Loading...
1/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef _ASM_X86_KEXEC_H
3#define _ASM_X86_KEXEC_H
4
5#ifdef CONFIG_X86_32
6# define PA_CONTROL_PAGE 0
7# define VA_CONTROL_PAGE 1
8# define PA_PGD 2
9# define PA_SWAP_PAGE 3
10# define PAGES_NR 4
11#else
12# define PA_CONTROL_PAGE 0
13# define VA_CONTROL_PAGE 1
14# define PA_TABLE_PAGE 2
15# define PA_SWAP_PAGE 3
16# define PAGES_NR 4
17#endif
18
19# define KEXEC_CONTROL_CODE_MAX_SIZE 2048
20
21#ifndef __ASSEMBLY__
22
23#include <linux/string.h>
24#include <linux/kernel.h>
25
26#include <asm/page.h>
27#include <asm/ptrace.h>
28#include <asm/bootparam.h>
29
30struct kimage;
31
32/*
33 * KEXEC_SOURCE_MEMORY_LIMIT maximum page get_free_page can return.
34 * I.e. Maximum page that is mapped directly into kernel memory,
35 * and kmap is not required.
36 *
37 * So far x86_64 is limited to 40 physical address bits.
38 */
39#ifdef CONFIG_X86_32
40/* Maximum physical address we can use pages from */
41# define KEXEC_SOURCE_MEMORY_LIMIT (-1UL)
42/* Maximum address we can reach in physical address mode */
43# define KEXEC_DESTINATION_MEMORY_LIMIT (-1UL)
44/* Maximum address we can use for the control code buffer */
45# define KEXEC_CONTROL_MEMORY_LIMIT TASK_SIZE
46
47# define KEXEC_CONTROL_PAGE_SIZE 4096
48
49/* The native architecture */
50# define KEXEC_ARCH KEXEC_ARCH_386
51
52/* We can also handle crash dumps from 64 bit kernel. */
53# define vmcore_elf_check_arch_cross(x) ((x)->e_machine == EM_X86_64)
54#else
55/* Maximum physical address we can use pages from */
56# define KEXEC_SOURCE_MEMORY_LIMIT (MAXMEM-1)
57/* Maximum address we can reach in physical address mode */
58# define KEXEC_DESTINATION_MEMORY_LIMIT (MAXMEM-1)
59/* Maximum address we can use for the control pages */
60# define KEXEC_CONTROL_MEMORY_LIMIT (MAXMEM-1)
61
62/* Allocate one page for the pdp and the second for the code */
63# define KEXEC_CONTROL_PAGE_SIZE (4096UL + 4096UL)
64
65/* The native architecture */
66# define KEXEC_ARCH KEXEC_ARCH_X86_64
67#endif
68
69/*
70 * This function is responsible for capturing register states if coming
71 * via panic otherwise just fix up the ss and sp if coming via kernel
72 * mode exception.
73 */
74static inline void crash_setup_regs(struct pt_regs *newregs,
75 struct pt_regs *oldregs)
76{
77 if (oldregs) {
78 memcpy(newregs, oldregs, sizeof(*newregs));
79 } else {
80#ifdef CONFIG_X86_32
81 asm volatile("movl %%ebx,%0" : "=m"(newregs->bx));
82 asm volatile("movl %%ecx,%0" : "=m"(newregs->cx));
83 asm volatile("movl %%edx,%0" : "=m"(newregs->dx));
84 asm volatile("movl %%esi,%0" : "=m"(newregs->si));
85 asm volatile("movl %%edi,%0" : "=m"(newregs->di));
86 asm volatile("movl %%ebp,%0" : "=m"(newregs->bp));
87 asm volatile("movl %%eax,%0" : "=m"(newregs->ax));
88 asm volatile("movl %%esp,%0" : "=m"(newregs->sp));
89 asm volatile("movl %%ss, %%eax;" :"=a"(newregs->ss));
90 asm volatile("movl %%cs, %%eax;" :"=a"(newregs->cs));
91 asm volatile("movl %%ds, %%eax;" :"=a"(newregs->ds));
92 asm volatile("movl %%es, %%eax;" :"=a"(newregs->es));
93 asm volatile("pushfl; popl %0" :"=m"(newregs->flags));
94#else
95 asm volatile("movq %%rbx,%0" : "=m"(newregs->bx));
96 asm volatile("movq %%rcx,%0" : "=m"(newregs->cx));
97 asm volatile("movq %%rdx,%0" : "=m"(newregs->dx));
98 asm volatile("movq %%rsi,%0" : "=m"(newregs->si));
99 asm volatile("movq %%rdi,%0" : "=m"(newregs->di));
100 asm volatile("movq %%rbp,%0" : "=m"(newregs->bp));
101 asm volatile("movq %%rax,%0" : "=m"(newregs->ax));
102 asm volatile("movq %%rsp,%0" : "=m"(newregs->sp));
103 asm volatile("movq %%r8,%0" : "=m"(newregs->r8));
104 asm volatile("movq %%r9,%0" : "=m"(newregs->r9));
105 asm volatile("movq %%r10,%0" : "=m"(newregs->r10));
106 asm volatile("movq %%r11,%0" : "=m"(newregs->r11));
107 asm volatile("movq %%r12,%0" : "=m"(newregs->r12));
