summaryrefslogtreecommitdiff
path: root/arch/loongarch/kernel/kexec_efi.c
blob: 45121b914f8f7987dc93f62bfb2b537804257336 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
// SPDX-License-Identifier: GPL-2.0
/*
 * Load EFI vmlinux file for the kexec_file_load syscall.
 *
 * Author: Youling Tang <tangyouling@kylinos.cn>
 * Copyright (C) 2025 KylinSoft Corporation.
 */

#define pr_fmt(fmt)	"kexec_file(EFI): " fmt

#include <linux/err.h>
#include <linux/errno.h>
#include <linux/kernel.h>
#include <linux/kexec.h>
#include <linux/pe.h>
#include <linux/string.h>
#include <asm/byteorder.h>
#include <asm/cpufeature.h>
#include <asm/image.h>

static int efi_kexec_probe(const char *kernel_buf, unsigned long kernel_len)
{
	const struct loongarch_image_header *h = (const struct loongarch_image_header *)kernel_buf;

	if (!h || (kernel_len < sizeof(*h))) {
		kexec_dprintk("No LoongArch image header.\n");
		return -EINVAL;
	}

	if (!loongarch_header_check_dos_sig(h)) {
		kexec_dprintk("No LoongArch PE image header.\n");
		return -EINVAL;
	}

	return 0;
}

static void *efi_kexec_load(struct kimage *image,
				char *kernel, unsigned long kernel_len,
				char *initrd, unsigned long initrd_len,
				char *cmdline, unsigned long cmdline_len)
{
	int ret;
	unsigned long text_offset, kernel_segment_number;
	struct kexec_buf kbuf;
	struct kexec_segment *kernel_segment;
	struct loongarch_image_header *h;

	h = (struct loongarch_image_header *)kernel;
	if (!h->kernel_asize)
		return ERR_PTR(-EINVAL);

	/*
	 * Load the kernel
	 * FIXME: Non-relocatable kernel rejected for kexec_file (require CONFIG_RELOCATABLE)
	 */
	kbuf.image = image;
	kbuf.buf_max = ULONG_MAX;
	kbuf.top_down = false;

	kbuf.buffer = kernel;
	kbuf.bufsz = kernel_len;
	kbuf.mem = KEXEC_BUF_MEM_UNKNOWN;
	kbuf.memsz = le64_to_cpu(h->kernel_asize);
	text_offset = le64_to_cpu(h->text_offset);
	kbuf.buf_min = text_offset;
	kbuf.buf_align = SZ_2M;

	kernel_segment_number = image->nr_segments;

	/*
	 * The location of the kernel segment may make it impossible to
	 * satisfy the other segment requirements, so we try repeatedly
	 * to find a location that will work.
	 */
	while ((ret = kexec_add_buffer(&kbuf)) == 0) {
		/* Try to load additional data */
		kernel_segment = &image->segment[kernel_segment_number];
		ret = load_other_segments(image, kernel_segment->mem,
					  kernel_segment->memsz, initrd,
					  initrd_len, cmdline, cmdline_len);
		if (!ret)
			break;

		/*
		 * We couldn't find space for the other segments; erase the
		 * kernel segment and try the next available hole.
		 */
		image->nr_segments -= 1;
		kbuf.buf_min = kernel_segment->mem + kernel_segment->memsz;
		kbuf.mem = KEXEC_BUF_MEM_UNKNOWN;
	}

	if (ret < 0) {
		pr_err("Could not find any suitable kernel location!");
		return ERR_PTR(ret);
	}

	kernel_segment = &image->segment[kernel_segment_number];

	/* Make sure the second kernel jumps to the correct "kernel_entry" */
	image->start = kernel_segment->mem + h->kernel_entry - text_offset;

	kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
		      kernel_segment->mem, kbuf.bufsz, kernel_segment->memsz);

	return NULL;
}

const struct kexec_file_ops kexec_efi_ops = {
	.probe = efi_kexec_probe,
	.load = efi_kexec_load,
};