162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Hibernation support specific for i386 - temporary page tables 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (c) 2006 Rafael J. Wysocki <rjw@sisk.pl> 662306a36Sopenharmony_ci */ 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include <linux/gfp.h> 962306a36Sopenharmony_ci#include <linux/suspend.h> 1062306a36Sopenharmony_ci#include <linux/memblock.h> 1162306a36Sopenharmony_ci#include <linux/pgtable.h> 1262306a36Sopenharmony_ci 1362306a36Sopenharmony_ci#include <asm/page.h> 1462306a36Sopenharmony_ci#include <asm/mmzone.h> 1562306a36Sopenharmony_ci#include <asm/sections.h> 1662306a36Sopenharmony_ci#include <asm/suspend.h> 1762306a36Sopenharmony_ci 1862306a36Sopenharmony_ci/* Pointer to the temporary resume page tables */ 1962306a36Sopenharmony_cipgd_t *resume_pg_dir; 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_ci/* The following three functions are based on the analogous code in 2262306a36Sopenharmony_ci * arch/x86/mm/init_32.c 2362306a36Sopenharmony_ci */ 2462306a36Sopenharmony_ci 2562306a36Sopenharmony_ci/* 2662306a36Sopenharmony_ci * Create a middle page table on a resume-safe page and put a pointer to it in 2762306a36Sopenharmony_ci * the given global directory entry. This only returns the gd entry 2862306a36Sopenharmony_ci * in non-PAE compilation mode, since the middle layer is folded. 2962306a36Sopenharmony_ci */ 3062306a36Sopenharmony_cistatic pmd_t *resume_one_md_table_init(pgd_t *pgd) 3162306a36Sopenharmony_ci{ 3262306a36Sopenharmony_ci p4d_t *p4d; 3362306a36Sopenharmony_ci pud_t *pud; 3462306a36Sopenharmony_ci pmd_t *pmd_table; 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_ci#ifdef CONFIG_X86_PAE 3762306a36Sopenharmony_ci pmd_table = (pmd_t *)get_safe_page(GFP_ATOMIC); 3862306a36Sopenharmony_ci if (!pmd_table) 3962306a36Sopenharmony_ci return NULL; 4062306a36Sopenharmony_ci 4162306a36Sopenharmony_ci set_pgd(pgd, __pgd(__pa(pmd_table) | _PAGE_PRESENT)); 4262306a36Sopenharmony_ci p4d = p4d_offset(pgd, 0); 4362306a36Sopenharmony_ci pud = pud_offset(p4d, 0); 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci BUG_ON(pmd_table != pmd_offset(pud, 0)); 4662306a36Sopenharmony_ci#else 4762306a36Sopenharmony_ci p4d = p4d_offset(pgd, 0); 4862306a36Sopenharmony_ci pud = pud_offset(p4d, 0); 4962306a36Sopenharmony_ci pmd_table = pmd_offset(pud, 0); 5062306a36Sopenharmony_ci#endif 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci return pmd_table; 5362306a36Sopenharmony_ci} 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci/* 5662306a36Sopenharmony_ci * Create a page table on a resume-safe page and place a pointer to it in 5762306a36Sopenharmony_ci * a middle page directory entry. 5862306a36Sopenharmony_ci */ 5962306a36Sopenharmony_cistatic pte_t *resume_one_page_table_init(pmd_t *pmd) 6062306a36Sopenharmony_ci{ 6162306a36Sopenharmony_ci if (pmd_none(*pmd)) { 6262306a36Sopenharmony_ci pte_t *page_table = (pte_t *)get_safe_page(GFP_ATOMIC); 6362306a36Sopenharmony_ci if (!page_table) 6462306a36Sopenharmony_ci return NULL; 6562306a36Sopenharmony_ci 6662306a36Sopenharmony_ci set_pmd(pmd, __pmd(__pa(page_table) | _PAGE_TABLE)); 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci BUG_ON(page_table != pte_offset_kernel(pmd, 0)); 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci return page_table; 7162306a36Sopenharmony_ci } 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_ci return pte_offset_kernel(pmd, 0); 7462306a36Sopenharmony_ci} 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci/* 7762306a36Sopenharmony_ci * This maps the physical memory to kernel virtual address space, a total 7862306a36Sopenharmony_ci * of max_low_pfn pages, by creating page tables starting from address 7962306a36Sopenharmony_ci * PAGE_OFFSET. The page tables are allocated out of resume-safe pages. 8062306a36Sopenharmony_ci */ 8162306a36Sopenharmony_cistatic int resume_physical_mapping_init(pgd_t *pgd_base) 8262306a36Sopenharmony_ci{ 8362306a36Sopenharmony_ci unsigned long pfn; 8462306a36Sopenharmony_ci pgd_t *pgd; 8562306a36Sopenharmony_ci pmd_t *pmd; 8662306a36Sopenharmony_ci pte_t *pte; 8762306a36Sopenharmony_ci int pgd_idx, pmd_idx; 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_ci pgd_idx = pgd_index(PAGE_OFFSET); 9062306a36Sopenharmony_ci pgd = pgd_base + pgd_idx; 9162306a36Sopenharmony_ci pfn = 0; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci for (; pgd_idx < PTRS_PER_PGD; pgd++, pgd_idx++) { 9462306a36Sopenharmony_ci pmd = resume_one_md_table_init(pgd); 9562306a36Sopenharmony_ci if (!pmd) 9662306a36Sopenharmony_ci return -ENOMEM; 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_ci if (pfn >= max_low_pfn) 9962306a36Sopenharmony_ci continue; 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci for (pmd_idx = 0; pmd_idx < PTRS_PER_PMD; pmd++, pmd_idx++) { 10262306a36Sopenharmony_ci if (pfn >= max_low_pfn) 10362306a36Sopenharmony_ci break; 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci /* Map with big pages if possible, otherwise create 10662306a36Sopenharmony_ci * normal page tables. 10762306a36Sopenharmony_ci * NOTE: We can mark everything as executable here 10862306a36Sopenharmony_ci */ 10962306a36Sopenharmony_ci if (boot_cpu_has(X86_FEATURE_PSE)) { 11062306a36Sopenharmony_ci set_pmd(pmd, pfn_pmd(pfn, PAGE_KERNEL_LARGE_EXEC)); 11162306a36Sopenharmony_ci pfn += PTRS_PER_PTE; 11262306a36Sopenharmony_ci } else { 11362306a36Sopenharmony_ci pte_t *max_pte; 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_ci pte = resume_one_page_table_init(pmd); 11662306a36Sopenharmony_ci if (!pte) 11762306a36Sopenharmony_ci return -ENOMEM; 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci max_pte = pte + PTRS_PER_PTE; 12062306a36Sopenharmony_ci for (; pte < max_pte; pte++, pfn++) { 12162306a36Sopenharmony_ci if (pfn >= max_low_pfn) 12262306a36Sopenharmony_ci break; 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_ci set_pte(pte, pfn_pte(pfn, PAGE_KERNEL_EXEC)); 12562306a36Sopenharmony_ci } 12662306a36Sopenharmony_ci } 12762306a36Sopenharmony_ci } 12862306a36Sopenharmony_ci } 12962306a36Sopenharmony_ci 13062306a36Sopenharmony_ci return 0; 13162306a36Sopenharmony_ci} 13262306a36Sopenharmony_ci 13362306a36Sopenharmony_cistatic inline void resume_init_first_level_page_table(pgd_t *pg_dir) 13462306a36Sopenharmony_ci{ 13562306a36Sopenharmony_ci#ifdef CONFIG_X86_PAE 13662306a36Sopenharmony_ci int i; 13762306a36Sopenharmony_ci 13862306a36Sopenharmony_ci /* Init entries of the first-level page table to the zero page */ 13962306a36Sopenharmony_ci for (i = 0; i < PTRS_PER_PGD; i++) 14062306a36Sopenharmony_ci set_pgd(pg_dir + i, 14162306a36Sopenharmony_ci __pgd(__pa(empty_zero_page) | _PAGE_PRESENT)); 14262306a36Sopenharmony_ci#endif 14362306a36Sopenharmony_ci} 14462306a36Sopenharmony_ci 14562306a36Sopenharmony_cistatic int set_up_temporary_text_mapping(pgd_t *pgd_base) 14662306a36Sopenharmony_ci{ 14762306a36Sopenharmony_ci pgd_t *pgd; 14862306a36Sopenharmony_ci pmd_t *pmd; 14962306a36Sopenharmony_ci pte_t *pte; 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci pgd = pgd_base + pgd_index(restore_jump_address); 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_ci pmd = resume_one_md_table_init(pgd); 15462306a36Sopenharmony_ci if (!pmd) 15562306a36Sopenharmony_ci return -ENOMEM; 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_ci if (boot_cpu_has(X86_FEATURE_PSE)) { 15862306a36Sopenharmony_ci set_pmd(pmd + pmd_index(restore_jump_address), 15962306a36Sopenharmony_ci __pmd((jump_address_phys & PMD_MASK) | pgprot_val(PAGE_KERNEL_LARGE_EXEC))); 16062306a36Sopenharmony_ci } else { 16162306a36Sopenharmony_ci pte = resume_one_page_table_init(pmd); 16262306a36Sopenharmony_ci if (!pte) 16362306a36Sopenharmony_ci return -ENOMEM; 16462306a36Sopenharmony_ci set_pte(pte + pte_index(restore_jump_address), 16562306a36Sopenharmony_ci __pte((jump_address_phys & PAGE_MASK) | pgprot_val(PAGE_KERNEL_EXEC))); 16662306a36Sopenharmony_ci } 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_ci return 0; 16962306a36Sopenharmony_ci} 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_ciasmlinkage int swsusp_arch_resume(void) 17262306a36Sopenharmony_ci{ 17362306a36Sopenharmony_ci int error; 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_ci resume_pg_dir = (pgd_t *)get_safe_page(GFP_ATOMIC); 17662306a36Sopenharmony_ci if (!resume_pg_dir) 17762306a36Sopenharmony_ci return -ENOMEM; 17862306a36Sopenharmony_ci 17962306a36Sopenharmony_ci resume_init_first_level_page_table(resume_pg_dir); 18062306a36Sopenharmony_ci 18162306a36Sopenharmony_ci error = set_up_temporary_text_mapping(resume_pg_dir); 18262306a36Sopenharmony_ci if (error) 18362306a36Sopenharmony_ci return error; 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci error = resume_physical_mapping_init(resume_pg_dir); 18662306a36Sopenharmony_ci if (error) 18762306a36Sopenharmony_ci return error; 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_ci temp_pgt = __pa(resume_pg_dir); 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_ci error = relocate_restore_code(); 19262306a36Sopenharmony_ci if (error) 19362306a36Sopenharmony_ci return error; 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci /* We have got enough memory and from now on we cannot recover */ 19662306a36Sopenharmony_ci restore_image(); 19762306a36Sopenharmony_ci return 0; 19862306a36Sopenharmony_ci} 199