2019-01-08 15:48:47 +01:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018 Citrix Systems Inc.
|
|
|
|
*
|
|
|
|
* This work is licensed under the terms of the GNU GPL, version 2 or later.
|
|
|
|
* See the COPYING file in the top-level directory.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "qemu/osdep.h"
|
2019-01-08 15:48:50 +01:00
|
|
|
#include "qemu/main-loop.h"
|
2019-05-23 16:35:07 +02:00
|
|
|
#include "qemu/module.h"
|
2019-01-08 15:48:50 +01:00
|
|
|
#include "qemu/uuid.h"
|
2019-08-12 07:23:51 +02:00
|
|
|
#include "hw/qdev-properties.h"
|
2019-01-08 15:48:47 +01:00
|
|
|
#include "hw/sysbus.h"
|
2019-01-08 15:48:49 +01:00
|
|
|
#include "hw/xen/xen.h"
|
2019-01-08 15:49:00 +01:00
|
|
|
#include "hw/xen/xen-backend.h"
|
2019-01-08 15:48:47 +01:00
|
|
|
#include "hw/xen/xen-bus.h"
|
2019-01-08 15:48:49 +01:00
|
|
|
#include "hw/xen/xen-bus-helper.h"
|
|
|
|
#include "monitor/monitor.h"
|
2019-01-08 15:48:47 +01:00
|
|
|
#include "qapi/error.h"
|
2019-01-08 15:49:00 +01:00
|
|
|
#include "qapi/qmp/qdict.h"
|
2019-01-08 15:48:49 +01:00
|
|
|
#include "sysemu/sysemu.h"
|
2019-01-08 15:48:47 +01:00
|
|
|
#include "trace.h"
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
static char *xen_device_get_backend_path(XenDevice *xendev)
|
|
|
|
{
|
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
XenDeviceClass *xendev_class = XEN_DEVICE_GET_CLASS(xendev);
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
const char *backend = xendev_class->backend;
|
|
|
|
|
|
|
|
if (!backend) {
|
|
|
|
backend = type;
|
|
|
|
}
|
|
|
|
|
|
|
|
return g_strdup_printf("/local/domain/%u/backend/%s/%u/%s",
|
|
|
|
xenbus->backend_id, backend, xendev->frontend_id,
|
|
|
|
xendev->name);
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *xen_device_get_frontend_path(XenDevice *xendev)
|
|
|
|
{
|
|
|
|
XenDeviceClass *xendev_class = XEN_DEVICE_GET_CLASS(xendev);
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
const char *device = xendev_class->device;
|
|
|
|
|
|
|
|
if (!device) {
|
|
|
|
device = type;
|
|
|
|
}
|
|
|
|
|
|
|
|
return g_strdup_printf("/local/domain/%u/device/%s/%s",
|
|
|
|
xendev->frontend_id, device, xendev->name);
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:59 +01:00
|
|
|
static void xen_device_unplug(XenDevice *xendev, Error **errp)
|
|
|
|
{
|
2020-07-07 18:50:37 +02:00
|
|
|
ERRP_GUARD();
|
2019-01-08 15:48:59 +01:00
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
xs_transaction_t tid;
|
|
|
|
|
|
|
|
trace_xen_device_unplug(type, xendev->name);
|
|
|
|
|
|
|
|
/* Mimic the way the Xen toolstack does an unplug */
|
|
|
|
again:
|
|
|
|
tid = xs_transaction_start(xenbus->xsh);
|
|
|
|
if (tid == XBT_NULL) {
|
|
|
|
error_setg_errno(errp, errno, "failed xs_transaction_start");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
xs_node_printf(xenbus->xsh, tid, xendev->backend_path, "online",
|
2020-07-07 18:50:37 +02:00
|
|
|
errp, "%u", 0);
|
|
|
|
if (*errp) {
|
2019-01-08 15:48:59 +01:00
|
|
|
goto abort;
|
|
|
|
}
|
|
|
|
|
|
|
|
xs_node_printf(xenbus->xsh, tid, xendev->backend_path, "state",
|
2020-07-07 18:50:37 +02:00
|
|
|
errp, "%u", XenbusStateClosing);
|
|
|
|
if (*errp) {
|
2019-01-08 15:48:59 +01:00
|
|
|
goto abort;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!xs_transaction_end(xenbus->xsh, tid, false)) {
|
|
|
|
if (errno == EAGAIN) {
|
|
|
|
goto again;
|
|
|
|
}
|
|
|
|
|
|
|
|
error_setg_errno(errp, errno, "failed xs_transaction_end");
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
abort:
|
|
|
|
/*
|
|
|
|
* We only abort if there is already a failure so ignore any error
|
|
|
|
* from ending the transaction.
|
|
|
|
*/
|
|
|
|
xs_transaction_end(xenbus->xsh, tid, true);
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
static void xen_bus_print_dev(Monitor *mon, DeviceState *dev, int indent)
|
|
|
|
{
|
|
|
|
XenDevice *xendev = XEN_DEVICE(dev);
|
|
|
|
|
|
|
|
monitor_printf(mon, "%*sname = '%s' frontend_id = %u\n",
|
|
|
|
indent, "", xendev->name, xendev->frontend_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *xen_bus_get_dev_path(DeviceState *dev)
|
|
|
|
{
|
|
|
|
return xen_device_get_backend_path(XEN_DEVICE(dev));
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:50 +01:00
|
|
|
struct XenWatch {
|
|
|
|
char *node, *key;
|
|
|
|
char *token;
|
|
|
|
XenWatchHandler handler;
|
|
|
|
void *opaque;
|
|
|
|
Notifier notifier;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void watch_notify(Notifier *n, void *data)
|
|
|
|
{
|
|
|
|
XenWatch *watch = container_of(n, XenWatch, notifier);
|
|
|
|
const char *token = data;
|
|
|
|
|
|
|
|
if (!strcmp(watch->token, token)) {
|
|
|
|
watch->handler(watch->opaque);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static XenWatch *new_watch(const char *node, const char *key,
|
|
|
|
XenWatchHandler handler, void *opaque)
|
|
|
|
{
|
|
|
|
XenWatch *watch = g_new0(XenWatch, 1);
|
|
|
|
QemuUUID uuid;
|
|
|
|
|
|
|
|
qemu_uuid_generate(&uuid);
|
|
|
|
|
|
|
|
watch->token = qemu_uuid_unparse_strdup(&uuid);
|
|
|
|
watch->node = g_strdup(node);
|
|
|
|
watch->key = g_strdup(key);
|
|
|
|
watch->handler = handler;
|
|
|
|
watch->opaque = opaque;
|
|
|
|
watch->notifier.notify = watch_notify;
|
|
|
|
|
|
|
|
return watch;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void free_watch(XenWatch *watch)
|
|
|
|
{
|
|
|
|
g_free(watch->token);
|
|
|
|
g_free(watch->key);
|
|
|
|
g_free(watch->node);
|
|
|
|
|
|
|
|
g_free(watch);
|
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:56 +02:00
|
|
|
struct XenWatchList {
|
|
|
|
struct xs_handle *xsh;
|
|
|
|
NotifierList notifiers;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void watch_list_event(void *opaque)
|
|
|
|
{
|
|
|
|
XenWatchList *watch_list = opaque;
|
|
|
|
char **v;
|
|
|
|
const char *token;
|
|
|
|
|
|
|
|
v = xs_check_watch(watch_list->xsh);
|
|
|
|
if (!v) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
token = v[XS_WATCH_TOKEN];
|
|
|
|
|
|
|
|
notifier_list_notify(&watch_list->notifiers, (void *)token);
|
|
|
|
|
|
|
|
free(v);
|
|
|
|
}
|
|
|
|
|
|
|
|
static XenWatchList *watch_list_create(struct xs_handle *xsh)
|
|
|
|
{
|
|
|
|
XenWatchList *watch_list = g_new0(XenWatchList, 1);
|
|
|
|
|
|
|
|
g_assert(xsh);
|
|
|
|
|
|
|
|
watch_list->xsh = xsh;
|
|
|
|
notifier_list_init(&watch_list->notifiers);
|
|
|
|
qemu_set_fd_handler(xs_fileno(watch_list->xsh), watch_list_event, NULL,
|
|
|
|
watch_list);
|
|
|
|
|
|
|
|
return watch_list;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void watch_list_destroy(XenWatchList *watch_list)
|
|
|
|
{
|
|
|
|
g_assert(notifier_list_empty(&watch_list->notifiers));
|
|
|
|
qemu_set_fd_handler(xs_fileno(watch_list->xsh), NULL, NULL, NULL);
|
|
|
|
g_free(watch_list);
|
|
|
|
}
|
|
|
|
|
|
|
|
static XenWatch *watch_list_add(XenWatchList *watch_list, const char *node,
|
|
|
|
const char *key, XenWatchHandler handler,
|
|
|
|
void *opaque, Error **errp)
|
2019-01-08 15:48:50 +01:00
|
|
|
{
|
2020-07-07 18:50:37 +02:00
|
|
|
ERRP_GUARD();
|
2019-01-08 15:48:50 +01:00
|
|
|
XenWatch *watch = new_watch(node, key, handler, opaque);
|
|
|
|
|
2019-09-13 10:21:56 +02:00
|
|
|
notifier_list_add(&watch_list->notifiers, &watch->notifier);
|
2019-01-08 15:48:50 +01:00
|
|
|
|
2020-07-07 18:50:37 +02:00
|
|
|
xs_node_watch(watch_list->xsh, node, key, watch->token, errp);
|
|
|
|
if (*errp) {
|
2019-01-08 15:48:50 +01:00
|
|
|
notifier_remove(&watch->notifier);
|
|
|
|
free_watch(watch);
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return watch;
|
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:56 +02:00
|
|
|
static void watch_list_remove(XenWatchList *watch_list, XenWatch *watch,
|
|
|
|
Error **errp)
|
2019-01-08 15:48:50 +01:00
|
|
|
{
|
2019-09-13 10:21:56 +02:00
|
|
|
xs_node_unwatch(watch_list->xsh, watch->node, watch->key, watch->token,
|
2019-01-08 15:48:50 +01:00
|
|
|
errp);
|
|
|
|
|
|
|
|
notifier_remove(&watch->notifier);
|
|
|
|
free_watch(watch);
|
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:56 +02:00
|
|
|
static XenWatch *xen_bus_add_watch(XenBus *xenbus, const char *node,
|
|
|
|
const char *key, XenWatchHandler handler,
|
2019-09-13 10:21:57 +02:00
|
|
|
Error **errp)
|
2019-09-13 10:21:56 +02:00
|
|
|
{
|
|
|
|
trace_xen_bus_add_watch(node, key);
|
|
|
|
|
2019-09-13 10:21:57 +02:00
|
|
|
return watch_list_add(xenbus->watch_list, node, key, handler, xenbus,
|
2019-09-13 10:21:56 +02:00
|
|
|
errp);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_bus_remove_watch(XenBus *xenbus, XenWatch *watch,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
trace_xen_bus_remove_watch(watch->node, watch->key);
|
|
|
|
|
|
|
|
watch_list_remove(xenbus->watch_list, watch, errp);
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:49:00 +01:00
|
|
|
static void xen_bus_backend_create(XenBus *xenbus, const char *type,
|
|
|
|
const char *name, char *path,
|
|
|
|
Error **errp)
|
|
|
|
{
|
2020-07-07 18:50:37 +02:00
|
|
|
ERRP_GUARD();
|
2019-01-08 15:49:00 +01:00
|
|
|
xs_transaction_t tid;
|
|
|
|
char **key;
|
|
|
|
QDict *opts;
|
|
|
|
unsigned int i, n;
|
|
|
|
|
|
|
|
trace_xen_bus_backend_create(type, path);
|
|
|
|
|
|
|
|
again:
|
|
|
|
tid = xs_transaction_start(xenbus->xsh);
|
|
|
|
if (tid == XBT_NULL) {
|
|
|
|
error_setg(errp, "failed xs_transaction_start");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
key = xs_directory(xenbus->xsh, tid, path, &n);
|
|
|
|
if (!key) {
|
|
|
|
if (!xs_transaction_end(xenbus->xsh, tid, true)) {
|
|
|
|
error_setg_errno(errp, errno, "failed xs_transaction_end");
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
opts = qdict_new();
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
char *val;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Assume anything found in the xenstore backend area, other than
|
|
|
|
* the keys created for a generic XenDevice, are parameters
|
|
|
|
* to be used to configure the backend.
|
|
|
|
*/
|
|
|
|
if (!strcmp(key[i], "state") ||
|
|
|
|
!strcmp(key[i], "online") ||
|
|
|
|
!strcmp(key[i], "frontend") ||
|
|
|
|
!strcmp(key[i], "frontend-id") ||
|
|
|
|
!strcmp(key[i], "hotplug-status"))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (xs_node_scanf(xenbus->xsh, tid, path, key[i], NULL, "%ms",
|
|
|
|
&val) == 1) {
|
|
|
|
qdict_put_str(opts, key[i], val);
|
|
|
|
free(val);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
free(key);
|
|
|
|
|
|
|
|
if (!xs_transaction_end(xenbus->xsh, tid, false)) {
|
|
|
|
qobject_unref(opts);
|
|
|
|
|
|
|
|
if (errno == EAGAIN) {
|
|
|
|
goto again;
|
|
|
|
}
|
|
|
|
|
|
|
|
error_setg_errno(errp, errno, "failed xs_transaction_end");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-07-07 18:50:37 +02:00
|
|
|
xen_backend_device_create(xenbus, type, name, opts, errp);
|
2019-01-08 15:49:00 +01:00
|
|
|
qobject_unref(opts);
|
|
|
|
|
2020-07-07 18:50:37 +02:00
|
|
|
if (*errp) {
|
|
|
|
error_prepend(errp, "failed to create '%s' device '%s': ", type, name);
|
2019-01-08 15:49:00 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_bus_type_enumerate(XenBus *xenbus, const char *type)
|
|
|
|
{
|
|
|
|
char *domain_path = g_strdup_printf("backend/%s/%u", type, xen_domid);
|
|
|
|
char **backend;
|
|
|
|
unsigned int i, n;
|
|
|
|
|
|
|
|
trace_xen_bus_type_enumerate(type);
|
|
|
|
|
|
|
|
backend = xs_directory(xenbus->xsh, XBT_NULL, domain_path, &n);
|
|
|
|
if (!backend) {
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
char *backend_path = g_strdup_printf("%s/%s", domain_path,
|
|
|
|
backend[i]);
|
2019-09-13 10:21:58 +02:00
|
|
|
enum xenbus_state state;
|
|
|
|
unsigned int online;
|
2019-01-08 15:49:00 +01:00
|
|
|
|
|
|
|
if (xs_node_scanf(xenbus->xsh, XBT_NULL, backend_path, "state",
|
2019-09-13 10:21:58 +02:00
|
|
|
NULL, "%u", &state) != 1)
|
|
|
|
state = XenbusStateUnknown;
|
2019-01-08 15:49:00 +01:00
|
|
|
|
2019-09-13 10:21:58 +02:00
|
|
|
if (xs_node_scanf(xenbus->xsh, XBT_NULL, backend_path, "online",
|
|
|
|
NULL, "%u", &online) != 1)
|
|
|
|
online = 0;
|
|
|
|
|
|
|
|
if (online && state == XenbusStateInitialising) {
|
2019-01-08 15:49:00 +01:00
|
|
|
Error *local_err = NULL;
|
|
|
|
|
|
|
|
xen_bus_backend_create(xenbus, type, backend[i], backend_path,
|
|
|
|
&local_err);
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
g_free(backend_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
free(backend);
|
|
|
|
|
|
|
|
out:
|
|
|
|
g_free(domain_path);
|
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:58 +02:00
|
|
|
static void xen_bus_enumerate(XenBus *xenbus)
|
2019-01-08 15:49:00 +01:00
|
|
|
{
|
|
|
|
char **type;
|
|
|
|
unsigned int i, n;
|
|
|
|
|
|
|
|
trace_xen_bus_enumerate();
|
|
|
|
|
|
|
|
type = xs_directory(xenbus->xsh, XBT_NULL, "backend", &n);
|
|
|
|
if (!type) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
xen_bus_type_enumerate(xenbus, type[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
free(type);
|
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:58 +02:00
|
|
|
static void xen_bus_device_cleanup(XenDevice *xendev)
|
|
|
|
{
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
Error *local_err = NULL;
|
|
|
|
|
|
|
|
trace_xen_bus_device_cleanup(type, xendev->name);
|
|
|
|
|
|
|
|
g_assert(!xendev->backend_online);
|
|
|
|
|
|
|
|
if (!xen_backend_try_device_destroy(xendev, &local_err)) {
|
|
|
|
object_unparent(OBJECT(xendev));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_bus_cleanup(XenBus *xenbus)
|
|
|
|
{
|
|
|
|
XenDevice *xendev, *next;
|
|
|
|
|
|
|
|
trace_xen_bus_cleanup();
|
|
|
|
|
|
|
|
QLIST_FOREACH_SAFE(xendev, &xenbus->inactive_devices, list, next) {
|
|
|
|
g_assert(xendev->inactive);
|
|
|
|
QLIST_REMOVE(xendev, list);
|
|
|
|
xen_bus_device_cleanup(xendev);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_bus_backend_changed(void *opaque)
|
|
|
|
{
|
|
|
|
XenBus *xenbus = opaque;
|
|
|
|
|
|
|
|
xen_bus_enumerate(xenbus);
|
|
|
|
xen_bus_cleanup(xenbus);
|
|
|
|
}
|
|
|
|
|
qdev: Unrealize must not fail
Devices may have component devices and buses.
Device realization may fail. Realization is recursive: a device's
realize() method realizes its components, and device_set_realized()
realizes its buses (which should in turn realize the devices on that
bus, except bus_set_realized() doesn't implement that, yet).
When realization of a component or bus fails, we need to roll back:
unrealize everything we realized so far. If any of these unrealizes
failed, the device would be left in an inconsistent state. Must not
happen.
device_set_realized() lets it happen: it ignores errors in the roll
back code starting at label child_realize_fail.
Since realization is recursive, unrealization must be recursive, too.
But how could a partly failed unrealize be rolled back? We'd have to
re-realize, which can fail. This design is fundamentally broken.
device_set_realized() does not roll back at all. Instead, it keeps
unrealizing, ignoring further errors.
It can screw up even for a device with no buses: if the lone
dc->unrealize() fails, it still unregisters vmstate, and calls
listeners' unrealize() callback.
bus_set_realized() does not roll back either. Instead, it stops
unrealizing.
Fortunately, no unrealize method can fail, as we'll see below.
To fix the design error, drop parameter @errp from all the unrealize
methods.
Any unrealize method that uses @errp now needs an update. This leads
us to unrealize() methods that can fail. Merely passing it to another
unrealize method cannot cause failure, though. Here are the ones that
do other things with @errp:
* virtio_serial_device_unrealize()
Fails when qbus_set_hotplug_handler() fails, but still does all the
other work. On failure, the device would stay realized with its
resources completely gone. Oops. Can't happen, because
qbus_set_hotplug_handler() can't actually fail here. Pass
&error_abort to qbus_set_hotplug_handler() instead.
* hw/ppc/spapr_drc.c's unrealize()
Fails when object_property_del() fails, but all the other work is
already done. On failure, the device would stay realized with its
vmstate registration gone. Oops. Can't happen, because
object_property_del() can't actually fail here. Pass &error_abort
to object_property_del() instead.
* spapr_phb_unrealize()
Fails and bails out when remove_drcs() fails, but other work is
already done. On failure, the device would stay realized with some
of its resources gone. Oops. remove_drcs() fails only when
chassis_from_bus()'s object_property_get_uint() fails, and it can't
here. Pass &error_abort to remove_drcs() instead.
Therefore, no unrealize method can fail before this patch.
device_set_realized()'s recursive unrealization via bus uses
object_property_set_bool(). Can't drop @errp there, so pass
&error_abort.
We similarly unrealize with object_property_set_bool() elsewhere,
always ignoring errors. Pass &error_abort instead.
Several unrealize methods no longer handle errors from other unrealize
methods: virtio_9p_device_unrealize(),
virtio_input_device_unrealize(), scsi_qdev_unrealize(), ...
Much of the deleted error handling looks wrong anyway.
One unrealize methods no longer ignore such errors:
usb_ehci_pci_exit().
Several realize methods no longer ignore errors when rolling back:
v9fs_device_realize_common(), pci_qdev_unrealize(),
spapr_phb_realize(), usb_qdev_realize(), vfio_ccw_realize(),
virtio_device_realize().
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200505152926.18877-17-armbru@redhat.com>
2020-05-05 17:29:24 +02:00
|
|
|
static void xen_bus_unrealize(BusState *bus)
|
2019-01-08 15:48:47 +01:00
|
|
|
{
|
2019-01-08 15:48:49 +01:00
|
|
|
XenBus *xenbus = XEN_BUS(bus);
|
|
|
|
|
2019-01-08 15:48:47 +01:00
|
|
|
trace_xen_bus_unrealize();
|
2019-01-08 15:48:49 +01:00
|
|
|
|
2019-01-08 15:49:00 +01:00
|
|
|
if (xenbus->backend_watch) {
|
2020-10-01 10:15:00 +02:00
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
for (i = 0; i < xenbus->backend_types; i++) {
|
|
|
|
if (xenbus->backend_watch[i]) {
|
|
|
|
xen_bus_remove_watch(xenbus, xenbus->backend_watch[i], NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
g_free(xenbus->backend_watch);
|
2019-01-08 15:49:00 +01:00
|
|
|
xenbus->backend_watch = NULL;
|
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:56 +02:00
|
|
|
if (xenbus->watch_list) {
|
|
|
|
watch_list_destroy(xenbus->watch_list);
|
|
|
|
xenbus->watch_list = NULL;
|
2019-01-08 15:48:49 +01:00
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:56 +02:00
|
|
|
if (xenbus->xsh) {
|
|
|
|
xs_close(xenbus->xsh);
|
2019-01-08 15:48:50 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:47 +01:00
|
|
|
static void xen_bus_realize(BusState *bus, Error **errp)
|
|
|
|
{
|
2020-10-01 10:15:00 +02:00
|
|
|
char *key = g_strdup_printf("%u", xen_domid);
|
2019-01-08 15:48:49 +01:00
|
|
|
XenBus *xenbus = XEN_BUS(bus);
|
|
|
|
unsigned int domid;
|
2020-10-01 10:15:00 +02:00
|
|
|
const char **type;
|
|
|
|
unsigned int i;
|
2019-01-08 15:49:00 +01:00
|
|
|
Error *local_err = NULL;
|
2019-01-08 15:48:49 +01:00
|
|
|
|
2019-01-08 15:48:47 +01:00
|
|
|
trace_xen_bus_realize();
|
2019-01-08 15:48:49 +01:00
|
|
|
|
|
|
|
xenbus->xsh = xs_open(0);
|
|
|
|
if (!xenbus->xsh) {
|
|
|
|
error_setg_errno(errp, errno, "failed xs_open");
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (xs_node_scanf(xenbus->xsh, XBT_NULL, "", /* domain root node */
|
|
|
|
"domid", NULL, "%u", &domid) == 1) {
|
|
|
|
xenbus->backend_id = domid;
|
|
|
|
} else {
|
|
|
|
xenbus->backend_id = 0; /* Assume lack of node means dom0 */
|
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:56 +02:00
|
|
|
xenbus->watch_list = watch_list_create(xenbus->xsh);
|
2019-01-08 15:49:00 +01:00
|
|
|
|
|
|
|
module_call_init(MODULE_INIT_XEN_BACKEND);
|
|
|
|
|
2020-10-01 10:15:00 +02:00
|
|
|
type = xen_backend_get_types(&xenbus->backend_types);
|
|
|
|
xenbus->backend_watch = g_new(XenWatch *, xenbus->backend_types);
|
|
|
|
|
|
|
|
for (i = 0; i < xenbus->backend_types; i++) {
|
|
|
|
char *node = g_strdup_printf("backend/%s", type[i]);
|
|
|
|
|
|
|
|
xenbus->backend_watch[i] =
|
|
|
|
xen_bus_add_watch(xenbus, node, key, xen_bus_backend_changed,
|
|
|
|
&local_err);
|
|
|
|
if (local_err) {
|
|
|
|
/* This need not be treated as a hard error so don't propagate */
|
|
|
|
error_reportf_err(local_err,
|
|
|
|
"failed to set up '%s' enumeration watch: ",
|
|
|
|
type[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
g_free(node);
|
2019-01-08 15:49:00 +01:00
|
|
|
}
|
|
|
|
|
2020-10-01 10:15:00 +02:00
|
|
|
g_free(type);
|
|
|
|
g_free(key);
|
2019-01-08 15:48:49 +01:00
|
|
|
return;
|
|
|
|
|
|
|
|
fail:
|
qdev: Unrealize must not fail
Devices may have component devices and buses.
Device realization may fail. Realization is recursive: a device's
realize() method realizes its components, and device_set_realized()
realizes its buses (which should in turn realize the devices on that
bus, except bus_set_realized() doesn't implement that, yet).
When realization of a component or bus fails, we need to roll back:
unrealize everything we realized so far. If any of these unrealizes
failed, the device would be left in an inconsistent state. Must not
happen.
device_set_realized() lets it happen: it ignores errors in the roll
back code starting at label child_realize_fail.
Since realization is recursive, unrealization must be recursive, too.
But how could a partly failed unrealize be rolled back? We'd have to
re-realize, which can fail. This design is fundamentally broken.
device_set_realized() does not roll back at all. Instead, it keeps
unrealizing, ignoring further errors.
It can screw up even for a device with no buses: if the lone
dc->unrealize() fails, it still unregisters vmstate, and calls
listeners' unrealize() callback.
bus_set_realized() does not roll back either. Instead, it stops
unrealizing.
Fortunately, no unrealize method can fail, as we'll see below.
To fix the design error, drop parameter @errp from all the unrealize
methods.
Any unrealize method that uses @errp now needs an update. This leads
us to unrealize() methods that can fail. Merely passing it to another
unrealize method cannot cause failure, though. Here are the ones that
do other things with @errp:
* virtio_serial_device_unrealize()
Fails when qbus_set_hotplug_handler() fails, but still does all the
other work. On failure, the device would stay realized with its
resources completely gone. Oops. Can't happen, because
qbus_set_hotplug_handler() can't actually fail here. Pass
&error_abort to qbus_set_hotplug_handler() instead.
* hw/ppc/spapr_drc.c's unrealize()
Fails when object_property_del() fails, but all the other work is
already done. On failure, the device would stay realized with its
vmstate registration gone. Oops. Can't happen, because
object_property_del() can't actually fail here. Pass &error_abort
to object_property_del() instead.
* spapr_phb_unrealize()
Fails and bails out when remove_drcs() fails, but other work is
already done. On failure, the device would stay realized with some
of its resources gone. Oops. remove_drcs() fails only when
chassis_from_bus()'s object_property_get_uint() fails, and it can't
here. Pass &error_abort to remove_drcs() instead.
Therefore, no unrealize method can fail before this patch.
device_set_realized()'s recursive unrealization via bus uses
object_property_set_bool(). Can't drop @errp there, so pass
&error_abort.
We similarly unrealize with object_property_set_bool() elsewhere,
always ignoring errors. Pass &error_abort instead.
Several unrealize methods no longer handle errors from other unrealize
methods: virtio_9p_device_unrealize(),
virtio_input_device_unrealize(), scsi_qdev_unrealize(), ...
Much of the deleted error handling looks wrong anyway.
One unrealize methods no longer ignore such errors:
usb_ehci_pci_exit().
Several realize methods no longer ignore errors when rolling back:
v9fs_device_realize_common(), pci_qdev_unrealize(),
spapr_phb_realize(), usb_qdev_realize(), vfio_ccw_realize(),
virtio_device_realize().
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200505152926.18877-17-armbru@redhat.com>
2020-05-05 17:29:24 +02:00
|
|
|
xen_bus_unrealize(bus);
|
2020-10-01 10:15:00 +02:00
|
|
|
g_free(key);
|
2019-01-08 15:48:47 +01:00
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:59 +01:00
|
|
|
static void xen_bus_unplug_request(HotplugHandler *hotplug,
|
|
|
|
DeviceState *dev,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
XenDevice *xendev = XEN_DEVICE(dev);
|
|
|
|
|
|
|
|
xen_device_unplug(xendev, errp);
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:47 +01:00
|
|
|
static void xen_bus_class_init(ObjectClass *class, void *data)
|
|
|
|
{
|
|
|
|
BusClass *bus_class = BUS_CLASS(class);
|
2019-01-08 15:48:59 +01:00
|
|
|
HotplugHandlerClass *hotplug_class = HOTPLUG_HANDLER_CLASS(class);
|
2019-01-08 15:48:47 +01:00
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
bus_class->print_dev = xen_bus_print_dev;
|
|
|
|
bus_class->get_dev_path = xen_bus_get_dev_path;
|
2019-01-08 15:48:47 +01:00
|
|
|
bus_class->realize = xen_bus_realize;
|
|
|
|
bus_class->unrealize = xen_bus_unrealize;
|
2019-01-08 15:48:59 +01:00
|
|
|
|
|
|
|
hotplug_class->unplug_request = xen_bus_unplug_request;
|
2019-01-08 15:48:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo xen_bus_type_info = {
|
|
|
|
.name = TYPE_XEN_BUS,
|
|
|
|
.parent = TYPE_BUS,
|
|
|
|
.instance_size = sizeof(XenBus),
|
|
|
|
.class_size = sizeof(XenBusClass),
|
|
|
|
.class_init = xen_bus_class_init,
|
|
|
|
.interfaces = (InterfaceInfo[]) {
|
|
|
|
{ TYPE_HOTPLUG_HANDLER },
|
|
|
|
{ }
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2019-01-08 15:48:59 +01:00
|
|
|
void xen_device_backend_printf(XenDevice *xendev, const char *key,
|
|
|
|
const char *fmt, ...)
|
2019-01-08 15:48:49 +01:00
|
|
|
{
|
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
Error *local_err = NULL;
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
g_assert(xenbus->xsh);
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
xs_node_vprintf(xenbus->xsh, XBT_NULL, xendev->backend_path, key,
|
|
|
|
&local_err, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:50 +01:00
|
|
|
static int xen_device_backend_scanf(XenDevice *xendev, const char *key,
|
|
|
|
const char *fmt, ...)
|
|
|
|
{
|
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
va_list ap;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
g_assert(xenbus->xsh);
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
rc = xs_node_vscanf(xenbus->xsh, XBT_NULL, xendev->backend_path, key,
|
|
|
|
NULL, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
void xen_device_backend_set_state(XenDevice *xendev,
|
|
|
|
enum xenbus_state state)
|
2019-01-08 15:48:49 +01:00
|
|
|
{
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
|
|
|
|
if (xendev->backend_state == state) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_xen_device_backend_state(type, xendev->name,
|
|
|
|
xs_strstate(state));
|
|
|
|
|
|
|
|
xendev->backend_state = state;
|
|
|
|
xen_device_backend_printf(xendev, "state", "%u", state);
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:50 +01:00
|
|
|
enum xenbus_state xen_device_backend_get_state(XenDevice *xendev)
|
|
|
|
{
|
|
|
|
return xendev->backend_state;
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:59 +01:00
|
|
|
static void xen_device_backend_set_online(XenDevice *xendev, bool online)
|
|
|
|
{
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
|
|
|
|
if (xendev->backend_online == online) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_xen_device_backend_online(type, xendev->name, online);
|
|
|
|
|
|
|
|
xendev->backend_online = online;
|
|
|
|
xen_device_backend_printf(xendev, "online", "%u", online);
|
|
|
|
}
|
|
|
|
|
2019-08-23 12:15:33 +02:00
|
|
|
/*
|
|
|
|
* Tell from the state whether the frontend is likely alive,
|
|
|
|
* i.e. it will react to a change of state of the backend.
|
|
|
|
*/
|
2019-09-13 10:21:58 +02:00
|
|
|
static bool xen_device_frontend_is_active(XenDevice *xendev)
|
2019-08-23 12:15:33 +02:00
|
|
|
{
|
2019-09-13 10:21:58 +02:00
|
|
|
switch (xendev->frontend_state) {
|
2019-08-23 12:15:33 +02:00
|
|
|
case XenbusStateInitWait:
|
|
|
|
case XenbusStateInitialised:
|
|
|
|
case XenbusStateConnected:
|
|
|
|
case XenbusStateClosing:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:59 +01:00
|
|
|
static void xen_device_backend_changed(void *opaque)
|
|
|
|
{
|
|
|
|
XenDevice *xendev = opaque;
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
enum xenbus_state state;
|
|
|
|
unsigned int online;
|
|
|
|
|
|
|
|
trace_xen_device_backend_changed(type, xendev->name);
|
|
|
|
|
|
|
|
if (xen_device_backend_scanf(xendev, "state", "%u", &state) != 1) {
|
|
|
|
state = XenbusStateUnknown;
|
|
|
|
}
|
|
|
|
|
|
|
|
xen_device_backend_set_state(xendev, state);
|
|
|
|
|
|
|
|
if (xen_device_backend_scanf(xendev, "online", "%u", &online) != 1) {
|
|
|
|
online = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
xen_device_backend_set_online(xendev, !!online);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the toolstack (or unplug request callback) has set the backend
|
2019-08-23 12:15:33 +02:00
|
|
|
* state to Closing, but there is no active frontend then set the
|
|
|
|
* backend state to Closed.
|
2019-01-08 15:48:59 +01:00
|
|
|
*/
|
2019-09-13 10:21:58 +02:00
|
|
|
if (state == XenbusStateClosing &&
|
|
|
|
!xen_device_frontend_is_active(xendev)) {
|
2019-01-08 15:48:59 +01:00
|
|
|
xen_device_backend_set_state(xendev, XenbusStateClosed);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2019-01-22 16:53:46 +01:00
|
|
|
* If a backend is still 'online' then we should leave it alone but,
|
2019-09-13 10:21:58 +02:00
|
|
|
* if a backend is not 'online', then the device is a candidate
|
|
|
|
* for destruction. Hence add it to the 'inactive' list to be cleaned
|
|
|
|
* by xen_bus_cleanup().
|
2019-01-08 15:48:59 +01:00
|
|
|
*/
|
2019-09-13 10:21:58 +02:00
|
|
|
if (!online &&
|
|
|
|
(state == XenbusStateClosed || state == XenbusStateInitialising ||
|
|
|
|
state == XenbusStateInitWait || state == XenbusStateUnknown) &&
|
|
|
|
!xendev->inactive) {
|
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
2019-01-08 15:49:00 +01:00
|
|
|
|
2019-09-13 10:21:58 +02:00
|
|
|
xendev->inactive = true;
|
|
|
|
QLIST_INSERT_HEAD(&xenbus->inactive_devices, xendev, list);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Re-write the state to cause a XenBus backend_watch notification,
|
|
|
|
* resulting in a call to xen_bus_cleanup().
|
|
|
|
*/
|
|
|
|
xen_device_backend_printf(xendev, "state", "%u", state);
|
2019-01-08 15:48:59 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:57 +02:00
|
|
|
static XenWatch *xen_device_add_watch(XenDevice *xendev, const char *node,
|
|
|
|
const char *key,
|
|
|
|
XenWatchHandler handler,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
|
|
|
|
trace_xen_device_add_watch(type, xendev->name, node, key);
|
|
|
|
|
|
|
|
return watch_list_add(xendev->watch_list, node, key, handler, xendev,
|
|
|
|
errp);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_device_remove_watch(XenDevice *xendev, XenWatch *watch,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
|
|
|
|
trace_xen_device_remove_watch(type, xendev->name, watch->node,
|
|
|
|
watch->key);
|
|
|
|
|
|
|
|
watch_list_remove(xendev->watch_list, watch, errp);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
static void xen_device_backend_create(XenDevice *xendev, Error **errp)
|
|
|
|
{
|
2020-07-07 18:50:37 +02:00
|
|
|
ERRP_GUARD();
|
2019-01-08 15:48:49 +01:00
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
struct xs_permissions perms[2];
|
|
|
|
|
|
|
|
xendev->backend_path = xen_device_get_backend_path(xendev);
|
|
|
|
|
|
|
|
perms[0].id = xenbus->backend_id;
|
|
|
|
perms[0].perms = XS_PERM_NONE;
|
|
|
|
perms[1].id = xendev->frontend_id;
|
|
|
|
perms[1].perms = XS_PERM_READ;
|
|
|
|
|
|
|
|
g_assert(xenbus->xsh);
|
|
|
|
|
|
|
|
xs_node_create(xenbus->xsh, XBT_NULL, xendev->backend_path, perms,
|
2020-07-07 18:50:37 +02:00
|
|
|
ARRAY_SIZE(perms), errp);
|
|
|
|
if (*errp) {
|
|
|
|
error_prepend(errp, "failed to create backend: ");
|
2019-01-08 15:48:59 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
xendev->backend_state_watch =
|
2019-09-13 10:21:57 +02:00
|
|
|
xen_device_add_watch(xendev, xendev->backend_path,
|
|
|
|
"state", xen_device_backend_changed,
|
2020-07-07 18:50:37 +02:00
|
|
|
errp);
|
|
|
|
if (*errp) {
|
|
|
|
error_prepend(errp, "failed to watch backend state: ");
|
2019-01-08 15:48:59 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
xendev->backend_online_watch =
|
2019-09-13 10:21:57 +02:00
|
|
|
xen_device_add_watch(xendev, xendev->backend_path,
|
|
|
|
"online", xen_device_backend_changed,
|
2020-07-07 18:50:37 +02:00
|
|
|
errp);
|
|
|
|
if (*errp) {
|
|
|
|
error_prepend(errp, "failed to watch backend online: ");
|
2019-01-08 15:48:59 +01:00
|
|
|
return;
|
2019-01-08 15:48:49 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_device_backend_destroy(XenDevice *xendev)
|
|
|
|
{
|
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
Error *local_err = NULL;
|
|
|
|
|
2019-01-08 15:48:59 +01:00
|
|
|
if (xendev->backend_online_watch) {
|
2019-09-13 10:21:57 +02:00
|
|
|
xen_device_remove_watch(xendev, xendev->backend_online_watch, NULL);
|
2019-01-08 15:48:59 +01:00
|
|
|
xendev->backend_online_watch = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (xendev->backend_state_watch) {
|
2019-09-13 10:21:57 +02:00
|
|
|
xen_device_remove_watch(xendev, xendev->backend_state_watch, NULL);
|
2019-01-08 15:48:59 +01:00
|
|
|
xendev->backend_state_watch = NULL;
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
if (!xendev->backend_path) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
g_assert(xenbus->xsh);
|
|
|
|
|
|
|
|
xs_node_destroy(xenbus->xsh, XBT_NULL, xendev->backend_path,
|
|
|
|
&local_err);
|
|
|
|
g_free(xendev->backend_path);
|
|
|
|
xendev->backend_path = NULL;
|
|
|
|
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:59 +01:00
|
|
|
void xen_device_frontend_printf(XenDevice *xendev, const char *key,
|
|
|
|
const char *fmt, ...)
|
2019-01-08 15:48:49 +01:00
|
|
|
{
|
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
Error *local_err = NULL;
|
|
|
|
va_list ap;
|
|
|
|
|
|
|
|
g_assert(xenbus->xsh);
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
xs_node_vprintf(xenbus->xsh, XBT_NULL, xendev->frontend_path, key,
|
|
|
|
&local_err, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:59 +01:00
|
|
|
int xen_device_frontend_scanf(XenDevice *xendev, const char *key,
|
|
|
|
const char *fmt, ...)
|
2019-01-08 15:48:50 +01:00
|
|
|
{
|
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
va_list ap;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
g_assert(xenbus->xsh);
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
rc = xs_node_vscanf(xenbus->xsh, XBT_NULL, xendev->frontend_path, key,
|
|
|
|
NULL, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
static void xen_device_frontend_set_state(XenDevice *xendev,
|
2019-08-23 12:15:34 +02:00
|
|
|
enum xenbus_state state,
|
|
|
|
bool publish)
|
2019-01-08 15:48:49 +01:00
|
|
|
{
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
|
|
|
|
if (xendev->frontend_state == state) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_xen_device_frontend_state(type, xendev->name,
|
|
|
|
xs_strstate(state));
|
|
|
|
|
|
|
|
xendev->frontend_state = state;
|
2019-08-23 12:15:34 +02:00
|
|
|
if (publish) {
|
|
|
|
xen_device_frontend_printf(xendev, "state", "%u", state);
|
|
|
|
}
|
2019-01-08 15:48:49 +01:00
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:50 +01:00
|
|
|
static void xen_device_frontend_changed(void *opaque)
|
|
|
|
{
|
|
|
|
XenDevice *xendev = opaque;
|
|
|
|
XenDeviceClass *xendev_class = XEN_DEVICE_GET_CLASS(xendev);
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
enum xenbus_state state;
|
|
|
|
|
|
|
|
trace_xen_device_frontend_changed(type, xendev->name);
|
|
|
|
|
|
|
|
if (xen_device_frontend_scanf(xendev, "state", "%u", &state) != 1) {
|
|
|
|
state = XenbusStateUnknown;
|
|
|
|
}
|
|
|
|
|
2019-08-23 12:15:34 +02:00
|
|
|
xen_device_frontend_set_state(xendev, state, false);
|
2019-01-08 15:48:50 +01:00
|
|
|
|
2019-01-22 16:53:46 +01:00
|
|
|
if (state == XenbusStateInitialising &&
|
|
|
|
xendev->backend_state == XenbusStateClosed &&
|
|
|
|
xendev->backend_online) {
|
|
|
|
/*
|
|
|
|
* The frontend is re-initializing so switch back to
|
|
|
|
* InitWait.
|
|
|
|
*/
|
|
|
|
xen_device_backend_set_state(xendev, XenbusStateInitWait);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:50 +01:00
|
|
|
if (xendev_class->frontend_changed) {
|
|
|
|
Error *local_err = NULL;
|
|
|
|
|
|
|
|
xendev_class->frontend_changed(xendev, state, &local_err);
|
|
|
|
|
|
|
|
if (local_err) {
|
|
|
|
error_reportf_err(local_err, "frontend change error: ");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-18 13:57:44 +02:00
|
|
|
static bool xen_device_frontend_exists(XenDevice *xendev)
|
|
|
|
{
|
|
|
|
enum xenbus_state state;
|
|
|
|
|
|
|
|
return (xen_device_frontend_scanf(xendev, "state", "%u", &state) == 1);
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
static void xen_device_frontend_create(XenDevice *xendev, Error **errp)
|
|
|
|
{
|
2020-07-07 18:50:37 +02:00
|
|
|
ERRP_GUARD();
|
2019-01-08 15:48:49 +01:00
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
struct xs_permissions perms[2];
|
|
|
|
|
|
|
|
xendev->frontend_path = xen_device_get_frontend_path(xendev);
|
|
|
|
|
2019-09-18 13:57:44 +02:00
|
|
|
/*
|
|
|
|
* The frontend area may have already been created by a legacy
|
|
|
|
* toolstack.
|
|
|
|
*/
|
|
|
|
if (!xen_device_frontend_exists(xendev)) {
|
|
|
|
perms[0].id = xendev->frontend_id;
|
|
|
|
perms[0].perms = XS_PERM_NONE;
|
|
|
|
perms[1].id = xenbus->backend_id;
|
|
|
|
perms[1].perms = XS_PERM_READ | XS_PERM_WRITE;
|
2019-01-08 15:48:49 +01:00
|
|
|
|
2019-09-18 13:57:44 +02:00
|
|
|
g_assert(xenbus->xsh);
|
2019-01-08 15:48:49 +01:00
|
|
|
|
2019-09-18 13:57:44 +02:00
|
|
|
xs_node_create(xenbus->xsh, XBT_NULL, xendev->frontend_path, perms,
|
2020-07-07 18:50:37 +02:00
|
|
|
ARRAY_SIZE(perms), errp);
|
|
|
|
if (*errp) {
|
|
|
|
error_prepend(errp, "failed to create frontend: ");
|
2019-09-18 13:57:44 +02:00
|
|
|
return;
|
|
|
|
}
|
2019-01-08 15:48:50 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
xendev->frontend_state_watch =
|
2019-09-13 10:21:57 +02:00
|
|
|
xen_device_add_watch(xendev, xendev->frontend_path, "state",
|
2020-07-07 18:50:37 +02:00
|
|
|
xen_device_frontend_changed, errp);
|
|
|
|
if (*errp) {
|
|
|
|
error_prepend(errp, "failed to watch frontend state: ");
|
2019-01-08 15:48:49 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_device_frontend_destroy(XenDevice *xendev)
|
|
|
|
{
|
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
|
|
|
Error *local_err = NULL;
|
|
|
|
|
2019-01-08 15:48:50 +01:00
|
|
|
if (xendev->frontend_state_watch) {
|
2019-09-13 10:21:57 +02:00
|
|
|
xen_device_remove_watch(xendev, xendev->frontend_state_watch,
|
|
|
|
NULL);
|
2019-01-08 15:48:50 +01:00
|
|
|
xendev->frontend_state_watch = NULL;
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
if (!xendev->frontend_path) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
g_assert(xenbus->xsh);
|
|
|
|
|
|
|
|
xs_node_destroy(xenbus->xsh, XBT_NULL, xendev->frontend_path,
|
|
|
|
&local_err);
|
|
|
|
g_free(xendev->frontend_path);
|
|
|
|
xendev->frontend_path = NULL;
|
|
|
|
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:51 +01:00
|
|
|
void xen_device_set_max_grant_refs(XenDevice *xendev, unsigned int nr_refs,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
if (xengnttab_set_max_grants(xendev->xgth, nr_refs)) {
|
|
|
|
error_setg_errno(errp, errno, "xengnttab_set_max_grants failed");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void *xen_device_map_grant_refs(XenDevice *xendev, uint32_t *refs,
|
|
|
|
unsigned int nr_refs, int prot,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
void *map = xengnttab_map_domain_grant_refs(xendev->xgth, nr_refs,
|
|
|
|
xendev->frontend_id, refs,
|
|
|
|
prot);
|
|
|
|
|
|
|
|
if (!map) {
|
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"xengnttab_map_domain_grant_refs failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
return map;
|
|
|
|
}
|
|
|
|
|
|
|
|
void xen_device_unmap_grant_refs(XenDevice *xendev, void *map,
|
|
|
|
unsigned int nr_refs, Error **errp)
|
|
|
|
{
|
|
|
|
if (xengnttab_unmap(xendev->xgth, map, nr_refs)) {
|
|
|
|
error_setg_errno(errp, errno, "xengnttab_unmap failed");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void compat_copy_grant_refs(XenDevice *xendev, bool to_domain,
|
|
|
|
XenDeviceGrantCopySegment segs[],
|
|
|
|
unsigned int nr_segs, Error **errp)
|
|
|
|
{
|
|
|
|
uint32_t *refs = g_new(uint32_t, nr_segs);
|
|
|
|
int prot = to_domain ? PROT_WRITE : PROT_READ;
|
|
|
|
void *map;
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
for (i = 0; i < nr_segs; i++) {
|
|
|
|
XenDeviceGrantCopySegment *seg = &segs[i];
|
|
|
|
|
|
|
|
refs[i] = to_domain ? seg->dest.foreign.ref :
|
|
|
|
seg->source.foreign.ref;
|
|
|
|
}
|
|
|
|
|
|
|
|
map = xengnttab_map_domain_grant_refs(xendev->xgth, nr_segs,
|
|
|
|
xendev->frontend_id, refs,
|
|
|
|
prot);
|
|
|
|
if (!map) {
|
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"xengnttab_map_domain_grant_refs failed");
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < nr_segs; i++) {
|
|
|
|
XenDeviceGrantCopySegment *seg = &segs[i];
|
|
|
|
void *page = map + (i * XC_PAGE_SIZE);
|
|
|
|
|
|
|
|
if (to_domain) {
|
|
|
|
memcpy(page + seg->dest.foreign.offset, seg->source.virt,
|
|
|
|
seg->len);
|
|
|
|
} else {
|
|
|
|
memcpy(seg->dest.virt, page + seg->source.foreign.offset,
|
|
|
|
seg->len);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (xengnttab_unmap(xendev->xgth, map, nr_segs)) {
|
|
|
|
error_setg_errno(errp, errno, "xengnttab_unmap failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
g_free(refs);
|
|
|
|
}
|
|
|
|
|
|
|
|
void xen_device_copy_grant_refs(XenDevice *xendev, bool to_domain,
|
|
|
|
XenDeviceGrantCopySegment segs[],
|
|
|
|
unsigned int nr_segs, Error **errp)
|
|
|
|
{
|
|
|
|
xengnttab_grant_copy_segment_t *xengnttab_segs;
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
if (!xendev->feature_grant_copy) {
|
|
|
|
compat_copy_grant_refs(xendev, to_domain, segs, nr_segs, errp);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
xengnttab_segs = g_new0(xengnttab_grant_copy_segment_t, nr_segs);
|
|
|
|
|
|
|
|
for (i = 0; i < nr_segs; i++) {
|
|
|
|
XenDeviceGrantCopySegment *seg = &segs[i];
|
|
|
|
xengnttab_grant_copy_segment_t *xengnttab_seg = &xengnttab_segs[i];
|
|
|
|
|
|
|
|
if (to_domain) {
|
|
|
|
xengnttab_seg->flags = GNTCOPY_dest_gref;
|
|
|
|
xengnttab_seg->dest.foreign.domid = xendev->frontend_id;
|
|
|
|
xengnttab_seg->dest.foreign.ref = seg->dest.foreign.ref;
|
|
|
|
xengnttab_seg->dest.foreign.offset = seg->dest.foreign.offset;
|
|
|
|
xengnttab_seg->source.virt = seg->source.virt;
|
|
|
|
} else {
|
|
|
|
xengnttab_seg->flags = GNTCOPY_source_gref;
|
|
|
|
xengnttab_seg->source.foreign.domid = xendev->frontend_id;
|
|
|
|
xengnttab_seg->source.foreign.ref = seg->source.foreign.ref;
|
|
|
|
xengnttab_seg->source.foreign.offset =
|
|
|
|
seg->source.foreign.offset;
|
|
|
|
xengnttab_seg->dest.virt = seg->dest.virt;
|
|
|
|
}
|
|
|
|
|
|
|
|
xengnttab_seg->len = seg->len;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (xengnttab_grant_copy(xendev->xgth, nr_segs, xengnttab_segs)) {
|
|
|
|
error_setg_errno(errp, errno, "xengnttab_grant_copy failed");
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < nr_segs; i++) {
|
|
|
|
xengnttab_grant_copy_segment_t *xengnttab_seg = &xengnttab_segs[i];
|
|
|
|
|
|
|
|
if (xengnttab_seg->status != GNTST_okay) {
|
|
|
|
error_setg(errp, "xengnttab_grant_copy seg[%u] failed", i);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
g_free(xengnttab_segs);
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:52 +01:00
|
|
|
struct XenEventChannel {
|
2019-04-08 17:16:15 +02:00
|
|
|
QLIST_ENTRY(XenEventChannel) list;
|
2019-04-08 17:16:16 +02:00
|
|
|
AioContext *ctx;
|
2019-04-08 17:16:15 +02:00
|
|
|
xenevtchn_handle *xeh;
|
2019-01-08 15:48:52 +01:00
|
|
|
evtchn_port_t local_port;
|
|
|
|
XenEventHandler handler;
|
|
|
|
void *opaque;
|
|
|
|
};
|
|
|
|
|
2019-04-08 17:16:17 +02:00
|
|
|
static bool xen_device_poll(void *opaque)
|
|
|
|
{
|
|
|
|
XenEventChannel *channel = opaque;
|
|
|
|
|
|
|
|
return channel->handler(channel->opaque);
|
|
|
|
}
|
|
|
|
|
2019-04-08 17:16:15 +02:00
|
|
|
static void xen_device_event(void *opaque)
|
2019-01-08 15:48:52 +01:00
|
|
|
{
|
2019-04-08 17:16:15 +02:00
|
|
|
XenEventChannel *channel = opaque;
|
|
|
|
unsigned long port = xenevtchn_pending(channel->xeh);
|
2019-01-08 15:48:52 +01:00
|
|
|
|
|
|
|
if (port == channel->local_port) {
|
2019-04-08 17:16:17 +02:00
|
|
|
xen_device_poll(channel);
|
2019-04-08 17:16:15 +02:00
|
|
|
|
|
|
|
xenevtchn_unmask(channel->xeh, port);
|
2019-01-08 15:48:52 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-16 15:34:51 +01:00
|
|
|
void xen_device_set_event_channel_context(XenDevice *xendev,
|
|
|
|
XenEventChannel *channel,
|
|
|
|
AioContext *ctx,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
if (!channel) {
|
|
|
|
error_setg(errp, "bad channel");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (channel->ctx)
|
|
|
|
aio_set_fd_handler(channel->ctx, xenevtchn_fd(channel->xeh), true,
|
|
|
|
NULL, NULL, NULL, NULL);
|
|
|
|
|
|
|
|
channel->ctx = ctx;
|
|
|
|
aio_set_fd_handler(channel->ctx, xenevtchn_fd(channel->xeh), true,
|
|
|
|
xen_device_event, NULL, xen_device_poll, channel);
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:52 +01:00
|
|
|
XenEventChannel *xen_device_bind_event_channel(XenDevice *xendev,
|
|
|
|
unsigned int port,
|
|
|
|
XenEventHandler handler,
|
|
|
|
void *opaque, Error **errp)
|
|
|
|
{
|
|
|
|
XenEventChannel *channel = g_new0(XenEventChannel, 1);
|
|
|
|
xenevtchn_port_or_error_t local_port;
|
|
|
|
|
2019-04-08 17:16:15 +02:00
|
|
|
channel->xeh = xenevtchn_open(NULL, 0);
|
|
|
|
if (!channel->xeh) {
|
|
|
|
error_setg_errno(errp, errno, "failed xenevtchn_open");
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
local_port = xenevtchn_bind_interdomain(channel->xeh,
|
2019-01-08 15:48:52 +01:00
|
|
|
xendev->frontend_id,
|
|
|
|
port);
|
|
|
|
if (local_port < 0) {
|
|
|
|
error_setg_errno(errp, errno, "xenevtchn_bind_interdomain failed");
|
2019-04-08 17:16:15 +02:00
|
|
|
goto fail;
|
2019-01-08 15:48:52 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
channel->local_port = local_port;
|
|
|
|
channel->handler = handler;
|
|
|
|
channel->opaque = opaque;
|
|
|
|
|
2019-12-16 15:34:51 +01:00
|
|
|
/* Only reason for failure is a NULL channel */
|
|
|
|
xen_device_set_event_channel_context(xendev, channel,
|
|
|
|
qemu_get_aio_context(),
|
|
|
|
&error_abort);
|
2019-04-08 17:16:15 +02:00
|
|
|
|
|
|
|
QLIST_INSERT_HEAD(&xendev->event_channels, channel, list);
|
2019-01-08 15:48:52 +01:00
|
|
|
|
|
|
|
return channel;
|
2019-04-08 17:16:15 +02:00
|
|
|
|
|
|
|
fail:
|
|
|
|
if (channel->xeh) {
|
|
|
|
xenevtchn_close(channel->xeh);
|
|
|
|
}
|
|
|
|
|
|
|
|
g_free(channel);
|
|
|
|
|
|
|
|
return NULL;
|
2019-01-08 15:48:52 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void xen_device_notify_event_channel(XenDevice *xendev,
|
|
|
|
XenEventChannel *channel,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
if (!channel) {
|
|
|
|
error_setg(errp, "bad channel");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-08 17:16:15 +02:00
|
|
|
if (xenevtchn_notify(channel->xeh, channel->local_port) < 0) {
|
2019-01-08 15:48:52 +01:00
|
|
|
error_setg_errno(errp, errno, "xenevtchn_notify failed");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void xen_device_unbind_event_channel(XenDevice *xendev,
|
|
|
|
XenEventChannel *channel,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
if (!channel) {
|
|
|
|
error_setg(errp, "bad channel");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-04-08 17:16:15 +02:00
|
|
|
QLIST_REMOVE(channel, list);
|
2019-01-08 15:48:52 +01:00
|
|
|
|
2019-04-08 17:16:16 +02:00
|
|
|
aio_set_fd_handler(channel->ctx, xenevtchn_fd(channel->xeh), true,
|
|
|
|
NULL, NULL, NULL, NULL);
|
2019-04-08 17:16:15 +02:00
|
|
|
|
|
|
|
if (xenevtchn_unbind(channel->xeh, channel->local_port) < 0) {
|
2019-01-08 15:48:52 +01:00
|
|
|
error_setg_errno(errp, errno, "xenevtchn_unbind failed");
|
|
|
|
}
|
|
|
|
|
2019-04-08 17:16:15 +02:00
|
|
|
xenevtchn_close(channel->xeh);
|
2019-01-08 15:48:52 +01:00
|
|
|
g_free(channel);
|
|
|
|
}
|
|
|
|
|
qdev: Unrealize must not fail
Devices may have component devices and buses.
Device realization may fail. Realization is recursive: a device's
realize() method realizes its components, and device_set_realized()
realizes its buses (which should in turn realize the devices on that
bus, except bus_set_realized() doesn't implement that, yet).
When realization of a component or bus fails, we need to roll back:
unrealize everything we realized so far. If any of these unrealizes
failed, the device would be left in an inconsistent state. Must not
happen.
device_set_realized() lets it happen: it ignores errors in the roll
back code starting at label child_realize_fail.
Since realization is recursive, unrealization must be recursive, too.
But how could a partly failed unrealize be rolled back? We'd have to
re-realize, which can fail. This design is fundamentally broken.
device_set_realized() does not roll back at all. Instead, it keeps
unrealizing, ignoring further errors.
It can screw up even for a device with no buses: if the lone
dc->unrealize() fails, it still unregisters vmstate, and calls
listeners' unrealize() callback.
bus_set_realized() does not roll back either. Instead, it stops
unrealizing.
Fortunately, no unrealize method can fail, as we'll see below.
To fix the design error, drop parameter @errp from all the unrealize
methods.
Any unrealize method that uses @errp now needs an update. This leads
us to unrealize() methods that can fail. Merely passing it to another
unrealize method cannot cause failure, though. Here are the ones that
do other things with @errp:
* virtio_serial_device_unrealize()
Fails when qbus_set_hotplug_handler() fails, but still does all the
other work. On failure, the device would stay realized with its
resources completely gone. Oops. Can't happen, because
qbus_set_hotplug_handler() can't actually fail here. Pass
&error_abort to qbus_set_hotplug_handler() instead.
* hw/ppc/spapr_drc.c's unrealize()
Fails when object_property_del() fails, but all the other work is
already done. On failure, the device would stay realized with its
vmstate registration gone. Oops. Can't happen, because
object_property_del() can't actually fail here. Pass &error_abort
to object_property_del() instead.
* spapr_phb_unrealize()
Fails and bails out when remove_drcs() fails, but other work is
already done. On failure, the device would stay realized with some
of its resources gone. Oops. remove_drcs() fails only when
chassis_from_bus()'s object_property_get_uint() fails, and it can't
here. Pass &error_abort to remove_drcs() instead.
Therefore, no unrealize method can fail before this patch.
device_set_realized()'s recursive unrealization via bus uses
object_property_set_bool(). Can't drop @errp there, so pass
&error_abort.
We similarly unrealize with object_property_set_bool() elsewhere,
always ignoring errors. Pass &error_abort instead.
Several unrealize methods no longer handle errors from other unrealize
methods: virtio_9p_device_unrealize(),
virtio_input_device_unrealize(), scsi_qdev_unrealize(), ...
Much of the deleted error handling looks wrong anyway.
One unrealize methods no longer ignore such errors:
usb_ehci_pci_exit().
Several realize methods no longer ignore errors when rolling back:
v9fs_device_realize_common(), pci_qdev_unrealize(),
spapr_phb_realize(), usb_qdev_realize(), vfio_ccw_realize(),
virtio_device_realize().
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200505152926.18877-17-armbru@redhat.com>
2020-05-05 17:29:24 +02:00
|
|
|
static void xen_device_unrealize(DeviceState *dev)
|
2019-01-08 15:48:47 +01:00
|
|
|
{
|
|
|
|
XenDevice *xendev = XEN_DEVICE(dev);
|
|
|
|
XenDeviceClass *xendev_class = XEN_DEVICE_GET_CLASS(xendev);
|
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
2019-04-08 17:16:15 +02:00
|
|
|
XenEventChannel *channel, *next;
|
2019-01-08 15:48:47 +01:00
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
if (!xendev->name) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_xen_device_unrealize(type, xendev->name);
|
|
|
|
|
|
|
|
if (xendev->exit.notify) {
|
|
|
|
qemu_remove_exit_notifier(&xendev->exit);
|
|
|
|
xendev->exit.notify = NULL;
|
|
|
|
}
|
2019-01-08 15:48:47 +01:00
|
|
|
|
|
|
|
if (xendev_class->unrealize) {
|
qdev: Unrealize must not fail
Devices may have component devices and buses.
Device realization may fail. Realization is recursive: a device's
realize() method realizes its components, and device_set_realized()
realizes its buses (which should in turn realize the devices on that
bus, except bus_set_realized() doesn't implement that, yet).
When realization of a component or bus fails, we need to roll back:
unrealize everything we realized so far. If any of these unrealizes
failed, the device would be left in an inconsistent state. Must not
happen.
device_set_realized() lets it happen: it ignores errors in the roll
back code starting at label child_realize_fail.
Since realization is recursive, unrealization must be recursive, too.
But how could a partly failed unrealize be rolled back? We'd have to
re-realize, which can fail. This design is fundamentally broken.
device_set_realized() does not roll back at all. Instead, it keeps
unrealizing, ignoring further errors.
It can screw up even for a device with no buses: if the lone
dc->unrealize() fails, it still unregisters vmstate, and calls
listeners' unrealize() callback.
bus_set_realized() does not roll back either. Instead, it stops
unrealizing.
Fortunately, no unrealize method can fail, as we'll see below.
To fix the design error, drop parameter @errp from all the unrealize
methods.
Any unrealize method that uses @errp now needs an update. This leads
us to unrealize() methods that can fail. Merely passing it to another
unrealize method cannot cause failure, though. Here are the ones that
do other things with @errp:
* virtio_serial_device_unrealize()
Fails when qbus_set_hotplug_handler() fails, but still does all the
other work. On failure, the device would stay realized with its
resources completely gone. Oops. Can't happen, because
qbus_set_hotplug_handler() can't actually fail here. Pass
&error_abort to qbus_set_hotplug_handler() instead.
* hw/ppc/spapr_drc.c's unrealize()
Fails when object_property_del() fails, but all the other work is
already done. On failure, the device would stay realized with its
vmstate registration gone. Oops. Can't happen, because
object_property_del() can't actually fail here. Pass &error_abort
to object_property_del() instead.
* spapr_phb_unrealize()
Fails and bails out when remove_drcs() fails, but other work is
already done. On failure, the device would stay realized with some
of its resources gone. Oops. remove_drcs() fails only when
chassis_from_bus()'s object_property_get_uint() fails, and it can't
here. Pass &error_abort to remove_drcs() instead.
Therefore, no unrealize method can fail before this patch.
device_set_realized()'s recursive unrealization via bus uses
object_property_set_bool(). Can't drop @errp there, so pass
&error_abort.
We similarly unrealize with object_property_set_bool() elsewhere,
always ignoring errors. Pass &error_abort instead.
Several unrealize methods no longer handle errors from other unrealize
methods: virtio_9p_device_unrealize(),
virtio_input_device_unrealize(), scsi_qdev_unrealize(), ...
Much of the deleted error handling looks wrong anyway.
One unrealize methods no longer ignore such errors:
usb_ehci_pci_exit().
Several realize methods no longer ignore errors when rolling back:
v9fs_device_realize_common(), pci_qdev_unrealize(),
spapr_phb_realize(), usb_qdev_realize(), vfio_ccw_realize(),
virtio_device_realize().
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200505152926.18877-17-armbru@redhat.com>
2020-05-05 17:29:24 +02:00
|
|
|
xendev_class->unrealize(xendev);
|
2019-01-08 15:48:47 +01:00
|
|
|
}
|
2019-01-08 15:48:49 +01:00
|
|
|
|
2019-04-08 17:16:15 +02:00
|
|
|
/* Make sure all event channels are cleaned up */
|
|
|
|
QLIST_FOREACH_SAFE(channel, &xendev->event_channels, list, next) {
|
|
|
|
xen_device_unbind_event_channel(xendev, channel, NULL);
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
xen_device_frontend_destroy(xendev);
|
|
|
|
xen_device_backend_destroy(xendev);
|
|
|
|
|
2019-01-08 15:48:51 +01:00
|
|
|
if (xendev->xgth) {
|
|
|
|
xengnttab_close(xendev->xgth);
|
|
|
|
xendev->xgth = NULL;
|
|
|
|
}
|
|
|
|
|
2019-09-13 10:21:57 +02:00
|
|
|
if (xendev->watch_list) {
|
|
|
|
watch_list_destroy(xendev->watch_list);
|
|
|
|
xendev->watch_list = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (xendev->xsh) {
|
|
|
|
xs_close(xendev->xsh);
|
|
|
|
xendev->xsh = NULL;
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
g_free(xendev->name);
|
|
|
|
xendev->name = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_device_exit(Notifier *n, void *data)
|
|
|
|
{
|
|
|
|
XenDevice *xendev = container_of(n, XenDevice, exit);
|
|
|
|
|
qdev: Unrealize must not fail
Devices may have component devices and buses.
Device realization may fail. Realization is recursive: a device's
realize() method realizes its components, and device_set_realized()
realizes its buses (which should in turn realize the devices on that
bus, except bus_set_realized() doesn't implement that, yet).
When realization of a component or bus fails, we need to roll back:
unrealize everything we realized so far. If any of these unrealizes
failed, the device would be left in an inconsistent state. Must not
happen.
device_set_realized() lets it happen: it ignores errors in the roll
back code starting at label child_realize_fail.
Since realization is recursive, unrealization must be recursive, too.
But how could a partly failed unrealize be rolled back? We'd have to
re-realize, which can fail. This design is fundamentally broken.
device_set_realized() does not roll back at all. Instead, it keeps
unrealizing, ignoring further errors.
It can screw up even for a device with no buses: if the lone
dc->unrealize() fails, it still unregisters vmstate, and calls
listeners' unrealize() callback.
bus_set_realized() does not roll back either. Instead, it stops
unrealizing.
Fortunately, no unrealize method can fail, as we'll see below.
To fix the design error, drop parameter @errp from all the unrealize
methods.
Any unrealize method that uses @errp now needs an update. This leads
us to unrealize() methods that can fail. Merely passing it to another
unrealize method cannot cause failure, though. Here are the ones that
do other things with @errp:
* virtio_serial_device_unrealize()
Fails when qbus_set_hotplug_handler() fails, but still does all the
other work. On failure, the device would stay realized with its
resources completely gone. Oops. Can't happen, because
qbus_set_hotplug_handler() can't actually fail here. Pass
&error_abort to qbus_set_hotplug_handler() instead.
* hw/ppc/spapr_drc.c's unrealize()
Fails when object_property_del() fails, but all the other work is
already done. On failure, the device would stay realized with its
vmstate registration gone. Oops. Can't happen, because
object_property_del() can't actually fail here. Pass &error_abort
to object_property_del() instead.
* spapr_phb_unrealize()
Fails and bails out when remove_drcs() fails, but other work is
already done. On failure, the device would stay realized with some
of its resources gone. Oops. remove_drcs() fails only when
chassis_from_bus()'s object_property_get_uint() fails, and it can't
here. Pass &error_abort to remove_drcs() instead.
Therefore, no unrealize method can fail before this patch.
device_set_realized()'s recursive unrealization via bus uses
object_property_set_bool(). Can't drop @errp there, so pass
&error_abort.
We similarly unrealize with object_property_set_bool() elsewhere,
always ignoring errors. Pass &error_abort instead.
Several unrealize methods no longer handle errors from other unrealize
methods: virtio_9p_device_unrealize(),
virtio_input_device_unrealize(), scsi_qdev_unrealize(), ...
Much of the deleted error handling looks wrong anyway.
One unrealize methods no longer ignore such errors:
usb_ehci_pci_exit().
Several realize methods no longer ignore errors when rolling back:
v9fs_device_realize_common(), pci_qdev_unrealize(),
spapr_phb_realize(), usb_qdev_realize(), vfio_ccw_realize(),
virtio_device_realize().
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200505152926.18877-17-armbru@redhat.com>
2020-05-05 17:29:24 +02:00
|
|
|
xen_device_unrealize(DEVICE(xendev));
|
2019-01-08 15:48:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void xen_device_realize(DeviceState *dev, Error **errp)
|
|
|
|
{
|
2020-07-07 18:50:37 +02:00
|
|
|
ERRP_GUARD();
|
2019-01-08 15:48:47 +01:00
|
|
|
XenDevice *xendev = XEN_DEVICE(dev);
|
|
|
|
XenDeviceClass *xendev_class = XEN_DEVICE_GET_CLASS(xendev);
|
2019-01-08 15:48:49 +01:00
|
|
|
XenBus *xenbus = XEN_BUS(qdev_get_parent_bus(DEVICE(xendev)));
|
2019-01-08 15:48:47 +01:00
|
|
|
const char *type = object_get_typename(OBJECT(xendev));
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
if (xendev->frontend_id == DOMID_INVALID) {
|
|
|
|
xendev->frontend_id = xen_domid;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (xendev->frontend_id >= DOMID_FIRST_RESERVED) {
|
|
|
|
error_setg(errp, "invalid frontend-id");
|
|
|
|
goto unrealize;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!xendev_class->get_name) {
|
|
|
|
error_setg(errp, "get_name method not implemented");
|
|
|
|
goto unrealize;
|
|
|
|
}
|
|
|
|
|
2020-07-07 18:50:37 +02:00
|
|
|
xendev->name = xendev_class->get_name(xendev, errp);
|
|
|
|
if (*errp) {
|
|
|
|
error_prepend(errp, "failed to get device name: ");
|
2019-01-08 15:48:49 +01:00
|
|
|
goto unrealize;
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_xen_device_realize(type, xendev->name);
|
|
|
|
|
2019-09-13 10:21:57 +02:00
|
|
|
xendev->xsh = xs_open(0);
|
|
|
|
if (!xendev->xsh) {
|
|
|
|
error_setg_errno(errp, errno, "failed xs_open");
|
|
|
|
goto unrealize;
|
|
|
|
}
|
|
|
|
|
|
|
|
xendev->watch_list = watch_list_create(xendev->xsh);
|
|
|
|
|
2019-01-08 15:48:51 +01:00
|
|
|
xendev->xgth = xengnttab_open(NULL, 0);
|
|
|
|
if (!xendev->xgth) {
|
|
|
|
error_setg_errno(errp, errno, "failed xengnttab_open");
|
|
|
|
goto unrealize;
|
|
|
|
}
|
|
|
|
|
|
|
|
xendev->feature_grant_copy =
|
|
|
|
(xengnttab_grant_copy(xendev->xgth, 0, NULL) == 0);
|
|
|
|
|
2020-07-07 18:50:37 +02:00
|
|
|
xen_device_backend_create(xendev, errp);
|
|
|
|
if (*errp) {
|
2019-01-08 15:48:49 +01:00
|
|
|
goto unrealize;
|
|
|
|
}
|
|
|
|
|
2020-07-07 18:50:37 +02:00
|
|
|
xen_device_frontend_create(xendev, errp);
|
|
|
|
if (*errp) {
|
2019-01-08 15:48:49 +01:00
|
|
|
goto unrealize;
|
|
|
|
}
|
2019-01-08 15:48:47 +01:00
|
|
|
|
|
|
|
if (xendev_class->realize) {
|
2020-07-07 18:50:37 +02:00
|
|
|
xendev_class->realize(xendev, errp);
|
|
|
|
if (*errp) {
|
2019-01-08 15:48:47 +01:00
|
|
|
goto unrealize;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
xen_device_backend_printf(xendev, "frontend", "%s",
|
|
|
|
xendev->frontend_path);
|
|
|
|
xen_device_backend_printf(xendev, "frontend-id", "%u",
|
|
|
|
xendev->frontend_id);
|
|
|
|
xen_device_backend_printf(xendev, "hotplug-status", "connected");
|
|
|
|
|
2019-01-08 15:48:59 +01:00
|
|
|
xen_device_backend_set_online(xendev, true);
|
2019-01-08 15:48:49 +01:00
|
|
|
xen_device_backend_set_state(xendev, XenbusStateInitWait);
|
|
|
|
|
2019-09-18 13:57:44 +02:00
|
|
|
if (!xen_device_frontend_exists(xendev)) {
|
|
|
|
xen_device_frontend_printf(xendev, "backend", "%s",
|
|
|
|
xendev->backend_path);
|
|
|
|
xen_device_frontend_printf(xendev, "backend-id", "%u",
|
|
|
|
xenbus->backend_id);
|
2019-01-08 15:48:49 +01:00
|
|
|
|
2019-09-18 13:57:44 +02:00
|
|
|
xen_device_frontend_set_state(xendev, XenbusStateInitialising, true);
|
|
|
|
}
|
2019-01-08 15:48:49 +01:00
|
|
|
|
|
|
|
xendev->exit.notify = xen_device_exit;
|
|
|
|
qemu_add_exit_notifier(&xendev->exit);
|
2019-01-08 15:48:47 +01:00
|
|
|
return;
|
|
|
|
|
|
|
|
unrealize:
|
qdev: Unrealize must not fail
Devices may have component devices and buses.
