xen.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522
  1. /*
  2. * Xen PCI - handle PCI (INTx) and MSI infrastructure calls for PV, HVM and
  3. * initial domain support. We also handle the DSDT _PRT callbacks for GSI's
  4. * used in HVM and initial domain mode (PV does not parse ACPI, so it has no
  5. * concept of GSIs). Under PV we hook under the pnbbios API for IRQs and
  6. * 0xcf8 PCI configuration read/write.
  7. *
  8. * Author: Ryan Wilson <hap9@epoch.ncsc.mil>
  9. * Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  10. * Stefano Stabellini <stefano.stabellini@eu.citrix.com>
  11. */
  12. #include <linux/module.h>
  13. #include <linux/init.h>
  14. #include <linux/pci.h>
  15. #include <linux/acpi.h>
  16. #include <linux/io.h>
  17. #include <asm/io_apic.h>
  18. #include <asm/pci_x86.h>
  19. #include <asm/xen/hypervisor.h>
  20. #include <xen/features.h>
  21. #include <xen/events.h>
  22. #include <asm/xen/pci.h>
  23. static int xen_pcifront_enable_irq(struct pci_dev *dev)
  24. {
  25. int rc;
  26. int share = 1;
  27. int pirq;
  28. u8 gsi;
  29. rc = pci_read_config_byte(dev, PCI_INTERRUPT_LINE, &gsi);
  30. if (rc < 0) {
  31. dev_warn(&dev->dev, "Xen PCI: failed to read interrupt line: %d\n",
  32. rc);
  33. return rc;
  34. }
  35. /* In PV DomU the Xen PCI backend puts the PIRQ in the interrupt line.*/
  36. pirq = gsi;
  37. if (gsi < NR_IRQS_LEGACY)
  38. share = 0;
  39. rc = xen_bind_pirq_gsi_to_irq(gsi, pirq, share, "pcifront");
  40. if (rc < 0) {
  41. dev_warn(&dev->dev, "Xen PCI: failed to bind GSI%d (PIRQ%d) to IRQ: %d\n",
  42. gsi, pirq, rc);
  43. return rc;
  44. }
  45. dev->irq = rc;
  46. dev_info(&dev->dev, "Xen PCI mapped GSI%d to IRQ%d\n", gsi, dev->irq);
  47. return 0;
  48. }
  49. #ifdef CONFIG_ACPI
  50. static int xen_register_pirq(u32 gsi, int gsi_override, int triggering,
  51. bool set_pirq)
  52. {
  53. int rc, pirq = -1, irq = -1;
  54. struct physdev_map_pirq map_irq;
  55. int shareable = 0;
  56. char *name;
  57. if (set_pirq)
  58. pirq = gsi;
  59. map_irq.domid = DOMID_SELF;
  60. map_irq.type = MAP_PIRQ_TYPE_GSI;
  61. map_irq.index = gsi;
  62. map_irq.pirq = pirq;
  63. rc = HYPERVISOR_physdev_op(PHYSDEVOP_map_pirq, &map_irq);
  64. if (rc) {
  65. printk(KERN_WARNING "xen map irq failed %d\n", rc);
  66. return -1;
  67. }
  68. if (triggering == ACPI_EDGE_SENSITIVE) {
  69. shareable = 0;
  70. name = "ioapic-edge";
  71. } else {
  72. shareable = 1;
  73. name = "ioapic-level";
  74. }
  75. if (gsi_override >= 0)
  76. gsi = gsi_override;
  77. irq = xen_bind_pirq_gsi_to_irq(gsi, map_irq.pirq, shareable, name);
  78. if (irq < 0)
  79. goto out;
  80. printk(KERN_DEBUG "xen: --> pirq=%d -> irq=%d (gsi=%d)\n", map_irq.pirq, irq, gsi);
  81. out:
  82. return irq;
  83. }
  84. static int acpi_register_gsi_xen_hvm(struct device *dev, u32 gsi,
  85. int trigger, int polarity)
  86. {
  87. if (!xen_hvm_domain())
  88. return -1;
  89. return xen_register_pirq(gsi, -1 /* no GSI override */, trigger,
  90. false /* no mapping of GSI to PIRQ */);
  91. }
  92. #ifdef CONFIG_XEN_DOM0
  93. static int xen_register_gsi(u32 gsi, int gsi_override, int triggering, int polarity)
  94. {
  95. int rc, irq;
  96. struct physdev_setup_gsi setup_gsi;
  97. if (!xen_pv_domain())
  98. return -1;
  99. printk(KERN_DEBUG "xen: registering gsi %u triggering %d polarity %d\n",
  100. gsi, triggering, polarity);
  101. irq = xen_register_pirq(gsi, gsi_override, triggering, true);
  102. setup_gsi.gsi = gsi;
  103. setup_gsi.triggering = (triggering == ACPI_EDGE_SENSITIVE ? 0 : 1);
  104. setup_gsi.polarity = (polarity == ACPI_ACTIVE_HIGH ? 0 : 1);
  105. rc = HYPERVISOR_physdev_op(PHYSDEVOP_setup_gsi, &setup_gsi);
  106. if (rc == -EEXIST)
  107. printk(KERN_INFO "Already setup the GSI :%d\n", gsi);
  108. else if (rc) {
  109. printk(KERN_ERR "Failed to setup GSI :%d, err_code:%d\n",
  110. gsi, rc);
  111. }
  112. return irq;
  113. }
  114. static int acpi_register_gsi_xen(struct device *dev, u32 gsi,
  115. int trigger, int polarity)
  116. {
  117. return xen_register_gsi(gsi, -1 /* no GSI override */, trigger, polarity);
  118. }
  119. #endif
  120. #endif
  121. #if defined(CONFIG_PCI_MSI)
  122. #include <linux/msi.h>
  123. #include <asm/msidef.h>
  124. struct xen_pci_frontend_ops *xen_pci_frontend;
  125. EXPORT_SYMBOL_GPL(xen_pci_frontend);
  126. static int xen_setup_msi_irqs(struct pci_dev *dev, int nvec, int type)
  127. {
  128. int irq, ret, i;
  129. struct msi_desc *msidesc;
  130. int *v;
  131. v = kzalloc(sizeof(int) * max(1, nvec), GFP_KERNEL);
  132. if (!v)
  133. return -ENOMEM;
  134. if (type == PCI_CAP_ID_MSIX)
  135. ret = xen_pci_frontend_enable_msix(dev, v, nvec);
  136. else
  137. ret = xen_pci_frontend_enable_msi(dev, v);
  138. if (ret)
  139. goto error;
  140. i = 0;
  141. list_for_each_entry(msidesc, &dev->msi_list, list) {
  142. irq = xen_bind_pirq_msi_to_irq(dev, msidesc, v[i], 0,
  143. (type == PCI_CAP_ID_MSIX) ?
  144. "pcifront-msi-x" :
  145. "pcifront-msi",
  146. DOMID_SELF);
  147. if (irq < 0)
  148. goto free;
  149. i++;
  150. }
  151. kfree(v);
  152. return 0;
  153. error:
  154. dev_err(&dev->dev, "Xen PCI frontend has not registered MSI/MSI-X support!\n");
  155. free:
  156. kfree(v);
  157. return ret;
  158. }
  159. #define XEN_PIRQ_MSI_DATA (MSI_DATA_TRIGGER_EDGE | \
  160. MSI_DATA_LEVEL_ASSERT | (3 << 8) | MSI_DATA_VECTOR(0))
  161. static void xen_msi_compose_msg(struct pci_dev *pdev, unsigned int pirq,
  162. struct msi_msg *msg)
  163. {
  164. /* We set vector == 0 to tell the hypervisor we don't care about it,
  165. * but we want a pirq setup instead.
  166. * We use the dest_id field to pass the pirq that we want. */
  167. msg->address_hi = MSI_ADDR_BASE_HI | MSI_ADDR_EXT_DEST_ID(pirq);
  168. msg->address_lo =
  169. MSI_ADDR_BASE_LO |
  170. MSI_ADDR_DEST_MODE_PHYSICAL |
  171. MSI_ADDR_REDIRECTION_CPU |
  172. MSI_ADDR_DEST_ID(pirq);
  173. msg->data = XEN_PIRQ_MSI_DATA;
  174. }
  175. static int xen_hvm_setup_msi_irqs(struct pci_dev *dev, int nvec, int type)
  176. {
  177. int irq, pirq;
  178. struct msi_desc *msidesc;
  179. struct msi_msg msg;
  180. list_for_each_entry(msidesc, &dev->msi_list, list) {
  181. __read_msi_msg(msidesc, &msg);
  182. pirq = MSI_ADDR_EXT_DEST_ID(msg.address_hi) |
  183. ((msg.address_lo >> MSI_ADDR_DEST_ID_SHIFT) & 0xff);
  184. if (msg.data != XEN_PIRQ_MSI_DATA ||
  185. xen_irq_from_pirq(pirq) < 0) {
  186. pirq = xen_allocate_pirq_msi(dev, msidesc);
  187. if (pirq < 0)
  188. goto error;
  189. xen_msi_compose_msg(dev, pirq, &msg);
  190. __write_msi_msg(msidesc, &msg);
  191. dev_dbg(&dev->dev, "xen: msi bound to pirq=%d\n", pirq);
  192. } else {
  193. dev_dbg(&dev->dev,
  194. "xen: msi already bound to pirq=%d\n", pirq);
  195. }
  196. irq = xen_bind_pirq_msi_to_irq(dev, msidesc, pirq, 0,
  197. (type == PCI_CAP_ID_MSIX) ?
  198. "msi-x" : "msi",
  199. DOMID_SELF);
  200. if (irq < 0)
  201. goto error;
  202. dev_dbg(&dev->dev,
  203. "xen: msi --> pirq=%d --> irq=%d\n", pirq, irq);
  204. }
  205. return 0;
  206. error:
  207. dev_err(&dev->dev,
  208. "Xen PCI frontend has not registered MSI/MSI-X support!\n");
  209. return -ENODEV;
  210. }
  211. #ifdef CONFIG_XEN_DOM0
  212. static int xen_initdom_setup_msi_irqs(struct pci_dev *dev, int nvec, int type)
  213. {
  214. int ret = 0;
  215. struct msi_desc *msidesc;
  216. list_for_each_entry(msidesc, &dev->msi_list, list) {
  217. struct physdev_map_pirq map_irq;
  218. domid_t domid;
  219. domid = ret = xen_find_device_domain_owner(dev);
  220. /* N.B. Casting int's -ENODEV to uint16_t results in 0xFFED,
  221. * hence check ret value for < 0. */
  222. if (ret < 0)
  223. domid = DOMID_SELF;
  224. memset(&map_irq, 0, sizeof(map_irq));
  225. map_irq.domid = domid;
  226. map_irq.type = MAP_PIRQ_TYPE_MSI;
  227. map_irq.index = -1;
  228. map_irq.pirq = -1;
  229. map_irq.bus = dev->bus->number;
  230. map_irq.devfn = dev->devfn;
  231. if (type == PCI_CAP_ID_MSIX) {
  232. int pos;
  233. u32 table_offset, bir;
  234. pos = pci_find_capability(dev, PCI_CAP_ID_MSIX);
  235. pci_read_config_dword(dev, pos + PCI_MSIX_TABLE,
  236. &table_offset);
  237. bir = (u8)(table_offset & PCI_MSIX_FLAGS_BIRMASK);
  238. map_irq.table_base = pci_resource_start(dev, bir);
  239. map_irq.entry_nr = msidesc->msi_attrib.entry_nr;
  240. }
  241. ret = HYPERVISOR_physdev_op(PHYSDEVOP_map_pirq, &map_irq);
  242. if (ret) {
  243. dev_warn(&dev->dev, "xen map irq failed %d for %d domain\n",
  244. ret, domid);
  245. goto out;
  246. }
  247. ret = xen_bind_pirq_msi_to_irq(dev, msidesc,
  248. map_irq.pirq, map_irq.index,
  249. (type == PCI_CAP_ID_MSIX) ?
  250. "msi-x" : "msi",
  251. domid);
  252. if (ret < 0)
  253. goto out;
  254. }
  255. ret = 0;
  256. out:
  257. return ret;
  258. }
  259. #endif
  260. static void xen_teardown_msi_irqs(struct pci_dev *dev)
  261. {
  262. struct msi_desc *msidesc;
  263. msidesc = list_entry(dev->msi_list.next, struct msi_desc, list);
  264. if (msidesc->msi_attrib.is_msix)
  265. xen_pci_frontend_disable_msix(dev);
  266. else
  267. xen_pci_frontend_disable_msi(dev);
  268. /* Free the IRQ's and the msidesc using the generic code. */
  269. default_teardown_msi_irqs(dev);
  270. }
  271. static void xen_teardown_msi_irq(unsigned int irq)
  272. {
  273. xen_destroy_irq(irq);
  274. }
  275. #endif
  276. int __init pci_xen_init(void)
  277. {
  278. if (!xen_pv_domain() || xen_initial_domain())
  279. return -ENODEV;
  280. printk(KERN_INFO "PCI: setting up Xen PCI frontend stub\n");
  281. pcibios_set_cache_line_size();
  282. pcibios_enable_irq = xen_pcifront_enable_irq;
  283. pcibios_disable_irq = NULL;
  284. #ifdef CONFIG_ACPI
  285. /* Keep ACPI out of the picture */
  286. acpi_noirq = 1;
  287. #endif
  288. #ifdef CONFIG_PCI_MSI
  289. x86_msi.setup_msi_irqs = xen_setup_msi_irqs;
  290. x86_msi.teardown_msi_irq = xen_teardown_msi_irq;
  291. x86_msi.teardown_msi_irqs = xen_teardown_msi_irqs;
  292. #endif
  293. return 0;
  294. }
  295. int __init pci_xen_hvm_init(void)
  296. {
  297. if (!xen_feature(XENFEAT_hvm_pirqs))
  298. return 0;
  299. #ifdef CONFIG_ACPI
  300. /*
  301. * We don't want to change the actual ACPI delivery model,
  302. * just how GSIs get registered.
  303. */
  304. __acpi_register_gsi = acpi_register_gsi_xen_hvm;
  305. #endif
  306. #ifdef CONFIG_PCI_MSI
  307. x86_msi.setup_msi_irqs = xen_hvm_setup_msi_irqs;
  308. x86_msi.teardown_msi_irq = xen_teardown_msi_irq;
  309. #endif
  310. return 0;
  311. }
  312. #ifdef CONFIG_XEN_DOM0
  313. static __init void xen_setup_acpi_sci(void)
  314. {
  315. int rc;
  316. int trigger, polarity;
  317. int gsi = acpi_sci_override_gsi;
  318. int irq = -1;
  319. int gsi_override = -1;
  320. if (!gsi)
  321. return;
  322. rc = acpi_get_override_irq(gsi, &trigger, &polarity);
  323. if (rc) {
  324. printk(KERN_WARNING "xen: acpi_get_override_irq failed for acpi"
  325. " sci, rc=%d\n", rc);
  326. return;
  327. }
  328. trigger = trigger ? ACPI_LEVEL_SENSITIVE : ACPI_EDGE_SENSITIVE;
  329. polarity = polarity ? ACPI_ACTIVE_LOW : ACPI_ACTIVE_HIGH;
  330. printk(KERN_INFO "xen: sci override: global_irq=%d trigger=%d "
  331. "polarity=%d\n", gsi, trigger, polarity);
  332. /* Before we bind the GSI to a Linux IRQ, check whether
  333. * we need to override it with bus_irq (IRQ) value. Usually for
  334. * IRQs below IRQ_LEGACY_IRQ this holds IRQ == GSI, as so:
  335. * ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 low level)
  336. * but there are oddballs where the IRQ != GSI:
  337. * ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 20 low level)
  338. * which ends up being: gsi_to_irq[9] == 20
  339. * (which is what acpi_gsi_to_irq ends up calling when starting the
  340. * the ACPI interpreter and keels over since IRQ 9 has not been
  341. * setup as we had setup IRQ 20 for it).
  342. */
  343. if (acpi_gsi_to_irq(gsi, &irq) == 0) {
  344. /* Use the provided value if it's valid. */
  345. if (irq >= 0)
  346. gsi_override = irq;
  347. }
  348. gsi = xen_register_gsi(gsi, gsi_override, trigger, polarity);
  349. printk(KERN_INFO "xen: acpi sci %d\n", gsi);
  350. return;
  351. }
  352. int __init pci_xen_initial_domain(void)
  353. {
  354. int irq;
  355. #ifdef CONFIG_PCI_MSI
  356. x86_msi.setup_msi_irqs = xen_initdom_setup_msi_irqs;
  357. x86_msi.teardown_msi_irq = xen_teardown_msi_irq;
  358. #endif
  359. xen_setup_acpi_sci();
  360. __acpi_register_gsi = acpi_register_gsi_xen;
  361. /* Pre-allocate legacy irqs */
  362. for (irq = 0; irq < NR_IRQS_LEGACY; irq++) {
  363. int trigger, polarity;
  364. if (acpi_get_override_irq(irq, &trigger, &polarity) == -1)
  365. continue;
  366. xen_register_pirq(irq, -1 /* no GSI override */,
  367. trigger ? ACPI_LEVEL_SENSITIVE : ACPI_EDGE_SENSITIVE,
  368. true /* Map GSI to PIRQ */);
  369. }
  370. if (0 == nr_ioapics) {
  371. for (irq = 0; irq < NR_IRQS_LEGACY; irq++)
  372. xen_bind_pirq_gsi_to_irq(irq, irq, 0, "xt-pic");
  373. }
  374. return 0;
  375. }
  376. struct xen_device_domain_owner {
  377. domid_t domain;
  378. struct pci_dev *dev;
  379. struct list_head list;
  380. };
  381. static DEFINE_SPINLOCK(dev_domain_list_spinlock);
  382. static struct list_head dev_domain_list = LIST_HEAD_INIT(dev_domain_list);
  383. static struct xen_device_domain_owner *find_device(struct pci_dev *dev)
  384. {
  385. struct xen_device_domain_owner *owner;
  386. list_for_each_entry(owner, &dev_domain_list, list) {
  387. if (owner->dev == dev)
  388. return owner;
  389. }
  390. return NULL;
  391. }
  392. int xen_find_device_domain_owner(struct pci_dev *dev)
  393. {
  394. struct xen_device_domain_owner *owner;
  395. int domain = -ENODEV;
  396. spin_lock(&dev_domain_list_spinlock);
  397. owner = find_device(dev);
  398. if (owner)
  399. domain = owner->domain;
  400. spin_unlock(&dev_domain_list_spinlock);
  401. return domain;
  402. }
  403. EXPORT_SYMBOL_GPL(xen_find_device_domain_owner);
  404. int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain)
  405. {
  406. struct xen_device_domain_owner *owner;
  407. owner = kzalloc(sizeof(struct xen_device_domain_owner), GFP_KERNEL);
  408. if (!owner)
  409. return -ENODEV;
  410. spin_lock(&dev_domain_list_spinlock);
  411. if (find_device(dev)) {
  412. spin_unlock(&dev_domain_list_spinlock);
  413. kfree(owner);
  414. return -EEXIST;
  415. }
  416. owner->domain = domain;
  417. owner->dev = dev;
  418. list_add_tail(&owner->list, &dev_domain_list);
  419. spin_unlock(&dev_domain_list_spinlock);
  420. return 0;
  421. }
  422. EXPORT_SYMBOL_GPL(xen_register_device_domain_owner);
  423. int xen_unregister_device_domain_owner(struct pci_dev *dev)
  424. {
  425. struct xen_device_domain_owner *owner;
  426. spin_lock(&dev_domain_list_spinlock);
  427. owner = find_device(dev);
  428. if (!owner) {
  429. spin_unlock(&dev_domain_list_spinlock);
  430. return -ENODEV;
  431. }
  432. list_del(&owner->list);
  433. spin_unlock(&dev_domain_list_spinlock);
  434. kfree(owner);
  435. return 0;
  436. }
  437. EXPORT_SYMBOL_GPL(xen_unregister_device_domain_owner);
  438. #endif