1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
|
// SPDX-License-Identifier: GPL-2.0-only
/*
* Load ELF vmlinux file for the kexec_file_load syscall.
*
* Author: Youling Tang <tangyouling@kylinos.cn>
* Copyright (C) 2025 KylinSoft Corporation.
*/
#define pr_fmt(fmt) "kexec_file(ELF): " fmt
#include <linux/elf.h>
#include <linux/kexec.h>
#include <linux/slab.h>
#include <linux/types.h>
#include <linux/memblock.h>
#include <asm/setup.h>
#define elf_kexec_probe kexec_elf_probe
static int _elf_kexec_load(struct kimage *image,
struct elfhdr *ehdr, struct kexec_elf_info *elf_info,
struct kexec_buf *kbuf, unsigned long *text_offset)
{
int i, ret = -1;
/* Read in the PT_LOAD segments. */
for (i = 0; i < ehdr->e_phnum; i++) {
size_t size;
const struct elf_phdr *phdr;
phdr = &elf_info->proghdrs[i];
if (phdr->p_type != PT_LOAD)
continue;
size = phdr->p_filesz;
if (size > phdr->p_memsz)
size = phdr->p_memsz;
kbuf->buffer = (void *)elf_info->buffer + phdr->p_offset;
kbuf->bufsz = size;
kbuf->buf_align = phdr->p_align;
*text_offset = __pa(phdr->p_paddr);
kbuf->buf_min = *text_offset;
kbuf->memsz = ALIGN(phdr->p_memsz, SZ_64K);
kbuf->mem = KEXEC_BUF_MEM_UNKNOWN;
ret = kexec_add_buffer(kbuf);
if (ret < 0)
break;
}
return ret;
}
static void *elf_kexec_load(struct kimage *image,
char *kernel, unsigned long kernel_len,
char *initrd, unsigned long initrd_len,
char *cmdline, unsigned long cmdline_len)
{
int ret;
unsigned long text_offset, kernel_segment_number;
struct elfhdr ehdr;
struct kexec_buf kbuf;
struct kexec_elf_info elf_info;
struct kexec_segment *kernel_segment;
ret = kexec_build_elf_info(kernel, kernel_len, &ehdr, &elf_info);
if (ret < 0)
return ERR_PTR(ret);
/*
* Load the kernel
* FIXME: Non-relocatable kernel rejected for kexec_file (require CONFIG_RELOCATABLE)
*/
kbuf.image = image;
kbuf.buf_max = ULONG_MAX;
kbuf.top_down = false;
kernel_segment_number = image->nr_segments;
ret = _elf_kexec_load(image, &ehdr, &elf_info, &kbuf, &text_offset);
if (ret < 0)
goto out;
/* Load additional data */
kernel_segment = &image->segment[kernel_segment_number];
ret = load_other_segments(image, kernel_segment->mem, kernel_segment->memsz,
initrd, initrd_len, cmdline, cmdline_len);
if (ret < 0)
goto out;
/* Make sure the second kernel jumps to the correct "kernel_entry". */
image->start = kernel_segment->mem + __pa(ehdr.e_entry) - text_offset;
kexec_dprintk("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
kernel_segment->mem, kbuf.bufsz, kernel_segment->memsz);
out:
kexec_free_elf_info(&elf_info);
return ret ? ERR_PTR(ret) : NULL;
}
const struct kexec_file_ops kexec_elf_ops = {
.probe = elf_kexec_probe,
.load = elf_kexec_load,
};
|