]>
Commit | Line | Data |
---|---|---|
cf13f0ea | 1 | /* |
a53c8fab | 2 | * Copyright IBM Corp. 2005, 2011 |
cf13f0ea | 3 | * |
c6b5b847 HC |
4 | * Author(s): Rolf Adelsberger, |
5 | * Heiko Carstens <heiko.carstens@de.ibm.com> | |
60a0c68d | 6 | * Michael Holzheu <holzheu@linux.vnet.ibm.com> |
cf13f0ea HC |
7 | */ |
8 | ||
cf13f0ea HC |
9 | #include <linux/device.h> |
10 | #include <linux/mm.h> | |
11 | #include <linux/kexec.h> | |
12 | #include <linux/delay.h> | |
2b67fc46 | 13 | #include <linux/reboot.h> |
6966727d | 14 | #include <linux/ftrace.h> |
3ab121ab | 15 | #include <linux/debug_locks.h> |
b66ac63e | 16 | #include <linux/suspend.h> |
a386fba2 HC |
17 | #include <asm/cio.h> |
18 | #include <asm/setup.h> | |
cf13f0ea HC |
19 | #include <asm/pgtable.h> |
20 | #include <asm/pgalloc.h> | |
a386fba2 | 21 | #include <asm/smp.h> |
15e9b586 | 22 | #include <asm/reset.h> |
9c9c1761 | 23 | #include <asm/ipl.h> |
60a0c68d | 24 | #include <asm/diag.h> |
6b563d8c | 25 | #include <asm/elf.h> |
60a0c68d | 26 | #include <asm/asm-offsets.h> |
4e042af4 | 27 | #include <asm/cacheflush.h> |
a9fbf1a5 | 28 | #include <asm/os_info.h> |
a62bc073 | 29 | #include <asm/switch_to.h> |
cf13f0ea | 30 | |
c6b5b847 | 31 | typedef void (*relocate_kernel_t)(kimage_entry_t *, unsigned long); |
cf13f0ea | 32 | |
2efe55a9 TK |
33 | extern const unsigned char relocate_kernel[]; |
34 | extern const unsigned long long relocate_kernel_len; | |
cf13f0ea | 35 | |
60a0c68d MH |
36 | #ifdef CONFIG_CRASH_DUMP |
37 | ||
b66ac63e MH |
38 | /* |
39 | * PM notifier callback for kdump | |
40 | */ | |
41 | static int machine_kdump_pm_cb(struct notifier_block *nb, unsigned long action, | |
42 | void *ptr) | |
43 | { | |
44 | switch (action) { | |
45 | case PM_SUSPEND_PREPARE: | |
46 | case PM_HIBERNATION_PREPARE: | |
7a0058ec XP |
47 | if (kexec_crash_image) |
48 | arch_kexec_unprotect_crashkres(); | |
b66ac63e MH |
49 | break; |
50 | case PM_POST_SUSPEND: | |
51 | case PM_POST_HIBERNATION: | |
7a0058ec XP |
52 | if (kexec_crash_image) |
53 | arch_kexec_protect_crashkres(); | |
b66ac63e MH |
54 | break; |
55 | default: | |
56 | return NOTIFY_DONE; | |
57 | } | |
58 | return NOTIFY_OK; | |
59 | } | |
60 | ||
61 | static int __init machine_kdump_pm_init(void) | |
62 | { | |
63 | pm_notifier(machine_kdump_pm_cb, 0); | |
64 | return 0; | |
65 | } | |
66 | arch_initcall(machine_kdump_pm_init); | |
60a0c68d MH |
67 | |
68 | /* | |
1a36a39e MS |
69 | * Reset the system, copy boot CPU registers to absolute zero, |
70 | * and jump to the kdump image | |
60a0c68d MH |
71 | */ |
72 | static void __do_machine_kdump(void *image) | |
73 | { | |
1a36a39e MS |
74 | int (*start_kdump)(int); |
75 | unsigned long prefix; | |
76 | ||
77 | /* store_status() saved the prefix register to lowcore */ | |
78 | prefix = (unsigned long) S390_lowcore.prefixreg_save_area; | |
79 | ||
80 | /* Now do the reset */ | |
81 | s390_reset_system(); | |
82 | ||
83 | /* | |
84 | * Copy dump CPU store status info to absolute zero. | |
85 | * This need to be done *after* s390_reset_system set the | |
86 | * prefix register of this CPU to zero | |
87 | */ | |
88 | memcpy((void *) __LC_FPREGS_SAVE_AREA, | |
89 | (void *)(prefix + __LC_FPREGS_SAVE_AREA), 512); | |
60a0c68d | 90 | |
fa7c0043 | 91 | __load_psw_mask(PSW_MASK_BASE | PSW_DEFAULT_KEY | PSW_MASK_EA | PSW_MASK_BA); |
1a36a39e | 92 | start_kdump = (void *)((struct kimage *) image)->start; |
60a0c68d | 93 | start_kdump(1); |
1a36a39e MS |
94 | |
95 | /* Die if start_kdump returns */ | |
96 | disabled_wait((unsigned long) __builtin_return_address(0)); | |
97 | } | |
98 | ||
99 | /* | |
100 | * Start kdump: create a LGR log entry, store status of all CPUs and | |
101 | * branch to __do_machine_kdump. | |
102 | */ | |
103 | static noinline void __machine_kdump(void *image) | |
104 | { | |
105 | int this_cpu, cpu; | |
106 | ||
107 | lgr_info_log(); | |
108 | /* Get status of the other CPUs */ | |
109 | this_cpu = smp_find_processor_id(stap()); | |
110 | for_each_online_cpu(cpu) { | |
111 | if (cpu == this_cpu) | |
112 | continue; | |
113 | if (smp_store_status(cpu)) | |
114 | continue; | |
115 | } | |
116 | /* Store status of the boot CPU */ | |
117 | if (MACHINE_HAS_VX) | |
118 | save_vx_regs((void *) &S390_lowcore.vector_save_area); | |
119 | /* | |
120 | * To create a good backchain for this CPU in the dump store_status | |
121 | * is passed the address of a function. The address is saved into | |
122 | * the PSW save area of the boot CPU and the function is invoked as | |
123 | * a tail call of store_status. The backchain in the dump will look | |
124 | * like this: | |
125 | * restart_int_handler -> __machine_kexec -> __do_machine_kdump | |
126 | * The call to store_status() will not return. | |
127 | */ | |
128 | store_status(__do_machine_kdump, image); | |
60a0c68d | 129 | } |
10ad34bc | 130 | #endif |
60a0c68d MH |
131 | |
132 | /* | |
133 | * Check if kdump checksums are valid: We call purgatory with parameter "0" | |
134 | */ | |
135 | static int kdump_csum_valid(struct kimage *image) | |
136 | { | |
137 | #ifdef CONFIG_CRASH_DUMP | |
138 | int (*start_kdump)(int) = (void *)image->start; | |
139 | int rc; | |
140 | ||
141 | __arch_local_irq_stnsm(0xfb); /* disable DAT */ | |
142 | rc = start_kdump(0); | |
143 | __arch_local_irq_stosm(0x04); /* enable DAT */ | |
144 | return rc ? 0 : -EINVAL; | |
145 | #else | |
146 | return -EINVAL; | |
147 | #endif | |
148 | } | |
149 | ||
7a0058ec XP |
150 | #ifdef CONFIG_CRASH_DUMP |
151 | ||
2d0af224 HC |
152 | void crash_free_reserved_phys_range(unsigned long begin, unsigned long end) |
153 | { | |
154 | unsigned long addr, size; | |
155 | ||
156 | for (addr = begin; addr < end; addr += PAGE_SIZE) | |
157 | free_reserved_page(pfn_to_page(addr >> PAGE_SHIFT)); | |
158 | size = begin - crashk_res.start; | |
159 | if (size) | |
160 | os_info_crashkernel_add(crashk_res.start, size); | |
161 | else | |
162 | os_info_crashkernel_add(0, 0); | |
163 | } | |
164 | ||
4e042af4 | 165 | static void crash_protect_pages(int protect) |
dab7a7b1 | 166 | { |
4e042af4 | 167 | unsigned long size; |
dab7a7b1 | 168 | |
4e042af4 HC |
169 | if (!crashk_res.end) |
170 | return; | |
171 | size = resource_size(&crashk_res); | |
172 | if (protect) | |
173 | set_memory_ro(crashk_res.start, size >> PAGE_SHIFT); | |
2d0af224 | 174 | else |
4e042af4 | 175 | set_memory_rw(crashk_res.start, size >> PAGE_SHIFT); |
dab7a7b1 MH |
176 | } |
177 | ||
7a0058ec | 178 | void arch_kexec_protect_crashkres(void) |
dab7a7b1 | 179 | { |
4e042af4 | 180 | crash_protect_pages(1); |
dab7a7b1 MH |
181 | } |
182 | ||
7a0058ec | 183 | void arch_kexec_unprotect_crashkres(void) |
dab7a7b1 | 184 | { |
4e042af4 | 185 | crash_protect_pages(0); |
dab7a7b1 MH |
186 | } |
187 | ||
7a0058ec XP |
188 | #endif |
189 | ||
60a0c68d MH |
190 | /* |
191 | * Give back memory to hypervisor before new kdump is loaded | |
192 | */ | |
193 | static int machine_kexec_prepare_kdump(void) | |
194 | { | |
195 | #ifdef CONFIG_CRASH_DUMP | |
196 | if (MACHINE_IS_VM) | |
