From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689468; cv=none; d=zohomail.com; s=zohoarc; b=kkyL/VkoLJ06i6z27Mljw5t0k8MJWf05K10ksX/8J4xX8djnT01TMcKfDxLFXWFX3K435xKgC16/mhejOXuCaRI7vC6AbMbhyYVQlwgUxEQPGHgLosw4pKbCa4QhBOcwQiKB3UXwUWqs3KaXlWnPBTbyPRY/dboDHe0Mq7soIxU= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689468; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=nMdZnBrKkWFvnvehawgN3qYw3SvqcC5NKcOrdw9qwcU=; b=aImu4nQpTxWnulHxf/Y9FC/F1f2PCPONblVSgm0AO/q+E904rog+PXvdCkWho3lS8jiDtu0flcKtOtW1bChHfEoCAos4Lgra4MN28v/8vtverL/3wWXb8h0eFwzIy1O8XugYO7cRlpJrjUo5S980OUeMiOTSYO2/BVgJHbHhRGE= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689468314344.48383001399145; Wed, 23 Oct 2024 06:17:48 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bEx-00064n-CV; Wed, 23 Oct 2024 09:17:31 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEu-0005y2-Sb for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:29 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEq-00028L-85 for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:25 -0400 Received: from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-459-pZHT8jlJNnWT7fLOHYmefA-1; Wed, 23 Oct 2024 09:17:17 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 52D7D1955D42; Wed, 23 Oct 2024 13:17:16 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 363961956054; Wed, 23 Oct 2024 13:17:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689441; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=nMdZnBrKkWFvnvehawgN3qYw3SvqcC5NKcOrdw9qwcU=; b=HmuZ9/MwhFp0MWhYSCZqcD3gUZS0IYan3KQiqeGNvIPercDGBlh5uh5LX3A1KhF7hBErPI beWs0Ja9X39e+fihcVv1VypLkcXm4RMwAxC73wrxV+hYovYGdmyB7ssSz1hn71pDZWDUzo zyxV71ZHE5l/psDeOTvYPg+KJfDB73o= X-MC-Unique: pZHT8jlJNnWT7fLOHYmefA-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell Subject: [PULL 01/23] hw/s390x/ipl: Provide more memory to the s390-ccw.img firmware Date: Wed, 23 Oct 2024 15:16:48 +0200 Message-ID: <20241023131710.906748-2-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689469962116600 Content-Type: text/plain; charset="utf-8" We are going to link the SLOF libc into the s390-ccw.img, and this libc needs more memory for providing space for malloc() and friends. Thus bump the memory size that we reserve for the bios to 3 MiB instead of only 2 MiB. While we're at it, add a proper check that there is really enough memory assigned to the machine before blindly using it. Message-ID: <20240621082422.136217-3-thuth@redhat.com> Signed-off-by: Thomas Huth --- hw/s390x/ipl.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/hw/s390x/ipl.c b/hw/s390x/ipl.c index 5ab7433908..5f60977ceb 100644 --- a/hw/s390x/ipl.c +++ b/hw/s390x/ipl.c @@ -45,6 +45,7 @@ #define INITRD_PARM_START 0x010408UL #define PARMFILE_START 0x001000UL #define ZIPL_IMAGE_START 0x009000UL +#define BIOS_MAX_SIZE 0x300000UL #define IPL_PSW_MASK (PSW_MASK_32 | PSW_MASK_64) =20 static bool iplb_extended_needed(void *opaque) @@ -144,7 +145,14 @@ static void s390_ipl_realize(DeviceState *dev, Error *= *errp) * even if an external kernel has been defined. */ if (!ipl->kernel || ipl->enforce_bios) { - uint64_t fwbase =3D (MIN(ms->ram_size, 0x80000000U) - 0x200000) & = ~0xffffUL; + uint64_t fwbase; + + if (ms->ram_size < BIOS_MAX_SIZE) { + error_setg(errp, "not enough RAM to load the BIOS file"); + return; + } + + fwbase =3D (MIN(ms->ram_size, 0x80000000U) - BIOS_MAX_SIZE) & ~0xf= fffUL; =20 bios_filename =3D qemu_find_file(QEMU_FILE_TYPE_BIOS, ipl->firmwar= e); if (bios_filename =3D=3D NULL) { --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689590; cv=none; d=zohomail.com; s=zohoarc; b=Wh314WgonTq0RmzB4C1ZsS+lPRabB9KwYYKH1z06pueg1EeFgm6e6afS9o/vkOyd5B/P1wEoJj/AULQhtcTl771V2TvlRpQEEeYVF+fjxAfr+8g3HIgDFHTSt4ofg4f3IKqYsCDxff7Zz1okjFP4rCZqaIxB6NdGMGncMpm8aZ8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689590; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=4XCfeTYniEww78d/dwQg0JTmkSstuI1O3dPihh1CuqM=; b=lY6ddnqFT4wGMrUAWO2isac7TlKKtn/VqRDpLbuzp/LeIteIvJnKJhVPrmNqqp7amCFfLe+Xi5nCtldAQS+1BdRlYgr4DZyfnFPq/2Nmm+WuZ8t1SQ9ZW79/cnlJG6c3C0j6QvpjqSTA3bS+NHNSepDYDNC9BKSAVmAKRtXwYW4= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689590653381.33774133207305; Wed, 23 Oct 2024 06:19:50 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFO-0006Lg-Ae; Wed, 23 Oct 2024 09:17:58 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEy-00065d-3q for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:32 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEu-00028V-LN for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:31 -0400 Received: from mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-517-yl83d69HM9ifAw1t7osNtw-1; Wed, 23 Oct 2024 09:17:21 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id DEA2A19540F2; Wed, 23 Oct 2024 13:17:19 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id CDBC219560AE; Wed, 23 Oct 2024 13:17:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689444; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4XCfeTYniEww78d/dwQg0JTmkSstuI1O3dPihh1CuqM=; b=Dcs4shFjSQtfCU6yzG8wkvBeNUqFJmHcp3gPEG2VbSG6V56I3/jERoEsY+5uxBrvyKOWnY ln1VBZGEYT6GWV6d25bHvNzKzCRzMsnuV//89wf3ZFJdYnxq//bgLZVI/A37FsVvPhaAN6 EDv0yMu7BB4yE+Mfk6FXs8g5U7wriQg= X-MC-Unique: yl83d69HM9ifAw1t7osNtw-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 02/23] pc-bios/s390-ccw: Use the libc from SLOF and remove sclp prints Date: Wed, 23 Oct 2024 15:16:49 +0200 Message-ID: <20241023131710.906748-3-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689592744116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi We are already using the libc from SLOF for the s390-netboot.img, and this libc implementation is way more complete and accurate than the simple implementation that we currently use for the s390-ccw.img binary. Since we are now always assuming that the SLOF submodule is available when building the s390-ccw bios (see commit bf6903f6944f), we can drop the simple implementation and use the SLOF libc for the s390-ccw.img binary, too. Additionally replace sclp_print calls with puts/printf now that it is available. Co-authored by: Thomas Huth Signed-off-by: Jared Rossi Message-ID: <20241020012953.1380075-3-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/netboot.mak | 3 - pc-bios/s390-ccw/bootmap.h | 4 +- pc-bios/s390-ccw/libc.h | 89 ------------------------- pc-bios/s390-ccw/s390-ccw.h | 30 +++------ pc-bios/s390-ccw/bootmap.c | 47 ++++++------- pc-bios/s390-ccw/cio.c | 78 ++++++++++------------ pc-bios/s390-ccw/dasd-ipl.c | 5 +- pc-bios/s390-ccw/jump2ipl.c | 5 +- pc-bios/s390-ccw/libc.c | 88 ------------------------ pc-bios/s390-ccw/main.c | 14 ++-- pc-bios/s390-ccw/menu.c | 51 +++++++------- pc-bios/s390-ccw/netmain.c | 10 +-- pc-bios/s390-ccw/sclp.c | 7 +- pc-bios/s390-ccw/virtio-blkdev.c | 6 +- pc-bios/s390-ccw/virtio-scsi.c | 17 ++--- pc-bios/s390-ccw/virtio.c | 2 +- tests/tcg/s390x/console.c | 3 + pc-bios/s390-ccw/Makefile | 15 +++-- tests/tcg/s390x/Makefile.softmmu-target | 2 +- 19 files changed, 140 insertions(+), 336 deletions(-) delete mode 100644 pc-bios/s390-ccw/libc.h delete mode 100644 pc-bios/s390-ccw/libc.c diff --git a/pc-bios/s390-ccw/netboot.mak b/pc-bios/s390-ccw/netboot.mak index 046aa35587..d2b3d8ee74 100644 --- a/pc-bios/s390-ccw/netboot.mak +++ b/pc-bios/s390-ccw/netboot.mak @@ -1,9 +1,6 @@ =20 -SLOF_DIR :=3D $(SRC_PATH)/../../roms/SLOF - NETOBJS :=3D start.o sclp.o cio.o virtio.o virtio-net.o jump2ipl.o netmain= .o =20 -LIBC_INC :=3D -nostdinc -I$(SLOF_DIR)/lib/libc/include LIBNET_INC :=3D -I$(SLOF_DIR)/lib/libnet =20 NETLDFLAGS :=3D $(LDFLAGS) -Wl,-Ttext=3D0x7800000 diff --git a/pc-bios/s390-ccw/bootmap.h b/pc-bios/s390-ccw/bootmap.h index d4690a88c2..4a7d8a91f1 100644 --- a/pc-bios/s390-ccw/bootmap.h +++ b/pc-bios/s390-ccw/bootmap.h @@ -336,9 +336,7 @@ static inline void print_volser(const void *volser) =20 ebcdic_to_ascii((char *)volser, ascii, 6); ascii[6] =3D '\0'; - sclp_print("VOLSER=3D["); - sclp_print(ascii); - sclp_print("]\n"); + printf("VOLSER=3D[%s]\n", ascii); } =20 static inline bool unused_space(const void *p, size_t size) diff --git a/pc-bios/s390-ccw/libc.h b/pc-bios/s390-ccw/libc.h deleted file mode 100644 index bcdc45732d..0000000000 --- a/pc-bios/s390-ccw/libc.h +++ /dev/null @@ -1,89 +0,0 @@ -/* - * libc-style definitions and functions - * - * Copyright (c) 2013 Alexander Graf - * - * This code is free software; you can redistribute it and/or modify it - * under the terms of the GNU General Public License as published by the - * Free Software Foundation; either version 2 of the License, or (at your - * option) any later version. - */ - -#ifndef S390_CCW_LIBC_H -#define S390_CCW_LIBC_H - -typedef unsigned long size_t; -typedef int bool; -typedef unsigned char uint8_t; -typedef unsigned short uint16_t; -typedef unsigned int uint32_t; -typedef unsigned long long uint64_t; - -static inline void *memset(void *s, int c, size_t n) -{ - size_t i; - unsigned char *p =3D s; - - for (i =3D 0; i < n; i++) { - p[i] =3D c; - } - - return s; -} - -static inline void *memcpy(void *s1, const void *s2, size_t n) -{ - uint8_t *dest =3D s1; - const uint8_t *src =3D s2; - size_t i; - - for (i =3D 0; i < n; i++) { - dest[i] =3D src[i]; - } - - return s1; -} - -static inline int memcmp(const void *s1, const void *s2, size_t n) -{ - size_t i; - const uint8_t *p1 =3D s1, *p2 =3D s2; - - for (i =3D 0; i < n; i++) { - if (p1[i] !=3D p2[i]) { - return p1[i] > p2[i] ? 1 : -1; - } - } - - return 0; -} - -static inline size_t strlen(const char *str) -{ - size_t i; - for (i =3D 0; *str; i++) { - str++; - } - return i; -} - -static inline char *strcat(char *dest, const char *src) -{ - int i; - char *dest_end =3D dest + strlen(dest); - - for (i =3D 0; i <=3D strlen(src); i++) { - dest_end[i] =3D src[i]; - } - return dest; -} - -static inline int isdigit(int c) -{ - return (c >=3D '0') && (c <=3D '9'); -} - -uint64_t atoui(const char *str); -char *uitoa(uint64_t num, char *str, size_t len); - -#endif diff --git a/pc-bios/s390-ccw/s390-ccw.h b/pc-bios/s390-ccw/s390-ccw.h index c977a52b50..6f6d95d170 100644 --- a/pc-bios/s390-ccw/s390-ccw.h +++ b/pc-bios/s390-ccw/s390-ccw.h @@ -13,6 +13,11 @@ =20 /* #define DEBUG */ =20 +#include +#include +#include +#include + typedef unsigned char u8; typedef unsigned short u16; typedef unsigned int u32; @@ -26,9 +31,6 @@ typedef unsigned long long u64; #define EBUSY 2 #define ENODEV 3 =20 -#ifndef NULL -#define NULL 0 -#endif #ifndef MIN #define MIN(a, b) (((a) < (b)) ? (a) : (b)) #endif @@ -87,7 +89,7 @@ bool menu_is_enabled_enum(void); __attribute__ ((__noreturn__)) static inline void panic(const char *string) { - sclp_print(string); + printf("ERROR: %s\n ", string); disabled_wait(); } =20 @@ -109,20 +111,10 @@ static inline void fill_hex_val(char *out, void *ptr,= unsigned size) } } =20 -static inline void print_int(const char *desc, u64 addr) -{ - char out[] =3D ": 0xffffffffffffffff\n"; - - fill_hex_val(&out[4], &addr, sizeof(addr)); - - sclp_print(desc); - sclp_print(out); -} - static inline void debug_print_int(const char *desc, u64 addr) { #ifdef DEBUG - print_int(desc, addr); + printf("%s 0x%X\n", desc, addr); #endif } =20 @@ -147,18 +139,14 @@ static inline void debug_print_addr(const char *desc,= void *p) static inline void IPL_assert(bool term, const char *message) { if (!term) { - sclp_print("\n! "); - sclp_print(message); - panic(" !\n"); /* no return */ + panic(message); /* no return */ } } =20 static inline void IPL_check(bool term, const char *message) { if (!term) { - sclp_print("\n! WARNING: "); - sclp_print(message); - sclp_print(" !\n"); + printf("WARNING: %s\n", message); } } =20 diff --git a/pc-bios/s390-ccw/bootmap.c b/pc-bios/s390-ccw/bootmap.c index a2137449dc..3cc79706be 100644 --- a/pc-bios/s390-ccw/bootmap.c +++ b/pc-bios/s390-ccw/bootmap.c @@ -8,7 +8,8 @@ * directory. */ =20 -#include "libc.h" +#include +#include #include "s390-ccw.h" #include "s390-arch.h" #include "bootmap.h" @@ -21,7 +22,7 @@ =20 #ifdef DEBUG_FALLBACK #define dputs(txt) \ - do { sclp_print("zipl: " txt); } while (0) + do { printf("zipl: " txt); } while (0) #else #define dputs(fmt, ...) \ do { } while (0) @@ -270,7 +271,7 @@ static int eckd_get_boot_menu_index(block_number_t s1b_= block_nr) prev_block_nr =3D cur_block_nr; } =20 - sclp_print("No zipl boot menu data found. Booting default entry."); + printf("No zipl boot menu data found. Booting default entry."); return 0; } =20 @@ -338,22 +339,22 @@ static void ipl_eckd_cdl(void) block_number_t bmt_block_nr, s1b_block_nr; =20 /* we have just read the block #0 and recognized it as "IPL1" */ - sclp_print("CDL\n"); + puts("CDL"); =20 memset(sec, FREE_SPACE_FILLER, sizeof(sec)); read_block(1, ipl2, "Cannot read IPL2 record at block 1"); =20 mbr =3D &ipl2->mbr; if (!magic_match(mbr, ZIPL_MAGIC)) { - sclp_print("No zIPL section in IPL2 record.\n"); + puts("No zIPL section in IPL2 record."); return; } if (!block_size_ok(mbr->blockptr.xeckd.bptr.size)) { - sclp_print("Bad block size in zIPL section of IPL2 record.\n"); + puts("Bad block size in zIPL section of IPL2 record."); return; } if (mbr->dev_type !=3D DEV_TYPE_ECKD) { - sclp_print("Non-ECKD device type in zIPL section of IPL2 record.\n= "); + puts("Non-ECKD device type in zIPL section of IPL2 record."); return; } =20 @@ -366,11 +367,11 @@ static void ipl_eckd_cdl(void) memset(sec, FREE_SPACE_FILLER, sizeof(sec)); read_block(2, vlbl, "Cannot read Volume Label at block 2"); if (!magic_match(vlbl->key, VOL1_MAGIC)) { - sclp_print("Invalid magic of volume label block.\n"); + puts("Invalid magic of volume label block."); return; } if (!magic_match(vlbl->f.key, VOL1_MAGIC)) { - sclp_print("Invalid magic of volser block.\n"); + puts("Invalid magic of volser block."); return; } print_volser(vlbl->f.volser); @@ -384,8 +385,8 @@ static void print_eckd_ldl_msg(ECKD_IPL_mode_t mode) LDL_VTOC *vlbl =3D (void *)sec; /* already read, 3rd block */ char msg[4] =3D { '?', '.', '\n', '\0' }; =20 - sclp_print((mode =3D=3D ECKD_CMS) ? "CMS" : "LDL"); - sclp_print(" version "); + printf((mode =3D=3D ECKD_CMS) ? "CMS" : "LDL"); + printf(" version "); switch (vlbl->LDL_version) { case LDL1_VERSION: msg[0] =3D '1'; @@ -398,7 +399,7 @@ static void print_eckd_ldl_msg(ECKD_IPL_mode_t mode) msg[1] =3D '?'; break; } - sclp_print(msg); + printf("%s", msg); print_volser(vlbl->volser); } =20 @@ -419,7 +420,7 @@ static void ipl_eckd_ldl(ECKD_IPL_mode_t mode) if (!magic_match(ipl1->bip.magic, ZIPL_MAGIC)) { return; /* not applicable layout */ } - sclp_print("unlabeled LDL.\n"); + puts("unlabeled LDL."); } verify_boot_info(&ipl1->bip); =20 @@ -466,7 +467,7 @@ static void print_eckd_msg(void) *p-- =3D ' '; } } - sclp_print(msg); + printf("%s", msg); } =20 static void ipl_eckd(void) @@ -488,11 +489,11 @@ static void ipl_eckd(void) if (eckd_valid_address((ExtEckdBlockPtr *)&vlbl->f.br, 0)) { ldipl_bmt =3D eckd_find_bmt((ExtEckdBlockPtr *)&vlbl->f.br); if (ldipl_bmt) { - sclp_print("List-Directed\n"); + puts("List-Directed"); /* LD-IPL does not use the S1B bock, just make it NULL */ run_eckd_boot_script(ldipl_bmt, NULL_BLOCK_NR); /* Only return in error, retry as CCW-IPL */ - sclp_print("Retrying IPL "); + printf("Retrying IPL "); print_eckd_msg(); } memset(sec, FREE_SPACE_FILLER, sizeof(sec)); @@ -634,7 +635,7 @@ static void ipl_scsi(void) return; } =20 - sclp_print("Using SCSI scheme.\n"); + puts("Using SCSI scheme."); debug_print_int("MBR Version", mbr->version_id); IPL_check(mbr->version_id =3D=3D 1, "Unknown MBR layout version, assuming version 1"); @@ -743,7 +744,7 @@ static inline uint32_t iso_get_file_size(uint32_t load_= rba) if (cur_record->file_flags & 0x2) { /* Subdirectory */ if (level =3D=3D ISO9660_MAX_DIR_DEPTH - 1) { - sclp_print("ISO-9660 directory depth limit exceeded\n"= ); + puts("ISO-9660 directory depth limit exceeded"); } else { level++; sec_loc[level] =3D iso_733_to_u32(cur_record->ext_loc); @@ -778,9 +779,9 @@ static void load_iso_bc_entry(IsoBcSection *load) if (real_size) { /* Round up blocks to load */ blks_to_load =3D (real_size + ISO_SECTOR_SIZE - 1) / ISO_SECTOR_SI= ZE; - sclp_print("ISO boot image size verified\n"); + puts("ISO boot image size verified"); } else { - sclp_print("ISO boot image size could not be verified\n"); + puts("ISO boot image size could not be verified"); } =20 read_iso_boot_image(bswap32(s.load_rba), @@ -896,7 +897,7 @@ static void zipl_load_vblk(void) } =20 if (blksize !=3D VIRTIO_DASD_DEFAULT_BLOCK_SIZE) { - sclp_print("Using guessed DASD geometry.\n"); + puts("Using guessed DASD geometry."); virtio_assume_eckd(); } ipl_eckd(); @@ -909,7 +910,7 @@ static void zipl_load_vscsi(void) ipl_iso_el_torito(); } =20 - sclp_print("Using guessed DASD geometry.\n"); + puts("Using guessed DASD geometry."); virtio_assume_eckd(); ipl_eckd(); } @@ -944,5 +945,5 @@ void zipl_load(void) panic("\n! Unknown IPL device type !\n"); } =20 - sclp_print("zIPL load failed.\n"); + puts("zIPL load failed."); } diff --git a/pc-bios/s390-ccw/cio.c b/pc-bios/s390-ccw/cio.c index 83ca27ab41..7b09a38c96 100644 --- a/pc-bios/s390-ccw/cio.c +++ b/pc-bios/s390-ccw/cio.c @@ -11,7 +11,8 @@ * directory. */ =20 -#include "libc.h" +#include +#include #include "s390-ccw.h" #include "s390-arch.h" #include "helper.h" @@ -90,9 +91,9 @@ static void print_eckd_dasd_sense_data(SenseDataEckdDasd = *sd) char msgline[512]; =20 if (sd->config_info & 0x8000) { - sclp_print("Eckd Dasd Sense Data (fmt 24-bytes):\n"); + puts("Eckd Dasd Sense Data (fmt 24-bytes):"); } else { - sclp_print("Eckd Dasd Sense Data (fmt 32-bytes):\n"); + puts("Eckd Dasd Sense Data (fmt 32-bytes):"); } =20 strcat(msgline, " Sense Condition Flags :"); @@ -158,22 +159,21 @@ static void print_eckd_dasd_sense_data(SenseDataEckdD= asd *sd) if (sd->status[1] & SNS_STAT2_IMPRECISE_END) { strcat(msgline, " [Imprecise-End]"); } - strcat(msgline, "\n"); - sclp_print(msgline); - - print_int(" Residual Count =3D", sd->res_count); - print_int(" Phys Drive ID =3D", sd->phys_drive_id); - print_int(" low cyl address =3D", sd->low_cyl_addr); - print_int(" head addr & hi cyl =3D", sd->head_high_cyl_addr); - print_int(" format/message =3D", sd->fmt_msg); - print_int(" fmt-dependent[0-7] =3D", sd->fmt_dependent_info[0]); - print_int(" fmt-dependent[8-15]=3D", sd->fmt_dependent_info[1]); - print_int(" prog action code =3D", sd->program_action_code); - print_int(" Configuration info =3D", sd->config_info); - print_int(" mcode / hi-cyl =3D", sd->mcode_hicyl); - print_int(" cyl & head addr [0]=3D", sd->cyl_head_addr[0]); - print_int(" cyl & head addr [1]=3D", sd->cyl_head_addr[1]); - print_int(" cyl & head addr [2]=3D", sd->cyl_head_addr[2]); + puts(msgline); + + printf(" Residual Count =3D 0x%X\n", sd->res_count); + printf(" Phys Drive ID =3D 0x%X\n", sd->phys_drive_id); + printf(" low cyl address =3D 0x%X\n", sd->low_cyl_addr); + printf(" head addr & hi cyl =3D 0x%X\n", sd->head_high_cyl_addr); + printf(" format/message =3D 0x%X\n", sd->fmt_msg); + printf(" fmt-dependent[0-7] =3D 0x%llX\n", sd->fmt_dependent_info[0= ]); + printf(" fmt-dependent[8-15]=3D 0x%llX\n", sd->fmt_dependent_info[1= ]); + printf(" prog action code =3D 0x%X\n", sd->program_action_code); + printf(" Configuration info =3D 0x%X\n", sd->config_info); + printf(" mcode / hi-cyl =3D 0x%X\n", sd->mcode_hicyl); + printf(" cyl & head addr [0]=3D 0x%X\n", sd->cyl_head_addr[0]); + printf(" cyl & head addr [1]=3D 0x%X\n", sd->cyl_head_addr[1]); + printf(" cyl & head addr [2]=3D 0x%X\n", sd->cyl_head_addr[2]); } =20 static void print_irb_err(Irb *irb) @@ -182,7 +182,7 @@ static void print_irb_err(Irb *irb) uint64_t prev_ccw =3D *(uint64_t *)u32toptr(irb->scsw.cpa - 8); char msgline[256]; =20 - sclp_print("Interrupt Response Block Data:\n"); + puts("Interrupt Response Block Data:"); =20 strcat(msgline, " Function Ctrl :"); if (irb->scsw.ctrl & SCSW_FCTL_START_FUNC) { @@ -194,8 +194,7 @@ static void print_irb_err(Irb *irb) if (irb->scsw.ctrl & SCSW_FCTL_CLEAR_FUNC) { strcat(msgline, " [Clear]"); } - strcat(msgline, "\n"); - sclp_print(msgline); + puts(msgline); =20 msgline[0] =3D '\0'; strcat(msgline, " Activity Ctrl :"); @@ -220,8 +219,7 @@ static void print_irb_err(Irb *irb) if (irb->scsw.ctrl & SCSW_ACTL_SUSPENDED) { strcat(msgline, " [Suspended]"); } - strcat(msgline, "\n"); - sclp_print(msgline); + puts(msgline); =20 msgline[0] =3D '\0'; strcat(msgline, " Status Ctrl :"); @@ -240,9 +238,7 @@ static void print_irb_err(Irb *irb) if (irb->scsw.ctrl & SCSW_SCTL_STATUS_PEND) { strcat(msgline, " [Status-Pending]"); } - - strcat(msgline, "\n"); - sclp_print(msgline); + puts(msgline); =20 msgline[0] =3D '\0'; strcat(msgline, " Device Status :"); @@ -270,8 +266,7 @@ static void print_irb_err(Irb *irb) if (irb->scsw.dstat & SCSW_DSTAT_UEXCP) { strcat(msgline, " [Unit-Exception]"); } - strcat(msgline, "\n"); - sclp_print(msgline); + puts(msgline); =20 msgline[0] =3D '\0'; strcat(msgline, " Channel Status :"); @@ -299,12 +294,11 @@ static void print_irb_err(Irb *irb) if (irb->scsw.cstat & SCSW_CSTAT_CHAINCHK) { strcat(msgline, " [Chaining-Check]"); } - strcat(msgline, "\n"); - sclp_print(msgline); + puts(msgline); =20 - print_int(" cpa=3D", irb->scsw.cpa); - print_int(" prev_ccw=3D", prev_ccw); - print_int(" this_ccw=3D", this_ccw); + printf(" cpa=3D 0x%X\n", irb->scsw.cpa); + printf(" prev_ccw=3D 0x%llX\n", prev_ccw); + printf(" this_ccw=3D 0x%llX\n", this_ccw); } =20 /* @@ -341,7 +335,7 @@ static int __do_cio(SubChannelId schid, uint32_t ccw_ad= dr, int fmt, Irb *irb) return -1; } if (rc) { - print_int("ssch failed with cc=3D", rc); + printf("ssch failed with cc=3D 0x%x\n", rc); return rc; } =20 @@ -350,7 +344,7 @@ static int __do_cio(SubChannelId schid, uint32_t ccw_ad= dr, int fmt, Irb *irb) /* collect status */ rc =3D tsch(schid, irb); if (rc) { - print_int("tsch failed with cc=3D", rc); + printf("tsch failed with cc=3D 0x%X\n", rc); } =20 return rc; @@ -406,12 +400,12 @@ int do_cio(SubChannelId schid, uint16_t cutype, uint3= 2_t ccw_addr, int fmt) continue; } =20 - sclp_print("cio device error\n"); - print_int(" ssid ", schid.ssid); - print_int(" cssid ", schid.cssid); - print_int(" sch_no", schid.sch_no); - print_int(" ctrl-unit type", cutype); - sclp_print("\n"); + printf("cio device error\n"); + printf(" ssid 0x%X\n", schid.ssid); + printf(" cssid 0x%X\n", schid.cssid); + printf(" sch_no 0x%X\n", schid.sch_no); + printf(" ctrl-unit type 0x%X\n", cutype); + printf("\n"); print_irb_err(&irb); if (cutype =3D=3D CU_TYPE_DASD_3990 || cutype =3D=3D CU_TYPE_DASD_= 2107 || cutype =3D=3D CU_TYPE_UNKNOWN) { diff --git a/pc-bios/s390-ccw/dasd-ipl.c b/pc-bios/s390-ccw/dasd-ipl.c index 254bb1a15e..ae751adec1 100644 --- a/pc-bios/s390-ccw/dasd-ipl.c +++ b/pc-bios/s390-ccw/dasd-ipl.c @@ -8,7 +8,8 @@ * directory. */ =20 -#include "libc.h" +#include +#include #include "s390-ccw.h" #include "s390-arch.h" #include "dasd-ipl.h" @@ -82,7 +83,7 @@ static int run_dynamic_ccw_program(SubChannelId schid, ui= nt16_t cutype, do { has_next =3D dynamic_cp_fixup(cpa, &next_cpa); =20 - print_int("executing ccw chain at ", cpa); + printf("executing ccw chain at 0x%X\n", cpa); enable_prefixing(); rc =3D do_cio(schid, cutype, cpa, CCW_FMT0); disable_prefixing(); diff --git a/pc-bios/s390-ccw/jump2ipl.c b/pc-bios/s390-ccw/jump2ipl.c index 78f5f46533..80b7f6a1f3 100644 --- a/pc-bios/s390-ccw/jump2ipl.c +++ b/pc-bios/s390-ccw/jump2ipl.c @@ -6,7 +6,8 @@ * directory. */ =20 -#include "libc.h" +#include +#include #include "s390-ccw.h" #include "s390-arch.h" =20 @@ -57,7 +58,7 @@ void jump_to_IPL_code(uint64_t address) debug_print_int("set IPL addr to", address ?: *reset_psw & PSW_MASK_SH= ORT_ADDR); =20 /* Ensure the guest output starts fresh */ - sclp_print("\n"); + printf("\n"); =20 /* * HACK ALERT. diff --git a/pc-bios/s390-ccw/libc.c b/pc-bios/s390-ccw/libc.c deleted file mode 100644 index 3187923950..0000000000 --- a/pc-bios/s390-ccw/libc.c +++ /dev/null @@ -1,88 +0,0 @@ -/* - * libc-style definitions and functions - * - * Copyright 2018 IBM Corp. - * Author(s): Collin L. Walling - * - * This code is free software; you can redistribute it and/or modify it - * under the terms of the GNU General Public License as published by the - * Free Software Foundation; either version 2 of the License, or (at your - * option) any later version. - */ - -#include "libc.h" -#include "s390-ccw.h" - -/** - * atoui: - * @str: the string to be converted. - * - * Given a string @str, convert it to an integer. Leading spaces are - * ignored. Any other non-numerical value will terminate the conversion - * and return 0. This function only handles numbers between 0 and - * UINT64_MAX inclusive. - * - * Returns: an integer converted from the string @str, or the number 0 - * if an error occurred. - */ -uint64_t atoui(const char *str) -{ - int val =3D 0; - - if (!str || !str[0]) { - return 0; - } - - while (*str =3D=3D ' ') { - str++; - } - - while (*str) { - if (!isdigit(*(unsigned char *)str)) { - break; - } - val =3D val * 10 + *str - '0'; - str++; - } - - return val; -} - -/** - * uitoa: - * @num: an integer (base 10) to be converted. - * @str: a pointer to a string to store the conversion. - * @len: the length of the passed string. - * - * Given an integer @num, convert it to a string. The string @str must be - * allocated beforehand. The resulting string will be null terminated and - * returned. This function only handles numbers between 0 and UINT64_MAX - * inclusive. - * - * Returns: the string @str of the converted integer @num - */ -char *uitoa(uint64_t num, char *str, size_t len) -{ - long num_idx =3D 1; /* account for NUL */ - uint64_t tmp =3D num; - - IPL_assert(str !=3D NULL, "uitoa: no space allocated to store string"); - - /* Count indices of num */ - while ((tmp /=3D 10) !=3D 0) { - num_idx++; - } - - /* Check if we have enough space for num and NUL */ - IPL_assert(len > num_idx, "uitoa: array too small for conversion"); - - str[num_idx--] =3D '\0'; - - /* Convert int to string */ - while (num_idx >=3D 0) { - str[num_idx--] =3D num % 10 + '0'; - num /=3D 10; - } - - return str; -} diff --git a/pc-bios/s390-ccw/main.c b/pc-bios/s390-ccw/main.c index 5506798098..203df20965 100644 --- a/pc-bios/s390-ccw/main.c +++ b/pc-bios/s390-ccw/main.c @@ -8,7 +8,9 @@ * directory. */ =20 -#include "libc.h" +#include +#include +#include #include "helper.h" #include "s390-arch.h" #include "s390-ccw.h" @@ -50,7 +52,7 @@ void write_iplb_location(void) =20 unsigned int get_loadparm_index(void) { - return atoui(loadparm_str); + return atoi(loadparm_str); } =20 static int is_dev_possibly_bootable(int dev_no, int sch_no) @@ -176,7 +178,7 @@ static void boot_setup(void) =20 sclp_get_loadparm_ascii(loadparm_str); memcpy(lpmsg + 10, loadparm_str, 8); - sclp_print(lpmsg); + puts(lpmsg); =20 /* * Clear out any potential S390EP magic (see jump_to_low_kernel()), @@ -228,7 +230,7 @@ static int virtio_setup(void) =20 switch (vdev->senseid.cu_model) { case VIRTIO_ID_NET: - sclp_print("Network boot device detected\n"); + puts("Network boot device detected"); vdev->netboot_start_addr =3D qipl.netboot_start_addr; return 0; case VIRTIO_ID_BLOCK: @@ -261,7 +263,7 @@ static void ipl_boot_device(void) } break; default: - print_int("Attempting to boot from unexpected device type", cutype= ); + printf("Attempting to boot from unexpected device type 0x%X\n", cu= type); panic("\nBoot failed.\n"); } } @@ -287,7 +289,7 @@ static void probe_boot_device(void) } } =20 - sclp_print("Could not find a suitable boot device (none specified)\n"); + puts("Could not find a suitable boot device (none specified)"); } =20 void main(void) diff --git a/pc-bios/s390-ccw/menu.c b/pc-bios/s390-ccw/menu.c index d601952d3e..84062e94af 100644 --- a/pc-bios/s390-ccw/menu.c +++ b/pc-bios/s390-ccw/menu.c @@ -9,7 +9,10 @@ * directory. */ =20 -#include "libc.h" +#include +#include +#include +#include #include "s390-ccw.h" #include "sclp.h" #include "s390-time.h" @@ -93,7 +96,7 @@ static int read_prompt(char *buf, size_t len) case KEYCODE_BACKSP: if (idx > 0) { buf[--idx] =3D 0; - sclp_print("\b \b"); + printf("\b \b"); } continue; case KEYCODE_ENTER: @@ -103,7 +106,7 @@ static int read_prompt(char *buf, size_t len) /* Echo input and add to buffer */ if (idx < len) { buf[idx++] =3D inp[0]; - sclp_print(inp); + printf("%s", inp); } } } @@ -140,22 +143,19 @@ static int get_index(void) } } =20 - return atoui(buf); + return atoi(buf); } =20 static void boot_menu_prompt(bool retry) { - char tmp[11]; - if (retry) { - sclp_print("\nError: undefined configuration" + printf("\nError: undefined configuration" "\nPlease choose:\n"); } else if (timeout > 0) { - sclp_print("Please choose (default will boot in "); - sclp_print(uitoa(timeout / 1000, tmp, sizeof(tmp))); - sclp_print(" seconds):\n"); + printf("Please choose (default will boot in %d seconds):\n", + (int)(timeout / 1000)); } else { - sclp_print("Please choose:\n"); + puts("Please choose:"); } } =20 @@ -163,7 +163,6 @@ static int get_boot_index(bool *valid_entries) { int boot_index; bool retry =3D false; - char tmp[5]; =20 do { boot_menu_prompt(retry); @@ -172,8 +171,7 @@ static int get_boot_index(bool *valid_entries) } while (boot_index < 0 || boot_index >=3D MAX_BOOT_ENTRIES || !valid_entries[boot_index]); =20 - sclp_print("\nBooting entry #"); - sclp_print(uitoa(boot_index, tmp, sizeof(tmp))); + printf("\nBooting entry #%d", boot_index); =20 return boot_index; } @@ -187,9 +185,9 @@ static int zipl_print_entry(const char *data, size_t le= n) buf[len] =3D '\n'; buf[len + 1] =3D '\0'; =20 - sclp_print(buf); + printf("%s", buf); =20 - return buf[0] =3D=3D ' ' ? atoui(buf + 1) : atoui(buf); + return buf[0] =3D=3D ' ' ? atoi(buf + 1) : atoi(buf); } =20 int menu_get_zipl_boot_index(const char *menu_data) @@ -209,7 +207,7 @@ int menu_get_zipl_boot_index(const char *menu_data) } =20 /* Print banner */ - sclp_print("s390-ccw zIPL Boot Menu\n\n"); + puts("s390-ccw zIPL Boot Menu\n"); menu_data +=3D strlen(menu_data) + 1; =20 /* Print entries */ @@ -221,37 +219,34 @@ int menu_get_zipl_boot_index(const char *menu_data) valid_entries[entry] =3D true; =20 if (entry =3D=3D 0) { - sclp_print("\n"); + printf("\n"); } } =20 - sclp_print("\n"); + printf("\n"); return get_boot_index(valid_entries); } =20 int menu_get_enum_boot_index(bool *valid_entries) { - char tmp[3]; int i; =20 - sclp_print("s390-ccw Enumerated Boot Menu.\n\n"); + puts("s390-ccw Enumerated Boot Menu.\n"); =20 for (i =3D 0; i < MAX_BOOT_ENTRIES; i++) { if (valid_entries[i]) { if (i < 10) { - sclp_print(" "); + printf(" "); } - sclp_print("["); - sclp_print(uitoa(i, tmp, sizeof(tmp))); - sclp_print("]"); + printf("[%d]", i); if (i =3D=3D 0) { - sclp_print(" default\n"); + printf(" default\n"); } - sclp_print("\n"); + printf("\n"); } } =20 - sclp_print("\n"); + printf("\n"); return get_boot_index(valid_entries); } =20 diff --git a/pc-bios/s390-ccw/netmain.c b/pc-bios/s390-ccw/netmain.c index 5cd619b2d6..509119be15 100644 --- a/pc-bios/s390-ccw/netmain.c +++ b/pc-bios/s390-ccw/netmain.c @@ -293,7 +293,7 @@ static int load_kernel_with_initrd(filename_ip_t *fn_ip, printf("Loading pxelinux.cfg entry '%s'\n", entry->label); =20 if (!entry->kernel) { - printf("Kernel entry is missing!\n"); + puts("Kernel entry is missing!\n"); return -1; } =20 @@ -515,13 +515,13 @@ void main(void) int rc, fnlen; =20 sclp_setup(); - sclp_print("Network boot starting...\n"); + puts("Network boot starting..."); =20 virtio_setup(); =20 rc =3D net_init(&fn_ip); if (rc) { - panic("Network initialization failed. Halting.\n"); + panic("Network initialization failed. Halting."); } =20 fnlen =3D strlen(fn_ip.filename); @@ -535,9 +535,9 @@ void main(void) net_release(&fn_ip); =20 if (rc > 0) { - sclp_print("Network loading done, starting kernel...\n"); + puts("Network loading done, starting kernel..."); jump_to_low_kernel(); } =20 - panic("Failed to load OS from network\n"); + panic("Failed to load OS from network."); } diff --git a/pc-bios/s390-ccw/sclp.c b/pc-bios/s390-ccw/sclp.c index 7251f9af4d..4a07de018d 100644 --- a/pc-bios/s390-ccw/sclp.c +++ b/pc-bios/s390-ccw/sclp.c @@ -8,7 +8,7 @@ * directory. */ =20 -#include "libc.h" +#include #include "s390-ccw.h" #include "sclp.h" =20 @@ -101,11 +101,6 @@ long write(int fd, const void *str, size_t len) return len; } =20 -void sclp_print(const char *str) -{ - write(1, str, strlen(str)); -} - void sclp_get_loadparm_ascii(char *loadparm) { =20 diff --git a/pc-bios/s390-ccw/virtio-blkdev.c b/pc-bios/s390-ccw/virtio-blk= dev.c index a81207b52e..2666326801 100644 --- a/pc-bios/s390-ccw/virtio-blkdev.c +++ b/pc-bios/s390-ccw/virtio-blkdev.c @@ -8,7 +8,7 @@ * directory. */ =20 -#include "libc.h" +#include #include "s390-ccw.h" #include "virtio.h" #include "virtio-scsi.h" @@ -76,7 +76,7 @@ unsigned long virtio_load_direct(unsigned long rec_list1,= unsigned long rec_list return -1; } =20 - sclp_print("."); + printf("."); status =3D virtio_read_many(sec, (void *)addr, sec_num); if (status) { panic("I/O Error"); @@ -230,7 +230,7 @@ int virtio_blk_setup_device(SubChannelId schid) vdev->schid =3D schid; virtio_setup_ccw(vdev); =20 - sclp_print("Using virtio-blk.\n"); + puts("Using virtio-blk."); =20 return 0; } diff --git a/pc-bios/s390-ccw/virtio-scsi.c b/pc-bios/s390-ccw/virtio-scsi.c index d1a84b937c..6b4a1caf8a 100644 --- a/pc-bios/s390-ccw/virtio-scsi.c +++ b/pc-bios/s390-ccw/virtio-scsi.c @@ -9,7 +9,8 @@ * directory. */ =20 -#include "libc.h" +#include +#include #include "s390-ccw.h" #include "virtio.h" #include "scsi.h" @@ -30,9 +31,9 @@ static inline void vs_assert(bool term, const char **msgs) if (!term) { int i =3D 0; =20 - sclp_print("\n! "); + printf("\n! "); while (msgs[i]) { - sclp_print(msgs[i++]); + printf("%s", msgs[i++]); } panic(" !\n"); } @@ -236,11 +237,11 @@ static int virtio_scsi_locate_device(VDev *vdev) if (resp.response =3D=3D VIRTIO_SCSI_S_BAD_TARGET) { continue; } - print_int("target", target); + printf("target 0x%X\n", target); virtio_scsi_verify_response(&resp, "SCSI cannot report LUNs"); } if (r->lun_list_len =3D=3D 0) { - print_int("no LUNs for target", target); + printf("no LUNs for target 0x%X\n", target); continue; } luns =3D r->lun_list_len / 8; @@ -264,7 +265,7 @@ static int virtio_scsi_locate_device(VDev *vdev) } } =20 - sclp_print("Warning: Could not locate a usable virtio-scsi device\n"); + puts("Warning: Could not locate a usable virtio-scsi device"); return -ENODEV; } =20 @@ -379,7 +380,7 @@ static int virtio_scsi_setup(VDev *vdev) } =20 if (virtio_scsi_inquiry_response_is_cdrom(scsi_inquiry_std_response)) { - sclp_print("SCSI CD-ROM detected.\n"); + puts("SCSI CD-ROM detected."); vdev->is_cdrom =3D true; vdev->scsi_block_size =3D VIRTIO_ISO_BLOCK_SIZE; } @@ -443,7 +444,7 @@ int virtio_scsi_setup_device(SubChannelId schid) IPL_assert(vdev->config.scsi.cdb_size =3D=3D VIRTIO_SCSI_CDB_SIZE, "Config: CDB size mismatch"); =20 - sclp_print("Using virtio-scsi.\n"); + puts("Using virtio-scsi."); =20 return virtio_scsi_setup(vdev); } diff --git a/pc-bios/s390-ccw/virtio.c b/pc-bios/s390-ccw/virtio.c index 5edd058d88..8c6b0a8a92 100644 --- a/pc-bios/s390-ccw/virtio.c +++ b/pc-bios/s390-ccw/virtio.c @@ -8,7 +8,7 @@ * directory. */ =20 -#include "libc.h" +#include #include "s390-ccw.h" #include "cio.h" #include "virtio.h" diff --git a/tests/tcg/s390x/console.c b/tests/tcg/s390x/console.c index d43ce3f44b..6c26f04949 100644 --- a/tests/tcg/s390x/console.c +++ b/tests/tcg/s390x/console.c @@ -4,7 +4,10 @@ * * SPDX-License-Identifier: GPL-2.0-or-later */ + #include "../../../pc-bios/s390-ccw/sclp.c" +#include "../../../roms/SLOF/lib/libc/string/memset.c" +#include "../../../roms/SLOF/lib/libc/string/memcpy.c" =20 void __sys_outc(char c) { diff --git a/pc-bios/s390-ccw/Makefile b/pc-bios/s390-ccw/Makefile index 6207911b53..3f4232636e 100644 --- a/pc-bios/s390-ccw/Makefile +++ b/pc-bios/s390-ccw/Makefile @@ -33,13 +33,18 @@ QEMU_DGFLAGS =3D -MMD -MP -MT $@ -MF $(@D)/$(*F).d .PHONY : all clean build-all distclean =20 OBJECTS =3D start.o main.o bootmap.o jump2ipl.o sclp.o menu.o \ - virtio.o virtio-scsi.o virtio-blkdev.o libc.o cio.o dasd-ipl.o + virtio.o virtio-scsi.o virtio-blkdev.o cio.o dasd-ipl.o + +SLOF_DIR :=3D $(SRC_PATH)/../../roms/SLOF + +LIBC_INC :=3D -nostdinc -I$(SLOF_DIR)/lib/libc/include =20 EXTRA_CFLAGS +=3D -Wall EXTRA_CFLAGS +=3D -ffreestanding -fno-delete-null-pointer-checks -fno-comm= on -fPIE EXTRA_CFLAGS +=3D -fwrapv -fno-strict-aliasing -fno-asynchronous-unwind-ta= bles EXTRA_CFLAGS +=3D -msoft-float EXTRA_CFLAGS +=3D -std=3Dgnu99 +EXTRA_CFLAGS +=3D $(LIBC_INC) LDFLAGS +=3D -Wl,-pie -nostdlib -z noexecstack =20 cc-test =3D $(CC) -Werror $1 -c -o /dev/null -xc /dev/null >/dev/null 2>/d= ev/null @@ -55,18 +60,18 @@ config-cc.mak: Makefile $(call cc-option,-march=3Dz900,-march=3Dz10)) 3> config-cc.mak -include config-cc.mak =20 +include $(SRC_PATH)/netboot.mak + build-all: s390-ccw.img s390-netboot.img =20 -s390-ccw.elf: $(OBJECTS) - $(call quiet-command,$(CC) $(LDFLAGS) -o $@ $(OBJECTS),Linking) +s390-ccw.elf: $(OBJECTS) libc.a + $(call quiet-command,$(CC) $(LDFLAGS) -o $@ $^,Linking) =20 s390-ccw.img: s390-ccw.elf $(call quiet-command,$(STRIP) --strip-unneeded $< -o $@,Stripping $< into) =20 $(OBJECTS): Makefile =20 -include $(SRC_PATH)/netboot.mak - ALL_OBJS =3D $(sort $(OBJECTS) $(NETOBJS) $(LIBCOBJS) $(LIBNETOBJS)) -include $(ALL_OBJS:%.o=3D%.d) =20 diff --git a/tests/tcg/s390x/Makefile.softmmu-target b/tests/tcg/s390x/Make= file.softmmu-target index 3227903348..969bc5728f 100644 --- a/tests/tcg/s390x/Makefile.softmmu-target +++ b/tests/tcg/s390x/Makefile.softmmu-target @@ -3,7 +3,7 @@ VPATH+=3D$(S390X_SRC) # EXTFLAGS can be passed by the user, e.g. to override the --accel QEMU_OPTS+=3D-action panic=3Dexit-failure -nographic -serial chardev:outpu= t $(EXTFLAGS) -kernel LINK_SCRIPT=3D$(S390X_SRC)/softmmu.ld -CFLAGS+=3D-ggdb -O0 +CFLAGS+=3D-ggdb -O0 -I$(SRC_PATH)/include/hw/s390x/ipl/ LDFLAGS=3D-nostdlib -static =20 %.o: %.S --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689545; cv=none; d=zohomail.com; s=zohoarc; b=Mw8hfCJMdoRqJu4c35RsyAlUy6XXXuuemOt/3bdovEaBB/qUooKGVg3XvnviPpA9x5FZvJnHocuds3ki+SSYse/cdAi8X2acJR1b+7ZRuSlmzpzIT4S9Esd+SVcqDSoYdJpOBuS1xbYaRCSiwXlbJhoFtg7LgKOiE6Is3INUa7s= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689545; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=c/HKvJGWilXUfVGnJwn0Bg4e46UeEUdVX2YSDpK8RUg=; b=TonlmJMBvTjdXc5DRbBnzH+tyGCtH0i38frMxNF28sNoRFE6qw3Hh6r4+6bj7QN7K1d2Tan9PtxK+FahSy/kwWmkFdmFzNzZwxAMyBi1bo9q9ftdKdjfbpft75C4g0ib3TsTz364nBxQ7E+8qirgo3v76yWobLHUlpzmxumRcFY= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689545251715.3441508375035; Wed, 23 Oct 2024 06:19:05 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFJ-0006D5-6r; Wed, 23 Oct 2024 09:17:53 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEw-00064m-II for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:31 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEu-00028n-MM for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:30 -0400 Received: from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-197-LO6QtMeJN06OKs0SzX7OQg-1; Wed, 23 Oct 2024 09:17:23 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id F21F719560BD; Wed, 23 Oct 2024 13:17:22 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 2D63019560AE; Wed, 23 Oct 2024 13:17:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689447; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=c/HKvJGWilXUfVGnJwn0Bg4e46UeEUdVX2YSDpK8RUg=; b=fUT5Pvilw43onnvLztD4dDruJkeBN2oPvMA4bldQzxn/Ol2xBBIzX6DpDwCJH6UzuG5CJl uzxUJQJVXD7szZ8pSDS6j4ARsDzWJI1Xn+jTfOP0r/PsAcdBSsgb+ob2ByeY/f+hkD1kKz lTgmThD/o957OwJZ30ShuG7xycMOj6M= X-MC-Unique: LO6QtMeJN06OKs0SzX7OQg-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 03/23] pc-bios/s390-ccw: Link the netboot code into the main s390-ccw.img binary Date: Wed, 23 Oct 2024 15:16:50 +0200 Message-ID: <20241023131710.906748-4-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689546530116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi We originally built a separate binary for the netboot code since it was considered as experimental and we could not be sure that the necessary SLOF module had been checked out. Time passed, the code proved its usefulness, and the build system nowadays makes sure that the SLOF module is checked out if you have a s390x compiler available for building the s390-ccw bios. So there is no real compelling reason anymore to keep the netboot code in a separate binary. Linking the code together with the main s390-ccw.img will make future enhancements much easier, like supporting more than one boot device. Co-authored by: Thomas Huth Signed-off-by: Jared Rossi Message-ID: <20241020012953.1380075-4-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/netboot.mak | 14 -------------- pc-bios/s390-ccw/cio.h | 2 ++ pc-bios/s390-ccw/iplb.h | 4 ++-- pc-bios/s390-ccw/s390-ccw.h | 3 +++ pc-bios/s390-ccw/virtio.h | 1 - pc-bios/s390-ccw/bootmap.c | 2 +- pc-bios/s390-ccw/main.c | 10 +++++++--- pc-bios/s390-ccw/netmain.c | 15 ++------------- pc-bios/s390-ccw/Makefile | 13 +++++++------ 9 files changed, 24 insertions(+), 40 deletions(-) diff --git a/pc-bios/s390-ccw/netboot.mak b/pc-bios/s390-ccw/netboot.mak index d2b3d8ee74..0a24257ff4 100644 --- a/pc-bios/s390-ccw/netboot.mak +++ b/pc-bios/s390-ccw/netboot.mak @@ -1,18 +1,4 @@ =20 -NETOBJS :=3D start.o sclp.o cio.o virtio.o virtio-net.o jump2ipl.o netmain= .o - -LIBNET_INC :=3D -I$(SLOF_DIR)/lib/libnet - -NETLDFLAGS :=3D $(LDFLAGS) -Wl,-Ttext=3D0x7800000 - -$(NETOBJS): EXTRA_CFLAGS +=3D $(LIBC_INC) $(LIBNET_INC) - -s390-netboot.elf: $(NETOBJS) libnet.a libc.a - $(call quiet-command,$(CC) $(NETLDFLAGS) -o $@ $^,Linking) - -s390-netboot.img: s390-netboot.elf - $(call quiet-command,$(STRIP) --strip-unneeded $< -o $@,Stripping $< into) - # libc files: =20 LIBC_CFLAGS =3D $(EXTRA_CFLAGS) $(CFLAGS) $(LIBC_INC) $(LIBNET_INC) \ diff --git a/pc-bios/s390-ccw/cio.h b/pc-bios/s390-ccw/cio.h index 8b18153deb..6a5e86ba01 100644 --- a/pc-bios/s390-ccw/cio.h +++ b/pc-bios/s390-ccw/cio.h @@ -361,6 +361,8 @@ typedef struct CcwSearchIdData { uint8_t record; } __attribute__((packed)) CcwSearchIdData; =20 +extern SubChannelId net_schid; + int enable_mss_facility(void); void enable_subchannel(SubChannelId schid); uint16_t cu_type(SubChannelId schid); diff --git a/pc-bios/s390-ccw/iplb.h b/pc-bios/s390-ccw/iplb.h index cb6ac8a880..3758698468 100644 --- a/pc-bios/s390-ccw/iplb.h +++ b/pc-bios/s390-ccw/iplb.h @@ -87,9 +87,9 @@ extern IplParameterBlock iplb __attribute__((__aligned__(= PAGE_SIZE))); struct QemuIplParameters { uint8_t qipl_flags; uint8_t reserved1[3]; - uint64_t netboot_start_addr; + uint64_t reserved2; uint32_t boot_menu_timeout; - uint8_t reserved2[12]; + uint8_t reserved3[12]; } __attribute__ ((packed)); typedef struct QemuIplParameters QemuIplParameters; =20 diff --git a/pc-bios/s390-ccw/s390-ccw.h b/pc-bios/s390-ccw/s390-ccw.h index 6f6d95d170..6abb34e563 100644 --- a/pc-bios/s390-ccw/s390-ccw.h +++ b/pc-bios/s390-ccw/s390-ccw.h @@ -55,6 +55,9 @@ void write_iplb_location(void); unsigned int get_loadparm_index(void); void main(void); =20 +/* netmain.c */ +void netmain(void); + /* sclp.c */ void sclp_print(const char *string); void sclp_set_write_mask(uint32_t receive_mask, uint32_t send_mask); diff --git a/pc-bios/s390-ccw/virtio.h b/pc-bios/s390-ccw/virtio.h index 85bd9d1695..6f9a558ff5 100644 --- a/pc-bios/s390-ccw/virtio.h +++ b/pc-bios/s390-ccw/virtio.h @@ -253,7 +253,6 @@ struct VDev { uint8_t scsi_dev_heads; bool scsi_device_selected; ScsiDevice selected_scsi_device; - uint64_t netboot_start_addr; uint32_t max_transfer; uint32_t guest_features[2]; }; diff --git a/pc-bios/s390-ccw/bootmap.c b/pc-bios/s390-ccw/bootmap.c index 3cc79706be..414c3f1b47 100644 --- a/pc-bios/s390-ccw/bootmap.c +++ b/pc-bios/s390-ccw/bootmap.c @@ -929,7 +929,7 @@ void zipl_load(void) } =20 if (virtio_get_device_type() =3D=3D VIRTIO_ID_NET) { - jump_to_IPL_code(vdev->netboot_start_addr); + netmain(); } =20 ipl_scsi(); diff --git a/pc-bios/s390-ccw/main.c b/pc-bios/s390-ccw/main.c index 203df20965..fc44da3161 100644 --- a/pc-bios/s390-ccw/main.c +++ b/pc-bios/s390-ccw/main.c @@ -38,8 +38,13 @@ LowCore *lowcore; /* Yes, this *is* a pointer to address= 0 */ */ void write_subsystem_identification(void) { - lowcore->subchannel_id =3D blk_schid.sch_id; - lowcore->subchannel_nr =3D blk_schid.sch_no; + if (cutype =3D=3D CU_TYPE_VIRTIO && virtio_get_device_type() =3D=3D VI= RTIO_ID_NET) { + lowcore->subchannel_id =3D net_schid.sch_id; + lowcore->subchannel_nr =3D net_schid.sch_no; + } else { + lowcore->subchannel_id =3D blk_schid.sch_id; + lowcore->subchannel_nr =3D blk_schid.sch_no; + } lowcore->io_int_parm =3D 0; } =20 @@ -231,7 +236,6 @@ static int virtio_setup(void) switch (vdev->senseid.cu_model) { case VIRTIO_ID_NET: puts("Network boot device detected"); - vdev->netboot_start_addr =3D qipl.netboot_start_addr; return 0; case VIRTIO_ID_BLOCK: ret =3D virtio_blk_setup_device(blk_schid); diff --git a/pc-bios/s390-ccw/netmain.c b/pc-bios/s390-ccw/netmain.c index 509119be15..bc6ad8695f 100644 --- a/pc-bios/s390-ccw/netmain.c +++ b/pc-bios/s390-ccw/netmain.c @@ -41,7 +41,6 @@ #define DEFAULT_TFTP_RETRIES 20 =20 extern char _start[]; -void write_iplb_location(void) {} =20 #define KERNEL_ADDR ((void *)0L) #define KERNEL_MAX_SIZE ((long)_start) @@ -50,10 +49,9 @@ void write_iplb_location(void) {} /* STSI 3.2.2 offset of first vmdb + offset of uuid inside vmdb */ #define STSI322_VMDB_UUID_OFFSET ((8 + 12) * 4) =20 -IplParameterBlock iplb __attribute__((aligned(PAGE_SIZE))); static char cfgbuf[2048]; =20 -static SubChannelId net_schid =3D { .one =3D 1 }; +SubChannelId net_schid =3D { .one =3D 1 }; static uint8_t mac[6]; static uint64_t dest_timer; =20 @@ -438,15 +436,6 @@ static int net_try_direct_tftp_load(filename_ip_t *fn_= ip) return rc; } =20 -void write_subsystem_identification(void) -{ - SubChannelId *schid =3D (SubChannelId *) 184; - uint32_t *zeroes =3D (uint32_t *) 188; - - *schid =3D net_schid; - *zeroes =3D 0; -} - static bool find_net_dev(Schib *schib, int dev_no) { int i, r; @@ -509,7 +498,7 @@ static void virtio_setup(void) IPL_assert(found, "No virtio net device found"); } =20 -void main(void) +void netmain(void) { filename_ip_t fn_ip; int rc, fnlen; diff --git a/pc-bios/s390-ccw/Makefile b/pc-bios/s390-ccw/Makefile index 3f4232636e..cf6859823a 100644 --- a/pc-bios/s390-ccw/Makefile +++ b/pc-bios/s390-ccw/Makefile @@ -32,19 +32,20 @@ QEMU_DGFLAGS =3D -MMD -MP -MT $@ -MF $(@D)/$(*F).d =20 .PHONY : all clean build-all distclean =20 -OBJECTS =3D start.o main.o bootmap.o jump2ipl.o sclp.o menu.o \ - virtio.o virtio-scsi.o virtio-blkdev.o cio.o dasd-ipl.o +OBJECTS =3D start.o main.o bootmap.o jump2ipl.o sclp.o menu.o netmain.o \ + virtio.o virtio-net.o virtio-scsi.o virtio-blkdev.o cio.o dasd-ipl.o =20 SLOF_DIR :=3D $(SRC_PATH)/../../roms/SLOF =20 LIBC_INC :=3D -nostdinc -I$(SLOF_DIR)/lib/libc/include +LIBNET_INC :=3D -I$(SLOF_DIR)/lib/libnet =20 EXTRA_CFLAGS +=3D -Wall EXTRA_CFLAGS +=3D -ffreestanding -fno-delete-null-pointer-checks -fno-comm= on -fPIE EXTRA_CFLAGS +=3D -fwrapv -fno-strict-aliasing -fno-asynchronous-unwind-ta= bles EXTRA_CFLAGS +=3D -msoft-float EXTRA_CFLAGS +=3D -std=3Dgnu99 -EXTRA_CFLAGS +=3D $(LIBC_INC) +EXTRA_CFLAGS +=3D $(LIBC_INC) $(LIBNET_INC) LDFLAGS +=3D -Wl,-pie -nostdlib -z noexecstack =20 cc-test =3D $(CC) -Werror $1 -c -o /dev/null -xc /dev/null >/dev/null 2>/d= ev/null @@ -62,9 +63,9 @@ config-cc.mak: Makefile =20 include $(SRC_PATH)/netboot.mak =20 -build-all: s390-ccw.img s390-netboot.img +build-all: s390-ccw.img =20 -s390-ccw.elf: $(OBJECTS) libc.a +s390-ccw.elf: $(OBJECTS) libnet.a libc.a $(call quiet-command,$(CC) $(LDFLAGS) -o $@ $^,Linking) =20 s390-ccw.img: s390-ccw.elf @@ -72,7 +73,7 @@ s390-ccw.img: s390-ccw.elf =20 $(OBJECTS): Makefile =20 -ALL_OBJS =3D $(sort $(OBJECTS) $(NETOBJS) $(LIBCOBJS) $(LIBNETOBJS)) +ALL_OBJS =3D $(sort $(OBJECTS) $(LIBCOBJS) $(LIBNETOBJS)) -include $(ALL_OBJS:%.o=3D%.d) =20 clean: --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689567; cv=none; d=zohomail.com; s=zohoarc; b=aNB/Jcn4GS07b3qD++9FDJTQKVYQXpPfDXjkghzotVVJpVzoM1E0fVJSgvDApp+YeRpwwFCX5LdBKZnR0+E+NBMKQKUhQedznrl81EUEAAV1s73xUIvl6uE+XCb2EKh/vm8L72KBpMNMkNELX2OfjolBb/mn0KfuonhCcSP0vzs= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689567; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=pSbtEot6h95fT7Ibv8FZX45e32tQKqaS2NJ43EphaGc=; b=lHqt6TGx8JWroXwrOpLE1hZnS+UqQULIRGDIdq6rYFey5JULnC7G7G3X7BQs+7SlbhWbIlWQs/7t4f4WevcY49lY/ElWQT+jMDKhTE8bgMhGFef40M/rG9bdDNGKll5JsQBlpb0+OO86Aw9aA9wpR0FHD4MkEkWrI2ruZVrEagg= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689567185643.0150670719489; Wed, 23 Oct 2024 06:19:27 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFR-0006Sl-Vt; Wed, 23 Oct 2024 09:18:02 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bF1-00066h-2l for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:37 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEu-00028w-ME for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:34 -0400 Received: from mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-665-hrPcHZ00OaCQNPEq5JTfGQ-1; Wed, 23 Oct 2024 09:17:26 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 9772019560BF; Wed, 23 Oct 2024 13:17:25 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 3C71819560AE; Wed, 23 Oct 2024 13:17:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689448; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=pSbtEot6h95fT7Ibv8FZX45e32tQKqaS2NJ43EphaGc=; b=NLV0nscyLiHZRCW8ZMH8eJyTo/8YUz/Qo/5l4an0hL1gwwitgFchkEfSV4Do9kJjD1ehzr ix8DGsTiCykpavGiXVGCU25MRZvj8EcKDlGZih/aADlkrq+QoZwRR5Fh0uefcUqrsecw4P XaeHc3VF0LJ0wzMsWiBZrWV9TjJgngA= X-MC-Unique: hrPcHZ00OaCQNPEq5JTfGQ-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell Subject: [PULL 04/23] hw/s390x: Remove the possibility to load the s390-netboot.img binary Date: Wed, 23 Oct 2024 15:16:51 +0200 Message-ID: <20241023131710.906748-5-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689568960116600 Content-Type: text/plain; charset="utf-8" Since the netboot code has now been merged into the main s390-ccw.img binary, we don't need the separate s390-netboot.img anymore. Remove it and the code that was responsible for loading it. Message-Id: <20240621082422.136217-6-thuth@redhat.com> Signed-off-by: Thomas Huth --- hw/s390x/ipl.h | 12 +++----- hw/s390x/ipl.c | 55 ------------------------------------- hw/s390x/s390-virtio-ccw.c | 10 ++----- pc-bios/meson.build | 1 - pc-bios/s390-netboot.img | Bin 67232 -> 0 bytes 5 files changed, 6 insertions(+), 72 deletions(-) delete mode 100644 pc-bios/s390-netboot.img diff --git a/hw/s390x/ipl.h b/hw/s390x/ipl.h index 57cd125769..b2105b616a 100644 --- a/hw/s390x/ipl.h +++ b/hw/s390x/ipl.h @@ -134,11 +134,8 @@ void s390_ipl_clear_reset_request(void); /* * The QEMU IPL Parameters will be stored at absolute address * 204 (0xcc) which means it is 32-bit word aligned but not - * double-word aligned. - * Placement of data fields in this area must account for - * their alignment needs. E.g., netboot_start_address must - * have an offset of 4 + n * 8 bytes within the struct in order - * to keep it double-word aligned. + * double-word aligned. Placement of 64-bit data fields in this + * area must account for their alignment needs. * The total size of the struct must never exceed 28 bytes. * This definition must be kept in sync with the definition * in pc-bios/s390-ccw/iplb.h. @@ -146,9 +143,9 @@ void s390_ipl_clear_reset_request(void); struct QemuIplParameters { uint8_t qipl_flags; uint8_t reserved1[3]; - uint64_t netboot_start_addr; + uint64_t reserved2; uint32_t boot_menu_timeout; - uint8_t reserved2[12]; + uint8_t reserved3[12]; } QEMU_PACKED; typedef struct QemuIplParameters QemuIplParameters; =20 @@ -178,7 +175,6 @@ struct S390IPLState { char *initrd; char *cmdline; char *firmware; - char *netboot_fw; uint8_t cssid; uint8_t ssid; uint16_t devno; diff --git a/hw/s390x/ipl.c b/hw/s390x/ipl.c index 5f60977ceb..8c490eeb52 100644 --- a/hw/s390x/ipl.c +++ b/hw/s390x/ipl.c @@ -288,7 +288,6 @@ static Property s390_ipl_properties[] =3D { DEFINE_PROP_STRING("initrd", S390IPLState, initrd), DEFINE_PROP_STRING("cmdline", S390IPLState, cmdline), DEFINE_PROP_STRING("firmware", S390IPLState, firmware), - DEFINE_PROP_STRING("netboot_fw", S390IPLState, netboot_fw), DEFINE_PROP_BOOL("enforce_bios", S390IPLState, enforce_bios, false), DEFINE_PROP_BOOL("iplbext_migration", S390IPLState, iplbext_migration, true), @@ -480,56 +479,6 @@ int s390_ipl_set_loadparm(uint8_t *loadparm) return -1; } =20 -static int load_netboot_image(Error **errp) -{ - MachineState *ms =3D MACHINE(qdev_get_machine()); - S390IPLState *ipl =3D get_ipl_device(); - char *netboot_filename; - MemoryRegion *sysmem =3D get_system_memory(); - MemoryRegion *mr =3D NULL; - void *ram_ptr =3D NULL; - int img_size =3D -1; - - mr =3D memory_region_find(sysmem, 0, 1).mr; - if (!mr) { - error_setg(errp, "Failed to find memory region at address 0"); - return -1; - } - - ram_ptr =3D memory_region_get_ram_ptr(mr); - if (!ram_ptr) { - error_setg(errp, "No RAM found"); - goto unref_mr; - } - - netboot_filename =3D qemu_find_file(QEMU_FILE_TYPE_BIOS, ipl->netboot_= fw); - if (netboot_filename =3D=3D NULL) { - error_setg(errp, "Could not find network bootloader '%s'", - ipl->netboot_fw); - goto unref_mr; - } - - img_size =3D load_elf_ram(netboot_filename, NULL, NULL, NULL, - &ipl->start_addr, - NULL, NULL, NULL, 1, EM_S390, 0, 0, NULL, - false); - - if (img_size < 0) { - img_size =3D load_image_size(netboot_filename, ram_ptr, ms->ram_si= ze); - ipl->start_addr =3D KERN_IMAGE_START; - } - - if (img_size < 0) { - error_setg(errp, "Failed to load network bootloader"); - } - - g_free(netboot_filename); - -unref_mr: - memory_region_unref(mr); - return img_size; -} - static bool is_virtio_ccw_device_of_type(IplParameterBlock *iplb, int virtio_id) { @@ -754,10 +703,6 @@ void s390_ipl_prepare_cpu(S390CPU *cpu) ipl->iplb_valid =3D s390_gen_initial_iplb(ipl); } } - if (ipl->netboot) { - load_netboot_image(&error_fatal); - ipl->qipl.netboot_start_addr =3D cpu_to_be64(ipl->start_addr); - } s390_ipl_set_boot_menu(ipl); s390_ipl_prepare_qipl(cpu); } diff --git a/hw/s390x/s390-virtio-ccw.c b/hw/s390x/s390-virtio-ccw.c index 5aa8d207a3..529e53f308 100644 --- a/hw/s390x/s390-virtio-ccw.c +++ b/hw/s390x/s390-virtio-ccw.c @@ -197,11 +197,10 @@ static void s390_memory_init(MemoryRegion *ram) static void s390_init_ipl_dev(const char *kernel_filename, const char *kernel_cmdline, const char *initrd_filename, const char *fir= mware, - const char *netboot_fw, bool enforce_bios) + bool enforce_bios) { Object *new =3D object_new(TYPE_S390_IPL); DeviceState *dev =3D DEVICE(new); - char *netboot_fw_prop; =20 if (kernel_filename) { qdev_prop_set_string(dev, "kernel", kernel_filename); @@ -212,11 +211,6 @@ static void s390_init_ipl_dev(const char *kernel_filen= ame, qdev_prop_set_string(dev, "cmdline", kernel_cmdline); qdev_prop_set_string(dev, "firmware", firmware); qdev_prop_set_bit(dev, "enforce_bios", enforce_bios); - netboot_fw_prop =3D object_property_get_str(new, "netboot_fw", &error_= abort); - if (!strlen(netboot_fw_prop)) { - qdev_prop_set_string(dev, "netboot_fw", netboot_fw); - } - g_free(netboot_fw_prop); object_property_add_child(qdev_get_machine(), TYPE_S390_IPL, new); object_unref(new); @@ -284,7 +278,7 @@ static void ccw_init(MachineState *machine) s390_init_ipl_dev(machine->kernel_filename, machine->kernel_cmdline, machine->initrd_filename, machine->firmware ?: "s390-ccw.img", - "s390-netboot.img", true); + true); =20 dev =3D qdev_new(TYPE_S390_PCI_HOST_BRIDGE); object_property_add_child(qdev_get_machine(), TYPE_S390_PCI_HOST_BRIDG= E, diff --git a/pc-bios/meson.build b/pc-bios/meson.build index 090379763e..4823dff189 100644 --- a/pc-bios/meson.build +++ b/pc-bios/meson.build @@ -68,7 +68,6 @@ blobs =3D [ 'kvmvapic.bin', 'pvh.bin', 's390-ccw.img', - 's390-netboot.img', 'slof.bin', 'skiboot.lid', 'palcode-clipper', diff --git a/pc-bios/s390-netboot.img b/pc-bios/s390-netboot.img deleted file mode 100644 index 6908e49f06801808b826d3a01f88132cf1b2f57c..000000000000000000000000000= 0000000000000 GIT binary patch literal 0 HcmV?d00001 literal 67232 zcmeEPdw5jUwO?m4Bm)LG36n4h7*3KAl7KMbB>^Aj1kePu4k~rk)u_{6tPchl z5VX}HidSn}M>KA=3D4+pfBtmkpZ<_qd65|G>{ zj|*^f@$)pv_V)jzpnRVD^j;EuZ$W>5hyABs5`FKC{{HsGD~l(Q5|J%tKS`N%<>ePm zy7H3gQzu?`^~8F93z+>Fj8nd{kp6LxlDO&2>%a5f%leM6|E)mvoaR?ts4(vs8_Y-k zIxl(j(M9e|@biL?{&dmg+d4kUf9u^z+h>?l|8V0yw-0@4^XqpW3ah*v-R@IzsG578 zqi6j2i--#GrC{aF@4GcXm!pe_j^gLbbM&eaQB8mOYh8L}947Za54+8H;=3Dpe}J8!rz zG`cQ&$)(p`yZDj|qZiWR>!KH48>Q2%w7pUeIVVotVS`P{|7Am+$*ydVArF(*3?*>-r{7Q`HTpY~n+ z3u2DDuHEu3{sqf<9PuaHSsCIV1!@J4r)J;h|C_D< zpTGb7{pasLfB*UW&)rzyJLG=3DkK5ROJ8k=3DDA>_S)VfIY^u#*eBN}vGhemYO zbNu~Q{9kZx2azH^6lFxBmhxA6@_b?pDI!i2#Ac$71W|0Gk?f9%0Ok2d1uC1=3D1g+Ib zX&>qAE-e-fj$?YMPFE9z_NuQgt`bq2DxM}qJWqKd>b%E&-iNorj*bv1;%DnUp+XVO zd!<7simkA;&^IU{B9zyp>f}ELEu)9hV)Sc;LRZl`*@rIsIH9;o#GTiSR9B5?RwAN- z$n?^9^l<*w9U3W*Y{z%)gW@XFOT}VN-nTjuq&)H}L-H+4PYj}j6-s#Vzn!F@rQ45C z&ileT49z_C4URz zeT&LHoy)a;iT`W=3Dg#V9MMFS1tcNg-zC&f}4EbgHpB0yf#OS42RQCRK1k?XuACOS@F zg@`NlT<3hQ^S$CVVvcflMD4y&RFGH1m9L8m$`^5u&ZTbPQnw6v|84jE7$ecOB#Xm2 z51SsU5>dq{UL&H)wA}OW6<3L^R4D2k$MjQ`QQWm;{Unt{RQb9HfJ!t9t6hxe;)hHR zT`S_A=3DM8O{(>~57(X5g?A8ml+JQ1Nz5&`mTx+y`MswlQ5Mx)WA=3DRVU*^UT52Eap2Y zaUX?61F4pZac}e|sC2owj}&p7v&;0-IJ9-)g~e+`+;fAacHcn>i@I;8gca`oF6ONJ zJD9WX+bCga-M3Q0QoD$PmfF1*CGB09UE8LhMcr$-)-9-IzfVCcWN!xrbg$+XR-py^ z4b-(eDQIckakSRG61D6Orj^ZHD}}dAH)OxWRBiPl#f}nwC<(k z&(h!Yx3d(9QZu&|S1~P)167J>-)7TK$Dyq&d&IXL2W2ihRovb8{Va`N`6)kZM44}R z`TLdp-N5&}dHCNm()3aTKds{u<3*;=3Dw6v}oD#dSod=3D>){?YrG-=3D^BsG?W)7*cGY6W zx@suFQ1F_+>?o1xyV+{#n$6`Jxtzh}bhq5=3DX!p{cBGdQn4wdMpb3}timZ}o3Kts&m zPNtvcU>q&AOO-3S@?7R67X_{rbNX%;6RALKRlX)B7W9cAEi%2-h*mJm54WTJb7ys^ zq&$4TrFQvv4(p9ll|(an7}meHk;6v*ed zJtLBDXsrr*I_CpR?^4NY4yH!aOOvzIhIiVy;;O*4Vr%cI;_IZC0a`6GPP@3CNMw33 z3p}0|{Mmi-S01Sz)V$<*k?DOMzrW7w?vkI2Oy9iR%trh2G5#0_k#SDsdM|Rl4IwJgbtr3~MJq7&NVH3S@Bi_+XmZlMTJ3>_4a)Wsk zO*TC=3DMZ~F0%yOLcZ1Pc|>EV@CEaEiybw?$Y47G^FDNYZ!Fmz6cR}s;<+lDKh8i`EL z4_+sf!&;^ArcEk|3{jeFqGRs%*!lcz62GmpRAn;-`TP8B1xm`TbpmRoFXI}H?d5N> zM!BUbyWASnw-qS1TO-IdxR1Mfvwalw$u{nyY#RlA1qBez*k0=3D)WuSRFZ@=3DHL8@uoM zGyS+7mh#ypmx~^!#T~2jMKh5oBSn}*9Z8}WDy*|KqJ&sXLjr?DoX2mJ>7|X0N^+Q( zPl|Yk6fufC;y9`aj1P(rQ@-h?Cv`RH6M=3DHl)#MOeOHvypJrT8&HfdD8sfx5U z8jbFF&vBe{T$=3DRK`1IqpP2PfxSTua6SxF@#=3D)ATM3{j`UI5#=3D0ZD^Qgdof4O(}0$D zks2BXsDJr_$T%;6Ksv%i7w^TK{L&OnG+NhH5>4a{Yigmct3$#eRgGw2KvcP@ib88b zG`b_>I8KpEU#P#G>)$JCXtb`W)INc{mZlD&pr|2T*VN*Jwa{myg+Q?=3DXBo9x%pj#? zga}fB>7}XMhc0Rz2eVjEu%0xQTtu9Ph*_idb)T4;1XrScbSz`Z+dB^ z>7_QYm5vwY@LialUt}a)pHB~cXP6#ZBjTi*9vX$6Lc}RBdvbDkF**~UWShZ7l7Y^A^mKY*P?}66@ z+DtFCi#Sabn;j=3DmW@z@0H%-wXiKf=3D1XmnsaDk0E>N1WpDPH@p~9%HB4bO#5#wrhVnNp zrciDUi$s))L@g-px%N$QN#WAShl^C>9t18aGXGKpxOx8 z4{e$n0!1+2ygOz;x@j{1W(u)v(1zqD1qJE9+DjzeUb;&3^zFjxmJ)rN*G}qTdxNES z`lwO_X|xftlVRO{$O^enMp&UvqL>l39}&%@F!ncFde>6&rvKX23cBNQ(fG|mjEmIw zMbF-Q0vDNHdd2io)b!G-*B5vBx_pLezYl%hNOt*hdc`@Wmzqp39TynO?VQH?W}Arn zE`a1Y=3DqgL=3DDxw7RM3#gTBI;Wx#!#V%4{8xbh&E!7~|23WpH5?%Nsm-e6Z*g1;Y`~!Ldw^fYph4!VZMF z%8r4HzuGD}6=3Dq~cD>&5@o{?teRDN*-DVPnT2s09+5N)HFqLR3cJYt;WR4sq!enEXa z8+&JiN-iDFPfv)bU4?;qG1J*)meLfnlvrnNdCdxih`dr)vqG$av$o8&s@7B25_hK> z!rZbrmD|A$_0uJ$k17Mr9WkPoUx@2%Xn9jbgfzB&Wym{wK@4(~A{LN?T_3xr2#MYQ->QBS&v7A+F>q>1S8pNV=3D> zMYO0$)RRv{)uTl{c|}zHUr|qrhz_4-Y4!({5S0`Y(c+s$C2FgUq7t=3D>el99ed-yq` z619u26qTqw{FkDVJR+)oT~wl#VQ*Tx{SQhAgIlQ<23i^R-@-sE!%BpKR))SQ4AdSr zUlftUSVPtsMT$|0k2ifT)R*7D_2=3DY{2f zV)uJlD0XkRRD0K#4Mhv@y1O^zp!k8McEN`IrLNSLpYm8N&OvdGrFMB}-Iol-Qifu5 z4vLYM+66oRmpc}XfMVAlvrz2%gQa%i%;C$0f;FjKcjus3XQ^HJUp5qrU*oYjGY7?2 zEVZj(Unr!UVdwS`cmGghQqI8sF(Y=3DMoN*h=3D868Fu_KyV1841W4_w~yeiyz|N{kh(U zi+dc$(m#EJwYb{!)t}x2X}T%gHN@S?7wCkYJnw5_0d_?1Y_R}VfV}_vXLikb-#K zR8j8%l#@lhLLxfo3`im(I%unuL%eTFIV9ivPeH$Q0Q9T=3D9nh1CvGx9sl!m-#N@>VD zQq)798B{N&qJoY86ttBCpgrfGh1Sx#R6Z|&R98u{zz7lbJtyU|{8dseD|k!FW%(aT zxvXHll*{r5Nx96oNXlgeCI1W_JDwYW#|i%e9z_S>u}?B_7Jx|0z5cS!!1yYcx19V~Np-*_(}o{Teih0TLtj@iJGE{5MIC=3DXtR5cZ@Vz z?QPlBzeAq0eaTY7xxWM?pXH$V>}A$kzHBI1Zu{(x>{xtutN2Spf;E7@R2D#!H$C*0 zi1uC+7;Adz1hI%TL$}`t>^r|7*6c^JXCS>T>tbCV5iNKOI@`HX#_r<7(!Nga*iLlr zRpO5a)4sMJMElx(dcXFy-POMS!rB+$vvgMrIYC-5b~dr!L1yQjY@LYie1hpXzVivT zQUrHC?!I5i^enBKpQ|f^XP@($Sj(_Bh$cEWrzsxDx9dfaV99hf#W0EQK~ub4!U}z> zfo-U+ZTSGrv_7y1n&~-hu4Xz{_y+W+xSFYw+b3Y*EH=3DF~!t{}U_M8}rb4Y14q-Hu> z?OGx-edFBEF?`a02yCThyy(Q7X8gtd1K*GP@!eN5KAh2&_%0fE1o%Gf_ICijht(fz z{*l*n_(cYc??E+x+WL9;9oBgAd`5nH1o*A_H{f@14!=3DXsU*z-flXTOw9I^#}kN0dl ztTC22pM3Z@D^GqN&MpkMyPvb&&sj$RN8{nck)!2*j{ zJO1!Ya-{AX) z;=3D4>cUw!Tfa0TB#D6Vpi>^a;0lxsJ$XTJQs+deFKm`{H778f2^Nc;D_gY(HOJO@}v z-F`dv`%Ez$hqWJm)j9leQGWM%`{5Dv_v{h$2Z`>W`|lC-H~sMY^FT`eSNofE`28u5 z{p1ZAZ}GQSG{@&rRPt;-U z6K7s|1aLu5J18GLg8ptig8mLM4m)0P@t*>H`b-o0^heK#%&y4c%nLN?vsSno^;bpB zfZe*%)u=3D0TTH^v&O9l2Nvya(M@G@+ybT#V3(NgodKi%ywd>H+O-O-l)4H?j%L0-l@ z-en$6-_Xa;8YwQfiT(Bc`}XZxQu}c=3DM9`BP`G{seBI-zi9boKJE%^@BL#v5ck6y>oC!oOT-6kfzS_)uku=3DsvV&og{e9eTfmq~PAkHPl zC^^6au^@0VylT#P*TwJMeftYZ>rDUnzAb{DADUh&F@01qdtyjhX9m&|JQ;DqJf9T9 ze?WhR9M3ae$&KfX0km81(r*1g+ExB$ddbhUJ8iqfFKZ3LcphGV3v&G(a;$uES3rJ^XoG zuSk2uJ1$A8e6x%fYv_78HX#4ef*UpfFXJWFd+Wyi(tr;baxgYVGvd2eef+vePQ+oe7^%v{{CI| z=3DRCk)`qU5b_I>#Out(PWkD}%RK7V=3DtL9W@l5B$BN$B7_%NLTG-qw8Y|&r{PwmvM}X zWBzJFN|o~1Ym|f{_#6Y?+UOVY7UcA|BN@zqwJpxf8DJG zee7r4VQK0VO28*J=3DTA$oFSe6*58i9mk?!CXs)12 zGmonJy>u-bp0GJz-CgL{^wJrkjPfi^tD#aW6rMqTOAm+0yD~V4M498j+t<>N@$obqy{P#j}lp_1bl^Wp`=3D+#kEI_Yg@)?o2`|c< zekw{Ak(Y*ADNQABU{HHOpJUahIQmfYlHYwB!rQPB@>vHw)s;|TB*blva7!b|!K>Hn z!}ckyYAX4fLh3O11?VAl7(-l6N*ItYfF~dwWodxEN!2`fqpO;SG0gcTTdJn9=3DiV8X zs(NVMB31JtMkkEV0HRMdFZbjXHAG=3De^;v2d&}eF*s3FDmlK$M0mLt59Xb$Sj(oE0G z>>1J@`g9X?xoMD{WS?Mfx{3;^&{8{P1l}3uYBJah_yN;P!E_ZBQ=3Dz3LHG(~3h3Tbh zwv0)V*h(jedx+rG%>MXQlutuBBEiShcstJe%G(yDk|gFhHXtg#S43&7r6x7mn2k6LLO{ettZC26>5p@0s*ozGL7`Ke`7vLw?0>?cplW`9+4#V_PJbfo1LKKb_ z(uur?eXtUmk9^`0qKK~hB5JHqM2Jckn0{L5#(~uW`o5>cV?5U7>y*@RNfjbarAASV zieZ=3DAXoV257|~Uqh=3D6w0LJ@V|LTe)9{E!If+OdT!ib#qbF}&1>-hiO zhY$fBR+ETIps<=3D$#Zt<5;ZWo$wrG(3-R*IEswl1sw27#4osoLr`$o)u0(IRwgW$O@ z8d$!p3#;}MjS2fH#vza4TO0}5PejxdnPaHhUulk^BL9f6mIB_{x<$Yaby08c-?`p+ z@eFyz4;hPMaSwYRy@<$v7k1zP*n=3DYDY%u+FwxK@|5)CZp@EGoWp|~orNko-Gca8qI zqm}5XXN{QsxRJ0o2S%+`X*js1@WEH#?qH03L`G37po32_FoWh*r>E?#I@vGkDf@Aq z?2XcYj^Vw7_tpnZKg~){ao1V3T>VX|y-`=3D~7u!ogDfVXaT48%DtqZG&^R-{3b?LXk zu@O0wE&?}?klkUHQm65;PU26FV-#(t5oG%4XtR{aj3GW-(-8ZusT2%{wHelSEkHrc zh^}rYO9jsrO-xs+uB#r&WknMyhEReFgJdzji0?N0vvI-DXdn0 z-%4se^5S`K?>cSc{fLw_LK{PfzZK1tkGR$2Tg7J5MeU$n_;u1;(?gR*oJNU7sP!BEem9r=3D6_;$oE?H0@_YcwIz;1@fJ@#PiIon9s4_hhVh*)vPisekAS)UoH zl#b|KNQTV25KWE|zY9^wc*=3D3(;M#b)7SRsa#j=3DuQ&o0iWu`8mbq`&k*N!#<2ChP>|;QTzkUaHmA zB&C=3D2)7Jc}(c|1dSSrQ}k&d}>@C2IWIEsvOtGJhULn+bKW?R6FAQ!<+-t;GSE5|o0 zH+f`qwv3)(Sp*T)!J+TS`Lhtg9W3aRdI#iz`KP(7jpM&P=3DKvz52Xg&+ot6ga!wPAI zln^JvMn{Eh9u3kH^EXjTgOE$c^w2XRPUV2+#$Q-S7wPR#9mjcs;~j%6^4d8o8s#u^|G>Bt*` z2w)>=3Dr%W$>9rIXMz}|eD#2lI|CVEK(DZqV0=3D4muS3C<-m?^=3D|dbD^bog?L4bPhTzh zK%ntfora(sq*k7p`CNAXfo1vaOnwV5l$qH7K=3DVe6{SYD?O)t&Q#&Ho%xZ4WZkC4}m zhv&$zc_(u1qYu({h-ls*k#Rom&v!KcWp|by1lBTUjA5uoE3@~=3D{Z`8VbfwXn(2=3Djf z3Sk$P-jPJdO@cSxxu=3D51TCo^36FA)xb zILjk_1KJye_P8`jzQQ`$fVNqOlI^=3D~%T`CZt@Ue}1qGru?|r}wK6UO{5mlwIN}HwJ zP0tqe1^n(xE+>Wc$#PmAQ9~5iI10XKZQ^OC&(aWiFlv+N>1i=3Db=3D@~>Inu9s(!Z(c; zJ862Ew&ol42~hG_%)^XEOKs(-nS^b1i=3D9xIq4^ir|_TtjT7GOG$t#3XV8kcoa8sKj|0&R@(@Y7|lDZ-H#-ppzC$ zc@1A~mebcn4LO$DLX-$7eq{DoD=3DG;5YU!56N$7wl@ZJTD&+$(#8zJJflJ|@_g+zcH zzrxUEsQduP46&6eB&=3D?2aMH`%+C_*FB?V_vW+}}UQRnTz2*$_|LFaFl+M-Z`rJr&- z#`My3LsvbRtK+T&$Cd9z9eK(t!&;I8Bbg>jsYraAJXR4hQI%g)vQ*4*zBBR`wFa32 z)@U>a`;oimV*MPKtpf*t^KDYNmCJGB$TE1wxe(f?=3D_Q;@%*?L9z9&V-d0y_vx%q`0 zh}bT~=3D)$gWooMz3va;Xwosd#RGiP0)MSo%JkRL7TIT|^|O0E%`$t$)}Bi7fNy;7Ss zI#-k$Eh|gSQo7G5OUhN3FsfqIrntF~5~7Btl@yD(5*1r1CTi$>{uLHM8ZRoSQN)#M zQ9-jsTv;h9Xu60i4+lo&M(}BjU=3Dky^vE(T+$NBBZr&P|hfDz2el~w7h-E0vRv`xh6 z8JBWy7Zvn-5q19Pw&w2nV_;zU&GmVYABC!zd&rIps0Y(pv(~!G*!fD zKIc}8I`Mwo+mu*-q&DdZYb$&Qj6;*iI5)!5N#odB5Ouz`Pff+GsUA>syvR6c*aJ~l7}5RH^R>4{Ugkf z=3D0w}GQc7#R7Iep*W;Xj0SO)nj5dTE_(8S{bpo3>82X%wv}MP#!4CF!g0 z`y$iV$*p+;vv>{9q&!5Ai>Jvev0kf^FHmWX09BS2>uS6dW7fA!Wcr?vH93o472XFX ziZou7*be4_Tp9$r%MJ_ea{?yPH6q&xr0p;Xe3|M!4s>t-s=3D`Yu&#PZxW3-@occaO;QO?0iAQt!*H z&w+VZPMPM)R~sM=3Doc$1UAB~hXoYQdX^Om;3PYLGi#cbt6&Yhz~11aedDy)1(%J)Q+ zhPpjL*FxTytY)o}a?55bw4sC&qG_6<>qUi)TG23;2cz_LBULnfJteV66^g)Qudb#j zqHgep)s)9brSjKPa=3DLssJ^PNb?~Kp`$UQ`&Rw0%r66OAY!IsT&&Tdh}Qg(Txno`=3D1 zOCbvr8L5;9rH%RrXg#c;amsI0Q+O`@A;vkG^^|NBQ95NkC1;B$1=3DmyZd`RfX`4g69 zy=3D_j4+_k$OzM^KTqH9IN8$(4!9Vt?7LFS}&M&iNJw%I9`lR^9S|0kNs!H(Rhr4%zJ zvvnC-iubdr&`BXrY)oNI|H4RYC~a#TP&@TSwWqwdPwgKL+<%}4o@|Jo9-Q1mriE>e zv(K&O{A^R6!pyIF1GBdJEipq;BAP~eNFCjluU3RLRRi=3DRehUi>a-E^{>i6($%40^- zPGxa)$^gkjv_Hwd&62Y>;$V7=3DQ(!4lR&B+( zVI;XRjMhT0@S8vKo8$P&uet4N(@&3CF-XkF7rAyUGMKI!-4P>Y)zPj7RmXfJ$Z}&) zEFrcoIAhzCR@N)`+=3DQ{(0}jNw6-Nw}nL9)U>!U@SJv2%eBIC_~bBwF)H(=3Dq~GA0FT zXFI~Gk6}CAGA0!eQ964)rF0P`DQRD0t87C}ioL-S} zP93gw^h3TLIRa%@NzZL-t=3D|an8P|PPf8I zqEf4ctzZLIm!yS}(l+U?uJ|h$zY+fZS69|P0sbDGo8}PVS1@DP%6qDYgjT1x+hmMKf?ZzdOPwr!#0s`s&>Qw(vLD$dahUM@F=3DiihlXm zu*j6>{%j;t6M#{CP&mYSEo&oc$`4%x{Z33u+NTmewTbfCP=3DjbDUMnloT;^f4w&J}u zQgtJhx>D*aL=3D#uYwXekRe)TrSJ5Qz0hZCG^<*y=3DYN;P5jU@NW+-%~>Zodl|Z|o~~0fLoxx8-RRsebOy7y(O5kjx}olF#t}m$WdrEe{n} zO%bQ!^<=3D|(In2_!x4Ny&vb64(-0ySOll{DiD#rll&&O9R zqL`tlt~5gSlZKZ0131>M>a`jLZq+CtDj{_^{z%AvQp{uv$~@L{ypUeGY%g2q^K#S~ z?L$Vr3yhfkq>;!V@(EO3o9zd6c7DpdD9)K%vu|}nPqF26=3DexPyGtMu>BKbySoD`pE zMjf2gC@VgVgj2lJt@tpz^M}J4MZ(>i`Tcw0u*_mR=3D}8{jx4@@#O&uN4T4~_^KYXA4 ze+BRVlO8itna=3DF`&QjB)J6v5>S@EQy?f64m-i~)ceUt9YJ%8BHc67EWpRwdK=3D@wUB z7_X~4igk6z18vG@`EAN)zi(4Md#z3R?3FfU$FXh7XUAex_9XY`X)C^q)`$MqJrB-F z3M>9g$`E+#e?a;vWO>?(%kflwtj&|;RW34p$8o0QW{P24mNU;gb{NKF`O9sj#zdy? zI=3DpqW;wsBIC-{V3F7d2e;)lSH?TuP@homqMJTB1wD?HxgBB7KYt7pYn9`8!<8M)RI z6w$gjgW}hdy+=3DgpN|%$AJADk(+D6q*B2V6W#ZHQ?G^iMvSub8sc8`b>VoQ|e|K--H zpyB-i6K<93j`G{`l7J2N3FI*ZcD%DpSl33enETcMb!It9j5E$o zSPtl89pEG)(}xVuvqW?LW{m2@`$eX&(FlF|JBE59o=3Dq^^wniDDZhjuyz|W_NjPn56 zHbSWhC?C6ojp9^SJV(R{^L z(s(Be5zXb%8~|vsg%E~vHr8GY$%e;-+$3BD%=3DBxe`(K>xbc?)oxVI_GQcK@Py!e*b`2Y<&~M-Cvt7e z=3DTpqVG(Nz3)eI~5w8kwx8l`8vo_ju;O9ui*U~>D(MD5dwN@k0#lou$5o!fDqtM0@Z zSUSBN)RkU?`EsSRSr~^Ee`oBGTUuH1Hd>$U7y*?v;gx^PW^=3DFokjwraWovhcGIGpH z&gioPvi6E!fy=3DJ^r9AIqYkLJvL@r_xr$L;X6jrYr%)u0GY_%V1Y>mBai0Qz_-IQy0{tf74x0A8UH$pP|iinb+id%m8~E#Ayju-HKml zrS0CAu?K%T8UJ_xNn|LnWlSquRK!o2t317)TC%@E<14x3$9x~f*JUe2M?EIbNlXtF z1vZMf^H+EPrpHUE7zYBIA66d5LT7S@AyFtLqS% zzE9o#G?$n8g!SM!uPPdKLOUvi?`iuk~yZTtumE%Lonpzs*Q# zh476OQ5q&PG!8zHmYVR=3Dy0UU3mBKm3(JZCwq{I+=3D#9G|m64OJQMAZ3*o4faAUZuCQ zCW3rm8E5O35s7>ecb@0gGc?3)8K>#xVylBQvsv6KJXg5Yo_}zwap(0{m6WFwxiS9^ z8d#1z_)2Us#-pZ%HOv67y>(J6q#2@uMvFL&b)~0~mYVX>I%8vM2=3D;q!gY~M|3Eaks zEZuJx8RsL0`}l~K8shGZfc-Kflp4Ym06OD)SL$53(1`%%6!9K_49&-phP^pmOe$wIt~PyCoUY_wcpq?_ zk;oyNYEkydb* z4YxIkEgtV!YBHbg3^XK+C*ouSHXrP=3D ze3wf5Nvq!iwXftmT?Vhku9nrERl*ux)FgPl-@9eZWdZ16t8Woe zrc$g3mRYL=3DV{+C&Obo4s-wnnYG~;1tEz`NTnsDl}0Cu@g*st=3DFF#OB;_jSDM-J5OK zH)*}6rA$PfPXjmyWT|oWLQshG12?p!4=3Ds*!2Fz^K0p(1$^rTnbpoNzEz9KCSbg8Z- zCyI7!%e?uySrN7Qd^S)A`_V-r?tCno^EKXYfX8iFUSnu260!TC8(qh@Ow`Eka0F}&uCR{KG*mIjMBT_kSF?NGRf z3#U=3D8bs66ooIzlg=3D^+Q{7sP)LS)D`P98q1f4&crR#qRLybvsrq|OY4kKs;2*qcLC2c$4RwUuvWQA4{6>; zUCW0=3D0-JxEqaiYA8mP(8G^V7n-!QZka?MZ2Q+aNKp2l9t?XjPes}aHPVzOwaJR`+^ zYOH&VJP@nG5>d zU+{6SbmO69+*vKvupSAXxKT<%G#LAEc7-1Ebk3SEejtRobF-#&HK3AwSJaZuZQbU! z1x;1YwRIPAKO!P5D|H{k_XQ40fvy}_qJ6yc1dWiLGPD%W<1uS39d~e`PI^mLv+cj1 zWyV6DMaYJ6x;Q--63o67+p|=3Dj*w9&0LU6rLj>$ng)%4H?c#`h}?FsFp9S^Ta>A&h_ zkHX+KPjYAq@jlFFo#(NVR^BF8l9m=3Dp^Sy4tv)IU<7}1=3D4Jouj>(3BSOvGSU4A@lO;#!) z{b+E~HQwdKGf+49e{4}_KYQmi*hx-)o_F5@Ns;im?OBh#d)Z&4zaKDO_GfrISvq?) z>LDKm+mClVymJNbTE_S8K(np1LaGmPisLwA(A#jt4>PZ=3DSP4HSJga~{7^S08>O=3DOc zPyZ~tYo_1eUDKTdBJW*X<5lL}UE=3D2sZVp=3D`qI3+PTJhXIt7sI@3eI}qyEe3a0#>0) z6l*`eFJ@{~EuvJt&suWt@ygzKgTB0H^VoT@x|yaJo8C9%dKMYyB6)%-GL9wJvun5M zarE?DxnAH$DOXK;F5e0m!Z|tkmz_c%!PC^L{e02joeO&S1m7foaqXSb9)u_eM9x9G zsm`vtYUHQJdS>6;%IPkxPtQixv7Q947pc)>9gIS0Lrb!CtrEIeu{oH^`Nq(wlNL`q z4*ZgHHKNW398CoOk2v``{;otkPsle~0^QWoyL8@h$ETO!UbTXZc%BA{pz~?DS^NyV zu%Tm5$4w?ILscK=3DLU|rPhgE=3D|SIT?zaPtZ7lxzw-+5U6Bk?QD@jUwp$7W=3DA^us4}8 zVvDrtr)Q+bL{!;e#Ow{mD0`EkvG36gY0q(-p6x6RHU>6{xbv6@kU9z(MaDsUfDIF~ zQH^sWK4Aex_WTdi8tlusPYus`XRn?jGR|$VluL*mrw6_RI(Y+|IC{~=3DzD;QzE;f@Y zGEUT`5B59f2t3>pCVf0t@O@kNlFvF9o~p$Qtt(;*?q{LJEEQac(V6xER*>AH#Vf zPN(uywp5J!jo3oN@Ou)XKUvjZ2JY;|$|t2$ z`F<@}wTn`;ekR+M>Woy2hik(lRn|U-YeyZ+-PPP^K=3DeB14Uut7j)8>VFkoMnUHRj_ z1v`k_W4Y<4%3}6s<2!$%)X1gzte9JRVm-BZjZ_OFd54G$mB6MBTbYQ{aK3*LtwYOT zs5DoubL9`&#yT$3oP|L921~<;>Zs#4$4b~CGmQBZPbNZ6kae#U8K;B!Z!Ruj8vLbO zM1TrP;LkeCQbQhECw!i&5}W{^iJ1{wVJ|57y@=3DC!?UQ0k8KNl1zN&{`73>aL&)nj@lAz_o#Q(ZF+KmMBnbNUpqWdyWwb`Q$U)cV*1m^o*P~QxOkYP*N|p0!od-fHJQD5>ybQTJ%ss0km;l)$(;+ zBR#BnAlb1zn!DF{>MGH*yOnph=3D0P8Ws~MWjCqtEd2D;}5Mv67*GhnG)20JA7vLewS zcj!IuiAA1jL$luy&7P|4Q|CoUcG%OFz1nt^z1`4kKEtRy!&0S>zWuJ$r4{(_vR9L# z*&l-XDs}0>Z>e^7RyN2|mZjQzSn4?gd}3FgrSAlvzj{Z98f@b-iDer)N z_e{k9&VH8f^1BD|p6K6k-aniFho-`GPJeg(gT_cNR_IUcMYNxH8`m1j-Z}5exKigM zH?H(G$TJd`f&PE4|5P*OiJm_2JJ{wPG&D`&IXMbrp#7F*fScDBus;a<`p>?IZDx-- zdtFQ6e6iHo3rqIR9~lWdDKb>Rk<-s1a=3Db}RdD>6s^A;m84w0gxD$6%WKR8iABaJ_# zU=3Df=3DtDrgq&ur@*|%q08bRa9E36yI#YaUov9T`09yxF}41LsxYpq-w?}Sf%9Yc+m&) z#$4x@5@Te5;CQjCyV#Q-@N&cf(+cm{9}_QJWDy#mHO%kN%-%>q2%2-y## z=3D1rgKs{Jt6{t=3DgW3jK+U^OAVl>BhMw(|3rJo7hLe`)t-vVt{^~g=3Dzm9zs3CQy5b0G zJON1Zzxw$#FryfG@Z)!O$oZA}4d*rSvc6l$yNl#R^@gT_Bk@^X#cua}6I?G}-WG|u zulNWpb%e+hyuj6#H1Y($3eVUMl{~@I!+MAY`Z1vgJ{L-nCtnwj@_psfw^d8QD$KV> z1DlG+rA_u{yTaSvqhBDQ&! zh+v+!Weo0(S6*N!ebOT?R48|f5G>$lB2rS6(GV*YCR%6u=3DqPb6dBjKuV{uXYB*#hP zGFjY9=3DP`YxxW9a)uoYL)DKun#QE0I18xR$7<&#J(1TPp*^$Tu<>g|pb2|>;M{kgIBO0IB z=3DZ7_w<|$fu2>!Iv*>(^!Rlt$aHiAi&A9yxs5u z(?j=3D)sIuFQ3&CBB-iVr@uxcl>krJkt7MQDPwmW7)cg&E5M2=3DaprP&?ig}>S&_>@LD zY6+16MdoV0NfKi{*{xT7U_Fi47E~&uh500*2qVnrChkf?%s{xZeQ$Vql8nkE>%B*_ zcW>`F#uU6og^#0acWV(p<%>g}E%| z+M$!DYDyq*wyMiq3_(96+aEHG-RaWUo#}g-!d3Eki;R2a9n6znlXL@E_x{*OCO~nG zR@lAqp^mW!-rvsRZD@%AV||nOHv1#YH2v(S%UJbZaNx-RIERt6f2*sZa?#9DvP|FH z$~;R=3D6~eY-zd^w!Jr#fsxsB{sQ-gKg{+-{5#8N7JlyOTgM#(It$%rPirlkDLdq$K5 z#T;h`ZW)&`@0e}zBiz*N?B)|Cd4?3@9FhGeO2ycfMiz5CLX^DH!ksD?nO@kGJe6xD zS0VU0c`CmxZ;ZsqW9BQDmW_zS;O$H|eI6glyFl^^YW{paLJj{CAIbFod7n9MNZ*;A z|_a*jpD8OE@-xfD^GZsRq9ybaK=3DUNP=3DXlA$IbA%W{8r360eCCCcPc z6&jTnFI3q#q#}SAIy!Ok8l6-Tp=3DJKL*h95nHtK4gXi|{dgW4`oJ@94swBNJSUS{KDLFVc82P_m&5IQ#3q_Rj7g0>*tV9F6lMigW zDVFpEYTCyl>qZiBTQWN2EjOo8EBun2?XN1yK<5wG-1H6d&Mh?BO)}ppgbQD9ipR}|V zuZ&CyYb}L(tOed~kh%CAxonn{N?S_Xs0G;<$_>3sg%-zh5O#uU<}z%A$@U>YN*~J6U?N zgc639458-E6XaO-{pw)viAo2%?|-(hd_Mj&Xo@00qj*im*v^Dq{f1YSkf#$X>{}fP z@>Cob(L;endID0?H!L-j&ptA+^dr6l_T+1%zd2n1cy^gAF@{n+(}6cxZ+v0PNvUD* zEx_JZ;RVed?O=3Da{%w4uZ#7Q?xsVVJucMeFmkd_mqIO#?83G9QL4!X-t<#!tb(kmD8 zo0R?Z^jR#!&2?osNY_&KLk!7+vSL?WUM`}}n*-M^XGL_^t@O@iU*U@w=3D62|x&IUel zC`~VSp#0=3DJnHyN$qx;EFH8EnuEXdm-Mq4D5G^M%P6N{`pJT$mweC^T(`TdH z=3D)WO~6cI2uCAIXf7*1EamcRm+v)m;q*go1(q^>7NFdVW|mTEuA_PeuSDTMBAX!f(< zRwJh&vcug!CR*W8cK?`lnEMC#19bFOob>3b&6(qNeS2T{82$nKzUd)YPH^wKXY?Aj z@Oi~a1pi&n=3Do^vIkP+;Nm>CS;9cIlB}&(&3o^dSIJ; z=3D@0m{D`Y3LC%vV2xo4g@>2*&-c{~bpUj4fCY1_x2ZGzEiCz18W^=3DHFbvCKy_CS9G9 zzDX&94_lJGrkL(Q^W8I~Cxi3%0U2kc7h47=3DF9$y5b9v9Gt#Te%`pU)_jkH3VkNu-? zc2o>IB->lzF*U?eRS6Y)OtA&rJ%=3DASzoU}-&hIGX_c+-6YWvNv)<19i%rDCQbMsr9 zuenm$gP{GugYKMG5A@zC`LPvBO8>KbF{^)OOHwk+j+jN@0BUxAOCD-dQf00!nCDn# z83JWto=3D0g%G|xCUKdgD~n)6T0vreA!POP%>|7F{phTm3L2k&W?7PRuM@~j&)&NG)? zSDazXT`#$OsCCDPp1xhsSjyiBjELw-8s%T4c2Y-z=3Dr~7grDHl`PsIv#W8!*+5V3_8LjPn!M zo-ZYNoRi&&TqYP9WJu!Ci=3Dni?4KrPSDfC#5Openej<1Z?7>Qa(MA!rGE~n>bdNXKcQE>e$779fSFkrQCBN&1z8tRLW3I z11H%1AZ(uH4Pq&2h?T>$kFMd`;8$mGtcF)yL7Lk_A=3De$r<$lI>j}c30s>nDGy7QjR zBZiDeG!7@**J31?A8O<&+r4d&y+NKF_vNz-z0gumk(%muoxjRNSXM((k z?HPOqR`hfC?1ay2iXJcDgqaz~XVyi?xwVaZ<1A4{NqAG1KUcm9a;R8DbIlm!gM!