xref: /netbsd-src/sys/arch/atari/stand/tostools/loadbsd/loadbsd.c (revision 984d919c49e8ce89fec66d07d1beb8dd60d34299)
1 /*	$NetBSD: loadbsd.c,v 1.16 2001/09/27 14:29:22 leo Exp $	*/
2 
3 /*
4  * Copyright (c) 1995 L. Weppelman
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *      This product includes software developed by Leo Weppelman.
18  * 4. The name of the author may not be used to endorse or promote products
19  *    derived from this software without specific prior written permission
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
22  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
23  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
24  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
25  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
26  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
30  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31  */
32 
33 /*
34  * NetBSD loader for the Atari-TT.
35  */
36 
37 #include "exec_elf.h"
38 #include <a_out.h>
39 #include <fcntl.h>
40 #include <stdio.h>
41 #include <osbind.h>
42 #include <stdarg.h>
43 #include <stdlib.h>
44 #include <string.h>
45 #include <unistd.h>
46 #include "libtos.h"
47 #include "loader.h"
48 
49 #ifdef COMPRESSED_READ
50 #define	open	copen
51 #define	read	cread
52 #define	lseek	clseek
53 #define	close	cclose
54 #endif /* COMPRESSED_READ */
55 
56 char	*Progname;		/* How are we called		*/
57 int	d_flag  = 0;		/* Output debugging output?	*/
58 int	h_flag  = 0;		/* show help			*/
59 int	N_flag  = 0;		/* No symbols?			*/
60 int	s_flag  = 0;		/* St-ram only			*/
61 int	t_flag  = 0;		/* Just test, do not execute	*/
62 int	v_flag  = 0;		/* show version			*/
63 
64 const char version[] = "$Revision: 1.16 $";
65 
66 /*
67  * Default name of kernel to boot, large enough to patch
68  */
69 char	kname[80] = "n:/netbsd";
70 
71 static struct kparamb kparam;
72 
73 void help  PROTO((void));
74 void usage PROTO((void));
75 int  aout_load PROTO((int));
76 int  elf_load PROTO((int));
77 void get_sys_info PROTO((void));
78 void start_kernel PROTO((void));
79 
80 #define ELFMAGIC	((ELFMAG0 << 24) | (ELFMAG1 << 16) | \
81 				(ELFMAG2 << 8) | ELFMAG3)
82 int
83 main(argc, argv)
84 int	argc;
85 char	**argv;
86 {
87 	/*
88 	 * Option parsing
89 	 */
90 	extern	int	optind;
91 	extern	char	*optarg;
92 	int		ch;
93 	int		fd;
94 
95 	init_toslib(argv[0]);
96 	Progname = argv[0];
97 
98 	kparam.boothowto = RB_SINGLE;
99 
100 	while ((ch = getopt(argc, argv, "abdDhNstVwo:S:T:")) != -1) {
101 		switch (ch) {
102 		case 'a':
103 			kparam.boothowto &= ~(RB_SINGLE);
104 			kparam.boothowto |= RB_AUTOBOOT;
105 			break;
106 		case 'b':
107 			kparam.boothowto |= RB_ASKNAME;
108 			break;
109 		case 'd':
110 			kparam.boothowto |= RB_KDB;
111 			break;
112 		case 'D':
113 			d_flag = 1;
114 			break;
115 		case 'h':
116 			h_flag = 1;
117 			break;
118 		case 'N':
119 			N_flag = 1;
120 			break;
121 		case 'o':
122 			redirect_output(optarg);
123 			break;
124 		case 's':
125 			s_flag = 1;
126 			break;
127 		case 'S':
128 			kparam.stmem_size = atoi(optarg);
129 			break;
130 		case 't':
131 			t_flag = 1;
132 			break;
133 		case 'T':
134 			kparam.ttmem_size = atoi(optarg);
135 			break;
136 		case 'V':
137 			v_flag = 1;
138 			break;
139 		case 'w':
140 			set_wait_for_key();
141 			break;
142 		default:
143 			usage();
144 		}
145 	}
146 	argc -= optind;
147 	argv += optind;
148 	if (argc == 1)
149 		strcpy(kname, argv[0]);
150 
151 	if (h_flag)
152 		help();
153 	if (v_flag)
154 		eprintf("%s\r\n", version);
155 
156 	/*
157 	 * Get system info to pass to NetBSD
158 	 */
159 	get_sys_info();
160 
161 	/*
162 	 * Find the kernel to boot and read it's exec-header
163 	 */
164 	if ((fd = open(kname, O_RDONLY)) < 0)
165 		fatal(-1, "Cannot open kernel '%s'", kname);
166 	if (elf_load(fd) == 0)
167 		if (aout_load(fd) == 0)
168 			fatal(-1, "Not an ELF or NMAGIC file '%s'", kname);
169 	close(fd);
170 
171 	if (d_flag) {
172 	    eprintf("\r\nKernel info:\r\n");
173 	    eprintf("Kernel loadaddr\t: 0x%08x\r\n", kparam.kp);
174 	    eprintf("Kernel size\t: %10d bytes\r\n", kparam.ksize);
175 	    eprintf("Kernel entry\t: 0x%08x\r\n", kparam.entry);
176 	    eprintf("Kernel esym\t: 0x%08x\r\n", kparam.esym_loc);
177 	}
178 
179 	if (!t_flag)
180 		start_kernel();
181 		/* NOT REACHED */
182 
183 	eprintf("Kernel '%s' was loaded OK\r\n", kname);
184 	xexit(0);
185 	return 0;
186 }
187 
188 int
189 aout_load(fd)
190 int				fd;
191 {
192 	long		textsz, stringsz;
193 	struct exec	ehdr;
194 
195 	lseek(fd, (off_t)0, SEEK_SET);
196 	if (read(fd, (char *)&ehdr, sizeof(ehdr)) != sizeof(ehdr))
197 		return 0;
198 
199 	if (N_MAGIC(ehdr) != NMAGIC)
200 		return 0;
201 
202 	/*
203 	 * Extract various sizes from the kernel executable
204 	 */
205 	textsz          = (ehdr.a_text + __LDPGSZ - 1) & ~(__LDPGSZ - 1);
206 	kparam.esym_loc = 0;
207 	kparam.ksize    = textsz + ehdr.a_data + ehdr.a_bss;
208 	kparam.entry    = ehdr.a_entry;
209 
210 	if (!N_flag && ehdr.a_syms) {
211 	  if (lseek(fd,ehdr.a_text+ehdr.a_data+ehdr.a_syms+sizeof(ehdr),0)
212 									<= 0)
213 		fatal(-1, "Cannot seek to string table in '%s'", kname);
214 	  if (read(fd, (char *)&stringsz, sizeof(long)) != sizeof(long))
215 		fatal(-1, "Cannot read string-table size");
216 	  if (lseek(fd, sizeof(ehdr), 0) <= 0)
217 		fatal(-1, "Cannot seek back to text start");
218 	  kparam.ksize += ehdr.a_syms + sizeof(long) + stringsz;
219 	}
220 
221 	if ((kparam.kp = (u_char *)malloc(kparam.ksize)) == NULL)
222 		fatal(-1, "Cannot malloc kernel image space");
223 
224 	/*
225 	 * Read text & data, clear bss
226 	 */
227 	if ((read(fd, (char *)kparam.kp, ehdr.a_text) != ehdr.a_text)
228 	    ||(read(fd,(char *)(kparam.kp+textsz),ehdr.a_data) != ehdr.a_data))
229 		fatal(-1, "Unable to read kernel image\n");
230 	memset(kparam.kp + textsz + ehdr.a_data, 0, ehdr.a_bss);
231 
232 	/*
233 	 * Read symbol and string table
234 	 */
235 	if (!N_flag && ehdr.a_syms) {
236 	    long	*p;
237 
238 	    p = (long *)(kparam.kp + textsz + ehdr.a_data + ehdr.a_bss);
239 	    *p++ = ehdr.a_syms;
240 	    if (read(fd, (char *)p, ehdr.a_syms) != ehdr.a_syms)
241 		fatal(-1, "Cannot read symbol table\n");
242 	    p = (long *)((char *)p + ehdr.a_syms);
243 	    if (read(fd, (char *)p, stringsz) != stringsz)
244 		fatal(-1, "Cannot read string table\n");
245 	    kparam.esym_loc = (long)((char *)p-(char *)kparam.kp +stringsz);
246 	}
247 
248 	return 1;
249 }
250 
251 int
252 elf_load(fd)
253 int				fd;
254 {
255 	int		i,j;
256 	Elf32_Ehdr	ehdr;
257 	Elf32_Phdr	*phdrs;
258 	Elf32_Word	symsize, symstart;
259 	long		kernsize;
260 
261 	lseek(fd, (off_t)0, SEEK_SET);
262 	if (read(fd, (char *)&ehdr, sizeof(ehdr)) != sizeof(ehdr))
263 		return 0;
264 
265 	if (*((u_int *)ehdr.e_ident) != ELFMAGIC)
266 		return 0;
267 
268 	/*
269 	 * calculate highest used address
270 	 */
271 	i = ehdr.e_phnum * sizeof(Elf32_Phdr);
272 	if ((phdrs = (Elf32_Phdr *)malloc(i)) == NULL)
273 		fatal(-1, "Cannot malloc Elf phdr storage space");
274 	if (read(fd, phdrs, i) != i)
275 		fatal(-1, "Cannot read Elf32_Phdrs");
276 
277 	kernsize = 0;
278 	for (i = 0; i < ehdr.e_phnum; i++) {
279 		Elf32_Word sum;
280 
281 		sum = phdrs[i].p_vaddr + phdrs[i].p_memsz;
282 		if ((phdrs[i].p_flags & (PF_W|PF_X)) && (sum > kernsize))
283 			kernsize = sum;
284 	}
285 
286 	/*
287 	 * look for symbols and calculate the size
288 	 * XXX: This increases the load time by a factor 2 for gzipped
289 	 *      images!
290 	 */
291 	symsize  = 0;
292 	symstart = 0;
293 	if (!N_flag) {
294 	    i = ehdr.e_shnum + 1;
295 	    if (lseek(fd, (off_t)ehdr.e_shoff, SEEK_SET) != ehdr.e_shoff)
296 		fatal(-1, "Cannot seek to e_shoff location");
297 	    while (--i) {
298 	      Elf32_Shdr shdr;
299 
300 	      if (read(fd, &shdr, sizeof(shdr)) != sizeof(shdr))
301 		fatal(-1, "Cannot read Elf32_shdr");
302 	      if ((shdr.sh_type == SHT_SYMTAB) || (shdr.sh_type == SHT_STRTAB))
303 		symsize += shdr.sh_size;
304 	    }
305 	}
306 
307 	if (symsize) {
308 	  symstart = kernsize;
309 	  kernsize += symsize + sizeof(ehdr) + ehdr.e_shnum*sizeof(Elf32_Shdr);
310 	}
311 
312 	/*
313 	 * Extract various sizes from the kernel executable
314 	 */
315 	kparam.esym_loc = symsize ? kernsize : 0;
316 	kparam.ksize    = kernsize;
317 	kparam.entry    = ehdr.e_entry;
318 
319 	if ((kparam.kp = (u_char *)malloc(kparam.ksize)) == NULL)
320 		fatal(-1, "Cannot malloc kernel image space");
321 
322 	/*
323 	 * Read text & data, clear bss
324 	 */
325 	for (i = 0; i < ehdr.e_phnum; i++) {
326 	    u_char	*p;
327 	    Elf32_Phdr	*php = &phdrs[i];
328 
329 	    if (php->p_flags & (PF_W|PF_X)) {
330 		if (lseek(fd, (off_t)php->p_offset, SEEK_SET) != php->p_offset)
331 		    fatal(-1, "Seek error while reading text segment\n");
332 		p = (u_char *)(kparam.kp) + php->p_vaddr;
333 		if (read(fd, p, php->p_filesz) != php->p_filesz)
334 		    fatal(-1, "Read error in text segment\n");
335 		if (php->p_memsz > php->p_filesz)
336 		    memset(p + php->p_filesz, 0, php->p_memsz - php->p_filesz);
337 	    }
338 	}
339 
340 	/*
341 	 * Read symbols and strings
342 	 */
343 	if (symsize) {
344 	    u_char	*p, *symtab;
345 	    int		nhdrs;
346 	    Elf32_Shdr	*shp;
347 
348 	    symtab = kparam.kp + symstart;
349 
350 	    p = symtab + sizeof(ehdr);
351 	    nhdrs = ehdr.e_shnum;
352 	    if (lseek(fd, (off_t)ehdr.e_shoff, SEEK_SET) != ehdr.e_shoff)
353 		fatal(-1, "Error seeking to section headers");
354 	    if (read(fd, p, nhdrs * sizeof(*shp)) != nhdrs * sizeof(*shp))
355 		fatal(-1, "Error reading section headers");
356 	    shp = (Elf32_Shdr*)p;
357 	    p  += nhdrs * sizeof(*shp);
358 	    for (i = 0; i < nhdrs; i++) {
359 		if (shp[i].sh_type == SHT_SYMTAB) {
360 		    if (shp[i].sh_offset == 0)
361 			continue;
362 		    /* Got the symbol table. */
363 		    if (lseek(fd, (off_t)shp[i].sh_offset, SEEK_SET) !=
364 							shp[i].sh_offset)
365 		    	fatal(-1, "Error seeking to symbols");
366 		    if (read(fd, p, shp[i].sh_size) != shp[i].sh_size)
367 			fatal(-1, "Error reading symbols");
368 		    shp[i].sh_offset = p - symtab;
369 		    /* Find the string table to go with it. */
370 		    j = shp[i].sh_link;
371 		    if (shp[j].sh_offset == 0)
372 			continue;
373 		    p += shp[i].sh_size;
374 		    if (lseek(fd, (off_t)shp[j].sh_offset, SEEK_SET) !=
375 				    			shp[j].sh_offset)
376 		    	fatal(-1, "Error seeking to string table");
377 		    if (read(fd, p, shp[j].sh_size) != shp[j].sh_size)
378 			fatal(-1, "Error reading strings");
379 		    shp[j].sh_offset = p - symtab;
380 		    /* There should only be one symbol table. */
381 		    break;
382 		}
383 	    }
384 	    ehdr.e_shoff = sizeof(ehdr);
385 	    bcopy(&ehdr, symtab, sizeof(ehdr));
386 	}
387 	return 1;
388 }
389 
390 /*
391  * Extract memory and cpu/fpu info from system.
392  */
393 void
394 get_sys_info()
395 {
396 	long	stck;
397 	long	*jar;
398 	OSH	*oshdr;
399 
400 	kparam.bootflags = 0;
401 
402 	stck = Super(0);
403 
404 	/*
405 	 * Some GEMDOS versions use a different year-base in the RTC.
