xref: /openbmc/linux/drivers/xen/evtchn.c (revision fbc872c38c8fed31948c85683b5326ee5ab9fccc)
1f7116284SIan Campbell /******************************************************************************
2f7116284SIan Campbell  * evtchn.c
3f7116284SIan Campbell  *
4f7116284SIan Campbell  * Driver for receiving and demuxing event-channel signals.
5f7116284SIan Campbell  *
6f7116284SIan Campbell  * Copyright (c) 2004-2005, K A Fraser
7f7116284SIan Campbell  * Multi-process extensions Copyright (c) 2004, Steven Smith
8f7116284SIan Campbell  *
9f7116284SIan Campbell  * This program is free software; you can redistribute it and/or
10f7116284SIan Campbell  * modify it under the terms of the GNU General Public License version 2
11f7116284SIan Campbell  * as published by the Free Software Foundation; or, when distributed
12f7116284SIan Campbell  * separately from the Linux kernel or incorporated into other
13f7116284SIan Campbell  * software packages, subject to the following license:
14f7116284SIan Campbell  *
15f7116284SIan Campbell  * Permission is hereby granted, free of charge, to any person obtaining a copy
16f7116284SIan Campbell  * of this source file (the "Software"), to deal in the Software without
17f7116284SIan Campbell  * restriction, including without limitation the rights to use, copy, modify,
18f7116284SIan Campbell  * merge, publish, distribute, sublicense, and/or sell copies of the Software,
19f7116284SIan Campbell  * and to permit persons to whom the Software is furnished to do so, subject to
20f7116284SIan Campbell  * the following conditions:
21f7116284SIan Campbell  *
22f7116284SIan Campbell  * The above copyright notice and this permission notice shall be included in
23f7116284SIan Campbell  * all copies or substantial portions of the Software.
24f7116284SIan Campbell  *
25f7116284SIan Campbell  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
26f7116284SIan Campbell  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
27f7116284SIan Campbell  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
28f7116284SIan Campbell  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
29f7116284SIan Campbell  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
30f7116284SIan Campbell  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
31f7116284SIan Campbell  * IN THE SOFTWARE.
32f7116284SIan Campbell  */
33f7116284SIan Campbell 
34283c0972SJoe Perches #define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt
35283c0972SJoe Perches 
36f7116284SIan Campbell #include <linux/module.h>
37f7116284SIan Campbell #include <linux/kernel.h>
38f7116284SIan Campbell #include <linux/sched.h>
39f7116284SIan Campbell #include <linux/slab.h>
40f7116284SIan Campbell #include <linux/string.h>
41f7116284SIan Campbell #include <linux/errno.h>
42f7116284SIan Campbell #include <linux/fs.h>
43f7116284SIan Campbell #include <linux/miscdevice.h>
44f7116284SIan Campbell #include <linux/major.h>
45f7116284SIan Campbell #include <linux/proc_fs.h>
46f7116284SIan Campbell #include <linux/stat.h>
47f7116284SIan Campbell #include <linux/poll.h>
48f7116284SIan Campbell #include <linux/irq.h>
49f7116284SIan Campbell #include <linux/init.h>
50f7116284SIan Campbell #include <linux/mutex.h>
51f7116284SIan Campbell #include <linux/cpu.h>
5286200154SDavid Vrabel #include <linux/mm.h>
5386200154SDavid Vrabel #include <linux/vmalloc.h>
541ccbf534SJeremy Fitzhardinge 
551ccbf534SJeremy Fitzhardinge #include <xen/xen.h>
56f7116284SIan Campbell #include <xen/events.h>
57f7116284SIan Campbell #include <xen/evtchn.h>
58f7116284SIan Campbell #include <asm/xen/hypervisor.h>
59f7116284SIan Campbell 
60f7116284SIan Campbell struct per_user_data {
610a4666b5SJeremy Fitzhardinge 	struct mutex bind_mutex; /* serialize bind/unbind operations */
6273cc4bb0SDavid Vrabel 	struct rb_root evtchns;
6386200154SDavid Vrabel 	unsigned int nr_evtchns;
640a4666b5SJeremy Fitzhardinge 
65f7116284SIan Campbell 	/* Notification ring, accessed via /dev/xen/evtchn. */
6686200154SDavid Vrabel 	unsigned int ring_size;
67f7116284SIan Campbell 	evtchn_port_t *ring;
68f7116284SIan Campbell 	unsigned int ring_cons, ring_prod, ring_overflow;
69f7116284SIan Campbell 	struct mutex ring_cons_mutex; /* protect against concurrent readers */
7073cc4bb0SDavid Vrabel 	spinlock_t ring_prod_lock; /* product against concurrent interrupts */
71f7116284SIan Campbell 
