mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-21 13:58:41 +07:00
15303ba5d1
ARM: - Include icache invalidation optimizations, improving VM startup time - Support for forwarded level-triggered interrupts, improving performance for timers and passthrough platform devices - A small fix for power-management notifiers, and some cosmetic changes PPC: - Add MMIO emulation for vector loads and stores - Allow HPT guests to run on a radix host on POWER9 v2.2 CPUs without requiring the complex thread synchronization of older CPU versions - Improve the handling of escalation interrupts with the XIVE interrupt controller - Support decrement register migration - Various cleanups and bugfixes. s390: - Cornelia Huck passed maintainership to Janosch Frank - Exitless interrupts for emulated devices - Cleanup of cpuflag handling - kvm_stat counter improvements - VSIE improvements - mm cleanup x86: - Hypervisor part of SEV - UMIP, RDPID, and MSR_SMI_COUNT emulation - Paravirtualized TLB shootdown using the new KVM_VCPU_PREEMPTED bit - Allow guests to see TOPOEXT, GFNI, VAES, VPCLMULQDQ, and more AVX512 features - Show vcpu id in its anonymous inode name - Many fixes and cleanups - Per-VCPU MSR bitmaps (already merged through x86/pti branch) - Stable KVM clock when nesting on Hyper-V (merged through x86/hyperv) -----BEGIN PGP SIGNATURE----- iQEcBAABCAAGBQJafvMtAAoJEED/6hsPKofo6YcH/Rzf2RmshrWaC3q82yfIV0Qz Z8N8yJHSaSdc3Jo6cmiVj0zelwAxdQcyjwlT7vxt5SL2yML+/Q0st9Hc3EgGGXPm Il99eJEl+2MYpZgYZqV8ff3mHS5s5Jms+7BITAeh6Rgt+DyNbykEAvzt+MCHK9cP xtsIZQlvRF7HIrpOlaRzOPp3sK2/MDZJ1RBE7wYItK3CUAmsHim/LVYKzZkRTij3 /9b4LP1yMMbziG+Yxt1o682EwJB5YIat6fmDG9uFeEVI5rWWN7WFubqs8gCjYy/p FX+BjpOdgTRnX+1m9GIj0Jlc/HKMXryDfSZS07Zy4FbGEwSiI5SfKECub4mDhuE= =C/uD -----END PGP SIGNATURE----- Merge tag 'kvm-4.16-1' of git://git.kernel.org/pub/scm/virt/kvm/kvm Pull KVM updates from Radim Krčmář: "ARM: - icache invalidation optimizations, improving VM startup time - support for forwarded level-triggered interrupts, improving performance for timers and passthrough platform devices - a small fix for power-management notifiers, and some cosmetic changes PPC: - add MMIO emulation for vector loads and stores - allow HPT guests to run on a radix host on POWER9 v2.2 CPUs without requiring the complex thread synchronization of older CPU versions - improve the handling of escalation interrupts with the XIVE interrupt controller - support decrement register migration - various cleanups and bugfixes. s390: - Cornelia Huck passed maintainership to Janosch Frank - exitless interrupts for emulated devices - cleanup of cpuflag handling - kvm_stat counter improvements - VSIE improvements - mm cleanup x86: - hypervisor part of SEV - UMIP, RDPID, and MSR_SMI_COUNT emulation - paravirtualized TLB shootdown using the new KVM_VCPU_PREEMPTED bit - allow guests to see TOPOEXT, GFNI, VAES, VPCLMULQDQ, and more AVX512 features - show vcpu id in its anonymous inode name - many fixes and cleanups - per-VCPU MSR bitmaps (already merged through x86/pti branch) - stable KVM clock when nesting on Hyper-V (merged through x86/hyperv)" * tag 'kvm-4.16-1' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (197 commits) KVM: PPC: Book3S: Add MMIO emulation for VMX instructions KVM: PPC: Book3S HV: Branch inside feature section KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code KVM: PPC: Book3S PR: Fix broken select due to misspelling KVM: x86: don't forget vcpu_put() in kvm_arch_vcpu_ioctl_set_sregs() KVM: PPC: Book3S PR: Fix svcpu copying with preemption enabled KVM: PPC: Book3S HV: Drop locks before reading guest memory kvm: x86: remove efer_reload entry in kvm_vcpu_stat KVM: x86: AMD Processor Topology Information x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running nested kvm: embed vcpu id to dentry of vcpu anon inode kvm: Map PFN-type memory regions as writable (if possible) x86/kvm: Make it compile on 32bit and with HYPYERVISOR_GUEST=n KVM: arm/arm64: Fixup userspace irqchip static key optimization KVM: arm/arm64: Fix userspace_irqchip_in_use counting KVM: arm/arm64: Fix incorrect timer_is_pending logic MAINTAINERS: update KVM/s390 maintainers MAINTAINERS: add Halil as additional vfio-ccw maintainer MAINTAINERS: add David as a reviewer for KVM/s390 ...
139 lines
4.2 KiB
C
139 lines
4.2 KiB
C
/*
|
|
* Copyright 2016,2017 IBM Corporation.
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the License, or (at your option) any later version.
|
|
*/
|
|
#ifndef _ASM_POWERPC_XIVE_H
|
|
#define _ASM_POWERPC_XIVE_H
|
|
|
|
#define XIVE_INVALID_VP 0xffffffff
|
|
|
|
#ifdef CONFIG_PPC_XIVE
|
|
|
|
/*
|
|
* Thread Interrupt Management Area (TIMA)
|
|
*
|
|
* This is a global MMIO region divided in 4 pages of varying access
|
|
* permissions, providing access to per-cpu interrupt management
|
|
* functions. It always identifies the CPU doing the access based
|
|
* on the PowerBus initiator ID, thus we always access via the
|
|
* same offset regardless of where the code is executing
|
|
*/
|
|
extern void __iomem *xive_tima;
|
|
|
|
/*
|
|
* Offset in the TM area of our current execution level (provided by
|
|
* the backend)
|
|
*/
|
|
extern u32 xive_tima_offset;
|
|
|
|
/*
|
|
* Per-irq data (irq_get_handler_data for normal IRQs), IPIs
|
|
* have it stored in the xive_cpu structure. We also cache
|
|
* for normal interrupts the current target CPU.
|
|
*
|
|
* This structure is setup by the backend for each interrupt.
|
|
*/
|
|
struct xive_irq_data {
|
|
u64 flags;
|
|
u64 eoi_page;
|
|
void __iomem *eoi_mmio;
|
|
u64 trig_page;
|
|
void __iomem *trig_mmio;
|
|
u32 esb_shift;
|
|
int src_chip;
|
|
u32 hw_irq;
|
|
|
|
/* Setup/used by frontend */
|
|
int target;
|
|
bool saved_p;
|
|
};
|
|
#define XIVE_IRQ_FLAG_STORE_EOI 0x01
|
|
#define XIVE_IRQ_FLAG_LSI 0x02
|
|
#define XIVE_IRQ_FLAG_SHIFT_BUG 0x04
|
|
#define XIVE_IRQ_FLAG_MASK_FW 0x08
|
|
#define XIVE_IRQ_FLAG_EOI_FW 0x10
|
|
#define XIVE_IRQ_FLAG_H_INT_ESB 0x20
|
|
|
|
/* Special flag set by KVM for excalation interrupts */
|
|
#define XIVE_IRQ_NO_EOI 0x80
|
|
|
|
#define XIVE_INVALID_CHIP_ID -1
|
|
|
|
/* A queue tracking structure in a CPU */
|
|
struct xive_q {
|
|
__be32 *qpage;
|
|
u32 msk;
|
|
u32 idx;
|
|
u32 toggle;
|
|
u64 eoi_phys;
|
|
u32 esc_irq;
|
|
atomic_t count;
|
|
atomic_t pending_count;
|
|
};
|
|
|
|
/* Global enable flags for the XIVE support */
|
|
extern bool __xive_enabled;
|
|
|
|
static inline bool xive_enabled(void) { return __xive_enabled; }
|
|
|
|
extern bool xive_spapr_init(void);
|
|
extern bool xive_native_init(void);
|
|
extern void xive_smp_probe(void);
|
|
extern int xive_smp_prepare_cpu(unsigned int cpu);
|
|
extern void xive_smp_setup_cpu(void);
|
|
extern void xive_smp_disable_cpu(void);
|
|
extern void xive_teardown_cpu(void);
|
|
extern void xive_kexec_teardown_cpu(int secondary);
|
|
extern void xive_shutdown(void);
|
|
extern void xive_flush_interrupt(void);
|
|
|
|
/* xmon hook */
|
|
extern void xmon_xive_do_dump(int cpu);
|
|
|
|
/* APIs used by KVM */
|
|
extern u32 xive_native_default_eq_shift(void);
|
|
extern u32 xive_native_alloc_vp_block(u32 max_vcpus);
|
|
extern void xive_native_free_vp_block(u32 vp_base);
|
|
extern int xive_native_populate_irq_data(u32 hw_irq,
|
|
struct xive_irq_data *data);
|
|
extern void xive_cleanup_irq_data(struct xive_irq_data *xd);
|
|
extern u32 xive_native_alloc_irq(void);
|
|
extern void xive_native_free_irq(u32 irq);
|
|
extern int xive_native_configure_irq(u32 hw_irq, u32 target, u8 prio, u32 sw_irq);
|
|
|
|
extern int xive_native_configure_queue(u32 vp_id, struct xive_q *q, u8 prio,
|
|
__be32 *qpage, u32 order, bool can_escalate);
|
|
extern void xive_native_disable_queue(u32 vp_id, struct xive_q *q, u8 prio);
|
|
|
|
extern void xive_native_sync_source(u32 hw_irq);
|
|
extern bool is_xive_irq(struct irq_chip *chip);
|
|
extern int xive_native_enable_vp(u32 vp_id, bool single_escalation);
|
|
extern int xive_native_disable_vp(u32 vp_id);
|
|
extern int xive_native_get_vp_info(u32 vp_id, u32 *out_cam_id, u32 *out_chip_id);
|
|
extern bool xive_native_has_single_escalation(void);
|
|
|
|
#else
|
|
|
|
static inline bool xive_enabled(void) { return false; }
|
|
|
|
static inline bool xive_spapr_init(void) { return false; }
|
|
static inline bool xive_native_init(void) { return false; }
|
|
static inline void xive_smp_probe(void) { }
|
|
static inline int xive_smp_prepare_cpu(unsigned int cpu) { return -EINVAL; }
|
|
static inline void xive_smp_setup_cpu(void) { }
|
|
static inline void xive_smp_disable_cpu(void) { }
|
|
static inline void xive_kexec_teardown_cpu(int secondary) { }
|
|
static inline void xive_shutdown(void) { }
|
|
static inline void xive_flush_interrupt(void) { }
|
|
|
|
static inline u32 xive_native_alloc_vp_block(u32 max_vcpus) { return XIVE_INVALID_VP; }
|
|
static inline void xive_native_free_vp_block(u32 vp_base) { }
|
|
|
|
#endif
|
|
|
|
#endif /* _ASM_POWERPC_XIVE_H */
|