NetBSD/sys/arch/sun3x/stand
drochner bdb232d2b6 Don't use <lib/libsa/if_ether.h> anymore. This was a copy of the
old (before ARP changes) <netinet/if_ether.h>, intended for
temporary use.
1997-07-22 17:41:01 +00:00
..
bootxx
installboot move man pages into share/man. 1997-06-22 06:40:25 +00:00
libsa Don't use <lib/libsa/if_ether.h> anymore. This was a copy of the 1997-07-22 17:41:01 +00:00
netboot Sync with sun3 (no longer need -DSUN_BOOTPARAMS) 1997-03-24 17:55:40 +00:00
tapeboot
ufsboot
Makefile
Makefile.inc Back-out the CWD hack... 1997-04-01 23:11:28 +00:00
README Document that tapeboot has been tested and works. 1997-05-26 03:44:42 +00:00

README

/*	$NetBSD: README,v 1.3 1997/05/26 03:44:42 jeremy Exp $ */

The sun bootblocks are split into two parts: a small 1st-level program that
gets written right after the superblock in a partition (and is hence limited
in size to SBSIZE - DEV_BSIZE bytes), and a 2nd-level program that resides
in the filesystem proper.

The 1st-level program is loaded into memory by the PROM. It loads the second
stage program from a set of filesystem block numbers that are hard-coded
into it by the `installboot' program. The prototype code for the 1st-level
bootblocks are in `bootxx'.

The 2nd-level program (`ufsboot') is normally installed in the root FS
as `/ufsboot'. It uses the device drivers in the PROM and the stand-alone
filesystem code in `libsa.a' to locate and load the kernel.

Use the following command to install the 1st-level bootblocks in the
root filesystem (on `sd0a') using the file `/boot' as the second level
boot program:

	mount /dev/sd0a /mnt
	cd /usr/mdec
	cp -p ufsboot /mnt/ufsboot
	sync ; sleep 1 ; sync
	./installboot -v /mnt/ufsboot bootxx /dev/rsd0a

The above only works with securelevel <= 0 (see init.8 manual).

Status:

netboot works. (3/13/1997)
ufsboot works. (3/13/1997)
tapeboot works. (5/23/1997)

bootxx, installboot are tested and working.  It would be nice if
installboot would find the inumber for the 2nd stage boot program
without having the filesystem mounted so this command can work
with securelevel==1 (the default).  Doing this requies adding
code to read and do a directory lookup in the root...