hypervisor_machdep.c revision 1.38 1 1.38 bouyer /* $NetBSD: hypervisor_machdep.c,v 1.38 2020/04/25 15:26:17 bouyer Exp $ */
2 1.2 bouyer
3 1.2 bouyer /*
4 1.2 bouyer *
5 1.2 bouyer * Copyright (c) 2004 Christian Limpach.
6 1.2 bouyer * All rights reserved.
7 1.2 bouyer *
8 1.2 bouyer * Redistribution and use in source and binary forms, with or without
9 1.2 bouyer * modification, are permitted provided that the following conditions
10 1.2 bouyer * are met:
11 1.2 bouyer * 1. Redistributions of source code must retain the above copyright
12 1.2 bouyer * notice, this list of conditions and the following disclaimer.
13 1.2 bouyer * 2. Redistributions in binary form must reproduce the above copyright
14 1.2 bouyer * notice, this list of conditions and the following disclaimer in the
15 1.2 bouyer * documentation and/or other materials provided with the distribution.
16 1.2 bouyer *
17 1.2 bouyer * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 1.2 bouyer * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 1.2 bouyer * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 1.2 bouyer * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 1.2 bouyer * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 1.2 bouyer * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 1.2 bouyer * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 1.2 bouyer * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 1.2 bouyer * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 1.2 bouyer * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 1.2 bouyer */
28 1.2 bouyer
29 1.2 bouyer /******************************************************************************
30 1.2 bouyer * hypervisor.c
31 1.2 bouyer *
32 1.2 bouyer * Communication to/from hypervisor.
33 1.2 bouyer *
34 1.2 bouyer * Copyright (c) 2002-2004, K A Fraser
35 1.2 bouyer *
36 1.2 bouyer * Permission is hereby granted, free of charge, to any person obtaining a copy
37 1.2 bouyer * of this software and associated documentation files (the "Software"), to
38 1.2 bouyer * deal in the Software without restriction, including without limitation the
39 1.2 bouyer * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
40 1.2 bouyer * sell copies of the Software, and to permit persons to whom the Software is
41 1.2 bouyer * furnished to do so, subject to the following conditions:
42 1.2 bouyer *
43 1.2 bouyer * The above copyright notice and this permission notice shall be included in
44 1.2 bouyer * all copies or substantial portions of the Software.
45 1.2 bouyer *
46 1.2 bouyer * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
47 1.2 bouyer * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
48 1.2 bouyer * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
49 1.2 bouyer * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
50 1.2 bouyer * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
51 1.2 bouyer * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
52 1.2 bouyer * DEALINGS IN THE SOFTWARE.
53 1.2 bouyer */
54 1.2 bouyer
55 1.2 bouyer
56 1.2 bouyer #include <sys/cdefs.h>
57 1.38 bouyer __KERNEL_RCSID(0, "$NetBSD: hypervisor_machdep.c,v 1.38 2020/04/25 15:26:17 bouyer Exp $");
58 1.2 bouyer
59 1.2 bouyer #include <sys/param.h>
60 1.2 bouyer #include <sys/systm.h>
61 1.10 bouyer #include <sys/kmem.h>
62 1.38 bouyer #include <sys/cpu.h>
63 1.10 bouyer
64 1.10 bouyer #include <uvm/uvm_extern.h>
65 1.10 bouyer
66 1.10 bouyer #include <machine/vmparam.h>
67 1.10 bouyer #include <machine/pmap.h>
68 1.2 bouyer
69 1.38 bouyer #include <x86/machdep.h>
70 1.38 bouyer #include <x86/cpuvar.h>
71 1.38 bouyer
72 1.2 bouyer #include <xen/xen.h>
73 1.38 bouyer #include <xen/intr.h>
74 1.2 bouyer #include <xen/hypervisor.h>
75 1.2 bouyer #include <xen/evtchn.h>
76 1.10 bouyer #include <xen/xenpmap.h>
77 1.2 bouyer
78 1.2 bouyer #include "opt_xen.h"
79 1.29 cherry #include "isa.h"
80 1.29 cherry #include "pci.h"
81 1.2 bouyer
82 1.35 cherry #ifdef XENPV
83 1.10 bouyer /*
84 1.10 bouyer * arch-dependent p2m frame lists list (L3 and L2)
85 1.10 bouyer * used by Xen for save/restore mappings
86 1.10 bouyer */
87 1.10 bouyer static unsigned long * l3_p2m_page;
88 1.10 bouyer static unsigned long * l2_p2m_page;
89 1.10 bouyer static int l2_p2m_page_size; /* size of L2 page, in pages */
90 1.10 bouyer
91 1.10 bouyer static void build_p2m_frame_list_list(void);
92 1.10 bouyer static void update_p2m_frame_list_list(void);
93 1.10 bouyer
94 1.35 cherry #endif
95 1.35 cherry
96 1.2 bouyer // #define PORT_DEBUG 4
97 1.2 bouyer // #define EARLY_DEBUG_EVENT
98 1.2 bouyer
99 1.15 cherry /* callback function type */
100 1.27 bouyer typedef void (*iterate_func_t)(unsigned int, unsigned int,
101 1.27 bouyer unsigned int, void *);
102 1.15 cherry
103 1.15 cherry static inline void
104 1.27 bouyer evt_iterate_bits(volatile unsigned long *pendingl1,
105 1.15 cherry volatile unsigned long *pendingl2,
106 1.15 cherry volatile unsigned long *mask,
107 1.15 cherry iterate_func_t iterate_pending, void *iterate_args)
108 1.15 cherry {
109 1.15 cherry
110 1.15 cherry KASSERT(pendingl1 != NULL);
111 1.15 cherry KASSERT(pendingl2 != NULL);
112 1.15 cherry
113 1.15 cherry unsigned long l1, l2;
114 1.15 cherry unsigned int l1i, l2i, port;
115 1.15 cherry
116 1.15 cherry l1 = xen_atomic_xchg(pendingl1, 0);
117 1.15 cherry while ((l1i = xen_ffs(l1)) != 0) {
118 1.15 cherry l1i--;
119 1.15 cherry l1 &= ~(1UL << l1i);
120 1.15 cherry
121 1.15 cherry l2 = pendingl2[l1i] & (mask != NULL ? ~mask[l1i] : -1UL);
122 1.27 bouyer l2 &= curcpu()->ci_evtmask[l1i];
123 1.15 cherry
124 1.15 cherry if (mask != NULL) xen_atomic_setbits_l(&mask[l1i], l2);
125 1.15 cherry xen_atomic_clearbits_l(&pendingl2[l1i], l2);
126 1.15 cherry
127 1.15 cherry while ((l2i = xen_ffs(l2)) != 0) {
128 1.15 cherry l2i--;
129 1.15 cherry l2 &= ~(1UL << l2i);
130 1.15 cherry
131 1.15 cherry port = (l1i << LONG_SHIFT) + l2i;
132 1.15 cherry
133 1.27 bouyer iterate_pending(port, l1i, l2i, iterate_args);
134 1.15 cherry }
135 1.15 cherry }
136 1.15 cherry }
137 1.15 cherry
138 1.15 cherry /*
139 1.15 cherry * Set per-cpu "pending" information for outstanding events that
140 1.15 cherry * cannot be processed now.
141 1.15 cherry */
142 1.15 cherry
143 1.15 cherry static inline void
144 1.27 bouyer evt_set_pending(unsigned int port, unsigned int l1i,
145 1.15 cherry unsigned int l2i, void *args)
146 1.15 cherry {
147 1.15 cherry
148 1.15 cherry KASSERT(args != NULL);
149 1.15 cherry
150 1.15 cherry int *ret = args;
151 1.15 cherry
152 1.15 cherry if (evtsource[port]) {
153 1.27 bouyer hypervisor_set_ipending(evtsource[port]->ev_imask, l1i, l2i);
154 1.15 cherry evtsource[port]->ev_evcnt.ev_count++;
155 1.27 bouyer if (*ret == 0 && curcpu()->ci_ilevel <
156 1.15 cherry evtsource[port]->ev_maxlevel)
157 1.15 cherry *ret = 1;
158 1.15 cherry }
159 1.15 cherry #ifdef DOM0OPS
160 1.15 cherry else {
161 1.15 cherry /* set pending event */
162 1.15 cherry xenevt_setipending(l1i, l2i);
163 1.15 cherry }
164 1.15 cherry #endif
165 1.15 cherry }
166 1.15 cherry
167 1.2 bouyer int stipending(void);
168 1.2 bouyer int
169 1.7 cegger stipending(void)
170 1.2 bouyer {
171 1.2 bouyer volatile shared_info_t *s = HYPERVISOR_shared_info;
172 1.2 bouyer struct cpu_info *ci;
173 1.8 cegger volatile struct vcpu_info *vci;
174 1.2 bouyer int ret;
175 1.2 bouyer
176 1.2 bouyer ret = 0;
177 1.2 bouyer ci = curcpu();
178 1.8 cegger vci = ci->ci_vcpu;
179 1.2 bouyer
180 1.2 bouyer #if 0
181 1.2 bouyer if (HYPERVISOR_shared_info->events)
182 1.2 bouyer printf("stipending events %08lx mask %08lx ilevel %d\n",
183 1.2 bouyer HYPERVISOR_shared_info->events,
184 1.2 bouyer HYPERVISOR_shared_info->events_mask, ci->ci_ilevel);
185 1.2 bouyer #endif
186 1.2 bouyer
187 1.2 bouyer #ifdef EARLY_DEBUG_EVENT
188 1.2 bouyer if (xen_atomic_test_bit(&s->evtchn_pending[0], debug_port)) {
189 1.2 bouyer xen_debug_handler(NULL);
190 1.2 bouyer xen_atomic_clear_bit(&s->evtchn_pending[0], debug_port);
191 1.2 bouyer }
192 1.2 bouyer #endif
193 1.2 bouyer
194 1.2 bouyer /*
195 1.2 bouyer * we're only called after STIC, so we know that we'll have to
196 1.2 bouyer * STI at the end
197 1.2 bouyer */
198 1.15 cherry
199 1.8 cegger while (vci->evtchn_upcall_pending) {
200 1.36 bouyer x86_disable_intr();
201 1.15 cherry
202 1.8 cegger vci->evtchn_upcall_pending = 0;
203 1.15 cherry
204 1.27 bouyer evt_iterate_bits(&vci->evtchn_pending_sel,
205 1.15 cherry s->evtchn_pending, s->evtchn_mask,
206 1.15 cherry evt_set_pending, &ret);
207 1.15 cherry
208 1.36 bouyer x86_enable_intr();
209 1.2 bouyer }
210 1.2 bouyer
211 1.2 bouyer return (ret);
212 1.2 bouyer }
213 1.2 bouyer
214 1.15 cherry /* Iterate through pending events and call the event handler */
215 1.15 cherry
216 1.15 cherry static inline void
217 1.27 bouyer evt_do_hypervisor_callback(unsigned int port, unsigned int l1i,
218 1.27 bouyer unsigned int l2i, void *args)
219 1.15 cherry {
220 1.15 cherry KASSERT(args != NULL);
221 1.15 cherry
222 1.38 bouyer #ifdef DOM0OPS
223 1.27 bouyer struct cpu_info *ci = curcpu();
224 1.38 bouyer #endif
225 1.15 cherry struct intrframe *regs = args;
226 1.15 cherry
227 1.15 cherry #ifdef PORT_DEBUG
228 1.15 cherry if (port == PORT_DEBUG)
229 1.15 cherry printf("do_hypervisor_callback event %d\n", port);
230 1.15 cherry #endif
231 1.22 cherry if (evtsource[port]) {
232 1.38 bouyer KASSERT(cpu_intr_p());
233 1.22 cherry evtchn_do_event(port, regs);
234 1.22 cherry }
235 1.15 cherry #ifdef DOM0OPS
236 1.15 cherry else {
