xref: /netbsd-src/sys/arch/powerpc/stand/mkbootimage/mkbootimage.c (revision 6a493d6bc668897c91594964a732d38505b70cbb)
1 /*	$NetBSD: mkbootimage.c,v 1.17 2013/07/09 13:10:33 joerg Exp $	*/
2 
3 /*-
4  * Copyright (c) 2007 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Tim Rightnour and NONAKA Kimihiro
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29  * POSSIBILITY OF SUCH DAMAGE.
30  */
31 
32 #if HAVE_NBTOOL_CONFIG_H
33 #include "nbtool_config.h"
34 #include "../../sys/sys/bootblock.h"
35 #else
36 #include <sys/bootblock.h>
37 #endif
38 
39 #include <stdio.h>
40 #include <stdlib.h>
41 #include <string.h>
42 #include <fcntl.h>
43 #include <unistd.h>
44 #include <errno.h>
45 #include <zlib.h>
46 #include <err.h>
47 #include <sys/stat.h>
48 #include <sys/types.h>
49 #include <sys/uio.h>
50 #include <sys/signal.h>
51 
52 #undef USE_SYSCTL
53 
54 #if defined(__NetBSD__) && !defined(HAVE_NBTOOL_CONFIG_H)
55 #define USE_SYSCTL 1
56 #include <sys/param.h>
57 #include <sys/sysctl.h>
58 #include <sys/utsname.h>
59 #endif
60 
61 /* BFD ELF headers */
62 #include <elf/common.h>
63 #include <elf/external.h>
64 
65 #include "bebox_bootrec.h"
66 #include "byteorder.h"
67 #include "magic.h"
68 #include "pef.h"
69 #include "rs6000_bootrec.h"
70 
71 /* Globals */
72 
73 int inkernflag = 1;
74 int saloneflag = 0;
75 int verboseflag = 0;
76 int lfloppyflag = 0;
77 Elf32_External_Ehdr hdr, khdr;
78 struct stat elf_stat;
79 unsigned char mbr[512];
80 
81 /* the boot and config records for rs6000 */
82 rs6000_boot_record_t bootrec;
83 rs6000_config_record_t confrec;
84 
85 /* supported platforms */
86 char *sup_plats[] = {
87 	"bebox",
88 	"prep",
89 	"rs6000",
90 	NULL,
91 };
92 
93 /*
94  * Macros to get values from multi-byte ELF header fields.  These assume
95  * a big-endian image.
96  */
97 #define	ELFGET16(x)	(((x)[0] << 8) | (x)[1])
98 
99 #define	ELFGET32(x)	(((x)[0] << 24) | ((x)[1] << 16) |		\
100 			 ((x)[2] <<  8) |  (x)[3])
101 
102 #define ULALIGN(x)	((x + 0x0f) & 0xfffffff0)
103 
104 static void usage(int);
105 static int open_file(const char *, char *, Elf32_External_Ehdr *,
106     struct stat *);
107 static void check_mbr(int, char *);
108 static int prep_build_image(char *, char *, char *, char *);
109 static void rs6000_build_records(int);
110 static int rs6000_build_image(char *, char *, char *, char *);
111 int main(int, char **);
112 
113 
114 static void
115 usage(int extended)
116 {
117 	int i;
118 
119 	if (extended) {
120 		fprintf(stderr, "You are not running this program on"
121 		    " the target machine.  You must supply the\n"
122 		    "machine architecture with the -m flag\n");
123 		fprintf(stderr, "Supported architectures: ");
124 		for (i=0; sup_plats[i] != NULL; i++)
125 			fprintf(stderr, " %s", sup_plats[i]);
126 		fprintf(stderr, "\n\n");
127 	}
128 #ifdef USE_SYSCTL
129 	fprintf(stderr, "usage: %s [-Ilsv] [-m machine] [-b bootfile] "
130 	    "[-k kernel] [-r rawdev] bootimage\n", getprogname());
131 #else
132 	fprintf(stderr, "usage: %s [-Ilsv] -m machine [-b bootfile] "
133 	    "[-k kernel] [-r rawdev] bootimage\n", getprogname());
134 #endif
135 	exit(1);
136 }
137 
138 /* verify the file is ELF and ppc, and open it up */
139 static int
140 open_file(const char *ftype, char *file, Elf32_External_Ehdr *hdr,
141 	struct stat *f_stat)
142 {
143 	int fd;
144 
145 	if ((fd = open(file, 0)) < 0)
146 		errx(2, "Can't open %s '%s': %s", ftype, file, strerror(errno));
147 	fstat(fd, f_stat);
148 
149 	if (read(fd, hdr, sizeof(Elf32_External_Ehdr)) !=
150 	    sizeof(Elf32_External_Ehdr))
151 		errx(3, "Can't read input '%s': %s", file, strerror(errno));
152 
153 	if (hdr->e_ident[EI_MAG0] != ELFMAG0 ||
154 	    hdr->e_ident[EI_MAG1] != ELFMAG1 ||
155 	    hdr->e_ident[EI_MAG2] != ELFMAG2 ||
156 	    hdr->e_ident[EI_MAG3] != ELFMAG3 ||
157 	    hdr->e_ident[EI_CLASS] != ELFCLASS32)
158 		errx(3, "input '%s' is not ELF32 format", file);
159 
160 	if (hdr->e_ident[EI_DATA] != ELFDATA2MSB)
161 		errx(3, "input '%s' is not big-endian", file);
162 
163 	if (ELFGET16(hdr->e_machine) != EM_PPC)
164 		errx(3, "input '%s' is not PowerPC exec binary", file);
165 
166 	return(fd);
167 }
168 
169 static void
170 prep_check_mbr(int prep_fd, char *rawdev)
171 {
172 	int raw_fd;
173 	unsigned long entry, length;
174 	struct mbr_partition *mbrp;
175 	struct stat raw_stat;
176 
177 	/* If we are building a standalone image, do not write an MBR, just
178 	 * set entry point and boot image size skipping over elf header
179 	 */
180 	if (saloneflag) {
181 		entry  = sa_htole32(0x400);
182 		length = sa_htole32(elf_stat.st_size - sizeof(hdr) + 0x400);
183 		lseek(prep_fd, sizeof(mbr), SEEK_SET);
184 		write(prep_fd, &entry, sizeof(entry));
185 		write(prep_fd, &length, sizeof(length));
186 		return;
187 	}
188 
189 	/*
190 	 * if we have a raw device, we need to check to see if it already
191 	 * has a partition table, and if so, read it in and check for
192 	 * suitability.
193 	 */
194 	if (rawdev != NULL) {
195 		raw_fd = open(rawdev, O_RDONLY, 0);
196 		if (raw_fd == -1)
197 			errx(3, "couldn't open raw device %s: %s", rawdev,
198 			    strerror(errno));
199 
200 		fstat(raw_fd, &raw_stat);
201 		if (!S_ISCHR(raw_stat.st_mode))
202 			errx(3, "%s is not a raw device", rawdev);
203 
204 		if (read(raw_fd, mbr, 512) != 512)
205 			errx(3, "MBR Read Failed: %s", strerror(errno));
206 
207 		mbrp = (struct mbr_partition *)&mbr[MBR_PART_OFFSET];
208 		if (mbrp->mbrp_type != MBR_PTYPE_PREP)
209 			errx(3, "First partition is not of type 0x%x.",
210 			    MBR_PTYPE_PREP);
211 		if (mbrp->mbrp_start != 0)
212 			errx(3, "Use of the raw device is intended for"
213 			    " upgrading of legacy installations.  Your"
214 			    " install does not have a PReP boot partition"
215 			    " starting at sector 0.  Use the -s option"
216 			    " to build an image instead.");
217 
218 		/* if we got this far, we are fine, write back the partition
219 		 * and write the entry points and get outta here */
220 	/* Set entry point and boot image size skipping over elf header */
221 		lseek(prep_fd, 0, SEEK_SET);
222 		entry  = sa_htole32(0x400);
223 		length = sa_htole32(elf_stat.st_size - sizeof(hdr) + 0x400);
224 		write(prep_fd, mbr, sizeof(mbr));
225 		write(prep_fd, &entry, sizeof(entry));
226 		write(prep_fd, &length, sizeof(length));
227 		close(raw_fd);
228 		return;
229 	}
230 
231 	/* if we get to here, we want to build a standard floppy or netboot
232 	 * image to file, so just build it */
233 
234 	memset(mbr, 0, sizeof(mbr));
235 	mbrp = (struct mbr_partition *)&mbr[MBR_PART_OFFSET];
236 
237 	/* Set entry point and boot image size skipping over elf header */
238 	entry  = sa_htole32(0x400);
239 	length = sa_htole32(elf_stat.st_size - sizeof(hdr) + 0x400);
240 
241 	/*
242 	 * Set magic number for msdos partition
243 	 */
244 	*(unsigned short *)&mbr[MBR_MAGIC_OFFSET] = sa_htole16(MBR_MAGIC);
245 
246 	/*
247 	 * Build a "PReP" partition table entry in the boot record
248 	 *  - "PReP" may only look at the system_indicator
249 	 */
250 	mbrp->mbrp_flag = MBR_PFLAG_ACTIVE;
251 	mbrp->mbrp_type  = MBR_PTYPE_PREP;
252 
253 	/*
254 	 * The first block of the diskette is used by this "boot record" which
255 	 * actually contains the partition table. (The first block of the
256 	 * partition contains the boot image, but I digress...)  We'll set up
257 	 * one partition on the diskette and it shall contain the rest of the
258 	 * diskette.
259 	 */
260 	mbrp->mbrp_shd   = 0;	/* zero-based */
261 	mbrp->mbrp_ssect = 2;	/* one-based */
262 	mbrp->mbrp_scyl  = 0;	/* zero-based */
263 	mbrp->mbrp_ehd   = 1;	/* assumes two heads */
264 	if (lfloppyflag)
265 		mbrp->mbrp_esect = 36;  /* 2.88MB floppy */
266 	else
267 		mbrp->mbrp_esect = 18;	/* assumes 18 sectors/track */
268 	mbrp->mbrp_ecyl  = 79;	/* assumes 80 cylinders/diskette */
269 
270 	/*
271 	 * The "PReP" software ignores the above fields and just looks at
272 	 * the next two.
