git: fe2c9f83a6dc - main - Remove dead code.
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 26 Apr 2022 16:41:19 UTC
The branch main has been updated by dchagin:
URL: https://cgit.FreeBSD.org/src/commit/?id=fe2c9f83a6dc1cc62da177a765ce8a265894b2cd
commit fe2c9f83a6dc1cc62da177a765ce8a265894b2cd
Author: Dmitry Chagin <dchagin@FreeBSD.org>
AuthorDate: 2022-04-26 16:40:59 +0000
Commit: Dmitry Chagin <dchagin@FreeBSD.org>
CommitDate: 2022-04-26 16:40:59 +0000
Remove dead code.
is_physical_memory() dead since 235a54de.
Reviewed by: markj
Differential revision: https://reviews.freebsd.org/D35056
MFC after: 2 weeks
---
sys/amd64/amd64/vm_machdep.c | 25 -------------------------
sys/i386/i386/vm_machdep.c | 25 -------------------------
sys/powerpc/include/md_var.h | 1 -
sys/powerpc/powerpc/vm_machdep.c | 17 -----------------
sys/x86/include/x86_var.h | 1 -
5 files changed, 69 deletions(-)
diff --git a/sys/amd64/amd64/vm_machdep.c b/sys/amd64/amd64/vm_machdep.c
index 232e53c63952..c9c498180c7e 100644
--- a/sys/amd64/amd64/vm_machdep.c
+++ b/sys/amd64/amd64/vm_machdep.c
@@ -690,28 +690,3 @@ cpu_set_user_tls(struct thread *td, void *tls_base)
pcb->pcb_fsbase = (register_t)tls_base;
return (0);
}
-
-/*
- * Tell whether this address is in some physical memory region.
- * Currently used by the kernel coredump code in order to avoid
- * dumping the ``ISA memory hole'' which could cause indefinite hangs,
- * or other unpredictable behaviour.
- */
-
-int
-is_physical_memory(vm_paddr_t addr)
-{
-
-#ifdef DEV_ISA
- /* The ISA ``memory hole''. */
- if (addr >= 0xa0000 && addr < 0x100000)
- return 0;
-#endif
-
- /*
- * stuff other tests for known memory-mapped devices (PCI?)
- * here
- */
-
- return 1;
-}
diff --git a/sys/i386/i386/vm_machdep.c b/sys/i386/i386/vm_machdep.c
index ba1bc996bda4..a27aebf83a31 100644
--- a/sys/i386/i386/vm_machdep.c
+++ b/sys/i386/i386/vm_machdep.c
@@ -650,28 +650,3 @@ sf_buf_invalidate_cache(vm_page_t m)
return (sf_buf_process_page(m, sf_buf_invalidate));
}
-
-/*
- * Tell whether this address is in some physical memory region.
- * Currently used by the kernel coredump code in order to avoid
- * dumping the ``ISA memory hole'' which could cause indefinite hangs,
- * or other unpredictable behaviour.
- */
-
-int
-is_physical_memory(vm_paddr_t addr)
-{
-
-#ifdef DEV_ISA
- /* The ISA ``memory hole''. */
- if (addr >= 0xa0000 && addr < 0x100000)
- return 0;
-#endif
-
- /*
- * stuff other tests for known memory-mapped devices (PCI?)
- * here
- */
-
- return 1;
-}
diff --git a/sys/powerpc/include/md_var.h b/sys/powerpc/include/md_var.h
index 56c3639fe070..bfe3427f0712 100644
--- a/sys/powerpc/include/md_var.h
+++ b/sys/powerpc/include/md_var.h
@@ -58,7 +58,6 @@ extern int hw_direct_map;
void __syncicache(void *, int);
-int is_physical_memory(vm_offset_t addr);
int mem_valid(vm_offset_t addr, int len);
void decr_init(void);
diff --git a/sys/powerpc/powerpc/vm_machdep.c b/sys/powerpc/powerpc/vm_machdep.c
index 4a7347443407..bf39cb2305cb 100644
--- a/sys/powerpc/powerpc/vm_machdep.c
+++ b/sys/powerpc/powerpc/vm_machdep.c
@@ -208,23 +208,6 @@ cpu_exit(struct thread *td)
}
-/*
- * Tell whether this address is in some physical memory region.
- * Currently used by the kernel coredump code in order to avoid
- * dumping the ``ISA memory hole'' which could cause indefinite hangs,
- * or other unpredictable behaviour.
- */
-int
-is_physical_memory(vm_offset_t addr)
-{
-
- /*
- * stuff other tests for known memory-mapped devices (PCI?)
- * here
- */
- return (1);
-}
-
/*
* CPU threading functions related to the VM layer. These could be used
* to map the SLB bits required for the kernel stack instead of forcing a
diff --git a/sys/x86/include/x86_var.h b/sys/x86/include/x86_var.h
index 78acadd2b733..b4a27ca01eaa 100644
--- a/sys/x86/include/x86_var.h
+++ b/sys/x86/include/x86_var.h
@@ -134,7 +134,6 @@ void initializecpu(void);
void initializecpucache(void);
bool fix_cpuid(void);
void fillw(int /*u_short*/ pat, void *base, size_t cnt);
-int is_physical_memory(vm_paddr_t addr);
int isa_nmi(int cd);
void handle_ibrs_entry(void);
void handle_ibrs_exit(void);