237 1.15 cherry if (ci->ci_ilevel < IPL_HIGH) {
238 1.15 cherry /* fast path */
239 1.15 cherry int oipl = ci->ci_ilevel;
240 1.15 cherry ci->ci_ilevel = IPL_HIGH;
241 1.38 bouyer KASSERT(cpu_intr_p());
242 1.22 cherry xenevt_event(port);
243 1.15 cherry ci->ci_ilevel = oipl;
244 1.15 cherry } else {
245 1.15 cherry /* set pending event */
246 1.15 cherry xenevt_setipending(l1i, l2i);
247 1.15 cherry }
248 1.15 cherry }
249 1.15 cherry #endif
250 1.15 cherry }
251 1.15 cherry
252 1.2 bouyer void
253 1.2 bouyer do_hypervisor_callback(struct intrframe *regs)
254 1.2 bouyer {
255 1.2 bouyer volatile shared_info_t *s = HYPERVISOR_shared_info;
256 1.2 bouyer struct cpu_info *ci;
257 1.8 cegger volatile struct vcpu_info *vci;
258 1.28 bouyer int level __diagused;
259 1.2 bouyer
260 1.2 bouyer ci = curcpu();
261 1.8 cegger vci = ci->ci_vcpu;
262 1.2 bouyer level = ci->ci_ilevel;
263 1.2 bouyer
264 1.31 cherry /* Save trapframe for clock handler */
265 1.31 cherry KASSERT(regs != NULL);
266 1.33 kre ci->ci_xen_clockf_usermode = USERMODE(regs->_INTRFRAME_CS);
267 1.33 kre ci->ci_xen_clockf_pc = regs->_INTRFRAME_IP;
268 1.31 cherry
269 1.2 bouyer // DDD printf("do_hypervisor_callback\n");
270 1.2 bouyer
271 1.2 bouyer #ifdef EARLY_DEBUG_EVENT
272 1.2 bouyer if (xen_atomic_test_bit(&s->evtchn_pending[0], debug_port)) {
273 1.2 bouyer xen_debug_handler(NULL);
274 1.2 bouyer xen_atomic_clear_bit(&s->evtchn_pending[0], debug_port);
275 1.2 bouyer }
276 1.2 bouyer #endif
277 1.2 bouyer
278 1.8 cegger while (vci->evtchn_upcall_pending) {
279 1.8 cegger vci->evtchn_upcall_pending = 0;
280 1.2 bouyer
281 1.27 bouyer evt_iterate_bits(&vci->evtchn_pending_sel,
282 1.15 cherry s->evtchn_pending, s->evtchn_mask,
283 1.15 cherry evt_do_hypervisor_callback, regs);
284 1.2 bouyer }
285 1.2 bouyer
286 1.2 bouyer #ifdef DIAGNOSTIC
287 1.2 bouyer if (level != ci->ci_ilevel)
288 1.2 bouyer printf("hypervisor done %08x level %d/%d ipending %08x\n",
289 1.8 cegger (uint)vci->evtchn_pending_sel,
290 1.38 bouyer level, ci->ci_ilevel, ci->ci_ipending);
291 1.2 bouyer #endif
292 1.2 bouyer }
293 1.2 bouyer
294 1.38 bouyer #if 0
295 1.2 bouyer void
296 1.17 cherry hypervisor_send_event(struct cpu_info *ci, unsigned int ev)
297 1.17 cherry {
298 1.17 cherry KASSERT(ci != NULL);
299 1.17 cherry
300 1.17 cherry volatile shared_info_t *s = HYPERVISOR_shared_info;
301 1.17 cherry volatile struct vcpu_info *vci = ci->ci_vcpu;
302 1.17 cherry
303 1.17 cherry #ifdef PORT_DEBUG
304 1.17 cherry if (ev == PORT_DEBUG)
305 1.17 cherry printf("hypervisor_send_event %d\n", ev);
306 1.17 cherry #endif
307 1.17 cherry
308 1.17 cherry xen_atomic_set_bit(&s->evtchn_pending[0], ev);
309 1.17 cherry
310 1.21 cherry if (__predict_false(ci == curcpu())) {
311 1.20 cherry xen_atomic_set_bit(&vci->evtchn_pending_sel,
312 1.20 cherry ev >> LONG_SHIFT);
313 1.20 cherry xen_atomic_set_bit(&vci->evtchn_upcall_pending, 0);
314 1.20 cherry }
315 1.17 cherry
316 1.17 cherry xen_atomic_clear_bit(&s->evtchn_mask[0], ev);
317 1.17 cherry
318 1.17 cherry if (__predict_true(ci == curcpu())) {
319 1.17 cherry hypervisor_force_callback();
320 1.17 cherry } else {
321 1.18 bouyer if (__predict_false(xen_send_ipi(ci, XEN_IPI_HVCB))) {
322 1.38 bouyer panic("xen_send_ipi(cpu%d id %d, XEN_IPI_HVCB) failed\n",
323 1.38 bouyer (int) ci->ci_cpuid, ci->ci_vcpuid);
324 1.17 cherry }
325 1.17 cherry }
326 1.17 cherry }
327 1.38 bouyer #endif
328 1.17 cherry
329 1.17 cherry void
330 1.2 bouyer hypervisor_unmask_event(unsigned int ev)
331 1.2 bouyer {
332 1.30 cherry
333 1.30 cherry KASSERT(ev > 0 && ev < NR_EVENT_CHANNELS);
334 1.8 cegger
335 1.2 bouyer #ifdef PORT_DEBUG
336 1.2 bouyer if (ev == PORT_DEBUG)
337 1.2 bouyer printf("hypervisor_unmask_event %d\n", ev);
338 1.2 bouyer #endif
339 1.2 bouyer
340 1.30 cherry /* Xen unmasks the evtchn_mask[0]:ev bit for us. */
341 1.30 cherry evtchn_op_t op;
342 1.30 cherry op.cmd = EVTCHNOP_unmask;
343 1.30 cherry op.u.unmask.port = ev;
344 1.30 cherry if (HYPERVISOR_event_channel_op(&op) != 0)
345 1.30 cherry panic("Failed to unmask event %d\n", ev);
346 1.18 bouyer
347 1.30 cherry return;
348 1.2 bouyer }
349 1.2 bouyer
350 1.2 bouyer void
351 1.2 bouyer hypervisor_mask_event(unsigned int ev)
352 1.2 bouyer {
353 1.2 bouyer volatile shared_info_t *s = HYPERVISOR_shared_info;
354 1.2 bouyer #ifdef PORT_DEBUG
355 1.2 bouyer if (ev == PORT_DEBUG)
356 1.2 bouyer printf("hypervisor_mask_event %d\n", ev);
357 1.2 bouyer #endif
358 1.2 bouyer
359 1.2 bouyer xen_atomic_set_bit(&s->evtchn_mask[0], ev);
360 1.2 bouyer }
361 1.2 bouyer
362 1.2 bouyer void
363 1.2 bouyer hypervisor_clear_event(unsigned int ev)
364 1.2 bouyer {
365 1.2 bouyer volatile shared_info_t *s = HYPERVISOR_shared_info;
366 1.2 bouyer #ifdef PORT_DEBUG
367 1.2 bouyer if (ev == PORT_DEBUG)
368 1.2 bouyer printf("hypervisor_clear_event %d\n", ev);
369 1.2 bouyer #endif
370 1.2 bouyer
371 1.2 bouyer xen_atomic_clear_bit(&s->evtchn_pending[0], ev);
372 1.2 bouyer }
373 1.2 bouyer
374 1.15 cherry static inline void
375 1.27 bouyer evt_enable_event(unsigned int port, unsigned int l1i,
376 1.27 bouyer unsigned int l2i, void *args)
377 1.15 cherry {
378 1.15 cherry KASSERT(args == NULL);
379 1.29 cherry hypervisor_unmask_event(port);
380 1.15 cherry }
381 1.15 cherry
382 1.2 bouyer void
383 1.38 bouyer hypervisor_enable_sir(unsigned int sir)
384 1.2 bouyer {
385 1.2 bouyer struct cpu_info *ci = curcpu();
386 1.2 bouyer
387 1.2 bouyer /*
388 1.2 bouyer * enable all events for ipl. As we only set an event in ipl_evt_mask
389 1.2 bouyer * for its lowest IPL, and pending IPLs are processed high to low,
390 1.2 bouyer * we know that all callback for this event have been processed.
391 1.2 bouyer */
392 1.2 bouyer
393 1.38 bouyer evt_iterate_bits(&ci->ci_isources[sir]->ipl_evt_mask1,
394 1.38 bouyer ci->ci_isources[sir]->ipl_evt_mask2, NULL,
395 1.15 cherry evt_enable_event, NULL);
396 1.2 bouyer
397 1.2 bouyer }
398 1.2 bouyer
399 1.2 bouyer void
400 1.38 bouyer hypervisor_set_ipending(uint32_t imask, int l1, int l2)
401 1.2 bouyer {
402 1.27 bouyer
403 1.27 bouyer /* This function is not re-entrant */
404 1.27 bouyer KASSERT(x86_read_psl() != 0);
405 1.27 bouyer
406 1.38 bouyer int sir;
407 1.27 bouyer struct cpu_info *ci = curcpu();
408 1.2 bouyer
409 1.2 bouyer /* set pending bit for the appropriate IPLs */
410 1.38 bouyer ci->ci_ipending |= imask;
411 1.2 bouyer
412 1.2 bouyer /*
413 1.2 bouyer * And set event pending bit for the lowest IPL. As IPL are handled
414 1.2 bouyer * from high to low, this ensure that all callbacks will have been
415 1.2 bouyer * called when we ack the event
416 1.2 bouyer */
417 1.38 bouyer sir = ffs(imask);
418 1.38 bouyer KASSERT(sir > SIR_XENIPL_VM);
419 1.38 bouyer sir--;
420 1.38 bouyer KASSERT(sir <= SIR_XENIPL_HIGH);
421 1.38 bouyer KASSERT(ci->ci_isources[sir] != NULL);
422 1.38 bouyer ci->ci_isources[sir]->ipl_evt_mask1 |= 1UL << l1;
423 1.38 bouyer ci->ci_isources[sir]->ipl_evt_mask2[l1] |= 1UL << l2;
424 1.38 bouyer KASSERT(ci == curcpu());
425 1.38 bouyer #if 0
426 1.25 bouyer if (__predict_false(ci != curcpu())) {
427 1.25 bouyer if (xen_send_ipi(ci, XEN_IPI_HVCB)) {
428 1.25 bouyer panic("hypervisor_set_ipending: "
429 1.38 bouyer "xen_send_ipi(cpu%d id %d, XEN_IPI_HVCB) failed\n",
430 1.38 bouyer (int) ci->ci_cpuid, ci->ci_vcpuid);
431 1.25 bouyer }
432 1.25 bouyer }
433 1.38 bouyer #endif
434 1.2 bouyer }
435 1.10 bouyer
436 1.10 bouyer void
437 1.12 cegger hypervisor_machdep_attach(void)
438 1.12 cegger {
439 1.35 cherry #ifdef XENPV
440 1.10 bouyer /* dom0 does not require the arch-dependent P2M translation table */
441 1.16 jym if (!xendomain_is_dom0()) {
442 1.10 bouyer build_p2m_frame_list_list();
443 1.16 jym sysctl_xen_suspend_setup();
444 1.10 bouyer }
445 1.35 cherry #endif
446 1.10 bouyer }
447 1.10 bouyer
448 1.16 jym void
449 1.16 jym hypervisor_machdep_resume(void)
450 1.16 jym {
451 1.35 cherry #ifdef XENPV
452 1.16 jym /* dom0 does not require the arch-dependent P2M translation table */
453 1.16 jym if (!xendomain_is_dom0())
454 1.16 jym update_p2m_frame_list_list();
455 1.35 cherry #endif
456 1.16 jym }
457 1.16 jym
458 1.38 bouyer /*
459 1.38 bouyer * idle_block()
460 1.38 bouyer *
461 1.38 bouyer * Called from the idle loop when we have nothing to do but wait
462 1.38 bouyer * for an interrupt.
463 1.38 bouyer */
464 1.38 bouyer static void
465 1.38 bouyer idle_block(void)
466 1.38 bouyer {
467 1.38 bouyer KASSERT(curcpu()->ci_ipending == 0);
468 1.38 bouyer HYPERVISOR_block();
469 1.38 bouyer KASSERT(curcpu()->ci_ipending == 0);
470 1.38 bouyer }
471 1.38 bouyer
472 1.38 bouyer void
473 1.38 bouyer x86_cpu_idle_xen(void)
474 1.38 bouyer {
475 1.38 bouyer struct cpu_info *ci = curcpu();
476 1.38 bouyer
477 1.38 bouyer KASSERT(ci->ci_ilevel == IPL_NONE);
478 1.38 bouyer
479 1.38 bouyer x86_disable_intr();
480 1.38 bouyer if (__predict_false(!ci->ci_want_resched)) {
481 1.38 bouyer idle_block();
482 1.38 bouyer } else {
483 1.38 bouyer x86_enable_intr();
484 1.38 bouyer }
485 1.38 bouyer }
486 1.38 bouyer
487 1.35 cherry #ifdef XENPV
488 1.10 bouyer /*
489 1.10 bouyer * Generate the p2m_frame_list_list table,
490 1.10 bouyer * needed for guest save/restore
491 1.10 bouyer */
492 1.10 bouyer static void
493 1.12 cegger build_p2m_frame_list_list(void)
494 1.12 cegger {
495 1.10 bouyer int fpp; /* number of page (frame) pointer per page */
496 1.10 bouyer unsigned long max_pfn;
497 1.10 bouyer /*
498 1.10 bouyer * The p2m list is composed of three levels of indirection,
