xen.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540
  1. /*
  2. * Xen PCI - handle PCI (INTx) and MSI infrastructure calls for PV, HVM and
  3. * initial domain support. We also handle the DSDT _PRT callbacks for GSI's
  4. * used in HVM and initial domain mode (PV does not parse ACPI, so it has no
  5. * concept of GSIs). Under PV we hook under the pnbbios API for IRQs and
  6. * 0xcf8 PCI configuration read/write.
  7. *
  8. * Author: Ryan Wilson <hap9@epoch.ncsc.mil>
  9. * Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  10. * Stefano Stabellini <stefano.stabellini@eu.citrix.com>
  11. */
  12. #include <linux/module.h>
  13. #include <linux/init.h>
  14. #include <linux/pci.h>
  15. #include <linux/acpi.h>
  16. #include <linux/io.h>
  17. #include <asm/io_apic.h>
  18. #include <asm/pci_x86.h>
  19. #include <asm/xen/hypervisor.h>
  20. #include <xen/features.h>
  21. #include <xen/events.h>
  22. #include <asm/xen/pci.h>
  23. static int xen_pcifront_enable_irq(struct pci_dev *dev)
  24. {
  25. int rc;
  26. int share = 1;
  27. int pirq;
  28. u8 gsi;
  29. rc = pci_read_config_byte(dev, PCI_INTERRUPT_LINE, &gsi);
  30. if (rc < 0) {
  31. dev_warn(&dev->dev, "Xen PCI: failed to read interrupt line: %d\n",
  32. rc);
  33. return rc;
  34. }
  35. rc = xen_allocate_pirq_gsi(gsi);
  36. if (rc < 0) {
  37. dev_warn(&dev->dev, "Xen PCI: failed to allocate a PIRQ for GSI%d: %d\n",
  38. gsi, rc);
  39. return rc;
  40. }
  41. pirq = rc;
  42. if (gsi < NR_IRQS_LEGACY)
  43. share = 0;
  44. rc = xen_bind_pirq_gsi_to_irq(gsi, pirq, share, "pcifront");
  45. if (rc < 0) {
  46. dev_warn(&dev->dev, "Xen PCI: failed to bind GSI%d (PIRQ%d) to IRQ: %d\n",
  47. gsi, pirq, rc);
  48. return rc;
  49. }
  50. dev->irq = rc;
  51. dev_info(&dev->dev, "Xen PCI mapped GSI%d to IRQ%d\n", gsi, dev->irq);
  52. return 0;
  53. }
  54. #ifdef CONFIG_ACPI
  55. static int xen_register_pirq(u32 gsi, int gsi_override, int triggering,
  56. bool alloc_pirq)
  57. {
  58. int rc, pirq = -1, irq = -1;
  59. struct physdev_map_pirq map_irq;
  60. int shareable = 0;
  61. char *name;
  62. if (alloc_pirq) {
  63. pirq = xen_allocate_pirq_gsi(gsi);
  64. if (pirq < 0)
  65. goto out;
  66. }
  67. map_irq.domid = DOMID_SELF;
  68. map_irq.type = MAP_PIRQ_TYPE_GSI;
  69. map_irq.index = gsi;
  70. map_irq.pirq = pirq;
  71. rc = HYPERVISOR_physdev_op(PHYSDEVOP_map_pirq, &map_irq);
  72. if (rc) {
  73. printk(KERN_WARNING "xen map irq failed %d\n", rc);
  74. return -1;
  75. }
  76. if (triggering == ACPI_EDGE_SENSITIVE) {
  77. shareable = 0;
  78. name = "ioapic-edge";
  79. } else {
  80. shareable = 1;
  81. name = "ioapic-level";
  82. }
  83. if (gsi_override >= 0)
  84. gsi = gsi_override;
  85. irq = xen_bind_pirq_gsi_to_irq(gsi, map_irq.pirq, shareable, name);
  86. if (irq < 0)
  87. goto out;
  88. printk(KERN_DEBUG "xen: --> pirq=%d -> irq=%d (gsi=%d)\n", map_irq.pirq, irq, gsi);
