qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: "Cédric Le Goater" <clg@redhat.com>
To: qemu-devel@nongnu.org
Cc: "Alex Williamson" <alex.williamson@redhat.com>,
	"Zhenzhong Duan" <zhenzhong.duan@intel.com>,
	"Cédric Le Goater" <clg@redhat.com>
Subject: [PULL 21/47] vfio: Make VFIOIOMMUClass::attach_device() and its wrapper return bool
Date: Wed, 22 May 2024 11:54:16 +0200	[thread overview]
Message-ID: <20240522095442.195243-22-clg@redhat.com> (raw)
In-Reply-To: <20240522095442.195243-1-clg@redhat.com>

From: Zhenzhong Duan <zhenzhong.duan@intel.com>

Make VFIOIOMMUClass::attach_device() and its wrapper function
vfio_attach_device() return bool.

This is to follow the coding standand to return bool if 'Error **'
is used to pass error.

Suggested-by: Cédric Le Goater <clg@redhat.com>
Signed-off-by: Zhenzhong Duan <zhenzhong.duan@intel.com>
Reviewed-by: Cédric Le Goater <clg@redhat.com>
Signed-off-by: Cédric Le Goater <clg@redhat.com>
---
 include/hw/vfio/vfio-common.h         |  4 ++--
 include/hw/vfio/vfio-container-base.h |  4 ++--
 hw/vfio/ap.c                          |  6 ++----
 hw/vfio/ccw.c                         |  6 ++----
 hw/vfio/common.c                      |  4 ++--
 hw/vfio/container.c                   | 14 +++++++-------
 hw/vfio/iommufd.c                     | 11 +++++------
 hw/vfio/pci.c                         |  5 ++---
 hw/vfio/platform.c                    |  7 +++----
 9 files changed, 27 insertions(+), 34 deletions(-)

diff --git a/include/hw/vfio/vfio-common.h b/include/hw/vfio/vfio-common.h
index 878e34a12874f63fcb8bbc8dc8ca3d2dfa84fdb4..e85817e65e65317d08bc2b17b738449198784796 100644
--- a/include/hw/vfio/vfio-common.h
+++ b/include/hw/vfio/vfio-common.h
@@ -222,8 +222,8 @@ void vfio_region_exit(VFIORegion *region);
 void vfio_region_finalize(VFIORegion *region);
 void vfio_reset_handler(void *opaque);
 struct vfio_device_info *vfio_get_device_info(int fd);
-int vfio_attach_device(char *name, VFIODevice *vbasedev,
-                       AddressSpace *as, Error **errp);
+bool vfio_attach_device(char *name, VFIODevice *vbasedev,
+                        AddressSpace *as, Error **errp);
 void vfio_detach_device(VFIODevice *vbasedev);
 
 int vfio_kvm_device_add_fd(int fd, Error **errp);
diff --git a/include/hw/vfio/vfio-container-base.h b/include/hw/vfio/vfio-container-base.h
index b04057ad1aff73d974ecec718d0fe45f7a930b59..44927ca8c3583246145defe043ac34da604d39bf 100644
--- a/include/hw/vfio/vfio-container-base.h
+++ b/include/hw/vfio/vfio-container-base.h
@@ -117,8 +117,8 @@ struct VFIOIOMMUClass {
     int (*dma_unmap)(const VFIOContainerBase *bcontainer,
                      hwaddr iova, ram_addr_t size,
                      IOMMUTLBEntry *iotlb);
-    int (*attach_device)(const char *name, VFIODevice *vbasedev,
-                         AddressSpace *as, Error **errp);
+    bool (*attach_device)(const char *name, VFIODevice *vbasedev,
+                          AddressSpace *as, Error **errp);
     void (*detach_device)(VFIODevice *vbasedev);
 
     /* migration feature */
diff --git a/hw/vfio/ap.c b/hw/vfio/ap.c
index 8bb024e2fde4a1d72346dee4b662d762374326b9..ba653ef70f08ebdf482009baafc62eb33ebda9a8 100644
--- a/hw/vfio/ap.c
+++ b/hw/vfio/ap.c
@@ -154,7 +154,6 @@ static void vfio_ap_unregister_irq_notifier(VFIOAPDevice *vapdev,
 static void vfio_ap_realize(DeviceState *dev, Error **errp)
 {
     ERRP_GUARD();
-    int ret;
     Error *err = NULL;
     VFIOAPDevice *vapdev = VFIO_AP_DEVICE(dev);
     VFIODevice *vbasedev = &vapdev->vdev;
@@ -163,9 +162,8 @@ static void vfio_ap_realize(DeviceState *dev, Error **errp)
         return;
     }
 
