From patchwork Mon Jul 11 10:11:39 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Suthikulpanit, Suravee" X-Patchwork-Id: 71721 Delivered-To: patch@linaro.org Received: by 10.140.29.52 with SMTP id a49csp528151qga; Mon, 11 Jul 2016 03:13:43 -0700 (PDT) X-Received: by 10.66.193.98 with SMTP id hn2mr33365615pac.68.1468232023644; Mon, 11 Jul 2016 03:13:43 -0700 (PDT) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id lw5si3251382pab.100.2016.07.11.03.13.42; Mon, 11 Jul 2016 03:13:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amdcloud.onmicrosoft.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758299AbcGKKNh (ORCPT + 30 others); Mon, 11 Jul 2016 06:13:37 -0400 Received: from mail-dm3nam03on0078.outbound.protection.outlook.com ([104.47.41.78]:3016 "EHLO NAM03-DM3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932200AbcGKKNP (ORCPT ); Mon, 11 Jul 2016 06:13:15 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=rOWHbm5lfg5bTYNpUoKaQQB29VKhm6JHQ/sZVcdppPw=; b=CeyJH14R04PGkK7310tm5VzWp3PN3zsu/yYV4lHxhjtA+VC3jmHw02ZRlViSbR+Qm5QH++JXYUAUz85n6y47RIBmIWnN+f53EGPohTl44JznmPgJ/CyWvMkp1pgevZnMnXmbw/NwiyAjzl5w/XRy422QP3zHeXiPrmsCBh2/wgc= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Suravee.Suthikulpanit@amd.com; Received: from localhost.localdomain (124.121.8.20) by CY1PR12MB0444.namprd12.prod.outlook.com (10.163.91.22) with Microsoft SMTP Server (TLS) id 15.1.534.14; Mon, 11 Jul 2016 10:13:06 +0000 From: Suravee Suthikulpanit To: , , , CC: , , , Suravee Suthikulpanit Subject: [PART2 PATCH v3 11/11] svm: Implements update_pi_irte hook to setup posted interrupt Date: Mon, 11 Jul 2016 05:11:39 -0500 Message-ID: <1468231899-6987-12-git-send-email-suravee.suthikulpanit@amd.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1468231899-6987-1-git-send-email-suravee.suthikulpanit@amd.com> References: <1468231899-6987-1-git-send-email-suravee.suthikulpanit@amd.com> MIME-Version: 1.0 X-Originating-IP: [124.121.8.20] X-ClientProxiedBy: SG2PR03CA0026.apcprd03.prod.outlook.com (10.160.233.36) To CY1PR12MB0444.namprd12.prod.outlook.com (10.163.91.22) X-MS-Office365-Filtering-Correlation-Id: 2eb35a54-840e-4a7b-8dc8-08d3a973f508 X-Microsoft-Exchange-Diagnostics: 1; CY1PR12MB0444; 2:MSsWICEtXAv2nrUnC3p7012YFkadso2cf0sax/oOTsGsjzMzo2c0DpaHg8fcjGdHNiTsQCw4XvVvfy7wdyF/2ztOKDq3l0QATPCG5mkwMPUFiHu81knHLpsTiwqB80hue3y921187EKVbveFTFc7jycza9bP7Hl4EdMC8jDL4UKpOmIOmxESy7Ykhvwdxezf; 3:URE8WinmnPGokkSFMHNWT8xHrlTcREe9e4kJWoNMa4Hzsgs8vRXPp472S+ly1/v+SyXLiAGs5bo+uD0kFBLjUkl58oKNqhJp5ULhT22t06dFbaUQ3EfG5O9vDWnKv9Z1; 25:Spd/wgODzCB9OpvLdcA/28afnVYoc9fkUAFofdtCq/RVHoRwjkdqOV0oTWrtf/oq2Ju6SL74WMl5ZpIImep6CExKRIPfa2/fsZ41LuzRXLKle7nbIBsS+lzHO+u4vlxV5/IFhRnwBob7Aw6M3etW3UWMWazgKww65jrWt0aaDFmcWdNKTiNJNRcwbs2O8i/LwxnDwVx8jlveWD/8UpXiI/b2SQwr9tKpyU8oMGkGcpv5P/4kN8peHjpDjepLGw2980XTUp167TlLSSWxFY9V2s8XQ2Z/x/rLbZtWZSqabNwQNF1HljE5I9iGzxVmiKyKiX/L9mKJ7S90vDzqHYCjXpuxp9jfIuPDc/+3lQXcBhpQiqgHuH1MGC2A7uSUynhcZBst1ssXf1gB4nU1O/Uyq39Mah0wGiZrloFsxJT8H98=; 