_req(char *fname) |
cbd8a35c WD |
330 | { |
331 | uint32_t data[1024]; | |
332 | uint32_t *p; | |
333 | int len; | |
334 | int fnamelen; | |
335 | ||
c9f6c91b | 336 | fnamelen = strlen(fname); |
cbd8a35c WD |
337 | |
338 | p = &(data[0]); | |
e4ead4a2 | 339 | p = rpc_add_credentials(p); |
cbd8a35c | 340 | |
b0baca98 GG |
341 | if (supported_nfs_versions & NFSV2_FLAG) { |
342 | memcpy(p, dirfh, NFS_FHSIZE); | |
343 | p += (NFS_FHSIZE / 4); | |
344 | *p++ = htonl(fnamelen); | |
345 | if (fnamelen & 3) | |
346 | *(p + fnamelen / 4) = 0; | |
347 | memcpy(p, fname, fnamelen); | |
348 | p += (fnamelen + 3) / 4; | |
349 | ||
350 | len = (uint32_t *)p - (uint32_t *)&(data[0]); | |
351 | ||
352 | rpc_req(PROG_NFS, NFS_LOOKUP, data, len); | |
353 | } else { /* NFSV3_FLAG */ | |
354 | *p++ = htonl(NFS_FHSIZE); /* Dir handle length */ | |
355 | memcpy(p, dirfh, NFS_FHSIZE); | |
356 | p += (NFS_FHSIZE / 4); | |
357 | *p++ = htonl(fnamelen); | |
358 | if (fnamelen & 3) | |
359 | *(p + fnamelen / 4) = 0; | |
360 | memcpy(p, fname, fnamelen); | |
361 | p += (fnamelen + 3) / 4; | |
362 | ||
363 | len = (uint32_t *)p - (uint32_t *)&(data[0]); | |
364 | ||
365 | rpc_req(PROG_NFS, NFS3PROC_LOOKUP, data, len); | |
366 | } | |
cbd8a35c WD |
367 | } |
368 | ||
369 | /************************************************************************** | |
370 | NFS_READ - Read File on NFS Server | |
371 | **************************************************************************/ | |
68c76a3a | 372 | static void nfs_read_req(int offset, int readlen) |
cbd8a35c WD |
373 | { |
374 | uint32_t data[1024]; | |
375 | uint32_t *p; | |
376 | int len; | |
377 | ||
378 | p = &(data[0]); | |
e4ead4a2 | 379 | p = rpc_add_credentials(p); |
cbd8a35c | 380 | |
b0baca98 GG |
381 | if (supported_nfs_versions & NFSV2_FLAG) { |
382 | memcpy(p, filefh, NFS_FHSIZE); | |
383 | p += (NFS_FHSIZE / 4); | |
384 | *p++ = htonl(offset); | |
385 | *p++ = htonl(readlen); | |
386 | *p++ = 0; | |
387 | } else { /* NFSV3_FLAG */ | |
388 | *p++ = htonl(filefh3_length); | |
5280c769 | 389 | memcpy(p, filefh, filefh3_length); |
b0baca98 GG |
390 | p += (filefh3_length / 4); |
391 | *p++ = htonl(0); /* offset is 64-bit long, so fill with 0 */ | |
392 | *p++ = htonl(offset); | |
393 | *p++ = htonl(readlen); | |
394 | *p++ = 0; | |
395 | } | |
cbd8a35c WD |
396 | |
397 | len = (uint32_t *)p - (uint32_t *)&(data[0]); | |
398 | ||
c9f6c91b | 399 | rpc_req(PROG_NFS, NFS_READ, data, len); |
cbd8a35c WD |
400 | } |
401 | ||
402 | /************************************************************************** | |
403 | RPC request dispatcher | |
404 | **************************************************************************/ | |
68c76a3a | 405 | static void nfs_send(void) |
cbd8a35c | 406 | { |
0ebf04c6 | 407 | debug("%s\n", __func__); |
cbd8a35c | 408 | |
