1 /******************************************************************************
2 * gnttab.c
3 *
4 * Two sets of functionality:
5 * 1. Granting foreign access to our memory reservation.
6 * 2. Accessing others' memory reservations via grant references.
7 * (i.e., mechanisms for both sender and recipient of grant references)
8 *
9 * Copyright (c) 2005, Christopher Clark
10 * Copyright (c) 2004, K A Fraser
11 */
12
13 #include <sys/cdefs.h>
14 __FBSDID("$FreeBSD$");
15
16 #include <sys/param.h>
17 #include <sys/systm.h>
18 #include <sys/bus.h>
19 #include <sys/conf.h>
20 #include <sys/module.h>
21 #include <sys/kernel.h>
22 #include <sys/lock.h>
23 #include <sys/malloc.h>
24 #include <sys/mman.h>
25 #include <sys/limits.h>
26 #include <sys/rman.h>
27 #include <machine/resource.h>
28 #include <machine/cpu.h>
29
30 #include <xen/xen-os.h>
31 #include <xen/hypervisor.h>
32 #include <machine/xen/synch_bitops.h>
33
34 #include <xen/hypervisor.h>
35 #include <xen/gnttab.h>
36
37 #include <vm/vm.h>
38 #include <vm/vm_kern.h>
39 #include <vm/vm_extern.h>
40 #include <vm/pmap.h>
41
42 /* External tools reserve first few grant table entries. */
43 #define NR_RESERVED_ENTRIES 8
44 #define GREFS_PER_GRANT_FRAME (PAGE_SIZE / sizeof(grant_entry_t))
45
46 static grant_ref_t **gnttab_list;
47 static unsigned int nr_grant_frames;
48 static unsigned int boot_max_nr_grant_frames;
49 static int gnttab_free_count;
50 static grant_ref_t gnttab_free_head;
51 static struct mtx gnttab_list_lock;
52
53 /*
54 * Resource representing allocated physical address space
55 * for the grant table metainfo
56 */
57 static struct resource *gnttab_pseudo_phys_res;
58
59 /* Resource id for allocated physical address space. */
60 static int gnttab_pseudo_phys_res_id;
61
62 static grant_entry_t *shared;
63
64 static struct gnttab_free_callback *gnttab_free_callback_list = NULL;
65
66 static int gnttab_expand(unsigned int req_entries);
67
68 #define RPP (PAGE_SIZE / sizeof(grant_ref_t))
69 #define gnttab_entry(entry) (gnttab_list[(entry) / RPP][(entry) % RPP])
70
71 static int
72 get_free_entries(int count, int *entries)
73 {
74 int ref, error;
75 grant_ref_t head;
76
77 mtx_lock(&gnttab_list_lock);
78 if ((gnttab_free_count < count) &&
79 ((error = gnttab_expand(count - gnttab_free_count)) != 0)) {
80 mtx_unlock(&gnttab_list_lock);
81 return (error);
82 }
83 ref = head = gnttab_free_head;
84 gnttab_free_count -= count;
85 while (count-- > 1)
86 head = gnttab_entry(head);
87 gnttab_free_head = gnttab_entry(head);
88 gnttab_entry(head) = GNTTAB_LIST_END;
89 mtx_unlock(&gnttab_list_lock);
90
91 *entries = ref;
92 return (0);
93 }
94
95 static void
96 do_free_callbacks(void)
97 {
98 struct gnttab_free_callback *callback, *next;
99
100 callback = gnttab_free_callback_list;
101 gnttab_free_callback_list = NULL;
102
103 while (callback != NULL) {
104 next = callback->next;
105 if (gnttab_free_count >= callback->count) {
106 callback->next = NULL;
107 callback->fn(callback->arg);
108 } else {
109 callback->next = gnttab_free_callback_list;
110 gnttab_free_callback_list = callback;
111 }
112 callback = next;
113 }
114 }
115
116 static inline void
117 check_free_callbacks(void)
118 {
119 if (__predict_false(gnttab_free_callback_list != NULL))
120 do_free_callbacks();
121 }
122
123 static void
124 put_free_entry(grant_ref_t ref)
125 {
126
127 mtx_lock(&gnttab_list_lock);
128 gnttab_entry(ref) = gnttab_free_head;
129 gnttab_free_head = ref;
130 gnttab_free_count++;
131 check_free_callbacks();
132 mtx_unlock(&gnttab_list_lock);
133 }
134
135 /*
136 * Public grant-issuing interface functions
137 */
138
139 int
140 gnttab_grant_foreign_access(domid_t domid, unsigned long frame, int readonly,
141 grant_ref_t *result)
142 {
143 int error, ref;
144
145 error = get_free_entries(1, &ref);
146
147 if (__predict_false(error))
148 return (error);
149
150 shared[ref].frame = frame;
151 shared[ref].domid = domid;
152 wmb();
153 shared[ref].flags = GTF_permit_access | (readonly ? GTF_readonly : 0);
154
155 if (result)
156 *result = ref;
157
158 return (0);
159 }
160
161 void
162 gnttab_grant_foreign_access_ref(grant_ref_t ref, domid_t domid,
163 unsigned long frame, int readonly)
164 {
165
166 shared[ref].frame = frame;
167 shared[ref].domid = domid;
168 wmb();
169 shared[ref].flags = GTF_permit_access | (readonly ? GTF_readonly : 0);
170 }
171
172 int
173 gnttab_query_foreign_access(grant_ref_t ref)
174 {
175 uint16_t nflags;
176
177 nflags = shared[ref].flags;
178
179 return (nflags & (GTF_reading|GTF_writing));
180 }
181
182 int
183 gnttab_end_foreign_access_ref(grant_ref_t ref)
184 {
185 uint16_t flags, nflags;
186
187 nflags = shared[ref].flags;
188 do {
189 if ( (flags = nflags) & (GTF_reading|GTF_writing) ) {
190 printf("%s: WARNING: g.e. still in use!\n", __func__);
191 return (0);
192 }
193 } while ((nflags = synch_cmpxchg(&shared[ref].flags, flags, 0)) !=
194 flags);
195
196 return (1);
197 }
198
199 void
200 gnttab_end_foreign_access(grant_ref_t ref, void *page)
201 {
202 if (gnttab_end_foreign_access_ref(ref)) {
203 put_free_entry(ref);
204 if (page != NULL) {
205 free(page, M_DEVBUF);
206 }
207 }
208 else {
209 /* XXX This needs to be fixed so that the ref and page are
210 placed on a list to be freed up later. */
211 printf("%s: WARNING: leaking g.e. and page still in use!\n",
212 __func__);
213 }
214 }
215
216 void
217 gnttab_end_foreign_access_references(u_int count, grant_ref_t *refs)
218 {
219 grant_ref_t *last_ref;
220 grant_ref_t head;
221 grant_ref_t tail;
222
223 head = GNTTAB_LIST_END;
224 tail = *refs;
225 last_ref = refs + count;
226 while (refs != last_ref) {
227 if (gnttab_end_foreign_access_ref(*refs)) {
228 gnttab_entry(*refs) = head;
229 head = *refs;
230 } else {
231 /*
232 * XXX This needs to be fixed so that the ref
233 * is placed on a list to be freed up later.
234 */
235 printf("%s: WARNING: leaking g.e. still in use!\n",
236 __func__);
237 count--;
238 }
239 refs++;
240 }
241
242 if (count != 0) {
243 mtx_lock(&gnttab_list_lock);
244 gnttab_free_count += count;
245 gnttab_entry(tail) = gnttab_free_head;
246 gnttab_free_head = head;
247 check_free_callbacks();
248 mtx_unlock(&gnttab_list_lock);
249 }
250 }
251
252 int
253 gnttab_grant_foreign_transfer(domid_t domid, unsigned long pfn,
254 grant_ref_t *result)
255 {
256 int error, ref;
257
258 error = get_free_entries(1, &ref);
259 if (__predict_false(error))
260 return (error);
261
262 gnttab_grant_foreign_transfer_ref(ref, domid, pfn);
263
264 *result = ref;
265 return (0);
266 }
267
268 void
269 gnttab_grant_foreign_transfer_ref(grant_ref_t ref, domid_t domid,
270 unsigned long pfn)
271 {
272 shared[ref].frame = pfn;
273 shared[ref].domid = domid;
274 wmb();
275 shared[ref].flags = GTF_accept_transfer;
276 }
277
278 unsigned long
279 gnttab_end_foreign_transfer_ref(grant_ref_t ref)
280 {
281 unsigned long frame;
282 uint16_t flags;
283
284 /*
285 * If a transfer is not even yet started, try to reclaim the grant
286 * reference and return failure (== 0).