499 1.10 bouyer * each layer containing MFNs pointing to lower level pages
500 1.10 bouyer * The indirection is used to convert a given PFN to its MFN
501 1.10 bouyer * Each N level page can point to @fpp (N-1) level pages
502 1.10 bouyer * For example, for x86 32bit, we have:
503 1.10 bouyer * - PAGE_SIZE: 4096 bytes
504 1.10 bouyer * - fpp: 1024 (one L3 page can address 1024 L2 pages)
505 1.10 bouyer * A L1 page contains the list of MFN we are looking for
506 1.10 bouyer */
507 1.10 bouyer max_pfn = xen_start_info.nr_pages;
508 1.14 jym fpp = PAGE_SIZE / sizeof(xen_pfn_t);
509 1.10 bouyer
510 1.10 bouyer /* we only need one L3 page */
511 1.14 jym l3_p2m_page = (vaddr_t *)uvm_km_alloc(kernel_map, PAGE_SIZE,
512 1.14 jym PAGE_SIZE, UVM_KMF_WIRED | UVM_KMF_NOWAIT);
513 1.10 bouyer if (l3_p2m_page == NULL)
514 1.10 bouyer panic("could not allocate memory for l3_p2m_page");
515 1.10 bouyer
516 1.10 bouyer /*
517 1.10 bouyer * Determine how many L2 pages we need for the mapping
518 1.10 bouyer * Each L2 can map a total of @fpp L1 pages
519 1.10 bouyer */
520 1.10 bouyer l2_p2m_page_size = howmany(max_pfn, fpp);
521 1.10 bouyer
522 1.14 jym l2_p2m_page = (vaddr_t *)uvm_km_alloc(kernel_map,
523 1.14 jym l2_p2m_page_size * PAGE_SIZE,
524 1.14 jym PAGE_SIZE, UVM_KMF_WIRED | UVM_KMF_NOWAIT);
525 1.10 bouyer if (l2_p2m_page == NULL)
526 1.10 bouyer panic("could not allocate memory for l2_p2m_page");
527 1.10 bouyer
528 1.10 bouyer /* We now have L3 and L2 pages ready, update L1 mapping */
529 1.10 bouyer update_p2m_frame_list_list();
530 1.10 bouyer
531 1.10 bouyer }
532 1.10 bouyer
533 1.10 bouyer /*
534 1.10 bouyer * Update the L1 p2m_frame_list_list mapping (during guest boot or resume)
535 1.10 bouyer */
536 1.10 bouyer static void
537 1.12 cegger update_p2m_frame_list_list(void)
538 1.12 cegger {
539 1.10 bouyer int i;
540 1.10 bouyer int fpp; /* number of page (frame) pointer per page */
541 1.10 bouyer unsigned long max_pfn;
542 1.10 bouyer
543 1.10 bouyer max_pfn = xen_start_info.nr_pages;
544 1.14 jym fpp = PAGE_SIZE / sizeof(xen_pfn_t);
545 1.10 bouyer
546 1.10 bouyer for (i = 0; i < l2_p2m_page_size; i++) {
547 1.10 bouyer /*
548 1.10 bouyer * Each time we start a new L2 page,
549 1.10 bouyer * store its MFN in the L3 page
550 1.10 bouyer */
551 1.10 bouyer if ((i % fpp) == 0) {
552 1.10 bouyer l3_p2m_page[i/fpp] = vtomfn(
553 1.10 bouyer (vaddr_t)&l2_p2m_page[i]);
554 1.10 bouyer }
555 1.10 bouyer /*
556 1.10 bouyer * we use a shortcut
557 1.10 bouyer * since @xpmap_phys_to_machine_mapping array
558 1.10 bouyer * already contains PFN to MFN mapping, we just
559 1.10 bouyer * set the l2_p2m_page MFN pointer to the MFN of the
560 1.10 bouyer * according frame of @xpmap_phys_to_machine_mapping
561 1.10 bouyer */
562 1.10 bouyer l2_p2m_page[i] = vtomfn((vaddr_t)
563 1.10 bouyer &xpmap_phys_to_machine_mapping[i*fpp]);
564 1.10 bouyer }
565 1.10 bouyer
566 1.10 bouyer HYPERVISOR_shared_info->arch.pfn_to_mfn_frame_list_list =
567 1.10 bouyer vtomfn((vaddr_t)l3_p2m_page);
568 1.10 bouyer HYPERVISOR_shared_info->arch.max_pfn = max_pfn;
569 1.10 bouyer
570 1.10 bouyer }
571 1.35 cherry #endif /* XENPV */
572