License cleanup: add SPDX GPL-2.0 license identifier to files with no license
[linux-2.6-block.git] / arch / x86 / boot / compressed / misc.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * misc.c
818a08f8 4 *
c0402881
KC
5 * This is a collection of several routines used to extract the kernel
6 * which includes KASLR relocation, decompression, ELF parsing, and
7 * relocation processing. Additionally included are the screen and serial
8 * output functions and related debugging support functions.
1da177e4
LT
9 *
10 * malloc by Hannu Savolainen 1993 and Matthias Urlichs 1994
11 * puts by Nick Holloway 1993, better puts by Martin Mares 1995
12 * High loaded stuff by Hans Lermen & Werner Almesberger, Feb. 1996
13 */
14
8fee13a4 15#include "misc.h"
dc425a6e 16#include "error.h"
820e8fec 17#include "../string.h"
67b66625 18#include "../voffset.h"
968de4f0 19
968de4f0 20/*
4252db10
BH
21 * WARNING!!
22 * This code is compiled with -fPIC and it is relocated dynamically at
23 * run time, but no relocation processing is performed. This means that
24 * it is not safe to place pointers in static structures.
968de4f0 25 */
1da177e4 26
1f208de3 27/* Macros used by the included decompressor code below. */
1180e01d 28#define STATIC static
1da177e4 29
04999550 30/*
1f208de3 31 * Use normal definitions of mem*() from string.c. There are already
04999550
VG
32 * included header files which expect a definition of memset() and by
33 * the time we define memset macro, it is too late.
34 */
1f208de3 35#undef memcpy
04999550 36#undef memset
1180e01d 37#define memzero(s, n) memset((s), 0, (n))
81b785f3 38#define memmove memmove
1da177e4 39
1f208de3 40/* Functions used by the included decompressor code below. */
81b785f3 41void *memmove(void *dest, const void *src, size_t n);
fd77c7ca 42
1da177e4
LT
43/*
44 * This is set up by the setup-routine at boot-time
45 */
6655e0aa 46struct boot_params *boot_params;
1da177e4 47
82fa9637
KC
48memptr free_mem_ptr;
49memptr free_mem_end_ptr;
1da177e4 50
03056c88 51static char *vidmem;
1da177e4
LT
52static int vidport;
53static int lines, cols;
54
ae03c499
AK
55#ifdef CONFIG_KERNEL_GZIP
56#include "../../../../lib/decompress_inflate.c"
57#endif
58
59#ifdef CONFIG_KERNEL_BZIP2
60#include "../../../../lib/decompress_bunzip2.c"
61#endif
62
63#ifdef CONFIG_KERNEL_LZMA
64#include "../../../../lib/decompress_unlzma.c"
65#endif
1da177e4 66
30314804
LC
67#ifdef CONFIG_KERNEL_XZ
68#include "../../../../lib/decompress_unxz.c"
69#endif
70
13510997
AT
71#ifdef CONFIG_KERNEL_LZO
72#include "../../../../lib/decompress_unlzo.c"
73#endif
74
f9b493ac
KL
75#ifdef CONFIG_KERNEL_LZ4
76#include "../../../../lib/decompress_unlz4.c"
77#endif
4252db10
BH
78/*
79 * NOTE: When adding a new decompressor, please update the analysis in
80 * ../header.S.
