]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/ia64/kernel/machine_kexec.c
Merge tag 'scsi-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi
[mirror_ubuntu-artful-kernel.git] / arch / ia64 / kernel / machine_kexec.c
CommitLineData
a7956113
ZN
1/*
2 * arch/ia64/kernel/machine_kexec.c
3 *
4 * Handle transition of Linux booting another kernel
5 * Copyright (C) 2005 Hewlett-Packard Development Comapny, L.P.
6 * Copyright (C) 2005 Khalid Aziz <khalid.aziz@hp.com>
7 * Copyright (C) 2006 Intel Corp, Zou Nan hai <nanhai.zou@intel.com>
8 *
9 * This source code is licensed under the GNU General Public License,
10 * Version 2. See the file COPYING for more details.
11 */
12
13#include <linux/mm.h>
14#include <linux/kexec.h>
15#include <linux/cpu.h>
16#include <linux/irq.h>
abac08db 17#include <linux/efi.h>
fd59d231
KO
18#include <linux/numa.h>
19#include <linux/mmzone.h>
7259888e
AM
20
21#include <asm/numa.h>
a7956113
ZN
22#include <asm/mmu_context.h>
23#include <asm/setup.h>
24#include <asm/delay.h>
25#include <asm/meminit.h>
00cab92f 26#include <asm/processor.h>
07a6a4ae
HS
27#include <asm/sal.h>
28#include <asm/mca.h>
a7956113 29
9402c95f 30typedef void (*relocate_new_kernel_t)(
53da5763
H
31 unsigned long indirection_page,
32 unsigned long start_address,
33 struct ia64_boot_param *boot_param,
ff2d8b19 34 unsigned long pal_addr) __noreturn;
a7956113
ZN
35
36struct kimage *ia64_kimage;
37
38struct resource efi_memmap_res = {
39 .name = "EFI Memory Map",
40 .start = 0,
41 .end = 0,
42 .flags = IORESOURCE_BUSY | IORESOURCE_MEM
43};
44
45struct resource boot_param_res = {
46 .name = "Boot parameter",
47 .start = 0,
48 .end = 0,
49 .flags = IORESOURCE_BUSY | IORESOURCE_MEM
50};
51
52
53/*
54 * Do what every setup is needed on image and the
55 * reboot code buffer to allow us to avoid allocations
56 * later.
57 */
58int machine_kexec_prepare(struct kimage *image)
59{
60 void *control_code_buffer;
61 const unsigned long *func;
62
63 func = (unsigned long *)&relocate_new_kernel;
64 /* Pre-load control code buffer to minimize work in kexec path */
65 control_code_buffer = page_address(image->control_code_page);
66 memcpy((void *)control_code_buffer, (const void *)func[0],
67 relocate_new_kernel_size);
68 flush_icache_range((unsigned long)control_code_buffer,
69 (unsigned long)control_code_buffer + relocate_new_kernel_size);
70 ia64_kimage = image;
71
72 return 0;
73}
74
75void machine_kexec_cleanup(struct kimage *image)
76{
77}
78
a7956113
ZN
79/*
80 * Do not allocate memory (or fail in any way) in machine_kexec().
81 * We are past the point of no return, committed to rebooting now.
82 */
a7956113
ZN
83static void ia64_machine_kexec(struct unw_frame_info *info, void *arg)
84{
85 struct kimage *image = arg;
86 relocate_new_kernel_t rnk;
87 void *pal_addr = efi_get_pal_addr();
36a45e74 88 unsigned long code_addr;
a7956113 89 int ii;
07a6a4ae
HS
90 u64 fp, gp;
91 ia64_fptr_t *init_handler = (ia64_fptr_t *)ia64_os_init_on_kdump;
a7956113 92
c2c77fe8 93 BUG_ON(!image);
36a45e74 94 code_addr = (unsigned long)page_address(image->control_code_page);
a7956113
ZN
95 if (image->type == KEXEC_TYPE_CRASH) {
96 crash_save_this_cpu();
97 current->thread.ksp = (__u64)info->sw - 16;
07a6a4ae
HS
98
99 /* Register noop init handler */
100 fp = ia64_tpa(init_handler->fp);
101 gp = ia64_tpa(ia64_getreg(_IA64_REG_GP));
102 ia64_sal_set_vectors(SAL_VECTOR_OS_INIT, fp, gp, 0, fp, gp, 0);
103 } else {
104 /* Unregister init handlers of current kernel */
105 ia64_sal_set_vectors(SAL_VECTOR_OS_INIT, 0, 0, 0, 0, 0, 0);
a7956113
ZN
106 }
107
6cc3efcd
HS
108 /* Unregister mca handler - No more recovery on current kernel */
109 ia64_sal_set_vectors(SAL_VECTOR_OS_MCA, 0, 0, 0, 0, 0, 0);
110
a7956113
ZN
111 /* Interrupts aren't acceptable while we reboot */
112 local_irq_disable();
113
114 /* Mask CMC and Performance Monitor interrupts */
115 ia64_setreg(_IA64_REG_CR_PMV, 1 << 16);
116 ia64_setreg(_IA64_REG_CR_CMCV, 1 << 16);
117
118 /* Mask ITV and Local Redirect Registers */
119 ia64_set_itv(1 << 16);
120 ia64_set_lrr0(1 << 16);
121 ia64_set_lrr1(1 << 16);
122
123 /* terminate possible nested in-service interrupts */
124 for (ii = 0; ii < 16; ii++)
125 ia64_eoi();
126
127 /* unmask TPR and clear any pending interrupts */
128 ia64_setreg(_IA64_REG_CR_TPR, 0);
129 ia64_srlz_d();
a62c9fe4 130 while (ia64_get_ivr() != IA64_SPURIOUS_INT_VECTOR)
a7956113 131 ia64_eoi();
a7956113
ZN
132 platform_kernel_launch_event();
133 rnk = (relocate_new_kernel_t)&code_addr;
134 (*rnk)(image->head, image->start, ia64_boot_param,
135 GRANULEROUNDDOWN((unsigned long) pal_addr));
136 BUG();
137}
138
139void machine_kexec(struct kimage *image)
140{
c2c77fe8 141 BUG_ON(!image);
a7956113
ZN
142 unw_init_running(ia64_machine_kexec, image);
143 for(;;);
144}
fd59d231
KO
145
146void arch_crash_save_vmcoreinfo(void)
147{
92df5c3e 148#if defined(CONFIG_DISCONTIGMEM) || defined(CONFIG_SPARSEMEM)
bcbba6c1
KO
149 VMCOREINFO_SYMBOL(pgdat_list);
150 VMCOREINFO_LENGTH(pgdat_list, MAX_NUMNODES);
92df5c3e
KO
151#endif
152#ifdef CONFIG_NUMA
bcbba6c1
KO
153 VMCOREINFO_SYMBOL(node_memblk);
154 VMCOREINFO_LENGTH(node_memblk, NR_NODE_MEMBLKS);
c76f860c 155 VMCOREINFO_STRUCT_SIZE(node_memblk_s);
bcbba6c1
KO
156 VMCOREINFO_OFFSET(node_memblk_s, start_paddr);
157 VMCOREINFO_OFFSET(node_memblk_s, size);
fd59d231 158#endif
4d66bcc7 159#if CONFIG_PGTABLE_LEVELS == 3
bcbba6c1 160 VMCOREINFO_CONFIG(PGTABLE_3);
4d66bcc7 161#elif CONFIG_PGTABLE_LEVELS == 4
bcbba6c1 162 VMCOREINFO_CONFIG(PGTABLE_4);
fd59d231
KO
163#endif
164}
165