migration/rdma: Plug memory leaks in qemu_rdma_registration_stop()
[qemu/armbru.git] / pc-bios / s390-ccw / bootmap.c
blobd13b7cbd1597bf2e531efcf8f54e70fcdbe387e9
1 /*
2 * QEMU S390 bootmap interpreter
4 * Copyright (c) 2009 Alexander Graf <agraf@suse.de>
6 * This work is licensed under the terms of the GNU GPL, version 2 or (at
7 * your option) any later version. See the COPYING file in the top-level
8 * directory.
9 */
11 #include "libc.h"
12 #include "s390-ccw.h"
13 #include "bootmap.h"
14 #include "virtio.h"
15 #include "bswap.h"
17 #ifdef DEBUG
18 /* #define DEBUG_FALLBACK */
19 #endif
21 #ifdef DEBUG_FALLBACK
22 #define dputs(txt) \
23 do { sclp_print("zipl: " txt); } while (0)
24 #else
25 #define dputs(fmt, ...) \
26 do { } while (0)
27 #endif
29 /* Scratch space */
30 static uint8_t sec[MAX_SECTOR_SIZE*4] __attribute__((__aligned__(PAGE_SIZE)));
32 const uint8_t el_torito_magic[] = "EL TORITO SPECIFICATION"
33 "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0";
36 * Match two CCWs located after PSW and eight filler bytes.
37 * From libmagic and arch/s390/kernel/head.S.
39 const uint8_t linux_s390_magic[] = "\x02\x00\x00\x18\x60\x00\x00\x50\x02\x00"
40 "\x00\x68\x60\x00\x00\x50\x40\x40\x40\x40"
41 "\x40\x40\x40\x40";
43 static inline bool is_iso_vd_valid(IsoVolDesc *vd)
45 const uint8_t vol_desc_magic[] = "CD001";
47 return !memcmp(&vd->ident[0], vol_desc_magic, 5) &&
48 vd->version == 0x1 &&
49 vd->type <= VOL_DESC_TYPE_PARTITION;
52 /***********************************************************************
53 * IPL an ECKD DASD (CDL or LDL/CMS format)
56 static unsigned char _bprs[8*1024]; /* guessed "max" ECKD sector size */
57 static const int max_bprs_entries = sizeof(_bprs) / sizeof(ExtEckdBlockPtr);
58 static uint8_t _s2[MAX_SECTOR_SIZE * 3] __attribute__((__aligned__(PAGE_SIZE)));
59 static void *s2_prev_blk = _s2;
60 static void *s2_cur_blk = _s2 + MAX_SECTOR_SIZE;
61 static void *s2_next_blk = _s2 + MAX_SECTOR_SIZE * 2;
63 static inline void verify_boot_info(BootInfo *bip)
65 IPL_assert(magic_match(bip->magic, ZIPL_MAGIC), "No zIPL sig in BootInfo");
66 IPL_assert(bip->version == BOOT_INFO_VERSION, "Wrong zIPL version");
67 IPL_assert(bip->bp_type == BOOT_INFO_BP_TYPE_IPL, "DASD is not for IPL");
68 IPL_assert(bip->dev_type == BOOT_INFO_DEV_TYPE_ECKD, "DASD is not ECKD");
69 IPL_assert(bip->flags == BOOT_INFO_FLAGS_ARCH, "Not for this arch");
70 IPL_assert(block_size_ok(bip->bp.ipl.bm_ptr.eckd.bptr.size),
71 "Bad block size in zIPL section of the 1st record.");
74 static block_number_t eckd_block_num(EckdCHS *chs)
76 const uint64_t sectors = virtio_get_sectors();
77 const uint64_t heads = virtio_get_heads();
78 const uint64_t cylinder = chs->cylinder
79 + ((chs->head & 0xfff0) << 12);
80 const uint64_t head = chs->head & 0x000f;
81 const block_number_t block = sectors * heads * cylinder
82 + sectors * head
83 + chs->sector
84 - 1; /* block nr starts with zero */
85 return block;
88 static bool eckd_valid_address(BootMapPointer *p)