273 	 *   - size of the diskette is (assumed to be)
274 	 *     (2 tracks/cylinder)(18 sectors/tracks)(80 cylinders/diskette)
275 	 *   - unlike the above sector numbers,
276 	 *     the beginning sector is zero-based!
277 	 */
278 
279 	/* This has to be 0 on the PowerStack? */
280 	mbrp->mbrp_start = sa_htole32(0);
281 	mbrp->mbrp_size  = sa_htole32(2 * 18 * 80 - 1);
282 
283 	write(prep_fd, mbr, sizeof(mbr));
284 	write(prep_fd, &entry, sizeof(entry));
285 	write(prep_fd, &length, sizeof(length));
286 }
287 
288 static int
289 prep_build_image(char *kernel, char *boot, char *rawdev, char *outname)
290 {
291 	unsigned char *elf_img = NULL, *kern_img = NULL;
292 	int i, ch, tmp, kgzlen, err;
293 	int elf_fd, prep_fd, kern_fd, elf_img_len = 0;
294 	off_t lenpos, kstart, kend;
295 	unsigned long length;
296 	long flength;
297 	gzFile gzf;
298 	struct stat kern_stat;
299 	Elf32_External_Phdr phdr;
300 
301 	elf_fd = open_file("bootloader", boot, &hdr, &elf_stat);
302 	if (inkernflag) {
303 		kern_fd = open_file("kernel", kernel, &khdr, &kern_stat);
304 		kern_len = kern_stat.st_size + PREP_MAGICSIZE + KERNLENSIZE;
305 	} else
306 		kern_len = PREP_MAGICSIZE + KERNLENSIZE;
307 
308 	for (i = 0; i < ELFGET16(hdr.e_phnum); i++) {
309 		lseek(elf_fd, ELFGET32(hdr.e_phoff) + sizeof(phdr) * i,
310 			SEEK_SET);
311 		if (read(elf_fd, &phdr, sizeof(phdr)) != sizeof(phdr))
312 			errx(3, "Can't read input '%s' phdr : %s", boot,
313 			    strerror(errno));
314 
315 		if ((ELFGET32(phdr.p_type) != PT_LOAD) ||
316 		    !(ELFGET32(phdr.p_flags) & PF_X))
317 			continue;
318 
319 		fstat(elf_fd, &elf_stat);
320 		elf_img_len = elf_stat.st_size - ELFGET32(phdr.p_offset);
321 		lseek(elf_fd, ELFGET32(phdr.p_offset), SEEK_SET);
322 
323 		break;
324 	}
325 	if ((prep_fd = open(outname, O_RDWR|O_TRUNC, 0)) < 0) {
326 		/* we couldn't open it, it must be new */
327 		prep_fd = creat(outname, 0644);
328 		if (prep_fd < 0)
329 			errx(2, "Can't open output '%s': %s", outname,
330 			    strerror(errno));
331 	}
332 
333 	prep_check_mbr(prep_fd, rawdev);
334 
335 	/* Set file pos. to 2nd sector where image will be written */
336 	lseek(prep_fd, 0x400, SEEK_SET);
337 
338 	/* Copy boot image */
339 	elf_img = (unsigned char *)malloc(elf_img_len);
340 	if (!elf_img)
341 		errx(3, "Can't malloc: %s", strerror(errno));
342 	if (read(elf_fd, elf_img, elf_img_len) != elf_img_len)
343 		errx(3, "Can't read file '%s' : %s", boot, strerror(errno));
344 
345 	write(prep_fd, elf_img, elf_img_len);
346 	free(elf_img);
347 
348 	if (inkernflag) {
349 		/* Copy kernel */
350 		kern_img = (unsigned char *)malloc(kern_stat.st_size);
351 
352 		if (kern_img == NULL)
353 			errx(3, "Can't malloc: %s", strerror(errno));
354 
355 		/* we need to jump back after having read the headers */
356 		lseek(kern_fd, 0, SEEK_SET);
357 		if (read(kern_fd, (void *)kern_img, kern_stat.st_size) !=
358 		    kern_stat.st_size)
359 			errx(3, "Can't read kernel '%s' : %s",
360 			    kernel, strerror(errno));
361 	}
362 
363 	gzf = gzdopen(dup(prep_fd), "a");
364 	if (gzf == NULL)
365 		errx(3, "Can't init compression: %s", strerror(errno));
366 	if (gzsetparams(gzf, Z_BEST_COMPRESSION, Z_DEFAULT_STRATEGY) != Z_OK)
367 		errx(3, "%s", gzerror(gzf, &err));
368 
369 	/* write a magic number and size before the kernel */
370 	write(prep_fd, (void *)prep_magic, PREP_MAGICSIZE);
371 	lenpos = lseek(prep_fd, 0, SEEK_CUR);
372 	tmp = sa_htobe32(0);
373 	write(prep_fd, (void *)&tmp, KERNLENSIZE);
374 
375 	/* write in the compressed kernel */
376 	kstart = lseek(prep_fd, 0, SEEK_CUR);
377 	if (inkernflag) {
378 		kgzlen = gzwrite(gzf, kern_img, kern_stat.st_size);
379 		gzclose(gzf);
380 	}
381 	kend = lseek(prep_fd, 0, SEEK_CUR);
382 
383 	/* jump back to the length position now that we know the length */
384 	lseek(prep_fd, lenpos, SEEK_SET);
385 	kgzlen = kend - kstart;
386 	tmp = sa_htobe32(kgzlen);
387 	write(prep_fd, (void *)&tmp, KERNLENSIZE);
388 
389 	length = sa_htole32(0x400 + elf_img_len + 8 + kgzlen);
390 	lseek(prep_fd, sizeof(mbr) + 4, SEEK_SET);
391 	write(prep_fd, &length, sizeof(length));
392 
393 	flength = 0x400 + elf_img_len + 8 + kgzlen;
394 	if (lfloppyflag)
395 		flength -= (5760 * 512);
396 	else
397 		flength -= (2880 * 512);
398 	if (flength > 0 && !saloneflag)
399 		fprintf(stderr, "%s: Image %s is %ld bytes larger than single"
400 		    " floppy. Can only be used for netboot.\n", getprogname(),
401 		    outname, flength);
402 
403 	if (inkernflag) {
404 		free(kern_img);
405 		close(kern_fd);
406 	}
407 	close(prep_fd);
408 	close(elf_fd);
409 
410 	return 0;
411 }
412 
413 /* Fill in the needed information on the boot and config records.  Most of
414  * this is just AIX garbage that we don't really need to boot.
415  */
416 static void
417 rs6000_build_records(int img_len)
418 {
419 	int bcl;
420 
421 	/* zero out all the fields, so we only have to set the ones
422 	 * we care about, which are rather few.
423 	 */
424 	memset(&bootrec, 0, sizeof(rs6000_boot_record_t));
425 	memset(&confrec, 0, sizeof(rs6000_config_record_t));
426 
427 	bootrec.ipl_record = IPLRECID;
428 	bcl = img_len/512;
429 	if (img_len%512 != 0)
430 		bcl++;
431 	bootrec.bootcode_len = bcl;
432 	bootrec.bootcode_off = 0; /* XXX */
433 	bootrec.bootpart_start = 2; /* skip bootrec and confrec */
434 	bootrec.bootprg_start = 2;
435 	bootrec.bootpart_len = bcl;
436 	bootrec.boot_load_addr = 0x800000; /* XXX? */
437 	bootrec.boot_frag = 1;
438 	bootrec.boot_emul = 0x02; /* ?? */
439 	/* service mode is a repeat of normal mode */
440 	bootrec.servcode_len = bootrec.bootcode_len;
441 	bootrec.servcode_off = bootrec.bootcode_off;
442 	bootrec.servpart_start = bootrec.bootpart_start;
443 	bootrec.servprg_start = bootrec.bootprg_start;
444 	bootrec.servpart_len = bootrec.bootpart_len;
445 	bootrec.serv_load_addr = bootrec.boot_load_addr;
446 	bootrec.serv_frag = bootrec.boot_frag;
447 	bootrec.serv_emul = bootrec.boot_emul;
448 
449 	/* now the config record */
450 	confrec.conf_rec = CONFRECID;
451 	confrec.sector_size = 0x02; /* 512 bytes */
452 	confrec.last_cyl = 0x4f; /* 79 cyl, emulates floppy */
453 }
454 
455 static int
456 rs6000_build_image(char *kernel, char *boot, char *rawdev, char *outname)
457 {
458 	unsigned char *elf_img = NULL, *kern_img = NULL;
459 	int i, ch, tmp, kgzlen, err;
460 	int elf_fd, rs6000_fd, kern_fd, elf_img_len = 0, elf_pad;
461 	uint32_t swapped[128];
462 	off_t lenpos, kstart, kend;
463 	unsigned long length;
464 	long flength;
465 	gzFile gzf;
466 	struct stat kern_stat;
467 	Elf32_External_Phdr phdr;
468 
469 	elf_fd = open_file("bootloader", boot, &hdr, &elf_stat);
470 	kern_fd = open_file("kernel", kernel, &khdr, &kern_stat);
471 	kern_len = kern_stat.st_size + RS6000_MAGICSIZE + KERNLENSIZE;
472 
473 	for (i = 0; i < ELFGET16(hdr.e_phnum); i++) {
474 		lseek(elf_fd, ELFGET32(hdr.e_phoff) + sizeof(phdr) * i,
475 			SEEK_SET);
476 		if (read(elf_fd, &phdr, sizeof(phdr)) != sizeof(phdr))
477 			errx(3, "Can't read input '%s' phdr : %s", boot,
478 			    strerror(errno));
479 
480 		if ((ELFGET32(phdr.p_type) != PT_LOAD) ||
481 		    !(ELFGET32(phdr.p_flags) & PF_X))
482 			continue;
483 
484 		fstat(elf_fd, &elf_stat);
485 		elf_img_len = elf_stat.st_size - ELFGET32(phdr.p_offset);
486 		elf_pad = ELFGET32(phdr.p_memsz) - ELFGET32(phdr.p_filesz);
487 		if (verboseflag)
488 			printf("Padding %d\n", elf_pad);
489 		lseek(elf_fd, ELFGET32(phdr.p_offset), SEEK_SET);
490 
491 		break;
492 	}
493 	if ((rs6000_fd = open(outname, O_RDWR|O_TRUNC, 0)) < 0) {
494 		/* we couldn't open it, it must be new */
495 		rs6000_fd = creat(outname, 0644);
496 		if (rs6000_fd < 0)
497 			errx(2, "Can't open output '%s': %s", outname,
498 			    strerror(errno));
499 	}
500 
501 	/* Set file pos. to 2nd sector where image will be written */
502 	lseek(rs6000_fd, 0x400, SEEK_SET);
503 
504 	/* Copy boot image */
505 	elf_img = (unsigned char *)malloc(elf_img_len);
506 	if (!elf_img)
507 		errx(3, "Can't malloc: %s", strerror(errno));
508 	if (read(elf_fd, elf_img, elf_img_len) != elf_img_len)
509 		errx(3, "Can't read file '%s' : %s", boot, strerror(errno));
510 
511 	write(rs6000_fd, elf_img, elf_img_len);
512 	free(elf_img);
513 
514 	/* now dump in the padding space for the BSS */
515 	elf_pad += 100; /* just a little extra for good luck */
516 	lseek(rs6000_fd, elf_pad, SEEK_CUR);
517 
518 	/* Copy kernel */
519 	kern_img = (unsigned char *)malloc(kern_stat.st_size);
520 
521 	if (kern_img == NULL)
522 		errx(3, "Can't malloc: %s", strerror(errno));
523 
524 	/* we need to jump back after having read the headers */
525 	lseek(kern_fd, 0, SEEK_SET);
526 	if (read(kern_fd, (void *)kern_img, kern_stat.st_size) !=
527 	    kern_stat.st_size)
528 		errx(3, "Can't read kernel '%s' : %s", kernel, strerror(errno));
529 
530 	gzf = gzdopen(dup(rs6000_fd), "a");
531 	if (gzf == NULL)
532 		errx(3, "Can't init compression: %s", strerror(errno));
533 	if (gzsetparams(gzf, Z_BEST_COMPRESSION, Z_DEFAULT_STRATEGY) != Z_OK)
534 		errx(3, "%s", gzerror(gzf, &err));
535 
536 	/* write a magic number and size before the kernel */
537 	write(rs6000_fd, (void *)rs6000_magic, RS6000_MAGICSIZE);
538 	lenpos = lseek(rs6000_fd, 0, SEEK_CUR);
539 	if (verboseflag)
540 		printf("wrote magic at pos 0x%lx\n", (unsigned long)lenpos);
541 	tmp = sa_htobe32(0);
542 	write(rs6000_fd, (void *)&tmp, KERNLENSIZE);
543 
544 	/* write in the compressed kernel */
545 	kstart = lseek(rs6000_fd, 0, SEEK_CUR);
546 	if (verboseflag)
547 		printf("kernel start at pos 0x%lx\n", (unsigned long)kstart);
548 	kgzlen = gzwrite(gzf, kern_img, kern_stat.st_size);
549 	gzclose(gzf);
550 	kend = lseek(rs6000_fd, 0, SEEK_CUR);
551 	if (verboseflag)
552 		printf("kernel end at pos 0x%lx\n", (unsigned long)kend);
553 
554 	/* jump back to the length position now that we know the length */
555 	lseek(rs6000_fd, lenpos, SEEK_SET);
556 	kgzlen = kend - kstart;
557 	tmp = sa_htobe32(kgzlen);
558 	if (verboseflag)
559 		printf("kernel len = 0x%x tmp = 0x%x\n", kgzlen, tmp);
560 	write(rs6000_fd, (void *)&tmp, KERNLENSIZE);
561 
562 #if 0
563 	lseek(rs6000_fd, sizeof(boot_record_t) + sizeof(config_record_t),
564 	    SEEK_SET);
565 	/* set entry and length */
566 	length = sa_htole32(0x400);
567 	write(rs6000_fd, &length, sizeof(length));
568 	length = sa_htole32(0x400 + elf_img_len + 8 + kgzlen);
569 	write(rs6000_fd, &length, sizeof(length));
570 #endif
571 
572 	/* generate the header now that we know the kernel length */
573 	if (verboseflag)
574 		printf("building records\n");
575 	rs6000_build_records(elf_img_len + 8 + kgzlen);
576 	lseek(rs6000_fd, 0, SEEK_SET);
577 	/* ROM wants it byteswapped in 32bit chunks */
578 	if (verboseflag)
579 		printf("writing records\n");
580 	memcpy(swapped, &bootrec, sizeof(rs6000_boot_record_t));
581 	for (i=0; i < 128; i++)
582 		swapped[i] = htonl(swapped[i]);
583 	write(rs6000_fd, swapped, sizeof(rs6000_boot_record_t));
584 	memcpy(swapped, &confrec, sizeof(rs6000_config_record_t));
585 	for (i=0; i < 128; i++)
586 		swapped[i] = htonl(swapped[i]);
587 	write(rs6000_fd, swapped, sizeof(rs6000_config_record_t));
588 
589 	free(kern_img);
590 	close(kern_fd);
591 	close(rs6000_fd);
592 	close(elf_fd);
593 
594 	return 0;
595 }
596 
597 static int
598 bebox_write_header(int bebox_fd, int elf_image_len, int kern_img_len)
599 {
600 	int hsize = BEBOX_HEADER_SIZE;
601 	unsigned long textOffset, dataOffset, ldrOffset;
602 	unsigned long entry_vector[3];
603 	struct FileHeader fileHdr;
604 	struct SectionHeader textHdr, dataHdr, ldrHdr;
605 	struct LoaderHeader lh;
606 
607 
608 	ldrOffset = ULALIGN(sizeof (fileHdr) + sizeof (textHdr) +
609 	    sizeof (dataHdr) + sizeof (ldrHdr));
610 	dataOffset = ULALIGN(ldrOffset + sizeof (lh));
611 	textOffset = ULALIGN(dataOffset + sizeof (entry_vector) + kern_img_len);
