blob: bf4700755184e32d4b4e549bd19f4014caa46468 [file] [log] [blame]
Sam Ravnborg17ce2652009-04-29 09:47:18 +02001/*
2 * ld script for the x86 kernel
3 *
4 * Historic 32-bit version written by Martin Mares <mj@atrey.karlin.mff.cuni.cz>
5 *
Ingo Molnar91fd7fe2009-04-29 10:58:38 +02006 * Modernisation, unification and other changes and fixes:
7 * Copyright (C) 2007-2009 Sam Ravnborg <sam@ravnborg.org>
Sam Ravnborg17ce2652009-04-29 09:47:18 +02008 *
9 *
10 * Don't define absolute symbols until and unless you know that symbol
11 * value is should remain constant even if kernel image is relocated
12 * at run time. Absolute symbols are not relocated. If symbol value should
13 * change if kernel is relocated, make the symbol section relative and
14 * put it inside the section definition.
15 */
16
17#ifdef CONFIG_X86_32
18#define LOAD_OFFSET __PAGE_OFFSET
19#else
20#define LOAD_OFFSET __START_KERNEL_map
21#endif
22
23#include <asm-generic/vmlinux.lds.h>
24#include <asm/asm-offsets.h>
25#include <asm/thread_info.h>
26#include <asm/page_types.h>
27#include <asm/cache.h>
28#include <asm/boot.h>
29
30#undef i386 /* in case the preprocessor is a 32bit one */
31
32OUTPUT_FORMAT(CONFIG_OUTPUT_FORMAT, CONFIG_OUTPUT_FORMAT, CONFIG_OUTPUT_FORMAT)
33
34#ifdef CONFIG_X86_32
35OUTPUT_ARCH(i386)
36ENTRY(phys_startup_32)
Ingo Molnar6b35eb92011-01-19 10:09:42 +010037jiffies = jiffies_64;
Sam Ravnborg17ce2652009-04-29 09:47:18 +020038#else
39OUTPUT_ARCH(i386:x86-64)
40ENTRY(phys_startup_64)
Ingo Molnar6b35eb92011-01-19 10:09:42 +010041jiffies_64 = jiffies;
Sam Ravnborg17ce2652009-04-29 09:47:18 +020042#endif
43
Suresh Siddha74e08172009-10-14 14:46:56 -070044#if defined(CONFIG_X86_64) && defined(CONFIG_DEBUG_RODATA)
Suresh Siddhad6cc1c32009-10-19 06:12:04 -070045/*
46 * On 64-bit, align RODATA to 2MB so that even with CONFIG_DEBUG_RODATA
47 * we retain large page mappings for boundaries spanning kernel text, rodata
48 * and data sections.
49 *
50 * However, kernel identity mappings will have different RWX permissions
51 * to the pages mapping to text and to the pages padding (which are freed) the
52 * text section. Hence kernel identity mappings will be broken to smaller
53 * pages. For 64-bit, kernel text and kernel identity mappings are different,
54 * so we can enable protection checks that come with CONFIG_DEBUG_RODATA,
55 * as well as retain 2MB large page mappings for kernel text.