90 const uint64_t head = p->eckd.chs.head & 0x000f;
92 if (head >= virtio_get_heads()
93 || p->eckd.chs.sector > virtio_get_sectors()
94 || p->eckd.chs.sector <= 0) {
95 return false;
98 if (!virtio_guessed_disk_nature() &&
99 eckd_block_num(&p->eckd.chs) >= virtio_get_blocks()) {
100 return false;
103 return true;
106 static block_number_t load_eckd_segments(block_number_t blk, uint64_t *address)
108 block_number_t block_nr;
109 int j, rc;
110 BootMapPointer *bprs = (void *)_bprs;
111 bool more_data;
113 memset(_bprs, FREE_SPACE_FILLER, sizeof(_bprs));
114 read_block(blk, bprs, "BPRS read failed");
116 do {
117 more_data = false;
118 for (j = 0;; j++) {
119 block_nr = eckd_block_num(&bprs[j].xeckd.bptr.chs);
120 if (is_null_block_number(block_nr)) { /* end of chunk */
121 break;
124 /* we need the updated blockno for the next indirect entry
125 * in the chain, but don't want to advance address
127 if (j == (max_bprs_entries - 1)) {
128 break;
131 IPL_assert(block_size_ok(bprs[j].xeckd.bptr.size),
132 "bad chunk block size");
133 IPL_assert(eckd_valid_address(&bprs[j]), "bad chunk ECKD addr");
135 if ((bprs[j].xeckd.bptr.count == 0) && unused_space(&(bprs[j+1]),
136 sizeof(EckdBlockPtr))) {
137 /* This is a "continue" pointer.
138 * This ptr should be the last one in the current
139 * script section.
140 * I.e. the next ptr must point to the unused memory area
142 memset(_bprs, FREE_SPACE_FILLER, sizeof(_bprs));
143 read_block(block_nr, bprs, "BPRS continuation read failed");
144 more_data = true;
145 break;
148 /* Load (count+1) blocks of code at (block_nr)
149 * to memory (address).
151 rc = virtio_read_many(block_nr, (void *)(*address),
152 bprs[j].xeckd.bptr.count+1);
153 IPL_assert(rc == 0, "code chunk read failed");
155 *address += (bprs[j].xeckd.bptr.count+1) * virtio_get_block_size();
157 } while (more_data);
158 return block_nr;
161 static bool find_zipl_boot_menu_banner(int *offset)
163 int i;
165 /* Menu banner starts with "zIPL" */
166 for (i = 0; i < virtio_get_block_size() - 4; i++) {
167 if (magic_match(s2_cur_blk + i, ZIPL_MAGIC_EBCDIC)) {
168 *offset = i;
169 return true;
173 return false;
176 static int eckd_get_boot_menu_index(block_number_t s1b_block_nr)
178 block_number_t cur_block_nr;
179 block_number_t prev_block_nr = 0;
180 block_number_t next_block_nr = 0;
181 EckdStage1b *s1b = (void *)sec;
182 int banner_offset;
183 int i;
185 /* Get Stage1b data */
186 memset(sec, FREE_SPACE_FILLER, sizeof(sec));
187 read_block(s1b_block_nr, s1b, "Cannot read stage1b boot loader");
189 memset(_s2, FREE_SPACE_FILLER, sizeof(_s2));
191 /* Get Stage2 data */
192 for (i = 0; i < STAGE2_BLK_CNT_MAX; i++) {
193 cur_block_nr = eckd_block_num(&s1b->seek[i].chs);
195 if (!cur_block_nr) {
196 break;
199 read_block(cur_block_nr, s2_cur_blk, "Cannot read stage2 boot loader");
201 if (find_zipl_boot_menu_banner(&banner_offset)) {
203 * Load the adjacent blocks to account for the
204 * possibility of menu data spanning multiple blocks.
