162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci#include <linux/io.h> 362306a36Sopenharmony_ci#include <linux/slab.h> 462306a36Sopenharmony_ci#include <linux/memblock.h> 562306a36Sopenharmony_ci#include <linux/cc_platform.h> 662306a36Sopenharmony_ci#include <linux/pgtable.h> 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include <asm/set_memory.h> 962306a36Sopenharmony_ci#include <asm/realmode.h> 1062306a36Sopenharmony_ci#include <asm/tlbflush.h> 1162306a36Sopenharmony_ci#include <asm/crash.h> 1262306a36Sopenharmony_ci#include <asm/sev.h> 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_cistruct real_mode_header *real_mode_header; 1562306a36Sopenharmony_ciu32 *trampoline_cr4_features; 1662306a36Sopenharmony_ci 1762306a36Sopenharmony_ci/* Hold the pgd entry used on booting additional CPUs */ 1862306a36Sopenharmony_cipgd_t trampoline_pgd_entry; 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_civoid load_trampoline_pgtable(void) 2162306a36Sopenharmony_ci{ 2262306a36Sopenharmony_ci#ifdef CONFIG_X86_32 2362306a36Sopenharmony_ci load_cr3(initial_page_table); 2462306a36Sopenharmony_ci#else 2562306a36Sopenharmony_ci /* 2662306a36Sopenharmony_ci * This function is called before exiting to real-mode and that will 2762306a36Sopenharmony_ci * fail with CR4.PCIDE still set. 2862306a36Sopenharmony_ci */ 2962306a36Sopenharmony_ci if (boot_cpu_has(X86_FEATURE_PCID)) 3062306a36Sopenharmony_ci cr4_clear_bits(X86_CR4_PCIDE); 3162306a36Sopenharmony_ci 3262306a36Sopenharmony_ci write_cr3(real_mode_header->trampoline_pgd); 3362306a36Sopenharmony_ci#endif 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_ci /* 3662306a36Sopenharmony_ci * The CR3 write above will not flush global TLB entries. 3762306a36Sopenharmony_ci * Stale, global entries from previous page tables may still be 3862306a36Sopenharmony_ci * present. Flush those stale entries. 3962306a36Sopenharmony_ci * 4062306a36Sopenharmony_ci * This ensures that memory accessed while running with 4162306a36Sopenharmony_ci * trampoline_pgd is *actually* mapped into trampoline_pgd. 4262306a36Sopenharmony_ci */ 4362306a36Sopenharmony_ci __flush_tlb_all(); 4462306a36Sopenharmony_ci} 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_civoid __init reserve_real_mode(void) 4762306a36Sopenharmony_ci{ 4862306a36Sopenharmony_ci phys_addr_t mem; 4962306a36Sopenharmony_ci size_t size = real_mode_size_needed(); 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_ci if (!size) 5262306a36Sopenharmony_ci return; 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_ci WARN_ON(slab_is_available()); 5562306a36Sopenharmony_ci 5662306a36Sopenharmony_ci /* Has to be under 1M so we can execute real-mode AP code. */ 5762306a36Sopenharmony_ci mem = memblock_phys_alloc_range(size, PAGE_SIZE, 0, 1<<20); 5862306a36Sopenharmony_ci if (!mem) 5962306a36Sopenharmony_ci pr_info("No sub-1M memory is available for the trampoline\n"); 6062306a36Sopenharmony_ci else 6162306a36Sopenharmony_ci set_real_mode_mem(mem); 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_ci /* 6462306a36Sopenharmony_ci * Unconditionally reserve the entire fisrt 1M, see comment in 6562306a36Sopenharmony_ci * setup_arch(). 6662306a36Sopenharmony_ci */ 6762306a36Sopenharmony_ci memblock_reserve(0, SZ_1M); 6862306a36Sopenharmony_ci} 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_cistatic void __init sme_sev_setup_real_mode(struct trampoline_header *th) 7162306a36Sopenharmony_ci{ 7262306a36Sopenharmony_ci#ifdef CONFIG_AMD_MEM_ENCRYPT 7362306a36Sopenharmony_ci if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT)) 7462306a36Sopenharmony_ci th->flags |= TH_FLAGS_SME_ACTIVE; 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci if (cc_platform_has(CC_ATTR_GUEST_STATE_ENCRYPT)) { 7762306a36Sopenharmony_ci /* 7862306a36Sopenharmony_ci * Skip the call to verify_cpu() in secondary_startup_64 as it 7962306a36Sopenharmony_ci * will cause #VC exceptions when the AP can't handle them yet. 8062306a36Sopenharmony_ci */ 8162306a36Sopenharmony_ci th->start = (u64) secondary_startup_64_no_verify; 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci if (sev_es_setup_ap_jump_table(real_mode_header)) 8462306a36Sopenharmony_ci panic("Failed to get/update SEV-ES AP Jump Table"); 8562306a36Sopenharmony_ci } 8662306a36Sopenharmony_ci#endif 8762306a36Sopenharmony_ci} 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_cistatic void __init setup_real_mode(void) 9062306a36Sopenharmony_ci{ 9162306a36Sopenharmony_ci u16 real_mode_seg; 9262306a36Sopenharmony_ci const u32 *rel; 9362306a36Sopenharmony_ci u32 count; 9462306a36Sopenharmony_ci unsigned char *base; 9562306a36Sopenharmony_ci unsigned long phys_base; 9662306a36Sopenharmony_ci struct trampoline_header *trampoline_header; 9762306a36Sopenharmony_ci size_t size = PAGE_ALIGN(real_mode_blob_end - real_mode_blob); 9862306a36Sopenharmony_ci#ifdef CONFIG_X86_64 9962306a36Sopenharmony_ci u64 *trampoline_pgd; 10062306a36Sopenharmony_ci u64 efer; 10162306a36Sopenharmony_ci int i; 10262306a36Sopenharmony_ci#endif 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci base = (unsigned char *)real_mode_header; 10562306a36Sopenharmony_ci 10662306a36Sopenharmony_ci /* 10762306a36Sopenharmony_ci * If SME is active, the trampoline area will need to be in 10862306a36Sopenharmony_ci * decrypted memory in order to bring up other processors 10962306a36Sopenharmony_ci * successfully. This is not needed for SEV. 11062306a36Sopenharmony_ci */ 11162306a36Sopenharmony_ci if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT)) 11262306a36Sopenharmony_ci set_memory_decrypted((unsigned long)base, size >> PAGE_SHIFT); 11362306a36Sopenharmony_ci 11462306a36Sopenharmony_ci memcpy(base, real_mode_blob, size); 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ci phys_base = __pa(base); 11762306a36Sopenharmony_ci real_mode_seg = phys_base >> 4; 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci rel = (u32 *) real_mode_relocs; 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci /* 16-bit segment relocations. */ 12262306a36Sopenharmony_ci count = *rel++; 12362306a36Sopenharmony_ci while (count--) { 12462306a36Sopenharmony_ci u16 *seg = (u16 *) (base + *rel++); 12562306a36Sopenharmony_ci *seg = real_mode_seg; 12662306a36Sopenharmony_ci } 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci /* 32-bit linear relocations. */ 12962306a36Sopenharmony_ci count = *rel++; 13062306a36Sopenharmony_ci while (count--) { 13162306a36Sopenharmony_ci u32 *ptr = (u32 *) (base + *rel++); 13262306a36Sopenharmony_ci *ptr += phys_base; 13362306a36Sopenharmony_ci } 13462306a36Sopenharmony_ci 13562306a36Sopenharmony_ci /* Must be performed *after* relocation. */ 13662306a36Sopenharmony_ci trampoline_header = (struct trampoline_header *) 13762306a36Sopenharmony_ci __va(real_mode_header->trampoline_header); 13862306a36Sopenharmony_ci 13962306a36Sopenharmony_ci#ifdef CONFIG_X86_32 14062306a36Sopenharmony_ci trampoline_header->start = __pa_symbol(startup_32_smp); 14162306a36Sopenharmony_ci trampoline_header->gdt_limit = __BOOT_DS + 7; 14262306a36Sopenharmony_ci trampoline_header->gdt_base = __pa_symbol(boot_gdt); 14362306a36Sopenharmony_ci#else 14462306a36Sopenharmony_ci /* 14562306a36Sopenharmony_ci * Some AMD processors will #GP(0) if EFER.LMA is set in WRMSR 14662306a36Sopenharmony_ci * so we need to mask it out. 14762306a36Sopenharmony_ci */ 14862306a36Sopenharmony_ci rdmsrl(MSR_EFER, efer); 14962306a36Sopenharmony_ci trampoline_header->efer = efer & ~EFER_LMA; 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci trampoline_header->start = (u64) secondary_startup_64; 15262306a36Sopenharmony_ci trampoline_cr4_features = &trampoline_header->cr4; 15362306a36Sopenharmony_ci *trampoline_cr4_features = mmu_cr4_features; 15462306a36Sopenharmony_ci 15562306a36Sopenharmony_ci trampoline_header->flags = 0; 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_ci trampoline_lock = &trampoline_header->lock; 15862306a36Sopenharmony_ci *trampoline_lock = 0; 15962306a36Sopenharmony_ci 16062306a36Sopenharmony_ci trampoline_pgd = (u64 *) __va(real_mode_header->trampoline_pgd); 16162306a36Sopenharmony_ci 16262306a36Sopenharmony_ci /* Map the real mode stub as virtual == physical */ 16362306a36Sopenharmony_ci trampoline_pgd[0] = trampoline_pgd_entry.pgd; 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci /* 16662306a36Sopenharmony_ci * Include the entirety of the kernel mapping into the trampoline 16762306a36Sopenharmony_ci * PGD. This way, all mappings present in the normal kernel page 16862306a36Sopenharmony_ci * tables are usable while running on trampoline_pgd. 16962306a36Sopenharmony_ci */ 17062306a36Sopenharmony_ci for (i = pgd_index(__PAGE_OFFSET); i < PTRS_PER_PGD; i++) 17162306a36Sopenharmony_ci trampoline_pgd[i] = init_top_pgt[i].pgd; 17262306a36Sopenharmony_ci#endif 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci sme_sev_setup_real_mode(trampoline_header); 17562306a36Sopenharmony_ci} 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_ci/* 17862306a36Sopenharmony_ci * reserve_real_mode() gets called very early, to guarantee the 17962306a36Sopenharmony_ci * availability of low memory. This is before the proper kernel page 18062306a36Sopenharmony_ci * tables are set up, so we cannot set page permissions in that 18162306a36Sopenharmony_ci * function. Also trampoline code will be executed by APs so we 18262306a36Sopenharmony_ci * need to mark it executable at do_pre_smp_initcalls() at least, 18362306a36Sopenharmony_ci * thus run it as a early_initcall(). 18462306a36Sopenharmony_ci */ 18562306a36Sopenharmony_cistatic void __init set_real_mode_permissions(void) 18662306a36Sopenharmony_ci{ 18762306a36Sopenharmony_ci unsigned char *base = (unsigned char *) real_mode_header; 18862306a36Sopenharmony_ci size_t size = PAGE_ALIGN(real_mode_blob_end - real_mode_blob); 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_ci size_t ro_size = 19162306a36Sopenharmony_ci PAGE_ALIGN(real_mode_header->ro_end) - 19262306a36Sopenharmony_ci __pa(base); 19362306a36Sopenharmony_ci 19462306a36Sopenharmony_ci size_t text_size = 19562306a36Sopenharmony_ci PAGE_ALIGN(real_mode_header->ro_end) - 19662306a36Sopenharmony_ci real_mode_header->text_start; 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci unsigned long text_start = 19962306a36Sopenharmony_ci (unsigned long) __va(real_mode_header->text_start); 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci set_memory_nx((unsigned long) base, size >> PAGE_SHIFT); 20262306a36Sopenharmony_ci set_memory_ro((unsigned long) base, ro_size >> PAGE_SHIFT); 20362306a36Sopenharmony_ci set_memory_x((unsigned long) text_start, text_size >> PAGE_SHIFT); 20462306a36Sopenharmony_ci} 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_civoid __init init_real_mode(void) 20762306a36Sopenharmony_ci{ 20862306a36Sopenharmony_ci if (!real_mode_header) 20962306a36Sopenharmony_ci panic("Real mode trampoline was not allocated"); 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci setup_real_mode(); 21262306a36Sopenharmony_ci set_real_mode_permissions(); 21362306a36Sopenharmony_ci} 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_cistatic int __init do_init_real_mode(void) 21662306a36Sopenharmony_ci{ 21762306a36Sopenharmony_ci x86_platform.realmode_init(); 21862306a36Sopenharmony_ci return 0; 21962306a36Sopenharmony_ci} 22062306a36Sopenharmony_ciearly_initcall(do_init_real_mode); 221