b166b8ab41
In PVH dom0, the gsis don't get registered, but the gsi of a passthrough device must be configured for it to be able to be mapped into a domU. When assigning a device to passthrough, proactively setup the gsi of the device during that process. Signed-off-by: Jiqian Chen <Jiqian.Chen@amd.com> Signed-off-by: Huang Rui <ray.huang@amd.com> Signed-off-by: Jiqian Chen <Jiqian.Chen@amd.com> Reviewed-by: Stefano Stabellini <sstabellini@kernel.org> Message-ID: <20240924061437.2636766-3-Jiqian.Chen@amd.com> Signed-off-by: Juergen Gross <jgross@suse.com>
176 lines
4.6 KiB
C
176 lines
4.6 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <linux/acpi.h>
|
|
#include <linux/export.h>
|
|
#include <linux/mm.h>
|
|
|
|
#include <xen/hvc-console.h>
|
|
#include <xen/acpi.h>
|
|
|
|
#include <asm/bootparam.h>
|
|
#include <asm/io_apic.h>
|
|
#include <asm/hypervisor.h>
|
|
#include <asm/e820/api.h>
|
|
#include <asm/setup.h>
|
|
|
|
#include <xen/xen.h>
|
|
#include <asm/xen/interface.h>
|
|
#include <asm/xen/hypercall.h>
|
|
|
|
#include <xen/interface/memory.h>
|
|
|
|
#include "xen-ops.h"
|
|
|
|
/*
|
|
* PVH variables.
|
|
*
|
|
* The variable xen_pvh needs to live in a data segment since it is used
|
|
* after startup_{32|64} is invoked, which will clear the .bss segment.
|
|
*/
|
|
bool __ro_after_init xen_pvh;
|
|
EXPORT_SYMBOL_GPL(xen_pvh);
|
|
|
|
#ifdef CONFIG_XEN_DOM0
|
|
int xen_pvh_setup_gsi(int gsi, int trigger, int polarity)
|
|
{
|
|
int ret;
|
|
struct physdev_setup_gsi setup_gsi;
|
|
|
|
setup_gsi.gsi = gsi;
|
|
setup_gsi.triggering = (trigger == ACPI_EDGE_SENSITIVE ? 0 : 1);
|
|
setup_gsi.polarity = (polarity == ACPI_ACTIVE_HIGH ? 0 : 1);
|
|
|
|
ret = HYPERVISOR_physdev_op(PHYSDEVOP_setup_gsi, &setup_gsi);
|
|
if (ret == -EEXIST) {
|
|
xen_raw_printk("Already setup the GSI :%d\n", gsi);
|
|
ret = 0;
|
|
} else if (ret)
|
|
xen_raw_printk("Fail to setup GSI (%d)!\n", gsi);
|
|
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(xen_pvh_setup_gsi);
|
|
#endif
|
|
|
|
/*
|
|
* Reserve e820 UNUSABLE regions to inflate the memory balloon.
|
|
*
|
|
* On PVH dom0 the host memory map is used, RAM regions available to dom0 are
|
|
* located as the same place as in the native memory map, but since dom0 gets
|
|
* less memory than the total amount of host RAM the ranges that can't be
|
|
* populated are converted from RAM -> UNUSABLE. Use such regions (up to the
|
|
* ratio signaled in EXTRA_MEM_RATIO) in order to inflate the balloon driver at
|
|
* boot. Doing so prevents the guest (even if just temporary) from using holes
|
|
* in the memory map in order to map grants or foreign addresses, and
|
|
* hopefully limits the risk of a clash with a device MMIO region. Ideally the
|
|
* hypervisor should notify us which memory ranges are suitable for creating
|
|
* foreign mappings, but that's not yet implemented.
