Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2218901/?format=api
{ "id": 2218901, "url": "http://patchwork.ozlabs.org/api/patches/2218901/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260402022921.298818-15-kshk@linux.ibm.com/", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260402022921.298818-15-kshk@linux.ibm.com>", "list_archive_url": null, "date": "2026-04-02T02:29:20", "name": "[14/15] s390x/pci: Implement migration for emulated devices", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "f7a09cae70f9c27eabe7785526d92388622ec498", "submitter": { "id": 90249, "url": "http://patchwork.ozlabs.org/api/people/90249/?format=api", "name": "Konstantin Shkolnyy", "email": "kshk@linux.ibm.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260402022921.298818-15-kshk@linux.ibm.com/mbox/", "series": [ { "id": 498419, "url": "http://patchwork.ozlabs.org/api/series/498419/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=498419", "date": "2026-04-02T02:29:08", "name": "s390x/pci: Implement migration for emulated devices", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/498419/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2218901/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2218901/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=U9h/5jsV;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fmQpm0hjYz1yGH\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 02 Apr 2026 13:31:44 +1100 (AEDT)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1w87pU-0004kQ-E2; Wed, 01 Apr 2026 22:30:44 -0400", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <kshk@linux.ibm.com>)\n id 1w87ov-0004Eh-6k; Wed, 01 Apr 2026 22:30:10 -0400", "from mx0a-001b2d01.pphosted.com ([148.163.156.1])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <kshk@linux.ibm.com>)\n id 1w87ot-0001yn-1z; Wed, 01 Apr 2026 22:30:08 -0400", "from pps.filterd (m0360083.ppops.net [127.0.0.1])\n by mx0a-001b2d01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 631M4hsB560642; Thu, 2 Apr 2026 02:30:03 GMT", "from ppma11.dal12v.mail.ibm.com\n (db.9e.1632.ip4.static.sl-reverse.com [50.22.158.219])\n by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4d66g231pu-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n Thu, 02 Apr 2026 02:30:02 +0000 (GMT)", "from pps.filterd (ppma11.dal12v.mail.ibm.com [127.0.0.1])\n by ppma11.dal12v.mail.ibm.com (8.18.1.2/8.18.1.2) with ESMTP id\n 6321iueg008698;\n Thu, 2 Apr 2026 02:30:02 GMT", "from smtprelay03.dal12v.mail.ibm.com ([172.16.1.5])\n by ppma11.dal12v.mail.ibm.com (PPS) with ESMTPS id 4d6v11r449-1\n (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n Thu, 02 Apr 2026 02:30:02 +0000", "from smtpav06.wdc07v.mail.ibm.com (smtpav06.wdc07v.mail.ibm.com\n [10.39.53.233])\n by smtprelay03.dal12v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id\n 6322U03N29491796\n (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);\n Thu, 2 Apr 2026 02:30:01 GMT", "from smtpav06.wdc07v.mail.ibm.com (unknown [127.0.0.1])\n by IMSVA (Postfix) with ESMTP id C26C8580F4;\n Thu, 2 Apr 2026 02:30:00 +0000 (GMT)", "from smtpav06.wdc07v.mail.ibm.com (unknown [127.0.0.1])\n by IMSVA (Postfix) with ESMTP id 39DB3580F6;\n Thu, 2 Apr 2026 02:30:00 +0000 (GMT)", "from WIN-DU0DFC9G5VV.ibm.com (unknown [9.61.247.119])\n by smtpav06.wdc07v.mail.ibm.com (Postfix) with ESMTP;\n Thu, 2 Apr 2026 02:30:00 +0000 (GMT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc\n :content-transfer-encoding:date:from:in-reply-to:message-id\n :mime-version:references:subject:to; s=pp1; bh=t5cVYkxBAOpmPSSXd\n FdsVxwtAJBjRxBXKstytrtL+qc=; b=U9h/5jsV5fZ38DkQM8nGtw9voZEy30wuf\n 0l+2LXyUOLfC7OoA7MIhgM2zZf+CgBRyqfWru2PoItC7qkI+MoY6FRB7zkNyVBIK\n xVSmnP/7N9YxHae6gySPuRhmPsllgxCG1Pq8J1jrU7+nvWu0mBjGyD33xulJ/3Ly\n LqhNfXVJkFyCz/fnUzTaQxfDjRIHWKcsf8OjYZEKnxzjZDiBdCakNdJLknSCxGPe\n 4Id87xLeVdJhOTAuFKjfD8YFvQOMxVYM5RqFL5ZNyCAXoh09tzRU40HyxIpokV+F\n ePuoJ0puOmtIG/Kn/K5auhVOH7ZljY2wD3UBnvqDhfuz6smy3xiZA==", "From": "Konstantin Shkolnyy <kshk@linux.ibm.com>", "To": "mjrosato@linux.ibm.com", "Cc": "alifm@linux.ibm.com, richard.henderson@linaro.org, iii@linux.ibm.com,\n david@kernel.org, cohuck@redhat.com, pasic@linux.ibm.com,\n borntraeger@linux.ibm.com, qemu-s390x@nongnu.org,\n qemu-devel@nongnu.org, Konstantin Shkolnyy <kshk@linux.ibm.com>", "Subject": "[PATCH 14/15] s390x/pci: Implement migration for emulated devices", "Date": "Wed, 1 Apr 2026 21:29:20 -0500", "Message-Id": "<20260402022921.298818-15-kshk@linux.ibm.com>", "X-Mailer": "git-send-email 2.34.1", "In-Reply-To": "<20260402022921.298818-1-kshk@linux.ibm.com>", "References": "<20260402022921.298818-1-kshk@linux.ibm.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-TM-AS-GCONF": "00", "X-Authority-Analysis": "v=2.4 cv=Fdo6BZ+6 c=1 sm=1 tr=0 ts=69cdd4aa cx=c_pps\n a=aDMHemPKRhS1OARIsFnwRA==:117 a=aDMHemPKRhS1OARIsFnwRA==:17\n a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22 a=RnoormkPH1_aCDwRdu11:22\n a=iQ6ETzBq9ecOQQE5vZCe:22 a=VnNF1IyMAAAA:8 a=1WZqjCYO3q-P4G2YYo4A:9", "X-Proofpoint-ORIG-GUID": "oRdHDHgOv2BWWHXZ973_1EsBb1UfJMUD", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwNDAyMDAxOSBTYWx0ZWRfX/Z0hZxiogMlK\n A07AO9zBdtKJuQnFveUdp1kP61DHQXVuKKNktKgcnvY/TMphbSfrJNa1j42thT6A1xFJ+cAZ1P2\n egPQiQNpwJw+JkjEbO+OFZGztnMme9pfTR3CscTyxIBkz6ylcmQAi/vC1zG4+62SFlBaolL0VS3\n HVkSteYwL9CvIJJvWxL2B5efwizzmveWZDUY6xp/XTvhZjyN2DXaRG4ETAEKmdC65+DKMFh9UxF\n jHV6zik3fGoxkewFMgfiP562g1y06s0TRA87+yj1Y3Jx6MV9gxsDayG7yA4lU4GneHORj6PIpwg\n ObekpDNmtwolZk0lcLUOz97F5ZLOP6vOk4MsRn6b51bWwroK+9Xvr26+Jp3OC6MufqoOZKBZF76\n k0BHOplINqx+neIQgE/9egWJ9JshsvQNg0DXJcNyFFumCb/Fs6iB2xvPQAebnfeej3ptD8fiakj\n nMY2Eh28lzuZVB1U0HA==", "X-Proofpoint-GUID": "oRdHDHgOv2BWWHXZ973_1EsBb1UfJMUD", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-01_05,2026-04-01_02,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n impostorscore=0 clxscore=1015 bulkscore=0 suspectscore=0 priorityscore=1501\n adultscore=0 malwarescore=0 phishscore=0 spamscore=0 lowpriorityscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2603050001 definitions=main-2604020019", "Received-SPF": "pass client-ip=148.163.156.1; envelope-from=kshk@linux.ibm.com;\n helo=mx0a-001b2d01.pphosted.com", "X-Spam_score_int": "-6", "X-Spam_score": "-0.7", "X-Spam_bar": "/", "X-Spam_report": "(-0.7 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7,\n RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01,\n RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=1, RCVD_IN_VALIDITY_RPBL_BLOCKED=1,\n SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=no autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "Implement zPCI device state migration, consequently enabling migration\nof VMs that have emulated PCI devices, whether virtio or not.\nMigration is allowed for devices whose function handle has the\nFH_SHM_EMUL bit set. For these devices QEMU will save and restore the\nstate of its zPCI emulator.