linux/arch/ia64/kernel/machine_kexec.c
<<
>>
Prefs
   1/*
   2 * arch/ia64/kernel/machine_kexec.c
   3 *
   4 * Handle transition of Linux booting another kernel
   5 * Copyright (C) 2005 Hewlett-Packard Development Comapny, L.P.
   6 * Copyright (C) 2005 Khalid Aziz <khalid.aziz@hp.com>
   7 * Copyright (C) 2006 Intel Corp, Zou Nan hai <nanhai.zou@intel.com>
   8 *
   9 * This source code is licensed under the GNU General Public License,
  10 * Version 2.  See the file COPYING for more details.
  11 */
  12
  13#include <linux/mm.h>
  14#include <linux/kexec.h>
  15#include <linux/cpu.h>
  16#include <linux/irq.h>
  17#include <linux/efi.h>
  18#include <linux/numa.h>
  19#include <linux/mmzone.h>
  20
  21#include <asm/numa.h>
  22#include <asm/mmu_context.h>
  23#include <asm/setup.h>
  24#include <asm/delay.h>
  25#include <asm/meminit.h>
  26#include <asm/processor.h>
  27#include <asm/sal.h>
  28#include <asm/mca.h>
  29
  30typedef void (*relocate_new_kernel_t)(
  31                                        unsigned long indirection_page,
  32                                        unsigned long start_address,
  33                                        struct ia64_boot_param *boot_param,
  34                                        unsigned long pal_addr) __noreturn;
  35
  36struct kimage *ia64_kimage;
  37
  38struct resource efi_memmap_res = {
  39        .name  = "EFI Memory Map",
  40        .start = 0,
  41        .end   = 0,
  42        .flags = IORESOURCE_BUSY | IORESOURCE_MEM
  43};
  44
  45struct resource boot_param_res = {
  46        .name  = "Boot parameter",
  47        .start = 0,
  48        .end   = 0,
  49        .flags = IORESOURCE_BUSY | IORESOURCE_MEM
  50};
  51
  52
  53/*
  54 * Do what every setup is needed on image and the
  55 * reboot code buffer to allow us to avoid allocations
  56 * later.
  57 */
  58int machine_kexec_prepare(struct kimage *image)
  59{
  60        void *control_code_buffer;
  61        const unsigned long *func;
  62
  63        func = (unsigned long *)&relocate_new_kernel;
  64        /* Pre-load control code buffer to minimize work in kexec path */
  65        control_code_buffer = page_address(image->control_code_page);
  66        memcpy((void *)control_code_buffer, (const void *)func[0],
  67                        relocate_new_kernel_size);
  68        flush_icache_range((unsigned long)control_code_buffer,
  69                        (unsigned long)control_code_buffer + relocate_new_kernel_size);
  70        ia64_kimage = image;
  71
  72        return 0;
  73}
  74
  75void machine_kexec_cleanup(struct kimage *image)
  76{
  77}
  78
  79/*
  80 * Do not allocate memory (or fail in any way) in machine_kexec().
  81 * We are past the point of no return, committed to rebooting now.
  82 */
  83static void ia64_machine_kexec(struct unw_frame_info *info, void *arg)
  84{
  85        struct kimage *image = arg;
  86        relocate_new_kernel_t rnk;
  87        void *pal_addr = efi_get_pal_addr();
  88        unsigned long code_addr;
  89        int ii;
  90        u64 fp, gp;
  91        ia64_fptr_t *init_handler = (ia64_fptr_t *)ia64_os_init_on_kdump;
  92
  93        BUG_ON(!image);
  94        code_addr = (unsigned long)page_address(image->control_code_page);
  95        if (image->type == KEXEC_TYPE_CRASH) {
  96                crash_save_this_cpu();
  97                current->thread.ksp = (__u64)info->sw - 16;
  98
  99                /* Register noop init handler */
 100                fp = ia64_tpa(init_handler->fp);
 101                gp = ia64_tpa(ia64_getreg(_IA64_REG_GP));
 102                ia64_sal_set_vectors(SAL_VECTOR_OS_INIT, fp, gp, 0, fp, gp, 0);
 103        } else {
 104                /* Unregister init handlers of current kernel */
 105                ia64_sal_set_vectors(SAL_VECTOR_OS_INIT, 0, 0, 0, 0, 0, 0);
 106        }
 107
 108        /* Unregister mca handler - No more recovery on current kernel */
 109        ia64_sal_set_vectors(SAL_VECTOR_OS_MCA, 0, 0, 0, 0, 0, 0);
 110
 111        /* Interrupts aren't acceptable while we reboot */
 112        local_irq_disable();
 113
 114        /* Mask CMC and Performance Monitor interrupts */
 115        ia64_setreg(_IA64_REG_CR_PMV, 1 << 16);
 116        ia64_setreg(_IA64_REG_CR_CMCV, 1 << 16);
 117
 118        /* Mask ITV and Local Redirect Registers */
 119        ia64_set_itv(1 << 16);
 120        ia64_set_lrr0(1 << 16);
 121        ia64_set_lrr1(1 << 16);
 122
 123        /* terminate possible nested in-service interrupts */
 124        for (ii = 0; ii < 16; ii++)
 125                ia64_eoi();
 126
 127        /* unmask TPR and clear any pending interrupts */
 128        ia64_setreg(_IA64_REG_CR_TPR, 0);
 129        ia64_srlz_d();
 130        while (ia64_get_ivr() != IA64_SPURIOUS_INT_VECTOR)
 131                ia64_eoi();
 132        platform_kernel_launch_event();
 133        rnk = (relocate_new_kernel_t)&code_addr;
 134        (*rnk)(image->head, image->start, ia64_boot_param,
 135                     GRANULEROUNDDOWN((unsigned long) pal_addr));
 136        BUG();
 137}
 138
 139void machine_kexec(struct kimage *image)
 140{
 141        BUG_ON(!image);
 142        unw_init_running(ia64_machine_kexec, image);
 143        for(;;);
 144}
 145
 146void arch_crash_save_vmcoreinfo(void)
 147{
 148#if defined(CONFIG_DISCONTIGMEM) || defined(CONFIG_SPARSEMEM)
 149        VMCOREINFO_SYMBOL(pgdat_list);
 150        VMCOREINFO_LENGTH(pgdat_list, MAX_NUMNODES);
 151#endif
 152#ifdef CONFIG_NUMA
 153        VMCOREINFO_SYMBOL(node_memblk);
 154        VMCOREINFO_LENGTH(node_memblk, NR_NODE_MEMBLKS);
 155        VMCOREINFO_STRUCT_SIZE(node_memblk_s);
 156        VMCOREINFO_OFFSET(node_memblk_s, start_paddr);
 157        VMCOREINFO_OFFSET(node_memblk_s, size);
 158#endif
 159#ifdef CONFIG_PGTABLE_3
 160        VMCOREINFO_CONFIG(PGTABLE_3);
 161#elif defined(CONFIG_PGTABLE_4)
 162        VMCOREINFO_CONFIG(PGTABLE_4);
 163#endif
 164}
 165
 166unsigned long paddr_vmcoreinfo_note(void)
 167{
 168        return ia64_tpa((unsigned long)(char *)&vmcoreinfo_note);
 169}
 170
 171