{"id":2223043,"url":"http://patchwork.ozlabs.org/api/patches/2223043/?format=json","web_url":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20260414082915.112122-7-armenon@redhat.com/","project":{"id":14,"url":"http://patchwork.ozlabs.org/api/projects/14/?format=json","name":"QEMU Development","link_name":"qemu-devel","list_id":"qemu-devel.nongnu.org","list_email":"qemu-devel@nongnu.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260414082915.112122-7-armenon@redhat.com>","list_archive_url":null,"date":"2026-04-14T08:29:11","name":"[v4,06/10] hw/tpm: Add support for VM migration with TPM CRB chunking","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"a977fa867fb1a25fbeb1d487c82dd26f75e295b2","submitter":{"id":91136,"url":"http://patchwork.ozlabs.org/api/people/91136/?format=json","name":"Arun Menon","email":"armenon@redhat.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/qemu-devel/patch/20260414082915.112122-7-armenon@redhat.com/mbox/","series":[{"id":499802,"url":"http://patchwork.ozlabs.org/api/series/499802/?format=json","web_url":"http://patchwork.ozlabs.org/project/qemu-devel/list/?series=499802","date":"2026-04-14T08:29:05","name":"hw/tpm: CRB chunking capability to handle PQC","version":4,"mbox":"http://patchwork.ozlabs.org/series/499802/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2223043/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2223043/checks/","tags":{},"related":[],"headers":{"Return-Path":"<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=XDOobnf0;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=google header.b=f0klhg5W;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fvyDF0Y7gz1yDF\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 14 Apr 2026 18:31:25 +1000 (AEST)","from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wCZAm-000058-Kg; Tue, 14 Apr 2026 04:31:04 -0400","from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <armenon@redhat.com>)\n id 1wCZAV-0007ve-FD\n for qemu-devel@nongnu.org; Tue, 14 Apr 2026 04:30:52 -0400","from us-smtp-delivery-124.mimecast.com ([170.10.133.124])\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <armenon@redhat.com>)\n id 1wCZAT-000433-2Z\n for qemu-devel@nongnu.org; Tue, 14 Apr 2026 04:30:46 -0400","from mail-pl1-f199.google.com (mail-pl1-f199.google.com\n [209.85.214.199]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-606-PwsgcEolPU6VaY6NkIQFtA-1; Tue, 14 Apr 2026 04:30:42 -0400","by mail-pl1-f199.google.com with SMTP id\n d9443c01a7336-2b24cd2e2b3so52654505ad.0\n for <qemu-devel@nongnu.org>; Tue, 14 Apr 2026 01:30:42 -0700 (PDT)","from fedora.armenon-thinkpadp16vgen1.bengluru.csb ([49.36.110.202])\n by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2b2d4e0f909sm181493785ad.35.2026.04.14.01.30.27\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Tue, 14 Apr 2026 01:30:38 -0700 (PDT)"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776155443;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=bK5BWDq0pPdx/5DVBrTlll0571lkzu0A1GqTXvFV8Cc=;\n b=XDOobnf0Ga6QaGQF9jr3OHarEnEKTDtLqq6uwV0APQWhxtQoCUsklyfceEp+JZc8f7EouX\n hIyFukq+Aq2weQ2AuXu4qxrlbShx5fHGqrzktzYjE0r6Cpm1v2YAKS2piWt3kz+dPQ+4BM\n zKj/schQhdPwLG7sUNtIgaKHcDIIDyU=","v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=redhat.com; s=google; t=1776155441; x=1776760241; darn=nongnu.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=bK5BWDq0pPdx/5DVBrTlll0571lkzu0A1GqTXvFV8Cc=;\n b=f0klhg5WjeXVqM+45snUmhxv7pBMuNv4g3iSrt+9JIKI5PtqZKEhFhgHTjNBwW559K\n +Sl1OPRQJJAUMatFTzlNRx6Zs9cfLQA6BOZyxEcq94G4JRl1Jr5Bsf7a5vLngPz1mqNd\n fo1EMIaoLJ8OiFQ1gaqNo8srGaNijZ5Tddmfjf0ZPKkDWMpn8ZzS9PHnxPpD0BVgOnMm\n DwXx1H7DNrg19cmK35kuK1AgrMZxudlO/DsiYpVbH9uKeHucoJKNAluNyg8UlyuRiL2d\n DBLvjBsT5so+98qwnvFvRsKMeeACL8wTsIW03VwxAws/6bSqW332OJ34cJfiTPLyRqOd\n xmDA=="],"X-MC-Unique":"PwsgcEolPU6VaY6NkIQFtA-1","X-Mimecast-MFC-AGG-ID":"PwsgcEolPU6VaY6NkIQFtA_1776155441","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776155441; x=1776760241;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=bK5BWDq0pPdx/5DVBrTlll0571lkzu0A1GqTXvFV8Cc=;\n b=ZXQEJzqW4O+e6Q1jQJIMUIrdv3DwHoq1GtSjqojtw/hWKRSmQpqpaLGdIpnkH6ltlg\n LGwPDr2gi1pRodzkQt6cYg3mxV4I/qUJ/wm+o19PIaplR/1XQpYODNFy6DNtW7SfH3yh\n Da3yWsgkR44BKlrEvFoio+lfqfSzno9J7OR7dQBsRn5zUY969Ie3SMpjZVLKfh2dz3oP\n 8C/R6LB8WQaE+8rPB46lmz/sLGYdNAKHdT0FE56mhNPl+kBd2TWKy/KI0lvceiJSSo8E\n LnCYPydNIJg55ZSq9NU7hXH30ScbIVyUfGx5y6TsbyI4vMw3idhHNiUuRse2SNHjryCb\n SAKQ==","X-Gm-Message-State":"AOJu0Yxd20zZK2VM+yKmiQrkzsNljnnoi66hX4re809sr+xMCDK7R3bQ\n GhdwD+tvm6YlA5QVLzsy+GV8QJ0vD8a+eUbwMKVjNxzH1uwy3GkQWR+KuE6oO9/vLraWhqWDiOU\n M2BIeHpxmYzI46h5TIzNAbfXlK3Jle41d9ODLEwMDTxxtG1agK6beELFIpgZIC8uumGlMg4Vege\n uAhmgNw7j8TwKNv4hOL0VQNMBGWotBoy45DlOrkGk=","X-Gm-Gg":"AeBDieuUPHMUvuKw/KKqlFDhe8UDbuqrCqrGF83PYh+xYr/2zHzCwUfzg0GO8beDVF7\n TVMo5PRdeG6RVmgxQx3VSjknwDpiwtl8Aqt1+8I7WjtvbUVQSwo46z7neGyo3jtUojoFLIAhzjO\n HSQIRhbis8xpRCjcHd81tIbl5M7GEmGEEOgGcKyn/1n9Xw94FNCB9bLod7m0OnOgzOHZVqC/GLi\n 8j5W2OM+8IDz2RVBYuu7KlEkXJhJ94zhkh3e+ieXiH1dHpvYtQ5TQ1ZDFq7dN0oHkBKYK7ExwS7\n SnKvdMP5TCrRE6LTDZb6eghYqPZJtfeeKjWhCYL4AwAro9P/CjYT1UBTMoafum6D2LVHpmiBjYC\n oHbobJ5zlrOu6X2DEEybQHKqhg+Y1xTJy1NVBRQB+/Km3aiIsJfSn1YgdbuF9588=","X-Received":["by 2002:a17:903:3c4b:b0:2ae:ac0c:5a2a with SMTP id\n d9443c01a7336-2b2d59433c5mr171481865ad.6.1776155441169;\n Tue, 14 Apr 2026 01:30:41 -0700 (PDT)","by 2002:a17:903:3c4b:b0:2ae:ac0c:5a2a with SMTP id\n d9443c01a7336-2b2d59433c5mr171480035ad.6.1776155438542;\n Tue, 14 Apr 2026 01:30:38 -0700 (PDT)"],"From":"Arun Menon <armenon@redhat.com>","To":"qemu-devel@nongnu.org","Cc":"Yanan Wang <wangyanan55@huawei.com>, Ani Sinha <anisinha@redhat.com>,\n \"Michael S. Tsirkin\" <mst@redhat.com>, =?utf-8?q?Philippe_Mathieu-Daud?=\n\t=?utf-8?q?=C3=A9?= <philmd@linaro.org>,\n Stefan Berger <stefanb@linux.vnet.ibm.com>,\n Paolo Bonzini <pbonzini@redhat.com>,\n Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,\n Zhao Liu <zhao1.liu@intel.com>, marcandre.lureau@redhat.com,\n Igor Mammedov <imammedo@redhat.com>, Laurent Vivier <lvivier@redhat.com>,\n Fabiano Rosas <farosas@suse.de>, Arun Menon <armenon@redhat.com>","Subject":"[PATCH v4 06/10] hw/tpm: Add support for VM migration with TPM CRB\n chunking","Date":"Tue, 14 Apr 2026 13:59:11 +0530","Message-ID":"<20260414082915.112122-7-armenon@redhat.com>","X-Mailer":"git-send-email 2.53.0","In-Reply-To":"<20260414082915.112122-1-armenon@redhat.com>","References":"<20260414082915.112122-1-armenon@redhat.com>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Received-SPF":"pass client-ip=170.10.133.124; envelope-from=armenon@redhat.com;\n helo=us-smtp-delivery-124.mimecast.com","X-Spam_score_int":"-25","X-Spam_score":"-2.6","X-Spam_bar":"--","X-Spam_report":"(-2.6 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.54,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001,\n RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001,\n SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no","X-Spam_action":"no action","X-BeenThere":"qemu-devel@nongnu.org","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"qemu development <qemu-devel.nongnu.org>","List-Unsubscribe":"<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>","List-Archive":"<https://lists.nongnu.org/archive/html/qemu-devel>","List-Post":"<mailto:qemu-devel@nongnu.org>","List-Help":"<mailto:qemu-devel-request@nongnu.org?subject=help>","List-Subscribe":"<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>","Errors-To":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org","Sender":"qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org"},"content":"From: Arun Menon <armenon@redhat.com>\n\n- Add subsection in VMState for TPM CRB with the newly introduced\n  command and response buffer GByteArrays, along with a needed callback,\n  so that newer QEMU only sends the buffers if it is necessary.\n- Add hw_compat global properties for both migrate-buffers and cap-chunk\n  because the chunking feature is only supported for machine type 11.1\n  and higher.\n- Implement a migration blocker to prevent migration of the VM if the\n  user manually enables chunking capability but disables buffer\n  migration. This avoids state data loss.\n\nSigned-off-by: Arun Menon <armenon@redhat.com>\n---\n hw/core/machine.c |  5 ++++-\n hw/tpm/tpm_crb.c  | 53 ++++++++++++++++++++++++++++++++++++++++++++++-\n 2 files changed, 56 insertions(+), 2 deletions(-)","diff":"diff --git a/hw/core/machine.c b/hw/core/machine.c\nindex 1abc8ae737..6d6b0fc9d1 100644\n--- a/hw/core/machine.c\n+++ b/hw/core/machine.c\n@@ -38,7 +38,10 @@\n #include \"hw/acpi/generic_event_device.h\"\n #include \"qemu/audio.h\"\n \n-GlobalProperty hw_compat_11_0[] = {};\n+GlobalProperty hw_compat_11_0[] = {\n+    { \"tpm-crb\", \"x-migrate-buffers\", \"off\"},\n+    { \"tpm-crb\", \"x-cap-chunk\", \"off\"},\n+};\n const size_t hw_compat_11_0_len = G_N_ELEMENTS(hw_compat_11_0);\n \n GlobalProperty hw_compat_10_2[] = {\ndiff --git a/hw/tpm/tpm_crb.c b/hw/tpm/tpm_crb.c\nindex 8e44df1aed..0f1eced977 100644\n--- a/hw/tpm/tpm_crb.c\n+++ b/hw/tpm/tpm_crb.c\n@@ -24,6 +24,7 @@\n #include \"hw/pci/pci_ids.h\"\n #include \"hw/acpi/tpm.h\"\n #include \"migration/vmstate.h\"\n+#include \"migration/blocker.h\"\n #include \"system/tpm_backend.h\"\n #include \"system/tpm_util.h\"\n #include \"system/reset.h\"\n@@ -49,6 +50,10 @@ struct CRBState {\n \n     bool ppi_enabled;\n     TPMPPI ppi;\n+\n+    bool migrate_buffers;\n+    bool cap_chunk;\n+    Error *migration_blocker;\n };\n typedef struct CRBState CRBState;\n \n@@ -345,18 +350,48 @@ static int tpm_crb_pre_save(void *opaque)\n     return 0;\n }\n \n+static bool tpm_crb_chunk_needed(void *opaque)\n+{\n+    CRBState *s = opaque;\n+\n+    if (!s->migrate_buffers) {\n+        return false;\n+    }\n+\n+    return ((s->command_buffer && s->command_buffer->len > 0) ||\n+            (s->response_buffer && s->response_buffer->len > 0));\n+}\n+\n+static const VMStateDescription vmstate_tpm_crb_chunk = {\n+    .name = \"tpm-crb/chunk\",\n+    .version_id = 0,\n+    .needed = tpm_crb_chunk_needed,\n+    .fields = (const VMStateField[]) {\n+        VMSTATE_GBYTEARRAY(command_buffer, CRBState, 0),\n+        VMSTATE_GBYTEARRAY(response_buffer, CRBState, 0),\n+        VMSTATE_UINT32(response_offset, CRBState),\n+        VMSTATE_END_OF_LIST()\n+    }\n+};\n+\n static const VMStateDescription vmstate_tpm_crb = {\n     .name = \"tpm-crb\",\n     .pre_save = tpm_crb_pre_save,\n     .fields = (const VMStateField[]) {\n         VMSTATE_UINT32_ARRAY(regs, CRBState, TPM_CRB_R_MAX),\n         VMSTATE_END_OF_LIST(),\n+    },\n+    .subsections = (const VMStateDescription * const []) {\n+        &vmstate_tpm_crb_chunk,\n+        NULL,\n     }\n };\n \n static const Property tpm_crb_properties[] = {\n     DEFINE_PROP_TPMBE(\"tpmdev\", CRBState, tpmbe),\n     DEFINE_PROP_BOOL(\"ppi\", CRBState, ppi_enabled, true),\n+    DEFINE_PROP_BOOL(\"x-migrate-buffers\", CRBState, migrate_buffers, true),\n+    DEFINE_PROP_BOOL(\"x-cap-chunk\", CRBState, cap_chunk, true),\n };\n \n static void tpm_crb_reset(void *dev)\n@@ -392,7 +427,7 @@ static void tpm_crb_reset(void *dev)\n     ARRAY_FIELD_DP32(s->regs, CRB_INTF_ID,\n                      InterfaceSelector, CRB_INTF_IF_SELECTOR_CRB);\n     ARRAY_FIELD_DP32(s->regs, CRB_INTF_ID,\n-                     CapCRBChunk, CRB_INTF_CAP_CRB_CHUNK);\n+                     CapCRBChunk, s->cap_chunk ? CRB_INTF_CAP_CRB_CHUNK : 0);\n     ARRAY_FIELD_DP32(s->regs, CRB_INTF_ID,\n                      RID, 0b0000);\n     ARRAY_FIELD_DP32(s->regs, CRB_INTF_ID2,\n@@ -413,6 +448,7 @@ static void tpm_crb_reset(void *dev)\n static void tpm_crb_realize(DeviceState *dev, Error **errp)\n {\n     CRBState *s = CRB(dev);\n+    int ret;\n \n     if (!tpm_find()) {\n         error_setg(errp, \"at most one TPM device is permitted\");\n@@ -422,6 +458,16 @@ static void tpm_crb_realize(DeviceState *dev, Error **errp)\n         error_setg(errp, \"'tpmdev' property is required\");\n         return;\n     }\n+    if (s->cap_chunk && !s->migrate_buffers) {\n+        error_setg(&s->migration_blocker, \"TPM chunking is enabled but \"\n+        \"buffer migration is disabled. Migration is blocked to prevent \"\n+        \"data loss\");\n+\n+        ret = migrate_add_blocker_normal(&s->migration_blocker, errp);\n+        if (ret < 0) {\n+            return;\n+        }\n+    }\n \n     memory_region_init_io(&s->mmio, OBJECT(s), &tpm_crb_memory_ops, s,\n         \"tpm-crb-mmio\", sizeof(s->regs));\n@@ -454,6 +500,11 @@ static void tpm_crb_unrealize(DeviceState *dev)\n \n     g_clear_pointer(&s->command_buffer, g_byte_array_unref);\n     g_clear_pointer(&s->response_buffer, g_byte_array_unref);\n+\n+    if (s->migration_blocker) {\n+        migrate_del_blocker(&s->migration_blocker);\n+        error_free(s->migration_blocker);\n+    }\n }\n \n static void tpm_crb_class_init(ObjectClass *klass, const void *data)\n","prefixes":["v4","06/10"]}