2 * VFIO PCI interrupt handling
4 * Copyright (C) 2012 Red Hat, Inc. All rights reserved.
5 * Author: Alex Williamson <alex.williamson@redhat.com>
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * Derived from original vfio:
12 * Copyright 2010 Cisco Systems, Inc. All rights reserved.
13 * Author: Tom Lyon, pugs@cisco.com
16 #include <linux/device.h>
17 #include <linux/interrupt.h>
18 #include <linux/eventfd.h>
19 #include <linux/msi.h>
20 #include <linux/pci.h>
21 #include <linux/file.h>
22 #include <linux/vfio.h>
23 #include <linux/wait.h>
24 #include <linux/slab.h>
26 #include "vfio_pci_private.h"
31 static void vfio_send_intx_eventfd(void *opaque
, void *unused
)
33 struct vfio_pci_device
*vdev
= opaque
;
35 if (likely(is_intx(vdev
) && !vdev
->virq_disabled
))
36 eventfd_signal(vdev
->ctx
[0].trigger
, 1);
39 void vfio_pci_intx_mask(struct vfio_pci_device
*vdev
)
41 struct pci_dev
*pdev
= vdev
->pdev
;
44 spin_lock_irqsave(&vdev
->irqlock
, flags
);
47 * Masking can come from interrupt, ioctl, or config space
48 * via INTx disable. The latter means this can get called
49 * even when not using intx delivery. In this case, just
50 * try to have the physical bit follow the virtual bit.
52 if (unlikely(!is_intx(vdev
))) {
55 } else if (!vdev
->ctx
[0].masked
) {
57 * Can't use check_and_mask here because we always want to
58 * mask, not just when something is pending.
63 disable_irq_nosync(pdev
->irq
);
65 vdev
->ctx
[0].masked
= true;
68 spin_unlock_irqrestore(&vdev
->irqlock
, flags
);
72 * If this is triggered by an eventfd, we can't call eventfd_signal
73 * or else we'll deadlock on the eventfd wait queue. Return >0 when
74 * a signal is necessary, which can then be handled via a work queue
75 * or directly depending on the caller.
77 static int vfio_pci_intx_unmask_handler(void *opaque
, void *unused
)
79 struct vfio_pci_device
*vdev
= opaque
;
80 struct pci_dev
*pdev
= vdev
->pdev
;
84 spin_lock_irqsave(&vdev
->irqlock
, flags
);
87 * Unmasking comes from ioctl or config, so again, have the
88 * physical bit follow the virtual even when not using INTx.
90 if (unlikely(!is_intx(vdev
))) {
93 } else if (vdev
->ctx
[0].masked
&& !vdev
->virq_disabled
) {
95 * A pending interrupt here would immediately trigger,
96 * but we can avoid that overhead by just re-sending
97 * the interrupt to the user.
100 if (!pci_check_and_unmask_intx(pdev
))
103 enable_irq(pdev
->irq
);
105 vdev
->ctx
[0].masked
= (ret
> 0);
108 spin_unlock_irqrestore(&vdev
->irqlock
, flags
);
113 void vfio_pci_intx_unmask(struct vfio_pci_device
*vdev
)
115 if (vfio_pci_intx_unmask_handler(vdev
, NULL
) > 0)
116 vfio_send_intx_eventfd(vdev
, NULL
);
119 static irqreturn_t
vfio_intx_handler(int irq
, void *dev_id
)
121 struct vfio_pci_device
*vdev
= dev_id
;
125 spin_lock_irqsave(&vdev
->irqlock
, flags
);
127 if (!vdev
->pci_2_3
) {
128 disable_irq_nosync(vdev
->pdev
->irq
);
129 vdev
->ctx
[0].masked
= true;
131 } else if (!vdev
->ctx
[0].masked
&& /* may be shared */
132 pci_check_and_mask_intx(vdev
->pdev
)) {
133 vdev
->ctx
[0].masked
= true;
137 spin_unlock_irqrestore(&vdev
->irqlock
, flags
);
139 if (ret
== IRQ_HANDLED
)
140 vfio_send_intx_eventfd(vdev
, NULL
);
145 static int vfio_intx_enable(struct vfio_pci_device
*vdev
)
147 if (!is_irq_none(vdev
))
150 if (!vdev
->pdev
->irq
)
153 vdev
->ctx
= kzalloc(sizeof(struct vfio_pci_irq_ctx
), GFP_KERNEL
);
160 * If the virtual interrupt is masked, restore it. Devices
161 * supporting DisINTx can be masked at the hardware level
162 * here, non-PCI-2.3 devices will have to wait until the
163 * interrupt is enabled.
165 vdev
->ctx
[0].masked
= vdev
->virq_disabled
;
167 pci_intx(vdev
->pdev
, !vdev
->ctx
[0].masked
);
169 vdev
->irq_type
= VFIO_PCI_INTX_IRQ_INDEX
;
174 static int vfio_intx_set_signal(struct vfio_pci_device
*vdev
, int fd
)
176 struct pci_dev
*pdev
= vdev
->pdev
;
177 unsigned long irqflags
= IRQF_SHARED
;
178 struct eventfd_ctx
*trigger
;
182 if (vdev
->ctx
[0].trigger
) {
183 free_irq(pdev
->irq
, vdev
);
184 kfree(vdev
->ctx
[0].name
);
185 eventfd_ctx_put(vdev
->ctx
[0].trigger
);
186 vdev
->ctx
[0].trigger
= NULL
;
189 if (fd
< 0) /* Disable only */
192 vdev
->ctx
[0].name
= kasprintf(GFP_KERNEL
, "vfio-intx(%s)",
194 if (!vdev
->ctx
[0].name
)
197 trigger
= eventfd_ctx_fdget(fd
);
198 if (IS_ERR(trigger
)) {
199 kfree(vdev
->ctx
[0].name
);
200 return PTR_ERR(trigger
);
203 vdev
->ctx
[0].trigger
= trigger
;
208 ret
= request_irq(pdev
->irq
, vfio_intx_handler
,
209 irqflags
, vdev
->ctx
[0].name
, vdev
);
211 vdev
->ctx
[0].trigger
= NULL
;
212 kfree(vdev
->ctx
[0].name
);
213 eventfd_ctx_put(trigger
);
218 * INTx disable will stick across the new irq setup,
221 spin_lock_irqsave(&vdev
->irqlock
, flags
);
222 if (!vdev
->pci_2_3
&& vdev
->ctx
[0].masked
)
223 disable_irq_nosync(pdev
->irq
);
224 spin_unlock_irqrestore(&vdev
->irqlock
, flags
);
229 static void vfio_intx_disable(struct vfio_pci_device
*vdev
)
231 vfio_intx_set_signal(vdev
, -1);
232 vfio_virqfd_disable(&vdev
->ctx
[0].unmask
);
233 vfio_virqfd_disable(&vdev
->ctx
[0].mask
);
234 vdev
->irq_type
= VFIO_PCI_NUM_IRQS
;
242 static irqreturn_t
vfio_msihandler(int irq
, void *arg
)
244 struct eventfd_ctx
*trigger
= arg
;
246 eventfd_signal(trigger
, 1);
250 static int vfio_msi_enable(struct vfio_pci_device
*vdev
, int nvec
, bool msix
)
252 struct pci_dev
*pdev
= vdev
->pdev
;
255 if (!is_irq_none(vdev
))
258 vdev
->ctx
= kzalloc(nvec
* sizeof(struct vfio_pci_irq_ctx
), GFP_KERNEL
);
265 vdev
->msix
= kzalloc(nvec
* sizeof(struct msix_entry
),
272 for (i
= 0; i
< nvec
; i
++)
273 vdev
->msix
[i
].entry
= i
;
275 ret
= pci_enable_msix_range(pdev
, vdev
->msix
, 1, nvec
);
278 pci_disable_msix(pdev
);
284 ret
= pci_enable_msi_range(pdev
, 1, nvec
);
287 pci_disable_msi(pdev
);
293 vdev
->num_ctx
= nvec
;
294 vdev
->irq_type
= msix
? VFIO_PCI_MSIX_IRQ_INDEX
:
295 VFIO_PCI_MSI_IRQ_INDEX
;
299 * Compute the virtual hardware field for max msi vectors -
300 * it is the log base 2 of the number of vectors.