206 if (prev_block_nr) {
207 read_block(prev_block_nr, s2_prev_blk,
208 "Cannot read stage2 boot loader");
211 if (i + 1 < STAGE2_BLK_CNT_MAX) {
212 next_block_nr = eckd_block_num(&s1b->seek[i + 1].chs);
215 if (next_block_nr) {
216 read_block(next_block_nr, s2_next_blk,
217 "Cannot read stage2 boot loader");
220 return menu_get_zipl_boot_index(s2_cur_blk + banner_offset);
223 prev_block_nr = cur_block_nr;
226 sclp_print("No zipl boot menu data found. Booting default entry.");
227 return 0;
230 static void run_eckd_boot_script(block_number_t bmt_block_nr,
231 block_number_t s1b_block_nr)
233 int i;
234 unsigned int loadparm = get_loadparm_index();
235 block_number_t block_nr;
236 uint64_t address;
237 BootMapTable *bmt = (void *)sec;
238 BootMapScript *bms = (void *)sec;
240 if (menu_is_enabled_zipl()) {
241 loadparm = eckd_get_boot_menu_index(s1b_block_nr);
244 debug_print_int("loadparm", loadparm);
245 IPL_assert(loadparm < MAX_BOOT_ENTRIES, "loadparm value greater than"
246 " maximum number of boot entries allowed");
248 memset(sec, FREE_SPACE_FILLER, sizeof(sec));
249 read_block(bmt_block_nr, sec, "Cannot read Boot Map Table");
251 block_nr = eckd_block_num(&bmt->entry[loadparm].xeckd.bptr.chs);
252 IPL_assert(block_nr != -1, "Cannot find Boot Map Table Entry");
254 memset(sec, FREE_SPACE_FILLER, sizeof(sec));
255 read_block(block_nr, sec, "Cannot read Boot Map Script");
257 for (i = 0; bms->entry[i].type == BOOT_SCRIPT_LOAD ||
258 bms->entry[i].type == BOOT_SCRIPT_SIGNATURE; i++) {
260 /* We don't support secure boot yet, so we skip signature entries */
261 if (bms->entry[i].type == BOOT_SCRIPT_SIGNATURE) {
262 continue;
265 address = bms->entry[i].address.load_address;
266 block_nr = eckd_block_num(&bms->entry[i].blkptr.xeckd.bptr.chs);
268 do {
269 block_nr = load_eckd_segments(block_nr, &address);
270 } while (block_nr != -1);
273 IPL_assert(bms->entry[i].type == BOOT_SCRIPT_EXEC,
274 "Unknown script entry type");
275 jump_to_IPL_code(bms->entry[i].address.load_address); /* no return */
278 static void ipl_eckd_cdl(void)
280 XEckdMbr *mbr;
281 EckdCdlIpl2 *ipl2 = (void *)sec;
282 IplVolumeLabel *vlbl = (void *)sec;
283 block_number_t bmt_block_nr, s1b_block_nr;
285 /* we have just read the block #0 and recognized it as "IPL1" */
286 sclp_print("CDL\n");
288 memset(sec, FREE_SPACE_FILLER, sizeof(sec));
289 read_block(1, ipl2, "Cannot read IPL2 record at block 1");
291 mbr = &ipl2->mbr;
292 IPL_assert(magic_match(mbr, ZIPL_MAGIC), "No zIPL section in IPL2 record.");
293 IPL_assert(block_size_ok(mbr->blockptr.xeckd.bptr.size),
294 "Bad block size in zIPL section of IPL2 record.");
295 IPL_assert(mbr->dev_type == DEV_TYPE_ECKD,
296 "Non-ECKD device type in zIPL section of IPL2 record.");
298 /* save pointer to Boot Map Table */
299 bmt_block_nr = eckd_block_num(&mbr->blockptr.xeckd.bptr.chs);
301 /* save pointer to Stage1b Data */
302 s1b_block_nr = eckd_block_num(&ipl2->stage1.seek[0].chs);
304 memset(sec, FREE_SPACE_FILLER, sizeof(sec));
305 read_block(2, vlbl, "Cannot read Volume Label at block 2");
306 IPL_assert(magic_match(vlbl->key, VOL1_MAGIC),
307 "Invalid magic of volume label block");
308 IPL_assert(magic_match(vlbl->f.key, VOL1_MAGIC),
309 "Invalid magic of volser block");
310 print_volser(vlbl->f.volser);
312 run_eckd_boot_script(bmt_block_nr, s1b_block_nr);
313 /* no return */
316 static void print_eckd_ldl_msg(ECKD_IPL_mode_t mode)
318 LDL_VTOC *vlbl = (void *)sec; /* already read, 3rd block */
319 char msg[4] = { '?', '.', '\n', '\0' };
321 sclp_print((mode == ECKD_CMS) ? "CMS" : "LDL");
322 sclp_print(" version ");
323 switch (vlbl->LDL_version) {
