public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Krish Sadhukhan <krish.sadhukhan@oracle.com>
To: Varad Gautam <varadgautam@gmail.com>,
	Zixuan Wang <zixuanwang@google.com>,
	Nadav Amit <nadav.amit@gmail.com>, Marc Orr <marcorr@google.com>,
	Joerg Roedel <jroedel@suse.de>, kvm list <kvm@vger.kernel.org>,
	Linux Virtualization <virtualization@lists.linux-foundation.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Andrew Jones <drjones@redhat.com>,
	bp@suse.de, Thomas.Lendacky@amd.com, brijesh.singh@amd.com,
	Hyunwook Baek <baekhw@google.com>,
	Erdem Aktas <erdemaktas@google.com>,
	Tom Roeder <tmroeder@google.com>
Cc: Varad Gautam <varad.gautam@suse.com>
Subject: Re: [kvm-unit-tests PATCH v2 5/6] cstart64.S: x86_64 bootstrapping after exiting EFI
Date: Tue, 24 Aug 2021 15:11:27 -0700	[thread overview]
Message-ID: <6cba72a3-3db7-674d-29e2-43fa7d117a1a@oracle.com> (raw)
In-Reply-To: <20210819113400.26516-6-varad.gautam@suse.com>


On 8/19/21 4:33 AM, Varad Gautam wrote:
> EFI sets up long mode with arbitrary state before calling the
> image entrypoint. To run the testcases at hand, it is necessary
> to redo some of the bootstrapping to not rely on what EFI
> provided.
>
> Adapt start64() for EFI testcases to fixup %rsp/GDT/IDT/TSS and
> friends, and jump here after relocation from efi_main. Switch to
> RIP-relative addressing where necessary.
>
> Initially leave out:
> - AP init - leave EFI to single CPU
> - Testcase arg passing
>
> Signed-off-by: Varad Gautam<varad.gautam@suse.com>
> ---
> v2: Fix TSS setup in cstart64 on CONFIG_EFI.
>
>   x86/cstart64.S | 70 +++++++++++++++++++++++++++++++++++++++++++++-----
>   x86/efi_main.c |  1 +
>   2 files changed, 65 insertions(+), 6 deletions(-)
>
> diff --git a/x86/cstart64.S b/x86/cstart64.S
> index 98e7848..547f3fb 100644
> --- a/x86/cstart64.S
> +++ b/x86/cstart64.S


I am wondering if it's cleaner to create a separate .S file for EFI 
because so many #ifdefs are reducing readability of the code.

