2019-05-19 15:08:55 +03:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2007-07-18 05:37:05 +04:00
|
|
|
/*
|
|
|
|
* Xen event channels
|
|
|
|
*
|
|
|
|
* Xen models interrupts with abstract event channels. Because each
|
|
|
|
* domain gets 1024 event channels, but NR_IRQ is not that large, we
|
|
|
|
* must dynamically map irqs<->event channels. The event channels
|
|
|
|
* interface with the rest of the kernel by defining a xen interrupt
|
2011-03-31 05:57:33 +04:00
|
|
|
* chip. When an event is received, it is mapped to an irq and sent
|
2007-07-18 05:37:05 +04:00
|
|
|
* through the normal interrupt processing path.
|
|
|
|
*
|
|
|
|
* There are four kinds of events which can be mapped to an event
|
|
|
|
* channel:
|
|
|
|
*
|
|
|
|
* 1. Inter-domain notifications. This includes all the virtual
|
|
|
|
* device events, since they're driven by front-ends in another domain
|
|
|
|
* (typically dom0).
|
|
|
|
* 2. VIRQs, typically used for timers. These are per-cpu events.
|
|
|
|
* 3. IPIs.
|
2010-10-01 20:20:09 +04:00
|
|
|
* 4. PIRQs - Hardware interrupts.
|
2007-07-18 05:37:05 +04:00
|
|
|
*
|
|
|
|
* Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
|
|
|
|
*/
|
|
|
|
|
2013-06-28 14:21:41 +04:00
|
|
|
#define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
#include <linux/linkage.h>
|
|
|
|
#include <linux/interrupt.h>
|
|
|
|
#include <linux/irq.h>
|
2016-02-22 03:06:04 +03:00
|
|
|
#include <linux/moduleparam.h>
|
2007-07-18 05:37:05 +04:00
|
|
|
#include <linux/string.h>
|
2018-10-31 01:09:49 +03:00
|
|
|
#include <linux/memblock.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 11:04:11 +03:00
|
|
|
#include <linux/slab.h>
|
2010-06-08 00:28:49 +04:00
|
|
|
#include <linux/irqnr.h>
|
2010-10-11 18:30:09 +04:00
|
|
|
#include <linux/pci.h>
|
2020-09-07 16:47:27 +03:00
|
|
|
#include <linux/spinlock.h>
|
2020-09-13 15:23:02 +03:00
|
|
|
#include <linux/cpuhotplug.h>
|
2020-09-07 16:47:30 +03:00
|
|
|
#include <linux/atomic.h>
|
|
|
|
#include <linux/ktime.h>
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2012-09-14 17:37:32 +04:00
|
|
|
#ifdef CONFIG_X86
|
2010-05-14 15:40:51 +04:00
|
|
|
#include <asm/desc.h>
|
2007-07-18 05:37:05 +04:00
|
|
|
#include <asm/ptrace.h>
|
2020-05-21 23:05:44 +03:00
|
|
|
#include <asm/idtentry.h>
|
2007-07-18 05:37:05 +04:00
|
|
|
#include <asm/irq.h>
|
2010-10-18 18:41:08 +04:00
|
|
|
#include <asm/io_apic.h>
|
2015-11-20 19:25:04 +03:00
|
|
|
#include <asm/i8259.h>
|
2010-06-24 19:42:04 +04:00
|
|
|
#include <asm/xen/pci.h>
|
2012-09-14 17:37:32 +04:00
|
|
|
#endif
|
|
|
|
#include <asm/sync_bitops.h>
|
2007-07-18 05:37:05 +04:00
|
|
|
#include <asm/xen/hypercall.h>
|
2007-07-20 11:31:44 +04:00
|
|
|
#include <asm/xen/hypervisor.h>
|
2015-05-05 18:37:30 +03:00
|
|
|
#include <xen/page.h>
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2010-05-14 15:40:51 +04:00
|
|
|
#include <xen/xen.h>
|
|
|
|
#include <xen/hvm.h>
|
2008-04-02 21:53:55 +04:00
|
|
|
#include <xen/xen-ops.h>
|
2007-07-18 05:37:05 +04:00
|
|
|
#include <xen/events.h>
|
|
|
|
#include <xen/interface/xen.h>
|
|
|
|
#include <xen/interface/event_channel.h>
|
2010-05-14 15:40:51 +04:00
|
|
|
#include <xen/interface/hvm/hvm_op.h>
|
|
|
|
#include <xen/interface/hvm/params.h>
|
2012-09-14 17:37:32 +04:00
|
|
|
#include <xen/interface/physdev.h>
|
|
|
|
#include <xen/interface/sched.h>
|
2013-07-19 19:51:31 +04:00
|
|
|
#include <xen/interface/vcpu.h>
|
2021-02-11 13:16:13 +03:00
|
|
|
#include <xen/xenbus.h>
|
2012-09-14 17:37:32 +04:00
|
|
|
#include <asm/hw_irq.h>
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2013-03-13 19:29:25 +04:00
|
|
|
#include "events_internal.h"
|
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
#undef MODULE_PARAM_PREFIX
|
|
|
|
#define MODULE_PARAM_PREFIX "xen."
|
|
|
|
|
2020-10-22 12:49:04 +03:00
|
|
|
/* Interrupt types. */
|
|
|
|
enum xen_irq_type {
|
|
|
|
IRQT_UNBOUND = 0,
|
|
|
|
IRQT_PIRQ,
|
|
|
|
IRQT_VIRQ,
|
|
|
|
IRQT_IPI,
|
|
|
|
IRQT_EVTCHN
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Packed IRQ information:
|
|
|
|
* type - enum xen_irq_type
|
|
|
|
* event channel - irq->event channel mapping
|
|
|
|
* cpu - cpu this event channel is bound to
|
|
|
|
* index - type-specific information:
|
|
|
|
* PIRQ - vector, with MSB being "needs EIO", or physical IRQ of the HVM
|
|
|
|
* guest, or GSI (real passthrough IRQ) of the device.
|
|
|
|
* VIRQ - virq number
|
|
|
|
* IPI - IPI vector
|
|
|
|
* EVTCHN -
|
|
|
|
*/
|
|
|
|
struct irq_info {
|
|
|
|
struct list_head list;
|
|
|
|
struct list_head eoi_list;
|
|
|
|
short refcnt;
|
2020-12-10 22:26:04 +03:00
|
|
|
u8 spurious_cnt;
|
2020-12-10 22:26:05 +03:00
|
|
|
u8 is_accounted;
|
2021-03-06 19:18:32 +03:00
|
|
|
short type; /* type: IRQT_* */
|
|
|
|
u8 mask_reason; /* Why is event channel masked */
|
|
|
|
#define EVT_MASK_REASON_EXPLICIT 0x01
|
|
|
|
#define EVT_MASK_REASON_TEMPORARY 0x02
|
|
|
|
#define EVT_MASK_REASON_EOI_PENDING 0x04
|
2021-03-06 19:18:33 +03:00
|
|
|
u8 is_active; /* Is event just being handled? */
|
2020-10-22 12:49:04 +03:00
|
|
|
unsigned irq;
|
|
|
|
evtchn_port_t evtchn; /* event channel */
|
|
|
|
unsigned short cpu; /* cpu bound */
|
|
|
|
unsigned short eoi_cpu; /* EOI must happen on this cpu-1 */
|
|
|
|
unsigned int irq_epoch; /* If eoi_cpu valid: irq_epoch of event */
|
|
|
|
u64 eoi_time; /* Time in jiffies when to EOI. */
|
2021-04-06 13:51:04 +03:00
|
|
|
raw_spinlock_t lock;
|
2020-10-22 12:49:04 +03:00
|
|
|
|
|
|
|
union {
|
|
|
|
unsigned short virq;
|
|
|
|
enum ipi_vector ipi;
|
|
|
|
struct {
|
|
|
|
unsigned short pirq;
|
|
|
|
unsigned short gsi;
|
|
|
|
unsigned char vector;
|
|
|
|
unsigned char flags;
|
|
|
|
uint16_t domid;
|
|
|
|
} pirq;
|
2021-02-11 13:16:13 +03:00
|
|
|
struct xenbus_device *interdomain;
|
2020-10-22 12:49:04 +03:00
|
|
|
} u;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define PIRQ_NEEDS_EOI (1 << 0)
|
|
|
|
#define PIRQ_SHAREABLE (1 << 1)
|
|
|
|
#define PIRQ_MSI_GROUP (1 << 2)
|
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
static uint __read_mostly event_loop_timeout = 2;
|
|
|
|
module_param(event_loop_timeout, uint, 0644);
|
|
|
|
|
|
|
|
static uint __read_mostly event_eoi_delay = 10;
|
|
|
|
module_param(event_eoi_delay, uint, 0644);
|
|
|
|
|
2013-03-14 16:49:19 +04:00
|
|
|
const struct evtchn_ops *evtchn_ops;
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
/*
|
|
|
|
* This lock protects updates to the following mapping and reference-count
|
|
|
|
* arrays. The lock does not need to be acquired to read the mapping tables.
|
|
|
|
*/
|
2011-09-14 13:10:00 +04:00
|
|
|
static DEFINE_MUTEX(irq_mapping_update_lock);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
/*
|
|
|
|
* Lock protecting event handling loop against removing event channels.
|
|
|
|
* Adding of event channels is no issue as the associated IRQ becomes active
|
|
|
|
* only after everything is setup (before request_[threaded_]irq() the handler
|
|
|
|
* can't be entered for an event, as the event channel will be unmasked only
|
|
|
|
* then).
|
|
|
|
*/
|
|
|
|
static DEFINE_RWLOCK(evtchn_rwlock);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Lock hierarchy:
|
|
|
|
*
|
|
|
|
* irq_mapping_update_lock
|
|
|
|
* evtchn_rwlock
|
|
|
|
* IRQ-desc lock
|
2020-09-07 16:47:30 +03:00
|
|
|
* percpu eoi_list_lock
|
2021-03-06 19:18:32 +03:00
|
|
|
* irq_info->lock
|
2020-09-07 16:47:27 +03:00
|
|
|
*/
|
|
|
|
|
2011-03-10 19:08:11 +03:00
|
|
|
static LIST_HEAD(xen_irq_list_head);
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
/* IRQ <-> VIRQ mapping. */
|
2009-06-24 10:13:45 +04:00
|
|
|
static DEFINE_PER_CPU(int [NR_VIRQS], virq_to_irq) = {[0 ... NR_VIRQS-1] = -1};
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2007-07-18 05:37:06 +04:00
|
|
|
/* IRQ <-> IPI mapping */
|
2009-06-24 10:13:45 +04:00
|
|
|
static DEFINE_PER_CPU(int [XEN_NR_IPIS], ipi_to_irq) = {[0 ... XEN_NR_IPIS-1] = -1};
|
2007-07-18 05:37:06 +04:00
|
|
|
|
2020-12-10 22:26:05 +03:00
|
|
|
/* Event channel distribution data */
|
|
|
|
static atomic_t channels_on_cpu[NR_CPUS];
|
|
|
|
|
2020-10-22 12:49:04 +03:00
|
|
|
static int **evtchn_to_irq;
|
2012-10-17 12:39:12 +04:00
|
|
|
#ifdef CONFIG_X86
|
2012-01-30 20:21:48 +04:00
|
|
|
static unsigned long *pirq_eoi_map;
|
2012-10-17 12:39:12 +04:00
|
|
|
#endif
|
2012-01-30 20:21:48 +04:00
|
|
|
static bool (*pirq_needs_eoi)(unsigned irq);
|
2009-08-13 23:50:37 +04:00
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
#define EVTCHN_ROW(e) (e / (PAGE_SIZE/sizeof(**evtchn_to_irq)))
|
|
|
|
#define EVTCHN_COL(e) (e % (PAGE_SIZE/sizeof(**evtchn_to_irq)))
|
|
|
|
#define EVTCHN_PER_ROW (PAGE_SIZE / sizeof(**evtchn_to_irq))
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
/* Xen will never allocate port zero for any purpose. */
|
|
|
|
#define VALID_EVTCHN(chn) ((chn) != 0)
|
|
|
|
|
2020-09-30 12:16:14 +03:00
|
|
|
static struct irq_info *legacy_info_ptrs[NR_IRQS_LEGACY];
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
static struct irq_chip xen_dynamic_chip;
|
2020-09-07 16:47:27 +03:00
|
|
|
static struct irq_chip xen_lateeoi_chip;
|
2010-08-21 05:57:53 +04:00
|
|
|
static struct irq_chip xen_percpu_chip;
|
2010-10-01 20:20:09 +04:00
|
|
|
static struct irq_chip xen_pirq_chip;
|
2011-05-06 15:27:50 +04:00
|
|
|
static void enable_dynirq(struct irq_data *data);
|
|
|
|
static void disable_dynirq(struct irq_data *data);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
static DEFINE_PER_CPU(unsigned int, irq_epoch);
|
|
|
|
|
2021-08-12 16:09:27 +03:00
|
|
|
static void clear_evtchn_to_irq_row(int *evtchn_row)
|
2013-10-17 18:23:15 +04:00
|
|
|
{
|
|
|
|
unsigned col;
|
|
|
|
|
|
|
|
for (col = 0; col < EVTCHN_PER_ROW; col++)
|
2021-08-12 16:09:27 +03:00
|
|
|
WRITE_ONCE(evtchn_row[col], -1);
|
2013-10-17 18:23:15 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void clear_evtchn_to_irq_all(void)
|
|
|
|
{
|
|
|
|
unsigned row;
|
|
|
|
|
|
|
|
for (row = 0; row < EVTCHN_ROW(xen_evtchn_max_channels()); row++) {
|
|
|
|
if (evtchn_to_irq[row] == NULL)
|
|
|
|
continue;
|
2021-08-12 16:09:27 +03:00
|
|
|
clear_evtchn_to_irq_row(evtchn_to_irq[row]);
|
2013-10-17 18:23:15 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-23 19:15:11 +03:00
|
|
|
static int set_evtchn_to_irq(evtchn_port_t evtchn, unsigned int irq)
|
2013-10-17 18:23:15 +04:00
|
|
|
{
|
|
|
|
unsigned row;
|
|
|
|
unsigned col;
|
2021-08-12 16:09:27 +03:00
|
|
|
int *evtchn_row;
|
2013-10-17 18:23:15 +04:00
|
|
|
|
|
|
|
if (evtchn >= xen_evtchn_max_channels())
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
row = EVTCHN_ROW(evtchn);
|
|
|
|
col = EVTCHN_COL(evtchn);
|
|
|
|
|
|
|
|
if (evtchn_to_irq[row] == NULL) {
|
|
|
|
/* Unallocated irq entries return -1 anyway */
|
|
|
|
if (irq == -1)
|
|
|
|
return 0;
|
|
|
|
|
2021-08-12 16:09:27 +03:00
|
|
|
evtchn_row = (int *) __get_free_pages(GFP_KERNEL, 0);
|
|
|
|
if (evtchn_row == NULL)
|
2013-10-17 18:23:15 +04:00
|
|
|
return -ENOMEM;
|
|
|
|
|
2021-08-12 16:09:27 +03:00
|
|
|
clear_evtchn_to_irq_row(evtchn_row);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We've prepared an empty row for the mapping. If a different
|
|
|
|
* thread was faster inserting it, we can drop ours.
|
|
|
|
*/
|
|
|
|
if (cmpxchg(&evtchn_to_irq[row], NULL, evtchn_row) != NULL)
|
|
|
|
free_page((unsigned long) evtchn_row);
|
2013-10-17 18:23:15 +04:00
|
|
|
}
|
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
WRITE_ONCE(evtchn_to_irq[row][col], irq);
|
2013-10-17 18:23:15 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-03-23 19:15:11 +03:00
|
|
|
int get_evtchn_to_irq(evtchn_port_t evtchn)
|
2013-10-17 18:23:15 +04:00
|
|
|
{
|
|
|
|
if (evtchn >= xen_evtchn_max_channels())
|
|
|
|
return -1;
|
|
|
|
if (evtchn_to_irq[EVTCHN_ROW(evtchn)] == NULL)
|
|
|
|
return -1;
|
2020-09-07 16:47:27 +03:00
|
|
|
return READ_ONCE(evtchn_to_irq[EVTCHN_ROW(evtchn)][EVTCHN_COL(evtchn)]);
|
2013-10-17 18:23:15 +04:00
|
|
|
}
|
|
|
|
|
2011-03-10 19:08:09 +03:00
|
|
|
/* Get info for IRQ */
|
2020-10-22 12:49:04 +03:00
|
|
|
static struct irq_info *info_for_irq(unsigned irq)
|
2009-02-07 01:09:44 +03:00
|
|
|
{
|
2020-09-30 12:16:14 +03:00
|
|
|
if (irq < nr_legacy_irqs())
|
|
|
|
return legacy_info_ptrs[irq];
|
|
|
|
else
|
|
|
|
return irq_get_chip_data(irq);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void set_info_for_irq(unsigned int irq, struct irq_info *info)
|
|
|
|
{
|
|
|
|
if (irq < nr_legacy_irqs())
|
|
|
|
legacy_info_ptrs[irq] = info;
|
|
|
|
else
|
|
|
|
irq_set_chip_data(irq, info);
|
2009-02-07 01:09:44 +03:00
|
|
|
}
|
|
|
|
|
2020-12-10 22:26:05 +03:00
|
|
|
/* Per CPU channel accounting */
|
|
|
|
static void channels_on_cpu_dec(struct irq_info *info)
|
|
|
|
{
|
|
|
|
if (!info->is_accounted)
|
|
|
|
return;
|
|
|
|
|
|
|
|
info->is_accounted = 0;
|
|
|
|
|
|
|
|
if (WARN_ON_ONCE(info->cpu >= nr_cpu_ids))
|
|
|
|
return;
|
|
|
|
|
|
|
|
WARN_ON_ONCE(!atomic_add_unless(&channels_on_cpu[info->cpu], -1 , 0));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void channels_on_cpu_inc(struct irq_info *info)
|
|
|
|
{
|
|
|
|
if (WARN_ON_ONCE(info->cpu >= nr_cpu_ids))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (WARN_ON_ONCE(!atomic_add_unless(&channels_on_cpu[info->cpu], 1,
|
|
|
|
INT_MAX)))
|
|
|
|
return;
|
|
|
|
|
|
|
|
info->is_accounted = 1;
|
|
|
|
}
|
|
|
|
|
2011-03-10 19:08:09 +03:00
|
|
|
/* Constructors for packed IRQ information. */
|
2013-03-18 19:50:17 +04:00
|
|
|
static int xen_irq_info_common_setup(struct irq_info *info,
|
2011-03-10 19:08:10 +03:00
|
|
|
unsigned irq,
|
2011-03-10 19:08:09 +03:00
|
|
|
enum xen_irq_type type,
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn,
|
2011-03-10 19:08:09 +03:00
|
|
|
unsigned short cpu)
|
2009-02-07 01:09:44 +03:00
|
|
|
{
|
2013-10-17 18:23:15 +04:00
|
|
|
int ret;
|
2011-03-10 19:08:09 +03:00
|
|
|
|
|
|
|
BUG_ON(info->type != IRQT_UNBOUND && info->type != type);
|
|
|
|
|
|
|
|
info->type = type;
|
2011-03-10 19:08:11 +03:00
|
|
|
info->irq = irq;
|
2011-03-10 19:08:09 +03:00
|
|
|
info->evtchn = evtchn;
|
|
|
|
info->cpu = cpu;
|
2021-03-06 19:18:32 +03:00
|
|
|
info->mask_reason = EVT_MASK_REASON_EXPLICIT;
|
2021-04-06 13:51:04 +03:00
|
|
|
raw_spin_lock_init(&info->lock);
|
2011-03-10 19:08:10 +03:00
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
ret = set_evtchn_to_irq(evtchn, irq);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2013-04-30 21:29:13 +04:00
|
|
|
|
|
|
|
irq_clear_status_flags(irq, IRQ_NOREQUEST|IRQ_NOAUTOEN);
|
2013-03-18 19:50:17 +04:00
|
|
|
|
2020-10-22 12:49:04 +03:00
|
|
|
return xen_evtchn_port_setup(evtchn);
|
2009-02-07 01:09:44 +03:00
|
|
|
}
|
|
|
|
|
2013-03-18 19:50:17 +04:00
|
|
|
static int xen_irq_info_evtchn_setup(unsigned irq,
|
2021-02-11 13:16:13 +03:00
|
|
|
evtchn_port_t evtchn,
|
|
|
|
struct xenbus_device *dev)
|
2009-02-07 01:09:44 +03:00
|
|
|
{
|
2011-03-10 19:08:09 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2021-02-11 13:16:13 +03:00
|
|
|
int ret;
|
2011-03-10 19:08:09 +03:00
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
ret = xen_irq_info_common_setup(info, irq, IRQT_EVTCHN, evtchn, 0);
|
|
|
|
info->u.interdomain = dev;
|
2021-02-19 18:40:28 +03:00
|
|
|
if (dev)
|
|
|
|
atomic_inc(&dev->event_channels);
|
2021-02-11 13:16:13 +03:00
|
|
|
|
|
|
|
return ret;
|
2009-02-07 01:09:44 +03:00
|
|
|
}
|
|
|
|
|
2013-03-18 19:50:17 +04:00
|
|
|
static int xen_irq_info_ipi_setup(unsigned cpu,
|
2011-03-10 19:08:10 +03:00
|
|
|
unsigned irq,
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn,
|
2011-03-10 19:08:09 +03:00
|
|
|
enum ipi_vector ipi)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2011-03-10 19:08:09 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
|
|
|
|
info->u.ipi = ipi;
|
2011-03-10 19:08:10 +03:00
|
|
|
|
|
|
|
per_cpu(ipi_to_irq, cpu)[ipi] = irq;
|
2013-03-18 19:50:17 +04:00
|
|
|
|
|
|
|
return xen_irq_info_common_setup(info, irq, IRQT_IPI, evtchn, 0);
|
2009-02-07 01:09:44 +03:00
|
|
|
}
|
|
|
|
|
2013-03-18 19:50:17 +04:00
|
|
|
static int xen_irq_info_virq_setup(unsigned cpu,
|
2011-03-10 19:08:10 +03:00
|
|
|
unsigned irq,
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn,
|
2013-10-17 18:23:15 +04:00
|
|
|
unsigned virq)
|
2009-02-07 01:09:44 +03:00
|
|
|
{
|
2011-03-10 19:08:09 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
|
|
|
|
info->u.virq = virq;
|
2011-03-10 19:08:10 +03:00
|
|
|
|
|
|
|
per_cpu(virq_to_irq, cpu)[virq] = irq;
|
2013-03-18 19:50:17 +04:00
|
|
|
|
|
|
|
return xen_irq_info_common_setup(info, irq, IRQT_VIRQ, evtchn, 0);
|
2009-02-07 01:09:44 +03:00
|
|
|
}
|
|
|
|
|
2013-03-18 19:50:17 +04:00
|
|
|
static int xen_irq_info_pirq_setup(unsigned irq,
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn,
|
2013-10-17 18:23:15 +04:00
|
|
|
unsigned pirq,
|
|
|
|
unsigned gsi,
|
2011-04-14 19:17:36 +04:00
|
|
|
uint16_t domid,
|
2011-03-10 19:08:09 +03:00
|
|
|
unsigned char flags)
|
2009-02-07 01:09:44 +03:00
|
|
|
{
|
2011-03-10 19:08:09 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
|
|
|
|
info->u.pirq.pirq = pirq;
|
|
|
|
info->u.pirq.gsi = gsi;
|
2011-04-14 19:17:36 +04:00
|
|
|
info->u.pirq.domid = domid;
|
2011-03-10 19:08:09 +03:00
|
|
|
info->u.pirq.flags = flags;
|
2013-03-18 19:50:17 +04:00
|
|
|
|
|
|
|
return xen_irq_info_common_setup(info, irq, IRQT_PIRQ, evtchn, 0);
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
static void xen_irq_info_cleanup(struct irq_info *info)
|
|
|
|
{
|
|
|
|
set_evtchn_to_irq(info->evtchn, -1);
|
2021-03-06 19:18:31 +03:00
|
|
|
xen_evtchn_port_remove(info->evtchn, info->cpu);
|
2013-10-17 18:23:15 +04:00
|
|
|
info->evtchn = 0;
|
2020-12-10 22:26:05 +03:00
|
|
|
channels_on_cpu_dec(info);
|
2013-10-17 18:23:15 +04:00
|
|
|
}
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
/*
|
|
|
|
* Accessors for packed IRQ information.
|
|
|
|
*/
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn_from_irq(unsigned irq)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2020-09-07 16:47:27 +03:00
|
|
|
const struct irq_info *info = NULL;
|
|
|
|
|
|
|
|
if (likely(irq < nr_irqs))
|
|
|
|
info = info_for_irq(irq);
|
|
|
|
if (!info)
|
2011-01-07 09:50:12 +03:00
|
|
|
return 0;
|
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
return info->evtchn;
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2020-03-23 19:15:11 +03:00
|
|
|
unsigned int irq_from_evtchn(evtchn_port_t evtchn)
|
2009-02-07 06:20:31 +03:00
|
|
|
{
|
2013-10-17 18:23:15 +04:00
|
|
|
return get_evtchn_to_irq(evtchn);
|
2009-02-07 06:20:31 +03:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(irq_from_evtchn);
|
|
|
|
|
2013-03-13 19:29:25 +04:00
|
|
|
int irq_from_virq(unsigned int cpu, unsigned int virq)
|
|
|
|
{
|
|
|
|
return per_cpu(virq_to_irq, cpu)[virq];
|
|
|
|
}
|
|
|
|
|
2009-02-07 01:09:44 +03:00
|
|
|
static enum ipi_vector ipi_from_irq(unsigned irq)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2009-02-07 01:09:44 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
|
|
|
|
BUG_ON(info == NULL);
|
|
|
|
BUG_ON(info->type != IRQT_IPI);
|
|
|
|
|
|
|
|
return info->u.ipi;
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned virq_from_irq(unsigned irq)
|
|
|
|
{
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
|
|
|
|
BUG_ON(info == NULL);
|
|
|
|
BUG_ON(info->type != IRQT_VIRQ);
|
|
|
|
|
|
|
|
return info->u.virq;
|
|
|
|
}
|
|
|
|
|
2010-07-01 20:08:14 +04:00
|
|
|
static unsigned pirq_from_irq(unsigned irq)
|
|
|
|
{
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
|
|
|
|
BUG_ON(info == NULL);
|
|
|
|
BUG_ON(info->type != IRQT_PIRQ);
|
|
|
|
|
|
|
|
return info->u.pirq.pirq;
|
|
|
|
}
|
|
|
|
|
2009-02-07 01:09:44 +03:00
|
|
|
static enum xen_irq_type type_from_irq(unsigned irq)
|
|
|
|
{
|
|
|
|
return info_for_irq(irq)->type;
|
|
|
|
}
|
|
|
|
|
2020-10-22 12:49:04 +03:00
|
|
|
static unsigned cpu_from_irq(unsigned irq)
|
2009-02-07 01:09:44 +03:00
|
|
|
{
|
|
|
|
return info_for_irq(irq)->cpu;
|
|
|
|
}
|
|
|
|
|
2020-03-23 19:15:11 +03:00
|
|
|
unsigned int cpu_from_evtchn(evtchn_port_t evtchn)
|
2009-02-07 01:09:44 +03:00
|
|
|
{
|
2013-10-17 18:23:15 +04:00
|
|
|
int irq = get_evtchn_to_irq(evtchn);
|
2009-02-07 01:09:44 +03:00
|
|
|
unsigned ret = 0;
|
|
|
|
|
|
|
|
if (irq != -1)
|
|
|
|
ret = cpu_from_irq(irq);
|
|
|
|
|
|
|
|
return ret;
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2021-03-06 19:18:32 +03:00
|
|
|
static void do_mask(struct irq_info *info, u8 reason)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
2021-04-06 13:51:04 +03:00
|
|
|
raw_spin_lock_irqsave(&info->lock, flags);
|
2021-03-06 19:18:32 +03:00
|
|
|
|
|
|
|
if (!info->mask_reason)
|
|
|
|
mask_evtchn(info->evtchn);
|
|
|
|
|
|
|
|
info->mask_reason |= reason;
|
|
|
|
|
2021-04-06 13:51:04 +03:00
|
|
|
raw_spin_unlock_irqrestore(&info->lock, flags);
|
2021-03-06 19:18:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void do_unmask(struct irq_info *info, u8 reason)
|
|
|
|
{
|
|
|
|
unsigned long flags;
|
|
|
|
|
2021-04-06 13:51:04 +03:00
|
|
|
raw_spin_lock_irqsave(&info->lock, flags);
|
2021-03-06 19:18:32 +03:00
|
|
|
|
|
|
|
info->mask_reason &= ~reason;
|
|
|
|
|
|
|
|
if (!info->mask_reason)
|
|
|
|
unmask_evtchn(info->evtchn);
|
|
|
|
|
2021-04-06 13:51:04 +03:00
|
|
|
raw_spin_unlock_irqrestore(&info->lock, flags);
|
2021-03-06 19:18:32 +03:00
|
|
|
}
|
|
|
|
|
2012-10-17 12:39:12 +04:00
|
|
|
#ifdef CONFIG_X86
|
2012-01-30 20:21:48 +04:00
|
|
|
static bool pirq_check_eoi_map(unsigned irq)
|
2010-10-01 20:20:09 +04:00
|
|
|
{
|
2012-04-25 19:11:38 +04:00
|
|
|
return test_bit(pirq_from_irq(irq), pirq_eoi_map);
|
2012-01-30 20:21:48 +04:00
|
|
|
}
|
2012-10-17 12:39:12 +04:00
|
|
|
#endif
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2012-01-30 20:21:48 +04:00
|
|
|
static bool pirq_needs_eoi_flag(unsigned irq)
|
|
|
|
{
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2010-10-01 20:20:09 +04:00
|
|
|
BUG_ON(info->type != IRQT_PIRQ);
|
|
|
|
|
|
|
|
return info->u.pirq.flags & PIRQ_NEEDS_EOI;
|
|
|
|
}
|
|
|
|
|
2020-12-10 22:26:03 +03:00
|
|
|
static void bind_evtchn_to_cpu(evtchn_port_t evtchn, unsigned int cpu,
|
|
|
|
bool force_affinity)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2020-03-23 19:15:11 +03:00
|
|
|
int irq = get_evtchn_to_irq(evtchn);
|
2013-03-13 19:29:25 +04:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
|
|
|
BUG_ON(irq == -1);
|
2020-12-10 22:26:03 +03:00
|
|
|
|
|
|
|
if (IS_ENABLED(CONFIG_SMP) && force_affinity) {
|
|
|
|
cpumask_copy(irq_get_affinity_mask(irq), cpumask_of(cpu));
|
|
|
|
cpumask_copy(irq_get_effective_affinity_mask(irq),
|
|
|
|
cpumask_of(cpu));
|
|
|
|
}
|
|
|
|
|
2020-10-22 12:49:04 +03:00
|
|
|
xen_evtchn_port_bind_to_cpu(evtchn, cpu, info->cpu);
|
2008-08-21 04:02:18 +04:00
|
|
|
|
2020-12-10 22:26:05 +03:00
|
|
|
channels_on_cpu_dec(info);
|
2013-03-13 19:29:25 +04:00
|
|
|
info->cpu = cpu;
|
2020-12-10 22:26:05 +03:00
|
|
|
channels_on_cpu_inc(info);
|
2013-03-07 19:50:27 +04:00
|
|
|
}
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
/**
|
|
|
|
* notify_remote_via_irq - send event to remote end of event channel via irq
|
|
|
|
* @irq: irq of event channel to send event to
|
|
|
|
*
|
|
|
|
* Unlike notify_remote_via_evtchn(), this is safe to use across
|
|
|
|
* save/restore. Notifications on a broken connection are silently
|
|
|
|
* dropped.
