xref: /netbsd-src/sys/arch/i386/stand/lib/exec.c (revision 7330f729ccf0bd976a06f95fad452fe774fc7fd1)
1 /*	$NetBSD: exec.c,v 1.74 2019/09/13 02:19:46 manu Exp $	 */
2 
3 /*
4  * Copyright (c) 2008, 2009 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26  * POSSIBILITY OF SUCH DAMAGE.
27  */
28 
29 /*
30  * Copyright (c) 1982, 1986, 1990, 1993
31  *	The Regents of the University of California.  All rights reserved.
32  *
33  * Redistribution and use in source and binary forms, with or without
34  * modification, are permitted provided that the following conditions
35  * are met:
36  * 1. Redistributions of source code must retain the above copyright
37  *    notice, this list of conditions and the following disclaimer.
38  * 2. Redistributions in binary form must reproduce the above copyright
39  *    notice, this list of conditions and the following disclaimer in the
40  *    documentation and/or other materials provided with the distribution.
41  * 3. Neither the name of the University nor the names of its contributors
42  *    may be used to endorse or promote products derived from this software
43  *    without specific prior written permission.
44  *
45  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
46  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
47  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
48  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
49  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
50  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
51  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
52  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
53  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
54  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
55  * SUCH DAMAGE.
56  *
57  * 	@(#)boot.c	8.1 (Berkeley) 6/10/93
58  */
59 
60 /*
61  * Copyright (c) 1996
62  *	Matthias Drochner.  All rights reserved.
63  * Copyright (c) 1996
64  * 	Perry E. Metzger.  All rights reserved.
65  *
66  * Redistribution and use in source and binary forms, with or without
67  * modification, are permitted provided that the following conditions
68  * are met:
69  * 1. Redistributions of source code must retain the above copyright
70  *    notice, this list of conditions and the following disclaimer.
71  * 2. Redistributions in binary form must reproduce the above copyright
72  *    notice, this list of conditions and the following disclaimer in the
73  *    documentation and/or other materials provided with the distribution.
74  *
75  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
76  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
77  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
78  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
79  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
80  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
81  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
82  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
83  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
84  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
85  * SUCH DAMAGE.
86  *
87  * 	@(#)boot.c	8.1 (Berkeley) 6/10/93
88  */
89 
90 /*
91  * Starts a NetBSD ELF kernel. The low level startup is done in startprog.S.
92  * This is a special version of exec.c to support use of XMS.
93  */
94 
95 #include <sys/param.h>
96 #include <sys/reboot.h>
97 
98 #include <lib/libsa/stand.h>
99 #include <lib/libkern/libkern.h>
100 
101 #include "loadfile.h"
102 #include "libi386.h"
103 #include "bootinfo.h"
104 #include "bootmod.h"
105 #include "vbe.h"
106 #ifdef SUPPORT_PS2
107 #include "biosmca.h"
108 #endif
109 #ifdef EFIBOOT
110 #include "efiboot.h"
111 #undef DEBUG	/* XXX */
112 #endif
113 
114 #define BOOT_NARGS	6
115 
116 #ifndef	PAGE_SIZE
117 #define	PAGE_SIZE	4096
118 #endif
119 
120 #define MODULE_WARNING_SEC	5
121 
122 #define MAXMODNAME	32	/* from <sys/module.h> */
123 
124 extern struct btinfo_console btinfo_console;
125 
126 boot_module_t *boot_modules;
127 bool boot_modules_enabled = true;
128 bool kernel_loaded;
129 
130 typedef struct userconf_command {
131 	char *uc_text;
132 	size_t uc_len;
133 	struct userconf_command *uc_next;
134 } userconf_command_t;
135 userconf_command_t *userconf_commands = NULL;
136 
137 struct btinfo_framebuffer btinfo_framebuffer;
138 
139 struct btinfo_modulelist *btinfo_modulelist;
140 static size_t btinfo_modulelist_size;
141 static uint32_t image_end;
142 static char module_base[64] = "/";
143 static int howto;
144 
145 static struct btinfo_userconfcommands *btinfo_userconfcommands = NULL;
146 static size_t btinfo_userconfcommands_size = 0;
147 
148 static void	module_init(const char *);
149 static void	module_add_common(const char *, uint8_t);
150 
151 static void	userconf_init(void);
152 
153 static void	extract_device(const char *, char *, size_t);
154 static void	module_base_path(char *, size_t);
155 static int	module_open(boot_module_t *, int, const char *, const char *,
156 		    bool);
157 
158 void
159 framebuffer_configure(struct btinfo_framebuffer *fb)
160 {
161 	if (fb)
162 		btinfo_framebuffer = *fb;
163 	else {
164 		btinfo_framebuffer.physaddr = 0;
165 		btinfo_framebuffer.flags = 0;
166 	}
167 }
168 
169 void
170 module_add(char *name)
171 {
172 	return module_add_common(name, BM_TYPE_KMOD);
173 }
174 
175 void
176 splash_add(char *name)
177 {
178 	return module_add_common(name, BM_TYPE_IMAGE);
179 }
180 
181 void
182 rnd_add(char *name)
183 {
184 	return module_add_common(name, BM_TYPE_RND);
185 }
186 
187 void
188 fs_add(char *name)
189 {
190 	return module_add_common(name, BM_TYPE_FS);
191 }
192 
193 /*
194  * Add a /-separated list of module names to the boot list
195  */
196 void
197 module_add_split(const char *name, uint8_t type)
198 {
199 	char mod_name[MAXMODNAME];
200 	int i;
201 	const char *mp = name;
202 	char *ep;
203 
204 	while (*mp) {				/* scan list of module names */
205 		i = MAXMODNAME;
206 		ep = mod_name;
207 		while (--i) {			/* scan for end of first name */
208 			*ep = *mp;
209 			if (*ep == '/')		/* NUL-terminate the name */
210 				*ep = '\0';
211 
212 			if (*ep == 0 ) {	/* add non-empty name */
213 				if (ep != mod_name)
214 					module_add_common(mod_name, type);
215 				break;
216 			}
217 			ep++; mp++;
218 		}
219 		if (*ep != 0) {
220 			printf("module name too long\n");
221 			return;
222 		}
223 		if  (*mp == '/') {		/* skip separator if more */
224 			mp++;
225 		}
226 	}
227 }
228 
229 static void
230 module_add_common(const char *name, uint8_t type)
231 {
232 	boot_module_t *bm, *bmp;
233 	size_t len;
234 	char *str;
235 
236 	while (*name == ' ' || *name == '\t')
237 		++name;
238 
239 	for (bm = boot_modules; bm != NULL; bm = bm->bm_next)
240 		if (bm->bm_type == type && strcmp(bm->bm_path, name) == 0)
241 			return;
242 
243 	bm = alloc(sizeof(boot_module_t));
244 	len = strlen(name) + 1;
245 	str = alloc(len);
246 	if (bm == NULL || str == NULL) {
247 		printf("couldn't allocate module\n");
248 		return;
249 	}
250 	memcpy(str, name, len);
251 	bm->bm_path = str;
252 	bm->bm_next = NULL;
253 	bm->bm_type = type;
254 	if (boot_modules == NULL)
255 		boot_modules = bm;
256 	else {
257 		for (bmp = boot_modules; bmp->bm_next;
258 		    bmp = bmp->bm_next)
259 			;
260 		bmp->bm_next = bm;
261 	}
262 }
263 
264 void
265 userconf_add(char *cmd)
266 {
267 	userconf_command_t *uc;
268 	size_t len;
269 	char *text;
270 
271 	while (*cmd == ' ' || *cmd == '\t')
272 		++cmd;
273 
274 	uc = alloc(sizeof(*uc));
275 	if (uc == NULL) {
276 		printf("couldn't allocate command\n");
277 		return;
278 	}
279 
280 	len = strlen(cmd) + 1;
281 	text = alloc(len);
282 	if (text == NULL) {
283 		dealloc(uc, sizeof(*uc));
284 		printf("couldn't allocate command\n");
285 		return;
286 	}
287 	memcpy(text, cmd, len);
288 
289 	uc->uc_text = text;
290 	uc->uc_len = len;
291 	uc->uc_next = NULL;
292 
293 	if (userconf_commands == NULL)
294 		userconf_commands = uc;
295 	else {
296 		userconf_command_t *ucp;
297 		for (ucp = userconf_commands; ucp->uc_next != NULL;
298 		     ucp = ucp->uc_next)
299 			;
300 		ucp->uc_next = uc;
301 	}
302 }
303 
304 struct btinfo_prekern bi_prekern;
305 int has_prekern = 0;
306 
307 static int
308 common_load_prekern(const char *file, u_long *basemem, u_long *extmem,
309     physaddr_t loadaddr, int floppy, u_long marks[MARK_MAX])
310 {
311 	paddr_t kernpa_start, kernpa_end;
312 	char prekernpath[] = "/prekern";
313 	u_long prekern_start;
314 	int fd, flags;
315 
316 	*extmem = getextmem();
317 	*basemem = getbasemem();
318 
319 	marks[MARK_START] = loadaddr;
320 
321 	/* Load the prekern (static) */
322 	flags = LOAD_KERNEL & ~(LOAD_HDR|LOAD_SYM);
323 	if ((fd = loadfile(prekernpath, marks, flags)) == -1)
324 		return EIO;
325 	close(fd);
326 
327 	prekern_start = marks[MARK_START];
328 
329 	/* The kernel starts at 2MB. */
330 	marks[MARK_START] = loadaddr;
331 	marks[MARK_END] = loadaddr + (1UL << 21);
332 	kernpa_start = (1UL << 21);
333 
334 	/* Load the kernel (dynamic) */
335 	flags = (LOAD_KERNEL | LOAD_DYN) & ~(floppy ? LOAD_BACKWARDS : 0);
336 	if ((fd = loadfile(file, marks, flags)) == -1)
337 		return EIO;
338 	close(fd);
339 
340 	kernpa_end = marks[MARK_END] - loadaddr;
341 
342 	/* If the root fs type is unusual, load its module. */
343 	if (fsmod != NULL)
344 		module_add_split(fsmod, BM_TYPE_KMOD);
345 
346 	bi_prekern.kernpa_start = kernpa_start;
347 	bi_prekern.kernpa_end = kernpa_end;
348 	BI_ADD(&bi_prekern, BTINFO_PREKERN, sizeof(struct btinfo_prekern));
349 
350 	/*
351 	 * Gather some information for the kernel. Do this after the
352 	 * "point of no return" to avoid memory leaks.
353 	 * (but before DOS might be trashed in the XMS case)
354 	 */
355 #ifdef PASS_BIOSGEOM
356 	bi_getbiosgeom();
357 #endif
358 #ifdef PASS_MEMMAP
359 	bi_getmemmap();
360 #endif
361 
362 	marks[MARK_START] = prekern_start;
363 	marks[MARK_END] = (((u_long)marks[MARK_END] + sizeof(int) - 1)) &
364 	    (-sizeof(int));
365 	image_end = marks[MARK_END];
366 	kernel_loaded = true;
367 
368 	return 0;
369 }
370 
371 static int
372 common_load_kernel(const char *file, u_long *basemem, u_long *extmem,
373     physaddr_t loadaddr, int floppy, u_long marks[MARK_MAX])
374 {
375 	int fd;
376 #ifdef XMS
377 	u_long xmsmem;
378 	physaddr_t origaddr = loadaddr;
379 #endif
380 
381 	*extmem = getextmem();
382 	*basemem = getbasemem();
383 
384 #ifdef XMS
385 	if ((getextmem1() == 0) && (xmsmem = checkxms())) {
386 		u_long kernsize;
387 
388 		/*
389 		 * With "CONSERVATIVE_MEMDETECT", extmem is 0 because
390 		 * getextmem() is getextmem1(). Without, the "smart"
391 		 * methods could fail to report all memory as well.
392 		 * xmsmem is a few kB less than the actual size, but
393 		 * better than nothing.
394 		 */
395 		if (xmsmem > *extmem)
396 			*extmem = xmsmem;
397 		/*
398 		 * Get the size of the kernel
399 		 */
400 		marks[MARK_START] = loadaddr;
401 		if ((fd = loadfile(file, marks, COUNT_KERNEL)) == -1)
402 			return EIO;
403 		close(fd);
404 
405 		kernsize = marks[MARK_END];
406 		kernsize = (kernsize + 1023) / 1024;
407 
408 		loadaddr = xmsalloc(kernsize);
409 		if (!loadaddr)
410 			return ENOMEM;
411 	}
412 #endif
413 	marks[MARK_START] = loadaddr;
414 	if ((fd = loadfile(file, marks,
415 	    LOAD_KERNEL & ~(floppy ? LOAD_BACKWARDS : 0))) == -1)
416 		return EIO;
417 
418 	close(fd);
419 
420 	/* If the root fs type is unusual, load its module. */
421 	if (fsmod != NULL)
422 		module_add_split(fsmod, BM_TYPE_KMOD);
423 
424 	/*
425 	 * Gather some information for the kernel. Do this after the
426 	 * "point of no return" to avoid memory leaks.
