1 /* $NetBSD: mkbootimage.c,v 1.19 2016/01/21 17:14:05 christos Exp $ */ 2 3 /*- 4 * Copyright (c) 2007 The NetBSD Foundation, Inc. 5 * All rights reserved. 6 * 7 * This code is derived from software contributed to The NetBSD Foundation 8 * by Tim Rightnour and NONAKA Kimihiro 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 * POSSIBILITY OF SUCH DAMAGE. 30 */ 31 32 #if HAVE_NBTOOL_CONFIG_H 33 #include "nbtool_config.h" 34 #include "../../sys/sys/bootblock.h" 35 #else 36 #include <sys/bootblock.h> 37 #endif 38 39 #include <stdio.h> 40 #include <stdlib.h> 41 #include <string.h> 42 #include <fcntl.h> 43 #include <unistd.h> 44 #include <errno.h> 45 #include <zlib.h> 46 #include <err.h> 47 #include <sys/stat.h> 48 #include <sys/types.h> 49 #include <sys/uio.h> 50 #include <sys/signal.h> 51 52 #undef USE_SYSCTL 53 54 #if defined(__NetBSD__) && !defined(HAVE_NBTOOL_CONFIG_H) 55 #define USE_SYSCTL 1 56 #include <sys/param.h> 57 #include <sys/sysctl.h> 58 #include <sys/utsname.h> 59 #endif 60 61 /* BFD ELF headers */ 62 #include <elf/common.h> 63 #include <elf/external.h> 64 65 #include "bebox_bootrec.h" 66 #include "byteorder.h" 67 #include "magic.h" 68 #include "pef.h" 69 #include "rs6000_bootrec.h" 70 71 /* Globals */ 72 73 int inkernflag = 1; 74 int saloneflag = 0; 75 int verboseflag = 0; 76 int lfloppyflag = 0; 77 Elf32_External_Ehdr hdr, khdr; 78 struct stat elf_stat; 79 unsigned char mbr[512]; 80 81 /* the boot and config records for rs6000 */ 82 rs6000_boot_record_t bootrec; 83 rs6000_config_record_t confrec; 84 85 /* supported platforms */ 86 char *sup_plats[] = { 87 "bebox", 88 "prep", 89 "rs6000", 90 NULL, 91 }; 92 93 /* 94 * Macros to get values from multi-byte ELF header fields. These assume 95 * a big-endian image. 96 */ 97 #define ELFGET16(x) (((x)[0] << 8) | (x)[1]) 98 99 #define ELFGET32(x) (((x)[0] << 24) | ((x)[1] << 16) | \ 100 ((x)[2] << 8) | (x)[3]) 101 102 #define ULALIGN(x) ((x + 0x0f) & 0xfffffff0) 103 104 static void usage(int); 105 static int open_file(const char *, char *, Elf32_External_Ehdr *, 106 struct stat *); 107 static void check_mbr(int, char *); 108 static int prep_build_image(char *, char *, char *, char *); 109 static void rs6000_build_records(int); 110 static int rs6000_build_image(char *, char *, char *, char *); 111 int main(int, char **); 112 113 114 static void 115 usage(int extended) 116 { 117 int i; 118 119 if (extended) { 120 fprintf(stderr, "You are not running this program on" 121 " the target machine. You must supply the\n" 122 "machine architecture with the -m flag\n"); 123 fprintf(stderr, "Supported architectures: "); 124 for (i=0; sup_plats[i] != NULL; i++) 125 fprintf(stderr, " %s", sup_plats[i]); 126 fprintf(stderr, "\n\n"); 127 } 128 #ifdef USE_SYSCTL 129 fprintf(stderr, "usage: %s [-Ilsv] [-m machine] [-b bootfile] " 130 "[-k kernel] [-r rawdev] bootimage\n", getprogname()); 131 #else 132 fprintf(stderr, "usage: %s [-Ilsv] -m machine [-b bootfile] " 133 "[-k kernel] [-r rawdev] bootimage\n", getprogname()); 134 #endif 135 exit(1); 136 } 137 138 /* verify the file is ELF and ppc, and open it up */ 139 static int 140 open_file(const char *ftype, char *file, Elf32_External_Ehdr *hdr, 141 struct stat *f_stat) 142 { 143 int fd; 144 145 if ((fd = open(file, 0)) < 0) 146 errx(2, "Can't open %s '%s': %s", ftype, file, strerror(errno)); 147 fstat(fd, f_stat); 148 149 if (read(fd, hdr, sizeof(Elf32_External_Ehdr)) != 150 sizeof(Elf32_External_Ehdr)) 151 errx(3, "Can't read input '%s': %s", file, strerror(errno)); 152 153 if (hdr->e_ident[EI_MAG0] != ELFMAG0 || 154 hdr->e_ident[EI_MAG1] != ELFMAG1 || 155 