Hi Jason,

On Thu, Nov 6, 2025 at 5:05 AM Jason Wang <[email protected]> wrote:
>
> x
>
> On Thu, Nov 6, 2025 at 6:17 AM Peter Xu <[email protected]> wrote:
> >
> > On Wed, Nov 05, 2025 at 10:27:59AM +0100, Jinpu Wang wrote:
> > > > > These are not present (or not supported) on QEMU 8.2.10, which causes
> > > > > the migration state load to fail.
> > > >
> > > > Interesting, we've already done the compat work:
> > > >
> > > > GlobalProperty hw_compat_8_1[] = {
> > > >     { TYPE_PCI_BRIDGE, "x-pci-express-writeable-slt-bug", "true" },
> > > >     { "ramfb", "x-migrate", "off" },
> > > >     { "vfio-pci-nohotplug", "x-ramfb-migrate", "off" },
> > > >     { "igb", "x-pcie-flr-init", "off" },
> > > >     { TYPE_VIRTIO_NET, "host_uso", "off"},
> > > >     { TYPE_VIRTIO_NET, "guest_uso4", "off"},
> > > >     { TYPE_VIRTIO_NET, "guest_uso6", "off"},
> > > > };
> > > > const size_t hw_compat_8_1_len = G_N_ELEMENTS(hw_compat_8_1);
> > > Yeah, I noticed the same.
> >
> > AFAICT, this is a known issue..
> >
> > Thomas and I used to suggest we should not turn on USO* by default by
> > probing kernel, but only allow user choosing it explicitly in a VM
> > setup. IOW, dest qemu should stop booting at all when kernel is too old
> > (when user chose the feature).
> >
> > See:
> >
> > https://lore.kernel.org/all/ZqQNKZ9_OPhDq2AK@x1n/
> >
> > Thanks,
>
> I see, so the reason is that the destination doesn't support USO in
> the kernel. For those kinds of features that depend on the kernel, I
> agree to disable them by default. But I'm not sure if it's too late or
> maybe we can do strict peer feature check like this in
> virtio_net_get_features():
>
>      if (!peer_has_uso(n)) {
> -        virtio_clear_feature_ex(features, VIRTIO_NET_F_HOST_USO);
> -        virtio_clear_feature_ex(features, VIRTIO_NET_F_GUEST_USO4);
> -        virtio_clear_feature_ex(features, VIRTIO_NET_F_GUEST_USO6);
> +        if (n->strict_peer_feature_check) {
> +            if (virtio_has_feature_ex(features, VIRTIO_NET_F_HOST_USO) |
> +                virtio_has_feature_ex(features, VIRTIO_NET_F_GUEST_USO4) |
> +                virtio_has_feature_ex(features, VIRTIO_NET_F_GUEST_USO6))
> +                error_setg(errp, "virtio_net: peer doesn't support USO");
> +        } else {
> +            virtio_clear_feature_ex(features, VIRTIO_NET_F_HOST_USO);
> +            virtio_clear_feature_ex(features, VIRTIO_NET_F_GUEST_USO4);
> +            virtio_clear_feature_ex(features, VIRTIO_NET_F_GUEST_USO6);
> +        }
>      }
>
is there any document to learn how the feature checking works,
function like peer_has_uso, what is the peer exactly in this context,
is it the migration target or host kernel?
> So qemu would fail earlier than fail the migration.
>
> Thanks

Thx!
>
>
> >
> > --
> > Peter Xu
> >
>

Reply via email to