324 case LDL1_VERSION:
325 msg[0] = '1';
326 break;
327 case LDL2_VERSION:
328 msg[0] = '2';
329 break;
330 default:
331 msg[0] = vlbl->LDL_version;
332 msg[0] &= 0x0f; /* convert EBCDIC */
333 msg[0] |= 0x30; /* to ASCII (digit) */
334 msg[1] = '?';
335 break;
337 sclp_print(msg);
338 print_volser(vlbl->volser);
341 static void ipl_eckd_ldl(ECKD_IPL_mode_t mode)
343 block_number_t bmt_block_nr, s1b_block_nr;
344 EckdLdlIpl1 *ipl1 = (void *)sec;
346 if (mode != ECKD_LDL_UNLABELED) {
347 print_eckd_ldl_msg(mode);
350 /* DO NOT read BootMap pointer (only one, xECKD) at block #2 */
352 memset(sec, FREE_SPACE_FILLER, sizeof(sec));
353 read_block(0, sec, "Cannot read block 0 to grab boot info.");
354 if (mode == ECKD_LDL_UNLABELED) {
355 if (!magic_match(ipl1->bip.magic, ZIPL_MAGIC)) {
356 return; /* not applicable layout */
358 sclp_print("unlabeled LDL.\n");
360 verify_boot_info(&ipl1->bip);
362 /* save pointer to Boot Map Table */
363 bmt_block_nr = eckd_block_num(&ipl1->bip.bp.ipl.bm_ptr.eckd.bptr.chs);
365 /* save pointer to Stage1b Data */
366 s1b_block_nr = eckd_block_num(&ipl1->stage1.seek[0].chs);
368 run_eckd_boot_script(bmt_block_nr, s1b_block_nr);
369 /* no return */
372 static void print_eckd_msg(void)
374 char msg[] = "Using ECKD scheme (block size *****), ";
375 char *p = &msg[34], *q = &msg[30];
376 int n = virtio_get_block_size();
378 /* Fill in the block size and show up the message */
379 if (n > 0 && n <= 99999) {
380 while (n) {
381 *p-- = '0' + (n % 10);
382 n /= 10;
384 while (p >= q) {
385 *p-- = ' ';
388 sclp_print(msg);
391 static void ipl_eckd(void)
393 XEckdMbr *mbr = (void *)sec;
394 LDL_VTOC *vlbl = (void *)sec;
396 print_eckd_msg();
398 /* Grab the MBR again */
399 memset(sec, FREE_SPACE_FILLER, sizeof(sec));
400 read_block(0, mbr, "Cannot read block 0 on DASD");
402 if (magic_match(mbr->magic, IPL1_MAGIC)) {
403 ipl_eckd_cdl(); /* no return */
406 /* LDL/CMS? */
407 memset(sec, FREE_SPACE_FILLER, sizeof(sec));
408 read_block(2, vlbl, "Cannot read block 2");
410 if (magic_match(vlbl->magic, CMS1_MAGIC)) {
411 ipl_eckd_ldl(ECKD_CMS); /* no return */
413 if (magic_match(vlbl->magic, LNX1_MAGIC)) {
414 ipl_eckd_ldl(ECKD_LDL); /* no return */
417 ipl_eckd_ldl(ECKD_LDL_UNLABELED); /* it still may return */
419 * Ok, it is not a LDL by any means.
420 * It still might be a CDL with zero record keys for IPL1 and IPL2
422 ipl_eckd_cdl();
425 /***********************************************************************
426 * IPL a SCSI disk
429 static void zipl_load_segment(ComponentEntry *entry)
431 const int max_entries = (MAX_SECTOR_SIZE / sizeof(ScsiBlockPtr));
432 ScsiBlockPtr *bprs = (void *)sec;
433 const int bprs_size = sizeof(sec);
434 block_number_t blockno;
435 uint64_t address;
436 int i;
437 char err_msg[] = "zIPL failed to read BPRS at 0xZZZZZZZZZZZZZZZZ";
438 char *blk_no = &err_msg[30]; /* where to print blockno in (those ZZs) */
440 blockno = entry->data.blockno;
441 address = entry->load_address;
443 debug_print_int("loading segment at block", blockno);
444 debug_print_int("addr", address);
446 do {
447 memset(bprs, FREE_SPACE_FILLER, bprs_size);
448 fill_hex_val(blk_no, &blockno, sizeof(blockno));
449 read_block(blockno, bprs, err_msg);
451 for (i = 0;; i++) {
452 uint64_t *cur_desc = (void *)&bprs[i];
454 blockno = bprs[i].blockno;
455 if (!blockno) {
456 break;
459 /* we need the updated blockno for the next indirect entry in the
460 chain, but don't want to advance address */
461 if (i == (max_entries - 1)) {
462 break;
465 if (bprs[i].blockct == 0 && unused_space(&bprs[i + 1],
466 sizeof(ScsiBlockPtr))) {
467 /* This is a "continue" pointer.
