]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/x86/lguest/boot.c
genirq: Provide irq_desc_has_action
[mirror_ubuntu-artful-kernel.git] / arch / x86 / lguest / boot.c
CommitLineData
f938d2c8
RR
1/*P:010
2 * A hypervisor allows multiple Operating Systems to run on a single machine.
3 * To quote David Wheeler: "Any problem in computer science can be solved with
4 * another layer of indirection."
5 *
6 * We keep things simple in two ways. First, we start with a normal Linux
7 * kernel and insert a module (lg.ko) which allows us to run other Linux
8 * kernels the same way we'd run processes. We call the first kernel the Host,
9 * and the others the Guests. The program which sets up and configures Guests
b21e332d 10 * (such as the example in tools/lguest/lguest.c) is called the Launcher.
f938d2c8 11 *
a6bd8e13
RR
12 * Secondly, we only run specially modified Guests, not normal kernels: setting
13 * CONFIG_LGUEST_GUEST to "y" compiles this file into the kernel so it knows
14 * how to be a Guest at boot time. This means that you can use the same kernel
15 * you boot normally (ie. as a Host) as a Guest.
07ad157f 16 *
f938d2c8
RR
17 * These Guests know that they cannot do privileged operations, such as disable
18 * interrupts, and that they have to ask the Host to do such things explicitly.
19 * This file consists of all the replacements for such low-level native
20 * hardware operations: these special Guest versions call the Host.
21 *
a6bd8e13
RR
22 * So how does the kernel know it's a Guest? We'll see that later, but let's
23 * just say that we end up here where we replace the native functions various
2e04ef76
RR
24 * "paravirt" structures with our Guest versions, then boot like normal.
25:*/
f938d2c8
RR
26
27/*
07ad157f
RR
28 * Copyright (C) 2006, Rusty Russell <rusty@rustcorp.com.au> IBM Corporation.
29 *
30 * This program is free software; you can redistribute it and/or modify
31 * it under the terms of the GNU General Public License as published by
32 * the Free Software Foundation; either version 2 of the License, or
33 * (at your option) any later version.
34 *
35 * This program is distributed in the hope that it will be useful, but
36 * WITHOUT ANY WARRANTY; without even the implied warranty of
37 * MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE or
38 * NON INFRINGEMENT. See the GNU General Public License for more
39 * details.
40 *
41 * You should have received a copy of the GNU General Public License
42 * along with this program; if not, write to the Free Software
43 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
44 */
45#include <linux/kernel.h>
46#include <linux/start_kernel.h>
47#include <linux/string.h>
48#include <linux/console.h>
49#include <linux/screen_info.h>
50#include <linux/irq.h>
51#include <linux/interrupt.h>
d7e28ffe
RR
52#include <linux/clocksource.h>
53#include <linux/clockchips.h>
07ad157f
RR
54#include <linux/lguest.h>
55#include <linux/lguest_launcher.h>
19f1537b 56#include <linux/virtio_console.h>
4cfe6c3c 57#include <linux/pm.h>
39a0e33d 58#include <linux/export.h>
e1b83e27 59#include <linux/pci.h>
a561adfa 60#include <linux/virtio_pci.h>
ee72576c 61#include <asm/acpi.h>
7b6aa335 62#include <asm/apic.h>
cbc34973 63#include <asm/lguest.h>
07ad157f
RR
64#include <asm/paravirt.h>
65#include <asm/param.h>
66#include <asm/page.h>
67#include <asm/pgtable.h>
68#include <asm/desc.h>
69#include <asm/setup.h>
70#include <asm/e820.h>
71#include <asm/mce.h>
72#include <asm/io.h>
df6b35f4 73#include <asm/fpu/api.h>
2cb7878a 74#include <asm/stackprotector.h>
ec04b13f 75#include <asm/reboot.h> /* for struct machine_ops */
89cfc991 76#include <asm/kvm_para.h>
e1b83e27 77#include <asm/pci_x86.h>
a561adfa 78#include <asm/pci-direct.h>
07ad157f 79
9f54288d
RR
80/*G:010
81 * Welcome to the Guest!
b2b47c21
RR
82 *
83 * The Guest in our tale is a simple creature: identical to the Host but
84 * behaving in simplified but equivalent ways. In particular, the Guest is the
2e04ef76
RR
85 * same kernel as the Host (or at least, built from the same source code).
86:*/
b2b47c21 87
07ad157f
RR
88struct lguest_data lguest_data = {
89 .hcall_status = { [0 ... LHCALL_RING_SIZE-1] = 0xFF },
2f921b5b 90 .noirq_iret = (u32)lguest_noirq_iret,
47436aa4 91 .kernel_address = PAGE_OFFSET,
07ad157f 92 .blocked_interrupts = { 1 }, /* Block timer interrupts */
51bb9284 93 .syscall_vec = IA32_SYSCALL_VECTOR,
07ad157f 94};
07ad157f 95
2e04ef76
RR
96/*G:037
97 * async_hcall() is pretty simple: I'm quite proud of it really. We have a
b2b47c21 98 * ring buffer of stored hypercalls which the Host will run though next time we
cefcad17 99 * do a normal hypercall. Each entry in the ring has 5 slots for the hypercall
b2b47c21
RR
100 * arguments, and a "hcall_status" word which is 0 if the call is ready to go,
101 * and 255 once the Host has finished with it.
102 *
103 * If we come around to a slot which hasn't been finished, then the table is
104 * full and we just make the hypercall directly. This has the nice side
105 * effect of causing the Host to run all the stored calls in the ring buffer
2e04ef76
RR
106 * which empties it for next time!
107 */
9b56fdb4 108static void async_hcall(unsigned long call, unsigned long arg1,
cefcad17
MZ
109 unsigned long arg2, unsigned long arg3,
110 unsigned long arg4)
07ad157f
RR
111{
112 /* Note: This code assumes we're uniprocessor. */
113 static unsigned int next_call;
114 unsigned long flags;
115
2e04ef76
RR
116 /*
117 * Disable interrupts if not already disabled: we don't want an
b2b47c21 118 * interrupt handler making a hypercall while we're already doing
2e04ef76
RR
119 * one!
120 */
07ad157f
RR
121 local_irq_save(flags);
122 if (lguest_data.hcall_status[next_call] != 0xFF) {
123 /* Table full, so do normal hcall which will flush table. */
091ebf07 124 hcall(call, arg1, arg2, arg3, arg4);
07ad157f 125 } else {
b410e7b1
JS
126 lguest_data.hcalls[next_call].arg0 = call;
127 lguest_data.hcalls[next_call].arg1 = arg1;
128 lguest_data.hcalls[next_call].arg2 = arg2;
129 lguest_data.hcalls[next_call].arg3 = arg3;
cefcad17 130 lguest_data.hcalls[next_call].arg4 = arg4;
b2b47c21 131 /* Arguments must all be written before we mark it to go */
07ad157f
RR
132 wmb();
133 lguest_data.hcall_status[next_call] = 0;
134 if (++next_call == LHCALL_RING_SIZE)
135 next_call = 0;
136 }
137 local_irq_restore(flags);
138}
9b56fdb4 139
2e04ef76
RR
140/*G:035
141 * Notice the lazy_hcall() above, rather than hcall(). This is our first real
142 * optimization trick!
633872b9
RR
143 *
144 * When lazy_mode is set, it means we're allowed to defer all hypercalls and do
145 * them as a batch when lazy_mode is eventually turned off. Because hypercalls
146 * are reasonably expensive, batching them up makes sense. For example, a
147 * large munmap might update dozens of page table entries: that code calls
148 * paravirt_enter_lazy_mmu(), does the dozen updates, then calls
149 * lguest_leave_lazy_mode().
150 *
151 * So, when we're in lazy mode, we call async_hcall() to store the call for
2e04ef76
RR
152 * future processing:
153 */
091ebf07 154static void lazy_hcall1(unsigned long call, unsigned long arg1)
4cd8b5e2
MZ
155{
156 if (paravirt_get_lazy_mode() == PARAVIRT_LAZY_NONE)
091ebf07 157 hcall(call, arg1, 0, 0, 0);
4cd8b5e2 158 else
cefcad17 159 async_hcall(call, arg1, 0, 0, 0);
4cd8b5e2
MZ
160}
161
a91d74a3 162/* You can imagine what lazy_hcall2, 3 and 4 look like. :*/
4cd8b5e2 163static void lazy_hcall2(unsigned long call,
091ebf07
RR
164 unsigned long arg1,
165 unsigned long arg2)
4cd8b5e2
MZ
166{
167 if (paravirt_get_lazy_mode() == PARAVIRT_LAZY_NONE)
091ebf07 168 hcall(call, arg1, arg2, 0, 0);
4cd8b5e2 169 else
cefcad17 170 async_hcall(call, arg1, arg2, 0, 0);
4cd8b5e2
MZ
171}
172
173static void lazy_hcall3(unsigned long call,
091ebf07
RR
174 unsigned long arg1,
175 unsigned long arg2,
176 unsigned long arg3)
9b56fdb4
AB
177{
178 if (paravirt_get_lazy_mode() == PARAVIRT_LAZY_NONE)
091ebf07 179 hcall(call, arg1, arg2, arg3, 0);
9b56fdb4 180 else
cefcad17
MZ
181 async_hcall(call, arg1, arg2, arg3, 0);
182}
183
acdd0b62 184#ifdef CONFIG_X86_PAE
cefcad17 185static void lazy_hcall4(unsigned long call,
091ebf07
RR
186 unsigned long arg1,
187 unsigned long arg2,
188 unsigned long arg3,
189 unsigned long arg4)
cefcad17
MZ
190{
191 if (paravirt_get_lazy_mode() == PARAVIRT_LAZY_NONE)
091ebf07 192 hcall(call, arg1, arg2, arg3, arg4);
cefcad17
MZ
193 else
194 async_hcall(call, arg1, arg2, arg3, arg4);
9b56fdb4 195}
acdd0b62 196#endif
633872b9 197
a91d74a3 198/*G:036
9f54288d
RR
199 * When lazy mode is turned off, we issue the do-nothing hypercall to
200 * flush any stored calls, and call the generic helper to reset the
201 * per-cpu lazy mode variable.
