Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp552062rdb; Mon, 29 Jan 2024 10:07:51 -0800 (PST) X-Google-Smtp-Source: AGHT+IGGAe2C0oJVZn5e7utoRDz3dLiQaZPxoef/V5nP7LlzSJsLV+GhXT+zRdQj/LiPEuxtRpzt X-Received: by 2002:a17:906:4c4e:b0:a35:ffaa:b43 with SMTP id d14-20020a1709064c4e00b00a35ffaa0b43mr522331ejw.50.1706551671181; Mon, 29 Jan 2024 10:07:51 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706551671; cv=pass; d=google.com; s=arc-20160816; b=wwP4UIbJAXUMDGW7fdbsJWpx83hEeVYemaApEBfERcqCmttETegCo83Kw7se/W1Nqb BAz10Cf9R6OxUs+Pzq+ulD/r1SDae15n7BKPCiBTmqp2brU7t1agrT6ntYdL9IGn8sb2 iRjllxBgdPlLssvoaBOJ9ZygoZtZtt4kMPX3L0/Vv5PJF8ri9cGFDv77Q1U5fyjDK22D p97zG6MLdqyk8ikgOK8wWdTML111eajf15p4ThJzE+XFsgvNZTLQnUN1wBu4/YQLG1Ya Mx99ZeWGXnxVg4eUl67UUWsFqBwSARO7z50UGfXFRJpTR1pdzqocUVeQ+mmZvcNM7tVh kSTg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:from:subject:message-id:references:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:in-reply-to:date :dkim-signature; bh=9xEowFwD+5Wv00RDtSivSyL+BDRLO0ZehSpXivDed+A=; fh=fMhMPvo8duafGkM4xZHdH7fULbau3etefTGsKa+Qy7I=; b=xjPTlIMQHmO258TeCV8tsqcl45ju6K8b8upZ0sh95EgZgFrQlmeUhoRfuBORqAFuVj ymIurDPkKhcJb6zqeUr4J+L2xS50yOLjpNOZHbQ8qfxpR2GRKNN50dbQ9xcVvwLTvWBt PwU3yrovnkoOhVvYca7gRIaltDYQ6I9WPM65/SfoFefqeQKfO9kigaPcdJDd24A2KQOc bYA+d8Jq/histK33jBLNwBO5IeXIaGEr7BFzVEAcP4PAanP6mtxWzXl39cOrhop2/n6e ck1Zval247N60HBHpF7fNjUoAaKygeF5x1SHUfN1G7ejs1dq3g9h9FXz+Ag+lOtY8Xkc 8zUw== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=GBOb2r6E; arc=pass (i=1 spf=pass spfdomain=flex--ardb.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-43275-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-43275-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id l16-20020a1709065a9000b00a33e9953e54si3827186ejq.645.2024.01.29.10.07.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Jan 2024 10:07:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-43275-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=GBOb2r6E; arc=pass (i=1 spf=pass spfdomain=flex--ardb.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-43275-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-43275-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id C00301F23E19 for ; Mon, 29 Jan 2024 18:07:50 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7E88D159579; Mon, 29 Jan 2024 18:05:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="GBOb2r6E" Received: from mail-wr1-f74.google.com (mail-wr1-f74.google.com [209.85.221.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B137B1586DC for ; Mon, 29 Jan 2024 18:05:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.74 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706551552; cv=none; b=fDh8Bk83sng/8W2qb5nOK6GOAlURYI9tx3mBD3kl4cuMfxiAIjWF7sTvVHLTrLe+lLeYEXtJ4fPpKiwhXsF9M5hvQwG57TZ4dKUr4neOHuKAptMQIXkRePifonN1sRL8/zZb/vA8bXFuvlj7MKvZvNWVcJ0E/o0iAL9od3+QjSY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706551552; c=relaxed/simple; bh=v25fWsh3EuNTmaKxasEu19T5yVTc0toeSGH/1nXhFd8=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=T8Sxow4WMGrXtu/v9WWEB6dqvHq3XYyBC3jUH8aEkdNGfYu4WRltTMMhq9/5nTVlh/yw+iRFPS0WeJpM7tWIvGk6a2EfXtHn1pWWHoAMIgBpt365RmZJeh0QGWe6FL6q242ahe8ipEH1I+neQaC0auLwVjLUiHvTxFVogIEOVI4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=GBOb2r6E; arc=none smtp.client-ip=209.85.221.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--ardb.bounces.google.com Received: by mail-wr1-f74.google.com with SMTP id ffacd0b85a97d-33aeb0d78fbso548323f8f.1 for ; Mon, 29 Jan 2024 10:05:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1706551548; x=1707156348; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=9xEowFwD+5Wv00RDtSivSyL+BDRLO0ZehSpXivDed+A=; b=GBOb2r6EC9THXIBIHjRy+X+I9Q0V36WLEyemUlVjTQt+dKB5+VgD43sZHnnfEICZ/R REw+2moR/SYlxFmzxbCbtmwJXbzMe3GOZpmRvZGmTz+MI64LjB/Luaty7qlP7IK/IDAG RP4L9jep+V2Rz9kZ9mf67XIqSPIo0PtlAnt7xN/fhwUh0ySpYTAkutNQY4R7kpgZ2pgN fLZYw1PbVi/W6AEFjLsQnkqLiPOSSbnq2ZVf7W7HrxS0OuLdpBoMQgJCbljEo4DJvHOe ATgOVY2bd8AE5YK5jaHKzGpYeNBt5MtXI+aXFrJSFenRDzxwv1UiBzULFzfdSNC5BHJi ZtUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706551548; x=1707156348; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=9xEowFwD+5Wv00RDtSivSyL+BDRLO0ZehSpXivDed+A=; b=ARXk45DRLubKce7MQWbjs72dere1L5s39vQXmiUDGd5DZboDsMhfi63iW7C5zEi1FA wLGcG3vrzSLARlpASl2sDT8NXE+Qhpzvjw+2a4kTRAex1oXgOzF9A3KCHLOQtu3dQKZD KAQJctVb9TgAPsYweHoJFKQ2o0mwyGnVn0mpm9wYSYQSqHsT22NWdvL82b0RDMp9gfI/ srzoVhFDUo0pRD4GhoEebelodm31wbNQmbBmLrbmdN9I18uCla2DgUTN4GCv2z2QWTlc nHrrBb9O8arJNgIo4E22uoIsVio5PCZEJu4S3L44wzFTfCkEO4PJZ40siX3syAEs/lv/ R3GA== X-Gm-Message-State: AOJu0YwyEaiAnBglCV417Pik9XAcDWpGscYTPlVfprN40MxQxYlaKhsD Yq+xI0lJMjpp9a9CD2r02mEB2upBw87k0+Cs3P5bNHnwonwW+qwXklA2YWzbT2ilY03Y0rekZVw llXiSuHFLEiRXqJEf0JvBMRs4tln04desyv9Fc8N9iE3gMHvPdHMJwZe++FBNX8hulzomuyw6hl SvZXY9F+H/fxE/NtqMHH/6VwlKh847tA== X-Received: from palermo.c.googlers.com ([fda3:e722:ac3:cc00:28:9cb1:c0a8:118a]) (user=ardb job=sendgmr) by 2002:a05:6000:809:b0:33a:e9d6:668a with SMTP id bt9-20020a056000080900b0033ae9d6668amr75756wrb.3.1706551548069; Mon, 29 Jan 2024 10:05:48 -0800 (PST) Date: Mon, 29 Jan 2024 19:05:11 +0100 In-Reply-To: <20240129180502.4069817-21-ardb+git@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20240129180502.4069817-21-ardb+git@google.com> X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-Developer-Signature: v=1; a=openpgp-sha256; l=12667; i=ardb@kernel.org; h=from:subject; bh=xCp9y/zniv6u2e+W/u3rfNN518sZwfjch2udjGr9xyA=; b=owGbwMvMwCFmkMcZplerG8N4Wi2JIXX7i+szZYN3bri+0CFQTrw8lDWdWVexUljcw+/gh/15D 7i6Vlt1lLIwiHEwyIopsgjM/vtu5+mJUrXOs2Rh5rAygQxh4OIUgIkctWBk2KFXfH+q7bTSpUop G2pP6R1KWrW9fV3eqX/Xkxo2y+bohTD8z/se3tZV42x+fUa+myfraxZTRfaitVVmKjJ/41a5FuQ zAQA= X-Mailer: git-send-email 2.43.0.429.g432eaa2c6b-goog Message-ID: <20240129180502.4069817-29-ardb+git@google.com> Subject: [PATCH v3 08/19] x86/head64: Replace pointer fixups with PIE codegen From: Ard Biesheuvel To: linux-kernel@vger.kernel.org Cc: Ard Biesheuvel , Kevin Loughlin , Tom Lendacky , Dionna Glaze , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , Andy Lutomirski , Arnd Bergmann , Nathan Chancellor , Nick Desaulniers , Justin Stitt , Kees Cook , Brian Gerst , linux-arch@vger.kernel.org, llvm@lists.linux.dev Content-Type: text/plain; charset="UTF-8" From: Ard Biesheuvel Some of the C code in head64.c may be called from a different virtual address than it was linked at. Currently, we deal with this by using ordinary, position dependent codegen, and fixing up all symbol references on the fly. This is fragile and tricky to maintain. It is also unnecessary: we can use position independent codegen (with hidden visibility) to ensure that all compiler generated symbol references are RIP-relative, removing the need for fixups entirely. It does mean we need explicit references to kernel virtual addresses to be generated by hand, so generate those using a movabs instruction in inline asm in the handful places where we actually need this. Signed-off-by: Ard Biesheuvel --- arch/x86/Makefile | 8 ++ arch/x86/boot/compressed/Makefile | 2 +- arch/x86/include/asm/desc.h | 3 +- arch/x86/include/asm/setup.h | 4 +- arch/x86/kernel/Makefile | 5 ++ arch/x86/kernel/head64.c | 88 +++++++------------- arch/x86/kernel/head_64.S | 5 +- 7 files changed, 51 insertions(+), 64 deletions(-) diff --git a/arch/x86/Makefile b/arch/x86/Makefile index 1a068de12a56..2b5954e75318 100644 --- a/arch/x86/Makefile +++ b/arch/x86/Makefile @@ -168,6 +168,14 @@ else KBUILD_CFLAGS += -mcmodel=kernel KBUILD_RUSTFLAGS += -Cno-redzone=y KBUILD_RUSTFLAGS += -Ccode-model=kernel + + PIE_CFLAGS-$(CONFIG_STACKPROTECTOR) += -fno-stack-protector + PIE_CFLAGS-$(CONFIG_LTO) += -fno-lto + + PIE_CFLAGS := -fpie -mcmodel=small $(PIE_CFLAGS-y) \ + -include $(srctree)/include/linux/hidden.h + + export PIE_CFLAGS endif # diff --git a/arch/x86/boot/compressed/Makefile b/arch/x86/boot/compressed/Makefile index f19c038409aa..bccee07eae60 100644 --- a/arch/x86/boot/compressed/Makefile +++ b/arch/x86/boot/compressed/Makefile @@ -84,7 +84,7 @@ LDFLAGS_vmlinux += -T hostprogs := mkpiggy HOST_EXTRACFLAGS += -I$(srctree)/tools/include -sed-voffset := -e 's/^\([0-9a-fA-F]*\) [ABCDGRSTVW] \(_text\|__bss_start\|_end\)$$/\#define VO_\2 _AC(0x\1,UL)/p' +sed-voffset := -e 's/^\([0-9a-fA-F]*\) [ABbCDGRSTtVW] \(_text\|__bss_start\|_end\)$$/\#define VO_\2 _AC(0x\1,UL)/p' quiet_cmd_voffset = VOFFSET $@ cmd_voffset = $(NM) $< | sed -n $(sed-voffset) > $@ diff --git a/arch/x86/include/asm/desc.h b/arch/x86/include/asm/desc.h index ab97b22ac04a..2e9809feeacd 100644 --- a/arch/x86/include/asm/desc.h +++ b/arch/x86/include/asm/desc.h @@ -134,7 +134,8 @@ static inline void paravirt_free_ldt(struct desc_struct *ldt, unsigned entries) #define store_ldt(ldt) asm("sldt %0" : "=m"(ldt)) -static inline void native_write_idt_entry(gate_desc *idt, int entry, const gate_desc *gate) +static __always_inline void +native_write_idt_entry(gate_desc *idt, int entry, const gate_desc *gate) { memcpy(&idt[entry], gate, sizeof(*gate)); } diff --git a/arch/x86/include/asm/setup.h b/arch/x86/include/asm/setup.h