1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3  * xen console driver interface to hvc_console.c
4  *
5  * (c) 2007 Gerd Hoffmann <kraxel@suse.de>
6  */
7 
8 #include <linux/console.h>
9 #include <linux/delay.h>
10 #include <linux/err.h>
11 #include <linux/irq.h>
12 #include <linux/init.h>
13 #include <linux/types.h>
14 #include <linux/list.h>
15 #include <linux/serial_core.h>
16 
17 #include <asm/io.h>
18 #include <asm/xen/hypervisor.h>
19 
20 #include <xen/xen.h>
21 #include <xen/interface/xen.h>
22 #include <xen/hvm.h>
23 #include <xen/grant_table.h>
24 #include <xen/page.h>
25 #include <xen/events.h>
26 #include <xen/interface/io/console.h>
27 #include <xen/interface/sched.h>
28 #include <xen/hvc-console.h>
29 #include <xen/xenbus.h>
30 
31 #include "hvc_console.h"
32 
33 #define HVC_COOKIE   0x58656e /* "Xen" in hex */
34 
35 struct xencons_info {
36 	struct list_head list;
37 	struct xenbus_device *xbdev;
38 	struct xencons_interface *intf;
39 	unsigned int evtchn;
40 	XENCONS_RING_IDX out_cons;
41 	unsigned int out_cons_same;
42 	struct hvc_struct *hvc;
43 	int irq;
44 	int vtermno;
45 	grant_ref_t gntref;
46 	spinlock_t ring_lock;
47 };
48 
49 static LIST_HEAD(xenconsoles);
50 static DEFINE_SPINLOCK(xencons_lock);
51 
52 /* ------------------------------------------------------------------ */
53 
vtermno_to_xencons(int vtermno)54 static struct xencons_info *vtermno_to_xencons(int vtermno)
55 {
56 	struct xencons_info *entry, *ret = NULL;
57 	unsigned long flags;
58 
59 	spin_lock_irqsave(&xencons_lock, flags);
60 	if (list_empty(&xenconsoles)) {
61 		spin_unlock_irqrestore(&xencons_lock, flags);
62 		return NULL;
63 	}
64 
65 	list_for_each_entry(entry, &xenconsoles, list) {
66 		if (entry->vtermno == vtermno) {
67 			ret  = entry;
68 			break;
69 		}
70 	}
71 	spin_unlock_irqrestore(&xencons_lock, flags);
72 
73 	return ret;
74 }
75 
xenbus_devid_to_vtermno(int devid)76 static inline int xenbus_devid_to_vtermno(int devid)
77 {
78 	return devid + HVC_COOKIE;
79 }
80 
notify_daemon(struct xencons_info * cons)81 static inline void notify_daemon(struct xencons_info *cons)
82 {
83 	/* Use evtchn: this is called early, before irq is set up. */
84 	notify_remote_via_evtchn(cons->evtchn);
85 }
86 
__write_console(struct xencons_info * xencons,const char * data,int len)87 static int __write_console(struct xencons_info *xencons,
88 		const char *data, int len)
89 {
90 	XENCONS_RING_IDX cons, prod;
91 	struct xencons_interface *intf = xencons->intf;
92 	int sent = 0;
93 	unsigned long flags;
94 
95 	spin_lock_irqsave(&xencons->ring_lock, flags);
96 	cons = intf->out_cons;
97 	prod = intf->out_prod;
98 	mb();			/* update queue values before going on */
99 
100 	if ((prod - cons) > sizeof(intf->out)) {
101 		spin_unlock_irqrestore(&xencons->ring_lock, flags);
102 		pr_err_once("xencons: Illegal ring page indices");
103 		return -EINVAL;
104 	}
105 
106 	while ((sent < len) && ((prod - cons) < sizeof(intf->out)))
107 		intf->out[MASK_XENCONS_IDX(prod++, intf->out)] = data[sent++];
108 
109 	wmb();			/* write ring before updating pointer */
110 	intf->out_prod = prod;
111 	spin_unlock_irqrestore(&xencons->ring_lock, flags);
112 
113 	if (sent)
114 		notify_daemon(xencons);
115 	return sent;
116 }
117 
domU_write_console(uint32_t vtermno,const char * data,int len)118 static int domU_write_console(uint32_t vtermno, const char *data, int len)
119 {
120 	int ret = len;
121 	struct xencons_info *cons = vtermno_to_xencons(vtermno);
122 	if (cons == NULL)
123 		return -EINVAL;
124 
125 	/*
126 	 * Make sure the whole buffer is emitted, polling if
127 	 * necessary.  We don't ever want to rely on the hvc daemon
128 	 * because the most interesting console output is when the
129 	 * kernel is crippled.
130 	 */
131 	while (len) {
132 		int sent = __write_console(cons, data, len);
133 
134 		if (sent < 0)
135 			return sent;
136 
137 		data += sent;
138 		len -= sent;
139 
140 		if (unlikely(len))
141 			HYPERVISOR_sched_op(SCHEDOP_yield, NULL);
142 	}
143 
144 	return ret;
145 }
146 
domU_read_console(uint32_t vtermno,char * buf,int len)147 static int domU_read_console(uint32_t vtermno, char *buf, int len)
148 {
149 	struct xencons_interface *intf;
150 	XENCONS_RING_IDX cons, prod;
151 	int recv = 0;
152 	struct xencons_info *xencons = vtermno_to_xencons(vtermno);
153 	unsigned int eoiflag = 0;
154 	unsigned long flags;
155 
156 	if (xencons == NULL)
157 		return -EINVAL;
158 	intf = xencons->intf;
159 
160 	spin_lock_irqsave(&xencons->ring_lock, flags);
161 	cons = intf->in_cons;
162 	prod = intf->in_prod;
163 	mb();			/* get pointers before reading ring */
164 
165 	if ((prod - cons) > sizeof(intf->in)) {
166 		spin_unlock_irqrestore(&xencons->ring_lock, flags);
167 		pr_err_once("xencons: Illegal ring page indices");
168 		return -EINVAL;
169 	}
170 
171 	while (cons != prod && recv < len)
172 		buf[recv++] = intf->in[MASK_XENCONS_IDX(cons++, intf->in)];
173 
174 	mb();			/* read ring before consuming */
175 	intf->in_cons = cons;
176 
177 	/*
178 	 * When to mark interrupt having been spurious:
179 	 * - there was no new data to be read, and
180 	 * - the backend did not consume some output bytes, and
181 	 * - the previous round with no read data didn't see consumed bytes
182 	 *   (we might have a race with an interrupt being in flight while
183 	 *   updating xencons->out_cons, so account for that by allowing one
184 	 *   round without any visible reason)
185 	 */
186 	if (intf->out_cons != xencons->out_cons) {
187 		xencons->out_cons = intf->out_cons;
188 		xencons->out_cons_same = 0;
189 	}
190 	if (!recv && xencons->out_cons_same++ > 1) {
191 		eoiflag = XEN_EOI_FLAG_SPURIOUS;
192 	}
193 	spin_unlock_irqrestore(&xencons->ring_lock, flags);
194 
195 	if (recv) {
196 		notify_daemon(xencons);
197 	}
198 
199 	xen_irq_lateeoi(xencons->irq, eoiflag);
200 
201 	return recv;
202 }
203 
204 static const struct hv_ops domU_hvc_ops = {
205 	.get_chars = domU_read_console,
206 	.put_chars = domU_write_console,
207 	.notifier_add = notifier_add_irq,
208 	.notifier_del = notifier_del_irq,
209 	.notifier_hangup = notifier_hangup_irq,
210 };
211 
dom0_read_console(uint32_t vtermno,char * buf,int len)212 static int dom0_read_console(uint32_t vtermno, char *buf, int len)
213 {
214 	return HYPERVISOR_console_io(CONSOLEIO_read, len, buf);
215 }
216 
217 /*
218  * Either for a dom0 to write to the system console, or a domU with a
219  * debug version of Xen
220  */
dom0_write_console(uint32_t vtermno,const char * str,int len)221 static int dom0_write_console(uint32_t vtermno, const char *str, int len)
222 {
223 	int rc = HYPERVISOR_console_io(CONSOLEIO_write, len, (char *)str);
224 	if (rc < 0)
225 		return rc;
226 
227 	return len;
228 }
229 
230 static const struct hv_ops dom0_hvc_ops = {
231 	.get_chars = dom0_read_console,
232 	.put_chars = dom0_write_console,
233 	.notifier_add = notifier_add_irq,
234 	.notifier_del = notifier_del_irq,
235 	.notifier_hangup = notifier_hangup_irq,
236 };
237 
xen_hvm_console_init(void)238 static int xen_hvm_console_init(void)
