Commit 5da79367 authored by Ard Biesheuvel's avatar Ard Biesheuvel Committed by Ingo Molnar

x86/boot/64: Simplify global variable accesses in GDT/IDT programming

There are two code paths in the startup code to program an IDT: one that
runs from the 1:1 mapping and one that runs from the virtual kernel
mapping. Currently, these are strictly separate because fixup_pointer()
is used on the 1:1 path, which will produce the wrong value when used
while executing from the virtual kernel mapping.

Switch to RIP_REL_REF() so that the two code paths can be merged. Also,
move the GDT and IDT descriptors to the stack so that they can be
referenced directly, rather than via RIP_REL_REF().

Rename startup_64_setup_env() to startup_64_setup_gdt_idt() while at it,
to make the call from assembler self-documenting.
Signed-off-by: default avatarArd Biesheuvel <ardb@kernel.org>
Signed-off-by: default avatarBorislav Petkov (AMD) <bp@alien8.de>
Signed-off-by: default avatarArd Biesheuvel <ardb@kernel.org>
Signed-off-by: default avatarIngo Molnar <mingo@kernel.org>
Link: https://lore.kernel.org/r/20240221113506.2565718-19-ardb+git@google.com
parent 2e5fc478
...@@ -48,7 +48,7 @@ extern unsigned long saved_video_mode; ...@@ -48,7 +48,7 @@ extern unsigned long saved_video_mode;
extern void reserve_standard_io_resources(void); extern void reserve_standard_io_resources(void);
extern void i386_reserve_resources(void); extern void i386_reserve_resources(void);
extern unsigned long __startup_64(unsigned long physaddr, struct boot_params *bp); extern unsigned long __startup_64(unsigned long physaddr, struct boot_params *bp);
extern void startup_64_setup_env(unsigned long physbase); extern void startup_64_setup_gdt_idt(void);
extern void early_setup_idt(void); extern void early_setup_idt(void);
extern void __init do_early_exception(struct pt_regs *regs, int trapnr); extern void __init do_early_exception(struct pt_regs *regs, int trapnr);
......
...@@ -22,6 +22,7 @@ ...@@ -22,6 +22,7 @@
#include <linux/cc_platform.h> #include <linux/cc_platform.h>
#include <linux/pgtable.h> #include <linux/pgtable.h>
#include <asm/asm.h>
#include <asm/processor.h> #include <asm/processor.h>
#include <asm/proto.h> #include <asm/proto.h>
#include <asm/smp.h> #include <asm/smp.h>
...@@ -76,15 +77,6 @@ static struct desc_struct startup_gdt[GDT_ENTRIES] __initdata = { ...@@ -76,15 +77,6 @@ static struct desc_struct startup_gdt[GDT_ENTRIES] __initdata = {
[GDT_ENTRY_KERNEL_DS] = GDT_ENTRY_INIT(DESC_DATA64, 0, 0xfffff), [GDT_ENTRY_KERNEL_DS] = GDT_ENTRY_INIT(DESC_DATA64, 0, 0xfffff),
}; };
/*
* Address needs to be set at runtime because it references the startup_gdt
* while the kernel still uses a direct mapping.
*/
static struct desc_ptr startup_gdt_descr __initdata = {
.size = sizeof(startup_gdt)-1,
.address = 0,
};
static void __head *fixup_pointer(void *ptr, unsigned long physaddr) static void __head *fixup_pointer(void *ptr, unsigned long physaddr)
{ {
return ptr - (void *)_text + (void *)physaddr; return ptr - (void *)_text + (void *)physaddr;
...@@ -569,62 +561,52 @@ void __init __noreturn x86_64_start_reservations(char *real_mode_data) ...@@ -569,62 +561,52 @@ void __init __noreturn x86_64_start_reservations(char *real_mode_data)
*/ */
static gate_desc bringup_idt_table[NUM_EXCEPTION_VECTORS] __page_aligned_data; static gate_desc bringup_idt_table[NUM_EXCEPTION_VECTORS] __page_aligned_data;
static struct desc_ptr bringup_idt_descr = { /* This may run while still in the direct mapping */
.size = (NUM_EXCEPTION_VECTORS * sizeof(gate_desc)) - 1, static void __head startup_64_load_idt(void *vc_handler)
.address = 0, /* Set at runtime */
};
static void set_bringup_idt_handler(gate_desc *idt, int n, void *handler)
{ {
#ifdef CONFIG_AMD_MEM_ENCRYPT struct desc_ptr desc = {