427 	 * (but before DOS might be trashed in the XMS case)
428 	 */
429 #ifdef PASS_BIOSGEOM
430 	bi_getbiosgeom();
431 #endif
432 #ifdef PASS_MEMMAP
433 	bi_getmemmap();
434 #endif
435 
436 #ifdef XMS
437 	if (loadaddr != origaddr) {
438 		/*
439 		 * We now have done our last DOS IO, so we may
440 		 * trash the OS. Copy the data from the temporary
441 		 * buffer to its real address.
442 		 */
443 		marks[MARK_START] -= loadaddr;
444 		marks[MARK_END] -= loadaddr;
445 		marks[MARK_SYM] -= loadaddr;
446 		marks[MARK_END] -= loadaddr;
447 		ppbcopy(loadaddr, origaddr, marks[MARK_END]);
448 	}
449 #endif
450 	marks[MARK_END] = (((u_long) marks[MARK_END] + sizeof(int) - 1)) &
451 	    (-sizeof(int));
452 	image_end = marks[MARK_END];
453 	kernel_loaded = true;
454 
455 	return 0;
456 }
457 
458 int
459 exec_netbsd(const char *file, physaddr_t loadaddr, int boothowto, int floppy,
460     void (*callback)(void))
461 {
462 	uint32_t boot_argv[BOOT_NARGS];
463 	u_long marks[MARK_MAX];
464 	struct btinfo_symtab btinfo_symtab;
465 	u_long extmem;
466 	u_long basemem;
467 	int error;
468 #ifdef EFIBOOT
469 	int i;
470 #endif
471 
472 #ifdef	DEBUG
473 	printf("exec: file=%s loadaddr=0x%lx\n", file ? file : "NULL",
474 	    loadaddr);
475 #endif
476 
477 	BI_ALLOC(BTINFO_MAX);
478 
479 	BI_ADD(&btinfo_console, BTINFO_CONSOLE, sizeof(struct btinfo_console));
480 
481 	howto = boothowto;
482 
483 	memset(marks, 0, sizeof(marks));
484 
485 	if (has_prekern) {
486 		error = common_load_prekern(file, &basemem, &extmem, loadaddr,
487 		    floppy, marks);
488 	} else {
489 		error = common_load_kernel(file, &basemem, &extmem, loadaddr,
490 		    floppy, marks);
491 	}
492 	if (error) {
493 		errno = error;
494 		goto out;
495 	}
496 #ifdef EFIBOOT
497 	/* adjust to the real load address */
498 	marks[MARK_START] -= efi_loadaddr;
499 	marks[MARK_ENTRY] -= efi_loadaddr;
500 	marks[MARK_DATA] -= efi_loadaddr;
501 	/* MARK_NSYM */
502 	marks[MARK_SYM] -= efi_loadaddr;
503 	marks[MARK_END] -= efi_loadaddr;
504 #endif
505 
506 	boot_argv[0] = boothowto;
507 	boot_argv[1] = 0;
508 	boot_argv[2] = vtophys(bootinfo);	/* old cyl offset */
509 	boot_argv[3] = marks[MARK_END];
510 	boot_argv[4] = extmem;
511 	boot_argv[5] = basemem;
512 
513 	/* pull in any modules if necessary */
514 	if (boot_modules_enabled) {
515 		module_init(file);
516 		if (btinfo_modulelist) {
517 #ifdef EFIBOOT
518 			/* convert module loaded address to paddr */
519 			struct bi_modulelist_entry *bim;
520 			bim = (void *)(btinfo_modulelist + 1);
521 			for (i = 0; i < btinfo_modulelist->num; i++, bim++)
522 				bim->base -= efi_loadaddr;
523 			btinfo_modulelist->endpa -= efi_loadaddr;
524 #endif
525 			BI_ADD(btinfo_modulelist, BTINFO_MODULELIST,
526 			    btinfo_modulelist_size);
527 		}
528 	}
529 
530 	userconf_init();
531 	if (btinfo_userconfcommands != NULL)
532 		BI_ADD(btinfo_userconfcommands, BTINFO_USERCONFCOMMANDS,
533 		    btinfo_userconfcommands_size);
534 
535 #ifdef DEBUG
536 	printf("Start @ 0x%lx [%ld=0x%lx-0x%lx]...\n", marks[MARK_ENTRY],
537 	    marks[MARK_NSYM], marks[MARK_SYM], marks[MARK_END]);
538 #endif
539 
540 	btinfo_symtab.nsym = marks[MARK_NSYM];
541 	btinfo_symtab.ssym = marks[MARK_SYM];