68c76a3a | 409 | switch (nfs_state) { |
cbd8a35c | 410 | case STATE_PRCLOOKUP_PROG_MOUNT_REQ: |
b0baca98 GG |
411 | if (supported_nfs_versions & NFSV2_FLAG) |
412 | rpc_lookup_req(PROG_MOUNT, 1); | |
413 | else /* NFSV3_FLAG */ | |
414 | rpc_lookup_req(PROG_MOUNT, 3); | |
cbd8a35c WD |
415 | break; |
416 | case STATE_PRCLOOKUP_PROG_NFS_REQ: | |
b0baca98 GG |
417 | if (supported_nfs_versions & NFSV2_FLAG) |
418 | rpc_lookup_req(PROG_NFS, 2); | |
419 | else /* NFSV3_FLAG */ | |
420 | rpc_lookup_req(PROG_NFS, 3); | |
cbd8a35c WD |
421 | break; |
422 | case STATE_MOUNT_REQ: | |
c9f6c91b | 423 | nfs_mount_req(nfs_path); |
cbd8a35c WD |
424 | break; |
425 | case STATE_UMOUNT_REQ: | |
c9f6c91b | 426 | nfs_umountall_req(); |
cbd8a35c WD |
427 | break; |
428 | case STATE_LOOKUP_REQ: | |
c9f6c91b | 429 | nfs_lookup_req(nfs_filename); |
cbd8a35c WD |
430 | break; |
431 | case STATE_READ_REQ: | |
c9f6c91b | 432 | nfs_read_req(nfs_offset, nfs_len); |
cbd8a35c WD |
433 | break; |
434 | case STATE_READLINK_REQ: | |
c9f6c91b | 435 | nfs_readlink_req(); |
cbd8a35c WD |
436 | break; |
437 | } | |
438 | } | |
439 | ||
440 | /************************************************************************** | |
441 | Handlers for the reply from server | |
442 | **************************************************************************/ | |
443 | ||
68c76a3a | 444 | static int rpc_lookup_reply(int prog, uchar *pkt, unsigned len) |
cbd8a35c WD |
445 | { |
446 | struct rpc_t rpc_pkt; | |
447 | ||
c9f6c91b | 448 | memcpy((unsigned char *)&rpc_pkt, pkt, len); |
cbd8a35c | 449 | |
0ebf04c6 | 450 | debug("%s\n", __func__); |
cbd8a35c | 451 | |
fa84fa70 MB |
452 | if (ntohl(rpc_pkt.u.reply.id) > rpc_id) |
453 | return -NFS_RPC_ERR; | |
454 | else if (ntohl(rpc_pkt.u.reply.id) < rpc_id) | |
455 | return -NFS_RPC_DROP; | |
c3f9d493 | 456 | |
cbd8a35c WD |
457 | if (rpc_pkt.u.reply.rstatus || |
458 | rpc_pkt.u.reply.verifier || | |
c9f6c91b | 459 | rpc_pkt.u.reply.astatus) |
c3f9d493 | 460 | return -1; |
cbd8a35c WD |
461 | |
462 | switch (prog) { | |
463 | case PROG_MOUNT: | |
68c76a3a | 464 | nfs_server_mount_port = ntohl(rpc_pkt.u.reply.data[0]); |
cbd8a35c WD |
465 | break; |
466 | case PROG_NFS: | |
68c76a3a | 467 | nfs_server_port = ntohl(rpc_pkt.u.reply.data[0]); |
cbd8a35c WD |
468 | break; |
469 | } | |
470 | ||
471 | return 0; | |
472 | } | |
473 | ||
68c76a3a | 474 | static int nfs_mount_reply(uchar *pkt, unsigned len) |
cbd8a35c WD |
475 | { |
476 | struct rpc_t rpc_pkt; | |
477 | ||
0ebf04c6 | 478 | debug("%s\n", __func__); |
cbd8a35c | 479 | |
c9f6c91b | 480 | memcpy((unsigned char *)&rpc_pkt, pkt, len); |
cbd8a35c | 481 | |
fa84fa70 MB |
482 | if (ntohl(rpc_pkt.u.reply.id) > rpc_id) |
483 | return -NFS_RPC_ERR; | |
484 | else if (ntohl(rpc_pkt.u.reply.id) < rpc_id) | |
485 | return -NFS_RPC_DROP; | |
c3f9d493 | 486 | |
