From patchwork Wed Apr 5 16:30:00 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= X-Patchwork-Id: 670332 Delivered-To: patch@linaro.org Received: by 2002:a5d:4d08:0:0:0:0:0 with SMTP id z8csp378843wrt; Wed, 5 Apr 2023 09:32:44 -0700 (PDT) X-Google-Smtp-Source: AKy350asC06MyLYIYov8Q3pWuU/HxIa8zIo3ajPOIop90rNap+oT4mT23XaMucWJGeH3ViyOOeIZ X-Received: by 2002:ac8:5e11:0:b0:3e4:e14f:dc3c with SMTP id h17-20020ac85e11000000b003e4e14fdc3cmr5546742qtx.11.1680712363709; Wed, 05 Apr 2023 09:32:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680712363; cv=none; d=google.com; s=arc-20160816; b=Tw9Jko1raDx7GmLAev0a/d/45+jmuM1u+C8tF7pGA3zP+dt4c2/HVv+u3QLIN2jdIb U87kqUdwCh0q1958uDe90ieKVBvN78/F4PPqWx5Nc9ryJ9vvhH4qzjKr6h279B1uBb+V s+6mZpR9QZmNxFx3qxS0Rvg7Y5U/Y1+e3Tr03VYBkYjC3DPRBOavh0rbEEzZGInyVjCm Sk5VF+3qsVleyHHeMy5adozrVf6/V7+ApH5VFjIl4R6M5nbPF4IROG2QRXxt55xrPG+Z 3Y+c0fQFIwNgmtG4nXfSxeZf+dXd8NAj+H/oZeoPZdscPGxzmlrAnG1kHDVEIOJ+1Ggq Q9hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=c538Zj8/ZzoWHrsl/6z0orfkIGBCyPJwQzxqT1TQtNk=; b=Ka9lT0b8mvHoBAywDE38/dpyvI+hSkwbslLrgCfOuGnMZtetQt3mYHf7VrG3xyGQ02 NSPrdpNdFQyc3qcEQvNvnKmCArBvxRqlFZ7JIezHlkmsAEcNT5o1ot+KEr72vA2hB24Z ZCA1QN/J+WCUKUyPxs6UOstkY3Y/AdP+0PGCv1MlSq6kbhZ5wUW1tqlQyyrKi7zovLIw M6MMa5urIxMSsyygig69D7pGzXZdL8kOWsQvYo9pwsTtghARjRUrIrZfhyC6Q4pew/Ui tKnc+M5H09FDW2Y5tJ2m1JW7++ovYSdgTe/At5eBuT2yTbbOPFIus0W04ccGDDEgAVm/ it2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=f+U64mz5; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [209.51.188.17]) by mx.google.com with ESMTPS id v13-20020a05622a188d00b003d859501bf8si9975755qtc.774.2023.04.05.09.32.43 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Wed, 05 Apr 2023 09:32:43 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=f+U64mz5; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1pk61c-0005VJ-Vj; Wed, 05 Apr 2023 12:30:22 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1pk61b-0005Sy-6s for qemu-devel@nongnu.org; Wed, 05 Apr 2023 12:30:19 -0400 Received: from mail-wm1-x331.google.com ([2a00:1450:4864:20::331]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1pk61V-0004iT-DY for qemu-devel@nongnu.org; Wed, 05 Apr 2023 12:30:18 -0400 Received: by mail-wm1-x331.google.com with SMTP id v14-20020a05600c470e00b003f06520825fso1435216wmo.0 for ; Wed, 05 Apr 2023 09:30:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1680712211; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=c538Zj8/ZzoWHrsl/6z0orfkIGBCyPJwQzxqT1TQtNk=; b=f+U64mz50PENhMb285WO1NXu9mcGs0+/5Y3IdTk0tAptZ1E545gCM11cQGsVUuTuRs zh0kgc2PuyWXy+p536JjoYXgU9s+xVjm2nmw3NQsWtlwVk1fpzZtOVMKOjxvdnBgSjbY RXCIG8xNFPQiAw5ubmUTB6ML53HYsaGogcdzXPSmmquDllIuEUXeCWdSmYPFyLdOuUqD Z8eQXlyuwIg1vghArjOVAIIvRyB0GtMoAEbiOyFDauZx7XVDPU73zRXMErZEioqfaQ+s I9VnI+WOv7BUm0aSZAKUqo8HA5LXvDQ1aE0wYP+wD2qcFDgWDmgGCCBX4DXeGk0b46Jq kwkw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680712211; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=c538Zj8/ZzoWHrsl/6z0orfkIGBCyPJwQzxqT1TQtNk=; b=xyLdYmJhylhA+EDkIFa6e+8QHNTgkVxcPE/LbehldK9CB18lnWQg2+Hvghzw4hTddK D5imEw+Th9ZbnXZNlSKvA8+d8BhXJMV9zrEKvVzjQEFL3T/UUMXdj5qoHLaT3NtDEI2R 1jA/hj43Po+4gvi8cIhSqd9AUauDOSx/YrqCclbYMyYLFIsMwOYhrw1ieBsg3kuU3xlk nbnUNcfY73D/KahNa5hf4GfUBmGgsKZgIgpZVE3iCN+MJQvbqoTvO5tsQsupxAUgP7Ja QmIh01SGC88NYNQikpD3GNScHseqanfD8z9uY7Zhlne/gT70+fb2pyDjku82SOUJhcUu 477A== X-Gm-Message-State: AAQBX9fk1EdwlrusN22uFdFxiudd5uKYgnLjfpMi+UskfdN4w+mgEesJ rcKe5icDdff3bwOXU5jRpuBFVRm5x9UDzLKMucs= X-Received: by 2002:a7b:c3ce:0:b0:3ed:8c60:c512 with SMTP id t14-20020a7bc3ce000000b003ed8c60c512mr4944253wmj.17.1680712211351; Wed, 05 Apr 2023 09:30:11 -0700 (PDT) Received: from localhost.localdomain (4ab54-h01-176-184-52-81.dsl.sta.abo.bbox.fr. [176.184.52.81]) by smtp.gmail.com with ESMTPSA id g6-20020a05600c4ec600b003edc4788fa0sm2796592wmq.2.2023.04.05.09.30.08 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Wed, 05 Apr 2023 09:30:10 -0700 (PDT) From: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org, Paolo Bonzini Cc: qemu-arm@nongnu.org, kvm@vger.kernel.org, qemu-s390x@nongnu.org, qemu-ppc@nongnu.org, =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= , Peter Maydell , "Michael S. Tsirkin" , Peter Xu , Jason Wang , Richard Henderson , Eduardo Habkost , Marcel Apfelbaum , Thomas Huth , Halil Pasic , Christian Borntraeger , David Hildenbrand , =?utf-8?q?C=C3=A9dric_Le_Goater?= , Daniel Henrique Barboza , David Gibson , Greg Kurz , Elena Ufimtseva , Jagannathan Raman , John G Johnson , Cornelia Huck , Eric Farman , Ilya Leoshkevich , Alex Williamson , Marcelo Tosatti , David Woodhouse , Paul Durrant Subject: [RFC PATCH 1/2] accel/kvm: Extract 'sysemu/kvm_irq.h' from 'sysemu/kvm.h' Date: Wed, 5 Apr 2023 18:30:00 +0200 Message-Id: <20230405163001.98573-2-philmd@linaro.org> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20230405163001.98573-1-philmd@linaro.org> References: <20230405163001.98573-1-philmd@linaro.org> MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::331; envelope-from=philmd@linaro.org; helo=mail-wm1-x331.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: qemu-devel-bounces+patch=linaro.org@nongnu.org "sysemu/kvm.h" header is meant to contain the 'external' KVM API accessed by all the code base. KVM *internal* API aims to reside in "sysemu/kvm_int.h", accessible by files in accel/kvm/ and each target/ implementation. Hardware models should only access the external API. "sysemu/kvm.h" is quite big. Extract the KVM IRQ declarations to "sysemu/kvm_irq.h" to reduce this header complexity. This will ease extracting internal prototypes to "sysemu/kvm_int.h". Signed-off-by: Philippe Mathieu-Daudé --- include/sysemu/kvm.h | 76 ------------------------- include/sysemu/kvm_irq.h | 100 +++++++++++++++++++++++++++++++++ target/i386/kvm/kvm_i386.h | 1 + accel/kvm/kvm-all.c | 2 + accel/stubs/kvm-stub.c | 1 + hw/arm/virt.c | 1 + hw/cpu/a15mpcore.c | 1 + hw/hyperv/hyperv.c | 1 + hw/i386/intel_iommu.c | 1 + hw/i386/kvm/apic.c | 1 + hw/i386/kvm/i8259.c | 1 + hw/i386/kvm/ioapic.c | 1 + hw/i386/kvmvapic.c | 1 + hw/i386/pc.c | 1 + hw/i386/x86-iommu.c | 1 + hw/intc/arm_gic.c | 1 + hw/intc/arm_gic_common.c | 1 + hw/intc/arm_gic_kvm.c | 1 + hw/intc/arm_gicv3_common.c | 1 + hw/intc/arm_gicv3_its_common.c | 1 + hw/intc/arm_gicv3_kvm.c | 1 + hw/intc/ioapic.c | 1 + hw/intc/openpic_kvm.c | 1 + hw/intc/s390_flic_kvm.c | 1 + hw/intc/spapr_xive_kvm.c | 1 + hw/intc/xics.c | 1 + hw/intc/xics_kvm.c | 1 + hw/misc/ivshmem.c | 1 + hw/ppc/e500.c | 1 + hw/ppc/spapr_irq.c | 1 + hw/remote/proxy.c | 1 + hw/s390x/virtio-ccw.c | 1 + hw/vfio/pci.c | 1 + hw/vfio/platform.c | 1 + hw/virtio/virtio-pci.c | 1 + target/arm/kvm.c | 1 + target/i386/kvm/kvm.c | 2 + target/i386/kvm/xen-emu.c | 2 + target/i386/sev.c | 1 + target/s390x/kvm/kvm.c | 2 + 40 files changed, 142 insertions(+), 76 deletions(-) create mode 100644 include/sysemu/kvm_irq.h diff --git a/include/sysemu/kvm.h b/include/sysemu/kvm.h index 7902acdfd9..32e223a368 100644 --- a/include/sysemu/kvm.h +++ b/include/sysemu/kvm.h @@ -187,7 +187,6 @@ extern bool kvm_msi_use_devid; #endif /* CONFIG_KVM_IS_POSSIBLE */ struct kvm_run; -struct kvm_lapic_state; struct kvm_irq_routing_entry; typedef struct KVMCapabilityInfo { @@ -223,20 +222,6 @@ int kvm_has_debugregs(void); int kvm_max_nested_state_length(void); int kvm_has_pit_state2(void); int kvm_has_many_ioeventfds(void); -int kvm_has_gsi_routing(void); -int kvm_has_intx_set_mask(void); - -/** - * kvm_arm_supports_user_irq - * - * Not all KVM implementations support notifications for kernel generated - * interrupt events to user space. This function indicates whether the current - * KVM implementation does support them. - * - * Returns: true if KVM supports using kernel generated IRQs from user space - */ -bool kvm_arm_supports_user_irq(void); - int kvm_on_sigbus_vcpu(CPUState *cpu, int code, void *addr); int kvm_on_sigbus(int code, void *addr); @@ -395,17 +380,6 @@ int kvm_arch_release_virq_post(int virq); int kvm_arch_msi_data_to_gsi(uint32_t data); -int kvm_set_irq(KVMState *s, int irq, int level); -int kvm_irqchip_send_msi(KVMState *s, MSIMessage msg); - -void kvm_irqchip_add_irq_route(KVMState *s, int gsi, int irqchip, int pin); - -void kvm_irqchip_add_change_notifier(Notifier *n); -void