2 * xen console driver interface to hvc_console.c
4 * (c) 2007 Gerd Hoffmann <kraxel@suse.de>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 #include <linux/console.h>
22 #include <linux/delay.h>
23 #include <linux/err.h>
24 #include <linux/irq.h>
25 #include <linux/init.h>
26 #include <linux/types.h>
27 #include <linux/list.h>
30 #include <asm/xen/hypervisor.h>
33 #include <xen/interface/xen.h>
35 #include <xen/grant_table.h>
37 #include <xen/events.h>
38 #include <xen/interface/io/console.h>
39 #include <xen/interface/sched.h>
40 #include <xen/hvc-console.h>
41 #include <xen/xenbus.h>
43 #include "hvc_console.h"
45 #define HVC_COOKIE 0x58656e /* "Xen" in hex */
48 struct list_head list
;
49 struct xenbus_device
*xbdev
;
50 struct xencons_interface
*intf
;
52 struct hvc_struct
*hvc
;
58 static LIST_HEAD(xenconsoles
);
59 static DEFINE_SPINLOCK(xencons_lock
);
61 /* ------------------------------------------------------------------ */
63 static struct xencons_info
*vtermno_to_xencons(int vtermno
)
65 struct xencons_info
*entry
, *n
, *ret
= NULL
;
67 if (list_empty(&xenconsoles
))
70 list_for_each_entry_safe(entry
, n
, &xenconsoles
, list
) {
71 if (entry
->vtermno
== vtermno
) {
80 static inline int xenbus_devid_to_vtermno(int devid
)
82 return devid
+ HVC_COOKIE
;
85 static inline void notify_daemon(struct xencons_info
*cons
)
87 /* Use evtchn: this is called early, before irq is set up. */
88 notify_remote_via_evtchn(cons
->evtchn
);
91 static int __write_console(struct xencons_info
*xencons
,
92 const char *data
, int len
)
94 XENCONS_RING_IDX cons
, prod
;
95 struct xencons_interface
*intf
= xencons
->intf
;
98 cons
= intf
->out_cons
;
99 prod
= intf
->out_prod
;
100 mb(); /* update queue values before going on */
101 BUG_ON((prod
- cons
) > sizeof(intf
->out
));
103 while ((sent
< len
) && ((prod
- cons
) < sizeof(intf
->out
)))
104 intf
->out
[MASK_XENCONS_IDX(prod
++, intf
->out
)] = data
[sent
++];
106 wmb(); /* write ring before updating pointer */
107 intf
->out_prod
= prod
;
110 notify_daemon(xencons
);
114 static int domU_write_console(uint32_t vtermno
, const char *data
, int len
)
117 struct xencons_info
*cons
= vtermno_to_xencons(vtermno
);
122 * Make sure the whole buffer is emitted, polling if
123 * necessary. We don't ever want to rely on the hvc daemon
124 * because the most interesting console output is when the
125 * kernel is crippled.
128 int sent
= __write_console(cons
, data
, len
);
134 HYPERVISOR_sched_op(SCHEDOP_yield
, NULL
);
140 static int domU_read_console(uint32_t vtermno
, char *buf
, int len
)
142 struct xencons_interface
*intf
;
143 XENCONS_RING_IDX cons
, prod
;
145 struct xencons_info
*xencons
= vtermno_to_xencons(vtermno
);
148 intf
= xencons
->intf
;
150 cons
= intf
->in_cons
;
151 prod
= intf
->in_prod
;
152 mb(); /* get pointers before reading ring */
153 BUG_ON((prod
- cons
) > sizeof(intf
->in
));
155 while (cons
!= prod
&& recv
< len
)
156 buf
[recv
++] = intf
->in
[MASK_XENCONS_IDX(cons
++, intf
->in
)];
158 mb(); /* read ring before consuming */
159 intf
->in_cons
= cons
;
161 notify_daemon(xencons
);
165 static struct hv_ops domU_hvc_ops
= {
166 .get_chars
= domU_read_console
,
167 .put_chars
= domU_write_console
,
168 .notifier_add
= notifier_add_irq
,
169 .notifier_del
= notifier_del_irq
,
170 .notifier_hangup
= notifier_hangup_irq
,
173 static int dom0_read_console(uint32_t vtermno
, char *buf
, int len
)
175 return HYPERVISOR_console_io(CONSOLEIO_read
, len
, buf
);
179 * Either for a dom0 to write to the system console, or a domU with a
180 * debug version of Xen
182 static int dom0_write_console(uint32_t vtermno
, const char *str
, int len
)
184 int rc
= HYPERVISOR_console_io(CONSOLEIO_write
, len
, (char *)str
);
191 static struct hv_ops dom0_hvc_ops
= {
192 .get_chars
= dom0_read_console
,
193 .put_chars
= dom0_write_console
,
194 .notifier_add
= notifier_add_irq
,
195 .notifier_del
= notifier_del_irq
,
196 .notifier_hangup
= notifier_hangup_irq
,
199 static int xen_hvm_console_init(void)
204 struct xencons_info
*info
;
206 if (!xen_hvm_domain())
209 info
= vtermno_to_xencons(HVC_COOKIE
);
211 info
= kzalloc(sizeof(struct xencons_info
), GFP_KERNEL
);
214 } else if (info
->intf
!= NULL
) {
215 /* already configured */
219 * If the toolstack (or the hypervisor) hasn't set these values, the
220 * default value is 0. Even though mfn = 0 and evtchn = 0 are
221 * theoretically correct values, in practice they never are and they
222 * mean that a legacy toolstack hasn't initialized the pv console correctly.
224 r
= hvm_get_parameter(HVM_PARAM_CONSOLE_EVTCHN
, &v
);
229 r
= hvm_get_parameter(HVM_PARAM_CONSOLE_PFN
, &v
);
233 info
->intf
= xen_remap(mfn
<< PAGE_SHIFT
, PAGE_SIZE
);
234 if (info
->intf
== NULL
)
236 info
->vtermno
= HVC_COOKIE
;
238 spin_lock(&xencons_lock
);
239 list_add_tail(&info
->list
, &xenconsoles
);
240 spin_unlock(&xencons_lock
);
248 static int xen_pv_console_init(void)
250 struct xencons_info
*info
;
252 if (!xen_pv_domain())
255 if (!xen_start_info
->console
.domU
.evtchn
)
258 info
= vtermno_to_xencons(HVC_COOKIE
);
260 info
= kzalloc(sizeof(struct xencons_info
), GFP_KERNEL
);
263 } else if (info
->intf
!= NULL
) {
264 /* already configured */
267 info
->evtchn
= xen_start_info
->console
.domU
.evtchn
;
268 info
->intf
= mfn_to_virt(xen_start_info
->console
.domU
.mfn
);
269 info
->vtermno
= HVC_COOKIE
;
271 spin_lock(&xencons_lock
);
272 list_add_tail(&info
->list
, &xenconsoles
);
273 spin_unlock(&xencons_lock
);
278 static int xen_initial_domain_console_init(void)
280 struct xencons_info
*info
;
282 if (!xen_initial_domain())
285 info
= vtermno_to_xencons(HVC_COOKIE
);
287 info
= kzalloc(sizeof(struct xencons_info
), GFP_KERNEL
);
292 info
->irq
= bind_virq_to_irq(VIRQ_CONSOLE
, 0, false);
293 info
->vtermno
= HVC_COOKIE
;
295 spin_lock(&xencons_lock
);
296 list_add_tail(&info
->list
, &xenconsoles
);
297 spin_unlock(&xencons_lock
);
302 static void xen_console_update_evtchn(struct xencons_info
*info
)
304 if (xen_hvm_domain()) {
308 err
= hvm_get_parameter(HVM_PARAM_CONSOLE_EVTCHN
, &v
);
312 info
->evtchn
= xen_start_info
->console
.domU
.evtchn
;
315 void xen_console_resume(void)
317 struct xencons_info
*info
= vtermno_to_xencons(HVC_COOKIE
);
318 if (info
!= NULL
&& info
->irq
) {
319 if (!xen_initial_domain())
320 xen_console_update_evtchn(info
);
321 rebind_evtchn_irq(info
->evtchn
, info
->irq
);
325 static void xencons_disconnect_backend(struct xencons_info
*info
)
328 unbind_from_irqhandler(info
->irq
, NULL
);
330 if (info
->evtchn
> 0)
331 xenbus_free_evtchn(info
->xbdev
, info
->evtchn
);
333 if (info
->gntref
> 0)
334 gnttab_free_grant_references(info
->gntref
);
336 if (info
->hvc
!= NULL
)
337 hvc_remove(info
->hvc
);
341 static void xencons_free(struct xencons_info
*info
)
343 free_page((unsigned long)info
->intf
);
349 static int xen_console_remove(struct xencons_info
*info
)
351 xencons_disconnect_backend(info
);
352 spin_lock(&xencons_lock
);
353 list_del(&info
->list
);
354 spin_unlock(&xencons_lock
);
355 if (info
->xbdev
!= NULL
)
358 if (xen_hvm_domain())
365 #ifdef CONFIG_HVC_XEN_FRONTEND
366 static int xencons_remove(struct xenbus_device
*dev
)
368 return xen_console_remove(dev_get_drvdata(&dev
->dev
));
371 static int xencons_connect_backend(struct xenbus_device
*dev
,
372 struct xencons_info
*info
)
374 int ret
, evtchn
, devid
, ref
, irq
;
375 struct xenbus_transaction xbt
;
376 grant_ref_t gref_head
;
379 ret
= xenbus_alloc_evtchn(dev
, &evtchn
);
382 info
->evtchn
= evtchn
;
383 irq
= bind_evtchn_to_irq(evtchn
);
387 devid
= dev
->nodename
[strlen(dev
->nodename
) - 1] - '0';
388 info
->hvc
= hvc_alloc(xenbus_devid_to_vtermno(devid
),
389 irq
, &domU_hvc_ops
, 256);
390 if (IS_ERR(info
->hvc
))
391 return PTR_ERR(info
->hvc
);
393 mfn
= virt_to_mfn(info
->intf
);
395 mfn
= __pa(info
->intf
) >> PAGE_SHIFT
;
396 ret
= gnttab_alloc_grant_references(1, &gref_head
);
399 info
->gntref
= gref_head
;
400 ref
= gnttab_claim_grant_reference(&gref_head
);
403 gnttab_grant_foreign_access_ref(ref
, info
->xbdev
->otherend_id
,
407 ret
= xenbus_transaction_start(&xbt
);
409 xenbus_dev_fatal(dev
, ret
, "starting transaction");
412 ret
= xenbus_printf(xbt
, dev
->nodename
, "ring-ref", "%d", ref
);
415 ret
= xenbus_printf(xbt
, dev
->nodename
, "port", "%u",
419 ret
= xenbus_transaction_end(xbt
, 0);
423 xenbus_dev_fatal(dev
, ret
, "completing transaction");
427 xenbus_switch_state(dev
, XenbusStateInitialised
);
431 xenbus_transaction_end(xbt
, 1);
432 xenbus_dev_fatal(dev
, ret
, "writing xenstore");
436 static int xencons_probe(struct xenbus_device
*dev
,
437 const struct xenbus_device_id
*id
)
440 struct xencons_info
*info
;
442 devid
= dev
->nodename
[strlen(dev
->nodename
) - 1] - '0';
446 info
= kzalloc(sizeof(struct xencons_info
), GFP_KERNEL
);
449 dev_set_drvdata(&dev
->dev
, info
);
451 info
->vtermno
= xenbus_devid_to_vtermno(devid
);
452 info
->intf
= (void *)__get_free_page(GFP_KERNEL
| __GFP_ZERO
);
456 ret
= xencons_connect_backend(dev
, info
);
459 spin_lock(&xencons_lock
);
460 list_add_tail(&info
->list
, &xenconsoles
);
461 spin_unlock(&xencons_lock
);
467 xenbus_dev_fatal(dev
, ret
, "allocating device memory");
469 xencons_disconnect_backend(info
);
474 static int xencons_resume(struct xenbus_device
*dev
)
476 struct xencons_info
*info
= dev_get_drvdata(&dev
->dev
);
478 xencons_disconnect_backend(info
);
479 memset(info
->intf
, 0, PAGE_SIZE
);
480 return xencons_connect_backend(dev
, info
);
483 static void xencons_backend_changed(struct xenbus_device
*dev
,
484 enum xenbus_state backend_state
)
486 switch (backend_state
) {
487 case XenbusStateReconfiguring
:
488 case XenbusStateReconfigured
:
489 case XenbusStateInitialising
:
490 case XenbusStateInitialised
:
491 case XenbusStateUnknown
:
494 case XenbusStateInitWait
:
497 case XenbusStateConnected
:
498 xenbus_switch_state(dev
, XenbusStateConnected
);
501 case XenbusStateClosed
:
502 if (dev
->state
== XenbusStateClosed
)
504 /* Missed the backend's CLOSING state -- fallthrough */
505 case XenbusStateClosing
:
506 xenbus_frontend_closed(dev
);
511 static const struct xenbus_device_id xencons_ids
[] = {
516 static struct xenbus_driver xencons_driver
= {
517 .name
= "xenconsole",
519 .probe
= xencons_probe
,
520 .remove
= xencons_remove
,
521 .resume
= xencons_resume
,
522 .otherend_changed
= xencons_backend_changed
,
524 #endif /* CONFIG_HVC_XEN_FRONTEND */
526 static int __init
xen_hvc_init(void)
529 struct xencons_info
*info
;
530 const struct hv_ops
*ops
;
535 if (xen_initial_domain()) {
537 r
= xen_initial_domain_console_init();
540 info
= vtermno_to_xencons(HVC_COOKIE
);
543 if (xen_hvm_domain())
544 r
= xen_hvm_console_init();
546 r
= xen_pv_console_init();
550 info
= vtermno_to_xencons(HVC_COOKIE
);
551 info
->irq
= bind_evtchn_to_irq(info
->evtchn
);
554 info
->irq
= 0; /* NO_IRQ */
556 irq_set_noprobe(info
->irq
);
558 info
->hvc
= hvc_alloc(HVC_COOKIE
, info
->irq
, ops
, 256);
559 if (IS_ERR(info
->hvc
)) {
560 r
= PTR_ERR(info
->hvc
);
561 spin_lock(&xencons_lock
);
562 list_del(&info
->list
);
563 spin_unlock(&xencons_lock
);
565 unbind_from_irqhandler(info
->irq
, NULL
);
571 #ifdef CONFIG_HVC_XEN_FRONTEND
572 r
= xenbus_register_frontend(&xencons_driver
);
576 device_initcall(xen_hvc_init
);
578 static int xen_cons_init(void)
580 const struct hv_ops
*ops
;
585 if (xen_initial_domain())
591 if (xen_hvm_domain())
592 r
= xen_hvm_console_init();
594 r
= xen_pv_console_init();
599 hvc_instantiate(HVC_COOKIE
, 0, ops
);
602 console_initcall(xen_cons_init
);
604 #ifdef CONFIG_EARLY_PRINTK
605 static void xenboot_write_console(struct console
*console
, const char *string
,
608 unsigned int linelen
, off
= 0;
611 if (!xen_pv_domain())
614 dom0_write_console(0, string
, len
);
616 if (xen_initial_domain())
619 domU_write_console(0, "(early) ", 8);
620 while (off
< len
&& NULL
!= (pos
= strchr(string
+off
, '\n'))) {
621 linelen
= pos
-string
+off
;
622 if (off
+ linelen
> len
)
624 domU_write_console(0, string
+off
, linelen
);
625 domU_write_console(0, "\r\n", 2);
629 domU_write_console(0, string
+off
, len
-off
);
632 struct console xenboot_console
= {
634 .write
= xenboot_write_console
,
635 .flags
= CON_PRINTBUFFER
| CON_BOOT
| CON_ANYTIME
,
638 #endif /* CONFIG_EARLY_PRINTK */
640 void xen_raw_console_write(const char *str
)
642 ssize_t len
= strlen(str
);
646 rc
= dom0_write_console(0, str
, len
);
648 if (rc
== -ENOSYS
&& xen_hvm_domain())
651 } else if (xen_cpuid_base()) {
654 for (i
= 0; i
< len
; i
++)
660 void xen_raw_printk(const char *fmt
, ...)
662 static char buf
[512];
666 vsnprintf(buf
, sizeof(buf
), fmt
, ap
);
669 xen_raw_console_write(buf
);