162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci#include <linux/string.h> 362306a36Sopenharmony_ci#include <linux/elf.h> 462306a36Sopenharmony_ci#include <asm/boot_data.h> 562306a36Sopenharmony_ci#include <asm/sections.h> 662306a36Sopenharmony_ci#include <asm/maccess.h> 762306a36Sopenharmony_ci#include <asm/cpu_mf.h> 862306a36Sopenharmony_ci#include <asm/setup.h> 962306a36Sopenharmony_ci#include <asm/kasan.h> 1062306a36Sopenharmony_ci#include <asm/kexec.h> 1162306a36Sopenharmony_ci#include <asm/sclp.h> 1262306a36Sopenharmony_ci#include <asm/diag.h> 1362306a36Sopenharmony_ci#include <asm/uv.h> 1462306a36Sopenharmony_ci#include <asm/abs_lowcore.h> 1562306a36Sopenharmony_ci#include <asm/physmem_info.h> 1662306a36Sopenharmony_ci#include "decompressor.h" 1762306a36Sopenharmony_ci#include "boot.h" 1862306a36Sopenharmony_ci#include "uv.h" 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ciunsigned long __bootdata_preserved(__kaslr_offset); 2162306a36Sopenharmony_ciunsigned long __bootdata_preserved(__abs_lowcore); 2262306a36Sopenharmony_ciunsigned long __bootdata_preserved(__memcpy_real_area); 2362306a36Sopenharmony_cipte_t *__bootdata_preserved(memcpy_real_ptep); 2462306a36Sopenharmony_ciunsigned long __bootdata_preserved(VMALLOC_START); 2562306a36Sopenharmony_ciunsigned long __bootdata_preserved(VMALLOC_END); 2662306a36Sopenharmony_cistruct page *__bootdata_preserved(vmemmap); 2762306a36Sopenharmony_ciunsigned long __bootdata_preserved(vmemmap_size); 2862306a36Sopenharmony_ciunsigned long __bootdata_preserved(MODULES_VADDR); 2962306a36Sopenharmony_ciunsigned long __bootdata_preserved(MODULES_END); 3062306a36Sopenharmony_ciunsigned long __bootdata_preserved(max_mappable); 3162306a36Sopenharmony_ciunsigned long __bootdata(ident_map_size); 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_ciu64 __bootdata_preserved(stfle_fac_list[16]); 3462306a36Sopenharmony_ciu64 __bootdata_preserved(alt_stfle_fac_list[16]); 3562306a36Sopenharmony_cistruct oldmem_data __bootdata_preserved(oldmem_data); 3662306a36Sopenharmony_ci 3762306a36Sopenharmony_cistruct machine_info machine; 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_civoid error(char *x) 4062306a36Sopenharmony_ci{ 4162306a36Sopenharmony_ci sclp_early_printk("\n\n"); 4262306a36Sopenharmony_ci sclp_early_printk(x); 4362306a36Sopenharmony_ci sclp_early_printk("\n\n -- System halted"); 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci disabled_wait(); 4662306a36Sopenharmony_ci} 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_cistatic void detect_facilities(void) 4962306a36Sopenharmony_ci{ 5062306a36Sopenharmony_ci if (test_facility(8)) { 5162306a36Sopenharmony_ci machine.has_edat1 = 1; 5262306a36Sopenharmony_ci __ctl_set_bit(0, 23); 5362306a36Sopenharmony_ci } 5462306a36Sopenharmony_ci if (test_facility(78)) 5562306a36Sopenharmony_ci machine.has_edat2 = 1; 5662306a36Sopenharmony_ci if (test_facility(130)) 5762306a36Sopenharmony_ci machine.has_nx = 1; 5862306a36Sopenharmony_ci} 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_cistatic void setup_lpp(void) 6162306a36Sopenharmony_ci{ 6262306a36Sopenharmony_ci