blob: 9cce4a92aac0f5377514c56da5780449f2780429 [file] [log] [blame]
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -07001/*
2 * Machine specific setup for xen
3 *
4 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
5 */
6
7#include <linux/module.h>
8#include <linux/sched.h>
9#include <linux/mm.h>
10#include <linux/pm.h>
11
12#include <asm/elf.h>
Roland McGrath6c3652e2008-01-30 13:30:42 +010013#include <asm/vdso.h>
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070014#include <asm/e820.h>
15#include <asm/setup.h>
Jeremy Fitzhardingeb792c752008-06-16 14:54:49 -070016#include <asm/acpi.h>
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070017#include <asm/xen/hypervisor.h>
18#include <asm/xen/hypercall.h>
19
Jeremy Fitzhardinge8006ec32008-05-26 23:31:19 +010020#include <xen/page.h>
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -070021#include <xen/interface/callback.h>
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070022#include <xen/interface/physdev.h>
23#include <xen/features.h>
24
25#include "xen-ops.h"
Roland McGrathd2eea682007-07-20 00:31:43 -070026#include "vdso.h"
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070027
28/* These are code, but not functions. Defined in entry.S */
29extern const char xen_hypervisor_callback[];
30extern const char xen_failsafe_callback[];
31
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070032
33/**
34 * machine_specific_memory_setup - Hook for machine specific memory setup.
35 **/
36
37char * __init xen_memory_setup(void)
38{
39 unsigned long max_pfn = xen_start_info->nr_pages;
40
Jeremy Fitzhardinge8006ec32008-05-26 23:31:19 +010041 max_pfn = min(MAX_DOMAIN_PAGES, max_pfn);
42
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070043 e820.nr_map = 0;
Jeremy Fitzhardingebe5bf9f2008-06-16 14:54:46 -070044
Jeremy Fitzhardingeb792c752008-06-16 14:54:49 -070045 e820_add_region(0, PFN_PHYS(max_pfn), E820_RAM);
46
47 /*
48 * Even though this is normal, usable memory under Xen, reserve
49 * ISA memory anyway because too many things think they can poke
50 * about in there.
51 */
52 e820_add_region(ISA_START_ADDRESS, ISA_END_ADDRESS - ISA_START_ADDRESS,
53 E820_RESERVED);
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070054
Jeremy Fitzhardingebe5bf9f2008-06-16 14:54:46 -070055 /*
56 * Reserve Xen bits:
57 * - mfn_list
58 * - xen_start_info
59 * See comment above "struct start_info" in <xen/interface/xen.h>
60 */
61 e820_add_region(__pa(xen_start_info->mfn_list),
62 xen_start_info->pt_base - xen_start_info->mfn_list,
63 E820_RESERVED);
64
65 sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
66
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070067 return "Xen";
68}
69
70static void xen_idle(void)
71{
72 local_irq_disable();
73
74 if (need_resched())
75 local_irq_enable();
76 else {
77 current_thread_info()->status &= ~TS_POLLING;
78 smp_mb__after_clear_bit();
79 safe_halt();
80 current_thread_info()->status |= TS_POLLING;
81 }
82}
83
Roland McGrathd2eea682007-07-20 00:31:43 -070084/*
85 * Set the bit indicating "nosegneg" library variants should be used.
86 */
Sam Ravnborg08b6d292008-01-30 13:33:25 +010087static void __init fiddle_vdso(void)
Roland McGrathd2eea682007-07-20 00:31:43 -070088{
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070089#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
Roland McGrathaf65d642008-01-30 13:30:43 +010090 extern const char vdso32_default_start;
91 u32 *mask = VDSO32_SYMBOL(&vdso32_default_start, NOTE_MASK);
Roland McGrathd2eea682007-07-20 00:31:43 -070092 *mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -070093#endif
Roland McGrathd2eea682007-07-20 00:31:43 -070094}
95
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -070096static __cpuinit int register_callback(unsigned type, const void *func)
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -070097{
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -070098 struct callback_register callback = {
99 .type = type,
100 .address = XEN_CALLBACK(__KERNEL_CS, func),
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -0700101 .flags = CALLBACKF_mask_events,
102 };
103
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -0700104 return HYPERVISOR_callback_op(CALLBACKOP_register, &callback);
105}
106
107void __cpuinit xen_enable_sysenter(void)
108{
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -0700109 extern void xen_sysenter_target(void);
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700110 int ret;
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700111 unsigned sysenter_feature;
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -0700112
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700113#ifdef CONFIG_X86_32
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700114 sysenter_feature = X86_FEATURE_SEP;
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700115#else
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700116 sysenter_feature = X86_FEATURE_SYSENTER32;
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700117#endif
118
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700119 if (!boot_cpu_has(sysenter_feature))
120 return;
121
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700122 ret = register_callback(CALLBACKTYPE_sysenter, xen_sysenter_target);
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700123 if(ret != 0)
124 setup_clear_cpu_cap(sysenter_feature);
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -0700125}
126
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700127void __cpuinit xen_enable_syscall(void)
128{
129#ifdef CONFIG_X86_64
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700130 int ret;
131 extern void xen_syscall_target(void);
132 extern void xen_syscall32_target(void);
133
134 ret = register_callback(CALLBACKTYPE_syscall, xen_syscall_target);
135 if (ret != 0) {
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700136 printk(KERN_ERR "Failed to set syscall: %d\n", ret);
137 /* Pretty fatal; 64-bit userspace has no other
138 mechanism for syscalls. */
139 }
140
141 if (boot_cpu_has(X86_FEATURE_SYSCALL32)) {
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700142 ret = register_callback(CALLBACKTYPE_syscall32,
143 xen_syscall32_target);
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700144 if (ret != 0) {
145 printk(KERN_INFO "Xen: 32-bit syscall not supported: disabling vdso\n");
146 setup_clear_cpu_cap(X86_FEATURE_SYSCALL32);
147 sysctl_vsyscall32 = 0;
148 }
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700149 }
150#endif /* CONFIG_X86_64 */
151}
152
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700153void __init xen_arch_setup(void)
154{
155 struct physdev_set_iopl set_iopl;
156 int rc;
157
158 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_4gb_segments);
159 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_writable_pagetables);
160
161 if (!xen_feature(XENFEAT_auto_translated_physmap))
162 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_pae_extended_cr3);
163
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -0700164 if (register_callback(CALLBACKTYPE_event, xen_hypervisor_callback) ||
165 register_callback(CALLBACKTYPE_failsafe, xen_failsafe_callback))
166 BUG();
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700167
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -0700168 xen_enable_sysenter();
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700169 xen_enable_syscall();
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -0700170
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700171 set_iopl.iopl = 1;
172 rc = HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl, &set_iopl);
173 if (rc != 0)
174 printk(KERN_INFO "physdev_op failed %d\n", rc);
175
176#ifdef CONFIG_ACPI
177 if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
178 printk(KERN_INFO "ACPI in unprivileged domain disabled\n");
179 disable_acpi();
180 }
181#endif
182
183 memcpy(boot_command_line, xen_start_info->cmd_line,
184 MAX_GUEST_CMDLINE > COMMAND_LINE_SIZE ?
185 COMMAND_LINE_SIZE : MAX_GUEST_CMDLINE);
186
187 pm_idle = xen_idle;
Jeremy Fitzhardingef87e4ca2007-07-17 18:37:06 -0700188
Jeremy Fitzhardingedfdcdd42007-07-17 18:37:07 -0700189 paravirt_disable_iospace();
Roland McGrathd2eea682007-07-20 00:31:43 -0700190
191 fiddle_vdso();
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700192}