18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 28c2ecf20Sopenharmony_ci#include <linux/acpi.h> 38c2ecf20Sopenharmony_ci 48c2ecf20Sopenharmony_ci#include <xen/hvc-console.h> 58c2ecf20Sopenharmony_ci 68c2ecf20Sopenharmony_ci#include <asm/io_apic.h> 78c2ecf20Sopenharmony_ci#include <asm/hypervisor.h> 88c2ecf20Sopenharmony_ci#include <asm/e820/api.h> 98c2ecf20Sopenharmony_ci#include <asm/x86_init.h> 108c2ecf20Sopenharmony_ci 118c2ecf20Sopenharmony_ci#include <asm/xen/interface.h> 128c2ecf20Sopenharmony_ci 138c2ecf20Sopenharmony_ci#include <xen/xen.h> 148c2ecf20Sopenharmony_ci#include <xen/interface/hvm/start_info.h> 158c2ecf20Sopenharmony_ci 168c2ecf20Sopenharmony_ci/* 178c2ecf20Sopenharmony_ci * PVH variables. 188c2ecf20Sopenharmony_ci * 198c2ecf20Sopenharmony_ci * pvh_bootparams and pvh_start_info need to live in the data segment since 208c2ecf20Sopenharmony_ci * they are used after startup_{32|64}, which clear .bss, are invoked. 218c2ecf20Sopenharmony_ci */ 228c2ecf20Sopenharmony_cistruct boot_params pvh_bootparams __section(".data"); 238c2ecf20Sopenharmony_cistruct hvm_start_info pvh_start_info __section(".data"); 248c2ecf20Sopenharmony_ci 258c2ecf20Sopenharmony_ciunsigned int pvh_start_info_sz = sizeof(pvh_start_info); 268c2ecf20Sopenharmony_ci 278c2ecf20Sopenharmony_cistatic u64 pvh_get_root_pointer(void) 288c2ecf20Sopenharmony_ci{ 298c2ecf20Sopenharmony_ci return pvh_start_info.rsdp_paddr; 308c2ecf20Sopenharmony_ci} 318c2ecf20Sopenharmony_ci 328c2ecf20Sopenharmony_ci/* 338c2ecf20Sopenharmony_ci * Xen guests are able to obtain the memory map from the hypervisor via the 348c2ecf20Sopenharmony_ci * HYPERVISOR_memory_op hypercall. 358c2ecf20Sopenharmony_ci * If we are trying to boot a Xen PVH guest, it is expected that the kernel 368c2ecf20Sopenharmony_ci * will have been configured to provide an override for this routine to do 378c2ecf20Sopenharmony_ci * just that. 388c2ecf20Sopenharmony_ci */ 398c2ecf20Sopenharmony_civoid __init __weak mem_map_via_hcall(struct boot_params *ptr __maybe_unused) 408c2ecf20Sopenharmony_ci{ 418c2ecf20Sopenharmony_ci xen_raw_printk("Error: Could not find memory map\n"); 428c2ecf20Sopenharmony_ci BUG(); 438c2ecf20Sopenharmony_ci} 448c2ecf20Sopenharmony_ci 458c2ecf20Sopenharmony_cistatic void __init init_pvh_bootparams(bool xen_guest) 468c2ecf20Sopenharmony_ci{ 478c2ecf20Sopenharmony_ci if ((pvh_start_info.version > 0) && (pvh_start_info.memmap_entries)) { 488c2ecf20Sopenharmony_ci struct hvm_memmap_table_entry *ep; 498c2ecf20Sopenharmony_ci int i; 508c2ecf20Sopenharmony_ci 518c2ecf20Sopenharmony_ci ep = __va(pvh_start_info.memmap_paddr); 528c2ecf20Sopenharmony_ci pvh_bootparams.e820_entries = pvh_start_info.memmap_entries; 538c2ecf20Sopenharmony_ci 548c2ecf20Sopenharmony_ci for (i = 0; i < pvh_bootparams.e820_entries ; i++, ep++) { 558c2ecf20Sopenharmony_ci pvh_bootparams.e820_table[i].addr = ep->addr; 568c2ecf20Sopenharmony_ci pvh_bootparams.e820_table[i].size = ep->size; 578c2ecf20Sopenharmony_ci pvh_bootparams.e820_table[i].type = ep->type; 588c2ecf20Sopenharmony_ci } 598c2ecf20Sopenharmony_ci } else if (xen_guest) { 608c2ecf20Sopenharmony_ci mem_map_via_hcall(&pvh_bootparams); 618c2ecf20Sopenharmony_ci } else { 628c2ecf20Sopenharmony_ci /* Non-xen guests are not supported by version 0 */ 638c2ecf20Sopenharmony_ci BUG(); 648c2ecf20Sopenharmony_ci } 658c2ecf20Sopenharmony_ci 668c2ecf20Sopenharmony_ci if (pvh_bootparams.e820_entries < E820_MAX_ENTRIES_ZEROPAGE - 1) { 678c2ecf20Sopenharmony_ci pvh_bootparams.e820_table[pvh_bootparams.e820_entries].addr = 688c2ecf20Sopenharmony_ci ISA_START_ADDRESS; 698c2ecf20Sopenharmony_ci pvh_bootparams.e820_table[pvh_bootparams.e820_entries].size = 708c2ecf20Sopenharmony_ci ISA_END_ADDRESS - ISA_START_ADDRESS; 718c2ecf20Sopenharmony_ci pvh_bootparams.e820_table[pvh_bootparams.e820_entries].type = 728c2ecf20Sopenharmony_ci E820_TYPE_RESERVED; 738c2ecf20Sopenharmony_ci pvh_bootparams.e820_entries++; 748c2ecf20Sopenharmony_ci } else 758c2ecf20Sopenharmony_ci xen_raw_printk("Warning: Can fit ISA range into e820\n"); 768c2ecf20Sopenharmony_ci 778c2ecf20Sopenharmony_ci pvh_bootparams.hdr.cmd_line_ptr = 788c2ecf20Sopenharmony_ci pvh_start_info.cmdline_paddr; 798c2ecf20Sopenharmony_ci 808c2ecf20Sopenharmony_ci /* The first module is always ramdisk. */ 818c2ecf20Sopenharmony_ci if (pvh_start_info.nr_modules) { 828c2ecf20Sopenharmony_ci struct hvm_modlist_entry *modaddr = 838c2ecf20Sopenharmony_ci __va(pvh_start_info.modlist_paddr); 848c2ecf20Sopenharmony_ci pvh_bootparams.hdr.ramdisk_image = modaddr->paddr; 858c2ecf20Sopenharmony_ci pvh_bootparams.hdr.ramdisk_size = modaddr->size; 868c2ecf20Sopenharmony_ci } 878c2ecf20Sopenharmony_ci 888c2ecf20Sopenharmony_ci /* 898c2ecf20Sopenharmony_ci * See Documentation/x86/boot.rst. 908c2ecf20Sopenharmony_ci * 918c2ecf20Sopenharmony_ci * Version 2.12 supports Xen entry point but we will use default x86/PC 928c2ecf20Sopenharmony_ci * environment (i.e. hardware_subarch 0). 938c2ecf20Sopenharmony_ci */ 948c2ecf20Sopenharmony_ci pvh_bootparams.hdr.version = (2 << 8) | 12; 958c2ecf20Sopenharmony_ci pvh_bootparams.hdr.type_of_loader = ((xen_guest ? 0x9 : 0xb) << 4) | 0; 968c2ecf20Sopenharmony_ci 978c2ecf20Sopenharmony_ci x86_init.acpi.get_root_pointer = pvh_get_root_pointer; 988c2ecf20Sopenharmony_ci} 998c2ecf20Sopenharmony_ci 1008c2ecf20Sopenharmony_ci/* 1018c2ecf20Sopenharmony_ci * If we are trying to boot a Xen PVH guest, it is expected that the kernel 1028c2ecf20Sopenharmony_ci * will have been configured to provide the required override for this routine. 1038c2ecf20Sopenharmony_ci */ 1048c2ecf20Sopenharmony_civoid __init __weak xen_pvh_init(struct boot_params *boot_params) 1058c2ecf20Sopenharmony_ci{ 1068c2ecf20Sopenharmony_ci xen_raw_printk("Error: Missing xen PVH initialization\n"); 1078c2ecf20Sopenharmony_ci BUG(); 1088c2ecf20Sopenharmony_ci} 1098c2ecf20Sopenharmony_ci 1108c2ecf20Sopenharmony_cistatic void hypervisor_specific_init(bool xen_guest) 1118c2ecf20Sopenharmony_ci{ 1128c2ecf20Sopenharmony_ci if (xen_guest) 1138c2ecf20Sopenharmony_ci xen_pvh_init(&pvh_bootparams); 1148c2ecf20Sopenharmony_ci} 1158c2ecf20Sopenharmony_ci 1168c2ecf20Sopenharmony_ci/* 1178c2ecf20Sopenharmony_ci * This routine (and those that it might call) should not use 1188c2ecf20Sopenharmony_ci * anything that lives in .bss since that segment will be cleared later. 1198c2ecf20Sopenharmony_ci */ 1208c2ecf20Sopenharmony_civoid __init xen_prepare_pvh(void) 1218c2ecf20Sopenharmony_ci{ 1228c2ecf20Sopenharmony_ci 1238c2ecf20Sopenharmony_ci u32 msr = xen_cpuid_base(); 1248c2ecf20Sopenharmony_ci bool xen_guest = !!msr; 1258c2ecf20Sopenharmony_ci 1268c2ecf20Sopenharmony_ci if (pvh_start_info.magic != XEN_HVM_START_MAGIC_VALUE) { 1278c2ecf20Sopenharmony_ci xen_raw_printk("Error: Unexpected magic value (0x%08x)\n", 1288c2ecf20Sopenharmony_ci pvh_start_info.magic); 1298c2ecf20Sopenharmony_ci BUG(); 1308c2ecf20Sopenharmony_ci } 1318c2ecf20Sopenharmony_ci 1328c2ecf20Sopenharmony_ci memset(&pvh_bootparams, 0, sizeof(pvh_bootparams)); 1338c2ecf20Sopenharmony_ci 1348c2ecf20Sopenharmony_ci hypervisor_specific_init(xen_guest); 1358c2ecf20Sopenharmony_ci 1368c2ecf20Sopenharmony_ci init_pvh_bootparams(xen_guest); 1378c2ecf20Sopenharmony_ci} 138