Linux Audio

Check our new training course

Loading...
v4.17
 
  1/*
  2 * Architecture specific (i386/x86_64) functions for kexec based crash dumps.
  3 *
  4 * Created by: Hariprasad Nellitheertha (hari@in.ibm.com)
  5 *
  6 * Copyright (C) IBM Corporation, 2004. All rights reserved.
  7 * Copyright (C) Red Hat Inc., 2014. All rights reserved.
  8 * Authors:
  9 *      Vivek Goyal <vgoyal@redhat.com>
 10 *
 11 */
 12
 13#define pr_fmt(fmt)	"kexec: " fmt
 14
 15#include <linux/types.h>
 16#include <linux/kernel.h>
 17#include <linux/smp.h>
 18#include <linux/reboot.h>
 19#include <linux/kexec.h>
 20#include <linux/delay.h>
 21#include <linux/elf.h>
 22#include <linux/elfcore.h>
 23#include <linux/export.h>
 24#include <linux/slab.h>
 25#include <linux/vmalloc.h>
 
 26
 
 27#include <asm/processor.h>
 28#include <asm/hardirq.h>
 29#include <asm/nmi.h>
 30#include <asm/hw_irq.h>
 31#include <asm/apic.h>
 32#include <asm/e820/types.h>
 33#include <asm/io_apic.h>
 34#include <asm/hpet.h>
 35#include <linux/kdebug.h>
 36#include <asm/cpu.h>
 37#include <asm/reboot.h>
 38#include <asm/virtext.h>
 39#include <asm/intel_pt.h>
 
 
 
 40
 41/* Used while preparing memory map entries for second kernel */
 42struct crash_memmap_data {
 43	struct boot_params *params;
 44	/* Type of memory */
 45	unsigned int type;
 46};
 47
 48/*
 49 * This is used to VMCLEAR all VMCSs loaded on the
 50 * processor. And when loading kvm_intel module, the
 51 * callback function pointer will be assigned.
 52 *
 53 * protected by rcu.
 54 */
 55crash_vmclear_fn __rcu *crash_vmclear_loaded_vmcss = NULL;
 56EXPORT_SYMBOL_GPL(crash_vmclear_loaded_vmcss);
 57unsigned long crash_zero_bytes;
 58
 59static inline void cpu_crash_vmclear_loaded_vmcss(void)
 60{
 61	crash_vmclear_fn *do_vmclear_operation = NULL;
 62
 63	rcu_read_lock();
 64	do_vmclear_operation = rcu_dereference(crash_vmclear_loaded_vmcss);
 65	if (do_vmclear_operation)
 66		do_vmclear_operation();
 67	rcu_read_unlock();
 68}
 69
 70#if defined(CONFIG_SMP) && defined(CONFIG_X86_LOCAL_APIC)
 71
 72static void kdump_nmi_callback(int cpu, struct pt_regs *regs)
 73{
 74#ifdef CONFIG_X86_32
 75	struct pt_regs fixed_regs;
 76
 77	if (!user_mode(regs)) {
 78		crash_fixup_ss_esp(&fixed_regs, regs);
 79		regs = &fixed_regs;
 80	}
 81#endif
 82	crash_save_cpu(regs, cpu);
 83
 84	/*
 85	 * VMCLEAR VMCSs loaded on all cpus if needed.
 86	 */
 87	cpu_crash_vmclear_loaded_vmcss();
 88
 89	/* Disable VMX or SVM if needed.
 90	 *
 91	 * We need to disable virtualization on all CPUs.
 92	 * Having VMX or SVM enabled on any CPU may break rebooting
 93	 * after the kdump kernel has finished its task.
 94	 */
 95	cpu_emergency_vmxoff();
 96	cpu_emergency_svm_disable();
 97
 98	/*
 99	 * Disable Intel PT to stop its logging
100	 */
101	cpu_emergency_stop_pt();
102
 
