linux headers: update against v5.4-rc1
Include-If: %if 0%{?suse_version} == 1315
Git-commit: f363d039e8
(partial)
References: bsc#1179725
Update the headers against commit:
0f1a7b3fac05 ("timer-of: don't use conditional expression
with mixed 'void' types")
Signed-off-by: Eric Auger <eric.auger@redhat.com>
Acked-by: Marc Zyngier <maz@kernel.org>
Message-id: 20191003154640.22451-2-eric.auger@redhat.com
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Signed-off-by: Cho, Yu-Chen <acho@suse.com>
This commit is contained in:
@@ -116,7 +116,7 @@ struct kvm_irq_level {
|
|||||||
* ACPI gsi notion of irq.
|
* ACPI gsi notion of irq.
|
||||||
* For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
|
* For IA-64 (APIC model) IOAPIC0: irq 0-23; IOAPIC1: irq 24-47..
|
||||||
* For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
|
* For X86 (standard AT mode) PIC0/1: irq 0-15. IOAPIC0: 0-23..
|
||||||
* For ARM: See Documentation/virtual/kvm/api.txt
|
* For ARM: See Documentation/virt/kvm/api.txt
|
||||||
*/
|
*/
|
||||||
union {
|
union {
|
||||||
__u32 irq;
|
__u32 irq;
|
||||||
@@ -243,6 +243,8 @@ struct kvm_hyperv_exit {
|
|||||||
#define KVM_INTERNAL_ERROR_SIMUL_EX 2
|
#define KVM_INTERNAL_ERROR_SIMUL_EX 2
|
||||||
/* Encounter unexpected vm-exit due to delivery event. */
|
/* Encounter unexpected vm-exit due to delivery event. */
|
||||||
#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
|
#define KVM_INTERNAL_ERROR_DELIVERY_EV 3
|
||||||
|
/* Encounter unexpected vm-exit reason */
|
||||||
|
#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4
|
||||||
|
|
||||||
/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
|
/* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */
|
||||||
struct kvm_run {
|
struct kvm_run {
|
||||||
@@ -995,6 +997,9 @@ struct kvm_ppc_resize_hpt {
|
|||||||
#define KVM_CAP_ARM_SVE 170
|
#define KVM_CAP_ARM_SVE 170
|
||||||
#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
|
#define KVM_CAP_ARM_PTRAUTH_ADDRESS 171
|
||||||
#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
|
#define KVM_CAP_ARM_PTRAUTH_GENERIC 172
|
||||||
|
#define KVM_CAP_PMU_EVENT_FILTER 173
|
||||||
|
#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174
|
||||||
|
#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175
|
||||||
|
|
||||||
#ifdef KVM_CAP_IRQ_ROUTING
|
#ifdef KVM_CAP_IRQ_ROUTING
|
||||||
|
|
||||||
@@ -1085,7 +1090,7 @@ struct kvm_xen_hvm_config {
|
|||||||
*
|
*
|
||||||
* KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
|
* KVM_IRQFD_FLAG_RESAMPLE indicates resamplefd is valid and specifies
|
||||||
* the irqfd to operate in resampling mode for level triggered interrupt
|
* the irqfd to operate in resampling mode for level triggered interrupt
|
||||||
* emulation. See Documentation/virtual/kvm/api.txt.
|
* emulation. See Documentation/virt/kvm/api.txt.