|
|
|
|
*/
|
|
|
|
void notify_remote_via_irq(int irq)
|
|
|
|
{
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn = evtchn_from_irq(irq);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn))
|
|
|
|
notify_remote_via_evtchn(evtchn);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(notify_remote_via_irq);
|
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
struct lateeoi_work {
|
|
|
|
struct delayed_work delayed;
|
|
|
|
spinlock_t eoi_list_lock;
|
|
|
|
struct list_head eoi_list;
|
|
|
|
};
|
|
|
|
|
|
|
|
static DEFINE_PER_CPU(struct lateeoi_work, lateeoi);
|
|
|
|
|
|
|
|
static void lateeoi_list_del(struct irq_info *info)
|
|
|
|
{
|
|
|
|
struct lateeoi_work *eoi = &per_cpu(lateeoi, info->eoi_cpu);
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&eoi->eoi_list_lock, flags);
|
|
|
|
list_del_init(&info->eoi_list);
|
|
|
|
spin_unlock_irqrestore(&eoi->eoi_list_lock, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void lateeoi_list_add(struct irq_info *info)
|
|
|
|
{
|
|
|
|
struct lateeoi_work *eoi = &per_cpu(lateeoi, info->eoi_cpu);
|
|
|
|
struct irq_info *elem;
|
|
|
|
u64 now = get_jiffies_64();
|
|
|
|
unsigned long delay;
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
if (now < info->eoi_time)
|
|
|
|
delay = info->eoi_time - now;
|
|
|
|
else
|
|
|
|
delay = 1;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&eoi->eoi_list_lock, flags);
|
|
|
|
|
|
|
|
if (list_empty(&eoi->eoi_list)) {
|
|
|
|
list_add(&info->eoi_list, &eoi->eoi_list);
|
|
|
|
mod_delayed_work_on(info->eoi_cpu, system_wq,
|
|
|
|
&eoi->delayed, delay);
|
|
|
|
} else {
|
|
|
|
list_for_each_entry_reverse(elem, &eoi->eoi_list, eoi_list) {
|
|
|
|
if (elem->eoi_time <= info->eoi_time)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
list_add(&info->eoi_list, &elem->eoi_list);
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_unlock_irqrestore(&eoi->eoi_list_lock, flags);
|
|
|
|
}
|
|
|
|
|
2020-09-14 15:01:02 +03:00
|
|
|
static void xen_irq_lateeoi_locked(struct irq_info *info, bool spurious)
|
2020-09-07 16:47:27 +03:00
|
|
|
{
|
|
|
|
evtchn_port_t evtchn;
|
2020-09-07 16:47:30 +03:00
|
|
|
unsigned int cpu;
|
2020-09-14 15:01:02 +03:00
|
|
|
unsigned int delay = 0;
|
2020-09-07 16:47:27 +03:00
|
|
|
|
|
|
|
evtchn = info->evtchn;
|
2020-09-07 16:47:30 +03:00
|
|
|
if (!VALID_EVTCHN(evtchn) || !list_empty(&info->eoi_list))
|
2020-09-07 16:47:27 +03:00
|
|
|
return;
|
|
|
|
|
2020-09-14 15:01:02 +03:00
|
|
|
if (spurious) {
|
2021-02-19 18:40:28 +03:00
|
|
|
struct xenbus_device *dev = info->u.interdomain;
|
|
|
|
unsigned int threshold = 1;
|
|
|
|
|
|
|
|
if (dev && dev->spurious_threshold)
|
|
|
|
threshold = dev->spurious_threshold;
|
|
|
|
|
2020-12-10 22:26:04 +03:00
|
|
|
if ((1 << info->spurious_cnt) < (HZ << 2)) {
|
|
|
|
if (info->spurious_cnt != 0xFF)
|
|
|
|
info->spurious_cnt++;
|
|
|
|
}
|
2021-02-19 18:40:28 +03:00
|
|
|
if (info->spurious_cnt > threshold) {
|
|
|
|
delay = 1 << (info->spurious_cnt - 1 - threshold);
|
2020-09-14 15:01:02 +03:00
|
|
|
if (delay > HZ)
|
|
|
|
delay = HZ;
|
|
|
|
if (!info->eoi_time)
|
|
|
|
info->eoi_cpu = smp_processor_id();
|
|
|
|
info->eoi_time = get_jiffies_64() + delay;
|
2021-02-19 18:40:28 +03:00
|
|
|
if (dev)
|
|
|
|
atomic_add(delay, &dev->jiffies_eoi_delayed);
|
2020-09-14 15:01:02 +03:00
|
|
|
}
|
2021-02-19 18:40:28 +03:00
|
|
|
if (dev)
|
|
|
|
atomic_inc(&dev->spurious_events);
|
2020-09-14 15:01:02 +03:00
|
|
|
} else {
|
|
|
|
info->spurious_cnt = 0;
|
|
|
|
}
|
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
cpu = info->eoi_cpu;
|
2020-09-14 15:01:02 +03:00
|
|
|
if (info->eoi_time &&
|
|
|
|
(info->irq_epoch == per_cpu(irq_epoch, cpu) || delay)) {
|
2020-09-07 16:47:30 +03:00
|
|
|
lateeoi_list_add(info);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
info->eoi_time = 0;
|
2021-06-23 16:09:13 +03:00
|
|
|
|
|
|
|
/* is_active hasn't been reset yet, do it now. */
|
|
|
|
smp_store_release(&info->is_active, 0);
|
2021-03-06 19:18:32 +03:00
|
|
|
do_unmask(info, EVT_MASK_REASON_EOI_PENDING);
|
2020-09-07 16:47:27 +03:00
|
|
|
}
|
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
static void xen_irq_lateeoi_worker(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct lateeoi_work *eoi;
|
|
|
|
struct irq_info *info;
|
|
|
|
u64 now = get_jiffies_64();
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
eoi = container_of(to_delayed_work(work), struct lateeoi_work, delayed);
|
|
|
|
|
|
|
|
read_lock_irqsave(&evtchn_rwlock, flags);
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
spin_lock(&eoi->eoi_list_lock);
|
|
|
|
|
|
|
|
info = list_first_entry_or_null(&eoi->eoi_list, struct irq_info,
|
|
|
|
eoi_list);
|
|
|
|
|
|
|
|
if (info == NULL || now < info->eoi_time) {
|
|
|
|
spin_unlock(&eoi->eoi_list_lock);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
list_del_init(&info->eoi_list);
|
|
|
|
|
|
|
|
spin_unlock(&eoi->eoi_list_lock);
|
|
|
|
|
|
|
|
info->eoi_time = 0;
|
|
|
|
|
2020-09-14 15:01:02 +03:00
|
|
|
xen_irq_lateeoi_locked(info, false);
|
2020-09-07 16:47:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (info)
|
|
|
|
mod_delayed_work_on(info->eoi_cpu, system_wq,
|
|
|
|
&eoi->delayed, info->eoi_time - now);
|
|
|
|
|
|
|
|
read_unlock_irqrestore(&evtchn_rwlock, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_cpu_init_eoi(unsigned int cpu)
|
|
|
|
{
|
|
|
|
struct lateeoi_work *eoi = &per_cpu(lateeoi, cpu);
|
|
|
|
|
|
|
|
INIT_DELAYED_WORK(&eoi->delayed, xen_irq_lateeoi_worker);
|
|
|
|
spin_lock_init(&eoi->eoi_list_lock);
|
|
|
|
INIT_LIST_HEAD(&eoi->eoi_list);
|
|
|
|
}
|
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
void xen_irq_lateeoi(unsigned int irq, unsigned int eoi_flags)
|
|
|
|
{
|
|
|
|
struct irq_info *info;
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
read_lock_irqsave(&evtchn_rwlock, flags);
|
|
|
|
|
|
|
|
info = info_for_irq(irq);
|
|
|
|
|
|
|
|
if (info)
|
2020-09-14 15:01:02 +03:00
|
|
|
xen_irq_lateeoi_locked(info, eoi_flags & XEN_EOI_FLAG_SPURIOUS);
|
2020-09-07 16:47:27 +03:00
|
|
|
|
|
|
|
read_unlock_irqrestore(&evtchn_rwlock, flags);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(xen_irq_lateeoi);
|
|
|
|
|
2011-03-10 19:08:11 +03:00
|
|
|
static void xen_irq_init(unsigned irq)
|
|
|
|
{
|
|
|
|
struct irq_info *info;
|
2020-09-07 16:47:30 +03:00
|
|
|
|
2011-03-10 19:08:12 +03:00
|
|
|
info = kzalloc(sizeof(*info), GFP_KERNEL);
|
|
|
|
if (info == NULL)
|
|
|
|
panic("Unable to allocate metadata for IRQ%d\n", irq);
|
2011-03-10 19:08:11 +03:00
|
|
|
|
|
|
|
info->type = IRQT_UNBOUND;
|
2011-10-28 01:58:47 +04:00
|
|
|
info->refcnt = -1;
|
2011-03-10 19:08:11 +03:00
|
|
|
|
2020-09-30 12:16:14 +03:00
|
|
|
set_info_for_irq(irq, info);
|
2020-12-10 22:26:02 +03:00
|
|
|
/*
|
|
|
|
* Interrupt affinity setting can be immediate. No point
|
|
|
|
* in delaying it until an interrupt is handled.
|
|
|
|
*/
|
|
|
|
irq_set_status_flags(irq, IRQ_MOVE_PCNTXT);
|
2011-03-10 19:08:12 +03:00
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
INIT_LIST_HEAD(&info->eoi_list);
|
2011-03-10 19:08:11 +03:00
|
|
|
list_add_tail(&info->list, &xen_irq_list_head);
|
|
|
|
}
|
|
|
|
|
2014-02-27 22:15:35 +04:00
|
|
|
static int __must_check xen_allocate_irqs_dynamic(int nvec)
|
2010-10-18 18:41:08 +04:00
|
|
|
{
|
2014-05-07 19:44:10 +04:00
|
|
|
int i, irq = irq_alloc_descs(-1, 0, nvec, -1);
|
2010-10-18 18:49:10 +04:00
|
|
|
|
2014-02-27 22:15:35 +04:00
|
|
|
if (irq >= 0) {
|
|
|
|
for (i = 0; i < nvec; i++)
|
|
|
|
xen_irq_init(irq + i);
|
|
|
|
}
|
2009-02-07 01:09:44 +03:00
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
return irq;
|
2010-10-01 20:20:09 +04:00
|
|
|
}
|
|
|
|
|
2014-02-27 22:15:35 +04:00
|
|
|
static inline int __must_check xen_allocate_irq_dynamic(void)
|
|
|
|
{
|
|
|
|
|
|
|
|
return xen_allocate_irqs_dynamic(1);
|
|
|
|
}
|
|
|
|
|
2011-03-10 19:08:15 +03:00
|
|
|
static int __must_check xen_allocate_irq_gsi(unsigned gsi)
|
2011-01-11 20:20:15 +03:00
|
|
|
{
|
|
|
|
int irq;
|
|
|
|
|
2011-03-03 19:57:44 +03:00
|
|
|
/*
|
|
|
|
* A PV guest has no concept of a GSI (since it has no ACPI
|
|
|
|
* nor access to/knowledge of the physical APICs). Therefore
|
|
|
|
* all IRQs are dynamically allocated from the entire IRQ
|
|
|
|
* space.
|
|
|
|
*/
|
|
|
|
if (xen_pv_domain() && !xen_initial_domain())
|
2011-01-11 20:20:15 +03:00
|
|
|
return xen_allocate_irq_dynamic();
|
|
|
|
|
|
|
|
/* Legacy IRQ descriptors are already allocated by the arch. */
|
2015-11-20 19:25:04 +03:00
|
|
|
if (gsi < nr_legacy_irqs())
|
2011-03-10 19:08:11 +03:00
|
|
|
irq = gsi;
|
|
|
|
else
|
|
|
|
irq = irq_alloc_desc_at(gsi, -1);
|
2011-01-11 20:20:15 +03:00
|
|
|
|
2011-03-10 19:08:11 +03:00
|
|
|
xen_irq_init(irq);
|
2011-01-11 20:20:15 +03:00
|
|
|
|
|
|
|
return irq;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_free_irq(unsigned irq)
|
|
|
|
{
|
2020-09-30 12:16:14 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2020-09-07 16:47:27 +03:00
|
|
|
unsigned long flags;
|
2011-03-10 19:08:11 +03:00
|
|
|
|
2013-04-16 18:55:18 +04:00
|
|
|
if (WARN_ON(!info))
|
|
|
|
return;
|
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
write_lock_irqsave(&evtchn_rwlock, flags);
|
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
if (!list_empty(&info->eoi_list))
|
|
|
|
lateeoi_list_del(info);
|
|
|
|
|
2011-03-10 19:08:11 +03:00
|
|
|
list_del(&info->list);
|
2011-03-10 19:08:09 +03:00
|
|
|
|
2020-09-30 12:16:14 +03:00
|
|
|
set_info_for_irq(irq, NULL);
|
2011-03-10 19:08:12 +03:00
|
|
|
|
2011-10-28 01:58:47 +04:00
|
|
|
WARN_ON(info->refcnt > 0);
|
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
write_unlock_irqrestore(&evtchn_rwlock, flags);
|
|
|
|
|
2011-03-10 19:08:12 +03:00
|
|
|
kfree(info);
|
|
|
|
|
2011-02-03 12:49:35 +03:00
|
|
|
/* Legacy IRQ descriptors are managed by the arch. */
|
2015-11-20 19:25:04 +03:00
|
|
|
if (irq < nr_legacy_irqs())
|
2011-02-03 12:49:35 +03:00
|
|
|
return;
|
|
|
|
|
2011-01-11 20:20:15 +03:00
|
|
|
irq_free_desc(irq);
|
|
|
|
}
|
|
|
|
|
2020-03-23 19:15:11 +03:00
|
|
|
static void xen_evtchn_close(evtchn_port_t port)
|
2013-10-17 18:23:15 +04:00
|
|
|
{
|
|
|
|
struct evtchn_close close;
|
|
|
|
|
|
|
|
close.port = port;
|
|
|
|
if (HYPERVISOR_event_channel_op(EVTCHNOP_close, &close) != 0)
|
|
|
|
BUG();
|
|
|
|
}
|
|
|
|
|
2021-06-23 16:09:13 +03:00
|
|
|
/* Not called for lateeoi events. */
|
2021-03-06 19:18:33 +03:00
|
|
|
static void event_handler_exit(struct irq_info *info)
|
|
|
|
{
|
|
|
|
smp_store_release(&info->is_active, 0);
|
|
|
|
clear_evtchn(info->evtchn);
|
|
|
|
}
|
|
|
|
|
2010-10-01 20:20:09 +04:00
|
|
|
static void pirq_query_unmask(int irq)
|
|
|
|
{
|
|
|
|
struct physdev_irq_status_query irq_status;
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
|
|
|
|
BUG_ON(info->type != IRQT_PIRQ);
|
|
|
|
|
2010-07-01 20:08:14 +04:00
|
|
|
irq_status.irq = pirq_from_irq(irq);
|
2010-10-01 20:20:09 +04:00
|
|
|
if (HYPERVISOR_physdev_op(PHYSDEVOP_irq_status_query, &irq_status))
|
|
|
|
irq_status.flags = 0;
|
|
|
|
|
|
|
|
info->u.pirq.flags &= ~PIRQ_NEEDS_EOI;
|
|
|
|
if (irq_status.flags & XENIRQSTAT_needs_eoi)
|
|
|
|
info->u.pirq.flags |= PIRQ_NEEDS_EOI;
|
|
|
|
}
|
|
|
|
|
2011-05-06 15:27:50 +04:00
|
|
|
static void eoi_pirq(struct irq_data *data)
|
|
|
|
{
|
2021-03-06 19:18:33 +03:00
|
|
|
struct irq_info *info = info_for_irq(data->irq);
|
|
|
|
evtchn_port_t evtchn = info ? info->evtchn : 0;
|
2011-05-06 15:27:50 +04:00
|
|
|
struct physdev_eoi eoi = { .irq = pirq_from_irq(data->irq) };
|
|
|
|
int rc = 0;
|
|
|
|
|
2016-03-18 17:11:07 +03:00
|
|
|
if (!VALID_EVTCHN(evtchn))
|
|
|
|
return;
|
2011-05-06 15:27:50 +04:00
|
|
|
|
2021-03-06 19:18:33 +03:00
|
|
|
event_handler_exit(info);
|
2011-05-06 15:27:50 +04:00
|
|
|
|
|
|
|
if (pirq_needs_eoi(data->irq)) {
|
|
|
|
rc = HYPERVISOR_physdev_op(PHYSDEVOP_eoi, &eoi);
|
|
|
|
WARN_ON(rc);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void mask_ack_pirq(struct irq_data *data)
|
|
|
|
{
|
|
|
|
disable_dynirq(data);
|
|
|
|
eoi_pirq(data);
|
|
|
|
}
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
static unsigned int __startup_pirq(unsigned int irq)
|
2010-10-01 20:20:09 +04:00
|
|
|
{
|
|
|
|
struct evtchn_bind_pirq bind_pirq;
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn = evtchn_from_irq(irq);
|
2010-10-04 21:43:27 +04:00
|
|
|
int rc;
|
2010-10-01 20:20:09 +04:00
|
|
|
|
|
|
|
BUG_ON(info->type != IRQT_PIRQ);
|
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn))
|
|
|
|
goto out;
|
|
|
|
|
2010-07-01 20:08:14 +04:00
|
|
|
bind_pirq.pirq = pirq_from_irq(irq);
|
2010-10-01 20:20:09 +04:00
|
|
|
/* NB. We are happy to share unless we are probing. */
|
2010-10-04 21:43:27 +04:00
|
|
|
bind_pirq.flags = info->u.pirq.flags & PIRQ_SHAREABLE ?