kvm_irqchip_remove_change_notifier(Notifier *n); -void kvm_irqchip_change_notify(void); - -void kvm_get_apic_state(DeviceState *d, struct kvm_lapic_state *kapic); - struct kvm_guest_debug; struct kvm_debug_exit_arch; @@ -479,56 +453,6 @@ void kvm_cpu_synchronize_state(CPUState *cpu); void kvm_init_cpu_signals(CPUState *cpu); -/** - * kvm_irqchip_add_msi_route - Add MSI route for specific vector - * @c: KVMRouteChange instance. - * @vector: which vector to add. This can be either MSI/MSIX - * vector. The function will automatically detect whether - * MSI/MSIX is enabled, and fetch corresponding MSI - * message. - * @dev: Owner PCI device to add the route. If @dev is specified - * as @NULL, an empty MSI message will be inited. - * @return: virq (>=0) when success, errno (<0) when failed. - */ -int kvm_irqchip_add_msi_route(KVMRouteChange *c, int vector, PCIDevice *dev); -int kvm_irqchip_update_msi_route(KVMState *s, int virq, MSIMessage msg, - PCIDevice *dev); -void kvm_irqchip_commit_routes(KVMState *s); - -static inline KVMRouteChange kvm_irqchip_begin_route_changes(KVMState *s) -{ - return (KVMRouteChange) { .s = s, .changes = 0 }; -} - -static inline void kvm_irqchip_commit_route_changes(KVMRouteChange *c) -{ - if (c->changes) { - kvm_irqchip_commit_routes(c->s); - c->changes = 0; - } -} - -void kvm_irqchip_release_virq(KVMState *s, int virq); - -int kvm_irqchip_add_adapter_route(KVMState *s, AdapterInfo *adapter); -int kvm_irqchip_add_hv_sint_route(KVMState *s, uint32_t vcpu, uint32_t sint); - -int kvm_irqchip_add_irqfd_notifier_gsi(KVMState *s, EventNotifier *n, - EventNotifier *rn, int virq); -int kvm_irqchip_remove_irqfd_notifier_gsi(KVMState *s, EventNotifier *n, - int virq); -int kvm_irqchip_add_irqfd_notifier(KVMState *s, EventNotifier *n, - EventNotifier *rn, qemu_irq irq); -int kvm_irqchip_remove_irqfd_notifier(KVMState *s, EventNotifier *n, - qemu_irq irq); -void kvm_irqchip_set_qemuirq_gsi(KVMState *s, qemu_irq irq, int gsi); -void kvm_pc_setup_irq_routing(bool pci_enabled); -void kvm_init_irq_routing(KVMState *s); - -bool kvm_kernel_irqchip_allowed(void); -bool kvm_kernel_irqchip_required(void); -bool kvm_kernel_irqchip_split(void); - /** * kvm_arch_irqchip_create: * @KVMState: The KVMState pointer diff --git a/include/sysemu/kvm_irq.h b/include/sysemu/kvm_irq.h new file mode 100644 index 0000000000..f5f09fa1da --- /dev/null +++ b/include/sysemu/kvm_irq.h @@ -0,0 +1,100 @@ +/* + * QEMU KVM IRQ helpers + * + * Copyright IBM, Corp. 2008 + * + * Authors: + * Anthony Liguori + * + * This work is licensed under the terms of the GNU GPL, version 2 or later. + * See the COPYING file in the top-level directory. + * + */ + +/* header to be included in hardware (non-KVM-specific) code */ + +#ifndef QEMU_KVM_IRQ_H +#define QEMU_KVM_IRQ_H + +#include "qemu/notify.h" +#include "sysemu/kvm.h" + +struct kvm_lapic_state; + +int kvm_has_gsi_routing(void); +int kvm_has_intx_set_mask(void); + +/** + * kvm_arm_supports_user_irq + * + * Not all KVM implementations support notifications for kernel generated + * interrupt events to user space. This function indicates whether the current + * KVM implementation does support them. + * + * Returns: true if KVM supports using kernel generated IRQs from user space + */ +bool kvm_arm_supports_user_irq(void); + +void kvm_irqchip_add_change_notifier(Notifier *n); +void kvm_irqchip_remove_change_notifier(Notifier *n); +void kvm_irqchip_change_notify(void); + +/** + * kvm_irqchip_add_msi_route - Add MSI route for specific vector + * @c: KVMRouteChange instance. + * @vector: which vector to add. This can be either MSI/MSIX + * vector. The function will automatically detect whether + * MSI/MSIX is enabled, and fetch corresponding MSI + * message. + * @dev: Owner PCI device to add the route. If @dev is specified + * as @NULL, an empty MSI message will be inited. + * @return: virq (>=0) when success, errno (<0) when failed. + */ +int kvm_irqchip_add_msi_route(KVMRouteChange *c, int vector, PCIDevice *dev); +int kvm_irqchip_update_msi_route(KVMState *s, int virq, MSIMessage msg, + PCIDevice *dev); +void kvm_irqchip_commit_routes(KVMState *s); + +static inline KVMRouteChange kvm_irqchip_begin_route_changes(KVMState *s) +{ + return (KVMRouteChange) { .s = s, .changes = 0 }; +} + +static inline void kvm_irqchip_commit_route_changes(KVMRouteChange *c) +{ + if (c->changes) { + kvm_irqchip_commit_routes(c->s); + c->changes = 0; + } +} + +void kvm_irqchip_release_virq(KVMState *s, int virq); + +int kvm_irqchip_add_adapter_route(KVMState *s, AdapterInfo *adapter); +int kvm_irqchip_add_hv_sint_route(KVMState *s, uint32_t vcpu, uint32_t sint); + +int kvm_irqchip_add_irqfd_notifier_gsi(KVMState *s, EventNotifier *n, + EventNotifier *rn, int virq); +int kvm_irqchip_remove_irqfd_notifier_gsi(KVMState *s, EventNotifier *n, + int virq); +int kvm_irqchip_add_irqfd_notifier(KVMState *s, EventNotifier *n, + EventNotifier *rn, qemu_irq irq); +int kvm_irqchip_remove_irqfd_notifier(KVMState *s, EventNotifier *n, + qemu_irq irq); +void kvm_irqchip_set_qemuirq_gsi(KVMState *s, qemu_irq irq, int gsi); +void kvm_pc_setup_irq_routing(bool pci_enabled); +void kvm_init_irq_routing(KVMState *s); + +bool kvm_kernel_irqchip_allowed(void); +bool kvm_kernel_irqchip_required(void); +bool kvm_kernel_irqchip_split(void); + + +int kvm_set_irq(KVMState *s, int irq, int level); +int kvm_irqchip_send_msi(KVMState *s, MSIMessage msg); + +void kvm_irqchip_add_irq_route(KVMState *s, int gsi, int irqchip, int pin); + +void kvm_get_apic_state(DeviceState *d, struct kvm_lapic_state *kapic); + +#endif diff --git a/target/i386/kvm/kvm_i386.h b/target/i386/kvm/kvm_i386.h index e24753abfe..637485ec96 100644 --- a/target/i386/kvm/kvm_i386.h +++ b/target/i386/kvm/kvm_i386.h @@ -12,6 +12,7 @@ #define QEMU_KVM_I386_H #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #define kvm_apic_in_kernel() (kvm_irqchip_in_kernel()) diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c index f2a6ea6a68..982bd8cb7e 100644 --- a/accel/kvm/kvm-all.c +++ b/accel/kvm/kvm-all.c @@ -28,6 +28,8 @@ #include "hw/pci/msix.h" #include "hw/s390x/adapter.h" #include "exec/gdbstub.h" +#include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/kvm_int.h" #include "sysemu/runstate.h" #include "sysemu/cpus.h" diff --git a/accel/stubs/kvm-stub.c b/accel/stubs/kvm-stub.c index c0e2df3fbf..89cdc5fd09 100644 --- a/accel/stubs/kvm-stub.c +++ b/accel/stubs/kvm-stub.c @@ -12,6 +12,7 @@ #include "qemu/osdep.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "hw/pci/msi.h" KVMState *kvm_state; diff --git a/hw/arm/virt.c b/hw/arm/virt.c index dbbe639e61..68a2221a94 100644 --- a/hw/arm/virt.c +++ b/hw/arm/virt.c @@ -48,6 +48,7 @@ #include "sysemu/tpm.h" #include "sysemu/tcg.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/hvf.h" #include "sysemu/qtest.h" #include "hw/loader.h" diff --git a/hw/cpu/a15mpcore.c b/hw/cpu/a15mpcore.c index 774ca9987a..cae30ed5ca 100644 --- a/hw/cpu/a15mpcore.c +++ b/hw/cpu/a15mpcore.c @@ -25,6 +25,7 @@ #include "hw/irq.h" #include "hw/qdev-properties.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "kvm_arm.h" static void a15mp_priv_set_irq(void *opaque, int irq, int level) diff --git a/hw/hyperv/hyperv.c b/hw/hyperv/hyperv.c index 57b402b956..744cff6263 100644 --- a/hw/hyperv/hyperv.c +++ b/hw/hyperv/hyperv.c @@ -13,6 +13,7 @@ #include "qapi/error.h" #include "exec/address-spaces.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "qemu/bitops.h" #include "qemu/error-report.h" #include "qemu/lockable.h" diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c index faade7def8..9b3c08f618 100644 --- a/hw/i386/intel_iommu.c +++ b/hw/i386/intel_iommu.c @@ -33,6 +33,7 @@ #include "hw/i386/x86-iommu.h" #include "hw/pci-host/q35.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/dma.h" #include "sysemu/sysemu.h" #include "hw/i386/apic_internal.h" diff --git a/hw/i386/kvm/apic.c b/hw/i386/kvm/apic.c index 1e89ca0899..6c1cdb13f6 100644 --- a/hw/i386/kvm/apic.c +++ b/hw/i386/kvm/apic.c @@ -16,6 +16,7 @@ #include "hw/pci/msi.h" #include "sysemu/hw_accel.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "kvm/kvm_i386.h" static inline void kvm_apic_set_reg(struct kvm_lapic_state *kapic, diff --git a/hw/i386/kvm/i8259.c b/hw/i386/kvm/i8259.c index 3ca0e1ff03..0119c56a08 100644 --- a/hw/i386/kvm/i8259.c +++ b/hw/i386/kvm/i8259.c @@ -17,6 +17,7 @@ #include "hw/intc/kvm_irqcount.h" #include "hw/irq.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "qom/object.h" #define TYPE_KVM_I8259 "kvm-i8259" diff --git a/hw/i386/kvm/ioapic.c b/hw/i386/kvm/ioapic.c index cd5ea5d60b..e5b372315f 100644 --- a/hw/i386/kvm/ioapic.c +++ b/hw/i386/kvm/ioapic.c @@ -16,6 +16,7 @@ #include "hw/intc/ioapic_internal.h" #include "hw/intc/kvm_irqcount.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" /* PC Utility function */ void kvm_pc_setup_irq_routing(bool pci_enabled) diff --git a/hw/i386/kvmvapic.c b/hw/i386/kvmvapic.c index 43f8a8f679..796910c0c4 100644 --- a/hw/i386/kvmvapic.c +++ b/hw/i386/kvmvapic.c @@ -15,6 +15,7 @@ #include "sysemu/cpus.h" #include "sysemu/hw_accel.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/runstate.h" #include "hw/i386/apic_internal.h" #include "hw/sysbus.h" diff --git a/hw/i386/pc.c b/hw/i386/pc.c index 1489abf010..0684c00146 100644 --- a/hw/i386/pc.c +++ b/hw/i386/pc.c @@ -58,6 +58,7 @@ #include "sysemu/tcg.h" #include "sysemu/numa.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/xen.h" #include "sysemu/reset.h" #include "sysemu/runstate.h" diff --git a/hw/i386/x86-iommu.c b/hw/i386/x86-iommu.c index 01d11325a6..6531678e6f 100644 --- a/hw/i386/x86-iommu.c +++ b/hw/i386/x86-iommu.c @@ -26,6 +26,7 @@ #include "qemu/error-report.h" #include "trace.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" void x86_iommu_iec_register_notifier(X86IOMMUState *iommu, iec_notify_fn fn, void *data) diff --git a/hw/intc/arm_gic.c b/hw/intc/arm_gic.c index 7a34bc0998..1fe9b5e7d8 100644 --- a/hw/intc/arm_gic.c +++ b/hw/intc/arm_gic.c @@ -28,6 +28,7 @@ #include "qemu/module.h" #include "trace.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/qtest.h" /* #define DEBUG_GIC */ diff --git a/hw/intc/arm_gic_common.c b/hw/intc/arm_gic_common.c index 889327a8cf..0247764953 100644 --- a/hw/intc/arm_gic_common.c +++ b/hw/intc/arm_gic_common.c @@ -27,6 +27,7 @@ #include "hw/qdev-properties.h" #include "migration/vmstate.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" static int gic_pre_save(void *opaque) { diff --git a/hw/intc/arm_gic_kvm.c b/hw/intc/arm_gic_kvm.c index 1d588946bc..05c0a841b3 100644 --- a/hw/intc/arm_gic_kvm.c +++ b/hw/intc/arm_gic_kvm.c @@ -24,6 +24,7 @@ #include "qemu/module.h" #include "migration/blocker.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "kvm_arm.h" #include "gic_internal.h" #include "vgic_common.h" diff --git a/hw/intc/arm_gicv3_common.c b/hw/intc/arm_gicv3_common.c index 2ebf880ead..a31052e16a 100644 --- a/hw/intc/arm_gicv3_common.c +++ b/hw/intc/arm_gicv3_common.c @@ -32,6 +32,7 @@ #include "gicv3_internal.h" #include "hw/arm/linux-boot-if.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" static void gicv3_gicd_no_migration_shift_bug_post_load(GICv3State *cs) diff --git a/hw/intc/arm_gicv3_its_common.c b/hw/intc/arm_gicv3_its_common.c index abaf77057e..52b55d37ae 100644 --- a/hw/intc/arm_gicv3_its_common.c +++ b/hw/intc/arm_gicv3_its_common.c @@ -25,6 +25,7 @@ #include "qemu/log.h" #include "qemu/module.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" static int gicv3_its_pre_save(void *opaque) { diff --git a/hw/intc/arm_gicv3_kvm.c b/hw/intc/arm_gicv3_kvm.c index 72ad916d3d..754f69ae99 100644 --- a/hw/intc/arm_gicv3_kvm.c +++ b/hw/intc/arm_gicv3_kvm.c @@ -25,6 +25,7 @@ #include "qemu/error-report.h" #include "qemu/module.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/runstate.h" #include "kvm_arm.h" #include "gicv3_internal.h" diff --git a/hw/intc/ioapic.c b/hw/intc/ioapic.c index 716ffc8bbb..9e49ae585d 100644 --- a/hw/intc/ioapic.c +++ b/hw/intc/ioapic.c @@ -31,6 +31,7 @@ #include "hw/pci/msi.h" #include "hw/qdev-properties.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/sysemu.h" #include "hw/i386/apic-msidef.h" #include "hw/i386/x86-iommu.h" diff --git a/hw/intc/openpic_kvm.c b/hw/intc/openpic_kvm.c index 557dd0c2bf..0373d118f2 100644 --- a/hw/intc/openpic_kvm.c +++ b/hw/intc/openpic_kvm.c @@ -31,6 +31,7 @@ #include "hw/qdev-properties.h" #include "hw/sysbus.