hibernate_64.c 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329
  1. /*
  2. * Hibernation support for x86-64
  3. *
  4. * Distribute under GPLv2
  5. *
  6. * Copyright (c) 2007 Rafael J. Wysocki <rjw@sisk.pl>
  7. * Copyright (c) 2002 Pavel Machek <pavel@ucw.cz>
  8. * Copyright (c) 2001 Patrick Mochel <mochel@osdl.org>
  9. */
  10. #include <linux/gfp.h>
  11. #include <linux/smp.h>
  12. #include <linux/suspend.h>
  13. #include <linux/scatterlist.h>
  14. #include <linux/kdebug.h>
  15. #include <crypto/hash.h>
  16. #include <asm/e820/api.h>
  17. #include <asm/init.h>
  18. #include <asm/proto.h>
  19. #include <asm/page.h>
  20. #include <asm/pgtable.h>
  21. #include <asm/mtrr.h>
  22. #include <asm/sections.h>
  23. #include <asm/suspend.h>
  24. #include <asm/tlbflush.h>
  25. /* Defined in hibernate_asm_64.S */
  26. extern asmlinkage __visible int restore_image(void);
  27. /*
  28. * Address to jump to in the last phase of restore in order to get to the image
  29. * kernel's text (this value is passed in the image header).
  30. */
  31. unsigned long restore_jump_address __visible;
  32. unsigned long jump_address_phys;
  33. /*
  34. * Value of the cr3 register from before the hibernation (this value is passed
  35. * in the image header).
  36. */
  37. unsigned long restore_cr3 __visible;
  38. unsigned long temp_level4_pgt __visible;
  39. unsigned long relocated_restore_code __visible;
  40. static int set_up_temporary_text_mapping(pgd_t *pgd)
  41. {
  42. pmd_t *pmd;
  43. pud_t *pud;
  44. p4d_t *p4d;
  45. /*
  46. * The new mapping only has to cover the page containing the image
  47. * kernel's entry point (jump_address_phys), because the switch over to
  48. * it is carried out by relocated code running from a page allocated
  49. * specifically for this purpose and covered by the identity mapping, so
  50. * the temporary kernel text mapping is only needed for the final jump.
  51. * Moreover, in that mapping the virtual address of the image kernel's
  52. * entry point must be the same as its virtual address in the image
  53. * kernel (restore_jump_address), so the image kernel's
  54. * restore_registers() code doesn't find itself in a different area of
  55. * the virtual address space after switching over to the original page
  56. * tables used by the image kernel.
  57. */
  58. if (IS_ENABLED(CONFIG_X86_5LEVEL)) {
  59. p4d = (p4d_t *)get_safe_page(GFP_ATOMIC);
  60. if (!p4d)
  61. return -ENOMEM;
  62. }
  63. pud = (pud_t *)get_safe_page(GFP_ATOMIC);
  64. if (!pud)
  65. return -ENOMEM;
  66. pmd = (pmd_t *)get_safe_page(GFP_ATOMIC);
  67. if (!pmd)
  68. return -ENOMEM;
  69. set_pmd(pmd + pmd_index(restore_jump_address),
  70. __pmd((jump_address_phys & PMD_MASK) | __PAGE_KERNEL_LARGE_EXEC));
  71. set_pud(pud + pud_index(restore_jump_address),
  72. __pud(__pa(pmd) | _KERNPG_TABLE));
  73. if (IS_ENABLED(CONFIG_X86_5LEVEL)) {
  74. set_p4d(p4d + p4d_index(restore_jump_address), __p4d(__pa(pud) | _KERNPG_TABLE));
  75. set_pgd(pgd + pgd_index(restore_jump_address), __pgd(__pa(p4d) | _KERNPG_TABLE));
  76. } else {
  77. /* No p4d for 4-level paging: point the pgd to the pud page table */
  78. set_pgd(pgd + pgd_index(restore_jump_address), __pgd(__pa(pud) | _KERNPG_TABLE));
  79. }
  80. return 0;
  81. }
  82. static void *alloc_pgt_page(void *context)
  83. {
  84. return (void *)get_safe_page(GFP_ATOMIC);
  85. }
  86. static int set_up_temporary_mappings(void)
  87. {
  88. struct x86_mapping_info info = {
  89. .alloc_pgt_page = alloc_pgt_page,
  90. .page_flag = __PAGE_KERNEL_LARGE_EXEC,
  91. .offset = __PAGE_OFFSET,
  92. };
  93. unsigned long mstart, mend;
  94. pgd_t *pgd;
  95. int result;
  96. int i;
  97. pgd = (pgd_t *)get_safe_page(GFP_ATOMIC);
  98. if (!pgd)
  99. return -ENOMEM;
  100. /* Prepare a temporary mapping for the kernel text */
  101. result = set_up_temporary_text_mapping(pgd);
  102. if (result)
  103. return result;
  104. /* Set up the direct mapping from scratch */
  105. for (i = 0; i < nr_pfn_mapped; i++) {
  106. mstart = pfn_mapped[i].start << PAGE_SHIFT;
  107. mend = pfn_mapped[i].end << PAGE_SHIFT;
  108. result = kernel_ident_mapping_init(&info, pgd, mstart, mend);
  109. if (result)
  110. return result;
  111. }
  112. temp_level4_pgt = __pa(pgd);
  113. return 0;
  114. }
  115. static int relocate_restore_code(void)
  116. {
  117. pgd_t *pgd;
  118. p4d_t *p4d;
  119. pud_t *pud;
  120. pmd_t *pmd;
  121. pte_t *pte;
  122. relocated_restore_code = get_safe_page(GFP_ATOMIC);
  123. if (!relocated_restore_code)
  124. return -ENOMEM;
  125. memcpy((void *)relocated_restore_code, &core_restore_code, PAGE_SIZE);
  126. /* Make the page containing the relocated code executable */
  127. pgd = (pgd_t *)__va(read_cr3()) + pgd_index(relocated_restore_code);
  128. p4d = p4d_offset(pgd, relocated_restore_code);
  129. if (p4d_large(*p4d)) {
  130. set_p4d(p4d, __p4d(p4d_val(*p4d) & ~_PAGE_NX));
  131. goto out;
  132. }
  133. pud = pud_offset(p4d, relocated_restore_code);
  134. if (pud_large(*pud)) {
  135. set_pud(pud, __pud(pud_val(*pud) & ~_PAGE_NX));
  136. goto out;
  137. }
  138. pmd = pmd_offset(pud, relocated_restore_code);
  139. if (pmd_large(*pmd)) {
  140. set_pmd(pmd, __pmd(pmd_val(*pmd) & ~_PAGE_NX));
  141. goto out;
  142. }
  143. pte = pte_offset_kernel(pmd, relocated_restore_code);
  144. set_pte(pte, __pte(pte_val(*pte) & ~_PAGE_NX));
  145. out:
  146. __flush_tlb_all();
  147. return 0;
  148. }
  149. int swsusp_arch_resume(void)
  150. {
  151. int error;
  152. /* We have got enough memory and from now on we cannot recover */
  153. error = set_up_temporary_mappings();
  154. if (error)
  155. return error;
  156. error = relocate_restore_code();
  157. if (error)
  158. return error;
  159. restore_image();
  160. return 0;
  161. }
  162. /*
  163. * pfn_is_nosave - check if given pfn is in the 'nosave' section
  164. */
  165. int pfn_is_nosave(unsigned long pfn)
  166. {
  167. unsigned long nosave_begin_pfn = __pa_symbol(&__nosave_begin) >> PAGE_SHIFT;
  168. unsigned long nosave_end_pfn = PAGE_ALIGN(__pa_symbol(&__nosave_end)) >> PAGE_SHIFT;
  169. return (pfn >= nosave_begin_pfn) && (pfn < nosave_end_pfn);
  170. }
  171. #define MD5_DIGEST_SIZE 16
  172. struct restore_data_record {
  173. unsigned long jump_address;
  174. unsigned long jump_address_phys;
  175. unsigned long cr3;
  176. unsigned long magic;
  177. u8 e820_digest[MD5_DIGEST_SIZE];
  178. };
  179. #define RESTORE_MAGIC 0x23456789ABCDEF01UL
  180. #if IS_BUILTIN(CONFIG_CRYPTO_MD5)
  181. /**
  182. * get_e820_md5 - calculate md5 according to given e820 table
  183. *
  184. * @table: the e820 table to be calculated
  185. * @buf: the md5 result to be stored to
  186. */
  187. static int get_e820_md5(struct e820_table *table, void *buf)
  188. {
  189. struct scatterlist sg;
  190. struct crypto_ahash *tfm;
  191. int size;
  192. int ret = 0;
  193. tfm = crypto_alloc_ahash("md5", 0, CRYPTO_ALG_ASYNC);
  194. if (IS_ERR(tfm))
  195. return -ENOMEM;
  196. {
  197. AHASH_REQUEST_ON_STACK(req, tfm);
  198. size = offsetof(struct e820_table, entries) + sizeof(struct e820_entry) * table->nr_entries;
  199. ahash_request_set_tfm(req, tfm);
  200. sg_init_one(&sg, (u8 *)table, size);
  201. ahash_request_set_callback(req, 0, NULL, NULL);
  202. ahash_request_set_crypt(req, &sg, buf, size);
  203. if (crypto_ahash_digest(req))
  204. ret = -EINVAL;
  205. ahash_request_zero(req);
  206. }
  207. crypto_free_ahash(tfm);
  208. return ret;
  209. }
  210. static void hibernation_e820_save(void *buf)
  211. {
  212. get_e820_md5(e820_table_firmware, buf);
  213. }
  214. static bool hibernation_e820_mismatch(void *buf)
  215. {
  216. int ret;
  217. u8 result[MD5_DIGEST_SIZE];
  218. memset(result, 0, MD5_DIGEST_SIZE);
  219. /* If there is no digest in suspend kernel, let it go. */
  220. if (!memcmp(result, buf, MD5_DIGEST_SIZE))
  221. return false;
  222. ret = get_e820_md5(e820_table_firmware, result);
  223. if (ret)
  224. return true;
  225. return memcmp(result, buf, MD5_DIGEST_SIZE) ? true : false;
  226. }
  227. #else
  228. static void hibernation_e820_save(void *buf)
  229. {
  230. }
  231. static bool hibernation_e820_mismatch(void *buf)
  232. {
  233. /* If md5 is not builtin for restore kernel, let it go. */
  234. return false;
  235. }
  236. #endif
  237. /**
  238. * arch_hibernation_header_save - populate the architecture specific part
  239. * of a hibernation image header
  240. * @addr: address to save the data at
  241. */
  242. int arch_hibernation_header_save(void *addr, unsigned int max_size)
  243. {
  244. struct restore_data_record *rdr = addr;
  245. if (max_size < sizeof(struct restore_data_record))
  246. return -EOVERFLOW;
  247. rdr->jump_address = (unsigned long)&restore_registers;
  248. rdr->jump_address_phys = __pa_symbol(&restore_registers);
  249. rdr->cr3 = restore_cr3;
  250. rdr->magic = RESTORE_MAGIC;
  251. hibernation_e820_save(rdr->e820_digest);
  252. return 0;
  253. }
  254. /**
  255. * arch_hibernation_header_restore - read the architecture specific data
  256. * from the hibernation image header
  257. * @addr: address to read the data from
  258. */
  259. int arch_hibernation_header_restore(void *addr)
  260. {
  261. struct restore_data_record *rdr = addr;
  262. restore_jump_address = rdr->jump_address;
  263. jump_address_phys = rdr->jump_address_phys;
  264. restore_cr3 = rdr->cr3;
  265. if (rdr->magic != RESTORE_MAGIC) {
  266. pr_crit("Unrecognized hibernate image header format!\n");
  267. return -EINVAL;
  268. }
  269. if (hibernation_e820_mismatch(rdr->e820_digest)) {
  270. pr_crit("Hibernate inconsistent memory map detected!\n");
  271. return -ENODEV;
  272. }
  273. return 0;
  274. }