575 lines
14 KiB
C
575 lines
14 KiB
C
/* $NetBSD: boot.c,v 1.4 1998/08/23 02:48:28 eeh Exp $ */
|
|
|
|
/*
|
|
* Copyright (c) 1997 Jason R. Thorpe. All rights reserved.
|
|
* Copyright (C) 1995, 1996 Wolfgang Solfrank.
|
|
* Copyright (C) 1995, 1996 TooLs GmbH.
|
|
* All rights reserved.
|
|
*
|
|
* ELF support derived from NetBSD/alpha's boot loader, written
|
|
* by Christopher G. Demetriou.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by TooLs GmbH.
|
|
* 4. The name of TooLs GmbH may not be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY TOOLS GMBH ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL TOOLS GMBH BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
|
|
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
|
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
|
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
/*
|
|
* First try for the boot code
|
|
*
|
|
* Input syntax is:
|
|
* [promdev[{:|,}partition]]/[filename] [flags]
|
|
*/
|
|
|
|
#ifdef ELFSIZE
|
|
#undef ELFSIZE /* We use both. */
|
|
#endif
|
|
|
|
#include <lib/libsa/stand.h>
|
|
#include <lib/libkern/libkern.h>
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/exec.h>
|
|
#include <sys/exec_elf.h>
|
|
#include <sys/reboot.h>
|
|
#include <sys/disklabel.h>
|
|
|
|
#include <machine/cpu.h>
|
|
|
|
#include <sparc64/stand/ofwboot/ofdev.h>
|
|
#include <sparc64/stand/ofwboot/openfirm.h>
|
|
|
|
const char kernelname[] = "netbsd";
|
|
char bootdev[128];
|
|
char bootfile[128];
|
|
int boothowto;
|
|
int debug;
|
|
|
|
|
|
#ifdef SPARC_BOOT_ELF
|
|
int elf32_exec __P((int, Elf32_Ehdr *, u_int64_t *, void **, void **));
|
|
int elf64_exec __P((int, Elf64_Ehdr *, u_int64_t *, void **, void **));
|
|
#endif
|
|
|
|
#ifdef SPARC_BOOT_AOUT
|
|
int aout_exec __P((int, struct exec *, u_int64_t *, void **));
|
|
#endif
|
|
|
|
static void
|
|
prom2boot(dev)
|
|
char *dev;
|
|
{
|
|
char *cp, *lp = 0;
|
|
int handle;
|
|
char devtype[16];
|
|
|
|
for (cp = dev; *cp; cp++)
|
|
if (*cp == ':')
|
|
lp = cp;
|
|
if (!lp)
|
|
lp = cp;
|
|
*lp = 0;
|
|
}
|
|
|
|
static void
|
|
parseargs(str, howtop)
|
|
char *str;
|
|
int *howtop;
|
|
{
|
|
char *cp;
|
|
int i;
|
|
|
|
/* Allow user to drop back to the PROM. */
|
|
if (strcmp(str, "exit") == 0)
|
|
_rtt();
|
|
|
|
/* Insert the kernel name if it is not there. */
|
|
if (str[0] == 0 || str[0] == '-') {
|
|
/* Move args down the string */
|
|
for (cp = str + strlen(kernelname); str[i]; i++)
|
|
cp[i] = str[i];
|
|
/* Copy over kernelname */
|
|
for (i=0; kernelname[i]; i++)
|
|
str[i] = kernelname[i];
|
|
}
|
|
*howtop = 0;
|
|
for (cp = str; *cp; cp++)
|
|
if (*cp == ' ' || *cp == '-')
|
|
break;
|
|
if (!*cp)
|
|
return;
|
|
|
|
*cp++ = 0;
|
|
while (*cp) {
|
|
switch (*cp++) {
|
|
case 'a':
|
|
*howtop |= RB_ASKNAME;
|
|
break;
|
|
case 's':
|
|
*howtop |= RB_SINGLE;
|
|
break;
|
|
case 'd':
|
|
*howtop |= RB_KDB;
|
|
debug = 1;
|
|
break;
|
|
case 'v':
|
|
debug = 1;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
static void
|
|
chain(pentry, args, ssym, esym)
|
|
u_int64_t pentry;
|
|
char *args;
|
|
void *ssym;
|
|
void *esym;
|
|
{
|
|
extern char end[];
|
|
void (*entry)();
|
|
int l, machine_tag;
|
|
long newargs[3];
|
|
|
|
entry = (void*)pentry;
|
|
|
|
freeall();
|
|
/*
|
|
* When we come in args consists of a pointer to the boot
|
|
* string. We need to fix it so it takes into account
|
|
* other params such as romp.
|
|
*/
|
|
|
|
/*
|
|
* Stash pointer to end of symbol table after the argument
|
|
* strings.
|
|
*/
|
|
l = strlen(args) + 1;
|
|
bcopy(&esym, args + l, sizeof(esym));
|
|
l += sizeof(esym);
|
|
|
|
/*
|
|
* Tell the kernel we're an OpenFirmware system.
|
|
*/
|
|
#define SPARC_MACHINE_OPENFIRMWARE 0x44444230
|
|
machine_tag = SPARC_MACHINE_OPENFIRMWARE;
|
|
bcopy(&machine_tag, args + l, sizeof(machine_tag));
|
|
l += sizeof(machine_tag);
|
|
|
|
/*
|
|
* Since we don't need the boot string (we can get it from /chosen)
|
|
* we won't pass it in. Just pass in esym and magic #
|
|
*/
|
|
newargs[0] = SPARC_MACHINE_OPENFIRMWARE;
|
|
newargs[1] = (long)esym;
|
|
newargs[2] = (long)ssym;
|
|
args = (char *)newargs;
|
|
l = sizeof(newargs);
|
|
|
|
#ifdef DEBUG
|
|
printf("chain: calling OF_chain(%x, %x, %x, %x, %x)\n",
|
|
(void *)RELOC, end - (char *)RELOC, entry, args, l);
|
|
#endif
|
|
OF_chain((void *)RELOC, ((end - (char *)RELOC)+NBPG)%NBPG, entry, args, l);
|
|
panic("chain");
|
|
}
|
|
|
|
int
|
|
loadfile(fd, args)
|
|
int fd;
|
|
char *args;
|
|
{
|
|
union {
|
|
#ifdef SPARC_BOOT_AOUT
|
|
struct exec aout;
|
|
#endif
|
|
#ifdef SPARC_BOOT_ELF
|
|
Elf32_Ehdr elf32;
|
|
Elf64_Ehdr elf64;
|
|
#endif
|
|
} hdr;
|
|
int rval;
|
|
u_int64_t entry;
|
|
void *ssym;
|
|
void *esym;
|
|
|
|
rval = 1;
|
|
ssym = NULL;
|
|
esym = NULL;
|
|
|
|
/* Load the header. */
|
|
#ifdef NOTDEF_DEBUG
|
|
printf("loadfile: reading header\n");
|
|
#endif
|
|
if (read(fd, &hdr, sizeof(hdr)) != sizeof(hdr)) {
|
|
printf("read header: %s\n", strerror(errno));
|
|
goto err;
|
|
}
|
|
|
|
/* Determine file type, load kernel. */
|
|
#ifdef SPARC_BOOT_AOUT
|
|
if (N_BADMAG(hdr.aout) == 0 && N_GETMID(hdr.aout) == MID_SPARC) {
|
|
rval = aout_exec(fd, &hdr.aout, &entry, &esym);
|
|
} else
|
|
#endif
|
|
#ifdef SPARC_BOOT_ELF
|
|
if (bcmp(Elf32_e_ident, hdr.elf32.e_ident, Elf32_e_siz) == 0) {
|
|
rval = elf32_exec(fd, &hdr.elf32, &entry, &ssym, &esym);
|
|
} else
|
|
if (bcmp(Elf64_e_ident, hdr.elf64.e_ident, Elf64_e_siz) == 0) {
|
|
rval = elf64_exec(fd, &hdr.elf64, &entry, &ssym, &esym);
|
|
} else
|
|
#endif
|
|
{
|
|
printf("unknown executable format\n");
|
|
}
|
|
|
|
if (rval)
|
|
goto err;
|
|
|
|
printf(" start=0x%lx\n", (unsigned long)entry);
|
|
|
|
close(fd);
|
|
|
|
/* XXX this should be replaced w/ a mountroothook. */
|
|
if (floppyboot) {
|
|
printf("Please insert root disk and press ENTER ");
|
|
getchar();
|
|
printf("\n");
|
|
}
|
|
|
|
chain(entry, args, ssym, esym);
|
|
/* NOTREACHED */
|
|
|
|
err:
|
|
close(fd);
|
|
return (rval);
|
|
}
|
|
|
|
#ifdef SPARC_BOOT_AOUT
|
|
int
|
|
aout_exec(fd, hdr, entryp, esymp)
|
|
int fd;
|
|
struct exec *hdr;
|
|
u_int64_t *entryp;
|
|
void **esymp;
|
|
{
|
|
void *addr;
|
|
int n, *paddr;
|
|
|
|
#ifdef DEBUG
|
|
printf("auout_exec: ");
|
|
#endif
|
|
/* Display the load address (entry point) for a.out. */
|
|
printf("Booting %s @ 0x%lx\n", opened_name, hdr->a_entry);
|
|
addr = (void *)(hdr->a_entry);
|
|
|
|
/*
|
|
* Determine memory needed for kernel and allocate it from
|
|
* the firmware.
