Linux Audio

Check our new training course

Loading...
v3.1
 
  1/*
  2 * Machine specific setup for xen
  3 *
  4 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
  5 */
  6
  7#include <linux/module.h>
 
  8#include <linux/sched.h>
 
  9#include <linux/mm.h>
 10#include <linux/pm.h>
 11#include <linux/memblock.h>
 12#include <linux/cpuidle.h>
 
 
 13
 14#include <asm/elf.h>
 15#include <asm/vdso.h>
 16#include <asm/e820.h>
 17#include <asm/setup.h>
 18#include <asm/acpi.h>
 
 
 19#include <asm/xen/hypervisor.h>
 20#include <asm/xen/hypercall.h>
 21
 22#include <xen/xen.h>
 23#include <xen/page.h>
 24#include <xen/interface/callback.h>
 25#include <xen/interface/memory.h>
 26#include <xen/interface/physdev.h>
 27#include <xen/features.h>
 28
 29#include "xen-ops.h"
 30#include "vdso.h"
 
 
 
 
 
 
 
 
 31
 32/* These are code, but not functions.  Defined in entry.S */
 33extern const char xen_hypervisor_callback[];
 34extern const char xen_failsafe_callback[];
 35extern void xen_sysenter_target(void);
 36extern void xen_syscall_target(void);
 37extern void xen_syscall32_target(void);
 38
 39/* Amount of extra memory space we add to the e820 ranges */
 40phys_addr_t xen_extra_mem_start, xen_extra_mem_size;
 41
 42/* 
 43 * The maximum amount of extra memory compared to the base size.  The
 44 * main scaling factor is the size of struct page.  At extreme ratios
 45 * of base:extra, all the base memory can be filled with page
 46 * structures for the extra memory, leaving no space for anything
 47 * else.
 48 * 
 49 * 10x seems like a reasonable balance between scaling flexibility and
 50 * leaving a practically usable system.
 51 */
 52#define EXTRA_MEM_RATIO		(10)
 
 
 
 
 
 
 
 
 
 53
 54static void __init xen_add_extra_mem(unsigned long pages)
 55{
 56	unsigned long pfn;
 
 57
 58	u64 size = (u64)pages * PAGE_SIZE;
 59	u64 extra_start = xen_extra_mem_start + xen_extra_mem_size;
 
 60
 61	if (!pages)
 
 
 
 62		return;
 63
 64	e820_add_region(extra_start, size, E820_RAM);
 65	sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
 
 
 
 
 
 
 66
 67	memblock_x86_reserve_range(extra_start, extra_start + size, "XEN EXTRA");
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 68
 69	xen_extra_mem_size += size;
 
 
 
 
 
 
 
 70
 71	xen_max_p2m_pfn = PFN_DOWN(extra_start + size);
 
 
 
 
 72
 73	for (pfn = PFN_DOWN(extra_start); pfn <= xen_max_p2m_pfn; pfn++)
 74		__set_phys_to_machine(pfn, INVALID_P2M_ENTRY);
 75}
 76
 77static unsigned long __init xen_release_chunk(phys_addr_t start_addr,
 78					      phys_addr_t end_addr)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 79{
 80	struct xen_memory_reservation reservation = {
 81		.address_bits = 0,
 82		.extent_order = 0,
 83		.domid        = DOMID_SELF
 84	};
 85	unsigned long start, end;
 86	unsigned long len = 0;
 87	unsigned long pfn;
 88	int ret;
 89
 90	start = PFN_UP(start_addr);
 91	end = PFN_DOWN(end_addr);
 
 
 
 
 
 
 
 
 
 
 
 
 
 92
 93	if (end <= start)
 94		return 0;
 95
 96	for(pfn = start; pfn < end; pfn++) {
 
 
 97		unsigned long mfn = pfn_to_mfn(pfn);
 98
 99		/* Make sure pfn exists to start with */
100		if (mfn == INVALID_P2M_ENTRY || mfn_to_pfn(mfn) != pfn)
101			continue;
102
103		set_xen_guest_handle(reservation.extent_start, &mfn);
104		reservation.nr_extents = 1;
105
106		ret = HYPERVISOR_memory_op(XENMEM_decrease_reservation,
107					   &reservation);
108		WARN(ret != 1, "Failed to release pfn %lx err=%d\n", pfn, ret);
 
109		if (ret == 1) {
110			__set_phys_to_machine(pfn, INVALID_P2M_ENTRY);
111			len++;
112		}
 
 
113	}
114	printk(KERN_INFO "Freeing  %lx-%lx pfn range: %lu pages freed\n",
115	       start, end, len);
116
117	return len;
118}
119
120static unsigned long __init xen_return_unused_memory(unsigned long max_pfn,
121						     const struct e820map *e820)
 
 
122{
123	phys_addr_t max_addr = PFN_PHYS(max_pfn);
124	phys_addr_t last_end = ISA_END_ADDRESS;
125	unsigned long released = 0;
126	int i;
127
128	/* Free any unused memory above the low 1Mbyte. */
129	for (i = 0; i < e820->nr_map && last_end < max_addr; i++) {
130		phys_addr_t end = e820->map[i].addr;
131		end = min(max_addr, end);
 
 
132
133		if (last_end < end)
134			released += xen_release_chunk(last_end, end);
135		last_end = max(last_end, e820->map[i].addr + e820->map[i].size);
 
 
136	}
137
138	if (last_end < max_addr)
139		released += xen_release_chunk(last_end, max_addr);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
140
141	printk(KERN_INFO "released %lu pages of unused memory\n", released);
142	return released;
143}
144
145static unsigned long __init xen_set_identity(const struct e820entry *list,
146					     ssize_t map_size)
 
 
 
 
 
 
 
 
 
 
 
 
147{
148	phys_addr_t last = xen_initial_domain() ? 0 : ISA_END_ADDRESS;
149	phys_addr_t start_pci = last;
150	const struct e820entry *entry;
151	unsigned long identity = 0;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
152	int i;
153
154	for (i = 0, entry = list; i < map_size; i++, entry++) {
155		phys_addr_t start = entry->addr;
156		phys_addr_t end = start + entry->size;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
157
158		if (start < last)
159			start = last;
160
161		if (end <= start)
162			continue;
 
 
 
 
 
 
 
 
 
 
 
 
 
163
164		/* Skip over the 1MB region. */
165		if (last > end)
166			continue;
167
168		if ((entry->type == E820_RAM) || (entry->type == E820_UNUSABLE)) {
169			if (start > start_pci)
170				identity += set_phys_range_identity(
171						PFN_UP(start_pci), PFN_DOWN(start));
172
173			/* Without saving 'last' we would gooble RAM too
174			 * at the end of the loop. */
175			last = end;
176			start_pci = end;
177			continue;
 
 
 
 
 
 
 
 
 
 
 
178		}
179		start_pci = min(start, start_pci);
180		last = end;
181	}
182	if (last > start_pci)
183		identity += set_phys_range_identity(
184					PFN_UP(start_pci), PFN_DOWN(last));
185	return identity;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
186}
187
188static unsigned long __init xen_get_max_pages(void)
189{
190	unsigned long max_pages = MAX_DOMAIN_PAGES;
191	domid_t domid = DOMID_SELF;
192	int ret;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
193
194	ret = HYPERVISOR_memory_op(XENMEM_maximum_reservation, &domid);
195	if (ret > 0)
196		max_pages = ret;
197	return min(max_pages, MAX_DOMAIN_PAGES);
198}
199
200/**
201 * machine_specific_memory_setup - Hook for machine specific memory setup.
202 **/
203char * __init xen_memory_setup(void)
204{
205	static struct e820entry map[E820MAX] __initdata;
206	static struct e820entry map_raw[E820MAX] __initdata;
207
208	unsigned long max_pfn = xen_start_info->nr_pages;
209	unsigned long long mem_end;
210	int rc;
211	struct xen_memory_map memmap;
 
212	unsigned long extra_pages = 0;
213	unsigned long extra_limit;
214	unsigned long identity_pages = 0;
215	int i;
216	int op;
217
218	max_pfn = min(MAX_DOMAIN_PAGES, max_pfn);
 
 
219	mem_end = PFN_PHYS(max_pfn);
220
221	memmap.nr_entries = E820MAX;
222	set_xen_guest_handle(memmap.buffer, map);
 
 
 
 
223
224	op = xen_initial_domain() ?
225		XENMEM_machine_memory_map :
226		XENMEM_memory_map;
227	rc = HYPERVISOR_memory_op(op, &memmap);
228	if (rc == -ENOSYS) {
229		BUG_ON(xen_initial_domain());
230		memmap.nr_entries = 1;
231		map[0].addr = 0ULL;
232		map[0].size = mem_end;
233		/* 8MB slack (to balance backend allocations). */
234		map[0].size += 8ULL << 20;
235		map[0].type = E820_RAM;
236		rc = 0;
237	}
238	BUG_ON(rc);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
239
240	memcpy(map_raw, map, sizeof(map));
241	e820.nr_map = 0;
242	xen_extra_mem_start = mem_end;
243	for (i = 0; i < memmap.nr_entries; i++) {
244		unsigned long long end;
245
246		/* Guard against non-page aligned E820 entries. */
247		if (map[i].type == E820_RAM)
248			map[i].size -= (map[i].size + map[i].addr) % PAGE_SIZE;
249
250		end = map[i].addr + map[i].size;
251		if (map[i].type == E820_RAM && end > mem_end) {
252			/* RAM off the end - may be partially included */
253			u64 delta = min(map[i].size, end - mem_end);
254
255			map[i].size -= delta;
256			end -= delta;
257
258			extra_pages += PFN_DOWN(delta);
259			/*
260			 * Set RAM below 4GB that is not for us to be unusable.
261			 * This prevents "System RAM" address space from being
262			 * used as potential resource for I/O address (happens
263			 * when 'allocate_resource' is called).
264			 */
265			if (delta &&
266				(xen_initial_domain() && end < 0x100000000ULL))
267				e820_add_region(end, delta, E820_UNUSABLE);
268		}
269
270		if (map[i].size > 0 && end > xen_extra_mem_start)
271			xen_extra_mem_start = end;
272
273		/* Add region if any remains */
274		if (map[i].size > 0)
275			e820_add_region(map[i].addr, map[i].size, map[i].type);
276	}
277	/* Align the balloon area so that max_low_pfn does not get set
278	 * to be at the _end_ of the PCI gap at the far end (fee01000).
279	 * Note that xen_extra_mem_start gets set in the loop above to be
280	 * past the last E820 region. */
281	if (xen_initial_domain() && (xen_extra_mem_start < (1ULL<<32)))
282		xen_extra_mem_start = (1ULL<<32);
283
284	/*
285	 * In domU, the ISA region is normal, usable memory, but we
286	 * reserve ISA memory anyway because too many things poke
287	 * about in there.
288	 *
289	 * In Dom0, the host E820 information can leave gaps in the
290	 * ISA range, which would cause us to release those pages.  To
291	 * avoid this, we unconditionally reserve them here.
292	 */
293	e820_add_region(ISA_START_ADDRESS, ISA_END_ADDRESS - ISA_START_ADDRESS,
294			E820_RESERVED);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
295
296	/*
297	 * Reserve Xen bits:
298	 *  - mfn_list
299	 *  - xen_start_info
300	 * See comment above "struct start_info" in <xen/interface/xen.h>
 
 
 
 
 
301	 */
302	memblock_x86_reserve_range(__pa(xen_start_info->mfn_list),
303		      __pa(xen_start_info->pt_base),
304			"XEN START INFO");
305
306	sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
307
308	extra_limit = xen_get_max_pages();
309	if (max_pfn + extra_pages > extra_limit) {
310		if (extra_limit > max_pfn)
311			extra_pages = extra_limit - max_pfn;
312		else
313			extra_pages = 0;
 
 
 
314	}
315
316	extra_pages += xen_return_unused_memory(xen_start_info->nr_pages, &e820);
317
318	/*
319	 * Clamp the amount of extra memory to a EXTRA_MEM_RATIO
320	 * factor the base size.  On non-highmem systems, the base
321	 * size is the full initial memory allocation; on highmem it
322	 * is limited to the max size of lowmem, so that it doesn't
323	 * get completely filled.
324	 *
325	 * In principle there could be a problem in lowmem systems if
326	 * the initial memory is also very large with respect to
327	 * lowmem, but we won't try to deal with that here.
328	 */
329	extra_limit = min(EXTRA_MEM_RATIO * min(max_pfn, PFN_DOWN(MAXMEM)),
330			  max_pfn + extra_pages);
 
331
332	if (extra_limit >= max_pfn)
333		extra_pages = extra_limit - max_pfn;
334	else
335		extra_pages = 0;
 
 
 
 
 
 
336
337	xen_add_extra_mem(extra_pages);
 
 
 
 
 
 
 
 
338
339	/*
340	 * Set P2M for all non-RAM pages and E820 gaps to be identity
341	 * type PFNs. We supply it with the non-sanitized version
342	 * of the E820.
343	 */
344	identity_pages = xen_set_identity(map_raw, memmap.nr_entries);
345	printk(KERN_INFO "Set %ld page(s) to 1-1 mapping.\n", identity_pages);
346	return "Xen";
347}
348
349/*
350 * Set the bit indicating "nosegneg" library variants should be used.
351 * We only need to bother in pure 32-bit mode; compat 32-bit processes
352 * can have un-truncated segments, so wrapping around is allowed.
353 */
354static void __init fiddle_vdso(void)
355{
356#ifdef CONFIG_X86_32
357	u32 *mask;
358	mask = VDSO32_SYMBOL(&vdso32_int80_start, NOTE_MASK);
359	*mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
360	mask = VDSO32_SYMBOL(&vdso32_sysenter_start, NOTE_MASK);
361	*mask |= 1 << VDSO_NOTE_NONEGSEG_BIT;
362#endif
363}
364
365static int __cpuinit register_callback(unsigned type, const void *func)
366{
367	struct callback_register callback = {
368		.type = type,
369		.address = XEN_CALLBACK(__KERNEL_CS, func),
370		.flags = CALLBACKF_mask_events,
371	};
372
373	return HYPERVISOR_callback_op(CALLBACKOP_register, &callback);
374}
375
376void __cpuinit xen_enable_sysenter(void)
377{
378	int ret;
379	unsigned sysenter_feature;
380
381#ifdef CONFIG_X86_32
382	sysenter_feature = X86_FEATURE_SEP;
383#else
384	sysenter_feature = X86_FEATURE_SYSENTER32;
385#endif
386
387	if (!boot_cpu_has(sysenter_feature))
388		return;
389
390	ret = register_callback(CALLBACKTYPE_sysenter, xen_sysenter_target);
391	if(ret != 0)
392		setup_clear_cpu_cap(sysenter_feature);
393}
394
395void __cpuinit xen_enable_syscall(void)
396{
397#ifdef CONFIG_X86_64
398	int ret;
399
400	ret = register_callback(CALLBACKTYPE_syscall, xen_syscall_target);
401	if (ret != 0) {
402		printk(KERN_ERR "Failed to set syscall callback: %d\n", ret);
403		/* Pretty fatal; 64-bit userspace has no other
404		   mechanism for syscalls. */
405	}
406
407	if (boot_cpu_has(X86_FEATURE_SYSCALL32)) {
408		ret = register_callback(CALLBACKTYPE_syscall32,
409					xen_syscall32_target);
410		if (ret != 0)
411			setup_clear_cpu_cap(X86_FEATURE_SYSCALL32);
412	}
413#endif /* CONFIG_X86_64 */
414}
415
416void __init xen_arch_setup(void)
417{
418	xen_panic_handler_init();
419
420	HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_4gb_segments);
421	HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_writable_pagetables);
422
423	if (!xen_feature(XENFEAT_auto_translated_physmap))
424		HYPERVISOR_vm_assist(VMASST_CMD_enable,
425				     VMASST_TYPE_pae_extended_cr3);
426
427	if (register_callback(CALLBACKTYPE_event, xen_hypervisor_callback) ||
428	    register_callback(CALLBACKTYPE_failsafe, xen_failsafe_callback))
429		BUG();
430
431	xen_enable_sysenter();
432	xen_enable_syscall();
 
 
 
 
 
 
 
433
434#ifdef CONFIG_ACPI
435	if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
436		printk(KERN_INFO "ACPI in unprivileged domain disabled\n");
437		disable_acpi();
438	}
439#endif
440
441	memcpy(boot_command_line, xen_start_info->cmd_line,
442	       MAX_GUEST_CMDLINE > COMMAND_LINE_SIZE ?
443	       COMMAND_LINE_SIZE : MAX_GUEST_CMDLINE);
444
445	/* Set up idle, making sure it calls safe_halt() pvop */
446#ifdef CONFIG_X86_32
447	boot_cpu_data.hlt_works_ok = 1;
448#endif
449	disable_cpuidle();
450	boot_option_idle_override = IDLE_HALT;
451
452	fiddle_vdso();
 
 
453}
v6.9.4
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 * Machine specific setup for xen
  4 *
  5 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
  6 */
  7
  8#include <linux/init.h>
  9#include <linux/iscsi_ibft.h>
 10#include <linux/sched.h>
 11#include <linux/kstrtox.h>
 12#include <linux/mm.h>
 13#include <linux/pm.h>
 14#include <linux/memblock.h>
 15#include <linux/cpuidle.h>
 16#include <linux/cpufreq.h>
 17#include <linux/memory_hotplug.h>
 18
 19#include <asm/elf.h>
 20#include <asm/vdso.h>
 21#include <asm/e820/api.h>
 22#include <asm/setup.h>
 23#include <asm/acpi.h>
 24#include <asm/numa.h>
 25#include <asm/idtentry.h>
 26#include <asm/xen/hypervisor.h>
 27#include <asm/xen/hypercall.h>
 28
 29#include <xen/xen.h>
 30#include <xen/page.h>
 31#include <xen/interface/callback.h>
 32#include <xen/interface/memory.h>
 33#include <xen/interface/physdev.h>
 34#include <xen/features.h>
 35#include <xen/hvc-console.h>
 36#include "xen-ops.h"
 37#include "mmu.h"
 38
 39#define GB(x) ((uint64_t)(x) * 1024 * 1024 * 1024)
 40
 41/* Number of pages released from the initial allocation. */
 42unsigned long xen_released_pages;
 43
 44/* Memory map would allow PCI passthrough. */
 45bool xen_pv_pci_possible;
 46
 47/* E820 map used during setting up memory. */
 48static struct e820_table xen_e820_table __initdata;
 49
 50/*
 51 * Buffer used to remap identity mapped pages. We only need the virtual space.
 52 * The physical page behind this address is remapped as needed to different
 53 * buffer pages.
 