31:V0kMercQEvIpJMmSI0ys4Nude0/TN87yqYhrvIRb2VtXf6L8Puai06CzUYdaOuRqRSUZ7OZi6z99GoM5qiRVb29BwgIJv5uNWzXpP2sx6WBIMXficQCZiNd4JIlgqXahl2EiRl3HxnQax3BqIFPM4ld6ApIb8ysHPY1nL3rJfDUZQo6kg3ajKaw/OEC5Z/Lx7zWI2/HBQiKNzotV2wkAhw== X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR12MB0444; X-Microsoft-Exchange-Diagnostics: 1; CY1PR12MB0444; 20:h2uRvY86cpnA10WPqbrBO39I2jQqUTUTAKRiuVhHcO9e1k1MMZN97uhFDO81ShN8Se1y4AHwNgKvqCBv0rGhN+TBwL7VjOEbangjQb8JhppXltLs4YVmnr1DRDaSvSdO8enq7FBq7QA7j2BmTOP8ckSWvznXvclHkx6e9OLXhGP65SSd5fDDtEGMODlG5sjNIMqmReB3wObF5iaHskeZtvSoOwIcbhqGlaSCNeMY+4F54jHM2EPxTz6OoFT26yLtuhdeKTWaUA2qZZIumIZmwc9Kv40InJmMySdFSKsDS3jlLY273jFFPzkLer7MS7/vbncY9OCLxC8kamAQsGzCFNzLxC70zBD0fHyaVrTvvwTTP8TdvcnJrfWAdRwT0+DG99EP59oBoW2EJLxrcIymjxFBQqoAOO44uD+0o06PhAXKJUbqWmlJ/nk7Cd2ofTv26mll0HMOin41PMJZHezyqREh/Pe/g3jrDV8MorZg87fRAK/JKMxO3Ntm1B77ZTgl; 4:RdlouBJEqfENpG92jEHMvPCfbz4TfvY+ZPQfaX3zMWyNQqwWxKb/sIS9MLfs5hjl84W6CP+5/o4A95EkFJpduQc+r7DbVecmFccj0ik+9VUr7l9G1/14F1vBAR7HnCSCsPnkK4G5beB48Anj/GJavVmKZqiYY0zSM5mcZ6RAVI+/ykzOA7IB2p6/GQjO4eW/8JROsc770ArD7HoZK7bxLljFUCAWurRz5kNzhEEkglz+ZURZz5oGGKpQq6Jrd3HZMpaxKsZnPM0KAN4GAkiOybb7bJ6rdYrqRLRg1SfcQr8vFOViYa+jGtievDURbRc86zPCi4eFveND1ZRjz7KCc61Kld2EcRCXOhNzCDfWmaSEz3+j5vyztugemo5nXGI/hGiBBygjKiGrg/hgi3VgVnLmcsERlfvXYL4qNlqhAXg= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026); SRVR:CY1PR12MB0444; BCL:0; PCL:0; RULEID:; SRVR:CY1PR12MB0444; X-Forefront-PRVS: 00003DBFE7 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(6069001)(7916002)(189002)(199003)(3846002)(6116002)(2201001)(101416001)(81166006)(86362001)(5003940100001)(47776003)(586003)(189998001)(15650500001)(106356001)(66066001)(7736002)(77096005)(5001770100001)(36756003)(97736004)(50466002)(33646002)(50986999)(19580405001)(81156014)(305945005)(68736007)(4326007)(50226002)(19580395003)(48376002)(8676002)(105586002)(76176999)(7846002)(92566002)(42186005)(2906002)(2950100001)(229853001); DIR:OUT; SFP:1101; SCL:1; SRVR:CY1PR12MB0444; H:localhost.localdomain; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY1PR12MB0444; 23:Uk3S0tTyTH5X8mTtu+8gLdjaNS67Tx4pq91HIVT6Z?= =?us-ascii?Q?KI3TRMngiCJ2LqBFqz321spENaI6LuE5bpqk74A0ovzwZBpdG33xPAINBLZy?= =?us-ascii?Q?3/r8FpxKiLo/7NjSNJhDfPJBMW2ZloX0PfNEQXV8GiL6/9wmxzoTh2WC6G0t?= =?us-ascii?Q?0RVg046iwhvcjY4QfqwnlKzj5/33LahndDI7Ha0og0hvShIkH/a8ny0H022D?= =?us-ascii?Q?/VXcwSnKeoy1fO0oDzPdQtpXh9yKqgKA9ktQXmAzamDS5qbw3vlcGC/CNtsm?= =?us-ascii?Q?cNyoG1ntUWoti5WGaqul8TEAKbEWybkV+X10fCGSZvDwX9QbsxSeybkDJsfm?= =?us-ascii?Q?pa+Yoh8iw3FeG1NU0yh9sGujMjwUfpYGt8xgkuXroe8ExOdAeVuvRi4EgUfk?= =?us-ascii?Q?5ysXt7BuZz9tXIqHsp2PL54idke9BwSwWIMBVivRpwKnv7MNhgP6Ync5Vgzy?= =?us-ascii?Q?QOX1W30xmOngDjRxXzVLvjyCH2KVm7WhHFJqxE6xxcHNRkx81epI9ChwmnWC?= =?us-ascii?Q?4vfJ6idLDxe8D1Z1wHfZcFp5LZnEGu2Mdrq0HOv4PksSZn21oyqSqTleX1ee?