// SPDX-License-Identifier: GPL-2.0-only #include #include #include #include "misc.h" static void set_idt_entry(int vector, void (*handler)(void)) { unsigned long address = (unsigned long)handler; gate_desc entry; memset(&entry, 0, sizeof(entry)); entry.offset_low = (u16)(address & 0xffff); entry.segment = __KERNEL_CS; entry.bits.type = GATE_TRAP; entry.bits.p = 1; entry.offset_middle = (u16)((address >> 16) & 0xffff); entry.offset_high = (u32)(address >> 32); memcpy(&boot_idt[vector], &entry, sizeof(entry)); } /* Have this here so we don't need to include */ static void load_boot_idt(const struct desc_ptr *dtr) { asm volatile("lidt %0"::"m" (*dtr)); } /* Setup IDT before kernel jumping to .Lrelocated */ void load_stage1_idt(void) { boot_idt_desc.address = (unsigned long)boot_idt; if (IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT)) set_idt_entry(X86_TRAP_VC, boot_stage1_vc); load_boot_idt(&boot_idt_desc); } /* * Setup IDT after kernel jumping to .Lrelocated. * * initialize_identity_maps() needs a #PF handler to be setup * in order to be able to fault-in identity mapping ranges; see * do_boot_page_fault(). * * This #PF handler setup needs to happen in load_stage2_idt() where the * IDT is loaded and there the #VC IDT entry gets setup too. * * In order to be able to handle #VCs, one needs a GHCB which * gets setup with an already set up pagetable, which is done in * initialize_identity_maps(). And there's the catch 22: the boot #VC * handler do_boot_stage2_vc() needs to call early_setup_ghcb() itself * (and, especially set_page_decrypted()) because the SEV-ES setup code * cannot initialize a GHCB as there's no #PF handler yet... */ void load_stage2_idt(void) { boot_idt_desc.address = (unsigned long)boot_idt; set_idt_entry(X86_TRAP_PF, boot_page_fault); set_idt_entry(X86_TRAP_NMI, boot_nmi_trap); #ifdef CONFIG_AMD_MEM_ENCRYPT /* * Clear the second stage #VC handler in case guest types * needing #VC have not been detected. */ if (sev_status & BIT(1)) set_idt_entry(X86_TRAP_VC, boot_stage2_vc); else set_idt_entry(X86_TRAP_VC, NULL); #endif load_boot_idt(&boot_idt_desc); } void cleanup_exception_handling(void) { /* * Flush GHCB from cache and map it encrypted again when running as * SEV-ES guest. */ sev_es_shutdown_ghcb(); /* Set a null-idt, disabling #PF and #VC handling */ boot_idt_desc.size = 0; boot_idt_desc.address = 0; load_boot_idt(&boot_idt_desc); }