@@ -31,7 +31,7 @@ long cf_check pv_shim_cpu_up(void *data);
long cf_check pv_shim_cpu_down(void *data);
void pv_shim_online_memory(unsigned int nr, unsigned int order);
void pv_shim_offline_memory(unsigned int nr, unsigned int order);
-domid_t get_initial_domain_id(void);
+domid_t pv_shim_get_initial_domain_id(void);
uint64_t pv_shim_mem(uint64_t avail);
void pv_shim_fixup_e820(void);
const struct platform_bad_page *pv_shim_reserved_pages(unsigned int *size);
@@ -76,8 +76,9 @@ static inline void pv_shim_offline_memory(unsigned int nr, unsigned int order)
{
ASSERT_UNREACHABLE();
}
-static inline domid_t get_initial_domain_id(void)
+static inline domid_t pv_shim_get_initial_domain_id(void)
{
+ ASSERT_UNREACHABLE();
return 0;
}
static inline uint64_t pv_shim_mem(uint64_t avail)
@@ -605,8 +605,7 @@ long pv_shim_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
if ( pv_console && send.port == pv_console_evtchn() )
{
- consoled_guest_rx();
- rc = 0;
+ rc = consoled_guest_rx();
}
else
rc = xen_hypercall_event_channel_op(EVTCHNOP_send, &send);
@@ -1018,13 +1017,10 @@ void pv_shim_offline_memory(unsigned int nr, unsigned int order)
}
}
-domid_t get_initial_domain_id(void)
+domid_t pv_shim_get_initial_domain_id(void)
{
uint32_t eax, ebx, ecx, edx;
- if ( !pv_shim )
- return 0;
-
cpuid(xen_cpuid_base + 4, &eax, &ebx, &ecx, &edx);
return (eax & XEN_HVM_CPUID_DOMID_PRESENT) ? ecx : 1;
@@ -46,6 +46,7 @@
#ifdef CONFIG_X86
#include <asm/guest.h>
+#include <asm/pv/shim.h>
#endif
/* Linux config option: propageted to domain0 */
@@ -2261,6 +2262,15 @@ int continue_hypercall_on_cpu(
return 0;
}
+domid_t get_initial_domain_id(void)
+{
+#ifdef CONFIG_X86
+ if ( pv_shim )
+ return pv_shim_get_initial_domain_id();
+#endif
+ return hardware_domid;
+}
+
/*
* Local variables:
* mode: C
@@ -32,9 +32,9 @@
#include <xen/pv_console.h>
#include <asm/setup.h>
#include <xen/sections.h>
+#include <xen/consoled.h>
#ifdef CONFIG_X86
-#include <xen/consoled.h>
#include <asm/guest.h>
#endif
#ifdef CONFIG_SBSA_VUART_CONSOLE
@@ -507,11 +507,9 @@ static void switch_serial_input(void)
break;
}
-#ifdef CONFIG_PV_SHIM
- if ( next_rx == 1 )
+ if ( consoled_is_enabled() && next_rx == 1 )
domid = get_initial_domain_id();
else
-#endif
domid = next_rx - 1;
d = rcu_lock_domain_by_id(domid);
if ( d )
@@ -562,13 +560,12 @@ static void __serial_rx(char c)
rc = vpl011_rx_char_xen(d, c);
#endif
-#ifdef CONFIG_X86
- if ( pv_shim && pv_console )
- consoled_guest_tx(c);
-#endif
+ if ( consoled_is_enabled() )
+ /* Deliver input to the PV shim console. */
+ rc = consoled_guest_tx(c);
if ( rc )
- guest_printk(d, XENLOG_G_WARNING
+ guest_printk(d, XENLOG_WARNING
"failed to process console input: %d\n", rc);
console_put_domain(d);
@@ -43,13 +43,13 @@ struct xencons_interface *consoled_get_ring_addr(void)
static char buf[BUF_SZ + 1];
/* Receives characters from a domain's PV console */
-void consoled_guest_rx(void)
+int consoled_guest_rx(void)
{
size_t idx = 0;
XENCONS_RING_IDX cons, prod;
if ( !cons_ring )
- return;
+ return -ENODEV;
spin_lock(&rx_lock);
@@ -91,15 +91,17 @@ void consoled_guest_rx(void)
out:
spin_unlock(&rx_lock);
+
+ return 0;
}
/* Sends a character into a domain's PV console */
-void consoled_guest_tx(char c)
+int consoled_guest_tx(char c)
{
XENCONS_RING_IDX cons, prod;
if ( !cons_ring )
- return;
+ return -ENODEV;
cons = ACCESS_ONCE(cons_ring->in_cons);
prod = cons_ring->in_prod;
@@ -125,6 +127,13 @@ void consoled_guest_tx(char c)
notify:
/* Always notify the guest: prevents receive path from getting stuck. */
pv_shim_inject_evtchn(pv_console_evtchn());
+
+ return 0;
+}
+
+bool consoled_is_enabled(void)
+{
+ return pv_shim && pv_console;
}
/*
@@ -1,14 +1,36 @@
-#ifndef __XEN_CONSOLED_H__
-#define __XEN_CONSOLED_H__
+/* SPDX-License-Identifier: GPL-2.0-only */
+#ifndef XEN__CONSOLED_H
+#define XEN__CONSOLED_H
#include <public/io/console.h>
+#ifdef CONFIG_PV_SHIM
+
void consoled_set_ring_addr(struct xencons_interface *ring);
struct xencons_interface *consoled_get_ring_addr(void);
-void consoled_guest_rx(void);
-void consoled_guest_tx(char c);
+int consoled_guest_rx(void);
+int consoled_guest_tx(char c);
+bool consoled_is_enabled(void);
-#endif /* __XEN_CONSOLED_H__ */
+#else
+
+static inline int consoled_guest_rx(void)
+{
+ ASSERT_UNREACHABLE();
+ return -ENODEV;
+}
+
+static inline int consoled_guest_tx(char c)
+{
+ ASSERT_UNREACHABLE();
+ return -ENODEV;
+}
+
+#define consoled_is_enabled() (false)
+
+#endif /* CONFIG_PV_SHIM */
+
+#endif /* XEN__CONSOLED_H */
/*
* Local variables:
* mode: C
@@ -35,6 +35,8 @@ void getdomaininfo(struct domain *d, struct xen_domctl_getdomaininfo *info);
void arch_get_domain_info(const struct domain *d,
struct xen_domctl_getdomaininfo *info);
+domid_t get_initial_domain_id(void);
+
/* CDF_* constant. Internal flags for domain creation. */
/* Is this a privileged domain? */
#define CDF_privileged (1U << 0)