2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* linux/boot/head.S
|
|
|
|
*
|
|
|
|
* Copyright (C) 1991, 1992, 1993 Linus Torvalds
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* head.S contains the 32-bit startup code.
|
|
|
|
*
|
|
|
|
* NOTE!!! Startup happens at absolute address 0x00001000, which is also where
|
|
|
|
* the page directory will exist. The startup code will be overwritten by
|
|
|
|
* the page directory. [According to comments etc elsewhere on a compressed
|
|
|
|
* kernel it will end up at 0x1000 + 1Mb I hope so as I assume this. - AC]
|
|
|
|
*
|
2009-05-09 06:45:17 +08:00
|
|
|
* Page 0 is deliberately kept safe, since System Management Mode code in
|
2005-04-17 06:20:36 +08:00
|
|
|
* laptops may need to access the BIOS data stored there. This is also
|
2009-05-09 06:45:17 +08:00
|
|
|
* useful for future device drivers that either access the BIOS via VM86
|
2005-04-17 06:20:36 +08:00
|
|
|
* mode.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* High loaded stuff by Hans Lermen & Werner Almesberger, Feb. 1996
|
|
|
|
*/
|
2009-05-09 06:45:17 +08:00
|
|
|
.text
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2009-09-17 04:44:27 +08:00
|
|
|
#include <linux/init.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/linkage.h>
|
|
|
|
#include <asm/segment.h>
|
2009-02-14 03:14:01 +08:00
|
|
|
#include <asm/page_types.h>
|
2006-12-07 09:14:04 +08:00
|
|
|
#include <asm/boot.h>
|
2007-10-22 07:41:35 +08:00
|
|
|
#include <asm/asm-offsets.h>
|
2015-02-19 15:34:58 +08:00
|
|
|
#include <asm/bootparam.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
x86/build: Build compressed x86 kernels as PIE
The 32-bit x86 assembler in binutils 2.26 will generate R_386_GOT32X
relocation to get the symbol address in PIC. When the compressed x86
kernel isn't built as PIC, the linker optimizes R_386_GOT32X relocations
to their fixed symbol addresses. However, when the compressed x86
kernel is loaded at a different address, it leads to the following
load failure:
Failed to allocate space for phdrs
during the decompression stage.
If the compressed x86 kernel is relocatable at run-time, it should be
compiled with -fPIE, instead of -fPIC, if possible and should be built as
Position Independent Executable (PIE) so that linker won't optimize
R_386_GOT32X relocation to its fixed symbol address.
Older linkers generate R_386_32 relocations against locally defined
symbols, _bss, _ebss, _got and _egot, in PIE. It isn't wrong, just less
optimal than R_386_RELATIVE. But the x86 kernel fails to properly handle
R_386_32 relocations when relocating the kernel. To generate
R_386_RELATIVE relocations, we mark _bss, _ebss, _got and _egot as
hidden in both 32-bit and 64-bit x86 kernels.
To build a 64-bit compressed x86 kernel as PIE, we need to disable the
relocation overflow check to avoid relocation overflow errors. We do
this with a new linker command-line option, -z noreloc-overflow, which
got added recently:
commit 4c10bbaa0912742322f10d9d5bb630ba4e15dfa7
Author: H.J. Lu <hjl.tools@gmail.com>
Date: Tue Mar 15 11:07:06 2016 -0700
Add -z noreloc-overflow option to x86-64 ld
Add -z noreloc-overflow command-line option to the x86-64 ELF linker to
disable relocation overflow check. This can be used to avoid relocation
overflow check if there will be no dynamic relocation overflow at
run-time.
The 64-bit compressed x86 kernel is built as PIE only if the linker supports
-z noreloc-overflow. So far 64-bit relocatable compressed x86 kernel
boots fine even when it is built as a normal executable.
Signed-off-by: H.J. Lu <hjl.tools@gmail.com>
Cc: Andy Lutomirski <luto@amacapital.net>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Brian Gerst <brgerst@gmail.com>
Cc: Denys Vlasenko <dvlasenk@redhat.com>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: linux-kernel@vger.kernel.org
[ Edited the changelog and comments. ]
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2016-03-17 11:04:35 +08:00
|
|
|
/*
|
|
|
|
* The 32-bit x86 assembler in binutils 2.26 will generate R_386_GOT32X
|
|
|
|
* relocation to get the symbol address in PIC. When the compressed x86
|
|
|
|
* kernel isn't built as PIC, the linker optimizes R_386_GOT32X
|
|
|
|
* relocations to their fixed symbol addresses. However, when the
|
|
|
|
* compressed x86 kernel is loaded at a different address, it leads
|
|
|
|
* to the following load failure:
|
|
|
|
*
|
|
|
|
* Failed to allocate space for phdrs
|
|
|
|
*
|
|
|
|
* during the decompression stage.
|
|
|
|
*
|
|
|
|
* If the compressed x86 kernel is relocatable at run-time, it should be
|
|
|
|
* compiled with -fPIE, instead of -fPIC, if possible and should be built as
|
|
|
|
* Position Independent Executable (PIE) so that linker won't optimize
|
|
|
|
* R_386_GOT32X relocation to its fixed symbol address. Older
|
|
|
|
* linkers generate R_386_32 relocations against locally defined symbols,
|
|
|
|
* _bss, _ebss, _got and _egot, in PIE. It isn't wrong, just less
|
|
|
|
* optimal than R_386_RELATIVE. But the x86 kernel fails to properly handle
|
|
|
|
* R_386_32 relocations when relocating the kernel. To generate
|
|
|
|
* R_386_RELATIVE relocations, we mark _bss, _ebss, _got and _egot as
|
|
|
|
* hidden:
|
|
|
|
*/
|
|
|
|
.hidden _bss
|
|
|
|
.hidden _ebss
|
|
|
|
.hidden _got
|
|
|
|
.hidden _egot
|
|
|
|
|
2009-09-17 04:44:27 +08:00
|
|
|
__HEAD
|
2009-02-14 05:50:23 +08:00
|
|
|
ENTRY(startup_32)
|
x86, efi: EFI boot stub support
There is currently a large divide between kernel development and the
development of EFI boot loaders. The idea behind this patch is to give
the kernel developers full control over the EFI boot process. As
H. Peter Anvin put it,
"The 'kernel carries its own stub' approach been very successful in
dealing with BIOS, and would make a lot of sense to me for EFI as
well."
This patch introduces an EFI boot stub that allows an x86 bzImage to
be loaded and executed by EFI firmware. The bzImage appears to the
firmware as an EFI application. Luckily there are enough free bits
within the bzImage header so that it can masquerade as an EFI
application, thereby coercing the EFI firmware into loading it and
jumping to its entry point. The beauty of this masquerading approach
is that both BIOS and EFI boot loaders can still load and run the same
bzImage, thereby allowing a single kernel image to work in any boot
environment.
The EFI boot stub supports multiple initrds, but they must exist on
the same partition as the bzImage. Command-line arguments for the
kernel can be appended after the bzImage name when run from the EFI
shell, e.g.
Shell> bzImage console=ttyS0 root=/dev/sdb initrd=initrd.img
v7:
- Fix checkpatch warnings.
v6:
- Try to allocate initrd memory just below hdr->inird_addr_max.
v5:
- load_options_size is UTF-16, which needs dividing by 2 to convert
to the corresponding ASCII size.
v4:
- Don't read more than image->load_options_size
v3:
- Fix following warnings when compiling CONFIG_EFI_STUB=n
arch/x86/boot/tools/build.c: In function ‘main’:
arch/x86/boot/tools/build.c:138:24: warning: unused variable ‘pe_header’
arch/x86/boot/tools/build.c:138:15: warning: unused variable ‘file_sz’
- As reported by Matthew Garrett, some Apple machines have GOPs that
don't have hardware attached. We need to weed these out by
searching for ones that handle the PCIIO protocol.
- Don't allocate memory if no initrds are on cmdline
- Don't trust image->load_options_size
Maarten Lankhorst noted:
- Don't strip first argument when booted from efibootmgr
- Don't allocate too much memory for cmdline
- Don't update cmdline_size, the kernel considers it read-only
- Don't accept '\n' for initrd names
v2:
- File alignment was too large, was 8192 should be 512. Reported by
Maarten Lankhorst on LKML.
- Added UGA support for graphics
- Use VIDEO_TYPE_EFI instead of hard-coded number.
- Move linelength assignment until after we've assigned depth
- Dynamically fill out AddressOfEntryPoint in tools/build.c
- Don't use magic number for GDT/TSS stuff. Requested by Andi Kleen
- The bzImage may need to be relocated as it may have been loaded at
a high address address by the firmware. This was required to get my
macbook booting because the firmware loaded it at 0x7cxxxxxx, which
triggers this error in decompress_kernel(),
if (heap > ((-__PAGE_OFFSET-(128<<20)-1) & 0x7fffffff))
error("Destination address too large");
Cc: Mike Waychison <mikew@google.com>
Cc: Matthew Garrett <mjg@redhat.com>
Tested-by: Henrik Rydberg <rydberg@euromail.se>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
Link: http://lkml.kernel.org/r/1321383097.2657.9.camel@mfleming-mobl1.ger.corp.intel.com
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2011-12-13 05:27:52 +08:00
|
|
|
#ifdef CONFIG_EFI_STUB
|
2012-04-15 23:06:04 +08:00
|
|
|
jmp preferred_addr
|
|
|
|
|
x86, efi: EFI boot stub support
There is currently a large divide between kernel development and the
development of EFI boot loaders. The idea behind this patch is to give
the kernel developers full control over the EFI boot process. As
H. Peter Anvin put it,
"The 'kernel carries its own stub' approach been very successful in
dealing with BIOS, and would make a lot of sense to me for EFI as
well."
This patch introduces an EFI boot stub that allows an x86 bzImage to
be loaded and executed by EFI firmware. The bzImage appears to the
firmware as an EFI application. Luckily there are enough free bits
within the bzImage header so that it can masquerade as an EFI
application, thereby coercing the EFI firmware into loading it and
jumping to its entry point. The beauty of this masquerading approach
is that both BIOS and EFI boot loaders can still load and run the same
bzImage, thereby allowing a single kernel image to work in any boot
environment.
The EFI boot stub supports multiple initrds, but they must exist on
the same partition as the bzImage. Command-line arguments for the
kernel can be appended after the bzImage name when run from the EFI
shell, e.g.
Shell> bzImage console=ttyS0 root=/dev/sdb initrd=initrd.img
v7:
- Fix checkpatch warnings.
v6:
- Try to allocate initrd memory just below hdr->inird_addr_max.
v5:
- load_options_size is UTF-16, which needs dividing by 2 to convert
to the corresponding ASCII size.
v4:
- Don't read more than image->load_options_size
v3:
- Fix following warnings when compiling CONFIG_EFI_STUB=n
arch/x86/boot/tools/build.c: In function ‘main’:
arch/x86/boot/tools/build.c:138:24: warning: unused variable ‘pe_header’
arch/x86/boot/tools/build.c:138:15: warning: unused variable ‘file_sz’
- As reported by Matthew Garrett, some Apple machines have GOPs that
don't have hardware attached. We need to weed these out by
searching for ones that handle the PCIIO protocol.
