From: Ard Biesheuvel <ardb@kernel.org>
To: linux-efi@vger.kernel.org
Cc: Ard Biesheuvel <ardb@kernel.org>,
Evgeniy Baskov <baskov@ispras.ru>, Borislav Petkov <bp@alien8.de>,
Alexey Khoroshilov <khoroshilov@ispras.ru>,
Peter Jones <pjones@redhat.com>,
"Limonciello, Mario" <mario.limonciello@amd.com>
Subject: [RFC PATCH 2/4] efi: x86: Move PE header after setup header
Date: Wed, 8 Mar 2023 21:22:07 +0100 [thread overview]
Message-ID: <20230308202209.2980947-3-ardb@kernel.org> (raw)
In-Reply-To: <20230308202209.2980947-1-ardb@kernel.org>
We are currently limited in the number of PE/COFF sections we can
describe in the PE header, due to lack of space. This is caused by the
presence of the setup header at offset 0x1f1, leaving only the space
before it for PE metadata.
However, now that we no longer copy the setup_header from this part of
the image for use by the EFI stub, we no longer have to describe it as
part of the loadable image. This means we can put the PE header *after*
the setup header, and use as much space as we like. It also means we
don't have to describe this part of the image in PE/COFF, and simply
treat it as part of the header. This means we can drop the ".setup"
section as well.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
---
| 26 +++-----------------
arch/x86/boot/setup.ld | 1 +
arch/x86/boot/tools/build.c | 11 +++------
3 files changed, 9 insertions(+), 29 deletions(-)
--git a/arch/x86/boot/header.S b/arch/x86/boot/header.S
index 9338c68e7413d6e6..aba499404d8b870e 100644
--- a/arch/x86/boot/header.S
+++ b/arch/x86/boot/header.S
@@ -85,7 +85,7 @@ bs_die:
# Offset to the PE header.
#
.long LINUX_PE_MAGIC
- .long pe_header
+ .long pe_header - bootsect_start
#endif /* CONFIG_EFI_STUB */
.section ".bsdata", "a"
@@ -96,6 +96,8 @@ bugger_off_msg:
.byte 0
#ifdef CONFIG_EFI_STUB
+ .section ".peheader", "a"
+ .align 8
pe_header:
.long PE_MAGIC
@@ -161,7 +163,7 @@ extra_header_fields:
#
.long 0 # SizeOfImage
- .long 0x200 # SizeOfHeaders
+ .long 0x800 # SizeOfHeaders
.long 0 # CheckSum
.word IMAGE_SUBSYSTEM_EFI_APPLICATION # Subsystem (EFI application)
#ifdef CONFIG_EFI_DXE_MEM_ATTRIBUTES
@@ -192,26 +194,6 @@ extra_header_fields:
# Section table
section_table:
- #
- # The offset & size fields are filled in by build.c.
- #
- .ascii ".setup"
- .byte 0
- .byte 0
- .long 0
- .long 0x0 # startup_{32,64}
- .long 0 # Size of initialized data
- # on disk
- .long 0x0 # startup_{32,64}
- .long 0 # PointerToRelocations
- .long 0 # PointerToLineNumbers
- .word 0 # NumberOfRelocations
- .word 0 # NumberOfLineNumbers
- .long IMAGE_SCN_CNT_CODE | \
- IMAGE_SCN_MEM_READ | \
- IMAGE_SCN_MEM_EXECUTE | \
- IMAGE_SCN_ALIGN_16BYTES # Characteristics
-
#
# The EFI application loader requires a relocation section
# because EFI applications must be relocatable. The .reloc
diff --git a/arch/x86/boot/setup.ld b/arch/x86/boot/setup.ld
index 49546c247ae25e97..5981287bbcb7f439 100644
--- a/arch/x86/boot/setup.ld
+++ b/arch/x86/boot/setup.ld
@@ -16,6 +16,7 @@ SECTIONS
. = 495;
.header : { *(.header) }
.entrytext : { *(.entrytext) }
+ .peheader : { *(.peheader) }
.inittext : { *(.inittext) }
.initdata : { *(.initdata) }
