blob: 98b30c1613b28031c27a35990510a2bafc0697c4 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Isaku Yamahatae04d0d02008-04-02 10:53:55 -07002#ifndef INCLUDE_XEN_OPS_H
3#define INCLUDE_XEN_OPS_H
4
5#include <linux/percpu.h>
Stanislaw Gruszkacd979882014-02-26 11:30:30 +01006#include <linux/notifier.h>
Daniel Kiperbe81c8a2014-06-30 19:53:02 +02007#include <linux/efi.h>
Juergen Grossf030aad2018-08-28 09:40:13 +02008#include <xen/features.h>
Ian Campbell7892f692012-10-16 17:19:15 +01009#include <asm/xen/interface.h>
Stefano Stabellini4ccefbe2015-11-05 15:15:07 +000010#include <xen/interface/vcpu.h>
Isaku Yamahatae04d0d02008-04-02 10:53:55 -070011
12DECLARE_PER_CPU(struct vcpu_info *, xen_vcpu);
13
Vitaly Kuznetsov55467de2016-07-29 11:06:48 +020014DECLARE_PER_CPU(uint32_t, xen_vcpu_id);
15static inline uint32_t xen_vcpu_nr(int cpu)
Vitaly Kuznetsov88e957d2016-06-30 17:56:37 +020016{
17 return per_cpu(xen_vcpu_id, cpu);
18}
19
Ankur Arora0b64ffb2017-06-02 17:05:59 -070020#define XEN_VCPU_ID_INVALID U32_MAX
21
Ian Campbell03c81422011-02-17 11:04:20 +000022void xen_arch_pre_suspend(void);
23void xen_arch_post_suspend(int suspend_cancelled);
Jeremy Fitzhardinge0e913982008-05-26 23:31:27 +010024
Isaku Yamahataad55db92008-07-08 15:06:32 -070025void xen_timer_resume(void);
26void xen_arch_resume(void);
Boris Ostrovsky2b953a52015-04-28 18:46:20 -040027void xen_arch_suspend(void);
Isaku Yamahataad55db92008-07-08 15:06:32 -070028
Julien Grall5d9404e2017-04-24 18:58:37 +010029void xen_reboot(int reason);
30
Stanislaw Gruszkacd979882014-02-26 11:30:30 +010031void xen_resume_notifier_register(struct notifier_block *nb);
32void xen_resume_notifier_unregister(struct notifier_block *nb);
33
Stefano Stabellini4ccefbe2015-11-05 15:15:07 +000034bool xen_vcpu_stolen(int vcpu);
35void xen_setup_runstate_info(int cpu);
Juergen Grossecb23dc2016-05-20 09:26:48 +020036void xen_time_setup_guest(void);
Dongli Zhang5e25f5d2017-11-01 09:46:33 +080037void xen_manage_runstate_time(int action);
Stefano Stabellini4ccefbe2015-11-05 15:15:07 +000038void xen_get_runstate_snapshot(struct vcpu_runstate_info *res);
Juergen Grossd34c30c2016-07-26 14:15:11 +020039u64 xen_steal_clock(int cpu);
Stefano Stabellini4ccefbe2015-11-05 15:15:07 +000040
Stefano Stabellini016b6f52010-05-14 12:45:07 +010041int xen_setup_shutdown_event(void);
42
Alex Nixon08bbc9d2009-02-09 12:05:46 -080043extern unsigned long *xen_contiguous_bitmap;
Vitaly Kuznetsov16624392017-03-14 18:35:54 +010044
Stefano Stabellinif9005572018-10-31 16:11:49 -070045#if defined(CONFIG_XEN_PV) || defined(CONFIG_ARM) || defined(CONFIG_ARM64)
Stefano Stabellini1b65c4e2013-10-10 13:41:10 +000046int xen_create_contiguous_region(phys_addr_t pstart, unsigned int order,
Stefano Stabellini69908902013-10-09 16:56:32 +000047 unsigned int address_bits,
48 dma_addr_t *dma_handle);
Alex Nixon08bbc9d2009-02-09 12:05:46 -080049
Stefano Stabellini1b65c4e2013-10-10 13:41:10 +000050void xen_destroy_contiguous_region(phys_addr_t pstart, unsigned int order);
Vitaly Kuznetsov16624392017-03-14 18:35:54 +010051#else
52static inline int xen_create_contiguous_region(phys_addr_t pstart,
53 unsigned int order,
54 unsigned int address_bits,
55 dma_addr_t *dma_handle)
56{
57 return 0;
58}
59
60static inline void xen_destroy_contiguous_region(phys_addr_t pstart,
61 unsigned int order) { }
Stefano Stabellinif9005572018-10-31 16:11:49 -070062#endif
Juergen Grossf030aad2018-08-28 09:40:13 +020063
Stefano Stabellinif9005572018-10-31 16:11:49 -070064#if defined(CONFIG_XEN_PV)
65int xen_remap_pfn(struct vm_area_struct *vma, unsigned long addr,
66 xen_pfn_t *pfn, int nr, int *err_ptr, pgprot_t prot,
67 unsigned int domid, bool no_translate, struct page **pages);
68#else
