]>
Commit | Line | Data |
---|---|---|
55716d26 | 1 | // SPDX-License-Identifier: GPL-2.0-only |
61159a31 RW |
2 | /* |
3 | * linux/kernel/power/swap.c | |
4 | * | |
5 | * This file provides functions for reading the suspend image from | |
6 | * and writing it to a swap partition. | |
7 | * | |
a2531293 | 8 | * Copyright (C) 1998,2001-2005 Pavel Machek <[email protected]> |
61159a31 | 9 | * Copyright (C) 2006 Rafael J. Wysocki <[email protected]> |
5a21d489 | 10 | * Copyright (C) 2010-2012 Bojan Smojver <[email protected]> |
61159a31 RW |
11 | */ |
12 | ||
64ec72a1 JP |
13 | #define pr_fmt(fmt) "PM: " fmt |
14 | ||
61159a31 | 15 | #include <linux/module.h> |
61159a31 | 16 | #include <linux/file.h> |
61159a31 RW |
17 | #include <linux/delay.h> |
18 | #include <linux/bitops.h> | |
61159a31 | 19 | #include <linux/device.h> |
61159a31 | 20 | #include <linux/bio.h> |
546e0d27 | 21 | #include <linux/blkdev.h> |
61159a31 RW |
22 | #include <linux/swap.h> |
23 | #include <linux/swapops.h> | |
24 | #include <linux/pm.h> | |
5a0e3ad6 | 25 | #include <linux/slab.h> |
f996fc96 | 26 | #include <linux/vmalloc.h> |
081a9d04 BS |
27 | #include <linux/cpumask.h> |
28 | #include <linux/atomic.h> | |
29 | #include <linux/kthread.h> | |
30 | #include <linux/crc32.h> | |
db597605 | 31 | #include <linux/ktime.h> |
61159a31 RW |
32 | |
33 | #include "power.h" | |
34 | ||
be8cd644 | 35 | #define HIBERNATE_SIG "S1SUSPEND" |
61159a31 | 36 | |
74d95555 DW |
37 | u32 swsusp_hardware_signature; |
38 | ||
f6cf0545 JM |
39 | /* |
40 | * When reading an {un,}compressed image, we may restore pages in place, | |
41 | * in which case some architectures need these pages cleaning before they | |
42 | * can be executed. We don't know which pages these may be, so clean the lot. | |
43 | */ | |
44 | static bool clean_pages_on_read; | |
45 | static bool clean_pages_on_decompress; | |
46 | ||
51fb352b JS |
47 | /* |
48 | * The swap map is a data structure used for keeping track of each page | |
49 | * written to a swap partition. It consists of many swap_map_page | |
90133673 | 50 | * structures that contain each an array of MAP_PAGE_ENTRIES swap entries. |
51fb352b JS |
51 | * These structures are stored on the swap and linked together with the |
52 | * help of the .next_swap member. | |
53 | * | |
54 | * The swap map is created during suspend. The swap map pages are | |
55 | * allocated and populated one at a time, so we only need one memory | |
56 | * page to set up the entire structure. | |
57 | * | |
081a9d04 | 58 | * During resume we pick up all swap_map_page structures into a list. |
51fb352b JS |
59 | */ |
60 | ||
61 | #define MAP_PAGE_ENTRIES (PAGE_SIZE / sizeof(sector_t) - 1) | |
62 | ||
f8262d47 BS |
63 | /* |
64 | * Number of free pages that are not high. | |
65 | */ | |
66 | static inline unsigned long low_free_pages(void) | |
67 | { | |
68 | return nr_free_pages() - nr_free_highpages(); | |
69 | } | |
70 | ||
71 | /* | |
72 | * Number of pages required to be kept free while writing the image. Always | |
73 | * half of all available low pages before the writing starts. | |
74 | */ | |
75 | static inline unsigned long reqd_free_pages(void) | |
76 | { | |
77 | return low_free_pages() / 2; | |
78 | } | |
79 | ||
51fb352b JS |
80 | struct swap_map_page { |
81 | sector_t entries[MAP_PAGE_ENTRIES]; | |
82 | sector_t next_swap; | |
83 | }; | |
84 | ||
081a9d04 BS |
85 | struct swap_map_page_list { |
86 | struct swap_map_page *map; | |
87 | struct swap_map_page_list *next; | |
88 | }; | |
89 | ||
444e1154 | 90 | /* |
51fb352b JS |
91 | * The swap_map_handle structure is used for handling swap in |
92 | * a file-alike way | |
93 | */ | |
94 | ||
95 | struct swap_map_handle { | |
96 | struct swap_map_page *cur; | |
081a9d04 | 97 | struct swap_map_page_list *maps; |
51fb352b JS |
98 | sector_t cur_swap; |
99 | sector_t first_sector; | |
100 | unsigned int k; | |
f8262d47 | 101 | unsigned long reqd_free_pages; |
081a9d04 | 102 | u32 crc32; |
51fb352b JS |
103 | }; |
104 | ||
1b29c164 | 105 | struct swsusp_header { |
081a9d04 | 106 | char reserved[PAGE_SIZE - 20 - sizeof(sector_t) - sizeof(int) - |
74d95555 DW |
107 | sizeof(u32) - sizeof(u32)]; |
108 | u32 hw_sig; | |
081a9d04 | 109 | u32 crc32; |
3aef83e0 | 110 | sector_t image; |
a634cc10 | 111 | unsigned int flags; /* Flags to pass to the "boot" kernel */ |
61159a31 RW |
112 | char orig_sig[10]; |
113 | char sig[10]; | |
52f5684c | 114 | } __packed; |
1b29c164 VG |
115 | |
116 | static struct swsusp_header *swsusp_header; | |
61159a31 | 117 | |
444e1154 | 118 | /* |
0414f2ec NC |
119 | * The following functions are used for tracing the allocated |
120 | * swap pages, so that they can be freed in case of an error. | |
121 | */ | |
122 | ||
123 | struct swsusp_extent { | |
124 | struct rb_node node; | |
125 | unsigned long start; | |
126 | unsigned long end; | |
127 | }; | |
128 | ||
129 | static struct rb_root swsusp_extents = RB_ROOT; | |
130 | ||
131 | static int swsusp_extents_insert(unsigned long swap_offset) | |
132 | { | |
133 | struct rb_node **new = &(swsusp_extents.rb_node); | |
134 | struct rb_node *parent = NULL; | |
135 | struct swsusp_extent *ext; | |
136 | ||
137 | /* Figure out where to put the new node */ | |
138 | while (*new) { | |
8316bd72 | 139 | ext = rb_entry(*new, struct swsusp_extent, node); |
0414f2ec NC |
140 | parent = *new; |
141 | if (swap_offset < ext->start) { | |
142 | /* Try to merge */ | |
143 | if (swap_offset == ext->start - 1) { | |
144 | ext->start--; | |
145 | return 0; | |
146 | } | |
147 | new = &((*new)->rb_left); | |
148 | } else if (swap_offset > ext->end) { | |
149 | /* Try to merge */ | |
150 | if (swap_offset == ext->end + 1) { | |
151 | ext->end++; | |
152 | return 0; | |
153 | } | |
154 | new = &((*new)->rb_right); | |
155 | } else { | |
156 | /* It already is in the tree */ | |
157 | return -EINVAL; | |
158 | } | |
159 | } | |
160 | /* Add the new node and rebalance the tree. */ | |
161 | ext = kzalloc(sizeof(struct swsusp_extent), GFP_KERNEL); | |
162 | if (!ext) | |
163 | return -ENOMEM; | |
164 | ||
165 | ext->start = swap_offset; | |
166 | ext->end = swap_offset; | |
167 | rb_link_node(&ext->node, parent, new); | |
168 | rb_insert_color(&ext->node, &swsusp_extents); | |
169 | return 0; | |
170 | } | |
171 | ||
444e1154 | 172 | /* |
0414f2ec NC |
173 | * alloc_swapdev_block - allocate a swap page and register that it has |
174 | * been allocated, so that it can be freed in case of an error. | |
175 | */ | |
176 | ||
177 | sector_t alloc_swapdev_block(int swap) | |
178 | { | |
179 | unsigned long offset; | |
180 | ||
910321ea | 181 | offset = swp_offset(get_swap_page_of_type(swap)); |
0414f2ec NC |
182 | if (offset) { |
183 | if (swsusp_extents_insert(offset)) | |
910321ea | 184 | swap_free(swp_entry(swap, offset)); |
0414f2ec NC |
185 | else |
186 | return swapdev_block(swap, offset); | |
187 | } | |
188 | return 0; | |
189 | } | |
190 | ||
444e1154 | 191 | /* |
0414f2ec | 192 | * free_all_swap_pages - free swap pages allocated for saving image data. |
90133673 | 193 | * It also frees the extents used to register which swap entries had been |
0414f2ec NC |
194 | * allocated. |
195 | */ | |
196 | ||
197 | void free_all_swap_pages(int swap) | |
198 | { | |
199 | struct rb_node *node; | |
200 | ||
201 | while ((node = swsusp_extents.rb_node)) { | |
202 | struct swsusp_extent *ext; | |
0414f2ec | 203 | |
47087eeb | 204 | ext = rb_entry(node, struct swsusp_extent, node); |
0414f2ec | 205 | rb_erase(node, &swsusp_extents); |
54f7a49c BS |
206 | swap_free_nr(swp_entry(swap, ext->start), |
207 | ext->end - ext->start + 1); | |
0414f2ec NC |
208 | |
209 | kfree(ext); | |
210 | } | |
211 | } | |
212 | ||
213 | int swsusp_swap_in_use(void) | |
214 | { | |
215 | return (swsusp_extents.rb_node != NULL); | |
216 | } | |
217 | ||
61159a31 | 218 | /* |
3fc6b34f | 219 | * General things |
61159a31 RW |
220 | */ |
221 | ||
222 | static unsigned short root_swap = 0xffff; | |
4379f911 | 223 | static struct file *hib_resume_bdev_file; |
343df3c7 CH |
224 | |
225 | struct hib_bio_batch { | |
226 | atomic_t count; | |
227 | wait_queue_head_t wait; | |
4e4cbee9 | 228 | blk_status_t error; |
55c4478a | 229 | struct blk_plug plug; |
343df3c7 CH |
230 | }; |
231 | ||
232 | static void hib_init_batch(struct hib_bio_batch *hb) | |
233 | { | |
234 | atomic_set(&hb->count, 0); | |
235 | init_waitqueue_head(&hb->wait); | |
4e4cbee9 | 236 | hb->error = BLK_STS_OK; |
55c4478a XC |
237 | blk_start_plug(&hb->plug); |
238 | } | |
239 | ||
240 | static void hib_finish_batch(struct hib_bio_batch *hb) | |
241 | { | |
242 | blk_finish_plug(&hb->plug); | |
343df3c7 CH |
243 | } |
244 | ||
4246a0b6 | 245 | static void hib_end_io(struct bio *bio) |
343df3c7 CH |
246 | { |
247 | struct hib_bio_batch *hb = bio->bi_private; | |
263663cd | 248 | struct page *page = bio_first_page_all(bio); |
343df3c7 | 249 | |
4e4cbee9 | 250 | if (bio->bi_status) { |
64ec72a1 JP |
251 | pr_alert("Read-error on swap-device (%u:%u:%Lu)\n", |
252 | MAJOR(bio_dev(bio)), MINOR(bio_dev(bio)), | |
253 | (unsigned long long)bio->bi_iter.bi_sector); | |
343df3c7 CH |
254 | } |
255 | ||
256 | if (bio_data_dir(bio) == WRITE) | |
257 | put_page(page); | |
f6cf0545 JM |
258 | else if (clean_pages_on_read) |
259 | flush_icache_range((unsigned long)page_address(page), | |
260 | (unsigned long)page_address(page) + PAGE_SIZE); | |
343df3c7 | 261 | |
4e4cbee9 CH |
262 | if (bio->bi_status && !hb->error) |
263 | hb->error = bio->bi_status; | |
343df3c7 CH |
264 | if (atomic_dec_and_test(&hb->count)) |
265 | wake_up(&hb->wait); | |
266 | ||
267 | bio_put(bio); | |
268 | } | |
269 | ||
568e34ed BVA |
270 | static int hib_submit_io(blk_opf_t opf, pgoff_t page_off, void *addr, |
271 | struct hib_bio_batch *hb) | |
343df3c7 CH |
272 | { |
273 | struct page *page = virt_to_page(addr); | |
274 | struct bio *bio; | |
275 | int error = 0; | |
276 | ||
4379f911 | 277 | bio = bio_alloc(file_bdev(hib_resume_bdev_file), 1, opf, |
e017d304 | 278 | GFP_NOIO | __GFP_HIGH); |
343df3c7 | 279 | bio->bi_iter.bi_sector = page_off * (PAGE_SIZE >> 9); |
343df3c7 CH |
280 | |
281 | if (bio_add_page(bio, page, PAGE_SIZE, 0) < PAGE_SIZE) { | |
64ec72a1 JP |
282 | pr_err("Adding page to bio failed at %llu\n", |
283 | (unsigned long long)bio->bi_iter.bi_sector); | |
343df3c7 CH |
284 | bio_put(bio); |
285 | return -EFAULT; | |
286 | } | |
287 | ||
288 | if (hb) { | |
289 | bio->bi_end_io = hib_end_io; | |
290 | bio->bi_private = hb; | |
291 | atomic_inc(&hb->count); | |
4e49ea4a | 292 | submit_bio(bio); |
343df3c7 | 293 | } else { |
4e49ea4a | 294 | error = submit_bio_wait(bio); |
343df3c7 CH |
295 | bio_put(bio); |
296 | } | |
297 | ||
298 | return error; | |
299 | } | |
300 | ||
01de5fcd | 301 | static int hib_wait_io(struct hib_bio_batch *hb) |
343df3c7 | 302 | { |
55c4478a XC |
303 | /* |
304 | * We are relying on the behavior of blk_plug that a thread with | |
305 | * a plug will flush the plug list before sleeping. | |
306 | */ | |
343df3c7 | 307 | wait_event(hb->wait, atomic_read(&hb->count) == 0); |
01de5fcd | 308 | return blk_status_to_errno(hb->error); |
343df3c7 | 309 | } |
3fc6b34f | 310 | |
3fc6b34f RW |
311 | /* |
312 | * Saving part | |
313 | */ | |
51fb352b | 314 | static int mark_swapfiles(struct swap_map_handle *handle, unsigned int flags) |
61159a31 RW |
315 | { |
316 | int error; | |
317 | ||
568e34ed | 318 | hib_submit_io(REQ_OP_READ, swsusp_resume_block, swsusp_header, NULL); |
1b29c164 VG |
319 | if (!memcmp("SWAP-SPACE",swsusp_header->sig, 10) || |
320 | !memcmp("SWAPSPACE2",swsusp_header->sig, 10)) { | |
321 | memcpy(swsusp_header->orig_sig,swsusp_header->sig, 10); | |
3624eb04 | 322 | memcpy(swsusp_header->sig, HIBERNATE_SIG, 10); |
51fb352b | 323 | swsusp_header->image = handle->first_sector; |
74d95555 DW |
324 | if (swsusp_hardware_signature) { |
325 | swsusp_header->hw_sig = swsusp_hardware_signature; | |
326 | flags |= SF_HW_SIG; | |
327 | } | |
a634cc10 | 328 | swsusp_header->flags = flags; |
081a9d04 BS |
329 | if (flags & SF_CRC32_MODE) |
330 | swsusp_header->crc32 = handle->crc32; | |
568e34ed | 331 | error = hib_submit_io(REQ_OP_WRITE | REQ_SYNC, |
162b99e3 | 332 | swsusp_resume_block, swsusp_header, NULL); |
61159a31 | 333 | } else { |
64ec72a1 | 334 | pr_err("Swap header not found!\n"); |
61159a31 RW |
335 | error = -ENODEV; |
336 | } | |
337 | return error; | |
338 | } | |
339 | ||
a06c6f5d N |
340 | /* |
341 | * Hold the swsusp_header flag. This is used in software_resume() in | |
342 | * 'kernel/power/hibernate' to check if the image is compressed and query | |
343 | * for the compression algorithm support(if so). | |
344 | */ | |
345 | unsigned int swsusp_header_flags; | |
346 | ||
61159a31 RW |
347 | /** |
348 | * swsusp_swap_check - check if the resume device is a swap device | |
349 | * and get its index (if so) | |
6f612af5 JS |
350 | * |
351 | * This is called before saving image | |
61159a31 | 352 | */ |
6f612af5 | 353 | static int swsusp_swap_check(void) |
61159a31 | 354 | { |
3aef83e0 RW |
355 | int res; |
356 | ||
21bd9005 CH |
357 | if (swsusp_resume_device) |
358 | res = swap_type_of(swsusp_resume_device, swsusp_resume_block); | |
359 | else | |
360 | res = find_first_swap(&swsusp_resume_device); | |
3aef83e0 RW |
361 | if (res < 0) |
362 | return res; | |
3aef83e0 | 363 | root_swap = res; |
21bd9005 | 364 | |
4379f911 | 365 | hib_resume_bdev_file = bdev_file_open_by_dev(swsusp_resume_device, |
05bdb996 | 366 | BLK_OPEN_WRITE, NULL, NULL); |
4379f911 CB |
367 | if (IS_ERR(hib_resume_bdev_file)) |
368 | return PTR_ERR(hib_resume_bdev_file); | |
3aef83e0 | 369 | |
b1439b17 | 370 | return 0; |
61159a31 RW |
371 | } |
372 | ||
373 | /** | |
374 | * write_page - Write one page to given swap location. | |
375 | * @buf: Address we're writing. | |
376 | * @offset: Offset of the swap page we're writing to. | |
343df3c7 | 377 | * @hb: bio completion batch |
61159a31 RW |
378 | */ |
379 | ||
343df3c7 | 380 | static int write_page(void *buf, sector_t offset, struct hib_bio_batch *hb) |
61159a31 | 381 | { |
3aef83e0 | 382 | void *src; |
081a9d04 | 383 | int ret; |
3aef83e0 RW |
384 | |
385 | if (!offset) | |
386 | return -ENOSPC; | |
387 | ||
343df3c7 | 388 | if (hb) { |
0eb0b63c | 389 | src = (void *)__get_free_page(GFP_NOIO | __GFP_NOWARN | |
5a21d489 | 390 | __GFP_NORETRY); |
3aef83e0 | 391 | if (src) { |
3ecb01df | 392 | copy_page(src, buf); |
3aef83e0 | 393 | } else { |
343df3c7 | 394 | ret = hib_wait_io(hb); /* Free pages */ |
081a9d04 BS |
395 | if (ret) |
396 | return ret; | |
0eb0b63c | 397 | src = (void *)__get_free_page(GFP_NOIO | |
5a21d489 BS |
398 | __GFP_NOWARN | |
399 | __GFP_NORETRY); | |
081a9d04 BS |
400 | if (src) { |
401 | copy_page(src, buf); | |
402 | } else { | |
403 | WARN_ON_ONCE(1); | |
343df3c7 | 404 | hb = NULL; /* Go synchronous */ |
081a9d04 BS |
405 | src = buf; |
406 | } | |
ab954160 | 407 | } |
3aef83e0 RW |
408 | } else { |
409 | src = buf; | |
61159a31 | 410 | } |
568e34ed | 411 | return hib_submit_io(REQ_OP_WRITE | REQ_SYNC, offset, src, hb); |
61159a31 RW |
412 | } |
413 | ||
61159a31 RW |
414 | static void release_swap_writer(struct swap_map_handle *handle) |
415 | { | |
416 | if (handle->cur) | |
417 | free_page((unsigned long)handle->cur); | |
418 | handle->cur = NULL; | |
61159a31 RW |
419 | } |
420 | ||