|
|
|
|
BIND_PIRQ__WILL_SHARE : 0;
|
|
|
|
rc = HYPERVISOR_event_channel_op(EVTCHNOP_bind_pirq, &bind_pirq);
|
|
|
|
if (rc != 0) {
|
2014-02-24 01:40:20 +04:00
|
|
|
pr_warn("Failed to obtain physical IRQ %d\n", irq);
|
2010-10-01 20:20:09 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
evtchn = bind_pirq.port;
|
|
|
|
|
|
|
|
pirq_query_unmask(irq);
|
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
rc = set_evtchn_to_irq(evtchn, irq);
|
2015-02-26 08:52:05 +03:00
|
|
|
if (rc)
|
|
|
|
goto err;
|
|
|
|
|
2010-10-01 20:20:09 +04:00
|
|
|
info->evtchn = evtchn;
|
2020-12-10 22:26:03 +03:00
|
|
|
bind_evtchn_to_cpu(evtchn, 0, false);
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2020-10-22 12:49:04 +03:00
|
|
|
rc = xen_evtchn_port_setup(evtchn);
|
2015-02-26 08:52:05 +03:00
|
|
|
if (rc)
|
|
|
|
goto err;
|
|
|
|
|
2010-10-01 20:20:09 +04:00
|
|
|
out:
|
2021-03-06 19:18:32 +03:00
|
|
|
do_unmask(info, EVT_MASK_REASON_EXPLICIT);
|
|
|
|
|
2011-05-06 15:27:50 +04:00
|
|
|
eoi_pirq(irq_get_irq_data(irq));
|
2010-10-01 20:20:09 +04:00
|
|
|
|
|
|
|
return 0;
|
2015-02-26 08:52:05 +03:00
|
|
|
|
|
|
|
err:
|
|
|
|
pr_err("irq%d: Failed to set port to irq mapping (%d)\n", irq, rc);
|
|
|
|
xen_evtchn_close(evtchn);
|
|
|
|
return 0;
|
2010-10-01 20:20:09 +04:00
|
|
|
}
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
static unsigned int startup_pirq(struct irq_data *data)
|
|
|
|
{
|
|
|
|
return __startup_pirq(data->irq);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void shutdown_pirq(struct irq_data *data)
|
2010-10-01 20:20:09 +04:00
|
|
|
{
|
2011-02-05 23:08:54 +03:00
|
|
|
unsigned int irq = data->irq;
|
2010-10-01 20:20:09 +04:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn = evtchn_from_irq(irq);
|
2010-10-01 20:20:09 +04:00
|
|
|
|
|
|
|
BUG_ON(info->type != IRQT_PIRQ);
|
|
|
|
|
|
|
|
if (!VALID_EVTCHN(evtchn))
|
|
|
|
return;
|
|
|
|
|
2021-03-06 19:18:32 +03:00
|
|
|
do_mask(info, EVT_MASK_REASON_EXPLICIT);
|
2013-10-17 18:23:15 +04:00
|
|
|
xen_evtchn_close(evtchn);
|
|
|
|
xen_irq_info_cleanup(info);
|
2010-10-01 20:20:09 +04:00
|
|
|
}
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
static void enable_pirq(struct irq_data *data)
|
2010-10-01 20:20:09 +04:00
|
|
|
{
|
2017-07-29 19:59:57 +03:00
|
|
|
enable_dynirq(data);
|
2010-10-01 20:20:09 +04:00
|
|
|
}
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
static void disable_pirq(struct irq_data *data)
|
2010-10-01 20:20:09 +04:00
|
|
|
{
|
2011-05-06 15:27:50 +04:00
|
|
|
disable_dynirq(data);
|
2010-10-01 20:20:09 +04:00
|
|
|
}
|
|
|
|
|
2012-05-21 19:54:10 +04:00
|
|
|
int xen_irq_from_gsi(unsigned gsi)
|
2010-10-01 20:20:09 +04:00
|
|
|
{
|
2011-03-10 19:08:11 +03:00
|
|
|
struct irq_info *info;
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2011-03-10 19:08:11 +03:00
|
|
|
list_for_each_entry(info, &xen_irq_list_head, list) {
|
|
|
|
if (info->type != IRQT_PIRQ)
|
2010-10-01 20:20:09 +04:00
|
|
|
continue;
|
|
|
|
|
2011-03-10 19:08:11 +03:00
|
|
|
if (info->u.pirq.gsi == gsi)
|
|
|
|
return info->irq;
|
2010-10-01 20:20:09 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
2012-05-21 19:54:10 +04:00
|
|
|
EXPORT_SYMBOL_GPL(xen_irq_from_gsi);
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2013-03-18 19:50:17 +04:00
|
|
|
static void __unbind_from_irq(unsigned int irq)
|
|
|
|
{
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn = evtchn_from_irq(irq);
|
2020-09-30 12:16:14 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2013-03-18 19:50:17 +04:00
|
|
|
|
|
|
|
if (info->refcnt > 0) {
|
|
|
|
info->refcnt--;
|
|
|
|
if (info->refcnt != 0)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn)) {
|
2013-10-17 18:23:15 +04:00
|
|
|
unsigned int cpu = cpu_from_irq(irq);
|
2021-02-19 18:40:28 +03:00
|
|
|
struct xenbus_device *dev;
|
2013-10-17 18:23:15 +04:00
|
|
|
|
|
|
|
xen_evtchn_close(evtchn);
|
2013-03-18 19:50:17 +04:00
|
|
|
|
|
|
|
switch (type_from_irq(irq)) {
|
|
|
|
case IRQT_VIRQ:
|
2013-10-17 18:23:15 +04:00
|
|
|
per_cpu(virq_to_irq, cpu)[virq_from_irq(irq)] = -1;
|
2013-03-18 19:50:17 +04:00
|
|
|
break;
|
|
|
|
case IRQT_IPI:
|
2013-10-17 18:23:15 +04:00
|
|
|
per_cpu(ipi_to_irq, cpu)[ipi_from_irq(irq)] = -1;
|
2013-03-18 19:50:17 +04:00
|
|
|
break;
|
2021-02-19 18:40:28 +03:00
|
|
|
case IRQT_EVTCHN:
|
|
|
|
dev = info->u.interdomain;
|
|
|
|
if (dev)
|
|
|
|
atomic_dec(&dev->event_channels);
|
|
|
|
break;
|
2013-03-18 19:50:17 +04:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
xen_irq_info_cleanup(info);
|
2013-03-18 19:50:17 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
xen_free_irq(irq);
|
|
|
|
}
|
|
|
|
|
2011-03-10 19:08:04 +03:00
|
|
|
/*
|
|
|
|
* Do not make any assumptions regarding the relationship between the
|
|
|
|
* IRQ number returned here and the Xen pirq argument.
|
2010-07-01 20:08:14 +04:00
|
|
|
*
|
|
|
|
* Note: We don't assign an event channel until the irq actually started
|
|
|
|
* up. Return an existing irq if we've already got one for the gsi.
|
2011-05-25 15:33:23 +04:00
|
|
|
*
|
|
|
|
* Shareable implies level triggered, not shareable implies edge
|
|
|
|
* triggered here.
|
2010-10-01 20:20:09 +04:00
|
|
|
*/
|
2011-03-10 19:08:07 +03:00
|
|
|
int xen_bind_pirq_gsi_to_irq(unsigned gsi,
|
|
|
|
unsigned pirq, int shareable, char *name)
|
2010-10-01 20:20:09 +04:00
|
|
|
{
|
2021-07-21 14:40:10 +03:00
|
|
|
int irq;
|
2010-10-01 20:20:09 +04:00
|
|
|
struct physdev_irq irq_op;
|
2013-03-18 19:50:17 +04:00
|
|
|
int ret;
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2012-05-21 19:54:10 +04:00
|
|
|
irq = xen_irq_from_gsi(gsi);
|
2010-10-01 20:20:09 +04:00
|
|
|
if (irq != -1) {
|
2013-06-28 14:21:41 +04:00
|
|
|
pr_info("%s: returning irq %d for gsi %u\n",
|
|
|
|
__func__, irq, gsi);
|
2011-10-28 01:58:47 +04:00
|
|
|
goto out;
|
2010-10-01 20:20:09 +04:00
|
|
|
}
|
|
|
|
|
2011-01-11 20:20:15 +03:00
|
|
|
irq = xen_allocate_irq_gsi(gsi);
|
2011-03-10 19:08:15 +03:00
|
|
|
if (irq < 0)
|
|
|
|
goto out;
|
2010-10-01 20:20:09 +04:00
|
|
|
|
|
|
|
irq_op.irq = irq;
|
2010-03-18 23:31:34 +03:00
|
|
|
irq_op.vector = 0;
|
|
|
|
|
|
|
|
/* Only the privileged domain can do this. For non-priv, the pcifront
|
|
|
|
* driver provides a PCI bus that does the call to do exactly
|
|
|
|
* this in the priv domain. */
|
|
|
|
if (xen_initial_domain() &&
|
|
|
|
HYPERVISOR_physdev_op(PHYSDEVOP_alloc_irq_vector, &irq_op)) {
|
2011-01-11 20:20:15 +03:00
|
|
|
xen_free_irq(irq);
|
2010-10-01 20:20:09 +04:00
|
|
|
irq = -ENOSPC;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2013-03-18 19:50:17 +04:00
|
|
|
ret = xen_irq_info_pirq_setup(irq, 0, pirq, gsi, DOMID_SELF,
|
2011-03-10 19:08:09 +03:00
|
|
|
shareable ? PIRQ_SHAREABLE : 0);
|
2013-03-18 19:50:17 +04:00
|
|
|
if (ret < 0) {
|
|
|
|
__unbind_from_irq(irq);
|
|
|
|
irq = ret;
|
|
|
|
goto out;
|
|
|
|
}
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2011-05-06 15:27:50 +04:00
|
|
|
pirq_query_unmask(irq);
|
|
|
|
/* We try to use the handler with the appropriate semantic for the
|
2011-05-25 15:33:23 +04:00
|
|
|
* type of interrupt: if the interrupt is an edge triggered
|
|
|
|
* interrupt we use handle_edge_irq.
|
2011-05-06 15:27:50 +04:00
|
|
|
*
|
2011-05-25 15:33:23 +04:00
|
|
|
* On the other hand if the interrupt is level triggered we use
|
|
|
|
* handle_fasteoi_irq like the native code does for this kind of
|
2011-05-06 15:27:50 +04:00
|
|
|
* interrupts.
|
2011-05-25 15:33:23 +04:00
|
|
|
*
|
2011-05-06 15:27:50 +04:00
|
|
|
* Depending on the Xen version, pirq_needs_eoi might return true
|
|
|
|
* not only for level triggered interrupts but for edge triggered
|
|
|
|
* interrupts too. In any case Xen always honors the eoi mechanism,
|
|
|
|
* not injecting any more pirqs of the same kind if the first one
|
|
|
|
* hasn't received an eoi yet. Therefore using the fasteoi handler
|
|
|
|
* is the right choice either way.
|
|
|
|
*/
|
2011-05-25 15:33:23 +04:00
|
|
|
if (shareable)
|
2011-05-06 15:27:50 +04:00
|
|
|
irq_set_chip_and_handler_name(irq, &xen_pirq_chip,
|
|
|
|
handle_fasteoi_irq, name);
|
|
|
|
else
|
|
|
|
irq_set_chip_and_handler_name(irq, &xen_pirq_chip,
|
|
|
|
handle_edge_irq, name);
|
|
|
|
|
2010-10-01 20:20:09 +04:00
|
|
|
out:
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2010-10-01 20:20:09 +04:00
|
|
|
|
|
|
|
return irq;
|
|
|
|
}
|
|
|
|
|
2010-10-11 18:30:09 +04:00
|
|
|
#ifdef CONFIG_PCI_MSI
|
2011-02-18 19:43:32 +03:00
|
|
|
int xen_allocate_pirq_msi(struct pci_dev *dev, struct msi_desc *msidesc)
|
2011-01-11 20:20:14 +03:00
|
|
|
{
|
2011-02-18 19:43:31 +03:00
|
|
|
int rc;
|
2011-01-11 20:20:14 +03:00
|
|
|
struct physdev_get_free_pirq op_get_free_pirq;
|
|
|
|
|
2011-02-18 19:43:32 +03:00
|
|
|
op_get_free_pirq.type = MAP_PIRQ_TYPE_MSI;
|
2011-01-11 20:20:14 +03:00
|
|
|
rc = HYPERVISOR_physdev_op(PHYSDEVOP_get_free_pirq, &op_get_free_pirq);
|
|
|
|
|
2011-02-18 19:43:31 +03:00
|
|
|
WARN_ONCE(rc == -ENOSYS,
|
|
|
|
"hypervisor does not support the PHYSDEVOP_get_free_pirq interface\n");
|
|
|
|
|
|
|
|
return rc ? -1 : op_get_free_pirq.pirq;
|
2011-01-11 20:20:14 +03:00
|
|
|
}
|
|
|
|
|
2011-02-18 19:43:32 +03:00
|
|
|
int xen_bind_pirq_msi_to_irq(struct pci_dev *dev, struct msi_desc *msidesc,
|
2014-02-27 22:15:35 +04:00
|
|
|
int pirq, int nvec, const char *name, domid_t domid)
|
2010-07-01 20:10:39 +04:00
|
|
|
{
|
2014-02-27 22:15:35 +04:00
|
|
|
int i, irq, ret;
|
2011-02-18 19:43:29 +03:00
|
|
|
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
2010-07-01 20:10:39 +04:00
|
|
|
|
2014-02-27 22:15:35 +04:00
|
|
|
irq = xen_allocate_irqs_dynamic(nvec);
|
2011-09-29 21:26:45 +04:00
|
|
|
if (irq < 0)
|
2011-02-18 19:43:28 +03:00
|
|
|
goto out;
|
2010-07-01 20:10:39 +04:00
|
|
|
|
2014-02-27 22:15:35 +04:00
|
|
|
for (i = 0; i < nvec; i++) {
|
|
|
|
irq_set_chip_and_handler_name(irq + i, &xen_pirq_chip, handle_edge_irq, name);
|
|
|
|
|
|
|
|
ret = xen_irq_info_pirq_setup(irq + i, 0, pirq + i, 0, domid,
|
|
|
|
i == 0 ? 0 : PIRQ_MSI_GROUP);
|
|
|
|
if (ret < 0)
|
|
|
|
goto error_irq;
|
|
|
|
}
|
2010-07-01 20:10:39 +04:00
|
|
|
|
2011-03-16 05:23:40 +03:00
|
|
|
ret = irq_set_msi_desc(irq, msidesc);
|
2011-02-18 19:43:32 +03:00
|
|
|
if (ret < 0)
|
|
|
|
goto error_irq;
|
2010-07-01 20:10:39 +04:00
|
|
|
out:
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2011-02-18 19:43:29 +03:00
|
|
|
return irq;
|
2011-02-18 19:43:32 +03:00
|
|
|
error_irq:
|
2018-02-28 12:19:03 +03:00
|
|
|
while (nvec--)
|
|
|
|
__unbind_from_irq(irq + nvec);
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2011-09-29 21:26:45 +04:00
|
|
|
return ret;
|
2010-07-01 20:10:39 +04:00
|
|
|
}
|
2010-10-11 18:30:09 +04:00
|
|
|
#endif
|
|
|
|
|
2010-03-18 23:31:34 +03:00
|
|
|
int xen_destroy_irq(int irq)
|
|
|
|
{
|
2010-09-02 17:51:39 +04:00
|
|
|
struct physdev_unmap_pirq unmap_irq;
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2010-03-18 23:31:34 +03:00
|
|
|
int rc = -ENOENT;
|
|
|
|
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
2010-03-18 23:31:34 +03:00
|
|
|
|
2014-02-27 22:15:35 +04:00
|
|
|
/*
|
|
|
|
* If trying to remove a vector in a MSI group different
|
|
|
|
* than the first one skip the PIRQ unmap unless this vector
|
|
|
|
* is the first one in the group.
|
|
|
|
*/
|
|
|
|
if (xen_initial_domain() && !(info->u.pirq.flags & PIRQ_MSI_GROUP)) {
|
2010-11-19 19:27:09 +03:00
|
|
|
unmap_irq.pirq = info->u.pirq.pirq;
|
2011-04-14 19:17:36 +04:00
|
|
|
unmap_irq.domid = info->u.pirq.domid;
|
2010-09-02 17:51:39 +04:00
|
|
|
rc = HYPERVISOR_physdev_op(PHYSDEVOP_unmap_pirq, &unmap_irq);
|
2011-02-17 00:26:44 +03:00
|
|
|
/* If another domain quits without making the pci_disable_msix
|
|
|
|
* call, the Xen hypervisor takes care of freeing the PIRQs
|
|
|
|
* (free_domain_pirqs).
|
|
|
|
*/
|
|
|
|
if ((rc == -ESRCH && info->u.pirq.domid != DOMID_SELF))
|
2013-06-28 14:21:41 +04:00
|
|
|
pr_info("domain %d does not have %d anymore\n",
|
2011-02-17 00:26:44 +03:00
|
|
|
info->u.pirq.domid, info->u.pirq.pirq);
|
|
|
|
else if (rc) {
|
2013-06-28 14:21:41 +04:00
|
|
|
pr_warn("unmap irq failed %d\n", rc);
|
2010-09-02 17:51:39 +04:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2010-03-18 23:31:34 +03:00
|
|
|
|
2011-01-11 20:20:15 +03:00
|
|
|
xen_free_irq(irq);
|
2010-03-18 23:31:34 +03:00
|
|
|
|
|
|
|
out:
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2010-03-18 23:31:34 +03:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2010-12-01 17:51:44 +03:00
|
|
|
int xen_irq_from_pirq(unsigned pirq)
|
2010-10-01 20:20:09 +04:00
|
|
|
{
|
2011-03-10 19:08:13 +03:00
|
|
|
int irq;
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2011-03-10 19:08:13 +03:00
|
|
|
struct irq_info *info;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
2011-03-10 19:08:13 +03:00
|
|
|
|
|
|
|
list_for_each_entry(info, &xen_irq_list_head, list) {
|
2011-09-29 21:13:30 +04:00
|
|
|
if (info->type != IRQT_PIRQ)
|
2011-03-10 19:08:13 +03:00
|
|
|
continue;
|
|
|
|
irq = info->irq;
|
|
|
|
if (info->u.pirq.pirq == pirq)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
irq = -1;
|
|
|
|
out:
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2011-03-10 19:08:13 +03:00
|
|
|
|
|
|
|
return irq;
|
2010-12-01 17:51:44 +03:00
|
|
|
}
|
|
|
|
|
2011-02-24 22:20:12 +03:00
|
|
|
|
|
|
|
int xen_pirq_from_irq(unsigned irq)
|
|
|
|
{
|
|
|
|
return pirq_from_irq(irq);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(xen_pirq_from_irq);
|
2013-03-18 19:50:17 +04:00
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
static int bind_evtchn_to_irq_chip(evtchn_port_t evtchn, struct irq_chip *chip,
|
|
|
|
struct xenbus_device *dev)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
|
|
|
int irq;
|
2013-03-18 19:50:17 +04:00
|
|
|
int ret;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
if (evtchn >= xen_evtchn_max_channels())
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
irq = get_evtchn_to_irq(evtchn);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
|
|
|
if (irq == -1) {
|
2011-01-11 20:20:15 +03:00
|
|
|
irq = xen_allocate_irq_dynamic();
|
2013-01-31 18:46:56 +04:00
|
|
|
if (irq < 0)
|
2011-03-10 19:08:15 +03:00
|
|
|
goto out;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
irq_set_chip_and_handler_name(irq, chip,
|
2011-05-06 15:27:50 +04:00
|
|
|
handle_edge_irq, "event");
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
ret = xen_irq_info_evtchn_setup(irq, evtchn, dev);
|
2013-03-18 19:50:17 +04:00
|
|
|
if (ret < 0) {
|
|
|
|
__unbind_from_irq(irq);
|
|
|
|
irq = ret;
|
|
|
|
goto out;
|
|
|
|
}
|
2020-12-10 22:26:03 +03:00
|
|
|
/*
|
|
|
|
* New interdomain events are initially bound to vCPU0 This
|
|
|
|
* is required to setup the event channel in the first
|
|
|
|
* place and also important for UP guests because the
|
|
|
|
* affinity setting is not invoked on them so nothing would
|
|
|
|
* bind the channel.
|
|
|
|
*/
|
|
|
|
bind_evtchn_to_cpu(evtchn, 0, false);
|
2012-05-23 21:28:44 +04:00
|
|
|
} else {
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
WARN_ON(info == NULL || info->type != IRQT_EVTCHN);
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2011-03-10 19:08:15 +03:00
|
|
|
out:
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
|
|
|
return irq;
|
|
|
|
}
|
2020-09-07 16:47:27 +03:00
|
|
|
|
|
|
|
int bind_evtchn_to_irq(evtchn_port_t evtchn)
|
|
|
|
{
|
2021-02-11 13:16:13 +03:00
|
|
|
return bind_evtchn_to_irq_chip(evtchn, &xen_dynamic_chip, NULL);
|
2020-09-07 16:47:27 +03:00
|
|
|
}
|
2007-07-18 05:37:06 +04:00
|
|
|
EXPORT_SYMBOL_GPL(bind_evtchn_to_irq);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2007-07-18 05:37:06 +04:00
|
|
|
static int bind_ipi_to_irq(unsigned int ipi, unsigned int cpu)
|
|
|
|
{
|
|
|
|
struct evtchn_bind_ipi bind_ipi;
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn;
|
|
|
|
int ret, irq;
|
2007-07-18 05:37:06 +04:00
|
|
|
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
2007-07-18 05:37:06 +04:00
|
|
|
|
|
|
|
irq = per_cpu(ipi_to_irq, cpu)[ipi];
|
2009-02-07 03:55:58 +03:00
|
|
|
|
2007-07-18 05:37:06 +04:00
|
|
|
if (irq == -1) {
|
2011-01-11 20:20:15 +03:00
|
|
|
irq = xen_allocate_irq_dynamic();
|
2007-07-18 05:37:06 +04:00
|
|
|
if (irq < 0)
|
|
|
|
goto out;
|
|
|
|
|
2011-03-25 12:58:06 +03:00
|
|
|
irq_set_chip_and_handler_name(irq, &xen_percpu_chip,
|
2010-08-21 05:57:53 +04:00
|
|
|
handle_percpu_irq, "ipi");
|
2007-07-18 05:37:06 +04:00
|
|
|
|
2016-06-30 18:56:40 +03:00
|
|
|
bind_ipi.vcpu = xen_vcpu_nr(cpu);
|
2007-07-18 05:37:06 +04:00
|
|
|
if (HYPERVISOR_event_channel_op(EVTCHNOP_bind_ipi,
|
|
|
|
&bind_ipi) != 0)
|
|
|
|
BUG();
|
|
|
|
evtchn = bind_ipi.port;
|
|
|
|
|
2013-03-18 19:50:17 +04:00
|
|
|
ret = xen_irq_info_ipi_setup(cpu, irq, evtchn, ipi);
|
|
|
|
if (ret < 0) {
|
|
|
|
__unbind_from_irq(irq);
|
|
|
|
irq = ret;
|
|
|
|
goto out;
|
|
|
|
}
|
2020-12-10 22:26:03 +03:00
|
|
|
/*
|
|
|
|
* Force the affinity mask to the target CPU so proc shows
|
|
|
|
* the correct target.
|
|
|
|
*/
|
|
|
|
bind_evtchn_to_cpu(evtchn, cpu, true);
|
2012-05-23 21:28:44 +04:00
|
|
|
} else {
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
WARN_ON(info == NULL || info->type != IRQT_IPI);
|
2007-07-18 05:37:06 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2007-07-18 05:37:06 +04:00
|
|
|
return irq;
|
|
|
|
}
|
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
static int bind_interdomain_evtchn_to_irq_chip(struct xenbus_device *dev,
|
2020-09-07 16:47:27 +03:00
|
|
|
evtchn_port_t remote_port,
|
|
|
|
struct irq_chip *chip)
|
2009-02-09 23:05:50 +03:00
|
|
|
{
|
|
|
|
struct evtchn_bind_interdomain bind_interdomain;
|
|
|
|
int err;
|
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
bind_interdomain.remote_dom = dev->otherend_id;
|
2009-02-09 23:05:50 +03:00
|
|
|
bind_interdomain.remote_port = remote_port;
|
|
|
|
|
|
|
|
err = HYPERVISOR_event_channel_op(EVTCHNOP_bind_interdomain,
|
|
|
|
&bind_interdomain);
|
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
return err ? : bind_evtchn_to_irq_chip(bind_interdomain.local_port,
|
2021-02-11 13:16:13 +03:00
|
|
|
chip, dev);
|
2020-09-07 16:47:27 +03:00
|
|
|
}
|
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
int bind_interdomain_evtchn_to_irq_lateeoi(struct xenbus_device *dev,
|
2020-09-07 16:47:27 +03:00
|
|
|
evtchn_port_t remote_port)
|
|
|
|
{
|
2021-02-11 13:16:13 +03:00
|
|
|
return bind_interdomain_evtchn_to_irq_chip(dev, remote_port,
|
2020-09-07 16:47:27 +03:00
|
|
|
&xen_lateeoi_chip);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(bind_interdomain_evtchn_to_irq_lateeoi);
|
|
|
|
|
2020-03-23 19:15:11 +03:00
|
|
|
static int find_virq(unsigned int virq, unsigned int cpu, evtchn_port_t *evtchn)
|
2011-08-25 20:30:48 +04:00
|
|
|
{
|
|
|
|
struct evtchn_status status;
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t port;
|
|
|
|
int rc = -ENOENT;
|
2011-08-25 20:30:48 +04:00
|
|
|
|
|
|
|
memset(&status, 0, sizeof(status));
|
2013-10-17 18:23:15 +04:00
|
|
|
for (port = 0; port < xen_evtchn_max_channels(); port++) {
|
2011-08-25 20:30:48 +04:00
|
|
|
status.dom = DOMID_SELF;
|
|
|
|
status.port = port;
|
|
|
|
rc = HYPERVISOR_event_channel_op(EVTCHNOP_status, &status);
|
|
|
|
if (rc < 0)
|
|
|
|
continue;
|
|
|
|
if (status.status != EVTCHNSTAT_virq)
|
|
|
|
continue;
|
2016-11-23 15:38:45 +03:00
|
|
|
if (status.u.virq == virq && status.vcpu == xen_vcpu_nr(cpu)) {
|
2020-03-23 19:15:11 +03:00
|
|
|
*evtchn = port;
|
2011-08-25 20:30:48 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
2007-07-18 05:37:06 +04:00
|
|
|
|
2013-09-24 00:03:38 +04:00
|
|
|
/**
|
|
|
|
* xen_evtchn_nr_channels - number of usable event channel ports
|
|
|
|
*
|
|
|
|
* This may be less than the maximum supported by the current
|
|
|
|
* hypervisor ABI. Use xen_evtchn_max_channels() for the maximum
|
|
|
|
* supported.
|
|
|
|
*/
|
|
|
|
unsigned xen_evtchn_nr_channels(void)
|
|
|
|
{
|
|
|
|
return evtchn_ops->nr_channels();
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(xen_evtchn_nr_channels);
|
|
|
|
|
2015-05-19 20:40:49 +03:00
|
|
|
int bind_virq_to_irq(unsigned int virq, unsigned int cpu, bool percpu)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
|
|
|
struct evtchn_bind_virq bind_virq;
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn = 0;
|
|
|
|
int irq, ret;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
|
|
|
irq = per_cpu(virq_to_irq, cpu)[virq];
|
|
|
|
|
|
|
|
if (irq == -1) {
|
2011-01-11 20:20:15 +03:00
|
|
|
irq = xen_allocate_irq_dynamic();
|
2013-01-31 18:46:56 +04:00
|
|
|
if (irq < 0)
|
2011-03-10 19:08:15 +03:00
|
|
|
goto out;
|
2010-09-23 02:28:52 +04:00
|
|
|
|
2015-05-19 20:40:49 +03:00
|
|
|
if (percpu)
|
|
|
|
irq_set_chip_and_handler_name(irq, &xen_percpu_chip,
|
|
|
|
handle_percpu_irq, "virq");
|
|
|
|
else
|
|
|
|
irq_set_chip_and_handler_name(irq, &xen_dynamic_chip,
|
|
|
|
handle_edge_irq, "virq");
|
2010-09-23 02:28:52 +04:00
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
bind_virq.virq = virq;
|
2016-06-30 18:56:40 +03:00
|
|
|
bind_virq.vcpu = xen_vcpu_nr(cpu);
|
2011-08-25 20:30:48 +04:00
|
|
|
ret = HYPERVISOR_event_channel_op(EVTCHNOP_bind_virq,
|
|
|
|
&bind_virq);
|
|
|
|
if (ret == 0)
|
|
|
|
evtchn = bind_virq.port;
|
|
|
|
else {
|
|
|
|
if (ret == -EEXIST)
|
2020-03-23 19:15:11 +03:00
|
|
|
ret = find_virq(virq, cpu, &evtchn);
|
2011-08-25 20:30:48 +04:00
|
|
|
BUG_ON(ret < 0);
|
|
|
|
}
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2013-03-18 19:50:17 +04:00
|
|
|
ret = xen_irq_info_virq_setup(cpu, irq, evtchn, virq);
|
|
|
|
if (ret < 0) {
|
|
|
|
__unbind_from_irq(irq);
|
|
|
|
irq = ret;
|
|
|
|
goto out;
|
|
|
|
}
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2020-12-10 22:26:03 +03:00
|
|
|
/*
|
|
|
|
* Force the affinity mask for percpu interrupts so proc
|
|
|
|
* shows the correct target.
|
|
|
|
*/
|
|
|
|
bind_evtchn_to_cpu(evtchn, cpu, percpu);
|
2012-05-23 21:28:44 +04:00
|
|
|
} else {
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
WARN_ON(info == NULL || info->type != IRQT_VIRQ);
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2011-03-10 19:08:15 +03:00
|
|
|
out:
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
|
|
|
return irq;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void unbind_from_irq(unsigned int irq)
|
|
|
|
{
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
2013-03-18 19:50:17 +04:00
|
|
|
__unbind_from_irq(irq);
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
static int bind_evtchn_to_irqhandler_chip(evtchn_port_t evtchn,
|
|
|
|
irq_handler_t handler,
|
|
|
|
unsigned long irqflags,
|
|
|
|
const char *devname, void *dev_id,
|
|
|
|
struct irq_chip *chip)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2011-03-30 23:14:26 +04:00
|
|
|
int irq, retval;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
irq = bind_evtchn_to_irq_chip(evtchn, chip, NULL);
|
2011-03-10 19:08:15 +03:00
|
|
|
if (irq < 0)
|
|
|
|
return irq;
|
2007-07-18 05:37:05 +04:00
|
|
|
retval = request_irq(irq, handler, irqflags, devname, dev_id);
|
|
|
|
if (retval != 0) {
|
|
|
|
unbind_from_irq(irq);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
return irq;
|
|
|
|
}
|
2020-09-07 16:47:27 +03:00
|
|
|
|
|
|
|
int bind_evtchn_to_irqhandler(evtchn_port_t evtchn,
|
|
|
|
irq_handler_t handler,
|
|
|
|
unsigned long irqflags,
|
|
|
|
const char *devname, void *dev_id)
|
|
|
|
{
|
|
|
|
return bind_evtchn_to_irqhandler_chip(evtchn, handler, irqflags,
|
|
|
|
devname, dev_id,
|
|
|
|
&xen_dynamic_chip);
|
|
|
|
}
|
2007-07-18 05:37:05 +04:00
|
|
|
EXPORT_SYMBOL_GPL(bind_evtchn_to_irqhandler);
|
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
int bind_evtchn_to_irqhandler_lateeoi(evtchn_port_t evtchn,
|
|
|
|
irq_handler_t handler,
|
|
|
|
unsigned long irqflags,
|
|
|
|
const char *devname, void *dev_id)
|
|
|
|
{
|
|
|
|
return bind_evtchn_to_irqhandler_chip(evtchn, handler, irqflags,
|
|
|
|
devname, dev_id,
|
|
|
|
&xen_lateeoi_chip);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(bind_evtchn_to_irqhandler_lateeoi);
|
|
|
|
|
|
|
|
static int bind_interdomain_evtchn_to_irqhandler_chip(
|
2021-02-11 13:16:13 +03:00
|
|
|
struct xenbus_device *dev, evtchn_port_t remote_port,
|
2020-09-07 16:47:27 +03:00
|
|
|
irq_handler_t handler, unsigned long irqflags,
|
|
|
|
const char *devname, void *dev_id, struct irq_chip *chip)
|
2009-02-09 23:05:50 +03:00
|
|
|
{
|
|
|
|
int irq, retval;
|
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
irq = bind_interdomain_evtchn_to_irq_chip(dev, remote_port, chip);
|
2009-02-09 23:05:50 +03:00
|
|
|
if (irq < 0)
|
|
|
|
return irq;
|
|
|
|
|
|
|
|
retval = request_irq(irq, handler, irqflags, devname, dev_id);
|
|
|
|
if (retval != 0) {
|
|
|
|
unbind_from_irq(irq);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
return irq;
|
|
|
|
}
|
2020-09-07 16:47:27 +03:00
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
int bind_interdomain_evtchn_to_irqhandler_lateeoi(struct xenbus_device *dev,
|
2020-09-07 16:47:27 +03:00
|
|
|
evtchn_port_t remote_port,
|
|
|
|
irq_handler_t handler,
|
|
|
|
unsigned long irqflags,
|
|
|
|
const char *devname,
|
|
|
|
void *dev_id)
|
|
|
|
{
|
2021-02-11 13:16:13 +03:00
|
|
|
return bind_interdomain_evtchn_to_irqhandler_chip(dev,
|
2020-09-07 16:47:27 +03:00
|
|
|
remote_port, handler, irqflags, devname,
|
|
|
|
dev_id, &xen_lateeoi_chip);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(bind_interdomain_evtchn_to_irqhandler_lateeoi);
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
int bind_virq_to_irqhandler(unsigned int virq, unsigned int cpu,
|
2007-10-19 11:12:20 +04:00
|
|
|
irq_handler_t handler,
|
2007-07-18 05:37:05 +04:00
|
|
|
unsigned long irqflags, const char *devname, void *dev_id)
|
|
|
|
{
|
2011-03-30 23:14:26 +04:00
|
|
|
int irq, retval;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2015-05-19 20:40:49 +03:00
|
|
|
irq = bind_virq_to_irq(virq, cpu, irqflags & IRQF_PERCPU);
|
2011-03-10 19:08:15 +03:00
|
|
|
if (irq < 0)
|
|
|
|
return irq;
|
2007-07-18 05:37:05 +04:00
|
|
|
retval = request_irq(irq, handler, irqflags, devname, dev_id);
|
|
|
|
if (retval != 0) {
|
|
|
|
unbind_from_irq(irq);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
return irq;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(bind_virq_to_irqhandler);
|
|
|
|
|
2007-07-18 05:37:06 +04:00
|
|
|
int bind_ipi_to_irqhandler(enum ipi_vector ipi,
|
|
|
|
unsigned int cpu,
|
|
|
|
irq_handler_t handler,
|
|
|
|
unsigned long irqflags,
|
|
|
|
const char *devname,
|
|
|
|
void *dev_id)
|
|
|
|
{
|
|
|
|
int irq, retval;
|
|
|
|
|
|
|
|
irq = bind_ipi_to_irq(ipi, cpu);
|
|
|
|
if (irq < 0)
|
|
|
|
return irq;
|
|
|
|
|
2011-10-03 18:37:00 +04:00
|
|
|
irqflags |= IRQF_NO_SUSPEND | IRQF_FORCE_RESUME | IRQF_EARLY_RESUME;
|
2007-07-18 05:37:06 +04:00
|
|
|
retval = request_irq(irq, handler, irqflags, devname, dev_id);
|
|
|
|
if (retval != 0) {
|
|
|
|
unbind_from_irq(irq);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
return irq;
|
|
|
|
}
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
void unbind_from_irqhandler(unsigned int irq, void *dev_id)
|
|
|
|
{
|
2020-09-30 12:16:14 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2013-04-16 18:55:18 +04:00
|
|
|
|
|
|
|
if (WARN_ON(!info))
|
|
|
|
return;
|
2007-07-18 05:37:05 +04:00
|
|
|
free_irq(irq, dev_id);
|
|
|
|
unbind_from_irq(irq);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(unbind_from_irqhandler);
|
|
|
|
|
2013-09-23 15:47:26 +04:00
|
|
|
/**
|
|
|
|
* xen_set_irq_priority() - set an event channel priority.
|
|
|
|
* @irq:irq bound to an event channel.
|
|
|
|
* @priority: priority between XEN_IRQ_PRIORITY_MAX and XEN_IRQ_PRIORITY_MIN.
|
|
|
|
*/
|
|
|
|
int xen_set_irq_priority(unsigned irq, unsigned priority)
|
|
|
|
{
|
|
|
|
struct evtchn_set_priority set_priority;
|
|
|
|
|
|
|
|
set_priority.port = evtchn_from_irq(irq);
|
|
|
|
set_priority.priority = priority;
|
|
|
|
|
|
|
|
return HYPERVISOR_event_channel_op(EVTCHNOP_set_priority,
|
|
|
|
&set_priority);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(xen_set_irq_priority);
|
|
|
|
|
2020-03-23 19:15:11 +03:00
|
|
|
int evtchn_make_refcounted(evtchn_port_t evtchn)
|
2011-10-28 01:58:47 +04:00
|
|
|
{
|
2013-10-17 18:23:15 +04:00
|
|
|
int irq = get_evtchn_to_irq(evtchn);
|
2011-10-28 01:58:47 +04:00
|
|
|
struct irq_info *info;
|
|
|
|
|
|
|
|
if (irq == -1)
|
|
|
|
return -ENOENT;
|
|
|
|
|
2020-09-30 12:16:14 +03:00
|
|
|
info = info_for_irq(irq);
|
2011-10-28 01:58:47 +04:00
|
|
|
|
|
|
|
if (!info)
|
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
WARN_ON(info->refcnt != -1);
|
|
|
|
|
|
|
|
info->refcnt = 1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(evtchn_make_refcounted);
|
|
|
|
|
2020-03-23 19:15:11 +03:00
|
|
|
int evtchn_get(evtchn_port_t evtchn)
|
2011-10-28 01:58:47 +04:00
|
|
|
{
|
|
|
|
int irq;
|
|
|
|
struct irq_info *info;
|
|
|
|
int err = -ENOENT;
|
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
if (evtchn >= xen_evtchn_max_channels())
|
2011-11-28 20:49:09 +04:00
|
|
|
return -EINVAL;
|
|
|
|
|
2011-10-28 01:58:47 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
irq = get_evtchn_to_irq(evtchn);
|
2011-10-28 01:58:47 +04:00
|
|
|
if (irq == -1)
|
|
|
|
goto done;
|
|
|
|
|
2020-09-30 12:16:14 +03:00
|
|
|
info = info_for_irq(irq);
|
2011-10-28 01:58:47 +04:00
|
|
|
|
|
|
|
if (!info)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
err = -EINVAL;
|
2020-09-14 15:01:02 +03:00
|
|
|
if (info->refcnt <= 0 || info->refcnt == SHRT_MAX)
|
2011-10-28 01:58:47 +04:00
|
|
|
goto done;
|
|
|
|
|
|
|
|
info->refcnt++;
|
|
|
|
err = 0;
|
|
|
|
done:
|
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(evtchn_get);
|
|
|
|
|
2020-03-23 19:15:11 +03:00
|
|
|
void evtchn_put(evtchn_port_t evtchn)
|
2011-10-28 01:58:47 +04:00
|
|
|
{
|
2013-10-17 18:23:15 +04:00
|
|
|
int irq = get_evtchn_to_irq(evtchn);
|
2011-10-28 01:58:47 +04:00
|
|
|
if (WARN_ON(irq == -1))
|
|
|
|
return;
|
|
|
|
unbind_from_irq(irq);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(evtchn_put);
|
|
|
|
|
2007-07-18 05:37:06 +04:00
|
|
|
void xen_send_IPI_one(unsigned int cpu, enum ipi_vector vector)
|
|
|
|
{
|
2013-07-19 19:51:31 +04:00
|
|
|
int irq;
|
|
|
|
|
2013-08-13 20:57:06 +04:00
|
|
|
#ifdef CONFIG_X86
|
2013-07-19 19:51:31 +04:00
|
|
|
if (unlikely(vector == XEN_NMI_VECTOR)) {
|
2016-06-30 18:56:38 +03:00
|
|
|
int rc = HYPERVISOR_vcpu_op(VCPUOP_send_nmi, xen_vcpu_nr(cpu),
|
|
|
|
NULL);
|
2013-07-19 19:51:31 +04:00
|
|
|
if (rc < 0)
|
|
|
|
printk(KERN_WARNING "Sending nmi to CPU%d failed (rc:%d)\n", cpu, rc);
|
|
|
|
return;
|
|
|
|
}
|
2013-08-13 20:57:06 +04:00
|
|
|
#endif
|
2013-07-19 19:51:31 +04:00
|
|
|
irq = per_cpu(ipi_to_irq, cpu)[vector];
|
2007-07-18 05:37:06 +04:00
|
|
|
BUG_ON(irq < 0);
|
|
|
|
notify_remote_via_irq(irq);
|
|
|
|
}
|
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
struct evtchn_loop_ctrl {
|
|
|
|
ktime_t timeout;
|
|
|
|
unsigned count;
|
|
|
|
bool defer_eoi;
|
|
|
|
};
|
|
|
|
|
|
|
|
void handle_irq_for_port(evtchn_port_t port, struct evtchn_loop_ctrl *ctrl)
|
|
|
|
{
|
|
|
|
int irq;
|
|
|
|
struct irq_info *info;
|
2021-02-19 18:40:28 +03:00
|
|
|
struct xenbus_device *dev;
|
2020-09-07 16:47:30 +03:00
|
|
|
|
|
|
|
irq = get_evtchn_to_irq(port);
|
|
|
|
if (irq == -1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check for timeout every 256 events.
|
|
|
|
* We are setting the timeout value only after the first 256
|
|
|
|
* events in order to not hurt the common case of few loop
|
|
|
|
* iterations. The 256 is basically an arbitrary value.
|
|
|
|
*
|
|
|
|
* In case we are hitting the timeout we need to defer all further
|
|
|
|
* EOIs in order to ensure to leave the event handling loop rather
|
|
|
|
* sooner than later.
|
|
|
|
*/
|
|
|
|
if (!ctrl->defer_eoi && !(++ctrl->count & 0xff)) {
|
|
|
|
ktime_t kt = ktime_get();
|
|
|
|
|
|
|
|
if (!ctrl->timeout) {
|
|
|
|
kt = ktime_add_ms(kt,
|
|
|
|
jiffies_to_msecs(event_loop_timeout));
|
|
|
|
ctrl->timeout = kt;
|
|
|
|
} else if (kt > ctrl->timeout) {
|
|
|
|
ctrl->defer_eoi = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
info = info_for_irq(irq);
|
2021-03-06 19:18:33 +03:00
|
|
|
if (xchg_acquire(&info->is_active, 1))
|
|
|
|
return;
|
2020-09-07 16:47:30 +03:00
|
|
|
|
2021-02-19 18:40:28 +03:00
|
|
|
dev = (info->type == IRQT_EVTCHN) ? info->u.interdomain : NULL;
|
|
|
|
if (dev)
|
|
|
|
atomic_inc(&dev->events);
|
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
if (ctrl->defer_eoi) {
|
|
|
|
info->eoi_cpu = smp_processor_id();
|
|
|
|
info->irq_epoch = __this_cpu_read(irq_epoch);
|
|
|
|
info->eoi_time = get_jiffies_64() + event_eoi_delay;
|
|
|
|
}
|
|
|
|
|
|
|
|
generic_handle_irq(irq);
|
|
|
|
}
|
|
|
|
|
2010-05-14 15:40:51 +04:00
|
|
|
static void __xen_evtchn_do_upcall(void)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2010-12-06 20:16:29 +03:00
|
|
|
struct vcpu_info *vcpu_info = __this_cpu_read(xen_vcpu);
|
2019-11-29 15:39:41 +03:00
|
|
|
int cpu = smp_processor_id();
|
2020-09-07 16:47:30 +03:00
|
|
|
struct evtchn_loop_ctrl ctrl = { 0 };
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
read_lock(&evtchn_rwlock);
|
|
|
|
|
2008-03-18 02:37:20 +03:00
|
|
|
do {
|
|
|
|
vcpu_info->evtchn_upcall_pending = 0;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
xen_evtchn_handle_events(cpu, &ctrl);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2008-03-18 02:37:20 +03:00
|
|
|
BUG_ON(!irqs_disabled());
|
|
|
|
|
2019-11-29 15:39:41 +03:00
|
|
|
virt_rmb(); /* Hypervisor can set upcall pending. */
|
2010-05-14 15:40:51 +04:00
|
|
|
|
2019-11-29 15:39:41 +03:00
|
|
|
} while (vcpu_info->evtchn_upcall_pending);
|
2020-09-07 16:47:27 +03:00
|
|
|
|
|
|
|
read_unlock(&evtchn_rwlock);
|
2020-09-07 16:47:30 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Increment irq_epoch only now to defer EOIs only for
|
|
|
|
* xen_irq_lateeoi() invocations occurring from inside the loop
|
|
|
|
* above.
|
|
|
|
*/
|
|
|
|
__this_cpu_inc(irq_epoch);
|
2010-05-14 15:40:51 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
void xen_evtchn_do_upcall(struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
struct pt_regs *old_regs = set_irq_regs(regs);
|
|
|
|
|
2012-11-06 12:08:15 +04:00
|
|
|
irq_enter();
|
2010-05-14 15:40:51 +04:00
|
|
|
|
|
|
|
__xen_evtchn_do_upcall();
|
|
|
|
|
2009-02-07 01:09:46 +03:00
|
|
|
irq_exit();
|
|
|
|
set_irq_regs(old_regs);
|
2010-05-14 15:40:51 +04:00
|
|
|
}
|
2009-02-07 01:09:46 +03:00
|
|
|
|
2010-05-14 15:40:51 +04:00
|
|
|
void xen_hvm_evtchn_do_upcall(void)
|
|
|
|
{
|
|
|
|
__xen_evtchn_do_upcall();
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
2010-05-17 20:08:21 +04:00
|
|
|
EXPORT_SYMBOL_GPL(xen_hvm_evtchn_do_upcall);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2008-05-27 02:31:23 +04:00
|
|
|
/* Rebind a new event channel to an existing irq. */
|
2020-03-23 19:15:11 +03:00
|
|
|
void rebind_evtchn_irq(evtchn_port_t evtchn, int irq)
|
2008-05-27 02:31:23 +04:00
|
|
|
{
|
2009-02-07 01:09:45 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
|
2013-04-16 18:55:18 +04:00
|
|
|
if (WARN_ON(!info))
|
|
|
|
return;
|
|
|
|
|
2008-05-27 02:31:23 +04:00
|
|
|
/* Make sure the irq is masked, since the new event channel
|
|
|
|
will also be masked. */
|
|
|
|
disable_irq(irq);
|
|
|
|
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_lock(&irq_mapping_update_lock);
|
2008-05-27 02:31:23 +04:00
|
|
|
|
|
|
|
/* After resume the irq<->evtchn mappings are all cleared out */
|
2013-10-17 18:23:15 +04:00
|
|
|
BUG_ON(get_evtchn_to_irq(evtchn) != -1);
|
2008-05-27 02:31:23 +04:00
|
|
|
/* Expect irq to have been bound before,
|
2009-02-07 01:09:45 +03:00
|
|
|
so there should be a proper type */
|
|
|
|
BUG_ON(info->type == IRQT_UNBOUND);
|
2008-05-27 02:31:23 +04:00
|
|
|
|
2021-02-11 13:16:13 +03:00
|
|
|
(void)xen_irq_info_evtchn_setup(irq, evtchn, NULL);
|
2008-05-27 02:31:23 +04:00
|
|
|
|
2011-09-14 13:10:00 +04:00
|
|
|
mutex_unlock(&irq_mapping_update_lock);
|
2008-05-27 02:31:23 +04:00
|
|
|
|
2020-12-10 22:26:03 +03:00
|
|
|
bind_evtchn_to_cpu(evtchn, info->cpu, false);
|
2008-05-27 02:31:23 +04:00
|
|
|
|
|
|
|
/* Unmask the event channel. */
|
|
|
|
enable_irq(irq);
|
|
|
|
}
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
/* Rebind an evtchn so that it gets delivered to a specific cpu */
|
2021-03-06 19:18:32 +03:00
|
|
|
static int xen_rebind_evtchn_to_cpu(struct irq_info *info, unsigned int tcpu)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
|
|
|
struct evtchn_bind_vcpu bind_vcpu;
|
2021-03-06 19:18:32 +03:00
|
|
|
evtchn_port_t evtchn = info ? info->evtchn : 0;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2011-03-10 19:08:02 +03:00
|
|
|
if (!VALID_EVTCHN(evtchn))
|
|
|
|
return -1;
|
|
|
|
|
2017-04-24 22:04:53 +03:00
|
|
|
if (!xen_support_evtchn_rebind())
|
|
|
|
return -1;
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
/* Send future instances of this interrupt to other vcpu. */
|
|
|
|
bind_vcpu.port = evtchn;
|
2016-06-30 18:56:40 +03:00
|
|
|
bind_vcpu.vcpu = xen_vcpu_nr(tcpu);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2013-08-15 16:21:07 +04:00
|
|
|
/*
|
|
|
|
* Mask the event while changing the VCPU binding to prevent
|
|
|
|
* it being delivered on an unexpected VCPU.
|
|
|
|
*/
|
2021-03-06 19:18:32 +03:00
|
|
|
do_mask(info, EVT_MASK_REASON_TEMPORARY);
|
2013-08-15 16:21:07 +04:00
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
/*
|
|
|
|
* If this fails, it usually just indicates that we're dealing with a
|
|
|
|
* virq or IPI channel, which don't actually need to be rebound. Ignore
|
|
|
|
* it, but don't do the xenlinux-level rebind in that case.
|
|
|
|
*/
|
|
|
|
if (HYPERVISOR_event_channel_op(EVTCHNOP_bind_vcpu, &bind_vcpu) >= 0)
|
2020-12-10 22:26:03 +03:00
|
|
|
bind_evtchn_to_cpu(evtchn, tcpu, false);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2021-03-06 19:18:32 +03:00
|
|
|
do_unmask(info, EVT_MASK_REASON_TEMPORARY);
|
2013-08-15 16:21:07 +04:00
|
|
|
|
2009-04-28 04:59:21 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2020-12-10 22:26:05 +03:00
|
|
|
/*
|
|
|
|
* Find the CPU within @dest mask which has the least number of channels
|
|
|
|
* assigned. This is not precise as the per cpu counts can be modified
|
|
|
|
* concurrently.
|
|
|
|
*/
|
|
|
|
static unsigned int select_target_cpu(const struct cpumask *dest)
|
|
|
|
{
|
|
|
|
unsigned int cpu, best_cpu = UINT_MAX, minch = UINT_MAX;
|
|
|
|
|
|
|
|
for_each_cpu_and(cpu, dest, cpu_online_mask) {
|
|
|
|
unsigned int curch = atomic_read(&channels_on_cpu[cpu]);
|
|
|
|
|
|
|
|
if (curch < minch) {
|
|
|
|
minch = curch;
|
|
|
|
best_cpu = cpu;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Catch the unlikely case that dest contains no online CPUs. Can't
|
|
|
|
* recurse.
|
|
|
|
*/
|
|
|
|
if (best_cpu == UINT_MAX)
|
|
|
|
return select_target_cpu(cpu_online_mask);
|
|
|
|
|
|
|
|
return best_cpu;
|
|
|
|
}
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
static int set_affinity_irq(struct irq_data *data, const struct cpumask *dest,
|
|
|
|
bool force)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2020-12-10 22:26:05 +03:00
|
|
|
unsigned int tcpu = select_target_cpu(dest);
|
2020-12-10 22:26:02 +03:00
|
|
|
int ret;
|
2009-04-28 04:59:21 +04:00
|
|
|
|
2021-03-06 19:18:32 +03:00
|
|
|
ret = xen_rebind_evtchn_to_cpu(info_for_irq(data->irq), tcpu);
|
2017-06-20 02:37:45 +03:00
|
|
|
if (!ret)
|
|
|
|
irq_data_update_effective_affinity(data, cpumask_of(tcpu));
|
|
|
|
|
|
|
|
return ret;
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
static void enable_dynirq(struct irq_data *data)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2021-03-06 19:18:32 +03:00
|
|
|
struct irq_info *info = info_for_irq(data->irq);
|
|
|
|
evtchn_port_t evtchn = info ? info->evtchn : 0;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn))
|
2021-03-06 19:18:32 +03:00
|
|
|
do_unmask(info, EVT_MASK_REASON_EXPLICIT);
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
static void disable_dynirq(struct irq_data *data)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2021-03-06 19:18:32 +03:00
|
|
|
struct irq_info *info = info_for_irq(data->irq);
|
|
|
|
evtchn_port_t evtchn = info ? info->evtchn : 0;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn))
|
2021-03-06 19:18:32 +03:00
|
|
|
do_mask(info, EVT_MASK_REASON_EXPLICIT);
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
static void ack_dynirq(struct irq_data *data)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2021-03-06 19:18:33 +03:00
|
|
|
struct irq_info *info = info_for_irq(data->irq);
|
|
|
|
evtchn_port_t evtchn = info ? info->evtchn : 0;
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2021-03-06 19:18:33 +03:00
|
|
|
if (VALID_EVTCHN(evtchn))
|
|
|
|
event_handler_exit(info);
|
2011-05-06 15:27:50 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void mask_ack_dynirq(struct irq_data *data)
|
|
|
|
{
|
|
|
|
disable_dynirq(data);
|
|
|
|
ack_dynirq(data);
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2021-03-06 19:18:32 +03:00
|
|
|
static void lateeoi_ack_dynirq(struct irq_data *data)
|
|
|
|
{
|
|
|
|
struct irq_info *info = info_for_irq(data->irq);
|
|
|
|
evtchn_port_t evtchn = info ? info->evtchn : 0;
|
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn)) {
|
|
|
|
do_mask(info, EVT_MASK_REASON_EOI_PENDING);
|
2021-06-23 16:09:13 +03:00
|
|
|
/*
|
|
|
|
* Don't call event_handler_exit().
|
|
|
|
* Need to keep is_active non-zero in order to ignore re-raised
|
|
|
|
* events after cpu affinity changes while a lateeoi is pending.
|
|
|
|
*/
|
|
|
|
clear_evtchn(evtchn);
|
2021-03-06 19:18:32 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void lateeoi_mask_ack_dynirq(struct irq_data *data)
|
|
|
|
{
|
|
|
|
struct irq_info *info = info_for_irq(data->irq);
|
|
|
|
evtchn_port_t evtchn = info ? info->evtchn : 0;
|
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn)) {
|
|
|
|
do_mask(info, EVT_MASK_REASON_EXPLICIT);
|
2021-03-06 19:18:33 +03:00
|
|
|
event_handler_exit(info);
|
2021-03-06 19:18:32 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
static int retrigger_dynirq(struct irq_data *data)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2021-03-06 19:18:32 +03:00
|
|
|
struct irq_info *info = info_for_irq(data->irq);
|
|
|
|
evtchn_port_t evtchn = info ? info->evtchn : 0;
|
2014-02-17 21:45:16 +04:00
|
|
|
|
|
|
|
if (!VALID_EVTCHN(evtchn))
|
|
|
|
return 0;
|
|
|
|
|
2021-03-06 19:18:32 +03:00
|
|
|
do_mask(info, EVT_MASK_REASON_TEMPORARY);
|
2014-02-17 21:45:16 +04:00
|
|
|
set_evtchn(evtchn);
|
2021-03-06 19:18:32 +03:00
|
|
|
do_unmask(info, EVT_MASK_REASON_TEMPORARY);
|
2014-02-17 21:45:16 +04:00
|
|
|
|
|
|
|
return 1;
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|
|
|
|
|
2011-03-10 19:08:06 +03:00
|
|
|
static void restore_pirqs(void)
|
2010-12-01 17:51:44 +03:00
|
|
|
{
|
|
|
|
int pirq, rc, irq, gsi;
|
|
|
|
struct physdev_map_pirq map_irq;
|
2011-03-10 19:08:13 +03:00
|
|
|
struct irq_info *info;
|
2010-12-01 17:51:44 +03:00
|
|
|
|
2011-03-10 19:08:13 +03:00
|
|
|
list_for_each_entry(info, &xen_irq_list_head, list) {
|
|
|
|
if (info->type != IRQT_PIRQ)
|
2010-12-01 17:51:44 +03:00
|
|
|
continue;
|
|
|
|
|
2011-03-10 19:08:13 +03:00
|
|
|
pirq = info->u.pirq.pirq;
|
|
|
|
gsi = info->u.pirq.gsi;
|
|
|
|
irq = info->irq;
|
|
|
|
|
2010-12-01 17:51:44 +03:00
|
|
|
/* save/restore of PT devices doesn't work, so at this point the
|
|
|
|
* only devices present are GSI based emulated devices */
|
|
|
|
if (!gsi)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
map_irq.domid = DOMID_SELF;
|
|
|
|
map_irq.type = MAP_PIRQ_TYPE_GSI;
|
|
|
|
map_irq.index = gsi;
|
|
|
|
map_irq.pirq = pirq;
|
|
|
|
|
|
|
|
rc = HYPERVISOR_physdev_op(PHYSDEVOP_map_pirq, &map_irq);
|
|
|
|
if (rc) {
|
2013-06-28 14:21:41 +04:00
|
|
|
pr_warn("xen map irq failed gsi=%d irq=%d pirq=%d rc=%d\n",
|
|
|
|
gsi, irq, pirq, rc);
|
2011-03-10 19:08:09 +03:00
|
|
|
xen_free_irq(irq);
|
2010-12-01 17:51:44 +03:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
printk(KERN_DEBUG "xen: --> irq=%d, pirq=%d\n", irq, map_irq.pirq);
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
__startup_pirq(irq);
|
2010-12-01 17:51:44 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-05-27 02:31:27 +04:00
|
|
|
static void restore_cpu_virqs(unsigned int cpu)
|
|
|
|
{
|
|
|
|
struct evtchn_bind_virq bind_virq;
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn;
|
|
|
|
int virq, irq;
|
2008-05-27 02:31:27 +04:00
|
|
|
|
|
|
|
for (virq = 0; virq < NR_VIRQS; virq++) {
|
|
|
|
if ((irq = per_cpu(virq_to_irq, cpu)[virq]) == -1)
|
|
|
|
continue;
|
|
|
|
|
2009-02-07 01:09:44 +03:00
|
|
|
BUG_ON(virq_from_irq(irq) != virq);
|
2008-05-27 02:31:27 +04:00
|
|
|
|
|
|
|
/* Get a new binding from Xen. */
|
|
|
|
bind_virq.virq = virq;
|
2016-06-30 18:56:40 +03:00
|
|
|
bind_virq.vcpu = xen_vcpu_nr(cpu);
|
2008-05-27 02:31:27 +04:00
|
|
|
if (HYPERVISOR_event_channel_op(EVTCHNOP_bind_virq,
|
|
|
|
&bind_virq) != 0)
|
|
|
|
BUG();
|
|
|
|
evtchn = bind_virq.port;
|
|
|
|
|
|
|
|
/* Record the new mapping. */
|
2013-03-18 19:50:17 +04:00
|
|
|
(void)xen_irq_info_virq_setup(cpu, irq, evtchn, virq);
|
2020-12-10 22:26:03 +03:00
|
|
|
/* The affinity mask is still valid */
|
|
|
|
bind_evtchn_to_cpu(evtchn, cpu, false);
|
2008-05-27 02:31:27 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void restore_cpu_ipis(unsigned int cpu)
|
|
|
|
{
|
|
|
|
struct evtchn_bind_ipi bind_ipi;
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn;
|
|
|
|
int ipi, irq;
|
2008-05-27 02:31:27 +04:00
|
|
|
|
|
|
|
for (ipi = 0; ipi < XEN_NR_IPIS; ipi++) {
|
|
|
|
if ((irq = per_cpu(ipi_to_irq, cpu)[ipi]) == -1)
|
|
|
|
continue;
|
|
|
|
|
2009-02-07 01:09:44 +03:00
|
|
|
BUG_ON(ipi_from_irq(irq) != ipi);
|
2008-05-27 02:31:27 +04:00
|
|
|
|
|
|
|
/* Get a new binding from Xen. */
|
2016-06-30 18:56:40 +03:00
|
|
|
bind_ipi.vcpu = xen_vcpu_nr(cpu);
|
2008-05-27 02:31:27 +04:00
|
|
|
if (HYPERVISOR_event_channel_op(EVTCHNOP_bind_ipi,
|
|
|
|
&bind_ipi) != 0)
|
|
|
|
BUG();
|
|
|
|
evtchn = bind_ipi.port;
|
|
|
|
|
|
|
|
/* Record the new mapping. */
|
2013-03-18 19:50:17 +04:00
|
|
|
(void)xen_irq_info_ipi_setup(cpu, irq, evtchn, ipi);
|
2020-12-10 22:26:03 +03:00
|
|
|
/* The affinity mask is still valid */
|
|
|
|
bind_evtchn_to_cpu(evtchn, cpu, false);
|
2008-05-27 02:31:27 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
xen: implement Xen-specific spinlocks
The standard ticket spinlocks are very expensive in a virtual
environment, because their performance depends on Xen's scheduler
giving vcpus time in the order that they're supposed to take the
spinlock.
This implements a Xen-specific spinlock, which should be much more
efficient.
The fast-path is essentially the old Linux-x86 locks, using a single
lock byte. The locker decrements the byte; if the result is 0, then
they have the lock. If the lock is negative, then locker must spin
until the lock is positive again.
When there's contention, the locker spin for 2^16[*] iterations waiting
to get the lock. If it fails to get the lock in that time, it adds
itself to the contention count in the lock and blocks on a per-cpu
event channel.
When unlocking the spinlock, the locker looks to see if there's anyone
blocked waiting for the lock by checking for a non-zero waiter count.
If there's a waiter, it traverses the per-cpu "lock_spinners"
variable, which contains which lock each CPU is waiting on. It picks
one CPU waiting on the lock and sends it an event to wake it up.
This allows efficient fast-path spinlock operation, while allowing
spinning vcpus to give up their processor time while waiting for a
contended lock.
[*] 2^16 iterations is threshold at which 98% locks have been taken
according to Thomas Friebel's Xen Summit talk "Preventing Guests from
Spinning Around". Therefore, we'd expect the lock and unlock slow
paths will only be entered 2% of the time.
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Cc: Jens Axboe <axboe@kernel.dk>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Christoph Lameter <clameter@linux-foundation.org>
Cc: Petr Tesarik <ptesarik@suse.cz>
Cc: Virtualization <virtualization@lists.linux-foundation.org>
Cc: Xen devel <xen-devel@lists.xensource.com>
Cc: Thomas Friebel <thomas.friebel@amd.com>
Cc: Nick Piggin <nickpiggin@yahoo.com.au>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2008-07-07 23:07:53 +04:00
|
|
|
/* Clear an irq's pending state, in preparation for polling on it */
|
|
|
|
void xen_clear_irq_pending(int irq)
|
|
|
|
{
|
2021-03-06 19:18:33 +03:00
|
|
|
struct irq_info *info = info_for_irq(irq);
|
|
|
|
evtchn_port_t evtchn = info ? info->evtchn : 0;
|
xen: implement Xen-specific spinlocks
The standard ticket spinlocks are very expensive in a virtual
environment, because their performance depends on Xen's scheduler
giving vcpus time in the order that they're supposed to take the
spinlock.
This implements a Xen-specific spinlock, which should be much more
efficient.
The fast-path is essentially the old Linux-x86 locks, using a single
lock byte. The locker decrements the byte; if the result is 0, then
they have the lock. If the lock is negative, then locker must spin
until the lock is positive again.
When there's contention, the locker spin for 2^16[*] iterations waiting
to get the lock. If it fails to get the lock in that time, it adds
itself to the contention count in the lock and blocks on a per-cpu
event channel.
When unlocking the spinlock, the locker looks to see if there's anyone
blocked waiting for the lock by checking for a non-zero waiter count.
If there's a waiter, it traverses the per-cpu "lock_spinners"
variable, which contains which lock each CPU is waiting on. It picks
one CPU waiting on the lock and sends it an event to wake it up.
This allows efficient fast-path spinlock operation, while allowing
spinning vcpus to give up their processor time while waiting for a
contended lock.
[*] 2^16 iterations is threshold at which 98% locks have been taken
according to Thomas Friebel's Xen Summit talk "Preventing Guests from
Spinning Around". Therefore, we'd expect the lock and unlock slow
paths will only be entered 2% of the time.
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Cc: Jens Axboe <axboe@kernel.dk>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Christoph Lameter <clameter@linux-foundation.org>
Cc: Petr Tesarik <ptesarik@suse.cz>
Cc: Virtualization <virtualization@lists.linux-foundation.org>
Cc: Xen devel <xen-devel@lists.xensource.com>
Cc: Thomas Friebel <thomas.friebel@amd.com>
Cc: Nick Piggin <nickpiggin@yahoo.com.au>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2008-07-07 23:07:53 +04:00
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn))
|
2021-03-06 19:18:33 +03:00
|
|
|
event_handler_exit(info);
|
xen: implement Xen-specific spinlocks
The standard ticket spinlocks are very expensive in a virtual
environment, because their performance depends on Xen's scheduler
giving vcpus time in the order that they're supposed to take the
spinlock.
This implements a Xen-specific spinlock, which should be much more
efficient.
The fast-path is essentially the old Linux-x86 locks, using a single
lock byte. The locker decrements the byte; if the result is 0, then
they have the lock. If the lock is negative, then locker must spin
until the lock is positive again.
When there's contention, the locker spin for 2^16[*] iterations waiting
to get the lock. If it fails to get the lock in that time, it adds
itself to the contention count in the lock and blocks on a per-cpu
event channel.
When unlocking the spinlock, the locker looks to see if there's anyone
blocked waiting for the lock by checking for a non-zero waiter count.
If there's a waiter, it traverses the per-cpu "lock_spinners"
variable, which contains which lock each CPU is waiting on. It picks
one CPU waiting on the lock and sends it an event to wake it up.
This allows efficient fast-path spinlock operation, while allowing
spinning vcpus to give up their processor time while waiting for a
contended lock.
[*] 2^16 iterations is threshold at which 98% locks have been taken
according to Thomas Friebel's Xen Summit talk "Preventing Guests from
Spinning Around". Therefore, we'd expect the lock and unlock slow
paths will only be entered 2% of the time.
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Cc: Jens Axboe <axboe@kernel.dk>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Christoph Lameter <clameter@linux-foundation.org>
Cc: Petr Tesarik <ptesarik@suse.cz>
Cc: Virtualization <virtualization@lists.linux-foundation.org>
Cc: Xen devel <xen-devel@lists.xensource.com>
Cc: Thomas Friebel <thomas.friebel@amd.com>
Cc: Nick Piggin <nickpiggin@yahoo.com.au>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2008-07-07 23:07:53 +04:00
|
|
|
}
|
2009-11-06 00:33:09 +03:00
|
|
|
EXPORT_SYMBOL(xen_clear_irq_pending);
|
2008-08-21 04:02:18 +04:00
|
|
|
void xen_set_irq_pending(int irq)
|
|
|
|
{
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn = evtchn_from_irq(irq);
|
2008-08-21 04:02:18 +04:00
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn))
|
|
|
|
set_evtchn(evtchn);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool xen_test_irq_pending(int irq)
|
|
|
|
{
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn = evtchn_from_irq(irq);
|
2008-08-21 04:02:18 +04:00
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn))
|
|
|
|
ret = test_evtchn(evtchn);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-11-06 00:33:09 +03:00
|
|
|
/* Poll waiting for an irq to become pending with timeout. In the usual case,
|
|
|
|
* the irq will be disabled so it won't deliver an interrupt. */
|
|
|
|
void xen_poll_irq_timeout(int irq, u64 timeout)
|
xen: implement Xen-specific spinlocks
The standard ticket spinlocks are very expensive in a virtual
environment, because their performance depends on Xen's scheduler
giving vcpus time in the order that they're supposed to take the
spinlock.
This implements a Xen-specific spinlock, which should be much more
efficient.
The fast-path is essentially the old Linux-x86 locks, using a single
lock byte. The locker decrements the byte; if the result is 0, then
they have the lock. If the lock is negative, then locker must spin
until the lock is positive again.
When there's contention, the locker spin for 2^16[*] iterations waiting
to get the lock. If it fails to get the lock in that time, it adds
itself to the contention count in the lock and blocks on a per-cpu
event channel.
When unlocking the spinlock, the locker looks to see if there's anyone
blocked waiting for the lock by checking for a non-zero waiter count.
If there's a waiter, it traverses the per-cpu "lock_spinners"
variable, which contains which lock each CPU is waiting on. It picks
one CPU waiting on the lock and sends it an event to wake it up.
This allows efficient fast-path spinlock operation, while allowing
spinning vcpus to give up their processor time while waiting for a
contended lock.
[*] 2^16 iterations is threshold at which 98% locks have been taken
according to Thomas Friebel's Xen Summit talk "Preventing Guests from
Spinning Around". Therefore, we'd expect the lock and unlock slow
paths will only be entered 2% of the time.
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Cc: Jens Axboe <axboe@kernel.dk>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Christoph Lameter <clameter@linux-foundation.org>
Cc: Petr Tesarik <ptesarik@suse.cz>
Cc: Virtualization <virtualization@lists.linux-foundation.org>
Cc: Xen devel <xen-devel@lists.xensource.com>
Cc: Thomas Friebel <thomas.friebel@amd.com>
Cc: Nick Piggin <nickpiggin@yahoo.com.au>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2008-07-07 23:07:53 +04:00
|
|
|
{
|
|
|
|
evtchn_port_t evtchn = evtchn_from_irq(irq);
|
|
|
|
|
|
|
|
if (VALID_EVTCHN(evtchn)) {
|
|
|
|
struct sched_poll poll;
|
|
|
|
|
|
|
|
poll.nr_ports = 1;
|
2009-11-06 00:33:09 +03:00
|
|
|
poll.timeout = timeout;
|
2008-10-15 04:50:44 +04:00
|
|
|
set_xen_guest_handle(poll.ports, &evtchn);
|
xen: implement Xen-specific spinlocks
The standard ticket spinlocks are very expensive in a virtual
environment, because their performance depends on Xen's scheduler
giving vcpus time in the order that they're supposed to take the
spinlock.
This implements a Xen-specific spinlock, which should be much more
efficient.
The fast-path is essentially the old Linux-x86 locks, using a single
lock byte. The locker decrements the byte; if the result is 0, then
they have the lock. If the lock is negative, then locker must spin
until the lock is positive again.
When there's contention, the locker spin for 2^16[*] iterations waiting
to get the lock. If it fails to get the lock in that time, it adds
itself to the contention count in the lock and blocks on a per-cpu
event channel.
