110 строки
3.3 KiB
C
110 строки
3.3 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* powerpc code to implement the kexec_file_load syscall
|
|
*
|
|
* Copyright (C) 2004 Adam Litke (agl@us.ibm.com)
|
|
* Copyright (C) 2004 IBM Corp.
|
|
* Copyright (C) 2004,2005 Milton D Miller II, IBM Corporation
|
|
* Copyright (C) 2005 R Sharada (sharada@in.ibm.com)
|
|
* Copyright (C) 2006 Mohan Kumar M (mohan@in.ibm.com)
|
|
* Copyright (C) 2016 IBM Corporation
|
|
*
|
|
* Based on kexec-tools' kexec-elf-ppc64.c, fs2dt.c.
|
|
* Heavily modified for the kernel by
|
|
* Thiago Jung Bauermann <bauerman@linux.vnet.ibm.com>.
|
|
*/
|
|
|
|
#include <linux/slab.h>
|
|
#include <linux/kexec.h>
|
|
#include <linux/of_fdt.h>
|
|
#include <linux/libfdt.h>
|
|
#include <asm/setup.h>
|
|
|
|
#define SLAVE_CODE_SIZE 256 /* First 0x100 bytes */
|
|
|
|
/**
|
|
* setup_kdump_cmdline - Prepend "elfcorehdr=<addr> " to command line
|
|
* of kdump kernel for exporting the core.
|
|
* @image: Kexec image
|
|
* @cmdline: Command line parameters to update.
|
|
* @cmdline_len: Length of the cmdline parameters.
|
|
*
|
|
* kdump segment must be setup before calling this function.
|
|
*
|
|
* Returns new cmdline buffer for kdump kernel on success, NULL otherwise.
|
|
*/
|
|
char *setup_kdump_cmdline(struct kimage *image, char *cmdline,
|
|
unsigned long cmdline_len)
|
|
{
|
|
int elfcorehdr_strlen;
|
|
char *cmdline_ptr;
|
|
|
|
cmdline_ptr = kzalloc(COMMAND_LINE_SIZE, GFP_KERNEL);
|
|
if (!cmdline_ptr)
|
|
return NULL;
|
|
|
|
elfcorehdr_strlen = sprintf(cmdline_ptr, "elfcorehdr=0x%lx ",
|
|
image->elf_load_addr);
|
|
|
|
if (elfcorehdr_strlen + cmdline_len > COMMAND_LINE_SIZE) {
|
|
pr_err("Appending elfcorehdr=<addr> exceeds cmdline size\n");
|
|
kfree(cmdline_ptr);
|
|
return NULL;
|
|
}
|
|
|
|
memcpy(cmdline_ptr + elfcorehdr_strlen, cmdline, cmdline_len);
|
|
// Ensure it's nul terminated
|
|
cmdline_ptr[COMMAND_LINE_SIZE - 1] = '\0';
|
|
return cmdline_ptr;
|
|
}
|
|
|
|
/**
|
|
* setup_purgatory - initialize the purgatory's global variables
|
|
* @image: kexec image.
|
|
* @slave_code: Slave code for the purgatory.
|
|
* @fdt: Flattened device tree for the next kernel.
|
|
* @kernel_load_addr: Address where the kernel is loaded.
|
|
* @fdt_load_addr: Address where the flattened device tree is loaded.
|
|
*
|
|
* Return: 0 on success, or negative errno on error.
|
|
*/
|
|
int setup_purgatory(struct kimage *image, const void *slave_code,
|
|
const void *fdt, unsigned long kernel_load_addr,
|
|
unsigned long fdt_load_addr)
|
|
{
|
|
unsigned int *slave_code_buf, master_entry;
|
|
int ret;
|
|
|
|
slave_code_buf = kmalloc(SLAVE_CODE_SIZE, GFP_KERNEL);
|
|
if (!slave_code_buf)
|
|
return -ENOMEM;
|
|
|
|
/* Get the slave code from the new kernel and put it in purgatory. */
|
|
ret = kexec_purgatory_get_set_symbol(image, "purgatory_start",
|
|
slave_code_buf, SLAVE_CODE_SIZE,
|
|
true);
|
|
if (ret) {
|
|
kfree(slave_code_buf);
|
|
return ret;
|
|
}
|
|
|
|
master_entry = slave_code_buf[0];
|
|
memcpy(slave_code_buf, slave_code, SLAVE_CODE_SIZE);
|
|
slave_code_buf[0] = master_entry;
|
|
ret = kexec_purgatory_get_set_symbol(image, "purgatory_start",
|
|
slave_code_buf, SLAVE_CODE_SIZE,
|
|
false);
|
|
kfree(slave_code_buf);
|
|
|
|
ret = kexec_purgatory_get_set_symbol(image, "kernel", &kernel_load_addr,
|
|
sizeof(kernel_load_addr), false);
|
|
if (ret)
|
|
return ret;
|
|
ret = kexec_purgatory_get_set_symbol(image, "dt_offset", &fdt_load_addr,
|
|
sizeof(fdt_load_addr), false);
|
|
if (ret)
|
|
return ret;
|
|
|
|
return 0;
|
|
}
|