2 * Machine specific setup for xen
4 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
7 #include <linux/module.h>
8 #include <linux/sched.h>
15 #include <asm/setup.h>
17 #include <asm/xen/hypervisor.h>
18 #include <asm/xen/hypercall.h>
21 #include <xen/interface/callback.h>
22 #include <xen/interface/physdev.h>
23 #include <xen/features.h>
28 /* These are code, but not functions. Defined in entry.S */
29 extern const char xen_hypervisor_callback
[];
30 extern const char xen_failsafe_callback
[];
31 extern void xen_sysenter_target(void);
32 extern void xen_syscall_target(void);
33 extern void xen_syscall32_target(void);
37 * machine_specific_memory_setup - Hook for machine specific memory setup.
40 char * __init
xen_memory_setup(void)
42 unsigned long max_pfn
= xen_start_info
->nr_pages
;
44 max_pfn
= min(MAX_DOMAIN_PAGES
, max_pfn
);
48 e820_add_region(0, PFN_PHYS((u64
)max_pfn
), E820_RAM
);
51 * Even though this is normal, usable memory under Xen, reserve
52 * ISA memory anyway because too many things think they can poke
55 e820_add_region(ISA_START_ADDRESS
, ISA_END_ADDRESS
- ISA_START_ADDRESS
,
62 * See comment above "struct start_info" in <xen/interface/xen.h>
64 e820_add_region(__pa(xen_start_info
->mfn_list
),
65 xen_start_info
->pt_base
- xen_start_info
->mfn_list
,
68 sanitize_e820_map(e820
.map
, ARRAY_SIZE(e820
.map
), &e820
.nr_map
);
73 static void xen_idle(void)
80 current_thread_info()->status
&= ~TS_POLLING
;
81 smp_mb__after_clear_bit();
83 current_thread_info()->status
|= TS_POLLING
;
88 * Set the bit indicating "nosegneg" library variants should be used.
89 * We only need to bother in pure 32-bit mode; compat 32-bit processes
90 * can have un-truncated segments, so wrapping around is allowed.
92 static void __init
fiddle_vdso(void)
96 mask
= VDSO32_SYMBOL(&vdso32_int80_start
, NOTE_MASK
);
97 *mask
|= 1 << VDSO_NOTE_NONEGSEG_BIT
;
98 mask
= VDSO32_SYMBOL(&vdso32_sysenter_start
, NOTE_MASK
);
99 *mask
|= 1 << VDSO_NOTE_NONEGSEG_BIT
;
103 static __cpuinit
int register_callback(unsigned type
, const void *func
)
105 struct callback_register callback
= {
107 .address
= XEN_CALLBACK(__KERNEL_CS
, func
),
108 .flags
= CALLBACKF_mask_events
,
111 return HYPERVISOR_callback_op(CALLBACKOP_register
, &callback
);
114 void __cpuinit
xen_enable_sysenter(void)
117 unsigned sysenter_feature
;
120 sysenter_feature
= X86_FEATURE_SEP
;
122 sysenter_feature
= X86_FEATURE_SYSENTER32
;
125 if (!boot_cpu_has(sysenter_feature
))
128 ret
= register_callback(CALLBACKTYPE_sysenter
, xen_sysenter_target
);
130 setup_clear_cpu_cap(sysenter_feature
);
133 void __cpuinit
xen_enable_syscall(void)
138 ret
= register_callback(CALLBACKTYPE_syscall
, xen_syscall_target
);
140 printk(KERN_ERR
"Failed to set syscall callback: %d\n", ret
);
141 /* Pretty fatal; 64-bit userspace has no other
142 mechanism for syscalls. */
145 if (boot_cpu_has(X86_FEATURE_SYSCALL32
)) {
146 ret
= register_callback(CALLBACKTYPE_syscall32
,
147 xen_syscall32_target
);
149 setup_clear_cpu_cap(X86_FEATURE_SYSCALL32
);
151 #endif /* CONFIG_X86_64 */
154 void __init
xen_arch_setup(void)
156 struct physdev_set_iopl set_iopl
;
159 HYPERVISOR_vm_assist(VMASST_CMD_enable
, VMASST_TYPE_4gb_segments
);
160 HYPERVISOR_vm_assist(VMASST_CMD_enable
, VMASST_TYPE_writable_pagetables
);
162 if (!xen_feature(XENFEAT_auto_translated_physmap
))
163 HYPERVISOR_vm_assist(VMASST_CMD_enable
,
164 VMASST_TYPE_pae_extended_cr3
);
166 if (register_callback(CALLBACKTYPE_event
, xen_hypervisor_callback
) ||
167 register_callback(CALLBACKTYPE_failsafe
, xen_failsafe_callback
))
170 xen_enable_sysenter();
171 xen_enable_syscall();
174 rc
= HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl
, &set_iopl
);
176 printk(KERN_INFO
"physdev_op failed %d\n", rc
);
179 if (!(xen_start_info
->flags
& SIF_INITDOMAIN
)) {
180 printk(KERN_INFO
"ACPI in unprivileged domain disabled\n");
185 memcpy(boot_command_line
, xen_start_info
->cmd_line
,
186 MAX_GUEST_CMDLINE
> COMMAND_LINE_SIZE
?
187 COMMAND_LINE_SIZE
: MAX_GUEST_CMDLINE
);
191 paravirt_disable_iospace();