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "qemu/log.h" #include "qemu/module.h" #include "qom/object.h" diff --git a/hw/intc/s390_flic_kvm.c b/hw/intc/s390_flic_kvm.c index 4e86d2d436..84f3520393 100644 --- a/hw/intc/s390_flic_kvm.c +++ b/hw/intc/s390_flic_kvm.c @@ -17,6 +17,7 @@ #include "qemu/module.h" #include "qapi/error.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "hw/s390x/s390_flic.h" #include "hw/s390x/adapter.h" #include "hw/s390x/css.h" diff --git a/hw/intc/spapr_xive_kvm.c b/hw/intc/spapr_xive_kvm.c index 61fe7bd2d3..bb9cdcf1bd 100644 --- a/hw/intc/spapr_xive_kvm.c +++ b/hw/intc/spapr_xive_kvm.c @@ -14,6 +14,7 @@ #include "target/ppc/cpu.h" #include "sysemu/cpus.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/runstate.h" #include "hw/ppc/spapr.h" #include "hw/ppc/spapr_cpu_core.h" diff --git a/hw/intc/xics.c b/hw/intc/xics.c index c7f8abd71e..75ca07334a 100644 --- a/hw/intc/xics.c +++ b/hw/intc/xics.c @@ -39,6 +39,7 @@ #include "hw/intc/intc.h" #include "hw/irq.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/reset.h" void icp_pic_print_info(ICPState *icp, Monitor *mon) diff --git a/hw/intc/xics_kvm.c b/hw/intc/xics_kvm.c index 9719d98a17..cb4eca437c 100644 --- a/hw/intc/xics_kvm.c +++ b/hw/intc/xics_kvm.c @@ -29,6 +29,7 @@ #include "qapi/error.h" #include "trace.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "hw/ppc/spapr.h" #include "hw/ppc/spapr_cpu_core.h" #include "hw/ppc/xics.h" diff --git a/hw/misc/ivshmem.c b/hw/misc/ivshmem.c index d66d912172..8f1dd5f92b 100644 --- a/hw/misc/ivshmem.c +++ b/hw/misc/ivshmem.c @@ -27,6 +27,7 @@ #include "hw/pci/msi.h" #include "hw/pci/msix.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "migration/blocker.h" #include "migration/vmstate.h" #include "qemu/error-report.h" diff --git a/hw/ppc/e500.c b/hw/ppc/e500.c index 117c9c08ed..7c59a33bac 100644 --- a/hw/ppc/e500.c +++ b/hw/ppc/e500.c @@ -29,6 +29,7 @@ #include "sysemu/block-backend-io.h" #include "sysemu/sysemu.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/reset.h" #include "sysemu/runstate.h" #include "kvm_ppc.h" diff --git a/hw/ppc/spapr_irq.c b/hw/ppc/spapr_irq.c index a0d1e1298e..7347486f70 100644 --- a/hw/ppc/spapr_irq.c +++ b/hw/ppc/spapr_irq.c @@ -20,6 +20,7 @@ #include "hw/qdev-properties.h" #include "cpu-models.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "trace.h" diff --git a/hw/remote/proxy.c b/hw/remote/proxy.c index 1c7786b52c..e5dadd9f50 100644 --- a/hw/remote/proxy.c +++ b/hw/remote/proxy.c @@ -22,6 +22,7 @@ #include "qom/object.h" #include "qemu/event_notifier.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "util/event_notifier-posix.c" static void probe_pci_info(PCIDevice *dev, Error **errp); diff --git a/hw/s390x/virtio-ccw.c b/hw/s390x/virtio-ccw.c index e33e5207ab..589b478c24 100644 --- a/hw/s390x/virtio-ccw.c +++ b/hw/s390x/virtio-ccw.c @@ -14,6 +14,7 @@ #include "qapi/error.h" #include "exec/address-spaces.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "net/net.h" #include "hw/virtio/virtio.h" #include "migration/qemu-file-types.h" diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c index ec9a854361..22688413c6 100644 --- a/hw/vfio/pci.c +++ b/hw/vfio/pci.c @@ -36,6 +36,7 @@ #include "qemu/range.h" #include "qemu/units.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/runstate.h" #include "pci.h" #include "trace.h" diff --git a/hw/vfio/platform.c b/hw/vfio/platform.c index 5af73f9287..0bb291298d 100644 --- a/hw/vfio/platform.c +++ b/hw/vfio/platform.c @@ -35,6 +35,7 @@ #include "hw/platform-bus.h" #include "hw/qdev-properties.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" /* * Functions used whatever the injection method diff --git a/hw/virtio/virtio-pci.c b/hw/virtio/virtio-pci.c index 247325c193..945975b66e 100644 --- a/hw/virtio/virtio-pci.c +++ b/hw/virtio/virtio-pci.c @@ -34,6 +34,7 @@ #include "hw/pci/msix.h" #include "hw/loader.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "hw/virtio/virtio-pci.h" #include "qemu/range.h" #include "hw/virtio/virtio-bus.h" diff --git a/target/arm/kvm.c b/target/arm/kvm.c index f022c644d2..99a9cbde73 100644 --- a/target/arm/kvm.c +++ b/target/arm/kvm.c @@ -20,6 +20,7 @@ #include "qapi/error.h" #include "sysemu/sysemu.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/kvm_int.h" #include "kvm_arm.h" #include "cpu.h" diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c index de531842f6..6582611960 100644 --- a/target/i386/kvm/kvm.c +++ b/target/i386/kvm/kvm.c @@ -28,6 +28,8 @@ #include "host-cpu.h" #include "sysemu/sysemu.h" #include "sysemu/hw_accel.h" +#include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/kvm_int.h" #include "sysemu/runstate.h" #include "kvm_i386.h" diff --git a/target/i386/kvm/xen-emu.c b/target/i386/kvm/xen-emu.c index d7c7eb8d9c..2604cba6b1 100644 --- a/target/i386/kvm/xen-emu.c +++ b/target/i386/kvm/xen-emu.c @@ -14,6 +14,8 @@ #include "qemu/main-loop.h" #include "qemu/error-report.h" #include "hw/xen/xen.h" +#include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/kvm_int.h" #include "sysemu/kvm_xen.h" #include "kvm/kvm_i386.h" diff --git a/target/i386/sev.c b/target/i386/sev.c index 859e06f6ad..b486f5af1e 100644 --- a/target/i386/sev.c +++ b/target/i386/sev.c @@ -26,6 +26,7 @@ #include "qemu/error-report.h" #include "crypto/hash.h" #include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sev.h" #include "sysemu/sysemu.h" #include "sysemu/runstate.h" diff --git a/target/s390x/kvm/kvm.c b/target/s390x/kvm/kvm.c index 3ac7ec9acf..8d7e04afaa 100644 --- a/target/s390x/kvm/kvm.c +++ b/target/s390x/kvm/kvm.c @@ -27,6 +27,8 @@ #include "cpu.h" #include "s390x-internal.h" #include "kvm_s390x.h" +#include "sysemu/kvm.h" +#include "sysemu/kvm_irq.h" #include "sysemu/kvm_int.h" #include "qemu/cutils.h" #include "qapi/error.h" From patchwork Wed Apr 5 16:30:01 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= X-Patchwork-Id: 670331 Delivered-To: patch@linaro.org Received: by 2002:a5d:4d08:0:0:0:0:0 with SMTP id z8csp378459wrt; Wed, 5 Apr 2023 09:32:00 -0700 (PDT) X-Google-Smtp-Source: AKy350aJgm28WgL/8s4TU4f9DLrW2/dFFML4OQY1n+LLVoC/RnH3wyf9pZNIYGgJ9plIHfl52yQN X-Received: by 2002:a05:6214:5089:b0:5cc:ce87:7d7a with SMTP id kk9-20020a056214508900b005ccce877d7amr9143933qvb.41.1680712320406; Wed, 05 Apr 2023 09:32:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680712320; cv=none; d=google.com; s=arc-20160816; b=JK2GkXOeujc6vcPLtmvsxEDrBfnIR0PkCLeyb0RLUEQv+QcYwnKVYwbg3/MW5iFNok 1VSlXmghRq5fP4tJpRlggPLFZQonA7yLfMxhCuG/zu4QK7jtEIr2aHm8yUrZYWShGobJ kysF3JMKpgIq7Oe5/8ICjTunqr9en8KEP3K/fX+zeNctrbJIYyDx7kHdwUKl1Y124vAf ceUNnK21dGcd0zUvm82MKLo484G++oAINqKE/avOhKbrK+9ZNHntuvk2LwIXKh6p9nUG aTKmHwP128lXf0e7KML+TiXX8NG8pehiy6uUIYroJQAyz34fwmajD2Y6ZR4nNxcKMWEM LsUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PrAcn5qN38B5YaoSS7J2RY/lmyONQENb+5lQU26NZ94=; b=LURUr+VUt3CuBmWTGiYoDO+/vQ+pv5nPH1Bp4BoMvKDs7jfhf6oUkHEN5hKOLcgQud K6wSgh1giYpXOPfJ+m1Hk3+reDScjo7cc5hzjBWhH6JTULHf8JjdRmp/1s02NYYZu2/i ozmwFyl8P5HwPSHPdxOSuqm17oaoRvI4mdrOClmBmRrWUenZ57XXdY2B3RmFpRbJ5WMj YrYi/85lXQ4G8oiKiQfR8rpKCNhd0na3qXbJStKHpm27My3FHKtvW+ZfwdKzbhmp3Gm7 ixdyXeQd+f7UhnoP+Dww0gGPaFlOT3DDczzvYukMlv2UG4OxAHprYNM3cS1kxlu9jDlv naRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=ltah4l+p; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [209.51.188.17]) by mx.google.com with ESMTPS id js11-20020a0562142aab00b005abf1b68250si9610126qvb.547.2023.04.05.09.32.00 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Wed, 05 Apr 2023 09:32:00 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=ltah4l+p; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1pk61f-0005Wu-29; Wed, 05 Apr 2023 12:30:23 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1pk61c-0005Tz-LM for qemu-devel@nongnu.org; Wed, 05 Apr 2023 12:30:20 -0400 Received: from mail-wr1-x436.google.com ([2a00:1450:4864:20::436]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1pk61a-00050D-Ub for qemu-devel@nongnu.org; Wed, 05 Apr 2023 12:30:20 -0400 Received: by mail-wr1-x436.google.com with SMTP id m2so36804613wrh.6 for ; Wed, 05 Apr 2023 