Juergen Grossf030aad2018-08-28 09:40:13 +020069static inline int xen_remap_pfn(struct vm_area_struct *vma, unsigned long addr,
70 xen_pfn_t *pfn, int nr, int *err_ptr,
71 pgprot_t prot, unsigned int domid,
72 bool no_translate, struct page **pages)
73{
74 BUG();
75 return 0;
76}
Vitaly Kuznetsov16624392017-03-14 18:35:54 +010077#endif
Alex Nixon08bbc9d2009-02-09 12:05:46 -080078
David Howellsc140d872012-03-28 18:30:02 +010079struct vm_area_struct;
David Vrabel4e8c0c82015-03-11 14:49:57 +000080
Paul Durrantec4001c2017-11-03 17:04:11 +000081#ifdef CONFIG_XEN_AUTO_XLATE
David Vrabel4e8c0c82015-03-11 14:49:57 +000082int xen_xlate_remap_gfn_array(struct vm_area_struct *vma,
David Vrabel628c28e2015-03-11 14:49:56 +000083 unsigned long addr,
David Vrabel4e8c0c82015-03-11 14:49:57 +000084 xen_pfn_t *gfn, int nr,
85 int *err_ptr, pgprot_t prot,
Juergen Grossf030aad2018-08-28 09:40:13 +020086 unsigned int domid,
David Vrabel628c28e2015-03-11 14:49:56 +000087 struct page **pages);
88int xen_xlate_unmap_gfn_range(struct vm_area_struct *vma,
89 int nr, struct page **pages);
Paul Durrantec4001c2017-11-03 17:04:11 +000090#else
91/*
92 * These two functions are called from arch/x86/xen/mmu.c and so stubs
93 * are needed for a configuration not specifying CONFIG_XEN_AUTO_XLATE.
94 */
95static inline int xen_xlate_remap_gfn_array(struct vm_area_struct *vma,
96 unsigned long addr,
97 xen_pfn_t *gfn, int nr,
98 int *err_ptr, pgprot_t prot,
99 unsigned int domid,
100 struct page **pages)
101{
102 return -EOPNOTSUPP;
103}
104
105static inline int xen_xlate_unmap_gfn_range(struct vm_area_struct *vma,
106 int nr, struct page **pages)
107{
108 return -EOPNOTSUPP;
109}
110#endif
111
Arnd Bergmanna78d14a2019-07-22 09:46:29 +0200112int xen_remap_vma_range(struct vm_area_struct *vma, unsigned long addr,
113 unsigned long len);
114
Juergen Grossf030aad2018-08-28 09:40:13 +0200115/*
116 * xen_remap_domain_gfn_array() - map an array of foreign frames by gfn
117 * @vma: VMA to map the pages into
118 * @addr: Address at which to map the pages
119 * @gfn: Array of GFNs to map
120 * @nr: Number entries in the GFN array
121 * @err_ptr: Returns per-GFN error status.
122 * @prot: page protection mask
123 * @domid: Domain owning the pages
124 * @pages: Array of pages if this domain has an auto-translated physmap
125 *
126 * @gfn and @err_ptr may point to the same buffer, the GFNs will be
127 * overwritten by the error codes after they are mapped.
128 *
129 * Returns the number of successfully mapped frames, or a -ve error
130 * code.
131 */
132static inline int xen_remap_domain_gfn_array(struct vm_area_struct *vma,
133 unsigned long addr,
134 xen_pfn_t *gfn, int nr,
135 int *err_ptr, pgprot_t prot,
136 unsigned int domid,
137 struct page **pages)
138{
139 if (xen_feature(XENFEAT_auto_translated_physmap))
140 return xen_xlate_remap_gfn_array(vma, addr, gfn, nr, err_ptr,
141 prot, domid, pages);
142
143 /* We BUG_ON because it's a programmer error to pass a NULL err_ptr,
144 * and the consequences later is quite hard to detect what the actual
145 * cause of "wrong memory was mapped in".
146 */
147 BUG_ON(err_ptr == NULL);
148 return xen_remap_pfn(vma, addr, gfn, nr, err_ptr, prot, domid,
149 false, pages);
150}
151
152/*
153 * xen_remap_domain_mfn_array() - map an array of foreign frames by mfn
154 * @vma: VMA to map the pages into
155 * @addr: Address at which to map the pages
156 * @mfn: Array of MFNs to map
157 * @nr: Number entries in the MFN array
158 * @err_ptr: Returns per-MFN error status.
159 * @prot: page protection mask
160 * @domid: Domain owning the pages
161 * @pages: Array of pages if this domain has an auto-translated physmap
162 *
163 * @mfn and @err_ptr may point to the same buffer, the MFNs will be
164 * overwritten by the error codes after they are mapped.
165 *
166 * Returns the number of successfully mapped frames, or a -ve error
167 * code.
168 */
169static inline int xen_remap_domain_mfn_array(struct vm_area_struct *vma,
170 unsigned long addr, xen_pfn_t *mfn,
171 int nr, int *err_ptr,
172 pgprot_t prot, unsigned int domid,
173 struct page **pages)
174{
175 if (xen_feature(XENFEAT_auto_translated_physmap))
176 return -EOPNOTSUPP;
177
178 return xen_remap_pfn(vma, addr, mfn, nr, err_ptr, prot, domid,
179 true, pages);
180}
181
182/* xen_remap_domain_gfn_range() - map a range of foreign frames
183 * @vma: VMA to map the pages into
184 * @addr: Address at which to map the pages
185 * @gfn: First GFN to map.
186 * @nr: Number frames to map
187 * @prot: page protection mask
188 * @domid: Domain owning the pages
189 * @pages: Array of pages if this domain has an auto-translated physmap
190 *
191 * Returns the number of successfully mapped frames, or a -ve error
192 * code.
193 */
194static inline int xen_remap_domain_gfn_range(struct vm_area_struct *vma,
195 unsigned long addr,
196 xen_pfn_t gfn, int nr,
197 pgprot_t prot, unsigned int domid,
198 struct page **pages)
199{
200 if (xen_feature(XENFEAT_auto_translated_physmap))
201 return -EOPNOTSUPP;
202
203 return xen_remap_pfn(vma, addr, &gfn, nr, NULL, prot, domid, false,
204 pages);
205}
206
207int xen_unmap_domain_gfn_range(struct vm_area_struct *vma,
208 int numpgs, struct page **pages);
209
Shannon Zhao243848f2016-04-07 20:03:19 +0800210int xen_xlate_map_ballooned_pages(xen_pfn_t **pfns, void **vaddr,
211 unsigned long nr_grant_frames);
Ian Campbellde1ef202009-05-21 10:09:46 +0100212
Konrad Rzeszutek Wilk394b40f2012-11-27 11:39:40 -0500213bool xen_running_on_version_or_later(unsigned int major, unsigned int minor);
Daniel Kiperbe81c8a2014-06-30 19:53:02 +0200214
Shannon Zhaoa62ed502016-04-07 20:03:31 +0800215efi_status_t xen_efi_get_time(efi_time_t *tm, efi_time_cap_t *tc);
216efi_status_t xen_efi_set_time(efi_time_t *tm);
217efi_status_t xen_efi_get_wakeup_time(efi_bool_t *enabled, efi_bool_t *pending,
218 efi_time_t *tm);
219efi_status_t xen_efi_set_wakeup_time(efi_bool_t enabled, efi_time_t *tm);
220efi_status_t xen_efi_get_variable(efi_char16_t *name, efi_guid_t *vendor,
221 u32 *attr, unsigned long *data_size,
222 void *data);
223efi_status_t xen_efi_get_next_variable(unsigned long *name_size,
224 efi_char16_t *name, efi_guid_t *vendor);
225efi_status_t xen_efi_set_variable(efi_char16_t *name, efi_guid_t *vendor,
226 u32 attr, unsigned long data_size,
227 void *data);
228efi_status_t xen_efi_query_variable_info(u32 attr, u64 *storage_space,
229 u64 *remaining_space,
230 u64 *max_variable_size);
231efi_status_t xen_efi_get_next_high_mono_count(u32 *count);
232efi_status_t xen_efi_update_capsule(efi_capsule_header_t **capsules,
233 unsigned long count, unsigned long sg_list);
234efi_status_t xen_efi_query_capsule_caps(efi_capsule_header_t **capsules,
235 unsigned long count, u64 *max_size,
236 int *reset_type);
Julien Gralle371fd72017-04-24 18:58:39 +0100237void xen_efi_reset_system(int reset_type, efi_status_t status,
238 unsigned long data_size, efi_char16_t *data);
239
Daniel Kiperbe81c8a2014-06-30 19:53:02 +0200240
David Vrabelfdfd8112015-02-19 15:23:17 +0000241#ifdef CONFIG_PREEMPT
242
243static inline void xen_preemptible_hcall_begin(void)
244{
245}
246
247static inline void xen_preemptible_hcall_end(void)
248{
249}
250
251#else
252
253DECLARE_PER_CPU(bool, xen_in_preemptible_hcall);
254
255static inline void xen_preemptible_hcall_begin(void)
256{
257 __this_cpu_write(xen_in_preemptible_hcall, true);
258}
259
260static inline void xen_preemptible_hcall_end(void)
261{
262 __this_cpu_write(xen_in_preemptible_hcall, false);
263}
264
265#endif /* CONFIG_PREEMPT */
266
Isaku Yamahatae04d0d02008-04-02 10:53:55 -0700267#endif /* INCLUDE_XEN_OPS_H */