~@ zt!Le{tQ1Z=3DkVR5gTYPTDLFU&*%Z-*6zC{y~iF@9~euN`7OPB#K=3DD6reV^a%CNtiBm zV?N*^hkD%F2>5l&_X~|pDFslEWuMQY)7sH#<_I6;xz5Fz6BQL2NgFhbGbssUo*dV)oLNBK z3oA2^YZ0JPGvaBId7Zq0`^xVwZ^QWZ(^y%a8KVYywn9aqnO#@N5$k9nPoU4xG+ktz za&GH)Zr||1N? zL3UEal@mFaUX*5bw2~)qag&xB(xkRhU_tv=3Di2`#2lM#J~=3D$aUWX5)aWypp#?R&u92!16Bkb1J58{5ye%-Re=3Dp6>U45hw(1YROY&(N zVpPe~=3Di)no)yQ_49|!4hpPSO@6+z`iOOHYBMI16qc8=3D4FynN?1C1ZT5H1alRlc+I} z+l}Px8%2oR_Kf^mKkrvAk$g?Lk$L|bqVzfJmA{ZjQu2TJd2!~tPd>zIo^m~6?d1G~ zwUn=3DoQibwYHt!zR_sHg=3D4p^p$W(EffLgHO_4Di1V7rIQK(~m6=3Dg_4tp(R)%Kp! zrIDEDz()gFMdnyq3&GnmRmhy;Z~ZgpwhxQ@ILJArKW12d8VTvhKZ;C7Go1`$v#xxy zD5t`3NT;$&F^86OZjp7cmBDwV?*gv5MxG+{oz1_l7d6gK7pI*fg%D!HxaV3p3&_`dd5_#bu3Chbc@L z_mZ1*Y9Vm#l52C%ljJG67<5*0frvPc9&TmrwPYcF@rg+=3D9M*Xym7LEQx4??t(Mg_? z#WELoI2@Ai&*M?hVRtHN#@veLL3crJ4PJ|!1>n8h!rU-*G6%M{j9Py3&KmFuX z_6hYyv=3D}V}C!9kMFVs}8m_tu(8N+rm_FQ@`${sWC$kJj4d7JcBSiHO?)q%6bR+`)t zY9a9z#|a=3DGVm)>|B7gvN)0Q;1L53Q^m0nWefJlb5CMG4;knGaQlWFGkH=3DYGvm-0 zK0oF-04Xb=3D|J{5a${5bLT!!+S$-Ctww%E*+<+1m=3D8n}$qu%-P5G1{WWd4pGAe~&VE z?ZHaEeyEZ>Vj5B97I4bITk!46%I|%!#6s3V#5w$G|G;OHyl)l-+&%amH?K$o>K6_Y z%>=3D&-s^kn*{Omr?02`%eMFU&*_~}utu9s{6`g1vh<`U7sk;3xrh3?z8@HFdB5 zY2X*4fhJ{T#G~dT-iob#acVb0DMUk*nS*Hrdu%4{%_wQa>_?2ER6*8b=3D_uSpK2ydl za6bM;$e->w+uwI1JYa*&d9wZk5=3Dw&+3PG|z7FZp%BqvqeV(HzmaQKm(wu^IXi3U0! zrH1snv0%3jgm_4|Ihej@de~oimWb0l)6a2G#{pAhtIT@mez1ZDQLfemx5R^}rLkr)@-OZ)&SI~1aSh~N zk^PKt-y&K?LNbg?05Vy^@7Y5(~!WV*(9)8 zpB(1wBUM>qUZ>bpBVSiDU z?C(f_u*r>k+l~7xS+bv!{$QgU_p%#zRF>>x(jQ#n#=3DY*wP05mdRQiK{H*VUE`%77} zbJ8EY$c_6uH}3PYWKZCZi=3D{`v|5NK;s|}|RH@@R#k13)BX&5>yWXZmZf31=3DwJHfv? zWXT@kU(mT5;$PRul6|N22kWsLL#^NlIA)LBL}9FIjjZR;xD-%ryq{?=3DVDlwevO78K z`*LHjCLG*PY!lBH+An&zgjTnNEO61wr>c!(ZV3;{lD$a!gG*7b)dNfVTpvr{iw8Il z>_SyF?sW6q4;^vo5BhW-*k3{$dDkw6I1i71V|o0)AWO3t|7Dyf9K3**v7U&^*$$d1 zCOBt`YrEL3?LWxU?03rhQ`Tu-M!P|q%l6J~`}7ysFG(A%m7P2@dbABaoIBwB!L>%N z&iz5{W^Yxi6>M)q1Ax6QtYwPuDB7|Vej%WF;Vauk$4Q1`Jzb1*s_&njipx02v9RRy zTDko=3Dmq8!&o!)oR%24(c$!oEPhs0P|U?jk?u$^?QkT|_=3DrN1fEkb#|&JWlE6zmUgi z43Z}f?Wj}svT}4FG$lOp3LCa5o;gawBiq=3D&39LV_#HqCXYq^n5`d0IqH;~*dqs1tGY#cof?A;8|Wc2pKx|bN<;D2F4g1H z!}=3DuO|6O7o)2H(V-plsexC>BF?{KWqD?0{-8v1f*)hY1uyy5}ME16E$Z{@OJtKL7| zNDJU6iuITuhOYsAZ>BVy*((mLtYdWQ(wwhWaUo&I@_ml)FAK6{KQA{?y#w9aFLPf_ z`}0mORrYFLBtb7?swou-;sJiQ23% zFdy?!pS^+K`U{!!V6B{Z@QYM ztYCTp!A^V){>Oex(EyftY_q~_g}x^ZtI0v46{oHJ=3D_o0d0^F<`1| z?ax=3Dylof_u31vZy^Y3)>FY?R7R2SNRtnMgb?ZsXOK4~gP_soA*aJR?g0o#@b?O(`} zjdSY9Kx06|E_n)VZ~75rjbKNV!=3DB@?lR9h*hcQ3d^t=3DxHu)1&1el(hu1ejbwSF-Kp z5;fw~up%@^bu8=3DiTb$U|;_TTYueN{YoD;~6xJTwy0%hdrLZ}s7k6RVv*&d{?h}AZcY)BYf>gp-r9;u4U`xfkyRHTOvN{KF- z*B;eQ)2_6FrEeE?58qJxCVQr$tQ>7n>l)wK@@bB?n70V`U2HuD{`cVf=3D1Pe+*09I2 z&CYtTV6iUs2k;q*(9rTc?_3n$?6g6ZZU5AvkMgw5mX-@O^b^Q2%2Av~V+9PQi%-eV z(gNj6p=3Dp)BS?1`i3d;p*mj%lOyvxFl7dTRzVW}+Eqx8dD0I$sp*%>X&ncXkII(pfhbAKDe!6$f zDSDujb#-dMH#7}{gOFci{P+r=3DQ!9BCtf#8%RAqTb3Eu69>M)ye|Dw`t_AkfE5qgGg zYp+<^B-`vyy0+@q%ba~mc93Yf95dpxUO{1RkaVpdlbh(H4m7I2t@qBL6y?w-&k2j0 z&IyZ)99Y2iFm|Z0{dQKbF#Fx!RKLY7FWE8NU0&4WWlLo6(Jy-)o|@^A>VOe z*~I}(`LWYjJU5lP=3Dl{?dPT>QkDBm|-yjxpixQFfE)F{b=3Dx?$b(VMqIq+nI7?p0F-% z^&Y#h$6I`=3D44WTQ@yTP0(8t&A4^1h!Xpb)N64wp>m1AF#{`-K--3%KgtH4(H77S`g z4Kk$mRX~bQ7Z%{$mR5t}>6=3D73z`R_?d`Q**el83+-(o zPoZNyIOo7A#=3DYFa{l%Z_-3*^g0UkB)hD7m=3DP;hb~+Q}hrTi$#JbK&QwUw9x(@k-u7YRC#*6`R*Q(A4I=3D3 z)nV?YCWTS?XV#b3G+Bjb5&q^8XS7@zG6JYyhB?2{#cP(aJZrR8RY=3DU712V5HDCUcK zC07Ky+e(Aq;Z%P4ggWc;^jRX`Nq-fFt^#Uay+`DOVKH^Fs&9|TUlkTp0$6ZavnBEY z@EW|*Y^57cthQhD`IJYiWlj1<<_f#m>kYz2=3D&DdYztR7QJV|$k(#03ueH&KeQI_j9 z*^-4f6wCuUOhv1IcH(0DMb;shJaHvkI)GeR@PAh4>+&`5_A-4bG+yTR=3DQXTvu%C1> z!~5I%TyQCW!O8;sGh7IJAtAA!_4TT;rm-f*YipIBB}=3D1Mw>(nt(=3D$zv%QpKl?CtCS z;M`DDK-tl7)>s${=3DBxBbGIw5`J5Py|vSh;wBVo&wesLiv1$mB$Xm zItI&Gm><<2JKJ8AZU6EGO>J7OAfN%MCTB)fZ$4U;Z+>CrbFhwo>HA{|W}t=3DCdRYm~;dZCmds$)D%^IzP1I zsBIb;)cjDHjx4%O#m_ErW#5$4+eT$q!nS{b-4ja{4C=3DJX!EX&VrR>ASv}w(oBI9m0|gtqwr>O52=3DuXsr?s*~3)n~01!Yc- z`O~_gBVhdCw`9Q=3D4jP^kcVo3y;Pw$W%8kl>_Wg{90=3Dl zpk?_0fu`Ml(2`A7zPJbbdTNy0$kTi)EXJQBU8DRq*}fKdL}2K9TEYb%wR3KGZ}*dp z`@H$#{#z?k*UoC6*6+Ie8CYQ6tzf3cQo*OGksZ>hD9Jla3yAihh^4=3D_KQNj`) z=3D-_fKx%03*&bCsXDERnB3%mvU>E#l>j=3DdQ{n$9Do{f?F`M!O&dt6MteO*?EmoD zIjCPv?W}bx<|X>&f7bF~b`}IJ@E?;o`(GI=3DAND=3Dn@_c0uKt^6}pOSvwr$W-~v$U#E z4ZSpflU#0}k{hXh=3D@P7vg|ASf+(--jz5bm`8s$y)3oCa)t2<~O7TmcFO$j{$4)(hrZG z5J*@Wl5O+|pGL9M?*XJ_p$H34?MyAbfYr1I5(A(0 zlJ|37@;3YAak{2(0ZtUrYS6`Lq98RC>PT1%Ua)yqk{_jC>i5V7`&2I#%y8TUZ2A>D9^_3Kk#5$yi8; zDh0tlFI&=3DohIJT&Mah&MdxetysRs__0WFq5SJ1K#!jo1xCsN|18P<1odxp#QRhBNT z7}x(kZ(P57&T;LYGp<+_pXPBbOgH4!xbDEX%I{GCD+bQ8nEPRT>GOs?vX1W^AlnDq zK7O}fCQUwYD2)Dmu444PoDL=3DBD6KKzUX20ALgDaS3{YzyFyP^T69Zs<9~f}CbwXpn z<9@80m--);kK3nuk5ym*LLTA}g#j&YO^=3D;bQ@{N~JqKzqe;sV#GF~W`VgJf416c5w z9-S|p0~9-5J^Z8TfZ#%?@zq;$r5@+dxB{{XC!RG|3ik&54Vc13ap4 z_I!LN^^7{vkzb=3D4NN81Om8`DXL3lbLOH~~SZG!hsXkHXrX{|iz*@7Ka^&PA=3Dg*C+| zOC;nSw74)y8?3O`LsQe$wGmrGpkZZ3DfE;l^AP?sCFNSC{yu#CcmR@y6% z)A#rszTeIlTB%nar-vc+&+^eF8UgPsbM&Yc3}c;$(_$+fhKJWlicZ&}p6OxKX{E!e z7yGAcb!`i+bXfJGcDYwBry9RU9-_rZi2T0V6W7?qWkLU4e$SCKd5;j)^#;S#n+|(=3D zz2WL!3RlTZwAk|YU`3jwB^LDnZfm)JuqLv|q8?S_lIftXafub|sivuAYvm!f4zWJe z*Mm`MlP4)?5z0aj3X`^A#lUMcTtIw;NAUl)98f4uPLEKLWC&CiF{zyifF)|8ulojHJ#{j`EReN4gKeoMjJ zep216f=3D65U1K?8Cdf5fpJl3?!(HGU-DQnxW0`|e5Dq|-6Rzr3Jc-S`kJ-woBrNutq zi5Bwq!VU)S!=3D|^9AF|Q3*thw_MRswSuQxBMr?)}hdiuXm9bJI5y*K`JW7jwA31TOU0k-gH}9?P?eS9R zT0wJa>+yPe^WLhK`Y$aGlD|jo*U-KrJ>+-V=3DnwmQj`UF7kuZ6CDOimYnBH*E)7ulQ zn%6RA@%wQ#Q|Uvpxk%R9t}`@s;u>1qyS7Vna5_Gqxy&`w+l$cBf-HbK&s8V8%2RDy z$UC!NSzifxi!X+HipP{ZBt~k%E$$8ZD#s!uq?8rcQc(~1gEiCpiqQ5`^;9dG!+Tyn zL7iKVsv{IuR@gm`UwFvYY0H!4ddm7ujepL!8dY@M)v@F|OZL&|g(QQvPFY>3f%Fo^ zaWls=3Dzr<8)2|OsX=3DW}p)t<+MukFJo%?NZZ0nWG(rWw5ai_*heH9i)}&<#B41B?`;0 z0bAKlS1Ucy+bke+2|L^pr$SubeXLW|RH&k1Nb*^&#Ybrh`wZIxkAAueW%!%sm2%vE zUEw}^qo~t97?pQk=3DO*SeN-~kHxt`TN`@e$Q)D~<3L7m#wbi?@yb{F@;Djv(C4lwus ztThD+Z>48$q$%sv%*{&T^bbGKI&WccyBc!OvJHuFP=3DmF|@%si`*&U%RLiXA+3jbGx24$;m7Ctx>b5V_U_e%R=3DPsA*{{2;@Hp+`eXPDunavlf=3D*O0r@v@x38}J|P z*{Wutr$6MK39{@B?(H!fz!&D!O?#n+KBeRrlt&VEe&r9r_d}tEY74NNM8!O{%Hwp2 zyq?-aViKGhV(;norpZb(8I_!9c(rFKewfRtvX}@-q(!_16X$e?8GcWROIBcj- zVjmj{&s>aMlq}I&xq{;GwJulCIL>I~3Oa;)Ou2&gKt@=3DuptQ_UK(3%D=3DDl1&S(&4D zxq{kdj{dh?LEB}HF5&Z!8z?1n1kYUe_@8G^G{}21oU1+ITY~$~-kvb@^kRPaUH@yGFSD~QBnL=3DC^&NoPN54m^fxj`Z?mSt|^d6WA9CSEHAM3XuE?+p~=3DZA zS(<%bkAPQrsU`%y5vbij4hJV|9zetL;+B{_m@Tq`Gepby_XUbhO|QqeSl%MM9txtx zAGPv;mW-3v`lcY73^mRKnR?=3Dui)By>_0(-0E1qJCy_e;7YB1L7&d0XjgS^ruGLCsV z&)ZPxzct28O^;N8~cp|!A1VB2TjQgBpom8QLyN2G?w30&+abw9UAKh^m=3DR5~8p zk{wd5=3D6wOQZv`Z5&|0(wrT-3hKSP#4fAIaARZEAsMeJQ>R8lE#-6?*0{sJ!ihf< zsA%ECsx`f0ruKpHnc8wYc;4nbv`5T91H=3DRSE7Of#Hsi^+X;S9s9ZLX{jt26uFu)iD zSYeNJ;kDK=3DSf|AbqTpsd5+s_m1n>~>Q?>>G1^#sb!xDEhHDzu@*~gG^UI#y-AfoP_ zZTk#X@45JOlZ#*QymO>n&iP=3DEl5t85xR>Ew9?LUVsnPd$VC^ZspfHb5UO@xklO1*=3D z{v9)G(O^QS;@!$K)4i)QwvPy>Y)2 z_q9GTv*KuwY3mAEdT)p7J@l^nM6e39Boqu{XPwoh-J`?n=3D7mpG+SOVFEk<}q>C@I{ zVR4IX4xiarTl>fJz4R5u_d2|&KF7VG2pL59I>HU}8uDNVe$j}=3DCAN0~el#Rz_G=3D#l zqWB`yhc@P`vDe`p5XH|`K9|;`Zl%;3<#025@`~cTGox=3DHdvSINn(%da*`SNShd!h8 z3=3DrGPzThWZA8W#V{e}O1B-ix4nE8uiAFI)$ zH*dLd>wpfwY1_@W3~mqKy2DAgbJyZMgcHjhoar;Ly-2XdpQe zNyK9!8a*h6Q<<@dNpr#?u~^2)W+|JEj*8((JYmGd!MHgpqS5P!%yWizi{PQ*c~1kC zTcEm5lr}T##@Daw7HKmh%v4GwBAF3`C>l?Rm@yHL8p6nAQke!4BAboJ;9^9GDF4K- zY;<&AGR0wLCJ`7<#!X=3D!P8;ZfX=3DF0vX;bVlvguSZYlz-NDtbWlN6bh!$`fMCcrt3n zQ%TWhW)h;C#NM4|BxBx5B=3D&BNB+NTW?Cnb!kqknF5TU3UpNN}>%jtI*+3_(W5H^yr zcya{kxrB0nE~y-#ODqQui2BN;Pdx-C1+h&i4uw zbj!KtV@50Cjr%1uEZRn1QEfJw+SjU>RNN>F)jNyXyB zaf2bV7vKx*PR7l^<|MaoZ|`{aFhfuG%n8^1;!m-cv-FJ`(E~`U3OE!s(yB7FM&~a# zhs54+CN+|Yj0Lz>cbJ{_4J4zfOvZ?sft!uwh&hUq-5jba6=3DE7Z_T~DWwgN%U4&~b1 zwsN(@k*F~*yl*rTPsWoYZb~6UG#$B4;ZHhaOzewB4_?Q8Ge_fD^|d*AASU`F*_haA z08!Bb(J?$`igi~7h7OxXc1?G~`=3DnaGuAB-rs#5w=3D$yl7xdrKlRlI5}N8;b>Y7#}yH zjN9Cc2{pKZ9mZYb@r=3DSRj9*~;xETmXGI8^;+nc?c?;4M%$Bd-u1OZp)z-#*irk%nS zjKx?wVVFjsKQ$JKtI)8K8H*%Q#%4@y#wtyN0=3DqJi=3Dz+kNF*OG_Cu4!saG>vS0;9M+ zZDb;5DigRR%QI~-71&`!Q<+#`OKM!>-IjR52!t~{xaf-5dwV8s8i9f2XnZKnK_vDL zjHNS1G@dnphHLl1rYD8ij zEG`qHaZaR5Q`Ed`%*bXVBSvLC!((P3W-viXntOwRYwmRO%!%0;Si9j)7kg79BBBUp zG!;X6I;Jm`9FC8SXCjPk@#JvIi5cUBU1BsIK;tV~jnB&}+P*jF)N@wM+VjS&L(CSn zB$+9Z8BZ$QALti-eFqze$hP05UYlx&*7CZ~LH6(T+n)dZrcmrbcr#I7YCI7W$&@J$ z0*6GXZ`eyzSO`iK#D=3DMAuQ_ZMX86 zp06kSwr`u?8Gh^vIQO-@cF!x%UGU z3pEHqLhRbIE9}-16YW{i(H;}qdYP^_fFhhbg_8iWs=3D#j1o^7C;QxOm?kv?Q3;>qzt zozdYDVIRyBfNQEU*GM*IFvS`rV*pTl!Hs7tEGf9OiFicxZ|w_rGaaG2y1Mq@`WQ9b7@t7W z@wA8xn?^>o$2ghDsA94WgtT?BRMKdeHwy;B4t`-AR9gqa6IVH*-J(6#>HOoda?@O0 zktT~)s~8@wtdW^8GTj*c-c-sQjwcL}jEouG&Imc<;6hIIP;u9t0?a1{rhy1UiZKLp z%xEb(+T((m0+C844zKBKpvwhOzdL^nV+@38$Pf{sIQ!0l!JPt)poVZH!vo?5bvH0l z(Jcx`L^d6X8X{|?BfQv(c(R<9=3Du#K!h_;WLA~o#HzRu205sj#s3Hq{o_dtIqVU#QX z0?x<#{BV*uZ*rlP(3p>rywXKqae&dCvADbzAg$QGQw(QPV-8kgLBKq%;i*fW8n6DY z6DPlR!rJ-n|8U+xqAJAQSw$;3jaoOH^}_DzBI=3D=3Dr%{z8%-_c!PU*8*viQPMHZf%$s zhSh;beojnZB)QrY86%rYOc)}@tP!UY9sPqlHTGc8L4nhXmoQ>$P{z4%eQ;+bs;kFC z9=3De!3O;@S)jAotirmOTX&}R;{ZSI!`o$Kz#-&$(Vwln;Re-Q<{gB%ldGWXF2{H*K(^i&ZE$1||KBm(=3DeH~V1)p^h+!ir1U2k1 z(nf@-4Nu+-_$f_07^&!HjAE#7n@C5Z2Mm*`LIX93@gx{SOtyJz(Ul^t=3Db4((4MgU! zneOiDq6UFq4oSxJ0`+Kc1MYN!D#9>zK|Y+Q25~TxN{(p$P7H)^bBU3Yq#}1GX0u|Q z&k?J!&us^=3DNpJG8prY&sB2fSFWX6a@N6}?sysiwObS7n{qN&8Z&{Sq_MjFmUMzDcU z1TSeAF(W1-$(ZQh0%n7Zq1`P^0#krj2t* zCVJAIB}Io*rdq+Un(F+KXw=3DAN#Y8-n;C4|wkuXLg2~|^yp%+gjX>JS5OeC2dHZo$M zpD39U+41P8$}yfbGP-3ra{vO0q%o2*Gww#osWr9yXOX?Ma(pu`&oq8GEylvt70v|WHxxeE)wyivt-7M;mCNx zq(o%MNRV2Dh_Iq(VnmTNc30q%#>Rl&&N|LawX;{~Y#`nPce~3f$o+8qkb}O7RC1)% zNwaIzV8)HnIBRB@KT@0l(lM6DjEtggV4vr3hzj{ZMR-Y!o1Ih{-$lDJhf!i>AZN;U zc6O4}hB>jityh!@6d&Pnn}ch4i9hduu=3D=3D-dPvswxT24hMn>Db7N{ZE)sQ9pm4v%0O ztk&e9wV`9!Ik;=3DjUa30PHJTbTy3EmWbF?dFOc;r-yNt2%u5>go6i;QlvgAHrYKFuTfKyOM`lw8w!s?gLzN((D6!v5)a$Uvzkc_Zj<` zW@YweQ;B#qt_WPWn8PJCkV=3D^};v=3DI&squd!F?KH%X(O=3D-z$I&dex6;jes~?{-3VP) z`KEy%432HoC$G*)teQV>>G}9CkE-uK_Wjd|50?LY^}dx+<-Ymg`qhx~ z@27vx@4G#Gu3CF{=3Dwo{M;dXGj&O)SHhA^)5eIBHl)27e{aI)h?eaNXMAhP79TjvYo!Y>k*IJg_dfhNv?;nl&?KWQaOVNJJ1wotYHQ1~?`%7LQWrNXn#6 z6*iR3QfD+Z1|F>3kq_`-?mBQ_`ckV-r-(=3D$PZ9mNV)f_8Apv+AEAs0xsp9!Z?wb~? zZ0_UKho>1+Q^z>@x2kXFO>H{fd1{;=3DM091!wtuU?o&1_!I&b=3DLnU?ZX+5W4ET>9nY z*Mz}&!@w`YM#sDPfiKq+QT5#V9eVA&UHa@imHppBjOzk{z% zd7Qs?(iyLx>T&bG=3D~O%~Kb}3hZ+N&LWxDIoUk?yLuRZ)Y^&>n|G5$Kg{cV-Zd6OPb z_i^&$J$zRFyLCFJS7khM9w$GZM8%S%>c3m#tw-bGr3GjG)Q^ML{M=3DPh|J((_$xjq; ba_Yxv8Q%DF#((bPsWNoHC+0@D`RV@w*b1Nq --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689548; cv=none; d=zohomail.com; s=zohoarc; b=QJ63TL6I624ZpjiOb/5ZowwbSRz1qrlPPU8uTyvX+4YSVRxE+du6d2V3UyiRVXOo152mntsrdEVMVix1CnlA6vfnxyQJ500tUWCClxmCjzVyv80Vj9gfF5EQqNeJC/D5snsGEsDKo/wEl4N+xmC+GEezZBzjQy9oICYUam4hdzw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689548; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=CdCfZDKjDgKmr1qWba1nZzvcJHpliMqM+wrWNaI0pqc=; b=YghtUfalAyGdUOd07c+N49klFgyG5LHz2VduJjxhGC35XZhxF0Y3Gc38OtH46FaRJsa72SgXNE+8n2Al/nW1eBM1sKxoXoUcW6wXBY464cHqz1ygWN2HUV011lDKx6cE5wTRLXpb2XvLcpTSwXX+mKRrhQOp/heqvjIeswjCjjY= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689548833294.2031199778729; Wed, 23 Oct 2024 06:19:08 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFP-0006Ph-O8; Wed, 23 Oct 2024 09:17:59 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEz-000667-13 for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:35 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEx-00029O-AL for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:32 -0400 Received: from mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-50-SQ2lQlMePtGUpt_KzqPMYQ-1; Wed, 23 Oct 2024 09:17:28 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 6EB191954AE5; Wed, 23 Oct 2024 13:17:27 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 1A35E1956054; Wed, 23 Oct 2024 13:17:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689450; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=CdCfZDKjDgKmr1qWba1nZzvcJHpliMqM+wrWNaI0pqc=; b=XxEG+jwmEbr6iqIWnEXglb/jaJntvQ7VsEE4X0xMOYqw1noG3pjW0KZUFI5Tihxyhv69m0 fFJO4Xyzb+GCIt4ofw9GVKlmUTR/V4GW0gmRvnFCFbUKoWZQ62wrvjHDesJ3C1ieA05rnl qmIZp7SoQbQGubWA4VBi4Qaucu4a5WM= X-MC-Unique: SQ2lQlMePtGUpt_KzqPMYQ-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell Subject: [PULL 05/23] pc-bios/s390-ccw: Merge netboot.mak into the main Makefile Date: Wed, 23 Oct 2024 15:16:52 +0200 Message-ID: <20241023131710.906748-6-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -23 X-Spam_score: -2.4 X-Spam_bar: -- X-Spam_report: (-2.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689550402116600 Content-Type: text/plain; charset="utf-8" Now that the netboot code has been merged into the main s390-ccw.img, it also does not make sense to keep the build rules in a separate file. Thus let's merge netboot.mak into the main Makefile. Message-Id: <20240621082422.136217-7-thuth@redhat.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/netboot.mak | 45 ---------------------------------- pc-bios/s390-ccw/Makefile | 47 +++++++++++++++++++++++++++++++++++- 2 files changed, 46 insertions(+), 46 deletions(-) delete mode 100644 pc-bios/s390-ccw/netboot.mak diff --git a/pc-bios/s390-ccw/netboot.mak b/pc-bios/s390-ccw/netboot.mak deleted file mode 100644 index 0a24257ff4..0000000000 --- a/pc-bios/s390-ccw/netboot.mak +++ /dev/null @@ -1,45 +0,0 @@ - -# libc files: - -LIBC_CFLAGS =3D $(EXTRA_CFLAGS) $(CFLAGS) $(LIBC_INC) $(LIBNET_INC) \ - -MMD -MP -MT $@ -MF $(@:%.o=3D%.d) - -CTYPE_OBJS =3D isdigit.o isxdigit.o toupper.o -%.o : $(SLOF_DIR)/lib/libc/ctype/%.c - $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) - -STRING_OBJS =3D strcat.o strchr.o strrchr.o strcpy.o strlen.o strncpy.o \ - strcmp.o strncmp.o strcasecmp.o strncasecmp.o strstr.o \ - memset.o memcpy.o memmove.o memcmp.o -%.o : $(SLOF_DIR)/lib/libc/string/%.c - $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) - -STDLIB_OBJS =3D atoi.o atol.o strtoul.o strtol.o rand.o malloc.o free.o -%.o : $(SLOF_DIR)/lib/libc/stdlib/%.c - $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) - -STDIO_OBJS =3D sprintf.o snprintf.o vfprintf.o vsnprintf.o vsprintf.o fpri= ntf.o \ - printf.o putc.o puts.o putchar.o stdchnls.o fileno.o -%.o : $(SLOF_DIR)/lib/libc/stdio/%.c - $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) - -sbrk.o: $(SLOF_DIR)/slof/sbrk.c - $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) - -LIBCOBJS :=3D $(STRING_OBJS) $(CTYPE_OBJS) $(STDLIB_OBJS) $(STDIO_OBJS) sb= rk.o - -libc.a: $(LIBCOBJS) - $(call quiet-command,$(AR) -rc $@ $^,Creating static library) - -# libnet files: - -LIBNETOBJS :=3D args.o dhcp.o dns.o icmpv6.o ipv6.o tcp.o udp.o bootp.o \ - dhcpv6.o ethernet.o ipv4.o ndp.o tftp.o pxelinux.o -LIBNETCFLAGS =3D $(EXTRA_CFLAGS) $(CFLAGS) $(LIBC_INC) $(LIBNET_INC) \ - -DDHCPARCH=3D0x1F -MMD -MP -MT $@ -MF $(@:%.o=3D%.d) - -%.o : $(SLOF_DIR)/lib/libnet/%.c - $(call quiet-command,$(CC) $(LIBNETCFLAGS) -c -o $@ $<,Compiling) - -libnet.a: $(LIBNETOBJS) - $(call quiet-command,$(AR) -rc $@ $^,Creating static library) diff --git a/pc-bios/s390-ccw/Makefile b/pc-bios/s390-ccw/Makefile index cf6859823a..27cbb354af 100644 --- a/pc-bios/s390-ccw/Makefile +++ b/pc-bios/s390-ccw/Makefile @@ -61,7 +61,52 @@ config-cc.mak: Makefile $(call cc-option,-march=3Dz900,-march=3Dz10)) 3> config-cc.mak -include config-cc.mak =20 -include $(SRC_PATH)/netboot.mak +# libc files: + +LIBC_CFLAGS =3D $(EXTRA_CFLAGS) $(CFLAGS) $(LIBC_INC) $(LIBNET_INC) \ + -MMD -MP -MT $@ -MF $(@:%.o=3D%.d) + +CTYPE_OBJS =3D isdigit.o isxdigit.o toupper.o +%.o : $(SLOF_DIR)/lib/libc/ctype/%.c + $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) + +STRING_OBJS =3D strcat.o strchr.o strrchr.o strcpy.o strlen.o strncpy.o \ + strcmp.o strncmp.o strcasecmp.o strncasecmp.o strstr.o \ + memset.o memcpy.o memmove.o memcmp.o +%.o : $(SLOF_DIR)/lib/libc/string/%.c + $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) + +STDLIB_OBJS =3D atoi.o atol.o strtoul.o strtol.o rand.o malloc.o free.o +%.o : $(SLOF_DIR)/lib/libc/stdlib/%.c + $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) + +STDIO_OBJS =3D sprintf.o snprintf.o vfprintf.o vsnprintf.o vsprintf.o fpri= ntf.o \ + printf.o putc.o puts.o putchar.o stdchnls.o fileno.o +%.o : $(SLOF_DIR)/lib/libc/stdio/%.c + $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) + +sbrk.o: $(SLOF_DIR)/slof/sbrk.c + $(call quiet-command,$(CC) $(LIBC_CFLAGS) -c -o $@ $<,Compiling) + +LIBCOBJS :=3D $(STRING_OBJS) $(CTYPE_OBJS) $(STDLIB_OBJS) $(STDIO_OBJS) sb= rk.o + +libc.a: $(LIBCOBJS) + $(call quiet-command,$(AR) -rc $@ $^,Creating static library) + +# libnet files: + +LIBNETOBJS :=3D args.o dhcp.o dns.o icmpv6.o ipv6.o tcp.o udp.o bootp.o \ + dhcpv6.o ethernet.o ipv4.o ndp.o tftp.o pxelinux.o +LIBNETCFLAGS =3D $(EXTRA_CFLAGS) $(CFLAGS) $(LIBC_INC) $(LIBNET_INC) \ + -DDHCPARCH=3D0x1F -MMD -MP -MT $@ -MF $(@:%.o=3D%.d) + +%.o : $(SLOF_DIR)/lib/libnet/%.c + $(call quiet-command,$(CC) $(LIBNETCFLAGS) -c -o $@ $<,Compiling) + +libnet.a: $(LIBNETOBJS) + $(call quiet-command,$(AR) -rc $@ $^,Creating static library) + +# Main targets: =20 build-all: s390-ccw.img =20 --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689551; cv=none; d=zohomail.com; s=zohoarc; b=l3UNnEmuvOuBS/hvPXlBswm9q2DLKAu81G8QoN9C0QX+rwlIrIyHXGMoKNXOyrJHdkNwKE9daEEnKi0+Znlrmn7o2iOgFmQ1JzVSeFFoXPhumyPaMjOoq6dzzATvGeIT/exOXP/z+eaEj8JHE5sXI4OfWBNfKLd2e1TN3RqbBao= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689551; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=BKKZvQoxBTf2nP8eOaLQhf6dLkYbpE4nVdKlvjdImHU=; b=baVFyggtedYjLL8wYe72sVLPNjrC+iGCUX3tm0xvRc9swX/U99lg/xo3X5xtOH2fQb0Os+p98XP0Z232R1tJtOIOCURbt6gr69WtnpLrB6YMHzmRmVMDrzD5cnVkMueiysGiFa5uq9ikIH4HALexnyvl5G6/6K3aEY3u2mUMbVA= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 17296895518691016.0514121805232; Wed, 23 Oct 2024 06:19:11 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFF-0006BJ-9l; Wed, 23 Oct 2024 09:17:51 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bF1-00066n-6V for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:37 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bEz-00029l-JO for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:34 -0400 Received: from mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-693-_o9ZNhijOBSVUPxFb--b5A-1; Wed, 23 Oct 2024 09:17:31 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id E5FFF1955F35; Wed, 23 Oct 2024 13:17:29 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id E4CFF19560AE; Wed, 23 Oct 2024 13:17:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689452; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=BKKZvQoxBTf2nP8eOaLQhf6dLkYbpE4nVdKlvjdImHU=; b=cDr8tB0WHyEsF3c0uYy+6OnVmo/8FYO8pSw+FtD0Cek/lN9NMbMsVr3jyAjGTKg0AzbzoM vFkn8BIVVlOZnebiYgfrohYecrMHHPqb/KPMCS4St/dgzoeJ7eXmINg/0zPCO8f9pW6t4N ul/tVuOgzRXLT+Mvsv6Hx2kdL8MK2mw= X-MC-Unique: _o9ZNhijOBSVUPxFb--b5A-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 06/23] docs/system/s390x/bootdevices: Update the documentation about network booting Date: Wed, 23 Oct 2024 15:16:53 +0200 Message-ID: <20241023131710.906748-7-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689560434116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Remove the information about the separate s390-netboot.img from the documentation. Co-authored by: Thomas Huth Signed-off-by: Jared Rossi Message-ID: <20241020012953.1380075-7-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- docs/system/s390x/bootdevices.rst | 20 +++++++------------- 1 file changed, 7 insertions(+), 13 deletions(-) diff --git a/docs/system/s390x/bootdevices.rst b/docs/system/s390x/bootdevi= ces.rst index 1a7a18b43b..c97efb8fc0 100644 --- a/docs/system/s390x/bootdevices.rst +++ b/docs/system/s390x/bootdevices.rst @@ -82,23 +82,17 @@ Note that ``0`` can be used to boot the default entry. Booting from a network device ----------------------------- =20 -Beside the normal guest firmware (which is loaded from the file ``s390-ccw= .img`` -in the data directory of QEMU, or via the ``-bios`` option), QEMU ships wi= th -a small TFTP network bootloader firmware for virtio-net-ccw devices, too. = This -firmware is loaded from a file called ``s390-netboot.img`` in the QEMU data -directory. In case you want to load it from a different filename instead, -you can specify it via the ``-global s390-ipl.netboot_fw=3Dfilename`` -command line option. - -The ``bootindex`` property is especially important for booting via the net= work. -If you don't specify the ``bootindex`` property here, the network bootload= er -firmware code won't get loaded into the guest memory so that the network b= oot -will fail. For a successful network boot, try something like this:: +The firmware that ships with QEMU includes a small TFTP network bootloader +for virtio-net-ccw devices. The ``bootindex`` property is especially +important for booting via the network. If you don't specify the ``bootinde= x`` +property here, the network bootloader won't be taken into consideration and +the network boot will fail. For a successful network boot, try something +like this:: =20 qemu-system-s390x -netdev user,id=3Dn1,tftp=3D...,bootfile=3D... \ -device virtio-net-ccw,netdev=3Dn1,bootindex=3D1 =20 -The network bootloader firmware also has basic support for pxelinux.cfg-st= yle +The network bootloader also has basic support for pxelinux.cfg-style configuration files. See the `PXELINUX Configuration page `= __ for details how to set up the configuration file on your TFTP server. --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689577; cv=none; d=zohomail.com; s=zohoarc; b=GvzbRlz88sxdtG9y46M/gEAYukarqdDS1VU6rbnvTJFH3tIZL1gnGFMype+MaHkRikpLnPzoY8jXDIZKs2Yq+T7vWYnlSH+SHDW24N+fRQZUUzn25rYOkxzVb3nW95sA6l/bPhYiKAo43g6qIlK6PGHyaBt+Q5ZVs2aY092LA7c= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689577; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=97S4qqt/tBOMDzdXmG/IY6UTHoZ7pB4u43qJXWNnO0U=; b=Pz3DSS/K4EwU30iX9uc1hKkQTs59kfWEkY7yvxgRhE4iUg6JF8aI26dsYje9iVAKVSs+gpQdj6TYZOOzS87xqlIBncfNj7c+mbt0QCEGRXCeG234J5Uz+lRm7GhqwmJoZYT5jrWcpzjuGVP6mFibZdt6LzvnfTu5BQJlGcms2bA= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689577706975.0884378013887; Wed, 23 Oct 2024 06:19:37 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFO-0006LJ-9x; Wed, 23 Oct 2024 09:17:58 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bF5-00067T-2O for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:40 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bF3-0002AD-3Q for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:38 -0400 Received: from mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-175-iQ3m6xgCOyCSXn960YTRXA-1; Wed, 23 Oct 2024 09:17:33 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 343E11964CE7; Wed, 23 Oct 2024 13:17:32 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id A5FB419560AE; Wed, 23 Oct 2024 13:17:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689456; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=97S4qqt/tBOMDzdXmG/IY6UTHoZ7pB4u43qJXWNnO0U=; b=VF8ioXC+n55QuI074mzGwSdZ3pMqGzXhJ1A6c5OdA13b85Inaq2frgFB/YisreIH2edBS9 axdd+Pgr44OAr5o0Bx0gvgIf3z1KwosBlgnFDs2usn39A9Ba2h0RwwocpY9REMCEgBjP8H rYEVc6ghihjKi39sMw4xzsL+gyWPN7Y= X-MC-Unique: iQ3m6xgCOyCSXn960YTRXA-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 07/23] pc-bios/s390-ccw: Remove panics from ISO IPL path Date: Wed, 23 Oct 2024 15:16:54 +0200 Message-ID: <20241023131710.906748-8-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689578587116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Remove panic-on-error from IPL ISO El Torito specific functions so that err= or recovery may be possible in the future. Functions that would previously panic now provide a return code. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-8-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/bootmap.h | 15 +++---- pc-bios/s390-ccw/s390-ccw.h | 1 + pc-bios/s390-ccw/bootmap.c | 87 ++++++++++++++++++++++++------------- 3 files changed, 65 insertions(+), 38 deletions(-) diff --git a/pc-bios/s390-ccw/bootmap.h b/pc-bios/s390-ccw/bootmap.h index 4a7d8a91f1..3cb573b86b 100644 --- a/pc-bios/s390-ccw/bootmap.h +++ b/pc-bios/s390-ccw/bootmap.h @@ -385,17 +385,14 @@ static inline uint32_t iso_733_to_u32(uint64_t x) =20 #define ISO_PRIMARY_VD_SECTOR 16 =20 -static inline void read_iso_sector(uint32_t block_offset, void *buf, - const char *errmsg) -{ - IPL_assert(virtio_read_many(block_offset, buf, 1) =3D=3D 0, errmsg); -} - -static inline void read_iso_boot_image(uint32_t block_offset, void *load_a= ddr, +static inline int read_iso_boot_image(uint32_t block_offset, void *load_ad= dr, uint32_t blks_to_load) { - IPL_assert(virtio_read_many(block_offset, load_addr, blks_to_load) =3D= =3D 0, - "Failed to read boot image!"); + if (virtio_read_many(block_offset, load_addr, blks_to_load)) { + puts("Failed to read boot image!"); + return -1; + } + return 0; } =20 #define ISO9660_MAX_DIR_DEPTH 8 diff --git a/pc-bios/s390-ccw/s390-ccw.h b/pc-bios/s390-ccw/s390-ccw.h index 6abb34e563..3e844abd71 100644 --- a/pc-bios/s390-ccw/s390-ccw.h +++ b/pc-bios/s390-ccw/s390-ccw.h @@ -30,6 +30,7 @@ typedef unsigned long long u64; #define EIO 1 #define EBUSY 2 #define ENODEV 3 +#define EINVAL 4 =20 #ifndef MIN #define MIN(a, b) (((a) < (b)) ? (a) : (b)) diff --git a/pc-bios/s390-ccw/bootmap.c b/pc-bios/s390-ccw/bootmap.c index 414c3f1b47..af73254acb 100644 --- a/pc-bios/s390-ccw/bootmap.c +++ b/pc-bios/s390-ccw/bootmap.c @@ -678,8 +678,10 @@ static bool is_iso_bc_entry_compatible(IsoBcSection *s) if (s->unused || !s->sector_count) { return false; } - read_iso_sector(bswap32(s->load_rba), magic_sec, - "Failed to read image sector 0"); + if (virtio_read(bswap32(s->load_rba), magic_sec)) { + puts("Failed to read image sector 0"); + return false; + } =20 /* Checking bytes 8 - 32 for S390 Linux magic */ return !memcmp(magic_sec + 8, linux_s390_magic, 24); @@ -692,28 +694,35 @@ static uint32_t sec_offset[ISO9660_MAX_DIR_DEPTH]; /* Remained directory space in bytes */ static uint32_t dir_rem[ISO9660_MAX_DIR_DEPTH]; =20 -static inline uint32_t iso_get_file_size(uint32_t load_rba) +static inline long iso_get_file_size(uint32_t load_rba) { IsoVolDesc *vd =3D (IsoVolDesc *)sec; IsoDirHdr *cur_record =3D &vd->vd.primary.rootdir; uint8_t *temp =3D sec + ISO_SECTOR_SIZE; int level =3D 0; =20 - read_iso_sector(ISO_PRIMARY_VD_SECTOR, sec, - "Failed to read ISO primary descriptor"); + if (virtio_read(ISO_PRIMARY_VD_SECTOR, sec)) { + puts("Failed to read ISO primary descriptor"); + return -EIO; + } + sec_loc[0] =3D iso_733_to_u32(cur_record->ext_loc); dir_rem[0] =3D 0; sec_offset[0] =3D 0; =20 while (level >=3D 0) { - IPL_assert(sec_offset[level] <=3D ISO_SECTOR_SIZE, - "Directory tree structure violation"); + if (sec_offset[level] > ISO_SECTOR_SIZE) { + puts("Directory tree structure violation"); + return -EIO; + } =20 cur_record =3D (IsoDirHdr *)(temp + sec_offset[level]); =20 if (sec_offset[level] =3D=3D 0) { - read_iso_sector(sec_loc[level], temp, - "Failed to read ISO directory"); + if (virtio_read(sec_loc[level], temp)) { + puts("Failed to read ISO directory"); + return -EIO; + } if (dir_rem[level] =3D=3D 0) { /* Skip self and parent records */ dir_rem[level] =3D iso_733_to_u32(cur_record->data_len) - @@ -758,8 +767,10 @@ static inline uint32_t iso_get_file_size(uint32_t load= _rba) if (dir_rem[level] =3D=3D 0) { /* Nothing remaining */ level--; - read_iso_sector(sec_loc[level], temp, - "Failed to read ISO directory"); + if (virtio_read(sec_loc[level], temp)) { + puts("Failed to read ISO directory"); + return -EIO; + } } } =20 @@ -774,19 +785,24 @@ static void load_iso_bc_entry(IsoBcSection *load) * is padded and ISO_SECTOR_SIZE bytes aligned */ uint32_t blks_to_load =3D bswap16(s.sector_count) >> ET_SECTOR_SHIFT; - uint32_t real_size =3D iso_get_file_size(bswap32(s.load_rba)); + long real_size =3D iso_get_file_size(bswap32(s.load_rba)); =20 - if (real_size) { + if (real_size > 0) { /* Round up blocks to load */ blks_to_load =3D (real_size + ISO_SECTOR_SIZE - 1) / ISO_SECTOR_SI= ZE; puts("ISO boot image size verified"); } else { puts("ISO boot image size could not be verified"); + if (real_size < 0) { + return; + } } =20 - read_iso_boot_image(bswap32(s.load_rba), + if (read_iso_boot_image(bswap32(s.load_rba), (void *)((uint64_t)bswap16(s.load_segment)), - blks_to_load); + blks_to_load)) { + return; + } =20 jump_to_low_kernel(); } @@ -809,17 +825,18 @@ static uint32_t find_iso_bc(void) return bswap32(et->bc_offset); } } - read_iso_sector(block_num++, sec, - "Failed to read ISO volume descriptor"); + if (virtio_read(block_num++, sec)) { + puts("Failed to read ISO volume descriptor"); + return 0; + } } =20 return 0; } =20 -static IsoBcSection *find_iso_bc_entry(void) +static IsoBcSection *find_iso_bc_entry(uint32_t offset) { IsoBcEntry *e =3D (IsoBcEntry *)sec; - uint32_t offset =3D find_iso_bc(); int i; unsigned int loadparm =3D get_loadparm_index(); =20 @@ -827,11 +844,13 @@ static IsoBcSection *find_iso_bc_entry(void) return NULL; } =20 - read_iso_sector(offset, sec, "Failed to read El Torito boot catalog"); + if (virtio_read(offset, sec)) { + puts("Failed to read El Torito boot catalog"); + return NULL; + } =20 if (!is_iso_bc_valid(e)) { /* The validation entry is mandatory */ - panic("No valid boot catalog found!\n"); return NULL; } =20 @@ -851,19 +870,25 @@ static IsoBcSection *find_iso_bc_entry(void) } } =20 - panic("No suitable boot entry found on ISO-9660 media!\n"); - return NULL; } =20 -static void ipl_iso_el_torito(void) +static int ipl_iso_el_torito(void) { - IsoBcSection *s =3D find_iso_bc_entry(); + uint32_t offset =3D find_iso_bc(); + if (!offset) { + return 0; + } + + IsoBcSection *s =3D find_iso_bc_entry(offset); =20 if (s) { - load_iso_bc_entry(s); - /* no return */ + load_iso_bc_entry(s); /* only return in error */ + return -1; } + + puts("No suitable boot entry found on ISO-9660 media!"); + return -EIO; } =20 /** @@ -893,7 +918,9 @@ static void zipl_load_vblk(void) if (blksize !=3D VIRTIO_ISO_BLOCK_SIZE) { virtio_assume_iso9660(); } - ipl_iso_el_torito(); + if (ipl_iso_el_torito()) { + return; + } } =20 if (blksize !=3D VIRTIO_DASD_DEFAULT_BLOCK_SIZE) { @@ -907,7 +934,9 @@ static void zipl_load_vscsi(void) { if (virtio_get_block_size() =3D=3D VIRTIO_ISO_BLOCK_SIZE) { /* Is it an ISO image in non-CD drive? */ - ipl_iso_el_torito(); + if (ipl_iso_el_torito()) { + return; + } } =20 puts("Using guessed DASD geometry."); --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689627; cv=none; d=zohomail.com; s=zohoarc; b=bOz2wXe/cW7KVBiySGtqZZBXq3MFFvPcwbCLojK0/9cgWuuZ9cadUhGmy5IIBV3DJpp3gbseJlTvg6if6Gt56zlNBi3WSeAklvCCD/Mvf8+R4u/Zx2mgb+cj1sv9k9U9hDxxr7Fev2mZekerBffTjQPpWPoPAnU9tjExDRGn7fs= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689627; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=OXxE9myvHHyUNDrFnLR53ddsnv+PIn7jFuqPwn96oeE=; b=lOoaV9PtpP1qfS6Dvs7sD0O513x7eHIoRFOE+2/dmlawSBtu4/AyD3EypD3Cajs5vEbwNb8/fG9Ak9JOBe5LCDov5D0qlBgdartje5/xyuD5YkfH0WrUtbakrR4KTe0heoCdquwjt9Z1dgmZ86hoJnHXfVZC3svM97dsdjx1XL0= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689627346120.61996115385023; Wed, 23 Oct 2024 06:20:27 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFW-0006tL-37; Wed, 23 Oct 2024 09:18:06 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bF8-00068q-DR for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:45 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bF6-0002AS-4r for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:42 -0400 Received: from mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-677-aex_kB4DNXOOBoZCJG_uNg-1; Wed, 23 Oct 2024 09:17:36 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 305471964CC8; Wed, 23 Oct 2024 13:17:35 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id E7F7D19560AE; Wed, 23 Oct 2024 13:17:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689459; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=OXxE9myvHHyUNDrFnLR53ddsnv+PIn7jFuqPwn96oeE=; b=ScORIJvRE5gUzTp9m+mcdOuNjF0y/BSiPLAIHa9lzV3fNwVHeZupgzYFcMzfUY73iXmFlN KTY6SJqcypWmP2bACp58sWFdtccXSciwnC+QyqWdiw97I8pbfrU76R3C2xw8vvLeHNNWVG 0Ibvs0Pq6y2PsdJrAf3iQ87gEAEpVE0= X-MC-Unique: aex_kB4DNXOOBoZCJG_uNg-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 08/23] pc-bios/s390-ccw: Remove panics from ECKD IPL path Date: Wed, 23 Oct 2024 15:16:55 +0200 Message-ID: <20241023131710.906748-9-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689629076116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Remove panic-on-error from ECKD block device IPL specific functions so that error recovery may be possible in the future. Functions that would previously panic now provide a return code. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-9-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/bootmap.h | 1 + pc-bios/s390-ccw/bootmap.c | 187 +++++++++++++++++++++++++------------ 2 files changed, 130 insertions(+), 58 deletions(-) diff --git a/pc-bios/s390-ccw/bootmap.h b/pc-bios/s390-ccw/bootmap.h index 3cb573b86b..95943441d3 100644 --- a/pc-bios/s390-ccw/bootmap.h +++ b/pc-bios/s390-ccw/bootmap.h @@ -16,6 +16,7 @@ =20 typedef uint64_t block_number_t; #define NULL_BLOCK_NR 0xffffffffffffffffULL +#define ERROR_BLOCK_NR 0xfffffffffffffffeULL =20 #define FREE_SPACE_FILLER '\xAA' =20 diff --git a/pc-bios/s390-ccw/bootmap.c b/pc-bios/s390-ccw/bootmap.c index af73254acb..b9596e28c7 100644 --- a/pc-bios/s390-ccw/bootmap.c +++ b/pc-bios/s390-ccw/bootmap.c @@ -145,14 +145,17 @@ static block_number_t load_eckd_segments(block_number= _t blk, bool ldipl, bool more_data; =20 memset(_bprs, FREE_SPACE_FILLER, sizeof(_bprs)); - read_block(blk, bprs, "BPRS read failed"); + if (virtio_read(blk, bprs)) { + puts("BPRS read failed"); + return ERROR_BLOCK_NR; + } =20 do { more_data =3D false; for (j =3D 0;; j++) { block_nr =3D gen_eckd_block_num(&bprs[j].xeckd, ldipl); if (is_null_block_number(block_nr)) { /* end of chunk */ - break; + return NULL_BLOCK_NR; } =20 /* we need the updated blockno for the next indirect entry @@ -163,15 +166,20 @@ static block_number_t load_eckd_segments(block_number= _t blk, bool ldipl, } =20 /* List directed pointer does not store block size */ - IPL_assert(ldipl || block_size_ok(bprs[j].xeckd.bptr.size), - "bad chunk block size"); + if (!ldipl && !block_size_ok(bprs[j].xeckd.bptr.size)) { + puts("Bad chunk block size"); + return ERROR_BLOCK_NR; + } =20 if (!eckd_valid_address(&bprs[j].xeckd, ldipl)) { /* * If an invalid address is found during LD-IPL then break= and - * retry as CCW + * retry as CCW-IPL, otherwise abort on error */ - IPL_assert(ldipl, "bad chunk ECKD addr"); + if (!ldipl) { + puts("Bad chunk ECKD address"); + return ERROR_BLOCK_NR; + } break; } =20 @@ -189,7 +197,10 @@ static block_number_t load_eckd_segments(block_number_= t blk, bool ldipl, * I.e. the next ptr must point to the unused memory area */ memset(_bprs, FREE_SPACE_FILLER, sizeof(_bprs)); - read_block(block_nr, bprs, "BPRS continuation read failed"= ); + if (virtio_read(block_nr, bprs)) { + puts("BPRS continuation read failed"); + return ERROR_BLOCK_NR; + } more_data =3D true; break; } @@ -198,7 +209,10 @@ static block_number_t load_eckd_segments(block_number_= t blk, bool ldipl, * to memory (address). */ rc =3D virtio_read_many(block_nr, (void *)(*address), count + = 1); - IPL_assert(rc =3D=3D 0, "code chunk read failed"); + if (rc !