xref: /openbmc/linux/arch/x86/boot/compressed/idt_64.c (revision 87832e937c808a7ebc41254b408362e3255c87c9)
164e68263SJoerg Roedel // SPDX-License-Identifier: GPL-2.0-only
264e68263SJoerg Roedel #include <asm/trap_pf.h>
364e68263SJoerg Roedel #include <asm/segment.h>
464e68263SJoerg Roedel #include <asm/trapnr.h>
564e68263SJoerg Roedel #include "misc.h"
664e68263SJoerg Roedel 
set_idt_entry(int vector,void (* handler)(void))764e68263SJoerg Roedel static void set_idt_entry(int vector, void (*handler)(void))
864e68263SJoerg Roedel {
964e68263SJoerg Roedel 	unsigned long address = (unsigned long)handler;
1064e68263SJoerg Roedel 	gate_desc entry;
1164e68263SJoerg Roedel 
1264e68263SJoerg Roedel 	memset(&entry, 0, sizeof(entry));
1364e68263SJoerg Roedel 
1464e68263SJoerg Roedel 	entry.offset_low    = (u16)(address & 0xffff);
1564e68263SJoerg Roedel 	entry.segment       = __KERNEL_CS;
1664e68263SJoerg Roedel 	entry.bits.type     = GATE_TRAP;
1764e68263SJoerg Roedel 	entry.bits.p        = 1;
1864e68263SJoerg Roedel 	entry.offset_middle = (u16)((address >> 16) & 0xffff);
1964e68263SJoerg Roedel 	entry.offset_high   = (u32)(address >> 32);
2064e68263SJoerg Roedel 
2164e68263SJoerg Roedel 	memcpy(&boot_idt[vector], &entry, sizeof(entry));
2264e68263SJoerg Roedel }
2364e68263SJoerg Roedel 
2464e68263SJoerg Roedel /* Have this here so we don't need to include <asm/desc.h> */
load_boot_idt(const struct desc_ptr * dtr)2564e68263SJoerg Roedel static void load_boot_idt(const struct desc_ptr *dtr)
2664e68263SJoerg Roedel {
2764e68263SJoerg Roedel 	asm volatile("lidt %0"::"m" (*dtr));
2864e68263SJoerg Roedel }
2964e68263SJoerg Roedel 
3064e68263SJoerg Roedel /* Setup IDT before kernel jumping to  .Lrelocated */
load_stage1_idt(void)3164e68263SJoerg Roedel void load_stage1_idt(void)
3264e68263SJoerg Roedel {
3364e68263SJoerg Roedel 	boot_idt_desc.address = (unsigned long)boot_idt;
3464e68263SJoerg Roedel 
3529dcc60fSJoerg Roedel 
3629dcc60fSJoerg Roedel 	if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT))
3729dcc60fSJoerg Roedel 		set_idt_entry(X86_TRAP_VC, boot_stage1_vc);
3829dcc60fSJoerg Roedel 
3964e68263SJoerg Roedel 	load_boot_idt(&boot_idt_desc);
4064e68263SJoerg Roedel }
4164e68263SJoerg Roedel 
42cbd3d4f7SBrijesh Singh /*
43cbd3d4f7SBrijesh Singh  * Setup IDT after kernel jumping to  .Lrelocated.
44cbd3d4f7SBrijesh Singh  *
45cbd3d4f7SBrijesh Singh  * initialize_identity_maps() needs a #PF handler to be setup
46cbd3d4f7SBrijesh Singh  * in order to be able to fault-in identity mapping ranges; see
47cbd3d4f7SBrijesh Singh  * do_boot_page_fault().
48cbd3d4f7SBrijesh Singh  *
49cbd3d4f7SBrijesh Singh  * This #PF handler setup needs to happen in load_stage2_idt() where the
50cbd3d4f7SBrijesh Singh  * IDT is loaded and there the #VC IDT entry gets setup too.
51cbd3d4f7SBrijesh Singh  *
52cbd3d4f7SBrijesh Singh  * In order to be able to handle #VCs, one needs a GHCB which
53cbd3d4f7SBrijesh Singh  * gets setup with an already set up pagetable, which is done in
54cbd3d4f7SBrijesh Singh  * initialize_identity_maps(). And there's the catch 22: the boot #VC
55cbd3d4f7SBrijesh Singh  * handler do_boot_stage2_vc() needs to call early_setup_ghcb() itself
56cbd3d4f7SBrijesh Singh  * (and, especially set_page_decrypted()) because the SEV-ES setup code
57cbd3d4f7SBrijesh Singh  * cannot initialize a GHCB as there's no #PF handler yet...
58cbd3d4f7SBrijesh Singh  */
load_stage2_idt(void)5964e68263SJoerg Roedel void load_stage2_idt(void)
6064e68263SJoerg Roedel {
6164e68263SJoerg Roedel 	boot_idt_desc.address = (unsigned long)boot_idt;
6264e68263SJoerg Roedel 
638b0d3b3bSJoerg Roedel 	set_idt_entry(X86_TRAP_PF, boot_page_fault);
64*f77cb047SJun'ichi Nomura 	set_idt_entry(X86_TRAP_NMI, boot_nmi_trap);
658b0d3b3bSJoerg Roedel 
66597cfe48SJoerg Roedel #ifdef CONFIG_AMD_MEM_ENCRYPT
67bee6cf1aSBorislav Petkov (AMD) 	/*
68bee6cf1aSBorislav Petkov (AMD) 	 * Clear the second stage #VC handler in case guest types
69bee6cf1aSBorislav Petkov (AMD) 	 * needing #VC have not been detected.
70bee6cf1aSBorislav Petkov (AMD) 	 */
71bee6cf1aSBorislav Petkov (AMD) 	if (sev_status & BIT(1))
72597cfe48SJoerg Roedel 		set_idt_entry(X86_TRAP_VC, boot_stage2_vc);
73bee6cf1aSBorislav Petkov (AMD) 	else
74bee6cf1aSBorislav Petkov (AMD) 		set_idt_entry(X86_TRAP_VC, NULL);
75597cfe48SJoerg Roedel #endif
76597cfe48SJoerg Roedel 
7764e68263SJoerg Roedel 	load_boot_idt(&boot_idt_desc);
7864e68263SJoerg Roedel }
79b099155eSJoerg Roedel 
cleanup_exception_handling(void)80b099155eSJoerg Roedel void cleanup_exception_handling(void)
81b099155eSJoerg Roedel {
82b099155eSJoerg Roedel 	/*
83b099155eSJoerg Roedel 	 * Flush GHCB from cache and map it encrypted again when running as
84b099155eSJoerg Roedel 	 * SEV-ES guest.
85b099155eSJoerg Roedel 	 */
86b099155eSJoerg Roedel 	sev_es_shutdown_ghcb();
87b099155eSJoerg Roedel 
88b099155eSJoerg Roedel 	/* Set a null-idt, disabling #PF and #VC handling */
89b099155eSJoerg Roedel 	boot_idt_desc.size    = 0;
90b099155eSJoerg Roedel 	boot_idt_desc.address = 0;
91b099155eSJoerg Roedel 	load_boot_idt(&boot_idt_desc);
92b099155eSJoerg Roedel }
93