4 * Xen models interrupts with abstract event channels. Because each
5 * domain gets 1024 event channels, but NR_IRQ is not that large, we
6 * must dynamically map irqs<->event channels. The event channels
7 * interface with the rest of the kernel by defining a xen interrupt
8 * chip. When an event is received, it is mapped to an irq and sent
9 * through the normal interrupt processing path.
11 * There are four kinds of events which can be mapped to an event
14 * 1. Inter-domain notifications. This includes all the virtual
15 * device events, since they're driven by front-ends in another domain
17 * 2. VIRQs, typically used for timers. These are per-cpu events.
19 * 4. PIRQs - Hardware interrupts.
21 * Jeremy Fitzhardinge <jeremy@xensource.com>, XenSource Inc, 2007
24 #include <linux/linkage.h>
25 #include <linux/interrupt.h>
26 #include <linux/irq.h>
27 #include <linux/module.h>
28 #include <linux/string.h>
29 #include <linux/bootmem.h>
30 #include <linux/slab.h>
31 #include <linux/irqnr.h>
32 #include <linux/pci.h>
35 #include <asm/ptrace.h>
38 #include <asm/io_apic.h>
39 #include <asm/sync_bitops.h>
40 #include <asm/xen/pci.h>
41 #include <asm/xen/hypercall.h>
42 #include <asm/xen/hypervisor.h>
46 #include <xen/xen-ops.h>
47 #include <xen/events.h>
48 #include <xen/interface/xen.h>
49 #include <xen/interface/event_channel.h>
50 #include <xen/interface/hvm/hvm_op.h>
51 #include <xen/interface/hvm/params.h>
54 * This lock protects updates to the following mapping and reference-count
55 * arrays. The lock does not need to be acquired to read the mapping tables.
57 static DEFINE_MUTEX(irq_mapping_update_lock
);
59 static LIST_HEAD(xen_irq_list_head
);
61 /* IRQ <-> VIRQ mapping. */
62 static DEFINE_PER_CPU(int [NR_VIRQS
], virq_to_irq
) = {[0 ... NR_VIRQS
-1] = -1};
64 /* IRQ <-> IPI mapping */
65 static DEFINE_PER_CPU(int [XEN_NR_IPIS
], ipi_to_irq
) = {[0 ... XEN_NR_IPIS
-1] = -1};
67 /* Interrupt types. */
77 * Packed IRQ information:
78 * type - enum xen_irq_type
79 * event channel - irq->event channel mapping
80 * cpu - cpu this event channel is bound to
81 * index - type-specific information:
82 * PIRQ - vector, with MSB being "needs EIO", or physical IRQ of the HVM
83 * guest, or GSI (real passthrough IRQ) of the device.
89 struct list_head list
;
91 enum xen_irq_type type
; /* type */
93 unsigned short evtchn
; /* event channel */
94 unsigned short cpu
; /* cpu bound */
102 unsigned char vector
;
108 #define PIRQ_NEEDS_EOI (1 << 0)
109 #define PIRQ_SHAREABLE (1 << 1)
111 static int *evtchn_to_irq
;
113 static DEFINE_PER_CPU(unsigned long [NR_EVENT_CHANNELS
/BITS_PER_LONG
],
116 /* Xen will never allocate port zero for any purpose. */
117 #define VALID_EVTCHN(chn) ((chn) != 0)
119 static struct irq_chip xen_dynamic_chip
;
120 static struct irq_chip xen_percpu_chip
;
121 static struct irq_chip xen_pirq_chip
;
122 static void enable_dynirq(struct irq_data
*data
);
123 static void disable_dynirq(struct irq_data
*data
);
125 /* Get info for IRQ */
126 static struct irq_info
*info_for_irq(unsigned irq
)
128 return irq_get_handler_data(irq
);
131 /* Constructors for packed IRQ information. */
132 static void xen_irq_info_common_init(struct irq_info
*info
,
134 enum xen_irq_type type
,
135 unsigned short evtchn
,
139 BUG_ON(info
->type
!= IRQT_UNBOUND
&& info
->type
!= type
);
143 info
->evtchn
= evtchn
;
146 evtchn_to_irq
[evtchn
] = irq
;
149 static void xen_irq_info_evtchn_init(unsigned irq
,
150 unsigned short evtchn
)
152 struct irq_info
*info
= info_for_irq(irq
);
154 xen_irq_info_common_init(info
, irq
, IRQT_EVTCHN
, evtchn
, 0);
157 static void xen_irq_info_ipi_init(unsigned cpu
,
159 unsigned short evtchn
,
162 struct irq_info
*info
= info_for_irq(irq
);
164 xen_irq_info_common_init(info
, irq
, IRQT_IPI
, evtchn
, 0);
168 per_cpu(ipi_to_irq
, cpu
)[ipi
] = irq
;
171 static void xen_irq_info_virq_init(unsigned cpu
,
173 unsigned short evtchn
,
176 struct irq_info
*info
= info_for_irq(irq
);
178 xen_irq_info_common_init(info
, irq
, IRQT_VIRQ
, evtchn
, 0);
182 per_cpu(virq_to_irq
, cpu
)[virq
] = irq
;
185 static void xen_irq_info_pirq_init(unsigned irq
,
186 unsigned short evtchn
,
189 unsigned short vector
,
193 struct irq_info
*info
= info_for_irq(irq
);
195 xen_irq_info_common_init(info
, irq
, IRQT_PIRQ
, evtchn
, 0);
197 info
->u
.pirq
.pirq
= pirq
;
198 info
->u
.pirq
.gsi
= gsi
;
199 info
->u
.pirq
.vector
= vector
;
200 info
->u
.pirq
.domid
= domid
;
201 info
->u
.pirq
.flags
= flags
;
205 * Accessors for packed IRQ information.
207 static unsigned int evtchn_from_irq(unsigned irq
)
209 if (unlikely(WARN(irq
< 0 || irq
>= nr_irqs
, "Invalid irq %d!\n", irq
)))
212 return info_for_irq(irq
)->evtchn
;
215 unsigned irq_from_evtchn(unsigned int evtchn
)
217 return evtchn_to_irq
[evtchn
];
219 EXPORT_SYMBOL_GPL(irq_from_evtchn
);
221 static enum ipi_vector
ipi_from_irq(unsigned irq
)
223 struct irq_info
*info
= info_for_irq(irq
);
225 BUG_ON(info
== NULL
);
226 BUG_ON(info
->type
!= IRQT_IPI
);
231 static unsigned virq_from_irq(unsigned irq
)
233 struct irq_info
*info
= info_for_irq(irq
);
235 BUG_ON(info
== NULL
);
236 BUG_ON(info
->type
!= IRQT_VIRQ
);
241 static unsigned pirq_from_irq(unsigned irq
)
243 struct irq_info
*info
= info_for_irq(irq
);
245 BUG_ON(info
== NULL
);
246 BUG_ON(info
->type
!= IRQT_PIRQ
);
248 return info
->u
.pirq
.pirq
;
251 static enum xen_irq_type
type_from_irq(unsigned irq
)
253 return info_for_irq(irq
)->type
;
256 static unsigned cpu_from_irq(unsigned irq
)
258 return info_for_irq(irq
)->cpu
;
261 static unsigned int cpu_from_evtchn(unsigned int evtchn
)
263 int irq
= evtchn_to_irq
[evtchn
];
267 ret
= cpu_from_irq(irq
);
272 static bool pirq_needs_eoi(unsigned irq
)
274 struct irq_info
*info
= info_for_irq(irq
);
276 BUG_ON(info
->type
!= IRQT_PIRQ
);
278 return info
->u
.pirq
.flags
& PIRQ_NEEDS_EOI
;
281 static inline unsigned long active_evtchns(unsigned int cpu
,
282 struct shared_info
*sh
,
285 return sh
->evtchn_pending
[idx
] &
286 per_cpu(cpu_evtchn_mask
, cpu
)[idx
] &
287 ~sh
->evtchn_mask
[idx
];
290 static void bind_evtchn_to_cpu(unsigned int chn
, unsigned int cpu
)
292 int irq
= evtchn_to_irq
[chn
];
296 cpumask_copy(irq_to_desc(irq
)->irq_data
.affinity
, cpumask_of(cpu
));
299 clear_bit(chn
, per_cpu(cpu_evtchn_mask
, cpu_from_irq(irq
)));
300 set_bit(chn
, per_cpu(cpu_evtchn_mask
, cpu
));
302 info_for_irq(irq
)->cpu
= cpu
;
305 static void init_evtchn_cpu_bindings(void)
309 struct irq_info
*info
;
311 /* By default all event channels notify CPU#0. */
312 list_for_each_entry(info
, &xen_irq_list_head
, list
) {
313 struct irq_desc
*desc
= irq_to_desc(info
->irq
);
314 cpumask_copy(desc
->irq_data
.affinity
, cpumask_of(0));
318 for_each_possible_cpu(i
)
319 memset(per_cpu(cpu_evtchn_mask
, i
),
320 (i
== 0) ? ~0 : 0, sizeof(*per_cpu(cpu_evtchn_mask
, i
)));
323 static inline void clear_evtchn(int port
)
325 struct shared_info
*s
= HYPERVISOR_shared_info
;
326 sync_clear_bit(port
, &s
->evtchn_pending
[0]);
329 static inline void set_evtchn(int port
)
331 struct shared_info
*s
= HYPERVISOR_shared_info
;
332 sync_set_bit(port
, &s
->evtchn_pending
[0]);
335 static inline int test_evtchn(int port
)
337 struct shared_info
*s
= HYPERVISOR_shared_info
;
338 return sync_test_bit(port
, &s
->evtchn_pending
[0]);
343 * notify_remote_via_irq - send event to remote end of event channel via irq
344 * @irq: irq of event channel to send event to
346 * Unlike notify_remote_via_evtchn(), this is safe to use across
347 * save/restore. Notifications on a broken connection are silently
350 void notify_remote_via_irq(int irq
)
352 int evtchn
= evtchn_from_irq(irq
);
354 if (VALID_EVTCHN(evtchn
))
355 notify_remote_via_evtchn(evtchn
);
357 EXPORT_SYMBOL_GPL(notify_remote_via_irq
);
359 static void mask_evtchn(int port
)
361 struct shared_info
*s
= HYPERVISOR_shared_info
;
362 sync_set_bit(port
, &s
->evtchn_mask
[0]);
365 static void unmask_evtchn(int port
)
367 struct shared_info
*s
= HYPERVISOR_shared_info
;
368 unsigned int cpu
= get_cpu();
370 BUG_ON(!irqs_disabled());
372 /* Slow path (hypercall) if this is a non-local port. */
373 if (unlikely(cpu
!= cpu_from_evtchn(port
))) {
374 struct evtchn_unmask unmask
= { .port
= port
};
375 (void)HYPERVISOR_event_channel_op(EVTCHNOP_unmask
, &unmask
);
377 struct vcpu_info
*vcpu_info
= __this_cpu_read(xen_vcpu
);
379 sync_clear_bit(port
, &s
->evtchn_mask
[0]);
382 * The following is basically the equivalent of
383 * 'hw_resend_irq'. Just like a real IO-APIC we 'lose
384 * the interrupt edge' if the channel is masked.
386 if (sync_test_bit(port
, &s
->evtchn_pending
[0]) &&
387 !sync_test_and_set_bit(port
/ BITS_PER_LONG
,
388 &vcpu_info
->evtchn_pending_sel
))
389 vcpu_info
->evtchn_upcall_pending
= 1;
395 static void xen_irq_init(unsigned irq
)
397 struct irq_info
*info
;
399 struct irq_desc
*desc
= irq_to_desc(irq
);
401 /* By default all event channels notify CPU#0. */
402 cpumask_copy(desc
->irq_data
.affinity
, cpumask_of(0));
405 info
= kzalloc(sizeof(*info
), GFP_KERNEL
);
407 panic("Unable to allocate metadata for IRQ%d\n", irq
);
409 info
->type
= IRQT_UNBOUND
;
412 irq_set_handler_data(irq
, info
);
414 list_add_tail(&info
->list
, &xen_irq_list_head
);
417 static int __must_check
xen_allocate_irq_dynamic(void)
422 #ifdef CONFIG_X86_IO_APIC
424 * For an HVM guest or domain 0 which see "real" (emulated or
425 * actual respectively) GSIs we allocate dynamic IRQs
426 * e.g. those corresponding to event channels or MSIs
427 * etc. from the range above those "real" GSIs to avoid
430 if (xen_initial_domain() || xen_hvm_domain())
431 first
= get_nr_irqs_gsi();
434 irq
= irq_alloc_desc_from(first
, -1);
442 static int __must_check
xen_allocate_irq_gsi(unsigned gsi
)
447 * A PV guest has no concept of a GSI (since it has no ACPI
448 * nor access to/knowledge of the physical APICs). Therefore
449 * all IRQs are dynamically allocated from the entire IRQ
452 if (xen_pv_domain() && !xen_initial_domain())
453 return xen_allocate_irq_dynamic();
455 /* Legacy IRQ descriptors are already allocated by the arch. */
456 if (gsi
< NR_IRQS_LEGACY
)
459 irq
= irq_alloc_desc_at(gsi
, -1);
466 static void xen_free_irq(unsigned irq
)
468 struct irq_info
*info
= irq_get_handler_data(irq
);
470 list_del(&info
->list
);
472 irq_set_handler_data(irq
, NULL
);
474 WARN_ON(info
->refcnt
> 0);
478 /* Legacy IRQ descriptors are managed by the arch. */
479 if (irq
< NR_IRQS_LEGACY
)
485 static void pirq_query_unmask(int irq
)
487 struct physdev_irq_status_query irq_status
;
488 struct irq_info
*info
= info_for_irq(irq
);
490 BUG_ON(info
->type
!= IRQT_PIRQ
);
492 irq_status
.irq
= pirq_from_irq(irq
);
493 if (HYPERVISOR_physdev_op(PHYSDEVOP_irq_status_query
, &irq_status
))
494 irq_status
.flags
= 0;
496 info
->u
.pirq
.flags
&= ~PIRQ_NEEDS_EOI
;
497 if (irq_status
.flags
& XENIRQSTAT_needs_eoi
)
498 info
->u
.pirq
.flags
|= PIRQ_NEEDS_EOI
;
501 static bool probing_irq(int irq
)
503 struct irq_desc
*desc
= irq_to_desc(irq
);
505 return desc
&& desc
->action
== NULL
;
508 static void eoi_pirq(struct irq_data
*data
)
510 int evtchn
= evtchn_from_irq(data
->irq
);
511 struct physdev_eoi eoi
= { .irq
= pirq_from_irq(data
->irq
) };
516 if (VALID_EVTCHN(evtchn
))
517 clear_evtchn(evtchn
);
519 if (pirq_needs_eoi(data
->irq
)) {
520 rc
= HYPERVISOR_physdev_op(PHYSDEVOP_eoi
, &eoi
);
525 static void mask_ack_pirq(struct irq_data
*data
)
527 disable_dynirq(data
);
531 static unsigned int __startup_pirq(unsigned int irq
)
533 struct evtchn_bind_pirq bind_pirq
;
534 struct irq_info
*info
= info_for_irq(irq
);
535 int evtchn
= evtchn_from_irq(irq
);
538 BUG_ON(info
->type
!= IRQT_PIRQ
);
540 if (VALID_EVTCHN(evtchn
))
543 bind_pirq
.pirq
= pirq_from_irq(irq
);
544 /* NB. We are happy to share unless we are probing. */
545 bind_pirq
.flags
= info
->u
.pirq
.flags
& PIRQ_SHAREABLE
?
546 BIND_PIRQ__WILL_SHARE
: 0;
547 rc
= HYPERVISOR_event_channel_op(EVTCHNOP_bind_pirq
, &bind_pirq
);
549 if (!probing_irq(irq
))
550 printk(KERN_INFO
"Failed to obtain physical IRQ %d\n",
554 evtchn
= bind_pirq
.port
;
556 pirq_query_unmask(irq
);
558 evtchn_to_irq
[evtchn
] = irq
;
559 bind_evtchn_to_cpu(evtchn
, 0);
560 info
->evtchn
= evtchn
;
563 unmask_evtchn(evtchn
);
564 eoi_pirq(irq_get_irq_data(irq
));
569 static unsigned int startup_pirq(struct irq_data
*data
)
571 return __startup_pirq(data
->irq
);
574 static void shutdown_pirq(struct irq_data
*data
)
576 struct evtchn_close close
;
577 unsigned int irq
= data
->irq
;
578 struct irq_info
*info
= info_for_irq(irq
);
579 int evtchn
= evtchn_from_irq(irq
);
581 BUG_ON(info
->type
!= IRQT_PIRQ
);
583 if (!VALID_EVTCHN(evtchn
))
589 if (HYPERVISOR_event_channel_op(EVTCHNOP_close
, &close
) != 0)
592 bind_evtchn_to_cpu(evtchn
, 0);
593 evtchn_to_irq
[evtchn
] = -1;
597 static void enable_pirq(struct irq_data
*data
)
602 static void disable_pirq(struct irq_data
*data
)
604 disable_dynirq(data
);
607 static int find_irq_by_gsi(unsigned gsi
)
609 struct irq_info
*info
;
611 list_for_each_entry(info
, &xen_irq_list_head
, list
) {
612 if (info
->type
!= IRQT_PIRQ
)
615 if (info
->u
.pirq
.gsi
== gsi
)
623 * Do not make any assumptions regarding the relationship between the
624 * IRQ number returned here and the Xen pirq argument.
626 * Note: We don't assign an event channel until the irq actually started
627 * up. Return an existing irq if we've already got one for the gsi.
629 * Shareable implies level triggered, not shareable implies edge
632 int xen_bind_pirq_gsi_to_irq(unsigned gsi
,
633 unsigned pirq
, int shareable
, char *name
)
636 struct physdev_irq irq_op
;
638 mutex_lock(&irq_mapping_update_lock
);
640 irq
= find_irq_by_gsi(gsi
);
642 printk(KERN_INFO
"xen_map_pirq_gsi: returning irq %d for gsi %u\n",
647 irq
= xen_allocate_irq_gsi(gsi
);
654 /* Only the privileged domain can do this. For non-priv, the pcifront
655 * driver provides a PCI bus that does the call to do exactly
656 * this in the priv domain. */
657 if (xen_initial_domain() &&
658 HYPERVISOR_physdev_op(PHYSDEVOP_alloc_irq_vector
, &irq_op
)) {
664 xen_irq_info_pirq_init(irq
, 0, pirq
, gsi
, irq_op
.vector
, DOMID_SELF
,
665 shareable
? PIRQ_SHAREABLE
: 0);
667 pirq_query_unmask(irq
);
668 /* We try to use the handler with the appropriate semantic for the
669 * type of interrupt: if the interrupt is an edge triggered
670 * interrupt we use handle_edge_irq.
672 * On the other hand if the interrupt is level triggered we use
673 * handle_fasteoi_irq like the native code does for this kind of
676 * Depending on the Xen version, pirq_needs_eoi might return true
677 * not only for level triggered interrupts but for edge triggered
678 * interrupts too. In any case Xen always honors the eoi mechanism,
679 * not injecting any more pirqs of the same kind if the first one
680 * hasn't received an eoi yet. Therefore using the fasteoi handler
681 * is the right choice either way.
684 irq_set_chip_and_handler_name(irq
, &xen_pirq_chip
,
685 handle_fasteoi_irq
, name
);
687 irq_set_chip_and_handler_name(irq
, &xen_pirq_chip
,
688 handle_edge_irq
, name
);
691 mutex_unlock(&irq_mapping_update_lock
);
696 #ifdef CONFIG_PCI_MSI
697 int xen_allocate_pirq_msi(struct pci_dev
*dev
, struct msi_desc
*msidesc
)
700 struct physdev_get_free_pirq op_get_free_pirq
;
702 op_get_free_pirq
.type
= MAP_PIRQ_TYPE_MSI
;
703 rc
= HYPERVISOR_physdev_op(PHYSDEVOP_get_free_pirq
, &op_get_free_pirq
);
705 WARN_ONCE(rc
== -ENOSYS
,
706 "hypervisor does not support the PHYSDEVOP_get_free_pirq interface\n");
708 return rc
? -1 : op_get_free_pirq
.pirq
;
711 int xen_bind_pirq_msi_to_irq(struct pci_dev
*dev
, struct msi_desc
*msidesc
,
712 int pirq
, int vector
, const char *name
,
717 mutex_lock(&irq_mapping_update_lock
);
719 irq
= xen_allocate_irq_dynamic();
723 irq_set_chip_and_handler_name(irq
, &xen_pirq_chip
, handle_edge_irq
,
726 xen_irq_info_pirq_init(irq
, 0, pirq
, 0, vector
, domid
, 0);
727 ret
= irq_set_msi_desc(irq
, msidesc
);
731 mutex_unlock(&irq_mapping_update_lock
);
734 mutex_unlock(&irq_mapping_update_lock
);
740 int xen_destroy_irq(int irq
)
742 struct irq_desc
*desc
;
743 struct physdev_unmap_pirq unmap_irq
;
744 struct irq_info
*info
= info_for_irq(irq
);
747 mutex_lock(&irq_mapping_update_lock
);
749 desc
= irq_to_desc(irq
);
753 if (xen_initial_domain()) {
754 unmap_irq
.pirq
= info
->u
.pirq
.pirq
;
755 unmap_irq
.domid
= info
->u
.pirq
.domid
;
756 rc
= HYPERVISOR_physdev_op(PHYSDEVOP_unmap_pirq
, &unmap_irq
);
757 /* If another domain quits without making the pci_disable_msix
758 * call, the Xen hypervisor takes care of freeing the PIRQs
759 * (free_domain_pirqs).
761 if ((rc
== -ESRCH
&& info
->u
.pirq
.domid
!= DOMID_SELF
))
762 printk(KERN_INFO
"domain %d does not have %d anymore\n",
763 info
->u
.pirq
.domid
, info
->u
.pirq
.pirq
);
765 printk(KERN_WARNING
"unmap irq failed %d\n", rc
);
773 mutex_unlock(&irq_mapping_update_lock
);
777 int xen_irq_from_pirq(unsigned pirq
)
781 struct irq_info
*info
;
783 mutex_lock(&irq_mapping_update_lock
);
785 list_for_each_entry(info
, &xen_irq_list_head
, list
) {
786 if (info
->type
!= IRQT_PIRQ
)
789 if (info
->u
.pirq
.pirq
== pirq
)
794 mutex_unlock(&irq_mapping_update_lock
);
800 int xen_pirq_from_irq(unsigned irq
)
802 return pirq_from_irq(irq
);
804 EXPORT_SYMBOL_GPL(xen_pirq_from_irq
);
805 int bind_evtchn_to_irq(unsigned int evtchn
)
809 mutex_lock(&irq_mapping_update_lock
);
811 irq
= evtchn_to_irq
[evtchn
];
814 irq
= xen_allocate_irq_dynamic();
818 irq_set_chip_and_handler_name(irq
, &xen_dynamic_chip
,
819 handle_edge_irq
, "event");
821 xen_irq_info_evtchn_init(irq
, evtchn
);
825 mutex_unlock(&irq_mapping_update_lock
);
829 EXPORT_SYMBOL_GPL(bind_evtchn_to_irq
);
831 static int bind_ipi_to_irq(unsigned int ipi
, unsigned int cpu
)
833 struct evtchn_bind_ipi bind_ipi
;
836 mutex_lock(&irq_mapping_update_lock
);
838 irq
= per_cpu(ipi_to_irq
, cpu
)[ipi
];
841 irq
= xen_allocate_irq_dynamic();
845 irq_set_chip_and_handler_name(irq
, &xen_percpu_chip
,
846 handle_percpu_irq
, "ipi");
849 if (HYPERVISOR_event_channel_op(EVTCHNOP_bind_ipi
,
852 evtchn
= bind_ipi
.port
;
854 xen_irq_info_ipi_init(cpu
, irq
, evtchn
, ipi
);
856 bind_evtchn_to_cpu(evtchn
, cpu
);
860 mutex_unlock(&irq_mapping_update_lock
);
864 static int bind_interdomain_evtchn_to_irq(unsigned int remote_domain
,
865 unsigned int remote_port
)
867 struct evtchn_bind_interdomain bind_interdomain
;
870 bind_interdomain
.remote_dom
= remote_domain
;
871 bind_interdomain
.remote_port
= remote_port
;
873 err
= HYPERVISOR_event_channel_op(EVTCHNOP_bind_interdomain
,
876 return err
? : bind_evtchn_to_irq(bind_interdomain
.local_port
);
879 static int find_virq(unsigned int virq
, unsigned int cpu
)
881 struct evtchn_status status
;
882 int port
, rc
= -ENOENT
;
884 memset(&status
, 0, sizeof(status
));
885 for (port
= 0; port
<= NR_EVENT_CHANNELS
; port
++) {
886 status
.dom
= DOMID_SELF
;
888 rc
= HYPERVISOR_event_channel_op(EVTCHNOP_status
, &status
);
891 if (status
.status
!= EVTCHNSTAT_virq
)
893 if (status
.u
.virq
== virq
&& status
.vcpu
== cpu
) {
901 int bind_virq_to_irq(unsigned int virq
, unsigned int cpu
)
903 struct evtchn_bind_virq bind_virq
;
904 int evtchn
, irq
, ret
;
906 mutex_lock(&irq_mapping_update_lock
);
908 irq
= per_cpu(virq_to_irq
, cpu
)[virq
];
911 irq
= xen_allocate_irq_dynamic();
915 irq_set_chip_and_handler_name(irq
, &xen_percpu_chip
,
916 handle_percpu_irq
, "virq");
918 bind_virq
.virq
= virq
;
919 bind_virq
.vcpu
= cpu
;
920 ret
= HYPERVISOR_event_channel_op(EVTCHNOP_bind_virq
,
923 evtchn
= bind_virq
.port
;
926 ret
= find_virq(virq
, cpu
);
931 xen_irq_info_virq_init(cpu
, irq
, evtchn
, virq
);
933 bind_evtchn_to_cpu(evtchn
, cpu
);
937 mutex_unlock(&irq_mapping_update_lock
);
942 static void unbind_from_irq(unsigned int irq
)
944 struct evtchn_close close
;
945 int evtchn
= evtchn_from_irq(irq
);
946 struct irq_info
*info
= irq_get_handler_data(irq
);
