xref: /openbmc/u-boot/net/nfs.c (revision 3f82d89d)
1 /*
2  * NFS support driver - based on etherboot and U-BOOT's tftp.c
3  *
4  * Masami Komiya <mkomiya@sonare.it> 2004
5  *
6  */
7 
8 /* NOTE: the NFS code is heavily inspired by the NetBSD netboot code (read:
9  * large portions are copied verbatim) as distributed in OSKit 0.97.  A few
10  * changes were necessary to adapt the code to Etherboot and to fix several
11  * inconsistencies.  Also the RPC message preparation is done "by hand" to
12  * avoid adding netsprintf() which I find hard to understand and use.  */
13 
14 /* NOTE 2: Etherboot does not care about things beyond the kernel image, so
15  * it loads the kernel image off the boot server (ARP_SERVER) and does not
16  * access the client root disk (root-path in dhcpd.conf), which would use
17  * ARP_ROOTSERVER.  The root disk is something the operating system we are
18  * about to load needs to use.	This is different from the OSKit 0.97 logic.  */
19 
20 /* NOTE 3: Symlink handling introduced by Anselm M Hoffmeister, 2003-July-14
21  * If a symlink is encountered, it is followed as far as possible (recursion
22  * possible, maximum 16 steps). There is no clearing of ".."'s inside the
23  * path, so please DON'T DO THAT. thx. */
24 
25 #include <common.h>
26 #include <command.h>
27 #include <net.h>
28 #include <malloc.h>
29 #include "nfs.h"
30 #include "bootp.h"
31 
32 #define HASHES_PER_LINE 65	/* Number of "loading" hashes per line	*/
33 #define NFS_RETRY_COUNT 30
34 #define NFS_TIMEOUT 2000UL
35 
36 static int fs_mounted;
37 static unsigned long rpc_id;
38 static int nfs_offset = -1;
39 static int nfs_len;
40 
41 static char dirfh[NFS_FHSIZE];	/* file handle of directory */
42 static char filefh[NFS_FHSIZE]; /* file handle of kernel image */
43 
44 static enum net_loop_state nfs_download_state;
45 static IPaddr_t NfsServerIP;
46 static int	NfsSrvMountPort;
47 static int	NfsSrvNfsPort;
48 static int	NfsOurPort;
49 static int	NfsTimeoutCount;
50 static int	NfsState;
51 #define STATE_PRCLOOKUP_PROG_MOUNT_REQ	1
52 #define STATE_PRCLOOKUP_PROG_NFS_REQ	2
53 #define STATE_MOUNT_REQ			3
54 #define STATE_UMOUNT_REQ		4
55 #define STATE_LOOKUP_REQ		5
56 #define STATE_READ_REQ			6
57 #define STATE_READLINK_REQ		7
58 
59 static char default_filename[64];
60 static char *nfs_filename;
61 static char *nfs_path;
62 static char nfs_path_buff[2048];
63 
64 static inline int
65 store_block(uchar *src, unsigned offset, unsigned len)
66 {
67 	ulong newsize = offset + len;
68 #ifdef CONFIG_SYS_DIRECT_FLASH_NFS
69 	int i, rc = 0;
70 
71 	for (i = 0; i < CONFIG_SYS_MAX_FLASH_BANKS; i++) {
72 		/* start address in flash? */
73 		if (load_addr + offset >= flash_info[i].start[0]) {
74 			rc = 1;
75 			break;
76 		}
77 	}
78 
79 	if (rc) { /* Flash is destination for this packet */
80 		rc = flash_write((uchar *)src, (ulong)(load_addr+offset), len);
81 		if (rc) {
82 			flash_perror(rc);
