xen_intr.c revision 1.18 1 /* $NetBSD: xen_intr.c,v 1.18 2019/12/23 13:35:37 thorpej Exp $ */
2
3 /*-
4 * Copyright (c) 1998, 2001 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Charles M. Hannum, and by Jason R. Thorpe.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 __KERNEL_RCSID(0, "$NetBSD: xen_intr.c,v 1.18 2019/12/23 13:35:37 thorpej Exp $");
34
35 #include <sys/param.h>
36 #include <sys/kernel.h>
37 #include <sys/kmem.h>
38
39 #include <sys/cpu.h>
40
41 #include <xen/evtchn.h>
42 #include <xen/xenfunc.h>
43
44 #include <uvm/uvm.h>
45
46 #include <machine/cpu.h>
47 #include <machine/intr.h>
48
49 #include "acpica.h"
50 #include "ioapic.h"
51 #include "lapic.h"
52 #include "pci.h"
53
54 #if NACPICA > 0
55 #include <dev/acpi/acpivar.h>
56 #endif
57
58 #if NIOAPIC > 0 || NACPICA > 0
59 #include <machine/i82093var.h>
60 #endif
61
62 #if NLAPIC > 0
63 #include <machine/i82489var.h>
64 #endif
65
66 #if NPCI > 0
67 #include <dev/pci/ppbreg.h>
68 #endif
69
70 /*
71 * Restore a value to cpl (unmasking interrupts). If any unmasked
72 * interrupts are pending, call Xspllower() to process them.
73 */
74 void xen_spllower(int nlevel);
75
76 void
77 xen_spllower(int nlevel)
78 {
79 struct cpu_info *ci = curcpu();
80 uint32_t xmask;
81 u_long psl;
82
83 if (ci->ci_ilevel <= nlevel)
84 return;
85
86 __insn_barrier();
87
88 xmask = XUNMASK(ci, nlevel);
89 psl = xen_read_psl();
90 x86_disable_intr();
91 if (ci->ci_xpending & xmask) {
92 KASSERT(psl == 0);
93 Xspllower(nlevel);
94 /* Xspllower does enable_intr() */
95 } else {
96 ci->ci_ilevel = nlevel;
97 xen_write_psl(psl);
98 }
99 }
100
101
102 #if !defined(XENPVHVM)
103 void
104 x86_disable_intr(void)
105 {
106 curcpu()->ci_vcpu->evtchn_upcall_mask = 1;
107 x86_lfence();
108 }
109
110 void
111 x86_enable_intr(void)
112 {
113 volatile struct vcpu_info *_vci = curcpu()->ci_vcpu;
114 __insn_barrier();
115 _vci->evtchn_upcall_mask = 0;
116 x86_lfence(); /* unmask then check (avoid races) */
117 if (__predict_false(_vci->evtchn_upcall_pending))
118 hypervisor_force_callback();
119 }
120
121 #endif /* !XENPVHVM */
122
123 u_long
124 xen_read_psl(void)
125 {
126
127 return (curcpu()->ci_vcpu->evtchn_upcall_mask);
128 }
129
130 void
131 xen_write_psl(u_long psl)
132 {
133 struct cpu_info *ci = curcpu();
134
135 ci->ci_vcpu->evtchn_upcall_mask = psl;
136 xen_rmb();
137 if (ci->ci_vcpu->evtchn_upcall_pending && psl == 0) {
138 hypervisor_force_callback();
139 }
140 }
141
142 void *
143 xen_intr_establish(int legacy_irq, struct pic *pic, int pin,
144 int type, int level, int (*handler)(void *), void *arg,
145 bool known_mpsafe)
146 {
147
148 return xen_intr_establish_xname(legacy_irq, pic, pin, type, level,
149 handler, arg, known_mpsafe, "XEN");
150 }
151
152 void *
153 xen_intr_establish_xname(int legacy_irq, struct pic *pic, int pin,
154 int type, int level, int (*handler)(void *), void *arg,
155 bool known_mpsafe, const char *xname)
156 {
157 const char *intrstr;
158 char intrstr_buf[INTRIDBUF];
159
160 if (pic->pic_type == PIC_XEN) {
161 struct intrhand *rih;
162
163 /*
164 * event_set_handler interprets `level != IPL_VM' to
165 * mean MP-safe, so we require the caller to match that
166 * for the moment.
167 */
168 KASSERT(known_mpsafe == (level != IPL_VM));
169
170 intrstr = intr_create_intrid(legacy_irq, pic, pin, intrstr_buf,
171 sizeof(intrstr_buf));
172
173 event_set_handler(pin, handler, arg, level, intrstr, xname);
174
175 rih = kmem_zalloc(sizeof(*rih), cold ? KM_NOSLEEP : KM_SLEEP);
176 if (rih == NULL) {
177 printf("%s: can't allocate handler info\n", __func__);
178 return NULL;
179 }
180
181 /*
182 * XXX:
183 * This is just a copy for API conformance.
184 * The real ih is lost in the innards of
185 * event_set_handler(); where the details of
186 * biglock_wrapper etc are taken care of.
187 * All that goes away when we nuke event_set_handler()
188 * et. al. and unify with x86/intr.c
189 */
190 rih->ih_pin = pin; /* port */
191 rih->ih_fun = rih->ih_realfun = handler;
192 rih->ih_arg = rih->ih_realarg = arg;
193 rih->pic_type = pic->pic_type;
194 return rih;
195 } /* Else we assume pintr */
196
197 #if (NPCI > 0 || NISA > 0) && defined(XENPV) /* XXX: support PVHVM pirq */
198 struct pintrhand *pih;
199 int gsi;
200 int vector, evtchn;
201
202 KASSERTMSG(legacy_irq == -1 || (0 <= legacy_irq && legacy_irq < NUM_XEN_IRQS),
203 "bad legacy IRQ value: %d", legacy_irq);
204 KASSERTMSG(!(legacy_irq == -1 && pic == &i8259_pic),
205 "non-legacy IRQon i8259 ");
206
207 gsi = xen_pic_to_gsi(pic, pin);
208
209 intrstr = intr_create_intrid(gsi, pic, pin, intrstr_buf,
210 sizeof(intrstr_buf));
211
212 vector = xen_vec_alloc(gsi);
213
214 if (irq2port[gsi] == 0) {
215 extern struct cpu_info phycpu_info_primary; /* XXX */
216 struct cpu_info *ci = &phycpu_info_primary;
217
218 pic->pic_addroute(pic, ci, pin, vector, type);
219
220 evtchn = bind_pirq_to_evtch(gsi);
221 KASSERT(evtchn > 0);
222 KASSERT(evtchn < NR_EVENT_CHANNELS);
223 irq2port[gsi] = evtchn + 1;
224 xen_atomic_set_bit(&ci->ci_evtmask[0], evtchn);
225 } else {
226 /*
227 * Shared interrupt - we can't rebind.
228 * The port is shared instead.
229 */
230 evtchn = irq2port[gsi] - 1;
231 }
232
233 pih = pirq_establish(gsi, evtchn, handler, arg, level,
234 intrstr, xname);
235 pih->pic_type = pic->pic_type;
236 return pih;
237 #endif /* NPCI > 0 || NISA > 0 */
238
239 /* FALLTHROUGH */
240 return NULL;
241 }
242
243 /*
244 * Mask an interrupt source.
245 */
246 void
247 xen_intr_mask(struct intrhand *ih)
248 {
249 /* XXX */
250 panic("xen_intr_mask: not yet implemented.");
251 }
252
253 /*
254 * Unmask an interrupt source.
255 */
256 void
257 xen_intr_unmask(struct intrhand *ih)
258 {
259 /* XXX */
260 panic("xen_intr_unmask: not yet implemented.");
261 }
262
263 /*
264 * Deregister an interrupt handler.
265 */
266 void
267 xen_intr_disestablish(struct intrhand *ih)
268 {
269
270 if (ih->pic_type == PIC_XEN) {
271 event_remove_handler(ih->ih_pin, ih->ih_realfun,
272 ih->ih_realarg);
273 kmem_free(ih, sizeof(*ih));
274 return;
275 }
276 #if defined(DOM0OPS)
277 /*
278 * Cache state, to prevent a use after free situation with
279 * ih.
280 */
281
282 struct pintrhand *pih = (struct pintrhand *)ih;
283
284 int pirq = pih->pirq;
285 int port = pih->evtch;
286 KASSERT(irq2port[pirq] != 0);
287
288 pirq_disestablish(pih);
289
290 if (evtsource[port] == NULL) {
291 /*
292 * Last handler was removed by
293 * event_remove_handler().
294 *
295 * We can safely unbind the pirq now.
