diff mbox

[v24,5/9] arm64: kdump: add kdump support

Message ID 20160809015615.28527-3-takahiro.akashi@linaro.org
State Superseded
Headers show

Commit Message

AKASHI Takahiro Aug. 9, 2016, 1:56 a.m. UTC
On crash dump kernel, all the information about primary kernel's system
memory (core image) is available in elf core header.
The primary kernel will set aside this header with reserve_elfcorehdr()
at boot time and inform crash dump kernel of its location via a new
device-tree property, "linux,elfcorehdr".

Please note that all other architectures use traditional "elfcorehdr="
kernel parameter for this purpose.

Then crash dump kernel will access the primary kernel's memory with
copy_oldmem_page(), which reads one page by ioremap'ing it since it does
not reside in linear mapping on crash dump kernel.

We also need our own elfcorehdr_read() here since the header is placed
within crash dump kernel's usable memory.

Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>

---
 arch/arm64/Kconfig             | 11 +++++++
 arch/arm64/kernel/Makefile     |  1 +
 arch/arm64/kernel/crash_dump.c | 71 ++++++++++++++++++++++++++++++++++++++++++
 arch/arm64/mm/init.c           | 54 ++++++++++++++++++++++++++++++++
 4 files changed, 137 insertions(+)
 create mode 100644 arch/arm64/kernel/crash_dump.c

-- 
2.9.0


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

Comments

AKASHI Takahiro Aug. 18, 2016, 7:15 a.m. UTC | #1
Hi James, Pratyush,

Thank you for your testing and reporting an issue.
I've been on vacation until yesterday.

On Wed, Aug 10, 2016 at 05:38:05PM +0100, James Morse wrote:
> Hi Akashi,

> 

> On 09/08/16 02:56, AKASHI Takahiro wrote:

> > On crash dump kernel, all the information about primary kernel's system

> > memory (core image) is available in elf core header.

> > The primary kernel will set aside this header with reserve_elfcorehdr()

> > at boot time and inform crash dump kernel of its location via a new

> > device-tree property, "linux,elfcorehdr".

> > 

> > Please note that all other architectures use traditional "elfcorehdr="

> > kernel parameter for this purpose.

> > 

> > Then crash dump kernel will access the primary kernel's memory with

> > copy_oldmem_page(), which reads one page by ioremap'ing it since it does

> > not reside in linear mapping on crash dump kernel.

> > 

> > We also need our own elfcorehdr_read() here since the header is placed

> > within crash dump kernel's usable memory.

> 

> On Seattle when I panic and boot the kdump kernel, I am unable to read the

> /proc/vmcore file. Instead I get:

> nanook@frikadeller:~$ sudo cp /proc/vmcore /

> [  174.393875] Unhandled fault: synchronous external abort (0x96000210) at

> 0xffffff80096b6000

> [  174.402158] Internal error: : 96000210 [#1] PREEMPT SMP

> [  174.407370] Modules linked in:

> [  174.410417] CPU: 6 PID: 2059 Comm: cp Tainted: G S      W I     4.8.0-rc1+ #4708

> [  174.417799] Hardware name: AMD Overdrive/Supercharger/Default string, BIOS

> ROD1002C 04/08/2016

> [  174.426396] task: ffffffc0fdec5780 task.stack: ffffffc0f34bc000

> [  174.432313] PC is at __arch_copy_to_user+0x180/0x280

> [  174.437274] LR is at copy_oldmem_page+0xac/0xf0

> [  174.441791] pc : [<ffffff800835e080>] lr : [<ffffff8008095b9c>] pstate: 20000145

> [  174.449173] sp : ffffffc0f34bfc90

> [  174.452474] x29: ffffffc0f34bfc90 x28: 0000000000000000

> [  174.457776] x27: 0000000008000000 x26: 000000000000d000

> [  174.463077] x25: 0000000000000001 x24: ffffff8008eb5000

> [  174.468378] x23: 0000000000000000 x22: ffffff80096b6000

> [  174.473679] x21: 0000000000000001 x20: 0000000030127000

> [  174.478979] x19: 0000000000001000 x18: 0000007ff7085d60

> [  174.484279] x17: 0000000000429358 x16: ffffff80081d9e88

> [  174.489579] x15: 0000007fae377590 x14: 0000000000000000

> [  174.494880] x13: 0000000000000000 x12: ffffff8008dd1000

> [  174.500180] x11: ffffff80096b6fff x10: ffffff80096b6fff

> [  174.505480] x9 : 0000000040000000 x8 : ffffff8008db6000

> [  174.510781] x7 : ffffff80096b7000 x6 : 0000000030127000

> [  174.516082] x5 : 0000000030128000 x4 : 0000000000000000

> [  174.521382] x3 : 00e8000000000713 x2 : 0000000000000f80

> [  174.526682] x1 : ffffff80096b6000 x0 : 0000000030127000

> [  174.531982]

> [  174.533461] Process cp (pid: 2059, stack limit = 0xffffffc0f34bc020)

> 

> [  174.848448] [<ffffff800835e080>] __arch_copy_to_user+0x180/0x280

> [  174.854448] [<ffffff8008245f34>] read_from_oldmem.part.4+0xb4/0xf4

> [  174.860615] [<ffffff8008246074>] read_vmcore+0x100/0x22c

> [  174.865919] [<ffffff8008239378>] proc_reg_read+0x64/0x90

> [  174.871223] [<ffffff80081d7da8>] __vfs_read+0x28/0x108

> [  174.876348] [<ffffff80081d8ae4>] vfs_read+0x84/0x144

> [  174.881301] [<ffffff80081d9ecc>] SyS_read+0x44/0xa0

> [  174.886167] [<ffffff8008082ef0>] el0_svc_naked+0x24/0x28

> [  174.891466] Code: 00000000 00000000 00000000 00000000 (a8c12027)

> [  174.897562] ---[ end trace 00801b2e35b0cd1f ]---

> 

> 

> The offending call is:

> > copy_oldmem_page(0x8000000, 0x00000000385f8000, 0x1000, 0, 1)

> 

> This is trying to access the bottom page of memory. From the efi memory map:

> > efi:   0x008000000000-0x008001e7ffff [Runtime Data       |RUN|  |WB|WT|WC|UC]*

> > efi:   0x008001e80000-0x008001ffffff [Conventional Memory|   |  |WB|WT|WC|UC]

> 

> This page is 'Runtime Data', and marked as nomap by both the original and kdump

> kernels, but copy_oldmem_page() doesn't know this.

> 

> In this case because we have already parsed the efi memory map again in the

> kdump kernel and re-marked these regions as nomap, the below hunk fixes the

> problem for me:

> =========================%<=========================

> diff --git a/arch/arm64/kernel/crash_dump.c b/arch/arm64/kernel/crash_dump.c

> index 2dc54d129be1..784d4c30b534 100644

> --- a/arch/arm64/kernel/crash_dump.c

> +++ b/arch/arm64/kernel/crash_dump.c

> @@ -37,6 +37,11 @@ ssize_t copy_oldmem_page(unsigned long pfn, char *buf,

>         if (!csize)

>                 return 0;

> 

> +       if (memblock_is_memory(pfn << PAGE_SHIFT) &&

> +           !memblock_is_map_memory(pfn << PAGE_SHIFT))

> +               /* skip this nomap memory region, reserved by firmware */

> +               return 0;

> +

>         vaddr = ioremap_cache(__pfn_to_phys(pfn), PAGE_SIZE);


Here I'm wandering why my original code doesn't work.
If !memblock_is_map_memory(), ioremap_cache() would call __ioremap_caller()
and return a valid virtual address mapped in vmalloc area.

>         if (!vaddr)

>                 return -ENOMEM;

> =========================%<=========================

> 

> With this I can copy the vmcore file, and feed it to crash to read dmesg, task

> list etc...

> 

> This could be a deeper/wider issue, but I can't see any other users of

> memblock_mark_nomap().

> Do you think depending on this this 're-learning' is robust enough, or should

> the nomap ranges be described in the vmcoreinfo elf notes?


The current kexec-tools identifies all the memory regions from
/proc/iomem and there is no way for user space tools to distinguish
"EFI runtime data," or any other nomap memory, from normal "System RAM"
because all those resources are currently marked as "System RAM."

So I think that such regions should be marked as, say, "reserved,"
so that we can exclude those memories from a crush dump file.

(I don't know whether this change may have a backward-compatibility
problem.)

-Takahiro AKASHI

> 

> Thanks,

> 

> James

> 

> 

> > diff --git a/arch/arm64/kernel/crash_dump.c b/arch/arm64/kernel/crash_dump.c

> > new file mode 100644

> > index 0000000..2dc54d1

> > --- /dev/null

> > +++ b/arch/arm64/kernel/crash_dump.c

> > @@ -0,0 +1,71 @@

> > +/*

> > + * Routines for doing kexec-based kdump

> > + *

> > + * Copyright (C) 2014 Linaro Limited

> > + * Author: AKASHI Takahiro <takahiro.akashi@linaro.org>

> > + *

> > + * This program is free software; you can redistribute it and/or modify

> > + * it under the terms of the GNU General Public License version 2 as

> > + * published by the Free Software Foundation.

