162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci#include <linux/acpi.h>
362306a36Sopenharmony_ci
462306a36Sopenharmony_ci#include <xen/hvc-console.h>
562306a36Sopenharmony_ci
662306a36Sopenharmony_ci#include <asm/io_apic.h>
762306a36Sopenharmony_ci#include <asm/hypervisor.h>
862306a36Sopenharmony_ci#include <asm/e820/api.h>
962306a36Sopenharmony_ci#include <asm/x86_init.h>
1062306a36Sopenharmony_ci
1162306a36Sopenharmony_ci#include <asm/xen/interface.h>
1262306a36Sopenharmony_ci
1362306a36Sopenharmony_ci#include <xen/xen.h>
1462306a36Sopenharmony_ci#include <xen/interface/hvm/start_info.h>
1562306a36Sopenharmony_ci
1662306a36Sopenharmony_ci/*
1762306a36Sopenharmony_ci * PVH variables.
1862306a36Sopenharmony_ci *
1962306a36Sopenharmony_ci * pvh_bootparams and pvh_start_info need to live in a data segment since
2062306a36Sopenharmony_ci * they are used after startup_{32|64}, which clear .bss, are invoked.
2162306a36Sopenharmony_ci */
2262306a36Sopenharmony_cistruct boot_params __initdata pvh_bootparams;
2362306a36Sopenharmony_cistruct hvm_start_info __initdata pvh_start_info;
2462306a36Sopenharmony_ci
2562306a36Sopenharmony_ciconst unsigned int __initconst pvh_start_info_sz = sizeof(pvh_start_info);
2662306a36Sopenharmony_ci
2762306a36Sopenharmony_cistatic u64 __init pvh_get_root_pointer(void)
2862306a36Sopenharmony_ci{
2962306a36Sopenharmony_ci	return pvh_start_info.rsdp_paddr;
3062306a36Sopenharmony_ci}
3162306a36Sopenharmony_ci
3262306a36Sopenharmony_ci/*
3362306a36Sopenharmony_ci * Xen guests are able to obtain the memory map from the hypervisor via the
3462306a36Sopenharmony_ci * HYPERVISOR_memory_op hypercall.
3562306a36Sopenharmony_ci * If we are trying to boot a Xen PVH guest, it is expected that the kernel
3662306a36Sopenharmony_ci * will have been configured to provide an override for this routine to do
3762306a36Sopenharmony_ci * just that.
3862306a36Sopenharmony_ci */
3962306a36Sopenharmony_civoid __init __weak mem_map_via_hcall(struct boot_params *ptr __maybe_unused)
4062306a36Sopenharmony_ci{
4162306a36Sopenharmony_ci	xen_raw_printk("Error: Could not find memory map\n");
4262306a36Sopenharmony_ci	BUG();
4362306a36Sopenharmony_ci}
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_cistatic void __init init_pvh_bootparams(bool xen_guest)
4662306a36Sopenharmony_ci{
4762306a36Sopenharmony_ci	if ((pvh_start_info.version > 0) && (pvh_start_info.memmap_entries)) {
4862306a36Sopenharmony_ci		struct hvm_memmap_table_entry *ep;
4962306a36Sopenharmony_ci		int i;
5062306a36Sopenharmony_ci
5162306a36Sopenharmony_ci		ep = __va(pvh_start_info.memmap_paddr);
5262306a36Sopenharmony_ci		pvh_bootparams.e820_entries = pvh_start_info.memmap_entries;
5362306a36Sopenharmony_ci
5462306a36Sopenharmony_ci		for (i = 0; i < pvh_bootparams.e820_entries ; i++, ep++) {
5562306a36Sopenharmony_ci			pvh_bootparams.e820_table[i].addr = ep->addr;
5662306a36Sopenharmony_ci			pvh_bootparams.e820_table[i].size = ep->size;
5762306a36Sopenharmony_ci			pvh_bootparams.e820_table[i].type = ep->type;
5862306a36Sopenharmony_ci		}
5962306a36Sopenharmony_ci	} else if (xen_guest) {
6062306a36Sopenharmony_ci		mem_map_via_hcall(&pvh_bootparams);
6162306a36Sopenharmony_ci	} else {
6262306a36Sopenharmony_ci		/* Non-xen guests are not supported by version 0 */
6362306a36Sopenharmony_ci		BUG();
6462306a36Sopenharmony_ci	}
6562306a36Sopenharmony_ci
6662306a36Sopenharmony_ci	if (pvh_bootparams.e820_entries < E820_MAX_ENTRIES_ZEROPAGE - 1) {
6762306a36Sopenharmony_ci		pvh_bootparams.e820_table[pvh_bootparams.e820_entries].addr =
6862306a36Sopenharmony_ci			ISA_START_ADDRESS;
6962306a36Sopenharmony_ci		pvh_bootparams.e820_table[pvh_bootparams.e820_entries].size =
7062306a36Sopenharmony_ci			ISA_END_ADDRESS - ISA_START_ADDRESS;
7162306a36Sopenharmony_ci		pvh_bootparams.e820_table[pvh_bootparams.e820_entries].type =
7262306a36Sopenharmony_ci			E820_TYPE_RESERVED;
7362306a36Sopenharmony_ci		pvh_bootparams.e820_entries++;
7462306a36Sopenharmony_ci	} else
7562306a36Sopenharmony_ci		xen_raw_printk("Warning: Can fit ISA range into e820\n");
7662306a36Sopenharmony_ci
7762306a36Sopenharmony_ci	pvh_bootparams.hdr.cmd_line_ptr =
7862306a36Sopenharmony_ci		pvh_start_info.cmdline_paddr;
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_ci	/* The first module is always ramdisk. */
8162306a36Sopenharmony_ci	if (pvh_start_info.nr_modules) {
8262306a36Sopenharmony_ci		struct hvm_modlist_entry *modaddr =
8362306a36Sopenharmony_ci			__va(pvh_start_info.modlist_paddr);
8462306a36Sopenharmony_ci		pvh_bootparams.hdr.ramdisk_image = modaddr->paddr;
8562306a36Sopenharmony_ci		pvh_bootparams.hdr.ramdisk_size = modaddr->size;
8662306a36Sopenharmony_ci	}
8762306a36Sopenharmony_ci
8862306a36Sopenharmony_ci	/*
8962306a36Sopenharmony_ci	 * See Documentation/arch/x86/boot.rst.
9062306a36Sopenharmony_ci	 *
9162306a36Sopenharmony_ci	 * Version 2.12 supports Xen entry point but we will use default x86/PC
9262306a36Sopenharmony_ci	 * environment (i.e. hardware_subarch 0).
9362306a36Sopenharmony_ci	 */
9462306a36Sopenharmony_ci	pvh_bootparams.hdr.version = (2 << 8) | 12;
9562306a36Sopenharmony_ci	pvh_bootparams.hdr.type_of_loader = ((xen_guest ? 0x9 : 0xb) << 4) | 0;
9662306a36Sopenharmony_ci
9762306a36Sopenharmony_ci	x86_init.acpi.get_root_pointer = pvh_get_root_pointer;
9862306a36Sopenharmony_ci}
9962306a36Sopenharmony_ci
10062306a36Sopenharmony_ci/*
10162306a36Sopenharmony_ci * If we are trying to boot a Xen PVH guest, it is expected that the kernel
10262306a36Sopenharmony_ci * will have been configured to provide the required override for this routine.
10362306a36Sopenharmony_ci */
10462306a36Sopenharmony_civoid __init __weak xen_pvh_init(struct boot_params *boot_params)
10562306a36Sopenharmony_ci{
10662306a36Sopenharmony_ci	xen_raw_printk("Error: Missing xen PVH initialization\n");
10762306a36Sopenharmony_ci	BUG();
10862306a36Sopenharmony_ci}
10962306a36Sopenharmony_ci
11062306a36Sopenharmony_cistatic void __init hypervisor_specific_init(bool xen_guest)
11162306a36Sopenharmony_ci{
11262306a36Sopenharmony_ci	if (xen_guest)
11362306a36Sopenharmony_ci		xen_pvh_init(&pvh_bootparams);
11462306a36Sopenharmony_ci}
11562306a36Sopenharmony_ci
11662306a36Sopenharmony_ci/*
11762306a36Sopenharmony_ci * This routine (and those that it might call) should not use
11862306a36Sopenharmony_ci * anything that lives in .bss since that segment will be cleared later.
11962306a36Sopenharmony_ci */
12062306a36Sopenharmony_civoid __init xen_prepare_pvh(void)
12162306a36Sopenharmony_ci{
12262306a36Sopenharmony_ci
12362306a36Sopenharmony_ci	u32 msr = xen_cpuid_base();
12462306a36Sopenharmony_ci	bool xen_guest = !!msr;
12562306a36Sopenharmony_ci
12662306a36Sopenharmony_ci	if (pvh_start_info.magic != XEN_HVM_START_MAGIC_VALUE) {
12762306a36Sopenharmony_ci		xen_raw_printk("Error: Unexpected magic value (0x%08x)\n",
12862306a36Sopenharmony_ci				pvh_start_info.magic);
12962306a36Sopenharmony_ci		BUG();
13062306a36Sopenharmony_ci	}
13162306a36Sopenharmony_ci
13262306a36Sopenharmony_ci	memset(&pvh_bootparams, 0, sizeof(pvh_bootparams));
13362306a36Sopenharmony_ci
13462306a36Sopenharmony_ci	hypervisor_specific_init(xen_guest);
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci	init_pvh_bootparams(xen_guest);
13762306a36Sopenharmony_ci}
138