948 mutex_lock(&irq_mapping_update_lock
);
950 if (info
->refcnt
> 0) {
952 if (info
->refcnt
!= 0)
956 if (VALID_EVTCHN(evtchn
)) {
958 if (HYPERVISOR_event_channel_op(EVTCHNOP_close
, &close
) != 0)
961 switch (type_from_irq(irq
)) {
963 per_cpu(virq_to_irq
, cpu_from_evtchn(evtchn
))
964 [virq_from_irq(irq
)] = -1;
967 per_cpu(ipi_to_irq
, cpu_from_evtchn(evtchn
))
968 [ipi_from_irq(irq
)] = -1;
974 /* Closed ports are implicitly re-bound to VCPU0. */
975 bind_evtchn_to_cpu(evtchn
, 0);
977 evtchn_to_irq
[evtchn
] = -1;
980 BUG_ON(info_for_irq(irq
)->type
== IRQT_UNBOUND
);
985 mutex_unlock(&irq_mapping_update_lock
);
988 int bind_evtchn_to_irqhandler(unsigned int evtchn
,
989 irq_handler_t handler
,
990 unsigned long irqflags
,
991 const char *devname
, void *dev_id
)
995 irq
= bind_evtchn_to_irq(evtchn
);
998 retval
= request_irq(irq
, handler
, irqflags
, devname
, dev_id
);
1000 unbind_from_irq(irq
);
1006 EXPORT_SYMBOL_GPL(bind_evtchn_to_irqhandler
);
1008 int bind_interdomain_evtchn_to_irqhandler(unsigned int remote_domain
,
1009 unsigned int remote_port
,
1010 irq_handler_t handler
,
1011 unsigned long irqflags
,
1012 const char *devname
,
1017 irq
= bind_interdomain_evtchn_to_irq(remote_domain
, remote_port
);
1021 retval
= request_irq(irq
, handler
, irqflags
, devname
, dev_id
);
1023 unbind_from_irq(irq
);
1029 EXPORT_SYMBOL_GPL(bind_interdomain_evtchn_to_irqhandler
);
1031 int bind_virq_to_irqhandler(unsigned int virq
, unsigned int cpu
,
1032 irq_handler_t handler
,
1033 unsigned long irqflags
, const char *devname
, void *dev_id
)
1037 irq
= bind_virq_to_irq(virq
, cpu
);
1040 retval
= request_irq(irq
, handler
, irqflags
, devname
, dev_id
);
1042 unbind_from_irq(irq
);
1048 EXPORT_SYMBOL_GPL(bind_virq_to_irqhandler
);
1050 int bind_ipi_to_irqhandler(enum ipi_vector ipi
,
1052 irq_handler_t handler
,
1053 unsigned long irqflags
,
1054 const char *devname
,
1059 irq
= bind_ipi_to_irq(ipi
, cpu
);
1063 irqflags
|= IRQF_NO_SUSPEND
| IRQF_FORCE_RESUME
| IRQF_EARLY_RESUME
;
1064 retval
= request_irq(irq
, handler
, irqflags
, devname
, dev_id
);
1066 unbind_from_irq(irq
);
1073 void unbind_from_irqhandler(unsigned int irq
, void *dev_id
)
1075 free_irq(irq
, dev_id
);
1076 unbind_from_irq(irq
);
1078 EXPORT_SYMBOL_GPL(unbind_from_irqhandler
);
1080 int evtchn_make_refcounted(unsigned int evtchn
)
1082 int irq
= evtchn_to_irq
[evtchn
];
1083 struct irq_info
*info
;
1088 info
= irq_get_handler_data(irq
);
1093 WARN_ON(info
->refcnt
!= -1);
1099 EXPORT_SYMBOL_GPL(evtchn_make_refcounted
);
1101 int evtchn_get(unsigned int evtchn
)
1104 struct irq_info
*info
;
1107 if (evtchn
>= NR_EVENT_CHANNELS
)
1110 mutex_lock(&irq_mapping_update_lock
);
1112 irq
= evtchn_to_irq
[evtchn
];
1116 info
= irq_get_handler_data(irq
);
1122 if (info
->refcnt
<= 0)
1128 mutex_unlock(&irq_mapping_update_lock
);
1132 EXPORT_SYMBOL_GPL(evtchn_get
);
1134 void evtchn_put(unsigned int evtchn
)
1136 int irq
= evtchn_to_irq
[evtchn
];
1137 if (WARN_ON(irq
== -1))
1139 unbind_from_irq(irq
);
1141 EXPORT_SYMBOL_GPL(evtchn_put
);
1143 void xen_send_IPI_one(unsigned int cpu
, enum ipi_vector vector
)
1145 int irq
= per_cpu(ipi_to_irq
, cpu
)[vector
];
1147 notify_remote_via_irq(irq
);
1150 irqreturn_t
xen_debug_interrupt(int irq
, void *dev_id
)
1152 struct shared_info
*sh
= HYPERVISOR_shared_info
;
1153 int cpu
= smp_processor_id();
1154 unsigned long *cpu_evtchn
= per_cpu(cpu_evtchn_mask
, cpu
);
1156 unsigned long flags
;
1157 static DEFINE_SPINLOCK(debug_lock
);
1158 struct vcpu_info
*v
;
1160 spin_lock_irqsave(&debug_lock
, flags
);
1162 printk("\nvcpu %d\n ", cpu
);
1164 for_each_online_cpu(i
) {
1166 v
= per_cpu(xen_vcpu
, i
);
1167 pending
= (get_irq_regs() && i
== cpu
)
1168 ? xen_irqs_disabled(get_irq_regs())
1169 : v
->evtchn_upcall_mask
;
1170 printk("%d: masked=%d pending=%d event_sel %0*lx\n ", i
,
1171 pending
, v
->evtchn_upcall_pending
,
1172 (int)(sizeof(v
->evtchn_pending_sel
)*2),
1173 v
->evtchn_pending_sel
);
1175 v
= per_cpu(xen_vcpu
, cpu
);
1177 printk("\npending:\n ");
1178 for (i
= ARRAY_SIZE(sh
->evtchn_pending
)-1; i
>= 0; i
--)
1179 printk("%0*lx%s", (int)sizeof(sh
->evtchn_pending
[0])*2,
1180 sh
->evtchn_pending
[i
],
1181 i
% 8 == 0 ? "\n " : " ");
1182 printk("\nglobal mask:\n ");
1183 for (i
= ARRAY_SIZE(sh
->evtchn_mask
)-1; i
>= 0; i
--)
1185 (int)(sizeof(sh
->evtchn_mask
[0])*2),
1187 i
% 8 == 0 ? "\n " : " ");
1189 printk("\nglobally unmasked:\n ");
1190 for (i
= ARRAY_SIZE(sh
->evtchn_mask
)-1; i
>= 0; i
--)
1191 printk("%0*lx%s", (int)(sizeof(sh
->evtchn_mask
[0])*2),
1192 sh
->evtchn_pending
[i
] & ~sh
->evtchn_mask
[i
],
1193 i
% 8 == 0 ? "\n " : " ");
1195 printk("\nlocal cpu%d mask:\n ", cpu
);
1196 for (i
= (NR_EVENT_CHANNELS
/BITS_PER_LONG
)-1; i
>= 0; i
--)
1197 printk("%0*lx%s", (int)(sizeof(cpu_evtchn
[0])*2),
1199 i
% 8 == 0 ? "\n " : " ");
1201 printk("\nlocally unmasked:\n ");
1202 for (i
= ARRAY_SIZE(sh
->evtchn_mask
)-1; i
>= 0; i
--) {
1203 unsigned long pending
= sh
->evtchn_pending
[i
]
1204 & ~sh
->evtchn_mask
[i
]
1206 printk("%0*lx%s", (int)(sizeof(sh
->evtchn_mask
[0])*2),
1207 pending
, i
% 8 == 0 ? "\n " : " ");
1210 printk("\npending list:\n");
1211 for (i
= 0; i
< NR_EVENT_CHANNELS
; i
++) {
1212 if (sync_test_bit(i
, sh
->evtchn_pending
)) {
1213 int word_idx
= i
/ BITS_PER_LONG
;
1214 printk(" %d: event %d -> irq %d%s%s%s\n",
1215 cpu_from_evtchn(i
), i
,
1217 sync_test_bit(word_idx
, &v
->evtchn_pending_sel
)
1219 !sync_test_bit(i
, sh
->evtchn_mask
)
1220 ? "" : " globally-masked",
1221 sync_test_bit(i
, cpu_evtchn
)
1222 ? "" : " locally-masked");
1226 spin_unlock_irqrestore(&debug_lock
, flags
);
1231 static DEFINE_PER_CPU(unsigned, xed_nesting_count
);
1232 static DEFINE_PER_CPU(unsigned int, current_word_idx
);
1233 static DEFINE_PER_CPU(unsigned int, current_bit_idx
);
1236 * Mask out the i least significant bits of w
1238 #define MASK_LSBS(w, i) (w & ((~0UL) << i))
1241 * Search the CPUs pending events bitmasks. For each one found, map
1242 * the event number to an irq, and feed it into do_IRQ() for
1245 * Xen uses a two-level bitmap to speed searching. The first level is
1246 * a bitset of words which contain pending event bits. The second
1247 * level is a bitset of pending events themselves.
1249 static void __xen_evtchn_do_upcall(void)
1251 int start_word_idx
, start_bit_idx
;
1252 int word_idx
, bit_idx
;
1254 int cpu
= get_cpu();
1255 struct shared_info
*s
= HYPERVISOR_shared_info
;
1256 struct vcpu_info
*vcpu_info
= __this_cpu_read(xen_vcpu
);
1260 unsigned long pending_words
;
1262 vcpu_info
->evtchn_upcall_pending
= 0;
1264 if (__this_cpu_inc_return(xed_nesting_count
) - 1)
1267 #ifndef CONFIG_X86 /* No need for a barrier -- XCHG is a barrier on x86. */
1268 /* Clear master flag /before/ clearing selector flag. */
1271 pending_words
= xchg(&vcpu_info
->evtchn_pending_sel
, 0);
1273 start_word_idx
= __this_cpu_read(current_word_idx
);
1274 start_bit_idx
= __this_cpu_read(current_bit_idx
);
1276 word_idx
= start_word_idx
;
1278 for (i
= 0; pending_words
!= 0; i
++) {
1279 unsigned long pending_bits
;
1280 unsigned long words
;
1282 words
= MASK_LSBS(pending_words
, word_idx
);
1285 * If we masked out all events, wrap to beginning.
1292 word_idx
= __ffs(words
);
1294 pending_bits
= active_evtchns(cpu
, s
, word_idx
);
1295 bit_idx
= 0; /* usually scan entire word from start */
1296 if (word_idx
== start_word_idx
) {
1297 /* We scan the starting word in two parts */
1299 /* 1st time: start in the middle */
1300 bit_idx
= start_bit_idx
;
1302 /* 2nd time: mask bits done already */
1303 bit_idx
&= (1UL << start_bit_idx
) - 1;
1309 struct irq_desc
*desc
;
1311 bits
= MASK_LSBS(pending_bits
, bit_idx
);
1313 /* If we masked out all events, move on. */
1317 bit_idx
= __ffs(bits
);
1320 port
= (word_idx
* BITS_PER_LONG
) + bit_idx
;
1321 irq
= evtchn_to_irq
[port
];
1324 desc
= irq_to_desc(irq
);
1326 generic_handle_irq_desc(irq
, desc
);
1329 bit_idx
= (bit_idx
+ 1) % BITS_PER_LONG
;
1331 /* Next caller starts at last processed + 1 */
1332 __this_cpu_write(current_word_idx
,
1333 bit_idx
? word_idx
:
1334 (word_idx
+1) % BITS_PER_LONG
);
1335 __this_cpu_write(current_bit_idx
, bit_idx
);
1336 } while (bit_idx
!= 0);
1338 /* Scan start_l1i twice; all others once. */
1339 if ((word_idx
!= start_word_idx
) || (i
!= 0))
1340 pending_words
&= ~(1UL << word_idx
);
1342 word_idx
= (word_idx
+ 1) % BITS_PER_LONG
;
1345 BUG_ON(!irqs_disabled());
1347 count
= __this_cpu_read(xed_nesting_count
);
1348 __this_cpu_write(xed_nesting_count
, 0);
1349 } while (count
!= 1 || vcpu_info
->evtchn_upcall_pending
);
1356 void xen_evtchn_do_upcall(struct pt_regs
*regs
)
1358 struct pt_regs
*old_regs
= set_irq_regs(regs
);
1363 __xen_evtchn_do_upcall();
1366 set_irq_regs(old_regs
);
1369 void xen_hvm_evtchn_do_upcall(void)
1371 __xen_evtchn_do_upcall();
1373 EXPORT_SYMBOL_GPL(xen_hvm_evtchn_do_upcall
);
1375 /* Rebind a new event channel to an existing irq. */
1376 void rebind_evtchn_irq(int evtchn
, int irq
)
1378 struct irq_info
*info
= info_for_irq(irq
);
1380 /* Make sure the irq is masked, since the new event channel
1381 will also be masked. */
1384 mutex_lock(&irq_mapping_update_lock
);
1386 /* After resume the irq<->evtchn mappings are all cleared out */
1387 BUG_ON(evtchn_to_irq
[evtchn
] != -1);
1388 /* Expect irq to have been bound before,
1389 so there should be a proper type */
1390 BUG_ON(info
->type
== IRQT_UNBOUND
);
1392 xen_irq_info_evtchn_init(irq
, evtchn
);
1394 mutex_unlock(&irq_mapping_update_lock
);
1396 /* new event channels are always bound to cpu 0 */
1397 irq_set_affinity(irq
, cpumask_of(0));
1399 /* Unmask the event channel. */
1403 /* Rebind an evtchn so that it gets delivered to a specific cpu */
1404 static int rebind_irq_to_cpu(unsigned irq
, unsigned tcpu
)
1406 struct evtchn_bind_vcpu bind_vcpu
;
1407 int evtchn
= evtchn_from_irq(irq
);
1409 if (!VALID_EVTCHN(evtchn
))
1413 * Events delivered via platform PCI interrupts are always
1414 * routed to vcpu 0 and hence cannot be rebound.
1416 if (xen_hvm_domain() && !xen_have_vector_callback
)
1419 /* Send future instances of this interrupt to other vcpu. */
1420 bind_vcpu
.port
= evtchn
;
1421 bind_vcpu
.vcpu
= tcpu
;
1424 * If this fails, it usually just indicates that we're dealing with a
1425 * virq or IPI channel, which don't actually need to be rebound. Ignore
1426 * it, but don't do the xenlinux-level rebind in that case.
1428 if (HYPERVISOR_event_channel_op(EVTCHNOP_bind_vcpu
, &bind_vcpu
) >= 0)
1429 bind_evtchn_to_cpu(evtchn
, tcpu
);
1434 static int set_affinity_irq(struct irq_data
*data
, const struct cpumask
*dest
,
1437 unsigned tcpu
= cpumask_first(dest
);
1439 return rebind_irq_to_cpu(data
->irq
, tcpu
);
1442 int resend_irq_on_evtchn(unsigned int irq
)
1444 int masked
, evtchn
= evtchn_from_irq(irq
);
1445 struct shared_info
*s
= HYPERVISOR_shared_info
;
1447 if (!VALID_EVTCHN(evtchn
))
1450 masked
= sync_test_and_set_bit(evtchn
, s
->evtchn_mask
);
1451 sync_set_bit(evtchn
, s
->evtchn_pending
);
1453 unmask_evtchn(evtchn
);
1458 static void enable_dynirq(struct irq_data
*data
)
1460 int evtchn
= evtchn_from_irq(data
->irq
);
1462 if (VALID_EVTCHN(evtchn
))
1463 unmask_evtchn(evtchn
);
1466 static void disable_dynirq(struct irq_data
*data
)
1468 int evtchn
= evtchn_from_irq(data
->irq
);
1470 if (VALID_EVTCHN(evtchn
))
1471 mask_evtchn(evtchn
);
1474 static void ack_dynirq(struct irq_data
*data
)
1476 int evtchn
= evtchn_from_irq(data
->irq
);
1480 if (VALID_EVTCHN(evtchn
))
1481 clear_evtchn(evtchn
);
1484 static void mask_ack_dynirq(struct irq_data
*data
)
1486 disable_dynirq(data
);
1490 static int retrigger_dynirq(struct irq_data
*data
)
1492 int evtchn
= evtchn_from_irq(data
->irq
);
1493 struct shared_info
*sh
= HYPERVISOR_shared_info
;
1496 if (VALID_EVTCHN(evtchn
)) {
1499 masked
= sync_test_and_set_bit(evtchn
, sh
->evtchn_mask
);
1500 sync_set_bit(evtchn
, sh
->evtchn_pending
);
1502 unmask_evtchn(evtchn
);
1509 static void restore_pirqs(void)
1511 int pirq
, rc
, irq
, gsi
;
1512 struct physdev_map_pirq map_irq
;
1513 struct irq_info
*info
;
1515 list_for_each_entry(info
, &xen_irq_list_head
, list
) {
1516 if (info
->type
!= IRQT_PIRQ
)
1519 pirq
= info
->u
.pirq
.pirq
;
1520 gsi
= info
->u
.pirq
.gsi
;
1523 /* save/restore of PT devices doesn't work, so at this point the
1524 * only devices present are GSI based emulated devices */
1528 map_irq
.domid
= DOMID_SELF
;
1529 map_irq
.type
= MAP_PIRQ_TYPE_GSI
;
1530 map_irq
.index
= gsi
;
1531 map_irq
.pirq
= pirq
;
1533 rc
= HYPERVISOR_physdev_op(PHYSDEVOP_map_pirq
, &map_irq
);
1535 printk(KERN_WARNING
"xen map irq failed gsi=%d irq=%d pirq=%d rc=%d\n",
1536 gsi
, irq
, pirq
, rc
);
1541 printk(KERN_DEBUG
"xen: --> irq=%d, pirq=%d\n", irq
, map_irq
.pirq
);
1543 __startup_pirq(irq
);
1547 static void restore_cpu_virqs(unsigned int cpu
)
1549 struct evtchn_bind_virq bind_virq
;
1550 int virq
, irq
, evtchn
;
1552 for (virq
= 0; virq
< NR_VIRQS
; virq
++) {
1553 if ((irq
= per_cpu(virq_to_irq
, cpu
)[virq
]) == -1)
1556 BUG_ON(virq_from_irq(irq
) != virq
);
1558 /* Get a new binding from Xen. */
1559 bind_virq
.virq
= virq
;
1560 bind_virq
.vcpu
= cpu
;
1561 if (HYPERVISOR_event_channel_op(EVTCHNOP_bind_virq
,
1564 evtchn
= bind_virq
.port
;
1566 /* Record the new mapping. */
1567 xen_irq_info_virq_init(cpu
, irq
, evtchn
, virq
);
1568 bind_evtchn_to_cpu(evtchn
, cpu
);
1572 static void restore_cpu_ipis(unsigned int cpu
)
1574 struct evtchn_bind_ipi bind_ipi
;
1575 int ipi
, irq
, evtchn
;
1577 for (ipi
= 0; ipi
< XEN_NR_IPIS
; ipi
++) {
1578 if ((irq
= per_cpu(ipi_to_irq
, cpu
)[ipi
]) == -1)
1581 BUG_ON(ipi_from_irq(irq
) != ipi
);
1583 /* Get a new binding from Xen. */
1584 bind_ipi
.vcpu
= cpu
;
1585 if (HYPERVISOR_event_channel_op(EVTCHNOP_bind_ipi
,
1588 evtchn
= bind_ipi
.port
;
1590 /* Record the new mapping. */
1591 xen_irq_info_ipi_init(cpu
, irq
, evtchn
, ipi
);
1592 bind_evtchn_to_cpu(evtchn
, cpu
);
1596 /* Clear an irq's pending state, in preparation for polling on it */
1597 void xen_clear_irq_pending(int irq
)
1599 int evtchn
= evtchn_from_irq(irq
);
1601 if (VALID_EVTCHN(evtchn
))
1602 clear_evtchn(evtchn
);
1604 EXPORT_SYMBOL(xen_clear_irq_pending
);
1605 void xen_set_irq_pending(int irq
)
1607 int evtchn
= evtchn_from_irq(irq
);
1609 if (VALID_EVTCHN(evtchn
))
1613 bool xen_test_irq_pending(int irq
)
1615 int evtchn
= evtchn_from_irq(irq
);
1618 if (VALID_EVTCHN(evtchn
))
1619 ret
= test_evtchn(evtchn
);
1624 /* Poll waiting for an irq to become pending with timeout. In the usual case,
1625 * the irq will be disabled so it won't deliver an interrupt. */
1626 void xen_poll_irq_timeout(int irq
, u64 timeout
)
1628 evtchn_port_t evtchn
= evtchn_from_irq(irq
);
1630 if (VALID_EVTCHN(evtchn
)) {
1631 struct sched_poll poll
;
1634 poll
.timeout
= timeout
;
1635 set_xen_guest_handle(poll
.ports
, &evtchn
);
1637 if (HYPERVISOR_sched_op(SCHEDOP_poll
, &poll
) != 0)
1641 EXPORT_SYMBOL(xen_poll_irq_timeout
);
1642 /* Poll waiting for an irq to become pending. In the usual case, the
1643 * irq will be disabled so it won't deliver an interrupt. */
1644 void xen_poll_irq(int irq
)
1646 xen_poll_irq_timeout(irq
, 0 /* no timeout */);
1649 /* Check whether the IRQ line is shared with other guests. */
1650 int xen_test_irq_shared(int irq
)
1652 struct irq_info
*info
= info_for_irq(irq
);
1653 struct physdev_irq_status_query irq_status
= { .irq
= info
->u
.pirq
.pirq
};
1655 if (HYPERVISOR_physdev_op(PHYSDEVOP_irq_status_query
, &irq_status
))
1657 return !(irq_status
.flags
& XENIRQSTAT_shared
);
1659 EXPORT_SYMBOL_GPL(xen_test_irq_shared
);
1661 void xen_irq_resume(void)
1663 unsigned int cpu
, evtchn
;
1664 struct irq_info
*info
;
1666 init_evtchn_cpu_bindings();
1668 /* New event-channel space is not 'live' yet. */
1669 for (evtchn
= 0; evtchn
< NR_EVENT_CHANNELS
; evtchn
++)
1670 mask_evtchn(evtchn
);
1672 /* No IRQ <-> event-channel mappings. */
1673 list_for_each_entry(info
, &xen_irq_list_head
, list
)
1674 info
->evtchn
= 0; /* zap event-channel binding */
1676 for (evtchn
= 0; evtchn
< NR_EVENT_CHANNELS
; evtchn
++)
1677 evtchn_to_irq
[evtchn
] = -1;
1679 for_each_possible_cpu(cpu
) {
1680 restore_cpu_virqs(cpu
);
1681 restore_cpu_ipis(cpu
);
1687 static struct irq_chip xen_dynamic_chip __read_mostly
= {
1690 .irq_disable
= disable_dynirq
,
1691 .irq_mask
= disable_dynirq
,
1692 .irq_unmask
= enable_dynirq
,
1694 .irq_ack
= ack_dynirq
,
1695 .irq_mask_ack
= mask_ack_dynirq
,
1697 .irq_set_affinity
= set_affinity_irq
,
1698 .irq_retrigger
= retrigger_dynirq
,
1701 static struct irq_chip xen_pirq_chip __read_mostly
= {
1704 .irq_startup
= startup_pirq
,
1705 .irq_shutdown
= shutdown_pirq
,
1706 .irq_enable
= enable_pirq
,
1707 .irq_disable
= disable_pirq
,
1709 .irq_mask
= disable_dynirq
,
1710 .irq_unmask
= enable_dynirq
,
1712 .irq_ack
= eoi_pirq
,
1713 .irq_eoi
= eoi_pirq
,
1714 .irq_mask_ack
= mask_ack_pirq
,
1716 .irq_set_affinity
= set_affinity_irq
,
1718 .irq_retrigger
= retrigger_dynirq
,
1721 static struct irq_chip xen_percpu_chip __read_mostly
= {
1722 .name
= "xen-percpu",
1724 .irq_disable
= disable_dynirq
,
1725 .irq_mask
= disable_dynirq
,
1726 .irq_unmask
= enable_dynirq
,
1728 .irq_ack
= ack_dynirq
,
1731 int xen_set_callback_via(uint64_t via
)
1733 struct xen_hvm_param a
;
1734 a
.domid
= DOMID_SELF
;
1735 a
.index
= HVM_PARAM_CALLBACK_IRQ
;
1737 return HYPERVISOR_hvm_op(HVMOP_set_param
, &a
);
1739 EXPORT_SYMBOL_GPL(xen_set_callback_via
);
1741 #ifdef CONFIG_XEN_PVHVM
1742 /* Vector callbacks are better than PCI interrupts to receive event
1743 * channel notifications because we can receive vector callbacks on any
1744 * vcpu and we don't need PCI support or APIC interactions. */
1745 void xen_callback_vector(void)
1748 uint64_t callback_via
;
1749 if (xen_have_vector_callback
) {
1750 callback_via
= HVM_CALLBACK_VECTOR(XEN_HVM_EVTCHN_CALLBACK
);
1751 rc
= xen_set_callback_via(callback_via
);
1753 printk(KERN_ERR
"Request for Xen HVM callback vector"
1755 xen_have_vector_callback
= 0;
1758 printk(KERN_INFO
"Xen HVM callback vector for event delivery is "
1760 /* in the restore case the vector has already been allocated */
1761 if (!test_bit(XEN_HVM_EVTCHN_CALLBACK
, used_vectors
))
1762 alloc_intr_gate(XEN_HVM_EVTCHN_CALLBACK
, xen_hvm_callback_vector
);
1766 void xen_callback_vector(void) {}
1769 void __init
xen_init_IRQ(void)
1773 evtchn_to_irq
= kcalloc(NR_EVENT_CHANNELS
, sizeof(*evtchn_to_irq
),
1775 BUG_ON(!evtchn_to_irq
);
1776 for (i
= 0; i
< NR_EVENT_CHANNELS
; i
++)
1777 evtchn_to_irq
[i
] = -1;
1779 init_evtchn_cpu_bindings();
1781 /* No event channels are 'live' right now. */
1782 for (i
= 0; i
< NR_EVENT_CHANNELS
; i
++)
1785 if (xen_hvm_domain()) {
1786 xen_callback_vector();
1788 /* pci_xen_hvm_init must be called after native_init_IRQ so that
1789 * __acpi_register_gsi can point at the right function */
1792 irq_ctx_init(smp_processor_id());
1793 if (xen_initial_domain())
1794 pci_xen_initial_domain();