=3D 0) { + puts("Code chunk read failed"); + return ERROR_BLOCK_NR; + } =20 *address +=3D (count + 1) * virtio_get_block_size(); } @@ -232,7 +246,10 @@ static int eckd_get_boot_menu_index(block_number_t s1b= _block_nr) =20 /* Get Stage1b data */ memset(sec, FREE_SPACE_FILLER, sizeof(sec)); - read_block(s1b_block_nr, s1b, "Cannot read stage1b boot loader"); + if (virtio_read(s1b_block_nr, s1b)) { + puts("Cannot read stage1b boot loader"); + return -EIO; + } =20 memset(_s2, FREE_SPACE_FILLER, sizeof(_s2)); =20 @@ -244,7 +261,10 @@ static int eckd_get_boot_menu_index(block_number_t s1b= _block_nr) break; } =20 - read_block(cur_block_nr, s2_cur_blk, "Cannot read stage2 boot load= er"); + if (virtio_read(cur_block_nr, s2_cur_blk)) { + puts("Cannot read stage2 boot loader"); + return -EIO; + } =20 if (find_zipl_boot_menu_banner(&banner_offset)) { /* @@ -252,8 +272,10 @@ static int eckd_get_boot_menu_index(block_number_t s1b= _block_nr) * possibility of menu data spanning multiple blocks. */ if (prev_block_nr) { - read_block(prev_block_nr, s2_prev_blk, - "Cannot read stage2 boot loader"); + if (virtio_read(prev_block_nr, s2_prev_blk)) { + puts("Cannot read stage2 boot loader"); + return -EIO; + } } =20 if (i + 1 < STAGE2_BLK_CNT_MAX) { @@ -261,8 +283,10 @@ static int eckd_get_boot_menu_index(block_number_t s1b= _block_nr) } =20 if (next_block_nr && !is_null_block_number(next_block_nr)) { - read_block(next_block_nr, s2_next_blk, - "Cannot read stage2 boot loader"); + if (virtio_read(next_block_nr, s2_next_blk)) { + puts("Cannot read stage2 boot loader"); + return -EIO; + } } =20 return menu_get_zipl_boot_index(s2_cur_blk + banner_offset); @@ -275,7 +299,7 @@ static int eckd_get_boot_menu_index(block_number_t s1b_= block_nr) return 0; } =20 -static void run_eckd_boot_script(block_number_t bmt_block_nr, +static int run_eckd_boot_script(block_number_t bmt_block_nr, block_number_t s1b_block_nr) { int i; @@ -292,17 +316,28 @@ static void run_eckd_boot_script(block_number_t bmt_b= lock_nr, } =20 debug_print_int("loadparm", loadparm); - IPL_assert(loadparm < MAX_BOOT_ENTRIES, "loadparm value greater than" - " maximum number of boot entries allowed"); + if (loadparm >=3D MAX_BOOT_ENTRIES) { + puts("loadparm value greater than max number of boot entries allow= ed"); + return -EINVAL; + } =20 memset(sec, FREE_SPACE_FILLER, sizeof(sec)); - read_block(bmt_block_nr, sec, "Cannot read Boot Map Table"); + if (virtio_read(bmt_block_nr, sec)) { + puts("Cannot read Boot Map Table"); + return -EIO; + } =20 block_nr =3D gen_eckd_block_num(&bmt->entry[loadparm].xeckd, ldipl); - IPL_assert(block_nr !=3D -1, "Cannot find Boot Map Table Entry"); + if (block_nr =3D=3D NULL_BLOCK_NR) { + puts("Cannot find Boot Map Table Entry"); + return -EIO; + } =20 memset(sec, FREE_SPACE_FILLER, sizeof(sec)); - read_block(block_nr, sec, "Cannot read Boot Map Script"); + if (virtio_read(block_nr, sec)) { + puts("Cannot read Boot Map Script"); + return -EIO; + } =20 for (i =3D 0; bms->entry[i].type =3D=3D BOOT_SCRIPT_LOAD || bms->entry[i].type =3D=3D BOOT_SCRIPT_SIGNATURE; i++) { @@ -317,21 +352,27 @@ static void run_eckd_boot_script(block_number_t bmt_b= lock_nr, =20 do { block_nr =3D load_eckd_segments(block_nr, ldipl, &address); - } while (block_nr !=3D -1); + if (block_nr =3D=3D ERROR_BLOCK_NR) { + return ldipl ? 0 : -EIO; + } + } while (block_nr !=3D NULL_BLOCK_NR); } =20 if (ldipl && bms->entry[i].type !=3D BOOT_SCRIPT_EXEC) { /* Abort LD-IPL and retry as CCW-IPL */ - return; + return 0; } =20 - IPL_assert(bms->entry[i].type =3D=3D BOOT_SCRIPT_EXEC, - "Unknown script entry type"); + if (bms->entry[i].type !=3D BOOT_SCRIPT_EXEC) { + puts("Unknown script entry type"); + return -EINVAL; + } write_reset_psw(bms->entry[i].address.load_address); /* no return */ jump_to_IPL_code(0); /* no return */ + return -1; } =20 -static void ipl_eckd_cdl(void) +static int ipl_eckd_cdl(void) { XEckdMbr *mbr; EckdCdlIpl2 *ipl2 =3D (void *)sec; @@ -342,20 +383,23 @@ static void ipl_eckd_cdl(void) puts("CDL"); =20 memset(sec, FREE_SPACE_FILLER, sizeof(sec)); - read_block(1, ipl2, "Cannot read IPL2 record at block 1"); + if (virtio_read(1, ipl2)) { + puts("Cannot read IPL2 record at block 1"); + return -EIO; + } =20 mbr =3D &ipl2->mbr; if (!magic_match(mbr, ZIPL_MAGIC)) { puts("No zIPL section in IPL2 record."); - return; + return 0; } if (!block_size_ok(mbr->blockptr.xeckd.bptr.size)) { puts("Bad block size in zIPL section of IPL2 record."); - return; + return 0; } if (mbr->dev_type !=3D DEV_TYPE_ECKD) { puts("Non-ECKD device type in zIPL section of IPL2 record."); - return; + return 0; } =20 /* save pointer to Boot Map Table */ @@ -365,19 +409,21 @@ static void ipl_eckd_cdl(void) s1b_block_nr =3D eckd_block_num(&ipl2->stage1.seek[0].chs); =20 memset(sec, FREE_SPACE_FILLER, sizeof(sec)); - read_block(2, vlbl, "Cannot read Volume Label at block 2"); + if (virtio_read(2, vlbl)) { + puts("Cannot read Volume Label at block 2"); + return -EIO; + } if (!magic_match(vlbl->key, VOL1_MAGIC)) { puts("Invalid magic of volume label block."); - return; + return 0; } if (!magic_match(vlbl->f.key, VOL1_MAGIC)) { puts("Invalid magic of volser block."); - return; + return 0; } print_volser(vlbl->f.volser); =20 - run_eckd_boot_script(bmt_block_nr, s1b_block_nr); - /* no return */ + return run_eckd_boot_script(bmt_block_nr, s1b_block_nr); } =20 static void print_eckd_ldl_msg(ECKD_IPL_mode_t mode) @@ -403,7 +449,7 @@ static void print_eckd_ldl_msg(ECKD_IPL_mode_t mode) print_volser(vlbl->volser); } =20 -static void ipl_eckd_ldl(ECKD_IPL_mode_t mode) +static int ipl_eckd_ldl(ECKD_IPL_mode_t mode) { block_number_t bmt_block_nr, s1b_block_nr; EckdLdlIpl1 *ipl1 =3D (void *)sec; @@ -415,10 +461,13 @@ static void ipl_eckd_ldl(ECKD_IPL_mode_t mode) /* DO NOT read BootMap pointer (only one, xECKD) at block #2 */ =20 memset(sec, FREE_SPACE_FILLER, sizeof(sec)); - read_block(0, sec, "Cannot read block 0 to grab boot info."); + if (virtio_read(0, sec)) { + puts("Cannot read block 0 to grab boot info."); + return -EIO; + } if (mode =3D=3D ECKD_LDL_UNLABELED) { if (!magic_match(ipl1->bip.magic, ZIPL_MAGIC)) { - return; /* not applicable layout */ + return 0; /* not applicable layout */ } puts("unlabeled LDL."); } @@ -430,8 +479,7 @@ static void ipl_eckd_ldl(ECKD_IPL_mode_t mode) /* save pointer to Stage1b Data */ s1b_block_nr =3D eckd_block_num(&ipl1->stage1.seek[0].chs); =20 - run_eckd_boot_script(bmt_block_nr, s1b_block_nr); - /* no return */ + return run_eckd_boot_script(bmt_block_nr, s1b_block_nr); } =20 static block_number_t eckd_find_bmt(ExtEckdBlockPtr *ptr) @@ -441,7 +489,10 @@ static block_number_t eckd_find_bmt(ExtEckdBlockPtr *p= tr) BootRecord *br; =20 blockno =3D gen_eckd_block_num(ptr, 0); - read_block(blockno, tmp_sec, "Cannot read boot record"); + if (virtio_read(blockno, tmp_sec)) { + puts("Cannot read boot record"); + return ERROR_BLOCK_NR; + } br =3D (BootRecord *)tmp_sec; if (!magic_match(br->magic, ZIPL_MAGIC)) { /* If the boot record is invalid, return and try CCW-IPL instead */ @@ -470,7 +521,7 @@ static void print_eckd_msg(void) printf("%s", msg); } =20 -static void ipl_eckd(void) +static int ipl_eckd(void) { IplVolumeLabel *vlbl =3D (void *)sec; LDL_VTOC *vtoc =3D (void *)sec; @@ -480,7 +531,10 @@ static void ipl_eckd(void) =20 /* Block 2 can contain either the CDL VOL1 label or the LDL VTOC */ memset(sec, FREE_SPACE_FILLER, sizeof(sec)); - read_block(2, vlbl, "Cannot read block 2"); + if (virtio_read(2, vlbl)) { + puts("Cannot read block 2"); + return -EIO; + } =20 /* * First check for a list-directed-format pointer which would @@ -488,36 +542,53 @@ static void ipl_eckd(void) */ if (eckd_valid_address((ExtEckdBlockPtr *)&vlbl->f.br, 0)) { ldipl_bmt =3D eckd_find_bmt((ExtEckdBlockPtr *)&vlbl->f.br); - if (ldipl_bmt) { + switch (ldipl_bmt) { + case ERROR_BLOCK_NR: + return -EIO; + case NULL_BLOCK_NR: + break; /* Invalid BMT but the device may still boot with CCW-I= PL */ + default: puts("List-Directed"); - /* LD-IPL does not use the S1B bock, just make it NULL */ - run_eckd_boot_script(ldipl_bmt, NULL_BLOCK_NR); - /* Only return in error, retry as CCW-IPL */ + /* + * LD-IPL does not use the S1B bock, just make it NULL_BLOCK_N= R. + * In some failure cases retry IPL before aborting. + */ + if (run_eckd_boot_script(ldipl_bmt, NULL_BLOCK_NR)) { + return -EIO; + } + /* Non-fatal error, retry as CCW-IPL */ printf("Retrying IPL "); print_eckd_msg(); } memset(sec, FREE_SPACE_FILLER, sizeof(sec)); - read_block(2, vtoc, "Cannot read block 2"); + if (virtio_read(2, vtoc)) { + puts("Cannot read block 2"); + return -EIO; + } } =20 /* Not list-directed */ if (magic_match(vtoc->magic, VOL1_MAGIC)) { - ipl_eckd_cdl(); /* may return in error */ + if (ipl_eckd_cdl()) { + return -1; + } } =20 if (magic_match(vtoc->magic, CMS1_MAGIC)) { - ipl_eckd_ldl(ECKD_CMS); /* no return */ + return ipl_eckd_ldl(ECKD_CMS); } if (magic_match(vtoc->magic, LNX1_MAGIC)) { - ipl_eckd_ldl(ECKD_LDL); /* no return */ + return ipl_eckd_ldl(ECKD_LDL); } =20 - ipl_eckd_ldl(ECKD_LDL_UNLABELED); /* it still may return */ + if (ipl_eckd_ldl(ECKD_LDL_UNLABELED)) { + return -1; + } /* * Ok, it is not a LDL by any means. * It still might be a CDL with zero record keys for IPL1 and IPL2 */ - ipl_eckd_cdl(); + return ipl_eckd_cdl(); } =20 /*********************************************************************** @@ -910,7 +981,7 @@ static bool has_iso_signature(void) * Bus specific IPL sequences */ =20 -static void zipl_load_vblk(void) +static int zipl_load_vblk(void) { int blksize =3D virtio_get_block_size(); =20 @@ -919,7 +990,7 @@ static void zipl_load_vblk(void) virtio_assume_iso9660(); } if (ipl_iso_el_torito()) { - return; + return 0; } } =20 @@ -927,21 +998,21 @@ static void zipl_load_vblk(void) puts("Using guessed DASD geometry."); virtio_assume_eckd(); } - ipl_eckd(); + return ipl_eckd(); } =20 -static void zipl_load_vscsi(void) +static int zipl_load_vscsi(void) { if (virtio_get_block_size() =3D=3D VIRTIO_ISO_BLOCK_SIZE) { /* Is it an ISO image in non-CD drive? */ if (ipl_iso_el_torito()) { - return; + return 0; } } =20 puts("Using guessed DASD geometry."); virtio_assume_eckd(); - ipl_eckd(); + return ipl_eckd(); } =20 /*********************************************************************** --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689578; cv=none; d=zohomail.com; s=zohoarc; b=aEq55D2Wa3utU5bzhg7ZAgYp4g5PSCQwzDSenJi8WXDasG0LgQ8QS7xXoarDcRbhW4ea+cdnOao/HtAx8NVAgvVKQ5sSlxxn709mV5sTaR1eeXA41W5/2VKyOtzyYPrb/V2EPj1VqDXUP7UaLbwEUqMn4dt/7++eiNaYeE8cppo= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689578; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=atR3A5VkXgm97I9Vq/CR2yJyLTLLNn3U8+9PbctvM20=; b=QfQTi2zUgAToMRFTsjfc5Hl0MZok569hl8rLxz819P9s9B7P8I4JjtfLI+d2b6/FLFgjL6xSO95la9wy4GevXbExuFZZmwZKOo55sfrAD2oGGswwI0uXKM0n+X+55DphIUqLDLPM/9dpIbPCKzIpD9pibQVijo7zy2+57ITDQLs= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689578295257.55705830926024; Wed, 23 Oct 2024 06:19:38 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFS-0006So-GG; Wed, 23 Oct 2024 09:18:02 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFA-00069I-Rp for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:45 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bF8-0002Ak-EM for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:44 -0400 Received: from mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-451-D-QKvYcWMVarJnBMZDm8RQ-1; Wed, 23 Oct 2024 09:17:38 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 6B4951955D61; Wed, 23 Oct 2024 13:17:37 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id BDF9D1956054; Wed, 23 Oct 2024 13:17:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689461; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=atR3A5VkXgm97I9Vq/CR2yJyLTLLNn3U8+9PbctvM20=; b=XmTFVAc4c3VRBwmQAIjATO9tSS1UjDw+09Q1ZLAgp8P4QQ/9Rk0YRDBek/h+AiLBBukkPq 1jah8FJhD65QlABONethm71zaU0y4R1lZ/eiDsSGCZuoRZOyHJWRqGVo9rI43NN/IY5miy MQ0go8tZmtRXrj4Bey1+kx+7z5W7XF4= X-MC-Unique: D-QKvYcWMVarJnBMZDm8RQ-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 09/23] pc-bios/s390-ccw: Remove panics from SCSI IPL path Date: Wed, 23 Oct 2024 15:16:56 +0200 Message-ID: <20241023131710.906748-10-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689578498116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Remove panic-on-error from virtio-scsi IPL specific functions so that error recovery may be possible in the future. Functions that would previously panic now provide a return code. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-10-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/bootmap.c | 88 ++++++++++++++----- pc-bios/s390-ccw/virtio-blkdev.c | 4 +- pc-bios/s390-ccw/virtio-scsi.c | 143 +++++++++++++++++++++---------- 3 files changed, 164 insertions(+), 71 deletions(-) diff --git a/pc-bios/s390-ccw/bootmap.c b/pc-bios/s390-ccw/bootmap.c index b9596e28c7..652807a16a 100644 --- a/pc-bios/s390-ccw/bootmap.c +++ b/pc-bios/s390-ccw/bootmap.c @@ -595,7 +595,7 @@ static int ipl_eckd(void) * IPL a SCSI disk */ =20 -static void zipl_load_segment(ComponentEntry *entry) +static int zipl_load_segment(ComponentEntry *entry) { const int max_entries =3D (MAX_SECTOR_SIZE / sizeof(ScsiBlockPtr)); ScsiBlockPtr *bprs =3D (void *)sec; @@ -615,7 +615,10 @@ static void zipl_load_segment(ComponentEntry *entry) do { memset(bprs, FREE_SPACE_FILLER, bprs_size); fill_hex_val(blk_no, &blockno, sizeof(blockno)); - read_block(blockno, bprs, err_msg); + if (virtio_read(blockno, bprs)) { + puts(err_msg); + return -EIO; + } =20 for (i =3D 0;; i++) { uint64_t *cur_desc =3D (void *)&bprs[i]; @@ -643,23 +646,37 @@ static void zipl_load_segment(ComponentEntry *entry) } address =3D virtio_load_direct(cur_desc[0], cur_desc[1], 0, (void *)address); - IPL_assert(address !=3D -1, "zIPL load segment failed"); + if (!address) { + puts("zIPL load segment failed"); + return -EIO; + } } } while (blockno); + + return 0; } =20 /* Run a zipl program */ -static void zipl_run(ScsiBlockPtr *pte) +static int zipl_run(ScsiBlockPtr *pte) { ComponentHeader *header; ComponentEntry *entry; uint8_t tmp_sec[MAX_SECTOR_SIZE]; =20 - read_block(pte->blockno, tmp_sec, "Cannot read header"); + if (virtio_read(pte->blockno, tmp_sec)) { + puts("Cannot read header"); + return -EIO; + } header =3D (ComponentHeader *)tmp_sec; =20 - IPL_assert(magic_match(tmp_sec, ZIPL_MAGIC), "No zIPL magic in header"= ); - IPL_assert(header->type =3D=3D ZIPL_COMP_HEADER_IPL, "Bad header type"= ); + if (!magic_match(tmp_sec, ZIPL_MAGIC)) { + puts("No zIPL magic in header"); + return -EINVAL; + } + if (header->type !=3D ZIPL_COMP_HEADER_IPL) { + puts("Bad header type"); + return -EINVAL; + } =20 dputs("start loading images\n"); =20 @@ -674,22 +691,30 @@ static void zipl_run(ScsiBlockPtr *pte) continue; } =20 - zipl_load_segment(entry); + if (zipl_load_segment(entry)) { + return -1; + } =20 entry++; =20 - IPL_assert((uint8_t *)(&entry[1]) <=3D (tmp_sec + MAX_SECTOR_SIZE), - "Wrong entry value"); + if ((uint8_t *)(&entry[1]) > (tmp_sec + MAX_SECTOR_SIZE)) { + puts("Wrong entry value"); + return -EINVAL; + } } =20 - IPL_assert(entry->component_type =3D=3D ZIPL_COMP_ENTRY_EXEC, "No EXEC= entry"); + if (entry->component_type !=3D ZIPL_COMP_ENTRY_EXEC) { + puts("No EXEC entry"); + return -EINVAL; + } =20 /* should not return */ write_reset_psw(entry->compdat.load_psw); jump_to_IPL_code(0); + return -1; } =20 -static void ipl_scsi(void) +static int ipl_scsi(void) { ScsiMbr *mbr =3D (void *)sec; int program_table_entries =3D 0; @@ -700,10 +725,13 @@ static void ipl_scsi(void) =20 /* Grab the MBR */ memset(sec, FREE_SPACE_FILLER, sizeof(sec)); - read_block(0, mbr, "Cannot read block 0"); + if (virtio_read(0, mbr)) { + puts("Cannot read block 0"); + return -EIO; + } =20 if (!magic_match(mbr->magic, ZIPL_MAGIC)) { - return; + return 0; } =20 puts("Using SCSI scheme."); @@ -711,11 +739,20 @@ static void ipl_scsi(void) IPL_check(mbr->version_id =3D=3D 1, "Unknown MBR layout version, assuming version 1"); debug_print_int("program table", mbr->pt.blockno); - IPL_assert(mbr->pt.blockno, "No Program Table"); + if (!mbr->pt.blockno) { + puts("No Program Table"); + return -EINVAL; + } =20 /* Parse the program table */ - read_block(mbr->pt.blockno, sec, "Error reading Program Table"); - IPL_assert(magic_match(sec, ZIPL_MAGIC), "No zIPL magic in PT"); + if (virtio_read(mbr->pt.blockno, sec)) { + puts("Error reading Program Table"); + return -EIO; + } + if (!magic_match(sec, ZIPL_MAGIC)) { + puts("No zIPL magic in Program Table"); + return -EINVAL; + } =20 for (i =3D 0; i < MAX_BOOT_ENTRIES; i++) { if (prog_table->entry[i].scsi.blockno) { @@ -725,17 +762,22 @@ static void ipl_scsi(void) } =20 debug_print_int("program table entries", program_table_entries); - IPL_assert(program_table_entries !=3D 0, "Empty Program Table"); + if (program_table_entries =3D=3D 0) { + puts("Empty Program Table"); + return -EINVAL; + } =20 if (menu_is_enabled_enum()) { loadparm =3D menu_get_enum_boot_index(valid_entries); } =20 debug_print_int("loadparm", loadparm); - IPL_assert(loadparm < MAX_BOOT_ENTRIES, "loadparm value greater than" - " maximum number of boot entries allowed"); + if (loadparm >=3D MAX_BOOT_ENTRIES) { + puts("loadparm value greater than max number of boot entries allow= ed"); + return -EINVAL; + } =20 - zipl_run(&prog_table->entry[loadparm].scsi); /* no return */ + return zipl_run(&prog_table->entry[loadparm].scsi); } =20 /*********************************************************************** @@ -1032,7 +1074,9 @@ void zipl_load(void) netmain(); } =20 - ipl_scsi(); + if (ipl_scsi()) { + panic("\n! Cannot IPL this SCSI device !\n"); + } =20 switch (virtio_get_device_type()) { case VIRTIO_ID_BLOCK: diff --git a/pc-bios/s390-ccw/virtio-blkdev.c b/pc-bios/s390-ccw/virtio-blk= dev.c index 2666326801..1c585f034b 100644 --- a/pc-bios/s390-ccw/virtio-blkdev.c +++ b/pc-bios/s390-ccw/virtio-blkdev.c @@ -73,13 +73,13 @@ unsigned long virtio_load_direct(unsigned long rec_list= 1, unsigned long rec_list unsigned long addr =3D (unsigned long)load_addr; =20 if (sec_len !=3D virtio_get_block_size()) { - return -1; + return 0; } =20 printf("."); status =3D virtio_read_many(sec, (void *)addr, sec_num); if (status) { - panic("I/O Error"); + return 0; } addr +=3D sec_num * virtio_get_block_size(); =20 diff --git a/pc-bios/s390-ccw/virtio-scsi.c b/pc-bios/s390-ccw/virtio-scsi.c index 6b4a1caf8a..71db75ce7b 100644 --- a/pc-bios/s390-ccw/virtio-scsi.c +++ b/pc-bios/s390-ccw/virtio-scsi.c @@ -26,7 +26,7 @@ static uint8_t scsi_inquiry_std_response[256]; static ScsiInquiryEvpdPages scsi_inquiry_evpd_pages_response; static ScsiInquiryEvpdBl scsi_inquiry_evpd_bl_response; =20 -static inline void vs_assert(bool term, const char **msgs) +static inline bool vs_assert(bool term, const char **msgs) { if (!term) { int i =3D 0; @@ -35,11 +35,13 @@ static inline void vs_assert(bool term, const char **ms= gs) while (msgs[i]) { printf("%s", msgs[i++]); } - panic(" !\n"); + puts(" !"); } + + return term; } =20 -static void virtio_scsi_verify_response(VirtioScsiCmdResp *resp, +static bool virtio_scsi_verify_response(VirtioScsiCmdResp *resp, const char *title) { const char *mr[] =3D { @@ -56,8 +58,8 @@ static void virtio_scsi_verify_response(VirtioScsiCmdResp= *resp, 0 }; =20 - vs_assert(resp->response =3D=3D VIRTIO_SCSI_S_OK, mr); - vs_assert(resp->status =3D=3D CDB_STATUS_GOOD, ms); + return vs_assert(resp->response =3D=3D VIRTIO_SCSI_S_OK, mr) && + vs_assert(resp->status =3D=3D CDB_STATUS_GOOD, ms); } =20 static void prepare_request(VDev *vdev, const void *cdb, int cdb_size, @@ -78,24 +80,31 @@ static void prepare_request(VDev *vdev, const void *cdb= , int cdb_size, } } =20 -static inline void vs_io_assert(bool term, const char *msg) +static inline bool vs_io_assert(bool term, const char *msg) { - if (!term) { - virtio_scsi_verify_response(&resp, msg); + if (!term && !virtio_scsi_verify_response(&resp, msg)) { + return false; } + + return true; } =20 -static void vs_run(const char *title, VirtioCmd *cmd, VDev *vdev, +static int vs_run(const char *title, VirtioCmd *cmd, VDev *vdev, const void *cdb, int cdb_size, void *data, uint32_t data_size) { prepare_request(vdev, cdb, cdb_size, data, data_size); - vs_io_assert(virtio_run(vdev, VR_REQUEST, cmd) =3D=3D 0, title); + if (!vs_io_assert(virtio_run(vdev, VR_REQUEST, cmd) =3D=3D 0, title)) { + puts(title); + return -EIO; + } + + return 0; } =20 /* SCSI protocol implementation routines */ =20 -static bool scsi_inquiry(VDev *vdev, uint8_t evpd, uint8_t page, +static int scsi_inquiry(VDev *vdev, uint8_t evpd, uint8_t page, void *data, uint32_t data_size) { ScsiCdbInquiry cdb =3D { @@ -110,12 +119,13 @@ static bool scsi_inquiry(VDev *vdev, uint8_t evpd, ui= nt8_t page, { data, data_size, VRING_DESC_F_WRITE }, }; =20 - vs_run("inquiry", inquiry, vdev, &cdb, sizeof(cdb), data, data_size); + int ret =3D vs_run("inquiry", inquiry, + vdev, &cdb, sizeof(cdb), data, data_size); =20 - return virtio_scsi_response_ok(&resp); + return ret ? ret : virtio_scsi_response_ok(&resp); } =20 -static bool scsi_test_unit_ready(VDev *vdev) +static int scsi_test_unit_ready(VDev *vdev) { ScsiCdbTestUnitReady cdb =3D { .command =3D 0x00, @@ -131,7 +141,7 @@ static bool scsi_test_unit_ready(VDev *vdev) return virtio_scsi_response_ok(&resp); } =20 -static bool scsi_report_luns(VDev *vdev, void *data, uint32_t data_size) +static int scsi_report_luns(VDev *vdev, void *data, uint32_t data_size) { ScsiCdbReportLuns cdb =3D { .command =3D 0xa0, @@ -144,13 +154,13 @@ static bool scsi_report_luns(VDev *vdev, void *data, = uint32_t data_size) { data, data_size, VRING_DESC_F_WRITE }, }; =20 - vs_run("report luns", report_luns, + int ret =3D vs_run("report luns", report_luns, vdev, &cdb, sizeof(cdb), data, data_size); =20 - return virtio_scsi_response_ok(&resp); + return ret ? ret : virtio_scsi_response_ok(&resp); } =20 -static bool scsi_read_10(VDev *vdev, +static int scsi_read_10(VDev *vdev, unsigned long sector, int sectors, void *data, unsigned int data_size) { @@ -168,12 +178,13 @@ static bool scsi_read_10(VDev *vdev, debug_print_int("read_10 sector", sector); debug_print_int("read_10 sectors", sectors); =20 - vs_run("read(10)", read_10, vdev, &cdb, sizeof(cdb), data, data_size); + int ret =3D vs_run("read(10)", read_10, + vdev, &cdb, sizeof(cdb), data, data_size); =20 - return virtio_scsi_response_ok(&resp); + return ret ? ret : virtio_scsi_response_ok(&resp); } =20 -static bool scsi_read_capacity(VDev *vdev, +static int scsi_read_capacity(VDev *vdev, void *data, uint32_t data_size) { ScsiCdbReadCapacity16 cdb =3D { @@ -187,10 +198,10 @@ static bool scsi_read_capacity(VDev *vdev, { data, data_size, VRING_DESC_F_WRITE }, }; =20 - vs_run("read capacity", read_capacity_16, + int ret =3D vs_run("read capacity", read_capacity_16, vdev, &cdb, sizeof(cdb), data, data_size); =20 - return virtio_scsi_response_ok(&resp); + return ret ? ret : virtio_scsi_response_ok(&resp); } =20 /* virtio-scsi routines */ @@ -207,7 +218,7 @@ static int virtio_scsi_locate_device(VDev *vdev) static uint8_t data[16 + 8 * 63]; ScsiLunReport *r =3D (void *) data; ScsiDevice *sdev =3D vdev->scsi_device; - int i, luns; + int i, ret, luns; =20 /* QEMU has hardcoded channel #0 in many places. * If this hardcoded value is ever changed, we'll need to add code for @@ -233,13 +244,21 @@ static int virtio_scsi_locate_device(VDev *vdev) sdev->channel =3D channel; sdev->target =3D target; sdev->lun =3D 0; /* LUN has to be 0 for REPORT LUNS */ - if (!scsi_report_luns(vdev, data, sizeof(data))) { + ret =3D scsi_report_luns(vdev, data, sizeof(data)); + if (ret < 0) { + return ret; + } + + else if (ret =3D=3D 0) { if (resp.response =3D=3D VIRTIO_SCSI_S_BAD_TARGET) { continue; } printf("target 0x%X\n", target); - virtio_scsi_verify_response(&resp, "SCSI cannot report LUNs"); + if (!virtio_scsi_verify_response(&resp, "SCSI cannot report LU= Ns")) { + return -EIO; + } } + if (r->lun_list_len =3D=3D 0) { printf("no LUNs for target 0x%X\n", target); continue; @@ -283,7 +302,9 @@ int virtio_scsi_read_many(VDev *vdev, data_size =3D sector_count * virtio_get_block_size() * f; if (!scsi_read_10(vdev, sector * f, sector_count * f, load_addr, data_size)) { - virtio_scsi_verify_response(&resp, "virtio-scsi:read_many"); + if (!virtio_scsi_verify_response(&resp, "virtio-scsi:read_many= ")) { + return -1; + } } load_addr +=3D data_size; sector +=3D sector_count; @@ -352,11 +373,16 @@ static int virtio_scsi_setup(VDev *vdev) uint8_t code =3D resp.sense[0] & SCSI_SENSE_CODE_MASK; uint8_t sense_key =3D resp.sense[2] & SCSI_SENSE_KEY_MASK; =20 - IPL_assert(resp.sense_len !=3D 0, "virtio-scsi:setup: no SENSE= data"); + if (resp.sense_len =3D=3D 0) { + puts("virtio-scsi: setup: no SENSE data"); + return -EINVAL; + } =20 - IPL_assert(retry_test_unit_ready && code =3D=3D 0x70 && - sense_key =3D=3D SCSI_SENSE_KEY_UNIT_ATTENTION, - "virtio-scsi:setup: cannot retry"); + if (!retry_test_unit_ready || code !=3D 0x70 || + sense_key !=3D SCSI_SENSE_KEY_UNIT_ATTENTION) { + puts("virtio-scsi:setup: cannot retry"); + return -EIO; + } =20 /* retry on CHECK_CONDITION/UNIT_ATTENTION as it * may not designate a real error, but it may be @@ -367,16 +393,22 @@ static int virtio_scsi_setup(VDev *vdev) continue; } =20 - virtio_scsi_verify_response(&resp, "virtio-scsi:setup"); + if (!virtio_scsi_verify_response(&resp, "virtio-scsi:setup")) { + return -1; + } } =20 /* read and cache SCSI INQUIRY response */ - if (!scsi_inquiry(vdev, + ret =3D scsi_inquiry(vdev, SCSI_INQUIRY_STANDARD, SCSI_INQUIRY_STANDARD_NONE, scsi_inquiry_std_response, - sizeof(scsi_inquiry_std_response))) { - virtio_scsi_verify_response(&resp, "virtio-scsi:setup:inquiry"); + sizeof(scsi_inquiry_std_response)); + if (ret < 1) { + if (ret !=3D 0 || !virtio_scsi_verify_response(&resp, + "virtio-scsi:setup:inquiry")) { + return -1; + } } =20 if (virtio_scsi_inquiry_response_is_cdrom(scsi_inquiry_std_response)) { @@ -385,12 +417,16 @@ static int virtio_scsi_setup(VDev *vdev) vdev->scsi_block_size =3D VIRTIO_ISO_BLOCK_SIZE; } =20 - if (!scsi_inquiry(vdev, + ret =3D scsi_inquiry(vdev, SCSI_INQUIRY_EVPD, SCSI_INQUIRY_EVPD_SUPPORTED_PAGES, evpd, - sizeof(*evpd))) { - virtio_scsi_verify_response(&resp, "virtio-scsi:setup:supported_pa= ges"); + sizeof(*evpd)); + if (ret < 1) { + if (ret !=3D 0 || !virtio_scsi_verify_response(&resp, + "virtio-scsi:setup:supported_pages")) { + return -1; + } } =20 debug_print_int("EVPD length", evpd->page_length); @@ -402,12 +438,16 @@ static int virtio_scsi_setup(VDev *vdev) continue; } =20 - if (!scsi_inquiry(vdev, + ret =3D scsi_inquiry(vdev, SCSI_INQUIRY_EVPD, SCSI_INQUIRY_EVPD_BLOCK_LIMITS, evpd_bl, - sizeof(*evpd_bl))) { - virtio_scsi_verify_response(&resp, "virtio-scsi:setup:blocklim= its"); + sizeof(*evpd_bl)); + if (ret < 1) { + if (ret !=3D 0 || !virtio_scsi_verify_response(&resp, + "virtio-scsi:setup:blocklimits")) { + return -1; + } } =20 debug_print_int("max transfer", evpd_bl->max_transfer); @@ -423,8 +463,12 @@ static int virtio_scsi_setup(VDev *vdev) vdev->max_transfer =3D MIN_NON_ZERO(VIRTIO_SCSI_MAX_SECTORS, vdev->max_transfer); =20 - if (!scsi_read_capacity(vdev, data, data_size)) { - virtio_scsi_verify_response(&resp, "virtio-scsi:setup:read_capacit= y"); + ret =3D scsi_read_capacity(vdev, data, data_size); + if (ret < 1) { + if (ret !=3D 0 || !virtio_scsi_verify_response(&resp, + "virtio-scsi:setup:read_capacity")) { + return -1; + } } scsi_parse_capacity_report(data, &vdev->scsi_last_block, (uint32_t *) &vdev->scsi_block_size); @@ -439,10 +483,15 @@ int virtio_scsi_setup_device(SubChannelId schid) vdev->schid =3D schid; virtio_setup_ccw(vdev); =20 - IPL_assert(vdev->config.scsi.sense_size =3D=3D VIRTIO_SCSI_SENSE_SIZE, - "Config: sense size mismatch"); - IPL_assert(vdev->config.scsi.cdb_size =3D=3D VIRTIO_SCSI_CDB_SIZE, - "Config: CDB size mismatch"); + if (vdev->config.scsi.sense_size !=3D VIRTIO_SCSI_SENSE_SIZE) { + puts("Config: sense size mismatch"); + return -EINVAL; + } + + if (vdev->config.scsi.cdb_size !=3D VIRTIO_SCSI_CDB_SIZE) { + puts("Config: CDB size mismatch"); + return -EINVAL; + } =20 puts("Using virtio-scsi."); =20 --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689589; cv=none; d=zohomail.com; s=zohoarc; b=b0BCqM4K6O5uf+Zg2idWF1ZIeBjY8EMFMX3+4dyOg5v/EEgqwzn0f1KFwBXZt4jjdXmbLYpgtsyWYAWU53F/fKyOfDVp5ZWatPY0SfdJZPLeONNahujD1aOP5f6V30LC6zqCtFdf35IbQ5BmE3ujPXzUb2BHfPQXX0njKnVuefI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689589; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=kyLFJBCL8uoxwg18WzHrQmP6RKBqZyA4ytuOh0evTMQ=; b=IZXjf0J0U4m57aPDCwvb6RCuMWzvMIz7i7Rm8/B63MY5n+o6ATTW7Bg2yi8pDIGgsyt6Inx0PMiU4okagmrJULhy/DrFj1vAmvfPCIJnk+VIElXX+lOV6+mb5IyJyNBY6eLNRdlv0uQK+hcYWZF2Wl4hpnTp8TuyfN0Jg/zdjNQ= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689589794831.3949285606932; Wed, 23 Oct 2024 06:19:49 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFN-0006Fn-PQ; Wed, 23 Oct 2024 09:17:57 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFC-00069j-0x for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:47 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFA-0002B0-23 for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:45 -0400 Received: from mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-267-rYHG84foPQGwZYNo6chcAA-1; Wed, 23 Oct 2024 09:17:40 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 5BF1F1955DCF; Wed, 23 Oct 2024 13:17:39 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id E74AE19560AE; Wed, 23 Oct 2024 13:17:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689463; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=kyLFJBCL8uoxwg18WzHrQmP6RKBqZyA4ytuOh0evTMQ=; b=EECDUKDG/XrSPio4Ftz6H6UOlha258KFiD2q1SCYLXJOq6iLQShhkbYOrHUNM3dem+4sli 4A++bYRrbsWGyOGb/pBJeY12UIDeegMSeRNnHBGMP0JYDq5L+LcZNUd9TQvFuRRYnhcqnT 59IRZAP4av/V95Nor6HDS7RCFyPDI5g= X-MC-Unique: rYHG84foPQGwZYNo6chcAA-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 10/23] pc-bios/s390-ccw: Remove panics from DASD IPL path Date: Wed, 23 Oct 2024 15:16:57 +0200 Message-ID: <20241023131710.906748-11-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689590645116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Remove panic-on-error from DASD IPL specific functions so that error recove= ry may be possible in the future. Functions that would previously panic now provide a return code. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-11-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/dasd-ipl.h | 2 +- pc-bios/s390-ccw/dasd-ipl.c | 66 ++++++++++++++++++++----------------- 2 files changed, 37 insertions(+), 31 deletions(-) diff --git a/pc-bios/s390-ccw/dasd-ipl.h b/pc-bios/s390-ccw/dasd-ipl.h index c394828906..eb1898c84a 100644 --- a/pc-bios/s390-ccw/dasd-ipl.h +++ b/pc-bios/s390-ccw/dasd-ipl.h @@ -11,6 +11,6 @@ #ifndef DASD_IPL_H #define DASD_IPL_H =20 -void dasd_ipl(SubChannelId schid, uint16_t cutype); +int dasd_ipl(SubChannelId schid, uint16_t cutype); =20 #endif /* DASD_IPL_H */ diff --git a/pc-bios/s390-ccw/dasd-ipl.c b/pc-bios/s390-ccw/dasd-ipl.c index ae751adec1..babece95ea 100644 --- a/pc-bios/s390-ccw/dasd-ipl.c +++ b/pc-bios/s390-ccw/dasd-ipl.c @@ -111,38 +111,29 @@ static void make_readipl(void) ccwIplRead->count =3D 0x18; /* Read 0x18 bytes of data */ } =20 -static void run_readipl(SubChannelId schid, uint16_t cutype) +static int run_readipl(SubChannelId schid, uint16_t cutype) { - if (do_cio(schid, cutype, 0x00, CCW_FMT0)) { - panic("dasd-ipl: Failed to run Read IPL channel program\n"); - } + return do_cio(schid, cutype, 0x00, CCW_FMT0); } =20 /* * The architecture states that IPL1 data should consist of a psw followed= by * format-0 READ and TIC CCWs. Let's sanity check. */ -static void check_ipl1(void) +static bool check_ipl1(void) { Ccw0 *ccwread =3D (Ccw0 *)0x08; Ccw0 *ccwtic =3D (Ccw0 *)0x10; =20 - if (ccwread->cmd_code !=3D CCW_CMD_DASD_READ || - ccwtic->cmd_code !=3D CCW_CMD_TIC) { - panic("dasd-ipl: IPL1 data invalid. Is this disk really bootable?\= n"); - } + return (ccwread->cmd_code =3D=3D CCW_CMD_DASD_READ && + ccwtic->cmd_code =3D=3D CCW_CMD_TIC); } =20 -static void check_ipl2(uint32_t ipl2_addr) +static bool check_ipl2(uint32_t ipl2_addr) { Ccw0 *ccw =3D u32toptr(ipl2_addr); =20 - if (ipl2_addr =3D=3D 0x00) { - panic("IPL2 address invalid. Is this disk really bootable?\n"); - } - if (ccw->cmd_code =3D=3D 0x00) { - panic("IPL2 ccw data invalid. Is this disk really bootable?\n"); - } + return (ipl2_addr !=3D 0x00 && ccw->cmd_code !=3D 0x00); } =20 static uint32_t read_ipl2_addr(void) @@ -188,52 +179,67 @@ static void ipl1_fixup(void) ccwSearchTic->cda =3D ptr2u32(ccwSearchID); } =20 -static void run_ipl1(SubChannelId schid, uint16_t cutype) +static int run_ipl1(SubChannelId schid, uint16_t cutype) { uint32_t startAddr =3D 0x08; =20 - if (do_cio(schid, cutype, startAddr, CCW_FMT0)) { - panic("dasd-ipl: Failed to run IPL1 channel program\n"); - } + return do_cio(schid, cutype, startAddr, CCW_FMT0); } =20 -static void run_ipl2(SubChannelId schid, uint16_t cutype, uint32_t addr) +static int run_ipl2(SubChannelId schid, uint16_t cutype, uint32_t addr) { - if (run_dynamic_ccw_program(schid, cutype, addr)) { - panic("dasd-ipl: Failed to run IPL2 channel program\n"); - } + return run_dynamic_ccw_program(schid, cutype, addr); } =20 /* * Limitations in vfio-ccw support complicate the IPL process. Details can * be found in docs/devel/s390-dasd-ipl.rst */ -void dasd_ipl(SubChannelId schid, uint16_t cutype) +int dasd_ipl(SubChannelId schid, uint16_t cutype) { PSWLegacy *pswl =3D (PSWLegacy *) 0x00; uint32_t ipl2_addr; =20 /* Construct Read IPL CCW and run it to read IPL1 from boot disk */ make_readipl(); - run_readipl(schid, cutype); + if (run_readipl(schid, cutype)) { + puts("Failed to run Read IPL channel program"); + return -EIO; + } + ipl2_addr =3D read_ipl2_addr(); - check_ipl1(); + + if (!check_ipl1()) { + puts("IPL1 invalid for DASD-IPL"); + return -EINVAL; + } =20 /* * Fixup IPL1 channel program to account for vfio-ccw limitations, the= n run * it to read IPL2 channel program from boot disk. */ ipl1_fixup(); - run_ipl1(schid, cutype); - check_ipl2(ipl2_addr); + if (run_ipl1(schid, cutype)) { + puts("Failed to run IPL1 channel program"); + return -EIO; + } + + if (!check_ipl2(ipl2_addr)) { + puts("IPL2 invalid for DASD-IPL"); + return -EINVAL; + } =20 /* * Run IPL2 channel program to read operating system code from boot di= sk */ - run_ipl2(schid, cutype, ipl2_addr); + if (run_ipl2(schid, cutype, ipl2_addr)) { + puts("Failed to run IPL2 channel program"); + return -EIO; + } =20 /* Transfer control to the guest operating system */ pswl->mask |=3D PSW_MASK_EAMODE; /* Force z-mode */ pswl->addr |=3D PSW_MASK_BAMODE; /* ... */ jump_to_low_kernel(); + return -1; } --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689569; cv=none; d=zohomail.com; s=zohoarc; b=MtKFIj9GzC3zqahqSHtvoFyBSYeijUw0KhWG+L3fNyMd+pbj6A0QWOPig8RXkvTna0LQ6YlxU0ox50SoZQYivDzD1khPSBNM4SdcbXg8EW0ZIE7qydSuVc8Hg9T+DFFCmL9i00lBovntJneZD3kZ6MZlS9F/D9Dg/sAA+0WEZdA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689569; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=4c2+dcvwTw8EOqSLkKmGvOUFCxwmSLHABvCXafJ4CH0=; b=ZWXsvOBP1ECdx2tRVntfssazbFb8Ahuud08R4OD6uFkjmDOTavvip1lx93hhHGhg+P8FhegjfVVoV13uK3hfTDVp0pQTPbYf7RA/ZwngnfPJah/VUW4C3KZPbKIS2kkMczxZ6EvnlMXaYi45mO+jUGljfkUf6/eCZBwEibaCf0Y= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689569525546.8453971710741; Wed, 23 Oct 2024 06:19:29 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFR-0006Sk-Mq; Wed, 23 Oct 2024 09:18:01 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFF-0006Cm-2z for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:49 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFD-0002BV-98 for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:48 -0400 Received: from mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-230-QyX1nlqCPpeyPzXgIWkQsg-1; Wed, 23 Oct 2024 09:17:42 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 67500195423D; Wed, 23 Oct 2024 13:17:41 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id D3D2719560AE; Wed, 23 Oct 2024 13:17:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689466; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4c2+dcvwTw8EOqSLkKmGvOUFCxwmSLHABvCXafJ4CH0=; b=dHF8Zo8IGRbpLCMkZ9BiFZDOrIPCM+xID54xbFY5i6czAE6yR0jPcWExwmCHFj3+C2mPuI 3/quek7FK1pAu9TWWfQjyP9ZMgLoyvYLrj1fylDHWdGs4Et46mtEQ7zGYBF3Q1bKy8oYwP BmAfStW2ra7gkIG2VO38dhRMhqoHMHg= X-MC-Unique: QyX1nlqCPpeyPzXgIWkQsg-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 11/23] pc-bios/s390-ccw: Remove panics from Netboot IPL path Date: Wed, 23 Oct 2024 15:16:58 +0200 Message-ID: <20241023131710.906748-12-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -23 X-Spam_score: -2.4 X-Spam_bar: -- X-Spam_report: (-2.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689570435116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Remove panic-on-error from Netboot specific functions so that error recovery may be possible in the future. Functions that would previously panic now provide a return code. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-12-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/s390-ccw.h | 2 +- pc-bios/s390-ccw/bootmap.c | 1 + pc-bios/s390-ccw/netmain.c | 17 +++++++++++------ pc-bios/s390-ccw/virtio-net.c | 7 +++++-- 4 files changed, 18 insertions(+), 9 deletions(-) diff --git a/pc-bios/s390-ccw/s390-ccw.h b/pc-bios/s390-ccw/s390-ccw.h index 3e844abd71..344ad15655 100644 --- a/pc-bios/s390-ccw/s390-ccw.h +++ b/pc-bios/s390-ccw/s390-ccw.h @@ -57,7 +57,7 @@ unsigned int get_loadparm_index(void); void main(void); =20 /* netmain.c */ -void netmain(void); +int netmain(void); =20 /* sclp.c */ void sclp_print(const char *string); diff --git a/pc-bios/s390-ccw/bootmap.c b/pc-bios/s390-ccw/bootmap.c index 652807a16a..95ef9104d0 100644 --- a/pc-bios/s390-ccw/bootmap.c +++ b/pc-bios/s390-ccw/bootmap.c @@ -1072,6 +1072,7 @@ void zipl_load(void) =20 if (virtio_get_device_type() =3D=3D VIRTIO_ID_NET) { netmain(); + panic("\n! Cannot IPL from this network !\n"); } =20 if (ipl_scsi()) { diff --git a/pc-bios/s390-ccw/netmain.c b/pc-bios/s390-ccw/netmain.c index bc6ad8695f..d1a6c9a91c 100644 --- a/pc-bios/s390-ccw/netmain.c +++ b/pc-bios/s390-ccw/netmain.c @@ -464,7 +464,7 @@ static bool find_net_dev(Schib *schib, int dev_no) return false; } =20 -static void virtio_setup(void) +static bool virtio_setup(void) { Schib schib; int ssid; @@ -495,10 +495,10 @@ static void virtio_setup(void) } } =20 - IPL_assert(found, "No virtio net device found"); + return found; } =20 -void netmain(void) +int netmain(void) { filename_ip_t fn_ip; int rc, fnlen; @@ -506,11 +506,15 @@ void netmain(void) sclp_setup(); puts("Network boot starting..."); =20 - virtio_setup(); + if (!virtio_setup()) { + puts("No virtio net device found."); + return -1; + } =20 rc =3D net_init(&fn_ip); if (rc) { - panic("Network initialization failed. Halting."); + puts("Network initialization failed."); + return -1; } =20 fnlen =3D strlen(fn_ip.filename); @@ -528,5 +532,6 @@ void netmain(void) jump_to_low_kernel(); } =20 - panic("Failed to load OS from network."); + puts("Failed to load OS from network."); + return -1; } diff --git a/pc-bios/s390-ccw/virtio-net.c b/pc-bios/s390-ccw/virtio-net.c index 2fcb0a58c5..f9854a22c3 100644 --- a/pc-bios/s390-ccw/virtio-net.c +++ b/pc-bios/s390-ccw/virtio-net.c @@ -54,8 +54,11 @@ int virtio_net_init(void *mac_addr) vdev->guest_features[0] =3D VIRTIO_NET_F_MAC_BIT; virtio_setup_ccw(vdev); =20 - IPL_assert(vdev->guest_features[0] & VIRTIO_NET_F_MAC_BIT, - "virtio-net device does not support the MAC address feature= "); + if (!(vdev->guest_features[0] & VIRTIO_NET_F_MAC_BIT)) { + puts("virtio-net device does not support the MAC address feature"); + return -1; + } + memcpy(mac_addr, vdev->config.net.mac, ETH_ALEN); =20 for (i =3D 0; i < 64; i++) { --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689524; cv=none; d=zohomail.com; s=zohoarc; b=c0EVnPnq9RlaR5Vk8LHERjOSGWq81XQpC83RqH44EBWVx40G8yoLb7mGpXlWIymll0jh+jAEHQa2va8gZ9wo/X3ZZSEaixODK8N/5S6ZZIz2nMIkDNyB18fYA4Q8XtvF/0nQomnRZnCHogV804G/AY4mlfu8ni4wqSPrWPThPfc= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689524; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=aaLsTOgiA5nsTX4XwxcbdIi94AOwlg9hOaI6QUaTCyE=; b=WGDWZ38hzWmNy6Ty+73mgOT6rnMltk+X4/ZUcLU3PMNZwd8z0jZjl5jqQupmPGxveIw7NoHaO1Flh5bLdciHT+Wi3a4j2E7A7y9AKAVKzBoD5uOvA37HlAKfcCq/SQXttHxKmCu4eH3jq257LTy+i01XuImX3SRhx2+QuHzG58c= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689524922862.6007957873113; Wed, 23 Oct 2024 06:18:44 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFV-0006rV-MW; Wed, 23 Oct 2024 09:18:05 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFJ-0006Fo-NV for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:55 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFG-0002Bv-7v for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:53 -0400 Received: from mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-300-9ErbVbkTNGmY0omDqd6K1A-1; Wed, 23 Oct 2024 09:17:45 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 9E8C71955D99; Wed, 23 Oct 2024 13:17:44 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 6757A19560AE; Wed, 23 Oct 2024 13:17:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689469; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=aaLsTOgiA5nsTX4XwxcbdIi94AOwlg9hOaI6QUaTCyE=; b=VTylzn95jlr/DcsrKhDBqG/Zq+L1neKayBB2h0Jm7GcClDjGqOX6KMt4xmtNOHZ7HT5PL2 FqGzwKOREBwqvDjKMwRblroMbbx8eeWOeX2miMDG77hTWuHYJKLFyx7h8xcbjbmvFCvfts x0LTw0c8S8bVtBMlDzF0Esmqo5vARF4= X-MC-Unique: 9ErbVbkTNGmY0omDqd6K1A-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 12/23] pc-bios/s390-ccw: Enable failed IPL to return after error Date: Wed, 23 Oct 2024 15:16:59 +0200 Message-ID: <20241023131710.906748-13-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -23 X-Spam_score: -2.4 X-Spam_bar: -- X-Spam_report: (-2.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689528580116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Remove panic-on-error from IPL functions such that a return code is propaga= ted back to the main IPL calling function (rather than terminating immediately), which facilitates possible error recovery in the future. A select few panics remain, which indicate fatal non-devices errors that mu= st result in termination. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-13-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/s390-ccw.h | 2 +- pc-bios/s390-ccw/virtio.h | 2 +- pc-bios/s390-ccw/bootmap.c | 53 ++++++++++++++++++-------- pc-bios/s390-ccw/cio.c | 3 +- pc-bios/s390-ccw/jump2ipl.c | 5 ++- pc-bios/s390-ccw/main.c | 32 +++++++++------- pc-bios/s390-ccw/virtio-blkdev.c | 2 +- pc-bios/s390-ccw/virtio.c | 65 +++++++++++++++++++++----------- 8 files changed, 108 insertions(+), 56 deletions(-) diff --git a/pc-bios/s390-ccw/s390-ccw.h b/pc-bios/s390-ccw/s390-ccw.h index 344ad15655..6cdce3e5e5 100644 --- a/pc-bios/s390-ccw/s390-ccw.h +++ b/pc-bios/s390-ccw/s390-ccw.h @@ -78,7 +78,7 @@ void zipl_load(void); =20 /* jump2ipl.c */ void write_reset_psw(uint64_t psw); -void jump_to_IPL_code(uint64_t address); +int jump_to_IPL_code(uint64_t address); void jump_to_low_kernel(void); =20 /* menu.c */ diff --git a/pc-bios/s390-ccw/virtio.h b/pc-bios/s390-ccw/virtio.h index 6f9a558ff5..9faf3986b1 100644 --- a/pc-bios/s390-ccw/virtio.h +++ b/pc-bios/s390-ccw/virtio.h @@ -274,7 +274,7 @@ void vring_send_buf(VRing *vr, void *p, int len, int fl= ags); int vr_poll(VRing *vr); int vring_wait_reply(void); int virtio_run(VDev *vdev, int vqid, VirtioCmd *cmd); -void virtio_setup_ccw(VDev *vdev); +int virtio_setup_ccw(VDev *vdev); =20 int virtio_net_init(void *mac_addr); =20 diff --git a/pc-bios/s390-ccw/bootmap.c b/pc-bios/s390-ccw/bootmap.c index 95ef9104d0..56f2f75640 100644 --- a/pc-bios/s390-ccw/bootmap.c +++ b/pc-bios/s390-ccw/bootmap.c @@ -62,15 +62,34 @@ static void *s2_prev_blk =3D _s2; static void *s2_cur_blk =3D _s2 + MAX_SECTOR_SIZE; static void *s2_next_blk =3D _s2 + MAX_SECTOR_SIZE * 2; =20 -static inline void verify_boot_info(BootInfo *bip) +static inline int verify_boot_info(BootInfo *bip) { - IPL_assert(magic_match(bip->magic, ZIPL_MAGIC), "No zIPL sig in BootIn= fo"); - IPL_assert(bip->version =3D=3D BOOT_INFO_VERSION, "Wrong zIPL version"= ); - IPL_assert(bip->bp_type =3D=3D BOOT_INFO_BP_TYPE_IPL, "DASD is not for= IPL"); - IPL_assert(bip->dev_type =3D=3D BOOT_INFO_DEV_TYPE_ECKD, "DASD is not = ECKD"); - IPL_assert(bip->flags =3D=3D BOOT_INFO_FLAGS_ARCH, "Not for this arch"= ); - IPL_assert(block_size_ok(bip->bp.ipl.bm_ptr.eckd.bptr.size), - "Bad block size in zIPL section of the 1st record."); + if (!magic_match(bip->magic, ZIPL_MAGIC)) { + puts("No zIPL sig in BootInfo"); + return -EINVAL; + } + if (bip->version !=3D BOOT_INFO_VERSION) { + puts("Wrong zIPL version"); + return -EINVAL; + } + if (bip->bp_type !=3D BOOT_INFO_BP_TYPE_IPL) { + puts("DASD is not for IPL"); + return -ENODEV; + } + if (bip->dev_type !=3D BOOT_INFO_DEV_TYPE_ECKD) { + puts("DASD is not ECKD"); + return -ENODEV; + } + if (bip->flags !=3D BOOT_INFO_FLAGS_ARCH) { + puts("Not for this arch"); + return -EINVAL; + } + if (!block_size_ok(bip->bp.ipl.bm_ptr.eckd.bptr.size)) { + puts("Bad block size in zIPL section of 1st record"); + return -EINVAL; + } + + return 0; } =20 static void eckd_format_chs(ExtEckdBlockPtr *ptr, bool ldipl, @@ -367,8 +386,8 @@ static int run_eckd_boot_script(block_number_t bmt_bloc= k_nr, puts("Unknown script entry type"); return -EINVAL; } - write_reset_psw(bms->entry[i].address.load_address); /* no return */ - jump_to_IPL_code(0); /* no return */ + write_reset_psw(bms->entry[i].address.load_address); + jump_to_IPL_code(0); return -1; } =20 @@ -1067,16 +1086,19 @@ void zipl_load(void) =20 if (vdev->is_cdrom) { ipl_iso_el_torito(); - panic("\n! Cannot IPL this ISO image !\n"); + puts("Failed to IPL this ISO image!"); + return; } =20 if (virtio_get_device_type() =3D=3D VIRTIO_ID_NET) { netmain(); - panic("\n! Cannot IPL from this network !\n"); + puts("Failed to IPL from this network!"); + return; } =20 if (ipl_scsi()) { - panic("\n! Cannot IPL this SCSI device !\n"); + puts("Failed to IPL from this SCSI device!"); + return; } =20 switch (virtio_get_device_type()) { @@ -1087,8 +1109,9 @@ void zipl_load(void) zipl_load_vscsi(); break; default: - panic("\n! Unknown IPL device type !\n"); + puts("Unknown IPL device type!"); + return; } =20 - puts("zIPL load failed."); + puts("zIPL load failed!"); } diff --git a/pc-bios/s390-ccw/cio.c b/pc-bios/s390-ccw/cio.c index 7b09a38c96..5d543da73f 100644 --- a/pc-bios/s390-ccw/cio.c +++ b/pc-bios/s390-ccw/cio.c @@ -59,7 +59,8 @@ uint16_t cu_type(SubChannelId schid) }; =20 if (do_cio(schid, CU_TYPE_UNKNOWN, ptr2u32(&sense_id_ccw), CCW_FMT1)) { - panic("Failed to run SenseID CCw\n"); + puts("Failed to run SenseID CCW"); + return CU_TYPE_UNKNOWN; } =20 return sense_data.cu_type; diff --git a/pc-bios/s390-ccw/jump2ipl.c b/pc-bios/s390-ccw/jump2ipl.c index 80b7f6a1f3..8db1764ff3 100644 --- a/pc-bios/s390-ccw/jump2ipl.c +++ b/pc-bios/s390-ccw/jump2ipl.c @@ -33,7 +33,7 @@ static void jump_to_IPL_addr(void) /* should not return */ } =20 -void jump_to_IPL_code(uint64_t address) +int jump_to_IPL_code(uint64_t address) { /* store the subsystem information _after_ the bootmap was loaded */ write_subsystem_identification(); @@ -68,7 +68,8 @@ void jump_to_IPL_code(uint64_t address) asm volatile("lghi %%r1,1\n\t" "diag %%r1,%%r1,0x308\n\t" : : : "1", "memory"); - panic("\n! IPL returns !\n"); + puts("IPL code jump failed"); + return -1; } =20 void jump_to_low_kernel(void) diff --git a/pc-bios/s390-ccw/main.c b/pc-bios/s390-ccw/main.c index fc44da3161..34ef27d7a6 100644 --- a/pc-bios/s390-ccw/main.c +++ b/pc-bios/s390-ccw/main.c @@ -77,6 +77,9 @@ static int is_dev_possibly_bootable(int dev_no, int sch_n= o) =20 enable_subchannel(blk_schid); cutype =3D cu_type(blk_schid); + if (cutype =3D=3D CU_TYPE_UNKNOWN) { + return -EIO; + } =20 /* * Note: we always have to run virtio_is_supported() here to make @@ -194,10 +197,10 @@ static void boot_setup(void) have_iplb =3D store_iplb(&iplb); } =20 -static void find_boot_device(void) +static bool find_boot_device(void) { VDev *vdev =3D virtio_get_device(); - bool found; + bool found =3D false; =20 switch (iplb.pbt) { case S390_IPL_TYPE_CCW: @@ -215,10 +218,10 @@ static void find_boot_device(void) found =3D find_subch(iplb.scsi.devno); break; default: - panic("List-directed IPL not supported yet!\n"); + puts("Unsupported IPLB"); } =20 - IPL_assert(found, "Boot device not found\n"); + return found; } =20 static int virtio_setup(void) @@ -244,11 +247,13 @@ static int virtio_setup(void) ret =3D virtio_scsi_setup_device(blk_schid); break; default: - panic("\n! No IPL device available !\n"); + puts("\n! No IPL device available !\n"); + return -1; } =20 - if (!ret) { - IPL_assert(virtio_ipl_disk_is_valid(), "No valid IPL device detect= ed"); + if (!ret && !virtio_ipl_disk_is_valid()) { + puts("No valid IPL device detected"); + return -ENODEV; } =20 return ret; @@ -259,16 +264,16 @@ static void ipl_boot_device(void) switch (cutype) { case CU_TYPE_DASD_3990: case CU_TYPE_DASD_2107: - dasd_ipl(blk_schid, cutype); /* no return */ + dasd_ipl(blk_schid, cutype); break; case CU_TYPE_VIRTIO: - if (virtio_setup() =3D=3D 0) { - zipl_load(); /* Only returns in case of errors */ + if (virtio_setup()) { + return; /* Only returns in case of errors */ } + zipl_load(); break; default: printf("Attempting to boot from unexpected device type 0x%X\n", cu= type); - panic("\nBoot failed.\n"); } } =20 @@ -301,12 +306,11 @@ void main(void) sclp_setup(); css_setup(); boot_setup(); - if (have_iplb) { - find_boot_device(); + if (have_iplb && find_boot_device()) { ipl_boot_device(); } else { probe_boot_device(); } =20 - panic("Failed to load OS from hard disk\n"); + panic("Failed to IPL. Halting..."); } diff --git a/pc-bios/s390-ccw/virtio-blkdev.c b/pc-bios/s390-ccw/virtio-blk= dev.c index 1c585f034b..7b2d1e20f4 100644 --- a/pc-bios/s390-ccw/virtio-blkdev.c +++ b/pc-bios/s390-ccw/virtio-blkdev.c @@ -59,7 +59,7 @@ int virtio_read_many(unsigned long sector, void *load_add= r, int sec_num) case VIRTIO_ID_SCSI: return virtio_scsi_read_many(vdev, sector, load_addr, sec_num); } - panic("\n! No readable IPL device !\n"); + return -1; } =20 diff --git a/pc-bios/s390-ccw/virtio.c b/pc-bios/s390-ccw/virtio.c index 8c6b0a8a92..8b5a370bb3 100644 --- a/pc-bios/s390-ccw/virtio.c +++ b/pc-bios/s390-ccw/virtio.c @@ -217,16 +217,19 @@ int virtio_run(VDev *vdev, int vqid, VirtioCmd *cmd) return 0; } =20 -void virtio_setup_ccw(VDev *vdev) +int virtio_setup_ccw(VDev *vdev) { - int i, rc, cfg_size =3D 0; + int i, cfg_size =3D 0; uint8_t status; struct VirtioFeatureDesc { uint32_t features; uint8_t index; } __attribute__((packed)) feats; =20 - IPL_assert(virtio_is_supported(vdev->schid), "PE"); + if (!virtio_is_supported(vdev->schid)) { + puts("Virtio unsupported for this device ID"); + return -ENODEV; + } /* device ID has been established now */ =20 vdev->config.blk.blk_size =3D 0; /* mark "illegal" - setup started... = */ @@ -235,8 +238,10 @@ void virtio_setup_ccw(VDev *vdev) run_ccw(vdev, CCW_CMD_VDEV_RESET, NULL, 0, false); =20 status =3D VIRTIO_CONFIG_S_ACKNOWLEDGE; - rc =3D run_ccw(vdev, CCW_CMD_WRITE_STATUS, &status, sizeof(status), fa= lse); - IPL_assert(rc =3D=3D 0, "Could not write ACKNOWLEDGE status to host"); + if (run_ccw(vdev, CCW_CMD_WRITE_STATUS, &status, sizeof(status), false= )) { + puts("Could not write ACKNOWLEDGE status to host"); + return -EIO; + } =20 switch (vdev->senseid.cu_model) { case VIRTIO_ID_NET: @@ -255,27 +260,37 @@ void virtio_setup_ccw(VDev *vdev) cfg_size =3D sizeof(vdev->config.scsi); break; default: - panic("Unsupported virtio device\n"); + puts("Unsupported virtio device"); + return -ENODEV; } =20 status |=3D VIRTIO_CONFIG_S_DRIVER; - rc =3D run_ccw(vdev, CCW_CMD_WRITE_STATUS, &status, sizeof(status), fa= lse); - IPL_assert(rc =3D=3D 0, "Could not write DRIVER status to host"); + if (run_ccw(vdev, CCW_CMD_WRITE_STATUS, &status, sizeof(status), false= )) { + puts("Could not write DRIVER status to host"); + return -EIO; + } =20 /* Feature negotiation */ for (i =3D 0; i < ARRAY_SIZE(vdev->guest_features); i++) { feats.features =3D 0; feats.index =3D i; - rc =3D run_ccw(vdev, CCW_CMD_READ_FEAT, &feats, sizeof(feats), fal= se); - IPL_assert(rc =3D=3D 0, "Could not get features bits"); + if (run_ccw(vdev, CCW_CMD_READ_FEAT, &feats, sizeof(feats), false)= ) { + puts("Could not get features bits"); + return -EIO; + } + vdev->guest_features[i] &=3D bswap32(feats.features); feats.features =3D bswap32(vdev->guest_features[i]); - rc =3D run_ccw(vdev, CCW_CMD_WRITE_FEAT, &feats, sizeof(feats), fa= lse); - IPL_assert(rc =3D=3D 0, "Could not set features bits"); + if (run_ccw(vdev, CCW_CMD_WRITE_FEAT, &feats, sizeof(feats), false= )) { + puts("Could not set features bits"); + return -EIO; + } } =20 - rc =3D run_ccw(vdev, CCW_CMD_READ_CONF, &vdev->config, cfg_size, false= ); - IPL_assert(rc =3D=3D 0, "Could not get virtio device configuration"); + if (run_ccw(vdev, CCW_CMD_READ_CONF, &vdev->config, cfg_size, false)) { + puts("Could not get virtio device configuration"); + return -EIO; + } =20 for (i =3D 0; i < vdev->nr_vqs; i++) { VqInfo info =3D { @@ -289,19 +304,27 @@ void virtio_setup_ccw(VDev *vdev) .num =3D 0, }; =20 - rc =3D run_ccw(vdev, CCW_CMD_READ_VQ_CONF, &config, sizeof(config)= , false); - IPL_assert(rc =3D=3D 0, "Could not get virtio device VQ configurat= ion"); + if (run_ccw(vdev, CCW_CMD_READ_VQ_CONF, &config, sizeof(config), + false)) { + puts("Could not get virtio device VQ config"); + return -EIO; + } info.num =3D config.num; vring_init(&vdev->vrings[i], &info); vdev->vrings[i].schid =3D vdev->schid; - IPL_assert( - run_ccw(vdev, CCW_CMD_SET_VQ, &info, sizeof(info), false) =3D= =3D 0, - "Cannot set VQ info"); + if (run_ccw(vdev, CCW_CMD_SET_VQ, &info, sizeof(info), false)) { + puts("Cannot set VQ info"); + return -EIO; + } } =20 status |=3D VIRTIO_CONFIG_S_DRIVER_OK; - rc =3D run_ccw(vdev, CCW_CMD_WRITE_STATUS, &status, sizeof(status), fa= lse); - IPL_assert(rc =3D=3D 0, "Could not write DRIVER_OK status to host"); + if (run_ccw(vdev, CCW_CMD_WRITE_STATUS, &status, sizeof(status), false= )) { + puts("Could not write DRIVER_OK status to host"); + return -EIO; + } + + return 0; } =20 bool virtio_is_supported(SubChannelId schid) --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689577; cv=none; d=zohomail.com; s=zohoarc; b=DvNn4rbcZUxfFtemyvyUw03RRNrDPBJLaTft4Db8qXSHjHGT38tVCFLawU4YTwftbRQrX70mfPqUhIMZy3eh8fp1FdcNmI5Os+xMcWwAOfKR7HSC24wlgX+7UkjCnPuXLKTmH53THsSlwTNZ9FisoMEK4MbtXnsiG1ez5G/9lFs= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689577; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=uWFhxuF8gL11t2g0E9b3OpEv0lIl7dL1SiEtTG1TGQ0=; b=U63sbMZ4eg9Zh5aHfi0/gIXGFyFaE42EZB8N2tU1ty4A5BSzCXyF397CrBQqWDJ4OiDbl+Qwl0z5g/27rk906MopVl3mzud3KCaG0GEY2hmzLL+vvgjviZknwVWfHd4uuZ54NqGQGSh8JwEVzpGjXsDBvPdnQHKzsYUT/p1UAvI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689577662702.0172744167554; Wed, 23 Oct 2024 06:19:37 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFR-0006Sg-8c; Wed, 23 Oct 2024 09:18:01 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFI-0006Dg-4m for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:53 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFG-0002C0-8A for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:51 -0400 Received: from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-339-hUrBB-3cPlefM1udr-Yz7A-1; Wed, 23 Oct 2024 09:17:47 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 12D1219560B8; Wed, 23 Oct 2024 13:17:47 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 43F2919560AE; Wed, 23 Oct 2024 13:17:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689469; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=uWFhxuF8gL11t2g0E9b3OpEv0lIl7dL1SiEtTG1TGQ0=; b=BlBViKkE9hFK3kApJ5Vz6NoCMEn2jnMdzGHaiJyE8Jfwd83DowyOmz1iyX4KI5xmP2JpkW pmLh10Wq433+jZydiiUxH6ABl8BE7dZWYvn50w7dQRziMWx1hu6kWL+1tleghDgGf5o09j +Pqo1WlsvEoxqIx5VkG1jAtwYv0425c= X-MC-Unique: hUrBB-3cPlefM1udr-Yz7A-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 13/23] include/hw/s390x: Add include files for common IPL structs Date: Wed, 23 Oct 2024 15:17:00 +0200 Message-ID: <20241023131710.906748-14-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689578718116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Currently, structures defined in both hw/s390x/ipl.h and pc-bios/s390-ccw/i= plb.h must be kept in sync, which is prone to error. Instead, create a new direct= ory at include/hw/s390x/ipl/ to contain the definitions that must be shared. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-14-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- hw/s390x/ipl.h | 104 +----------------------------- include/hw/s390x/ipl/qipl.h | 123 ++++++++++++++++++++++++++++++++++++ pc-bios/s390-ccw/iplb.h | 84 ++---------------------- pc-bios/s390-ccw/Makefile | 2 +- 4 files changed, 130 insertions(+), 183 deletions(-) create mode 100644 include/hw/s390x/ipl/qipl.h diff --git a/hw/s390x/ipl.h b/hw/s390x/ipl.h index b2105b616a..fa394c339d 100644 --- a/hw/s390x/ipl.h +++ b/hw/s390x/ipl.h @@ -16,95 +16,11 @@ #include "cpu.h" #include "exec/address-spaces.h" #include "hw/qdev-core.h" +#include "hw/s390x/ipl/qipl.h" #include "qom/object.h" =20 -struct IPLBlockPVComp { - uint64_t tweak_pref; - uint64_t addr; - uint64_t size; -} QEMU_PACKED; -typedef struct IPLBlockPVComp IPLBlockPVComp; - -struct IPLBlockPV { - uint8_t reserved18[87]; /* 0x18 */ - uint8_t version; /* 0x6f */ - uint32_t reserved70; /* 0x70 */ - uint32_t num_comp; /* 0x74 */ - uint64_t pv_header_addr; /* 0x78 */ - uint64_t pv_header_len; /* 0x80 */ - struct IPLBlockPVComp components[0]; -} QEMU_PACKED; -typedef struct IPLBlockPV IPLBlockPV; - -struct IplBlockCcw { - uint8_t reserved0[85]; - uint8_t ssid; - uint16_t devno; - uint8_t vm_flags; - uint8_t reserved3[3]; - uint32_t vm_parm_len; - uint8_t nss_name[8]; - uint8_t vm_parm[64]; - uint8_t reserved4[8]; -} QEMU_PACKED; -typedef struct IplBlockCcw IplBlockCcw; - -struct IplBlockFcp { - uint8_t reserved1[305 - 1]; - uint8_t opt; - uint8_t reserved2[3]; - uint16_t reserved3; - uint16_t devno; - uint8_t reserved4[4]; - uint64_t wwpn; - uint64_t lun; - uint32_t bootprog; - uint8_t reserved5[12]; - uint64_t br_lba; - uint32_t scp_data_len; - uint8_t reserved6[260]; - uint8_t scp_data[0]; -} QEMU_PACKED; -typedef struct IplBlockFcp IplBlockFcp; - -struct IplBlockQemuScsi { - uint32_t lun; - uint16_t target; - uint16_t channel; - uint8_t reserved0[77]; - uint8_t ssid; - uint16_t devno; -} QEMU_PACKED; -typedef struct IplBlockQemuScsi IplBlockQemuScsi; - #define DIAG308_FLAGS_LP_VALID 0x80 =20 -union IplParameterBlock { - struct { - uint32_t len; - uint8_t reserved0[3]; - uint8_t version; - uint32_t blk0_len; - uint8_t pbt; - uint8_t flags; - uint16_t reserved01; - uint8_t loadparm[8]; - union { - IplBlockCcw ccw; - IplBlockFcp fcp; - IPLBlockPV pv; - IplBlockQemuScsi scsi; - }; - } QEMU_PACKED; - struct { - uint8_t reserved1[110]; - uint16_t devno; - uint8_t reserved2[88]; - uint8_t reserved_ext[4096 - 200]; - } QEMU_PACKED; -} QEMU_PACKED; -typedef union IplParameterBlock IplParameterBlock; - int s390_ipl_set_loadparm(uint8_t *loadparm); void s390_ipl_update_diag308(IplParameterBlock *iplb); int s390_ipl_prepare_pv_header(Error **errp); @@ -131,24 +47,6 @@ void s390_ipl_clear_reset_request(void); #define QIPL_FLAG_BM_OPTS_CMD 0x80 #define QIPL_FLAG_BM_OPTS_ZIPL 0x40 =20 -/* - * The QEMU IPL Parameters will be stored at absolute address - * 204 (0xcc) which means it is 32-bit word aligned but not - * double-word aligned. Placement of 64-bit data fields in this - * area must account for their alignment needs. - * The total size of the struct must never exceed 28 bytes. - * This definition must be kept in sync with the definition - * in pc-bios/s390-ccw/iplb.h. - */ -struct QemuIplParameters { - uint8_t qipl_flags; - uint8_t reserved1[3]; - uint64_t reserved2; - uint32_t boot_menu_timeout; - uint8_t reserved3[12]; -} QEMU_PACKED; -typedef struct QemuIplParameters QemuIplParameters; - #define TYPE_S390_IPL "s390-ipl" OBJECT_DECLARE_SIMPLE_TYPE(S390IPLState, S390_IPL) =20 diff --git a/include/hw/s390x/ipl/qipl.h b/include/hw/s390x/ipl/qipl.h new file mode 100644 index 0000000000..0ef04af027 --- /dev/null +++ b/include/hw/s390x/ipl/qipl.h @@ -0,0 +1,123 @@ +/* + * S/390 boot structures + * + * Copyright 2024 IBM Corp. + * Author(s): Jared Rossi + * + * This work is licensed under the terms of the GNU GPL, version 2 or (at + * your option) any later version. See the COPYING file in the top-level + * directory. + */ + +#ifndef S390X_QIPL_H +#define S390X_QIPL_H + +/* Boot Menu flags */ +#define QIPL_FLAG_BM_OPTS_CMD 0x80 +#define QIPL_FLAG_BM_OPTS_ZIPL 0x40 + +#define QIPL_ADDRESS 0xcc +#define LOADPARM_LEN 8 + +/* + * The QEMU IPL Parameters will be stored at absolute address + * 204 (0xcc) which means it is 32-bit word aligned but not + * double-word aligned. Placement of 64-bit data fields in this + * area must account for their alignment needs. + * The total size of the struct must never exceed 28 bytes. + */ +struct QemuIplParameters { + uint8_t qipl_flags; + uint8_t reserved1[3]; + uint64_t reserved2; + uint32_t boot_menu_timeout; + uint8_t reserved3[12]; +} QEMU_PACKED; +typedef struct QemuIplParameters QemuIplParameters; + +struct IPLBlockPVComp { + uint64_t tweak_pref; + uint64_t addr; + uint64_t size; +} QEMU_PACKED; +typedef struct IPLBlockPVComp IPLBlockPVComp; + +struct IPLBlockPV { + uint8_t reserved18[87]; /* 0x18 */ + uint8_t version; /* 0x6f */ + uint32_t reserved70; /* 0x70 */ + uint32_t num_comp; /* 0x74 */ + uint64_t pv_header_addr; /* 0x78 */ + uint64_t pv_header_len; /* 0x80 */ + struct IPLBlockPVComp components[0]; +} QEMU_PACKED; +typedef struct IPLBlockPV IPLBlockPV; + +struct IplBlockCcw { + uint8_t reserved0[85]; + uint8_t ssid; + uint16_t devno; + uint8_t vm_flags; + uint8_t reserved3[3]; + uint32_t vm_parm_len; + uint8_t nss_name[8]; + uint8_t vm_parm[64]; + uint8_t reserved4[8]; +} QEMU_PACKED; +typedef struct IplBlockCcw IplBlockCcw; + +struct IplBlockFcp { + uint8_t reserved1[305 - 1]; + uint8_t opt; + uint8_t reserved2[3]; + uint16_t reserved3; + uint16_t devno; + uint8_t reserved4[4]; + uint64_t wwpn; + uint64_t lun; + uint32_t bootprog; + uint8_t reserved5[12]; + uint64_t br_lba; + uint32_t scp_data_len; + uint8_t reserved6[260]; + uint8_t scp_data[0]; +} QEMU_PACKED; +typedef struct IplBlockFcp IplBlockFcp; + +struct IplBlockQemuScsi { + uint32_t lun; + uint16_t target; + uint16_t channel; + uint8_t reserved0[77]; + uint8_t ssid; + uint16_t devno; +} QEMU_PACKED; +typedef struct IplBlockQemuScsi IplBlockQemuScsi; + +union IplParameterBlock { + struct { + uint32_t len; + uint8_t reserved0[3]; + uint8_t version; + uint32_t blk0_len; + uint8_t pbt; + uint8_t flags; + uint16_t reserved01; + uint8_t loadparm[LOADPARM_LEN]; + union { + IplBlockCcw ccw; + IplBlockFcp fcp; + IPLBlockPV pv; + IplBlockQemuScsi scsi; + }; + } QEMU_PACKED; + struct { + uint8_t reserved1[110]; + uint16_t devno; + uint8_t reserved2[88]; + uint8_t reserved_ext[4096 - 200]; + } QEMU_PACKED; +} QEMU_PACKED; +typedef union IplParameterBlock IplParameterBlock; + +#endif diff --git a/pc-bios/s390-ccw/iplb.h b/pc-bios/s390-ccw/iplb.h index 3758698468..16643f5879 100644 --- a/pc-bios/s390-ccw/iplb.h +++ b/pc-bios/s390-ccw/iplb.h @@ -12,88 +12,14 @@ #ifndef IPLB_H #define IPLB_H =20 -#define LOADPARM_LEN 8 +#ifndef QEMU_PACKED +#define QEMU_PACKED __attribute__((packed)) +#endif =20 -struct IplBlockCcw { - uint8_t reserved0[85]; - uint8_t ssid; - uint16_t devno; - uint8_t vm_flags; - uint8_t reserved3[3]; - uint32_t vm_parm_len; - uint8_t nss_name[8]; - uint8_t vm_parm[64]; - uint8_t reserved4[8]; -} __attribute__ ((packed)); -typedef struct IplBlockCcw IplBlockCcw; - -struct IplBlockFcp { - uint8_t reserved1[305 - 1]; - uint8_t opt; - uint8_t reserved2[3]; - uint16_t reserved3; - uint16_t devno; - uint8_t reserved4[4]; - uint64_t wwpn; - uint64_t lun; - uint32_t bootprog; - uint8_t reserved5[12]; - uint64_t br_lba; - uint32_t scp_data_len; - uint8_t reserved6[260]; - uint8_t scp_data[]; -} __attribute__ ((packed)); -typedef struct IplBlockFcp IplBlockFcp; - -struct IplBlockQemuScsi { - uint32_t lun; - uint16_t target; - uint16_t channel; - uint8_t reserved0[77]; - uint8_t ssid; - uint16_t devno; -} __attribute__ ((packed)); -typedef struct IplBlockQemuScsi IplBlockQemuScsi; - -struct IplParameterBlock { - uint32_t len; - uint8_t reserved0[3]; - uint8_t version; - uint32_t blk0_len; - uint8_t pbt; - uint8_t flags; - uint16_t reserved01; - uint8_t loadparm[LOADPARM_LEN]; - union { - IplBlockCcw ccw; - IplBlockFcp fcp; - IplBlockQemuScsi scsi; - }; -} __attribute__ ((packed)); -typedef struct IplParameterBlock IplParameterBlock; - -extern IplParameterBlock iplb __attribute__((__aligned__(PAGE_SIZE))); - -#define QIPL_ADDRESS 0xcc - -/* Boot Menu flags */ -#define QIPL_FLAG_BM_OPTS_CMD 0x80 -#define QIPL_FLAG_BM_OPTS_ZIPL 0x40 - -/* - * This definition must be kept in sync with the definition - * in hw/s390x/ipl.h - */ -struct QemuIplParameters { - uint8_t qipl_flags; - uint8_t reserved1[3]; - uint64_t reserved2; - uint32_t boot_menu_timeout; - uint8_t reserved3[12]; -} __attribute__ ((packed)); -typedef struct QemuIplParameters QemuIplParameters; +#include =20 extern QemuIplParameters qipl; +extern IplParameterBlock iplb __attribute__((__aligned__(PAGE_SIZE))); =20 #define S390_IPL_TYPE_FCP 0x00 #define S390_IPL_TYPE_CCW 0x02 diff --git a/pc-bios/s390-ccw/Makefile b/pc-bios/s390-ccw/Makefile index 27cbb354af..db9e8f0892 100644 --- a/pc-bios/s390-ccw/Makefile +++ b/pc-bios/s390-ccw/Makefile @@ -3,7 +3,7 @@ all: build-all @true =20 include config-host.mak -CFLAGS =3D -O2 -g +CFLAGS =3D -O2 -g -I $(SRC_PATH)/../../include/hw/s390x/ipl MAKEFLAGS +=3D -rR =20 GIT_SUBMODULES =3D roms/SLOF --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689577; cv=none; d=zohomail.com; s=zohoarc; b=gUPyzte+GdWfWoy72IUDRy9Nolwc1CnC3BqUA9pGxRzIYaO+OZNQVwMXAaVAwoZekoul11SucMBPBdSeWg9rUyqpR7hJvX/Q8PFfQuIZED7udHR3NIr7P4BUFDqPwBmsAcjOqlDOSmj2HgKE845HoO9pkXIQ56MK0WJEZH/uxj0= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689577; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=5ksFdGwLKh71OF9zpSqA+eTrJlr0azBjVPlIbCU3kz8=; b=QBgRa6DqvvBdZoruYx9W9ONXq46CVaSfdovKYnVl8sPVYxHrecI5NMTnC1RzaofqvPNKaMGoNLSD1M2ozb9XZ04uIBHrFa8ag+A/DysC9zowXuKEVEFWOGzZuvf7rael+sq+52BJVpk1/x0J6Yb5EA5QlUDpefYTiz+PBwsVzLI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689577209172.39104536033983; Wed, 23 Oct 2024 06:19:37 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFS-0006Sm-Dl; Wed, 23 Oct 2024 09:18:02 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFP-0006Po-8E for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:59 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFM-0002Cq-Ul for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:58 -0400 Received: from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-584-9WZ-_by7O3mba77R0jUtHA-1; Wed, 23 Oct 2024 09:17:51 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 1EB4A1955E7D; Wed, 23 Oct 2024 13:17:50 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id F24C21956054; Wed, 23 Oct 2024 13:17:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689474; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=5ksFdGwLKh71OF9zpSqA+eTrJlr0azBjVPlIbCU3kz8=; b=Xo22Y8hd+WXwiUMUU+l3XQISeRnQzIHT8Se3Zv0XSAH9bwKrsScYbMw4oU2D3SWPWLJdrG WodOUmtEpylTfxropHwrkcYD+H7gRznKPNTB1ucZO4BMvEdHirVYjjLqYCz9lYwA7uZ01f Lbrqazprgp5SkJ3TX0oZY2BcOnYSbKE= X-MC-Unique: 9WZ-_by7O3mba77R0jUtHA-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 14/23] s390x: Add individual loadparm assignment to CCW device Date: Wed, 23 Oct 2024 15:17:01 +0200 Message-ID: <20241023131710.906748-15-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -23 X-Spam_score: -2.4 X-Spam_bar: -- X-Spam_report: (-2.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689578727116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Add a loadparm property to the VirtioCcwDevice object so that different loadparms can be defined on a per-device basis for CCW boot devices. The machine/global loadparm is still supported. If both a global and per-de= vice loadparm are defined, the per-device value will override the global value f= or that device, but any other devices that do not specify a per-device loadparm will still use the global loadparm. It is invalid to assign a loadparm to a non-boot device. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-15-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- hw/s390x/ccw-device.h | 2 ++ hw/s390x/ipl.h | 3 +- include/hw/s390x/ipl/qipl.h | 1 + hw/s390x/ccw-device.c | 46 +++++++++++++++++++++++++ hw/s390x/ipl.c | 68 ++++++++++++++++++++++--------------- hw/s390x/s390-virtio-ccw.c | 18 +--------- hw/s390x/sclp.c | 9 ++--- pc-bios/s390-ccw/main.c | 10 ++++-- 8 files changed, 102 insertions(+), 55 deletions(-) diff --git a/hw/s390x/ccw-device.h b/hw/s390x/ccw-device.h index 5feeb0ee7a..1e1737c0f3 100644 --- a/hw/s390x/ccw-device.h +++ b/hw/s390x/ccw-device.h @@ -26,6 +26,8 @@ struct CcwDevice { CssDevId dev_id; /* The actual busid of the virtual subchannel. */ CssDevId subch_id; + /* If set, use this loadparm value when device is boot target */ + uint8_t loadparm[8]; }; typedef struct CcwDevice CcwDevice; =20 diff --git a/hw/s390x/ipl.h b/hw/s390x/ipl.h index fa394c339d..b670bad551 100644 --- a/hw/s390x/ipl.h +++ b/hw/s390x/ipl.h @@ -21,7 +21,8 @@ =20 #define DIAG308_FLAGS_LP_VALID 0x80 =20 -int s390_ipl_set_loadparm(uint8_t *loadparm); +void s390_ipl_convert_loadparm(char *ascii_lp, uint8_t *ebcdic_lp); +void s390_ipl_fmt_loadparm(uint8_t *loadparm, char *str, Error **errp); void s390_ipl_update_diag308(IplParameterBlock *iplb); int s390_ipl_prepare_pv_header(Error **errp); int s390_ipl_pv_unpack(void); diff --git a/include/hw/s390x/ipl/qipl.h b/include/hw/s390x/ipl/qipl.h index 0ef04af027..b67d2ae061 100644 --- a/include/hw/s390x/ipl/qipl.h +++ b/include/hw/s390x/ipl/qipl.h @@ -18,6 +18,7 @@ =20 #define QIPL_ADDRESS 0xcc #define LOADPARM_LEN 8 +#define NO_LOADPARM "\0\0\0\0\0\0\0\0" =20 /* * The QEMU IPL Parameters will be stored at absolute address diff --git a/hw/s390x/ccw-device.c b/hw/s390x/ccw-device.c index 14c24e3890..230cc09e03 100644 --- a/hw/s390x/ccw-device.c +++ b/hw/s390x/ccw-device.c @@ -13,6 +13,10 @@ #include "ccw-device.h" #include "hw/qdev-properties.h" #include "qemu/module.h" +#include "ipl.h" +#include "qapi/visitor.h" +#include "qemu/ctype.h" +#include "qapi/error.h" =20 static void ccw_device_refill_ids(CcwDevice *dev) { @@ -37,10 +41,52 @@ static bool ccw_device_realize(CcwDevice *dev, Error **= errp) return true; } =20 +static void ccw_device_get_loadparm(Object *obj, Visitor *v, + const char *name, void *opaque, + Error **errp) +{ + CcwDevice *dev =3D CCW_DEVICE(obj); + char *str =3D g_strndup((char *) dev->loadparm, sizeof(dev->loadparm)); + + visit_type_str(v, name, &str, errp); + g_free(str); +} + +static void ccw_device_set_loadparm(Object *obj, Visitor *v, + const char *name, void *opaque, + Error **errp) +{ + CcwDevice *dev =3D CCW_DEVICE(obj); + char *val; + int index; + + index =3D object_property_get_int(obj, "bootindex", NULL); + + if (index < 0) { + error_setg(errp, "LOADPARM is only valid for boot devices!"); + } + + if (!visit_type_str(v, name, &val, errp)) { + return; + } + + s390_ipl_fmt_loadparm(dev->loadparm, val, errp); +} + +static const PropertyInfo ccw_loadparm =3D { + .name =3D "ccw_loadparm", + .description =3D "Up to 8 chars in set of [A-Za-z0-9. ] to pass" + " to the guest loader/kernel", + .get =3D ccw_device_get_loadparm, + .set =3D ccw_device_set_loadparm, +}; + static Property ccw_device_properties[] =3D { DEFINE_PROP_CSS_DEV_ID("devno", CcwDevice, devno), DEFINE_PROP_CSS_DEV_ID_RO("dev_id", CcwDevice, dev_id), DEFINE_PROP_CSS_DEV_ID_RO("subch_id", CcwDevice, subch_id), + DEFINE_PROP("loadparm", CcwDevice, loadparm, ccw_loadparm, + typeof(uint8_t[8])), DEFINE_PROP_END_OF_LIST(), }; =20 diff --git a/hw/s390x/ipl.c b/hw/s390x/ipl.c index 8c490eeb52..656996b500 100644 --- a/hw/s390x/ipl.c +++ b/hw/s390x/ipl.c @@ -34,6 +34,7 @@ #include "qemu/config-file.h" #include "qemu/cutils.h" #include "qemu/option.h" +#include "qemu/ctype.h" #include "standard-headers/linux/virtio_ids.h" =20 #define KERN_IMAGE_START 0x010000UL @@ -397,12 +398,43 @@ static CcwDevice *s390_get_ccw_device(DeviceState *de= v_st, int *devtype) return ccw_dev; } =20 +void s390_ipl_fmt_loadparm(uint8_t *loadparm, char *str, Error **errp) +{ + int i; + + /* Initialize the loadparm with spaces */ + memset(loadparm, ' ', LOADPARM_LEN); + for (i =3D 0; i < LOADPARM_LEN && str[i]; i++) { + uint8_t c =3D qemu_toupper(str[i]); /* mimic HMC */ + + if (qemu_isalnum(c) || c =3D=3D '.' || c =3D=3D ' ') { + loadparm[i] =3D c; + } else { + error_setg(errp, "LOADPARM: invalid character '%c' (ASCII 0x%0= 2x)", + c, c); + return; + } + } +} + +void s390_ipl_convert_loadparm(char *ascii_lp, uint8_t *ebcdic_lp) +{ + int i; + + /* Initialize the loadparm with EBCDIC spaces (0x40) */ + memset(ebcdic_lp, '@', LOADPARM_LEN); + for (i =3D 0; i < LOADPARM_LEN && ascii_lp[i]; i++) { + ebcdic_lp[i] =3D ascii2ebcdic[(uint8_t) ascii_lp[i]]; + } +} + static bool s390_gen_initial_iplb(S390IPLState *ipl) { DeviceState *dev_st; CcwDevice *ccw_dev =3D NULL; SCSIDevice *sd; int devtype; + uint8_t *lp; =20 dev_st =3D get_boot_device(0); if (dev_st) { @@ -413,6 +445,8 @@ static bool s390_gen_initial_iplb(S390IPLState *ipl) * Currently allow IPL only from CCW devices. */ if (ccw_dev) { + lp =3D ccw_dev->loadparm; + switch (devtype) { case CCW_DEVTYPE_SCSI: sd =3D SCSI_DEVICE(dev_st); @@ -445,40 +479,20 @@ static bool s390_gen_initial_iplb(S390IPLState *ipl) break; } =20 - if (!s390_ipl_set_loadparm(ipl->iplb.loadparm)) { - ipl->iplb.flags |=3D DIAG308_FLAGS_LP_VALID; + /* If the device loadparm is empty use the global machine loadparm= */ + if (memcmp(lp, NO_LOADPARM, 8) =3D=3D 0) { + lp =3D S390_CCW_MACHINE(qdev_get_machine())->loadparm; } =20 + s390_ipl_convert_loadparm((char *)lp, ipl->iplb.loadparm); + ipl->iplb.flags |=3D DIAG308_FLAGS_LP_VALID; + return true; } =20 return false; } =20 -int s390_ipl_set_loadparm(uint8_t *loadparm) -{ - MachineState *machine =3D MACHINE(qdev_get_machine()); - char *lp =3D object_property_get_str(OBJECT(machine), "loadparm", NULL= ); - - if (lp) { - int i; - - /* lp is an uppercase string without leading/embedded spaces */ - for (i =3D 0; i < 8 && lp[i]; i++) { - loadparm[i] =3D ascii2ebcdic[(uint8_t) lp[i]]; - } - - if (i < 8) { - memset(loadparm + i, 0x40, 8 - i); /* fill with EBCDIC spaces = */ - } - - g_free(lp); - return 0; - } - - return -1; -} - static bool is_virtio_ccw_device_of_type(IplParameterBlock *iplb, int virtio_id) { @@ -534,7 +548,7 @@ static void update_machine_ipl_properties(IplParameterB= lock *iplb) ascii_loadparm[i] =3D 0; object_property_set_str(machine, "loadparm", ascii_loadparm, &err); } else { - object_property_set_str(machine, "loadparm", "", &err); + object_property_set_str(machine, "loadparm", " ", &err); } if (err) { warn_report_err(err); diff --git a/hw/s390x/s390-virtio-ccw.c b/hw/s390x/s390-virtio-ccw.c index 529e53f308..fe03f716f3 100644 --- a/hw/s390x/s390-virtio-ccw.c +++ b/hw/s390x/s390-virtio-ccw.c @@ -722,28 +722,12 @@ static void machine_set_loadparm(Object *obj, Visitor= *v, { S390CcwMachineState *ms =3D S390_CCW_MACHINE(obj); char *val; - int i; =20 if (!visit_type_str(v, name, &val, errp)) { return; } =20 - for (i =3D 0; i < sizeof(ms->loadparm) && val[i]; i++) { - uint8_t c =3D qemu_toupper(val[i]); /* mimic HMC */ - - if (('A' <=3D c && c <=3D 'Z') || ('0' <=3D c && c <=3D '9') || (c= =3D=3D '.') || - (c =3D=3D ' ')) { - ms->loadparm[i] =3D c; - } else { - error_setg(errp, "LOADPARM: invalid character '%c' (ASCII 0x%0= 2x)", - c, c); - return; - } - } - - for (; i < sizeof(ms->loadparm); i++) { - ms->loadparm[i] =3D ' '; /* pad right with spaces */ - } + s390_ipl_fmt_loadparm(ms->loadparm, val, errp); } =20 static void ccw_machine_class_init(ObjectClass *oc, void *data) diff --git a/hw/s390x/sclp.c b/hw/s390x/sclp.c index e725dcd5fd..8757626b5c 100644 --- a/hw/s390x/sclp.c +++ b/hw/s390x/sclp.c @@ -110,7 +110,6 @@ static void read_SCP_info(SCLPDevice *sclp, SCCB *sccb) MachineState *machine =3D MACHINE(qdev_get_machine()); int cpu_count; int rnsize, rnmax; - IplParameterBlock *ipib =3D s390_ipl_get_iplb(); int required_len =3D SCCB_REQ_LEN(ReadInfo, machine->possible_cpus->le= n); int offset_cpu =3D s390_has_feat(S390_FEAT_EXTENDED_LENGTH_SCCB) ? offsetof(ReadInfo, entries) : @@ -171,12 +170,8 @@ static void read_SCP_info(SCLPDevice *sclp, SCCB *sccb) read_info->rnmax2 =3D cpu_to_be64(rnmax); } =20 - if (ipib && ipib->flags & DIAG308_FLAGS_LP_VALID) { - memcpy(&read_info->loadparm, &ipib->loadparm, - sizeof(read_info->loadparm)); - } else { - s390_ipl_set_loadparm(read_info->loadparm); - } + s390_ipl_convert_loadparm((char *)S390_CCW_MACHINE(machine)->loadparm, + read_info->loadparm); =20 sccb->h.response_code =3D cpu_to_be16(SCLP_RC_NORMAL_READ_COMPLETION); } diff --git a/pc-bios/s390-ccw/main.c b/pc-bios/s390-ccw/main.c index 34ef27d7a6..ab4709e16e 100644 --- a/pc-bios/s390-ccw/main.c +++ b/pc-bios/s390-ccw/main.c @@ -183,8 +183,14 @@ static void css_setup(void) static void boot_setup(void) { char lpmsg[] =3D "LOADPARM=3D[________]\n"; + have_iplb =3D store_iplb(&iplb); + + if (memcmp(iplb.loadparm, NO_LOADPARM, LOADPARM_LEN) !=3D 0) { + ebcdic_to_ascii((char *) iplb.loadparm, loadparm_str, LOADPARM_LEN= ); + } else { + sclp_get_loadparm_ascii(loadparm_str); + } =20 - sclp_get_loadparm_ascii(loadparm_str); memcpy(lpmsg + 10, loadparm_str, 8); puts(lpmsg); =20 @@ -193,8 +199,6 @@ static void boot_setup(void) * so we don't taint our decision-making process during a reboot. */ memset((char *)S390EP, 0, 6); - - have_iplb =3D store_iplb(&iplb); } =20 static bool find_boot_device(void) --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689516; cv=none; d=zohomail.com; s=zohoarc; b=IPkayq7vsktRjth/zG+hD2NAdeyEnGnl2x4kGCwhipPKOIwmMfjfLjZxRbc9Gt9bRtmqN29pJeqwKJZs1N8PSHAcA1n2W4N0CvUlF3GMC7hH74DDNOBsQF5qRhL6hHYYAk13UGDobdMjTHltNU8RIWO/D+w186rhLkdGRo0SWXM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689516; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=KBZV9fF5UzB1z18c6ueAP5BGjy15RQl8nQiHpuOeUfs=; b=hEGv03WB0TyXOVwSaNa0NI3OKNjB1VpmT1xBGvm9r5tJho0RODsH7PG+NBtCOBJIVJMf2MOaPdSGiKR/A6YEeCPa2vPrUswl4L84WmREVb8ong38ZPRowlEF3Y0vyEFzL3g9fbJYUil2fCYWB/V15WpO8hM8PvtjrTHQafptVqI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689516887934.5669258938718; Wed, 23 Oct 2024 06:18:36 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFX-000716-1K; Wed, 23 Oct 2024 09:18:07 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFP-0006Pc-6I for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:59 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFN-0002D4-7H for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:17:58 -0400 Received: from mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-640-ITcsrr_7OzCV8X76YPfV3Q-1; Wed, 23 Oct 2024 09:17:54 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 709D3194510F; Wed, 23 Oct 2024 13:17:52 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id D2A7119560AE; Wed, 23 Oct 2024 13:17:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689475; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=KBZV9fF5UzB1z18c6ueAP5BGjy15RQl8nQiHpuOeUfs=; b=TxrbtG5b4BDVvtP9m4kFjm/u7neiZYQxSp10EKaHwzrX/rwCRHGC6E+0l/OszmJVU5/ECz c/OiVrfKO51QlRd1i21xLhD46JgJQEU4/uudr7oiTLsRFGodQC95n/pBL/JEMK2Ap72BY6 vZtlCTAvkhA5QrSOI19n4l0dU5FhkSU= X-MC-Unique: ITcsrr_7OzCV8X76YPfV3Q-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 15/23] hw/s390x: Build an IPLB for each boot device Date: Wed, 23 Oct 2024 15:17:02 +0200 Message-ID: <20241023131710.906748-16-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -23 X-Spam_score: -2.4 X-Spam_bar: -- X-Spam_report: (-2.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689518334116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Build an IPLB for any device with a bootindex (up to a maximum of 8 devices= ). The IPLB chain is placed immediately before the BIOS in memory. Because this is not a fixed address, the location of the next IPLB and number of remaini= ng boot devices is stored in the QIPL global variable for possible later acces= s by the guest during IPL. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-16-jrossi@linux.ibm.com> [thuth: Fix endianness problem when accessing the qipl structure] Signed-off-by: Thomas Huth --- hw/s390x/ipl.h | 1 + include/hw/s390x/ipl/qipl.h | 4 +- hw/s390x/ipl.c | 129 ++++++++++++++++++++++++++++-------- 3 files changed, 105 insertions(+), 29 deletions(-) diff --git a/hw/s390x/ipl.h b/hw/s390x/ipl.h index b670bad551..54eb48fd6e 100644 --- a/hw/s390x/ipl.h +++ b/hw/s390x/ipl.h @@ -20,6 +20,7 @@ #include "qom/object.h" =20 #define DIAG308_FLAGS_LP_VALID 0x80 +#define MAX_BOOT_DEVS 8 /* Max number of devices that may have a bootindex= */ =20 void s390_ipl_convert_loadparm(char *ascii_lp, uint8_t *ebcdic_lp); void s390_ipl_fmt_loadparm(uint8_t *loadparm, char *str, Error **errp); diff --git a/include/hw/s390x/ipl/qipl.h b/include/hw/s390x/ipl/qipl.h index b67d2ae061..1da4f75aa8 100644 --- a/include/hw/s390x/ipl/qipl.h +++ b/include/hw/s390x/ipl/qipl.h @@ -32,7 +32,9 @@ struct QemuIplParameters { uint8_t reserved1[3]; uint64_t reserved2; uint32_t boot_menu_timeout; - uint8_t reserved3[12]; + uint8_t reserved3[2]; + uint16_t chain_len; + uint64_t next_iplb; } QEMU_PACKED; typedef struct QemuIplParameters QemuIplParameters; =20 diff --git a/hw/s390x/ipl.c b/hw/s390x/ipl.c index 656996b500..b9d741d0b0 100644 --- a/hw/s390x/ipl.c +++ b/hw/s390x/ipl.c @@ -56,6 +56,13 @@ static bool iplb_extended_needed(void *opaque) return ipl->iplbext_migration; } =20 +/* Place the IPLB chain immediately before the BIOS in memory */ +static uint64_t find_iplb_chain_addr(uint64_t bios_addr, uint16_t count) +{ + return (bios_addr & TARGET_PAGE_MASK) + - (count * sizeof(IplParameterBlock)); +} + static const VMStateDescription vmstate_iplb_extended =3D { .name =3D "ipl/iplb_extended", .version_id =3D 0, @@ -398,6 +405,17 @@ static CcwDevice *s390_get_ccw_device(DeviceState *dev= _st, int *devtype) return ccw_dev; } =20 +static uint64_t s390_ipl_map_iplb_chain(IplParameterBlock *iplb_chain) +{ + S390IPLState *ipl =3D get_ipl_device(); + uint16_t count =3D be16_to_cpu(ipl->qipl.chain_len); + uint64_t len =3D sizeof(IplParameterBlock) * count; + uint64_t chain_addr =3D find_iplb_chain_addr(ipl->bios_start_addr, cou= nt); + + cpu_physical_memory_write(chain_addr, iplb_chain, len); + return chain_addr; +} + void s390_ipl_fmt_loadparm(uint8_t *loadparm, char *str, Error **errp) { int i; @@ -428,54 +446,51 @@ void s390_ipl_convert_loadparm(char *ascii_lp, uint8_= t *ebcdic_lp) } } =20 -static bool s390_gen_initial_iplb(S390IPLState *ipl) +static bool s390_build_iplb(DeviceState *dev_st, IplParameterBlock *iplb) { - DeviceState *dev_st; + S390IPLState *ipl =3D get_ipl_device(); CcwDevice *ccw_dev =3D NULL; SCSIDevice *sd; int devtype; uint8_t *lp; =20 - dev_st =3D get_boot_device(0); - if (dev_st) { - ccw_dev =3D s390_get_ccw_device(dev_st, &devtype); - } - /* * Currently allow IPL only from CCW devices. */ + ccw_dev =3D s390_get_ccw_device(dev_st, &devtype); if (ccw_dev) { lp =3D ccw_dev->loadparm; =20 switch (devtype) { case CCW_DEVTYPE_SCSI: sd =3D SCSI_DEVICE(dev_st); - ipl->iplb.len =3D cpu_to_be32(S390_IPLB_MIN_QEMU_SCSI_LEN); - ipl->iplb.blk0_len =3D + iplb->len =3D cpu_to_be32(S390_IPLB_MIN_QEMU_SCSI_LEN); + iplb->blk0_len =3D cpu_to_be32(S390_IPLB_MIN_QEMU_SCSI_LEN - S390_IPLB_HEADER= _LEN); - ipl->iplb.pbt =3D S390_IPL_TYPE_QEMU_SCSI; - ipl->iplb.scsi.lun =3D cpu_to_be32(sd->lun); - ipl->iplb.scsi.target =3D cpu_to_be16(sd->id); - ipl->iplb.scsi.channel =3D cpu_to_be16(sd->channel); - ipl->iplb.scsi.devno =3D cpu_to_be16(ccw_dev->sch->devno); - ipl->iplb.scsi.ssid =3D ccw_dev->sch->ssid & 3; + iplb->pbt =3D S390_IPL_TYPE_QEMU_SCSI; + iplb->scsi.lun =3D cpu_to_be32(sd->lun); + iplb->scsi.target =3D cpu_to_be16(sd->id); + iplb->scsi.channel =3D cpu_to_be16(sd->channel); + iplb->scsi.devno =3D cpu_to_be16(ccw_dev->sch->devno); + iplb->scsi.ssid =3D ccw_dev->sch->ssid & 3; break; case CCW_DEVTYPE_VFIO: - ipl->iplb.len =3D cpu_to_be32(S390_IPLB_MIN_CCW_LEN); - ipl->iplb.pbt =3D S390_IPL_TYPE_CCW; - ipl->iplb.ccw.devno =3D cpu_to_be16(ccw_dev->sch->devno); - ipl->iplb.ccw.ssid =3D ccw_dev->sch->ssid & 3; + iplb->len =3D cpu_to_be32(S390_IPLB_MIN_CCW_LEN); + iplb->pbt =3D S390_IPL_TYPE_CCW; + iplb->ccw.devno =3D cpu_to_be16(ccw_dev->sch->devno); + iplb->ccw.ssid =3D ccw_dev->sch->ssid & 3; break; case CCW_DEVTYPE_VIRTIO_NET: + /* The S390IPLState netboot is true if ANY IPLB may use netboo= t */ ipl->netboot =3D true; /* Fall through to CCW_DEVTYPE_VIRTIO case */ case CCW_DEVTYPE_VIRTIO: - ipl->iplb.len =3D cpu_to_be32(S390_IPLB_MIN_CCW_LEN); - ipl->iplb.blk0_len =3D + iplb->len =3D cpu_to_be32(S390_IPLB_MIN_CCW_LEN); + iplb->blk0_len =3D cpu_to_be32(S390_IPLB_MIN_CCW_LEN - S390_IPLB_HEADER_LEN); - ipl->iplb.pbt =3D S390_IPL_TYPE_CCW; - ipl->iplb.ccw.devno =3D cpu_to_be16(ccw_dev->sch->devno); - ipl->iplb.ccw.ssid =3D ccw_dev->sch->ssid & 3; + iplb->pbt =3D S390_IPL_TYPE_CCW; + iplb->ccw.devno =3D cpu_to_be16(ccw_dev->sch->devno); + iplb->ccw.ssid =3D ccw_dev->sch->ssid & 3; break; } =20 @@ -484,8 +499,8 @@ static bool s390_gen_initial_iplb(S390IPLState *ipl) lp =3D S390_CCW_MACHINE(qdev_get_machine())->loadparm; } =20 - s390_ipl_convert_loadparm((char *)lp, ipl->iplb.loadparm); - ipl->iplb.flags |=3D DIAG308_FLAGS_LP_VALID; + s390_ipl_convert_loadparm((char *)lp, iplb->loadparm); + iplb->flags |=3D DIAG308_FLAGS_LP_VALID; =20 return true; } @@ -493,6 +508,62 @@ static bool s390_gen_initial_iplb(S390IPLState *ipl) return false; } =20 +static bool s390_init_all_iplbs(S390IPLState *ipl) +{ + int iplb_num =3D 0; + IplParameterBlock iplb_chain[7]; + DeviceState *dev_st =3D get_boot_device(0); + Object *machine =3D qdev_get_machine(); + + /* + * Parse the boot devices. Generate an IPLB for only the first boot d= evice + * which will later be set with DIAG308. + */ + if (!dev_st) { + ipl->qipl.chain_len =3D 0; + return false; + } + + /* If no machine loadparm was defined fill it with spaces */ + if (memcmp(S390_CCW_MACHINE(machine)->loadparm, NO_LOADPARM, 8) =3D=3D= 0) { + object_property_set_str(machine, "loadparm", " ", NULL); + } + + iplb_num =3D 1; + s390_build_iplb(dev_st, &ipl->iplb); + + /* Index any fallback boot devices */ + while (get_boot_device(iplb_num)) { + iplb_num++; + } + + if (iplb_num > MAX_BOOT_DEVS) { + warn_report("Excess boot devices defined! %d boot devices found, " + "but only the first %d will be considered.", + iplb_num, MAX_BOOT_DEVS); + + iplb_num =3D MAX_BOOT_DEVS; + } + + ipl->qipl.chain_len =3D cpu_to_be16(iplb_num - 1); + + /* + * Build fallback IPLBs for any boot devices above index 0, up to a + * maximum amount as defined in ipl.h + */ + if (iplb_num > 1) { + /* Start at 1 because the IPLB for boot index 0 is not chained */ + for (int i =3D 1; i < iplb_num; i++) { + dev_st =3D get_boot_device(i); + s390_build_iplb(dev_st, &iplb_chain[i - 1]); + } + + ipl->qipl.next_iplb =3D cpu_to_be64(s390_ipl_map_iplb_chain(iplb_c= hain)); + } + + return iplb_num; +} + static bool is_virtio_ccw_device_of_type(IplParameterBlock *iplb, int virtio_id) { @@ -620,7 +691,7 @@ void s390_ipl_reset_request(CPUState *cs, enum s390_res= et reset_type) * this is the original boot device's SCSI * so restore IPL parameter info from it */ - ipl->iplb_valid =3D s390_gen_initial_iplb(ipl); + ipl->iplb_valid =3D s390_build_iplb(get_boot_device(0), &ipl->= iplb); } } if (reset_type =3D=3D S390_RESET_MODIFIED_CLEAR || @@ -714,7 +785,9 @@ void s390_ipl_prepare_cpu(S390CPU *cpu) if (!ipl->kernel || ipl->iplb_valid) { cpu->env.psw.addr =3D ipl->bios_start_addr; if (!ipl->iplb_valid) { - ipl->iplb_valid =3D s390_gen_initial_iplb(ipl); + ipl->iplb_valid =3D s390_init_all_iplbs(ipl); + } else { + ipl->qipl.chain_len =3D 0; } } s390_ipl_set_boot_menu(ipl); --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689516; cv=none; d=zohomail.com; s=zohoarc; b=I1jDzL6AEkKSvy+5gPmy5Iorsr96gqDPSIM29/dniXvtkF0HPRXD4U6IoP8ryCfnU9xkhMpDktC6jpYuKr3EFInTsHbbZ3uLhPL2exqzFE5XsZRO6O0u87zrDYCV4yWLgxoM0C9Y/7N2UAgo3kHUwCfpBx6UM0IpiFEIRkijPDE= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689516; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=jnSag/ESXvrfKRLFitAmPOPHfiHQiYP3Fql3ksDlyr4=; b=kPqy/a4zyIfPn88leqyQ7G772UYZynIvhnTWfDGjzjhMPDDXnakQaR2H1F8EdozyuCqJFvf0QzJjkxgX15ocaxFzfn7bV5EG+opIMV2Mam/x0ElX44VtKFfkNCYXWpIxe92qmbPwet9sS7lLkbg2vY8TA2hduaZVVx7opFCrX+U= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689516364370.6135116000446; Wed, 23 Oct 2024 06:18:36 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFa-0007EH-Qd; Wed, 23 Oct 2024 09:18:10 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFX-00073H-4y for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:07 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFU-0002Dx-TK for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:06 -0400 Received: from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-235-JvcdxyiAOTW5o8ofNmgxuw-1; Wed, 23 Oct 2024 09:18:02 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 982AD18F6623; Wed, 23 Oct 2024 13:17:55 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id ED5441955EA4; Wed, 23 Oct 2024 13:17:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689484; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=jnSag/ESXvrfKRLFitAmPOPHfiHQiYP3Fql3ksDlyr4=; b=V6efnrq9XMygU+aO3q5tsZaJPsAA2Jr1j3n+P3SW7vPnt1x6mMu6jPsQmHswlW90lPheT/ lblJC7RD8QQqCBJ308S69E9jgTzmQdQyAqn8UjFNS1Gsw376VYTxfRAeb4+5Tdd/deTMsM l+FN83tHk8HsRobfs67XZesY6ycxV2I= X-MC-Unique: JvcdxyiAOTW5o8ofNmgxuw-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 16/23] s390x: Rebuild IPLB for SCSI device directly from DIAG308 Date: Wed, 23 Oct 2024 15:17:03 +0200 Message-ID: <20241023131710.906748-17-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689518326116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Because virtio-scsi type devices use a non-architected IPLB pbt code they c= annot be set and stored normally. Instead, the IPLB must be rebuilt during re-ipl. As s390x does not natively support multiple boot devices, the devno field is used to store the position in the boot order for the device. Handling the rebuild as part of DIAG308 removes the need to check the devic= es for invalid IPLBs later in the IPL. Signed-off-by: Jared Rossi Acked-by: Thomas Huth Message-ID: <20241020012953.1380075-17-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- hw/s390x/ipl.h | 11 ++++-- include/hw/s390x/ipl/qipl.h | 3 +- hw/s390x/ipl.c | 74 ++++++------------------------------- pc-bios/s390-ccw/jump2ipl.c | 11 ++++-- target/s390x/diag.c | 9 ++++- 5 files changed, 38 insertions(+), 70 deletions(-) diff --git a/hw/s390x/ipl.h b/hw/s390x/ipl.h index 54eb48fd6e..d7d0b7bfd2 100644 --- a/hw/s390x/ipl.h +++ b/hw/s390x/ipl.h @@ -24,6 +24,7 @@ =20 void s390_ipl_convert_loadparm(char *ascii_lp, uint8_t *ebcdic_lp); void s390_ipl_fmt_loadparm(uint8_t *loadparm, char *str, Error **errp); +void s390_rebuild_iplb(uint16_t index, IplParameterBlock *iplb); void s390_ipl_update_diag308(IplParameterBlock *iplb); int s390_ipl_prepare_pv_header(Error **errp); int s390_ipl_pv_unpack(void); @@ -65,7 +66,8 @@ struct S390IPLState { bool enforce_bios; bool iplb_valid; bool iplb_valid_pv; - bool netboot; + bool rebuilt_iplb; + uint16_t iplb_index; /* reset related properties don't have to be migrated or reset */ enum s390_reset reset_type; int reset_cpu_index; @@ -172,11 +174,14 @@ static inline bool iplb_valid_pv(IplParameterBlock *i= plb) =20 static inline bool iplb_valid(IplParameterBlock *iplb) { + uint32_t len =3D be32_to_cpu(iplb->len); + switch (iplb->pbt) { case S390_IPL_TYPE_FCP: - return be32_to_cpu(iplb->len) >=3D S390_IPLB_MIN_FCP_LEN; + return len >=3D S390_IPLB_MIN_FCP_LEN; case S390_IPL_TYPE_CCW: - return be32_to_cpu(iplb->len) >=3D S390_IPLB_MIN_CCW_LEN; + return len >=3D S390_IPLB_MIN_CCW_LEN; + case S390_IPL_TYPE_QEMU_SCSI: default: return false; } diff --git a/include/hw/s390x/ipl/qipl.h b/include/hw/s390x/ipl/qipl.h index 1da4f75aa8..6824391111 100644 --- a/include/hw/s390x/ipl/qipl.h +++ b/include/hw/s390x/ipl/qipl.h @@ -29,7 +29,8 @@ */ struct QemuIplParameters { uint8_t qipl_flags; - uint8_t reserved1[3]; + uint8_t index; + uint8_t reserved1[2]; uint64_t reserved2; uint32_t boot_menu_timeout; uint8_t reserved3[2]; diff --git a/hw/s390x/ipl.c b/hw/s390x/ipl.c index b9d741d0b0..dc02b0fdda 100644 --- a/hw/s390x/ipl.c +++ b/hw/s390x/ipl.c @@ -448,7 +448,6 @@ void s390_ipl_convert_loadparm(char *ascii_lp, uint8_t = *ebcdic_lp) =20 static bool s390_build_iplb(DeviceState *dev_st, IplParameterBlock *iplb) { - S390IPLState *ipl =3D get_ipl_device(); CcwDevice *ccw_dev =3D NULL; SCSIDevice *sd; int devtype; @@ -481,9 +480,6 @@ static bool s390_build_iplb(DeviceState *dev_st, IplPar= ameterBlock *iplb) iplb->ccw.ssid =3D ccw_dev->sch->ssid & 3; break; case CCW_DEVTYPE_VIRTIO_NET: - /* The S390IPLState netboot is true if ANY IPLB may use netboo= t */ - ipl->netboot =3D true; - /* Fall through to CCW_DEVTYPE_VIRTIO case */ case CCW_DEVTYPE_VIRTIO: iplb->len =3D cpu_to_be32(S390_IPLB_MIN_CCW_LEN); iplb->blk0_len =3D @@ -508,6 +504,16 @@ static bool s390_build_iplb(DeviceState *dev_st, IplPa= rameterBlock *iplb) return false; } =20 +void s390_rebuild_iplb(uint16_t dev_index, IplParameterBlock *iplb) +{ + S390IPLState *ipl =3D get_ipl_device(); + uint16_t index; + index =3D ipl->rebuilt_iplb ? ipl->iplb_index : dev_index; + + ipl->rebuilt_iplb =3D s390_build_iplb(get_boot_device(index), iplb); + ipl->iplb_index =3D index; +} + static bool s390_init_all_iplbs(S390IPLState *ipl) { int iplb_num =3D 0; @@ -564,44 +570,6 @@ static bool s390_init_all_iplbs(S390IPLState *ipl) return iplb_num; } =20 -static bool is_virtio_ccw_device_of_type(IplParameterBlock *iplb, - int virtio_id) -{ - uint8_t cssid; - uint8_t ssid; - uint16_t devno; - uint16_t schid; - SubchDev *sch =3D NULL; - - if (iplb->pbt !=3D S390_IPL_TYPE_CCW) { - return false; - } - - devno =3D be16_to_cpu(iplb->ccw.devno); - ssid =3D iplb->ccw.ssid & 3; - - for (schid =3D 0; schid < MAX_SCHID; schid++) { - for (cssid =3D 0; cssid < MAX_CSSID; cssid++) { - sch =3D css_find_subch(1, cssid, ssid, schid); - - if (sch && sch->devno =3D=3D devno) { - return sch->id.cu_model =3D=3D virtio_id; - } - } - } - return false; -} - -static bool is_virtio_net_device(IplParameterBlock *iplb) -{ - return is_virtio_ccw_device_of_type(iplb, VIRTIO_ID_NET); -} - -static bool is_virtio_scsi_device(IplParameterBlock *iplb) -{ - return is_virtio_ccw_device_of_type(iplb, VIRTIO_ID_SCSI); -} - static void update_machine_ipl_properties(IplParameterBlock *iplb) { Object *machine =3D qdev_get_machine(); @@ -641,7 +609,7 @@ void s390_ipl_update_diag308(IplParameterBlock *iplb) ipl->iplb =3D *iplb; ipl->iplb_valid =3D true; } - ipl->netboot =3D is_virtio_net_device(iplb); + update_machine_ipl_properties(iplb); } =20 @@ -668,32 +636,14 @@ IplParameterBlock *s390_ipl_get_iplb(void) void s390_ipl_reset_request(CPUState *cs, enum s390_reset reset_type) { S390IPLState *ipl =3D get_ipl_device(); - if (reset_type =3D=3D S390_RESET_EXTERNAL || reset_type =3D=3D S390_RE= SET_REIPL) { /* use CPU 0 for full resets */ ipl->reset_cpu_index =3D 0; } else { ipl->reset_cpu_index =3D cs->cpu_index; } - ipl->reset_type =3D reset_type; =20 - if (reset_type =3D=3D S390_RESET_REIPL && - ipl->iplb_valid && - !ipl->netboot && - ipl->iplb.pbt =3D=3D S390_IPL_TYPE_CCW && - is_virtio_scsi_device(&ipl->iplb)) { - CcwDevice *ccw_dev =3D s390_get_ccw_device(get_boot_device(0), NUL= L); - - if (ccw_dev && - cpu_to_be16(ccw_dev->sch->devno) =3D=3D ipl->iplb.ccw.devno && - (ccw_dev->sch->ssid & 3) =3D=3D ipl->iplb.ccw.ssid) { - /* - * this is the original boot device's SCSI - * so restore IPL parameter info from it - */ - ipl->iplb_valid =3D s390_build_iplb(get_boot_device(0), &ipl->= iplb); - } - } + ipl->reset_type =3D reset_type; if (reset_type =3D=3D S390_RESET_MODIFIED_CLEAR || reset_type =3D=3D S390_RESET_LOAD_NORMAL || reset_type =3D=3D S390_RESET_PV) { diff --git a/pc-bios/s390-ccw/jump2ipl.c b/pc-bios/s390-ccw/jump2ipl.c index 8db1764ff3..99d18947d1 100644 --- a/pc-bios/s390-ccw/jump2ipl.c +++ b/pc-bios/s390-ccw/jump2ipl.c @@ -39,10 +39,15 @@ int jump_to_IPL_code(uint64_t address) write_subsystem_identification(); write_iplb_location(); =20 - /* prevent unknown IPL types in the guest */ + /* + * The IPLB for QEMU SCSI type devices must be rebuilt during re-ipl. = The + * iplb.devno is set to the boot position of the target SCSI device. + */ if (iplb.pbt =3D=3D S390_IPL_TYPE_QEMU_SCSI) { - iplb.pbt =3D S390_IPL_TYPE_CCW; - set_iplb(&iplb); + iplb.devno =3D qipl.index; + if (!set_iplb(&iplb)) { + panic("Failed to set IPLB"); + } } =20 /* diff --git a/target/s390x/diag.c b/target/s390x/diag.c index 27ffd48576..a1fd54ddac 100644 --- a/target/s390x/diag.c +++ b/target/s390x/diag.c @@ -133,7 +133,14 @@ void handle_diag_308(CPUS390XState *env, uint64_t r1, = uint64_t r3, uintptr_t ra) =20 valid =3D subcode =3D=3D DIAG308_PV_SET ? iplb_valid_pv(iplb) : ip= lb_valid(iplb); if (!valid) { - env->regs[r1 + 1] =3D DIAG_308_RC_INVALID; + if (subcode =3D=3D DIAG308_SET && iplb->pbt =3D=3D S390_IPL_TY= PE_QEMU_SCSI) { + s390_rebuild_iplb(iplb->devno, iplb); + s390_ipl_update_diag308(iplb); + env->regs[r1 + 1] =3D DIAG_308_RC_OK; + } else { + env->regs[r1 + 1] =3D DIAG_308_RC_INVALID; + } + goto out; } =20 --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689592; cv=none; d=zohomail.com; s=zohoarc; b=H1ZKaRBCW4cPwMFlAgrVt9xkGm9G2E55JxQaMIB6epYzNNEOAOMisf/vN7TiZ0C1wR5o4V632vrWgio/S4i65lZC0F+zzu+XJhGnqjUw19UNJbLePhtEdK6o+Z/G9YRLgUmBrQ9rZOmSfR7FJRiifQEs55Fn/x5wrk0bOy53Aes= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689592; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=825r/da9W6GGN0H9O12QX0RuyP/yjTEZV3Q5HTxKcWc=; b=Wp00ssl3SqNxe9WuIGec/ZpsEmKGrAJA4IYw7OtEKcgnTazG39rYfzsrL7jeqgBGwWUomQo5oqB88LItM4rsz87z3iwwYwbQyEnI134P6iSg1BD7/7JmrZHehZS9vivGi+D7A1yQWjTBQoB/phkn2mQBjx9xmpz6bOsNfax3n4k= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 172968959195576.82997115400337; Wed, 23 Oct 2024 06:19:51 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFy-0007YH-8u; Wed, 23 Oct 2024 09:18:34 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFb-0007GZ-Sk for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:11 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFa-0002EN-42 for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:11 -0400 Received: from mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-7-z8JzvBTMMOGBbIBxtX5JKg-1; Wed, 23 Oct 2024 09:18:05 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id C29331936118; Wed, 23 Oct 2024 13:17:57 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 016BE196584F; Wed, 23 Oct 2024 13:17:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689489; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=825r/da9W6GGN0H9O12QX0RuyP/yjTEZV3Q5HTxKcWc=; b=h/UfHIo/HkWj3O83dEMkE3AuBC7+O4+jWaCf/MxtLf/VSaCOtUkRhqvMnAuQPVzJNYlJAF 6JtYghbw7G02PSDyveXqg7KeRHpO41Kr6JmB9nPXlPBO2yQt7MJKxjT7nexKqmKw6Q72BF SUKuTKlXi4c5uFdSpJ7QhN/jS2oebec= X-MC-Unique: z8JzvBTMMOGBbIBxtX5JKg-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 17/23] pc-bios/s390x: Enable multi-device boot loop Date: Wed, 23 Oct 2024 15:17:04 +0200 Message-ID: <20241023131710.906748-18-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689592652116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Allow attempts to boot from multiple IPL devices. If the first device fails= to IPL, select the pre-built IPLB for the next device in the boot order and at= tempt to IPL from it. Continue this process until IPL is successful or there are = no devices left to try. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-18-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/iplb.h | 24 ++++++++++++++++++++ pc-bios/s390-ccw/jump2ipl.c | 7 +++--- pc-bios/s390-ccw/main.c | 45 +++++++++++++++++++++++-------------- pc-bios/s390-ccw/netmain.c | 2 +- 4 files changed, 57 insertions(+), 21 deletions(-) diff --git a/pc-bios/s390-ccw/iplb.h b/pc-bios/s390-ccw/iplb.h index 16643f5879..08f259ff31 100644 --- a/pc-bios/s390-ccw/iplb.h +++ b/pc-bios/s390-ccw/iplb.h @@ -17,9 +17,11 @@ #endif =20 #include +#include =20 extern QemuIplParameters qipl; extern IplParameterBlock iplb __attribute__((__aligned__(PAGE_SIZE))); +extern bool have_iplb; =20 #define S390_IPL_TYPE_FCP 0x00 #define S390_IPL_TYPE_CCW 0x02 @@ -49,4 +51,26 @@ static inline bool set_iplb(IplParameterBlock *iplb) return manage_iplb(iplb, false); } =20 +/* + * The IPL started on the device, but failed in some way. If the IPLB cha= in + * still has more devices left to try, use the next device in order. + */ +static inline bool load_next_iplb(void) +{ + IplParameterBlock *next_iplb; + + if (qipl.chain_len < 1) { + return false; + } + + qipl.index++; + next_iplb =3D (IplParameterBlock *) qipl.next_iplb; + memcpy(&iplb, next_iplb, sizeof(IplParameterBlock)); + + qipl.chain_len--; + qipl.next_iplb =3D qipl.next_iplb + sizeof(IplParameterBlock); + + return true; +} + #endif /* IPLB_H */ diff --git a/pc-bios/s390-ccw/jump2ipl.c b/pc-bios/s390-ccw/jump2ipl.c index 99d18947d1..86321d0f46 100644 --- a/pc-bios/s390-ccw/jump2ipl.c +++ b/pc-bios/s390-ccw/jump2ipl.c @@ -45,9 +45,10 @@ int jump_to_IPL_code(uint64_t address) */ if (iplb.pbt =3D=3D S390_IPL_TYPE_QEMU_SCSI) { iplb.devno =3D qipl.index; - if (!set_iplb(&iplb)) { - panic("Failed to set IPLB"); - } + } + + if (have_iplb && !set_iplb(&iplb)) { + panic("Failed to set IPLB"); } =20 /* diff --git a/pc-bios/s390-ccw/main.c b/pc-bios/s390-ccw/main.c index ab4709e16e..a4d1c05aac 100644 --- a/pc-bios/s390-ccw/main.c +++ b/pc-bios/s390-ccw/main.c @@ -23,7 +23,7 @@ static SubChannelId blk_schid =3D { .one =3D 1 }; static char loadparm_str[LOADPARM_LEN + 1]; QemuIplParameters qipl; IplParameterBlock iplb __attribute__((__aligned__(PAGE_SIZE))); -static bool have_iplb; +bool have_iplb; static uint16_t cutype; LowCore *lowcore; /* Yes, this *is* a pointer to address 0 */ =20 @@ -55,6 +55,12 @@ void write_iplb_location(void) } } =20 +static void copy_qipl(void) +{ + QemuIplParameters *early_qipl =3D (QemuIplParameters *)QIPL_ADDRESS; + memcpy(&qipl, early_qipl, sizeof(QemuIplParameters)); +} + unsigned int get_loadparm_index(void) { return atoi(loadparm_str); @@ -152,6 +158,7 @@ static void menu_setup(void) =20 /* If loadparm was set to any other value, then do not enable menu */ if (memcmp(loadparm_str, LOADPARM_EMPTY, LOADPARM_LEN) !=3D 0) { + menu_set_parms(qipl.qipl_flags & ~BOOT_MENU_FLAG_MASK, 0); return; } =20 @@ -183,7 +190,6 @@ static void css_setup(void) static void boot_setup(void) { char lpmsg[] =3D "LOADPARM=3D[________]\n"; - have_iplb =3D store_iplb(&iplb); =20 if (memcmp(iplb.loadparm, NO_LOADPARM, LOADPARM_LEN) !=3D 0) { ebcdic_to_ascii((char *) iplb.loadparm, loadparm_str, LOADPARM_LEN= ); @@ -191,6 +197,10 @@ static void boot_setup(void) sclp_get_loadparm_ascii(loadparm_str); } =20 + if (have_iplb) { + menu_setup(); + } + memcpy(lpmsg + 10, loadparm_str, 8); puts(lpmsg); =20 @@ -208,6 +218,7 @@ static bool find_boot_device(void) =20 switch (iplb.pbt) { case S390_IPL_TYPE_CCW: + vdev->scsi_device_selected =3D false; debug_print_int("device no. ", iplb.ccw.devno); blk_schid.ssid =3D iplb.ccw.ssid & 0x3; debug_print_int("ssid ", blk_schid.ssid); @@ -231,15 +242,8 @@ static bool find_boot_device(void) static int virtio_setup(void) { VDev *vdev =3D virtio_get_device(); - QemuIplParameters *early_qipl =3D (QemuIplParameters *)QIPL_ADDRESS; int ret; =20 - memcpy(&qipl, early_qipl, sizeof(QemuIplParameters)); - - if (have_iplb) { - menu_setup(); - } - switch (vdev->senseid.cu_model) { case VIRTIO_ID_NET: puts("Network boot device detected"); @@ -271,10 +275,9 @@ static void ipl_boot_device(void) dasd_ipl(blk_schid, cutype); break; case CU_TYPE_VIRTIO: - if (virtio_setup()) { - return; /* Only returns in case of errors */ + if (virtio_setup() =3D=3D 0) { + zipl_load(); } - zipl_load(); break; default: printf("Attempting to boot from unexpected device type 0x%X\n", cu= type); @@ -307,14 +310,22 @@ static void probe_boot_device(void) =20 void main(void) { + copy_qipl(); sclp_setup(); css_setup(); - boot_setup(); - if (have_iplb && find_boot_device()) { - ipl_boot_device(); - } else { + have_iplb =3D store_iplb(&iplb); + if (!have_iplb) { probe_boot_device(); } =20 - panic("Failed to IPL. Halting..."); + while (have_iplb) { + boot_setup(); + if (have_iplb && find_boot_device()) { + ipl_boot_device(); + } + have_iplb =3D load_next_iplb(); + } + + panic("No suitable device for IPL. Halting..."); + } diff --git a/pc-bios/s390-ccw/netmain.c b/pc-bios/s390-ccw/netmain.c index d1a6c9a91c..e46e470db4 100644 --- a/pc-bios/s390-ccw/netmain.c +++ b/pc-bios/s390-ccw/netmain.c @@ -478,7 +478,7 @@ static bool virtio_setup(void) */ enable_mss_facility(); =20 - if (store_iplb(&iplb)) { + if (have_iplb || store_iplb(&iplb)) { IPL_assert(iplb.pbt =3D=3D S390_IPL_TYPE_CCW, "IPL_TYPE_CCW expect= ed"); dev_no =3D iplb.ccw.devno; debug_print_int("device no. ", dev_no); --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689531; cv=none; d=zohomail.com; s=zohoarc; b=nPjVFbz2uRTQcpOLtygYloiH9KLRNj/I43Js759Y0K77IsXzA8oiDCRR4tRpkPAdns6/gOmrGR2keWrSeuv1MX59X7xTuG35hk40HndMw1XeP0DN2WNs/p/KCdtD/s4p9WoDFeMre9d/eyJ3sCm4Czbeq+kK8/a/ZfNetSz2Tr8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689531; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=ZOrPBPZ2cEU3IJjuze0yE0HxYzK5ZQRQxdoBIuqI4Wk=; b=Ix5qn8rEBSrMTLt90ZkTl7FAeAwMT0SazwGfye2YuT7O0ruZNsrX7Moe4gfuAQUW/z1JiOXNi/HxOk17juYVsRme48qHKFCASM6ocrr8vpk5AhKVfOxFbxGh/X1vxL9v5fH+f8krRx1aVnOPJWN0UB8bff4IRUzXQzhHPh5criM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689531618934.7893176431278; Wed, 23 Oct 2024 06:18:51 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFk-0007NF-Lf; Wed, 23 Oct 2024 09:18:22 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFa-0007Cc-5S for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:10 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFX-0002EF-SI for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:09 -0400 Received: from mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-503-kf-Ce2NbMraSxvZVsGB6xw-1; Wed, 23 Oct 2024 09:18:05 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-02.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 5BF711937227; Wed, 23 Oct 2024 13:18:00 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 7B09C1954B10; Wed, 23 Oct 2024 13:17:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689487; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ZOrPBPZ2cEU3IJjuze0yE0HxYzK5ZQRQxdoBIuqI4Wk=; b=Bp/soMaPjOriyAr22LDDDKqU5YO9YLJaEkntKsgoBFfEffIQDB3fdlIFtDA+aJ1O/a7VJ+ jxOl6Wj4s82l19n3LHHNLIJYGL3fl8UxYfnONvSn0F+38SsXSvZYz2+KXgwmsdO4eaS6kS wYeePmh4cmwQIFiq6K/aPSiFL3pm1+0= X-MC-Unique: kf-Ce2NbMraSxvZVsGB6xw-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 18/23] docs/system: Update documentation for s390x IPL Date: Wed, 23 Oct 2024 15:17:05 +0200 Message-ID: <20241023131710.906748-19-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689540397116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Update docs to show that s390x PC BIOS can support more than one boot devic= e. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-19-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- docs/system/bootindex.rst | 7 ++++--- docs/system/s390x/bootdevices.rst | 9 ++++++--- 2 files changed, 10 insertions(+), 6 deletions(-) diff --git a/docs/system/bootindex.rst b/docs/system/bootindex.rst index 8b057f812f..988f7b3beb 100644 --- a/docs/system/bootindex.rst +++ b/docs/system/bootindex.rst @@ -49,10 +49,11 @@ Limitations ----------- =20 Some firmware has limitations on which devices can be considered for -booting. For instance, the PC BIOS boot specification allows only one -disk to be bootable. If boot from disk fails for some reason, the BIOS +booting. For instance, the x86 PC BIOS boot specification allows only one +disk to be bootable. If boot from disk fails for some reason, the x86 BIOS won't retry booting from other disk. It can still try to boot from -floppy or net, though. +floppy or net, though. In the case of s390x BIOS, the BIOS will try up to +8 total devices, any number of which may be disks. =20 Sometimes, firmware cannot map the device path QEMU wants firmware to boot from to a boot method. It doesn't happen for devices the firmware diff --git a/docs/system/s390x/bootdevices.rst b/docs/system/s390x/bootdevi= ces.rst index c97efb8fc0..1a1a764c1c 100644 --- a/docs/system/s390x/bootdevices.rst +++ b/docs/system/s390x/bootdevices.rst @@ -6,9 +6,7 @@ Booting with bootindex parameter =20 For classical mainframe guests (i.e. LPAR or z/VM installations), you alwa= ys have to explicitly specify the disk where you want to boot from (or "IPL" = from, -in s390x-speak -- IPL means "Initial Program Load"). In particular, there = can -also be only one boot device according to the architecture specification, = thus -specifying multiple boot devices is not possible (yet). +in s390x-speak -- IPL means "Initial Program Load"). =20 So for booting an s390x guest in QEMU, you should always mark the device where you want to boot from with the ``bootindex`` property, for @@ -17,6 +15,11 @@ example:: qemu-system-s390x -drive if=3Dnone,id=3Ddr1,file=3Dguest.qcow2 \ -device virtio-blk,drive=3Ddr1,bootindex=3D1 =20 +Multiple devices may have a bootindex. The lowest bootindex is assigned to= the +device to IPL first. If the IPL fails for the first, the device with the = second +lowest bootindex will be tried and so on until IPL is successful or there = are no +remaining boot devices to try. + For booting from a CD-ROM ISO image (which needs to include El-Torito boot information in order to be bootable), it is recommended to specify a ``scs= i-cd`` device, for example like this:: --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689636; cv=none; d=zohomail.com; s=zohoarc; b=ncL1ZtDfusKUx6ZeElPDgYtAJurfPDKz2B1SRGTrEL0b60Tu3Z2UAhCD0OvKdWAHIUIGqjHuVB42iB1tESBTDpIS9WOH2fPuMHyFaIAVy0OdaSNLZS+S3OC+yCr3jme8t6SNO6O/wxV+8njU5jn4Ff+bS7oEIfy/uagUaZUzVeA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689636; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=o7Xdq2MTkGp0eGQVrGv94zTNIl5BzH+CbbEPfqGYkj4=; b=GWPRMMTM6Zj0wE2QupGpNod40T+asxt8jXjqO6BvudEwEPz4A8xKB2nYnDpsXHbGCkwxHugjzYVFrettOAbmMWp22vo5hq32iOQ/9SmLZvWiBQZjDBO7W46OBTGy5XzTMnFtwWCFpa/o/BrO8lhxAaVkIu/ay1goOjJuBwx5MPM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 172968963600870.83367927631946; Wed, 23 Oct 2024 06:20:36 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bG1-0007je-S7; Wed, 23 Oct 2024 09:18:38 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFf-0007Ma-HU for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:15 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFc-0002FW-Md for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:14 -0400 Received: from mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-520-FRd9asa-O7evNAu_366XBw-1; Wed, 23 Oct 2024 09:18:10 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id BB6B51955BE1; Wed, 23 Oct 2024 13:18:02 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id E570819560AE; Wed, 23 Oct 2024 13:18:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689491; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=o7Xdq2MTkGp0eGQVrGv94zTNIl5BzH+CbbEPfqGYkj4=; b=Xzxmcbc4k+BRbLELmeR0p2tm3rR1qe6SAnJHsfz1WloDFoDRBOOSgBGzdYekjAbgAtySYj 6XirLf8soOMgcIFS2UflF27AOeh0mJo1/AL5I+a4pH+PSWRKMc9O7b/f0mGCz4Eb4XlaQU g5z5ITDT2p0u0zWVCVvqipAh2uxQmfU= X-MC-Unique: FRd9asa-O7evNAu_366XBw-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jared Rossi Subject: [PULL 19/23] tests/qtest: Add s390x boot order tests to cdrom-test.c Date: Wed, 23 Oct 2024 15:17:06 +0200 Message-ID: <20241023131710.906748-20-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -23 X-Spam_score: -2.4 X-Spam_bar: -- X-Spam_report: (-2.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689636833116600 Content-Type: text/plain; charset="utf-8" From: Jared Rossi Add two new qtests to verify that a valid IPL device can successfully boot = after failed IPL attempts from one or more invalid devices. cdrom-test/as-fallback-device: Defines the primary boot target as a device = that is invalid for IPL and a second boot target that is valid for IPL. Ensures = that the valid device will be selected after the initial failed IPL. cdrom-test/as-last-option: Defines the maximum number of boot devices (8) where only the final entry in the boot order is valid. Ensures that a valid device will be selected even after multiple failed IPL attempts from both virtio-blk and virtio-scsi device types. Signed-off-by: Jared Rossi Reviewed-by: Thomas Huth Message-ID: <20241020012953.1380075-20-jrossi@linux.ibm.com> Signed-off-by: Thomas Huth --- tests/qtest/cdrom-test.c | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) diff --git a/tests/qtest/cdrom-test.c b/tests/qtest/cdrom-test.c index 9d72b24e4b..c86725a511 100644 --- a/tests/qtest/cdrom-test.c +++ b/tests/qtest/cdrom-test.c @@ -213,6 +213,30 @@ static void add_s390x_tests(void) "-drive driver=3Dnull-co,read-zeroes=3Don,if=3Dnon= e,id=3Dd1 " "-device virtio-blk,drive=3Dd2,bootindex=3D1 " "-drive if=3Dnone,id=3Dd2,media=3Dcdrom,file=3D", = test_cdboot); + qtest_add_data_func("cdrom/boot/as-fallback-device", + "-device virtio-serial -device virtio-scsi " + "-device virtio-blk,drive=3Dd1,bootindex=3D1 " + "-drive driver=3Dnull-co,read-zeroes=3Don,if=3Dnon= e,id=3Dd1 " + "-device virtio-blk,drive=3Dd2,bootindex=3D2 " + "-drive if=3Dnone,id=3Dd2,media=3Dcdrom,file=3D", = test_cdboot); + qtest_add_data_func("cdrom/boot/as-last-option", + "-device virtio-serial -device virtio-scsi " + "-device virtio-blk,drive=3Dd1,bootindex=3D1 " + "-drive driver=3Dnull-co,read-zeroes=3Don,if=3Dnon= e,id=3Dd1 " + "-device virtio-blk,drive=3Dd2,bootindex=3D2 " + "-drive driver=3Dnull-co,read-zeroes=3Don,if=3Dnon= e,id=3Dd2 " + "-device virtio-blk,drive=3Dd3,bootindex=3D3 " + "-drive driver=3Dnull-co,read-zeroes=3Don,if=3Dnon= e,id=3Dd3 " + "-device scsi-hd,drive=3Dd4,bootindex=3D4 " + "-drive driver=3Dnull-co,read-zeroes=3Don,if=3Dnon= e,id=3Dd4 " + "-device scsi-hd,drive=3Dd5,bootindex=3D5 " + "-drive driver=3Dnull-co,read-zeroes=3Don,if=3Dnon= e,id=3Dd5 " + "-device virtio-blk,drive=3Dd6,bootindex=3D6 " + "-drive driver=3Dnull-co,read-zeroes=3Don,if=3Dnon= e,id=3Dd6 " + "-device scsi-hd,drive=3Dd7,bootindex=3D7 " + "-drive driver=3Dnull-co,read-zeroes=3Don,if=3Dnon= e,id=3Dd7 " + "-device scsi-cd,drive=3Dd8,bootindex=3D8 " + "-drive if=3Dnone,id=3Dd8,media=3Dcdrom,file=3D", = test_cdboot); if (qtest_has_device("x-terminal3270")) { qtest_add_data_func("cdrom/boot/without-bootindex", "-device virtio-scsi -device virtio-serial " --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689590; cv=none; d=zohomail.com; s=zohoarc; b=AxoY5y8i+iXQX8jNNGh0zF+jbT52IreeH6gNVD72OGtJiMxSpGpN5AeiKaQHu8CpJDwLReaZevfv4h/1816VYsbO0+SJkgbOc+46lgh+qS/7i4gTiKtq/CVd5seWjXRHtH+twj/713RXmJujaPZYWbDTy91oHWAho4BLVPiC33A= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689590; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=AlisWTeQGQ6ZToRii2cnDBBtfS/haEMK8f6BSEWEyKo=; b=IV9L3pnhLXRPImHaLKxGCyfybH8kPz3cJqADxsxf3yGKzEXmWwQ8na1aT19p2wM8UnE8pN+RuO/EBvZxhdpOzwZ5OIoNwBV6e2jeXoYT5o9mZFlTv70w0nZgIckvDvLJx2ot9QJqtd/71I2L2J08STnrOacGs/Iyk7xzjLyE110= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689590975556.9512072425706; Wed, 23 Oct 2024 06:19:50 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFy-0007Xo-7X; Wed, 23 Oct 2024 09:18:34 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFi-0007Qh-Uc for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:20 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFg-0002Gs-Is for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:17 -0400 Received: from mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-529-ahgd2XjvPhencQbgWssxnw-1; Wed, 23 Oct 2024 09:18:12 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-05.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id C0341193EB3C; Wed, 23 Oct 2024 13:18:05 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 3C8B519560AE; Wed, 23 Oct 2024 13:18:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689496; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AlisWTeQGQ6ZToRii2cnDBBtfS/haEMK8f6BSEWEyKo=; b=Z5TA26SDVnFyXNRIsgSEbtfXjlP/kImd/mX6ZVcMG6yVKVUkjg5genStUsbmzxtcQ1OqiR reY8N7YJPas8b4AETS8FzXl6ZXk0AtFyeXnNZWXZnZj93n4j28OX3+eBIMxs4nHJQ1p6Z0 FgE+x/fOF+jkY7GEPVUS4EzunLl+azQ= X-MC-Unique: ahgd2XjvPhencQbgWssxnw-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jens Remus , Marc Hartmayer Subject: [PULL 20/23] pc-bios/s390-ccw: Clarify alignment is in bytes Date: Wed, 23 Oct 2024 15:17:07 +0200 Message-ID: <20241023131710.906748-21-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689592584116600 Content-Type: text/plain; charset="utf-8" From: Jens Remus The assembler directive .align [1] has architecture-dependent behavior, which may be ambiguous for the reader. Some architectures perform the alignment in bytes, others in power of two. s390 does in bytes. Use the directive .balign [2] instead, to clarify that the alignment request is in bytes. No functional change. [1] https://sourceware.org/binutils/docs/as/Align.html [2] https://sourceware.org/binutils/docs/as/Balign.html Signed-off-by: Jens Remus Reviewed-by: Marc Hartmayer Message-ID: <20241001153618.17791-2-mhartmay@linux.ibm.com> Reviewed-by: Thomas Huth Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/start.S | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pc-bios/s390-ccw/start.S b/pc-bios/s390-ccw/start.S index 061b06591c..576fc12c06 100644 --- a/pc-bios/s390-ccw/start.S +++ b/pc-bios/s390-ccw/start.S @@ -112,7 +112,7 @@ io_new_code: lctlg %c6,%c6,0(%r15) br %r14 =20 - .align 8 + .balign 8 bss_start_literal: .quad __bss_start disabled_wait_psw: @@ -125,7 +125,7 @@ io_new_mask: .quad 0x0000000180000000 =20 .bss - .align 8 + .balign 8 stack: .space STACK_SIZE .size stack,STACK_SIZE --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689563; cv=none; d=zohomail.com; s=zohoarc; b=bM1ftehKRVoo08kDMZED2yEWc7OQqmlVP+AlOwsMqtMAnoDuRL3jvt9BcyCr4zJMS4Q0TkmV6vL9Fn3TDUV1bgzpwGKFk0Hpmg/nxVuuqLAFmok9tzUUHyChq2Tq0Kpj3kZrN8FOYYSikhI37sjP/FCMlebsTkOhFEInfVKu4r0= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689563; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=jZAgKjHoIK0f2Ml/A35Lz7dZewwqe78HY+smjQkjoSs=; b=NRuqHgOq0iqv/7GpGBdtuda0ZCAFDkcjN78042X3MRfkwn/4mYTYNQekomWscB7N6I8a4JOuwnW67+G3VYl2Jp0ZKtFNoNUVq/a76yC12e6Od7nz/UCmwb0AvjSyQmWzIykDsrEeoCkYidXL8mpUAPV5mUN8zlFF6QG0bWyQBgo= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689563884995.3608480337338; Wed, 23 Oct 2024 06:19:23 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bG1-0007hm-CR; Wed, 23 Oct 2024 09:18:37 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFm-0007Sd-NS for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:24 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.129.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFj-0002HL-RU for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:21 -0400 Received: from mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-617-emH_6pQqMwKiovvF7WHPMQ-1; Wed, 23 Oct 2024 09:18:17 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id BFF281955BC2; Wed, 23 Oct 2024 13:18:08 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 7D13C19560AE; Wed, 23 Oct 2024 13:18:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689499; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=jZAgKjHoIK0f2Ml/A35Lz7dZewwqe78HY+smjQkjoSs=; b=OtT5i4c2jsrZUrEHg2aMG/lDnSgXJQdVWYOnPRtCWQ7t1/1IyqQjr3QhxMpHhYfWT29Fh2 UT2KE3Qo7laSj5FA+GqkXz9jaZdXOeX3MJjvSBkLgp4eemWPont3MYcyZB2Q7J2PiKPkdM LLQlhOkksfAnyAs8MOZ+JvTm5YQT0VA= X-MC-Unique: emH_6pQqMwKiovvF7WHPMQ-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Jens Remus , Marc Hartmayer Subject: [PULL 21/23] pc-bios/s390-ccw: Don't generate TEXTRELs Date: Wed, 23 Oct 2024 15:17:08 +0200 Message-ID: <20241023131710.906748-22-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.129.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -40 X-Spam_score: -4.1 X-Spam_bar: ---- X-Spam_report: (-4.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.697, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689566441116600 Content-Type: text/plain; charset="utf-8" From: Jens Remus Commit 7cd50cbe4ca3 ("pc-bios/s390-ccw: Don't use __bss_start with the "larl" instruction") introduced the address constant bss_start_literal for __bss_start in the .text section, which introduced a relocation in code (i.e. TEXTREL). The dedicated constant is required, as __bss_start may not necessarily be aligned on a 2-byte boundary (see subject commit for details). Move the constant to the .data section to get rid of the relocation in the .text section. Add the linker option -z text to prevent TEXTRELs to get introduced in the future. Note that the R_390_RELATIVE relocations are taken care of by function glue() in include/hw/elf_ops.h.inc introduced by commit 5dce07e1cb67 ("elf-loader: Provide the possibility to relocate s390 ELF files"). Reported-by: Marc Hartmayer Signed-off-by: Jens Remus Reviewed-by: Marc Hartmayer Message-ID: <20241001153618.17791-3-mhartmay@linux.ibm.com> Reviewed-by: Thomas Huth Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/Makefile | 2 +- pc-bios/s390-ccw/start.S | 7 +++++-- 2 files changed, 6 insertions(+), 3 deletions(-) diff --git a/pc-bios/s390-ccw/Makefile b/pc-bios/s390-ccw/Makefile index db9e8f0892..38254e22df 100644 --- a/pc-bios/s390-ccw/Makefile +++ b/pc-bios/s390-ccw/Makefile @@ -46,7 +46,7 @@ EXTRA_CFLAGS +=3D -fwrapv -fno-strict-aliasing -fno-async= hronous-unwind-tables EXTRA_CFLAGS +=3D -msoft-float EXTRA_CFLAGS +=3D -std=3Dgnu99 EXTRA_CFLAGS +=3D $(LIBC_INC) $(LIBNET_INC) -LDFLAGS +=3D -Wl,-pie -nostdlib -z noexecstack +LDFLAGS +=3D -Wl,-pie -nostdlib -z noexecstack -z text =20 cc-test =3D $(CC) -Werror $1 -c -o /dev/null -xc /dev/null >/dev/null 2>/d= ev/null cc-option =3D if $(call cc-test, $1); then \ diff --git a/pc-bios/s390-ccw/start.S b/pc-bios/s390-ccw/start.S index 576fc12c06..b70213e412 100644 --- a/pc-bios/s390-ccw/start.S +++ b/pc-bios/s390-ccw/start.S @@ -113,8 +113,6 @@ io_new_code: br %r14 =20 .balign 8 -bss_start_literal: - .quad __bss_start disabled_wait_psw: .quad 0x0002000180000000,0x0000000000000000 enabled_wait_psw: @@ -124,6 +122,11 @@ external_new_mask: io_new_mask: .quad 0x0000000180000000 =20 +.data + .balign 8 +bss_start_literal: + .quad __bss_start + .bss .balign 8 stack: --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689601; cv=none; d=zohomail.com; s=zohoarc; b=HTd4job51FukZjiP2zlV3kZ7ZHsErEmiLgjsvtvkDAq0S5RGN1NWwgAt6Tji/3uO469B5gx290y8vEvDV1gZqNSSAS1DXTxohh+sAWaGLCqdTTnei4t73nC69dhUnGUJpNle7SHsL6dzDomUoW5Qx0U0cBcoAi8pjRSxsmEwndM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689601; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Ls0Cupa2zkUdIvrUHHxruSg8WKF/uDeEseqz/Io4VRo=; b=C6LDKntpgbIKUK/vpYTtVIAeilUENiYNiFROtzlJgYJsMxBYqYknUUb6PqKxA4ApMfP4vAPlimsEa4Z7v3ng1vYHLD9EwxXNd7f7UsrceAZmgkrUlvqtd+nDu94vWxRomFB47jDOlIKEuh909FtHdW+7krMlviDRbWcXdxPrg4g= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689601716765.8926551644146; Wed, 23 Oct 2024 06:20:01 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bFy-0007av-IX; Wed, 23 Oct 2024 09:18:34 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFm-0007Se-NV for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:24 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFk-0002HV-Nm for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:21 -0400 Received: from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-652-kjgRgOECMzWrLwi8uSXPBg-1; Wed, 23 Oct 2024 09:18:16 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 5BC241955DA6; Wed, 23 Oct 2024 13:18:11 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 477B219560AE; Wed, 23 Oct 2024 13:18:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689500; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Ls0Cupa2zkUdIvrUHHxruSg8WKF/uDeEseqz/Io4VRo=; b=eGO0pXWk6nkgDEKOkOsIfDKccCNftw+1Fe1CsJdGo3lwtOAwsUlRdwPMAY4sRLOdoSR7Rx P95vJyZBADugNjTbsmJkSgf4yZJwV2Mj/bZH6752CjpBWI2XuCh4a62+w74G+1d/Z5KMFF xlYV7fs4J3UGqdIfWkUR39hDVPIMAic= X-MC-Unique: kjgRgOECMzWrLwi8uSXPBg-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell , Marc Hartmayer Subject: [PULL 22/23] pc-bios/s390-ccw: Introduce `EXTRA_LDFLAGS` Date: Wed, 23 Oct 2024 15:17:09 +0200 Message-ID: <20241023131710.906748-23-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -23 X-Spam_score: -2.4 X-Spam_bar: -- X-Spam_report: (-2.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689602604116600 Content-Type: text/plain; charset="utf-8" From: Marc Hartmayer Some packaging tools want to override `LDFLAGS` when building QEMU, this wi= ll result in a build error as most likely no `-nostdlib` flag is passed. Intro= duce `EXTRA_LDFLAGS` so that the packager can override `LDFLAGS` without breakin= g the build. Signed-off-by: Marc Hartmayer Message-ID: <20241001153618.17791-4-mhartmay@linux.ibm.com> Reviewed-by: Thomas Huth [thuth: Drop the hunk to netbook.mak which is not necessary anymore] Signed-off-by: Thomas Huth --- pc-bios/s390-ccw/Makefile | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/pc-bios/s390-ccw/Makefile b/pc-bios/s390-ccw/Makefile index 38254e22df..dc69dd484f 100644 --- a/pc-bios/s390-ccw/Makefile +++ b/pc-bios/s390-ccw/Makefile @@ -4,6 +4,7 @@ all: build-all =20 include config-host.mak CFLAGS =3D -O2 -g -I $(SRC_PATH)/../../include/hw/s390x/ipl +LDFLAGS ?=3D MAKEFLAGS +=3D -rR =20 GIT_SUBMODULES =3D roms/SLOF @@ -46,7 +47,7 @@ EXTRA_CFLAGS +=3D -fwrapv -fno-strict-aliasing -fno-async= hronous-unwind-tables EXTRA_CFLAGS +=3D -msoft-float EXTRA_CFLAGS +=3D -std=3Dgnu99 EXTRA_CFLAGS +=3D $(LIBC_INC) $(LIBNET_INC) -LDFLAGS +=3D -Wl,-pie -nostdlib -z noexecstack -z text +EXTRA_LDFLAGS +=3D -Wl,-pie -nostdlib -z noexecstack -z text =20 cc-test =3D $(CC) -Werror $1 -c -o /dev/null -xc /dev/null >/dev/null 2>/d= ev/null cc-option =3D if $(call cc-test, $1); then \ @@ -111,7 +112,7 @@ libnet.a: $(LIBNETOBJS) build-all: s390-ccw.img =20 s390-ccw.elf: $(OBJECTS) libnet.a libc.a - $(call quiet-command,$(CC) $(LDFLAGS) -o $@ $^,Linking) + $(call quiet-command,$(CC) $(EXTRA_LDFLAGS) $(LDFLAGS) -o $@ $^,Linking) =20 s390-ccw.img: s390-ccw.elf $(call quiet-command,$(STRIP) --strip-unneeded $< -o $@,Stripping $< into) --=20 2.47.0 From nobody Sat Nov 23 20:11:57 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1729689604; cv=none; d=zohomail.com; s=zohoarc; b=fIIHE5oGhStjQKGbqv/sK+VEP2nfU3PonOAxdZdVP/vQCfCSFU9S8ao1a2aX55+pfdJlhDPGdeP30cEAZ85F9ErSJXQiSW9ouNAJfs1tQHjAYlreetVz2ZnfbaMHG+64JxpQmwZPRf3B3OYCamk5kAFX+aWLN2BL6rxBwxdMpSc= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1729689604; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Ebi8QrtQKOWk21IcLJ9jewqBbuMpWR6dKSdRzGnxM8E=; b=amE436EriXe3lIh9AUKYTJs1Tv9YOTCB5agdqxBWpbiAAFbkxpUAQhxAYNuBw0mzht0hE4CCyS0cFhfbRYRVUdiIzKx5udxNYB+r2CDZhu4WzqNEzRiq8Rowo3bhvWiR509wyKhI+zSH9oVyTlqchxAQj1FDsKWk2bubG8ZDN2k= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1729689604182984.3280335507512; Wed, 23 Oct 2024 06:20:04 -0700 (PDT) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1t3bG1-0007hQ-BK; Wed, 23 Oct 2024 09:18:37 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFq-0007Uz-Nz for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:29 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1t3bFk-0002HX-Pb for qemu-devel@nongnu.org; Wed, 23 Oct 2024 09:18:26 -0400 Received: from mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-678-RiUjWsmYMYmy9Y7vEjsaFQ-1; Wed, 23 Oct 2024 09:18:18 -0400 Received: from mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id E677C18F6E1A; Wed, 23 Oct 2024 13:18:13 +0000 (UTC) Received: from thuth-p1g4.redhat.com (unknown [10.39.192.43]) by mx-prod-int-04.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 239AA19560AE; Wed, 23 Oct 2024 13:18:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1729689500; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Ebi8QrtQKOWk21IcLJ9jewqBbuMpWR6dKSdRzGnxM8E=; b=J7pci8t6Pto5VqawtjDesWAg4AdJhdASHgNvQmhOb4zxYFAj9krK+OdzK22Xb4qR37cWMO UJk31nbWbS46swoH8nd/kGk6hZ8o/9qKbv4yn0G+uUEVA907HXFbRjwU6TFDaAas0mkzz1 T1NOxOS+jjYLv/92oxlyJslEppX0K2w= X-MC-Unique: RiUjWsmYMYmy9Y7vEjsaFQ-1 From: Thomas Huth To: qemu-devel@nongnu.org Cc: Peter Maydell Subject: [PULL 23/23] pc-bios/s390-ccw: Update s390-ccw.img with the full boot order support feature Date: Wed, 23 Oct 2024 15:17:10 +0200 Message-ID: <20241023131710.906748-24-thuth@redhat.com> In-Reply-To: <20241023131710.906748-1-thuth@redhat.com> References: <20241023131710.906748-1-thuth@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 3.0 on 10.30.177.40 Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=170.10.133.124; envelope-from=thuth@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-Spam_score_int: -23 X-Spam_score: -2.4 X-Spam_bar: -- X-Spam_report: (-2.4 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.263, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @redhat.com) X-ZM-MESSAGEID: 1729689604658116600 Content-Type: text/plain; charset="utf-8" This update includes the full boot order support feature from Jared Rossi and the TEXTREL fix from Jens Remus. Signed-off-by: Thomas Huth --- pc-bios/s390-ccw.img | Bin 42608 -> 79608 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/pc-bios/s390-ccw.img b/pc-bios/s390-ccw.img index f0d9ef6d4d86eb8d8ace19cac3929b9c06ae826f..f9bac253066d71b64659a76d216= e04040a365355 100644 GIT binary patch literal 79608 zcmbrn3wTu3)jzz>WJm@Kurq`(BpA-bQ3EIrV7aJ;nIuZ0RtFRvR3u!yASzMEORd&X zrxt6gNi-_<;y{5#t*wV>m7{HwR@&OWy`)sDzP)LWSnYT@!O@D4od5G%=3DgcHQ+P>fO z@jRNDeOY_&wfA0o-RHJb&pgfN)2R5bgsO${5Q%gKm0%Km@}oK@Rt<6q95i; zq|I!1|1KQ)x44YLat`TN_@}kHp9+5q|03Vn=3Dzf%bzW+X+hvwp6!3zfWCg5v!;T`&y zBHoaNzy7tUy-SMY{ontowW+;Ji{t%Uyl8DM$iiRJPPlU2>JzS9JNLwy*KL?NOKLIa zO6=3D?6vzF1aroCetN! zCtrE@PpfBd{M$9H_w>GB`jzVV0ueP-9ood@68{l|H?J$HiF z@38+$h`cdN3+EXBf)y^FiL_C-xE*C5BC6QFc<%9UMg>v1e9~Skz`@@+#d3d-3&w?e zas|;5Zu^FWSD_QplA-pyyaOZypII!|Y_GX{?uN=3D=3DtM)3UV2_8vj}C)hJyafZ=3Dj)!M z#lzru_l*2>&APTL>AKX~ORl|k<=3DR!LRdmVfHM3V;w}!61B(?IoHJ7hjODnHSt-3Zv zS8lj*&4z0)q3bTWdhN<}ZRoV&`jp%0@>MrnvT|M9m8)r8+g!9yUE<9M|FlIryl(~k zx$Dpt86(TRb!dxrjV$-}M_bf8vfNvrw&;Zs<%NCI7WIuNFYKGP=3D#>%Wg?-Z&y*8q} zuy5L;w?>wG_|p~@Hp*RBVL!D+9-S+!*K4M^ld&fnK)sHCmdCSq_ zBj@RFb?Jl_KV&|w?mlY`g>&Z4vozrL*Ba6z;Fpe$<~G<-iuCpo-Q2+koO*7dDZGGw z-K!J5Gtj%2Xv1XuzcPsbN59Z(5WVvTwk7{MPbT7NRC=3DecB*4>1Gw-0VNmR!(94A*t zi>N%I8}oT8X`Is9gLRytn|c+|7e-mi-a!$3{>CGgvJLO^596)&^YJ$OH@#`1{7y^R zyC@=3DU{oF!<-YC({4SUAh&nv?G@;mnU?LR0bvn&<(yDi-|$d8%zCWzj7$cpJiexBy` z&fgcG6(uVgC2DV+6QhP%3E~>k_*iFO&s1YRr|9a!Nbh{!^wY6`ef7hppN_$&&#&PY zD&+-4mflC?m)cvso+tNAFplFC1vx~NP{w?j?-wxBn;WHfCH}A7+Ng{gt|pCJ6j@PY zCi!JG3mTMBBM@6H9i`36IF4s1;%di{k_gw62AsxFlXp^RedO{kU%K2<>2hl440UlW zIh>({j5|lh4RGFhvaqh3r=3DsSaF*4G6!P=3D~1T@~tb2c>RBu#Qv2BcPWG^pvxqQ8%i2 zGWD8i3R_X*7^*^_swX(_tP&Xii|-R2;=3DHpA_~L1lmKNXQyp!M%X$cihH>-4QOocO6 z)ZT^lrl-VI_^zZ%hY~8hk(;T+($iN_d$WpCWn|kVXaC(gX;s0Pijt+$S5pV?AhML5 zrO38#k!DuXNtSMB-JQ{n3)XRyGnZ$Q#u@r7KSmlq=3D)BK)=3DQwvncc;SX|Gy*AzhorM z8!0d}(%`?aYVFIMAKd5RY!Pq7zNEp~-x*7noK_hIYXmgb`&X!s|w=3D9 z&H+H6u}x83ZYG_-XS~*@6Xyqh|1zN+?mC^>-K~i8L^-mFj(*T*m&&ITq;|Tcv|TPG zpv8O2G{ft)0KIaTN)N~O%O|%-wWYL=3Dy&kjolxeotLzf;h#sdR|G0FyA7!ObZM%iFl z8Tm*n5JmheIpjNDGp}C$<{q`1U3z)rUeHU>!$(@z}tD`8D4^iO zpi!K69^iUsfb&i}*EPql`+$lmOfloz#w_RCY;Fe$pHzbGpjvFU^&oA_? zzku`3-_dINChQ-loSgLZ;K(}WmzCvu?4*mA8-5~qF^JxdzN8r>`!vZ?23C!kPs3~z zy4r;kl+e`=3Dy?OQ6AL9fGPR`*I@aj5mqQ}GUxV_!`UF@BAULP^;-Gy=3DA%FDRG;^@P` zK3ZUBoIF-)|J71`L}5$E{5V2KB$QrxNUtc-4NqexH}qh3*SGiXb)13yI1st_?KX;_ z?k#uSdx_Sk-2P@2)#cs?&dc&c=3DjP_W@BwE&#=3Dha5J;&Ia-94JVFcic)xlHv1I6`yd z%6{G=3DywQMS`e~_o7sYZ-R6^xk<2bn!$wy<&0G*hdLmG`WN7GR}ouUo8(t=3DH)2&bIA zaoz4Q!xZEu8W)e+KQ{doM!Qa35n%AK&cS%p-i+CQd4;U(C@a=3DKU(QGrvo0&k-Dk%r z0?e9zdeZb$r|GAyXghr}PbLR%ff=3DS59HH^pPo7MgxB4`NbNAV=3D74~#`%dqy-xykvb z>7&Ou?kGeA4da@uA3>2yBBam)ZcCF?j<=3D3h@_K1_9-ce1jtLww~}KHxNS3u(Pk z(vJN(Pb1;jj;%=3DO_734OzS)~4?O2m{QANBhtHoQhW#9mBcsbr~cXJDkGX1mw+}NH` zc6VCtri^E&Cil1w5}(q?5)`6>wlh5_72phRvd0z%g8RK z+Te4Xq1ia)gPj8J3}9WL1MY6DTKhwnmL*Qnm@Z#d;|P^@Ez8z&#=3DQ+U#AS>b9C93t zc(}1#?&a`xU5{m_a?1I0&xEXxQ_d^B25HBJcoQw^+Gv3C2l+YD`61^MxtGEXUY9S7 z#(C$LU1W^nl=3DEKC1fvvdnEp0roPWqYuf?5`m8=3D9eAXp6vRzKIPlQ#VoPEiHw*PV=3D& zI=3D{vnG4XcZP2>10@)|rZxI7JQt}{9BJZCAxM^iD*F+acwvD%DMni^B~_mi!L?9s8) zw%tG!tlQW|zR(?8g1Hk6ztytDa{^c=3Dy zD`)6~>R|F5Lr+XFVxfsO!NdeZ@9xAG1mBk`bS4=3D$LKKq9`S+j2Ne!Z9Jcx z%A=3D}-p;=3D}X#d{TL(|u-u;+D#eA%9KK(qlyJHNooHi7G=3D+%r#<#c?Bq0VZnCo|tXKlCurs>W_&}A}ul7phVEngB6@|{(>DJS}A5dZMPLJ z&U&HDdKusAIGl2RE@NDTeZ2O2uH-lToi;0Jv8CHv-4#b{>AMuI%UA!$UB}EX6R3Ce zOf^p7l+z(Ixy{mzkPGeT{Q^z#Mk?h^RLXhhHuSshHR*RL=3DLbI{a8Bg>;4kFW^9%mc zoN=3D~uO_`Icpd)CEv^h0&jr2N$^Uk-V0k?IEQ_A&vWZvGbbgr)k)s$oB;gGh}Zb$H|Rsv)UDr z-<_4|qfMNlhTb;PB0Ee!?c}@3>6u`R0VOs4bO9i73qjHb2ep?d@_^~1Eu5jtt#(5V zhZHvq#TlyMFOcFdJAdW8b9Y=3DB3U7}&n!;U=3DDdLp#M^9()iOj*zdFKY6tlqL>kUUL4 zMR*43@d~@%;~pLp3Ds{!?H%OjlSyw>YLa}5gl6$c&R|2-e#YIiF3o<1cRO<$l)I~( zp>=3DW!H)7`39K{DJ6o;IHW+jEKnB7Kxd1*a<^tzSO3N0M8{B$dKCZ?a_ab4-0cbX>}HLG`FjSWvHdpj-E$vhO8x@&dp68 z&Iy?T3VGbnY~lIJ=3D_sBo=3DeEP+!8V%#nr4>Mbbiip;!!&ruXAO!qy8u-^-SDY8@o4_ z52!5Ub#J%85BkgUR@yeGs*}7+E=3DmS z4URXf!I3S>%7*y1>p#l}oT%xiZ@VYer61sFKB*6N1IpOl9?x0IPk?%BJ2^zP6L)f? zO@smhd#>1Tm=3D1vtBqWps~*0WvX9_g({z+sPTk%Sc1Pwa9p`M^aH-ED5$On z=3Di2Cej}P|q365j!jJo)mWBTdq*6mT?Y-hB9vvA?G9ra@2w0%kv2n~}2IzVb36@JkS(AQl(F1P5#_o1Q>cv|yrftFXiAb2|!IMaRujis`567$y8rur72hr+l^C5-scl?Jq~&nrR%OP|c)-vW?z$((3Nu zyNMEQcD6a&?z39kvC6h~Ss&3+LDNri%jY%L6rf4NFuui;6T8g-Rh#8hV+Le5 zFE{;kJFqVn0!Y)lX*Om}KQaAOFS9-+SQqN%3@OfQ;N&%W(hN`#G*l61v@ql_w5&UW zr#lBHcbk<|!@He#lFH6{_bHoHw!vSg09Vn;pmc4bbHD0>;aJnZ3@EF&4pAcgizv|# z$j+?CY1Xfo+Zi5 zlKs~og>*W2k*xO|tmLX7=3DP4lHFOctJc(UWj8N0*OgyJlsF_sdJF4i9tdhu(>&HYs1 zBHG5G=3Dauhr-mwJIc=3D^89<6VD!xPC5XtlM>>4y(h%%5Two!vX32^FnXVJ3n*zP0%*b zDM+K>VDVSR6K(aC-^0tEP&RrzF7+vAhuDNFU3v%2B51HTc37Y9@)e_ADex7eUgo@W zuj!*plWlg^^wVZe(S@N&Vtx4{P2vol2|CO*)S9cH68GhqnzF9J3Yt4~tfdoXg562L+tqvJbHy;cDJkDC<)en}fM^mo2whmef2e%$V`+aE z+ONm{|53jGL%tXHpYwxn4Dkuq94~rs?6j<5{qKk0xZ2;MZ)*-~tbGAA0N>^_|r|8D!w6V6i)wpyI+0Pi41B%{T z;7N$|Ynzpkh$(x!oQ6nqn{n12vY#+SI@G^w=3D{WJyYeivx(8ht<)ZQX<+$3|nfv1rV z-)sAWb)hYsqSrx(3}|X<<&&Q?v`E&w5bf44FWk7RWv%O%6!qoPa~q(mc6G%Y#QL|s zf%8tkVD%T$`=3DrCSzFOYS^)n7%`!xp^PAdT!EgrS|V1;cadwXw;wA#t>c#NzVB>Kjt z1U1A(suCNgjQc^z=3Dp_4(82yU>$=3DwJo__mqjo!rUbn{rk1f0UM+X_}qehHF@OwVsBzPvQWsnqyo@+O4c{t9z?!uK-s?k2bd%H(OcbChD--jays_ zTl-3Zi?6*WH|bMcyvuWJHp^*?$HiYWjEiTpoOXbVx6;OH>M#TJo#u99tz{UOdeFaP z`srG%r}m;;i$Jdxem7p!tNW?4aEd+cx6AXU=3D~_=3DKJ_)B9_E1o0GeEQ4oyO_ge+hQ< zDxpm4&gQ&xt$c6fyfeCUmc14G_|>C0@6>nB_P$Nwyc3pI!iB6mk@L>=3D^8Is|=3DQ`N< zuafUenkjyuW*`Huc8q+Wb9)>VR%bAIqgQYISYbz?a1oFU(ZA6n<*ywg}#mV3fZ zxaa@sWn%Z)>o^}IhVOk%KgPIt9QM8@SD=3DbhE|tB%5+}CiH7jN;6>cXXyzyBsZ~VbV z;dW9~3w!8tSY$GE(Q?%X%DHyA5{uU5JdH{)>fmPu;^ny~Y#Vkx$2s^S%0E7mPjCjo z`E!PrdwfETtVDFnmwyv`zzbjrcbt#63zSo(Ui8J6uR!^}H%F{V_`elfWlgsi)>Ly) zbo}2%-z#4&%!BCiD*@r)*93CNTZ^AlP8RQ2p`GIl{27pjeSgujf60nq1u82WvKwEu zjSmcp=3DB)gdo~hwhPSG-8y8QF5U5$P%^S+@lZ;^d;(rTu?`~`cfEw-Z-jj{s0a3gEJ zjyYRpw5mBdSQlE#Df(0Kt^IAh-QH^YsYO~n$&+cSrAI;AP9SL91FkPjjQ9f5_+(Oi z2KjlC^L}s{XNUoHRN6a-=3DZjuqGe_wD&~(UWV!u$NRo|AY17B|jD2&y82zy1wxm4!g zHf%+rJ1(n4`TF;Vm0yT)rVw!HomAnSYv2!(qNDixkYAkToOjNWUAXdp{)BA?_ z903O+$zS?s&O2Aicj1dKeUbCdT2~JT>@MhYt-F>k`dX!6AwJ-=3DTJQyljQu-WTJRf* zlnoBqzpoT}G2Co@ALH57e0W~L&1XWfr!$aqDk9kl2-6Qa2#g^z5}+C9MLl4 zyz9~n$8pX$q)#Kf<<@V-uEjn~=3D&GFSX-W)s?t1dabTuXsRVt|`s9UFS!LtRl`n@B) z{YL+d(*LDG-)+Z1x>RGtZ!H$nRq${S-aQBiL-cX|IzHee;lm16 zDn-wjY9|g=3DQ%tpw>7;gFEZZIc&(^KeDDLm>QhQG&Gyz6-j z!1Aq&pO{WsOyvIy77KC+mt|@B#{e z8;q&p+@MYkus6aBa-OsA(3fjyU#{3Dd_tDAMQ?COQA}k)nc&axWG7{P9^R@);B6dF z9{;f!rk%W-rf|#nkK@to_yUbv{ti~N=3Dtu6DmaYQS!PA}nu0NE^L7RSp4eiY#d2{^| z=3D%r!rS)6sPTb62rpNEesIHSdKVfc8!S1t&BtT~#3 zxe8cDp}opg(0Gwzc2U6fWbH1scZu94eyusOchS)g2J9cprxRoq5#9xhh~vC-%}W~H zC7jbeynr+pXO82X)EKj$<`6lRm0V9X6N8*_-sT7;VW)Q9;945XDf;%I<2>-M!Z=3Dt@ zfes9o38bBzp{w~>;cBbQYSBi8U`sRov_qs0v6w7x6Z%sl_vsnu!y=3Dx(!Skth;!&X> zN2okk2Moy01bR-;Avd>x>RlmPoi&}DcRt6pbQ`BA!8_rr>fDX7JuX~0yep22SJ*%6 zgx?@Emp1_;xwkxwq@2(H_tkZhEqu(tgRZU#yC$>AIM11tvNDkj*NL>aX0fZ&f`-4K z32QKH?iy_~N1O$@8j(UFi{fN0z>S><+MC#=3D)7+a04T`>jDOz|wyhHbOzp16TJ__&g{a2MqL6d$Q| zj|*%aoG(6|cSgK3t96n11g?SA>r4Ci^EOWKG^syXyftfR^tMUP$EKg|Ge=3DW@5dKiB zL&11fbZ(V6^R7QLXXsq3v0XF=3DIyE$AiBBettDJwutK_zy)Hy~`yeg|f2v7POnm*j?>38B3q@iBZnu4hG`l)RAhj=3DZgF&d12BS90EY8D15i?(4m` z;+F+^Q>YsD?Fi|4Ei4eYg}j5N_DmJbR`QQ&v{~t$m@?i?Q>E>3GT&PHd<;$lf1Uii z-SxU#BOdds@eVBx9O)f{4fz@(~QG6 zInK6wNsG0EnrA7rxcfu{eyp*LF`B|>i684sK1RGv^q3;zw1<0d~ zqVXyn3+)FqCREN>OW$#pZj@5Tmy7Ld zOT5)KfSbj)$~o@lCYsGN{lpOp34NMn`l0m7#srt*OS0;GD+Z4|_kO$Ycc|ejF&cw* zW+gRATRF9>;-79SwW2*-1%1|B&>!5vc&oiNp0MF}aE9ovq)p2=3DT+5~BKV2cc#nQ2A z!eL-Xi7tar`g_>7p?7ZGPLB`xHeOkmzZFPwPFvrzqS=3D7FdhpS{B;M8@;}#9G5*_im z=3DfQ*S&JW~nr_*>JE2+8oiku&;3$5lRidoUDE0F=3Dpbe=3DvQ*8lDikY;Ur#-^Hk3jLu0 z!M$`o_cSJE+s-NyPZ z6B^h0eZE|Hqxao&?&&L{MC)dOKkOc5XI+1bToa9_a!Wxr1W#w)MX>Cjj+@c=3DP_9W{ z{QxysG0Z6Ugm}pg4uc2(#H6%NCw1jN6f$6X&^^d5%o-0CD0JB%Pb+x~H*9GCF5k-s z4y1vpPg1fj(do1{;Otht4Ef~F6H$KWf?-lhiW=3Do@b0w7pRC;GgNkF8O49ykZAWL-T z^mzNev_uNjAW|SZEK&ga5bQFzGohYiJQ;Yg(5D|uOu!p5AJG`D{KSgoZA8d8PHscq zz@2lYtS+A_=3Dam0Qw7ugWy)mLY-g7;ZI7ubVQFXPY>k^w0qspU)Vin+Bj`@Mpa%U2g znGF2Qr3%jTaihPUTePIdYs~;g&i!9-xecO~9=3D%p>b`ZQ~!_(YU@{ASD&Y^Zo&(6mG z5$)mmBqXv?YPVw96QG64&ZKs$H9L#iG3QHvlTiC^0_>GZfh}H}b60nd+LyLeHcFM2 z+Lsou%&>ftyL=3D_~T^N|Dp*ZUv0b)bRq>x9ig13Cx*%IgRFxG=3D^Qd;AHSr3AImb z33a#eOvedb%Nb30g-icO`cwvQgb|VC?TUE!pF2JY|ML*}x^KHTcQ3VDiG5$g{_XoJ z_HW-k*xh|!p>|94gL3)DDVs>9=3Duy;@4w$ zl0irw@eOg+kI1xL6yeFFT;GSd!pTBp8&3{+QAwts7Q@FOekI;7XmH|d#gAk!(dp&b zFW*U4v_C?Xxj7<3_-RIbPP^Qgg9i&IK~B>8;Ef#7J}W1s6a6oq^69(Fp+bDxzMH7B za2}8Uo9L}QZ>u?f7B7K}b~;Werv?qPlI8;LC9C)fH?nBOkNK{_2MTBYlI0k0#Z%Je z3iON*~a>xY6ja%S**kmNx5(##8Va_Js?(fEwl2(K_!Z>fHT zyXZIv{T`=3D!EjJBr=3D9yH+yS1P2%(6j_5cHxAfFjcIk1)#8-SMjIiQM99%3@E-_%{`J z)FpA@4&LGx8iRd^VOQyrZ=3D&ZCvHufjD#cs-BfMNJ^DVp};KKh};odBM7JD{$!N1+J zy3n=3DQCtAb#L0Ib-zzY*&%oZrw55T)j=3DlNlG0qSE(9-+sUGLd>?-g681|G6n`)A-D^-q^|Op|rg zdn*tQ{i1t0Kk#KsPAO)l|DE%L;&*fWW^NJe&n{qY$t!{>k!UWumh%Iv`13@ZA6(>} zPi>Lx|JkiBO{3>Jsg1D5i@K%fJ+k&?UDT$ z1!-o8wsYRWy%2i4?0YVj1|+&~?FoW|63!279kx?{8ny#r&JX+n_;Mwh3*Y7Z;CT7| zG5TJ(m-7ezid$E>+iP}7`FA*faF4XxE#H67`Gda#-CX@TN-q-m_`(M%%@5#mWY!7&d4Z&j||{g zdLl}ZTo|#-p1ky3*vWW_20cc|GT;MkW#N6uqY-%u-z@XXG{&qV$|*z=3DHIrT%(+t0* zbia72z;DRV75PJ>wv`P!)+|HbwqdnV)F$H5z=3D%Fl8q=3DcX$*2x4bAsy|X+iPlkIjmW z8_`j3};}jiZDMKeePlW}`*&&j~u(f)tgp?M^)nR>Rm^wM)-0#Lz zQb6#Rcm9fXwN`R9v_*K~wKeNZqvf?O8f+ zNfvsDWmY^Jph_zWSrK=3D2@Jo;wI<)k7PB}vJo#T>vd%e`nsHppj8(|9R5%H^Dq}q@j zXZ2O^tH6%k@?t0mDhJLI_y3kR63RFZwBoG4fezgA=3DXlKCk<|MXBEk~Ne%y-n1t{Dc zHD+;yE|wV0u~w`PQ3MjN$;(Mg>MjiRGqJUmy`&kl`YOE$xI!Eq&NSladR#x8M%|dx zpxfN#gIiThL;ou#sgwVWLTb0zJzW+j(Du3vY&d;Cv$xz zq3k~=3DRiB=3DS8Y-deS4Pb8*#ErZ@ra90`KAm0+U@7#Y5TQ=3DvY$_?zA2q#|01F6*Anga z8&-PgoM{8`Hv6r(+WD}R#z`})=3D(2crXS*vI495!aVfv}La016?Fq(!K!RMg^GpEw5 z%Gu^rs;dkp^}bLdnx#a${Z2x+-@+`cwqc|G^e~W5D?&bBAb*3ui&w|ak}h`wp0Yxd zy%lNpFR&V{3ciw|8m`u&31#OwR7dfcZO4>tH!J)5F=3Dg*_@yHSFOaBFjlU@Hetpl`G z#@($=3D6iNCGO9zj>?RZ6&4(3*`>J^WrCZ|hf_r)SJc`e*Jv&@R(YwGyoyXx8nY#Pt5!ZO0H<1Uh3y`=3D?MxLYGl% zsUx=3D(Z!6Cr#IhxFb$ES~vHnmZYG=3D(VIuU+4@wx;}Xfgvd+pMA{GfgKZbvtWCl}?d_ zuI5__6@px;l)H+Uo*+wCh;*7yzi7RpkUbG; zggs2O_4^YuRee(Rsf6lxu^6Ej{?ne1bMtQ8i+5^y*2DZ(O2X!s(ECHcb*LJciRt!F zlDhr)-HOI1bo(H%4nHwqUiL}B4i(GxPl;vi9#^h9%*ZW;(>6|rgyee6wThd`&fDmf^+=3DicMVyk3j`kZ&JS9VXq zp6zLHI|1>NFL6lt|L%kew_90Vton{~aG*oqc|Y=3D##G^YAZ-Z#HQmpTci+C4ob)$s; zKI=3D%+N3$ho!*cR*%P81$rVC_)pLX6We)}3|Ls7RH&UuzptaIhpFx&Gazss`U$T~&t zU%3Y3EtB|PczqY*sPKY|Z>PkpJI*IZ!JZUP+uI?jK#~^yvH{NyKsfzhal?o~K7b^T z-4tmXJuikN3cajbqlt#&lXEyvesDD?m3BXtGx%{*H-yvJ|B<}zM-+W4r|0f-_4k7J zlV#oydw!ko7yLTCd0%Jx=3D>b69{|n0yd}qlQ_>vU`7iPt>L>(__S&G6tD!Xl}1CQ3q zf(ECMS0;BVqWWB4e)G%JAm5?;*-BNe&v=3DsTt;u*az^6MOO>W@`t@WgV5*lk((gVQCZBwAp~AZzGDB2+rTlcPHB0=3DSP9}-cK7EN5H6VpZbb%{{L|rMw zH%tnN$sWy!#iM?=3DeY1*sTz}LjIQcv@$B+X&+2aXGvPY#X3xCO&N-y;Me@YQ4z$vP7Z%=3D`z-8O?_+(NgRY2nN3Wt<@A zonD+;S8pQx_-n4GTuW-`{tVjU$&?^E@8`XWd}YnNfW~`%>%g!ZQxe%T-hL%PjieUs zA#e$1nxeU8wTRNWCdAF6?TrVa{l95+e2)E!m4((a-ekYBhxBPt@rr4Ts)c(qjJFxlxb`y% z6>qW`cBC6$+C%!B7{yy`w$jkM?jile81eVTvoO<`RWWX++i(slPq*5ktL=3DGIoyaNr z5;*)7_i{Zsl?|4HE|<@uHduY7=3DBuu**R|-221OIUuA_OD{OyD6W5xQ@ZYGc1eJ=3DMX zt69N$XOlp=3D2h@$klUhVgwd4&TV|RL~`!PJpg+Y-%Vv^njUs>9e>Pb z7vFnGFU?YXlg*7;)v$;3QSHQ=3Dq~~{r?@MF5Iuj7lQ{a$3HcPo3>P$-K9>aMV-Wu@S zG4#qT?IC?)JLMi$pQChc6WTUr)#nOvkt6y|wz)H^m+v8cilTTmW~m?P=3D2*JnY0f(m zb#jsT{w>{pD0bJ11$*fu{}#J1jKuCm;$yP38`$N%vjo(mU{CYj(WgB6ahmC;&xlnt z;YKj+Op@Pf?LX6vwi9~R#7*iOv+b#u~!AXhTlqvJ*yRV z120ERgOwPvVemSa*NP|X?s(MRg_C&E%?*bAWCPhxb&~x|XVC6WDEkep!MQ?KTH6~X z->9G!>raxuQI9TcRMACM@JWL7Dt;`I1*Zay8AH1O4tbe{ylU=3DC_oJvd? zSy!4dwpyw$DwzcOD6*~A7l7P{k^J8)ScLkJ=3D|$*-lt1TkwU+7=3DEe&K5DSz8i{W<}6 z&>*=3DMy7T27hUG`>=3Doh9e)n8AMSk~AgyZ;+Eu7lQE%2-70$X-Dwb&;_Ue|x4HJK)8> zQBjF2o=3Dwmdu7nRYKn63u`gkgL}NQ`UAXSR%~CJ=3DwZUS z4f`bX5H~shk~ycG9f!aYE+X;U!_H|Y=3DbfiLU1JH2wJHpQIugo&XDFq9=3D$+{-?ESov z{4bBP`(%fAfgkBek{=3D$Ld&c*Znh!1((XYHtN|b8GybpY0#Uw-H0`e8^-A7v+m9eN% zHx^a}xk9LZ2d~qR!O=3DG=3DfZPpuw+pQY5kDNEah!5}l`qH%K2CRaCeF=3D`s{2Wr>}a})g}UY+)L z8In;V&+F(Efu(Z`8N)sP27V(}-BeON`AR}{e3kRgUwRf9CpIc0)~Fi|oY6GC%e75k zAdv(K#reUHcs|`$Ie}}bjZ@AC9HQ}+VV+6Iiu6wRsD4Q9M4pz_(>#JVkK}^TJj&WV z-uyqdF6b$P9C31-AN<%-;SBDmk)=3Dqp3g6XpR7ZwWRQIC^9cOWbj(@4d*xHeBb9D6& zrx5wU-{D4F(8Q_1hvcldda#s};r!se*rnxZv^aM?Zo}DEH7jF_K;7-UEVYua1eGax?x&6cg}%8epCC1jaaPC+7zl6L~q zmzx99r#)#2UgOGs)7^u(vTg76H1I-jp6-OEAy^SIIYXrrJ9syhgmz+Q?%l&_GDH|Odnp{(3hUlJPMVzyE8?av35jSzlxix9n zPjTM4)8kGL(Y8*U#k-vZ@XUGVOpmKMq>a4u5*G%3D zYU${t+S$ytq{DL+=3DOZchz|Z|2QqfQ})PcQHCwBJFJ@4{TJk2>+h>nt4$qoBC%&lM8 zzM;H%u!h`UI5ogW|Lc6@a{uE~bidbuGM@N%uhwfH(t|8IG@=3D0ldec+}=3D%>GOcKuPv#kMH|w;!8n>%bkn};bPX!GraYwqzbQ{JWDjx(2BYlGd&Fy=3D*#3;$jXO3 zKUXs2p81vBbEH%Gwx@|;Z!#-snpsK6mv<6I8yw^?I0EN?@y)idZ_spg`P3XM3hOav zXo7nNoL^mIRID{aG=3DuZb?xYGg$!I@9HoI$#iYBk-8JsZ5M~L(BTkpI{9!jiN#(Bb> zxoa&h&hU^8?g5KHM;I0%r*Jvx!{mL;TZRuJwbjso)TW8&tS) zhD&l8cJ7Qt| z@Bd@OdSf1*k4_rlwb-xsUrs8$e%mBxz{~nNenk6;9)7U$f@Tyx#$Lu$@%GL;f8l2b zi9_RPBJvoKxrr(!RJb@A-a2W>jrsZE&dvMxj~I7~H_x$2y>J%9R$4d@t{$Nvje4a? zJ>2At3cIRTI`Z7TzjDMl)4g#f0Sg`mbZA^$Yo)i(uw0fG;9=3D~4U)!jM8~%Omr|-f0 zlm1WhS@iE=3D{@3|5{`?ZWEYW4Tuu{&St?16^e}dsr-XD3C*YwU+ zaXrYj$B*W7ueR?Lt&nG;G1UEX->5|pI<+p&kXWmeJ zSMqz%nujX4jidD4iY8Sm=3DzGsoeSVAVtrS5PQlUao`|*i!j?j8U<%JOcwT&}0lXp2z zXmVV)w|39b;k9FIG-yg_hD7qsCvD%)Cw~EH$0>t9MHVOVPrmNEKm81%>aPn$Tvh+%1 z3ql4M{8B=3D}-(ZY)u5jBWw{=3Dv zKUGeET{u*;QBerl&_Xras+>|t3T732=3D|sD&`XTkFOh0`oX4p^jx$`{3 zHbOH*e+JJbaEkL}HV=3D#U^>;%-&S(z-_u6eev-(Fj>iq#uX?HZ}c28Hi-NPB}Iu45l zyOggcAMY-aHJu|KYt5hK1ymw_<|1{TBPXeOw)}E{M1r656YPKUv}DwNYPh!MoF7X0 zkplVg)KVsO&JQL{uwp95)YMkn>lSv~0qw`Tw?r*H-M z0pBrP;ltl3SHR27cM?}1uGrVa6%^x??<}qWkMBcvLh;pK{F=3D<=3De?~yQ!-Y(WQ@(F=3D z1$c7bdafWpr+n9Q1vD|f+qeRLXg)WS9%6W&6G(eTKw8mL-yisjj%c1xkef=3DXym@@$ z&Euc!j`F|WD8KSXdDa`{F>jP_6z989MtO6@DARlD`$rFr;(OT}1#`t}FY!iM=3D8bZy zJBsG5MO*HUqOB>8vdoJ1`$^*K&z0D(#mLJxPiTt!9l86&EBf4tvifrVmSo=3D_!{3rD z_pm>0f}dDi*{@l;MAhi7CfL1|B|nWvUC)@pJuNZadm4hAc46VB4onhX=3DObO+;0JvL z-QWl9xVLiVQ-d3M7S8_QMmhVD!3?}eIX`$#N80{`Q$ERpaL!*b)6@PT7|a#cy5OFk zdi%8@?3FC_u=3DliwytnpMUYQN!? zoF^rxSW$bgS0ee{Pn%;!?Kiy=3D$pU%WbSrBA!z&TJ)M;TW3eP;*cgZ(%8l-&WHi6W0 zvp^niMeY4wFUebZTB#MaKcNn3b2r+YI$%ZZgI*i4jhvddqV|ASB9_@xb5_(I^h(74 z;ncrdQQPrKwh5e9IX^gn{aY%u0A=3D&P+o<|S3l1}bo2AYuU}pX|IY0Q2loe^o{QISS ze(+9|FTtDd!uhg$>;1%;fxk-K*NSzYck3W~47@0H8;f=3D8-8v0*;w!x5j$+*kkCLQ0 zGtevjZY|cG?bXFNGw`(3-BhfLdv!Wz1|F9>*#F&m&f)yP7AZTrST>FG1M8&>S$*7g zQw2tT;6f>f{@N{{;FX^tX55V`pnz!)%iFx@Fl4`t5}!w>fnq1 z1*t=3Djc2fthX3wK`zo|N(}#q#I8@^4FdaZlzw;g#Pn zf}_ZKgz3;!X`4_qv5=3DM~Go)~NaeoF6z#%JHtdZEyF=3D7fLxY8@lD!d*w5w z951?CzRoL$t%?#w+A?p2SB}g>lz6Gweu-Ota8TgD``(3fsyFwrw12u-zQAk$cigEZ zlEJ0vPRx^O8fl4H>4cD zKH--ChVuh=3DNtt-r;6BfNz7f8Ec)2nIO;T6fuem?)