]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - arch/x86/boot/edd.c
Merge branch 'kconfig' of git://git.kernel.org/pub/scm/linux/kernel/git/mmarek/kbuild
[mirror_ubuntu-bionic-kernel.git] / arch / x86 / boot / edd.c
CommitLineData
d13444a5
PA
1/* -*- linux-c -*- ------------------------------------------------------- *
2 *
3 * Copyright (C) 1991, 1992 Linus Torvalds
4 * Copyright 2007 rPath, Inc. - All Rights Reserved
3435d347 5 * Copyright 2009 Intel Corporation; author H. Peter Anvin
d13444a5
PA
6 *
7 * This file is part of the Linux kernel, and is made available under
8 * the terms of the GNU General Public License version 2.
9 *
10 * ----------------------------------------------------------------------- */
11
12/*
d13444a5
PA
13 * Get EDD BIOS disk information
14 */
15
16#include "boot.h"
17#include <linux/edd.h>
18
19#if defined(CONFIG_EDD) || defined(CONFIG_EDD_MODULE)
20
d13444a5
PA
21/*
22 * Read the MBR (first sector) from a specific device.
23 */
24static int read_mbr(u8 devno, void *buf)
25{
3435d347 26 struct biosregs ireg, oreg;
d13444a5 27
3435d347
PA
28 initregs(&ireg);
29 ireg.ax = 0x0201; /* Legacy Read, one sector */
30 ireg.cx = 0x0001; /* Sector 0-0-1 */
31 ireg.dl = devno;
32 ireg.bx = (size_t)buf;
d13444a5 33
3435d347
PA
34 intcall(0x13, &ireg, &oreg);
35
36 return -(oreg.eflags & X86_EFLAGS_CF); /* 0 or -1 */
d13444a5
PA
37}
38
9a5f35d4 39static u32 read_mbr_sig(u8 devno, struct edd_info *ei, u32 *mbrsig)
d13444a5
PA
40{
41 int sector_size;
42 char *mbrbuf_ptr, *mbrbuf_end;
d13444a5
PA
43 u32 buf_base, mbr_base;
44 extern char _end[];
6cdcdb99 45 u16 mbr_magic;
d13444a5
PA
46
47 sector_size = ei->params.bytes_per_sector;
48 if (!sector_size)
49 sector_size = 512; /* Best available guess */
50
ff659d13 51 /* Produce a naturally aligned buffer on the heap */
d13444a5
PA
52 buf_base = (ds() << 4) + (u32)&_end;
53 mbr_base = (buf_base+sector_size-1) & ~(sector_size-1);
ff659d13 54 mbrbuf_ptr = _end + (mbr_base-buf_base);
d13444a5
PA
55 mbrbuf_end = mbrbuf_ptr + sector_size;
56
ff659d13 57 /* Make sure we actually have space on the heap... */
d13444a5 58 if (!(boot_params.hdr.loadflags & CAN_USE_HEAP))
9a5f35d4 59 return -1;
d13444a5 60 if (mbrbuf_end > (char *)(size_t)boot_params.hdr.heap_end_ptr)
9a5f35d4 61 return -1;
d13444a5 62
6cdcdb99 63 memset(mbrbuf_ptr, 0, sector_size);
d13444a5 64 if (read_mbr(devno, mbrbuf_ptr))
9a5f35d4 65 return -1;
d13444a5 66
9a5f35d4 67 *mbrsig = *(u32 *)&mbrbuf_ptr[EDD_MBR_SIG_OFFSET];
6cdcdb99
AB
68 mbr_magic = *(u16 *)&mbrbuf_ptr[510];
69
70 /* check for valid MBR magic */
71 return mbr_magic == 0xAA55 ? 0 : -1;
d13444a5
PA
72}
73
74static int get_edd_info(u8 devno, struct edd_info *ei)
75{
3435d347 76 struct biosregs ireg, oreg;
d13444a5
PA
77
78 memset(ei, 0, sizeof *ei);
79