= =?us-ascii?Q?QxCzij81HoRQjIOjy21KwC2sxD9mZCV8rYis8K8W4wu+I9mCr5rWvG4uzPqv?= =?us-ascii?Q?Bc8UA/k767r2zIXq4BLmxRTZLE1AnSjjjXbI0IcH7QODEKbAYG2WRuNLCA5l?= =?us-ascii?Q?pJDJInl59qA/1oaXfnSvk3TvsPIQet+b0rxUvsT1pnqjb4LZ860PfwKWmzXh?= =?us-ascii?Q?XisUzCNYhj8JTapLPhR0D8YpCVl6ocNx+zB69/cHOZPvm3pL1kWXhokxgmMY?= =?us-ascii?Q?gJYvG2jJPqDJrz8++qK7aurMTr0f2qxsRAe86fWA0QPQwVjCutRNPpueKA9t?= =?us-ascii?Q?jXoOHBkBfS4SGb9UwMly33EnKEV6g1gzLN2v4yyIww9cVBXwUpQrosVEWrNH?= =?us-ascii?Q?o2+L5XzofU0/1HovdrRqLi+J3WUtIt+VeFPNClXV7MzYLT5kHp9pv81WX5Kc?= =?us-ascii?Q?INHGlrmGzLi+ODNYGTcxT65GqfZ7KFgRgc4uSNKnC7gAbZkXYcz/eKZFmv75?= =?us-ascii?Q?geyw17bHVaSHw/ktqxCbJcv4bLI2SX/WaELzSrnNUmL2YyiFZTujVoMb/zCo?= =?us-ascii?Q?5S+CaDOWnM=3D?= X-Microsoft-Exchange-Diagnostics: 1; CY1PR12MB0444; 6:XUNj42z0fV3Bf5A5Y7WJMdgUfRU+IoKna6PYaRrpZpWOQvoNu1l7I4RJA4Mrqe613I/s8e4aHSQVuVyF/gZf1LiTKtet39P7XnqpTNH0bovdsVDzL8PoS6kPJpGjPGwF1kkq2ruQbf/lDdtUzSSnbv2QQafMJxc54hJVd+5nfIuGziRDQIc8C4RdgzWVZG6yxZdt1haGmXRM+Bah0eu71qMp2XxHngFmyIQbfLmDqnxd7LIipuijDo4aqGOL/AwY0Id5+rFo6rePkDY9BUnJYVXELY4V6WVIyllWyJ4mqndOr9UAlDdhOH/vmGYT573kJGEpznTOzN0mE7G7DtxXjQ==; 5:OlDhVVlKRE9j34ySL9D/TmmHsw1olDvyFlkAiaB8w6QMyZURc5u0vKLhbvAXXlVVS+ByBXP1eIb023JPQ49Ffuam0XZbi/FEQ0TvPjtw8XcBAFvWwkdY1AwjqHLVkCMv5R1VlgKzwFqcpYMojdnCIg==; 24:lZQ2IkDB4UYel1u+0WIgyZ7q7hUbPx2htGA0Z3bEtx9eD+bfRg+Z6vaSfMEc1yx62rAL4FRSVz31Vfg6KW86WC1jRWWz4DInINkwjlYp0ik=; 7:rvDcbN3FXHk7G/C4D1oet4JJFqiTkJJ6lH7bPOsGXhNLRhpO0yGi2F0cY4x5LsPOJ1TXPuyjRizzOQy2gFv2JdNyakuPW8xOe+77yQi2GsmRpmuTVBHRYTA4eeWSEYmffW8yUCDoLq0fLiZ3mvBQcsHOmtsku7eB2H0PsUj60ZVOQaLnilYu4wygLEcN9tjX/Ir9zzrQnFXIFw75A8OjJloVtXu6y/95N0/4zkcW0Rmk7rwjzBsYLpDRupvpM6RC SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CY1PR12MB0444; 20:YEMM7OLNDva+EEuFemM9p8YBnEldhN687MWsh/gxmsQWUH7MLlBSn5KREBWcFO2OFdj1yh1Qk5fToqpvGLlRVMYFrWt+9Z+Xk5zwC5HKsIWMkOee+tVu++bKMDN9LzACbQIIYweoBaZV2jU0TcfpdM/zZLlW9aMV4k/nAjYTPIlGvUVoLOmcbQN7RtTDP4G/ccC3ImVjfh4WOiB7gaFo/nHVXmosnHMyV2t663zH9N62cv44XjFS5z+36yY9aGzs X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Jul 2016 10:13:06.0770 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR12MB0444 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Suravee Suthikulpanit This patch implements update_pi_irte function hook to allow SVM communicate to IOMMU driver regarding how to set up IRTE for handling posted interrupt. In case AVIC is enabled, during vcpu_load/unload, SVM needs to update IOMMU IRTE with appropriate host physical APIC ID. Also, when vcpu_blocking/unblocking, SVM needs to update the is-running bit in the IOMMU IRTE. Both are achieved via calling amd_iommu_update_ga(). However, if GA mode is not enabled for the pass-through device, IOMMU driver will simply just return when calling amd_iommu_update_ga. Signed-off-by: Suravee Suthikulpanit --- arch/x86/kvm/svm.c | 137 ++++++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 135 insertions(+), 2 deletions(-) -- 1.9.1 diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 968047e..09f2d26 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -43,6 +43,7 @@ #include #include #include +#include #include #include "trace.h" @@ -1341,6 +1342,13 @@ static void avic_vm_destroy(struct kvm *kvm) spin_unlock_irqrestore(&svm_vm_data_hash_lock, flags); } +static atomic_t avic_tag_gen = ATOMIC_INIT(0); + +static inline u32 avic_get_next_tag(void) +{ + return atomic_inc_return(&avic_tag_gen); +} + static int avic_vm_init(struct kvm *kvm) { unsigned long flags; @@ -1365,6 +1373,8 @@ static int avic_vm_init(struct kvm *kvm) if (!l_page) goto free_avic; + vm_data->avic_tag = avic_get_next_tag(); + vm_data->avic_logical_id_table_page = l_page; clear_page(page_address(l_page)); @@ -1379,6 +1389,18 @@ free_avic: return err; } +static inline int +avic_update_iommu(struct kvm_vcpu *vcpu, int cpu, phys_addr_t pa, bool r) +{ + struct kvm_arch *vm_data = &vcpu->kvm->arch; + + if (!kvm_arch_has_assigned_device(vcpu->kvm)) + return 0; + + return amd_iommu_update_ga(vcpu->vcpu_id, cpu, vm_data->avic_tag, + (pa & AVIC_HPA_MASK), r); +} + /** * This function is called during VCPU halt/unhalt. */ @@ -1401,9 +1423,16 @@ static void avic_set_running(struct kvm_vcpu *vcpu, bool is_run) WARN_ON(is_run == !!(entry & AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK)); entry &= ~AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK; - if (is_run) + if (is_run) { entry |= AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK; - WRITE_ONCE(*(svm->avic_physical_id_cache), entry); + WRITE_ONCE(*(svm->avic_physical_id_cache), entry); + avic_update_iommu(vcpu, h_physical_id, + page_to_phys(svm->avic_backing_page), 1); + } else { + avic_update_iommu(vcpu, h_physical_id, + page_to_phys(svm->avic_backing_page), 0); + WRITE_ONCE(*(svm->avic_physical_id_cache), entry); + } } static void avic_vcpu_load(struct kvm_vcpu *vcpu, int cpu) @@ -1430,6 +1459,9 @@ static void avic_vcpu_load(struct kvm_vcpu *vcpu, int cpu) entry |= AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK; WRITE_ONCE(*(svm->avic_physical_id_cache), entry); + avic_update_iommu(vcpu, h_physical_id, + page_to_phys(svm->avic_backing_page), + svm->avic_is_running); } static void avic_vcpu_put(struct kvm_vcpu *vcpu) @@ -1441,6 +1473,10 @@ static void avic_vcpu_put(struct kvm_vcpu *vcpu) return; entry = READ_ONCE(*(svm->avic_physical_id_cache)); + if (entry & AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK) + avic_update_iommu(vcpu, -1, + page_to_phys(svm->avic_backing_page), 0); + entry &= ~AVIC_PHYSICAL_ID_ENTRY_IS_RUNNING_MASK; WRITE_ONCE(*(svm->avic_physical_id_cache), entry); } @@ -4302,6 +4338,102 @@ static void svm_deliver_avic_intr(struct kvm_vcpu *vcpu, int vec) kvm_vcpu_wake_up(vcpu); } +/* + * svm_update_pi_irte - set IRTE for Posted-Interrupts + * + * @kvm: kvm + * @host_irq: host irq of the interrupt + * @guest_irq: gsi of the interrupt + * @set: set or unset PI + * returns 0 on success, < 0 on failure + */ +static int svm_update_pi_irte(struct kvm *kvm, unsigned int host_irq, + uint32_t guest_irq, bool set) +{ + struct kvm_kernel_irq_routing_entry *e; + struct kvm_irq_routing_table *irq_rt; + struct kvm_lapic_irq irq; + struct kvm_vcpu *vcpu = NULL; + struct vcpu_data vcpu_info; + int idx, ret = -EINVAL; + struct vcpu_svm *svm; + struct amd_iommu_pi_data pi_data; + + if (!kvm_arch_has_assigned_device(kvm) || + !irq_remapping_cap(IRQ_POSTING_CAP)) + return 0; + + pr_debug("SVM: %s: host_irq=%#x, guest_irq=%#x, set=%#x\n", + __func__, host_irq, guest_irq, set); + + idx = srcu_read_lock(&kvm->irq_srcu); + irq_rt = srcu_dereference(kvm->irq_routing, &kvm->irq_srcu); + WARN_ON(guest_irq >= irq_rt->nr_rt_entries); + + hlist_for_each_entry(e, &irq_rt->map[guest_irq], link) { + if (e->type != KVM_IRQ_ROUTING_MSI) + continue; + + /** + * Note: + * The HW cannot support posting multicast/broadcast + * interrupts to a vCPU. So, we still use interrupt + * remapping for these kind of interrupts. + * + * For lowest-priority interrupts, we only support + * those with single CPU as the destination, e.g. user + * configures the interrupts via /proc/irq or uses + * irqbalance to make the interrupts single-CPU. + */ + kvm_set_msi_irq(e, &irq); + if (kvm_intr_is_single_vcpu(kvm, &irq, &vcpu)) { + svm = to_svm(vcpu); + vcpu_info.pi_desc_addr = page_to_phys(svm->avic_backing_page); + vcpu_info.vector = irq.vector; + + trace_kvm_pi_irte_update(vcpu->vcpu_id, host_irq, e->gsi, + vcpu_info.vector, + vcpu_info.pi_desc_addr, set); + + pi_data.vcpu_id = vcpu->vcpu_id; + + pr_debug("SVM: %s: use GA mode for irq %u\n", __func__, + irq.vector); + } else { + set = false; + + pr_debug("SVM: %s: use legacy intr remap mode for irq %u\n", + __func__, irq.vector); + } + + /** + * Note: + * When AVIC is disabled, we fall-back to setup + * IRTE w/ legacy mode + */ + if (set && kvm_vcpu_apicv_active(&svm->vcpu)) { + /* Enable GA mode in IRTE */ + pi_data.avic_tag = kvm->arch.avic_tag; + pi_data.vcpu_data = &vcpu_info; + ret = irq_set_vcpu_affinity(host_irq, &pi_data); + } else { + /* Use legacy mode in IRTE */ + pi_data.vcpu_data = NULL; + ret = irq_set_vcpu_affinity(host_irq, &pi_data); + } + + if (ret < 0) { + pr_err("%s: failed to update PI IRTE\n", __func__); + goto out; + } + } + + ret = 0; +out: + srcu_read_unlock(&kvm->irq_srcu, idx); + return ret; +} + static int svm_nmi_allowed(struct kvm_vcpu *vcpu) { struct vcpu_svm *svm = to_svm(vcpu); @@ -5128,6 +5260,7 @@ static struct kvm_x86_ops svm_x86_ops = { .pmu_ops = &amd_pmu_ops, .deliver_posted_interrupt = svm_deliver_avic_intr, + .update_pi_irte = svm_update_pi_irte, }; static int __init svm_init(void)