xref: /kernel/linux/linux-6.6/arch/s390/boot/startup.c (revision 62306a36)
162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci#include <linux/string.h>
362306a36Sopenharmony_ci#include <linux/elf.h>
462306a36Sopenharmony_ci#include <asm/boot_data.h>
562306a36Sopenharmony_ci#include <asm/sections.h>
662306a36Sopenharmony_ci#include <asm/maccess.h>
762306a36Sopenharmony_ci#include <asm/cpu_mf.h>
862306a36Sopenharmony_ci#include <asm/setup.h>
962306a36Sopenharmony_ci#include <asm/kasan.h>
1062306a36Sopenharmony_ci#include <asm/kexec.h>
1162306a36Sopenharmony_ci#include <asm/sclp.h>
1262306a36Sopenharmony_ci#include <asm/diag.h>
1362306a36Sopenharmony_ci#include <asm/uv.h>
1462306a36Sopenharmony_ci#include <asm/abs_lowcore.h>
1562306a36Sopenharmony_ci#include <asm/physmem_info.h>
1662306a36Sopenharmony_ci#include "decompressor.h"
1762306a36Sopenharmony_ci#include "boot.h"
1862306a36Sopenharmony_ci#include "uv.h"
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ciunsigned long __bootdata_preserved(__kaslr_offset);
2162306a36Sopenharmony_ciunsigned long __bootdata_preserved(__abs_lowcore);
2262306a36Sopenharmony_ciunsigned long __bootdata_preserved(__memcpy_real_area);
2362306a36Sopenharmony_cipte_t *__bootdata_preserved(memcpy_real_ptep);
2462306a36Sopenharmony_ciunsigned long __bootdata_preserved(VMALLOC_START);
2562306a36Sopenharmony_ciunsigned long __bootdata_preserved(VMALLOC_END);
2662306a36Sopenharmony_cistruct page *__bootdata_preserved(vmemmap);
2762306a36Sopenharmony_ciunsigned long __bootdata_preserved(vmemmap_size);
2862306a36Sopenharmony_ciunsigned long __bootdata_preserved(MODULES_VADDR);
2962306a36Sopenharmony_ciunsigned long __bootdata_preserved(MODULES_END);
3062306a36Sopenharmony_ciunsigned long __bootdata_preserved(max_mappable);
3162306a36Sopenharmony_ciunsigned long __bootdata(ident_map_size);
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_ciu64 __bootdata_preserved(stfle_fac_list[16]);
3462306a36Sopenharmony_ciu64 __bootdata_preserved(alt_stfle_fac_list[16]);
3562306a36Sopenharmony_cistruct oldmem_data __bootdata_preserved(oldmem_data);
3662306a36Sopenharmony_ci
3762306a36Sopenharmony_cistruct machine_info machine;
3862306a36Sopenharmony_ci
3962306a36Sopenharmony_civoid error(char *x)
4062306a36Sopenharmony_ci{
4162306a36Sopenharmony_ci	sclp_early_printk("\n\n");
4262306a36Sopenharmony_ci	sclp_early_printk(x);
4362306a36Sopenharmony_ci	sclp_early_printk("\n\n -- System halted");
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ci	disabled_wait();
4662306a36Sopenharmony_ci}
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_cistatic void detect_facilities(void)
4962306a36Sopenharmony_ci{
5062306a36Sopenharmony_ci	if (test_facility(8)) {
5162306a36Sopenharmony_ci		machine.has_edat1 = 1;
5262306a36Sopenharmony_ci		__ctl_set_bit(0, 23);
5362306a36Sopenharmony_ci	}
5462306a36Sopenharmony_ci	if (test_facility(78))
5562306a36Sopenharmony_ci		machine.has_edat2 = 1;
5662306a36Sopenharmony_ci	if (test_facility(130))
5762306a36Sopenharmony_ci		machine.has_nx = 1;
5862306a36Sopenharmony_ci}
5962306a36Sopenharmony_ci
6062306a36Sopenharmony_cistatic void setup_lpp(void)
6162306a36Sopenharmony_ci{
6262306a36Sopenharmony_ci	S390_lowcore.current_pid = 0;
6362306a36Sopenharmony_ci	S390_lowcore.lpp = LPP_MAGIC;
6462306a36Sopenharmony_ci	if (test_facility(40))
6562306a36Sopenharmony_ci		lpp(&S390_lowcore.lpp);
6662306a36Sopenharmony_ci}
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_ci#ifdef CONFIG_KERNEL_UNCOMPRESSED
6962306a36Sopenharmony_ciunsigned long mem_safe_offset(void)
7062306a36Sopenharmony_ci{
7162306a36Sopenharmony_ci	return vmlinux.default_lma + vmlinux.image_size + vmlinux.bss_size;
7262306a36Sopenharmony_ci}
7362306a36Sopenharmony_ci#endif
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_cistatic void rescue_initrd(unsigned long min, unsigned long max)
7662306a36Sopenharmony_ci{
7762306a36Sopenharmony_ci	unsigned long old_addr, addr, size;
7862306a36Sopenharmony_ci
7962306a36Sopenharmony_ci	if (!IS_ENABLED(CONFIG_BLK_DEV_INITRD))
8062306a36Sopenharmony_ci		return;
8162306a36Sopenharmony_ci	if (!get_physmem_reserved(RR_INITRD, &addr, &size))
8262306a36Sopenharmony_ci		return;
8362306a36Sopenharmony_ci	if (addr >= min && addr + size <= max)
8462306a36Sopenharmony_ci		return;
8562306a36Sopenharmony_ci	old_addr = addr;
8662306a36Sopenharmony_ci	physmem_free(RR_INITRD);
8762306a36Sopenharmony_ci	addr = physmem_alloc_top_down(RR_INITRD, size, 0);
8862306a36Sopenharmony_ci	memmove((void *)addr, (void *)old_addr, size);
8962306a36Sopenharmony_ci}
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_cistatic void copy_bootdata(void)
9262306a36Sopenharmony_ci{
9362306a36Sopenharmony_ci	if (__boot_data_end - __boot_data_start != vmlinux.bootdata_size)
9462306a36Sopenharmony_ci		error(".boot.data section size mismatch");
9562306a36Sopenharmony_ci	memcpy((void *)vmlinux.bootdata_off, __boot_data_start, vmlinux.bootdata_size);
9662306a36Sopenharmony_ci	if (__boot_data_preserved_end - __boot_data_preserved_start != vmlinux.bootdata_preserved_size)
9762306a36Sopenharmony_ci		error(".boot.preserved.data section size mismatch");
9862306a36Sopenharmony_ci	memcpy((void *)vmlinux.bootdata_preserved_off, __boot_data_preserved_start, vmlinux.bootdata_preserved_size);
9962306a36Sopenharmony_ci}
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_cistatic void handle_relocs(unsigned long offset)
10262306a36Sopenharmony_ci{
10362306a36Sopenharmony_ci	Elf64_Rela *rela_start, *rela_end, *rela;
10462306a36Sopenharmony_ci	int r_type, r_sym, rc;
10562306a36Sopenharmony_ci	Elf64_Addr loc, val;
10662306a36Sopenharmony_ci	Elf64_Sym *dynsym;
10762306a36Sopenharmony_ci
10862306a36Sopenharmony_ci	rela_start = (Elf64_Rela *) vmlinux.rela_dyn_start;
10962306a36Sopenharmony_ci	rela_end = (Elf64_Rela *) vmlinux.rela_dyn_end;
11062306a36Sopenharmony_ci	dynsym = (Elf64_Sym *) vmlinux.dynsym_start;
11162306a36Sopenharmony_ci	for (rela = rela_start; rela < rela_end; rela++) {
11262306a36Sopenharmony_ci		loc = rela->r_offset + offset;
11362306a36Sopenharmony_ci		val = rela->r_addend;
11462306a36Sopenharmony_ci		r_sym = ELF64_R_SYM(rela->r_info);
11562306a36Sopenharmony_ci		if (r_sym) {
11662306a36Sopenharmony_ci			if (dynsym[r_sym].st_shndx != SHN_UNDEF)
11762306a36Sopenharmony_ci				val += dynsym[r_sym].st_value + offset;
11862306a36Sopenharmony_ci		} else {
11962306a36Sopenharmony_ci			/*
12062306a36Sopenharmony_ci			 * 0 == undefined symbol table index (STN_UNDEF),
12162306a36Sopenharmony_ci			 * used for R_390_RELATIVE, only add KASLR offset
12262306a36Sopenharmony_ci			 */
12362306a36Sopenharmony_ci			val += offset;
12462306a36Sopenharmony_ci		}
12562306a36Sopenharmony_ci		r_type = ELF64_R_TYPE(rela->r_info);
12662306a36Sopenharmony_ci		rc = arch_kexec_do_relocs(r_type, (void *) loc, val, 0);
12762306a36Sopenharmony_ci		if (rc)
12862306a36Sopenharmony_ci			error("Unknown relocation type");
12962306a36Sopenharmony_ci	}
13062306a36Sopenharmony_ci}
13162306a36Sopenharmony_ci
13262306a36Sopenharmony_ci/*
13362306a36Sopenharmony_ci * Merge information from several sources into a single ident_map_size value.
13462306a36Sopenharmony_ci * "ident_map_size" represents the upper limit of physical memory we may ever
13562306a36Sopenharmony_ci * reach. It might not be all online memory, but also include standby (offline)
13662306a36Sopenharmony_ci * memory. "ident_map_size" could be lower then actual standby or even online
13762306a36Sopenharmony_ci * memory present, due to limiting factors. We should never go above this limit.
13862306a36Sopenharmony_ci * It is the size of our identity mapping.
13962306a36Sopenharmony_ci *
14062306a36Sopenharmony_ci * Consider the following factors:
14162306a36Sopenharmony_ci * 1. max_physmem_end - end of physical memory online or standby.
14262306a36Sopenharmony_ci *    Always >= end of the last online memory range (get_physmem_online_end()).
14362306a36Sopenharmony_ci * 2. CONFIG_MAX_PHYSMEM_BITS - the maximum size of physical memory the
14462306a36Sopenharmony_ci *    kernel is able to support.
14562306a36Sopenharmony_ci * 3. "mem=" kernel command line option which limits physical memory usage.
14662306a36Sopenharmony_ci * 4. OLDMEM_BASE which is a kdump memory limit when the kernel is executed as
14762306a36Sopenharmony_ci *    crash kernel.
14862306a36Sopenharmony_ci * 5. "hsa" size which is a memory limit when the kernel is executed during
14962306a36Sopenharmony_ci *    zfcp/nvme dump.
15062306a36Sopenharmony_ci */
15162306a36Sopenharmony_cistatic void setup_ident_map_size(unsigned long max_physmem_end)
15262306a36Sopenharmony_ci{
15362306a36Sopenharmony_ci	unsigned long hsa_size;
15462306a36Sopenharmony_ci
15562306a36Sopenharmony_ci	ident_map_size = max_physmem_end;
15662306a36Sopenharmony_ci	if (memory_limit)
15762306a36Sopenharmony_ci		ident_map_size = min(ident_map_size, memory_limit);
15862306a36Sopenharmony_ci	ident_map_size = min(ident_map_size, 1UL << MAX_PHYSMEM_BITS);
15962306a36Sopenharmony_ci
16062306a36Sopenharmony_ci#ifdef CONFIG_CRASH_DUMP
16162306a36Sopenharmony_ci	if (oldmem_data.start) {
16262306a36Sopenharmony_ci		__kaslr_enabled = 0;
16362306a36Sopenharmony_ci		ident_map_size = min(ident_map_size, oldmem_data.size);
16462306a36Sopenharmony_ci	} else if (ipl_block_valid && is_ipl_block_dump()) {
16562306a36Sopenharmony_ci		__kaslr_enabled = 0;
16662306a36Sopenharmony_ci		if (!sclp_early_get_hsa_size(&hsa_size) && hsa_size)
16762306a36Sopenharmony_ci			ident_map_size = min(ident_map_size, hsa_size);
16862306a36Sopenharmony_ci	}
16962306a36Sopenharmony_ci#endif
17062306a36Sopenharmony_ci}
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_cistatic unsigned long setup_kernel_memory_layout(void)
17362306a36Sopenharmony_ci{
17462306a36Sopenharmony_ci	unsigned long vmemmap_start;
17562306a36Sopenharmony_ci	unsigned long asce_limit;
17662306a36Sopenharmony_ci	unsigned long rte_size;
17762306a36Sopenharmony_ci	unsigned long pages;
17862306a36Sopenharmony_ci	unsigned long vsize;
17962306a36Sopenharmony_ci	unsigned long vmax;
18062306a36Sopenharmony_ci
18162306a36Sopenharmony_ci	pages = ident_map_size / PAGE_SIZE;
18262306a36Sopenharmony_ci	/* vmemmap contains a multiple of PAGES_PER_SECTION struct pages */
18362306a36Sopenharmony_ci	vmemmap_size = SECTION_ALIGN_UP(pages) * sizeof(struct page);
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	/* choose kernel address space layout: 4 or 3 levels. */
18662306a36Sopenharmony_ci	vsize = round_up(ident_map_size, _REGION3_SIZE) + vmemmap_size +
18762306a36Sopenharmony_ci		MODULES_LEN + MEMCPY_REAL_SIZE + ABS_LOWCORE_MAP_SIZE;
18862306a36Sopenharmony_ci	vsize = size_add(vsize, vmalloc_size);
18962306a36Sopenharmony_ci	if (IS_ENABLED(CONFIG_KASAN) || (vsize > _REGION2_SIZE)) {
19062306a36Sopenharmony_ci		asce_limit = _REGION1_SIZE;
19162306a36Sopenharmony_ci		rte_size = _REGION2_SIZE;
19262306a36Sopenharmony_ci	} else {
19362306a36Sopenharmony_ci		asce_limit = _REGION2_SIZE;
19462306a36Sopenharmony_ci		rte_size = _REGION3_SIZE;
19562306a36Sopenharmony_ci	}
19662306a36Sopenharmony_ci
19762306a36Sopenharmony_ci	/*
19862306a36Sopenharmony_ci	 * Forcing modules and vmalloc area under the ultravisor
19962306a36Sopenharmony_ci	 * secure storage limit, so that any vmalloc allocation
20062306a36Sopenharmony_ci	 * we do could be used to back secure guest storage.
20162306a36Sopenharmony_ci	 */
20262306a36Sopenharmony_ci	vmax = adjust_to_uv_max(asce_limit);
20362306a36Sopenharmony_ci#ifdef CONFIG_KASAN
20462306a36Sopenharmony_ci	/* force vmalloc and modules below kasan shadow */
20562306a36Sopenharmony_ci	vmax = min(vmax, KASAN_SHADOW_START);
20662306a36Sopenharmony_ci#endif
20762306a36Sopenharmony_ci	__memcpy_real_area = round_down(vmax - MEMCPY_REAL_SIZE, PAGE_SIZE);
20862306a36Sopenharmony_ci	__abs_lowcore = round_down(__memcpy_real_area - ABS_LOWCORE_MAP_SIZE,
20962306a36Sopenharmony_ci				   sizeof(struct lowcore));
21062306a36Sopenharmony_ci	MODULES_END = round_down(__abs_lowcore, _SEGMENT_SIZE);
21162306a36Sopenharmony_ci	MODULES_VADDR = MODULES_END - MODULES_LEN;
21262306a36Sopenharmony_ci	VMALLOC_END = MODULES_VADDR;
21362306a36Sopenharmony_ci
21462306a36Sopenharmony_ci	/* allow vmalloc area to occupy up to about 1/2 of the rest virtual space left */
21562306a36Sopenharmony_ci	vsize = round_down(VMALLOC_END / 2, _SEGMENT_SIZE);
21662306a36Sopenharmony_ci	vmalloc_size = min(vmalloc_size, vsize);
21762306a36Sopenharmony_ci	VMALLOC_START = VMALLOC_END - vmalloc_size;
21862306a36Sopenharmony_ci
21962306a36Sopenharmony_ci	/* split remaining virtual space between 1:1 mapping & vmemmap array */
22062306a36Sopenharmony_ci	pages = VMALLOC_START / (PAGE_SIZE + sizeof(struct page));
22162306a36Sopenharmony_ci	pages = SECTION_ALIGN_UP(pages);
22262306a36Sopenharmony_ci	/* keep vmemmap_start aligned to a top level region table entry */
22362306a36Sopenharmony_ci	vmemmap_start = round_down(VMALLOC_START - pages * sizeof(struct page), rte_size);
22462306a36Sopenharmony_ci	vmemmap_start = min(vmemmap_start, 1UL << MAX_PHYSMEM_BITS);
22562306a36Sopenharmony_ci	/* maximum mappable address as seen by arch_get_mappable_range() */
22662306a36Sopenharmony_ci	max_mappable = vmemmap_start;
22762306a36Sopenharmony_ci	/* make sure identity map doesn't overlay with vmemmap */
22862306a36Sopenharmony_ci	ident_map_size = min(ident_map_size, vmemmap_start);
22962306a36Sopenharmony_ci	vmemmap_size = SECTION_ALIGN_UP(ident_map_size / PAGE_SIZE) * sizeof(struct page);
23062306a36Sopenharmony_ci	/* make sure vmemmap doesn't overlay with vmalloc area */
23162306a36Sopenharmony_ci	VMALLOC_START = max(vmemmap_start + vmemmap_size, VMALLOC_START);
23262306a36Sopenharmony_ci	vmemmap = (struct page *)vmemmap_start;
23362306a36Sopenharmony_ci
23462306a36Sopenharmony_ci	return asce_limit;
23562306a36Sopenharmony_ci}
23662306a36Sopenharmony_ci
23762306a36Sopenharmony_ci/*
23862306a36Sopenharmony_ci * This function clears the BSS section of the decompressed Linux kernel and NOT the decompressor's.
23962306a36Sopenharmony_ci */
24062306a36Sopenharmony_cistatic void clear_bss_section(unsigned long vmlinux_lma)
24162306a36Sopenharmony_ci{
24262306a36Sopenharmony_ci	memset((void *)vmlinux_lma + vmlinux.image_size, 0, vmlinux.bss_size);
24362306a36Sopenharmony_ci}
24462306a36Sopenharmony_ci
24562306a36Sopenharmony_ci/*
24662306a36Sopenharmony_ci * Set vmalloc area size to an 8th of (potential) physical memory
24762306a36Sopenharmony_ci * size, unless size has been set by kernel command line parameter.
24862306a36Sopenharmony_ci */
24962306a36Sopenharmony_cistatic void setup_vmalloc_size(void)
25062306a36Sopenharmony_ci{
25162306a36Sopenharmony_ci	unsigned long size;
25262306a36Sopenharmony_ci
25362306a36Sopenharmony_ci	if (vmalloc_size_set)
25462306a36Sopenharmony_ci		return;
25562306a36Sopenharmony_ci	size = round_up(ident_map_size / 8, _SEGMENT_SIZE);
25662306a36Sopenharmony_ci	vmalloc_size = max(size, vmalloc_size);
25762306a36Sopenharmony_ci}
25862306a36Sopenharmony_ci
25962306a36Sopenharmony_cistatic void offset_vmlinux_info(unsigned long offset)
26062306a36Sopenharmony_ci{
26162306a36Sopenharmony_ci	*(unsigned long *)(&vmlinux.entry) += offset;
26262306a36Sopenharmony_ci	vmlinux.bootdata_off += offset;
26362306a36Sopenharmony_ci	vmlinux.bootdata_preserved_off += offset;
26462306a36Sopenharmony_ci	vmlinux.rela_dyn_start += offset;
26562306a36Sopenharmony_ci	vmlinux.rela_dyn_end += offset;
26662306a36Sopenharmony_ci	vmlinux.dynsym_start += offset;
26762306a36Sopenharmony_ci	vmlinux.init_mm_off += offset;
26862306a36Sopenharmony_ci	vmlinux.swapper_pg_dir_off += offset;
26962306a36Sopenharmony_ci	vmlinux.invalid_pg_dir_off += offset;
27062306a36Sopenharmony_ci#ifdef CONFIG_KASAN
27162306a36Sopenharmony_ci	vmlinux.kasan_early_shadow_page_off += offset;
27262306a36Sopenharmony_ci	vmlinux.kasan_early_shadow_pte_off += offset;
27362306a36Sopenharmony_ci	vmlinux.kasan_early_shadow_pmd_off += offset;
27462306a36Sopenharmony_ci	vmlinux.kasan_early_shadow_pud_off += offset;
27562306a36Sopenharmony_ci	vmlinux.kasan_early_shadow_p4d_off += offset;
27662306a36Sopenharmony_ci#endif
27762306a36Sopenharmony_ci}
27862306a36Sopenharmony_ci