-    ret = vfio_attach_device(vbasedev->name, vbasedev,
-                             &address_space_memory, errp);
-    if (ret) {
+    if (!vfio_attach_device(vbasedev->name, vbasedev,
+                            &address_space_memory, errp)) {
         goto error;
     }
 
diff --git a/hw/vfio/ccw.c b/hw/vfio/ccw.c
index 1c630f6e9abe93ae0c2b5615d4409669f096c8c9..89bb98016764e65cf826183d7a38c59d429f6eeb 100644
--- a/hw/vfio/ccw.c
+++ b/hw/vfio/ccw.c
@@ -579,7 +579,6 @@ static void vfio_ccw_realize(DeviceState *dev, Error **errp)
     S390CCWDeviceClass *cdc = S390_CCW_DEVICE_GET_CLASS(cdev);
     VFIODevice *vbasedev = &vcdev->vdev;
     Error *err = NULL;
-    int ret;
 
     /* Call the class init function for subchannel. */
     if (cdc->realize) {
@@ -593,9 +592,8 @@ static void vfio_ccw_realize(DeviceState *dev, Error **errp)
         return;
     }
 
-    ret = vfio_attach_device(cdev->mdevid, vbasedev,
-                             &address_space_memory, errp);
-    if (ret) {
+    if (!vfio_attach_device(cdev->mdevid, vbasedev,
+                            &address_space_memory, errp)) {
         goto out_attach_dev_err;
     }
 
diff --git a/hw/vfio/common.c b/hw/vfio/common.c
index 1fbd10801d35079341a833fa68a43de2b758cde0..c04a259ffd7cfcfba480335bea1ddff787f47bdc 100644
--- a/hw/vfio/common.c
+++ b/hw/vfio/common.c
@@ -1523,8 +1523,8 @@ retry:
     return info;
 }
 
-int vfio_attach_device(char *name, VFIODevice *vbasedev,
-                       AddressSpace *as, Error **errp)
+bool vfio_attach_device(char *name, VFIODevice *vbasedev,
+                        AddressSpace *as, Error **errp)
 {
     const VFIOIOMMUClass *ops =
         VFIO_IOMMU_CLASS(object_class_by_name(TYPE_VFIO_IOMMU_LEGACY));
diff --git a/hw/vfio/container.c b/hw/vfio/container.c
index 9534120d4ac835bb58e37667dad8d39205404c08..e7c416774791d506cc7c4696fb6a6d94dc809c8e 100644
--- a/hw/vfio/container.c
+++ b/hw/vfio/container.c
@@ -910,8 +910,8 @@ static int vfio_device_groupid(VFIODevice *vbasedev, Error **errp)
  * @name and @vbasedev->name are likely to be different depending
  * on the type of the device, hence the need for passing @name
  */
-static int vfio_legacy_attach_device(const char *name, VFIODevice *vbasedev,
-                                     AddressSpace *as, Error **errp)
+static bool vfio_legacy_attach_device(const char *name, VFIODevice *vbasedev,
+                                      AddressSpace *as, Error **errp)
 {
     int groupid = vfio_device_groupid(vbasedev, errp);
     VFIODevice *vbasedev_iter;
@@ -920,27 +920,27 @@ static int vfio_legacy_attach_device(const char *name, VFIODevice *vbasedev,
     int ret;
 
     if (groupid < 0) {
-        return groupid;
+        return false;
     }
 
     trace_vfio_attach_device(vbasedev->name, groupid);
 
     group = vfio_get_group(groupid, as, errp);
     if (!group) {
-        return -ENOENT;
+        return false;
     }
 
     QLIST_FOREACH(vbasedev_iter, &group->device_list, next) {
         if (strcmp(vbasedev_iter->name, vbasedev->name) == 0) {
             error_setg(errp, "device is already attached");
             vfio_put_group(group);
-            return -EBUSY;
+            return false;
         }
     }
     ret = vfio_get_device(group, name, vbasedev, errp);
     if (ret) {
         vfio_put_group(group);
-        return ret;
+        return false;
     }
 
     bcontainer = &group->container->bcontainer;
@@ -948,7 +948,7 @@ static int vfio_legacy_attach_device(const char *name, VFIODevice *vbasedev,
     QLIST_INSERT_HEAD(&bcontainer->device_list, vbasedev, container_next);
     QLIST_INSERT_HEAD(&vfio_device_list, vbasedev, global_next);
 
-    return ret;
+    return true;
 }
 
 static void vfio_legacy_detach_device(VFIODevice *vbasedev)
diff --git a/hw/vfio/iommufd.c b/hw/vfio/iommufd.c
index c6441279728fcede1dde2a099c076ad04c464a1f..4c6992fca11969bc8fe26c11e902e2521d6bff7a 100644
--- a/hw/vfio/iommufd.c
+++ b/hw/vfio/iommufd.c
@@ -299,8 +299,8 @@ error:
     return ret;
 }
 
