blob: 0a46b4df5d80ea2f97e9800b884a1a80ee27b9a8 [file] [log] [blame]
Alok Kataria88b094f2008-10-27 10:41:46 -07001/*
2 * VMware Detection code.
3 *
4 * Copyright (C) 2008, VMware, Inc.
5 * Author : Alok N Kataria <akataria@vmware.com>
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE or
15 * NON INFRINGEMENT. See the GNU General Public License for more
16 * details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
21 *
22 */
23
24#include <linux/dmi.h>
25#include <asm/div64.h>
Hannes Ederc450d782008-11-21 23:17:09 +010026#include <asm/vmware.h>
Thomas Gleixner2d826402009-08-20 17:06:25 +020027#include <asm/x86_init.h>
Alok Kataria88b094f2008-10-27 10:41:46 -070028
29#define CPUID_VMWARE_INFO_LEAF 0x40000000
30#define VMWARE_HYPERVISOR_MAGIC 0x564D5868
31#define VMWARE_HYPERVISOR_PORT 0x5658
32
33#define VMWARE_PORT_CMD_GETVERSION 10
34#define VMWARE_PORT_CMD_GETHZ 45
35
36#define VMWARE_PORT(cmd, eax, ebx, ecx, edx) \
37 __asm__("inl (%%dx)" : \
38 "=a"(eax), "=c"(ecx), "=d"(edx), "=b"(ebx) : \
39 "0"(VMWARE_HYPERVISOR_MAGIC), \
40 "1"(VMWARE_PORT_CMD_##cmd), \
Alok Kataria6bdbfe92008-11-03 11:31:28 -080041 "2"(VMWARE_HYPERVISOR_PORT), "3"(UINT_MAX) : \
Alok Kataria88b094f2008-10-27 10:41:46 -070042 "memory");
43
44static inline int __vmware_platform(void)
45{
46 uint32_t eax, ebx, ecx, edx;
47 VMWARE_PORT(GETVERSION, eax, ebx, ecx, edx);
48 return eax != (uint32_t)-1 && ebx == VMWARE_HYPERVISOR_MAGIC;
49}
50
Thomas Gleixner2d826402009-08-20 17:06:25 +020051static unsigned long vmware_get_tsc_khz(void)
Alok Kataria88b094f2008-10-27 10:41:46 -070052{
Alan Cox8bdbd962009-07-04 00:35:45 +010053 uint64_t tsc_hz;
54 uint32_t eax, ebx, ecx, edx;
Alok Kataria88b094f2008-10-27 10:41:46 -070055
Alan Cox8bdbd962009-07-04 00:35:45 +010056 VMWARE_PORT(GETHZ, eax, ebx, ecx, edx);
Alok Kataria88b094f2008-10-27 10:41:46 -070057
Alan Cox8bdbd962009-07-04 00:35:45 +010058 tsc_hz = eax | (((uint64_t)ebx) << 32);
59 do_div(tsc_hz, 1000);
60 BUG_ON(tsc_hz >> 32);
61 return tsc_hz;
Alok Kataria88b094f2008-10-27 10:41:46 -070062}
63
Thomas Gleixner2d826402009-08-20 17:06:25 +020064void __init vmware_platform_setup(void)
65{
66 uint32_t eax, ebx, ecx, edx;
67
68 VMWARE_PORT(GETHZ, eax, ebx, ecx, edx);
69
70 if (ebx != UINT_MAX)
71 x86_platform.calibrate_tsc = vmware_get_tsc_khz;
72}
73
Alok Katariafd8cd7e2008-11-03 15:50:38 -080074/*
75 * While checking the dmi string infomation, just checking the product
76 * serial key should be enough, as this will always have a VMware
77 * specific string when running under VMware hypervisor.
78 */
Alok Kataria88b094f2008-10-27 10:41:46 -070079int vmware_platform(void)
80{
81 if (cpu_has_hypervisor) {
82 unsigned int eax, ebx, ecx, edx;
83 char hyper_vendor_id[13];
84
85 cpuid(CPUID_VMWARE_INFO_LEAF, &eax, &ebx, &ecx, &edx);
86 memcpy(hyper_vendor_id + 0, &ebx, 4);
87 memcpy(hyper_vendor_id + 4, &ecx, 4);
88 memcpy(hyper_vendor_id + 8, &edx, 4);
89 hyper_vendor_id[12] = '\0';
90 if (!strcmp(hyper_vendor_id, "VMwareVMware"))
91 return 1;
Alok Katariafd8cd7e2008-11-03 15:50:38 -080092 } else if (dmi_available && dmi_name_in_serial("VMware") &&
Alok Kataria88b094f2008-10-27 10:41:46 -070093 __vmware_platform())
94 return 1;
95
96 return 0;
97}
98
Alok Katariaeca0cd02008-10-31 12:01:58 -070099/*
100 * VMware hypervisor takes care of exporting a reliable TSC to the guest.
101 * Still, due to timing difference when running on virtual cpus, the TSC can
102 * be marked as unstable in some cases. For example, the TSC sync check at
103 * bootup can fail due to a marginal offset between vcpus' TSCs (though the
104 * TSCs do not drift from each other). Also, the ACPI PM timer clocksource
105 * is not suitable as a watchdog when running on a hypervisor because the
106 * kernel may miss a wrap of the counter if the vcpu is descheduled for a
107 * long time. To skip these checks at runtime we set these capability bits,
108 * so that the kernel could just trust the hypervisor with providing a
109 * reliable virtual TSC that is suitable for timekeeping.
110 */
111void __cpuinit vmware_set_feature_bits(struct cpuinfo_x86 *c)
112{
113 set_cpu_cap(c, X86_FEATURE_CONSTANT_TSC);
114 set_cpu_cap(c, X86_FEATURE_TSC_RELIABLE);
115}