108687aecSSergio Luis /* 208687aecSSergio Luis * Suspend support specific for i386/x86-64. 308687aecSSergio Luis * 408687aecSSergio Luis * Distribute under GPLv2 508687aecSSergio Luis * 608687aecSSergio Luis * Copyright (c) 2007 Rafael J. Wysocki <rjw@sisk.pl> 7a2531293SPavel Machek * Copyright (c) 2002 Pavel Machek <pavel@ucw.cz> 808687aecSSergio Luis * Copyright (c) 2001 Patrick Mochel <mochel@osdl.org> 908687aecSSergio Luis */ 1008687aecSSergio Luis 1108687aecSSergio Luis #include <linux/suspend.h> 1269c60c88SPaul Gortmaker #include <linux/export.h> 1308687aecSSergio Luis #include <linux/smp.h> 141d9d8639SStephane Eranian #include <linux/perf_event.h> 15406f992eSRafael J. Wysocki #include <linux/tboot.h> 1608687aecSSergio Luis 1708687aecSSergio Luis #include <asm/pgtable.h> 1808687aecSSergio Luis #include <asm/proto.h> 1908687aecSSergio Luis #include <asm/mtrr.h> 2008687aecSSergio Luis #include <asm/page.h> 2108687aecSSergio Luis #include <asm/mce.h> 2208687aecSSergio Luis #include <asm/suspend.h> 23952f07ecSIngo Molnar #include <asm/fpu/internal.h> 24eadb8a09SIngo Molnar #include <asm/debugreg.h> 25a71c8bc5SFenghua Yu #include <asm/cpu.h> 2637868fe1SAndy Lutomirski #include <asm/mmu_context.h> 277a9c2dd0SChen Yu #include <linux/dmi.h> 2808687aecSSergio Luis 2908687aecSSergio Luis #ifdef CONFIG_X86_32 30d6efc2f7SAndi Kleen __visible unsigned long saved_context_ebx; 31d6efc2f7SAndi Kleen __visible unsigned long saved_context_esp, saved_context_ebp; 32d6efc2f7SAndi Kleen __visible unsigned long saved_context_esi, saved_context_edi; 33d6efc2f7SAndi Kleen __visible unsigned long saved_context_eflags; 3408687aecSSergio Luis #endif 35cc456c4eSKonrad Rzeszutek Wilk struct saved_context saved_context; 3608687aecSSergio Luis 377a9c2dd0SChen Yu static void msr_save_context(struct saved_context *ctxt) 387a9c2dd0SChen Yu { 397a9c2dd0SChen Yu struct saved_msr *msr = ctxt->saved_msrs.array; 407a9c2dd0SChen Yu struct saved_msr *end = msr + ctxt->saved_msrs.num; 417a9c2dd0SChen Yu 427a9c2dd0SChen Yu while (msr < end) { 437a9c2dd0SChen Yu msr->valid = !rdmsrl_safe(msr->info.msr_no, &msr->info.reg.q); 447a9c2dd0SChen Yu msr++; 457a9c2dd0SChen Yu } 467a9c2dd0SChen Yu } 477a9c2dd0SChen Yu 487a9c2dd0SChen Yu static void msr_restore_context(struct saved_context *ctxt) 497a9c2dd0SChen Yu { 507a9c2dd0SChen Yu struct saved_msr *msr = ctxt->saved_msrs.array; 517a9c2dd0SChen Yu struct saved_msr *end = msr + ctxt->saved_msrs.num; 527a9c2dd0SChen Yu 537a9c2dd0SChen Yu while (msr < end) { 547a9c2dd0SChen Yu if (msr->valid) 557a9c2dd0SChen Yu wrmsrl(msr->info.msr_no, msr->info.reg.q); 567a9c2dd0SChen Yu msr++; 577a9c2dd0SChen Yu } 587a9c2dd0SChen Yu } 597a9c2dd0SChen Yu 6008687aecSSergio Luis /** 6108687aecSSergio Luis * __save_processor_state - save CPU registers before creating a 6208687aecSSergio Luis * hibernation image and before restoring the memory state from it 6308687aecSSergio Luis * @ctxt - structure