S390_lowcore.current_pid = 0; 6362306a36Sopenharmony_ci S390_lowcore.lpp = LPP_MAGIC; 6462306a36Sopenharmony_ci if (test_facility(40)) 6562306a36Sopenharmony_ci lpp(&S390_lowcore.lpp); 6662306a36Sopenharmony_ci} 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci#ifdef CONFIG_KERNEL_UNCOMPRESSED 6962306a36Sopenharmony_ciunsigned long mem_safe_offset(void) 7062306a36Sopenharmony_ci{ 7162306a36Sopenharmony_ci return vmlinux.default_lma + vmlinux.image_size + vmlinux.bss_size; 7262306a36Sopenharmony_ci} 7362306a36Sopenharmony_ci#endif 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_cistatic void rescue_initrd(unsigned long min, unsigned long max) 7662306a36Sopenharmony_ci{ 7762306a36Sopenharmony_ci unsigned long old_addr, addr, size; 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_ci if (!IS_ENABLED(CONFIG_BLK_DEV_INITRD)) 8062306a36Sopenharmony_ci return; 8162306a36Sopenharmony_ci if (!get_physmem_reserved(RR_INITRD, &addr, &size)) 8262306a36Sopenharmony_ci return; 8362306a36Sopenharmony_ci if (addr >= min && addr + size <= max) 8462306a36Sopenharmony_ci return; 8562306a36Sopenharmony_ci old_addr = addr; 8662306a36Sopenharmony_ci physmem_free(RR_INITRD); 8762306a36Sopenharmony_ci addr = physmem_alloc_top_down(RR_INITRD, size, 0); 8862306a36Sopenharmony_ci memmove((void *)addr, (void *)old_addr, size); 8962306a36Sopenharmony_ci} 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_cistatic void copy_bootdata(void) 9262306a36Sopenharmony_ci{ 9362306a36Sopenharmony_ci if (__boot_data_end - __boot_data_start != vmlinux.bootdata_size) 9462306a36Sopenharmony_ci error(".boot.data section size mismatch"); 9562306a36Sopenharmony_ci memcpy((void *)vmlinux.bootdata_off, __boot_data_start, vmlinux.bootdata_size); 9662306a36Sopenharmony_ci if (__boot_data_preserved_end - __boot_data_preserved_start != vmlinux.bootdata_preserved_size) 9762306a36Sopenharmony_ci error(".boot.preserved.data section size mismatch"); 9862306a36Sopenharmony_ci memcpy((void *)vmlinux.bootdata_preserved_off, __boot_data_preserved_start, vmlinux.bootdata_preserved_size); 9962306a36Sopenharmony_ci} 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_cistatic void handle_relocs(unsigned long offset) 10262306a36Sopenharmony_ci{ 10362306a36Sopenharmony_ci Elf64_Rela *rela_start, *rela_end, *rela; 10462306a36Sopenharmony_ci int r_type, r_sym, rc; 10562306a36Sopenharmony_ci Elf64_Addr loc, val; 10662306a36Sopenharmony_ci Elf64_Sym *dynsym; 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_ci rela_start = (Elf64_Rela *) vmlinux.rela_dyn_start; 10962306a36Sopenharmony_ci rela_end = (Elf64_Rela *) vmlinux.rela_dyn_end; 11062306a36Sopenharmony_ci dynsym = (Elf64_Sym *) vmlinux.dynsym_start; 11162306a36Sopenharmony_ci for (rela = rela_start; rela < rela_end; rela++) { 11262306a36Sopenharmony_ci loc = rela->r_offset + offset; 11362306a36Sopenharmony_ci val = rela->r_addend; 11462306a36Sopenharmony_ci r_sym = ELF64_R_SYM(rela->r_info); 11562306a36Sopenharmony_ci if (r_sym) { 11662306a36Sopenharmony_ci if (dynsym[r_sym].st_shndx != SHN_UNDEF) 11762306a36Sopenharmony_ci val += dynsym[r_sym].st_value + offset; 11862306a36Sopenharmony_ci } else { 11962306a36Sopenharmony_ci /* 12062306a36Sopenharmony_ci * 0 == undefined symbol table index (STN_UNDEF), 12162306a36Sopenharmony_ci * used for R_390_RELATIVE, only add KASLR offset 12262306a36Sopenharmony_ci */ 12362306a36Sopenharmony_ci val += offset; 12462306a36Sopenharmony_ci } 12562306a36Sopenharmony_ci r_type = ELF64_R_TYPE(rela->r_info); 12662306a36Sopenharmony_ci rc = arch_kexec_do_relocs(r_type, (void *) loc, val, 0); 12762306a36Sopenharmony_ci if (rc) 12862306a36Sopenharmony_ci error("Unknown relocation type"); 12962306a36Sopenharmony_ci } 13062306a36Sopenharmony_ci} 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_ci/* 13362306a36Sopenharmony_ci * Merge information from several sources into a single ident_map_size value. 13462306a36Sopenharmony_ci * "ident_map_size" represents the upper limit of physical memory we may ever 13562306a36Sopenharmony_ci * reach. It might not be all online memory, but also include standby (offline) 13662306a36Sopenharmony_ci * memory. "ident_map_size" could be lower then actual standby or even online 13762306a36Sopenharmony_ci * memory present, due to limiting factors. We should never go above this limit. 13862306a36Sopenharmony_ci * It is the size of our identity mapping. 13962306a36Sopenharmony_ci * 14062306a36Sopenharmony_ci * Consider the following factors: 14162306a36Sopenharmony_ci * 1. max_physmem_end - end of physical memory online or standby. 14262306a36Sopenharmony_ci * Always >= end of the last online memory range (get_physmem_online_end()). 14362306a36Sopenharmony_ci * 2. CONFIG_MAX_PHYSMEM_BITS - the maximum size of physical memory the 14462306a36Sopenharmony_ci * kernel is able to support. 14562306a36Sopenharmony_ci * 3. "mem=" kernel command line option which limits physical memory usage. 14662306a36Sopenharmony_ci * 4. OLDMEM_BASE which is a kdump memory limit when the kernel is executed as 14762306a36Sopenharmony_ci * crash kernel. 14862306a36Sopenharmony_ci * 5. "hsa" size which is a memory limit when the kernel is executed during 14962306a36Sopenharmony_ci * zfcp/nvme dump. 15062306a36Sopenharmony_ci */ 15162306a36Sopenharmony_cistatic void setup_ident_map_size(unsigned long max_physmem_end) 15262306a36Sopenharmony_ci{ 15362306a36Sopenharmony_ci unsigned long hsa_size; 15462306a36Sopenharmony_ci 15562306a36Sopenharmony_ci ident_map_size = max_physmem_end; 15662306a36Sopenharmony_ci if (memory_limit) 15762306a36Sopenharmony_ci ident_map_size = min(ident_map_size, memory_limit); 15862306a36Sopenharmony_ci ident_map_size = min(ident_map_size, 1UL << MAX_PHYSMEM_BITS); 15962306a36Sopenharmony_ci 16062306a36Sopenharmony_ci#ifdef CONFIG_CRASH_DUMP 16162306a36Sopenharmony_ci if (oldmem_data.start) { 16262306a36Sopenharmony_ci __kaslr_enabled = 0; 16362306a36Sopenharmony_ci ident_map_size = min(ident_map_size, oldmem_data.size); 16462306a36Sopenharmony_ci } else if (ipl_block_valid && is_ipl_block_dump()) { 16562306a36Sopenharmony_ci __kaslr_enabled = 0; 16662306a36Sopenharmony_ci if (!sclp_early_get_hsa_size(&hsa_size) && hsa_size) 16762306a36Sopenharmony_ci ident_map_size = min(ident_map_size, hsa_size); 16862306a36Sopenharmony_ci } 16962306a36Sopenharmony_ci#endif 17062306a36Sopenharmony_ci} 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_cistatic unsigned long setup_kernel_memory_layout(void) 17362306a36Sopenharmony_ci{ 17462306a36Sopenharmony_ci unsigned long vmemmap_start; 17562306a36Sopenharmony_ci unsigned long asce_limit; 17662306a36Sopenharmony_ci unsigned long rte_size; 17762306a36Sopenharmony_ci unsigned long pages; 17862306a36Sopenharmony_ci unsigned long vsize; 17962306a36Sopenharmony_ci unsigned long vmax; 18062306a36Sopenharmony_ci 18162306a36Sopenharmony_ci pages = ident_map_size / PAGE_SIZE; 18262306a36Sopenharmony_ci /* vmemmap contains a multiple of PAGES_PER_SECTION struct pages */ 18362306a36Sopenharmony_ci vmemmap_size = SECTION_ALIGN_UP(pages) * sizeof(struct page); 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci /* choose kernel address space layout: 4 or 3 levels. */ 18662306a36Sopenharmony_ci vsize = round_up(ident_map_size, _REGION3_SIZE) + vmemmap_size + 18762306a36Sopenharmony_ci MODULES_LEN + MEMCPY_REAL_SIZE + ABS_LOWCORE_MAP_SIZE; 18862306a36Sopenharmony_ci vsize = size_add(vsize, vmalloc_size); 18962306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_KASAN) || (vsize > _REGION2_SIZE)) { 19062306a36Sopenharmony_ci asce_limit = _REGION1_SIZE; 19162306a36Sopenharmony_ci rte_size = _REGION2_SIZE; 19262306a36Sopenharmony_ci } else { 19362306a36Sopenharmony_ci asce_limit = _REGION2_SIZE; 19462306a36Sopenharmony_ci rte_size = _REGION3_SIZE; 19562306a36Sopenharmony_ci } 19662306a36Sopenharmony_ci 19762306a36Sopenharmony_ci /* 19862306a36Sopenharmony_ci * Forcing modules and vmalloc area under the ultravisor 19962306a36Sopenharmony_ci * secure storage limit, so that any vmalloc allocation 20062306a36Sopenharmony_ci * we do could be used to back secure guest storage. 20162306a36Sopenharmony_ci */ 20262306a36Sopenharmony_ci vmax = adjust_to_uv_max(asce_limit); 20362306a36Sopenharmony_ci#ifdef CONFIG_KASAN 20462306a36Sopenharmony_ci /* force vmalloc and modules below kasan shadow */ 20562306a36Sopenharmony_ci vmax = min(vmax, KASAN_SHADOW_START); 20662306a36Sopenharmony_ci#endif 20762306a36Sopenharmony_ci __memcpy_real_area = round_down(vmax - MEMCPY_REAL_SIZE, PAGE_SIZE); 20862306a36Sopenharmony_ci __abs_lowcore = round_down(__memcpy_real_area - ABS_LOWCORE_MAP_SIZE, 20962306a36Sopenharmony_ci sizeof(struct lowcore)); 21062306a36Sopenharmony_ci MODULES_END = round_down(__abs_lowcore, _SEGMENT_SIZE); 21162306a36Sopenharmony_ci MODULES_VADDR = MODULES_END - MODULES_LEN; 21262306a36Sopenharmony_ci VMALLOC_END = MODULES_VADDR; 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_ci /* allow vmalloc area to occupy up to about 1/2 of the rest virtual space left */ 21562306a36Sopenharmony_ci vsize = round_down(VMALLOC_END / 2, _SEGMENT_SIZE); 21662306a36Sopenharmony_ci vmalloc_size = min(vmalloc_size, vsize); 21762306a36Sopenharmony_ci VMALLOC_START = VMALLOC_END - vmalloc_size; 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci /* split remaining virtual space between 1:1 mapping & vmemmap array */ 22062306a36Sopenharmony_ci pages = VMALLOC_START / (PAGE_SIZE + sizeof(struct