Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp8749640ybi; Thu, 6 Jun 2019 19:16:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqw4MjkPkjvLw3bg9LiZh+lRWwODWqjCj9W3lxA+1gPcYDFLRgSfS4jsi0SN86/tLVRnkddf X-Received: by 2002:a63:1d5c:: with SMTP id d28mr756718pgm.10.1559873793095; Thu, 06 Jun 2019 19:16:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559873793; cv=none; d=google.com; s=arc-20160816; b=TrD7Er2ut5T91PCB10635pTIme+Lowfgvkz9hjsIFw2e42EtYW+xxMGeyudRwvVFUA sHc8V12A4y4gao0eIo1Tod7iYZSGza3gGbJM8JLThS+TggkTvzoOH36YRjkvCF1kc3Vh wyBWlRLaCZSqbbL3x57leorEBNRviVLJSNzJjGY62Ww4FHKDtStAS7oSmWsnvKu05VBc l40inxdFEgSJ/K9w96bd1Ye02BWjUW4mf5//gFZ1LA2QbPInFCq6ax4F19f9NtbGVrbL 2XXriRte6GH8todsBqGK7efOsyDV4ATYKBsT2g0TH+ugxltsXAS3slu8WgD7jMTLuUxb 3S4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr :dkim-signature; bh=TbyCYWZLKikJC0wo6hqt8XiCaoJ+XEF6Z2oralLMIgA=; b=uHI7hu8RjrqBylSKoqhimvRvtqm7b4P5PAJJHx/R6XMrN+nEwG/XtZ2E/BQj5YFYdA cP4Lj2xSyc6lyp4RL5efTAP0Up61GNgTMTF6IrIgDHX891ES78Bu1Q40T4fdPazp8N8G Qf4PA1CVGW6hOXGYK8Or6pOH/B49sJ2q8b1EdQMqqNDAUzaNWmOm2Xwhv3XQB8PtvMtt eXZYl6Yi0boo/4P+KB2Oov1VYCTsAN8Mvma3kpTteV6s1fvWwPBpeLe7LZq83R7Ybf/S b17LQNRSjv+nlNmtnBadGdUkwq7WwJePb92pZmufu0dugxrUH4a99MFu0HiM7szdQ2ZF jX2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@wdc.com header.s=dkim.wdc.com header.b=pRhsLtxc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=wdc.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t24si638687plr.56.2019.06.06.19.16.16; Thu, 06 Jun 2019 19:16:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@wdc.com header.s=dkim.wdc.com header.b=pRhsLtxc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=wdc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727445AbfFFXIi (ORCPT + 99 others); Thu, 6 Jun 2019 19:08:38 -0400 Received: from esa5.hgst.iphmx.com ([216.71.153.144]:35960 "EHLO esa5.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726623AbfFFXIi (ORCPT ); Thu, 6 Jun 2019 19:08:38 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1559862518; x=1591398518; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=upVlQ+4Mne3aPfXOJDTzQOYL5IxlDk66p/UoaDlefbc=; b=pRhsLtxc9QTEEneqFZE/xFwnUVbYT+k9pmrUBQOOpEHmelWKExHa9OYL JkMMJyJsX/ClR66PiCVpFXrDVo5CcuSXBmziwJH7ACkSGz5MJVxn/ikYN cgMOKUupsvFb/zZ5ERhKv8Zyljf8qNh6I1PN3BzoTbUPkgNpr00bctSfp sXNvrtqyl7JHsMhD3lOHEwBXoVIBU6+aphqx/1055mHQ6jGM0/L4HzPWO PdTQjC8vMxPe4qeVqlcdsfFkYhUUERMo88RZJkiZPehJM4zw+QBfBxppz DrMZKnEbg7x03Lux13WYRjsiJV/6uX2MZoKy5M6YT+rVODrbfzQK0vi4Z A==; X-IronPort-AV: E=Sophos;i="5.63,561,1557158400"; d="scan'208";a="111270514" Received: from uls-op-cesaip01.wdc.com (HELO uls-op-cesaep01.wdc.com) ([199.255.45.14]) by ob1.hgst.iphmx.com with ESMTP; 07 Jun 2019 07:08:37 +0800 IronPort-SDR: BdtFlIgGyMjpgG2vByl53PefFOrUf2ClL0FCLOwICNF4C2cOokHKuYgSqCoOfLDUeVxtysvJW7 PRYwW95tRDJZamH44qNBRnQl52kLKgu8b1NKna9TjyPFgsEsuA2QOJCKkvjtn5P2GtZsxpBYnh hZNHiQRdCHBwxf/yJHMf3YqAuOJ3Ou8IdMc4e401pxJGK5D+FFFw5dB+SZMzdbsdiVHXkZ5Py6 K8MLXcm4WtojWSoGSNf9kTNT2CmXhUkvny2rKndxU6fJ+/Fjwoq8aTLAsY7ri7SFN6cq6W5u1v dzUjYXfXZU+/Kmv7QzzCaTcb Received: from uls-op-cesaip02.wdc.com ([10.248.3.37]) by uls-op-cesaep01.wdc.com with ESMTP; 06 Jun 2019 15:43:30 -0700 IronPort-SDR: PmVJQWYCE7E1REr5WsNdXw+8u4L3f2dGZ/EsgKEefImQGJxpfKc4hMHenITq0au7C9ZAGH24uz 4TfVRI6Tu+IzUq/UkqoMI1ROhwBixmIwnTUV+bOpXJeDqbEZehzK4j7/bnRQ6dkA1SWa77B0JH lSaWNxMYtG0ms8zwLAjBamviYMcg978SL3RBCqYlTc2E5mMZP2TiW5hEpnFhW00lfffSDw013k BZGjL4VSr8Nl9TEqjmY6rnqy6kE96yCNgehUIZBZBpb3Hg+vVfm1PuxF9kTW56skrgoX2UMja8 Odc= Received: from jedi-01.sdcorp.global.sandisk.com (HELO jedi-01.int.fusionio.com) ([10.11.143.218]) by uls-op-cesaip02.wdc.com with ESMTP; 06 Jun 2019 16:08:37 -0700 From: Atish Patra To: linux-kernel@vger.kernel.org Cc: Atish Patra , Karsten Merker , Kevin