hypervisor_machdep.c revision 1.45 1 1.45 knakahar /* $NetBSD: hypervisor_machdep.c,v 1.45 2022/09/07 00:40:19 knakahara Exp $ */
2 1.2 bouyer
3 1.2 bouyer /*
4 1.2 bouyer *
5 1.2 bouyer * Copyright (c) 2004 Christian Limpach.
6 1.2 bouyer * All rights reserved.
7 1.2 bouyer *
8 1.2 bouyer * Redistribution and use in source and binary forms, with or without
9 1.2 bouyer * modification, are permitted provided that the following conditions
10 1.2 bouyer * are met:
11 1.2 bouyer * 1. Redistributions of source code must retain the above copyright
12 1.2 bouyer * notice, this list of conditions and the following disclaimer.
13 1.2 bouyer * 2. Redistributions in binary form must reproduce the above copyright
14 1.2 bouyer * notice, this list of conditions and the following disclaimer in the
15 1.2 bouyer * documentation and/or other materials provided with the distribution.
16 1.2 bouyer *
17 1.2 bouyer * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 1.2 bouyer * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 1.2 bouyer * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 1.2 bouyer * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 1.2 bouyer * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 1.2 bouyer * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 1.2 bouyer * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 1.2 bouyer * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 1.2 bouyer * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 1.2 bouyer * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 1.2 bouyer */
28 1.2 bouyer
29 1.2 bouyer /******************************************************************************
30 1.2 bouyer * hypervisor.c
31 1.2 bouyer *
32 1.2 bouyer * Communication to/from hypervisor.
33 1.2 bouyer *
34 1.2 bouyer * Copyright (c) 2002-2004, K A Fraser
35 1.2 bouyer *
36 1.2 bouyer * Permission is hereby granted, free of charge, to any person obtaining a copy
37 1.2 bouyer * of this software and associated documentation files (the "Software"), to
38 1.2 bouyer * deal in the Software without restriction, including without limitation the
39 1.2 bouyer * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
40 1.2 bouyer * sell copies of the Software, and to permit persons to whom the Software is
41 1.2 bouyer * furnished to do so, subject to the following conditions:
42 1.2 bouyer *
43 1.2 bouyer * The above copyright notice and this permission notice shall be included in
44 1.2 bouyer * all copies or substantial portions of the Software.
45 1.2 bouyer *
46 1.2 bouyer * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
47 1.2 bouyer * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
48 1.2 bouyer * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
49 1.2 bouyer * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
50 1.2 bouyer * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
51 1.2 bouyer * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
52 1.2 bouyer * DEALINGS IN THE SOFTWARE.
53 1.2 bouyer */
54 1.2 bouyer
55 1.2 bouyer
56 1.2 bouyer #include <sys/cdefs.h>
57 1.45 knakahar __KERNEL_RCSID(0, "$NetBSD: hypervisor_machdep.c,v 1.45 2022/09/07 00:40:19 knakahara Exp $");
58 1.2 bouyer
59 1.2 bouyer #include <sys/param.h>
60 1.2 bouyer #include <sys/systm.h>
61 1.10 bouyer #include <sys/kmem.h>