  89. out:
  90. return irq;
  91. }
  92. static int acpi_register_gsi_xen_hvm(struct device *dev, u32 gsi,
  93. int trigger, int polarity)
  94. {
  95. if (!xen_hvm_domain())
  96. return -1;
  97. return xen_register_pirq(gsi, -1 /* no GSI override */,
  98. trigger, false /* no PIRQ allocation */);
  99. }
  100. #ifdef CONFIG_XEN_DOM0
  101. static int xen_register_gsi(u32 gsi, int gsi_override, int triggering, int polarity)
  102. {
  103. int rc, irq;
  104. struct physdev_setup_gsi setup_gsi;
  105. if (!xen_pv_domain())
  106. return -1;
  107. printk(KERN_DEBUG "xen: registering gsi %u triggering %d polarity %d\n",
  108. gsi, triggering, polarity);
  109. irq = xen_register_pirq(gsi, gsi_override, triggering, true);
  110. setup_gsi.gsi = gsi;
  111. setup_gsi.triggering = (triggering == ACPI_EDGE_SENSITIVE ? 0 : 1);
  112. setup_gsi.polarity = (polarity == ACPI_ACTIVE_HIGH ? 0 : 1);
  113. rc = HYPERVISOR_physdev_op(PHYSDEVOP_setup_gsi, &setup_gsi);
  114. if (rc == -EEXIST)
  115. printk(KERN_INFO "Already setup the GSI :%d\n", gsi);
  116. else if (rc) {
  117. printk(KERN_ERR "Failed to setup GSI :%d, err_code:%d\n",
  118. gsi, rc);
  119. }
  120. return irq;
  121. }
  122. static int acpi_register_gsi_xen(struct device *dev, u32 gsi,
  123. int trigger, int polarity)
  124. {
  125. return xen_register_gsi(gsi, -1 /* no GSI override */, trigger, polarity);
  126. }
  127. #endif
  128. #endif
  129. #if defined(CONFIG_PCI_MSI)
  130. #include <linux/msi.h>
  131. #include <asm/msidef.h>
  132. struct xen_pci_frontend_ops *xen_pci_frontend;
  133. EXPORT_SYMBOL_GPL(xen_pci_frontend);
  134. static int xen_setup_msi_irqs(struct pci_dev *dev, int nvec, int type)
  135. {
  136. int irq, ret, i;
  137. struct msi_desc *msidesc;
  138. int *v;
  139. v = kzalloc(sizeof(int) * max(1, nvec), GFP_KERNEL);
  140. if (!v)
  141. return -ENOMEM;
  142. if (type == PCI_CAP_ID_MSIX)
  143. ret = xen_pci_frontend_enable_msix(dev, v, nvec);
  144. else
  145. ret = xen_pci_frontend_enable_msi(dev, v);
  146. if (ret)
  147. goto error;
  148. i = 0;
  149. list_for_each_entry(msidesc, &dev->msi_list, list) {
  150. irq = xen_bind_pirq_msi_to_irq(dev, msidesc, v[i], 0,
  151. (type == PCI_CAP_ID_MSIX) ?
  152. "pcifront-msi-x" :
  153. "pcifront-msi",
  154. DOMID_SELF);
  155. if (irq < 0)
  156. goto free;
  157. i++;
  158. }
  159. kfree(v);
  160. return 0;
  161. error:
  162. dev_err(&dev->dev, "Xen PCI frontend has not registered MSI/MSI-X support!\n");
  163. free:
  164. kfree(v);
  165. return ret;
  166. }
  167. #define XEN_PIRQ_MSI_DATA (MSI_DATA_TRIGGER_EDGE | \
  168. MSI_DATA_LEVEL_ASSERT | (3 << 8) | MSI_DATA_VECTOR(0))
  169. static void xen_msi_compose_msg(struct pci_dev *pdev, unsigned int pirq,
  170. struct msi_msg *msg)
  171. {
  172. /* We set vector == 0 to tell the hypervisor we don't care about it,
  173. * but we want a pirq setup instead.
  174. * We use the dest_id field to pass the pirq that we want. */
  175. msg->address_hi = MSI_ADDR_BASE_HI | MSI_ADDR_EXT_DEST_ID(pirq);
  176. msg->address_lo =
  177. MSI_ADDR_BASE_LO |
  178. MSI_ADDR_DEST_MODE_PHYSICAL |
  179. MSI_ADDR_REDIRECTION_CPU |
  180. MSI_ADDR_DEST_ID(pirq);
  181. msg->data = XEN_PIRQ_MSI_DATA;
  182. }
  183. static int xen_hvm_setup_msi_irqs(struct pci_dev *dev, int nvec, int type)
  184. {
  185. int irq, pirq;
  186. struct msi_desc *msidesc;
  187. struct msi_msg msg;
  188. list_for_each_entry(msidesc, &dev->msi_list, list) {
  189. __read_msi_msg(msidesc, &msg);
  190. pirq = MSI_ADDR_EXT_DEST_ID(msg.address_hi) |
  191. ((msg.address_lo >> MSI_ADDR_DEST_ID_SHIFT) & 0xff);
  192. if (msg.data != XEN_PIRQ_MSI_DATA ||
  193. xen_irq_from_pirq(pirq) < 0) {
  194. pirq = xen_allocate_pirq_msi(dev, msidesc);
  195. if (pirq < 0)
  196. goto error;
  197. xen_msi_compose_msg(dev, pirq, &msg);
  198. __write_msi_msg(msidesc, &msg);
  199. dev_dbg(&dev->dev, "xen: msi bound to pirq=%d\n", pirq);
  200. } else {
  201. dev_dbg(&dev->dev,
  202. "xen: msi already bound to pirq=%d\n", pirq);
  203. }
  204. irq = xen_bind_pirq_msi_to_irq(dev, msidesc, pirq, 0,
  205. (type == PCI_CAP_ID_MSIX) ?
  206. "msi-x" : "msi",
  207. DOMID_SELF);
  208. if (irq < 0)
  209. goto error;
  210. dev_dbg(&dev->dev,
  211. "xen: msi --> pirq=%d --> irq=%d\n", pirq, irq);
  212. }
  213. return 0;
  214. error:
  215. dev_err(&dev->dev,
  216. "Xen PCI frontend has not registered MSI/MSI-X support!\n");
  217. return -ENODEV;
  218. }
  219. #ifdef CONFIG_XEN_DOM0
  220. static int xen_initdom_setup_msi_irqs(struct pci_dev *dev, int nvec, int type)
  221. {
  222. int ret = 0;
  223. struct msi_desc *msidesc;
  224. list_for_each_entry(msidesc, &dev->msi_list, list) {
  225. struct physdev_map_pirq map_irq;
  226. domid_t domid;
  227. domid = ret = xen_find_device_domain_owner(dev);
  228. /* N.B. Casting int's -ENODEV to uint16_t results in 0xFFED,
  229. * hence check ret value for < 0. */
  230. if (ret < 0)
  231. domid = DOMID_SELF;
  232. memset(&map_irq, 0, sizeof(map_irq));
  233. map_irq.domid = domid;
  234. map_irq.type = MAP_PIRQ_TYPE_MSI;
  235. map_irq.index = -1;
  236. map_irq.pirq = -1;
  237. map_irq.bus = dev->bus->number;
  238. map_irq.devfn = dev->devfn;
  239. if (type == PCI_CAP_ID_MSIX) {
  240. int pos;
  241. u32 table_offset, bir;
  242. pos = pci_find_capability(dev, PCI_CAP_ID_MSIX);
  243. pci_read_config_dword(dev, pos + PCI_MSIX_TABLE,
  244. &table_offset);
  245. bir = (u8)(table_offset & PCI_MSIX_FLAGS_BIRMASK);
  246. map_irq.table_base = pci_resource_start(dev, bir);
  247. map_irq.entry_nr = msidesc->msi_attrib.entry_nr;
  248. }
  249. ret = HYPERVISOR_physdev_op(PHYSDEVOP_map_pirq, &map_irq);
  250. if (ret) {
  251. dev_warn(&dev->dev, "xen map irq failed %d for %d domain\n",
  252. ret, domid);
  253. goto out;
  254. }
  255. ret = xen_bind_pirq_msi_to_irq(dev, msidesc,
  256. map_irq.pirq, map_irq.index,
  257. (type == PCI_CAP_ID_MSIX) ?
