Blame view

kernel/linux-rt-4.4.41/arch/sparc/prom/bootstr_32.c 1.27 KB
5113f6f70   김현기   kernel add
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
  /*
   * bootstr.c:  Boot string/argument acquisition from the PROM.
   *
   * Copyright(C) 1995 David S. Miller (davem@caip.rutgers.edu)
   */
  
  #include <linux/string.h>
  #include <asm/oplib.h>
  #include <linux/init.h>
  
  #define BARG_LEN  256
  static char barg_buf[BARG_LEN] = { 0 };
  static char fetched __initdata = 0;
  
  char * __init
  prom_getbootargs(void)
  {
  	int iter;
  	char *cp, *arg;
  
  	/* This check saves us from a panic when bootfd patches args. */
  	if (fetched) {
  		return barg_buf;
  	}
  
  	switch (prom_vers) {
  	case PROM_V0:
  		cp = barg_buf;
  		/* Start from 1 and go over fd(0,0,0)kernel */
  		for (iter = 1; iter < 8; iter++) {
  			arg = (*(romvec->pv_v0bootargs))->argv[iter];
  			if (arg == NULL)
  				break;
  			while (*arg != 0) {
  				/* Leave place for space and null. */
  				if (cp >= barg_buf + BARG_LEN - 2)
  					/* We might issue a warning here. */
  					break;
  				*cp++ = *arg++;
  			}
  			*cp++ = ' ';
  			if (cp >= barg_buf + BARG_LEN - 1)
  				/* We might issue a warning here. */
  				break;
  		}
  		*cp = 0;
  		break;
  	case PROM_V2:
  	case PROM_V3:
  		/*
  		 * V3 PROM cannot supply as with more than 128 bytes
  		 * of an argument. But a smart bootstrap loader can.
  		 */
  		strlcpy(barg_buf, *romvec->pv_v2bootargs.bootargs, sizeof(barg_buf));
  		break;
  	default:
  		break;
  	}
  
  	fetched = 1;
  	return barg_buf;
  }