On 22 June 2017 at 16:35, Qiuxu Zhuo <qiuxu.zhuo@xxxxxxxxx> wrote: > The EFI capsule mechanism allows data blobs to be passed to the EFI > firmware. By setting the EFI_CAPSULE_POPULATE_SYSTEM_TABLE and the > EFI_CAPSULE_PERSIST_ACROSS_REBOOT flags, the firmware will place a > pointer to our data blob in the EFI System Table on the next boot. > We can utilise this facility to save crash dumps, call traces, etc > and pick them up to aid in debugging after reboot. > > Initial cut at this driver by Matt Fleming as below links > https://git.kernel.org/cgit/linux/kernel/git/mfleming/efi.git/commit/?h=capsule-pstore&id=99c5f047133555aa0442f64064e85b7da2d4a45f > https://git.kernel.org/cgit/linux/kernel/git/mfleming/efi.git/commit/?h=capsule-pstore&id=8625c776c9b8bbed7fa4aa023e36542615165240 > Extensive cleanup, refactoring, bug fix, and verification by Qiuxu Zhuo > > Patch verified on Intel Kabylake client platform + Intel KBL BIOS:(10/24/2016): > - modprobe capsule-pstore > - echo "Test pmsg on capsule-pstore" > /dev/pmsg0 > - echo 1 > /sys/module/kernel/parameters/panic > - echo c > /proc/sysrq-trigger > - system reboot... > - ls -l /sys/fs/pstore/ > -r--r--r-- 1 root root 4946 6月 19 14:05 console-capsule-pstore-0 > -r--r--r-- 1 root root 8976 6月 19 14:03 dmesg-capsule-pstore-6433226157407076353 > -r--r--r-- 1 root root 9043 6月 19 14:03 dmesg-capsule-pstore-6433226157407076354 > -r--r--r-- 1 root root 9069 6月 19 14:03 dmesg-capsule-pstore-6433226157407076355 > -r--r--r-- 1 root root 9092 6月 19 14:03 dmesg-capsule-pstore-6433226157407076356 > -r--r--r-- 1 root root 8976 6月 19 14:03 dmesg-capsule-pstore-6433226157407076357 > -r--r--r-- 1 root root 9028 6月 19 14:03 dmesg-capsule-pstore-6433226157407076358 > -r--r--r-- 1 root root 28 6月 19 14:05 pmsg-capsule-pstore-0 > > The above files contain pmsg log and the last console/dmesg logs. > > Signed-off-by: Qiuxu Zhuo <qiuxu.zhuo@xxxxxxxxx> Actually, even though I expect that your definition of the capsule table struct is the correct one (including the packed attribute), this patch triggers a *lot* of checkpatch warnings regarding lines that exceed 80 characters, and so I will not be able to merge this as-is. Could you please fix it up? (you can ignore the other warnings re typedefs and MAINTAINERS) Thanks, Ard. > --- > drivers/firmware/efi/Kconfig | 21 ++ > drivers/firmware/efi/Makefile | 1 + > drivers/firmware/efi/capsule-pstore.c | 679 ++++++++++++++++++++++++++++++++++ > 3 files changed, 701 insertions(+) > create mode 100644 drivers/firmware/efi/capsule-pstore.c > > diff --git a/drivers/firmware/efi/Kconfig b/drivers/firmware/efi/Kconfig > index 394db40..f8c6564 100644 > --- a/drivers/firmware/efi/Kconfig > +++ b/drivers/firmware/efi/Kconfig > @@ -151,6 +151,27 @@ config APPLE_PROPERTIES > > If unsure, say Y if you have a Mac. Otherwise N. > > +config EFI_CAPSULE_PSTORE > + tristate "EFI capsule pstore backend" > + depends on EFI && PSTORE > + help > + Saying Y here enable the EFI capsule mechanism to store crash dumps, > + console log, and function tracing data. > + > + To compile this driver as a module, choose M here. > + > + Not many firmware implementations fully support EFI capsules. > + If you plan to rely on this you should test whether yours works by > + forcing a crash. Most people should not enable this. > + > +config EFI_CAPSULE_PSTORE_DEFAULT_DISABLE > + bool "Disable using efi capsule as a pstore backend by default" > + depends on EFI_CAPSULE_PSTORE > + help > + Saying Y here will disable the use of efi capsule as a storage > + backend for pstore by default. This setting can be overridden > + using the capsule-pstore module's pstore_disable parameter. > + > endmenu > > config UEFI_CPER > diff --git a/drivers/firmware/efi/Makefile b/drivers/firmware/efi/Makefile > index 0329d31..c06e52f 100644 > --- a/drivers/firmware/efi/Makefile > +++ b/drivers/firmware/efi/Makefile > @@ -15,6 +15,7 @@ obj-$(CONFIG_EFI) += capsule.o memmap.o > obj-$(CONFIG_EFI_VARS) += efivars.o > obj-$(CONFIG_EFI_ESRT) += esrt.o > obj-$(CONFIG_EFI_VARS_PSTORE) += efi-pstore.o > +obj-$(CONFIG_EFI_CAPSULE_PSTORE) += capsule-pstore.o > obj-$(CONFIG_UEFI_CPER) += cper.o > obj-$(CONFIG_EFI_RUNTIME_MAP) += runtime-map.o > obj-$(CONFIG_EFI_RUNTIME_WRAPPERS) += runtime-wrappers.o > diff --git a/drivers/firmware/efi/capsule-pstore.c b/drivers/firmware/efi/capsule-pstore.c > new file mode 100644 > index 0000000..10cc22e > --- /dev/null > +++ b/drivers/firmware/efi/capsule-pstore.c > @@ -0,0 +1,679 @@ > +/* > + * EFI capsule pstore backend support. > + * Copyright (c) 2017, Intel Corporation. > + * > + * This program is free software; you can redistribute it and/or modify it > + * under the terms and conditions of the GNU General Public License, > + * version 2, as published by the Free Software Foundation. > + * > + * This program is distributed in the hope it will be useful, but WITHOUT > + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or > + * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for > + * more details. > + */ > + > +#define pr_fmt(fmt) "capsule-pstore: " fmt > +#include <linux/slab.h> > +#include <linux/vmalloc.h> > +#include <linux/highmem.h> > +#include <linux/efi.h> > +#include <linux/module.h> > +#include <linux/pstore.h> > + > +#define CAPSULE_SIZE (16 * 1024) > +#define CRASH_SIZE 4096 > +#define CAPSULE_MAGIC 0x63617073 /* 'caps' */ > + > +static bool efi_capsule_pstore_disable __ro_after_init = > + IS_ENABLED(CONFIG_CAPSULE_PSTORE_DEFAULT_DISABLE); > + > +static int efi_reset_type = -1; > + > +struct efi_capsule_ctx { > + struct page **pages; > + phys_addr_t *phys_addrs; > + unsigned int nr_pages; > + efi_capsule_header_t *capsule; > + size_t capsule_size; > + void *data; > + size_t data_size; > +}; > + > +struct efi_capsule_pstore_buf { > + void *buf; > + size_t size; > + atomic_long_t offset; > +}; > + > +struct efi_capsule_pstore { > + /* Old records */ > + efi_capsule_header_t **hdrs; > + u32 hdrs_num; > + off_t hdr_offset; > + > + /* New records */ > + struct efi_capsule_pstore_buf console; > + struct efi_capsule_pstore_buf ftrace; > + struct efi_capsule_pstore_buf dmesg; > + struct efi_capsule_pstore_buf pmsg; > +}; > + > +struct efi_capsule_pstore_record { > + u64 timestamp; > + u64 id; > + enum pstore_type_id type; > + size_t size; > + bool compressed; > + u32 magic; > + char data[]; > +} __packed; > + > +typedef struct { > + u32 capsule_array_number; > + void *capsule_addr[]; > +} __packed efi_capsule_table_t; > + > +static ssize_t efi_capsule_pstore_read(struct pstore_record *record); > +static int notrace efi_capsule_pstore_write(struct pstore_record *record); > +static int notrace efi_capsule_pstore_write_user(struct pstore_record *record, const char __user *buf); > + > +static struct pstore_info efi_capsule_pstore_info = { > + .owner = THIS_MODULE, > + .name = "capsule-pstore", > + .buf_lock = __SPIN_LOCK_UNLOCKED(efi_capsule_pstore_info.buf_lock), > + .bufsize = CRASH_SIZE, > + .flags = PSTORE_FLAGS_DMESG | PSTORE_FLAGS_CONSOLE | PSTORE_FLAGS_FTRACE | PSTORE_FLAGS_PMSG, > + .read = efi_capsule_pstore_read, > + .write = efi_capsule_pstore_write, > + .write_user = efi_capsule_pstore_write_user, > +}; > + > +static efi_capsule_table_t *efi_capsule_table_get(efi_guid_t guid) > +{ > + unsigned long table = EFI_INVALID_TABLE_ADDR; > + void *p, *tablep = NULL, *tablec = NULL; > + int i, sz; > + u32 n; > + > + if (efi.config_table == EFI_INVALID_TABLE_ADDR || efi.nr_config_table == 0) > + return NULL; > + > + if (efi_enabled(EFI_64BIT)) > + sz = sizeof(efi_config_table_64_t); > + else > + sz = sizeof(efi_config_table_32_t); > + > + tablep = memremap(efi.config_table, efi.nr_config_table * sz, MEMREMAP_WB); > + if (!tablep) > + return NULL; > + > + p = tablep; > + for (i = 0; i < efi.nr_config_table; i++) { > + efi_guid_t id; > + > + if (efi_enabled(EFI_64BIT)) { > + id = ((efi_config_table_64_t *)p)->guid; > + if (!efi_guidcmp(id, guid)) { > + table = ((efi_config_table_64_t *)p)->table; > + break; > + } > + } else { > + id = ((efi_config_table_32_t *)p)->guid; > + if (!efi_guidcmp(id, guid)) { > + table = ((efi_config_table_32_t *)p)->table; > + break; > + } > + } > + > + p += sz; > + } > + > + if (table == EFI_INVALID_TABLE_ADDR) > + goto out; > + > + sz = sizeof(u32); > + tablec = memremap(table, sz, MEMREMAP_WB); > + if (!tablec) > + goto out; > + > + /* > + * The array of capsules is prefixed with the number of > + * capsule entries in the array. > + */ > + n = *(u32 *)tablec; > + memunmap(tablec); > + if (!n) { > + pr_info("No capsules on extraction\n"); > + goto out; > + } > + > + sz += n * sizeof(*tablec); > + tablec = memremap(table, sz, MEMREMAP_WB); > + > +out: > + memunmap(tablep); > + > + return (efi_capsule_table_t *)tablec; > +} > + > +/** > + * efi_capsule_lookup - search capsule array for entries. > + * @guid: the guid to search for. > + * @nr_caps: the number of entries found. > + * > + * Map each capsule header into the kernel's virtual address space and > + * inspect the guid. Build an array of capsule headers with every > + * capsule that is found with @guid. If a match is found the capsule > + * remains mapped, otherwise it is unmapped. > + * > + * Returns an array of capsule headers, each element of which has the > + * guid @guid. The number of elements in the array is stored in > + * @nr_caps. Returns %NULL if no capsules were found and stores zero > + * in @nr_caps. > + */ > +static efi_capsule_header_t **efi_capsule_lookup(efi_guid_t guid, u32 *nr_caps) > +{ > + efi_capsule_header_t **capsules = NULL, **tmp; > + efi_capsule_table_t *tablec; > + int i, sz = 0; > + > + tablec = efi_capsule_table_get(guid); > + if (!tablec) > + return NULL; > + > + *nr_caps = 0; > + for (i = 0; i < tablec->capsule_array_number; i++) { > + efi_capsule_header_t *c; > + size_t size; > + > + c = memremap((resource_size_t)tablec->capsule_addr[i], sizeof(*c), MEMREMAP_WB); > + if (!c) { > + pr_err("Fail to memremap capsule header\n"); > + continue; > + } > + > + size = c->imagesize; > + memunmap(c); > + > + c = memremap((resource_size_t)tablec->capsule_addr[i], size, MEMREMAP_WB); > + if (!c) { > + pr_err("Fail to memremap capsule header + data\n"); > + continue; > + } > + > + sz += sizeof(*capsules); > + tmp = krealloc(capsules, sz, GFP_KERNEL); > + if (!tmp) { > + for (i = 0; i < *nr_caps; i++) > + memunmap(capsules[i]); > + > + kfree(capsules); > + memunmap(tablec); > + > + return NULL; > + } > + > + capsules = tmp; > + capsules[(*nr_caps)++] = c; > + } > + > + memunmap(tablec); > + > + return capsules; > +} > + > +static __init void efi_capsule_destroy(struct efi_capsule_ctx *ctx) > +{ > + if (IS_ERR_OR_NULL(ctx)) > + return; > + > + vunmap(ctx->capsule); > + > + while (ctx->nr_pages--) > + __free_page(ctx->pages[ctx->nr_pages]); > + > + kfree(ctx->pages); > + kfree(ctx->phys_addrs); > + kfree(ctx); > +} > + > +/** > + * efi_capsule_build - alloc data buffer and fill out the header > + * @guid: vendor's guid > + * @data_size: size in bytes of the capsule data > + * > + * This is a helper function for allocating enough room for user data > + * + the size of an EFI capsule header. > + * > + * Returns a pointer to an allocated capsule on success, an ERR_PTR() > + * value on error. > + */ > +static __init struct efi_capsule_ctx *efi_capsule_build(efi_guid_t guid, size_t data_size) > +{ > + size_t capsule_size, needed_pages; > + struct efi_capsule_ctx *ctx; > + u32 flags; > + int rv; > + > + flags = EFI_CAPSULE_PERSIST_ACROSS_RESET | EFI_CAPSULE_POPULATE_SYSTEM_TABLE; > + needed_pages = ALIGN(data_size + sizeof(efi_capsule_header_t), PAGE_SIZE) >> PAGE_SHIFT; > + capsule_size = needed_pages * PAGE_SIZE; > + data_size = capsule_size - sizeof(efi_capsule_header_t); > + > + rv = efi_capsule_supported(LINUX_EFI_CRASH_GUID, flags, capsule_size, &efi_reset_type); > + if (rv) > + return ERR_PTR(rv); > + > + ctx = kzalloc(sizeof(*ctx), GFP_KERNEL); > + if (!ctx) > + return ERR_PTR(-ENOMEM); > + > + ctx->pages = kcalloc(needed_pages, sizeof(*ctx->pages), GFP_KERNEL); > + if (!ctx->pages) > + goto fail; > + > + ctx->phys_addrs = kcalloc(needed_pages, sizeof(*ctx->phys_addrs), GFP_KERNEL); > + if (!ctx->phys_addrs) > + goto fail; > + > + while (needed_pages--) { > + struct page *page = alloc_page(GFP_KERNEL | __GFP_HIGHMEM); > + > + if (!page) > + goto fail; > + > + ctx->pages[ctx->nr_pages] = page; > + ctx->phys_addrs[ctx->nr_pages++] = page_to_phys(page); > + } > + > + ctx->capsule = vmap(ctx->pages, ctx->nr_pages, 0, PAGE_KERNEL); > + if (!ctx->capsule) > + goto fail; > + > + ctx->capsule_size = capsule_size; > + ctx->data = (void *)ctx->capsule + sizeof(efi_capsule_header_t); > + ctx->data_size = data_size; > + > + /* Setup the EFI capsule header */ > + memcpy(&ctx->capsule->guid, &guid, sizeof(guid)); > + ctx->capsule->flags = flags; > + ctx->capsule->headersize = sizeof(*ctx->capsule); > + ctx->capsule->imagesize = capsule_size; > + > + return ctx; > + > +fail: > + efi_capsule_destroy(ctx); > + return ERR_PTR(-ENOMEM); > +} > + > +#define BUILD_UPDATE_CAPSULE(name) \ > + do { \ > + name##_ctx = efi_capsule_build(LINUX_EFI_CRASH_GUID, CAPSULE_SIZE); \ > + if (IS_ERR(name##_ctx)) { \ > + rv = PTR_ERR(name##_ctx); \ > + name##_ctx = NULL; \ > + pr_info("Fail to build %s capsule\n", #name); \ > + goto fail_##name; \ > + } \ > + rv = efi_capsule_update(name##_ctx->capsule, name##_ctx->phys_addrs); \ > + if (rv) { \ > + pr_info("Fail to register %s with