612 
613 	/* Create the File Header */
614 	memset(&fileHdr, 0, sizeof (fileHdr));
615 	fileHdr.magic = sa_htobe32(PEF_MAGIC);
616 	fileHdr.fileTypeID = sa_htobe32(PEF_FILE);
617 	fileHdr.archID = sa_htobe32(PEF_PPC);
618 	fileHdr.versionNumber = sa_htobe32(1);
619 	fileHdr.numSections = sa_htobe16(3);
620 	fileHdr.loadableSections = sa_htobe16(2);
621 	write(bebox_fd, &fileHdr, sizeof (fileHdr));
622 
623 	/* Create the Section Header for TEXT */
624 	memset(&textHdr, 0, sizeof (textHdr));
625 	textHdr.sectionName = sa_htobe32(-1);
626 	textHdr.sectionAddress = sa_htobe32(0);
627 	textHdr.execSize = sa_htobe32(elf_image_len);
628 	textHdr.initSize = sa_htobe32(elf_image_len);
629 	textHdr.rawSize = sa_htobe32(elf_image_len);
630 	textHdr.fileOffset = sa_htobe32(textOffset);
631 	textHdr.regionKind = CodeSection;
632 	textHdr.shareKind = ContextShare;
633 	textHdr.alignment = 4;  /* 16 byte alignment */
634 	write(bebox_fd, &textHdr, sizeof (textHdr));
635 
636 	/* Create the Section Header for DATA */
637 	memset(&dataHdr, 0, sizeof (dataHdr));
638 	dataHdr.sectionName = sa_htobe32(-1);
639 	dataHdr.sectionAddress = sa_htobe32(0);
640 	dataHdr.execSize = sa_htobe32(sizeof (entry_vector) + kern_img_len);
641 	dataHdr.initSize = sa_htobe32(sizeof (entry_vector) + kern_img_len);
642 	dataHdr.rawSize = sa_htobe32(sizeof (entry_vector) + kern_img_len);
643 	dataHdr.fileOffset = sa_htobe32(dataOffset);
644 	dataHdr.regionKind = DataSection;
645 	dataHdr.shareKind = ContextShare;
646 	dataHdr.alignment = 4;  /* 16 byte alignment */
647 	write(bebox_fd, &dataHdr, sizeof (dataHdr));
648 
649 	/* Create the Section Header for loader stuff */
650 	memset(&ldrHdr, 0, sizeof (ldrHdr));
651 	ldrHdr.sectionName = sa_htobe32(-1);
652 	ldrHdr.sectionAddress = sa_htobe32(0);
653 	ldrHdr.execSize = sa_htobe32(sizeof (lh));
654 	ldrHdr.initSize = sa_htobe32(sizeof (lh));
655 	ldrHdr.rawSize = sa_htobe32(sizeof (lh));
656 	ldrHdr.fileOffset = sa_htobe32(ldrOffset);
657 	ldrHdr.regionKind = LoaderSection;
658 	ldrHdr.shareKind = GlobalShare;
659 	ldrHdr.alignment = 4;  /* 16 byte alignment */
660 	write(bebox_fd, &ldrHdr, sizeof (ldrHdr));
661 
662 	/* Create the Loader Header */
663 	memset(&lh, 0, sizeof (lh));
664 	lh.entryPointSection = sa_htobe32(1);		/* Data */
665 	lh.entryPointOffset = sa_htobe32(0);
666 	lh.initPointSection = sa_htobe32(-1);
667 	lh.initPointOffset = sa_htobe32(0);
668 	lh.termPointSection = sa_htobe32(-1);
669 	lh.termPointOffset = sa_htobe32(0);
670 	lseek(bebox_fd, ldrOffset + hsize, SEEK_SET);
671 	write(bebox_fd, &lh, sizeof (lh));
672 
673 	/* Copy the pseudo-DATA */
674 	memset(entry_vector, 0, sizeof (entry_vector));
675 	entry_vector[0] = sa_htobe32(BEBOX_ENTRY);	/* Magic */
676 	lseek(bebox_fd, dataOffset + hsize, SEEK_SET);
677 	write(bebox_fd, entry_vector, sizeof (entry_vector));
678 
679 	return textOffset;
680 }
681 
682 static int
683 bebox_build_image(char *kernel, char *boot, char *rawdev, char *outname)
684 {
685 	unsigned char *elf_img = NULL, *kern_img = NULL, *header_img = NULL;
686 	int i, ch, tmp, kgzlen, err, hsize = BEBOX_HEADER_SIZE;
687 	int elf_fd, bebox_fd, kern_fd, elf_img_len = 0;
688 	uint32_t swapped[128];
689 	off_t lenpos, kstart, kend, toff, endoff;
690 	unsigned long length;
691 	long flength, *offset;
692 	gzFile gzf;
693 	struct stat kern_stat;
694 	struct bebox_image_block *p;
695 	struct timeval tp;
696 	Elf32_External_Phdr phdr;
697 
698 	elf_fd = open_file("bootloader", boot, &hdr, &elf_stat);
