x86, 32-bit: trim memory not covered by wb mtrrs
[deliverable/linux.git] / arch / x86 / kernel / suspend_64.c
CommitLineData
1da177e4
LT
1/*
2 * Suspend support specific for i386.
3 *
4 * Distribute under GPLv2
5 *
6 * Copyright (c) 2002 Pavel Machek <pavel@suse.cz>
7 * Copyright (c) 2001 Patrick Mochel <mochel@osdl.org>
8 */
9
55679edb 10#include <linux/smp.h>
1da177e4 11#include <linux/suspend.h>
1da177e4 12#include <asm/proto.h>
3dd08325
RW
13#include <asm/page.h>
14#include <asm/pgtable.h>
3ebad590 15#include <asm/mtrr.h>
1da177e4 16
49c3df6a
VG
17/* References to section boundaries */
18extern const void __nosave_begin, __nosave_end;
19
cae45957
JB
20static void fix_processor_context(void);
21
1da177e4
LT
22struct saved_context saved_context;
23
5c9c9bec
RW
24/**
25 * __save_processor_state - save CPU registers before creating a
26 * hibernation image and before restoring the memory state from it
27 * @ctxt - structure to store the registers contents in
28 *
29 * NOTE: If there is a CPU register the modification of which by the
30 * boot kernel (ie. the kernel used for loading the hibernation image)
31 * might affect the operations of the restored target kernel (ie. the one
32 * saved in the hibernation image), then its contents must be saved by this
33 * function. In other words, if kernel A is hibernated and different
34 * kernel B is used for loading the hibernation image into memory, the
35 * kernel A's __save_processor_state() function must save all registers
36 * needed by kernel A, so that it can operate correctly after the resume
37 * regardless of what kernel B does in the meantime.
38 */
cae45957 39static void __save_processor_state(struct saved_context *ctxt)
1da177e4
LT
40{
41 kernel_fpu_begin();
42
43 /*
44 * descriptor tables
45 */
9d1c6e7c
GOC
46 store_gdt((struct desc_ptr *)&ctxt->gdt_limit);
47 store_idt((struct desc_ptr *)&ctxt->idt_limit);
48 store_tr(ctxt->tr);
1da177e4
LT
49
50 /* XMM0..XMM15 should be handled by kernel_fpu_begin(). */
1da177e4
LT
51 /*
52 * segment registers
53 */
54 asm volatile ("movw %%ds, %0" : "=m" (ctxt->ds));
55 asm volatile ("movw %%es, %0" : "=m" (ctxt->es));
56 asm volatile ("movw %%fs, %0" : "=m" (ctxt->fs));
57 asm volatile ("movw %%gs, %0" : "=m" (ctxt->gs));
58 asm volatile ("movw %%ss, %0" : "=m" (ctxt->ss));
59
60 rdmsrl(MSR_FS_BASE, ctxt->fs_base);
61 rdmsrl(MSR_GS_BASE, ctxt->gs_base);
62 rdmsrl(MSR_KERNEL_GS_BASE, ctxt->gs_kernel_base);
3ebad590 63 mtrr_save_fixed_ranges(NULL);
1da177e4
LT
64
65 /*
66 * control registers
67 */
3c321bce 68 rdmsrl(MSR_EFER, ctxt->efer);
f51c9452
GOC
69 ctxt->cr0 = read_cr0();
70 ctxt->cr2 = read_cr2();
71 ctxt->cr3 = read_cr3();
72 ctxt->cr4 = read_cr4();
73 ctxt->cr8 = read_cr8();
1da177e4
LT
74}
75
76void save_processor_state(void)
77{
78 __save_processor_state(&saved_context);
79}
80
08967f94 81static void do_fpu_end(void)
1da177e4 82{
08967f94
SL
83 /*
84 * Restore FPU regs if necessary
85 */
86 kernel_fpu_end();
1da177e4
LT
87}
88
5c9c9bec
RW
89/**
90 * __restore_processor_state - restore the contents of CPU registers saved
91 * by __save_processor_state()
92 * @ctxt - structure to load the registers contents from
93 */
cae45957 94static void __restore_processor_state(struct saved_context *ctxt)
1da177e4
LT
95{
96 /*
97 * control registers
98 */
3c321bce 99 wrmsrl(MSR_EFER, ctxt->efer);
f51c9452
GOC
100 write_cr8(ctxt->cr8);
101 write_cr4(ctxt->cr4);
102 write_cr3(ctxt->cr3);
103 write_cr2(ctxt->cr2);
104 write_cr0(ctxt->cr0);
1da177e4 105
8d783b3e
PM
106 /*
107 * now restore the descriptor tables to their proper values
108 * ltr is done i fix_processor_context().
109 */
9d1c6e7c
GOC
110 load_gdt((const struct desc_ptr *)&ctxt->gdt_limit);
111 load_idt((const struct desc_ptr *)&ctxt->idt_limit);
112
8d783b3e 113
1da177e4
LT
114 /*
115 * segment registers
116 */
117 asm volatile ("movw %0, %%ds" :: "r" (ctxt->ds));
118 asm volatile ("movw %0, %%es" :: "r" (ctxt->es));
119 asm volatile ("movw %0, %%fs" :: "r" (ctxt->fs));
120 load_gs_index(ctxt->gs);
121 asm volatile ("movw %0, %%ss" :: "r" (ctxt->ss));
122
123 wrmsrl(MSR_FS_BASE, ctxt->fs_base);
124 wrmsrl(MSR_GS_BASE, ctxt->gs_base);
125 wrmsrl(MSR_KERNEL_GS_BASE, ctxt->gs_kernel_base);
126
1da177e4
LT
127 fix_processor_context();
128
129 do_fpu_end();
3b520b23 130 mtrr_ap_init();
1da177e4
LT
131}
132
133void restore_processor_state(void)
134{
135 __restore_processor_state(&saved_context);
136}
137
cae45957 138static void fix_processor_context(void)
1da177e4
LT
139{
140 int cpu = smp_processor_id();
141 struct tss_struct *t = &per_cpu(init_tss, cpu);
142
3a4fa0a2 143 set_tss_desc(cpu,t); /* This just modifies memory; should not be necessary. But... This is necessary, because 386 hardware has concept of busy TSS or some similar stupidity. */
1da177e4 144
f6dc247c 145 get_cpu_gdt_table(cpu)[GDT_ENTRY_TSS].type = 9;
1da177e4
LT
146
147 syscall_init(); /* This sets MSR_*STAR and related */
148 load_TR_desc(); /* This does ltr */
149 load_LDT(&current->active_mm->context); /* This does lldt */
150
151 /*
152 * Now maybe reload the debug registers
153 */
154 if (current->thread.debugreg7){
155 loaddebug(&current->thread, 0);
156 loaddebug(&current->thread, 1);
157 loaddebug(&current->thread, 2);
158 loaddebug(&current->thread, 3);
159 /* no 4 and 5 */
160 loaddebug(&current->thread, 6);
161 loaddebug(&current->thread, 7);
162 }
163
164}
165
b0cb1a19 166#ifdef CONFIG_HIBERNATION
3dd08325
RW
167/* Defined in arch/x86_64/kernel/suspend_asm.S */
168extern int restore_image(void);
1da177e4 169
d158cbdf
RW
170/*
171 * Address to jump to in the last phase of restore in order to get to the image
172 * kernel's text (this value is passed in the image header).
173 */
174unsigned long restore_jump_address;
175
c30bb68c
RW
176/*
177 * Value of the cr3 register from before the hibernation (this value is passed
178 * in the image header).
179 */
180unsigned long restore_cr3;
181
3dd08325
RW
182pgd_t *temp_level4_pgt;
183
d158cbdf
RW
184void *relocated_restore_code;
185
2c1b4a5c 186static int res_phys_pud_init(pud_t *pud, unsigned long address, unsigned long end)
3dd08325
RW
187{
188 long i, j;
189
190 i = pud_index(address);
191 pud = pud + i;
192 for (; i < PTRS_PER_PUD; pud++, i++) {
193 unsigned long paddr;
194 pmd_t *pmd;
195
196 paddr = address + i*PUD_SIZE;
197 if (paddr >= end)
198 break;
199
2c1b4a5c
RW
200 pmd = (pmd_t *)get_safe_page(GFP_ATOMIC);
201 if (!pmd)
202 return -ENOMEM;
3dd08325
RW
203 set_pud(pud, __pud(__pa(pmd) | _KERNPG_TABLE));
204 for (j = 0; j < PTRS_PER_PMD; pmd++, j++, paddr += PMD_SIZE) {
205 unsigned long pe;
206
207 if (paddr >= end)
208 break;
d158cbdf 209 pe = __PAGE_KERNEL_LARGE_EXEC | paddr;
3dd08325
RW
210 pe &= __supported_pte_mask;
211 set_pmd(pmd, __pmd(pe));
212 }
213 }
2c1b4a5c 214 return 0;
3dd08325
RW
215}
216
2c1b4a5c 217static int set_up_temporary_mappings(void)
3dd08325
RW
218{
219 unsigned long start, end, next;
2c1b4a5c 220 int error;
3dd08325 221
2c1b4a5c
RW
222 temp_level4_pgt = (pgd_t *)get_safe_page(GFP_ATOMIC);
223 if (!temp_level4_pgt)
224 return -ENOMEM;
3dd08325 225
5867a78f
AM
226 /* It is safe to reuse the original kernel mapping */
227 set_pgd(temp_level4_pgt + pgd_index(__START_KERNEL_map),
228 init_level4_pgt[pgd_index(__START_KERNEL_map)]);
229
3dd08325
RW
230 /* Set up the direct mapping from scratch */
231 start = (unsigned long)pfn_to_kaddr(0);
232 end = (unsigned long)pfn_to_kaddr(end_pfn);
233
234 for (; start < end; start = next) {
5867a78f 235 pud_t *pud = (pud_t *)get_safe_page(GFP_ATOMIC);
2c1b4a5c
RW
236 if (!pud)
237 return -ENOMEM;
3dd08325
RW
238 next = start + PGDIR_SIZE;
239 if (next > end)
240 next = end;
2c1b4a5c
RW
241 if ((error = res_phys_pud_init(pud, __pa(start), __pa(next))))
242 return error;
3dd08325
RW
243 set_pgd(temp_level4_pgt + pgd_index(start),
244 mk_kernel_pgd(__pa(pud)));
245 }
5867a78f 246 return 0;
3dd08325
RW
247}
248
249int swsusp_arch_resume(void)
250{
2c1b4a5c 251 int error;
3dd08325 252
3dd08325 253 /* We have got enough memory and from now on we cannot recover */
2c1b4a5c
RW
254 if ((error = set_up_temporary_mappings()))
255 return error;
d158cbdf
RW
256
257 relocated_restore_code = (void *)get_safe_page(GFP_ATOMIC);
258 if (!relocated_restore_code)
259 return -ENOMEM;
260 memcpy(relocated_restore_code, &core_restore_code,
261 &restore_registers - &core_restore_code);
262
3dd08325
RW
263 restore_image();
264 return 0;
265}
49c3df6a
VG
266
267/*
268 * pfn_is_nosave - check if given pfn is in the 'nosave' section
269 */
270
271int pfn_is_nosave(unsigned long pfn)
272{
273 unsigned long nosave_begin_pfn = __pa_symbol(&__nosave_begin) >> PAGE_SHIFT;
274 unsigned long nosave_end_pfn = PAGE_ALIGN(__pa_symbol(&__nosave_end)) >> PAGE_SHIFT;
275 return (pfn >= nosave_begin_pfn) && (pfn < nosave_end_pfn);
276}
d158cbdf
RW
277
278struct restore_data_record {
279 unsigned long jump_address;
c30bb68c
RW
280 unsigned long cr3;
281 unsigned long magic;
d158cbdf
RW
282};
283
284#define RESTORE_MAGIC 0x0123456789ABCDEFUL
285
286/**
287 * arch_hibernation_header_save - populate the architecture specific part
288 * of a hibernation image header
289 * @addr: address to save the data at
290 */
291int arch_hibernation_header_save(void *addr, unsigned int max_size)
292{
293 struct restore_data_record *rdr = addr;
294
295 if (max_size < sizeof(struct restore_data_record))
296 return -EOVERFLOW;
297 rdr->jump_address = restore_jump_address;
c30bb68c
RW
298 rdr->cr3 = restore_cr3;
299 rdr->magic = RESTORE_MAGIC;
d158cbdf
RW
300 return 0;
301}
302
303/**
304 * arch_hibernation_header_restore - read the architecture specific data
305 * from the hibernation image header
306 * @addr: address to read the data from
307 */
308int arch_hibernation_header_restore(void *addr)
309{
310 struct restore_data_record *rdr = addr;
311
312 restore_jump_address = rdr->jump_address;
c30bb68c
RW
313 restore_cr3 = rdr->cr3;
314 return (rdr->magic == RESTORE_MAGIC) ? 0 : -EINVAL;
d158cbdf 315}
b0cb1a19 316#endif /* CONFIG_HIBERNATION */
This page took 0.338631 seconds and 5 git commands to generate.