The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/dev/xen/grant_table/grant_table.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /******************************************************************************
    2  * gnttab.c
    3  * 
    4  * Two sets of functionality:
    5  * 1. Granting foreign access to our memory reservation.
    6  * 2. Accessing others' memory reservations via grant references.
    7  * (i.e., mechanisms for both sender and recipient of grant references)
    8  * 
    9  * Copyright (c) 2005, Christopher Clark
   10  * Copyright (c) 2004, K A Fraser
   11  */
   12 
   13 #include <sys/cdefs.h>
   14 __FBSDID("$FreeBSD$");
   15 
   16 #include <sys/param.h>
   17 #include <sys/systm.h>
   18 #include <sys/bus.h>
   19 #include <sys/conf.h>
   20 #include <sys/module.h>
   21 #include <sys/kernel.h>
   22 #include <sys/lock.h>
   23 #include <sys/malloc.h>
   24 #include <sys/mman.h>
   25 #include <sys/limits.h>
   26 #include <sys/rman.h>
   27 #include <machine/resource.h>
   28 #include <machine/cpu.h>
   29 
   30 #include <xen/xen-os.h>
   31 #include <xen/hypervisor.h>
   32 #include <machine/xen/synch_bitops.h>
   33 
   34 #include <xen/hypervisor.h>
   35 #include <xen/gnttab.h>
   36 
   37 #include <vm/vm.h>
   38 #include <vm/vm_kern.h>
   39 #include <vm/vm_extern.h>
   40 #include <vm/pmap.h>
   41 
   42 /* External tools reserve first few grant table entries. */
   43 #define NR_RESERVED_ENTRIES 8
   44 #define GREFS_PER_GRANT_FRAME (PAGE_SIZE / sizeof(grant_entry_t))
   45 
   46 static grant_ref_t **gnttab_list;
   47 static unsigned int nr_grant_frames;
   48 static unsigned int boot_max_nr_grant_frames;
   49 static int gnttab_free_count;
   50 static grant_ref_t gnttab_free_head;
   51 static struct mtx gnttab_list_lock;
   52 
   53 /*
   54  * Resource representing allocated physical address space
   55  * for the grant table metainfo
   56  */
   57 static struct resource *gnttab_pseudo_phys_res;
   58 
   59 /* Resource id for allocated physical address space. */
   60 static int gnttab_pseudo_phys_res_id;
   61 
   62 static grant_entry_t *shared;
   63 
   64 static struct gnttab_free_callback *gnttab_free_callback_list = NULL;
   65 
   66 static int gnttab_expand(unsigned int req_entries);
   67 
   68 #define RPP (PAGE_SIZE / sizeof(grant_ref_t))
   69 #define gnttab_entry(entry) (gnttab_list[(entry) / RPP][(entry) % RPP])
   70 
   71 static int
   72 get_free_entries(int count, int *entries)
   73 {
   74         int ref, error;
   75         grant_ref_t head;
   76 
   77         mtx_lock(&gnttab_list_lock);
   78         if ((gnttab_free_count < count) &&
   79             ((error = gnttab_expand(count - gnttab_free_count)) != 0)) {
   80                 mtx_unlock(&gnttab_list_lock);
   81                 return (error);
   82         }
   83         ref = head = gnttab_free_head;
   84         gnttab_free_count -= count;
   85         while (count-- > 1)
   86                 head = gnttab_entry(head);
   87         gnttab_free_head = gnttab_entry(head);
   88         gnttab_entry(head) = GNTTAB_LIST_END;
   89         mtx_unlock(&gnttab_list_lock);
   90 
   91         *entries = ref;
   92         return (0);
   93 }
   94 
   95 static void
   96 do_free_callbacks(void)
   97 {
   98         struct gnttab_free_callback *callback, *next;
   99 
  100         callback = gnttab_free_callback_list;
  101         gnttab_free_callback_list = NULL;
  102 
  103         while (callback != NULL) {
  104                 next = callback->next;
  105                 if (gnttab_free_count >= callback->count) {
  106                         callback->next = NULL;
  107                         callback->fn(callback->arg);
  108                 } else {
  109                         callback->next = gnttab_free_callback_list;
  110                         gnttab_free_callback_list = callback;
  111                 }
  112                 callback = next;
  113         }
  114 }
  115 
  116 static inline void
  117 check_free_callbacks(void)
  118 {
  119         if (__predict_false(gnttab_free_callback_list != NULL))
  120                 do_free_callbacks();
  121 }
  122 
  123 static void
  124 put_free_entry(grant_ref_t ref)
  125 {
  126 
  127         mtx_lock(&gnttab_list_lock);
  128         gnttab_entry(ref) = gnttab_free_head;
  129         gnttab_free_head = ref;
  130         gnttab_free_count++;
  131         check_free_callbacks();
  132         mtx_unlock(&gnttab_list_lock);
  133 }
  134 
  135 /*
  136  * Public grant-issuing interface functions
  137  */
  138 
  139 int
  140 gnttab_grant_foreign_access(domid_t domid, unsigned long frame, int readonly,
  141         grant_ref_t *result)
  142 {
  143         int error, ref;
  144 
  145         error = get_free_entries(1, &ref);
  146 
  147         if (__predict_false(error))
  148                 return (error);
  149 
  150         shared[ref].frame = frame;
  151         shared[ref].domid = domid;
  152         wmb();
  153         shared[ref].flags = GTF_permit_access | (readonly ? GTF_readonly : 0);
  154 
  155         if (result)
  156                 *result = ref;
  157 
  158         return (0);
  159 }
  160 
  161 void
  162 gnttab_grant_foreign_access_ref(grant_ref_t ref, domid_t domid,
  163                                 unsigned long frame, int readonly)
  164 {
  165 
  166         shared[ref].frame = frame;
  167         shared[ref].domid = domid;
  168         wmb();
  169         shared[ref].flags = GTF_permit_access | (readonly ? GTF_readonly : 0);
  170 }
  171 
  172 int
  173 gnttab_query_foreign_access(grant_ref_t ref)
  174 {
  175         uint16_t nflags;
  176 
  177         nflags = shared[ref].flags;
  178 
  179         return (nflags & (GTF_reading|GTF_writing));
  180 }
  181 
  182 int
  183 gnttab_end_foreign_access_ref(grant_ref_t ref)
  184 {
  185         uint16_t flags, nflags;
  186 
  187         nflags = shared[ref].flags;
  188         do {
  189                 if ( (flags = nflags) & (GTF_reading|GTF_writing) ) {
  190                         printf("%s: WARNING: g.e. still in use!\n", __func__);
  191                         return (0);
  192                 }
  193         } while ((nflags = synch_cmpxchg(&shared[ref].flags, flags, 0)) !=
  194                flags);
  195 
  196         return (1);
  197 }
  198 
  199 void
  200 gnttab_end_foreign_access(grant_ref_t ref, void *page)
  201 {
  202         if (gnttab_end_foreign_access_ref(ref)) {
  203                 put_free_entry(ref);
  204                 if (page != NULL) {
  205                         free(page, M_DEVBUF);
  206                 }
  207         }
  208         else {
  209                 /* XXX This needs to be fixed so that the ref and page are
  210                    placed on a list to be freed up later. */
  211                 printf("%s: WARNING: leaking g.e. and page still in use!\n",
  212                        __func__);
  213         }
  214 }
  215 
  216 void
  217 gnttab_end_foreign_access_references(u_int count, grant_ref_t *refs)
  218 {
  219         grant_ref_t *last_ref;
  220         grant_ref_t  head;
  221         grant_ref_t  tail;
  222 
  223         head = GNTTAB_LIST_END;
  224         tail = *refs;
  225         last_ref = refs + count;
  226         while (refs != last_ref) {
  227                 if (gnttab_end_foreign_access_ref(*refs)) {
  228                         gnttab_entry(*refs) = head;
  229                         head = *refs;
  230                 } else {
  231                         /*
  232                          * XXX This needs to be fixed so that the ref 
  233                          * is placed on a list to be freed up later.
