2 * NFS support driver - based on etherboot and U-BOOT's tftp.c
4 * Masami Komiya <mkomiya@sonare.it> 2004
8 /* NOTE: the NFS code is heavily inspired by the NetBSD netboot code (read:
9 * large portions are copied verbatim) as distributed in OSKit 0.97. A few
10 * changes were necessary to adapt the code to Etherboot and to fix several
11 * inconsistencies. Also the RPC message preparation is done "by hand" to
12 * avoid adding netsprintf() which I find hard to understand and use. */
14 /* NOTE 2: Etherboot does not care about things beyond the kernel image, so
15 * it loads the kernel image off the boot server (ARP_SERVER) and does not
16 * access the client root disk (root-path in dhcpd.conf), which would use
17 * ARP_ROOTSERVER. The root disk is something the operating system we are
18 * about to load needs to use. This is different from the OSKit 0.97 logic. */
20 /* NOTE 3: Symlink handling introduced by Anselm M Hoffmeister, 2003-July-14
21 * If a symlink is encountered, it is followed as far as possible (recursion
22 * possible, maximum 16 steps). There is no clearing of ".."'s inside the
23 * path, so please DON'T DO THAT. thx. */
33 #define HASHES_PER_LINE 65 /* Number of "loading" hashes per line */
34 #define NFS_RETRY_COUNT 30
35 #ifndef CONFIG_NFS_TIMEOUT
36 # define NFS_TIMEOUT 2000UL
38 # define NFS_TIMEOUT CONFIG_NFS_TIMEOUT
42 #define NFS_RPC_DROP 124
44 static int fs_mounted;
45 static unsigned long rpc_id;
46 static int nfs_offset = -1;
48 static ulong nfs_timeout = NFS_TIMEOUT;
50 static char dirfh[NFS_FHSIZE]; /* file handle of directory */
51 static char filefh[NFS_FHSIZE]; /* file handle of kernel image */
53 static enum net_loop_state nfs_download_state;
54 static struct in_addr nfs_server_ip;
55 static int nfs_server_mount_port;
56 static int nfs_server_port;
57 static int nfs_our_port;
58 static int nfs_timeout_count;
60 #define STATE_PRCLOOKUP_PROG_MOUNT_REQ 1
61 #define STATE_PRCLOOKUP_PROG_NFS_REQ 2
62 #define STATE_MOUNT_REQ 3
63 #define STATE_UMOUNT_REQ 4
64 #define STATE_LOOKUP_REQ 5
65 #define STATE_READ_REQ 6
66 #define STATE_READLINK_REQ 7
68 static char default_filename[64];
69 static char *nfs_filename;
70 static char *nfs_path;
71 static char nfs_path_buff[2048];
73 static inline int store_block(uchar *src, unsigned offset, unsigned len)
75 ulong newsize = offset + len;
76 #ifdef CONFIG_SYS_DIRECT_FLASH_NFS
79 for (i = 0; i < CONFIG_SYS_MAX_FLASH_BANKS; i++) {
80 /* start address in flash? */
81 if (load_addr + offset >= flash_info[i].start[0]) {
87 if (rc) { /* Flash is destination for this packet */
88 rc = flash_write((uchar *)src, (ulong)(load_addr+offset), len);
94 #endif /* CONFIG_SYS_DIRECT_FLASH_NFS */
96 void *ptr = map_sysmem(load_addr + offset, len);
98 memcpy(ptr, src, len);
102 if (net_boot_file_size < (offset + len))
103 net_boot_file_size = newsize;
107 static char *basename(char *path)
111 fname = path + strlen(path) - 1;
112 while (fname >= path) {
122 static char *dirname(char *path)
126 fname = basename(path);
132 /**************************************************************************
133 RPC_ADD_CREDENTIALS - Add RPC authentication/verifier entries
134 **************************************************************************/
135 static long *rpc_add_credentials(long *p)
141 strcpy(hostname, "");
142 hostnamelen = strlen(hostname);
144 /* Here's the executive summary on authentication requirements of the
145 * various NFS server implementations: Linux accepts both AUTH_NONE
146 * and AUTH_UNIX authentication (also accepts an empty hostname field
147 * in the AUTH_UNIX scheme). *BSD refuses AUTH_NONE, but accepts
148 * AUTH_UNIX (also accepts an empty hostname field in the AUTH_UNIX
149 * scheme). To be safe, use AUTH_UNIX and pass the hostname if we have
150 * it (if the BOOTP/DHCP reply didn't give one, just use an empty
153 hl = (hostnamelen + 3) & ~3;
155 /* Provide an AUTH_UNIX credential. */
156 *p++ = htonl(1); /* AUTH_UNIX */
157 *p++ = htonl(hl+20); /* auth length */
158 *p++ = htonl(0); /* stamp */
159 *p++ = htonl(hostnamelen); /* hostname string */
161 *(p + hostnamelen / 4) = 0; /* add zero padding */
162 memcpy(p, hostname, hostnamelen);
166 *p++ = 0; /* auxiliary gid list */
168 /* Provide an AUTH_NONE verifier. */
169 *p++ = 0; /* AUTH_NONE */
170 *p++ = 0; /* auth length */
175 /**************************************************************************
176 RPC_LOOKUP - Lookup RPC Port numbers
177 **************************************************************************/
178 static void rpc_req(int rpc_prog, int rpc_proc, uint32_t *data, int datalen)
187 pkt.u.call.id = htonl(id);
188 pkt.u.call.type = htonl(MSG_CALL);
189 pkt.u.call.rpcvers = htonl(2); /* use RPC version 2 */
190 pkt.u.call.prog = htonl(rpc_prog);
191 pkt.u.call.vers = htonl(2); /* portmapper is version 2 */
192 pkt.u.call.proc = htonl(rpc_proc);
193 p = (uint32_t *)&(pkt.u.call.data);
196 memcpy((char *)p, (char *)data, datalen*sizeof(uint32_t));
198 pktlen = (char *)p + datalen*sizeof(uint32_t) - (char *)&pkt;
200 memcpy((char *)net_tx_packet + net_eth_hdr_size() + IP_UDP_HDR_SIZE,
201 (char *)&pkt, pktlen);
203 if (rpc_prog == PROG_PORTMAP)
205 else if (rpc_prog == PROG_MOUNT)
206 sport = nfs_server_mount_port;
208 sport = nfs_server_port;
210 net_send_udp_packet(net_server_ethaddr, nfs_server_ip, sport,
211 nfs_our_port, pktlen);
214 /**************************************************************************
215 RPC_LOOKUP - Lookup RPC Port numbers
216 **************************************************************************/
217 static void rpc_lookup_req(int prog, int ver)
221 data[0] = 0; data[1] = 0; /* auth credential */
222 data[2] = 0; data[3] = 0; /* auth verifier */
223 data[4] = htonl(prog);
224 data[5] = htonl(ver);
225 data[6] = htonl(17); /* IP_UDP */
228 rpc_req(PROG_PORTMAP, PORTMAP_GETPORT, data, 8);
231 /**************************************************************************
232 NFS_MOUNT - Mount an NFS Filesystem
233 **************************************************************************/
234 static void nfs_mount_req(char *path)
241 pathlen = strlen(path);
244 p = (uint32_t *)rpc_add_credentials((long *)p);
246 *p++ = htonl(pathlen);
248 *(p + pathlen / 4) = 0;
249 memcpy(p, path, pathlen);
250 p += (pathlen + 3) / 4;
252 len = (uint32_t *)p - (uint32_t *)&(data[0]);
254 rpc_req(PROG_MOUNT, MOUNT_ADDENTRY, data, len);
257 /**************************************************************************
258 NFS_UMOUNTALL - Unmount all our NFS Filesystems on the Server
259 **************************************************************************/
260 static void nfs_umountall_req(void)
266 if ((nfs_server_mount_port == -1) || (!fs_mounted))
267 /* Nothing mounted, nothing to umount */
271 p = (uint32_t *)rpc_add_credentials((long *)p);
273 len = (uint32_t *)p - (uint32_t *)&(data[0]);
275 rpc_req(PROG_MOUNT, MOUNT_UMOUNTALL, data, len);
278 /***************************************************************************
279 * NFS_READLINK (AH 2003-07-14)
280 * This procedure is called when read of the first block fails -
281 * this probably happens when it's a directory or a symlink
282 * In case of successful readlink(), the dirname is manipulated,
283 * so that inside the nfs() function a recursion can be done.
