blob: 7eaf1f7c4168dbd394f4b01e1000e5e3703a3bad [file] [log] [blame]
Kees Cook90776dd2019-08-13 16:04:50 -07001/* SPDX-License-Identifier: GPL-2.0-only */
2/*
3 * Linker script variables to be set after section resolution, as
4 * ld.lld does not like variables assigned before SECTIONS is processed.
5 */
6#ifndef __ARM64_KERNEL_IMAGE_VARS_H
7#define __ARM64_KERNEL_IMAGE_VARS_H
8
9#ifndef LINKER_SCRIPT
10#error This file should only be included in vmlinux.lds.S
11#endif
12
13#ifdef CONFIG_EFI
14
Ard Biesheuvel9f922372020-02-17 12:44:37 +010015__efistub_kernel_size = _edata - _text;
Ard Biesheuvel348a6252020-03-26 18:14:23 +010016__efistub_primary_entry_offset = primary_entry - _text;
Ard Biesheuvel9f922372020-02-17 12:44:37 +010017
Kees Cook90776dd2019-08-13 16:04:50 -070018
19/*
20 * The EFI stub has its own symbol namespace prefixed by __efistub_, to
21 * isolate it from the kernel proper. The following symbols are legally
22 * accessed by the stub, so provide some aliases to make them accessible.
23 * Only include data symbols here, or text symbols of functions that are
24 * guaranteed to be safe when executed at another offset than they were
25 * linked at. The routines below are all implemented in assembler in a
26 * position independent manner
27 */
28__efistub_memcmp = __pi_memcmp;
29__efistub_memchr = __pi_memchr;
30__efistub_memcpy = __pi_memcpy;
31__efistub_memmove = __pi_memmove;
32__efistub_memset = __pi_memset;
33__efistub_strlen = __pi_strlen;
34__efistub_strnlen = __pi_strnlen;
35__efistub_strcmp = __pi_strcmp;
36__efistub_strncmp = __pi_strncmp;
37__efistub_strrchr = __pi_strrchr;
Fuad Tabbafade9c22021-05-24 09:30:01 +010038__efistub_dcache_clean_poc = __pi_dcache_clean_poc;
Kees Cook90776dd2019-08-13 16:04:50 -070039
Andrey Konovalov0fea6e92020-12-22 12:02:06 -080040#if defined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS)
Kees Cook90776dd2019-08-13 16:04:50 -070041__efistub___memcpy = __pi_memcpy;
42__efistub___memmove = __pi_memmove;
43__efistub___memset = __pi_memset;
44#endif
45
46__efistub__text = _text;
Kees Cook90776dd2019-08-13 16:04:50 -070047__efistub__end = _end;
48__efistub__edata = _edata;
49__efistub_screen_info = screen_info;
Ard Biesheuvel91d150c2020-02-10 17:02:46 +010050__efistub__ctype = _ctype;
Kees Cook90776dd2019-08-13 16:04:50 -070051
52#endif
53
David Brazdil76217122020-06-25 14:14:08 +010054#ifdef CONFIG_KVM
55
56/*
57 * KVM nVHE code has its own symbol namespace prefixed with __kvm_nvhe_, to
58 * separate it from the kernel proper. The following symbols are legally
59 * accessed by it, therefore provide aliases to make them linkable.
60 * Do not include symbols which may not be safely accessed under hypervisor
61 * memory mappings.
62 */
63
David Brazdilb877e982020-06-25 14:14:11 +010064/* Alternative callbacks for init-time patching of nVHE hyp code. */
David Brazdilb877e982020-06-25 14:14:11 +010065KVM_NVHE_ALIAS(kvm_patch_vector_branch);
66KVM_NVHE_ALIAS(kvm_update_va_mask);
Marc Zyngier68b824e2020-10-24 16:33:38 +010067KVM_NVHE_ALIAS(kvm_get_kimage_voffset);
Marc Zyngier755db232021-03-22 12:09:51 +000068KVM_NVHE_ALIAS(kvm_compute_final_ctr_el0);
David Brazdilb877e982020-06-25 14:14:11 +010069
70/* Global kernel state accessed by nVHE hyp code. */
David Brazdil09cf57e2020-06-25 14:14:14 +010071KVM_NVHE_ALIAS(kvm_vgic_global_state);
David Brazdilb877e982020-06-25 14:14:11 +010072
David Brazdilb877e982020-06-25 14:14:11 +010073/* Kernel symbols used to call panic() from nVHE hyp code (via ERET). */
Andrew Scullaec0fae2021-03-18 14:33:11 +000074KVM_NVHE_ALIAS(nvhe_hyp_panic_handler);
David Brazdilb877e982020-06-25 14:14:11 +010075
Andrew Scull208243c2020-06-25 14:14:12 +010076/* Vectors installed by hyp-init on reset HVC. */
77KVM_NVHE_ALIAS(__hyp_stub_vectors);
78
David Brazdile03fa292020-06-25 14:14:13 +010079/* Kernel symbol used by icache_is_vpipt(). */
80KVM_NVHE_ALIAS(__icache_flags);
81
82/* Kernel symbols needed for cpus_have_final/const_caps checks. */
83KVM_NVHE_ALIAS(arm64_const_caps_ready);
84KVM_NVHE_ALIAS(cpu_hwcap_keys);
David Brazdile03fa292020-06-25 14:14:13 +010085
David Brazdil09cf57e2020-06-25 14:14:14 +010086/* Static keys which are set if a vGIC trap should be handled in hyp. */
87KVM_NVHE_ALIAS(vgic_v2_cpuif_trap);
88KVM_NVHE_ALIAS(vgic_v3_cpuif_trap);
89
90/* Static key checked in pmr_sync(). */
91#ifdef CONFIG_ARM64_PSEUDO_NMI
92KVM_NVHE_ALIAS(gic_pmr_sync);
Alexandru Elisei33678052020-09-12 16:37:07 +010093/* Static key checked in GIC_PRIO_IRQOFF. */
94KVM_NVHE_ALIAS(gic_nonsecure_priorities);
David Brazdil09cf57e2020-06-25 14:14:14 +010095#endif
96
James Morsee9ee1862020-08-21 15:07:05 +010097/* EL2 exception handling */
98KVM_NVHE_ALIAS(__start___kvm_ex_table);
99KVM_NVHE_ALIAS(__stop___kvm_ex_table);
100
David Brazdil687413d2020-12-02 18:41:09 +0000101/* Array containing bases of nVHE per-CPU memory regions. */
102KVM_NVHE_ALIAS(kvm_arm_hyp_percpu_base);
103
Marc Zyngierf27647b2021-03-05 18:52:51 +0000104/* PMU available static key */
Sean Christophersonbe399d82021-11-11 02:07:36 +0000105#ifdef CONFIG_HW_PERF_EVENTS
Marc Zyngierf27647b2021-03-05 18:52:51 +0000106KVM_NVHE_ALIAS(kvm_arm_pmu_available);
Sean Christophersonbe399d82021-11-11 02:07:36 +0000107#endif
Marc Zyngierf27647b2021-03-05 18:52:51 +0000108
Will Deacon7b4a7b52021-03-19 10:01:10 +0000109/* Position-independent library routines */
110KVM_NVHE_ALIAS_HYP(clear_page, __pi_clear_page);
111KVM_NVHE_ALIAS_HYP(copy_page, __pi_copy_page);
112KVM_NVHE_ALIAS_HYP(memcpy, __pi_memcpy);
113KVM_NVHE_ALIAS_HYP(memset, __pi_memset);
114
115#ifdef CONFIG_KASAN
116KVM_NVHE_ALIAS_HYP(__memcpy, __pi_memcpy);
117KVM_NVHE_ALIAS_HYP(__memset, __pi_memset);
118#endif
119
Quentin Perretf320bc72021-03-19 10:01:25 +0000120/* Kernel memory sections */
121KVM_NVHE_ALIAS(__start_rodata);
122KVM_NVHE_ALIAS(__end_rodata);
123KVM_NVHE_ALIAS(__bss_start);
124KVM_NVHE_ALIAS(__bss_stop);
125
126/* Hyp memory sections */
127KVM_NVHE_ALIAS(__hyp_idmap_text_start);
128KVM_NVHE_ALIAS(__hyp_idmap_text_end);
129KVM_NVHE_ALIAS(__hyp_text_start);
130KVM_NVHE_ALIAS(__hyp_text_end);
131KVM_NVHE_ALIAS(__hyp_bss_start);
132KVM_NVHE_ALIAS(__hyp_bss_end);
133KVM_NVHE_ALIAS(__hyp_rodata_start);
134KVM_NVHE_ALIAS(__hyp_rodata_end);
135
Quentin Perret1025c8c2021-03-19 10:01:43 +0000136/* pKVM static key */
137KVM_NVHE_ALIAS(kvm_protected_mode_initialized);
138
David Brazdil76217122020-06-25 14:14:08 +0100139#endif /* CONFIG_KVM */
140
Kees Cook90776dd2019-08-13 16:04:50 -0700141#endif /* __ARM64_KERNEL_IMAGE_VARS_H */