xref: /illumos-gate/usr/src/uts/common/xen/io/evtchn_dev.c (revision 2f172c55ef76964744bc62b4500ece87f3089b4d)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 
28 /*
29  * evtchn.c
30  *
31  * Driver for receiving and demuxing event-channel signals.
32  *
33  * Copyright (c) 2004-2005, K A Fraser
34  * Multi-process extensions Copyright (c) 2004, Steven Smith
35  *
36  * This file may be distributed separately from the Linux kernel, or
37  * incorporated into other software packages, subject to the following license:
38  *
39  * Permission is hereby granted, free of charge, to any person obtaining a copy
40  * of this source file (the "Software"), to deal in the Software without
41  * restriction, including without limitation the rights to use, copy, modify,
42  * merge, publish, distribute, sublicense, and/or sell copies of the Software,
43  * and to permit persons to whom the Software is furnished to do so, subject to
44  * the following conditions:
45  *
46  * The above copyright notice and this permission notice shall be included in
47  * all copies or substantial portions of the Software.
48  *
49  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
50  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
51  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
52  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
53  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
54  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
55  * IN THE SOFTWARE.
56  */
57 
58 #include <sys/types.h>
59 #include <sys/hypervisor.h>
60 #include <sys/machsystm.h>
61 #include <sys/mutex.h>
62 #include <sys/evtchn_impl.h>
63 #include <sys/ddi_impldefs.h>
64 #include <sys/avintr.h>
65 #include <sys/cpuvar.h>
66 #include <sys/smp_impldefs.h>
67 #include <sys/archsystm.h>
68 #include <sys/sysmacros.h>
69 #include <sys/fcntl.h>
70 #include <sys/open.h>
71 #include <sys/stat.h>
72 #include <sys/psm.h>
73 #include <sys/cpu.h>
74 #include <sys/cmn_err.h>
75 #include <sys/xen_errno.h>
76 #include <sys/policy.h>
77 #include <xen/sys/evtchn.h>
78 
79 /* Some handy macros */
80 #define	EVTCHNDRV_MINOR2INST(minor)	((int)(minor))
81 #define	EVTCHNDRV_DEFAULT_NCLONES 	256
82 #define	EVTCHNDRV_INST2SOFTS(inst)	\
83 	(ddi_get_soft_state(evtchndrv_statep, (inst)))
84 
85 /* Soft state data structure for evtchn driver */
86 struct evtsoftdata {
87 	dev_info_t *dip;
88 	/* Notification ring, accessed via /dev/xen/evtchn. */
89 #define	EVTCHN_RING_SIZE	(PAGESIZE / sizeof (evtchn_port_t))
90 #define	EVTCHN_RING_MASK(_i)	((_i) & (EVTCHN_RING_SIZE - 1))
91 	evtchn_port_t *ring;
92 	unsigned int ring_cons, ring_prod, ring_overflow;
93 
94 	kcondvar_t evtchn_wait; /* Processes wait on this when ring is empty. */
95 	kmutex_t evtchn_lock;
96 	struct pollhead evtchn_pollhead;
97 
98 	pid_t pid;		/* last pid to bind to this event channel. */
99 	processorid_t cpu;	/* cpu thread/evtchn is bound to */
100 };
101 
102 static void *evtchndrv_statep;
103 int evtchndrv_nclones = EVTCHNDRV_DEFAULT_NCLONES;
104 static int *evtchndrv_clone_tab;
105 static dev_info_t *evtchndrv_dip;
106 static kmutex_t evtchndrv_clone_tab_mutex;
107 
108 static int evtchndrv_detach(dev_info_t *, ddi_detach_cmd_t);
109 
110 /* Who's bound to each port? */
111 static struct evtsoftdata *port_user[NR_EVENT_CHANNELS];
112 static kmutex_t port_user_lock;
113 
114 void
115 evtchn_device_upcall()
116 {
117 	struct evtsoftdata *ep;
118 	int port;
119 
120 	/*
121 	 * This is quite gross, we had to leave the evtchn that led to this
122 	 * invocation in a per-cpu mailbox, retrieve it now.
123 	 * We do this because the interface doesn't offer us a way to pass
124 	 * a dynamic argument up through the generic interrupt service layer.
125 	 * The mailbox is safe since we either run with interrupts disabled or
126 	 * non-preemptable till we reach here.