72f7116284SIan Campbell 	/* Processes wait on this queue when ring is empty. */
73f7116284SIan Campbell 	wait_queue_head_t evtchn_wait;
74f7116284SIan Campbell 	struct fasync_struct *evtchn_async_queue;
75f7116284SIan Campbell 	const char *name;
76*fbc872c3SDavid Vrabel 
77*fbc872c3SDavid Vrabel 	domid_t restrict_domid;
78f7116284SIan Campbell };
79f7116284SIan Campbell 
80*fbc872c3SDavid Vrabel #define UNRESTRICTED_DOMID ((domid_t)-1)
81*fbc872c3SDavid Vrabel 
8273cc4bb0SDavid Vrabel struct user_evtchn {
8373cc4bb0SDavid Vrabel 	struct rb_node node;
8473cc4bb0SDavid Vrabel 	struct per_user_data *user;
8573cc4bb0SDavid Vrabel 	unsigned port;
8673cc4bb0SDavid Vrabel 	bool enabled;
8773cc4bb0SDavid Vrabel };
88f7116284SIan Campbell 
8986200154SDavid Vrabel static evtchn_port_t *evtchn_alloc_ring(unsigned int size)
9086200154SDavid Vrabel {
9186200154SDavid Vrabel 	evtchn_port_t *ring;
9286200154SDavid Vrabel 	size_t s = size * sizeof(*ring);
9386200154SDavid Vrabel 
9486200154SDavid Vrabel 	ring = kmalloc(s, GFP_KERNEL);
9586200154SDavid Vrabel 	if (!ring)
9686200154SDavid Vrabel 		ring = vmalloc(s);
9786200154SDavid Vrabel 
9886200154SDavid Vrabel 	return ring;
9986200154SDavid Vrabel }
10086200154SDavid Vrabel 
10186200154SDavid Vrabel static void evtchn_free_ring(evtchn_port_t *ring)
10286200154SDavid Vrabel {
10386200154SDavid Vrabel 	kvfree(ring);
10486200154SDavid Vrabel }
10586200154SDavid Vrabel 
10686200154SDavid Vrabel static unsigned int evtchn_ring_offset(struct per_user_data *u,
10786200154SDavid Vrabel 				       unsigned int idx)
10886200154SDavid Vrabel {
10986200154SDavid Vrabel 	return idx & (u->ring_size - 1);
11086200154SDavid Vrabel }
11186200154SDavid Vrabel 
11286200154SDavid Vrabel static evtchn_port_t *evtchn_ring_entry(struct per_user_data *u,
11386200154SDavid Vrabel 					unsigned int idx)
11486200154SDavid Vrabel {
11586200154SDavid Vrabel 	return u->ring + evtchn_ring_offset(u, idx);
11686200154SDavid Vrabel }
11786200154SDavid Vrabel 
11873cc4bb0SDavid Vrabel static int add_evtchn(struct per_user_data *u, struct user_evtchn *evtchn)
119e3cc067bSJeremy Fitzhardinge {
12073cc4bb0SDavid Vrabel 	struct rb_node **new = &(u->evtchns.rb_node), *parent = NULL;
121e3cc067bSJeremy Fitzhardinge 
12286200154SDavid Vrabel 	u->nr_evtchns++;
12386200154SDavid Vrabel 
12473cc4bb0SDavid Vrabel 	while (*new) {
12573cc4bb0SDavid Vrabel 		struct user_evtchn *this;
126e3cc067bSJeremy Fitzhardinge 
12773cc4bb0SDavid Vrabel 		this = container_of(*new, struct user_evtchn, node);
128e3cc067bSJeremy Fitzhardinge 
12973cc4bb0SDavid Vrabel 		parent = *new;
13073cc4bb0SDavid Vrabel 		if (this->port < evtchn->port)
13173cc4bb0SDavid Vrabel 			new = &((*new)->rb_left);
13273cc4bb0SDavid Vrabel 		else if (this->port > evtchn->port)
13373cc4bb0SDavid Vrabel 			new = &((*new)->rb_right);
134e3cc067bSJeremy Fitzhardinge 		else
13573cc4bb0SDavid Vrabel 			return -EEXIST;
13673cc4bb0SDavid Vrabel 	}
13773cc4bb0SDavid Vrabel 
13873cc4bb0SDavid Vrabel 	/* Add new node and rebalance tree. */
13973cc4bb0SDavid Vrabel 	rb_link_node(&evtchn->node, parent, new);
14073cc4bb0SDavid Vrabel 	rb_insert_color(&evtchn->node, &u->evtchns);
14173cc4bb0SDavid Vrabel 
14273cc4bb0SDavid Vrabel 	return 0;
14373cc4bb0SDavid Vrabel }
14473cc4bb0SDavid Vrabel 
14573cc4bb0SDavid Vrabel static void del_evtchn(struct per_user_data *u, struct user_evtchn *evtchn)
14673cc4bb0SDavid Vrabel {
14786200154SDavid Vrabel 	u->nr_evtchns--;
14873cc4bb0SDavid Vrabel 	rb_erase(&evtchn->node, &u->evtchns);
14973cc4bb0SDavid Vrabel 	kfree(evtchn);
15073cc4bb0SDavid Vrabel }
15173cc4bb0SDavid Vrabel 
15273cc4bb0SDavid Vrabel static struct user_evtchn *find_evtchn(struct per_user_data *u, unsigned port)
15373cc4bb0SDavid Vrabel {
15473cc4bb0SDavid Vrabel 	struct rb_node *node = u->evtchns.rb_node;
15573cc4bb0SDavid Vrabel 
15673cc4bb0SDavid Vrabel 	while (node) {
15773cc4bb0SDavid Vrabel 		struct user_evtchn *evtchn;
15873cc4bb0SDavid Vrabel 
15973cc4bb0SDavid Vrabel 		evtchn = container_of(node, struct user_evtchn, node);
16073cc4bb0SDavid Vrabel 
16173cc4bb0SDavid Vrabel 		if (evtchn->port < port)
16273cc4bb0SDavid Vrabel 			node = node->rb_left;
16373cc4bb0SDavid Vrabel 		else if (evtchn->port > port)
16473cc4bb0SDavid Vrabel 			node = node->rb_right;
16573cc4bb0SDavid Vrabel 		else
16673cc4bb0SDavid Vrabel 			return evtchn;
16773cc4bb0SDavid Vrabel 	}
16873cc4bb0SDavid Vrabel 	return NULL;
169e3cc067bSJeremy Fitzhardinge }