27962306a36Sopenharmony_civoid startup_kernel(void)
28062306a36Sopenharmony_ci{
28162306a36Sopenharmony_ci	unsigned long max_physmem_end;
28262306a36Sopenharmony_ci	unsigned long vmlinux_lma = 0;
28362306a36Sopenharmony_ci	unsigned long amode31_lma = 0;
28462306a36Sopenharmony_ci	unsigned long asce_limit;
28562306a36Sopenharmony_ci	unsigned long safe_addr;
28662306a36Sopenharmony_ci	void *img;
28762306a36Sopenharmony_ci	psw_t psw;
28862306a36Sopenharmony_ci
28962306a36Sopenharmony_ci	setup_lpp();
29062306a36Sopenharmony_ci	safe_addr = mem_safe_offset();
29162306a36Sopenharmony_ci
29262306a36Sopenharmony_ci	/*
29362306a36Sopenharmony_ci	 * Reserve decompressor memory together with decompression heap, buffer and
29462306a36Sopenharmony_ci	 * memory which might be occupied by uncompressed kernel at default 1Mb
29562306a36Sopenharmony_ci	 * position (if KASLR is off or failed).
29662306a36Sopenharmony_ci	 */
29762306a36Sopenharmony_ci	physmem_reserve(RR_DECOMPRESSOR, 0, safe_addr);
29862306a36Sopenharmony_ci	if (IS_ENABLED(CONFIG_BLK_DEV_INITRD) && parmarea.initrd_size)
29962306a36Sopenharmony_ci		physmem_reserve(RR_INITRD, parmarea.initrd_start, parmarea.initrd_size);
30062306a36Sopenharmony_ci	oldmem_data.start = parmarea.oldmem_base;
30162306a36Sopenharmony_ci	oldmem_data.size = parmarea.oldmem_size;
30262306a36Sopenharmony_ci
30362306a36Sopenharmony_ci	store_ipl_parmblock();
30462306a36Sopenharmony_ci	read_ipl_report();
30562306a36Sopenharmony_ci	uv_query_info();
30662306a36Sopenharmony_ci	sclp_early_read_info();
30762306a36Sopenharmony_ci	setup_boot_command_line();
30862306a36Sopenharmony_ci	parse_boot_command_line();
30962306a36Sopenharmony_ci	detect_facilities();
31062306a36Sopenharmony_ci	sanitize_prot_virt_host();
31162306a36Sopenharmony_ci	max_physmem_end = detect_max_physmem_end();
31262306a36Sopenharmony_ci	setup_ident_map_size(max_physmem_end);
31362306a36Sopenharmony_ci	setup_vmalloc_size();
31462306a36Sopenharmony_ci	asce_limit = setup_kernel_memory_layout();
31562306a36Sopenharmony_ci	/* got final ident_map_size, physmem allocations could be performed now */
31662306a36Sopenharmony_ci	physmem_set_usable_limit(ident_map_size);
31762306a36Sopenharmony_ci	detect_physmem_online_ranges(max_physmem_end);
31862306a36Sopenharmony_ci	save_ipl_cert_comp_list();
31962306a36Sopenharmony_ci	rescue_initrd(safe_addr, ident_map_size);
32062306a36Sopenharmony_ci
32162306a36Sopenharmony_ci	if (kaslr_enabled()) {
32262306a36Sopenharmony_ci		vmlinux_lma = randomize_within_range(vmlinux.image_size + vmlinux.bss_size,
32362306a36Sopenharmony_ci						     THREAD_SIZE, vmlinux.default_lma,
32462306a36Sopenharmony_ci						     ident_map_size);
32562306a36Sopenharmony_ci		if (vmlinux_lma) {
32662306a36Sopenharmony_ci			__kaslr_offset = vmlinux_lma - vmlinux.default_lma;
32762306a36Sopenharmony_ci			offset_vmlinux_info(__kaslr_offset);
32862306a36Sopenharmony_ci		}
32962306a36Sopenharmony_ci	}
33062306a36Sopenharmony_ci	vmlinux_lma = vmlinux_lma ?: vmlinux.default_lma;
33162306a36Sopenharmony_ci	physmem_reserve(RR_VMLINUX, vmlinux_lma, vmlinux.image_size + vmlinux.bss_size);
33262306a36Sopenharmony_ci
33362306a36Sopenharmony_ci	if (!IS_ENABLED(CONFIG_KERNEL_UNCOMPRESSED)) {
33462306a36Sopenharmony_ci		img = decompress_kernel();
33562306a36Sopenharmony_ci		memmove((void *)vmlinux_lma, img, vmlinux.image_size);
33662306a36Sopenharmony_ci	} else if (__kaslr_offset) {
33762306a36Sopenharmony_ci		img = (void *)vmlinux.default_lma;
33862306a36Sopenharmony_ci		memmove((void *)vmlinux_lma, img, vmlinux.image_size);
33962306a36Sopenharmony_ci		memset(img, 0, vmlinux.image_size);
34062306a36Sopenharmony_ci	}
34162306a36Sopenharmony_ci
34262306a36Sopenharmony_ci	/* vmlinux decompression is done, shrink reserved low memory */
34362306a36Sopenharmony_ci	physmem_reserve(RR_DECOMPRESSOR, 0, (unsigned long)_decompressor_end);
34462306a36Sopenharmony_ci	if (kaslr_enabled())
34562306a36Sopenharmony_ci		amode31_lma = randomize_within_range(vmlinux.amode31_size, PAGE_SIZE, 0, SZ_2G);
34662306a36Sopenharmony_ci	amode31_lma = amode31_lma ?: vmlinux.default_lma - vmlinux.amode31_size;
34762306a36Sopenharmony_ci	physmem_reserve(RR_AMODE31, amode31_lma, vmlinux.amode31_size);
34862306a36Sopenharmony_ci
34962306a36Sopenharmony_ci	/*
35062306a36Sopenharmony_ci	 * The order of the following operations is important:
35162306a36Sopenharmony_ci	 *
35262306a36Sopenharmony_ci	 * - handle_relocs() must follow clear_bss_section() to establish static
35362306a36Sopenharmony_ci	 *   memory references to data in .bss to be used by setup_vmem()
35462306a36Sopenharmony_ci	 *   (i.e init_mm.pgd)
35562306a36Sopenharmony_ci	 *
35662306a36Sopenharmony_ci	 * - setup_vmem() must follow handle_relocs() to be able using
35762306a36Sopenharmony_ci	 *   static memory references to data in .bss (i.e init_mm.pgd)
35862306a36Sopenharmony_ci	 *
35962306a36Sopenharmony_ci	 * - copy_bootdata() must follow setup_vmem() to propagate changes to
36062306a36Sopenharmony_ci	 *   bootdata made by setup_vmem()
36162306a36Sopenharmony_ci	 */
36262306a36Sopenharmony_ci	clear_bss_section(vmlinux_lma);
36362306a36Sopenharmony_ci	handle_relocs(__kaslr_offset);
36462306a36Sopenharmony_ci	setup_vmem(asce_limit);
36562306a36Sopenharmony_ci	copy_bootdata();
36662306a36Sopenharmony_ci
36762306a36Sopenharmony_ci	/*
36862306a36Sopenharmony_ci	 * Save KASLR offset for early dumps, before vmcore_info is set.
36962306a36Sopenharmony_ci	 * Mark as uneven to distinguish from real vmcore_info pointer.
37062306a36Sopenharmony_ci	 */
37162306a36Sopenharmony_ci	S390_lowcore.vmcore_info = __kaslr_offset ? __kaslr_offset | 0x1UL : 0;
37262306a36Sopenharmony_ci
37362306a36Sopenharmony_ci	/*
37462306a36Sopenharmony_ci	 * Jump to the decompressed kernel entry point and switch DAT mode on.
37562306a36Sopenharmony_ci	 */
37662306a36Sopenharmony_ci	psw.addr = vmlinux.entry;
37762306a36Sopenharmony_ci	psw.mask = PSW_KERNEL_BITS;
37862306a36Sopenharmony_ci	__load_psw(psw);
37962306a36Sopenharmony_ci}
380