833 lines
21 KiB
C
833 lines
21 KiB
C
/* installboot 3.0 - Make a device bootable Author: Kees J. Bot
|
|
* 21 Dec 1991
|
|
*
|
|
* Either make a device bootable or make an image from kernel, mm, fs, etc.
|
|
*/
|
|
#define _POSIX_SOURCE 1
|
|
#define _MINIX 1
|
|
#include <stdio.h>
|
|
#include <stddef.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/ioctl.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <dirent.h>
|
|
#include <a.out.h>
|
|
#include <minix/config.h>
|
|
#include <minix/const.h>
|
|
#include <minix/partition.h>
|
|
#include <minix/u64.h>
|
|
#include "rawfs.h"
|
|
#include "image.h"
|
|
|
|
#define BOOTBLOCK 0 /* Of course */
|
|
#define SECTOR_SIZE 512 /* Disk sector size. */
|
|
#define RATIO(b) ((b)/SECTOR_SIZE)
|
|
#define SIGNATURE 0xAA55 /* Boot block signature. */
|
|
#define BOOT_MAX 64 /* Absolute maximum size of secondary boot */
|
|
#define SIGPOS 510 /* Where to put signature word. */
|
|
#define PARTPOS 446 /* Offset to the partition table in a master
|
|
* boot block.
|
|
*/
|
|
|
|
#define between(a, c, z) ((unsigned) ((c) - (a)) <= ((z) - (a)))
|
|
#define control(c) between('\0', (c), '\37')
|
|
|
|
#define BOOT_BLOCK_SIZE 1024
|
|
|
|
static void report(const char *label)
|
|
/* installboot: label: No such file or directory */
|
|
{
|
|
fprintf(stderr, "installboot: %s: %s\n", label, strerror(errno));
|
|
}
|
|
|
|
static void fatal(const char *label)
|
|
{
|
|
report(label);
|
|
exit(1);
|
|
}
|
|
|
|
char *basename(char *name)
|
|
/* Return the last component of name, stripping trailing slashes from name.
|
|
* Precondition: name != "/". If name is prefixed by a label, then the
|
|
* label is copied to the basename too.
|
|
*/
|
|
{
|
|
static char base[IM_NAME_MAX];
|
|
char *p, *bp= base;
|
|
|
|
if ((p= strchr(name, ':')) != NULL) {
|
|
while (name <= p && bp < base + IM_NAME_MAX - 1)
|
|
*bp++ = *name++;
|
|
}
|
|
for (;;) {
|
|
if ((p= strrchr(name, '/')) == NULL) { p= name; break; }
|
|
if (*++p != 0) break;
|
|
*--p= 0;
|
|
}
|
|
while (*p != 0 && bp < base + IM_NAME_MAX - 1) *bp++ = *p++;
|
|
*bp= 0;
|
|
return base;
|
|
}
|
|
|
|
static void bread(FILE *f, char *name, void *buf, size_t len)
|
|
/* Read len bytes. Don't dare return without them. */
|
|
{
|
|
if (len > 0 && fread(buf, len, 1, f) != 1) {
|
|
if (ferror(f)) fatal(name);
|
|
fprintf(stderr, "installboot: Unexpected EOF on %s\n", name);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
static void bwrite(FILE *f, const char *name, const void *buf, size_t len)
|
|
{
|
|
if (len > 0 && fwrite(buf, len, 1, f) != 1) fatal(name);
|
|
}
|
|
|
|
long total_text= 0, total_data= 0, total_bss= 0;
|
|
int making_image= 0;
|
|
|
|
void read_header(int talk, char *proc, FILE *procf, struct image_header *ihdr)
|
|
/* Read the a.out header of a program and check it. If procf happens to be
|
|
* NULL then the header is already in *image_hdr and need only be checked.
