2 * Machine specific setup for xen
4 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
7 #include <linux/module.h>
8 #include <linux/sched.h>
15 #include <asm/setup.h>
17 #include <asm/xen/hypervisor.h>
18 #include <asm/xen/hypercall.h>
21 #include <xen/interface/callback.h>
22 #include <xen/interface/physdev.h>
23 #include <xen/features.h>
28 /* These are code, but not functions. Defined in entry.S */
29 extern const char xen_hypervisor_callback
[];
30 extern const char xen_failsafe_callback
[];
34 * machine_specific_memory_setup - Hook for machine specific memory setup.
37 char * __init
xen_memory_setup(void)
39 unsigned long max_pfn
= xen_start_info
->nr_pages
;
41 max_pfn
= min(MAX_DOMAIN_PAGES
, max_pfn
);
45 e820_add_region(0, PFN_PHYS((u64
)max_pfn
), E820_RAM
);
48 * Even though this is normal, usable memory under Xen, reserve
49 * ISA memory anyway because too many things think they can poke
52 e820_add_region(ISA_START_ADDRESS
, ISA_END_ADDRESS
- ISA_START_ADDRESS
,
59 * See comment above "struct start_info" in <xen/interface/xen.h>
61 e820_add_region(__pa(xen_start_info
->mfn_list
),
62 xen_start_info
->pt_base
- xen_start_info
->mfn_list
,
65 sanitize_e820_map(e820
.map
, ARRAY_SIZE(e820
.map
), &e820
.nr_map
);
70 static void xen_idle(void)
77 current_thread_info()->status
&= ~TS_POLLING
;
78 smp_mb__after_clear_bit();
80 current_thread_info()->status
|= TS_POLLING
;
85 * Set the bit indicating "nosegneg" library variants should be used.
86 * We only need to bother in pure 32-bit mode; compat 32-bit processes
87 * can have un-truncated segments, so wrapping around is allowed.
89 static void __init
fiddle_vdso(void)
93 mask
= VDSO32_SYMBOL(&vdso32_int80_start
, NOTE_MASK
);
94 *mask
|= 1 << VDSO_NOTE_NONEGSEG_BIT
;
95 mask
= VDSO32_SYMBOL(&vdso32_sysenter_start
, NOTE_MASK
);
96 *mask
|= 1 << VDSO_NOTE_NONEGSEG_BIT
;
100 static __cpuinit
int register_callback(unsigned type
, const void *func
)
102 struct callback_register callback
= {
104 .address
= XEN_CALLBACK(__KERNEL_CS
, func
),
105 .flags
= CALLBACKF_mask_events
,
108 return HYPERVISOR_callback_op(CALLBACKOP_register
, &callback
);
111 void __cpuinit
xen_enable_sysenter(void)
113 extern void xen_sysenter_target(void);
115 unsigned sysenter_feature
;
118 sysenter_feature
= X86_FEATURE_SEP
;
120 sysenter_feature
= X86_FEATURE_SYSENTER32
;
123 if (!boot_cpu_has(sysenter_feature
))
126 ret
= register_callback(CALLBACKTYPE_sysenter
, xen_sysenter_target
);
128 setup_clear_cpu_cap(sysenter_feature
);
131 void __cpuinit
xen_enable_syscall(void)
135 extern void xen_syscall_target(void);
136 extern void xen_syscall32_target(void);
138 ret
= register_callback(CALLBACKTYPE_syscall
, xen_syscall_target
);
140 printk(KERN_ERR
"Failed to set syscall callback: %d\n", ret
);
141 /* Pretty fatal; 64-bit userspace has no other
142 mechanism for syscalls. */
145 if (boot_cpu_has(X86_FEATURE_SYSCALL32
)) {
146 ret
= register_callback(CALLBACKTYPE_syscall32
,
147 xen_syscall32_target
);
149 setup_clear_cpu_cap(X86_FEATURE_SYSCALL32
);
151 #endif /* CONFIG_X86_64 */
154 void __init
xen_arch_setup(void)
156 struct physdev_set_iopl set_iopl
;
159 HYPERVISOR_vm_assist(VMASST_CMD_enable
, VMASST_TYPE_4gb_segments
);
160 HYPERVISOR_vm_assist(VMASST_CMD_enable
, VMASST_TYPE_writable_pagetables
);
162 if (!xen_feature(XENFEAT_auto_translated_physmap
))
163 HYPERVISOR_vm_assist(VMASST_CMD_enable
, VMASST_TYPE_pae_extended_cr3
);
165 if (register_callback(CALLBACKTYPE_event
, xen_hypervisor_callback
) ||
166 register_callback(CALLBACKTYPE_failsafe
, xen_failsafe_callback
))
169 xen_enable_sysenter();
170 xen_enable_syscall();
173 rc
= HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl
, &set_iopl
);
175 printk(KERN_INFO
"physdev_op failed %d\n", rc
);
178 if (!(xen_start_info
->flags
& SIF_INITDOMAIN
)) {
179 printk(KERN_INFO
"ACPI in unprivileged domain disabled\n");
184 memcpy(boot_command_line
, xen_start_info
->cmd_line
,
185 MAX_GUEST_CMDLINE
> COMMAND_LINE_SIZE
?
186 COMMAND_LINE_SIZE
: MAX_GUEST_CMDLINE
);
190 paravirt_disable_iospace();