xen_shm_machdep.c revision 1.1.4.2 1 1.1.4.2 mjf /* $NetBSD: xen_shm_machdep.c,v 1.1.4.2 2008/02/18 21:05:20 mjf Exp $ */
2 1.1.4.1 mjf
3 1.1.4.1 mjf /*
4 1.1.4.1 mjf * Copyright (c) 2006 Manuel Bouyer.
5 1.1.4.1 mjf *
6 1.1.4.1 mjf * Redistribution and use in source and binary forms, with or without
7 1.1.4.1 mjf * modification, are permitted provided that the following conditions
8 1.1.4.1 mjf * are met:
9 1.1.4.1 mjf * 1. Redistributions of source code must retain the above copyright
10 1.1.4.1 mjf * notice, this list of conditions and the following disclaimer.
11 1.1.4.1 mjf * 2. Redistributions in binary form must reproduce the above copyright
12 1.1.4.1 mjf * notice, this list of conditions and the following disclaimer in the
13 1.1.4.1 mjf * documentation and/or other materials provided with the distribution.
14 1.1.4.1 mjf * 3. All advertising materials mentioning features or use of this software
15 1.1.4.1 mjf * must display the following acknowledgement:
16 1.1.4.1 mjf * This product includes software developed by Manuel Bouyer.
17 1.1.4.1 mjf * 4. The name of the author may not be used to endorse or promote products
18 1.1.4.1 mjf * derived from this software without specific prior written permission.
19 1.1.4.1 mjf *
20 1.1.4.1 mjf * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 1.1.4.1 mjf * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
22 1.1.4.1 mjf * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
23 1.1.4.1 mjf * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
24 1.1.4.1 mjf * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
25 1.1.4.1 mjf * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26 1.1.4.1 mjf * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27 1.1.4.1 mjf * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28 1.1.4.1 mjf * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
29 1.1.4.1 mjf * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 1.1.4.1 mjf *
31 1.1.4.1 mjf */
32 1.1.4.1 mjf
33 1.1.4.2 mjf #include <sys/cdefs.h>
34 1.1.4.2 mjf __KERNEL_RCSID(0, "$NetBSD: xen_shm_machdep.c,v 1.1.4.2 2008/02/18 21:05:20 mjf Exp $");
35 1.1.4.2 mjf
36 1.1.4.2 mjf
37 1.1.4.1 mjf #include <sys/types.h>
38 1.1.4.1 mjf #include <sys/param.h>
39 1.1.4.1 mjf #include <sys/systm.h>
40 1.1.4.1 mjf #include <sys/malloc.h>
41 1.1.4.1 mjf #include <sys/queue.h>
42 1.1.4.1 mjf #include <sys/vmem.h>
43 1.1.4.1 mjf #include <sys/kernel.h>
44 1.1.4.1 mjf #include <uvm/uvm.h>
45 1.1.4.1 mjf
46 1.1.4.1 mjf #include <machine/pmap.h>
47 1.1.4.1 mjf #include <xen/hypervisor.h>
48 1.1.4.1 mjf #include <xen/xen.h>
49 1.1.4.1 mjf #include <xen/evtchn.h>
50 1.1.4.1 mjf #include <xen/xen_shm.h>
51 1.1.4.1 mjf
52 1.1.4.1 mjf /*
53 1.1.4.1 mjf * Helper routines for the backend drivers. This implement the necessary
54 1.1.4.1 mjf * functions to map a bunch of pages from foreign domains in our kernel VM
55 1.1.4.1 mjf * space, do I/O to it, and unmap it.
56 1.1.4.1 mjf *
57 1.1.4.1 mjf * At boot time, we grap some kernel VM space that we'll use to map the foreign
58 1.1.4.1 mjf * pages. We also maintain a virtual to machine mapping table to give back
59 1.1.4.1 mjf * the appropriate address to bus_dma if requested.
60 1.1.4.1 mjf * If no more VM space is available, we return an error. The caller can then
61 1.1.4.1 mjf * register a callback which will be called when the required VM space is
62 1.1.4.1 mjf * available.
63 1.1.4.1 mjf */
64 1.1.4.1 mjf
65 1.1.4.1 mjf /* pointers to our VM space */
66 1.1.4.1 mjf static vaddr_t xen_shm_base_address;
67 1.1.4.1 mjf static u_long xen_shm_base_address_pg;
68 1.1.4.1 mjf static vaddr_t xen_shm_end_address;
69 1.1.4.1 mjf
70 1.1.4.1 mjf /* Grab enouth VM space to map an entire vbd ring. */
71 1.1.4.1 mjf #ifdef XEN3
72 1.1.4.1 mjf /* Xen3 linux guests seems to eat more pages, gives enough for 10 vbd rings */
73 1.1.4.1 mjf #define BLKIF_RING_SIZE __RING_SIZE((blkif_sring_t *)0, PAGE_SIZE)
74 1.1.4.1 mjf #define XENSHM_NPAGES (BLKIF_RING_SIZE * (BLKIF_MAX_SEGMENTS_PER_REQUEST + 1) * 10)
75 1.1.4.1 mjf #else
76 1.1.4.1 mjf #define XENSHM_NPAGES (BLKIF_RING_SIZE * (BLKIF_MAX_SEGMENTS_PER_REQUEST + 1))
77 1.1.4.1 mjf #endif
78 1.1.4.1 mjf
79 1.1.4.1 mjf static vsize_t xen_shm_size = (XENSHM_NPAGES * PAGE_SIZE);
80 1.1.4.1 mjf
81 1.1.4.1 mjf /* vm space management */
82 1.1.4.1 mjf static vmem_t *xen_shm_arena;
83 1.1.4.1 mjf
84 1.1.4.1 mjf /* callbacks are registered in a FIFO list. */
85 1.1.4.1 mjf
86 1.1.4.1 mjf static SIMPLEQ_HEAD(xen_shm_callback_head, xen_shm_callback_entry)
87 1.1.4.1 mjf xen_shm_callbacks;
88 1.1.4.1 mjf struct xen_shm_callback_entry {
89 1.1.4.1 mjf SIMPLEQ_ENTRY(xen_shm_callback_entry) xshmc_entries;
90 1.1.4.1 mjf int (*xshmc_callback)(void *); /* our callback */
91 1.1.4.1 mjf void *xshmc_arg; /* cookie passed to the callback */
92 1.1.4.1 mjf };
93 1.1.4.1 mjf /* a pool of struct xen_shm_callback_entry */
94 1.1.4.1 mjf static struct pool xen_shm_callback_pool;
95 1.1.4.1 mjf
96 1.1.4.1 mjf #ifdef DEBUG
97 1.1.4.1 mjf /* for ratecheck(9) */
98 1.1.4.1 mjf static struct timeval xen_shm_errintvl = { 60, 0 }; /* a minute, each */
99 1.1.4.1 mjf #endif
100 1.1.4.1 mjf
101 1.1.4.1 mjf void
102 1.1.4.1 mjf xen_shm_init()
103 1.1.4.1 mjf {
104 1.1.4.1 mjf SIMPLEQ_INIT(&xen_shm_callbacks);
105 1.1.4.1 mjf pool_init(&xen_shm_callback_pool, sizeof(struct xen_shm_callback_entry),
106 1.1.4.1 mjf 0, 0, 0, "xshmc", NULL, IPL_VM);
107 1.1.4.1 mjf /* ensure we'll always get items */
108 1.1.4.1 mjf if (pool_prime(&xen_shm_callback_pool,
109 1.1.4.1 mjf PAGE_SIZE / sizeof(struct xen_shm_callback_entry)) != 0) {
110 1.1.4.1 mjf panic("xen_shm_init can't prime pool");
111 1.1.4.1 mjf }
112 1.1.4.1 mjf
113 1.1.4.1 mjf xen_shm_base_address = uvm_km_alloc(kernel_map, xen_shm_size, 0,
114 1.1.4.1 mjf UVM_KMF_VAONLY);
115 1.1.4.1 mjf xen_shm_end_address = xen_shm_base_address + xen_shm_size;
116 1.1.4.1 mjf xen_shm_base_address_pg = xen_shm_base_address >> PAGE_SHIFT;
117 1.1.4.1 mjf if (xen_shm_base_address == 0) {
118 1.1.4.1 mjf panic("xen_shm_init no VM space");
119 1.1.4.1 mjf }
120 1.1.4.1 mjf xen_shm_arena = vmem_create("xen_shm",
121 1.1.4.1 mjf xen_shm_base_address_pg,
122 1.1.4.1 mjf (xen_shm_end_address >> PAGE_SHIFT) - 1 - xen_shm_base_address_pg,
123 1.1.4.1 mjf 1, NULL, NULL, NULL, 1, VM_NOSLEEP, IPL_VM);
124 1.1.4.1 mjf if (xen_shm_arena == NULL) {
125 1.1.4.1 mjf panic("xen_shm_init no arena");
126 1.1.4.1 mjf }
127 1.1.4.1 mjf }
128 1.1.4.1 mjf
129 1.1.4.1 mjf int
130 1.1.4.1 mjf #ifdef XEN3
131 1.1.4.1 mjf xen_shm_map(int nentries, int domid, grant_ref_t *grefp, vaddr_t *vap,
132 1.1.4.1 mjf grant_handle_t *handlep, int flags)
133 1.1.4.1 mjf #else
134 1.1.4.1 mjf xen_shm_map(paddr_t *ma, int nentries, int domid, vaddr_t *vap, int flags)
135 1.1.4.1 mjf #endif
136 1.1.4.1 mjf {
137 1.1.4.1 mjf int s, i;
138 1.1.4.1 mjf vaddr_t new_va;
139 1.1.4.1 mjf u_long new_va_pg;
140 1.1.4.1 mjf #ifdef XEN3
141 1.1.4.1 mjf int err;
142 1.1.4.1 mjf gnttab_map_grant_ref_t op[XENSHM_MAX_PAGES_PER_REQUEST];
143 1.1.4.1 mjf #else
144 1.1.4.1 mjf multicall_entry_t mcl[XENSHM_MAX_PAGES_PER_REQUEST];
145 1.1.4.1 mjf int remap_prot = PG_V | PG_RW | PG_U | PG_M;
146 1.1.4.1 mjf #endif
147 1.1.4.1 mjf
148 1.1.4.1 mjf #ifdef DIAGNOSTIC
149 1.1.4.1 mjf if (nentries > XENSHM_MAX_PAGES_PER_REQUEST) {
150 1.1.4.1 mjf printf("xen_shm_map: %d entries\n", nentries);
151 1.1.4.1 mjf panic("xen_shm_map");
152 1.1.4.1 mjf }
153 1.1.4.1 mjf #endif
154 1.1.4.1 mjf s = splvm(); /* splvm is the lowest level blocking disk and net IRQ */
155 1.1.4.1 mjf /*
156 1.1.4.1 mjf * if a driver is waiting for ressources, don't try to allocate
157 1.1.4.1 mjf * yet. This is to avoid a flood of small requests stalling large
158 1.1.4.1 mjf * ones.
159 1.1.4.1 mjf */
160 1.1.4.1 mjf if (__predict_false(SIMPLEQ_FIRST(&xen_shm_callbacks) != NULL) &&
161 1.1.4.1 mjf (flags & XSHM_CALLBACK) == 0) {
162 1.1.4.1 mjf #ifdef DEBUG
163 1.1.4.1 mjf static struct timeval lasttime;
164 1.1.4.1 mjf #endif
165 1.1.4.1 mjf splx(s);
166 1.1.4.1 mjf #ifdef DEBUG
167 1.1.4.1 mjf if (ratecheck(&lasttime, &xen_shm_errintvl))
168 1.1.4.1 mjf printf("xen_shm_map: ENOMEM1\n");
169 1.1.4.1 mjf #endif
170 1.1.4.1 mjf return ENOMEM;
171 1.1.4.1 mjf }
172 1.1.4.1 mjf /* allocate the needed virtual space */
173 1.1.4.1 mjf new_va_pg = vmem_alloc(xen_shm_arena, nentries,
174 1.1.4.1 mjf VM_INSTANTFIT | VM_NOSLEEP);
175 1.1.4.1 mjf if (new_va_pg == 0) {
176 1.1.4.1 mjf #ifdef DEBUG
177 1.1.4.1 mjf static struct timeval lasttime;
178 1.1.4.1 mjf #endif
179 1.1.4.1 mjf splx(s);
180 1.1.4.1 mjf #ifdef DEBUG
181 1.1.4.1 mjf if (ratecheck(&lasttime, &xen_shm_errintvl))
182 1.1.4.1 mjf printf("xen_shm_map: ENOMEM\n");
183 1.1.4.1 mjf #endif
184 1.1.4.1 mjf return ENOMEM;
185 1.1.4.1 mjf }
186 1.1.4.1 mjf splx(s);
187 1.1.4.1 mjf
188 1.1.4.1 mjf new_va = new_va_pg << PAGE_SHIFT;
189 1.1.4.1 mjf #ifdef XEN3
190 1.1.4.1 mjf for (i = 0; i < nentries; i++) {
191 1.1.4.1 mjf op[i].host_addr = new_va + i * PAGE_SIZE;
192 1.1.4.1 mjf op[i].dom = domid;
193 1.1.4.1 mjf op[i].ref = grefp[i];
194 1.1.4.1 mjf op[i].flags = GNTMAP_host_map |
195 1.1.4.1 mjf ((flags & XSHM_RO) ? GNTMAP_readonly : 0);
196 1.1.4.1 mjf }
197 1.1.4.1 mjf err = HYPERVISOR_grant_table_op(GNTTABOP_map_grant_ref, op, nentries);
198 1.1.4.1 mjf if (__predict_false(err))
199 1.1.4.1 mjf panic("xen_shm_map: HYPERVISOR_grant_table_op failed");
200 1.1.4.1 mjf for (i = 0; i < nentries; i++) {
201 1.1.4.1 mjf if (__predict_false(op[i].status))
202 1.1.4.1 mjf return op[i].status;
203 1.1.4.1 mjf handlep[i] = op[i].handle;
204 1.1.4.1 mjf }
205 1.1.4.1 mjf #else /* !XEN3 */
206 1.1.4.1 mjf for (i = 0; i < nentries; i++, new_va_pg++) {
207 1.1.4.1 mjf mcl[i].op = __HYPERVISOR_update_va_mapping_otherdomain;
208 1.1.4.1 mjf mcl[i].args[0] = new_va_pg;
209 1.1.4.1 mjf mcl[i].args[1] = ma[i] | remap_prot;
210 1.1.4.1 mjf mcl[i].args[2] = 0;
211 1.1.4.1 mjf mcl[i].args[3] = domid;
212 1.1.4.1 mjf }
213 1.1.4.1 mjf if (HYPERVISOR_multicall(mcl, nentries) != 0)
214 1.1.4.1 mjf panic("xen_shm_map: HYPERVISOR_multicall");
215 1.1.4.1 mjf
216 1.1.4.1 mjf for (i = 0; i < nentries; i++) {
217 1.1.4.1 mjf if ((mcl[i].args[5] != 0)) {
218 1.1.4.1 mjf printf("xen_shm_map: mcl[%d] failed\n", i);
219 1.1.4.1 mjf xen_shm_unmap(new_va, ma, nentries, domid);
220 1.1.4.1 mjf return EINVAL;
221 1.1.4.1 mjf }
222 1.1.4.1 mjf }
223 1.1.4.1 mjf #endif /* !XEN3 */
224 1.1.4.1 mjf *vap = new_va;
225 1.1.4.1 mjf return 0;
226 1.1.4.1 mjf }
227 1.1.4.1 mjf
228 1.1.4.1 mjf void
229 1.1.4.1 mjf #ifdef XEN3
230 1.1.4.1 mjf xen_shm_unmap(vaddr_t va, int nentries, grant_handle_t *handlep)
231 1.1.4.1 mjf #else
232 1.1.4.1 mjf xen_shm_unmap(vaddr_t va, paddr_t *pa, int nentries, int domid)
233 1.1.4.1 mjf #endif
234 1.1.4.1 mjf {
235 1.1.4.1 mjf #ifdef XEN3
236 1.1.4.1 mjf gnttab_unmap_grant_ref_t op[XENSHM_MAX_PAGES_PER_REQUEST];
237 1.1.4.1 mjf int ret;
238 1.1.4.1 mjf #else
239 1.1.4.1 mjf multicall_entry_t mcl[XENSHM_MAX_PAGES_PER_REQUEST];
240 1.1.4.1 mjf #endif
241 1.1.4.1 mjf int i;
242 1.1.4.1 mjf int s;
243 1.1.4.1 mjf struct xen_shm_callback_entry *xshmc;
244 1.1.4.1 mjf
245 1.1.4.1 mjf #ifdef DIAGNOSTIC
246 1.1.4.1 mjf if (nentries > XENSHM_MAX_PAGES_PER_REQUEST) {
247 1.1.4.1 mjf printf("xen_shm_unmap: %d entries\n", nentries);
248 1.1.4.1 mjf panic("xen_shm_unmap");
249 1.1.4.1 mjf }
250 1.1.4.1 mjf #endif
251 1.1.4.1 mjf
252 1.1.4.1 mjf #ifdef XEN3
253 1.1.4.1 mjf for (i = 0; i < nentries; i++) {
254 1.1.4.1 mjf op[i].host_addr = va + i * PAGE_SIZE;
255 1.1.4.1 mjf op[i].dev_bus_addr = 0;
256 1.1.4.1 mjf op[i].handle = handlep[i];
257 1.1.4.1 mjf }
258 1.1.4.1 mjf ret = HYPERVISOR_grant_table_op(GNTTABOP_unmap_grant_ref,
259 1.1.4.1 mjf op, nentries);
260 1.1.4.1 mjf if (__predict_false(ret))
261 1.1.4.1 mjf panic("xen_shm_unmap: unmap failed");
262 1.1.4.1 mjf va = va >> PAGE_SHIFT;
263 1.1.4.1 mjf #else /* !XEN3 */
264 1.1.4.1 mjf va = va >> PAGE_SHIFT;
265 1.1.4.1 mjf for (i = 0; i < nentries; i++) {
266 1.1.4.1 mjf mcl[i].op = __HYPERVISOR_update_va_mapping;
267 1.1.4.1 mjf mcl[i].args[0] = va + i;
268 1.1.4.1 mjf mcl[i].args[1] = 0;
269 1.1.4.1 mjf mcl[i].args[2] = 0;
270 1.1.4.1 mjf }
271 1.1.4.1 mjf mcl[nentries - 1].args[2] = UVMF_FLUSH_TLB;
272 1.1.4.1 mjf if (HYPERVISOR_multicall(mcl, nentries) != 0)
273 1.1.4.1 mjf panic("xen_shm_unmap");
274 1.1.4.1 mjf #endif /* !XEN3 */
275 1.1.4.1 mjf s = splvm(); /* splvm is the lowest level blocking disk and net IRQ */
276 1.1.4.1 mjf vmem_free(xen_shm_arena, va, nentries);
277 1.1.4.1 mjf while (__predict_false((xshmc = SIMPLEQ_FIRST(&xen_shm_callbacks))
278 1.1.4.1 mjf != NULL)) {
279 1.1.4.1 mjf SIMPLEQ_REMOVE_HEAD(&xen_shm_callbacks, xshmc_entries);
280 1.1.4.1 mjf splx(s);
281 1.1.4.1 mjf if (xshmc->xshmc_callback(xshmc->xshmc_arg) == 0) {
282 1.1.4.1 mjf /* callback succeeded */
283 1.1.4.1 mjf s = splvm();
284 1.1.4.1 mjf pool_put(&xen_shm_callback_pool, xshmc);
285 1.1.4.1 mjf } else {
286 1.1.4.1 mjf /* callback failed, probably out of ressources */
287 1.1.4.1 mjf s = splvm();
288 1.1.4.1 mjf SIMPLEQ_INSERT_TAIL(&xen_shm_callbacks, xshmc,
289 1.1.4.1 mjf xshmc_entries);
290 1.1.4.1 mjf
291 1.1.4.1 mjf break;
292 1.1.4.1 mjf }
293 1.1.4.1 mjf }
294 1.1.4.1 mjf splx(s);
295 1.1.4.1 mjf }
296 1.1.4.1 mjf
297 1.1.4.1 mjf int
298 1.1.4.1 mjf xen_shm_callback(int (*callback)(void *), void *arg)
299 1.1.4.1 mjf {
300 1.1.4.1 mjf struct xen_shm_callback_entry *xshmc;
301 1.1.4.1 mjf int s;
302 1.1.4.1 mjf
303 1.1.4.1 mjf s = splvm();
304 1.1.4.1 mjf xshmc = pool_get(&xen_shm_callback_pool, PR_NOWAIT);
305 1.1.4.1 mjf if (xshmc == NULL) {
306 1.1.4.1 mjf splx(s);
307 1.1.4.1 mjf return ENOMEM;
308 1.1.4.1 mjf }
309 1.1.4.1 mjf xshmc->xshmc_arg = arg;
310 1.1.4.1 mjf xshmc->xshmc_callback = callback;
311 1.1.4.1 mjf SIMPLEQ_INSERT_TAIL(&xen_shm_callbacks, xshmc, xshmc_entries);
312 1.1.4.1 mjf splx(s);
313 1.1.4.1 mjf return 0;
314 1.1.4.1 mjf }
315