Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2217647/?format=api
{ "id": 2217647, "url": "http://patchwork.ozlabs.org/api/patches/2217647/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260330095226.158386-4-dtalexundeer@yandex-team.ru/", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260330095226.158386-4-dtalexundeer@yandex-team.ru>", "list_archive_url": null, "date": "2026-03-30T09:52:24", "name": "[v3,3/5] vhost-user: add skip_drain param to do_vhost_virtqueue_stop", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "c32cbd154d85537047b6524d151461e2f70367df", "submitter": { "id": 90655, "url": "http://patchwork.ozlabs.org/api/people/90655/?format=api", "name": "Alexandr Moshkov", "email": "dtalexundeer@yandex-team.ru" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260330095226.158386-4-dtalexundeer@yandex-team.ru/mbox/", "series": [ { "id": 497991, "url": "http://patchwork.ozlabs.org/api/series/497991/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=497991", "date": "2026-03-30T09:52:26", "name": "vhost-user-blk: fix compatibility with older qemu versions", "version": 3, "mbox": "http://patchwork.ozlabs.org/series/497991/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2217647/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2217647/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=yandex-team.ru header.i=@yandex-team.ru\n header.a=rsa-sha256 header.s=default header.b=POzGlH0h;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)", "mail-nwsmtp-smtp-corp-main-83.vla.yp-c.yandex.net;\n dkim=pass header.i=@yandex-team.ru" ], "Received": [ "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fkmmj4YyTz1yG8\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 30 Mar 2026 20:54:13 +1100 (AEDT)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1w79Ix-0005R5-EH; Mon, 30 Mar 2026 05:53:07 -0400", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <dtalexundeer@yandex-team.ru>)\n id 1w79Ib-0005Mv-Lw; Mon, 30 Mar 2026 05:52:48 -0400", "from forwardcorp1a.mail.yandex.net ([178.154.239.72])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <dtalexundeer@yandex-team.ru>)\n id 1w79IY-00064H-KG; Mon, 30 Mar 2026 05:52:45 -0400", "from mail-nwsmtp-smtp-corp-main-83.vla.yp-c.yandex.net\n (mail-nwsmtp-smtp-corp-main-83.vla.yp-c.yandex.net\n [IPv6:2a02:6b8:c2d:3530:0:640:eca4:0])\n by forwardcorp1a.mail.yandex.net (Yandex) with ESMTPS id BBA7DC01FD;\n Mon, 30 Mar 2026 12:52:38 +0300 (MSK)", "from dtalexundeer-nx.yandex-team.ru (unknown\n [2a02:6bf:8080:78d::1:13])\n by mail-nwsmtp-smtp-corp-main-83.vla.yp-c.yandex.net (smtpcorp/Yandex) with\n ESMTPSA id QqVNFG1Af4Y0-vonzmI8G; Mon, 30 Mar 2026 12:52:38 +0300" ], "Precedence": "bulk", "X-Yandex-Fwd": "1", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.ru;\n s=default; t=1774864358;\n bh=vQGG90HeFkAMc6aN0TMc7niUql1S8+VMjbGjzs+duaQ=;\n h=Message-Id:Date:In-Reply-To:Cc:Subject:References:To:From;\n b=POzGlH0hrvukFhTvbX7ClBGoLdrEnALQ5Cnt8aP+wMnUR1UzL70cnIcFZUfnsdyDJ\n Y0go2EhHhMkSmGxKzmUzuXgaZS2Z90Fg/sRdm+ubxmk3j1LWLMCxXAdvCQmHCwhSF2\n 6yP3K0OccafyUJKkxgQSkeuNsGTINIwQp3snm7Ng=", "From": "Alexandr Moshkov <dtalexundeer@yandex-team.ru>", "To": "qemu-devel@nongnu.org", "Cc": "\"Gonglei (Arei)\" <arei.gonglei@huawei.com>,\n =?utf-8?q?Alex_Benn=C3=A9e?= <alex.bennee@linaro.org>,\n Milan Zamazal <mzamazal@redhat.com>, Raphael Norwitz <rnorwitz@nvidia.com>,\n Paolo Bonzini <pbonzini@redhat.com>, Jason Wang <jasowang@redhat.com>,\n qemu-block@nongnu.org, Fam Zheng <fam@euphon.net>,\n zhenwei pi <zhenwei.pi@linux.dev>, Hanna Reitz <hreitz@redhat.com>,\n virtio-fs@lists.linux.dev, Pierrick Bouvier <pierrick.bouvier@linaro.org>,\n Stefano Garzarella <sgarzare@redhat.com>,\n \"Michael S. Tsirkin\" <mst@redhat.com>,\n \"yc-core@yandex-team.ru\" <yc-core@yandex-team.ru>,\n Kevin Wolf <kwolf@redhat.com>, Stefan Hajnoczi <stefanha@redhat.com>,\n Alexandr Moshkov <dtalexundeer@yandex-team.ru>,\n Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>", "Subject": "[PATCH v3 3/5] vhost-user: add skip_drain param to\n do_vhost_virtqueue_stop", "Date": "Mon, 30 Mar 2026 14:52:24 +0500", "Message-Id": "<20260330095226.158386-4-dtalexundeer@yandex-team.ru>", "X-Mailer": "git-send-email 2.34.1", "In-Reply-To": "<20260330095226.158386-1-dtalexundeer@yandex-team.ru>", "References": "<20260330095226.158386-1-dtalexundeer@yandex-team.ru>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Received-SPF": "pass client-ip=178.154.239.72;\n envelope-from=dtalexundeer@yandex-team.ru; helo=forwardcorp1a.mail.yandex.net", "X-Spam_score_int": "0", "X-Spam_score": "-0.1", "X-Spam_bar": "/", "X-Spam_report": "(-0.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=1, RCVD_IN_VALIDITY_RPBL_BLOCKED=1,\n SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=no autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "Will be used in future commit for adding this param to GET_VRING_BASE\n\nReviewed-by: Vladimir Sementsov-Ogievskiy <vsementsov@yandex-team.ru>\nSigned-off-by: Alexandr Moshkov <dtalexundeer@yandex-team.ru>\n---\n backends/cryptodev-vhost.c | 2 +-\n backends/vhost-user.c | 2 +-\n hw/block/vhost-user-blk.c | 2 +-\n hw/net/vhost_net.c | 9 +++++----\n hw/scsi/vhost-scsi-common.c | 2 +-\n hw/virtio/vdpa-dev.c | 2 +-\n hw/virtio/vhost-user-base.c | 2 +-\n hw/virtio/vhost-user-fs.c | 2 +-\n hw/virtio/vhost-user-scmi.c | 2 +-\n hw/virtio/vhost-vsock-common.c | 2 +-\n hw/virtio/vhost.c | 28 +++++++++++++++++++---------\n include/hw/virtio/vhost.h | 7 +++++--\n 12 files changed, 38 insertions(+), 24 deletions(-)", "diff": "diff --git a/backends/cryptodev-vhost.c b/backends/cryptodev-vhost.c\nindex 943680a23a..7a457380d0 100644\n--- a/backends/cryptodev-vhost.c\n+++ b/backends/cryptodev-vhost.c\n@@ -110,7 +110,7 @@ static void\n cryptodev_vhost_stop_one(CryptoDevBackendVhost *crypto,\n VirtIODevice *dev)\n {\n- vhost_dev_stop(&crypto->dev, dev, false);\n+ vhost_dev_stop(&crypto->dev, dev, false, false);\n vhost_dev_disable_notifiers(&crypto->dev, dev);\n }\n \ndiff --git a/backends/vhost-user.c b/backends/vhost-user.c\nindex 42845329e7..10be713ebd 100644\n--- a/backends/vhost-user.c\n+++ b/backends/vhost-user.c\n@@ -108,7 +108,7 @@ vhost_user_backend_stop(VhostUserBackend *b)\n return 0;\n }\n \n- ret = vhost_dev_stop(&b->dev, b->vdev, true);\n+ ret = vhost_dev_stop(&b->dev, b->vdev, true, false);\n \n if (k->set_guest_notifiers &&\n k->set_guest_notifiers(qbus->parent, b->dev.nvqs, false) < 0) {\ndiff --git a/hw/block/vhost-user-blk.c b/hw/block/vhost-user-blk.c\nindex 179f027cb4..718fc94a29 100644\n--- a/hw/block/vhost-user-blk.c\n+++ b/hw/block/vhost-user-blk.c\n@@ -225,7 +225,7 @@ static int vhost_user_blk_stop(VirtIODevice *vdev)\n qemu_force_shutdown_requested();\n \n ret = force_stop ? vhost_dev_force_stop(&s->dev, vdev, true) :\n- vhost_dev_stop(&s->dev, vdev, true);\n+ vhost_dev_stop(&s->dev, vdev, true, false);\n \n if (k->set_guest_notifiers(qbus->parent, s->dev.nvqs, false) < 0) {\n error_report(\"vhost guest notifier cleanup failed: %d\", ret);\ndiff --git a/hw/net/vhost_net.c b/hw/net/vhost_net.c\nindex a8ee18a912..604f19e03a 100644\n--- a/hw/net/vhost_net.c\n+++ b/hw/net/vhost_net.c\n@@ -384,7 +384,7 @@ fail:\n if (net->nc->info->poll) {\n net->nc->info->poll(net->nc, true);\n }\n- vhost_dev_stop(&net->dev, dev, false);\n+ vhost_dev_stop(&net->dev, dev, false, false);\n fail_start:\n return r;\n }\n@@ -403,7 +403,7 @@ static void vhost_net_stop_one(struct vhost_net *net,\n if (net->nc->info->poll) {\n net->nc->info->poll(net->nc, true);\n }\n- vhost_dev_stop(&net->dev, dev, false);\n+ vhost_dev_stop(&net->dev, dev, false, false);\n if (net->nc->info->stop) {\n net->nc->info->stop(net->nc);\n }\n@@ -641,7 +641,8 @@ void vhost_net_virtqueue_reset(VirtIODevice *vdev, NetClientState *nc,\n vhost_virtqueue_stop(&net->dev,\n vdev,\n net->dev.vqs + idx,\n- net->dev.vq_index + idx);\n+ net->dev.vq_index + idx,\n+ false);\n }\n \n int vhost_net_virtqueue_restart(VirtIODevice *vdev, NetClientState *nc,\n@@ -691,7 +692,7 @@ err_start:\n assert(ret >= 0);\n }\n \n- vhost_dev_stop(&net->dev, vdev, false);\n+ vhost_dev_stop(&net->dev, vdev, false, false);\n \n return r;\n }\ndiff --git a/hw/scsi/vhost-scsi-common.c b/hw/scsi/vhost-scsi-common.c\nindex 0bb4305de6..41c1e45aac 100644\n--- a/hw/scsi/vhost-scsi-common.c\n+++ b/hw/scsi/vhost-scsi-common.c\n@@ -108,7 +108,7 @@ int vhost_scsi_common_stop(VHostSCSICommon *vsc)\n VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);\n int ret = 0;\n \n- ret = vhost_dev_stop(&vsc->dev, vdev, true);\n+ ret = vhost_dev_stop(&vsc->dev, vdev, true, false);\n \n if (k->set_guest_notifiers) {\n int r = k->set_guest_notifiers(qbus->parent, vsc->dev.nvqs, false);\ndiff --git a/hw/virtio/vdpa-dev.c b/hw/virtio/vdpa-dev.c\nindex 4532d63653..7279f18442 100644\n--- a/hw/virtio/vdpa-dev.c\n+++ b/hw/virtio/vdpa-dev.c\n@@ -301,7 +301,7 @@ static void vhost_vdpa_device_stop(VirtIODevice *vdev)\n return;\n }\n \n- vhost_dev_stop(&s->dev, vdev, false);\n+ vhost_dev_stop(&s->dev, vdev, false, false);\n \n ret = k->set_guest_notifiers(qbus->parent, s->dev.nvqs, false);\n if (ret < 0) {\ndiff --git a/hw/virtio/vhost-user-base.c b/hw/virtio/vhost-user-base.c\nindex 01ab9ca56b..9d3875a04b 100644\n--- a/hw/virtio/vhost-user-base.c\n+++ b/hw/virtio/vhost-user-base.c\n@@ -77,7 +77,7 @@ static int vub_stop(VirtIODevice *vdev)\n return 0;\n }\n \n- ret = vhost_dev_stop(&vub->vhost_dev, vdev, true);\n+ ret = vhost_dev_stop(&vub->vhost_dev, vdev, true, false);\n \n if (k->set_guest_notifiers(qbus->parent, vub->vhost_dev.nvqs, false) < 0) {\n error_report(\"vhost guest notifier cleanup failed: %d\", ret);\ndiff --git a/hw/virtio/vhost-user-fs.c b/hw/virtio/vhost-user-fs.c\nindex ad6fcacf06..2f6f6df67f 100644\n--- a/hw/virtio/vhost-user-fs.c\n+++ b/hw/virtio/vhost-user-fs.c\n@@ -111,7 +111,7 @@ static int vuf_stop(VirtIODevice *vdev)\n return 0;\n }\n \n- ret = vhost_dev_stop(&fs->vhost_dev, vdev, true);\n+ ret = vhost_dev_stop(&fs->vhost_dev, vdev, true, false);\n \n if (k->set_guest_notifiers(qbus->parent, fs->vhost_dev.nvqs, false) < 0) {\n error_report(\"vhost guest notifier cleanup failed: %d\", ret);\ndiff --git a/hw/virtio/vhost-user-scmi.c b/hw/virtio/vhost-user-scmi.c\nindex f9264c4374..dbde342a6e 100644\n--- a/hw/virtio/vhost-user-scmi.c\n+++ b/hw/virtio/vhost-user-scmi.c\n@@ -101,7 +101,7 @@ static int vu_scmi_stop(VirtIODevice *vdev)\n return 0;\n }\n \n- ret = vhost_dev_stop(vhost_dev, vdev, true);\n+ ret = vhost_dev_stop(vhost_dev, vdev, true, false);\n \n if (k->set_guest_notifiers(qbus->parent, vhost_dev->nvqs, false) < 0) {\n error_report(\"vhost guest notifier cleanup failed: %d\", ret);\ndiff --git a/hw/virtio/vhost-vsock-common.c b/hw/virtio/vhost-vsock-common.c\nindex b33def900a..3d086ed825 100644\n--- a/hw/virtio/vhost-vsock-common.c\n+++ b/hw/virtio/vhost-vsock-common.c\n@@ -106,7 +106,7 @@ int vhost_vsock_common_stop(VirtIODevice *vdev)\n return 0;\n }\n \n- ret = vhost_dev_stop(&vvc->vhost_dev, vdev, true);\n+ ret = vhost_dev_stop(&vvc->vhost_dev, vdev, true, false);\n \n if (k->set_guest_notifiers(qbus->parent, vvc->vhost_dev.nvqs, false) < 0) {\n error_report(\"vhost guest notifier cleanup failed: %d\", ret);\ndiff --git a/hw/virtio/vhost.c b/hw/virtio/vhost.c\nindex b4cdb7762f..ac4d6fca73 100644\n--- a/hw/virtio/vhost.c\n+++ b/hw/virtio/vhost.c\n@@ -23,6 +23,7 @@\n #include \"qemu/log.h\"\n #include \"standard-headers/linux/vhost_types.h\"\n #include \"hw/virtio/virtio-bus.h\"\n+#include \"hw/virtio/vhost-user.h\"\n #include \"hw/mem/memory-device.h\"\n #include \"migration/blocker.h\"\n #include \"migration/qemu-file-types.h\"\n@@ -1387,8 +1388,13 @@ fail_alloc_desc:\n static int do_vhost_virtqueue_stop(struct vhost_dev *dev,\n struct VirtIODevice *vdev,\n struct vhost_virtqueue *vq,\n- unsigned idx, bool force)\n+ unsigned idx, bool force,\n+ bool skip_drain)\n {\n+ if (skip_drain) {\n+ assert(virtio_has_feature(dev->protocol_features,\n+ VHOST_USER_PROTOCOL_F_GET_VRING_BASE_INFLIGHT));\n+ }\n int vhost_vq_index = dev->vhost_ops->vhost_get_vq_index(dev, idx);\n struct vhost_vring_state state = {\n .index = vhost_vq_index,\n@@ -1439,9 +1445,10 @@ static int do_vhost_virtqueue_stop(struct vhost_dev *dev,\n int vhost_virtqueue_stop(struct vhost_dev *dev,\n struct VirtIODevice *vdev,\n struct vhost_virtqueue *vq,\n- unsigned idx)\n+ unsigned idx,\n+ bool skip_drain)\n {\n- return do_vhost_virtqueue_stop(dev, vdev, vq, idx, false);\n+ return do_vhost_virtqueue_stop(dev, vdev, vq, idx, false, skip_drain);\n }\n \n static int vhost_virtqueue_set_busyloop_timeout(struct vhost_dev *dev,\n@@ -2220,7 +2227,8 @@ fail_vq:\n vhost_virtqueue_stop(hdev,\n vdev,\n hdev->vqs + i,\n- hdev->vq_index + i);\n+ hdev->vq_index + i,\n+ false);\n }\n \n fail_mem:\n@@ -2235,7 +2243,7 @@ fail_features:\n \n /* Host notifiers must be enabled at this point. */\n static int do_vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev,\n- bool vrings, bool force)\n+ bool vrings, bool force, bool skip_drain)\n {\n int i;\n int rc = 0;\n@@ -2262,7 +2270,8 @@ static int do_vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev,\n vdev,\n hdev->vqs + i,\n hdev->vq_index + i,\n- force);\n+ force,\n+ skip_drain);\n }\n if (hdev->vhost_ops->vhost_reset_status) {\n hdev->vhost_ops->vhost_reset_status(hdev);\n@@ -2282,15 +2291,16 @@ static int do_vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev,\n return rc;\n }\n \n-int vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev, bool vrings)\n+int vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev, bool vrings,\n+ bool skip_drain)\n {\n- return do_vhost_dev_stop(hdev, vdev, vrings, false);\n+ return do_vhost_dev_stop(hdev, vdev, vrings, false, skip_drain);\n }\n \n int vhost_dev_force_stop(struct vhost_dev *hdev, VirtIODevice *vdev,\n bool vrings)\n {\n- return do_vhost_dev_stop(hdev, vdev, vrings, true);\n+ return do_vhost_dev_stop(hdev, vdev, vrings, true, false);\n }\n \n int vhost_net_set_backend(struct vhost_dev *hdev,\ndiff --git a/include/hw/virtio/vhost.h b/include/hw/virtio/vhost.h\nindex 89817bd848..3881f6784b 100644\n--- a/include/hw/virtio/vhost.h\n+++ b/include/hw/virtio/vhost.h\n@@ -233,6 +233,7 @@ int vhost_dev_start(struct vhost_dev *hdev, VirtIODevice *vdev, bool vrings);\n * @hdev: common vhost_dev structure\n * @vdev: the VirtIODevice structure\n * @vrings: true to have vrings disabled in this call\n+ * @skip_drain: true to notice back-end to skip draining all in-flight requests\n *\n * Stop the vhost device. After the device is stopped the notifiers\n * can be disabled (@vhost_dev_disable_notifiers) and the device can\n@@ -240,7 +241,8 @@ int vhost_dev_start(struct vhost_dev *hdev, VirtIODevice *vdev, bool vrings);\n *\n * Return: 0 on success, != 0 on error when stopping dev.\n */\n-int vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev, bool vrings);\n+int vhost_dev_stop(struct vhost_dev *hdev, VirtIODevice *vdev, bool vrings,\n+ bool skip_drain);\n \n /**\n * vhost_dev_force_stop() - force stop the vhost device\n@@ -398,7 +400,8 @@ int vhost_device_iotlb_miss(struct vhost_dev *dev, uint64_t iova, int write);\n int vhost_virtqueue_start(struct vhost_dev *dev, struct VirtIODevice *vdev,\n struct vhost_virtqueue *vq, unsigned idx);\n int vhost_virtqueue_stop(struct vhost_dev *dev, struct VirtIODevice *vdev,\n- struct vhost_virtqueue *vq, unsigned idx);\n+ struct vhost_virtqueue *vq, unsigned idx,\n+ bool skip_drain);\n \n void vhost_dev_reset_inflight(struct vhost_inflight *inflight);\n void vhost_dev_free_inflight(struct vhost_inflight *inflight);\n", "prefixes": [ "v3", "3/5" ] }