202 */
b407fc57 203static void lguest_leave_lazy_mmu_mode(void)
633872b9 204{
091ebf07 205 hcall(LHCALL_FLUSH_ASYNC, 0, 0, 0, 0);
b407fc57
JF
206 paravirt_leave_lazy_mmu();
207}
208
9f54288d
RR
209/*
210 * We also catch the end of context switch; we enter lazy mode for much of
211 * that too, so again we need to flush here.
212 *
213 * (Technically, this is lazy CPU mode, and normally we're in lazy MMU
214 * mode, but unlike Xen, lguest doesn't care about the difference).
215 */
224101ed 216static void lguest_end_context_switch(struct task_struct *next)
b407fc57 217{
091ebf07 218 hcall(LHCALL_FLUSH_ASYNC, 0, 0, 0, 0);
224101ed 219 paravirt_end_context_switch(next);
633872b9 220}
07ad157f 221
61f4bc83 222/*G:032
e1e72965
RR
223 * After that diversion we return to our first native-instruction
224 * replacements: four functions for interrupt control.
b2b47c21
RR
225 *
226 * The simplest way of implementing these would be to have "turn interrupts
227 * off" and "turn interrupts on" hypercalls. Unfortunately, this is too slow:
228 * these are by far the most commonly called functions of those we override.
229 *
230 * So instead we keep an "irq_enabled" field inside our "struct lguest_data",
231 * which the Guest can update with a single instruction. The Host knows to
a6bd8e13 232 * check there before it tries to deliver an interrupt.
b2b47c21
RR
233 */
234
2e04ef76
RR
235/*
236 * save_flags() is expected to return the processor state (ie. "flags"). The
65ea5b03 237 * flags word contains all kind of stuff, but in practice Linux only cares
2e04ef76
RR
238 * about the interrupt flag. Our "save_flags()" just returns that.
239 */
2605fc21 240asmlinkage __visible unsigned long lguest_save_fl(void)
07ad157f
RR
241{
242 return lguest_data.irq_enabled;
243}
07ad157f 244
b2b47c21 245/* Interrupts go off... */
2605fc21 246asmlinkage __visible void lguest_irq_disable(void)
07ad157f
RR
247{
248 lguest_data.irq_enabled = 0;
249}
250
2e04ef76
RR
251/*
252 * Let's pause a moment. Remember how I said these are called so often?
61f4bc83
RR
253 * Jeremy Fitzhardinge optimized them so hard early in 2009 that he had to
254 * break some rules. In particular, these functions are assumed to save their
255 * own registers if they need to: normal C functions assume they can trash the
256 * eax register. To use normal C functions, we use
257 * PV_CALLEE_SAVE_REGS_THUNK(), which pushes %eax onto the stack, calls the
2e04ef76
RR
258 * C function, then restores it.
259 */
9549b9b3
AK
260PV_CALLEE_SAVE_REGS_THUNK(lguest_save_fl);
261PV_CALLEE_SAVE_REGS_THUNK(lguest_irq_disable);
61f4bc83 262/*:*/
a32a8813 263
41f055d4 264/* These are in head_32.S */
61f4bc83
RR
265extern void lg_irq_enable(void);
266extern void lg_restore_fl(unsigned long flags);
ecb93d1c 267
2e04ef76 268/*M:003
a91d74a3
RR
269 * We could be more efficient in our checking of outstanding interrupts, rather
270 * than using a branch. One way would be to put the "irq_enabled" field in a
271 * page by itself, and have the Host write-protect it when an interrupt comes
272 * in when irqs are disabled. There will then be a page fault as soon as
273 * interrupts are re-enabled.
a6bd8e13
RR
274 *
275 * A better method is to implement soft interrupt disable generally for x86:
276 * instead of disabling interrupts, we set a flag. If an interrupt does come
277 * in, we then disable them for real. This is uncommon, so we could simply use
2e04ef76
RR
278 * a hypercall for interrupt control and not worry about efficiency.
279:*/
07ad157f 280
b2b47c21
RR
281/*G:034
282 * The Interrupt Descriptor Table (IDT).
283 *
284 * The IDT tells the processor what to do when an interrupt comes in. Each
285 * entry in the table is a 64-bit descriptor: this holds the privilege level,
286 * address of the handler, and... well, who cares? The Guest just asks the
287 * Host to make the change anyway, because the Host controls the real IDT.
288 */
8d947344
GOC
289static void lguest_write_idt_entry(gate_desc *dt,
290 int entrynum, const gate_desc *g)
07ad157f 291{
2e04ef76
RR
292 /*
293 * The gate_desc structure is 8 bytes long: we hand it to the Host in
a6bd8e13
RR
294 * two 32-bit chunks. The whole 32-bit kernel used to hand descriptors
295 * around like this; typesafety wasn't a big concern in Linux's early
2e04ef76
RR
296 * years.
297 */
8d947344 298 u32 *desc = (u32 *)g;
b2b47c21 299 /* Keep the local copy up to date. */
8d947344 300 native_write_idt_entry(dt, entrynum, g);
b2b47c21 301 /* Tell Host about this new entry. */
091ebf07 302 hcall(LHCALL_LOAD_IDT_ENTRY, entrynum, desc[0], desc[1], 0);
07ad157f
RR
303}
304
2e04ef76
RR
305/*
306 * Changing to a different IDT is very rare: we keep the IDT up-to-date every
b2b47c21 307 * time it is written, so we can simply loop through all entries and tell the
2e04ef76
RR
308 * Host about them.
309 */
6b68f01b 310static void lguest_load_idt(const struct desc_ptr *desc)
07ad157f
RR
311{
312 unsigned int i;
313 struct desc_struct *idt = (void *)desc->address;
314
315 for (i = 0; i < (desc->size+1)/8; i++)
091ebf07 316 hcall(LHCALL_LOAD_IDT_ENTRY, i, idt[i].a, idt[i].b, 0);
07ad157f
RR
317}
318
b2b47c21
RR
319/*
320 * The Global Descriptor Table.
321 *
322 * The Intel architecture defines another table, called the Global Descriptor
323 * Table (GDT). You tell the CPU where it is (and its size) using the "lgdt"
324 * instruction, and then several other instructions refer to entries in the
325 * table. There are three entries which the Switcher needs, so the Host simply
326 * controls the entire thing and the Guest asks it to make changes using the
327 * LOAD_GDT hypercall.
328 *
a489f0b5 329 * This is the exactly like the IDT code.
b2b47c21 330 */
6b68f01b 331static void lguest_load_gdt(const struct desc_ptr *desc)
07ad157f 332{
a489f0b5
RR
333 unsigned int i;
334 struct desc_struct *gdt = (void *)desc->address;
335
336 for (i = 0; i < (desc->size+1)/8; i++)
091ebf07 337 hcall(LHCALL_LOAD_GDT_ENTRY, i, gdt[i].a, gdt[i].b, 0);
07ad157f
RR
338}
339
2e04ef76 340/*
9b6efcd2
RR
341 * For a single GDT entry which changes, we simply change our copy and
342 * then tell the host about it.
2e04ef76 343 */
014b15be
GOC
344static void lguest_write_gdt_entry(struct desc_struct *dt, int entrynum,
345 const void *desc, int type)
07ad157f 346{
014b15be 347 native_write_gdt_entry(dt, entrynum, desc, type);
a489f0b5 348 /* Tell Host about this new entry. */
091ebf07
RR
349 hcall(LHCALL_LOAD_GDT_ENTRY, entrynum,
350 dt[entrynum].a, dt[entrynum].b, 0);
07ad157f
RR
351}
352
2e04ef76 353/*
9b6efcd2 354 * There are three "thread local storage" GDT entries which change
b2b47c21 355 * on every context switch (these three entries are how glibc implements
9b6efcd2
RR
356 * __thread variables). As an optimization, we have a hypercall
357 * specifically for this case.
358 *
359 * Wouldn't it be nicer to have a general LOAD_GDT_ENTRIES hypercall
360 * which took a range of entries?
2e04ef76 361 */
07ad157f
RR
362static void lguest_load_tls(struct thread_struct *t, unsigned int cpu)
363{
2e04ef76
RR
364 /*
365 * There's one problem which normal hardware doesn't have: the Host
0d027c01 366 * can't handle us removing entries we're currently using. So we clear
2e04ef76
RR
367 * the GS register here: if it's needed it'll be reloaded anyway.
368 */
ccbeed3a 369 lazy_load_gs(0);
4cd8b5e2 370 lazy_hcall2(LHCALL_LOAD_TLS, __pa(&t->tls_array), cpu);
07ad157f
RR
371}
372
2e04ef76
RR
373/*G:038
374 * That's enough excitement for now, back to ploughing through each of the
375 * different pv_ops structures (we're about 1/3 of the way through).
b2b47c21
RR
376 *
377 * This is the Local Descriptor Table, another weird Intel thingy. Linux only
378 * uses this for some strange applications like Wine. We don't do anything
2e04ef76
RR
379 * here, so they'll get an informative and friendly Segmentation Fault.
380 */
07ad157f
RR
381static void lguest_set_ldt(const void *addr, unsigned entries)
382{
383}
384
2e04ef76
RR
385/*
386 * This loads a GDT entry into the "Task Register": that entry points to a
b2b47c21
RR
387 * structure called the Task State Segment. Some comments scattered though the
388 * kernel code indicate that this used for task switching in ages past, along
389 * with blood sacrifice and astrology.
390 *
391 * Now there's nothing interesting in here that we don't get told elsewhere.
392 * But the native version uses the "ltr" instruction, which makes the Host
393 * complain to the Guest about a Segmentation Fault and it'll oops. So we
2e04ef76
RR
394 * override the native version with a do-nothing version.
395 */
07ad157f
RR
396static void lguest_load_tr_desc(void)
397{
398}
399
2e04ef76
RR
400/*
401 * The "cpuid" instruction is a way of querying both the CPU identity
b2b47c21 402 * (manufacturer, model, etc) and its features. It was introduced before the
a6bd8e13
RR
403 * Pentium in 1993 and keeps getting extended by both Intel, AMD and others.
404 * As you might imagine, after a decade and a half this treatment, it is now a
405 * giant ball of hair. Its entry in the current Intel manual runs to 28 pages.
b2b47c21
RR
406 *
407 * This instruction even it has its own Wikipedia entry. The Wikipedia entry
8d431f41 408 * has been translated into 6 languages. I am not making this up!
b2b47c21
RR
409 *
410 * We could get funky here and identify ourselves as "GenuineLguest", but
411 * instead we just use the real "cpuid" instruction. Then I pretty much turned
412 * off feature bits until the Guest booted. (Don't say that: you'll damage
413 * lguest sales!) Shut up, inner voice! (Hey, just pointing out that this is
0d2eb44f 414 * hardly future proof.) No one's listening! They don't like you anyway,
b2b47c21
RR
415 * parenthetic weirdo!
416 *
417 * Replacing the cpuid so we can turn features off is great for the kernel, but
418 * anyone (including userspace) can just use the raw "cpuid" instruction and
419 * the Host won't even notice since it isn't privileged. So we try not to get
2e04ef76
RR
420 * too worked up about it.
421 */
65ea5b03
PA
422static void lguest_cpuid(unsigned int *ax, unsigned int *bx,
423 unsigned int *cx, unsigned int *dx)
07ad157f 424{
65ea5b03 425 int function = *ax;
07ad157f 426
65ea5b03 427 native_cpuid(ax, bx, cx, dx);
07ad157f 428 switch (function) {
2e04ef76
RR
429 /*
430 * CPUID 0 gives the highest legal CPUID number (and the ID string).
431 * We futureproof our code a little by sticking to known CPUID values.
432 */
433 case 0:
7a504920
RR
434 if (*ax > 5)
435 *ax = 5;
436 break;
2e04ef76
RR
437
438 /*
439 * CPUID 1 is a basic feature request.
440 *
441 * CX: we only allow kernel to see SSE3, CMPXCHG16B and SSSE3
442 * DX: SSE, SSE2, FXSR, MMX, CMOV, CMPXCHG8B, TSC, FPU and PAE.
443 */
444 case 1:
65ea5b03 445 *cx &= 0x00002201;
acdd0b62 446 *dx &= 0x07808151;
2e04ef76
RR
447 /*
448 * The Host can do a nice optimization if it knows that the
b2b47c21
RR
449 * kernel mappings (addresses above 0xC0000000 or whatever
450 * PAGE_OFFSET is set to) haven't changed. But Linux calls
451 * flush_tlb_user() for both user and kernel mappings unless
2e04ef76
RR
452 * the Page Global Enable (PGE) feature bit is set.
453 */
65ea5b03 454 *dx |= 0x00002000;
2e04ef76
RR
455 /*
456 * We also lie, and say we're family id 5. 6 or greater
cbd88c8e 457 * leads to a rdmsr in early_init_intel which we can't handle.
2e04ef76
RR
458 * Family ID is returned as bits 8-12 in ax.
459 */
cbd88c8e
RR
460 *ax &= 0xFFFFF0FF;
461 *ax |= 0x00000500;
07ad157f 462 break;
89cfc991
RR
463
464 /*
465 * This is used to detect if we're running under KVM. We might be,
466 * but that's a Host matter, not us. So say we're not.
467 */
468 case KVM_CPUID_SIGNATURE:
469 *bx = *cx = *dx = 0;
470 break;
471
2e04ef76
RR
472 /*
473 * 0x80000000 returns the highest Extended Function, so we futureproof
474 * like we do above by limiting it to known fields.
475 */
07ad157f 476 case 0x80000000:
65ea5b03
PA
477 if (*ax > 0x80000008)
478 *ax = 0x80000008;
07ad157f 479 break;
2e04ef76
RR
480
481 /*
482 * PAE systems can mark pages as non-executable. Linux calls this the
483 * NX bit. Intel calls it XD (eXecute Disable), AMD EVP (Enhanced
64be1158 484 * Virus Protection). We just switch it off here, since we don't
2e04ef76
RR
485 * support it.
486 */
acdd0b62 487 case 0x80000001:
acdd0b62
MZ
488 *dx &= ~(1 << 20);
489 break;
07ad157f
RR
490 }
491}
492
2e04ef76
RR
493/*
494 * Intel has four control registers, imaginatively named cr0, cr2, cr3 and cr4.
b2b47c21
RR
495 * I assume there's a cr1, but it hasn't bothered us yet, so we'll not bother
496 * it. The Host needs to know when the Guest wants to change them, so we have
497 * a whole series of functions like read_cr0() and write_cr0().
498 *
e1e72965 499 * We start with cr0. cr0 allows you to turn on and off all kinds of basic
b2b47c21
RR
500 * features, but Linux only really cares about one: the horrifically-named Task
501 * Switched (TS) bit at bit 3 (ie. 8)
502 *
503 * What does the TS bit do? Well, it causes the CPU to trap (interrupt 7) if
504 * the floating point unit is used. Which allows us to restore FPU state
505 * lazily after a task switch, and Linux uses that gratefully, but wouldn't a
506 * name like "FPUTRAP bit" be a little less cryptic?
507 *
ad5173ff 508 * We store cr0 locally because the Host never changes it. The Guest sometimes
2e04ef76
RR
509 * wants to read it and we'd prefer not to bother the Host unnecessarily.
510 */
ad5173ff 511static unsigned long current_cr0;
07ad157f
RR
512static void lguest_write_cr0(unsigned long val)
513{
4cd8b5e2 514 lazy_hcall1(LHCALL_TS, val & X86_CR0_TS);
07ad157f
RR
515 current_cr0 = val;
516}
517
518static unsigned long lguest_read_cr0(void)
519{
520 return current_cr0;
521}
522
2e04ef76
RR
523/*
524 * Intel provided a special instruction to clear the TS bit for people too cool
b2b47c21 525 * to use write_cr0() to do it. This "clts" instruction is faster, because all
2e04ef76
RR
526 * the vowels have been optimized out.
527 */
07ad157f
RR
528static void lguest_clts(void)
529{
4cd8b5e2 530 lazy_hcall1(LHCALL_TS, 0);
25c47bb3 531 current_cr0 &= ~X86_CR0_TS;
07ad157f
RR
532}
533
2e04ef76
RR
534/*
535 * cr2 is the virtual address of the last page fault, which the Guest only ever
b2b47c21 536 * reads. The Host kindly writes this into our "struct lguest_data", so we
2e04ef76
RR
537 * just read it out of there.
538 */
07ad157f
RR
539static unsigned long lguest_read_cr2(void)
540{
541 return lguest_data.cr2;
542}
543
ad5173ff
RR
544/* See lguest_set_pte() below. */
545static bool cr3_changed = false;
5dea1c88 546static unsigned long current_cr3;
ad5173ff 547
2e04ef76
RR
548/*
549 * cr3 is the current toplevel pagetable page: the principle is the same as
5dea1c88 550 * cr0. Keep a local copy, and tell the Host when it changes.
2e04ef76 551 */
07ad157f
RR
552static void lguest_write_cr3(unsigned long cr3)
553{
4cd8b5e2 554 lazy_hcall1(LHCALL_NEW_PGTABLE, cr3);
5dea1c88 555 current_cr3 = cr3;
bb4093de
RR
556
557 /* These two page tables are simple, linear, and used during boot */
6a3956bd
AD
558 if (cr3 != __pa_symbol(swapper_pg_dir) &&
559 cr3 != __pa_symbol(initial_page_table))
bb4093de 560 cr3_changed = true;
07ad157f
RR
561}
562
563static unsigned long lguest_read_cr3(void)
564{
5dea1c88 565 return current_cr3;
07ad157f
RR
566}
567
e1e72965 568/* cr4 is used to enable and disable PGE, but we don't care. */
07ad157f
RR
569static unsigned long lguest_read_cr4(void)
570{
571 return 0;
572}
573
574static void lguest_write_cr4(unsigned long val)
575{
576}
577
b2b47c21
RR
578/*
579 * Page Table Handling.
580 *
581 * Now would be a good time to take a rest and grab a coffee or similarly
582 * relaxing stimulant. The easy parts are behind us, and the trek gradually
583 * winds uphill from here.
584 *
585 * Quick refresher: memory is divided into "pages" of 4096 bytes each. The CPU
586 * maps virtual addresses to physical addresses using "page tables". We could
587 * use one huge index of 1 million entries: each address is 4 bytes, so that's
588 * 1024 pages just to hold the page tables. But since most virtual addresses
e1e72965 589 * are unused, we use a two level index which saves space. The cr3 register
b2b47c21
RR
590 * contains the physical address of the top level "page directory" page, which
591 * contains physical addresses of up to 1024 second-level pages. Each of these
592 * second level pages contains up to 1024 physical addresses of actual pages,
593 * or Page Table Entries (PTEs).
594 *
595 * Here's a diagram, where arrows indicate physical addresses:
596 *
e1e72965 597 * cr3 ---> +---------+
b2b47c21
RR
598 * | --------->+---------+
599 * | | | PADDR1 |
a91d74a3 600 * Mid-level | | PADDR2 |
b2b47c21
RR
601 * (PMD) page | | |
602 * | | Lower-level |
603 * | | (PTE) page |
604 * | | | |
605 * .... ....
606 *
607 * So to convert a virtual address to a physical address, we look up the top
608 * level, which points us to the second level, which gives us the physical
609 * address of that page. If the top level entry was not present, or the second
610 * level entry was not present, then the virtual address is invalid (we
611 * say "the page was not mapped").
612 *
613 * Put another way, a 32-bit virtual address is divided up like so:
614 *
615 * 1 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
616 * |<---- 10 bits ---->|<---- 10 bits ---->|<------ 12 bits ------>|
617 * Index into top Index into second Offset within page
618 * page directory page pagetable page
619 *
a91d74a3
RR
620 * Now, unfortunately, this isn't the whole story: Intel added Physical Address
621 * Extension (PAE) to allow 32 bit systems to use 64GB of memory (ie. 36 bits).
622 * These are held in 64-bit page table entries, so we can now only fit 512
623 * entries in a page, and the neat three-level tree breaks down.
624 *
625 * The result is a four level page table:
626 *
627 * cr3 --> [ 4 Upper ]
628 * [ Level ]
629 * [ Entries ]
630 * [(PUD Page)]---> +---------+
631 * | --------->+---------+
632 * | | | PADDR1 |
633 * Mid-level | | PADDR2 |
634 * (PMD) page | | |
635 * | | Lower-level |
636 * | | (PTE) page |
637 * | | | |
638 * .... ....
639 *
640 *
641 * And the virtual address is decoded as:
642 *
643 * 1 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
644 * |<-2->|<--- 9 bits ---->|<---- 9 bits --->|<------ 12 bits ------>|
645 * Index into Index into mid Index into lower Offset within page
646 * top entries directory page pagetable page
647 *
648 * It's too hard to switch between these two formats at runtime, so Linux only
649 * supports one or the other depending on whether CONFIG_X86_PAE is set. Many
650 * distributions turn it on, and not just for people with silly amounts of
651 * memory: the larger PTE entries allow room for the NX bit, which lets the
652 * kernel disable execution of pages and increase security.
653 *
654 * This was a problem for lguest, which couldn't run on these distributions;
655 * then Matias Zabaljauregui figured it all out and implemented it, and only a
656 * handful of puppies were crushed in the process!
657 *
658 * Back to our point: the kernel spends a lot of time changing both the
659 * top-level page directory and lower-level pagetable pages. The Guest doesn't
660 * know physical addresses, so while it maintains these page tables exactly
661 * like normal, it also needs to keep the Host informed whenever it makes a
662 * change: the Host will create the real page tables based on the Guests'.
b2b47c21
RR
663 */
664
2e04ef76 665/*
a91d74a3 666 * The Guest calls this after it has set a second-level entry (pte), ie. to map
9f54288d 667 * a page into a process' address space. We tell the Host the toplevel and
a91d74a3
RR
668 * address this corresponds to. The Guest uses one pagetable per process, so
669 * we need to tell the Host which one we're changing (mm->pgd).
2e04ef76 670 */
b7ff99ea
RR
671static void lguest_pte_update(struct mm_struct *mm, unsigned long addr,
672 pte_t *ptep)
673{
acdd0b62 674#ifdef CONFIG_X86_PAE
a91d74a3 675 /* PAE needs to hand a 64 bit page table entry, so it uses two args. */
acdd0b62
MZ
676 lazy_hcall4(LHCALL_SET_PTE, __pa(mm->pgd), addr,
677 ptep->pte_low, ptep->pte_high);
678#else
4cd8b5e2 679 lazy_hcall3(LHCALL_SET_PTE, __pa(mm->pgd), addr, ptep->pte_low);
acdd0b62 680#endif
b7ff99ea
RR
681}
682
a91d74a3 683/* This is the "set and update" combo-meal-deal version. */
07ad157f
RR
684static void lguest_set_pte_at(struct mm_struct *mm, unsigned long addr,
685 pte_t *ptep, pte_t pteval)
686{
90603d15 687 native_set_pte(ptep, pteval);
b7ff99ea 688 lguest_pte_update(mm, addr, ptep);
07ad157f
RR
689}
690
2e04ef76
RR
691/*
692 * The Guest calls lguest_set_pud to set a top-level entry and lguest_set_pmd
acdd0b62 693 * to set a middle-level entry when PAE is activated.
2e04ef76 694 *
acdd0b62 695 * Again, we set the entry then tell the Host which page we changed,
2e04ef76
RR
696 * and the index of the entry we changed.
697 */
acdd0b62
MZ
698#ifdef CONFIG_X86_PAE
699static void lguest_set_pud(pud_t *pudp, pud_t pudval)
700{
701 native_set_pud(pudp, pudval);
702
703 /* 32 bytes aligned pdpt address and the index. */
704 lazy_hcall2(LHCALL_SET_PGD, __pa(pudp) & 0xFFFFFFE0,
705 (__pa(pudp) & 0x1F) / sizeof(pud_t));
706}
707
708static void lguest_set_pmd(pmd_t *pmdp, pmd_t pmdval)
709{
710 native_set_pmd(pmdp, pmdval);
711 lazy_hcall2(LHCALL_SET_PMD, __pa(pmdp) & PAGE_MASK,
712 (__pa(pmdp) & (PAGE_SIZE - 1)) / sizeof(pmd_t));
713}
714#else
715
2e04ef76 716/* The Guest calls lguest_set_pmd to set a top-level entry when !PAE. */
07ad157f
RR
717static void lguest_set_pmd(pmd_t *pmdp, pmd_t pmdval)
718{
90603d15 719 native_set_pmd(pmdp, pmdval);
ebe0ba84 720 lazy_hcall2(LHCALL_SET_PGD, __pa(pmdp) & PAGE_MASK,
90603d15 721 (__pa(pmdp) & (PAGE_SIZE - 1)) / sizeof(pmd_t));
07ad157f 722}
acdd0b62 723#endif
07ad157f 724
2e04ef76
RR
725/*
726 * There are a couple of legacy places where the kernel sets a PTE, but we
b2b47c21
RR
727 * don't know the top level any more. This is useless for us, since we don't
728 * know which pagetable is changing or what address, so we just tell the Host
729 * to forget all of them. Fortunately, this is very rare.
730 *
731 * ... except in early boot when the kernel sets up the initial pagetables,
bb4093de
RR
732 * which makes booting astonishingly slow: 48 seconds! So we don't even tell
733 * the Host anything changed until we've done the first real page table switch,
734 * which brings boot back to 4.3 seconds.
2e04ef76 735 */
07ad157f
RR
736static void lguest_set_pte(pte_t *ptep, pte_t pteval)
737{
90603d15 738 native_set_pte(ptep, pteval);
ad5173ff 739 if (cr3_changed)
4cd8b5e2 740 lazy_hcall1(LHCALL_FLUSH_TLB, 1);
07ad157f
RR
741}
742
acdd0b62 743#ifdef CONFIG_X86_PAE
a91d74a3
RR
744/*
745 * With 64-bit PTE values, we need to be careful setting them: if we set 32
746 * bits at a time, the hardware could see a weird half-set entry. These
747 * versions ensure we update all 64 bits at once.
748 */
acdd0b62
MZ
749static void lguest_set_pte_atomic(pte_t *ptep, pte_t pte)
750{
751 native_set_pte_atomic(ptep, pte);
752 if (cr3_changed)
753 lazy_hcall1(LHCALL_FLUSH_TLB, 1);
754}
755
a91d74a3
RR
756static void lguest_pte_clear(struct mm_struct *mm, unsigned long addr,
757 pte_t *ptep)
acdd0b62
MZ
758{
759 native_pte_clear(mm, addr, ptep);
760 lguest_pte_update(mm, addr, ptep);
761}
762
a91d74a3 763static void lguest_pmd_clear(pmd_t *pmdp)
acdd0b62
MZ
764{
765 lguest_set_pmd(pmdp, __pmd(0));
766}
767#endif
768
2e04ef76
RR
769/*
770 * Unfortunately for Lguest, the pv_mmu_ops for page tables were based on
b2b47c21
RR
771 * native page table operations. On native hardware you can set a new page
772 * table entry whenever you want, but if you want to remove one you have to do
773 * a TLB flush (a TLB is a little cache of page table entries kept by the CPU).
774 *
775 * So the lguest_set_pte_at() and lguest_set_pmd() functions above are only
776 * called when a valid entry is written, not when it's removed (ie. marked not
777 * present). Instead, this is where we come when the Guest wants to remove a
778 * page table entry: we tell the Host to set that entry to 0 (ie. the present
2e04ef76
RR
779 * bit is zero).
780 */
07ad157f
RR
781static void lguest_flush_tlb_single(unsigned long addr)
782{
b2b47c21 783 /* Simply set it to zero: if it was not, it will fault back in. */
5dea1c88 784 lazy_hcall3(LHCALL_SET_PTE, current_cr3, addr, 0);
07ad157f
RR
785}
786
2e04ef76
RR
787/*
788 * This is what happens after the Guest has removed a large number of entries.
b2b47c21 789 * This tells the Host that any of the page table entries for userspace might
2e04ef76
RR
790 * have changed, ie. virtual addresses below PAGE_OFFSET.
791 */
07ad157f
RR
792static void lguest_flush_tlb_user(void)
793{
4cd8b5e2 794 lazy_hcall1(LHCALL_FLUSH_TLB, 0);
07ad157f
RR
795}
796
2e04ef76
RR
797/*
798 * This is called when the kernel page tables have changed. That's not very
b2b47c21 799 * common (unless the Guest is using highmem, which makes the Guest extremely
2e04ef76
RR
800 * slow), so it's worth separating this from the user flushing above.