284 **************************************************************************/
285 static void nfs_readlink_req(void)
292 p = (uint32_t *)rpc_add_credentials((long *)p);
294 memcpy(p, filefh, NFS_FHSIZE);
295 p += (NFS_FHSIZE / 4);
297 len = (uint32_t *)p - (uint32_t *)&(data[0]);
299 rpc_req(PROG_NFS, NFS_READLINK, data, len);
302 /**************************************************************************
303 NFS_LOOKUP - Lookup Pathname
304 **************************************************************************/
305 static void nfs_lookup_req(char *fname)
312 fnamelen = strlen(fname);
315 p = (uint32_t *)rpc_add_credentials((long *)p);
317 memcpy(p, dirfh, NFS_FHSIZE);
318 p += (NFS_FHSIZE / 4);
319 *p++ = htonl(fnamelen);
321 *(p + fnamelen / 4) = 0;
322 memcpy(p, fname, fnamelen);
323 p += (fnamelen + 3) / 4;
325 len = (uint32_t *)p - (uint32_t *)&(data[0]);
327 rpc_req(PROG_NFS, NFS_LOOKUP, data, len);
330 /**************************************************************************
331 NFS_READ - Read File on NFS Server
332 **************************************************************************/
333 static void nfs_read_req(int offset, int readlen)
340 p = (uint32_t *)rpc_add_credentials((long *)p);
342 memcpy(p, filefh, NFS_FHSIZE);
343 p += (NFS_FHSIZE / 4);
344 *p++ = htonl(offset);
345 *p++ = htonl(readlen);
348 len = (uint32_t *)p - (uint32_t *)&(data[0]);
350 rpc_req(PROG_NFS, NFS_READ, data, len);
353 /**************************************************************************
354 RPC request dispatcher
355 **************************************************************************/
356 static void nfs_send(void)
358 debug("%s\n", __func__);
361 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
362 rpc_lookup_req(PROG_MOUNT, 1);
364 case STATE_PRCLOOKUP_PROG_NFS_REQ:
365 rpc_lookup_req(PROG_NFS, 2);
367 case STATE_MOUNT_REQ:
368 nfs_mount_req(nfs_path);
370 case STATE_UMOUNT_REQ:
373 case STATE_LOOKUP_REQ:
374 nfs_lookup_req(nfs_filename);
377 nfs_read_req(nfs_offset, nfs_len);
379 case STATE_READLINK_REQ:
385 /**************************************************************************
386 Handlers for the reply from server
387 **************************************************************************/
389 static int rpc_lookup_reply(int prog, uchar *pkt, unsigned len)
391 struct rpc_t rpc_pkt;
393 memcpy((unsigned char *)&rpc_pkt, pkt, len);
395 debug("%s\n", __func__);
397 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
399 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
400 return -NFS_RPC_DROP;
402 if (rpc_pkt.u.reply.rstatus ||
403 rpc_pkt.u.reply.verifier ||
404 rpc_pkt.u.reply.astatus)
409 nfs_server_mount_port = ntohl(rpc_pkt.u.reply.data[0]);
412 nfs_server_port = ntohl(rpc_pkt.u.reply.data[0]);
419 static int nfs_mount_reply(uchar *pkt, unsigned len)
421 struct rpc_t rpc_pkt;
423 debug("%s\n", __func__);
425 memcpy((unsigned char *)&rpc_pkt, pkt, len);
427 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
429 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
430 return -NFS_RPC_DROP;
432 if (rpc_pkt.u.reply.rstatus ||
433 rpc_pkt.u.reply.verifier ||
434 rpc_pkt.u.reply.astatus ||
435 rpc_pkt.u.reply.data[0])
439 memcpy(dirfh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
444 static int nfs_umountall_reply(uchar *pkt, unsigned len)
446 struct rpc_t rpc_pkt;
448 debug("%s\n", __func__);
450 memcpy((unsigned char *)&rpc_pkt, pkt, len);
452 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
454 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
455 return -NFS_RPC_DROP;
457 if (rpc_pkt.u.reply.rstatus ||
458 rpc_pkt.u.reply.verifier ||
459 rpc_pkt.u.reply.astatus)
463 memset(dirfh, 0, sizeof(dirfh));
468 static int nfs_lookup_reply(uchar *pkt, unsigned len)
470 struct rpc_t rpc_pkt;
472 debug("%s\n", __func__);
474 memcpy((unsigned char *)&rpc_pkt, pkt, len);
476 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
478 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
479 return -NFS_RPC_DROP;
481 if (rpc_pkt.u.reply.rstatus ||
482 rpc_pkt.u.reply.verifier ||
483 rpc_pkt.u.reply.astatus ||
484 rpc_pkt.u.reply.data[0])
487 memcpy(filefh, rpc_pkt.u.reply.data + 1, NFS_FHSIZE);
492 static int nfs_readlink_reply(uchar *pkt, unsigned len)
494 struct rpc_t rpc_pkt;
497 debug("%s\n", __func__);
499 memcpy((unsigned char *)&rpc_pkt, pkt, len);
501 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
503 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
504 return -NFS_RPC_DROP;
506 if (rpc_pkt.u.reply.rstatus ||
507 rpc_pkt.u.reply.verifier ||
508 rpc_pkt.u.reply.astatus ||
509 rpc_pkt.u.reply.data[0])
512 rlen = ntohl(rpc_pkt.u.reply.data[1]); /* new path length */
514 if (*((char *)&(rpc_pkt.u.reply.data[2])) != '/') {
516 strcat(nfs_path, "/");
517 pathlen = strlen(nfs_path);
518 memcpy(nfs_path + pathlen, (uchar *)&(rpc_pkt.u.reply.data[2]),
520 nfs_path[pathlen + rlen] = 0;
522 memcpy(nfs_path, (uchar *)&(rpc_pkt.u.reply.data[2]), rlen);
528 static int nfs_read_reply(uchar *pkt, unsigned len)
530 struct rpc_t rpc_pkt;
533 debug("%s\n", __func__);
535 memcpy((uchar *)&rpc_pkt, pkt, sizeof(rpc_pkt.u.reply));
537 if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
539 else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
540 return -NFS_RPC_DROP;
542 if (rpc_pkt.u.reply.rstatus ||
543 rpc_pkt.u.reply.verifier ||
544 rpc_pkt.u.reply.astatus ||
545 rpc_pkt.u.reply.data[0]) {
546 if (rpc_pkt.u.reply.rstatus)
548 if (rpc_pkt.u.reply.astatus)
550 return -ntohl(rpc_pkt.u.reply.data[0]);
553 if ((nfs_offset != 0) && !((nfs_offset) %
554 (NFS_READ_SIZE / 2 * 10 * HASHES_PER_LINE)))
556 if (!(nfs_offset % ((NFS_READ_SIZE / 2) * 10)))
559 rlen = ntohl(rpc_pkt.u.reply.data[18]);
560 if (store_block((uchar *)pkt + sizeof(rpc_pkt.u.reply),
567 /**************************************************************************
569 **************************************************************************/
570 static void nfs_timeout_handler(void)
572 if (++nfs_timeout_count > NFS_RETRY_COUNT) {
573 puts("\nRetry count exceeded; starting again\n");
577 net_set_timeout_handler(nfs_timeout +
578 NFS_TIMEOUT * nfs_timeout_count,
579 nfs_timeout_handler);
584 static void nfs_handler(uchar *pkt, unsigned dest, struct in_addr sip,
585 unsigned src, unsigned len)
590 debug("%s\n", __func__);
592 if (dest != nfs_our_port)
596 case STATE_PRCLOOKUP_PROG_MOUNT_REQ:
597 if (rpc_lookup_reply(PROG_MOUNT, pkt, len) == -NFS_RPC_DROP)
599 nfs_state = STATE_PRCLOOKUP_PROG_NFS_REQ;
603 case STATE_PRCLOOKUP_PROG_NFS_REQ:
604 if (rpc_lookup_reply(PROG_NFS, pkt, len) == -NFS_RPC_DROP)
606 nfs_state = STATE_MOUNT_REQ;
610 case STATE_MOUNT_REQ:
611 reply = nfs_mount_reply(pkt, len);
