blob: 0c319d09378ddef5ce932d52726ca746e69a75b4 [file] [log] [blame]
David Brazdil0f672f62019-12-10 10:32:29 +00001// SPDX-License-Identifier: GPL-2.0-only
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002/*
3 * Architecture specific (i386/x86_64) functions for kexec based crash dumps.
4 *
5 * Created by: Hariprasad Nellitheertha (hari@in.ibm.com)
6 *
7 * Copyright (C) IBM Corporation, 2004. All rights reserved.
8 * Copyright (C) Red Hat Inc., 2014. All rights reserved.
9 * Authors:
10 * Vivek Goyal <vgoyal@redhat.com>
11 *
12 */
13
14#define pr_fmt(fmt) "kexec: " fmt
15
16#include <linux/types.h>
17#include <linux/kernel.h>
18#include <linux/smp.h>
19#include <linux/reboot.h>
20#include <linux/kexec.h>
21#include <linux/delay.h>
22#include <linux/elf.h>
23#include <linux/elfcore.h>
24#include <linux/export.h>
25#include <linux/slab.h>
26#include <linux/vmalloc.h>
Olivier Deprez0e641232021-09-23 10:07:05 +020027#include <linux/memblock.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000028
29#include <asm/processor.h>
30#include <asm/hardirq.h>
31#include <asm/nmi.h>
32#include <asm/hw_irq.h>
33#include <asm/apic.h>
34#include <asm/e820/types.h>
35#include <asm/io_apic.h>
36#include <asm/hpet.h>
37#include <linux/kdebug.h>
38#include <asm/cpu.h>
39#include <asm/reboot.h>
40#include <asm/virtext.h>
41#include <asm/intel_pt.h>
David Brazdil0f672f62019-12-10 10:32:29 +000042#include <asm/crash.h>
Olivier Deprez0e641232021-09-23 10:07:05 +020043#include <asm/cmdline.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000044
45/* Used while preparing memory map entries for second kernel */
46struct crash_memmap_data {
47 struct boot_params *params;
48 /* Type of memory */
49 unsigned int type;
50};
51
52/*
53 * This is used to VMCLEAR all VMCSs loaded on the
54 * processor. And when loading kvm_intel module, the
55 * callback function pointer will be assigned.
56 *
57 * protected by rcu.
58 */
59crash_vmclear_fn __rcu *crash_vmclear_loaded_vmcss = NULL;
60EXPORT_SYMBOL_GPL(crash_vmclear_loaded_vmcss);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000061
62static inline void cpu_crash_vmclear_loaded_vmcss(void)
63{
64 crash_vmclear_fn *do_vmclear_operation = NULL;
65
66 rcu_read_lock();
67 do_vmclear_operation = rcu_dereference(crash_vmclear_loaded_vmcss);
68 if (do_vmclear_operation)
69 do_vmclear_operation();
70 rcu_read_unlock();
71}
72
Olivier Deprez0e641232021-09-23 10:07:05 +020073/*
74 * When the crashkernel option is specified, only use the low
75 * 1M for the real mode trampoline.
76 */
77void __init crash_reserve_low_1M(void)
78{
79 if (cmdline_find_option(boot_command_line, "crashkernel", NULL, 0) < 0)
80 return;
81
82 memblock_reserve(0, 1<<20);
83 pr_info("Reserving the low 1M of memory for crashkernel\n");
84}
85
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000086#if defined(CONFIG_SMP) && defined(CONFIG_X86_LOCAL_APIC)
87
88static void kdump_nmi_callback(int cpu, struct pt_regs *regs)
89{
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000090 crash_save_cpu(regs, cpu);
91
92 /*
93 * VMCLEAR VMCSs loaded on all cpus if needed.
94 */
95 cpu_crash_vmclear_loaded_vmcss();
96
97 /* Disable VMX or SVM if needed.
98 *
99 * We need to disable virtualization on all CPUs.
100 * Having VMX or SVM enabled on any CPU may break rebooting
101 * after the kdump kernel has finished its task.
102 */
103 cpu_emergency_vmxoff();
104 cpu_emergency_svm_disable();
105
106 /*
107 * Disable Intel PT to stop its logging
108 */
109 cpu_emergency_stop_pt();
110
111 disable_local_APIC();
112}
113
114void kdump_nmi_shootdown_cpus(void)
115{
116 nmi_shootdown_cpus(kdump_nmi_callback);
117
118 disable_local_APIC();
119}
120
121/* Override the weak function in kernel/panic.c */
122void crash_smp_send_stop(void)
123{
124 static int cpus_stopped;
125
126 if (cpus_stopped)
127 return;
128
129 if (smp_ops.crash_stop_other_cpus)
130 smp_ops.crash_stop_other_cpus();
131 else
132 smp_send_stop();
133
134 cpus_stopped = 1;
135}
136
137#else
138void crash_smp_send_stop(void)
139{
140 /* There are no cpus to shootdown */
141}
142#endif
143
144void native_machine_crash_shutdown(struct pt_regs *regs)
145{
146 /* This function is only called after the system
147 * has panicked or is otherwise in a critical state.
148 * The minimum amount of code to allow a kexec'd kernel
149 * to run successfully needs to happen here.
150 *
151 * In practice this means shooting down the other cpus in
152 * an SMP system.
153 */
154 /* The kernel is broken so disable interrupts */
155 local_irq_disable();
156
157 crash_smp_send_stop();
158
159 /*
160 * VMCLEAR VMCSs loaded on this cpu if needed.
161 */
162 cpu_crash_vmclear_loaded_vmcss();
163
164 /* Booting kdump kernel with VMX or SVM enabled won't work,
165 * because (among other limitations) we can't disable paging
166 * with the virt flags.
167 */
168 cpu_emergency_vmxoff();
169 cpu_emergency_svm_disable();
170
171 /*
172 * Disable Intel PT to stop its logging
173 */
174 cpu_emergency_stop_pt();
175
176#ifdef CONFIG_X86_IO_APIC
177 /* Prevent crash_kexec() from deadlocking on ioapic_lock. */
178 ioapic_zap_locks();
179 clear_IO_APIC();
180#endif
181 lapic_shutdown();
182 restore_boot_irq_mode();
183#ifdef CONFIG_HPET_TIMER
184 hpet_disable();
185#endif
186 crash_save_cpu(regs, safe_smp_processor_id());
187}
188
189#ifdef CONFIG_KEXEC_FILE
David Brazdil0f672f62019-12-10 10:32:29 +0000190
191static unsigned long crash_zero_bytes;
192
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000193static int get_nr_ram_ranges_callback(struct resource *res, void *arg)
194{
195 unsigned int *nr_ranges = arg;
196
197 (*nr_ranges)++;
198 return 0;
199}
200
201/* Gather all the required information to prepare elf headers for ram regions */
202static struct crash_mem *fill_up_crash_elf_data(void)
203{
204 unsigned int nr_ranges = 0;
205 struct crash_mem *cmem;
206
207 walk_system_ram_res(0, -1, &nr_ranges,
208 get_nr_ram_ranges_callback);
209 if (!nr_ranges)
210 return NULL;
211
212 /*
213 * Exclusion of crash region and/or crashk_low_res may cause
214 * another range split. So add extra two slots here.
215 */
216 nr_ranges += 2;
David Brazdil0f672f62019-12-10 10:32:29 +0000217 cmem = vzalloc(struct_size(cmem, ranges, nr_ranges));
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000218 if (!cmem)
219 return NULL;
220
221 cmem->max_nr_ranges = nr_ranges;
222 cmem->nr_ranges = 0;
223
224 return cmem;
225}
226
227/*
228 * Look for any unwanted ranges between mstart, mend and remove them. This
229 * might lead to split and split ranges are put in cmem->ranges[] array
230 */
231static int elf_header_exclude_ranges(struct crash_mem *cmem)
232{
233 int ret = 0;
234
235 /* Exclude crashkernel region */
236 ret = crash_exclude_mem_range(cmem, crashk_res.start, crashk_res.end);
237 if (ret)
238 return ret;
239
240 if (crashk_low_res.end) {
241 ret = crash_exclude_mem_range(cmem, crashk_low_res.start,
242 crashk_low_res.end);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000243 }
244
245 return ret;
246}
247
248static int prepare_elf64_ram_headers_callback(struct resource *res, void *arg)
249{
250 struct crash_mem *cmem = arg;
251
252 cmem->ranges[cmem->nr_ranges].start = res->start;
253 cmem->ranges[cmem->nr_ranges].end = res->end;
254 cmem->nr_ranges++;
255
256 return 0;
257}
258
259/* Prepare elf headers. Return addr and size */
260static int prepare_elf_headers(struct kimage *image, void **addr,
261 unsigned long *sz)
262{
263 struct crash_mem *cmem;
264 Elf64_Ehdr *ehdr;
265 Elf64_Phdr *phdr;
266 int ret, i;
267
268 cmem = fill_up_crash_elf_data();
269 if (!cmem)
270 return -ENOMEM;
271
272 ret = walk_system_ram_res(0, -1, cmem,
273 prepare_elf64_ram_headers_callback);
274 if (ret)
275 goto out;
276
277 /* Exclude unwanted mem ranges */
278 ret = elf_header_exclude_ranges(cmem);
279 if (ret)
280 goto out;
281
282 /* By default prepare 64bit headers */
283 ret = crash_prepare_elf64_headers(cmem,
284 IS_ENABLED(CONFIG_X86_64), addr, sz);
285 if (ret)
286 goto out;
287
288 /*
289 * If a range matches backup region, adjust offset to backup
290 * segment.