page)); 22162306a36Sopenharmony_ci pages = SECTION_ALIGN_UP(pages); 22262306a36Sopenharmony_ci /* keep vmemmap_start aligned to a top level region table entry */ 22362306a36Sopenharmony_ci vmemmap_start = round_down(VMALLOC_START - pages * sizeof(struct page), rte_size); 22462306a36Sopenharmony_ci vmemmap_start = min(vmemmap_start, 1UL << MAX_PHYSMEM_BITS); 22562306a36Sopenharmony_ci /* maximum mappable address as seen by arch_get_mappable_range() */ 22662306a36Sopenharmony_ci max_mappable = vmemmap_start; 22762306a36Sopenharmony_ci /* make sure identity map doesn't overlay with vmemmap */ 22862306a36Sopenharmony_ci ident_map_size = min(ident_map_size, vmemmap_start); 22962306a36Sopenharmony_ci vmemmap_size = SECTION_ALIGN_UP(ident_map_size / PAGE_SIZE) * sizeof(struct page); 23062306a36Sopenharmony_ci /* make sure vmemmap doesn't overlay with vmalloc area */ 23162306a36Sopenharmony_ci VMALLOC_START = max(vmemmap_start + vmemmap_size, VMALLOC_START); 23262306a36Sopenharmony_ci vmemmap = (struct page *)vmemmap_start; 23362306a36Sopenharmony_ci 23462306a36Sopenharmony_ci return asce_limit; 23562306a36Sopenharmony_ci} 23662306a36Sopenharmony_ci 23762306a36Sopenharmony_ci/* 23862306a36Sopenharmony_ci * This function clears the BSS section of the decompressed Linux kernel and NOT the decompressor's. 23962306a36Sopenharmony_ci */ 24062306a36Sopenharmony_cistatic void clear_bss_section(unsigned long vmlinux_lma) 24162306a36Sopenharmony_ci{ 24262306a36Sopenharmony_ci memset((void *)vmlinux_lma + vmlinux.image_size, 0, vmlinux.bss_size); 24362306a36Sopenharmony_ci} 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_ci/* 24662306a36Sopenharmony_ci * Set vmalloc area size to an 8th of (potential) physical memory 24762306a36Sopenharmony_ci * size, unless size has been set by kernel command line parameter. 24862306a36Sopenharmony_ci */ 24962306a36Sopenharmony_cistatic void setup_vmalloc_size(void) 25062306a36Sopenharmony_ci{ 25162306a36Sopenharmony_ci unsigned long size; 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci if (vmalloc_size_set) 25462306a36Sopenharmony_ci return; 25562306a36Sopenharmony_ci size = round_up(ident_map_size / 8, _SEGMENT_SIZE); 25662306a36Sopenharmony_ci vmalloc_size = max(size, vmalloc_size); 25762306a36Sopenharmony_ci} 25862306a36Sopenharmony_ci 25962306a36Sopenharmony_cistatic void offset_vmlinux_info(unsigned long offset) 26062306a36Sopenharmony_ci{ 26162306a36Sopenharmony_ci *(unsigned long *)(&vmlinux.entry) += offset; 26262306a36Sopenharmony_ci vmlinux.bootdata_off += offset; 26362306a36Sopenharmony_ci vmlinux.bootdata_preserved_off += offset; 26462306a36Sopenharmony_ci vmlinux.rela_dyn_start += offset; 26562306a36Sopenharmony_ci vmlinux.rela_dyn_end += offset; 26662306a36Sopenharmony_ci vmlinux.dynsym_start += offset; 26762306a36Sopenharmony_ci vmlinux.init_mm_off += offset; 26862306a36Sopenharmony_ci vmlinux.swapper_pg_dir_off += offset; 26962306a36Sopenharmony_ci vmlinux.invalid_pg_dir_off += offset; 27062306a36Sopenharmony_ci#ifdef CONFIG_KASAN 27162306a36Sopenharmony_ci vmlinux.kasan_early_shadow_page_off += offset; 27262306a36Sopenharmony_ci vmlinux.kasan_early_shadow_pte_off += offset; 27362306a36Sopenharmony_ci vmlinux.kasan_early_shadow_pmd_off += offset; 27462306a36Sopenharmony_ci vmlinux.kasan_early_shadow_pud_off += offset; 27562306a36Sopenharmony_ci vmlinux.kasan_early_shadow_p4d_off += offset; 27662306a36Sopenharmony_ci#endif 27762306a36Sopenharmony_ci} 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_civoid startup_kernel(void) 28062306a36Sopenharmony_ci{ 28162306a36Sopenharmony_ci unsigned long max_physmem_end; 28262306a36Sopenharmony_ci unsigned long vmlinux_lma = 0; 28362306a36Sopenharmony_ci unsigned long amode31_lma = 0; 28462306a36Sopenharmony_ci unsigned long asce_limit; 28562306a36Sopenharmony_ci unsigned long safe_addr; 28662306a36Sopenharmony_ci void *img; 28762306a36Sopenharmony_ci psw_t psw; 28862306a36Sopenharmony_ci 28962306a36Sopenharmony_ci setup_lpp(); 29062306a36Sopenharmony_ci safe_addr = mem_safe_offset(); 29162306a36Sopenharmony_ci 29262306a36Sopenharmony_ci /* 29362306a36Sopenharmony_ci * Reserve decompressor memory together with decompression heap, buffer and 29462306a36Sopenharmony_ci * memory which might be occupied by uncompressed kernel at default 1Mb 29562306a36Sopenharmony_ci * position (if KASLR is off or failed). 29662306a36Sopenharmony_ci */ 29762306a36Sopenharmony_ci physmem_reserve(RR_DECOMPRESSOR, 0, safe_addr); 29862306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_BLK_DEV_INITRD) && parmarea.initrd_size) 29962306a36Sopenharmony_ci physmem_reserve(RR_INITRD, parmarea.initrd_start, parmarea.initrd_size); 30062306a36Sopenharmony_ci oldmem_data.start = parmarea.oldmem_base; 30162306a36Sopenharmony_ci oldmem_data.size = parmarea.oldmem_size; 30262306a36Sopenharmony_ci 30362306a36Sopenharmony_ci store_ipl_parmblock(); 30462306a36Sopenharmony_ci read_ipl_report(); 30562306a36Sopenharmony_ci uv_query_info(); 30662306a36Sopenharmony_ci sclp_early_read_info(); 30762306a36Sopenharmony_ci setup_boot_command_line(); 30862306a36Sopenharmony_ci parse_boot_command_line(); 30962306a36Sopenharmony_ci detect_facilities(); 31062306a36Sopenharmony_ci sanitize_prot_virt_host(); 31162306a36Sopenharmony_ci max_physmem_end = detect_max_physmem_end(); 31262306a36Sopenharmony_ci setup_ident_map_size(max_physmem_end); 31362306a36Sopenharmony_ci setup_vmalloc_size(); 31462306a36Sopenharmony_ci asce_limit = setup_kernel_memory_layout(); 31562306a36Sopenharmony_ci /* got final ident_map_size, physmem allocations could be performed now */ 31662306a36Sopenharmony_ci physmem_set_usable_limit(ident_map_size); 31762306a36Sopenharmony_ci detect_physmem_online_ranges(max_physmem_end); 31862306a36Sopenharmony_ci save_ipl_cert_comp_list(); 31962306a36Sopenharmony_ci rescue_initrd(safe_addr, ident_map_size); 32062306a36Sopenharmony_ci 32162306a36Sopenharmony_ci if (kaslr_enabled()) { 32262306a36Sopenharmony_ci vmlinux_lma = randomize_within_range(vmlinux.image_size + vmlinux.bss_size, 32362306a36Sopenharmony_ci THREAD_SIZE, vmlinux.default_lma, 32462306a36Sopenharmony_ci ident_map_size); 32562306a36Sopenharmony_ci if (vmlinux_lma) { 32662306a36Sopenharmony_ci __kaslr_offset = vmlinux_lma - vmlinux.default_lma; 32762306a36Sopenharmony_ci offset_vmlinux_info(__kaslr_offset); 32862306a36Sopenharmony_ci } 32962306a36Sopenharmony_ci } 33062306a36Sopenharmony_ci vmlinux_lma = vmlinux_lma ?: vmlinux.default_lma; 33162306a36Sopenharmony_ci physmem_reserve(RR_VMLINUX, vmlinux_lma, vmlinux.image_size + vmlinux.bss_size); 33262306a36Sopenharmony_ci 33362306a36Sopenharmony_ci if (!IS_ENABLED(CONFIG_KERNEL_UNCOMPRESSED)) { 33462306a36Sopenharmony_ci img = decompress_kernel(); 33562306a36Sopenharmony_ci memmove((void *)vmlinux_lma, img, vmlinux.image_size); 33662306a36Sopenharmony_ci } else if (__kaslr_offset) { 33762306a36Sopenharmony_ci img = (void *)vmlinux.default_lma; 33862306a36Sopenharmony_ci memmove((void *)vmlinux_lma, img, vmlinux.image_size); 33962306a36Sopenharmony_ci memset(img, 0, vmlinux.image_size); 34062306a36Sopenharmony_ci } 34162306a36Sopenharmony_ci 34262306a36Sopenharmony_ci /* vmlinux decompression is done, shrink reserved low memory */ 34362306a36Sopenharmony_ci physmem_reserve(RR_DECOMPRESSOR, 0, (unsigned long)_decompressor_end); 34462306a36Sopenharmony_ci if (kaslr_enabled()) 34562306a36Sopenharmony_ci amode31_lma = randomize_within_range(vmlinux.amode31_size, PAGE_SIZE, 0, SZ_2G); 34662306a36Sopenharmony_ci amode31_lma = amode31_lma ?: vmlinux.default_lma - vmlinux.amode31_size; 34762306a36Sopenharmony_ci physmem_reserve(RR_AMODE31, amode31_lma, vmlinux.amode31_size); 34862306a36Sopenharmony_ci 34962306a36Sopenharmony_ci /* 35062306a36Sopenharmony_ci * The order of the following operations is important: 35162306a36Sopenharmony_ci * 35262306a36Sopenharmony_ci * - handle_relocs() must follow clear_bss_section() to establish static 35362306a36Sopenharmony_ci * memory references to data in .bss to be used by setup_vmem() 35462306a36Sopenharmony_ci * (i.e init_mm.pgd) 35562306a36Sopenharmony_ci * 35662306a36Sopenharmony_ci * - setup_vmem() must follow handle_relocs() to be able using 35762306a36Sopenharmony_ci * static memory references to data in .bss (i.e init_mm.pgd) 35862306a36Sopenharmony_ci * 35962306a36Sopenharmony_ci * - copy_bootdata() must follow setup_vmem() to propagate changes to 36062306a36Sopenharmony_ci * bootdata made by setup_vmem() 36162306a36Sopenharmony_ci */ 36262306a36Sopenharmony_ci clear_bss_section(vmlinux_lma); 36362306a36Sopenharmony_ci handle_relocs(__kaslr_offset); 36462306a36Sopenharmony_ci setup_vmem(asce_limit); 36562306a36Sopenharmony_ci copy_bootdata(); 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_ci /* 36862306a36Sopenharmony_ci * Save KASLR offset for early dumps, before vmcore_info is set. 36962306a36Sopenharmony_ci * Mark as uneven to distinguish from real vmcore_info pointer. 37062306a36Sopenharmony_ci */ 37162306a36Sopenharmony_ci S390_lowcore.vmcore_info = __kaslr_offset ? __kaslr_offset | 0x1UL : 0; 37262306a36Sopenharmony_ci 37362306a36Sopenharmony_ci /* 37462306a36Sopenharmony_ci * Jump to the decompressed kernel entry point and switch DAT mode on. 37562306a36Sopenharmony_ci */ 37662306a36Sopenharmony_ci psw.addr = vmlinux.entry; 37762306a36Sopenharmony_ci psw.mask = PSW_KERNEL_BITS; 37862306a36Sopenharmony_ci __load_psw(psw); 37962306a36Sopenharmony_ci} 380