  258. "msi-x" : "msi",
  259. domid);
  260. if (ret < 0)
  261. goto out;
  262. }
  263. ret = 0;
  264. out:
  265. return ret;
  266. }
  267. #endif
  268. static void xen_teardown_msi_irqs(struct pci_dev *dev)
  269. {
  270. struct msi_desc *msidesc;
  271. msidesc = list_entry(dev->msi_list.next, struct msi_desc, list);
  272. if (msidesc->msi_attrib.is_msix)
  273. xen_pci_frontend_disable_msix(dev);
  274. else
  275. xen_pci_frontend_disable_msi(dev);
  276. /* Free the IRQ's and the msidesc using the generic code. */
  277. default_teardown_msi_irqs(dev);
  278. }
  279. static void xen_teardown_msi_irq(unsigned int irq)
  280. {
  281. xen_destroy_irq(irq);
  282. }
  283. #endif
  284. int __init pci_xen_init(void)
  285. {
  286. if (!xen_pv_domain() || xen_initial_domain())
  287. return -ENODEV;
  288. printk(KERN_INFO "PCI: setting up Xen PCI frontend stub\n");
  289. pcibios_set_cache_line_size();
  290. pcibios_enable_irq = xen_pcifront_enable_irq;
  291. pcibios_disable_irq = NULL;
  292. #ifdef CONFIG_ACPI
  293. /* Keep ACPI out of the picture */
  294. acpi_noirq = 1;
  295. #endif
  296. #ifdef CONFIG_PCI_MSI
  297. x86_msi.setup_msi_irqs = xen_setup_msi_irqs;
  298. x86_msi.teardown_msi_irq = xen_teardown_msi_irq;
  299. x86_msi.teardown_msi_irqs = xen_teardown_msi_irqs;
  300. #endif
  301. return 0;
  302. }
  303. int __init pci_xen_hvm_init(void)
  304. {
  305. if (!xen_feature(XENFEAT_hvm_pirqs))
  306. return 0;
  307. #ifdef CONFIG_ACPI
  308. /*
  309. * We don't want to change the actual ACPI delivery model,
  310. * just how GSIs get registered.
  311. */
  312. __acpi_register_gsi = acpi_register_gsi_xen_hvm;
  313. #endif
  314. #ifdef CONFIG_PCI_MSI
  315. x86_msi.setup_msi_irqs = xen_hvm_setup_msi_irqs;
  316. x86_msi.teardown_msi_irq = xen_teardown_msi_irq;
  317. #endif
  318. return 0;
  319. }
  320. #ifdef CONFIG_XEN_DOM0
  321. #ifdef CONFIG_ACPI
  322. static __init void xen_setup_acpi_sci(void)
  323. {
  324. int rc;
  325. int trigger, polarity;
  326. int gsi = acpi_sci_override_gsi;
  327. int irq = -1;
  328. int gsi_override = -1;
  329. if (!gsi)
  330. return;
  331. rc = acpi_get_override_irq(gsi, &trigger, &polarity);
  332. if (rc) {
  333. printk(KERN_WARNING "xen: acpi_get_override_irq failed for acpi"
  334. " sci, rc=%d\n", rc);
  335. return;
  336. }
  337. trigger = trigger ? ACPI_LEVEL_SENSITIVE : ACPI_EDGE_SENSITIVE;
  338. polarity = polarity ? ACPI_ACTIVE_LOW : ACPI_ACTIVE_HIGH;
  339. printk(KERN_INFO "xen: sci override: global_irq=%d trigger=%d "
  340. "polarity=%d\n", gsi, trigger, polarity);
  341. /* Before we bind the GSI to a Linux IRQ, check whether
  342. * we need to override it with bus_irq (IRQ) value. Usually for
  343. * IRQs below IRQ_LEGACY_IRQ this holds IRQ == GSI, as so:
  344. * ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 low level)
  345. * but there are oddballs where the IRQ != GSI:
  346. * ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 20 low level)
  347. * which ends up being: gsi_to_irq[9] == 20
  348. * (which is what acpi_gsi_to_irq ends up calling when starting the
  349. * the ACPI interpreter and keels over since IRQ 9 has not been
  350. * setup as we had setup IRQ 20 for it).
