Blame view

arch/x86/kernel/crash_dump_32.c 2.5 KB
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
1
  /*
835c34a16   Dave Jones   Delete filenames ...
2
   *	Memory preserving reboot related code.
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
3
4
5
6
   *
   *	Created by: Hariprasad Nellitheertha (hari@in.ibm.com)
   *	Copyright (C) IBM Corporation, 2004. All rights reserved
   */
5a0e3ad6a   Tejun Heo   include cleanup: ...
7
  #include <linux/slab.h>
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
8
  #include <linux/errno.h>
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
9
10
  #include <linux/highmem.h>
  #include <linux/crash_dump.h>
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
11
  #include <asm/uaccess.h>
4ae362be5   Vivek Goyal   [PATCH] kdump: re...
12
  static void *kdump_buf_page;
2030eae52   Vivek Goyal   [PATCH] Retrieve ...
13

72ed7de74   Jiri Slaby   x86: crash_dump: ...
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
  static inline bool is_crashed_pfn_valid(unsigned long pfn)
  {
  #ifndef CONFIG_X86_PAE
  	/*
  	 * non-PAE kdump kernel executed from a PAE one will crop high pte
  	 * bits and poke unwanted space counting again from address 0, we
  	 * don't want that. pte must fit into unsigned long. In fact the
  	 * test checks high 12 bits for being zero (pfn will be shifted left
  	 * by PAGE_SHIFT).
  	 */
  	return pte_pfn(pfn_pte(pfn, __pgprot(0))) == pfn;
  #else
  	return true;
  #endif
  }
e77e17161   Randy Dunlap   [PATCH] kernel/cr...
29
30
31
32
33
34
35
36
37
38
  /**
   * copy_oldmem_page - copy one page from "oldmem"
   * @pfn: page frame number to be copied
   * @buf: target memory address for the copy; this can be in kernel address
   *	space or user address space (see @userbuf)
   * @csize: number of bytes to copy
   * @offset: offset in bytes into the page (based on pfn) to begin the copy
   * @userbuf: if set, @buf is in user address space, use copy_to_user(),
   *	otherwise @buf is in kernel address space, use memcpy().
   *
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
39
40
   * Copy a page from "oldmem". For this page, there is no pte mapped
   * in the current kernel. We stitch up a pte, similar to kmap_atomic.
4ae362be5   Vivek Goyal   [PATCH] kdump: re...
41
42
43
44
   *
   * Calling copy_to_user() in atomic context is not desirable. Hence first
   * copying the data to a pre-allocated kernel page and then copying to user
   * space in non-atomic context.
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
45
46
   */
  ssize_t copy_oldmem_page(unsigned long pfn, char *buf,
4ae362be5   Vivek Goyal   [PATCH] kdump: re...
47
                                 size_t csize, unsigned long offset, int userbuf)
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
48
  {
4ae362be5   Vivek Goyal   [PATCH] kdump: re...
49
  	void  *vaddr;
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
50
51
52
  
  	if (!csize)
  		return 0;
72ed7de74   Jiri Slaby   x86: crash_dump: ...
53
54
  	if (!is_crashed_pfn_valid(pfn))
  		return -EFAULT;
3e4d3af50   Peter Zijlstra   mm: stack based k...
55
  	vaddr = kmap_atomic_pfn(pfn);
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
56

4ae362be5   Vivek Goyal   [PATCH] kdump: re...
57
58
59
60
61
62
63
64
  	if (!userbuf) {
  		memcpy(buf, (vaddr + offset), csize);
  		kunmap_atomic(vaddr, KM_PTE0);
  	} else {
  		if (!kdump_buf_page) {
  			printk(KERN_WARNING "Kdump: Kdump buffer page not"
  				" allocated
  ");
22124c999   Fernando Luis Vázquez Cao   kmap leak fix for...
65
  			kunmap_atomic(vaddr, KM_PTE0);
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
66
67
  			return -EFAULT;
  		}
4ae362be5   Vivek Goyal   [PATCH] kdump: re...
68
69
70
71
  		copy_page(kdump_buf_page, vaddr);
  		kunmap_atomic(vaddr, KM_PTE0);
  		if (copy_to_user(buf, (kdump_buf_page + offset), csize))
  			return -EFAULT;
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
72
  	}
60e64d46a   Vivek Goyal   [PATCH] kdump: Ro...
73
74
  	return csize;
  }
4ae362be5   Vivek Goyal   [PATCH] kdump: re...
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
  
  static int __init kdump_buf_page_init(void)
  {
  	int ret = 0;
  
  	kdump_buf_page = kmalloc(PAGE_SIZE, GFP_KERNEL);
  	if (!kdump_buf_page) {
  		printk(KERN_WARNING "Kdump: Failed to allocate kdump buffer"
  			 " page
  ");
  		ret = -ENOMEM;
  	}
  
  	return ret;
  }
  arch_initcall(kdump_buf_page_init);