>M*C1qz<-Iw;y|T0nQ9Wr4G@v zZrvuY4)Z-m>hQ+6b@zC6IKNY*4l(6!-L0G-2uc}pZ@XpJH7fgc&UBzm?kvg&OQ-RH!DL+7JCe~p1s}x1xuR3zF*}Pq za7BK5&X8xV_@qFmze=3DQpie}yZj{E}8SSz+KBo>+|mFNDpPkskQ&ay-&HXiB8%+Y_} zvhje-l!oi)m!2we9%#k=3D_}wq@#qlD;=3D1!XAs#QcRG=3Dplbhi4|`_Xu9NHX>qet zd~$?v)wM~3)V8O|=3D_-}q+?gP=3D6Yja;x3EMMr7pyC%P*O91@Nvr?;^$r`AB#g=3D{Ujj z-gJE=3D2_E~UF-7B`gGnfg#uS~HRDI{J|JicKYa) zgrbl)SDcRpA@Pyh-!0gEQ+}D_Y_p1LdcZGdsHO1RTbHcz@=3DzmZ!VEr{0PpzN((0r}mBjnZod4V9&w*ON-8ZB@v7h~LTK2=3D#;- z`Ezk!X!X~-c>Lt-r^0%A0C75+9fxZc(E*50Q|+@v|1%QNsIh89&G>7 zR!@GIhhNL_jT$YsC(PiBkiEK<{W$Q1*!5v}!tXgDXW`?}prDPV0}juiUED&*1n3(j z*$d{46Zad%UX-Me)WLhFfv~710e#vAj=3DN-w@m=3DKFV z{8^Vr^`!ISIe9ScQrbV=3DaQJ%Q$%C-zKeTvOaI+CDI6o-2y5So1Z4f>zeg^KxFP|za z3*nbzq7;EY9K6-cYPvnCq7>R$1Fw@#e%2YZ^fZ1)=3DD>m0nr@NWYN!ThCf+K!Wv}y@mpt6)uS+Zgu;uonlv&?9#h@LxXQBqoBIU&p((x8te-xwUcY zAK+c&?`3q6bO*70Yx<}%_+v64O)Tt@zT7gJSU4B7FJB90M)E)G*ZUr*;=3DFU0HxFcv ztR`e%560(b;RSKLz`}1H70y7s4&G;-6Ll(_1kMj0_|zQyBj+&qPp+jsoDmzEWPI~1T8Eq%uBG2| zYVd`T*zs(7a(?5w67TYPHwjHc)F$$&O~Ni%Y5X>a6~hh3tvvBtF4kP?hkUEA}jIva<vlB7z|Ea!nZ8N$)7!Y0I^VRJ?Lb0IH6~; z!r2ndIP!PyJWou%nY4*Fag+1tq?^>Sh2OC}d|SMKoOhs8fXsc8%fma)!6V)L?m~}m z1~o%ItLkew@4Q&p2i%j-eUlFyXyz6T9@*H9Ezs#J$;3PRew-oI#vx6^Z|x@4(>UqT z&QfD0s6*vBo_E`9=3D_B3?v%eH?x3k>h$8X0JPuuLP0fSrQcU5WCVrk#ksqK5JQ|sT{ zsr7H~)cU_2Q~iJM)cVCTGkaB6VBb@gzV9jgW*sS>tUZ#$i(2mLYY4H-uD@!4ms2CR zP!liEkW0p=3D#A`Kpu9bKi(FU!Eo#hs);00Q<)JrD+5PnZ%I#v#DPL0BfCQi3vAJz*m zA-|tDWPcKBh~HNcKi?CdzS|%L$};}-N!_mHB4Jb&?O$#jDk6DtzH!bZr!%Bve*}hr)9#8m#)PU>tP53NEI^kEq{P-u$O4MGf#EVWAsrGsVO&nZMvi9atqLfxoUS#8f$xflL~dfMMJ zH5=3Dj-E$O0cj8k-u%v!QEoPghrLSEMkd#3I}q-k2#qCf4&$xf(jD6VH?z-drogie4b zDe{%7&9OpMn58y1yOCyMC6ug^(#nk*iwvKYtmymjc61)(dm(E(TX>^nKHHd3yDDXd z8E2=3DL>&h3LA{d+|Gk#D$pX|PI&UfNzkr<$T_66m)q-I#72 zhtVboOA~Z%a;v<4|BG9dR8RYd-z@ocZ9wfws$HSN?OORTRyRJJQ2Vl-Ww>E(miy?g z|Lcu9hzz46Zqzur+v>Z88?`G$Rl{%8xJxmQNzl|4Z`3&PK%8*<$Qv~rPoO_%tl|Uz z3dPelw0Y1V!OI4*LiL4}x}3SJ^NcQ^`~tx}h+rBQd8x$kZ-+0(o$)r~9mEI~aUj3L z9lcGY-8&1ATz?{>=3DukWGosuUax=3Dz|&99qX$IF)73CDU|@=3D5sClY<;slIoWn)%I*Gy+7asX?@%t^0y{?@ z{^73YdpI`>ydP@D-br*u4KTp5qrPsR1T zGFhouy;ZTJ^|ZKx^3 z>0)_{tm>?|k?$LJT10<2bDnobeB&$Q`bRHzmV6}nsE5i`Fs^^p*QtFdJlf0|!?}}- z5H;*8zr9oYu(VVA@b{hChkxwUKKw&WeH4tTk2ZH|A06MReR#Z#KdvkA(HoZj(HsAP zOOc4q{XaOArXC?#-o|O3mafR19MS7?EV8pVyYg&-OF2Tg5A|}VuRuKp%Yf6Qj`OtL zU%+HS-%;5`uwT;ZMz!xZT;uTRC#~vfpfZRy9#t7T z{3OnJ*t_MWIE9=3Da#4lGBcY2&em(BPVcG{~)-dxlR?HKoatY^l(pdFka1h0HDx0H&n z?D6Y4KiD0Qet=3D&}@{N;xb2C~zDEG#r``q&X*WSCwM_JwZfGXK~nCU<4*F@hlaGJoLDNdH-@b)#fHA(mR$Rj)GneyG9 za``TT3_2*DtCemL^zvY7hyAv^gTqQv#kAL)Z#d*qvSbx)z^#XEW&&=3DOjCqoDA84+i z^myo4%ENM}|GE|ab!)DLPHh?PdMOwEgIUTpjzAyy>Jdu7PUt;yn3iY>7+6ZZ9rDmc zN+-)pbi?;i%jz+-etIh06;bZ=3Dn7lm7RtNlr>oXSTG~`J>sCAK0_LH7R<)>(-{9AB3 zSU#s(Zlr3hp>!{KA-gVDQ^lgn)B@NXBl5tmlyeU2i?4k@XlZi>fD_L-VD@%W$_?7# zX{J5{8p}_?659}H>JFbV#Or%C?ktS0uMVMYT;5h*^KP`{nGtf%@tLKa4%p-!z1Ffi z=3DrnAZJSO+j6@F!5s&RD35K}Z}?=3Dw3ypwAk>K1-L_=3DfhftfJM+0$Ni`sm?Mw|( zBie^{=3DGu1&WMmdKY8~tPbm!3wEwJ~$JrZR@kVIB^lH38ih*W}6z4WVoF+T$yMbV^| zg9P^gvbs2%*#_O3Z>lxGvUpl%lJ^7SrNFng%!D6u_)=3DgEB%Gnx7fo1Y+Y)RgPLQ+I z%~nMb8^jpZD896pXbanqT+^h_EX5o05^cT%>DFAyb|`R5LfBy&Ls+wVT6&feShEBk zaP9P4-kVEbrqVl@i?=3D0`3!jxLW?f_EVw*V*@ai{o`YP0Gf@;qv!D`q8C<9H|Q}0;~ z=3D_F{M&2L~0iAC(4()!x+)3BQR%J?zxkj6j7KA)6^J~#_bL-~oX$6B2I2Fl+y+g$V! zKD*{-dBos(9=3D2Yb2K&gYnZZ`P;oGc=3DHuD`Cl&JU0_mTsc>)ao)pU*7KHxmi;o~>Bd z&{0Z~`2^p=3DU_D?VJnkXS(K@EN)U(z(B)tK< zlywH}ydGMT&be&;p&Gutsr4&p>lM2o>pQ*%T9C>+xQ(N!dmv!a*wUjJIZR)ZVP1hh zQMl_vu-!=3D4!&`>axZ?;t#8_i>Og=3D$NIP5kai@(EcutxYWLAJnY+@j7g;8N$G#^2{z z|Ks_O$}D-tmOg}gB&5#(dmcJU58;h(to{I}{|xJY?Xb%sn(Z0$Jmdk)Ei3h$ki*tb z-?~@a|9Z4(&d4=3D2h{%DGQCmxzJ!>>dm>@l#@=3D% zxbkhcpR4vhL%dbsR}Wi1lUeJxXnD!6Iz+O>FFf!|0Lt6})0-^e*~eM=3D@4P=3D=3D)p2_< z7IS`r6n4wcjxr>RTi?{MG;~zJnHx#_6Al`=3D*C6+T`6&-o%BR>5 z`KzWc^C-%bo7gS~;3Vu)%!bDx`8EDflQKZ_h+d% zolI`jdi29oHSPet31f~MG-GwJFj6&sFYMj&7)2R^{%4K`>u0;@u#t8wiNG46o< za&shedfcJqgEx&kI-yzIMusUe&x|`Dox`nG@{B(|TAG-ZHWIV=3DEP$_zMmg*NE|R1X zxrAxllW7C|YUK@t-mkTdF;a%1MygZ})2+;D6Ebf7VZ0Sk3TsGNc0qmfKsVbjhsnat zi}%m{+^6reHO~*rIDLsj|4!e`mUHYWj4l0mY-x{&@i+Lyg9TR11m9_wF~y~LL&`;a zfqRTzd)H4)p=3D>Rc6l+d=3DqbWKWimv(_f3nAeGvIsQ=3Df6YjX%gR$@tN>ryWHZrN1dG& z(DU`Iky*NCyp_jxN}tNENIB_<9H#rQ#^$U{3EuT=3D1H%pJt6YnCzcPKH7`9oIE*AE% z>Ls|GbF_|DHID+%ck!{b50d9h!HlRCj+sn*I|ar!!Cu)`zEUuUab88&qw^B~xkwYAskV%eGm{AJ0ofEAO;-nJGF| z&;DL|W;%REXNBF$(vQpRB>swCdKWL!^Bkd<^KWuv-%#l3ZcOJ?ls7`4>B`bnKl%d54zW8 z=3Dv||%s?Fwt%v0tUlg!sdUo_2@SLmuSVCw99X{o2|K7-s%BH?H<64We`B<~|9TTyJx zNExSD%_8Ywt{pV>hBfT`u=3DN;vo09;_arT))ffmdJv^YW;)+%29pXSLV#^$S@YWDY& z^G|4Q!YFA8ge3&)_9sDw#44UWrhJQOpKyEAVgW28CB;Vg=3D~@8GbZo~dxshq^4$Vmd z=3DNJ(0bI^c?CntFLA*$|6IoaD_BW~Fk4}`Ax!02U`lTQgq3Nk%E;ijtRoQX@5myWl> z-)7-Xv#j$%)64-6S^CKO7`L{!ptW)9DTeRx>G;3$-DXqN{c=3Dqh|xLK!160m_W%=3Da8v6~n2(9!FQK<2XRchvhK+)Eofx8&Mt->vI`4>jkU{{oD&_-1S514X;~BNjiN!oKHh=3DZf(Y4ky95OU| z_2f`W&~h249R(*y-1?RBz>W&8kRc=3Dj85|CUJ)tzzF{mmV!m&Pp3e zb>6}@NuwO5OVWPqAoducbhO|J3N$3x5WiktWnHbppUDy}g{)Ie+Lv_EgQhoGosXFj zWPF14+(wslVuhUad4;RVCuRXN_ZxzaSOVP6E3kG=3DAsEgs|DGw5u(yMeGL+sOYFhpc zF3;9q2Mrj!^#&g01Z!#YZFBhv)0?!%{xg`j<y!iYF})qW7($*yzxAu zEClEH-te(;61HN-TY*zgh462z)9{KVxRrHbXp^6lYPOgPrEL!D@#S^NG&lvz=3Dke-& z%C9_lC&nEZE$n-Zu|H*F?8_cDmR%qT0Z&HijNp3&&tJ};^)>L*2Ro8SG{gtZ^Y85W zTecD_5*P$VVCg>tbCAQd0g@xQZv&39L>GJ0qs5S!()b2@1X=3Do7O;=3DjY-fH94IQwpU z4>>qT-1?RLTXM)Mx16fNsJz+TKm=3DATI)(=3DuHdXm$_ezl6Qk4fUt~rLYiERM3r^+eF{JC=3DCo?ML{@SLvbhHS8| zzXBG>%1X^;BXoq=3Diy%{KuLd2PQ!i;dN=3DcWQNP>D(0-EAcN;u6#0@gg|YA+ykHFOHN zhfCT2hXo0dd>N~_4@+}pvfo|{{-bI*W`>eX!uhh~{Rp}8Y%XmvEI{Vv|F33xlI)d2LD^K|CK-@F8_m!Q|K z>uoW;UU%O6?C*{!cn6D@SG`YqsAztD(RV>*^HUMlN)^V^cmOmNpCM-9#P|6G`TWAk z_)3mme^o%9{o?>*y=3D^mJ2K+KbhAFyBPx0RSfSF*5Lp$gR#ccmpNoFXV`|KIH*SXvj znHOZ66W*H?CJry3GjMAy{=3DF$OKR0pgN=3DTZ!E7RS?xdOwvjF77q9vi)iHx~6?5tWJ9kw`!4f zBP{W6FJ}Kh50Mkr)-j6Tew_dAvUdsnnms8D(^94a#$hvYiUma5nlSQqvTV|S$WO9t z(r@KMOnd!-zW3R7Ep!fj4r)0engMMYjiWtg3gO^6VVr#_>`=3D$)_M=3D5C^8(+8bi=3D1v zxBgSsIZaXBCLglSJu^T~_k=3Dl=3Dc|vAsX4$9YDe`SKlFrcuIBDRU!&9@ka?zvBMiLm0 zRbJU-WaQC>Y+>gX^Ycki+Z$vZT_xkzFHCPI%P0V1UG~LvXQz`MOdA8ZKf}V0ztm6V zrqA%1UPG7*GEdkX5Mx;RQL_HG>N&J_;9-0`GQqq|v$NBc7P=3Dh9TICvIpFm4)(Rl1E zUl13sFDwTm$Tpzcm^;9CCHF@eHf`baU69j#gumhA*6IFVIX`!&i8g&( zOXWRk?f-p!UQ#{4UO+{~9T6Yg8ln(y!9Q+BPa;~UjUd5WquHHJ2^yri4;VwY^; z8LQ+Hcb;*GGSHPp8B>@JkFLAxCl$al_Q@sebN=3DmmP1#a-$|oNv1K63gjkz~&HA0K{ zggs-^fZWTt4yK1Jf&Z*wc#dSskJI#K;6c>sp64?%k7E`uhhL{*i)}#3to1GVW$TsH z0;XuK=3D3er-=3D=3DvL5#zlL1hGd}KrVDZu{RZRm$D96)9L&Le#Ku(VJdoPEi3roKu#`5}zIgvI- z463@=3DKF7M-_@Kr|%jII`nnrDUu&i=3D^XKbk#)(3|{`2rj-sgrTXXF7~dkKgdlR;NS) zSoUhPNmjsGh9G({<)#hbxXOjrA4k_&*7!V4gKtQ=3DXBB%5<5q_gYNwGv<8Y1F$anz=3DN_)jigyAAg3^2m7=3DsH815~=3D`aYl5H&DMm zNgC2n3akQ-(&6uf#N{l%UrDE3R;dH{Qad zy+M!mhVk`!wCDMaPWN7;6IfzJL0&)ng1=3D=3Dh!0@v16M8I9sQJOUd;c$F2f^y1^ZuW4 zkN3?#=3Dl__YtdzQe6@cf0(Oewi(S&7BdK>Nn=3D&ypiY=3D37GzR)3)05364H+zX(9PmJv zW{%%bwEu6MK^fn;)248JW0Waepyjc2=3DJ`@Jy5{2fua7NdYoagf6Bw4g0m~wq&bb8E zHzsegcUOned70nvLZa!0{7R=3D!vd+`R`rU(-h@F4svvwaX>)dzDktD1iCitA>9x5E! zvd-gv!Tkfx1|zcQ6?vbMt|y#C?kx8hV~u=3DmPKN^<#y?=3DmjQ#h&4uMQfl-e z{TZtkr0j{vDyqzRrR(sNvCPa6^F6N3NcaGki^#|Ls$W2*`+$-w>`NmT>zFQ3C%mO+HcV_lw#7PGRKiI_2(38-9y3 z9scB{hvv;U9VaxVwS94YL!>YIMpiqMfB05vl7K=3DBT>w}-M^Ph6rWbhB3xT|b3Fm-g1WgzlC1e! zVaQ=3Dia$n-s$7R+!hMPh0f-{bUYXFenI75lzfnxZ;J2PWoc49X8R(ol{ki*o6c~iIT z^hL@(IwMiObs*tPiv-^X66M^&Uum0ygRm2By?Dlv@SHA@aqBZ@9EnAz;V15i4kIyp zuQ7s?{84B~TaT#O9f6H7?6-&0K9ni1vmnC{{pl8rG~oSfKag4L-n5tF8?E2K61XW4 zM>PKw_NvO8J3Ckc!qcov?z>me47r-hvA*3$blP%S#&QYQTYR7OtmTyOi^6;tCWkDg5t#c$3^crLY?J4(Ye4hO6QE1 zvaAMhzs2wa;kR+WeSa$MH@bsm5*85Tms3Gl3%%>4kB)mK~A5x<{nYvg!QTgjS{z;q93p{wevLEN6#k@zq z!ju%y7ax;x`urJ(*LfOy?{lyh?s}@j@Ot(dL(oKe{EWjpi&Gv+3-2txQ$3|MEgnL9 z{;2K*-UMS?3-92&*!#wAPRxar`I~Cr^FkC)+F;fdUd-JO5Q^ zxv*9I3aU%{y=3DvFC%Bu=3D?ZMi-%nt+QHoERG|YawpE!2Sln8S)vKFLF;`nA%444C6cl z=3DRc|QTS>#x6<8_KV7{F8w@DRgpVtkH4V-E(IBUWO&NVbWyrP=3D@zS_PWOV}eSVpVET z)i}?1Wnmi7B_);x<~Ti6@d2@SA8%J&Nz4b!0=3DSCq2j>X4n6zQ2Hk20K z&lF1VC||>wP&8RMe~)|9h8OZ+>@St)4|XlojKFK3@Ik&o&7Zi){2^AQhRlILo~g6- zrt?=3DbOK7a>F^v4en{Dn$p$t&@5c|7V6qBp+GsodrX|N%~oNG0I;Rf{``5wx*8o|`AF=3Dos+mILars{3H12}`2%ktzXXGgoV@ngDxz>+gMJ38-#X7dvzvM23 z8zo%I#wdFiOhT)6gvKA3*b11`0nDj%2K3~9s%1rgj2pemQJC^RAC<7itMVxiDK%Qh zlul2>QDRM4V7nzp+y)&b!(keRL&mK)SUyG&c@JXNms}0|=3D^B12y0yZzL60l&W9Hx+ z{qf%-&%A>;zmKOoj60x9gubq0Ey!VNfewq-(1+aWUfEXkJ-LZy1Gc>ikK|-7m+apL zykMUga{CfPC7Rb?&KS%Zz_sH~>oaR2ZQOzVv6sE6m8LrlXs2!>fgO09t+oI02i%?~ zNiu7~6y+90!54vzr^8SSil5t>B> zK7F0X!_UpkJZdm3E6d{kaXiprJZO)>Kj|^B;0*@S%;r$$(X@CFtzV<0uZ)*8rIYFJ z20V=3Del2F~_i+F_?umlGyz|P~(V5E)jKn`)y*A|_`ZC&oA*3=3DL*tBT-%fHfdrIh{^& z4Xk(5>DImpna5y!*6i#o(K;BAT>)mx_(<8Y3)%&%Vax|MPjo7oq!FEuJ)vVKqdjGR zZ*zYQctcWc-)f#nsyqknJXni$SLbrQoBOzdd(^G-Igjti<$Fg#KIie~T)yp?2j3;| zC7@Rb=3Ds{j`KK7*gX3ZVg4~r;`stbBmhZ&eM;;@X!t*-s89&y|p_w$Ie)mo!mei?F8 z7*o$viymL}C`MkbI%xga>kv5}>){joBftnBd$-J5mrSjH?#sG;Q2fW<*h8g>F$)$WJ-V0dv=3D%kjGI+FGt6YO^$5RI+QpC3kBzB&_s zzjAV`FG*XCq}%5^R)y8>iOXU3837p3&UAvA87YSy%EwcjHf%MHReN@h-bl1nBuhLq zJq_?04qcs!8FJXMaP)S|s<=3DrGJ3frNGwbibqVY%5#<7j$lBXQYJ78~mHTyGX$dcn< ztjf*0N_&W?FzxhoS~JT8Ow05c$9Nx|A4dM^c~}c)5#41blO?H2dRn#s#xVZ7 z#>Q*rd|038H-N{N3x(b^q-&a3gAaL+)797sYgrm}&d&-~J*^$JSAFTcvSpsAj9aHU z?ZenLbG~i+AvKq&y;d3rmDsX;;@HZs%{%RqRgU(w?^qSf7(@1jIc?`FWY!989XO`F zkR4lD2+tm653I%m9mX*mhMiL|%u&izvwMifZ(@CbJT2|%=3D_UGHLf>m&} zAN?ZfK0?XaId~4bDBoy~oxb$v@{sj9<0@f|A|TmBMGK~JTg>y1P{aje?!HK@aTOnBzWMOIcx;4LcOYaH{*Q?x`L0;SLTmY)oF zS|m%@ukvhp$O7HrYfMEfg$FQXAvd{AZ*n$6FUa%Oq`fFh zjW+hhxgNA3Eg=3D6V8?9{GIJS}=3DT+|>J(QLo>n5d|fEwm+V9IK`WLCLKslkv%qk1aj6 zR>mhEl83Cd|gEDI!EL_{{Q4Q@{)FF;}v3Jy{`SF#V+>1HDsIxp&c5-jpICilUmN}gXw$Sm1 z72u&IUYGY!rOZyghSJBcO?M*S1t%BERp18@xWgtpQv1b*fwG2W8vL586ONe3f4FZ`f^+6h)uk_)U5QlGFH|dN=3D=3DFm^MJoOAGMU z5pwps(2Kh;H1kN>II$5vwNGr@1DMxBNB0QBC0l58Z0U&>8K(oPJeElKg-R_ql54B) zL{*0{TWo%I8l9?(%uu*>_bV{H{Qbg8GmQ17TK%i>RZYxJdx zQ0vq1Tl55%{U6pVW9v^;%eeJ2Y~7bP$hXrB*1^Kav}2!ClwR1ov%3pQ&syJ;6_%A| z8S}AqC$_RbTJH%yd-OQMmJe01?*q@T$F4o$m2tYFL!1!$ZULT;t*7R(UhuO1 zm&9tmsMR*~l^nYEPMt;UZh0o8D(L(UMgY~bv&B^kq(|NM!z z@WB#@v*Gio2&=3D5-4>pva-RBpX<4i4jMsA{gcK9U&T0Vc)(S58d+AB9vT`m@S8js3h z`UXNxkzl;*k{k8;1Bqwwkk?@jF1a3QA+;=3Dr>6qzFLVgw28Rx+dh?d=3D6X`aqJVU{L~ zY&nlh-e+6LNV(_+xffo#E$ips({j_chwEB|{swf$M$_wsmMh~om%zRTV~V9OrhTsf z&lj2FR6ZV=3DU>iho6R|8s$$2f48DW~}CSnP;l#6af%S&F?nn`;h&j?vW^weCKU_B1h z{Oj{9#dxKRTmOgk0|ik{7Huepy?{8K?VG-}zxXicqcnY89o zPL(W3^>Hr0US_S+x%3_IxRm>9lG%cmTqd&?tVyYoFOga6^T5ao>~9w9ThLDj&f${Vtrz65<94~-`k@?l1mt$>2Oeq4trBrYy^)Y|53X<@_$Fy)>7yGMDnmMawjDDIK|#AG~PFVp9ko zQsX>>=3DjH03%1w&1`AN3JVtfVk0{BW~>s-~=3Dho+Z<6rZ?BZuGkR-cCyUOMO&sb_ySt zm$1wG#LHM=3D#s@j|f91-1XnJ|PCg$M2j5R@*aXG!xdc5;Frw=3D~jxy@{szM3r#%>5DP z*`LdEKfGZ|kGEXsA)SY%X{#C5&K=3D`CTXT6HklD#N_L&W*EnjK@%MPD3J2OeZjk9O8 z^z)jLu&l{dN?rqWWDj63WYVZcQ8YiH>4W98 z+SZaWy-Cd!E59iE~h?KObyM#Am;xH+~cTNZl$y3RkDu2S9If)Kne0~)^CrBq|&Q~&4O8S z38$FFI&xX-RkoH4+gQ*quLZrvhRa2kKEnoKi2ybdjQq_t!5iE z#T)p{#98scgf=3DfZJ8AMovY{nYWmr*lD$c}=3Dp!;~-HwsU%}KRAYq?q) zFl)sQt_AWNp7Bze$udhxrbYfFeN4bQ-!MTs2kl^+e(r6YqlkTby8J^1GziiD&&f?x zoNLn^-1oQzjDb&wRsV_l$`8w|_0e3|s|a(Caf$27?g2kJ7xycUgY_Mi|0Vu@GWX4z zCFMKe)f6%|O0vDM59wpV%^G?8b9u(NjJvtM`DORWVe7d!&1-PpmRw$z&vUbVHEWFX ze)UcBLRT?st<0@=3DXmFfNi%KPZ`eEkb8xwJ~+HZi@G7)DhEYCojZeo~!e@j`I1$_co z7xb6W`l5}}L;pS>9M?N#m1B>2ItgvU+O+q?R;5u_G?!(L5c&_We2rbW>Jj9f_v^Gc z0XZUNEB84r53)y~h{0|#@71CrS>b>@*>kB%`kt(EplsyQxX-MgrB7$R$~?RqQZDwy z4P6Pg4|P7petwicu^u_hs})*fj5W;y4g=3D5K$d}Lah|aS!Z6s#UNZOm2Nh4{IaN#fe zWn~#G_V!(+bo>`{CtM;Zl6Hc~T%5_`{YV7nn`gI*kJB$R8FLXXR9%_QQ)rx^v9ux5j0oxg{@uq)}U zN?UphSjrWkbH2tDc^98N9o(NwFe_zWlUX7)&al63&$5m4&iqx%Nq0gE!5kU_yz``r z>2g^^--T|ztfF^v-#(G+8}9RJ4m{?aLj<4FX(NfzR%6?lbi!@|Y~`kXuujYQp`*;X zX20J|47p_pkTC(wVcIyI`>GmYD=3DeR~EP25Ct;||GQ!e@da73)ZmCOw-djj~T%v!f` z*naNqCv{jqhcOmX_8}eC#d6Z?i|)_M@33AIe2WiLIVe%hh9IWNt%VM=3Dm1XMGmDV3@ z2_5EqXgMC7o2n!}CC*wM@Mp&*Dvjqd@DFmQgIywc3h)7+wSa>zFD%V24`rbxpxNYG z1MMIxYc>Sux5K%GI8E3?I?FK^l$ql@cHk`5b{Sf=3DW(+)dq37G*s^?QifE2ioRt_SL;*glnQ07 zIW2dcgM+O14E=3DazmkD-t^x57eA0~%moYS2z0hPmE_wGt? z6*>2UrkYNI4I|H!kQK!FU-lDd#En%ZF}@#`A0vmn%^C#jzQ$7QJ7t=3Dqu<@&$4*u9UTKO2L|9 zu6Hw_U6t$AjDOcQ0sQc1u<)3%8hViT30f+%*1HuQpFNVmkMFP5cW&K4=3DjsR~%>gak zw`+RycBRV?4!5j;6?ZjSmi6-OWt@x)}uUGp!;C!&&Mpf@o@Lk0~)^YA> zCFk&wdpM>Xv_REQ@Gq*M@0sf@@C5ELe93{r-jmbzc!_A{DqHdd{mzfYbCmf^;?k`~ zVvf(qd=3D`Cs@u%jH8V~K=3Dq8j7EyhV)GD(Sf!E54D(MDe)a&NVpo2yI8Y{~RkAA+}ZF zdIddg0BvDoZiJW;K5c|cIdT%y!_#7UhGtR zofUzubW#pGzQbd9wLOM?+NHB<2-*B2Cz4mnYNw;gNH+RJay#ZjLnKu$TXOx`?-8z{bV2w_@Wq4j zp=3Dqt^5SXKS(CPl0IdZ=3DjdgQk3-1_%;&G2th+T#bD&ReicYqg zGvnPhxBA6zD4zlIN+E+euW}JAX`U?ml&rFzz-|8My%=3Dj~!KL#feW@)6tJb0EO@f|^ z*<>Br8CSh&nSU#@tOxuQW?4REy@C-)Cvk^>7P^^C!lymFqa|?1!1|m~KHXN5WxWi$ zU4S(3d-x1Xz2tV4^Xw64vSMuM7a_+8*@m}RE7%35H}ed}>g8+Id1J99kl#X{5_nYF zOe6t^&_A|WidH$l-QoM9M_$J~VAkwadaRc9QitM!e9@!x{}a}gm+{=3DnS2Py=3D649mb zl?~6ArMdO_HrB*%wI!i`3lD)u(6Zk=3D2RlARMc`>LPsX;NVB4L5BsR;3pk#tw$HgfR z-0pV- zGMUQYeAx{wnla7mEvxC0rIt?bmN!{hPVHiuG2k(8C<+WY3W^hnG2Z_{FMh$@RFn|)rT zUkcCmR1nJY{4#6(TH#tG#&!y7Hn`6>alOEy+f=3D{h(`1!@L2iML30aAa5eGL$+!E}u(g zt$$|EE?Mh!Tc1!<=3DpO}Mj^021>~~`AI}TPHfkzimuuLQA z7^`GX4roOu#!8{@YyG?#enPN%mzU35Y4%ceGfal zNAf8tgR!t)0G^NW;9Ei5`UZF@+E#|rpERAt=3DIRx56WRhPnm=3Da2dvgA zA0dsbEd~nXQz;KUk*cIG%j4{A?5R{arvvttqpVEA-^4IMR>~oz^@^7BRJ`nhcBuV| zoz>(8-Bay4wHJ%-2h?cZ>7^#DOcnQrf?TOeYLLfiiCOLiofURsam(B-_gSEQwwPCV z$=3DoAIm*MbIlf$p*s#{P7@1qK$qWj;Ze7@6ADZ{Ou@LHC30D4vUq5GlR^85TwTI^Rl zO0Kp}OAp`rYKT(z(lYpGFPij}jV`o)CKp*_awE;0KM(sm^)QvrE9D#;sdzrlHH0mj zw`>91YC}(10_738kt*iTlU3xBtF0HYhI8=3DycbNg!rDnSyz}9%}%qZY<6j(7X;(HFK z$`Vn=3DwkH7mf5~SU|98?ZIZU6GEEnr1s+w=3DgDoUh@eZXXC4kT*ElS!fyc>;QXkmE!; zrau7koZy?iVBPozdCCI42%PnD`E>$^`Ljn42|%kMmbdYc7p3a)?vUHzUzFafDGl8W zvtiRRm4Qu}XkT=3DDaaW`)OS6 zamW(ubQ5Ld(PHRZSub$NBOFqZk+O;^afuE z@>8W(rxo}fGHbP)LOAVl^FoiMfk(~D90A}xudfqA|B8wK`T;$opPx3PPmooWYjU+b zIjxo!>sjf5C&kF(OPa%@U_6Y5Nuhuxhfc*B!zG&eOwuC(7^ny}%d zk#QmqT{^yp47xOR2l>Za$j!f6(|%(Hjim0NR^I8QDu#d9bX<1I@h^ zGQ_2BPIscz@q;L7yalDEJ5fXG4%#x_qf6~h`*f+BQ$RcOyu9TDc4j+(vX)a4YjiiQXr>x+5%hLn!a5jD$*IUZZXMsl zVMeFwt?K8@@lv#iZ2)n~@jbeQxY6I5CNI;`JJkrxL|KarxrkhzozhKn@9~qT+&{X- z$}DL0I6OP=3D@ss-=3DBBROQ>1;AOXEgabsfjurkaJ5D&Ntm!N7{$Br44U>>|1o3e5y^U zJ757H_2ZXW?{(=3DhDSa^GC0>(Z3)q5`>sZ=3D$hv^Z76~-$M79wHi zu#)O!)#U%xc6Nqn@#rE0`mw~C7geSZ&=3D)9>a!ys!VG~kXr^v%TmSHLFde4=3DMH;rCr zkl$y}=3D#_IV|5aFVh56)0np^H2y^0LrGZ(}u+sxkqe8#;LxJic6_3O^j$mrW>Zd3ib zbN0Ee>7=3DmjydV;D4|Mxj_;(_O}U0KCKv4kr8adp`*ymDd0~~* zh5YiA^@{Qzyy)_ZO4v$YT*)|Vg|^TM&BS8bn5v{r@;J?D8h|%cwz_H<4rP~BuC!j( zw^{8!1d@z0YrT+bzaNm%4TyGJ+1djnRJQiG6~lxcu9gomCBIA-b89bQn++c&2cQY=3D z@AA0yN*QdXwxt%(k5ZL%jcg%E^S@taX|8-PB=3D?4(_f<(xHLYSvMM#T*2i=3DHul)9U} zIKayT{A_)&xiXWG!`4fMcM8jTBYlyQj$1!TpB^G|^IzL8=3D$DbHP4+vv*pWw$tny|aOK;}s^l4}a$>AA2ay!+@;Tii)V`9Y-k%7#MDeJ-Qv;I+0zcSbhF26AW z&+4#?|9ol&`y=3D>LdH~eE^w5No_kDlbm@s%&p|?6Lv!rClPd6D8bB`8J%uS0S2fRJa z*xcdEJfB)X<*<2^9?CpTF267Hd{h0zMo)vPow;WFnAcsLswC)sJ=3D1 zE+_aQUrHy?lk`b1(GbQDebW7L(KYB3c=3DdqPx!$bC7=3D!A0&bmmCuFv%dxmL3$5SE_L zWdFSOd0;8|Pir6O^A~I1=3Diah?%wdsPYm4-d8{>`Lphr48`DFf_loce@7^=3D}L7?~2e zmmC;3H9EYr1xA#|C&KgWLfNWZGif;Zq{6HMBRZ%`!3N} zq-E~v0WTMrG5paQpE%*rpM(| zY?~FQ%?bH1`1%gmLQtizNmbGjd7NBQ(!6}@Wp)xiq;T$Dg>za~S^okY(5x6B@T{Ms zBpK|f+3p{t%WZz@n~kCxFBu|(`|P5dcocc>U=3D+{(tC~gbO#-_iRm_yZvXq-HXZx}b z6PYJZVrU)R)Fro{hnTKu6Y@&7z6zH3VSm!`!JOo^A%;v-YyKQb-8V@mwp)8cnb ziN8&z7++Z`pJdKU$}}ccHhU*l9`WikEPL*g_Q?qyaMN$N(@<%ulG$^&vS*R(6GHY}4eOVKilCKYE5QqXtD zIS=3DF_e{I_qp9Ccv(2-|EZgTkGAK0dLzwviyBWyzREfO|EHUUCB{Qb1=3D75Mi6$L$g5 zUce?Ro{bH}&xLP1mStIXI6n?@s~`DidoX@mBzlY3ABn_8ckp1SD=3D4~y@nBax*iBSY zDYi#Mn}3@f6*w3O^#%6#1w~~EZI6h9fxb|8VS;>KGae8255z;^10o(#<@ZD*{bDd2 zJT$=3DN+l9st4+Mqx(29-{qJem{VQ_szqZo)sMLZG_eSzqKAW>_3`;PWTu_9I?s5vs& z*Db=3D4xabLmyG206219XfRADcw!;x@M#0G+0p`K8%yN1Z$zT*b}ZXt+-eu(yjV}k<& zk!U=3D~-Do28Dp#H!ke)~seXJ8(1AXXFU0of~wjE}R-)z6(nteCx=3Dba@)dt&HtYxDIj zBG%O#><^0S{e6+HTSP4Mo}gHbr)I4n+8hY=3D1-mga(O{rkwC&m<4o3P0`!V{lu4rf=3D z9*Is%)!HX^N1`EnIJ*MzKwsp*g=3DK~M0|$a47VL^gqQZM&ENU8vhWZ21!-Z8Lm`6|N zMr*rr#e8eKp2aPC!{wR=3Dnh7?r1xO`_XiGyxGYx^-o^D#EJSM zfo>5C9_SB-{{O!9$ATGRz-f_W0 zeie^)2BXvC8>U2~o$m<^ z^r^u9V0ch;2jT%WigltX65-9=3D9qb7V_Qh3i>WEPIKp@($Ix7xDgMoN3D&oC?u;>pQ z65+xA{lTb+^r&(%GofHi1p4|Sw*lr9&I0NXHv|U6Zfx&d9B=3D!naiSG7oJ+xTm`kyX zHx%)xa*RDUn8mK%!SF32ze%Yel=3DpFxBT2N6jtUru4SWzpX*f9VTBjsXo63v86+iFjiqf(mHN$zWs>i)o3S=3D z^h`}o+auvx?wJN}41fRIT!r&;qXJdi0{eq~`KC5dTUZ?kYPUpsY?#)^3Av4RbkS6? zU^Ewh_E~&j zFc^yky9LkafncN`BU;c$lu)n{DyaaLD>zX}ME|Ou?~voJPukcM@GCSO-}d{-Z~yT7 z_jq_gz`Fy5_37+I6{rwJUCZ`?a~R&c@}w zRo5)5QwQIH-jI%Y_bq+>;mE+PQ9ETUK6vo9Lxo40Ij)8W@$zwL(Y zJN!G_?R2|#@44}&j=3Dk?t-}w_)ePbL-cu6;k!Ekr5Cln5L<6!6s9T<%A$x!0&3kG61 z4i8M6vao zytQ3jx2avE&b(lFu%sZSH9XiKj0S+?=3DHly0Xy1zNcM{nLcnMFhIQ6m7^sd*QHC+5j zgBlV9v4g2Z2ohrV=3DH32A(H`syh7Jb1#fq4yUePVCZ#oL1`Y-LLgB$fbzMDn4_B>-ttuh9J{S!L`*g2EG0`820nf%Ar11U{iwB}P{JhP- z?dIKk{jE1QH{T@eD+i#>!B8|FiU2Cw`=3D0T_x`KN}C>)B10)0S&HSp9)NeG4E-(WV| zh(V)R;cYn7_-21fNQm~}t%JcB&m7LCXum=3Dq4u%4vWoxs)k*_1s}32w*o0^Pt+=3D=3D0CW>4s8@Gy6fzJJXg6i zR~Dp+q17seXDb$r9t=3DhsG5c6SJ)yp!2nYIujrI)L^N<@k)k6h9>xeLsm^obOV*P=3D> zK2g0QB=3D%#;h)B5aa7|qat%mR9NKhTRv0$*DFOESG(AUhmw(YwFs-_ZuAj%i5Tu@^P z?uJA+sFfjN1A#7Ff(8Q70PaDda6T>3^4wY@+A$ahrqUnmk3NW2n9qHT=3Dbk-n zEp>#sE&N|=3Df4s#HJBj_K+!z5v#{6Rb*5($ixP=3D!v-!1b{ov#!-cBwN?uSEtxcpNSU z;pA|^n*rW#d;i*RFX8wgYF_-)JAe4a4gZGUmSw%J-`0N!M~-$-7(S24XdrTx63r|l znpuz2frxHYn`f}#+6?rF@eF;6wzU+j$=3Djl#cu<(l*Kgl()3(-@Ev@Kpd=3DLvk^hRRw zsW))FHB~{=3DN@;0tyRo(X!UFQt0L)iUFo4TwOzaQEV+CzHkLa<|Zhp{?dued^W z1>!+_En{M$3QCLpgFQXLXpCaPaCf8Vjs`+u5sKa#v(bZm{W-|4^W?WIQKP{BkjCYn z5j{WwF&JZlk?wY^D;Ba>T|rPIW^-_$QG_F6SL^m&t*W1eDRhEdyKo7e9v=3D$dIv9!` z);Eo|?K}6hweQW3kvb7*XX_1nL~~1R`;HsbfuQ=3DVLu|@g-9^gJ(XehF2pkB;E|P-p zNlagf5noTc0t11rQ2b)8Mf}aVczjjYduwuQ6oaMG^asL+shRN}3>BuE2}k{*Sbrei z)tifJZfUw8Mx8AMBb5Vc)JH@!h-f`yqzdc+hB<(&=3DHZwVv`mCgNuN;Q4$qYEDfR8| zyQMC73kB+=3DCtymLeeI9Mx_b345x0fny`rn@8mzEGB}DNzi326GD-^LIA|p>YQDd=3DC zx6sQ|h%WwAginFX*UjOGy>^A@ibwlu2g9NG6#8geI3A2f2M6M!-QHnMOkZpX!~>0r zvblLMtOy0o@o1lDB(ZN75F_Av`#`~bCy9N{eZfE!AwmeVD;_!+iXYCWZx6->`-8Rq zU>FA#(sK#<09{f(K$n;gK#1DtwOoD>rL-`CITwI(2V(=3DlaCeX~Q6a=3DGbvoo)ZuSLr z%em)FuZwe8enrIOUhQJEIS|!fTt>brC|A{N7mqOkeL4(!iYh_nxgpXGDkqQ3J~X0s zPdF5>Z4Gn#_B9R04)f^gp4s8LU;HWdahB%ZVAm~3s|q;O6&z5Np*1>xzBwfJ>1%H- z*P5GVyM1lpu1FMw*V=3D8t@PT+QO3vj_RjCk=3D?n9AqzJ9x{SRm6wxwc$ex!RsUSMY-H z=3DH5UEpfs0K2+=3DhV;C+C#j_-kJ@Zil|UAJ*yUtb5-yI{m%YG`ZME#0Ce5bGAZ7-FDZ zqPnL)E*dt}GD29>NN05N4=3D0N>;l&8tA&Ec5}blnXTdO+DK1r^Wi?s?T!Il*do!| z8)Cfwwnu8)nP^nI8ANO@XLG18SnH4Sl%p$R-%Y@_YTLrSq5UBaBC)Tne;^v{3dMq0 zo_aU82XD1g)p8y#uUV}y9E=3DyNmd&APO!uI6TjT(zZVew)sr=3DDkEErZ}Tv!)U3EX{R zq3*#zA5P(L93f)Ly7BiOj)|6N=3DwMK^wQ%&*_`b+(qU&&<4Uebg2c@1P#Y)i|;-pi` zSFn9ue=3DrsUUu0VTp8j}kcaVWlIKIzY`?hzg{Jey@2UAmQtgXM|o%u!1DF&jE10tY+ zE>m7E=3Dz}^VHEn=3D#!>MiT=3DS=3DHFZ>Sbsoz_MKt}N*3KCfzlz4xZY*Z(*14f*)|T_ZXe zR=3DcUKMKm|x#D^$Z)@#&ck&CEa1x&p^Agu7-;35(iONV;~o~gC9Gw%!JDvc9jAfthP zreW3R5KSPmAm7!3*fzCr5s^PzdJmeu(l#93D7ZuP$TyZXCs>US>Ot-=3DFe*6|kmS9g&Yp6nnY2xELIvJ?+~nOD+h* zU6m;wQ(~F};Z>mK$0B_PgQAEm^9 zX%7wr1H8GJXvOy&eaoz?t1BVehFLV5uNMP>u3Lg}riPVJi5Lv?Z7?3W@D9CJ3}{M| zqGSQ*?}-mIu3JYX0>5lhB-3wWC`;2O#XIewf-n%TKsK|ZO2lo<9ad+QX!GBgBf{B9 z3Ub#?rDrj{D_@^peV`+AJFuEmqZxjp>=3DGgn7zV@9V4$m)S*pCQ3j=3D5%8i_}`B7GNx z;vPOFT~9Q?jBZ8f3p2}J1j5~-WizhL6pIW-yMiJb8H@*QDuYc;&QpL%QG*qE0(7_) z-I^*mg;!qi0S-+uC8D#Rv>~9>gx+02=3Du9%B8*J2WWtmd#G`?5 ztS1-+$%<(igI&EU$6zcN)h)yAif^^y;DJayR7lrU?NRayF)+77{e%6gfLzhMX4{%? z@C$}9V%dt=3DvH}XYh;(%gMx(**JgIkopxa)bHu&6svSa z_u3paTnF72hzW2K_?erBjg~bUR{L?ZN4<~h_vpKH_>C8YZ>O2$p7}v_TgRi~pSnxG zlluK*_5QR=3DzxBEJX?@Op`c57GFFO6-sP|{K>vxNOH|n=3DnzdJ5{GvPi%kv@u7R#&OXTI%IEyzDW2$rJZJXZ;*v2css=3D6Q2;@`U677uhe>y1F|2i$?lm>vnD1v3XrzXg~gkgYk9wuC3*17ArzECAl%W z86^3ec_rN3)pLL;sy8!~i{2cI^o6=3DY3M4j)9fh0)@Z*Bv?wiBG(1G6lk-`5a@darE z-3Kueu^_Ia(@W+@o%{L$PGDI-!nWWyg4@2iy&rF!(cVKUq1rcRJnH?O|Mi!>pMU)? z%l~HeKmX95SMGN;cJgNBT^RoS3#$C*pT2lK&uh43=3DX-wRo1{CW!k=3DBKE;c)fk}*e8%)=3D(z{!Z?`P#(j21w*XOU#U!T7|e|`S?{Pp?k^XESiYx4Ih zmy>B(L|S%|X0W^sfvU!j^BMIf8~fO&zc0~mkABbBZ~G}yKU^I;KK1_gej7WG^z=3DtMC8hgx$@&Yt=3D>dS_(wkFU!OngVNtR_YxLT8 z`L|!w(IKvH-HTWAj+R!ucW&F8GjiH-rP z3rFI?x&z_Cy8VNpzV6ykH}O|*Al6HD-G{@m!~N~YXz>QwtP_olfQlxC;LGY@PA9dGB~ zs=3Dn&LridVW@gAcCbtew=3DnW_G9PA1NdQo>-yEPLUuV-Pu^o^R8Nkjjpx>a l`t1tU<7lw!%}cZCn1VNc+v{iQ<7oK04tUShh}?Y9{{wi9q4NL$ literal 42608 zcmeIb3wRVowm5!zGD*f5pc6uv076d~Ab<&zfErL_CJ7i;gdvCym-Wh!3}n_M6K6UK z>#jzfb#eDzon*!Jv3DI2EJd#l=3DBse#WU!`@l-^f_y#K`+%qq)t*#pn{Nj6Me`NgD)22`|vk7IX;=3DUwMl+^d57D9(!fW>sPM(&K9X$1iJ^gBZa@w;Fk-^+`GB?^J{jaB|gBeaCBZVZJ35NvN* zZ+r#FG3A@L2fI-&0pQUCMiC?5g#V~EBtHZH(L+P?P523;-;H*%`0xQpn0(^xTU|W}C2!T-;OyxISo9e?qSyDl4NzEw|Ic`}M+8{(a*qVSHujCt z?h~QUsy!x(ROTD31i&L{_w~2|*rjYf*lJh0p=3DPC&$0mZn&e0E3xl%RJTLxCu+be-p zb@$rA+6@U%UA-cvyr4?GHcYue6?*|wF6agcxlc5%27h92n9Y0fDVm`#!`CwsD*u>5UoyoA7RfFJl zIXdfI;$*kW5v_NLliV)HO+J@sN19gO>2*1_sFK(UG3JA;dY2oDrtLUK|Ker|gyJey z65F85?Q#Rc60R*QWl^}4(mgBH$Y*-Tx>+VE;&DXW7#RsjNw!bEl#2<(1cV^4s#t&;oc}j0T@a@9 zr<87?`YZ8&;aZl~-y%BBVrl)SRB8v6T0^DIr<_Nr?6Tb49u43py_g5zRV4|)+T#M@ z*m&i1s8TF2mqnq3ovZ7~TChRBVu3ov3WY2Rr@gF;Ac99M0Cs_XgjyI?=3DaPU@Yx~9s zy%Ml=3D{~uolEQdV;-rc)JU}=3DCPXaLi0w`e((nnPb_siLq4oRq$>FIPwywH9KncPp5=3Dw&?#fQzqV^}6nMB`iKM0rq(wx3+!vJU8qv1=3DkiAOk(Fl7K_4q zcD}B&DExbupgqWB7{$r}RClT#tV$7-Chti}V9iY{R@ml~5+q;Kmzb$@7xu&ecHHHb zVqoSKZ)A^9i$$uW?S!uJv&2$1OV_tZFy;7mRWSz8#U@u*u_%mYljp}+6mr;PM=3Dq1~ zr&t*XEUiC*@~r<1<)f&H*+CfZC@97DSXzIWmFdS=3DT7MunH$(qA#R}ah^M*X1t5{)X z&)d4LUs+gcFB~M%Hj?D~^^cjIs1}K8NAe!+08*VxPjav3Bfet0yHS?T`y=3D8q=3DCERg z*_8SWbKOTM{V_u7e<3%QMtnZ6UGEaXK9(KPT|0^a40^9L=3D=3DBl3QMfoc7hEt3>z(%* zrSnyn76)hF80`rW`m(h@h@wZ*;vP|Z2K)HD57|<%^^MUUL@g!(#QH!}5@OOP0dyu; z!+DU;PJ=3DN@C%D*b5In232R(DO2m3$-FZ6*ZxPVOr3%fvno#?uYD7eKVX-`n?Ce3v^(J_kXm_l?|G3VURD5sd<&s0Ux3RYFz6$2+r>#t#M!(UB^rK?z4 z|1GNqFU|p|&9;~JcmdA+J(~$O&l_%dx^h3_KbBJkr?dGqS9Btb!YE7YTWc%5z|wk> zRf9yWVEspi*4J+^>X#z?Z9h>(nlU&xa@b^?G4yu)c3&@>4?U_R0>qR~m`Za?F+sbC zrS*R|puIqp{*Ds+q z9;eK*SFr`UzS`AmV@^1qq~rp7p~tN~s{+pNN)Z$&R;W~N0!gvLF17~plu@uFSpbV5 zk6ozis+Y=3Dj!b;^dn3gOB3*@n#;8IQlM@`%6Qz19n;;CTVUJu z!yZYy7ik#vrs_^rgEjeR%8vLW9$1g1^#jCjvVV|b#R~T+R(M>o!VOqcx*jzerRF6k zKt7DxasC)x>4dRtKHz(*VgtL94~1+djrMJ9Cgpc4HkhE~LkVgsv{4K$+Q5;#RojnP z4AYyBAtc2L+Y#E7W2}VQaVQR$&77Ipf$PaqQ%@3Ra|V^2#p?7A6btNRQT+gZJtI!s z$Js?NaG=3D?R>siH0I{F(KJ^fwM7)bdtf?Nim+ySL5tv{Q40)4z78_SNWGWGGOa+IF) z=3DThzrl&hopgXQ^rg&p~r z#pU??E7_5cfsaX#D@9s$@{bX|uo&T|fXTwVt&p-ZS*Y=3D}rzBNu9}h9RgU!RNFgQWIJnt!o!R3}>Cb zFU8|MA5C7-4HA zZD-{;Di%OHcQ($1uh`gwpzj@<$isP5vBDa*6hL()Y+%J!&N#~E=3DsMX2QCRIsBt%t8 zz_6Bb7}NK&wEja@A|CJ*Xm-T`c2)-)*flVO)9i;JncQak^owdl&Uq%o6{>`sLzsEp zY$i}2=3D5?_n1z<=3D4_BM`wS3+bZAZ|r|%K8HaPY)AqR+iT5QBJDwz?M$`HKynHP z&-*o{6_ldGWKmb&NI40Qr2Uyv4^g>Yl-@z*en2gTDCZ~CB8~FXZ>N$!p?uQ9hdb!2 zjJ5hNr1Tw>UQFqKr}QF9w^4dN=3D`WIFwiE<*M0aBkzPyml1X`m_x`TRgD)T`B_SefU zv>X=3D%JaO%bzHIG@7_e%nHC9*I9#2Aey3&oaDPO_Ofc&jOB8NpGKN-?Au=3Db>N{pd%v zm2sR;-&e&1%3K*_jVokMT`MeLQ5dHb!!*L?-#|cYUi#erJ*06`1L9(-v-?n=3DuxeOr z&gkd8!e)ZxxjvEmbY&;@%6?-mu2AEN3t%$Rdi1fvo%S$`TE;8IFbmtKwtq)0PouGV zXseJQ+_zd10&_yn*42s0EDB?YW7SwP@2}X_7r(4UD%1M!w(d+!VX~guJ2qiqvi>2C z+1GyB69;(dA!7t~0-SdZyAu{|-4X|EjXeYs`>}qQS|vL)Zx^+C`&Ni&^VZ@yEUJH~ zN^u)Z#<|nP_qBG!V&WeOUxihJ#pJ+Xs2<+q%xu z`Y&sdOKCl+O7R@%vKQVgf^CZgw&Fsxa<_$joy2h(L%%X54c_EgbP~|I%!^A@Gycl?k z;?QO3EMZaj0lOA*Srq=3DjzD=3Dv*U+}hZE-Jj*>xhBZ5eM(eb-?N%M(c;cxXAib$-iLh zCdXg>g<8H2xP3OUfJVb}o{Qq3ik$$ly(`>cclZ{@kmL8WGQ`_Hc0wW9|43h@>h8<~ z>%oUN~CLDqZW6>J)R>i7si!ZxCA9lKUXTlF!5zKkIHeWLa_%7(r2W*6ADh+r!oo2f z$j>SLA*B^+*TCBT&*&eqfx`cmM9E3u^s z-$MRao>z)tCwmBl*_Z|E5uk-C^Y8YSt3A}xihoRd=3D6WSI`nz8ExQd3Dgiv3W+f7I z58?{hoGyT8-$i^&_7hJ^keAQ?ou#3k+D2QUSam1Nw#x@u6Bm))BeAIdXQNLpRR`rum@+5D$U;WA@+dZh%>e9d4jr zabv6K522R3R9C|2k1yWLU?uCnVBaFGRm?f4O2|94Ksqt^_vy8SdsG;Q79^8}Unxby z>N=3D!qZr9{YN4q8&(hlJ~43JYwJVNOxR=3D*);LyV>SQ^fs+)axjXj^WaXJb%7ivBC`E zyVEOaxJHnL`>>xLl30mrNIx+<*w>0$oMsYSfp-GDaEmIUwTg4ZW4WrU(}I?KCvm+K zxRiczDVHT(XY=3D)AiUYYvU&C-vS>}LD)k9{b$6F~5aS{$_+`ytrK4%gLnh?7^+9>;z_YR)DvcFvpZ0YLv_ zIeQXBK0?8^6=3DhNG*Nst1v-z*?{W2;2)op~wf1)JyKZ9VPAZh#F7iQa?VTx=3D3;yE*$%nE(>(A zbpJ|{l4$?O#)_6?forz8H12a+2%kBG!v;*BLmuIrb%YPuk#lF!*Guv1S)WsSC6y%4 zbDdm-t6}nW9lmju9aLTzl9~!zo(LqP|jbdBw3`{FH*_BQ2ujNlKS(kyQzJ$+s~Rq=3D_u98rS!Fw zuB7xPN}oq*^25)2g3>LyxdZzu=3DPYGMbRU(xhG5-^dhXBPQmpXMiDnF>`p;`|p94#e zC%YMXUd-yX#=3Dl9Px>!8OrK(si>1Hx~b1THxGZ_M^JKl_|;rIsVQl)qkABzXORCl}q zVx*H@aa?yxabv}O@J7@S=3D8cw&F3DTDw}HNFpf4pXt$#|tOXzpO2}(NYi}m;~^}j+rq=3DRtyVQ8#F0eOdovdMm6i;g>3!ldZjq6>#P!fAx_sSXw82 zIPWO-=3DE3h_$$4=3D~UpLUNXZzU^-ODN<3;p!CqlEq1OY+fs&51N`Z@alRE#63S{~~(? zvV3Bqoyjn6jo6DkMGv1ueA95nO8AdKZdkvIC8?AQf88o1WF|x3R!DR(8Gg4F5?3)9 zp4loSu4XbkuErDJP~zIr6cielz_x0E*+oWpt=3D(qNIJHuu0#`kTW@@m z6)T{BXBN_aq;)7}KCu_PqPE@Gr}`#w=3D^nzgjM8^gx)izc+^4FTSV8_}H;clBY%+Yp zqOct2lM7x&eWK#rVeMX|?eG*x=3D)c%5;_f1?m95~3X%DDgEMcygp8Mb7eI6Uq=3Dkr!| zgGOUM>kZzs09k)Uyeh9oys}awrW z49_h$$K|-iBtvz4bPpfdpY_q#i9Rt7Yee!LFE=3DF2vj*37Q7C6KAqz33aWVh#T%S zVZCGDGJf&-mG(2Utk`pGKJJU^`eE`f&ix2`&vFoR(oeCpz6-q|rau+=3DIqzO}q<=3Dq_ z%C+vD;#h}XJJYk7qZ`tCjOuSee*bBQecQ{|Xxp{zU#5-!belPDi++e)6^c*;CXk1; z&ye#1tDt?8>8yhGO=3DwSQ><(5z>)+>zJG6eW(3luI38Cw>u9-(V&~mHlPQ}2QyeCC| zO~iie_pmv(aC|R{H;rt43*s6{K+u$hqUS&3etAwCH5T@~Jf&_4ekf*sZOv9wMethpCZf6VcT z2`laU$gob85+Yd1rui>~`$taChlQo~8YaV?2KQvR!4o5{(>(IW_gD!`;hLRY4#-^_ z^MT;?x`2HH1U4H)b}m@ic>UwTIu?Z>LeAbva=3DyS^kwH6oh-QP3EX9?Trxf>3b^WtE zmeyyh(ykb{r{M;c?$-@Z(D#Y9%S??>MXM5l{C`#CNf*ffS4I9mL1AefXVaMo-`a;3 zi~cL>1)8;l2eCEn7R*7bL)X(y)IP~?)mE$}{FusohswM|Wf~~`KBbpY`dLaZq4aMk z?Z&i=3D=3DP%%Lk2xRK8M`+kz=3Dt*5lWpw$9MRXQxZ~~|^(HT`;tszvx1aBj;&_?6(AfRh zjW9kTj6d0nZ7nV`Jiji9$4_9~M1HqL%2%x1cZCvzQ5lK_o@7y&K-dT>hM`z{L|xY( zqa9KwMRr_|UqASW$`h#Hh8*{_A=3D2n71#{O-BE!yl&j%7n1!WKsQNKDKpT z-%M~a`&(5{6JL1j!)55%MhwvhhCZ_N57dis@0VQ;dG>4;rFe*mxSv%c#7DCWL7;Ux z?(?1lW%k+jiEI{(W)mO>_n6#b+{Ww^z%9n}+)^C6A#TC>bhiW(c9(**MFP?hABT;7 z8!OCCKFTcuwr0#h#R21(Q-5g)4zk|kSsNeSJ<1EUR*bpOpFnJx9dcM1j3%t-@ZFr; zT-*h%@?tNir?GmNcQ%j#C*3~%=3D5ZL(I_xS~ZEx*KV=3DZ-Gh3cmC!!pRE#Myy)w)$f?ITf!Sk`Z zOCi1`&UyaP9=3D22OC%@~xY#)p#i^B_0`CHVIpWcN#$0xQmd0(0RWZ;#Fud3WZa$7Ry zkm7(!#R@ml&d5GEk11mgVefppj^p*^^6=3D5O6bo!&Q4kdiOhn0LQLxum#mCfC#Z2lB zljpgM&CaVdU z&{Icyxt#7bo&xP@ifcoH)+jn~k)^Yk}o#=3DN(kji6kv2;IK zU#@HD_g_&yS-St%xyJr4S&AaS7fi9j-j}aQY)@?8ikeWyaj$`=3Da*n)rt_w%mAJu|6 zS3wt>lyv}g%NIYORg35XlJ;%Lbr>F z4xW4C(6bJ}a|zq5fhxr@uEYWuF%^Y&_G+eu7Zod9<|&U0Z0$e`iWSP)Y{=3DU&LqDWg z;a24|_@r>PeVQjmUfp8Uoa+8{IC`SsXZ4^L6)D9~P+PDcYR1O+p7M0?dd9`jQk>bH zCxYjUn1%fXET)_u^K6y)SJMs^e}_HbaqW@@MjdML!cxzF$FZG5-pcEuOxEv0uFUz2 zct3dvZL)qFeS4R_i5@Ajol;M#ZnV%yV}*8kaRppEmR1S(8F6X%c%&G4M#S&2wEi@Y zoEu)p&~mFxKMZqrvT%;Rgma^(Q`^BFgeiP4$5Rk9N6~avLbAV$YTVEE!Cb`e z=3D#y+It@qJeK)ZipH|5i+g|88hK1g-GP5Jkc6~OdAQ(ime-N|i7T|b6#Q^R~DGuKj? z?^F42Q5yGI(8n+U(?|KV+ccNfMn^+vfl-~6OxAx%-vcbIKZSGFA&SyDR9PdrL3N2_ z|Dn_$I+MpSu@dM}I>CW6F6B#^{7y6f_;|dT*#yOi|IqcLWZ#x^K2iKfa!CBgoL$%p zh8B<4xU{&}t!;OEwQY(8Hn1pIyCv;jk6VkY?p_->>RnPLb3zG^dQ;uK7|VdMdig#{ zI+Ly8{;|SBgNLv4_$1`P%xQ?3{vgi4_FNBvb*Wy|n zBTwvwyU%iAtfsg{gh`|i4{ZgC(8RdP2LL&hPtnI&P)ae!c_^u>mf8f?+H&+!Ui8N$`D&ij38d1VHw-PVDY42IG z5+o~*bgv}ZRMCsrNMb%}1mu5i|Ce)`bNEJpI;_u2WB(+t)2ey=3DPem)rpRMum4W8K$dZTr%w}{jbCEFf6MJ24E`=3DxPdwK-*SBjHli)9|D9_> z)F-4puj7$s-2POo5KaCFF~Ze{>T=3D_ZfNR5;WCI)Skoeqgn@{Y_XFh=3D9l}Zt;R*Gm% zLq5^|U(kM85lrY35@WbjuqYIJ3Ob>1C$4%(uULI<(Z+lzyJ9~17koH>>8}z8minX^ z*;4&=3D1*JdWk;!IE+dy1gCN8U->}B-OEPMrL+=3DU-{rNo)6L;yS?VAuyoSr7!aMj#Ky z!oRZl@D`5vg?ka=3Dv3)#J5azrnBr3`0b$Z4kb|gbuFU62a6!}^WwsBLLQ%~XCkt~n^ zMzNVfj?xK*N*0Z(MUa1dZHhslm`wDom~9T&7qp|i4K)_=3D;78~c5&nlu_PuppF3%6>}G#D(k*ic9|uo~AHxM;Z`!j2zyk6v3q)_q{GQA8>D!eAY*w zr9DPj$T!C5!#(W)M<4cdYL9wi+8+DFn?)Ey`&l-O&enQ}A{&6GpdGP8+YKorFSt9Q z?Q?_n8+Sr`)D7A$V;>apy_LLB_bEkiZgQ?M&ZhFwUoUFA+@kgyjKEOc+8&J7)Am7^ zSCl{%wckKj@(t9oXbmO{P@DTe>rslK*YlAZ*k5$rQ?MV#f?|U+lwts-6GYOQPSVRx zuUD#8_e*wgVvo4R{h*4db6GvfmFRYh7OrJkJqWnY&-?=3DX#%*}XN;8BD|Bu_i>XYJU zDppwPohp{G`DDLxj!qy-Yf+mSy6kc;G01aMhERHLw{pojDo~Bap}Us2z8)rl4wmjG zKb!Lv%CwAMXBcGxT)T|)k=3D*|ZOEbCBZr-pMl0i}Y)#(`Wr2JuA+-9ub6nKVnN^ zjOxPJ8y;)gH%5EK3o3}G(;15cUQy`;cXE$-x*64qZJhfnw2C}++AC^Y>jkIhN$r(B zaGmA`)h*^>O_vQ%YG}Wsc3%M}^T02e475W&<8!tL^rFY@=3Dcy zgD_g@gzbG}H0GuAOy_>zGgo7Mp#8!t_JNe^0?z`Csgia8oP8kKT)>{8oq&bLnX@vu z4%Zn)Q`Ll~fphO(T3eov>tUjQVG%}~9Reqt4DBom4DIh(3so^?^uH>mY=3DBX>xF$tQ zxeh((syo$5y9GXTk8l?D-cJUg;=3DDQatRZlt`frjy0xRS*1#*>6xSJ^yxBi$xAM!HS zbEiq4=3DSfVtvSZK(uABs@ad9-nj5<&7I-C>9J48Els&UZ{F|3um6C;lMz%?p?F@ty# z<{@5wp!Gg*6~(}_Q)6mEETLW+7l-5nVhMC6chVV}5~{gtFeJ|ejdi zxz`7-GejPFSV)|d^~;cxGjC&QeXU2*NTc-M=3D8?2LD9!!18ga8c?jK|RG4_9nVuiD4 zpWKUQYE)^L53K6C)G{7d-j5a^#>>xU^Koxn*N@Qr3+AZ|!=3Dk|T9Z#c&vj1kXH#2t4 ztN=3DTr+fi35R>*OS+Rwe9?RSIrGZoOEtpbezIxEqW0O46&OYEp|Ymcj5^m(Z3FxITb zrQxZ88XP&#o~Z&#J_|yQ$E)r3xU@Yu@@D>o*}%eQDK(Cg-(9Hf_Ja17n!wS36zJEg zQX&r{y%VQHOt~H$#)$@V7sUw$sDlzi-;Rqz$Du75TYVNa*XiO;4YjJIs2 zJ%sxWGe2ZUjvYYCe)YbZaQMKvcZ#Eve4%pIa!x(~`RtVi-TaCOO+YhvwLoEX8%M zDq)}XjY-+@99pW3&Y`{H5mS?JRquF^tpS_5A0hXR(GK9+-Z+hR$So$D=3D``Ag<4&V( z&<=3DR!Y6md>f8F5IXqWQSXl3YSXropM*EH^(k~cBEkm#eRx?@xJPH9KK@FQD9$l`Wp zRvE6C!LCZ}Hn6fesIjud9tniKN2wRRh$*fWSuvbJznrRw+`}2fK6}S>?CFB#&^6A% z_UW`YG=3DqFcY2fD#g=3DRJzY--J|hrr5KpkG>l4d-6P3LO|fMsk66IL(%s=3D%ikX!2`6o z5_BTCI;tk{^fB9ly^2!wayH5dk9tyF)UQ&P5BZ9`H>~pw^<3s4i7 z{+utCsZyNAQv7s?6+4(Lbg-ZRJzfxcwj1_6`Ps1ku`h5fV8Qrwp=3DT?rhB2y$_CnEE zI(H^p#;GFhFjd18%EMizNn2M+B9qBB5HO0q#|=3DWywK$8;*n{VgJiBnGiz49*`97F1 z2m5UX?e2ZLmhYLVV%Iv7Wr=3DWGV&Fy*k%Zerv`$fQ?&@g=3Dq34{QP7r#kSQ_%s!cj$x z`YV~p>Y&Usu^qN1Xh$Z^f^Z(TxL0ROAz}E>d5bqtiyLtS@71skpD5bAV%Hs+wzlhk z-8-f04i*)>KC$Z#R%XMfYNxRDx4)usBy9ZMCfoRkjYemyPJI&t(EGoEtVoLJjcRKI;$rjVo`AI!$ zST-5Y4)tHn(#MVrXoD#`N1_d;Z2SL08%&=3D)R2zJPr+P^nd~!BR_m}e1j{SH-^Ey?E z=3DR>S$sw&3OPN;@4MPv6a!dOmW4!a4)qZCd~BA-67V|w~LN*7{!D#i4Dl8-t2Q>+^F zqN%I`+L^4sLvi^ytLHFTe|>j$%Fa2<{WOMu2DY9-$Tacrvbu8U~`iW(ZYKN%Q zMVOvO>!H*Ilz$QBd+?+;{U+~0ilQ~9QB*~0F6GmjC{@nV`mOZ)0;)F+)6TzBdJ5%} zUp7@zFD5K3t)tF0=3Daea0ad0 zv=3D0g1A%v&Bi)ja~+q5?@=3Dk?#96*kxonf6O|q`%iEI+}4W*5`8E;T5$5Joew~(w^Eo z#es9-c3evp&Sf(EoX=3DK1v7p*3YEO}dDB`vWYLsV!s)+NoN7O!7MO;gG#1z^tz2NkT z+EZf-dSW0vBY8y)Pif*B?MBQmEU^C!)8kgMeUN3}W$&0saiYTab~nImpQs(!-2e_1 zwBLbM$p@QK3{|AHoG+iIeXf1Jy8$M8rBoSN3szM^t;g@wP$klEcoG=3DX=3DpiTr3&j>Y zy;AB-)rI^euDzqi$ubH;p6W%b;_)d1y)Ve0Bz(A9MeSR7Pb9W;ZyH zYP{pb^Z+jKiHCHYV zLH_qoqU4bqtx6h$*zs5!=3Df#K7f+J)qt?E9iMp%D41N(>0fMLwedi-U^VH)dd^ISX4 zNctJciMXmM!LxyeA0Fd;GUwURKKKAz{>YYm5+umq@pAyfyM*U-aE>QV>t`|t#iA8r z>HgI22H0)%sFlv_%pTlkDR}`uqvEKJtlD*^cr0F~e&vq zM*}|z?V@BUMr#=3D37t{Hslp`Kr{c^q@Ts|Uv7JYe}C&j1s%j*(8nfqX{ z-%{hvemnNb@DXI}=3DTv}&{Q6OtVnpQ@s;*t_eD+bk4~~q)Of`Fg=3Dg{nA^o{D;#r=3DU_ zQe*JF2zFXwX@9`mO1v(|PrL~}H+^ypCEG!9)gRn_JPf1%GxQN<5Yw9!4CZj_n$A!SMBg}R?;s6%M!pYD8#j$PVVvE0vjmn2PHYozvcj01356VXVX56? zFJ!X*u2O^%rpU+K{((4m#~RWKJf5=3DCxC_Jz3FRi(M$r~l$Wt8PU@@ste_}X7^mC>d5RV8W_N>NL~5)|;!S}0%&C89uvH zo<)C}6Hoq2Xb%(>-7La*b{fDXVlVm;9|k9$uq9i;r9D2*!<_Io`jG8-+sFv(H$3Pr+>3_2${fCSQ!Z|C?dionz-wlozoIUAK3$sEy9H zXSb1sfGqGF+6UTaTR{DkhnT+iU%0Q7EQSKQjfMOk z#ZU2(Kr2i1^fpW2Y1eu@ovD_-?9?U+PpsPMylxzzIAO?MUwmL(ycz$ho5%V*bG1Gk z7bm)TZ1Qgjua%xe3fI6i%e?muJI0mb8GSp(K5)#4H>fpda12t-?@N82K{0?zY7j~q`I9) ztKnU6OKBggh+P8$_J*ebd!!TaKDJIl1olI)uo>L@K6w=3DO$bl^xxHqEwOuU$Kzv~lI z`Swb-KtH4u!(5Ex#II)@Rb4Jz;nQ7T+%v$}8B}ZiR!BADTuc%4cpqJ1A`?OH5kGCl zd#UV8@$B0f?_vz9QUvpukKdJs(W|v9I|cG2ucTYh4rBB>b7tW#S0Tn**Us&v^Eow@ z*J7;Co2pAYfG6-%%@AXi(1|udVL7V=3DHf|OkKasc_Rza{$3l{BO2QkQP>0|+DKkeZ&2MkgI4QxqnFfvA-me_F zJ)XJzmZlSp+$qbkZ{I~tMv<29;=3DNKIeC=3D3}*Y;gJ%fPWXQx&xjziuohzlpqf=3DOYt~ zcivM)?W3<9i-!pdJkd?Oc;|jq)IR>&vABw`KyA*kXjDZ!HDv4oe@)Ukna*vzGcALK zq>8vs{+h9%S@-QXO)TF2n<}P+ue(Riptz&A@5x|smnx?4#thnb{JMJN47!Q(?QdqV zxKtHWcw@)ci$ya^=3Di7KMB1z}lMXH#}{@SsqLM+~T$;9HVKdWL2Z>{)Rc`=3DFZ7I^DN z87yv5#Z>N4EV!MaW#$lL{-C?7@PRMvtce=3DZ_fK88Ngo?jEo+Ceb?R zExfajdg84W><+wJ@zYmm6*n^(`t%O8rt7__JYyzb=3D?0w1vo^AoI3rqX*-G5=3D&3f)1 znKj=3DU-wml|`+Qurl{!YCsgI%SK zW7oqft%%h!R*7D0YZa>$fXUenXo)a6dmpz$tgmr9B**%XV6W~Og#APR3hY5d-dcal zts(0wZVg$-vr4pQvMae&l)LL6!qz_s+s=3DO!TUEl9j_M+-&H<6&l#$G+q>TCZAR$pJN7+8JnH&$PNr_~qYmx;$-$UPVb>v0!_r4Rmy zyc6=3Dl$4HK&2OlFZh4bK}#`haZo=3D>t?M4dhUD8|^)UoEJIwX|l!mE!Sw8&7ayRHd;} z^aB1hgPO`)IIg(f!uz^2XShKf`!Wp(y2(P|H`w#Z8%&@mIq~dT}Lk!j{^# zdP4fR+#I5b58+}=3D8@x(k>!6(wm98o zBZnv8nUfRJJ#zYr`c47fd0z%^B+JGZQz3*(t&yJ#Cp=3Di z=3DQt0k0k>z^J3)AiXg(~OHgdiQfBLfdaOCjDzIh7p(5^h;{Cf)UzBzJu7PON8S$L~Q z4o|@IuKy&w!atq@JUs37&%!%&3h?l(<39_p{S@HgPWP9?89P67Tk|3dhyIQ)a};;Ng{ z(L;+*0hjNc0xlR;b3z$2a8Qi*MYuBJxEy@w6mU8H6mU7o`s84vfy))f+vL+P`0vkk zilG_NJRx?U0$#XIJ0Xuw0p7M#fOir;eEz&aKgF1fucNo%)gvr@$TyOH!4-AE1ICK_ z5>_^7wssgRYKkGG{mhldDix_8S37M#;62_o4r4_#xf1S%NqpG z16HCuno>pr8`t9n3t3RZ)8!99(NNfiCv|{U4|7^FocBrE18f!u=3D*OsadZEVAhAZ>G zan7f%90`0*yZD!p(=3DOcprL>QX*Ioee7WN)_AlxUXS3qAsmu#mOIIlk%@Ic_*3+RDZ z3xa3daUO`3_9b{SR?IW#duu2>7x&H#@b?YowEUD})NC-hwu0YXIYgH5CP9REAqbwL zCfOcvolOoph{N&_XE6 zjFrK%J92n;XW*TjzOys%{&D)w$iO=3D(ePl8Jv-IU=3D;GLX4j3ejphSA5z;l~e-oUfw~ zodVoTP6BuHDZrI8a8Jr#()=3DgnuR-s0{{HC5DZroluY>>5-wpVWjU4`{Kb!)5jAcC` z{kY#iu%jQ{aSE`L8Q3S4HS%tKg{*yqdmM%}_R;cFz~Qb_zyUqxUxh;!=3Dl_Qv8~spd zyo-(er19=3D2FU^SbTmGjR{7x>P*JkiTTVS|;JDKH0w!oYZoie8r%r!&R4LtBcsx8a@enHbIz zes7y`gAtt>OwOm%Cxxo}6FMKOJqTUN*FT}ZE{QuQmL+KEy>}I+M^QZBi&XE~w<(@; z$hm|U=3Dse7`uM9rdHyZCVw(pp1fo=3Dey8}KGW$m#~j^@?;GuDu%|yBomj79q#HdC4AD ztU&j-zyBWMC*16dgSg{iZZRo#R9*e>ZRu9(|IavkZUwxaUN+MD| z5o}l&>oHkBfPb5H$8_Wi{)JKIgg@|@#F8rfyOUjR(aL1~EnlbhFiS&8ZRO?fp|r8I z-fpxv2V?g1mv)?^@Abt*Ta8P!?zkOvwgm)?!WOF31m4ryH%9BFz0my>9iH%r+6!p; z3FY{=3D#{0%-d%d8#jT;Z1J7ILVo8ldJYI{9(+TMZaa5w*phv)E^%TaWH#q)pSx4)t6 zJ^wq5wjJL^vB@sH&jwH5KH5cp1I)_ii(vevbN&|x&cPdZ4PMlFC9QY2sP$r>DONhO zWc1m4PxF4}-+8+T0nf`ny4P$Q@@oYz)Clf96mxlwewao}ec=3D}T+Ym}Il-QM83IBSw zUUGXU-s!6AeX{DN`#Ox9I&kCwok)Mak<$M~R9%K?E6I32-RGNMg8BVxFh8IEEGx4 z^1xMDHFw@wXP;9&-@m@GDX;;cT@F`u%&l4=3DwaZ~i4uzx^e|Td6U|BFCmp28&92C;f z7Luh%M|*oHEC-sT%>mhw2L#lh8^3P|b+k3*0n~;%TAFxHu&qh*OOcMCOoR{SR9Rc7 zEg(hO1C7BA!9df@JXk{bBgHKtf0MLg6(_pcA8wMGf{`ooVA%>!o!8TF(ZaQt8_#8V z{12Jyx~^AO@iaXGj56N&#`|>R&1(p7n(^DVI)aQ|Tzg@i6lrV@v<9TI^(~>sE2K#9 z+W~17J~Pjh0BZehNM<-zZ*eWp<28AgBg+V@8gIiY$uCQ; zP5(CRfkE7*qDxn;kgf`~bhM((MjFGxb~zM2uGHcd>Ecj0XbNGYU-q|zHV#NHb*Pcc z``Bgiipb%PM!6##kgf`bTKsY_)ONy_xRi&&n*lPAGkH=3D|pj~d3 zT7s=3DXSqf}w3EzcyyZ#QMQShxZEclNxmZ)YiFNl|!T} zBKtQ6D%bO3C^dob@!zY4d?rZ@wzu%i)<9c_)Z~}_oZl4^j$xGkroaY&M~lomqXGaM zZ}*2=3Dx#&q7!vVh>2upIazfEfOZwj_{v`TFqt?L6}DYSvNjr|x5L?nMpOX%uA)6nrk zy5b^#yL2%sg3LEk5JSI7i&5k=3DCAeIpdc)eQNKk>~oWAe@0I=3DTQBsDg7v|S+$4Bf%G zG`jswO<`WQG1Mjp+d4=3DrhBVX|Y6=3D()4QYRM+ZAo0tJ@?#QVf|T<5fhe9yahFW1zQPkV09R~2n0;C_z3ZV_dDl8ARl@n!#7Dj|lUTZL} zmv9xZ%)dU+GJtFqEN$b{6W3p%4W_PWp@M{CMcxTZMFQc>_e)kRTeY}h;aY&&i&nw1 zx@CaFB!a{b!GhE5LOr%I>^I~)*tQ{50npJ#Fau4}vbtpzG;?yM1UDk7C>l%KHiQg) zNuLZD0Ck>Kby6^5%uZqC-jF=3Dx9rg>(T`1hah~y79Hjkhm8NtZ_r+|tRP*cTc zQLdIqYcvGp@MaurI5D7oU~~ljB-p4{xJGg0ouEY*@R@2=3D?W(25OjSX4#-*Ny3coF?;H^FX;=3D8G5UwAWx`DS?wfPEc+*8>`mn^OIT)cF}a;!M)$#W3?;egx`Zi^u9tLDykE%s)L*+A&TALbh$ z0c>y;WK(+6u(t&S%D)=3D2EB?tx8dU$hvf1C6p84%?&YF2{Mfsde#+lPDKYvl?*SZB$ z-7^-JR&Wz>V{_2>@~tacTH8YHSBA}!5xL{4t2b@_w)uP5&|Ha2gku3_mV ziyMYFF<^;r49L=3DkfFBK_h_pT^M+SY1e8o4cHw5<3J{Z)>@g*-=3DIjpd$(-7b#D@nm0 z&k;_^EKcDv()9zm&1&vt?pe-at0&S5189Q*M6zK>D z02aXlDIAEjhwuxuh1$x$9SDb{#%6z8TcAY>2d?Z0L}avGWLyZzQ>EtM#%6$JtCt(e zZ~&J;QcFi$1V|4zniD_eFI&Alg0S(;=3DM-uO;8K6ME!ehkfi%!1Eulug9FY7{M}!tf zoXzEt#z=3D6Wp9f_why>)0_61T~NLsac`Kra7v=3Df!c;Dm|jbR=3DmLJHFC_gDq1baL&(VOU~8tG{hC)RK-^V01s3=3DB>d9Xm`j?Qt7i*O+rX4R0E-QP@`sfl`kQ+M5L4>!L31Cja+c0n zA(6rxip%;IG_;^2D2M#i_mOsgV}Oio6dzjqMdVPJRy@JBjb=3D%IIPBj{Yx+p5zomtQ zu`$$^F^vG=3DfBExA)7C?kXLNqXvco(yn*)&uL?VsN=3D8E&`pxi7qHZBB^Png@7QC3m_ z4T?OFq(~&##62jDltf=3Djq_O$(wh*Qo<#0=3DRM_W)fd>TvJ-fjLo5t6!Pg^76$lQMHODFMrthMQseAf;4i-X7k7s^d`08ii5Yn>s%CS z!sRM)W-TI7zPc?amoIK3{MOcVL^c!m49d)WgD(0ht)(ip&4I=3D%uqg5G)Z;-NRzaR zCLP2;D%;R1OI7pA*Kd{sWNmzTskv1Hr4S--r8d;o6hsoGB`yAq5$em@)~51?z_$X8 zB-=3D#ARlIY{8v>}-xqM;&m9OZK%f0?^P~M!OX6@oDJA&=3D#XEL);R)_Fw#Z@@$xU67b zw6?bd`50W>)>IzaP+q&a1$%Kt zJDNV_ISDK~DsSdSQ%Vh}_?l8Gn5)4NS3d)y-Hd5)uZCCM9-f$oiXyZH{ z3=3D2z15^AJiQ-{9=3DXY)20b0kATyv>^XoKo(XqC&G0;Evdm&z~wQiWdz{J!CiHZJ>1 z>!jM+s}0{S=3D=3DwpZ(ZLE(Nk$;I|1x&q@ZWDqd>Pf`k2IAB+glb$Lm@OEzj5|8?Y?%t z0?r#$W2tvpC3ln=3DHf4phG{RTu=3D!(W!yrpF`IlfS~77eaD6dJX393*o57!&J=3DLGW5Q zC6fzpq?iRZ1sXeOiGx)eQNy9DXArf=3DVO(`Q#{5CM+Xf(30#xS$;9o)gzvus+|9k#_ z@`UvM&p4`a6yGnNY}qGl4jPw_<6*{YuNK2xRwJD+&o{vZTU=3D*fmBu^lSz*y zqY@|6?}3v4_ngv$%j|yv_p+Yt9az8PYW~?KV_k1)Smj;5(C3pbT)YNfwJYit<9p?@ zB@GLGK7dshdoEtR3X_+tk{TAT@=3D`9q1+}#cq_PW^ubwGYSDaPhlB!%)m9DcY=3DSgJ^ zfhMWmFZ2BJD)drRM4BUVSoW`niXbj&+o7T@BnK)swslmj?+CUul?R)Eel`0e%}~*_ zxh=3DA}mA~aMRD=3DU9e$0dlIj~8Fif{-gfBNok4K_l>#*hpZJa2s@0u_y+Ry6QWiP>NF z;8-^$m^y^JIq)%l0*o0}*({IGSO8NWm=3D!Gex7xA3@dhXVop}szDLvCey8gNG#e{F@ zE%Qw_$lyAI^#l$^Q(u|&4ZUW*VG{u9K$9S|KI%7wh5jFW%=3D(6&G~Yw@*C2l3gUZ9i z&8%?uE_^eU;fn4n*#QuF^AA&*2jGRAovC!AI0$q0QVU0<7`N?KE5{`U*FWXao!B~ zy$ycM`uLy@H-8)OO?AJG=3DVuLP-w<|OIS776vGd2M4^VDon2*VCeB(b;euh2U&N4E- KJ?w*7AO0Wc<54pJ --=20 2.47.0