291 */
292 ehdr = (Elf64_Ehdr *)*addr;
293 phdr = (Elf64_Phdr *)(ehdr + 1);
294 for (i = 0; i < ehdr->e_phnum; phdr++, i++)
295 if (phdr->p_type == PT_LOAD &&
296 phdr->p_paddr == image->arch.backup_src_start &&
297 phdr->p_memsz == image->arch.backup_src_sz) {
298 phdr->p_offset = image->arch.backup_load_addr;
299 break;
300 }
301out:
302 vfree(cmem);
303 return ret;
304}
305
306static int add_e820_entry(struct boot_params *params, struct e820_entry *entry)
307{
308 unsigned int nr_e820_entries;
309
310 nr_e820_entries = params->e820_entries;
311 if (nr_e820_entries >= E820_MAX_ENTRIES_ZEROPAGE)
312 return 1;
313
314 memcpy(&params->e820_table[nr_e820_entries], entry,
315 sizeof(struct e820_entry));
316 params->e820_entries++;
317 return 0;
318}
319
320static int memmap_entry_callback(struct resource *res, void *arg)
321{
322 struct crash_memmap_data *cmd = arg;
323 struct boot_params *params = cmd->params;
324 struct e820_entry ei;
325
326 ei.addr = res->start;
327 ei.size = resource_size(res);
328 ei.type = cmd->type;
329 add_e820_entry(params, &ei);
330
331 return 0;
332}
333
334static int memmap_exclude_ranges(struct kimage *image, struct crash_mem *cmem,
335 unsigned long long mstart,
336 unsigned long long mend)
337{
338 unsigned long start, end;
339 int ret = 0;
340
341 cmem->ranges[0].start = mstart;
342 cmem->ranges[0].end = mend;
343 cmem->nr_ranges = 1;
344
345 /* Exclude Backup region */
346 start = image->arch.backup_load_addr;
347 end = start + image->arch.backup_src_sz - 1;
348 ret = crash_exclude_mem_range(cmem, start, end);
349 if (ret)
350 return ret;
351
352 /* Exclude elf header region */
353 start = image->arch.elf_load_addr;
354 end = start + image->arch.elf_headers_sz - 1;
355 return crash_exclude_mem_range(cmem, start, end);
356}
357
358/* Prepare memory map for crash dump kernel */
359int crash_setup_memmap_entries(struct kimage *image, struct boot_params *params)
360{
361 int i, ret = 0;
362 unsigned long flags;
363 struct e820_entry ei;
364 struct crash_memmap_data cmd;
365 struct crash_mem *cmem;
366
Olivier Deprez0e641232021-09-23 10:07:05 +0200367 cmem = vzalloc(struct_size(cmem, ranges, 1));
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000368 if (!cmem)
369 return -ENOMEM;
370
371 memset(&cmd, 0, sizeof(struct crash_memmap_data));
372 cmd.params = params;
373
374 /* Add first 640K segment */
375 ei.addr = image->arch.backup_src_start;
376 ei.size = image->arch.backup_src_sz;
377 ei.type = E820_TYPE_RAM;
378 add_e820_entry(params, &ei);
379
380 /* Add ACPI tables */
381 cmd.type = E820_TYPE_ACPI;
382 flags = IORESOURCE_MEM | IORESOURCE_BUSY;
383 walk_iomem_res_desc(IORES_DESC_ACPI_TABLES, flags, 0, -1, &cmd,
384 memmap_entry_callback);
385
386 /* Add ACPI Non-volatile Storage */
387 cmd.type = E820_TYPE_NVS;
388 walk_iomem_res_desc(IORES_DESC_ACPI_NV_STORAGE, flags, 0, -1, &cmd,
389 memmap_entry_callback);
390
David Brazdil0f672f62019-12-10 10:32:29 +0000391 /* Add e820 reserved ranges */
392 cmd.type = E820_TYPE_RESERVED;
393 flags = IORESOURCE_MEM;
394 walk_iomem_res_desc(IORES_DESC_RESERVED, flags, 0, -1, &cmd,
395 memmap_entry_callback);
396
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000397 /* Add crashk_low_res region */
398 if (crashk_low_res.end) {
399 ei.addr = crashk_low_res.start;
400 ei.size = crashk_low_res.end - crashk_low_res.start + 1;
401 ei.type = E820_TYPE_RAM;
402 add_e820_entry(params, &ei);
403 }
404
405 /* Exclude some ranges from crashk_res and add rest to memmap */
406 ret = memmap_exclude_ranges(image, cmem, crashk_res.start,
407 crashk_res.end);
408 if (ret)
409 goto out;
410
411 for (i = 0; i < cmem->nr_ranges; i++) {
412 ei.size = cmem->ranges[i].end - cmem->ranges[i].start + 1;
413
414 /* If entry is less than a page, skip it */
415 if (ei.size < PAGE_SIZE)
416 continue;
417 ei.addr = cmem->ranges[i].start;
418 ei.type = E820_TYPE_RAM;
419 add_e820_entry(params, &ei);
420 }
421
422out:
423 vfree(cmem);
424 return ret;
425}
426
427static int determine_backup_region(struct resource *res, void *arg)
428{
429 struct kimage *image = arg;
430
431 image->arch.backup_src_start = res->start;
432 image->arch.backup_src_sz = resource_size(res);
433
434 /* Expecting only one range for backup region */
435 return 1;
436}
437
438int crash_load_segments(struct kimage *image)
439{
440 int ret;
441 struct kexec_buf kbuf = { .image = image, .buf_min = 0,
442 .buf_max = ULONG_MAX, .top_down = false };
443
444 /*
445 * Determine and load a segment for backup area. First 640K RAM
446 * region is backup source
447 */
448
449 ret = walk_system_ram_res(KEXEC_BACKUP_SRC_START, KEXEC_BACKUP_SRC_END,
450 image, determine_backup_region);
451
452 /* Zero or postive return values are ok */
453 if (ret < 0)
454 return ret;
455
456 /* Add backup segment. */
457 if (image->arch.backup_src_sz) {
458 kbuf.buffer = &crash_zero_bytes;
459 kbuf.bufsz = sizeof(crash_zero_bytes);
460 kbuf.memsz = image->arch.backup_src_sz;
461 kbuf.buf_align = PAGE_SIZE;
462 /*
463 * Ideally there is no source for backup segment. This is
464 * copied in purgatory after crash. Just add a zero filled
465 * segment for now to make sure checksum logic works fine.
466 */
467 ret = kexec_add_buffer(&kbuf);
468 if (ret)
469 return ret;
470 image->arch.backup_load_addr = kbuf.mem;
471 pr_debug("Loaded backup region at 0x%lx backup_start=0x%lx memsz=0x%lx\n",
472 image->arch.backup_load_addr,
473 image->arch.backup_src_start, kbuf.memsz);
474 }
475
476 /* Prepare elf headers and add a segment */
477 ret = prepare_elf_headers(image, &kbuf.buffer, &kbuf.bufsz);
478 if (ret)
479 return ret;
480
481 image->arch.elf_headers = kbuf.buffer;
482 image->arch.elf_headers_sz = kbuf.bufsz;
483
484 kbuf.memsz = kbuf.bufsz;
485 kbuf.buf_align = ELF_CORE_HEADER_ALIGN;
David Brazdil0f672f62019-12-10 10:32:29 +0000486 kbuf.mem = KEXEC_BUF_MEM_UNKNOWN;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000487 ret = kexec_add_buffer(&kbuf);
488 if (ret) {
489 vfree((void *)image->arch.elf_headers);
490 return ret;
491 }
492 image->arch.elf_load_addr = kbuf.mem;
493 pr_debug("Loaded ELF headers at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
494 image->arch.elf_load_addr, kbuf.bufsz, kbuf.bufsz);
495
496 return ret;
497}
498#endif /* CONFIG_KEXEC_FILE */