mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-23 20:53:53 +08:00
3cfa210bf3
Nothing Xen specific in these headers, which get included from a lot of code in the kernel. So prune the includes and move them to the Xen-specific files that actually use them instead. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Jens Axboe <axboe@kernel.dk>
38 lines
828 B
C
38 lines
828 B
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef _ASM_X86_XEN_EVENTS_H
|
|
#define _ASM_X86_XEN_EVENTS_H
|
|
|
|
#include <xen/xen.h>
|
|
|
|
enum ipi_vector {
|
|
XEN_RESCHEDULE_VECTOR,
|
|
XEN_CALL_FUNCTION_VECTOR,
|
|
XEN_CALL_FUNCTION_SINGLE_VECTOR,
|
|
XEN_SPIN_UNLOCK_VECTOR,
|
|
XEN_IRQ_WORK_VECTOR,
|
|
XEN_NMI_VECTOR,
|
|
|
|
XEN_NR_IPIS,
|
|
};
|
|
|
|
static inline int xen_irqs_disabled(struct pt_regs *regs)
|
|
{
|
|
return raw_irqs_disabled_flags(regs->flags);
|
|
}
|
|
|
|
/* No need for a barrier -- XCHG is a barrier on x86. */
|
|
#define xchg_xen_ulong(ptr, val) xchg((ptr), (val))
|
|
|
|
extern int xen_have_vector_callback;
|
|
|
|
/*
|
|
* Events delivered via platform PCI interrupts are always
|
|
* routed to vcpu 0 and hence cannot be rebound.
|
|
*/
|
|
static inline bool xen_support_evtchn_rebind(void)
|
|
{
|
|
return (!xen_hvm_domain() || xen_have_vector_callback);
|
|
}
|
|
|
|
#endif /* _ASM_X86_XEN_EVENTS_H */
|