blob: ab6c36e1801bccd6d815704da0144876b39ef9d7 [file] [log] [blame]
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -07001/*
2 * Machine specific setup for xen
3 *
4 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
5 */
6
7#include <linux/module.h>
8#include <linux/sched.h>
9#include <linux/mm.h>
10#include <linux/pm.h>
Yinghai Lua9ce6bc2010-08-25 13:39:17 -070011#include <linux/memblock.h>
Len Brownd91ee582011-04-01 18:28:35 -040012#include <linux/cpuidle.h>
Konrad Rzeszutek Wilk48cdd822012-03-13 20:06:57 -040013#include <linux/cpufreq.h>
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070014
15#include <asm/elf.h>
Roland McGrath6c3652e2008-01-30 13:30:42 +010016#include <asm/vdso.h>
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070017#include <asm/e820.h>
18#include <asm/setup.h>
Jeremy Fitzhardingeb792c752008-06-16 14:54:49 -070019#include <asm/acpi.h>
Konrad Rzeszutek Wilk8d54db792012-08-17 10:22:37 -040020#include <asm/numa.h>
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070021#include <asm/xen/hypervisor.h>
22#include <asm/xen/hypercall.h>
23
Ian Campbell45263cb2010-10-25 16:32:29 -070024#include <xen/xen.h>
Jeremy Fitzhardinge8006ec32008-05-26 23:31:19 +010025#include <xen/page.h>
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -070026#include <xen/interface/callback.h>
Ian Campbell35ae11f2009-02-06 19:09:48 -080027#include <xen/interface/memory.h>
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070028#include <xen/interface/physdev.h>
29#include <xen/features.h>
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070030#include "xen-ops.h"
Roland McGrathd2eea682007-07-20 00:31:43 -070031#include "vdso.h"
Matt Rushton4fbb67e32014-08-11 11:57:57 -070032#include "p2m.h"
Juergen Gross1f3ac862014-11-28 11:53:53 +010033#include "mmu.h"
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -070034
Jeremy Fitzhardinge42ee1472010-08-30 16:41:02 -070035/* Amount of extra memory space we add to the e820 ranges */
David Vrabel8b5d44a2011-09-28 17:46:34 +010036struct xen_memory_region xen_extra_mem[XEN_EXTRA_MEM_MAX_REGIONS] __initdata;
Jeremy Fitzhardinge42ee1472010-08-30 16:41:02 -070037
David Vrabelaa244112011-09-28 17:46:32 +010038/* Number of pages released from the initial allocation. */
39unsigned long xen_released_pages;
40
Juergen Gross69632ec2015-07-17 06:51:26 +020041/* E820 map used during setting up memory. */
42static struct e820entry xen_e820_map[E820MAX] __initdata;
43static u32 xen_e820_map_entries __initdata;
44
Juergen Gross1f3ac862014-11-28 11:53:53 +010045/*
46 * Buffer used to remap identity mapped pages. We only need the virtual space.
47 * The physical page behind this address is remapped as needed to different
48 * buffer pages.
49 */
50#define REMAP_SIZE (P2M_PER_PAGE - 3)
51static struct {
52 unsigned long next_area_mfn;
53 unsigned long target_pfn;
54 unsigned long size;
55 unsigned long mfns[REMAP_SIZE];
56} xen_remap_buf __initdata __aligned(PAGE_SIZE);
57static unsigned long xen_remap_mfn __initdata = INVALID_P2M_ENTRY;
Matt Rushton4fbb67e32014-08-11 11:57:57 -070058
Jeremy Fitzhardinge698bb8d2010-09-14 10:19:14 -070059/*
60 * The maximum amount of extra memory compared to the base size. The
61 * main scaling factor is the size of struct page. At extreme ratios
62 * of base:extra, all the base memory can be filled with page
63 * structures for the extra memory, leaving no space for anything
64 * else.
65 *
66 * 10x seems like a reasonable balance between scaling flexibility and
67 * leaving a practically usable system.
68 */
69#define EXTRA_MEM_RATIO (10)
70
Juergen Gross3ba5c862015-01-28 07:44:22 +010071static void __init xen_add_extra_mem(phys_addr_t start, phys_addr_t size)
Jeremy Fitzhardinge42ee1472010-08-30 16:41:02 -070072{
David Vrabeldc91c722011-09-29 12:26:19 +010073 int i;
Konrad Rzeszutek Wilk6eaa4122011-01-18 20:09:41 -050074
David Vrabeldc91c722011-09-29 12:26:19 +010075 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) {
76 /* Add new region. */
77 if (xen_extra_mem[i].size == 0) {
78 xen_extra_mem[i].start = start;
79 xen_extra_mem[i].size = size;
80 break;
81 }
82 /* Append to existing region. */
83 if (xen_extra_mem[i].start + xen_extra_mem[i].size == start) {
84 xen_extra_mem[i].size += size;
85 break;
86 }
87 }
88 if (i == XEN_EXTRA_MEM_MAX_REGIONS)
89 printk(KERN_WARNING "Warning: not enough extra memory regions\n");
Jeremy Fitzhardinge42ee1472010-08-30 16:41:02 -070090
Tejun Heod4bbf7e2011-11-28 09:46:22 -080091 memblock_reserve(start, size);
Juergen Gross5b8e7d82014-11-28 11:53:55 +010092}
Jeremy Fitzhardinge42ee1472010-08-30 16:41:02 -070093
Juergen Gross3ba5c862015-01-28 07:44:22 +010094static void __init xen_del_extra_mem(phys_addr_t start, phys_addr_t size)
Juergen Gross5b8e7d82014-11-28 11:53:55 +010095{
96 int i;
Juergen Gross3ba5c862015-01-28 07:44:22 +010097 phys_addr_t start_r, size_r;
Jeremy Fitzhardinge42ee1472010-08-30 16:41:02 -070098
Juergen Gross5b8e7d82014-11-28 11:53:55 +010099 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) {
100 start_r = xen_extra_mem[i].start;
101 size_r = xen_extra_mem[i].size;
Konrad Rzeszutek Wilkc96aae12012-08-17 16:43:28 -0400102
Juergen Gross5b8e7d82014-11-28 11:53:55 +0100103 /* Start of region. */
104 if (start_r == start) {
105 BUG_ON(size > size_r);
106 xen_extra_mem[i].start += size;
107 xen_extra_mem[i].size -= size;
108 break;
109 }
110 /* End of region. */
111 if (start_r + size_r == start + size) {
112 BUG_ON(size > size_r);
113 xen_extra_mem[i].size -= size;
114 break;
115 }
116 /* Mid of region. */
117 if (start > start_r && start < start_r + size_r) {
118 BUG_ON(start + size > start_r + size_r);
119 xen_extra_mem[i].size = start - start_r;
120 /* Calling memblock_reserve() again is okay. */
121 xen_add_extra_mem(start + size, start_r + size_r -
122 (start + size));
123 break;
124 }
125 }
126 memblock_free(start, size);
127}
128
129/*
130 * Called during boot before the p2m list can take entries beyond the
131 * hypervisor supplied p2m list. Entries in extra mem are to be regarded as
132 * invalid.
