Blame view
kernel/kexec.c
7.8 KB
dc009d924 [PATCH] kexec: ad... |
1 |
/* |
2965faa5e kexec: split kexe... |
2 |
* kexec.c - kexec_load system call |
dc009d924 [PATCH] kexec: ad... |
3 4 5 6 7 |
* Copyright (C) 2002-2004 Eric Biederman <ebiederm@xmission.com> * * This source code is licensed under the GNU General Public License, * Version 2. See the file COPYING for more details. */ |
de90a6bca kexec: use file n... |
8 |
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
c59ede7b7 [PATCH] move capa... |
9 |
#include <linux/capability.h> |
dc009d924 [PATCH] kexec: ad... |
10 11 |
#include <linux/mm.h> #include <linux/file.h> |
a210fd32a kexec: add call t... |
12 |
#include <linux/security.h> |
dc009d924 [PATCH] kexec: ad... |
13 |
#include <linux/kexec.h> |
8c5a1cf0a kexec: use a mute... |
14 |
#include <linux/mutex.h> |
dc009d924 [PATCH] kexec: ad... |
15 |
#include <linux/list.h> |
dc009d924 [PATCH] kexec: ad... |
16 |
#include <linux/syscalls.h> |
a43cac0d9 kexec: split kexe... |
17 |
#include <linux/vmalloc.h> |
2965faa5e kexec: split kexe... |
18 |
#include <linux/slab.h> |
dc009d924 [PATCH] kexec: ad... |
19 |
|
a43cac0d9 kexec: split kexe... |
20 |
#include "kexec_internal.h" |
dabe78628 kexec: move segme... |
21 22 23 |
static int copy_user_segment_list(struct kimage *image, unsigned long nr_segments, struct kexec_segment __user *segments) |
dc009d924 [PATCH] kexec: ad... |
24 |
{ |
dabe78628 kexec: move segme... |
25 |
int ret; |
dc009d924 [PATCH] kexec: ad... |
26 |
size_t segment_bytes; |
dc009d924 [PATCH] kexec: ad... |
27 28 29 30 |
/* Read in the segments */ image->nr_segments = nr_segments; segment_bytes = nr_segments * sizeof(*segments); |
dabe78628 kexec: move segme... |
31 32 33 34 35 36 |
ret = copy_from_user(image->segment, segments, segment_bytes); if (ret) ret = -EFAULT; return ret; } |
255aedd90 kexec: use common... |
37 38 39 40 |
static int kimage_alloc_init(struct kimage **rimage, unsigned long entry, unsigned long nr_segments, struct kexec_segment __user *segments, unsigned long flags) |
dc009d924 [PATCH] kexec: ad... |
41 |
{ |
255aedd90 kexec: use common... |
42 |
int ret; |
dc009d924 [PATCH] kexec: ad... |
43 |
struct kimage *image; |
255aedd90 kexec: use common... |
44 45 46 47 |
bool kexec_on_panic = flags & KEXEC_ON_CRASH; if (kexec_on_panic) { /* Verify we have a valid entry point */ |
43546d866 kexec: allow arch... |
48 49 |
if ((entry < phys_to_boot_phys(crashk_res.start)) || (entry > phys_to_boot_phys(crashk_res.end))) |
255aedd90 kexec: use common... |
50 51 |
return -EADDRNOTAVAIL; } |
dc009d924 [PATCH] kexec: ad... |
52 53 |
/* Allocate and initialize a controlling structure */ |
dabe78628 kexec: move segme... |
54 55 56 57 58 |
image = do_kimage_alloc_init(); if (!image) return -ENOMEM; image->start = entry; |
255aedd90 kexec: use common... |
59 60 |
ret = copy_user_segment_list(image, nr_segments, segments); if (ret) |
dabe78628 kexec: move segme... |
61 |
goto out_free_image; |
255aedd90 kexec: use common... |
62 |
if (kexec_on_panic) { |
cdf4b3fa0 kexec: set KEXEC_... |
63 |
/* Enable special crash kernel control page alloc policy. */ |
255aedd90 kexec: use common... |
64 65 66 |
image->control_page = crashk_res.start; image->type = KEXEC_TYPE_CRASH; } |
cdf4b3fa0 kexec: set KEXEC_... |
67 68 69 |
ret = sanity_check_segment_list(image); if (ret) goto out_free_image; |
dc009d924 [PATCH] kexec: ad... |
70 71 72 73 74 |
/* * Find a location for the control code buffer, and add it * the vector of segments so that it's pages will also be * counted as destination pages. */ |
255aedd90 kexec: use common... |
75 |
ret = -ENOMEM; |
dc009d924 [PATCH] kexec: ad... |
76 |
image->control_code_page = kimage_alloc_control_pages(image, |
163f6876f kexec jump: renam... |
77 |
get_order(KEXEC_CONTROL_PAGE_SIZE)); |
dc009d924 [PATCH] kexec: ad... |
78 |
if (!image->control_code_page) { |
e1bebcf41 kernel/kexec.c: c... |
79 80 |
pr_err("Could not allocate control_code_buffer "); |
dabe78628 kexec: move segme... |
81 |
goto out_free_image; |
dc009d924 [PATCH] kexec: ad... |
82 |
} |
255aedd90 kexec: use common... |
83 84 85 86 87 88 89 |
if (!kexec_on_panic) { image->swap_page = kimage_alloc_control_pages(image, 0); if (!image->swap_page) { pr_err("Could not allocate swap buffer "); goto out_free_control_pages; } |
3ab835213 kexec jump |
90 |
} |
b92e7e0da kexec: fix memory... |
91 92 |
*rimage = image; return 0; |
dabe78628 kexec: move segme... |
93 |
out_free_control_pages: |
b92e7e0da kexec: fix memory... |
94 |
kimage_free_page_list(&image->control_pages); |
dabe78628 kexec: move segme... |
95 |
out_free_image: |
b92e7e0da kexec: fix memory... |
96 |
kfree(image); |
255aedd90 kexec: use common... |
97 |
return ret; |
dc009d924 [PATCH] kexec: ad... |
98 |
} |
0eea08678 kexec: do a clean... |
99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 |
static int do_kexec_load(unsigned long entry, unsigned long nr_segments, struct kexec_segment __user *segments, unsigned long flags) { struct kimage **dest_image, *image; unsigned long i; int ret; if (flags & KEXEC_ON_CRASH) { dest_image = &kexec_crash_image; if (kexec_crash_image) arch_kexec_unprotect_crashkres(); } else { dest_image = &kexec_image; } if (nr_segments == 0) { /* Uninstall image */ kimage_free(xchg(dest_image, NULL)); return 0; } if (flags & KEXEC_ON_CRASH) { /* * Loading another kernel to switch to if this one * crashes. Free any current crash dump kernel before * we corrupt it. */ kimage_free(xchg(&kexec_crash_image, NULL)); } ret = kimage_alloc_init(&image, entry, nr_segments, segments, flags); if (ret) return ret; |
0eea08678 kexec: do a clean... |
131 132 133 134 135 136 |
if (flags & KEXEC_PRESERVE_CONTEXT) image->preserve_context = 1; ret = machine_kexec_prepare(image); if (ret) goto out; |
1229384f5 kdump: protect vm... |
137 138 139 140 141 142 143 |
/* * Some architecture(like S390) may touch the crash memory before * machine_kexec_prepare(), we must copy vmcoreinfo data after it. */ ret = kimage_crash_copy_vmcoreinfo(image); if (ret) goto out; |
0eea08678 kexec: do a clean... |
144 145 146 147 148 149 150 151 152 153 154 155 156 157 |
for (i = 0; i < nr_segments; i++) { ret = kimage_load_segment(image, &image->segment[i]); if (ret) goto out; } kimage_terminate(image); /* Install the new kernel and uninstall the old */ image = xchg(dest_image, image); out: if ((flags & KEXEC_ON_CRASH) && kexec_crash_image) arch_kexec_protect_crashkres(); |
0eea08678 kexec: do a clean... |
158 159 160 |
kimage_free(image); return ret; } |
dc009d924 [PATCH] kexec: ad... |
161 162 163 164 165 166 167 168 169 170 171 172 173 174 |
/* * Exec Kernel system call: for obvious reasons only root may call it. * * This call breaks up into three pieces. * - A generic part which loads the new kernel from the current * address space, and very carefully places the data in the * allocated pages. * * - A generic part that interacts with the kernel and tells all of * the devices to shut down. Preventing on-going dmas, and placing * the devices in a consistent state so a later kernel can * reinitialize them. * * - A machine specific part that includes the syscall number |
002ace782 kexec: Typo s/the... |
175 |
* and then copies the image to it's final destination. And |
dc009d924 [PATCH] kexec: ad... |
176 177 178 179 180 |
* jumps into the image at entry. * * kexec does not sync, or unmount filesystems so if you need * that to happen you need to do that yourself. */ |
8c5a1cf0a kexec: use a mute... |
181 |
|
6b27aef09 kexec: call do_ke... |
182 183 |
static inline int kexec_load_check(unsigned long nr_segments, unsigned long flags) |
dc009d924 [PATCH] kexec: ad... |
184 |
{ |
a210fd32a kexec: add call t... |
185 |
int result; |
dc009d924 [PATCH] kexec: ad... |
186 |
/* We only trust the superuser with rebooting the system. */ |
7984754b9 kexec: add sysctl... |
187 |
if (!capable(CAP_SYS_BOOT) || kexec_load_disabled) |
dc009d924 [PATCH] kexec: ad... |
188 |
return -EPERM; |
a210fd32a kexec: add call t... |
189 190 191 192 |
/* Permit LSMs and IMA to fail the kexec */ result = security_kernel_load_data(LOADING_KEXEC_IMAGE); if (result < 0) return result; |
dc009d924 [PATCH] kexec: ad... |
193 194 195 196 197 198 |
/* * Verify we have a legal set of flags * This leaves us room for future extensions. */ if ((flags & KEXEC_FLAGS) != (flags & ~KEXEC_ARCH_MASK)) return -EINVAL; |
dc009d924 [PATCH] kexec: ad... |
199 200 201 202 203 |
/* Put an artificial cap on the number * of segments passed to kexec_load. */ if (nr_segments > KEXEC_SEGMENT_MAX) return -EINVAL; |
6b27aef09 kexec: call do_ke... |
204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 |
return 0; } SYSCALL_DEFINE4(kexec_load, unsigned long, entry, unsigned long, nr_segments, struct kexec_segment __user *, segments, unsigned long, flags) { int result; result = kexec_load_check(nr_segments, flags); if (result) return result; /* Verify we are on the appropriate architecture */ if (((flags & KEXEC_ARCH_MASK) != KEXEC_ARCH) && ((flags & KEXEC_ARCH_MASK) != KEXEC_ARCH_DEFAULT)) return -EINVAL; |
dc009d924 [PATCH] kexec: ad... |
220 221 222 223 224 225 226 227 |
/* Because we write directly to the reserved memory * region when loading crash kernels we need a mutex here to * prevent multiple crash kernels from attempting to load * simultaneously, and to prevent a crash kernel from loading * over the top of a in use crash kernel. * * KISS: always take the mutex. */ |
8c5a1cf0a kexec: use a mute... |
228 |
if (!mutex_trylock(&kexec_mutex)) |
dc009d924 [PATCH] kexec: ad... |
229 |
return -EBUSY; |
72414d3f1 [PATCH] kexec cod... |
230 |
|
0eea08678 kexec: do a clean... |
231 |
result = do_kexec_load(entry, nr_segments, segments, flags); |
dc009d924 [PATCH] kexec: ad... |
232 |
|
8c5a1cf0a kexec: use a mute... |
233 |
mutex_unlock(&kexec_mutex); |
72414d3f1 [PATCH] kexec cod... |
234 |
|
dc009d924 [PATCH] kexec: ad... |
235 236 237 238 |
return result; } #ifdef CONFIG_COMPAT |
ca2c405ab kexec/compat: con... |
239 240 241 242 |
COMPAT_SYSCALL_DEFINE4(kexec_load, compat_ulong_t, entry, compat_ulong_t, nr_segments, struct compat_kexec_segment __user *, segments, compat_ulong_t, flags) |
dc009d924 [PATCH] kexec: ad... |
243 244 245 246 |
{ struct compat_kexec_segment in; struct kexec_segment out, __user *ksegments; unsigned long i, result; |
6b27aef09 kexec: call do_ke... |
247 248 249 |
result = kexec_load_check(nr_segments, flags); if (result) return result; |
dc009d924 [PATCH] kexec: ad... |
250 251 252 |
/* Don't allow clients that don't understand the native * architecture to do anything. */ |
72414d3f1 [PATCH] kexec cod... |
253 |
if ((flags & KEXEC_ARCH_MASK) == KEXEC_ARCH_DEFAULT) |
dc009d924 [PATCH] kexec: ad... |
254 |
return -EINVAL; |
dc009d924 [PATCH] kexec: ad... |
255 |
|
dc009d924 [PATCH] kexec: ad... |
256 |
ksegments = compat_alloc_user_space(nr_segments * sizeof(out)); |
e1bebcf41 kernel/kexec.c: c... |
257 |
for (i = 0; i < nr_segments; i++) { |
dc009d924 [PATCH] kexec: ad... |
258 |
result = copy_from_user(&in, &segments[i], sizeof(in)); |
72414d3f1 [PATCH] kexec cod... |
259 |
if (result) |
dc009d924 [PATCH] kexec: ad... |
260 |
return -EFAULT; |
dc009d924 [PATCH] kexec: ad... |
261 262 263 264 265 266 267 |
out.buf = compat_ptr(in.buf); out.bufsz = in.bufsz; out.mem = in.mem; out.memsz = in.memsz; result = copy_to_user(&ksegments[i], &out, sizeof(out)); |
72414d3f1 [PATCH] kexec cod... |
268 |
if (result) |
dc009d924 [PATCH] kexec: ad... |
269 |
return -EFAULT; |
dc009d924 [PATCH] kexec: ad... |
270 |
} |
6b27aef09 kexec: call do_ke... |
271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 |
/* Because we write directly to the reserved memory * region when loading crash kernels we need a mutex here to * prevent multiple crash kernels from attempting to load * simultaneously, and to prevent a crash kernel from loading * over the top of a in use crash kernel. * * KISS: always take the mutex. */ if (!mutex_trylock(&kexec_mutex)) return -EBUSY; result = do_kexec_load(entry, nr_segments, ksegments, flags); mutex_unlock(&kexec_mutex); return result; |
dc009d924 [PATCH] kexec: ad... |
287 288 |
} #endif |