1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * Image loader for kexec_file_load system call.
4*4882a593Smuzhiyun *
5*4882a593Smuzhiyun * Copyright IBM Corp. 2018
6*4882a593Smuzhiyun *
7*4882a593Smuzhiyun * Author(s): Philipp Rudo <prudo@linux.vnet.ibm.com>
8*4882a593Smuzhiyun */
9*4882a593Smuzhiyun
10*4882a593Smuzhiyun #include <linux/errno.h>
11*4882a593Smuzhiyun #include <linux/kernel.h>
12*4882a593Smuzhiyun #include <linux/kexec.h>
13*4882a593Smuzhiyun #include <asm/ipl.h>
14*4882a593Smuzhiyun #include <asm/setup.h>
15*4882a593Smuzhiyun
kexec_file_add_kernel_image(struct kimage * image,struct s390_load_data * data)16*4882a593Smuzhiyun static int kexec_file_add_kernel_image(struct kimage *image,
17*4882a593Smuzhiyun struct s390_load_data *data)
18*4882a593Smuzhiyun {
19*4882a593Smuzhiyun struct kexec_buf buf;
20*4882a593Smuzhiyun
21*4882a593Smuzhiyun buf.image = image;
22*4882a593Smuzhiyun
23*4882a593Smuzhiyun buf.buffer = image->kernel_buf;
24*4882a593Smuzhiyun buf.bufsz = image->kernel_buf_len;
25*4882a593Smuzhiyun
26*4882a593Smuzhiyun buf.mem = 0;
27*4882a593Smuzhiyun if (image->type == KEXEC_TYPE_CRASH)
28*4882a593Smuzhiyun buf.mem += crashk_res.start;
29*4882a593Smuzhiyun buf.memsz = buf.bufsz;
30*4882a593Smuzhiyun
31*4882a593Smuzhiyun data->kernel_buf = image->kernel_buf;
32*4882a593Smuzhiyun data->kernel_mem = buf.mem;
33*4882a593Smuzhiyun data->parm = image->kernel_buf + PARMAREA;
34*4882a593Smuzhiyun data->memsz += buf.memsz;
35*4882a593Smuzhiyun
36*4882a593Smuzhiyun ipl_report_add_component(data->report, &buf,
37*4882a593Smuzhiyun IPL_RB_COMPONENT_FLAG_SIGNED |
38*4882a593Smuzhiyun IPL_RB_COMPONENT_FLAG_VERIFIED,
39*4882a593Smuzhiyun IPL_RB_CERT_UNKNOWN);
40*4882a593Smuzhiyun return kexec_add_buffer(&buf);
41*4882a593Smuzhiyun }
42*4882a593Smuzhiyun
s390_image_load(struct kimage * image,char * kernel,unsigned long kernel_len,char * initrd,unsigned long initrd_len,char * cmdline,unsigned long cmdline_len)43*4882a593Smuzhiyun static void *s390_image_load(struct kimage *image,
44*4882a593Smuzhiyun char *kernel, unsigned long kernel_len,
45*4882a593Smuzhiyun char *initrd, unsigned long initrd_len,
46*4882a593Smuzhiyun char *cmdline, unsigned long cmdline_len)
47*4882a593Smuzhiyun {
48*4882a593Smuzhiyun return kexec_file_add_components(image, kexec_file_add_kernel_image);
49*4882a593Smuzhiyun }
50*4882a593Smuzhiyun
s390_image_probe(const char * buf,unsigned long len)51*4882a593Smuzhiyun static int s390_image_probe(const char *buf, unsigned long len)
52*4882a593Smuzhiyun {
53*4882a593Smuzhiyun /* Can't reliably tell if an image is valid. Therefore give the
54*4882a593Smuzhiyun * user whatever he wants.
55*4882a593Smuzhiyun */
56*4882a593Smuzhiyun return 0;
57*4882a593Smuzhiyun }
58*4882a593Smuzhiyun
59*4882a593Smuzhiyun const struct kexec_file_ops s390_kexec_image_ops = {
60*4882a593Smuzhiyun .probe = s390_image_probe,
61*4882a593Smuzhiyun .load = s390_image_load,
62*4882a593Smuzhiyun #ifdef CONFIG_KEXEC_SIG
63*4882a593Smuzhiyun .verify_sig = s390_verify_sig,
64*4882a593Smuzhiyun #endif /* CONFIG_KEXEC_SIG */
65*4882a593Smuzhiyun };
66