|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4 2/7] x86/hyperv: setup hypercall page
From: Wei Liu <wei.liu.xen@xxxxxxxxx> On Behalf Of Wei Liu Sent: Wednesday,
January 22, 2020 12:24 PM
>
> Use the top-most addressable page for that purpose. Adjust e820 code
> accordingly.
>
> We also need to register Xen's guest OS ID to Hyper-V. Use 0x300 as the
> OS type.
>
> Signed-off-by: Wei Liu <liuwe@xxxxxxxxxxxxx>
> ---
> XXX the decision on Xen's vendor ID is pending.
>
> v4:
> 1. Use fixmap
> 2. Follow routines listed in TLFS
> ---
> xen/arch/x86/e820.c | 41 +++++++++++++++----
> xen/arch/x86/guest/hyperv/hyperv.c | 53 +++++++++++++++++++++++--
> xen/include/asm-x86/guest/hyperv-tlfs.h | 5 ++-
> 3 files changed, 86 insertions(+), 13 deletions(-)
>
> diff --git a/xen/arch/x86/e820.c b/xen/arch/x86/e820.c
> index 082f9928a1..5a4ef27a0b 100644
> --- a/xen/arch/x86/e820.c
> +++ b/xen/arch/x86/e820.c
> @@ -36,6 +36,22 @@ boolean_param("e820-verbose", e820_verbose);
> struct e820map e820;
> struct e820map __initdata e820_raw;
>
> +static unsigned int find_phys_addr_bits(void)
> +{
> + uint32_t eax;
> + unsigned int phys_bits = 36;
> +
> + eax = cpuid_eax(0x80000000);
> + if ( (eax >> 16) == 0x8000 && eax >= 0x80000008 )
> + {
> + phys_bits = (uint8_t)cpuid_eax(0x80000008);
> + if ( phys_bits > PADDR_BITS )
> + phys_bits = PADDR_BITS;
> + }
> +
> + return phys_bits;
> +}
> +
> /*
> * This function checks if the entire range <start,end> is mapped with type.
> *
> @@ -357,6 +373,21 @@ static unsigned long __init find_max_pfn(void)
> max_pfn = end;
> }
>
> +#ifdef CONFIG_HYPERV_GUEST
> + {
> + /*
> + * We reserve the top-most page for hypercall page. Adjust
> + * max_pfn if necessary.
> + */
> + unsigned int phys_bits = find_phys_addr_bits();
> + unsigned long hcall_pfn =
> + ((1ull << phys_bits) - 1) >> PAGE_SHIFT;
> +
> + if ( max_pfn >= hcall_pfn )
> + max_pfn = hcall_pfn - 1;
> + }
> +#endif
> +
> return max_pfn;
> }
>
> @@ -420,7 +451,7 @@ static uint64_t __init mtrr_top_of_ram(void)
> {
> uint32_t eax, ebx, ecx, edx;
> uint64_t mtrr_cap, mtrr_def, addr_mask, base, mask, top;
> - unsigned int i, phys_bits = 36;
> + unsigned int i, phys_bits;
>
> /* By default we check only Intel systems. */
> if ( e820_mtrr_clip == -1 )
> @@ -446,13 +477,7 @@ static uint64_t __init mtrr_top_of_ram(void)
> return 0;
>
> /* Find the physical address size for this CPU. */
> - eax = cpuid_eax(0x80000000);
> - if ( (eax >> 16) == 0x8000 && eax >= 0x80000008 )
> - {
> - phys_bits = (uint8_t)cpuid_eax(0x80000008);
> - if ( phys_bits > PADDR_BITS )
> - phys_bits = PADDR_BITS;
> - }
> + phys_bits = find_phys_addr_bits();
> addr_mask = ((1ull << phys_bits) - 1) & ~((1ull << 12) - 1);
>
> rdmsrl(MSR_MTRRcap, mtrr_cap);
> diff --git a/xen/arch/x86/guest/hyperv/hyperv.c
> b/xen/arch/x86/guest/hyperv/hyperv.c
> index 8d38313d7a..f986c1a805 100644
> --- a/xen/arch/x86/guest/hyperv/hyperv.c
> +++ b/xen/arch/x86/guest/hyperv/hyperv.c
> @@ -18,17 +18,27 @@
> *
> * Copyright (c) 2019 Microsoft.
