[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v5 04/13] vfio/iommufd: Return errno in iommufd_cdev_attach_ioas_
From: |
Joao Martins |
Subject: |
[PATCH v5 04/13] vfio/iommufd: Return errno in iommufd_cdev_attach_ioas_hwpt() |
Date: |
Fri, 19 Jul 2024 13:04:52 +0100 |
In preparation to implement auto domains have the attach function
return the errno it got during domain attach instead of a bool.
-EINVAL is tracked to track domain incompatibilities, and decide whether
to create a new IOMMU domain.
Signed-off-by: Joao Martins <joao.m.martins@oracle.com>
Reviewed-by: Cédric Le Goater <clg@redhat.com>
Reviewed-by: Eric Auger <eric.auger@redhat.com>
Reviewed-by: Zhenzhong Duan <zhenzhong.duan@intel.com>
---
hw/vfio/iommufd.c | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/hw/vfio/iommufd.c b/hw/vfio/iommufd.c
index 604eaa4d9a5d..077dea8f1b64 100644
--- a/hw/vfio/iommufd.c
+++ b/hw/vfio/iommufd.c
@@ -172,7 +172,7 @@ out:
return ret;
}
-static bool iommufd_cdev_attach_ioas_hwpt(VFIODevice *vbasedev, uint32_t id,
+static int iommufd_cdev_attach_ioas_hwpt(VFIODevice *vbasedev, uint32_t id,
Error **errp)
{
int iommufd = vbasedev->iommufd->fd;
@@ -187,12 +187,12 @@ static bool iommufd_cdev_attach_ioas_hwpt(VFIODevice
*vbasedev, uint32_t id,
error_setg_errno(errp, errno,
"[iommufd=%d] error attach %s (%d) to id=%d",
iommufd, vbasedev->name, vbasedev->fd, id);
- return false;
+ return -errno;
}
trace_iommufd_cdev_attach_ioas_hwpt(iommufd, vbasedev->name,
vbasedev->fd, id);
- return true;
+ return 0;
}
static bool iommufd_cdev_detach_ioas_hwpt(VFIODevice *vbasedev, Error **errp)
@@ -216,7 +216,7 @@ static bool iommufd_cdev_attach_container(VFIODevice
*vbasedev,
VFIOIOMMUFDContainer *container,
Error **errp)
{
- return iommufd_cdev_attach_ioas_hwpt(vbasedev, container->ioas_id, errp);
+ return !iommufd_cdev_attach_ioas_hwpt(vbasedev, container->ioas_id, errp);
}
static void iommufd_cdev_detach_container(VFIODevice *vbasedev,
--
2.17.2
- Re: [PATCH v5 12/13] vfio/migration: Don't block migration device dirty tracking is unsupported, (continued)
- Re: [PATCH v5 12/13] vfio/migration: Don't block migration device dirty tracking is unsupported, Cédric Le Goater, 2024/07/22
- Re: [PATCH v5 12/13] vfio/migration: Don't block migration device dirty tracking is unsupported, Joao Martins, 2024/07/22
- Re: [PATCH v5 12/13] vfio/migration: Don't block migration device dirty tracking is unsupported, Cédric Le Goater, 2024/07/22
- Re: [PATCH v5 12/13] vfio/migration: Don't block migration device dirty tracking is unsupported, Cédric Le Goater, 2024/07/22
- Re: [PATCH v5 12/13] vfio/migration: Don't block migration device dirty tracking is unsupported, Joao Martins, 2024/07/22
- Re: [PATCH v5 12/13] vfio/migration: Don't block migration device dirty tracking is unsupported, Joao Martins, 2024/07/22
[PATCH v5 01/13] vfio/pci: Extract mdev check into an helper, Joao Martins, 2024/07/19
[PATCH v5 02/13] vfio/iommufd: Don't initialize nor set a HOST_IOMMU_DEVICE with mdev, Joao Martins, 2024/07/19
[PATCH v5 04/13] vfio/iommufd: Return errno in iommufd_cdev_attach_ioas_hwpt(),
Joao Martins <=
[PATCH v5 06/13] vfio/{iommufd,container}: Remove caps::aw_bits, Joao Martins, 2024/07/19
[PATCH v5 09/13] vfio/iommufd: Probe and request hwpt dirty tracking capability, Joao Martins, 2024/07/19