Imported Upstream version 3.7
[debian/elilo] / x86_64 / bzimage.c
diff --git a/x86_64/bzimage.c b/x86_64/bzimage.c
new file mode 100644 (file)
index 0000000..2eb4f46
--- /dev/null
@@ -0,0 +1,224 @@
+/*
+ *  Copyright (C) 2001-2003 Hewlett-Packard Co.
+ *     Contributed by Stephane Eranian <eranian@hpl.hp.com>
+ *     Contributed by Mike Johnston <johnston@intel.com>
+ *     Contributed by Chris Ahna <christopher.j.ahna@intel.com>
+ *
+ * This file is part of the ELILO, the EFI Linux boot loader.
+ *
+ *  ELILO is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU General Public License as published by
+ *  the Free Software Foundation; either version 2, or (at your option)
+ *  any later version.
+ *
+ *  ELILO is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU General Public License
+ *  along with ELILO; see the file COPYING.  If not, write to the Free
+ *  Software Foundation, 59 Temple Place - Suite 330, Boston, MA
+ *  02111-1307, USA.
+ *
+ * Please check out the elilo.txt for complete documentation on how
+ * to use this program.
+ */
+
+#include <efi.h>
+#include <efilib.h>
+
+#include "elilo.h"
+#include "loader.h"
+
+boot_params_t *param_start = NULL;
+UINTN param_size = 0;
+
+UINTN kernel_size = 0x400000;  /* 4M (largest x86 bzImage kernel image) */
+
+static INTN
+bzImage_probe(CHAR16 *kname)
+{
+       EFI_STATUS efi_status;
+       UINTN size;
+       fops_fd_t fd;
+       UINT8 bootsect[512];
+
+       DBG_PRT((L"probe_bzImage_boot()\n"));
+
+       if (!kname) {
+               ERR_PRT((L"kname == %xh", kname));
+               free_kmem();
+               return -1;
+       }
+
+       /* 
+        * Open kernel image. 
+        */
+       DBG_PRT((L"opening %s...\n", kname));
+
+       efi_status = fops_open(kname, &fd);
+       if (EFI_ERROR(efi_status)) {
+               ERR_PRT((L"Could not open %s.", kname));
+               free_kmem();
+               return -1;
+       }
+       /*
+        * Read boot sector.
+        */
+
+       DBG_PRT((L"\nreading boot sector...\n"));
+
+       size = sizeof bootsect;
+       efi_status = fops_read(fd, bootsect, &size);
+       if (EFI_ERROR(efi_status) || size != sizeof bootsect) {
+               ERR_PRT((L"Could not read boot sector from %s.", kname));
+               fops_close(fd);
+               free_kmem();
+               return -1;
+       }
+       /*
+        * Verify boot sector signature.
+        */
+
+       if (bootsect[0x1FE] != 0x55 || bootsect[0x1FF] != 0xAA) {
+               ERR_PRT((L"%s is not a bzImage kernel image.\n", kname));
+               fops_close(fd);
+               free_kmem();
+               return -1;
+       }
+       /*
+        * Check for out of range setup data size.
+        * Will almost always be 7, but we will accept 1 to 64.
+        */
+
+       DBG_PRT((L"bootsect[1F1h] == %d setup sectors\n", bootsect[0x1F1]));
+
+       if (bootsect[0x1F1] < 1 || bootsect[0x1F1] > 64) {
+               ERR_PRT((L"%s is not a valid bzImage kernel image.",
+                       kname));
+               fops_close(fd);
+               free_kmem();
+               return -1;
+       }
+       /*
+        * Allocate and read setup data.
+        */
+
+       DBG_PRT((L"reading setup data...\n"));
+
+       param_size = (bootsect[0x1F1] + 1) * 512;
+       param_start = alloc(param_size, EfiLoaderData);
+
+       DBG_PRT((L"param_size=%d param_start=%x", param_size, param_start));
+
+       if (!param_start) {
+               ERR_PRT((L"Could not allocate %d bytes of setup data.",
+                       param_size));
+               fops_close(fd);
+               free_kmem();
+               return -1;
+       }
+
+       CopyMem(param_start, bootsect, sizeof bootsect);
+
+       size = param_size - 512;
+       efi_status = fops_read(fd, ((UINT8 *)param_start) + 512, &size);
+
+       if (EFI_ERROR(efi_status) || size != param_size - 512) {
+               ERR_PRT((L"Could not read %d bytes of setup data.",
+                       param_size - 512));
+               free(param_start);
+               param_start = NULL;
+               param_size = 0;
+               fops_close(fd);
+               free_kmem();
+               return -1;
+       }
+       /*
+        * Check for setup data signature.
+        */
+
+       { 
+               UINT8 *c = ((UINT8 *)param_start)+514;
+               DBG_PRT((L"param_start(c=%x): %c-%c-%c-%c", 
+                       c, (CHAR16)c[0],(CHAR16) c[1], (CHAR16)c[2], (CHAR16)c[3]));
+       }
+       if (CompareMem(((UINT8 *)param_start) + 514, "HdrS", 4)) {
+               ERR_PRT((L"%s does not have a setup signature.",
+                       kname));
+               free(param_start);
+               param_start = NULL;
+               param_size = 0;
+               fops_close(fd);
+               free_kmem();
+               return -1;
+       }
+       /*
+        * Allocate memory for kernel.
+        */
+
+       if (alloc_kmem(kernel_start, EFI_SIZE_TO_PAGES(kernel_size))) {
+               ERR_PRT((L"Could not allocate kernel memory."));
+               return -1;
+       } else {
+               VERB_PRT(3, Print(L"kernel_start: 0x%x  kernel_size: %d\n", 
+                       kernel_start, kernel_size));
+       }
+       /*
+        * Now read the rest of the kernel image into memory.
+        */
+
+       DBG_PRT((L"reading kernel image...\n"));
+
+       size = kernel_size;
+       efi_status = fops_read(fd, kernel_start, &size);
+       if (EFI_ERROR(efi_status) || size < 0x10000) {
+               ERR_PRT((L"Error reading kernel image %s.", kname));
+               free(param_start);
+               param_start = NULL;
+               param_size = 0;
+               fops_close(fd);
+               free_kmem();
+               return -1;
+       }
+
+       DBG_PRT((L"kernel image read:  %d bytes, %d Kbytes\n", size, size / 1024));
+
+       /*
+        * Boot sector, setup data and kernel image loaded.
+        */
+
+       fops_close(fd);
+       return 0;
+}
+
+/* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
+static INTN
+bzImage_load(CHAR16 *kname, kdesc_t *kd)
+{
+       DBG_PRT((L"load_bzImage_boot()\n"));
+
+       if (!kname || !kd) {
+               ERR_PRT((L"kname=0x%x  kd=0x%x", kname, kd));
+               free(param_start);
+               param_start = NULL;
+               param_size = 0;
+               free_kmem();
+               return -1;
+       }
+       kd->kstart = kd->kentry = kernel_start;
+       kd->kend = ((UINT8 *)kd->kstart) + kernel_size;
+
+       DBG_PRT((L"kstart=0x%x  kentry=0x%x  kend=0x%x\n", kd->kstart, kd->kentry, kd->kend));
+
+       return 0;
+}
+
+/* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
+loader_ops_t bzimage_loader = {
+       NULL,
+       L"bzImage_loader",
+       &bzImage_probe,
+       &bzImage_load
+};