blob: 2b09dad7935eb4ed3496f77be46b5748bfdd7cc4 [file] [log] [blame]
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001// SPDX-License-Identifier: GPL-2.0
2/*
3 * machine_kexec.c - handle transition of Linux booting another kernel
4 */
5
6#include <linux/mm.h>
7#include <linux/kexec.h>
8#include <linux/delay.h>
9#include <linux/reboot.h>
10#include <linux/io.h>
11#include <linux/irq.h>
12#include <linux/memblock.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000013#include <linux/of_fdt.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000014#include <asm/mmu_context.h>
15#include <asm/cacheflush.h>
Olivier Deprez0e641232021-09-23 10:07:05 +020016#include <asm/kexec-internal.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000017#include <asm/fncpy.h>
18#include <asm/mach-types.h>
19#include <asm/smp_plat.h>
20#include <asm/system_misc.h>
21#include <asm/set_memory.h>
22
23extern void relocate_new_kernel(void);
24extern const unsigned int relocate_new_kernel_size;
25
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000026static atomic_t waiting_for_crash_ipi;
27
28/*
29 * Provide a dummy crash_notes definition while crash dump arrives to arm.
30 * This prevents breakage of crash_notes attribute in kernel/ksysfs.c.
31 */
32
33int machine_kexec_prepare(struct kimage *image)
34{
35 struct kexec_segment *current_segment;
36 __be32 header;
37 int i, err;
38
39 image->arch.kernel_r2 = image->start - KEXEC_ARM_ZIMAGE_OFFSET
40 + KEXEC_ARM_ATAGS_OFFSET;
41
42 /*
43 * Validate that if the current HW supports SMP, then the SW supports
44 * and implements CPU hotplug for the current HW. If not, we won't be
45 * able to kexec reliably, so fail the prepare operation.
46 */
47 if (num_possible_cpus() > 1 && platform_can_secondary_boot() &&
48 !platform_can_cpu_hotplug())
49 return -EINVAL;
50
51 /*
52 * No segment at default ATAGs address. try to locate
53 * a dtb using magic.
54 */
55 for (i = 0; i < image->nr_segments; i++) {
56 current_segment = &image->segment[i];
57
58 if (!memblock_is_region_memory(idmap_to_phys(current_segment->mem),
59 current_segment->memsz))
60 return -EINVAL;
61
62 err = get_user(header, (__be32*)current_segment->buf);
63 if (err)
64 return err;
65
66 if (header == cpu_to_be32(OF_DT_HEADER))
67 image->arch.kernel_r2 = current_segment->mem;
68 }
69 return 0;
70}
71
72void machine_kexec_cleanup(struct kimage *image)
73{
74}
75
76void machine_crash_nonpanic_core(void *unused)
77{
78 struct pt_regs regs;
79
80 crash_setup_regs(&regs, get_irq_regs());
81 printk(KERN_DEBUG "CPU %u will stop doing anything useful since another CPU has crashed\n",
82 smp_processor_id());
83 crash_save_cpu(&regs, smp_processor_id());
84 flush_cache_all();
85
86 set_cpu_online(smp_processor_id(), false);
87 atomic_dec(&waiting_for_crash_ipi);
David Brazdil0f672f62019-12-10 10:32:29 +000088
89 while (1) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000090 cpu_relax();
David Brazdil0f672f62019-12-10 10:32:29 +000091 wfe();
92 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000093}
94
95void crash_smp_send_stop(void)
96{
97 static int cpus_stopped;
98 unsigned long msecs;
99
100 if (cpus_stopped)
101 return;
102
103 atomic_set(&waiting_for_crash_ipi, num_online_cpus() - 1);
104 smp_call_function(machine_crash_nonpanic_core, NULL, false);
105 msecs = 1000; /* Wait at most a second for the other cpus to stop */
106 while ((atomic_read(&waiting_for_crash_ipi) > 0) && msecs) {
107 mdelay(1);
108 msecs--;
109 }
110 if (atomic_read(&waiting_for_crash_ipi) > 0)
111 pr_warn("Non-crashing CPUs did not react to IPI\n");
112
113 cpus_stopped = 1;
114}
115
116static void machine_kexec_mask_interrupts(void)
117{
118 unsigned int i;
119 struct irq_desc *desc;
120
121 for_each_irq_desc(i, desc) {
122 struct irq_chip *chip;
123
124 chip = irq_desc_get_chip(desc);
125 if (!chip)
126 continue;
127
128 if (chip->irq_eoi && irqd_irq_inprogress(&desc->irq_data))
129 chip->irq_eoi(&desc->irq_data);
130
131 if (chip->irq_mask)
132 chip->irq_mask(&desc->irq_data);
133
134 if (chip->irq_disable && !irqd_irq_disabled(&desc->irq_data))
135 chip->irq_disable(&desc->irq_data);
136 }
137}
138
139void machine_crash_shutdown(struct pt_regs *regs)
140{
141 local_irq_disable();
142 crash_smp_send_stop();
143
144 crash_save_cpu(regs, smp_processor_id());
145 machine_kexec_mask_interrupts();
146
147 pr_info("Loading crashdump kernel...\n");
148}
149
150/*
151 * Function pointer to optional machine-specific reinitialization
152 */
153void (*kexec_reinit)(void);
154
155void machine_kexec(struct kimage *image)
156{
157 unsigned long page_list, reboot_entry_phys;
Olivier Deprez0e641232021-09-23 10:07:05 +0200158 struct kexec_relocate_data *data;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000159 void (*reboot_entry)(void);
160 void *reboot_code_buffer;
161
162 /*
163 * This can only happen if machine_shutdown() failed to disable some
164 * CPU, and that can only happen if the checks in
165 * machine_kexec_prepare() were not correct. If this fails, we can't
166 * reliably kexec anyway, so BUG_ON is appropriate.
167 */
168 BUG_ON(num_online_cpus() > 1);
169
170 page_list = image->head & PAGE_MASK;
171
172 reboot_code_buffer = page_address(image->control_code_page);
173
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000174 /* copy our kernel relocation code to the control code page */
175 reboot_entry = fncpy(reboot_code_buffer,
176 &relocate_new_kernel,
177 relocate_new_kernel_size);
178
Olivier Deprez0e641232021-09-23 10:07:05 +0200179 data = reboot_code_buffer + relocate_new_kernel_size;
180 data->kexec_start_address = image->start;
181 data->kexec_indirection_page = page_list;
182 data->kexec_mach_type = machine_arch_type;
183 data->kexec_r2 = image->arch.kernel_r2;
184
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000185 /* get the identity mapping physical address for the reboot code */
186 reboot_entry_phys = virt_to_idmap(reboot_entry);
187
188 pr_info("Bye!\n");
189
190 if (kexec_reinit)
191 kexec_reinit();
192
193 soft_restart(reboot_entry_phys);
194}
195
196void arch_crash_save_vmcoreinfo(void)
197{
198#ifdef CONFIG_ARM_LPAE
199 VMCOREINFO_CONFIG(ARM_LPAE);
200#endif
201}