18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
28c2ecf20Sopenharmony_ci#include <linux/acpi.h>
38c2ecf20Sopenharmony_ci
48c2ecf20Sopenharmony_ci#include <xen/hvc-console.h>
58c2ecf20Sopenharmony_ci
68c2ecf20Sopenharmony_ci#include <asm/io_apic.h>
78c2ecf20Sopenharmony_ci#include <asm/hypervisor.h>
88c2ecf20Sopenharmony_ci#include <asm/e820/api.h>
98c2ecf20Sopenharmony_ci#include <asm/x86_init.h>
108c2ecf20Sopenharmony_ci
118c2ecf20Sopenharmony_ci#include <asm/xen/interface.h>
128c2ecf20Sopenharmony_ci
138c2ecf20Sopenharmony_ci#include <xen/xen.h>
148c2ecf20Sopenharmony_ci#include <xen/interface/hvm/start_info.h>
158c2ecf20Sopenharmony_ci
168c2ecf20Sopenharmony_ci/*
178c2ecf20Sopenharmony_ci * PVH variables.
188c2ecf20Sopenharmony_ci *
198c2ecf20Sopenharmony_ci * pvh_bootparams and pvh_start_info need to live in the data segment since
208c2ecf20Sopenharmony_ci * they are used after startup_{32|64}, which clear .bss, are invoked.
218c2ecf20Sopenharmony_ci */
228c2ecf20Sopenharmony_cistruct boot_params pvh_bootparams __section(".data");
238c2ecf20Sopenharmony_cistruct hvm_start_info pvh_start_info __section(".data");
248c2ecf20Sopenharmony_ci
258c2ecf20Sopenharmony_ciunsigned int pvh_start_info_sz = sizeof(pvh_start_info);
268c2ecf20Sopenharmony_ci
278c2ecf20Sopenharmony_cistatic u64 pvh_get_root_pointer(void)
288c2ecf20Sopenharmony_ci{
298c2ecf20Sopenharmony_ci	return pvh_start_info.rsdp_paddr;
308c2ecf20Sopenharmony_ci}
318c2ecf20Sopenharmony_ci
328c2ecf20Sopenharmony_ci/*
338c2ecf20Sopenharmony_ci * Xen guests are able to obtain the memory map from the hypervisor via the
348c2ecf20Sopenharmony_ci * HYPERVISOR_memory_op hypercall.
358c2ecf20Sopenharmony_ci * If we are trying to boot a Xen PVH guest, it is expected that the kernel
368c2ecf20Sopenharmony_ci * will have been configured to provide an override for this routine to do
378c2ecf20Sopenharmony_ci * just that.
388c2ecf20Sopenharmony_ci */
398c2ecf20Sopenharmony_civoid __init __weak mem_map_via_hcall(struct boot_params *ptr __maybe_unused)
408c2ecf20Sopenharmony_ci{
418c2ecf20Sopenharmony_ci	xen_raw_printk("Error: Could not find memory map\n");
428c2ecf20Sopenharmony_ci	BUG();
438c2ecf20Sopenharmony_ci}
448c2ecf20Sopenharmony_ci
458c2ecf20Sopenharmony_cistatic void __init init_pvh_bootparams(bool xen_guest)
468c2ecf20Sopenharmony_ci{
478c2ecf20Sopenharmony_ci	if ((pvh_start_info.version > 0) && (pvh_start_info.memmap_entries)) {
488c2ecf20Sopenharmony_ci		struct hvm_memmap_table_entry *ep;
498c2ecf20Sopenharmony_ci		int i;
508c2ecf20Sopenharmony_ci
518c2ecf20Sopenharmony_ci		ep = __va(pvh_start_info.memmap_paddr);
528c2ecf20Sopenharmony_ci		pvh_bootparams.e820_entries = pvh_start_info.memmap_entries;
538c2ecf20Sopenharmony_ci
548c2ecf20Sopenharmony_ci		for (i = 0; i < pvh_bootparams.e820_entries ; i++, ep++) {
558c2ecf20Sopenharmony_ci			pvh_bootparams.e820_table[i].addr = ep->addr;
568c2ecf20Sopenharmony_ci			pvh_bootparams.e820_table[i].size = ep->size;
578c2ecf20Sopenharmony_ci			pvh_bootparams.e820_table[i].type = ep->type;
588c2ecf20Sopenharmony_ci		}
598c2ecf20Sopenharmony_ci	} else if (xen_guest) {
608c2ecf20Sopenharmony_ci		mem_map_via_hcall(&pvh_bootparams);
618c2ecf20Sopenharmony_ci	} else {
628c2ecf20Sopenharmony_ci		/* Non-xen guests are not supported by version 0 */
638c2ecf20Sopenharmony_ci		BUG();
648c2ecf20Sopenharmony_ci	}
658c2ecf20Sopenharmony_ci
668c2ecf20Sopenharmony_ci	if (pvh_bootparams.e820_entries < E820_MAX_ENTRIES_ZEROPAGE - 1) {
678c2ecf20Sopenharmony_ci		pvh_bootparams.e820_table[pvh_bootparams.e820_entries].addr =
688c2ecf20Sopenharmony_ci			ISA_START_ADDRESS;