287 */
288 while (!((flags = shared[ref].flags) & GTF_transfer_committed)) {
289 if ( synch_cmpxchg(&shared[ref].flags, flags, 0) == flags )
290 return (0);
291 cpu_spinwait();
292 }
293
294 /* If a transfer is in progress then wait until it is completed. */
295 while (!(flags & GTF_transfer_completed)) {
296 flags = shared[ref].flags;
297 cpu_spinwait();
298 }
299
300 /* Read the frame number /after/ reading completion status. */
301 rmb();
302 frame = shared[ref].frame;
303 KASSERT(frame != 0, ("grant table inconsistent"));
304
305 return (frame);
306 }
307
308 unsigned long
309 gnttab_end_foreign_transfer(grant_ref_t ref)
310 {
311 unsigned long frame = gnttab_end_foreign_transfer_ref(ref);
312
313 put_free_entry(ref);
314 return (frame);
315 }
316
317 void
318 gnttab_free_grant_reference(grant_ref_t ref)
319 {
320
321 put_free_entry(ref);
322 }
323
324 void
325 gnttab_free_grant_references(grant_ref_t head)
326 {
327 grant_ref_t ref;
328 int count = 1;
329
330 if (head == GNTTAB_LIST_END)
331 return;
332
333 ref = head;
334 while (gnttab_entry(ref) != GNTTAB_LIST_END) {
335 ref = gnttab_entry(ref);
336 count++;
337 }
338 mtx_lock(&gnttab_list_lock);
339 gnttab_entry(ref) = gnttab_free_head;
340 gnttab_free_head = head;
341 gnttab_free_count += count;
342 check_free_callbacks();
343 mtx_unlock(&gnttab_list_lock);
344 }
345
346 int
347 gnttab_alloc_grant_references(uint16_t count, grant_ref_t *head)
348 {
349 int ref, error;
350
351 error = get_free_entries(count, &ref);
352 if (__predict_false(error))
353 return (error);
354
355 *head = ref;
356 return (0);
357 }
358
359 int
360 gnttab_empty_grant_references(const grant_ref_t *private_head)
361 {
362
363 return (*private_head == GNTTAB_LIST_END);
364 }
365
366 int
367 gnttab_claim_grant_reference(grant_ref_t *private_head)
368 {
369 grant_ref_t g = *private_head;
370
371 if (__predict_false(g == GNTTAB_LIST_END))
372 return (g);
373 *private_head = gnttab_entry(g);
374 return (g);
375 }
376
377 void
378 gnttab_release_grant_reference(grant_ref_t *private_head, grant_ref_t release)
379 {
380
381 gnttab_entry(release) = *private_head;
382 *private_head = release;
383 }
384
385 void
386 gnttab_request_free_callback(struct gnttab_free_callback *callback,
387 void (*fn)(void *), void *arg, uint16_t count)
388 {
389
390 mtx_lock(&gnttab_list_lock);
391 if (callback->next)
392 goto out;
393 callback->fn = fn;
394 callback->arg = arg;
395 callback->count = count;
396 callback->next = gnttab_free_callback_list;
397 gnttab_free_callback_list = callback;
398 check_free_callbacks();
399 out:
400 mtx_unlock(&gnttab_list_lock);
401
402 }
403
404 void
405 gnttab_cancel_free_callback(struct gnttab_free_callback *callback)
406 {
407 struct gnttab_free_callback **pcb;
408
409 mtx_lock(&gnttab_list_lock);
410 for (pcb = &gnttab_free_callback_list; *pcb; pcb = &(*pcb)->next) {
411 if (*pcb == callback) {
412 *pcb = callback->next;
413 break;
414 }
415 }
416 mtx_unlock(&gnttab_list_lock);
417 }
418
419 static int
420 grow_gnttab_list(unsigned int more_frames)
421 {
422 unsigned int new_nr_grant_frames, extra_entries, i;
423
424 new_nr_grant_frames = nr_grant_frames + more_frames;
425 extra_entries = more_frames * GREFS_PER_GRANT_FRAME;
426
427 for (i = nr_grant_frames; i < new_nr_grant_frames; i++)
428 {
429 gnttab_list[i] = (grant_ref_t *)
430 malloc(PAGE_SIZE, M_DEVBUF, M_NOWAIT);
431
432 if (!gnttab_list[i])
433 goto grow_nomem;
434 }
435
436 for (i = GREFS_PER_GRANT_FRAME * nr_grant_frames;