127 	 */
128 	port = CPU->cpu_m.mcpu_ec_mbox;
129 	ASSERT(port != 0);
130 	CPU->cpu_m.mcpu_ec_mbox = 0;
131 	ec_clear_evtchn(port);
132 	mutex_enter(&port_user_lock);
133 
134 	if ((ep = port_user[port]) != NULL) {
135 		mutex_enter(&ep->evtchn_lock);
136 		if ((ep->ring_prod - ep->ring_cons) < EVTCHN_RING_SIZE) {
137 			ep->ring[EVTCHN_RING_MASK(ep->ring_prod)] = port;
138 			/*
139 			 * Wake up reader when ring goes non-empty
140 			 */
141 			if (ep->ring_cons == ep->ring_prod++) {
142 				cv_signal(&ep->evtchn_wait);
143 				mutex_exit(&ep->evtchn_lock);
144 				pollwakeup(&ep->evtchn_pollhead,
145 				    POLLIN | POLLRDNORM);
146 				goto done;
147 			}
148 		} else {
149 			ep->ring_overflow = 1;
150 		}
151 		mutex_exit(&ep->evtchn_lock);
152 	}
153 
154 done:
155 	mutex_exit(&port_user_lock);
156 }
157 
158 /* ARGSUSED */
159 static int
160 evtchndrv_read(dev_t dev, struct uio *uio, cred_t *cr)
161 {
162 	int rc = 0;
163 	ssize_t count;
164 	unsigned int c, p, bytes1 = 0, bytes2 = 0;
165 	struct evtsoftdata *ep;
166 	minor_t minor = getminor(dev);
167 
168 	if (secpolicy_xvm_control(cr))
169 		return (EPERM);
170 
171 	ep = EVTCHNDRV_INST2SOFTS(EVTCHNDRV_MINOR2INST(minor));
172 
173 	/* Whole number of ports. */
174 	count = uio->uio_resid;
175 	count &= ~(sizeof (evtchn_port_t) - 1);
176 
177 	if (count == 0)
178 		return (0);
179 
180 	if (count > PAGESIZE)
181 		count = PAGESIZE;
182 
183 	mutex_enter(&ep->evtchn_lock);
184 	for (;;) {
185 		if (ep->ring_overflow) {
186 			rc = EFBIG;
187 			goto done;
188 		}
189 
190 		if ((c = ep->ring_cons) != (p = ep->ring_prod))
191 			break;
192 
193 		if (uio->uio_fmode & O_NONBLOCK) {
194 			rc = EAGAIN;
195 			goto done;
196 		}
197 
198 		if (cv_wait_sig(&ep->evtchn_wait, &ep->evtchn_lock) == 0) {
199 			rc = EINTR;
200 			goto done;
201 		}
202 	}
203 
204 	/* Byte lengths of two chunks. Chunk split (if any) is at ring wrap. */
205 	if (((c ^ p) & EVTCHN_RING_SIZE) != 0) {
206 		bytes1 = (EVTCHN_RING_SIZE - EVTCHN_RING_MASK(c)) *
207 		    sizeof (evtchn_port_t);
208 		bytes2 = EVTCHN_RING_MASK(p) * sizeof (evtchn_port_t);
209 	} else {
210 		bytes1 = (p - c) * sizeof (evtchn_port_t);
211 		bytes2 = 0;
212 	}
213 
214 	/* Truncate chunks according to caller's maximum byte count. */
215 	if (bytes1 > count) {
216 		bytes1 = count;
217 		bytes2 = 0;
218 	} else if ((bytes1 + bytes2) > count) {
219 		bytes2 = count - bytes1;
220 	}
221 
222 	if (uiomove(&ep->ring[EVTCHN_RING_MASK(c)], bytes1, UIO_READ, uio) ||
223 	    ((bytes2 != 0) && uiomove(&ep->ring[0], bytes2, UIO_READ, uio))) {
224 		rc = EFAULT;
225 		goto done;
226 	}
227 
228 	ep->ring_cons += (bytes1 + bytes2) / sizeof (evtchn_port_t);
229 done:
230 	mutex_exit(&ep->evtchn_lock);
231 	return (rc);
232 }
233 
234 /* ARGSUSED */
235 static int
236 evtchndrv_write(dev_t dev, struct uio *uio, cred_t *cr)
237 {
238 	int  rc, i;
239 	ssize_t count;
240 	evtchn_port_t *kbuf;
241 	struct evtsoftdata *ep;
242 	ulong_t flags;
243 	minor_t minor = getminor(dev);
244 	evtchn_port_t sbuf[32];
245 
246 	if (secpolicy_xvm_control(cr))
247 		return (EPERM);
248 
249 	ep = EVTCHNDRV_INST2SOFTS(EVTCHNDRV_MINOR2INST(minor));
250 
251 
252 	/* Whole number of ports. */
253 	count = uio->uio_resid;
254 	count &= ~(sizeof (evtchn_port_t) - 1);
255 
256 	if (count == 0)
257 		return (0);
258 
259 	if (count > PAGESIZE)
260 		count = PAGESIZE;
261 
262 	if (count <= sizeof (sbuf))
263 		kbuf = sbuf;
264 	else
265 		kbuf = kmem_alloc(PAGESIZE, KM_SLEEP);
266 	if ((rc = uiomove(kbuf, count, UIO_WRITE, uio)) != 0)
267 		goto out;
268 
269 	mutex_enter(&port_user_lock);
270 	for (i = 0; i < (count / sizeof (evtchn_port_t)); i++)
271 		if ((kbuf[i] < NR_EVENT_CHANNELS) &&
272 		    (port_user[kbuf[i]] == ep)) {
273 			flags = intr_clear();
274 			ec_unmask_evtchn(kbuf[i]);
275 			intr_restore(flags);
276 		}
277 	mutex_exit(&port_user_lock);
278 
279 out:
280 	if (kbuf != sbuf)
281 		kmem_free(kbuf, PAGESIZE);
282 	return (rc);
283 }
284 
285 static void
286 evtchn_bind_to_user(struct evtsoftdata *u, int port)
287 {
288 	ulong_t flags;
289 
290 	/*
291 	 * save away the PID of the last process to bind to this event channel.
292 	 * Useful for debugging.
293 	 */
294 	u->pid = ddi_get_pid();
295 
296 	mutex_enter(&port_user_lock);
297 	ASSERT(port_user[port] == NULL);
298 	port_user[port] = u;
299 	ec_irq_add_evtchn(ec_dev_irq, port);
300 	flags = intr_clear();
301 	ec_unmask_evtchn(port);
302 	intr_restore(flags);
303 	mutex_exit(&port_user_lock);
304 }
305 
306 static void
307 evtchndrv_close_evtchn(int port)
308 {
309 	struct evtsoftdata *ep;
310 
311 	ASSERT(MUTEX_HELD(&port_user_lock));
312 	ep = port_user[port];
313 	ASSERT(ep != NULL);
314 	(void) ec_mask_evtchn(port);
315 	/*
316 	 * It is possible the event is in transit to us.
317 	 * If it is already in the ring buffer, then a client may
318 	 * get a spurious event notification on the next read of
319 	 * of the evtchn device.  Clients will need to be able to
320 	 * handle getting a spurious event notification.
321 	 */
322 	port_user[port] = NULL;
323 	/*
324 	 * The event is masked and should stay so, clean it up.
325 	 */
326 	ec_irq_rm_evtchn(ec_dev_irq, port);
327 }
328 
329 /* ARGSUSED */
330 static int
331 evtchndrv_ioctl(dev_t dev, int cmd, intptr_t data, int flag, cred_t *cr,
332     int *rvalp)
333 {
334 	int err = 0;
335 	struct evtsoftdata *ep;
336 	minor_t minor = getminor(dev);
337 
338 	if (secpolicy_xvm_control(cr))
339 		return (EPERM);
340 
341 	ep = EVTCHNDRV_INST2SOFTS(EVTCHNDRV_MINOR2INST(minor));
342 
343 	*rvalp = 0;
344 
345 	switch (cmd) {
346 	case IOCTL_EVTCHN_BIND_VIRQ: {
347 		struct ioctl_evtchn_bind_virq bind;
348 
349 		if (copyin((void *)data, &bind, sizeof (bind))) {
350 			err = EFAULT;
351 			break;
352 		}
353 
354 		if ((err = xen_bind_virq(bind.virq, 0, rvalp)) != 0)
355 			break;
356 
357 		evtchn_bind_to_user(ep, *rvalp);
358 		break;
359 	}
360 
361 	case IOCTL_EVTCHN_BIND_INTERDOMAIN: {
362 		struct ioctl_evtchn_bind_interdomain bind;
363 
364 		if (copyin((void *)data, &bind, sizeof (bind))) {
365 			err = EFAULT;
366 			break;
367 		}
368 
369 		if ((err = xen_bind_interdomain(bind.remote_domain,
370 		    bind.remote_port, rvalp)) != 0)
371 			break;
372 
373 		ec_bind_vcpu(*rvalp, 0);
374 		evtchn_bind_to_user(ep, *rvalp);
375 		break;
376 	}
377 
378 	case IOCTL_EVTCHN_BIND_UNBOUND_PORT: {
379 		struct ioctl_evtchn_bind_unbound_port bind;
380 
381 		if (copyin((void *)data, &bind, sizeof (bind))) {
382 			err = EFAULT;
383 			break;
384 		}
385 
386 		if ((err = xen_alloc_unbound_evtchn(bind.remote_domain,
387 		    rvalp)) != 0)
388 			break;
389 
390 		evtchn_bind_to_user(ep, *rvalp);
391 		break;
392 	}
393 
394 	case IOCTL_EVTCHN_UNBIND: {
395 		struct ioctl_evtchn_unbind unbind;
396 
397 		if (copyin((void *)data, &unbind, sizeof (unbind))) {
398 			err = EFAULT;
399 			break;
400 		}
401 
402 		if (unbind.port >= NR_EVENT_CHANNELS) {
403 			err = EFAULT;
404 			break;
405 		}
406 
407 		mutex_enter(&port_user_lock);
408 
409 		if (port_user[unbind.port] != ep) {
410 			mutex_exit(&port_user_lock);
411 			err = ENOTCONN;
412 			break;
413 		}
414 
415 		evtchndrv_close_evtchn(unbind.port);
416 		mutex_exit(&port_user_lock);
417 		break;
418 	}
419 
420 	case IOCTL_EVTCHN_NOTIFY: {
421 		struct ioctl_evtchn_notify notify;
422 
423 		if (copyin((void *)data, &notify, sizeof (notify))) {
424 			err = EFAULT;
425 			break;
426 		}
427 
428 		if (notify.port >= NR_EVENT_CHANNELS) {
429 			err = EINVAL;
430 		} else if (port_user[notify.port] != ep) {
431 			err = ENOTCONN;
432 		} else {
433 			ec_notify_via_evtchn(notify.port);
434 		}
435 		break;
436 	}
437 
438 	default:
439 		err = ENOSYS;
440 	}
441 
442 	return (err);
443 }
444 
445 static int
446 evtchndrv_poll(dev_t dev, short ev, int anyyet, short *revp, pollhead_t **phpp)
447 {
448 	struct evtsoftdata *ep;
449 	minor_t minor = getminor(dev);
450 	short mask = 0;
451 
452 	ep = EVTCHNDRV_INST2SOFTS(EVTCHNDRV_MINOR2INST(minor));
453 	*phpp = (struct pollhead *)NULL;
454 
455 	if (ev & POLLOUT)
456 		mask |= POLLOUT;
457 	if (ep->ring_overflow)
458 		mask |= POLLERR;
459 	if (ev & (POLLIN | POLLRDNORM)) {
460 		mutex_enter(&ep->evtchn_lock);
461 		if (ep->ring_cons != ep->ring_prod)
462 			mask |= (POLLIN | POLLRDNORM) & ev;
463 		else
464 			if (mask == 0 && !anyyet)
465 				*phpp = &ep->evtchn_pollhead;
466 		mutex_exit(&ep->evtchn_lock);
467 	}
468 	*revp = mask;
469 	return (0);
470 }
471 
472 
473 /* ARGSUSED */
474 static int
475 evtchndrv_open(dev_t *devp, int flag, int otyp, cred_t *credp)
476 {
477 	struct evtsoftdata *ep;
478 	minor_t minor = getminor(*devp);
479 
480 	if (otyp == OTYP_BLK)
481 		return (ENXIO);
482 
483 	/*
484 	 * only allow open on minor = 0 - the clone device
485 	 */
486 	if (minor != 0)
487 		return (ENXIO);
488 
489 	/*
490 	 * find a free slot and grab it
491 	 */
492 	mutex_enter(&evtchndrv_clone_tab_mutex);
493 	for (minor = 1; minor < evtchndrv_nclones; minor++) {
