1 /* 2 * arch/ia64/kernel/machine_kexec.c 3 * 4 * Handle transition of Linux booting another kernel 5 * Copyright (C) 2005 Hewlett-Packard Development Comapny, L.P. 6 * Copyright (C) 2005 Khalid Aziz <khalid.aziz@hp.com> 7 * Copyright (C) 2006 Intel Corp, Zou Nan hai <nanhai.zou@intel.com> 8 * 9 * This source code is licensed under the GNU General Public License, 10 * Version 2. See the file COPYING for more details. 11 */ 12 13 #include <linux/mm.h> 14 #include <linux/kexec.h> 15 #include <linux/cpu.h> 16 #include <linux/irq.h> 17 #include <linux/efi.h> 18 #include <linux/numa.h> 19 #include <linux/mmzone.h> 20 21 #include <asm/numa.h> 22 #include <asm/mmu_context.h> 23 #include <asm/setup.h> 24 #include <asm/delay.h> 25 #include <asm/meminit.h> 26 #include <asm/processor.h> 27 #include <asm/sal.h> 28 #include <asm/mca.h> 29 30 typedef void (*relocate_new_kernel_t)( 31 unsigned long indirection_page, 32 unsigned long start_address, 33 struct ia64_boot_param *boot_param, 34 unsigned long pal_addr) __noreturn; 35 36 struct kimage *ia64_kimage; 37 38 struct resource efi_memmap_res = { 39 .name = "EFI Memory Map", 40 .start = 0, 41 .end = 0, 42 .flags = IORESOURCE_BUSY | IORESOURCE_MEM 43 }; 44 45 struct resource boot_param_res = { 46 .name = "Boot parameter", 47 .start = 0, 48 .end = 0, 49 .flags = IORESOURCE_BUSY | IORESOURCE_MEM 50 }; 51 52 53 /* 54 * Do what every setup is needed on image and the 55 * reboot code buffer to allow us to avoid allocations 56 * later. 57 */ 58 int machine_kexec_prepare(struct kimage *image) 59 { 60 void *control_code_buffer; 61 const unsigned long *func; 62 63 func = (unsigned long *)&relocate_new_kernel; 64 /* Pre-load control code buffer to minimize work in kexec path */ 65 control_code_buffer = page_address(image->control_code_page); 66 memcpy((void *)control_code_buffer, (const void *)func[0], 67 relocate_new_kernel_size); 68 flush_icache_range((unsigned long)control_code_buffer, 69 (unsigned long)control_code_buffer + relocate_new_kernel_size); 70 ia64_kimage = image; 71 72 return 0; 73 } 74 75 void machine_kexec_cleanup(struct kimage *image) 76 { 77 } 78 79 /* 80 * Do not allocate memory (or fail in any way) in machine_kexec(). 81 * We are past the point of no return, committed to rebooting now. 82 */ 83 static void ia64_machine_kexec(struct unw_frame_info *info, void *arg) 84 { 85 struct kimage *image = arg; 86 relocate_new_kernel_t rnk; 87 void *pal_addr = efi_get_pal_addr(); 88 unsigned long code_addr; 89 int ii; 90 u64 fp, gp; 91 ia64_fptr_t *init_handler = (ia64_fptr_t *)ia64_os_init_on_kdump; 92 93 BUG_ON(!image); 94 code_addr = (unsigned long)page_address(image->control_code_page); 95 if (image->type == KEXEC_TYPE_CRASH) { 96 crash_save_this_cpu(); 97 current->thread.ksp = (__u64)info->sw - 16; 98 99 /* Register noop init handler */ 100 fp = ia64_tpa(init_handler->fp); 101 gp = ia64_tpa(ia64_getreg(_IA64_REG_GP)); 102 ia64_sal_set_vectors(SAL_VECTOR_OS_INIT, fp, gp, 0, fp, gp, 0); 103 } else { 104 /* Unregister init handlers of current kernel */ 105 ia64_sal_set_vectors(SAL_VECTOR_OS_INIT, 0, 0, 0, 0, 0, 0); 106 } 107 108 /* Unregister mca handler - No more recovery on current kernel */ 109 ia64_sal_set_vectors(SAL_VECTOR_OS_MCA, 0, 0, 0, 0, 0, 0); 110 111 /* Interrupts aren't acceptable while we reboot */ 112 local_irq_disable(); 113 114 /* Mask CMC and Performance Monitor interrupts */ 115 ia64_setreg(_IA64_REG_CR_PMV, 1 << 16); 116 ia64_setreg(_IA64_REG_CR_CMCV, 1 << 16); 117 118 /* Mask ITV and Local Redirect Registers */ 119 ia64_set_itv(1 << 16); 120 ia64_set_lrr0(1 << 16); 121 ia64_set_lrr1(1 << 16); 122 123 /* terminate possible nested in-service interrupts */ 124 for (ii = 0; ii < 16; ii++) 125 ia64_eoi(); 126 127 /* unmask TPR and clear any pending interrupts */ 128 ia64_setreg(_IA64_REG_CR_TPR, 0); 129 ia64_srlz_d(); 130 while (ia64_get_ivr() != IA64_SPURIOUS_INT_VECTOR) 131 ia64_eoi(); 132 platform_kernel_launch_event(); 133 rnk = (relocate_new_kernel_t)&code_addr; 134 (*rnk)(image->head, image->start, ia64_boot_param, 135 GRANULEROUNDDOWN((unsigned long) pal_addr)); 136 BUG(); 137 } 138 139 void machine_kexec(struct kimage *image) 140 { 141 BUG_ON(!image); 142 unw_init_running(ia64_machine_kexec, image); 143 for(;;); 144 } 145 146 void arch_crash_save_vmcoreinfo(void) 147 { 148 #if defined(CONFIG_DISCONTIGMEM) || defined(CONFIG_SPARSEMEM) 149 VMCOREINFO_SYMBOL(pgdat_list); 150 VMCOREINFO_LENGTH(pgdat_list, MAX_NUMNODES); 151 #endif 152 #ifdef CONFIG_NUMA 153 VMCOREINFO_SYMBOL(node_memblk); 154 VMCOREINFO_LENGTH(node_memblk, NR_NODE_MEMBLKS); 155 VMCOREINFO_STRUCT_SIZE(node_memblk_s); 156 VMCOREINFO_OFFSET(node_memblk_s, start_paddr); 157 VMCOREINFO_OFFSET(node_memblk_s, size); 158 #endif 159 #ifdef CONFIG_PGTABLE_3 160 VMCOREINFO_CONFIG(PGTABLE_3); 161 #elif defined(CONFIG_PGTABLE_4) 162 VMCOREINFO_CONFIG(PGTABLE_4); 163 #endif 164 } 165 166 unsigned long paddr_vmcoreinfo_note(void) 167 { 168 return ia64_tpa((unsigned long)(char *)&vmcoreinfo_note); 169 } 170 171