1f7116284SIan Campbell /****************************************************************************** 2f7116284SIan Campbell * evtchn.c 3f7116284SIan Campbell * 4f7116284SIan Campbell * Driver for receiving and demuxing event-channel signals. 5f7116284SIan Campbell * 6f7116284SIan Campbell * Copyright (c) 2004-2005, K A Fraser 7f7116284SIan Campbell * Multi-process extensions Copyright (c) 2004, Steven Smith 8f7116284SIan Campbell * 9f7116284SIan Campbell * This program is free software; you can redistribute it and/or 10f7116284SIan Campbell * modify it under the terms of the GNU General Public License version 2 11f7116284SIan Campbell * as published by the Free Software Foundation; or, when distributed 12f7116284SIan Campbell * separately from the Linux kernel or incorporated into other 13f7116284SIan Campbell * software packages, subject to the following license: 14f7116284SIan Campbell * 15f7116284SIan Campbell * Permission is hereby granted, free of charge, to any person obtaining a copy 16f7116284SIan Campbell * of this source file (the "Software"), to deal in the Software without 17f7116284SIan Campbell * restriction, including without limitation the rights to use, copy, modify, 18f7116284SIan Campbell * merge, publish, distribute, sublicense, and/or sell copies of the Software, 19f7116284SIan Campbell * and to permit persons to whom the Software is furnished to do so, subject to 20f7116284SIan Campbell * the following conditions: 21f7116284SIan Campbell * 22f7116284SIan Campbell * The above copyright notice and this permission notice shall be included in 23f7116284SIan Campbell * all copies or substantial portions of the Software. 24f7116284SIan Campbell * 25f7116284SIan Campbell * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 26f7116284SIan Campbell * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 27f7116284SIan Campbell * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 28f7116284SIan Campbell * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 29f7116284SIan Campbell * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING 30f7116284SIan Campbell * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS 31f7116284SIan Campbell * IN THE SOFTWARE. 32f7116284SIan Campbell */ 33f7116284SIan Campbell 34283c0972SJoe Perches #define pr_fmt(fmt) "xen:" KBUILD_MODNAME ": " fmt 35283c0972SJoe Perches 36f7116284SIan Campbell #include <linux/module.h> 37f7116284SIan Campbell #include <linux/kernel.h> 38f7116284SIan Campbell #include <linux/sched.h> 39f7116284SIan Campbell #include <linux/slab.h> 40f7116284SIan Campbell #include <linux/string.h> 41f7116284SIan Campbell #include <linux/errno.h> 42f7116284SIan Campbell #include <linux/fs.h> 43f7116284SIan Campbell #include <linux/miscdevice.h> 44f7116284SIan Campbell #include <linux/major.h> 45f7116284SIan Campbell #include <linux/proc_fs.h> 46f7116284SIan Campbell #include <linux/stat.h> 47f7116284SIan Campbell #include <linux/poll.h> 48f7116284SIan Campbell #include <linux/irq.h> 49f7116284SIan Campbell #include <linux/init.h> 50f7116284SIan Campbell #include <linux/mutex.h> 51f7116284SIan Campbell #include <linux/cpu.h> 5286200154SDavid Vrabel #include <linux/mm.h> 5386200154SDavid Vrabel #include <linux/vmalloc.h> 541ccbf534SJeremy Fitzhardinge 551ccbf534SJeremy Fitzhardinge #include <xen/xen.h> 56f7116284SIan Campbell #include <xen/events.h> 57f7116284SIan Campbell #include <xen/evtchn.h> 58f7116284SIan Campbell #include <asm/xen/hypervisor.h> 59f7116284SIan Campbell 60f7116284SIan Campbell struct per_user_data { 610a4666b5SJeremy Fitzhardinge struct mutex bind_mutex; /* serialize bind/unbind operations */ 6273cc4bb0SDavid Vrabel struct rb_root evtchns; 6386200154SDavid Vrabel unsigned int nr_evtchns; 640a4666b5SJeremy Fitzhardinge 65f7116284SIan Campbell /* Notification ring, accessed via /dev/xen/evtchn. */ 6686200154SDavid Vrabel unsigned int ring_size; 67f7116284SIan Campbell evtchn_port_t *ring; 68f7116284SIan Campbell unsigned int ring_cons, ring_prod, ring_overflow; 69f7116284SIan Campbell struct mutex ring_cons_mutex; /* protect against concurrent readers */ 7073cc4bb0SDavid Vrabel spinlock_t