cbd8a35c WD |
487 | if (rpc_pkt.u.reply.rstatus || |
488 | rpc_pkt.u.reply.verifier || | |
489 | rpc_pkt.u.reply.astatus || | |
c9f6c91b | 490 | rpc_pkt.u.reply.data[0]) |
cbd8a35c | 491 | return -1; |
cbd8a35c WD |
492 | |
493 | fs_mounted = 1; | |
b0baca98 | 494 | /* NFSv2 and NFSv3 use same structure */ |
c9f6c91b | 495 | memcpy(dirfh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE); |
cbd8a35c WD |
496 | |
497 | return 0; | |
498 | } | |
499 | ||
68c76a3a | 500 | static int nfs_umountall_reply(uchar *pkt, unsigned len) |
cbd8a35c WD |
501 | { |
502 | struct rpc_t rpc_pkt; | |
503 | ||
0ebf04c6 | 504 | debug("%s\n", __func__); |
cbd8a35c | 505 | |
c9f6c91b | 506 | memcpy((unsigned char *)&rpc_pkt, pkt, len); |
cbd8a35c | 507 | |
fa84fa70 MB |
508 | if (ntohl(rpc_pkt.u.reply.id) > rpc_id) |
509 | return -NFS_RPC_ERR; | |
510 | else if (ntohl(rpc_pkt.u.reply.id) < rpc_id) | |
511 | return -NFS_RPC_DROP; | |
c3f9d493 | 512 | |
cbd8a35c WD |
513 | if (rpc_pkt.u.reply.rstatus || |
514 | rpc_pkt.u.reply.verifier || | |
c9f6c91b | 515 | rpc_pkt.u.reply.astatus) |
cbd8a35c | 516 | return -1; |
cbd8a35c WD |
517 | |
518 | fs_mounted = 0; | |
c9f6c91b | 519 | memset(dirfh, 0, sizeof(dirfh)); |
cbd8a35c WD |
520 | |
521 | return 0; | |
522 | } | |
523 | ||
68c76a3a | 524 | static int nfs_lookup_reply(uchar *pkt, unsigned len) |
cbd8a35c WD |
525 | { |
526 | struct rpc_t rpc_pkt; | |
527 | ||
0ebf04c6 | 528 | debug("%s\n", __func__); |
cbd8a35c | 529 | |
c9f6c91b | 530 | memcpy((unsigned char *)&rpc_pkt, pkt, len); |
cbd8a35c | 531 | |
fa84fa70 MB |
532 | if (ntohl(rpc_pkt.u.reply.id) > rpc_id) |
533 | return -NFS_RPC_ERR; | |
534 | else if (ntohl(rpc_pkt.u.reply.id) < rpc_id) | |
535 | return -NFS_RPC_DROP; | |
c3f9d493 | 536 | |
cbd8a35c WD |
537 | if (rpc_pkt.u.reply.rstatus || |
538 | rpc_pkt.u.reply.verifier || | |
539 | rpc_pkt.u.reply.astatus || | |
69fd0d41 GG |
540 | rpc_pkt.u.reply.data[0]) { |
541 | switch (ntohl(rpc_pkt.u.reply.astatus)) { | |
b0baca98 | 542 | case NFS_RPC_SUCCESS: /* Not an error */ |
69fd0d41 | 543 | break; |
b0baca98 GG |
544 | case NFS_RPC_PROG_MISMATCH: |
545 | /* Remote can't support NFS version */ | |
546 | switch (ntohl(rpc_pkt.u.reply.data[0])) { | |
547 | /* Minimal supported NFS version */ | |
548 | case 3: | |
549 | debug("*** Waring: NFS version not supported: Requested: V%d, accepted: min V%d - max V%d\n", | |
347a9015 JH |
550 | (supported_nfs_versions & NFSV2_FLAG) ? |
551 | 2 : 3, | |
b0baca98 GG |
552 | ntohl(rpc_pkt.u.reply.data[0]), |
553 | ntohl(rpc_pkt.u.reply.data[1])); | |
554 | debug("Will retry with NFSv3\n"); | |
555 | /* Clear NFSV2_FLAG from supported versions */ | |
556 | supported_nfs_versions &= ~NFSV2_FLAG; | |
557 | return -NFS_RPC_PROG_MISMATCH; | |
558 | case 4: | |
559 | default: | |
560 | printf("*** ERROR: NFS version not supported: Requested: V%d, accepted: min V%d - max V%d\n", | |
347a9015 JH |
561 | (supported_nfs_versions & NFSV2_FLAG) ? |
562 | 2 : 3, | |
b0baca98 GG |
563 | ntohl(rpc_pkt.u.reply.data[0]), |
564 | ntohl(rpc_pkt.u.reply.data[1])); | |
565 | } | |
69fd0d41 | 566 | break; |
b0baca98 GG |
567 | case NFS_RPC_PROG_UNAVAIL: |
568 | case NFS_RPC_PROC_UNAVAIL: | |
569 | case NFS_RPC_GARBAGE_ARGS: | |
570 | case NFS_RPC_SYSTEM_ERR: | |
69fd0d41 GG |
571 | default: /* Unknown error on 'accept state' flag */ |
572 | printf("*** ERROR: accept state error (%d)\n", | |
573 | ntohl(rpc_pkt.u.reply.astatus)); | |
574 | break; | |
575 | } | |
cbd8a35c | 576 | return -1; |
69fd0d41 | 577 | } |
cbd8a35c | 578 | |
b0baca98 GG |
579 | if (supported_nfs_versions & NFSV2_FLAG) { |
580 | memcpy(filefh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE); | |
581 | } else { /* NFSV3_FLAG */ | |
582 | filefh3_length = ntohl(rpc_pkt.u.reply.data[1]); | |
583 | if (filefh3_length > NFS3_FHSIZE) | |
584 | filefh3_length = NFS3_FHSIZE; | |
5280c769 | 585 | memcpy(filefh, rpc_pkt.u.reply.data + 2, filefh3_length); |
b0baca98 | 586 | } |
cbd8a35c WD |
587 | |
588 | return 0; | |
589 | } | |
590 | ||
051ed9af JH |
591 | static int nfs3_get_attributes_offset(uint32_t *data) |
592 | { | |
593 | if (ntohl(data[1]) != 0) { | |
594 | /* 'attributes_follow' flag is TRUE, | |
595 | * so we have attributes on 21 bytes */ | |
596 | /* Skip unused values : | |
597 | type; 32 bits value, | |
598 | mode; 32 bits value, | |
599 | nlink; 32 bits value, | |
600 | uid; 32 bits value, | |
601 | gid; 32 bits value, | |
602 | size; 64 bits value, | |
603 | used; 64 bits value, | |
604 | rdev; 64 bits value, | |
605 | fsid; 64 bits value, | |
606 | fileid; 64 bits value, | |
607 | atime; 64 bits value, | |
608 | mtime; 64 bits value, | |
609 | ctime; 64 bits value, | |
610 | */ | |
611 | return 22; | |
612 | } else { | |
613 | /* 'attributes_follow' flag is FALSE, | |
614 | * so we don't have any attributes */ | |
615 | return 1; | |
616 | } | |
617 | } | |
618 | ||
68c76a3a | 619 | static int nfs_readlink_reply(uchar *pkt, unsigned len) |
cbd8a35c WD |
620 | { |
621 | struct rpc_t rpc_pkt; | |
622 | int rlen; | |
051ed9af | 623 | int nfsv3_data_offset = 0; |
cbd8a35c | 624 | |
0ebf04c6 | 625 | debug("%s\n", __func__); |
cbd8a35c | 626 | |
c9f6c91b | 627 | memcpy((unsigned char *)&rpc_pkt, pkt, len); |
cbd8a35c | 628 | |
fa84fa70 MB |
629 | if (ntohl(rpc_pkt.u.reply.id) > rpc_id) |
630 | return -NFS_RPC_ERR; | |
631 | else if (ntohl(rpc_pkt.u.reply.id) < rpc_id) | |
632 | return -NFS_RPC_DROP; | |
c3f9d493 | 633 | |
cbd8a35c WD |
634 | if (rpc_pkt.u.reply.rstatus || |
635 | rpc_pkt.u.reply.verifier || | |
636 | rpc_pkt.u.reply.astatus || | |
c9f6c91b | 637 | rpc_pkt.u.reply.data[0]) |
cbd8a35c | 638 | return -1; |
cbd8a35c | 639 | |
051ed9af JH |
640 | if (!(supported_nfs_versions & NFSV2_FLAG)) { /* NFSV3_FLAG */ |
641 | nfsv3_data_offset = | |
642 | nfs3_get_attributes_offset(rpc_pkt.u.reply.data); | |
643 | } | |
b0baca98 | 644 | |
051ed9af JH |
645 | /* new path length */ |
646 | rlen = ntohl(rpc_pkt.u.reply.data[1 + nfsv3_data_offset]); | |
647 | ||
648 | if (*((char *)&(rpc_pkt.u.reply.data[2 + nfsv3_data_offset])) != '/') { | |
649 | int pathlen; | |
650 | ||
651 | strcat(nfs_path, "/"); | |
652 | pathlen = strlen(nfs_path); | |
653 | memcpy(nfs_path + pathlen, | |
654 | (uchar *)&(rpc_pkt.u.reply.data[2 + nfsv3_data_offset]), | |
655 | rlen); | |
656 | nfs_path[pathlen + rlen] = 0; | |
657 | } else { | |
658 | memcpy(nfs_path, | |
659 | (uchar *)&(rpc_pkt.u.reply.data[2 + nfsv3_data_offset]), | |
660 | rlen); | |
661 | nfs_path[rlen] = 0; | |
cbd8a35c WD |
662 | } |
663 | return 0; | |
664 | } | |
665 | ||
68c76a3a | 666 | static int nfs_read_reply(uchar *pkt, unsigned len) |
cbd8a35c WD |
667 | { |
668 | struct rpc_t rpc_pkt; | |
669 | int rlen; | |
b0baca98 | 670 | uchar *data_ptr; |
cbd8a35c | 671 | |
0ebf04c6 | 672 | debug("%s\n", __func__); |
cbd8a35c | 673 | |
c9f6c91b | 674 | memcpy((uchar *)&rpc_pkt, pkt, sizeof(rpc_pkt.u.reply)); |
cbd8a35c | 675 | |
fa84fa70 MB |
676 | if (ntohl(rpc_pkt.u.reply.id) > rpc_id) |
677 | return -NFS_RPC_ERR; | |
678 | else if (ntohl(rpc_pkt.u.reply.id) < rpc_id) | |
679 | return -NFS_RPC_DROP; | |
c3f9d493 | 680 | |
cbd8a35c WD |
681 | if (rpc_pkt.u.reply.rstatus || |
682 | rpc_pkt.u.reply.verifier || | |
683 | rpc_pkt.u.reply.astatus || | |
684 | rpc_pkt.u.reply.data[0]) { | |
c9f6c91b | 685 | if (rpc_pkt.u.reply.rstatus) |
cbd8a35c | 686 | return -9999; |
c9f6c91b | 687 | if (rpc_pkt.u.reply.astatus) |
cbd8a35c | 688 | return -9999; |
c9f6c91b | 689 | return -ntohl(rpc_pkt.u.reply.data[0]); |
cbd8a35c WD |
690 | } |
691 | ||
c9f6c91b JH |
692 | if ((nfs_offset != 0) && !((nfs_offset) % |
693 | (NFS_READ_SIZE / 2 * 10 * HASHES_PER_LINE))) | |
694 | puts("\n\t "); | |
695 | if (!(nfs_offset % ((NFS_READ_SIZE / 2) * 10))) | |
696 | putc('#'); | |
cbd8a35c | 697 | |
b0baca98 GG |
698 | if (supported_nfs_versions & NFSV2_FLAG) { |
699 | rlen = ntohl(rpc_pkt.u.reply.data[18]); | |
700 | data_ptr = (uchar *)&(rpc_pkt.u.reply.data[19]); | |
701 | } else { /* NFSV3_FLAG */ | |
051ed9af JH |
702 | int nfsv3_data_offset = |
703 | nfs3_get_attributes_offset(rpc_pkt.u.reply.data); | |
704 | ||
705 | /* count value */ | |
706 | rlen = ntohl(rpc_pkt.u.reply.data[1 + nfsv3_data_offset]); | |
707 | /* Skip unused values : | |
708 | EOF: 32 bits value, | |
709 | data_size: 32 bits value, | |
710 | */ | |
711 | data_ptr = (uchar *) | |
712 | &(rpc_pkt.u.reply.data[4 + nfsv3_data_offset]); | |
b0baca98 GG |
713 | } |
714 | ||
715 | if (store_block(data_ptr, nfs_offset, rlen)) | |
716 | return -9999; | |
