mkbootimage.c revision 1.6.2.2 1 1.6.2.2 mjf /* $NetBSD: mkbootimage.c,v 1.6.2.2 2008/02/18 21:04:59 mjf Exp $ */
2 1.6.2.2 mjf
3 1.6.2.2 mjf /*-
4 1.6.2.2 mjf * Copyright (c) 2007 The NetBSD Foundation, Inc.
5 1.6.2.2 mjf * All rights reserved.
6 1.6.2.2 mjf *
7 1.6.2.2 mjf * This code is derived from software contributed to The NetBSD Foundation
8 1.6.2.2 mjf * by Tim Rightnour and NONAKA Kimihiro
9 1.6.2.2 mjf *
10 1.6.2.2 mjf * Redistribution and use in source and binary forms, with or without
11 1.6.2.2 mjf * modification, are permitted provided that the following conditions
12 1.6.2.2 mjf * are met:
13 1.6.2.2 mjf * 1. Redistributions of source code must retain the above copyright
14 1.6.2.2 mjf * notice, this list of conditions and the following disclaimer.
15 1.6.2.2 mjf * 2. Redistributions in binary form must reproduce the above copyright
16 1.6.2.2 mjf * notice, this list of conditions and the following disclaimer in the
17 1.6.2.2 mjf * documentation and/or other materials provided with the distribution.
18 1.6.2.2 mjf * 3. All advertising materials mentioning features or use of this software
19 1.6.2.2 mjf * must display the following acknowledgement:
20 1.6.2.2 mjf * This product includes software developed by the NetBSD
21 1.6.2.2 mjf * Foundation, Inc. and its contributors.
22 1.6.2.2 mjf * 4. Neither the name of The NetBSD Foundation nor the names of its
23 1.6.2.2 mjf * contributors may be used to endorse or promote products derived
24 1.6.2.2 mjf * from this software without specific prior written permission.
25 1.6.2.2 mjf *
26 1.6.2.2 mjf * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 1.6.2.2 mjf * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 1.6.2.2 mjf * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 1.6.2.2 mjf * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 1.6.2.2 mjf * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 1.6.2.2 mjf * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 1.6.2.2 mjf * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 1.6.2.2 mjf * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 1.6.2.2 mjf * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 1.6.2.2 mjf * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 1.6.2.2 mjf * POSSIBILITY OF SUCH DAMAGE.
37 1.6.2.2 mjf */
38 1.6.2.2 mjf
39 1.6.2.2 mjf #if HAVE_NBTOOL_CONFIG_H
40 1.6.2.2 mjf #include "nbtool_config.h"
41 1.6.2.2 mjf #include "../../sys/sys/bootblock.h"
42 1.6.2.2 mjf #else
43 1.6.2.2 mjf #include <sys/bootblock.h>
44 1.6.2.2 mjf #endif
45 1.6.2.2 mjf
46 1.6.2.2 mjf #include <stdio.h>
47 1.6.2.2 mjf #include <stdlib.h>
48 1.6.2.2 mjf #include <string.h>
49 1.6.2.2 mjf #include <fcntl.h>
50 1.6.2.2 mjf #include <unistd.h>
51 1.6.2.2 mjf #include <errno.h>
52 1.6.2.2 mjf #include <zlib.h>
53 1.6.2.2 mjf #include <err.h>
54 1.6.2.2 mjf #include <sys/stat.h>
55 1.6.2.2 mjf #include <sys/types.h>
56 1.6.2.2 mjf #include <sys/uio.h>
57 1.6.2.2 mjf
58 1.6.2.2 mjf #ifdef __NetBSD__
59 1.6.2.2 mjf #include <sys/sysctl.h>
60 1.6.2.2 mjf #include <sys/utsname.h>
61 1.6.2.2 mjf #endif
62 1.6.2.2 mjf
63 1.6.2.2 mjf /* BFD ELF headers */
64 1.6.2.2 mjf #include <elf/common.h>
65 1.6.2.2 mjf #include <elf/external.h>
66 1.6.2.2 mjf
67 1.6.2.2 mjf #include "bebox_bootrec.h"
68 1.6.2.2 mjf #include "byteorder.h"
69 1.6.2.2 mjf #include "magic.h"
70 1.6.2.2 mjf #include "pef.h"
71 1.6.2.2 mjf #include "rs6000_bootrec.h"
72 1.6.2.2 mjf
73 1.6.2.2 mjf /* Globals */
74 1.6.2.2 mjf
75 1.6.2.2 mjf int saloneflag = 0;
76 1.6.2.2 mjf int verboseflag = 0;
77 1.6.2.2 mjf int lfloppyflag = 0;
78 1.6.2.2 mjf Elf32_External_Ehdr hdr, khdr;
79 1.6.2.2 mjf struct stat elf_stat;
80 1.6.2.2 mjf unsigned char mbr[512];
81 1.6.2.2 mjf
82 1.6.2.2 mjf /* the boot and config records for rs6000 */
83 1.6.2.2 mjf rs6000_boot_record_t bootrec;
84 1.6.2.2 mjf rs6000_config_record_t confrec;
85 1.6.2.2 mjf
86 1.6.2.2 mjf /* supported platforms */
87 1.6.2.2 mjf char *sup_plats[] = {
88 1.6.2.2 mjf "bebox",
89 1.6.2.2 mjf "prep",
90 1.6.2.2 mjf "rs6000",
91 1.6.2.2 mjf NULL,
92 1.6.2.2 mjf };
93 1.6.2.2 mjf
94 1.6.2.2 mjf /*
95 1.6.2.2 mjf * Macros to get values from multi-byte ELF header fields. These assume
96 1.6.2.2 mjf * a big-endian image.
97 1.6.2.2 mjf */
98 1.6.2.2 mjf #define ELFGET16(x) (((x)[0] << 8) | (x)[1])
99 1.6.2.2 mjf
100 1.6.2.2 mjf #define ELFGET32(x) (((x)[0] << 24) | ((x)[1] << 16) | \
101 1.6.2.2 mjf ((x)[2] << 8) | (x)[3])
102 1.6.2.2 mjf
103 1.6.2.2 mjf #define ULALIGN(x) ((x + 0x0f) & 0xfffffff0)
104 1.6.2.2 mjf
105 1.6.2.2 mjf static void usage(int);
106 1.6.2.2 mjf static int open_file(const char *, char *, Elf32_External_Ehdr *,
107 1.6.2.2 mjf struct stat *);
108 1.6.2.2 mjf static void check_mbr(int, char *);
109 1.6.2.2 mjf static int prep_build_image(char *, char *, char *, char *);
110 1.6.2.2 mjf static void rs6000_build_records(int);
111 1.6.2.2 mjf static int rs6000_build_image(char *, char *, char *, char *);
112 1.6.2.2 mjf int main(int, char **);
113 1.6.2.2 mjf
114 1.6.2.2 mjf
115 1.6.2.2 mjf static void
116 1.6.2.2 mjf usage(int extended)
117 1.6.2.2 mjf {
118 1.6.2.2 mjf int i;
119 1.6.2.2 mjf
120 1.6.2.2 mjf if (extended) {
121 1.6.2.2 mjf fprintf(stderr, "You are not running this program on"
122 1.6.2.2 mjf " the target machine. You must supply the\n"
123 1.6.2.2 mjf "machine architecture with the -m flag\n");
124 1.6.2.2 mjf fprintf(stderr, "Supported architectures: ");
125 1.6.2.2 mjf for (i=0; sup_plats[i] != NULL; i++)
126 1.6.2.2 mjf fprintf(stderr, " %s", sup_plats[i]);
127 1.6.2.2 mjf fprintf(stderr, "\n\n");
128 1.6.2.2 mjf }
129 1.6.2.2 mjf #ifdef __NetBSD__
130 1.6.2.2 mjf fprintf(stderr, "usage: %s [-lsv] [-m machine_arch] [-b bootfile] "
131 1.6.2.2 mjf "[-k kernel] [-r rawdev] bootimage\n", getprogname());
132 1.6.2.2 mjf #else
133 1.6.2.2 mjf fprintf(stderr, "usage: %s [-lsv] -m machine_arch [-b bootfile] "
134 1.6.2.2 mjf "[-k kernel] [-r rawdev] bootimage\n", getprogname());
135 1.6.2.2 mjf #endif
136 1.6.2.2 mjf exit(1);
137 1.6.2.2 mjf }
138 1.6.2.2 mjf
139 1.6.2.2 mjf /* verify the file is ELF and ppc, and open it up */
140 1.6.2.2 mjf static int
141 1.6.2.2 mjf open_file(const char *ftype, char *file, Elf32_External_Ehdr *hdr,
142 1.6.2.2 mjf struct stat *f_stat)
143 1.6.2.2 mjf {
144 1.6.2.2 mjf int fd;
145 1.6.2.2 mjf
146 1.6.2.2 mjf if ((fd = open(file, 0)) < 0)
147 1.6.2.2 mjf errx(2, "Can't open %s '%s': %s", ftype, file, strerror(errno));
148 1.6.2.2 mjf fstat(fd, f_stat);
149 1.6.2.2 mjf
150 1.6.2.2 mjf if (read(fd, hdr, sizeof(Elf32_External_Ehdr)) !=
151 1.6.2.2 mjf sizeof(Elf32_External_Ehdr))
152 1.6.2.2 mjf errx(3, "Can't read input '%s': %s", file, strerror(errno));
153 1.6.2.2 mjf
154 1.6.2.2 mjf if (hdr->e_ident[EI_MAG0] != ELFMAG0 ||
155 1.6.2.2 mjf hdr->e_ident[EI_MAG1] != ELFMAG1 ||
156 1.6.2.2 mjf hdr->e_ident[EI_MAG2] != ELFMAG2 ||
157 1.6.2.2 mjf hdr->e_ident[EI_MAG3] != ELFMAG3 ||
158 1.6.2.2 mjf hdr->e_ident[EI_CLASS] != ELFCLASS32)
159 1.6.2.2 mjf errx(3, "input '%s' is not ELF32 format", file);
160 1.6.2.2 mjf
161 1.6.2.2 mjf if (hdr->e_ident[EI_DATA] != ELFDATA2MSB)
162 1.6.2.2 mjf errx(3, "input '%s' is not big-endian", file);
163 1.6.2.2 mjf
164 1.6.2.2 mjf if (ELFGET16(hdr->e_machine) != EM_PPC)
165 1.6.2.2 mjf errx(3, "input '%s' is not PowerPC exec binary", file);
166 1.6.2.2 mjf
167 1.6.2.2 mjf return(fd);
168 1.6.2.2 mjf }
169 1.6.2.2 mjf
170 1.6.2.2 mjf static void
171 1.6.2.2 mjf prep_check_mbr(int prep_fd, char *rawdev)
172 1.6.2.2 mjf {
173 1.6.2.2 mjf int raw_fd;
174 1.6.2.2 mjf unsigned long entry, length;
175 1.6.2.2 mjf struct mbr_partition *mbrp;
176 1.6.2.2 mjf struct stat raw_stat;
177 1.6.2.2 mjf
178 1.6.2.2 mjf /* If we are building a standalone image, do not write an MBR, just
179 1.6.2.2 mjf * set entry point and boot image size skipping over elf header
180 1.6.2.2 mjf */
181 1.6.2.2 mjf if (saloneflag) {
182 1.6.2.2 mjf entry = sa_htole32(0x400);
183 1.6.2.2 mjf length = sa_htole32(elf_stat.st_size - sizeof(hdr) + 0x400);
184 1.6.2.2 mjf lseek(prep_fd, sizeof(mbr), SEEK_SET);
185 1.6.2.2 mjf write(prep_fd, &entry, sizeof(entry));
186 1.6.2.2 mjf write(prep_fd, &length, sizeof(length));
187 1.6.2.2 mjf return;
188 1.6.2.2 mjf }
189 1.6.2.2 mjf
190 1.6.2.2 mjf /*
191 1.6.2.2 mjf * if we have a raw device, we need to check to see if it already
192 1.6.2.2 mjf * has a partition table, and if so, read it in and check for
193 1.6.2.2 mjf * suitability.
194 1.6.2.2 mjf */
195 1.6.2.2 mjf if (rawdev != NULL) {
196 1.6.2.2 mjf raw_fd = open(rawdev, O_RDONLY, 0);
197 1.6.2.2 mjf if (raw_fd == -1)
198 1.6.2.2 mjf errx(3, "couldn't open raw device %s: %s", rawdev,
199 1.6.2.2 mjf strerror(errno));
200 1.6.2.2 mjf
201 1.6.2.2 mjf fstat(raw_fd, &raw_stat);
202 1.6.2.2 mjf if (!S_ISCHR(raw_stat.st_mode))
203 1.6.2.2 mjf errx(3, "%s is not a raw device", rawdev);
204 1.6.2.2 mjf
205 1.6.2.2 mjf if (read(raw_fd, mbr, 512) != 512)
206 1.6.2.2 mjf errx(3, "MBR Read Failed: %s", strerror(errno));
207 1.6.2.2 mjf
208 1.6.2.2 mjf mbrp = (struct mbr_partition *)&mbr[MBR_PART_OFFSET];
209 1.6.2.2 mjf if (mbrp->mbrp_type != MBR_PTYPE_PREP)
210 1.6.2.2 mjf errx(3, "First partition is not of type 0x%x.",
211 1.6.2.2 mjf MBR_PTYPE_PREP);
212 1.6.2.2 mjf if (mbrp->mbrp_start != 0)
213 1.6.2.2 mjf errx(3, "Use of the raw device is intended for"
214 1.6.2.2 mjf " upgrading of legacy installations. Your"
215 1.6.2.2 mjf " install does not have a PReP boot partition"
216 1.6.2.2 mjf " starting at sector 0. Use the -s option"
217 1.6.2.2 mjf " to build an image instead.");
218 1.6.2.2 mjf
219 1.6.2.2 mjf /* if we got this far, we are fine, write back the partition
220 1.6.2.2 mjf * and write the entry points and get outta here */
221 1.6.2.2 mjf /* Set entry point and boot image size skipping over elf header */
222 1.6.2.2 mjf lseek(prep_fd, 0, SEEK_SET);
223 1.6.2.2 mjf entry = sa_htole32(0x400);
224 1.6.2.2 mjf length = sa_htole32(elf_stat.st_size - sizeof(hdr) + 0x400);
225 1.6.2.2 mjf write(prep_fd, mbr, sizeof(mbr));
226 1.6.2.2 mjf write(prep_fd, &entry, sizeof(entry));
227 1.6.2.2 mjf write(prep_fd, &length, sizeof(length));
228 1.6.2.2 mjf close(raw_fd);
229 1.6.2.2 mjf return;
230 1.6.2.2 mjf }
231 1.6.2.2 mjf
232 1.6.2.2 mjf /* if we get to here, we want to build a standard floppy or netboot
233 1.6.2.2 mjf * image to file, so just build it */
234 1.6.2.2 mjf
235 1.6.2.2 mjf memset(mbr, 0, sizeof(mbr));
236 1.6.2.2 mjf mbrp = (struct mbr_partition *)&mbr[MBR_PART_OFFSET];
237 1.6.2.2 mjf
238 1.6.2.2 mjf /* Set entry point and boot image size skipping over elf header */
239 1.6.2.2 mjf entry = sa_htole32(0x400);
240 1.6.2.2 mjf length = sa_htole32(elf_stat.st_size - sizeof(hdr) + 0x400);
241 1.6.2.2 mjf
242 1.6.2.2 mjf /*
243 1.6.2.2 mjf * Set magic number for msdos partition
244 1.6.2.2 mjf */
245 1.6.2.2 mjf *(unsigned short *)&mbr[MBR_MAGIC_OFFSET] = sa_htole16(MBR_MAGIC);
246 1.6.2.2 mjf
247 1.6.2.2 mjf /*
248 1.6.2.2 mjf * Build a "PReP" partition table entry in the boot record
249 1.6.2.2 mjf * - "PReP" may only look at the system_indicator
250 1.6.2.2 mjf */
251 1.6.2.2 mjf mbrp->mbrp_flag = MBR_PFLAG_ACTIVE;
252 1.6.2.2 mjf mbrp->mbrp_type = MBR_PTYPE_PREP;
253 1.6.2.2 mjf
254 1.6.2.2 mjf /*
255 1.6.2.2 mjf * The first block of the diskette is used by this "boot record" which
256 1.6.2.2 mjf * actually contains the partition table. (The first block of the
257 1.6.2.2 mjf * partition contains the boot image, but I digress...) We'll set up
258 1.6.2.2 mjf * one partition on the diskette and it shall contain the rest of the
259 1.6.2.2 mjf * diskette.
260 1.6.2.2 mjf */
261 1.6.2.2 mjf mbrp->mbrp_shd = 0; /* zero-based */
262 1.6.2.2 mjf mbrp->mbrp_ssect = 2; /* one-based */
263 1.6.2.2 mjf mbrp->mbrp_scyl = 0; /* zero-based */
264 1.6.2.2 mjf mbrp->mbrp_ehd = 1; /* assumes two heads */
265 1.6.2.2 mjf if (lfloppyflag)
266 1.6.2.2 mjf mbrp->mbrp_esect = 36; /* 2.88MB floppy */
267 1.6.2.2 mjf else
268 1.6.2.2 mjf mbrp->mbrp_esect = 18; /* assumes 18 sectors/track */
269 1.6.2.2 mjf mbrp->mbrp_ecyl = 79; /* assumes 80 cylinders/diskette */
270 1.6.2.2 mjf
271 1.6.2.2 mjf /*
272 1.6.2.2 mjf * The "PReP" software ignores the above fields and just looks at
273 1.6.2.2 mjf * the next two.
274 1.6.2.2 mjf * - size of the diskette is (assumed to be)
275 1.6.2.2 mjf * (2 tracks/cylinder)(18 sectors/tracks)(80 cylinders/diskette)
276 1.6.2.2 mjf * - unlike the above sector numbers,
277 1.6.2.2 mjf * the beginning sector is zero-based!
278 1.6.2.2 mjf */
279 1.6.2.2 mjf
280 1.6.2.2 mjf /* This has to be 0 on the PowerStack? */
281 1.6.2.2 mjf mbrp->mbrp_start = sa_htole32(0);
282 1.6.2.2 mjf mbrp->mbrp_size = sa_htole32(2 * 18 * 80 - 1);
283 1.6.2.2 mjf
284 1.6.2.2 mjf write(prep_fd, mbr, sizeof(mbr));
285 1.6.2.2 mjf write(prep_fd, &entry, sizeof(entry));
286 1.6.2.2 mjf write(prep_fd, &length, sizeof(length));
287 1.6.2.2 mjf }
288 1.6.2.2 mjf
289 1.6.2.2 mjf static int
290 1.6.2.2 mjf prep_build_image(char *kernel, char *boot, char *rawdev, char *outname)
291 1.6.2.2 mjf {
292 1.6.2.2 mjf unsigned char *elf_img = NULL, *kern_img = NULL;
293 1.6.2.2 mjf int i, ch, tmp, kgzlen, err;
294 1.6.2.2 mjf int elf_fd, prep_fd, kern_fd, elf_img_len = 0;
295 1.6.2.2 mjf off_t lenpos, kstart, kend;
296 1.6.2.2 mjf unsigned long length;
297 1.6.2.2 mjf long flength;
298 1.6.2.2 mjf gzFile gzf;
299 1.6.2.2 mjf struct stat kern_stat;
300 1.6.2.2 mjf Elf32_External_Phdr phdr;
301 1.6.2.2 mjf
302 1.6.2.2 mjf elf_fd = open_file("bootloader", boot, &hdr, &elf_stat);
303 1.6.2.2 mjf kern_fd = open_file("kernel", kernel, &khdr, &kern_stat);
304 1.6.2.2 mjf kern_len = kern_stat.st_size + PREP_MAGICSIZE + KERNLENSIZE;
305 1.6.2.2 mjf
306 1.6.2.2 mjf for (i = 0; i < ELFGET16(hdr.e_phnum); i++) {
307 1.6.2.2 mjf lseek(elf_fd, ELFGET32(hdr.e_phoff) + sizeof(phdr) * i,
308 1.6.2.2 mjf SEEK_SET);
309 1.6.2.2 mjf if (read(elf_fd, &phdr, sizeof(phdr)) != sizeof(phdr))
310 1.6.2.2 mjf errx(3, "Can't read input '%s' phdr : %s", boot,
311 1.6.2.2 mjf strerror(errno));
312 1.6.2.2 mjf
313 1.6.2.2 mjf if ((ELFGET32(phdr.p_type) != PT_LOAD) ||
314 1.6.2.2 mjf !(ELFGET32(phdr.p_flags) & PF_X))
315 1.6.2.2 mjf continue;
316 1.6.2.2 mjf
317 1.6.2.2 mjf fstat(elf_fd, &elf_stat);
318 1.6.2.2 mjf elf_img_len = elf_stat.st_size - ELFGET32(phdr.p_offset);
319 1.6.2.2 mjf lseek(elf_fd, ELFGET32(phdr.p_offset), SEEK_SET);
320 1.6.2.2 mjf
321 1.6.2.2 mjf break;
322 1.6.2.2 mjf }
323 1.6.2.2 mjf if ((prep_fd = open(outname, O_RDWR|O_TRUNC, 0)) < 0) {
324 1.6.2.2 mjf /* we couldn't open it, it must be new */
325 1.6.2.2 mjf prep_fd = creat(outname, 0644);
326 1.6.2.2 mjf if (prep_fd < 0)
327 1.6.2.2 mjf errx(2, "Can't open output '%s': %s", outname,
328 1.6.2.2 mjf strerror(errno));
329 1.6.2.2 mjf }
330 1.6.2.2 mjf
331 1.6.2.2 mjf prep_check_mbr(prep_fd, rawdev);
332 1.6.2.2 mjf
333 1.6.2.2 mjf /* Set file pos. to 2nd sector where image will be written */
334 1.6.2.2 mjf lseek(prep_fd, 0x400, SEEK_SET);
335 1.6.2.2 mjf
336 1.6.2.2 mjf /* Copy boot image */
337 1.6.2.2 mjf elf_img = (unsigned char *)malloc(elf_img_len);
338 1.6.2.2 mjf if (!elf_img)
339 1.6.2.2 mjf errx(3, "Can't malloc: %s", strerror(errno));
340 1.6.2.2 mjf if (read(elf_fd, elf_img, elf_img_len) != elf_img_len)
341 1.6.2.2 mjf errx(3, "Can't read file '%s' : %s", boot, strerror(errno));
342 1.6.2.2 mjf
343 1.6.2.2 mjf write(prep_fd, elf_img, elf_img_len);
344 1.6.2.2 mjf free(elf_img);
345 1.6.2.2 mjf
346 1.6.2.2 mjf /* Copy kernel */
347 1.6.2.2 mjf kern_img = (unsigned char *)malloc(kern_stat.st_size);
348 1.6.2.2 mjf
349 1.6.2.2 mjf if (kern_img == NULL)
350 1.6.2.2 mjf errx(3, "Can't malloc: %s", strerror(errno));
351 1.6.2.2 mjf
352 1.6.2.2 mjf /* we need to jump back after having read the headers */
353 1.6.2.2 mjf lseek(kern_fd, 0, SEEK_SET);
354 1.6.2.2 mjf if (read(kern_fd, (void *)kern_img, kern_stat.st_size) !=
355 1.6.2.2 mjf kern_stat.st_size)
356 1.6.2.2 mjf errx(3, "Can't read kernel '%s' : %s", kernel, strerror(errno));
357 1.6.2.2 mjf
358 1.6.2.2 mjf gzf = gzdopen(dup(prep_fd), "a");
359 1.6.2.2 mjf if (gzf == NULL)
360 1.6.2.2 mjf errx(3, "Can't init compression: %s", strerror(errno));
361 1.6.2.2 mjf if (gzsetparams(gzf, Z_BEST_COMPRESSION, Z_DEFAULT_STRATEGY) != Z_OK)
362 1.6.2.2 mjf errx(3, "%s", gzerror(gzf, &err));
363 1.6.2.2 mjf
364 1.6.2.2 mjf /* write a magic number and size before the kernel */
365 1.6.2.2 mjf write(prep_fd, (void *)prep_magic, PREP_MAGICSIZE);
366 1.6.2.2 mjf lenpos = lseek(prep_fd, 0, SEEK_CUR);
367 1.6.2.2 mjf tmp = sa_htobe32(0);
368 1.6.2.2 mjf write(prep_fd, (void *)&tmp, KERNLENSIZE);
369 1.6.2.2 mjf
370 1.6.2.2 mjf /* write in the compressed kernel */
371 1.6.2.2 mjf kstart = lseek(prep_fd, 0, SEEK_CUR);
372 1.6.2.2 mjf kgzlen = gzwrite(gzf, kern_img, kern_stat.st_size);
373 1.6.2.2 mjf gzclose(gzf);
374 1.6.2.2 mjf kend = lseek(prep_fd, 0, SEEK_CUR);
375 1.6.2.2 mjf
376 1.6.2.2 mjf /* jump back to the length position now that we know the length */
377 1.6.2.2 mjf lseek(prep_fd, lenpos, SEEK_SET);
378 1.6.2.2 mjf kgzlen = kend - kstart;
379 1.6.2.2 mjf tmp = sa_htobe32(kgzlen);
380 1.6.2.2 mjf write(prep_fd, (void *)&tmp, KERNLENSIZE);
381 1.6.2.2 mjf
382 1.6.2.2 mjf length = sa_htole32(0x400 + elf_img_len + 8 + kgzlen);
383 1.6.2.2 mjf lseek(prep_fd, sizeof(mbr) + 4, SEEK_SET);
384 1.6.2.2 mjf write(prep_fd, &length, sizeof(length));
385 1.6.2.2 mjf
386 1.6.2.2 mjf flength = 0x400 + elf_img_len + 8 + kgzlen;
387 1.6.2.2 mjf if (lfloppyflag)
388 1.6.2.2 mjf flength -= (5760 * 512);
389 1.6.2.2 mjf else
390 1.6.2.2 mjf flength -= (2880 * 512);
391 1.6.2.2 mjf if (flength > 0 && !saloneflag)
392 1.6.2.2 mjf fprintf(stderr, "%s: Image %s is %d bytes larger than single"
393 1.6.2.2 mjf " floppy. Can only be used for netboot.\n", getprogname(),
394 1.6.2.2 mjf outname, flength);
395 1.6.2.2 mjf
396 1.6.2.2 mjf free(kern_img);
397 1.6.2.2 mjf close(kern_fd);
398 1.6.2.2 mjf close(prep_fd);
399 1.6.2.2 mjf close(elf_fd);
400 1.6.2.2 mjf
401 1.6.2.2 mjf return 0;
402 1.6.2.2 mjf }
403 1.6.2.2 mjf
404 1.6.2.2 mjf /* Fill in the needed information on the boot and config records. Most of
405 1.6.2.2 mjf * this is just AIX garbage that we don't really need to boot.
406 1.6.2.2 mjf */
407 1.6.2.2 mjf static void
408 1.6.2.2 mjf rs6000_build_records(int img_len)
409 1.6.2.2 mjf {
410 1.6.2.2 mjf int bcl;
411 1.6.2.2 mjf
412 1.6.2.2 mjf /* zero out all the fields, so we only have to set the ones
413 1.6.2.2 mjf * we care about, which are rather few.
414 1.6.2.2 mjf */
415 1.6.2.2 mjf memset(&bootrec, 0, sizeof(rs6000_boot_record_t));
416 1.6.2.2 mjf memset(&confrec, 0, sizeof(rs6000_config_record_t));
417 1.6.2.2 mjf
418 1.6.2.2 mjf bootrec.ipl_record = IPLRECID;
419 1.6.2.2 mjf bcl = img_len/512;
420 1.6.2.2 mjf if (img_len%512 != 0)
421 1.6.2.2 mjf bcl++;
422 1.6.2.2 mjf bootrec.bootcode_len = bcl;
423 1.6.2.2 mjf bootrec.bootcode_off = 0; /* XXX */
424 1.6.2.2 mjf bootrec.bootpart_start = 2; /* skip bootrec and confrec */
425 1.6.2.2 mjf bootrec.bootprg_start = 2;
426 1.6.2.2 mjf bootrec.bootpart_len = bcl;
427 1.6.2.2 mjf bootrec.boot_load_addr = 0x800000; /* XXX? */
428 1.6.2.2 mjf bootrec.boot_frag = 1;
429 1.6.2.2 mjf bootrec.boot_emul = 0x02; /* ?? */
430 1.6.2.2 mjf /* service mode is a repeat of normal mode */
431 1.6.2.2 mjf bootrec.servcode_len = bootrec.bootcode_len;
432 1.6.2.2 mjf bootrec.servcode_off = bootrec.bootcode_off;
433 1.6.2.2 mjf bootrec.servpart_start = bootrec.bootpart_start;
434 1.6.2.2 mjf bootrec.servprg_start = bootrec.bootprg_start;
435 1.6.2.2 mjf bootrec.servpart_len = bootrec.bootpart_len;
436 1.6.2.2 mjf bootrec.serv_load_addr = bootrec.boot_load_addr;
437 1.6.2.2 mjf bootrec.serv_frag = bootrec.boot_frag;
438 1.6.2.2 mjf bootrec.serv_emul = bootrec.boot_emul;
439 1.6.2.2 mjf
440 1.6.2.2 mjf /* now the config record */
441 1.6.2.2 mjf confrec.conf_rec = CONFRECID;
442 1.6.2.2 mjf confrec.sector_size = 0x02; /* 512 bytes */
443 1.6.2.2 mjf confrec.last_cyl = 0x4f; /* 79 cyl, emulates floppy */
444 1.6.2.2 mjf }
445 1.6.2.2 mjf
446 1.6.2.2 mjf static int
447 1.6.2.2 mjf rs6000_build_image(char *kernel, char *boot, char *rawdev, char *outname)
448 1.6.2.2 mjf {
449 1.6.2.2 mjf unsigned char *elf_img = NULL, *kern_img = NULL;
450 1.6.2.2 mjf int i, ch, tmp, kgzlen, err;
451 1.6.2.2 mjf int elf_fd, rs6000_fd, kern_fd, elf_img_len = 0, elf_pad;
452 1.6.2.2 mjf uint32_t swapped[128];
453 1.6.2.2 mjf off_t lenpos, kstart, kend;
454 1.6.2.2 mjf unsigned long length;
455 1.6.2.2 mjf long flength;
456 1.6.2.2 mjf gzFile gzf;
457 1.6.2.2 mjf struct stat kern_stat;
458 1.6.2.2 mjf Elf32_External_Phdr phdr;
459 1.6.2.2 mjf
460 1.6.2.2 mjf elf_fd = open_file("bootloader", boot, &hdr, &elf_stat);
461 1.6.2.2 mjf kern_fd = open_file("kernel", kernel, &khdr, &kern_stat);
462 1.6.2.2 mjf kern_len = kern_stat.st_size + RS6000_MAGICSIZE + KERNLENSIZE;
463 1.6.2.2 mjf
464 1.6.2.2 mjf for (i = 0; i < ELFGET16(hdr.e_phnum); i++) {
465 1.6.2.2 mjf lseek(elf_fd, ELFGET32(hdr.e_phoff) + sizeof(phdr) * i,
466 1.6.2.2 mjf SEEK_SET);
467 1.6.2.2 mjf if (read(elf_fd, &phdr, sizeof(phdr)) != sizeof(phdr))
468 1.6.2.2 mjf errx(3, "Can't read input '%s' phdr : %s", boot,
469 1.6.2.2 mjf strerror(errno));
470 1.6.2.2 mjf
471 1.6.2.2 mjf if ((ELFGET32(phdr.p_type) != PT_LOAD) ||
472 1.6.2.2 mjf !(ELFGET32(phdr.p_flags) & PF_X))
473 1.6.2.2 mjf continue;
474 1.6.2.2 mjf
475 1.6.2.2 mjf fstat(elf_fd, &elf_stat);
476 1.6.2.2 mjf elf_img_len = elf_stat.st_size - ELFGET32(phdr.p_offset);
477 1.6.2.2 mjf elf_pad = ELFGET32(phdr.p_memsz) - ELFGET32(phdr.p_filesz);
478 1.6.2.2 mjf if (verboseflag)
479 1.6.2.2 mjf printf("Padding %d\n", elf_pad);
480 1.6.2.2 mjf lseek(elf_fd, ELFGET32(phdr.p_offset), SEEK_SET);
481 1.6.2.2 mjf
482 1.6.2.2 mjf break;
483 1.6.2.2 mjf }
484 1.6.2.2 mjf if ((rs6000_fd = open(outname, O_RDWR|O_TRUNC, 0)) < 0) {
485 1.6.2.2 mjf /* we couldn't open it, it must be new */
486 1.6.2.2 mjf rs6000_fd = creat(outname, 0644);
487 1.6.2.2 mjf if (rs6000_fd < 0)
488 1.6.2.2 mjf errx(2, "Can't open output '%s': %s", outname,
489 1.6.2.2 mjf strerror(errno));
490 1.6.2.2 mjf }
491 1.6.2.2 mjf
492 1.6.2.2 mjf /* Set file pos. to 2nd sector where image will be written */
493 1.6.2.2 mjf lseek(rs6000_fd, 0x400, SEEK_SET);
494 1.6.2.2 mjf
495 1.6.2.2 mjf /* Copy boot image */
496 1.6.2.2 mjf elf_img = (unsigned char *)malloc(elf_img_len);
497 1.6.2.2 mjf if (!elf_img)
498 1.6.2.2 mjf errx(3, "Can't malloc: %s", strerror(errno));
499 1.6.2.2 mjf if (read(elf_fd, elf_img, elf_img_len) != elf_img_len)
500 1.6.2.2 mjf errx(3, "Can't read file '%s' : %s", boot, strerror(errno));
501 1.6.2.2 mjf
502 1.6.2.2 mjf write(rs6000_fd, elf_img, elf_img_len);
503 1.6.2.2 mjf free(elf_img);
504 1.6.2.2 mjf
505 1.6.2.2 mjf /* now dump in the padding space for the BSS */
506 1.6.2.2 mjf elf_pad += 100; /* just a little extra for good luck */
507 1.6.2.2 mjf lseek(rs6000_fd, elf_pad, SEEK_CUR);
508 1.6.2.2 mjf
509 1.6.2.2 mjf /* Copy kernel */
510 1.6.2.2 mjf kern_img = (unsigned char *)malloc(kern_stat.st_size);
511 1.6.2.2 mjf
512 1.6.2.2 mjf if (kern_img == NULL)
513 1.6.2.2 mjf errx(3, "Can't malloc: %s", strerror(errno));
514 1.6.2.2 mjf
515 1.6.2.2 mjf /* we need to jump back after having read the headers */
516 1.6.2.2 mjf lseek(kern_fd, 0, SEEK_SET);
517 1.6.2.2 mjf if (read(kern_fd, (void *)kern_img, kern_stat.st_size) !=
518 1.6.2.2 mjf kern_stat.st_size)
519 1.6.2.2 mjf errx(3, "Can't read kernel '%s' : %s", kernel, strerror(errno));
520 1.6.2.2 mjf
521 1.6.2.2 mjf gzf = gzdopen(dup(rs6000_fd), "a");
522 1.6.2.2 mjf if (gzf == NULL)
523 1.6.2.2 mjf errx(3, "Can't init compression: %s", strerror(errno));
524 1.6.2.2 mjf if (gzsetparams(gzf, Z_BEST_COMPRESSION, Z_DEFAULT_STRATEGY) != Z_OK)
525 1.6.2.2 mjf errx(3, "%s", gzerror(gzf, &err));
526 1.6.2.2 mjf
527 1.6.2.2 mjf /* write a magic number and size before the kernel */
528 1.6.2.2 mjf write(rs6000_fd, (void *)rs6000_magic, RS6000_MAGICSIZE);
529 1.6.2.2 mjf lenpos = lseek(rs6000_fd, 0, SEEK_CUR);
530 1.6.2.2 mjf if (verboseflag)
531 1.6.2.2 mjf printf("wrote magic at pos 0x%x\n", lenpos);
532 1.6.2.2 mjf tmp = sa_htobe32(0);
533 1.6.2.2 mjf write(rs6000_fd, (void *)&tmp, KERNLENSIZE);
534 1.6.2.2 mjf
535 1.6.2.2 mjf /* write in the compressed kernel */
536 1.6.2.2 mjf kstart = lseek(rs6000_fd, 0, SEEK_CUR);
537 1.6.2.2 mjf if (verboseflag)
538 1.6.2.2 mjf printf("kernel start at pos 0x%x\n", kstart);
539 1.6.2.2 mjf kgzlen = gzwrite(gzf, kern_img, kern_stat.st_size);
540 1.6.2.2 mjf gzclose(gzf);
541 1.6.2.2 mjf kend = lseek(rs6000_fd, 0, SEEK_CUR);
542 1.6.2.2 mjf if (verboseflag)
543 1.6.2.2 mjf printf("kernel end at pos 0x%x\n", kend);
544 1.6.2.2 mjf
545 1.6.2.2 mjf /* jump back to the length position now that we know the length */
546 1.6.2.2 mjf lseek(rs6000_fd, lenpos, SEEK_SET);
547 1.6.2.2 mjf kgzlen = kend - kstart;
548 1.6.2.2 mjf tmp = sa_htobe32(kgzlen);
549 1.6.2.2 mjf if (verboseflag)
550 1.6.2.2 mjf printf("kernel len = 0x%x tmp = 0x%x\n", kgzlen, tmp);
551 1.6.2.2 mjf write(rs6000_fd, (void *)&tmp, KERNLENSIZE);
552 1.6.2.2 mjf
553 1.6.2.2 mjf #if 0
554 1.6.2.2 mjf lseek(rs6000_fd, sizeof(boot_record_t) + sizeof(config_record_t),
555 1.6.2.2 mjf SEEK_SET);
556 1.6.2.2 mjf /* set entry and length */
557 1.6.2.2 mjf length = sa_htole32(0x400);
558 1.6.2.2 mjf write(rs6000_fd, &length, sizeof(length));
559 1.6.2.2 mjf length = sa_htole32(0x400 + elf_img_len + 8 + kgzlen);
560 1.6.2.2 mjf write(rs6000_fd, &length, sizeof(length));
561 1.6.2.2 mjf #endif
562 1.6.2.2 mjf
563 1.6.2.2 mjf /* generate the header now that we know the kernel length */
564 1.6.2.2 mjf if (verboseflag)
565 1.6.2.2 mjf printf("building records\n");
566 1.6.2.2 mjf rs6000_build_records(elf_img_len + 8 + kgzlen);
567 1.6.2.2 mjf lseek(rs6000_fd, 0, SEEK_SET);
568 1.6.2.2 mjf /* ROM wants it byteswapped in 32bit chunks */
569 1.6.2.2 mjf if (verboseflag)
570 1.6.2.2 mjf printf("writing records\n");
571 1.6.2.2 mjf memcpy(swapped, &bootrec, sizeof(rs6000_boot_record_t));
572 1.6.2.2 mjf for (i=0; i < 128; i++)
573 1.6.2.2 mjf swapped[i] = htonl(swapped[i]);
574 1.6.2.2 mjf write(rs6000_fd, swapped, sizeof(rs6000_boot_record_t));
575 1.6.2.2 mjf memcpy(swapped, &confrec, sizeof(rs6000_config_record_t));
576 1.6.2.2 mjf for (i=0; i < 128; i++)
577 1.6.2.2 mjf swapped[i] = htonl(swapped[i]);
578 1.6.2.2 mjf write(rs6000_fd, swapped, sizeof(rs6000_config_record_t));
579 1.6.2.2 mjf
580 1.6.2.2 mjf free(kern_img);
581 1.6.2.2 mjf close(kern_fd);
582 1.6.2.2 mjf close(rs6000_fd);
583 1.6.2.2 mjf close(elf_fd);
584 1.6.2.2 mjf
585 1.6.2.2 mjf return 0;
586 1.6.2.2 mjf }
587 1.6.2.2 mjf
588 1.6.2.2 mjf static int
589 1.6.2.2 mjf bebox_write_header(int bebox_fd, int elf_image_len, int kern_img_len)
590 1.6.2.2 mjf {
591 1.6.2.2 mjf int hsize = BEBOX_HEADER_SIZE;
592 1.6.2.2 mjf unsigned long textOffset, dataOffset, ldrOffset;
593 1.6.2.2 mjf unsigned long entry_vector[3];
594 1.6.2.2 mjf struct FileHeader fileHdr;
595 1.6.2.2 mjf struct SectionHeader textHdr, dataHdr, ldrHdr;
596 1.6.2.2 mjf struct LoaderHeader lh;
597 1.6.2.2 mjf
598 1.6.2.2 mjf if (saloneflag)
599 1.6.2.2 mjf hsize = 0;
600 1.6.2.2 mjf
601 1.6.2.2 mjf ldrOffset = ULALIGN(sizeof (fileHdr) + sizeof (textHdr) +
602 1.6.2.2 mjf sizeof (dataHdr) + sizeof (ldrHdr));
603 1.6.2.2 mjf dataOffset = ULALIGN(ldrOffset + sizeof (lh));
604 1.6.2.2 mjf textOffset = ULALIGN(dataOffset + sizeof (entry_vector) + kern_img_len);
605 1.6.2.2 mjf
606 1.6.2.2 mjf /* Create the File Header */
607 1.6.2.2 mjf memset(&fileHdr, 0, sizeof (fileHdr));
608 1.6.2.2 mjf fileHdr.magic = sa_htobe32(PEF_MAGIC);
609 1.6.2.2 mjf fileHdr.fileTypeID = sa_htobe32(PEF_FILE);
610 1.6.2.2 mjf fileHdr.archID = sa_htobe32(PEF_PPC);
611 1.6.2.2 mjf fileHdr.versionNumber = sa_htobe32(1);
612 1.6.2.2 mjf fileHdr.numSections = sa_htobe16(3);
613 1.6.2.2 mjf fileHdr.loadableSections = sa_htobe16(2);
614 1.6.2.2 mjf write(bebox_fd, &fileHdr, sizeof (fileHdr));
615 1.6.2.2 mjf
616 1.6.2.2 mjf /* Create the Section Header for TEXT */
617 1.6.2.2 mjf memset(&textHdr, 0, sizeof (textHdr));
618 1.6.2.2 mjf textHdr.sectionName = sa_htobe32(-1);
619 1.6.2.2 mjf textHdr.sectionAddress = sa_htobe32(0);
620 1.6.2.2 mjf textHdr.execSize = sa_htobe32(elf_image_len);
621 1.6.2.2 mjf textHdr.initSize = sa_htobe32(elf_image_len);
622 1.6.2.2 mjf textHdr.rawSize = sa_htobe32(elf_image_len);
623 1.6.2.2 mjf textHdr.fileOffset = sa_htobe32(textOffset);
624 1.6.2.2 mjf textHdr.regionKind = CodeSection;
625 1.6.2.2 mjf textHdr.shareKind = ContextShare;
626 1.6.2.2 mjf textHdr.alignment = 4; /* 16 byte alignment */
627 1.6.2.2 mjf write(bebox_fd, &textHdr, sizeof (textHdr));
628 1.6.2.2 mjf
629 1.6.2.2 mjf /* Create the Section Header for DATA */
630 1.6.2.2 mjf memset(&dataHdr, 0, sizeof (dataHdr));
631 1.6.2.2 mjf dataHdr.sectionName = sa_htobe32(-1);
632 1.6.2.2 mjf dataHdr.sectionAddress = sa_htobe32(0);
633 1.6.2.2 mjf dataHdr.execSize = sa_htobe32(sizeof (entry_vector) + kern_img_len);
634 1.6.2.2 mjf dataHdr.initSize = sa_htobe32(sizeof (entry_vector) + kern_img_len);
635 1.6.2.2 mjf dataHdr.rawSize = sa_htobe32(sizeof (entry_vector) + kern_img_len);
636 1.6.2.2 mjf dataHdr.fileOffset = sa_htobe32(dataOffset);
637 1.6.2.2 mjf dataHdr.regionKind = DataSection;
638 1.6.2.2 mjf dataHdr.shareKind = ContextShare;
639 1.6.2.2 mjf dataHdr.alignment = 4; /* 16 byte alignment */
640 1.6.2.2 mjf write(bebox_fd, &dataHdr, sizeof (dataHdr));
641 1.6.2.2 mjf
642 1.6.2.2 mjf /* Create the Section Header for loader stuff */
643 1.6.2.2 mjf memset(&ldrHdr, 0, sizeof (ldrHdr));
644 1.6.2.2 mjf ldrHdr.sectionName = sa_htobe32(-1);
645 1.6.2.2 mjf ldrHdr.sectionAddress = sa_htobe32(0);
646 1.6.2.2 mjf ldrHdr.execSize = sa_htobe32(sizeof (lh));
647 1.6.2.2 mjf ldrHdr.initSize = sa_htobe32(sizeof (lh));
648 1.6.2.2 mjf ldrHdr.rawSize = sa_htobe32(sizeof (lh));
649 1.6.2.2 mjf ldrHdr.fileOffset = sa_htobe32(ldrOffset);
650 1.6.2.2 mjf ldrHdr.regionKind = LoaderSection;
651 1.6.2.2 mjf ldrHdr.shareKind = GlobalShare;
652 1.6.2.2 mjf ldrHdr.alignment = 4; /* 16 byte alignment */
653 1.6.2.2 mjf write(bebox_fd, &ldrHdr, sizeof (ldrHdr));
654 1.6.2.2 mjf
655 1.6.2.2 mjf /* Create the Loader Header */
656 1.6.2.2 mjf memset(&lh, 0, sizeof (lh));
657 1.6.2.2 mjf lh.entryPointSection = sa_htobe32(1); /* Data */
658 1.6.2.2 mjf lh.entryPointOffset = sa_htobe32(0);
659 1.6.2.2 mjf lh.initPointSection = sa_htobe32(-1);
660 1.6.2.2 mjf lh.initPointOffset = sa_htobe32(0);
661 1.6.2.2 mjf lh.termPointSection = sa_htobe32(-1);
662 1.6.2.2 mjf lh.termPointOffset = sa_htobe32(0);
663 1.6.2.2 mjf lseek(bebox_fd, ldrOffset + hsize, SEEK_SET);
664 1.6.2.2 mjf write(bebox_fd, &lh, sizeof (lh));
665 1.6.2.2 mjf
666 1.6.2.2 mjf /* Copy the pseudo-DATA */
667 1.6.2.2 mjf memset(entry_vector, 0, sizeof (entry_vector));
668 1.6.2.2 mjf entry_vector[0] = sa_htobe32(ENTRY); /* Magic */
669 1.6.2.2 mjf lseek(bebox_fd, dataOffset + hsize, SEEK_SET);
670 1.6.2.2 mjf write(bebox_fd, entry_vector, sizeof (entry_vector));
671 1.6.2.2 mjf
672 1.6.2.2 mjf return textOffset;
673 1.6.2.2 mjf }
674 1.6.2.2 mjf
675 1.6.2.2 mjf static int
676 1.6.2.2 mjf bebox_build_image(char *kernel, char *boot, char *rawdev, char *outname)
677 1.6.2.2 mjf {
678 1.6.2.2 mjf unsigned char *elf_img = NULL, *kern_img = NULL, *header_img = NULL;
679 1.6.2.2 mjf int i, ch, tmp, kgzlen, err, hsize = BEBOX_HEADER_SIZE;
680 1.6.2.2 mjf int elf_fd, bebox_fd, kern_fd, elf_img_len = 0;
681 1.6.2.2 mjf uint32_t swapped[128];
682 1.6.2.2 mjf off_t lenpos, kstart, kend, toff, endoff;
683 1.6.2.2 mjf unsigned long length;
684 1.6.2.2 mjf long flength, *offset;
685 1.6.2.2 mjf gzFile gzf;
686 1.6.2.2 mjf struct stat kern_stat;
687 1.6.2.2 mjf struct bebox_image_block *p;
688 1.6.2.2 mjf struct timeval tp;
689 1.6.2.2 mjf Elf32_External_Phdr phdr;
690 1.6.2.2 mjf
691 1.6.2.2 mjf if (saloneflag)
692 1.6.2.2 mjf hsize = 0;
693 1.6.2.2 mjf
694 1.6.2.2 mjf elf_fd = open_file("bootloader", boot, &hdr, &elf_stat);
695 1.6.2.2 mjf kern_fd = open_file("kernel", kernel, &khdr, &kern_stat);
696 1.6.2.2 mjf kern_len = kern_stat.st_size + BEBOX_MAGICSIZE + KERNLENSIZE;
697 1.6.2.2 mjf
698 1.6.2.2 mjf for (i = 0; i < ELFGET16(hdr.e_phnum); i++) {
699 1.6.2.2 mjf lseek(elf_fd, ELFGET32(hdr.e_phoff) + sizeof(phdr) * i,
700 1.6.2.2 mjf SEEK_SET);
701 1.6.2.2 mjf if (read(elf_fd, &phdr, sizeof(phdr)) != sizeof(phdr))
702 1.6.2.2 mjf errx(3, "Can't read input '%s' phdr : %s", boot,
703 1.6.2.2 mjf strerror(errno));
704 1.6.2.2 mjf
705 1.6.2.2 mjf if ((ELFGET32(phdr.p_type) != PT_LOAD) ||
706 1.6.2.2 mjf !(ELFGET32(phdr.p_flags) & PF_X))
707 1.6.2.2 mjf continue;
708 1.6.2.2 mjf
709 1.6.2.2 mjf fstat(elf_fd, &elf_stat);
710 1.6.2.2 mjf elf_img_len = elf_stat.st_size - ELFGET32(phdr.p_offset);
711 1.6.2.2 mjf lseek(elf_fd, ELFGET32(phdr.p_offset), SEEK_SET);
712 1.6.2.2 mjf
713 1.6.2.2 mjf break;
714 1.6.2.2 mjf }
715 1.6.2.2 mjf if ((bebox_fd = open(outname, O_RDWR|O_TRUNC, 0)) < 0) {
716 1.6.2.2 mjf /* we couldn't open it, it must be new */
717 1.6.2.2 mjf bebox_fd = creat(outname, 0644);
718 1.6.2.2 mjf if (bebox_fd < 0)
719 1.6.2.2 mjf errx(2, "Can't open output '%s': %s", outname,
720 1.6.2.2 mjf strerror(errno));
721 1.6.2.2 mjf }
722 1.6.2.2 mjf lseek(bebox_fd, hsize, SEEK_SET);
723 1.6.2.2 mjf
724 1.6.2.2 mjf /* write the header with the wrong values to get the offset right */
725 1.6.2.2 mjf bebox_write_header(bebox_fd, elf_img_len, kern_len);
726 1.6.2.2 mjf
727 1.6.2.2 mjf /* Copy kernel */
728 1.6.2.2 mjf kern_img = (unsigned char *)malloc(kern_stat.st_size);
729 1.6.2.2 mjf
730 1.6.2.2 mjf if (kern_img == NULL)
731 1.6.2.2 mjf errx(3, "Can't malloc: %s", strerror(errno));
732 1.6.2.2 mjf
733 1.6.2.2 mjf /* we need to jump back after having read the headers */
734 1.6.2.2 mjf lseek(kern_fd, 0, SEEK_SET);
735 1.6.2.2 mjf if (read(kern_fd, (void *)kern_img, kern_stat.st_size) !=
736 1.6.2.2 mjf kern_stat.st_size)
737 1.6.2.2 mjf errx(3, "Can't read kernel '%s' : %s", kernel, strerror(errno));
738 1.6.2.2 mjf
739 1.6.2.2 mjf gzf = gzdopen(dup(bebox_fd), "a");
740 1.6.2.2 mjf if (gzf == NULL)
741 1.6.2.2 mjf errx(3, "Can't init compression: %s", strerror(errno));
742 1.6.2.2 mjf if (gzsetparams(gzf, Z_BEST_COMPRESSION, Z_DEFAULT_STRATEGY) != Z_OK)
743 1.6.2.2 mjf errx(3, "%s", gzerror(gzf, &err));
744 1.6.2.2 mjf
745 1.6.2.2 mjf /* write a magic number and size before the kernel */
746 1.6.2.2 mjf write(bebox_fd, (void *)bebox_magic, BEBOX_MAGICSIZE);
747 1.6.2.2 mjf lenpos = lseek(bebox_fd, 0, SEEK_CUR);
748 1.6.2.2 mjf tmp = sa_htobe32(0);
749 1.6.2.2 mjf write(bebox_fd, (void *)&tmp, KERNLENSIZE);
750 1.6.2.2 mjf
751 1.6.2.2 mjf /* write in the compressed kernel */
752 1.6.2.2 mjf kstart = lseek(bebox_fd, 0, SEEK_CUR);
753 1.6.2.2 mjf kgzlen = gzwrite(gzf, kern_img, kern_stat.st_size);
754 1.6.2.2 mjf gzclose(gzf);
755 1.6.2.2 mjf kend = lseek(bebox_fd, 0, SEEK_CUR);
756 1.6.2.2 mjf free(kern_img);
757 1.6.2.2 mjf
758 1.6.2.2 mjf /* jump back to the length position now that we know the length */
759 1.6.2.2 mjf lseek(bebox_fd, lenpos, SEEK_SET);
760 1.6.2.2 mjf kgzlen = kend - kstart;
761 1.6.2.2 mjf tmp = sa_htobe32(kgzlen);
762 1.6.2.2 mjf write(bebox_fd, (void *)&tmp, KERNLENSIZE);
763 1.6.2.2 mjf
764 1.6.2.2 mjf /* now rewrite the header correctly */
765 1.6.2.2 mjf lseek(bebox_fd, hsize, SEEK_SET);
766 1.6.2.2 mjf toff = bebox_write_header(bebox_fd, elf_img_len, kgzlen);
767 1.6.2.2 mjf
768 1.6.2.2 mjf /* Copy boot image */
769 1.6.2.2 mjf elf_img = (unsigned char *)malloc(elf_img_len);
770 1.6.2.2 mjf if (!elf_img)
771 1.6.2.2 mjf errx(3, "Can't malloc: %s", strerror(errno));
772 1.6.2.2 mjf if (read(elf_fd, elf_img, elf_img_len) != elf_img_len)
773 1.6.2.2 mjf errx(3, "Can't read file '%s' : %s", boot, strerror(errno));
774 1.6.2.2 mjf lseek(bebox_fd, toff + hsize, SEEK_SET);
775 1.6.2.2 mjf write(bebox_fd, elf_img, elf_img_len);
776 1.6.2.2 mjf free(elf_img);
777 1.6.2.2 mjf
778 1.6.2.2 mjf close(kern_fd);
779 1.6.2.2 mjf close(elf_fd);
780 1.6.2.2 mjf