When unlocking the spinlock, the locker looks to see if there's anyone
blocked waiting for the lock by checking for a non-zero waiter count.
If there's a waiter, it traverses the per-cpu "lock_spinners"
variable, which contains which lock each CPU is waiting on. It picks
one CPU waiting on the lock and sends it an event to wake it up.
This allows efficient fast-path spinlock operation, while allowing
spinning vcpus to give up their processor time while waiting for a
contended lock.
[*] 2^16 iterations is threshold at which 98% locks have been taken
according to Thomas Friebel's Xen Summit talk "Preventing Guests from
Spinning Around". Therefore, we'd expect the lock and unlock slow
paths will only be entered 2% of the time.
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Cc: Jens Axboe <axboe@kernel.dk>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Christoph Lameter <clameter@linux-foundation.org>
Cc: Petr Tesarik <ptesarik@suse.cz>
Cc: Virtualization <virtualization@lists.linux-foundation.org>
Cc: Xen devel <xen-devel@lists.xensource.com>
Cc: Thomas Friebel <thomas.friebel@amd.com>
Cc: Nick Piggin <nickpiggin@yahoo.com.au>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2008-07-07 23:07:53 +04:00
|
|
|
|
|
|
|
if (HYPERVISOR_sched_op(SCHEDOP_poll, &poll) != 0)
|
|
|
|
BUG();
|
|
|
|
}
|
|
|
|
}
|
2009-11-06 00:33:09 +03:00
|
|
|
EXPORT_SYMBOL(xen_poll_irq_timeout);
|
|
|
|
/* Poll waiting for an irq to become pending. In the usual case, the
|
|
|
|
* irq will be disabled so it won't deliver an interrupt. */
|
|
|
|
void xen_poll_irq(int irq)
|
|
|
|
{
|
|
|
|
xen_poll_irq_timeout(irq, 0 /* no timeout */);
|
|
|
|
}
|
xen: implement Xen-specific spinlocks
The standard ticket spinlocks are very expensive in a virtual
environment, because their performance depends on Xen's scheduler
giving vcpus time in the order that they're supposed to take the
spinlock.
This implements a Xen-specific spinlock, which should be much more
efficient.
The fast-path is essentially the old Linux-x86 locks, using a single
lock byte. The locker decrements the byte; if the result is 0, then
they have the lock. If the lock is negative, then locker must spin
until the lock is positive again.
When there's contention, the locker spin for 2^16[*] iterations waiting
to get the lock. If it fails to get the lock in that time, it adds
itself to the contention count in the lock and blocks on a per-cpu
event channel.
When unlocking the spinlock, the locker looks to see if there's anyone
blocked waiting for the lock by checking for a non-zero waiter count.
If there's a waiter, it traverses the per-cpu "lock_spinners"
variable, which contains which lock each CPU is waiting on. It picks
one CPU waiting on the lock and sends it an event to wake it up.
This allows efficient fast-path spinlock operation, while allowing
spinning vcpus to give up their processor time while waiting for a
contended lock.
[*] 2^16 iterations is threshold at which 98% locks have been taken
according to Thomas Friebel's Xen Summit talk "Preventing Guests from
Spinning Around". Therefore, we'd expect the lock and unlock slow
paths will only be entered 2% of the time.
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Cc: Jens Axboe <axboe@kernel.dk>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Christoph Lameter <clameter@linux-foundation.org>
Cc: Petr Tesarik <ptesarik@suse.cz>
Cc: Virtualization <virtualization@lists.linux-foundation.org>
Cc: Xen devel <xen-devel@lists.xensource.com>
Cc: Thomas Friebel <thomas.friebel@amd.com>
Cc: Nick Piggin <nickpiggin@yahoo.com.au>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2008-07-07 23:07:53 +04:00
|
|
|
|
2010-11-08 22:26:36 +03:00
|
|
|
/* Check whether the IRQ line is shared with other guests. */
|
|
|
|
int xen_test_irq_shared(int irq)
|
|
|
|
{
|
|
|
|
struct irq_info *info = info_for_irq(irq);
|
2013-04-16 18:55:18 +04:00
|
|
|
struct physdev_irq_status_query irq_status;
|
|
|
|
|
|
|
|
if (WARN_ON(!info))
|
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
irq_status.irq = info->u.pirq.pirq;
|
2010-11-08 22:26:36 +03:00
|
|
|
|
|
|
|
if (HYPERVISOR_physdev_op(PHYSDEVOP_irq_status_query, &irq_status))
|
|
|
|
return 0;
|
|
|
|
return !(irq_status.flags & XENIRQSTAT_shared);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(xen_test_irq_shared);
|
|
|
|
|
2008-05-27 02:31:27 +04:00
|
|
|
void xen_irq_resume(void)
|
|
|
|
{
|
2013-09-05 21:11:38 +04:00
|
|
|
unsigned int cpu;
|
2011-03-10 19:08:11 +03:00
|
|
|
struct irq_info *info;
|
2008-05-27 02:31:27 +04:00
|
|
|
|
|
|
|
/* New event-channel space is not 'live' yet. */
|
2013-03-15 17:02:35 +04:00
|
|
|
xen_evtchn_resume();
|
2008-05-27 02:31:27 +04:00
|
|
|
|
|
|
|
/* No IRQ <-> event-channel mappings. */
|
2020-12-10 22:26:05 +03:00
|
|
|
list_for_each_entry(info, &xen_irq_list_head, list) {
|
|
|
|
/* Zap event-channel binding */
|
|
|
|
info->evtchn = 0;
|
|
|
|
/* Adjust accounting */
|
|
|
|
channels_on_cpu_dec(info);
|
|
|
|
}
|
2008-05-27 02:31:27 +04:00
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
clear_evtchn_to_irq_all();
|
2008-05-27 02:31:27 +04:00
|
|
|
|
|
|
|
for_each_possible_cpu(cpu) {
|
|
|
|
restore_cpu_virqs(cpu);
|
|
|
|
restore_cpu_ipis(cpu);
|
|
|
|
}
|
2010-11-01 19:30:09 +03:00
|
|
|
|
2011-03-10 19:08:06 +03:00
|
|
|
restore_pirqs();
|
2008-05-27 02:31:27 +04:00
|
|
|
}
|
|
|
|
|
2007-07-18 05:37:05 +04:00
|
|
|
static struct irq_chip xen_dynamic_chip __read_mostly = {
|
2011-02-05 23:08:54 +03:00
|
|
|
.name = "xen-dyn",
|
2009-02-07 01:09:42 +03:00
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
.irq_disable = disable_dynirq,
|
|
|
|
.irq_mask = disable_dynirq,
|
|
|
|
.irq_unmask = enable_dynirq,
|
2009-02-07 01:09:42 +03:00
|
|
|
|
2011-05-06 15:27:50 +04:00
|
|
|
.irq_ack = ack_dynirq,
|
|
|
|
.irq_mask_ack = mask_ack_dynirq,
|
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
.irq_set_affinity = set_affinity_irq,
|
|
|
|
.irq_retrigger = retrigger_dynirq,
|
2007-07-18 05:37:05 +04:00
|
|
|
};
|
|
|
|
|
2020-09-07 16:47:27 +03:00
|
|
|
static struct irq_chip xen_lateeoi_chip __read_mostly = {
|
|
|
|
/* The chip name needs to contain "xen-dyn" for irqbalance to work. */
|
|
|
|
.name = "xen-dyn-lateeoi",
|
|
|
|
|
|
|
|
.irq_disable = disable_dynirq,
|
|
|
|
.irq_mask = disable_dynirq,
|
|
|
|
.irq_unmask = enable_dynirq,
|
|
|
|
|
2021-03-06 19:18:32 +03:00
|
|
|
.irq_ack = lateeoi_ack_dynirq,
|
|
|
|
.irq_mask_ack = lateeoi_mask_ack_dynirq,
|
2020-09-07 16:47:27 +03:00
|
|
|
|
|
|
|
.irq_set_affinity = set_affinity_irq,
|
|
|
|
.irq_retrigger = retrigger_dynirq,
|
|
|
|
};
|
|
|
|
|
2010-10-01 20:20:09 +04:00
|
|
|
static struct irq_chip xen_pirq_chip __read_mostly = {
|
2011-02-05 23:08:54 +03:00
|
|
|
.name = "xen-pirq",
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
.irq_startup = startup_pirq,
|
|
|
|
.irq_shutdown = shutdown_pirq,
|
|
|
|
.irq_enable = enable_pirq,
|
|
|
|
.irq_disable = disable_pirq,
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2011-05-06 15:27:50 +04:00
|
|
|
.irq_mask = disable_dynirq,
|
|
|
|
.irq_unmask = enable_dynirq,
|
|
|
|
|
|
|
|
.irq_ack = eoi_pirq,
|
|
|
|
.irq_eoi = eoi_pirq,
|
|
|
|
.irq_mask_ack = mask_ack_pirq,
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
.irq_set_affinity = set_affinity_irq,
|
2010-10-01 20:20:09 +04:00
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
.irq_retrigger = retrigger_dynirq,
|
2010-10-01 20:20:09 +04:00
|
|
|
};
|
|
|
|
|
2010-08-21 05:57:53 +04:00
|
|
|
static struct irq_chip xen_percpu_chip __read_mostly = {
|
2011-02-05 23:08:54 +03:00
|
|
|
.name = "xen-percpu",
|
2010-08-21 05:57:53 +04:00
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
.irq_disable = disable_dynirq,
|
|
|
|
.irq_mask = disable_dynirq,
|
|
|
|
.irq_unmask = enable_dynirq,
|
2010-08-21 05:57:53 +04:00
|
|
|
|
2011-02-05 23:08:54 +03:00
|
|
|
.irq_ack = ack_dynirq,
|
2010-08-21 05:57:53 +04:00
|
|
|
};
|
|
|
|
|
2010-07-29 17:37:48 +04:00
|
|
|
#ifdef CONFIG_XEN_PVHVM
|
2010-05-14 15:40:51 +04:00
|
|
|
/* Vector callbacks are better than PCI interrupts to receive event
|
|
|
|
* channel notifications because we can receive vector callbacks on any
|
|
|
|
* vcpu and we don't need PCI support or APIC interactions. */
|
2020-04-28 12:38:22 +03:00
|
|
|
void xen_setup_callback_vector(void)
|
2010-05-14 15:40:51 +04:00
|
|
|
{
|
|
|
|
uint64_t callback_via;
|
2016-08-27 00:55:36 +03:00
|
|
|
|
2017-04-24 22:04:53 +03:00
|
|
|
if (xen_have_vector_callback) {
|
|
|
|
callback_via = HVM_CALLBACK_VECTOR(HYPERVISOR_CALLBACK_VECTOR);
|
2020-04-28 12:38:22 +03:00
|
|
|
if (xen_set_callback_via(callback_via)) {
|
2017-04-24 22:04:53 +03:00
|
|
|
pr_err("Request for Xen HVM callback vector failed\n");
|
|
|
|
xen_have_vector_callback = 0;
|
|
|
|
}
|
|
|
|
}
|
2010-05-14 15:40:51 +04:00
|
|
|
}
|
2020-04-28 12:38:22 +03:00
|
|
|
|
|
|
|
static __init void xen_alloc_callback_vector(void)
|
|
|
|
{
|
|
|
|
if (!xen_have_vector_callback)
|
|
|
|
return;
|
|
|
|
|
|
|
|
pr_info("Xen HVM callback vector for event delivery is enabled\n");
|
2020-05-21 23:05:44 +03:00
|
|
|
alloc_intr_gate(HYPERVISOR_CALLBACK_VECTOR, asm_sysvec_xen_hvm_callback);
|
2020-04-28 12:38:22 +03:00
|
|
|
}
|
2010-07-29 17:37:48 +04:00
|
|
|
#else
|
2020-04-28 12:38:22 +03:00
|
|
|
void xen_setup_callback_vector(void) {}
|
|
|
|
static inline void xen_alloc_callback_vector(void) {}
|
2010-07-29 17:37:48 +04:00
|
|
|
#endif
|
2010-05-14 15:40:51 +04:00
|
|
|
|
2020-10-22 12:49:05 +03:00
|
|
|
bool xen_fifo_events = true;
|
|
|
|
module_param_named(fifo_events, xen_fifo_events, bool, 0);
|
2013-03-15 17:02:35 +04:00
|
|
|
|
2020-09-13 15:23:02 +03:00
|
|
|
static int xen_evtchn_cpu_prepare(unsigned int cpu)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
xen_cpu_init_eoi(cpu);
|
|
|
|
|
2020-09-13 15:23:02 +03:00
|
|
|
if (evtchn_ops->percpu_init)
|
|
|
|
ret = evtchn_ops->percpu_init(cpu);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int xen_evtchn_cpu_dead(unsigned int cpu)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (evtchn_ops->percpu_deinit)
|
|
|
|
ret = evtchn_ops->percpu_deinit(cpu);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2012-10-02 18:57:57 +04:00
|
|
|
void __init xen_init_IRQ(void)
|
2007-07-18 05:37:05 +04:00
|
|
|
{
|
2013-03-15 17:02:35 +04:00
|
|
|
int ret = -EINVAL;
|
2020-03-23 19:15:11 +03:00
|
|
|
evtchn_port_t evtchn;
|
2013-03-15 17:02:35 +04:00
|
|
|
|
2020-10-22 12:49:05 +03:00
|
|
|
if (xen_fifo_events)
|
2013-03-15 17:02:35 +04:00
|
|
|
ret = xen_evtchn_fifo_init();
|
2020-10-22 12:49:05 +03:00
|
|
|
if (ret < 0) {
|
2013-03-15 17:02:35 +04:00
|
|
|
xen_evtchn_2l_init();
|
2020-10-22 12:49:05 +03:00
|
|
|
xen_fifo_events = false;
|
|
|
|
}
|
2013-03-14 16:49:19 +04:00
|
|
|
|
2020-09-07 16:47:30 +03:00
|
|
|
xen_cpu_init_eoi(smp_processor_id());
|
|
|
|
|
2020-09-13 15:23:02 +03:00
|
|
|
cpuhp_setup_state_nocalls(CPUHP_XEN_EVTCHN_PREPARE,
|
|
|
|
"xen/evtchn:prepare",
|
|
|
|
xen_evtchn_cpu_prepare, xen_evtchn_cpu_dead);
|
|
|
|
|
2013-10-17 18:23:15 +04:00
|
|
|
evtchn_to_irq = kcalloc(EVTCHN_ROW(xen_evtchn_max_channels()),
|
|
|
|
sizeof(*evtchn_to_irq), GFP_KERNEL);
|
2011-09-29 21:31:21 +04:00
|
|
|
BUG_ON(!evtchn_to_irq);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
|
|
|
/* No event channels are 'live' right now. */
|
2017-07-17 20:47:03 +03:00
|
|
|
for (evtchn = 0; evtchn < xen_evtchn_nr_channels(); evtchn++)
|
|
|
|
mask_evtchn(evtchn);
|
2007-07-18 05:37:05 +04:00
|
|
|
|
2012-01-30 20:21:48 +04:00
|
|
|
pirq_needs_eoi = pirq_needs_eoi_flag;
|
|
|
|
|
2012-09-14 17:37:32 +04:00
|
|
|
#ifdef CONFIG_X86
|
2013-12-12 00:36:51 +04:00
|
|
|
if (xen_pv_domain()) {
|
|
|
|
if (xen_initial_domain())
|
|
|
|
pci_xen_initial_domain();
|
|
|
|
}
|
2020-04-28 12:38:22 +03:00
|
|
|
if (xen_feature(XENFEAT_hvm_callback_vector)) {
|
|
|
|
xen_setup_callback_vector();
|
|
|
|
xen_alloc_callback_vector();
|
|
|
|
}
|
2013-12-12 00:36:51 +04:00
|
|
|
|
|
|
|
if (xen_hvm_domain()) {
|
2010-05-14 15:40:51 +04:00
|
|
|
native_init_IRQ();
|
2010-06-24 20:50:18 +04:00
|
|
|
/* pci_xen_hvm_init must be called after native_init_IRQ so that
|
|
|
|
* __acpi_register_gsi can point at the right function */
|
|
|
|
pci_xen_hvm_init();
|
2010-05-14 15:40:51 +04:00
|
|
|
} else {
|
2012-09-14 17:37:32 +04:00
|
|
|
int rc;
|
2012-01-30 20:21:48 +04:00
|
|
|
struct physdev_pirq_eoi_gmfn eoi_gmfn;
|
|
|
|
|
|
|
|
pirq_eoi_map = (void *)__get_free_page(GFP_KERNEL|__GFP_ZERO);
|
2015-08-07 19:34:37 +03:00
|
|
|
eoi_gmfn.gmfn = virt_to_gfn(pirq_eoi_map);
|
2012-01-30 20:21:48 +04:00
|
|
|
rc = HYPERVISOR_physdev_op(PHYSDEVOP_pirq_eoi_gmfn_v2, &eoi_gmfn);
|
|
|
|
if (rc != 0) {
|
|
|
|
free_page((unsigned long) pirq_eoi_map);
|
|
|
|
pirq_eoi_map = NULL;
|
|
|
|
} else
|
|
|
|
pirq_needs_eoi = pirq_check_eoi_map;
|
2010-05-14 15:40:51 +04:00
|
|
|
}
|
2012-09-14 17:37:32 +04:00
|
|
|
#endif
|
2007-07-18 05:37:05 +04:00
|
|
|
}
|