mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Add plumbing to the AMD IOMMU driver to allow KVM to control whether or not an IRTE is configured to generate GA log interrupts. KVM only needs a notification if the target vCPU is blocking, so the vCPU can be awakened. If a vCPU is preempted or exits to userspace, KVM clears is_run, but will set the vCPU back to running when userspace does KVM_RUN and/or the vCPU task is scheduled back in, i.e. KVM doesn't need a notification. Unconditionally pass "true" in all KVM paths to isolate the IOMMU changes from the KVM changes insofar as possible. Opportunistically swap the ordering of parameters for amd_iommu_update_ga() so that the match amd_iommu_activate_guest_mode(). Note, as of this writing, the AMD IOMMU manual doesn't list GALogIntr as a non-cached field, but per AMD hardware architects, it's not cached and can be safely updated without an invalidation. Link: https://lore.kernel.org/all/b29b8c22-2fd4-4b5e-b755-9198874157c7@amd.com Cc: Vasant Hegde <vasant.hegde@amd.com> Cc: Joao Martins <joao.m.martins@oracle.com> Link: https://lore.kernel.org/r/20250611224604.313496-62-seanjc@google.com Signed-off-by: Sean Christopherson <seanjc@google.com>
90 lines
2.4 KiB
C
90 lines
2.4 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* Copyright (C) 2012 Advanced Micro Devices, Inc.
|
|
* Author: Joerg Roedel <joerg.roedel@amd.com>
|
|
*
|
|
* This header file contains the interface of the interrupt remapping code to
|
|
* the x86 interrupt management code.
|
|
*/
|
|
|
|
#ifndef __X86_IRQ_REMAPPING_H
|
|
#define __X86_IRQ_REMAPPING_H
|
|
|
|
#include <asm/irqdomain.h>
|
|
#include <asm/hw_irq.h>
|
|
#include <asm/io_apic.h>
|
|
|
|
struct msi_msg;
|
|
struct irq_alloc_info;
|
|
|
|
enum irq_remap_cap {
|
|
IRQ_POSTING_CAP = 0,
|
|
};
|
|
|
|
enum {
|
|
IRQ_REMAP_XAPIC_MODE,
|
|
IRQ_REMAP_X2APIC_MODE,
|
|
};
|
|
|
|
/*
|
|
* This is mainly used to communicate information back-and-forth
|
|
* between SVM and IOMMU for setting up and tearing down posted
|
|
* interrupt
|
|
*/
|
|
struct amd_iommu_pi_data {
|
|
u64 vapic_addr; /* Physical address of the vCPU's vAPIC. */
|
|
u32 ga_tag;
|
|
u32 vector; /* Guest vector of the interrupt */
|
|
int cpu;
|
|
bool ga_log_intr;
|
|
bool is_guest_mode;
|
|
void *ir_data;
|
|
};
|
|
|
|
struct intel_iommu_pi_data {
|
|
u64 pi_desc_addr; /* Physical address of PI Descriptor */
|
|
u32 vector; /* Guest vector of the interrupt */
|
|
};
|
|
|
|
#ifdef CONFIG_IRQ_REMAP
|
|
|
|
extern raw_spinlock_t irq_2_ir_lock;
|
|
|
|
extern bool irq_remapping_cap(enum irq_remap_cap cap);
|
|
extern void set_irq_remapping_broken(void);
|
|
extern int irq_remapping_prepare(void);
|
|
extern int irq_remapping_enable(void);
|
|
extern void irq_remapping_disable(void);
|
|
extern int irq_remapping_reenable(int);
|
|
extern int irq_remap_enable_fault_handling(void);
|
|
extern void panic_if_irq_remap(const char *msg);
|
|
|
|
/* Get parent irqdomain for interrupt remapping irqdomain */
|
|
static inline struct irq_domain *arch_get_ir_parent_domain(void)
|
|
{
|
|
return x86_vector_domain;
|
|
}
|
|
|
|
extern bool enable_posted_msi;
|
|
|
|
static inline bool posted_msi_supported(void)
|
|
{
|
|
return enable_posted_msi && irq_remapping_cap(IRQ_POSTING_CAP);
|
|
}
|
|
|
|
#else /* CONFIG_IRQ_REMAP */
|
|
|
|
static inline bool irq_remapping_cap(enum irq_remap_cap cap) { return 0; }
|
|
static inline void set_irq_remapping_broken(void) { }
|
|
static inline int irq_remapping_prepare(void) { return -ENODEV; }
|
|
static inline int irq_remapping_enable(void) { return -ENODEV; }
|
|
static inline void irq_remapping_disable(void) { }
|
|
static inline int irq_remapping_reenable(int eim) { return -ENODEV; }
|
|
static inline int irq_remap_enable_fault_handling(void) { return -ENODEV; }
|
|
|
|
static inline void panic_if_irq_remap(const char *msg)
|
|
{
|
|
}
|
|
|
|
#endif /* CONFIG_IRQ_REMAP */
|
|
#endif /* __X86_IRQ_REMAPPING_H */
|