  351. */
  352. /* Check whether the GSI != IRQ */
  353. if (acpi_gsi_to_irq(gsi, &irq) == 0) {
  354. if (irq >= 0 && irq != gsi)
  355. /* Bugger, we MUST have that IRQ. */
  356. gsi_override = irq;
  357. }
  358. gsi = xen_register_gsi(gsi, gsi_override, trigger, polarity);
  359. printk(KERN_INFO "xen: acpi sci %d\n", gsi);
  360. return;
  361. }
  362. #endif
  363. int __init pci_xen_initial_domain(void)
  364. {
  365. int pirq, irq;
  366. #ifdef CONFIG_PCI_MSI
  367. x86_msi.setup_msi_irqs = xen_initdom_setup_msi_irqs;
  368. x86_msi.teardown_msi_irq = xen_teardown_msi_irq;
  369. #endif
  370. #ifdef CONFIG_ACPI
  371. xen_setup_acpi_sci();
  372. __acpi_register_gsi = acpi_register_gsi_xen;
  373. /* Pre-allocate legacy irqs */
  374. for (irq = 0; irq < NR_IRQS_LEGACY; irq++) {
  375. int trigger, polarity;
  376. if (acpi_get_override_irq(irq, &trigger, &polarity) == -1)
  377. continue;
  378. xen_register_pirq(irq, -1 /* no GSI override */,
  379. trigger ? ACPI_LEVEL_SENSITIVE : ACPI_EDGE_SENSITIVE,
  380. true /* allocate IRQ */);
  381. }
  382. #endif
  383. if (0 == nr_ioapics) {
  384. for (irq = 0; irq < NR_IRQS_LEGACY; irq++) {
  385. pirq = xen_allocate_pirq_gsi(irq);
  386. if (WARN(pirq < 0,
  387. "Could not allocate PIRQ for legacy interrupt\n"))
  388. break;
  389. irq = xen_bind_pirq_gsi_to_irq(irq, pirq, 0, "xt-pic");
  390. }
  391. }
  392. return 0;
  393. }
  394. struct xen_device_domain_owner {
  395. domid_t domain;
  396. struct pci_dev *dev;
  397. struct list_head list;
  398. };
  399. static DEFINE_SPINLOCK(dev_domain_list_spinlock);
  400. static struct list_head dev_domain_list = LIST_HEAD_INIT(dev_domain_list);
  401. static struct xen_device_domain_owner *find_device(struct pci_dev *dev)
  402. {
  403. struct xen_device_domain_owner *owner;
  404. list_for_each_entry(owner, &dev_domain_list, list) {
  405. if (owner->dev == dev)
  406. return owner;
  407. }
  408. return NULL;
  409. }
  410. int xen_find_device_domain_owner(struct pci_dev *dev)
  411. {
  412. struct xen_device_domain_owner *owner;
  413. int domain = -ENODEV;
  414. spin_lock(&dev_domain_list_spinlock);
  415. owner = find_device(dev);
  416. if (owner)
  417. domain = owner->domain;
  418. spin_unlock(&dev_domain_list_spinlock);
  419. return domain;
  420. }
  421. EXPORT_SYMBOL_GPL(xen_find_device_domain_owner);
  422. int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain)
  423. {
  424. struct xen_device_domain_owner *owner;
  425. owner = kzalloc(sizeof(struct xen_device_domain_owner), GFP_KERNEL);
  426. if (!owner)
  427. return -ENODEV;
  428. spin_lock(&dev_domain_list_spinlock);
  429. if (find_device(dev)) {
  430. spin_unlock(&dev_domain_list_spinlock);
  431. kfree(owner);
  432. return -EEXIST;
  433. }
  434. owner->domain = domain;
  435. owner->dev = dev;
  436. list_add_tail(&owner->list, &dev_domain_list);
  437. spin_unlock(&dev_domain_list_spinlock);
  438. return 0;
  439. }
  440. EXPORT_SYMBOL_GPL(xen_register_device_domain_owner);
  441. int xen_unregister_device_domain_owner(struct pci_dev *dev)
  442. {
  443. struct xen_device_domain_owner *owner;
  444. spin_lock(&dev_domain_list_spinlock);
  445. owner = find_device(dev);
  446. if (!owner) {
  447. spin_unlock(&dev_domain_list_spinlock);
  448. return -ENODEV;
  449. }
  450. list_del(&owner->list);
  451. spin_unlock(&dev_domain_list_spinlock);
  452. kfree(owner);
  453. return 0;
  454. }
  455. EXPORT_SYMBOL_GPL(xen_unregister_device_domain_owner);
  456. #endif