83 			return -1;
84 		}
85 	} else
86 #endif /* CONFIG_SYS_DIRECT_FLASH_NFS */
87 	{
88 		(void)memcpy((void *)(load_addr + offset), src, len);
89 	}
90 
91 	if (NetBootFileXferSize < (offset+len))
92 		NetBootFileXferSize = newsize;
93 	return 0;
94 }
95 
96 static char*
97 basename(char *path)
98 {
99 	char *fname;
100 
101 	fname = path + strlen(path) - 1;
102 	while (fname >= path) {
103 		if (*fname == '/') {
104 			fname++;
105 			break;
106 		}
107 		fname--;
108 	}
109 	return fname;
110 }
111 
112 static char*
113 dirname(char *path)
114 {
115 	char *fname;
116 
117 	fname = basename(path);
118 	--fname;
119 	*fname = '\0';
120 	return path;
121 }
122 
123 /**************************************************************************
124 RPC_ADD_CREDENTIALS - Add RPC authentication/verifier entries
125 **************************************************************************/
126 static long *rpc_add_credentials(long *p)
127 {
128 	int hl;
129 	int hostnamelen;
130 	char hostname[256];
131 
132 	strcpy(hostname, "");
133 	hostnamelen = strlen(hostname);
134 
135 	/* Here's the executive summary on authentication requirements of the
136 	 * various NFS server implementations:	Linux accepts both AUTH_NONE
137 	 * and AUTH_UNIX authentication (also accepts an empty hostname field
138 	 * in the AUTH_UNIX scheme).  *BSD refuses AUTH_NONE, but accepts
139 	 * AUTH_UNIX (also accepts an empty hostname field in the AUTH_UNIX
140 	 * scheme).  To be safe, use AUTH_UNIX and pass the hostname if we have
141 	 * it (if the BOOTP/DHCP reply didn't give one, just use an empty
142 	 * hostname).  */
143 
144 	hl = (hostnamelen + 3) & ~3;
145 
146 	/* Provide an AUTH_UNIX credential.  */
147 	*p++ = htonl(1);		/* AUTH_UNIX */
148 	*p++ = htonl(hl+20);		/* auth length */
149 	*p++ = htonl(0);		/* stamp */
150 	*p++ = htonl(hostnamelen);	/* hostname string */
151 	if (hostnamelen & 3)
152 		*(p + hostnamelen / 4) = 0; /* add zero padding */
153 	memcpy(p, hostname, hostnamelen);
154 	p += hl / 4;
155 	*p++ = 0;			/* uid */
156 	*p++ = 0;			/* gid */
157 	*p++ = 0;			/* auxiliary gid list */
158 
159 	/* Provide an AUTH_NONE verifier.  */
160 	*p++ = 0;			/* AUTH_NONE */
161 	*p++ = 0;			/* auth length */
162 
163 	return p;
164 }
165 
166 /**************************************************************************
167 RPC_LOOKUP - Lookup RPC Port numbers
168 **************************************************************************/
169 static void
170 rpc_req(int rpc_prog, int rpc_proc, uint32_t *data, int datalen)
171 {
172 	struct rpc_t pkt;
173 	unsigned long id;
174 	uint32_t *p;
175 	int pktlen;
176 	int sport;
177 
178 	id = ++rpc_id;
179 	pkt.u.call.id = htonl(id);
180 	pkt.u.call.type = htonl(MSG_CALL);
181 	pkt.u.call.rpcvers = htonl(2);	/* use RPC version 2 */
182 	pkt.u.call.prog = htonl(rpc_prog);
183 	pkt.u.call.vers = htonl(2);	/* portmapper is version 2 */
184 	pkt.u.call.proc = htonl(rpc_proc);
185 	p = (uint32_t *)&(pkt.u.call.data);
186 
187 	if (datalen)
188 		memcpy((char *)p, (char *)data, datalen*sizeof(uint32_t));
189 
190 	pktlen = (char *)p + datalen*sizeof(uint32_t) - (char *)&pkt;
191 
192 	memcpy((char *)NetTxPacket + NetEthHdrSize() + IP_UDP_HDR_SIZE,
193 		(char *)&pkt, pktlen);
194 
195 	if (rpc_prog == PROG_PORTMAP)
196 		sport = SUNRPC_PORT;
197 	else if (rpc_prog == PROG_MOUNT)
198 		sport = NfsSrvMountPort;
199 	else
200 		sport = NfsSrvNfsPort;
201 
202 	NetSendUDPPacket(NetServerEther, NfsServerIP, sport, NfsOurPort,
203 		pktlen);
204 }
205 
206 /**************************************************************************
207 RPC_LOOKUP - Lookup RPC Port numbers
208 **************************************************************************/
209 static void
210 rpc_lookup_req(int prog, int ver)
211 {
212 	uint32_t data[16];
213 
214 	data[0] = 0; data[1] = 0;	/* auth credential */
215 	data[2] = 0; data[3] = 0;	/* auth verifier */
216 	data[4] = htonl(prog);
217 	data[5] = htonl(ver);
218 	data[6] = htonl(17);	/* IP_UDP */
219 	data[7] = 0;
220 
221 	rpc_req(PROG_PORTMAP, PORTMAP_GETPORT, data, 8);
222 }
223 
224 /**************************************************************************
225 NFS_MOUNT - Mount an NFS Filesystem
226 **************************************************************************/
227 static void
228 nfs_mount_req(char *path)
229 {
230 	uint32_t data[1024];
231 	uint32_t *p;
232 	int len;
233 	int pathlen;
234 
235 	pathlen = strlen(path);
236 
237 	p = &(data[0]);
238 	p = (uint32_t *)rpc_add_credentials((long *)p);
239 
240 	*p++ = htonl(pathlen);
241 	if (pathlen & 3)
242 		*(p + pathlen / 4) = 0;
243 	memcpy(p, path, pathlen);
244 	p += (pathlen + 3) / 4;
245 
246 	len = (uint32_t *)p - (uint32_t *)&(data[0]);
247 
248 	rpc_req(PROG_MOUNT, MOUNT_ADDENTRY, data, len);
249 }
250 
251 /**************************************************************************
252 NFS_UMOUNTALL - Unmount all our NFS Filesystems on the Server
253 **************************************************************************/
254 static void
255 nfs_umountall_req(void)
256 {
257 	uint32_t data[1024];
258 	uint32_t *p;
259 	int len;
260 
261 	if ((NfsSrvMountPort == -1) || (!fs_mounted))
262 		/* Nothing mounted, nothing to umount */
263 		return;
264 
265 	p = &(data[0]);
266 	p = (uint32_t *)rpc_add_credentials((long *)p);
267 
268 	len = (uint32_t *)p - (uint32_t *)&(data[0]);
269 
270 	rpc_req(PROG_MOUNT, MOUNT_UMOUNTALL, data, len);
271 }
272 
273 /***************************************************************************
274  * NFS_READLINK (AH 2003-07-14)
275  * This procedure is called when read of the first block fails -
276  * this probably happens when it's a directory or a symlink
277  * In case of successful readlink(), the dirname is manipulated,
278  * so that inside the nfs() function a recursion can be done.
279  **************************************************************************/
280 static void
281 nfs_readlink_req(void)
282 {
283 	uint32_t data[1024];
284 	uint32_t *p;
285 	int len;
286 
287 	p = &(data[0]);
288 	p = (uint32_t *)rpc_add_credentials((long *)p);
289 
290 	memcpy(p, filefh, NFS_FHSIZE);
291 	p += (NFS_FHSIZE / 4);
292 
293 	len = (uint32_t *)p - (uint32_t *)&(data[0]);
294 
295 	rpc_req(PROG_NFS, NFS_READLINK, data, len);
296 }
297 
298 /**************************************************************************
299 NFS_LOOKUP - Lookup Pathname
300 **************************************************************************/
301 static void
302 nfs_lookup_req(char *fname)
303 {
304 	uint32_t data[1024];
305 	uint32_t *p;
306 	int len;
307 	int fnamelen;
308 
309 	fnamelen = strlen(fname);
310 
311 	p = &(data[0]);
312 	p = (uint32_t *)rpc_add_credentials((long *)p);
313 
314 	memcpy(p, dirfh, NFS_FHSIZE);
315 	p += (NFS_FHSIZE / 4);
316 	*p++ = htonl(fnamelen);
317 	if (fnamelen & 3)
318 		*(p + fnamelen / 4) = 0;
319 	memcpy(p, fname, fnamelen);
320 	p += (fnamelen + 3) / 4;
321 
322 	len = (uint32_t *)p - (uint32_t *)&(data[0]);
323 
324 	rpc_req(PROG_NFS, NFS_LOOKUP, data, len);
325 }
326 
327 /**************************************************************************
328 NFS_READ - Read File on NFS Server
329 **************************************************************************/
330 static void
331 nfs_read_req(int offset, int readlen)
332 {
333 	uint32_t data[1024];
334 	uint32_t *p;
335 	int len;
336 
337 	p = &(data[0]);
338 	p = (uint32_t *)rpc_add_credentials((long *)p);
339 
340 	memcpy(p, filefh, NFS_FHSIZE);
341 	p += (NFS_FHSIZE / 4);
342 	*p++ = htonl(offset);
343 	*p++ = htonl(readlen);
344 	*p++ = 0;
345 
346 	len = (uint32_t *)p - (uint32_t *)&(data[0]);
347 
348 	rpc_req(PROG_NFS, NFS_READ, data, len);
349 }
350 
351 /**************************************************************************
352 RPC request dispatcher
353 **************************************************************************/
354 
355 static void
356 NfsSend(void)
357 {
358 	debug("%s\n", __func__);
359 
360 	switch (NfsState) {
361 	case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
362 		rpc_lookup_req(PROG_MOUNT, 1);
363 		break;
364 	case STATE_PRCLOOKUP_PROG_NFS_REQ:
365 		rpc_lookup_req(PROG_NFS, 2);
366 		break;
367 	case STATE_MOUNT_REQ:
368 		nfs_mount_req(nfs_path);
369 		break;
370 	case STATE_UMOUNT_REQ:
371 		nfs_umountall_req();
372 		break;
373 	case STATE_LOOKUP_REQ:
374 		nfs_lookup_req(nfs_filename);
375 		break;
376 	case STATE_READ_REQ:
377 		nfs_read_req(nfs_offset, nfs_len);
378 		break;
379 	case STATE_READLINK_REQ:
380 		nfs_readlink_req();
381 		break;
382 	}
383 }
384 
385 /**************************************************************************
386 Handlers for the reply from server
387 **************************************************************************/
388 
389 static int
390 rpc_lookup_reply(int prog, uchar *pkt, unsigned len)
