From nobody Wed Nov 27 09:51:43 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass header.i=@intel.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1700038176; cv=none; d=zohomail.com; s=zohoarc; b=cBR7o49bdcKcbK7vuc2hOarH50KaiTRPZD0dOQRT2P2UY4ZHZvmg8WvjzFe9xMn/OOTVkRw2r3PAzvUcwwS5RGv0H6RWWPQ98w/7L+UPEht8hiKkET3ErkO9QWRHEstf8h7Hb3mXTmYf9ki6XEj7ygUiUCU3FZGU8fqUiJKRJ/E= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1700038176; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=6ZxQflOBx4a9NthEy3NzzWo/9tSJqeMO7VnV3btEB5o=; b=Cv2AMjjNxQOK2mfasaHh/H0fvhp+kjf9BJihFJdjcB/CBjZOmhErTJv0aNfhmcuwZ8MXfVt6aN/lCzDf6485weWbYsiC2YLVIQHcKG2/sXlXC9E8ZUBeDLuy6We5VKRO1PDKnP8rjAXMG3ky4o3myxbRc+pEpH+zTUYXqOfeVIU= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=@intel.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1700038176192506.30099535727527; Wed, 15 Nov 2023 00:49:36 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1r3BZL-0003JS-Op; Wed, 15 Nov 2023 03:48:19 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r3BZK-0003Ik-A9; Wed, 15 Nov 2023 03:48:18 -0500 Received: from mgamail.intel.com ([192.198.163.7]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r3BZI-0007ub-N3; Wed, 15 Nov 2023 03:48:18 -0500 Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmvoesa101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Nov 2023 00:48:15 -0800 Received: from duan-server-s2600bt.bj.intel.com ([10.240.192.147]) by fmsmga006-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Nov 2023 00:48:09 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1700038097; x=1731574097; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=4T25mDurpLt8WQ4FJZmMzpzp4n1j01lUEeg9qooKvDg=; b=CFmHTP/5NjS1seAJl6SWSPmcrRmn1veg1htnmWxkrM6Wv1R2N5z10ubs xnA0NECR2WPVmqU9qgd3Vds3xYbEg6HHoWBKG5Pf081rUmLr18DnYADaO yrJgkP1TO2XwXs6EKQL07nwz+IRZg9oCGukVphGrrH1WjBq3D6YJvoyfB h3sjSSWpgNJHlUGkMk08qBh5de2HP+K6SXxgTYvwe1SBpF1kk/HWRnqfS r6DvE9WNe5NpxWNaKUhZvX5qKAP4nAYTPFdSsB6kcYlYs0IfQguniHm2V 5JnpgwUM2DJZoKb43DHt8iVJuR57rAqlMrbZgLQYJt+Disjdem/yFRn0Y A==; X-IronPort-AV: E=McAfee;i="6600,9927,10894"; a="12385068" X-IronPort-AV: E=Sophos;i="6.03,304,1694761200"; d="scan'208";a="12385068" X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10894"; a="1012199457" X-IronPort-AV: E=Sophos;i="6.03,304,1694761200"; d="scan'208";a="1012199457" From: Zhenzhong Duan To: qemu-devel@nongnu.org Cc: alex.williamson@redhat.com, clg@redhat.com, jgg@nvidia.com, nicolinc@nvidia.com, joao.m.martins@oracle.com, eric.auger@redhat.com, peterx@redhat.com, jasowang@redhat.com, kevin.tian@intel.com, yi.l.liu@intel.com, yi.y.sun@intel.com, chao.p.peng@intel.com, Zhenzhong Duan , Eric Farman , Matthew Rosato , Thomas Huth , qemu-s390x@nongnu.org (open list:vfio-ccw) Subject: [PATCH 4/4] vfio/ccw: Move VFIODevice initializations in vfio_ccw_instance_init Date: Wed, 15 Nov 2023 16:32:18 +0800 Message-Id: <20231115083218.1973627-5-zhenzhong.duan@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20231115083218.1973627-1-zhenzhong.duan@intel.com> References: <20231115083218.1973627-1-zhenzhong.duan@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=192.198.163.7; envelope-from=zhenzhong.duan@intel.com; helo=mgamail.intel.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @intel.com) X-ZM-MESSAGEID: 1700038177962100003 Some of the VFIODevice initializations is in vfio_ccw_realize, move all of them in vfio_ccw_instance_init. No functional change intended. Suggested-by: C=C3=A9dric Le Goater Signed-off-by: Zhenzhong Duan Reviewed-by: Eric Farman --- hw/vfio/ccw.c | 30 +++++++++++++++--------------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/hw/vfio/ccw.c b/hw/vfio/ccw.c index b116b10fe7..8de2fd809b 100644 --- a/hw/vfio/ccw.c +++ b/hw/vfio/ccw.c @@ -594,20 +594,6 @@ static void vfio_ccw_realize(DeviceState *dev, Error *= *errp) return; } =20 - vbasedev->ops =3D &vfio_ccw_ops; - vbasedev->type =3D VFIO_DEVICE_TYPE_CCW; - vbasedev->dev =3D dev; - - /* - * All vfio-ccw devices are believed to operate in a way compatible wi= th - * discarding of memory in RAM blocks, ie. pages pinned in the host are - * in the current working set of the guest driver and therefore never - * overlap e.g., with pages available to the guest balloon driver. Th= is - * needs to be set before vfio_get_device() for vfio common to handle - * ram_block_discard_disable(). - */ - vbasedev->ram_block_discard_allowed =3D true; - ret =3D vfio_attach_device(cdev->mdevid, vbasedev, &address_space_memory, errp); if (ret) { @@ -695,8 +681,22 @@ static const VMStateDescription vfio_ccw_vmstate =3D { static void vfio_ccw_instance_init(Object *obj) { VFIOCCWDevice *vcdev =3D VFIO_CCW(obj); + VFIODevice *vbasedev =3D &vcdev->vdev; + + vbasedev->type =3D VFIO_DEVICE_TYPE_CCW; + vbasedev->ops =3D &vfio_ccw_ops; + vbasedev->dev =3D DEVICE(vcdev); + vbasedev->fd =3D -1; =20 - vcdev->vdev.fd =3D -1; + /* + * All vfio-ccw devices are believed to operate in a way compatible wi= th + * discarding of memory in RAM blocks, ie. pages pinned in the host are + * in the current working set of the guest driver and therefore never + * overlap e.g., with pages available to the guest balloon driver. Th= is + * needs to be set before vfio_get_device() for vfio common to handle + * ram_block_discard_disable(). + */ + vbasedev->ram_block_discard_allowed =3D true; } =20 #ifdef CONFIG_IOMMUFD --=20 2.34.1