170e3cc067bSJeremy Fitzhardinge 
17170697d54SJeremy Fitzhardinge static irqreturn_t evtchn_interrupt(int irq, void *data)
172f7116284SIan Campbell {
17373cc4bb0SDavid Vrabel 	struct user_evtchn *evtchn = data;
17473cc4bb0SDavid Vrabel 	struct per_user_data *u = evtchn->user;
175f7116284SIan Campbell 
17673cc4bb0SDavid Vrabel 	WARN(!evtchn->enabled,
177e3cc067bSJeremy Fitzhardinge 	     "Interrupt for port %d, but apparently not enabled; per-user %p\n",
17873cc4bb0SDavid Vrabel 	     evtchn->port, u);
179f7116284SIan Campbell 
180f7116284SIan Campbell 	disable_irq_nosync(irq);
18173cc4bb0SDavid Vrabel 	evtchn->enabled = false;
18273cc4bb0SDavid Vrabel 
18373cc4bb0SDavid Vrabel 	spin_lock(&u->ring_prod_lock);
184f7116284SIan Campbell 
18586200154SDavid Vrabel 	if ((u->ring_prod - u->ring_cons) < u->ring_size) {
18686200154SDavid Vrabel 		*evtchn_ring_entry(u, u->ring_prod) = evtchn->port;
187f7116284SIan Campbell 		wmb(); /* Ensure ring contents visible */
188f7116284SIan Campbell 		if (u->ring_cons == u->ring_prod++) {
189f7116284SIan Campbell 			wake_up_interruptible(&u->evtchn_wait);
190f7116284SIan Campbell 			kill_fasync(&u->evtchn_async_queue,
191f7116284SIan Campbell 				    SIGIO, POLL_IN);
192f7116284SIan Campbell 		}
193e3cc067bSJeremy Fitzhardinge 	} else
194f7116284SIan Campbell 		u->ring_overflow = 1;
195f7116284SIan Campbell 
19673cc4bb0SDavid Vrabel 	spin_unlock(&u->ring_prod_lock);
197f7116284SIan Campbell 
198f7116284SIan Campbell 	return IRQ_HANDLED;
199f7116284SIan Campbell }
200f7116284SIan Campbell 
201f7116284SIan Campbell static ssize_t evtchn_read(struct file *file, char __user *buf,
202f7116284SIan Campbell 			   size_t count, loff_t *ppos)
203f7116284SIan Campbell {
204f7116284SIan Campbell 	int rc;
205f7116284SIan Campbell 	unsigned int c, p, bytes1 = 0, bytes2 = 0;
206f7116284SIan Campbell 	struct per_user_data *u = file->private_data;
207f7116284SIan Campbell 
208f7116284SIan Campbell 	/* Whole number of ports. */
209f7116284SIan Campbell 	count &= ~(sizeof(evtchn_port_t)-1);
210f7116284SIan Campbell 
211f7116284SIan Campbell 	if (count == 0)
212f7116284SIan Campbell 		return 0;
213f7116284SIan Campbell 
214f7116284SIan Campbell 	if (count > PAGE_SIZE)
215f7116284SIan Campbell 		count = PAGE_SIZE;
216f7116284SIan Campbell 
217f7116284SIan Campbell 	for (;;) {
218f7116284SIan Campbell 		mutex_lock(&u->ring_cons_mutex);
219f7116284SIan Campbell 
220f7116284SIan Campbell 		rc = -EFBIG;
221f7116284SIan Campbell 		if (u->ring_overflow)
222f7116284SIan Campbell 			goto unlock_out;
223f7116284SIan Campbell 
224f7116284SIan Campbell 		c = u->ring_cons;
225f7116284SIan Campbell 		p = u->ring_prod;
226f7116284SIan Campbell 		if (c != p)
227f7116284SIan Campbell 			break;
228f7116284SIan Campbell 
229f7116284SIan Campbell 		mutex_unlock(&u->ring_cons_mutex);
230f7116284SIan Campbell 
231f7116284SIan Campbell 		if (file->f_flags & O_NONBLOCK)
232f7116284SIan Campbell 			return -EAGAIN;
233f7116284SIan Campbell 
234f7116284SIan Campbell 		rc = wait_event_interruptible(u->evtchn_wait,
235f7116284SIan Campbell 					      u->ring_cons != u->ring_prod);
236f7116284SIan Campbell 		if (rc)
237f7116284SIan Campbell 			return rc;
238f7116284SIan Campbell 	}
239f7116284SIan Campbell 
240f7116284SIan Campbell 	/* Byte lengths of two chunks. Chunk split (if any) is at ring wrap. */
24186200154SDavid Vrabel 	if (((c ^ p) & u->ring_size) != 0) {
24286200154SDavid Vrabel 		bytes1 = (u->ring_size - evtchn_ring_offset(u, c)) *
243f7116284SIan Campbell 			sizeof(evtchn_port_t);
24486200154SDavid Vrabel 		bytes2 = evtchn_ring_offset(u, p) * sizeof(evtchn_port_t);
245f7116284SIan Campbell 	} else {
246f7116284SIan Campbell 		bytes1 = (p - c) * sizeof(evtchn_port_t);
247f7116284SIan Campbell 		bytes2 = 0;
248f7116284SIan Campbell 	}
249f7116284SIan Campbell 
250f7116284SIan Campbell 	/* Truncate chunks according to caller's maximum byte count. */
251f7116284SIan Campbell 	if (bytes1 > count) {
252f7116284SIan Campbell 		bytes1 = count;
253f7116284SIan Campbell 		bytes2 = 0;
254f7116284SIan Campbell 	} else if ((bytes1 + bytes2) > count) {
255f7116284SIan Campbell 		bytes2 = count - bytes1;
256f7116284SIan Campbell 	}
257f7116284SIan Campbell 
258f7116284SIan Campbell 	rc = -EFAULT;
259f7116284SIan Campbell 	rmb(); /* Ensure that we see the port before we copy it. */
26086200154SDavid Vrabel 	if (copy_to_user(buf, evtchn_ring_entry(u, c), bytes1) ||
261f7116284SIan Campbell 	    ((bytes2 != 0) &&
262f7116284SIan Campbell 	     copy_to_user(&buf[bytes1], &u->ring[0], bytes2)))
263f7116284SIan Campbell 		goto unlock_out;
264f7116284SIan Campbell 
265f7116284SIan Campbell 	u->ring_cons += (bytes1 + bytes2) / sizeof(evtchn_port_t);
266f7116284SIan Campbell 	rc = bytes1 + bytes2;
267f7116284SIan Campbell 
268f7116284SIan Campbell  unlock_out:
269f7116284SIan Campbell 	mutex_unlock(&u->ring_cons_mutex);
270f7116284SIan Campbell 	return rc;
271f7116284SIan Campbell }
272f7116284SIan Campbell 
273f7116284SIan Campbell static ssize_t evtchn_write(struct file *file, const char __user *buf,
274f7116284SIan Campbell 			    size_t count, loff_t *ppos)
275f7116284SIan Campbell {
276f7116284SIan Campbell 	int rc, i;
277f7116284SIan Campbell 	evtchn_port_t *kbuf = (evtchn_port_t *)__get_free_page(GFP_KERNEL);
278f7116284SIan Campbell 	struct per_user_data *u = file->private_data;
279f7116284SIan Campbell 
280f7116284SIan Campbell 	if (kbuf == NULL)
281f7116284SIan Campbell 		return -ENOMEM;
282f7116284SIan Campbell 
283f7116284SIan Campbell 	/* Whole number of ports. */
284f7116284SIan Campbell 	count &= ~(sizeof(evtchn_port_t)-1);
285f7116284SIan Campbell 
286f7116284SIan Campbell 	rc = 0;
287f7116284SIan Campbell 	if (count == 0)
288f7116284SIan Campbell 		goto out;
289f7116284SIan Campbell 
290f7116284SIan Campbell 	if (count > PAGE_SIZE)
291f7116284SIan Campbell 		count = PAGE_SIZE;
292f7116284SIan Campbell 
293f7116284SIan Campbell 	rc = -EFAULT;
294f7116284SIan Campbell 	if (copy_from_user(kbuf, buf, count) != 0)
295f7116284SIan Campbell 		goto out;
296f7116284SIan Campbell 
29773cc4bb0SDavid Vrabel 	mutex_lock(&u->bind_mutex);
298e3cc067bSJeremy Fitzhardinge 
299e3cc067bSJeremy Fitzhardinge 	for (i = 0; i < (count/sizeof(evtchn_port_t)); i++) {
300e3cc067bSJeremy Fitzhardinge 		unsigned port = kbuf[i];
30173cc4bb0SDavid Vrabel 		struct user_evtchn *evtchn;
302e3cc067bSJeremy Fitzhardinge 
30373cc4bb0SDavid Vrabel 		evtchn = find_evtchn(u, port);
30473cc4bb0SDavid Vrabel 		if (evtchn && !evtchn->enabled) {
30573cc4bb0SDavid Vrabel 			evtchn->enabled = true;
306e3cc067bSJeremy Fitzhardinge 			enable_irq(irq_from_evtchn(port));
307e3cc067bSJeremy Fitzhardinge 		}
308e3cc067bSJeremy Fitzhardinge 	}
309e3cc067bSJeremy Fitzhardinge 
31073cc4bb0SDavid Vrabel 	mutex_unlock(&u->bind_mutex);
311f7116284SIan Campbell 
312f7116284SIan Campbell 	rc = count;
313f7116284SIan Campbell 
314f7116284SIan Campbell  out:
315f7116284SIan Campbell 	free_page((unsigned long)kbuf);
316f7116284SIan Campbell 	return rc;
317f7116284SIan Campbell }
318f7116284SIan Campbell 
31986200154SDavid Vrabel static int evtchn_resize_ring(struct per_user_data *u)
32086200154SDavid Vrabel {
32186200154SDavid Vrabel 	unsigned int new_size;
32286200154SDavid Vrabel 	evtchn_port_t *new_ring, *old_ring;
32386200154SDavid Vrabel 
32486200154SDavid Vrabel 	/*
32586200154SDavid Vrabel 	 * Ensure the ring is large enough to capture all possible
32686200154SDavid Vrabel 	 * events. i.e., one free slot for each bound event.
32786200154SDavid Vrabel 	 */
32886200154SDavid Vrabel 	if (u->nr_evtchns <= u->ring_size)
32986200154SDavid Vrabel 		return 0;
33086200154SDavid Vrabel 
33186200154SDavid Vrabel 	if (u->ring_size == 0)
33286200154SDavid Vrabel 		new_size = 64;
33386200154SDavid Vrabel 	else
33486200154SDavid Vrabel 		new_size = 2 * u->ring_size;
33586200154SDavid Vrabel 
33686200154SDavid Vrabel 	new_ring = evtchn_alloc_ring(new_size);
33786200154SDavid Vrabel 	if (!new_ring)
33886200154SDavid Vrabel 		return -ENOMEM;
33986200154SDavid Vrabel 
34086200154SDavid Vrabel 	old_ring = u->ring;
34186200154SDavid Vrabel 
34286200154SDavid Vrabel 	/*
34386200154SDavid Vrabel 	 * Access to the ring contents is serialized by either the
34486200154SDavid Vrabel 	 * prod /or/ cons lock so take both when resizing.
34586200154SDavid Vrabel 	 */
34686200154SDavid Vrabel 	mutex_lock(&u->ring_cons_mutex);
34786200154SDavid Vrabel 	spin_lock_irq(&u->ring_prod_lock);
34886200154SDavid Vrabel 
34986200154SDavid Vrabel 	/*
35086200154SDavid Vrabel 	 * Copy the old ring contents to the new ring.
35186200154SDavid Vrabel 	 *
35227e0e638SJan Beulich 	 * To take care of wrapping, a full ring, and the new index
35327e0e638SJan Beulich 	 * pointing into the second half, simply copy the old contents
35427e0e638SJan Beulich 	 * twice.
35586200154SDavid Vrabel 	 *
35686200154SDavid Vrabel 	 * +---------+    +------------------+
35727e0e638SJan Beulich 	 * |34567  12| -> |34567  1234567  12|
35827e0e638SJan Beulich 	 * +-----p-c-+    +-------c------p---+
35986200154SDavid Vrabel 	 */
36027e0e638SJan Beulich 	memcpy(new_ring, old_ring, u->ring_size * sizeof(*u->ring));
36127e0e638SJan Beulich 	memcpy(new_ring + u->ring_size, old_ring,
36227e0e638SJan Beulich 	       u->ring_size * sizeof(*u->ring));
36386200154SDavid Vrabel 
36486200154SDavid Vrabel 	u->ring = new_ring;
36586200154SDavid Vrabel 	u->ring_size = new_size;
36686200154SDavid Vrabel 
36786200154SDavid Vrabel 	spin_unlock_irq(&u->ring_prod_lock);
36886200154SDavid Vrabel 	mutex_unlock(&u->ring_cons_mutex);
36986200154SDavid Vrabel 
37086200154SDavid Vrabel 	evtchn_free_ring(old_ring);
37186200154SDavid Vrabel 
37286200154SDavid Vrabel 	return 0;
37386200154SDavid Vrabel }
37486200154SDavid Vrabel 
375f7116284SIan Campbell static int evtchn_bind_to_user(struct per_user_data *u, int port)
376f7116284SIan Campbell {
37773cc4bb0SDavid Vrabel 	struct user_evtchn *evtchn;
37873cc4bb0SDavid Vrabel 	struct evtchn_close close;
379f7116284SIan Campbell 	int rc = 0;
380f7116284SIan Campbell 
3810a4666b5SJeremy Fitzhardinge 	/*
3820a4666b5SJeremy Fitzhardinge 	 * Ports are never reused, so every caller should pass in a
3830a4666b5SJeremy Fitzhardinge 	 * unique port.
3840a4666b5SJeremy Fitzhardinge 	 *
3850a4666b5SJeremy Fitzhardinge 	 * (Locking not necessary because we haven't registered the
3860a4666b5SJeremy Fitzhardinge 	 * interrupt handler yet, and our caller has already
3870a4666b5SJeremy Fitzhardinge 	 * serialized bind operations.)
3880a4666b5SJeremy Fitzhardinge 	 */
38973cc4bb0SDavid Vrabel 
39073cc4bb0SDavid Vrabel 	evtchn = kzalloc(sizeof(*evtchn), GFP_KERNEL);
39173cc4bb0SDavid Vrabel 	if (!evtchn)
39273cc4bb0SDavid Vrabel 		return -ENOMEM;
39373cc4bb0SDavid Vrabel 
39473cc4bb0SDavid Vrabel 	evtchn->user = u;
39573cc4bb0SDavid Vrabel 	evtchn->port = port;
39673cc4bb0SDavid Vrabel 	evtchn->enabled = true; /* start enabled */
39773cc4bb0SDavid Vrabel 
39873cc4bb0SDavid Vrabel 	rc = add_evtchn(u, evtchn);
39973cc4bb0SDavid Vrabel 	if (rc < 0)
40073cc4bb0SDavid Vrabel 		goto err;
401f7116284SIan Campbell 
40286200154SDavid Vrabel 	rc = evtchn_resize_ring(u);
40386200154SDavid Vrabel 	if (rc < 0)
40486200154SDavid Vrabel 		goto err;
40586200154SDavid Vrabel 
406af09d1a7SMichael Opdenacker 	rc = bind_evtchn_to_irqhandler(port, evtchn_interrupt, 0,
40773cc4bb0SDavid Vrabel 				       u->name, evtchn);
40873cc4bb0SDavid Vrabel 	if (rc < 0)
40973cc4bb0SDavid Vrabel 		goto err;
41073cc4bb0SDavid Vrabel 
411420eb554SDaniel De Graaf 	rc = evtchn_make_refcounted(port);
41273cc4bb0SDavid Vrabel 	return rc;
41373cc4bb0SDavid Vrabel 
41473cc4bb0SDavid Vrabel err:
415e7e44e44SWei Liu 	/* bind failed, should close the port now */
416e7e44e44SWei Liu 	close.port = port;
417e7e44e44SWei Liu 	if (HYPERVISOR_event_channel_op(EVTCHNOP_close, &close) != 0)
418e7e44e44SWei Liu 		BUG();
41973cc4bb0SDavid Vrabel 	del_evtchn(u, evtchn);
420f7116284SIan Campbell 	return rc;
421f7116284SIan Campbell }
422f7116284SIan Campbell 
42373cc4bb0SDavid Vrabel static void evtchn_unbind_from_user(struct per_user_data *u,
42473cc4bb0SDavid Vrabel 				    struct user_evtchn *evtchn)
425f7116284SIan Campbell {
42673cc4bb0SDavid Vrabel 	int irq = irq_from_evtchn(evtchn->port);
427f7116284SIan Campbell 
428e7e44e44SWei Liu 	BUG_ON(irq < 0);
429e7e44e44SWei Liu 
43073cc4bb0SDavid Vrabel 	unbind_from_irqhandler(irq, evtchn);
4310a4666b5SJeremy Fitzhardinge 
43273cc4bb0SDavid Vrabel 	del_evtchn(u, evtchn);
433f7116284SIan Campbell }
434f7116284SIan Campbell 
435f7116284SIan Campbell static long evtchn_ioctl(struct file *file,
436f7116284SIan Campbell 			 unsigned int cmd, unsigned long arg)
437f7116284SIan Campbell {
438f7116284SIan Campbell 	int rc;
439f7116284SIan Campbell 	struct per_user_data *u = file->private_data;
440f7116284SIan Campbell 	void __user *uarg = (void __user *) arg;
441f7116284SIan Campbell 
4420a4666b5SJeremy Fitzhardinge 	/* Prevent bind from racing with unbind */
4430a4666b5SJeremy Fitzhardinge 	mutex_lock(&u->bind_mutex);
