2 * Machine specific setup for xen
4 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
7 #include <linux/module.h>
8 #include <linux/sched.h>
15 #include <asm/setup.h>
17 #include <asm/xen/hypervisor.h>
18 #include <asm/xen/hypercall.h>
21 #include <xen/interface/callback.h>
22 #include <xen/interface/physdev.h>
23 #include <xen/features.h>
28 /* These are code, but not functions. Defined in entry.S */
29 extern const char xen_hypervisor_callback[];
30 extern const char xen_failsafe_callback[];
34 * machine_specific_memory_setup - Hook for machine specific memory setup.
37 char * __init xen_memory_setup(void)
39 unsigned long max_pfn = xen_start_info->nr_pages;
41 max_pfn = min(MAX_DOMAIN_PAGES, max_pfn);
45 e820_add_region(0, PFN_PHYS(max_pfn), E820_RAM);
48 * Even though this is normal, usable memory under Xen, reserve
49 * ISA memory anyway because too many things think they can poke
52 e820_add_region(ISA_START_ADDRESS, ISA_END_ADDRESS - ISA_START_ADDRESS,
59 * See comment above "struct start_info" in <xen/interface/xen.h>
61 e820_add_region(__pa(xen_start_info->mfn_list),
62 xen_start_info->pt_base - xen_start_info->mfn_list,
65 sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
70 static void xen_idle(void)
77 current_thread_info()->status &= ~TS_POLLING;
78 smp_mb__after_clear_bit();
80 current_thread_info()->status |= TS_POLLING;
85 * Set the bit indicating "nosegneg" library variants should be used.
87 static void __init fiddle_vdso(void)
89 extern const char vdso32_default_start;
90 u32 *mask = VDSO32_SYMBOL(&vdso32_default_start, NOTE_MASK);
91 *mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
94 void xen_enable_sysenter(void)
96 int cpu = smp_processor_id();
97 extern void xen_sysenter_target(void);
98 /* Mask events on entry, even though they get enabled immediately */
99 static struct callback_register sysenter = {
100 .type = CALLBACKTYPE_sysenter,
101 .address = { __KERNEL_CS, (unsigned long)xen_sysenter_target },
102 .flags = CALLBACKF_mask_events,
105 if (!boot_cpu_has(X86_FEATURE_SEP) ||
106 HYPERVISOR_callback_op(CALLBACKOP_register, &sysenter) != 0) {
107 clear_cpu_cap(&cpu_data(cpu), X86_FEATURE_SEP);
108 clear_cpu_cap(&boot_cpu_data, X86_FEATURE_SEP);
112 void __init xen_arch_setup(void)
114 struct physdev_set_iopl set_iopl;
117 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_4gb_segments);
118 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_writable_pagetables);
120 if (!xen_feature(XENFEAT_auto_translated_physmap))
121 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_pae_extended_cr3);
123 HYPERVISOR_set_callbacks(__KERNEL_CS, (unsigned long)xen_hypervisor_callback,
124 __KERNEL_CS, (unsigned long)xen_failsafe_callback);
126 xen_enable_sysenter();
129 rc = HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl, &set_iopl);
131 printk(KERN_INFO "physdev_op failed %d\n", rc);
134 if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
135 printk(KERN_INFO "ACPI in unprivileged domain disabled\n");
140 memcpy(boot_command_line, xen_start_info->cmd_line,
141 MAX_GUEST_CMDLINE > COMMAND_LINE_SIZE ?
142 COMMAND_LINE_SIZE : MAX_GUEST_CMDLINE);
147 /* fill cpus_possible with all available cpus */
148 xen_fill_possible_map();
151 paravirt_disable_iospace();