2018-10-10 20:03:07 +03:00
|
|
|
/*
|
|
|
|
* VFIO based AP matrix device assignment
|
|
|
|
*
|
|
|
|
* Copyright 2018 IBM Corp.
|
|
|
|
* Author(s): Tony Krowiak <akrowiak@linux.ibm.com>
|
|
|
|
* Halil Pasic <pasic@linux.ibm.com>
|
|
|
|
*
|
|
|
|
* This work is licensed under the terms of the GNU GPL, version 2 or (at
|
|
|
|
* your option) any later version. See the COPYING file in the top-level
|
|
|
|
* directory.
|
|
|
|
*/
|
|
|
|
|
2018-12-04 20:25:35 +03:00
|
|
|
#include "qemu/osdep.h"
|
2023-11-21 11:44:13 +03:00
|
|
|
#include CONFIG_DEVICES /* CONFIG_IOMMUFD */
|
2018-10-10 20:03:07 +03:00
|
|
|
#include <linux/vfio.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include "qapi/error.h"
|
|
|
|
#include "hw/vfio/vfio-common.h"
|
2023-11-21 11:44:13 +03:00
|
|
|
#include "sysemu/iommufd.h"
|
2018-10-10 20:03:07 +03:00
|
|
|
#include "hw/s390x/ap-device.h"
|
|
|
|
#include "qemu/error-report.h"
|
2023-06-02 17:11:25 +03:00
|
|
|
#include "qemu/event_notifier.h"
|
|
|
|
#include "qemu/main-loop.h"
|
2019-05-23 17:35:07 +03:00
|
|
|
#include "qemu/module.h"
|
2018-10-10 20:03:07 +03:00
|
|
|
#include "qemu/option.h"
|
|
|
|
#include "qemu/config-file.h"
|
2021-07-07 13:53:23 +03:00
|
|
|
#include "kvm/kvm_s390x.h"
|
2019-08-12 08:23:45 +03:00
|
|
|
#include "migration/vmstate.h"
|
2019-08-12 08:23:51 +03:00
|
|
|
#include "hw/qdev-properties.h"
|
2018-10-10 20:03:07 +03:00
|
|
|
#include "hw/s390x/ap-bridge.h"
|
|
|
|
#include "exec/address-spaces.h"
|
2020-09-03 23:43:22 +03:00
|
|
|
#include "qom/object.h"
|
2018-10-10 20:03:07 +03:00
|
|
|
|
2020-09-03 01:42:16 +03:00
|
|
|
#define TYPE_VFIO_AP_DEVICE "vfio-ap"
|
2018-10-10 20:03:07 +03:00
|
|
|
|
2020-09-03 23:43:22 +03:00
|
|
|
struct VFIOAPDevice {
|
2018-10-10 20:03:07 +03:00
|
|
|
APDevice apdev;
|
|
|
|
VFIODevice vdev;
|
2023-06-02 17:11:25 +03:00
|
|
|
EventNotifier req_notifier;
|
2020-09-03 23:43:22 +03:00
|
|
|
};
|
2018-10-10 20:03:07 +03:00
|
|
|
|
2020-09-16 21:25:19 +03:00
|
|
|
OBJECT_DECLARE_SIMPLE_TYPE(VFIOAPDevice, VFIO_AP_DEVICE)
|
2018-10-10 20:03:07 +03:00
|
|
|
|
|
|
|
static void vfio_ap_compute_needs_reset(VFIODevice *vdev)
|
|
|
|
{
|
|
|
|
vdev->needs_reset = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We don't need vfio_hot_reset_multi and vfio_eoi operations for
|
|
|
|
* vfio-ap device now.