302 vdev
->msi_qmax
= fls(nvec
* 2 - 1) - 1;
308 static int vfio_msi_set_vector_signal(struct vfio_pci_device
*vdev
,
309 int vector
, int fd
, bool msix
)
311 struct pci_dev
*pdev
= vdev
->pdev
;
312 struct eventfd_ctx
*trigger
;
315 if (vector
< 0 || vector
>= vdev
->num_ctx
)
318 irq
= msix
? vdev
->msix
[vector
].vector
: pdev
->irq
+ vector
;
320 if (vdev
->ctx
[vector
].trigger
) {
321 free_irq(irq
, vdev
->ctx
[vector
].trigger
);
322 irq_bypass_unregister_producer(&vdev
->ctx
[vector
].producer
);
323 kfree(vdev
->ctx
[vector
].name
);
324 eventfd_ctx_put(vdev
->ctx
[vector
].trigger
);
325 vdev
->ctx
[vector
].trigger
= NULL
;
331 vdev
->ctx
[vector
].name
= kasprintf(GFP_KERNEL
, "vfio-msi%s[%d](%s)",
332 msix
? "x" : "", vector
,
334 if (!vdev
->ctx
[vector
].name
)
337 trigger
= eventfd_ctx_fdget(fd
);
338 if (IS_ERR(trigger
)) {
339 kfree(vdev
->ctx
[vector
].name
);
340 return PTR_ERR(trigger
);
344 * The MSIx vector table resides in device memory which may be cleared
345 * via backdoor resets. We don't allow direct access to the vector
346 * table so even if a userspace driver attempts to save/restore around
347 * such a reset it would be unsuccessful. To avoid this, restore the
348 * cached value of the message prior to enabling.
353 get_cached_msi_msg(irq
, &msg
);
354 pci_write_msi_msg(irq
, &msg
);
357 ret
= request_irq(irq
, vfio_msihandler
, 0,
358 vdev
->ctx
[vector
].name
, trigger
);
360 kfree(vdev
->ctx
[vector
].name
);
361 eventfd_ctx_put(trigger
);
365 vdev
->ctx
[vector
].producer
.token
= trigger
;
366 vdev
->ctx
[vector
].producer
.irq
= irq
;
367 ret
= irq_bypass_register_producer(&vdev
->ctx
[vector
].producer
);
370 "irq bypass producer (token %p) registration fails: %d\n",
371 vdev
->ctx
[vector
].producer
.token
, ret
);
373 vdev
->ctx
[vector
].trigger
= trigger
;
378 static int vfio_msi_set_block(struct vfio_pci_device
*vdev
, unsigned start
,
379 unsigned count
, int32_t *fds
, bool msix
)
383 if (start
>= vdev
->num_ctx
|| start
+ count
> vdev
->num_ctx
)
386 for (i
= 0, j
= start
; i
< count
&& !ret
; i
++, j
++) {
387 int fd
= fds
? fds
[i
] : -1;
388 ret
= vfio_msi_set_vector_signal(vdev
, j
, fd
, msix
);
392 for (--j
; j
>= (int)start
; j
--)
393 vfio_msi_set_vector_signal(vdev
, j
, -1, msix
);
399 static void vfio_msi_disable(struct vfio_pci_device
*vdev
, bool msix
)
401 struct pci_dev
*pdev
= vdev
->pdev
;
404 vfio_msi_set_block(vdev
, 0, vdev
->num_ctx
, NULL
, msix
);
406 for (i
= 0; i
< vdev
->num_ctx
; i
++) {
407 vfio_virqfd_disable(&vdev
->ctx
[i
].unmask
);
408 vfio_virqfd_disable(&vdev
->ctx
[i
].mask
);
412 pci_disable_msix(vdev
->pdev
);
415 pci_disable_msi(pdev
);
417 vdev
->irq_type
= VFIO_PCI_NUM_IRQS
;
425 static int vfio_pci_set_intx_unmask(struct vfio_pci_device
*vdev
,
426 unsigned index
, unsigned start
,
427 unsigned count
, uint32_t flags
, void *data
)
429 if (!is_intx(vdev
) || start
!= 0 || count
!= 1)
432 if (flags
& VFIO_IRQ_SET_DATA_NONE
) {
433 vfio_pci_intx_unmask(vdev
);
434 } else if (flags
& VFIO_IRQ_SET_DATA_BOOL
) {
435 uint8_t unmask
= *(uint8_t *)data
;
437 vfio_pci_intx_unmask(vdev
);
438 } else if (flags
& VFIO_IRQ_SET_DATA_EVENTFD
) {
439 int32_t fd
= *(int32_t *)data
;
441 return vfio_virqfd_enable((void *) vdev
,
442 vfio_pci_intx_unmask_handler
,
443 vfio_send_intx_eventfd
, NULL
,
444 &vdev
->ctx
[0].unmask
, fd
);
446 vfio_virqfd_disable(&vdev
->ctx
[0].unmask
);
452 static int vfio_pci_set_intx_mask(struct vfio_pci_device
*vdev
,
453 unsigned index
, unsigned start
,
454 unsigned count
, uint32_t flags
, void *data
)
456 if (!is_intx(vdev
) || start
!= 0 || count
!= 1)
459 if (flags
& VFIO_IRQ_SET_DATA_NONE
) {
460 vfio_pci_intx_mask(vdev
);
461 } else if (flags
& VFIO_IRQ_SET_DATA_BOOL
) {
462 uint8_t mask
= *(uint8_t *)data
;
464 vfio_pci_intx_mask(vdev
);
465 } else if (flags
& VFIO_IRQ_SET_DATA_EVENTFD
) {
466 return -ENOTTY
; /* XXX implement me */
472 static int vfio_pci_set_intx_trigger(struct vfio_pci_device
*vdev
,
473 unsigned index
, unsigned start
,
474 unsigned count
, uint32_t flags
, void *data
)
476 if (is_intx(vdev
) && !count
&& (flags
& VFIO_IRQ_SET_DATA_NONE
)) {
477 vfio_intx_disable(vdev
);
481 if (!(is_intx(vdev
) || is_irq_none(vdev
)) || start
!= 0 || count
!= 1)
484 if (flags
& VFIO_IRQ_SET_DATA_EVENTFD
) {
485 int32_t fd
= *(int32_t *)data
;
489 return vfio_intx_set_signal(vdev
, fd
);
491 ret
= vfio_intx_enable(vdev
);
495 ret
= vfio_intx_set_signal(vdev
, fd
);
497 vfio_intx_disable(vdev
);
505 if (flags
& VFIO_IRQ_SET_DATA_NONE
) {
506 vfio_send_intx_eventfd(vdev
, NULL
);
507 } else if (flags
& VFIO_IRQ_SET_DATA_BOOL
) {
508 uint8_t trigger
= *(uint8_t *)data
;
510 vfio_send_intx_eventfd(vdev
, NULL
);
515 static int vfio_pci_set_msi_trigger(struct vfio_pci_device
*vdev
,
516 unsigned index
, unsigned start
,
517 unsigned count
, uint32_t flags
, void *data
)
520 bool msix
= (index
== VFIO_PCI_MSIX_IRQ_INDEX
) ? true : false;
522 if (irq_is(vdev
, index
) && !count
&& (flags
& VFIO_IRQ_SET_DATA_NONE
)) {
523 vfio_msi_disable(vdev
, msix
);
527 if (!(irq_is(vdev
, index
) || is_irq_none(vdev
)))
530 if (flags
& VFIO_IRQ_SET_DATA_EVENTFD
) {
534 if (vdev
->irq_type
== index
)
535 return vfio_msi_set_block(vdev
, start
, count
,
538 ret
= vfio_msi_enable(vdev
, start
+ count
, msix
);
542 ret
= vfio_msi_set_block(vdev
, start
, count
, fds
, msix
);
544 vfio_msi_disable(vdev
, msix
);
549 if (!irq_is(vdev
, index
) || start
+ count
> vdev
->num_ctx
)
552 for (i
= start
; i
< start
+ count
; i
++) {
553 if (!vdev
->ctx
[i
].trigger
)
555 if (flags
& VFIO_IRQ_SET_DATA_NONE
) {
556 eventfd_signal(vdev
->ctx
[i
].trigger
, 1);
557 } else if (flags
& VFIO_IRQ_SET_DATA_BOOL
) {
558 uint8_t *bools
= data
;
559 if (bools
[i
- start
])
560 eventfd_signal(vdev
->ctx
[i
].trigger
, 1);
566 static int vfio_pci_set_ctx_trigger_single(struct eventfd_ctx
**ctx
,
567 uint32_t flags
, void *data
)
569 int32_t fd
= *(int32_t *)data
;
571 if (!(flags
& VFIO_IRQ_SET_DATA_TYPE_MASK
))
574 /* DATA_NONE/DATA_BOOL enables loopback testing */
575 if (flags
& VFIO_IRQ_SET_DATA_NONE
) {
577 eventfd_signal(*ctx
, 1);
579 } else if (flags
& VFIO_IRQ_SET_DATA_BOOL
) {
580 uint8_t trigger
= *(uint8_t *)data
;
582 eventfd_signal(*ctx
, 1);
586 /* Handle SET_DATA_EVENTFD */
589 eventfd_ctx_put(*ctx
);
592 } else if (fd
>= 0) {
593 struct eventfd_ctx
*efdctx
;
594 efdctx
= eventfd_ctx_fdget(fd
);
596 return PTR_ERR(efdctx
);
598 eventfd_ctx_put(*ctx
);
605 static int vfio_pci_set_err_trigger(struct vfio_pci_device
*vdev
,
606 unsigned index
, unsigned start
,
607 unsigned count
, uint32_t flags
, void *data
)
609 if (index
!= VFIO_PCI_ERR_IRQ_INDEX
)
613 * We should sanitize start & count, but that wasn't caught
614 * originally, so this IRQ index must forever ignore them :-(
617 return vfio_pci_set_ctx_trigger_single(&vdev
->err_trigger
, flags
, data
);
620 static int vfio_pci_set_req_trigger(struct vfio_pci_device
*vdev
,
621 unsigned index
, unsigned start
,
622 unsigned count
, uint32_t flags
, void *data
)
624 if (index
!= VFIO_PCI_REQ_IRQ_INDEX
|| start
!= 0 || count
!= 1)
627 return vfio_pci_set_ctx_trigger_single(&vdev
->req_trigger
, flags
, data
);
630 int vfio_pci_set_irqs_ioctl(struct vfio_pci_device
*vdev
, uint32_t flags
,
631 unsigned index
, unsigned start
, unsigned count
,
634 int (*func
)(struct vfio_pci_device
*vdev
, unsigned index
,
635 unsigned start
, unsigned count
, uint32_t flags
,
639 case VFIO_PCI_INTX_IRQ_INDEX
:
640 switch (flags
& VFIO_IRQ_SET_ACTION_TYPE_MASK
) {
641 case VFIO_IRQ_SET_ACTION_MASK
:
642 func
= vfio_pci_set_intx_mask
;
644 case VFIO_IRQ_SET_ACTION_UNMASK
:
645 func
= vfio_pci_set_intx_unmask
;
647 case VFIO_IRQ_SET_ACTION_TRIGGER
:
648 func
= vfio_pci_set_intx_trigger
;
652 case VFIO_PCI_MSI_IRQ_INDEX
:
653 case VFIO_PCI_MSIX_IRQ_INDEX
:
654 switch (flags
& VFIO_IRQ_SET_ACTION_TYPE_MASK
) {
655 case VFIO_IRQ_SET_ACTION_MASK
:
656 case VFIO_IRQ_SET_ACTION_UNMASK
:
657 /* XXX Need masking support exported */
659 case VFIO_IRQ_SET_ACTION_TRIGGER
:
660 func
= vfio_pci_set_msi_trigger
;
664 case VFIO_PCI_ERR_IRQ_INDEX
:
665 switch (flags
& VFIO_IRQ_SET_ACTION_TYPE_MASK
) {
666 case VFIO_IRQ_SET_ACTION_TRIGGER
:
667 if (pci_is_pcie(vdev
->pdev
))
668 func
= vfio_pci_set_err_trigger
;
672 case VFIO_PCI_REQ_IRQ_INDEX
:
673 switch (flags
& VFIO_IRQ_SET_ACTION_TYPE_MASK
) {
674 case VFIO_IRQ_SET_ACTION_TRIGGER
:
675 func
= vfio_pci_set_req_trigger
;
684 return func(vdev
, index
, start
, count
, flags
, data
);