|
|
*/
|
|
{
|
|
int n, big= 0;
|
|
static int banner= 0;
|
|
struct exec *phdr= &ihdr->process;
|
|
|
|
if (procf == NULL) {
|
|
/* Header already present. */
|
|
n= phdr->a_hdrlen;
|
|
} else {
|
|
memset(ihdr, 0, sizeof(*ihdr));
|
|
|
|
/* Put the basename of proc in the header. */
|
|
strncpy(ihdr->name, basename(proc), IM_NAME_MAX);
|
|
|
|
/* Read the header. */
|
|
n= fread(phdr, sizeof(char), A_MINHDR, procf);
|
|
if (ferror(procf)) fatal(proc);
|
|
}
|
|
|
|
if (n < A_MINHDR || BADMAG(*phdr)) {
|
|
fprintf(stderr, "installboot: %s is not an executable\n", proc);
|
|
exit(1);
|
|
}
|
|
|
|
/* Get the rest of the exec header. */
|
|
if (procf != NULL) {
|
|
bread(procf, proc, ((char *) phdr) + A_MINHDR,
|
|
phdr->a_hdrlen - A_MINHDR);
|
|
}
|
|
|
|
if (talk && !banner) {
|
|
printf(" text data bss size\n");
|
|
banner= 1;
|
|
}
|
|
|
|
if (talk) {
|
|
printf(" %8ld %8ld %8ld %9ld %s\n",
|
|
phdr->a_text, phdr->a_data, phdr->a_bss,
|
|
phdr->a_text + phdr->a_data + phdr->a_bss, proc);
|
|
}
|
|
total_text+= phdr->a_text;
|
|
total_data+= phdr->a_data;
|
|
total_bss+= phdr->a_bss;
|
|
|
|
if (phdr->a_cpu == A_I8086) {
|
|
long data= phdr->a_data + phdr->a_bss;
|
|
|
|
if (!(phdr->a_flags & A_SEP)) data+= phdr->a_text;
|
|
|
|
if (phdr->a_text >= 65536) big|= 1;
|
|
if (data >= 65536) big|= 2;
|
|
}
|
|
if (big) {
|
|
fprintf(stderr,
|
|
"%s will crash, %s%s%s segment%s larger then 64K\n",
|
|
proc,
|
|
big & 1 ? "text" : "",
|
|
big == 3 ? " and " : "",
|
|
big & 2 ? "data" : "",
|
|
big == 3 ? "s are" : " is");
|
|
}
|
|
}
|
|
|
|
void padimage(const char *image, FILE *imagef, int n)
|
|
/* Add n zeros to image to pad it to a sector boundary. */
|
|
{
|
|
while (n > 0) {
|
|
if (putc(0, imagef) == EOF) fatal(image);
|
|
n--;
|
|
}
|
|
}
|
|
|
|
#define align(n) (((n) + ((SECTOR_SIZE) - 1)) & ~((SECTOR_SIZE) - 1))
|
|
|
|
void copyexec(char *proc, FILE *procf, char *image, FILE *imagef, long n)
|
|
/* Copy n bytes from proc to image padded to fill a sector. */
|
|
{
|
|
int pad, c;
|
|
|
|
/* Compute number of padding bytes. */
|
|
pad= align(n) - n;
|
|
|
|
while (n > 0) {
|
|
if ((c= getc(procf)) == EOF) {
|
|
if (ferror(procf)) fatal(proc);
|
|
fprintf(stderr, "installboot: premature EOF on %s\n",
|
|
proc);
|
|
exit(1);
|
|
}
|
|
if (putc(c, imagef) == EOF) fatal(image);
|
|
n--;
|
|
}
|
|
padimage(image, imagef, pad);
|
|
}
|
|
|
|
void make_image(char *image, char **procv)
|
|
/* Collect a set of files in an image, each "segment" is nicely padded out
|
|
* to SECTOR_SIZE, so it may be read from disk into memory without trickery.
|
|
*/
|
|
{
|
|
FILE *imagef, *procf;
|
|
char *proc, *file;
|
|
int procn;
|
|
struct image_header ihdr;
|
|
struct exec phdr;
|
|
struct stat st;
|
|
|
|
making_image= 1;
|
|
|
|
if ((imagef= fopen(image, "w")) == NULL) fatal(image);
|
|
|
|
for (procn= 0; (proc= *procv++) != NULL; procn++) {
|
|
/* Remove the label from the file name. */
|
|
if ((file= strchr(proc, ':')) != NULL) file++; else file= proc;
|
|
|
|
/* Real files please, may need to seek. */
|
|
if (stat(file, &st) < 0
|
|
|| (errno= EISDIR, !S_ISREG(st.st_mode))
|
|
|| (procf= fopen(file, "r")) == NULL
|
|
) fatal(proc);
|
|
|
|
/* Read a.out header. */
|
|
read_header(1, proc, procf, &ihdr);
|
|
|
|
/* Scratch. */
|
|
phdr= ihdr.process;
|
|
|
|
/* The symbol table is always stripped off. */
|
|
ihdr.process.a_syms= 0;
|
|
ihdr.process.a_flags &= ~A_NSYM;
|
|
|
|
/* Write header padded to fill a sector */
|
|
bwrite(imagef, image, &ihdr, sizeof(ihdr));
|
|
|
|
padimage(image, imagef, SECTOR_SIZE - sizeof(ihdr));
|
|
|
|
/* A page aligned executable needs the header in text. */
|
|
if (phdr.a_flags & A_PAL) {
|
|
rewind(procf);
|
|
phdr.a_text+= phdr.a_hdrlen;
|
|
}
|
|
|
|
/* Copy text and data of proc to image. */
|
|
if (phdr.a_flags & A_SEP) {
|
|
/* Separate I&D: pad text & data separately. */
|
|
|
|
copyexec(proc, procf, image, imagef, phdr.a_text);
|
|
copyexec(proc, procf, image, imagef, phdr.a_data);
|
|
} else {
|
|
/* Common I&D: keep text and data together. */
|
|
|
|
copyexec(proc, procf, image, imagef,
|
|
phdr.a_text + phdr.a_data);
|
|
}
|
|
|
|
/* Done with proc. */
|
|
(void) fclose(procf);
|
|
}
|
|
/* Done with image. */
|
|
|
|
if (fclose(imagef) == EOF) fatal(image);
|
|
|
|
printf(" ------ ------ ------ -------\n");
|
|
printf(" %8ld %8ld %8ld %9ld total\n",
|
|
total_text, total_data, total_bss,
|
|
total_text + total_data + total_bss);
|
|
}
|
|
|
|
void extractexec(FILE *imagef, char *image, FILE *procf, char *proc,
|
|
long count, off_t *alen)
|
|
/* Copy a segment of an executable. It is padded to a sector in image. */
|
|
{
|
|
char buf[SECTOR_SIZE];
|
|
|
|
while (count > 0) {
|
|
bread(imagef, image, buf, sizeof(buf));
|
|
*alen-= sizeof(buf);
|
|
|
|
bwrite(procf, proc, buf,
|
|
count < sizeof(buf) ? (size_t) count : sizeof(buf));
|
|
count-= sizeof(buf);
|
|
}
|
|
}
|
|
|
|
void extract_image(char *image)
|
|
/* Extract the executables from an image. */
|
|
{
|
|
FILE *imagef, *procf;
|
|
off_t len;
|
|
struct stat st;
|
|
struct image_header ihdr;
|
|
struct exec phdr;
|
|
char buf[SECTOR_SIZE];
|
|
|
|
if (stat(image, &st) < 0) fatal(image);
|
|
|
|
/* Size of the image. */
|
|
len= S_ISREG(st.st_mode) ? st.st_size : -1;
|
|
|
|
if ((imagef= fopen(image, "r")) == NULL) fatal(image);
|
|
|
|
while (len != 0) {
|
|
/* Extract a program, first sector is an extended header. */
|
|
bread(imagef, image, buf, sizeof(buf));
|
|
len-= sizeof(buf);
|
|
|
|
memcpy(&ihdr, buf, sizeof(ihdr));
|
|
phdr= ihdr.process;
|
|
|
|
/* Check header. */
|
|
read_header(1, ihdr.name, NULL, &ihdr);
|
|
|
|
if ((procf= fopen(ihdr.name, "w")) == NULL) fatal(ihdr.name);
|
|
|
|
if (phdr.a_flags & A_PAL) {
|
|
/* A page aligned process contains a header in text. */
|
|
phdr.a_text+= phdr.a_hdrlen;
|
|
} else {
|
|
bwrite(procf, ihdr.name, &ihdr.process, phdr.a_hdrlen);
|
|
}
|
|
|
|
/* Extract text and data segments. */
|
|
if (phdr.a_flags & A_SEP) {
|
|
extractexec(imagef, image, procf, ihdr.name,
|
|
phdr.a_text, &len);
|
|
extractexec(imagef, image, procf, ihdr.name,
|
|
phdr.a_data, &len);
|
|
} else {
|
|
extractexec(imagef, image, procf, ihdr.name,
|
|
phdr.a_text + phdr.a_data, &len);
|
|
}
|
|
|
|
if (fclose(procf) == EOF) fatal(ihdr.name);
|
|
}
|
|
}
|
|
|
|
static int rawfd; /* File descriptor to open device. */
|
|
static const char *rawdev; /* Name of device. */
|
|
|
|
void readblock(off_t blk, char *buf, int block_size)
|
|
/* For rawfs, so that it can read blocks. */
|
|
{
|
|
int n;
|
|
|
|
if (lseek(rawfd, blk * block_size, SEEK_SET) < 0
|
|
|| (n= read(rawfd, buf, block_size)) < 0
|
|
) fatal(rawdev);
|
|
|
|
if (n < block_size) {
|
|
fprintf(stderr, "installboot: Unexpected EOF on %s\n", rawdev);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
void writeblock(off_t blk, const char *buf, int block_size)
|
|
/* Add a function to write blocks for local use. */
|
|
{
|
|
if (lseek(rawfd, blk * block_size, SEEK_SET) < 0
|
|
|| write(rawfd, buf, block_size) < 0
|
|
) fatal(rawdev);
|
|
}
|
|
|
|
int raw_install(char *file, off_t *start, off_t *len, int block_size)
|
|
/* Copy bootcode or an image to the boot device at the given absolute disk
|
|
* block number. This "raw" installation is used to place bootcode and
|
|
* image on a disk without a filesystem to make a simple boot disk. Useful
|
|
* in automated scripts for J. Random User.
|
|
* Note: *len == 0 when an image is read. It is set right afterwards.
|
|
*/
|
|
{
|
|
static char buf[_MAX_BLOCK_SIZE]; /* Nonvolatile block buffer. */
|
|
FILE *f;
|
|
off_t sec;
|
|
unsigned long devsize;
|
|
static int banner= 0;
|
|
struct partition entry;
|
|
|
|
/* See if the device has a maximum size. */
|
|
devsize= -1;
|
|
if (ioctl(rawfd, DIOCGETP, &entry) == 0) devsize= cv64ul(entry.size);
|
|
|
|
if ((f= fopen(file, "r")) == NULL) fatal(file);
|
|
|
|
/* Copy sectors from file onto the boot device. */
|
|
sec= *start;
|
|
do {
|
|
int off= sec % RATIO(BOOT_BLOCK_SIZE);
|
|
|
|
if (fread(buf + off * SECTOR_SIZE, 1, SECTOR_SIZE, f) == 0)
|
|
break;
|
|
|
|
if (sec >= devsize) {
|
|
fprintf(stderr,
|
|
"installboot: %s can't be attached to %s\n",
|
|
file, rawdev);
|
|
return 0;
|
|
}
|
|
|
|
if (off == RATIO(BOOT_BLOCK_SIZE) - 1) writeblock(sec / RATIO(BOOT_BLOCK_SIZE), buf, BOOT_BLOCK_SIZE);
|
|
} while (++sec != *start + *len);
|
|
|
|
if (ferror(f)) fatal(file);
|
|
(void) fclose(f);
|
|
|
|
/* Write a partial block, this may be the last image. */
|
|
if (sec % RATIO(BOOT_BLOCK_SIZE) != 0) writeblock(sec / RATIO(BOOT_BLOCK_SIZE), buf, BOOT_BLOCK_SIZE);
|
|
|
|
if (!banner) {
|
|
printf(" sector length\n");
|
|
banner= 1;
|
|
}
|
|
*len= sec - *start;
|
|
printf("%8ld%8ld %s\n", *start, *len, file);
|
|
*start= sec;
|
|
return 1;
|
|
}
|
|
|
|
enum howto { FS, BOOT };
|
|
|
|
void make_bootable(enum howto how, char *device, char *bootblock,
|
|
char *bootcode, char **imagev)
|
|
/* Install bootblock on the bootsector of device with the disk addresses to
|
|
* bootcode patched into the data segment of bootblock. "How" tells if there
|
|
* should or shoudn't be a file system on the disk. The images in the imagev
|
|
* vector are added to the end of the device.
|
|
*/
|
|
{
|
|
char buf[_MAX_BLOCK_SIZE + 256], *adrp, *parmp;
|
|
struct fileaddr {
|
|
off_t address;
|
|
int count;
|
|
} bootaddr[BOOT_MAX + 1], *bap= bootaddr;
|
|
struct exec boothdr;
|
|
struct image_header dummy;
|
|
struct stat st;
|
|
ino_t ino;
|
|
off_t sector, max_sector;
|
|
FILE *bootf;
|
|
off_t addr, fssize, pos, len;
|
|
char *labels, *label, *image;
|
|
int nolabel;
|
|
int block_size = 0;
|
|
|
|
/* Open device and set variables for readblock. */
|
|
if ((rawfd= open(rawdev= device, O_RDWR)) < 0) fatal(device);
|
|
|
|
/* Read and check the superblock. */
|
|
fssize= r_super(&block_size);
|
|
|
|
switch (how) {
|
|
case FS:
|
|
if (fssize == 0) {
|
|
fprintf(stderr,
|
|
"installboot: %s is not a Minix file system\n",
|
|
device);
|
|
exit(1);
|
|
}
|
|
break;
|
|
case BOOT:
|
|
if (fssize != 0) {
|
|
int s;
|
|
printf("%s contains a file system!\n", device);
|
|
printf("Scribbling in 10 seconds");
|
|
for (s= 0; s < 10; s++) {
|
|
fputc('.', stdout);
|
|
fflush(stdout);
|
|
sleep(1);
|
|
}
|
|
fputc('\n', stdout);
|
|
}
|
|
fssize= 1; /* Just a boot block. */
|
|
}
|
|
|
|
if (how == FS) {
|
|
/* See if the boot code can be found on the file system. */
|
|
if ((ino= r_lookup(ROOT_INO, bootcode)) == 0) {
|
|
if (errno != ENOENT) fatal(bootcode);
|
|
}
|
|
} else {
|
|
/* Boot code must be attached at the end. */
|
|
ino= 0;
|
|
}
|
|
|
|
if (ino == 0) {
|
|
/* For a raw installation, we need to copy the boot code onto
|
|
* the device, so we need to look at the file to be copied.
|
|
*/
|
|
if (stat(bootcode, &st) < 0) fatal(bootcode);
|
|
|
|
if ((bootf= fopen(bootcode, "r")) == NULL) fatal(bootcode);
|
|
} else {
|
|
/* Boot code is present in the file system. */
|
|
r_stat(ino, &st);
|
|
|
|
/* Get the header from the first block. */
|
|
if ((addr= r_vir2abs((off_t) 0)) == 0) {
|
|
boothdr.a_magic[0]= !A_MAGIC0;
|
|
} else {
|
|
readblock(addr, buf, block_size);
|
|
/* Must skip 16 bytes of 'boot' as that contains code. */
|
|
memcpy(&boothdr, buf + 16, sizeof(struct exec));
|
|
}
|
|
bootf= NULL;
|
|
dummy.process= boothdr;
|
|
}
|
|
/* See if it is an executable (read_header does the check). */
|
|
read_header(0, bootcode, bootf, &dummy);
|
|
boothdr= dummy.process;
|
|
|
|
if (bootf != NULL) fclose(bootf);
|
|
|
|
/* Get all the sector addresses of the secondary boot code. */
|
|
max_sector= (boothdr.a_hdrlen + boothdr.a_text
|
|
+ boothdr.a_data + SECTOR_SIZE - 1) / SECTOR_SIZE;
|
|
|
|
if (max_sector > BOOT_MAX * RATIO(block_size)) {
|
|
fprintf(stderr, "installboot: %s is way too big\n", bootcode);
|
|
exit(0);
|
|
}
|
|
|
|
/* Determine the addresses to the boot code to be patched into the
|
|
* boot block.
|
|
*/
|
|
bap->count= 0; /* Trick to get the address recording going. */
|
|
|
|
for (sector= 0; sector < max_sector; sector++) {
|
|
if (ino == 0) {
|
|
addr= fssize + (sector / RATIO(block_size));
|
|
} else
|
|
if ((addr= r_vir2abs(sector / RATIO(block_size))) == 0) {
|
|
fprintf(stderr, "installboot: %s has holes!\n",
|
|
bootcode);
|
|
exit(1);
|
|
}
|
|
addr= (addr * RATIO(block_size)) + (sector % RATIO(block_size));
|
|
|
|
/* First address of the addresses array? */
|
|
if (bap->count == 0) bap->address= addr;
|
|
|
|
/* Paste sectors together in a multisector read. */
|
|
if (bap->address + bap->count == addr)
|
|
bap->count++;
|
|
else {
|
|
/* New address. */
|
|
bap++;
|
|
bap->address= addr;
|
|
bap->count= 1;
|
|
}
|
|
}
|
|
(++bap)->count= 0; /* No more. */
|
|
|
|
/* Get the boot block and patch the pieces in. */
|
|
readblock(BOOTBLOCK, buf, BOOT_BLOCK_SIZE);
|
|
|
|
if ((bootf= fopen(bootblock, "r")) == NULL) fatal(bootblock);
|
|
|
|
read_header(0, bootblock, bootf, &dummy);
|
|
boothdr= dummy.process;
|
|
|
|
if (boothdr.a_text + boothdr.a_data +
|
|
4 * (bap - bootaddr) + 1 > PARTPOS) {
|
|
fprintf(stderr,
|
|
"installboot: %s + addresses to %s don't fit in the boot sector\n",
|
|
bootblock, bootcode);
|
|
fprintf(stderr,
|
|
"You can try copying/reinstalling %s to defragment it\n",
|
|
bootcode);
|
|
exit(1);
|
|
}
|
|
|
|
/* All checks out right. Read bootblock into the boot block! */
|
|
bread(bootf, bootblock, buf, boothdr.a_text + boothdr.a_data);
|
|
(void) fclose(bootf);
|
|
|
|
/* Patch the addresses in. */
|
|
adrp= buf + (int) (boothdr.a_text + boothdr.a_data);
|
|
for (bap= bootaddr; bap->count != 0; bap++) {
|
|
*adrp++= bap->count;
|
|
*adrp++= (bap->address >> 0) & 0xFF;
|
|
*adrp++= (bap->address >> 8) & 0xFF;
|
|
*adrp++= (bap->address >> 16) & 0xFF;
|
|
}
|
|
/* Zero count stops bootblock's reading loop. */
|
|
*adrp++= 0;
|
|
|
|
if (bap > bootaddr+1) {
|
|
printf("%s and %d addresses to %s patched into %s\n",
|
|
bootblock, (int)(bap - bootaddr), bootcode, device);
|
|
}
|
|
|
|
/* Boot block signature. */
|
|
buf[SIGPOS+0]= (SIGNATURE >> 0) & 0xFF;
|
|
buf[SIGPOS+1]= (SIGNATURE >> 8) & 0xFF;
|
|
|
|
/* Sector 2 of the boot block is used for boot parameters, initially
|
|
* filled with null commands (newlines). Initialize it only if
|
|
* necessary.
|
|
*/
|
|
for (parmp= buf + SECTOR_SIZE; parmp < buf + 2*SECTOR_SIZE; parmp++) {
|
|
if (*imagev != NULL || (control(*parmp) && *parmp != '\n')) {
|
|
/* Param sector must be initialized. */
|
|
memset(buf + SECTOR_SIZE, '\n', SECTOR_SIZE);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Offset to the end of the file system to add boot code and images. */
|
|
pos= fssize * RATIO(block_size);
|
|
|
|
if (ino == 0) {
|
|
/* Place the boot code onto the boot device. */
|
|
len= max_sector;
|
|
if (!raw_install(bootcode, &pos, &len, block_size)) {
|
|
if (how == FS) {
|
|
fprintf(stderr,
|
|
"\t(Isn't there a copy of %s on %s that can be used?)\n",
|
|
bootcode, device);
|
|
}
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
parmp= buf + SECTOR_SIZE;
|
|
nolabel= 0;
|
|
|
|
if (how == BOOT) {
|
|
/* A boot only disk needs to have floppies swapped. */
|
|
strcpy(parmp,
|
|
"trailer()echo \\nInsert the root diskette then hit RETURN\\n\\w\\c\n");
|
|
parmp+= strlen(parmp);
|
|
}
|
|
|
|
while ((labels= *imagev++) != NULL) {
|
|
/* Place each kernel image on the boot device. */
|
|
|
|
if ((image= strchr(labels, ':')) != NULL)
|
|
*image++= 0;
|
|
else {
|
|
if (nolabel) {
|
|
fprintf(stderr,
|
|
"installboot: Only one image can be the default\n");
|
|
exit(1);
|
|
}
|
|
nolabel= 1;
|
|
image= labels;
|
|
labels= NULL;
|
|
}
|
|
len= 0;
|
|
if (!raw_install(image, &pos, &len, block_size)) exit(1);
|
|
|
|
if (labels == NULL) {
|
|
/* Let this image be the default. */
|
|
sprintf(parmp, "image=%ld:%ld\n", pos-len, len);
|
|
parmp+= strlen(parmp);
|
|
}
|
|
|
|
while (labels != NULL) {
|
|
/* Image is prefixed by a comma separated list of
|
|
* labels. Define functions to select label and image.
|
|
*/
|
|
label= labels;
|
|
if ((labels= strchr(labels, ',')) != NULL) *labels++ = 0;
|
|
|
|
sprintf(parmp,
|
|
"%s(%c){label=%s;image=%ld:%ld;echo %s kernel selected;menu}\n",
|
|
label,
|
|
between('A', label[0], 'Z')
|
|
? label[0]-'A'+'a' : label[0],
|
|
label, pos-len, len, label);
|
|
parmp+= strlen(parmp);
|
|
}
|
|
|
|
if (parmp > buf + block_size) {
|
|
fprintf(stderr,
|
|
"installboot: Out of parameter space, too many images\n");
|
|
exit(1);
|
|
}
|
|
}
|
|
/* Install boot block. */
|
|
writeblock((off_t) BOOTBLOCK, buf, 1024);
|
|
|
|
if (pos > fssize * RATIO(block_size)) {
|
|
/* Tell the total size of the data on the device. */
|
|
printf("%16ld (%ld kb) total\n", pos,
|
|
(pos + RATIO(block_size) - 1) / RATIO(block_size));
|
|
}
|
|
}
|
|
|
|
static void install_master(const char *device, char *masterboot, char **guide)
|
|
/* Booting a hard disk is a two stage process: The master bootstrap in sector
|
|
* 0 loads the bootstrap from sector 0 of the active partition which in turn
|
|
* starts the operating system. This code installs such a master bootstrap
|
|
* on a hard disk. If guide[0] is non-null then the master bootstrap is
|
|
* guided into booting a certain device.
|
|
*/
|
|
{
|
|
FILE *masf;
|
|
unsigned long size;
|
|
struct stat st;
|
|
static char buf[_MAX_BLOCK_SIZE];
|
|
|
|
/* Open device. */
|
|
if ((rawfd= open(rawdev= device, O_RDWR)) < 0) fatal(device);
|
|
|
|
/* Open the master boot code. */
|
|
if ((masf= fopen(masterboot, "r")) == NULL) fatal(masterboot);
|
|
|
|
/* See if the user is cloning a device. */
|
|
if (fstat(fileno(masf), &st) >=0 && S_ISBLK(st.st_mode))
|
|
size= PARTPOS;
|
|
else {
|
|
/* Read and check header otherwise. */
|
|
struct image_header ihdr;
|
|
|
|
read_header(1, masterboot, masf, &ihdr);
|
|
size= ihdr.process.a_text + ihdr.process.a_data;
|
|
}
|
|
if (size > PARTPOS) {
|
|
fprintf(stderr, "installboot: %s is too big\n", masterboot);
|
|
exit(1);
|
|
}
|
|
|
|
/* Read the master boot block, patch it, write. */
|
|
readblock(BOOTBLOCK, buf, BOOT_BLOCK_SIZE);
|
|
|
|
memset(buf, 0, PARTPOS);
|
|
(void) bread(masf, masterboot, buf, size);
|
|
|
|
if (guide[0] != NULL) {
|
|
/* Fixate partition to boot. */
|
|
const char *keys= guide[0];
|
|
const char *logical= guide[1];
|
|
size_t i;
|
|
int logfd;
|
|
u32_t offset;
|
|
struct partition geometry;
|
|
|
|
/* A string of digits to be seen as keystrokes. */
|
|
i= 0;
|
|
do {
|
|
if (!between('0', keys[i], '9')) {
|
|
fprintf(stderr,
|
|
"installboot: bad guide keys '%s'\n",
|
|
keys);
|
|
exit(1);
|
|
}
|
|
} while (keys[++i] != 0);
|
|
|
|
if (size + i + 1 > PARTPOS) {
|
|
fprintf(stderr,
|
|
"installboot: not enough space after '%s' for '%s'\n",
|
|
masterboot, keys);
|
|
exit(1);
|
|
}
|
|
memcpy(buf + size, keys, i);
|
|
size += i;
|
|
buf[size]= '\r';
|
|
|
|
if (logical != NULL) {
|
|
if ((logfd= open(logical, O_RDONLY)) < 0
|
|
|| ioctl(logfd, DIOCGETP, &geometry) < 0
|
|
) {
|
|
fatal(logical);
|
|
}
|
|
offset= div64u(geometry.base, SECTOR_SIZE);
|
|
if (size + 5 > PARTPOS) {
|
|
fprintf(stderr,
|
|
"installboot: not enough space "
|
|
"after '%s' for '%s' and an offset "
|
|
"to '%s'\n",
|
|
masterboot, keys, logical);
|
|
exit(1);
|
|
}
|
|
buf[size]= '#';
|
|
memcpy(buf+size+1, &offset, 4);
|
|
}
|
|
}
|
|
|
|
/* Install signature. */
|
|
buf[SIGPOS+0]= (SIGNATURE >> 0) & 0xFF;
|
|
buf[SIGPOS+1]= (SIGNATURE >> 8) & 0xFF;
|
|
|
|
writeblock(BOOTBLOCK, buf, BOOT_BLOCK_SIZE);
|
|
}
|
|
|
|
static void usage(void)
|
|
{
|
|
fprintf(stderr,
|
|
"Usage: installboot -i(mage) image kernel mm fs ... init\n"
|
|
" installboot -(e)x(tract) image\n"
|
|
" installboot -d(evice) device bootblock boot [image ...]\n"
|
|
" installboot -b(oot) device bootblock boot image ...\n"
|
|
" installboot -m(aster) device masterboot [keys [logical]]\n");
|
|
exit(1);
|
|
}
|
|
|
|
static int isoption(const char *option, const char *test)
|
|
/* Check if the option argument is equals "test". Also accept -i as short
|
|
* for -image, and the special case -x for -extract.
|
|
*/
|
|
{
|
|
if (strcmp(option, test) == 0) return 1;
|
|
if (option[0] != '-' && strlen(option) != 2) return 0;
|
|
if (option[1] == test[1]) return 1;
|
|
if (option[1] == 'x' && test[1] == 'e') return 1;
|
|
return 0;
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
if (argc < 2) usage();
|
|
|
|
if (argc >= 4 && isoption(argv[1], "-image")) {
|
|
make_image(argv[2], argv + 3);
|
|
} else
|
|
if (argc == 3 && isoption(argv[1], "-extract")) {
|
|
extract_image(argv[2]);
|
|
} else
|
|
if (argc >= 5 && isoption(argv[1], "-device")) {
|
|
make_bootable(FS, argv[2], argv[3], argv[4], argv + 5);
|
|
} else
|
|
if (argc >= 6 && isoption(argv[1], "-boot")) {
|
|
make_bootable(BOOT, argv[2], argv[3], argv[4], argv + 5);
|
|
} else
|
|
if ((4 <= argc && argc <= 6) && isoption(argv[1], "-master")) {
|
|
install_master(argv[2], argv[3], argv + 4);
|
|
} else {
|
|
usage();
|
|
}
|
|
exit(0);
|
|
}
|
|
|
|
/*
|
|
* $PchId: installboot.c,v 1.10 2000/08/13 22:07:50 philip Exp $
|
|
*/
|