781 1.6.2.2 mjf if (saloneflag) {
782 1.6.2.2 mjf close(bebox_fd);
783 1.6.2.2 mjf return 0;
784 1.6.2.2 mjf }
785 1.6.2.2 mjf
786 1.6.2.2 mjf /* Now go back and write in the block header */
787 1.6.2.2 mjf endoff = lseek(bebox_fd, 0, SEEK_END);
788 1.6.2.2 mjf lseek(bebox_fd, 0, SEEK_SET);
789 1.6.2.2 mjf header_img = (unsigned char *)malloc(BEBOX_HEADER_SIZE);
790 1.6.2.2 mjf if (!header_img)
791 1.6.2.2 mjf errx(3, "Can't malloc: %s", strerror(errno));
792 1.6.2.2 mjf memset(header_img, 0, BEBOX_HEADER_SIZE);
793 1.6.2.2 mjf
794 1.6.2.2 mjf /* copy the boot image into the buffer */
795 1.6.2.2 mjf for (p = bebox_image_block; p->offset != -1; p++)
796 1.6.2.2 mjf memcpy(header_img + p->offset, p->data, p->size);
797 1.6.2.2 mjf
798 1.6.2.2 mjf /* fill used block bitmap */
799 1.6.2.2 mjf memset(header_img + BEBOX_FILE_BLOCK_MAP_START, 0xff,
800 1.6.2.2 mjf BEBOX_FILE_BLOCK_MAP_END - BEBOX_FILE_BLOCK_MAP_START);
801 1.6.2.2 mjf
802 1.6.2.2 mjf /* fix the file size in the header */
803 1.6.2.2 mjf *(long *)(header_img + BEBOX_FILE_SIZE_OFFSET) =
804 1.6.2.2 mjf (long)sa_htobe32(endoff);
805 1.6.2.2 mjf *(long *)(header_img + BEBOX_FILE_SIZE_ALIGN_OFFSET) =
806 1.6.2.2 mjf (long)sa_htobe32(roundup(endoff, BEBOX_BLOCK_SIZE));
807 1.6.2.2 mjf
808 1.6.2.2 mjf gettimeofday(&tp, 0);
809 1.6.2.2 mjf for (offset = bebox_mtime_offset; *offset != -1; offset++)
810 1.6.2.2 mjf *(long *)(header_img + *offset) = (long)sa_htobe32(tp.tv_sec);
811 1.6.2.2 mjf
812 1.6.2.2 mjf write(bebox_fd, header_img, BEBOX_HEADER_SIZE);
813 1.6.2.2 mjf
814 1.6.2.2 mjf /* now pad the end */
815 1.6.2.2 mjf flength = roundup(endoff, BEBOX_BLOCK_SIZE);
816 1.6.2.2 mjf /* refill the header_img with zeros */
817 1.6.2.2 mjf memset(header_img, 0, BEBOX_BLOCK_SIZE * 2);
818 1.6.2.2 mjf lseek(bebox_fd, 0, SEEK_END);
819 1.6.2.2 mjf write(bebox_fd, header_img, flength - endoff);
820 1.6.2.2 mjf
821 1.6.2.2 mjf close(bebox_fd);
822 1.6.2.2 mjf
823 1.6.2.2 mjf return 0;
824 1.6.2.2 mjf }
825 1.6.2.2 mjf
826 1.6.2.2 mjf int
827 1.6.2.2 mjf main(int argc, char **argv)
828 1.6.2.2 mjf {
829 1.6.2.2 mjf int ch, lfloppyflag=0;
830 1.6.2.2 mjf char *kernel = NULL, *boot = NULL, *rawdev = NULL, *outname = NULL;
831 1.6.2.2 mjf char *march = NULL;
832 1.6.2.2 mjf #ifdef __NetBSD__
833 1.6.2.2 mjf char machine_arch[SYS_NMLN];
834 1.6.2.2 mjf int mib[2] = { CTL_HW, HW_MACHINE_ARCH };
835 1.6.2.2 mjf #endif
836 1.6.2.2 mjf
837 1.6.2.2 mjf setprogname(argv[0]);
838 1.6.2.2 mjf kern_len = 0;
839 1.6.2.2 mjf
840 1.6.2.2 mjf while ((ch = getopt(argc, argv, "b:k:lm:r:sv")) != -1)
841 1.6.2.2 mjf switch (ch) {
842 1.6.2.2 mjf case 'b':
843 1.6.2.2 mjf boot = optarg;
844 1.6.2.2 mjf break;
845 1.6.2.2 mjf case 'k':
846 1.6.2.2 mjf kernel = optarg;
847 1.6.2.2 mjf break;
848 1.6.2.2 mjf case 'l':
849 1.6.2.2 mjf lfloppyflag = 1;
850 1.6.2.2 mjf break;
851 1.6.2.2 mjf case 'm':
852 1.6.2.2 mjf march = optarg;
853 1.6.2.2 mjf break;
854 1.6.2.2 mjf case 'r':
855 1.6.2.2 mjf rawdev = optarg;
856 1.6.2.2 mjf break;
857 1.6.2.2 mjf case 's':
858 1.6.2.2 mjf saloneflag = 1;
859 1.6.2.2 mjf break;
860 1.6.2.2 mjf case 'v':
861 1.6.2.2 mjf verboseflag = 1;
862 1.6.2.2 mjf break;
863 1.6.2.2 mjf case '?':
864 1.6.2.2 mjf default:
865 1.6.2.2 mjf usage(0);
866 1.6.2.2 mjf /* NOTREACHED */
867 1.6.2.2 mjf }
868 1.6.2.2 mjf argc -= optind;
869 1.6.2.2 mjf argv += optind;
870 1.6.2.2 mjf
871 1.6.2.2 mjf if (argc < 1)
872 1.6.2.2 mjf usage(0);
873 1.6.2.2 mjf
874 1.6.2.2 mjf if (kernel == NULL)
875 1.6.2.2 mjf kernel = "/netbsd";
876 1.6.2.2 mjf
877 1.6.2.2 mjf if (boot == NULL)
878 1.6.2.2 mjf boot = "/usr/mdec/boot";
879 1.6.2.2 mjf
880 1.6.2.2 mjf if (march != NULL && strcmp(march, "") == 0)
881 1.6.2.2 mjf march = NULL;
882 1.6.2.2 mjf if (march == NULL) {
883 1.6.2.2 mjf int i;
884 1.6.2.2 mjf #ifdef __NetBSD__
885 1.6.2.2 mjf size_t len = sizeof(machine_arch);
886 1.6.2.2 mjf
887 1.6.2.2 mjf if (sysctl(mib, sizeof (mib) / sizeof (mib[0]), machine_arch,
888 1.6.2.2 mjf &len, NULL, 0) != -1) {
889 1.6.2.2 mjf for (i=0; sup_plats[i] != NULL; i++) {
890 1.6.2.2 mjf if (strcmp(sup_plats[i], machine_arch) == 0) {
891 1.6.2.2 mjf march = strdup(sup_plats[i]);
892 1.6.2.2 mjf break;
893 1.6.2.2 mjf }
894 1.6.2.2 mjf }
895 1.6.2.2 mjf }
896 1.6.2.2 mjf if (march == NULL)
897 1.6.2.2 mjf #endif
898 1.6.2.2 mjf usage(1);
899 1.6.2.2 mjf }
900 1.6.2.2 mjf
901 1.6.2.2 mjf outname = argv[0];
902 1.6.2.2 mjf
903 1.6.2.2 mjf if (strcmp(march, "prep") == 0)
904 1.6.2.2 mjf return(prep_build_image(kernel, boot, rawdev, outname));
905 1.6.2.2 mjf if (strcmp(march, "rs6000") == 0)
906 1.6.2.2 mjf return(rs6000_build_image(kernel, boot, rawdev, outname));
907 1.6.2.2 mjf if (strcmp(march, "bebox") == 0)
908 1.6.2.2 mjf return(bebox_build_image(kernel, boot, rawdev, outname));
909 1.6.2.2 mjf
910 1.6.2.2 mjf usage(1);
911 1.6.2.2 mjf return(0);
912 1.6.2.2 mjf }
913