main.c revision fae59c39e885148acf42320fe0d4ebf4cb3e9231
1/*
2 * Copyright (C) Paul Mackerras 1997.
3 *
4 * Updates for PPC64 by Todd Inglett, Dave Engebretsen & Peter Bergner.
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11#include <stdarg.h>
12#include <stddef.h>
13#include "elf.h"
14#include "page.h"
15#include "string.h"
16#include "stdio.h"
17#include "ops.h"
18#include "gunzip_util.h"
19#include "flatdevtree.h"
20
21extern char _start[];
22extern char __bss_start[];
23extern char _end[];
24extern char _vmlinux_start[];
25extern char _vmlinux_end[];
26extern char _initrd_start[];
27extern char _initrd_end[];
28extern char _dtb_start[];
29extern char _dtb_end[];
30
31static struct gunzip_state gzstate;
32
33struct addr_range {
34	void *addr;
35	unsigned long size;
36};
37
38struct elf_info {
39	unsigned long loadsize;
40	unsigned long memsize;
41	unsigned long elfoffset;
42};
43
44typedef void (*kernel_entry_t)(unsigned long, unsigned long, void *);
45
46#undef DEBUG
47
48static int parse_elf64(void *hdr, struct elf_info *info)
49{
50	Elf64_Ehdr *elf64 = hdr;
51	Elf64_Phdr *elf64ph;
52	unsigned int i;
53
54	if (!(elf64->e_ident[EI_MAG0]  == ELFMAG0	&&
55	      elf64->e_ident[EI_MAG1]  == ELFMAG1	&&
56	      elf64->e_ident[EI_MAG2]  == ELFMAG2	&&
57	      elf64->e_ident[EI_MAG3]  == ELFMAG3	&&
58	      elf64->e_ident[EI_CLASS] == ELFCLASS64	&&
59	      elf64->e_ident[EI_DATA]  == ELFDATA2MSB	&&
60	      elf64->e_type            == ET_EXEC	&&
61	      elf64->e_machine         == EM_PPC64))
62		return 0;
63
64	elf64ph = (Elf64_Phdr *)((unsigned long)elf64 +
65				 (unsigned long)elf64->e_phoff);
66	for (i = 0; i < (unsigned int)elf64->e_phnum; i++, elf64ph++)
67		if (elf64ph->p_type == PT_LOAD)
68			break;
69	if (i >= (unsigned int)elf64->e_phnum)
70		return 0;
71
72	info->loadsize = (unsigned long)elf64ph->p_filesz;
73	info->memsize = (unsigned long)elf64ph->p_memsz;
74	info->elfoffset = (unsigned long)elf64ph->p_offset;
75
76	return 1;
77}
78
79static int parse_elf32(void *hdr, struct elf_info *info)
80{
81	Elf32_Ehdr *elf32 = hdr;
82	Elf32_Phdr *elf32ph;
83	unsigned int i;
84
85	if (!(elf32->e_ident[EI_MAG0]  == ELFMAG0	&&
86	      elf32->e_ident[EI_MAG1]  == ELFMAG1	&&
87	      elf32->e_ident[EI_MAG2]  == ELFMAG2	&&
88	      elf32->e_ident[EI_MAG3]  == ELFMAG3	&&
89	      elf32->e_ident[EI_CLASS] == ELFCLASS32	&&
90	      elf32->e_ident[EI_DATA]  == ELFDATA2MSB	&&
91	      elf32->e_type            == ET_EXEC	&&
92	      elf32->e_machine         == EM_PPC))
93		return 0;
94
95	elf32ph = (Elf32_Phdr *) ((unsigned long)elf32 + elf32->e_phoff);
96	for (i = 0; i < elf32->e_phnum; i++, elf32ph++)
97		if (elf32ph->p_type == PT_LOAD)
98			break;
99	if (i >= elf32->e_phnum)
100		return 0;
101
102	info->loadsize = elf32ph->p_filesz;
103	info->memsize = elf32ph->p_memsz;
104	info->elfoffset = elf32ph->p_offset;
105	return 1;
106}
107
108static struct addr_range prep_kernel(void)
109{
110	char elfheader[256];
111	void *vmlinuz_addr = _vmlinux_start;
112	unsigned long vmlinuz_size = _vmlinux_end - _vmlinux_start;
113	void *addr = 0;
114	struct elf_info ei;
115	int len;
116
117	/* gunzip the ELF header of the kernel */
118	gunzip_start(&gzstate, vmlinuz_addr, vmlinuz_size);
119	gunzip_exactly(&gzstate, elfheader, sizeof(elfheader));
120
121	if (!parse_elf64(elfheader, &ei) && !parse_elf32(elfheader, &ei))
122		fatal("Error: not a valid PPC32 or PPC64 ELF file!\n\r");
123
124	if (platform_ops.image_hdr)
125		platform_ops.image_hdr(elfheader);
126
127	/* We need to alloc the memsize: gzip will expand the kernel
128	 * text/data, then possible rubbish we don't care about. But
129	 * the kernel bss must be claimed (it will be zero'd by the
130	 * kernel itself)
131	 */
132	printf("Allocating 0x%lx bytes for kernel ...\n\r", ei.memsize);
133
134	if (platform_ops.vmlinux_alloc) {
135		addr = platform_ops.vmlinux_alloc(ei.memsize);
136	} else {
137		if ((unsigned long)_start < ei.memsize)
138			fatal("Insufficient memory for kernel at address 0!"
139			       " (_start=%p)\n\r", _start);
140	}
141
142	/* Finally, gunzip the kernel */
143	printf("gunzipping (0x%p <- 0x%p:0x%p)...", addr,
144	       vmlinuz_addr, vmlinuz_addr+vmlinuz_size);
145	/* discard up to the actual load data */
146	gunzip_discard(&gzstate, ei.elfoffset - sizeof(elfheader));
147	len = gunzip_finish(&gzstate, addr, ei.memsize);
148	printf("done 0x%x bytes\n\r", len);
149
150	flush_cache(addr, ei.loadsize);
151
152	return (struct addr_range){addr, ei.memsize};
153}
154
155static struct addr_range prep_initrd(struct addr_range vmlinux,
156				     unsigned long initrd_addr,
157				     unsigned long initrd_size)
158{
159	void *devp;
160	u32 initrd_start, initrd_end;
161
162	/* If we have an image attached to us, it overrides anything
163	 * supplied by the loader. */
164	if (_initrd_end > _initrd_start) {
165		printf("Attached initrd image at 0x%p-0x%p\n\r",
166		       _initrd_start, _initrd_end);
167		initrd_addr = (unsigned long)_initrd_start;
168		initrd_size = _initrd_end - _initrd_start;
169	} else if (initrd_size > 0) {
170		printf("Using loader supplied ramdisk at 0x%lx-0x%lx\n\r",
171		       initrd_addr, initrd_addr + initrd_size);
172	}
173
174	/* If there's no initrd at all, we're done */
175	if (! initrd_size)
176		return (struct addr_range){0, 0};
177
178	/*
179	 * If the initrd is too low it will be clobbered when the
180	 * kernel relocates to its final location.  In this case,
181	 * allocate a safer place and move it.
182	 */
183	if (initrd_addr < vmlinux.size) {
184		void *old_addr = (void *)initrd_addr;
185
186		printf("Allocating 0x%lx bytes for initrd ...\n\r",
187		       initrd_size);
188		initrd_addr = (unsigned long)malloc(initrd_size);
189		if (! initrd_addr)
190			fatal("Can't allocate memory for initial "
191			       "ramdisk !\n\r");
192		printf("Relocating initrd 0x%lx <- 0x%p (0x%lx bytes)\n\r",
193		       initrd_addr, old_addr, initrd_size);
194		memmove((void *)initrd_addr, old_addr, initrd_size);
195	}
196
197	printf("initrd head: 0x%lx\n\r", *((unsigned long *)initrd_addr));
198
199	/* Tell the kernel initrd address via device tree */
200	devp = finddevice("/chosen");
201	if (! devp)
202		fatal("Device tree has no chosen node!\n\r");
203
204	initrd_start = (u32)initrd_addr;
205	initrd_end = (u32)initrd_addr + initrd_size;
206
207	setprop(devp, "linux,initrd-start", &initrd_start,
208		sizeof(initrd_start));
209	setprop(devp, "linux,initrd-end", &initrd_end, sizeof(initrd_end));
210
211	return (struct addr_range){(void *)initrd_addr, initrd_size};
212}
213
214/* A buffer that may be edited by tools operating on a zImage binary so as to
215 * edit the command line passed to vmlinux (by setting /chosen/bootargs).
216 * The buffer is put in it's own section so that tools may locate it easier.
217 */
218static char builtin_cmdline[COMMAND_LINE_SIZE]
219	__attribute__((__section__("__builtin_cmdline")));
220
221static void get_cmdline(char *buf, int size)
222{
223	void *devp;
224	int len = strlen(builtin_cmdline);
225
226	buf[0] = '\0';
227
228	if (len > 0) { /* builtin_cmdline overrides dt's /chosen/bootargs */
229		len = min(len, size-1);
230		strncpy(buf, builtin_cmdline, len);
231		buf[len] = '\0';
232	}
233	else if ((devp = finddevice("/chosen")))
234		getprop(devp, "bootargs", buf, size);
235}
236
237static void set_cmdline(char *buf)
238{
239	void *devp;
240
241	if ((devp = finddevice("/chosen")))
242		setprop(devp, "bootargs", buf, strlen(buf) + 1);
243}
244
245struct platform_ops platform_ops;
246struct dt_ops dt_ops;
247struct console_ops console_ops;
248struct loader_info loader_info;
249
250void start(void *sp)
251{
252	struct addr_range vmlinux, initrd;
253	kernel_entry_t kentry;
254	char cmdline[COMMAND_LINE_SIZE];
255	unsigned long ft_addr = 0;
256
257	if (console_ops.open && (console_ops.open() < 0))
258		exit();
259	if (platform_ops.fixups)
260		platform_ops.fixups();
261
262	printf("\n\rzImage starting: loaded at 0x%p (sp: 0x%p)\n\r",
263	       _start, sp);
264
265	vmlinux = prep_kernel();
266	initrd = prep_initrd(vmlinux, loader_info.initrd_addr,
267			     loader_info.initrd_size);
268
269	/* If cmdline came from zimage wrapper or if we can edit the one
270	 * in the dt, print it out and edit it, if possible.
271	 */
272	if ((strlen(builtin_cmdline) > 0) || console_ops.edit_cmdline) {
273		get_cmdline(cmdline, COMMAND_LINE_SIZE);
274		printf("\n\rLinux/PowerPC load: %s", cmdline);
275		if (console_ops.edit_cmdline)
276			console_ops.edit_cmdline(cmdline, COMMAND_LINE_SIZE);
277		printf("\n\r");
278		set_cmdline(cmdline);
279	}
280
281	printf("Finalizing device tree...");
282	if (dt_ops.finalize)
283		ft_addr = dt_ops.finalize();
284	if (ft_addr)
285		printf(" flat tree at 0x%lx\n\r", ft_addr);
286	else
287		printf(" using OF tree (promptr=%p)\n\r", loader_info.promptr);
288
289	if (console_ops.close)
290		console_ops.close();
291
292	kentry = (kernel_entry_t) vmlinux.addr;
293	if (ft_addr)
294		kentry(ft_addr, 0, NULL);
295	else
296		kentry((unsigned long)initrd.addr, initrd.size,
297		       loader_info.promptr);
298
299	/* console closed so printf in fatal below may not work */
300	fatal("Error: Linux kernel returned to zImage boot wrapper!\n\r");
301}
302