]> git.proxmox.com Git - mirror_ubuntu-focal-kernel.git/blame - arch/s390/kernel/machine_kexec.c
s390/kdump: Account /sys/kernel/kexec_crash_size changes in OS info
[mirror_ubuntu-focal-kernel.git] / arch / s390 / kernel / machine_kexec.c
CommitLineData
cf13f0ea
HC
1/*
2 * arch/s390/kernel/machine_kexec.c
3 *
60a0c68d 4 * Copyright IBM Corp. 2005,2011
cf13f0ea 5 *
c6b5b847
HC
6 * Author(s): Rolf Adelsberger,
7 * Heiko Carstens <heiko.carstens@de.ibm.com>
60a0c68d 8 * Michael Holzheu <holzheu@linux.vnet.ibm.com>
cf13f0ea
HC
9 */
10
cf13f0ea
HC
11#include <linux/device.h>
12#include <linux/mm.h>
13#include <linux/kexec.h>
14#include <linux/delay.h>
2b67fc46 15#include <linux/reboot.h>
6966727d 16#include <linux/ftrace.h>
3ab121ab 17#include <linux/debug_locks.h>
a386fba2
HC
18#include <asm/cio.h>
19#include <asm/setup.h>
cf13f0ea
HC
20#include <asm/pgtable.h>
21#include <asm/pgalloc.h>
a386fba2 22#include <asm/smp.h>
15e9b586 23#include <asm/reset.h>
9c9c1761 24#include <asm/ipl.h>
60a0c68d
MH
25#include <asm/diag.h>
26#include <asm/asm-offsets.h>
a9fbf1a5 27#include <asm/os_info.h>
cf13f0ea 28
c6b5b847 29typedef void (*relocate_kernel_t)(kimage_entry_t *, unsigned long);
cf13f0ea 30
2efe55a9
TK
31extern const unsigned char relocate_kernel[];
32extern const unsigned long long relocate_kernel_len;
cf13f0ea 33
60a0c68d
MH
34#ifdef CONFIG_CRASH_DUMP
35
36void *fill_cpu_elf_notes(void *ptr, struct save_area *sa);
37
38/*
39 * Create ELF notes for one CPU
40 */
41static void add_elf_notes(int cpu)
42{
43 struct save_area *sa = (void *) 4608 + store_prefix();
44 void *ptr;
45
46 memcpy((void *) (4608UL + sa->pref_reg), sa, sizeof(*sa));
47 ptr = (u64 *) per_cpu_ptr(crash_notes, cpu);
48 ptr = fill_cpu_elf_notes(ptr, sa);
49 memset(ptr, 0, sizeof(struct elf_note));
50}
51
60a0c68d
MH
52/*
53 * Initialize CPU ELF notes
54 */
55void setup_regs(void)
56{
57 unsigned long sa = S390_lowcore.prefixreg_save_area + SAVE_AREA_BASE;
8b646bd7 58 int cpu, this_cpu;
60a0c68d 59
8b646bd7
MS
60 this_cpu = smp_find_processor_id(stap());
61 add_elf_notes(this_cpu);
60a0c68d 62 for_each_online_cpu(cpu) {
8b646bd7
MS
63 if (cpu == this_cpu)
64 continue;
65 if (smp_store_status(cpu))
60a0c68d 66 continue;
60a0c68d 67 add_elf_notes(cpu);
60a0c68d
MH
68 }
69 /* Copy dump CPU store status info to absolute zero */
70 memcpy((void *) SAVE_AREA_BASE, (void *) sa, sizeof(struct save_area));
71}
72
73#endif
74
75/*
76 * Start kdump: We expect here that a store status has been done on our CPU
77 */
78static void __do_machine_kdump(void *image)
79{
80#ifdef CONFIG_CRASH_DUMP
81 int (*start_kdump)(int) = (void *)((struct kimage *) image)->start;
82
b50511e4 83 __load_psw_mask(PSW_MASK_BASE | PSW_DEFAULT_KEY | PSW_MASK_EA | PSW_MASK_BA);
60a0c68d
MH
84 setup_regs();
85 start_kdump(1);
86#endif
87}
88
89/*
90 * Check if kdump checksums are valid: We call purgatory with parameter "0"
91 */
92static int kdump_csum_valid(struct kimage *image)
93{
94#ifdef CONFIG_CRASH_DUMP
95 int (*start_kdump)(int) = (void *)image->start;
96 int rc;
97
98 __arch_local_irq_stnsm(0xfb); /* disable DAT */
99 rc = start_kdump(0);
100 __arch_local_irq_stosm(0x04); /* enable DAT */
101 return rc ? 0 : -EINVAL;
102#else
103 return -EINVAL;
104#endif
105}
106
dab7a7b1
MH
107/*
108 * Map or unmap crashkernel memory
109 */
110static void crash_map_pages(int enable)
111{
112 unsigned long size = resource_size(&crashk_res);
113
114 BUG_ON(crashk_res.start % KEXEC_CRASH_MEM_ALIGN ||
115 size % KEXEC_CRASH_MEM_ALIGN);
116 if (enable)
117 vmem_add_mapping(crashk_res.start, size);
a9fbf1a5 118 else {
dab7a7b1 119 vmem_remove_mapping(crashk_res.start, size);
a9fbf1a5
MH
120 if (size)
121 os_info_crashkernel_add(crashk_res.start, size);
122 else
123 os_info_crashkernel_add(0, 0);
124 }
dab7a7b1
MH
125}
126
127/*
128 * Map crashkernel memory
129 */
130void crash_map_reserved_pages(void)
131{
132 crash_map_pages(1);
133}
134
135/*
136 * Unmap crashkernel memory
137 */
138void crash_unmap_reserved_pages(void)
139{
140 crash_map_pages(0);
141}
142
60a0c68d
MH
143/*
144 * Give back memory to hypervisor before new kdump is loaded
145 */
146static int machine_kexec_prepare_kdump(void)
147{
148#ifdef CONFIG_CRASH_DUMP
149 if (MACHINE_IS_VM)
150 diag10_range(PFN_DOWN(crashk_res.start),
151 PFN_DOWN(crashk_res.end - crashk_res.start + 1));
152 return 0;
153#else
154 return -EINVAL;
155#endif
156}
157
c6b5b847 158int machine_kexec_prepare(struct kimage *image)
cf13f0ea 159{
c6b5b847 160 void *reboot_code_buffer;
cf13f0ea 161
9c9c1761
HC
162 /* Can't replace kernel image since it is read-only. */
163 if (ipl_flags & IPL_NSS_VALID)
164 return -ENOSYS;
165
60a0c68d
MH
166 if (image->type == KEXEC_TYPE_CRASH)
167 return machine_kexec_prepare_kdump();
168
cf13f0ea
HC
169 /* We don't support anything but the default image type for now. */
170 if (image->type != KEXEC_TYPE_DEFAULT)
171 return -EINVAL;
172
173 /* Get the destination where the assembler code should be copied to.*/
c6b5b847 174 reboot_code_buffer = (void *) page_to_phys(image->control_code_page);
cf13f0ea
HC
175
176 /* Then copy it */
c6b5b847 177 memcpy(reboot_code_buffer, relocate_kernel, relocate_kernel_len);
cf13f0ea
HC
178 return 0;
179}
180
c6b5b847 181void machine_kexec_cleanup(struct kimage *image)
cf13f0ea
HC
182{
183}
184
60a0c68d
MH
185void arch_crash_save_vmcoreinfo(void)
186{
187 VMCOREINFO_SYMBOL(lowcore_ptr);
7fe7a18c 188 VMCOREINFO_SYMBOL(high_memory);
60a0c68d
MH
189 VMCOREINFO_LENGTH(lowcore_ptr, NR_CPUS);
190}
191
c6b5b847 192void machine_shutdown(void)
cf13f0ea 193{
cf13f0ea
HC
194}
195
60a0c68d
MH
196/*
197 * Do normal kexec
198 */
199static void __do_machine_kexec(void *data)
cf13f0ea 200{
cf13f0ea 201 relocate_kernel_t data_mover;
2c2df118 202 struct kimage *image = data;
cf13f0ea 203
c6b5b847 204 data_mover = (relocate_kernel_t) page_to_phys(image->control_code_page);
cf13f0ea
HC
205
206 /* Call the moving routine */
c6b5b847 207 (*data_mover)(&image->head, image->start);
cf13f0ea 208}
2c2df118 209
60a0c68d
MH
210/*
211 * Reset system and call either kdump or normal kexec
212 */
213static void __machine_kexec(void *data)
214{
215 struct kimage *image = data;
216
217 pfault_fini();
3ab121ab
MH
218 tracing_off();
219 debug_locks_off();
220 if (image->type == KEXEC_TYPE_CRASH) {
221 lgr_info_log();
60a0c68d 222 s390_reset_system(__do_machine_kdump, data);
3ab121ab 223 } else {
60a0c68d 224 s390_reset_system(__do_machine_kexec, data);
3ab121ab 225 }
60a0c68d
MH
226 disabled_wait((unsigned long) __builtin_return_address(0));
227}
228
229/*
230 * Do either kdump or normal kexec. In case of kdump we first ask
231 * purgatory, if kdump checksums are valid.
232 */
2c2df118
HC
233void machine_kexec(struct kimage *image)
234{
60a0c68d
MH
235 if (image->type == KEXEC_TYPE_CRASH && !kdump_csum_valid(image))
236 return;
6966727d 237 tracer_disable();
2c2df118 238 smp_send_stop();
8b646bd7 239 smp_call_ipl_cpu(__machine_kexec, image);
2c2df118 240}