^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) // SPDX-License-Identifier: GPL-2.0
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) #include <linux/acpi.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) #include <xen/hvc-console.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) #include <asm/io_apic.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) #include <asm/hypervisor.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) #include <asm/e820/api.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) #include <xen/xen.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) #include <asm/xen/interface.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) #include <asm/xen/hypercall.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) #include <xen/interface/memory.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) #include "xen-ops.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) * PVH variables.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) * The variable xen_pvh needs to live in the data segment since it is used
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) * after startup_{32|64} is invoked, which will clear the .bss segment.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) bool xen_pvh __section(".data") = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) void __init xen_pvh_init(struct boot_params *boot_params)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) u32 msr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) u64 pfn;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) xen_pvh = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) xen_domain_type = XEN_HVM_DOMAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) xen_start_flags = pvh_start_info.flags;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) msr = cpuid_ebx(xen_cpuid_base() + 2);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) pfn = __pa(hypercall_page);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) wrmsr_safe(msr, (u32)pfn, (u32)(pfn >> 32));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) xen_efi_init(boot_params);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) void __init mem_map_via_hcall(struct boot_params *boot_params_p)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) struct xen_memory_map memmap;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) memmap.nr_entries = ARRAY_SIZE(boot_params_p->e820_table);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) set_xen_guest_handle(memmap.buffer, boot_params_p->e820_table);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49) rc = HYPERVISOR_memory_op(XENMEM_memory_map, &memmap);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) if (rc) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) xen_raw_printk("XENMEM_memory_map failed (%d)\n", rc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) BUG();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) boot_params_p->e820_entries = memmap.nr_entries;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) }