468 * This ptr is the last one in the current script section.
469 * I.e. the next ptr must point to the unused memory area.
470 * The blockno is not zero, so the upper loop must continue
471 * reading next section of BPRS.
473 break;
475 address = virtio_load_direct(cur_desc[0], cur_desc[1], 0,
476 (void *)address);
477 IPL_assert(address != -1, "zIPL load segment failed");
479 } while (blockno);
482 /* Run a zipl program */
483 static void zipl_run(ScsiBlockPtr *pte)
485 ComponentHeader *header;
486 ComponentEntry *entry;
487 uint8_t tmp_sec[MAX_SECTOR_SIZE];
489 read_block(pte->blockno, tmp_sec, "Cannot read header");
490 header = (ComponentHeader *)tmp_sec;
492 IPL_assert(magic_match(tmp_sec, ZIPL_MAGIC), "No zIPL magic in header");
493 IPL_assert(header->type == ZIPL_COMP_HEADER_IPL, "Bad header type");
495 dputs("start loading images\n");
497 /* Load image(s) into RAM */
498 entry = (ComponentEntry *)(&header[1]);
499 while (entry->component_type == ZIPL_COMP_ENTRY_LOAD ||
500 entry->component_type == ZIPL_COMP_ENTRY_SIGNATURE) {
502 /* We don't support secure boot yet, so we skip signature entries */
503 if (entry->component_type == ZIPL_COMP_ENTRY_SIGNATURE) {
504 entry++;
505 continue;
508 zipl_load_segment(entry);
510 entry++;
512 IPL_assert((uint8_t *)(&entry[1]) <= (tmp_sec + MAX_SECTOR_SIZE),
513 "Wrong entry value");
516 IPL_assert(entry->component_type == ZIPL_COMP_ENTRY_EXEC, "No EXEC entry");
518 /* should not return */
519 jump_to_IPL_code(entry->load_address);
522 static void ipl_scsi(void)
524 ScsiMbr *mbr = (void *)sec;
525 int program_table_entries = 0;
526 BootMapTable *prog_table = (void *)sec;
527 unsigned int loadparm = get_loadparm_index();
528 bool valid_entries[MAX_BOOT_ENTRIES] = {false};
529 size_t i;
531 /* Grab the MBR */
532 memset(sec, FREE_SPACE_FILLER, sizeof(sec));
533 read_block(0, mbr, "Cannot read block 0");
535 if (!magic_match(mbr->magic, ZIPL_MAGIC)) {
536 return;
539 sclp_print("Using SCSI scheme.\n");
540 debug_print_int("MBR Version", mbr->version_id);
541 IPL_check(mbr->version_id == 1,
542 "Unknown MBR layout version, assuming version 1");
543 debug_print_int("program table", mbr->pt.blockno);
544 IPL_assert(mbr->pt.blockno, "No Program Table");
546 /* Parse the program table */
547 read_block(mbr->pt.blockno, sec, "Error reading Program Table");
548 IPL_assert(magic_match(sec, ZIPL_MAGIC), "No zIPL magic in PT");
550 for (i = 0; i < MAX_BOOT_ENTRIES; i++) {
551 if (prog_table->entry[i].scsi.blockno) {
552 valid_entries[i] = true;
553 program_table_entries++;
557 debug_print_int("program table entries", program_table_entries);
558 IPL_assert(program_table_entries != 0, "Empty Program Table");
560 if (menu_is_enabled_enum()) {
561 loadparm = menu_get_enum_boot_index(valid_entries);
564 debug_print_int("loadparm", loadparm);
565 IPL_assert(loadparm < MAX_BOOT_ENTRIES, "loadparm value greater than"
566 " maximum number of boot entries allowed");
568 zipl_run(&prog_table->entry[loadparm].scsi); /* no return */
571 /***********************************************************************
572 * IPL El Torito ISO9660 image or DVD
575 static bool is_iso_bc_entry_compatible(IsoBcSection *s)