|
|
|
|
*/
|
|
|
|
struct VFIODeviceOps vfio_ap_ops = {
|
|
|
|
.vfio_compute_needs_reset = vfio_ap_compute_needs_reset,
|
|
|
|
};
|
|
|
|
|
2023-06-02 17:11:25 +03:00
|
|
|
static void vfio_ap_req_notifier_handler(void *opaque)
|
|
|
|
{
|
|
|
|
VFIOAPDevice *vapdev = opaque;
|
|
|
|
Error *err = NULL;
|
|
|
|
|
|
|
|
if (!event_notifier_test_and_clear(&vapdev->req_notifier)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
qdev_unplug(DEVICE(vapdev), &err);
|
|
|
|
|
|
|
|
if (err) {
|
|
|
|
warn_reportf_err(err, VFIO_MSG_PREFIX, vapdev->vdev.name);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-04-25 12:02:12 +03:00
|
|
|
static bool vfio_ap_register_irq_notifier(VFIOAPDevice *vapdev,
|
2023-06-02 17:11:25 +03:00
|
|
|
unsigned int irq, Error **errp)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
size_t argsz;
|
|
|
|
IOHandler *fd_read;
|
|
|
|
EventNotifier *notifier;
|
2024-04-25 12:02:11 +03:00
|
|
|
g_autofree struct vfio_irq_info *irq_info = NULL;
|
2023-06-02 17:11:25 +03:00
|
|
|
VFIODevice *vdev = &vapdev->vdev;
|
|
|
|
|
|
|
|
switch (irq) {
|
|
|
|
case VFIO_AP_REQ_IRQ_INDEX:
|
|
|
|
notifier = &vapdev->req_notifier;
|
|
|
|
fd_read = vfio_ap_req_notifier_handler;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
error_setg(errp, "vfio: Unsupported device irq(%d)", irq);
|
2024-04-25 12:02:12 +03:00
|
|
|
return false;
|
2023-06-02 17:11:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (vdev->num_irqs < irq + 1) {
|
|
|
|
error_setg(errp, "vfio: IRQ %u not available (number of irqs %u)",
|
|
|
|
irq, vdev->num_irqs);
|
2024-04-25 12:02:12 +03:00
|
|
|
return false;
|
2023-06-02 17:11:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
argsz = sizeof(*irq_info);
|
|
|
|
irq_info = g_malloc0(argsz);
|
|
|
|
irq_info->index = irq;
|
|
|
|
irq_info->argsz = argsz;
|
|
|
|
|
|
|
|
if (ioctl(vdev->fd, VFIO_DEVICE_GET_IRQ_INFO,
|
|
|
|
irq_info) < 0 || irq_info->count < 1) {
|
|
|
|
error_setg_errno(errp, errno, "vfio: Error getting irq info");
|
2024-04-25 12:02:12 +03:00
|
|
|
return false;
|
2023-06-02 17:11:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (event_notifier_init(notifier, 0)) {
|
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"vfio: Unable to init event notifier for irq (%d)",
|
|
|
|
irq);
|
2024-04-25 12:02:12 +03:00
|
|
|
return false;
|
2023-06-02 17:11:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
fd = event_notifier_get_fd(notifier);
|
|
|
|
qemu_set_fd_handler(fd, fd_read, NULL, vapdev);
|
|
|
|
|
2024-05-22 07:39:59 +03:00
|
|
|
if (!vfio_set_irq_signaling(vdev, irq, 0, VFIO_IRQ_SET_ACTION_TRIGGER, fd,
|
|
|
|
errp)) {
|
2023-06-02 17:11:25 +03:00
|
|
|
qemu_set_fd_handler(fd, NULL, NULL, vapdev);
|
|
|
|
event_notifier_cleanup(notifier);
|
|
|
|
}
|
2024-04-25 12:02:12 +03:00
|
|
|
|
|
|
|
return true;
|
2023-06-02 17:11:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void vfio_ap_unregister_irq_notifier(VFIOAPDevice *vapdev,
|
|
|
|
unsigned int irq)
|
|
|
|
{
|
|
|
|
Error *err = NULL;
|
|
|
|
EventNotifier *notifier;
|
|
|
|
|
|
|
|
switch (irq) {
|
|
|
|
case VFIO_AP_REQ_IRQ_INDEX:
|
|
|
|
notifier = &vapdev->req_notifier;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
error_report("vfio: Unsupported device irq(%d)", irq);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2024-05-22 07:39:59 +03:00
|
|
|
if (!vfio_set_irq_signaling(&vapdev->vdev, irq, 0,
|
|
|
|
VFIO_IRQ_SET_ACTION_TRIGGER, -1, &err)) {
|
2023-06-02 17:11:25 +03:00
|
|
|
warn_reportf_err(err, VFIO_MSG_PREFIX, vapdev->vdev.name);
|
|
|
|
}
|
|
|
|
|
|
|
|
qemu_set_fd_handler(event_notifier_get_fd(notifier),
|
|
|
|
NULL, NULL, vapdev);
|
|
|
|
event_notifier_cleanup(notifier);
|
|
|
|
}
|
|
|
|
|
2018-10-10 20:03:07 +03:00
|
|
|
static void vfio_ap_realize(DeviceState *dev, Error **errp)
|
|
|
|
{
|
hw/vfio/ap: Fix missing ERRP_GUARD() for error_prepend()
As the comment in qapi/error, passing @errp to error_prepend() requires
ERRP_GUARD():
* = Why, when and how to use ERRP_GUARD() =
*
* Without ERRP_GUARD(), use of the @errp parameter is restricted:
...
* - It should not be passed to error_prepend(), error_vprepend() or
* error_append_hint(), because that doesn't work with &error_fatal.
* ERRP_GUARD() lifts these restrictions.
*
* To use ERRP_GUARD(), add it right at the beginning of the function.
* @errp can then be used without worrying about the argument being
* NULL or &error_fatal.
ERRP_GUARD() could avoid the case when @errp is &error_fatal, the user
can't see this additional information, because exit() happens in
error_setg earlier than information is added [1].
The vfio_ap_realize() passes @errp to error_prepend(), and as a
DeviceClass.realize method, there are too many possible callers to check
the impact of this defect; it may or may not be harmless. Thus it is
necessary to protect @errp with ERRP_GUARD().
To avoid the issue like [1] said, add missing ERRP_GUARD() at the
beginning of this function.
[1]: Issue description in the commit message of commit ae7c80a7bd73
("error: New macro ERRP_GUARD()").
Cc: Alex Williamson <alex.williamson@redhat.com>
Cc: Cédric Le Goater <clg@redhat.com>
Cc: Tony Krowiak <akrowiak@linux.ibm.com>
Cc: Halil Pasic <pasic@linux.ibm.com>
Cc: Jason Herne <jjherne@linux.ibm.com>
Cc: Thomas Huth <thuth@redhat.com>
Cc: qemu-s390x@nongnu.org
Signed-off-by: Zhao Liu <zhao1.liu@intel.com>
Reviewed-by: Cédric Le Goater <clg@redhat.com>
Message-ID: <20240311033822.3142585-19-zhao1.liu@linux.intel.com>
Signed-off-by: Thomas Huth <thuth@redhat.com>
2024-03-11 06:38:11 +03:00
|
|
|
ERRP_GUARD();
|
2023-06-02 17:11:25 +03:00
|
|
|
Error *err = NULL;
|
2023-10-09 05:20:47 +03:00
|
|
|
VFIOAPDevice *vapdev = VFIO_AP_DEVICE(dev);
|
2023-10-09 12:09:11 +03:00
|
|
|
VFIODevice *vbasedev = &vapdev->vdev;
|
2018-10-10 20:03:07 +03:00
|
|
|
|
2024-05-22 07:40:00 +03:00
|
|
|
if (!vfio_device_get_name(vbasedev, errp)) {
|
2023-11-21 11:44:14 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2024-05-07 09:42:44 +03:00
|
|
|
if (!vfio_attach_device(vbasedev->name, vbasedev,
|
|
|
|
&address_space_memory, errp)) {
|
2023-10-09 12:09:11 +03:00
|
|
|
goto error;
|
2018-10-10 20:03:07 +03:00
|
|
|
}
|
|
|
|
|
2024-04-25 12:02:12 +03:00
|
|
|
if (!vfio_ap_register_irq_notifier(vapdev, VFIO_AP_REQ_IRQ_INDEX, &err)) {
|
2023-06-02 17:11:25 +03:00
|
|
|
/*
|
|
|
|
* Report this error, but do not make it a failing condition.
|
|
|
|
* Lack of this IRQ in the host does not prevent normal operation.
|
|
|
|
*/
|
2024-05-22 20:01:07 +03:00
|
|
|
warn_report_err(err);
|
2023-06-02 17:11:25 +03:00
|
|
|
}
|
|
|
|
|
2018-10-10 20:03:07 +03:00
|
|
|
return;
|
|
|
|
|
2023-10-09 12:09:11 +03:00
|
|
|
error:
|
|
|
|
error_prepend(errp, VFIO_MSG_PREFIX, vbasedev->name);
|
|
|
|
g_free(vbasedev->name);
|
2018-10-10 20:03:07 +03:00
|
|
|
}
|
|
|
|
|
qdev: Unrealize must not fail
Devices may have component devices and buses.
Device realization may fail. Realization is recursive: a device's
realize() method realizes its components, and device_set_realized()
realizes its buses (which should in turn realize the devices on that
bus, except bus_set_realized() doesn't implement that, yet).
When realization of a component or bus fails, we need to roll back:
unrealize everything we realized so far. If any of these unrealizes
failed, the device would be left in an inconsistent state. Must not
happen.
device_set_realized() lets it happen: it ignores errors in the roll
back code starting at label child_realize_fail.
Since realization is recursive, unrealization must be recursive, too.
But how could a partly failed unrealize be rolled back? We'd have to
re-realize, which can fail. This design is fundamentally broken.
device_set_realized() does not roll back at all. Instead, it keeps
unrealizing, ignoring further errors.
It can screw up even for a device with no buses: if the lone
dc->unrealize() fails, it still unregisters vmstate, and calls
listeners' unrealize() callback.
bus_set_realized() does not roll back either. Instead, it stops
unrealizing.
Fortunately, no unrealize method can fail, as we'll see below.
To fix the design error, drop parameter @errp from all the unrealize
methods.
Any unrealize method that uses @errp now needs an update. This leads
us to unrealize() methods that can fail. Merely passing it to another
unrealize method cannot cause failure, though. Here are the ones that
do other things with @errp:
* virtio_serial_device_unrealize()
Fails when qbus_set_hotplug_handler() fails, but still does all the
other work. On failure, the device would stay realized with its
resources completely gone. Oops. Can't happen, because
qbus_set_hotplug_handler() can't actually fail here. Pass
&error_abort to qbus_set_hotplug_handler() instead.
* hw/ppc/spapr_drc.c's unrealize()
Fails when object_property_del() fails, but all the other work is
already done. On failure, the device would stay realized with its
vmstate registration gone. Oops. Can't happen, because
object_property_del() can't actually fail here. Pass &error_abort
to object_property_del() instead.
* spapr_phb_unrealize()
Fails and bails out when remove_drcs() fails, but other work is
already done. On failure, the device would stay realized with some
of its resources gone. Oops. remove_drcs() fails only when
chassis_from_bus()'s object_property_get_uint() fails, and it can't
here. Pass &error_abort to remove_drcs() instead.
Therefore, no unrealize method can fail before this patch.
device_set_realized()'s recursive unrealization via bus uses
object_property_set_bool(). Can't drop @errp there, so pass
&error_abort.
We similarly unrealize with object_property_set_bool() elsewhere,
always ignoring errors. Pass &error_abort instead.
Several unrealize methods no longer handle errors from other unrealize
methods: virtio_9p_device_unrealize(),
virtio_input_device_unrealize(), scsi_qdev_unrealize(), ...
Much of the deleted error handling looks wrong anyway.
One unrealize methods no longer ignore such errors:
usb_ehci_pci_exit().
Several realize methods no longer ignore errors when rolling back:
v9fs_device_realize_common(), pci_qdev_unrealize(),
spapr_phb_realize(), usb_qdev_realize(), vfio_ccw_realize(),
virtio_device_realize().
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200505152926.18877-17-armbru@redhat.com>
2020-05-05 18:29:24 +03:00
|
|
|
static void vfio_ap_unrealize(DeviceState *dev)
|
2018-10-10 20:03:07 +03:00
|
|
|
{
|
2023-10-09 05:20:47 +03:00
|
|
|
VFIOAPDevice *vapdev = VFIO_AP_DEVICE(dev);
|
2018-10-10 20:03:07 +03:00
|
|
|
|
2023-06-02 17:11:25 +03:00
|
|
|
vfio_ap_unregister_irq_notifier(vapdev, VFIO_AP_REQ_IRQ_INDEX);
|
2023-10-09 12:09:11 +03:00
|
|
|
vfio_detach_device(&vapdev->vdev);
|
|
|
|
g_free(vapdev->vdev.name);
|
2018-10-10 20:03:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static Property vfio_ap_properties[] = {
|
|
|
|
DEFINE_PROP_STRING("sysfsdev", VFIOAPDevice, vdev.sysfsdev),
|
2023-11-21 11:44:13 +03:00
|
|
|
#ifdef CONFIG_IOMMUFD
|
|
|
|
DEFINE_PROP_LINK("iommufd", VFIOAPDevice, vdev.iommufd,
|
|
|
|
TYPE_IOMMUFD_BACKEND, IOMMUFDBackend *),
|
|
|
|
#endif
|
2018-10-10 20:03:07 +03:00
|
|
|
DEFINE_PROP_END_OF_LIST(),
|
|
|
|
};
|
|
|
|
|
|
|
|
static void vfio_ap_reset(DeviceState *dev)
|
|
|
|
{
|
|
|
|
int ret;
|
2023-10-09 05:20:47 +03:00
|
|
|
VFIOAPDevice *vapdev = VFIO_AP_DEVICE(dev);
|
2018-10-10 20:03:07 +03:00
|
|
|
|
|
|
|
ret = ioctl(vapdev->vdev.fd, VFIO_DEVICE_RESET);
|
|
|
|
if (ret) {
|
|
|
|
error_report("%s: failed to reset %s device: %s", __func__,
|
2018-10-16 14:51:54 +03:00
|
|
|
vapdev->vdev.name, strerror(errno));
|
2018-10-10 20:03:07 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static const VMStateDescription vfio_ap_vmstate = {
|
2019-05-21 18:15:41 +03:00
|
|
|
.name = "vfio-ap",
|
2018-10-10 20:03:07 +03:00
|
|
|
.unmigratable = 1,
|
|
|
|
};
|
|
|
|
|
2023-11-21 11:44:14 +03:00
|
|
|
static void vfio_ap_instance_init(Object *obj)
|
|
|
|
{
|
|
|
|
VFIOAPDevice *vapdev = VFIO_AP_DEVICE(obj);
|
2023-11-21 11:44:23 +03:00
|
|
|
VFIODevice *vbasedev = &vapdev->vdev;
|
2023-11-21 11:44:14 +03:00
|
|
|
|
2023-11-21 11:44:23 +03:00
|
|
|
/*
|
|
|
|
* vfio-ap devices operate in a way compatible with discarding of
|
|
|
|
* memory in RAM blocks, as no pages are pinned in the host.
|
|
|
|
* This needs to be set before vfio_get_device() for vfio common to
|
|
|
|
* handle ram_block_discard_disable().
|
|
|
|
*/
|
2023-11-21 11:44:25 +03:00
|
|
|
vfio_device_init(vbasedev, VFIO_DEVICE_TYPE_AP, &vfio_ap_ops,
|
|
|
|
DEVICE(vapdev), true);
|
2023-11-21 11:44:14 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_IOMMUFD
|
|
|
|
static void vfio_ap_set_fd(Object *obj, const char *str, Error **errp)
|
|
|
|
{
|
|
|
|
vfio_device_set_fd(&VFIO_AP_DEVICE(obj)->vdev, str, errp);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-10-10 20:03:07 +03:00
|
|
|
static void vfio_ap_class_init(ObjectClass *klass, void *data)
|
|
|
|
{
|
|
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
|
|
|
|
2020-01-10 18:30:32 +03:00
|
|
|
device_class_set_props(dc, vfio_ap_properties);
|
2023-11-21 11:44:14 +03:00
|
|
|
#ifdef CONFIG_IOMMUFD
|
|
|
|
object_class_property_add_str(klass, "fd", NULL, vfio_ap_set_fd);
|
|
|
|
#endif
|
2018-10-10 20:03:07 +03:00
|
|
|
dc->vmsd = &vfio_ap_vmstate;
|
|
|
|
dc->desc = "VFIO-based AP device assignment";
|
|
|
|
set_bit(DEVICE_CATEGORY_MISC, dc->categories);
|
|
|
|
dc->realize = vfio_ap_realize;
|
|
|
|
dc->unrealize = vfio_ap_unrealize;
|
s390x/vfio-ap: Implement hot plug/unplug of vfio-ap device
Introduces hot plug/unplug support for the vfio-ap device.