56 */
Suresh Siddha74e08172009-10-14 14:46:56 -070057#define X64_ALIGN_DEBUG_RODATA_BEGIN . = ALIGN(HPAGE_SIZE);
58
59#define X64_ALIGN_DEBUG_RODATA_END \
60 . = ALIGN(HPAGE_SIZE); \
61 __end_rodata_hpage_align = .;
62
63#else
64
65#define X64_ALIGN_DEBUG_RODATA_BEGIN
66#define X64_ALIGN_DEBUG_RODATA_END
67
68#endif
69
Sam Ravnborgafb80952009-04-29 09:47:19 +020070PHDRS {
71 text PT_LOAD FLAGS(5); /* R_E */
Matthieu Castet5bd5a452010-11-16 22:31:26 +010072 data PT_LOAD FLAGS(6); /* RW_ */
Sam Ravnborgafb80952009-04-29 09:47:19 +020073#ifdef CONFIG_X86_64
Jan Beulich8d0cc632009-09-04 09:18:07 +010074 user PT_LOAD FLAGS(5); /* R_E */
Sam Ravnborgafb80952009-04-29 09:47:19 +020075#ifdef CONFIG_SMP
Jan Beulich8d0cc632009-09-04 09:18:07 +010076 percpu PT_LOAD FLAGS(6); /* RW_ */
Sam Ravnborgafb80952009-04-29 09:47:19 +020077#endif
Jan Beulichc62e4322009-08-25 14:50:53 +010078 init PT_LOAD FLAGS(7); /* RWE */
Sam Ravnborgafb80952009-04-29 09:47:19 +020079#endif
80 note PT_NOTE FLAGS(0); /* ___ */
81}
Sam Ravnborg17ce2652009-04-29 09:47:18 +020082
Sam Ravnborg444e0ae2009-04-29 09:47:20 +020083SECTIONS
84{
85#ifdef CONFIG_X86_32
86 . = LOAD_OFFSET + LOAD_PHYSICAL_ADDR;
87 phys_startup_32 = startup_32 - LOAD_OFFSET;
88#else
89 . = __START_KERNEL;
90 phys_startup_64 = startup_64 - LOAD_OFFSET;
91#endif
92
Sam Ravnborgdfc208952009-04-29 09:47:21 +020093 /* Text and read-only data */
Sam Ravnborgdfc208952009-04-29 09:47:21 +020094 .text : AT(ADDR(.text) - LOAD_OFFSET) {
Tim Abbott4ae59b92009-09-16 16:44:28 -040095 _text = .;
96 /* bootstrapping code */
97 HEAD_TEXT
Sam Ravnborgdfc208952009-04-29 09:47:21 +020098#ifdef CONFIG_X86_32
Sam Ravnborgdfc208952009-04-29 09:47:21 +020099 . = ALIGN(PAGE_SIZE);
Denys Vlasenko819d6762010-02-20 01:03:49 +0100100 *(.text..page_aligned)
Sam Ravnborgdfc208952009-04-29 09:47:21 +0200101#endif
102 . = ALIGN(8);
103 _stext = .;
104 TEXT_TEXT
105 SCHED_TEXT
106 LOCK_TEXT
107 KPROBES_TEXT
108 IRQENTRY_TEXT
109 *(.fixup)
110 *(.gnu.warning)
111 /* End of text section */
112 _etext = .;
113 } :text = 0x9090
114
115 NOTES :text :note
116
Tim Abbott123f3e12009-09-16 16:44:30 -0400117 EXCEPTION_TABLE(16) :text = 0x9090
Sam Ravnborg448bc3a2009-04-29 09:47:22 +0200118
Matthieu Castet5bd5a452010-11-16 22:31:26 +0100119#if defined(CONFIG_DEBUG_RODATA)
120 /* .text should occupy whole number of pages */
121 . = ALIGN(PAGE_SIZE);
122#endif
Suresh Siddha74e08172009-10-14 14:46:56 -0700123 X64_ALIGN_DEBUG_RODATA_BEGIN
Jan Beulichc62e4322009-08-25 14:50:53 +0100124 RO_DATA(PAGE_SIZE)
Suresh Siddha74e08172009-10-14 14:46:56 -0700125 X64_ALIGN_DEBUG_RODATA_END
Sam Ravnborg448bc3a2009-04-29 09:47:22 +0200126
Sam Ravnborg1f6397b2009-04-29 09:47:23 +0200127 /* Data */
Sam Ravnborg1f6397b2009-04-29 09:47:23 +0200128 .data : AT(ADDR(.data) - LOAD_OFFSET) {
Catalin Marinas12608662009-05-11 13:22:00 +0100129 /* Start of data section */
130 _sdata = .;
Jan Beulichc62e4322009-08-25 14:50:53 +0100131