index 5c83729c8e71..b004f1b9a052 100644 --- a/arch/x86/include/asm/setup.h +++ b/arch/x86/include/asm/setup.h @@ -47,8 +47,8 @@ extern unsigned long saved_video_mode; extern void reserve_standard_io_resources(void); extern void i386_reserve_resources(void); -extern unsigned long __startup_64(unsigned long physaddr, struct boot_params *bp); -extern void startup_64_setup_env(unsigned long physbase); +extern unsigned long __startup_64(struct boot_params *bp); +extern void startup_64_setup_env(void); extern void early_setup_idt(void); extern void __init do_early_exception(struct pt_regs *regs, int trapnr); diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile index 0000325ab98f..42db41b04d8e 100644 --- a/arch/x86/kernel/Makefile +++ b/arch/x86/kernel/Makefile @@ -21,6 +21,11 @@ CFLAGS_REMOVE_sev.o = -pg CFLAGS_REMOVE_rethook.o = -pg endif +# head64.c contains C code that may execute from a different virtual address +# than it was linked at, so we always build it using PIE codegen +CFLAGS_head64.o += $(PIE_CFLAGS) +UBSAN_SANITIZE_head64.o := n + KASAN_SANITIZE_head$(BITS).o := n KASAN_SANITIZE_dumpstack.o := n KASAN_SANITIZE_dumpstack_$(BITS).o := n diff --git a/arch/x86/kernel/head64.c b/arch/x86/kernel/head64.c index d636bb02213f..a4a380494703 100644 --- a/arch/x86/kernel/head64.c +++ b/arch/x86/kernel/head64.c @@ -74,15 +74,10 @@ static struct desc_ptr startup_gdt_descr __initdata = { .address = 0, }; -static void __head *fixup_pointer(void *ptr, unsigned long physaddr) -{ - return ptr - (void *)_text + (void *)physaddr; -} - -static unsigned long __head *fixup_long(void *ptr, unsigned long physaddr) -{ - return fixup_pointer(ptr, physaddr); -} +#define __va_symbol(sym) ({ \ + unsigned long __v; \ + asm("movq $" __stringify(sym) ", %0":"=r"(__v)); \ + __v; }) static unsigned long __head sme_postprocess_startup(struct boot_params *bp, pmdval_t *pmd) { @@ -99,8 +94,8 @@ static unsigned long __head sme_postprocess_startup(struct boot_params *bp, pmdv * attribute. */ if (sme_get_me_mask()) { - vaddr = (unsigned long)__start_bss_decrypted; - vaddr_end = (unsigned long)__end_bss_decrypted; + vaddr = __va_symbol(__start_bss_decrypted); + vaddr_end = __va_symbol(__end_bss_decrypted); for (; vaddr < vaddr_end; vaddr += PMD_SIZE) { /* @@ -127,25 +122,17 @@ static unsigned long __head sme_postprocess_startup(struct boot_params *bp, pmdv return sme_get_me_mask(); } -/* Code in __startup_64() can be relocated during execution, but the compiler - * doesn't have to generate PC-relative relocations when accessing globals from - * that function. Clang actually does not generate them, which leads to - * boot-time crashes. To work around this problem, every global pointer must - * be adjusted using fixup_pointer(). - */ -unsigned long __head __startup_64(unsigned long physaddr, - struct boot_params *bp) +unsigned long __head __startup_64(struct boot_params *bp) { + unsigned long physaddr = (unsigned long)_text; unsigned long load_delta, *p; unsigned long pgtable_flags; pgdval_t *pgd; p4dval_t *p4d; pudval_t *pud; pmdval_t *pmd, pmd_entry; - pteval_t *mask_ptr; bool la57; int i; - unsigned int *next_pgt_ptr; la57 = pgtable_l5_enabled(); @@ -157,7 +144,7 @@ unsigned long __head __startup_64(unsigned long physaddr, * Compute the delta between the address I am compiled to run at * and the address I am actually running at. */ - load_delta = physaddr - (unsigned long)(_text - __START_KERNEL_map); + load_delta = physaddr - (__va_symbol(_text) - __START_KERNEL_map); /* Is the address not 2M aligned? */ if (load_delta & ~PMD_MASK) @@ -168,26 +155,24 @@ unsigned long __head __startup_64(unsigned long physaddr, /* Fixup the physical addresses in the page table */ - pgd = fixup_pointer(early_top_pgt, physaddr); + pgd = (pgdval_t *)early_top_pgt; p = pgd + pgd_index(__START_KERNEL_map); if (la57) *p = (unsigned long)level4_kernel_pgt; else *p = (unsigned long)level3_kernel_pgt; - *p += _PAGE_TABLE_NOENC - __START_KERNEL_map + load_delta; + *p += _PAGE_TABLE_NOENC + sme_get_me_mask(); if (la57) { - p4d = fixup_pointer(level4_kernel_pgt, physaddr); + p4d = (p4dval_t *)level4_kernel_pgt; p4d[511] += load_delta; } - pud = fixup_pointer(level3_kernel_pgt, physaddr); - pud[510] += load_delta; - pud[511] += load_delta; + level3_kernel_pgt[510].pud += load_delta; + level3_kernel_pgt[511].pud += load_delta; - pmd = fixup_pointer(level2_fixmap_pgt, physaddr); for (i = FIXMAP_PMD_TOP; i > FIXMAP_PMD_TOP - FIXMAP_PMD_NUM; i--) - pmd[i] += load_delta; + level2_fixmap_pgt[i].pmd += load_delta; /* * Set up the identity mapping for the switchover. These @@ -196,15 +181,13 @@ unsigned long __head __startup_64(unsigned long physaddr, * it avoids problems around wraparound. */ - next_pgt_ptr = fixup_pointer(&next_early_pgt, physaddr); - pud = fixup_pointer(early_dynamic_pgts[(*next_pgt_ptr)++], physaddr); - pmd = fixup_pointer(early_dynamic_pgts[(*next_pgt_ptr)++], physaddr); + pud = (pudval_t *)early_dynamic_pgts[next_early_pgt++]; + pmd = (pmdval_t *)early_dynamic_pgts[next_early_pgt++]; pgtable_flags = _KERNPG_TABLE_NOENC + sme_get_me_mask(); if (la57) { - p4d = fixup_pointer(early_dynamic_pgts[(*next_pgt_ptr)++], - physaddr); + p4d = (p4dval_t *)early_dynamic_pgts[next_early_pgt++]; i = (physaddr >> PGDIR_SHIFT) % PTRS_PER_PGD; pgd[i + 0] = (pgdval_t)p4d + pgtable_flags; @@ -225,8 +208,7 @@ unsigned long __head __startup_64(unsigned long physaddr, pmd_entry = __PAGE_KERNEL_LARGE_EXEC & ~_PAGE_GLOBAL; /* Filter out unsupported __PAGE_KERNEL_* bits: */ - mask_ptr = fixup_pointer(&__supported_pte_mask, physaddr); - pmd_entry &= *mask_ptr; + pmd_entry &= __supported_pte_mask; pmd_entry += sme_get_me_mask(); pmd_entry += physaddr; @@ -252,14 +234,14 @@ unsigned long __head __startup_64(unsigned long physaddr, * error, causing the BIOS to halt the system. */ - pmd = fixup_pointer(level2_kernel_pgt, physaddr); + pmd = (pmdval_t *)level2_kernel_pgt; /* invalidate pages before the kernel image */ - for (i = 0; i < pmd_index((unsigned long)_text); i++) + for (i = 0; i < pmd_index(__va_symbol(_text)); i++) pmd[i] &= ~_PAGE_PRESENT; /* fixup pages that are part of the kernel image */ - for (; i <= pmd_index((unsigned long)_end); i++) + for (; i <= pmd_index(__va_symbol(_end)); i++) if (pmd[i] & _PAGE_PRESENT) pmd[i] += load_delta; @@ -271,7 +253,7 @@ unsigned long __head __startup_64(unsigned long physaddr, * Fixup phys_base - remove the memory encryption mask to obtain * the true physical address. */ - *fixup_long(&phys_base, physaddr) += load_delta - sme_get_me_mask(); + phys_base += load_delta - sme_get_me_mask(); return sme_postprocess_startup(bp, pmd); } @@ -553,22 +535,16 @@ static void set_bringup_idt_handler(gate_desc *idt, int n, void *handler) } /* This runs while still in the direct mapping */ -static void __head startup_64_load_idt(unsigned long physbase) +static void __head startup_64_load_idt(void) { - struct desc_ptr *desc = fixup_pointer(&bringup_idt_descr, physbase); - gate_desc *idt = fixup_pointer(bringup_idt_table, physbase); - - - if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) { - void *handler; + gate_desc *idt = bringup_idt_table; + if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) /* VMM Communication Exception */ - handler = fixup_pointer(vc_no_ghcb, physbase); - set_bringup_idt_handler(idt, X86_TRAP_VC, handler); - } + set_bringup_idt_handler(idt, X86_TRAP_VC, vc_no_ghcb); - desc->address = (unsigned long)idt; - native_load_idt(desc); + bringup_idt_descr.address = (unsigned long)idt; + native_load_idt(&bringup_idt_descr); } /* This is used when running on kernel addresses */ @@ -587,10 +563,10 @@ void early_setup_idt(void) /* * Setup boot CPU state needed before kernel switches to virtual addresses. */ -void __head startup_64_setup_env(unsigned long physbase) +void __head startup_64_setup_env(void) { /* Load GDT */ - startup_gdt_descr.address = (unsigned long)fixup_pointer(startup_gdt, physbase); + startup_gdt_descr.address = (unsigned long)startup_gdt; native_load_gdt(&startup_gdt_descr); /* New GDT is live - reload data segment registers */ @@ -598,5 +574,5 @@ void __head startup_64_setup_env(unsigned long physbase) "movl %%eax, %%ss\n" "movl %%eax, %%es\n" : : "a"(__KERNEL_DS) : "memory"); - startup_64_load_idt(physbase); + startup_64_load_idt(); } diff --git a/arch/x86/kernel/head_64.S b/arch/x86/kernel/head_64.S index 953b82be4cd4..b0508e84f756 100644 --- a/arch/x86/kernel/head_64.S +++ b/arch/x86/kernel/head_64.S @@ -67,8 +67,6 @@ SYM_CODE_START_NOALIGN(startup_64) /* Set up the stack for verify_cpu() */ leaq (__end_init_task - PTREGS_SIZE)(%rip), %rsp - leaq _text(%rip), %rdi - /* Setup GSBASE to allow stack canary access for C code */ movl $MSR_GS_BASE, %ecx leaq INIT_PER_CPU_VAR(fixed_percpu_data)(%rip), %rdx @@ -107,8 +105,7 @@ SYM_CODE_START_NOALIGN(startup_64) * is active) to be added to the initial pgdir entry that will be * programmed into CR3. */ - leaq _text(%rip), %rdi - movq %r15, %rsi + movq %r15, %rdi call __startup_64 /* Form the CR3 value being sure to include the CR3 modifier */ -- 2.43.0.429.g432eaa2c6b-goog