{"id":1839916,"url":"http://patchwork.ozlabs.org/api/patches/1839916/?format=json","web_url":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20230926185738.277351-15-david@redhat.com/","project":{"id":14,"url":"http://patchwork.ozlabs.org/api/projects/14/?format=json","name":"QEMU Development","link_name":"qemu-devel","list_id":"qemu-devel.nongnu.org","list_email":"qemu-devel@nongnu.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20230926185738.277351-15-david@redhat.com>","list_archive_url":null,"date":"2023-09-26T18:57:34","name":"[v4,14/18] virtio-mem: Pass non-const VirtIOMEM via virtio_mem_range_cb","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"dc021a09f12724fc5e6d468ae7d277590dcafa45","submitter":{"id":70402,"url":"http://patchwork.ozlabs.org/api/people/70402/?format=json","name":"David Hildenbrand","email":"david@redhat.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20230926185738.277351-15-david@redhat.com/mbox/","series":[{"id":374991,"url":"http://patchwork.ozlabs.org/api/series/374991/?format=json","web_url":"http://patchwork.ozlabs.org/project/qemu-devel/list/?series=374991","date":"2023-09-26T18:57:23","name":"virtio-mem: Expose device memory through multiple memslots","version":4,"mbox":"http://patchwork.ozlabs.org/series/374991/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/1839916/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/1839916/checks/","tags":{},"related":[],"headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=M2MP9cja;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4Rw8Hv07M6z1ynX\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 27 Sep 2023 05:02:19 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1qlDIA-0001v0-7g; Tue, 26 Sep 2023 15:00:18 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <david@redhat.com>) id 1qlDHl-0001O5-97\n for qemu-devel@nongnu.org; Tue, 26 Sep 2023 14:59:53 -0400","from us-smtp-delivery-124.mimecast.com ([170.10.129.124])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <david@redhat.com>) id 1qlDHj-0003EA-E0\n for qemu-devel@nongnu.org; Tue, 26 Sep 2023 14:59:52 -0400","from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73])\n by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n us-mta-515-x1igqqiVPtOTFGoR0hcyVg-1; Tue, 26 Sep 2023 14:59:47 -0400","from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com\n [10.11.54.4])\n (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n (No client certificate requested)\n by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 140603C0BE3C;\n Tue, 26 Sep 2023 18:59:47 +0000 (UTC)","from t14s.fritz.box (unknown [10.39.192.33])\n by smtp.corp.redhat.com (Postfix) with ESMTP id 9FBBE2026D4B;\n Tue, 26 Sep 2023 18:59:41 +0000 (UTC)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1695754790;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=adaLIN+oCidzf9Yl1V7wtFZZqNM0t8YdJyA6CFGysIY=;\n b=M2MP9cjadlp5ycdvKQVxLLyeYFRoIdINtm+WBucT3RUQj1v1ve/WLf8FFRskS38NQAVG34\n c7QMP2/ejWIrwKELLLi9mO08wjVoDqIFt7s9cWq1VJDMMSvzzsDJVfbXlpUNaLP2VeJQkK\n 9wfDAWOEYuo2PtsnAVNIvVSj5JEaP5M=","X-MC-Unique":"x1igqqiVPtOTFGoR0hcyVg-1","From":"David Hildenbrand <david@redhat.com>","To":"qemu-devel@nongnu.org","Cc":"David Hildenbrand <david@redhat.com>, Paolo Bonzini <pbonzini@redhat.com>,\n Igor Mammedov <imammedo@redhat.com>,\n Xiao Guangrong <xiaoguangrong.eric@gmail.com>,\n \"Michael S. Tsirkin\" <mst@redhat.com>, Peter Xu <peterx@redhat.com>,\n\t=?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= <philmd@linaro.org>,\n Eduardo Habkost <eduardo@habkost.net>,\n Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,\n Yanan Wang <wangyanan55@huawei.com>, Michal Privoznik <mprivozn@redhat.com>,\n\t=?utf-8?q?Daniel_P_=2E_Berrang=C3=A9?= <berrange@redhat.com>,\n Gavin Shan <gshan@redhat.com>, Alex Williamson <alex.williamson@redhat.com>,\n Stefan Hajnoczi <stefanha@redhat.com>,\n \"Maciej S . Szmigiero\" <mail@maciej.szmigiero.name>, kvm@vger.kernel.org","Subject":"[PATCH v4 14/18] virtio-mem: Pass non-const VirtIOMEM via\n virtio_mem_range_cb","Date":"Tue, 26 Sep 2023 20:57:34 +0200","Message-ID":"<20230926185738.277351-15-david@redhat.com>","In-Reply-To":"<20230926185738.277351-1-david@redhat.com>","References":"<20230926185738.277351-1-david@redhat.com>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","X-Scanned-By":"MIMEDefang 3.1 on 10.11.54.4","Received-SPF":"pass client-ip=170.10.129.124; envelope-from=david@redhat.com;\n helo=us-smtp-delivery-124.mimecast.com","X-Spam_score_int":"12","X-Spam_score":"1.2","X-Spam_bar":"+","X-Spam_report":"(1.2 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001,\n RCVD_IN_SBL_CSS=3.335, SPF_HELO_NONE=0.001,\n SPF_PASS=-0.001 autolearn=no autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"<qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"},"content":"Let's prepare for a user that has to modify the VirtIOMEM device state.\n\nSigned-off-by: David Hildenbrand <david@redhat.com>\n---\n hw/virtio/virtio-mem.c | 10 +++++-----\n 1 file changed, 5 insertions(+), 5 deletions(-)","diff":"diff --git a/hw/virtio/virtio-mem.c b/hw/virtio/virtio-mem.c\nindex da5b09cefc..0b0e6c5090 100644\n--- a/hw/virtio/virtio-mem.c\n+++ b/hw/virtio/virtio-mem.c\n@@ -177,10 +177,10 @@ static bool virtio_mem_is_busy(void)\n     return migration_in_incoming_postcopy() || !migration_is_idle();\n }\n \n-typedef int (*virtio_mem_range_cb)(const VirtIOMEM *vmem, void *arg,\n+typedef int (*virtio_mem_range_cb)(VirtIOMEM *vmem, void *arg,\n                                    uint64_t offset, uint64_t size);\n \n-static int virtio_mem_for_each_unplugged_range(const VirtIOMEM *vmem, void *arg,\n+static int virtio_mem_for_each_unplugged_range(VirtIOMEM *vmem, void *arg,\n                                                virtio_mem_range_cb cb)\n {\n     unsigned long first_zero_bit, last_zero_bit;\n@@ -204,7 +204,7 @@ static int virtio_mem_for_each_unplugged_range(const VirtIOMEM *vmem, void *arg,\n     return ret;\n }\n \n-static int virtio_mem_for_each_plugged_range(const VirtIOMEM *vmem, void *arg,\n+static int virtio_mem_for_each_plugged_range(VirtIOMEM *vmem, void *arg,\n                                              virtio_mem_range_cb cb)\n {\n     unsigned long first_bit, last_bit;\n@@ -969,7 +969,7 @@ static void virtio_mem_device_unrealize(DeviceState *dev)\n     ram_block_coordinated_discard_require(false);\n }\n \n-static int virtio_mem_discard_range_cb(const VirtIOMEM *vmem, void *arg,\n+static int virtio_mem_discard_range_cb(VirtIOMEM *vmem, void *arg,\n                                        uint64_t offset, uint64_t size)\n {\n     RAMBlock *rb = vmem->memdev->mr.ram_block;\n@@ -1021,7 +1021,7 @@ static int virtio_mem_post_load(void *opaque, int version_id)\n     return virtio_mem_restore_unplugged(vmem);\n }\n \n-static int virtio_mem_prealloc_range_cb(const VirtIOMEM *vmem, void *arg,\n+static int virtio_mem_prealloc_range_cb(VirtIOMEM *vmem, void *arg,\n                                         uint64_t offset, uint64_t size)\n {\n     void *area = memory_region_get_ram_ptr(&vmem->memdev->mr) + offset;\n","prefixes":["v4","14/18"]}