hdr->e_ident[EI_MAG2] != ELFMAG2 || 156 hdr->e_ident[EI_MAG3] != ELFMAG3 || 157 hdr->e_ident[EI_CLASS] != ELFCLASS32) 158 errx(3, "input '%s' is not ELF32 format", file); 159 160 if (hdr->e_ident[EI_DATA] != ELFDATA2MSB) 161 errx(3, "input '%s' is not big-endian", file); 162 163 if (ELFGET16(hdr->e_machine) != EM_PPC) 164 errx(3, "input '%s' is not PowerPC exec binary", file); 165 166 return(fd); 167 } 168 169 static void 170 prep_check_mbr(int prep_fd, char *rawdev) 171 { 172 int raw_fd; 173 unsigned long entry, length; 174 struct mbr_partition *mbrp; 175 struct stat raw_stat; 176 177 /* If we are building a standalone image, do not write an MBR, just 178 * set entry point and boot image size skipping over elf header 179 */ 180 if (saloneflag) { 181 entry = sa_htole32(0x400); 182 length = sa_htole32(elf_stat.st_size - sizeof(hdr) + 0x400); 183 lseek(prep_fd, sizeof(mbr), SEEK_SET); 184 write(prep_fd, &entry, sizeof(entry)); 185 write(prep_fd, &length, sizeof(length)); 186 return; 187 } 188 189 /* 190 * if we have a raw device, we need to check to see if it already 191 * has a partition table, and if so, read it in and check for 192 * suitability. 193 */ 194 if (rawdev != NULL) { 195 raw_fd = open(rawdev, O_RDONLY, 0); 196 if (raw_fd == -1) 197 errx(3, "couldn't open raw device %s: %s", rawdev, 198 strerror(errno)); 199 200 fstat(raw_fd, &raw_stat); 201 if (!S_ISCHR(raw_stat.st_mode)) 202 errx(3, "%s is not a raw device", rawdev); 203 204 if (read(raw_fd, mbr, 512) != 512) 205 errx(3, "MBR Read Failed: %s", strerror(errno)); 206 207 mbrp = (struct mbr_partition *)&mbr[MBR_PART_OFFSET]; 208 if (mbrp->mbrp_type != MBR_PTYPE_PREP) 209 errx(3, "First partition is not of type 0x%x.", 210 MBR_PTYPE_PREP); 211 if (mbrp->mbrp_start != 0) 212 errx(3, "Use of the raw device is intended for" 213 " upgrading of legacy installations. Your" 214 " install does not have a PReP boot partition" 215 " starting at sector 0. Use the -s option" 216 " to build an image instead."); 217 218 /* if we got this far, we are fine, write back the partition 219 * and write the entry points and get outta here */ 220 /* Set entry point and boot image size skipping over elf header */ 221 lseek(prep_fd, 0, SEEK_SET); 222 entry = sa_htole32(0x400); 223 length = sa_htole32(elf_stat.st_size - sizeof(hdr) + 0x400); 224 write(prep_fd, mbr, sizeof(mbr)); 225 write(prep_fd, &entry, sizeof(entry)); 226 write(prep_fd, &length, sizeof(length)); 227 close(raw_fd); 228 return; 229 } 230 231 /* if we get to here, we want to build a standard floppy or netboot 232 * image to file, so just build it */ 233 234 memset(mbr, 0, sizeof(mbr)); 235 mbrp = (struct mbr_partition *)&mbr[MBR_PART_OFFSET]; 236 237 /* Set entry point and boot image size skipping over elf header */ 238 entry = sa_htole32(0x400); 239 length = sa_htole32(elf_stat.st_size - sizeof(hdr) + 0x400); 240 241 /* 242 * Set magic number for msdos partition 243 */ 244 *(unsigned short *)&mbr[MBR_MAGIC_OFFSET] = sa_htole16(MBR_MAGIC); 245 246 /* 247 * Build a "PReP" partition table entry in the boot record 248 * - "PReP" may only look at the system_indicator 249 */ 250 mbrp->mbrp_flag = MBR_PFLAG_ACTIVE; 251 mbrp->mbrp_type = MBR_PTYPE_PREP; 252 253 /* 254 * The first block of the diskette is used by this "boot record" which 255 * actually contains the partition table. (The first block of the 256 * partition contains the boot image, but I digress...) We'll set up 257 * one partition on the diskette and it shall contain the rest of the 258 * diskette. 