108 asm volatile("movq %%r13,%0" : "=m"(newregs->r13));
109 asm volatile("movq %%r14,%0" : "=m"(newregs->r14));
110 asm volatile("movq %%r15,%0" : "=m"(newregs->r15));
111 asm volatile("movl %%ss, %%eax;" :"=a"(newregs->ss));
112 asm volatile("movl %%cs, %%eax;" :"=a"(newregs->cs));
113 asm volatile("pushfq; popq %0" :"=m"(newregs->flags));
114#endif
115 newregs->ip = _THIS_IP_;
116 }
117}
118
119#ifdef CONFIG_X86_32
120asmlinkage unsigned long
121relocate_kernel(unsigned long indirection_page,
122 unsigned long control_page,
123 unsigned long start_address,
124 unsigned int has_pae,
125 unsigned int preserve_context);
126#else
127unsigned long
128relocate_kernel(unsigned long indirection_page,
129 unsigned long page_list,
130 unsigned long start_address,
131 unsigned int preserve_context,
132 unsigned int host_mem_enc_active);
133#endif
134
135#define ARCH_HAS_KIMAGE_ARCH
136
137#ifdef CONFIG_X86_32
138struct kimage_arch {
139 pgd_t *pgd;
140#ifdef CONFIG_X86_PAE
141 pmd_t *pmd0;
142 pmd_t *pmd1;
143#endif
144 pte_t *pte0;
145 pte_t *pte1;
146};
147#else
148struct kimage_arch {
149 p4d_t *p4d;
150 pud_t *pud;
151 pmd_t *pmd;
152 pte_t *pte;
153};
154#endif /* CONFIG_X86_32 */
155
156#ifdef CONFIG_X86_64
157/*
158 * Number of elements and order of elements in this structure should match
159 * with the ones in arch/x86/purgatory/entry64.S. If you make a change here
160 * make an appropriate change in purgatory too.
161 */
162struct kexec_entry64_regs {
163 uint64_t rax;
164 uint64_t rcx;
165 uint64_t rdx;
166 uint64_t rbx;
167 uint64_t rsp;
168 uint64_t rbp;
169 uint64_t rsi;
170 uint64_t rdi;
171 uint64_t r8;
172 uint64_t r9;
173 uint64_t r10;
174 uint64_t r11;
175 uint64_t r12;
176 uint64_t r13;
177 uint64_t r14;
178 uint64_t r15;
179 uint64_t rip;
180};
181
182extern int arch_kexec_post_alloc_pages(void *vaddr, unsigned int pages,
183 gfp_t gfp);
184#define arch_kexec_post_alloc_pages arch_kexec_post_alloc_pages
185
186extern void arch_kexec_pre_free_pages(void *vaddr, unsigned int pages);
187#define arch_kexec_pre_free_pages arch_kexec_pre_free_pages
188
189void arch_kexec_protect_crashkres(void);
190#define arch_kexec_protect_crashkres arch_kexec_protect_crashkres
191
192void arch_kexec_unprotect_crashkres(void);
193#define arch_kexec_unprotect_crashkres arch_kexec_unprotect_crashkres
194
195#ifdef CONFIG_KEXEC_FILE
196struct purgatory_info;
197int arch_kexec_apply_relocations_add(struct purgatory_info *pi,
198 Elf_Shdr *section,
199 const Elf_Shdr *relsec,
200 const Elf_Shdr *symtab);
201#define arch_kexec_apply_relocations_add arch_kexec_apply_relocations_add
202
203void *arch_kexec_kernel_image_load(struct kimage *image);
204#define arch_kexec_kernel_image_load arch_kexec_kernel_image_load
205
206int arch_kimage_file_post_load_cleanup(struct kimage *image);
207#define arch_kimage_file_post_load_cleanup arch_kimage_file_post_load_cleanup
208#endif
209#endif
210
211typedef void crash_vmclear_fn(void);
212extern crash_vmclear_fn __rcu *crash_vmclear_loaded_vmcss;
213extern void kdump_nmi_shootdown_cpus(void);
214
215#endif /* __ASSEMBLY__ */
216
217#endif /* _ASM_X86_KEXEC_H */
1/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef _ASM_X86_KEXEC_H
3#define _ASM_X86_KEXEC_H
4
5#ifdef CONFIG_X86_32
6# define PA_CONTROL_PAGE 0
7# define VA_CONTROL_PAGE 1
8# define PA_PGD 2
9# define PA_SWAP_PAGE 3
10# define PAGES_NR 4
11#else
12# define PA_CONTROL_PAGE 0
13# define VA_CONTROL_PAGE 1
14# define PA_TABLE_PAGE 2
15# define PA_SWAP_PAGE 3
16# define PAGES_NR 4
17#endif
18
19# define KEXEC_CONTROL_CODE_MAX_SIZE 2048
20
21#ifndef __ASSEMBLY__
22
23#include <linux/string.h>
24
25#include <asm/page.h>
26#include <asm/ptrace.h>
27#include <asm/bootparam.h>
28
29struct kimage;
30
31/*
32 * KEXEC_SOURCE_MEMORY_LIMIT maximum page get_free_page can return.
33 * I.e. Maximum page that is mapped directly into kernel memory,
34 * and kmap is not required.
35 *
36 * So far x86_64 is limited to 40 physical address bits.
37 */
38#ifdef CONFIG_X86_32
39/* Maximum physical address we can use pages from */
40# define KEXEC_SOURCE_MEMORY_LIMIT (-1UL)
41/* Maximum address we can reach in physical address mode */
42# define KEXEC_DESTINATION_MEMORY_LIMIT (-1UL)
43/* Maximum address we can use for the control code buffer */
44# define KEXEC_CONTROL_MEMORY_LIMIT TASK_SIZE
45
46# define KEXEC_CONTROL_PAGE_SIZE 4096
47
48/* The native architecture */
49# define KEXEC_ARCH KEXEC_ARCH_386
50
51/* We can also handle crash dumps from 64 bit kernel. */
52# define vmcore_elf_check_arch_cross(x) ((x)->e_machine == EM_X86_64)
53#else
54/* Maximum physical address we can use pages from */
55# define KEXEC_SOURCE_MEMORY_LIMIT (MAXMEM-1)
56/* Maximum address we can reach in physical address mode */
57# define KEXEC_DESTINATION_MEMORY_LIMIT (MAXMEM-1)
58/* Maximum address we can use for the control pages */
59# define KEXEC_CONTROL_MEMORY_LIMIT (MAXMEM-1)
60
61/* Allocate one page for the pdp and the second for the code */
62# define KEXEC_CONTROL_PAGE_SIZE (4096UL + 4096UL)
63
64/* The native architecture */
65# define KEXEC_ARCH KEXEC_ARCH_X86_64
66#endif
67
68/* Memory to backup during crash kdump */
69#define KEXEC_BACKUP_SRC_START (0UL)
70#define KEXEC_BACKUP_SRC_END (640 * 1024UL) /* 640K */
71
72/*
73 * CPU does not save ss and sp on stack if execution is already
74 * running in kernel mode at the time of NMI occurrence. This code
75 * fixes it.
76 */
77static inline void crash_fixup_ss_esp(struct pt_regs *newregs,
78 struct pt_regs *oldregs)
79{
80#ifdef CONFIG_X86_32
81 newregs->sp = (unsigned long)&(oldregs->sp);
82 asm volatile("xorl %%eax, %%eax\n\t"
83 "movw %%ss, %%ax\n\t"
84 :"=a"(newregs->ss));
85#endif
86}
87
88/*
89 * This function is responsible for capturing register states if coming
90 * via panic otherwise just fix up the ss and sp if coming via kernel
91 * mode exception.
92 */
93static inline void crash_setup_regs(struct pt_regs *newregs,
94 struct pt_regs *oldregs)
95{
96 if (oldregs) {
97 memcpy(newregs, oldregs, sizeof(*newregs));
98 crash_fixup_ss_esp(newregs, oldregs);
99 } else {
100#ifdef CONFIG_X86_32
101 asm volatile("movl %%ebx,%0" : "=m"(newregs->bx));
102 asm volatile("movl %%ecx,%0" : "=m"(newregs->cx));
103 asm volatile("movl %%edx,%0" : "=m"(newregs->dx));
104 asm volatile("movl %%esi,%0" : "=m"(newregs->si));
105 asm volatile("movl %%edi,%0" : "=m"(newregs->di));
106 asm volatile("movl %%ebp,%0" : "=m"(newregs->bp));
107 asm volatile("movl %%eax,%0" : "=m"(newregs->ax));
108 asm volatile("movl %%esp,%0" : "=m"(newregs->sp));
109 asm volatile("movl %%ss, %%eax;" :"=a"(newregs->ss));
110 asm volatile("movl %%cs, %%eax;" :"=a"(newregs->cs));
111 asm volatile("movl %%ds, %%eax;" :"=a"(newregs->ds));
112 asm volatile("movl %%es, %%eax;" :"=a"(newregs->es));
113 asm volatile("pushfl; popl %0" :"=m"(newregs->flags));
114#else
115 asm volatile("movq %%rbx,%0" : "=m"(newregs->bx));
116 asm volatile("movq %%rcx,%0" : "=m"(newregs->cx));
117 asm volatile("movq %%rdx,%0" : "=m"(newregs->dx));
118 asm volatile("movq %%rsi,%0" : "=m"(newregs->si));
119 asm volatile("movq %%rdi,%0" : "=m"(newregs->di));
120 asm volatile("movq %%rbp,%0" : "=m"(newregs->bp));
121 asm volatile("movq %%rax,%0" : "=m"(newregs->ax));
122 asm volatile("movq %%rsp,%0" : "=m"(newregs->sp));
123 asm volatile("movq %%r8,%0" : "=m"(newregs->r8));
124 asm volatile("movq %%r9,%0" : "=m"(newregs->r9));
125 asm volatile("movq %%r10,%0" : "=m"(newregs->r10));
126 asm volatile("movq %%r11,%0" : "=m"(newregs->r11));
127 asm volatile("movq %%r12,%0" : "=m"(newregs->r12));
128 asm volatile("movq %%r13,%0" : "=m"(newregs->r13));
129 asm volatile("movq %%r14,%0" : "=m"(newregs->r14));
130 asm volatile("movq %%r15,%0" : "=m"(newregs->r15));
131 asm volatile("movl %%ss, %%eax;" :"=a"(newregs->ss));
132 asm volatile("movl %%cs, %%eax;" :"=a"(newregs->cs));
133 asm volatile("pushfq; popq %0" :"=m"(newregs->flags));
134#endif
135 newregs->ip = (unsigned long)current_text_addr();
136 }
137}
138
139#ifdef CONFIG_X86_32
140asmlinkage unsigned long
141relocate_kernel(unsigned long indirection_page,
142 unsigned long control_page,
143 unsigned long start_address,
144 unsigned int has_pae,
145 unsigned int preserve_context);
146#else
147unsigned long
148relocate_kernel(unsigned long indirection_page,
149 unsigned long page_list,
150 unsigned long start_address,
151 unsigned int preserve_context,
152 unsigned int sme_active);
153#endif
154
155#define ARCH_HAS_KIMAGE_ARCH
156
157#ifdef CONFIG_X86_32
158struct kimage_arch {
159 pgd_t *pgd;
160#ifdef CONFIG_X86_PAE
161 pmd_t *pmd0;
162 pmd_t *pmd1;
163#endif
164 pte_t *pte0;
165 pte_t *pte1;
166};
167#else
168struct kimage_arch {
169 p4d_t *p4d;
170 pud_t *pud;
171 pmd_t *pmd;
172 pte_t *pte;
173 /* Details of backup region */
174 unsigned long backup_src_start;
175 unsigned long backup_src_sz;
176
177 /* Physical address of backup segment */
178 unsigned long backup_load_addr;
179
180 /* Core ELF header buffer */
181 void *elf_headers;
182 unsigned long elf_headers_sz;
183 unsigned long elf_load_addr;
184};
185#endif /* CONFIG_X86_32 */
186
187#ifdef CONFIG_X86_64
188/*
189 * Number of elements and order of elements in this structure should match
190 * with the ones in arch/x86/purgatory/entry64.S. If you make a change here
191 * make an appropriate change in purgatory too.
192 */
193struct kexec_entry64_regs {
194 uint64_t rax;
195 uint64_t rcx;
196 uint64_t rdx;
197 uint64_t rbx;
198 uint64_t rsp;
199 uint64_t rbp;
200 uint64_t rsi;
201 uint64_t rdi;
202 uint64_t r8;
203 uint64_t r9;
204 uint64_t r10;
205 uint64_t r11;
206 uint64_t r12;
207 uint64_t r13;
208 uint64_t r14;
209 uint64_t r15;
210 uint64_t rip;
211};
212
213extern int arch_kexec_post_alloc_pages(void *vaddr, unsigned int pages,
214 gfp_t gfp);
215#define arch_kexec_post_alloc_pages arch_kexec_post_alloc_pages
216
217extern void arch_kexec_pre_free_pages(void *vaddr, unsigned int pages);
218#define arch_kexec_pre_free_pages arch_kexec_pre_free_pages
219
220#endif
221
222typedef void crash_vmclear_fn(void);
223extern crash_vmclear_fn __rcu *crash_vmclear_loaded_vmcss;
224extern void kdump_nmi_shootdown_cpus(void);
225
226#endif /* __ASSEMBLY__ */
227
228#endif /* _ASM_X86_KEXEC_H */