i386.c revision 1.26 1 1.26 christos /* $NetBSD: i386.c,v 1.26 2007/06/23 14:46:00 christos Exp $ */
2 1.1 dsl
3 1.1 dsl /*-
4 1.1 dsl * Copyright (c) 2003 The NetBSD Foundation, Inc.
5 1.1 dsl * All rights reserved.
6 1.1 dsl *
7 1.1 dsl * This code is derived from software contributed to The NetBSD Foundation
8 1.1 dsl * by David Laight.
9 1.1 dsl *
10 1.1 dsl * Redistribution and use in source and binary forms, with or without
11 1.1 dsl * modification, are permitted provided that the following conditions
12 1.1 dsl * are met:
13 1.1 dsl * 1. Redistributions of source code must retain the above copyright
14 1.1 dsl * notice, this list of conditions and the following disclaimer.
15 1.1 dsl * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 dsl * notice, this list of conditions and the following disclaimer in the
17 1.1 dsl * documentation and/or other materials provided with the distribution.
18 1.1 dsl * 3. All advertising materials mentioning features or use of this software
19 1.1 dsl * must display the following acknowledgement:
20 1.1 dsl * This product includes software developed by the NetBSD
21 1.1 dsl * Foundation, Inc. and its contributors.
22 1.1 dsl * 4. Neither the name of The NetBSD Foundation nor the names of its
23 1.1 dsl * contributors may be used to endorse or promote products derived
24 1.1 dsl * from this software without specific prior written permission.
25 1.1 dsl *
26 1.1 dsl * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 1.1 dsl * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 1.1 dsl * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 1.1 dsl * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 1.1 dsl * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 1.1 dsl * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 1.1 dsl * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 1.1 dsl * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 1.1 dsl * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 1.1 dsl * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 1.1 dsl * POSSIBILITY OF SUCH DAMAGE.
37 1.1 dsl */
38 1.1 dsl
39 1.12 lukem #if HAVE_NBTOOL_CONFIG_H
40 1.12 lukem #include "nbtool_config.h"
41 1.12 lukem #endif
42 1.12 lukem
43 1.1 dsl #include <sys/cdefs.h>
44 1.12 lukem #if !defined(__lint)
45 1.26 christos __RCSID("$NetBSD: i386.c,v 1.26 2007/06/23 14:46:00 christos Exp $");
46 1.13 lukem #endif /* !__lint */
47 1.1 dsl
48 1.1 dsl #include <sys/param.h>
49 1.23 dsl #ifndef HAVE_NBTOOL_CONFIG_H
50 1.23 dsl #include <sys/ioctl.h>
51 1.23 dsl #include <sys/dkio.h>
52 1.23 dsl #endif
53 1.1 dsl
54 1.1 dsl #include <assert.h>
55 1.23 dsl #include <errno.h>
56 1.1 dsl #include <err.h>
57 1.5 bjh21 #include <md5.h>
58 1.1 dsl #include <stddef.h>
59 1.1 dsl #include <stdio.h>
60 1.1 dsl #include <stdlib.h>
61 1.1 dsl #include <string.h>
62 1.1 dsl #include <unistd.h>
63 1.1 dsl
64 1.1 dsl #include "installboot.h"
65 1.1 dsl
66 1.19 dsl #define nelem(x) (sizeof (x)/sizeof *(x))
67 1.19 dsl
68 1.26 christos static const struct console_name {
69 1.26 christos const char *name; /* Name of console selection */