|
|
*/
|
|
n = hdr->a_text + hdr->a_data + hdr->a_bss + hdr->a_syms + sizeof(int);
|
|
if ((paddr = OF_claim(addr, n, 0)) == (int *)-1)
|
|
panic("cannot claim memory");
|
|
|
|
/* Load text. */
|
|
lseek(fd, N_TXTOFF(*hdr), SEEK_SET);
|
|
printf("%lu", hdr->a_text);
|
|
if (read(fd, paddr, hdr->a_text) != hdr->a_text) {
|
|
printf("read text: %s\n", strerror(errno));
|
|
return (1);
|
|
}
|
|
syncicache((void *)paddr, hdr->a_text);
|
|
|
|
/* Load data. */
|
|
printf("+%lu", hdr->a_data);
|
|
if (read(fd, (void *)paddr + hdr->a_text, hdr->a_data) != hdr->a_data) {
|
|
printf("read data: %s\n", strerror(errno));
|
|
return (1);
|
|
}
|
|
|
|
/* Zero BSS. */
|
|
printf("+%lu", hdr->a_bss);
|
|
bzero((void *)paddr + hdr->a_text + hdr->a_data, hdr->a_bss);
|
|
|
|
/* Symbols. */
|
|
*esymp = paddr;
|
|
paddr = (int *)((void *)paddr + hdr->a_text + hdr->a_data + hdr->a_bss);
|
|
*paddr++ = hdr->a_syms;
|
|
if (hdr->a_syms) {
|
|
printf(" [%lu", hdr->a_syms);
|
|
if (read(fd, paddr, hdr->a_syms) != hdr->a_syms) {
|
|
printf("read symbols: %s\n", strerror(errno));
|
|
return (1);
|
|
}
|
|
paddr = (int *)((void *)paddr + hdr->a_syms);
|
|
if (read(fd, &n, sizeof(int)) != sizeof(int)) {
|
|
printf("read symbols: %s\n", strerror(errno));
|
|
return (1);
|
|
}
|
|
if (OF_claim((void *)paddr, n + sizeof(int), 0) == (void *)-1)
|
|
panic("cannot claim memory");
|
|
*paddr++ = n;
|
|
if (read(fd, paddr, n - sizeof(int)) != n - sizeof(int)) {
|
|
printf("read symbols: %s\n", strerror(errno));
|
|
return (1);
|
|
}
|
|
printf("+%d]", n - sizeof(int));
|
|
*esymp = paddr + (n - sizeof(int));
|
|
}
|
|
|
|
*entryp = hdr->a_entry;
|
|
return (0);
|
|
}
|
|
#endif /* SPARC_BOOT_AOUT */
|
|
|
|
#ifdef SPARC_BOOT_ELF
|
|
#if 1
|
|
/* New style */
|
|
|
|
#ifdef ELFSIZE
|
|
#undef ELFSIZE
|
|
#endif
|
|
|
|
#define ELFSIZE 32
|
|
#include "elfXX_exec.c"
|
|
|
|
#undef ELFSIZE
|
|
#define ELFSIZE 64
|
|
#include "elfXX_exec.c"
|
|
|
|
#else
|
|
/* Old style */
|
|
int
|
|
elf32_exec(fd, elf, entryp, ssymp, esymp)
|
|
int fd;
|
|
Elf32_Ehdr *elf;
|
|
u_int64_t *entryp;
|
|
void **ssymp;
|
|
void **esymp;
|
|
{
|
|
Elf32_Shdr *shp;
|
|
Elf32_Off off;
|
|
void *addr;
|
|
size_t size;
|
|
int i, first = 1;
|
|
int n;
|
|
|
|
/*
|
|
* Don't display load address for ELF; it's encoded in
|
|
* each section.
|
|
*/
|
|
#ifdef DEBUG
|
|
printf("elf_exec: ");
|
|
#endif
|
|
printf("Booting %s\n", opened_name);
|
|
|
|
for (i = 0; i < elf->e_phnum; i++) {
|
|
Elf32_Phdr phdr;
|
|
(void)lseek(fd, elf->e_phoff + sizeof(phdr) * i, SEEK_SET);
|
|
if (read(fd, (void *)&phdr, sizeof(phdr)) != sizeof(phdr)) {
|
|
printf("read phdr: %s\n", strerror(errno));
|
|
return (1);
|
|
}
|
|
if (phdr.p_type != Elf_pt_load ||
|
|
(phdr.p_flags & (Elf_pf_w|Elf_pf_x)) == 0)
|
|
continue;
|
|
|
|
/* Read in segment. */
|
|
printf("%s%lu@0x%lx", first ? "" : "+", phdr.p_filesz,
|
|
(u_long)phdr.p_vaddr);
|
|
(void)lseek(fd, phdr.p_offset, SEEK_SET);
|
|
/* NB need to do 4MB allocs here */
|
|
if (OF_claim((void *)phdr.p_vaddr, phdr.p_memsz, phdr.p_align) ==
|
|
(void *)-1)
|
|
panic("cannot claim memory");
|
|
if (read(fd, (void *)phdr.p_vaddr, phdr.p_filesz) !=
|
|
phdr.p_filesz) {
|
|
printf("read segment: %s\n", strerror(errno));
|
|
return (1);
|
|
}
|
|
syncicache((void *)phdr.p_vaddr, phdr.p_filesz);
|
|
|
|
/* Zero BSS. */
|
|
if (phdr.p_filesz < phdr.p_memsz) {
|
|
printf("+%lu@0x%lx", phdr.p_memsz - phdr.p_filesz,
|
|
(u_long)(phdr.p_vaddr + phdr.p_filesz));
|
|
bzero((void*)phdr.p_vaddr + phdr.p_filesz,
|
|
phdr.p_memsz - phdr.p_filesz);
|
|
}
|
|
first = 0;
|
|
}
|
|
|
|
printf(" \n");
|
|
|
|
#if 1 /* I want to rethink this... --thorpej@netbsd.org */
|
|
/*
|
|
* Compute the size of the symbol table.
|
|
*/
|
|
size = sizeof(Elf32_Ehdr) + (elf->e_shnum * sizeof(Elf32_Shdr));
|
|
shp = addr = alloc(elf->e_shnum * sizeof(Elf32_Shdr));
|
|
(void)lseek(fd, elf->e_shoff, SEEK_SET);
|
|
if (read(fd, addr, elf->e_shnum * sizeof(Elf32_Shdr)) !=
|
|
elf->e_shnum * sizeof(Elf32_Shdr)) {
|
|
printf("read section headers: %s\n", strerror(errno));
|
|
return (1);
|
|
}
|
|
for (i = 0; i < elf->e_shnum; i++, shp++) {
|
|
if (shp->sh_type == Elf_sht_null)
|
|
continue;
|
|
if (shp->sh_type != Elf_sht_symtab
|
|
&& shp->sh_type != Elf_sht_strtab) {
|
|
shp->sh_offset = 0;
|
|
shp->sh_type = Elf_sht_nobits;
|
|
continue;
|
|
}
|
|
size += shp->sh_size;
|
|
}
|
|
shp = addr;
|
|
|
|
/*
|
|
* Reserve memory for the symbols.
|
|
*/
|
|
if ((addr = OF_claim(0, size, NBPG)) == (void *)-1)
|
|
panic("no space for symbol table");
|
|
|
|
/*
|
|
* Copy the headers.
|
|
*/
|
|
elf->e_phoff = 0;
|
|
elf->e_shoff = sizeof(Elf32_Ehdr);
|
|
elf->e_phentsize = 0;
|
|
elf->e_phnum = 0;
|
|
bcopy(elf, addr, sizeof(Elf32_Ehdr));
|
|
bcopy(shp, addr + sizeof(Elf32_Ehdr), elf->e_shnum * sizeof(Elf32_Shdr));
|
|
free(shp, elf->e_shnum * sizeof(Elf32_Shdr));
|
|
*ssymp = addr;
|
|
|
|
/*
|
|
* Now load the symbol sections themselves.
|
|
*/
|
|
shp = addr + sizeof(Elf32_Ehdr);
|
|
addr += sizeof(Elf32_Ehdr) + (elf->e_shnum * sizeof(Elf32_Shdr));
|
|
off = sizeof(Elf32_Ehdr) + (elf->e_shnum * sizeof(Elf32_Shdr));
|
|
for (first = 1, i = 0; i < elf->e_shnum; i++, shp++) {
|
|
if (shp->sh_type == Elf_sht_symtab
|
|
|| shp->sh_type == Elf_sht_strtab) {
|
|
if (first)
|
|
printf("symbols @ 0x%lx ", (u_long)addr);
|
|
printf("%s%d", first ? "" : "+", shp->sh_size);
|
|
(void)lseek(fd, shp->sh_offset, SEEK_SET);
|
|
if (read(fd, addr, shp->sh_size) != shp->sh_size) {
|
|
printf("read symbols: %s\n", strerror(errno));
|
|
return (1);
|
|
}
|
|
addr += (shp->sh_size+3)&(~3);
|
|
shp->sh_offset = off;
|
|
off += (shp->sh_size+3)&(~3);
|
|
first = 0;
|
|
}
|
|
}
|
|
*esymp = addr;
|
|
#endif /* 0 */
|
|
|
|
*entryp = elf->e_entry;
|
|
return (0);
|
|
}
|
|
#endif
|
|
#endif /* SPARC_BOOT_ELF */
|
|
|
|
void
|
|
main()
|
|
{
|
|
extern char bootprog_name[], bootprog_rev[],
|
|
bootprog_maker[], bootprog_date[];
|
|
int chosen;
|
|
char bootline[512]; /* Should check size? */
|
|
char *cp;
|
|
int fd;
|
|
|
|
printf(">> %s, Revision %s\n", bootprog_name, bootprog_rev);
|
|
printf(">> (%s, %s)\n", bootprog_maker, bootprog_date);
|
|
|
|
/*
|
|
* Get the boot arguments from Openfirmware
|
|
*/
|
|
if ((chosen = OF_finddevice("/chosen")) == -1
|
|
|| OF_getprop(chosen, "bootpath", bootdev, sizeof bootdev) < 0
|
|
|| OF_getprop(chosen, "bootargs", bootline, sizeof bootline) < 0) {
|
|
printf("Invalid Openfirmware environment\n");
|
|
exit();
|
|
}
|
|
prom2boot(bootdev);
|
|
parseargs(bootline, &boothowto);
|
|
for (;;) {
|
|
if (boothowto & RB_ASKNAME) {
|
|
printf("Boot: ");
|
|
gets(bootline);
|
|
printf("You said %s\n", bootline);
|
|
parseargs(bootline, &boothowto);
|
|
printf("parseargs says you said %s\n", bootline);
|
|
}
|
|
if ((fd = open(bootline, 0)) >= 0)
|
|
break;
|
|
if (errno)
|
|
printf("open %s: %s\n", opened_name, strerror(errno));
|
|
boothowto |= RB_ASKNAME;
|
|
}
|
|
#ifdef __notyet__
|
|
OF_setprop(chosen, "bootpath", opened_name, strlen(opened_name) + 1);
|
|
cp = bootline;
|
|
#else
|
|
strcpy(bootline, opened_name);
|
|
cp = bootline + strlen(bootline);
|
|
*cp++ = ' ';
|
|
#endif
|
|
*cp = '-';
|
|
if (boothowto & RB_ASKNAME)
|
|
*++cp = 'a';
|
|
if (boothowto & RB_SINGLE)
|
|
*++cp = 's';
|
|
if (boothowto & RB_KDB)
|
|
*++cp = 'd';
|
|
if (*cp == '-')
|
|
#ifdef __notyet__
|
|
*cp = 0;
|
|
#else
|
|
*--cp = 0;
|
|
#endif
|
|
else
|
|
*++cp = 0;
|
|
#ifdef __notyet__
|
|
OF_setprop(chosen, "bootargs", bootline, strlen(bootline) + 1);
|
|
#endif
|
|
/* XXX void, for now */
|
|
#ifdef DEBUG
|
|
if (debug)
|
|
printf("main: Calling loadfile(fd, %s)\n", bootline);
|
|
#endif
|
|
(void)loadfile(fd, bootline);
|
|
|
|
_rtt();
|
|
}
|