NetBSD/sys/arch/sun3/stand
gwr 3c996d6b06 ufs ==> ffs 1995-11-07 23:01:40 +00:00
..
bootxx Change the interface to prom_iopen() slightly, for tapeboot. 1995-10-13 21:44:57 +00:00
installboot ufs ==> ffs 1995-11-07 23:01:40 +00:00
libsa Get rid of an extra twiddle() call (ufs.c does it.) 1995-10-17 23:07:19 +00:00
netboot Bump version number. 1995-10-13 21:33:09 +00:00
tapeboot Re-write of tapeboot, using a "rawfs" abstraction to hide the fact 1995-10-17 22:58:10 +00:00
ufsboot Bump version number. 1995-10-13 21:33:09 +00:00
Makefile Add tapeboot, make ${SA_PROG}.bin padded to a block boundary. 1995-10-13 21:44:08 +00:00
Makefile.inc Add tapeboot, make ${SA_PROG}.bin padded to a block boundary. 1995-10-13 21:44:08 +00:00
README Fix up DVMA-related confusion. Disk boot now works. 1995-08-12 18:38:30 +00:00

README

/*	$NetBSD: README,v 1.2 1995/08/12 18:38:30 gwr Exp $ */

The sun bootblocks are split into two parts: a small 1st-level program that
gets written right after the superblock in a partition (and is hence limited
in size to SBSIZE - DEV_BSIZE bytes), and a 2nd-level program that resides
in the filesystem proper.

The 1st-level program is loaded into memory by the PROM. It loads the second
stage program from a set of filesystem block numbers that are hard-coded
into it by the `installboot' program. The prototype code for the 1st-level
bootblocks are in `bootxx'.

The 2nd-level program (`ufsboot') is normally installed in the root FS
as `/ufsboot'. It uses the device drivers in the PROM and the stand-alone
filesystem code in `libsa.a' to locate and load the kernel.

Use the following command to install the 1st-level bootblocks in the
root filesystem (on `sd0a') using the file `/boot' as the second level
boot program:

	mount /dev/sd0a /mnt
	installboot /mnt/ufsboot bootxx /dev/rsd0a

The above only works with securelevel <= 0 (see init.8 manual).

Status:

netboot works.

bootxx, installboot are tested and working.  It would be nice if
installboot would find the inumber for the 2nd stage boot program
without having the filesystem mounted so this command can work
with securelevel==1 (the default).  Doing this requies adding
code to read and do a directory lookup in the root...