80 /* Check Extensions Present */
81
3435d347
PA
82 initregs(&ireg);
83 ireg.ah = 0x41;
84 ireg.bx = EDDMAGIC1;
85 ireg.dl = devno;
86 intcall(0x13, &ireg, &oreg);
d13444a5 87
3435d347 88 if (oreg.eflags & X86_EFLAGS_CF)
d13444a5
PA
89 return -1; /* No extended information */
90
3435d347 91 if (oreg.bx != EDDMAGIC2)
d13444a5
PA
92 return -1;
93
94 ei->device = devno;
3435d347
PA
95 ei->version = oreg.ah; /* EDD version number */
96 ei->interface_support = oreg.cx; /* EDD functionality subsets */
d13444a5
PA
97
98 /* Extended Get Device Parameters */
99
100 ei->params.length = sizeof(ei->params);
3435d347
PA
101 ireg.ah = 0x48;
102 ireg.si = (size_t)&ei->params;
103 intcall(0x13, &ireg, &oreg);
d13444a5
PA
104
105 /* Get legacy CHS parameters */
106
107 /* Ralf Brown recommends setting ES:DI to 0:0 */
3435d347
PA
108 ireg.ah = 0x08;
109 ireg.es = 0;
110 intcall(0x13, &ireg, &oreg);
111
112 if (!(oreg.eflags & X86_EFLAGS_CF)) {
113 ei->legacy_max_cylinder = oreg.ch + ((oreg.cl & 0xc0) << 2);
114 ei->legacy_max_head = oreg.dh;
115 ei->legacy_sectors_per_track = oreg.cl & 0x3f;
d13444a5
PA
116 }
117
118 return 0;
119}
120
121void query_edd(void)
122{
123 char eddarg[8];
124 int do_mbr = 1;
8c4dd606
TG
125#ifdef CONFIG_EDD_OFF
126 int do_edd = 0;
127#else
d13444a5 128 int do_edd = 1;
8c4dd606 129#endif
e479c830 130 int be_quiet;
d13444a5
PA
131 int devno;
132 struct edd_info ei, *edp;
9a5f35d4 133 u32 *mbrptr;
d13444a5
PA
134
135 if (cmdline_find_option("edd", eddarg, sizeof eddarg) > 0) {
8c4dd606
TG
136 if (!strcmp(eddarg, "skipmbr") || !strcmp(eddarg, "skip")) {
137 do_edd = 1;
d13444a5 138 do_mbr = 0;
8c4dd606 139 }
d13444a5
PA
140 else if (!strcmp(eddarg, "off"))
141 do_edd = 0;
8c4dd606
TG
142 else if (!strcmp(eddarg, "on"))
143 do_edd = 1;
d13444a5
PA
144 }
145
e479c830 146 be_quiet = cmdline_find_option_bool("quiet");
147
9a5f35d4
PA
148 edp = boot_params.eddbuf;
149 mbrptr = boot_params.edd_mbr_sig_buffer;
d13444a5
PA
150
151 if (!do_edd)
152 return;
153
e479c830 154 /* Bugs in OnBoard or AddOnCards Bios may hang the EDD probe,
155 * so give a hint if this happens.
156 */
157
158 if (!be_quiet)
b7107636 159 printf("Probing EDD (edd=off to disable)... ");
e479c830 160
d13444a5
PA
161 for (devno = 0x80; devno < 0x80+EDD_MBR_SIG_MAX; devno++) {
162 /*
163 * Scan the BIOS-supported hard disks and query EDD
164 * information...
165 */
f2ba9392
JB
166 if (!get_edd_info(devno, &ei)
167 && boot_params.eddbuf_entries < EDDMAXNR) {
d13444a5
PA
168 memcpy(edp, &ei, sizeof ei);
169 edp++;
170 boot_params.eddbuf_entries++;
171 }
172
9a5f35d4
PA
173 if (do_mbr && !read_mbr_sig(devno, &ei, mbrptr++))
174 boot_params.edd_mbr_sig_buf_entries = devno-0x80+1;
d13444a5 175 }
e479c830 176
177 if (!be_quiet)
f7775016 178 printf("ok\n");
d13444a5
PA
179}
180
181#endif