To hot plug a vfio-ap device using the QEMU device_add command:
(qemu) device_add vfio-ap,sysfsdev=$path-to-mdev
Where $path-to-mdev is the absolute path to the mediated matrix device
to which AP resources to be used by the guest have been assigned.
A vfio-ap device can be hot plugged only if:
1. A vfio-ap device has not been attached to the virtual machine's ap-bus
via the QEMU command line or a prior hot plug action.
2. The guest was started with the CPU model feature for AP enabled
(e.g., -cpu host,ap=on)
To hot unplug a vfio-ap device using the QEMU device_del command:
(qemu) device_del vfio-ap,sysfsdev=$path-to-mdev
Where $path-to-mdev is the absolute path to the mediated matrix device
specified when the vfio-ap device was attached to the virtual machine's
ap-bus.
A vfio-ap device can be hot unplugged only if:
1. A vfio-ap device has been attached to the virtual machine's ap-bus
via the QEMU command line or a prior hot plug action.
2. The guest was started with the CPU model feature for AP enabled
(e.g., -cpu host,ap=on)
Please note that a hot plug handler is not necessary for the vfio-ap device
because the AP matrix configuration for the guest is performed by the
kernel device driver when the vfio-ap device is realized. The vfio-ap device
represents a VFIO mediated device created in the host sysfs for use by a guest.
The mdev device is configured with an AP matrix (i.e., adapters and domains) via
its sysfs attribute interfaces prior to starting the guest or plugging a vfio-ap
device in. When the device is realized, a file descriptor is opened on the mdev
device which results in a callback to the vfio_ap kernel device driver. The
device driver then configures the AP matrix in the guest's SIE state description
from the AP matrix assigned via the mdev device's sysfs interfaces. The AP
devices will be created for the guest when the AP bus running on the guest
subsequently performs its periodic scan for AP devices.
The qdev_simple_device_unplug_cb() callback function is used for the same
reaons; namely, the vfio_ap kernel device driver will perform the AP resource
de-configuration for the guest when the vfio-ap device is unplugged. When the
vfio-ap device is unrealized, the mdev device file descriptor is closed which
results in a callback to the vfio_ap kernel device driver. The device driver
then clears the AP matrix configuration in the guest's SIE state description
and resets all of the affected queues. The AP devices created for the guest
will be removed when the AP bus running on the guest subsequently performs
its periodic scan and finds there are no longer any AP resources assigned to the
guest.
Signed-off-by: Tony Krowiak <akrowiak@linux.ibm.com>
Reviewed-by: Pierre Morel <pmorel@linux.ibm.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
Reviewed-by: Halil Pasic <pasic@linux.ibm.com>
Tested-by: Pierre Morel <pmorel@linux.ibm.com>
Message-Id: <1550519397-25359-2-git-send-email-akrowiak@linux.ibm.com>
[CH: adapt to changed qbus_set_hotplug_handler() signature]
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-02-18 22:49:56 +03:00
|
|
|
dc->hotpluggable = true;
|
2018-10-10 20:03:07 +03:00
|
|
|
dc->reset = vfio_ap_reset;
|
|
|
|
dc->bus_type = TYPE_AP_BUS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo vfio_ap_info = {
|
2020-09-03 01:42:16 +03:00
|
|
|
.name = TYPE_VFIO_AP_DEVICE,
|
2020-09-03 01:42:13 +03:00
|
|
|
.parent = TYPE_AP_DEVICE,
|
2018-10-10 20:03:07 +03:00
|
|
|
.instance_size = sizeof(VFIOAPDevice),
|
2023-11-21 11:44:14 +03:00
|
|
|
.instance_init = vfio_ap_instance_init,
|
2018-10-10 20:03:07 +03:00
|
|
|
.class_init = vfio_ap_class_init,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void vfio_ap_type_init(void)
|
|
|
|
{
|
|
|
|
type_register_static(&vfio_ap_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
type_init(vfio_ap_type_init)
|