xref: /OK3568_Linux_fs/kernel/arch/s390/kernel/kexec_image.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Image loader for kexec_file_load system call.
4*4882a593Smuzhiyun  *
5*4882a593Smuzhiyun  * Copyright IBM Corp. 2018
6*4882a593Smuzhiyun  *
7*4882a593Smuzhiyun  * Author(s): Philipp Rudo <prudo@linux.vnet.ibm.com>
8*4882a593Smuzhiyun  */
9*4882a593Smuzhiyun 
10*4882a593Smuzhiyun #include <linux/errno.h>
11*4882a593Smuzhiyun #include <linux/kernel.h>
12*4882a593Smuzhiyun #include <linux/kexec.h>
13*4882a593Smuzhiyun #include <asm/ipl.h>
14*4882a593Smuzhiyun #include <asm/setup.h>
15*4882a593Smuzhiyun 
kexec_file_add_kernel_image(struct kimage * image,struct s390_load_data * data)16*4882a593Smuzhiyun static int kexec_file_add_kernel_image(struct kimage *image,
17*4882a593Smuzhiyun 				       struct s390_load_data *data)
18*4882a593Smuzhiyun {
19*4882a593Smuzhiyun 	struct kexec_buf buf;
20*4882a593Smuzhiyun 
21*4882a593Smuzhiyun 	buf.image = image;
22*4882a593Smuzhiyun 
23*4882a593Smuzhiyun 	buf.buffer = image->kernel_buf;
24*4882a593Smuzhiyun 	buf.bufsz = image->kernel_buf_len;
25*4882a593Smuzhiyun 
26*4882a593Smuzhiyun 	buf.mem = 0;
27*4882a593Smuzhiyun 	if (image->type == KEXEC_TYPE_CRASH)
28*4882a593Smuzhiyun 		buf.mem += crashk_res.start;
29*4882a593Smuzhiyun 	buf.memsz = buf.bufsz;
30*4882a593Smuzhiyun 
31*4882a593Smuzhiyun 	data->kernel_buf = image->kernel_buf;
32*4882a593Smuzhiyun 	data->kernel_mem = buf.mem;
33*4882a593Smuzhiyun 	data->parm = image->kernel_buf + PARMAREA;
34*4882a593Smuzhiyun 	data->memsz += buf.memsz;
35*4882a593Smuzhiyun 
36*4882a593Smuzhiyun 	ipl_report_add_component(data->report, &buf,
37*4882a593Smuzhiyun 				 IPL_RB_COMPONENT_FLAG_SIGNED |
38*4882a593Smuzhiyun 				 IPL_RB_COMPONENT_FLAG_VERIFIED,
39*4882a593Smuzhiyun 				 IPL_RB_CERT_UNKNOWN);
40*4882a593Smuzhiyun 	return kexec_add_buffer(&buf);
41*4882a593Smuzhiyun }
42*4882a593Smuzhiyun 
s390_image_load(struct kimage * image,char * kernel,unsigned long kernel_len,char * initrd,unsigned long initrd_len,char * cmdline,unsigned long cmdline_len)43*4882a593Smuzhiyun static void *s390_image_load(struct kimage *image,
44*4882a593Smuzhiyun 			     char *kernel, unsigned long kernel_len,
45*4882a593Smuzhiyun 			     char *initrd, unsigned long initrd_len,
46*4882a593Smuzhiyun 			     char *cmdline, unsigned long cmdline_len)
47*4882a593Smuzhiyun {
48*4882a593Smuzhiyun 	return kexec_file_add_components(image, kexec_file_add_kernel_image);
49*4882a593Smuzhiyun }
50*4882a593Smuzhiyun 
s390_image_probe(const char * buf,unsigned long len)51*4882a593Smuzhiyun static int s390_image_probe(const char *buf, unsigned long len)
52*4882a593Smuzhiyun {
53*4882a593Smuzhiyun 	/* Can't reliably tell if an image is valid.  Therefore give the
54*4882a593Smuzhiyun 	 * user whatever he wants.
55*4882a593Smuzhiyun 	 */
56*4882a593Smuzhiyun 	return 0;
57*4882a593Smuzhiyun }
58*4882a593Smuzhiyun 
59*4882a593Smuzhiyun const struct kexec_file_ops s390_kexec_image_ops = {
60*4882a593Smuzhiyun 	.probe = s390_image_probe,
61*4882a593Smuzhiyun 	.load = s390_image_load,
62*4882a593Smuzhiyun #ifdef CONFIG_KEXEC_SIG
63*4882a593Smuzhiyun 	.verify_sig = s390_verify_sig,
64*4882a593Smuzhiyun #endif /* CONFIG_KEXEC_SIG */
65*4882a593Smuzhiyun };
66