421 | static int get_swap_writer(struct swap_map_handle *handle) | |
422 | { | |
6f612af5 JS |
423 | int ret; |
424 | ||
425 | ret = swsusp_swap_check(); | |
426 | if (ret) { | |
427 | if (ret != -ENOSPC) | |
64ec72a1 | 428 | pr_err("Cannot find swap device, try swapon -a\n"); |
6f612af5 JS |
429 | return ret; |
430 | } | |
61159a31 | 431 | handle->cur = (struct swap_map_page *)get_zeroed_page(GFP_KERNEL); |
6f612af5 JS |
432 | if (!handle->cur) { |
433 | ret = -ENOMEM; | |
434 | goto err_close; | |
435 | } | |
d1d241cc | 436 | handle->cur_swap = alloc_swapdev_block(root_swap); |
61159a31 | 437 | if (!handle->cur_swap) { |
6f612af5 JS |
438 | ret = -ENOSPC; |
439 | goto err_rel; | |
61159a31 RW |
440 | } |
441 | handle->k = 0; | |
f8262d47 | 442 | handle->reqd_free_pages = reqd_free_pages(); |
51fb352b | 443 | handle->first_sector = handle->cur_swap; |
61159a31 | 444 | return 0; |
6f612af5 JS |
445 | err_rel: |
446 | release_swap_writer(handle); | |
447 | err_close: | |
93745df1 | 448 | swsusp_close(); |
6f612af5 | 449 | return ret; |
61159a31 RW |
450 | } |
451 | ||
ab954160 | 452 | static int swap_write_page(struct swap_map_handle *handle, void *buf, |
343df3c7 | 453 | struct hib_bio_batch *hb) |
ab954160 | 454 | { |
bbeaa469 | 455 | int error; |
3aef83e0 | 456 | sector_t offset; |
61159a31 RW |
457 | |
458 | if (!handle->cur) | |
459 | return -EINVAL; | |
d1d241cc | 460 | offset = alloc_swapdev_block(root_swap); |
343df3c7 | 461 | error = write_page(buf, offset, hb); |
61159a31 RW |
462 | if (error) |
463 | return error; | |
464 | handle->cur->entries[handle->k++] = offset; | |
465 | if (handle->k >= MAP_PAGE_ENTRIES) { | |
d1d241cc | 466 | offset = alloc_swapdev_block(root_swap); |
61159a31 RW |
467 | if (!offset) |
468 | return -ENOSPC; | |
469 | handle->cur->next_swap = offset; | |
343df3c7 | 470 | error = write_page(handle->cur, handle->cur_swap, hb); |
61159a31 | 471 | if (error) |
ab954160 | 472 | goto out; |
3ecb01df | 473 | clear_page(handle->cur); |
61159a31 RW |
474 | handle->cur_swap = offset; |
475 | handle->k = 0; | |
5a21d489 | 476 | |
343df3c7 CH |
477 | if (hb && low_free_pages() <= handle->reqd_free_pages) { |
478 | error = hib_wait_io(hb); | |
5a21d489 BS |
479 | if (error) |
480 | goto out; | |
481 | /* | |
482 | * Recalculate the number of required free pages, to | |
483 | * make sure we never take more than half. | |
484 | */ | |
485 | handle->reqd_free_pages = reqd_free_pages(); | |
486 | } | |
081a9d04 | 487 | } |
59a49335 | 488 | out: |
ab954160 | 489 | return error; |
61159a31 RW |
490 | } |
491 | ||
492 | static int flush_swap_writer(struct swap_map_handle *handle) | |
493 | { | |
494 | if (handle->cur && handle->cur_swap) | |
ab954160 | 495 | return write_page(handle->cur, handle->cur_swap, NULL); |
61159a31 RW |
496 | else |
497 | return -EINVAL; | |
498 | } | |
499 | ||
6f612af5 JS |
500 | static int swap_writer_finish(struct swap_map_handle *handle, |
501 | unsigned int flags, int error) | |
502 | { | |
503 | if (!error) { | |
64ec72a1 | 504 | pr_info("S"); |
6f612af5 | 505 | error = mark_swapfiles(handle, flags); |
64ec72a1 | 506 | pr_cont("|\n"); |
fef9c8d2 | 507 | flush_swap_writer(handle); |
6f612af5 JS |
508 | } |
509 | ||
510 | if (error) | |
511 | free_all_swap_pages(root_swap); | |
512 | release_swap_writer(handle); | |
93745df1 | 513 | swsusp_close(); |
6f612af5 JS |
514 | |
515 | return error; | |
516 | } | |
517 | ||
a06c6f5d N |
518 | /* |
519 | * Bytes we need for compressed data in worst case. We assume(limitation) | |
520 | * this is the worst of all the compression algorithms. | |
521 | */ | |
522 | #define bytes_worst_compress(x) ((x) + ((x) / 16) + 64 + 3 + 2) | |
523 | ||
f996fc96 | 524 | /* We need to remember how much compressed data we need to read. */ |
89a80762 | 525 | #define CMP_HEADER sizeof(size_t) |
f996fc96 BS |
526 | |
527 | /* Number of pages/bytes we'll compress at one time. */ | |
89a80762 N |
528 | #define UNC_PAGES 32 |
529 | #define UNC_SIZE (UNC_PAGES * PAGE_SIZE) | |
f996fc96 | 530 | |
89a80762 | 531 | /* Number of pages we need for compressed data (worst case). */ |
a06c6f5d | 532 | #define CMP_PAGES DIV_ROUND_UP(bytes_worst_compress(UNC_SIZE) + \ |
89a80762 N |
533 | CMP_HEADER, PAGE_SIZE) |
534 | #define CMP_SIZE (CMP_PAGES * PAGE_SIZE) | |
f996fc96 | 535 | |
081a9d04 | 536 | /* Maximum number of threads for compression/decompression. */ |
89a80762 | 537 | #define CMP_THREADS 3 |
081a9d04 | 538 | |
5a21d489 | 539 | /* Minimum/maximum number of pages for read buffering. */ |
89a80762 N |
540 | #define CMP_MIN_RD_PAGES 1024 |
541 | #define CMP_MAX_RD_PAGES 8192 | |
081a9d04 | 542 | |
61159a31 RW |
543 | /** |
544 | * save_image - save the suspend image data | |
545 | */ | |
546 | ||
547 | static int save_image(struct swap_map_handle *handle, | |
548 | struct snapshot_handle *snapshot, | |
3a4f7577 | 549 | unsigned int nr_to_write) |
61159a31 RW |
550 | { |
551 | unsigned int m; | |
552 | int ret; | |
3a4f7577 | 553 | int nr_pages; |
ab954160 | 554 | int err2; |
343df3c7 | 555 | struct hib_bio_batch hb; |
db597605 TR |
556 | ktime_t start; |
557 | ktime_t stop; | |
61159a31 | 558 | |
343df3c7 CH |
559 | hib_init_batch(&hb); |
560 | ||
64ec72a1 | 561 | pr_info("Saving image data pages (%u pages)...\n", |
23976728 | 562 | nr_to_write); |
d8150d35 | 563 | m = nr_to_write / 10; |
61159a31 RW |
564 | if (!m) |
565 | m = 1; | |
566 | nr_pages = 0; | |
db597605 | 567 | start = ktime_get(); |
4ff277f9 | 568 | while (1) { |
d3c1b24c | 569 | ret = snapshot_read_next(snapshot); |
4ff277f9 JS |
570 | if (ret <= 0) |
571 | break; | |
343df3c7 | 572 | ret = swap_write_page(handle, data_of(*snapshot), &hb); |
4ff277f9 JS |
573 | if (ret) |
574 | break; | |
575 | if (!(nr_pages % m)) | |
64ec72a1 JP |
576 | pr_info("Image saving progress: %3d%%\n", |
577 | nr_pages / m * 10); | |
4ff277f9 JS |
578 | nr_pages++; |
579 | } | |
343df3c7 | 580 | err2 = hib_wait_io(&hb); |
55c4478a | 581 | hib_finish_batch(&hb); |
db597605 | 582 | stop = ktime_get(); |
4ff277f9 JS |
583 | if (!ret) |
584 | ret = err2; | |
585 | if (!ret) | |
64ec72a1 | 586 | pr_info("Image saving done\n"); |
db597605 | 587 | swsusp_show_speed(start, stop, nr_to_write, "Wrote"); |
4ff277f9 | 588 | return ret; |
61159a31 RW |
589 | } |
590 | ||
6b37dfcb | 591 | /* |
081a9d04 BS |
592 | * Structure used for CRC32. |
593 | */ | |
594 | struct crc_data { | |
595 | struct task_struct *thr; /* thread */ | |
596 | atomic_t ready; /* ready to start flag */ | |
597 | atomic_t stop; /* ready to stop flag */ | |
598 | unsigned run_threads; /* nr current threads */ | |
599 | wait_queue_head_t go; /* start crc update */ | |
600 | wait_queue_head_t done; /* crc update done */ | |
601 | u32 *crc32; /* points to handle's crc32 */ | |
89a80762 N |
602 | size_t *unc_len[CMP_THREADS]; /* uncompressed lengths */ |
603 | unsigned char *unc[CMP_THREADS]; /* uncompressed data */ | |
081a9d04 BS |
604 | }; |
605 | ||
6b37dfcb | 606 | /* |
081a9d04 BS |
607 | * CRC32 update function that runs in its own thread. |
608 | */ | |
609 | static int crc32_threadfn(void *data) | |
610 | { | |
611 | struct crc_data *d = data; | |
612 | unsigned i; | |
613 | ||
614 | while (1) { | |
71cd7e80 | 615 | wait_event(d->go, atomic_read_acquire(&d->ready) || |
081a9d04 BS |
616 | kthread_should_stop()); |
617 | if (kthread_should_stop()) { | |
618 | d->thr = NULL; | |
71cd7e80 | 619 | atomic_set_release(&d->stop, 1); |
081a9d04 BS |
620 | wake_up(&d->done); |
621 | break; | |
622 | } | |
623 | atomic_set(&d->ready, 0); | |
624 | ||
625 | for (i = 0; i < d->run_threads; i++) | |
626 | *d->crc32 = crc32_le(*d->crc32, | |
627 | d->unc[i], *d->unc_len[i]); | |
71cd7e80 | 628 | atomic_set_release(&d->stop, 1); |