firmware\n", #name); \ > + goto fail_##name; \ > + } \ > + } while (0) > + > +#define INIT_PSTORE_RECORD(name, type_id) \ > + do { \ > + memset(name##_ctx->data, 0, name##_ctx->data_size); \ > + pctx->name.size = name##_ctx->data_size; \ > + pctx->name.buf = name##_ctx->data; \ > + rec = pctx->name.buf; \ > + rec->type = type_id; \ > + rec->magic = CAPSULE_MAGIC; \ > + atomic_long_set(&pctx->name.offset, 0); \ > + } while (0) > + > +/** > + * We may not be in a position to allocate memory at the time of a > + * crash, so pre-allocate some space now and register it with the > + * firmware via efi_capsule_update(). > + * > + * Also, iterate through the array of capsules pointed to from the EFI > + * system table and take note of any LINUX_EFI_CRASH_GUID > + * capsules. They will be parsed by efi_capsule_pstore_read(). > + */ > +static __init int efi_capsule_pstore_setup(void) > +{ > + struct efi_capsule_ctx *console_ctx = NULL; > + struct efi_capsule_ctx *ftrace_ctx = NULL; > + struct efi_capsule_ctx *dmesg_ctx = NULL; > + struct efi_capsule_ctx *pmsg_ctx = NULL; > + struct efi_capsule_pstore *pctx = NULL; > + struct efi_capsule_pstore_record *rec; > + efi_capsule_header_t **hdrs; > + void *crash_buf = NULL; > + u32 hdrs_num = 0; > + int rv; > + > + pctx = kzalloc(sizeof(*pctx), GFP_KERNEL); > + if (!pctx) > + return -ENOMEM; > + > + crash_buf = kmalloc(CRASH_SIZE, GFP_KERNEL); > + if (!crash_buf) { > + rv = -ENOMEM; > + goto fail; > + } > + > + /* Allocate and pass capsules to firmware upfront. */ > + BUILD_UPDATE_CAPSULE(console); > + BUILD_UPDATE_CAPSULE(ftrace); > + BUILD_UPDATE_CAPSULE(dmesg); > + BUILD_UPDATE_CAPSULE(pmsg); > + > + /* Initialize the pstore records. */ > + INIT_PSTORE_RECORD(console, PSTORE_TYPE_CONSOLE); > + INIT_PSTORE_RECORD(ftrace, PSTORE_TYPE_FTRACE); > + INIT_PSTORE_RECORD(dmesg, PSTORE_TYPE_DMESG); > + INIT_PSTORE_RECORD(pmsg, PSTORE_TYPE_PMSG); > + > + /* Read any pstore entries that were passed across a reboot. */ > + hdrs = efi_capsule_lookup(LINUX_EFI_CRASH_GUID, &hdrs_num); > + pctx->hdrs_num = hdrs_num; > + pctx->hdrs = hdrs; > + > + /* Register the capsule backend with pstore. */ > + efi_capsule_pstore_info.buf = crash_buf; > + efi_capsule_pstore_info.data = pctx; > + rv = pstore_register(&efi_capsule_pstore_info); > + > + if (!rv) > + return 0; > + > + pr_err("Fail to register capsule support for pstore: %d\n", rv); > + > + efi_capsule_destroy(pmsg_ctx); > +fail_pmsg: > + efi_capsule_destroy(dmesg_ctx); > +fail_dmesg: > + efi_capsule_destroy(ftrace_ctx); > +fail_ftrace: > + efi_capsule_destroy(console_ctx); > +fail_console: > + kfree(crash_buf); > +fail: > + kfree(pctx); > + > + return rv; > +} > + > +/** > + * Return the next pstore record that was passed to us across a reboot > + * in an EFI capsule. > + * > + * This is expected to be called under the pstore > + * read_mutex. Therefore, no serialisation is done here. > + */ > +static struct efi_capsule_pstore_record * > +get_pstore_read_record(struct efi_capsule_pstore *pctx) > +{ > + struct efi_capsule_pstore_record *rec; > + efi_capsule_header_t *hdr; > + off_t remaining; > + > +next: > + if (!pctx->hdrs_num) > + return NULL; > + > + hdr = pctx->hdrs[pctx->hdrs_num - 1]; > + rec = (void *)hdr + hdr->headersize + pctx->hdr_offset; > + > + /* > + * A single EFI capsule may contain multiple pstore > + * records. It may also only be partially filled with pstore > + * records, which we can detect by checking for a record with > + * zero size. > + * > + * If there are no more records or invalid records in this capsule try the next. > + */ > + if (!rec->size || rec->size > CAPSULE_SIZE - sizeof(efi_capsule_header_t) - offsetof(typeof(*rec), data)) { > + pctx->hdrs_num--; > + pctx->hdr_offset = 0; > + goto next; > + } > + > + remaining = hdr->imagesize - hdr->headersize - pctx->hdr_offset - offsetof(typeof(*rec), data); > + > + /* > + * If we've finished parsing all records in this capsule, move > + * onto the next. Otherwise, increment the offset into the > + * current capsule (pctx->hdr_offset). > + */ > + if (rec->size == remaining) { > + pctx->hdrs_num--; > + pctx->hdr_offset = 0; > + } else { > + pctx->hdr_offset += rec->size + offsetof(typeof(*rec), data); > + } > + > + return rec; > +} > + > +static ssize_t efi_capsule_pstore_read(struct pstore_record *record) > +{ > + struct efi_capsule_pstore *pctx = record->psi->data; > + struct efi_capsule_pstore_record *rec; > + ssize_t size; > + > + rec = get_pstore_read_record(pctx); > + if (!rec) > + return 0; > + > + if (rec->magic != CAPSULE_MAGIC) { > + pr_info("Invalid capsule record!\n"); > + return 0; > + } > + > + record->type = rec->type; > + record->time.tv_sec = rec->timestamp; > + record->time.tv_nsec = 0; > + size = rec->size; > + record->id = rec->id; > + record->compressed = rec->compressed; > + record->ecc_notice_size = 0; > + record->buf = kmalloc(size, GFP_KERNEL); > + > + if (!record->buf) > + return -ENOMEM; > + > + memcpy(record->buf, rec->data, size); > + > + return size; > +} > + > +/* > + * We expect to be called with ->buf_lock held, and so don't perform > + * any serialisation. > + */ > +static struct notrace efi_capsule_pstore_record * > +get_pstore_write_record(struct efi_capsule_pstore_buf *pbuf, size_t *size) > +{ > + struct efi_capsule_pstore_record *rec; > + long offset = atomic_long_read(&pbuf->offset); > + > + if (offset + offsetof(typeof(*rec), data) >= pbuf->size) > + return NULL; > + > + /* Trim 'size' if there isn't enough remaining space */ > + if (offset + *size + offsetof(typeof(*rec), data) > pbuf->size) > + *size = pbuf->size - offset - offsetof(typeof(*rec), data); > + > + rec = pbuf->buf + offset; > + atomic_long_add(offsetof(typeof(*rec), data) + *size, &pbuf->offset); > + > + return rec; > +} > + > +static notrace void *get_pstore_write_ring_buf(struct efi_capsule_pstore_buf *pbuf, size_t size) > +{ > + struct efi_capsule_pstore_record *rec = pbuf->buf; > + size_t ring_size = pbuf->size - offsetof(typeof(*rec), data); > + void *ring_buf = pbuf->buf + offsetof(typeof(*rec), data); > + atomic_long_t *ring_offset = &pbuf->offset; > + long next, curr; > + > + if (size > ring_size) > + return NULL; > + > + if (rec->size + size > ring_size) > + rec->size = ring_size; > + else > + rec->size += size; > + > + do { > + curr = atomic_long_read(ring_offset); > + next = curr + size; > + > + if (next > ring_size) { > + next = size; > + if (atomic_long_cmpxchg(ring_offset, curr, next)) { > + curr = 0; > + break; > + } > + continue; > + } > + > + } while (atomic_long_cmpxchg(ring_offset, curr, next) != curr); > + > + return ring_buf + curr; > +} > + > +static int notrace efi_capsule_pstore_write(struct pstore_record *record) > +{ > + struct efi_capsule_pstore *pctx = record->psi->data; > + struct efi_capsule_pstore_record *rec; > + static atomic64_t seq; > + void *dst; > + > + /* > + * A zero size record would break our detection of > + * partially-filled capsules. > + */ > + if (!record->size) > + return -EINVAL; > + > + if (record->type == PSTORE_TYPE_CONSOLE) { > + dst = get_pstore_write_ring_buf(&pctx->console, record->size); > + } else if (record->type == PSTORE_TYPE_FTRACE) { > + dst = get_pstore_write_ring_buf(&pctx->ftrace, record->size); > + } else if (record->type == PSTORE_TYPE_DMESG) { > + size_t size = record->size; > + > + rec = get_pstore_write_record(&pctx->dmesg, &record->size); > + if (!rec || (record->compressed && record->size < size)) > + return -ENOSPC; > + > + rec->type = record->type; > + rec->timestamp = record->time.tv_sec; > + rec->size = record->size; > + if (!atomic64_read(&seq)) > + atomic64_set(&seq, rec->timestamp << 32); > + record->id = atomic64_inc_return(&seq); > + rec->id = record->id; > + rec->compressed = record->compressed; > + rec->magic = CAPSULE_MAGIC; > + > + dst = rec->data; > + } else if (record->type == PSTORE_TYPE_PMSG) { > + pr_warn_ratelimited("PMSG should not call %s\n", __func__); > + return -EINVAL; > + } else { > + return -EINVAL; > + } > + > + if (!dst) > + return -ENOSPC; > + > + memcpy(dst, record->buf, record->size); > + > + return 0; > +} > + > +static int notrace efi_capsule_pstore_write_user(struct pstore_record *record, const char __user *buf) > +{ > + struct efi_capsule_pstore *pctx = record->psi->data; > + void *dst; > + > + if (record->type == PSTORE_TYPE_PMSG) { > + dst = get_pstore_write_ring_buf(&pctx->pmsg, record->size); > + if (!dst) > + return -ENOSPC; > + > + if (unlikely(__copy_from_user(dst, buf, record->size))) > + return -EFAULT; > + > + return 0; > + } > + > + return -EINVAL; > +} > + > +static __init int check_capsule_support(void) > +{ > + int rv; > + > + efi_guid_t guid = LINUX_EFI_CRASH_GUID; > + u32 flags = EFI_CAPSULE_PERSIST_ACROSS_RESET | > + EFI_CAPSULE_POPULATE_SYSTEM_TABLE; > + > + rv = efi_capsule_supported(guid, flags, CAPSULE_SIZE, &efi_reset_type); > + if (rv) > + return rv; > + > + return 0; > +} > + > +static __init int efi_capsule_pstore_init(void) > +{ > + int rv = 0; > + > + if (!efi_enabled(EFI_RUNTIME_SERVICES)) > + return -ENODEV; > + > + if (efi_capsule_pstore_disable) { > + pr_info("Capsule-pstore is disabled\n "); > + return 0; > + } > + > + rv = check_capsule_support(); > + if (rv) { > + pr_info("Capsule-pstore is not supported: %d\n ", rv); > + return rv; > + } > + > + rv = efi_capsule_pstore_setup(); > + if (rv) { > + pr_err("Fail to setup capsule-pstore: %d\n", rv); > + return rv; > + } > + > + /* > + * Once the memory reserved for capsules passed to the firmware > + * by EFI UpdateCapsule(), there's no way to let firmware give up > + * the capsules. So this module cannot be unloaded once loaded. > + */ > + __module_get(THIS_MODULE); > + > + return 0; > +} > + > +static __exit void efi_capsule_pstore_exit(void) {} > + > +module_init(efi_capsule_pstore_init); > +module_exit(efi_capsule_pstore_exit); > + > +module_param_named(pstore_disable, efi_capsule_pstore_disable, bool, 0644); > + > +MODULE_DESCRIPTION("EFI capsule backend for pstore"); > +MODULE_LICENSE("GPL v2"); > -- > 2.9.0.GIT > -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html