70 1.26 christos const int dev; /* value matching CONSDEV_* from sys/arch/i386/stand/lib/libi386.h */
71 1.26 christos } consoles[] = {
72 1.26 christos { "pc", 0 /* CONSDEV_PC */ },
73 1.26 christos { "com0", 1 /* CONSDEV_COM0 */ },
74 1.26 christos { "com1", 2 /* CONSDEV_COM1 */ },
75 1.26 christos { "com2", 3 /* CONSDEV_COM2 */ },
76 1.26 christos { "com3", 4 /* CONSDEV_COM3 */ },
77 1.26 christos { "com0kbd", 5 /* CONSDEV_COM0KBD */ },
78 1.26 christos { "com1kbd", 6 /* CONSDEV_COM1KBD */ },
79 1.26 christos { "com2kbd", 7 /* CONSDEV_COM2KBD */ },
80 1.26 christos { "com3kbd", 8 /* CONSDEV_COM3KBD */ },
81 1.26 christos { "auto", -1 /* CONSDEV_AUTO */ },
82 1.26 christos };
83 1.19 dsl
84 1.22 dsl static int i386_setboot(ib_params *);
85 1.22 dsl static int i386_editboot(ib_params *);
86 1.22 dsl
87 1.22 dsl struct ib_mach ib_mach_i386 =
88 1.22 dsl { "i386", i386_setboot, no_clearboot, i386_editboot,
89 1.22 dsl IB_RESETVIDEO | IB_CONSOLE | IB_CONSPEED | IB_CONSADDR |
90 1.22 dsl IB_KEYMAP | IB_PASSWORD | IB_TIMEOUT };
91 1.22 dsl
92 1.22 dsl struct ib_mach ib_mach_amd64 =
93 1.22 dsl { "amd64", i386_setboot, no_clearboot, i386_editboot,
94 1.22 dsl IB_RESETVIDEO | IB_CONSOLE | IB_CONSPEED | IB_CONSADDR |
95 1.22 dsl IB_KEYMAP | IB_PASSWORD | IB_TIMEOUT };
96 1.22 dsl
97 1.23 dsl /*
98 1.23 dsl * Attempting to write the 'labelsector' (or a sector near it - within 8k?)
99 1.23 dsl * using the non-raw disk device fails silently. This can be detected (today)
100 1.23 dsl * by doing a fsync() and a read back.
101 1.23 dsl * This is very likely to affect installboot, indeed the code may need to
102 1.23 dsl * be written into the 'labelsector' itself - especially on non-512 byte media.
103 1.23 dsl * We do all writes with a read verify.
104 1.23 dsl * If EROFS is returned we also try to enable writes to the label sector.
105 1.23 dsl * (Maybe these functions should be in the generic part of installboot.)
106 1.23 dsl */
107 1.23 dsl static int
108 1.23 dsl pwrite_validate(int fd, const void *buf, size_t n_bytes, off_t offset)
109 1.23 dsl {
110 1.23 dsl void *r_buf;
111 1.23 dsl ssize_t rv;
112 1.23 dsl
113 1.23 dsl r_buf = malloc(n_bytes);
114 1.23 dsl if (r_buf == NULL)
115 1.23 dsl return -1;
116 1.23 dsl rv = pwrite(fd, buf, n_bytes, offset);
117 1.23 dsl if (rv == -1) {
118 1.23 dsl free(r_buf);
119 1.23 dsl return -1;
120 1.23 dsl }
121 1.23 dsl fsync(fd);
122 1.23 dsl if (pread(fd, r_buf, rv, offset) == rv && memcmp(r_buf, buf, rv) == 0)
123 1.23 dsl return rv;
124 1.23 dsl errno = EROFS;
125 1.23 dsl return -1;
126 1.23 dsl }
127 1.23 dsl
128 1.23 dsl static int
129 1.23 dsl write_boot_area(ib_params *params, void *v_buf, int len)
130 1.23 dsl {
131 1.23 dsl int rv, i;
132 1.23 dsl uint8_t *buf = v_buf;
133 1.23 dsl
134 1.23 dsl /*
135 1.23 dsl * Writing the 'label' sector (likely to be bytes 512-1023) could
136 1.23 dsl * fail, so we try to avoid writing that area.
137 1.23 dsl * Unfortunately, if we are accessing the raw disk, and the sector
138 1.23 dsl * size is larger than 512 bytes that is also doomed.
