x86_xpmap.c revision 1.1.4.1 1 1.1.4.1 mjf /* $NetBSD: x86_xpmap.c,v 1.1.4.1 2007/12/08 18:18:24 mjf Exp $ */
2 1.1.4.1 mjf
3 1.1.4.1 mjf /*
4 1.1.4.1 mjf * Copyright (c) 2006 Mathieu Ropert <mro (at) adviseo.fr>
5 1.1.4.1 mjf *
6 1.1.4.1 mjf * Permission to use, copy, modify, and distribute this software for any
7 1.1.4.1 mjf * purpose with or without fee is hereby granted, provided that the above
8 1.1.4.1 mjf * copyright notice and this permission notice appear in all copies.
9 1.1.4.1 mjf *
10 1.1.4.1 mjf * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 1.1.4.1 mjf * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 1.1.4.1 mjf * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 1.1.4.1 mjf * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 1.1.4.1 mjf * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 1.1.4.1 mjf * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 1.1.4.1 mjf * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 1.1.4.1 mjf */
18 1.1.4.1 mjf
19 1.1.4.1 mjf /*
20 1.1.4.1 mjf * Copyright (c) 2006, 2007 Manuel Bouyer.
21 1.1.4.1 mjf *
22 1.1.4.1 mjf * Redistribution and use in source and binary forms, with or without
23 1.1.4.1 mjf * modification, are permitted provided that the following conditions
24 1.1.4.1 mjf * are met:
25 1.1.4.1 mjf * 1. Redistributions of source code must retain the above copyright
26 1.1.4.1 mjf * notice, this list of conditions and the following disclaimer.
27 1.1.4.1 mjf * 2. Redistributions in binary form must reproduce the above copyright
28 1.1.4.1 mjf * notice, this list of conditions and the following disclaimer in the
29 1.1.4.1 mjf * documentation and/or other materials provided with the distribution.
30 1.1.4.1 mjf * 3. All advertising materials mentioning features or use of this software
31 1.1.4.1 mjf * must display the following acknowledgement:
32 1.1.4.1 mjf * This product includes software developed by Manuel Bouyer.
33 1.1.4.1 mjf * 4. The name of the author may not be used to endorse or promote products
34 1.1.4.1 mjf * derived from this software without specific prior written permission.
35 1.1.4.1 mjf *
36 1.1.4.1 mjf * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
37 1.1.4.1 mjf * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
38 1.1.4.1 mjf * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
39 1.1.4.1 mjf * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
40 1.1.4.1 mjf * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
41 1.1.4.1 mjf * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
42 1.1.4.1 mjf * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
43 1.1.4.1 mjf * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
44 1.1.4.1 mjf * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
45 1.1.4.1 mjf * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
46 1.1.4.1 mjf *
47 1.1.4.1 mjf */
48 1.1.4.1 mjf
49 1.1.4.1 mjf /*
50 1.1.4.1 mjf *
51 1.1.4.1 mjf * Copyright (c) 2004 Christian Limpach.
52 1.1.4.1 mjf * All rights reserved.
53 1.1.4.1 mjf *
54 1.1.4.1 mjf * Redistribution and use in source and binary forms, with or without
55 1.1.4.1 mjf * modification, are permitted provided that the following conditions
56 1.1.4.1 mjf * are met:
57 1.1.4.1 mjf * 1. Redistributions of source code must retain the above copyright
58 1.1.4.1 mjf * notice, this list of conditions and the following disclaimer.
59 1.1.4.1 mjf * 2. Redistributions in binary form must reproduce the above copyright
60 1.1.4.1 mjf * notice, this list of conditions and the following disclaimer in the
61 1.1.4.1 mjf * documentation and/or other materials provided with the distribution.
62 1.1.4.1 mjf * 3. All advertising materials mentioning features or use of this software
63 1.1.4.1 mjf * must display the following acknowledgement:
64 1.1.4.1 mjf * This product includes software developed by Christian Limpach.
65 1.1.4.1 mjf * 4. The name of the author may not be used to endorse or promote products
66 1.1.4.1 mjf * derived from this software without specific prior written permission.
67 1.1.4.1 mjf *
68 1.1.4.1 mjf * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
69 1.1.4.1 mjf * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
70 1.1.4.1 mjf * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
71 1.1.4.1 mjf * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
72 1.1.4.1 mjf * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
73 1.1.4.1 mjf * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
74 1.1.4.1 mjf * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
75 1.1.4.1 mjf * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
76 1.1.4.1 mjf * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
77 1.1.4.1 mjf * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
78 1.1.4.1 mjf */
79 1.1.4.1 mjf
80 1.1.4.1 mjf
81 1.1.4.1 mjf #include <sys/cdefs.h>
82 1.1.4.1 mjf __KERNEL_RCSID(0, "$NetBSD: x86_xpmap.c,v 1.1.4.1 2007/12/08 18:18:24 mjf Exp $");
83 1.1.4.1 mjf
84 1.1.4.1 mjf #include "opt_xen.h"
85 1.1.4.1 mjf
86 1.1.4.1 mjf #include <sys/param.h>
87 1.1.4.1 mjf #include <sys/systm.h>
88 1.1.4.1 mjf
89 1.1.4.1 mjf #include <uvm/uvm.h>
90 1.1.4.1 mjf
91 1.1.4.1 mjf #include <machine/pmap.h>
92 1.1.4.1 mjf #include <machine/gdt.h>
93 1.1.4.1 mjf #include <xen/xenfunc.h>
94 1.1.4.1 mjf
95 1.1.4.1 mjf #include <dev/isa/isareg.h>
96 1.1.4.1 mjf #include <machine/isa_machdep.h>
97 1.1.4.1 mjf
98 1.1.4.1 mjf #undef XENDEBUG
99 1.1.4.1 mjf /* #define XENDEBUG_SYNC */
100 1.1.4.1 mjf /* #define XENDEBUG_LOW */
101 1.1.4.1 mjf
102 1.1.4.1 mjf #ifdef XENDEBUG
103 1.1.4.1 mjf #define XENPRINTF(x) printf x
104 1.1.4.1 mjf #define XENPRINTK(x) printk x
105 1.1.4.1 mjf #define XENPRINTK2(x) /* printk x */
106 1.1.4.1 mjf
107 1.1.4.1 mjf static char XBUF[256];
108 1.1.4.1 mjf #else
109 1.1.4.1 mjf #define XENPRINTF(x)
110 1.1.4.1 mjf #define XENPRINTK(x)
111 1.1.4.1 mjf #define XENPRINTK2(x)
112 1.1.4.1 mjf #endif
113 1.1.4.1 mjf #define PRINTF(x) printf x
114 1.1.4.1 mjf #define PRINTK(x) printk x
115 1.1.4.1 mjf
116 1.1.4.1 mjf volatile shared_info_t *HYPERVISOR_shared_info;
117 1.1.4.1 mjf union start_info_union start_info_union;
118 1.1.4.1 mjf
119 1.1.4.1 mjf void xen_failsafe_handler(void);
120 1.1.4.1 mjf
121 1.1.4.1 mjf #ifdef XEN3
122 1.1.4.1 mjf #define HYPERVISOR_mmu_update_self(req, count, success_count) \
123 1.1.4.1 mjf HYPERVISOR_mmu_update((req), (count), (success_count), DOMID_SELF)
124 1.1.4.1 mjf #else
125 1.1.4.1 mjf #define HYPERVISOR_mmu_update_self(req, count, success_count) \
126 1.1.4.1 mjf HYPERVISOR_mmu_update((req), (count), (success_count))
127 1.1.4.1 mjf #endif
128 1.1.4.1 mjf
129 1.1.4.1 mjf void
130 1.1.4.1 mjf xen_failsafe_handler(void)
131 1.1.4.1 mjf {
132 1.1.4.1 mjf
133 1.1.4.1 mjf panic("xen_failsafe_handler called!\n");
134 1.1.4.1 mjf }
135 1.1.4.1 mjf
136 1.1.4.1 mjf
137 1.1.4.1 mjf #ifndef __x86_64__
138 1.1.4.1 mjf void
139 1.1.4.1 mjf xen_update_descriptor(union descriptor *table, union descriptor *entry)
140 1.1.4.1 mjf {
141 1.1.4.1 mjf paddr_t pa;
142 1.1.4.1 mjf pt_entry_t *ptp;
143 1.1.4.1 mjf
144 1.1.4.1 mjf ptp = kvtopte((vaddr_t)table);
145 1.1.4.1 mjf pa = (*ptp & PG_FRAME) | ((vaddr_t)table & ~PG_FRAME);
146 1.1.4.1 mjf if (HYPERVISOR_update_descriptor(pa, entry->raw[0], entry->raw[1]))
147 1.1.4.1 mjf panic("HYPERVISOR_update_descriptor failed\n");
148 1.1.4.1 mjf }
149 1.1.4.1 mjf #endif
150 1.1.4.1 mjf
151 1.1.4.1 mjf void
152 1.1.4.1 mjf xen_set_ldt(vaddr_t base, uint32_t entries)
153 1.1.4.1 mjf {
154 1.1.4.1 mjf vaddr_t va;
155 1.1.4.1 mjf vaddr_t end;
156 1.1.4.1 mjf pt_entry_t *ptp, *maptp;
157 1.1.4.1 mjf int s;
158 1.1.4.1 mjf
159 1.1.4.1 mjf #ifdef __x86_64__
160 1.1.4.1 mjf end = base + (entries << 3);
161 1.1.4.1 mjf #else
162 1.1.4.1 mjf end = base + entries * sizeof(union descriptor);
163 1.1.4.1 mjf #endif
164 1.1.4.1 mjf
165 1.1.4.1 mjf for (va = base; va < end; va += PAGE_SIZE) {
166 1.1.4.1 mjf KASSERT(va >= VM_MIN_KERNEL_ADDRESS);
167 1.1.4.1 mjf ptp = kvtopte(va);
168 1.1.4.1 mjf maptp = (pt_entry_t *)vtomach((vaddr_t)ptp);
169 1.1.4.1 mjf XENPRINTF(("xen_set_ldt %p %d %p %p\n", (void *)base,
170 1.1.4.1 mjf entries, ptp, maptp));
171 1.1.4.1 mjf PTE_CLEARBITS(ptp, maptp, PG_RW);
172 1.1.4.1 mjf }
173 1.1.4.1 mjf s = splvm();
174 1.1.4.1 mjf PTE_UPDATES_FLUSH();
175 1.1.4.1 mjf
176 1.1.4.1 mjf xpq_queue_set_ldt(base, entries);
177 1.1.4.1 mjf xpq_flush_queue();
178 1.1.4.1 mjf splx(s);
179 1.1.4.1 mjf }
180 1.1.4.1 mjf
181 1.1.4.1 mjf #ifdef XENDEBUG
182 1.1.4.1 mjf void xpq_debug_dump(void);
183 1.1.4.1 mjf #endif
184 1.1.4.1 mjf
185 1.1.4.1 mjf #define XPQUEUE_SIZE 2048
186 1.1.4.1 mjf static mmu_update_t xpq_queue[XPQUEUE_SIZE];
187 1.1.4.1 mjf static int xpq_idx = 0;
188 1.1.4.1 mjf
189 1.1.4.1 mjf void
190 1.1.4.1 mjf xpq_flush_queue()
191 1.1.4.1 mjf {
192 1.1.4.1 mjf int i, ok;
193 1.1.4.1 mjf
194 1.1.4.1 mjf XENPRINTK2(("flush queue %p entries %d\n", xpq_queue, xpq_idx));
195 1.1.4.1 mjf for (i = 0; i < xpq_idx; i++)
196 1.1.4.1 mjf XENPRINTK2(("%d: %p %08x\n", i, (u_int)xpq_queue[i].ptr,
197 1.1.4.1 mjf (u_int)xpq_queue[i].val));
198 1.1.4.1 mjf if (xpq_idx != 0 &&
199 1.1.4.1 mjf HYPERVISOR_mmu_update_self(xpq_queue, xpq_idx, &ok) < 0) {
200 1.1.4.1 mjf printf("xpq_flush_queue: %d entries \n", xpq_idx);
201 1.1.4.1 mjf for (i = 0; i < xpq_idx; i++)
202 1.1.4.1 mjf printf("0x%016" PRIx64 ": 0x%016" PRIx64 "\n",
203 1.1.4.1 mjf (u_int64_t)xpq_queue[i].ptr,
204 1.1.4.1 mjf (u_int64_t)xpq_queue[i].val);
205 1.1.4.1 mjf panic("HYPERVISOR_mmu_update failed\n");
206 1.1.4.1 mjf }
207 1.1.4.1 mjf xpq_idx = 0;
208 1.1.4.1 mjf }
209 1.1.4.1 mjf
210 1.1.4.1 mjf static inline void
211 1.1.4.1 mjf xpq_increment_idx(void)
212 1.1.4.1 mjf {
213 1.1.4.1 mjf
214 1.1.4.1 mjf xpq_idx++;
215 1.1.4.1 mjf if (__predict_false(xpq_idx == XPQUEUE_SIZE))
216 1.1.4.1 mjf xpq_flush_queue();
217 1.1.4.1 mjf }
218 1.1.4.1 mjf
219 1.1.4.1 mjf void
220 1.1.4.1 mjf xpq_queue_machphys_update(paddr_t ma, paddr_t pa)
221 1.1.4.1 mjf {
222 1.1.4.1 mjf XENPRINTK2(("xpq_queue_machphys_update ma=%p pa=%p\n", (void *)ma, (void *)pa));
223 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = ma | MMU_MACHPHYS_UPDATE;
224 1.1.4.1 mjf xpq_queue[xpq_idx].val = (pa - XPMAP_OFFSET) >> PAGE_SHIFT;
225 1.1.4.1 mjf xpq_increment_idx();
226 1.1.4.1 mjf #ifdef XENDEBUG_SYNC
227 1.1.4.1 mjf xpq_flush_queue();
228 1.1.4.1 mjf #endif
229 1.1.4.1 mjf }
230 1.1.4.1 mjf
231 1.1.4.1 mjf void
232 1.1.4.1 mjf xpq_queue_pde_update(pd_entry_t *ptr, pd_entry_t val)
233 1.1.4.1 mjf {
234 1.1.4.1 mjf
235 1.1.4.1 mjf KASSERT(((paddr_t)ptr & 3) == 0);
236 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = (paddr_t)ptr | MMU_NORMAL_PT_UPDATE;
237 1.1.4.1 mjf xpq_queue[xpq_idx].val = val;
238 1.1.4.1 mjf xpq_increment_idx();
239 1.1.4.1 mjf #ifdef XENDEBUG_SYNC
240 1.1.4.1 mjf xpq_flush_queue();
241 1.1.4.1 mjf #endif
242 1.1.4.1 mjf }
243 1.1.4.1 mjf
244 1.1.4.1 mjf void
245 1.1.4.1 mjf xpq_queue_pte_update(pt_entry_t *ptr, pt_entry_t val)
246 1.1.4.1 mjf {
247 1.1.4.1 mjf
248 1.1.4.1 mjf KASSERT(((paddr_t)ptr & 3) == 0);
249 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = (paddr_t)ptr | MMU_NORMAL_PT_UPDATE;
250 1.1.4.1 mjf xpq_queue[xpq_idx].val = val;
251 1.1.4.1 mjf xpq_increment_idx();
252 1.1.4.1 mjf #ifdef XENDEBUG_SYNC
253 1.1.4.1 mjf xpq_flush_queue();
254 1.1.4.1 mjf #endif
255 1.1.4.1 mjf }
256 1.1.4.1 mjf
257 1.1.4.1 mjf #ifdef XEN3
258 1.1.4.1 mjf void
259 1.1.4.1 mjf xpq_queue_pt_switch(paddr_t pa)
260 1.1.4.1 mjf {
261 1.1.4.1 mjf struct mmuext_op op;
262 1.1.4.1 mjf xpq_flush_queue();
263 1.1.4.1 mjf
264 1.1.4.1 mjf XENPRINTK2(("xpq_queue_pt_switch: %p %p\n", (void *)pa, (void *)pa));
265 1.1.4.1 mjf op.cmd = MMUEXT_NEW_BASEPTR;
266 1.1.4.1 mjf op.arg1.mfn = pa >> PAGE_SHIFT;
267 1.1.4.1 mjf if (HYPERVISOR_mmuext_op(&op, 1, NULL, DOMID_SELF) < 0)
268 1.1.4.1 mjf panic("xpq_queue_pt_switch");
269 1.1.4.1 mjf }
270 1.1.4.1 mjf
271 1.1.4.1 mjf void
272 1.1.4.1 mjf xpq_queue_pin_table(paddr_t pa)
273 1.1.4.1 mjf {
274 1.1.4.1 mjf struct mmuext_op op;
275 1.1.4.1 mjf xpq_flush_queue();
276 1.1.4.1 mjf
277 1.1.4.1 mjf XENPRINTK2(("xpq_queue_pin_table: %p %p\n", (void *)pa, (void *)pa));
278 1.1.4.1 mjf op.arg1.mfn = pa >> PAGE_SHIFT;
279 1.1.4.1 mjf
280 1.1.4.1 mjf #ifdef __x86_64__
281 1.1.4.1 mjf op.cmd = MMUEXT_PIN_L4_TABLE;
282 1.1.4.1 mjf #else
283 1.1.4.1 mjf op.cmd = MMUEXT_PIN_L2_TABLE;
284 1.1.4.1 mjf #endif
285 1.1.4.1 mjf if (HYPERVISOR_mmuext_op(&op, 1, NULL, DOMID_SELF) < 0)
286 1.1.4.1 mjf panic("xpq_queue_pin_table");
287 1.1.4.1 mjf }
288 1.1.4.1 mjf
289 1.1.4.1 mjf void
290 1.1.4.1 mjf xpq_queue_unpin_table(paddr_t pa)
291 1.1.4.1 mjf {
292 1.1.4.1 mjf struct mmuext_op op;
293 1.1.4.1 mjf xpq_flush_queue();
294 1.1.4.1 mjf
295 1.1.4.1 mjf XENPRINTK2(("xpq_queue_unpin_table: %p %p\n", (void *)pa, (void *)pa));
296 1.1.4.1 mjf op.arg1.mfn = pa >> PAGE_SHIFT;
297 1.1.4.1 mjf op.cmd = MMUEXT_UNPIN_TABLE;
298 1.1.4.1 mjf if (HYPERVISOR_mmuext_op(&op, 1, NULL, DOMID_SELF) < 0)
299 1.1.4.1 mjf panic("xpq_queue_unpin_table");
300 1.1.4.1 mjf }
301 1.1.4.1 mjf
302 1.1.4.1 mjf void
303 1.1.4.1 mjf xpq_queue_set_ldt(vaddr_t va, uint32_t entries)
304 1.1.4.1 mjf {
305 1.1.4.1 mjf struct mmuext_op op;
306 1.1.4.1 mjf xpq_flush_queue();
307 1.1.4.1 mjf
308 1.1.4.1 mjf XENPRINTK2(("xpq_queue_set_ldt\n"));
309 1.1.4.1 mjf KASSERT(va == (va & ~PAGE_MASK));
310 1.1.4.1 mjf op.cmd = MMUEXT_SET_LDT;
311 1.1.4.1 mjf op.arg1.linear_addr = va;
312 1.1.4.1 mjf op.arg2.nr_ents = entries;
313 1.1.4.1 mjf if (HYPERVISOR_mmuext_op(&op, 1, NULL, DOMID_SELF) < 0)
314 1.1.4.1 mjf panic("xpq_queue_set_ldt");
315 1.1.4.1 mjf }
316 1.1.4.1 mjf
317 1.1.4.1 mjf void
318 1.1.4.1 mjf xpq_queue_tlb_flush()
319 1.1.4.1 mjf {
320 1.1.4.1 mjf struct mmuext_op op;
321 1.1.4.1 mjf xpq_flush_queue();
322 1.1.4.1 mjf
323 1.1.4.1 mjf XENPRINTK2(("xpq_queue_tlb_flush\n"));
324 1.1.4.1 mjf op.cmd = MMUEXT_TLB_FLUSH_LOCAL;
325 1.1.4.1 mjf if (HYPERVISOR_mmuext_op(&op, 1, NULL, DOMID_SELF) < 0)
326 1.1.4.1 mjf panic("xpq_queue_tlb_flush");
327 1.1.4.1 mjf }
328 1.1.4.1 mjf
329 1.1.4.1 mjf void
330 1.1.4.1 mjf xpq_flush_cache()
331 1.1.4.1 mjf {
332 1.1.4.1 mjf struct mmuext_op op;
333 1.1.4.1 mjf int s = splvm();
334 1.1.4.1 mjf xpq_flush_queue();
335 1.1.4.1 mjf
336 1.1.4.1 mjf XENPRINTK2(("xpq_queue_flush_cache\n"));
337 1.1.4.1 mjf op.cmd = MMUEXT_FLUSH_CACHE;
338 1.1.4.1 mjf if (HYPERVISOR_mmuext_op(&op, 1, NULL, DOMID_SELF) < 0)
339 1.1.4.1 mjf panic("xpq_flush_cache");
340 1.1.4.1 mjf splx(s);
341 1.1.4.1 mjf }
342 1.1.4.1 mjf
343 1.1.4.1 mjf void
344 1.1.4.1 mjf xpq_queue_invlpg(vaddr_t va)
345 1.1.4.1 mjf {
346 1.1.4.1 mjf struct mmuext_op op;
347 1.1.4.1 mjf xpq_flush_queue();
348 1.1.4.1 mjf
349 1.1.4.1 mjf XENPRINTK2(("xpq_queue_invlpg %p\n", (void *)va));
350 1.1.4.1 mjf op.cmd = MMUEXT_INVLPG_LOCAL;
351 1.1.4.1 mjf op.arg1.linear_addr = (va & ~PAGE_MASK);
352 1.1.4.1 mjf if (HYPERVISOR_mmuext_op(&op, 1, NULL, DOMID_SELF) < 0)
353 1.1.4.1 mjf panic("xpq_queue_invlpg");
354 1.1.4.1 mjf }
355 1.1.4.1 mjf
356 1.1.4.1 mjf int
357 1.1.4.1 mjf xpq_update_foreign(pt_entry_t *ptr, pt_entry_t val, int dom)
358 1.1.4.1 mjf {
359 1.1.4.1 mjf mmu_update_t op;
360 1.1.4.1 mjf int ok;
361 1.1.4.1 mjf xpq_flush_queue();
362 1.1.4.1 mjf
363 1.1.4.1 mjf op.ptr = (paddr_t)ptr;
364 1.1.4.1 mjf op.val = val;
365 1.1.4.1 mjf if (HYPERVISOR_mmu_update(&op, 1, &ok, dom) < 0)
366 1.1.4.1 mjf return EFAULT;
367 1.1.4.1 mjf return (0);
368 1.1.4.1 mjf }
369 1.1.4.1 mjf #else /* XEN3 */
370 1.1.4.1 mjf void
371 1.1.4.1 mjf xpq_queue_pt_switch(paddr_t pa)
372 1.1.4.1 mjf {
373 1.1.4.1 mjf
374 1.1.4.1 mjf XENPRINTK2(("xpq_queue_pt_switch: %p %p\n", (void *)pa, (void *)pa));
375 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = pa | MMU_EXTENDED_COMMAND;
376 1.1.4.1 mjf xpq_queue[xpq_idx].val = MMUEXT_NEW_BASEPTR;
377 1.1.4.1 mjf xpq_increment_idx();
378 1.1.4.1 mjf }
379 1.1.4.1 mjf
380 1.1.4.1 mjf void
381 1.1.4.1 mjf xpq_queue_pin_table(paddr_t pa)
382 1.1.4.1 mjf {
383 1.1.4.1 mjf
384 1.1.4.1 mjf XENPRINTK2(("xpq_queue_pin_table: %p %p\n", (void *)pa, (void *)pa));
385 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = pa | MMU_EXTENDED_COMMAND;
386 1.1.4.1 mjf xpq_queue[xpq_idx].val = MMUEXT_PIN_L2_TABLE;
387 1.1.4.1 mjf xpq_increment_idx();
388 1.1.4.1 mjf }
389 1.1.4.1 mjf
390 1.1.4.1 mjf void
391 1.1.4.1 mjf xpq_queue_unpin_table(paddr_t pa)
392 1.1.4.1 mjf {
393 1.1.4.1 mjf
394 1.1.4.1 mjf XENPRINTK2(("xpq_queue_unpin_table: %p %p\n", (void *)pa, (void *)pa));
395 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = pa | MMU_EXTENDED_COMMAND;
396 1.1.4.1 mjf xpq_queue[xpq_idx].val = MMUEXT_UNPIN_TABLE;
397 1.1.4.1 mjf xpq_increment_idx();
398 1.1.4.1 mjf }
399 1.1.4.1 mjf
400 1.1.4.1 mjf void
401 1.1.4.1 mjf xpq_queue_set_ldt(vaddr_t va, uint32_t entries)
402 1.1.4.1 mjf {
403 1.1.4.1 mjf
404 1.1.4.1 mjf XENPRINTK2(("xpq_queue_set_ldt\n"));
405 1.1.4.1 mjf KASSERT(va == (va & ~PAGE_MASK));
406 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = MMU_EXTENDED_COMMAND | va;
407 1.1.4.1 mjf xpq_queue[xpq_idx].val = MMUEXT_SET_LDT | (entries << MMUEXT_CMD_SHIFT);
408 1.1.4.1 mjf xpq_increment_idx();
409 1.1.4.1 mjf }
410 1.1.4.1 mjf
411 1.1.4.1 mjf void
412 1.1.4.1 mjf xpq_queue_tlb_flush()
413 1.1.4.1 mjf {
414 1.1.4.1 mjf
415 1.1.4.1 mjf XENPRINTK2(("xpq_queue_tlb_flush\n"));
416 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = MMU_EXTENDED_COMMAND;
417 1.1.4.1 mjf xpq_queue[xpq_idx].val = MMUEXT_TLB_FLUSH;
418 1.1.4.1 mjf xpq_increment_idx();
419 1.1.4.1 mjf }
420 1.1.4.1 mjf
421 1.1.4.1 mjf void
422 1.1.4.1 mjf xpq_flush_cache()
423 1.1.4.1 mjf {
424 1.1.4.1 mjf int s = splvm();
425 1.1.4.1 mjf
426 1.1.4.1 mjf XENPRINTK2(("xpq_queue_flush_cache\n"));
427 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = MMU_EXTENDED_COMMAND;
428 1.1.4.1 mjf xpq_queue[xpq_idx].val = MMUEXT_FLUSH_CACHE;
429 1.1.4.1 mjf xpq_increment_idx();
430 1.1.4.1 mjf xpq_flush_queue();
431 1.1.4.1 mjf splx(s);
432 1.1.4.1 mjf }
433 1.1.4.1 mjf
434 1.1.4.1 mjf void
435 1.1.4.1 mjf xpq_queue_invlpg(vaddr_t va)
436 1.1.4.1 mjf {
437 1.1.4.1 mjf
438 1.1.4.1 mjf XENPRINTK2(("xpq_queue_invlpg %p\n", (void *)va));
439 1.1.4.1 mjf xpq_queue[xpq_idx].ptr = (va & ~PAGE_MASK) | MMU_EXTENDED_COMMAND;
440 1.1.4.1 mjf xpq_queue[xpq_idx].val = MMUEXT_INVLPG;
441 1.1.4.1 mjf xpq_increment_idx();
442 1.1.4.1 mjf }
443 1.1.4.1 mjf
444 1.1.4.1 mjf int
445 1.1.4.1 mjf xpq_update_foreign(pt_entry_t *ptr, pt_entry_t val, int dom)
446 1.1.4.1 mjf {
447 1.1.4.1 mjf mmu_update_t xpq_up[3];
448 1.1.4.1 mjf
449 1.1.4.1 mjf xpq_up[0].ptr = MMU_EXTENDED_COMMAND;
450 1.1.4.1 mjf xpq_up[0].val = MMUEXT_SET_FOREIGNDOM | (dom << 16);
451 1.1.4.1 mjf xpq_up[1].ptr = (paddr_t)ptr;
452 1.1.4.1 mjf xpq_up[1].val = val;
453 1.1.4.1 mjf if (HYPERVISOR_mmu_update_self(xpq_up, 2, NULL) < 0)
454 1.1.4.1 mjf return EFAULT;
455 1.1.4.1 mjf return (0);
456 1.1.4.1 mjf }
457 1.1.4.1 mjf #endif /* XEN3 */
458 1.1.4.1 mjf
459 1.1.4.1 mjf #ifdef XENDEBUG
460 1.1.4.1 mjf void
461 1.1.4.1 mjf xpq_debug_dump()
462 1.1.4.1 mjf {
463 1.1.4.1 mjf int i;
464 1.1.4.1 mjf
465 1.1.4.1 mjf XENPRINTK2(("idx: %d\n", xpq_idx));
466 1.1.4.1 mjf for (i = 0; i < xpq_idx; i++) {
467 1.1.4.1 mjf sprintf(XBUF, "%x %08x ", (u_int)xpq_queue[i].ptr,
468 1.1.4.1 mjf (u_int)xpq_queue[i].val);
469 1.1.4.1 mjf if (++i < xpq_idx)
470 1.1.4.1 mjf sprintf(XBUF + strlen(XBUF), "%x %08x ",
471 1.1.4.1 mjf (u_int)xpq_queue[i].ptr, (u_int)xpq_queue[i].val);
472 1.1.4.1 mjf if (++i < xpq_idx)
473 1.1.4.1 mjf sprintf(XBUF + strlen(XBUF), "%x %08x ",
474 1.1.4.1 mjf (u_int)xpq_queue[i].ptr, (u_int)xpq_queue[i].val);
475 1.1.4.1 mjf if (++i < xpq_idx)
476 1.1.4.1 mjf sprintf(XBUF + strlen(XBUF), "%x %08x ",
477 1.1.4.1 mjf (u_int)xpq_queue[i].ptr, (u_int)xpq_queue[i].val);
478 1.1.4.1 mjf XENPRINTK2(("%d: %s\n", xpq_idx, XBUF));
479 1.1.4.1 mjf }
480 1.1.4.1 mjf }
481 1.1.4.1 mjf #endif
482 1.1.4.1 mjf
483 1.1.4.1 mjf
484 1.1.4.1 mjf #ifdef __x86_64__
485 1.1.4.1 mjf extern volatile struct xencons_interface *xencons_interface; /* XXX */
486 1.1.4.1 mjf extern struct xenstore_domain_interface *xenstore_interface; /* XXX */
487 1.1.4.1 mjf
488 1.1.4.1 mjf static void xen_bt_set_readonly (vaddr_t);
489 1.1.4.1 mjf static void xen_bootstrap_tables (vaddr_t, vaddr_t, int, int, int);
490 1.1.4.1 mjf
491 1.1.4.1 mjf /* How many PDEs ? */
492 1.1.4.1 mjf #if L2_SLOT_KERNBASE > 0
493 1.1.4.1 mjf #define TABLE_L2_ENTRIES (2 * (NKL2_KIMG_ENTRIES + 1))
494 1.1.4.1 mjf #else
495 1.1.4.1 mjf #define TABLE_L2_ENTRIES (NKL2_KIMG_ENTRIES + 1)
496 1.1.4.1 mjf #endif
497 1.1.4.1 mjf
498 1.1.4.1 mjf /*
499 1.1.4.1 mjf * Construct and switch to new pagetables
500 1.1.4.1 mjf * first_avail is the first vaddr we can use after
501 1.1.4.1 mjf * we get rid of Xen pagetables
502 1.1.4.1 mjf */
503 1.1.4.1 mjf
504 1.1.4.1 mjf vaddr_t xen_pmap_bootstrap (void);
505 1.1.4.1 mjf
506 1.1.4.1 mjf /*
507 1.1.4.1 mjf * Function to get rid of Xen bootstrap tables
508 1.1.4.1 mjf */
509 1.1.4.1 mjf
510 1.1.4.1 mjf vaddr_t
511 1.1.4.1 mjf xen_pmap_bootstrap()
512 1.1.4.1 mjf {
513 1.1.4.1 mjf int count, iocount = 0;
514 1.1.4.1 mjf vaddr_t bootstrap_tables, init_tables;
515 1.1.4.1 mjf
516 1.1.4.1 mjf xpmap_phys_to_machine_mapping = (paddr_t *) xen_start_info.mfn_list;
517 1.1.4.1 mjf init_tables = xen_start_info.pt_base;
518 1.1.4.1 mjf __PRINTK(("xen_arch_pmap_bootstrap init_tables=0x%lx\n", init_tables));
519 1.1.4.1 mjf
520 1.1.4.1 mjf /* Space after Xen boostrap tables should be free */
521 1.1.4.1 mjf bootstrap_tables = xen_start_info.pt_base +
522 1.1.4.1 mjf (xen_start_info.nr_pt_frames * PAGE_SIZE);
523 1.1.4.1 mjf
524 1.1.4.1 mjf /* Calculate how many tables we need */
525 1.1.4.1 mjf count = TABLE_L2_ENTRIES;
526 1.1.4.1 mjf
527 1.1.4.1 mjf #ifdef DOM0OPS
528 1.1.4.1 mjf if (xen_start_info.flags & SIF_INITDOMAIN) {
529 1.1.4.1 mjf /* space for ISA I/O mem */
530 1.1.4.1 mjf iocount = IOM_SIZE / PAGE_SIZE;
531 1.1.4.1 mjf }
532 1.1.4.1 mjf #endif
533 1.1.4.1 mjf
534 1.1.4.1 mjf /*
535 1.1.4.1 mjf * Xen space we'll reclaim may not be enough for our new page tables,
536 1.1.4.1 mjf * move bootstrap tables if necessary
537 1.1.4.1 mjf */
538 1.1.4.1 mjf
539 1.1.4.1 mjf if (bootstrap_tables < init_tables + ((count+3+iocount) * PAGE_SIZE))
540 1.1.4.1 mjf bootstrap_tables = init_tables +
541 1.1.4.1 mjf ((count+3+iocount) * PAGE_SIZE);
542 1.1.4.1 mjf
543 1.1.4.1 mjf /* Create temporary tables */
544 1.1.4.1 mjf xen_bootstrap_tables(xen_start_info.pt_base, bootstrap_tables,
545 1.1.4.1 mjf xen_start_info.nr_pt_frames, count, 0);
546 1.1.4.1 mjf
547 1.1.4.1 mjf /* get vaddr space for the shared info and the console pages */
548 1.1.4.1 mjf
549 1.1.4.1 mjf /* Create final tables */
550 1.1.4.1 mjf xen_bootstrap_tables(bootstrap_tables, init_tables,
551 1.1.4.1 mjf count + 3, count, 1);
552 1.1.4.1 mjf
553 1.1.4.1 mjf return (init_tables + ((count + 3) * PAGE_SIZE));
554 1.1.4.1 mjf }
555 1.1.4.1 mjf
556 1.1.4.1 mjf
557 1.1.4.1 mjf /*
558 1.1.4.1 mjf * Build a new table and switch to it
559 1.1.4.1 mjf * old_count is # of old tables (including PGD, PDTPE and PDE)
560 1.1.4.1 mjf * new_count is # of new tables (PTE only)
561 1.1.4.1 mjf * we assume areas don't overlap
562 1.1.4.1 mjf */
563 1.1.4.1 mjf
564 1.1.4.1 mjf
565 1.1.4.1 mjf static void
566 1.1.4.1 mjf xen_bootstrap_tables (vaddr_t old_pgd, vaddr_t new_pgd,
567 1.1.4.1 mjf int old_count, int new_count, int final)
568 1.1.4.1 mjf {
569 1.1.4.1 mjf pd_entry_t *pdtpe, *pde, *pte;
570 1.1.4.1 mjf pd_entry_t *cur_pgd, *bt_pgd;
571 1.1.4.1 mjf paddr_t addr, page;
572 1.1.4.1 mjf vaddr_t avail, text_end, map_end;
573 1.1.4.1 mjf int i;
574 1.1.4.1 mjf extern char __data_start;
575 1.1.4.1 mjf
576 1.1.4.1 mjf __PRINTK(("xen_bootstrap_tables(0x%lx, 0x%lx, %d, %d)\n",
577 1.1.4.1 mjf old_pgd, new_pgd, old_count, new_count));
578 1.1.4.1 mjf text_end = ((vaddr_t)&__data_start) & ~PAGE_MASK;
579 1.1.4.1 mjf /*
580 1.1.4.1 mjf * size of R/W area after kernel text:
581 1.1.4.1 mjf * xencons_interface (if present)
582 1.1.4.1 mjf * xenstore_interface (if present)
583 1.1.4.1 mjf * table pages (new_count + 3 entries)
584 1.1.4.1 mjf * UAREA
585 1.1.4.1 mjf * dummy user PGD
586 1.1.4.1 mjf * extra mappings (only when final is true):
587 1.1.4.1 mjf * HYPERVISOR_shared_info
588 1.1.4.1 mjf * ISA I/O mem (if needed)
589 1.1.4.1 mjf */
590 1.1.4.1 mjf map_end = new_pgd + ((new_count + 3 + UPAGES + 1) * NBPG);
591 1.1.4.1 mjf if (final) {
592 1.1.4.1 mjf HYPERVISOR_shared_info = (struct shared_info *)map_end;
593 1.1.4.1 mjf map_end += NBPG;
594 1.1.4.1 mjf }
595 1.1.4.1 mjf #ifdef DOM0OPS
596 1.1.4.1 mjf if (final && (xen_start_info.flags & SIF_INITDOMAIN)) {
597 1.1.4.1 mjf /* ISA I/O mem */
598 1.1.4.1 mjf atdevbase = map_end;
599 1.1.4.1 mjf map_end += IOM_SIZE;
600 1.1.4.1 mjf }
601 1.1.4.1 mjf #endif /* DOM0OPS */
602 1.1.4.1 mjf
603 1.1.4.1 mjf __PRINTK(("xen_bootstrap_tables text_end 0x%lx map_end 0x%lx\n",
604 1.1.4.1 mjf text_end, map_end));
605 1.1.4.1 mjf
606 1.1.4.1 mjf /*
607 1.1.4.1 mjf * Create bootstrap page tables
608 1.1.4.1 mjf * What we need:
609 1.1.4.1 mjf * - a PGD (level 4)
610 1.1.4.1 mjf * - a PDTPE (level 3)
611 1.1.4.1 mjf * - a PDE (level2)
612 1.1.4.1 mjf * - some PTEs (level 1)
613 1.1.4.1 mjf */
614 1.1.4.1 mjf
615 1.1.4.1 mjf cur_pgd = (pd_entry_t *) old_pgd;
616 1.1.4.1 mjf bt_pgd = (pd_entry_t *) new_pgd;
617 1.1.4.1 mjf memset (bt_pgd, 0, PAGE_SIZE);
618 1.1.4.1 mjf avail = new_pgd + PAGE_SIZE;
619 1.1.4.1 mjf
620 1.1.4.1 mjf /* Install level 3 */
621 1.1.4.1 mjf pdtpe = (pd_entry_t *) avail;
622 1.1.4.1 mjf memset (pdtpe, 0, PAGE_SIZE);
623 1.1.4.1 mjf avail += PAGE_SIZE;
624 1.1.4.1 mjf
625 1.1.4.1 mjf addr = ((paddr_t) pdtpe) - KERNBASE;
626 1.1.4.1 mjf bt_pgd[pl4_pi(KERNTEXTOFF)] =
627 1.1.4.1 mjf xpmap_ptom_masked(addr) | PG_u | PG_RW | PG_V;
628 1.1.4.1 mjf
629 1.1.4.1 mjf __PRINTK(("L3 va 0x%lx pa 0x%lx entry 0x%lx -> L4[0x%x]\n",
630 1.1.4.1 mjf pdtpe, addr, bt_pgd[pl4_pi(KERNTEXTOFF)], pl4_pi(KERNTEXTOFF)));
631 1.1.4.1 mjf
632 1.1.4.1 mjf /* Level 2 */
633 1.1.4.1 mjf pde = (pd_entry_t *) avail;
634 1.1.4.1 mjf memset(pde, 0, PAGE_SIZE);
635 1.1.4.1 mjf avail += PAGE_SIZE;
636 1.1.4.1 mjf
637 1.1.4.1 mjf addr = ((paddr_t) pde) - KERNBASE;
638 1.1.4.1 mjf pdtpe[pl3_pi(KERNTEXTOFF)] =
639 1.1.4.1 mjf xpmap_ptom_masked(addr) | PG_u | PG_RW | PG_V;
640 1.1.4.1 mjf __PRINTK(("L2 va 0x%lx pa 0x%lx entry 0x%lx -> L3[0x%x]\n",
641 1.1.4.1 mjf pde, addr, pdtpe[pl3_pi(KERNTEXTOFF)], pl3_pi(KERNTEXTOFF)));
642 1.1.4.1 mjf
643 1.1.4.1 mjf /* Level 1 */
644 1.1.4.1 mjf page = KERNTEXTOFF;
645 1.1.4.1 mjf for (i = 0; i < new_count; i ++) {
646 1.1.4.1 mjf paddr_t cur_page = page;
647 1.1.4.1 mjf
648 1.1.4.1 mjf pte = (pd_entry_t *) avail;
649 1.1.4.1 mjf avail += PAGE_SIZE;
650 1.1.4.1 mjf
651 1.1.4.1 mjf memset(pte, 0, PAGE_SIZE);
652 1.1.4.1 mjf while (pl2_pi(page) == pl2_pi (cur_page)) {
653 1.1.4.1 mjf if (page >= map_end) {
654 1.1.4.1 mjf /* not mapped at all */
655 1.1.4.1 mjf pte[pl1_pi(page)] = 0;
656 1.1.4.1 mjf page += PAGE_SIZE;
657 1.1.4.1 mjf continue;
658 1.1.4.1 mjf }
659 1.1.4.1 mjf pte[pl1_pi(page)] = xpmap_ptom_masked(page - KERNBASE);
660 1.1.4.1 mjf if (page == (vaddr_t)HYPERVISOR_shared_info) {
661 1.1.4.1 mjf pte[pl1_pi(page)] = xen_start_info.shared_info;
662 1.1.4.1 mjf __PRINTK(("HYPERVISOR_shared_info "
663 1.1.4.1 mjf "va 0x%lx pte 0x%lx\n",
664 1.1.4.1 mjf HYPERVISOR_shared_info, pte[pl1_pi(page)]));
665 1.1.4.1 mjf }
666 1.1.4.1 mjf if (xpmap_ptom_masked(page - KERNBASE) ==
667 1.1.4.1 mjf (xen_start_info.console_mfn << PAGE_SHIFT)) {
668 1.1.4.1 mjf xencons_interface = (void *)page;
669 1.1.4.1 mjf pte[pl1_pi(page)] =
670 1.1.4.1 mjf (xen_start_info.console_mfn << PAGE_SHIFT);
671 1.1.4.1 mjf __PRINTK(("xencons_interface "
672 1.1.4.1 mjf va 0x%lx pte 0x%lx\n",
673 1.1.4.1 mjf xencons_interface, pte[pl1_pi(page)]));
674 1.1.4.1 mjf }
675 1.1.4.1 mjf if (xpmap_ptom_masked(page - KERNBASE) ==
676 1.1.4.1 mjf (xen_start_info.store_mfn << PAGE_SHIFT)) {
677 1.1.4.1 mjf xenstore_interface = (void *)page;
678 1.1.4.1 mjf pte[pl1_pi(page)] =
679 1.1.4.1 mjf (xen_start_info.store_mfn << PAGE_SHIFT);
680 1.1.4.1 mjf __PRINTK(("xenstore_interface "
681 1.1.4.1 mjf "va 0x%lx pte 0x%lx\n",
682 1.1.4.1 mjf xenstore_interface, pte[pl1_pi(page)]));
683 1.1.4.1 mjf }
684 1.1.4.1 mjf #ifdef DOM0OPS
685 1.1.4.1 mjf if (page >= (vaddr_t)atdevbase &&
686 1.1.4.1 mjf page < (vaddr_t)atdevbase + IOM_SIZE) {
687 1.1.4.1 mjf pte[pl1_pi(page)] =
688 1.1.4.1 mjf IOM_BEGIN + (page - (vaddr_t)atdevbase);
689 1.1.4.1 mjf }
690 1.1.4.1 mjf #endif
691 1.1.4.1 mjf pte[pl1_pi(page)] |= PG_u | PG_V;
692 1.1.4.1 mjf if (page < text_end) {
693 1.1.4.1 mjf /* map kernel text RO */
694 1.1.4.1 mjf pte[pl1_pi(page)] |= 0;
695 1.1.4.1 mjf } else if (page >= old_pgd
696 1.1.4.1 mjf && page < old_pgd + (old_count * PAGE_SIZE)) {
697 1.1.4.1 mjf /* map old page tables RO */
698 1.1.4.1 mjf pte[pl1_pi(page)] |= 0;
699 1.1.4.1 mjf } else if (page >= new_pgd &&
700 1.1.4.1 mjf page < new_pgd + ((new_count + 3) * PAGE_SIZE)) {
701 1.1.4.1 mjf /* map new page tables RO */
702 1.1.4.1 mjf pte[pl1_pi(page)] |= 0;
703 1.1.4.1 mjf } else {
704 1.1.4.1 mjf /* map page RW */
705 1.1.4.1 mjf pte[pl1_pi(page)] |= PG_RW;
706 1.1.4.1 mjf }
707 1.1.4.1 mjf if (page == old_pgd)
708 1.1.4.1 mjf __PRINTK(("va 0x%lx pa 0x%lx
709 1.1.4.1 mjf "entry 0x%lx -> L1[0x%x]\n",
710 1.1.4.1 mjf page, page - KERNBASE,
711 1.1.4.1 mjf pte[pl1_pi(page)], pl1_pi(page)));
712 1.1.4.1 mjf page += PAGE_SIZE;
713 1.1.4.1 mjf }
714 1.1.4.1 mjf
715 1.1.4.1 mjf addr = ((paddr_t) pte) - KERNBASE;
716 1.1.4.1 mjf pde[pl2_pi(cur_page)] =
717 1.1.4.1 mjf xpmap_ptom_masked(addr) | PG_u | PG_RW | PG_V;
718 1.1.4.1 mjf __PRINTK(("L1 va 0x%lx pa 0x%lx entry 0x%lx -> L2[0x%x]\n",
719 1.1.4.1 mjf pte, addr, pde[pl2_pi(cur_page)], pl2_pi(cur_page)));
720 1.1.4.1 mjf /* Mark readonly */
721 1.1.4.1 mjf xen_bt_set_readonly((vaddr_t) pte);
722 1.1.4.1 mjf }
723 1.1.4.1 mjf
724 1.1.4.1 mjf /* Install recursive page tables mapping */
725 1.1.4.1 mjf bt_pgd[PDIR_SLOT_PTE] =
726 1.1.4.1 mjf xpmap_ptom_masked(new_pgd - KERNBASE) | PG_u | PG_V;
727 1.1.4.1 mjf __PRINTK(("bt_pgd[PDIR_SLOT_PTE] va 0x%lx pa 0x%lx entry 0x%lx\n",
728 1.1.4.1 mjf new_pgd, new_pgd - KERNBASE, bt_pgd[PDIR_SLOT_PTE]));
729 1.1.4.1 mjf
730 1.1.4.1 mjf /* Mark tables RO */
731 1.1.4.1 mjf xen_bt_set_readonly((vaddr_t) pde);
732 1.1.4.1 mjf xen_bt_set_readonly((vaddr_t) pdtpe);
733 1.1.4.1 mjf xen_bt_set_readonly(new_pgd);
734 1.1.4.1 mjf /* Pin the PGD */
735 1.1.4.1 mjf __PRINTK(("pin PDG\n"));
736 1.1.4.1 mjf xpq_queue_pin_table(xpmap_ptom_masked(new_pgd - KERNBASE));
737 1.1.4.1 mjf /* Switch to new tables */
738 1.1.4.1 mjf __PRINTK(("switch to PDG\n"));
739 1.1.4.1 mjf xpq_queue_pt_switch(xpmap_ptom_masked(new_pgd - KERNBASE));
740 1.1.4.1 mjf __PRINTK(("bt_pgd[PDIR_SLOT_PTE] now entry 0x%lx\n",
741 1.1.4.1 mjf bt_pgd[PDIR_SLOT_PTE]));
742 1.1.4.1 mjf __PRINTK(("L4_BASE va 0x%lx\n", (long)L4_BASE));
743 1.1.4.1 mjf __PRINTK(("value 0x%lx\n", *L4_BASE));
744 1.1.4.1 mjf __PRINTK(("[PDIR_SLOT_PTE] 0x%lx\n", L4_BASE[PDIR_SLOT_PTE]));
745 1.1.4.1 mjf
746 1.1.4.1 mjf /* Now we can safely reclaim space taken by old tables */
747 1.1.4.1 mjf
748 1.1.4.1 mjf __PRINTK(("unpin old PDG\n"));
749 1.1.4.1 mjf /* Unpin old PGD */
750 1.1.4.1 mjf xpq_queue_unpin_table(xpmap_ptom_masked(old_pgd - KERNBASE));
751 1.1.4.1 mjf /* Mark old tables RW */
752 1.1.4.1 mjf page = old_pgd;
753 1.1.4.1 mjf addr = (paddr_t) pde[pl2_pi(page)] & PG_FRAME;
754 1.1.4.1 mjf addr = xpmap_mtop(addr);
755 1.1.4.1 mjf pte = (pd_entry_t *) (addr + KERNBASE);
756 1.1.4.1 mjf pte += pl1_pi(page);
757 1.1.4.1 mjf __PRINTK(("*pde 0x%lx addr 0x%lx pte 0x%lx\n",
758 1.1.4.1 mjf pde[pl2_pi(page)], addr, pte));
759 1.1.4.1 mjf while (page < old_pgd + (old_count * PAGE_SIZE) && page < map_end) {
760 1.1.4.1 mjf addr = xpmap_ptom(((paddr_t) pte) - KERNBASE);
761 1.1.4.1 mjf xpq_queue_pte_update((pt_entry_t *) addr, *pte | PG_RW);
762 1.1.4.1 mjf page += PAGE_SIZE;
763 1.1.4.1 mjf /*
764 1.1.4.1 mjf * Our ptes are contiguous
765 1.1.4.1 mjf * so it's safe to just "++" here
766 1.1.4.1 mjf */
767 1.1.4.1 mjf pte++;
768 1.1.4.1 mjf }
769 1.1.4.1 mjf xpq_flush_queue();
770 1.1.4.1 mjf }
771 1.1.4.1 mjf
772 1.1.4.1 mjf
773 1.1.4.1 mjf void
774 1.1.4.1 mjf xen_set_user_pgd(paddr_t page)
775 1.1.4.1 mjf {
776 1.1.4.1 mjf struct mmuext_op op;
777 1.1.4.1 mjf int s = splvm();
778 1.1.4.1 mjf
779 1.1.4.1 mjf xpq_flush_queue();
780 1.1.4.1 mjf op.cmd = MMUEXT_NEW_USER_BASEPTR;
781 1.1.4.1 mjf op.arg1.mfn = xpmap_phys_to_machine_mapping[page >> PAGE_SHIFT];
782 1.1.4.1 mjf if (HYPERVISOR_mmuext_op(&op, 1, NULL, DOMID_SELF) < 0)
783 1.1.4.1 mjf panic("xen_set_user_pgd: failed to install new user page"
784 1.1.4.1 mjf " directory %lx", page);
785 1.1.4.1 mjf splx(s);
786 1.1.4.1 mjf }
787 1.1.4.1 mjf
788 1.1.4.1 mjf /*
789 1.1.4.1 mjf * Bootstrap helper functions
790 1.1.4.1 mjf */
791 1.1.4.1 mjf
792 1.1.4.1 mjf /*
793 1.1.4.1 mjf * Mark a page readonly
794 1.1.4.1 mjf * XXX: assuming vaddr = paddr + KERNBASE
795 1.1.4.1 mjf */
796 1.1.4.1 mjf
797 1.1.4.1 mjf static void
798 1.1.4.1 mjf xen_bt_set_readonly (vaddr_t page)
799 1.1.4.1 mjf {
800 1.1.4.1 mjf pt_entry_t entry;
801 1.1.4.1 mjf
802 1.1.4.1 mjf entry = xpmap_ptom_masked(page - KERNBASE);
803 1.1.4.1 mjf entry |= PG_u | PG_V;
804 1.1.4.1 mjf
805 1.1.4.1 mjf HYPERVISOR_update_va_mapping (page, entry, UVMF_INVLPG);
806 1.1.4.1 mjf }
807 1.1.4.1 mjf #endif /* x86_64 */
808