801 */
07ad157f
RR
802static void lguest_flush_tlb_kernel(void)
803{
4cd8b5e2 804 lazy_hcall1(LHCALL_FLUSH_TLB, 1);
07ad157f
RR
805}
806
b2b47c21
RR
807/*
808 * The Unadvanced Programmable Interrupt Controller.
809 *
810 * This is an attempt to implement the simplest possible interrupt controller.
811 * I spent some time looking though routines like set_irq_chip_and_handler,
812 * set_irq_chip_and_handler_name, set_irq_chip_data and set_phasers_to_stun and
813 * I *think* this is as simple as it gets.
814 *
815 * We can tell the Host what interrupts we want blocked ready for using the
816 * lguest_data.interrupts bitmap, so disabling (aka "masking") them is as
817 * simple as setting a bit. We don't actually "ack" interrupts as such, we
818 * just mask and unmask them. I wonder if we should be cleverer?
819 */
fe25c7fc 820static void disable_lguest_irq(struct irq_data *data)
07ad157f 821{
fe25c7fc 822 set_bit(data->irq, lguest_data.blocked_interrupts);
07ad157f
RR
823}
824
fe25c7fc 825static void enable_lguest_irq(struct irq_data *data)
07ad157f 826{
fe25c7fc 827 clear_bit(data->irq, lguest_data.blocked_interrupts);
07ad157f
RR
828}
829
b2b47c21 830/* This structure describes the lguest IRQ controller. */
07ad157f
RR
831static struct irq_chip lguest_irq_controller = {
832 .name = "lguest",
fe25c7fc
TG
833 .irq_mask = disable_lguest_irq,
834 .irq_mask_ack = disable_lguest_irq,
835 .irq_unmask = enable_lguest_irq,
07ad157f
RR
836};
837
27a6f41c
RR
838/*
839 * Interrupt descriptors are allocated as-needed, but low-numbered ones are
840 * reserved by the generic x86 code. So we ignore irq_alloc_desc_at if it
841 * tells us the irq is already used: other errors (ie. ENOMEM) we take
842 * seriously.
843 */
844static int lguest_setup_irq(unsigned int irq)
845{
846 int err;
847
848 /* Returns -ve error or vector number. */
849 err = irq_alloc_desc_at(irq, 0);
850 if (err < 0 && err != -EEXIST)
851 return err;
852
ad3f8d5a
TG
853 /*
854 * Tell the Linux infrastructure that the interrupt is
855 * controlled by our level-based lguest interrupt controller.
856 */
27a6f41c
RR
857 irq_set_chip_and_handler_name(irq, &lguest_irq_controller,
858 handle_level_irq, "level");
ad3f8d5a
TG
859
860 /* Some systems map "vectors" to interrupts weirdly. Not us! */
861 __this_cpu_write(vector_irq[FIRST_EXTERNAL_VECTOR + irq], irq);
27a6f41c
RR
862 return 0;
863}
864
e1b83e27
RR
865static int lguest_enable_irq(struct pci_dev *dev)
866{
ad3f8d5a 867 int err;
e1b83e27
RR
868 u8 line = 0;
869
870 /* We literally use the PCI interrupt line as the irq number. */
871 pci_read_config_byte(dev, PCI_INTERRUPT_LINE, &line);
ad3f8d5a
TG
872 err = lguest_setup_irq(line);
873 if (!err)
874 dev->irq = line;
875 return err;
e1b83e27
RR
876}
877
878/* We don't do hotplug PCI, so this shouldn't be called. */
879static void lguest_disable_irq(struct pci_dev *dev)
880{
881 WARN_ON(1);
882}
883
2e04ef76
RR
884/*
885 * This sets up the Interrupt Descriptor Table (IDT) entry for each hardware
ad3f8d5a 886 * interrupt (except 128, which is used for system calls).
2e04ef76 887 */
07ad157f
RR
888static void __init lguest_init_IRQ(void)
889{
890 unsigned int i;
891
2414e021 892 for (i = FIRST_EXTERNAL_VECTOR; i < FIRST_SYSTEM_VECTOR; i++) {
51bb9284 893 if (i != IA32_SYSCALL_VECTOR)
3304c9c3
DV
894 set_intr_gate(i, irq_entries_start +
895 8 * (i - FIRST_EXTERNAL_VECTOR));
07ad157f 896 }
2e04ef76
RR
897
898 /*
899 * This call is required to set up for 4k stacks, where we have
900 * separate stacks for hard and soft interrupts.
901 */
07ad157f
RR
902 irq_ctx_init(smp_processor_id());
903}
904
b2b47c21
RR
905/*
906 * Time.
907 *
908 * It would be far better for everyone if the Guest had its own clock, but
6c8dca5d 909 * until then the Host gives us the time on every interrupt.
b2b47c21 910 */
3565184e 911static void lguest_get_wallclock(struct timespec *now)
07ad157f 912{
3565184e 913 *now = lguest_data.time;
07ad157f
RR
914}
915
2e04ef76
RR
916/*
917 * The TSC is an Intel thing called the Time Stamp Counter. The Host tells us
a6bd8e13
RR
918 * what speed it runs at, or 0 if it's unusable as a reliable clock source.
919 * This matches what we want here: if we return 0 from this function, the x86
2e04ef76
RR
920 * TSC clock will give up and not register itself.
921 */
e93ef949 922static unsigned long lguest_tsc_khz(void)
3fabc55f
RR
923{
924 return lguest_data.tsc_khz;
925}
926
2e04ef76
RR
927/*
928 * If we can't use the TSC, the kernel falls back to our lower-priority
929 * "lguest_clock", where we read the time value given to us by the Host.
930 */
8e19608e 931static cycle_t lguest_clock_read(struct clocksource *cs)
d7e28ffe 932{
6c8dca5d
RR
933 unsigned long sec, nsec;
934
2e04ef76
RR
935 /*
936 * Since the time is in two parts (seconds and nanoseconds), we risk
3fabc55f
RR
937 * reading it just as it's changing from 99 & 0.999999999 to 100 and 0,
938 * and getting 99 and 0. As Linux tends to come apart under the stress
2e04ef76
RR
939 * of time travel, we must be careful:
940 */
6c8dca5d
RR
941 do {
942 /* First we read the seconds part. */
943 sec = lguest_data.time.tv_sec;
2e04ef76
RR
944 /*
945 * This read memory barrier tells the compiler and the CPU that
6c8dca5d 946 * this can't be reordered: we have to complete the above
2e04ef76
RR
947 * before going on.
948 */
6c8dca5d
RR
949 rmb();
950 /* Now we read the nanoseconds part. */
951 nsec = lguest_data.time.tv_nsec;
952 /* Make sure we've done that. */
953 rmb();
954 /* Now if the seconds part has changed, try again. */
955 } while (unlikely(lguest_data.time.tv_sec != sec));
956
3fabc55f 957 /* Our lguest clock is in real nanoseconds. */
6c8dca5d 958 return sec*1000000000ULL + nsec;
d7e28ffe
RR
959}
960
3fabc55f 961/* This is the fallback clocksource: lower priority than the TSC clocksource. */
d7e28ffe
RR
962static struct clocksource lguest_clock = {
963 .name = "lguest",
3fabc55f 964 .rating = 200,
d7e28ffe 965 .read = lguest_clock_read,
6c8dca5d 966 .mask = CLOCKSOURCE_MASK(64),
05aa026a 967 .flags = CLOCK_SOURCE_IS_CONTINUOUS,
d7e28ffe
RR
968};
969
2e04ef76
RR
970/*
971 * We also need a "struct clock_event_device": Linux asks us to set it to go
d7e28ffe 972 * off some time in the future. Actually, James Morris figured all this out, I
2e04ef76
RR
973 * just applied the patch.
974 */
d7e28ffe
RR
975static int lguest_clockevent_set_next_event(unsigned long delta,
976 struct clock_event_device *evt)
977{
a6bd8e13
RR
978 /* FIXME: I don't think this can ever happen, but James tells me he had
979 * to put this code in. Maybe we should remove it now. Anyone? */
d7e28ffe
RR
980 if (delta < LG_CLOCK_MIN_DELTA) {
981 if (printk_ratelimit())
982 printk(KERN_DEBUG "%s: small delta %lu ns\n",
77bf90ed 983 __func__, delta);
d7e28ffe
RR
984 return -ETIME;
985 }
a6bd8e13
RR
986
987 /* Please wake us this far in the future. */
091ebf07 988 hcall(LHCALL_SET_CLOCKEVENT, delta, 0, 0, 0);
d7e28ffe
RR
989 return 0;
990}
991
992static void lguest_clockevent_set_mode(enum clock_event_mode mode,
993 struct clock_event_device *evt)
994{
995 switch (mode) {
996 case CLOCK_EVT_MODE_UNUSED:
997 case CLOCK_EVT_MODE_SHUTDOWN:
998 /* A 0 argument shuts the clock down. */
091ebf07 999 hcall(LHCALL_SET_CLOCKEVENT, 0, 0, 0, 0);
d7e28ffe
RR
1000 break;
1001 case CLOCK_EVT_MODE_ONESHOT:
1002 /* This is what we expect. */
1003 break;
1004 case CLOCK_EVT_MODE_PERIODIC:
1005 BUG();
18de5bc4
TG
1006 case CLOCK_EVT_MODE_RESUME:
1007 break;
d7e28ffe
RR
1008 }
1009}
1010
1011/* This describes our primitive timer chip. */
1012static struct clock_event_device lguest_clockevent = {
1013 .name = "lguest",
1014 .features = CLOCK_EVT_FEAT_ONESHOT,
1015 .set_next_event = lguest_clockevent_set_next_event,
1016 .set_mode = lguest_clockevent_set_mode,
1017 .rating = INT_MAX,
1018 .mult = 1,
1019 .shift = 0,
1020 .min_delta_ns = LG_CLOCK_MIN_DELTA,
1021 .max_delta_ns = LG_CLOCK_MAX_DELTA,
1022};
1023
2e04ef76
RR
1024/*
1025 * This is the Guest timer interrupt handler (hardware interrupt 0). We just
1026 * call the clockevent infrastructure and it does whatever needs doing.