139 1.23 dsl * See how we get on....
140 1.23 dsl *
141 1.23 dsl * NB: Even if the physical sector size is not 512, the space for
142 1.23 dsl * the label is 512 bytes from the start of the disk.
143 1.23 dsl * So all the '512' constants in these functions are correct.
144 1.23 dsl */
145 1.23 dsl
146 1.23 dsl /* Write out first 512 bytes - the pbr code */
147 1.23 dsl rv = pwrite_validate(params->fsfd, buf, 512, 0);
148 1.23 dsl if (rv == 512) {
149 1.23 dsl /* That worked, do the rest */
150 1.23 dsl if (len == 512)
151 1.23 dsl return 1;
152 1.23 dsl len -= 512 * 2;
153 1.23 dsl rv = pwrite_validate(params->fsfd, buf + 512 * 2, len, 512 * 2);
154 1.23 dsl if (rv != len)
155 1.23 dsl goto bad_write;
156 1.23 dsl return 1;
157 1.23 dsl }
158 1.23 dsl if (rv != -1 || (errno != EINVAL && errno != EROFS))
159 1.23 dsl goto bad_write;
160 1.23 dsl
161 1.23 dsl if (errno == EINVAL) {
162 1.23 dsl /* Assume the failure was due to to the sector size > 512 */
163 1.23 dsl rv = pwrite_validate(params->fsfd, buf, len, 0);
164 1.23 dsl if (rv == len)
165 1.23 dsl return 1;
166 1.23 dsl if (rv != -1 || (errno != EROFS))
167 1.23 dsl goto bad_write;
168 1.23 dsl }
169 1.23 dsl
170 1.23 dsl #ifdef DIOCWLABEL
171 1.23 dsl /* Pesky label is protected, try to unprotect it */
172 1.23 dsl i = 1;
173 1.23 dsl rv = ioctl(params->fsfd, DIOCWLABEL, &i);
174 1.23 dsl if (rv != 0) {
175 1.23 dsl warn("Cannot enable writes to the label sector");
176 1.23 dsl return 0;
177 1.23 dsl }
178 1.23 dsl /* Try again with label write-enabled */
179 1.23 dsl rv = pwrite_validate(params->fsfd, buf, len, 0);
180 1.23 dsl
181 1.23 dsl /* Reset write-protext */
182 1.23 dsl i = 0;
183 1.23 dsl ioctl(params->fsfd, DIOCWLABEL, &i);
184 1.23 dsl if (rv == len)
185 1.23 dsl return 1;
186 1.23 dsl #endif
187 1.23 dsl
188 1.23 dsl bad_write:
189 1.23 dsl if (rv == -1)
190 1.23 dsl warn("Writing `%s'", params->filesystem);
191 1.23 dsl else
192 1.23 dsl warnx("Writing `%s': short write, %u bytes",
193 1.23 dsl params->filesystem, rv);
194 1.23 dsl return 0;
195 1.23 dsl }
196 1.23 dsl
197 1.19 dsl static void
198 1.19 dsl show_i386_boot_params(struct x86_boot_params *bpp)
199 1.19 dsl {
200 1.26 christos size_t i;
201 1.19 dsl
202 1.19 dsl printf("Boot options: ");
203 1.19 dsl printf("timeout %d, ", le32toh(bpp->bp_timeout));
204 1.19 dsl printf("flags %x, ", le32toh(bpp->bp_flags));
205 1.19 dsl printf("speed %d, ", le32toh(bpp->bp_conspeed));
206 1.19 dsl printf("ioaddr %x, ", le32toh(bpp->bp_consaddr));
207 1.26 christos for (i = 0; i < __arraycount(consoles); i++) {
208 1.26 christos if (consoles[i].dev == le32toh(bpp->bp_consdev))
209 1.26 christos break;
210 1.26 christos }
211 1.26 christos if (i == __arraycount(consoles))
212 1.26 christos printf("console %d\n", le32toh(bpp->bp_consdev));
213 1.19 dsl else
214 1.26 christos printf("console %s\n", consoles[i].name);
215 1.19 dsl if (bpp->bp_keymap[0])
216 1.19 dsl printf(" keymap %s\n", bpp->bp_keymap);
217 1.19 dsl }
218 1.19 dsl
219 1.19 dsl static int
220 1.23 dsl is_zero(const uint8_t *p, unsigned int len)
221 1.23 dsl {
222 1.23 dsl return len == 0 || (p[0] == 0 && memcmp(p, p + 1, len - 1) == 0);
223 1.23 dsl }
224 1.23 dsl
225 1.23 dsl static int
226 1.19 dsl update_i386_boot_params(ib_params *params, struct x86_boot_params *bpp)
227 1.19 dsl {
228 1.19 dsl struct x86_boot_params bp;
229 1.19 dsl int bplen;
230 1.26 christos size_t i;
231 1.19 dsl
232 1.19 dsl bplen = le32toh(bpp->bp_length);
233 1.19 dsl if (bplen > sizeof bp)
234 1.19 dsl /* Ignore pad space in bootxx */
235 1.19 dsl bplen = sizeof bp;
236 1.19 dsl
237 1.19 dsl /* Take (and update) local copy so we handle size mismatches */
238 1.19 dsl memset(&bp, 0, sizeof bp);
239 1.19 dsl memcpy(&bp, bpp, bplen);
240 1.19 dsl
241 1.19 dsl if (params->flags & IB_TIMEOUT)
242 1.19 dsl bp.bp_timeout = htole32(params->timeout);
243 1.19 dsl if (params->flags & IB_RESETVIDEO)
244 1.19 dsl bp.bp_flags ^= htole32(X86_BP_FLAGS_RESET_VIDEO);
245 1.19 dsl if (params->flags & IB_CONSPEED)
246 1.19 dsl bp.bp_conspeed = htole32(params->conspeed);
247 1.19 dsl if (params->flags & IB_CONSADDR)
248 1.19 dsl bp.bp_consaddr = htole32(params->consaddr);
249 1.19 dsl if (params->flags & IB_CONSOLE) {
250 1.26 christos for (i = 0; i < __arraycount(consoles); i++)
251 1.26 christos if (strcmp(consoles[i].name, params->console) == 0)
252 1.19 dsl break;
253 1.26 christos
254 1.26 christos if (i == __arraycount(consoles)) {
255 1.26 christos warnx("invalid console name, valid names are:");
256 1.26 christos (void)fprintf(stderr, "\t%s", consoles[0].name);
257 1.26 christos for (i = 1; consoles[i].name != NULL; i++)
258 1.26 christos (void)fprintf(stderr, ", %s", consoles[i].name);
259 1.26 christos (void)fprintf(stderr, "\n");
260 1.26 christos return 1;
261 1.19 dsl }
262 1.26 christos bp.bp_consdev = htole32(consoles[i].dev);
263 1.19 dsl }
264 1.19 dsl if (params->flags & IB_PASSWORD) {
265 1.19 dsl if (params->password[0]) {
266 1.19 dsl MD5_CTX md5ctx;
267 1.19 dsl MD5Init(&md5ctx);
268 1.19 dsl MD5Update(&md5ctx, params->password,
269 1.19 dsl strlen(params->password));
270 1.19 dsl MD5Final(bp.bp_password, &md5ctx);
271 1.19 dsl bp.bp_flags |= htole32(X86_BP_FLAGS_PASSWORD);
272 1.19 dsl } else {
273 1.19 dsl memset(&bp.bp_password, 0, sizeof bp.bp_password);
274 1.19 dsl bp.bp_flags &= ~htole32(X86_BP_FLAGS_PASSWORD);
275 1.19 dsl }
276 1.19 dsl }
277 1.19 dsl if (params->flags & IB_KEYMAP)
278 1.19 dsl strlcpy(bp.bp_keymap, params->keymap, sizeof bp.bp_keymap);
279 1.19 dsl
280 1.19 dsl if (params->flags & (IB_NOWRITE | IB_VERBOSE))
281 1.19 dsl show_i386_boot_params(&bp);
282 1.19 dsl
283 1.19 dsl /* Check we aren't trying to set anything we can't save */
284 1.23 dsl if (!is_zero((char *)&bp + bplen, sizeof bp - bplen)) {
