Greg Kroah-Hartman | b244131 | 2017-11-01 15:07:57 +0100 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0 |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 2 | #include <linux/hardirq.h> |
| 3 | |
Thomas Gleixner | 66bcaf0 | 2009-08-20 09:59:09 +0200 | [diff] [blame] | 4 | #include <asm/x86_init.h> |
| 5 | |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 6 | #include <xen/interface/xen.h> |
| 7 | #include <xen/interface/sched.h> |
| 8 | #include <xen/interface/vcpu.h> |
Mukesh Rathor | 2771374 | 2013-12-11 15:36:51 -0500 | [diff] [blame] | 9 | #include <xen/features.h> |
Stefano Stabellini | 0ec53ec | 2012-09-14 13:37:32 +0000 | [diff] [blame] | 10 | #include <xen/events.h> |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 11 | |
| 12 | #include <asm/xen/hypercall.h> |
| 13 | #include <asm/xen/hypervisor.h> |
| 14 | |
| 15 | #include "xen-ops.h" |
| 16 | |
| 17 | /* |
| 18 | * Force a proper event-channel callback from Xen after clearing the |
| 19 | * callback mask. We do this in a very simple manner, by making a call |
| 20 | * down into Xen. The pending flag will be checked by Xen on return. |
| 21 | */ |
| 22 | void xen_force_evtchn_callback(void) |
| 23 | { |
| 24 | (void)HYPERVISOR_xen_version(0, NULL); |
| 25 | } |
| 26 | |
Andi Kleen | 2605fc2 | 2014-05-02 00:44:37 +0200 | [diff] [blame] | 27 | asmlinkage __visible unsigned long xen_save_fl(void) |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 28 | { |
| 29 | struct vcpu_info *vcpu; |
| 30 | unsigned long flags; |
| 31 | |
Alex Shi | 2113f46 | 2012-01-13 23:53:35 +0800 | [diff] [blame] | 32 | vcpu = this_cpu_read(xen_vcpu); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 33 | |
| 34 | /* flag has opposite sense of mask */ |
| 35 | flags = !vcpu->evtchn_upcall_mask; |
| 36 | |
| 37 | /* convert to IF type flag |
| 38 | -0 -> 0x00000000 |
| 39 | -1 -> 0xffffffff |
| 40 | */ |
| 41 | return (-flags) & X86_EFLAGS_IF; |
| 42 | } |
Jeremy Fitzhardinge | ecb93d1 | 2009-01-28 14:35:05 -0800 | [diff] [blame] | 43 | PV_CALLEE_SAVE_REGS_THUNK(xen_save_fl); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 44 | |
Andi Kleen | a2e7f0e | 2013-10-22 09:07:56 -0700 | [diff] [blame] | 45 | __visible void xen_restore_fl(unsigned long flags) |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 46 | { |
| 47 | struct vcpu_info *vcpu; |
| 48 | |
| 49 | /* convert from IF type flag */ |
| 50 | flags = !(flags & X86_EFLAGS_IF); |
| 51 | |
David Vrabel | fb58e30 | 2013-08-15 13:21:04 +0100 | [diff] [blame] | 52 | /* See xen_irq_enable() for why preemption must be disabled. */ |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 53 | preempt_disable(); |
Alex Shi | 2113f46 | 2012-01-13 23:53:35 +0800 | [diff] [blame] | 54 | vcpu = this_cpu_read(xen_vcpu); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 55 | vcpu->evtchn_upcall_mask = flags; |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 56 | |
| 57 | if (flags == 0) { |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 58 | barrier(); /* unmask then check (avoid races) */ |
| 59 | if (unlikely(vcpu->evtchn_upcall_pending)) |
| 60 | xen_force_evtchn_callback(); |
David Vrabel | fb58e30 | 2013-08-15 13:21:04 +0100 | [diff] [blame] | 61 | preempt_enable(); |
| 62 | } else |
| 63 | preempt_enable_no_resched(); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 64 | } |
Jeremy Fitzhardinge | ecb93d1 | 2009-01-28 14:35:05 -0800 | [diff] [blame] | 65 | PV_CALLEE_SAVE_REGS_THUNK(xen_restore_fl); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 66 | |
Andi Kleen | 2605fc2 | 2014-05-02 00:44:37 +0200 | [diff] [blame] | 67 | asmlinkage __visible void xen_irq_disable(void) |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 68 | { |
| 69 | /* There's a one instruction preempt window here. We need to |
| 70 | make sure we're don't switch CPUs between getting the vcpu |
| 71 | pointer and updating the mask. */ |
| 72 | preempt_disable(); |
Alex Shi | 2113f46 | 2012-01-13 23:53:35 +0800 | [diff] [blame] | 73 | this_cpu_read(xen_vcpu)->evtchn_upcall_mask = 1; |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 74 | preempt_enable_no_resched(); |
| 75 | } |
Jeremy Fitzhardinge | ecb93d1 | 2009-01-28 14:35:05 -0800 | [diff] [blame] | 76 | PV_CALLEE_SAVE_REGS_THUNK(xen_irq_disable); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 77 | |
Andi Kleen | 2605fc2 | 2014-05-02 00:44:37 +0200 | [diff] [blame] | 78 | asmlinkage __visible void xen_irq_enable(void) |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 79 | { |
| 80 | struct vcpu_info *vcpu; |
| 81 | |
David Vrabel | fb58e30 | 2013-08-15 13:21:04 +0100 | [diff] [blame] | 82 | /* |
| 83 | * We may be preempted as soon as vcpu->evtchn_upcall_mask is |
| 84 | * cleared, so disable preemption to ensure we check for |
| 85 | * events on the VCPU we are still running on. |
| 86 | */ |
| 87 | preempt_disable(); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 88 | |
Alex Shi | 2113f46 | 2012-01-13 23:53:35 +0800 | [diff] [blame] | 89 | vcpu = this_cpu_read(xen_vcpu); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 90 | vcpu->evtchn_upcall_mask = 0; |
| 91 | |
| 92 | /* Doesn't matter if we get preempted here, because any |
| 93 | pending event will get dealt with anyway. */ |
| 94 | |
| 95 | barrier(); /* unmask then check (avoid races) */ |
| 96 | if (unlikely(vcpu->evtchn_upcall_pending)) |
| 97 | xen_force_evtchn_callback(); |
David Vrabel | fb58e30 | 2013-08-15 13:21:04 +0100 | [diff] [blame] | 98 | |
| 99 | preempt_enable(); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 100 | } |
Jeremy Fitzhardinge | ecb93d1 | 2009-01-28 14:35:05 -0800 | [diff] [blame] | 101 | PV_CALLEE_SAVE_REGS_THUNK(xen_irq_enable); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 102 | |
| 103 | static void xen_safe_halt(void) |
| 104 | { |
| 105 | /* Blocking includes an implicit local_irq_enable(). */ |
| 106 | if (HYPERVISOR_sched_op(SCHEDOP_block, NULL) != 0) |
| 107 | BUG(); |
| 108 | } |
| 109 | |
| 110 | static void xen_halt(void) |
| 111 | { |
| 112 | if (irqs_disabled()) |
Vitaly Kuznetsov | ad5475f | 2016-06-30 17:56:38 +0200 | [diff] [blame] | 113 | HYPERVISOR_vcpu_op(VCPUOP_down, |
| 114 | xen_vcpu_nr(smp_processor_id()), NULL); |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 115 | else |
| 116 | xen_safe_halt(); |
| 117 | } |
| 118 | |
Daniel Kiper | 251511a | 2011-05-04 20:16:07 +0200 | [diff] [blame] | 119 | static const struct pv_irq_ops xen_irq_ops __initconst = { |
Jeremy Fitzhardinge | ecb93d1 | 2009-01-28 14:35:05 -0800 | [diff] [blame] | 120 | .save_fl = PV_CALLEE_SAVE(xen_save_fl), |
| 121 | .restore_fl = PV_CALLEE_SAVE(xen_restore_fl), |
| 122 | .irq_disable = PV_CALLEE_SAVE(xen_irq_disable), |
| 123 | .irq_enable = PV_CALLEE_SAVE(xen_irq_enable), |
| 124 | |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 125 | .safe_halt = xen_safe_halt, |
| 126 | .halt = xen_halt, |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 127 | }; |
| 128 | |
Randy Dunlap | 7d81c3b | 2011-01-08 20:00:36 -0800 | [diff] [blame] | 129 | void __init xen_init_irq_ops(void) |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 130 | { |
Mukesh Rathor | 2771374 | 2013-12-11 15:36:51 -0500 | [diff] [blame] | 131 | /* For PVH we use default pv_irq_ops settings. */ |
| 132 | if (!xen_feature(XENFEAT_hvm_callback_vector)) |
| 133 | pv_irq_ops = xen_irq_ops; |
Thomas Gleixner | 66bcaf0 | 2009-08-20 09:59:09 +0200 | [diff] [blame] | 134 | x86_init.irqs.intr_init = xen_init_IRQ; |
Jeremy Fitzhardinge | 0d1edf4 | 2008-07-28 11:53:57 -0700 | [diff] [blame] | 135 | } |