132 /* init_task */
133 INIT_TASK_DATA(THREAD_SIZE)
134
135#ifdef CONFIG_X86_32
136 /* 32 bit has nosave before _edata */
137 NOSAVE_DATA
138#endif
139
140 PAGE_ALIGNED_DATA(PAGE_SIZE)
Jan Beulichc62e4322009-08-25 14:50:53 +0100141
Jan Beulich350f8f52009-11-13 11:54:40 +0000142 CACHELINE_ALIGNED_DATA(L1_CACHE_BYTES)
Jan Beulichc62e4322009-08-25 14:50:53 +0100143
Sam Ravnborg1f6397b2009-04-29 09:47:23 +0200144 DATA_DATA
145 CONSTRUCTORS
Sam Ravnborg1f6397b2009-04-29 09:47:23 +0200146
Jan Beulichc62e4322009-08-25 14:50:53 +0100147 /* rarely changed data like cpu maps */
Jan Beulich350f8f52009-11-13 11:54:40 +0000148 READ_MOSTLY_DATA(INTERNODE_CACHE_BYTES)
Sam Ravnborg1f6397b2009-04-29 09:47:23 +0200149
Sam Ravnborg1f6397b2009-04-29 09:47:23 +0200150 /* End of data section */
151 _edata = .;
Jan Beulichc62e4322009-08-25 14:50:53 +0100152 } :data
Sam Ravnborg1f6397b2009-04-29 09:47:23 +0200153
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200154#ifdef CONFIG_X86_64
155
156#define VSYSCALL_ADDR (-10*1024*1024)
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200157
Anders Kaseorgd2232462009-09-16 16:44:26 -0400158#define VLOAD_OFFSET (VSYSCALL_ADDR - __vsyscall_0 + LOAD_OFFSET)
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200159#define VLOAD(x) (ADDR(x) - VLOAD_OFFSET)
160
Anders Kaseorgd2232462009-09-16 16:44:26 -0400161#define VVIRT_OFFSET (VSYSCALL_ADDR - __vsyscall_0)
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200162#define VVIRT(x) (ADDR(x) - VVIRT_OFFSET)
163
Anders Kaseorgd2232462009-09-16 16:44:26 -0400164 . = ALIGN(4096);
165 __vsyscall_0 = .;
166
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200167 . = VSYSCALL_ADDR;
Anders Kaseorgd2232462009-09-16 16:44:26 -0400168 .vsyscall_0 : AT(VLOAD(.vsyscall_0)) {
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200169 *(.vsyscall_0)
170 } :user
171
Jan Beulich350f8f52009-11-13 11:54:40 +0000172 . = ALIGN(L1_CACHE_BYTES);
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200173 .vsyscall_fn : AT(VLOAD(.vsyscall_fn)) {
174 *(.vsyscall_fn)
175 }
176
Jan Beulich350f8f52009-11-13 11:54:40 +0000177 . = ALIGN(L1_CACHE_BYTES);
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200178 .vsyscall_gtod_data : AT(VLOAD(.vsyscall_gtod_data)) {
179 *(.vsyscall_gtod_data)
180 }
181
182 vsyscall_gtod_data = VVIRT(.vsyscall_gtod_data);
183 .vsyscall_clock : AT(VLOAD(.vsyscall_clock)) {
184 *(.vsyscall_clock)
185 }
186 vsyscall_clock = VVIRT(.vsyscall_clock);
187
188
189 .vsyscall_1 ADDR(.vsyscall_0) + 1024: AT(VLOAD(.vsyscall_1)) {
190 *(.vsyscall_1)
191 }
192 .vsyscall_2 ADDR(.vsyscall_0) + 2048: AT(VLOAD(.vsyscall_2)) {
193 *(.vsyscall_2)
194 }
195
196 .vgetcpu_mode : AT(VLOAD(.vgetcpu_mode)) {
197 *(.vgetcpu_mode)
198 }
199 vgetcpu_mode = VVIRT(.vgetcpu_mode);
200
Jan Beulich350f8f52009-11-13 11:54:40 +0000201 . = ALIGN(L1_CACHE_BYTES);
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200202 .jiffies : AT(VLOAD(.jiffies)) {