62 1.38 bouyer #include <sys/cpu.h>
63 1.39 bouyer #include <sys/ksyms.h>
64 1.10 bouyer
65 1.10 bouyer #include <uvm/uvm_extern.h>
66 1.10 bouyer
67 1.10 bouyer #include <machine/vmparam.h>
68 1.10 bouyer #include <machine/pmap.h>
69 1.44 riastrad #include <machine/pmap_private.h>
70 1.2 bouyer
71 1.38 bouyer #include <x86/machdep.h>
72 1.38 bouyer #include <x86/cpuvar.h>
73 1.38 bouyer
74 1.2 bouyer #include <xen/xen.h>
75 1.38 bouyer #include <xen/intr.h>
76 1.2 bouyer #include <xen/hypervisor.h>
77 1.2 bouyer #include <xen/evtchn.h>
78 1.10 bouyer #include <xen/xenpmap.h>
79 1.2 bouyer
80 1.2 bouyer #include "opt_xen.h"
81 1.39 bouyer #include "opt_modular.h"
82 1.39 bouyer #include "opt_ddb.h"
83 1.29 cherry #include "isa.h"
84 1.29 cherry #include "pci.h"
85 1.39 bouyer #include "ksyms.h"
86 1.39 bouyer
87 1.39 bouyer #ifdef DDB
88 1.39 bouyer #include <machine/db_machdep.h>
89 1.39 bouyer #include <ddb/db_extern.h>
90 1.39 bouyer #include <ddb/db_output.h>
91 1.39 bouyer #include <ddb/db_interface.h>
92 1.39 bouyer #endif
93 1.2 bouyer
94 1.35 cherry #ifdef XENPV
95 1.10 bouyer /*
96 1.10 bouyer * arch-dependent p2m frame lists list (L3 and L2)
97 1.10 bouyer * used by Xen for save/restore mappings
98 1.10 bouyer */
99 1.10 bouyer static unsigned long * l3_p2m_page;
100 1.10 bouyer static unsigned long * l2_p2m_page;
101 1.10 bouyer static int l2_p2m_page_size; /* size of L2 page, in pages */
102 1.10 bouyer
103 1.10 bouyer static void build_p2m_frame_list_list(void);
104 1.10 bouyer static void update_p2m_frame_list_list(void);
105 1.10 bouyer
106 1.35 cherry #endif
107 1.35 cherry
108 1.2 bouyer // #define PORT_DEBUG 4
109 1.2 bouyer // #define EARLY_DEBUG_EVENT
110 1.2 bouyer
111 1.15 cherry /* callback function type */
112 1.27 bouyer typedef void (*iterate_func_t)(unsigned int, unsigned int,
113 1.27 bouyer unsigned int, void *);
114 1.15 cherry
115 1.15 cherry static inline void
116 1.27 bouyer evt_iterate_bits(volatile unsigned long *pendingl1,
117 1.15 cherry volatile unsigned long *pendingl2,
118 1.15 cherry volatile unsigned long *mask,
119 1.15 cherry iterate_func_t iterate_pending, void *iterate_args)
120 1.15 cherry {
121 1.15 cherry
122 1.15 cherry KASSERT(pendingl1 != NULL);
123 1.15 cherry KASSERT(pendingl2 != NULL);
124 1.15 cherry
125 1.15 cherry unsigned long l1, l2;
126 1.15 cherry unsigned int l1i, l2i, port;
127 1.15 cherry
128 1.15 cherry l1 = xen_atomic_xchg(pendingl1, 0);
129 1.15 cherry while ((l1i = xen_ffs(l1)) != 0) {
130 1.15 cherry l1i--;
131 1.15 cherry l1 &= ~(1UL << l1i);
132 1.15 cherry
133 1.15 cherry l2 = pendingl2[l1i] & (mask != NULL ? ~mask[l1i] : -1UL);
134 1.27 bouyer l2 &= curcpu()->ci_evtmask[l1i];
135 1.15 cherry
136 1.15 cherry if (mask != NULL) xen_atomic_setbits_l(&mask[l1i], l2);
137 1.15 cherry xen_atomic_clearbits_l(&pendingl2[l1i], l2);
138 1.15 cherry
139 1.15 cherry while ((l2i = xen_ffs(l2)) != 0) {
140 1.15 cherry l2i--;
141 1.15 cherry l2 &= ~(1UL << l2i);
142 1.15 cherry
143 1.15 cherry port = (l1i << LONG_SHIFT) + l2i;
144 1.15 cherry
145 1.27 bouyer iterate_pending(port, l1i, l2i, iterate_args);
146 1.15 cherry }
147 1.15 cherry }
148 1.15 cherry }
149 1.15 cherry
150 1.15 cherry /*
151 1.15 cherry * Set per-cpu "pending" information for outstanding events that
152 1.15 cherry * cannot be processed now.