 
 
 
 
 
 
 
 
 
 
 
 54 */
 55#define REMAP_SIZE	(P2M_PER_PAGE - 3)
 56static struct {
 57	unsigned long	next_area_mfn;
 58	unsigned long	target_pfn;
 59	unsigned long	size;
 60	unsigned long	mfns[REMAP_SIZE];
 61} xen_remap_buf __initdata __aligned(PAGE_SIZE);
 62static unsigned long xen_remap_mfn __initdata = INVALID_P2M_ENTRY;
 63
 64static bool xen_512gb_limit __initdata = IS_ENABLED(CONFIG_XEN_512GB);
 65
 66static void __init xen_parse_512gb(void)
 67{
 68	bool val = false;
 69	char *arg;
 70
 71	arg = strstr(xen_start_info->cmd_line, "xen_512gb_limit");
 72	if (!arg)
 73		return;
 74
 75	arg = strstr(xen_start_info->cmd_line, "xen_512gb_limit=");
 76	if (!arg)
 77		val = true;
 78	else if (kstrtobool(arg + strlen("xen_512gb_limit="), &val))
 79		return;
 80
 81	xen_512gb_limit = val;
 82}
 83
 84static void __init xen_del_extra_mem(unsigned long start_pfn,
 85				     unsigned long n_pfns)
 86{
 87	int i;
 88	unsigned long start_r, size_r;
 89
 90	for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) {
 91		start_r = xen_extra_mem[i].start_pfn;
 92		size_r = xen_extra_mem[i].n_pfns;
 93
 94		/* Start of region. */
 95		if (start_r == start_pfn) {
 96			BUG_ON(n_pfns > size_r);
 97			xen_extra_mem[i].start_pfn += n_pfns;
 98			xen_extra_mem[i].n_pfns -= n_pfns;
 99			break;
100		}
101		/* End of region. */
102		if (start_r + size_r == start_pfn + n_pfns) {
103			BUG_ON(n_pfns > size_r);
104			xen_extra_mem[i].n_pfns -= n_pfns;
105			break;
106		}
107		/* Mid of region. */
108		if (start_pfn > start_r && start_pfn < start_r + size_r) {
109			BUG_ON(start_pfn + n_pfns > start_r + size_r);
110			xen_extra_mem[i].n_pfns = start_pfn - start_r;
111			/* Calling memblock_reserve() again is okay. */
112			xen_add_extra_mem(start_pfn + n_pfns, start_r + size_r -
113					  (start_pfn + n_pfns));
114			break;
115		}
116	}
117	memblock_phys_free(PFN_PHYS(start_pfn), PFN_PHYS(n_pfns));
118}
119
120/*
121 * Called during boot before the p2m list can take entries beyond the
122 * hypervisor supplied p2m list. Entries in extra mem are to be regarded as
123 * invalid.
124 */
125unsigned long __ref xen_chk_extra_mem(unsigned long pfn)
126{
127	int i;
128
129	for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) {
130		if (pfn >= xen_extra_mem[i].start_pfn &&
131		    pfn < xen_extra_mem[i].start_pfn + xen_extra_mem[i].n_pfns)
132			return INVALID_P2M_ENTRY;
133	}
134
135	return IDENTITY_FRAME(pfn);
 
136}
137
138/*
139 * Mark all pfns of extra mem as invalid in p2m list.
140 */
141void __init xen_inv_extra_mem(void)
142{
143	unsigned long pfn, pfn_s, pfn_e;
144	int i;
145
146	for (i = 0; i < XEN_EXTRA_MEM_MAX_REGIONS; i++) {
147		if (!xen_extra_mem[i].n_pfns)
148			continue;
149		pfn_s = xen_extra_mem[i].start_pfn;
150		pfn_e = pfn_s + xen_extra_mem[i].n_pfns;
151		for (pfn = pfn_s; pfn < pfn_e; pfn++)
152			set_phys_to_machine(pfn, INVALID_P2M_ENTRY);
153	}
154}
155
156/*
157 * Finds the next RAM pfn available in the E820 map after min_pfn.
158 * This function updates min_pfn with the pfn found and returns
159 * the size of that range or zero if not found.
160 */
161static unsigned long __init xen_find_pfn_range(unsigned long *min_pfn)
162{
163	const struct e820_entry *entry = xen_e820_table.entries;
164	unsigned int i;
165	unsigned long done = 0;
166
167	for (i = 0; i < xen_e820_table.nr_entries; i++, entry++) {
168		unsigned long s_pfn;
169		unsigned long e_pfn;
170
171		if (entry->type != E820_TYPE_RAM)
172			continue;
173
174		e_pfn = PFN_DOWN(entry->addr + entry->size);
175
176		/* We only care about E820 after this */
177		if (e_pfn <= *min_pfn)
178			continue;
179
180		s_pfn = PFN_UP(entry->addr);
181
182		/* If min_pfn falls within the E820 entry, we want to start
183		 * at the min_pfn PFN.
184		 */
185		if (s_pfn <= *min_pfn) {
186			done = e_pfn - *min_pfn;
187		} else {
188			done = e_pfn - s_pfn;
189			*min_pfn = s_pfn;
190		}
191		break;
192	}
193
194	return done;
195}
196
197static int __init xen_free_mfn(unsigned long mfn)
198{
199	struct xen_memory_reservation reservation = {
200		.address_bits = 0,
201		.extent_order = 0,
202		.domid        = DOMID_SELF
203	};
 
 
 
 
204
205	set_xen_guest_handle(reservation.extent_start, &mfn);
206	reservation.nr_extents = 1;
207
208	return HYPERVISOR_memory_op(XENMEM_decrease_reservation, &reservation);
209}
210
211/*
212 * This releases a chunk of memory and then does the identity map. It's used
213 * as a fallback if the remapping fails.
214 */
215static void __init xen_set_identity_and_release_chunk(unsigned long start_pfn,
216			unsigned long end_pfn, unsigned long nr_pages)
217{
218	unsigned long pfn, end;
219	int ret;
220
221	WARN_ON(start_pfn > end_pfn);
 
222
223	/* Release pages first. */
224	end = min(end_pfn, nr_pages);
225	for (pfn = start_pfn; pfn < end; pfn++) {
226		unsigned long mfn = pfn_to_mfn(pfn);
227
228		/* Make sure pfn exists to start with */
229		if (mfn == INVALID_P2M_ENTRY || mfn_to_pfn(mfn) != pfn)
230			continue;
231
232		ret = xen_free_mfn(mfn);
 
 
 
 
233		WARN(ret != 1, "Failed to release pfn %lx err=%d\n", pfn, ret);
234
235		if (ret == 1) {
236			xen_released_pages++;
237			if (!__set_phys_to_machine(pfn, INVALID_P2M_ENTRY))
238				break;
239		} else
240			break;
241	}
 
 
242
243	set_phys_range_identity(start_pfn, end_pfn);
244}
245
246/*
247 * Helper function to update the p2m and m2p tables and kernel mapping.
248 */
249static void __init xen_update_mem_tables(unsigned long pfn, unsigned long mfn)
250{
251	struct mmu_update update = {
252		.ptr = ((uint64_t)mfn << PAGE_SHIFT) | MMU_MACHPHYS_UPDATE,
253		.val = pfn
254	};
255
256	/* Update p2m */
257	if (!set_phys_to_machine(pfn, mfn)) {
258		WARN(1, "Failed to set p2m mapping for pfn=%ld mfn=%ld\n",
259		     pfn, mfn);
260		BUG();
261	}
262
263	/* Update m2p */
264	if (HYPERVISOR_mmu_update(&update, 1, NULL, DOMID_SELF) < 0) {
265		WARN(1, "Failed to set m2p mapping for mfn=%ld pfn=%ld\n",
266		     mfn, pfn);
267		BUG();
268	}
269
270	if (HYPERVISOR_update_va_mapping((unsigned long)__va(pfn << PAGE_SHIFT),
271					 mfn_pte(mfn, PAGE_KERNEL), 0)) {
272		WARN(1, "Failed to update kernel mapping for mfn=%ld pfn=%ld\n",
273		      mfn, pfn);
274		BUG();
275	}
276}
277
278/*
279 * This function updates the p2m and m2p tables with an identity map from
280 * start_pfn to start_pfn+size and prepares remapping the underlying RAM of the
281 * original allocation at remap_pfn. The information needed for remapping is
282 * saved in the memory itself to avoid the need for allocating buffers. The
283 * complete remap information is contained in a list of MFNs each containing
284 * up to REMAP_SIZE MFNs and the start target PFN for doing the remap.
285 * This enables us to preserve the original mfn sequence while doing the
286 * remapping at a time when the memory management is capable of allocating
287 * virtual and physical memory in arbitrary amounts, see 'xen_remap_memory' and
288 * its callers.
289 */
290static void __init xen_do_set_identity_and_remap_chunk(
291        unsigned long start_pfn, unsigned long size, unsigned long remap_pfn)
292{
293	unsigned long buf = (unsigned long)&xen_remap_buf;
294	unsigned long mfn_save, mfn;
295	unsigned long ident_pfn_iter, remap_pfn_iter;
296	unsigned long ident_end_pfn = start_pfn + size;
297	unsigned long left = size;
298	unsigned int i, chunk;
299
300	WARN_ON(size == 0);
301
302	mfn_save = virt_to_mfn((void *)buf);
303
304	for (ident_pfn_iter = start_pfn, remap_pfn_iter = remap_pfn;
305	     ident_pfn_iter < ident_end_pfn;
306	     ident_pfn_iter += REMAP_SIZE, remap_pfn_iter += REMAP_SIZE) {
307		chunk = (left < REMAP_SIZE) ? left : REMAP_SIZE;
308
309		/* Map first pfn to xen_remap_buf */
310		mfn = pfn_to_mfn(ident_pfn_iter);
311		set_pte_mfn(buf, mfn, PAGE_KERNEL);
312
313		/* Save mapping information in page */
314		xen_remap_buf.next_area_mfn = xen_remap_mfn;
315		xen_remap_buf.target_pfn = remap_pfn_iter;
316		xen_remap_buf.size = chunk;
317		for (i = 0; i < chunk; i++)
318			xen_remap_buf.mfns[i] = pfn_to_mfn(ident_pfn_iter + i);
319
320		/* Put remap buf into list. */
321		xen_remap_mfn = mfn;
322
323		/* Set identity map */
324		set_phys_range_identity(ident_pfn_iter, ident_pfn_iter + chunk);
325
326		left -= chunk;
327	}
328
329	/* Restore old xen_remap_buf mapping */
330	set_pte_mfn(buf, mfn_save, PAGE_KERNEL);
331}
332
333/*
334 * This function takes a contiguous pfn range that needs to be identity mapped
335 * and:
336 *
337 *  1) Finds a new range of pfns to use to remap based on E820 and remap_pfn.
338 *  2) Calls the do_ function to actually do the mapping/remapping work.
339 *
340 * The goal is to not allocate additional memory but to remap the existing
341 * pages. In the case of an error the underlying memory is simply released back
342 * to Xen and not remapped.
343 */
344static unsigned long __init xen_set_identity_and_remap_chunk(
345	unsigned long start_pfn, unsigned long end_pfn, unsigned long nr_pages,
346	unsigned long remap_pfn)
347{
348	unsigned long pfn;
349	unsigned long i = 0;
350	unsigned long n = end_pfn - start_pfn;
351
352	if (remap_pfn == 0)
353		remap_pfn = nr_pages;
354
355	while (i < n) {
356		unsigned long cur_pfn = start_pfn + i;
357		unsigned long left = n - i;
358		unsigned long size = left;
359		unsigned long remap_range_size;
360
361		/* Do not remap pages beyond the current allocation */
362		if (cur_pfn >= nr_pages) {
363			/* Identity map remaining pages */
364			set_phys_range_identity(cur_pfn, cur_pfn + size);
365			break;
366		}
367		if (cur_pfn + size > nr_pages)
368			size = nr_pages - cur_pfn;
369
370		remap_range_size = xen_find_pfn_range(&remap_pfn);
371		if (!remap_range_size) {
372			pr_warn("Unable to find available pfn range, not remapping identity pages\n");
373			xen_set_identity_and_release_chunk(cur_pfn,
374						cur_pfn + left, nr_pages);
375			break;
376		}
377		/* Adjust size to fit in current e820 RAM region */
378		if (size > remap_range_size)
379			size = remap_range_size;
380
381		xen_do_set_identity_and_remap_chunk(cur_pfn, size, remap_pfn);
382
383		/* Update variables to reflect new mappings. */
384		i += size;
385		remap_pfn += size;
386	}
387
388	/*
389	 * If the PFNs are currently mapped, their VA mappings need to be
390	 * zapped.
391	 */
392	for (pfn = start_pfn; pfn <= max_pfn_mapped && pfn < end_pfn; pfn++)
393		(void)HYPERVISOR_update_va_mapping(
394			(unsigned long)__va(pfn << PAGE_SHIFT),
395			native_make_pte(0), 0);
396
397	return remap_pfn;
398}
399
400static unsigned long __init xen_count_remap_pages(
401	unsigned long start_pfn, unsigned long end_pfn, unsigned long nr_pages,
402	unsigned long remap_pages)
403{
404	if (start_pfn >= nr_pages)
405		return remap_pages;
406
407	return remap_pages + min(end_pfn, nr_pages) - start_pfn;
408}
409
410static unsigned long __init xen_foreach_remap_area(unsigned long nr_pages,
411	unsigned long (*func)(unsigned long start_pfn, unsigned long end_pfn,
412			      unsigned long nr_pages, unsigned long last_val))
413{
414	phys_addr_t start = 0;
415	unsigned long ret_val = 0;
416	const struct e820_entry *entry = xen_e820_table.entries;
417	int i;
418
419	/*
420	 * Combine non-RAM regions and gaps until a RAM region (or the
421	 * end of the map) is reached, then call the provided function
422	 * to perform its duty on the non-RAM region.
423	 *
424	 * The combined non-RAM regions are rounded to a whole number
425	 * of pages so any partial pages are accessible via the 1:1
426	 * mapping.  This is needed for some BIOSes that put (for
427	 * example) the DMI tables in a reserved region that begins on
428	 * a non-page boundary.
429	 */
430	for (i = 0; i < xen_e820_table.nr_entries; i++, entry++) {
431		phys_addr_t end = entry->addr + entry->size;
432		if (entry->type == E820_TYPE_RAM || i == xen_e820_table.nr_entries - 1) {
433			unsigned long start_pfn = PFN_DOWN(start);
434			unsigned long end_pfn = PFN_UP(end);
435
436			if (entry->type == E820_TYPE_RAM)
437				end_pfn = PFN_UP(entry->addr);
438
439			if (start_pfn < end_pfn)
440				ret_val = func(start_pfn, end_pfn, nr_pages,
441					       ret_val);
442			start = end;
443		}
444	}
445
446	return ret_val;
447}
448
449/*
450 * Remap the memory prepared in xen_do_set_identity_and_remap_chunk().
451 * The remap information (which mfn remap to which pfn) is contained in the
452 * to be remapped memory itself in a linked list anchored at xen_remap_mfn.
453 * This scheme allows to remap the different chunks in arbitrary order while
454 * the resulting mapping will be independent from the order.
455 */
456void __init xen_remap_memory(void)
457{
458	unsigned long buf = (unsigned long)&xen_remap_buf;
459	unsigned long mfn_save, pfn;
460	unsigned long remapped = 0;
461	unsigned int i;
462	unsigned long pfn_s = ~0UL;
463	unsigned long len = 0;
464
465	mfn_save = virt_to_mfn((void *)buf);
 
 
466
467	while (xen_remap_mfn != INVALID_P2M_ENTRY) {
468		/* Map the remap information */
469		set_pte_mfn(buf, xen_remap_mfn, PAGE_KERNEL);
470
471		BUG_ON(xen_remap_mfn != xen_remap_buf.mfns[0]);
472
473		pfn = xen_remap_buf.target_pfn;
474		for (i = 0; i < xen_remap_buf.size; i++) {
475			xen_update_mem_tables(pfn, xen_remap_buf.mfns[i]);
476			remapped++;
477			pfn++;
478		}
479		if (pfn_s == ~0UL || pfn == pfn_s) {
480			pfn_s = xen_remap_buf.target_pfn;
481			len += xen_remap_buf.size;
482		} else if (pfn_s + len == xen_remap_buf.target_pfn) {
483			len += xen_remap_buf.size;
484		} else {
485			xen_del_extra_mem(pfn_s, len);
486			pfn_s = xen_remap_buf.target_pfn;
487			len = xen_remap_buf.size;
488		}
489		xen_remap_mfn = xen_remap_buf.next_area_mfn;
 
490	}
491
492	if (pfn_s != ~0UL && len)
493		xen_del_extra_mem(pfn_s, len);
494
495	set_pte_mfn(buf, mfn_save, PAGE_KERNEL);
496
497	pr_info("Remapped %ld page(s)\n", remapped);
498}
499
500static unsigned long __init xen_get_pages_limit(void)
501{
502	unsigned long limit;
503
504	limit = MAXMEM / PAGE_SIZE;
505	if (!xen_initial_domain() && xen_512gb_limit)
506		limit = GB(512) / PAGE_SIZE;
507
508	return limit;
509}
510
511static unsigned long __init xen_get_max_pages(void)
512{
513	unsigned long max_pages, limit;
514	domid_t domid = DOMID_SELF;
515	long ret;
516
517	limit = xen_get_pages_limit();
518	max_pages = limit;
519
520	/*
521	 * For the initial domain we use the maximum reservation as
522	 * the maximum page.
523	 *
524	 * For guest domains the current maximum reservation reflects
525	 * the current maximum rather than the static maximum. In this
526	 * case the e820 map provided to us will cover the static
527	 * maximum region.
528	 */
529	if (xen_initial_domain()) {
530		ret = HYPERVISOR_memory_op(XENMEM_maximum_reservation, &domid);
531		if (ret > 0)
532			max_pages = ret;
533	}
534
535	return min(max_pages, limit);
536}
537
538static void __init xen_align_and_add_e820_region(phys_addr_t start,
539						 phys_addr_t size, int type)
540{
541	phys_addr_t end = start + size;
542
543	/* Align RAM regions to page boundaries. */
544	if (type == E820_TYPE_RAM) {
545		start = PAGE_ALIGN(start);
546		end &= ~((phys_addr_t)PAGE_SIZE - 1);
547#ifdef CONFIG_MEMORY_HOTPLUG
548		/*
549		 * Don't allow adding memory not in E820 map while booting the
550		 * system. Once the balloon driver is up it will remove that
551		 * restriction again.
552		 */
553		max_mem_size = end;
554#endif
555	}
556
557	e820__range_add(start, end - start, type);
558}
559
560static void __init xen_ignore_unusable(void)
561{
562	struct e820_entry *entry = xen_e820_table.entries;
563	unsigned int i;
564
565	for (i = 0; i < xen_e820_table.nr_entries; i++, entry++) {
566		if (entry->type == E820_TYPE_UNUSABLE)
567			entry->type = E820_TYPE_RAM;
568	}
569}
570
571bool __init xen_is_e820_reserved(phys_addr_t start, phys_addr_t size)
572{
573	struct e820_entry *entry;
574	unsigned mapcnt;
575	phys_addr_t end;
576
577	if (!size)
578		return false;
579
580	end = start + size;
581	entry = xen_e820_table.entries;
582
583	for (mapcnt = 0; mapcnt < xen_e820_table.nr_entries; mapcnt++) {
584		if (entry->type == E820_TYPE_RAM && entry->addr <= start &&
585		    (entry->addr + entry->size) >= end)
586			return false;
587
588		entry++;
589	}
590
591	return true;
592}
593
594/*
595 * Find a free area in physical memory not yet reserved and compliant with
596 * E820 map.
597 * Used to relocate pre-allocated areas like initrd or p2m list which are in
598 * conflict with the to be used E820 map.
599 * In case no area is found, return 0. Otherwise return the physical address
600 * of the area which is already reserved for convenience.
601 */
602phys_addr_t __init xen_find_free_area(phys_addr_t size)
603{
604	unsigned mapcnt;
605	phys_addr_t addr, start;
606	struct e820_entry *entry = xen_e820_table.entries;
607
608	for (mapcnt = 0; mapcnt < xen_e820_table.nr_entries; mapcnt++, entry++) {
609		if (entry->type != E820_TYPE_RAM || entry->size < size)
610			continue;
611		start = entry->addr;
612		for (addr = start; addr < start + size; addr += PAGE_SIZE) {
613			if (!memblock_is_reserved(addr))
614				continue;
615			start = addr + PAGE_SIZE;
616			if (start + size > entry->addr + entry->size)
617				break;
618		}
619		if (addr >= start + size) {
620			memblock_reserve(start, size);
621			return start;
622		}
623	}
624
625	return 0;
626}
627
628/*
629 * Like memcpy, but with physical addresses for dest and src.
630 */
631static void __init xen_phys_memcpy(phys_addr_t dest, phys_addr_t src,
632				   phys_addr_t n)
633{
634	phys_addr_t dest_off, src_off, dest_len, src_len, len;
635	void *from, *to;
636
637	while (n) {
638		dest_off = dest & ~PAGE_MASK;
639		src_off = src & ~PAGE_MASK;
640		dest_len = n;
641		if (dest_len > (NR_FIX_BTMAPS << PAGE_SHIFT) - dest_off)
642			dest_len = (NR_FIX_BTMAPS << PAGE_SHIFT) - dest_off;
643		src_len = n;
644		if (src_len > (NR_FIX_BTMAPS << PAGE_SHIFT) - src_off)
645			src_len = (NR_FIX_BTMAPS << PAGE_SHIFT) - src_off;
646		len = min(dest_len, src_len);
647		to = early_memremap(dest - dest_off, dest_len + dest_off);
648		from = early_memremap(src - src_off, src_len + src_off);
649		memcpy(to, from, len);
650		early_memunmap(to, dest_len + dest_off);
651		early_memunmap(from, src_len + src_off);
652		n -= len;
653		dest += len;
654		src += len;
655	}
656}
657
658/*
659 * Reserve Xen mfn_list.
660 */
661static void __init xen_reserve_xen_mfnlist(void)
662{
663	phys_addr_t start, size;
664
665	if (xen_start_info->mfn_list >= __START_KERNEL_map) {
666		start = __pa(xen_start_info->mfn_list);
667		size = PFN_ALIGN(xen_start_info->nr_pages *
668				 sizeof(unsigned long));
669	} else {
670		start = PFN_PHYS(xen_start_info->first_p2m_pfn);
671		size = PFN_PHYS(xen_start_info->nr_p2m_frames);
672	}
673
674	memblock_reserve(start, size);
675	if (!xen_is_e820_reserved(start, size))
676		return;
677
678	xen_relocate_p2m();
679	memblock_phys_free(start, size);
 
 
680}
681
682/**
683 * xen_memory_setup - Hook for machine specific memory setup.
684 **/
685char * __init xen_memory_setup(void)
686{
687	unsigned long max_pfn, pfn_s, n_pfns;
688	phys_addr_t mem_end, addr, size, chunk_size;
689	u32 type;
 
 
690	int rc;
691	struct xen_memory_map memmap;
692	unsigned long max_pages;
693	unsigned long extra_pages = 0;
 
 
694	int i;
695	int op;
696
697	xen_parse_512gb();
698	max_pfn = xen_get_pages_limit();
699	max_pfn = min(max_pfn, xen_start_info->nr_pages);
700	mem_end = PFN_PHYS(max_pfn);
701
702	memmap.nr_entries = ARRAY_SIZE(xen_e820_table.entries);
703	set_xen_guest_handle(memmap.buffer, xen_e820_table.entries);
704
705#if defined(CONFIG_MEMORY_HOTPLUG) && defined(CONFIG_XEN_BALLOON)
706	xen_saved_max_mem_size = max_mem_size;
707#endif
708
709	op = xen_initial_domain() ?
710		XENMEM_machine_memory_map :
711		XENMEM_memory_map;
712	rc = HYPERVISOR_memory_op(op, &memmap);
713	if (rc == -ENOSYS) {
714		BUG_ON(xen_initial_domain());
715		memmap.nr_entries = 1;
716		xen_e820_table.entries[0].addr = 0ULL;
717		xen_e820_table.entries[0].size = mem_end;
718		/* 8MB slack (to balance backend allocations). */
719		xen_e820_table.entries[0].size += 8ULL << 20;
720		xen_e820_table.entries[0].type = E820_TYPE_RAM;
721		rc = 0;
722	}
723	BUG_ON(rc);
724	BUG_ON(memmap.nr_entries == 0);
725	xen_e820_table.nr_entries = memmap.nr_entries;
726
727	if (xen_initial_domain()) {
728		/*
729		 * Xen won't allow a 1:1 mapping to be created to UNUSABLE
730		 * regions, so if we're using the machine memory map leave the
731		 * region as RAM as it is in the pseudo-physical map.
732		 *
733		 * UNUSABLE regions in domUs are not handled and will need
734		 * a patch in the future.
735		 */
736		xen_ignore_unusable();
737
738#ifdef CONFIG_ISCSI_IBFT_FIND
739		/* Reserve 0.5 MiB to 1 MiB region so iBFT can be found */
740		xen_e820_table.entries[xen_e820_table.nr_entries].addr = IBFT_START;
741		xen_e820_table.entries[xen_e820_table.nr_entries].size = IBFT_END - IBFT_START;
742		xen_e820_table.entries[xen_e820_table.nr_entries].type = E820_TYPE_RESERVED;
743		xen_e820_table.nr_entries++;
744#endif
745	}
746
747	/* Make sure the Xen-supplied memory map is well-ordered. */
748	e820__update_table(&xen_e820_table);
749
750	max_pages = xen_get_max_pages();
751
752	/* How many extra pages do we need due to remapping? */
753	max_pages += xen_foreach_remap_area(max_pfn, xen_count_remap_pages);
754
755	if (max_pages > max_pfn)
756		extra_pages += max_pages - max_pfn;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
757
758	/*
759	 * Clamp the amount of extra memory to a EXTRA_MEM_RATIO
760	 * factor the base size.
 
761	 *
762	 * Make sure we have no memory above max_pages, as this area
763	 * isn't handled by the p2m management.
 
764	 */
765	extra_pages = min3(EXTRA_MEM_RATIO * min(max_pfn, PFN_DOWN(MAXMEM)),
766			   extra_pages, max_pages - max_pfn);
767	i = 0;
768	addr = xen_e820_table.entries[0].addr;
769	size = xen_e820_table.entries[0].size;
770	while (i < xen_e820_table.nr_entries) {
771		bool discard = false;
772
773		chunk_size = size;
774		type = xen_e820_table.entries[i].type;
775
776		if (type == E820_TYPE_RESERVED)
777			xen_pv_pci_possible = true;
778
779		if (type == E820_TYPE_RAM) {
780			if (addr < mem_end) {
781				chunk_size = min(size, mem_end - addr);
782			} else if (extra_pages) {
783				chunk_size = min(size, PFN_PHYS(extra_pages));
784				pfn_s = PFN_UP(addr);
785				n_pfns = PFN_DOWN(addr + chunk_size) - pfn_s;
786				extra_pages -= n_pfns;
787				xen_add_extra_mem(pfn_s, n_pfns);
788				xen_max_p2m_pfn = pfn_s + n_pfns;
789			} else
790				discard = true;
791		}
792
793		if (!discard)
794			xen_align_and_add_e820_region(addr, chunk_size, type);
795
796		addr += chunk_size;
797		size -= chunk_size;
798		if (size == 0) {
799			i++;
800			if (i < xen_e820_table.nr_entries) {
801				addr = xen_e820_table.entries[i].addr;
802				size = xen_e820_table.entries[i].size;
803			}
804		}
805	}
806
807	/*
808	 * Set the rest as identity mapped, in case PCI BARs are
809	 * located here.
810	 */
811	set_phys_range_identity(addr / PAGE_SIZE, ~0ul);
812
813	/*
814	 * In domU, the ISA region is normal, usable memory, but we
815	 * reserve ISA memory anyway because too many things poke
816	 * about in there.
817	 */
818	e820__range_add(ISA_START_ADDRESS, ISA_END_ADDRESS - ISA_START_ADDRESS, E820_TYPE_RESERVED);
 
 
819
820	e820__update_table(e820_table);
821
822	/*
823	 * Check whether the kernel itself conflicts with the target E820 map.
824	 * Failing now is better than running into weird problems later due
825	 * to relocating (and even reusing) pages with kernel text or data.
826	 */
827	if (xen_is_e820_reserved(__pa_symbol(_text),
828			__pa_symbol(__bss_stop) - __pa_symbol(_text))) {
829		xen_raw_console_write("Xen hypervisor allocated kernel memory conflicts with E820 map\n");
830		BUG();
831	}
832
 
 
833	/*
834	 * Check for a conflict of the hypervisor supplied page tables with
835	 * the target E820 map.
 
 
 
 
 
 
 
836	 */
837	xen_pt_check_e820();
838
839	xen_reserve_xen_mfnlist();
840
841	/* Check for a conflict of the initrd with the target E820 map. */
842	if (xen_is_e820_reserved(boot_params.hdr.ramdisk_image,
843				 boot_params.hdr.ramdisk_size)) {
844		phys_addr_t new_area, start, size;
845
846		new_area = xen_find_free_area(boot_params.hdr.ramdisk_size);
847		if (!new_area) {
848			xen_raw_console_write("Can't find new memory area for initrd needed due to E820 map conflict\n");
849			BUG();
850		}
851
852		start = boot_params.hdr.ramdisk_image;
853		size = boot_params.hdr.ramdisk_size;
854		xen_phys_memcpy(new_area, start, size);
855		pr_info("initrd moved from [mem %#010llx-%#010llx] to [mem %#010llx-%#010llx]\n",
856			start, start + size, new_area, new_area + size);
857		memblock_phys_free(start, size);
858		boot_params.hdr.ramdisk_image = new_area;
859		boot_params.ext_ramdisk_image = new_area >> 32;
860	}
861
862	/*
863	 * Set identity map on non-RAM pages and prepare remapping the
864	 * underlying RAM.
 
865	 */
866	xen_foreach_remap_area(max_pfn, xen_set_identity_and_remap_chunk);
 
 
 
867
868	pr_info("Released %ld page(s)\n", xen_released_pages);
869
870	return "Xen";
 
 
 
 
 
 
 
 
 
 
 
871}
872
873static int register_callback(unsigned type, const void *func)
874{
875	struct callback_register callback = {
876		.type = type,
877		.address = XEN_CALLBACK(__KERNEL_CS, func),
878		.flags = CALLBACKF_mask_events,
879	};
880
881	return HYPERVISOR_callback_op(CALLBACKOP_register, &callback);
882}
883
884void xen_enable_sysenter(void)
885{
886	if (cpu_feature_enabled(X86_FEATURE_SYSENTER32) &&
887	    register_callback(CALLBACKTYPE_sysenter, xen_entry_SYSENTER_compat))
888		setup_clear_cpu_cap(X86_FEATURE_SYSENTER32);
 
 
 
 
 
 
 
 
 
 
 
 
889}
890
891void xen_enable_syscall(void)
892{
 
893	int ret;
894
895	ret = register_callback(CALLBACKTYPE_syscall, xen_entry_SYSCALL_64);
896	if (ret != 0) {
897		printk(KERN_ERR "Failed to set syscall callback: %d\n", ret);
898		/* Pretty fatal; 64-bit userspace has no other
899		   mechanism for syscalls. */
900	}
901
902	if (cpu_feature_enabled(X86_FEATURE_SYSCALL32) &&
903	    register_callback(CALLBACKTYPE_syscall32, xen_entry_SYSCALL_compat))
904		setup_clear_cpu_cap(X86_FEATURE_SYSCALL32);
 
 
 
 
905}
906
907static void __init xen_pvmmu_arch_setup(void)
908{
 
 
 
909	HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_writable_pagetables);
910
911	if (register_callback(CALLBACKTYPE_event,
912			      xen_asm_exc_xen_hypervisor_callback) ||
 
 
 
913	    register_callback(CALLBACKTYPE_failsafe, xen_failsafe_callback))
914		BUG();
915
916	xen_enable_sysenter();
917	xen_enable_syscall();
918}
919
920/* This function is not called for HVM domains */
921void __init xen_arch_setup(void)
922{
923	xen_panic_handler_init();
924	xen_pvmmu_arch_setup();
925
926#ifdef CONFIG_ACPI
927	if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
928		printk(KERN_INFO "ACPI in unprivileged domain disabled\n");
929		disable_acpi();
930	}
931#endif
932
933	memcpy(boot_command_line, xen_start_info->cmd_line,
934	       MAX_GUEST_CMDLINE > COMMAND_LINE_SIZE ?
935	       COMMAND_LINE_SIZE : MAX_GUEST_CMDLINE);
936
937	/* Set up idle, making sure it calls safe_halt() pvop */
 
 
 
938	disable_cpuidle();
939	disable_cpufreq();
940	WARN_ON(xen_set_default_idle());
941#ifdef CONFIG_NUMA
942	numa_off = 1;
943#endif
944}