391 {
392 	struct rpc_t rpc_pkt;
393 
394 	memcpy((unsigned char *)&rpc_pkt, pkt, len);
395 
396 	debug("%s\n", __func__);
397 
398 	if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
399 		return -1;
400 
401 	if (rpc_pkt.u.reply.rstatus  ||
402 	    rpc_pkt.u.reply.verifier ||
403 	    rpc_pkt.u.reply.astatus)
404 		return -1;
405 
406 	switch (prog) {
407 	case PROG_MOUNT:
408 		NfsSrvMountPort = ntohl(rpc_pkt.u.reply.data[0]);
409 		break;
410 	case PROG_NFS:
411 		NfsSrvNfsPort = ntohl(rpc_pkt.u.reply.data[0]);
412 		break;
413 	}
414 
415 	return 0;
416 }
417 
418 static int
419 nfs_mount_reply(uchar *pkt, unsigned len)
420 {
421 	struct rpc_t rpc_pkt;
422 
423 	debug("%s\n", __func__);
424 
425 	memcpy((unsigned char *)&rpc_pkt, pkt, len);
426 
427 	if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
428 		return -1;
429 
430 	if (rpc_pkt.u.reply.rstatus  ||
431 	    rpc_pkt.u.reply.verifier ||
432 	    rpc_pkt.u.reply.astatus  ||
433 	    rpc_pkt.u.reply.data[0])
434 		return -1;
435 
436 	fs_mounted = 1;
437 	memcpy(dirfh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
438 
439 	return 0;
440 }
441 
442 static int
443 nfs_umountall_reply(uchar *pkt, unsigned len)
444 {
445 	struct rpc_t rpc_pkt;
446 
447 	debug("%s\n", __func__);
448 
449 	memcpy((unsigned char *)&rpc_pkt, pkt, len);
450 
451 	if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
452 		return -1;
453 
454 	if (rpc_pkt.u.reply.rstatus  ||
455 	    rpc_pkt.u.reply.verifier ||
456 	    rpc_pkt.u.reply.astatus)
457 		return -1;
458 
459 	fs_mounted = 0;
460 	memset(dirfh, 0, sizeof(dirfh));
461 
462 	return 0;
463 }
464 
465 static int
466 nfs_lookup_reply(uchar *pkt, unsigned len)
467 {
468 	struct rpc_t rpc_pkt;
469 
470 	debug("%s\n", __func__);
471 
472 	memcpy((unsigned char *)&rpc_pkt, pkt, len);
473 
474 	if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
475 		return -1;
476 
477 	if (rpc_pkt.u.reply.rstatus  ||
478 	    rpc_pkt.u.reply.verifier ||
479 	    rpc_pkt.u.reply.astatus  ||
480 	    rpc_pkt.u.reply.data[0])
481 		return -1;
482 
483 	memcpy(filefh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
484 
485 	return 0;
486 }
487 
488 static int
489 nfs_readlink_reply(uchar *pkt, unsigned len)
490 {
491 	struct rpc_t rpc_pkt;
492 	int rlen;
493 
494 	debug("%s\n", __func__);
495 
496 	memcpy((unsigned char *)&rpc_pkt, pkt, len);
497 
498 	if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
499 		return -1;
500 
501 	if (rpc_pkt.u.reply.rstatus  ||
502 	    rpc_pkt.u.reply.verifier ||
503 	    rpc_pkt.u.reply.astatus  ||
504 	    rpc_pkt.u.reply.data[0])
505 		return -1;
506 
507 	rlen = ntohl(rpc_pkt.u.reply.data[1]); /* new path length */
508 
509 	if (*((char *)&(rpc_pkt.u.reply.data[2])) != '/') {
510 		int pathlen;
511 		strcat(nfs_path, "/");
512 		pathlen = strlen(nfs_path);
513 		memcpy(nfs_path + pathlen, (uchar *)&(rpc_pkt.u.reply.data[2]),
514 			rlen);
515 		nfs_path[pathlen + rlen] = 0;
516 	} else {
517 		memcpy(nfs_path, (uchar *)&(rpc_pkt.u.reply.data[2]), rlen);