406 	 */
407 	oshdr = *ADDR_OSHEAD;
408 	oshdr = oshdr->os_beg;
409 	if ((oshdr->os_version > 0x0300) && (oshdr->os_version < 0x0306))
410 		kparam.bootflags |= ATARI_CLKBROKEN;
411 
412 	if (kparam.stmem_size <= 0)
413 		kparam.stmem_size  = *ADDR_PHYSTOP;
414 
415 	if (kparam.ttmem_size)
416 		kparam.ttmem_start  = TTRAM_BASE;
417 	else {
418 		if (!s_flag && (*ADDR_CHKRAMTOP == RAM_TOP_MAGIC)) {
419 			kparam.ttmem_size  = *ADDR_RAMTOP;
420 			if (kparam.ttmem_size > TTRAM_BASE) {
421 				kparam.ttmem_size  -= TTRAM_BASE;
422 				kparam.ttmem_start  = TTRAM_BASE;
423 			}
424 			else kparam.ttmem_size = 0;
425 		}
426 	}
427 
428 	/*
429 	 * Scan cookiejar for cpu types
430 	 */
431 	jar = *ADDR_P_COOKIE;
432 	if (jar != NULL) {
433 		do {
434 		    if (jar[0] == 0x5f435055) { /* _CPU	*/
435 			switch (jar[1]) {
436 				case 0:
437 					kparam.bootflags |= ATARI_68000;
438 					break;
439 				case 10:
440 					kparam.bootflags |= ATARI_68010;
441 					break;
442 				case 20:
443 					kparam.bootflags |= ATARI_68020;
444 					break;
445 				case 30:
446 					kparam.bootflags |= ATARI_68030;
447 					break;
448 				case 40:
449 					kparam.bootflags |= ATARI_68040;
450 					break;
451 				case 60:
452 					kparam.bootflags |= ATARI_68060;
453 					break;
454 				default:
455 					fatal(-1, "Unknown CPU-type");
456 			}
457 		    }
458 		    if (jar[0] == 0x42504658) { /* BPFX	*/
459 			unsigned long	*p;
460 
461 			p = (unsigned long*)jar[1];
462 
463 			kparam.ttmem_start = p[1];
464 			kparam.ttmem_size  = p[2];
465 		    }
466 		    if (jar[0] == 0x5f435432) { /* _CT2	*/
467 			/*
468 			 * The CT2 board has a different physical base address!
469 			 */
470 			kparam.ttmem_start = CTRAM_BASE;
471 		    }
472 		    jar = &jar[2];
473 		} while (jar[-2]);
474 	}
475 	if (!(kparam.bootflags & ATARI_ANYCPU))
476 		fatal(-1, "Cannot determine CPU-type");
477 
478 	(void)Super(stck);
479 
480 	if (d_flag) {
481 	    eprintf("Machine info:\r\n");
482 	    eprintf("ST-RAM size\t: %10d bytes\r\n",kparam.stmem_size);
483 	    eprintf("TT-RAM size\t: %10d bytes\r\n",kparam.ttmem_size);
484 	    eprintf("TT-RAM start\t: 0x%08x\r\n", kparam.ttmem_start);
485 	    eprintf("Cpu-type\t: 0x%08x\r\n", kparam.bootflags);
486 	}
487 }
488 
489 void
490 help()
491 {
492 	eprintf("\r
493 NetBSD loader for the Atari-TT\r
494 \r
495 Usage: %s [-abdhstVD] [-S <stram-size>] [-T <ttram-size>] [kernel]\r
496 \r
497 Description of options:\r
498 \r
499 \t-a  Boot up to multi-user mode.\r
500 \t-b  Ask for root device to use.\r
501 \t-d  Enter kernel debugger.\r
502 \t-D  printout debug information while loading\r
503 \t-h  What you're getting right now.\r
504 `t-N  No symbols must be loaded.\r
505 \t-o  Write output to both <output file> and stdout.\r
506 \t-s  Use only ST-compatible RAM\r
507 \t-S  Set amount of ST-compatible RAM\r
508 \t-T  Set amount of TT-compatible RAM\r
509 \t-t  Test the loader. It will do everything except executing the\r
510 \t    loaded kernel.\r
511 \t-V  Print loader version.\r
512 \t-w  Wait for a keypress before exiting.\r
513 ", Progname);
514 	xexit(0);
515 }
516 
517 void
518 usage()
519 {
520 	eprintf("Usage: %s [-abdhstVD] [-S <stram-size>] "
521 		"[-T <ttram-size>] [kernel]\r\n", Progname);
522 	xexit(1);
523 }
524 
525 void
526 start_kernel()
527 {
528 	long	stck;
529 
530 	stck = Super(0);
531 	bsd_startup(&kparam);
532 	/* NOT REACHED */
533 
534 	(void)Super(stck);
535 }
536