2 * Machine specific setup for xen
4 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
7 #include <linux/module.h>
8 #include <linux/sched.h>
15 #include <asm/setup.h>
16 #include <asm/xen/hypervisor.h>
17 #include <asm/xen/hypercall.h>
19 #include <xen/interface/callback.h>
20 #include <xen/interface/physdev.h>
21 #include <xen/features.h>
26 /* These are code, but not functions. Defined in entry.S */
27 extern const char xen_hypervisor_callback
[];
28 extern const char xen_failsafe_callback
[];
30 unsigned long *phys_to_machine_mapping
;
31 EXPORT_SYMBOL(phys_to_machine_mapping
);
34 * machine_specific_memory_setup - Hook for machine specific memory setup.
37 char * __init
xen_memory_setup(void)
39 unsigned long max_pfn
= xen_start_info
->nr_pages
;
42 add_memory_region(0, LOWMEMSIZE(), E820_RAM
);
43 add_memory_region(HIGH_MEMORY
, PFN_PHYS(max_pfn
)-HIGH_MEMORY
, E820_RAM
);
48 static void xen_idle(void)
55 current_thread_info()->status
&= ~TS_POLLING
;
56 smp_mb__after_clear_bit();
58 current_thread_info()->status
|= TS_POLLING
;
63 * Set the bit indicating "nosegneg" library variants should be used.
65 static void __init
fiddle_vdso(void)
67 extern const char vdso32_default_start
;
68 u32
*mask
= VDSO32_SYMBOL(&vdso32_default_start
, NOTE_MASK
);
69 *mask
|= 1 << VDSO_NOTE_NONEGSEG_BIT
;
72 void xen_enable_sysenter(void)
74 int cpu
= smp_processor_id();
75 extern void xen_sysenter_target(void);
76 /* Mask events on entry, even though they get enabled immediately */
77 static struct callback_register sysenter
= {
78 .type
= CALLBACKTYPE_sysenter
,
79 .address
= { __KERNEL_CS
, (unsigned long)xen_sysenter_target
},
80 .flags
= CALLBACKF_mask_events
,
83 if (!boot_cpu_has(X86_FEATURE_SEP
) ||
84 HYPERVISOR_callback_op(CALLBACKOP_register
, &sysenter
) != 0) {
85 clear_cpu_cap(&cpu_data(cpu
), X86_FEATURE_SEP
);
86 clear_cpu_cap(&boot_cpu_data
, X86_FEATURE_SEP
);
90 void __init
xen_arch_setup(void)
92 struct physdev_set_iopl set_iopl
;
95 HYPERVISOR_vm_assist(VMASST_CMD_enable
, VMASST_TYPE_4gb_segments
);
96 HYPERVISOR_vm_assist(VMASST_CMD_enable
, VMASST_TYPE_writable_pagetables
);
98 if (!xen_feature(XENFEAT_auto_translated_physmap
))
99 HYPERVISOR_vm_assist(VMASST_CMD_enable
, VMASST_TYPE_pae_extended_cr3
);
101 HYPERVISOR_set_callbacks(__KERNEL_CS
, (unsigned long)xen_hypervisor_callback
,
102 __KERNEL_CS
, (unsigned long)xen_failsafe_callback
);
104 xen_enable_sysenter();
107 rc
= HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl
, &set_iopl
);
109 printk(KERN_INFO
"physdev_op failed %d\n", rc
);
112 if (!(xen_start_info
->flags
& SIF_INITDOMAIN
)) {
113 printk(KERN_INFO
"ACPI in unprivileged domain disabled\n");
118 memcpy(boot_command_line
, xen_start_info
->cmd_line
,
119 MAX_GUEST_CMDLINE
> COMMAND_LINE_SIZE
?
120 COMMAND_LINE_SIZE
: MAX_GUEST_CMDLINE
);
125 /* fill cpus_possible with all available cpus */
126 xen_fill_possible_map();
129 paravirt_disable_iospace();