> > + */

> > +

> > +#include <linux/crash_dump.h>

> > +#include <linux/errno.h>

> > +#include <linux/io.h>

> > +#include <linux/memblock.h>

> > +#include <linux/uaccess.h>

> > +#include <asm/memory.h>

> > +

> > +/**

> > + * copy_oldmem_page() - copy one page from old kernel memory

> > + * @pfn: page frame number to be copied

> > + * @buf: buffer where the copied page is placed

> > + * @csize: number of bytes to copy

> > + * @offset: offset in bytes into the page

> > + * @userbuf: if set, @buf is in a user address space

> > + *

> > + * This function copies one page from old kernel memory into buffer pointed by

> > + * @buf. If @buf is in userspace, set @userbuf to %1. Returns number of bytes

> > + * copied or negative error in case of failure.

> > + */

> > +ssize_t copy_oldmem_page(unsigned long pfn, char *buf,

> > +			 size_t csize, unsigned long offset,

> > +			 int userbuf)

> > +{

> > +	void *vaddr;

> > +

> > +	if (!csize)

> > +		return 0;

> > +

> > +	vaddr = ioremap_cache(__pfn_to_phys(pfn), PAGE_SIZE);

> > +	if (!vaddr)

> > +		return -ENOMEM;

> > +

> > +	if (userbuf) {

> > +		if (copy_to_user(buf, vaddr + offset, csize)) {

> > +			iounmap(vaddr);

> > +			return -EFAULT;

> > +		}

> > +	} else {

> > +		memcpy(buf, vaddr + offset, csize);

> > +	}

> > +

> > +	iounmap(vaddr);

> > +

> > +	return csize;

> > +}

> 


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Ard Biesheuvel Aug. 24, 2016, 2:44 p.m. UTC | #2
On 9 August 2016 at 03:56, AKASHI Takahiro <takahiro.akashi@linaro.org> wrote:
> On crash dump kernel, all the information about primary kernel's system

> memory (core image) is available in elf core header.

> The primary kernel will set aside this header with reserve_elfcorehdr()

> at boot time and inform crash dump kernel of its location via a new

> device-tree property, "linux,elfcorehdr".

>

> Please note that all other architectures use traditional "elfcorehdr="

> kernel parameter for this purpose.

>

> Then crash dump kernel will access the primary kernel's memory with

> copy_oldmem_page(), which reads one page by ioremap'ing it since it does

> not reside in linear mapping on crash dump kernel.

>

> We also need our own elfcorehdr_read() here since the header is placed

> within crash dump kernel's usable memory.

>

> Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>

> ---

>  arch/arm64/Kconfig             | 11 +++++++

>  arch/arm64/kernel/Makefile     |  1 +

>  arch/arm64/kernel/crash_dump.c | 71 ++++++++++++++++++++++++++++++++++++++++++

>  arch/arm64/mm/init.c           | 54 ++++++++++++++++++++++++++++++++

>  4 files changed, 137 insertions(+)

>  create mode 100644 arch/arm64/kernel/crash_dump.c

>

> diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig

> index 69c8787..9ede54b 100644

> --- a/arch/arm64/Kconfig

> +++ b/arch/arm64/Kconfig

> @@ -682,6 +682,17 @@ config KEXEC

>           but it is independent of the system firmware.   And like a reboot

>           you can start any kernel with it, not just Linux.

>

> +config CRASH_DUMP

> +       bool "Build kdump crash kernel"

> +       help

> +         Generate crash dump after being started by kexec. This should

> +         be normally only set in special crash dump kernels which are

> +         loaded in the main kernel with kexec-tools into a specially

> +         reserved region and then later executed after a crash by

> +         kdump/kexec.

> +

> +         For more details see Documentation/kdump/kdump.txt

> +

>  config XEN_DOM0

>         def_bool y

>         depends on XEN

> diff --git a/arch/arm64/kernel/Makefile b/arch/arm64/kernel/Makefile

> index 14f7b65..f1cbfc8 100644

> --- a/arch/arm64/kernel/Makefile

> +++ b/arch/arm64/kernel/Makefile

> @@ -48,6 +48,7 @@ arm64-obj-$(CONFIG_RANDOMIZE_BASE)    += kaslr.o

>  arm64-obj-$(CONFIG_HIBERNATION)                += hibernate.o hibernate-asm.o

>  arm64-obj-$(CONFIG_KEXEC)              += machine_kexec.o relocate_kernel.o    \

>                                            cpu-reset.o

> +arm64-obj-$(CONFIG_CRASH_DUMP)         += crash_dump.o

>

>  obj-y                                  += $(arm64-obj-y) vdso/ probes/

>  obj-m                                  += $(arm64-obj-m)

> diff --git a/arch/arm64/kernel/crash_dump.c b/arch/arm64/kernel/crash_dump.c

> new file mode 100644

> index 0000000..2dc54d1

> --- /dev/null

> +++ b/arch/arm64/kernel/crash_dump.c

> @@ -0,0 +1,71 @@

> +/*

> + * Routines for doing kexec-based kdump

> + *

> + * Copyright (C) 2014 Linaro Limited

> + * Author: AKASHI Takahiro <takahiro.akashi@linaro.org>

> + *

> + * This program is free software; you can redistribute it and/or modify

> + * it under the terms of the GNU General Public License version 2 as

> + * published by the Free Software Foundation.

> + */

> +

> +#include <linux/crash_dump.h>

> +#include <linux/errno.h>

> +#include <linux/io.h>

> +#include <linux/memblock.h>

> +#include <linux/uaccess.h>

> +#include <asm/memory.h>

> +

> +/**

> + * copy_oldmem_page() - copy one page from old kernel memory

> + * @pfn: page frame number to be copied

> + * @buf: buffer where the copied page is placed

> + * @csize: number of bytes to copy

> + * @offset: offset in bytes into the page

> + * @userbuf: if set, @buf is in a user address space

> + *

> + * This function copies one page from old kernel memory into buffer pointed by

> + * @buf. If @buf is in userspace, set @userbuf to %1. Returns number of bytes

> + * copied or negative error in case of failure.

> + */

> +ssize_t copy_oldmem_page(unsigned long pfn, char *buf,

> +                        size_t csize, unsigned long offset,

> +                        int userbuf)

> +{

> +       void *vaddr;

> +

> +       if (!csize)

> +               return 0;

> +

> +       vaddr = ioremap_cache(__pfn_to_phys(pfn), PAGE_SIZE);


Could we please use memremap() here?

> +       if (!vaddr)

> +               return -ENOMEM;

> +

> +       if (userbuf) {

> +               if (copy_to_user(buf, vaddr + offset, csize)) {

> +                       iounmap(vaddr);

> +                       return -EFAULT;

> +               }

> +       } else {

> +               memcpy(buf, vaddr + offset, csize);

> +       }

> +

> +       iounmap(vaddr);


... and memunmap here?

ioremap_cache() is not very well defined, and memremap() has been
introduced specifically to replace it, so I think we should use it in
new code.

Thanks,
Ard.


> +

> +       return csize;

> +}

> +

> +/**

> + * elfcorehdr_read - read from ELF core header

> + * @buf: buffer where the data is placed

> + * @csize: number of bytes to read

> + * @ppos: address in the memory

> + *

> + * This function reads @count bytes from elf core header which exists

> + * on crash dump kernel's memory.

> + */

> +ssize_t elfcorehdr_read(char *buf, size_t count, u64 *ppos)

> +{

> +       memcpy(buf, phys_to_virt((phys_addr_t)*ppos), count);

> +       return count;

> +}

> diff --git a/arch/arm64/mm/init.c b/arch/arm64/mm/init.c

> index e3771c4..bba1e39 100644

> --- a/arch/arm64/mm/init.c

> +++ b/arch/arm64/mm/init.c

> @@ -36,6 +36,7 @@

>  #include <linux/efi.h>

>  #include <linux/swiotlb.h>

>  #include <linux/kexec.h>

> +#include <linux/crash_dump.h>

>

>  #include <asm/boot.h>

>  #include <asm/fixmap.h>

> @@ -186,6 +187,57 @@ static void __init reserve_crashkernel(void)

>  }

>  #endif /* CONFIG_KEXEC_CORE */

>

> +#ifdef CONFIG_CRASH_DUMP

> +static int __init early_init_dt_scan_elfcorehdr(unsigned long node,

> +               const char *uname, int depth, void *data)

> +{

> +       const __be32 *reg;

> +       int len;

> +

> +       if (depth != 1 || strcmp(uname, "chosen") != 0)

> +               return 0;

> +

> +       reg = of_get_flat_dt_prop(node, "linux,elfcorehdr", &len);

> +       if (!reg || (len < (dt_root_addr_cells + dt_root_size_cells)))

> +               return 1;

> +

> +       elfcorehdr_addr = dt_mem_next_cell(dt_root_addr_cells, &reg);

> +       elfcorehdr_size = dt_mem_next_cell(dt_root_size_cells, &reg);

> +

> +       return 1;

> +}

> +

> +/*

> + * reserve_elfcorehdr() - reserves memory for elf core header

> + *

> + * This function reserves elf core header given in "elfcorehdr=" kernel

> + * command line parameter. This region contains all the information about

> + * primary kernel's core image and is used by a dump capture kernel to

> + * access the system memory on primary kernel.

> + */

> +static void __init reserve_elfcorehdr(void)

> +{

> +       of_scan_flat_dt(early_init_dt_scan_elfcorehdr, NULL);

> +

> +       if (!elfcorehdr_size)

> +               return;

> +

> +       if (memblock_is_region_reserved(elfcorehdr_addr, elfcorehdr_size)) {

> +               pr_warn("elfcorehdr is overlapped\n");

> +               return;

> +       }

> +

> +       memblock_reserve(elfcorehdr_addr, elfcorehdr_size);

> +

> +       pr_info("Reserving %lldKB of memory at 0x%llx for elfcorehdr\n",

> +               elfcorehdr_size >> 10, elfcorehdr_addr);

> +}

> +#else

> +static void __init reserve_elfcorehdr(void)

> +{

> +       ;

> +}

> +#endif /* CONFIG_CRASH_DUMP */

>  /*

>   * Return the maximum physical address for ZONE_DMA (DMA_BIT_MASK(32)). It

>   * currently assumes that for memory starting above 4G, 32-bit devices will

> @@ -444,6 +496,8 @@ void __init arm64_memblock_init(void)

>

>         reserve_crashkernel();

>

> +       reserve_elfcorehdr();

> +

>         dma_contiguous_reserve(arm64_dma_phys_limit);

>

>         memblock_allow_resize();

> --

> 2.9.0

>

>

> _______________________________________________

> linux-arm-kernel mailing list

> linux-arm-kernel@lists.infradead.org

> http://lists.infradead.org/mailman/listinfo/linux-arm-kernel


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
AKASHI Takahiro Aug. 26, 2016, 6:22 a.m. UTC | #3
On Wed, Aug 24, 2016 at 04:44:09PM +0200, Ard Biesheuvel wrote:
> On 9 August 2016 at 03:56, AKASHI Takahiro <takahiro.akashi@linaro.org> wrote:

> > On crash dump kernel, all the information about primary kernel's system

> > memory (core image) is available in elf core header.

> > The primary kernel will set aside this header with reserve_elfcorehdr()

> > at boot time and inform crash dump kernel of its location via a new

> > device-tree property, "linux,elfcorehdr".

> >

> > Please note that all other architectures use traditional "elfcorehdr="

> > kernel parameter for this purpose.

> >

> > Then crash dump kernel will access the primary kernel's memory with

> > copy_oldmem_page(), which reads one page by ioremap'ing it since it does

> > not reside in linear mapping on crash dump kernel.

> >

> > We also need our own elfcorehdr_read() here since the header is placed

> > within crash dump kernel's usable memory.

> >

> > Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>

> > ---

> >  arch/arm64/Kconfig             | 11 +++++++

> >  arch/arm64/kernel/Makefile     |  1 +

> >  arch/arm64/kernel/crash_dump.c | 71 ++++++++++++++++++++++++++++++++++++++++++

> >  arch/arm64/mm/init.c           | 54 ++++++++++++++++++++++++++++++++

> >  4 files changed, 137 insertions(+)

> >  create mode 100644 arch/arm64/kernel/crash_dump.c

> >

> > diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig

> > index 69c8787..9ede54b 100644

> > --- a/arch/arm64/Kconfig

> > +++ b/arch/arm64/Kconfig

> > @@ -682,6 +682,17 @@ config KEXEC

> >           but it is independent of the system firmware.   And like a reboot

> >           you can start any kernel with it, not just Linux.

> >

> > +config CRASH_DUMP

> > +       bool "Build kdump crash kernel"

> > +       help

> > +         Generate crash dump after being started by kexec. This should

> > +         be normally only set in special crash dump kernels which are

> > +         loaded in the main kernel with kexec-tools into a specially

> > +         reserved region and then later executed after a crash by

> > +         kdump/kexec.

> > +

> > +         For more details see Documentation/kdump/kdump.txt

> > +

> >  config XEN_DOM0

> >         def_bool y

> >         depends on XEN

> > diff --git a/arch/arm64/kernel/Makefile b/arch/arm64/kernel/Makefile

> > index 14f7b65..f1cbfc8 100644

> > --- a/arch/arm64/kernel/Makefile

> > +++ b/arch/arm64/kernel/Makefile

> > @@ -48,6 +48,7 @@ arm64-obj-$(CONFIG_RANDOMIZE_BASE)    += kaslr.o

> >  arm64-obj-$(CONFIG_HIBERNATION)                += hibernate.o hibernate-asm.o

> >  arm64-obj-$(CONFIG_KEXEC)              += machine_kexec.o relocate_kernel.o    \

> >                                            cpu-reset.o

> > +arm64-obj-$(CONFIG_CRASH_DUMP)         += crash_dump.o

> >

> >  obj-y                                  += $(arm64-obj-y) vdso/ probes/

> >  obj-m                                  += $(arm64-obj-m)

> > diff --git a/arch/arm64/kernel/crash_dump.c b/arch/arm64/kernel/crash_dump.c

> > new file mode 100644

> > index 0000000..2dc54d1

> > --- /dev/null

> > +++ b/arch/arm64/kernel/crash_dump.c

> > @@ -0,0 +1,71 @@

> > +/*

> > + * Routines for doing kexec-based kdump

> > + *

> > + * Copyright (C) 2014 Linaro Limited

> > + * Author: AKASHI Takahiro <takahiro.akashi@linaro.org>

> > + *

> > + * This program is free software; you can redistribute it and/or modify

> > + * it under the terms of the GNU General Public License version 2 as

> > + * published by the Free Software Foundation.

> > + */

> > +

> > +#include <linux/crash_dump.h>

> > +#include <linux/errno.h>

> > +#include <linux/io.h>

> > +#include <linux/memblock.h>

> > +#include <linux/uaccess.h>

> > +#include <asm/memory.h>

> > +

> > +/**

> > + * copy_oldmem_page() - copy one page from old kernel memory

> > + * @pfn: page frame number to be copied

> > + * @buf: buffer where the copied page is placed

> > + * @csize: number of bytes to copy

> > + * @offset: offset in bytes into the page

> > + * @userbuf: if set, @buf is in a user address space

> > + *

> > + * This function copies one page from old kernel memory into buffer pointed by

> > + * @buf. If @buf is in userspace, set @userbuf to %1. Returns number of bytes

> > + * copied or negative error in case of failure.

> > + */

> > +ssize_t copy_oldmem_page(unsigned long pfn, char *buf,

> > +                        size_t csize, unsigned long offset,

> > +                        int userbuf)

> > +{

> > +       void *vaddr;

> > +

> > +       if (!csize)

> > +               return 0;

> > +

> > +       vaddr = ioremap_cache(__pfn_to_phys(pfn), PAGE_SIZE);

> 

> Could we please use memremap() here?

> 

> > +       if (!vaddr)

> > +               return -ENOMEM;

> > +

> > +       if (userbuf) {

> > +               if (copy_to_user(buf, vaddr + offset, csize)) {

> > +                       iounmap(vaddr);

> > +                       return -EFAULT;

> > +               }

> > +       } else {

> > +               memcpy(buf, vaddr + offset, csize);

> > +       }

> > +

> > +       iounmap(vaddr);

> 

> ... and memunmap here?

> 

> ioremap_cache() is not very well defined, and memremap() has been

> introduced specifically to replace it, so I think we should use it in

> new code.


Sure. I will use memremap(MEMREMAP_WB) instead.

Thanks,
-Takahiro AKASHI

> Thanks,

> Ard.

> 

> 

> > +

> > +       return csize;

> > +}

> > +

> > +/**

> > + * elfcorehdr_read - read from ELF core header

> > + * @buf: buffer where the data is placed

> > + * @csize: number of bytes to read

> > + * @ppos: address in the memory

> > + *

> > + * This function reads @count bytes from elf core header which exists

> > + * on crash dump kernel's memory.

> > + */

> > +ssize_t elfcorehdr_read(char *buf, size_t count, u64 *ppos)

> > +{

> > +       memcpy(buf, phys_to_virt((phys_addr_t)*ppos), count);

> > +       return count;

> > +}

> > diff --git a/arch/arm64/mm/init.c b/arch/arm64/mm/init.c

> > index e3771c4..bba1e39 100644

> > --- a/arch/arm64/mm/init.c

> > +++ b/arch/arm64/mm/init.c

> > @@ -36,6 +36,7 @@

> >  #include <linux/efi.h>

> >  #include <linux/swiotlb.h>

> >  #include <linux/kexec.h>

> > +#include <linux/crash_dump.h>

> >

> >  #include <asm/boot.h>

> >  #include <asm/fixmap.h>

> > @@ -186,6 +187,57 @@ static void __init reserve_crashkernel(void)

> >  }

> >  #endif /* CONFIG_KEXEC_CORE */

> >

> > +#ifdef CONFIG_CRASH_DUMP

> > +static int __init early_init_dt_scan_elfcorehdr(unsigned long node,

> > +               const char *uname, int depth, void *data)

> > +{

> > +       const __be32 *reg;

> > +       int len;

> > +

> > +       if (depth != 1 || strcmp(uname, "chosen") != 0)

> > +               return 0;

> > +

> > +       reg = of_get_flat_dt_prop(node, "linux,elfcorehdr", &len);

> > +       if (!reg || (len < (dt_root_addr_cells + dt_root_size_cells)))

> > +               return 1;

> > +

> > +       elfcorehdr_addr = dt_mem_next_cell(dt_root_addr_cells, &reg);

> > +       elfcorehdr_size = dt_mem_next_cell(dt_root_size_cells, &reg);

> > +

> > +       return 1;

> > +}

> > +

> > +/*

> > + * reserve_elfcorehdr() - reserves memory for elf core header

> > + *

> > + * This function reserves elf core header given in "elfcorehdr=" kernel

> > + * command line parameter. This region contains all the information about

> > + * primary kernel's core image and is used by a dump capture kernel to

> > + * access the system memory on primary kernel.

> > + */

> > +static void __init reserve_elfcorehdr(void)

> > +{

> > +       of_scan_flat_dt(early_init_dt_scan_elfcorehdr, NULL);

> > +

> > +       if (!elfcorehdr_size)

> > +               return;

> > +

> > +       if (memblock_is_region_reserved(elfcorehdr_addr, elfcorehdr_size)) {

> > +               pr_warn("elfcorehdr is overlapped\n");

> > +               return;

> > +       }

> > +

> > +       memblock_reserve(elfcorehdr_addr, elfcorehdr_size);

> > +

> > +       pr_info("Reserving %lldKB of memory at 0x%llx for elfcorehdr\n",

> > +               elfcorehdr_size >> 10, elfcorehdr_addr);

> > +}

> > +#else

> > +static void __init reserve_elfcorehdr(void)

> > +{

> > +       ;

> > +}

> > +#endif /* CONFIG_CRASH_DUMP */

> >  /*

> >   * Return the maximum physical address for ZONE_DMA (DMA_BIT_MASK(32)). It

> >   * currently assumes that for memory starting above 4G, 32-bit devices will

> > @@ -444,6 +496,8 @@ void __init arm64_memblock_init(void)

> >

> >         reserve_crashkernel();

> >

> > +       reserve_elfcorehdr();

> > +

> >         dma_contiguous_reserve(arm64_dma_phys_limit);

> >

> >         memblock_allow_resize();

> > --

> > 2.9.0

> >

> >

> > _______________________________________________

> > linux-arm-kernel mailing list

> > linux-arm-kernel@lists.infradead.org

> > http://lists.infradead.org/mailman/listinfo/linux-arm-kernel


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
diff mbox

Patch

diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig
index 69c8787..9ede54b 100644
--- a/arch/arm64/Kconfig
+++ b/arch/arm64/Kconfig
@@ -682,6 +682,17 @@  config KEXEC
 	  but it is independent of the system firmware.   And like a reboot
 	  you can start any kernel with it, not just Linux.
 
+config CRASH_DUMP
+	bool "Build kdump crash kernel"
+	help
+	  Generate crash dump after being started by kexec. This should
+	  be normally only set in special crash dump kernels which are
+	  loaded in the main kernel with kexec-tools into a specially
+	  reserved region and then later executed after a crash by
+	  kdump/kexec.
+
+	  For more details see Documentation/kdump/kdump.txt
+
 config XEN_DOM0
 	def_bool y
 	depends on XEN
diff --git a/arch/arm64/kernel/Makefile b/arch/arm64/kernel/Makefile
index 14f7b65..f1cbfc8 100644
--- a/arch/arm64/kernel/Makefile
+++ b/arch/arm64/kernel/Makefile
@@ -48,6 +48,7 @@  arm64-obj-$(CONFIG_RANDOMIZE_BASE)	+= kaslr.o
 arm64-obj-$(CONFIG_HIBERNATION)		+= hibernate.o hibernate-asm.o
 arm64-obj-$(CONFIG_KEXEC)		+= machine_kexec.o relocate_kernel.o	\
 					   cpu-reset.o
+arm64-obj-$(CONFIG_CRASH_DUMP)		+= crash_dump.o
 
 obj-y					+= $(arm64-obj-y) vdso/ probes/
 obj-m					+= $(arm64-obj-m)
diff --git a/arch/arm64/kernel/crash_dump.c b/arch/arm64/kernel/crash_dump.c
new file mode 100644
index 0000000..2dc54d1
--- /dev/null
+++ b/arch/arm64/kernel/crash_dump.c
@@ -0,0 +1,71 @@ 
+/*
+ * Routines for doing kexec-based kdump
+ *
+ * Copyright (C) 2014 Linaro Limited
+ * Author: AKASHI Takahiro <takahiro.akashi@linaro.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
+ * published by the Free Software Foundation.
+ */
+
+#include <linux/crash_dump.h>
+#include <linux/errno.h>
+#include <linux/io.h>
+#include <linux/memblock.h>
+#include <linux/uaccess.h>
+#include <asm/memory.h>
+
+/**
+ * copy_oldmem_page() - copy one page from old kernel memory
+ * @pfn: page frame number to be copied
+ * @buf: buffer where the copied page is placed
+ * @csize: number of bytes to copy
+ * @offset: offset in bytes into the page
+ * @userbuf: if set, @buf is in a user address space
+ *
+ * This function copies one page from old kernel memory into buffer pointed by
+ * @buf. If @buf is in userspace, set @userbuf to %1. Returns number of bytes
+ * copied or negative error in case of failure.
+ */
+ssize_t copy_oldmem_page(unsigned long pfn, char *buf,
+			 size_t csize, unsigned long offset,
+			 int userbuf)
+{
+	void *vaddr;
+
+	if (!csize)
+		return 0;
+
+	vaddr = ioremap_cache(__pfn_to_phys(pfn), PAGE_SIZE);
+	if (!vaddr)
+		return -ENOMEM;
+
+	if (userbuf) {
+		if (copy_to_user(buf, vaddr + offset, csize)) {
+			iounmap(vaddr);
+			return -EFAULT;
+		}
+	} else {
+		memcpy(buf, vaddr + offset, csize);
+	}
+
+	iounmap(vaddr);
+
+	return csize;
+}
+
+/**
+ * elfcorehdr_read - read from ELF core header
+ * @buf: buffer where the data is placed
+ * @csize: number of bytes to read
+ * @ppos: address in the memory
+ *
+ * This function reads @count bytes from elf core header which exists
+ * on crash dump kernel's memory.
+ */
+ssize_t elfcorehdr_read(char *buf, size_t count, u64 *ppos)
+{
+	memcpy(buf, phys_to_virt((phys_addr_t)*ppos), count);
+	return count;
+}
diff --git a/arch/arm64/mm/init.c b/arch/arm64/mm/init.c
index e3771c4..bba1e39 100644
--- a/arch/arm64/mm/init.c
+++ b/arch/arm64/mm/init.c
@@ -36,6 +36,7 @@ 
 #include <linux/efi.h>
 #include <linux/swiotlb.h>
 #include <linux/kexec.h>
+#include <linux/crash_dump.h>
 
 #include <asm/boot.h>
 #include <asm/fixmap.h>
@@ -186,6 +187,57 @@  static void __init reserve_crashkernel(void)
 }
 #endif /* CONFIG_KEXEC_CORE */
 
+#ifdef CONFIG_CRASH_DUMP
+static int __init early_init_dt_scan_elfcorehdr(unsigned long node,
+		const char *uname, int depth, void *data)
+{
+	const __be32 *reg;
+	int len;
+
+	if (depth != 1 || strcmp(uname, "chosen") != 0)
+		return 0;
+
+	reg = of_get_flat_dt_prop(node, "linux,elfcorehdr", &len);
+	if (!reg || (len < (dt_root_addr_cells + dt_root_size_cells)))
+		return 1;
+
+	elfcorehdr_addr = dt_mem_next_cell(dt_root_addr_cells, &reg);
+	elfcorehdr_size = dt_mem_next_cell(dt_root_size_cells, &reg);
+
+	return 1;
+}
+
+/*
+ * reserve_elfcorehdr() - reserves memory for elf core header
+ *
+ * This function reserves elf core header given in "elfcorehdr=" kernel
+ * command line parameter. This region contains all the information about
+ * primary kernel's core image and is used by a dump capture kernel to
+ * access the system memory on primary kernel.
+ */
+static void __init reserve_elfcorehdr(void)
+{
+	of_scan_flat_dt(early_init_dt_scan_elfcorehdr, NULL);
+
+	if (!elfcorehdr_size)
+		return;
+
+	if (memblock_is_region_reserved(elfcorehdr_addr, elfcorehdr_size)) {
+		pr_warn("elfcorehdr is overlapped\n");
+		return;
+	}
+
+	memblock_reserve(elfcorehdr_addr, elfcorehdr_size);
+
+	pr_info("Reserving %lldKB of memory at 0x%llx for elfcorehdr\n",
+		elfcorehdr_size >> 10, elfcorehdr_addr);
+}
+#else
+static void __init reserve_elfcorehdr(void)
+{
+	;
+}
+#endif /* CONFIG_CRASH_DUMP */
 /*
  * Return the maximum physical address for ZONE_DMA (DMA_BIT_MASK(32)). It
  * currently assumes that for memory starting above 4G, 32-bit devices will
@@ -444,6 +496,8 @@  void __init arm64_memblock_init(void)
 
 	reserve_crashkernel();
 
+	reserve_elfcorehdr();
+
 	dma_contiguous_reserve(arm64_dma_phys_limit);
 
 	memblock_allow_resize();