203 *(.jiffies)
204 }
205 jiffies = VVIRT(.jiffies);
206
207 .vsyscall_3 ADDR(.vsyscall_0) + 3072: AT(VLOAD(.vsyscall_3)) {
208 *(.vsyscall_3)
209 }
210
Anders Kaseorgd2232462009-09-16 16:44:26 -0400211 . = __vsyscall_0 + PAGE_SIZE;
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200212
213#undef VSYSCALL_ADDR
Sam Ravnborgff6f87e2009-04-29 09:47:24 +0200214#undef VLOAD_OFFSET
215#undef VLOAD
216#undef VVIRT_OFFSET
217#undef VVIRT
218
219#endif /* CONFIG_X86_64 */
Sam Ravnborgdfc208952009-04-29 09:47:21 +0200220
Sam Ravnborge58bdaa2009-04-29 09:47:25 +0200221 /* Init code and data - will be freed after init */
222 . = ALIGN(PAGE_SIZE);
Jan Beulichc62e4322009-08-25 14:50:53 +0100223 .init.begin : AT(ADDR(.init.begin) - LOAD_OFFSET) {
Ingo Molnarfd073192009-04-29 12:56:58 +0200224 __init_begin = .; /* paired with __init_end */
Jan Beulichc62e4322009-08-25 14:50:53 +0100225 }
226
227#if defined(CONFIG_X86_64) && defined(CONFIG_SMP)
228 /*
229 * percpu offsets are zero-based on SMP. PERCPU_VADDR() changes the
230 * output PHDR, so the next output section - .init.text - should
231 * start another segment - init.
232 */
233 PERCPU_VADDR(0, :percpu)
234#endif
235
Tim Abbott123f3e12009-09-16 16:44:30 -0400236 INIT_TEXT_SECTION(PAGE_SIZE)
Jan Beulichc62e4322009-08-25 14:50:53 +0100237#ifdef CONFIG_X86_64
238 :init
239#endif
Sam Ravnborge58bdaa2009-04-29 09:47:25 +0200240
Tim Abbott123f3e12009-09-16 16:44:30 -0400241 INIT_DATA_SECTION(16)
Sam Ravnborge58bdaa2009-04-29 09:47:25 +0200242
243 .x86_cpu_dev.init : AT(ADDR(.x86_cpu_dev.init) - LOAD_OFFSET) {
244 __x86_cpu_dev_start = .;
245 *(.x86_cpu_dev.init)
246 __x86_cpu_dev_end = .;
247 }
248
Konrad Rzeszutek Wilk6f44d032010-08-27 14:19:33 -0400249 /*
250 * start address and size of operations which during runtime
251 * can be patched with virtualization friendly instructions or
252 * baremetal native ones. Think page table operations.
253 * Details in paravirt_types.h
254 */
Sam Ravnborgae618362009-04-29 09:47:26 +0200255 . = ALIGN(8);
256 .parainstructions : AT(ADDR(.parainstructions) - LOAD_OFFSET) {
257 __parainstructions = .;
258 *(.parainstructions)
259 __parainstructions_end = .;
260 }
261
Konrad Rzeszutek Wilk6f44d032010-08-27 14:19:33 -0400262 /*
263 * struct alt_inst entries. From the header (alternative.h):
264 * "Alternative instructions for different CPU types or capabilities"
265 * Think locking instructions on spinlocks.
266 */
Sam Ravnborgae618362009-04-29 09:47:26 +0200267 . = ALIGN(8);
268 .altinstructions : AT(ADDR(.altinstructions) - LOAD_OFFSET) {
269 __alt_instructions = .;
270 *(.altinstructions)
271 __alt_instructions_end = .;
272 }
273
Konrad Rzeszutek Wilk6f44d032010-08-27 14:19:33 -0400274 /*
275 * And here are the replacement instructions. The linker sticks
276 * them as binary blobs. The .altinstructions has enough data to
277 * get the address and the length of them to patch the kernel safely.
278 */
Sam Ravnborgae618362009-04-29 09:47:26 +0200279 .altinstr_replacement : AT(ADDR(.altinstr_replacement) - LOAD_OFFSET) {
280 *(.altinstr_replacement)
281 }
282
Konrad Rzeszutek Wilk6f44d032010-08-27 14:19:33 -0400283 /*
284 * struct iommu_table_entry entries are injected in this section.
285 * It is an array of IOMMUs which during run time gets sorted depending
286 * on its dependency order. After rootfs_initcall is complete
287 * this section can be safely removed.
288 */
Konrad Rzeszutek Wilk0444ad92010-08-26 13:57:56 -0400289 .iommu_table : AT(ADDR(.iommu_table) - LOAD_OFFSET) {
290 __iommu_table = .;
291 *(.iommu_table)
Konrad Rzeszutek Wilk0444ad92010-08-26 13:57:56 -0400292 __iommu_table_end = .;
293 }
Konrad Rzeszutek Wilk7ac41cc2010-08-30 14:10:02 -0400294 . = ALIGN(8);
Sam Ravnborgbf6a5742009-04-29 09:47:27 +0200295 /*
296 * .exit.text is discard at runtime, not link time, to deal with
297 * references from .altinstructions and .eh_frame
298 */
299 .exit.text : AT(ADDR(.exit.text) - LOAD_OFFSET) {
300 EXIT_TEXT
301 }
302
303 .exit.data : AT(ADDR(.exit.data) - LOAD_OFFSET) {
304 EXIT_DATA
305 }
306
Jan Beulichc62e4322009-08-25 14:50:53 +0100307#if !defined(CONFIG_X86_64) || !defined(CONFIG_SMP)
Alexander van Heukelumfe8e0c22010-09-06 20:53:42 +0200308 PERCPU(THREAD_SIZE)
Sam Ravnborg9d16e782009-04-29 09:47:28 +0200309#endif
310
311 . = ALIGN(PAGE_SIZE);
Ingo Molnarfd073192009-04-29 12:56:58 +0200312
Sam Ravnborg9d16e782009-04-29 09:47:28 +0200313 /* freed after init ends here */
Ingo Molnarfd073192009-04-29 12:56:58 +0200314 .init.end : AT(ADDR(.init.end) - LOAD_OFFSET) {
315 __init_end = .;
316 }
Sam Ravnborg9d16e782009-04-29 09:47:28 +0200317
Jan Beulichc62e4322009-08-25 14:50:53 +0100318 /*
319 * smp_locks might be freed after init
320 * start/end must be page aligned
321 */
322 . = ALIGN(PAGE_SIZE);
323 .smp_locks : AT(ADDR(.smp_locks) - LOAD_OFFSET) {
324 __smp_locks = .;
325 *(.smp_locks)
Jan Beulichc62e4322009-08-25 14:50:53 +0100326 . = ALIGN(PAGE_SIZE);
Yinghai Lu596b7112010-03-28 19:42:54 -0700327 __smp_locks_end = .;
Jan Beulichc62e4322009-08-25 14:50:53 +0100328 }
329
Sam Ravnborg9d16e782009-04-29 09:47:28 +0200330#ifdef CONFIG_X86_64
331 .data_nosave : AT(ADDR(.data_nosave) - LOAD_OFFSET) {
Jan Beulichc62e4322009-08-25 14:50:53 +0100332 NOSAVE_DATA
333 }
Sam Ravnborg9d16e782009-04-29 09:47:28 +0200334#endif
335
Sam Ravnborg091e52c2009-04-29 09:47:29 +0200336 /* BSS */
337 . = ALIGN(PAGE_SIZE);
338 .bss : AT(ADDR(.bss) - LOAD_OFFSET) {
339 __bss_start = .;
