/* * machine_kexec.c for kexec * Created by on Thu Oct 12 15:15:06 2006 * * This source code is licensed under the GNU General Public License, * Version 2. See the file COPYING for more details. */ #include #include #include #include #include #include #include #include #include "machine_kexec.h" int (*_machine_kexec_prepare)(struct kimage *) = NULL; void (*_machine_kexec_shutdown)(void) = NULL; void (*_machine_crash_shutdown)(struct pt_regs *regs) = NULL; #ifdef CONFIG_SMP void (*relocated_kexec_smp_wait) (void *); atomic_t kexec_ready_to_reboot = ATOMIC_INIT(0); void (*_crash_smp_send_stop)(void) = NULL; #endif static void machine_kexec_print_args(void) { unsigned long argc = (int)kexec_args[0]; int i; pr_info("kexec_args[0] (argc): %lu\n", argc); pr_info("kexec_args[1] (argv): %p\n", (void *)kexec_args[1]); pr_info("kexec_args[2] (env ): %p\n", (void *)kexec_args[2]); pr_info("kexec_args[3] (desc): %p\n", (void *)kexec_args[3]); for (i = 0; i < argc; i++) { pr_info("kexec_argv[%d] = %p, %s\n", i, kexec_argv[i], kexec_argv[i]); } } static void machine_kexec_init_argv(struct kimage *image) { void __user *buf = NULL; size_t bufsz; size_t size; int i; bufsz = 0; for (i = 0; i < image->nr_segments; i++) { struct kexec_segment *seg; seg = &image->segment[i]; if (seg->bufsz < 6) continue; if (strncmp((char *)seg->buf, "kexec ", 6)) continue; buf = seg->buf; bufsz = seg->bufsz; break; } if (!buf) return; size = KEXEC_COMMAND_LINE_SIZE; size = min(size, bufsz); if (size < bufsz) pr_warn("kexec command line truncated to %zd bytes\n", size); /* Copy to kernel space */ copy_from_user(kexec_argv_buf, buf, size); kexec_argv_buf[size - 1] = 0; } static void machine_kexec_parse_argv(struct kimage *image) { char *reboot_code_buffer; int reloc_delta; char *ptr; int argc; int i; ptr = kexec_argv_buf; argc = 0; /* * convert command line string to array of parameters * (as bootloader does). */ while (ptr && *ptr && (KEXEC_MAX_ARGC > argc)) { if (*ptr == ' ') { *ptr++ = '\0'; continue; } kexec_argv[argc++] = ptr; ptr = strchr(ptr, ' '); } if (!argc) return; kexec_args[0] = argc; kexec_args[1] = (unsigned long)kexec_argv; kexec_args[2] = 0; kexec_args[3] = 0; reboot_code_buffer = page_address(image->control_code_page); reloc_delta = reboot_code_buffer - (char *)kexec_relocate_new_kernel; kexec_args[1] += reloc_delta; for (i = 0; i < argc; i++) kexec_argv[i] += reloc_delta; } int machine_kexec_prepare(struct kimage *kimage) { /* * Whenever arguments passed from kexec-tools, Init the arguments as * the original ones to try avoiding booting failure. */ kexec_args[0] = fw_arg0; kexec_args[1] = fw_arg1; kexec_args[2] = fw_arg2; kexec_args[3] = fw_arg3; machine_kexec_init_argv(kimage); machine_kexec_parse_argv(kimage); if (_machine_kexec_prepare) return _machine_kexec_prepare(kimage); return 0; } void machine_kexec_cleanup(struct kimage *kimage) { } void machine_shutdown(void) { if (_machine_kexec_shutdown) _machine_kexec_shutdown(); } void machine_crash_shutdown(struct pt_regs *regs) { if (_machine_crash_shutdown) _machine_crash_shutdown(regs); else default_machine_crash_shutdown(regs); } typedef void (*noretfun_t)(void) __noreturn; void machine_kexec(struct kimage *image) { unsigned long reboot_code_buffer; unsigned long entry; unsigned long *ptr; reboot_code_buffer = (unsigned long)page_address(image->control_code_page); pr_info("reboot_code_buffer = %p\n", (void *)reboot_code_buffer); kexec_start_address = (unsigned long) phys_to_virt(image->start); pr_info("kexec_start_address = %p\n", (void *)kexec_start_address); if (image->type == KEXEC_TYPE_DEFAULT) { kexec_indirection_page = (unsigned long) phys_to_virt(image->head & PAGE_MASK); } else { kexec_indirection_page = (unsigned long)&image->head; } pr_info("kexec_indirection_page = %p\n", (void *)kexec_indirection_page); pr_info("Where is memcpy: %p\n", memcpy); pr_info("kexec_relocate_new_kernel = %p, kexec_relocate_new_kernel_end = %p\n", (void *)kexec_relocate_new_kernel, &kexec_relocate_new_kernel_end); pr_info("Copy %lu bytes from %p to %p\n", KEXEC_RELOCATE_NEW_KERNEL_SIZE, (void *)kexec_relocate_new_kernel, (void *)reboot_code_buffer); memcpy((void *)reboot_code_buffer, kexec_relocate_new_kernel, KEXEC_RELOCATE_NEW_KERNEL_SIZE); pr_info("Before _print_args().\n"); machine_kexec_print_args(); pr_info("Before eval loop.\n"); /* * The generic kexec code builds a page list with physical * addresses. they are directly accessible through KSEG0 (or * CKSEG0 or XPHYS if on 64bit system), hence the * phys_to_virt() call. */ for (ptr = &image->head; (entry = *ptr) && !(entry &IND_DONE); ptr = (entry & IND_INDIRECTION) ? phys_to_virt(entry & PAGE_MASK) : ptr + 1) { if (*ptr & IND_SOURCE || *ptr & IND_INDIRECTION || *ptr & IND_DESTINATION) *ptr = (unsigned long) phys_to_virt(*ptr); } /* Mark offline BEFORE disabling local irq. */ set_cpu_online(smp_processor_id(), false); /* * we do not want to be bothered. */ pr_info("Before irq_disable.\n"); local_irq_disable(); pr_info("Will call new kernel at %08lx\n", image->start); pr_info("Bye ...\n"); __flush_cache_all(); #ifdef CONFIG_SMP /* All secondary cpus now may jump to kexec_wait cycle */ relocated_kexec_smp_wait = reboot_code_buffer + (void *)(kexec_smp_wait - kexec_relocate_new_kernel); smp_wmb(); atomic_set(&kexec_ready_to_reboot, 1); #endif ((noretfun_t) reboot_code_buffer)(); }