ring_prod_lock; /* product against concurrent interrupts */ 71f7116284SIan Campbell 72f7116284SIan Campbell /* Processes wait on this queue when ring is empty. */ 73f7116284SIan Campbell wait_queue_head_t evtchn_wait; 74f7116284SIan Campbell struct fasync_struct *evtchn_async_queue; 75f7116284SIan Campbell const char *name; 76*fbc872c3SDavid Vrabel 77*fbc872c3SDavid Vrabel domid_t restrict_domid; 78f7116284SIan Campbell }; 79f7116284SIan Campbell 80*fbc872c3SDavid Vrabel #define UNRESTRICTED_DOMID ((domid_t)-1) 81*fbc872c3SDavid Vrabel 8273cc4bb0SDavid Vrabel struct user_evtchn { 8373cc4bb0SDavid Vrabel struct rb_node node; 8473cc4bb0SDavid Vrabel struct per_user_data *user; 8573cc4bb0SDavid Vrabel unsigned port; 8673cc4bb0SDavid Vrabel bool enabled; 8773cc4bb0SDavid Vrabel }; 88f7116284SIan Campbell 8986200154SDavid Vrabel static evtchn_port_t *evtchn_alloc_ring(unsigned int size) 9086200154SDavid Vrabel { 9186200154SDavid Vrabel evtchn_port_t *ring; 9286200154SDavid Vrabel size_t s = size * sizeof(*ring); 9386200154SDavid Vrabel 9486200154SDavid Vrabel ring = kmalloc(s, GFP_KERNEL); 9586200154SDavid Vrabel if (!ring) 9686200154SDavid Vrabel ring = vmalloc(s); 9786200154SDavid Vrabel 9886200154SDavid Vrabel return ring; 9986200154SDavid Vrabel } 10086200154SDavid Vrabel 10186200154SDavid Vrabel static void evtchn_free_ring(evtchn_port_t *ring) 10286200154SDavid Vrabel { 10386200154SDavid Vrabel kvfree(ring); 10486200154SDavid Vrabel } 10586200154SDavid Vrabel 10686200154SDavid Vrabel static unsigned int evtchn_ring_offset(struct per_user_data *u, 10786200154SDavid Vrabel unsigned int idx) 10886200154SDavid Vrabel { 10986200154SDavid Vrabel return idx & (u->ring_size - 1); 11086200154SDavid Vrabel } 11186200154SDavid Vrabel 11286200154SDavid Vrabel static evtchn_port_t *evtchn_ring_entry(struct per_user_data *u, 11386200154SDavid Vrabel unsigned int idx) 11486200154SDavid Vrabel { 11586200154SDavid Vrabel return u->ring + evtchn_ring_offset(u, idx); 11686200154SDavid Vrabel } 11786200154SDavid Vrabel 11873cc4bb0SDavid Vrabel static int add_evtchn(struct per_user_data *u, struct user_evtchn *evtchn) 119e3cc067bSJeremy Fitzhardinge { 12073cc4bb0SDavid Vrabel struct rb_node **new = &(u->evtchns.rb_node), *parent = NULL; 121e3cc067bSJeremy Fitzhardinge 12286200154SDavid Vrabel u->nr_evtchns++; 12386200154SDavid Vrabel 12473cc4bb0SDavid Vrabel while (*new) { 12573cc4bb0SDavid Vrabel struct user_evtchn *this; 126e3cc067bSJeremy Fitzhardinge 12773cc4bb0SDavid Vrabel this = container_of(*new, struct user_evtchn, node); 128e3cc067bSJeremy Fitzhardinge 12973cc4bb0SDavid Vrabel parent = *new; 13073cc4bb0SDavid Vrabel if (this->port < evtchn->port) 13173cc4bb0SDavid Vrabel new = &((*new)->rb_left); 13273cc4bb0SDavid Vrabel else if (this->port > evtchn->port) 13373cc4bb0SDavid Vrabel new = &((*new)->rb_right); 134e3cc067bSJeremy Fitzhardinge else 13573cc4bb0SDavid Vrabel return -EEXIST; 13673cc4bb0SDavid Vrabel } 13773cc4bb0SDavid Vrabel 13873cc4bb0SDavid Vrabel /* Add new node and rebalance tree. */ 13973cc4bb0SDavid Vrabel rb_link_node(&evtchn->node, parent, new); 14073cc4bb0SDavid Vrabel rb_insert_color(&evtchn->node, &u->evtchns); 14173cc4bb0SDavid Vrabel 14273cc4bb0SDavid Vrabel return 0; 14373cc4bb0SDavid Vrabel } 14473cc4bb0SDavid Vrabel 14573cc4bb0SDavid Vrabel static void del_evtchn(struct per_user_data *u, struct user_evtchn *evtchn) 14673cc4bb0SDavid Vrabel { 14786200154SDavid Vrabel u->nr_evtchns--; 14873cc4bb0SDavid Vrabel rb_erase(&evtchn->node, &u->evtchns); 14973cc4bb0SDavid Vrabel kfree(evtchn); 15073cc4bb0SDavid Vrabel } 15173cc4bb0SDavid Vrabel 15273cc4bb0SDavid Vrabel static struct user_evtchn *find_evtchn(struct per_user_data *u, unsigned port) 15373cc4bb0SDavid Vrabel { 15473cc4bb0SDavid Vrabel struct rb_node *node = u->evtchns.rb_node; 15573cc4bb0SDavid Vrabel 15673cc4bb0SDavid Vrabel while (node) { 15773cc4bb0SDavid Vrabel struct user_evtchn *evtchn; 15873cc4bb0SDavid Vrabel 15973cc4bb0SDavid Vrabel evtchn = container_of(node, struct user_evtchn, node); 16073cc4bb0SDavid Vrabel 16173cc4bb0SDavid Vrabel if (evtchn->port < port) 16273cc4bb0SDavid Vrabel node = node->rb_left; 