to store the registers contents in 6408687aecSSergio Luis * 6508687aecSSergio Luis * NOTE: If there is a CPU register the modification of which by the 6608687aecSSergio Luis * boot kernel (ie. the kernel used for loading the hibernation image) 6708687aecSSergio Luis * might affect the operations of the restored target kernel (ie. the one 6808687aecSSergio Luis * saved in the hibernation image), then its contents must be saved by this 6908687aecSSergio Luis * function. In other words, if kernel A is hibernated and different 7008687aecSSergio Luis * kernel B is used for loading the hibernation image into memory, the 7108687aecSSergio Luis * kernel A's __save_processor_state() function must save all registers 7208687aecSSergio Luis * needed by kernel A, so that it can operate correctly after the resume 7308687aecSSergio Luis * regardless of what kernel B does in the meantime. 7408687aecSSergio Luis */ 7508687aecSSergio Luis static void __save_processor_state(struct saved_context *ctxt) 7608687aecSSergio Luis { 7708687aecSSergio Luis #ifdef CONFIG_X86_32 7808687aecSSergio Luis mtrr_save_fixed_ranges(NULL); 7908687aecSSergio Luis #endif 8008687aecSSergio Luis kernel_fpu_begin(); 8108687aecSSergio Luis 8208687aecSSergio Luis /* 8308687aecSSergio Luis * descriptor tables 8408687aecSSergio Luis */ 8508687aecSSergio Luis store_idt(&ctxt->idt); 86090edbe2SAndy Lutomirski 87cc456c4eSKonrad Rzeszutek Wilk /* 88cc456c4eSKonrad Rzeszutek Wilk * We save it here, but restore it only in the hibernate case. 89cc456c4eSKonrad Rzeszutek Wilk * For ACPI S3 resume, this is loaded via 'early_gdt_desc' in 64-bit 90cc456c4eSKonrad Rzeszutek Wilk * mode in "secondary_startup_64". In 32-bit mode it is done via 91cc456c4eSKonrad Rzeszutek Wilk * 'pmode_gdt' in wakeup_start. 92cc456c4eSKonrad Rzeszutek Wilk */ 93cc456c4eSKonrad Rzeszutek Wilk ctxt->gdt_desc.size = GDT_SIZE - 1; 9469218e47SThomas Garnier ctxt->gdt_desc.address = (unsigned long)get_cpu_gdt_rw(smp_processor_id()); 95cc456c4eSKonrad Rzeszutek Wilk 9608687aecSSergio Luis store_tr(ctxt->tr); 9708687aecSSergio Luis 9808687aecSSergio Luis /* XMM0..XMM15 should be handled by kernel_fpu_begin(). */ 9908687aecSSergio Luis /* 10008687aecSSergio Luis * segment registers 10108687aecSSergio Luis */ 1027ee18d67SAndy Lutomirski #ifdef CONFIG_X86_32_LAZY_GS 10308687aecSSergio Luis savesegment(gs, ctxt->gs); 1047ee18d67SAndy Lutomirski #endif 1057ee18d67SAndy Lutomirski #ifdef CONFIG_X86_64 1067ee18d67SAndy Lutomirski savesegment(gs, ctxt->gs); 1077ee18d67SAndy Lutomirski savesegment(fs, ctxt->fs); 1087ee18d67SAndy Lutomirski savesegment(ds, ctxt->ds); 1097ee18d67SAndy Lutomirski savesegment(es, ctxt->es); 11008687aecSSergio Luis 11108687aecSSergio Luis rdmsrl(MSR_FS_BASE, ctxt->fs_base); 1127ee18d67SAndy Lutomirski rdmsrl(MSR_GS_BASE, ctxt->kernelmode_gs_base); 1137ee18d67SAndy Lutomirski rdmsrl(MSR_KERNEL_GS_BASE, ctxt->usermode_gs_base); 11408687aecSSergio Luis mtrr_save_fixed_ranges(NULL); 11508687aecSSergio Luis 11608687aecSSergio Luis rdmsrl(MSR_EFER, ctxt->efer); 11708687aecSSergio Luis #endif 11808687aecSSergio Luis 11908687aecSSergio Luis /* 12008687aecSSergio Luis * control registers 12108687aecSSergio Luis */ 12208687aecSSergio Luis ctxt->cr0 = read_cr0(); 12308687aecSSergio Luis ctxt->cr2 = read_cr2(); 1246c690ee1SAndy Lutomirski ctxt->cr3 = __read_cr3(); 1251ef55be1SAndy Lutomirski ctxt->cr4 = __read_cr4(); 1261e02ce4cSAndy Lutomirski #ifdef CONFIG_X86_64 12708687aecSSergio Luis ctxt->cr8 = read_cr8(); 12808687aecSSergio Luis #endif 12985a0e753SOndrej Zary ctxt->misc_enable_saved = !rdmsrl_safe(MSR_IA32_MISC_ENABLE, 13085a0e753SOndrej Zary &ctxt->misc_enable); 1317a9c2dd0SChen Yu msr_save_context(ctxt); 13208687aecSSergio Luis } 13308687aecSSergio Luis 13408687aecSSergio Luis /* Needed by apm.c */ 13508687aecSSergio Luis void save_processor_state(void) 13608687aecSSergio Luis { 13708687aecSSergio Luis __save_processor_state(&saved_context); 138b74f05d6SMarcelo Tosatti x86_platform.save_sched_clock_state(); 13908687aecSSergio Luis } 14008687aecSSergio Luis #ifdef CONFIG_X86_32 14108687aecSSergio Luis EXPORT_SYMBOL(save_processor_state); 14208687aecSSergio Luis #endif 14308687aecSSergio Luis 14408687aecSSergio Luis static void do_fpu_end(void) 14508687aecSSergio Luis { 14608687aecSSergio Luis /* 14708687aecSSergio Luis * Restore FPU regs if necessary. 14808687aecSSergio Luis */ 14908687aecSSergio Luis kernel_fpu_end(); 15008687aecSSergio Luis } 15108687aecSSergio Luis 15208687aecSSergio Luis static void fix_processor_context(void) 15308687aecSSergio Luis { 15408687aecSSergio Luis int cpu = smp_processor_id(); 1554d681be3Skonrad@kernel.org #ifdef CONFIG_X86_64 15669218e47SThomas Garnier struct desc_struct *desc = get_cpu_gdt_rw(cpu); 1574d681be3Skonrad@kernel.org tss_desc tss; 1584d681be3Skonrad@kernel.org #endif 1597fb983b4SAndy Lutomirski 1607fb983b4SAndy Lutomirski /* 16172f5e08dSAndy Lutomirski * We need to reload TR, which requires that we change the 16272f5e08dSAndy Lutomirski * GDT entry to indicate "available" first. 16372f5e08dSAndy Lutomirski * 16472f5e08dSAndy Lutomirski * XXX: This could probably all be replaced by a call to 16572f5e08dSAndy Lutomirski * force_reload_TR(). 16608687aecSSergio Luis */ 16772f5e08dSAndy Lutomirski set_tss_desc(cpu, &get_cpu_entry_area(cpu)->tss.x86_tss); 16808687aecSSergio Luis 16908687aecSSergio Luis #ifdef CONFIG_X86_64 1704d681be3Skonrad@kernel.org memcpy(&tss, &desc[GDT_ENTRY_TSS], sizeof(tss_desc)); 1714d681be3Skonrad@kernel.org tss.type = 0x9; /* The available 64-bit TSS (see AMD vol 2, pg 91 */ 1724d681be3Skonrad@kernel.org write_gdt_entry(desc, GDT_ENTRY_TSS, &tss, DESC_TSS); 17308687aecSSergio Luis 17408687aecSSergio Luis syscall_init(); /* This sets MSR_*STAR and related */ 175896c80beSAndy Lutomirski #else 176896c80beSAndy Lutomirski if (boot_cpu_has(X86_FEATURE_SEP)) 177896c80beSAndy Lutomirski enable_sep_cpu(); 17808687aecSSergio Luis #endif 17908687aecSSergio Luis load_TR_desc(); /* This does ltr */ 18037868fe1SAndy Lutomirski load_mm_ldt(current->active_mm); /* This does lldt */ 18172c0098dSAndy Lutomirski initialize_tlbstate_and_flush(); 1829254aaa0SIngo Molnar 1839254aaa0SIngo Molnar fpu__resume_cpu(); 18469218e47SThomas Garnier 18569218e47SThomas Garnier /* The processor is back on the direct GDT, load back the fixmap */ 18669218e47SThomas Garnier load_fixmap_gdt(cpu); 18708687aecSSergio Luis } 18808687aecSSergio Luis 18908687aecSSergio Luis /** 19008687aecSSergio Luis * __restore_processor_state - restore the contents of CPU registers saved 19108687aecSSergio Luis * by __save_processor_state() 19208687aecSSergio Luis * @ctxt - structure to load the registers contents from 1937ee18d67SAndy Lutomirski * 1947ee18d67SAndy Lutomirski * The asm code that gets us here will have restored a usable GDT, although 1957ee18d67SAndy Lutomirski * it will be pointing to the wrong alias. 19608687aecSSergio Luis */ 197b8f99b3eSSteven Rostedt (Red Hat) static void notrace __restore_processor_state(struct saved_context *ctxt) 19808687aecSSergio Luis { 19985a0e753SOndrej Zary if (ctxt->misc_enable_saved) 20085a0e753SOndrej Zary wrmsrl(MSR_IA32_MISC_ENABLE, ctxt->misc_enable); 20108687aecSSergio Luis /* 20208687aecSSergio Luis * control registers 20308687aecSSergio Luis */ 20408687aecSSergio Luis /* cr4 was introduced in the Pentium CPU */ 20508687aecSSergio Luis #ifdef CONFIG_X86_32 20608687aecSSergio Luis if (ctxt->cr4) 2071e02ce4cSAndy Lutomirski __write_cr4(ctxt->cr4); 20808687aecSSergio Luis #else 20908687aecSSergio Luis /* CONFIG X86_64 */ 21008687aecSSergio Luis wrmsrl(MSR_EFER, ctxt->efer); 21108687aecSSergio Luis write_cr8(ctxt->cr8); 2121e02ce4cSAndy Lutomirski __write_cr4(ctxt->cr4); 21308687aecSSergio Luis #endif 21408687aecSSergio Luis write_cr3(ctxt->cr3); 21508687aecSSergio Luis write_cr2(ctxt->cr2); 21608687aecSSergio Luis write_cr0(ctxt->cr0); 21708687aecSSergio Luis 2187ee18d67SAndy Lutomirski /* Restore the IDT. */ 21908687aecSSergio Luis load_idt(&ctxt->idt); 22008687aecSSergio Luis 22108687aecSSergio Luis /* 2227ee18d67SAndy Lutomirski * Just in case the asm code got us here with the SS, DS, or ES 2237ee18d67SAndy Lutomirski * out of sync with the GDT, update them. 2245b06bbcfSAndy Lutomirski */ 2257ee18d67SAndy Lutomirski loadsegment(ss, __KERNEL_DS); 2267ee18d67SAndy Lutomirski loadsegment(ds, __USER_DS); 2277ee18d67SAndy Lutomirski loadsegment(es, __USER_DS); 2287ee18d67SAndy Lutomirski 2297ee18d67SAndy Lutomirski /* 2307ee18d67SAndy Lutomirski * Restore percpu access. Percpu access can happen in exception 2317ee18d67SAndy Lutomirski * handlers or in complicated helpers like load_gs_index(). 2327ee18d67SAndy Lutomirski */ 2337ee18d67SAndy Lutomirski #ifdef CONFIG_X86_64 2347ee18d67SAndy Lutomirski wrmsrl(MSR_GS_BASE, ctxt->kernelmode_gs_base); 2357ee18d67SAndy Lutomirski #else 2367ee18d67SAndy Lutomirski loadsegment(fs, __KERNEL_PERCPU); 2377ee18d67SAndy Lutomirski loadsegment(gs, __KERNEL_STACK_CANARY); 2385b06bbcfSAndy Lutomirski #endif 2395b06bbcfSAndy Lutomirski 2407ee18d67SAndy Lutomirski /* Restore the TSS, RO GDT, LDT, and usermode-relevant MSRs. */ 2415b06bbcfSAndy Lutomirski fix_processor_context(); 2425b06bbcfSAndy Lutomirski 2435b06bbcfSAndy Lutomirski /* 2447ee18d67SAndy Lutomirski * Now that we have descriptor tables fully restored and working 2457ee18d67SAndy Lutomirski * exception handling, restore the usermode segments. 24608687aecSSergio Luis */ 2477ee18d67SAndy Lutomirski #ifdef CONFIG_X86_64 2487ee18d67SAndy Lutomirski loadsegment(ds, ctxt->es); 24908687aecSSergio Luis loadsegment(es, ctxt->es); 25008687aecSSergio Luis loadsegment(fs, ctxt->fs); 25108687aecSSergio Luis load_gs_index(ctxt->gs); 25208687aecSSergio Luis 2535b06bbcfSAndy Lutomirski /* 2547ee18d67SAndy Lutomirski * Restore FSBASE and GSBASE after restoring the selectors, since 2557ee18d67SAndy Lutomirski * restoring the selectors clobbers the bases. Keep in mind 2567ee18d67SAndy Lutomirski * that MSR_KERNEL_GS_BASE is horribly misnamed. 2575b06bbcfSAndy Lutomirski */ 25808687aecSSergio Luis wrmsrl(MSR_FS_BASE, ctxt->fs_base); 2597ee18d67SAndy Lutomirski wrmsrl(MSR_KERNEL_GS_BASE, ctxt->usermode_gs_base); 2607ee18d67SAndy Lutomirski #elif defined(CONFIG_X86_32_LAZY_GS) 2617ee18d67SAndy Lutomirski loadsegment(gs, ctxt->gs); 26208687aecSSergio Luis #endif 26308687aecSSergio Luis 26408687aecSSergio Luis do_fpu_end(); 2656a369583SThomas Gleixner tsc_verify_tsc_adjust(true); 266dba69d10SMarcelo Tosatti x86_platform.restore_sched_clock_state(); 267d0af9eedSSuresh Siddha mtrr_bp_restore(); 2681d9d8639SStephane Eranian perf_restore_debug_store(); 2697a9c2dd0SChen Yu msr_restore_context(ctxt); 27008687aecSSergio Luis } 27108687aecSSergio Luis 27208687aecSSergio Luis /* Needed by apm.c */ 273b8f99b3eSSteven Rostedt (Red Hat) void notrace restore_processor_state(void) 27408687aecSSergio Luis { 27508687aecSSergio Luis __restore_processor_state(&saved_context); 27608687aecSSergio Luis } 27708687aecSSergio Luis #ifdef CONFIG_X86_32 27808687aecSSergio Luis EXPORT_SYMBOL(restore_processor_state); 27908687aecSSergio Luis #endif 280209efae1SFenghua Yu 281406f992eSRafael J. Wysocki #if defined(CONFIG_HIBERNATION) && defined(CONFIG_HOTPLUG_CPU) 282406f992eSRafael J. Wysocki static void resume_play_dead(void) 283406f992eSRafael J. Wysocki { 284406f992eSRafael J. Wysocki play_dead_common(); 285406f992eSRafael J. Wysocki tboot_shutdown(TB_SHUTDOWN_WFS); 286406f992eSRafael J. Wysocki hlt_play_dead(); 287406f992eSRafael J. Wysocki } 288406f992eSRafael J. Wysocki 289406f992eSRafael J. Wysocki int hibernate_resume_nonboot_cpu_disable(void) 290406f992eSRafael J. Wysocki { 291406f992eSRafael J. Wysocki void (*play_dead)(void) = smp_ops.play_dead; 292406f992eSRafael J. Wysocki int