- Don't allocate memory if no initrds are on cmdline
- Don't trust image->load_options_size
Maarten Lankhorst noted:
- Don't strip first argument when booted from efibootmgr
- Don't allocate too much memory for cmdline
- Don't update cmdline_size, the kernel considers it read-only
- Don't accept '\n' for initrd names
v2:
- File alignment was too large, was 8192 should be 512. Reported by
Maarten Lankhorst on LKML.
- Added UGA support for graphics
- Use VIDEO_TYPE_EFI instead of hard-coded number.
- Move linelength assignment until after we've assigned depth
- Dynamically fill out AddressOfEntryPoint in tools/build.c
- Don't use magic number for GDT/TSS stuff. Requested by Andi Kleen
- The bzImage may need to be relocated as it may have been loaded at
a high address address by the firmware. This was required to get my
macbook booting because the firmware loaded it at 0x7cxxxxxx, which
triggers this error in decompress_kernel(),
if (heap > ((-__PAGE_OFFSET-(128<<20)-1) & 0x7fffffff))
error("Destination address too large");
Cc: Mike Waychison <mikew@google.com>
Cc: Matthew Garrett <mjg@redhat.com>
Tested-by: Henrik Rydberg <rydberg@euromail.se>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
Link: http://lkml.kernel.org/r/1321383097.2657.9.camel@mfleming-mobl1.ger.corp.intel.com
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2011-12-13 05:27:52 +08:00
|
|
|
/*
|
|
|
|
* We don't need the return address, so set up the stack so
|
x86, build: Dynamically find entry points in compressed startup code
We have historically hard-coded entry points in head.S just so it's easy
to build the executable/bzImage headers with references to them.
Unfortunately, this leads to boot loaders abusing these "known" addresses
even when they are *explicitly* told that they "should look at the ELF
header to find this address, as it may change in the future". And even
when the address in question *has* actually been changed in the past,
without fanfare or thought to compatibility.
Thus we have bootloaders doing stunningly broken things like jumping
to offset 0x200 in the kernel startup code in 64-bit mode, *hoping*
that startup_64 is still there (it has moved at least once
before). And hoping that it's actually a 64-bit kernel despite the
fact that we don't give them any indication of that fact.
This patch should hopefully remove the temptation to abuse internal
addresses in future, where sternly worded comments have not sufficed.
Instead of having hard-coded addresses and saying "please don't abuse
these", we actually pull the addresses out of the ELF payload into
zoffset.h, and make build.c shove them back into the right places in
the bzImage header.
Rather than including zoffset.h into build.c and thus having to rebuild
the tool for every kernel build, we parse it instead. The parsing code
is small and simple.
This patch doesn't actually move any of the interesting entry points, so
any offending bootloader will still continue to "work" after this patch
is applied. For some version of "work" which includes jumping into the
compressed payload and crashing, if the bzImage it's given is a 32-bit
kernel. No change there then.
[ hpa: some of the issues in the description are addressed or
retconned by the 2.12 boot protocol. This patch has been edited to
only remove fixed addresses that were *not* thus retconned. ]
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
Link: http://lkml.kernel.org/r/1358513837.2397.247.camel@shinybook.infradead.org
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
Cc: Matt Fleming <matt.fleming@intel.com>
2013-01-10 22:31:59 +08:00
|
|
|
* efi_main() can find its arguments.
|
x86, efi: EFI boot stub support
There is currently a large divide between kernel development and the
development of EFI boot loaders. The idea behind this patch is to give
the kernel developers full control over the EFI boot process. As
H. Peter Anvin put it,
"The 'kernel carries its own stub' approach been very successful in
dealing with BIOS, and would make a lot of sense to me for EFI as
well."
This patch introduces an EFI boot stub that allows an x86 bzImage to
be loaded and executed by EFI firmware. The bzImage appears to the
firmware as an EFI application. Luckily there are enough free bits
within the bzImage header so that it can masquerade as an EFI
application, thereby coercing the EFI firmware into loading it and
jumping to its entry point. The beauty of this masquerading approach
is that both BIOS and EFI boot loaders can still load and run the same
bzImage, thereby allowing a single kernel image to work in any boot
environment.
The EFI boot stub supports multiple initrds, but they must exist on
the same partition as the bzImage. Command-line arguments for the
kernel can be appended after the bzImage name when run from the EFI
shell, e.g.
Shell> bzImage console=ttyS0 root=/dev/sdb initrd=initrd.img
v7:
- Fix checkpatch warnings.
v6:
- Try to allocate initrd memory just below hdr->inird_addr_max.
v5:
- load_options_size is UTF-16, which needs dividing by 2 to convert
to the corresponding ASCII size.
v4:
- Don't read more than image->load_options_size
v3:
- Fix following warnings when compiling CONFIG_EFI_STUB=n
arch/x86/boot/tools/build.c: In function ‘main’:
arch/x86/boot/tools/build.c:138:24: warning: unused variable ‘pe_header’
arch/x86/boot/tools/build.c:138:15: warning: unused variable ‘file_sz’
- As reported by Matthew Garrett, some Apple machines have GOPs that
don't have hardware attached. We need to weed these out by
searching for ones that handle the PCIIO protocol.
- Don't allocate memory if no initrds are on cmdline
- Don't trust image->load_options_size
Maarten Lankhorst noted:
- Don't strip first argument when booted from efibootmgr
- Don't allocate too much memory for cmdline
- Don't update cmdline_size, the kernel considers it read-only
- Don't accept '\n' for initrd names
v2:
- File alignment was too large, was 8192 should be 512. Reported by
Maarten Lankhorst on LKML.
- Added UGA support for graphics
- Use VIDEO_TYPE_EFI instead of hard-coded number.
- Move linelength assignment until after we've assigned depth
- Dynamically fill out AddressOfEntryPoint in tools/build.c
- Don't use magic number for GDT/TSS stuff. Requested by Andi Kleen
- The bzImage may need to be relocated as it may have been loaded at
a high address address by the firmware. This was required to get my
macbook booting because the firmware loaded it at 0x7cxxxxxx, which
triggers this error in decompress_kernel(),
if (heap > ((-__PAGE_OFFSET-(128<<20)-1) & 0x7fffffff))
error("Destination address too large");
Cc: Mike Waychison <mikew@google.com>
Cc: Matthew Garrett <mjg@redhat.com>
Tested-by: Henrik Rydberg <rydberg@euromail.se>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
Link: http://lkml.kernel.org/r/1321383097.2657.9.camel@mfleming-mobl1.ger.corp.intel.com
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2011-12-13 05:27:52 +08:00
|
|
|
*/
|
x86, build: Dynamically find entry points in compressed startup code
We have historically hard-coded entry points in head.S just so it's easy
to build the executable/bzImage headers with references to them.
Unfortunately, this leads to boot loaders abusing these "known" addresses
even when they are *explicitly* told that they "should look at the ELF
header to find this address, as it may change in the future". And even
when the address in question *has* actually been changed in the past,
without fanfare or thought to compatibility.
Thus we have bootloaders doing stunningly broken things like jumping
to offset 0x200 in the kernel startup code in 64-bit mode, *hoping*
that startup_64 is still there (it has moved at least once
before). And hoping that it's actually a 64-bit kernel despite the
fact that we don't give them any indication of that fact.
This patch should hopefully remove the temptation to abuse internal
addresses in future, where sternly worded comments have not sufficed.
Instead of having hard-coded addresses and saying "please don't abuse
these", we actually pull the addresses out of the ELF payload into
zoffset.h, and make build.c shove them back into the right places in
the bzImage header.
Rather than including zoffset.h into build.c and thus having to rebuild
the tool for every kernel build, we parse it instead. The parsing code
is small and simple.
This patch doesn't actually move any of the interesting entry points, so
any offending bootloader will still continue to "work" after this patch
is applied. For some version of "work" which includes jumping into the
compressed payload and crashing, if the bzImage it's given is a 32-bit
kernel. No change there then.
[ hpa: some of the issues in the description are addressed or
retconned by the 2.12 boot protocol. This patch has been edited to
only remove fixed addresses that were *not* thus retconned. ]
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
Link: http://lkml.kernel.org/r/1358513837.2397.247.camel@shinybook.infradead.org
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
Cc: Matt Fleming <matt.fleming@intel.com>
2013-01-10 22:31:59 +08:00
|
|
|
ENTRY(efi_pe_entry)
|
x86, efi: EFI boot stub support
There is currently a large divide between kernel development and the
development of EFI boot loaders. The idea behind this patch is to give
the kernel developers full control over the EFI boot process. As
H. Peter Anvin put it,
"The 'kernel carries its own stub' approach been very successful in
dealing with BIOS, and would make a lot of sense to me for EFI as
well."
This patch introduces an EFI boot stub that allows an x86 bzImage to
be loaded and executed by EFI firmware. The bzImage appears to the
firmware as an EFI application. Luckily there are enough free bits
within the bzImage header so that it can masquerade as an EFI
application, thereby coercing the EFI firmware into loading it and
jumping to its entry point. The beauty of this masquerading approach
is that both BIOS and EFI boot loaders can still load and run the same
bzImage, thereby allowing a single kernel image to work in any boot
environment.
The EFI boot stub supports multiple initrds, but they must exist on
the same partition as the bzImage. Command-line arguments for the
kernel can be appended after the bzImage name when run from the EFI
shell, e.g.
Shell> bzImage console=ttyS0 root=/dev/sdb initrd=initrd.img
v7:
- Fix checkpatch warnings.
v6:
- Try to allocate initrd memory just below hdr->inird_addr_max.
v5:
- load_options_size is UTF-16, which needs dividing by 2 to convert
to the corresponding ASCII size.
v4:
- Don't read more than image->load_options_size
v3:
- Fix following warnings when compiling CONFIG_EFI_STUB=n
arch/x86/boot/tools/build.c: In function ‘main’:
arch/x86/boot/tools/build.c:138:24: warning: unused variable ‘pe_header’
arch/x86/boot/tools/build.c:138:15: warning: unused variable ‘file_sz’
- As reported by Matthew Garrett, some Apple machines have GOPs that
don't have hardware attached. We need to weed these out by
searching for ones that handle the PCIIO protocol.
- Don't allocate memory if no initrds are on cmdline
- Don't trust image->load_options_size
Maarten Lankhorst noted:
- Don't strip first argument when booted from efibootmgr
- Don't allocate too much memory for cmdline
- Don't update cmdline_size, the kernel considers it read-only
- Don't accept '\n' for initrd names
v2:
- File alignment was too large, was 8192 should be 512. Reported by
Maarten Lankhorst on LKML.
- Added UGA support for graphics
- Use VIDEO_TYPE_EFI instead of hard-coded number.
- Move linelength assignment until after we've assigned depth
- Dynamically fill out AddressOfEntryPoint in tools/build.c
- Don't use magic number for GDT/TSS stuff. Requested by Andi Kleen
- The bzImage may need to be relocated as it may have been loaded at
a high address address by the firmware. This was required to get my
macbook booting because the firmware loaded it at 0x7cxxxxxx, which
triggers this error in decompress_kernel(),
if (heap > ((-__PAGE_OFFSET-(128<<20)-1) & 0x7fffffff))
error("Destination address too large");
Cc: Mike Waychison <mikew@google.com>
Cc: Matthew Garrett <mjg@redhat.com>
Tested-by: Henrik Rydberg <rydberg@euromail.se>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
Link: http://lkml.kernel.org/r/1321383097.2657.9.camel@mfleming-mobl1.ger.corp.intel.com
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2011-12-13 05:27:52 +08:00
|
|
|
add $0x4, %esp
|
|
|
|
|
2014-01-10 23:27:14 +08:00
|
|
|
call 1f
|
|
|
|
1: popl %esi
|
|
|
|
subl $1b, %esi
|
|
|
|
|
|
|
|
popl %ecx
|
|
|
|
movl %ecx, efi32_config(%esi) /* Handle */
|
|
|
|
popl %ecx
|
|
|
|
movl %ecx, efi32_config+8(%esi) /* EFI System table pointer */
|
|
|
|
|
|
|
|
/* Relocate efi_config->call() */
|
|
|
|
leal efi32_config(%esi), %eax
|
|
|
|
add %esi, 88(%eax)
|
|
|
|
pushl %eax
|
|
|
|
|
2012-07-19 17:23:48 +08:00
|
|
|
call make_boot_params
|
|
|
|
cmpl $0, %eax
|
2014-01-10 23:27:14 +08:00
|
|
|
je fail
|
2014-04-08 20:14:00 +08:00
|
|
|
movl %esi, BP_code32_start(%eax)
|
2014-01-10 23:27:14 +08:00
|
|
|
popl %ecx
|
2012-07-19 17:23:48 +08:00
|
|
|
pushl %eax
|
|
|
|
pushl %ecx
|
2014-01-10 23:27:14 +08:00
|
|
|
jmp 2f /* Skip efi_config initialization */
|
2012-07-19 17:23:48 +08:00
|
|
|
|
x86/efi: Firmware agnostic handover entry points
The EFI handover code only works if the "bitness" of the firmware and
the kernel match, i.e. 64-bit firmware and 64-bit kernel - it is not
possible to mix the two. This goes against the tradition that a 32-bit
kernel can be loaded on a 64-bit BIOS platform without having to do
anything special in the boot loader. Linux distributions, for one thing,
regularly run only 32-bit kernels on their live media.
Despite having only one 'handover_offset' field in the kernel header,
EFI boot loaders use two separate entry points to enter the kernel based
on the architecture the boot loader was compiled for,
(1) 32-bit loader: handover_offset
(2) 64-bit loader: handover_offset + 512
Since we already have two entry points, we can leverage them to infer
the bitness of the firmware we're running on, without requiring any boot
loader modifications, by making (1) and (2) valid entry points for both
CONFIG_X86_32 and CONFIG_X86_64 kernels.
To be clear, a 32-bit boot loader will always use (1) and a 64-bit boot
loader will always use (2). It's just that, if a single kernel image
supports (1) and (2) that image can be used with both 32-bit and 64-bit
boot loaders, and hence both 32-bit and 64-bit EFI.
(1) and (2) must be 512 bytes apart at all times, but that is already
part of the boot ABI and we could never change that delta without
breaking existing boot loaders anyhow.
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2014-01-10 23:54:31 +08:00
|
|
|
ENTRY(efi32_stub_entry)
|
2013-01-08 06:01:50 +08:00
|
|
|
add $0x4, %esp
|
2014-01-10 23:27:14 +08:00
|
|
|
popl %ecx
|
|
|
|
popl %edx
|
|
|
|
|
|
|
|
call 1f
|
|
|
|
1: popl %esi
|
|
|
|
subl $1b, %esi
|
|
|
|
|
|
|
|
movl %ecx, efi32_config(%esi) /* Handle */
|
|
|
|
movl %edx, efi32_config+8(%esi) /* EFI System table pointer */
|
|
|
|
|
|
|
|
/* Relocate efi_config->call() */
|
|
|
|
leal efi32_config(%esi), %eax
|
|
|
|
add %esi, 88(%eax)
|
|
|
|
pushl %eax
|
|
|
|
2:
|
x86, efi: EFI boot stub support
There is currently a large divide between kernel development and the
development of EFI boot loaders. The idea behind this patch is to give
the kernel developers full control over the EFI boot process. As
H. Peter Anvin put it,
"The 'kernel carries its own stub' approach been very successful in
dealing with BIOS, and would make a lot of sense to me for EFI as
well."
This patch introduces an EFI boot stub that allows an x86 bzImage to
be loaded and executed by EFI firmware. The bzImage appears to the
firmware as an EFI application. Luckily there are enough free bits
within the bzImage header so that it can masquerade as an EFI
application, thereby coercing the EFI firmware into loading it and
jumping to its entry point. The beauty of this masquerading approach
is that both BIOS and EFI boot loaders can still load and run the same
bzImage, thereby allowing a single kernel image to work in any boot
environment.