|
|
*/
|
|
static void __init pvh_reserve_extra_memory(void)
|
|
{
|
|
struct boot_params *bootp = &boot_params;
|
|
unsigned int i, ram_pages = 0, extra_pages;
|
|
|
|
for (i = 0; i < bootp->e820_entries; i++) {
|
|
struct boot_e820_entry *e = &bootp->e820_table[i];
|
|
|
|
if (e->type != E820_TYPE_RAM)
|
|
continue;
|
|
ram_pages += PFN_DOWN(e->addr + e->size) - PFN_UP(e->addr);
|
|
}
|
|
|
|
/* Max amount of extra memory. */
|
|
extra_pages = EXTRA_MEM_RATIO * ram_pages;
|
|
|
|
/*
|
|
* Convert UNUSABLE ranges to RAM and reserve them for foreign mapping
|
|
* purposes.
|
|
*/
|
|
for (i = 0; i < bootp->e820_entries && extra_pages; i++) {
|
|
struct boot_e820_entry *e = &bootp->e820_table[i];
|
|
unsigned long pages;
|
|
|
|
if (e->type != E820_TYPE_UNUSABLE)
|
|
continue;
|
|
|
|
pages = min(extra_pages,
|
|
PFN_DOWN(e->addr + e->size) - PFN_UP(e->addr));
|
|
|
|
if (pages != (PFN_DOWN(e->addr + e->size) - PFN_UP(e->addr))) {
|
|
struct boot_e820_entry *next;
|
|
|
|
if (bootp->e820_entries ==
|
|
ARRAY_SIZE(bootp->e820_table))
|
|
/* No space left to split - skip region. */
|
|
continue;
|
|
|
|
/* Split entry. */
|
|
next = e + 1;
|
|
memmove(next, e,
|
|
(bootp->e820_entries - i) * sizeof(*e));
|
|
bootp->e820_entries++;
|
|
next->addr = PAGE_ALIGN(e->addr) + PFN_PHYS(pages);
|
|
e->size = next->addr - e->addr;
|
|
next->size -= e->size;
|
|
}
|
|
e->type = E820_TYPE_RAM;
|
|
extra_pages -= pages;
|
|
|
|
xen_add_extra_mem(PFN_UP(e->addr), pages);
|
|
}
|
|
}
|
|
|
|
static void __init pvh_arch_setup(void)
|
|
{
|
|
pvh_reserve_extra_memory();
|
|
|
|
if (xen_initial_domain())
|
|
xen_add_preferred_consoles();
|
|
}
|
|
|
|
void __init xen_pvh_init(struct boot_params *boot_params)
|
|
{
|
|
u32 msr;
|
|
u64 pfn;
|
|
|
|
xen_pvh = 1;
|
|
xen_domain_type = XEN_HVM_DOMAIN;
|
|
xen_start_flags = pvh_start_info.flags;
|
|
|
|
msr = cpuid_ebx(xen_cpuid_base() + 2);
|
|
pfn = __pa(hypercall_page);
|
|
wrmsr_safe(msr, (u32)pfn, (u32)(pfn >> 32));
|
|
|
|
x86_init.oem.arch_setup = pvh_arch_setup;
|
|
x86_init.oem.banner = xen_banner;
|
|
|
|
xen_efi_init(boot_params);
|
|
|
|
if (xen_initial_domain()) {
|
|
struct xen_platform_op op = {
|
|
.cmd = XENPF_get_dom0_console,
|
|
};
|
|
int ret = HYPERVISOR_platform_op(&op);
|
|
|
|
if (ret > 0)
|
|
xen_init_vga(&op.u.dom0_console,
|
|
min(ret * sizeof(char),
|
|
sizeof(op.u.dom0_console)),
|
|
&boot_params->screen_info);
|
|
}
|
|
}
|
|
|
|
void __init mem_map_via_hcall(struct boot_params *boot_params_p)
|
|
{
|
|
struct xen_memory_map memmap;
|
|
int rc;
|
|
|
|
memmap.nr_entries = ARRAY_SIZE(boot_params_p->e820_table);
|
|
set_xen_guest_handle(memmap.buffer, boot_params_p->e820_table);
|
|
rc = HYPERVISOR_memory_op(XENMEM_memory_map, &memmap);
|
|
if (rc) {
|
|
xen_raw_printk("XENMEM_memory_map failed (%d)\n", rc);
|
|
BUG();
|
|
}
|
|
boot_params_p->e820_entries = memmap.nr_entries;
|
|
}
|