cbd8a35c WD |
717 | |
718 | return rlen; | |
719 | } | |
720 | ||
721 | /************************************************************************** | |
722 | Interfaces of U-BOOT | |
723 | **************************************************************************/ | |
68c76a3a | 724 | static void nfs_timeout_handler(void) |
a5725fab | 725 | { |
68c76a3a | 726 | if (++nfs_timeout_count > NFS_RETRY_COUNT) { |
c9f6c91b | 727 | puts("\nRetry count exceeded; starting again\n"); |
bc0571fc | 728 | net_start_again(); |
aabb8cb0 ES |
729 | } else { |
730 | puts("T "); | |
bc0571fc JH |
731 | net_set_timeout_handler(nfs_timeout + |
732 | NFS_TIMEOUT * nfs_timeout_count, | |
733 | nfs_timeout_handler); | |
68c76a3a | 734 | nfs_send(); |
fe891ecf | 735 | } |
a5725fab WD |
736 | } |
737 | ||
049a95a7 JH |
738 | static void nfs_handler(uchar *pkt, unsigned dest, struct in_addr sip, |
739 | unsigned src, unsigned len) | |
cbd8a35c WD |
740 | { |
741 | int rlen; | |
fa84fa70 | 742 | int reply; |
cbd8a35c | 743 | |
0ebf04c6 | 744 | debug("%s\n", __func__); |
cbd8a35c | 745 | |
68c76a3a | 746 | if (dest != nfs_our_port) |
c9f6c91b | 747 | return; |
cbd8a35c | 748 | |
68c76a3a | 749 | switch (nfs_state) { |
cbd8a35c | 750 | case STATE_PRCLOOKUP_PROG_MOUNT_REQ: |
fa84fa70 MB |
751 | if (rpc_lookup_reply(PROG_MOUNT, pkt, len) == -NFS_RPC_DROP) |
752 | break; | |
68c76a3a JH |
753 | nfs_state = STATE_PRCLOOKUP_PROG_NFS_REQ; |
754 | nfs_send(); | |
cbd8a35c WD |
755 | break; |
756 | ||
757 | case STATE_PRCLOOKUP_PROG_NFS_REQ: | |
fa84fa70 MB |
758 | if (rpc_lookup_reply(PROG_NFS, pkt, len) == -NFS_RPC_DROP) |
759 | break; | |
68c76a3a JH |
760 | nfs_state = STATE_MOUNT_REQ; |
761 | nfs_send(); | |
cbd8a35c WD |
762 | break; |
763 | ||
764 | case STATE_MOUNT_REQ: | |
fa84fa70 | 765 | reply = nfs_mount_reply(pkt, len); |
68c76a3a | 766 | if (reply == -NFS_RPC_DROP) { |
fa84fa70 | 767 | break; |
68c76a3a | 768 | } else if (reply == -NFS_RPC_ERR) { |
c9f6c91b | 769 | puts("*** ERROR: Cannot mount\n"); |
cbd8a35c | 770 | /* just to be sure... */ |
68c76a3a JH |
771 | nfs_state = STATE_UMOUNT_REQ; |
772 | nfs_send(); | |
cbd8a35c | 773 | } else { |
68c76a3a JH |
774 | nfs_state = STATE_LOOKUP_REQ; |
775 | nfs_send(); | |
cbd8a35c WD |
776 | } |
777 | break; | |
778 | ||
779 | case STATE_UMOUNT_REQ: | |
fa84fa70 | 780 | reply = nfs_umountall_reply(pkt, len); |
68c76a3a | 781 | if (reply == -NFS_RPC_DROP) { |
fa84fa70 | 782 | break; |
68c76a3a | 783 | } else if (reply == -NFS_RPC_ERR) { |
c9f6c91b | 784 | puts("*** ERROR: Cannot umount\n"); |
22f6e99d | 785 | net_set_state(NETLOOP_FAIL); |
cbd8a35c | 786 | } else { |
c9f6c91b | 787 | puts("\ndone\n"); |
22f6e99d | 788 | net_set_state(nfs_download_state); |
cbd8a35c WD |
789 | } |
790 | break; | |
791 | ||
792 | case STATE_LOOKUP_REQ: | |
fa84fa70 | 793 | reply = nfs_lookup_reply(pkt, len); |
