1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17#include <linux/slab.h>
18#include <linux/kexec.h>
19#include <linux/of_fdt.h>
20#include <linux/libfdt.h>
21#include <asm/setup.h>
22
23#define SLAVE_CODE_SIZE 256
24
25
26
27
28
29
30
31
32
33
34
35
36char *setup_kdump_cmdline(struct kimage *image, char *cmdline,
37 unsigned long cmdline_len)
38{
39 int elfcorehdr_strlen;
40 char *cmdline_ptr;
41
42 cmdline_ptr = kzalloc(COMMAND_LINE_SIZE, GFP_KERNEL);
43 if (!cmdline_ptr)
44 return NULL;
45
46 elfcorehdr_strlen = sprintf(cmdline_ptr, "elfcorehdr=0x%lx ",
47 image->elf_load_addr);
48
49 if (elfcorehdr_strlen + cmdline_len > COMMAND_LINE_SIZE) {
50 pr_err("Appending elfcorehdr=<addr> exceeds cmdline size\n");
51 kfree(cmdline_ptr);
52 return NULL;
53 }
54
55 memcpy(cmdline_ptr + elfcorehdr_strlen, cmdline, cmdline_len);
56
57 cmdline_ptr[COMMAND_LINE_SIZE - 1] = '\0';
58 return cmdline_ptr;
59}
60
61
62
63
64
65
66
67
68
69
70
71int setup_purgatory(struct kimage *image, const void *slave_code,
72 const void *fdt, unsigned long kernel_load_addr,
73 unsigned long fdt_load_addr)
74{
75 unsigned int *slave_code_buf, master_entry;
76 int ret;
77
78 slave_code_buf = kmalloc(SLAVE_CODE_SIZE, GFP_KERNEL);
79 if (!slave_code_buf)
80 return -ENOMEM;
81
82
83 ret = kexec_purgatory_get_set_symbol(image, "purgatory_start",
84 slave_code_buf, SLAVE_CODE_SIZE,
85 true);
86 if (ret) {
87 kfree(slave_code_buf);
88 return ret;
89 }
90
91 master_entry = slave_code_buf[0];
92 memcpy(slave_code_buf, slave_code, SLAVE_CODE_SIZE);
93 slave_code_buf[0] = master_entry;
94 ret = kexec_purgatory_get_set_symbol(image, "purgatory_start",
95 slave_code_buf, SLAVE_CODE_SIZE,
96 false);
97 kfree(slave_code_buf);
98
99 ret = kexec_purgatory_get_set_symbol(image, "kernel", &kernel_load_addr,
100 sizeof(kernel_load_addr), false);
101 if (ret)
102 return ret;
103 ret = kexec_purgatory_get_set_symbol(image, "dt_offset", &fdt_load_addr,
104 sizeof(fdt_load_addr), false);
105 if (ret)
106 return ret;
107
108 return 0;
109}
110