81 */
f9b493ac 82
1da177e4
LT
83static void scroll(void)
84{
85 int i;
86
81b785f3 87 memmove(vidmem, vidmem + cols * 2, (lines - 1) * cols * 2);
fd77c7ca 88 for (i = (lines - 1) * cols * 2; i < lines * cols * 2; i += 2)
1da177e4
LT
89 vidmem[i] = ' ';
90}
91
8fee13a4
YL
92#define XMTRDY 0x20
93
94#define TXR 0 /* Transmit register (WRITE) */
95#define LSR 5 /* Line Status */
96static void serial_putchar(int ch)
97{
98 unsigned timeout = 0xffff;
99
100 while ((inb(early_serial_base + LSR) & XMTRDY) == 0 && --timeout)
101 cpu_relax();
102
103 outb(ch, early_serial_base + TXR);
104}
105
7aac3015 106void __putstr(const char *s)
1da177e4 107{
fd77c7ca 108 int x, y, pos;
1da177e4
LT
109 char c;
110
8fee13a4
YL
111 if (early_serial_base) {
112 const char *str = s;
113 while (*str) {
114 if (*str == '\n')
115 serial_putchar('\r');
116 serial_putchar(*str++);
117 }
118 }
6bcb13b3 119
fb1cc2f9 120 if (lines == 0 || cols == 0)
a24e7851
RR
121 return;
122
6655e0aa
KC
123 x = boot_params->screen_info.orig_x;
124 y = boot_params->screen_info.orig_y;
1da177e4 125
fd77c7ca
PC
126 while ((c = *s++) != '\0') {
127 if (c == '\n') {
1da177e4 128 x = 0;
fd77c7ca 129 if (++y >= lines) {
1da177e4
LT
130 scroll();
131 y--;
132 }
133 } else {
020878ac 134 vidmem[(x + cols * y) * 2] = c;
fd77c7ca 135 if (++x >= cols) {
1da177e4 136 x = 0;
fd77c7ca 137 if (++y >= lines) {
1da177e4
LT
138 scroll();
139 y--;
140 }
141 }
142 }
143 }
144
6655e0aa
KC
145 boot_params->screen_info.orig_x = x;
146 boot_params->screen_info.orig_y = y;
1da177e4
LT
147
148 pos = (x + cols * y) * 2; /* Update cursor position */
b02aae9c
RH
149 outb(14, vidport);
150 outb(0xff & (pos >> 9), vidport+1);
151 outb(15, vidport);
152 outb(0xff & (pos >> 1), vidport+1);
1da177e4
LT
153}
154
79063a7c
KC
155void __puthex(unsigned long value)
156{
157 char alpha[2] = "0";
158 int bits;
159
160 for (bits = sizeof(value) * 8 - 4; bits >= 0; bits -= 4) {
161 unsigned long digit = (value >> bits) & 0xf;
162
163 if (digit < 0xA)
164 alpha[0] = '0' + digit;
165 else
166 alpha[0] = 'a' + (digit - 0xA);
167
168 __putstr(alpha);
169 }
170}
171
a0215061 172#if CONFIG_X86_NEED_RELOCS
8391c73c
BH
173static void handle_relocations(void *output, unsigned long output_len,
174 unsigned long virt_addr)
a0215061
KC
175{
176 int *reloc;
177 unsigned long delta, map, ptr;
178 unsigned long min_addr = (unsigned long)output;
4abf061b 179 unsigned long max_addr = min_addr + (VO___bss_start - VO__text);
a0215061
KC
180
181 /*
182 * Calculate the delta between where vmlinux was linked to load
183 * and where it was actually loaded.
184 */
185 delta = min_addr - LOAD_PHYSICAL_ADDR;
a0215061
KC
186
187 /*
188 * The kernel contains a table of relocation addresses. Those
189 * addresses have the final load address of the kernel in virtual
190 * memory. We are currently working in the self map. So we need to
191 * create an adjustment for kernel memory addresses to the self map.
192 * This will involve subtracting out the base address of the kernel.
193 */
194 map = delta - __START_KERNEL_map;
195
8391c73c
BH
196 /*
197 * 32-bit always performs relocations. 64-bit relocations are only
198 * needed if KASLR has chosen a different starting address offset
199 * from __START_KERNEL_map.
200 */
201 if (IS_ENABLED(CONFIG_X86_64))
202 delta = virt_addr - LOAD_PHYSICAL_ADDR;
203
204 if (!delta) {
205 debug_putstr("No relocation needed... ");
206 return;
207 }
208 debug_putstr("Performing relocations... ");
209
a0215061
KC
210 /*
211 * Process relocations: 32 bit relocations first then 64 bit after.
6d24c5f7 212 * Three sets of binary relocations are added to the end of the kernel
a0215061
KC
213 * before compression. Each relocation table entry is the kernel
214 * address of the location which needs to be updated stored as a
215 * 32-bit value which is sign extended to 64 bits.
216 *
217 * Format is:
218 *
219 * kernel bits...
220 * 0 - zero terminator for 64 bit relocations
221 * 64 bit relocation repeated
6d24c5f7
JB
222 * 0 - zero terminator for inverse 32 bit relocations
223 * 32 bit inverse relocation repeated
a0215061
KC
224 * 0 - zero terminator for 32 bit relocations
225 * 32 bit relocation repeated
226 *
227 * So we work backwards from the end of the decompressed image.
228 */
229 for (reloc = output + output_len - sizeof(*reloc); *reloc; reloc--) {
6f9af75f 230 long extended = *reloc;
a0215061
KC
231 extended += map;
232
233 ptr = (unsigned long)extended;
234 if (ptr < min_addr || ptr > max_addr)
235 error("32-bit relocation outside of kernel!\n");
236
237 *(uint32_t *)ptr += delta;
238 }
239#ifdef CONFIG_X86_64
6d24c5f7
JB
240 while (*--reloc) {
241 long extended = *reloc;
242 extended += map;
243
244 ptr = (unsigned long)extended;
245 if (ptr < min_addr || ptr > max_addr)
246 error("inverse 32-bit relocation outside of kernel!\n");
247
248 *(int32_t *)ptr -= delta;
249 }
a0215061
KC
250 for (reloc--; *reloc; reloc--) {
251 long extended = *reloc;
252 extended += map;
253
254 ptr = (unsigned long)extended;
255 if (ptr < min_addr || ptr > max_addr)
256 error("64-bit relocation outside of kernel!\n");
257
258 *(uint64_t *)ptr += delta;
259 }
260#endif
261}
262#else
8391c73c
BH
263static inline void handle_relocations(void *output, unsigned long output_len,
264 unsigned long virt_addr)
a0215061
KC
265{ }
266#endif
267
099e1377
IC
268static void parse_elf(void *output)
269{
270#ifdef CONFIG_X86_64
271 Elf64_Ehdr ehdr;
272 Elf64_Phdr *phdrs, *phdr;
273#else
274 Elf32_Ehdr ehdr;
275 Elf32_Phdr *phdrs, *phdr;
276#endif
277 void *dest;
278 int i;
279
280 memcpy(&ehdr, output, sizeof(ehdr));
fd77c7ca 281 if (ehdr.e_ident[EI_MAG0] != ELFMAG0 ||
099e1377
IC
282 ehdr.e_ident[EI_MAG1] != ELFMAG1 ||
283 ehdr.e_ident[EI_MAG2] != ELFMAG2 ||
fd77c7ca 284 ehdr.e_ident[EI_MAG3] != ELFMAG3) {
099e1377
IC
285 error("Kernel is not a valid ELF file");
286 return;
287 }
288
e605a425 289 debug_putstr("Parsing ELF... ");
099e1377
IC
290
291 phdrs = malloc(sizeof(*phdrs) * ehdr.e_phnum);
292 if (!phdrs)
293 error("Failed to allocate space for phdrs");
294
295 memcpy(phdrs, output + ehdr.e_phoff, sizeof(*phdrs) * ehdr.e_phnum);
296
fd77c7ca 297 for (i = 0; i < ehdr.e_phnum; i++) {
099e1377
IC
298 phdr = &phdrs[i];
299
300 switch (phdr->p_type) {
301 case PT_LOAD:
302#ifdef CONFIG_RELOCATABLE
303 dest = output;
304 dest += (phdr->p_paddr - LOAD_PHYSICAL_ADDR);
305#else
fd77c7ca 306 dest = (void *)(phdr->p_paddr);
099e1377 307#endif
81b785f3 308 memmove(dest, output + phdr->p_offset, phdr->p_filesz);
099e1377
IC
309 break;
310 default: /* Ignore other PT_* */ break;
311 }
312 }
5067cf53
JJ
313
314 free(phdrs);
099e1377
IC
315}
316
974f221c
YL
317/*
318 * The compressed kernel image (ZO), has been moved so that its position
319 * is against the end of the buffer used to hold the uncompressed kernel
320 * image (VO) and the execution environment (.bss, .brk), which makes sure
321 * there is room to do the in-place decompression. (See header.S for the
322 * calculations.)
323 *
324 * |-----compressed kernel image------|
325 * V V
326 * 0 extract_offset +INIT_SIZE
327 * |-----------|---------------|-------------------------|--------|
328 * | | | |
329 * VO__text startup_32 of ZO VO__end ZO__end
330 * ^ ^
331 * |-------uncompressed kernel image---------|
332 *
333 */
c0402881 334asmlinkage __visible void *extract_kernel(void *rmode, memptr heap,
1180e01d
IM
335 unsigned char *input_data,
336 unsigned long input_len,
a0215061 337 unsigned char *output,
4d2d5424 338 unsigned long output_len)
1da177e4 339{
4d2d5424 340 const unsigned long kernel_total_size = VO__end - VO__text;
8eabf42a 341 unsigned long virt_addr = LOAD_PHYSICAL_ADDR;
f285f4a2 342
6655e0aa
KC
343 /* Retain x86 boot parameters pointer passed from startup_32/64. */
344 boot_params = rmode;
1da177e4 345
6655e0aa
KC
346 /* Clear flags intended for solely in-kernel use. */
347 boot_params->hdr.loadflags &= ~KASLR_FLAG;
78cac48c 348
6655e0aa 349 sanitize_boot_params(boot_params);
5dcd14ec 350
6655e0aa 351 if (boot_params->screen_info.orig_video_mode == 7) {
1da177e4
LT
352 vidmem = (char *) 0xb0000;
353 vidport = 0x3b4;
354 } else {
355 vidmem = (char *) 0xb8000;
356 vidport = 0x3d4;
357 }
358
6655e0aa
KC
359 lines = boot_params->screen_info.orig_video_lines;
360 cols = boot_params->screen_info.orig_video_cols;
1da177e4 361
8fee13a4 362 console_init();
c0402881 363 debug_putstr("early console in extract_kernel\n");
8fee13a4 364
4c83d653 365 free_mem_ptr = heap; /* Heap */
7c539764 366 free_mem_end_ptr = heap + BOOT_HEAP_SIZE;
968de4f0 367
79063a7c
KC
368 /* Report initial kernel position details. */
369 debug_putaddr(input_data);
370 debug_putaddr(input_len);
371 debug_putaddr(output);
372 debug_putaddr(output_len);
4d2d5424 373 debug_putaddr(kernel_total_size);
79063a7c 374
e6023367
JM
375 /*
376 * The memory hole needed for the kernel is the larger of either
377 * the entire decompressed kernel plus relocation table, or the
378 * entire decompressed kernel plus .bss and .brk sections.
379 */
8391c73c
BH
380 choose_random_location((unsigned long)input_data, input_len,
381 (unsigned long *)&output,
382 max(output_len, kernel_total_size),
383 &virt_addr);
8ab3820f
KC
384
385 /* Validate memory location choices. */
7ed42a28 386 if ((unsigned long)output & (MIN_KERNEL_ALIGN - 1))
8391c73c
BH
387 error("Destination physical address inappropriately aligned");
388 if (virt_addr & (MIN_KERNEL_ALIGN - 1))
389 error("Destination virtual address inappropriately aligned");
778cb929 390#ifdef CONFIG_X86_64
7ed42a28 391 if (heap > 0x3fffffffffffUL)
778cb929 392 error("Destination address too large");
b892cb87
BH
393 if (virt_addr + max(output_len, kernel_total_size) > KERNEL_IMAGE_SIZE)
394 error("Destination virtual address is beyond the kernel mapping area");
778cb929 395#else
147dd561 396 if (heap > ((-__PAGE_OFFSET-(128<<20)-1) & 0x7fffffff))
968de4f0 397 error("Destination address too large");
7ed42a28 398#endif
968de4f0 399#ifndef CONFIG_RELOCATABLE
7ed42a28 400 if ((unsigned long)output != LOAD_PHYSICAL_ADDR)
8391c73c 401 error("Destination address does not match LOAD_PHYSICAL_ADDR");
8eabf42a 402 if (virt_addr != LOAD_PHYSICAL_ADDR)
8391c73c 403 error("Destination virtual address changed when not relocatable");
968de4f0 404#endif
1da177e4 405
e605a425 406 debug_putstr("\nDecompressing Linux... ");
2d3862d2
YL
407 __decompress(input_data, input_len, NULL, NULL, output, output_len,
408 NULL, error);
099e1377 409 parse_elf(output);
8391c73c 410 handle_relocations(output, output_len, virt_addr);
e605a425 411 debug_putstr("done.\nBooting the kernel.\n");
8ab3820f 412 return output;
1da177e4 413}
6974f0c4
DM
414
415void fortify_panic(const char *name)
416{
417 error("detected buffer overflow");
418}