68c76a3a | 794 | if (reply == -NFS_RPC_DROP) { |
fa84fa70 | 795 | break; |
68c76a3a | 796 | } else if (reply == -NFS_RPC_ERR) { |
c9f6c91b | 797 | puts("*** ERROR: File lookup fail\n"); |
68c76a3a JH |
798 | nfs_state = STATE_UMOUNT_REQ; |
799 | nfs_send(); | |
347a9015 JH |
800 | } else if (reply == -NFS_RPC_PROG_MISMATCH && |
801 | supported_nfs_versions != 0) { | |
b0baca98 GG |
802 | /* umount */ |
803 | nfs_state = STATE_UMOUNT_REQ; | |
804 | nfs_send(); | |
805 | /* And retry with another supported version */ | |
806 | nfs_state = STATE_PRCLOOKUP_PROG_MOUNT_REQ; | |
807 | nfs_send(); | |
cbd8a35c | 808 | } else { |
68c76a3a | 809 | nfs_state = STATE_READ_REQ; |
cbd8a35c WD |
810 | nfs_offset = 0; |
811 | nfs_len = NFS_READ_SIZE; | |
68c76a3a | 812 | nfs_send(); |
cbd8a35c WD |
813 | } |
814 | break; | |
815 | ||
816 | case STATE_READLINK_REQ: | |
fa84fa70 | 817 | reply = nfs_readlink_reply(pkt, len); |
68c76a3a | 818 | if (reply == -NFS_RPC_DROP) { |
fa84fa70 | 819 | break; |
68c76a3a | 820 | } else if (reply == -NFS_RPC_ERR) { |
c9f6c91b | 821 | puts("*** ERROR: Symlink fail\n"); |
68c76a3a JH |
822 | nfs_state = STATE_UMOUNT_REQ; |
823 | nfs_send(); | |
cbd8a35c | 824 | } else { |
0ebf04c6 | 825 | debug("Symlink --> %s\n", nfs_path); |
c9f6c91b JH |
826 | nfs_filename = basename(nfs_path); |
827 | nfs_path = dirname(nfs_path); | |
cbd8a35c | 828 | |
68c76a3a JH |
829 | nfs_state = STATE_MOUNT_REQ; |
830 | nfs_send(); | |
cbd8a35c WD |
831 | } |
832 | break; | |
833 | ||
834 | case STATE_READ_REQ: | |
c9f6c91b | 835 | rlen = nfs_read_reply(pkt, len); |
bc0571fc | 836 | net_set_timeout_handler(nfs_timeout, nfs_timeout_handler); |
cbd8a35c WD |
837 | if (rlen > 0) { |
838 | nfs_offset += rlen; | |
68c76a3a | 839 | nfs_send(); |
c9f6c91b | 840 | } else if ((rlen == -NFSERR_ISDIR) || (rlen == -NFSERR_INVAL)) { |
cbd8a35c | 841 | /* symbolic link */ |
68c76a3a JH |
842 | nfs_state = STATE_READLINK_REQ; |
843 | nfs_send(); | |
cbd8a35c | 844 | } else { |
c9f6c91b | 845 | if (!rlen) |
22f6e99d | 846 | nfs_download_state = NETLOOP_SUCCESS; |
b0baca98 GG |
847 | if (rlen < 0) |
848 | printf("NFS READ error (%d)\n", rlen); | |
68c76a3a JH |
849 | nfs_state = STATE_UMOUNT_REQ; |
850 | nfs_send(); | |
cbd8a35c WD |
851 | } |
852 | break; | |
853 | } | |
854 | } | |
855 | ||
cbd8a35c | 856 | |
68c76a3a | 857 | void nfs_start(void) |
cbd8a35c | 858 | { |
0ebf04c6 | 859 | debug("%s\n", __func__); |
22f6e99d | 860 | nfs_download_state = NETLOOP_FAIL; |
cbd8a35c | 861 | |
049a95a7 | 862 | nfs_server_ip = net_server_ip; |
cbd8a35c WD |
863 | nfs_path = (char *)nfs_path_buff; |
864 | ||
865 | if (nfs_path == NULL) { | |
22f6e99d | 866 | net_set_state(NETLOOP_FAIL); |
c9f6c91b | 867 | puts("*** ERROR: Fail allocate memory\n"); |
cbd8a35c WD |
868 | return; |
869 | } | |
870 | ||
1411157d | 871 | if (net_boot_file_name[0] == '\0') { |
f8b26c7a | 872 | sprintf(nfs_path, "/nfsroot/%02X%02X%02X%02X.img", |
049a95a7 JH |
873 | net_ip.s_addr & 0xFF, |
874 | (net_ip.s_addr >> 8) & 0xFF, | |
875 | (net_ip.s_addr >> 16) & 0xFF, | |
876 | (net_ip.s_addr >> 24) & 0xFF); | |
cbd8a35c | 877 | |
c9f6c91b | 878 | printf("*** Warning: no boot file name; using '%s'\n", |
68c76a3a | 879 | nfs_path); |
cbd8a35c | 880 | } else { |
1411157d | 881 | char *p = net_boot_file_name; |
cbd8a35c | 882 | |
c9f6c91b | 883 | p = strchr(p, ':'); |
cbd8a35c WD |
884 | |
885 | if (p != NULL) { | |
1411157d | 886 | nfs_server_ip = string_to_ip(net_boot_file_name); |
cbd8a35c | 887 | ++p; |
c9f6c91b | 888 | strcpy(nfs_path, p); |
cbd8a35c | 889 | } else { |
1411157d | 890 | strcpy(nfs_path, net_boot_file_name); |
cbd8a35c WD |
891 | } |
892 | } | |
893 | ||
c9f6c91b JH |
894 | nfs_filename = basename(nfs_path); |
895 | nfs_path = dirname(nfs_path); | |
cbd8a35c | 896 | |
c9f6c91b | 897 | printf("Using %s device\n", eth_get_name()); |
cbd8a35c | 898 | |
049a95a7 JH |
899 | printf("File transfer via NFS from server %pI4; our IP address is %pI4", |
900 | &nfs_server_ip, &net_ip); | |
cbd8a35c WD |
901 | |
902 | /* Check if we need to send across this subnet */ | |
049a95a7 JH |
903 | if (net_gateway.s_addr && net_netmask.s_addr) { |
904 | struct in_addr our_net; | |
905 | struct in_addr server_net; | |
cbd8a35c | 906 | |
049a95a7 JH |
907 | our_net.s_addr = net_ip.s_addr & net_netmask.s_addr; |
908 | server_net.s_addr = net_server_ip.s_addr & net_netmask.s_addr; | |
909 | if (our_net.s_addr != server_net.s_addr) | |
c9f6c91b | 910 | printf("; sending through gateway %pI4", |
68c76a3a | 911 | &net_gateway); |
cbd8a35c | 912 | } |
c9f6c91b | 913 | printf("\nFilename '%s/%s'.", nfs_path, nfs_filename); |
cbd8a35c | 914 | |
1411157d JH |
915 | if (net_boot_file_expected_size_in_blocks) { |
916 | printf(" Size is 0x%x Bytes = ", | |
917 | net_boot_file_expected_size_in_blocks << 9); | |
918 | print_size(net_boot_file_expected_size_in_blocks << 9, ""); | |
cbd8a35c | 919 | } |
c9f6c91b | 920 | printf("\nLoad address: 0x%lx\n" |
4b9206ed | 921 | "Loading: *\b", load_addr); |
cbd8a35c | 922 | |
bc0571fc | 923 | net_set_timeout_handler(nfs_timeout, nfs_timeout_handler); |
049a95a7 | 924 | net_set_udp_handler(nfs_handler); |
cbd8a35c | 925 | |
68c76a3a JH |
926 | nfs_timeout_count = 0; |
927 | nfs_state = STATE_PRCLOOKUP_PROG_MOUNT_REQ; | |
cbd8a35c | 928 | |
68c76a3a | 929 | /*nfs_our_port = 4096 + (get_ticks() % 3072);*/ |
cbd8a35c | 930 | /*FIX ME !!!*/ |
68c76a3a | 931 | nfs_our_port = 1000; |
cbd8a35c WD |
932 | |
933 | /* zero out server ether in case the server ip has changed */ | |
0adb5b76 | 934 | memset(net_server_ethaddr, 0, 6); |
cbd8a35c | 935 | |
68c76a3a | 936 | nfs_send(); |
cbd8a35c | 937 | } |