542 	btinfo_symtab.esym = marks[MARK_END];
543 	BI_ADD(&btinfo_symtab, BTINFO_SYMTAB, sizeof(struct btinfo_symtab));
544 
545 	/* set new video mode if necessary */
546 	vbe_commit();
547 	BI_ADD(&btinfo_framebuffer, BTINFO_FRAMEBUFFER,
548 	    sizeof(struct btinfo_framebuffer));
549 
550 	if (callback != NULL)
551 		(*callback)();
552 #ifdef EFIBOOT
553 	/* Copy bootinfo to safe arena. */
554 	for (i = 0; i < bootinfo->nentries; i++) {
555 		struct btinfo_common *bi = (void *)(u_long)bootinfo->entry[i];
556 		char *p = alloc(bi->len);
557 		memcpy(p, bi, bi->len);
558 		bootinfo->entry[i] = vtophys(p);
559 	}
560 
561 	efi_kernel_start = marks[MARK_START];
562 	efi_kernel_size = image_end - (efi_loadaddr + efi_kernel_start);
563 #endif
564 	startprog(marks[MARK_ENTRY], BOOT_NARGS, boot_argv,
565 	    x86_trunc_page(basemem * 1024));
566 	panic("exec returned");
567 
568 out:
569 	BI_FREE();
570 	bootinfo = NULL;
571 	return -1;
572 }
573 
574 static void
575 extract_device(const char *path, char *buf, size_t buflen)
576 {
577 	size_t i;
578 
579 	if (strchr(path, ':') != NULL) {
580 		for (i = 0; i < buflen - 2 && path[i] != ':'; i++)
581 			buf[i] = path[i];
582 		buf[i++] = ':';
583 		buf[i] = '\0';
584 	} else
585 		buf[0] = '\0';
586 }
587 
588 static const char *
589 module_path(boot_module_t *bm, const char *kdev, const char *base_path)
590 {
591 	static char buf[256];
592 	char name_buf[256], dev_buf[64];
593 	const char *name, *name2, *p;
594 
595 	name = bm->bm_path;
596 	for (name2 = name; *name2; ++name2) {
597 		if (*name2 == ' ' || *name2 == '\t') {
598 			strlcpy(name_buf, name, sizeof(name_buf));
599 			if ((uintptr_t)name2 - (uintptr_t)name < sizeof(name_buf))
600 				name_buf[name2 - name] = '\0';
601 			name = name_buf;
602 			break;
603 		}
604 	}
605 	if ((p = strchr(name, ':')) != NULL) {
606 		/* device specified, use it */
607 		if (p[1] == '/')
608 			snprintf(buf, sizeof(buf), "%s", name);
609 		else {
610 			p++;
611 			extract_device(name, dev_buf, sizeof(dev_buf));
612 			snprintf(buf, sizeof(buf), "%s%s/%s/%s.kmod",
613 			    dev_buf, base_path, p, p);
614 		}
615 	} else {
616 		/* device not specified; load from kernel device if known */
617 		if (name[0] == '/')
618 			snprintf(buf, sizeof(buf), "%s%s", kdev, name);
619 		else
620 			snprintf(buf, sizeof(buf), "%s%s/%s/%s.kmod",
621 			    kdev, base_path, name, name);
622 	}
623 
624 	return buf;
625 }
626 
627 static int
628 module_open(boot_module_t *bm, int mode, const char *kdev,
629     const char *base_path, bool doload)
630 {
631 	int fd;
632 	const char *path;
633 
634 	/* check the expanded path first */
635 	path = module_path(bm, kdev, base_path);
636 	fd = open(path, mode);
637 	if (fd != -1) {
638 		if ((howto & AB_SILENT) == 0 && doload)
639 			printf("Loading %s ", path);
640 	} else {
641 		/* now attempt the raw path provided */
642 		fd = open(bm->bm_path, mode);
643 		if (fd != -1 && (howto & AB_SILENT) == 0 && doload)
644 			printf("Loading %s ", bm->bm_path);
645 	}
646 	if (!doload && fd == -1) {
647 		printf("WARNING: couldn't open %s", bm->bm_path);
648 		if (strcmp(bm->bm_path, path) != 0)
649 			printf(" (%s)", path);
650 		printf("\n");
651 	}
652 	return fd;
653 }
654 