612 if (reply == -NFS_RPC_DROP) {
614 } else if (reply == -NFS_RPC_ERR) {
615 puts("*** ERROR: Cannot mount\n");
616 /* just to be sure... */
617 nfs_state = STATE_UMOUNT_REQ;
620 nfs_state = STATE_LOOKUP_REQ;
625 case STATE_UMOUNT_REQ:
626 reply = nfs_umountall_reply(pkt, len);
627 if (reply == -NFS_RPC_DROP) {
629 } else if (reply == -NFS_RPC_ERR) {
630 puts("*** ERROR: Cannot umount\n");
631 net_set_state(NETLOOP_FAIL);
634 net_set_state(nfs_download_state);
638 case STATE_LOOKUP_REQ:
639 reply = nfs_lookup_reply(pkt, len);
640 if (reply == -NFS_RPC_DROP) {
642 } else if (reply == -NFS_RPC_ERR) {
643 puts("*** ERROR: File lookup fail\n");
644 nfs_state = STATE_UMOUNT_REQ;
647 nfs_state = STATE_READ_REQ;
649 nfs_len = NFS_READ_SIZE;
654 case STATE_READLINK_REQ:
655 reply = nfs_readlink_reply(pkt, len);
656 if (reply == -NFS_RPC_DROP) {
658 } else if (reply == -NFS_RPC_ERR) {
659 puts("*** ERROR: Symlink fail\n");
660 nfs_state = STATE_UMOUNT_REQ;
663 debug("Symlink --> %s\n", nfs_path);
664 nfs_filename = basename(nfs_path);
665 nfs_path = dirname(nfs_path);
667 nfs_state = STATE_MOUNT_REQ;
673 rlen = nfs_read_reply(pkt, len);
674 net_set_timeout_handler(nfs_timeout, nfs_timeout_handler);
678 } else if ((rlen == -NFSERR_ISDIR) || (rlen == -NFSERR_INVAL)) {
680 nfs_state = STATE_READLINK_REQ;
684 nfs_download_state = NETLOOP_SUCCESS;
685 nfs_state = STATE_UMOUNT_REQ;
695 debug("%s\n", __func__);
696 nfs_download_state = NETLOOP_FAIL;
698 nfs_server_ip = net_server_ip;
699 nfs_path = (char *)nfs_path_buff;
701 if (nfs_path == NULL) {
702 net_set_state(NETLOOP_FAIL);
703 puts("*** ERROR: Fail allocate memory\n");
707 if (net_boot_file_name[0] == '\0') {
708 sprintf(default_filename, "/nfsroot/%02X%02X%02X%02X.img",
709 net_ip.s_addr & 0xFF,
710 (net_ip.s_addr >> 8) & 0xFF,
711 (net_ip.s_addr >> 16) & 0xFF,
712 (net_ip.s_addr >> 24) & 0xFF);
713 strcpy(nfs_path, default_filename);
715 printf("*** Warning: no boot file name; using '%s'\n",
718 char *p = net_boot_file_name;
723 nfs_server_ip = string_to_ip(net_boot_file_name);
727 strcpy(nfs_path, net_boot_file_name);
731 nfs_filename = basename(nfs_path);
732 nfs_path = dirname(nfs_path);
734 printf("Using %s device\n", eth_get_name());
736 printf("File transfer via NFS from server %pI4; our IP address is %pI4",
737 &nfs_server_ip, &net_ip);
739 /* Check if we need to send across this subnet */
740 if (net_gateway.s_addr && net_netmask.s_addr) {
741 struct in_addr our_net;
742 struct in_addr server_net;
744 our_net.s_addr = net_ip.s_addr & net_netmask.s_addr;
745 server_net.s_addr = net_server_ip.s_addr & net_netmask.s_addr;
746 if (our_net.s_addr != server_net.s_addr)
747 printf("; sending through gateway %pI4",
750 printf("\nFilename '%s/%s'.", nfs_path, nfs_filename);
752 if (net_boot_file_expected_size_in_blocks) {
753 printf(" Size is 0x%x Bytes = ",
754 net_boot_file_expected_size_in_blocks << 9);
755 print_size(net_boot_file_expected_size_in_blocks << 9, "");
757 printf("\nLoad address: 0x%lx\n"
758 "Loading: *\b", load_addr);
760 net_set_timeout_handler(nfs_timeout, nfs_timeout_handler);
761 net_set_udp_handler(nfs_handler);
763 nfs_timeout_count = 0;
764 nfs_state = STATE_PRCLOOKUP_PROG_MOUNT_REQ;
766 /*nfs_our_port = 4096 + (get_ticks() % 3072);*/
770 /* zero out server ether in case the server ip has changed */
771 memset(net_server_ethaddr, 0, 6);