4440a4666b5SJeremy Fitzhardinge 
445f7116284SIan Campbell 	switch (cmd) {
446f7116284SIan Campbell 	case IOCTL_EVTCHN_BIND_VIRQ: {
447f7116284SIan Campbell 		struct ioctl_evtchn_bind_virq bind;
448f7116284SIan Campbell 		struct evtchn_bind_virq bind_virq;
449f7116284SIan Campbell 
450*fbc872c3SDavid Vrabel 		rc = -EACCES;
451*fbc872c3SDavid Vrabel 		if (u->restrict_domid != UNRESTRICTED_DOMID)
452*fbc872c3SDavid Vrabel 			break;
453*fbc872c3SDavid Vrabel 
454f7116284SIan Campbell 		rc = -EFAULT;
455f7116284SIan Campbell 		if (copy_from_user(&bind, uarg, sizeof(bind)))
456f7116284SIan Campbell 			break;
457f7116284SIan Campbell 
458f7116284SIan Campbell 		bind_virq.virq = bind.virq;
459f7116284SIan Campbell 		bind_virq.vcpu = 0;
460f7116284SIan Campbell 		rc = HYPERVISOR_event_channel_op(EVTCHNOP_bind_virq,
461f7116284SIan Campbell 						 &bind_virq);
462f7116284SIan Campbell 		if (rc != 0)
463f7116284SIan Campbell 			break;
464f7116284SIan Campbell 
465f7116284SIan Campbell 		rc = evtchn_bind_to_user(u, bind_virq.port);
466f7116284SIan Campbell 		if (rc == 0)
467f7116284SIan Campbell 			rc = bind_virq.port;
468f7116284SIan Campbell 		break;
469f7116284SIan Campbell 	}
470f7116284SIan Campbell 
471f7116284SIan Campbell 	case IOCTL_EVTCHN_BIND_INTERDOMAIN: {
472f7116284SIan Campbell 		struct ioctl_evtchn_bind_interdomain bind;
473f7116284SIan Campbell 		struct evtchn_bind_interdomain bind_interdomain;
474f7116284SIan Campbell 
475f7116284SIan Campbell 		rc = -EFAULT;
476f7116284SIan Campbell 		if (copy_from_user(&bind, uarg, sizeof(bind)))
477f7116284SIan Campbell 			break;
478f7116284SIan Campbell 
479*fbc872c3SDavid Vrabel 		rc = -EACCES;
480*fbc872c3SDavid Vrabel 		if (u->restrict_domid != UNRESTRICTED_DOMID &&
481*fbc872c3SDavid Vrabel 		    u->restrict_domid != bind.remote_domain)
482*fbc872c3SDavid Vrabel 			break;
483*fbc872c3SDavid Vrabel 
484f7116284SIan Campbell 		bind_interdomain.remote_dom  = bind.remote_domain;
485f7116284SIan Campbell 		bind_interdomain.remote_port = bind.remote_port;
486f7116284SIan Campbell 		rc = HYPERVISOR_event_channel_op(EVTCHNOP_bind_interdomain,
487f7116284SIan Campbell 						 &bind_interdomain);
488f7116284SIan Campbell 		if (rc != 0)
489f7116284SIan Campbell 			break;
490f7116284SIan Campbell 
491f7116284SIan Campbell 		rc = evtchn_bind_to_user(u, bind_interdomain.local_port);
492f7116284SIan Campbell 		if (rc == 0)
493f7116284SIan Campbell 			rc = bind_interdomain.local_port;
494f7116284SIan Campbell 		break;
495f7116284SIan Campbell 	}
496f7116284SIan Campbell 
497f7116284SIan Campbell 	case IOCTL_EVTCHN_BIND_UNBOUND_PORT: {
498f7116284SIan Campbell 		struct ioctl_evtchn_bind_unbound_port bind;
499f7116284SIan Campbell 		struct evtchn_alloc_unbound alloc_unbound;
500f7116284SIan Campbell 
501*fbc872c3SDavid Vrabel 		rc = -EACCES;
502*fbc872c3SDavid Vrabel 		if (u->restrict_domid != UNRESTRICTED_DOMID)
503*fbc872c3SDavid Vrabel 			break;
504*fbc872c3SDavid Vrabel 
505f7116284SIan Campbell 		rc = -EFAULT;
506f7116284SIan Campbell 		if (copy_from_user(&bind, uarg, sizeof(bind)))
507f7116284SIan Campbell 			break;
508f7116284SIan Campbell 
509f7116284SIan Campbell 		alloc_unbound.dom        = DOMID_SELF;
510f7116284SIan Campbell 		alloc_unbound.remote_dom = bind.remote_domain;
511f7116284SIan Campbell 		rc = HYPERVISOR_event_channel_op(EVTCHNOP_alloc_unbound,
512f7116284SIan Campbell 						 &alloc_unbound);
513f7116284SIan Campbell 		if (rc != 0)
514f7116284SIan Campbell 			break;
515f7116284SIan Campbell 
516f7116284SIan Campbell 		rc = evtchn_bind_to_user(u, alloc_unbound.port);
517f7116284SIan Campbell 		if (rc == 0)
518f7116284SIan Campbell 			rc = alloc_unbound.port;
519f7116284SIan Campbell 		break;
520f7116284SIan Campbell 	}
521f7116284SIan Campbell 
522f7116284SIan Campbell 	case IOCTL_EVTCHN_UNBIND: {
523f7116284SIan Campbell 		struct ioctl_evtchn_unbind unbind;
52473cc4bb0SDavid Vrabel 		struct user_evtchn *evtchn;
525f7116284SIan Campbell 
526f7116284SIan Campbell 		rc = -EFAULT;
527f7116284SIan Campbell 		if (copy_from_user(&unbind, uarg, sizeof(unbind)))
528f7116284SIan Campbell 			break;
529f7116284SIan Campbell 