 
103	disable_local_APIC();
104}
105
106void kdump_nmi_shootdown_cpus(void)
107{
108	nmi_shootdown_cpus(kdump_nmi_callback);
109
110	disable_local_APIC();
111}
112
113/* Override the weak function in kernel/panic.c */
114void crash_smp_send_stop(void)
115{
116	static int cpus_stopped;
117
118	if (cpus_stopped)
119		return;
120
121	if (smp_ops.crash_stop_other_cpus)
122		smp_ops.crash_stop_other_cpus();
123	else
124		smp_send_stop();
125
126	cpus_stopped = 1;
127}
128
129#else
130void crash_smp_send_stop(void)
131{
132	/* There are no cpus to shootdown */
133}
134#endif
135
136void native_machine_crash_shutdown(struct pt_regs *regs)
137{
138	/* This function is only called after the system
139	 * has panicked or is otherwise in a critical state.
140	 * The minimum amount of code to allow a kexec'd kernel
141	 * to run successfully needs to happen here.
142	 *
143	 * In practice this means shooting down the other cpus in
144	 * an SMP system.
145	 */
146	/* The kernel is broken so disable interrupts */
147	local_irq_disable();
148
149	crash_smp_send_stop();
150
151	/*
152	 * VMCLEAR VMCSs loaded on this cpu if needed.
153	 */
154	cpu_crash_vmclear_loaded_vmcss();
155
156	/* Booting kdump kernel with VMX or SVM enabled won't work,
157	 * because (among other limitations) we can't disable paging
158	 * with the virt flags.
159	 */
160	cpu_emergency_vmxoff();
161	cpu_emergency_svm_disable();
162
163	/*
164	 * Disable Intel PT to stop its logging
165	 */
166	cpu_emergency_stop_pt();
167
168#ifdef CONFIG_X86_IO_APIC
169	/* Prevent crash_kexec() from deadlocking on ioapic_lock. */
170	ioapic_zap_locks();
171	clear_IO_APIC();
172#endif
173	lapic_shutdown();
174	restore_boot_irq_mode();
175#ifdef CONFIG_HPET_TIMER
176	hpet_disable();
177#endif
178	crash_save_cpu(regs, safe_smp_processor_id());
179}
180
181#ifdef CONFIG_KEXEC_FILE
182static int get_nr_ram_ranges_callback(struct resource *res, void *arg)
183{
184	unsigned int *nr_ranges = arg;
185
186	(*nr_ranges)++;
187	return 0;
188}
189
190/* Gather all the required information to prepare elf headers for ram regions */
191static struct crash_mem *fill_up_crash_elf_data(void)
192{
193	unsigned int nr_ranges = 0;
194	struct crash_mem *cmem;
195
196	walk_system_ram_res(0, -1, &nr_ranges,
197				get_nr_ram_ranges_callback);
198	if (!nr_ranges)
199		return NULL;
200
201	/*
202	 * Exclusion of crash region and/or crashk_low_res may cause
203	 * another range split. So add extra two slots here.
204	 */
205	nr_ranges += 2;
206	cmem = vzalloc(sizeof(struct crash_mem) +
207			sizeof(struct crash_mem_range) * nr_ranges);
208	if (!cmem)
209		return NULL;
210
211	cmem->max_nr_ranges = nr_ranges;
212	cmem->nr_ranges = 0;
213
214	return cmem;
215}
216
217/*
218 * Look for any unwanted ranges between mstart, mend and remove them. This
219 * might lead to split and split ranges are put in cmem->ranges[] array
220 */
221static int elf_header_exclude_ranges(struct crash_mem *cmem)
222{
223	int ret = 0;
224
 
 
 
 
 
225	/* Exclude crashkernel region */
226	ret = crash_exclude_mem_range(cmem, crashk_res.start, crashk_res.end);
227	if (ret)
228		return ret;
229
230	if (crashk_low_res.end) {
231		ret = crash_exclude_mem_range(cmem, crashk_low_res.start,
232							crashk_low_res.end);
233		if (ret)
234			return ret;
235	}
236
237	return ret;
238}
239
240static int prepare_elf64_ram_headers_callback(struct resource *res, void *arg)
241{
242	struct crash_mem *cmem = arg;
243
244	cmem->ranges[cmem->nr_ranges].start = res->start;
245	cmem->ranges[cmem->nr_ranges].end = res->end;
246	cmem->nr_ranges++;
247
248	return 0;
249}
250
251/* Prepare elf headers. Return addr and size */
252static int prepare_elf_headers(struct kimage *image, void **addr,
253					unsigned long *sz)
254{
255	struct crash_mem *cmem;
256	Elf64_Ehdr *ehdr;
257	Elf64_Phdr *phdr;
258	int ret, i;
259
260	cmem = fill_up_crash_elf_data();
261	if (!cmem)
262		return -ENOMEM;
263
264	ret = walk_system_ram_res(0, -1, cmem,
265				prepare_elf64_ram_headers_callback);
266	if (ret)
267		goto out;
268
269	/* Exclude unwanted mem ranges */
270	ret = elf_header_exclude_ranges(cmem);
271	if (ret)
272		goto out;
273
 
 
 
274	/* By default prepare 64bit headers */
275	ret =  crash_prepare_elf64_headers(cmem,
276				IS_ENABLED(CONFIG_X86_64), addr, sz);
277	if (ret)
278		goto out;
279
280	/*
281	 * If a range matches backup region, adjust offset to backup
282	 * segment.
283	 */
284	ehdr = (Elf64_Ehdr *)*addr;
285	phdr = (Elf64_Phdr *)(ehdr + 1);
286	for (i = 0; i < ehdr->e_phnum; phdr++, i++)
287		if (phdr->p_type == PT_LOAD &&
288				phdr->p_paddr == image->arch.backup_src_start &&
289				phdr->p_memsz == image->arch.backup_src_sz) {
290			phdr->p_offset = image->arch.backup_load_addr;
291			break;
292		}
293out:
294	vfree(cmem);
295	return ret;
296}
 
297
 
298static int add_e820_entry(struct boot_params *params, struct e820_entry *entry)
299{
300	unsigned int nr_e820_entries;
301
302	nr_e820_entries = params->e820_entries;
303	if (nr_e820_entries >= E820_MAX_ENTRIES_ZEROPAGE)
304		return 1;
305
306	memcpy(&params->e820_table[nr_e820_entries], entry,
307			sizeof(struct e820_entry));
308	params->e820_entries++;
309	return 0;
310}
311
312static int memmap_entry_callback(struct resource *res, void *arg)
313{
314	struct crash_memmap_data *cmd = arg;
315	struct boot_params *params = cmd->params;
316	struct e820_entry ei;
317
318	ei.addr = res->start;
319	ei.size = resource_size(res);
320	ei.type = cmd->type;
321	add_e820_entry(params, &ei);
322
323	return 0;
324}
325
326static int memmap_exclude_ranges(struct kimage *image, struct crash_mem *cmem,
327				 unsigned long long mstart,
328				 unsigned long long mend)
329{
330	unsigned long start, end;
331	int ret = 0;
332
333	cmem->ranges[0].start = mstart;
334	cmem->ranges[0].end = mend;
335	cmem->nr_ranges = 1;
336
337	/* Exclude Backup region */
338	start = image->arch.backup_load_addr;
339	end = start + image->arch.backup_src_sz - 1;
340	ret = crash_exclude_mem_range(cmem, start, end);
341	if (ret)
342		return ret;
343
344	/* Exclude elf header region */
345	start = image->arch.elf_load_addr;
346	end = start + image->arch.elf_headers_sz - 1;
347	return crash_exclude_mem_range(cmem, start, end);
348}
349
350/* Prepare memory map for crash dump kernel */
351int crash_setup_memmap_entries(struct kimage *image, struct boot_params *params)
352{
353	int i, ret = 0;
354	unsigned long flags;
355	struct e820_entry ei;
356	struct crash_memmap_data cmd;
357	struct crash_mem *cmem;
358
359	cmem = vzalloc(sizeof(struct crash_mem));
360	if (!cmem)
361		return -ENOMEM;
362
363	memset(&cmd, 0, sizeof(struct crash_memmap_data));
364	cmd.params = params;
365
366	/* Add first 640K segment */
367	ei.addr = image->arch.backup_src_start;
368	ei.size = image->arch.backup_src_sz;
369	ei.type = E820_TYPE_RAM;
370	add_e820_entry(params, &ei);
371
372	/* Add ACPI tables */
373	cmd.type = E820_TYPE_ACPI;
374	flags = IORESOURCE_MEM | IORESOURCE_BUSY;
375	walk_iomem_res_desc(IORES_DESC_ACPI_TABLES, flags, 0, -1, &cmd,
376		       memmap_entry_callback);
377
378	/* Add ACPI Non-volatile Storage */
379	cmd.type = E820_TYPE_NVS;
380	walk_iomem_res_desc(IORES_DESC_ACPI_NV_STORAGE, flags, 0, -1, &cmd,
381			memmap_entry_callback);
 
 
 
 
 