The EFI boot stub supports multiple initrds, but they must exist on
the same partition as the bzImage. Command-line arguments for the
kernel can be appended after the bzImage name when run from the EFI
shell, e.g.
Shell> bzImage console=ttyS0 root=/dev/sdb initrd=initrd.img
v7:
- Fix checkpatch warnings.
v6:
- Try to allocate initrd memory just below hdr->inird_addr_max.
v5:
- load_options_size is UTF-16, which needs dividing by 2 to convert
to the corresponding ASCII size.
v4:
- Don't read more than image->load_options_size
v3:
- Fix following warnings when compiling CONFIG_EFI_STUB=n
arch/x86/boot/tools/build.c: In function ‘main’:
arch/x86/boot/tools/build.c:138:24: warning: unused variable ‘pe_header’
arch/x86/boot/tools/build.c:138:15: warning: unused variable ‘file_sz’
- As reported by Matthew Garrett, some Apple machines have GOPs that
don't have hardware attached. We need to weed these out by
searching for ones that handle the PCIIO protocol.
- Don't allocate memory if no initrds are on cmdline
- Don't trust image->load_options_size
Maarten Lankhorst noted:
- Don't strip first argument when booted from efibootmgr
- Don't allocate too much memory for cmdline
- Don't update cmdline_size, the kernel considers it read-only
- Don't accept '\n' for initrd names
v2:
- File alignment was too large, was 8192 should be 512. Reported by
Maarten Lankhorst on LKML.
- Added UGA support for graphics
- Use VIDEO_TYPE_EFI instead of hard-coded number.
- Move linelength assignment until after we've assigned depth
- Dynamically fill out AddressOfEntryPoint in tools/build.c
- Don't use magic number for GDT/TSS stuff. Requested by Andi Kleen
- The bzImage may need to be relocated as it may have been loaded at
a high address address by the firmware. This was required to get my
macbook booting because the firmware loaded it at 0x7cxxxxxx, which
triggers this error in decompress_kernel(),
if (heap > ((-__PAGE_OFFSET-(128<<20)-1) & 0x7fffffff))
error("Destination address too large");
Cc: Mike Waychison <mikew@google.com>
Cc: Matthew Garrett <mjg@redhat.com>
Tested-by: Henrik Rydberg <rydberg@euromail.se>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
Link: http://lkml.kernel.org/r/1321383097.2657.9.camel@mfleming-mobl1.ger.corp.intel.com
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2011-12-13 05:27:52 +08:00
|
|
|
call efi_main
|
|
|
|
cmpl $0, %eax
|
|
|
|
movl %eax, %esi
|
2012-04-15 23:06:04 +08:00
|
|
|
jne 2f
|
2014-01-10 23:27:14 +08:00
|
|
|
fail:
|
2012-04-15 23:06:04 +08:00
|
|
|
/* EFI init failed, so hang. */
|
|
|
|
hlt
|
2014-01-10 23:27:14 +08:00
|
|
|
jmp fail
|
2012-04-15 23:06:04 +08:00
|
|
|
2:
|
2014-04-08 20:14:00 +08:00
|
|
|
movl BP_code32_start(%esi), %eax
|
x86, efi: EFI boot stub support
There is currently a large divide between kernel development and the
development of EFI boot loaders. The idea behind this patch is to give
the kernel developers full control over the EFI boot process. As
H. Peter Anvin put it,
"The 'kernel carries its own stub' approach been very successful in
dealing with BIOS, and would make a lot of sense to me for EFI as
well."
This patch introduces an EFI boot stub that allows an x86 bzImage to
be loaded and executed by EFI firmware. The bzImage appears to the
firmware as an EFI application. Luckily there are enough free bits
within the bzImage header so that it can masquerade as an EFI
application, thereby coercing the EFI firmware into loading it and
jumping to its entry point. The beauty of this masquerading approach
is that both BIOS and EFI boot loaders can still load and run the same
bzImage, thereby allowing a single kernel image to work in any boot
environment.
The EFI boot stub supports multiple initrds, but they must exist on
the same partition as the bzImage. Command-line arguments for the
kernel can be appended after the bzImage name when run from the EFI
shell, e.g.
Shell> bzImage console=ttyS0 root=/dev/sdb initrd=initrd.img
v7:
- Fix checkpatch warnings.
v6:
- Try to allocate initrd memory just below hdr->inird_addr_max.
v5:
- load_options_size is UTF-16, which needs dividing by 2 to convert
to the corresponding ASCII size.
v4:
- Don't read more than image->load_options_size
v3:
- Fix following warnings when compiling CONFIG_EFI_STUB=n
arch/x86/boot/tools/build.c: In function ‘main’:
arch/x86/boot/tools/build.c:138:24: warning: unused variable ‘pe_header’
arch/x86/boot/tools/build.c:138:15: warning: unused variable ‘file_sz’
- As reported by Matthew Garrett, some Apple machines have GOPs that
don't have hardware attached. We need to weed these out by
searching for ones that handle the PCIIO protocol.
- Don't allocate memory if no initrds are on cmdline
- Don't trust image->load_options_size
Maarten Lankhorst noted:
- Don't strip first argument when booted from efibootmgr
- Don't allocate too much memory for cmdline
- Don't update cmdline_size, the kernel considers it read-only
- Don't accept '\n' for initrd names
v2:
- File alignment was too large, was 8192 should be 512. Reported by
Maarten Lankhorst on LKML.