ret; 293406f992eSRafael J. Wysocki 294406f992eSRafael J. Wysocki /* 295406f992eSRafael J. Wysocki * Ensure that MONITOR/MWAIT will not be used in the "play dead" loop 296406f992eSRafael J. Wysocki * during hibernate image restoration, because it is likely that the 297406f992eSRafael J. Wysocki * monitored address will be actually written to at that time and then 298406f992eSRafael J. Wysocki * the "dead" CPU will attempt to execute instructions again, but the 299406f992eSRafael J. Wysocki * address in its instruction pointer may not be possible to resolve 300406f992eSRafael J. Wysocki * any more at that point (the page tables used by it previously may 301406f992eSRafael J. Wysocki * have been overwritten by hibernate image data). 302*ec527c31SJiri Kosina * 303*ec527c31SJiri Kosina * First, make sure that we wake up all the potentially disabled SMT 304*ec527c31SJiri Kosina * threads which have been initially brought up and then put into 305*ec527c31SJiri Kosina * mwait/cpuidle sleep. 306*ec527c31SJiri Kosina * Those will be put to proper (not interfering with hibernation 307*ec527c31SJiri Kosina * resume) sleep afterwards, and the resumed kernel will decide itself 308*ec527c31SJiri Kosina * what to do with them. 309406f992eSRafael J. Wysocki */ 310*ec527c31SJiri Kosina ret = cpuhp_smt_enable(); 311*ec527c31SJiri Kosina if (ret) 312*ec527c31SJiri Kosina return ret; 313406f992eSRafael J. Wysocki smp_ops.play_dead = resume_play_dead; 314406f992eSRafael J. Wysocki ret = disable_nonboot_cpus(); 315406f992eSRafael J. Wysocki smp_ops.play_dead = play_dead; 316406f992eSRafael J. Wysocki return ret; 317406f992eSRafael J. Wysocki } 318406f992eSRafael J. Wysocki #endif 319406f992eSRafael J. Wysocki 320209efae1SFenghua Yu /* 321209efae1SFenghua Yu * When bsp_check() is called in hibernate and suspend, cpu hotplug 322209efae1SFenghua Yu * is disabled already. So it's unnessary to handle race condition between 323209efae1SFenghua Yu * cpumask query and cpu hotplug. 324209efae1SFenghua Yu */ 325209efae1SFenghua Yu static int bsp_check(void) 326209efae1SFenghua Yu { 327209efae1SFenghua Yu if (cpumask_first(cpu_online_mask) != 0) { 328209efae1SFenghua Yu pr_warn("CPU0 is offline.\n"); 329209efae1SFenghua Yu return -ENODEV; 330209efae1SFenghua Yu } 331209efae1SFenghua Yu 332209efae1SFenghua Yu return 0; 333209efae1SFenghua Yu } 334209efae1SFenghua Yu 335209efae1SFenghua Yu static int bsp_pm_callback(struct notifier_block *nb, unsigned long action, 336209efae1SFenghua Yu void *ptr) 337209efae1SFenghua Yu { 338209efae1SFenghua Yu int ret = 0; 339209efae1SFenghua Yu 340209efae1SFenghua Yu switch (action) { 341209efae1SFenghua Yu case PM_SUSPEND_PREPARE: 342209efae1SFenghua Yu case PM_HIBERNATION_PREPARE: 343209efae1SFenghua Yu ret = bsp_check(); 344209efae1SFenghua Yu break; 345a71c8bc5SFenghua Yu #ifdef CONFIG_DEBUG_HOTPLUG_CPU0 346a71c8bc5SFenghua Yu case PM_RESTORE_PREPARE: 347a71c8bc5SFenghua Yu /* 348a71c8bc5SFenghua Yu * When system resumes from hibernation, online CPU0 because 349a71c8bc5SFenghua Yu * 1. it's required for resume and 350a71c8bc5SFenghua Yu * 2. the CPU was online before hibernation 351a71c8bc5SFenghua Yu */ 352a71c8bc5SFenghua Yu if (!cpu_online(0)) 353a71c8bc5SFenghua Yu _debug_hotplug_cpu(0, 1); 354a71c8bc5SFenghua Yu break; 355a71c8bc5SFenghua Yu case PM_POST_RESTORE: 356a71c8bc5SFenghua Yu /* 357a71c8bc5SFenghua Yu * When a resume really happens, this code won't be called. 358a71c8bc5SFenghua Yu * 359a71c8bc5SFenghua Yu * This code is called only when user space hibernation software 360a71c8bc5SFenghua Yu * prepares for snapshot device during boot time. So we just 361a71c8bc5SFenghua Yu * call _debug_hotplug_cpu() to restore to CPU0's state prior to 362a71c8bc5SFenghua Yu * preparing the snapshot device. 363a71c8bc5SFenghua Yu * 364a71c8bc5SFenghua Yu * This works for normal boot case in our CPU0 hotplug debug 365a71c8bc5SFenghua Yu * mode, i.e. CPU0 is offline and user mode hibernation 366a71c8bc5SFenghua Yu * software initializes during boot time. 367a71c8bc5SFenghua Yu * 368a71c8bc5SFenghua Yu * If CPU0 is online and user application accesses snapshot 369a71c8bc5SFenghua Yu * device after boot time, this will offline CPU0 and user may 370a71c8bc5SFenghua Yu * see different CPU0 state before and after accessing 371a71c8bc5SFenghua Yu * the snapshot device. But hopefully this is not a case when 372a71c8bc5SFenghua Yu * user debugging CPU0 hotplug. Even if users hit this case, 373a71c8bc5SFenghua Yu * they can easily online CPU0 back. 374a71c8bc5SFenghua Yu * 375a71c8bc5SFenghua Yu * To simplify this debug code, we only consider normal boot 376a71c8bc5SFenghua Yu * case. Otherwise we need to remember CPU0's state and restore 377a71c8bc5SFenghua Yu * to that state and resolve racy conditions etc. 378a71c8bc5SFenghua Yu */ 379a71c8bc5SFenghua Yu _debug_hotplug_cpu(0, 0); 380a71c8bc5SFenghua Yu break; 381a71c8bc5SFenghua Yu #endif 382209efae1SFenghua Yu default: 383209efae1SFenghua Yu break; 384209efae1SFenghua Yu } 385209efae1SFenghua Yu return notifier_from_errno(ret); 386209efae1SFenghua Yu } 387209efae1SFenghua Yu 388209efae1SFenghua Yu static int __init bsp_pm_check_init(void) 389209efae1SFenghua Yu { 390209efae1SFenghua Yu /* 391209efae1SFenghua Yu * Set this bsp_pm_callback as lower priority than 392209efae1SFenghua Yu * cpu_hotplug_pm_callback. So cpu_hotplug_pm_callback will be called 393209efae1SFenghua Yu * earlier to disable cpu hotplug before bsp online check. 394209efae1SFenghua Yu */ 395209efae1SFenghua Yu pm_notifier(bsp_pm_callback, -INT_MAX); 396209efae1SFenghua Yu return 0; 397209efae1SFenghua Yu } 398209efae1SFenghua Yu 399209efae1SFenghua Yu core_initcall(bsp_pm_check_init); 4007a9c2dd0SChen Yu 4017a9c2dd0SChen Yu static int msr_init_context(const u32 *msr_id, const int total_num) 4027a9c2dd0SChen Yu { 4037a9c2dd0SChen Yu int i = 0; 4047a9c2dd0SChen Yu struct saved_msr *msr_array; 4057a9c2dd0SChen Yu 4067a9c2dd0SChen Yu if (saved_context.saved_msrs.array || saved_context.saved_msrs.num > 0) { 4077a9c2dd0SChen Yu pr_err("x86/pm: MSR quirk already applied, please check your DMI match table.