259 */ 260 mbrp->mbrp_shd = 0; /* zero-based */ 261 mbrp->mbrp_ssect = 2; /* one-based */ 262 mbrp->mbrp_scyl = 0; /* zero-based */ 263 mbrp->mbrp_ehd = 1; /* assumes two heads */ 264 if (lfloppyflag) 265 mbrp->mbrp_esect = 36; /* 2.88MB floppy */ 266 else 267 mbrp->mbrp_esect = 18; /* assumes 18 sectors/track */ 268 mbrp->mbrp_ecyl = 79; /* assumes 80 cylinders/diskette */ 269 270 /* 271 * The "PReP" software ignores the above fields and just looks at 272 * the next two. 273 * - size of the diskette is (assumed to be) 274 * (2 tracks/cylinder)(18 sectors/tracks)(80 cylinders/diskette) 275 * - unlike the above sector numbers, 276 * the beginning sector is zero-based! 277 */ 278 279 /* This has to be 0 on the PowerStack? */ 280 mbrp->mbrp_start = sa_htole32(0); 281 mbrp->mbrp_size = sa_htole32(2 * 18 * 80 - 1); 282 283 write(prep_fd, mbr, sizeof(mbr)); 284 write(prep_fd, &entry, sizeof(entry)); 285 write(prep_fd, &length, sizeof(length)); 286 } 287 288 static int 289 prep_build_image(char *kernel, char *boot, char *rawdev, char *outname) 290 { 291 unsigned char *elf_img = NULL, *kern_img = NULL; 292 int i, ch, tmp, kgzlen, err; 293 int elf_fd, prep_fd, kern_fd, elf_img_len = 0; 294 off_t lenpos, kstart, kend; 295 unsigned long length; 296 long flength; 297 gzFile gzf; 298 struct stat kern_stat; 299 Elf32_External_Phdr phdr; 300 301 elf_fd = open_file("bootloader", boot, &hdr, &elf_stat); 302 if (inkernflag) { 303 kern_fd = open_file("kernel", kernel, &khdr, &kern_stat); 304 kern_len = kern_stat.st_size + PREP_MAGICSIZE + KERNLENSIZE; 305 } else 306 kern_len = PREP_MAGICSIZE + KERNLENSIZE; 307 308 for (i = 0; i < ELFGET16(hdr.e_phnum); i++) { 309 lseek(elf_fd, ELFGET32(hdr.e_phoff) + sizeof(phdr) * i, 310 SEEK_SET); 311 if (read(elf_fd, &phdr, sizeof(phdr)) != sizeof(phdr)) 312 errx(3, "Can't read input '%s' phdr : %s", boot, 313 strerror(errno)); 314 315 if ((ELFGET32(phdr.p_type) != PT_LOAD) || 316 !(ELFGET32(phdr.p_flags) & PF_X)) 317 continue; 318 319 fstat(elf_fd, &elf_stat); 320 elf_img_len = elf_stat.st_size - ELFGET32(phdr.p_offset); 321 lseek(elf_fd, ELFGET32(phdr.p_offset), SEEK_SET); 322 323 break; 324 } 325 if ((prep_fd = open(outname, O_RDWR|O_TRUNC, 0)) < 0) { 326 /* we couldn't open it, it must be new */ 327 prep_fd = creat(outname, 0644); 328 if (prep_fd < 0) 329 errx(2, "Can't open output '%s': %s", outname, 330 strerror(errno)); 331 } 332 333 prep_check_mbr(prep_fd, rawdev); 334 335 /* Set file pos. to 2nd sector where image will be written */ 336 lseek(prep_fd, 0x400, SEEK_SET); 337 338 /* Copy boot image */ 339 elf_img = malloc(elf_img_len); 340 if (!elf_img) 341 errx(3, "Can't malloc: %s", strerror(errno)); 342 if (read(elf_fd, elf_img, elf_img_len) != elf_img_len) 343 errx(3, "Can't read file '%s' : %s", boot, strerror(errno)); 344 345 write(prep_fd, elf_img, elf_img_len); 346 free(elf_img); 347 348 if (inkernflag) { 349 /* Copy kernel */ 350 kern_img = malloc(kern_stat.st_size); 351 352 if (kern_img == NULL) 353 errx(3, "Can't malloc: %s", strerror(errno)); 354 355 /* we need to jump back after having read the headers */ 356 lseek(kern_fd, 0, SEEK_SET); 357 if (read(kern_fd, (void *)kern_img, kern_stat.st_size) != 358 kern_stat.st_size) 359 errx(3, "Can't read kernel '%s' : %s", 360 kernel, strerror(errno)); 361 } 362 363 gzf = gzdopen(dup(prep_fd), "a"); 364 if (gzf == NULL) 365 errx(3, "Can't init compression: %s", strerror(errno)); 366 if (gzsetparams(gzf, Z_BEST_COMPRESSION, Z_DEFAULT_STRATEGY) != Z_OK) 367 errx(3, "%s", gzerror(gzf, &err)); 368 369 /* write a magic number and size before the kernel */ 370 write(prep_fd, (void *)prep_magic, PREP_MAGICSIZE); 371 lenpos = lseek(prep_fd, 0, SEEK_CUR); 372 tmp = sa_htobe32(0); 373 write(prep_fd, (void *)&tmp, KERNLENSIZE); 374 375 /* write in the compressed kernel */ 376 kstart = lseek(prep_fd, 0, SEEK_CUR); 377 if (inkernflag) { 378 kgzlen = gzwrite(gzf, kern_img, kern_stat.st_size); 379 gzclose(gzf); 380 } 381 kend = lseek(prep_fd, 0, SEEK_CUR); 382 383 /* jump back to the length position now that we know the length */ 384 lseek(prep_fd, lenpos, SEEK_SET); 385 kgzlen = kend - kstart; 386 tmp = sa_htobe32(kgzlen); 387 write(prep_fd, (void *)&tmp, KERNLENSIZE); 388 389 length = sa_htole32(0x400 + elf_img_len + 8 + kgzlen); 390 lseek(prep_fd, sizeof(mbr) + 4, SEEK_SET); 391 write(prep_fd, &length, sizeof(length)); 392 393 flength = 0x400 + elf_img_len + 8 + kgzlen; 394 if (lfloppyflag) 395 flength -= (5760 * 512); 396 else 397 flength -= (2880 * 512); 398 if (flength > 0 && !saloneflag) 399 fprintf(stderr, "%s: Image %s is %ld bytes larger than single" 400 " floppy. Can only be used for netboot.\n", getprogname(), 401 outname, flength); 402 403 if (inkernflag) { 404 free(kern_img); 405 close(kern_fd); 406 } 407 close(prep_fd); 408 close(elf_fd); 409 410 return 0; 411 } 412 413 /* Fill in the needed information on the boot and config records. Most of 414 * this is just AIX garbage that we don't really need to boot. 415 */ 416 static void 417 rs6000_build_records(int img_len) 418 { 419 int bcl; 420 421 /* zero out all the fields, so we only have to set the ones 422 * we care about, which are rather few. 423 */ 424 memset(&bootrec, 0, sizeof(rs6000_boot_record_t)); 425 memset(&confrec, 0, sizeof(rs6000_config_record_t)); 426 427 bootrec.ipl_record = IPLRECID; 428 bcl = img_len/512; 429 if (img_len%512 != 0) 430 bcl++; 431 bootrec.bootcode_len = bcl; 432 bootrec.bootcode_off = 0; /* XXX */ 433 bootrec.bootpart_start = 2; /* skip bootrec and confrec */ 434 bootrec.bootprg_start = 2; 435 bootrec.bootpart_len = bcl; 436 bootrec.boot_load_addr = 0x800000; /* XXX? */ 437 bootrec.boot_frag = 1; 438 bootrec.boot_emul = 0x02; /* ?? */ 439 /* service mode is a repeat of normal mode */ 440 bootrec.servcode_len = bootrec.bootcode_len; 441 bootrec.servcode_off = bootrec.bootcode_off; 442 bootrec.servpart_start = bootrec.bootpart_start; 443 bootrec.servprg_start = bootrec.bootprg_start; 444 bootrec.servpart_len = bootrec.bootpart_len; 445 bootrec.serv_load_addr = bootrec.boot_load_addr; 446 bootrec.serv_frag = bootrec.boot_frag; 447 bootrec.serv_emul = bootrec.boot_emul; 448 449 /* now the config record */ 450 confrec.conf_rec = CONFRECID; 451 confrec.sector_size = 0x02; /* 512 bytes */ 452 confrec.last_cyl = 0x4f; /* 79 cyl, emulates floppy */ 453 } 454 455 static int 456 rs6000_build_image(char *kernel, char *boot, char *rawdev, char *outname) 457 { 458 unsigned char *elf_img = NULL, *kern_img = NULL; 459 int i, ch, tmp, kgzlen, err; 460 int elf_fd, rs6000_fd, kern_fd, elf_img_len = 0, elf_pad; 461 uint32_t swapped[128]; 462 off_t lenpos, kstart, kend; 463 unsigned long length; 464 long flength; 465 gzFile gzf; 466 struct stat kern_stat; 467 Elf32_External_Phdr phdr; 468 469 elf_fd = open_file("bootloader", boot, &hdr, &elf_stat); 470 kern_fd = open_file("kernel", kernel, &khdr, &kern_stat); 471 kern_len = kern_stat.st_size + RS6000_MAGICSIZE + KERNLENSIZE; 472 473 for (i = 0; i < ELFGET16(hdr.e_phnum); i++) { 474 lseek(elf_fd, ELFGET32(hdr.e_phoff) + sizeof(phdr) * i, 475 SEEK_SET); 476 if (read(elf_fd, &phdr, sizeof(phdr)) != sizeof(phdr)) 477 errx(3, "Can't read input '%s' phdr : %s", boot, 478 strerror(errno)); 479 480 if ((ELFGET32(phdr.p_type) != PT_LOAD) || 481 !