530f7116284SIan Campbell 		rc = -EINVAL;
5310dc0064aSDavid Vrabel 		if (unbind.port >= xen_evtchn_nr_channels())
532f7116284SIan Campbell 			break;
533f7116284SIan Campbell 
534f7116284SIan Campbell 		rc = -ENOTCONN;
53573cc4bb0SDavid Vrabel 		evtchn = find_evtchn(u, unbind.port);
53673cc4bb0SDavid Vrabel 		if (!evtchn)
537f7116284SIan Campbell 			break;
538f7116284SIan Campbell 
5393f5e554fSJeremy Fitzhardinge 		disable_irq(irq_from_evtchn(unbind.port));
54073cc4bb0SDavid Vrabel 		evtchn_unbind_from_user(u, evtchn);
541f7116284SIan Campbell 		rc = 0;
542f7116284SIan Campbell 		break;
543f7116284SIan Campbell 	}
544f7116284SIan Campbell 
545f7116284SIan Campbell 	case IOCTL_EVTCHN_NOTIFY: {
546f7116284SIan Campbell 		struct ioctl_evtchn_notify notify;
54773cc4bb0SDavid Vrabel 		struct user_evtchn *evtchn;
548f7116284SIan Campbell 
549f7116284SIan Campbell 		rc = -EFAULT;
550f7116284SIan Campbell 		if (copy_from_user(&notify, uarg, sizeof(notify)))
551f7116284SIan Campbell 			break;
552f7116284SIan Campbell 
553f7116284SIan Campbell 		rc = -ENOTCONN;
55473cc4bb0SDavid Vrabel 		evtchn = find_evtchn(u, notify.port);
55573cc4bb0SDavid Vrabel 		if (evtchn) {
556f7116284SIan Campbell 			notify_remote_via_evtchn(notify.port);
557f7116284SIan Campbell 			rc = 0;
558f7116284SIan Campbell 		}
559f7116284SIan Campbell 		break;
560f7116284SIan Campbell 	}
561f7116284SIan Campbell 
562f7116284SIan Campbell 	case IOCTL_EVTCHN_RESET: {
563f7116284SIan Campbell 		/* Initialise the ring to empty. Clear errors. */
564f7116284SIan Campbell 		mutex_lock(&u->ring_cons_mutex);
56573cc4bb0SDavid Vrabel 		spin_lock_irq(&u->ring_prod_lock);
566f7116284SIan Campbell 		u->ring_cons = u->ring_prod = u->ring_overflow = 0;
56773cc4bb0SDavid Vrabel 		spin_unlock_irq(&u->ring_prod_lock);
568f7116284SIan Campbell 		mutex_unlock(&u->ring_cons_mutex);
569f7116284SIan Campbell 		rc = 0;
570f7116284SIan Campbell 		break;
571f7116284SIan Campbell 	}
572f7116284SIan Campbell 
573*fbc872c3SDavid Vrabel 	case IOCTL_EVTCHN_RESTRICT_DOMID: {
574*fbc872c3SDavid Vrabel 		struct ioctl_evtchn_restrict_domid ierd;
575*fbc872c3SDavid Vrabel 
576*fbc872c3SDavid Vrabel 		rc = -EACCES;
577*fbc872c3SDavid Vrabel 		if (u->restrict_domid != UNRESTRICTED_DOMID)
578*fbc872c3SDavid Vrabel 			break;
579*fbc872c3SDavid Vrabel 
580*fbc872c3SDavid Vrabel 		rc = -EFAULT;
581*fbc872c3SDavid Vrabel 		if (copy_from_user(&ierd, uarg, sizeof(ierd)))
582*fbc872c3SDavid Vrabel 		    break;
583*fbc872c3SDavid Vrabel 
584*fbc872c3SDavid Vrabel 		rc = -EINVAL;
585*fbc872c3SDavid Vrabel 		if (ierd.domid == 0 || ierd.domid >= DOMID_FIRST_RESERVED)
586*fbc872c3SDavid Vrabel 			break;
587*fbc872c3SDavid Vrabel 
588*fbc872c3SDavid Vrabel 		u->restrict_domid = ierd.domid;
589*fbc872c3SDavid Vrabel 		rc = 0;
590*fbc872c3SDavid Vrabel 
591*fbc872c3SDavid Vrabel 		break;
592*fbc872c3SDavid Vrabel 	}
593*fbc872c3SDavid Vrabel 
594f7116284SIan Campbell 	default:
595f7116284SIan Campbell 		rc = -ENOSYS;
596f7116284SIan Campbell 		break;
597f7116284SIan Campbell 	}
5980a4666b5SJeremy Fitzhardinge 	mutex_unlock(&u->bind_mutex);
599f7116284SIan Campbell 
600f7116284SIan Campbell 	return rc;
601f7116284SIan Campbell }
602f7116284SIan Campbell 
603f7116284SIan Campbell static unsigned int evtchn_poll(struct file *file, poll_table *wait)
604f7116284SIan Campbell {
605f7116284SIan Campbell 	unsigned int mask = POLLOUT | POLLWRNORM;
606f7116284SIan Campbell 	struct per_user_data *u = file->private_data;
607f7116284SIan Campbell 
608f7116284SIan Campbell 	poll_wait(file, &u->evtchn_wait, wait);
609f7116284SIan Campbell 	if (u->ring_cons != u->ring_prod)
610f7116284SIan Campbell 		mask |= POLLIN | POLLRDNORM;
611f7116284SIan Campbell 	if (u->ring_overflow)
612f7116284SIan Campbell 		mask = POLLERR;
613f7116284SIan Campbell 	return mask;
614f7116284SIan Campbell }
615f7116284SIan Campbell 
616f7116284SIan Campbell static int evtchn_fasync(int fd, struct file *filp, int on)
617f7116284SIan Campbell {
618f7116284SIan Campbell 	struct per_user_data *u = filp->private_data;
619f7116284SIan Campbell 	return fasync_helper(fd, filp, on, &u->evtchn_async_queue);
620f7116284SIan Campbell }
621f7116284SIan Campbell 
