123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194 |
- /*
- * Machine specific setup for xen
- *
- * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
- */
- #include <linux/module.h>
- #include <linux/sched.h>
- #include <linux/mm.h>
- #include <linux/pm.h>
- #include <asm/elf.h>
- #include <asm/vdso.h>
- #include <asm/e820.h>
- #include <asm/setup.h>
- #include <asm/acpi.h>
- #include <asm/xen/hypervisor.h>
- #include <asm/xen/hypercall.h>
- #include <xen/page.h>
- #include <xen/interface/callback.h>
- #include <xen/interface/physdev.h>
- #include <xen/features.h>
- #include "xen-ops.h"
- #include "vdso.h"
- /* These are code, but not functions. Defined in entry.S */
- extern const char xen_hypervisor_callback[];
- extern const char xen_failsafe_callback[];
- extern void xen_sysenter_target(void);
- extern void xen_syscall_target(void);
- extern void xen_syscall32_target(void);
- /**
- * machine_specific_memory_setup - Hook for machine specific memory setup.
- **/
- char * __init xen_memory_setup(void)
- {
- unsigned long max_pfn = xen_start_info->nr_pages;
- max_pfn = min(MAX_DOMAIN_PAGES, max_pfn);
- e820.nr_map = 0;
- e820_add_region(0, PFN_PHYS((u64)max_pfn), E820_RAM);
- /*
- * Even though this is normal, usable memory under Xen, reserve
- * ISA memory anyway because too many things think they can poke
- * about in there.
- */
- e820_add_region(ISA_START_ADDRESS, ISA_END_ADDRESS - ISA_START_ADDRESS,
- E820_RESERVED);
- /*
- * Reserve Xen bits:
- * - mfn_list
- * - xen_start_info
- * See comment above "struct start_info" in <xen/interface/xen.h>
- */
- e820_add_region(__pa(xen_start_info->mfn_list),
- xen_start_info->pt_base - xen_start_info->mfn_list,
- E820_RESERVED);
- sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
- return "Xen";
- }
- static void xen_idle(void)
- {
- local_irq_disable();
- if (need_resched())
- local_irq_enable();
- else {
- current_thread_info()->status &= ~TS_POLLING;
- smp_mb__after_clear_bit();
- safe_halt();
- current_thread_info()->status |= TS_POLLING;
- }
- }
- /*
- * Set the bit indicating "nosegneg" library variants should be used.
- * We only need to bother in pure 32-bit mode; compat 32-bit processes
- * can have un-truncated segments, so wrapping around is allowed.
- */
- static void __init fiddle_vdso(void)
- {
- #ifdef CONFIG_X86_32
- u32 *mask;
- mask = VDSO32_SYMBOL(&vdso32_int80_start, NOTE_MASK);
- *mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
- mask = VDSO32_SYMBOL(&vdso32_sysenter_start, NOTE_MASK);
- *mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
- #endif
- }
- static __cpuinit int register_callback(unsigned type, const void *func)
- {
- struct callback_register callback = {
- .type = type,
- .address = XEN_CALLBACK(__KERNEL_CS, func),
- .flags = CALLBACKF_mask_events,
- };
- return HYPERVISOR_callback_op(CALLBACKOP_register, &callback);
- }
- void __cpuinit xen_enable_sysenter(void)
- {
- int ret;
- unsigned sysenter_feature;
- #ifdef CONFIG_X86_32
- sysenter_feature = X86_FEATURE_SEP;
- #else
- sysenter_feature = X86_FEATURE_SYSENTER32;
- #endif
- if (!boot_cpu_has(sysenter_feature))
- return;
- ret = register_callback(CALLBACKTYPE_sysenter, xen_sysenter_target);
- if(ret != 0)
- setup_clear_cpu_cap(sysenter_feature);
- }
- void __cpuinit xen_enable_syscall(void)
- {
- #ifdef CONFIG_X86_64
- int ret;
- ret = register_callback(CALLBACKTYPE_syscall, xen_syscall_target);
- if (ret != 0) {
- printk(KERN_ERR "Failed to set syscall callback: %d\n", ret);
- /* Pretty fatal; 64-bit userspace has no other
- mechanism for syscalls. */
- }
- if (boot_cpu_has(X86_FEATURE_SYSCALL32)) {
- ret = register_callback(CALLBACKTYPE_syscall32,
- xen_syscall32_target);
- if (ret != 0)
- setup_clear_cpu_cap(X86_FEATURE_SYSCALL32);
- }
- #endif /* CONFIG_X86_64 */
- }
- void __init xen_arch_setup(void)
- {
- struct physdev_set_iopl set_iopl;
- int rc;
- HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_4gb_segments);
- HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_writable_pagetables);
- if (!xen_feature(XENFEAT_auto_translated_physmap))
- HYPERVISOR_vm_assist(VMASST_CMD_enable,
- VMASST_TYPE_pae_extended_cr3);
- if (register_callback(CALLBACKTYPE_event, xen_hypervisor_callback) ||
- register_callback(CALLBACKTYPE_failsafe, xen_failsafe_callback))
- BUG();
- xen_enable_sysenter();
- xen_enable_syscall();
- set_iopl.iopl = 1;
- rc = HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl, &set_iopl);
- if (rc != 0)
- printk(KERN_INFO "physdev_op failed %d\n", rc);
- #ifdef CONFIG_ACPI
- if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
- printk(KERN_INFO "ACPI in unprivileged domain disabled\n");
- disable_acpi();
- }
- #endif
- memcpy(boot_command_line, xen_start_info->cmd_line,
- MAX_GUEST_CMDLINE > COMMAND_LINE_SIZE ?
- COMMAND_LINE_SIZE : MAX_GUEST_CMDLINE);
- pm_idle = xen_idle;
- paravirt_disable_iospace();
- fiddle_vdso();
- }
|