From nobody Fri May 3 13:11:06 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org ARC-Seal: i=1; a=rsa-sha256; t=1575882584; cv=none; d=zohomail.com; s=zohoarc; b=YcePy7l9aDJ+UQXH01BpSqLx/6flpcNFkruAUFqRdQ/NoKAD0kp5KYz457+sK3DRWzd9NMRP1ZRhKwRusbFFZJ+K8drWZVAvVm7gOa64ZojpGABDsRsLOyxOjg2T/GwhzdxRQ5iThmM3zo6tE043i3Bi3I7CpyXdNciUqV+IYf8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1575882584; h=Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=ytPK+hH06lqGjyswEy6eX9rtlUfTVQLT89l523gdpMs=; b=csPPuF+VMETOn7uTxqMBiU34tufcJ3UpPh1gwCmdKE8D0Ua3fj00f1WkJNq1qCox+5k7ifpUDQpVopkeXMgBJ6wmjJMb/pIHFAVDPhHvalrdl+zJ6cdZOA9/KFSatXhzPwLk/O/z6tDNlrY1FvCd64pj+42AHZFMeKoWCaWIqKk= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1575882584545301.4632842717207; Mon, 9 Dec 2019 01:09:44 -0800 (PST) Received: from localhost ([::1]:37594 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1ieF31-0002IO-BU for importer@patchew.org; Mon, 09 Dec 2019 04:09:43 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:48085) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1ieDV0-0001AC-AC for qemu-devel@nongnu.org; Mon, 09 Dec 2019 02:30:31 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1ieDUy-0003nb-Mq for qemu-devel@nongnu.org; Mon, 09 Dec 2019 02:30:30 -0500 Received: from mail-pl1-x642.google.com ([2607:f8b0:4864:20::642]:34694) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1ieDUy-0003mN-9A for qemu-devel@nongnu.org; Mon, 09 Dec 2019 02:30:28 -0500 Received: by mail-pl1-x642.google.com with SMTP id x17so164254pln.1 for ; Sun, 08 Dec 2019 23:30:27 -0800 (PST) Received: from localhost.localdomain (p5309002-ipngn11902marunouchi.tokyo.ocn.ne.jp. [114.166.47.2]) by smtp.gmail.com with ESMTPSA id q22sm26104660pfg.170.2019.12.08.23.30.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 08 Dec 2019 23:30:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=etsukata-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=ytPK+hH06lqGjyswEy6eX9rtlUfTVQLT89l523gdpMs=; b=TQXHKbh/UREXMkgVaVPmqJupbseTmERK85MSDdLPis5u1tVUExHIF2zXEQ/a3R7uQ7 IPwFTVpkEKj9e2i7wuejXnNviflA1eEBi2XSijSCJWlUZqr0N0qS4AiLae2W5JKZGke6 yEY+P7bfGFI0rkklI1oaiX+BH37TCypVO2MUIY0VN5bxvayX/7eItAEw1NtOKFiV5vuB BcjIw/fftHvBa+JpOPXVmCr+A99xGhk+DLnSd6EYBv/p3Mz4dCnXhGjcn1AIPquwtA7+ YXUnwb5nWCYHsraEPdT1miHxDXgCe0/3cNCob32aTC+P57mY7Q17STKGBu/UInM6fLM2 Byxw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=ytPK+hH06lqGjyswEy6eX9rtlUfTVQLT89l523gdpMs=; b=c+X/P2jPjdWpsQARhrb+CZZvDXQHgf5Vk1HGzrS9nRN1g7LtoxddDzlSF2XSK/YgAj 1+k6TNDKK3Rh0KB1jMNzSg6NjsBjYzIsA51+4xv43ajyaCHu2HtOp2OYYTBcMrhGNlFv aLxzpsWLBYOlUVzIbrBwwwqXJLY7BCvcbjdEKcouFfUijS9a4+qD/V4KdppCB00eHtb+ 7iL27q899ZpRFIZMVvqlv0tCWkalY/Bm1cddfBLe5jEvyt5i2iqIK6B37KG8pzmgU5hZ ohY7F9Qvq49Hz4QXIeWI3GG6euCh6ngqk6YxpLPMZVmJJQkvgL452gHBrm1S3kVAtX5P LnIQ== X-Gm-Message-State: APjAAAWuXnbE2xW9GugjXqriRO+hwQSFWL2Csu8Fhc5ymiJZ9l8t+oFH q0UW+V91nLUjc0dCerkVzUZ8BA== X-Google-Smtp-Source: APXvYqzqCU1qinCtg2re+a0Na3/RreE9wGd00R/ycD/EeVqpcds+bFJlRj6O+FZYejrD+pKoLWVleA== X-Received: by 2002:a17:902:968b:: with SMTP id n11mr23780213plp.120.1575876626379; Sun, 08 Dec 2019 23:30:26 -0800 (PST) From: Eiichi Tsukata To: pbonzini@redhat.com, mtosatti@redhat.com, rth@twiddle.net, ehabkost@redhat.com, qemu-devel@nongnu.org, qemu-trivial@nongnu.org Subject: [PATCH] target/i386: remove unused pci-assign codes Date: Mon, 9 Dec 2019 16:29:32 +0900 Message-Id: <20191209072932.313056-1-devel@etsukata.com> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. X-Received-From: 2607:f8b0:4864:20::642 X-Mailman-Approved-At: Mon, 09 Dec 2019 04:08:43 -0500 X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Eiichi Tsukata Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @etsukata-com.20150623.gappssmtp.com) Content-Type: text/plain; charset="utf-8" Legacy PCI device assignment has been already removed in commit ab37bfc7d641 ("pci-assign: Remove"), but some codes remain unused. CC: qemu-trivial@nongnu.org Signed-off-by: Eiichi Tsukata --- target/i386/kvm.c | 140 ----------------------------------------- target/i386/kvm_i386.h | 20 ------ 2 files changed, 160 deletions(-) diff --git a/target/i386/kvm.c b/target/i386/kvm.c index bf1655645b..efd39843c4 100644 --- a/target/i386/kvm.c +++ b/target/i386/kvm.c @@ -4505,146 +4505,6 @@ int kvm_arch_irqchip_create(MachineState *ms, KVMSt= ate *s) } } =20 -/* Classic KVM device assignment interface. Will remain x86 only. */ -int kvm_device_pci_assign(KVMState *s, PCIHostDeviceAddress *dev_addr, - uint32_t flags, uint32_t *dev_id) -{ - struct kvm_assigned_pci_dev dev_data =3D { - .segnr =3D dev_addr->domain, - .busnr =3D dev_addr->bus, - .devfn =3D PCI_DEVFN(dev_addr->slot, dev_addr->function), - .flags =3D flags, - }; - int ret; - - dev_data.assigned_dev_id =3D - (dev_addr->domain << 16) | (dev_addr->bus << 8) | dev_data.devfn; - - ret =3D kvm_vm_ioctl(s, KVM_ASSIGN_PCI_DEVICE, &dev_data); - if (ret < 0) { - return ret; - } - - *dev_id =3D dev_data.assigned_dev_id; - - return 0; -} - -int kvm_device_pci_deassign(KVMState *s, uint32_t dev_id) -{ - struct kvm_assigned_pci_dev dev_data =3D { - .assigned_dev_id =3D dev_id, - }; - - return kvm_vm_ioctl(s, KVM_DEASSIGN_PCI_DEVICE, &dev_data); -} - -static int kvm_assign_irq_internal(KVMState *s, uint32_t dev_id, - uint32_t irq_type, uint32_t guest_irq) -{ - struct kvm_assigned_irq assigned_irq =3D { - .assigned_dev_id =3D dev_id, - .guest_irq =3D guest_irq, - .flags =3D irq_type, - }; - - if (kvm_check_extension(s, KVM_CAP_ASSIGN_DEV_IRQ)) { - return kvm_vm_ioctl(s, KVM_ASSIGN_DEV_IRQ, &assigned_irq); - } else { - return kvm_vm_ioctl(s, KVM_ASSIGN_IRQ, &assigned_irq); - } -} - -int kvm_device_intx_assign(KVMState *s, uint32_t dev_id, bool use_host_msi, - uint32_t guest_irq) -{ - uint32_t irq_type =3D KVM_DEV_IRQ_GUEST_INTX | - (use_host_msi ? KVM_DEV_IRQ_HOST_MSI : KVM_DEV_IRQ_HOST_INTX); - - return kvm_assign_irq_internal(s, dev_id, irq_type, guest_irq); -} - -int kvm_device_intx_set_mask(KVMState *s, uint32_t dev_id, bool masked) -{ - struct kvm_assigned_pci_dev dev_data =3D { - .assigned_dev_id =3D dev_id, - .flags =3D masked ? KVM_DEV_ASSIGN_MASK_INTX : 0, - }; - - return kvm_vm_ioctl(s, KVM_ASSIGN_SET_INTX_MASK, &dev_data); -} - -static int kvm_deassign_irq_internal(KVMState *s, uint32_t dev_id, - uint32_t type) -{ - struct kvm_assigned_irq assigned_irq =3D { - .assigned_dev_id =3D dev_id, - .flags =3D type, - }; - - return kvm_vm_ioctl(s, KVM_DEASSIGN_DEV_IRQ, &assigned_irq); -} - -int kvm_device_intx_deassign(KVMState *s, uint32_t dev_id, bool use_host_m= si) -{ - return kvm_deassign_irq_internal(s, dev_id, KVM_DEV_IRQ_GUEST_INTX | - (use_host_msi ? KVM_DEV_IRQ_HOST_MSI : KVM_DEV_IRQ_HOST_INTX)); -} - -int kvm_device_msi_assign(KVMState *s, uint32_t dev_id, int virq) -{ - return kvm_assign_irq_internal(s, dev_id, KVM_DEV_IRQ_HOST_MSI | - KVM_DEV_IRQ_GUEST_MSI, virq); -} - -int kvm_device_msi_deassign(KVMState *s, uint32_t dev_id) -{ - return kvm_deassign_irq_internal(s, dev_id, KVM_DEV_IRQ_GUEST_MSI | - KVM_DEV_IRQ_HOST_MSI); -} - -bool kvm_device_msix_supported(KVMState *s) -{ - /* The kernel lacks a corresponding KVM_CAP, so we probe by calling - * KVM_ASSIGN_SET_MSIX_NR with an invalid parameter. */ - return kvm_vm_ioctl(s, KVM_ASSIGN_SET_MSIX_NR, NULL) =3D=3D -EFAULT; -} - -int kvm_device_msix_init_vectors(KVMState *s, uint32_t dev_id, - uint32_t nr_vectors) -{ - struct kvm_assigned_msix_nr msix_nr =3D { - .assigned_dev_id =3D dev_id, - .entry_nr =3D nr_vectors, - }; - - return kvm_vm_ioctl(s, KVM_ASSIGN_SET_MSIX_NR, &msix_nr); -} - -int kvm_device_msix_set_vector(KVMState *s, uint32_t dev_id, uint32_t vect= or, - int virq) -{ - struct kvm_assigned_msix_entry msix_entry =3D { - .assigned_dev_id =3D dev_id, - .gsi =3D virq, - .entry =3D vector, - }; - - return kvm_vm_ioctl(s, KVM_ASSIGN_SET_MSIX_ENTRY, &msix_entry); -} - -int kvm_device_msix_assign(KVMState *s, uint32_t dev_id) -{ - return kvm_assign_irq_internal(s, dev_id, KVM_DEV_IRQ_HOST_MSIX | - KVM_DEV_IRQ_GUEST_MSIX, 0); -} - -int kvm_device_msix_deassign(KVMState *s, uint32_t dev_id) -{ - return kvm_deassign_irq_internal(s, dev_id, KVM_DEV_IRQ_GUEST_MSIX | - KVM_DEV_IRQ_HOST_MSIX); -} - int kvm_arch_fixup_msi_route(struct kvm_irq_routing_entry *route, uint64_t address, uint32_t data, PCIDevice *d= ev) { diff --git a/target/i386/kvm_i386.h b/target/i386/kvm_i386.h index 06fe06bdb3..7d0242f5fb 100644 --- a/target/i386/kvm_i386.h +++ b/target/i386/kvm_i386.h @@ -40,26 +40,6 @@ void kvm_synchronize_all_tsc(void); void kvm_arch_reset_vcpu(X86CPU *cs); void kvm_arch_do_init_vcpu(X86CPU *cs); =20 -int kvm_device_pci_assign(KVMState *s, PCIHostDeviceAddress *dev_addr, - uint32_t flags, uint32_t *dev_id); -int kvm_device_pci_deassign(KVMState *s, uint32_t dev_id); - -int kvm_device_intx_assign(KVMState *s, uint32_t dev_id, - bool use_host_msi, uint32_t guest_irq); -int kvm_device_intx_set_mask(KVMState *s, uint32_t dev_id, bool masked); -int kvm_device_intx_deassign(KVMState *s, uint32_t dev_id, bool use_host_m= si); - -int kvm_device_msi_assign(KVMState *s, uint32_t dev_id, int virq); -int kvm_device_msi_deassign(KVMState *s, uint32_t dev_id); - -bool kvm_device_msix_supported(KVMState *s); -int kvm_device_msix_init_vectors(KVMState *s, uint32_t dev_id, - uint32_t nr_vectors); -int kvm_device_msix_set_vector(KVMState *s, uint32_t dev_id, uint32_t vect= or, - int virq); -int kvm_device_msix_assign(KVMState *s, uint32_t dev_id); -int kvm_device_msix_deassign(KVMState *s, uint32_t dev_id); - void kvm_put_apicbase(X86CPU *cpu, uint64_t value); =20 bool kvm_enable_x2apic(void); --=20 2.23.0