699 	if (inkernflag) {
700 		kern_fd = open_file("kernel", kernel, &khdr, &kern_stat);
701 		kern_len = kern_stat.st_size + BEBOX_MAGICSIZE + KERNLENSIZE;
702 	} else
703 		kern_len = BEBOX_MAGICSIZE + KERNLENSIZE;
704 
705 	for (i = 0; i < ELFGET16(hdr.e_phnum); i++) {
706 		lseek(elf_fd, ELFGET32(hdr.e_phoff) + sizeof(phdr) * i,
707 			SEEK_SET);
708 		if (read(elf_fd, &phdr, sizeof(phdr)) != sizeof(phdr))
709 			errx(3, "Can't read input '%s' phdr : %s", boot,
710 			    strerror(errno));
711 
712 		if ((ELFGET32(phdr.p_type) != PT_LOAD) ||
713 		    !(ELFGET32(phdr.p_flags) & PF_X))
714 			continue;
715 
716 		fstat(elf_fd, &elf_stat);
717 		elf_img_len = ELFGET32(phdr.p_filesz);
718 		lseek(elf_fd, ELFGET32(phdr.p_offset), SEEK_SET);
719 
720 		break;
721 	}
722 	if ((bebox_fd = open(outname, O_RDWR|O_TRUNC, 0)) < 0) {
723 		/* we couldn't open it, it must be new */
724 		bebox_fd = creat(outname, 0644);
725 		if (bebox_fd < 0)
726 			errx(2, "Can't open output '%s': %s", outname,
727 			    strerror(errno));
728 	}
729 	lseek(bebox_fd, hsize, SEEK_SET);
730 
731 	if (inkernflag) {
732 		/*
733 		 * write the header with the wrong values to get the offset
734 		 * right
735 		 */
736 		bebox_write_header(bebox_fd, elf_img_len, kern_stat.st_size);
737 
738 		/* Copy kernel */
739 		kern_img = (unsigned char *)malloc(kern_stat.st_size);
740 
741 		if (kern_img == NULL)
742 			errx(3, "Can't malloc: %s", strerror(errno));
743 
744 		/* we need to jump back after having read the headers */
745 		lseek(kern_fd, 0, SEEK_SET);
746 		if (read(kern_fd, (void *)kern_img, kern_stat.st_size) !=
747 		    kern_stat.st_size)
748 			errx(3, "Can't read kernel '%s' : %s",
749 			    kernel, strerror(errno));
750 
751 		gzf = gzdopen(dup(bebox_fd), "a");
752 		if (gzf == NULL)
753 			errx(3, "Can't init compression: %s", strerror(errno));
754 		if (gzsetparams(gzf, Z_BEST_COMPRESSION, Z_DEFAULT_STRATEGY) !=
755 		    Z_OK)
756 			errx(3, "%s", gzerror(gzf, &err));
757 	} else
758 		bebox_write_header(bebox_fd, elf_img_len, 0);
759 
760 	/* write a magic number and size before the kernel */
761 	write(bebox_fd, (void *)bebox_magic, BEBOX_MAGICSIZE);
762 	lenpos = lseek(bebox_fd, 0, SEEK_CUR);
763 	tmp = sa_htobe32(0);
764 	write(bebox_fd, (void *)&tmp, KERNLENSIZE);
765 
766 	if (inkernflag) {
767 		/* write in the compressed kernel */
768 		kstart = lseek(bebox_fd, 0, SEEK_CUR);
769 		kgzlen = gzwrite(gzf, kern_img, kern_stat.st_size);
770 		gzclose(gzf);
771 		kend = lseek(bebox_fd, 0, SEEK_CUR);
772 		free(kern_img);
773 	} else {
774 		kstart = kend = lseek(bebox_fd, 0, SEEK_CUR);
775 		kgzlen = 0;
776 	}
777 
778 	/* jump back to the length position now that we know the length */
779 	lseek(bebox_fd, lenpos, SEEK_SET);
780 	kgzlen = kend - kstart;
781 	tmp = sa_htobe32(kgzlen);
782 	write(bebox_fd, (void *)&tmp, KERNLENSIZE);
783 
784 	/* now rewrite the header correctly */
785 	lseek(bebox_fd, hsize, SEEK_SET);
786 	tmp = kgzlen + BEBOX_MAGICSIZE + KERNLENSIZE;
787 	toff = bebox_write_header(bebox_fd, elf_img_len, tmp);
788 
789 	/* Copy boot image */
790 	elf_img = (unsigned char *)malloc(elf_img_len);
791 	if (!elf_img)
792 		errx(3, "Can't malloc: %s", strerror(errno));
793 	if (read(elf_fd, elf_img, elf_img_len) != elf_img_len)
794 		errx(3, "Can't read file '%s' : %s", boot, strerror(errno));
795 	lseek(bebox_fd, toff + hsize, SEEK_SET);
796 	write(bebox_fd, elf_img, elf_img_len);
797 	free(elf_img);
798 
799 	if (inkernflag)
800 		close(kern_fd);
801 	close(elf_fd);
802 