- Added UGA support for graphics
- Use VIDEO_TYPE_EFI instead of hard-coded number.
- Move linelength assignment until after we've assigned depth
- Dynamically fill out AddressOfEntryPoint in tools/build.c
- Don't use magic number for GDT/TSS stuff. Requested by Andi Kleen
- The bzImage may need to be relocated as it may have been loaded at
a high address address by the firmware. This was required to get my
macbook booting because the firmware loaded it at 0x7cxxxxxx, which
triggers this error in decompress_kernel(),
if (heap > ((-__PAGE_OFFSET-(128<<20)-1) & 0x7fffffff))
error("Destination address too large");
Cc: Mike Waychison <mikew@google.com>
Cc: Matthew Garrett <mjg@redhat.com>
Tested-by: Henrik Rydberg <rydberg@euromail.se>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
Link: http://lkml.kernel.org/r/1321383097.2657.9.camel@mfleming-mobl1.ger.corp.intel.com
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
2011-12-13 05:27:52 +08:00
|
|
|
leal preferred_addr(%eax), %eax
|
|
|
|
jmp *%eax
|
|
|
|
|
|
|
|
preferred_addr:
|
|
|
|
#endif
|
2007-10-27 01:29:04 +08:00
|
|
|
cld
|
2009-05-09 06:45:17 +08:00
|
|
|
/*
|
|
|
|
* Test KEEP_SEGMENTS flag to see if the bootloader is asking
|
|
|
|
* us to not reload segments
|
|
|
|
*/
|
2015-02-19 15:34:58 +08:00
|
|
|
testb $KEEP_SEGMENTS, BP_loadflags(%esi)
|
2009-05-09 06:45:17 +08:00
|
|
|
jnz 1f
|
2007-10-22 07:41:35 +08:00
|
|
|
|
2007-10-27 01:29:04 +08:00
|
|
|
cli
|
2009-05-09 06:45:17 +08:00
|
|
|
movl $__BOOT_DS, %eax
|
|
|
|
movl %eax, %ds
|
|
|
|
movl %eax, %es
|
|
|
|
movl %eax, %fs
|
|
|
|
movl %eax, %gs
|
|
|
|
movl %eax, %ss
|
2007-10-27 01:29:04 +08:00
|
|
|
1:
|
2007-10-22 07:41:35 +08:00
|
|
|
|
2009-05-09 06:45:17 +08:00
|
|
|
/*
|
|
|
|
* Calculate the delta between where we were compiled to run
|
2006-12-07 09:14:04 +08:00
|
|
|
* at and where we were actually loaded at. This can only be done
|
|
|
|
* with a short local call on x86. Nothing else will tell us what
|
|
|
|
* address we are running at. The reserved chunk of the real-mode
|
2007-07-12 03:18:33 +08:00
|
|
|
* data at 0x1e4 (defined as a scratch field) are used as the stack
|
|
|
|
* for this calculation. Only 4 bytes are needed.
|
2006-12-07 09:14:04 +08:00
|
|
|
*/
|
2009-05-09 06:45:17 +08:00
|
|
|
leal (BP_scratch+4)(%esi), %esp
|
|
|
|
call 1f
|
|
|
|
1: popl %ebp
|
|
|
|
subl $1b, %ebp
|
2006-12-07 09:14:04 +08:00
|
|
|
|
2009-05-09 06:45:17 +08:00
|
|
|
/*
|
|
|
|
* %ebp contains the address we are loaded at by the boot loader and %ebx
|
2006-12-07 09:14:04 +08:00
|
|
|
* contains the address where we should move the kernel image temporarily
|
|
|
|
* for safe in-place decompression.
|
2006-12-07 09:14:04 +08:00
|
|
|
*/
|
2006-12-07 09:14:04 +08:00
|
|
|
|
2006-12-07 09:14:04 +08:00
|
|
|
#ifdef CONFIG_RELOCATABLE
|
2009-05-09 06:45:17 +08:00
|
|
|
movl %ebp, %ebx
|
2009-05-12 06:56:08 +08:00
|
|
|
movl BP_kernel_alignment(%esi), %eax
|
|
|
|
decl %eax
|
|
|
|
addl %eax, %ebx
|
|
|
|
notl %eax
|
|
|
|
andl %eax, %ebx
|
2013-10-11 08:18:14 +08:00
|
|
|
cmpl $LOAD_PHYSICAL_ADDR, %ebx
|
|
|
|
jge 1f
|
2006-12-07 09:14:04 +08:00
|
|
|
#endif
|
2013-10-11 08:18:14 +08:00
|
|
|
movl $LOAD_PHYSICAL_ADDR, %ebx
|
|
|
|
1:
|
2006-12-07 09:14:04 +08:00
|
|
|
|
2009-05-09 08:42:16 +08:00
|
|
|
/* Target address to relocate to for decompression */
|
|
|
|
addl $z_extract_offset, %ebx
|
2006-12-07 09:14:04 +08:00
|
|
|
|
2009-05-09 07:27:41 +08:00
|
|
|
/* Set up the stack */
|
|
|
|
leal boot_stack_end(%ebx), %esp
|
|
|
|
|
2009-05-07 08:56:51 +08:00
|
|
|
/* Zero EFLAGS */
|
|
|
|
pushl $0
|
|
|
|
popfl
|
|
|
|
|
2009-05-09 06:45:17 +08:00
|
|
|
/*
|
|
|
|
* Copy the compressed kernel to the end of our buffer
|
2006-12-07 09:14:04 +08:00
|
|
|
* where decompression in place becomes safe.
|
|
|
|
*/
|
2009-05-09 06:45:17 +08:00
|
|
|
pushl %esi
|
2009-05-09 07:45:15 +08:00
|
|
|
leal (_bss-4)(%ebp), %esi
|
|
|
|
leal (_bss-4)(%ebx), %edi
|
2009-05-09 07:20:34 +08:00
|
|
|
movl $(_bss - startup_32), %ecx
|
2009-05-09 07:45:15 +08:00
|
|
|
shrl $2, %ecx
|
2006-12-07 09:14:04 +08:00
|
|
|
std
|
2009-05-09 07:45:15 +08:00
|
|
|
rep movsl
|
2006-12-07 09:14:04 +08:00
|
|
|
cld
|
2009-05-09 06:45:17 +08:00
|
|
|
popl %esi
|
2006-12-07 09:14:04 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
2006-12-07 09:14:04 +08:00
|
|
|
* Jump to the relocated address.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2009-05-09 06:45:17 +08:00
|
|
|
leal relocated(%ebx), %eax
|
|
|
|
jmp *%eax
|
2009-02-14 05:50:23 +08:00
|
|
|
ENDPROC(startup_32)
|
|
|
|
|
2009-05-09 06:45:17 +08:00
|
|
|
.text
|
2006-12-07 09:14:04 +08:00
|
|
|
relocated:
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
2009-05-09 07:27:41 +08:00
|
|
|
* Clear BSS (stack is currently empty)
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2009-05-09 06:45:17 +08:00
|
|
|
xorl %eax, %eax
|
2009-05-09 07:20:34 +08:00
|
|
|
leal _bss(%ebx), %edi
|
2009-05-09 06:45:17 +08:00
|
|
|
leal _ebss(%ebx), %ecx
|
|
|
|
subl %edi, %ecx
|
2009-05-09 07:45:15 +08:00
|
|
|
shrl $2, %ecx
|
|
|
|
rep stosl
|
2006-12-07 09:14:04 +08:00
|
|
|
|
2014-09-23 14:05:49 +08:00
|
|
|
/*
|
|
|
|
* Adjust our own GOT
|
|
|
|
*/
|
|
|
|
leal _got(%ebx), %edx
|
|
|
|
leal _egot(%ebx), %ecx
|
|
|
|
1:
|
|
|
|
cmpl %ecx, %edx
|
|
|
|
jae 2f
|
|
|
|
addl %ebx, (%edx)
|
|
|
|
addl $4, %edx
|
|
|
|
jmp 1b
|
|
|
|
2:
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Do the decompression, and jump to the new kernel..
|
|
|
|
*/
|
2009-05-09 06:45:17 +08:00
|
|
|
/* push arguments for decompress_kernel: */
|
2014-10-31 21:40:38 +08:00
|
|
|
pushl $z_run_size /* size of kernel with .bss and .brk */
|
|
|
|
pushl $z_output_len /* decompressed length, end of relocs */
|
2013-07-09 00:15:17 +08:00
|
|
|
leal z_extract_offset_negative(%ebx), %ebp
|
2009-05-09 06:45:17 +08:00
|
|
|
pushl %ebp /* output address */
|
2009-05-09 08:42:16 +08:00
|
|
|
pushl $z_input_len /* input_len */
|
2009-05-09 06:45:17 +08:00
|
|
|
leal input_data(%ebx), %eax
|
|
|
|
pushl %eax /* input_data */
|
|
|
|
leal boot_heap(%ebx), %eax
|
|
|
|
pushl %eax /* heap area */
|
|
|
|
pushl %esi /* real mode pointer */
|
2013-10-11 08:18:14 +08:00
|
|
|
call decompress_kernel /* returns kernel location in %eax */
|
2014-10-31 21:40:38 +08:00
|
|
|
addl $28, %esp
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/*
|
2006-12-07 09:14:04 +08:00
|
|
|
* Jump to the decompressed kernel.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2009-05-09 06:45:17 +08:00
|
|
|
xorl %ebx, %ebx
|
2013-10-11 08:18:14 +08:00
|
|
|
jmp *%eax
|
2006-12-07 09:14:04 +08:00
|
|
|
|
2014-09-05 21:52:26 +08:00
|
|
|
#ifdef CONFIG_EFI_STUB
|
2014-09-23 14:05:49 +08:00
|
|
|
.data
|
2014-01-10 23:27:14 +08:00
|
|
|
efi32_config:
|
|
|
|
.fill 11,8,0
|
|
|
|
.long efi_call_phys
|
|
|
|
.long 0
|
|
|
|
.byte 0
|
2014-03-05 18:15:55 +08:00
|
|
|
#endif
|
2014-01-10 23:27:14 +08:00
|
|
|
|
2009-05-09 06:45:17 +08:00
|
|
|
/*
|
|
|
|
* Stack and heap for uncompression
|
|
|
|
*/
|
|
|
|
.bss
|
|
|
|
.balign 4
|
2008-04-08 18:54:30 +08:00
|
|
|
boot_heap:
|
|
|
|
.fill BOOT_HEAP_SIZE, 1, 0
|
|
|
|
boot_stack:
|
|
|
|
.fill BOOT_STACK_SIZE, 1, 0
|
|
|
|
boot_stack_end:
|