133 */
134unsigned long __ref xen_chk_extra_mem(unsigned long pfn)
135{
136 int i;
Juergen Grosse86f9492015-01-12 06:05:09 +0100137 phys_addr_t addr = PFN_PHYS(pfn);
Juergen Gross5b8e7d82014-11-28 11:53:55 +0100138
139 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) {
140 if (addr >= xen_extra_mem[i].start &&
141 addr < xen_extra_mem[i].start + xen_extra_mem[i].size)
142 return INVALID_P2M_ENTRY;
143 }
144
145 return IDENTITY_FRAME(pfn);
146}
147
148/*
149 * Mark all pfns of extra mem as invalid in p2m list.
150 */
151void __init xen_inv_extra_mem(void)
152{
153 unsigned long pfn, pfn_s, pfn_e;
154 int i;
155
156 for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) {
Juergen Gross9a17ad72015-01-12 06:05:10 +0100157 if (!xen_extra_mem[i].size)
158 continue;
Juergen Gross5b8e7d82014-11-28 11:53:55 +0100159 pfn_s = PFN_DOWN(xen_extra_mem[i].start);
160 pfn_e = PFN_UP(xen_extra_mem[i].start + xen_extra_mem[i].size);
161 for (pfn = pfn_s; pfn < pfn_e; pfn++)
162 set_phys_to_machine(pfn, INVALID_P2M_ENTRY);
Konrad Rzeszutek Wilkc96aae12012-08-17 16:43:28 -0400163 }
Jeremy Fitzhardinge42ee1472010-08-30 16:41:02 -0700164}
165
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700166/*
167 * Finds the next RAM pfn available in the E820 map after min_pfn.
168 * This function updates min_pfn with the pfn found and returns
169 * the size of that range or zero if not found.
170 */
Juergen Gross69632ec2015-07-17 06:51:26 +0200171static unsigned long __init xen_find_pfn_range(unsigned long *min_pfn)
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400172{
Juergen Gross69632ec2015-07-17 06:51:26 +0200173 const struct e820entry *entry = xen_e820_map;
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400174 unsigned int i;
175 unsigned long done = 0;
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400176
Juergen Gross69632ec2015-07-17 06:51:26 +0200177 for (i = 0; i < xen_e820_map_entries; i++, entry++) {
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400178 unsigned long s_pfn;
179 unsigned long e_pfn;
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400180
181 if (entry->type != E820_RAM)
182 continue;
183
zhenzhong.duanc3d93f82012-07-18 13:06:39 +0800184 e_pfn = PFN_DOWN(entry->addr + entry->size);
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400185
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700186 /* We only care about E820 after this */
187 if (e_pfn < *min_pfn)
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400188 continue;
189
zhenzhong.duanc3d93f82012-07-18 13:06:39 +0800190 s_pfn = PFN_UP(entry->addr);
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700191
192 /* If min_pfn falls within the E820 entry, we want to start
193 * at the min_pfn PFN.
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400194 */
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700195 if (s_pfn <= *min_pfn) {
196 done = e_pfn - *min_pfn;
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400197 } else {
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700198 done = e_pfn - s_pfn;
199 *min_pfn = s_pfn;
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400200 }
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700201 break;
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400202 }
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700203
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400204 return done;
205}
David Vrabel83d51ab2012-05-03 16:15:42 +0100206
Juergen Gross1f3ac862014-11-28 11:53:53 +0100207static int __init xen_free_mfn(unsigned long mfn)
208{
209 struct xen_memory_reservation reservation = {
210 .address_bits = 0,
211 .extent_order = 0,
212 .domid = DOMID_SELF
213 };
214
215 set_xen_guest_handle(reservation.extent_start, &mfn);
216 reservation.nr_extents = 1;
217
218 return HYPERVISOR_memory_op(XENMEM_decrease_reservation, &reservation);
219}
220
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700221/*
Juergen Gross1f3ac862014-11-28 11:53:53 +0100222 * This releases a chunk of memory and then does the identity map. It's used
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700223 * as a fallback if the remapping fails.
224 */
225static void __init xen_set_identity_and_release_chunk(unsigned long start_pfn,
David Vrabelbc7142c2015-01-07 11:01:08 +0000226 unsigned long end_pfn, unsigned long nr_pages, unsigned long *released)
David Vrabel83d51ab2012-05-03 16:15:42 +0100227{
Juergen Gross1f3ac862014-11-28 11:53:53 +0100228 unsigned long pfn, end;
229 int ret;
230
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700231 WARN_ON(start_pfn > end_pfn);
David Vrabel83d51ab2012-05-03 16:15:42 +0100232
David Vrabelbc7142c2015-01-07 11:01:08 +0000233 /* Release pages first. */
Juergen Gross1f3ac862014-11-28 11:53:53 +0100234 end = min(end_pfn, nr_pages);
235 for (pfn = start_pfn; pfn < end; pfn++) {
236 unsigned long mfn = pfn_to_mfn(pfn);
237
238 /* Make sure pfn exists to start with */
239 if (mfn == INVALID_P2M_ENTRY || mfn_to_pfn(mfn) != pfn)
240 continue;
241
242 ret = xen_free_mfn(mfn);
243 WARN(ret != 1, "Failed to release pfn %lx err=%d\n", pfn, ret);
244
245 if (ret == 1) {
David Vrabelbc7142c2015-01-07 11:01:08 +0000246 (*released)++;
Juergen Gross1f3ac862014-11-28 11:53:53 +0100247 if (!__set_phys_to_machine(pfn, INVALID_P2M_ENTRY))
248 break;
Juergen Gross1f3ac862014-11-28 11:53:53 +0100249 } else
250 break;
251 }
252
David Vrabelbc7142c2015-01-07 11:01:08 +0000253 set_phys_range_identity(start_pfn, end_pfn);
David Vrabel83d51ab2012-05-03 16:15:42 +0100254}
255
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700256/*
Juergen Gross1f3ac862014-11-28 11:53:53 +0100257 * Helper function to update the p2m and m2p tables and kernel mapping.
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700258 */
Juergen Gross1f3ac862014-11-28 11:53:53 +0100259static void __init xen_update_mem_tables(unsigned long pfn, unsigned long mfn)
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700260{
261 struct mmu_update update = {
Juergen Gross3ba5c862015-01-28 07:44:22 +0100262 .ptr = ((uint64_t)mfn << PAGE_SHIFT) | MMU_MACHPHYS_UPDATE,
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700263 .val = pfn
264 };
265
266 /* Update p2m */
Juergen Gross1f3ac862014-11-28 11:53:53 +0100267 if (!set_phys_to_machine(pfn, mfn)) {
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700268 WARN(1, "Failed to set p2m mapping for pfn=%ld mfn=%ld\n",
269 pfn, mfn);
Juergen Gross1f3ac862014-11-28 11:53:53 +0100270 BUG();
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700271 }
272
273 /* Update m2p */
274 if (HYPERVISOR_mmu_update(&update, 1, NULL, DOMID_SELF) < 0) {
275 WARN(1, "Failed to set m2p mapping for mfn=%ld pfn=%ld\n",
276 mfn, pfn);
Juergen Gross1f3ac862014-11-28 11:53:53 +0100277 BUG();
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700278 }
279
Juergen Gross1f3ac862014-11-28 11:53:53 +0100280 /* Update kernel mapping, but not for highmem. */
Juergen Grosse86f9492015-01-12 06:05:09 +0100281 if (pfn >= PFN_UP(__pa(high_memory - 1)))
Juergen Gross1f3ac862014-11-28 11:53:53 +0100282 return;
283
284 if (HYPERVISOR_update_va_mapping((unsigned long)__va(pfn << PAGE_SHIFT),
285 mfn_pte(mfn, PAGE_KERNEL), 0)) {
286 WARN(1, "Failed to update kernel mapping for mfn=%ld pfn=%ld\n",
287 mfn, pfn);
288 BUG();
289 }
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700290}
291
292/*
293 * This function updates the p2m and m2p tables with an identity map from
Juergen Gross1f3ac862014-11-28 11:53:53 +0100294 * start_pfn to start_pfn+size and prepares remapping the underlying RAM of the
295 * original allocation at remap_pfn. The information needed for remapping is
296 * saved in the memory itself to avoid the need for allocating buffers. The
297 * complete remap information is contained in a list of MFNs each containing
298 * up to REMAP_SIZE MFNs and the start target PFN for doing the remap.
299 * This enables us to preserve the original mfn sequence while doing the
300 * remapping at a time when the memory management is capable of allocating
301 * virtual and physical memory in arbitrary amounts, see 'xen_remap_memory' and
302 * its callers.
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700303 */
Juergen Gross1f3ac862014-11-28 11:53:53 +0100304static void __init xen_do_set_identity_and_remap_chunk(
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700305 unsigned long start_pfn, unsigned long size, unsigned long remap_pfn)
306{
Juergen Gross1f3ac862014-11-28 11:53:53 +0100307 unsigned long buf = (unsigned long)&xen_remap_buf;
308 unsigned long mfn_save, mfn;
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700309 unsigned long ident_pfn_iter, remap_pfn_iter;
Juergen Gross1f3ac862014-11-28 11:53:53 +0100310 unsigned long ident_end_pfn = start_pfn + size;
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700311 unsigned long left = size;
Juergen Gross1f3ac862014-11-28 11:53:53 +0100312 unsigned int i, chunk;
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700313
314 WARN_ON(size == 0);
315
316 BUG_ON(xen_feature(XENFEAT_auto_translated_physmap));
317
Juergen Gross1f3ac862014-11-28 11:53:53 +0100318 mfn_save = virt_to_mfn(buf);
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700319
Juergen Gross1f3ac862014-11-28 11:53:53 +0100320 for (ident_pfn_iter = start_pfn, remap_pfn_iter = remap_pfn;
321 ident_pfn_iter < ident_end_pfn;
322 ident_pfn_iter += REMAP_SIZE, remap_pfn_iter += REMAP_SIZE) {
323 chunk = (left < REMAP_SIZE) ? left : REMAP_SIZE;
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700324
Juergen Gross1f3ac862014-11-28 11:53:53 +0100325 /* Map first pfn to xen_remap_buf */
326 mfn = pfn_to_mfn(ident_pfn_iter);
327 set_pte_mfn(buf, mfn, PAGE_KERNEL);
328
329 /* Save mapping information in page */
330 xen_remap_buf.next_area_mfn = xen_remap_mfn;
331 xen_remap_buf.target_pfn = remap_pfn_iter;
332 xen_remap_buf.size = chunk;
333 for (i = 0; i < chunk; i++)
334 xen_remap_buf.mfns[i] = pfn_to_mfn(ident_pfn_iter + i);
335
336 /* Put remap buf into list. */
337 xen_remap_mfn = mfn;
338
339 /* Set identity map */
David Vrabelbc7142c2015-01-07 11:01:08 +0000340 set_phys_range_identity(ident_pfn_iter, ident_pfn_iter + chunk);
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700341
Juergen Gross1f3ac862014-11-28 11:53:53 +0100342 left -= chunk;
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700343 }
344
Juergen Gross1f3ac862014-11-28 11:53:53 +0100345 /* Restore old xen_remap_buf mapping */
346 set_pte_mfn(buf, mfn_save, PAGE_KERNEL);
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700347}
348
349/*
350 * This function takes a contiguous pfn range that needs to be identity mapped
351 * and:
352 *
353 * 1) Finds a new range of pfns to use to remap based on E820 and remap_pfn.
354 * 2) Calls the do_ function to actually do the mapping/remapping work.
355 *
356 * The goal is to not allocate additional memory but to remap the existing
357 * pages. In the case of an error the underlying memory is simply released back
358 * to Xen and not remapped.
359 */
Juergen Gross76f0a482014-12-08 06:32:19 +0100360static unsigned long __init xen_set_identity_and_remap_chunk(
Juergen Gross69632ec2015-07-17 06:51:26 +0200361 unsigned long start_pfn, unsigned long end_pfn, unsigned long nr_pages,
362 unsigned long remap_pfn, unsigned long *released,
363 unsigned long *remapped)
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700364{
365 unsigned long pfn;
366 unsigned long i = 0;
367 unsigned long n = end_pfn - start_pfn;
368
369 while (i < n) {
370 unsigned long cur_pfn = start_pfn + i;
371 unsigned long left = n - i;
372 unsigned long size = left;
373 unsigned long remap_range_size;
374
375 /* Do not remap pages beyond the current allocation */
376 if (cur_pfn >= nr_pages) {
377 /* Identity map remaining pages */
David Vrabelbc7142c2015-01-07 11:01:08 +0000378 set_phys_range_identity(cur_pfn, cur_pfn + size);
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700379 break;
380 }
381 if (cur_pfn + size > nr_pages)
382 size = nr_pages - cur_pfn;
383
Juergen Gross69632ec2015-07-17 06:51:26 +0200384 remap_range_size = xen_find_pfn_range(&remap_pfn);
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700385 if (!remap_range_size) {
386 pr_warning("Unable to find available pfn range, not remapping identity pages\n");
387 xen_set_identity_and_release_chunk(cur_pfn,
David Vrabelbc7142c2015-01-07 11:01:08 +0000388 cur_pfn + left, nr_pages, released);
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700389 break;
390 }
391 /* Adjust size to fit in current e820 RAM region */
392 if (size > remap_range_size)
393 size = remap_range_size;
394
Juergen Gross1f3ac862014-11-28 11:53:53 +0100395 xen_do_set_identity_and_remap_chunk(cur_pfn, size, remap_pfn);
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700396
397 /* Update variables to reflect new mappings. */
398 i += size;
399 remap_pfn += size;
David Vrabela97dae12015-01-07 11:21:50 +0000400 *remapped += size;
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700401 }
402
403 /*
404 * If the PFNs are currently mapped, the VA mapping also needs
405 * to be updated to be 1:1.
406 */
407 for (pfn = start_pfn; pfn <= max_pfn_mapped && pfn < end_pfn; pfn++)
408 (void)HYPERVISOR_update_va_mapping(
409 (unsigned long)__va(pfn << PAGE_SHIFT),
410 mfn_pte(pfn, PAGE_KERNEL_IO), 0);
411
412 return remap_pfn;
413}
414
Juergen Gross69632ec2015-07-17 06:51:26 +0200415static void __init xen_set_identity_and_remap(unsigned long nr_pages,
416 unsigned long *released, unsigned long *remapped)
Miroslav Rezanina093d7b42009-09-16 03:56:17 -0400417{
David Vrabelf3f436e2011-09-28 17:46:36 +0100418 phys_addr_t start = 0;
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700419 unsigned long last_pfn = nr_pages;
Juergen Gross69632ec2015-07-17 06:51:26 +0200420 const struct e820entry *entry = xen_e820_map;
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700421 unsigned long num_released = 0;
David Vrabela97dae12015-01-07 11:21:50 +0000422 unsigned long num_remapped = 0;
Konrad Rzeszutek Wilk68df0da2011-02-01 17:15:30 -0500423 int i;
424
David Vrabelf3f436e2011-09-28 17:46:36 +0100425 /*
426 * Combine non-RAM regions and gaps until a RAM region (or the
427 * end of the map) is reached, then set the 1:1 map and
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700428 * remap the memory in those non-RAM regions.
David Vrabelf3f436e2011-09-28 17:46:36 +0100429 *
430 * The combined non-RAM regions are rounded to a whole number
431 * of pages so any partial pages are accessible via the 1:1
432 * mapping. This is needed for some BIOSes that put (for
433 * example) the DMI tables in a reserved region that begins on
434 * a non-page boundary.
435 */
Juergen Gross69632ec2015-07-17 06:51:26 +0200436 for (i = 0; i < xen_e820_map_entries; i++, entry++) {
David Vrabelf3f436e2011-09-28 17:46:36 +0100437 phys_addr_t end = entry->addr + entry->size;
Juergen Gross69632ec2015-07-17 06:51:26 +0200438 if (entry->type == E820_RAM || i == xen_e820_map_entries - 1) {
David Vrabelf3f436e2011-09-28 17:46:36 +0100439 unsigned long start_pfn = PFN_DOWN(start);
440 unsigned long end_pfn = PFN_UP(end);
Konrad Rzeszutek Wilk68df0da2011-02-01 17:15:30 -0500441
David Vrabelf3f436e2011-09-28 17:46:36 +0100442 if (entry->type == E820_RAM)
443 end_pfn = PFN_UP(entry->addr);
Konrad Rzeszutek Wilk68df0da2011-02-01 17:15:30 -0500444
David Vrabel83d51ab2012-05-03 16:15:42 +0100445 if (start_pfn < end_pfn)
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700446 last_pfn = xen_set_identity_and_remap_chunk(
Juergen Gross69632ec2015-07-17 06:51:26 +0200447 start_pfn, end_pfn, nr_pages,
448 last_pfn, &num_released,
449 &num_remapped);
David Vrabelf3f436e2011-09-28 17:46:36 +0100450 start = end;
Konrad Rzeszutek Wilk68df0da2011-02-01 17:15:30 -0500451 }
Konrad Rzeszutek Wilk68df0da2011-02-01 17:15:30 -0500452 }
David Vrabelf3f436e2011-09-28 17:46:36 +0100453
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700454 *released = num_released;
David Vrabela97dae12015-01-07 11:21:50 +0000455 *remapped = num_remapped;
David Vrabelf3f436e2011-09-28 17:46:36 +0100456
Matt Rushton4fbb67e32014-08-11 11:57:57 -0700457 pr_info("Released %ld page(s)\n", num_released);
Konrad Rzeszutek Wilk68df0da2011-02-01 17:15:30 -0500458}
Juergen Gross1f3ac862014-11-28 11:53:53 +0100459
460/*
461 * Remap the memory prepared in xen_do_set_identity_and_remap_chunk().