081a9d04 BS |
629 | wake_up(&d->done); |
630 | } | |
631 | return 0; | |
632 | } | |
6b37dfcb | 633 | /* |
89a80762 | 634 | * Structure used for data compression. |
081a9d04 BS |
635 | */ |
636 | struct cmp_data { | |
637 | struct task_struct *thr; /* thread */ | |
a06c6f5d | 638 | struct crypto_comp *cc; /* crypto compressor stream */ |
081a9d04 BS |
639 | atomic_t ready; /* ready to start flag */ |
640 | atomic_t stop; /* ready to stop flag */ | |
641 | int ret; /* return code */ | |
642 | wait_queue_head_t go; /* start compression */ | |
643 | wait_queue_head_t done; /* compression done */ | |
644 | size_t unc_len; /* uncompressed length */ | |
645 | size_t cmp_len; /* compressed length */ | |
89a80762 N |
646 | unsigned char unc[UNC_SIZE]; /* uncompressed buffer */ |
647 | unsigned char cmp[CMP_SIZE]; /* compressed buffer */ | |
081a9d04 BS |
648 | }; |
649 | ||
a06c6f5d N |
650 | /* Indicates the image size after compression */ |
651 | static atomic_t compressed_size = ATOMIC_INIT(0); | |
652 | ||
6b37dfcb | 653 | /* |
081a9d04 BS |
654 | * Compression function that runs in its own thread. |
655 | */ | |
89a80762 | 656 | static int compress_threadfn(void *data) |
081a9d04 BS |
657 | { |
658 | struct cmp_data *d = data; | |
a06c6f5d | 659 | unsigned int cmp_len = 0; |
081a9d04 BS |
660 | |
661 | while (1) { | |
71cd7e80 | 662 | wait_event(d->go, atomic_read_acquire(&d->ready) || |
081a9d04 BS |
663 | kthread_should_stop()); |
664 | if (kthread_should_stop()) { | |
665 | d->thr = NULL; | |
666 | d->ret = -1; | |
71cd7e80 | 667 | atomic_set_release(&d->stop, 1); |
081a9d04 BS |
668 | wake_up(&d->done); |
669 | break; | |
670 | } | |
671 | atomic_set(&d->ready, 0); | |
672 | ||
a06c6f5d N |
673 | cmp_len = CMP_SIZE - CMP_HEADER; |
674 | d->ret = crypto_comp_compress(d->cc, d->unc, d->unc_len, | |
675 | d->cmp + CMP_HEADER, | |
676 | &cmp_len); | |
677 | d->cmp_len = cmp_len; | |
678 | ||
679 | atomic_set(&compressed_size, atomic_read(&compressed_size) + d->cmp_len); | |
71cd7e80 | 680 | atomic_set_release(&d->stop, 1); |
081a9d04 BS |
681 | wake_up(&d->done); |
682 | } | |
683 | return 0; | |
684 | } | |
f996fc96 BS |
685 | |
686 | /** | |
89a80762 | 687 | * save_compressed_image - Save the suspend image data after compression. |
057b0a75 | 688 | * @handle: Swap map handle to use for saving the image. |
f996fc96 BS |
689 | * @snapshot: Image to read data from. |
690 | * @nr_to_write: Number of pages to save. | |
691 | */ | |
89a80762 N |
692 | static int save_compressed_image(struct swap_map_handle *handle, |
693 | struct snapshot_handle *snapshot, | |
694 | unsigned int nr_to_write) | |
f996fc96 BS |
695 | { |
696 | unsigned int m; | |
697 | int ret = 0; | |
698 | int nr_pages; | |
699 | int err2; | |
343df3c7 | 700 | struct hib_bio_batch hb; |
db597605 TR |
701 | ktime_t start; |
702 | ktime_t stop; | |
081a9d04 BS |
703 | size_t off; |
704 | unsigned thr, run_threads, nr_threads; | |
705 | unsigned char *page = NULL; | |
706 | struct cmp_data *data = NULL; | |
707 | struct crc_data *crc = NULL; | |
708 | ||
343df3c7 CH |
709 | hib_init_batch(&hb); |
710 | ||
a06c6f5d N |
711 | atomic_set(&compressed_size, 0); |
712 | ||
081a9d04 BS |
713 | /* |
714 | * We'll limit the number of threads for compression to limit memory | |
715 | * footprint. | |
716 | */ | |
717 | nr_threads = num_online_cpus() - 1; | |
89a80762 | 718 | nr_threads = clamp_val(nr_threads, 1, CMP_THREADS); |
f996fc96 | 719 | |
0eb0b63c | 720 | page = (void *)__get_free_page(GFP_NOIO | __GFP_HIGH); |
f996fc96 | 721 | if (!page) { |
a06c6f5d | 722 | pr_err("Failed to allocate %s page\n", hib_comp_algo); |
081a9d04 BS |
723 | ret = -ENOMEM; |
724 | goto out_clean; | |
f996fc96 BS |
725 | } |
726 | ||
9437e393 | 727 | data = vzalloc(array_size(nr_threads, sizeof(*data))); |
081a9d04 | 728 | if (!data) { |
a06c6f5d | 729 | pr_err("Failed to allocate %s data\n", hib_comp_algo); |
081a9d04 BS |
730 | ret = -ENOMEM; |
731 | goto out_clean; | |
f996fc96 BS |
732 | } |
733 | ||
9437e393 | 734 | crc = kzalloc(sizeof(*crc), GFP_KERNEL); |
081a9d04 | 735 | if (!crc) { |
64ec72a1 | 736 | pr_err("Failed to allocate crc\n"); |
081a9d04 BS |
737 | ret = -ENOMEM; |
738 | goto out_clean; | |
739 | } | |
081a9d04 BS |
740 | |
741 | /* | |
742 | * Start the compression threads. | |
743 | */ | |
744 | for (thr = 0; thr < nr_threads; thr++) { | |
745 | init_waitqueue_head(&data[thr].go); | |
746 | init_waitqueue_head(&data[thr].done); | |
747 | ||
a06c6f5d N |
748 | data[thr].cc = crypto_alloc_comp(hib_comp_algo, 0, 0); |
749 | if (IS_ERR_OR_NULL(data[thr].cc)) { | |
750 | pr_err("Could not allocate comp stream %ld\n", PTR_ERR(data[thr].cc)); | |
751 | ret = -EFAULT; | |
752 | goto out_clean; | |
753 | } | |
754 | ||
89a80762 | 755 | data[thr].thr = kthread_run(compress_threadfn, |
081a9d04 BS |
756 | &data[thr], |
757 | "image_compress/%u", thr); | |
758 | if (IS_ERR(data[thr].thr)) { | |
759 | data[thr].thr = NULL; | |
64ec72a1 | 760 | pr_err("Cannot start compression threads\n"); |
081a9d04 BS |
761 | ret = -ENOMEM; |
762 | goto out_clean; | |
763 | } | |
f996fc96 BS |
764 | } |
765 | ||
081a9d04 BS |
766 | /* |
767 | * Start the CRC32 thread. | |
768 | */ | |
769 | init_waitqueue_head(&crc->go); | |
770 | init_waitqueue_head(&crc->done); | |
771 | ||
772 | handle->crc32 = 0; | |
773 | crc->crc32 = &handle->crc32; | |
774 | for (thr = 0; thr < nr_threads; thr++) { | |
775 | crc->unc[thr] = data[thr].unc; | |
776 | crc->unc_len[thr] = &data[thr].unc_len; | |
777 | } | |
778 | ||
779 | crc->thr = kthread_run(crc32_threadfn, crc, "image_crc32"); | |
780 | if (IS_ERR(crc->thr)) { | |
781 | crc->thr = NULL; | |
64ec72a1 | 782 | pr_err("Cannot start CRC32 thread\n"); |
081a9d04 BS |
783 | ret = -ENOMEM; |
784 | goto out_clean; | |
f996fc96 BS |
785 | } |
786 | ||
5a21d489 BS |
787 | /* |
788 | * Adjust the number of required free pages after all allocations have | |
789 | * been done. We don't want to run out of pages when writing. | |
790 | */ | |
791 | handle->reqd_free_pages = reqd_free_pages(); | |
792 | ||
a06c6f5d | 793 | pr_info("Using %u thread(s) for %s compression\n", nr_threads, hib_comp_algo); |
64ec72a1 JP |
794 | pr_info("Compressing and saving image data (%u pages)...\n", |
795 | nr_to_write); | |
d8150d35 | 796 | m = nr_to_write / 10; |
f996fc96 BS |
797 | if (!m) |
798 | m = 1; | |
799 | nr_pages = 0; | |
db597605 | 800 | start = ktime_get(); |
f996fc96 | 801 | for (;;) { |
081a9d04 | 802 | for (thr = 0; thr < nr_threads; thr++) { |
89a80762 | 803 | for (off = 0; off < UNC_SIZE; off += PAGE_SIZE) { |
081a9d04 BS |
804 | ret = snapshot_read_next(snapshot); |
805 | if (ret < 0) | |
806 | goto out_finish; | |
807 | ||
808 | if (!ret) | |
809 | break; | |
810 | ||
811 | memcpy(data[thr].unc + off, | |
812 | data_of(*snapshot), PAGE_SIZE); | |
813 | ||
814 | if (!(nr_pages % m)) | |
64ec72a1 JP |
815 | pr_info("Image saving progress: %3d%%\n", |
816 | nr_pages / m * 10); | |
081a9d04 BS |
817 | nr_pages++; |
818 | } | |
819 | if (!off) | |
f996fc96 BS |
820 | break; |
821 | ||
081a9d04 | 822 | data[thr].unc_len = off; |
f996fc96 | 823 | |
71cd7e80 | 824 | atomic_set_release(&data[thr].ready, 1); |
081a9d04 | 825 | wake_up(&data[thr].go); |
f996fc96 BS |
826 | } |
827 | ||
081a9d04 | 828 | if (!thr) |
f996fc96 BS |
829 | break; |
830 | ||
081a9d04 | 831 | crc->run_threads = thr; |
71cd7e80 | 832 | atomic_set_release(&crc->ready, 1); |
081a9d04 | 833 | wake_up(&crc->go); |
f996fc96 | 834 | |
081a9d04 BS |
835 | for (run_threads = thr, thr = 0; thr < run_threads; thr++) { |
836 | wait_event(data[thr].done, | |
71cd7e80 | 837 | atomic_read_acquire(&data[thr].stop)); |
081a9d04 | 838 | atomic_set(&data[thr].stop, 0); |
f996fc96 | 839 | |
081a9d04 | 840 | ret = data[thr].ret; |
f996fc96 | 841 | |
081a9d04 | 842 | if (ret < 0) { |
a06c6f5d | 843 | pr_err("%s compression failed\n", hib_comp_algo); |
081a9d04 BS |
844 | goto out_finish; |
845 | } | |
f996fc96 | 846 | |
081a9d04 BS |
847 | if (unlikely(!data[thr].cmp_len || |
848 | data[thr].cmp_len > | |
a06c6f5d N |
849 | bytes_worst_compress(data[thr].unc_len))) { |
850 | pr_err("Invalid %s compressed length\n", hib_comp_algo); | |
081a9d04 | 851 | ret = -1; |
f996fc96 | 852 | goto out_finish; |
081a9d04 BS |
853 | } |
854 | ||
855 | *(size_t *)data[thr].cmp = data[thr].cmp_len; | |
856 | ||
857 | /* | |
858 | * Given we are writing one page at a time to disk, we | |
859 | * copy that much from the buffer, although the last | |
860 | * bit will likely be smaller than full page. This is | |
861 | * OK - we saved the length of the compressed data, so | |
862 | * any garbage at the end will be discarded when we | |
863 | * read it. | |
864 | */ | |
865 | for (off = 0; | |
89a80762 | 866 | off < CMP_HEADER + data[thr].cmp_len; |
081a9d04 BS |
867 | off += PAGE_SIZE) { |
868 | memcpy(page, data[thr].cmp + off, PAGE_SIZE); | |
869 | ||
343df3c7 | 870 | ret = swap_write_page(handle, page, &hb); |
081a9d04 BS |
871 | if (ret) |
872 | goto out_finish; | |
873 | } | |
f996fc96 | 874 | } |
081a9d04 | 875 | |
71cd7e80 | 876 | wait_event(crc->done, atomic_read_acquire(&crc->stop)); |
081a9d04 | 877 | atomic_set(&crc->stop, 0); |
f996fc96 BS |
878 | } |
879 | ||
880 | out_finish: | |
343df3c7 | 881 | err2 = hib_wait_io(&hb); |
db597605 | 882 | stop = ktime_get(); |
f996fc96 BS |
883 | if (!ret) |
884 | ret = err2; | |
d8150d35 | 885 | if (!ret) |
64ec72a1 | 886 | pr_info("Image saving done\n"); |
db597605 | 887 | swsusp_show_speed(start, stop, nr_to_write, "Wrote"); |
a06c6f5d N |
888 | pr_info("Image size after compression: %d kbytes\n", |
889 | (atomic_read(&compressed_size) / 1024)); | |
890 | ||
081a9d04 | 891 | out_clean: |
55c4478a | 892 | hib_finish_batch(&hb); |
081a9d04 BS |
893 | if (crc) { |
894 | if (crc->thr) | |
895 | kthread_stop(crc->thr); | |
896 | kfree(crc); | |
897 | } | |
898 | if (data) { | |
a06c6f5d | 899 | for (thr = 0; thr < nr_threads; thr++) { |
081a9d04 BS |
900 | if (data[thr].thr) |
901 | kthread_stop(data[thr].thr); | |
a06c6f5d N |
902 | if (data[thr].cc) |
903 | crypto_free_comp(data[thr].cc); | |
904 | } | |
081a9d04 BS |
905 | vfree(data); |
906 | } | |
907 | if (page) free_page((unsigned long)page); | |
f996fc96 BS |
908 | |
909 | return ret; | |
910 | } | |
911 | ||
61159a31 RW |
912 | /** |
913 | * enough_swap - Make sure we have enough swap to save the image. | |
914 | * | |
915 | * Returns TRUE or FALSE after checking the total amount of swap | |
e4b2897a | 916 | * space available from the resume partition. |
61159a31 RW |
917 | */ |
918 | ||
8ffdfe35 | 919 | static int enough_swap(unsigned int nr_pages) |
61159a31 RW |
920 | { |
921 | unsigned int free_swap = count_swap_pages(root_swap, 1); | |
f996fc96 | 922 | unsigned int required; |
61159a31 | 923 | |
64ec72a1 | 924 | pr_debug("Free swap pages: %u\n", free_swap); |
f996fc96 | 925 | |
ee34a370 | 926 | required = PAGES_FOR_IO + nr_pages; |
f996fc96 | 927 | return free_swap > required; |
61159a31 RW |
928 | } |
929 | ||
930 | /** | |
931 | * swsusp_write - Write entire image and metadata. | |
a634cc10 | 932 | * @flags: flags to pass to the "boot" kernel in the image header |
61159a31 RW |
933 | * |
934 | * It is important _NOT_ to umount filesystems at this point. We want | |
935 | * them synced (in case something goes wrong) but we DO not want to mark | |
936 | * filesystem clean: it is not. (And it does not matter, if we resume | |
937 | * correctly, we'll mark system clean, anyway.) | |
938 | */ | |
939 | ||
a634cc10 | 940 | int swsusp_write(unsigned int flags) |
61159a31 RW |
941 | { |
942 | struct swap_map_handle handle; | |
943 | struct snapshot_handle snapshot; | |
944 | struct swsusp_info *header; | |
6f612af5 | 945 | unsigned long pages; |
61159a31 RW |
946 | int error; |
947 | ||
6f612af5 JS |
948 | pages = snapshot_get_image_size(); |
949 | error = get_swap_writer(&handle); | |
3aef83e0 | 950 | if (error) { |
64ec72a1 | 951 | pr_err("Cannot get swap writer\n"); |
61159a31 RW |
952 | return error; |
953 | } | |
ee34a370 | 954 | if (flags & SF_NOCOMPRESS_MODE) { |
8ffdfe35 | 955 | if (!enough_swap(pages)) { |
64ec72a1 | 956 | pr_err("Not enough free swap\n"); |
ee34a370 BS |
957 | error = -ENOSPC; |
958 | goto out_finish; | |
959 | } | |
6f612af5 | 960 | } |
61159a31 | 961 | memset(&snapshot, 0, sizeof(struct snapshot_handle)); |
d3c1b24c | 962 | error = snapshot_read_next(&snapshot); |
d5641c64 | 963 | if (error < (int)PAGE_SIZE) { |
3aef83e0 RW |
964 | if (error >= 0) |
965 | error = -EFAULT; | |
966 | ||
6f612af5 | 967 | goto out_finish; |
3aef83e0 | 968 | } |
61159a31 | 969 | header = (struct swsusp_info *)data_of(snapshot); |
6f612af5 | 970 | error = swap_write_page(&handle, header, NULL); |
f996fc96 BS |
971 | if (!error) { |
972 | error = (flags & SF_NOCOMPRESS_MODE) ? | |
973 | save_image(&handle, &snapshot, pages - 1) : | |
89a80762 | 974 | save_compressed_image(&handle, &snapshot, pages - 1); |
f996fc96 | 975 | } |
6f612af5 JS |
976 | out_finish: |
977 | error = swap_writer_finish(&handle, flags, error); | |
61159a31 RW |
978 | return error; |
979 | } | |
980 | ||
6b37dfcb | 981 | /* |
61159a31 | 982 | * The following functions allow us to read data using a swap map |
6b37dfcb | 983 | * in a file-like way. |
61159a31 RW |
984 | */ |
985 | ||
986 | static void release_swap_reader(struct swap_map_handle *handle) | |
987 | { | |
081a9d04 BS |
988 | struct swap_map_page_list *tmp; |
989 | ||
990 | while (handle->maps) { | |
991 | if (handle->maps->map) | |
992 | free_page((unsigned long)handle->maps->map); | |
993 | tmp = handle->maps; | |
994 | handle->maps = handle->maps->next; | |
995 | kfree(tmp); | |
996 | } | |
61159a31 RW |
997 | handle->cur = NULL; |
998 | } | |
999 | ||
6f612af5 JS |
1000 | static int get_swap_reader(struct swap_map_handle *handle, |
1001 | unsigned int *flags_p) | |
61159a31 RW |
1002 | { |
1003 | int error; | |
081a9d04 BS |
1004 | struct swap_map_page_list *tmp, *last; |
1005 | sector_t offset; | |
61159a31 | 1006 | |
6f612af5 JS |
1007 | *flags_p = swsusp_header->flags; |
1008 | ||
1009 | if (!swsusp_header->image) /* how can this happen? */ | |
61159a31 | 1010 | return -EINVAL; |
3aef83e0 | 1011 | |
081a9d04 BS |
1012 | handle->cur = NULL; |
1013 | last = handle->maps = NULL; | |
1014 | offset = swsusp_header->image; | |
1015 | while (offset) { | |
2f02a7ec | 1016 | tmp = kzalloc(sizeof(*handle->maps), GFP_KERNEL); |
081a9d04 BS |
1017 | if (!tmp) { |
1018 | release_swap_reader(handle); | |
1019 | return -ENOMEM; | |
1020 | } | |
081a9d04 BS |
1021 | if (!handle->maps) |
1022 | handle->maps = tmp; | |
1023 | if (last) | |
1024 | last->next = tmp; | |
1025 | last = tmp; | |
1026 | ||
1027 | tmp->map = (struct swap_map_page *) | |
0eb0b63c | 1028 | __get_free_page(GFP_NOIO | __GFP_HIGH); |
081a9d04 BS |
1029 | if (!tmp->map) { |
1030 | release_swap_reader(handle); | |
1031 | return -ENOMEM; | |
1032 | } | |
3aef83e0 | 1033 | |
568e34ed | 1034 | error = hib_submit_io(REQ_OP_READ, offset, tmp->map, NULL); |
081a9d04 BS |
1035 | if (error) { |
1036 | release_swap_reader(handle); | |
1037 | return error; | |
1038 | } | |
1039 | offset = tmp->map->next_swap; | |
61159a31 RW |
1040 | } |
1041 | handle->k = 0; | |
081a9d04 | 1042 | handle->cur = handle->maps->map; |
61159a31 RW |
1043 | return 0; |
1044 | } | |
1045 | ||
546e0d27 | 1046 | static int swap_read_page(struct swap_map_handle *handle, void *buf, |
343df3c7 | 1047 | struct hib_bio_batch *hb) |
61159a31 | 1048 | { |
3aef83e0 | 1049 | sector_t offset; |
61159a31 | 1050 | int error; |
081a9d04 | 1051 | struct swap_map_page_list *tmp; |
61159a31 RW |
1052 | |
1053 | if (!handle->cur) | |
1054 | return -EINVAL; | |
1055 | offset = handle->cur->entries[handle->k]; | |
1056 | if (!offset) | |
1057 | return -EFAULT; | |
568e34ed | 1058 | error = hib_submit_io(REQ_OP_READ, offset, buf, hb); |
61159a31 RW |
1059 | if (error) |
1060 | return error; | |
1061 | if (++handle->k >= MAP_PAGE_ENTRIES) { | |
1062 | handle->k = 0; | |
081a9d04 BS |
1063 | free_page((unsigned long)handle->maps->map); |
1064 | tmp = handle->maps; | |
1065 | handle->maps = handle->maps->next; | |
1066 | kfree(tmp); | |
1067 | if (!handle->maps) | |
61159a31 | 1068 | release_swap_reader(handle); |
081a9d04 BS |
1069 | else |
1070 | handle->cur = handle->maps->map; | |
61159a31 RW |
1071 | } |
1072 | return error; | |
1073 | } | |
1074 | ||
6f612af5 JS |
1075 | static int swap_reader_finish(struct swap_map_handle *handle) |
1076 | { | |
1077 | release_swap_reader(handle); | |
1078 | ||
1079 | return 0; | |
1080 | } | |
1081 | ||
61159a31 RW |
1082 | /** |
1083 | * load_image - load the image using the swap map handle | |
1084 | * @handle and the snapshot handle @snapshot | |
1085 | * (assume there are @nr_pages pages to load) | |
1086 | */ | |
1087 | ||
1088 | static int load_image(struct swap_map_handle *handle, | |
1089 | struct snapshot_handle *snapshot, | |
546e0d27 | 1090 | unsigned int nr_to_read) |
61159a31 RW |
1091 | { |
1092 | unsigned int m; | |
081a9d04 | 1093 | int ret = 0; |
db597605 TR |
1094 | ktime_t start; |
1095 | ktime_t stop; | |
343df3c7 | 1096 | struct hib_bio_batch hb; |
546e0d27 AM |
1097 | int err2; |
1098 | unsigned nr_pages; | |
61159a31 | 1099 | |
343df3c7 CH |
1100 | hib_init_batch(&hb); |
1101 | ||
f6cf0545 | 1102 | clean_pages_on_read = true; |
64ec72a1 | 1103 | pr_info("Loading image data pages (%u pages)...\n", nr_to_read); |
d8150d35 | 1104 | m = nr_to_read / 10; |
61159a31 RW |
1105 | if (!m) |
1106 | m = 1; | |
1107 | nr_pages = 0; | |
db597605 | 1108 | start = ktime_get(); |
546e0d27 | 1109 | for ( ; ; ) { |
081a9d04 BS |
1110 | ret = snapshot_write_next(snapshot); |
1111 | if (ret <= 0) | |
546e0d27 | 1112 | break; |
343df3c7 | 1113 | ret = swap_read_page(handle, data_of(*snapshot), &hb); |
081a9d04 | 1114 | if (ret) |
546e0d27 AM |
1115 | break; |
1116 | if (snapshot->sync_read) | |
343df3c7 | 1117 | ret = hib_wait_io(&hb); |
081a9d04 | 1118 | if (ret) |
546e0d27 AM |
1119 | break; |
1120 | if (!(nr_pages % m)) | |
64ec72a1 JP |
1121 | pr_info("Image loading progress: %3d%%\n", |
1122 | nr_pages / m * 10); | |
546e0d27 AM |
1123 | nr_pages++; |
1124 | } | |
343df3c7 | 1125 | err2 = hib_wait_io(&hb); |
55c4478a | 1126 | hib_finish_batch(&hb); |
db597605 | 1127 | stop = ktime_get(); |
081a9d04 BS |
1128 | if (!ret) |
1129 | ret = err2; | |
1130 | if (!ret) { | |
64ec72a1 | 1131 | pr_info("Image loading done\n"); |
f4311756 CL |
1132 | ret = snapshot_write_finalize(snapshot); |
1133 | if (!ret && !snapshot_image_loaded(snapshot)) | |
081a9d04 | 1134 | ret = -ENODATA; |
d8150d35 | 1135 | } |
db597605 | 1136 | swsusp_show_speed(start, stop, nr_to_read, "Read"); |
081a9d04 BS |
1137 | return ret; |
1138 | } | |
1139 | ||
6b37dfcb | 1140 | /* |
89a80762 | 1141 | * Structure used for data decompression. |
081a9d04 BS |
1142 | */ |
1143 | struct dec_data { | |
1144 | struct task_struct *thr; /* thread */ | |
a06c6f5d | 1145 | struct crypto_comp *cc; /* crypto compressor stream */ |
081a9d04 BS |
1146 | atomic_t ready; /* ready to start flag */ |
1147 | atomic_t stop; /* ready to stop flag */ | |
1148 | int ret; /* return code */ | |
1149 | wait_queue_head_t go; /* start decompression */ | |
1150 | wait_queue_head_t done; /* decompression done */ | |
1151 | size_t unc_len; /* uncompressed length */ | |
1152 | size_t cmp_len; /* compressed length */ | |
89a80762 N |
1153 | unsigned char unc[UNC_SIZE]; /* uncompressed buffer */ |
1154 | unsigned char cmp[CMP_SIZE]; /* compressed buffer */ | |
081a9d04 BS |
1155 | }; |
1156 | ||
6b37dfcb | 1157 | /* |
6be2408a | 1158 | * Decompression function that runs in its own thread. |
081a9d04 | 1159 | */ |
89a80762 | 1160 | static int decompress_threadfn(void *data) |
081a9d04 BS |
1161 | { |
1162 | struct dec_data *d = data; | |
a06c6f5d | 1163 | unsigned int unc_len = 0; |
081a9d04 BS |
1164 | |
1165 | while (1) { | |
71cd7e80 | 1166 | wait_event(d->go, atomic_read_acquire(&d->ready) || |
081a9d04 BS |
1167 | kthread_should_stop()); |
1168 | if (kthread_should_stop()) { | |
1169 | d->thr = NULL; | |
1170 | d->ret = -1; | |
71cd7e80 | 1171 | atomic_set_release(&d->stop, 1); |
081a9d04 BS |
1172 | wake_up(&d->done); |
1173 | break; | |
1174 | } | |
1175 | atomic_set(&d->ready, 0); | |
1176 | ||
a06c6f5d N |
1177 | unc_len = UNC_SIZE; |
1178 | d->ret = crypto_comp_decompress(d->cc, d->cmp + CMP_HEADER, d->cmp_len, | |
1179 | d->unc, &unc_len); | |
1180 | d->unc_len = unc_len; | |
1181 | ||
f6cf0545 JM |
1182 | if (clean_pages_on_decompress) |
1183 | flush_icache_range((unsigned long)d->unc, | |
1184 | (unsigned long)d->unc + d->unc_len); | |
1185 | ||
71cd7e80 | 1186 | atomic_set_release(&d->stop, 1); |
081a9d04 BS |
1187 | wake_up(&d->done); |
1188 | } | |
1189 | return 0; | |
61159a31 RW |
1190 | } |
1191 | ||
f996fc96 | 1192 | /** |
89a80762 | 1193 | * load_compressed_image - Load compressed image data and decompress it. |
f996fc96 BS |
1194 | * @handle: Swap map handle to use for loading data. |
1195 | * @snapshot: Image to copy uncompressed data into. | |
1196 | * @nr_to_read: Number of pages to load. | |
1197 | */ | |
89a80762 N |
1198 | static int load_compressed_image(struct swap_map_handle *handle, |
1199 | struct snapshot_handle *snapshot, | |
1200 | unsigned int nr_to_read) | |
f996fc96 BS |
1201 | { |
1202 | unsigned int m; | |
081a9d04 BS |
1203 | int ret = 0; |
1204 | int eof = 0; | |
343df3c7 | 1205 | struct hib_bio_batch hb; |
db597605 TR |
1206 | ktime_t start; |
1207 | ktime_t stop; | |
f996fc96 | 1208 | unsigned nr_pages; |
081a9d04 BS |
1209 | size_t off; |
1210 | unsigned i, thr, run_threads, nr_threads; | |
1211 | unsigned ring = 0, pg = 0, ring_size = 0, | |
1212 | have = 0, want, need, asked = 0; | |
5a21d489 | 1213 | unsigned long read_pages = 0; |
081a9d04 BS |
1214 | unsigned char **page = NULL; |
1215 | struct dec_data *data = NULL; | |
1216 | struct crc_data *crc = NULL; | |
1217 | ||
343df3c7 CH |
1218 | hib_init_batch(&hb); |
1219 | ||
081a9d04 BS |
1220 | /* |
1221 | * We'll limit the number of threads for decompression to limit memory | |
1222 | * footprint. | |
1223 | */ | |
1224 | nr_threads = num_online_cpus() - 1; | |
89a80762 | 1225 | nr_threads = clamp_val(nr_threads, 1, CMP_THREADS); |
081a9d04 | 1226 | |
89a80762 | 1227 | page = vmalloc(array_size(CMP_MAX_RD_PAGES, sizeof(*page))); |
081a9d04 | 1228 | if (!page) { |
a06c6f5d | 1229 | pr_err("Failed to allocate %s page\n", hib_comp_algo); |
081a9d04 BS |
1230 | ret = -ENOMEM; |
1231 | goto out_clean; | |
1232 | } | |
9f339caf | 1233 | |
9437e393 | 1234 | data = vzalloc(array_size(nr_threads, sizeof(*data))); |
081a9d04 | 1235 | if (!data) { |
a06c6f5d | 1236 | pr_err("Failed to allocate %s data\n", hib_comp_algo); |
081a9d04 BS |
1237 | ret = -ENOMEM; |
1238 | goto out_clean; | |
1239 | } | |
9f339caf | 1240 | |
9437e393 | 1241 | crc = kzalloc(sizeof(*crc), GFP_KERNEL); |
081a9d04 | 1242 | if (!crc) { |
64ec72a1 | 1243 | pr_err("Failed to allocate crc\n"); |
081a9d04 BS |
1244 | ret = -ENOMEM; |
1245 | goto out_clean; | |
1246 | } | |
081a9d04 | 1247 | |
f6cf0545 JM |
1248 | clean_pages_on_decompress = true; |
1249 | ||
081a9d04 BS |
1250 | /* |
1251 | * Start the decompression threads. | |
1252 | */ | |
1253 | for (thr = 0; thr < nr_threads; thr++) { | |
1254 | init_waitqueue_head(&data[thr].go); | |
1255 | init_waitqueue_head(&data[thr].done); | |
1256 | ||
a06c6f5d N |
1257 | data[thr].cc = crypto_alloc_comp(hib_comp_algo, 0, 0); |
1258 | if (IS_ERR_OR_NULL(data[thr].cc)) { | |
1259 | pr_err("Could not allocate comp stream %ld\n", PTR_ERR(data[thr].cc)); | |
1260 | ret = -EFAULT; | |
1261 | goto out_clean; | |
1262 | } | |
1263 | ||
89a80762 | 1264 | data[thr].thr = kthread_run(decompress_threadfn, |
081a9d04 BS |
1265 | &data[thr], |
1266 | "image_decompress/%u", thr); | |
1267 | if (IS_ERR(data[thr].thr)) { | |
1268 | data[thr].thr = NULL; | |
64ec72a1 | 1269 | pr_err("Cannot start decompression threads\n"); |
081a9d04 BS |
1270 | ret = -ENOMEM; |
1271 | goto out_clean; | |
9f339caf | 1272 | } |
f996fc96 BS |
1273 | } |
1274 | ||
081a9d04 BS |
1275 | /* |
1276 | * Start the CRC32 thread. | |
1277 | */ | |
1278 | init_waitqueue_head(&crc->go); | |
1279 | init_waitqueue_head(&crc->done); | |
1280 | ||
1281 | handle->crc32 = 0; | |
1282 | crc->crc32 = &handle->crc32; | |
1283 | for (thr = 0; thr < nr_threads; thr++) { | |
1284 | crc->unc[thr] = data[thr].unc; | |
1285 | crc->unc_len[thr] = &data[thr].unc_len; | |
f996fc96 BS |
1286 | } |
1287 | ||
081a9d04 BS |
1288 | crc->thr = kthread_run(crc32_threadfn, crc, "image_crc32"); |
1289 | if (IS_ERR(crc->thr)) { | |
1290 | crc->thr = NULL; | |
64ec72a1 | 1291 | pr_err("Cannot start CRC32 thread\n"); |
081a9d04 BS |
1292 | ret = -ENOMEM; |
1293 | goto out_clean; | |
1294 | } | |
9f339caf | 1295 | |
081a9d04 | 1296 | /* |
5a21d489 BS |
1297 | * Set the number of pages for read buffering. |
1298 | * This is complete guesswork, because we'll only know the real | |
1299 | * picture once prepare_image() is called, which is much later on | |
1300 | * during the image load phase. We'll assume the worst case and | |
1301 | * say that none of the image pages are from high memory. | |
081a9d04 | 1302 | */ |
5a21d489 BS |
1303 | if (low_free_pages() > snapshot_get_image_size()) |
1304 | read_pages = (low_free_pages() - snapshot_get_image_size()) / 2; | |
89a80762 | 1305 | read_pages = clamp_val(read_pages, CMP_MIN_RD_PAGES, CMP_MAX_RD_PAGES); |
9f339caf | 1306 | |
081a9d04 | 1307 | for (i = 0; i < read_pages; i++) { |
89a80762 | 1308 | page[i] = (void *)__get_free_page(i < CMP_PAGES ? |
0eb0b63c CH |
1309 | GFP_NOIO | __GFP_HIGH : |
1310 | GFP_NOIO | __GFP_NOWARN | | |
71baba4b | 1311 | __GFP_NORETRY); |
5a21d489 | 1312 | |
081a9d04 | 1313 | if (!page[i]) { |
89a80762 | 1314 | if (i < CMP_PAGES) { |
081a9d04 | 1315 | ring_size = i; |
a06c6f5d | 1316 | pr_err("Failed to allocate %s pages\n", hib_comp_algo); |
081a9d04 BS |
1317 | ret = -ENOMEM; |
1318 | goto out_clean; | |
1319 | } else { | |
1320 | break; | |
1321 | } | |
1322 | } | |
f996fc96 | 1323 | } |
081a9d04 | 1324 | want = ring_size = i; |
f996fc96 | 1325 | |
a06c6f5d | 1326 | pr_info("Using %u thread(s) for %s decompression\n", nr_threads, hib_comp_algo); |
64ec72a1 JP |
1327 | pr_info("Loading and decompressing image data (%u pages)...\n", |
1328 | nr_to_read); | |
d8150d35 | 1329 | m = nr_to_read / 10; |
f996fc96 BS |
1330 | if (!m) |
1331 | m = 1; | |
1332 | nr_pages = 0; | |
db597605 | 1333 | start = ktime_get(); |
f996fc96 | 1334 | |
081a9d04 BS |
1335 | ret = snapshot_write_next(snapshot); |
1336 | if (ret <= 0) | |
f996fc96 BS |
1337 | goto out_finish; |
1338 | ||
081a9d04 BS |
1339 | for(;;) { |
1340 | for (i = 0; !eof && i < want; i++) { | |
343df3c7 | 1341 | ret = swap_read_page(handle, page[ring], &hb); |
081a9d04 BS |
1342 | if (ret) { |
1343 | /* | |
1344 | * On real read error, finish. On end of data, | |
1345 | * set EOF flag and just exit the read loop. | |
1346 | */ | |
1347 | if (handle->cur && | |
1348 | handle->cur->entries[handle->k]) { | |
1349 | goto out_finish; | |
1350 | } else { | |
1351 | eof = 1; | |
1352 | break; | |
1353 | } | |
1354 | } | |
1355 | if (++ring >= ring_size) | |
1356 | ring = 0; | |
f996fc96 | 1357 | } |
081a9d04 BS |
1358 | asked += i; |
1359 | want -= i; | |
f996fc96 | 1360 | |
081a9d04 BS |
1361 | /* |
1362 | * We are out of data, wait for some more. | |
1363 | */ | |
1364 | if (!have) { | |
1365 | if (!asked) | |
1366 | break; | |
1367 | ||
343df3c7 | 1368 | ret = hib_wait_io(&hb); |
081a9d04 | 1369 | if (ret) |
f996fc96 | 1370 | goto out_finish; |
081a9d04 BS |
1371 | have += asked; |
1372 | asked = 0; | |
1373 | if (eof) | |
1374 | eof = 2; | |
9f339caf | 1375 | } |
f996fc96 | 1376 | |
081a9d04 | 1377 | if (crc->run_threads) { |
71cd7e80 | 1378 | wait_event(crc->done, atomic_read_acquire(&crc->stop)); |
081a9d04 BS |
1379 | atomic_set(&crc->stop, 0); |
1380 | crc->run_threads = 0; | |
f996fc96 BS |
1381 | } |
1382 | ||
081a9d04 BS |
1383 | for (thr = 0; have && thr < nr_threads; thr++) { |
1384 | data[thr].cmp_len = *(size_t *)page[pg]; | |
1385 | if (unlikely(!data[thr].cmp_len || | |
1386 | data[thr].cmp_len > | |
a06c6f5d N |
1387 | bytes_worst_compress(UNC_SIZE))) { |
1388 | pr_err("Invalid %s compressed length\n", hib_comp_algo); | |
081a9d04 BS |
1389 | ret = -1; |
1390 | goto out_finish; | |
1391 | } | |
1392 | ||
89a80762 | 1393 | need = DIV_ROUND_UP(data[thr].cmp_len + CMP_HEADER, |
081a9d04 BS |
1394 | PAGE_SIZE); |
1395 | if (need > have) { | |
1396 | if (eof > 1) { | |
1397 | ret = -1; | |
1398 | goto out_finish; | |
1399 | } | |
1400 | break; | |
1401 | } | |
1402 | ||
1403 | for (off = 0; | |
89a80762 | 1404 | off < CMP_HEADER + data[thr].cmp_len; |
081a9d04 BS |
1405 | off += PAGE_SIZE) { |
1406 | memcpy(data[thr].cmp + off, | |
1407 | page[pg], PAGE_SIZE); | |
1408 | have--; | |
1409 | want++; | |
1410 | if (++pg >= ring_size) | |
1411 | pg = 0; | |
1412 | } | |
1413 | ||
71cd7e80 | 1414 | atomic_set_release(&data[thr].ready, 1); |
081a9d04 | 1415 | wake_up(&data[thr].go); |
f996fc96 BS |
1416 | } |
1417 | ||
081a9d04 BS |
1418 | /* |
1419 | * Wait for more data while we are decompressing. | |
1420 | */ | |
89a80762 | 1421 | if (have < CMP_PAGES && asked) { |
343df3c7 | 1422 | ret = hib_wait_io(&hb); |
081a9d04 BS |
1423 | if (ret) |
1424 | goto out_finish; | |
1425 | have += asked; | |
1426 | asked = 0; | |
1427 | if (eof) | |
1428 | eof = 2; | |
f996fc96 BS |
1429 | } |
1430 | ||
081a9d04 BS |
1431 | for (run_threads = thr, thr = 0; thr < run_threads; thr++) { |
1432 | wait_event(data[thr].done, | |
71cd7e80 | 1433 | atomic_read_acquire(&data[thr].stop)); |
081a9d04 BS |
1434 | atomic_set(&data[thr].stop, 0); |
1435 | ||
1436 | ret = data[thr].ret; | |
f996fc96 | 1437 | |
081a9d04 | 1438 | if (ret < 0) { |
a06c6f5d | 1439 | pr_err("%s decompression failed\n", hib_comp_algo); |
081a9d04 BS |
1440 | goto out_finish; |
1441 | } | |
f996fc96 | 1442 | |
081a9d04 | 1443 | if (unlikely(!data[thr].unc_len || |
89a80762 N |
1444 | data[thr].unc_len > UNC_SIZE || |
1445 | data[thr].unc_len & (PAGE_SIZE - 1))) { | |
a06c6f5d | 1446 | pr_err("Invalid %s uncompressed length\n", hib_comp_algo); |
081a9d04 | 1447 | ret = -1; |
f996fc96 | 1448 | goto out_finish; |
081a9d04 BS |
1449 | } |
1450 | ||
1451 | for (off = 0; | |
1452 | off < data[thr].unc_len; off += PAGE_SIZE) { | |
1453 | memcpy(data_of(*snapshot), | |
1454 | data[thr].unc + off, PAGE_SIZE); | |
1455 | ||
1456 | if (!(nr_pages % m)) | |
64ec72a1 JP |
1457 | pr_info("Image loading progress: %3d%%\n", |
1458 | nr_pages / m * 10); | |
081a9d04 BS |
1459 | nr_pages++; |
1460 | ||
1461 | ret = snapshot_write_next(snapshot); | |