 
382
383	/* Add crashk_low_res region */
384	if (crashk_low_res.end) {
385		ei.addr = crashk_low_res.start;
386		ei.size = crashk_low_res.end - crashk_low_res.start + 1;
387		ei.type = E820_TYPE_RAM;
388		add_e820_entry(params, &ei);
389	}
390
391	/* Exclude some ranges from crashk_res and add rest to memmap */
392	ret = memmap_exclude_ranges(image, cmem, crashk_res.start,
393						crashk_res.end);
394	if (ret)
395		goto out;
396
397	for (i = 0; i < cmem->nr_ranges; i++) {
398		ei.size = cmem->ranges[i].end - cmem->ranges[i].start + 1;
399
400		/* If entry is less than a page, skip it */
401		if (ei.size < PAGE_SIZE)
402			continue;
403		ei.addr = cmem->ranges[i].start;
404		ei.type = E820_TYPE_RAM;
405		add_e820_entry(params, &ei);
406	}
407
408out:
409	vfree(cmem);
410	return ret;
411}
412
413static int determine_backup_region(struct resource *res, void *arg)
414{
415	struct kimage *image = arg;
416
417	image->arch.backup_src_start = res->start;
418	image->arch.backup_src_sz = resource_size(res);
419
420	/* Expecting only one range for backup region */
421	return 1;
422}
423
424int crash_load_segments(struct kimage *image)
425{
426	int ret;
 
427	struct kexec_buf kbuf = { .image = image, .buf_min = 0,
428				  .buf_max = ULONG_MAX, .top_down = false };
429
430	/*
431	 * Determine and load a segment for backup area. First 640K RAM
432	 * region is backup source
433	 */
434
435	ret = walk_system_ram_res(KEXEC_BACKUP_SRC_START, KEXEC_BACKUP_SRC_END,
436				image, determine_backup_region);
437
438	/* Zero or postive return values are ok */
439	if (ret < 0)
440		return ret;
441
442	/* Add backup segment. */
443	if (image->arch.backup_src_sz) {
444		kbuf.buffer = &crash_zero_bytes;
445		kbuf.bufsz = sizeof(crash_zero_bytes);
446		kbuf.memsz = image->arch.backup_src_sz;
447		kbuf.buf_align = PAGE_SIZE;
448		/*
449		 * Ideally there is no source for backup segment. This is
450		 * copied in purgatory after crash. Just add a zero filled
451		 * segment for now to make sure checksum logic works fine.
452		 */
453		ret = kexec_add_buffer(&kbuf);
454		if (ret)
455			return ret;
456		image->arch.backup_load_addr = kbuf.mem;
457		pr_debug("Loaded backup region at 0x%lx backup_start=0x%lx memsz=0x%lx\n",
458			 image->arch.backup_load_addr,
459			 image->arch.backup_src_start, kbuf.memsz);
460	}
461
462	/* Prepare elf headers and add a segment */
463	ret = prepare_elf_headers(image, &kbuf.buffer, &kbuf.bufsz);
464	if (ret)
465		return ret;
466
467	image->arch.elf_headers = kbuf.buffer;
468	image->arch.elf_headers_sz = kbuf.bufsz;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
469
470	kbuf.memsz = kbuf.bufsz;
471	kbuf.buf_align = ELF_CORE_HEADER_ALIGN;
 
472	ret = kexec_add_buffer(&kbuf);
473	if (ret) {
474		vfree((void *)image->arch.elf_headers);
475		return ret;
476	}
477	image->arch.elf_load_addr = kbuf.mem;
478	pr_debug("Loaded ELF headers at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
479		 image->arch.elf_load_addr, kbuf.bufsz, kbuf.bufsz);
480
481	return ret;
482}
483#endif /* CONFIG_KEXEC_FILE */
v6.9.4
  1// SPDX-License-Identifier: GPL-2.0-only
  2/*
  3 * Architecture specific (i386/x86_64) functions for kexec based crash dumps.
  4 *
  5 * Created by: Hariprasad Nellitheertha (hari@in.ibm.com)
  6 *
  7 * Copyright (C) IBM Corporation, 2004. All rights reserved.
  8 * Copyright (C) Red Hat Inc., 2014. All rights reserved.
  9 * Authors:
 10 *      Vivek Goyal <vgoyal@redhat.com>
 11 *
 12 */
 13
 14#define pr_fmt(fmt)	"kexec: " fmt
 15
 16#include <linux/types.h>
 17#include <linux/kernel.h>
 18#include <linux/smp.h>
 19#include <linux/reboot.h>
 20#include <linux/kexec.h>
 21#include <linux/delay.h>
 22#include <linux/elf.h>
 23#include <linux/elfcore.h>
 24#include <linux/export.h>
 25#include <linux/slab.h>
 26#include <linux/vmalloc.h>
 27#include <linux/memblock.h>
 28
 29#include <asm/bootparam.h>
 30#include <asm/processor.h>
 31#include <asm/hardirq.h>
 32#include <asm/nmi.h>
 33#include <asm/hw_irq.h>
 34#include <asm/apic.h>
 35#include <asm/e820/types.h>
 36#include <asm/io_apic.h>
 37#include <asm/hpet.h>
 38#include <linux/kdebug.h>
 39#include <asm/cpu.h>
 40#include <asm/reboot.h>
 