Hilman , Albert Ou , Anup Patel , Jonathan Corbet , linux-doc@vger.kernel.org, linux-riscv@lists.infradead.org, Nick Kossifidis , Palmer Dabbelt , "paul.walmsley@sifive.com" , "linux-arm-kernel@lists.infradead.org" , "mark.rutland@arm.com" , "marek.vasut@gmail.com" , "catalin.marinas@arm.com" , "will.deacon@arm.com" , "trini@konsulko.com" Subject: [PATCH v4] RISC-V: Add an Image header that boot loader can parse. Date: Thu, 6 Jun 2019 16:08:00 -0700 Message-Id: <20190606230800.19932-1-atish.patra@wdc.com> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently, the last stage boot loaders such as U-Boot can accept only uImage which is an unnecessary additional step in automating boot process. Add an image header that boot loader understands and boot Linux from flat Image directly. This header is based on ARM64 boot image header and provides an opportunity to combine both ARM64 & RISC-V image headers in future. Also make sure that PE/COFF header can co-exist in the same image so that EFI stub can be supported for RISC-V in future. EFI specification needs PE/COFF image header in the beginning of the kernel image in order to load it as an EFI application. In order to support EFI stub, code0 should be replaced with "MZ" magic string and res4(at offset 0x3c) should point to the rest of the PE/COFF header (which will be added during EFI support). Tested on both QEMU and HiFive Unleashed using OpenSBI + U-Boot + Linux. Signed-off-by: Atish Patra Reviewed-by: Karsten Merker Tested-by: Karsten Merker (QEMU+OpenSBI+U-Boot) Tested-by: Kevin Hilman (OpenSBI + U-Boot + Linux) --- I have not sent out corresponding U-Boot patch as all the changes are compatible with current u-boot support. Once, the kernel header format is agreed upon, I will update the U-Boot patch. Changes from v4->v5 1. Error if CONFIG_CPU_BIG_ENDIAN is enabled in kernel. 2. Typo fix Changes from v3->v4 1. Update the commit text to clarify about PE/COFF header. Changes from v2->v3 1. Modified reserved fields to define a header version. 2. Added header documentation. Changes from v1-v2: 1. Added additional reserved elements to make it fully PE compatible. --- Documentation/riscv/boot-image-header.txt | 50 ++++++++++++++++++ arch/riscv/include/asm/image.h | 62 +++++++++++++++++++++++ arch/riscv/kernel/head.S | 32 ++++++++++++ 3 files changed, 144 insertions(+) create mode 100644 Documentation/riscv/boot-image-header.txt create mode 100644 arch/riscv/include/asm/image.h diff --git a/Documentation/riscv/boot-image-header.txt b/Documentation/riscv/boot-image-header.txt new file mode 100644 index 000000000000..acbf3b4cacfe --- /dev/null +++ b/Documentation/riscv/boot-image-header.txt @@ -0,0 +1,50 @@ + Boot image header in RISC-V Linux + ============================================= + +Author: Atish Patra +Date : 20 May 2019 + +This document only describes the boot image header details for RISC-V Linux. +The complete booting guide will be available at Documentation/riscv/booting.txt. + +The following 64-byte header is present in decompressed Linux kernel image. + + u32 code0; /* Executable code */ + u32 code1; /* Executable code */ + u64 text_offset; /* Image load offset, little endian */ + u64 image_size; /* Effective Image size, little endian */ + u64 flags; /* kernel flags, little endian */ + u32 version; /* Version of this header */ + u32 res1 = 0; /* Reserved */ + u64 res2 = 0; /* Reserved */ + u64 magic = 0x5643534952; /* Magic number, little endian, "RISCV" */ + u32 res3; /* Reserved for additional RISC-V specific header */ + u32 res4; /* Reserved for PE COFF offset */ + +This header format is compliant with PE/COFF header and largely inspired from +ARM64 header. Thus, both ARM64 & RISC-V header can be combined into one common +header in future. + +Notes: +- This header can also be reused to support EFI stub for RISC-V in future. EFI + specification needs PE/COFF image header in the beginning of the kernel image + in order to load it as an EFI application. In order to support EFI stub, + code0 should be replaced with "MZ" magic string and res5(at offset 0x3c) should + point to the rest of the PE/COFF header. + +- version field indicate header version number. + Bits 0:15 - Minor version + Bits 16:31 - Major version + + This preserves compatibility across newer and older version of the header. + The current version is defined as 0.1. + +- res3 is reserved for offset to any other additional fields. This makes the + header extendible in future. One example would be to accommodate ISA + extension for RISC-V in future. For current version, it is set to be zero. + +- In current header, the flag field has only one field. + Bit 0: Kernel endianness. 1 if BE, 0 if LE. + +- Image size is mandatory for boot loader to load kernel image. Booting will + fail otherwise. diff --git a/arch/riscv/include/asm/image.h b/arch/riscv/include/asm/image.h new file mode 100644 index 000000000000..13f4365d2dd6 --- /dev/null +++ b/arch/riscv/include/asm/image.h @@ -0,0 +1,62 @@ +/* SPDX-License-Identifier: GPL-2.0 */ + +#ifndef __ASM_IMAGE_H +#define __ASM_IMAGE_H + +#define RISCV_IMAGE_MAGIC "RISCV" + +#define RISCV_IMAGE_FLAG_BE_SHIFT 0 +#define RISCV_IMAGE_FLAG_BE_MASK 0x1 + +#define RISCV_IMAGE_FLAG_LE 0 +#define RISCV_IMAGE_FLAG_BE 1 + +#ifdef CONFIG_CPU_BIG_ENDIAN +#error conversion of header fields to LE not yet implemented +#else +#define __HEAD_FLAG_BE RISCV_IMAGE_FLAG_LE +#endif + +#define __HEAD_FLAG(field) (__HEAD_FLAG_##field << \ + RISCV_IMAGE_FLAG_##field##_SHIFT) + +#define __HEAD_FLAGS (__HEAD_FLAG(BE)) + +#define RISCV_HEADER_VERSION_MAJOR 0 +#define RISCV_HEADER_VERSION_MINOR 1 + +#define RISCV_HEADER_VERSION (RISCV_HEADER_VERSION_MAJOR << 16 | \ + RISCV_HEADER_VERSION_MINOR) + +#ifndef __ASSEMBLY__ +/* + * struct riscv_image_header - riscv kernel image header + * + * @code0: Executable code + * @code1: Executable code + * @text_offset: Image load offset + * @image_size: Effective Image size + * @flags: kernel flags + * @version: version + * @reserved: reserved + * @reserved: reserved + * @magic: Magic number + * @reserved: reserved (will be used for additional RISC-V specific header) + * @reserved: reserved (will be used for PE COFF offset) + */ + +struct riscv_image_header { + u32 code0; + u32 code1; + u64 text_offset; + u64 image_size; + u64 flags; + u32 version; + u32 res1; + u64 res2; + u64 magic; + u32 res3; + u32 res4; +}; +#endif /* __ASSEMBLY__ */ +#endif /* __ASM_IMAGE_H */ diff --git a/arch/riscv/kernel/head.S b/arch/riscv/kernel/head.S index 370c66ce187a..577893bb150d 100644 --- a/arch/riscv/kernel/head.S +++ b/arch/riscv/kernel/head.S @@ -19,9 +19,41 @@ #include #include #include +#include __INIT ENTRY(_start) + /* + * Image header expected by Linux boot-loaders. The image header data + * structure is described in asm/image.h. + * Do not modify it without modifying the structure and all bootloaders + * that expects this header format!! + */ + /* jump to start kernel */ + j _start_kernel + /* reserved */ + .word 0 + .balign 8 +#if __riscv_xlen == 64 + /* Image load offset(2MB) from start of RAM */ + .dword 0x200000 +#else + /* Image load offset(4MB) from start of RAM */ + .dword 0x400000 +#endif + /* Effective size of kernel image */ + .dword _end - _start + .dword __HEAD_FLAGS + .word RISCV_HEADER_VERSION + .word 0 + .dword 0 + .asciz RISCV_IMAGE_MAGIC + .word 0 + .balign 4 + .word 0 + +.global _start_kernel +_start_kernel: /* Mask all interrupts */ csrw CSR_SIE, zero csrw CSR_SIP, zero -- 2.21.0