From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-19.9 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PULL_REQUEST,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4502AC4742C for ; Wed, 4 Nov 2020 04:52:18 +0000 (UTC) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 6746C2074B for ; Wed, 4 Nov 2020 04:52:17 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="Ht7WRqdB" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6746C2074B Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Received: from localhost ([::1]:34976 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kaAmO-0006gn-DE for qemu-devel@archiver.kernel.org; Tue, 03 Nov 2020 23:52:16 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:59046) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kaAl1-0005Gw-I7 for qemu-devel@nongnu.org; Tue, 03 Nov 2020 23:50:51 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:53565) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.90_1) (envelope-from ) id 1kaAky-0004Eu-Hw for qemu-devel@nongnu.org; Tue, 03 Nov 2020 23:50:50 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1604465446; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=9sMWRc/jdg+NkAS7jMepsgCJuNYB7qppeqnhiE9dbpM=; b=Ht7WRqdBb0kkc6XFUwizYv0EwyAqio8ugz1kNkfx134kp8toj0wl1sRw99aH0Z4Ij8aDqr udAk0AFS1t2V4ptx2uRk8Glq3pySLG8Ikq5bZZ5b5621V99vyZMQCC4HaGwqD7jFnp3l2B /rOSiyKRQf0g9SvnHtDysXpp65MO6WY= Received: from mail-wm1-f71.google.com (mail-wm1-f71.google.com [209.85.128.71]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-419-Pjf76Do-OdqhSVLN-mv1tw-1; Tue, 03 Nov 2020 23:50:45 -0500 X-MC-Unique: Pjf76Do-OdqhSVLN-mv1tw-1 Received: by mail-wm1-f71.google.com with SMTP id c204so732119wmd.5 for ; Tue, 03 Nov 2020 20:50:44 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:mime-version :content-disposition:content-transfer-encoding; bh=9sMWRc/jdg+NkAS7jMepsgCJuNYB7qppeqnhiE9dbpM=; b=JL3mUWHN4CL/Ugmpg6JMHC4hjwsEEkAxC4bRdNuphTmGtfZ7GfGqB4BlKdDAsr/zZW nUKQ38di7NbSHk1voXgOH8Q6N56AyOzKonpKn3rLyzYQBMQiDojtF6Q4/0S7DdIS49SY NQChvbczv6pYGw1Cifv7HEQ1UDCjEAvwh+buGSSd80v1hXh38FpuWSHG//RwmVlcDWAw cRRD+iud5lARzunt1Ge333awDdsFDG0FNw/JunYgsQee8tWYOwCLRJzZnP7PXN4PiGrl 3+AH5CY9j9sjIUGEWYx1PhldRvhhn/vyjNDlEnM1UdWstd6PK6CRfs+nClpqo9UWpubf 8DtA== X-Gm-Message-State: AOAM5311QNGTHcWlINga/VuFb98qvKqHN9+fH5lEFwZ0NZe0dXlmB8Jn yR19W7tccBjvjXJdBbCUMfosIKaEP61bQlE2lAfC8NZ8OXDX2WhoqioS9GYa+njwEjW1E3IkGuI WG5Ino7Lo0Ghohzc= X-Received: by 2002:a1c:2d53:: with SMTP id t80mr2313962wmt.125.1604465443512; Tue, 03 Nov 2020 20:50:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJwgoYDV3FhIZulWSZ6qSzvGvKRYsTbWeL9d0F1j5ikdKkDQyLGkAkfJAuyKS2/ujj2DC24u6A== X-Received: by 2002:a1c:2d53:: with SMTP id t80mr2313949wmt.125.1604465443293; Tue, 03 Nov 2020 20:50:43 -0800 (PST) Received: from redhat.com (bzq-79-176-118-93.red.bezeqint.net. [79.176.118.93]) by smtp.gmail.com with ESMTPSA id y10sm844892wru.94.2020.11.03.20.50.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Nov 2020 20:50:42 -0800 (PST) Date: Tue, 3 Nov 2020 23:50:38 -0500 From: "Michael S. Tsirkin" To: qemu-devel@nongnu.org Subject: [PULL v2 00/38] pc,pci,vhost,virtio: fixes Message-ID: <20201104044937.226370-1-mst@redhat.com> MIME-Version: 1.0 X-Mailer: git-send-email 2.27.0.106.g8ac3dc51b1 X-Mutt-Fcc: =sent Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mst@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=216.205.24.124; envelope-from=mst@redhat.com; helo=us-smtp-delivery-124.mimecast.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/11/03 00:03:41 X-ACL-Warn: Detected OS = Linux 2.2.x-3.x [generic] [fuzzy] X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Peter Maydell Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: "Qemu-devel" Sending v2 since v1 was borken on 32 bit. The following changes since commit c7a7a877b716cf14848f1fd5c754d293e2f8d852: Merge remote-tracking branch 'remotes/pmaydell/tags/pull-target-arm-20201102' into staging (2020-11-03 10:38:05 +0000) are available in the Git repository at: git://git.kernel.org/pub/scm/virt/kvm/mst/qemu.git tags/for_upstream for you to fetch changes up to 5676edd6d984b0696d206faa230c8da15e271044: vhost-user-blk-test: fix races by using fd passing (2020-11-03 16:39:06 -0500) ---------------------------------------------------------------- pc,pci,vhost,virtio: fixes Lots of fixes all over the place. virtio-mem and virtio-iommu patches are kind of fixes but it seems better to just make them behave sanely than try to educate users about the limitations ... Signed-off-by: Michael S. Tsirkin ---------------------------------------------------------------- Bharat Bhushan (7): virtio-iommu: Add memory notifiers for map/unmap virtio-iommu: Call memory notifiers in attach/detach virtio-iommu: Add replay() memory region callback virtio-iommu: Add notify_flag_changed() memory region callback memory: Add interface to set iommu page size mask vfio: Set IOMMU page size as per host supported page size virtio-iommu: Set supported page size mask Cindy Lu (2): vhost-vdpa: Add qemu_close in vhost_vdpa_cleanup net: Add vhost-vdpa in show_netdevs() Coiby Xu (1): test: new qTest case to test the vhost-user-blk-server David Hildenbrand (6): virtio-mem: Make sure "addr" is always multiples of the block size virtio-mem: Make sure "usable_region_size" is always multiples of the block size virtio-mem: Probe THP size to determine default block size memory-device: Support big alignment requirements memory-device: Add get_min_alignment() callback virito-mem: Implement get_min_alignment() Jean-Philippe Brucker (3): virtio-iommu: Fix virtio_iommu_mr() virtio-iommu: Store memory region in endpoint struct vfio: Don't issue full 2^64 unmap Jin Yu (1): vhost-blk: set features before setting inflight feature Michael S. Tsirkin (1): pc: comment style fixup Philippe Mathieu-Daudé (2): hw/virtio/vhost-backend: Fix Coverity CID 1432871 hw/smbios: Fix leaked fd in save_opt_one() error path Stefan Hajnoczi (12): Revert "vhost-blk: set features before setting inflight feature" libvhost-user: follow QEMU comment style configure: introduce --enable-vhost-user-blk-server block/export: make vhost-user-blk config space little-endian block/export: fix vhost-user-blk get_config() information leak contrib/vhost-user-blk: fix get_config() information leak tests/qtest: add multi-queue test case to vhost-user-blk-test libqtest: add qtest_socket_server() vhost-user-blk-test: rename destroy_drive() to destroy_file() vhost-user-blk-test: close fork child file descriptors vhost-user-blk-test: drop unused return value vhost-user-blk-test: fix races by using fd passing Xinhao Zhang (3): hw/acpi : Don't use '#' flag of printf format hw/acpi : add space before the open parenthesis '(' hw/acpi : add spaces around operator configure | 15 + contrib/libvhost-user/libvhost-user.h | 15 +- include/exec/memory.h | 38 ++ include/hw/mem/memory-device.h | 10 + include/hw/virtio/vhost.h | 2 +- tests/qtest/libqos/libqtest.h | 25 + tests/qtest/libqos/vhost-user-blk.h | 48 ++ block/export/export.c | 4 +- block/export/vhost-user-blk-server.c | 28 +- contrib/vhost-user-blk/vhost-user-blk.c | 2 + hw/acpi/core.c | 2 +- hw/acpi/nvdimm.c | 20 +- hw/acpi/pcihp.c | 2 +- hw/block/vhost-user-blk.c | 2 +- hw/i386/pc.c | 9 +- hw/mem/memory-device.c | 20 +- hw/smbios/smbios.c | 4 +- hw/vfio/common.c | 19 + hw/virtio/vhost-backend.c | 4 +- hw/virtio/vhost.c | 8 +- hw/virtio/virtio-iommu.c | 205 +++++++- hw/virtio/virtio-mem-pci.c | 7 + hw/virtio/virtio-mem.c | 113 ++++- net/net.c | 3 + net/vhost-vdpa.c | 4 + softmmu/memory.c | 13 + tests/qtest/libqos/vhost-user-blk.c | 129 +++++ tests/qtest/libqtest.c | 76 ++- tests/qtest/vhost-user-blk-test.c | 843 ++++++++++++++++++++++++++++++++ block/export/meson.build | 2 +- hw/virtio/trace-events | 6 + tests/qtest/libqos/meson.build | 1 + tests/qtest/meson.build | 2 + util/meson.build | 2 +- 34 files changed, 1606 insertions(+), 77 deletions(-) create mode 100644 tests/qtest/libqos/vhost-user-blk.h create mode 100644 tests/qtest/libqos/vhost-user-blk.c create mode 100644 tests/qtest/vhost-user-blk-test.c