diff options
Diffstat (limited to 'virt/kvm/irq_comm.c')
| -rw-r--r-- | virt/kvm/irq_comm.c | 194 | 
1 files changed, 3 insertions, 191 deletions
diff --git a/virt/kvm/irq_comm.c b/virt/kvm/irq_comm.c index 25ab48007ad..e2e6b4473a9 100644 --- a/virt/kvm/irq_comm.c +++ b/virt/kvm/irq_comm.c @@ -151,59 +151,6 @@ static int kvm_set_msi_inatomic(struct kvm_kernel_irq_routing_entry *e,  		return -EWOULDBLOCK;  } -int kvm_send_userspace_msi(struct kvm *kvm, struct kvm_msi *msi) -{ -	struct kvm_kernel_irq_routing_entry route; - -	if (!irqchip_in_kernel(kvm) || msi->flags != 0) -		return -EINVAL; - -	route.msi.address_lo = msi->address_lo; -	route.msi.address_hi = msi->address_hi; -	route.msi.data = msi->data; - -	return kvm_set_msi(&route, kvm, KVM_USERSPACE_IRQ_SOURCE_ID, 1, false); -} - -/* - * Return value: - *  < 0   Interrupt was ignored (masked or not delivered for other reasons) - *  = 0   Interrupt was coalesced (previous irq is still pending) - *  > 0   Number of CPUs interrupt was delivered to - */ -int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level, -		bool line_status) -{ -	struct kvm_kernel_irq_routing_entry *e, irq_set[KVM_NR_IRQCHIPS]; -	int ret = -1, i = 0; -	struct kvm_irq_routing_table *irq_rt; - -	trace_kvm_set_irq(irq, level, irq_source_id); - -	/* Not possible to detect if the guest uses the PIC or the -	 * IOAPIC.  So set the bit in both. The guest will ignore -	 * writes to the unused one. -	 */ -	rcu_read_lock(); -	irq_rt = rcu_dereference(kvm->irq_routing); -	if (irq < irq_rt->nr_rt_entries) -		hlist_for_each_entry(e, &irq_rt->map[irq], link) -			irq_set[i++] = *e; -	rcu_read_unlock(); - -	while(i--) { -		int r; -		r = irq_set[i].set(&irq_set[i], kvm, irq_source_id, level, -				line_status); -		if (r < 0) -			continue; - -		ret = r + ((ret < 0) ? 0 : ret); -	} - -	return ret; -} -  /*   * Deliver an IRQ in an atomic context if we can, or return a failure,   * user can retry in a process context. @@ -241,63 +188,6 @@ int kvm_set_irq_inatomic(struct kvm *kvm, int irq_source_id, u32 irq, int level)  	return ret;  } -bool kvm_irq_has_notifier(struct kvm *kvm, unsigned irqchip, unsigned pin) -{ -	struct kvm_irq_ack_notifier *kian; -	int gsi; - -	rcu_read_lock(); -	gsi = rcu_dereference(kvm->irq_routing)->chip[irqchip][pin]; -	if (gsi != -1) -		hlist_for_each_entry_rcu(kian, &kvm->irq_ack_notifier_list, -					 link) -			if (kian->gsi == gsi) { -				rcu_read_unlock(); -				return true; -			} - -	rcu_read_unlock(); - -	return false; -} -EXPORT_SYMBOL_GPL(kvm_irq_has_notifier); - -void kvm_notify_acked_irq(struct kvm *kvm, unsigned irqchip, unsigned pin) -{ -	struct kvm_irq_ack_notifier *kian; -	int gsi; - -	trace_kvm_ack_irq(irqchip, pin); - -	rcu_read_lock(); -	gsi = rcu_dereference(kvm->irq_routing)->chip[irqchip][pin]; -	if (gsi != -1) -		hlist_for_each_entry_rcu(kian, &kvm->irq_ack_notifier_list, -					 link) -			if (kian->gsi == gsi) -				kian->irq_acked(kian); -	rcu_read_unlock(); -} - -void kvm_register_irq_ack_notifier(struct kvm *kvm, -				   struct kvm_irq_ack_notifier *kian) -{ -	mutex_lock(&kvm->irq_lock); -	hlist_add_head_rcu(&kian->link, &kvm->irq_ack_notifier_list); -	mutex_unlock(&kvm->irq_lock); -	kvm_vcpu_request_scan_ioapic(kvm); -} - -void kvm_unregister_irq_ack_notifier(struct kvm *kvm, -				    struct kvm_irq_ack_notifier *kian) -{ -	mutex_lock(&kvm->irq_lock); -	hlist_del_init_rcu(&kian->link); -	mutex_unlock(&kvm->irq_lock); -	synchronize_rcu(); -	kvm_vcpu_request_scan_ioapic(kvm); -} -  int kvm_request_irq_source_id(struct kvm *kvm)  {  	unsigned long *bitmap = &kvm->arch.irq_sources_bitmap; @@ -381,34 +271,14 @@ void kvm_fire_mask_notifiers(struct kvm *kvm, unsigned irqchip, unsigned pin,  	rcu_read_unlock();  } -void kvm_free_irq_routing(struct kvm *kvm) -{ -	/* Called only during vm destruction. Nobody can use the pointer -	   at this stage */ -	kfree(kvm->irq_routing); -} - -static int setup_routing_entry(struct kvm_irq_routing_table *rt, -			       struct kvm_kernel_irq_routing_entry *e, -			       const struct kvm_irq_routing_entry *ue) +int kvm_set_routing_entry(struct kvm_irq_routing_table *rt, +			  struct kvm_kernel_irq_routing_entry *e, +			  const struct kvm_irq_routing_entry *ue)  {  	int r = -EINVAL;  	int delta;  	unsigned max_pin; -	struct kvm_kernel_irq_routing_entry *ei; -	/* -	 * Do not allow GSI to be mapped to the same irqchip more than once. -	 * Allow only one to one mapping between GSI and MSI. -	 */ -	hlist_for_each_entry(ei, &rt->map[ue->gsi], link) -		if (ei->type == KVM_IRQ_ROUTING_MSI || -		    ue->type == KVM_IRQ_ROUTING_MSI || -		    ue->u.irqchip.irqchip == ei->irqchip.irqchip) -			return r; - -	e->gsi = ue->gsi; -	e->type = ue->type;  	switch (ue->type) {  	case KVM_IRQ_ROUTING_IRQCHIP:  		delta = 0; @@ -445,66 +315,8 @@ static int setup_routing_entry(struct kvm_irq_routing_table *rt,  		goto out;  	} -	hlist_add_head(&e->link, &rt->map[e->gsi]); -	r = 0; -out: -	return r; -} - - -int kvm_set_irq_routing(struct kvm *kvm, -			const struct kvm_irq_routing_entry *ue, -			unsigned nr, -			unsigned flags) -{ -	struct kvm_irq_routing_table *new, *old; -	u32 i, j, nr_rt_entries = 0; -	int r; - -	for (i = 0; i < nr; ++i) { -		if (ue[i].gsi >= KVM_MAX_IRQ_ROUTES) -			return -EINVAL; -		nr_rt_entries = max(nr_rt_entries, ue[i].gsi); -	} - -	nr_rt_entries += 1; - -	new = kzalloc(sizeof(*new) + (nr_rt_entries * sizeof(struct hlist_head)) -		      + (nr * sizeof(struct kvm_kernel_irq_routing_entry)), -		      GFP_KERNEL); - -	if (!new) -		return -ENOMEM; - -	new->rt_entries = (void *)&new->map[nr_rt_entries]; - -	new->nr_rt_entries = nr_rt_entries; -	for (i = 0; i < 3; i++) -		for (j = 0; j < KVM_IOAPIC_NUM_PINS; j++) -			new->chip[i][j] = -1; - -	for (i = 0; i < nr; ++i) { -		r = -EINVAL; -		if (ue->flags) -			goto out; -		r = setup_routing_entry(new, &new->rt_entries[i], ue); -		if (r) -			goto out; -		++ue; -	} - -	mutex_lock(&kvm->irq_lock); -	old = kvm->irq_routing; -	kvm_irq_routing_update(kvm, new); -	mutex_unlock(&kvm->irq_lock); - -	synchronize_rcu(); - -	new = old;  	r = 0; -  out: -	kfree(new);  	return r;  }  |