  234                          */
  235                         printf("%s: WARNING: leaking g.e. still in use!\n",
  236                                __func__);
  237                         count--;
  238                 }
  239                 refs++;
  240         }
  241 
  242         if (count != 0) {
  243                 mtx_lock(&gnttab_list_lock);
  244                 gnttab_free_count += count;
  245                 gnttab_entry(tail) = gnttab_free_head;
  246                 gnttab_free_head = head;
  247                 check_free_callbacks();
  248                 mtx_unlock(&gnttab_list_lock);
  249         }
  250 }
  251 
  252 int
  253 gnttab_grant_foreign_transfer(domid_t domid, unsigned long pfn,
  254     grant_ref_t *result)
  255 {
  256         int error, ref;
  257 
  258         error = get_free_entries(1, &ref);
  259         if (__predict_false(error))
  260                 return (error);
  261 
  262         gnttab_grant_foreign_transfer_ref(ref, domid, pfn);
  263 
  264         *result = ref;
  265         return (0);
  266 }
  267 
  268 void
  269 gnttab_grant_foreign_transfer_ref(grant_ref_t ref, domid_t domid,
  270         unsigned long pfn)
  271 {
  272         shared[ref].frame = pfn;
  273         shared[ref].domid = domid;
  274         wmb();
  275         shared[ref].flags = GTF_accept_transfer;
  276 }
  277 
  278 unsigned long
  279 gnttab_end_foreign_transfer_ref(grant_ref_t ref)
  280 {
  281         unsigned long frame;
  282         uint16_t      flags;
  283 
  284         /*
  285          * If a transfer is not even yet started, try to reclaim the grant
  286          * reference and return failure (== 0).
  287          */
  288         while (!((flags = shared[ref].flags) & GTF_transfer_committed)) {
  289                 if ( synch_cmpxchg(&shared[ref].flags, flags, 0) == flags )
  290                         return (0);
  291                 cpu_spinwait();
  292         }
  293 
  294         /* If a transfer is in progress then wait until it is completed. */
  295         while (!(flags & GTF_transfer_completed)) {
  296                 flags = shared[ref].flags;
  297                 cpu_spinwait();
  298         }
  299 
  300         /* Read the frame number /after/ reading completion status. */
  301         rmb();
  302         frame = shared[ref].frame;
  303         KASSERT(frame != 0, ("grant table inconsistent"));
  304 
  305         return (frame);
  306 }
  307 
  308 unsigned long
  309 gnttab_end_foreign_transfer(grant_ref_t ref)
  310 {
  311         unsigned long frame = gnttab_end_foreign_transfer_ref(ref);
  312 
  313         put_free_entry(ref);
  314         return (frame);
  315 }
  316 
  317 void
  318 gnttab_free_grant_reference(grant_ref_t ref)
  319 {
  320 
  321         put_free_entry(ref);
  322 }
  323 
  324 void
  325 gnttab_free_grant_references(grant_ref_t head)
  326 {
  327         grant_ref_t ref;
  328         int count = 1;
  329 
  330         if (head == GNTTAB_LIST_END)
  331                 return;
  332 
  333         ref = head;
  334         while (gnttab_entry(ref) != GNTTAB_LIST_END) {
  335                 ref = gnttab_entry(ref);
  336                 count++;
  337         }
  338         mtx_lock(&gnttab_list_lock);
  339         gnttab_entry(ref) = gnttab_free_head;
  340         gnttab_free_head = head;
  341         gnttab_free_count += count;
  342         check_free_callbacks();
  343         mtx_unlock(&gnttab_list_lock);
  344 }
  345 
  346 int
  347 gnttab_alloc_grant_references(uint16_t count, grant_ref_t *head)
  348 {
  349         int ref, error;
  350 
  351         error = get_free_entries(count, &ref);
  352         if (__predict_false(error))
  353                 return (error);
  354 
  355         *head = ref;
  356         return (0);
  357 }
  358 
  359 int
  360 gnttab_empty_grant_references(const grant_ref_t *private_head)
  361 {
  362 
  363         return (*private_head == GNTTAB_LIST_END);
  364 }
  365 
  366 int
  367 gnttab_claim_grant_reference(grant_ref_t *private_head)
  368 {
  369         grant_ref_t g = *private_head;
  370 
  371         if (__predict_false(g == GNTTAB_LIST_END))
  372                 return (g);
  373         *private_head = gnttab_entry(g);
  374         return (g);
  375 }
  376 
  377 void
  378 gnttab_release_grant_reference(grant_ref_t *private_head, grant_ref_t  release)
  379 {
  380 
  381         gnttab_entry(release) = *private_head;
  382         *private_head = release;
  383 }
  384 
  385 void
  386 gnttab_request_free_callback(struct gnttab_free_callback *callback,
  387     void (*fn)(void *), void *arg, uint16_t count)
  388 {
  389 
  390         mtx_lock(&gnttab_list_lock);
  391         if (callback->next)
  392                 goto out;
  393         callback->fn = fn;
  394         callback->arg = arg;
  395         callback->count = count;
  396         callback->next = gnttab_free_callback_list;
  397         gnttab_free_callback_list = callback;
  398         check_free_callbacks();
  399  out:
  400         mtx_unlock(&gnttab_list_lock);
  401 
  402 }
  403 
  404 void
  405 gnttab_cancel_free_callback(struct gnttab_free_callback *callback)
  406 {
  407         struct gnttab_free_callback **pcb;
  408 
  409         mtx_lock(&gnttab_list_lock);
  410         for (pcb = &gnttab_free_callback_list; *pcb; pcb = &(*pcb)->next) {
  411                 if (*pcb == callback) {
  412                         *pcb = callback->next;
  413                         break;
  414                 }
  415         }
  416         mtx_unlock(&gnttab_list_lock);
  417 }
  418 
  419 static int
  420 grow_gnttab_list(unsigned int more_frames)
  421 {
  422         unsigned int new_nr_grant_frames, extra_entries, i;
  423 
  424         new_nr_grant_frames = nr_grant_frames + more_frames;
  425         extra_entries       = more_frames * GREFS_PER_GRANT_FRAME;
  426 
  427         for (i = nr_grant_frames; i < new_nr_grant_frames; i++)
  428         {
  429                 gnttab_list[i] = (grant_ref_t *)
  430                         malloc(PAGE_SIZE, M_DEVBUF, M_NOWAIT);
  431 
  432                 if (!gnttab_list[i])
  433                         goto grow_nomem;
  434         }
  435 
  436         for (i = GREFS_PER_GRANT_FRAME * nr_grant_frames;
  437              i < GREFS_PER_GRANT_FRAME * new_nr_grant_frames - 1; i++)
  438                 gnttab_entry(i) = i + 1;
  439 
  440         gnttab_entry(i) = gnttab_free_head;
  441         gnttab_free_head = GREFS_PER_GRANT_FRAME * nr_grant_frames;
  442         gnttab_free_count += extra_entries;
  443 
  444         nr_grant_frames = new_nr_grant_frames;
  445 
  446         check_free_callbacks();
  447 
  448         return (0);
  449 
  450 grow_nomem:
  451         for ( ; i >= nr_grant_frames; i--)
  452                 free(gnttab_list[i], M_DEVBUF);
  453         return (ENOMEM);
  454 }
  455 
  456 static unsigned int
  457 __max_nr_grant_frames(void)
  458 {
  459         struct gnttab_query_size query;
  460         int rc;
  461 
  462         query.dom = DOMID_SELF;
  463 
  464         rc = HYPERVISOR_grant_table_op(GNTTABOP_query_size, &query, 1);
  465         if ((rc < 0) || (query.status != GNTST_okay))
  466                 return (4); /* Legacy max supported number of frames */
  467 
  468         return (query.max_nr_frames);
  469 }
  470 
  471 static inline
  472 unsigned int max_nr_grant_frames(void)
  473 {
  474 
  475         return (min(__max_nr_grant_frames(), boot_max_nr_grant_frames));
  476 }
  477 
  478 #ifdef notyet
  479 /*
  480  * XXX needed for backend support
  481  *
  482  */
  483 static int
  484 map_pte_fn(pte_t *pte, struct page *pmd_page,
  485                       unsigned long addr, void *data)
  486 {
  487         unsigned long **frames = (unsigned long **)data;
  488 
  489         set_pte_at(&init_mm, addr, pte, pfn_pte_ma((*frames)[0], PAGE_KERNEL));
  490         (*frames)++;
  491         return 0;
  492 }
  493 
  494 static int
  495 unmap_pte_fn(pte_t *pte, struct page *pmd_page,
  496                         unsigned long addr, void *data)
  497 {
  498 
  499         set_pte_at(&init_mm, addr, pte, __pte(0));
  500         return 0;
  501 }
  502 #endif
  503 
  504 static vm_paddr_t resume_frames;
  505 
  506 static void
  507 gnttab_map(unsigned int start_idx, unsigned int end_idx)
  508 {
  509         struct xen_add_to_physmap xatp;
  510         unsigned int i = end_idx;
  511 
  512         /*
  513          * Loop backwards, so that the first hypercall has the largest index,
  514          * ensuring that the table will grow only once.
  515          */
  516         do {
  517                 xatp.domid = DOMID_SELF;
  518                 xatp.idx = i;
  519                 xatp.space = XENMAPSPACE_grant_table;
  520                 xatp.gpfn = (resume_frames >> PAGE_SHIFT) + i;
  521                 if (HYPERVISOR_memory_op(XENMEM_add_to_physmap, &xatp))
  522                         panic("HYPERVISOR_memory_op failed to map gnttab");
  523         } while (i-- > start_idx);
  524 }
  525 
  526 int
  527 gnttab_resume(device_t dev)
  528 {
  529         unsigned int max_nr_gframes, nr_gframes;
  530 
  531         nr_gframes = nr_grant_frames;
  532         max_nr_gframes = max_nr_grant_frames();
  533         if (max_nr_gframes < nr_gframes)
  534                 return (ENOSYS);
  535 
  536         if (!resume_frames) {
  537                 KASSERT(dev != NULL,
  538                     ("No resume frames and no device provided"));
  539 
  540                 gnttab_pseudo_phys_res = xenmem_alloc(dev,
  541                     &gnttab_pseudo_phys_res_id, PAGE_SIZE * max_nr_gframes);
  542                 if (gnttab_pseudo_phys_res == NULL)
  543                         panic("Unable to reserve physical memory for gnttab");
  544                 resume_frames = rman_get_start(gnttab_pseudo_phys_res);
  545                 shared = rman_get_virtual(gnttab_pseudo_phys_res);
  546         }
  547         gnttab_map(0, nr_gframes - 1);
  548 
  549         return (0);
  550 }
  551 
  552 static int
  553 gnttab_expand(unsigned int req_entries)
  554 {
  555         unsigned int cur, extra;
  556 
  557         cur = nr_grant_frames;
  558         extra = howmany(req_entries, GREFS_PER_GRANT_FRAME);
  559         if (cur + extra > max_nr_grant_frames())
  560                 return (ENOSPC);
  561 
  562         gnttab_map(cur, cur + extra - 1);
  563 
  564         return (grow_gnttab_list(extra));
  565 }
  566 
  567 MTX_SYSINIT(gnttab, &gnttab_list_lock, "GNTTAB LOCK", MTX_DEF | MTX_RECURSE);
  568 
  569 /*------------------ Private Device Attachment Functions  --------------------*/
  570 /**
  571  * \brief Identify instances of this device type in the system.
  572  *
  573  * \param driver  The driver performing this identify action.
  574  * \param parent  The NewBus parent device for any devices this method adds.
  575  */
  576 static void
  577 granttable_identify(driver_t *driver __unused, device_t parent)
  578 {
  579 
  580         KASSERT(xen_domain(),
  581             ("Trying to attach grant-table device on non Xen domain"));
  582         /*
  583          * A single device instance for our driver is always present
  584          * in a system operating under Xen.
  585          */
  586         if (BUS_ADD_CHILD(parent, 0, driver->name, 0) == NULL)
  587                 panic("unable to attach Xen Grant-table device");
  588 }
  589 
  590 /**
  591  * \brief Probe for the existence of the Xen Grant-table device
  592  *
  593  * \param dev  NewBus device_t for this instance.
  594  *
  595  * \return  Always returns 0 indicating success.
  596  */
  597 static int 
  598 granttable_probe(device_t dev)
  599 {
  600 
  601         device_set_desc(dev, "Xen Grant-table Device");
  602         return (BUS_PROBE_NOWILDCARD);
  603 }
  604 
  605 /**
  606  * \brief Attach the Xen Grant-table device.
  607  *
  608  * \param dev  NewBus device_t for this instance.
  609  *
  610  * \return  On success, 0. Otherwise an errno value indicating the
  611  *          type of failure.
  612  */
  613 static int
  614 granttable_attach(device_t dev)
  615 {
  616         int i;
  617         unsigned int max_nr_glist_frames;
  618         unsigned int nr_init_grefs;
  619 
  620         nr_grant_frames = 1;
  621         boot_max_nr_grant_frames = __max_nr_grant_frames();
  622 
  623         /* Determine the maximum number of frames required for the
  624          * grant reference free list on the current hypervisor.
  625          */
  626         max_nr_glist_frames = (boot_max_nr_grant_frames *
  627                                GREFS_PER_GRANT_FRAME /
  628                                (PAGE_SIZE / sizeof(grant_ref_t)));
  629 
  630         gnttab_list = malloc(max_nr_glist_frames * sizeof(grant_ref_t *),
  631             M_DEVBUF, M_NOWAIT);
  632 
  633         if (gnttab_list == NULL)
  634                 return (ENOMEM);
  635 
  636         for (i = 0; i < nr_grant_frames; i++) {
  637                 gnttab_list[i] = (grant_ref_t *)
  638                         malloc(PAGE_SIZE, M_DEVBUF, M_NOWAIT);
  639                 if (gnttab_list[i] == NULL)
  640                         goto ini_nomem;
  641         }
  642 
  643         if (gnttab_resume(dev))
  644                 return (ENODEV);
  645 
  646         nr_init_grefs = nr_grant_frames * GREFS_PER_GRANT_FRAME;
  647 
  648         for (i = NR_RESERVED_ENTRIES; i < nr_init_grefs - 1; i++)
  649                 gnttab_entry(i) = i + 1;
  650 
  651         gnttab_entry(nr_init_grefs - 1) = GNTTAB_LIST_END;
  652         gnttab_free_count = nr_init_grefs - NR_RESERVED_ENTRIES;
  653         gnttab_free_head  = NR_RESERVED_ENTRIES;
  654 
  655         if (bootverbose)
  656                 printf("Grant table initialized\n");
  657 
  658         return (0);
  659 
  660 ini_nomem:
  661         for (i--; i >= 0; i--)
  662                 free(gnttab_list[i], M_DEVBUF);
  663         free(gnttab_list, M_DEVBUF);
  664         return (ENOMEM);
  665 }
  666 
  667 /*-------------------- Private Device Attachment Data  -----------------------*/
  668 static device_method_t granttable_methods[] = {
  669         /* Device interface */
  670         DEVMETHOD(device_identify,      granttable_identify),
  671         DEVMETHOD(device_probe,         granttable_probe),
  672         DEVMETHOD(device_attach,        granttable_attach),
  673 
  674         DEVMETHOD_END
  675 };
  676 
  677 DEFINE_CLASS_0(granttable, granttable_driver, granttable_methods, 0);
  678 
  679 DRIVER_MODULE_ORDERED(granttable, xenpv, granttable_driver, NULL, NULL,
  680     SI_ORDER_FIRST);

Cache object: 9752f9786cf3c20cd09c255e84bdad49


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.