285 1.19 dsl warnx("Patch area in stage1 bootstrap is too small");
286 1.19 dsl return 1;
287 1.19 dsl }
288 1.19 dsl memcpy(bpp, &bp, bplen);
289 1.19 dsl return 0;
290 1.19 dsl }
291 1.19 dsl
292 1.22 dsl static int
293 1.1 dsl i386_setboot(ib_params *params)
294 1.1 dsl {
295 1.23 dsl unsigned int u;
296 1.1 dsl ssize_t rv;
297 1.23 dsl uint32_t *magic, expected_magic;
298 1.23 dsl union {
299 1.23 dsl struct mbr_sector mbr;
300 1.23 dsl uint8_t b[8192];
301 1.23 dsl } disk_buf, bootstrap;
302 1.1 dsl
303 1.1 dsl assert(params != NULL);
304 1.1 dsl assert(params->fsfd != -1);
305 1.1 dsl assert(params->filesystem != NULL);
306 1.1 dsl assert(params->s1fd != -1);
307 1.1 dsl assert(params->stage1 != NULL);
308 1.1 dsl
309 1.2 dsl /*
310 1.2 dsl * There is only 8k of space in a UFSv1 partition (and ustarfs)
311 1.2 dsl * so ensure we don't splat over anything important.
312 1.2 dsl */
313 1.23 dsl if (params->s1stat.st_size > sizeof bootstrap) {
314 1.23 dsl warnx("stage1 bootstrap `%s' (%u bytes) is larger than 8192 bytes",
315 1.23 dsl params->stage1, (unsigned int)params->s1stat.st_size);
316 1.23 dsl return 0;
317 1.23 dsl }
318 1.23 dsl if (params->s1stat.st_size < 3 * 512 && params->s1stat.st_size != 512) {
319 1.23 dsl warnx("stage1 bootstrap `%s' (%u bytes) is too small",
320 1.23 dsl params->stage1, (unsigned int)params->s1stat.st_size);
321 1.23 dsl return 0;
322 1.9 lukem }
323 1.9 lukem
324 1.23 dsl /* Read in the existing disk header and boot code */
325 1.23 dsl rv = pread(params->fsfd, &disk_buf, sizeof (disk_buf), 0);
326 1.24 dogcow if (rv != sizeof(disk_buf)) {
327 1.23 dsl if (rv == -1)
328 1.23 dsl warn("Reading `%s'", params->filesystem);
329 1.23 dsl else
330 1.24 dogcow warnx("Reading `%s': short read, %ld bytes"
331 1.24 dogcow " (should be %ld)", params->filesystem, (long)rv,
332 1.24 dogcow (long)sizeof(disk_buf));
333 1.23 dsl return 0;
334 1.1 dsl }
335 1.23 dsl
336 1.23 dsl if (disk_buf.mbr.mbr_magic != le16toh(MBR_MAGIC)) {
337 1.9 lukem if (params->flags & IB_VERBOSE) {
338 1.9 lukem printf(
339 1.23 dsl "Ignoring PBR with invalid magic in sector 0 of `%s'\n",
340 1.9 lukem params->filesystem);
341 1.9 lukem }
342 1.23 dsl memset(&disk_buf, 0, 512);
343 1.9 lukem }
344 1.9 lukem
345 1.23 dsl /* Read the new bootstrap code. */
346 1.23 dsl rv = pread(params->s1fd, &bootstrap, params->s1stat.st_size, 0);
347 1.23 dsl if (rv != params->s1stat.st_size) {
348 1.23 dsl if (rv == -1)
349 1.23 dsl warn("Reading `%s'", params->stage1);
350 1.23 dsl else
351 1.24 dogcow warnx("Reading `%s': short read, %ld bytes"
352 1.24 dogcow " (should be %ld)", params->stage1, (long)rv,
353 1.24 dogcow (long)params->s1stat.st_size);
354 1.23 dsl return 0;
355 1.1 dsl }
356 1.1 dsl
357 1.9 lukem /*
358 1.23 dsl * The bootstrap code is either 512 bytes for booting FAT16, or best
359 1.23 dsl * part of 8k (with bytes 512-1023 all zeros).