> @@ -242,16 +242,17 @@ ap_start32:
>   
>   .code64
>   save_id:
> -#ifndef CONFIG_EFI
>   	movl $(APIC_DEFAULT_PHYS_BASE + APIC_ID), %eax
>   	movl (%rax), %eax
>   	shrl $24, %eax
> +#ifdef CONFIG_EFI
> +	lock btsl %eax, online_cpus(%rip)
> +#else
>   	lock btsl %eax, online_cpus
>   #endif
>   	retq
>   
>   ap_start64:
> -#ifndef CONFIG_EFI
>   	call reset_apic
>   	call load_tss
>   	call enable_apic
> @@ -259,12 +260,38 @@ ap_start64:
>   	call enable_x2apic
>   	sti
>   	nop
> +#ifdef CONFIG_EFI
> +	lock incw cpu_online_count(%rip)
> +#else
>   	lock incw cpu_online_count
>   #endif
> +
>   1:	hlt
>   	jmp 1b
>   
>   #ifdef CONFIG_EFI
> +setup_gdt64:
> +	lgdt gdt64_desc(%rip)
> +	call load_tss
> +
> +	setup_segments
> +
> +	movabsq $flush_cs, %rax
> +	pushq $0x8
> +	pushq %rax
> +	retfq
> +flush_cs:
> +	ret
> +
> +setup_idt64:
> +	lidtq idt_descr(%rip)
> +	ret
> +
> +setup_cr3:
> +	movabsq $ptl4, %rax
> +	mov %rax, %cr3
> +	ret
> +
>   .globl _efi_pe_entry
>   _efi_pe_entry:
>   	# EFI image loader calls this with rcx=efi_handle,
> @@ -276,15 +303,27 @@ _efi_pe_entry:
>   	pushq   %rsi
>   
>   	call efi_main
> -#endif
>   
> +.globl start64
>   start64:
> -#ifndef CONFIG_EFI
> +	cli
> +	lea stacktop(%rip), %rsp
> +
> +	setup_percpu_area
> +	call setup_gdt64
> +	call setup_idt64
> +	call setup_cr3
> +#else
> +start64:
> +#endif
>   	call reset_apic
> +#ifndef CONFIG_EFI
>   	call load_tss
> +#endif
>   	call mask_pic_interrupts
>   	call enable_apic
>   	call save_id
> +#ifndef CONFIG_EFI
>   	mov mb_boot_info(%rip), %rbx
>   	mov %rbx, %rdi
>   	call setup_multiboot
> @@ -292,18 +331,24 @@ start64:
>   	mov mb_cmdline(%rbx), %eax
>   	mov %rax, __args(%rip)
>   	call __setup_args
> +#endif
>   
>   	call ap_init
>   	call enable_x2apic
>   	call smp_init
>   
> +#ifdef CONFIG_EFI
> +	mov $0, %edi
> +	mov $0, %rsi
> +	mov $0, %rdx
> +#else
>   	mov __argc(%rip), %edi
>   	lea __argv(%rip), %rsi
>   	lea __environ(%rip), %rdx
> +#endif
>   	call main
>   	mov %eax, %edi
>   	call exit
> -#endif
>   
>   .globl setup_5level_page_table
>   setup_5level_page_table:
> @@ -330,6 +375,7 @@ online_cpus:
>   load_tss:
>   #ifndef CONFIG_EFI
>   	lidtq idt_descr
> +#endif
>   	mov $(APIC_DEFAULT_PHYS_BASE + APIC_ID), %eax
>   	mov (%rax), %eax
>   	shr $24, %eax
> @@ -337,6 +383,18 @@ load_tss:
>   	shl $4, %ebx
>   	mov $((tss_end - tss) / max_cpus), %edx
>   	imul %edx
> +#ifdef CONFIG_EFI
> +	lea tss(%rip), %rax
> +	lea tss_descr(%rip), %rcx
> +	add %rbx, %rcx
> +	mov %ax, 2(%rcx)
> +	shr $16, %rax
> +	mov %al, 4(%rcx)
> +	shr $8, %rax
> +	mov %al, 7(%rcx)
> +	shr $8, %rax
> +	mov %eax, 8(%rcx)
> +#else
>   	add $tss, %rax
>   	mov %ax, tss_descr+2(%rbx)
>   	shr $16, %rax
> @@ -345,9 +403,9 @@ load_tss:
>   	mov %al, tss_descr+7(%rbx)
>   	shr $8, %rax
>   	mov %eax, tss_descr+8(%rbx)
> +#endif
>   	lea tss_descr-gdt64(%rbx), %rax
>   	ltr %ax
> -#endif
>   	ret
>   
>   ap_init:
> diff --git a/x86/efi_main.c b/x86/efi_main.c
> index be3f9ab..c542fb9 100644
> --- a/x86/efi_main.c
> +++ b/x86/efi_main.c
> @@ -7,6 +7,7 @@ efi_system_table_t *efi_system_table = NULL;
>   
>   extern char ImageBase;
>   extern char _DYNAMIC;
> +extern void start64(void);
>   
>   static void efi_free_pool(void *ptr)
>   {

  reply	other threads:[~2021-08-24 22:11 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-08-19 11:33 [kvm-unit-tests PATCH v2 0/6] Initial x86_64 UEFI support Varad Gautam
2021-08-19 11:33 ` [kvm-unit-tests PATCH v2 1/6] x86: Build tests as PE objects for the EFI loader Varad Gautam
2021-08-19 11:33 ` [kvm-unit-tests PATCH v2 2/6] x86: Call efi_main from _efi_pe_entry Varad Gautam
2021-08-24 22:08   ` Krish Sadhukhan
2021-08-19 11:33 ` [kvm-unit-tests PATCH v2 3/6] x86: efi_main: Get EFI memory map and exit boot services Varad Gautam
2021-08-24 22:10   ` Krish Sadhukhan
2021-08-19 11:33 ` [kvm-unit-tests PATCH v2 4/6] x86: efi_main: Self-relocate ELF .dynamic addresses Varad Gautam
2021-08-24 22:10   ` Krish Sadhukhan
2021-08-19 11:33 ` [kvm-unit-tests PATCH v2 5/6] cstart64.S: x86_64 bootstrapping after exiting EFI Varad Gautam
2021-08-24 22:11   ` Krish Sadhukhan [this message]
2021-08-19 11:34 ` [kvm-unit-tests PATCH v2 6/6] x86 UEFI: Convert x86 test cases to PIC Varad Gautam
2021-08-24 22:12   ` Krish Sadhukhan
2021-08-21  0:01 ` [kvm-unit-tests PATCH v2 0/6] Initial x86_64 UEFI support Sean Christopherson
2021-08-21  0:42   ` Zixuan Wang

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=6cba72a3-3db7-674d-29e2-43fa7d117a1a@oracle.com \
    --to=krish.sadhukhan@oracle.com \
    --cc=Thomas.Lendacky@amd.com \
    --cc=baekhw@google.com \
    --cc=bp@suse.de \
    --cc=brijesh.singh@amd.com \
    --cc=drjones@redhat.com \
    --cc=erdemaktas@google.com \
    --cc=jroedel@suse.de \
    --cc=kvm@vger.kernel.org \
    --cc=marcorr@google.com \
    --cc=nadav.amit@gmail.com \
    --cc=pbonzini@redhat.com \
    --cc=tmroeder@google.com \
    --cc=varad.gautam@suse.com \
    --cc=varadgautam@gmail.com \
    --cc=virtualization@lists.linux-foundation.org \
    --cc=zixuanwang@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox