xref: /freebsd/sys/x86/xen/hvm.c (revision 8d20be1e22095c27faf8fe8b2f0d089739cc742e)
1 /*
2  * Copyright (c) 2008, 2013 Citrix Systems, Inc.
3  * Copyright (c) 2012 Spectra Logic Corporation
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS AS IS'' AND
16  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25  * SUCH DAMAGE.
26  */
27 
28 #include <sys/cdefs.h>
29 __FBSDID("$FreeBSD$");
30 
31 #include <sys/param.h>
32 #include <sys/bus.h>
33 #include <sys/kernel.h>
34 #include <sys/malloc.h>
35 #include <sys/proc.h>
36 #include <sys/smp.h>
37 #include <sys/systm.h>
38 
39 #include <vm/vm.h>
40 #include <vm/pmap.h>
41 
42 #include <dev/pci/pcivar.h>
43 
44 #include <machine/cpufunc.h>
45 #include <machine/cpu.h>
46 #include <machine/smp.h>
47 
48 #include <x86/apicreg.h>
49 
50 #include <xen/xen-os.h>
51 #include <xen/features.h>
52 #include <xen/gnttab.h>
53 #include <xen/hypervisor.h>
54 #include <xen/hvm.h>
55 #include <xen/xen_intr.h>
56 
57 #include <xen/interface/hvm/params.h>
58 #include <xen/interface/vcpu.h>
59 
60 /*--------------------------- Forward Declarations ---------------------------*/
61 #ifdef SMP
62 static driver_filter_t xen_smp_rendezvous_action;
63 static driver_filter_t xen_invltlb;
64 static driver_filter_t xen_invlpg;
65 static driver_filter_t xen_invlrng;
66 static driver_filter_t xen_invlcache;
67 #ifdef __i386__
68 static driver_filter_t xen_lazypmap;
69 #endif
70 static driver_filter_t xen_ipi_bitmap_handler;
71 static driver_filter_t xen_cpustop_handler;
72 static driver_filter_t xen_cpususpend_handler;
73 static driver_filter_t xen_cpustophard_handler;
74 #endif
75 static void xen_ipi_vectored(u_int vector, int dest);
76 static void xen_hvm_cpu_resume(void);
77 static void xen_hvm_cpu_init(void);
78 
79 /*---------------------------- Extern Declarations ---------------------------*/
80 /* Variables used by mp_machdep to perform the MMU related IPIs */
81 extern volatile int smp_tlb_wait;
82 extern vm_offset_t smp_tlb_addr2;
83 #ifdef __i386__
84 extern vm_offset_t smp_tlb_addr1;
85 #else
86 extern struct invpcid_descr smp_tlb_invpcid;
87 extern uint64_t pcid_cr3;
88 extern int invpcid_works;
89 extern int pmap_pcid_enabled;
90 extern pmap_t smp_tlb_pmap;
91 #endif
92 
93 #ifdef __i386__
94 extern void pmap_lazyfix_action(void);
95 #endif
96 
97 /* Variables used by mp_machdep to perform the bitmap IPI */
98 extern volatile u_int cpu_ipi_pending[MAXCPU];
99 
100 /*---------------------------------- Macros ----------------------------------*/
101 #define	IPI_TO_IDX(ipi) ((ipi) - APIC_IPI_INTS)
102 
103 /*-------------------------------- Local Types -------------------------------*/
104 enum xen_hvm_init_type {
105 	XEN_HVM_INIT_COLD,
106 	XEN_HVM_INIT_CANCELLED_SUSPEND,
