From nobody Wed Nov 27 04:57:16 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass header.i=@intel.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=linux.intel.com ARC-Seal: i=1; a=rsa-sha256; t=1701354985; cv=none; d=zohomail.com; s=zohoarc; b=Uy7TDRX9wXyN78fwbgQ9fLJTQVqrJlDIsCEz5+oWHezbsXFBzjrYPOGDYPyokwOg26kE3UPACP04T3DyCQ1rIJQLG7nYLtWe45dCZTAdXbFKzhrx4XJDid0LR3omhB773V5jfpUNCQtW9Nrdkool46i7doZYl0FRCbFNxhd986k= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1701354985; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Zlk6YC8xpWCO7VeZ16JtsW/aS23EN62LOIPiqtyPtGk=; b=fONbK1DErDJyRw4880tyV/c/PGZnfW1YPds5uMpoXnkYPqJWauo+uMxzvgTaype1dneuUMHmlUJwSrVskQwHpEcr5d6scYzpZWCwGmrQVGMUWMJ/9FWYKJPLo0MX1lxCZ2eePfdXlOrdxCDnLR+6W3SCUSpzXr/7PNURzM8g4kQ= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=@intel.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1701354985164668.889048900022; Thu, 30 Nov 2023 06:36:25 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1r8i4Z-0001Rr-PI; Thu, 30 Nov 2023 09:31:23 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r8i4G-0001MC-RC; Thu, 30 Nov 2023 09:31:08 -0500 Received: from mgamail.intel.com ([192.55.52.43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1r8i49-0000yu-Ms; Thu, 30 Nov 2023 09:31:04 -0500 Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Nov 2023 06:30:52 -0800 Received: from liuzhao-optiplex-7080.sh.intel.com ([10.239.160.36]) by orsmga005.jf.intel.com with ESMTP; 30 Nov 2023 06:30:42 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1701354657; x=1732890657; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=LfXluGcV2XSbwSzs1A7j8csA0H78Hr7rImWxVfjhw/E=; b=QxCSX/aVhqp7pcSWQpm0s31u91lIaf7ODI3979nZV/0RkmUCCZRN01vq dymHX9SW3NYh2+4aKy+Iw5lWWtyvxt0zhey2GMYNp26GKrO71NYQa8ZfV pEh0evQ8O8RKsskiMQ67nKA56Q++dQbz+q2mQhK/Z65KruTMTvz0DMAsH WChAT+8Xp3XnIPvpw4C3BRvQwdVlXnjanjjq0xj3nvacaedtXZo4FgODX OZW3U3R6nrYng5cEa8dzEg+xfozaAm0nja1fAHZHuTBzG8mbG47+oTJCl VGv+dPHttNeslKpPJFHUA8WKLp76D4vJbwz+0wm8veqcgMVErJvoDm/LU w==; X-IronPort-AV: E=McAfee;i="6600,9927,10910"; a="479530893" X-IronPort-AV: E=Sophos;i="6.04,239,1695711600"; d="scan'208";a="479530893" X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10910"; a="942729606" X-IronPort-AV: E=Sophos;i="6.04,239,1695711600"; d="scan'208";a="942729606" From: Zhao Liu To: Paolo Bonzini , =?UTF-8?q?Alex=20Benn=C3=A9e?= , =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= , Eduardo Habkost , Marcel Apfelbaum , Yanan Wang , Richard Henderson , "Michael S . Tsirkin" , Jason Wang , Nicholas Piggin , Daniel Henrique Barboza , Igor Mammedov , =?UTF-8?q?C=C3=A9dric=20Le=20Goater?= , =?UTF-8?q?Fr=C3=A9d=C3=A9ric=20Barrat?= , David Gibson , Harsh Prateek Bora , Stefano Stabellini , Anthony Perard , Paul Durrant , Gerd Hoffmann , Peter Maydell , Alistair Francis , "Edgar E . Iglesias" , =?UTF-8?q?Daniel=20P=20=2E=20Berrang=C3=A9?= , Bin Meng , Palmer Dabbelt , Weiwei Li , Liu Zhiwei , qemu-devel@nongnu.org, kvm@vger.kernel.org, qemu-ppc@nongnu.org, xen-devel@lists.xenproject.org, qemu-arm@nongnu.org, qemu-riscv@nongnu.org, qemu-s390x@nongnu.org Cc: Nina Schoetterl-Glausch , Thomas Huth , Zhiyuan Lv , Zhenyu Wang , Yongwei Ma , Zhao Liu Subject: [RFC 02/41] qdev: Allow qdev_device_add() to add specific category device Date: Thu, 30 Nov 2023 22:41:24 +0800 Message-Id: <20231130144203.2307629-3-zhao1.liu@linux.intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20231130144203.2307629-1-zhao1.liu@linux.intel.com> References: <20231130144203.2307629-1-zhao1.liu@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: none client-ip=192.55.52.43; envelope-from=zhao1.liu@linux.intel.com; helo=mgamail.intel.com X-Spam_score_int: -42 X-Spam_score: -4.3 X-Spam_bar: ---- X-Spam_report: (-4.3 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @intel.com) X-ZM-MESSAGEID: 1701354987192000003 Content-Type: text/plain; charset="utf-8" From: Zhao Liu Topology devices need to be created and realized before board initialization. Allow qdev_device_add() to specify category to help create topology devices early. Signed-off-by: Zhao Liu --- hw/net/virtio-net.c | 2 +- hw/usb/xen-usb.c | 3 ++- include/monitor/qdev.h | 4 ++-- system/qdev-monitor.c | 12 ++++++++---- system/vl.c | 4 ++-- 5 files changed, 15 insertions(+), 10 deletions(-) diff --git a/hw/net/virtio-net.c b/hw/net/virtio-net.c index 80c56f0cfcf1..fc225049ee30 100644 --- a/hw/net/virtio-net.c +++ b/hw/net/virtio-net.c @@ -965,7 +965,7 @@ static void failover_add_primary(VirtIONet *n, Error **= errp) return; } =20 - dev =3D qdev_device_add_from_qdict(n->primary_opts, + dev =3D qdev_device_add_from_qdict(n->primary_opts, NULL, n->primary_opts_from_json, &err); if (err) { diff --git a/hw/usb/xen-usb.c b/hw/usb/xen-usb.c index 09ec326aeae5..bc00d47ff021 100644 --- a/hw/usb/xen-usb.c +++ b/hw/usb/xen-usb.c @@ -766,7 +766,8 @@ static void usbback_portid_add(struct usbback_info *usb= if, unsigned port, qdict_put_str(qdict, "hostport", portname); opts =3D qemu_opts_from_qdict(qemu_find_opts("device"), qdict, &error_abort); - usbif->ports[port - 1].dev =3D USB_DEVICE(qdev_device_add(opts, &local= _err)); + usbif->ports[port - 1].dev =3D USB_DEVICE( + qdev_device_add(opts, NULL, &local_er= r)); if (!usbif->ports[port - 1].dev) { qobject_unref(qdict); xen_pv_printf(&usbif->xendev, 0, diff --git a/include/monitor/qdev.h b/include/monitor/qdev.h index 1d57bf657794..f5fd6e6c1ffc 100644 --- a/include/monitor/qdev.h +++ b/include/monitor/qdev.h @@ -8,8 +8,8 @@ void hmp_info_qdm(Monitor *mon, const QDict *qdict); void qmp_device_add(QDict *qdict, QObject **ret_data, Error **errp); =20 int qdev_device_help(QemuOpts *opts); -DeviceState *qdev_device_add(QemuOpts *opts, Error **errp); -DeviceState *qdev_device_add_from_qdict(const QDict *opts, +DeviceState *qdev_device_add(QemuOpts *opts, long *category, Error **errp); +DeviceState *qdev_device_add_from_qdict(const QDict *opts, long *category, bool from_json, Error **errp); =20 /** diff --git a/system/qdev-monitor.c b/system/qdev-monitor.c index 0f163b2d0310..7ee33a50142a 100644 --- a/system/qdev-monitor.c +++ b/system/qdev-monitor.c @@ -617,7 +617,7 @@ const char *qdev_set_id(DeviceState *dev, char *id, Err= or **errp) return prop->name; } =20 -DeviceState *qdev_device_add_from_qdict(const QDict *opts, +DeviceState *qdev_device_add_from_qdict(const QDict *opts, long *category, bool from_json, Error **errp) { ERRP_GUARD(); @@ -639,6 +639,10 @@ DeviceState *qdev_device_add_from_qdict(const QDict *o= pts, return NULL; } =20 + if (category && !test_bit(*category, dc->categories)) { + return NULL; + } + /* find bus */ path =3D qdict_get_try_str(opts, "bus"); if (path !=3D NULL) { @@ -731,12 +735,12 @@ err_del_dev: } =20 /* Takes ownership of @opts on success */ -DeviceState *qdev_device_add(QemuOpts *opts, Error **errp) +DeviceState *qdev_device_add(QemuOpts *opts, long *category, Error **errp) { QDict *qdict =3D qemu_opts_to_qdict(opts, NULL); DeviceState *ret; =20 - ret =3D qdev_device_add_from_qdict(qdict, false, errp); + ret =3D qdev_device_add_from_qdict(qdict, category, false, errp); if (ret) { qemu_opts_del(opts); } @@ -858,7 +862,7 @@ void qmp_device_add(QDict *qdict, QObject **ret_data, E= rror **errp) qemu_opts_del(opts); return; } - dev =3D qdev_device_add(opts, errp); + dev =3D qdev_device_add(opts, NULL, errp); =20 /* * Drain all pending RCU callbacks. This is done because diff --git a/system/vl.c b/system/vl.c index 2bcd9efb9a64..0be155b530b4 100644 --- a/system/vl.c +++ b/system/vl.c @@ -1198,7 +1198,7 @@ static int device_init_func(void *opaque, QemuOpts *o= pts, Error **errp) { DeviceState *dev; =20 - dev =3D qdev_device_add(opts, errp); + dev =3D qdev_device_add(opts, NULL, errp); if (!dev && *errp) { error_report_err(*errp); return -1; @@ -2646,7 +2646,7 @@ static void qemu_create_cli_devices(void) * from the start, so call qdev_device_add_from_qdict() directly f= or * now. */ - dev =3D qdev_device_add_from_qdict(opt->opts, true, &error_fatal); + dev =3D qdev_device_add_from_qdict(opt->opts, NULL, true, &error_f= atal); object_unref(OBJECT(dev)); loc_pop(&opt->loc); } --=20 2.34.1