1027 */
07ad157f
RR
1028static void lguest_time_irq(unsigned int irq, struct irq_desc *desc)
1029{
d7e28ffe
RR
1030 unsigned long flags;
1031
1032 /* Don't interrupt us while this is running. */
1033 local_irq_save(flags);
1034 lguest_clockevent.event_handler(&lguest_clockevent);
1035 local_irq_restore(flags);
07ad157f
RR
1036}
1037
2e04ef76
RR
1038/*
1039 * At some point in the boot process, we get asked to set up our timing
b2b47c21
RR
1040 * infrastructure. The kernel doesn't expect timer interrupts before this, but
1041 * we cleverly initialized the "blocked_interrupts" field of "struct
2e04ef76
RR
1042 * lguest_data" so that timer interrupts were blocked until now.
1043 */
07ad157f
RR
1044static void lguest_time_init(void)
1045{
b2b47c21 1046 /* Set up the timer interrupt (0) to go to our simple timer routine */
27a6f41c
RR
1047 if (lguest_setup_irq(0) != 0)
1048 panic("Could not set up timer irq");
2c778651 1049 irq_set_handler(0, lguest_time_irq);
07ad157f 1050
b01cc1b0 1051 clocksource_register_hz(&lguest_clock, NSEC_PER_SEC);
d7e28ffe 1052
b2b47c21
RR
1053 /* We can't set cpumask in the initializer: damn C limitations! Set it
1054 * here and register our timer device. */
320ab2b0 1055 lguest_clockevent.cpumask = cpumask_of(0);
d7e28ffe
RR
1056 clockevents_register_device(&lguest_clockevent);
1057
b2b47c21 1058 /* Finally, we unblock the timer interrupt. */
bb6f1d9a 1059 clear_bit(0, lguest_data.blocked_interrupts);
07ad157f
RR
1060}
1061
b2b47c21
RR
1062/*
1063 * Miscellaneous bits and pieces.
1064 *
1065 * Here is an oddball collection of functions which the Guest needs for things
1066 * to work. They're pretty simple.
1067 */
1068
2e04ef76
RR
1069/*
1070 * The Guest needs to tell the Host what stack it expects traps to use. For
b2b47c21
RR
1071 * native hardware, this is part of the Task State Segment mentioned above in
1072 * lguest_load_tr_desc(), but to help hypervisors there's this special call.
1073 *
1074 * We tell the Host the segment we want to use (__KERNEL_DS is the kernel data
1075 * segment), the privilege level (we're privilege level 1, the Host is 0 and
1076 * will not tolerate us trying to use that), the stack pointer, and the number
2e04ef76
RR
1077 * of pages in the stack.
1078 */
faca6227 1079static void lguest_load_sp0(struct tss_struct *tss,
a6bd8e13 1080 struct thread_struct *thread)
07ad157f 1081{
4cd8b5e2
MZ
1082 lazy_hcall3(LHCALL_SET_STACK, __KERNEL_DS | 0x1, thread->sp0,
1083 THREAD_SIZE / PAGE_SIZE);
8ef46a67 1084 tss->x86_tss.sp0 = thread->sp0;
07ad157f
RR
1085}
1086
b2b47c21 1087/* Let's just say, I wouldn't do debugging under a Guest. */
aa96a3c6
RR
1088static unsigned long lguest_get_debugreg(int regno)
1089{
1090 /* FIXME: Implement */
1091 return 0;
1092}
1093
07ad157f
RR
1094static void lguest_set_debugreg(int regno, unsigned long value)
1095{
1096 /* FIXME: Implement */
1097}
1098
2e04ef76
RR
1099/*
1100 * There are times when the kernel wants to make sure that no memory writes are
b2b47c21
RR
1101 * caught in the cache (that they've all reached real hardware devices). This
1102 * doesn't matter for the Guest which has virtual hardware.
1103 *
1104 * On the Pentium 4 and above, cpuid() indicates that the Cache Line Flush
1105 * (clflush) instruction is available and the kernel uses that. Otherwise, it
1106 * uses the older "Write Back and Invalidate Cache" (wbinvd) instruction.
1107 * Unlike clflush, wbinvd can only be run at privilege level 0. So we can
1108 * ignore clflush, but replace wbinvd.
1109 */
07ad157f
RR
1110static void lguest_wbinvd(void)
1111{
1112}
1113
2e04ef76
RR
1114/*
1115 * If the Guest expects to have an Advanced Programmable Interrupt Controller,
b2b47c21
RR
1116 * we play dumb by ignoring writes and returning 0 for reads. So it's no
1117 * longer Programmable nor Controlling anything, and I don't think 8 lines of
1118 * code qualifies for Advanced. It will also never interrupt anything. It
2e04ef76
RR
1119 * does, however, allow us to get through the Linux boot code.
1120 */
07ad157f 1121#ifdef CONFIG_X86_LOCAL_APIC
ad66dd34 1122static void lguest_apic_write(u32 reg, u32 v)
07ad157f
RR
1123{
1124}
1125
ad66dd34 1126static u32 lguest_apic_read(u32 reg)
07ad157f
RR
1127{
1128 return 0;
1129}
511d9d34
SS
1130
1131static u64 lguest_apic_icr_read(void)
1132{
1133 return 0;
1134}
1135
1136static void lguest_apic_icr_write(u32 low, u32 id)
1137{
1138 /* Warn to see if there's any stray references */
1139 WARN_ON(1);
1140}
1141
1142static void lguest_apic_wait_icr_idle(void)
1143{
1144 return;
1145}
1146
1147static u32 lguest_apic_safe_wait_icr_idle(void)
1148{
1149 return 0;
1150}
1151
c1eeb2de
YL
1152static void set_lguest_basic_apic_ops(void)
1153{
1154 apic->read = lguest_apic_read;
1155 apic->write = lguest_apic_write;
1156 apic->icr_read = lguest_apic_icr_read;
1157 apic->icr_write = lguest_apic_icr_write;
1158 apic->wait_icr_idle = lguest_apic_wait_icr_idle;
1159 apic->safe_wait_icr_idle = lguest_apic_safe_wait_icr_idle;
511d9d34 1160};
07ad157f
RR
1161#endif
1162
b2b47c21 1163/* STOP! Until an interrupt comes in. */
07ad157f
RR
1164static void lguest_safe_halt(void)
1165{
091ebf07 1166 hcall(LHCALL_HALT, 0, 0, 0, 0);
07ad157f
RR
1167}
1168
2e04ef76
RR
1169/*
1170 * The SHUTDOWN hypercall takes a string to describe what's happening, and
a6bd8e13 1171 * an argument which says whether this to restart (reboot) the Guest or not.
b2b47c21
RR
1172 *
1173 * Note that the Host always prefers that the Guest speak in physical addresses
2e04ef76
RR
1174 * rather than virtual addresses, so we use __pa() here.
1175 */
07ad157f
RR
1176static void lguest_power_off(void)
1177{
091ebf07
RR
1178 hcall(LHCALL_SHUTDOWN, __pa("Power down"),
1179 LGUEST_SHUTDOWN_POWEROFF, 0, 0);
07ad157f
RR
1180}
1181
b2b47c21
RR
1182/*
1183 * Panicing.
1184 *
1185 * Don't. But if you did, this is what happens.
1186 */
07ad157f
RR
1187static int lguest_panic(struct notifier_block *nb, unsigned long l, void *p)
1188{
091ebf07 1189 hcall(LHCALL_SHUTDOWN, __pa(p), LGUEST_SHUTDOWN_POWEROFF, 0, 0);
b2b47c21 1190 /* The hcall won't return, but to keep gcc happy, we're "done". */
07ad157f
RR
1191 return NOTIFY_DONE;
1192}
1193
1194static struct notifier_block paniced = {
1195 .notifier_call = lguest_panic
1196};
1197
b2b47c21 1198/* Setting up memory is fairly easy. */
07ad157f
RR
1199static __init char *lguest_memory_setup(void)
1200{
2e04ef76 1201 /*
9f54288d 1202 * The Linux bootloader header contains an "e820" memory map: the
2e04ef76
RR
1203 * Launcher populated the first entry with our memory limit.
1204 */
d0be6bde 1205 e820_add_region(boot_params.e820_map[0].addr,
30c82645
PA
1206 boot_params.e820_map[0].size,
1207 boot_params.e820_map[0].type);
b2b47c21
RR
1208
1209 /* This string is for the boot messages. */
07ad157f
RR
1210 return "LGUEST";
1211}
1212
a561adfa
RR
1213/* Offset within PCI config space of BAR access capability. */
1214static int console_cfg_offset = 0;
1215static int console_access_cap;
1216
1217/* Set up so that we access off in bar0 (on bus 0, device 1, function 0) */
1218static void set_cfg_window(u32 cfg_offset, u32 off)
1219{
1220 write_pci_config_byte(0, 1, 0,
1221 cfg_offset + offsetof(struct virtio_pci_cap, bar),
1222 0);
1223 write_pci_config(0, 1, 0,
1224 cfg_offset + offsetof(struct virtio_pci_cap, length),
1225 4);
1226 write_pci_config(0, 1, 0,
1227 cfg_offset + offsetof(struct virtio_pci_cap, offset),
1228 off);
1229}
1230
a561adfa
RR
1231static void write_bar_via_cfg(u32 cfg_offset, u32 off, u32 val)
1232{
55c2d788
RR
1233 /*
1234 * We could set this up once, then leave it; nothing else in the *
1235 * kernel should touch these registers. But if it went wrong, that
1236 * would be a horrible bug to find.
1237 */
a561adfa
RR
1238 set_cfg_window(cfg_offset, off);
1239 write_pci_config(0, 1, 0,
1240 cfg_offset + sizeof(struct virtio_pci_cap), val);
1241}
1242
1243static void probe_pci_console(void)
1244{
1245 u8 cap, common_cap = 0, device_cap = 0;
55c2d788
RR
1246 /* Offset within BAR0 */
1247 u32 device_offset;
1248 u32 device_len;
a561adfa
RR
1249
1250 /* Avoid recursive printk into here. */
1251 console_cfg_offset = -1;
1252
1253 if (!early_pci_allowed()) {
1254 printk(KERN_ERR "lguest: early PCI access not allowed!\n");
1255 return;
1256 }
1257
1258 /* We expect a console PCI device at BUS0, slot 1. */
1259 if (read_pci_config(0, 1, 0, 0) != 0x10431AF4) {
1260 printk(KERN_ERR "lguest: PCI device is %#x!\n",
1261 read_pci_config(0, 1, 0, 0));
1262 return;
1263 }
1264
1265 /* Find the capabilities we need (must be in bar0) */
1266 cap = read_pci_config_byte(0, 1, 0, PCI_CAPABILITY_LIST);
1267 while (cap) {
1268 u8 vndr = read_pci_config_byte(0, 1, 0, cap);
1269 if (vndr == PCI_CAP_ID_VNDR) {
1270 u8 type, bar;
55c2d788 1271 u32 offset, length;
a561adfa
RR
1272
1273 type = read_pci_config_byte(0, 1, 0,
1274 cap + offsetof(struct virtio_pci_cap, cfg_type));
1275 bar = read_pci_config_byte(0, 1, 0,
1276 cap + offsetof(struct virtio_pci_cap, bar));
1277 offset = read_pci_config(0, 1, 0,
1278 cap + offsetof(struct virtio_pci_cap, offset));
55c2d788
RR
1279 length = read_pci_config(0, 1, 0,
1280 cap + offsetof(struct virtio_pci_cap, length));
a561adfa
RR
1281
1282 switch (type) {
a561adfa
RR
1283 case VIRTIO_PCI_CAP_DEVICE_CFG:
1284 if (bar == 0) {
1285 device_cap = cap;
1286 device_offset = offset;
55c2d788 1287 device_len = length;
a561adfa
RR
1288 }
1289 break;
1290 case VIRTIO_PCI_CAP_PCI_CFG:
1291 console_access_cap = cap;
1292 break;
1293 }
1294 }
1295 cap = read_pci_config_byte(0, 1, 0, cap + PCI_CAP_LIST_NEXT);
1296 }
55c2d788 1297 if (!device_cap || !console_access_cap) {
a561adfa
RR
1298 printk(KERN_ERR "lguest: No caps (%u/%u/%u) in console!\n",
1299 common_cap, device_cap, console_access_cap);
1300 return;
1301 }
1302
55c2d788
RR
1303 /*
1304 * Note that we can't check features, until we've set the DRIVER
1305 * status bit. We don't want to do that until we have a real driver,
1306 * so we just check that the device-specific config has room for
1307 * emerg_wr. If it doesn't support VIRTIO_CONSOLE_F_EMERG_WRITE
1308 * it should ignore the access.
1309 */
1310 if (device_len < (offsetof(struct virtio_console_config, emerg_wr)
1311 + sizeof(u32))) {
1312 printk(KERN_ERR "lguest: console missing emerg_wr field\n");
a561adfa
RR
1313 return;
1314 }
1315
1316 console_cfg_offset = device_offset;
55c2d788 1317 printk(KERN_INFO "lguest: Console via virtio-pci emerg_wr\n");
a561adfa
RR
1318}
1319
2e04ef76
RR
1320/*
1321 * We will eventually use the virtio console device to produce console output,
a561adfa
RR
1322 * but before that is set up we use the virtio PCI console's backdoor mmio
1323 * access and the "emergency" write facility (which is legal even before the
1324 * device is configured).
2e04ef76 1325 */
19f1537b
RR
1326static __init int early_put_chars(u32 vtermno, const char *buf, int count)
1327{
a561adfa
RR
1328 /* If we couldn't find PCI console, forget it. */
1329 if (console_cfg_offset < 0)
1330 return count;
19f1537b 1331
a561adfa
RR
1332 if (unlikely(!console_cfg_offset)) {
1333 probe_pci_console();
1334 if (console_cfg_offset < 0)
1335 return count;
1336 }
19f1537b 1337
a561adfa
RR
1338 write_bar_via_cfg(console_access_cap,
1339 console_cfg_offset
1340 + offsetof(struct virtio_console_config, emerg_wr),
1341 buf[0]);
1342 return 1;
19f1537b
RR
1343}
1344
2e04ef76
RR
1345/*
1346 * Rebooting also tells the Host we're finished, but the RESTART flag tells the
1347 * Launcher to reboot us.
1348 */
a6bd8e13
RR
1349static void lguest_restart(char *reason)
1350{
091ebf07 1351 hcall(LHCALL_SHUTDOWN, __pa(reason), LGUEST_SHUTDOWN_RESTART, 0, 0);
a6bd8e13
RR
1352}
1353
b2b47c21
RR
1354/*G:050
1355 * Patching (Powerfully Placating Performance Pedants)
1356 *
a6bd8e13
RR
1357 * We have already seen that pv_ops structures let us replace simple native
1358 * instructions with calls to the appropriate back end all throughout the
1359 * kernel. This allows the same kernel to run as a Guest and as a native
b2b47c21
RR
1360 * kernel, but it's slow because of all the indirect branches.
1361 *
1362 * Remember that David Wheeler quote about "Any problem in computer science can
1363 * be solved with another layer of indirection"? The rest of that quote is
1364 * "... But that usually will create another problem." This is the first of
1365 * those problems.
1366 *
1367 * Our current solution is to allow the paravirt back end to optionally patch
1368 * over the indirect calls to replace them with something more efficient. We
a32a8813
RR
1369 * patch two of the simplest of the most commonly called functions: disable
1370 * interrupts and save interrupts. We usually have 6 or 10 bytes to patch
1371 * into: the Guest versions of these operations are small enough that we can
1372 * fit comfortably.
b2b47c21
RR
1373 *
1374 * First we need assembly templates of each of the patchable Guest operations,
41f055d4 1375 * and these are in head_32.S.
2e04ef76 1376 */
b2b47c21
RR
1377
1378/*G:060 We construct a table from the assembler templates: */
07ad157f
RR
1379static const struct lguest_insns
1380{
1381 const char *start, *end;
1382} lguest_insns[] = {
93b1eab3 1383 [PARAVIRT_PATCH(pv_irq_ops.irq_disable)] = { lgstart_cli, lgend_cli },
93b1eab3 1384 [PARAVIRT_PATCH(pv_irq_ops.save_fl)] = { lgstart_pushf, lgend_pushf },
07ad157f 1385};
b2b47c21 1386
2e04ef76
RR
1387/*
1388 * Now our patch routine is fairly simple (based on the native one in
b2b47c21 1389 * paravirt.c). If we have a replacement, we copy it in and return how much of
2e04ef76
RR
1390 * the available space we used.
1391 */
ab144f5e
AK
1392static unsigned lguest_patch(u8 type, u16 clobber, void *ibuf,
1393 unsigned long addr, unsigned len)
07ad157f
RR
1394{
1395 unsigned int insn_len;
1396
b2b47c21 1397 /* Don't do anything special if we don't have a replacement */
07ad157f 1398 if (type >= ARRAY_SIZE(lguest_insns) || !lguest_insns[type].start)
ab144f5e 1399 return paravirt_patch_default(type, clobber, ibuf, addr, len);
07ad157f
RR
1400
1401 insn_len = lguest_insns[type].end - lguest_insns[type].start;
1402
2e04ef76 1403 /* Similarly if it can't fit (doesn't happen, but let's be thorough). */
07ad157f 1404 if (len < insn_len)
ab144f5e 1405 return paravirt_patch_default(type, clobber, ibuf, addr, len);
07ad157f 1406
b2b47c21 1407 /* Copy in our instructions. */
ab144f5e 1408 memcpy(ibuf, lguest_insns[type].start, insn_len);
07ad157f
RR
1409 return insn_len;
1410}
1411
2e04ef76
RR
1412/*G:029
1413 * Once we get to lguest_init(), we know we're a Guest. The various
a6bd8e13 1414 * pv_ops structures in the kernel provide points for (almost) every routine we
2e04ef76
RR
1415 * have to override to avoid privileged instructions.
1416 */
814a0e5c 1417__init void lguest_init(void)
07ad157f 1418{
2e04ef76 1419 /* We're under lguest. */
93b1eab3 1420 pv_info.name = "lguest";
2e04ef76 1421 /* Paravirt is enabled. */
93b1eab3 1422 pv_info.paravirt_enabled = 1;
2e04ef76 1423 /* We're running at privilege level 1, not 0 as normal. */
93b1eab3 1424 pv_info.kernel_rpl = 1;
2e04ef76 1425 /* Everyone except Xen runs with this set. */
acdd0b62 1426 pv_info.shared_kernel_pmd = 1;
07ad157f 1427
2e04ef76
RR
1428 /*
1429 * We set up all the lguest overrides for sensitive operations. These
1430 * are detailed with the operations themselves.
1431 */
93b1eab3 1432
2e04ef76 1433 /* Interrupt-related operations */
9549b9b3 1434 pv_irq_ops.save_fl = PV_CALLEE_SAVE(lguest_save_fl);
61f4bc83 1435 pv_irq_ops.restore_fl = __PV_IS_CALLEE_SAVE(lg_restore_fl);
9549b9b3 1436 pv_irq_ops.irq_disable = PV_CALLEE_SAVE(lguest_irq_disable);
61f4bc83 1437 pv_irq_ops.irq_enable = __PV_IS_CALLEE_SAVE(lg_irq_enable);
93b1eab3
JF
1438 pv_irq_ops.safe_halt = lguest_safe_halt;
1439
2e04ef76 1440 /* Setup operations */
93b1eab3
JF
1441 pv_init_ops.patch = lguest_patch;
1442
2e04ef76 1443 /* Intercepts of various CPU instructions */
93b1eab3
JF
1444 pv_cpu_ops.load_gdt = lguest_load_gdt;
1445 pv_cpu_ops.cpuid = lguest_cpuid;
1446 pv_cpu_ops.load_idt = lguest_load_idt;
1447 pv_cpu_ops.iret = lguest_iret;
faca6227 1448 pv_cpu_ops.load_sp0 = lguest_load_sp0;
93b1eab3
JF
1449 pv_cpu_ops.load_tr_desc = lguest_load_tr_desc;
1450 pv_cpu_ops.set_ldt = lguest_set_ldt;
1451 pv_cpu_ops.load_tls = lguest_load_tls;
aa96a3c6 1452 pv_cpu_ops.get_debugreg = lguest_get_debugreg;
93b1eab3
JF
1453 pv_cpu_ops.set_debugreg = lguest_set_debugreg;
1454 pv_cpu_ops.clts = lguest_clts;
1455 pv_cpu_ops.read_cr0 = lguest_read_cr0;
1456 pv_cpu_ops.write_cr0 = lguest_write_cr0;
1457 pv_cpu_ops.read_cr4 = lguest_read_cr4;
1458 pv_cpu_ops.write_cr4 = lguest_write_cr4;
1459 pv_cpu_ops.write_gdt_entry = lguest_write_gdt_entry;
1460 pv_cpu_ops.write_idt_entry = lguest_write_idt_entry;
1461 pv_cpu_ops.wbinvd = lguest_wbinvd;
224101ed
JF
1462 pv_cpu_ops.start_context_switch = paravirt_start_context_switch;
1463 pv_cpu_ops.end_context_switch = lguest_end_context_switch;
93b1eab3 1464
2e04ef76 1465 /* Pagetable management */
93b1eab3
JF
1466 pv_mmu_ops.write_cr3 = lguest_write_cr3;
1467 pv_mmu_ops.flush_tlb_user = lguest_flush_tlb_user;
1468 pv_mmu_ops.flush_tlb_single = lguest_flush_tlb_single;
1469 pv_mmu_ops.flush_tlb_kernel = lguest_flush_tlb_kernel;
1470 pv_mmu_ops.set_pte = lguest_set_pte;
1471 pv_mmu_ops.set_pte_at = lguest_set_pte_at;
1472 pv_mmu_ops.set_pmd = lguest_set_pmd;
acdd0b62
MZ
1473#ifdef CONFIG_X86_PAE
1474 pv_mmu_ops.set_pte_atomic = lguest_set_pte_atomic;
1475 pv_mmu_ops.pte_clear = lguest_pte_clear;
1476 pv_mmu_ops.pmd_clear = lguest_pmd_clear;
1477 pv_mmu_ops.set_pud = lguest_set_pud;
1478#endif
93b1eab3
JF
1479 pv_mmu_ops.read_cr2 = lguest_read_cr2;
1480 pv_mmu_ops.read_cr3 = lguest_read_cr3;
8965c1c0 1481 pv_mmu_ops.lazy_mode.enter = paravirt_enter_lazy_mmu;
b407fc57 1482 pv_mmu_ops.lazy_mode.leave = lguest_leave_lazy_mmu_mode;
511ba86e 1483 pv_mmu_ops.lazy_mode.flush = paravirt_flush_lazy_mmu;
b7ff99ea
RR
1484 pv_mmu_ops.pte_update = lguest_pte_update;
1485 pv_mmu_ops.pte_update_defer = lguest_pte_update;
93b1eab3 1486
07ad157f 1487#ifdef CONFIG_X86_LOCAL_APIC
2e04ef76 1488 /* APIC read/write intercepts */
c1eeb2de 1489 set_lguest_basic_apic_ops();
07ad157f 1490#endif
93b1eab3 1491
6b18ae3e 1492 x86_init.resources.memory_setup = lguest_memory_setup;
66bcaf0b 1493 x86_init.irqs.intr_init = lguest_init_IRQ;
845b3944 1494 x86_init.timers.timer_init = lguest_time_init;
2d826404 1495 x86_platform.calibrate_tsc = lguest_tsc_khz;
7bd867df 1496 x86_platform.get_wallclock = lguest_get_wallclock;
6b18ae3e 1497
2e04ef76
RR
1498 /*
1499 * Now is a good time to look at the implementations of these functions
1500 * before returning to the rest of lguest_init().
1501 */
b2b47c21 1502
2e04ef76
RR
1503 /*G:070
1504 * Now we've seen all the paravirt_ops, we return to
b2b47c21 1505 * lguest_init() where the rest of the fairly chaotic boot setup
2e04ef76
RR
1506 * occurs.
1507 */
07ad157f 1508
2e04ef76
RR
1509 /*
1510 * The stack protector is a weird thing where gcc places a canary
2cb7878a
RR
1511 * value on the stack and then checks it on return. This file is
1512 * compiled with -fno-stack-protector it, so we got this far without
1513 * problems. The value of the canary is kept at offset 20 from the
1514 * %gs register, so we need to set that up before calling C functions
2e04ef76
RR
1515 * in other files.
1516 */
2cb7878a 1517 setup_stack_canary_segment(0);
2e04ef76
RR
1518
1519 /*
1520 * We could just call load_stack_canary_segment(), but we might as well
1521 * call switch_to_new_gdt() which loads the whole table and sets up the
1522 * per-cpu segment descriptor register %fs as well.
1523 */
2cb7878a
RR
1524 switch_to_new_gdt(0);
1525
2e04ef76
RR
1526 /*
1527 * The Host<->Guest Switcher lives at the top of our address space, and
a6bd8e13 1528 * the Host told us how big it is when we made LGUEST_INIT hypercall:
2e04ef76
RR
1529 * it put the answer in lguest_data.reserve_mem
1530 */
07ad157f
RR
1531 reserve_top_address(lguest_data.reserve_mem);
1532
2e04ef76
RR
1533 /*
1534 * If we don't initialize the lock dependency checker now, it crashes
cdae0ad5 1535 * atomic_notifier_chain_register, then paravirt_disable_iospace.
2e04ef76 1536 */
07ad157f
RR
1537 lockdep_init();
1538
cdae0ad5
RR
1539 /* Hook in our special panic hypercall code. */
1540 atomic_notifier_chain_register(&panic_notifier_list, &paniced);
1541
2e04ef76
RR
1542 /*
1543 * This is messy CPU setup stuff which the native boot code does before
1544 * start_kernel, so we have to do, too:
1545 */
07ad157f
RR
1546 cpu_detect(&new_cpu_data);
1547 /* head.S usually sets up the first capability word, so do it here. */
1548 new_cpu_data.x86_capability[0] = cpuid_edx(1);
1549
1550 /* Math is always hard! */
60e019eb 1551 set_cpu_cap(&new_cpu_data, X86_FEATURE_FPU);
07ad157f 1552
a6bd8e13 1553 /* We don't have features. We have puppies! Puppies! */
07ad157f 1554#ifdef CONFIG_X86_MCE
1462594b 1555 mca_cfg.disabled = true;
07ad157f 1556#endif
07ad157f
RR
1557#ifdef CONFIG_ACPI
1558 acpi_disabled = 1;
07ad157f
RR
1559#endif
1560
2e04ef76
RR
1561 /*
1562 * We set the preferred console to "hvc". This is the "hypervisor
b2b47c21 1563 * virtual console" driver written by the PowerPC people, which we also
2e04ef76
RR
1564 * adapted for lguest's use.
1565 */
07ad157f
RR
1566 add_preferred_console("hvc", 0, NULL);
1567
19f1537b
RR
1568 /* Register our very early console. */
1569 virtio_cons_early_init(early_put_chars);
1570
ee72576c
RR
1571 /* Don't let ACPI try to control our PCI interrupts. */
1572 disable_acpi();
1573
e1b83e27
RR
1574 /* We control them ourselves, by overriding these two hooks. */
1575 pcibios_enable_irq = lguest_enable_irq;
1576 pcibios_disable_irq = lguest_disable_irq;
1577
2e04ef76
RR
1578 /*
1579 * Last of all, we set the power management poweroff hook to point to
a6bd8e13 1580 * the Guest routine to power off, and the reboot hook to our restart
2e04ef76
RR
1581 * routine.
1582 */
07ad157f 1583 pm_power_off = lguest_power_off;
ec04b13f 1584 machine_ops.restart = lguest_restart;
a6bd8e13 1585
2e04ef76
RR
1586 /*
1587 * Now we're set up, call i386_start_kernel() in head32.c and we proceed
1588 * to boot as normal. It never returns.
1589 */
f0d43100 1590 i386_start_kernel();
07ad157f 1591}
b2b47c21
RR
1592/*
1593 * This marks the end of stage II of our journey, The Guest.
1594 *
e1e72965
RR
1595 * It is now time for us to explore the layer of virtual drivers and complete
1596 * our understanding of the Guest in "make Drivers".
b2b47c21 1597 */