360 1.23 dsl */
361 1.23 dsl if (params->s1stat.st_size == 512) {
362 1.23 dsl /* Magic number is at end of pbr code */
363 1.23 dsl magic = (void *)(bootstrap.b + 512 - 16 + 4);
364 1.23 dsl expected_magic = htole32(X86_BOOT_MAGIC_FAT);
365 1.23 dsl } else {
366 1.23 dsl /* Magic number is at start of sector following label */
367 1.23 dsl magic = (void *)(bootstrap.b + 512 * 2 + 4);
368 1.23 dsl expected_magic = htole32(X86_BOOT_MAGIC_1);
369 1.23 dsl /*
370 1.23 dsl * For a variety of reasons we restrict our 'normal' partition
371 1.23 dsl * boot code to a size which enable it to be used as mbr code.
372 1.23 dsl * IMHO this is bugus (dsl).
373 1.23 dsl */
374 1.23 dsl if (!is_zero(bootstrap.b + 512-2-64, 64)) {
375 1.23 dsl warnx("Data in mbr partition table of new bootstrap");
376 1.23 dsl return 0;
377 1.23 dsl }
378 1.23 dsl if (!is_zero(bootstrap.b + 512, 512)) {
379 1.23 dsl warnx("Data in label part of new bootstrap");
380 1.23 dsl return 0;
381 1.23 dsl }
382 1.23 dsl /* Copy mbr table and label from existing disk buffer */
383 1.23 dsl memcpy(bootstrap.b + 512-2-64, disk_buf.b + 512-2-64, 64);
384 1.23 dsl memcpy(bootstrap.b + 512, disk_buf.b + 512, 512);
385 1.1 dsl }
386 1.1 dsl
387 1.23 dsl /* Validate the 'magic number' that marks the parameter block */
388 1.23 dsl if (*magic != expected_magic) {
389 1.20 dsl warnx("Invalid magic in stage1 bootstrap %x != %x",
390 1.23 dsl *magic, expected_magic);
391 1.23 dsl return 0;
392 1.2 dsl }
393 1.2 dsl
394 1.9 lukem /*
395 1.25 dsl * If the partion has a FAT (or NTFS) filesystem, then we must
396 1.25 dsl * preserve the BIOS Parameter Block (BPB).
397 1.25 dsl * It is also very likely that there isn't 8k of space available
398 1.25 dsl * for (say) bootxx_msdos, and that blindly installing it will trash
399 1.25 dsl * the FAT filesystem.
400 1.25 dsl * To avoid this we check the number of 'reserved' sectors to ensure
401 1.25 dsl * there there is enough space.
402 1.25 dsl * Unfortunately newfs(8) doesn't (yet) splat the BPB (which is
403 1.25 dsl * effectively the FAT superblock) when a filesystem is initailised
404 1.25 dsl * so this code tends to complain rather too often,
405 1.25 dsl * Specifying 'installboot -f' will delete the old BPB info.
406 1.11 lukem */
407 1.25 dsl if (!(params->flags & IB_FORCE)) {
408 1.25 dsl /*
409 1.25 dsl * For FAT compatibility, the pbr code starts 'jmp xx; nop'
410 1.25 dsl * followed by the BIOS Parameter Block (BPB).
411 1.25 dsl * The 2nd byte (jump offset) is the size of the nop + BPB.
412 1.25 dsl */
413 1.25 dsl if (bootstrap.b[0] != 0xeb || bootstrap.b[2] != 0x90) {
414 1.25 dsl warnx("No BPB in new bootstrap %02x:%02x:%02x, use -f",
415 1.25 dsl bootstrap.b[0], bootstrap.b[1], bootstrap.b[2]);
416 1.23 dsl return 0;
417 1.23 dsl }
418 1.25 dsl
419 1.25 dsl /* Find size of old BPB, and copy into new bootcode */
420 1.25 dsl if (!is_zero(disk_buf.b + 3 + 8, disk_buf.b[1] - 1 - 8)) {
421 1.25 dsl struct mbr_bpbFAT16 *bpb = (void *)(disk_buf.b + 3 + 8);
422 1.25 dsl /* Check enough space before the FAT for the bootcode */
423 1.25 dsl u = le16toh(bpb->bpbBytesPerSec)
424 1.25 dsl * le16toh(bpb->bpbResSectors);
425 1.25 dsl if (u != 0 && u < params->s1stat.st_size) {
426 1.25 dsl warnx("Insufficient reserved space before FAT (%u bytes available), use -f", u);
427 1.25 dsl return 0;
428 1.23 dsl }
429 1.25 dsl /* Check we have enough space for the old bpb */
430 1.25 dsl if (disk_buf.b[1] > bootstrap.b[1]) {
431 1.25 dsl /* old BPB is larger, allow if extra zeros */
432 1.25 dsl if (!is_zero(disk_buf.b + 2 + bootstrap.b[1],
433 1.25 dsl disk_buf.b[1] - bootstrap.b[1])) {
434 1.25 dsl warnx("Old BPB too big, use -f");
435 1.25 dsl return 0;
436 1.25 dsl }
437 1.25 dsl u = bootstrap.b[1];
438 1.25 dsl } else {
439 1.25 dsl /* Old BPB is shorter, leave zero filled */
440 1.25 dsl u = disk_buf.b[1];
441 1.25 dsl }
442 1.25 dsl memcpy(bootstrap.b + 2, disk_buf.b + 2, u);
443 1.9 lukem }
444 1.9 lukem }
445 1.9 lukem
446 1.9 lukem /*
447 1.15 lukem * Fill in any user-specified options into the
448 1.17 dsl * struct x86_boot_params
449 1.23 dsl * that follows the magic number.
450 1.15 lukem * See sys/arch/i386/stand/bootxx/bootxx.S for more information.
451 1.9 lukem */
452 1.23 dsl if (update_i386_boot_params(params, (void *)(magic + 1)))
453 1.23 dsl return 0;
454 1.1 dsl
455 1.1 dsl if (params->flags & IB_NOWRITE) {
456 1.23 dsl return 1;
457 1.1 dsl }
458 1.1 dsl
459 1.23 dsl /* Copy new bootstrap data into disk buffer, ignoring label area */
460 1.23 dsl memcpy(&disk_buf, &bootstrap, 512);
461 1.23 dsl if (params->s1stat.st_size > 512 * 2) {
462 1.23 dsl memcpy(disk_buf.b + 2 * 512, bootstrap.b + 2 * 512,
463 1.23 dsl params->s1stat.st_size - 2 * 512);
464 1.23 dsl /* Zero pad to 512 byte sector boundary */
465 1.23 dsl memset(disk_buf.b + params->s1stat.st_size, 0,
466 1.23 dsl (8192 - params->s1stat.st_size) & 511);
467 1.1 dsl }
468 1.1 dsl
469 1.23 dsl return write_boot_area(params, &disk_buf, sizeof disk_buf);
470 1.1 dsl }
471 1.19 dsl
472 1.22 dsl static int
473 1.19 dsl i386_editboot(ib_params *params)
474 1.19 dsl {
475 1.19 dsl int retval;
476 1.19 dsl uint8_t buf[512];
477 1.19 dsl ssize_t rv;
478 1.19 dsl uint32_t magic;
479 1.19 dsl uint32_t offset;
480 1.19 dsl struct x86_boot_params *bpp;
481 1.19 dsl
482 1.19 dsl assert(params != NULL);
483 1.19 dsl assert(params->fsfd != -1);
484 1.19 dsl assert(params->filesystem != NULL);
485 1.19 dsl
486 1.19 dsl retval = 0;
487 1.19 dsl
488 1.19 dsl /*
489 1.19 dsl * Read in the existing bootstrap.
