162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci#include <linux/io.h>
362306a36Sopenharmony_ci#include <linux/slab.h>
462306a36Sopenharmony_ci#include <linux/memblock.h>
562306a36Sopenharmony_ci#include <linux/cc_platform.h>
662306a36Sopenharmony_ci#include <linux/pgtable.h>
762306a36Sopenharmony_ci
862306a36Sopenharmony_ci#include <asm/set_memory.h>
962306a36Sopenharmony_ci#include <asm/realmode.h>
1062306a36Sopenharmony_ci#include <asm/tlbflush.h>
1162306a36Sopenharmony_ci#include <asm/crash.h>
1262306a36Sopenharmony_ci#include <asm/sev.h>
1362306a36Sopenharmony_ci
1462306a36Sopenharmony_cistruct real_mode_header *real_mode_header;
1562306a36Sopenharmony_ciu32 *trampoline_cr4_features;
1662306a36Sopenharmony_ci
1762306a36Sopenharmony_ci/* Hold the pgd entry used on booting additional CPUs */
1862306a36Sopenharmony_cipgd_t trampoline_pgd_entry;
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_civoid load_trampoline_pgtable(void)
2162306a36Sopenharmony_ci{
2262306a36Sopenharmony_ci#ifdef CONFIG_X86_32
2362306a36Sopenharmony_ci	load_cr3(initial_page_table);
2462306a36Sopenharmony_ci#else
2562306a36Sopenharmony_ci	/*
2662306a36Sopenharmony_ci	 * This function is called before exiting to real-mode and that will
2762306a36Sopenharmony_ci	 * fail with CR4.PCIDE still set.
2862306a36Sopenharmony_ci	 */
2962306a36Sopenharmony_ci	if (boot_cpu_has(X86_FEATURE_PCID))
3062306a36Sopenharmony_ci		cr4_clear_bits(X86_CR4_PCIDE);
3162306a36Sopenharmony_ci
3262306a36Sopenharmony_ci	write_cr3(real_mode_header->trampoline_pgd);
3362306a36Sopenharmony_ci#endif
3462306a36Sopenharmony_ci
3562306a36Sopenharmony_ci	/*
3662306a36Sopenharmony_ci	 * The CR3 write above will not flush global TLB entries.
3762306a36Sopenharmony_ci	 * Stale, global entries from previous page tables may still be
3862306a36Sopenharmony_ci	 * present.  Flush those stale entries.
3962306a36Sopenharmony_ci	 *
4062306a36Sopenharmony_ci	 * This ensures that memory accessed while running with
4162306a36Sopenharmony_ci	 * trampoline_pgd is *actually* mapped into trampoline_pgd.
4262306a36Sopenharmony_ci	 */
4362306a36Sopenharmony_ci	__flush_tlb_all();
4462306a36Sopenharmony_ci}
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_civoid __init reserve_real_mode(void)
4762306a36Sopenharmony_ci{
4862306a36Sopenharmony_ci	phys_addr_t mem;
4962306a36Sopenharmony_ci	size_t size = real_mode_size_needed();
5062306a36Sopenharmony_ci
5162306a36Sopenharmony_ci	if (!size)
5262306a36Sopenharmony_ci		return;
5362306a36Sopenharmony_ci
5462306a36Sopenharmony_ci	WARN_ON(slab_is_available());
5562306a36Sopenharmony_ci
5662306a36Sopenharmony_ci	/* Has to be under 1M so we can execute real-mode AP code. */
5762306a36Sopenharmony_ci	mem = memblock_phys_alloc_range(size, PAGE_SIZE, 0, 1<<20);
5862306a36Sopenharmony_ci	if (!mem)
5962306a36Sopenharmony_ci		pr_info("No sub-1M memory is available for the trampoline\n");
6062306a36Sopenharmony_ci	else
6162306a36Sopenharmony_ci		set_real_mode_mem(mem);
6262306a36Sopenharmony_ci
6362306a36Sopenharmony_ci	/*
6462306a36Sopenharmony_ci	 * Unconditionally reserve the entire fisrt 1M, see comment in
6562306a36Sopenharmony_ci	 * setup_arch().
6662306a36Sopenharmony_ci	 */
6762306a36Sopenharmony_ci	memblock_reserve(0, SZ_1M);
6862306a36Sopenharmony_ci}
6962306a36Sopenharmony_ci
7062306a36Sopenharmony_cistatic void __init sme_sev_setup_real_mode(struct trampoline_header *th)
7162306a36Sopenharmony_ci{
7262306a36Sopenharmony_ci#ifdef CONFIG_AMD_MEM_ENCRYPT
7362306a36Sopenharmony_ci	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
7462306a36Sopenharmony_ci		th->flags |= TH_FLAGS_SME_ACTIVE;
7562306a36Sopenharmony_ci
7662306a36Sopenharmony_ci	if (cc_platform_has(CC_ATTR_GUEST_STATE_ENCRYPT)) {
7762306a36Sopenharmony_ci		/*
7862306a36Sopenharmony_ci		 * Skip the call to verify_cpu() in secondary_startup_64 as it
7962306a36Sopenharmony_ci		 * will cause #VC exceptions when the AP can't handle them yet.
8062306a36Sopenharmony_ci		 */
8162306a36Sopenharmony_ci		th->start = (u64) secondary_startup_64_no_verify;
8262306a36Sopenharmony_ci
8362306a36Sopenharmony_ci		if (sev_es_setup_ap_jump_table(real_mode_header))
8462306a36Sopenharmony_ci			panic("Failed to get/update SEV-ES AP Jump Table");
8562306a36Sopenharmony_ci	}
8662306a36Sopenharmony_ci#endif
8762306a36Sopenharmony_ci}
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_cistatic void __init setup_real_mode(void)
9062306a36Sopenharmony_ci{
9162306a36Sopenharmony_ci	u16 real_mode_seg;
9262306a36Sopenharmony_ci	const u32 *rel;
9362306a36Sopenharmony_ci	u32 count;
9462306a36Sopenharmony_ci	unsigned char *base;
9562306a36Sopenharmony_ci	unsigned long phys_base;
9662306a36Sopenharmony_ci	struct trampoline_header *trampoline_header;
9762306a36Sopenharmony_ci	size_t size = PAGE_ALIGN(real_mode_blob_end - real_mode_blob);
9862306a36Sopenharmony_ci#ifdef CONFIG_X86_64
9962306a36Sopenharmony_ci	u64 *trampoline_pgd;
10062306a36Sopenharmony_ci	u64 efer;
10162306a36Sopenharmony_ci	int i;
10262306a36Sopenharmony_ci#endif
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_ci	base = (unsigned char *)real_mode_header;
10562306a36Sopenharmony_ci
10662306a36Sopenharmony_ci	/*
10762306a36Sopenharmony_ci	 * If SME is active, the trampoline area will need to be in
10862306a36Sopenharmony_ci	 * decrypted memory in order to bring up other processors
10962306a36Sopenharmony_ci	 * successfully. This is not needed for SEV.
11062306a36Sopenharmony_ci	 */
11162306a36Sopenharmony_ci	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
11262306a36Sopenharmony_ci		set_memory_decrypted((unsigned long)base, size >> PAGE_SHIFT);
11362306a36Sopenharmony_ci
11462306a36Sopenharmony_ci	memcpy(base, real_mode_blob, size);
11562306a36Sopenharmony_ci
11662306a36Sopenharmony_ci	phys_base = __pa(base);
11762306a36Sopenharmony_ci	real_mode_seg = phys_base >> 4;
11862306a36Sopenharmony_ci
11962306a36Sopenharmony_ci	rel = (u32 *) real_mode_relocs;
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci	/* 16-bit segment relocations. */
12262306a36Sopenharmony_ci	count = *rel++;
12362306a36Sopenharmony_ci	while (count--) {
12462306a36Sopenharmony_ci		u16 *seg = (u16 *) (base + *rel++);
12562306a36Sopenharmony_ci		*seg = real_mode_seg;
12662306a36Sopenharmony_ci	}
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_ci	/* 32-bit linear relocations. */
12962306a36Sopenharmony_ci	count = *rel++;
13062306a36Sopenharmony_ci	while (count--) {
13162306a36Sopenharmony_ci		u32 *ptr = (u32 *) (base + *rel++);
13262306a36Sopenharmony_ci		*ptr += phys_base;
13362306a36Sopenharmony_ci	}
13462306a36Sopenharmony_ci
13562306a36Sopenharmony_ci	/* Must be performed *after* relocation. */
13662306a36Sopenharmony_ci	trampoline_header = (struct trampoline_header *)
13762306a36Sopenharmony_ci		__va(real_mode_header->trampoline_header);
13862306a36Sopenharmony_ci
13962306a36Sopenharmony_ci#ifdef CONFIG_X86_32
14062306a36Sopenharmony_ci	trampoline_header->start = __pa_symbol(startup_32_smp);
14162306a36Sopenharmony_ci	trampoline_header->gdt_limit = __BOOT_DS + 7;
14262306a36Sopenharmony_ci	trampoline_header->gdt_base = __pa_symbol(boot_gdt);
14362306a36Sopenharmony_ci#else
14462306a36Sopenharmony_ci	/*
14562306a36Sopenharmony_ci	 * Some AMD processors will #GP(0) if EFER.LMA is set in WRMSR
14662306a36Sopenharmony_ci	 * so we need to mask it out.
14762306a36Sopenharmony_ci	 */
14862306a36Sopenharmony_ci	rdmsrl(MSR_EFER, efer);
14962306a36Sopenharmony_ci	trampoline_header->efer = efer & ~EFER_LMA;
15062306a36Sopenharmony_ci
15162306a36Sopenharmony_ci	trampoline_header->start = (u64) secondary_startup_64;
15262306a36Sopenharmony_ci	trampoline_cr4_features = &trampoline_header->cr4;
15362306a36Sopenharmony_ci	*trampoline_cr4_features = mmu_cr4_features;
15462306a36Sopenharmony_ci
15562306a36Sopenharmony_ci	trampoline_header->flags = 0;
15662306a36Sopenharmony_ci
15762306a36Sopenharmony_ci	trampoline_lock = &trampoline_header->lock;
15862306a36Sopenharmony_ci	*trampoline_lock = 0;
15962306a36Sopenharmony_ci
16062306a36Sopenharmony_ci	trampoline_pgd = (u64 *) __va(real_mode_header->trampoline_pgd);
16162306a36Sopenharmony_ci
16262306a36Sopenharmony_ci	/* Map the real mode stub as virtual == physical */
16362306a36Sopenharmony_ci	trampoline_pgd[0] = trampoline_pgd_entry.pgd;
16462306a36Sopenharmony_ci
16562306a36Sopenharmony_ci	/*
16662306a36Sopenharmony_ci	 * Include the entirety of the kernel mapping into the trampoline
16762306a36Sopenharmony_ci	 * PGD.  This way, all mappings present in the normal kernel page
16862306a36Sopenharmony_ci	 * tables are usable while running on trampoline_pgd.
16962306a36Sopenharmony_ci	 */
17062306a36Sopenharmony_ci	for (i = pgd_index(__PAGE_OFFSET); i < PTRS_PER_PGD; i++)
17162306a36Sopenharmony_ci		trampoline_pgd[i] = init_top_pgt[i].pgd;
17262306a36Sopenharmony_ci#endif
17362306a36Sopenharmony_ci
17462306a36Sopenharmony_ci	sme_sev_setup_real_mode(trampoline_header);
17562306a36Sopenharmony_ci}
17662306a36Sopenharmony_ci
17762306a36Sopenharmony_ci/*
17862306a36Sopenharmony_ci * reserve_real_mode() gets called very early, to guarantee the
17962306a36Sopenharmony_ci * availability of low memory. This is before the proper kernel page
18062306a36Sopenharmony_ci * tables are set up, so we cannot set page permissions in that
18162306a36Sopenharmony_ci * function. Also trampoline code will be executed by APs so we
18262306a36Sopenharmony_ci * need to mark it executable at do_pre_smp_initcalls() at least,
18362306a36Sopenharmony_ci * thus run it as a early_initcall().
18462306a36Sopenharmony_ci */
18562306a36Sopenharmony_cistatic void __init set_real_mode_permissions(void)
18662306a36Sopenharmony_ci{
18762306a36Sopenharmony_ci	unsigned char *base = (unsigned char *) real_mode_header;
18862306a36Sopenharmony_ci	size_t size = PAGE_ALIGN(real_mode_blob_end - real_mode_blob);
18962306a36Sopenharmony_ci
19062306a36Sopenharmony_ci	size_t ro_size =
19162306a36Sopenharmony_ci		PAGE_ALIGN(real_mode_header->ro_end) -
19262306a36Sopenharmony_ci		__pa(base);
19362306a36Sopenharmony_ci
19462306a36Sopenharmony_ci	size_t text_size =
19562306a36Sopenharmony_ci		PAGE_ALIGN(real_mode_header->ro_end) -
19662306a36Sopenharmony_ci		real_mode_header->text_start;
19762306a36Sopenharmony_ci
19862306a36Sopenharmony_ci	unsigned long text_start =
19962306a36Sopenharmony_ci		(unsigned long) __va(real_mode_header->text_start);
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_ci	set_memory_nx((unsigned long) base, size >> PAGE_SHIFT);
20262306a36Sopenharmony_ci	set_memory_ro((unsigned long) base, ro_size >> PAGE_SHIFT);
20362306a36Sopenharmony_ci	set_memory_x((unsigned long) text_start, text_size >> PAGE_SHIFT);
20462306a36Sopenharmony_ci}
20562306a36Sopenharmony_ci
20662306a36Sopenharmony_civoid __init init_real_mode(void)
20762306a36Sopenharmony_ci{
20862306a36Sopenharmony_ci	if (!real_mode_header)
20962306a36Sopenharmony_ci		panic("Real mode trampoline was not allocated");
21062306a36Sopenharmony_ci
21162306a36Sopenharmony_ci	setup_real_mode();
21262306a36Sopenharmony_ci	set_real_mode_permissions();
21362306a36Sopenharmony_ci}
21462306a36Sopenharmony_ci
21562306a36Sopenharmony_cistatic int __init do_init_real_mode(void)
21662306a36Sopenharmony_ci{
21762306a36Sopenharmony_ci	x86_platform.realmode_init();
21862306a36Sopenharmony_ci	return 0;
21962306a36Sopenharmony_ci}
22062306a36Sopenharmony_ciearly_initcall(do_init_real_mode);
221