xref: /openbmc/linux/arch/x86/realmode/init.c (revision 2612e3bbc0386368a850140a6c9b990cd496a5ec)
1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
213712701SH. Peter Anvin #include <linux/io.h>
35ff3e2c3SAndy Lutomirski #include <linux/slab.h>
413712701SH. Peter Anvin #include <linux/memblock.h>
532cb4d02STom Lendacky #include <linux/cc_platform.h>
665fddcfcSMike Rapoport #include <linux/pgtable.h>
713712701SH. Peter Anvin 
8d1163651SLaura Abbott #include <asm/set_memory.h>
913712701SH. Peter Anvin #include <asm/realmode.h>
1018bc7bd5SAndy Lutomirski #include <asm/tlbflush.h>
116f599d84SLianbo Jiang #include <asm/crash.h>
12e759959fSBrijesh Singh #include <asm/sev.h>
1313712701SH. Peter Anvin 
1413712701SH. Peter Anvin struct real_mode_header *real_mode_header;
1513712701SH. Peter Anvin u32 *trampoline_cr4_features;
1613712701SH. Peter Anvin 
17b234e8a0SThomas Garnier /* Hold the pgd entry used on booting additional CPUs */
18b234e8a0SThomas Garnier pgd_t trampoline_pgd_entry;
19b234e8a0SThomas Garnier 
load_trampoline_pgtable(void)2071d5049bSJoerg Roedel void load_trampoline_pgtable(void)
2171d5049bSJoerg Roedel {
2271d5049bSJoerg Roedel #ifdef CONFIG_X86_32
2371d5049bSJoerg Roedel 	load_cr3(initial_page_table);
2471d5049bSJoerg Roedel #else
2571d5049bSJoerg Roedel 	/*
2671d5049bSJoerg Roedel 	 * This function is called before exiting to real-mode and that will
2771d5049bSJoerg Roedel 	 * fail with CR4.PCIDE still set.
2871d5049bSJoerg Roedel 	 */
2971d5049bSJoerg Roedel 	if (boot_cpu_has(X86_FEATURE_PCID))
3071d5049bSJoerg Roedel 		cr4_clear_bits(X86_CR4_PCIDE);
3171d5049bSJoerg Roedel 
3271d5049bSJoerg Roedel 	write_cr3(real_mode_header->trampoline_pgd);
3371d5049bSJoerg Roedel #endif
3471d5049bSJoerg Roedel 
3571d5049bSJoerg Roedel 	/*
3671d5049bSJoerg Roedel 	 * The CR3 write above will not flush global TLB entries.
3771d5049bSJoerg Roedel 	 * Stale, global entries from previous page tables may still be
3871d5049bSJoerg Roedel 	 * present.  Flush those stale entries.
3971d5049bSJoerg Roedel 	 *
4071d5049bSJoerg Roedel 	 * This ensures that memory accessed while running with
4171d5049bSJoerg Roedel 	 * trampoline_pgd is *actually* mapped into trampoline_pgd.
4271d5049bSJoerg Roedel 	 */
4371d5049bSJoerg Roedel 	__flush_tlb_all();
4471d5049bSJoerg Roedel }
4571d5049bSJoerg Roedel 
reserve_real_mode(void)465ff3e2c3SAndy Lutomirski void __init reserve_real_mode(void)
475ff3e2c3SAndy Lutomirski {
485ff3e2c3SAndy Lutomirski 	phys_addr_t mem;
495ff3e2c3SAndy Lutomirski 	size_t size = real_mode_size_needed();
505ff3e2c3SAndy Lutomirski 
515ff3e2c3SAndy Lutomirski 	if (!size)
525ff3e2c3SAndy Lutomirski 		return;
535ff3e2c3SAndy Lutomirski 
545ff3e2c3SAndy Lutomirski 	WARN_ON(slab_is_available());
555ff3e2c3SAndy Lutomirski 
565ff3e2c3SAndy Lutomirski 	/* Has to be under 1M so we can execute real-mode AP code. */
57a7259df7SMike Rapoport 	mem = memblock_phys_alloc_range(size, PAGE_SIZE, 0, 1<<20);
58f1d4d47cSMike Rapoport 	if (!mem)
595ff3e2c3SAndy Lutomirski 		pr_info("No sub-1M memory is available for the trampoline\n");
60f1d4d47cSMike Rapoport 	else
61f560bd19SMatteo Croce 		set_real_mode_mem(mem);
62f1d4d47cSMike Rapoport 
63f1d4d47cSMike Rapoport 	/*
64f1d4d47cSMike Rapoport 	 * Unconditionally reserve the entire fisrt 1M, see comment in
65f1d4d47cSMike Rapoport 	 * setup_arch().