(ELFGET32(phdr.p_flags) & PF_X)) 482 continue; 483 484 fstat(elf_fd, &elf_stat); 485 elf_img_len = elf_stat.st_size - ELFGET32(phdr.p_offset); 486 elf_pad = ELFGET32(phdr.p_memsz) - ELFGET32(phdr.p_filesz); 487 if (verboseflag) 488 printf("Padding %d\n", elf_pad); 489 lseek(elf_fd, ELFGET32(phdr.p_offset), SEEK_SET); 490 491 break; 492 } 493 if ((rs6000_fd = open(outname, O_RDWR|O_TRUNC, 0)) < 0) { 494 /* we couldn't open it, it must be new */ 495 rs6000_fd = creat(outname, 0644); 496 if (rs6000_fd < 0) 497 errx(2, "Can't open output '%s': %s", outname, 498 strerror(errno)); 499 } 500 501 /* Set file pos. to 2nd sector where image will be written */ 502 lseek(rs6000_fd, 0x400, SEEK_SET); 503 504 /* Copy boot image */ 505 elf_img = malloc(elf_img_len); 506 if (!elf_img) 507 errx(3, "Can't malloc: %s", strerror(errno)); 508 if (read(elf_fd, elf_img, elf_img_len) != elf_img_len) 509 errx(3, "Can't read file '%s' : %s", boot, strerror(errno)); 510 511 write(rs6000_fd, elf_img, elf_img_len); 512 free(elf_img); 513 514 /* now dump in the padding space for the BSS */ 515 elf_pad += 100; /* just a little extra for good luck */ 516 lseek(rs6000_fd, elf_pad, SEEK_CUR); 517 518 /* Copy kernel */ 519 kern_img = malloc(kern_stat.st_size); 520 521 if (kern_img == NULL) 522 errx(3, "Can't malloc: %s", strerror(errno)); 523 524 /* we need to jump back after having read the headers */ 525 lseek(kern_fd, 0, SEEK_SET); 526 if (read(kern_fd, (void *)kern_img, kern_stat.st_size) != 527 kern_stat.st_size) 528 errx(3, "Can't read kernel '%s' : %s", kernel, strerror(errno)); 529 530 gzf = gzdopen(dup(rs6000_fd), "a"); 531 if (gzf == NULL) 532 errx(3, "Can't init compression: %s", strerror(errno)); 533 if (gzsetparams(gzf, Z_BEST_COMPRESSION, Z_DEFAULT_STRATEGY) != Z_OK) 534 errx(3, "%s", gzerror(gzf, &err)); 535 536 /* write a magic number and size before the kernel */ 537 write(rs6000_fd, (void *)rs6000_magic, RS6000_MAGICSIZE); 538 lenpos = lseek(rs6000_fd, 0, SEEK_CUR); 539 if (verboseflag) 540 printf("wrote magic at pos 0x%lx\n", (unsigned long)lenpos); 541 tmp = sa_htobe32(0); 542 write(rs6000_fd, (void *)&tmp, KERNLENSIZE); 543 544 /* write in the compressed kernel */ 545 kstart = lseek(rs6000_fd, 0, SEEK_CUR); 546 if (verboseflag) 547 printf("kernel start at pos 0x%lx\n", (unsigned long)kstart); 548 kgzlen = gzwrite(gzf, kern_img, kern_stat.st_size); 549 gzclose(gzf); 550 kend = lseek(rs6000_fd, 0, SEEK_CUR); 551 if (verboseflag) 552 printf("kernel end at pos 0x%lx\n", (unsigned long)kend); 553 554 /* jump back to the length position now that we know the length */ 555 lseek(rs6000_fd, lenpos, SEEK_SET); 556 kgzlen = kend - kstart; 557 tmp = sa_htobe32(kgzlen); 558 if (verboseflag) 559 printf("kernel len = 0x%x tmp = 0x%x\n", kgzlen, tmp); 560 write(rs6000_fd, (void *)&tmp, KERNLENSIZE); 561 562 #if 0 563 lseek(rs6000_fd, sizeof(boot_record_t) + sizeof(config_record_t), 564 SEEK_SET); 565 /* set entry and length */ 566 length = sa_htole32(0x400); 567 write(rs6000_fd, &length, sizeof(length)); 568 length = sa_htole32(0x400 + elf_img_len + 8 + kgzlen); 569 write(rs6000_fd, &length, sizeof(length)); 570 #endif 571 572 /* generate the header now that we know the kernel length */ 573 if (verboseflag) 574 printf("building records\n"); 575 rs6000_build_records(elf_img_len + 8 + kgzlen); 576 lseek(rs6000_fd, 0, SEEK_SET); 577 /* ROM wants it byteswapped in 32bit chunks */ 578 if (verboseflag) 579 printf("writing records\n"); 580 memcpy(swapped, &bootrec, sizeof(rs6000_boot_record_t)); 581 for (i=0; i < 128; i++) 582 swapped[i] = htonl(swapped[i]); 583 write(rs6000_fd, swapped, sizeof(rs6000_boot_record_t)); 584 memcpy(swapped, &confrec, sizeof(rs6000_config_record_t)); 585 for (i=0; i < 128; i++) 586 swapped[i] = htonl(swapped[i]); 587 write(rs6000_fd, swapped, sizeof(rs6000_config_record_t)); 588 589 free(kern_img); 590 close(kern_fd); 591 close(rs6000_fd); 592 close(elf_fd); 593 594 return 0; 595 } 596 597 static int 598 bebox_write_header(int bebox_fd, int elf_image_len, int kern_img_len) 599 { 600 int hsize = BEBOX_HEADER_SIZE; 601 unsigned long textOffset, dataOffset, ldrOffset; 602 unsigned long entry_vector[3]; 603 struct FileHeader fileHdr; 604 struct SectionHeader textHdr, dataHdr, ldrHdr; 605 struct LoaderHeader lh; 606 607 608 ldrOffset = ULALIGN(sizeof (fileHdr) + sizeof (textHdr) + 609 sizeof (dataHdr) + sizeof (ldrHdr)); 610 dataOffset = ULALIGN(ldrOffset + sizeof (lh)); 611 textOffset = ULALIGN(dataOffset + sizeof (entry_vector) + kern_img_len); 612 613 /* Create the File Header */ 614 memset(&fileHdr, 0, sizeof (fileHdr)); 615 fileHdr.magic = sa_htobe32(PEF_MAGIC); 616 fileHdr.fileTypeID = sa_htobe32(PEF_FILE); 617 fileHdr.archID = sa_htobe32(PEF_PPC); 618 fileHdr.versionNumber = sa_htobe32(1); 619 fileHdr.numSections = sa_htobe16(3); 620 fileHdr.loadableSections = sa_htobe16(2); 621 write(bebox_fd, &fileHdr, sizeof (fileHdr)); 622 623 /* Create the Section Header for TEXT */ 624 memset(&textHdr, 0, sizeof (textHdr)); 625 textHdr.sectionName = sa_htobe32(-1); 626 textHdr.sectionAddress = sa_htobe32(0); 627 textHdr.execSize = sa_htobe32(elf_image_len); 628 textHdr.initSize = sa_htobe32(elf_image_len); 629 textHdr.rawSize = sa_htobe32(elf_image_len); 630 textHdr.fileOffset = sa_htobe32(textOffset); 631 textHdr.regionKind = CodeSection; 632 textHdr.shareKind = ContextShare; 633 textHdr.alignment = 4; /* 16 byte alignment */ 634 write(bebox_fd, &textHdr, sizeof (textHdr)); 635 636 /* Create the Section Header for DATA */ 637 memset(&dataHdr, 0, sizeof (dataHdr)); 638 dataHdr.sectionName = sa_htobe32(-1); 639 dataHdr.sectionAddress = sa_htobe32(0); 640 dataHdr.execSize = sa_htobe32(sizeof (entry_vector) + kern_img_len); 641 dataHdr.initSize = sa_htobe32(sizeof (entry_vector) + kern_img_len); 642 dataHdr.rawSize = sa_htobe32(sizeof (entry_vector) + kern_img_len); 643 dataHdr.fileOffset = sa_htobe32(dataOffset); 644 dataHdr.regionKind = DataSection; 645 dataHdr.shareKind = ContextShare; 646 dataHdr.alignment = 4; /* 16 byte alignment */ 647 write(bebox_fd, &dataHdr, sizeof (dataHdr)); 648 649 /* Create the Section Header for loader stuff */ 650 memset(&ldrHdr, 0, sizeof (ldrHdr)); 651 ldrHdr.sectionName = sa_htobe32(-1); 652 ldrHdr.sectionAddress = sa_htobe32(0); 653 ldrHdr.execSize = sa_htobe32(sizeof (lh)); 654 ldrHdr.initSize = sa_htobe32(sizeof (lh)); 655 ldrHdr.rawSize = sa_htobe32(sizeof (lh)); 656 ldrHdr.fileOffset = sa_htobe32(ldrOffset); 657 ldrHdr.regionKind = LoaderSection; 658 ldrHdr.shareKind = GlobalShare; 659 ldrHdr.alignment = 4; /* 16 byte alignment */ 660 write(bebox_fd, &ldrHdr, sizeof (ldrHdr)); 661 662 /* Create the Loader Header */ 663 memset(&lh, 0, sizeof (lh)); 664 lh.entryPointSection = sa_htobe32(1); /* Data */ 665 lh.entryPointOffset = sa_htobe32(0); 666 lh.initPointSection = sa_htobe32(-1); 667 lh.initPointOffset = sa_htobe32(0); 668 lh.termPointSection = sa_htobe32(-1); 669 lh.termPointOffset = sa_htobe32(0); 670 lseek(bebox_fd, ldrOffset + hsize, SEEK_SET); 671 write(bebox_fd, &lh, sizeof (lh)); 672 673 /* Copy the pseudo-DATA */ 674 memset(entry_vector, 0, sizeof (entry_vector)); 675 entry_vector[0] = sa_htobe32(BEBOX_ENTRY); /* Magic */ 676 lseek(bebox_fd, dataOffset + hsize, SEEK_SET); 677 write(bebox_fd, entry_vector, sizeof (entry_vector)); 678 679 return textOffset; 680 } 681 682 static int 683 bebox_build_image(char *kernel, char *boot, char *rawdev, char *outname) 684 { 685 unsigned char *elf_img = NULL, *kern_img = NULL, *header_img = NULL; 686 int i, ch, tmp, kgzlen, err, hsize = BEBOX_HEADER_SIZE; 687 int elf_fd, bebox_fd, kern_fd, elf_img_len = 0; 688 off_t lenpos, kstart, kend, toff, endoff, flength; 689 uint32_t swapped[128]; 690 int32_t *offset; 691 gzFile gzf; 692 struct stat kern_stat; 693 struct bebox_image_block *p; 694 struct timeval tp; 695 Elf32_External_Phdr phdr; 696 697 elf_fd = open_file("bootloader", boot, &hdr, &elf_stat); 698 if (inkernflag) { 699 kern_fd = open_file("kernel", kernel, &khdr, &kern_stat); 700 kern_len = kern_stat.st_size + BEBOX_MAGICSIZE + KERNLENSIZE; 701 } else 702 kern_len = BEBOX_MAGICSIZE + KERNLENSIZE; 703 704 for (i = 0; i < ELFGET16(hdr.e_phnum); i++) { 705 lseek(elf_fd, ELFGET32(hdr.e_phoff) + sizeof(phdr) * i, 706 SEEK_SET); 707 if (read(elf_fd, &phdr, sizeof(phdr)) != sizeof(phdr)) 708 errx(3, "Can't read input '%s' phdr : %s", boot, 709 strerror(errno)); 710 711 if ((ELFGET32(phdr.p_type) != PT_LOAD) || 712 !(ELFGET32(phdr.p_flags) & PF_X)) 713 continue; 714 715 fstat(elf_fd, &elf_stat); 716 elf_img_len = ELFGET32(phdr.p_filesz); 717 lseek(elf_fd, ELFGET32(phdr.p_offset), SEEK_SET); 718 719 break; 720 } 721 if ((bebox_fd = open(outname, O_RDWR|O_TRUNC, 0)) < 0) { 722 /* we couldn't open it, it must be new */ 723 bebox_fd = creat(outname, 0644); 724 if (bebox_fd < 0) 725 errx(2, "Can't open output '%s': %s", outname, 726 strerror(errno)); 727 } 728 lseek(bebox_fd, hsize, SEEK_SET); 729 730 if (inkernflag) { 731 /* 732 * write the header with the wrong values to get the offset 733 * right 734 */ 735 bebox_write_header(bebox_fd, elf_img_len, kern_stat.st_size); 736 737 /* Copy kernel */ 738 kern_img = malloc(kern_stat.st_size); 739 740 if (kern_img == NULL) 741 errx(3, "Can't malloc: %s", strerror(errno)); 742 743 /* we need to jump back after having read the headers */ 744 lseek(kern_fd, 0, SEEK_SET); 745 if (read(kern_fd, (void *)kern_img, kern_stat.st_size) != 746 kern_stat.st_size) 747 errx(3, "Can't read kernel '%s' : %s", 748 kernel, strerror(errno)); 749 750 gzf = gzdopen(dup(bebox_fd), "a"); 751 if (gzf == NULL) 752 errx(3, "Can't init compression: %s", strerror(errno)); 753 if (gzsetparams(gzf, Z_BEST_COMPRESSION, Z_DEFAULT_STRATEGY) != 754 Z_OK) 755 errx(3, "%s", gzerror(gzf, &err)); 756 } else 757 bebox_write_header(bebox_fd, elf_img_len, 0); 758 759 /* write a magic number and size before the kernel */ 760 write(bebox_fd, (void *)bebox_magic, BEBOX_MAGICSIZE); 761 lenpos = lseek(bebox_fd, 0, SEEK_CUR); 762 tmp = sa_htobe32(0); 763 write(bebox_fd, (void *)&tmp, KERNLENSIZE); 764 765 if (inkernflag) { 766 /* write in the compressed kernel */ 767 kstart = lseek(bebox_fd, 0, SEEK_CUR); 768 kgzlen = gzwrite(gzf, kern_img, kern_stat.st_size); 769 gzclose(gzf); 770 kend = lseek(bebox_fd, 0, SEEK_CUR); 771 free(kern_img); 772 } else { 773 kstart = kend = lseek(bebox_fd, 0, SEEK_CUR); 774 kgzlen = 0; 775 } 776 777 /* jump back to the length position now that we know the length */ 778 lseek(bebox_fd, lenpos, SEEK_SET); 779 kgzlen = kend - kstart; 780 tmp = sa_htobe32(kgzlen); 781 write(bebox_fd, (void *)&tmp, KERNLENSIZE); 782 783 /* now rewrite the header correctly */ 784 lseek(bebox_fd, hsize, SEEK_SET); 785 tmp = kgzlen + BEBOX_MAGICSIZE + KERNLENSIZE; 786 toff = bebox_write_header(bebox_fd, elf_img_len, tmp); 787 788 /* Copy boot image */ 789 elf_img = malloc(elf_img_len); 790 if (!elf_img) 791 errx(3, "Can't malloc: %s", strerror(errno)); 792 if (read(elf_fd, elf_img, elf_img_len) != elf_img_len) 793 errx(3, "Can't read file '%s' : %s", boot, strerror(errno)); 794 lseek(bebox_fd, toff + hsize, SEEK_SET); 795 write(bebox_fd, elf_img, elf_img_len); 796 free(elf_img); 797 798 if (inkernflag) 799 close(kern_fd); 800 close(elf_fd); 801 802 /* Now go back and write in the block header */ 803 endoff = lseek(bebox_fd, 0, SEEK_END); 804 lseek(bebox_fd, 0, SEEK_SET); 805 header_img = malloc(BEBOX_HEADER_SIZE); 806 if (!header_img) 807 errx(3, "Can't malloc: %s", strerror(errno)); 808 memset(header_img, 0, BEBOX_HEADER_SIZE); 809 810 /* copy the boot image into the buffer */ 811 for (p = bebox_image_block; p->offset != -1; p++) 812 memcpy(header_img + p->offset, p->data, p->size); 813 814 /* fill used block bitmap */ 815 memset(header_img + BEBOX_FILE_BLOCK_MAP_START, 0xff, 816 BEBOX_FILE_BLOCK_MAP_END - BEBOX_FILE_BLOCK_MAP_START); 817 818 /* fix the file size in the header */ 819 tmp = endoff - BEBOX_HEADER_SIZE; 820 *(int32_t *)(header_img + BEBOX_FILE_SIZE_OFFSET) = 821 (int32_t)sa_htobe32(tmp); 822 *(int32_t *)(header_img + BEBOX_FILE_SIZE_ALIGN_OFFSET) = 823 (int32_t)sa_htobe32(roundup(tmp, BEBOX_FILE_BLOCK_SIZE)); 824 825 gettimeofday(&tp, 0); 826 for (offset = bebox_mtime_offset; *offset != -1; offset++) 827 *(int32_t *)(header_img + *offset) = 828 (int32_t)sa_htobe32(tp.tv_sec); 829 830 write(bebox_fd, header_img, BEBOX_HEADER_SIZE); 831 832 /* now pad the end */ 833 flength = roundup(endoff, BEBOX_BLOCK_SIZE); 834 /* refill the header_img with zeros */ 835 memset(header_img, 0, BEBOX_BLOCK_SIZE * 2); 836 lseek(bebox_fd, 0, SEEK_END); 837 write(bebox_fd, header_img, flength - endoff); 838 839 close(bebox_fd); 840 free(header_img); 841 842 return 0; 843 } 844 845 int 846 main(int argc, char **argv) 847 { 848 int ch, lfloppyflag=0; 849 char *kernel = NULL, *boot = NULL, *rawdev = NULL, *outname = NULL; 850 char *march = NULL; 851 #ifdef USE_SYSCTL 852 char machine[SYS_NMLN]; 853 int mib[2] = { CTL_HW, HW_MACHINE }; 854 #endif 855 856 setprogname(argv[0]); 857 kern_len = 0; 858 859 while ((ch = getopt(argc, argv, "b:Ik:lm:r:sv")) != -1) 860 switch (ch) { 861 case 'b': 862 boot = optarg; 863 break; 864 case 'I': 865 inkernflag = 0; 866 break; 867 case 'k': 868 kernel = optarg; 869 inkernflag = 1; 870 break; 871 case 'l': 872 lfloppyflag = 1; 873 break; 874 case 'm': 875 march = optarg; 876 break; 877 case 'r': 878 rawdev = optarg; 879 break; 880 case 's': 881 saloneflag = 1; 882 break; 883 case 'v': 884 verboseflag = 1; 885 break; 886 case '?': 887 default: 888 usage(0); 889 /* NOTREACHED */ 890 } 891 argc -= optind; 892 argv += optind; 893 894 if (argc < 1) 895 usage(0); 896 897 if (kernel == NULL && inkernflag) 898 kernel = "/netbsd"; 899 900 if (boot == NULL) 901 boot = "/usr/mdec/boot"; 902 903 if (march != NULL && strcmp(march, "") == 0) 904 march = NULL; 905 if (march == NULL) { 906 int i; 907 #ifdef USE_SYSCTL 908 size_t len = sizeof(machine); 909 910 if (sysctl(mib, sizeof (mib) / sizeof (mib[0]), machine, 911 &len, NULL, 0) != -1) { 912 for (i=0; sup_plats[i] != NULL; i++) { 913 if (strcmp(sup_plats[i], machine) == 0) { 914 march = strdup(sup_plats[i]); 915 break; 916 } 917 } 918 } 919 if (march == NULL) 920 #endif 921 usage(1); 922 } 923 924 outname = argv[0]; 925 926 if (strcmp(march, "prep") == 0) 927 return(prep_build_image(kernel, boot, rawdev, outname)); 928 if (strcmp(march, "rs6000") == 0) 929 return(rs6000_build_image(kernel, boot, rawdev, outname)); 930 if (strcmp(march, "bebox") == 0) 931 return(bebox_build_image(kernel, boot, rawdev, outname)); 932 933 usage(1); 934 return(0); 935 } 936