518 		nfs_path[rlen] = 0;
519 	}
520 	return 0;
521 }
522 
523 static int
524 nfs_read_reply(uchar *pkt, unsigned len)
525 {
526 	struct rpc_t rpc_pkt;
527 	int rlen;
528 
529 	debug("%s\n", __func__);
530 
531 	memcpy((uchar *)&rpc_pkt, pkt, sizeof(rpc_pkt.u.reply));
532 
533 	if (ntohl(rpc_pkt.u.reply.id) != rpc_id)
534 		return -1;
535 
536 	if (rpc_pkt.u.reply.rstatus  ||
537 	    rpc_pkt.u.reply.verifier ||
538 	    rpc_pkt.u.reply.astatus  ||
539 	    rpc_pkt.u.reply.data[0]) {
540 		if (rpc_pkt.u.reply.rstatus)
541 			return -9999;
542 		if (rpc_pkt.u.reply.astatus)
543 			return -9999;
544 		return -ntohl(rpc_pkt.u.reply.data[0]);
545 	}
546 
547 	if ((nfs_offset != 0) && !((nfs_offset) %
548 			(NFS_READ_SIZE / 2 * 10 * HASHES_PER_LINE)))
549 		puts("\n\t ");
550 	if (!(nfs_offset % ((NFS_READ_SIZE / 2) * 10)))
551 		putc('#');
552 
553 	rlen = ntohl(rpc_pkt.u.reply.data[18]);
554 	if (store_block((uchar *)pkt + sizeof(rpc_pkt.u.reply),
555 			nfs_offset, rlen))
556 		return -9999;
557 
558 	return rlen;
559 }
560 
561 /**************************************************************************
562 Interfaces of U-BOOT
563 **************************************************************************/
564 
565 static void
566 NfsTimeout(void)
567 {
568 	if (++NfsTimeoutCount > NFS_RETRY_COUNT) {
569 		puts("\nRetry count exceeded; starting again\n");
570 		NetStartAgain();
571 	} else {
572 		puts("T ");
573 		NetSetTimeout(NFS_TIMEOUT, NfsTimeout);
574 		NfsSend();
575 	}
576 }
577 
578 static void
579 NfsHandler(uchar *pkt, unsigned dest, IPaddr_t sip, unsigned src, unsigned len)
580 {
581 	int rlen;
582 
583 	debug("%s\n", __func__);
584 
585 	if (dest != NfsOurPort)
586 		return;
587 
588 	switch (NfsState) {
589 	case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
590 		rpc_lookup_reply(PROG_MOUNT, pkt, len);
591 		NfsState = STATE_PRCLOOKUP_PROG_NFS_REQ;
592 		NfsSend();
593 		break;
594 
595 	case STATE_PRCLOOKUP_PROG_NFS_REQ:
596 		rpc_lookup_reply(PROG_NFS, pkt, len);
597 		NfsState = STATE_MOUNT_REQ;
598 		NfsSend();
599 		break;
600 
601 	case STATE_MOUNT_REQ:
602 		if (nfs_mount_reply(pkt, len)) {
603 			puts("*** ERROR: Cannot mount\n");
604 			/* just to be sure... */
605 			NfsState = STATE_UMOUNT_REQ;
606 			NfsSend();
607 		} else {
608 			NfsState = STATE_LOOKUP_REQ;
609 			NfsSend();
610 		}
611 		break;
612 
613 	case STATE_UMOUNT_REQ:
614 		if (nfs_umountall_reply(pkt, len)) {
615 			puts("*** ERROR: Cannot umount\n");
616 			net_set_state(NETLOOP_FAIL);
617 		} else {
618 			puts("\ndone\n");
619 			net_set_state(nfs_download_state);
620 		}
621 		break;
622 
623 	case STATE_LOOKUP_REQ:
624 		if (nfs_lookup_reply(pkt, len)) {
625 			puts("*** ERROR: File lookup fail\n");
626 			NfsState = STATE_UMOUNT_REQ;
627 			NfsSend();
628 		} else {
629 			NfsState = STATE_READ_REQ;
630 			nfs_offset = 0;
631 			nfs_len = NFS_READ_SIZE;
632 			NfsSend();
633 		}
634 		break;
635 
636 	case STATE_READLINK_REQ:
637 		if (nfs_readlink_reply(pkt, len)) {