|
||||||
*/
|
*/
|
||||||
#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
|
#define KVM_IRQFD_FLAG_RESAMPLE (1 << 1)
|
||||||
|
|
||||||
@@ -1141,6 +1146,7 @@ struct kvm_dirty_tlb {
|
|||||||
#define KVM_REG_S390 0x5000000000000000ULL
|
#define KVM_REG_S390 0x5000000000000000ULL
|
||||||
#define KVM_REG_ARM64 0x6000000000000000ULL
|
#define KVM_REG_ARM64 0x6000000000000000ULL
|
||||||
#define KVM_REG_MIPS 0x7000000000000000ULL
|
#define KVM_REG_MIPS 0x7000000000000000ULL
|
||||||
|
#define KVM_REG_RISCV 0x8000000000000000ULL
|
||||||
|
|
||||||
#define KVM_REG_SIZE_SHIFT 52
|
#define KVM_REG_SIZE_SHIFT 52
|
||||||
#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
|
#define KVM_REG_SIZE_MASK 0x00f0000000000000ULL
|
||||||
@@ -1329,6 +1335,8 @@ struct kvm_s390_ucas_mapping {
|
|||||||
#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
|
#define KVM_PPC_GET_RMMU_INFO _IOW(KVMIO, 0xb0, struct kvm_ppc_rmmu_info)
|
||||||
/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
|
/* Available with KVM_CAP_PPC_GET_CPU_CHAR */
|
||||||
#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
|
#define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char)
|
||||||
|
/* Available with KVM_CAP_PMU_EVENT_FILTER */
|
||||||
|
#define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter)
|
||||||
|
|
||||||
/* ioctl for vm fd */
|
/* ioctl for vm fd */
|
||||||
#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
|
#define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device)
|
||||||
|
@@ -295,15 +295,38 @@ struct vfio_region_info_cap_type {
|
|||||||
__u32 subtype; /* type specific */
|
__u32 subtype; /* type specific */
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/*
|
||||||
|
* List of region types, global per bus driver.
|
||||||
|
* If you introduce a new type, please add it here.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* PCI region type containing a PCI vendor part */
|
||||||
#define VFIO_REGION_TYPE_PCI_VENDOR_TYPE (1 << 31)
|
#define VFIO_REGION_TYPE_PCI_VENDOR_TYPE (1 << 31)
|
||||||
#define VFIO_REGION_TYPE_PCI_VENDOR_MASK (0xffff)
|
#define VFIO_REGION_TYPE_PCI_VENDOR_MASK (0xffff)
|
||||||
|
#define VFIO_REGION_TYPE_GFX (1)
|
||||||
|
#define VFIO_REGION_TYPE_CCW (2)
|
||||||
|
|
||||||
/* 8086 Vendor sub-types */
|
/* sub-types for VFIO_REGION_TYPE_PCI_* */
|
||||||
|
|
||||||
|
/* 8086 vendor PCI sub-types */
|
||||||
#define VFIO_REGION_SUBTYPE_INTEL_IGD_OPREGION (1)
|
#define VFIO_REGION_SUBTYPE_INTEL_IGD_OPREGION (1)
|
||||||
#define VFIO_REGION_SUBTYPE_INTEL_IGD_HOST_CFG (2)
|
#define VFIO_REGION_SUBTYPE_INTEL_IGD_HOST_CFG (2)
|
||||||
#define VFIO_REGION_SUBTYPE_INTEL_IGD_LPC_CFG (3)
|
#define VFIO_REGION_SUBTYPE_INTEL_IGD_LPC_CFG (3)
|
||||||
|
|
||||||
#define VFIO_REGION_TYPE_GFX (1)
|
/* 10de vendor PCI sub-types */
|
||||||
|
/*
|
||||||
|
* NVIDIA GPU NVlink2 RAM is coherent RAM mapped onto the host address space.
|
||||||
|
*/
|
||||||
|
#define VFIO_REGION_SUBTYPE_NVIDIA_NVLINK2_RAM (1)
|
||||||
|
|
||||||
|
/* 1014 vendor PCI sub-types */
|
||||||
|
/*
|
||||||
|
* IBM NPU NVlink2 ATSD (Address Translation Shootdown) register of NPU
|
||||||
|
* to do TLB invalidation on a GPU.