655 static void
656 module_base_path(char *buf, size_t bufsize)
657 {
658 	const char *machine;
659 
660 	switch (netbsd_elf_class) {
661 	case ELFCLASS32:
662 		machine = "i386";
663 		break;
664 	case ELFCLASS64:
665 		machine = "amd64";
666 		break;
667 	default:
668 		machine = "generic";
669 		break;
670 	}
671 	if (netbsd_version / 1000000 % 100 == 99) {
672 		/* -current */
673 		snprintf(buf, bufsize,
674 		    "/stand/%s/%d.%d.%d/modules", machine,
675 		    netbsd_version / 100000000,
676 		    netbsd_version / 1000000 % 100,
677 		    netbsd_version / 100 % 100);
678 	} else if (netbsd_version != 0) {
679 		/* release */
680 		snprintf(buf, bufsize,
681 		    "/stand/%s/%d.%d/modules", machine,
682 		    netbsd_version / 100000000,
683 		    netbsd_version / 1000000 % 100);
684 	}
685 }
686 
687 static void
688 module_init(const char *kernel_path)
689 {
690 	struct bi_modulelist_entry *bi;
691 	struct stat st;
692 	char kdev[64];
693 	char *buf;
694 	boot_module_t *bm;
695 	ssize_t len;
696 	off_t off;
697 	int err, fd, nfail = 0;
698 
699 	extract_device(kernel_path, kdev, sizeof(kdev));
700 	module_base_path(module_base, sizeof(module_base));
701 
702 	/* First, see which modules are valid and calculate btinfo size */
703 	len = sizeof(struct btinfo_modulelist);
704 	for (bm = boot_modules; bm; bm = bm->bm_next) {
705 		fd = module_open(bm, 0, kdev, module_base, false);
706 		if (fd == -1) {
707 			bm->bm_len = -1;
708 			++nfail;
709 			continue;
710 		}
711 		err = fstat(fd, &st);
712 		if (err == -1 || st.st_size == -1) {
713 			printf("WARNING: couldn't stat %s\n", bm->bm_path);
714 			close(fd);
715 			bm->bm_len = -1;
716 			++nfail;
717 			continue;
718 		}
719 		bm->bm_len = st.st_size;
720 		close(fd);
721 		len += sizeof(struct bi_modulelist_entry);
722 	}
723 
724 	/* Allocate the module list */
725 	btinfo_modulelist = alloc(len);
726 	if (btinfo_modulelist == NULL) {
727 		printf("WARNING: couldn't allocate module list\n");
728 		wait_sec(MODULE_WARNING_SEC);
729 		return;
730 	}
731 	memset(btinfo_modulelist, 0, len);
732 	btinfo_modulelist_size = len;
733 
734 	/* Fill in btinfo structure */
735 	buf = (char *)btinfo_modulelist;
736 	btinfo_modulelist->num = 0;
737 	off = sizeof(struct btinfo_modulelist);
738 
739 	for (bm = boot_modules; bm; bm = bm->bm_next) {
740 		if (bm->bm_len == -1)
741 			continue;
742 		fd = module_open(bm, 0, kdev, module_base, true);
743 		if (fd == -1)
744 			continue;
745 		image_end = (image_end + PAGE_SIZE - 1) & ~(PAGE_SIZE - 1);
746 		len = pread(fd, (void *)(uintptr_t)image_end, SSIZE_MAX);
747 		if (len < bm->bm_len) {
748 			if ((howto & AB_SILENT) != 0)
749 				printf("Loading %s ", bm->bm_path);
750 			printf(" FAILED\n");
751 		} else {
752 			btinfo_modulelist->num++;
753 			bi = (struct bi_modulelist_entry *)(buf + off);
754 			off += sizeof(struct bi_modulelist_entry);
755 			strncpy(bi->path, bm->bm_path, sizeof(bi->path) - 1);
756 			bi->base = image_end;
757 			bi->len = len;
758 			switch (bm->bm_type) {
759 			    case BM_TYPE_KMOD:
760 				bi->type = BI_MODULE_ELF;
761 				break;
762 			    case BM_TYPE_IMAGE:
763 				bi->type = BI_MODULE_IMAGE;
764 				break;
765 			    case BM_TYPE_FS:
766 				bi->type = BI_MODULE_FS;