 41#include <asm/intel_pt.h>
 42#include <asm/crash.h>
 43#include <asm/cmdline.h>
 44#include <asm/sev.h>
 45
 46/* Used while preparing memory map entries for second kernel */
 47struct crash_memmap_data {
 48	struct boot_params *params;
 49	/* Type of memory */
 50	unsigned int type;
 51};
 52
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 53#if defined(CONFIG_SMP) && defined(CONFIG_X86_LOCAL_APIC)
 54
 55static void kdump_nmi_callback(int cpu, struct pt_regs *regs)
 56{
 
 
 
 
 
 
 
 
 57	crash_save_cpu(regs, cpu);
 58
 59	/*
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 60	 * Disable Intel PT to stop its logging
 61	 */
 62	cpu_emergency_stop_pt();
 63
 64	kdump_sev_callback();
 65
 66	disable_local_APIC();
 67}
 68
 69void kdump_nmi_shootdown_cpus(void)
 70{
 71	nmi_shootdown_cpus(kdump_nmi_callback);
 72
 73	disable_local_APIC();
 74}
 75
 76/* Override the weak function in kernel/panic.c */
 77void crash_smp_send_stop(void)
 78{
 79	static int cpus_stopped;
 80
 81	if (cpus_stopped)
 82		return;
 83
 84	if (smp_ops.crash_stop_other_cpus)
 85		smp_ops.crash_stop_other_cpus();
 86	else
 87		smp_send_stop();
 88
 89	cpus_stopped = 1;
 90}
 91
 92#else
 93void crash_smp_send_stop(void)
 94{
 95	/* There are no cpus to shootdown */
 96}
 97#endif
 98
 99void native_machine_crash_shutdown(struct pt_regs *regs)
100{
101	/* This function is only called after the system
102	 * has panicked or is otherwise in a critical state.
103	 * The minimum amount of code to allow a kexec'd kernel
104	 * to run successfully needs to happen here.
105	 *
106	 * In practice this means shooting down the other cpus in
107	 * an SMP system.
108	 */
109	/* The kernel is broken so disable interrupts */
110	local_irq_disable();
111
112	crash_smp_send_stop();
113
114	cpu_emergency_disable_virtualization();
 
 
 
 
 
 
 
 
 
 
115
116	/*
117	 * Disable Intel PT to stop its logging
118	 */
119	cpu_emergency_stop_pt();
120
121#ifdef CONFIG_X86_IO_APIC
122	/* Prevent crash_kexec() from deadlocking on ioapic_lock. */
123	ioapic_zap_locks();
124	clear_IO_APIC();
125#endif
126	lapic_shutdown();
127	restore_boot_irq_mode();
128#ifdef CONFIG_HPET_TIMER
129	hpet_disable();
130#endif
131	crash_save_cpu(regs, safe_smp_processor_id());
132}
133
134#if defined(CONFIG_KEXEC_FILE) || defined(CONFIG_CRASH_HOTPLUG)
135static int get_nr_ram_ranges_callback(struct resource *res, void *arg)
136{
137	unsigned int *nr_ranges = arg;
138
139	(*nr_ranges)++;
140	return 0;
141}
142
143/* Gather all the required information to prepare elf headers for ram regions */
144static struct crash_mem *fill_up_crash_elf_data(void)
145{
146	unsigned int nr_ranges = 0;
147	struct crash_mem *cmem;
148
149	walk_system_ram_res(0, -1, &nr_ranges, get_nr_ram_ranges_callback);
 
150	if (!nr_ranges)
151		return NULL;
152
153	/*
154	 * Exclusion of crash region and/or crashk_low_res may cause
155	 * another range split. So add extra two slots here.
156	 */
157	nr_ranges += 2;
158	cmem = vzalloc(struct_size(cmem, ranges, nr_ranges));
 
159	if (!cmem)
160		return NULL;
161
162	cmem->max_nr_ranges = nr_ranges;
163	cmem->nr_ranges = 0;
164
165	return cmem;
166}
167
168/*
169 * Look for any unwanted ranges between mstart, mend and remove them. This
170 * might lead to split and split ranges are put in cmem->ranges[] array
171 */
172static int elf_header_exclude_ranges(struct crash_mem *cmem)
173{
174	int ret = 0;
175
176	/* Exclude the low 1M because it is always reserved */
177	ret = crash_exclude_mem_range(cmem, 0, SZ_1M - 1);
178	if (ret)
179		return ret;
180
181	/* Exclude crashkernel region */
182	ret = crash_exclude_mem_range(cmem, crashk_res.start, crashk_res.end);
183	if (ret)
184		return ret;
185
186	if (crashk_low_res.end)
187		ret = crash_exclude_mem_range(cmem, crashk_low_res.start,
188					      crashk_low_res.end);
 
 
 
189
190	return ret;
191}
192
193static int prepare_elf64_ram_headers_callback(struct resource *res, void *arg)
194{
195	struct crash_mem *cmem = arg;
196
197	cmem->ranges[cmem->nr_ranges].start = res->start;
198	cmem->ranges[cmem->nr_ranges].end = res->end;
199	cmem->nr_ranges++;
200
201	return 0;
202}
203
204/* Prepare elf headers. Return addr and size */
205static int prepare_elf_headers(void **addr, unsigned long *sz,
206			       unsigned long *nr_mem_ranges)
207{
208	struct crash_mem *cmem;
209	int ret;
 
 
210
211	cmem = fill_up_crash_elf_data();
212	if (!cmem)
213		return -ENOMEM;
214
215	ret = walk_system_ram_res(0, -1, cmem, prepare_elf64_ram_headers_callback);
 
216	if (ret)
217		goto out;
218
219	/* Exclude unwanted mem ranges */
220	ret = elf_header_exclude_ranges(cmem);
221	if (ret)
222		goto out;
223
224	/* Return the computed number of memory ranges, for hotplug usage */
225	*nr_mem_ranges = cmem->nr_ranges;
226
227	/* By default prepare 64bit headers */
228	ret = crash_prepare_elf64_headers(cmem, IS_ENABLED(CONFIG_X86_64), addr, sz);
 
 
 
229
 
 
 
 
 
 
 
 
 
 
 
 
 
230out:
231	vfree(cmem);
232	return ret;
233}
234#endif
235
236#ifdef CONFIG_KEXEC_FILE
237static int add_e820_entry(struct boot_params *params, struct e820_entry *entry)
238{
239	unsigned int nr_e820_entries;
240
241	nr_e820_entries = params->e820_entries;
242	if (nr_e820_entries >= E820_MAX_ENTRIES_ZEROPAGE)
243		return 1;
244
245	memcpy(&params->e820_table[nr_e820_entries], entry, sizeof(struct e820_entry));
 
246	params->e820_entries++;
247	return 0;
248}
249
250static int memmap_entry_callback(struct resource *res, void *arg)
251{
252	struct crash_memmap_data *cmd = arg;
253	struct boot_params *params = cmd->params;
254	struct e820_entry ei;
255
256	ei.addr = res->start;
257	ei.size = resource_size(res);
258	ei.type = cmd->type;
259	add_e820_entry(params, &ei);
260
261	return 0;
262}
263
264static int memmap_exclude_ranges(struct kimage *image, struct crash_mem *cmem,
265				 unsigned long long mstart,
266				 unsigned long long mend)
267{
268	unsigned long start, end;
 
269
270	cmem->ranges[0].start = mstart;
271	cmem->ranges[0].end = mend;
272	cmem->nr_ranges = 1;
273
 
 
 
 
 
 
 
274	/* Exclude elf header region */
275	start = image->elf_load_addr;
276	end = start + image->elf_headers_sz - 1;
277	return crash_exclude_mem_range(cmem, start, end);
278}
279
280/* Prepare memory map for crash dump kernel */
281int crash_setup_memmap_entries(struct kimage *image, struct boot_params *params)
282{
283	int i, ret = 0;
284	unsigned long flags;
285	struct e820_entry ei;
286	struct crash_memmap_data cmd;
287	struct crash_mem *cmem;
288
289	cmem = vzalloc(struct_size(cmem, ranges, 1));
290	if (!cmem)
291		return -ENOMEM;
292
293	memset(&cmd, 0, sizeof(struct crash_memmap_data));
294	cmd.params = params;
295
296	/* Add the low 1M */
297	cmd.type = E820_TYPE_RAM;
298	flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY;
299	walk_iomem_res_desc(IORES_DESC_NONE, flags, 0, (1<<20)-1, &cmd,
300			    memmap_entry_callback);
301
302	/* Add ACPI tables */
303	cmd.type = E820_TYPE_ACPI;
304	flags = IORESOURCE_MEM | IORESOURCE_BUSY;
305	walk_iomem_res_desc(IORES_DESC_ACPI_TABLES, flags, 0, -1, &cmd,
306			    memmap_entry_callback);
307
308	/* Add ACPI Non-volatile Storage */
309	cmd.type = E820_TYPE_NVS;
310	walk_iomem_res_desc(IORES_DESC_ACPI_NV_STORAGE, flags, 0, -1, &cmd,
311			    memmap_entry_callback);
312
313	/* Add e820 reserved ranges */
314	cmd.type = E820_TYPE_RESERVED;
315	flags = IORESOURCE_MEM;
316	walk_iomem_res_desc(IORES_DESC_RESERVED, flags, 0, -1, &cmd,
317			    memmap_entry_callback);
318
319	/* Add crashk_low_res region */
320	if (crashk_low_res.end) {
321		ei.addr = crashk_low_res.start;
322		ei.size = resource_size(&crashk_low_res);
323		ei.type = E820_TYPE_RAM;
324		add_e820_entry(params, &ei);
325	}
326
327	/* Exclude some ranges from crashk_res and add rest to memmap */
328	ret = memmap_exclude_ranges(image, cmem, crashk_res.start, crashk_res.end);
 
329	if (ret)
330		goto out;
331
332	for (i = 0; i < cmem->nr_ranges; i++) {
333		ei.size = cmem->ranges[i].end - cmem->ranges[i].start + 1;
334
335		/* If entry is less than a page, skip it */
336		if (ei.size < PAGE_SIZE)
337			continue;
338		ei.addr = cmem->ranges[i].start;
339		ei.type = E820_TYPE_RAM;
340		add_e820_entry(params, &ei);
341	}
342
343out:
344	vfree(cmem);
345	return ret;
346}
347
 
 
 
 
 
 
 
 
 
 
 
348int crash_load_segments(struct kimage *image)
349{
350	int ret;
351	unsigned long pnum = 0;
352	struct kexec_buf kbuf = { .image = image, .buf_min = 0,
353				  .buf_max = ULONG_MAX, .top_down = false };
354
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
355	/* Prepare elf headers and add a segment */
356	ret = prepare_elf_headers(&kbuf.buffer, &kbuf.bufsz, &pnum);
357	if (ret)
358		return ret;
359
360	image->elf_headers	= kbuf.buffer;
361	image->elf_headers_sz	= kbuf.bufsz;
362	kbuf.memsz		= kbuf.bufsz;
363
364#ifdef CONFIG_CRASH_HOTPLUG
365	/*
366	 * The elfcorehdr segment size accounts for VMCOREINFO, kernel_map,
367	 * maximum CPUs and maximum memory ranges.
368	 */
369	if (IS_ENABLED(CONFIG_MEMORY_HOTPLUG))
370		pnum = 2 + CONFIG_NR_CPUS_DEFAULT + CONFIG_CRASH_MAX_MEMORY_RANGES;
371	else
372		pnum += 2 + CONFIG_NR_CPUS_DEFAULT;
373
374	if (pnum < (unsigned long)PN_XNUM) {
375		kbuf.memsz = pnum * sizeof(Elf64_Phdr);
376		kbuf.memsz += sizeof(Elf64_Ehdr);
377
378		image->elfcorehdr_index = image->nr_segments;
379
380		/* Mark as usable to crash kernel, else crash kernel fails on boot */
381		image->elf_headers_sz = kbuf.memsz;
382	} else {
383		pr_err("number of Phdrs %lu exceeds max\n", pnum);
384	}
385#endif
386
 
387	kbuf.buf_align = ELF_CORE_HEADER_ALIGN;
388	kbuf.mem = KEXEC_BUF_MEM_UNKNOWN;
389	ret = kexec_add_buffer(&kbuf);
390	if (ret)
 
391		return ret;
392	image->elf_load_addr = kbuf.mem;
393	kexec_dprintk("Loaded ELF headers at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
394		      image->elf_load_addr, kbuf.bufsz, kbuf.memsz);
 
395
396	return ret;
397}
398#endif /* CONFIG_KEXEC_FILE */
399
400#ifdef CONFIG_CRASH_HOTPLUG
401
402#undef pr_fmt
403#define pr_fmt(fmt) "crash hp: " fmt
404
405/* These functions provide the value for the sysfs crash_hotplug nodes */
406#ifdef CONFIG_HOTPLUG_CPU
407int arch_crash_hotplug_cpu_support(void)
408{
409	return crash_check_update_elfcorehdr();
410}
411#endif
412
413#ifdef CONFIG_MEMORY_HOTPLUG
414int arch_crash_hotplug_memory_support(void)
415{
416	return crash_check_update_elfcorehdr();
417}
418#endif
419
420unsigned int arch_crash_get_elfcorehdr_size(void)
421{
422	unsigned int sz;
423
424	/* kernel_map, VMCOREINFO and maximum CPUs */
425	sz = 2 + CONFIG_NR_CPUS_DEFAULT;
426	if (IS_ENABLED(CONFIG_MEMORY_HOTPLUG))
427		sz += CONFIG_CRASH_MAX_MEMORY_RANGES;
428	sz *= sizeof(Elf64_Phdr);
429	return sz;
430}
431
432/**
433 * arch_crash_handle_hotplug_event() - Handle hotplug elfcorehdr changes
434 * @image: a pointer to kexec_crash_image
435 *
436 * Prepare the new elfcorehdr and replace the existing elfcorehdr.
437 */
438void arch_crash_handle_hotplug_event(struct kimage *image)
439{
440	void *elfbuf = NULL, *old_elfcorehdr;
441	unsigned long nr_mem_ranges;
442	unsigned long mem, memsz;
443	unsigned long elfsz = 0;
444
445	/*
446	 * As crash_prepare_elf64_headers() has already described all
447	 * possible CPUs, there is no need to update the elfcorehdr
448	 * for additional CPU changes.
449	 */
450	if ((image->file_mode || image->elfcorehdr_updated) &&
451		((image->hp_action == KEXEC_CRASH_HP_ADD_CPU) ||
452		(image->hp_action == KEXEC_CRASH_HP_REMOVE_CPU)))
453		return;
454
455	/*
456	 * Create the new elfcorehdr reflecting the changes to CPU and/or
457	 * memory resources.
458	 */
459	if (prepare_elf_headers(&elfbuf, &elfsz, &nr_mem_ranges)) {
460		pr_err("unable to create new elfcorehdr");
461		goto out;
462	}
463
464	/*
465	 * Obtain address and size of the elfcorehdr segment, and
466	 * check it against the new elfcorehdr buffer.
467	 */
468	mem = image->segment[image->elfcorehdr_index].mem;
469	memsz = image->segment[image->elfcorehdr_index].memsz;
470	if (elfsz > memsz) {
471		pr_err("update elfcorehdr elfsz %lu > memsz %lu",
472			elfsz, memsz);
473		goto out;
474	}
475
476	/*
477	 * Copy new elfcorehdr over the old elfcorehdr at destination.
478	 */
479	old_elfcorehdr = kmap_local_page(pfn_to_page(mem >> PAGE_SHIFT));
480	if (!old_elfcorehdr) {
481		pr_err("mapping elfcorehdr segment failed\n");
482		goto out;
483	}
484
485	/*
486	 * Temporarily invalidate the crash image while the
487	 * elfcorehdr is updated.
488	 */
489	xchg(&kexec_crash_image, NULL);
490	memcpy_flushcache(old_elfcorehdr, elfbuf, elfsz);
491	xchg(&kexec_crash_image, image);
492	kunmap_local(old_elfcorehdr);
493	pr_debug("updated elfcorehdr\n");
494
495out:
496	vfree(elfbuf);
497}
498#endif