622f7116284SIan Campbell static int evtchn_open(struct inode *inode, struct file *filp)
623f7116284SIan Campbell {
624f7116284SIan Campbell 	struct per_user_data *u;
625f7116284SIan Campbell 
626f7116284SIan Campbell 	u = kzalloc(sizeof(*u), GFP_KERNEL);
627f7116284SIan Campbell 	if (u == NULL)
628f7116284SIan Campbell 		return -ENOMEM;
629f7116284SIan Campbell 
630f7116284SIan Campbell 	u->name = kasprintf(GFP_KERNEL, "evtchn:%s", current->comm);
631f7116284SIan Campbell 	if (u->name == NULL) {
632f7116284SIan Campbell 		kfree(u);
633f7116284SIan Campbell 		return -ENOMEM;
634f7116284SIan Campbell 	}
635f7116284SIan Campbell 
636f7116284SIan Campbell 	init_waitqueue_head(&u->evtchn_wait);
637f7116284SIan Campbell 
6380a4666b5SJeremy Fitzhardinge 	mutex_init(&u->bind_mutex);
639f7116284SIan Campbell 	mutex_init(&u->ring_cons_mutex);
64073cc4bb0SDavid Vrabel 	spin_lock_init(&u->ring_prod_lock);
641f7116284SIan Campbell 
642*fbc872c3SDavid Vrabel 	u->restrict_domid = UNRESTRICTED_DOMID;
643*fbc872c3SDavid Vrabel 
644f7116284SIan Campbell 	filp->private_data = u;
645f7116284SIan Campbell 
6466eab04a8SJustin P. Mattock 	return nonseekable_open(inode, filp);
647f7116284SIan Campbell }
648f7116284SIan Campbell 
649f7116284SIan Campbell static int evtchn_release(struct inode *inode, struct file *filp)
650f7116284SIan Campbell {
651f7116284SIan Campbell 	struct per_user_data *u = filp->private_data;
65273cc4bb0SDavid Vrabel 	struct rb_node *node;
653f7116284SIan Campbell 
65473cc4bb0SDavid Vrabel 	while ((node = u->evtchns.rb_node)) {
65573cc4bb0SDavid Vrabel 		struct user_evtchn *evtchn;
656f7116284SIan Campbell 
65773cc4bb0SDavid Vrabel 		evtchn = rb_entry(node, struct user_evtchn, node);
65873cc4bb0SDavid Vrabel 		disable_irq(irq_from_evtchn(evtchn->port));
65973cc4bb0SDavid Vrabel 		evtchn_unbind_from_user(u, evtchn);
6603f5e554fSJeremy Fitzhardinge 	}
6613f5e554fSJeremy Fitzhardinge 
66286200154SDavid Vrabel 	evtchn_free_ring(u->ring);
663f7116284SIan Campbell 	kfree(u->name);
664f7116284SIan Campbell 	kfree(u);
665f7116284SIan Campbell 
666f7116284SIan Campbell 	return 0;
667f7116284SIan Campbell }
668f7116284SIan Campbell 
669f7116284SIan Campbell static const struct file_operations evtchn_fops = {
670f7116284SIan Campbell 	.owner   = THIS_MODULE,
671f7116284SIan Campbell 	.read    = evtchn_read,
672f7116284SIan Campbell 	.write   = evtchn_write,
673f7116284SIan Campbell 	.unlocked_ioctl = evtchn_ioctl,
674f7116284SIan Campbell 	.poll    = evtchn_poll,
675f7116284SIan Campbell 	.fasync  = evtchn_fasync,
676f7116284SIan Campbell 	.open    = evtchn_open,
677f7116284SIan Campbell 	.release = evtchn_release,
678bc7fc5e3SJeremy Fitzhardinge 	.llseek	 = no_llseek,
679f7116284SIan Campbell };
680f7116284SIan Campbell 
681f7116284SIan Campbell static struct miscdevice evtchn_miscdev = {
682f7116284SIan Campbell 	.minor        = MISC_DYNAMIC_MINOR,
683376d908fSBastian Blank 	.name         = "xen/evtchn",
684f7116284SIan Campbell 	.fops         = &evtchn_fops,
685f7116284SIan Campbell };
686f7116284SIan Campbell static int __init evtchn_init(void)
687f7116284SIan Campbell {
688f7116284SIan Campbell 	int err;
689f7116284SIan Campbell 
690f7116284SIan Campbell 	if (!xen_domain())
691f7116284SIan Campbell 		return -ENODEV;
692f7116284SIan Campbell 
69318283ea7SWei Liu 	/* Create '/dev/xen/evtchn'. */
694f7116284SIan Campbell 	err = misc_register(&evtchn_miscdev);
695f7116284SIan Campbell 	if (err != 0) {
696283c0972SJoe Perches 		pr_err("Could not register /dev/xen/evtchn\n");
697f7116284SIan Campbell 		return err;
698f7116284SIan Campbell 	}
699f7116284SIan Campbell 
700283c0972SJoe Perches 	pr_info("Event-channel device installed\n");
701f7116284SIan Campbell 
702f7116284SIan Campbell 	return 0;
703f7116284SIan Campbell }
704f7116284SIan Campbell 
705f7116284SIan Campbell static void __exit evtchn_cleanup(void)
706f7116284SIan Campbell {
707f7116284SIan Campbell 	misc_deregister(&evtchn_miscdev);
708f7116284SIan Campbell }
709f7116284SIan Campbell 
710f7116284SIan Campbell module_init(evtchn_init);
711f7116284SIan Campbell module_exit(evtchn_cleanup);
712f7116284SIan Campbell 
713f7116284SIan Campbell MODULE_LICENSE("GPL");
714