| // SPDX-License-Identifier: GPL-2.0-only |
| /* |
| * powerpc code to implement the kexec_file_load syscall |
| * |
| * Copyright (C) 2004 Adam Litke (agl@us.ibm.com) |
| * Copyright (C) 2004 IBM Corp. |
| * Copyright (C) 2004,2005 Milton D Miller II, IBM Corporation |
| * Copyright (C) 2005 R Sharada (sharada@in.ibm.com) |
| * Copyright (C) 2006 Mohan Kumar M (mohan@in.ibm.com) |
| * Copyright (C) 2016 IBM Corporation |
| * |
| * Based on kexec-tools' kexec-elf-ppc64.c, fs2dt.c. |
| * Heavily modified for the kernel by |
| * Thiago Jung Bauermann <bauerman@linux.vnet.ibm.com>. |
| */ |
| |
| #include <linux/slab.h> |
| #include <linux/kexec.h> |
| #include <linux/of_fdt.h> |
| #include <linux/libfdt.h> |
| #include <asm/setup.h> |
| |
| #define SLAVE_CODE_SIZE 256 /* First 0x100 bytes */ |
| |
| /** |
| * setup_kdump_cmdline - Prepend "elfcorehdr=<addr> " to command line |
| * of kdump kernel for exporting the core. |
| * @image: Kexec image |
| * @cmdline: Command line parameters to update. |
| * @cmdline_len: Length of the cmdline parameters. |
| * |
| * kdump segment must be setup before calling this function. |
| * |
| * Returns new cmdline buffer for kdump kernel on success, NULL otherwise. |
| */ |
| char *setup_kdump_cmdline(struct kimage *image, char *cmdline, |
| unsigned long cmdline_len) |
| { |
| int elfcorehdr_strlen; |
| char *cmdline_ptr; |
| |
| cmdline_ptr = kzalloc(COMMAND_LINE_SIZE, GFP_KERNEL); |
| if (!cmdline_ptr) |
| return NULL; |
| |
| elfcorehdr_strlen = sprintf(cmdline_ptr, "elfcorehdr=0x%lx ", |
| image->elf_load_addr); |
| |
| if (elfcorehdr_strlen + cmdline_len > COMMAND_LINE_SIZE) { |
| pr_err("Appending elfcorehdr=<addr> exceeds cmdline size\n"); |
| kfree(cmdline_ptr); |
| return NULL; |
| } |
| |
| memcpy(cmdline_ptr + elfcorehdr_strlen, cmdline, cmdline_len); |
| // Ensure it's nul terminated |
| cmdline_ptr[COMMAND_LINE_SIZE - 1] = '\0'; |
| return cmdline_ptr; |
| } |
| |
| /** |
| * setup_purgatory - initialize the purgatory's global variables |
| * @image: kexec image. |
| * @slave_code: Slave code for the purgatory. |
| * @fdt: Flattened device tree for the next kernel. |
| * @kernel_load_addr: Address where the kernel is loaded. |
| * @fdt_load_addr: Address where the flattened device tree is loaded. |
| * |
| * Return: 0 on success, or negative errno on error. |
| */ |
| int setup_purgatory(struct kimage *image, const void *slave_code, |
| const void *fdt, unsigned long kernel_load_addr, |
| unsigned long fdt_load_addr) |
| { |
| unsigned int *slave_code_buf, master_entry; |
| int ret; |
| |
| slave_code_buf = kmalloc(SLAVE_CODE_SIZE, GFP_KERNEL); |
| if (!slave_code_buf) |
| return -ENOMEM; |
| |
| /* Get the slave code from the new kernel and put it in purgatory. */ |
| ret = kexec_purgatory_get_set_symbol(image, "purgatory_start", |
| slave_code_buf, SLAVE_CODE_SIZE, |
| true); |
| if (ret) { |
| kfree(slave_code_buf); |
| return ret; |
| } |
| |
| master_entry = slave_code_buf[0]; |
| memcpy(slave_code_buf, slave_code, SLAVE_CODE_SIZE); |
| slave_code_buf[0] = master_entry; |
| ret = kexec_purgatory_get_set_symbol(image, "purgatory_start", |
| slave_code_buf, SLAVE_CODE_SIZE, |
| false); |
| kfree(slave_code_buf); |
| |
| ret = kexec_purgatory_get_set_symbol(image, "kernel", &kernel_load_addr, |
| sizeof(kernel_load_addr), false); |
| if (ret) |
| return ret; |
| ret = kexec_purgatory_get_set_symbol(image, "dt_offset", &fdt_load_addr, |
| sizeof(fdt_load_addr), false); |
| if (ret) |
| return ret; |
| |
| return 0; |
| } |