mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-27 06:34:11 +08:00
8fd75e1216
Acked-by: Avi Kivity <avi@redhat.com> Acked-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: Cong Wang <amwang@redhat.com>
96 lines
2.5 KiB
C
96 lines
2.5 KiB
C
/*
|
|
* Memory preserving reboot related code.
|
|
*
|
|
* Created by: Hariprasad Nellitheertha (hari@in.ibm.com)
|
|
* Copyright (C) IBM Corporation, 2004. All rights reserved
|
|
*/
|
|
|
|
#include <linux/slab.h>
|
|
#include <linux/errno.h>
|
|
#include <linux/highmem.h>
|
|
#include <linux/crash_dump.h>
|
|
|
|
#include <asm/uaccess.h>
|
|
|
|
static void *kdump_buf_page;
|
|
|
|
static inline bool is_crashed_pfn_valid(unsigned long pfn)
|
|
{
|
|
#ifndef CONFIG_X86_PAE
|
|
/*
|
|
* non-PAE kdump kernel executed from a PAE one will crop high pte
|
|
* bits and poke unwanted space counting again from address 0, we
|
|
* don't want that. pte must fit into unsigned long. In fact the
|
|
* test checks high 12 bits for being zero (pfn will be shifted left
|
|
* by PAGE_SHIFT).
|
|
*/
|
|
return pte_pfn(pfn_pte(pfn, __pgprot(0))) == pfn;
|
|
#else
|
|
return true;
|
|
#endif
|
|
}
|
|
|
|
/**
|
|
* copy_oldmem_page - copy one page from "oldmem"
|
|
* @pfn: page frame number to be copied
|
|
* @buf: target memory address for the copy; this can be in kernel address
|
|
* space or user address space (see @userbuf)
|
|
* @csize: number of bytes to copy
|
|
* @offset: offset in bytes into the page (based on pfn) to begin the copy
|
|
* @userbuf: if set, @buf is in user address space, use copy_to_user(),
|
|
* otherwise @buf is in kernel address space, use memcpy().
|
|
*
|
|
* Copy a page from "oldmem". For this page, there is no pte mapped
|
|
* in the current kernel. We stitch up a pte, similar to kmap_atomic.
|
|
*
|
|
* Calling copy_to_user() in atomic context is not desirable. Hence first
|
|
* copying the data to a pre-allocated kernel page and then copying to user
|
|
* space in non-atomic context.
|
|
*/
|
|
ssize_t copy_oldmem_page(unsigned long pfn, char *buf,
|
|
size_t csize, unsigned long offset, int userbuf)
|
|
{
|
|
void *vaddr;
|
|
|
|
if (!csize)
|
|
return 0;
|
|
|
|
if (!is_crashed_pfn_valid(pfn))
|
|
return -EFAULT;
|
|
|
|
vaddr = kmap_atomic_pfn(pfn);
|
|
|
|
if (!userbuf) {
|
|
memcpy(buf, (vaddr + offset), csize);
|
|
kunmap_atomic(vaddr);
|
|
} else {
|
|
if (!kdump_buf_page) {
|
|
printk(KERN_WARNING "Kdump: Kdump buffer page not"
|
|
" allocated\n");
|
|
kunmap_atomic(vaddr);
|
|
return -EFAULT;
|
|
}
|
|
copy_page(kdump_buf_page, vaddr);
|
|
kunmap_atomic(vaddr);
|
|
if (copy_to_user(buf, (kdump_buf_page + offset), csize))
|
|
return -EFAULT;
|
|
}
|
|
|
|
return csize;
|
|
}
|
|
|
|
static int __init kdump_buf_page_init(void)
|
|
{
|
|
int ret = 0;
|
|
|
|
kdump_buf_page = kmalloc(PAGE_SIZE, GFP_KERNEL);
|
|
if (!kdump_buf_page) {
|
|
printk(KERN_WARNING "Kdump: Failed to allocate kdump buffer"
|
|
" page\n");
|
|
ret = -ENOMEM;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
arch_initcall(kdump_buf_page_init);
|