16373cc4bb0SDavid Vrabel else if (evtchn->port > port) 16473cc4bb0SDavid Vrabel node = node->rb_right; 16573cc4bb0SDavid Vrabel else 16673cc4bb0SDavid Vrabel return evtchn; 16773cc4bb0SDavid Vrabel } 16873cc4bb0SDavid Vrabel return NULL; 169e3cc067bSJeremy Fitzhardinge } 170e3cc067bSJeremy Fitzhardinge 17170697d54SJeremy Fitzhardinge static irqreturn_t evtchn_interrupt(int irq, void *data) 172f7116284SIan Campbell { 17373cc4bb0SDavid Vrabel struct user_evtchn *evtchn = data; 17473cc4bb0SDavid Vrabel struct per_user_data *u = evtchn->user; 175f7116284SIan Campbell 17673cc4bb0SDavid Vrabel WARN(!evtchn->enabled, 177e3cc067bSJeremy Fitzhardinge "Interrupt for port %d, but apparently not enabled; per-user %p\n", 17873cc4bb0SDavid Vrabel evtchn->port, u); 179f7116284SIan Campbell 180f7116284SIan Campbell disable_irq_nosync(irq); 18173cc4bb0SDavid Vrabel evtchn->enabled = false; 18273cc4bb0SDavid Vrabel 18373cc4bb0SDavid Vrabel spin_lock(&u->ring_prod_lock); 184f7116284SIan Campbell 18586200154SDavid Vrabel if ((u->ring_prod - u->ring_cons) < u->ring_size) { 18686200154SDavid Vrabel *evtchn_ring_entry(u, u->ring_prod) = evtchn->port; 187f7116284SIan Campbell wmb(); /* Ensure ring contents visible */ 188f7116284SIan Campbell if (u->ring_cons == u->ring_prod++) { 189f7116284SIan Campbell wake_up_interruptible(&u->evtchn_wait); 190f7116284SIan Campbell kill_fasync(&u->evtchn_async_queue, 191f7116284SIan Campbell SIGIO, POLL_IN); 192f7116284SIan Campbell } 193e3cc067bSJeremy Fitzhardinge } else 194f7116284SIan Campbell u->ring_overflow = 1; 195f7116284SIan Campbell 19673cc4bb0SDavid Vrabel spin_unlock(&u->ring_prod_lock); 197f7116284SIan Campbell 198f7116284SIan Campbell return IRQ_HANDLED; 199f7116284SIan Campbell } 200f7116284SIan Campbell 201f7116284SIan Campbell static ssize_t evtchn_read(struct file *file, char __user *buf, 202f7116284SIan Campbell size_t count, loff_t *ppos) 203f7116284SIan Campbell { 204f7116284SIan Campbell int rc; 205f7116284SIan Campbell unsigned int c, p, bytes1 = 0, bytes2 = 0; 206f7116284SIan Campbell struct per_user_data *u = file->private_data; 207f7116284SIan Campbell 208f7116284SIan Campbell /* Whole number of ports. */ 209f7116284SIan Campbell count &= ~(sizeof(evtchn_port_t)-1); 210f7116284SIan Campbell 211f7116284SIan Campbell if (count == 0) 212f7116284SIan Campbell return 0; 213f7116284SIan Campbell 214f7116284SIan Campbell if (count > PAGE_SIZE) 215f7116284SIan Campbell count = PAGE_SIZE; 216f7116284SIan Campbell 217f7116284SIan Campbell for (;;) { 218f7116284SIan Campbell mutex_lock(&u->ring_cons_mutex); 219f7116284SIan Campbell 220f7116284SIan Campbell rc = -EFBIG; 221f7116284SIan Campbell if (u->ring_overflow) 222f7116284SIan Campbell goto unlock_out; 223f7116284SIan Campbell 224f7116284SIan Campbell c = u->ring_cons; 225f7116284SIan Campbell p = u->ring_prod; 226f7116284SIan Campbell if (c != p) 227f7116284SIan Campbell break; 228f7116284SIan Campbell 229f7116284SIan Campbell mutex_unlock(&u->ring_cons_mutex); 230f7116284SIan Campbell 231f7116284SIan Campbell if (file->f_flags & O_NONBLOCK) 232f7116284SIan Campbell return -EAGAIN; 233f7116284SIan Campbell 234f7116284SIan Campbell rc = wait_event_interruptible(u->evtchn_wait, 235f7116284SIan Campbell u->ring_cons != u->ring_prod); 236f7116284SIan Campbell if (rc) 237f7116284SIan Campbell return rc; 238f7116284SIan Campbell } 239f7116284SIan Campbell 240f7116284SIan Campbell /* Byte lengths of two chunks. Chunk split (if any) is at ring wrap. */ 24186200154SDavid Vrabel if (((c ^ p) & u->ring_size) != 0) { 24286200154SDavid Vrabel bytes1 = (u->ring_size - evtchn_ring_offset(u, c)) * 243f7116284SIan Campbell sizeof(evtchn_port_t); 24486200154SDavid Vrabel bytes2 = evtchn_ring_offset(u, p) * sizeof(evtchn_port_t); 245f7116284SIan Campbell } else { 246f7116284SIan Campbell bytes1 = (p - c) * sizeof(evtchn_port_t); 247f7116284SIan Campbell bytes2 = 0; 248f7116284SIan Campbell } 249f7116284SIan Campbell 250f7116284SIan Campbell /* Truncate chunks according to caller's maximum byte count. */ 251f7116284SIan Campbell if (bytes1 > count) { 252f7116284SIan Campbell bytes1 = count; 253f7116284SIan Campbell bytes2 = 0; 254f7116284SIan Campbell } else if ((bytes1 + bytes2) > count) { 255f7116284SIan Campbell bytes2 = count - bytes1; 256f7116284SIan Campbell } 257f7116284SIan Campbell 258f7116284SIan Campbell rc = -EFAULT; 259f7116284SIan Campbell rmb(); /* Ensure that we see the port before we copy it. */ 26086200154SDavid Vrabel if (copy_to_user(buf, evtchn_ring_entry(u, c), bytes1) || 261f7116284SIan Campbell ((bytes2 != 0) && 262f7116284SIan Campbell copy_to_user(&buf[bytes1], &u->ring[0], bytes2))) 263f7116284SIan Campbell goto unlock_out; 264f7116284SIan Campbell 265f7116284SIan Campbell u->ring_cons += (bytes1 + bytes2) / sizeof(evtchn_port_t); 266f7116284SIan Campbell rc = bytes1 + bytes2; 267f7116284SIan Campbell 268f7116284SIan Campbell unlock_out: 269f7116284SIan Campbell mutex_unlock(&u->ring_cons_mutex); 270f7116284SIan Campbell return rc; 271f7116284SIan Campbell } 272f7116284SIan Campbell 273f7116284SIan Campbell static ssize_t evtchn_write(struct file *file, const char __user *buf, 274f7116284SIan Campbell size_t count, loff_t *ppos) 275f7116284SIan Campbell { 276f7116284SIan Campbell int rc, i; 277f7116284SIan Campbell evtchn_port_t *kbuf = (evtchn_port_t *)__get_free_page(GFP_KERNEL); 278f7116284SIan Campbell struct per_user_data *u = file->private_data; 279f7116284SIan Campbell 280f7116284SIan Campbell if (kbuf == NULL) 281f7116284SIan Campbell return -ENOMEM; 282f7116284SIan Campbell 283f7116284SIan Campbell /* Whole number of ports. */ 284f7116284SIan Campbell count &= ~(sizeof(evtchn_port_t)-1); 285f7116284SIan Campbell 286f7116284SIan Campbell rc = 0; 287f7116284SIan Campbell if (count == 0) 288f7116284SIan Campbell goto out; 289f7116284SIan Campbell 290f7116284SIan Campbell if (count > PAGE_SIZE) 291f7116284SIan Campbell count = PAGE_SIZE; 292f7116284SIan Campbell 293f7116284SIan Campbell rc = -EFAULT; 294f7116284SIan Campbell if (copy_from_user(kbuf, buf, count) != 0) 295f7116284SIan Campbell goto out; 296f7116284SIan Campbell 29773cc4bb0SDavid Vrabel mutex_lock(&u->bind_mutex); 298e3cc067bSJeremy Fitzhardinge 299e3cc067bSJeremy Fitzhardinge for (i = 0; i < (count/sizeof(evtchn_port_t)); i++) { 300e3cc067bSJeremy Fitzhardinge unsigned port = kbuf[i]; 30173cc4bb0SDavid Vrabel struct user_evtchn *evtchn; 302e3cc067bSJeremy Fitzhardinge 30373cc4bb0SDavid Vrabel evtchn = find_evtchn(u, port); 30473cc4bb0SDavid Vrabel if (evtchn && !evtchn->enabled) { 30573cc4bb0SDavid Vrabel evtchn->enabled = true; 306e3cc067bSJeremy Fitzhardinge enable_irq(irq_from_evtchn(port)); 307e3cc067bSJeremy Fitzhardinge } 308e3cc067bSJeremy Fitzhardinge } 309e3cc067bSJeremy Fitzhardinge 31073cc4bb0SDavid Vrabel mutex_unlock(&u->bind_mutex); 311f7116284SIan Campbell 312f7116284SIan Campbell rc = count; 313f7116284SIan Campbell 314f7116284SIan Campbell out: 315f7116284SIan Campbell free_page((unsigned long)kbuf); 316f7116284SIan Campbell return rc; 317f7116284SIan Campbell } 318f7116284SIan Campbell 31986200154SDavid Vrabel static int evtchn_resize_ring(struct per_user_data *u) 32086200154SDavid Vrabel { 32186200154SDavid Vrabel unsigned int new_size; 32286200154SDavid Vrabel evtchn_port_t *new_ring, *old_ring; 32386200154SDavid Vrabel 32486200154SDavid Vrabel /* 32586200154SDavid Vrabel * Ensure the ring is large enough to capture all possible 32686200154SDavid Vrabel * events. i.e., one free slot for each bound event. 32786200154SDavid Vrabel */ 32886200154SDavid Vrabel if (u->nr_evtchns <= u->ring_size) 32986200154SDavid Vrabel return 0; 33086200154SDavid Vrabel 33186200154SDavid Vrabel if (u->ring_size == 0) 33286200154SDavid Vrabel new_size = 64; 33386200154SDavid Vrabel else 33486200154SDavid Vrabel new_size = 2 * u->ring_size; 33586200154SDavid Vrabel 33686200154SDavid Vrabel new_ring = evtchn_alloc_ring(new_size); 33786200154SDavid Vrabel if (!new_ring) 33886200154SDavid Vrabel return -ENOMEM; 33986200154SDavid Vrabel 34086200154SDavid Vrabel old_ring = u->ring; 34186200154SDavid Vrabel 34286200154SDavid Vrabel /* 34386200154SDavid Vrabel * Access to the ring contents is serialized by either the 34486200154SDavid Vrabel * prod /or/ cons lock so take both when resizing. 34586200154SDavid Vrabel */ 34686200154SDavid Vrabel mutex_lock(&u->ring_cons_mutex); 34786200154SDavid Vrabel spin_lock_irq(&u->ring_prod_lock); 34886200154SDavid Vrabel 34986200154SDavid Vrabel /* 35086200154SDavid Vrabel * Copy the old ring contents to the new ring. 35186200154SDavid Vrabel * 35227e0e638SJan Beulich * To take care of wrapping, a full ring, and the new index 35327e0e638SJan Beulich * pointing into the second half, simply copy the old contents 35427e0e638SJan Beulich * twice. 35586200154SDavid Vrabel * 35686200154SDavid Vrabel * +---------+ +------------------+ 35727e0e638SJan Beulich * |34567 12| -> |34567 1234567 12| 35827e0e638SJan Beulich * +-----p-c-+ +-------c------p---+ 35986200154SDavid Vrabel */ 36027e0e638SJan Beulich memcpy(new_ring, old_ring, u->ring_size * sizeof(*u->ring)); 36127e0e638SJan Beulich memcpy(new_ring + u->ring_size, old_ring, 36227e0e638SJan Beulich u->ring_size * sizeof(*u->ring)); 36386200154SDavid Vrabel 36486200154SDavid Vrabel u->ring = new_ring; 36586200154SDavid Vrabel u->ring_size = new_size; 36686200154SDavid Vrabel 36786200154SDavid Vrabel spin_unlock_irq(&u->ring_prod_lock); 36886200154SDavid Vrabel mutex_unlock(&u->ring_cons_mutex); 36986200154SDavid Vrabel 37086200154SDavid Vrabel evtchn_free_ring(old_ring); 37186200154SDavid Vrabel 37286200154SDavid Vrabel return 0; 37386200154SDavid Vrabel } 37486200154SDavid Vrabel 375f7116284SIan Campbell static int evtchn_bind_to_user(struct per_user_data *u, int port) 376f7116284SIan Campbell { 37773cc4bb0SDavid Vrabel struct user_evtchn *evtchn; 37873cc4bb0SDavid Vrabel struct evtchn_close close; 379f7116284SIan Campbell int rc = 0; 380f7116284SIan Campbell 3810a4666b5SJeremy Fitzhardinge /* 3820a4666b5SJeremy Fitzhardinge * Ports are never reused, so every caller should pass in a 3830a4666b5SJeremy Fitzhardinge * unique port. 3840a4666b5SJeremy Fitzhardinge * 3850a4666b5SJeremy Fitzhardinge * (Locking not necessary because we haven't registered the 3860a4666b5SJeremy Fitzhardinge * interrupt handler yet, and our caller has already 3870a4666b5SJeremy Fitzhardinge * serialized bind operations.) 3880a4666b5SJeremy Fitzhardinge */ 38973cc4bb0SDavid Vrabel 39073cc4bb0SDavid Vrabel evtchn = kzalloc(sizeof(*evtchn), GFP_KERNEL); 39173cc4bb0SDavid Vrabel if (!evtchn) 39273cc4bb0SDavid Vrabel return -ENOMEM; 39373cc4bb0SDavid Vrabel 39473cc4bb0SDavid Vrabel evtchn->user = u; 39573cc4bb0SDavid Vrabel evtchn->port = port; 39673cc4bb0SDavid Vrabel evtchn->enabled = true; /* start enabled */ 39773cc4bb0SDavid Vrabel 39873cc4bb0SDavid Vrabel rc = add_evtchn(u, evtchn); 39973cc4bb0SDavid Vrabel if (rc < 0) 40073cc4bb0SDavid Vrabel goto err; 401f7116284SIan Campbell 40286200154SDavid Vrabel rc = evtchn_resize_ring(u); 40386200154SDavid Vrabel if (rc < 0) 40486200154SDavid Vrabel goto err; 40586200154SDavid Vrabel 406af09d1a7SMichael Opdenacker rc = bind_evtchn_to_irqhandler(port, evtchn_interrupt, 0, 40773cc4bb0SDavid Vrabel u->name, evtchn); 40873cc4bb0SDavid Vrabel if (rc < 0) 40973cc4bb0SDavid Vrabel goto err; 41073cc4bb0SDavid Vrabel 411420eb554SDaniel De Graaf rc = evtchn_make_refcounted(port); 41273cc4bb0SDavid Vrabel return rc; 41373cc4bb0SDavid Vrabel 41473cc4bb0SDavid Vrabel err: 415e7e44e44SWei Liu /* bind failed, should close the port now */ 416e7e44e44SWei Liu close.port = port; 417e7e44e44SWei Liu if (HYPERVISOR_event_channel_op(EVTCHNOP_close, &close) != 0) 418e7e44e44SWei Liu BUG(); 41973cc4bb0SDavid Vrabel del_evtchn(u, evtchn); 420f7116284SIan Campbell return rc; 421f7116284SIan Campbell } 422f7116284SIan Campbell 42373cc4bb0SDavid Vrabel static void evtchn_unbind_from_user(struct per_user_data *u, 42473cc4bb0SDavid Vrabel struct user_evtchn *evtchn) 425f7116284SIan Campbell { 42673cc4bb0SDavid Vrabel int irq = irq_from_evtchn(evtchn->port); 427f7116284SIan Campbell 428e7e44e44SWei Liu BUG_ON(irq < 0); 429e7e44e44SWei Liu 43073cc4bb0SDavid Vrabel unbind_from_irqhandler(irq, evtchn); 4310a4666b5SJeremy Fitzhardinge 43273cc4bb0SDavid Vrabel del_evtchn(u, evtchn); 433f7116284SIan Campbell } 434f7116284SIan Campbell 435f7116284SIan Campbell static long evtchn_ioctl(struct file *file, 436f7116284SIan Campbell unsigned int cmd, unsigned long arg) 437f7116284SIan Campbell { 438f7116284SIan Campbell int rc; 439f7116284SIan Campbell struct per_user_data *u = file->private_data; 440f7116284SIan Campbell void __user *uarg = (void __user *) arg; 441f7116284SIan Campbell 4420a4666b5SJeremy Fitzhardinge /* Prevent bind from racing with unbind */ 4430a4666b5SJeremy Fitzhardinge mutex_lock(&u->bind_mutex); 4440a4666b5SJeremy Fitzhardinge 445f7116284SIan Campbell switch (cmd) { 446f7116284SIan Campbell case IOCTL_EVTCHN_BIND_VIRQ: { 447f7116284SIan Campbell struct ioctl_evtchn_bind_virq bind; 448f7116284SIan Campbell struct evtchn_bind_virq bind_virq; 449f7116284SIan Campbell 450*fbc872c3SDavid Vrabel rc = -EACCES; 451*fbc872c3SDavid Vrabel if (u->restrict_domid != UNRESTRICTED_DOMID) 452*fbc872c3SDavid Vrabel break; 453*fbc872c3SDavid Vrabel 454f7116284SIan Campbell rc = -EFAULT; 455f7116284SIan Campbell if (copy_from_user(&bind, uarg, sizeof(bind))) 456f7116284SIan Campbell break; 457f7116284SIan Campbell 458f7116284SIan Campbell bind_virq.virq = bind.virq; 459f7116284SIan Campbell bind_virq.vcpu = 0; 460f7116284SIan Campbell rc = HYPERVISOR_event_channel_op(EVTCHNOP_bind_virq, 461f7116284SIan Campbell &bind_virq); 462f7116284SIan Campbell if (rc != 0) 463f7116284SIan Campbell break; 464f7116284SIan Campbell 465f7116284SIan Campbell rc = evtchn_bind_to_user(u, bind_virq.port); 466f7116284SIan Campbell if (rc == 0) 467f7116284SIan Campbell rc = bind_virq.port; 468f7116284SIan Campbell break; 469f7116284SIan Campbell } 470f7116284SIan Campbell 471f7116284SIan Campbell case IOCTL_EVTCHN_BIND_INTERDOMAIN: { 472f7116284SIan Campbell struct ioctl_evtchn_bind_interdomain bind; 473f7116284SIan Campbell struct evtchn_bind_interdomain bind_interdomain; 474f7116284SIan Campbell 475f7116284SIan Campbell rc = -EFAULT; 476f7116284SIan Campbell if (copy_from_user(&bind, uarg, sizeof(bind))) 477f7116284SIan Campbell break; 478f7116284SIan Campbell 479*fbc872c3SDavid Vrabel rc = -EACCES; 480*fbc872c3SDavid Vrabel if (u->restrict_domid != UNRESTRICTED_DOMID && 481*fbc872c3SDavid Vrabel u->restrict_domid != bind.remote_domain) 482*fbc872c3SDavid Vrabel break; 483*fbc872c3SDavid Vrabel 484f7116284SIan Campbell bind_interdomain.remote_dom = bind.remote_domain; 485f7116284SIan Campbell bind_interdomain.remote_port = bind.remote_port; 486f7116284SIan Campbell rc = HYPERVISOR_event_channel_op(EVTCHNOP_bind_interdomain, 487f7116284SIan Campbell &bind_interdomain); 488f7116284SIan Campbell if (rc != 0) 489f7116284SIan Campbell break; 490f7116284SIan Campbell 491f7116284SIan Campbell rc = evtchn_bind_to_user(u, bind_interdomain.local_port); 492f7116284SIan Campbell if (rc == 0) 493f7116284SIan Campbell rc = bind_interdomain.local_port; 494f7116284SIan Campbell break; 495f7116284SIan Campbell } 496f7116284SIan Campbell 497f7116284SIan Campbell case IOCTL_EVTCHN_BIND_UNBOUND_PORT: { 498f7116284SIan Campbell struct ioctl_evtchn_bind_unbound_port bind; 499f7116284SIan Campbell struct evtchn_alloc_unbound alloc_unbound; 500f7116284SIan Campbell 501*fbc872c3SDavid Vrabel rc = -EACCES; 502*fbc872c3SDavid Vrabel if (u->restrict_domid != UNRESTRICTED_DOMID) 503*fbc872c3SDavid Vrabel break; 504*fbc872c3SDavid Vrabel 505f7116284SIan Campbell rc = -EFAULT; 506f7116284SIan Campbell if (copy_from_user(&bind, uarg, sizeof(bind))) 507f7116284SIan Campbell break; 508f7116284SIan Campbell 509f7116284SIan Campbell alloc_unbound.dom = DOMID_SELF; 510f7116284SIan Campbell alloc_unbound.remote_dom = bind.remote_domain; 511f7116284SIan Campbell rc = HYPERVISOR_event_channel_op(EVTCHNOP_alloc_unbound, 512f7116284SIan Campbell &alloc_unbound); 513f7116284SIan Campbell if (rc != 0) 514f7116284SIan Campbell break; 515f7116284SIan Campbell 516f7116284SIan Campbell rc = evtchn_bind_to_user(u, alloc_unbound.port); 517f7116284SIan Campbell if (rc == 0) 518f7116284SIan Campbell rc = alloc_unbound.port; 519f7116284SIan Campbell break; 520f7116284SIan Campbell } 521f7116284SIan Campbell 522f7116284SIan Campbell case IOCTL_EVTCHN_UNBIND: { 523f7116284SIan Campbell struct ioctl_evtchn_unbind unbind; 52473cc4bb0SDavid Vrabel struct user_evtchn *evtchn; 