|
||||||
|
*/
|
||||||
|
#define VFIO_REGION_SUBTYPE_IBM_NVLINK2_ATSD (1)
|
||||||
|
|
||||||
|
/* sub-types for VFIO_REGION_TYPE_GFX */
|
||||||
#define VFIO_REGION_SUBTYPE_GFX_EDID (1)
|
#define VFIO_REGION_SUBTYPE_GFX_EDID (1)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -353,25 +376,9 @@ struct vfio_region_gfx_edid {
|
|||||||
#define VFIO_DEVICE_GFX_LINK_STATE_DOWN 2
|
#define VFIO_DEVICE_GFX_LINK_STATE_DOWN 2
|
||||||
};
|
};
|
||||||
|
|
||||||
#define VFIO_REGION_TYPE_CCW (2)
|
/* sub-types for VFIO_REGION_TYPE_CCW */
|
||||||
/* ccw sub-types */
|
|
||||||
#define VFIO_REGION_SUBTYPE_CCW_ASYNC_CMD (1)
|
#define VFIO_REGION_SUBTYPE_CCW_ASYNC_CMD (1)
|
||||||
|
|
||||||
/*
|
|
||||||
* 10de vendor sub-type
|
|
||||||
*
|
|
||||||
* NVIDIA GPU NVlink2 RAM is coherent RAM mapped onto the host address space.
|
|
||||||
*/
|
|
||||||
#define VFIO_REGION_SUBTYPE_NVIDIA_NVLINK2_RAM (1)
|
|
||||||
|
|
||||||
/*
|
|
||||||
* 1014 vendor sub-type
|
|
||||||
*
|
|
||||||
* IBM NPU NVlink2 ATSD (Address Translation Shootdown) register of NPU
|
|
||||||
* to do TLB invalidation on a GPU.
|
|
||||||
*/
|
|
||||||
#define VFIO_REGION_SUBTYPE_IBM_NVLINK2_ATSD (1)
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* The MSIX mappable capability informs that MSIX data of a BAR can be mmapped
|
* The MSIX mappable capability informs that MSIX data of a BAR can be mmapped
|
||||||
* which allows direct access to non-MSIX registers which happened to be within
|
* which allows direct access to non-MSIX registers which happened to be within
|
||||||
@@ -714,7 +721,31 @@ struct vfio_iommu_type1_info {
|
|||||||
__u32 argsz;
|
__u32 argsz;
|
||||||
__u32 flags;
|
__u32 flags;
|
||||||
#define VFIO_IOMMU_INFO_PGSIZES (1 << 0) /* supported page sizes info */
|
#define VFIO_IOMMU_INFO_PGSIZES (1 << 0) /* supported page sizes info */
|
||||||
__u64 iova_pgsizes; /* Bitmap of supported page sizes */
|
#define VFIO_IOMMU_INFO_CAPS (1 << 1) /* Info supports caps */
|
||||||
|
__u64 iova_pgsizes; /* Bitmap of supported page sizes */
|
||||||
|
__u32 cap_offset; /* Offset within info struct of first cap */
|
||||||
|
};
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The IOVA capability allows to report the valid IOVA range(s)
|
||||||
|
* excluding any non-relaxable reserved regions exposed by
|
||||||
|
* devices attached to the container. Any DMA map attempt
|
||||||
|
* outside the valid iova range will return error.
|
||||||
|
*
|
||||||
|
* The structures below define version 1 of this capability.
|
||||||
|
*/
|
||||||
|
#define VFIO_IOMMU_TYPE1_INFO_CAP_IOVA_RANGE 1
|
||||||
|
|
||||||
|
struct vfio_iova_range {
|
||||||
|
__u64 start;
|
||||||
|
__u64 end;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct vfio_iommu_type1_info_cap_iova_range {
|
||||||
|
struct vfio_info_cap_header header;
|
||||||
|
__u32 nr_iovas;
|
||||||
|
__u32 reserved;
|
||||||
|
struct vfio_iova_range iova_ranges[];
|
||||||
};
|
};
|
||||||
|
|
||||||
#define VFIO_IOMMU_GET_INFO _IO(VFIO_TYPE, VFIO_BASE + 12)
|
#define VFIO_IOMMU_GET_INFO _IO(VFIO_TYPE, VFIO_BASE + 12)
|
||||||
|
Reference in New Issue
Block a user