.address = (unsigned long)&RIP_REL_REF(bringup_idt_table),
.size = sizeof(bringup_idt_table) - 1,
};
struct idt_data data; struct idt_data data;
gate_desc desc; gate_desc idt_desc;
init_idt_data(&data, n, handler);
idt_init_desc(&desc, &data);
native_write_idt_entry(idt, n, &desc);
#endif
}
/* This runs while still in the direct mapping */ /* @vc_handler is set only for a VMM Communication Exception */
static void __head startup_64_load_idt(unsigned long physbase) if (vc_handler) {
{ init_idt_data(&data, X86_TRAP_VC, vc_handler);
struct desc_ptr *desc = fixup_pointer(&bringup_idt_descr, physbase); idt_init_desc(&idt_desc, &data);
gate_desc *idt = fixup_pointer(bringup_idt_table, physbase); native_write_idt_entry((gate_desc *)desc.address, X86_TRAP_VC, &idt_desc);
if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) {
void *handler;
/* VMM Communication Exception */
handler = fixup_pointer(vc_no_ghcb, physbase);
set_bringup_idt_handler(idt, X86_TRAP_VC, handler);
} }
desc->address = (unsigned long)idt; native_load_idt(&desc);
native_load_idt(desc);
} }
/* This is used when running on kernel addresses */ /* This is used when running on kernel addresses */
void early_setup_idt(void) void early_setup_idt(void)
{ {
/* VMM Communication Exception */ void *handler = NULL;
if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) { if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) {
setup_ghcb(); setup_ghcb();
set_bringup_idt_handler(bringup_idt_table, X86_TRAP_VC, vc_boot_ghcb); handler = vc_boot_ghcb;
} }
bringup_idt_descr.address = (unsigned long)bringup_idt_table; startup_64_load_idt(handler);
native_load_idt(&bringup_idt_descr);
} }
/* /*
* Setup boot CPU state needed before kernel switches to virtual addresses. * Setup boot CPU state needed before kernel switches to virtual addresses.
*/ */
void __head startup_64_setup_env(unsigned long physbase) void __head startup_64_setup_gdt_idt(void)
{ {
void *handler = NULL;
struct desc_ptr startup_gdt_descr = {
.address = (unsigned long)&RIP_REL_REF(startup_gdt),
.size = sizeof(startup_gdt) - 1,
};
/* Load GDT */ /* Load GDT */
startup_gdt_descr.address = (unsigned long)fixup_pointer(startup_gdt, physbase);
native_load_gdt(&startup_gdt_descr); native_load_gdt(&startup_gdt_descr);
/* New GDT is live - reload data segment registers */ /* New GDT is live - reload data segment registers */
...@@ -632,5 +614,8 @@ void __head startup_64_setup_env(unsigned long physbase) ...@@ -632,5 +614,8 @@ void __head startup_64_setup_env(unsigned long physbase)
"movl %%eax, %%ss\n" "movl %%eax, %%ss\n"
"movl %%eax, %%es\n" : : "a"(__KERNEL_DS) : "memory"); "movl %%eax, %%es\n" : : "a"(__KERNEL_DS) : "memory");
startup_64_load_idt(physbase); if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT))
handler = &RIP_REL_REF(vc_no_ghcb);
startup_64_load_idt(handler);
} }
...@@ -68,8 +68,6 @@ SYM_CODE_START_NOALIGN(startup_64) ...@@ -68,8 +68,6 @@ SYM_CODE_START_NOALIGN(startup_64)
/* Set up the stack for verify_cpu() */ /* Set up the stack for verify_cpu() */
leaq (__end_init_task - PTREGS_SIZE)(%rip), %rsp leaq (__end_init_task - PTREGS_SIZE)(%rip), %rsp
leaq _text(%rip), %rdi
/* Setup GSBASE to allow stack canary access for C code */ /* Setup GSBASE to allow stack canary access for C code */
movl $MSR_GS_BASE, %ecx movl $MSR_GS_BASE, %ecx
leaq INIT_PER_CPU_VAR(fixed_percpu_data)(%rip), %rdx leaq INIT_PER_CPU_VAR(fixed_percpu_data)(%rip), %rdx
...@@ -77,7 +75,7 @@ SYM_CODE_START_NOALIGN(startup_64) ...@@ -77,7 +75,7 @@ SYM_CODE_START_NOALIGN(startup_64)
shrq $32, %rdx shrq $32, %rdx
wrmsr wrmsr
call startup_64_setup_env call startup_64_setup_gdt_idt
/* Now switch to __KERNEL_CS so IRET works reliably */ /* Now switch to __KERNEL_CS so IRET works reliably */
pushq $__KERNEL_CS pushq $__KERNEL_CS
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment