Chameleon

Chameleon Svn Source Tree

Root/branches/ErmaC/Enoch/i386/boot2/resume.c

1/*
2 * resume.c
3 *
4 *
5 * Created by mackerintel on 1/22/09.
6 * Copyright 2009 mackerintel. All rights reserved.
7 *
8 */
9
10#include "saio_internal.h"
11#include "libsa.h"
12#include "IOHibernatePrivate.h"
13#include "memory.h"
14#include "bootstruct.h"
15#include "boot.h"
16#include "pci.h"
17
18extern int previewTotalSectors;
19extern int previewLoadedSectors;
20extern uint8_t *previewSaveunder;
21
22static unsigned long
23getmemorylimit(void)
24{
25int line;
26int i;
27MemoryRange *mp = bootInfo->memoryMap;
28
29// Activate and clear page 1
30line = 1;
31for (i = 0; i < bootInfo->memoryMapCount; i++) {
32if((mp->type == 1) && ((unsigned long)mp->base == 0x100000)) {
33return (unsigned long)(mp->base + mp->length);
34}
35mp++;
36}
37return 0x10000000;
38}
39
40static void WakeKernel(IOHibernateImageHeader * header)
41{
42uint32_t proc;
43unsigned long cnt, newSP;
44unsigned long *src, *dst;
45unsigned int count;
46unsigned int page;
47unsigned int compressedSize;
48int32_t byteCnt;
49u_int32_t lowHalf, highHalf;
50u_int32_t sum;
51
52printf("\nWake Kernel!\n");
53
54dst = (unsigned long *) (header->restore1CodePage << 12);
55count = header->restore1PageCount;
56proc = (header->restore1CodeOffset + ((uint32_t) dst));
57newSP = header->restore1StackOffset + (header->restore1CodePage << 12);
58
59src = (unsigned long *) (((u_int32_t) &header->fileExtentMap[0])
60 + header->fileExtentMapSize);
61sum = 0;
62
63for (page = 0; page < count; page++)
64{
65compressedSize = 4096;
66
67lowHalf = 1;
68highHalf = 0;
69
70for (cnt = 0; cnt < compressedSize; cnt += 0x20) {
71dst[0] = src[0];
72dst[1] = src[1];
73dst[2] = src[2];
74dst[3] = src[3];
75dst[4] = src[4];
76dst[5] = src[5];
77dst[6] = src[6];
78dst[7] = src[7];
79for (byteCnt = 0; byteCnt < 0x20; byteCnt++) {
80lowHalf += ((u_int8_t *) dst)[byteCnt];
81highHalf += lowHalf;
82}
83src += 8;
84dst += 8;
85}
86
87lowHalf %= 65521L;
88highHalf %= 65521L;
89sum += (highHalf << 16) | lowHalf;
90}
91header->actualRestore1Sum = sum;
92startprog (proc, header);
93
94return;
95}
96
97void HibernateBoot(char *image_filename)
98{
99long long size, imageSize, codeSize, allocSize;
100long mem_base;
101IOHibernateImageHeader _header;
102IOHibernateImageHeader * header = &_header;
103long buffer;
104
105size = ReadFileAtOffset (image_filename, header, 0, sizeof(IOHibernateImageHeader));
106printf("header read size %x\n", size);
107
108imageSize = header->image1Size;
109codeSize = header->restore1PageCount << 12;
110if (kIOHibernateHeaderSignature != header->signature) {
111printf ("Incorrect image signature\n");
112return;
113}
114if (header->encryptStart) {
115printf ("Resuming from Encrypted image is unsupported.\n"
116"Uncheck \"Use secure virtual memory\" in \"Security\" pane on system preferences.\n"
117"Press any key to proceed with normal boot.\n");
118getchar();
119return;
120}
121// depends on NVRAM
122#if 0
123{
124uint32_t machineSignature;
125size = GetProp(gChosenPH, kIOHibernateMachineSignatureKey,
126 (char *)&machineSignature, sizeof(machineSignature));
127if (size != sizeof(machineSignature)) {
128machineSignature = 0;
129}
130if (machineSignature != header->machineSignature) {
131break;
132}
133}
134#endif
135
136allocSize = imageSize + ((4095 + sizeof(hibernate_graphics_t)) & ~4095);
137
138mem_base = getmemorylimit() - allocSize;//TODO: lower this
139
140printf("mem_base %x\n", mem_base);
141if (((long long)mem_base + allocSize) < (1024 * bootInfo->extmem + 0x100000)) {
142printf ("Not enough space to restore image. Press any key to proceed with normal boot.\n");
143getchar();
144return;
145}
146
147bcopy(header, (void *) mem_base, sizeof(IOHibernateImageHeader));
148header = (IOHibernateImageHeader *) mem_base;
149
150imageSize -= sizeof(IOHibernateImageHeader);
151buffer = (long)(header + 1);
152
153if (header->previewSize) {
154uint64_t preview_offset = header->fileExtentMapSize - sizeof(header->fileExtentMap) + codeSize;
155uint8_t progressSaveUnder[kIOHibernateProgressCount][kIOHibernateProgressSaveUnderSize];
156
157ReadFileAtOffset (image_filename, (char *)buffer, sizeof(IOHibernateImageHeader), preview_offset+header->previewSize);
158drawPreview ((void *)(long)(buffer+preview_offset + header->previewPageListSize), &(progressSaveUnder[0][0]));
159previewTotalSectors = (imageSize-(preview_offset+header->previewSize))/512;
160previewLoadedSectors = 0;
161previewSaveunder = &(progressSaveUnder[0][0]);
162if (preview_offset+header->previewSize<imageSize) {
163ReadFileAtOffset (image_filename, (char *)(long)(buffer+preview_offset+header->previewSize),
164 sizeof(IOHibernateImageHeader)+preview_offset+header->previewSize,
165 imageSize-(preview_offset+header->previewSize));
166}
167previewTotalSectors = 0;
168previewLoadedSectors = 0;
169previewSaveunder = 0;
170#if 0
171//AsereBLN:
172//check_vga_nvidia() didn't work as expected (recursion level > 0 & return value).
173//Unforutnaltely I cannot find a note why to switch back to text mode for nVidia cards only
174//and because it check_vga_nvidia does not work (cards normally are behind a bridge) I will
175//remove it completely
176//setVideoMode( VGA_TEXT_MODE, 0 );
177#endif
178} else {
179ReadFileAtOffset (image_filename, (char *)buffer, sizeof(IOHibernateImageHeader), imageSize);
180}
181// Depends on NVRAM
182#if 0
183if (header->encryptStart) {
184// decryption data
185static const unsigned char first_iv[AES_BLOCK_SIZE]
186= { 0xa3, 0x63, 0x65, 0xa9, 0x0b, 0x71, 0x7b, 0x1c,
1870xdf, 0x9e, 0x5f, 0x32, 0xd7, 0x61, 0x63, 0xda };
188hibernate_cryptvars_t _cryptvars;
189hibernate_cryptvars_t * cryptvars = &_cryptvars;
190
191aes_decrypt_key(&decryptkey,
192decryptkeysize,
193&cryptvars->ctx.decrypt);
194
195// set the vector for the following decryptions
196bcopy(((uint8_t *) header) + header->image1Size - AES_BLOCK_SIZE,
197&cryptvars->aes_iv[0], AES_BLOCK_SIZE);
198
199// decrypt the buffer
200uint32_t len = (uint32_t)(header->image1Size - header->encryptStart);
201aes_decrypt_cbc(((uint8_t *) header) + header->encryptStart,
202&first_iv[0],
203len >> 4,
204((uint8_t *) header) + header->encryptStart,
205&cryptvars->ctx.decrypt);
206bzero(&cryptvars->aes_iv[0], sizeof(cryptvars));
207bzero(&decryptkey, sizeof(decryptkey));
208}
209#endif
210
211WakeKernel(header);
212}
213

Archive Download this file

Revision: 2347