\n"); 4087a9c2dd0SChen Yu return -EINVAL; 4097a9c2dd0SChen Yu } 4107a9c2dd0SChen Yu 4117a9c2dd0SChen Yu msr_array = kmalloc_array(total_num, sizeof(struct saved_msr), GFP_KERNEL); 4127a9c2dd0SChen Yu if (!msr_array) { 4137a9c2dd0SChen Yu pr_err("x86/pm: Can not allocate memory to save/restore MSRs during suspend.\n"); 4147a9c2dd0SChen Yu return -ENOMEM; 4157a9c2dd0SChen Yu } 4167a9c2dd0SChen Yu 4177a9c2dd0SChen Yu for (i = 0; i < total_num; i++) { 4187a9c2dd0SChen Yu msr_array[i].info.msr_no = msr_id[i]; 4197a9c2dd0SChen Yu msr_array[i].valid = false; 4207a9c2dd0SChen Yu msr_array[i].info.reg.q = 0; 4217a9c2dd0SChen Yu } 4227a9c2dd0SChen Yu saved_context.saved_msrs.num = total_num; 4237a9c2dd0SChen Yu saved_context.saved_msrs.array = msr_array; 4247a9c2dd0SChen Yu 4257a9c2dd0SChen Yu return 0; 4267a9c2dd0SChen Yu } 4277a9c2dd0SChen Yu 4287a9c2dd0SChen Yu /* 4297a9c2dd0SChen Yu * The following section is a quirk framework for problematic BIOSen: 4307a9c2dd0SChen Yu * Sometimes MSRs are modified by the BIOSen after suspended to 4317a9c2dd0SChen Yu * RAM, this might cause unexpected behavior after wakeup. 4327a9c2dd0SChen Yu * Thus we save/restore these specified MSRs across suspend/resume 4337a9c2dd0SChen Yu * in order to work around it. 4347a9c2dd0SChen Yu * 4357a9c2dd0SChen Yu * For any further problematic BIOSen/platforms, 4367a9c2dd0SChen Yu * please add your own function similar to msr_initialize_bdw. 4377a9c2dd0SChen Yu */ 4387a9c2dd0SChen Yu static int msr_initialize_bdw(const struct dmi_system_id *d) 4397a9c2dd0SChen Yu { 4407a9c2dd0SChen Yu /* Add any extra MSR ids into this array. */ 4417a9c2dd0SChen Yu u32 bdw_msr_id[] = { MSR_IA32_THERM_CONTROL }; 4427a9c2dd0SChen Yu 4437a9c2dd0SChen Yu pr_info("x86/pm: %s detected, MSR saving is needed during suspending.\n", d->ident); 4447a9c2dd0SChen Yu return msr_init_context(bdw_msr_id, ARRAY_SIZE(bdw_msr_id)); 4457a9c2dd0SChen Yu } 4467a9c2dd0SChen Yu 4476faadbbbSChristoph Hellwig static const struct dmi_system_id msr_save_dmi_table[] = { 4487a9c2dd0SChen Yu { 4497a9c2dd0SChen Yu .callback = msr_initialize_bdw, 4507a9c2dd0SChen Yu .ident = "BROADWELL BDX_EP", 4517a9c2dd0SChen Yu .matches = { 4527a9c2dd0SChen Yu DMI_MATCH(DMI_PRODUCT_NAME, "GRANTLEY"), 4537a9c2dd0SChen Yu DMI_MATCH(DMI_PRODUCT_VERSION, "E63448-400"), 4547a9c2dd0SChen Yu }, 4557a9c2dd0SChen Yu }, 4567a9c2dd0SChen Yu {} 4577a9c2dd0SChen Yu }; 4587a9c2dd0SChen Yu 4597a9c2dd0SChen Yu static int pm_check_save_msr(void) 4607a9c2dd0SChen Yu { 4617a9c2dd0SChen Yu dmi_check_system(msr_save_dmi_table); 4627a9c2dd0SChen Yu return 0; 4637a9c2dd0SChen Yu } 4647a9c2dd0SChen Yu 4657a9c2dd0SChen Yu device_initcall(pm_check_save_msr); 466