197 | diag10_range(PFN_DOWN(crashk_res.start), | |
198 | PFN_DOWN(crashk_res.end - crashk_res.start + 1)); | |
199 | return 0; | |
200 | #else | |
201 | return -EINVAL; | |
202 | #endif | |
203 | } | |
204 | ||
c6b5b847 | 205 | int machine_kexec_prepare(struct kimage *image) |
cf13f0ea | 206 | { |
c6b5b847 | 207 | void *reboot_code_buffer; |
cf13f0ea | 208 | |
9c9c1761 HC |
209 | /* Can't replace kernel image since it is read-only. */ |
210 | if (ipl_flags & IPL_NSS_VALID) | |
d978386e | 211 | return -EOPNOTSUPP; |
9c9c1761 | 212 | |
60a0c68d MH |
213 | if (image->type == KEXEC_TYPE_CRASH) |
214 | return machine_kexec_prepare_kdump(); | |
215 | ||
cf13f0ea HC |
216 | /* We don't support anything but the default image type for now. */ |
217 | if (image->type != KEXEC_TYPE_DEFAULT) | |
218 | return -EINVAL; | |
219 | ||
220 | /* Get the destination where the assembler code should be copied to.*/ | |
c6b5b847 | 221 | reboot_code_buffer = (void *) page_to_phys(image->control_code_page); |
cf13f0ea HC |
222 | |
223 | /* Then copy it */ | |
c6b5b847 | 224 | memcpy(reboot_code_buffer, relocate_kernel, relocate_kernel_len); |
cf13f0ea HC |
225 | return 0; |
226 | } | |
227 | ||
c6b5b847 | 228 | void machine_kexec_cleanup(struct kimage *image) |
cf13f0ea HC |
229 | { |
230 | } | |
231 | ||
60a0c68d MH |
232 | void arch_crash_save_vmcoreinfo(void) |
233 | { | |
234 | VMCOREINFO_SYMBOL(lowcore_ptr); | |
7fe7a18c | 235 | VMCOREINFO_SYMBOL(high_memory); |
60a0c68d MH |
236 | VMCOREINFO_LENGTH(lowcore_ptr, NR_CPUS); |
237 | } | |
238 | ||
c6b5b847 | 239 | void machine_shutdown(void) |
cf13f0ea | 240 | { |
cf13f0ea HC |
241 | } |
242 | ||
48a8ca03 HC |
243 | void machine_crash_shutdown(struct pt_regs *regs) |
244 | { | |
245 | } | |
246 | ||
60a0c68d MH |
247 | /* |
248 | * Do normal kexec | |
249 | */ | |
250 | static void __do_machine_kexec(void *data) | |
cf13f0ea | 251 | { |
cf13f0ea | 252 | relocate_kernel_t data_mover; |
2c2df118 | 253 | struct kimage *image = data; |
cf13f0ea | 254 | |
1a36a39e | 255 | s390_reset_system(); |
c6b5b847 | 256 | data_mover = (relocate_kernel_t) page_to_phys(image->control_code_page); |
cf13f0ea HC |
257 | |
258 | /* Call the moving routine */ | |
c6b5b847 | 259 | (*data_mover)(&image->head, image->start); |
1a36a39e MS |
260 | |
261 | /* Die if kexec returns */ | |
262 | disabled_wait((unsigned long) __builtin_return_address(0)); | |
cf13f0ea | 263 | } |
2c2df118 | 264 | |
60a0c68d MH |
265 | /* |
266 | * Reset system and call either kdump or normal kexec | |
267 | */ | |
268 | static void __machine_kexec(void *data) | |
269 | { | |
fa7c0043 | 270 | __arch_local_irq_stosm(0x04); /* enable DAT */ |
60a0c68d | 271 | pfault_fini(); |
3ab121ab MH |
272 | tracing_off(); |
273 | debug_locks_off(); | |
10ad34bc | 274 | #ifdef CONFIG_CRASH_DUMP |
1a36a39e MS |
275 | if (((struct kimage *) data)->type == KEXEC_TYPE_CRASH) |
276 | __machine_kdump(data); | |
10ad34bc | 277 | #endif |
1a36a39e | 278 | __do_machine_kexec(data); |
60a0c68d MH |
279 | } |
280 | ||
281 | /* | |
282 | * Do either kdump or normal kexec. In case of kdump we first ask | |
283 | * purgatory, if kdump checksums are valid. | |
284 | */ | |
2c2df118 HC |
285 | void machine_kexec(struct kimage *image) |
286 | { | |
60a0c68d MH |
287 | if (image->type == KEXEC_TYPE_CRASH && !kdump_csum_valid(image)) |
288 | return; | |
6966727d | 289 | tracer_disable(); |
2c2df118 | 290 | smp_send_stop(); |
8b646bd7 | 291 | smp_call_ipl_cpu(__machine_kexec, image); |
2c2df118 | 292 | } |