239 {
240 	int r;
241 	uint64_t v = 0;
242 	unsigned long gfn, flags;
243 	struct xencons_info *info;
244 
245 	if (!xen_hvm_domain())
246 		return -ENODEV;
247 
248 	info = vtermno_to_xencons(HVC_COOKIE);
249 	if (!info) {
250 		info = kzalloc(sizeof(struct xencons_info), GFP_KERNEL);
251 		if (!info)
252 			return -ENOMEM;
253 		spin_lock_init(&info->ring_lock);
254 	} else if (info->intf != NULL) {
255 		/* already configured */
256 		return 0;
257 	}
258 	/*
259 	 * If the toolstack (or the hypervisor) hasn't set these values, the
260 	 * default value is 0. Even though gfn = 0 and evtchn = 0 are
261 	 * theoretically correct values, in practice they never are and they
262 	 * mean that a legacy toolstack hasn't initialized the pv console correctly.
263 	 */
264 	r = hvm_get_parameter(HVM_PARAM_CONSOLE_EVTCHN, &v);
265 	if (r < 0 || v == 0)
266 		goto err;
267 	info->evtchn = v;
268 	v = 0;
269 	r = hvm_get_parameter(HVM_PARAM_CONSOLE_PFN, &v);
270 	if (r < 0 || v == 0)
271 		goto err;
272 	gfn = v;
273 	info->intf = memremap(gfn << XEN_PAGE_SHIFT, XEN_PAGE_SIZE, MEMREMAP_WB);
274 	if (info->intf == NULL)
275 		goto err;
276 	info->vtermno = HVC_COOKIE;
277 
278 	spin_lock_irqsave(&xencons_lock, flags);
279 	list_add_tail(&info->list, &xenconsoles);
280 	spin_unlock_irqrestore(&xencons_lock, flags);
281 
282 	return 0;
283 err:
284 	kfree(info);
285 	return -ENODEV;
286 }
287 
xencons_info_pv_init(struct xencons_info * info,int vtermno)288 static int xencons_info_pv_init(struct xencons_info *info, int vtermno)
289 {
290 	spin_lock_init(&info->ring_lock);
291 	info->evtchn = xen_start_info->console.domU.evtchn;
292 	/* GFN == MFN for PV guest */
293 	info->intf = gfn_to_virt(xen_start_info->console.domU.mfn);
294 	info->vtermno = vtermno;
295 
296 	list_add_tail(&info->list, &xenconsoles);
297 
298 	return 0;
299 }
300 
xen_pv_console_init(void)301 static int xen_pv_console_init(void)
302 {
303 	struct xencons_info *info;
304 	unsigned long flags;
305 
306 	if (!xen_pv_domain())
307 		return -ENODEV;
308 
309 	if (!xen_start_info->console.domU.evtchn)
310 		return -ENODEV;
311 
312 	info = vtermno_to_xencons(HVC_COOKIE);
313 	if (!info) {
314 		info = kzalloc(sizeof(struct xencons_info), GFP_KERNEL);
315 		if (!info)
316 			return -ENOMEM;
317 	} else if (info->intf != NULL) {
318 		/* already configured */
319 		return 0;
320 	}
321 	spin_lock_irqsave(&xencons_lock, flags);
322 	xencons_info_pv_init(info, HVC_COOKIE);
323 	spin_unlock_irqrestore(&xencons_lock, flags);
324 
325 	return 0;
326 }
327 
xen_initial_domain_console_init(void)328 static int xen_initial_domain_console_init(void)
329 {
330 	struct xencons_info *info;
331 	unsigned long flags;
332 
333 	if (!xen_initial_domain())
334 		return -ENODEV;
335 
336 	info = vtermno_to_xencons(HVC_COOKIE);
337 	if (!info) {
338 		info = kzalloc(sizeof(struct xencons_info), GFP_KERNEL);
339 		if (!info)
340 			return -ENOMEM;
341 		spin_lock_init(&info->ring_lock);
342 	}
343 
344 	info->irq = bind_virq_to_irq(VIRQ_CONSOLE, 0, false);
345 	info->vtermno = HVC_COOKIE;
346 
347 	spin_lock_irqsave(&xencons_lock, flags);
348 	list_add_tail(&info->list, &xenconsoles);
349 	spin_unlock_irqrestore(&xencons_lock, flags);
350 
351 	return 0;
352 }
353 
xen_console_update_evtchn(struct xencons_info * info)354 static void xen_console_update_evtchn(struct xencons_info *info)
355 {
356 	if (xen_hvm_domain()) {
357 		uint64_t v = 0;
358 		int err;
359 
360 		err = hvm_get_parameter(HVM_PARAM_CONSOLE_EVTCHN, &v);
361 		if (!err && v)
362 			info->evtchn = v;
363 	} else
364 		info->evtchn = xen_start_info->console.domU.evtchn;
365 }
366 
xen_console_resume(void)367 void xen_console_resume(void)
368 {
369 	struct xencons_info *info = vtermno_to_xencons(HVC_COOKIE);
370 	if (info != NULL && info->irq) {
371 		if (!xen_initial_domain())
372 			xen_console_update_evtchn(info);
373 		rebind_evtchn_irq(info->evtchn, info->irq);
374 	}
375 }
376 
377 #ifdef CONFIG_HVC_XEN_FRONTEND
xencons_disconnect_backend(struct xencons_info * info)378 static void xencons_disconnect_backend(struct xencons_info *info)
379 {
380 	if (info->hvc != NULL)
381 		hvc_remove(info->hvc);
382 	info->hvc = NULL;
383 	if (info->irq > 0) {
384 		evtchn_put(info->evtchn);
385 		info->irq = 0;
386 		info->evtchn = 0;
387 	}
388 	/* evtchn_put() will also close it so this is only an error path */
389 	if (info->evtchn > 0)
390 		xenbus_free_evtchn(info->xbdev, info->evtchn);
391 	info->evtchn = 0;
392 	if (info->gntref > 0)
393 		gnttab_free_grant_references(info->gntref);
394 	info->gntref = 0;
395 }
396 
xencons_free(struct xencons_info * info)397 static void xencons_free(struct xencons_info *info)
398 {
399 	free_page((unsigned long)info->intf);
400 	info->intf = NULL;
401 	info->vtermno = 0;
402 	kfree(info);
403 }
404 
xen_console_remove(struct xencons_info * info)405 static int xen_console_remove(struct xencons_info *info)
406 {
407 	unsigned long flags;
408 
409 	xencons_disconnect_backend(info);
410 	spin_lock_irqsave(&xencons_lock, flags);
411 	list_del(&info->list);
412 	spin_unlock_irqrestore(&xencons_lock, flags);
413 	if (info->xbdev != NULL)
414 		xencons_free(info);
415 	else {
416 		if (xen_hvm_domain())
417 			iounmap(info->intf);
418 		kfree(info);
419 	}
420 	return 0;
421 }
422 
xencons_remove(struct xenbus_device * dev)423 static void xencons_remove(struct xenbus_device *dev)
424 {
425 	xen_console_remove(dev_get_drvdata(&dev->dev));
426 }
427 
xencons_connect_backend(struct xenbus_device * dev,struct xencons_info * info)428 static int xencons_connect_backend(struct xenbus_device *dev,
429 				  struct xencons_info *info)
430 {
431 	int ret, evtchn, devid, ref, irq;
432 	struct xenbus_transaction xbt;
433 	grant_ref_t gref_head;
434 
435 	ret = xenbus_alloc_evtchn(dev, &evtchn);
436 	if (ret)
437 		return ret;
438 	info->evtchn = evtchn;
439 	irq = bind_evtchn_to_irq_lateeoi(evtchn);
440 	if (irq < 0)
441 		return irq;
442 	info->irq = irq;
443 	devid = dev->nodename[strlen(dev->nodename) - 1] - '0';
444 	info->hvc = hvc_alloc(xenbus_devid_to_vtermno(devid),
445 			irq, &domU_hvc_ops, 256);
446 	if (IS_ERR(info->hvc))
447 		return PTR_ERR(info->hvc);
448 	ret = gnttab_alloc_grant_references(1, &gref_head);
449 	if (ret < 0)
450 		return ret;
451 	info->gntref = gref_head;
452 	ref = gnttab_claim_grant_reference(&gref_head);
453 	if (ref < 0)
454 		return ref;
455 	gnttab_grant_foreign_access_ref(ref, info->xbdev->otherend_id,
456 					virt_to_gfn(info->intf), 0);
457 
458  again:
459 	ret = xenbus_transaction_start(&xbt);
460 	if (ret) {
461 		xenbus_dev_fatal(dev, ret, "starting transaction");
462 		return ret;
463 	}
464 	ret = xenbus_printf(xbt, dev->nodename, "ring-ref", "%d", ref);
465 	if (ret)
466 		goto error_xenbus;
467 	ret = xenbus_printf(xbt, dev->nodename, "port", "%u",
468 			    evtchn);
469 	if (ret)
470 		goto error_xenbus;
471 	ret = xenbus_transaction_end(xbt, 0);
472 	if (ret) {
473 		if (ret == -EAGAIN)
474 			goto again;
475 		xenbus_dev_fatal(dev, ret, "completing transaction");
476 		return ret;
477 	}
478 
479 	xenbus_switch_state(dev, XenbusStateInitialised);
480 	return 0;
481 
482  error_xenbus:
483 	xenbus_transaction_end(xbt, 1);
484 	xenbus_dev_fatal(dev, ret, "writing xenstore");
485 	return ret;
486 }
487 
xencons_probe(struct xenbus_device * dev,const struct xenbus_device_id * id)488 static int xencons_probe(struct xenbus_device *dev,
489 				  const struct xenbus_device_id *id)
490 {
491 	int ret, devid;
492 	struct xencons_info *info;
493 	unsigned long flags;
494 
495 	devid = dev->nodename[strlen(dev->nodename) - 1] - '0';
496 	if (devid == 0)
497 		return -ENODEV;
498 
499 	info = kzalloc(sizeof(struct xencons_info), GFP_KERNEL);
500 	if (!info)
501 		return -ENOMEM;
502 	spin_lock_init(&info->ring_lock);
503 	dev_set_drvdata(&dev->dev, info);
504 	info->xbdev = dev;
505 	info->vtermno = xenbus_devid_to_vtermno(devid);
506 	info->intf = (void *)__get_free_page(GFP_KERNEL | __GFP_ZERO);
507 	if (!info->intf)
508 		goto error_nomem;
509 
510 	ret = xencons_connect_backend(dev, info);
511 	if (ret < 0)
512 		goto error;
513 	spin_lock_irqsave(&xencons_lock, flags);
514 	list_add_tail(&info->list, &xenconsoles);
515 	spin_unlock_irqrestore(&xencons_lock, flags);
516 
517 	return 0;
518 
519  error_nomem:
520 	ret = -ENOMEM;
521 	xenbus_dev_fatal(dev, ret, "allocating device memory");
522  error:
523 	xencons_disconnect_backend(info);
524 	xencons_free(info);
525 	return ret;
526 }
527 
xencons_resume(struct xenbus_device * dev)528 static int xencons_resume(struct xenbus_device *dev)
529 {
530 	struct xencons_info *info = dev_get_drvdata(&dev->dev);
531 
532 	xencons_disconnect_backend(info);
533 	memset(info->intf, 0, XEN_PAGE_SIZE);
534 	return xencons_connect_backend(dev, info);
535 }
536 
xencons_backend_changed(struct xenbus_device * dev,enum xenbus_state backend_state)537 static void xencons_backend_changed(struct xenbus_device *dev,
538 				   enum xenbus_state backend_state)
539 {
540 	switch (backend_state) {
541 	case XenbusStateReconfiguring:
542 	case XenbusStateReconfigured:
543 	case XenbusStateInitialising:
544 	case XenbusStateInitialised:
545 	case XenbusStateUnknown:
546 		break;
547 
548 	case XenbusStateInitWait:
549 		break;
550 
551 	case XenbusStateConnected:
552 		xenbus_switch_state(dev, XenbusStateConnected);
553 		break;
554 
555 	case XenbusStateClosed:
556 		if (dev->state == XenbusStateClosed)
557 			break;
558 		fallthrough;	/* Missed the backend's CLOSING state */
559 	case XenbusStateClosing: {
560 		struct xencons_info *info = dev_get_drvdata(&dev->dev);;
561 
562 		/*
563 		 * Don't tear down the evtchn and grant ref before the other
564 		 * end has disconnected, but do stop userspace from trying
565 		 * to use the device before we allow the backend to close.
