1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3 * Copyright (C) 2015, 2016 ARM Ltd.
4 */
5
6 #include <linux/interrupt.h>
7 #include <linux/irq.h>
8 #include <linux/kvm.h>
9 #include <linux/kvm_host.h>
10 #include <linux/list_sort.h>
11 #include <linux/nospec.h>
12
13 #include <asm/kvm_hyp.h>
14
15 #include "vgic.h"
16
17 #define CREATE_TRACE_POINTS
18 #include "trace.h"
19
20 struct vgic_global kvm_vgic_global_state __ro_after_init = {
21 .gicv3_cpuif = STATIC_KEY_FALSE_INIT,
22 };
23
24 /*
25 * Locking order is always:
26 * kvm->lock (mutex)
27 * vcpu->mutex (mutex)
28 * kvm->arch.config_lock (mutex)
29 * its->cmd_lock (mutex)
30 * its->its_lock (mutex)
31 * vgic_dist->lpi_xa.xa_lock must be taken with IRQs disabled
32 * vgic_cpu->ap_list_lock must be taken with IRQs disabled
33 * vgic_irq->irq_lock must be taken with IRQs disabled
34 *
35 * As the ap_list_lock might be taken from the timer interrupt handler,
36 * we have to disable IRQs before taking this lock and everything lower
37 * than it.
38 *
39 * The config_lock has additional ordering requirements:
40 * kvm->slots_lock
41 * kvm->srcu
42 * kvm->arch.config_lock
43 *
44 * If you need to take multiple locks, always take the upper lock first,
45 * then the lower ones, e.g. first take the its_lock, then the irq_lock.
46 * If you are already holding a lock and need to take a higher one, you
47 * have to drop the lower ranking lock first and re-acquire it after having
48 * taken the upper one.
49 *
50 * When taking more than one ap_list_lock at the same time, always take the
51 * lowest numbered VCPU's ap_list_lock first, so:
52 * vcpuX->vcpu_id < vcpuY->vcpu_id:
53 * raw_spin_lock(vcpuX->arch.vgic_cpu.ap_list_lock);
54 * raw_spin_lock(vcpuY->arch.vgic_cpu.ap_list_lock);
55 *
56 * Since the VGIC must support injecting virtual interrupts from ISRs, we have
57 * to use the raw_spin_lock_irqsave/raw_spin_unlock_irqrestore versions of outer
58 * spinlocks for any lock that may be taken while injecting an interrupt.
59 */
60
61 /*
62 * Index the VM's xarray of mapped LPIs and return a reference to the IRQ
63 * structure. The caller is expected to call vgic_put_irq() later once it's
64 * finished with the IRQ.
65 */
vgic_get_lpi(struct kvm * kvm,u32 intid)66 static struct vgic_irq *vgic_get_lpi(struct kvm *kvm, u32 intid)
67 {
68 struct vgic_dist *dist = &kvm->arch.vgic;
69 struct vgic_irq *irq = NULL;
70
71 rcu_read_lock();
72
73 irq = xa_load(&dist->lpi_xa, intid);
74 if (!vgic_try_get_irq_ref(irq))
75 irq = NULL;
76
77 rcu_read_unlock();
78
79 return irq;
80 }
81
82 /*
83 * This looks up the virtual interrupt ID to get the corresponding
84 * struct vgic_irq. It also increases the refcount, so any caller is expected
85 * to call vgic_put_irq() once it's finished with this IRQ.
86 */
vgic_get_irq(struct kvm * kvm,u32 intid)87 struct vgic_irq *vgic_get_irq(struct kvm *kvm, u32 intid)
88 {
89 /* SPIs */
90 if (intid >= VGIC_NR_PRIVATE_IRQS &&
91 intid < (kvm->arch.vgic.nr_spis + VGIC_NR_PRIVATE_IRQS)) {
92 intid = array_index_nospec(intid, kvm->arch.vgic.nr_spis + VGIC_NR_PRIVATE_IRQS);
93 return &kvm->arch.vgic.spis[intid - VGIC_NR_PRIVATE_IRQS];
94 }
95
96 /* LPIs */
97 if (intid >= VGIC_MIN_LPI)
98 return vgic_get_lpi(kvm, intid);
99
100 return NULL;
101 }
102
vgic_get_vcpu_irq(struct kvm_vcpu * vcpu,u32 intid)103 struct vgic_irq *vgic_get_vcpu_irq(struct kvm_vcpu *vcpu, u32 intid)
104 {
105 if (WARN_ON(!vcpu))
106 return NULL;
107
108 /* SGIs and PPIs */
109 if (intid < VGIC_NR_PRIVATE_IRQS) {
110 intid = array_index_nospec(intid, VGIC_NR_PRIVATE_IRQS);
111 return &vcpu->arch.vgic_cpu.private_irqs[intid];
112 }
113
114 return vgic_get_irq(vcpu->kvm, intid);
115 }
116
vgic_release_lpi_locked(struct vgic_dist * dist,struct vgic_irq * irq)117 static void vgic_release_lpi_locked(struct vgic_dist *dist, struct vgic_irq *irq)
118 {
119 lockdep_assert_held(&dist->lpi_xa.xa_lock);
120 __xa_erase(&dist->lpi_xa, irq->intid);
121 kfree_rcu(irq, rcu);
122 }
123
__vgic_put_irq(struct kvm * kvm,struct vgic_irq * irq)124 static __must_check bool __vgic_put_irq(struct kvm *kvm, struct vgic_irq *irq)
125 {
126 if (irq->intid < VGIC_MIN_LPI)
127 return false;
128
129 return refcount_dec_and_test(&irq->refcount);
130 }
131
vgic_put_irq_norelease(struct kvm * kvm,struct vgic_irq * irq)132 static __must_check bool vgic_put_irq_norelease(struct kvm *kvm, struct vgic_irq *irq)
133 {
134 if (!__vgic_put_irq(kvm, irq))
135 return false;
136
137 irq->pending_release = true;
138 return true;
139 }
140
vgic_put_irq(struct kvm * kvm,struct vgic_irq * irq)141 void vgic_put_irq(struct kvm *kvm, struct vgic_irq *irq)
142 {
143 struct vgic_dist *dist = &kvm->arch.vgic;
144 unsigned long flags;
145
146 /*
147 * Normally the lock is only taken when the refcount drops to 0.
148 * Acquire/release it early on lockdep kernels to make locking issues
149 * in rare release paths a bit more obvious.
150 */
151 if (IS_ENABLED(CONFIG_LOCKDEP) && irq->intid >= VGIC_MIN_LPI) {
152 guard(spinlock_irqsave)(&dist->lpi_xa.xa_lock);
153 }
154
155 if (!__vgic_put_irq(kvm, irq))
156 return;
157
158 xa_lock_irqsave(&dist->lpi_xa, flags);
159 vgic_release_lpi_locked(dist, irq);
160 xa_unlock_irqrestore(&dist->lpi_xa, flags);
161 }
162
vgic_release_deleted_lpis(struct kvm * kvm)163 static void vgic_release_deleted_lpis(struct kvm *kvm)
164 {
165 struct vgic_dist *dist = &kvm->arch.vgic;
166 unsigned long flags, intid;
167 struct vgic_irq *irq;
168
169 xa_lock_irqsave(&dist->lpi_xa, flags);
170
171 xa_for_each(&dist->lpi_xa, intid, irq) {
172 if (irq->pending_release)
173 vgic_release_lpi_locked(dist, irq);
174 }
175
176 xa_unlock_irqrestore(&dist->lpi_xa, flags);
177 }
178
vgic_flush_pending_lpis(struct kvm_vcpu * vcpu)179 void vgic_flush_pending_lpis(struct kvm_vcpu *vcpu)
180 {
181 struct vgic_cpu *vgic_cpu = &vcpu->arch.vgic_cpu;
182 struct vgic_irq *irq, *tmp;
183 bool deleted = false;
184 unsigned long flags;
185
186 raw_spin_lock_irqsave(&vgic_cpu->ap_list_lock, flags);
187
188 list_for_each_entry_safe(irq, tmp, &vgic_cpu->ap_list_head, ap_list) {
189 if (irq->intid >= VGIC_MIN_LPI) {
190 raw_spin_lock(&irq->irq_lock);
191 list_del(&irq->ap_list);
192 irq->vcpu = NULL;
193 raw_spin_unlock(&irq->irq_lock);
194 deleted |= vgic_put_irq_norelease(vcpu->kvm, irq);
195 }
196 }
197
198 raw_spin_unlock_irqrestore(&vgic_cpu->ap_list_lock, flags);
199
200 if (deleted)
201 vgic_release_deleted_lpis(vcpu->kvm);
202 }
203
vgic_irq_set_phys_pending(struct vgic_irq * irq,bool pending)204 void vgic_irq_set_phys_pending(struct vgic_irq *irq, bool pending)
205 {
206 WARN_ON(irq_set_irqchip_state(irq->host_irq,
207 IRQCHIP_STATE_PENDING,
208 pending));
209 }
210
vgic_get_phys_line_level(struct vgic_irq * irq)211 bool vgic_get_phys_line_level(struct vgic_irq *irq)
212 {
213 bool line_level;
214
215 BUG_ON(!irq->hw);
216
217 if (irq->ops && irq->ops->get_input_level)
218 return irq->ops->get_input_level(irq->intid);
219
220 WARN_ON(irq_get_irqchip_state(irq->host_irq,
221 IRQCHIP_STATE_PENDING,
222 &line_level));
223 return line_level;
224 }
225
226 /* Set/Clear the physical active state */
vgic_irq_set_phys_active(struct vgic_irq * irq,bool active)227 void vgic_irq_set_phys_active(struct vgic_irq *irq, bool active)
228 {
229
230 BUG_ON(!irq->hw);
231 WARN_ON(irq_set_irqchip_state(irq->host_irq,
232 IRQCHIP_STATE_ACTIVE,
233 active));
234 }
235
236 /**
237 * vgic_target_oracle - compute the target vcpu for an irq
238 *
239 * @irq: The irq to route. Must be already locked.
240 *
241 * Based on the current state of the interrupt (enabled, pending,
242 * active, vcpu and target_vcpu), compute the next vcpu this should be
243 * given to. Return NULL if this shouldn't be injected at all.
244 *
245 * Requires the IRQ lock to be held.
246 */
vgic_target_oracle(struct vgic_irq * irq)247 struct kvm_vcpu *vgic_target_oracle(struct vgic_irq *irq)
248 {
249 lockdep_assert_held(&irq->irq_lock);
250
251 /* If the interrupt is active, it must stay on the current vcpu */
252 if (irq->active)
253 return irq->vcpu ? : irq->target_vcpu;
254
255 /*
256 * If the IRQ is not active but enabled and pending, we should direct
257 * it to its configured target VCPU.
258 * If the distributor is disabled, pending interrupts shouldn't be
259 * forwarded.
260 */
261 if (irq->enabled && irq_is_pending(irq)) {
262 if (unlikely(irq->target_vcpu &&
263 !irq->target_vcpu->kvm->arch.vgic.enabled))
264 return NULL;
265
266 return irq->target_vcpu;
267 }
268
269 /* If neither active nor pending and enabled, then this IRQ should not
270 * be queued to any VCPU.
271 */
272 return NULL;
273 }
274
275 struct vgic_sort_info {
276 struct kvm_vcpu *vcpu;
277 struct vgic_vmcr vmcr;
278 };
279
280 /*
281 * The order of items in the ap_lists defines how we'll pack things in LRs as
282 * well, the first items in the list being the first things populated in the
283 * LRs.
284 *
285 * Pending, non-active interrupts must be placed at the head of the list.
286 * Otherwise things should be sorted by the priority field and the GIC
287 * hardware support will take care of preemption of priority groups etc.
288 * Interrupts that are not deliverable should be at the end of the list.
289 *
290 * Return negative if "a" sorts before "b", 0 to preserve order, and positive
291 * to sort "b" before "a".
292 */
vgic_irq_cmp(void * priv,const struct list_head * a,const struct list_head * b)293 static int vgic_irq_cmp(void *priv, const struct list_head *a,
294 const struct list_head *b)
295 {
296 struct vgic_irq *irqa = container_of(a, struct vgic_irq, ap_list);
297 struct vgic_irq *irqb = container_of(b, struct vgic_irq, ap_list);
298 struct vgic_sort_info *info = priv;
299 struct kvm_vcpu *vcpu = info->vcpu;
300 bool penda, pendb;
301 int ret;
302
303 /*
304 * list_sort may call this function with the same element when
305 * the list is fairly long.
306 */
307 if (unlikely(irqa == irqb))
308 return 0;
309
310 raw_spin_lock(&irqa->irq_lock);
311 raw_spin_lock_nested(&irqb->irq_lock, SINGLE_DEPTH_NESTING);
312
313 /* Undeliverable interrupts should be last */
314 ret = (int)(vgic_target_oracle(irqb) == vcpu) - (int)(vgic_target_oracle(irqa) == vcpu);
315 if (ret)
316 goto out;
317
318 /* Same thing for interrupts targeting a disabled group */
319 ret = (int)(irqb->group ? info->vmcr.grpen1 : info->vmcr.grpen0);
320 ret -= (int)(irqa->group ? info->vmcr.grpen1 : info->vmcr.grpen0);
321 if (ret)
322 goto out;
323
324 penda = irqa->enabled && irq_is_pending(irqa) && !irqa->active;
325 pendb = irqb->enabled && irq_is_pending(irqb) && !irqb->active;
326
327 ret = (int)pendb - (int)penda;
328 if (ret)
329 goto out;
330
331 /* Both pending and enabled, sort by priority (lower number first) */
332 ret = (int)irqa->priority - (int)irqb->priority;
333 if (ret)
334 goto out;
335
336 /* Finally, HW bit active interrupts have priority over non-HW ones */
337 ret = (int)irqb->hw - (int)irqa->hw;
338
339 out:
340 raw_spin_unlock(&irqb->irq_lock);
341 raw_spin_unlock(&irqa->irq_lock);
342 return ret;
343 }
344
345 /* Must be called with the ap_list_lock held */
vgic_sort_ap_list(struct kvm_vcpu * vcpu)346 static void vgic_sort_ap_list(struct kvm_vcpu *vcpu)
347 {
348 struct vgic_cpu *vgic_cpu = &vcpu->arch.vgic_cpu;
349 struct vgic_sort_info info = { .vcpu = vcpu, };
350
351 lockdep_assert_held(&vgic_cpu->ap_list_lock);
352
353 vgic_get_vmcr(vcpu, &info.vmcr);
354 list_sort(&info, &vgic_cpu->ap_list_head, vgic_irq_cmp);
355 }
356
357 /*
358 * Only valid injection if changing level for level-triggered IRQs or for a
359 * rising edge, and in-kernel connected IRQ lines can only be controlled by
360 * their owner.
361 */
vgic_validate_injection(struct vgic_irq * irq,bool level,void * owner)362 static bool vgic_validate_injection(struct vgic_irq *irq, bool level, void *owner)
363 {
364 if (irq->owner != owner)
365 return false;
366
367 switch (irq->config) {
368 case VGIC_CONFIG_LEVEL:
369 return irq->line_level != level;
370 case VGIC_CONFIG_EDGE:
371 return level;
372 }
373
374 return false;
375 }
376
vgic_model_needs_bcst_kick(struct kvm * kvm)377 static bool vgic_model_needs_bcst_kick(struct kvm *kvm)
378 {
379 /*
380 * A GICv3 (or GICv3-like) system exposing a GICv3 to the guest
381 * needs a broadcast kick to set TDIR globally.
382 *
383 * For systems that do not have TDIR (ARM's own v8.0 CPUs), the
384 * shadow TDIR bit is always set, and so is the register's TC bit,
385 * so no need to kick the CPUs.
386 */
387 return (cpus_have_final_cap(ARM64_HAS_ICH_HCR_EL2_TDIR) &&
388 kvm->arch.vgic.vgic_model == KVM_DEV_TYPE_ARM_VGIC_V3);
389 }
390
391 /*
392 * Check whether an IRQ needs to (and can) be queued to a VCPU's ap list.
393 * Do the queuing if necessary, taking the right locks in the right order.
394 * Returns true when the IRQ was queued, false otherwise.
395 *
396 * Needs to be entered with the IRQ lock already held, but will return
397 * with all locks dropped.
398 */
vgic_queue_irq_unlock(struct kvm * kvm,struct vgic_irq * irq,unsigned long flags)399 bool vgic_queue_irq_unlock(struct kvm *kvm, struct vgic_irq *irq,
400 unsigned long flags) __releases(&irq->irq_lock)
401 {
402 struct kvm_vcpu *vcpu;
403 bool bcast;
404
405 lockdep_assert_held(&irq->irq_lock);
406
407 retry:
408 vcpu = vgic_target_oracle(irq);
409 if (irq->vcpu || !vcpu) {
410 /*
411 * If this IRQ is already on a VCPU's ap_list, then it
412 * cannot be moved or modified and there is no more work for
413 * us to do.
414 *
415 * Otherwise, if the irq is not pending and enabled, it does
416 * not need to be inserted into an ap_list and there is also
417 * no more work for us to do.
418 */
419 raw_spin_unlock_irqrestore(&irq->irq_lock, flags);
420
421 /*
422 * We have to kick the VCPU here, because we could be
423 * queueing an edge-triggered interrupt for which we
424 * get no EOI maintenance interrupt. In that case,
425 * while the IRQ is already on the VCPU's AP list, the
426 * VCPU could have EOI'ed the original interrupt and
427 * won't see this one until it exits for some other
428 * reason.
429 */
430 if (vcpu) {
431 kvm_make_request(KVM_REQ_IRQ_PENDING, vcpu);
432 kvm_vcpu_kick(vcpu);
433 }
434 return false;
435 }
436
437 /*
438 * We must unlock the irq lock to take the ap_list_lock where
439 * we are going to insert this new pending interrupt.
440 */
441 raw_spin_unlock_irqrestore(&irq->irq_lock, flags);
442
443 /* someone can do stuff here, which we re-check below */
444
445 raw_spin_lock_irqsave(&vcpu->arch.vgic_cpu.ap_list_lock, flags);
446 raw_spin_lock(&irq->irq_lock);
447
448 /*
449 * Did something change behind our backs?
450 *
451 * There are two cases:
452 * 1) The irq lost its pending state or was disabled behind our
453 * backs and/or it was queued to another VCPU's ap_list.
454 * 2) Someone changed the affinity on this irq behind our
455 * backs and we are now holding the wrong ap_list_lock.
456 *
457 * In both cases, drop the locks and retry.
458 */
459
460 if (unlikely(irq->vcpu || vcpu != vgic_target_oracle(irq))) {
461 raw_spin_unlock(&irq->irq_lock);
462 raw_spin_unlock_irqrestore(&vcpu->arch.vgic_cpu.ap_list_lock,
463 flags);
464
465 raw_spin_lock_irqsave(&irq->irq_lock, flags);
466 goto retry;
467 }
468
469 /*
470 * Grab a reference to the irq to reflect the fact that it is
471 * now in the ap_list. This is safe as the caller must already hold a
472 * reference on the irq.
473 */
474 vgic_get_irq_ref(irq);
475 list_add_tail(&irq->ap_list, &vcpu->arch.vgic_cpu.ap_list_head);
476 irq->vcpu = vcpu;
477
478 /* A new SPI may result in deactivation trapping on all vcpus */
479 bcast = (vgic_model_needs_bcst_kick(vcpu->kvm) &&
480 vgic_valid_spi(vcpu->kvm, irq->intid) &&
481 atomic_fetch_inc(&vcpu->kvm->arch.vgic.active_spis) == 0);
482
483 raw_spin_unlock(&irq->irq_lock);
484 raw_spin_unlock_irqrestore(&vcpu->arch.vgic_cpu.ap_list_lock, flags);
485
486 if (!bcast) {
487 kvm_make_request(KVM_REQ_IRQ_PENDING, vcpu);
488 kvm_vcpu_kick(vcpu);
489 } else {
490 kvm_make_all_cpus_request(vcpu->kvm, KVM_REQ_IRQ_PENDING);
491 }
492
493 return true;
494 }
495
496 /**
497 * kvm_vgic_inject_irq - Inject an IRQ from a device to the vgic
498 * @kvm: The VM structure pointer
499 * @vcpu: The CPU for PPIs or NULL for global interrupts
500 * @intid: The INTID to inject a new state to.
501 * @level: Edge-triggered: true: to trigger the interrupt
502 * false: to ignore the call
503 * Level-sensitive true: raise the input signal
504 * false: lower the input signal
505 * @owner: The opaque pointer to the owner of the IRQ being raised to verify
506 * that the caller is allowed to inject this IRQ. Userspace
507 * injections will have owner == NULL.
508 *
509 * The VGIC is not concerned with devices being active-LOW or active-HIGH for
510 * level-sensitive interrupts. You can think of the level parameter as 1
511 * being HIGH and 0 being LOW and all devices being active-HIGH.
512 */
kvm_vgic_inject_irq(struct kvm * kvm,struct kvm_vcpu * vcpu,unsigned int intid,bool level,void * owner)513 int kvm_vgic_inject_irq(struct kvm *kvm, struct kvm_vcpu *vcpu,
514 unsigned int intid, bool level, void *owner)
515 {
516 struct vgic_irq *irq;
517 unsigned long flags;
518 int ret;
519
520 ret = vgic_lazy_init(kvm);
521 if (ret)
522 return ret;
523
524 if (!vcpu && intid < VGIC_NR_PRIVATE_IRQS)
525 return -EINVAL;
526
527 trace_vgic_update_irq_pending(vcpu ? vcpu->vcpu_idx : 0, intid, level);
528
529 if (intid < VGIC_NR_PRIVATE_IRQS)
530 irq = vgic_get_vcpu_irq(vcpu, intid);
531 else
532 irq = vgic_get_irq(kvm, intid);
533 if (!irq)
534 return -EINVAL;
535
536 raw_spin_lock_irqsave(&irq->irq_lock, flags);
537
538 if (!vgic_validate_injection(irq, level, owner)) {
539 /* Nothing to see here, move along... */
540 raw_spin_unlock_irqrestore(&irq->irq_lock, flags);
541 vgic_put_irq(kvm, irq);
542 return 0;
543 }
544
545 if (irq->config == VGIC_CONFIG_LEVEL)
546 irq->line_level = level;
547 else
548 irq->pending_latch = true;
549
550 vgic_queue_irq_unlock(kvm, irq, flags);
551 vgic_put_irq(kvm, irq);
552
553 return 0;
554 }
555
556 /* @irq->irq_lock must be held */
kvm_vgic_map_irq(struct kvm_vcpu * vcpu,struct vgic_irq * irq,unsigned int host_irq,struct irq_ops * ops)557 static int kvm_vgic_map_irq(struct kvm_vcpu *vcpu, struct vgic_irq *irq,
558 unsigned int host_irq,
559 struct irq_ops *ops)
560 {
561 struct irq_desc *desc;
562 struct irq_data *data;
563
564 /*
565 * Find the physical IRQ number corresponding to @host_irq
566 */
567 desc = irq_to_desc(host_irq);
568 if (!desc) {
569 kvm_err("%s: no interrupt descriptor\n", __func__);
570 return -EINVAL;
571 }
572 data = irq_desc_get_irq_data(desc);
573 while (data->parent_data)
574 data = data->parent_data;
575
576 irq->hw = true;
577 irq->host_irq = host_irq;
578 irq->hwintid = data->hwirq;
579 irq->ops = ops;
580 return 0;
581 }
582
583 /* @irq->irq_lock must be held */
kvm_vgic_unmap_irq(struct vgic_irq * irq)584 static inline void kvm_vgic_unmap_irq(struct vgic_irq *irq)
585 {
586 irq->hw = false;
587 irq->hwintid = 0;
588 irq->ops = NULL;
589 }
590
kvm_vgic_map_phys_irq(struct kvm_vcpu * vcpu,unsigned int host_irq,u32 vintid,struct irq_ops * ops)591 int kvm_vgic_map_phys_irq(struct kvm_vcpu *vcpu, unsigned int host_irq,
592 u32 vintid, struct irq_ops *ops)
593 {
594 struct vgic_irq *irq = vgic_get_vcpu_irq(vcpu, vintid);
595 unsigned long flags;
596 int ret;
597
598 BUG_ON(!irq);
599
600 raw_spin_lock_irqsave(&irq->irq_lock, flags);
601 ret = kvm_vgic_map_irq(vcpu, irq, host_irq, ops);
602 raw_spin_unlock_irqrestore(&irq->irq_lock, flags);
603 vgic_put_irq(vcpu->kvm, irq);
604
605 return ret;
606 }
607
608 /**
609 * kvm_vgic_reset_mapped_irq - Reset a mapped IRQ
610 * @vcpu: The VCPU pointer
611 * @vintid: The INTID of the interrupt
612 *
613 * Reset the active and pending states of a mapped interrupt. Kernel
614 * subsystems injecting mapped interrupts should reset their interrupt lines
615 * when we are doing a reset of the VM.
616 */
kvm_vgic_reset_mapped_irq(struct kvm_vcpu * vcpu,u32 vintid)617 void kvm_vgic_reset_mapped_irq(struct kvm_vcpu *vcpu, u32 vintid)
618 {
619 struct vgic_irq *irq = vgic_get_vcpu_irq(vcpu, vintid);
620 unsigned long flags;
621
622 if (!irq->hw)
623 goto out;
624
625 raw_spin_lock_irqsave(&irq->irq_lock, flags);
626 irq->active = false;
627 irq->pending_latch = false;
628 irq->line_level = false;
629 raw_spin_unlock_irqrestore(&irq->irq_lock, flags);
630 out:
631 vgic_put_irq(vcpu->kvm, irq);
632 }
633
kvm_vgic_unmap_phys_irq(struct kvm_vcpu * vcpu,unsigned int vintid)634 int kvm_vgic_unmap_phys_irq(struct kvm_vcpu *vcpu, unsigned int vintid)
635 {
636 struct vgic_irq *irq;
637 unsigned long flags;
638
639 if (!vgic_initialized(vcpu->kvm))
640 return -EAGAIN;
641
642 irq = vgic_get_vcpu_irq(vcpu, vintid);
643 BUG_ON(!irq);
644
645 raw_spin_lock_irqsave(&irq->irq_lock, flags);
646 kvm_vgic_unmap_irq(irq);
647 raw_spin_unlock_irqrestore(&irq->irq_lock, flags);
648 vgic_put_irq(vcpu->kvm, irq);
649
650 return 0;
651 }
652
kvm_vgic_get_map(struct kvm_vcpu * vcpu,unsigned int vintid)653 int kvm_vgic_get_map(struct kvm_vcpu *vcpu, unsigned int vintid)
654 {
655 struct vgic_irq *irq = vgic_get_vcpu_irq(vcpu, vintid);
656 unsigned long flags;
657 int ret = -1;
658
659 raw_spin_lock_irqsave(&irq->irq_lock, flags);
660 if (irq->hw)
661 ret = irq->hwintid;
662 raw_spin_unlock_irqrestore(&irq->irq_lock, flags);
663
664 vgic_put_irq(vcpu->kvm, irq);
665 return ret;
666 }
667
668 /**
669 * kvm_vgic_set_owner - Set the owner of an interrupt for a VM
670 *
671 * @vcpu: Pointer to the VCPU (used for PPIs)
672 * @intid: The virtual INTID identifying the interrupt (PPI or SPI)
673 * @owner: Opaque pointer to the owner
674 *
675 * Returns 0 if intid is not already used by another in-kernel device and the
676 * owner is set, otherwise returns an error code.
677 */
kvm_vgic_set_owner(struct kvm_vcpu * vcpu,unsigned int intid,void * owner)678 int kvm_vgic_set_owner(struct kvm_vcpu *vcpu, unsigned int intid, void *owner)
679 {
680 struct vgic_irq *irq;
681 unsigned long flags;
682 int ret = 0;
683
684 if (!vgic_initialized(vcpu->kvm))
685 return -EAGAIN;
686
687 /* SGIs and LPIs cannot be wired up to any device */
688 if (!irq_is_ppi(intid) && !vgic_valid_spi(vcpu->kvm, intid))
689 return -EINVAL;
690
691 irq = vgic_get_vcpu_irq(vcpu, intid);
692 raw_spin_lock_irqsave(&irq->irq_lock, flags);
693 if (irq->owner && irq->owner != owner)
694 ret = -EEXIST;
695 else
696 irq->owner = owner;
697 raw_spin_unlock_irqrestore(&irq->irq_lock, flags);
698
699 return ret;
700 }
701
702 /**
703 * vgic_prune_ap_list - Remove non-relevant interrupts from the list
704 *
705 * @vcpu: The VCPU pointer
706 *
707 * Go over the list of "interesting" interrupts, and prune those that we
708 * won't have to consider in the near future.
709 */
vgic_prune_ap_list(struct kvm_vcpu * vcpu)710 static void vgic_prune_ap_list(struct kvm_vcpu *vcpu)
711 {
712 struct vgic_cpu *vgic_cpu = &vcpu->arch.vgic_cpu;
713 struct vgic_irq *irq, *tmp;
714 bool deleted_lpis = false;
715
716 DEBUG_SPINLOCK_BUG_ON(!irqs_disabled());
717
718 retry:
719 raw_spin_lock(&vgic_cpu->ap_list_lock);
720
721 list_for_each_entry_safe(irq, tmp, &vgic_cpu->ap_list_head, ap_list) {
722 struct kvm_vcpu *target_vcpu, *vcpuA, *vcpuB;
723 bool target_vcpu_needs_kick = false;
724
725 raw_spin_lock(&irq->irq_lock);
726
727 BUG_ON(vcpu != irq->vcpu);
728
729 target_vcpu = vgic_target_oracle(irq);
730
731 if (!target_vcpu) {
732 /*
733 * We don't need to process this interrupt any
734 * further, move it off the list.
735 */
736 list_del(&irq->ap_list);
737 irq->vcpu = NULL;
738 raw_spin_unlock(&irq->irq_lock);
739
740 /*
741 * This vgic_put_irq call matches the
742 * vgic_get_irq_ref in vgic_queue_irq_unlock,
743 * where we added the LPI to the ap_list. As
744 * we remove the irq from the list, we drop
745 * also drop the refcount.
746 */
747 deleted_lpis |= vgic_put_irq_norelease(vcpu->kvm, irq);
748 continue;
749 }
750
751 if (target_vcpu == vcpu) {
752 /* We're on the right CPU */
753 raw_spin_unlock(&irq->irq_lock);
754 continue;
755 }
756
757 /* This interrupt looks like it has to be migrated. */
758
759 raw_spin_unlock(&irq->irq_lock);
760 raw_spin_unlock(&vgic_cpu->ap_list_lock);
761
762 /*
763 * Ensure locking order by always locking the smallest
764 * ID first.
765 */
766 if (vcpu->vcpu_id < target_vcpu->vcpu_id) {
767 vcpuA = vcpu;
768 vcpuB = target_vcpu;
769 } else {
770 vcpuA = target_vcpu;
771 vcpuB = vcpu;
772 }
773
774 raw_spin_lock(&vcpuA->arch.vgic_cpu.ap_list_lock);
775 raw_spin_lock_nested(&vcpuB->arch.vgic_cpu.ap_list_lock,
776 SINGLE_DEPTH_NESTING);
777 raw_spin_lock(&irq->irq_lock);
778
779 /*
780 * If the affinity has been preserved, move the
781 * interrupt around. Otherwise, it means things have
782 * changed while the interrupt was unlocked, and we
783 * need to replay this.
784 *
785 * In all cases, we cannot trust the list not to have
786 * changed, so we restart from the beginning.
787 */
788 if (target_vcpu == vgic_target_oracle(irq)) {
789 struct vgic_cpu *new_cpu = &target_vcpu->arch.vgic_cpu;
790
791 list_del(&irq->ap_list);
792 irq->vcpu = target_vcpu;
793 list_add_tail(&irq->ap_list, &new_cpu->ap_list_head);
794 target_vcpu_needs_kick = true;
795 }
796
797 raw_spin_unlock(&irq->irq_lock);
798 raw_spin_unlock(&vcpuB->arch.vgic_cpu.ap_list_lock);
799 raw_spin_unlock(&vcpuA->arch.vgic_cpu.ap_list_lock);
800
801 if (target_vcpu_needs_kick) {
802 kvm_make_request(KVM_REQ_IRQ_PENDING, target_vcpu);
803 kvm_vcpu_kick(target_vcpu);
804 }
805
806 goto retry;
807 }
808
809 raw_spin_unlock(&vgic_cpu->ap_list_lock);
810
811 if (unlikely(deleted_lpis))
812 vgic_release_deleted_lpis(vcpu->kvm);
813 }
814
vgic_fold_lr_state(struct kvm_vcpu * vcpu)815 static inline void vgic_fold_lr_state(struct kvm_vcpu *vcpu)
816 {
817 if (!*host_data_ptr(last_lr_irq))
818 return;
819
820 if (kvm_vgic_global_state.type == VGIC_V2)
821 vgic_v2_fold_lr_state(vcpu);
822 else
823 vgic_v3_fold_lr_state(vcpu);
824 }
825
826 /* Requires the irq_lock to be held. */
vgic_populate_lr(struct kvm_vcpu * vcpu,struct vgic_irq * irq,int lr)827 static inline void vgic_populate_lr(struct kvm_vcpu *vcpu,
828 struct vgic_irq *irq, int lr)
829 {
830 lockdep_assert_held(&irq->irq_lock);
831
832 if (kvm_vgic_global_state.type == VGIC_V2)
833 vgic_v2_populate_lr(vcpu, irq, lr);
834 else
835 vgic_v3_populate_lr(vcpu, irq, lr);
836 }
837
vgic_clear_lr(struct kvm_vcpu * vcpu,int lr)838 static inline void vgic_clear_lr(struct kvm_vcpu *vcpu, int lr)
839 {
840 if (kvm_vgic_global_state.type == VGIC_V2)
841 vgic_v2_clear_lr(vcpu, lr);
842 else
843 vgic_v3_clear_lr(vcpu, lr);
844 }
845
summarize_ap_list(struct kvm_vcpu * vcpu,struct ap_list_summary * als)846 static void summarize_ap_list(struct kvm_vcpu *vcpu,
847 struct ap_list_summary *als)
848 {
849 struct vgic_cpu *vgic_cpu = &vcpu->arch.vgic_cpu;
850 struct vgic_irq *irq;
851
852 lockdep_assert_held(&vgic_cpu->ap_list_lock);
853
854 *als = (typeof(*als)){};
855
856 list_for_each_entry(irq, &vgic_cpu->ap_list_head, ap_list) {
857 guard(raw_spinlock)(&irq->irq_lock);
858
859 if (unlikely(vgic_target_oracle(irq) != vcpu))
860 continue;
861
862 if (!irq->active)
863 als->nr_pend++;
864 else
865 als->nr_act++;
866
867 if (irq->intid < VGIC_NR_SGIS)
868 als->nr_sgi++;
869 }
870 }
871
872 /*
873 * Dealing with LR overflow is close to black magic -- dress accordingly.
874 *
875 * We have to present an almost infinite number of interrupts through a very
876 * limited number of registers. Therefore crucial decisions must be made to
877 * ensure we feed the most relevant interrupts into the LRs, and yet have
878 * some facilities to let the guest interact with those that are not there.
879 *
880 * All considerations below are in the context of interrupts targeting a
881 * single vcpu with non-idle state (either pending, active, or both),
882 * colloquially called the ap_list:
883 *
884 * - Pending interrupts must have priority over active interrupts. This also
885 * excludes pending+active interrupts. This ensures that a guest can
886 * perform priority drops on any number of interrupts, and yet be
887 * presented the next pending one.
888 *
889 * - Deactivation of interrupts outside of the LRs must be tracked by using
890 * either the EOIcount-driven maintenance interrupt, and sometimes by
891 * trapping the DIR register.
892 *
893 * - For EOImode=0, a non-zero EOIcount means walking the ap_list past the
894 * point that made it into the LRs, and deactivate interrupts that would
895 * have made it onto the LRs if we had the space.
896 *
897 * - The MI-generation bits must be used to try and force an exit when the
898 * guest has done enough changes to the LRs that we want to reevaluate the
899 * situation:
900 *
901 * - if the total number of pending interrupts exceeds the number of
902 * LR, NPIE must be set in order to exit once no pending interrupts
903 * are present in the LRs, allowing us to populate the next batch.
904 *
905 * - if there are active interrupts outside of the LRs, then LRENPIE
906 * must be set so that we exit on deactivation of one of these, and
907 * work out which one is to be deactivated. Note that this is not
908 * enough to deal with EOImode=1, see below.
909 *
910 * - if the overall number of interrupts exceeds the number of LRs,
911 * then UIE must be set to allow refilling of the LRs once the
912 * majority of them has been processed.
913 *
914 * - as usual, MI triggers are only an optimisation, since we cannot
915 * rely on the MI being delivered in timely manner...
916 *
917 * - EOImode=1 creates some additional problems:
918 *
919 * - deactivation can happen in any order, and we cannot rely on
920 * EOImode=0's coupling of priority-drop and deactivation which
921 * imposes strict reverse Ack order. This means that DIR must
922 * trap if we have active interrupts outside of the LRs.
923 *
924 * - deactivation of SPIs can occur on any CPU, while the SPI is only
925 * present in the ap_list of the CPU that actually ack-ed it. In that
926 * case, EOIcount doesn't provide enough information, and we must
927 * resort to trapping DIR even if we don't overflow the LRs. Bonus
928 * point for not trapping DIR when no SPIs are pending or active in
929 * the whole VM.
930 *
931 * - LPIs do not suffer the same problem as SPIs on deactivation, as we
932 * have to essentially discard the active state, see below.
933 *
934 * - Virtual LPIs have an active state (surprise!), which gets removed on
935 * priority drop (EOI). However, EOIcount doesn't get bumped when the LPI
936 * is not present in the LR (surprise again!). Special care must therefore
937 * be taken to remove the active state from any activated LPI when exiting
938 * from the guest. This is in a way no different from what happens on the
939 * physical side. We still rely on the running priority to have been
940 * removed from the APRs, irrespective of the LPI being present in the LRs
941 * or not.
942 *
943 * - Virtual SGIs directly injected via GICv4.1 must not affect EOIcount, as
944 * they are not managed in SW and don't have a true active state. So only
945 * set vSGIEOICount when no SGIs are in the ap_list.
946 *
947 * - GICv2 SGIs with multiple sources are injected one source at a time, as
948 * if they were made pending sequentially. This may mean that we don't
949 * always present the HPPI if other interrupts with lower priority are
950 * pending in the LRs. Big deal.
951 */
vgic_flush_lr_state(struct kvm_vcpu * vcpu)952 static void vgic_flush_lr_state(struct kvm_vcpu *vcpu)
953 {
954 struct vgic_cpu *vgic_cpu = &vcpu->arch.vgic_cpu;
955 struct ap_list_summary als;
956 struct vgic_irq *irq;
957 int count = 0;
958
959 lockdep_assert_held(&vgic_cpu->ap_list_lock);
960
961 summarize_ap_list(vcpu, &als);
962
963 if (irqs_outside_lrs(&als))
964 vgic_sort_ap_list(vcpu);
965
966 *host_data_ptr(last_lr_irq) = NULL;
967
968 list_for_each_entry(irq, &vgic_cpu->ap_list_head, ap_list) {
969 scoped_guard(raw_spinlock, &irq->irq_lock) {
970 if (likely(vgic_target_oracle(irq) == vcpu)) {
971 vgic_populate_lr(vcpu, irq, count++);
972 *host_data_ptr(last_lr_irq) = irq;
973 }
974 }
975
976 if (count == kvm_vgic_global_state.nr_lr)
977 break;
978 }
979
980 /* Nuke remaining LRs */
981 for (int i = count ; i < kvm_vgic_global_state.nr_lr; i++)
982 vgic_clear_lr(vcpu, i);
983
984 if (!static_branch_unlikely(&kvm_vgic_global_state.gicv3_cpuif)) {
985 vcpu->arch.vgic_cpu.vgic_v2.used_lrs = count;
986 vgic_v2_configure_hcr(vcpu, &als);
987 } else {
988 vcpu->arch.vgic_cpu.vgic_v3.used_lrs = count;
989 vgic_v3_configure_hcr(vcpu, &als);
990 }
991 }
992
can_access_vgic_from_kernel(void)993 static inline bool can_access_vgic_from_kernel(void)
994 {
995 /*
996 * GICv2 can always be accessed from the kernel because it is
997 * memory-mapped, and VHE systems can access GICv3 EL2 system
998 * registers.
999 */
1000 return !static_branch_unlikely(&kvm_vgic_global_state.gicv3_cpuif) || has_vhe();
1001 }
1002
vgic_save_state(struct kvm_vcpu * vcpu)1003 static inline void vgic_save_state(struct kvm_vcpu *vcpu)
1004 {
1005 if (!static_branch_unlikely(&kvm_vgic_global_state.gicv3_cpuif))
1006 vgic_v2_save_state(vcpu);
1007 else
1008 __vgic_v3_save_state(&vcpu->arch.vgic_cpu.vgic_v3);
1009 }
1010
1011 /* Sync back the hardware VGIC state into our emulation after a guest's run. */
kvm_vgic_sync_hwstate(struct kvm_vcpu * vcpu)1012 void kvm_vgic_sync_hwstate(struct kvm_vcpu *vcpu)
1013 {
1014 /* If nesting, emulate the HW effect from L0 to L1 */
1015 if (vgic_state_is_nested(vcpu)) {
1016 vgic_v3_sync_nested(vcpu);
1017 return;
1018 }
1019
1020 if (vcpu_has_nv(vcpu))
1021 vgic_v3_nested_update_mi(vcpu);
1022
1023 if (can_access_vgic_from_kernel())
1024 vgic_save_state(vcpu);
1025
1026 vgic_fold_lr_state(vcpu);
1027 vgic_prune_ap_list(vcpu);
1028 }
1029
1030 /* Sync interrupts that were deactivated through a DIR trap */
kvm_vgic_process_async_update(struct kvm_vcpu * vcpu)1031 void kvm_vgic_process_async_update(struct kvm_vcpu *vcpu)
1032 {
1033 unsigned long flags;
1034
1035 /* Make sure we're in the same context as LR handling */
1036 local_irq_save(flags);
1037 vgic_prune_ap_list(vcpu);
1038 local_irq_restore(flags);
1039 }
1040
vgic_restore_state(struct kvm_vcpu * vcpu)1041 static inline void vgic_restore_state(struct kvm_vcpu *vcpu)
1042 {
1043 if (!static_branch_unlikely(&kvm_vgic_global_state.gicv3_cpuif))
1044 vgic_v2_restore_state(vcpu);
1045 else
1046 __vgic_v3_restore_state(&vcpu->arch.vgic_cpu.vgic_v3);
1047 }
1048
1049 /* Flush our emulation state into the GIC hardware before entering the guest. */
kvm_vgic_flush_hwstate(struct kvm_vcpu * vcpu)1050 void kvm_vgic_flush_hwstate(struct kvm_vcpu *vcpu)
1051 {
1052 /*
1053 * If in a nested state, we must return early. Two possibilities:
1054 *
1055 * - If we have any pending IRQ for the guest and the guest
1056 * expects IRQs to be handled in its virtual EL2 mode (the
1057 * virtual IMO bit is set) and it is not already running in
1058 * virtual EL2 mode, then we have to emulate an IRQ
1059 * exception to virtual EL2.
1060 *
1061 * We do that by placing a request to ourselves which will
1062 * abort the entry procedure and inject the exception at the
1063 * beginning of the run loop.
1064 *
1065 * - Otherwise, do exactly *NOTHING* apart from enabling the virtual
1066 * CPU interface. The guest state is already loaded, and we can
1067 * carry on with running it.
1068 *
1069 * If we have NV, but are not in a nested state, compute the
1070 * maintenance interrupt state, as it may fire.
1071 */
1072 if (vgic_state_is_nested(vcpu)) {
1073 if (kvm_vgic_vcpu_pending_irq(vcpu))
1074 kvm_make_request(KVM_REQ_GUEST_HYP_IRQ_PENDING, vcpu);
1075
1076 vgic_v3_flush_nested(vcpu);
1077 return;
1078 }
1079
1080 if (vcpu_has_nv(vcpu))
1081 vgic_v3_nested_update_mi(vcpu);
1082
1083 DEBUG_SPINLOCK_BUG_ON(!irqs_disabled());
1084
1085 scoped_guard(raw_spinlock, &vcpu->arch.vgic_cpu.ap_list_lock)
1086 vgic_flush_lr_state(vcpu);
1087
1088 if (can_access_vgic_from_kernel())
1089 vgic_restore_state(vcpu);
1090
1091 if (vgic_supports_direct_irqs(vcpu->kvm))
1092 vgic_v4_commit(vcpu);
1093 }
1094
kvm_vgic_load(struct kvm_vcpu * vcpu)1095 void kvm_vgic_load(struct kvm_vcpu *vcpu)
1096 {
1097 if (unlikely(!irqchip_in_kernel(vcpu->kvm) || !vgic_initialized(vcpu->kvm))) {
1098 if (has_vhe() && static_branch_unlikely(&kvm_vgic_global_state.gicv3_cpuif))
1099 __vgic_v3_activate_traps(&vcpu->arch.vgic_cpu.vgic_v3);
1100 return;
1101 }
1102
1103 if (!static_branch_unlikely(&kvm_vgic_global_state.gicv3_cpuif))
1104 vgic_v2_load(vcpu);
1105 else
1106 vgic_v3_load(vcpu);
1107 }
1108
kvm_vgic_put(struct kvm_vcpu * vcpu)1109 void kvm_vgic_put(struct kvm_vcpu *vcpu)
1110 {
1111 if (unlikely(!irqchip_in_kernel(vcpu->kvm) || !vgic_initialized(vcpu->kvm))) {
1112 if (has_vhe() && static_branch_unlikely(&kvm_vgic_global_state.gicv3_cpuif))
1113 __vgic_v3_deactivate_traps(&vcpu->arch.vgic_cpu.vgic_v3);
1114 return;
1115 }
1116
1117 if (!static_branch_unlikely(&kvm_vgic_global_state.gicv3_cpuif))
1118 vgic_v2_put(vcpu);
1119 else
1120 vgic_v3_put(vcpu);
1121 }
1122
kvm_vgic_vcpu_pending_irq(struct kvm_vcpu * vcpu)1123 int kvm_vgic_vcpu_pending_irq(struct kvm_vcpu *vcpu)
1124 {
1125 struct vgic_cpu *vgic_cpu = &vcpu->arch.vgic_cpu;
1126 struct vgic_irq *irq;
1127 bool pending = false;
1128 unsigned long flags;
1129 struct vgic_vmcr vmcr;
1130
1131 if (!vcpu->kvm->arch.vgic.enabled)
1132 return false;
1133
1134 if (vcpu->arch.vgic_cpu.vgic_v3.its_vpe.pending_last)
1135 return true;
1136
1137 vgic_get_vmcr(vcpu, &vmcr);
1138
1139 raw_spin_lock_irqsave(&vgic_cpu->ap_list_lock, flags);
1140
1141 list_for_each_entry(irq, &vgic_cpu->ap_list_head, ap_list) {
1142 raw_spin_lock(&irq->irq_lock);
1143 pending = irq_is_pending(irq) && irq->enabled &&
1144 !irq->active &&
1145 irq->priority < vmcr.pmr;
1146 raw_spin_unlock(&irq->irq_lock);
1147
1148 if (pending)
1149 break;
1150 }
1151
1152 raw_spin_unlock_irqrestore(&vgic_cpu->ap_list_lock, flags);
1153
1154 return pending;
1155 }
1156
vgic_kick_vcpus(struct kvm * kvm)1157 void vgic_kick_vcpus(struct kvm *kvm)
1158 {
1159 struct kvm_vcpu *vcpu;
1160 unsigned long c;
1161
1162 /*
1163 * We've injected an interrupt, time to find out who deserves
1164 * a good kick...
1165 */
1166 kvm_for_each_vcpu(c, vcpu, kvm) {
1167 if (kvm_vgic_vcpu_pending_irq(vcpu)) {
1168 kvm_make_request(KVM_REQ_IRQ_PENDING, vcpu);
1169 kvm_vcpu_kick(vcpu);
1170 }
1171 }
1172 }
1173
kvm_vgic_map_is_active(struct kvm_vcpu * vcpu,unsigned int vintid)1174 bool kvm_vgic_map_is_active(struct kvm_vcpu *vcpu, unsigned int vintid)
1175 {
1176 struct vgic_irq *irq;
1177 bool map_is_active;
1178 unsigned long flags;
1179
1180 if (!vgic_initialized(vcpu->kvm))
1181 return false;
1182
1183 irq = vgic_get_vcpu_irq(vcpu, vintid);
1184 raw_spin_lock_irqsave(&irq->irq_lock, flags);
1185 map_is_active = irq->hw && irq->active;
1186 raw_spin_unlock_irqrestore(&irq->irq_lock, flags);
1187 vgic_put_irq(vcpu->kvm, irq);
1188
1189 return map_is_active;
1190 }
1191
1192 /*
1193 * Level-triggered mapped IRQs are special because we only observe rising
1194 * edges as input to the VGIC.
1195 *
1196 * If the guest never acked the interrupt we have to sample the physical
1197 * line and set the line level, because the device state could have changed
1198 * or we simply need to process the still pending interrupt later.
1199 *
1200 * We could also have entered the guest with the interrupt active+pending.
1201 * On the next exit, we need to re-evaluate the pending state, as it could
1202 * otherwise result in a spurious interrupt by injecting a now potentially
1203 * stale pending state.
1204 *
1205 * If this causes us to lower the level, we have to also clear the physical
1206 * active state, since we will otherwise never be told when the interrupt
1207 * becomes asserted again.
1208 *
1209 * Another case is when the interrupt requires a helping hand on
1210 * deactivation (no HW deactivation, for example).
1211 */
vgic_irq_handle_resampling(struct vgic_irq * irq,bool lr_deactivated,bool lr_pending)1212 void vgic_irq_handle_resampling(struct vgic_irq *irq,
1213 bool lr_deactivated, bool lr_pending)
1214 {
1215 if (vgic_irq_is_mapped_level(irq)) {
1216 bool resample = false;
1217
1218 if (unlikely(vgic_irq_needs_resampling(irq))) {
1219 resample = !(irq->active || irq->pending_latch);
1220 } else if (lr_pending || (lr_deactivated && irq->line_level)) {
1221 irq->line_level = vgic_get_phys_line_level(irq);
1222 resample = !irq->line_level;
1223 }
1224
1225 if (resample)
1226 vgic_irq_set_phys_active(irq, false);
1227 }
1228 }
1229