66f1d4d47cSMike Rapoport 	 */
67f1d4d47cSMike Rapoport 	memblock_reserve(0, SZ_1M);
685ff3e2c3SAndy Lutomirski }
695ff3e2c3SAndy Lutomirski 
sme_sev_setup_real_mode(struct trampoline_header * th)7075d359ecSMichael Roth static void __init sme_sev_setup_real_mode(struct trampoline_header *th)
718940ac9cSTom Lendacky {
728940ac9cSTom Lendacky #ifdef CONFIG_AMD_MEM_ENCRYPT
7332cb4d02STom Lendacky 	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
748940ac9cSTom Lendacky 		th->flags |= TH_FLAGS_SME_ACTIVE;
758940ac9cSTom Lendacky 
766283f2efSTom Lendacky 	if (cc_platform_has(CC_ATTR_GUEST_STATE_ENCRYPT)) {
773ecacdbdSJoerg Roedel 		/*
783ecacdbdSJoerg Roedel 		 * Skip the call to verify_cpu() in secondary_startup_64 as it
793ecacdbdSJoerg Roedel 		 * will cause #VC exceptions when the AP can't handle them yet.
803ecacdbdSJoerg Roedel 		 */
813ecacdbdSJoerg Roedel 		th->start = (u64) secondary_startup_64_no_verify;
823ecacdbdSJoerg Roedel 
838940ac9cSTom Lendacky 		if (sev_es_setup_ap_jump_table(real_mode_header))
848940ac9cSTom Lendacky 			panic("Failed to get/update SEV-ES AP Jump Table");
858940ac9cSTom Lendacky 	}
868940ac9cSTom Lendacky #endif
878940ac9cSTom Lendacky }
888940ac9cSTom Lendacky 
setup_real_mode(void)89d0de0f68SAndy Lutomirski static void __init setup_real_mode(void)
904f7b9226SYinghai Lu {
9113712701SH. Peter Anvin 	u16 real_mode_seg;
927306006fSH. Peter Anvin 	const u32 *rel;
9313712701SH. Peter Anvin 	u32 count;
9413712701SH. Peter Anvin 	unsigned char *base;
957306006fSH. Peter Anvin 	unsigned long phys_base;
9613712701SH. Peter Anvin 	struct trampoline_header *trampoline_header;
9713712701SH. Peter Anvin 	size_t size = PAGE_ALIGN(real_mode_blob_end - real_mode_blob);
9813712701SH. Peter Anvin #ifdef CONFIG_X86_64
9913712701SH. Peter Anvin 	u64 *trampoline_pgd;
100638d957bSH. Peter Anvin 	u64 efer;
10151523ed1SJoerg Roedel 	int i;
10213712701SH. Peter Anvin #endif
10313712701SH. Peter Anvin 
1044f7b9226SYinghai Lu 	base = (unsigned char *)real_mode_header;
10513712701SH. Peter Anvin 
106163ea3c8STom Lendacky 	/*
107163ea3c8STom Lendacky 	 * If SME is active, the trampoline area will need to be in
108163ea3c8STom Lendacky 	 * decrypted memory in order to bring up other processors
109fcdcd6cdSTom Lendacky 	 * successfully. This is not needed for SEV.
110163ea3c8STom Lendacky 	 */
11132cb4d02STom Lendacky 	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
112163ea3c8STom Lendacky 		set_memory_decrypted((unsigned long)base, size >> PAGE_SHIFT);
113163ea3c8STom Lendacky 
11413712701SH. Peter Anvin 	memcpy(base, real_mode_blob, size);
11513712701SH. Peter Anvin 
1167306006fSH. Peter Anvin 	phys_base = __pa(base);
1177306006fSH. Peter Anvin 	real_mode_seg = phys_base >> 4;
1187306006fSH. Peter Anvin 
11913712701SH. Peter Anvin 	rel = (u32 *) real_mode_relocs;
12013712701SH. Peter Anvin 
12113712701SH. Peter Anvin 	/* 16-bit segment relocations. */
1227306006fSH. Peter Anvin 	count = *rel++;
1237306006fSH. Peter Anvin 	while (count--) {
1247306006fSH. Peter Anvin 		u16 *seg = (u16 *) (base + *rel++);
12513712701SH. Peter Anvin 		*seg = real_mode_seg;
12613712701SH. Peter Anvin 	}
12713712701SH. Peter Anvin 
12813712701SH. Peter Anvin 	/* 32-bit linear relocations. */
1297306006fSH. Peter Anvin 	count = *rel++;
1307306006fSH. Peter Anvin 	while (count--) {
1317306006fSH. Peter Anvin 		u32 *ptr = (u32 *) (base + *rel++);
1327306006fSH. Peter Anvin 		*ptr += phys_base;
13313712701SH. Peter Anvin 	}
13413712701SH. Peter Anvin 
135163b0991SIngo Molnar 	/* Must be performed *after* relocation. */
13613712701SH. Peter Anvin 	trampoline_header = (struct trampoline_header *)
13713712701SH. Peter Anvin 		__va(real_mode_header->trampoline_header);
13813712701SH. Peter Anvin 
13913712701SH. Peter Anvin #ifdef CONFIG_X86_32
140fc8d7826SAlexander Duyck 	trampoline_header->start = __pa_symbol(startup_32_smp);
14113712701SH. Peter Anvin 	trampoline_header->gdt_limit = __BOOT_DS + 7;
142fc8d7826SAlexander Duyck 	trampoline_header->gdt_base = __pa_symbol(boot_gdt);
14313712701SH. Peter Anvin #else
14413712701SH. Peter Anvin 	/*
14513712701SH. Peter Anvin 	 * Some AMD processors will #GP(0) if EFER.LMA is set in WRMSR
14613712701SH. Peter Anvin 	 * so we need to mask it out.
14713712701SH. Peter Anvin 	 */
148638d957bSH. Peter Anvin 	rdmsrl(MSR_EFER, efer);
149638d957bSH. Peter Anvin 	trampoline_header->efer = efer & ~EFER_LMA;
15013712701SH. Peter Anvin 
15113712701SH. Peter Anvin 	trampoline_header->start = (u64) secondary_startup_64;
15213712701SH. Peter Anvin 	trampoline_cr4_features = &trampoline_header->cr4;
15318bc7bd5SAndy Lutomirski 	*trampoline_cr4_features = mmu_cr4_features;
15413712701SH. Peter Anvin 
15546d010e0STom Lendacky 	trampoline_header->flags = 0;
15646d010e0STom Lendacky 
157*f6f1ae91SThomas Gleixner 	trampoline_lock = &trampoline_header->lock;
158*f6f1ae91SThomas Gleixner 	*trampoline_lock = 0;
159*f6f1ae91SThomas Gleixner 
16013712701SH. Peter Anvin 	trampoline_pgd = (u64 *) __va(real_mode_header->trampoline_pgd);
16151523ed1SJoerg Roedel 
16251523ed1SJoerg Roedel 	/* Map the real mode stub as virtual == physical */
163b234e8a0SThomas Garnier 	trampoline_pgd[0] = trampoline_pgd_entry.pgd;
16451523ed1SJoerg Roedel 
16551523ed1SJoerg Roedel 	/*
16651523ed1SJoerg Roedel 	 * Include the entirety of the kernel mapping into the trampoline
16751523ed1SJoerg Roedel 	 * PGD.  This way, all mappings present in the normal kernel page
16851523ed1SJoerg Roedel 	 * tables are usable while running on trampoline_pgd.
16951523ed1SJoerg Roedel 	 */
17051523ed1SJoerg Roedel 	for (i = pgd_index(__PAGE_OFFSET); i < PTRS_PER_PGD; i++)
17151523ed1SJoerg Roedel 		trampoline_pgd[i] = init_top_pgt[i].pgd;
17213712701SH. Peter Anvin #endif
1738940ac9cSTom Lendacky 
1748940ac9cSTom Lendacky 	sme_sev_setup_real_mode(trampoline_header);
17513712701SH. Peter Anvin }
17613712701SH. Peter Anvin 
17713712701SH. Peter Anvin /*
1784f7b9226SYinghai Lu  * reserve_real_mode() gets called very early, to guarantee the
17913712701SH. Peter Anvin  * availability of low memory. This is before the proper kernel page
18013712701SH. Peter Anvin  * tables are set up, so we cannot set page permissions in that
181231b3642SYinghai Lu  * function. Also trampoline code will be executed by APs so we
182231b3642SYinghai Lu  * need to mark it executable at do_pre_smp_initcalls() at least,
183231b3642SYinghai Lu  * thus run it as a early_initcall().
18413712701SH. Peter Anvin  */
set_real_mode_permissions(void)185d0de0f68SAndy Lutomirski static void __init set_real_mode_permissions(void)
18613712701SH. Peter Anvin {
18713712701SH. Peter Anvin 	unsigned char *base = (unsigned char *) real_mode_header;
18813712701SH. Peter Anvin 	size_t size = PAGE_ALIGN(real_mode_blob_end - real_mode_blob);
18913712701SH. Peter Anvin 
19013712701SH. Peter Anvin 	size_t ro_size =
19113712701SH. Peter Anvin 		PAGE_ALIGN(real_mode_header->ro_end) -
19213712701SH. Peter Anvin 		__pa(base);
19313712701SH. Peter Anvin 
19413712701SH. Peter Anvin 	size_t text_size =
19513712701SH. Peter Anvin 		PAGE_ALIGN(real_mode_header->ro_end) -
19613712701SH. Peter Anvin 		real_mode_header->text_start;
19713712701SH. Peter Anvin 
19813712701SH. Peter Anvin 	unsigned long text_start =
19913712701SH. Peter Anvin 		(unsigned long) __va(real_mode_header->text_start);
20013712701SH. Peter Anvin 
20113712701SH. Peter Anvin 	set_memory_nx((unsigned long) base, size >> PAGE_SHIFT);
20213712701SH. Peter Anvin 	set_memory_ro((unsigned long) base, ro_size >> PAGE_SHIFT);
20313712701SH. Peter Anvin 	set_memory_x((unsigned long) text_start, text_size >> PAGE_SHIFT);
204d0de0f68SAndy Lutomirski }
205d0de0f68SAndy Lutomirski 
init_real_mode(void)206f1e52500SJuergen Gross void __init init_real_mode(void)
207d0de0f68SAndy Lutomirski {
208d0de0f68SAndy Lutomirski 	if (!real_mode_header)
209d0de0f68SAndy Lutomirski 		panic("Real mode trampoline was not allocated");
210d0de0f68SAndy Lutomirski 
211d0de0f68SAndy Lutomirski 	setup_real_mode();
212d0de0f68SAndy Lutomirski 	set_real_mode_permissions();
213f1e52500SJuergen Gross }
21413712701SH. Peter Anvin 
do_init_real_mode(void)215f1e52500SJuergen Gross static int __init do_init_real_mode(void)
216f1e52500SJuergen Gross {
217f1e52500SJuergen Gross 	x86_platform.realmode_init();
21813712701SH. Peter Anvin 	return 0;
21913712701SH. Peter Anvin }
220f1e52500SJuergen Gross early_initcall(do_init_real_mode);
221