803 	/* Now go back and write in the block header */
804 	endoff = lseek(bebox_fd, 0, SEEK_END);
805 	lseek(bebox_fd, 0, SEEK_SET);
806 	header_img = (unsigned char *)malloc(BEBOX_HEADER_SIZE);
807 	if (!header_img)
808 		errx(3, "Can't malloc: %s", strerror(errno));
809 	memset(header_img, 0, BEBOX_HEADER_SIZE);
810 
811 	/* copy the boot image into the buffer */
812 	for (p = bebox_image_block; p->offset != -1; p++)
813 		memcpy(header_img + p->offset, p->data, p->size);
814 
815 	/* fill used block bitmap */
816 	memset(header_img + BEBOX_FILE_BLOCK_MAP_START, 0xff,
817 	    BEBOX_FILE_BLOCK_MAP_END - BEBOX_FILE_BLOCK_MAP_START);
818 
819 	/* fix the file size in the header */
820 	tmp = endoff - BEBOX_HEADER_SIZE;
821 	*(long *)(header_img + BEBOX_FILE_SIZE_OFFSET) =
822 	    (long)sa_htobe32(tmp);
823 	*(long *)(header_img + BEBOX_FILE_SIZE_ALIGN_OFFSET) =
824 	    (long)sa_htobe32(roundup(tmp, BEBOX_FILE_BLOCK_SIZE));
825 
826 	gettimeofday(&tp, 0);
827 	for (offset = bebox_mtime_offset; *offset != -1; offset++)
828 		*(long *)(header_img + *offset) = (long)sa_htobe32(tp.tv_sec);
829 
830 	write(bebox_fd, header_img, BEBOX_HEADER_SIZE);
831 
832 	/* now pad the end */
833 	flength = roundup(endoff, BEBOX_BLOCK_SIZE);
834 	/* refill the header_img with zeros */
835 	memset(header_img, 0, BEBOX_BLOCK_SIZE * 2);
836 	lseek(bebox_fd, 0, SEEK_END);
837 	write(bebox_fd, header_img, flength - endoff);
838 
839 	close(bebox_fd);
840 
841 	return 0;
842 }
843 
844 int
845 main(int argc, char **argv)
846 {
847 	int ch, lfloppyflag=0;
848 	char *kernel = NULL, *boot = NULL, *rawdev = NULL, *outname = NULL;
849 	char *march = NULL;
850 #ifdef USE_SYSCTL
851 	char machine[SYS_NMLN];
852 	int mib[2] = { CTL_HW, HW_MACHINE };
853 #endif
854 
855 	setprogname(argv[0]);
856 	kern_len = 0;
857 
858 	while ((ch = getopt(argc, argv, "b:Ik:lm:r:sv")) != -1)
859 		switch (ch) {
860 		case 'b':
861 			boot = optarg;
862 			break;
863 		case 'I':
864 			inkernflag = 0;
865 			break;
866 		case 'k':
867 			kernel = optarg;
868 			inkernflag = 1;
869 			break;
870 		case 'l':
871 			lfloppyflag = 1;
872 			break;
873 		case 'm':
874 			march = optarg;
875 			break;
876 		case 'r':
877 			rawdev = optarg;
878 			break;
879 		case 's':
880 			saloneflag = 1;
881 			break;
882 		case 'v':
883 			verboseflag = 1;
884 			break;
885 		case '?':
886 		default:
887 			usage(0);
888 			/* NOTREACHED */
889 		}
890 	argc -= optind;
891 	argv += optind;
892 
893 	if (argc < 1)
894 		usage(0);
895 
896 	if (kernel == NULL && inkernflag)
897 		kernel = "/netbsd";
898 
899 	if (boot == NULL)
900 		boot = "/usr/mdec/boot";
901 
902 	if (march != NULL && strcmp(march, "") == 0)
903 		march = NULL;
904 	if (march == NULL) {
905 		int i;
906 #ifdef USE_SYSCTL
907 		size_t len = sizeof(machine);
908 
909 		if (sysctl(mib, sizeof (mib) / sizeof (mib[0]), machine,
910 			&len, NULL, 0) != -1) {
911 			for (i=0; sup_plats[i] != NULL; i++) {
912 				if (strcmp(sup_plats[i], machine) == 0) {
913 					march = strdup(sup_plats[i]);
914 					break;
915 				}
916 			}
917 		}
918 		if (march == NULL)
919 #endif
920 			usage(1);
921 	}
922 
923 	outname = argv[0];
924 
925 	if (strcmp(march, "prep") == 0)
926 		return(prep_build_image(kernel, boot, rawdev, outname));
927 	if (strcmp(march, "rs6000") == 0)
928 		return(rs6000_build_image(kernel, boot, rawdev, outname));
929 	if (strcmp(march, "bebox") == 0)
930 		return(bebox_build_image(kernel, boot, rawdev, outname));
931 
932 	usage(1);
933 	return(0);
934 }
935