Tim Abbott7c74df02010-02-20 01:03:38 +0100340 *(.bss..page_aligned)
Sam Ravnborg091e52c2009-04-29 09:47:29 +0200341 *(.bss)
Matthieu Castet5bd5a452010-11-16 22:31:26 +0100342 . = ALIGN(PAGE_SIZE);
Sam Ravnborg091e52c2009-04-29 09:47:29 +0200343 __bss_stop = .;
344 }
Sam Ravnborg9d16e782009-04-29 09:47:28 +0200345
Sam Ravnborg091e52c2009-04-29 09:47:29 +0200346 . = ALIGN(PAGE_SIZE);
347 .brk : AT(ADDR(.brk) - LOAD_OFFSET) {
348 __brk_base = .;
349 . += 64 * 1024; /* 64k alignment slop space */
350 *(.brk_reservation) /* areas brk users have reserved */
351 __brk_limit = .;
352 }
353
H. Peter Anvin873b5272009-12-14 13:55:20 -0800354 _end = .;
Sam Ravnborg091e52c2009-04-29 09:47:29 +0200355
Sam Ravnborg444e0ae2009-04-29 09:47:20 +0200356 STABS_DEBUG
357 DWARF_DEBUG
Tejun Heo023bf6f2009-07-09 11:27:40 +0900358
359 /* Sections to be discarded */
360 DISCARDS
361 /DISCARD/ : { *(.eh_frame) }
Sam Ravnborg444e0ae2009-04-29 09:47:20 +0200362}
363
Sam Ravnborg17ce2652009-04-29 09:47:18 +0200364
365#ifdef CONFIG_X86_32
Ingo Molnara5912f62009-10-16 07:18:46 +0200366/*
367 * The ASSERT() sink to . is intentional, for binutils 2.14 compatibility:
368 */
H. Peter Anvind2ba8b22009-08-03 14:44:54 -0700369. = ASSERT((_end - LOAD_OFFSET <= KERNEL_IMAGE_SIZE),
370 "kernel image bigger than KERNEL_IMAGE_SIZE");
Sam Ravnborg17ce2652009-04-29 09:47:18 +0200371#else
372/*
373 * Per-cpu symbols which need to be offset from __per_cpu_load
374 * for the boot processor.
375 */
Rusty Russelldd17c8f2009-10-29 22:34:15 +0900376#define INIT_PER_CPU(x) init_per_cpu__##x = x + __per_cpu_load
Sam Ravnborg17ce2652009-04-29 09:47:18 +0200377INIT_PER_CPU(gdt_page);
378INIT_PER_CPU(irq_stack_union);
379
380/*
381 * Build-time check on the image size:
382 */
H. Peter Anvind2ba8b22009-08-03 14:44:54 -0700383. = ASSERT((_end - _text <= KERNEL_IMAGE_SIZE),
384 "kernel image bigger than KERNEL_IMAGE_SIZE");
Sam Ravnborg17ce2652009-04-29 09:47:18 +0200385
386#ifdef CONFIG_SMP
Rusty Russelldd17c8f2009-10-29 22:34:15 +0900387. = ASSERT((irq_stack_union == 0),
H. Peter Anvind2ba8b22009-08-03 14:44:54 -0700388 "irq_stack_union is not at start of per-cpu area");
Sam Ravnborg17ce2652009-04-29 09:47:18 +0200389#endif
390
391#endif /* CONFIG_X86_32 */
392
393#ifdef CONFIG_KEXEC
394#include <asm/kexec.h>
395
H. Peter Anvind2ba8b22009-08-03 14:44:54 -0700396. = ASSERT(kexec_control_code_size <= KEXEC_CONTROL_CODE_MAX_SIZE,
397 "kexec control code size is too big");
Sam Ravnborg17ce2652009-04-29 09:47:18 +0200398#endif
399