698c2ecf20Sopenharmony_ci		pvh_bootparams.e820_table[pvh_bootparams.e820_entries].size =
708c2ecf20Sopenharmony_ci			ISA_END_ADDRESS - ISA_START_ADDRESS;
718c2ecf20Sopenharmony_ci		pvh_bootparams.e820_table[pvh_bootparams.e820_entries].type =
728c2ecf20Sopenharmony_ci			E820_TYPE_RESERVED;
738c2ecf20Sopenharmony_ci		pvh_bootparams.e820_entries++;
748c2ecf20Sopenharmony_ci	} else
758c2ecf20Sopenharmony_ci		xen_raw_printk("Warning: Can fit ISA range into e820\n");
768c2ecf20Sopenharmony_ci
778c2ecf20Sopenharmony_ci	pvh_bootparams.hdr.cmd_line_ptr =
788c2ecf20Sopenharmony_ci		pvh_start_info.cmdline_paddr;
798c2ecf20Sopenharmony_ci
808c2ecf20Sopenharmony_ci	/* The first module is always ramdisk. */
818c2ecf20Sopenharmony_ci	if (pvh_start_info.nr_modules) {
828c2ecf20Sopenharmony_ci		struct hvm_modlist_entry *modaddr =
838c2ecf20Sopenharmony_ci			__va(pvh_start_info.modlist_paddr);
848c2ecf20Sopenharmony_ci		pvh_bootparams.hdr.ramdisk_image = modaddr->paddr;
858c2ecf20Sopenharmony_ci		pvh_bootparams.hdr.ramdisk_size = modaddr->size;
868c2ecf20Sopenharmony_ci	}
878c2ecf20Sopenharmony_ci
888c2ecf20Sopenharmony_ci	/*
898c2ecf20Sopenharmony_ci	 * See Documentation/x86/boot.rst.
908c2ecf20Sopenharmony_ci	 *
918c2ecf20Sopenharmony_ci	 * Version 2.12 supports Xen entry point but we will use default x86/PC
928c2ecf20Sopenharmony_ci	 * environment (i.e. hardware_subarch 0).
938c2ecf20Sopenharmony_ci	 */
948c2ecf20Sopenharmony_ci	pvh_bootparams.hdr.version = (2 << 8) | 12;
958c2ecf20Sopenharmony_ci	pvh_bootparams.hdr.type_of_loader = ((xen_guest ? 0x9 : 0xb) << 4) | 0;
968c2ecf20Sopenharmony_ci
978c2ecf20Sopenharmony_ci	x86_init.acpi.get_root_pointer = pvh_get_root_pointer;
988c2ecf20Sopenharmony_ci}
998c2ecf20Sopenharmony_ci
1008c2ecf20Sopenharmony_ci/*
1018c2ecf20Sopenharmony_ci * If we are trying to boot a Xen PVH guest, it is expected that the kernel
1028c2ecf20Sopenharmony_ci * will have been configured to provide the required override for this routine.
1038c2ecf20Sopenharmony_ci */
1048c2ecf20Sopenharmony_civoid __init __weak xen_pvh_init(struct boot_params *boot_params)
1058c2ecf20Sopenharmony_ci{
1068c2ecf20Sopenharmony_ci	xen_raw_printk("Error: Missing xen PVH initialization\n");
1078c2ecf20Sopenharmony_ci	BUG();
1088c2ecf20Sopenharmony_ci}
1098c2ecf20Sopenharmony_ci
1108c2ecf20Sopenharmony_cistatic void hypervisor_specific_init(bool xen_guest)
1118c2ecf20Sopenharmony_ci{
1128c2ecf20Sopenharmony_ci	if (xen_guest)
1138c2ecf20Sopenharmony_ci		xen_pvh_init(&pvh_bootparams);
1148c2ecf20Sopenharmony_ci}
1158c2ecf20Sopenharmony_ci
1168c2ecf20Sopenharmony_ci/*
1178c2ecf20Sopenharmony_ci * This routine (and those that it might call) should not use
1188c2ecf20Sopenharmony_ci * anything that lives in .bss since that segment will be cleared later.
1198c2ecf20Sopenharmony_ci */
1208c2ecf20Sopenharmony_civoid __init xen_prepare_pvh(void)
1218c2ecf20Sopenharmony_ci{
1228c2ecf20Sopenharmony_ci
1238c2ecf20Sopenharmony_ci	u32 msr = xen_cpuid_base();
1248c2ecf20Sopenharmony_ci	bool xen_guest = !!msr;
1258c2ecf20Sopenharmony_ci
1268c2ecf20Sopenharmony_ci	if (pvh_start_info.magic != XEN_HVM_START_MAGIC_VALUE) {
1278c2ecf20Sopenharmony_ci		xen_raw_printk("Error: Unexpected magic value (0x%08x)\n",
1288c2ecf20Sopenharmony_ci				pvh_start_info.magic);
1298c2ecf20Sopenharmony_ci		BUG();
1308c2ecf20Sopenharmony_ci	}
1318c2ecf20Sopenharmony_ci
1328c2ecf20Sopenharmony_ci	memset(&pvh_bootparams, 0, sizeof(pvh_bootparams));
1338c2ecf20Sopenharmony_ci
1348c2ecf20Sopenharmony_ci	hypervisor_specific_init(xen_guest);
1358c2ecf20Sopenharmony_ci
1368c2ecf20Sopenharmony_ci	init_pvh_bootparams(xen_guest);
1378c2ecf20Sopenharmony_ci}
138