NetBSD/sys/arch/sun3/stand
pk c2b3e6490b Assign my copyrights to TNF. 1998-09-05 15:28:07 +00:00
..
bootxx Assign my copyrights to TNF. 1998-09-05 15:28:06 +00:00
installboot Assign my copyrights to TNF. 1998-09-05 15:28:07 +00:00
libsa Assign my copyrights to TNF. 1998-09-05 15:28:07 +00:00
netboot Use the shared ../libsa/xxboot.c 1998-07-01 22:56:45 +00:00
tapeboot Assign my copyrights to TNF. 1998-09-05 15:28:07 +00:00
ufsboot Use the shared ../libsa/xxboot.c 1998-07-01 22:56:45 +00:00
Makefile Add tapeboot, make ${SA_PROG}.bin padded to a block boundary. 1995-10-13 21:44:08 +00:00
Makefile.inc Reimplement the header strip using two instances of dd in a pipe, 1998-06-29 20:09:14 +00:00
README just cleanup 1995-11-17 23:23:44 +00:00

README

/*	$NetBSD: README,v 1.3 1995/11/17 23:23:45 gwr Exp $ */

The sun bootblocks are split into two parts: a small 1st-level program that
gets written right after the superblock in a partition (and is hence limited
in size to SBSIZE - DEV_BSIZE bytes), and a 2nd-level program that resides
in the filesystem proper.

The 1st-level program is loaded into memory by the PROM. It loads the second
stage program from a set of filesystem block numbers that are hard-coded
into it by the `installboot' program. The prototype code for the 1st-level
bootblocks are in `bootxx'.

The 2nd-level program (`ufsboot') is normally installed in the root FS
as `/ufsboot'. It uses the device drivers in the PROM and the stand-alone
filesystem code in `libsa.a' to locate and load the kernel.

Use the following command to install the 1st-level bootblocks in the
root filesystem (on `sd0a') using the file `/boot' as the second level
boot program:

	mount /dev/sd0a /mnt
	cd /usr/mdec
	cp -p ufsboot /mnt/ufsboot
	sync ; sleep 1 ; sync
	./installboot -v /mnt/ufsboot bootxx /dev/rsd0a

The above only works with securelevel <= 0 (see init.8 manual).

Status:

netboot works.

bootxx, installboot are tested and working.  It would be nice if
installboot would find the inumber for the 2nd stage boot program
without having the filesystem mounted so this command can work
with securelevel==1 (the default).  Doing this requies adding
code to read and do a directory lookup in the root...