Device realization may fail. Realization is recursive: a device's
realize() method realizes its components, and device_set_realized()
realizes its buses (which should in turn realize the devices on that
bus, except bus_set_realized() doesn't implement that, yet).
When realization of a component or bus fails, we need to roll back:
unrealize everything we realized so far. If any of these unrealizes
failed, the device would be left in an inconsistent state. Must not
happen.
device_set_realized() lets it happen: it ignores errors in the roll
back code starting at label child_realize_fail.
Since realization is recursive, unrealization must be recursive, too.
But how could a partly failed unrealize be rolled back? We'd have to
re-realize, which can fail. This design is fundamentally broken.
device_set_realized() does not roll back at all. Instead, it keeps
unrealizing, ignoring further errors.
It can screw up even for a device with no buses: if the lone
dc->unrealize() fails, it still unregisters vmstate, and calls
listeners' unrealize() callback.
bus_set_realized() does not roll back either. Instead, it stops
unrealizing.
Fortunately, no unrealize method can fail, as we'll see below.
To fix the design error, drop parameter @errp from all the unrealize
methods.
Any unrealize method that uses @errp now needs an update. This leads
us to unrealize() methods that can fail. Merely passing it to another
unrealize method cannot cause failure, though. Here are the ones that
do other things with @errp:
* virtio_serial_device_unrealize()
Fails when qbus_set_hotplug_handler() fails, but still does all the
other work. On failure, the device would stay realized with its
resources completely gone. Oops. Can't happen, because
qbus_set_hotplug_handler() can't actually fail here. Pass
&error_abort to qbus_set_hotplug_handler() instead.
* hw/ppc/spapr_drc.c's unrealize()
Fails when object_property_del() fails, but all the other work is
already done. On failure, the device would stay realized with its
vmstate registration gone. Oops. Can't happen, because
object_property_del() can't actually fail here. Pass &error_abort
to object_property_del() instead.
* spapr_phb_unrealize()
Fails and bails out when remove_drcs() fails, but other work is
already done. On failure, the device would stay realized with some
of its resources gone. Oops. remove_drcs() fails only when
chassis_from_bus()'s object_property_get_uint() fails, and it can't
here. Pass &error_abort to remove_drcs() instead.
Therefore, no unrealize method can fail before this patch.
device_set_realized()'s recursive unrealization via bus uses
object_property_set_bool(). Can't drop @errp there, so pass
&error_abort.
We similarly unrealize with object_property_set_bool() elsewhere,
always ignoring errors. Pass &error_abort instead.
Several unrealize methods no longer handle errors from other unrealize
methods: virtio_9p_device_unrealize(),
virtio_input_device_unrealize(), scsi_qdev_unrealize(), ...
Much of the deleted error handling looks wrong anyway.
One unrealize methods no longer ignore such errors:
usb_ehci_pci_exit().
Several realize methods no longer ignore errors when rolling back:
v9fs_device_realize_common(), pci_qdev_unrealize(),
spapr_phb_realize(), usb_qdev_realize(), vfio_ccw_realize(),
virtio_device_realize().
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200505152926.18877-17-armbru@redhat.com>
2020-05-05 17:29:24 +02:00
|
|
|
xen_device_unrealize(dev);
|
2019-01-08 15:48:47 +01:00
|
|
|
}
|
|
|
|
|
2019-01-08 15:48:49 +01:00
|
|
|
static Property xen_device_props[] = {
|
|
|
|
DEFINE_PROP_UINT16("frontend-id", XenDevice, frontend_id,
|
|
|
|
DOMID_INVALID),
|
|
|
|
DEFINE_PROP_END_OF_LIST()
|
|
|
|
};
|
|
|
|
|
2019-01-08 15:48:47 +01:00
|
|
|
static void xen_device_class_init(ObjectClass *class, void *data)
|
|
|
|
{
|
|
|
|
DeviceClass *dev_class = DEVICE_CLASS(class);
|
|
|
|
|
|
|
|
dev_class->realize = xen_device_realize;
|
|
|
|
dev_class->unrealize = xen_device_unrealize;
|
2020-01-10 16:30:32 +01:00
|
|
|
device_class_set_props(dev_class, xen_device_props);
|
2019-01-08 15:48:47 +01:00
|
|
|
dev_class->bus_type = TYPE_XEN_BUS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo xen_device_type_info = {
|
|
|
|
.name = TYPE_XEN_DEVICE,
|
|
|
|
.parent = TYPE_DEVICE,
|
|
|
|
.instance_size = sizeof(XenDevice),
|
|
|
|
.abstract = true,
|
|
|
|
.class_size = sizeof(XenDeviceClass),
|
|
|
|
.class_init = xen_device_class_init,
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef struct XenBridge {
|
|
|
|
SysBusDevice busdev;
|
|
|
|
} XenBridge;
|
|
|
|
|
|
|
|
#define TYPE_XEN_BRIDGE "xen-bridge"
|
|
|
|
|
|
|
|
static const TypeInfo xen_bridge_type_info = {
|
|
|
|
.name = TYPE_XEN_BRIDGE,
|
|
|
|
.parent = TYPE_SYS_BUS_DEVICE,
|
|
|
|
.instance_size = sizeof(XenBridge),
|
|
|
|
};
|
|
|
|
|
|
|
|
static void xen_register_types(void)
|
|
|
|
{
|
|
|
|
type_register_static(&xen_bridge_type_info);
|
|
|
|
type_register_static(&xen_bus_type_info);
|
|
|
|
type_register_static(&xen_device_type_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
type_init(xen_register_types)
|
|
|
|
|
|
|
|
void xen_bus_init(void)
|
|
|
|
{
|
qdev: Convert uses of qdev_create() with Coccinelle
This is the transformation explained in the commit before previous.
Takes care of just one pattern that needs conversion. More to come in
this series.
Coccinelle script:
@ depends on !(file in "hw/arm/highbank.c")@
expression bus, type_name, dev, expr;
@@
- dev = qdev_create(bus, type_name);
+ dev = qdev_new(type_name);
... when != dev = expr
- qdev_init_nofail(dev);
+ qdev_realize_and_unref(dev, bus, &error_fatal);
@@
expression bus, type_name, dev, expr;
identifier DOWN;
@@
- dev = DOWN(qdev_create(bus, type_name));
+ dev = DOWN(qdev_new(type_name));
... when != dev = expr
- qdev_init_nofail(DEVICE(dev));
+ qdev_realize_and_unref(DEVICE(dev), bus, &error_fatal);
@@
expression bus, type_name, expr;
identifier dev;
@@
- DeviceState *dev = qdev_create(bus, type_name);
+ DeviceState *dev = qdev_new(type_name);
... when != dev = expr
- qdev_init_nofail(dev);
+ qdev_realize_and_unref(dev, bus, &error_fatal);
@@
expression bus, type_name, dev, expr, errp;
symbol true;
@@
- dev = qdev_create(bus, type_name);
+ dev = qdev_new(type_name);
... when != dev = expr
- object_property_set_bool(OBJECT(dev), true, "realized", errp);
+ qdev_realize_and_unref(dev, bus, errp);
@@
expression bus, type_name, expr, errp;
identifier dev;
symbol true;
@@
- DeviceState *dev = qdev_create(bus, type_name);
+ DeviceState *dev = qdev_new(type_name);
... when != dev = expr
- object_property_set_bool(OBJECT(dev), true, "realized", errp);
+ qdev_realize_and_unref(dev, bus, errp);
The first rule exempts hw/arm/highbank.c, because it matches along two
control flow paths there, with different @type_name. Covered by the
next commit's manual conversions.
Missing #include "qapi/error.h" added manually.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200610053247.1583243-10-armbru@redhat.com>
[Conflicts in hw/misc/empty_slot.c and hw/sparc/leon3.c resolved]
2020-06-10 07:31:58 +02:00
|
|
|
DeviceState *dev = qdev_new(TYPE_XEN_BRIDGE);
|
2019-01-08 15:48:47 +01:00
|
|
|
BusState *bus = qbus_create(TYPE_XEN_BUS, dev, NULL);
|
|
|
|
|
sysbus: Convert to sysbus_realize() etc. with Coccinelle
Convert from qdev_realize(), qdev_realize_and_unref() with null @bus
argument to sysbus_realize(), sysbus_realize_and_unref().
Coccinelle script:
@@
expression dev, errp;
@@
- qdev_realize(DEVICE(dev), NULL, errp);
+ sysbus_realize(SYS_BUS_DEVICE(dev), errp);
@@
expression sysbus_dev, dev, errp;
@@
+ sysbus_dev = SYS_BUS_DEVICE(dev);
- qdev_realize_and_unref(dev, NULL, errp);
+ sysbus_realize_and_unref(sysbus_dev, errp);
- sysbus_dev = SYS_BUS_DEVICE(dev);
@@
expression sysbus_dev, dev, errp;
expression expr;
@@
sysbus_dev = SYS_BUS_DEVICE(dev);
... when != dev = expr;
- qdev_realize_and_unref(dev, NULL, errp);
+ sysbus_realize_and_unref(sysbus_dev, errp);
@@
expression dev, errp;
@@
- qdev_realize_and_unref(DEVICE(dev), NULL, errp);
+ sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), errp);
@@
expression dev, errp;
@@
- qdev_realize_and_unref(dev, NULL, errp);
+ sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), errp);
Whitespace changes minimized manually.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Acked-by: Alistair Francis <alistair.francis@wdc.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200610053247.1583243-46-armbru@redhat.com>
[Conflicts in hw/misc/empty_slot.c and hw/sparc/leon3.c resolved]
2020-06-10 07:32:34 +02:00
|
|
|
sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), &error_fatal);
|
2020-06-30 11:03:38 +02:00
|
|
|
qbus_set_bus_hotplug_handler(bus);
|
2019-01-08 15:48:47 +01:00
|
|
|
}
|