- kvm-s390x-Fix-leak-in-machine_set_loadparm.patch [RHEL-98554] - kvm-hw-s390x-ccw-device-Fix-memory-leak-in-loadparm-sett.patch [RHEL-98554] - kvm-amd_iommu-Rename-variable-mmio-to-mr_mmio.patch [RHEL-66202] - kvm-amd_iommu-Add-support-for-pass-though-mode.patch [RHEL-66202] - kvm-amd_iommu-Use-shared-memory-region-for-Interrupt-Rem.patch [RHEL-66202] - kvm-amd_iommu-Send-notification-when-invalidate-interrup.patch [RHEL-66202] - kvm-amd_iommu-Check-APIC-ID-255-for-XTSup.patch [RHEL-66202] - kvm-io-Fix-partial-struct-copy-in-qio_dns_resolver_looku.patch [RHEL-67104] - kvm-util-qemu-sockets-Refactor-setting-client-sockopts-i.patch [RHEL-67104] - kvm-util-qemu-sockets-Refactor-success-and-failure-paths.patch [RHEL-67104] - kvm-util-qemu-sockets-Add-support-for-keep-alive-flag-to.patch [RHEL-67104] - kvm-util-qemu-sockets-Refactor-inet_parse-to-use-QemuOpt.patch [RHEL-67104] - kvm-util-qemu-sockets-Introduce-inet-socket-options-cont.patch [RHEL-67104] - kvm-tests-unit-test-util-sockets-fix-mem-leak-on-error-o.patch [RHEL-67104] - kvm-target-i386-Expose-bits-related-to-SRSO-vulnerabilit.patch [RHEL-52649] - kvm-target-i386-Add-PerfMonV2-feature-bit.patch [RHEL-52649] - kvm-target-i386-Update-EPYC-CPU-model-for-Cache-property.patch [RHEL-52649] - kvm-target-i386-Update-EPYC-Rome-CPU-model-for-Cache-pro.patch [RHEL-52649] - kvm-target-i386-Update-EPYC-Milan-CPU-model-for-Cache-pr.patch [RHEL-52649] - kvm-target-i386-Add-couple-of-feature-bits-in-CPUID_Fn80.patch [RHEL-52649] - kvm-target-i386-Update-EPYC-Genoa-for-Cache-property-per.patch [RHEL-52649] - kvm-target-i386-Add-support-for-EPYC-Turin-model.patch [RHEL-52649] - kvm-hw-i386-amd_iommu-Assign-pci-id-0x1419-for-the-AMD-I.patch [RHEL-70926] - kvm-hw-i386-amd_iommu-Isolate-AMDVI-PCI-from-amd-iommu-d.patch [RHEL-70925] - kvm-hw-i386-amd_iommu-Allow-migration-when-explicitly-cr.patch [RHEL-70925] - kvm-Enable-amd-iommu-device.patch [RHEL-70925] - kvm-include-qemu-compiler-add-QEMU_UNINITIALIZED-attribu.patch [RHEL-99888] - kvm-hw-virtio-virtio-avoid-cost-of-ftrivial-auto-var-ini.patch [RHEL-99888] - kvm-block-skip-automatic-zero-init-of-large-array-in-ioq.patch [RHEL-99888] - kvm-chardev-char-fd-skip-automatic-zero-init-of-large-ar.patch [RHEL-99888] - kvm-chardev-char-pty-skip-automatic-zero-init-of-large-a.patch [RHEL-99888] - kvm-chardev-char-socket-skip-automatic-zero-init-of-larg.patch [RHEL-99888] - kvm-hw-audio-ac97-skip-automatic-zero-init-of-large-arra.patch [RHEL-99888] - kvm-hw-audio-cs4231a-skip-automatic-zero-init-of-large-a.patch [RHEL-99888] - kvm-hw-audio-es1370-skip-automatic-zero-init-of-large-ar.patch [RHEL-99888] - kvm-hw-audio-gus-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-hw-audio-marvell_88w8618-skip-automatic-zero-init-of.patch [RHEL-99888] - kvm-hw-audio-sb16-skip-automatic-zero-init-of-large-arra.patch [RHEL-99888] - kvm-hw-audio-via-ac97-skip-automatic-zero-init-of-large-.patch [RHEL-99888] - kvm-hw-char-sclpconsole-lm-skip-automatic-zero-init-of-l.patch [RHEL-99888] - kvm-hw-dma-xlnx_csu_dma-skip-automatic-zero-init-of-larg.patch [RHEL-99888] - kvm-hw-display-vmware_vga-skip-automatic-zero-init-of-la.patch [RHEL-99888] - kvm-hw-hyperv-syndbg-skip-automatic-zero-init-of-large-a.patch [RHEL-99888] - kvm-hw-misc-aspeed_hace-skip-automatic-zero-init-of-larg.patch [RHEL-99888] - kvm-hw-net-rtl8139-skip-automatic-zero-init-of-large-arr.patch [RHEL-99888] - kvm-hw-net-tulip-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-hw-net-virtio-net-skip-automatic-zero-init-of-large-.patch [RHEL-99888] - kvm-hw-net-xgamc-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-hw-nvme-ctrl-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-hw-ppc-spapr_tpm_proxy-skip-automatic-zero-init-of-l.patch [RHEL-99888] - kvm-hw-usb-hcd-ohci-skip-automatic-zero-init-of-large-ar.patch [RHEL-99888] - kvm-hw-scsi-lsi53c895a-skip-automatic-zero-init-of-large.patch [RHEL-99888] - kvm-hw-scsi-megasas-skip-automatic-zero-init-of-large-ar.patch [RHEL-99888] - kvm-hw-ufs-lu-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-net-socket-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-net-stream-skip-automatic-zero-init-of-large-array.patch [RHEL-99888] - kvm-ui-vnc-Update-display-update-interval-when-VM-state-.patch [RHEL-100741] - Resolves: RHEL-98554 ([s390x][RHEL9.7.0][virtio_block] there would be memory leak with virtio_blk disks) - Resolves: RHEL-66202 ([AMDSERVER 9.6 Feature] qemu: Interrupt Remap support for emulated amd viommu) - Resolves: RHEL-67104 (postcopy on the destination host can't switch into pause status under the network issue if boot VM with '-S') - Resolves: RHEL-52649 ([AMDSERVER 9.6 Feature] Turin: Qemu EPYC-Turin Model) - Resolves: RHEL-70926 (Qemu/amd-iommu: Advertise a suitable device id) - Resolves: RHEL-70925 (Qemu/amd-iommu: Add ability to manually specify the AMDVI-PCI device) - Resolves: RHEL-99888 (-ftrivial-auto-var-init=zero reduced performance [rhel-9]) - Resolves: RHEL-100741 (Video stuck after switchover phase when play one video during migration [rhel-9])
118 lines
4.7 KiB
Diff
118 lines
4.7 KiB
Diff
From f1ff9d3b379697a2d4627e9529067195841d86a8 Mon Sep 17 00:00:00 2001
|
|
From: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
|
|
Date: Sun, 4 May 2025 17:04:05 +0000
|
|
Subject: [PATCH 25/57] hw/i386/amd_iommu: Allow migration when explicitly
|
|
create the AMDVI-PCI device
|
|
|
|
RH-Author: John Allen <None>
|
|
RH-MergeRequest: 380: Add ability to manually specify the AMDVI-PCI device
|
|
RH-Jira: RHEL-70925
|
|
RH-Acked-by: Miroslav Rezanina <mrezanin@redhat.com>
|
|
RH-Commit: [2/3] a42b88116e608a79b6fae13ebe3709874f2a853f (johnalle/qemu-kvm-fork)
|
|
|
|
Add migration support for AMD IOMMU model by saving necessary AMDVIState
|
|
parameters for MMIO registers, device table, command buffer, and event
|
|
buffers.
|
|
|
|
Also change devtab_len type from size_t to uint64_t to avoid 32-bit build
|
|
issue.
|
|
|
|
Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
|
|
Message-Id: <20250504170405.12623-3-suravee.suthikulpanit@amd.com>
|
|
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
|
|
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
|
|
(cherry picked from commit 28931c2e1591deb4bfaaf744fdc8813e96c230f1)
|
|
|
|
JIRA: https://issues.redhat.com/browse/RHEL-70925
|
|
|
|
Signed-off-by: John Allen <johnalle@redhat.com>
|
|
---
|
|
hw/i386/amd_iommu.c | 48 +++++++++++++++++++++++++++++++++++++++++++++
|
|
hw/i386/amd_iommu.h | 2 +-
|
|
2 files changed, 49 insertions(+), 1 deletion(-)
|
|
|
|
diff --git a/hw/i386/amd_iommu.c b/hw/i386/amd_iommu.c
|
|
index 6a5e76cfef..a34e0c5f59 100644
|
|
--- a/hw/i386/amd_iommu.c
|
|
+++ b/hw/i386/amd_iommu.c
|
|
@@ -1611,8 +1611,55 @@ static void amdvi_sysbus_reset(DeviceState *dev)
|
|
amdvi_init(s);
|
|
}
|
|
|
|
+static const VMStateDescription vmstate_amdvi_sysbus_migratable = {
|
|
+ .name = "amd-iommu",
|
|
+ .version_id = 1,
|
|
+ .minimum_version_id = 1,
|
|
+ .priority = MIG_PRI_IOMMU,
|
|
+ .fields = (VMStateField[]) {
|
|
+ /* Updated in amdvi_handle_control_write() */
|
|
+ VMSTATE_BOOL(enabled, AMDVIState),
|
|
+ VMSTATE_BOOL(ga_enabled, AMDVIState),
|
|
+ VMSTATE_BOOL(ats_enabled, AMDVIState),
|
|
+ VMSTATE_BOOL(cmdbuf_enabled, AMDVIState),
|
|
+ VMSTATE_BOOL(completion_wait_intr, AMDVIState),
|
|
+ VMSTATE_BOOL(evtlog_enabled, AMDVIState),
|
|
+ VMSTATE_BOOL(evtlog_intr, AMDVIState),
|
|
+ /* Updated in amdvi_handle_devtab_write() */
|
|
+ VMSTATE_UINT64(devtab, AMDVIState),
|
|
+ VMSTATE_UINT64(devtab_len, AMDVIState),
|
|
+ /* Updated in amdvi_handle_cmdbase_write() */
|
|
+ VMSTATE_UINT64(cmdbuf, AMDVIState),
|
|
+ VMSTATE_UINT64(cmdbuf_len, AMDVIState),
|
|
+ /* Updated in amdvi_handle_cmdhead_write() */
|
|
+ VMSTATE_UINT32(cmdbuf_head, AMDVIState),
|
|
+ /* Updated in amdvi_handle_cmdtail_write() */
|
|
+ VMSTATE_UINT32(cmdbuf_tail, AMDVIState),
|
|
+ /* Updated in amdvi_handle_evtbase_write() */
|
|
+ VMSTATE_UINT64(evtlog, AMDVIState),
|
|
+ VMSTATE_UINT32(evtlog_len, AMDVIState),
|
|
+ /* Updated in amdvi_handle_evthead_write() */
|
|
+ VMSTATE_UINT32(evtlog_head, AMDVIState),
|
|
+ /* Updated in amdvi_handle_evttail_write() */
|
|
+ VMSTATE_UINT32(evtlog_tail, AMDVIState),
|
|
+ /* Updated in amdvi_handle_pprbase_write() */
|
|
+ VMSTATE_UINT64(ppr_log, AMDVIState),
|
|
+ VMSTATE_UINT32(pprlog_len, AMDVIState),
|
|
+ /* Updated in amdvi_handle_pprhead_write() */
|
|
+ VMSTATE_UINT32(pprlog_head, AMDVIState),
|
|
+ /* Updated in amdvi_handle_tailhead_write() */
|
|
+ VMSTATE_UINT32(pprlog_tail, AMDVIState),
|
|
+ /* MMIO registers */
|
|
+ VMSTATE_UINT8_ARRAY(mmior, AMDVIState, AMDVI_MMIO_SIZE),
|
|
+ VMSTATE_UINT8_ARRAY(romask, AMDVIState, AMDVI_MMIO_SIZE),
|
|
+ VMSTATE_UINT8_ARRAY(w1cmask, AMDVIState, AMDVI_MMIO_SIZE),
|
|
+ VMSTATE_END_OF_LIST()
|
|
+ }
|
|
+};
|
|
+
|
|
static void amdvi_sysbus_realize(DeviceState *dev, Error **errp)
|
|
{
|
|
+ DeviceClass *dc = (DeviceClass *) object_get_class(OBJECT(dev));
|
|
AMDVIState *s = AMD_IOMMU_DEVICE(dev);
|
|
MachineState *ms = MACHINE(qdev_get_machine());
|
|
PCMachineState *pcms = PC_MACHINE(ms);
|
|
@@ -1634,6 +1681,7 @@ static void amdvi_sysbus_realize(DeviceState *dev, Error **errp)
|
|
}
|
|
|
|
s->pci = AMD_IOMMU_PCI(pdev);
|
|
+ dc->vmsd = &vmstate_amdvi_sysbus_migratable;
|
|
} else {
|
|
s->pci = AMD_IOMMU_PCI(object_new(TYPE_AMD_IOMMU_PCI));
|
|
/* This device should take care of IOMMU PCI properties */
|
|
diff --git a/hw/i386/amd_iommu.h b/hw/i386/amd_iommu.h
|
|
index ece71ff0b6..741dd9a910 100644
|
|
--- a/hw/i386/amd_iommu.h
|
|
+++ b/hw/i386/amd_iommu.h
|
|
@@ -329,7 +329,7 @@ struct AMDVIState {
|
|
bool excl_enabled;
|
|
|
|
hwaddr devtab; /* base address device table */
|
|
- size_t devtab_len; /* device table length */
|
|
+ uint64_t devtab_len; /* device table length */
|
|
|
|
hwaddr cmdbuf; /* command buffer base address */
|
|
uint64_t cmdbuf_len; /* command buffer length */
|
|
--
|
|
2.39.3
|
|
|