1462 | if (ret <= 0) { | |
1463 | crc->run_threads = thr + 1; | |
71cd7e80 | 1464 | atomic_set_release(&crc->ready, 1); |
081a9d04 BS |
1465 | wake_up(&crc->go); |
1466 | goto out_finish; | |
1467 | } | |
1468 | } | |
f996fc96 | 1469 | } |
081a9d04 BS |
1470 | |
1471 | crc->run_threads = thr; | |
71cd7e80 | 1472 | atomic_set_release(&crc->ready, 1); |
081a9d04 | 1473 | wake_up(&crc->go); |
f996fc96 BS |
1474 | } |
1475 | ||
1476 | out_finish: | |
081a9d04 | 1477 | if (crc->run_threads) { |
71cd7e80 | 1478 | wait_event(crc->done, atomic_read_acquire(&crc->stop)); |
081a9d04 BS |
1479 | atomic_set(&crc->stop, 0); |
1480 | } | |
db597605 | 1481 | stop = ktime_get(); |
081a9d04 | 1482 | if (!ret) { |
64ec72a1 | 1483 | pr_info("Image loading done\n"); |
f4311756 CL |
1484 | ret = snapshot_write_finalize(snapshot); |
1485 | if (!ret && !snapshot_image_loaded(snapshot)) | |
081a9d04 BS |
1486 | ret = -ENODATA; |
1487 | if (!ret) { | |
1488 | if (swsusp_header->flags & SF_CRC32_MODE) { | |
1489 | if(handle->crc32 != swsusp_header->crc32) { | |
64ec72a1 | 1490 | pr_err("Invalid image CRC32!\n"); |
081a9d04 BS |
1491 | ret = -ENODATA; |
1492 | } | |
1493 | } | |
1494 | } | |
d8150d35 | 1495 | } |
db597605 | 1496 | swsusp_show_speed(start, stop, nr_to_read, "Read"); |
081a9d04 | 1497 | out_clean: |
55c4478a | 1498 | hib_finish_batch(&hb); |
081a9d04 | 1499 | for (i = 0; i < ring_size; i++) |
9f339caf | 1500 | free_page((unsigned long)page[i]); |
081a9d04 BS |
1501 | if (crc) { |
1502 | if (crc->thr) | |
1503 | kthread_stop(crc->thr); | |
1504 | kfree(crc); | |
1505 | } | |
1506 | if (data) { | |
a06c6f5d | 1507 | for (thr = 0; thr < nr_threads; thr++) { |
081a9d04 BS |
1508 | if (data[thr].thr) |
1509 | kthread_stop(data[thr].thr); | |
a06c6f5d N |
1510 | if (data[thr].cc) |
1511 | crypto_free_comp(data[thr].cc); | |
1512 | } | |
081a9d04 BS |
1513 | vfree(data); |
1514 | } | |
6c45de0d | 1515 | vfree(page); |
f996fc96 | 1516 | |
081a9d04 | 1517 | return ret; |
f996fc96 BS |
1518 | } |
1519 | ||
a634cc10 RW |
1520 | /** |
1521 | * swsusp_read - read the hibernation image. | |
1522 | * @flags_p: flags passed by the "frozen" kernel in the image header should | |
b595076a | 1523 | * be written into this memory location |
a634cc10 RW |
1524 | */ |
1525 | ||
1526 | int swsusp_read(unsigned int *flags_p) | |
61159a31 RW |
1527 | { |
1528 | int error; | |
1529 | struct swap_map_handle handle; | |
1530 | struct snapshot_handle snapshot; | |
1531 | struct swsusp_info *header; | |
1532 | ||
61159a31 | 1533 | memset(&snapshot, 0, sizeof(struct snapshot_handle)); |
d3c1b24c | 1534 | error = snapshot_write_next(&snapshot); |
d5641c64 | 1535 | if (error < (int)PAGE_SIZE) |
61159a31 RW |
1536 | return error < 0 ? error : -EFAULT; |
1537 | header = (struct swsusp_info *)data_of(snapshot); | |
6f612af5 JS |
1538 | error = get_swap_reader(&handle, flags_p); |
1539 | if (error) | |
1540 | goto end; | |
61159a31 | 1541 | if (!error) |
546e0d27 | 1542 | error = swap_read_page(&handle, header, NULL); |
f996fc96 BS |
1543 | if (!error) { |
1544 | error = (*flags_p & SF_NOCOMPRESS_MODE) ? | |
1545 | load_image(&handle, &snapshot, header->pages - 1) : | |
89a80762 | 1546 | load_compressed_image(&handle, &snapshot, header->pages - 1); |
f996fc96 | 1547 | } |
6f612af5 JS |
1548 | swap_reader_finish(&handle); |
1549 | end: | |
61159a31 | 1550 | if (!error) |
64ec72a1 | 1551 | pr_debug("Image successfully loaded\n"); |
61159a31 | 1552 | else |
64ec72a1 | 1553 | pr_debug("Error %d resuming\n", error); |
61159a31 RW |
1554 | return error; |
1555 | } | |
1556 | ||
c889d079 CH |
1557 | static void *swsusp_holder; |
1558 | ||
61159a31 | 1559 | /** |
7bf770f7 | 1560 | * swsusp_check - Open the resume device and check for the swsusp signature. |
40d84e19 | 1561 | * @exclusive: Open the resume device exclusively. |
61159a31 RW |
1562 | */ |
1563 | ||
40d84e19 | 1564 | int swsusp_check(bool exclusive) |
61159a31 | 1565 | { |
40d84e19 | 1566 | void *holder = exclusive ? &swsusp_holder : NULL; |
61159a31 | 1567 | int error; |
5904de0d | 1568 | |
4379f911 | 1569 | hib_resume_bdev_file = bdev_file_open_by_dev(swsusp_resume_device, |
e017d304 | 1570 | BLK_OPEN_READ, holder, NULL); |
4379f911 | 1571 | if (!IS_ERR(hib_resume_bdev_file)) { |
3ecb01df | 1572 | clear_page(swsusp_header); |
568e34ed | 1573 | error = hib_submit_io(REQ_OP_READ, swsusp_resume_block, |
1b29c164 | 1574 | swsusp_header, NULL); |
9a154d9d | 1575 | if (error) |
76b57e61 | 1576 | goto put; |
9a154d9d | 1577 | |
3624eb04 | 1578 | if (!memcmp(HIBERNATE_SIG, swsusp_header->sig, 10)) { |
1b29c164 | 1579 | memcpy(swsusp_header->sig, swsusp_header->orig_sig, 10); |
a06c6f5d | 1580 | swsusp_header_flags = swsusp_header->flags; |
61159a31 | 1581 | /* Reset swap signature now */ |
568e34ed | 1582 | error = hib_submit_io(REQ_OP_WRITE | REQ_SYNC, |
162b99e3 | 1583 | swsusp_resume_block, |
1b29c164 | 1584 | swsusp_header, NULL); |
61159a31 | 1585 | } else { |
76b57e61 | 1586 | error = -EINVAL; |
61159a31 | 1587 | } |
74d95555 DW |
1588 | if (!error && swsusp_header->flags & SF_HW_SIG && |
1589 | swsusp_header->hw_sig != swsusp_hardware_signature) { | |
1590 | pr_info("Suspend image hardware signature mismatch (%08x now %08x); aborting resume.\n", | |
1591 | swsusp_header->hw_sig, swsusp_hardware_signature); | |
1592 | error = -EINVAL; | |
1593 | } | |
76b57e61 JS |
1594 | |
1595 | put: | |
61159a31 | 1596 | if (error) |
712182b6 | 1597 | bdev_fput(hib_resume_bdev_file); |
61159a31 | 1598 | else |
64ec72a1 | 1599 | pr_debug("Image signature found, resuming\n"); |
61159a31 | 1600 | } else { |
4379f911 | 1601 | error = PTR_ERR(hib_resume_bdev_file); |
61159a31 RW |
1602 | } |
1603 | ||
1604 | if (error) | |
64ec72a1 | 1605 | pr_debug("Image not found (code %d)\n", error); |
61159a31 RW |
1606 | |
1607 | return error; | |
1608 | } | |
1609 | ||
1610 | /** | |
7bf770f7 | 1611 | * swsusp_close - close resume device. |
61159a31 RW |
1612 | */ |
1613 | ||
93745df1 | 1614 | void swsusp_close(void) |
61159a31 | 1615 | { |
4379f911 | 1616 | if (IS_ERR(hib_resume_bdev_file)) { |
64ec72a1 | 1617 | pr_debug("Image device not initialised\n"); |
61159a31 RW |
1618 | return; |
1619 | } | |
1620 | ||
4379f911 | 1621 | fput(hib_resume_bdev_file); |
61159a31 | 1622 | } |
1b29c164 | 1623 | |
62c552cc BS |
1624 | /** |
1625 | * swsusp_unmark - Unmark swsusp signature in the resume device | |
1626 | */ | |
1627 | ||
1628 | #ifdef CONFIG_SUSPEND | |
1629 | int swsusp_unmark(void) | |
1630 | { | |
1631 | int error; | |
1632 | ||
568e34ed BVA |
1633 | hib_submit_io(REQ_OP_READ, swsusp_resume_block, |
1634 | swsusp_header, NULL); | |
62c552cc BS |
1635 | if (!memcmp(HIBERNATE_SIG,swsusp_header->sig, 10)) { |
1636 | memcpy(swsusp_header->sig,swsusp_header->orig_sig, 10); | |
568e34ed | 1637 | error = hib_submit_io(REQ_OP_WRITE | REQ_SYNC, |
162b99e3 | 1638 | swsusp_resume_block, |
62c552cc BS |
1639 | swsusp_header, NULL); |
1640 | } else { | |
64ec72a1 | 1641 | pr_err("Cannot find swsusp signature!\n"); |
62c552cc BS |
1642 | error = -ENODEV; |
1643 | } | |
1644 | ||
1645 | /* | |
1646 | * We just returned from suspend, we don't need the image any more. | |
1647 | */ | |
1648 | free_all_swap_pages(root_swap); | |
1649 | ||
1650 | return error; | |
1651 | } | |
1652 | #endif | |
1653 | ||
afd8d7c7 | 1654 | static int __init swsusp_header_init(void) |
1b29c164 VG |
1655 | { |
1656 | swsusp_header = (struct swsusp_header*) __get_free_page(GFP_KERNEL); | |
1657 | if (!swsusp_header) | |
1658 | panic("Could not allocate memory for swsusp_header\n"); | |
1659 | return 0; | |
1660 | } | |
1661 | ||
1662 | core_initcall(swsusp_header_init); |