107 	XEN_HVM_INIT_RESUME
108 };
109 
110 struct xen_ipi_handler
111 {
112 	driver_filter_t	*filter;
113 	const char	*description;
114 };
115 
116 /*-------------------------------- Global Data -------------------------------*/
117 enum xen_domain_type xen_domain_type = XEN_NATIVE;
118 
119 struct cpu_ops xen_hvm_cpu_ops = {
120 	.ipi_vectored	= lapic_ipi_vectored,
121 	.cpu_init	= xen_hvm_cpu_init,
122 	.cpu_resume	= xen_hvm_cpu_resume
123 };
124 
125 static MALLOC_DEFINE(M_XENHVM, "xen_hvm", "Xen HVM PV Support");
126 
127 #ifdef SMP
128 static struct xen_ipi_handler xen_ipis[] =
129 {
130 	[IPI_TO_IDX(IPI_RENDEZVOUS)]	= { xen_smp_rendezvous_action,	"r"   },
131 	[IPI_TO_IDX(IPI_INVLTLB)]	= { xen_invltlb,		"itlb"},
132 	[IPI_TO_IDX(IPI_INVLPG)]	= { xen_invlpg,			"ipg" },
133 	[IPI_TO_IDX(IPI_INVLRNG)]	= { xen_invlrng,		"irg" },
134 	[IPI_TO_IDX(IPI_INVLCACHE)]	= { xen_invlcache,		"ic"  },
135 #ifdef __i386__
136 	[IPI_TO_IDX(IPI_LAZYPMAP)]	= { xen_lazypmap,		"lp"  },
137 #endif
138 	[IPI_TO_IDX(IPI_BITMAP_VECTOR)] = { xen_ipi_bitmap_handler,	"b"   },
139 	[IPI_TO_IDX(IPI_STOP)]		= { xen_cpustop_handler,	"st"  },
140 	[IPI_TO_IDX(IPI_SUSPEND)]	= { xen_cpususpend_handler,	"sp"  },
141 	[IPI_TO_IDX(IPI_STOP_HARD)]	= { xen_cpustophard_handler,	"sth" },
142 };
143 #endif
144 
145 /**
146  * If non-zero, the hypervisor has been configured to use a direct
147  * IDT event callback for interrupt injection.
148  */
149 int xen_vector_callback_enabled;
150 
151 /*------------------------------- Per-CPU Data -------------------------------*/
152 DPCPU_DEFINE(struct vcpu_info, vcpu_local_info);
153 DPCPU_DEFINE(struct vcpu_info *, vcpu_info);
154 #ifdef SMP
155 DPCPU_DEFINE(xen_intr_handle_t, ipi_handle[nitems(xen_ipis)]);
156 #endif
157 
158 /*------------------ Hypervisor Access Shared Memory Regions -----------------*/
159 /** Hypercall table accessed via HYPERVISOR_*_op() methods. */
160 char *hypercall_stubs;
161 shared_info_t *HYPERVISOR_shared_info;
162 
163 #ifdef SMP
164 /*---------------------------- XEN PV IPI Handlers ---------------------------*/
165 /*
166  * This are C clones of the ASM functions found in apic_vector.s
167  */
168 static int
169 xen_ipi_bitmap_handler(void *arg)
170 {
171 	struct trapframe *frame;
172 
173 	frame = arg;
174 	ipi_bitmap_handler(*frame);
175 	return (FILTER_HANDLED);
176 }
177 
178 static int
179 xen_smp_rendezvous_action(void *arg)
180 {
181 #ifdef COUNT_IPIS
182 	int cpu;
183 
184 	cpu = PCPU_GET(cpuid);
185 	(*ipi_rendezvous_counts[cpu])++;
186 #endif /* COUNT_IPIS */
187 
188 	smp_rendezvous_action();
189 	return (FILTER_HANDLED);
190 }
191 
192 static int
193 xen_invltlb(void *arg)
194 {
195 #if defined(COUNT_XINVLTLB_HITS) || defined(COUNT_IPIS)
196 	int cpu;
197 
198 	cpu = PCPU_GET(cpuid);
199 #ifdef COUNT_XINVLTLB_HITS
200 	xhits_gbl[cpu]++;
201 #endif /* COUNT_XINVLTLB_HITS */
202 #ifdef COUNT_IPIS
203 	(*ipi_invltlb_counts[cpu])++;
204 #endif /* COUNT_IPIS */
205 #endif /* COUNT_XINVLTLB_HITS || COUNT_IPIS */
206 
207 	invltlb();
208 	atomic_add_int(&smp_tlb_wait, 1);
209 	return (FILTER_HANDLED);
210 }
211 
212 #ifdef __amd64__
213 static int
214 xen_invltlb_pcid(void *arg)
215 {
216 	uint64_t cr3;
217 #if defined(COUNT_XINVLTLB_HITS) || defined(COUNT_IPIS)
218 	int cpu;
219 
220 	cpu = PCPU_GET(cpuid);
221 #ifdef COUNT_XINVLTLB_HITS
222 	xhits_gbl[cpu]++;
223 #endif /* COUNT_XINVLTLB_HITS */
224 #ifdef COUNT_IPIS
225 	(*ipi_invltlb_counts[cpu])++;
226 #endif /* COUNT_IPIS */
227 #endif /* COUNT_XINVLTLB_HITS || COUNT_IPIS */
228 
229 	cr3 = rcr3();
230 	if (smp_tlb_invpcid.pcid != (uint64_t)-1 &&
231 	    smp_tlb_invpcid.pcid != 0) {
232 
233 		if (invpcid_works) {
234 			invpcid(&smp_tlb_invpcid, INVPCID_CTX);
235 		} else {
236 			/* Otherwise reload %cr3 twice. */
237 			if (cr3 != pcid_cr3) {
238 				load_cr3(pcid_cr3);
239 				cr3 |= CR3_PCID_SAVE;
240 			}
241 			load_cr3(cr3);
242 		}
243 	} else {
244 		invltlb_globpcid();
245 	}
246 	if (smp_tlb_pmap != NULL)
247 		CPU_CLR_ATOMIC(PCPU_GET(cpuid), &smp_tlb_pmap->pm_save);
248 
249 	atomic_add_int(&smp_tlb_wait, 1);
250 	return (FILTER_HANDLED);
251 }
252 #endif
253 
254 static int
255 xen_invlpg(void *arg)
256 {
257 #if defined(COUNT_XINVLTLB_HITS) || defined(COUNT_IPIS)
258 	int cpu;
259 
260 	cpu = PCPU_GET(cpuid);
261 #ifdef COUNT_XINVLTLB_HITS
262 	xhits_pg[cpu]++;
263 #endif /* COUNT_XINVLTLB_HITS */
264 #ifdef COUNT_IPIS
265 	(*ipi_invlpg_counts[cpu])++;
266 #endif /* COUNT_IPIS */
267 #endif /* COUNT_XINVLTLB_HITS || COUNT_IPIS */
268 
269 #ifdef __i386__
270 	invlpg(smp_tlb_addr1);
271 #else
272 	invlpg(smp_tlb_invpcid.addr);
273 #endif
274 	atomic_add_int(&smp_tlb_wait, 1);
275 	return (FILTER_HANDLED);
276 }
277 
278 #ifdef __amd64__
279 static int
280 xen_invlpg_pcid(void *arg)
281 {
282 #if defined(COUNT_XINVLTLB_HITS) || defined(COUNT_IPIS)
283 	int cpu;
284 
285 	cpu = PCPU_GET(cpuid);
286 #ifdef COUNT_XINVLTLB_HITS
287 	xhits_pg[cpu]++;
288 #endif /* COUNT_XINVLTLB_HITS */
289 #ifdef COUNT_IPIS
290 	(*ipi_invlpg_counts[cpu])++;
291 #endif /* COUNT_IPIS */
292 #endif /* COUNT_XINVLTLB_HITS || COUNT_IPIS */
293 
294 	if (invpcid_works) {
295 		invpcid(&smp_tlb_invpcid, INVPCID_ADDR);
296 	} else if (smp_tlb_invpcid.pcid == 0) {
297 		invlpg(smp_tlb_invpcid.addr);
298 	} else if (smp_tlb_invpcid.pcid == (uint64_t)-1) {
299 		invltlb_globpcid();
300 	} else {
301 		uint64_t cr3;
302 
303 		/*
304 		 * PCID supported, but INVPCID is not.
305 		 * Temporarily switch to the target address
306 		 * space and do INVLPG.
307 		 */
308 		cr3 = rcr3();
309 		if (cr3 != pcid_cr3)
310 			load_cr3(pcid_cr3 | CR3_PCID_SAVE);
311 		invlpg(smp_tlb_invpcid.addr);
312 		load_cr3(cr3 | CR3_PCID_SAVE);
313 	}
314 
315 	atomic_add_int(&smp_tlb_wait, 1);
316 	return (FILTER_HANDLED);
317 }
318 #endif
319 
320 static inline void
321 invlpg_range(vm_offset_t start, vm_offset_t end)
322 {
323 	do {
324 		invlpg(start);
325 		start += PAGE_SIZE;
326 	} while (start < end);
327 }
328 
329 static int
330 xen_invlrng(void *arg)
331 {
332 	vm_offset_t addr;
333 #if defined(COUNT_XINVLTLB_HITS) || defined(COUNT_IPIS)
334 	int cpu;
335 
336 	cpu = PCPU_GET(cpuid);
337 #ifdef COUNT_XINVLTLB_HITS
338 	xhits_rng[cpu]++;
339 #endif /* COUNT_XINVLTLB_HITS */
340 #ifdef COUNT_IPIS
341 	(*ipi_invlrng_counts[cpu])++;
342 #endif /* COUNT_IPIS */
343 #endif /* COUNT_XINVLTLB_HITS || COUNT_IPIS */
344 
345 #ifdef __i386__
346 	addr = smp_tlb_addr1;
347 	invlpg_range(addr, smp_tlb_addr2);
348 #else
349 	addr = smp_tlb_invpcid.addr;
350 	if (pmap_pcid_enabled) {
351 		if (invpcid_works) {
352 			struct invpcid_descr d;
353 
354 			d = smp_tlb_invpcid;
355 			do {
356 				invpcid(&d, INVPCID_ADDR);
357 				d.addr += PAGE_SIZE;
358 			} while (d.addr < smp_tlb_addr2);
359 		} else if (smp_tlb_invpcid.pcid == 0) {
360 			/*
361 			 * kernel pmap - use invlpg to invalidate
362 			 * global mapping.
363 			 */
364 			invlpg_range(addr, smp_tlb_addr2);
365 		} else if (smp_tlb_invpcid.pcid != (uint64_t)-1) {
366 			invltlb_globpcid();
367 			if (smp_tlb_pmap != NULL) {
368 				CPU_CLR_ATOMIC(PCPU_GET(cpuid),
369 				    &smp_tlb_pmap->pm_save);
370 			}
371 		} else {
372 			uint64_t cr3;
373 
374 			cr3 = rcr3();
375 			if (cr3 != pcid_cr3)
376 				load_cr3(pcid_cr3 | CR3_PCID_SAVE);
377 			invlpg_range(addr, smp_tlb_addr2);
378 			load_cr3(cr3 | CR3_PCID_SAVE);
379 		}
380 	} else {
381 		invlpg_range(addr, smp_tlb_addr2);
382 	}
383 #endif
384 
385 	atomic_add_int(&smp_tlb_wait, 1);
386 	return (FILTER_HANDLED);
387 }
388 
389 static int
390 xen_invlcache(void *arg)
391 {
392 #ifdef COUNT_IPIS
393 	int cpu = PCPU_GET(cpuid);
394 
395 	cpu = PCPU_GET(cpuid);
396 	(*ipi_invlcache_counts[cpu])++;
397 #endif /* COUNT_IPIS */
398 
399 	wbinvd();
400 	atomic_add_int(&smp_tlb_wait, 1);
401 	return (FILTER_HANDLED);
402 }
403 
404 #ifdef __i386__
405 static int
406 xen_lazypmap(void *arg)
407 {
408 
409 	pmap_lazyfix_action();
410 	return (FILTER_HANDLED);
411 }
412 #endif
413 
414 static int
415 xen_cpustop_handler(void *arg)
416 {
417 
418 	cpustop_handler();
419 	return (FILTER_HANDLED);
420 }
421 
422 static int
423 xen_cpususpend_handler(void *arg)
424 {
425 
426 	cpususpend_handler();
427 	return (FILTER_HANDLED);
428 }
429 
430 static int
431 xen_cpustophard_handler(void *arg)
432 {
433 
434 	ipi_nmi_handler();
435 	return (FILTER_HANDLED);
436 }
437 
438 /* Xen PV IPI sender */
439 static void
440 xen_ipi_vectored(u_int vector, int dest)
441 {
442 	xen_intr_handle_t *ipi_handle;
443 	int ipi_idx, to_cpu, self;
444 
445 	ipi_idx = IPI_TO_IDX(vector);
446 	if (ipi_idx > nitems(xen_ipis))
447 		panic("IPI out of range");
448 
449 	switch(dest) {
450 	case APIC_IPI_DEST_SELF:
451 		ipi_handle = DPCPU_GET(ipi_handle);
452 		xen_intr_signal(ipi_handle[ipi_idx]);
453 		break;
454 	case APIC_IPI_DEST_ALL:
455 		CPU_FOREACH(to_cpu) {
456 			ipi_handle = DPCPU_ID_GET(to_cpu, ipi_handle);
457 			xen_intr_signal(ipi_handle[ipi_idx]);
458 		}
459 		break;
460 	case APIC_IPI_DEST_OTHERS:
461 		self = PCPU_GET(cpuid);
462 		CPU_FOREACH(to_cpu) {
463 			if (to_cpu != self) {
464 				ipi_handle = DPCPU_ID_GET(to_cpu, ipi_handle);
465 				xen_intr_signal(ipi_handle[ipi_idx]);
466 			}
467 		}
468 		break;
469 	default:
470 		to_cpu = apic_cpuid(dest);
471 		ipi_handle = DPCPU_ID_GET(to_cpu, ipi_handle);
472 		xen_intr_signal(ipi_handle[ipi_idx]);
473 		break;
474 	}
475 }
476 
477 /* XEN diverged cpu operations */
478 static void
479 xen_hvm_cpu_resume(void)
480 {
481 	u_int cpuid = PCPU_GET(cpuid);
482 
483 	/*
484 	 * Reset pending bitmap IPIs, because Xen doesn't preserve pending
485 	 * event channels on migration.
486 	 */
487 	cpu_ipi_pending[cpuid] = 0;
488 
489 	/* register vcpu_info area */
490 	xen_hvm_cpu_init();
491 }
492 
493 static void
494 xen_cpu_ipi_init(int cpu)
495 {
496 	xen_intr_handle_t *ipi_handle;
497 	const struct xen_ipi_handler *ipi;
498 	device_t dev;
499 	int idx, rc;
500 
501 	ipi_handle = DPCPU_ID_GET(cpu, ipi_handle);
502 	dev = pcpu_find(cpu)->pc_device;
503 	KASSERT((dev != NULL), ("NULL pcpu device_t"));
504 
505 	for (ipi = xen_ipis, idx = 0; idx < nitems(xen_ipis); ipi++, idx++) {
506 
507 		if (ipi->filter == NULL) {
508 			ipi_handle[idx] = NULL;
509 			continue;
510 		}
511 
512 		rc = xen_intr_alloc_and_bind_ipi(dev, cpu, ipi->filter,
513 		    INTR_TYPE_TTY, &ipi_handle[idx]);
514 		if (rc != 0)
515 			panic("Unable to allocate a XEN IPI port");
516 		xen_intr_describe(ipi_handle[idx], "%s", ipi->description);
517 	}
518 }
519 
520 static void
521 xen_setup_cpus(void)
522 {
523 	int i;
524 
525 	if (!xen_hvm_domain() || !xen_vector_callback_enabled)
526 		return;
527 
528 #ifdef __amd64__
529 	if (pmap_pcid_enabled) {
530 		xen_ipis[IPI_TO_IDX(IPI_INVLTLB)].filter = xen_invltlb_pcid;
531 		xen_ipis[IPI_TO_IDX(IPI_INVLPG)].filter = xen_invlpg_pcid;
532 	}
533 #endif
534 	CPU_FOREACH(i)
535 		xen_cpu_ipi_init(i);
536 
537 	/* Set the xen pv ipi ops to replace the native ones */
538 	cpu_ops.ipi_vectored = xen_ipi_vectored;
539 }
540 #endif
541 
542 /*---------------------- XEN Hypervisor Probe and Setup ----------------------*/
543 static uint32_t
544 xen_hvm_cpuid_base(void)
545 {
546 	uint32_t base, regs[4];
547 
548 	for (base = 0x40000000; base < 0x40010000; base += 0x100) {
549 		do_cpuid(base, regs);
550 		if (!memcmp("XenVMMXenVMM", &regs[1], 12)
551 		    && (regs[0] - base) >= 2)
552 			return (base);
553 	}
554 	return (0);
555 }
556 
557 /*
558  * Allocate and fill in the hypcall page.
559  */
560 static int
561 xen_hvm_init_hypercall_stubs(void)
562 {
563 	uint32_t base, regs[4];
564 	int i;
565 
566 	base = xen_hvm_cpuid_base();
567 	if (base == 0)
568 		return (ENXIO);
569 
570 	if (hypercall_stubs == NULL) {
571 		do_cpuid(base + 1, regs);
572 		printf("XEN: Hypervisor version %d.%d detected.\n",
573 		    regs[0] >> 16, regs[0] & 0xffff);
574 	}
575 
576 	/*
577 	 * Find the hypercall pages.
578 	 */
579 	do_cpuid(base + 2, regs);
580 
581 	if (hypercall_stubs == NULL) {
582 		size_t call_region_size;
583 
584 		call_region_size = regs[0] * PAGE_SIZE;
585 		hypercall_stubs = malloc(call_region_size, M_XENHVM, M_NOWAIT);
586 		if (hypercall_stubs == NULL)
587 			panic("Unable to allocate Xen hypercall region");
588 	}
589 
590 	for (i = 0; i < regs[0]; i++)
591 		wrmsr(regs[1], vtophys(hypercall_stubs + i * PAGE_SIZE) + i);
592 
593 	return (0);
594 }
595 
596 static void
597 xen_hvm_init_shared_info_page(void)
598 {
599 	struct xen_add_to_physmap xatp;
600 
601 	if (HYPERVISOR_shared_info == NULL) {
602 		HYPERVISOR_shared_info = malloc(PAGE_SIZE, M_XENHVM, M_NOWAIT);
603 		if (HYPERVISOR_shared_info == NULL)
604 			panic("Unable to allocate Xen shared info page");
605 	}
606 
607 	xatp.domid = DOMID_SELF;
608 	xatp.idx = 0;
609 	xatp.space = XENMAPSPACE_shared_info;
610 	xatp.gpfn = vtophys(HYPERVISOR_shared_info) >> PAGE_SHIFT;
611 	if (HYPERVISOR_memory_op(XENMEM_add_to_physmap, &xatp))
612 		panic("HYPERVISOR_memory_op failed");
613 }
614 
615 /*
616  * Tell the hypervisor how to contact us for event channel callbacks.
617  */
618 void
619 xen_hvm_set_callback(device_t dev)
620 {
621 	struct xen_hvm_param xhp;
622 	int irq;
623 
624 	if (xen_vector_callback_enabled)
625 		return;
626 
627 	xhp.domid = DOMID_SELF;
628 	xhp.index = HVM_PARAM_CALLBACK_IRQ;
629 	if (xen_feature(XENFEAT_hvm_callback_vector) != 0) {
630 		int error;
631 
632 		xhp.value = HVM_CALLBACK_VECTOR(IDT_EVTCHN);
633 		error = HYPERVISOR_hvm_op(HVMOP_set_param, &xhp);
634 		if (error == 0) {
635 			xen_vector_callback_enabled = 1;
636 			return;
637 		}
638 		printf("Xen HVM callback vector registration failed (%d). "
639 		    "Falling back to emulated device interrupt\n", error);
640 	}
641 	xen_vector_callback_enabled = 0;
642 	if (dev == NULL) {
643 		/*
644 		 * Called from early boot or resume.
645 		 * xenpci will invoke us again later.
646 		 */
647 		return;
648 	}
649 
650 	irq = pci_get_irq(dev);
651 	if (irq < 16) {
652 		xhp.value = HVM_CALLBACK_GSI(irq);
653 	} else {
654 		u_int slot;
655 		u_int pin;
656 
657 		slot = pci_get_slot(dev);
658 		pin = pci_get_intpin(dev) - 1;
659 		xhp.value = HVM_CALLBACK_PCI_INTX(slot, pin);
660 	}
661 
662 	if (HYPERVISOR_hvm_op(HVMOP_set_param, &xhp) != 0)
663 		panic("Can't set evtchn callback");
664 }
665 
666 #define	XEN_MAGIC_IOPORT 0x10
667 enum {
668 	XMI_MAGIC			 = 0x49d2,
669 	XMI_UNPLUG_IDE_DISKS		 = 0x01,
670 	XMI_UNPLUG_NICS			 = 0x02,
671 	XMI_UNPLUG_IDE_EXCEPT_PRI_MASTER = 0x04
672 };
673 
674 static void
675 xen_hvm_disable_emulated_devices(void)
676 {
677 	if (inw(XEN_MAGIC_IOPORT) != XMI_MAGIC)
678 		return;
679 
680 	if (bootverbose)
681 		printf("XEN: Disabling emulated block and network devices\n");
682 	outw(XEN_MAGIC_IOPORT, XMI_UNPLUG_IDE_DISKS|XMI_UNPLUG_NICS);
683 }
684 
685 static void
686 xen_hvm_init(enum xen_hvm_init_type init_type)
687 {
688 	int error;
689 	int i;
690 
691 	if (init_type == XEN_HVM_INIT_CANCELLED_SUSPEND)
692 		return;
693 
694 	error = xen_hvm_init_hypercall_stubs();
695 
696 	switch (init_type) {
697 	case XEN_HVM_INIT_COLD:
698 		if (error != 0)
699 			return;
700 
701 		setup_xen_features();
702 		cpu_ops = xen_hvm_cpu_ops;
703  		vm_guest = VM_GUEST_XEN;
704 		break;
705 	case XEN_HVM_INIT_RESUME:
706 		if (error != 0)
707 			panic("Unable to init Xen hypercall stubs on resume");
708 
709 		/* Clear stale vcpu_info. */
710 		CPU_FOREACH(i)
711 			DPCPU_ID_SET(i, vcpu_info, NULL);
712 		break;
713 	default:
714 		panic("Unsupported HVM initialization type");
715 	}
716 
717 	xen_vector_callback_enabled = 0;
718 	xen_domain_type = XEN_HVM_DOMAIN;
719 	xen_hvm_init_shared_info_page();
720 	xen_hvm_set_callback(NULL);
721 	xen_hvm_disable_emulated_devices();
722 }
723 
724 void
725 xen_hvm_suspend(void)
726 {
727 }
728 
729 void
730 xen_hvm_resume(bool suspend_cancelled)
731 {
732 
733 	xen_hvm_init(suspend_cancelled ?
734 	    XEN_HVM_INIT_CANCELLED_SUSPEND : XEN_HVM_INIT_RESUME);
735 
736 	/* Register vcpu_info area for CPU#0. */
737 	xen_hvm_cpu_init();
738 }
739 
740 static void
741 xen_hvm_sysinit(void *arg __unused)
742 {
743 	xen_hvm_init(XEN_HVM_INIT_COLD);
744 }
745 
746 static void
747 xen_set_vcpu_id(void)
748 {
749 	struct pcpu *pc;
750 	int i;
751 
752 	/* Set vcpu_id to acpi_id */
753 	CPU_FOREACH(i) {
754 		pc = pcpu_find(i);
755 		pc->pc_vcpu_id = pc->pc_acpi_id;
756 		if (bootverbose)
757 			printf("XEN: CPU %u has VCPU ID %u\n",
758 			       i, pc->pc_vcpu_id);
759 	}
760 }
761 
762 static void
763 xen_hvm_cpu_init(void)
764 {
765 	struct vcpu_register_vcpu_info info;
766 	struct vcpu_info *vcpu_info;
767 	int cpu, rc;
768 
769 	if (!xen_domain())
770 		return;
771 
772 	if (DPCPU_GET(vcpu_info) != NULL) {
773 		/*
774 		 * vcpu_info is already set.  We're resuming
775 		 * from a failed migration and our pre-suspend
776 		 * configuration is still valid.
777 		 */
778 		return;
779 	}
780 
781 	vcpu_info = DPCPU_PTR(vcpu_local_info);
782 	cpu = PCPU_GET(vcpu_id);
783 	info.mfn = vtophys(vcpu_info) >> PAGE_SHIFT;
784 	info.offset = vtophys(vcpu_info) - trunc_page(vtophys(vcpu_info));
785 
786 	rc = HYPERVISOR_vcpu_op(VCPUOP_register_vcpu_info, cpu, &info);
787 	if (rc != 0)
788 		DPCPU_SET(vcpu_info, &HYPERVISOR_shared_info->vcpu_info[cpu]);
789 	else
790 		DPCPU_SET(vcpu_info, vcpu_info);
791 }
792 
793 SYSINIT(xen_hvm_init, SI_SUB_HYPERVISOR, SI_ORDER_FIRST, xen_hvm_sysinit, NULL);
794 #ifdef SMP
795 SYSINIT(xen_setup_cpus, SI_SUB_SMP, SI_ORDER_FIRST, xen_setup_cpus, NULL);
796 #endif
797 SYSINIT(xen_hvm_cpu_init, SI_SUB_INTR, SI_ORDER_FIRST, xen_hvm_cpu_init, NULL);
798 SYSINIT(xen_set_vcpu_id, SI_SUB_CPU, SI_ORDER_ANY, xen_set_vcpu_id, NULL);
799