blob: 493304bdf1c7845c34c632b33361b6468126c7a6 [file] [log] [blame]
Heiko Carstenscf13f0e2005-06-25 14:58:11 -07001/*
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02002 * Copyright IBM Corp. 2005, 2011
Heiko Carstenscf13f0e2005-06-25 14:58:11 -07003 *
Heiko Carstensc6b5b842006-12-04 15:40:33 +01004 * Author(s): Rolf Adelsberger,
5 * Heiko Carstens <heiko.carstens@de.ibm.com>
Michael Holzheu60a0c682011-10-30 15:16:40 +01006 * Michael Holzheu <holzheu@linux.vnet.ibm.com>
Heiko Carstenscf13f0e2005-06-25 14:58:11 -07007 */
8
Heiko Carstenscf13f0e2005-06-25 14:58:11 -07009#include <linux/device.h>
10#include <linux/mm.h>
11#include <linux/kexec.h>
12#include <linux/delay.h>
Heiko Carstens2b67fc42007-02-05 21:16:47 +010013#include <linux/reboot.h>
Heiko Carstens69667272011-03-15 17:08:33 +010014#include <linux/ftrace.h>
Michael Holzheu3ab121a2012-03-11 11:59:32 -040015#include <linux/debug_locks.h>
Heiko Carstensa386fba2006-02-11 17:56:01 -080016#include <asm/cio.h>
17#include <asm/setup.h>
Heiko Carstenscf13f0e2005-06-25 14:58:11 -070018#include <asm/pgtable.h>
19#include <asm/pgalloc.h>
Heiko Carstensa386fba2006-02-11 17:56:01 -080020#include <asm/smp.h>
Heiko Carstens15e9b582006-12-04 15:40:26 +010021#include <asm/reset.h>
Heiko Carstens9c9c1762007-03-05 23:35:45 +010022#include <asm/ipl.h>
Michael Holzheu60a0c682011-10-30 15:16:40 +010023#include <asm/diag.h>
24#include <asm/asm-offsets.h>
Michael Holzheua9fbf1a2012-05-18 15:10:05 +020025#include <asm/os_info.h>
Heiko Carstenscf13f0e2005-06-25 14:58:11 -070026
Heiko Carstensc6b5b842006-12-04 15:40:33 +010027typedef void (*relocate_kernel_t)(kimage_entry_t *, unsigned long);
Heiko Carstenscf13f0e2005-06-25 14:58:11 -070028
Tobias Klauser2efe55a2006-06-26 18:57:34 +020029extern const unsigned char relocate_kernel[];
30extern const unsigned long long relocate_kernel_len;
Heiko Carstenscf13f0e2005-06-25 14:58:11 -070031
Michael Holzheu60a0c682011-10-30 15:16:40 +010032#ifdef CONFIG_CRASH_DUMP
33
34void *fill_cpu_elf_notes(void *ptr, struct save_area *sa);
35
36/*
37 * Create ELF notes for one CPU
38 */
39static void add_elf_notes(int cpu)
40{
41 struct save_area *sa = (void *) 4608 + store_prefix();
42 void *ptr;
43
44 memcpy((void *) (4608UL + sa->pref_reg), sa, sizeof(*sa));
45 ptr = (u64 *) per_cpu_ptr(crash_notes, cpu);
46 ptr = fill_cpu_elf_notes(ptr, sa);
47 memset(ptr, 0, sizeof(struct elf_note));
48}
49
50/*
Michael Holzheu60a0c682011-10-30 15:16:40 +010051 * Initialize CPU ELF notes
52 */
53void setup_regs(void)
54{
55 unsigned long sa = S390_lowcore.prefixreg_save_area + SAVE_AREA_BASE;
Martin Schwidefsky8b646bd2012-03-11 11:59:26 -040056 int cpu, this_cpu;
Michael Holzheu60a0c682011-10-30 15:16:40 +010057
Martin Schwidefsky8b646bd2012-03-11 11:59:26 -040058 this_cpu = smp_find_processor_id(stap());
59 add_elf_notes(this_cpu);
Michael Holzheu60a0c682011-10-30 15:16:40 +010060 for_each_online_cpu(cpu) {
Martin Schwidefsky8b646bd2012-03-11 11:59:26 -040061 if (cpu == this_cpu)
Michael Holzheu60a0c682011-10-30 15:16:40 +010062 continue;
Martin Schwidefsky8b646bd2012-03-11 11:59:26 -040063 if (smp_store_status(cpu))
64 continue;
Michael Holzheu60a0c682011-10-30 15:16:40 +010065 add_elf_notes(cpu);
Michael Holzheu60a0c682011-10-30 15:16:40 +010066 }
67 /* Copy dump CPU store status info to absolute zero */