566 		 */
567 		if (info->hvc) {
568 			hvc_remove(info->hvc);
569 			info->hvc = NULL;
570 		}
571 
572 		xenbus_frontend_closed(dev);
573 		break;
574 	}
575 	}
576 }
577 
578 static const struct xenbus_device_id xencons_ids[] = {
579 	{ "console" },
580 	{ "" }
581 };
582 
583 static struct xenbus_driver xencons_driver = {
584 	.name = "xenconsole",
585 	.ids = xencons_ids,
586 	.probe = xencons_probe,
587 	.remove = xencons_remove,
588 	.resume = xencons_resume,
589 	.otherend_changed = xencons_backend_changed,
590 	.not_essential = true,
591 };
592 #endif /* CONFIG_HVC_XEN_FRONTEND */
593 
xen_hvc_init(void)594 static int __init xen_hvc_init(void)
595 {
596 	int r;
597 	struct xencons_info *info;
598 	const struct hv_ops *ops;
599 
600 	if (!xen_domain())
601 		return -ENODEV;
602 
603 	if (xen_initial_domain()) {
604 		ops = &dom0_hvc_ops;
605 		r = xen_initial_domain_console_init();
606 		if (r < 0)
607 			goto register_fe;
608 		info = vtermno_to_xencons(HVC_COOKIE);
609 	} else {
610 		ops = &domU_hvc_ops;
611 		if (xen_hvm_domain())
612 			r = xen_hvm_console_init();
613 		else
614 			r = xen_pv_console_init();
615 		if (r < 0)
616 			goto register_fe;
617 
618 		info = vtermno_to_xencons(HVC_COOKIE);
619 		info->irq = bind_evtchn_to_irq_lateeoi(info->evtchn);
620 	}
621 	if (info->irq < 0)
622 		info->irq = 0; /* NO_IRQ */
623 	else
624 		irq_set_noprobe(info->irq);
625 
626 	info->hvc = hvc_alloc(HVC_COOKIE, info->irq, ops, 256);
627 	if (IS_ERR(info->hvc)) {
628 		unsigned long flags;
629 
630 		r = PTR_ERR(info->hvc);
631 		spin_lock_irqsave(&xencons_lock, flags);
632 		list_del(&info->list);
633 		spin_unlock_irqrestore(&xencons_lock, flags);
634 		if (info->irq)
635 			evtchn_put(info->evtchn);
636 		kfree(info);
637 		return r;
638 	}
639 
640 	r = 0;
641  register_fe:
642 #ifdef CONFIG_HVC_XEN_FRONTEND
643 	r = xenbus_register_frontend(&xencons_driver);
644 #endif
645 	return r;
646 }
647 device_initcall(xen_hvc_init);
648 
xen_cons_init(void)649 static int xen_cons_init(void)
650 {
651 	const struct hv_ops *ops;
652 
653 	if (!xen_domain())
654 		return 0;
655 
656 	if (xen_initial_domain())
657 		ops = &dom0_hvc_ops;
658 	else {
659 		int r;
660 		ops = &domU_hvc_ops;
661 
662 		if (xen_hvm_domain())
663 			r = xen_hvm_console_init();
664 		else
665 			r = xen_pv_console_init();
666 		if (r < 0)
667 			return r;
668 	}
669 
670 	hvc_instantiate(HVC_COOKIE, 0, ops);
671 	return 0;
672 }
673 console_initcall(xen_cons_init);
674 
675 #ifdef CONFIG_X86
xen_hvm_early_write(uint32_t vtermno,const char * str,int len)676 static void xen_hvm_early_write(uint32_t vtermno, const char *str, int len)
677 {
678 	if (xen_cpuid_base())
679 		outsb(0xe9, str, len);
680 }
681 #else
xen_hvm_early_write(uint32_t vtermno,const char * str,int len)682 static void xen_hvm_early_write(uint32_t vtermno, const char *str, int len) { }
683 #endif
684 
685 #ifdef CONFIG_EARLY_PRINTK
xenboot_console_setup(struct console * console,char * string)686 static int __init xenboot_console_setup(struct console *console, char *string)
687 {
688 	static struct xencons_info xenboot;
689 
690 	if (xen_initial_domain() || !xen_pv_domain())
691 		return 0;
692 
693 	return xencons_info_pv_init(&xenboot, 0);
694 }
695 
xenboot_write_console(struct console * console,const char * string,unsigned len)696 static void xenboot_write_console(struct console *console, const char *string,
697 				  unsigned len)
698 {
699 	unsigned int linelen, off = 0;
700 	const char *pos;
701 
702 	if (dom0_write_console(0, string, len) >= 0)
703 		return;
704 
705 	if (!xen_pv_domain()) {
706 		xen_hvm_early_write(0, string, len);
707 		return;
708 	}
709 
710 	if (domU_write_console(0, "(early) ", 8) < 0)
711 		return;
712 	while (off < len && NULL != (pos = strchr(string+off, '\n'))) {
713 		linelen = pos-string+off;
714 		if (off + linelen > len)
715 			break;
716 		domU_write_console(0, string+off, linelen);
717 		domU_write_console(0, "\r\n", 2);
718 		off += linelen + 1;
719 	}
720 	if (off < len)
721 		domU_write_console(0, string+off, len-off);
722 }
723 
724 struct console xenboot_console = {
725 	.name		= "xenboot",
726 	.write		= xenboot_write_console,
727 	.setup		= xenboot_console_setup,
728 	.flags		= CON_PRINTBUFFER | CON_BOOT | CON_ANYTIME,
729 	.index		= -1,
730 };
731 #endif	/* CONFIG_EARLY_PRINTK */
732 
xen_raw_console_write(const char * str)733 void xen_raw_console_write(const char *str)
734 {
735 	ssize_t len = strlen(str);
736 	int rc = 0;
737 
738 	if (xen_domain()) {
739 		rc = dom0_write_console(0, str, len);
740 		if (rc != -ENOSYS || !xen_hvm_domain())
741 			return;
742 	}
743 	xen_hvm_early_write(0, str, len);
744 }
745 
xen_raw_printk(const char * fmt,...)746 void xen_raw_printk(const char *fmt, ...)
747 {
748 	static char buf[512];
749 	va_list ap;
750 
751 	va_start(ap, fmt);
752 	vsnprintf(buf, sizeof(buf), fmt, ap);
753 	va_end(ap);
754 
755 	xen_raw_console_write(buf);
756 }
757 
xenboot_earlycon_write(struct console * console,const char * string,unsigned len)758 static void xenboot_earlycon_write(struct console *console,
759 				  const char *string,
760 				  unsigned len)
761 {
762 	dom0_write_console(0, string, len);
763 }
764 
xenboot_earlycon_setup(struct earlycon_device * device,const char * opt)765 static int __init xenboot_earlycon_setup(struct earlycon_device *device,
766 					    const char *opt)
767 {
768 	device->con->write = xenboot_earlycon_write;
769 	return 0;
770 }
771 EARLYCON_DECLARE(xenboot, xenboot_earlycon_setup);
772