i386.c revision 1.27 1 1.27 dogcow /* $NetBSD: i386.c,v 1.27 2007/06/23 23:07:44 dogcow Exp $ */
2 1.1 dsl
3 1.1 dsl /*-
4 1.1 dsl * Copyright (c) 2003 The NetBSD Foundation, Inc.
5 1.1 dsl * All rights reserved.
6 1.1 dsl *
7 1.1 dsl * This code is derived from software contributed to The NetBSD Foundation
8 1.1 dsl * by David Laight.
9 1.1 dsl *
10 1.1 dsl * Redistribution and use in source and binary forms, with or without
11 1.1 dsl * modification, are permitted provided that the following conditions
12 1.1 dsl * are met:
13 1.1 dsl * 1. Redistributions of source code must retain the above copyright
14 1.1 dsl * notice, this list of conditions and the following disclaimer.
15 1.1 dsl * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 dsl * notice, this list of conditions and the following disclaimer in the
17 1.1 dsl * documentation and/or other materials provided with the distribution.
18 1.1 dsl * 3. All advertising materials mentioning features or use of this software
19 1.1 dsl * must display the following acknowledgement:
20 1.1 dsl * This product includes software developed by the NetBSD
21 1.1 dsl * Foundation, Inc. and its contributors.
22 1.1 dsl * 4. Neither the name of The NetBSD Foundation nor the names of its
23 1.1 dsl * contributors may be used to endorse or promote products derived
24 1.1 dsl * from this software without specific prior written permission.
25 1.1 dsl *
26 1.1 dsl * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 1.1 dsl * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 1.1 dsl * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 1.1 dsl * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 1.1 dsl * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 1.1 dsl * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 1.1 dsl * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 1.1 dsl * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 1.1 dsl * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 1.1 dsl * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 1.1 dsl * POSSIBILITY OF SUCH DAMAGE.
37 1.1 dsl */
38 1.1 dsl
39 1.12 lukem #if HAVE_NBTOOL_CONFIG_H
40 1.12 lukem #include "nbtool_config.h"
41 1.12 lukem #endif
42 1.12 lukem
43 1.1 dsl #include <sys/cdefs.h>
44 1.12 lukem #if !defined(__lint)
45 1.27 dogcow __RCSID("$NetBSD: i386.c,v 1.27 2007/06/23 23:07:44 dogcow Exp $");
46 1.13 lukem #endif /* !__lint */
47 1.1 dsl
48 1.1 dsl #include <sys/param.h>
49 1.23 dsl #ifndef HAVE_NBTOOL_CONFIG_H
50 1.23 dsl #include <sys/ioctl.h>
51 1.23 dsl #include <sys/dkio.h>
52 1.23 dsl #endif
53 1.1 dsl
54 1.1 dsl #include <assert.h>
55 1.23 dsl #include <errno.h>
56 1.1 dsl #include <err.h>
57 1.5 bjh21 #include <md5.h>
58 1.1 dsl #include <stddef.h>
59 1.1 dsl #include <stdio.h>
60 1.1 dsl #include <stdlib.h>
61 1.1 dsl #include <string.h>
62 1.1 dsl #include <unistd.h>
63 1.1 dsl
64 1.1 dsl #include "installboot.h"
65 1.1 dsl
66 1.19 dsl #define nelem(x) (sizeof (x)/sizeof *(x))
67 1.27 dogcow #ifndef __arraycount
68 1.27 dogcow #define __arraycount(__x) (sizeof(__x) / sizeof(__x[0]))
69 1.27 dogcow #endif
70 1.19 dsl
71 1.26 christos static const struct console_name {
72 1.26 christos const char *name; /* Name of console selection */
73 1.26 christos const int dev; /* value matching CONSDEV_* from sys/arch/i386/stand/lib/libi386.h */
74 1.26 christos } consoles[] = {
75 1.26 christos { "pc", 0 /* CONSDEV_PC */ },
76 1.26 christos { "com0", 1 /* CONSDEV_COM0 */ },
77 1.26 christos { "com1", 2 /* CONSDEV_COM1 */ },
78 1.26 christos { "com2", 3 /* CONSDEV_COM2 */ },
79 1.26 christos { "com3", 4 /* CONSDEV_COM3 */ },
80 1.26 christos { "com0kbd", 5 /* CONSDEV_COM0KBD */ },
81 1.26 christos { "com1kbd", 6 /* CONSDEV_COM1KBD */ },
82 1.26 christos { "com2kbd", 7 /* CONSDEV_COM2KBD */ },
83 1.26 christos { "com3kbd", 8 /* CONSDEV_COM3KBD */ },
84 1.26 christos { "auto", -1 /* CONSDEV_AUTO */ },
85 1.26 christos };
86 1.19 dsl
87 1.22 dsl static int i386_setboot(ib_params *);
88 1.22 dsl static int i386_editboot(ib_params *);
89 1.22 dsl
90 1.22 dsl struct ib_mach ib_mach_i386 =
91 1.22 dsl { "i386", i386_setboot, no_clearboot, i386_editboot,
92 1.22 dsl IB_RESETVIDEO | IB_CONSOLE | IB_CONSPEED | IB_CONSADDR |
93 1.22 dsl IB_KEYMAP | IB_PASSWORD | IB_TIMEOUT };
94 1.22 dsl
95 1.22 dsl struct ib_mach ib_mach_amd64 =
96 1.22 dsl { "amd64", i386_setboot, no_clearboot, i386_editboot,
97 1.22 dsl IB_RESETVIDEO | IB_CONSOLE | IB_CONSPEED | IB_CONSADDR |
98 1.22 dsl IB_KEYMAP | IB_PASSWORD | IB_TIMEOUT };
99 1.22 dsl
100 1.23 dsl /*
101 1.23 dsl * Attempting to write the 'labelsector' (or a sector near it - within 8k?)
102 1.23 dsl * using the non-raw disk device fails silently. This can be detected (today)
103 1.23 dsl * by doing a fsync() and a read back.
104 1.23 dsl * This is very likely to affect installboot, indeed the code may need to
105 1.23 dsl * be written into the 'labelsector' itself - especially on non-512 byte media.
106 1.23 dsl * We do all writes with a read verify.
107 1.23 dsl * If EROFS is returned we also try to enable writes to the label sector.
108 1.23 dsl * (Maybe these functions should be in the generic part of installboot.)
109 1.23 dsl */
110 1.23 dsl static int
111 1.23 dsl pwrite_validate(int fd, const void *buf, size_t n_bytes, off_t offset)
112 1.23 dsl {
113 1.23 dsl void *r_buf;
114 1.23 dsl ssize_t rv;
115 1.23 dsl
116 1.23 dsl r_buf = malloc(n_bytes);
117 1.23 dsl if (r_buf == NULL)
118 1.23 dsl return -1;
119 1.23 dsl rv = pwrite(fd, buf, n_bytes, offset);
120 1.23 dsl if (rv == -1) {
121 1.23 dsl free(r_buf);
122 1.23 dsl return -1;
123 1.23 dsl }
124 1.23 dsl fsync(fd);
125 1.23 dsl if (pread(fd, r_buf, rv, offset) == rv && memcmp(r_buf, buf, rv) == 0)
126 1.23 dsl return rv;
127 1.23 dsl errno = EROFS;
128 1.23 dsl return -1;
129 1.23 dsl }
130 1.23 dsl
131 1.23 dsl static int
132 1.23 dsl write_boot_area(ib_params *params, void *v_buf, int len)
133 1.23 dsl {
134 1.23 dsl int rv, i;
135 1.23 dsl uint8_t *buf = v_buf;
136 1.23 dsl
137 1.23 dsl /*
138 1.23 dsl * Writing the 'label' sector (likely to be bytes 512-1023) could
139 1.23 dsl * fail, so we try to avoid writing that area.
140 1.23 dsl * Unfortunately, if we are accessing the raw disk, and the sector
141 1.23 dsl * size is larger than 512 bytes that is also doomed.
142 1.23 dsl * See how we get on....
143 1.23 dsl *
144 1.23 dsl * NB: Even if the physical sector size is not 512, the space for
145 1.23 dsl * the label is 512 bytes from the start of the disk.
146 1.23 dsl * So all the '512' constants in these functions are correct.
147 1.23 dsl */
148 1.23 dsl
149 1.23 dsl /* Write out first 512 bytes - the pbr code */
150 1.23 dsl rv = pwrite_validate(params->fsfd, buf, 512, 0);
151 1.23 dsl if (rv == 512) {
152 1.23 dsl /* That worked, do the rest */
153 1.23 dsl if (len == 512)
154 1.23 dsl return 1;
155 1.23 dsl len -= 512 * 2;
156 1.23 dsl rv = pwrite_validate(params->fsfd, buf + 512 * 2, len, 512 * 2);
157 1.23 dsl if (rv != len)
158 1.23 dsl goto bad_write;
159 1.23 dsl return 1;
160 1.23 dsl }
161 1.23 dsl if (rv != -1 || (errno != EINVAL && errno != EROFS))
162 1.23 dsl goto bad_write;
163 1.23 dsl
164 1.23 dsl if (errno == EINVAL) {
165 1.23 dsl /* Assume the failure was due to to the sector size > 512 */
166 1.23 dsl rv = pwrite_validate(params->fsfd, buf, len, 0);
167 1.23 dsl if (rv == len)
168 1.23 dsl return 1;
169 1.23 dsl if (rv != -1 || (errno != EROFS))
170 1.23 dsl goto bad_write;
171 1.23 dsl }
172 1.23 dsl
173 1.23 dsl #ifdef DIOCWLABEL
174 1.23 dsl /* Pesky label is protected, try to unprotect it */
175 1.23 dsl i = 1;
176 1.23 dsl rv = ioctl(params->fsfd, DIOCWLABEL, &i);
177 1.23 dsl if (rv != 0) {
178 1.23 dsl warn("Cannot enable writes to the label sector");
179 1.23 dsl return 0;
180 1.23 dsl }
181 1.23 dsl /* Try again with label write-enabled */
182 1.23 dsl rv = pwrite_validate(params->fsfd, buf, len, 0);
183 1.23 dsl
184 1.23 dsl /* Reset write-protext */
185 1.23 dsl i = 0;
186 1.23 dsl ioctl(params->fsfd, DIOCWLABEL, &i);
187 1.23 dsl if (rv == len)
188 1.23 dsl return 1;
189 1.23 dsl #endif
190 1.23 dsl
191 1.23 dsl bad_write:
192 1.23 dsl if (rv == -1)
193 1.23 dsl warn("Writing `%s'", params->filesystem);
194 1.23 dsl else
195 1.23 dsl warnx("Writing `%s': short write, %u bytes",
196 1.23 dsl params->filesystem, rv);
197 1.23 dsl return 0;
198 1.23 dsl }
199 1.23 dsl
200 1.19 dsl static void
201 1.19 dsl show_i386_boot_params(struct x86_boot_params *bpp)
202 1.19 dsl {
203 1.26 christos size_t i;
204 1.19 dsl
205 1.19 dsl printf("Boot options: ");
206 1.19 dsl printf("timeout %d, ", le32toh(bpp->bp_timeout));
207 1.19 dsl printf("flags %x, ", le32toh(bpp->bp_flags));
208 1.19 dsl printf("speed %d, ", le32toh(bpp->bp_conspeed));
209 1.19 dsl printf("ioaddr %x, ", le32toh(bpp->bp_consaddr));
210 1.26 christos for (i = 0; i < __arraycount(consoles); i++) {
211 1.26 christos if (consoles[i].dev == le32toh(bpp->bp_consdev))
212 1.26 christos break;
213 1.26 christos }
214 1.26 christos if (i == __arraycount(consoles))
215 1.26 christos printf("console %d\n", le32toh(bpp->bp_consdev));
216 1.19 dsl else
217 1.26 christos printf("console %s\n", consoles[i].name);
218 1.19 dsl if (bpp->bp_keymap[0])
219 1.19 dsl printf(" keymap %s\n", bpp->bp_keymap);
220 1.19 dsl }
221 1.19 dsl
222 1.19 dsl static int
223 1.23 dsl is_zero(const uint8_t *p, unsigned int len)
224 1.23 dsl {
225 1.23 dsl return len == 0 || (p[0] == 0 && memcmp(p, p + 1, len - 1) == 0);
226 1.23 dsl }
227 1.23 dsl
228 1.23 dsl static int
229 1.19 dsl update_i386_boot_params(ib_params *params, struct x86_boot_params *bpp)
230 1.19 dsl {
231 1.19 dsl struct x86_boot_params bp;
232 1.19 dsl int bplen;
233 1.26 christos size_t i;
234 1.19 dsl
235 1.19 dsl bplen = le32toh(bpp->bp_length);
236 1.19 dsl if (bplen > sizeof bp)
237 1.19 dsl /* Ignore pad space in bootxx */
238 1.19 dsl bplen = sizeof bp;
239 1.19 dsl
240 1.19 dsl /* Take (and update) local copy so we handle size mismatches */
241 1.19 dsl memset(&bp, 0, sizeof bp);
242 1.19 dsl memcpy(&bp, bpp, bplen);
243 1.19 dsl
244 1.19 dsl if (params->flags & IB_TIMEOUT)
245 1.19 dsl bp.bp_timeout = htole32(params->timeout);
246 1.19 dsl if (params->flags & IB_RESETVIDEO)
247 1.19 dsl bp.bp_flags ^= htole32(X86_BP_FLAGS_RESET_VIDEO);
248 1.19 dsl if (params->flags & IB_CONSPEED)
249 1.19 dsl bp.bp_conspeed = htole32(params->conspeed);
250 1.19 dsl if (params->flags & IB_CONSADDR)
251 1.19 dsl bp.bp_consaddr = htole32(params->consaddr);
252 1.19 dsl if (params->flags & IB_CONSOLE) {
253 1.26 christos for (i = 0; i < __arraycount(consoles); i++)
254 1.26 christos if (strcmp(consoles[i].name, params->console) == 0)
255 1.19 dsl break;
256 1.26 christos
257 1.26 christos if (i == __arraycount(consoles)) {
258 1.26 christos warnx("invalid console name, valid names are:");
259 1.26 christos (void)fprintf(stderr, "\t%s", consoles[0].name);
260 1.26 christos for (i = 1; consoles[i].name != NULL; i++)
261 1.26 christos (void)fprintf(stderr, ", %s", consoles[i].name);
262 1.26 christos (void)fprintf(stderr, "\n");
263 1.26 christos return 1;
264 1.19 dsl }
265 1.26 christos bp.bp_consdev = htole32(consoles[i].dev);
266 1.19 dsl }
267 1.19 dsl if (params->flags & IB_PASSWORD) {
268 1.19 dsl if (params->password[0]) {
269 1.19 dsl MD5_CTX md5ctx;
270 1.19 dsl MD5Init(&md5ctx);
271 1.19 dsl MD5Update(&md5ctx, params->password,
272 1.19 dsl strlen(params->password));
273 1.19 dsl MD5Final(bp.bp_password, &md5ctx);
274 1.19 dsl bp.bp_flags |= htole32(X86_BP_FLAGS_PASSWORD);
275 1.19 dsl } else {
276 1.19 dsl memset(&bp.bp_password, 0, sizeof bp.bp_password);
277 1.19 dsl bp.bp_flags &= ~htole32(X86_BP_FLAGS_PASSWORD);
278 1.19 dsl }
279 1.19 dsl }
280 1.19 dsl if (params->flags & IB_KEYMAP)
281 1.19 dsl strlcpy(bp.bp_keymap, params->keymap, sizeof bp.bp_keymap);
282 1.19 dsl
283 1.19 dsl if (params->flags & (IB_NOWRITE | IB_VERBOSE))
284 1.19 dsl show_i386_boot_params(&bp);
285 1.19 dsl
286 1.19 dsl /* Check we aren't trying to set anything we can't save */
287 1.23 dsl if (!is_zero((char *)&bp + bplen, sizeof bp - bplen)) {
288 1.19 dsl warnx("Patch area in stage1 bootstrap is too small");
289 1.19 dsl return 1;
290 1.19 dsl }
291 1.19 dsl memcpy(bpp, &bp, bplen);
292 1.19 dsl return 0;
293 1.19 dsl }
294 1.19 dsl
295 1.22 dsl static int
296 1.1 dsl i386_setboot(ib_params *params)
297 1.1 dsl {
298 1.23 dsl unsigned int u;
299 1.1 dsl ssize_t rv;
300 1.23 dsl uint32_t *magic, expected_magic;
301 1.23 dsl union {
302 1.23 dsl struct mbr_sector mbr;
303 1.23 dsl uint8_t b[8192];
304 1.23 dsl } disk_buf, bootstrap;
305 1.1 dsl
306 1.1 dsl assert(params != NULL);
307 1.1 dsl assert(params->fsfd != -1);
308 1.1 dsl assert(params->filesystem != NULL);
309 1.1 dsl assert(params->s1fd != -1);
310 1.1 dsl assert(params->stage1 != NULL);
311 1.1 dsl
312 1.2 dsl /*
313 1.2 dsl * There is only 8k of space in a UFSv1 partition (and ustarfs)
314 1.2 dsl * so ensure we don't splat over anything important.
315 1.2 dsl */
316 1.23 dsl if (params->s1stat.st_size > sizeof bootstrap) {
317 1.23 dsl warnx("stage1 bootstrap `%s' (%u bytes) is larger than 8192 bytes",
318 1.23 dsl params->stage1, (unsigned int)params->s1stat.st_size);
319 1.23 dsl return 0;
320 1.23 dsl }
321 1.23 dsl if (params->s1stat.st_size < 3 * 512 && params->s1stat.st_size != 512) {
322 1.23 dsl warnx("stage1 bootstrap `%s' (%u bytes) is too small",
323 1.23 dsl params->stage1, (unsigned int)params->s1stat.st_size);
324 1.23 dsl return 0;
325 1.9 lukem }
326 1.9 lukem
327 1.23 dsl /* Read in the existing disk header and boot code */
328 1.23 dsl rv = pread(params->fsfd, &disk_buf, sizeof (disk_buf), 0);
329 1.24 dogcow if (rv != sizeof(disk_buf)) {
330 1.23 dsl if (rv == -1)
331 1.23 dsl warn("Reading `%s'", params->filesystem);
332 1.23 dsl else
333 1.24 dogcow warnx("Reading `%s': short read, %ld bytes"
334 1.24 dogcow " (should be %ld)", params->filesystem, (long)rv,
335 1.24 dogcow (long)sizeof(disk_buf));
336 1.23 dsl return 0;
337 1.1 dsl }
338 1.23 dsl
339 1.23 dsl if (disk_buf.mbr.mbr_magic != le16toh(MBR_MAGIC)) {
340 1.9 lukem if (params->flags & IB_VERBOSE) {
341 1.9 lukem printf(
342 1.23 dsl "Ignoring PBR with invalid magic in sector 0 of `%s'\n",
343 1.9 lukem params->filesystem);
344 1.9 lukem }
345 1.23 dsl memset(&disk_buf, 0, 512);
346 1.9 lukem }
347 1.9 lukem
348 1.23 dsl /* Read the new bootstrap code. */
349 1.23 dsl rv = pread(params->s1fd, &bootstrap, params->s1stat.st_size, 0);
350 1.23 dsl if (rv != params->s1stat.st_size) {
351 1.23 dsl if (rv == -1)
352 1.23 dsl warn("Reading `%s'", params->stage1);
353 1.23 dsl else
354 1.24 dogcow warnx("Reading `%s': short read, %ld bytes"
355 1.24 dogcow " (should be %ld)", params->stage1, (long)rv,
356 1.24 dogcow (long)params->s1stat.st_size);
357 1.23 dsl return 0;
358 1.1 dsl }
359 1.1 dsl
360 1.9 lukem /*
361 1.23 dsl * The bootstrap code is either 512 bytes for booting FAT16, or best
362 1.23 dsl * part of 8k (with bytes 512-1023 all zeros).
363 1.23 dsl */
364 1.23 dsl if (params->s1stat.st_size == 512) {
365 1.23 dsl /* Magic number is at end of pbr code */
366 1.23 dsl magic = (void *)(bootstrap.b + 512 - 16 + 4);
367 1.23 dsl expected_magic = htole32(X86_BOOT_MAGIC_FAT);
368 1.23 dsl } else {
369 1.23 dsl /* Magic number is at start of sector following label */
370 1.23 dsl magic = (void *)(bootstrap.b + 512 * 2 + 4);
371 1.23 dsl expected_magic = htole32(X86_BOOT_MAGIC_1);
372 1.23 dsl /*
373 1.23 dsl * For a variety of reasons we restrict our 'normal' partition
374 1.23 dsl * boot code to a size which enable it to be used as mbr code.
375 1.23 dsl * IMHO this is bugus (dsl).
376 1.23 dsl */
377 1.23 dsl if (!is_zero(bootstrap.b + 512-2-64, 64)) {
378 1.23 dsl warnx("Data in mbr partition table of new bootstrap");
379 1.23 dsl return 0;
380 1.23 dsl }
381 1.23 dsl if (!is_zero(bootstrap.b + 512, 512)) {
382 1.23 dsl warnx("Data in label part of new bootstrap");
383 1.23 dsl return 0;
384 1.23 dsl }
385 1.23 dsl /* Copy mbr table and label from existing disk buffer */
386 1.23 dsl memcpy(bootstrap.b + 512-2-64, disk_buf.b + 512-2-64, 64);
387 1.23 dsl memcpy(bootstrap.b + 512, disk_buf.b + 512, 512);
388 1.1 dsl }
389 1.1 dsl
390 1.23 dsl /* Validate the 'magic number' that marks the parameter block */
391 1.23 dsl if (*magic != expected_magic) {
392 1.20 dsl warnx("Invalid magic in stage1 bootstrap %x != %x",
393 1.23 dsl *magic, expected_magic);
394 1.23 dsl return 0;
395 1.2 dsl }
396 1.2 dsl
397 1.9 lukem /*
398 1.25 dsl * If the partion has a FAT (or NTFS) filesystem, then we must
399 1.25 dsl * preserve the BIOS Parameter Block (BPB).
400 1.25 dsl * It is also very likely that there isn't 8k of space available
401 1.25 dsl * for (say) bootxx_msdos, and that blindly installing it will trash
402 1.25 dsl * the FAT filesystem.
403 1.25 dsl * To avoid this we check the number of 'reserved' sectors to ensure
404 1.25 dsl * there there is enough space.
405 1.25 dsl * Unfortunately newfs(8) doesn't (yet) splat the BPB (which is
406 1.25 dsl * effectively the FAT superblock) when a filesystem is initailised
407 1.25 dsl * so this code tends to complain rather too often,
408 1.25 dsl * Specifying 'installboot -f' will delete the old BPB info.
409 1.11 lukem */
410 1.25 dsl if (!(params->flags & IB_FORCE)) {
411 1.25 dsl /*
412 1.25 dsl * For FAT compatibility, the pbr code starts 'jmp xx; nop'
413 1.25 dsl * followed by the BIOS Parameter Block (BPB).
414 1.25 dsl * The 2nd byte (jump offset) is the size of the nop + BPB.
415 1.25 dsl */
416 1.25 dsl if (bootstrap.b[0] != 0xeb || bootstrap.b[2] != 0x90) {
417 1.25 dsl warnx("No BPB in new bootstrap %02x:%02x:%02x, use -f",
418 1.25 dsl bootstrap.b[0], bootstrap.b[1], bootstrap.b[2]);
419 1.23 dsl return 0;
420 1.23 dsl }
421 1.25 dsl
422 1.25 dsl /* Find size of old BPB, and copy into new bootcode */
423 1.25 dsl if (!is_zero(disk_buf.b + 3 + 8, disk_buf.b[1] - 1 - 8)) {
424 1.25 dsl struct mbr_bpbFAT16 *bpb = (void *)(disk_buf.b + 3 + 8);
425 1.25 dsl /* Check enough space before the FAT for the bootcode */
426 1.25 dsl u = le16toh(bpb->bpbBytesPerSec)
427 1.25 dsl * le16toh(bpb->bpbResSectors);
428 1.25 dsl if (u != 0 && u < params->s1stat.st_size) {
429 1.25 dsl warnx("Insufficient reserved space before FAT (%u bytes available), use -f", u);
430 1.25 dsl return 0;
431 1.23 dsl }
432 1.25 dsl /* Check we have enough space for the old bpb */
433 1.25 dsl if (disk_buf.b[1] > bootstrap.b[1]) {
434 1.25 dsl /* old BPB is larger, allow if extra zeros */
435 1.25 dsl if (!is_zero(disk_buf.b + 2 + bootstrap.b[1],
436 1.25 dsl disk_buf.b[1] - bootstrap.b[1])) {
437 1.25 dsl warnx("Old BPB too big, use -f");
438 1.25 dsl return 0;
439 1.25 dsl }
440 1.25 dsl u = bootstrap.b[1];
441 1.25 dsl } else {
442 1.25 dsl /* Old BPB is shorter, leave zero filled */
443 1.25 dsl u = disk_buf.b[1];
444 1.25 dsl }
445 1.25 dsl memcpy(bootstrap.b + 2, disk_buf.b + 2, u);
446 1.9 lukem }
447 1.9 lukem }
448 1.9 lukem
449 1.9 lukem /*
450 1.15 lukem * Fill in any user-specified options into the
451 1.17 dsl * struct x86_boot_params
452 1.23 dsl * that follows the magic number.
453 1.15 lukem * See sys/arch/i386/stand/bootxx/bootxx.S for more information.
454 1.9 lukem */
455 1.23 dsl if (update_i386_boot_params(params, (void *)(magic + 1)))
456 1.23 dsl return 0;
457 1.1 dsl
458 1.1 dsl if (params->flags & IB_NOWRITE) {
459 1.23 dsl return 1;
460 1.1 dsl }
461 1.1 dsl
462 1.23 dsl /* Copy new bootstrap data into disk buffer, ignoring label area */
463 1.23 dsl memcpy(&disk_buf, &bootstrap, 512);
464 1.23 dsl if (params->s1stat.st_size > 512 * 2) {
465 1.23 dsl memcpy(disk_buf.b + 2 * 512, bootstrap.b + 2 * 512,
466 1.23 dsl params->s1stat.st_size - 2 * 512);
467 1.23 dsl /* Zero pad to 512 byte sector boundary */
468 1.23 dsl memset(disk_buf.b + params->s1stat.st_size, 0,
469 1.23 dsl (8192 - params->s1stat.st_size) & 511);
470 1.1 dsl }
471 1.1 dsl
472 1.23 dsl return write_boot_area(params, &disk_buf, sizeof disk_buf);
473 1.1 dsl }
474 1.19 dsl
475 1.22 dsl static int
476 1.19 dsl i386_editboot(ib_params *params)
477 1.19 dsl {
478 1.19 dsl int retval;
479 1.19 dsl uint8_t buf[512];
480 1.19 dsl ssize_t rv;
481 1.19 dsl uint32_t magic;
482 1.19 dsl uint32_t offset;
483 1.19 dsl struct x86_boot_params *bpp;
484 1.19 dsl
485 1.19 dsl assert(params != NULL);
486 1.19 dsl assert(params->fsfd != -1);
487 1.19 dsl assert(params->filesystem != NULL);
488 1.19 dsl
489 1.19 dsl retval = 0;
490 1.19 dsl
491 1.19 dsl /*
492 1.19 dsl * Read in the existing bootstrap.
493 1.21 dsl * Look in any of the first 4 sectors.
494 1.19 dsl */
495 1.19 dsl
496 1.19 dsl bpp = NULL;
497 1.19 dsl for (offset = 0; offset < 4 * 512; offset += 512) {
498 1.19 dsl rv = pread(params->fsfd, &buf, sizeof buf, offset);
499 1.19 dsl if (rv == -1) {
500 1.19 dsl warn("Reading `%s'", params->filesystem);
501 1.19 dsl goto done;
502 1.19 dsl } else if (rv != sizeof buf) {
503 1.19 dsl warnx("Reading `%s': short read", params->filesystem);
504 1.19 dsl goto done;
505 1.19 dsl }
506 1.19 dsl
507 1.21 dsl /* Magic number is 4 bytes in (to allow for a jmps) */
508 1.21 dsl /* Also allow any of the magic numbers. */
509 1.21 dsl magic = le32toh(*(uint32_t *)(buf + 4)) | 0xf;
510 1.21 dsl if (magic != (X86_BOOT_MAGIC_1 | 0xf))
511 1.19 dsl continue;
512 1.21 dsl
513 1.21 dsl /* The parameters are just after the magic number */
514 1.19 dsl bpp = (void *)(buf + 8);
515 1.19 dsl break;
516 1.19 dsl }
517 1.19 dsl if (bpp == NULL) {
518 1.21 dsl warnx("Invalid magic in existing bootstrap");
519 1.19 dsl goto done;
520 1.19 dsl }
521 1.19 dsl
522 1.19 dsl /*
523 1.19 dsl * Fill in any user-specified options into the
524 1.19 dsl * struct x86_boot_params
525 1.19 dsl * that's 8 bytes in from the start of the third sector.
526 1.19 dsl * See sys/arch/i386/stand/bootxx/bootxx.S for more information.
527 1.19 dsl */
528 1.19 dsl if (update_i386_boot_params(params, bpp))
529 1.19 dsl goto done;
530 1.19 dsl
531 1.19 dsl if (params->flags & IB_NOWRITE) {
532 1.19 dsl retval = 1;
533 1.19 dsl goto done;
534 1.19 dsl }
535 1.19 dsl
536 1.19 dsl /*
537 1.19 dsl * Write boot code back
538 1.19 dsl */
539 1.19 dsl rv = pwrite(params->fsfd, buf, sizeof buf, offset);
540 1.19 dsl if (rv == -1) {
541 1.19 dsl warn("Writing `%s'", params->filesystem);
542 1.19 dsl goto done;
543 1.19 dsl } else if (rv != sizeof buf) {
544 1.24 dogcow warnx("Writing `%s': short write, %ld bytes (should be %ld)",
545 1.24 dogcow params->filesystem, (long)rv, (long)sizeof(buf));
546 1.19 dsl goto done;
547 1.19 dsl }
548 1.19 dsl
549 1.19 dsl retval = 1;
550 1.19 dsl
551 1.19 dsl done:
552 1.19 dsl return retval;
553 1.19 dsl }
554