490 1.21 dsl * Look in any of the first 4 sectors.
491 1.19 dsl */
492 1.19 dsl
493 1.19 dsl bpp = NULL;
494 1.19 dsl for (offset = 0; offset < 4 * 512; offset += 512) {
495 1.19 dsl rv = pread(params->fsfd, &buf, sizeof buf, offset);
496 1.19 dsl if (rv == -1) {
497 1.19 dsl warn("Reading `%s'", params->filesystem);
498 1.19 dsl goto done;
499 1.19 dsl } else if (rv != sizeof buf) {
500 1.19 dsl warnx("Reading `%s': short read", params->filesystem);
501 1.19 dsl goto done;
502 1.19 dsl }
503 1.19 dsl
504 1.21 dsl /* Magic number is 4 bytes in (to allow for a jmps) */
505 1.21 dsl /* Also allow any of the magic numbers. */
506 1.21 dsl magic = le32toh(*(uint32_t *)(buf + 4)) | 0xf;
507 1.21 dsl if (magic != (X86_BOOT_MAGIC_1 | 0xf))
508 1.19 dsl continue;
509 1.21 dsl
510 1.21 dsl /* The parameters are just after the magic number */
511 1.19 dsl bpp = (void *)(buf + 8);
512 1.19 dsl break;
513 1.19 dsl }
514 1.19 dsl if (bpp == NULL) {
515 1.21 dsl warnx("Invalid magic in existing bootstrap");
516 1.19 dsl goto done;
517 1.19 dsl }
518 1.19 dsl
519 1.19 dsl /*
520 1.19 dsl * Fill in any user-specified options into the
521 1.19 dsl * struct x86_boot_params
522 1.19 dsl * that's 8 bytes in from the start of the third sector.
523 1.19 dsl * See sys/arch/i386/stand/bootxx/bootxx.S for more information.
524 1.19 dsl */
525 1.19 dsl if (update_i386_boot_params(params, bpp))
526 1.19 dsl goto done;
527 1.19 dsl
528 1.19 dsl if (params->flags & IB_NOWRITE) {
529 1.19 dsl retval = 1;
530 1.19 dsl goto done;
531 1.19 dsl }
532 1.19 dsl
533 1.19 dsl /*
534 1.19 dsl * Write boot code back
535 1.19 dsl */
536 1.19 dsl rv = pwrite(params->fsfd, buf, sizeof buf, offset);
537 1.19 dsl if (rv == -1) {
538 1.19 dsl warn("Writing `%s'", params->filesystem);
539 1.19 dsl goto done;
540 1.19 dsl } else if (rv != sizeof buf) {
541 1.24 dogcow warnx("Writing `%s': short write, %ld bytes (should be %ld)",
542 1.24 dogcow params->filesystem, (long)rv, (long)sizeof(buf));
543 1.19 dsl goto done;
544 1.19 dsl }
545 1.19 dsl
546 1.19 dsl retval = 1;
547 1.19 dsl
548 1.19 dsl done:
549 1.19 dsl return retval;
550 1.19 dsl }
551