296 */
297
298 port = unbind_pirq_from_evtch(pirq);
299 KASSERT(port == pih->evtch);
300 irq2port[pirq] = 0;
301 }
302 #endif
303 return;
304 }
305
306 /* MI interface for kern_cpu.c */
307 void xen_cpu_intr_redistribute(void);
308
309 void
310 xen_cpu_intr_redistribute(void)
311 {
312 KASSERT(mutex_owned(&cpu_lock));
313 KASSERT(mp_online);
314
315 return;
316 }
317
318 /* MD - called by x86/cpu.c */
319 #if defined(INTRSTACKSIZE)
320 static inline bool
321 redzone_const_or_false(bool x)
322 {
323 #ifdef DIAGNOSTIC
324 return x;
325 #else
326 return false;
327 #endif /* !DIAGNOSTIC */
328 }
329
330 static inline int
331 redzone_const_or_zero(int x)
332 {
333 return redzone_const_or_false(true) ? x : 0;
334 }
335 #endif
336
337 void xen_cpu_intr_init(struct cpu_info *);
338 void
339 xen_cpu_intr_init(struct cpu_info *ci)
340 {
341 int i; /* XXX: duplicate */
342
343 ci->ci_xunmask[0] = 0xfffffffe;
344 for (i = 1; i < NIPL; i++)
345 ci->ci_xunmask[i] = ci->ci_xunmask[i - 1] & ~(1 << i);
346
347 #if defined(INTRSTACKSIZE)
348 vaddr_t istack;
349
350 /*
351 * If the red zone is activated, protect both the top and
352 * the bottom of the stack with an unmapped page.
353 */
354 istack = uvm_km_alloc(kernel_map,
355 INTRSTACKSIZE + redzone_const_or_zero(2 * PAGE_SIZE), 0,
356 UVM_KMF_WIRED|UVM_KMF_ZERO);
357 if (redzone_const_or_false(true)) {
358 pmap_kremove(istack, PAGE_SIZE);
359 pmap_kremove(istack + INTRSTACKSIZE + PAGE_SIZE, PAGE_SIZE);
360 pmap_update(pmap_kernel());
361 }
362
363 /*
364 * 33 used to be 1. Arbitrarily reserve 32 more register_t's
365 * of space for ddb(4) to examine some subroutine arguments
366 * and to hunt for the next stack frame.
367 */
368 ci->ci_intrstack = (char *)istack + redzone_const_or_zero(PAGE_SIZE) +
369 INTRSTACKSIZE - 33 * sizeof(register_t);
370 #endif
371
372 ci->ci_idepth = -1;
373 }
374
375 /*
376 * Everything below from here is duplicated from x86/intr.c
377 * When intr.c and xen_intr.c are unified, these will need to be
378 * merged.
379 */
380
381 u_int xen_cpu_intr_count(struct cpu_info *ci);
382
383 u_int
384 xen_cpu_intr_count(struct cpu_info *ci)
385 {
386
387 KASSERT(ci->ci_nintrhand >= 0);
388
389 return ci->ci_nintrhand;
390 }
391
392 static const char *
393 xen_intr_string(int port, char *buf, size_t len, struct pic *pic)
394 {
395 KASSERT(pic->pic_type == PIC_XEN);
396
397 KASSERT(port >= 0);
398 KASSERT(port < NR_EVENT_CHANNELS);
399
400 snprintf(buf, len, "%s channel %d", pic->pic_name, port);
401
402 return buf;
403 }
404
405 static const char *
406 legacy_intr_string(int ih, char *buf, size_t len, struct pic *pic)
407 {
408 int legacy_irq;
409
410 KASSERT(pic->pic_type == PIC_I8259);
411 #if NLAPIC > 0
412 KASSERT(APIC_IRQ_ISLEGACY(ih));
413
414 legacy_irq = APIC_IRQ_LEGACY_IRQ(ih);
415 #else
416 legacy_irq = ih;
417 #endif
418 KASSERT(legacy_irq >= 0 && legacy_irq < 16);
419
420 snprintf(buf, len, "%s pin %d", pic->pic_name, legacy_irq);
421
422 return buf;
423 }
424
425 const char * xintr_string(intr_handle_t ih, char *buf, size_t len);
426
427 const char *
428 xintr_string(intr_handle_t ih, char *buf, size_t len)
429 {
430 #if NIOAPIC > 0
431 struct ioapic_softc *pic;
432 #endif
433
434 if (ih == 0)
435 panic("%s: bogus handle 0x%" PRIx64, __func__, ih);
436
437 #if NIOAPIC > 0
438 if (ih & APIC_INT_VIA_APIC) {
439 pic = ioapic_find(APIC_IRQ_APIC(ih));
440 if (pic != NULL) {
441 snprintf(buf, len, "%s pin %d",
442 device_xname(pic->sc_dev), APIC_IRQ_PIN(ih));
443 } else {
444 snprintf(buf, len,
445 "apic %d int %d (irq %d)",
446 APIC_IRQ_APIC(ih),
447 APIC_IRQ_PIN(ih),
448 APIC_IRQ_LEGACY_IRQ(ih));
449 }
450 } else
451 snprintf(buf, len, "irq %d", APIC_IRQ_LEGACY_IRQ(ih));
452
453 #elif NLAPIC > 0
454 snprintf(buf, len, "irq %d", APIC_IRQ_LEGACY_IRQ(ih));
455 #else
456 snprintf(buf, len, "irq %d", (int) ih);
457 #endif
458 return buf;
459
460 }
461
462 /*
463 * Create an interrupt id such as "ioapic0 pin 9". This interrupt id is used
464 * by MI code and intrctl(8).
465 */
466 const char * xen_intr_create_intrid(int legacy_irq, struct pic *pic,
467 int pin, char *buf, size_t len);
468
469 const char *
470 xen_intr_create_intrid(int legacy_irq, struct pic *pic, int pin, char *buf, size_t len)
471 {
472 int ih = 0;
473
474 #if NPCI > 0
475 #if defined(__HAVE_PCI_MSI_MSIX)
476 if ((pic->pic_type == PIC_MSI) || (pic->pic_type == PIC_MSIX)) {
477 uint64_t pih;
478 int dev, vec;
479
480 dev = msipic_get_devid(pic);
481 vec = pin;
482 pih = __SHIFTIN((uint64_t)dev, MSI_INT_DEV_MASK)
483 | __SHIFTIN((uint64_t)vec, MSI_INT_VEC_MASK)
484 | APIC_INT_VIA_MSI;
485 if (pic->pic_type == PIC_MSI)
486 MSI_INT_MAKE_MSI(pih);
487 else if (pic->pic_type == PIC_MSIX)
488 MSI_INT_MAKE_MSIX(pih);
489
490 return x86_pci_msi_string(NULL, pih, buf, len);
491 }
492 #endif /* __HAVE_PCI_MSI_MSIX */
493 #endif
494
495 if (pic->pic_type == PIC_XEN) {
496 ih = pin; /* Port == pin */
497 return xen_intr_string(pin, buf, len, pic);
498 }
499
500 /*
501 * If the device is pci, "legacy_irq" is alway -1. Least 8 bit of "ih"
502 * is only used in intr_string() to show the irq number.
503 * If the device is "legacy"(such as floppy), it should not use
504 * intr_string().
505 */
506 if (pic->pic_type == PIC_I8259) {
507 ih = legacy_irq;
508 return legacy_intr_string(ih, buf, len, pic);
509 }
510
511 #if NIOAPIC > 0 || NACPICA > 0
512 ih = ((pic->pic_apicid << APIC_INT_APIC_SHIFT) & APIC_INT_APIC_MASK)
513 | ((pin << APIC_INT_PIN_SHIFT) & APIC_INT_PIN_MASK);
514 if (pic->pic_type == PIC_IOAPIC) {
515 ih |= APIC_INT_VIA_APIC;
516 }
517 ih |= pin;
518 return intr_string(ih, buf, len);
519 #endif
520
521 return NULL; /* No pic found! */
522 }
523
524 #if !defined(XENPVHVM)
525 __strong_alias(spllower, xen_spllower);
526 __strong_alias(x86_read_psl, xen_read_psl);
527 __strong_alias(x86_write_psl, xen_write_psl);
528
529 __strong_alias(intr_string, xintr_string);
530 __strong_alias(intr_create_intrid, xen_intr_create_intrid);
531 __strong_alias(intr_establish, xen_intr_establish);
532 __strong_alias(intr_establish_xname, xen_intr_establish_xname);
533 __strong_alias(intr_mask, xen_intr_mask);
534 __strong_alias(intr_unmask, xen_intr_unmask);
535 __strong_alias(intr_disestablish, xen_intr_disestablish);
536 __strong_alias(cpu_intr_redistribute, xen_cpu_intr_redistribute);
537 __strong_alias(cpu_intr_count, xen_cpu_intr_count);
538 __strong_alias(cpu_intr_init, xen_cpu_intr_init);
539 #endif /* !XENPVHVM */
540