437 i < GREFS_PER_GRANT_FRAME * new_nr_grant_frames - 1; i++)
438 gnttab_entry(i) = i + 1;
439
440 gnttab_entry(i) = gnttab_free_head;
441 gnttab_free_head = GREFS_PER_GRANT_FRAME * nr_grant_frames;
442 gnttab_free_count += extra_entries;
443
444 nr_grant_frames = new_nr_grant_frames;
445
446 check_free_callbacks();
447
448 return (0);
449
450 grow_nomem:
451 for ( ; i >= nr_grant_frames; i--)
452 free(gnttab_list[i], M_DEVBUF);
453 return (ENOMEM);
454 }
455
456 static unsigned int
457 __max_nr_grant_frames(void)
458 {
459 struct gnttab_query_size query;
460 int rc;
461
462 query.dom = DOMID_SELF;
463
464 rc = HYPERVISOR_grant_table_op(GNTTABOP_query_size, &query, 1);
465 if ((rc < 0) || (query.status != GNTST_okay))
466 return (4); /* Legacy max supported number of frames */
467
468 return (query.max_nr_frames);
469 }
470
471 static inline
472 unsigned int max_nr_grant_frames(void)
473 {
474
475 return (min(__max_nr_grant_frames(), boot_max_nr_grant_frames));
476 }
477
478 #ifdef notyet
479 /*
480 * XXX needed for backend support
481 *
482 */
483 static int
484 map_pte_fn(pte_t *pte, struct page *pmd_page,
485 unsigned long addr, void *data)
486 {
487 unsigned long **frames = (unsigned long **)data;
488
489 set_pte_at(&init_mm, addr, pte, pfn_pte_ma((*frames)[0], PAGE_KERNEL));
490 (*frames)++;
491 return 0;
492 }
493
494 static int
495 unmap_pte_fn(pte_t *pte, struct page *pmd_page,
496 unsigned long addr, void *data)
497 {
498
499 set_pte_at(&init_mm, addr, pte, __pte(0));
500 return 0;
501 }
502 #endif
503
504 static vm_paddr_t resume_frames;
505
506 static void
507 gnttab_map(unsigned int start_idx, unsigned int end_idx)
508 {
509 struct xen_add_to_physmap xatp;
510 unsigned int i = end_idx;
511
512 /*
513 * Loop backwards, so that the first hypercall has the largest index,
514 * ensuring that the table will grow only once.
515 */
516 do {
517 xatp.domid = DOMID_SELF;
518 xatp.idx = i;
519 xatp.space = XENMAPSPACE_grant_table;
520 xatp.gpfn = (resume_frames >> PAGE_SHIFT) + i;
521 if (HYPERVISOR_memory_op(XENMEM_add_to_physmap, &xatp))
522 panic("HYPERVISOR_memory_op failed to map gnttab");
523 } while (i-- > start_idx);
524 }
525
526 int
527 gnttab_resume(device_t dev)
528 {
529 unsigned int max_nr_gframes, nr_gframes;
530
531 nr_gframes = nr_grant_frames;
532 max_nr_gframes = max_nr_grant_frames();
533 if (max_nr_gframes < nr_gframes)
534 return (ENOSYS);
535
536 if (!resume_frames) {
537 KASSERT(dev != NULL,
538 ("No resume frames and no device provided"));
539
540 gnttab_pseudo_phys_res = xenmem_alloc(dev,
541 &gnttab_pseudo_phys_res_id, PAGE_SIZE * max_nr_gframes);
542 if (gnttab_pseudo_phys_res == NULL)
543 panic("Unable to reserve physical memory for gnttab");
544 resume_frames = rman_get_start(gnttab_pseudo_phys_res);
545 shared = rman_get_virtual(gnttab_pseudo_phys_res);
546 }
547 gnttab_map(0, nr_gframes - 1);
548
549 return (0);
550 }
551
552 static int
553 gnttab_expand(unsigned int req_entries)
554 {
555 unsigned int cur, extra;
556
557 cur = nr_grant_frames;
558 extra = howmany(req_entries, GREFS_PER_GRANT_FRAME);
559 if (cur + extra > max_nr_grant_frames())
560 return (ENOSPC);
561
562 gnttab_map(cur, cur + extra - 1);
563
564 return (grow_gnttab_list(extra));
565 }
566
567 MTX_SYSINIT(gnttab, &gnttab_list_lock, "GNTTAB LOCK", MTX_DEF | MTX_RECURSE);
568
569 /*------------------ Private Device Attachment Functions --------------------*/
570 /**
571 * \brief Identify instances of this device type in the system.
572 *
573 * \param driver The driver performing this identify action.
574 * \param parent The NewBus parent device for any devices this method adds.
575 */
576 static void
577 granttable_identify(driver_t *driver __unused, device_t parent)
578 {
579
580 KASSERT(xen_domain(),
581 ("Trying to attach grant-table device on non Xen domain"));
582 /*
583 * A single device instance for our driver is always present
584 * in a system operating under Xen.
585 */
586 if (BUS_ADD_CHILD(parent, 0, driver->name, 0) == NULL)
587 panic("unable to attach Xen Grant-table device");
588 }
589
590 /**
591 * \brief Probe for the existence of the Xen Grant-table device
592 *
593 * \param dev NewBus device_t for this instance.
594 *
595 * \return Always returns 0 indicating success.
596 */
597 static int
598 granttable_probe(device_t dev)
599 {
600
601 device_set_desc(dev, "Xen Grant-table Device");
602 return (BUS_PROBE_NOWILDCARD);
603 }
604
605 /**
606 * \brief Attach the Xen Grant-table device.
607 *
608 * \param dev NewBus device_t for this instance.
609 *
610 * \return On success, 0. Otherwise an errno value indicating the
611 * type of failure.
612 */
613 static int
614 granttable_attach(device_t dev)
615 {
616 int i;
617 unsigned int max_nr_glist_frames;
618 unsigned int nr_init_grefs;
619
620 nr_grant_frames = 1;
621 boot_max_nr_grant_frames = __max_nr_grant_frames();
622
623 /* Determine the maximum number of frames required for the
624 * grant reference free list on the current hypervisor.
625 */
626 max_nr_glist_frames = (boot_max_nr_grant_frames *
627 GREFS_PER_GRANT_FRAME /
628 (PAGE_SIZE / sizeof(grant_ref_t)));
629
630 gnttab_list = malloc(max_nr_glist_frames * sizeof(grant_ref_t *),
631 M_DEVBUF, M_NOWAIT);
632
633 if (gnttab_list == NULL)
634 return (ENOMEM);
635
636 for (i = 0; i < nr_grant_frames; i++) {
637 gnttab_list[i] = (grant_ref_t *)
638 malloc(PAGE_SIZE, M_DEVBUF, M_NOWAIT);
639 if (gnttab_list[i] == NULL)
640 goto ini_nomem;
641 }
642
643 if (gnttab_resume(dev))
644 return (ENODEV);
645
646 nr_init_grefs = nr_grant_frames * GREFS_PER_GRANT_FRAME;
647
648 for (i = NR_RESERVED_ENTRIES; i < nr_init_grefs - 1; i++)
649 gnttab_entry(i) = i + 1;
650
651 gnttab_entry(nr_init_grefs - 1) = GNTTAB_LIST_END;
652 gnttab_free_count = nr_init_grefs - NR_RESERVED_ENTRIES;
653 gnttab_free_head = NR_RESERVED_ENTRIES;
654
655 if (bootverbose)
656 printf("Grant table initialized\n");
657
658 return (0);
659
660 ini_nomem:
661 for (i--; i >= 0; i--)
662 free(gnttab_list[i], M_DEVBUF);
663 free(gnttab_list, M_DEVBUF);
664 return (ENOMEM);
665 }
666
667 /*-------------------- Private Device Attachment Data -----------------------*/
668 static device_method_t granttable_methods[] = {
669 /* Device interface */
670 DEVMETHOD(device_identify, granttable_identify),
671 DEVMETHOD(device_probe, granttable_probe),
672 DEVMETHOD(device_attach, granttable_attach),
673
674 DEVMETHOD_END
675 };
676
677 DEFINE_CLASS_0(granttable, granttable_driver, granttable_methods, 0);
678
679 DRIVER_MODULE_ORDERED(granttable, xenpv, granttable_driver, NULL, NULL,
680 SI_ORDER_FIRST);
Cache object: 9752f9786cf3c20cd09c255e84bdad49
|