Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4641864ybp; Mon, 7 Oct 2019 11:29:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqyuxtBt3h7JlEkGPdmI1QMB3JAxCNwYOrxqExajP2R5ZTGbiVx/S3Zvdbjq9YBzbJroaueh X-Received: by 2002:a50:fc0c:: with SMTP id i12mr490341edr.82.1570472939914; Mon, 07 Oct 2019 11:28:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570472939; cv=none; d=google.com; s=arc-20160816; b=vhU1K6hlQfkbYiPLmR1hA/AvAHHeVUiL+3HUgsSh9xRCAOogdWL4JPmadZROMnh1N9 o1bu3s07klSDkZ0ftNu0drGAmHfgIP02vmGHZaB3sk8DqB23mCOP/Bcd8gBc0zdgsXbm lCRCOS3SMTdtlgkKFcJEMsdJFaFBOVNmm/BWvTvuWA8ZOGamtgC1bBvfIJKerRyS8g1Y 8p7YOr7bmseCNkvwoz1xv5ZLwwzovNIKeldO/42Fjz/cNbIDG58PUbAbXX4nomicOXVL j1JejsEuqnjgV2CTTpBTZ+g1IkueRRp+qwExqQLSez6BetUc1D3dem1UOMrRLs9sF/jI sE0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :robot-unsubscribe:robot-id:message-id:mime-version:references :in-reply-to:cc:subject:to:reply-to:from:date; bh=LKoCoDj3r8UBXZSxiz5KP+inLPP1NHi8MyrqKYoPL7U=; b=xOG1Zs5SzlDx76bF46NivSnNsxiNc8QW7Gu2pnXtAiUDsR2eaBeo2jDwOjbouXkgiH 89YAS0K3X1v6VqnXEfg1yzWuo9BNrIRj7gnJpr6WAhoBLI+1xm6NcCDAsGb8RgBR0CIM 0e9DRic561SrC5lwqfFR0VUxwqjWukbibZkVso+RA6VKx1B7NCkLgadmG2OWxfLPfun/ eqPzkfOLdMax6gVshe3gDiL+nbc7abhy3gK0ZvPVAuE5zwe64exBULc+96uOdGp1nrnB oQfEl3lgyzb29NVO8q7xMddE746/g+mLQ7QhjXP7qL67pNCcp75YLJeJJjF1m+WlM5qR ZzPQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 17si7493071ejx.213.2019.10.07.11.28.36; Mon, 07 Oct 2019 11:28:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729331AbfJGSZU (ORCPT + 99 others); Mon, 7 Oct 2019 14:25:20 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:45446 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728031AbfJGSZT (ORCPT ); Mon, 7 Oct 2019 14:25:19 -0400 Received: from [5.158.153.53] (helo=tip-bot2.lab.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1iHXgu-0002LS-UO; Mon, 07 Oct 2019 20:25:05 +0200 Received: from [127.0.1.1] (localhost [IPv6:::1]) by tip-bot2.lab.linutronix.de (Postfix) with ESMTP id 7FF491C032F; Mon, 7 Oct 2019 20:25:04 +0200 (CEST) Date: Mon, 07 Oct 2019 18:25:04 -0000 From: "tip-bot2 for Ralf Ramsauer" Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/platform] x86/jailhouse: Enable platform UARTs only if available Cc: Ralf Ramsauer , Jan Kiszka , Borislav Petkov , "H . Peter Anvin" , Linus Torvalds , Peter Zijlstra , Thomas Gleixner , jailhouse-dev@googlegroups.com, Ingo Molnar , linux-kernel@vger.kernel.org In-Reply-To: <20191007123819.161432-3-ralf.ramsauer@oth-regensburg.de> References: <20191007123819.161432-3-ralf.ramsauer@oth-regensburg.de> MIME-Version: 1.0 Message-ID: <157047270440.9978.1646295335019419258.tip-bot2@tip-bot2> X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the x86/platform branch of tip: Commit-ID: dac59f1eb78123c3f0e497eb9870ac550c59debb Gitweb: https://git.kernel.org/tip/dac59f1eb78123c3f0e497eb9870ac550c59debb Author: Ralf Ramsauer AuthorDate: Mon, 07 Oct 2019 14:38:19 +02:00 Committer: Ingo Molnar CommitterDate: Mon, 07 Oct 2019 17:35:56 +02:00 x86/jailhouse: Enable platform UARTs only if available ACPI tables aren't available if Linux runs as guest of the hypervisor Jailhouse. This makes the 8250 driver probe for all platform UARTs as it assumes that all platform are present in case of !ACPI. Jailhouse will stop execution of Linux guest due to port access violation. So far, these access violations could be solved by tuning the 8250.nr_uarts parameter but it has limitations: We can, e.g., only map consecutive platform UARTs to Linux, and only in the sequence 0x3f8, 0x2f8, 0x3e8, 0x2e8. Beginning from setup_data version 2, Jailhouse will place information of available platform UARTs in setup_data. This allows for selective activation of platform UARTs. This patch queries the setup_data version and activates only available UARTS. It comes with backward compatibility, and will still support older setup_data versions. In this case, Linux falls back to the old behaviour. Signed-off-by: Ralf Ramsauer Reviewed-by: Jan Kiszka Cc: Borislav Petkov Cc: H . Peter Anvin Cc: Jan Kiszka Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: jailhouse-dev@googlegroups.com Link: https://lkml.kernel.org/r/20191007123819.161432-3-ralf.ramsauer@oth-regensburg.de Signed-off-by: Ingo Molnar --- arch/x86/include/uapi/asm/bootparam.h | 3 +- arch/x86/kernel/jailhouse.c | 83 ++++++++++++++++++++++---- 2 files changed, 74 insertions(+), 12 deletions(-) diff --git a/arch/x86/include/uapi/asm/bootparam.h b/arch/x86/include/uapi/asm/bootparam.h index 43be437..db1e24e 100644 --- a/arch/x86/include/uapi/asm/bootparam.h +++ b/arch/x86/include/uapi/asm/bootparam.h @@ -152,6 +152,9 @@ struct jailhouse_setup_data { __u8 standard_ioapic; __u8 cpu_ids[255]; } __attribute__((packed)) v1; + struct { + __u32 flags; + } __attribute__((packed)) v2; } __attribute__((packed)); /* The so-called "zeropage" */ diff --git a/arch/x86/kernel/jailhouse.c b/arch/x86/kernel/jailhouse.c index b9647ad..95550c0 100644 --- a/arch/x86/kernel/jailhouse.c +++ b/arch/x86/kernel/jailhouse.c @@ -11,6 +11,7 @@ #include #include #include +#include #include #include #include @@ -23,9 +24,22 @@ static __initdata struct jailhouse_setup_data setup_data; #define SETUP_DATA_V1_LEN (sizeof(setup_data.hdr) + sizeof(setup_data.v1)) +#define SETUP_DATA_V2_LEN (SETUP_DATA_V1_LEN + sizeof(setup_data.v2)) static unsigned int precalibrated_tsc_khz; +static void jailhouse_setup_irq(unsigned int irq) +{ + struct mpc_intsrc mp_irq = { + .type = MP_INTSRC, + .irqtype = mp_INT, + .irqflag = MP_IRQPOL_ACTIVE_HIGH | MP_IRQTRIG_EDGE, + .srcbusirq = irq, + .dstirq = irq, + }; + mp_save_irq(&mp_irq); +} + static uint32_t jailhouse_cpuid_base(void) { if (boot_cpu_data.cpuid_level < 0 || @@ -79,11 +93,6 @@ static void __init jailhouse_get_smp_config(unsigned int early) .type = IOAPIC_DOMAIN_STRICT, .ops = &mp_ioapic_irqdomain_ops, }; - struct mpc_intsrc mp_irq = { - .type = MP_INTSRC, - .irqtype = mp_INT, - .irqflag = MP_IRQPOL_ACTIVE_HIGH | MP_IRQTRIG_EDGE, - }; unsigned int cpu; jailhouse_x2apic_init(); @@ -100,12 +109,12 @@ static void __init jailhouse_get_smp_config(unsigned int early) if (setup_data.v1.standard_ioapic) { mp_register_ioapic(0, 0xfec00000, gsi_top, &ioapic_cfg); - /* Register 1:1 mapping for legacy UART IRQs 3 and 4 */ - mp_irq.srcbusirq = mp_irq.dstirq = 3; - mp_save_irq(&mp_irq); - - mp_irq.srcbusirq = mp_irq.dstirq = 4; - mp_save_irq(&mp_irq); + if (IS_ENABLED(CONFIG_SERIAL_8250) && + setup_data.hdr.version < 2) { + /* Register 1:1 mapping for legacy UART IRQs 3 and 4 */ + jailhouse_setup_irq(3); + jailhouse_setup_irq(4); + } } } @@ -138,6 +147,53 @@ static int __init jailhouse_pci_arch_init(void) return 0; } +#ifdef CONFIG_SERIAL_8250 +static bool jailhouse_uart_enabled(unsigned int uart_nr) +{ + return setup_data.v2.flags & BIT(uart_nr); +} + +static void jailhouse_serial_fixup(int port, struct uart_port *up, + u32 *capabilities) +{ + static const u16 pcuart_base[] = {0x3f8, 0x2f8, 0x3e8, 0x2e8}; + unsigned int n; + + for (n = 0; n < ARRAY_SIZE(pcuart_base); n++) { + if (pcuart_base[n] != up->iobase) + continue; + + if (jailhouse_uart_enabled(n)) { + pr_info("Enabling UART%u (port 0x%lx)\n", n, + up->iobase); + jailhouse_setup_irq(up->irq); + } else { + /* Deactivate UART if access isn't allowed */ + up->iobase = 0; + } + break; + } +} + +static void jailhouse_serial_workaround(void) +{ + /* + * There are flags inside setup_data that indicate availability of + * platform UARTs since setup data version 2. + * + * In case of version 1, we don't know which UARTs belong Linux. In + * this case, unconditionally register 1:1 mapping for legacy UART IRQs + * 3 and 4. + */ + if (setup_data.hdr.version > 1) + serial8250_set_isa_configurator(jailhouse_serial_fixup); +} +#else /* !CONFIG_SERIAL_8250 */ +static inline void jailhouse_serial_workaround(void) +{ +} +#endif /* CONFIG_SERIAL_8250 */ + static void __init jailhouse_init_platform(void) { u64 pa_data = boot_params.hdr.setup_data; @@ -188,7 +244,8 @@ static void __init jailhouse_init_platform(void) if (setup_data.hdr.version == 0 || setup_data.hdr.compatible_version != JAILHOUSE_SETUP_REQUIRED_VERSION || - (setup_data.hdr.version >= 1 && header.len < SETUP_DATA_V1_LEN)) + (setup_data.hdr.version == 1 && header.len < SETUP_DATA_V1_LEN) || + (setup_data.hdr.version >= 2 && header.len < SETUP_DATA_V2_LEN)) goto unsupported; pmtmr_ioport = setup_data.v1.pm_timer_address; @@ -204,6 +261,8 @@ static void __init jailhouse_init_platform(void) * are none in a non-root cell. */ disable_acpi(); + + jailhouse_serial_workaround(); return; unsupported: