Received: by 2002:a05:6359:6284:b0:131:369:b2a3 with SMTP id se4csp4665809rwb; Tue, 8 Aug 2023 11:45:57 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFyuNlMSCNybFxp3xicEXM8mN7AjgcULSD4i+NqFQcW6v6yOIdB6KfrLvk4thrj67KqFQW5 X-Received: by 2002:a17:902:ecd0:b0:1bb:32de:95c5 with SMTP id a16-20020a170902ecd000b001bb32de95c5mr428026plh.65.1691520357547; Tue, 08 Aug 2023 11:45:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691520357; cv=none; d=google.com; s=arc-20160816; b=OgEAOY7J1dr0DnwrqwCG5ZUwm+BxCopLdekLKzhe50BvrKr/M+YA69YsWQAzoRXo/m 5kAfMf6jVANuHzkqS+2EWhF2jqAW2MxLmLsFleZEA3T6mDs0Dct6Cns1puCEHaBdtlV3 jENwS8tduw7CRRUUEz8Qxoo9pP7wbejY6w9s4s04GxZfz20N/DkRl3bTHLG0w95eDd7+ AkfRqaj2YI2581dBe+6FykaScWrSF7iCyJgArecXm4td5MEgxBnURMF0q4kfWVOlPerX d3xZ2jAhSWqp71eyTQRrYxpw4B/jPCvcBvYZyTqkzSx92/K//cI6UtrXv9j2KrFI+sJL mWuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:robot-unsubscribe :robot-id:message-id:mime-version:references:in-reply-to:cc:subject :to:reply-to:sender:from:dkim-signature:dkim-signature:date; bh=h3e00OxJCSy19/hg1WF62ePPLeG9O5RAq3OpqnnkqlM=; fh=89EtlG8OroDzV7Zs9C7yICUtoHnJiTR7I5L4uhfdSD4=; b=CjXbHJSg8vMsDu3iirU2cVfsd7N33+bqzZmfXB4OEzLx2xe5woKiQCfib8UVjagiia XiCFtie0MKenI6uZa4U137C0MNX/R9N3yt+2J0Vbx9MtQX0c08WjyuT3PEH+KgpETBnw NWXx7GQ3JKMYP5SqVBLpOVkvD0234Ll3YGUnsZ/xkHC1QYGUZ8b1/39dNXiTmHUX4fpJ ZY5PjzAdmfkGBOm/U8wqnDqaylPrfbFPFzIhtpImicKESxNrumx83gNRiKdADh3xh0wA jtUnX2qCECqFnvQN+oO/E700h6GDIiyIqrLFQkDijL7e2FLS4qVcb0kDkt8sGkLbJuFz QrKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=yaqkmpNo; dkim=neutral (no key) header.i=@linutronix.de header.b=NXdui81U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id kj5-20020a17090306c500b001b3e8a24232si7371617plb.186.2023.08.08.11.45.45; Tue, 08 Aug 2023 11:45:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=yaqkmpNo; dkim=neutral (no key) header.i=@linutronix.de header.b=NXdui81U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230354AbjHHQvL (ORCPT + 99 others); Tue, 8 Aug 2023 12:51:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56272 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230270AbjHHQuR (ORCPT ); Tue, 8 Aug 2023 12:50:17 -0400 Received: from galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1B41917A9A; Tue, 8 Aug 2023 08:57:36 -0700 (PDT) Date: Tue, 08 Aug 2023 08:44:02 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1691484242; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=h3e00OxJCSy19/hg1WF62ePPLeG9O5RAq3OpqnnkqlM=; b=yaqkmpNo+YRJK1ppwizZ8ra+5rFeixnXsimECZNCYvqQjr2gvmt6SfiwACTDixziNn+YYB YXr4Ep0N683x3SliizF8XxOAVM5+Hmq1XC/ry16B18H1XRR3JIH9d4h7qP+T9pJmi8Sdzn DfL0GSEAR60s4OUXqv8MNWv/AgvTJM93OsokfpseFHb49RTZe3Oh069gGyDPlrclSnVngu kHkGEPFSKGfmHERxTjwMkKwRlXacpF/rVyQqwWRdM9f8W7w0uqhRi7lUhuFwfAjZ3UuGdq F7PWsb3ugTDsfAzheLeMNB6swBoey1oLNVNeWih3GTd7cQOTaiNoVjxXkatuPA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1691484242; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=h3e00OxJCSy19/hg1WF62ePPLeG9O5RAq3OpqnnkqlM=; b=NXdui81UP2Cr3ZAGiFBg9zV3CKCR7DoaMc2pd/MHFCkvVOtlayiWqSYjKRG3/Fc32iuo3Y xXLAUI/ep5mVdDAQ== From: "tip-bot2 for Ard Biesheuvel" Sender: tip-bot2@linutronix.de Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/boot] x86/decompressor: Call trampoline directly from C code Cc: Ard Biesheuvel , "Borislav Petkov (AMD)" , "Kirill A. Shutemov" , x86@kernel.org, linux-kernel@vger.kernel.org In-Reply-To: <20230807162720.545787-13-ardb@kernel.org> References: <20230807162720.545787-13-ardb@kernel.org> MIME-Version: 1.0 Message-ID: <169148424240.27769.15234737238955320139.tip-bot2@tip-bot2> Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.6 required=5.0 tests=BAYES_00,DATE_IN_PAST_06_12, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the x86/boot branch of tip: Commit-ID: 64ef578b6b6866bec012544416946533444036c8 Gitweb: https://git.kernel.org/tip/64ef578b6b6866bec012544416946533444036c8 Author: Ard Biesheuvel AuthorDate: Mon, 07 Aug 2023 18:27:09 +02:00 Committer: Borislav Petkov (AMD) CommitterDate: Mon, 07 Aug 2023 20:46:57 +02:00 x86/decompressor: Call trampoline directly from C code Instead of returning to the asm calling code to invoke the trampoline, call it straight from the C code that sets it up. That way, the struct return type is no longer needed for returning two values, and the call can be made conditional more cleanly in a subsequent patch. This means that all callee save 64-bit registers need to be preserved and restored, as their contents may not survive the legacy mode switch. Signed-off-by: Ard Biesheuvel Signed-off-by: Borislav Petkov (AMD) Acked-by: Kirill A. Shutemov Link: https://lore.kernel.org/r/20230807162720.545787-13-ardb@kernel.org --- arch/x86/boot/compressed/head_64.S | 31 ++++++++++--------------- arch/x86/boot/compressed/pgtable_64.c | 32 ++++++++++---------------- 2 files changed, 26 insertions(+), 37 deletions(-) diff --git a/arch/x86/boot/compressed/head_64.S b/arch/x86/boot/compressed/head_64.S index 37fd7b7..cd6e3e1 100644 --- a/arch/x86/boot/compressed/head_64.S +++ b/arch/x86/boot/compressed/head_64.S @@ -430,25 +430,14 @@ SYM_CODE_START(startup_64) #endif /* - * paging_prepare() sets up the trampoline and checks if we need to - * enable 5-level paging. - * - * paging_prepare() returns a two-quadword structure which lands - * into RDX:RAX: - * - Address of the trampoline is returned in RAX. - * - Non zero RDX means trampoline needs to enable 5-level - * paging. + * configure_5level_paging() updates the number of paging levels using + * a trampoline in 32-bit addressable memory if the current number does + * not match the desired number. * * Pass the boot_params pointer as the first argument. */ movq %r15, %rdi - call paging_prepare - - /* Pass the trampoline address and boolean flag as args #1 and #2 */ - movq %rax, %rdi - movq %rdx, %rsi - leaq TRAMPOLINE_32BIT_CODE_OFFSET(%rax), %rax - call *%rax + call configure_5level_paging /* * cleanup_trampoline() would restore trampoline memory. @@ -543,11 +532,14 @@ SYM_FUNC_END(.Lrelocated) .section ".rodata", "a", @progbits SYM_CODE_START(trampoline_32bit_src) /* - * Preserve live 64-bit registers on the stack: this is necessary - * because the architecture does not guarantee that GPRs will retain - * their full 64-bit values across a 32-bit mode switch. + * Preserve callee save 64-bit registers on the stack: this is + * necessary because the architecture does not guarantee that GPRs will + * retain their full 64-bit values across a 32-bit mode switch. */ pushq %r15 + pushq %r14 + pushq %r13 + pushq %r12 pushq %rbp pushq %rbx @@ -574,6 +566,9 @@ SYM_CODE_START(trampoline_32bit_src) /* Restore the preserved 64-bit registers */ popq %rbx popq %rbp + popq %r12 + popq %r13 + popq %r14 popq %r15 retq diff --git a/arch/x86/boot/compressed/pgtable_64.c b/arch/x86/boot/compressed/pgtable_64.c index 5198a05..f9cc86b 100644 --- a/arch/x86/boot/compressed/pgtable_64.c +++ b/arch/x86/boot/compressed/pgtable_64.c @@ -16,11 +16,6 @@ unsigned int __section(".data") pgdir_shift = 39; unsigned int __section(".data") ptrs_per_p4d = 1; #endif -struct paging_config { - unsigned long trampoline_start; - unsigned long l5_required; -}; - /* Buffer to preserve trampoline memory */ static char trampoline_save[TRAMPOLINE_32BIT_SIZE]; @@ -29,7 +24,7 @@ static char trampoline_save[TRAMPOLINE_32BIT_SIZE]; * purposes. * * Avoid putting the pointer into .bss as it will be cleared between - * paging_prepare() and extract_kernel(). + * configure_5level_paging() and extract_kernel(). */ unsigned long *trampoline_32bit __section(".data"); @@ -106,13 +101,13 @@ static unsigned long find_trampoline_placement(void) return bios_start - TRAMPOLINE_32BIT_SIZE; } -struct paging_config paging_prepare(void *rmode) +asmlinkage void configure_5level_paging(struct boot_params *bp) { - struct paging_config paging_config = {}; - void *tramp_code; + void (*toggle_la57)(void *trampoline, bool enable_5lvl); + bool l5_required = false; /* Initialize boot_params. Required for cmdline_find_option_bool(). */ - boot_params = rmode; + boot_params = bp; /* * Check if LA57 is desired and supported. @@ -130,7 +125,7 @@ struct paging_config paging_prepare(void *rmode) !cmdline_find_option_bool("no5lvl") && native_cpuid_eax(0) >= 7 && (native_cpuid_ecx(7) & (1 << (X86_FEATURE_LA57 & 31)))) { - paging_config.l5_required = 1; + l5_required = true; /* Initialize variables for 5-level paging */ __pgtable_l5_enabled = 1; @@ -138,9 +133,7 @@ struct paging_config paging_prepare(void *rmode) ptrs_per_p4d = 512; } - paging_config.trampoline_start = find_trampoline_placement(); - - trampoline_32bit = (unsigned long *)paging_config.trampoline_start; + trampoline_32bit = (unsigned long *)find_trampoline_placement(); /* Preserve trampoline memory */ memcpy(trampoline_save, trampoline_32bit, TRAMPOLINE_32BIT_SIZE); @@ -149,7 +142,7 @@ struct paging_config paging_prepare(void *rmode) memset(trampoline_32bit, 0, TRAMPOLINE_32BIT_SIZE); /* Copy trampoline code in place */ - tramp_code = memcpy(trampoline_32bit + + toggle_la57 = memcpy(trampoline_32bit + TRAMPOLINE_32BIT_CODE_OFFSET / sizeof(unsigned long), &trampoline_32bit_src, TRAMPOLINE_32BIT_CODE_SIZE); @@ -159,7 +152,8 @@ struct paging_config paging_prepare(void *rmode) * immediate absolute address, which needs to be adjusted based on the * placement of the trampoline. */ - *(u32 *)(tramp_code + trampoline_ljmp_imm_offset) += (unsigned long)tramp_code; + *(u32 *)((u8 *)toggle_la57 + trampoline_ljmp_imm_offset) += + (unsigned long)toggle_la57; /* * The code below prepares page table in trampoline memory. @@ -175,10 +169,10 @@ struct paging_config paging_prepare(void *rmode) * We are not going to use the page table in trampoline memory if we * are already in the desired paging mode. */ - if (paging_config.l5_required == !!(native_read_cr4() & X86_CR4_LA57)) + if (l5_required == !!(native_read_cr4() & X86_CR4_LA57)) goto out; - if (paging_config.l5_required) { + if (l5_required) { /* * For 4- to 5-level paging transition, set up current CR3 as * the first and the only entry in a new top-level page table. @@ -201,7 +195,7 @@ struct paging_config paging_prepare(void *rmode) } out: - return paging_config; + toggle_la57(trampoline_32bit, l5_required); } void cleanup_trampoline(void *pgtable)