153 1.15 cherry */
154 1.15 cherry
155 1.15 cherry static inline void
156 1.27 bouyer evt_set_pending(unsigned int port, unsigned int l1i,
157 1.15 cherry unsigned int l2i, void *args)
158 1.15 cherry {
159 1.15 cherry
160 1.15 cherry KASSERT(args != NULL);
161 1.15 cherry
162 1.15 cherry int *ret = args;
163 1.43 bouyer struct intrhand *ih;
164 1.15 cherry
165 1.15 cherry if (evtsource[port]) {
166 1.27 bouyer hypervisor_set_ipending(evtsource[port]->ev_imask, l1i, l2i);
167 1.15 cherry evtsource[port]->ev_evcnt.ev_count++;
168 1.43 bouyer ih = evtsource[port]->ev_handlers;
169 1.43 bouyer while (ih != NULL) {
170 1.43 bouyer ih->ih_pending++;
171 1.43 bouyer ih = ih->ih_evt_next;
172 1.43 bouyer }
173 1.43 bouyer
174 1.27 bouyer if (*ret == 0 && curcpu()->ci_ilevel <
175 1.15 cherry evtsource[port]->ev_maxlevel)
176 1.15 cherry *ret = 1;
177 1.15 cherry }
178 1.15 cherry #ifdef DOM0OPS
179 1.15 cherry else {
180 1.15 cherry /* set pending event */
181 1.15 cherry xenevt_setipending(l1i, l2i);
182 1.15 cherry }
183 1.15 cherry #endif
184 1.15 cherry }
185 1.15 cherry
186 1.2 bouyer int stipending(void);
187 1.2 bouyer int
188 1.7 cegger stipending(void)
189 1.2 bouyer {
190 1.2 bouyer volatile shared_info_t *s = HYPERVISOR_shared_info;
191 1.2 bouyer struct cpu_info *ci;
192 1.8 cegger volatile struct vcpu_info *vci;
193 1.2 bouyer int ret;
194 1.2 bouyer
195 1.2 bouyer ret = 0;
196 1.2 bouyer ci = curcpu();
197 1.8 cegger vci = ci->ci_vcpu;
198 1.2 bouyer
199 1.2 bouyer #if 0
200 1.2 bouyer if (HYPERVISOR_shared_info->events)
201 1.2 bouyer printf("stipending events %08lx mask %08lx ilevel %d\n",
202 1.2 bouyer HYPERVISOR_shared_info->events,
203 1.2 bouyer HYPERVISOR_shared_info->events_mask, ci->ci_ilevel);
204 1.2 bouyer #endif
205 1.2 bouyer
206 1.2 bouyer #ifdef EARLY_DEBUG_EVENT
207 1.2 bouyer if (xen_atomic_test_bit(&s->evtchn_pending[0], debug_port)) {
208 1.2 bouyer xen_debug_handler(NULL);
209 1.2 bouyer xen_atomic_clear_bit(&s->evtchn_pending[0], debug_port);
210 1.2 bouyer }
211 1.2 bouyer #endif
212 1.2 bouyer
213 1.2 bouyer /*
214 1.2 bouyer * we're only called after STIC, so we know that we'll have to
215 1.2 bouyer * STI at the end
216 1.2 bouyer */
217 1.15 cherry
218 1.8 cegger while (vci->evtchn_upcall_pending) {
219 1.36 bouyer x86_disable_intr();
220 1.15 cherry
221 1.8 cegger vci->evtchn_upcall_pending = 0;
222 1.15 cherry
223 1.27 bouyer evt_iterate_bits(&vci->evtchn_pending_sel,
224 1.15 cherry s->evtchn_pending, s->evtchn_mask,
225 1.15 cherry evt_set_pending, &ret);
226 1.15 cherry
227 1.36 bouyer x86_enable_intr();
228 1.2 bouyer }
229 1.2 bouyer
230 1.2 bouyer return (ret);
231 1.2 bouyer }
232 1.2 bouyer
233 1.15 cherry /* Iterate through pending events and call the event handler */
234 1.15 cherry
235 1.15 cherry static inline void
236 1.27 bouyer evt_do_hypervisor_callback(unsigned int port, unsigned int l1i,
237 1.27 bouyer unsigned int l2i, void *args)
238 1.15 cherry {
239 1.15 cherry KASSERT(args != NULL);
240 1.15 cherry
241 1.38 bouyer #ifdef DOM0OPS
242 1.27 bouyer struct cpu_info *ci = curcpu();
243 1.38 bouyer #endif
244 1.15 cherry struct intrframe *regs = args;
245 1.15 cherry
246 1.15 cherry #ifdef PORT_DEBUG
247 1.15 cherry if (port == PORT_DEBUG)
248 1.15 cherry printf("do_hypervisor_callback event %d\n", port);
249 1.15 cherry #endif
250 1.22 cherry if (evtsource[port]) {
251 1.38 bouyer KASSERT(cpu_intr_p());
252 1.22 cherry evtchn_do_event(port, regs);
253 1.22 cherry }
254 1.15 cherry #ifdef DOM0OPS
255 1.15 cherry else {
256 1.15 cherry if (ci->ci_ilevel < IPL_HIGH) {
257 1.15 cherry /* fast path */
258 1.15 cherry int oipl = ci->ci_ilevel;
259 1.15 cherry ci->ci_ilevel = IPL_HIGH;
260 1.38 bouyer KASSERT(cpu_intr_p());
261 1.22 cherry xenevt_event(port);
262 1.15 cherry ci->ci_ilevel = oipl;
263 1.15 cherry } else {
264 1.15 cherry /* set pending event */
265 1.15 cherry xenevt_setipending(l1i, l2i);
266 1.15 cherry }
267 1.15 cherry }
268 1.15 cherry #endif
269 1.15 cherry }
270 1.15 cherry
271 1.2 bouyer void
272 1.2 bouyer do_hypervisor_callback(struct intrframe *regs)
273 1.2 bouyer {
274 1.2 bouyer volatile shared_info_t *s = HYPERVISOR_shared_info;
275 1.2 bouyer struct cpu_info *ci;
276 1.8 cegger volatile struct vcpu_info *vci;
277 1.45 knakahar uint64_t level __diagused;
278 1.2 bouyer
279 1.2 bouyer ci = curcpu();
280 1.8 cegger vci = ci->ci_vcpu;
281 1.2 bouyer level = ci->ci_ilevel;
282 1.2 bouyer
283 1.31 cherry /* Save trapframe for clock handler */
284 1.31 cherry KASSERT(regs != NULL);
285 1.33 kre ci->ci_xen_clockf_usermode = USERMODE(regs->_INTRFRAME_CS);
286 1.33 kre ci->ci_xen_clockf_pc = regs->_INTRFRAME_IP;
287 1.31 cherry
288 1.2 bouyer // DDD printf("do_hypervisor_callback\n");
289 1.2 bouyer
290 1.2 bouyer #ifdef EARLY_DEBUG_EVENT
291 1.2 bouyer if (xen_atomic_test_bit(&s->evtchn_pending[0], debug_port)) {
292 1.2 bouyer xen_debug_handler(NULL);
293 1.2 bouyer xen_atomic_clear_bit(&s->evtchn_pending[0], debug_port);
294 1.2 bouyer }
295 1.2 bouyer #endif
296 1.2 bouyer
297 1.8 cegger while (vci->evtchn_upcall_pending) {
298 1.8 cegger vci->evtchn_upcall_pending = 0;
299 1.2 bouyer
300 1.27 bouyer evt_iterate_bits(&vci->evtchn_pending_sel,
301 1.15 cherry s->evtchn_pending, s->evtchn_mask,
302 1.15 cherry evt_do_hypervisor_callback, regs);
303 1.2 bouyer }
304 1.2 bouyer
305 1.2 bouyer #ifdef DIAGNOSTIC
306 1.2 bouyer if (level != ci->ci_ilevel)
307 1.45 knakahar printf("hypervisor done %08x level %" PRIu64 "/%" PRIu64 " ipending %0" PRIx64 "\n",
308 1.8 cegger (uint)vci->evtchn_pending_sel,
309 1.45 knakahar level, (uint64_t)ci->ci_ilevel, (uint64_t)ci->ci_ipending);
310 1.2 bouyer #endif
311 1.2 bouyer }
312 1.2 bouyer
313 1.38 bouyer #if 0
314 1.2 bouyer void
315 1.17 cherry hypervisor_send_event(struct cpu_info *ci, unsigned int ev)
316 1.17 cherry {
317 1.17 cherry KASSERT(ci != NULL);
318 1.17 cherry
319 1.17 cherry volatile shared_info_t *s = HYPERVISOR_shared_info;
320 1.17 cherry volatile struct vcpu_info *vci = ci->ci_vcpu;
321 1.17 cherry
322 1.17 cherry #ifdef PORT_DEBUG
323 1.17 cherry if (ev == PORT_DEBUG)
324 1.17 cherry printf("hypervisor_send_event %d\n", ev);
325 1.17 cherry #endif
326 1.17 cherry
327 1.17 cherry xen_atomic_set_bit(&s->evtchn_pending[0], ev);
328 1.17 cherry
329 1.21 cherry if (__predict_false(ci == curcpu())) {
330 1.20 cherry xen_atomic_set_bit(&vci->evtchn_pending_sel,
331 1.20 cherry ev >> LONG_SHIFT);
332 1.20 cherry xen_atomic_set_bit(&vci->evtchn_upcall_pending, 0);
333 1.20 cherry }
334 1.17 cherry
335 1.17 cherry xen_atomic_clear_bit(&s->evtchn_mask[0], ev);
336 1.17 cherry
337 1.17 cherry if (__predict_true(ci == curcpu())) {
338 1.17 cherry hypervisor_force_callback();
339 1.17 cherry } else {
340 1.18 bouyer if (__predict_false(xen_send_ipi(ci, XEN_IPI_HVCB))) {
341 1.38 bouyer panic("xen_send_ipi(cpu%d id %d, XEN_IPI_HVCB) failed\n",
342 1.38 bouyer (int) ci->ci_cpuid, ci->ci_vcpuid);
343 1.17 cherry }
344 1.17 cherry }
345 1.17 cherry }
346 1.38 bouyer #endif
347 1.17 cherry
348 1.17 cherry void
349 1.2 bouyer hypervisor_unmask_event(unsigned int ev)
350 1.2 bouyer {
351 1.30 cherry
352 1.30 cherry KASSERT(ev > 0 && ev < NR_EVENT_CHANNELS);
353 1.8 cegger
354 1.2 bouyer #ifdef PORT_DEBUG
355 1.2 bouyer if (ev == PORT_DEBUG)
356 1.2 bouyer printf("hypervisor_unmask_event %d\n", ev);
357 1.2 bouyer #endif
358 1.2 bouyer
359 1.30 cherry /* Xen unmasks the evtchn_mask[0]:ev bit for us. */
360 1.30 cherry evtchn_op_t op;
361 1.30 cherry op.cmd = EVTCHNOP_unmask;
362 1.30 cherry op.u.unmask.port = ev;
363 1.30 cherry if (HYPERVISOR_event_channel_op(&op) != 0)
364 1.30 cherry panic("Failed to unmask event %d\n", ev);
365 1.18 bouyer
366 1.30 cherry return;
367 1.2 bouyer }
368 1.2 bouyer
369 1.2 bouyer void
370 1.2 bouyer hypervisor_mask_event(unsigned int ev)
371 1.2 bouyer {
372 1.2 bouyer volatile shared_info_t *s = HYPERVISOR_shared_info;
373 1.2 bouyer #ifdef PORT_DEBUG
374 1.2 bouyer if (ev == PORT_DEBUG)
375 1.2 bouyer printf("hypervisor_mask_event %d\n", ev);
376 1.2 bouyer #endif
377 1.2 bouyer
378 1.2 bouyer xen_atomic_set_bit(&s->evtchn_mask[0], ev);
379 1.2 bouyer }
380 1.2 bouyer
381 1.2 bouyer void
382 1.2 bouyer hypervisor_clear_event(unsigned int ev)
383 1.2 bouyer {
384 1.2 bouyer volatile shared_info_t *s = HYPERVISOR_shared_info;
385 1.2 bouyer #ifdef PORT_DEBUG
386 1.2 bouyer if (ev == PORT_DEBUG)
387 1.2 bouyer printf("hypervisor_clear_event %d\n", ev);
388 1.2 bouyer #endif
389 1.2 bouyer
390 1.2 bouyer xen_atomic_clear_bit(&s->evtchn_pending[0], ev);
391 1.2 bouyer }
392 1.2 bouyer
393 1.15 cherry static inline void
394 1.27 bouyer evt_enable_event(unsigned int port, unsigned int l1i,
395 1.27 bouyer unsigned int l2i, void *args)
396 1.15 cherry {
397 1.15 cherry KASSERT(args == NULL);
398 1.29 cherry hypervisor_unmask_event(port);
399 1.40 bouyer #if defined(XENPV) && (NPCI > 0 || NISA > 0)
400 1.40 bouyer hypervisor_ack_pirq_event(port);
401 1.40 bouyer #endif /* NPCI > 0 || NISA > 0 */
402 1.15 cherry }
403 1.15 cherry
404 1.2 bouyer void
405 1.38 bouyer hypervisor_enable_sir(unsigned int sir)
406 1.2 bouyer {
407 1.2 bouyer struct cpu_info *ci = curcpu();
408 1.2 bouyer
409 1.2 bouyer /*
410 1.2 bouyer * enable all events for ipl. As we only set an event in ipl_evt_mask
411 1.2 bouyer * for its lowest IPL, and pending IPLs are processed high to low,
412 1.2 bouyer * we know that all callback for this event have been processed.
413 1.2 bouyer */
414 1.2 bouyer
415 1.38 bouyer evt_iterate_bits(&ci->ci_isources[sir]->ipl_evt_mask1,
416 1.38 bouyer ci->ci_isources[sir]->ipl_evt_mask2, NULL,
417 1.15 cherry evt_enable_event, NULL);
418 1.2 bouyer
419 1.2 bouyer }
420 1.2 bouyer
421 1.2 bouyer void
422 1.45 knakahar hypervisor_set_ipending(uint64_t imask, int l1, int l2)
423 1.2 bouyer {
424 1.27 bouyer
425 1.27 bouyer /* This function is not re-entrant */
426 1.27 bouyer KASSERT(x86_read_psl() != 0);
427 1.27 bouyer
428 1.38 bouyer int sir;
429 1.27 bouyer struct cpu_info *ci = curcpu();
430 1.2 bouyer
431 1.2 bouyer /* set pending bit for the appropriate IPLs */
432 1.38 bouyer ci->ci_ipending |= imask;
433 1.2 bouyer
434 1.2 bouyer /*
435 1.2 bouyer * And set event pending bit for the lowest IPL. As IPL are handled
436 1.2 bouyer * from high to low, this ensure that all callbacks will have been
437 1.2 bouyer * called when we ack the event
438 1.2 bouyer */
439 1.38 bouyer sir = ffs(imask);
440 1.38 bouyer KASSERT(sir > SIR_XENIPL_VM);
441 1.38 bouyer sir--;
442 1.38 bouyer KASSERT(sir <= SIR_XENIPL_HIGH);
443 1.38 bouyer KASSERT(ci->ci_isources[sir] != NULL);
444 1.38 bouyer ci->ci_isources[sir]->ipl_evt_mask1 |= 1UL << l1;
445 1.38 bouyer ci->ci_isources[sir]->ipl_evt_mask2[l1] |= 1UL << l2;
446 1.38 bouyer KASSERT(ci == curcpu());
447 1.38 bouyer #if 0
448 1.25 bouyer if (__predict_false(ci != curcpu())) {
449 1.25 bouyer if (xen_send_ipi(ci, XEN_IPI_HVCB)) {
450 1.25 bouyer panic("hypervisor_set_ipending: "
451 1.38 bouyer "xen_send_ipi(cpu%d id %d, XEN_IPI_HVCB) failed\n",
452 1.38 bouyer (int) ci->ci_cpuid, ci->ci_vcpuid);
453 1.25 bouyer }
454 1.25 bouyer }
455 1.38 bouyer #endif
456 1.2 bouyer }
457 1.10 bouyer
458 1.10 bouyer void
459 1.12 cegger hypervisor_machdep_attach(void)
460 1.12 cegger {
461 1.35 cherry #ifdef XENPV
462 1.10 bouyer /* dom0 does not require the arch-dependent P2M translation table */
463 1.16 jym if (!xendomain_is_dom0()) {
464 1.10 bouyer build_p2m_frame_list_list();
465 1.16 jym sysctl_xen_suspend_setup();
466 1.10 bouyer }
467 1.35 cherry #endif
468 1.10 bouyer }
469 1.10 bouyer
470 1.16 jym void
471 1.16 jym hypervisor_machdep_resume(void)
472 1.16 jym {
473 1.35 cherry #ifdef XENPV
474 1.16 jym /* dom0 does not require the arch-dependent P2M translation table */
475 1.16 jym if (!xendomain_is_dom0())
476 1.16 jym update_p2m_frame_list_list();
477 1.35 cherry #endif
478 1.16 jym }
479 1.16 jym
480 1.38 bouyer /*
481 1.38 bouyer * idle_block()
482 1.38 bouyer *
483 1.38 bouyer * Called from the idle loop when we have nothing to do but wait
484 1.38 bouyer * for an interrupt.
485 1.38 bouyer */
486 1.38 bouyer static void
487 1.38 bouyer idle_block(void)
488 1.38 bouyer {
489 1.38 bouyer KASSERT(curcpu()->ci_ipending == 0);
490 1.38 bouyer HYPERVISOR_block();
491 1.38 bouyer KASSERT(curcpu()->ci_ipending == 0);
492 1.38 bouyer }
493 1.38 bouyer
494 1.38 bouyer void
495 1.38 bouyer x86_cpu_idle_xen(void)
496 1.38 bouyer {
497 1.38 bouyer struct cpu_info *ci = curcpu();
498 1.38 bouyer
499 1.38 bouyer KASSERT(ci->ci_ilevel == IPL_NONE);
500 1.38 bouyer
501 1.38 bouyer x86_disable_intr();
502 1.38 bouyer if (__predict_false(!ci->ci_want_resched)) {
503 1.38 bouyer idle_block();
504 1.38 bouyer } else {
505 1.38 bouyer x86_enable_intr();
506 1.38 bouyer }
507 1.38 bouyer }
508 1.38 bouyer
509 1.35 cherry #ifdef XENPV
510 1.10 bouyer /*
511 1.10 bouyer * Generate the p2m_frame_list_list table,
512 1.10 bouyer * needed for guest save/restore
513 1.10 bouyer */
514 1.10 bouyer static void
515 1.12 cegger build_p2m_frame_list_list(void)
516 1.12 cegger {
517 1.10 bouyer int fpp; /* number of page (frame) pointer per page */
518 1.10 bouyer unsigned long max_pfn;
519 1.10 bouyer /*
520 1.10 bouyer * The p2m list is composed of three levels of indirection,
521 1.10 bouyer * each layer containing MFNs pointing to lower level pages
522 1.10 bouyer * The indirection is used to convert a given PFN to its MFN
523 1.10 bouyer * Each N level page can point to @fpp (N-1) level pages
524 1.10 bouyer * For example, for x86 32bit, we have:
525 1.10 bouyer * - PAGE_SIZE: 4096 bytes
526 1.10 bouyer * - fpp: 1024 (one L3 page can address 1024 L2 pages)
527 1.10 bouyer * A L1 page contains the list of MFN we are looking for
528 1.10 bouyer */
529 1.10 bouyer max_pfn = xen_start_info.nr_pages;
530 1.14 jym fpp = PAGE_SIZE / sizeof(xen_pfn_t);
531 1.10 bouyer
532 1.10 bouyer /* we only need one L3 page */
533 1.14 jym l3_p2m_page = (vaddr_t *)uvm_km_alloc(kernel_map, PAGE_SIZE,
534 1.14 jym PAGE_SIZE, UVM_KMF_WIRED | UVM_KMF_NOWAIT);
535 1.10 bouyer if (l3_p2m_page == NULL)
536 1.10 bouyer panic("could not allocate memory for l3_p2m_page");
537 1.10 bouyer
538 1.10 bouyer /*
539 1.10 bouyer * Determine how many L2 pages we need for the mapping
540 1.10 bouyer * Each L2 can map a total of @fpp L1 pages
541 1.10 bouyer */
542 1.10 bouyer l2_p2m_page_size = howmany(max_pfn, fpp);
543 1.10 bouyer
544 1.14 jym l2_p2m_page = (vaddr_t *)uvm_km_alloc(kernel_map,
545 1.14 jym l2_p2m_page_size * PAGE_SIZE,
546 1.14 jym PAGE_SIZE, UVM_KMF_WIRED | UVM_KMF_NOWAIT);
547 1.10 bouyer if (l2_p2m_page == NULL)
548 1.10 bouyer panic("could not allocate memory for l2_p2m_page");
549 1.10 bouyer
550 1.10 bouyer /* We now have L3 and L2 pages ready, update L1 mapping */
551 1.10 bouyer update_p2m_frame_list_list();
552 1.10 bouyer
553 1.10 bouyer }
554 1.10 bouyer
555 1.10 bouyer /*
556 1.10 bouyer * Update the L1 p2m_frame_list_list mapping (during guest boot or resume)
557 1.10 bouyer */
558 1.10 bouyer static void
559 1.12 cegger update_p2m_frame_list_list(void)
560 1.12 cegger {
561 1.10 bouyer int i;
562 1.10 bouyer int fpp; /* number of page (frame) pointer per page */
563 1.10 bouyer unsigned long max_pfn;
564 1.10 bouyer
565 1.10 bouyer max_pfn = xen_start_info.nr_pages;
566 1.14 jym fpp = PAGE_SIZE / sizeof(xen_pfn_t);
567 1.10 bouyer
568 1.10 bouyer for (i = 0; i < l2_p2m_page_size; i++) {
569 1.10 bouyer /*
570 1.10 bouyer * Each time we start a new L2 page,
571 1.10 bouyer * store its MFN in the L3 page
572 1.10 bouyer */
573 1.10 bouyer if ((i % fpp) == 0) {
574 1.10 bouyer l3_p2m_page[i/fpp] = vtomfn(
575 1.10 bouyer (vaddr_t)&l2_p2m_page[i]);
576 1.10 bouyer }
577 1.10 bouyer /*
578 1.10 bouyer * we use a shortcut
579 1.10 bouyer * since @xpmap_phys_to_machine_mapping array
580 1.10 bouyer * already contains PFN to MFN mapping, we just
581 1.10 bouyer * set the l2_p2m_page MFN pointer to the MFN of the
582 1.10 bouyer * according frame of @xpmap_phys_to_machine_mapping
583 1.10 bouyer */
584 1.10 bouyer l2_p2m_page[i] = vtomfn((vaddr_t)
585 1.10 bouyer &xpmap_phys_to_machine_mapping[i*fpp]);
586 1.10 bouyer }
587 1.10 bouyer
588 1.10 bouyer HYPERVISOR_shared_info->arch.pfn_to_mfn_frame_list_list =
589 1.10 bouyer vtomfn((vaddr_t)l3_p2m_page);
590 1.10 bouyer HYPERVISOR_shared_info->arch.max_pfn = max_pfn;
591 1.10 bouyer
592 1.10 bouyer }
593 1.35 cherry #endif /* XENPV */
594 1.39 bouyer
595 1.39 bouyer void
596 1.39 bouyer xen_init_ksyms(void)
597 1.39 bouyer {
598 1.39 bouyer #if NKSYMS || defined(DDB) || defined(MODULAR)
599 1.39 bouyer extern int end;
600 1.39 bouyer extern int *esym;
601 1.39 bouyer #ifdef DDB
602 1.39 bouyer db_machine_init();
603 1.39 bouyer #endif
604 1.39 bouyer
605 1.39 bouyer #ifdef XENPV
606 1.39 bouyer esym = xen_start_info.mod_start ?
607 1.39 bouyer (void *)xen_start_info.mod_start :
608 1.39 bouyer (void *)xen_start_info.mfn_list;
609 1.39 bouyer #endif /* XENPV */
610 1.39 bouyer /* for PVH, esym is set in locore.S */
611 1.39 bouyer ksyms_addsyms_elf(*(int *)(void *)&end,
612 1.39 bouyer ((int *)(void *)&end) + 1, esym);
613 1.39 bouyer #endif
614 1.39 bouyer }
615