-static int iommufd_cdev_attach(const char *name, VFIODevice *vbasedev,
-                               AddressSpace *as, Error **errp)
+static bool iommufd_cdev_attach(const char *name, VFIODevice *vbasedev,
+                                AddressSpace *as, Error **errp)
 {
     VFIOContainerBase *bcontainer;
     VFIOIOMMUFDContainer *container;
@@ -315,7 +315,7 @@ static int iommufd_cdev_attach(const char *name, VFIODevice *vbasedev,
     if (vbasedev->fd < 0) {
         devfd = iommufd_cdev_getfd(vbasedev->sysfsdev, errp);
         if (devfd < 0) {
-            return devfd;
+            return false;
         }
         vbasedev->fd = devfd;
     } else {
@@ -392,7 +392,6 @@ static int iommufd_cdev_attach(const char *name, VFIODevice *vbasedev,
     memory_listener_register(&bcontainer->listener, bcontainer->space->as);
 
     if (bcontainer->error) {
-        ret = -1;
         error_propagate_prepend(errp, bcontainer->error,
                                 "memory listener initialization failed: ");
         goto err_listener_register;
@@ -431,7 +430,7 @@ found_container:
 
     trace_iommufd_cdev_device_info(vbasedev->name, devfd, vbasedev->num_irqs,
                                    vbasedev->num_regions, vbasedev->flags);
-    return 0;
+    return true;
 
 err_listener_register:
     iommufd_cdev_ram_block_discard_disable(false);
@@ -444,7 +443,7 @@ err_alloc_ioas:
     iommufd_cdev_unbind_and_disconnect(vbasedev);
 err_connect_bind:
     close(vbasedev->fd);
-    return ret;
+    return false;
 }
 
 static void iommufd_cdev_detach(VFIODevice *vbasedev)
diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c
index 84f7bff664fd7595b75cce1f6974068144f0d42d..c1adef5cf8fb241df510514610f05c8a0d51a9f9 100644
--- a/hw/vfio/pci.c
+++ b/hw/vfio/pci.c
@@ -3027,9 +3027,8 @@ static void vfio_realize(PCIDevice *pdev, Error **errp)
         name = g_strdup(vbasedev->name);
     }
 
-    ret = vfio_attach_device(name, vbasedev,
-                             pci_device_iommu_address_space(pdev), errp);
-    if (ret) {
+    if (!vfio_attach_device(name, vbasedev,
+                            pci_device_iommu_address_space(pdev), errp)) {
         goto error;
     }
 
diff --git a/hw/vfio/platform.c b/hw/vfio/platform.c
index dcd2365fb35344d4383989169fa23bab7cc3d8de..2bd16096bbd1b4a1da579448e931cb0803d54bb6 100644
--- a/hw/vfio/platform.c
+++ b/hw/vfio/platform.c
@@ -552,10 +552,9 @@ static int vfio_base_device_init(VFIODevice *vbasedev, Error **errp)
         return ret;
     }
 
-    ret = vfio_attach_device(vbasedev->name, vbasedev,
-                             &address_space_memory, errp);
-    if (ret) {
-        return ret;
+    if (!vfio_attach_device(vbasedev->name, vbasedev,
+                            &address_space_memory, errp)) {
+        return -EINVAL;
     }
 
     ret = vfio_populate_device(vbasedev, errp);
-- 
2.45.1



  parent reply	other threads:[~2024-05-22 10:01 UTC|newest]

Thread overview: 49+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-05-22  9:53 [PULL 00/47] vfio queue Cédric Le Goater
2024-05-22  9:53 ` [PULL 01/47] vfio: Add Error** argument to .set_dirty_page_tracking() handler Cédric Le Goater
2024-05-22  9:53 ` [PULL 02/47] vfio: Add Error** argument to vfio_devices_dma_logging_start() Cédric Le Goater
2024-05-22  9:53 ` [PULL 03/47] migration: Extend migration_file_set_error() with Error* argument Cédric Le Goater
2024-05-22  9:53 ` [PULL 04/47] vfio/migration: Add an Error** argument to vfio_migration_set_state() Cédric Le Goater
2024-05-22  9:54 ` [PULL 05/47] vfio/migration: Add Error** argument to .vfio_save_config() handler Cédric Le Goater
2024-05-22  9:54 ` [PULL 06/47] vfio: Reverse test on vfio_get_xlat_addr() Cédric Le Goater
2024-05-22  9:54 ` [PULL 07/47] memory: Add Error** argument to memory_get_xlat_addr() Cédric Le Goater
2024-05-22  9:54 ` [PULL 08/47] vfio: Add Error** argument to .get_dirty_bitmap() handler Cédric Le Goater
2024-05-22  9:54 ` [PULL 09/47] vfio: Also trace event failures in vfio_save_complete_precopy() Cédric Le Goater
2024-05-22  9:54 ` [PULL 10/47] vfio/ap: Use g_autofree variable in vfio_ap_register_irq_notifier() Cédric Le Goater
2024-05-22  9:54 ` [PULL 11/47] vfio/ap: Make vfio_ap_register_irq_notifier() return a bool Cédric Le Goater
2024-05-22  9:54 ` [PULL 12/47] vfio/ccw: Use g_autofree variable in vfio_ccw_register_irq_notifier() Cédric Le Goater
2024-05-22  9:54 ` [PULL 13/47] vfio/ccw: Make vfio_ccw_register_irq_notifier() return a bool Cédric Le Goater
2024-05-22  9:54 ` [PULL 14/47] vfio/pci: migration: Skip config space check for Vendor Specific Information in VSC during restore/load Cédric Le Goater
2024-05-22  9:54 ` [PULL 15/47] qapi/vfio: Add VFIO migration QAPI event Cédric Le Goater
2024-05-22  9:54 ` [PULL 16/47] vfio/migration: Emit " Cédric Le Goater
2024-05-22  9:54 ` [PULL 17/47] vfio/migration: Don't emit STOP_COPY VFIO migration QAPI event twice Cédric Le Goater
2024-05-22  9:54 ` [PULL 18/47] vfio/migration: Enhance VFIO migration state tracing Cédric Le Goater
2024-05-22  9:54 ` [PULL 19/47] vfio/pci: Use g_autofree in vfio_realize Cédric Le Goater
2024-05-22  9:54 ` [PULL 20/47] vfio/pci: Use g_autofree in iommufd_cdev_get_info_iova_range() Cédric Le Goater
2024-05-22  9:54 ` Cédric Le Goater [this message]
2024-05-22  9:54 ` [PULL 22/47] vfio: Make VFIOIOMMUClass::setup() return bool Cédric Le Goater
2024-05-22  9:54 ` [PULL 23/47] vfio: Make VFIOIOMMUClass::add_window() and its wrapper " Cédric Le Goater
2024-05-22  9:54 ` [PULL 24/47] vfio/container: Make vfio_connect_container() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 25/47] vfio/container: Make vfio_set_iommu() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 26/47] vfio/container: Make vfio_get_device() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 27/47] vfio/iommufd: Make iommufd_cdev_*() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 28/47] vfio/cpr: Make vfio_cpr_register_container() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 29/47] backends/iommufd: Make iommufd_backend_*() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 30/47] vfio/display: Fix error path in call site of ramfb_setup() Cédric Le Goater
2024-05-22  9:54 ` [PULL 31/47] vfio/display: Make vfio_display_*() return bool Cédric Le Goater
2024-05-22  9:54 ` [PULL 32/47] vfio/helpers: Use g_autofree in vfio_set_irq_signaling() Cédric Le Goater
2024-05-22  9:54 ` [PULL 33/47] vfio/helpers: Make vfio_set_irq_signaling() return bool Cédric Le Goater
2024-05-22  9:54 ` [PULL 34/47] vfio/helpers: Make vfio_device_get_name() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 35/47] vfio/platform: Make vfio_populate_device() and vfio_base_device_init() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 36/47] vfio/ccw: Make vfio_ccw_get_region() return a bool Cédric Le Goater
2024-05-22  9:54 ` [PULL 37/47] vfio/pci: Make vfio_intx_enable_kvm() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 38/47] vfio/pci: Make vfio_pci_relocate_msix() and vfio_msix_early_setup() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 39/47] vfio/pci: Make vfio_populate_device() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 40/47] vfio/pci: Make vfio_intx_enable() return bool Cédric Le Goater
2024-05-22  9:54 ` [PULL 41/47] vfio/pci: Make vfio_populate_vga() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 42/47] vfio/pci: Make capability related functions " Cédric Le Goater
2024-05-22  9:54 ` [PULL 43/47] vfio/pci: Use g_autofree for vfio_region_info pointer Cédric Le Goater
2024-05-22  9:54 ` [PULL 44/47] vfio/pci-quirks: Make vfio_pci_igd_opregion_init() return bool Cédric Le Goater
2024-05-22  9:54 ` [PULL 45/47] vfio/pci-quirks: Make vfio_add_*_cap() " Cédric Le Goater
2024-05-22  9:54 ` [PULL 46/47] vfio: Use g_autofree in all call site of vfio_get_region_info() Cédric Le Goater
2024-05-22  9:54 ` [PULL 47/47] vfio/igd: Use g_autofree in vfio_probe_igd_bar4_quirk() Cédric Le Goater
2024-05-22 22:31 ` [PULL 00/47] vfio queue Richard Henderson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240522095442.195243-22-clg@redhat.com \
    --to=clg@redhat.com \
    --cc=alex.williamson@redhat.com \
    --cc=qemu-devel@nongnu.org \
    --cc=zhenzhong.duan@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).