494 		if (evtchndrv_clone_tab[minor] == 0) {
495 			evtchndrv_clone_tab[minor] = 1;
496 			break;
497 		}
498 	}
499 	mutex_exit(&evtchndrv_clone_tab_mutex);
500 	if (minor == evtchndrv_nclones)
501 		return (EAGAIN);
502 
503 	/* Allocate softstate structure */
504 	if (ddi_soft_state_zalloc(evtchndrv_statep,
505 	    EVTCHNDRV_MINOR2INST(minor)) != DDI_SUCCESS) {
506 		mutex_enter(&evtchndrv_clone_tab_mutex);
507 		evtchndrv_clone_tab[minor] = 0;
508 		mutex_exit(&evtchndrv_clone_tab_mutex);
509 		return (EAGAIN);
510 	}
511 	ep = EVTCHNDRV_INST2SOFTS(EVTCHNDRV_MINOR2INST(minor));
512 
513 	/* ... and init it */
514 	ep->dip = evtchndrv_dip;
515 
516 	cv_init(&ep->evtchn_wait, NULL, CV_DEFAULT, NULL);
517 	mutex_init(&ep->evtchn_lock, NULL, MUTEX_DEFAULT, NULL);
518 
519 	ep->ring = kmem_alloc(PAGESIZE, KM_SLEEP);
520 
521 	/* clone driver */
522 	*devp = makedevice(getmajor(*devp), minor);
523 
524 	return (0);
525 }
526 
527 /* ARGSUSED */
528 static int
529 evtchndrv_close(dev_t dev, int flag, int otyp, struct cred *credp)
530 {
531 	struct evtsoftdata *ep;
532 	minor_t minor = getminor(dev);
533 	int i;
534 
535 	ep = EVTCHNDRV_INST2SOFTS(EVTCHNDRV_MINOR2INST(minor));
536 	if (ep == NULL)
537 		return (ENXIO);
538 
539 	mutex_enter(&port_user_lock);
540 
541 
542 	for (i = 0; i < NR_EVENT_CHANNELS; i++) {
543 		if (port_user[i] != ep)
544 			continue;
545 
546 		evtchndrv_close_evtchn(i);
547 	}
548 
549 	mutex_exit(&port_user_lock);
550 
551 	kmem_free(ep->ring, PAGESIZE);
552 	ddi_soft_state_free(evtchndrv_statep, EVTCHNDRV_MINOR2INST(minor));
553 
554 	/*
555 	 * free clone tab slot
556 	 */
557 	mutex_enter(&evtchndrv_clone_tab_mutex);
558 	evtchndrv_clone_tab[minor] = 0;
559 	mutex_exit(&evtchndrv_clone_tab_mutex);
560 
561 	return (0);
562 }
563 
564 /* ARGSUSED */
565 static int
566 evtchndrv_info(dev_info_t *dip, ddi_info_cmd_t cmd, void *arg, void **result)
567 {
568 	dev_t	dev = (dev_t)arg;
569 	minor_t	minor = getminor(dev);
570 	int	retval;
571 
572 	switch (cmd) {
573 	case DDI_INFO_DEVT2DEVINFO:
574 		if (minor != 0 || evtchndrv_dip == NULL) {
575 			*result = (void *)NULL;
576 			retval = DDI_FAILURE;
577 		} else {
578 			*result = (void *)evtchndrv_dip;
579 			retval = DDI_SUCCESS;
580 		}
581 		break;
582 	case DDI_INFO_DEVT2INSTANCE:
583 		*result = (void *)0;
584 		retval = DDI_SUCCESS;
585 		break;
586 	default:
587 		retval = DDI_FAILURE;
588 	}
589 	return (retval);
590 }
591 
592 
593 static int
594 evtchndrv_attach(dev_info_t *dip, ddi_attach_cmd_t cmd)
595 {
596 	int	error;
597 	int	unit = ddi_get_instance(dip);
598 
599 
600 	switch (cmd) {
601 	case DDI_ATTACH:
602 		break;
603 	case DDI_RESUME:
604 		return (DDI_SUCCESS);
605 	default:
606 		cmn_err(CE_WARN, "evtchn_attach: unknown cmd 0x%x\n", cmd);
607 		return (DDI_FAILURE);
608 	}
609 
610 	/* DDI_ATTACH */
611 
612 	/*
613 	 * only one instance - but we clone using the open routine
614 	 */
615 	if (ddi_get_instance(dip) > 0)
616 		return (DDI_FAILURE);
617 
618 	mutex_init(&evtchndrv_clone_tab_mutex, NULL, MUTEX_DRIVER,
619 	    NULL);
620 
621 	error = ddi_create_minor_node(dip, "evtchn", S_IFCHR, unit,
622 	    DDI_PSEUDO, NULL);
623 	if (error != DDI_SUCCESS)
624 		goto fail;
625 
626 	/*
627 	 * save dip for getinfo
628 	 */
629 	evtchndrv_dip = dip;
630 	ddi_report_dev(dip);
631 
632 	mutex_init(&port_user_lock, NULL, MUTEX_DRIVER, NULL);
633 	(void) memset(port_user, 0, sizeof (port_user));
634 
635 	ec_dev_irq = ec_dev_alloc_irq();
636 	(void) add_avintr(NULL, IPL_EVTCHN, (avfunc)evtchn_device_upcall,
637 	    "evtchn_driver", ec_dev_irq, NULL, NULL, NULL, dip);
638 
639 	return (DDI_SUCCESS);
640 
641 fail:
642 	(void) evtchndrv_detach(dip, DDI_DETACH);
643 	return (error);
644 }
645 
646 /*ARGSUSED*/
647 static int
648 evtchndrv_detach(dev_info_t *dip, ddi_detach_cmd_t cmd)
649 {
650 	/*
651 	 * Don't allow detach for now.
652 	 */
653 	return (DDI_FAILURE);
654 }
655 
656 /* Solaris driver framework */
657 
658 static 	struct cb_ops evtchndrv_cb_ops = {
659 	evtchndrv_open,		/* cb_open */
660 	evtchndrv_close,	/* cb_close */
661 	nodev,			/* cb_strategy */
662 	nodev,			/* cb_print */
663 	nodev,			/* cb_dump */
664 	evtchndrv_read,		/* cb_read */
665 	evtchndrv_write,	/* cb_write */
666 	evtchndrv_ioctl,	/* cb_ioctl */
667 	nodev,			/* cb_devmap */
668 	nodev,			/* cb_mmap */
669 	nodev,			/* cb_segmap */
670 	evtchndrv_poll,		/* cb_chpoll */
671 	ddi_prop_op,		/* cb_prop_op */
672 	0,			/* cb_stream */
673 	D_NEW | D_MP | D_64BIT	/* cb_flag */
674 };
675 
676 static struct dev_ops evtchndrv_dev_ops = {
677 	DEVO_REV,		/* devo_rev */
678 	0,			/* devo_refcnt */
679 	evtchndrv_info,		/* devo_getinfo */
680 	nulldev,		/* devo_identify */
681 	nulldev,		/* devo_probe */
682 	evtchndrv_attach,	/* devo_attach */
683 	evtchndrv_detach,	/* devo_detach */
684 	nodev,			/* devo_reset */
685 	&evtchndrv_cb_ops,	/* devo_cb_ops */
686 	NULL,			/* devo_bus_ops */
687 	NULL,			/* power */
688 	ddi_quiesce_not_needed,		/* devo_quiesce */
689 };
690 
691 static struct modldrv modldrv = {
692 	&mod_driverops,		/* Type of module.  This one is a driver */
693 	"Evtchn driver",	/* Name of the module. */
694 	&evtchndrv_dev_ops	/* driver ops */
695 };
696 
697 static struct modlinkage modlinkage = {
698 	MODREV_1,
699 	&modldrv,
700 	NULL
701 };
702 
703 int
704 _init(void)
705 {
706 	int err;
707 
708 	err = ddi_soft_state_init(&evtchndrv_statep,
709 	    sizeof (struct evtsoftdata), 1);
710 	if (err)
711 		return (err);
712 
713 	err = mod_install(&modlinkage);
714 	if (err)
715 		ddi_soft_state_fini(&evtchndrv_statep);
716 	else
717 		evtchndrv_clone_tab = kmem_zalloc(
718 		    sizeof (int) * evtchndrv_nclones, KM_SLEEP);
719 	return (err);
720 }
721 
722 int
723 _fini(void)
724 {
725 	int e;
726 
727 	e = mod_remove(&modlinkage);
728 	if (e)
729 		return (e);
730 
731 	ddi_soft_state_fini(&evtchndrv_statep);
732 
733 	return (0);
734 }
735 
736 int
737 _info(struct modinfo *modinfop)
738 {
739 	return (mod_info(&modlinkage, modinfop));
740 }
741