68 memcpy((void *) SAVE_AREA_BASE, (void *) sa, sizeof(struct save_area));
69}
70
71#endif
72
73/*
74 * Start kdump: We expect here that a store status has been done on our CPU
75 */
76static void __do_machine_kdump(void *image)
77{
78#ifdef CONFIG_CRASH_DUMP
79 int (*start_kdump)(int) = (void *)((struct kimage *) image)->start;
80
Michael Holzheu60a0c682011-10-30 15:16:40 +010081 setup_regs();
Michael Holzheufa7c0042012-05-21 11:30:30 +020082 __load_psw_mask(PSW_MASK_BASE | PSW_DEFAULT_KEY | PSW_MASK_EA | PSW_MASK_BA);
Michael Holzheu60a0c682011-10-30 15:16:40 +010083 start_kdump(1);
84#endif
85}
86
87/*
88 * Check if kdump checksums are valid: We call purgatory with parameter "0"
89 */
90static int kdump_csum_valid(struct kimage *image)
91{
92#ifdef CONFIG_CRASH_DUMP
93 int (*start_kdump)(int) = (void *)image->start;
94 int rc;
95
96 __arch_local_irq_stnsm(0xfb); /* disable DAT */
97 rc = start_kdump(0);
98 __arch_local_irq_stosm(0x04); /* enable DAT */
99 return rc ? 0 : -EINVAL;
100#else
101 return -EINVAL;
102#endif
103}
104
105/*
Michael Holzheudab7a7b2011-10-30 15:16:44 +0100106 * Map or unmap crashkernel memory
107 */
108static void crash_map_pages(int enable)
109{
110 unsigned long size = resource_size(&crashk_res);
111
112 BUG_ON(crashk_res.start % KEXEC_CRASH_MEM_ALIGN ||
113 size % KEXEC_CRASH_MEM_ALIGN);
114 if (enable)
115 vmem_add_mapping(crashk_res.start, size);
Michael Holzheua9fbf1a2012-05-18 15:10:05 +0200116 else {
Michael Holzheudab7a7b2011-10-30 15:16:44 +0100117 vmem_remove_mapping(crashk_res.start, size);
Michael Holzheua9fbf1a2012-05-18 15:10:05 +0200118 if (size)
119 os_info_crashkernel_add(crashk_res.start, size);
120 else
121 os_info_crashkernel_add(0, 0);
122 }
Michael Holzheudab7a7b2011-10-30 15:16:44 +0100123}
124
125/*
126 * Map crashkernel memory
127 */
128void crash_map_reserved_pages(void)
129{
130 crash_map_pages(1);
131}
132
133/*
134 * Unmap crashkernel memory
135 */
136void crash_unmap_reserved_pages(void)
137{
138 crash_map_pages(0);
139}
140
141/*
Michael Holzheu60a0c682011-10-30 15:16:40 +0100142 * Give back memory to hypervisor before new kdump is loaded
143 */
144static int machine_kexec_prepare_kdump(void)
145{
146#ifdef CONFIG_CRASH_DUMP
147 if (MACHINE_IS_VM)
148 diag10_range(PFN_DOWN(crashk_res.start),
149 PFN_DOWN(crashk_res.end - crashk_res.start + 1));
150 return 0;
151#else
152 return -EINVAL;
153#endif
154}
155
Heiko Carstensc6b5b842006-12-04 15:40:33 +0100156int machine_kexec_prepare(struct kimage *image)
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700157{
Heiko Carstensc6b5b842006-12-04 15:40:33 +0100158 void *reboot_code_buffer;
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700159
Heiko Carstens9c9c1762007-03-05 23:35:45 +0100160 /* Can't replace kernel image since it is read-only. */
161 if (ipl_flags & IPL_NSS_VALID)
162 return -ENOSYS;
163
Michael Holzheu60a0c682011-10-30 15:16:40 +0100164 if (image->type == KEXEC_TYPE_CRASH)
165 return machine_kexec_prepare_kdump();
166
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700167 /* We don't support anything but the default image type for now. */
168 if (image->type != KEXEC_TYPE_DEFAULT)
169 return -EINVAL;
170
171 /* Get the destination where the assembler code should be copied to.*/
Heiko Carstensc6b5b842006-12-04 15:40:33 +0100172 reboot_code_buffer = (void *) page_to_phys(image->control_code_page);
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700173
174 /* Then copy it */
Heiko Carstensc6b5b842006-12-04 15:40:33 +0100175 memcpy(reboot_code_buffer, relocate_kernel, relocate_kernel_len);
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700176 return 0;
177}
178
Heiko Carstensc6b5b842006-12-04 15:40:33 +0100179void machine_kexec_cleanup(struct kimage *image)
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700180{
181}
182
Michael Holzheu60a0c682011-10-30 15:16:40 +0100183void arch_crash_save_vmcoreinfo(void)
184{
185 VMCOREINFO_SYMBOL(lowcore_ptr);
Michael Holzheu7fe7a182011-12-27 11:27:24 +0100186 VMCOREINFO_SYMBOL(high_memory);
Michael Holzheu60a0c682011-10-30 15:16:40 +0100187 VMCOREINFO_LENGTH(lowcore_ptr, NR_CPUS);
188}
189
Heiko Carstensc6b5b842006-12-04 15:40:33 +0100190void machine_shutdown(void)
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700191{
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700192}
193
Michael Holzheu60a0c682011-10-30 15:16:40 +0100194/*
195 * Do normal kexec
196 */
197static void __do_machine_kexec(void *data)
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700198{
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700199 relocate_kernel_t data_mover;
Heiko Carstens2c2df112010-02-26 22:37:34 +0100200 struct kimage *image = data;
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700201
Heiko Carstensc6b5b842006-12-04 15:40:33 +0100202 data_mover = (relocate_kernel_t) page_to_phys(image->control_code_page);
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700203
204 /* Call the moving routine */
Heiko Carstensc6b5b842006-12-04 15:40:33 +0100205 (*data_mover)(&image->head, image->start);
Heiko Carstenscf13f0e2005-06-25 14:58:11 -0700206}
Heiko Carstens2c2df112010-02-26 22:37:34 +0100207
Michael Holzheu60a0c682011-10-30 15:16:40 +0100208/*
209 * Reset system and call either kdump or normal kexec
210 */
211static void __machine_kexec(void *data)
212{
213 struct kimage *image = data;
214
Michael Holzheufa7c0042012-05-21 11:30:30 +0200215 __arch_local_irq_stosm(0x04); /* enable DAT */
Michael Holzheu60a0c682011-10-30 15:16:40 +0100216 pfault_fini();
Michael Holzheu3ab121a2012-03-11 11:59:32 -0400217 tracing_off();
218 debug_locks_off();
219 if (image->type == KEXEC_TYPE_CRASH) {
220 lgr_info_log();
Michael Holzheu60a0c682011-10-30 15:16:40 +0100221 s390_reset_system(__do_machine_kdump, data);
Michael Holzheu3ab121a2012-03-11 11:59:32 -0400222 } else {
Michael Holzheu60a0c682011-10-30 15:16:40 +0100223 s390_reset_system(__do_machine_kexec, data);
Michael Holzheu3ab121a2012-03-11 11:59:32 -0400224 }
Michael Holzheu60a0c682011-10-30 15:16:40 +0100225 disabled_wait((unsigned long) __builtin_return_address(0));
226}
227
228/*
229 * Do either kdump or normal kexec. In case of kdump we first ask
230 * purgatory, if kdump checksums are valid.
231 */
Heiko Carstens2c2df112010-02-26 22:37:34 +0100232void machine_kexec(struct kimage *image)
233{
Michael Holzheu60a0c682011-10-30 15:16:40 +0100234 if (image->type == KEXEC_TYPE_CRASH && !kdump_csum_valid(image))
235 return;
Heiko Carstens69667272011-03-15 17:08:33 +0100236 tracer_disable();
Heiko Carstens2c2df112010-02-26 22:37:34 +0100237 smp_send_stop();
Martin Schwidefsky8b646bd2012-03-11 11:59:26 -0400238 smp_call_ipl_cpu(__machine_kexec, image);
Heiko Carstens2c2df112010-02-26 22:37:34 +0100239}