462 * The remap information (which mfn remap to which pfn) is contained in the
463 * to be remapped memory itself in a linked list anchored at xen_remap_mfn.
464 * This scheme allows to remap the different chunks in arbitrary order while
465 * the resulting mapping will be independant from the order.
466 */
467void __init xen_remap_memory(void)
468{
469 unsigned long buf = (unsigned long)&xen_remap_buf;
470 unsigned long mfn_save, mfn, pfn;
471 unsigned long remapped = 0;
472 unsigned int i;
473 unsigned long pfn_s = ~0UL;
474 unsigned long len = 0;
475
476 mfn_save = virt_to_mfn(buf);
477
478 while (xen_remap_mfn != INVALID_P2M_ENTRY) {
479 /* Map the remap information */
480 set_pte_mfn(buf, xen_remap_mfn, PAGE_KERNEL);
481
482 BUG_ON(xen_remap_mfn != xen_remap_buf.mfns[0]);
483
484 pfn = xen_remap_buf.target_pfn;
485 for (i = 0; i < xen_remap_buf.size; i++) {
486 mfn = xen_remap_buf.mfns[i];
487 xen_update_mem_tables(pfn, mfn);
488 remapped++;
489 pfn++;
490 }
491 if (pfn_s == ~0UL || pfn == pfn_s) {
492 pfn_s = xen_remap_buf.target_pfn;
493 len += xen_remap_buf.size;
494 } else if (pfn_s + len == xen_remap_buf.target_pfn) {
495 len += xen_remap_buf.size;
496 } else {
Juergen Gross5b8e7d82014-11-28 11:53:55 +0100497 xen_del_extra_mem(PFN_PHYS(pfn_s), PFN_PHYS(len));
Juergen Gross1f3ac862014-11-28 11:53:53 +0100498 pfn_s = xen_remap_buf.target_pfn;
499 len = xen_remap_buf.size;
500 }
501
502 mfn = xen_remap_mfn;
503 xen_remap_mfn = xen_remap_buf.next_area_mfn;
504 }
505
506 if (pfn_s != ~0UL && len)
Juergen Gross5b8e7d82014-11-28 11:53:55 +0100507 xen_del_extra_mem(PFN_PHYS(pfn_s), PFN_PHYS(len));
Juergen Gross1f3ac862014-11-28 11:53:53 +0100508
509 set_pte_mfn(buf, mfn_save, PAGE_KERNEL);
510
511 pr_info("Remapped %ld page(s)\n", remapped);
512}
513
David Vrabeld312ae872011-08-19 15:57:16 +0100514static unsigned long __init xen_get_max_pages(void)
515{
516 unsigned long max_pages = MAX_DOMAIN_PAGES;
517 domid_t domid = DOMID_SELF;
518 int ret;
519
Ian Campbelld3db7282011-12-14 12:16:08 +0000520 /*
521 * For the initial domain we use the maximum reservation as
522 * the maximum page.
523 *
524 * For guest domains the current maximum reservation reflects
525 * the current maximum rather than the static maximum. In this
526 * case the e820 map provided to us will cover the static
527 * maximum region.
528 */
529 if (xen_initial_domain()) {
530 ret = HYPERVISOR_memory_op(XENMEM_maximum_reservation, &domid);
531 if (ret > 0)
532 max_pages = ret;
533 }
534
David Vrabeld312ae872011-08-19 15:57:16 +0100535 return min(max_pages, MAX_DOMAIN_PAGES);
536}
537
Juergen Grossa3f52392015-01-28 07:44:23 +0100538static void __init xen_align_and_add_e820_region(phys_addr_t start,
539 phys_addr_t size, int type)
David Vrabeldc91c722011-09-29 12:26:19 +0100540{
Juergen Gross3ba5c862015-01-28 07:44:22 +0100541 phys_addr_t end = start + size;
David Vrabeldc91c722011-09-29 12:26:19 +0100542
543 /* Align RAM regions to page boundaries. */
544 if (type == E820_RAM) {
545 start = PAGE_ALIGN(start);
Juergen Gross3ba5c862015-01-28 07:44:22 +0100546 end &= ~((phys_addr_t)PAGE_SIZE - 1);
David Vrabeldc91c722011-09-29 12:26:19 +0100547 }
548
549 e820_add_region(start, end - start, type);
550}
551
Juergen Gross69632ec2015-07-17 06:51:26 +0200552static void __init xen_ignore_unusable(void)
David Vrabel3bc38cb2013-08-16 15:42:55 +0100553{
Juergen Gross69632ec2015-07-17 06:51:26 +0200554 struct e820entry *entry = xen_e820_map;
David Vrabel3bc38cb2013-08-16 15:42:55 +0100555 unsigned int i;
556
Juergen Gross69632ec2015-07-17 06:51:26 +0200557 for (i = 0; i < xen_e820_map_entries; i++, entry++) {
David Vrabel3bc38cb2013-08-16 15:42:55 +0100558 if (entry->type == E820_UNUSABLE)
559 entry->type = E820_RAM;
560 }
561}
562
Juergen Gross8f5b0c62015-07-17 06:51:25 +0200563/*
564 * Reserve Xen mfn_list.
565 * See comment above "struct start_info" in <xen/interface/xen.h>
566 * We tried to make the the memblock_reserve more selective so
567 * that it would be clear what region is reserved. Sadly we ran
568 * in the problem wherein on a 64-bit hypervisor with a 32-bit
569 * initial domain, the pt_base has the cr3 value which is not
570 * neccessarily where the pagetable starts! As Jan put it: "
571 * Actually, the adjustment turns out to be correct: The page
572 * tables for a 32-on-64 dom0 get allocated in the order "first L1",
573 * "first L2", "first L3", so the offset to the page table base is
574 * indeed 2. When reading xen/include/public/xen.h's comment
575 * very strictly, this is not a violation (since there nothing is said
576 * that the first thing in the page table space is pointed to by
577 * pt_base; I admit that this seems to be implied though, namely
578 * do I think that it is implied that the page table space is the
579 * range [pt_base, pt_base + nt_pt_frames), whereas that
580 * range here indeed is [pt_base - 2, pt_base - 2 + nt_pt_frames),
581 * which - without a priori knowledge - the kernel would have
582 * difficulty to figure out)." - so lets just fall back to the
583 * easy way and reserve the whole region.
584 */
585static void __init xen_reserve_xen_mfnlist(void)
586{
587 if (xen_start_info->mfn_list >= __START_KERNEL_map) {
588 memblock_reserve(__pa(xen_start_info->mfn_list),
589 xen_start_info->pt_base -
590 xen_start_info->mfn_list);
591 return;
592 }
593
594 memblock_reserve(PFN_PHYS(xen_start_info->first_p2m_pfn),
595 PFN_PHYS(xen_start_info->nr_p2m_frames));
596}
597
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700598/**
599 * machine_specific_memory_setup - Hook for machine specific memory setup.
600 **/
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700601char * __init xen_memory_setup(void)
602{
603 unsigned long max_pfn = xen_start_info->nr_pages;
Juergen Gross3ba5c862015-01-28 07:44:22 +0100604 phys_addr_t mem_end;
Ian Campbell35ae11f2009-02-06 19:09:48 -0800605 int rc;
606 struct xen_memory_map memmap;
David Vrabeldc91c722011-09-29 12:26:19 +0100607 unsigned long max_pages;
Jeremy Fitzhardinge42ee1472010-08-30 16:41:02 -0700608 unsigned long extra_pages = 0;
David Vrabela97dae12015-01-07 11:21:50 +0000609 unsigned long remapped_pages;
Ian Campbell35ae11f2009-02-06 19:09:48 -0800610 int i;
Ian Campbell9e9a5fc2010-09-02 16:16:00 +0100611 int op;
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700612
Jeremy Fitzhardinge8006ec32008-05-26 23:31:19 +0100613 max_pfn = min(MAX_DOMAIN_PAGES, max_pfn);
Ian Campbell35ae11f2009-02-06 19:09:48 -0800614 mem_end = PFN_PHYS(max_pfn);
615
616 memmap.nr_entries = E820MAX;
Juergen Gross69632ec2015-07-17 06:51:26 +0200617 set_xen_guest_handle(memmap.buffer, xen_e820_map);
Ian Campbell35ae11f2009-02-06 19:09:48 -0800618
Ian Campbell9e9a5fc2010-09-02 16:16:00 +0100619 op = xen_initial_domain() ?
620 XENMEM_machine_memory_map :
621 XENMEM_memory_map;
622 rc = HYPERVISOR_memory_op(op, &memmap);
Ian Campbell35ae11f2009-02-06 19:09:48 -0800623 if (rc == -ENOSYS) {
Ian Campbell9ec23a7f2010-10-28 11:32:29 -0700624 BUG_ON(xen_initial_domain());
Ian Campbell35ae11f2009-02-06 19:09:48 -0800625 memmap.nr_entries = 1;
Juergen Gross69632ec2015-07-17 06:51:26 +0200626 xen_e820_map[0].addr = 0ULL;
627 xen_e820_map[0].size = mem_end;
Ian Campbell35ae11f2009-02-06 19:09:48 -0800628 /* 8MB slack (to balance backend allocations). */
Juergen Gross69632ec2015-07-17 06:51:26 +0200629 xen_e820_map[0].size += 8ULL << 20;
630 xen_e820_map[0].type = E820_RAM;
Ian Campbell35ae11f2009-02-06 19:09:48 -0800631 rc = 0;
632 }
633 BUG_ON(rc);
Martin Kelly1ea644c2014-10-16 20:48:11 -0700634 BUG_ON(memmap.nr_entries == 0);
Juergen Gross69632ec2015-07-17 06:51:26 +0200635 xen_e820_map_entries = memmap.nr_entries;
Jeremy Fitzhardinge8006ec32008-05-26 23:31:19 +0100636
David Vrabel3bc38cb2013-08-16 15:42:55 +0100637 /*
638 * Xen won't allow a 1:1 mapping to be created to UNUSABLE
639 * regions, so if we're using the machine memory map leave the
640 * region as RAM as it is in the pseudo-physical map.
641 *
642 * UNUSABLE regions in domUs are not handled and will need
643 * a patch in the future.
644 */
645 if (xen_initial_domain())
Juergen Gross69632ec2015-07-17 06:51:26 +0200646 xen_ignore_unusable();
David Vrabel3bc38cb2013-08-16 15:42:55 +0100647
David Vrabeldc91c722011-09-29 12:26:19 +0100648 /* Make sure the Xen-supplied memory map is well-ordered. */
Juergen Gross69632ec2015-07-17 06:51:26 +0200649 sanitize_e820_map(xen_e820_map, xen_e820_map_entries,
650 &xen_e820_map_entries);
Jeremy Fitzhardingebe5bf9f2008-06-16 14:54:46 -0700651
David Vrabeldc91c722011-09-29 12:26:19 +0100652 max_pages = xen_get_max_pages();
653 if (max_pages > max_pfn)
654 extra_pages += max_pages - max_pfn;
Stefano Stabellini7cb31b72011-01-27 10:13:25 -0500655
David Vrabelf3f436e2011-09-28 17:46:36 +0100656 /*
Juergen Gross1f3ac862014-11-28 11:53:53 +0100657 * Set identity map on non-RAM pages and prepare remapping the
658 * underlying RAM.
David Vrabelf3f436e2011-09-28 17:46:36 +0100659 */
Juergen Gross69632ec2015-07-17 06:51:26 +0200660 xen_set_identity_and_remap(max_pfn, &xen_released_pages,
661 &remapped_pages);
Jeremy Fitzhardinge42ee1472010-08-30 16:41:02 -0700662
Konrad Rzeszutek Wilk58b7b532012-05-29 12:36:43 -0400663 extra_pages += xen_released_pages;
David Vrabela97dae12015-01-07 11:21:50 +0000664 extra_pages += remapped_pages;
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400665
Konrad Rzeszutek Wilk2e2fb752012-04-06 10:07:11 -0400666 /*
David Vrabeldc91c722011-09-29 12:26:19 +0100667 * Clamp the amount of extra memory to a EXTRA_MEM_RATIO
668 * factor the base size. On non-highmem systems, the base
669 * size is the full initial memory allocation; on highmem it
670 * is limited to the max size of lowmem, so that it doesn't
671 * get completely filled.
672 *
673 * In principle there could be a problem in lowmem systems if
674 * the initial memory is also very large with respect to
675 * lowmem, but we won't try to deal with that here.
676 */
677 extra_pages = min(EXTRA_MEM_RATIO * min(max_pfn, PFN_DOWN(MAXMEM)),
678 extra_pages);
David Vrabeldc91c722011-09-29 12:26:19 +0100679 i = 0;
Juergen Gross69632ec2015-07-17 06:51:26 +0200680 while (i < xen_e820_map_entries) {
681 phys_addr_t addr = xen_e820_map[i].addr;
682 phys_addr_t size = xen_e820_map[i].size;
683 u32 type = xen_e820_map[i].type;
David Vrabeldc91c722011-09-29 12:26:19 +0100684
685 if (type == E820_RAM) {
686 if (addr < mem_end) {
687 size = min(size, mem_end - addr);
688 } else if (extra_pages) {
Juergen Gross3ba5c862015-01-28 07:44:22 +0100689 size = min(size, PFN_PHYS(extra_pages));
690 extra_pages -= PFN_DOWN(size);
David Vrabeldc91c722011-09-29 12:26:19 +0100691 xen_add_extra_mem(addr, size);
Juergen Gross5b8e7d82014-11-28 11:53:55 +0100692 xen_max_p2m_pfn = PFN_DOWN(addr + size);
David Vrabeldc91c722011-09-29 12:26:19 +0100693 } else
694 type = E820_UNUSABLE;
Jeremy Fitzhardinge36545812010-09-29 16:54:33 -0700695 }
696
David Vrabeldc91c722011-09-29 12:26:19 +0100697 xen_align_and_add_e820_region(addr, size, type);
Jeremy Fitzhardingeb5b43ce2010-09-02 17:10:12 -0700698
Juergen Gross69632ec2015-07-17 06:51:26 +0200699 xen_e820_map[i].addr += size;
700 xen_e820_map[i].size -= size;
701 if (xen_e820_map[i].size == 0)
David Vrabeldc91c722011-09-29 12:26:19 +0100702 i++;
Ian Campbell35ae11f2009-02-06 19:09:48 -0800703 }
Jeremy Fitzhardingeb792c752008-06-16 14:54:49 -0700704
705 /*
David Vrabel25b884a2014-01-03 15:46:10 +0000706 * Set the rest as identity mapped, in case PCI BARs are
707 * located here.
708 *
709 * PFNs above MAX_P2M_PFN are considered identity mapped as
710 * well.
711 */
Juergen Gross69632ec2015-07-17 06:51:26 +0200712 set_phys_range_identity(xen_e820_map[i - 1].addr / PAGE_SIZE, ~0ul);
David Vrabel25b884a2014-01-03 15:46:10 +0000713
714 /*
Ian Campbell9ec23a7f2010-10-28 11:32:29 -0700715 * In domU, the ISA region is normal, usable memory, but we
716 * reserve ISA memory anyway because too many things poke
Jeremy Fitzhardingeb792c752008-06-16 14:54:49 -0700717 * about in there.
718 */
719 e820_add_region(ISA_START_ADDRESS, ISA_END_ADDRESS - ISA_START_ADDRESS,
720 E820_RESERVED);
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700721
Jeremy Fitzhardingebe5bf9f2008-06-16 14:54:46 -0700722 sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
723
Juergen Gross8f5b0c62015-07-17 06:51:25 +0200724 xen_reserve_xen_mfnlist();
725
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700726 return "Xen";
727}
728
Roland McGrathd2eea682007-07-20 00:31:43 -0700729/*
David Vrabelabacaad2014-06-02 17:58:01 +0100730 * Machine specific memory setup for auto-translated guests.
731 */
732char * __init xen_auto_xlated_memory_setup(void)
733{
David Vrabelabacaad2014-06-02 17:58:01 +0100734 struct xen_memory_map memmap;
735 int i;
736 int rc;
737
738 memmap.nr_entries = E820MAX;
Juergen Gross69632ec2015-07-17 06:51:26 +0200739 set_xen_guest_handle(memmap.buffer, xen_e820_map);
David Vrabelabacaad2014-06-02 17:58:01 +0100740
741 rc = HYPERVISOR_memory_op(XENMEM_memory_map, &memmap);
742 if (rc < 0)
743 panic("No memory map (%d)\n", rc);
744
Juergen Gross69632ec2015-07-17 06:51:26 +0200745 xen_e820_map_entries = memmap.nr_entries;
David Vrabelabacaad2014-06-02 17:58:01 +0100746
Juergen Gross69632ec2015-07-17 06:51:26 +0200747 sanitize_e820_map(xen_e820_map, ARRAY_SIZE(xen_e820_map),
748 &xen_e820_map_entries);
749
750 for (i = 0; i < xen_e820_map_entries; i++)
751 e820_add_region(xen_e820_map[i].addr, xen_e820_map[i].size,
752 xen_e820_map[i].type);
David Vrabelabacaad2014-06-02 17:58:01 +0100753
Juergen Gross8f5b0c62015-07-17 06:51:25 +0200754 xen_reserve_xen_mfnlist();
David Vrabelabacaad2014-06-02 17:58:01 +0100755
756 return "Xen";
757}
758
759/*
Roland McGrathd2eea682007-07-20 00:31:43 -0700760 * Set the bit indicating "nosegneg" library variants should be used.
Jeremy Fitzhardinge6a52e4b2008-07-12 02:22:00 -0700761 * We only need to bother in pure 32-bit mode; compat 32-bit processes
762 * can have un-truncated segments, so wrapping around is allowed.
Roland McGrathd2eea682007-07-20 00:31:43 -0700763 */
Sam Ravnborg08b6d292008-01-30 13:33:25 +0100764static void __init fiddle_vdso(void)
Roland McGrathd2eea682007-07-20 00:31:43 -0700765{
Jeremy Fitzhardinge6a52e4b2008-07-12 02:22:00 -0700766#ifdef CONFIG_X86_32
Andy Lutomirski6f121e52014-05-05 12:19:34 -0700767 /*
768 * This could be called before selected_vdso32 is initialized, so
769 * just fiddle with both possible images. vdso_image_32_syscall
770 * can't be selected, since it only exists on 64-bit systems.
771 */
Jeremy Fitzhardinge6a52e4b2008-07-12 02:22:00 -0700772 u32 *mask;
Andy Lutomirski6f121e52014-05-05 12:19:34 -0700773 mask = vdso_image_32_int80.data +
774 vdso_image_32_int80.sym_VDSO32_NOTE_MASK;
Jeremy Fitzhardinge6a52e4b2008-07-12 02:22:00 -0700775 *mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
Andy Lutomirski6f121e52014-05-05 12:19:34 -0700776 mask = vdso_image_32_sysenter.data +
777 vdso_image_32_sysenter.sym_VDSO32_NOTE_MASK;
Roland McGrathd2eea682007-07-20 00:31:43 -0700778 *mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700779#endif
Roland McGrathd2eea682007-07-20 00:31:43 -0700780}
781
Paul Gortmaker148f9bb2013-06-18 18:23:59 -0400782static int register_callback(unsigned type, const void *func)
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -0700783{
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -0700784 struct callback_register callback = {
785 .type = type,
786 .address = XEN_CALLBACK(__KERNEL_CS, func),
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -0700787 .flags = CALLBACKF_mask_events,
788 };
789
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -0700790 return HYPERVISOR_callback_op(CALLBACKOP_register, &callback);
791}
792
Paul Gortmaker148f9bb2013-06-18 18:23:59 -0400793void xen_enable_sysenter(void)
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -0700794{
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700795 int ret;
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700796 unsigned sysenter_feature;
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -0700797
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700798#ifdef CONFIG_X86_32
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700799 sysenter_feature = X86_FEATURE_SEP;
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700800#else
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700801 sysenter_feature = X86_FEATURE_SYSENTER32;
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700802#endif
803
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700804 if (!boot_cpu_has(sysenter_feature))
805 return;
806
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700807 ret = register_callback(CALLBACKTYPE_sysenter, xen_sysenter_target);
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700808 if(ret != 0)
809 setup_clear_cpu_cap(sysenter_feature);
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -0700810}
811
Paul Gortmaker148f9bb2013-06-18 18:23:59 -0400812void xen_enable_syscall(void)
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700813{
814#ifdef CONFIG_X86_64
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700815 int ret;
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700816
817 ret = register_callback(CALLBACKTYPE_syscall, xen_syscall_target);
818 if (ret != 0) {
Jeremy Fitzhardinged5303b82008-07-12 02:22:06 -0700819 printk(KERN_ERR "Failed to set syscall callback: %d\n", ret);
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700820 /* Pretty fatal; 64-bit userspace has no other
821 mechanism for syscalls. */
822 }
823
824 if (boot_cpu_has(X86_FEATURE_SYSCALL32)) {
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700825 ret = register_callback(CALLBACKTYPE_syscall32,
826 xen_syscall32_target);
Jeremy Fitzhardinged5303b82008-07-12 02:22:06 -0700827 if (ret != 0)
Jeremy Fitzhardinge62541c32008-07-10 16:24:08 -0700828 setup_clear_cpu_cap(X86_FEATURE_SYSCALL32);
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700829 }
830#endif /* CONFIG_X86_64 */
831}
David Vrabelea9f9272014-06-16 13:07:00 +0200832
Mukesh Rathord285d682013-12-13 12:45:31 -0500833void __init xen_pvmmu_arch_setup(void)
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700834{
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700835 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_4gb_segments);
836 HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_writable_pagetables);
837
Mukesh Rathord285d682013-12-13 12:45:31 -0500838 HYPERVISOR_vm_assist(VMASST_CMD_enable,
839 VMASST_TYPE_pae_extended_cr3);
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700840
Jeremy Fitzhardinge88459d42008-07-08 15:07:02 -0700841 if (register_callback(CALLBACKTYPE_event, xen_hypervisor_callback) ||
842 register_callback(CALLBACKTYPE_failsafe, xen_failsafe_callback))
843 BUG();
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700844
Jeremy Fitzhardingee2a81ba2008-03-17 16:37:17 -0700845 xen_enable_sysenter();
Jeremy Fitzhardinge6fcac6d2008-07-08 15:07:14 -0700846 xen_enable_syscall();
Mukesh Rathord285d682013-12-13 12:45:31 -0500847}
848
849/* This function is not called for HVM domains */
850void __init xen_arch_setup(void)
851{
852 xen_panic_handler_init();
853 if (!xen_feature(XENFEAT_auto_translated_physmap))
854 xen_pvmmu_arch_setup();
855
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700856#ifdef CONFIG_ACPI
857 if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
858 printk(KERN_INFO "ACPI in unprivileged domain disabled\n");
859 disable_acpi();
860 }
861#endif
862
863 memcpy(boot_command_line, xen_start_info->cmd_line,
864 MAX_GUEST_CMDLINE > COMMAND_LINE_SIZE ?
865 COMMAND_LINE_SIZE : MAX_GUEST_CMDLINE);
866
Jeremy Fitzhardingebc15fde2010-11-22 17:17:50 -0800867 /* Set up idle, making sure it calls safe_halt() pvop */
Len Brownd91ee582011-04-01 18:28:35 -0400868 disable_cpuidle();
Konrad Rzeszutek Wilk48cdd822012-03-13 20:06:57 -0400869 disable_cpufreq();
Len Brown6a377dd2013-02-09 23:08:07 -0500870 WARN_ON(xen_set_default_idle());
Roland McGrathd2eea682007-07-20 00:31:43 -0700871 fiddle_vdso();
Konrad Rzeszutek Wilk8d54db792012-08-17 10:22:37 -0400872#ifdef CONFIG_NUMA
873 numa_off = 1;
874#endif
Jeremy Fitzhardinge5ead97c2007-07-17 18:37:04 -0700875}