162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci#include <linux/acpi.h> 362306a36Sopenharmony_ci 462306a36Sopenharmony_ci#include <xen/hvc-console.h> 562306a36Sopenharmony_ci 662306a36Sopenharmony_ci#include <asm/io_apic.h> 762306a36Sopenharmony_ci#include <asm/hypervisor.h> 862306a36Sopenharmony_ci#include <asm/e820/api.h> 962306a36Sopenharmony_ci#include <asm/x86_init.h> 1062306a36Sopenharmony_ci 1162306a36Sopenharmony_ci#include <asm/xen/interface.h> 1262306a36Sopenharmony_ci 1362306a36Sopenharmony_ci#include <xen/xen.h> 1462306a36Sopenharmony_ci#include <xen/interface/hvm/start_info.h> 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_ci/* 1762306a36Sopenharmony_ci * PVH variables. 1862306a36Sopenharmony_ci * 1962306a36Sopenharmony_ci * pvh_bootparams and pvh_start_info need to live in a data segment since 2062306a36Sopenharmony_ci * they are used after startup_{32|64}, which clear .bss, are invoked. 2162306a36Sopenharmony_ci */ 2262306a36Sopenharmony_cistruct boot_params __initdata pvh_bootparams; 2362306a36Sopenharmony_cistruct hvm_start_info __initdata pvh_start_info; 2462306a36Sopenharmony_ci 2562306a36Sopenharmony_ciconst unsigned int __initconst pvh_start_info_sz = sizeof(pvh_start_info); 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_cistatic u64 __init pvh_get_root_pointer(void) 2862306a36Sopenharmony_ci{ 2962306a36Sopenharmony_ci return pvh_start_info.rsdp_paddr; 3062306a36Sopenharmony_ci} 3162306a36Sopenharmony_ci 3262306a36Sopenharmony_ci/* 3362306a36Sopenharmony_ci * Xen guests are able to obtain the memory map from the hypervisor via the 3462306a36Sopenharmony_ci * HYPERVISOR_memory_op hypercall. 3562306a36Sopenharmony_ci * If we are trying to boot a Xen PVH guest, it is expected that the kernel 3662306a36Sopenharmony_ci * will have been configured to provide an override for this routine to do 3762306a36Sopenharmony_ci * just that. 3862306a36Sopenharmony_ci */ 3962306a36Sopenharmony_civoid __init __weak mem_map_via_hcall(struct boot_params *ptr __maybe_unused) 4062306a36Sopenharmony_ci{ 4162306a36Sopenharmony_ci xen_raw_printk("Error: Could not find memory map\n"); 4262306a36Sopenharmony_ci BUG(); 4362306a36Sopenharmony_ci} 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_cistatic void __init init_pvh_bootparams(bool xen_guest) 4662306a36Sopenharmony_ci{ 4762306a36Sopenharmony_ci if ((pvh_start_info.version > 0) && (pvh_start_info.memmap_entries)) { 4862306a36Sopenharmony_ci struct hvm_memmap_table_entry *ep; 4962306a36Sopenharmony_ci int i; 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_ci ep = __va(pvh_start_info.memmap_paddr); 5262306a36Sopenharmony_ci pvh_bootparams.e820_entries = pvh_start_info.memmap_entries; 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_ci for (i = 0; i < pvh_bootparams.e820_entries ; i++, ep++) { 5562306a36Sopenharmony_ci pvh_bootparams.e820_table[i].addr = ep->addr; 5662306a36Sopenharmony_ci pvh_bootparams.e820_table[i].size = ep->size; 5762306a36Sopenharmony_ci pvh_bootparams.e820_table[i].type = ep->type; 5862306a36Sopenharmony_ci } 5962306a36Sopenharmony_ci } else if (xen_guest) { 6062306a36Sopenharmony_ci mem_map_via_hcall(&pvh_bootparams); 6162306a36Sopenharmony_ci } else { 6262306a36Sopenharmony_ci /* Non-xen guests are not supported by version 0 */ 6362306a36Sopenharmony_ci BUG(); 6462306a36Sopenharmony_ci } 6562306a36Sopenharmony_ci 6662306a36Sopenharmony_ci if (pvh_bootparams.e820_entries < E820_MAX_ENTRIES_ZEROPAGE - 1) { 6762306a36Sopenharmony_ci pvh_bootparams.e820_table[pvh_bootparams.e820_entries].addr = 6862306a36Sopenharmony_ci ISA_START_ADDRESS; 6962306a36Sopenharmony_ci pvh_bootparams.e820_table[pvh_bootparams.e820_entries].size = 7062306a36Sopenharmony_ci ISA_END_ADDRESS - ISA_START_ADDRESS; 7162306a36Sopenharmony_ci pvh_bootparams.e820_table[pvh_bootparams.e820_entries].type = 7262306a36Sopenharmony_ci E820_TYPE_RESERVED; 7362306a36Sopenharmony_ci pvh_bootparams.e820_entries++; 7462306a36Sopenharmony_ci } else 7562306a36Sopenharmony_ci xen_raw_printk("Warning: Can fit ISA range into e820\n"); 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci pvh_bootparams.hdr.cmd_line_ptr = 7862306a36Sopenharmony_ci pvh_start_info.cmdline_paddr; 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci /* The first module is always ramdisk. */ 8162306a36Sopenharmony_ci if (pvh_start_info.nr_modules) { 8262306a36Sopenharmony_ci struct hvm_modlist_entry *modaddr = 8362306a36Sopenharmony_ci __va(pvh_start_info.modlist_paddr); 8462306a36Sopenharmony_ci pvh_bootparams.hdr.ramdisk_image = modaddr->paddr; 8562306a36Sopenharmony_ci pvh_bootparams.hdr.ramdisk_size = modaddr->size; 8662306a36Sopenharmony_ci } 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci /* 8962306a36Sopenharmony_ci * See Documentation/arch/x86/boot.rst. 9062306a36Sopenharmony_ci * 9162306a36Sopenharmony_ci * Version 2.12 supports Xen entry point but we will use default x86/PC 9262306a36Sopenharmony_ci * environment (i.e. hardware_subarch 0). 9362306a36Sopenharmony_ci */ 9462306a36Sopenharmony_ci pvh_bootparams.hdr.version = (2 << 8) | 12; 9562306a36Sopenharmony_ci pvh_bootparams.hdr.type_of_loader = ((xen_guest ? 0x9 : 0xb) << 4) | 0; 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_ci x86_init.acpi.get_root_pointer = pvh_get_root_pointer; 9862306a36Sopenharmony_ci} 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_ci/* 10162306a36Sopenharmony_ci * If we are trying to boot a Xen PVH guest, it is expected that the kernel 10262306a36Sopenharmony_ci * will have been configured to provide the required override for this routine. 10362306a36Sopenharmony_ci */ 10462306a36Sopenharmony_civoid __init __weak xen_pvh_init(struct boot_params *boot_params) 10562306a36Sopenharmony_ci{ 10662306a36Sopenharmony_ci xen_raw_printk("Error: Missing xen PVH initialization\n"); 10762306a36Sopenharmony_ci BUG(); 10862306a36Sopenharmony_ci} 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_cistatic void __init hypervisor_specific_init(bool xen_guest) 11162306a36Sopenharmony_ci{ 11262306a36Sopenharmony_ci if (xen_guest) 11362306a36Sopenharmony_ci xen_pvh_init(&pvh_bootparams); 11462306a36Sopenharmony_ci} 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ci/* 11762306a36Sopenharmony_ci * This routine (and those that it might call) should not use 11862306a36Sopenharmony_ci * anything that lives in .bss since that segment will be cleared later. 11962306a36Sopenharmony_ci */ 12062306a36Sopenharmony_civoid __init xen_prepare_pvh(void) 12162306a36Sopenharmony_ci{ 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci u32 msr = xen_cpuid_base(); 12462306a36Sopenharmony_ci bool xen_guest = !!msr; 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_ci if (pvh_start_info.magic != XEN_HVM_START_MAGIC_VALUE) { 12762306a36Sopenharmony_ci xen_raw_printk("Error: Unexpected magic value (0x%08x)\n", 12862306a36Sopenharmony_ci pvh_start_info.magic); 12962306a36Sopenharmony_ci BUG(); 13062306a36Sopenharmony_ci } 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_ci memset(&pvh_bootparams, 0, sizeof(pvh_bootparams)); 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci hypervisor_specific_init(xen_guest); 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci init_pvh_bootparams(xen_guest); 13762306a36Sopenharmony_ci} 138