638 			puts("*** ERROR: Symlink fail\n");
639 			NfsState = STATE_UMOUNT_REQ;
640 			NfsSend();
641 		} else {
642 			debug("Symlink --> %s\n", nfs_path);
643 			nfs_filename = basename(nfs_path);
644 			nfs_path     = dirname(nfs_path);
645 
646 			NfsState = STATE_MOUNT_REQ;
647 			NfsSend();
648 		}
649 		break;
650 
651 	case STATE_READ_REQ:
652 		rlen = nfs_read_reply(pkt, len);
653 		NetSetTimeout(NFS_TIMEOUT, NfsTimeout);
654 		if (rlen > 0) {
655 			nfs_offset += rlen;
656 			NfsSend();
657 		} else if ((rlen == -NFSERR_ISDIR) || (rlen == -NFSERR_INVAL)) {
658 			/* symbolic link */
659 			NfsState = STATE_READLINK_REQ;
660 			NfsSend();
661 		} else {
662 			if (!rlen)
663 				nfs_download_state = NETLOOP_SUCCESS;
664 			NfsState = STATE_UMOUNT_REQ;
665 			NfsSend();
666 		}
667 		break;
668 	}
669 }
670 
671 
672 void
673 NfsStart(void)
674 {
675 	debug("%s\n", __func__);
676 	nfs_download_state = NETLOOP_FAIL;
677 
678 	NfsServerIP = NetServerIP;
679 	nfs_path = (char *)nfs_path_buff;
680 
681 	if (nfs_path == NULL) {
682 		net_set_state(NETLOOP_FAIL);
683 		puts("*** ERROR: Fail allocate memory\n");
684 		return;
685 	}
686 
687 	if (BootFile[0] == '\0') {
688 		sprintf(default_filename, "/nfsroot/%02X%02X%02X%02X.img",
689 			NetOurIP & 0xFF,
690 			(NetOurIP >>  8) & 0xFF,
691 			(NetOurIP >> 16) & 0xFF,
692 			(NetOurIP >> 24) & 0xFF);
693 		strcpy(nfs_path, default_filename);
694 
695 		printf("*** Warning: no boot file name; using '%s'\n",
696 			nfs_path);
697 	} else {
698 		char *p = BootFile;
699 
700 		p = strchr(p, ':');
701 
702 		if (p != NULL) {
703 			NfsServerIP = string_to_ip(BootFile);
704 			++p;
705 			strcpy(nfs_path, p);
706 		} else {
707 			strcpy(nfs_path, BootFile);
708 		}
709 	}
710 
711 	nfs_filename = basename(nfs_path);
712 	nfs_path     = dirname(nfs_path);
713 
714 	printf("Using %s device\n", eth_get_name());
715 
716 	printf("File transfer via NFS from server %pI4"
717 		"; our IP address is %pI4", &NfsServerIP, &NetOurIP);
718 
719 	/* Check if we need to send across this subnet */
720 	if (NetOurGatewayIP && NetOurSubnetMask) {
721 		IPaddr_t OurNet	    = NetOurIP	  & NetOurSubnetMask;
722 		IPaddr_t ServerNet  = NetServerIP & NetOurSubnetMask;
723 
724 		if (OurNet != ServerNet)
725 			printf("; sending through gateway %pI4",
726 				&NetOurGatewayIP);
727 	}
728 	printf("\nFilename '%s/%s'.", nfs_path, nfs_filename);
729 
730 	if (NetBootFileSize) {
731 		printf(" Size is 0x%x Bytes = ", NetBootFileSize<<9);
732 		print_size(NetBootFileSize<<9, "");
733 	}
734 	printf("\nLoad address: 0x%lx\n"
735 		"Loading: *\b", load_addr);
736 
737 	NetSetTimeout(NFS_TIMEOUT, NfsTimeout);
738 	net_set_udp_handler(NfsHandler);
739 
740 	NfsTimeoutCount = 0;
741 	NfsState = STATE_PRCLOOKUP_PROG_MOUNT_REQ;
742 
743 	/*NfsOurPort = 4096 + (get_ticks() % 3072);*/
744 	/*FIX ME !!!*/
745 	NfsOurPort = 1000;
746 
747 	/* zero out server ether in case the server ip has changed */
748 	memset(NetServerEther, 0, 6);
749 
750 	NfsSend();
751 }
752