525f7116284SIan Campbell 526f7116284SIan Campbell rc = -EFAULT; 527f7116284SIan Campbell if (copy_from_user(&unbind, uarg, sizeof(unbind))) 528f7116284SIan Campbell break; 529f7116284SIan Campbell 530f7116284SIan Campbell rc = -EINVAL; 5310dc0064aSDavid Vrabel if (unbind.port >= xen_evtchn_nr_channels()) 532f7116284SIan Campbell break; 533f7116284SIan Campbell 534f7116284SIan Campbell rc = -ENOTCONN; 53573cc4bb0SDavid Vrabel evtchn = find_evtchn(u, unbind.port); 53673cc4bb0SDavid Vrabel if (!evtchn) 537f7116284SIan Campbell break; 538f7116284SIan Campbell 5393f5e554fSJeremy Fitzhardinge disable_irq(irq_from_evtchn(unbind.port)); 54073cc4bb0SDavid Vrabel evtchn_unbind_from_user(u, evtchn); 541f7116284SIan Campbell rc = 0; 542f7116284SIan Campbell break; 543f7116284SIan Campbell } 544f7116284SIan Campbell 545f7116284SIan Campbell case IOCTL_EVTCHN_NOTIFY: { 546f7116284SIan Campbell struct ioctl_evtchn_notify notify; 54773cc4bb0SDavid Vrabel struct user_evtchn *evtchn; 548f7116284SIan Campbell 549f7116284SIan Campbell rc = -EFAULT; 550f7116284SIan Campbell if (copy_from_user(¬ify, uarg, sizeof(notify))) 551f7116284SIan Campbell break; 552f7116284SIan Campbell 553f7116284SIan Campbell rc = -ENOTCONN; 55473cc4bb0SDavid Vrabel evtchn = find_evtchn(u, notify.port); 55573cc4bb0SDavid Vrabel if (evtchn) { 556f7116284SIan Campbell notify_remote_via_evtchn(notify.port); 557f7116284SIan Campbell rc = 0; 558f7116284SIan Campbell } 559f7116284SIan Campbell break; 560f7116284SIan Campbell } 561f7116284SIan Campbell 562f7116284SIan Campbell case IOCTL_EVTCHN_RESET: { 563f7116284SIan Campbell /* Initialise the ring to empty. Clear errors. */ 564f7116284SIan Campbell mutex_lock(&u->ring_cons_mutex); 56573cc4bb0SDavid Vrabel spin_lock_irq(&u->ring_prod_lock); 566f7116284SIan Campbell u->ring_cons = u->ring_prod = u->ring_overflow = 0; 56773cc4bb0SDavid Vrabel spin_unlock_irq(&u->ring_prod_lock); 568f7116284SIan Campbell mutex_unlock(&u->ring_cons_mutex); 569f7116284SIan Campbell rc = 0; 570f7116284SIan Campbell break; 571f7116284SIan Campbell } 572f7116284SIan Campbell 573*fbc872c3SDavid Vrabel case IOCTL_EVTCHN_RESTRICT_DOMID: { 574*fbc872c3SDavid Vrabel struct ioctl_evtchn_restrict_domid ierd; 575*fbc872c3SDavid Vrabel 576*fbc872c3SDavid Vrabel rc = -EACCES; 577*fbc872c3SDavid Vrabel if (u->restrict_domid != UNRESTRICTED_DOMID) 578*fbc872c3SDavid Vrabel break; 579*fbc872c3SDavid Vrabel 580*fbc872c3SDavid Vrabel rc = -EFAULT; 581*fbc872c3SDavid Vrabel if (copy_from_user(&ierd, uarg, sizeof(ierd))) 582*fbc872c3SDavid Vrabel break; 583*fbc872c3SDavid Vrabel 584*fbc872c3SDavid Vrabel rc = -EINVAL; 585*fbc872c3SDavid Vrabel if (ierd.domid == 0 || ierd.domid >= DOMID_FIRST_RESERVED) 586*fbc872c3SDavid Vrabel break; 587*fbc872c3SDavid Vrabel 588*fbc872c3SDavid Vrabel u->restrict_domid = ierd.domid; 589*fbc872c3SDavid Vrabel rc = 0; 590*fbc872c3SDavid Vrabel 591*fbc872c3SDavid Vrabel break; 592*fbc872c3SDavid Vrabel } 593*fbc872c3SDavid Vrabel 594f7116284SIan Campbell default: 595f7116284SIan Campbell rc = -ENOSYS; 596f7116284SIan Campbell break; 597f7116284SIan Campbell } 5980a4666b5SJeremy Fitzhardinge mutex_unlock(&u->bind_mutex); 599f7116284SIan Campbell 600f7116284SIan Campbell return rc; 601f7116284SIan Campbell } 602f7116284SIan Campbell 603f7116284SIan Campbell static unsigned int evtchn_poll(struct file *file, poll_table *wait) 604f7116284SIan Campbell { 605f7116284SIan Campbell unsigned int mask = POLLOUT | POLLWRNORM; 606f7116284SIan Campbell struct per_user_data *u = file->private_data; 607f7116284SIan Campbell 608f7116284SIan Campbell poll_wait(file, &u->evtchn_wait, wait); 609f7116284SIan Campbell if (u->ring_cons != u->ring_prod) 610f7116284SIan Campbell mask |= POLLIN | POLLRDNORM; 611f7116284SIan Campbell if (u->ring_overflow) 612f7116284SIan Campbell mask = POLLERR; 613f7116284SIan Campbell return mask; 614f7116284SIan Campbell } 615f7116284SIan Campbell 616f7116284SIan Campbell static int evtchn_fasync(int fd, struct file *filp, int on) 617f7116284SIan Campbell { 618f7116284SIan Campbell struct per_user_data *u = filp->private_data; 619f7116284SIan Campbell return fasync_helper(fd, filp, on, &u->evtchn_async_queue); 620f7116284SIan Campbell } 621f7116284SIan Campbell 622f7116284SIan Campbell static int evtchn_open(struct inode *inode, struct file *filp) 623f7116284SIan Campbell { 624f7116284SIan Campbell struct per_user_data *u; 625f7116284SIan Campbell 626f7116284SIan Campbell u = kzalloc(sizeof(*u), GFP_KERNEL); 627f7116284SIan Campbell if (u == NULL) 628f7116284SIan Campbell return -ENOMEM; 629f7116284SIan Campbell 630f7116284SIan Campbell u->name = kasprintf(GFP_KERNEL, "evtchn:%s", current->comm); 631f7116284SIan Campbell if (u->name == NULL) { 632f7116284SIan Campbell kfree(u); 633f7116284SIan Campbell return -ENOMEM; 634f7116284SIan Campbell } 635f7116284SIan Campbell 636f7116284SIan Campbell init_waitqueue_head(&u->evtchn_wait); 637f7116284SIan Campbell 6380a4666b5SJeremy Fitzhardinge mutex_init(&u->bind_mutex); 639f7116284SIan Campbell mutex_init(&u->ring_cons_mutex); 64073cc4bb0SDavid Vrabel spin_lock_init(&u->ring_prod_lock); 641f7116284SIan Campbell 642*fbc872c3SDavid Vrabel u->restrict_domid = UNRESTRICTED_DOMID; 643*fbc872c3SDavid Vrabel 644f7116284SIan Campbell filp->private_data = u; 645f7116284SIan Campbell 6466eab04a8SJustin P. Mattock return nonseekable_open(inode, filp); 647f7116284SIan Campbell } 648f7116284SIan Campbell 649f7116284SIan Campbell static int evtchn_release(struct inode *inode, struct file *filp) 650f7116284SIan Campbell { 651f7116284SIan Campbell struct per_user_data *u = filp->private_data; 65273cc4bb0SDavid Vrabel struct rb_node *node; 653f7116284SIan Campbell 65473cc4bb0SDavid Vrabel while ((node = u->evtchns.rb_node)) { 65573cc4bb0SDavid Vrabel struct user_evtchn *evtchn; 656f7116284SIan Campbell 65773cc4bb0SDavid Vrabel evtchn = rb_entry(node, struct user_evtchn, node); 65873cc4bb0SDavid Vrabel disable_irq(irq_from_evtchn(evtchn->port)); 65973cc4bb0SDavid Vrabel evtchn_unbind_from_user(u, evtchn); 6603f5e554fSJeremy Fitzhardinge } 6613f5e554fSJeremy Fitzhardinge 66286200154SDavid Vrabel evtchn_free_ring(u->ring); 663f7116284SIan Campbell kfree(u->name); 664f7116284SIan Campbell kfree(u); 665f7116284SIan Campbell 666f7116284SIan Campbell return 0; 667f7116284SIan Campbell } 668f7116284SIan Campbell 669f7116284SIan Campbell static const struct file_operations evtchn_fops = { 670f7116284SIan Campbell .owner = THIS_MODULE, 671f7116284SIan Campbell .read = evtchn_read, 672f7116284SIan Campbell .write = evtchn_write, 673f7116284SIan Campbell .unlocked_ioctl = evtchn_ioctl, 674f7116284SIan Campbell .poll = evtchn_poll, 675f7116284SIan Campbell .fasync = evtchn_fasync, 676f7116284SIan Campbell .open = evtchn_open, 677f7116284SIan Campbell .release = evtchn_release, 678bc7fc5e3SJeremy Fitzhardinge .llseek = no_llseek, 679f7116284SIan Campbell }; 680f7116284SIan Campbell 681f7116284SIan Campbell static struct miscdevice evtchn_miscdev = { 682f7116284SIan Campbell .minor = MISC_DYNAMIC_MINOR, 683376d908fSBastian Blank .name = "xen/evtchn", 684f7116284SIan Campbell .fops = &evtchn_fops, 685f7116284SIan Campbell }; 686f7116284SIan Campbell static int __init evtchn_init(void) 687f7116284SIan Campbell { 688f7116284SIan Campbell int err; 689f7116284SIan Campbell 690f7116284SIan Campbell if (!xen_domain()) 691f7116284SIan Campbell return -ENODEV; 692f7116284SIan Campbell 69318283ea7SWei Liu /* Create '/dev/xen/evtchn'. */ 694f7116284SIan Campbell err = misc_register(&evtchn_miscdev); 695f7116284SIan Campbell if (err != 0) { 696283c0972SJoe Perches pr_err("Could not register /dev/xen/evtchn\n"); 697f7116284SIan Campbell return err; 698f7116284SIan Campbell } 699f7116284SIan Campbell 700283c0972SJoe Perches pr_info("Event-channel device installed\n"); 701f7116284SIan Campbell 702f7116284SIan Campbell return 0; 703f7116284SIan Campbell } 704f7116284SIan Campbell 705f7116284SIan Campbell static void __exit evtchn_cleanup(void) 706f7116284SIan Campbell { 707f7116284SIan Campbell misc_deregister(&evtchn_miscdev); 708f7116284SIan Campbell } 709f7116284SIan Campbell 710f7116284SIan Campbell module_init(evtchn_init); 711f7116284SIan Campbell module_exit(evtchn_cleanup); 712f7116284SIan Campbell 713f7116284SIan Campbell MODULE_LICENSE("GPL"); 714