Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 | // SPDX-License-Identifier: GPL-2.0-only /* * powerpc code to implement the kexec_file_load syscall * * Copyright (C) 2004 Adam Litke (agl@us.ibm.com) * Copyright (C) 2004 IBM Corp. * Copyright (C) 2004,2005 Milton D Miller II, IBM Corporation * Copyright (C) 2005 R Sharada (sharada@in.ibm.com) * Copyright (C) 2006 Mohan Kumar M (mohan@in.ibm.com) * Copyright (C) 2016 IBM Corporation * * Based on kexec-tools' kexec-elf-ppc64.c, fs2dt.c. * Heavily modified for the kernel by * Thiago Jung Bauermann <bauerman@linux.vnet.ibm.com>. */ #include <linux/slab.h> #include <linux/kexec.h> #include <linux/of_fdt.h> #include <linux/libfdt.h> #include <asm/setup.h> #define SLAVE_CODE_SIZE 256 /* First 0x100 bytes */ /** * setup_kdump_cmdline - Prepend "elfcorehdr=<addr> " to command line * of kdump kernel for exporting the core. * @image: Kexec image * @cmdline: Command line parameters to update. * @cmdline_len: Length of the cmdline parameters. * * kdump segment must be setup before calling this function. * * Returns new cmdline buffer for kdump kernel on success, NULL otherwise. */ char *setup_kdump_cmdline(struct kimage *image, char *cmdline, unsigned long cmdline_len) { int elfcorehdr_strlen; char *cmdline_ptr; cmdline_ptr = kzalloc(COMMAND_LINE_SIZE, GFP_KERNEL); if (!cmdline_ptr) return NULL; elfcorehdr_strlen = sprintf(cmdline_ptr, "elfcorehdr=0x%lx ", image->elf_load_addr); if (elfcorehdr_strlen + cmdline_len > COMMAND_LINE_SIZE) { pr_err("Appending elfcorehdr=<addr> exceeds cmdline size\n"); kfree(cmdline_ptr); return NULL; } memcpy(cmdline_ptr + elfcorehdr_strlen, cmdline, cmdline_len); // Ensure it's nul terminated cmdline_ptr[COMMAND_LINE_SIZE - 1] = '\0'; return cmdline_ptr; } /** * setup_purgatory - initialize the purgatory's global variables * @image: kexec image. * @slave_code: Slave code for the purgatory. * @fdt: Flattened device tree for the next kernel. * @kernel_load_addr: Address where the kernel is loaded. * @fdt_load_addr: Address where the flattened device tree is loaded. * * Return: 0 on success, or negative errno on error. */ int setup_purgatory(struct kimage *image, const void *slave_code, const void *fdt, unsigned long kernel_load_addr, unsigned long fdt_load_addr) { unsigned int *slave_code_buf, master_entry; int ret; slave_code_buf = kmalloc(SLAVE_CODE_SIZE, GFP_KERNEL); if (!slave_code_buf) return -ENOMEM; /* Get the slave code from the new kernel and put it in purgatory. */ ret = kexec_purgatory_get_set_symbol(image, "purgatory_start", slave_code_buf, SLAVE_CODE_SIZE, true); if (ret) { kfree(slave_code_buf); return ret; } master_entry = slave_code_buf[0]; memcpy(slave_code_buf, slave_code, SLAVE_CODE_SIZE); slave_code_buf[0] = master_entry; ret = kexec_purgatory_get_set_symbol(image, "purgatory_start", slave_code_buf, SLAVE_CODE_SIZE, false); kfree(slave_code_buf); ret = kexec_purgatory_get_set_symbol(image, "kernel", &kernel_load_addr, sizeof(kernel_load_addr), false); if (ret) return ret; ret = kexec_purgatory_get_set_symbol(image, "dt_offset", &fdt_load_addr, sizeof(fdt_load_addr), false); if (ret) return ret; return 0; } |