mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	delete_fdt_mem_rsv() defined in "arch/powerpc/kexec/file_load.c" has been renamed to fdt_find_and_del_mem_rsv(), and moved to "drivers/of/kexec.c". Remove delete_fdt_mem_rsv() in "arch/powerpc/kexec/file_load.c". Co-developed-by: Prakhar Srivastava <prsriva@linux.microsoft.com> Signed-off-by: Prakhar Srivastava <prsriva@linux.microsoft.com> Signed-off-by: Lakshmi Ramasubramanian <nramas@linux.microsoft.com> Reviewed-by: Thiago Jung Bauermann <bauerman@linux.ibm.com> Signed-off-by: Rob Herring <robh@kernel.org> Link: https://lore.kernel.org/r/20210221174930.27324-13-nramas@linux.microsoft.com
		
			
				
	
	
		
			109 lines
		
	
	
	
		
			3.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			109 lines
		
	
	
	
		
			3.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0-only
 | 
						|
/*
 | 
						|
 * powerpc code to implement the kexec_file_load syscall
 | 
						|
 *
 | 
						|
 * Copyright (C) 2004  Adam Litke (agl@us.ibm.com)
 | 
						|
 * Copyright (C) 2004  IBM Corp.
 | 
						|
 * Copyright (C) 2004,2005  Milton D Miller II, IBM Corporation
 | 
						|
 * Copyright (C) 2005  R Sharada (sharada@in.ibm.com)
 | 
						|
 * Copyright (C) 2006  Mohan Kumar M (mohan@in.ibm.com)
 | 
						|
 * Copyright (C) 2016  IBM Corporation
 | 
						|
 *
 | 
						|
 * Based on kexec-tools' kexec-elf-ppc64.c, fs2dt.c.
 | 
						|
 * Heavily modified for the kernel by
 | 
						|
 * Thiago Jung Bauermann <bauerman@linux.vnet.ibm.com>.
 | 
						|
 */
 | 
						|
 | 
						|
#include <linux/slab.h>
 | 
						|
#include <linux/kexec.h>
 | 
						|
#include <linux/of_fdt.h>
 | 
						|
#include <linux/libfdt.h>
 | 
						|
#include <asm/setup.h>
 | 
						|
 | 
						|
#define SLAVE_CODE_SIZE		256	/* First 0x100 bytes */
 | 
						|
 | 
						|
/**
 | 
						|
 * setup_kdump_cmdline - Prepend "elfcorehdr=<addr> " to command line
 | 
						|
 *                       of kdump kernel for exporting the core.
 | 
						|
 * @image:               Kexec image
 | 
						|
 * @cmdline:             Command line parameters to update.
 | 
						|
 * @cmdline_len:         Length of the cmdline parameters.
 | 
						|
 *
 | 
						|
 * kdump segment must be setup before calling this function.
 | 
						|
 *
 | 
						|
 * Returns new cmdline buffer for kdump kernel on success, NULL otherwise.
 | 
						|
 */
 | 
						|
char *setup_kdump_cmdline(struct kimage *image, char *cmdline,
 | 
						|
			  unsigned long cmdline_len)
 | 
						|
{
 | 
						|
	int elfcorehdr_strlen;
 | 
						|
	char *cmdline_ptr;
 | 
						|
 | 
						|
	cmdline_ptr = kzalloc(COMMAND_LINE_SIZE, GFP_KERNEL);
 | 
						|
	if (!cmdline_ptr)
 | 
						|
		return NULL;
 | 
						|
 | 
						|
	elfcorehdr_strlen = sprintf(cmdline_ptr, "elfcorehdr=0x%lx ",
 | 
						|
				    image->elf_load_addr);
 | 
						|
 | 
						|
	if (elfcorehdr_strlen + cmdline_len > COMMAND_LINE_SIZE) {
 | 
						|
		pr_err("Appending elfcorehdr=<addr> exceeds cmdline size\n");
 | 
						|
		kfree(cmdline_ptr);
 | 
						|
		return NULL;
 | 
						|
	}
 | 
						|
 | 
						|
	memcpy(cmdline_ptr + elfcorehdr_strlen, cmdline, cmdline_len);
 | 
						|
	// Ensure it's nul terminated
 | 
						|
	cmdline_ptr[COMMAND_LINE_SIZE - 1] = '\0';
 | 
						|
	return cmdline_ptr;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * setup_purgatory - initialize the purgatory's global variables
 | 
						|
 * @image:		kexec image.
 | 
						|
 * @slave_code:		Slave code for the purgatory.
 | 
						|
 * @fdt:		Flattened device tree for the next kernel.
 | 
						|
 * @kernel_load_addr:	Address where the kernel is loaded.
 | 
						|
 * @fdt_load_addr:	Address where the flattened device tree is loaded.
 | 
						|
 *
 | 
						|
 * Return: 0 on success, or negative errno on error.
 | 
						|
 */
 | 
						|
int setup_purgatory(struct kimage *image, const void *slave_code,
 | 
						|
		    const void *fdt, unsigned long kernel_load_addr,
 | 
						|
		    unsigned long fdt_load_addr)
 | 
						|
{
 | 
						|
	unsigned int *slave_code_buf, master_entry;
 | 
						|
	int ret;
 | 
						|
 | 
						|
	slave_code_buf = kmalloc(SLAVE_CODE_SIZE, GFP_KERNEL);
 | 
						|
	if (!slave_code_buf)
 | 
						|
		return -ENOMEM;
 | 
						|
 | 
						|
	/* Get the slave code from the new kernel and put it in purgatory. */
 | 
						|
	ret = kexec_purgatory_get_set_symbol(image, "purgatory_start",
 | 
						|
					     slave_code_buf, SLAVE_CODE_SIZE,
 | 
						|
					     true);
 | 
						|
	if (ret) {
 | 
						|
		kfree(slave_code_buf);
 | 
						|
		return ret;
 | 
						|
	}
 | 
						|
 | 
						|
	master_entry = slave_code_buf[0];
 | 
						|
	memcpy(slave_code_buf, slave_code, SLAVE_CODE_SIZE);
 | 
						|
	slave_code_buf[0] = master_entry;
 | 
						|
	ret = kexec_purgatory_get_set_symbol(image, "purgatory_start",
 | 
						|
					     slave_code_buf, SLAVE_CODE_SIZE,
 | 
						|
					     false);
 | 
						|
	kfree(slave_code_buf);
 | 
						|
 | 
						|
	ret = kexec_purgatory_get_set_symbol(image, "kernel", &kernel_load_addr,
 | 
						|
					     sizeof(kernel_load_addr), false);
 | 
						|
	if (ret)
 | 
						|
		return ret;
 | 
						|
	ret = kexec_purgatory_get_set_symbol(image, "dt_offset", &fdt_load_addr,
 | 
						|
					     sizeof(fdt_load_addr), false);
 | 
						|
	if (ret)
 | 
						|
		return ret;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 |