\n\nPassthrough devices will continue to block migration.\n\nSigned-off-by: Konstantin Shkolnyy <kshk@linux.ibm.com>\n---\n hw/s390x/s390-pci-bus.c | 112 ++++++++++++++++++++++++++++++--\n hw/s390x/s390-pci-inst.c | 2 +-\n include/hw/s390x/s390-pci-bus.h | 2 +\n 3 files changed, 110 insertions(+), 6 deletions(-)", "diff": "diff --git a/hw/s390x/s390-pci-bus.c b/hw/s390x/s390-pci-bus.c\nindex f339a0fd94..b3037b9a8a 100644\n--- a/hw/s390x/s390-pci-bus.c\n+++ b/hw/s390x/s390-pci-bus.c\n@@ -26,6 +26,7 @@\n #include \"hw/pci/pci_bridge.h\"\n #include \"hw/pci/msi.h\"\n #include \"exec/cpu-common.h\"\n+#include \"migration/blocker.h\"\n #include \"qemu/error-report.h\"\n #include \"qemu/module.h\"\n #include \"system/reset.h\"\n@@ -1116,6 +1117,28 @@ static int s390_pci_interp_plug(S390pciState *s, S390PCIBusDevice *pbdev)\n return 0;\n }\n \n+static int s390_set_passthrough_migration_blocker(S390PCIBusDevice *pbdev,\n+ Error **errp)\n+{\n+ pbdev->passthrough_migr_blocker = NULL;\n+\n+ if (pbdev->fh & FH_SHM_EMUL) {\n+ return 0;\n+ }\n+ error_setg(&pbdev->passthrough_migr_blocker,\n+ \"Migration blocked by passthrough zPCI device \"\n+ \"fh 0x%x uid %d fid %d\", pbdev->fh, pbdev->uid, pbdev->fid);\n+\n+ return migrate_add_blocker(&pbdev->passthrough_migr_blocker, errp);\n+}\n+\n+static void s390_clear_passthrough_migration_blocker(S390PCIBusDevice *pbdev)\n+{\n+ if (pbdev->passthrough_migr_blocker) {\n+ migrate_del_blocker(&pbdev->passthrough_migr_blocker);\n+ }\n+}\n+\n static void s390_pcihost_plug(HotplugHandler *hotplug_dev, DeviceState *dev,\n Error **errp)\n {\n@@ -1235,6 +1258,11 @@ static void s390_pcihost_plug(HotplugHandler *hotplug_dev, DeviceState *dev,\n return;\n }\n \n+ if (s390_set_passthrough_migration_blocker(pbdev, errp)) {\n+ s390_pci_msix_free(pbdev);\n+ return;\n+ }\n+\n if (dev->hotplugged) {\n s390_pci_generate_plug_event(HP_EVENT_TO_CONFIGURED ,\n pbdev->fh, pbdev->fid);\n@@ -1271,6 +1299,8 @@ static void s390_pcihost_unplug(HotplugHandler *hotplug_dev, DeviceState *dev,\n return;\n }\n \n+ s390_clear_passthrough_migration_blocker(pbdev);\n+\n s390_pci_generate_plug_event(HP_EVENT_STANDBY_TO_RESERVED,\n pbdev->fh, pbdev->fid);\n bus = pci_get_bus(pci_dev);\n@@ -1600,13 +1630,85 @@ static const Property s390_pci_device_properties[] = {\n true),\n };\n \n-static const VMStateDescription s390_pci_device_vmstate = {\n- .name = TYPE_S390_PCI_DEVICE,\n+static int s390_pci_device_post_load(void *opaque, int version_id)\n+{\n+ S390PCIBusDevice *pbdev = S390_PCI_DEVICE(opaque);\n+\n+ /*\n+ * Now that S390PCIBusDevice fields have been restored, regenerate IOMMU\n+ * state - that includes IOTLB contents and QEMU memory regions.\n+ */\n+ if (pbdev->iommu_enabled) {\n+ assert(pbdev->iommu);\n+ if (s390_pci_is_translation_enabled(pbdev->g_iota)) {\n+ s390_pci_iommu_enable(pbdev);\n+ s390_pci_ioat_replay(pbdev);\n+ } else {\n+ s390_pci_iommu_direct_map_enable(pbdev);\n+ }\n+ }\n+\n /*\n- * TODO: add state handling here, so migration works at least with\n- * emulated pci devices on s390x\n+ * Guest sets fmb_addr by mpcifc.ZPCI_MOD_FC_SET_MEASURE instruction.\n+ * The handler consequently starts fmb_timer. Now that fmb_addr has been\n+ * restored, we may need to restart fmb_timer.