767 				break;
768 			    case BM_TYPE_RND:
769 			    default:
770 				/* safest -- rnd checks the sha1 */
771 				bi->type = BI_MODULE_RND;
772 				break;
773 			}
774 			if ((howto & AB_SILENT) == 0)
775 				printf(" \n");
776 		}
777 		if (len > 0)
778 			image_end += len;
779 		close(fd);
780 	}
781 	btinfo_modulelist->endpa = image_end;
782 
783 	if (nfail > 0) {
784 		printf("WARNING: %d module%s failed to load\n",
785 		    nfail, nfail == 1 ? "" : "s");
786 #if notyet
787 		wait_sec(MODULE_WARNING_SEC);
788 #endif
789 	}
790 }
791 
792 static void
793 userconf_init(void)
794 {
795 	size_t count, len;
796 	userconf_command_t *uc;
797 	char *buf;
798 	off_t off;
799 
800 	/* Calculate the userconf commands list size */
801 	count = 0;
802 	for (uc = userconf_commands; uc != NULL; uc = uc->uc_next)
803 		count++;
804 	len = sizeof(*btinfo_userconfcommands) +
805 	      count * sizeof(struct bi_userconfcommand);
806 
807 	/* Allocate the userconf commands list */
808 	btinfo_userconfcommands = alloc(len);
809 	if (btinfo_userconfcommands == NULL) {
810 		printf("WARNING: couldn't allocate userconf commands list\n");
811 		return;
812 	}
813 	memset(btinfo_userconfcommands, 0, len);
814 	btinfo_userconfcommands_size = len;
815 
816 	/* Fill in btinfo structure */
817 	buf = (char *)btinfo_userconfcommands;
818 	off = sizeof(*btinfo_userconfcommands);
819 	btinfo_userconfcommands->num = 0;
820 	for (uc = userconf_commands; uc != NULL; uc = uc->uc_next) {
821 		struct bi_userconfcommand *bi;
822 		bi = (struct bi_userconfcommand *)(buf + off);
823 		strncpy(bi->text, uc->uc_text, sizeof(bi->text) - 1);
824 
825 		off += sizeof(*bi);
826 		btinfo_userconfcommands->num++;
827 	}
828 }
829 
830 int
831 exec_multiboot(const char *file, char *args)
832 {
833 	physaddr_t loadaddr = 0;
834 	u_long marks[MARK_MAX];
835 	u_long extmem;
836 	u_long basemem;
837 	struct multiboot_package *mbp = NULL;
838 
839 #ifndef NO_MULTIBOOT2
840 	if ((mbp = probe_multiboot2(file)) != NULL)
841 		goto is_multiboot;
842 #endif
843 
844 	if ((mbp = probe_multiboot1(file)) != NULL) {
845 #ifdef EFIBOOT
846 		printf("EFI boot requires multiboot 2 kernel\n");
847 		goto out;
848 #else
849 		goto is_multiboot;
850 #endif
851 	}
852 
853 #ifndef NO_MULTIBOOT2
854 	printf("%s is not a multiboot kernel\n", file);
855 #else
856 	printf("%s is not a multiboot 1 kernel "
857 	    "(multiboot 2 support is not built in)\n", file);
858 #endif
859 	goto out;
860 
861 is_multiboot:
862 #ifdef EFIBOOT
863 	loadaddr = efi_loadaddr;
864 #endif
865 	if (common_load_kernel(file, &basemem, &extmem, loadaddr, 0, marks))
866 		goto out;
867 
868 	if (boot_modules_enabled)
869 		module_init(file);
870 
871 	mbp->mbp_args = args;
872 	mbp->mbp_basemem = basemem;
873 	mbp->mbp_extmem = extmem;
874 	mbp->mbp_loadaddr = loadaddr;
875 	mbp->mbp_marks = marks;
876 
877 	/* Only returns on error */
878 	(void)mbp->mbp_exec(mbp);
879 
880 out:
881 	if (mbp != NULL)
882 		mbp->mbp_cleanup(mbp);
883 
884 	return -1;
885 }
886 
887 void
888 x86_progress(const char *fmt, ...)
889 {
890 	va_list ap;
891 
892 	if ((howto & AB_SILENT) != 0)
893 		return;
894 	va_start(ap, fmt);
895 	vprintf(fmt, ap);
896 	va_end(ap);
897 }
898