2 * Machine specific setup for xen
4 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
7 #include <linux/module.h>
8 #include <linux/sched.h>
15 #include <asm/setup.h>
17 #include <asm/xen/hypervisor.h>
18 #include <asm/xen/hypercall.h>
21 #include <xen/interface/callback.h>
22 #include <xen/interface/physdev.h>
23 #include <xen/features.h>
28 /* These are code, but not functions. Defined in entry.S */
29 extern const char xen_hypervisor_callback[];
30 extern const char xen_failsafe_callback[];
31 extern void xen_sysenter_target(void);
32 extern void xen_syscall_target(void);
33 extern void xen_syscall32_target(void);
37 * machine_specific_memory_setup - Hook for machine specific memory setup.
40 char * __init xen_memory_setup(void)
42 unsigned long max_pfn = xen_start_info->nr_pages;
44 max_pfn = min(MAX_DOMAIN_PAGES, max_pfn);
48 e820_add_region(0, PFN_PHYS((u64)max_pfn), E820_RAM);
51 * Even though this is normal, usable memory under Xen, reserve
52 * ISA memory anyway because too many things think they can poke
55 e820_add_region(ISA_START_ADDRESS, ISA_END_ADDRESS - ISA_START_ADDRESS,
62 * See comment above "struct start_info" in <xen/interface/xen.h>
64 e820_add_region(__pa(xen_start_info->mfn_list),
65 xen_start_info->pt_base - xen_start_info->mfn_list,
68 sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
73 static void xen_idle(void)
80 current_thread_info()->status &= ~TS_POLLING;
81 smp_mb__after_clear_bit();
83 current_thread_info()->status |= TS_POLLING;
88 * Set the bit indicating "nosegneg" library variants should be used.
89 * We only need to bother in pure 32-bit mode; compat 32-bit processes
90 * can have un-truncated segments, so wrapping around is allowed.
92 static void __init fiddle_vdso(void)
96 mask = VDSO32_SYMBOL(&vdso32_int80_start, NOTE_MASK);
97 *mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
98 mask = VDSO32_SYMBOL(&vdso32_sysenter_start, NOTE_MASK);
99 *mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
103 static __cpuinit int register_callback(unsigned type, const void *func)
105 struct callback_register callback = {
107 .address = XEN_CALLBACK(__KERNEL_CS, func),
108 .flags = CALLBACKF_mask_events,
111 return HYPERVISOR_callback_op(CALLBACKOP_register, &callback);
114 void __cpuinit xen_enable_sysenter(void)
117 unsigned sysenter_feature;
120 sysenter_feature = X86_FEATURE_SEP;
122 sysenter_feature = X86_FEATURE_SYSENTER32;
125 if (!boot_cpu_has(sysenter_feature))
128 ret = register_callback(CALLBACKTYPE_sysenter, xen_sysenter_target);
130 setup_clear_cpu_cap(sysenter_feature);
133 void __cpuinit xen_enable_syscall(void)
138 ret = register_callback(CALLBACKTYPE_syscall, xen_syscall_target);
140 printk(KERN_ERR "Failed to set syscall callback: %d\n", ret);
141 /* Pretty fatal; 64-bit userspace has no other
142 mechanism for syscalls. */
145 if (boot_cpu_has(X86_FEATURE_SYSCALL32)) {
146 ret = register_callback(CALLBACKTYPE_syscall32,
147 xen_syscall32_target);
149 setup_clear_cpu_cap(X86_FEATURE_SYSCALL32);
151 #endif /* CONFIG_X86_64 */
154 void __init xen_arch_setup(void)
156 struct physdev_set_iopl set_iopl;
159 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_4gb_segments);
160 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_writable_pagetables);
162 if (!xen_feature(XENFEAT_auto_translated_physmap))
163 HYPERVISOR_vm_assist(VMASST_CMD_enable,
164 VMASST_TYPE_pae_extended_cr3);
166 if (register_callback(CALLBACKTYPE_event, xen_hypervisor_callback) ||
167 register_callback(CALLBACKTYPE_failsafe, xen_failsafe_callback))
170 xen_enable_sysenter();
171 xen_enable_syscall();
174 rc = HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl, &set_iopl);
176 printk(KERN_INFO "physdev_op failed %d\n", rc);
179 if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
180 printk(KERN_INFO "ACPI in unprivileged domain disabled\n");
185 memcpy(boot_command_line, xen_start_info->cmd_line,
186 MAX_GUEST_CMDLINE > COMMAND_LINE_SIZE ?
187 COMMAND_LINE_SIZE : MAX_GUEST_CMDLINE);
191 paravirt_disable_iospace();