577 uint8_t *magic_sec = (uint8_t *)(sec + ISO_SECTOR_SIZE);
579 if (s->unused || !s->sector_count) {
580 return false;
582 read_iso_sector(bswap32(s->load_rba), magic_sec,
583 "Failed to read image sector 0");
585 /* Checking bytes 8 - 32 for S390 Linux magic */
586 return !memcmp(magic_sec + 8, linux_s390_magic, 24);
589 /* Location of the current sector of the directory */
590 static uint32_t sec_loc[ISO9660_MAX_DIR_DEPTH];
591 /* Offset in the current sector of the directory */
592 static uint32_t sec_offset[ISO9660_MAX_DIR_DEPTH];
593 /* Remained directory space in bytes */
594 static uint32_t dir_rem[ISO9660_MAX_DIR_DEPTH];
596 static inline uint32_t iso_get_file_size(uint32_t load_rba)
598 IsoVolDesc *vd = (IsoVolDesc *)sec;
599 IsoDirHdr *cur_record = &vd->vd.primary.rootdir;
600 uint8_t *temp = sec + ISO_SECTOR_SIZE;
601 int level = 0;
603 read_iso_sector(ISO_PRIMARY_VD_SECTOR, sec,
604 "Failed to read ISO primary descriptor");
605 sec_loc[0] = iso_733_to_u32(cur_record->ext_loc);
606 dir_rem[0] = 0;
607 sec_offset[0] = 0;
609 while (level >= 0) {
610 IPL_assert(sec_offset[level] <= ISO_SECTOR_SIZE,
611 "Directory tree structure violation");
613 cur_record = (IsoDirHdr *)(temp + sec_offset[level]);
615 if (sec_offset[level] == 0) {
616 read_iso_sector(sec_loc[level], temp,
617 "Failed to read ISO directory");
618 if (dir_rem[level] == 0) {
619 /* Skip self and parent records */
620 dir_rem[level] = iso_733_to_u32(cur_record->data_len) -
621 cur_record->dr_len;
622 sec_offset[level] += cur_record->dr_len;
624 cur_record = (IsoDirHdr *)(temp + sec_offset[level]);
625 dir_rem[level] -= cur_record->dr_len;
626 sec_offset[level] += cur_record->dr_len;
627 continue;
631 if (!cur_record->dr_len || sec_offset[level] == ISO_SECTOR_SIZE) {
632 /* Zero-padding and/or the end of current sector */
633 dir_rem[level] -= ISO_SECTOR_SIZE - sec_offset[level];
634 sec_offset[level] = 0;
635 sec_loc[level]++;
636 } else {
637 /* The directory record is valid */
638 if (load_rba == iso_733_to_u32(cur_record->ext_loc)) {
639 return iso_733_to_u32(cur_record->data_len);
642 dir_rem[level] -= cur_record->dr_len;
643 sec_offset[level] += cur_record->dr_len;
645 if (cur_record->file_flags & 0x2) {
646 /* Subdirectory */
647 if (level == ISO9660_MAX_DIR_DEPTH - 1) {
648 sclp_print("ISO-9660 directory depth limit exceeded\n");
649 } else {
650 level++;
651 sec_loc[level] = iso_733_to_u32(cur_record->ext_loc);
652 sec_offset[level] = 0;
653 dir_rem[level] = 0;
654 continue;
659 if (dir_rem[level] == 0) {
660 /* Nothing remaining */
661 level--;
662 read_iso_sector(sec_loc[level], temp,
663 "Failed to read ISO directory");
667 return 0;
670 static void load_iso_bc_entry(IsoBcSection *load)
672 IsoBcSection s = *load;
674 * According to spec, extent for each file
675 * is padded and ISO_SECTOR_SIZE bytes aligned
677 uint32_t blks_to_load = bswap16(s.sector_count) >> ET_SECTOR_SHIFT;
678 uint32_t real_size = iso_get_file_size(bswap32(s.load_rba));
680 if (real_size) {
681 /* Round up blocks to load */
682 blks_to_load = (real_size + ISO_SECTOR_SIZE - 1) / ISO_SECTOR_SIZE;
683 sclp_print("ISO boot image size verified\n");
684 } else {
685 sclp_print("ISO boot image size could not be verified\n");
688 read_iso_boot_image(bswap32(s.load_rba),
689 (void *)((uint64_t)bswap16(s.load_segment)),
690 blks_to_load);
692 jump_to_low_kernel();
695 static uint32_t find_iso_bc(void)
697 IsoVolDesc *vd = (IsoVolDesc *)sec;
698 uint32_t block_num = ISO_PRIMARY_VD_SECTOR;
700 if (virtio_read_many(block_num++, sec, 1)) {
701 /* If primary vd cannot be read, there is no boot catalog */
702 return 0;
705 while (is_iso_vd_valid(vd) && vd->type != VOL_DESC_TERMINATOR) {
706 if (vd->type == VOL_DESC_TYPE_BOOT) {
707 IsoVdElTorito *et = &vd->vd.boot;
709 if (!memcmp(&et->el_torito[0], el_torito_magic, 32)) {
710 return bswap32(et->bc_offset);
713 read_iso_sector(block_num++, sec,
714 "Failed to read ISO volume descriptor");
717 return 0;
720 static IsoBcSection *find_iso_bc_entry(void)
722 IsoBcEntry *e = (IsoBcEntry *)sec;
723 uint32_t offset = find_iso_bc();
724 int i;
725 unsigned int loadparm = get_loadparm_index();
727 if (!offset) {
728 return NULL;
731 read_iso_sector(offset, sec, "Failed to read El Torito boot catalog");
733 if (!is_iso_bc_valid(e)) {
734 /* The validation entry is mandatory */
735 panic("No valid boot catalog found!\n");
736 return NULL;
740 * Each entry has 32 bytes size, so one sector cannot contain > 64 entries.
741 * We consider only boot catalogs with no more than 64 entries.
743 for (i = 1; i < ISO_BC_ENTRY_PER_SECTOR; i++) {
744 if (e[i].id == ISO_BC_BOOTABLE_SECTION) {
745 if (is_iso_bc_entry_compatible(&e[i].body.sect)) {
746 if (loadparm <= 1) {
747 /* found, default, or unspecified */
748 return &e[i].body.sect;
750 loadparm--;
755 panic("No suitable boot entry found on ISO-9660 media!\n");
757 return NULL;
760 static void ipl_iso_el_torito(void)
762 IsoBcSection *s = find_iso_bc_entry();
764 if (s) {
765 load_iso_bc_entry(s);
766 /* no return */
770 /***********************************************************************
771 * Bus specific IPL sequences
774 static void zipl_load_vblk(void)
776 if (virtio_guessed_disk_nature()) {
777 virtio_assume_iso9660();
779 ipl_iso_el_torito();
781 if (virtio_guessed_disk_nature()) {
782 sclp_print("Using guessed DASD geometry.\n");
783 virtio_assume_eckd();
785 ipl_eckd();
788 static void zipl_load_vscsi(void)
790 if (virtio_get_block_size() == VIRTIO_ISO_BLOCK_SIZE) {
791 /* Is it an ISO image in non-CD drive? */
792 ipl_iso_el_torito();
795 sclp_print("Using guessed DASD geometry.\n");
796 virtio_assume_eckd();
797 ipl_eckd();
800 /***********************************************************************
801 * IPL starts here
804 void zipl_load(void)
806 VDev *vdev = virtio_get_device();
808 if (vdev->is_cdrom) {
809 ipl_iso_el_torito();
810 panic("\n! Cannot IPL this ISO image !\n");
813 if (virtio_get_device_type() == VIRTIO_ID_NET) {
814 jump_to_IPL_code(vdev->netboot_start_addr);
817 ipl_scsi();
819 switch (virtio_get_device_type()) {
820 case VIRTIO_ID_BLOCK:
821 zipl_load_vblk();
822 break;
823 case VIRTIO_ID_SCSI:
824 zipl_load_vscsi();
825 break;
826 default:
827 panic("\n! Unknown IPL device type !\n");
830 panic("\n* this can never happen *\n");