xref: /openbmc/linux/arch/ia64/kernel/machine_kexec.c (revision 9187592b)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * arch/ia64/kernel/machine_kexec.c
4  *
5  * Handle transition of Linux booting another kernel
6  * Copyright (C) 2005 Hewlett-Packard Development Comapny, L.P.
7  * Copyright (C) 2005 Khalid Aziz <khalid.aziz@hp.com>
8  * Copyright (C) 2006 Intel Corp, Zou Nan hai <nanhai.zou@intel.com>
9  */
10 
11 #include <linux/mm.h>
12 #include <linux/kexec.h>
13 #include <linux/cpu.h>
14 #include <linux/irq.h>
15 #include <linux/efi.h>
16 #include <linux/numa.h>
17 #include <linux/mmzone.h>
18 
19 #include <asm/efi.h>
20 #include <asm/numa.h>
21 #include <asm/mmu_context.h>
22 #include <asm/setup.h>
23 #include <asm/delay.h>
24 #include <asm/meminit.h>
25 #include <asm/processor.h>
26 #include <asm/sal.h>
27 #include <asm/mca.h>
28 
29 typedef void (*relocate_new_kernel_t)(
30 					unsigned long indirection_page,
31 					unsigned long start_address,
32 					struct ia64_boot_param *boot_param,
33 					unsigned long pal_addr) __noreturn;
34 
35 struct kimage *ia64_kimage;
36 
37 struct resource efi_memmap_res = {
38         .name  = "EFI Memory Map",
39         .start = 0,
40         .end   = 0,
41         .flags = IORESOURCE_BUSY | IORESOURCE_MEM
42 };
43 
44 struct resource boot_param_res = {
45         .name  = "Boot parameter",
46         .start = 0,
47         .end   = 0,
48         .flags = IORESOURCE_BUSY | IORESOURCE_MEM
49 };
50 
51 
52 /*
53  * Do what every setup is needed on image and the
54  * reboot code buffer to allow us to avoid allocations
55  * later.
56  */
machine_kexec_prepare(struct kimage * image)57 int machine_kexec_prepare(struct kimage *image)
58 {
59 	void *control_code_buffer;
60 	const unsigned long *func;
61 
62 	func = (unsigned long *)&relocate_new_kernel;
63 	/* Pre-load control code buffer to minimize work in kexec path */
64 	control_code_buffer = page_address(image->control_code_page);
65 	memcpy((void *)control_code_buffer, (const void *)func[0],
66 			relocate_new_kernel_size);
67 	flush_icache_range((unsigned long)control_code_buffer,
68 			(unsigned long)control_code_buffer + relocate_new_kernel_size);
69 	ia64_kimage = image;
70 
71 	return 0;
72 }
73 
machine_kexec_cleanup(struct kimage * image)74 void machine_kexec_cleanup(struct kimage *image)
75 {
76 }
77 
78 /*
79  * Do not allocate memory (or fail in any way) in machine_kexec().
80  * We are past the point of no return, committed to rebooting now.
81  */
ia64_machine_kexec(struct unw_frame_info * info,void * arg)82 static void ia64_machine_kexec(struct unw_frame_info *info, void *arg)
83 {
84 	struct kimage *image = arg;
85 	relocate_new_kernel_t rnk;
86 	void *pal_addr = efi_get_pal_addr();
87 	unsigned long code_addr;
88 	int ii;
89 	u64 fp, gp;
90 	ia64_fptr_t *init_handler = (ia64_fptr_t *)ia64_os_init_on_kdump;
91 
92 	BUG_ON(!image);
93 	code_addr = (unsigned long)page_address(image->control_code_page);
94 	if (image->type == KEXEC_TYPE_CRASH) {
95 		crash_save_this_cpu();
96 		current->thread.ksp = (__u64)info->sw - 16;
97 
98 		/* Register noop init handler */
99 		fp = ia64_tpa(init_handler->fp);
100 		gp = ia64_tpa(ia64_getreg(_IA64_REG_GP));
101 		ia64_sal_set_vectors(SAL_VECTOR_OS_INIT, fp, gp, 0, fp, gp, 0);
102 	} else {
103 		/* Unregister init handlers of current kernel */
104 		ia64_sal_set_vectors(SAL_VECTOR_OS_INIT, 0, 0, 0, 0, 0, 0);
105 	}
106 
107 	/* Unregister mca handler - No more recovery on current kernel */
108 	ia64_sal_set_vectors(SAL_VECTOR_OS_MCA, 0, 0, 0, 0, 0, 0);
109 
110 	/* Interrupts aren't acceptable while we reboot */
111 	local_irq_disable();
112 
113 	/* Mask CMC and Performance Monitor interrupts */
114 	ia64_setreg(_IA64_REG_CR_PMV, 1 << 16);
115 	ia64_setreg(_IA64_REG_CR_CMCV, 1 << 16);
116 
117 	/* Mask ITV and Local Redirect Registers */
118 	ia64_set_itv(1 << 16);
119 	ia64_set_lrr0(1 << 16);
120 	ia64_set_lrr1(1 << 16);
121 
122 	/* terminate possible nested in-service interrupts */
123 	for (ii = 0; ii < 16; ii++)
124 		ia64_eoi();
125 
126 	/* unmask TPR and clear any pending interrupts */
127 	ia64_setreg(_IA64_REG_CR_TPR, 0);
128 	ia64_srlz_d();
129 	while (ia64_get_ivr() != IA64_SPURIOUS_INT_VECTOR)
130 		ia64_eoi();
131 	rnk = (relocate_new_kernel_t)&code_addr;
132 	(*rnk)(image->head, image->start, ia64_boot_param,
133 		     GRANULEROUNDDOWN((unsigned long) pal_addr));
134 	BUG();
135 }
136 
machine_kexec(struct kimage * image)137 void machine_kexec(struct kimage *image)
138 {
139 	BUG_ON(!image);
140 	unw_init_running(ia64_machine_kexec, image);
141 	for(;;);
142 }
143 
arch_crash_save_vmcoreinfo(void)144 void arch_crash_save_vmcoreinfo(void)
145 {
146 #if defined(CONFIG_SPARSEMEM)
147 	VMCOREINFO_SYMBOL(pgdat_list);
148 	VMCOREINFO_LENGTH(pgdat_list, MAX_NUMNODES);
149 #endif
150 #ifdef CONFIG_NUMA
151 	VMCOREINFO_SYMBOL(node_memblk);
152 	VMCOREINFO_LENGTH(node_memblk, NR_NODE_MEMBLKS);
153 	VMCOREINFO_STRUCT_SIZE(node_memblk_s);
154 	VMCOREINFO_OFFSET(node_memblk_s, start_paddr);
155 	VMCOREINFO_OFFSET(node_memblk_s, size);
156 #endif
157 #if CONFIG_PGTABLE_LEVELS == 3
158 	VMCOREINFO_CONFIG(PGTABLE_3);
159 #elif CONFIG_PGTABLE_LEVELS == 4
160 	VMCOREINFO_CONFIG(PGTABLE_4);
161 #endif
162 }
163 
164