09:30:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1680712217; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=PrAcn5qN38B5YaoSS7J2RY/lmyONQENb+5lQU26NZ94=; b=ltah4l+p7FJg9oAXXwCVBTw0T1SM3CGmlUjbZnWSMo+SWFV02mqjr/KQ0SOeD1mHlo 0fwAhWUy80/AAZfa6r0U2GiGZrIYk1eglek0E2nytTJwN1bnmj+yzSFwVKvh1PvEUpny MF9LCkH7wBWmM9aWOgcwUz4K+5zjltGVQ2EtPzJGP9UWF+VctR/sRiZZwUsabMgRg/jS t5kUbvD6v6PmbJ1beYmnS3+qDEj1EOcvKCK/wDvTWQjL96fdXiHcg9IWbqyD1mFVgQ0o Xke5O4fLv2nu9Y+mVedL7ITgOHXOPQyha5158IQ2/KU34Hg8y3y3ZIQ5PwrKsE06vH5E 5sbQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680712217; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=PrAcn5qN38B5YaoSS7J2RY/lmyONQENb+5lQU26NZ94=; b=ES7STtA49rakcApC6MioRJlLeYf8atbox/aQrxeD++og91O6Fp0Id05eWHbGznuU8A 7ak8iFp46lJQZDVkMRtt3gMGmRNQW6lqVXiyvcoD461cN1f2fLGXRU0/aAUf0fMOVSCC TRxPMQYV2kD6iHYhuu9qVBES57NpjgfI28YjSn/gUdRC9miwHUhuQOwK9JBbX6z+DNNX UffHlNpx7dDKP3hxLuYpildXy7t0qUwJVyCum49Hlqm7DUM2w0d3DU2K+zr77Vrwiui/ 4cGwnlvSyIhFSvAHJiNi7gCAV+DShsB8LU31MbpFSwIrjOclq775nsK+ox9YXlndu9kj gSxg== X-Gm-Message-State: AAQBX9ez3E9wGzbkCo5XMjBTdQ6LCQF7uOazh2ibtaEkNYIQeamKsenc L/Ajgl0oYwdFzFE15uUgDoyvYypUbBT4OO/xP7U= X-Received: by 2002:a05:6000:1364:b0:2ce:a7b3:1c73 with SMTP id q4-20020a056000136400b002cea7b31c73mr4244101wrz.21.1680712217198; Wed, 05 Apr 2023 09:30:17 -0700 (PDT) Received: from localhost.localdomain (4ab54-h01-176-184-52-81.dsl.sta.abo.bbox.fr. [176.184.52.81]) by smtp.gmail.com with ESMTPSA id a5-20020adffb85000000b002c794495f6fsm15280822wrr.117.2023.04.05.09.30.16 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Wed, 05 Apr 2023 09:30:16 -0700 (PDT) From: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org, Paolo Bonzini Cc: qemu-arm@nongnu.org, kvm@vger.kernel.org, qemu-s390x@nongnu.org, qemu-ppc@nongnu.org, =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= Subject: [RFC PATCH 2/2] accel/kvm: Declare kvm_arch_irqchip_create() in 'sysemu/kvm_int.h' Date: Wed, 5 Apr 2023 18:30:01 +0200 Message-Id: <20230405163001.98573-3-philmd@linaro.org> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20230405163001.98573-1-philmd@linaro.org> References: <20230405163001.98573-1-philmd@linaro.org> MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::436; envelope-from=philmd@linaro.org; helo=mail-wr1-x436.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: qemu-devel-bounces+patch=linaro.org@nongnu.org kvm_arch_irqchip_create() is irrelevant for hardware device models (files under the hw/ directory), it is meant for the generic KVM code (files in accel/kvm/) and the target implementation (files under target/ directory). "sysemu/kvm.h" header is meant to contain the 'external' KVM API. Move kvm_arch_irqchip_create() prototype declaration to "sysemu/kvm_int.h" which should contain the KVM 'internal' API. Signed-off-by: Philippe Mathieu-Daudé --- include/sysemu/kvm.h | 12 ------------ include/sysemu/kvm_int.h | 13 +++++++++++++ 2 files changed, 13 insertions(+), 12 deletions(-) diff --git a/include/sysemu/kvm.h b/include/sysemu/kvm.h index 32e223a368..540f6f04a8 100644 --- a/include/sysemu/kvm.h +++ b/include/sysemu/kvm.h @@ -453,18 +453,6 @@ void kvm_cpu_synchronize_state(CPUState *cpu); void kvm_init_cpu_signals(CPUState *cpu); -/** - * kvm_arch_irqchip_create: - * @KVMState: The KVMState pointer - * - * Allow architectures to create an in-kernel irq chip themselves. - * - * Returns: < 0: error - * 0: irq chip was not created - * > 0: irq chip was created - */ -int kvm_arch_irqchip_create(KVMState *s); - /** * kvm_set_one_reg - set a register value in KVM via KVM_SET_ONE_REG ioctl * @id: The register ID diff --git a/include/sysemu/kvm_int.h b/include/sysemu/kvm_int.h index a641c974ea..4a46b661e2 100644 --- a/include/sysemu/kvm_int.h +++ b/include/sysemu/kvm_int.h @@ -140,4 +140,17 @@ void kvm_set_max_memslot_size(hwaddr max_slot_size); * Return: None. */ void kvm_hwpoison_page_add(ram_addr_t ram_addr); + +/** + * kvm_arch_irqchip_create: + * @KVMState: The KVMState pointer + * + * Allow architectures to create an in-kernel irq chip themselves. + * + * Returns: < 0: error + * 0: irq chip was not created + * > 0: irq chip was created + */ +int kvm_arch_irqchip_create(KVMState *s); + #endif