It was used for error reporting only. --- src/qemu/qemu_driver.c | 123 +++++++++++++++++--------------------- src/qemu/qemu_security_dac.c | 10 +-- src/security/security_selinux.c | 10 +-- src/util/pci.c | 113 ++++++++++++++++-------------------- src/util/pci.h | 32 ++++------- src/xen/xen_driver.c | 18 +++--- 6 files changed, 134 insertions(+), 172 deletions(-) diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c index 3a80603..71f0364 100644 --- a/src/qemu/qemu_driver.c +++ b/src/qemu/qemu_driver.c @@ -1105,7 +1105,7 @@ qemudStartup(int privileged) { qemu_driver->securityDriver)) == NULL) goto error; - if ((qemu_driver->activePciHostdevs = pciDeviceListNew(NULL)) == NULL) + if ((qemu_driver->activePciHostdevs = pciDeviceListNew()) == NULL) goto error; if (qemudLoadDriverConfig(qemu_driver, driverConf) < 0) { @@ -1268,7 +1268,7 @@ qemudShutdown(void) { return -1; qemuDriverLock(qemu_driver); - pciDeviceListFree(NULL, qemu_driver->activePciHostdevs); + pciDeviceListFree(qemu_driver->activePciHostdevs); virCapabilitiesFree(qemu_driver->caps); virDomainObjListDeinit(&qemu_driver->domains); @@ -2111,13 +2111,12 @@ static int qemudNextFreeVNCPort(struct qemud_driver *driver ATTRIBUTE_UNUSED) { } static pciDeviceList * -qemuGetPciHostDeviceList(virConnectPtr conn, - virDomainDefPtr def) +qemuGetPciHostDeviceList(virDomainDefPtr def) { pciDeviceList *list; int i; - if (!(list = pciDeviceListNew(conn))) + if (!(list = pciDeviceListNew())) return NULL; for (i = 0 ; i < def->nhostdevs ; i++) { @@ -2129,19 +2128,18 @@ qemuGetPciHostDeviceList(virConnectPtr conn, if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI) continue; - dev = pciGetDevice(conn, - hostdev->source.subsys.u.pci.domain, + dev = pciGetDevice(hostdev->source.subsys.u.pci.domain, hostdev->source.subsys.u.pci.bus, hostdev->source.subsys.u.pci.slot, hostdev->source.subsys.u.pci.function); if (!dev) { - pciDeviceListFree(conn, list); + pciDeviceListFree(list); return NULL; } - if (pciDeviceListAdd(conn, list, dev) < 0) { - pciFreeDevice(conn, dev); - pciDeviceListFree(conn, list); + if (pciDeviceListAdd(list, dev) < 0) { + pciFreeDevice(dev); + pciDeviceListFree(list); return NULL; } @@ -2162,16 +2160,14 @@ qemuUpdateActivePciHostdevs(struct qemud_driver *driver, if (!def->nhostdevs) return 0; - if (!(pcidevs = qemuGetPciHostDeviceList(NULL, def))) + if (!(pcidevs = qemuGetPciHostDeviceList(def))) return -1; for (i = 0; i < pciDeviceListCount(pcidevs); i++) { pciDevice *dev = pciDeviceListGet(pcidevs, i); - pciDeviceListSteal(NULL, pcidevs, dev); - if (pciDeviceListAdd(NULL, - driver->activePciHostdevs, - dev) < 0) { - pciFreeDevice(NULL, dev); + pciDeviceListSteal(pcidevs, dev); + if (pciDeviceListAdd(driver->activePciHostdevs, dev) < 0) { + pciFreeDevice(dev); goto cleanup; } } @@ -2179,13 +2175,12 @@ qemuUpdateActivePciHostdevs(struct qemud_driver *driver, ret = 0; cleanup: - pciDeviceListFree(NULL, pcidevs); + pciDeviceListFree(pcidevs); return ret; } static int -qemuPrepareHostDevices(virConnectPtr conn, - struct qemud_driver *driver, +qemuPrepareHostDevices(struct qemud_driver *driver, virDomainDefPtr def) { pciDeviceList *pcidevs; @@ -2195,7 +2190,7 @@ qemuPrepareHostDevices(virConnectPtr conn, if (!def->nhostdevs) return 0; - if (!(pcidevs = qemuGetPciHostDeviceList(conn, def))) + if (!(pcidevs = qemuGetPciHostDeviceList(def))) return -1; /* We have to use 3 loops here. *All* devices must @@ -2212,11 +2207,11 @@ qemuPrepareHostDevices(virConnectPtr conn, for (i = 0; i < pciDeviceListCount(pcidevs); i++) { pciDevice *dev = pciDeviceListGet(pcidevs, i); - if (!pciDeviceIsAssignable(conn, dev, !driver->relaxedACS)) + if (!pciDeviceIsAssignable(dev, !driver->relaxedACS)) goto cleanup; if (pciDeviceGetManaged(dev) && - pciDettachDevice(conn, dev) < 0) + pciDettachDevice(dev) < 0) goto cleanup; } @@ -2224,19 +2219,16 @@ qemuPrepareHostDevices(virConnectPtr conn, * reset them */ for (i = 0; i < pciDeviceListCount(pcidevs); i++) { pciDevice *dev = pciDeviceListGet(pcidevs, i); - if (pciResetDevice(conn, dev, - driver->activePciHostdevs) < 0) + if (pciResetDevice(dev, driver->activePciHostdevs) < 0) goto cleanup; } /* Now mark all the devices as active */ for (i = 0; i < pciDeviceListCount(pcidevs); i++) { pciDevice *dev = pciDeviceListGet(pcidevs, i); - pciDeviceListSteal(NULL, pcidevs, dev); - if (pciDeviceListAdd(conn, - driver->activePciHostdevs, - dev) < 0) { - pciFreeDevice(NULL, dev); + pciDeviceListSteal(pcidevs, dev); + if (pciDeviceListAdd(driver->activePciHostdevs, dev) < 0) { + pciFreeDevice(dev); goto cleanup; } } @@ -2244,7 +2236,7 @@ qemuPrepareHostDevices(virConnectPtr conn, ret = 0; cleanup: - pciDeviceListFree(conn, pcidevs); + pciDeviceListFree(pcidevs); return ret; } @@ -2259,7 +2251,7 @@ qemudReattachManagedDevice(pciDevice *dev) usleep(100*1000); retries--; } - if (pciReAttachDevice(NULL, dev) < 0) { + if (pciReAttachDevice(dev) < 0) { virErrorPtr err = virGetLastError(); VIR_ERROR(_("Failed to re-attach PCI device: %s"), err ? err->message : ""); @@ -2269,8 +2261,7 @@ qemudReattachManagedDevice(pciDevice *dev) } static void -qemuDomainReAttachHostDevices(virConnectPtr conn, - struct qemud_driver *driver, +qemuDomainReAttachHostDevices(struct qemud_driver *driver, virDomainDefPtr def) { pciDeviceList *pcidevs; @@ -2279,7 +2270,7 @@ qemuDomainReAttachHostDevices(virConnectPtr conn, if (!def->nhostdevs) return; - if (!(pcidevs = qemuGetPciHostDeviceList(conn, def))) { + if (!(pcidevs = qemuGetPciHostDeviceList(def))) { virErrorPtr err = virGetLastError(); VIR_ERROR(_("Failed to allocate pciDeviceList: %s"), err ? err->message : ""); @@ -2292,13 +2283,12 @@ qemuDomainReAttachHostDevices(virConnectPtr conn, for (i = 0; i < pciDeviceListCount(pcidevs); i++) { pciDevice *dev = pciDeviceListGet(pcidevs, i); - pciDeviceListDel(conn, driver->activePciHostdevs, dev); + pciDeviceListDel(driver->activePciHostdevs, dev); } for (i = 0; i < pciDeviceListCount(pcidevs); i++) { pciDevice *dev = pciDeviceListGet(pcidevs, i); - if (pciResetDevice(conn, dev, - driver->activePciHostdevs) < 0) { + if (pciResetDevice(dev, driver->activePciHostdevs) < 0) { virErrorPtr err = virGetLastError(); VIR_ERROR(_("Failed to reset PCI device: %s"), err ? err->message : ""); @@ -2311,7 +2301,7 @@ qemuDomainReAttachHostDevices(virConnectPtr conn, qemudReattachManagedDevice(dev); } - pciDeviceListFree(conn, pcidevs); + pciDeviceListFree(pcidevs); } static const char *const defaultDeviceACL[] = { @@ -2611,7 +2601,7 @@ static int qemudStartVMDaemon(virConnectPtr conn, if (qemuSetupCgroup(driver, vm) < 0) goto cleanup; - if (qemuPrepareHostDevices(conn, driver, vm->def) < 0) + if (qemuPrepareHostDevices(driver, vm->def) < 0) goto cleanup; if (VIR_ALLOC(priv->monConfig) < 0) { @@ -2784,7 +2774,7 @@ cleanup: /* We jump here if we failed to start the VM for any reason * XXX investigate if we can kill this block and safely call * qemudShutdownVMDaemon even though no PID is running */ - qemuDomainReAttachHostDevices(conn, driver, vm->def); + qemuDomainReAttachHostDevices(driver, vm->def); if (driver->securityDriver && driver->securityDriver->domainRestoreSecurityAllLabel) @@ -2889,7 +2879,7 @@ static void qemudShutdownVMDaemon(virConnectPtr conn, qemuDomainPCIAddressSetFree(priv->pciaddrs); priv->pciaddrs = NULL; - qemuDomainReAttachHostDevices(conn, driver, vm->def); + qemuDomainReAttachHostDevices(driver, vm->def); retry: if ((ret = qemuRemoveCgroup(conn, driver, vm, 0)) < 0) { @@ -5739,8 +5729,7 @@ no_memory: } -static int qemudDomainAttachHostPciDevice(virConnectPtr conn, - struct qemud_driver *driver, +static int qemudDomainAttachHostPciDevice(struct qemud_driver *driver, virDomainObjPtr vm, virDomainHostdevDefPtr hostdev, int qemuCmdFlags) @@ -5756,23 +5745,22 @@ static int qemudDomainAttachHostPciDevice(virConnectPtr conn, return -1; } - pci = pciGetDevice(conn, - hostdev->source.subsys.u.pci.domain, + pci = pciGetDevice(hostdev->source.subsys.u.pci.domain, hostdev->source.subsys.u.pci.bus, hostdev->source.subsys.u.pci.slot, hostdev->source.subsys.u.pci.function); if (!pci) return -1; - if (!pciDeviceIsAssignable(conn, pci, !driver->relaxedACS) || - (hostdev->managed && pciDettachDevice(conn, pci) < 0) || - pciResetDevice(conn, pci, driver->activePciHostdevs) < 0) { - pciFreeDevice(conn, pci); + if (!pciDeviceIsAssignable(pci, !driver->relaxedACS) || + (hostdev->managed && pciDettachDevice(pci) < 0) || + pciResetDevice(pci, driver->activePciHostdevs) < 0) { + pciFreeDevice(pci); return -1; } - if (pciDeviceListAdd(conn, driver->activePciHostdevs, pci) < 0) { - pciFreeDevice(conn, pci); + if (pciDeviceListAdd(driver->activePciHostdevs, pci) < 0) { + pciFreeDevice(pci); return -1; } @@ -5810,7 +5798,7 @@ error: VIR_WARN0("Unable to release PCI address on host device"); VIR_FREE(devstr); - pciDeviceListDel(conn, driver->activePciHostdevs, pci); + pciDeviceListDel(driver->activePciHostdevs, pci); return -1; } @@ -5877,7 +5865,7 @@ static int qemudDomainAttachHostDevice(virConnectPtr conn, switch (hostdev->source.subsys.type) { case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: - if (qemudDomainAttachHostPciDevice(conn, driver, vm, + if (qemudDomainAttachHostPciDevice(driver, vm, hostdev, qemuCmdFlags) < 0) goto error; break; @@ -6321,8 +6309,7 @@ static int qemudDomainDetachHostPciDevice(virConnectPtr conn, ret = 0; - pci = pciGetDevice(conn, - detach->source.subsys.u.pci.domain, + pci = pciGetDevice(detach->source.subsys.u.pci.domain, detach->source.subsys.u.pci.bus, detach->source.subsys.u.pci.slot, detach->source.subsys.u.pci.function); @@ -6330,11 +6317,11 @@ static int qemudDomainDetachHostPciDevice(virConnectPtr conn, ret = -1; else { pciDeviceSetManaged(pci, detach->managed); - pciDeviceListDel(conn, driver->activePciHostdevs, pci); - if (pciResetDevice(conn, pci, driver->activePciHostdevs) < 0) + pciDeviceListDel(driver->activePciHostdevs, pci); + if (pciResetDevice(pci, driver->activePciHostdevs) < 0) ret = -1; qemudReattachManagedDevice(pci); - pciFreeDevice(conn, pci); + pciFreeDevice(pci); } if (vm->def->nhostdevs > 1) { @@ -8439,16 +8426,16 @@ qemudNodeDeviceDettach (virNodeDevicePtr dev) if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0) return -1; - pci = pciGetDevice(dev->conn, domain, bus, slot, function); + pci = pciGetDevice(domain, bus, slot, function); if (!pci) return -1; - if (pciDettachDevice(dev->conn, pci) < 0) + if (pciDettachDevice(pci) < 0) goto out; ret = 0; out: - pciFreeDevice(dev->conn, pci); + pciFreeDevice(pci); return ret; } @@ -8462,16 +8449,16 @@ qemudNodeDeviceReAttach (virNodeDevicePtr dev) if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0) return -1; - pci = pciGetDevice(dev->conn, domain, bus, slot, function); + pci = pciGetDevice(domain, bus, slot, function); if (!pci) return -1; - if (pciReAttachDevice(dev->conn, pci) < 0) + if (pciReAttachDevice(pci) < 0) goto out; ret = 0; out: - pciFreeDevice(dev->conn, pci); + pciFreeDevice(pci); return ret; } @@ -8486,19 +8473,19 @@ qemudNodeDeviceReset (virNodeDevicePtr dev) if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0) return -1; - pci = pciGetDevice(dev->conn, domain, bus, slot, function); + pci = pciGetDevice(domain, bus, slot, function); if (!pci) return -1; qemuDriverLock(driver); - if (pciResetDevice(dev->conn, pci, driver->activePciHostdevs) < 0) + if (pciResetDevice(pci, driver->activePciHostdevs) < 0) goto out; ret = 0; out: qemuDriverUnlock(driver); - pciFreeDevice(dev->conn, pci); + pciFreeDevice(pci); return ret; } diff --git a/src/qemu/qemu_security_dac.c b/src/qemu/qemu_security_dac.c index c532368..f06a8bc 100644 --- a/src/qemu/qemu_security_dac.c +++ b/src/qemu/qemu_security_dac.c @@ -225,8 +225,7 @@ qemuSecurityDACSetSecurityHostdevLabel(virConnectPtr conn, } case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: { - pciDevice *pci = pciGetDevice(conn, - dev->source.subsys.u.pci.domain, + pciDevice *pci = pciGetDevice(dev->source.subsys.u.pci.domain, dev->source.subsys.u.pci.bus, dev->source.subsys.u.pci.slot, dev->source.subsys.u.pci.function); @@ -235,7 +234,7 @@ qemuSecurityDACSetSecurityHostdevLabel(virConnectPtr conn, goto done; ret = pciDeviceFileIterate(conn, pci, qemuSecurityDACSetSecurityPCILabel, vm); - pciFreeDevice(conn, pci); + pciFreeDevice(pci); break; } @@ -302,8 +301,7 @@ qemuSecurityDACRestoreSecurityHostdevLabel(virConnectPtr conn, } case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: { - pciDevice *pci = pciGetDevice(conn, - dev->source.subsys.u.pci.domain, + pciDevice *pci = pciGetDevice(dev->source.subsys.u.pci.domain, dev->source.subsys.u.pci.bus, dev->source.subsys.u.pci.slot, dev->source.subsys.u.pci.function); @@ -312,7 +310,7 @@ qemuSecurityDACRestoreSecurityHostdevLabel(virConnectPtr conn, goto done; ret = pciDeviceFileIterate(conn, pci, qemuSecurityDACRestoreSecurityPCILabel, NULL); - pciFreeDevice(conn, pci); + pciFreeDevice(pci); break; } diff --git a/src/security/security_selinux.c b/src/security/security_selinux.c index 3c9ab62..902ace0 100644 --- a/src/security/security_selinux.c +++ b/src/security/security_selinux.c @@ -513,8 +513,7 @@ SELinuxSetSecurityHostdevLabel(virConnectPtr conn, } case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: { - pciDevice *pci = pciGetDevice(conn, - dev->source.subsys.u.pci.domain, + pciDevice *pci = pciGetDevice(dev->source.subsys.u.pci.domain, dev->source.subsys.u.pci.bus, dev->source.subsys.u.pci.slot, dev->source.subsys.u.pci.function); @@ -523,7 +522,7 @@ SELinuxSetSecurityHostdevLabel(virConnectPtr conn, goto done; ret = pciDeviceFileIterate(conn, pci, SELinuxSetSecurityPCILabel, vm); - pciFreeDevice(conn, pci); + pciFreeDevice(pci); break; } @@ -589,8 +588,7 @@ SELinuxRestoreSecurityHostdevLabel(virConnectPtr conn, } case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI: { - pciDevice *pci = pciGetDevice(conn, - dev->source.subsys.u.pci.domain, + pciDevice *pci = pciGetDevice(dev->source.subsys.u.pci.domain, dev->source.subsys.u.pci.bus, dev->source.subsys.u.pci.slot, dev->source.subsys.u.pci.function); @@ -599,7 +597,7 @@ SELinuxRestoreSecurityHostdevLabel(virConnectPtr conn, goto done; ret = pciDeviceFileIterate(conn, pci, SELinuxRestoreSecurityPCILabel, NULL); - pciFreeDevice(conn, pci); + pciFreeDevice(pci); break; } diff --git a/src/util/pci.c b/src/util/pci.c index 88d163f..e639910 100644 --- a/src/util/pci.c +++ b/src/util/pci.c @@ -75,8 +75,8 @@ struct _pciDeviceList { /* For virReportOOMError() and virReportSystemError() */ #define VIR_FROM_THIS VIR_FROM_NONE -#define pciReportError(conn, code, fmt...) \ - virReportErrorHelper(conn, VIR_FROM_NONE, code, __FILE__, \ +#define pciReportError(code, fmt...) \ + virReportErrorHelper(NULL, VIR_FROM_NONE, code, __FILE__, \ __FUNCTION__, __LINE__, fmt) /* Specifications referenced in comments: @@ -262,8 +262,7 @@ typedef int (*pciIterPredicate)(pciDevice *, pciDevice *, void *); * safe to reset if there is an error. */ static int -pciIterDevices(virConnectPtr conn, - pciIterPredicate predicate, +pciIterDevices(pciIterPredicate predicate, pciDevice *dev, pciDevice **matched, void *data) @@ -296,7 +295,7 @@ pciIterDevices(virConnectPtr conn, continue; } - check = pciGetDevice(conn, domain, bus, slot, function); + check = pciGetDevice(domain, bus, slot, function); if (!check) { ret = -1; break; @@ -307,7 +306,7 @@ pciIterDevices(virConnectPtr conn, *matched = check; break; } - pciFreeDevice(conn, check); + pciFreeDevice(check); } closedir(dir); return ret; @@ -452,12 +451,11 @@ pciSharesBusWithActive(pciDevice *dev, pciDevice *check, void *data) } static pciDevice * -pciBusContainsActiveDevices(virConnectPtr conn, - pciDevice *dev, +pciBusContainsActiveDevices(pciDevice *dev, pciDeviceList *activeDevs) { pciDevice *active = NULL; - if (pciIterDevices(conn, pciSharesBusWithActive, + if (pciIterDevices(pciSharesBusWithActive, dev, &active, activeDevs) < 0) return NULL; return active; @@ -493,10 +491,10 @@ pciIsParent(pciDevice *dev, pciDevice *check, void *data ATTRIBUTE_UNUSED) } static pciDevice * -pciGetParentDevice(virConnectPtr conn, pciDevice *dev) +pciGetParentDevice(pciDevice *dev) { pciDevice *parent = NULL; - pciIterDevices(conn, pciIsParent, dev, &parent, NULL); + pciIterDevices(pciIsParent, dev, &parent, NULL); return parent; } @@ -504,8 +502,7 @@ pciGetParentDevice(virConnectPtr conn, pciDevice *dev) * devices behind a bus. */ static int -pciTrySecondaryBusReset(virConnectPtr conn, - pciDevice *dev, +pciTrySecondaryBusReset(pciDevice *dev, pciDeviceList *activeDevs) { pciDevice *parent, *conflict; @@ -518,17 +515,17 @@ pciTrySecondaryBusReset(virConnectPtr conn, * In future, we could allow it so long as those devices * are not in use by the host or other guests. */ - if ((conflict = pciBusContainsActiveDevices(conn, dev, activeDevs))) { - pciReportError(conn, VIR_ERR_NO_SUPPORT, + if ((conflict = pciBusContainsActiveDevices(dev, activeDevs))) { + pciReportError(VIR_ERR_NO_SUPPORT, _("Active %s devices on bus with %s, not doing bus reset"), conflict->name, dev->name); return -1; } /* Find the parent bus */ - parent = pciGetParentDevice(conn, dev); + parent = pciGetParentDevice(dev); if (!parent) { - pciReportError(conn, VIR_ERR_NO_SUPPORT, + pciReportError(VIR_ERR_NO_SUPPORT, _("Failed to find parent device for %s"), dev->name); return -1; @@ -541,7 +538,7 @@ pciTrySecondaryBusReset(virConnectPtr conn, * are multiple devices/functions */ if (pciRead(dev, 0, config_space, PCI_CONF_LEN) < 0) { - pciReportError(conn, VIR_ERR_NO_SUPPORT, + pciReportError(VIR_ERR_NO_SUPPORT, _("Failed to save PCI config space for %s"), dev->name); goto out; @@ -561,14 +558,14 @@ pciTrySecondaryBusReset(virConnectPtr conn, usleep(200 * 1000); /* sleep 200ms */ if (pciWrite(dev, 0, config_space, PCI_CONF_LEN) < 0) { - pciReportError(conn, VIR_ERR_NO_SUPPORT, + pciReportError(VIR_ERR_NO_SUPPORT, _("Failed to restore PCI config space for %s"), dev->name); goto out; } ret = 0; out: - pciFreeDevice(conn, parent); + pciFreeDevice(parent); return ret; } @@ -577,7 +574,7 @@ out: * above we require the device supports a full internal reset. */ static int -pciTryPowerManagementReset(virConnectPtr conn ATTRIBUTE_UNUSED, pciDevice *dev) +pciTryPowerManagementReset(pciDevice *dev) { uint8_t config_space[PCI_CONF_LEN]; uint32_t ctl; @@ -587,7 +584,7 @@ pciTryPowerManagementReset(virConnectPtr conn ATTRIBUTE_UNUSED, pciDevice *dev) /* Save and restore the device's config space. */ if (pciRead(dev, 0, &config_space[0], PCI_CONF_LEN) < 0) { - pciReportError(conn, VIR_ERR_NO_SUPPORT, + pciReportError(VIR_ERR_NO_SUPPORT, _("Failed to save PCI config space for %s"), dev->name); return -1; @@ -607,7 +604,7 @@ pciTryPowerManagementReset(virConnectPtr conn ATTRIBUTE_UNUSED, pciDevice *dev) usleep(10 * 1000); /* sleep 10ms */ if (pciWrite(dev, 0, &config_space[0], PCI_CONF_LEN) < 0) { - pciReportError(conn, VIR_ERR_NO_SUPPORT, + pciReportError(VIR_ERR_NO_SUPPORT, _("Failed to restore PCI config space for %s"), dev->name); return -1; @@ -635,14 +632,13 @@ pciInitDevice(pciDevice *dev) } int -pciResetDevice(virConnectPtr conn, - pciDevice *dev, +pciResetDevice(pciDevice *dev, pciDeviceList *activeDevs) { int ret = -1; if (activeDevs && pciDeviceListFind(activeDevs, dev)) { - pciReportError(conn, VIR_ERR_INTERNAL_ERROR, + pciReportError(VIR_ERR_INTERNAL_ERROR, _("Not resetting active device %s"), dev->name); return -1; } @@ -661,15 +657,15 @@ pciResetDevice(virConnectPtr conn, * the function, not the whole device. */ if (dev->has_pm_reset) - ret = pciTryPowerManagementReset(conn, dev); + ret = pciTryPowerManagementReset(dev); /* Bus reset is not an option with the root bus */ if (ret < 0 && dev->bus != 0) - ret = pciTrySecondaryBusReset(conn, dev, activeDevs); + ret = pciTrySecondaryBusReset(dev, activeDevs); if (ret < 0) { virErrorPtr err = virGetLastError(); - pciReportError(conn, VIR_ERR_NO_SUPPORT, + pciReportError(VIR_ERR_NO_SUPPORT, _("Unable to reset PCI device %s: %s"), dev->name, err ? err->message : _("no FLR, PM reset or bus reset available")); @@ -810,11 +806,11 @@ pciBindDeviceToStub(pciDevice *dev, const char *driver) } int -pciDettachDevice(virConnectPtr conn, pciDevice *dev) +pciDettachDevice(pciDevice *dev) { const char *driver = pciFindStubDriver(); if (!driver) { - pciReportError(conn, VIR_ERR_INTERNAL_ERROR, "%s", + pciReportError(VIR_ERR_INTERNAL_ERROR, "%s", _("cannot find any PCI stub module")); return -1; } @@ -871,11 +867,11 @@ pciUnBindDeviceFromStub(pciDevice *dev, const char *driver) } int -pciReAttachDevice(virConnectPtr conn, pciDevice *dev) +pciReAttachDevice(pciDevice *dev) { const char *driver = pciFindStubDriver(); if (!driver) { - pciReportError(conn, VIR_ERR_INTERNAL_ERROR, "%s", + pciReportError(VIR_ERR_INTERNAL_ERROR, "%s", _("cannot find any PCI stub module")); return -1; } @@ -1006,8 +1002,7 @@ pciReadDeviceID(pciDevice *dev, const char *id_name) } pciDevice * -pciGetDevice(virConnectPtr conn, - unsigned domain, +pciGetDevice(unsigned domain, unsigned bus, unsigned slot, unsigned function) @@ -1035,12 +1030,12 @@ pciGetDevice(virConnectPtr conn, product = pciReadDeviceID(dev, "device"); if (!vendor || !product) { - pciReportError(conn, VIR_ERR_NO_SUPPORT, + pciReportError(VIR_ERR_NO_SUPPORT, _("Failed to read product/vendor ID for %s"), dev->name); VIR_FREE(product); VIR_FREE(vendor); - pciFreeDevice(conn, dev); + pciFreeDevice(dev); return NULL; } @@ -1056,7 +1051,7 @@ pciGetDevice(virConnectPtr conn, } void -pciFreeDevice(virConnectPtr conn ATTRIBUTE_UNUSED, pciDevice *dev) +pciFreeDevice(pciDevice *dev) { if (!dev) return; @@ -1077,7 +1072,7 @@ unsigned pciDeviceGetManaged(pciDevice *dev) } pciDeviceList * -pciDeviceListNew(virConnectPtr conn ATTRIBUTE_UNUSED /*TEMPORARY*/) +pciDeviceListNew(void) { pciDeviceList *list; @@ -1090,8 +1085,7 @@ pciDeviceListNew(virConnectPtr conn ATTRIBUTE_UNUSED /*TEMPORARY*/) } void -pciDeviceListFree(virConnectPtr conn, - pciDeviceList *list) +pciDeviceListFree(pciDeviceList *list) { int i; @@ -1099,7 +1093,7 @@ pciDeviceListFree(virConnectPtr conn, return; for (i = 0; i < list->count; i++) { - pciFreeDevice(conn, list->devs[i]); + pciFreeDevice(list->devs[i]); list->devs[i] = NULL; } @@ -1109,12 +1103,11 @@ pciDeviceListFree(virConnectPtr conn, } int -pciDeviceListAdd(virConnectPtr conn, - pciDeviceList *list, +pciDeviceListAdd(pciDeviceList *list, pciDevice *dev) { if (pciDeviceListFind(list, dev)) { - pciReportError(conn, VIR_ERR_INTERNAL_ERROR, + pciReportError(VIR_ERR_INTERNAL_ERROR, _("Device %s is already in use"), dev->name); return -1; } @@ -1148,8 +1141,7 @@ pciDeviceListCount(pciDeviceList *list) } pciDevice * -pciDeviceListSteal(virConnectPtr conn ATTRIBUTE_UNUSED, - pciDeviceList *list, +pciDeviceListSteal(pciDeviceList *list, pciDevice *dev) { pciDevice *ret = NULL; @@ -1179,13 +1171,12 @@ pciDeviceListSteal(virConnectPtr conn ATTRIBUTE_UNUSED, } void -pciDeviceListDel(virConnectPtr conn, - pciDeviceList *list, +pciDeviceListDel(pciDeviceList *list, pciDevice *dev) { - pciDevice *ret = pciDeviceListSteal(conn, list, dev); + pciDevice *ret = pciDeviceListSteal(list, dev); if (ret) - pciFreeDevice(conn, ret); + pciFreeDevice(ret); } pciDevice * @@ -1289,12 +1280,11 @@ pciDeviceDownstreamLacksACS(pciDevice *dev) } static int -pciDeviceIsBehindSwitchLackingACS(virConnectPtr conn, - pciDevice *dev) +pciDeviceIsBehindSwitchLackingACS(pciDevice *dev) { pciDevice *parent; - parent = pciGetParentDevice(conn, dev); + parent = pciGetParentDevice(dev); if (!parent) { /* if we have no parent, and this is the root bus, ACS doesn't come * into play since devices on the root bus can't P2P without going @@ -1303,7 +1293,7 @@ pciDeviceIsBehindSwitchLackingACS(virConnectPtr conn, if (dev->bus == 0) return 0; else { - pciReportError(conn, VIR_ERR_NO_SUPPORT, + pciReportError(VIR_ERR_NO_SUPPORT, _("Failed to find parent device for %s"), dev->name); return -1; @@ -1321,7 +1311,7 @@ pciDeviceIsBehindSwitchLackingACS(virConnectPtr conn, acs = pciDeviceDownstreamLacksACS(parent); if (acs) { - pciFreeDevice(conn, parent); + pciFreeDevice(parent); if (acs < 0) return -1; else @@ -1329,15 +1319,14 @@ pciDeviceIsBehindSwitchLackingACS(virConnectPtr conn, } tmp = parent; - parent = pciGetParentDevice(conn, parent); - pciFreeDevice(conn, tmp); + parent = pciGetParentDevice(parent); + pciFreeDevice(tmp); } while (parent); return 0; } -int pciDeviceIsAssignable(virConnectPtr conn, - pciDevice *dev, +int pciDeviceIsAssignable(pciDevice *dev, int strict_acs_check) { int ret; @@ -1347,7 +1336,7 @@ int pciDeviceIsAssignable(virConnectPtr conn, * or bound to a stub driver. */ - ret = pciDeviceIsBehindSwitchLackingACS(conn, dev); + ret = pciDeviceIsBehindSwitchLackingACS(dev); if (ret < 0) return 0; @@ -1356,7 +1345,7 @@ int pciDeviceIsAssignable(virConnectPtr conn, VIR_DEBUG("%s %s: strict ACS check disabled; device assignment allowed", dev->id, dev->name); } else { - pciReportError(conn, VIR_ERR_NO_SUPPORT, + pciReportError(VIR_ERR_NO_SUPPORT, _("Device %s is behind a switch lacking ACS and " "cannot be assigned"), dev->name); diff --git a/src/util/pci.h b/src/util/pci.h index e6ab137..ad518a5 100644 --- a/src/util/pci.h +++ b/src/util/pci.h @@ -27,38 +27,29 @@ typedef struct _pciDevice pciDevice; typedef struct _pciDeviceList pciDeviceList; -pciDevice *pciGetDevice (virConnectPtr conn, - unsigned domain, +pciDevice *pciGetDevice (unsigned domain, unsigned bus, unsigned slot, unsigned function); -void pciFreeDevice (virConnectPtr conn, - pciDevice *dev); -int pciDettachDevice (virConnectPtr conn, - pciDevice *dev); -int pciReAttachDevice (virConnectPtr conn, - pciDevice *dev); -int pciResetDevice (virConnectPtr conn, - pciDevice *dev, +void pciFreeDevice (pciDevice *dev); +int pciDettachDevice (pciDevice *dev); +int pciReAttachDevice (pciDevice *dev); +int pciResetDevice (pciDevice *dev, pciDeviceList *activeDevs); void pciDeviceSetManaged(pciDevice *dev, unsigned managed); unsigned pciDeviceGetManaged(pciDevice *dev); -pciDeviceList *pciDeviceListNew (virConnectPtr conn); -void pciDeviceListFree (virConnectPtr conn, - pciDeviceList *list); -int pciDeviceListAdd (virConnectPtr conn, - pciDeviceList *list, +pciDeviceList *pciDeviceListNew (void); +void pciDeviceListFree (pciDeviceList *list); +int pciDeviceListAdd (pciDeviceList *list, pciDevice *dev); pciDevice * pciDeviceListGet (pciDeviceList *list, int idx); int pciDeviceListCount (pciDeviceList *list); -pciDevice * pciDeviceListSteal (virConnectPtr conn, - pciDeviceList *list, +pciDevice * pciDeviceListSteal (pciDeviceList *list, pciDevice *dev); -void pciDeviceListDel (virConnectPtr conn, - pciDeviceList *list, +void pciDeviceListDel (pciDeviceList *list, pciDevice *dev); pciDevice * pciDeviceListFind (pciDeviceList *list, pciDevice *dev); @@ -78,8 +69,7 @@ int pciDeviceFileIterate(virConnectPtr conn, pciDeviceFileActor actor, void *opaque); -int pciDeviceIsAssignable(virConnectPtr conn, - pciDevice *dev, +int pciDeviceIsAssignable(pciDevice *dev, int strict_acs_check); int pciWaitForDeviceCleanup(pciDevice *dev, const char *matcher); diff --git a/src/xen/xen_driver.c b/src/xen/xen_driver.c index c5da026..cee4cea 100644 --- a/src/xen/xen_driver.c +++ b/src/xen/xen_driver.c @@ -1725,16 +1725,16 @@ xenUnifiedNodeDeviceDettach (virNodeDevicePtr dev) if (xenUnifiedNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0) return -1; - pci = pciGetDevice(dev->conn, domain, bus, slot, function); + pci = pciGetDevice(domain, bus, slot, function); if (!pci) return -1; - if (pciDettachDevice(dev->conn, pci) < 0) + if (pciDettachDevice(pci) < 0) goto out; ret = 0; out: - pciFreeDevice(dev->conn, pci); + pciFreeDevice(pci); return ret; } @@ -1748,16 +1748,16 @@ xenUnifiedNodeDeviceReAttach (virNodeDevicePtr dev) if (xenUnifiedNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0) return -1; - pci = pciGetDevice(dev->conn, domain, bus, slot, function); + pci = pciGetDevice(domain, bus, slot, function); if (!pci) return -1; - if (pciReAttachDevice(dev->conn, pci) < 0) + if (pciReAttachDevice(pci) < 0) goto out; ret = 0; out: - pciFreeDevice(dev->conn, pci); + pciFreeDevice(pci); return ret; } @@ -1771,16 +1771,16 @@ xenUnifiedNodeDeviceReset (virNodeDevicePtr dev) if (xenUnifiedNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0) return -1; - pci = pciGetDevice(dev->conn, domain, bus, slot, function); + pci = pciGetDevice(domain, bus, slot, function); if (!pci) return -1; - if (pciResetDevice(dev->conn, pci, NULL) < 0) + if (pciResetDevice(pci, NULL) < 0) goto out; ret = 0; out: - pciFreeDevice(dev->conn, pci); + pciFreeDevice(pci); return ret; } -- 1.6.3.3 -- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list