[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230412184502.145289-1-brgerst@gmail.com>
Date: Wed, 12 Apr 2023 14:44:56 -0400
From: Brian Gerst <brgerst@...il.com>
To: linux-kernel@...r.kernel.org, x86@...nel.org
Cc: Thomas Gleixner <tglx@...utronix.de>,
Borislav Petkov <bp@...en8.de>,
"H . Peter Anvin" <hpa@...or.com>,
Peter Zijlstra <peterz@...radead.org>,
Ingo Molnar <mingo@...nel.org>, Brian Gerst <brgerst@...il.com>
Subject: [PATCH v2 0/6] x86/boot: Clean up handling of boot_params pointer
On entry from the bootloader, RSI contains the pointer to the boot_params
data structure. The pointer is passed to x86_64_start_kernel(), which
requires preserving RSI all the way though the early boot asm code.
Change it to copy the boot_params data as soon as possible, which also
has the benefit of not needing to remap the real mode data pages if
memory encryption is enabled.
Note: The memory encryption changes are untested due to lack of hardware.
Brian Gerst (6):
x86/boot: Move sanitize_boot_params()
x86/boot: Remove extra call to copy_bootdata()
x86/boot: Clean up get_cmd_line_ptr()
x86/boot: Move copy_bootdata() to very early boot.
x86/boot: Use copied boot data in __startup_64()
x86/boot: Use copied boot data in sme_enable()
arch/x86/include/asm/mem_encrypt.h | 4 +-
arch/x86/include/asm/setup.h | 9 +++--
arch/x86/kernel/head64.c | 59 ++++++++++-------------------
arch/x86/kernel/head_64.S | 26 +++----------
arch/x86/kernel/setup.c | 2 +-
arch/x86/mm/mem_encrypt_amd.c | 61 ------------------------------
arch/x86/mm/mem_encrypt_identity.c | 42 ++++++++++----------
arch/x86/xen/enlighten_pv.c | 2 +-
8 files changed, 58 insertions(+), 147 deletions(-)
--
2.39.2
Powered by blists - more mailing lists