__end_init = .;
diff --git a/arch/x86/boot/tools/build.c b/arch/x86/boot/tools/build.c
index e6fd09789482ed04..883e6359221cd588 100644
--- a/arch/x86/boot/tools/build.c
+++ b/arch/x86/boot/tools/build.c
@@ -296,16 +296,13 @@ static void update_pecoff_section_header(char *section_name, uint32_t offset, ui
update_pecoff_section_header_fields(section_name, offset, size, size, offset);
}
-static void update_pecoff_setup_and_reloc(unsigned int size)
+static void update_pecoff_reloc(unsigned int size)
{
- uint32_t setup_offset = SECTOR_SIZE;
uint32_t reloc_offset = size - PECOFF_RELOC_RESERVE - PECOFF_COMPAT_RESERVE;
#ifdef CONFIG_EFI_MIXED
uint32_t compat_offset = reloc_offset + PECOFF_RELOC_RESERVE;
#endif
- uint32_t setup_size = reloc_offset - setup_offset;
- update_pecoff_section_header(".setup", setup_offset, setup_size);
update_pecoff_section_header(".reloc", reloc_offset, PECOFF_RELOC_RESERVE);
/*
@@ -353,7 +350,7 @@ static unsigned int update_pecoff_sections(unsigned int text_start, unsigned int
* Size of code: Subtract the size of the first sector (512 bytes)
* which includes the header.
*/
- put_unaligned_le32(file_sz - SECTOR_SIZE + bss_sz, &hdr->text_size);
+ put_unaligned_le32(text_sz + bss_sz, &hdr->text_size);
/* Size of image */
put_unaligned_le32(init_sz, &hdr->image_size);
@@ -407,7 +404,7 @@ static void efi_stub_entry_update(void)
#else
-static inline void update_pecoff_setup_and_reloc(unsigned int size) {}
+static inline void update_pecoff_reloc(unsigned int size) {}
static inline void update_pecoff_text(unsigned int text_start,
unsigned int file_sz,
unsigned int init_sz) {}
@@ -542,7 +539,7 @@ int main(int argc, char **argv)
#ifdef CONFIG_EFI_STUB
/* PE specification require 512-byte minimum section file alignment */
kern_size = round_up(kern_file_size + 4, SECTOR_SIZE);
- update_pecoff_setup_and_reloc(setup_size);
+ update_pecoff_reloc(setup_size);
#else
/* Number of 16-byte paragraphs, including space for a 4-byte CRC */
kern_size = round_up(kern_file_size + 4, PARAGRAPH_SIZE);
--
2.39.2
next prev parent reply other threads:[~2023-03-08 20:22 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-03-08 20:22 [RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header Ard Biesheuvel
2023-03-08 20:22 ` [RFC PATCH 1/4] efi: x86: Use private copy of struct setup_header Ard Biesheuvel
2023-03-08 20:22 ` Ard Biesheuvel [this message]
2023-03-09 17:45 ` [RFC PATCH 2/4] efi: x86: Move PE header after setup header Ard Biesheuvel
2023-03-08 20:22 ` [RFC PATCH 3/4] efi: x86: Drop alignment section header flags Ard Biesheuvel
2023-03-08 20:22 ` [RFC PATCH 4/4] efi: x86: Split PE/COFF .text section into .text and .data Ard Biesheuvel
2023-03-09 18:02 ` Evgeniy Baskov
2023-03-09 18:03 ` Ard Biesheuvel
2023-03-09 17:59 ` [RFC PATCH 0/4] efi: x86: Use strict W^X mappings in PE/COFF header Evgeniy Baskov
2023-03-09 18:09 ` Ard Biesheuvel
2023-03-09 18:37 ` Evgeniy Baskov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230308202209.2980947-3-ardb@kernel.org \
--to=ardb@kernel.org \
--cc=baskov@ispras.ru \
--cc=bp@alien8.de \
--cc=khoroshilov@ispras.ru \
--cc=linux-efi@vger.kernel.org \
--cc=mario.limonciello@amd.com \
--cc=pjones@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox