-
- Downloads
Merge tag 'for_upstream' of https://git.kernel.org/pub/scm/virt/kvm/mst/qemu into staging
virtio,pc,pci: fixes, features, cleanups asymmetric crypto support for cryptodev-vhost-user rom migration when rom size changes poison get, inject, clear; mock cxl events and irq support for cxl shadow virtqueue offload support for vhost-vdpa vdpa now maps shadow vrings with MAP_SHARED max_cpus went up to 1024 and we default to smbios 3.0 for pc Fixes, cleanups all over the place. In particular hw/acpi: Fix PM control register access works around a very long standing bug in memory core. Signed-off-by:Michael S. Tsirkin <mst@redhat.com> # -----BEGIN PGP SIGNATURE----- # # iQFDBAABCAAtFiEEXQn9CHHI+FuUyooNKB8NuNKNVGkFAmSZl5EPHG1zdEByZWRo # YXQuY29tAAoJECgfDbjSjVRph+8H/RZodqCadmQ1evpeWs7RBSvJeZgbJTVl/9/h # +ObvEmVz2+X4D+O1Kxh54vDV0SNVq3XjyrFy3Ur57MAR6r2ZWwB6HySaeFdi4zIm # N0SMkfUylDnf7ulyjzJoXDzHOoFnqAM6fU/jcoQXBIdUeeqwPrzLOZHrGrwevPWK # iH5JP66suOVlBuKLJjlUKI3/4vK3oTod5Xa3Oz2Cw1oODtbIa97N8ZAdBgZd3ah9 # 7mjZjcH54kFRwfidz/rkpY5NMru8BlD54MyEOWofvTL2w7aoWmVO99qHEK+SjLkG # x4Mx3aYlnOEvkJ+5yBHvtXS4Gc5T9ltY84AvcwPNuz4RKCORi1s= # =Do8p # -----END PGP SIGNATURE----- # gpg: Signature made Mon 26 Jun 2023 03:50:09 PM CEST # gpg: using RSA key 5D09FD0871C8F85B94CA8A0D281F0DB8D28D5469 # gpg: issuer "mst@redhat.com" # gpg: Good signature from "Michael S. Tsirkin <mst@kernel.org>" [undefined] # gpg: aka "Michael S. Tsirkin <mst@redhat.com>" [undefined] # gpg: WARNING: This key is not certified with a trusted signature! # gpg: There is no indication that the signature belongs to the owner. # Primary key fingerprint: 0270 606B 6F3C DF3D 0B17 0970 C350 3912 AFBE 8E67 # Subkey fingerprint: 5D09 FD08 71C8 F85B 94CA 8A0D 281F 0DB8 D28D 5469 * tag 'for_upstream' of https://git.kernel.org/pub/scm/virt/kvm/mst/qemu : (53 commits) vhost-vdpa: do not cleanup the vdpa/vhost-net structures if peer nic is present vhost_net: add an assertion for TAP client backends intel_iommu: Fix address space unmap intel_iommu: Fix flag check in replay intel_iommu: Fix a potential issue in VFIO dirty page sync vhost-user: fully use new backend/frontend naming virtio-scsi: avoid dangling host notifier in ->ioeventfd_stop() hw/i386/pc: Clean up pc_machine_initfn vdpa: fix not using CVQ buffer in case of error vdpa: mask _F_CTRL_GUEST_OFFLOADS for vhost vdpa devices vhost: fix vhost_dev_enable_notifiers() error case vdpa: Allow VIRTIO_NET_F_CTRL_GUEST_OFFLOADS in SVQ vdpa: Add vhost_vdpa_net_load_offloads() virtio-net: expose virtio_net_supported_guest_offloads() hw/net/virtio-net: make some VirtIONet const vdpa: reuse virtio_vdev_has_feature() include/hw/virtio: make some VirtIODevice const vdpa: map shadow vrings with MAP_SHARED vdpa: reorder vhost_vdpa_net_cvq_cmd_page_len function vdpa: do not block migration if device has cvq and x-svq=on ... Signed-off-by:
Richard Henderson <richard.henderson@linaro.org>
Showing
- backends/cryptodev-vhost-user.c 4 additions, 5 deletionsbackends/cryptodev-vhost-user.c
- backends/cryptodev.c 1 addition, 1 deletionbackends/cryptodev.c
- block/export/vhost-user-blk-server.c 1 addition, 1 deletionblock/export/vhost-user-blk-server.c
- contrib/vhost-user-blk/vhost-user-blk.c 1 addition, 1 deletioncontrib/vhost-user-blk/vhost-user-blk.c
- docs/devel/loads-stores.rst 2 additions, 0 deletionsdocs/devel/loads-stores.rst
- hw/acpi/core.c 26 additions, 26 deletionshw/acpi/core.c
- hw/block/dataplane/meson.build 1 addition, 1 deletionhw/block/dataplane/meson.build
- hw/block/dataplane/virtio-blk.c 0 additions, 1 deletionhw/block/dataplane/virtio-blk.c
- hw/block/vhost-user-blk.c 1 addition, 1 deletionhw/block/vhost-user-blk.c
- hw/cxl/cxl-device-utils.c 38 additions, 5 deletionshw/cxl/cxl-device-utils.c
- hw/cxl/cxl-events.c 248 additions, 0 deletionshw/cxl/cxl-events.c
- hw/cxl/cxl-mailbox-utils.c 333 additions, 47 deletionshw/cxl/cxl-mailbox-utils.c
- hw/cxl/meson.build 1 addition, 0 deletionshw/cxl/meson.build
- hw/display/vhost-user-gpu.c 1 addition, 1 deletionhw/display/vhost-user-gpu.c
- hw/i386/intel_iommu.c 5 additions, 8 deletionshw/i386/intel_iommu.c
- hw/i386/pc.c 4 additions, 2 deletionshw/i386/pc.c
- hw/i386/pc_piix.c 5 additions, 0 deletionshw/i386/pc_piix.c
- hw/i386/pc_q35.c 7 additions, 1 deletionhw/i386/pc_q35.c
- hw/input/vhost-user-input.c 1 addition, 1 deletionhw/input/vhost-user-input.c
- hw/mem/cxl_type3.c 384 additions, 1 deletionhw/mem/cxl_type3.c
Loading
Please register or sign in to comment