\n */\n- .unmigratable = 1,\n+ if (pbdev->fmb_addr) {\n+ assert(!pbdev->fmb_timer);\n+ assert(pbdev->pci_group);\n+ pbdev->fmb_timer = timer_new_ms(QEMU_CLOCK_VIRTUAL,\n+ fmb_update, pbdev);\n+ timer_mod(pbdev->fmb_timer,\n+ qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL) +\n+ pbdev->pci_group->zpci_group.mui);\n+ }\n+ return 0;\n+}\n+\n+static const VMStateDescription s390_pci_device_vmstate = {\n+ .name = TYPE_S390_PCI_DEVICE,\n+ .version_id = 1,\n+ .minimum_version_id = 1,\n+ .post_load = s390_pci_device_post_load,\n+ .fields = (const VMStateField[]) {\n+ VMSTATE_UINT32(state, S390PCIBusDevice),\n+ VMSTATE_UINT16(uid, S390PCIBusDevice),\n+ VMSTATE_UINT32(idx, S390PCIBusDevice),\n+ VMSTATE_UINT32(fh, S390PCIBusDevice),\n+ VMSTATE_UINT32(fid, S390PCIBusDevice),\n+ VMSTATE_BOOL(fid_defined, S390PCIBusDevice),\n+ VMSTATE_UINT64(fmb_addr, S390PCIBusDevice),\n+ VMSTATE_UINT32(fmb.format, S390PCIBusDevice),\n+ VMSTATE_UINT32(fmb.sample, S390PCIBusDevice),\n+ VMSTATE_UINT64(fmb.last_update, S390PCIBusDevice),\n+ VMSTATE_UINT64_ARRAY(fmb.counter, S390PCIBusDevice,\n+ ARRAY_SIZE(((S390PCIBusDevice *)0)->fmb.counter)),\n+ VMSTATE_UINT64(fmb.fmt0.dma_rbytes, S390PCIBusDevice),\n+ VMSTATE_UINT64(fmb.fmt0.dma_wbytes, S390PCIBusDevice),\n+ VMSTATE_UINT8(isc, S390PCIBusDevice),\n+ VMSTATE_UINT16(noi, S390PCIBusDevice),\n+ VMSTATE_UINT8(sum, S390PCIBusDevice),\n+ VMSTATE_UINT8(pft, S390PCIBusDevice),\n+ VMSTATE_UINT64(routes.adapter.ind_addr, S390PCIBusDevice),\n+ VMSTATE_UINT64(routes.adapter.summary_addr, S390PCIBusDevice),\n+ VMSTATE_UINT64(routes.adapter.ind_offset, S390PCIBusDevice),\n+ VMSTATE_UINT32(routes.adapter.summary_offset, S390PCIBusDevice),\n+ VMSTATE_UINT32(routes.adapter.adapter_id, S390PCIBusDevice),\n+ VMSTATE_BOOL(iommu_enabled, S390PCIBusDevice),\n+ VMSTATE_UINT64(g_iota, S390PCIBusDevice),\n+ VMSTATE_UINT64(pba, S390PCIBusDevice),\n+ VMSTATE_UINT64(pal, S390PCIBusDevice),\n+ VMSTATE_UINT64(max_dma_limit, S390PCIBusDevice),\n+ VMSTATE_PTR_TO_IND_ADDR(summary_ind, S390PCIBusDevice),\n+ VMSTATE_PTR_TO_IND_ADDR(indicator, S390PCIBusDevice),\n+ VMSTATE_BOOL(pci_unplug_request_processed, S390PCIBusDevice),\n+ VMSTATE_BOOL(unplug_requested, S390PCIBusDevice),\n+ VMSTATE_BOOL(interp, S390PCIBusDevice),\n+ VMSTATE_BOOL(forwarding_assist, S390PCIBusDevice),\n+ VMSTATE_BOOL(aif, S390PCIBusDevice),\n+ VMSTATE_BOOL(rtr_avail, S390PCIBusDevice),\n+ VMSTATE_END_OF_LIST()\n+ }\n };\n \n static void s390_pci_device_class_init(ObjectClass *klass, const void *data)\ndiff --git a/hw/s390x/s390-pci-inst.c b/hw/s390x/s390-pci-inst.c\nindex 191f549ba7..a9c0a4effb 100644\n--- a/hw/s390x/s390-pci-inst.c\n+++ b/hw/s390x/s390-pci-inst.c\n@@ -1094,7 +1094,7 @@ static int fmb_do_update(S390PCIBusDevice *pbdev, int offset, uint64_t val,\n return ret;\n }\n \n-static void fmb_update(void *opaque)\n+void fmb_update(void *opaque)\n {\n S390PCIBusDevice *pbdev = opaque;\n int64_t t = qemu_clock_get_ms(QEMU_CLOCK_VIRTUAL);\ndiff --git a/include/hw/s390x/s390-pci-bus.h b/include/hw/s390x/s390-pci-bus.h\nindex 2fab28e6e0..2edb023112 100644\n--- a/include/hw/s390x/s390-pci-bus.h\n+++ b/include/hw/s390x/s390-pci-bus.h\n@@ -337,6 +337,7 @@ struct S390PCIBusDevice {\n uint16_t uid;\n uint32_t idx;\n uint32_t fh;\n+ Error *passthrough_migr_blocker;\n uint32_t fid;\n bool fid_defined;\n uint64_t fmb_addr;\n@@ -415,5 +416,6 @@ S390PCIBusDevice *s390_pci_find_dev_by_pci(S390pciState *s,\n S390PCIBusDevice *s390_pci_find_next_avail_dev(S390pciState *s,\n S390PCIBusDevice *pbdev);\n void s390_pci_ism_reset(void);\n+void fmb_update(void *opaque);\n \n #endif\n", "prefixes": [ "14/15" ] }