> */
> +#include <xen/version.h>
> #include <xen/init.h>
>
> +#include <asm/fixmap.h>
> #include <asm/guest.h>
> #include <asm/guest/hyperv-tlfs.h>
> +#include <asm/processor.h>
>
> struct ms_hyperv_info __read_mostly ms_hyperv;
>
> -static const struct hypervisor_ops ops = {
> - .name = "Hyper-V",
> -};
> +static uint64_t generate_guest_id(void)
> +{
> + uint64_t id = 0;
> +
> + id = (uint64_t)HV_XEN_VENDOR_ID << 48;
> + id |= (xen_major_version() << 16) | xen_minor_version();
> +
> + return id;
> +}
>
> +static const struct hypervisor_ops ops;
> const struct hypervisor_ops *__init hyperv_probe(void)
> {
> uint32_t eax, ebx, ecx, edx;
> @@ -72,6 +82,43 @@ const struct hypervisor_ops *__init hyperv_probe(void)
> return &ops;
> }
>
> +static void __init setup_hypercall_page(void)
> +{
> + union hv_x64_msr_hypercall_contents hypercall_msr;
> + union hv_guest_os_id guest_id;
> + unsigned long mfn;
> +
> + rdmsrl(HV_X64_MSR_GUEST_OS_ID, guest_id.raw);
> + if ( !guest_id.raw )
> + {
> + guest_id.raw = generate_guest_id();
> + wrmsrl(HV_X64_MSR_GUEST_OS_ID, guest_id.raw);
> + }
> +
> + rdmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
> + if ( !hypercall_msr.enable )
> + {
> + mfn = ((1ull << paddr_bits) - 1) >> HV_HYP_PAGE_SHIFT;
> + hypercall_msr.enable = 1;
> + hypercall_msr.guest_physical_address = mfn;
> + wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
> + } else {
> + mfn = hypercall_msr.guest_physical_address;
> + }
> +
> + set_fixmap_x(FIX_X_HYPERV_HCALL, mfn << PAGE_SHIFT);
> +}
> +
> +static void __init setup(void)
> +{
> + setup_hypercall_page();
> +}
> +
> +static const struct hypervisor_ops ops = {
> + .name = "Hyper-V",
> + .setup = setup,
> +};
> +
> /*
> * Local variables:
> * mode: C
> diff --git a/xen/include/asm-x86/guest/hyperv-tlfs.h b/xen/include/asm-
> x86/guest/hyperv-tlfs.h
> index 05c4044976..5d37efd2d2 100644
> --- a/xen/include/asm-x86/guest/hyperv-tlfs.h
> +++ b/xen/include/asm-x86/guest/hyperv-tlfs.h
> @@ -318,15 +318,16 @@ struct ms_hyperv_tsc_page {
> *
> * Bit(s)
> * 63 - Indicates if the OS is Open Source or not; 1 is Open Source
> - * 62:56 - Os Type; Linux is 0x100
> + * 62:56 - Os Type; Linux 0x100, FreeBSD 0x200, Xen 0x300
This comment isn't quite right -- it reflects the mistake in the
TLFS that is being corrected. The field 62:56 is only 7 bits wide,
so 0x100, 0x200, etc. won't fit. The actual values are: Linux 0x1,
FreeBSD 0x2, and Xen 0x3. Then bits 55:48 are 0x00.
> * 55:48 - Distro specific identification
> - * 47:16 - Linux kernel version number
> + * 47:16 - Guest OS version number
> * 15:0 - Distro specific identification
> *
> *
> */
>
> #define HV_LINUX_VENDOR_ID 0x8100
> +#define HV_XEN_VENDOR_ID 0x8300
> union hv_guest_os_id
> {
> uint64_t raw;
> --
> 2.20.1
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |