From nobody Sun Feb 8 08:46:42 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) client-ip=8.43.85.245; envelope-from=devel-bounces@lists.libvirt.org; helo=lists.libvirt.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) smtp.mailfrom=devel-bounces@lists.libvirt.org; arc=fail (Bad Signature); dmarc=pass(p=reject dis=none) header.from=lists.libvirt.org Return-Path: Received: from lists.libvirt.org (lists.libvirt.org [8.43.85.245]) by mx.zohomail.com with SMTPS id 1762479975764186.52300576900961; Thu, 6 Nov 2025 17:46:15 -0800 (PST) Received: by lists.libvirt.org (Postfix, from userid 993) id C3D2E44325; Thu, 6 Nov 2025 20:46:14 -0500 (EST) Received: from [172.19.199.29] (lists.libvirt.org [8.43.85.245]) by lists.libvirt.org (Postfix) with ESMTP id 17CFC44336; Thu, 6 Nov 2025 20:43:28 -0500 (EST) Received: by lists.libvirt.org (Postfix, from userid 993) id 5AE90442D1; Thu, 6 Nov 2025 20:42:55 -0500 (EST) Received: from CH5PR02CU005.outbound.protection.outlook.com (mail-northcentralusazon11012004.outbound.protection.outlook.com [40.107.200.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (3072 bits) server-digest SHA256) (No client certificate requested) by lists.libvirt.org (Postfix) with ESMTPS id ACDDB442CD for ; Thu, 6 Nov 2025 20:42:53 -0500 (EST) Received: from SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) by DM4PR12MB5746.namprd12.prod.outlook.com (2603:10b6:8:5d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9298.12; Fri, 7 Nov 2025 01:42:50 +0000 Received: from SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd]) by SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd%6]) with mapi id 15.20.9298.006; Fri, 7 Nov 2025 01:42:50 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-26) on lists.libvirt.org X-Spam-Level: X-Spam-Status: No, score=-5.0 required=5.0 tests=ARC_SIGNED,ARC_VALID,BAYES_00, DKIM_INVALID,DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED, RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_PASS autolearn=unavailable autolearn_force=no version=4.0.1 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=QtBLMhkX57yM+mYnUxGHubzR3E/j2cReG2vtPdinsh6fH3oZ+KkwW/eUHOwJWZ6q00diIYa43jIyyj/QntrK8+yZ3ohdMKJnR8SiYSlG5T3ryaxdznRhUGMpCwglOWVscGw8RhIuLLHlyeSiBybzYktp1P/DbGOj8bWwC8fRQeMdmDJPvJDWwxTK+EUaiwj8WvKlwTrrB0RyGC2IMxR4y39EFYPQv8+AAxUyy1WmaHeONtgUp05K7BVY4mjHgBJF1cW8EY3KGqaNrYWkRDNWwPDsnHDb+zGHUH1vBr2miyAijGgR4adXvUM1veQ9pcFm94Y8KV9hEArL+63QRQ2cUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=gKmVD8QE/nQF705iTDJBtXDlBsIaBqv66KkQGExmRyI=; b=vjKL8IGnfMTDjMswdPiV/gKEuH3Gwu2P+sfy7CQVcFF5gQz8aCC6jsKlnoxrng7L2JneZzj5ALewUPsq9f2AMv+SN9fWNINCvliDpedc9jEZ+lhP5HrJQmSkff2xDpQIUfeG6AAc7niUg9qXg/WWlUzeIv+4sCXiwA+WvBXg74XyL3QgpFikkhgxVVa7UKNC+29T5pCxraOxq3MP0p6PTBP+61Rzd+51LFELG2i6yLtdJxnbgfqU+Qa0r+umiPIYj7RkvDbQ8Y1dqsYtW9HzIk/o9w2xciDzKGpZWbi7ZHqzFA6v54bMxi1gbpxlG7Ag0djEZFwdOGXhL8yhVIfLhw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gKmVD8QE/nQF705iTDJBtXDlBsIaBqv66KkQGExmRyI=; b=RFXw2xe2/AhHHNtTvJn3KqqCp3V/Fjc7qgi+Df4XqeYDGgz/1aqP9lsIlXR2pAwye8lxrGZmARtRVjZ26xrvltonSfl9lGUeU2BJOCB5zb8vVGqW1MSp/VUW2X8FxNT2ezdmQrN1gBM7rqEwkMsxRbPgqsXYLsyTyMcuOclQ0EWErZx1TRphqYGHnSMDwAeFa0LzcFsArnJU17DUcvPYTLPZQnr+yrY+BLCR+GlRLyHw0om1WcKzNhW0FBVMubDFWOH1MwRUvnZyZaUlNv+nz/9V/WrtVluBVOyFEO0XtnSRVD+ZCXsRCWSXo9qwPTx7fWl9dNvxstPQNYkpJbBJbQ== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; To: devel@lists.libvirt.org Subject: [RFC PATCH v2 1/4] conf: Support EGM memory device model Date: Thu, 6 Nov 2025 17:42:44 -0800 Message-ID: <20251107014247.1280693-2-nathanc@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251107014247.1280693-1-nathanc@nvidia.com> References: <20251107014247.1280693-1-nathanc@nvidia.com> Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: BYAPR05CA0096.namprd05.prod.outlook.com (2603:10b6:a03:e0::37) To SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN7SPRMB0025:EE_|DM4PR12MB5746:EE_ X-MS-Office365-Filtering-Correlation-Id: 49768072-8ddb-46d6-ad40-08de1d9ef5ed X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?vBAN28g/b3cWit8NkwtSsuWMuBaaCVYmiOAxaC/VmptkMSFcuj65+7RtzQTa?= =?us-ascii?Q?SkiqEAwK6qSM9fLHiAJoUYVY6ya1nZANCAVeeoGmLIHpEdIt26HEFM8vFrn9?= =?us-ascii?Q?DUe8aE4AwGVDMe3wOhd3LaXTK7jCB+LjuESd6/Q+FVvIrOwAVy53AQjpuKrW?= =?us-ascii?Q?BcYHpNC8W+1f3OPymCGkbrzhiTu3Upul+oy54s1FXHRzfy8UU5bA6Jq/Ne9j?= =?us-ascii?Q?hIf6oaho6ZPUoCxZsOYyF27vhrKSxl+1BjCc3TF+cI72L3v2qPxNoOdnJLco?= =?us-ascii?Q?Lj0qxcpHIDlS/cCI0N1HATHusdh+baSS/k+IknFl4lH7oYHGdNMiZuh3ropN?= =?us-ascii?Q?BISVwe50WvcU/i2Q3v+H3ZSNzsY5CuNhzxK5TqP3aBuEKZf83RLRCi85cxs0?= =?us-ascii?Q?m6f2djDf8LxKTlSYGXOndne9xRICZRFPb5j0ZVExKuZtxEbtjtwTaeOKgptH?= =?us-ascii?Q?G0omAcKPDCtmVYm0wyz0uPsh/mk09niCd4GbIR51B2m0Rjx9DcnQD/wKnfF6?= =?us-ascii?Q?dWQtMrDJn8DfhrFV37vHSYEbvDxxVmTzN0r7oRMq/Z5qGRkheDqSM3B+wciv?= =?us-ascii?Q?WUmvdki7C/lDsR6jujS1vNdriydc3FtF/l02ZX2JDAsjTJf4VzyA2jm+xUFs?= =?us-ascii?Q?APP0BY7UtjEBZfVx9LTS8A86DNcje1y17hM/9yF0vKJzMVB1Y241MbL5Ecyn?= =?us-ascii?Q?YPvs9tZ0DA/ICBa/eVJPiujs4W5+DQh0Zg58TzhUKvfQ1r7qBc8GTa0U5fLD?= =?us-ascii?Q?9auXxeWTdKd3wXxkjPTX3u45EBu/EiuV4hNmM/DyFNfsHaAs3bca/DIuJm35?= =?us-ascii?Q?v3sEowBDBBjN7KSYGdA1D67ELfpaabVBQ6RH8CFLgMlGbPtgl/Kovjg/kn1Z?= =?us-ascii?Q?cpw4ULA5C9Kbt1FCMMf8jSYDXiT2GwA6CsvWiFVbti+xit1+uOq4+1k4xIU8?= =?us-ascii?Q?XpaEc54ydmZpJ5T0K4YLa/FVRhHn7dwDcIdoGOnlmxmx0tgHcDJq8jQ2w/rI?= =?us-ascii?Q?eSM2VoFuD9MxdqI4Y92Oz5T3lsmiDoy+j5QvkJE9jd4wQotFYuNSAStwJ65B?= =?us-ascii?Q?nYT7RasWlEsRoMAAjXFnQT7czBHDZ4nSjgl14JQDLzSFnpSjfGN6rQZzzCbS?= =?us-ascii?Q?Dtp4VT7zTm6YWr5FGAX6deg0PBMufYZKjJj41ke6nNDEWV4XHSZVr020xO2T?= =?us-ascii?Q?iMgZS0cwFJfs2KXIyqrGWkDU1t0QZ7EtDIR124SWHhKXbDJ/mvwjR3zZtMNx?= =?us-ascii?Q?fN1nHhQR0dtL3gXtIX+6UJTPg0YwnVrzBu78F2QY305URYJeWUFNyjP7cee0?= =?us-ascii?Q?47NNGLZsqhIiybnBgQaoCYkZnOrvnnKBebb/p4iYWDoGr8RzSmL84BP+DAhZ?= =?us-ascii?Q?2JbvVRzEkBTjQfTvIDu8AdQXLRa8TRMqurccTW5CNmfJYAuNQ6U4kK49ZH2j?= =?us-ascii?Q?MrrIQRQ33CV/fJQEdjCLw0HH02tyQWEi?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN7SPRMB0025.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?Zl+hYT5SiFx9iZTXZ1m6VfkJ1LRcHoQQM8IfUUAVoXszGq2h6JaiGCSnRnJ0?= =?us-ascii?Q?m1s22jl3pdkSU1TGx2jmbPLTj6dY3EViV8fadeVh94Kqdi+wuccosZV2ezt+?= =?us-ascii?Q?T84Ot3nQUTy3v2PZF23XDzF1ZLD5m8GkIDs51YDqHghrslUslvW8orkHPfS4?= =?us-ascii?Q?SDTuBOWDF5/5oIIoJ8mwFBTVi4RiuXkWH8kn24AAOPcwFVTFZ3b37eZjRVjq?= =?us-ascii?Q?YRWcRoBog+hF193kgDapxbVwIbv+VOIOHzkAfHuBerp1z7Boshpqw1hLzBuJ?= =?us-ascii?Q?4skfLCfBHXRAqtpa8cMylaDgT+aJHKqAmaGkoW+q/RDG4Hi66B1QunQD/OLd?= =?us-ascii?Q?ug0FwSXSqpPYxCbuwJLGD4F8wtBKkFIGVMUsNYhx9EghzXRcZKOu5ez7cMuB?= =?us-ascii?Q?QVCNBy1KamCF6U7gvFqdFQo0+kO1OS/Mjaz3WQ3HcSH/+rOqlncXu31pnjDh?= =?us-ascii?Q?gaCDZY2U8dHxtWCm1STBFxFEUZrwW0q/jH2aXthiWjosg5RKt9k2ceOQ1rFC?= =?us-ascii?Q?q0qiBGJbx5Ka5Y/TUGK8llYGYBHN8zeiAL/LzZ6s+yHU6Nmgh6H5QaKmiCPQ?= =?us-ascii?Q?t2+gmNjaZCXC2g1E85ZBNhzkGxx/hKAhQ5vmhROQ+IjkejStwAxkJ24ZjEcC?= =?us-ascii?Q?NaP8H8MhrHXUbAKrVsQJblwwv0FRTc1a8YBjEGZZiy+JK3OUwtme8elbHACo?= =?us-ascii?Q?uCCrt0xXOCl7oIHHR3DpD9Jm1Q5NnHX9yNb9wgVDq9kOKv8/N3fYcMI087GH?= =?us-ascii?Q?/0npOw4BEjyurI9MCo/qTxtD+zD43D8Rx6oy8trA/1RaL200FYM9poV+1MwH?= =?us-ascii?Q?/8a4mw7fBsxaOc5N0Xz/CrKOdCCTjSVa8zKDdRw/KZAx85G4hUGuUwDY16NO?= =?us-ascii?Q?3RgdX2+5WMsy5gYoSN6KqrGL4jLKh+c92l0sVO4GhX2/npxLmxXGmR0tralH?= =?us-ascii?Q?3VYMaRS+XjMYI99nTCTPukHius9kj0+d4Mo4knwLvlbHerO8/FVxPJ8Q5e45?= =?us-ascii?Q?83KUieu7pPrqA8/Mhei9LPsmT3X3vZcUFCXPgoWPJx0OTPbrF79r/JrbwN2M?= =?us-ascii?Q?li4WGF5ikaE8KxcHXwYZN9G0dYE6/rDaNlIH7c8IHT5AYSBGSZcsbdGlRQsS?= =?us-ascii?Q?1UD3sRnc7nRfDlO4OCqRB2ciF5rkUlFJmPdpSHZMvDnEoTmyMTEEdq73L9S3?= =?us-ascii?Q?FiirgWAfyuUMBNL5sFvNmxK6AilBVUHOo8TSlTRaKE/9/oVUQEIURfy8ZY/S?= =?us-ascii?Q?gGRvXzUgu+e2yDWUY9GG5XC1wMZBCDR/XUj5rVYKmYGOQsDsvKd0xW4WPhPT?= =?us-ascii?Q?vticmhWSA1wQVmuniKGkPblqzdE3VEisBIstQED8u0HJleIM9lbKkabIamYI?= =?us-ascii?Q?UsGGDcKoSPSZzcTxBA/J4M8W8u3s4wW9PZJPQtE8c2C6n7kSUcswhSjCLau/?= =?us-ascii?Q?foHxy1yexD/HUzCex6wcv2DcYKYqPysWltDHnaeMGi3si1rh/4gXgxoGgfF0?= =?us-ascii?Q?+PSfCZiAaXvy7It4o3ChXEXJ8BBhHLXPP4Los+v/6uw4vd55Y2dI77oW1D4B?= =?us-ascii?Q?JceZCNEoHH2AqarNnKDrHE7+0i5h4ICulM2PbbRx?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: 49768072-8ddb-46d6-ad40-08de1d9ef5ed X-MS-Exchange-CrossTenant-AuthSource: SN7SPRMB0025.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Nov 2025 01:42:50.2165 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Slh3k+C8M8p7igy9acfUavyAwH2LdvvPKRh26Y9hfgJKFTN4qIZkufPb6bTpFYsOw5u93OpBZ7GDM4UIurvbow== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB5746 Message-ID-Hash: ABSCYEB4WBD6NAJWLTKNC6MF3T3VHVLD X-Message-ID-Hash: ABSCYEB4WBD6NAJWLTKNC6MF3T3VHVLD X-MailFrom: nathanc@nvidia.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; header-match-devel.lists.libvirt.org-0; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: skolothumtho@nvidia.com, nicolinc@nvidia.com, nathanc@nvidia.com, mochs@nvidia.com X-Mailman-Version: 3.3.10 Precedence: list List-Id: Development discussions about the libvirt library & tools Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: From: Nathan Chen via Devel Reply-To: Nathan Chen X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZM-MESSAGEID: 1762479978909158500 Content-Type: text/plain; charset="utf-8" Add support for EGM memory device model with 'path' source attribute and 'pciDev' target attribute to denote host EGM device backing path and PCI device alias to associate the vEGM with, respectively. Signed-off-by: Nathan Chen --- docs/formatdomain.rst | 18 +++++++++++++++++- src/conf/domain_conf.c | 28 ++++++++++++++++++++++++++++ src/conf/domain_conf.h | 7 +++++++ src/conf/domain_postparse.c | 1 + src/conf/domain_validate.c | 15 +++++++++++++++ src/conf/schemas/domaincommon.rng | 6 ++++++ 6 files changed, 74 insertions(+), 1 deletion(-) diff --git a/docs/formatdomain.rst b/docs/formatdomain.rst index 39bdecf9a1..06e3580f37 100644 --- a/docs/formatdomain.rst +++ b/docs/formatdomain.rst @@ -9000,6 +9000,16 @@ Example: usage of the memory devices 16384 + + + /dev/egm0 + + + 524288 + 0 + ua-hostdev0 + + ... =20 @@ -9011,7 +9021,8 @@ Example: usage of the memory devices persistent memory device. :since:`Since 7.1.0` Provide ``virtio-mem`` m= odel to add paravirtualized memory device. :since:`Since 7.9.0` Provide ``sgx-epc`` model to add a SGX enclave page cache (EPC) memory to the g= uest. - :since:`Since 8.10.0 and QEMU 7.0.0` + :since:`Since 8.10.0 and QEMU 7.0.0` Provide ``egm`` model to add a EGM + (Extended GPU Memory) device. =20 ``access`` An optional attribute ``access`` ( :since:`since 3.2.0` ) that provides @@ -9146,6 +9157,11 @@ Example: usage of the memory devices The physical address in memory, where device is mapped. :since:`Since 9.4.0` =20 + ``pciDev`` + For ``egm`` only. + The PCI device that is enabled to access the system memory via + association with the EGM device. + =20 IOMMU devices ~~~~~~~~~~~~~ diff --git a/src/conf/domain_conf.c b/src/conf/domain_conf.c index 4737594487..ac97b44b9e 100644 --- a/src/conf/domain_conf.c +++ b/src/conf/domain_conf.c @@ -1522,6 +1522,7 @@ VIR_ENUM_IMPL(virDomainMemoryModel, "virtio-pmem", "virtio-mem", "sgx-epc", + "egm", ); =20 VIR_ENUM_IMPL(virDomainShmemModel, @@ -3608,6 +3609,9 @@ void virDomainMemoryDefFree(virDomainMemoryDef *def) case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: virBitmapFree(def->source.sgx_epc.nodes); break; + case VIR_DOMAIN_MEMORY_MODEL_EGM: + g_free(def->source.egm.path); + g_free(def->target.egm.pciDev); case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -14048,6 +14052,10 @@ virDomainMemorySourceDefParseXML(xmlNodePtr node, } break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + def->source.egm.path =3D virXPathString("string(./path)", ctxt); + break; + case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -14124,6 +14132,10 @@ virDomainMemoryTargetDefParseXML(xmlNodePtr node, addr =3D &def->target.virtio_pmem.address; break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + def->target.egm.pciDev =3D virXPathString("string(./pciDev)", ctxt= ); + break; + case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: @@ -16183,6 +16195,12 @@ virDomainMemoryFindByDefInternal(virDomainDef *def, continue; break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + if (STRNEQ(tmp->source.egm.path, mem->source.egm.path)) + continue; + if (STRNEQ(tmp->target.egm.pciDev, mem->target.egm.pciDev)) + continue; + case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -22047,6 +22065,7 @@ virDomainMemoryDefCheckABIStability(virDomainMemory= Def *src, =20 case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -26525,6 +26544,10 @@ virDomainMemorySourceDefFormat(virBuffer *buf, } break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + virBufferEscapeString(&childBuf, "%s\n", def->source.= egm.path); + break; + case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -26589,6 +26612,11 @@ virDomainMemoryTargetDefFormat(virBuffer *buf, } break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + if (def->target.egm.pciDev) + virBufferAsprintf(&childBuf, "%s\n", def->tar= get.egm.pciDev); + break; + case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_NONE: diff --git a/src/conf/domain_conf.h b/src/conf/domain_conf.h index a63d922853..461c855c0b 100644 --- a/src/conf/domain_conf.h +++ b/src/conf/domain_conf.h @@ -2741,6 +2741,7 @@ typedef enum { VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM, /* virtio-pmem memory device */ VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM, /* virtio-mem memory device */ VIR_DOMAIN_MEMORY_MODEL_SGX_EPC, /* SGX enclave page cache */ + VIR_DOMAIN_MEMORY_MODEL_EGM, /* Extended GPU memory */ =20 VIR_DOMAIN_MEMORY_MODEL_LAST } virDomainMemoryModel; @@ -2773,6 +2774,9 @@ struct _virDomainMemoryDef { struct { virBitmap *nodes; /* source NUMA nodes */ } sgx_epc; + struct { + char *path; + } egm; } source; =20 union { @@ -2798,6 +2802,9 @@ struct _virDomainMemoryDef { } virtio_mem; struct { } sgx_epc; + struct { + char *pciDev; + } egm; } target; =20 virDomainDeviceInfo info; diff --git a/src/conf/domain_postparse.c b/src/conf/domain_postparse.c index 38e731348d..0181d21f0e 100644 --- a/src/conf/domain_postparse.c +++ b/src/conf/domain_postparse.c @@ -632,6 +632,7 @@ virDomainMemoryDefPostParse(virDomainMemoryDef *mem, case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: case VIR_DOMAIN_MEMORY_MODEL_DIMM: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; diff --git a/src/conf/domain_validate.c b/src/conf/domain_validate.c index 93a2bc9b01..8986d8f390 100644 --- a/src/conf/domain_validate.c +++ b/src/conf/domain_validate.c @@ -2482,6 +2482,7 @@ virDomainMemoryDefCheckConflict(const virDomainMemory= Def *mem, } break; case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -2528,6 +2529,7 @@ virDomainMemoryDefCheckConflict(const virDomainMemory= Def *mem, switch (other->model) { case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_LAST: continue; break; @@ -2708,6 +2710,19 @@ virDomainMemoryDefValidate(const virDomainMemoryDef = *mem, } break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + if (!mem->source.egm.path) { + virReportError(VIR_ERR_XML_DETAIL, "%s", + _("path is required for model 'egm'")); + return -1; + } + if (!mem->target.egm.pciDev) { + virReportError(VIR_ERR_XML_DETAIL, "%s", + _("pciDev is required for model 'egm'")); + return -1; + } + break; + case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: default: diff --git a/src/conf/schemas/domaincommon.rng b/src/conf/schemas/domaincom= mon.rng index ace74fee08..b2429cf5b4 100644 --- a/src/conf/schemas/domaincommon.rng +++ b/src/conf/schemas/domaincommon.rng @@ -7481,6 +7481,7 @@ virtio-pmem virtio-mem sgx-epc + egm @@ -7607,6 +7608,11 @@ + + + + + --=20 2.43.0 From nobody Sun Feb 8 08:46:42 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) client-ip=8.43.85.245; envelope-from=devel-bounces@lists.libvirt.org; helo=lists.libvirt.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) smtp.mailfrom=devel-bounces@lists.libvirt.org; arc=fail (Bad Signature); dmarc=pass(p=reject dis=none) header.from=lists.libvirt.org Return-Path: Received: from lists.libvirt.org (lists.libvirt.org [8.43.85.245]) by mx.zohomail.com with SMTPS id 1762480042876328.436785688756; Thu, 6 Nov 2025 17:47:22 -0800 (PST) Received: by lists.libvirt.org (Postfix, from userid 993) id 4155D44152; Thu, 6 Nov 2025 20:47:22 -0500 (EST) Received: from [172.19.199.29] (lists.libvirt.org [8.43.85.245]) by lists.libvirt.org (Postfix) with ESMTP id A9C0C4431F; Thu, 6 Nov 2025 20:43:41 -0500 (EST) Received: by lists.libvirt.org (Postfix, from userid 993) id 71AA844006; Thu, 6 Nov 2025 20:42:56 -0500 (EST) Received: from CH5PR02CU005.outbound.protection.outlook.com (mail-northcentralusazon11012004.outbound.protection.outlook.com [40.107.200.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (3072 bits) server-digest SHA256) (No client certificate requested) by lists.libvirt.org (Postfix) with ESMTPS id E7B3A442D0 for ; Thu, 6 Nov 2025 20:42:53 -0500 (EST) Received: from SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) by DM4PR12MB5746.namprd12.prod.outlook.com (2603:10b6:8:5d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9298.12; Fri, 7 Nov 2025 01:42:51 +0000 Received: from SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd]) by SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd%6]) with mapi id 15.20.9298.006; Fri, 7 Nov 2025 01:42:51 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-26) on lists.libvirt.org X-Spam-Level: X-Spam-Status: No, score=-5.0 required=5.0 tests=ARC_SIGNED,ARC_VALID,BAYES_00, DKIM_INVALID,DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED, RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_PASS autolearn=unavailable autolearn_force=no version=4.0.1 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wkB9t/Nwc+y5BqYzfsBOTWgH6at7MXS3Wjbpjok7wioaJoWKnn3NE9dcgACgLTvqWFJr4g7N88CZrZ3Eksy0OiVVdzG6WCLN5Kuuv8A2DVp1RLEcHowRCtXKXT9K1goBWKi5xiaR63QQQcs9jP/kBj5+wNk8dOJfHBT2KsNA8n92sMoBFkBGLSVx8bMUE4ug5KlrND6lxoyBSfM54FUPxIrNpdASsPN9CYPASuWzBVyTPSjLXgqw2ljACUEnGfE9OTJDI36+xsylzGb0gFmdV8GG/5VcbKdBcr6ABcFGcd+IkztqsBXwdfKNcO8rvf16jpGW2c164rphgakYFI5wRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=FVoWNb9Ce8Y2wDoWCMHqfPa6wS3TxWBowVBe2/Hzy+0=; b=Xq7yLPqqU7qoIz+See8RHrjbY7O+sFLU4aVG+IF74xLY/sqH4ClUfzVO7VIRimuXxY8elM18Zj8ca9aWHETOXmf3TgHcXTbwWhPL4wqK+EPbpnK4qUG1WqKBeqQw5rpL3ta81l7xA5r8o9WmZLnWE44Qp6H8wBOb6Nx7HmtkjWzSrfQd0ibmqoFuLOOT/1vCiXXXrfgbXRCDLiD4MukF3sBxtjHqEaN9Z2zNphFDnUHwAhPkCkWyKfPzX+kZfnFEbjbGYd82JGjsiecbQLOYLz7FDX18DpzcEWkyYFIlguutdWMeDs3zap3EZ5jOFS7Nm6US1G3eY+Zh/7txq7XJ8A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FVoWNb9Ce8Y2wDoWCMHqfPa6wS3TxWBowVBe2/Hzy+0=; b=ZXe3vLARzSPFvLuBd54GELHkE1LuMXpMJrgBUxTkqrSlMOaJ5661JsS4IUYNxyE+QarXZv8cM1wVvA9LCYysvrE0DGwMD56hj6UiVBxFQEmJncimw3s8Zqc2VyLg119z7ykmExYkdCXP6/QneISnJdlxmLwzpUeEphaCIdMWTN7VcwF+E67bdUttgwBSX+yCBBQXGCZ5aax23CLtGRKIsslSGRawa+XgfCN5DmQJCiWQDe589nt7tAwO2mX//d4ZCjjRiCPVWWdsZClwE7hT53m1AlF7AFRJn75+T9pDTRzcWGZYaI0dQGxnhPWUWxERWxpxNpQVBjMBQuAEZSN6OA== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; To: devel@lists.libvirt.org Subject: [RFC PATCH v2 2/4] qemu: Add cgroup, namespace, and seclabel setup for EGM memory device model Date: Thu, 6 Nov 2025 17:42:45 -0800 Message-ID: <20251107014247.1280693-3-nathanc@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251107014247.1280693-1-nathanc@nvidia.com> References: <20251107014247.1280693-1-nathanc@nvidia.com> Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: BY3PR04CA0020.namprd04.prod.outlook.com (2603:10b6:a03:217::25) To SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN7SPRMB0025:EE_|DM4PR12MB5746:EE_ X-MS-Office365-Filtering-Correlation-Id: 4a31ee18-dab8-4e44-4abe-08de1d9ef6a4 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?IfRonMALtdd8Ck1cfbPiveEweTdeH1+VseXLiy/Eqt5dg+9UhzxLJb5w074m?= =?us-ascii?Q?yxMSd+B8w2UbNRr32H3oShgNb0LzbPGq26bqIJP1zWM8xDG1T2j7DUbvQl6Q?= =?us-ascii?Q?izpRmc7Hk0w6TjxD3Jc8d7dNHz5U8F0+9u5Inhmcf8xD6qBFWAxpFdTfadlw?= =?us-ascii?Q?diuuwWmUvE0GWHhVFTWRBc1dFpgpteNb8klDF0hBOdyP4NIZcYXkoF9f1zqr?= =?us-ascii?Q?C/XHnlfxm9fqIfEvXe/FkIgEhX0ldJAb0f86QSFc522QkoIFDIIfW7h/e2NE?= =?us-ascii?Q?JV4EcfbUnaKRc3tlh6eiuD00TtRrU3yF+r09TJQ/t0Az5b6YdcXN/WDRsURg?= =?us-ascii?Q?/pa7AZYNDNA59Nk6N5st6mGoyD3xE34vE5BBLaEqegYhdeUT/cuBXrOogQlP?= =?us-ascii?Q?NyGupumyt6J04D9JPicPJmuq59p5bmxoSO7yg8Ip31RaGWFbSU7X0sGyUGo/?= =?us-ascii?Q?KiQfaIm1y0lu2a0zGelZMWof5oNgbPuBRCck3hBzQKTNo7p/c6F3qdf0nhKP?= =?us-ascii?Q?vV+a0tAwkKmIeVtORQx81yuExCpHlcQWQNoldiS8ghchaBveCvJ/pDWpwc9P?= =?us-ascii?Q?c7tXiKZ/AYuZZhbFtnQC6dNuowf+fZmUDXfgUvV09VwYNBtS5INJ6RVL28lz?= =?us-ascii?Q?se5t1B4EgMp2fQuBKiM2fd9/8A25/9E519KTW37BSbPoT9lV/GPE+/Cb2oNB?= =?us-ascii?Q?O2CUv1cuKRnE+XCAzdpmknk20NO7+pkcAGbecf7UEvCKWym/X5JyUsouLwK0?= =?us-ascii?Q?3lRd9XTkB5wbFsoYA7ix+ATBno4QWkDjK6TmedzjJX6RyNssNqWig9cQrG2H?= =?us-ascii?Q?hqe65jGbEBSy42huCEiMV0DnXClZeEXN4pSwTPagMExyUs42iMChVoXfQvhF?= =?us-ascii?Q?A6k8S+dBkUR77OXG9TP6YzDKZ6KI8AMsT0TUNBYwYywV4+7Dj7t+wGKIp39Q?= =?us-ascii?Q?UTMDm+4mZQszi6Y2cE3jzQYo5JNzOTOP+/I8rU9it8gHVN28F7YJmGJ56nct?= =?us-ascii?Q?YjMRh4XCYNbu5q9X1eJIXAwX7sVQ+xqcFTbK2B8/5QKJNabf/e9fhAIBkudG?= =?us-ascii?Q?9lgBY4/rocxex+FJ2wXqssxMWb6FbJS7ndwsVZ3cc0RxN6udG2sY7+CtFnkE?= =?us-ascii?Q?tuRwqSPVuJmqSRptEupRg52PaU8/XGqVw9Plkxb/aVOnY7ijAM+JAw6RFBwG?= =?us-ascii?Q?JomEF7EfMSVJlRV+MaQMfqN+IHuQYo+I79qJdDtH5XSdA0tAjUsmDb96xB07?= =?us-ascii?Q?E+Mud7/owUG8+xOHP9xIJuHT7qR4LFxEaMLQ7s4UUO68T8Z8QfYXrEO4ci7N?= =?us-ascii?Q?4CUVuGbbl6DF1s0dTlLS6KO8389ZAPU8p3K4UNSnprK5ZoEGKQZ6za5KK9AZ?= =?us-ascii?Q?72kt8TpGrKALWlGJOvlE/ubYMbfjrM0CK2tOlVTjdbItYwjlDWR395GkNc4F?= =?us-ascii?Q?baC1p8kGSih9A+CQXBBXW/kfDE5Y6CgZ?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN7SPRMB0025.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?o6PgoHmx3oB8KVJ3gKOX8b1CvLRpsbQF/bqCUO6bXu+n/erBjkBprqfDVRkF?= =?us-ascii?Q?n+dLWx/7q60O6iJQ8G7ndKq3yxSUpeTEt3hqInzqivOqP0dqkCowZtuXItv7?= =?us-ascii?Q?3nJXhrRrrCfgtA6Z21N+O5egUUM7lqDdh4pz3d6PusEgUl5OsrcDOKD/2jvF?= =?us-ascii?Q?W6Qhed1ZgmtIHXdsfwrz9QykN8cP7LGz6fPG8seQAalRpM/tqVh+E+u9E8fc?= =?us-ascii?Q?U8l5gZBEU5ahvXIKcLoQvNHok2LxTCiv3o0RxdRaW75r9kl0iEjAN7WVBfga?= =?us-ascii?Q?VxiAtXhehLUa1Jrgk/tJRqbJUQQVDxYuvhjwmV938oHS3zGmYa9Ut1eoadQC?= =?us-ascii?Q?Wfi9+M4TRvAJ7iM0Sf9O4hCoL+3KjVV8lxwUCyAIscvjcHYr8fa1KetB9DlP?= =?us-ascii?Q?3T7s+a2yZl7SCP0CBVGpeb02P//TunHewuSsBEGMipOJBot7ThymJH6iV+I8?= =?us-ascii?Q?K7Yo3tB0e1baPhKMyyMUryQLEKQ7pPyyUyH2/1O65S7QBpZN0iQFGUxoj986?= =?us-ascii?Q?B58pTqlHCBLa+3gigEnENXfFlWhdt0309pvimAzyL7I53UTiviFULiLPy2iT?= =?us-ascii?Q?r+45WTVyqIaW5SxZU0qTvECoBZ2snjYGX9ZDhQUd5jG7DASBYckympiQmhX1?= =?us-ascii?Q?eRuY/CtXIPdtLIWhRTmxvx5pipjlVZthETL4eZAu4sIO3wraDUQI1lRFAJJl?= =?us-ascii?Q?d1On5lOv2yGUT0Q7b6pn3RRnClGBQ7Vyp+40Z6zXMVB+Gd5e7TGTj1gFIeNW?= =?us-ascii?Q?6Fj93Vl8J+wVMz38Ipmi7QVftCUo6nrwYam8jalYNg6hOg9/55DkTyKeZnw+?= =?us-ascii?Q?ZJJLHqSvDt7tYY2SLD9X0wFdVpDvhPNhl81aVt2bFXkXwxCMWFD19ytITRPT?= =?us-ascii?Q?tr+GwJNzRajSIrpH79ReWTaKTW44QVgB2uwHQCthXG2+yhARqg3Mjbz+z4GI?= =?us-ascii?Q?QHOjbhZRD4Et6zVEFEwsTcWnqLTxfB38IbwZvdlW925rCocKh8ur/wloXrkp?= =?us-ascii?Q?PXHvoAuGM0rFfHO+2X5Fe3Y0qWTfRL88hl5mq9adOHSqwqYzJnC/DiL8WYZu?= =?us-ascii?Q?dKYx8CWS6BNDbBjqtnVLgbrKhmcwVq6oT+spYFOfEhH5/u1FnoMe+hWJJvvO?= =?us-ascii?Q?sPeRQ1lQFyk46zxNTpwijTDSmIh953KGfV0bAkH3n1BM/HsEZMaCvytugCnt?= =?us-ascii?Q?lDxIthnD1OPqHGyczBoR9Gi2wlFgRP1UxCeJKoqo9j2DH5/i5VQXkLQnYrO6?= =?us-ascii?Q?FLDEKas0f5G/vG5DiE8/qn9eyEvlU0N2UM+XrnY6DYtvt2pITgRNzyZwp3zP?= =?us-ascii?Q?lKwZRsQry6UtiTQSSR7d2Ri3/b4rOsE3CCOo/7dahFA5AxyJ9emApyTD6fcA?= =?us-ascii?Q?ffHKRJvTpH6dRp0Gxc96VwAONNWMYU/sw2CloFHMz65ZgqWEy+O5YQaJ09y9?= =?us-ascii?Q?MZbL8C+LykCBSRHzmlNEnG+CQO5Vr9zvaa7iNfaP1ojeftXrMwuGytt5rpEa?= =?us-ascii?Q?HW3l2FKcaXL+4OfP/Ijl/2DWBySTbFYtAJmKaFD52enC9PQmpJrz4XDzGfdS?= =?us-ascii?Q?hoUmrreBCCEPrIwxVdeA/stkAWJNMdZOI74LfToU?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4a31ee18-dab8-4e44-4abe-08de1d9ef6a4 X-MS-Exchange-CrossTenant-AuthSource: SN7SPRMB0025.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Nov 2025 01:42:51.4152 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: lB5VFUTKLISMWDU/4yKF1z2GTnIDS1PPlBnI6foM2KDMVixQTVvueNbFSvtaR1/R0PAxF9Aj1UcXBSWwmXaYDQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB5746 Message-ID-Hash: 6LT42LUP3YXJNKK57HSWDUDXBJOCOSTG X-Message-ID-Hash: 6LT42LUP3YXJNKK57HSWDUDXBJOCOSTG X-MailFrom: nathanc@nvidia.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; header-match-devel.lists.libvirt.org-0; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: skolothumtho@nvidia.com, nicolinc@nvidia.com, nathanc@nvidia.com, mochs@nvidia.com X-Mailman-Version: 3.3.10 Precedence: list List-Id: Development discussions about the libvirt library & tools Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: From: Nathan Chen via Devel Reply-To: Nathan Chen X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZM-MESSAGEID: 1762480044846154100 Content-Type: text/plain; charset="utf-8" Implement proper isolation and access control for EGM memory devices: - Add device to cgroup for access control - Set up namespace mappings for device access - Ensure proper permissions in containerized environments - Allow EGM device path access to bypass SELinux, AppArmor, and DAC permissions Signed-off-by: Nathan Chen --- src/qemu/qemu_cgroup.c | 10 ++++++++++ src/qemu/qemu_namespace.c | 3 +++ src/security/security_apparmor.c | 2 ++ src/security/security_dac.c | 8 ++++++++ src/security/security_selinux.c | 6 ++++++ src/security/virt-aa-helper.c | 4 ++++ 6 files changed, 33 insertions(+) diff --git a/src/qemu/qemu_cgroup.c b/src/qemu/qemu_cgroup.c index f10976c2b0..1526af8a87 100644 --- a/src/qemu/qemu_cgroup.c +++ b/src/qemu/qemu_cgroup.c @@ -578,6 +578,11 @@ qemuSetupMemoryDevicesCgroup(virDomainObj *vm, VIR_CGROUP_DEVICE_RW, false) < 0) return -1; break; + case VIR_DOMAIN_MEMORY_MODEL_EGM: + if (qemuCgroupAllowDevicePath(vm, mem->source.egm.path, + VIR_CGROUP_DEVICE_RW, false) < 0) + return -1; + break; case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: @@ -616,6 +621,11 @@ qemuTeardownMemoryDevicesCgroup(virDomainObj *vm, VIR_CGROUP_DEVICE_RW, false) < 0) return -1; break; + case VIR_DOMAIN_MEMORY_MODEL_EGM: + if (qemuCgroupDenyDevicePath(vm, mem->source.egm.path, + VIR_CGROUP_DEVICE_RWM, false) < 0) + return -1; + break; case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: diff --git a/src/qemu/qemu_namespace.c b/src/qemu/qemu_namespace.c index f72da83929..ef193a8399 100644 --- a/src/qemu/qemu_namespace.c +++ b/src/qemu/qemu_namespace.c @@ -386,6 +386,9 @@ qemuDomainSetupMemory(virDomainMemoryDef *mem, *paths =3D g_slist_prepend(*paths, g_strdup(QEMU_DEV_SGX_VEPVC)); *paths =3D g_slist_prepend(*paths, g_strdup(QEMU_DEV_SGX_PROVISION= )); break; + case VIR_DOMAIN_MEMORY_MODEL_EGM: + *paths =3D g_slist_prepend(*paths, g_strdup(mem->source.egm.path)); + break; =20 case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_DIMM: diff --git a/src/security/security_apparmor.c b/src/security/security_appar= mor.c index 68ac39611f..ea04e756d6 100644 --- a/src/security/security_apparmor.c +++ b/src/security/security_apparmor.c @@ -631,6 +631,8 @@ AppArmorSetMemoryLabel(virSecurityManager *mgr, case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: + path =3D mem->source.egm.path; case VIR_DOMAIN_MEMORY_MODEL_LAST: break; } diff --git a/src/security/security_dac.c b/src/security/security_dac.c index 2f788b872a..2d79009ee9 100644 --- a/src/security/security_dac.c +++ b/src/security/security_dac.c @@ -1890,6 +1890,9 @@ virSecurityDACRestoreMemoryLabel(virSecurityManager *= mgr, * don't need to restore anything. */ break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + return virSecurityDACRestoreFileLabel(mgr, mem->source.egm.path); + case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: case VIR_DOMAIN_MEMORY_MODEL_LAST: @@ -2121,6 +2124,11 @@ virSecurityDACSetMemoryLabel(virSecurityManager *mgr, return -1; break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + return virSecurityDACSetOwnership(mgr, NULL, + mem->source.egm.path, + user, group, true); + case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: case VIR_DOMAIN_MEMORY_MODEL_LAST: diff --git a/src/security/security_selinux.c b/src/security/security_selinu= x.c index fa5d1568eb..33b8f65767 100644 --- a/src/security/security_selinux.c +++ b/src/security/security_selinux.c @@ -1650,6 +1650,9 @@ virSecuritySELinuxSetMemoryLabel(virSecurityManager *= mgr, seclabel->imagelabel, true) < 0) return -1; break; + case VIR_DOMAIN_MEMORY_MODEL_EGM: + path =3D mem->source.egm.path; + break; =20 case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_DIMM: @@ -1693,6 +1696,9 @@ virSecuritySELinuxRestoreMemoryLabel(virSecurityManag= er *mgr, if (virSecuritySELinuxRestoreFileLabel(mgr, DEV_SGX_PROVISION, tru= e) < 0) ret =3D -1; return ret; + case VIR_DOMAIN_MEMORY_MODEL_EGM: + path =3D mem->source.egm.path; + break; =20 case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: diff --git a/src/security/virt-aa-helper.c b/src/security/virt-aa-helper.c index 8a297d4b54..b7f3fa2c5b 100644 --- a/src/security/virt-aa-helper.c +++ b/src/security/virt-aa-helper.c @@ -1194,6 +1194,10 @@ get_files(vahControl * ctl) return -1; } break; + case VIR_DOMAIN_MEMORY_MODEL_EGM: + if (vah_add_file(&buf, mem->source.egm.path, "rw") !=3D 0) + return -1; + break; =20 case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: --=20 2.43.0 From nobody Sun Feb 8 08:46:42 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) client-ip=8.43.85.245; envelope-from=devel-bounces@lists.libvirt.org; helo=lists.libvirt.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) smtp.mailfrom=devel-bounces@lists.libvirt.org; arc=fail (Bad Signature); dmarc=pass(p=reject dis=none) header.from=lists.libvirt.org Return-Path: Received: from lists.libvirt.org (lists.libvirt.org [8.43.85.245]) by mx.zohomail.com with SMTPS id 1762480128769329.96847390562334; Thu, 6 Nov 2025 17:48:48 -0800 (PST) Received: by lists.libvirt.org (Postfix, from userid 993) id 3BB2F44103; Thu, 6 Nov 2025 20:48:48 -0500 (EST) Received: from [172.19.199.29] (lists.libvirt.org [8.43.85.245]) by lists.libvirt.org (Postfix) with ESMTP id C341B4451E; Thu, 6 Nov 2025 20:43:50 -0500 (EST) Received: by lists.libvirt.org (Postfix, from userid 993) id 2750B442F0; Thu, 6 Nov 2025 20:43:07 -0500 (EST) Received: from SJ2PR03CU001.outbound.protection.outlook.com (mail-westusazon11012055.outbound.protection.outlook.com [52.101.43.55]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (3072 bits) server-digest SHA256) (No client certificate requested) by lists.libvirt.org (Postfix) with ESMTPS id 82C8F4429D for ; Thu, 6 Nov 2025 20:42:59 -0500 (EST) Received: from SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) by DM4PR12MB5746.namprd12.prod.outlook.com (2603:10b6:8:5d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9298.12; Fri, 7 Nov 2025 01:42:52 +0000 Received: from SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd]) by SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd%6]) with mapi id 15.20.9298.006; Fri, 7 Nov 2025 01:42:52 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-26) on lists.libvirt.org X-Spam-Level: X-Spam-Status: No, score=-5.0 required=5.0 tests=ARC_SIGNED,ARC_VALID,BAYES_00, DKIM_INVALID,DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED, RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_PASS autolearn=unavailable autolearn_force=no version=4.0.1 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=RIL2urCLg5yk6ZO/JsRCbkTLs2BBvTEu8yRAYRMnSuSA96Tqj8ea7MlpsGIGmJ9lHi9opXVKpvDFJGPjVxzLlzv5sgZY+wlYjK0hBW5f4i+SfiO/DP+nYa/I3Xtr/yPqVSUllPHCjn7m+unoCs4liMvpBeXpFPZ9+yOyEsWTXkKYMBqKt+ifpkIGI7xaWln4eSlGvc9dEpbUJAvo7vFSoY/oTgRZqjT23Zw5oDQNYdezw8t0ADA7oXjdKnOjLMJ65ypDYkwSr5T5nD8lsRSOB32+jxmZDglytZLEbmLCiJXSArt6uyWJwitm/y88+LXmEXLA/DR4ZDLFsBBSnFFdzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JVYxpDmqwGrUMIfO2I0YWUjgb90zg+nGSNHi4Li54b0=; b=j0+LfK+Q2+11nUhIjFv8aW74NQYGYmuun0KoLHISReXkmdOsoPV6k+2pgiVzMW/X4MTnx2usdQq++oYynvcccjxvdcIuDuCkwzsu/N5QcN0PbcZd6iNeBwHh3Yr8/E+gtVoiJaL8f+A8Z036Cihyn1y/i+0+L1+grRoWiHzxgLW/nKZpK2+bWyKHuJaOGqto4I+pwDRtgGIt3SVUfbimw6ILOSJN8f/nY0gcGMwue1TljerYvHl7i939UkTQ+Zc3pITR00+iFU4hbCmBuB/jXhxkXi2s8lg+j0zLg+US8nH7qpIIV7fU9y7eATKeSnDLPb4Gt42E28g2F+JM2dQW8w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JVYxpDmqwGrUMIfO2I0YWUjgb90zg+nGSNHi4Li54b0=; b=T1SEMo1L2I/NB6GMNnyamutxl9CEDdmmdAVngcA6uxntaIPHHqZBINL8h+qfTscXJ8JtCAnVgtAcLO5yUugLdOqwQ7wvQGcThOE2VbBB6xVUIOkf0zKY1cDLO/Jb2RMbOGQk0vF5u48y6RTWxfQYtK1b0sZYvTtkqchPOCYZOh9MvrNrSoxRJ82MwznBp3UoMls5uNLYlC+Pd0+K94wPU7aSXr3T44xRZmn6s2ZVib1oz218g7rDpocA95MpJqvxupTMYncWIPB9k4SjdUlZNAXLWDkZ7ypcgM++AZim0ONKFfUmDz2Y3dXa08NiHsUHzU1npbLO89jaL0STSjPiDg== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; To: devel@lists.libvirt.org Subject: [RFC PATCH v2 3/4] qemu: Add qemu CLI support for EGM Date: Thu, 6 Nov 2025 17:42:46 -0800 Message-ID: <20251107014247.1280693-4-nathanc@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251107014247.1280693-1-nathanc@nvidia.com> References: <20251107014247.1280693-1-nathanc@nvidia.com> Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: SJ0PR05CA0082.namprd05.prod.outlook.com (2603:10b6:a03:332::27) To SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN7SPRMB0025:EE_|DM4PR12MB5746:EE_ X-MS-Office365-Filtering-Correlation-Id: f14bf436-9cb9-448e-1523-08de1d9ef77b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?ItnObWjT727CMdQuItqr/c1NmPNvZjRgq8ke8HPfitvBVYT4jKwJe87/rwE2?= =?us-ascii?Q?iFg5z1JAwKRf96cc6beswlM3q4iSlbIfzq7FeJJZaKv1PLm7xphZnNe3Ao07?= =?us-ascii?Q?IojNEod3Ck/QVJnK4RWtRYto+bKyvS/re3DCm+Za1njoPBy4qLS7IcIUJpJl?= =?us-ascii?Q?ymrWh8doWdFADunwTksd14mMMrfF6CLjiEKhiczXlhUZLaxQAfSRXq2TgFN3?= =?us-ascii?Q?fbUZsHawhnaIikyEA71S6yLhO9I5b0b5cIB40uuB4S1RMU1iuuQRLVYuHI0Q?= =?us-ascii?Q?oN2Ps3HLn+7jZNqWlNwGmkDik6xxQiWHxLM7/+L+HXKTpu/G6AqCV7PcmG9v?= =?us-ascii?Q?FmzLZWOvNqzHnPPxxsQHo1xOMBxXEExo3VB15DWO1ltPxtzbVnlUmFWTF8Oy?= =?us-ascii?Q?D1mJ0AzeIeWRghhFQaZz500j2HyqVZSzOHGifGZBnkVwDPZ+6bslCJG+cA/F?= =?us-ascii?Q?j9dKrCScIpp0JD87RFY3ZDEHKDaQUhTaLOgAO9Q4DGeyD9/R4h3IBGKSTTWB?= =?us-ascii?Q?ndzNEY/oG01D2KTgtqU4mKBFIkoaer/dpFWwiJwd173PS7wXNRh9SVIZgoor?= =?us-ascii?Q?d5Pcc456dhINq7ADMPTXwakDCrhMOjvc3KGewvHQQHN6x4VO9A/f0+c+6rYB?= =?us-ascii?Q?4rKMkQ6iBzqUqWZEi1UiWWV9691KUR//Ziwf0GHgEQYNSNIJWj+26+DnV4Jo?= =?us-ascii?Q?PtF5fo5+TB9svWTapQ/1KO3YnM/TpDvpc38QgSR6s0OAY9blrzsvTqmlPkNR?= =?us-ascii?Q?5W7csrkhNCoBFf8JgpCKP4m0LY+2vX2+XMOrbHSZgYmfJ0yPh6KFL/a+5XpN?= =?us-ascii?Q?8aaTGa294VFHk52EbPZln0L7VZcGd3dFG4zU5PttUMwFm39uAWwoQ5hg50yl?= =?us-ascii?Q?u2fOSKEvnD62xsQOQw+4HcXpsTwS8v+jF5TrEl9RtdfInidYlTPVBdicBxGX?= =?us-ascii?Q?O8rIv7XHDa6xxVilRPenKH6/nHqY+aIBtLCIKZfcDHxA73ayK3NmaxYpGyt5?= =?us-ascii?Q?DtIHAbF/OF3EfHjyQHnG6DemWwbBw2/rvp7FolQQVDVXxy75Zc2SSY9acCcQ?= =?us-ascii?Q?mQXh6mMwfK+/s4UWVzX/F1jlaBoI5zKG/dlYTOUs6EV+XUl04XS8SoI41c0Y?= =?us-ascii?Q?qV3vqeH0MK0JUplkey0TJOXDFNQw39Dt7WpZxJsFdRNIpharCRulJP2xP3zX?= =?us-ascii?Q?ILWT1PVAqERVKL5jxDLDK6LeexvlYQtZ1/SFr6EZmnX98d4bRWiMEbyfLzRT?= =?us-ascii?Q?SOHKUyodSPlbhHjRM+OlFDRWPhEBoHf9ukkKDoh7zUbgMo+jOsrN/ajrAsXa?= =?us-ascii?Q?2xz1sgJEJnhiKHj8CgHvXfEz6+X9Ur6JdYvO7EoSDUAq7l5HrlRiL7BlFRs9?= =?us-ascii?Q?vI/05H7T/GnrRsKNd8OGgYY2x4xJWuaqEZoWmyrqUq/c4DqzKg2yGHF31xxx?= =?us-ascii?Q?XpZHcH/tCetTczw8qVwjfPceG2ErloIW?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN7SPRMB0025.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?417mPco4U9FLXcbVE4c8leyISahHiow8wVayN1HhPsLI+88safhK1UpRScBT?= =?us-ascii?Q?OBFhnOnST6g7p9yZ6yTZaL4xGWJwZl2GbrY0+ZfcBwhBvoJjpo2+NrUFyCTP?= =?us-ascii?Q?IiTqkEC2CnbKBWtBlQmrh0rUcSlxlJvkMYHIk6YxJjTWazyaPC6iB0Eu7AGH?= =?us-ascii?Q?DCZf3xjZGf5+5akUwsQNQqjJD9P6qCE8e6U0TSuHeT2sk/gV7WtYs6/suyIc?= =?us-ascii?Q?/GUXxZ8JGizwysg4ahGz33zs5n5C2Q+oWmEnB5SQ8IHvlLQKa/mtjJBQ6s4S?= =?us-ascii?Q?P9AbttNlpw3b292cTh8CAgRbs1Ga8dqxj4PVJ1req6rvr5T9bsFzcsrwvwSD?= =?us-ascii?Q?LEP/rDJ9sX3DI0xroWKCay484BoOpdSPl6NloxeZerLJ6I0HNVDJgl+ZDjSM?= =?us-ascii?Q?tV78x3KTOsWK6g4uqm0QGT4tNazX+WwHSbQ56VdOioIsD8vZXAEcAgdY708b?= =?us-ascii?Q?bf63aJEpWYA+cOOcyNVDDddoSJm1/CRbaOx1OkotG6DZCv0bjd9+DBCPSXrw?= =?us-ascii?Q?rlOwJ+5OzptIn3wLWYEh53aAQHBn/0Lt4K0WvBXnD/50Cpps3pG9OWdy+R9Q?= =?us-ascii?Q?lnBIm6eMeDj6mC/OboWfTOGfqKMS9/HQtwDLS3I9BwGbpKxtBzxToGOS7cpD?= =?us-ascii?Q?jouCtO1NhYBDEGGgXgwQp7UM54sAQtG9aii/LP29VQbJnu1TyrmTVEUq8x3W?= =?us-ascii?Q?P1OMpR5zwoRRvKXKw5IIxug2EulDWoNEEMQ7VjZ2WqhPLpAyustoypIssoLC?= =?us-ascii?Q?E2GPdGuF8KrZYZcIcDKC2s0vxbe3OmNBts4k69xNNegcoETZOQbJsjX61+JD?= =?us-ascii?Q?ywxoOpgI2hIQVlnb6cz+pyeEmX4p4ojnxALmIvNP7zJ6RxaTbZLqjli2eub6?= =?us-ascii?Q?Cuim/vEl3UQxlmP+2VvNrs3ugeOLTxA16fgwVUbwKt2K2pV2o3wyeQwvntOs?= =?us-ascii?Q?iIbdqKoWqnyISXYxDKzR8jUIwHIIm9Dj/Gyh9PYNcWQE9g9/lwv4x+ygw761?= =?us-ascii?Q?H4Idw/WHv9cHd/JQgQcYOvLGuprHPcb2zxa8jJT0jkKFxSISl3FF2zBCNBEE?= =?us-ascii?Q?a+56LFQeQtjWvftcAWmYznsYs4zHl+KWZaHqO5w8M1A3f5jYyhN7OUESKnwD?= =?us-ascii?Q?vX8GnJuaCfxLgtg6Ud2x26nrXHc/zg2cnqdaTw1HCyrRfaCCtDE9+LtzHvMa?= =?us-ascii?Q?3Mc398DuAvrF1yb7m2Tf6lzU9F3V7POQkP9azWDPeUMIaZ9XBL4j4dB0t997?= =?us-ascii?Q?wGT29Nq3KxnWwd6ckarbfp/gi4zgDwCsUkCL/zXCSttps/YyfMYQSYi2VMuV?= =?us-ascii?Q?nIyFGefxR72QSTNgGPdeBs1q5y2BrZt81bPP3mL/WCq+da9Y5t9dIpbrsXDp?= =?us-ascii?Q?unF3qaILtfayBBps1T5ev0HDTwSgDYMg2NKwKFWCdR9L7CXQy3yBn1rvtktJ?= =?us-ascii?Q?1QeZIGzyWLm3BdkzmqjtPAnl/LQMMGrKV3u8SUcTakoc91Z6Q+e+9HBybpRg?= =?us-ascii?Q?MxwNCnKFXq8m2n/8/WAan9MD3NCyO/t6fE1WbDLmu7h/1yz2JLKwDzA8K3Mm?= =?us-ascii?Q?HyS7Z7kqN7JggK/ddBUot+ExkupDy3ZFrb8rSa5r?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: f14bf436-9cb9-448e-1523-08de1d9ef77b X-MS-Exchange-CrossTenant-AuthSource: SN7SPRMB0025.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Nov 2025 01:42:52.8189 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: F5ZTIdT/KIgbHx0aV4OsbWG3HIXnco6xLoBONTiGsUf7D7p5VlYoHv6Bd1jZ9RD58VS1qMnvcVzRgWpQZc1Tyw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB5746 Message-ID-Hash: ETSATOMWOKV3ODSPBV7NVOLNU5CRIGKC X-Message-ID-Hash: ETSATOMWOKV3ODSPBV7NVOLNU5CRIGKC X-MailFrom: nathanc@nvidia.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; header-match-devel.lists.libvirt.org-0; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: skolothumtho@nvidia.com, nicolinc@nvidia.com, nathanc@nvidia.com, mochs@nvidia.com X-Mailman-Version: 3.3.10 Precedence: list List-Id: Development discussions about the libvirt library & tools Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: From: Nathan Chen via Devel Reply-To: Nathan Chen X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZM-MESSAGEID: 1762480131406154100 Content-Type: text/plain; charset="utf-8" Add qemu CLI support for EGM memory device model: - Specify EGM device path to memory-backend-file object - Support acpi-egm-memory object with id, pci-dev, and node attributes Signed-off-by: Ian May Signed-off-by: Nathan Chen --- src/qemu/qemu_alias.c | 17 +++++++++ src/qemu/qemu_capabilities.c | 2 ++ src/qemu/qemu_capabilities.h | 1 + src/qemu/qemu_command.c | 66 ++++++++++++++++++++++++++++++++-- src/qemu/qemu_domain.c | 13 ++++++- src/qemu/qemu_domain_address.c | 6 ++++ src/qemu/qemu_driver.c | 1 + src/qemu/qemu_hotplug.c | 1 + src/qemu/qemu_monitor_json.c | 1 + src/qemu/qemu_postparse.c | 1 + src/qemu/qemu_process.c | 2 ++ src/qemu/qemu_validate.c | 6 ++++ 12 files changed, 114 insertions(+), 3 deletions(-) diff --git a/src/qemu/qemu_alias.c b/src/qemu/qemu_alias.c index b0bc057bd1..0e87968bf6 100644 --- a/src/qemu/qemu_alias.c +++ b/src/qemu/qemu_alias.c @@ -553,6 +553,23 @@ qemuAssignDeviceMemoryAlias(virDomainDef *def, case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: prefix =3D "epc"; break; + case VIR_DOMAIN_MEMORY_MODEL_EGM: { + const char *egm_devname =3D NULL; + + if (mem->source.egm.path) { + egm_devname =3D strrchr(mem->source.egm.path, '/'); + if (egm_devname) + egm_devname++; + else + egm_devname =3D mem->source.egm.path; + + mem->info.alias =3D g_strdup(egm_devname); + return 0; + } + + prefix =3D "egm"; + break; + } case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: default: diff --git a/src/qemu/qemu_capabilities.c b/src/qemu/qemu_capabilities.c index 83946123be..1344519074 100644 --- a/src/qemu/qemu_capabilities.c +++ b/src/qemu/qemu_capabilities.c @@ -746,6 +746,7 @@ VIR_ENUM_IMPL(virQEMUCaps, =20 /* 485 */ "acpi-generic-initiator", /* QEMU_CAPS_ACPI_GENERIC_INITIATO= R */ + "acpi-egm-memory", /* QEMU_CAPS_DEVICE_ACPI_EGM_MEMORY */ ); =20 =20 @@ -1440,6 +1441,7 @@ struct virQEMUCapsStringFlags virQEMUCapsObjectTypes[= ] =3D { { "tpm-emulator", QEMU_CAPS_DEVICE_TPM_EMULATOR }, { "tpm-passthrough", QEMU_CAPS_DEVICE_TPM_PASSTHROUGH }, { "acpi-generic-initiator", QEMU_CAPS_ACPI_GENERIC_INITIATOR }, + { "acpi-egm-memory", QEMU_CAPS_DEVICE_ACPI_EGM_MEMORY }, }; =20 =20 diff --git a/src/qemu/qemu_capabilities.h b/src/qemu/qemu_capabilities.h index 2b454e0352..61ffd7a8a8 100644 --- a/src/qemu/qemu_capabilities.h +++ b/src/qemu/qemu_capabilities.h @@ -727,6 +727,7 @@ typedef enum { /* virQEMUCapsFlags grouping marker for = syntax-check */ =20 /* 485 */ QEMU_CAPS_ACPI_GENERIC_INITIATOR, /* -object acpi-generic-initiator */ + QEMU_CAPS_DEVICE_ACPI_EGM_MEMORY, /* For using extended GPU memory */ =20 QEMU_CAPS_LAST /* this must always be the last item */ } virQEMUCapsFlags; diff --git a/src/qemu/qemu_command.c b/src/qemu/qemu_command.c index fcf5fc1935..d4e2fc8d7a 100644 --- a/src/qemu/qemu_command.c +++ b/src/qemu/qemu_command.c @@ -990,6 +990,7 @@ qemuBuildVirtioDevGetConfigDev(const virDomainDeviceDef= *device, case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -3144,6 +3145,7 @@ qemuBuildMemoryGetPagesize(virQEMUDriverConfig *cfg, nvdimmPath =3D mem->source.virtio_pmem.path; break; case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -3344,6 +3346,9 @@ qemuBuildMemoryBackendProps(virJSONValue **backendPro= ps, case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM: nvdimmPath =3D mem->source.virtio_pmem.path; break; + case VIR_DOMAIN_MEMORY_MODEL_EGM: + nvdimmPath =3D mem->source.egm.path; + break; case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -3559,6 +3564,7 @@ qemuBuildMemoryDimmBackendStr(virCommand *cmd, { g_autoptr(virJSONValue) props =3D NULL; g_autoptr(virJSONValue) tcProps =3D NULL; + g_autoptr(virJSONValue) egmProps =3D NULL; virBitmap *nodemask =3D NULL; g_autofree char *alias =3D NULL; =20 @@ -3584,6 +3590,33 @@ qemuBuildMemoryDimmBackendStr(virCommand *cmd, if (qemuBuildObjectCommandlineFromJSON(cmd, props) < 0) return -1; =20 + if (mem->model =3D=3D VIR_DOMAIN_MEMORY_MODEL_EGM) { + g_autofree char *egmId =3D NULL; + g_autofree char *egmObjStr =3D NULL; + g_auto(virBuffer) buf =3D VIR_BUFFER_INITIALIZER; + const char *basename =3D NULL; + + /* Extract basename from host path under /dev/ */ + basename =3D strrchr(mem->source.egm.path, '/'); + if (basename && *(basename + 1)) { + egmId =3D g_strdup(basename + 1); + } else { + egmId =3D g_strdup(mem->source.egm.path); + } + + virBufferAsprintf(&buf, "acpi-egm-memory,id=3D%s", egmId); + + if (mem->target.egm.pciDev) + virBufferAsprintf(&buf, ",pci-dev=3D%s", mem->target.egm.pciDe= v); + + if (mem->targetNode >=3D 0) + virBufferAsprintf(&buf, ",node=3D%d", mem->targetNode); + + egmObjStr =3D virBufferContentAndReset(&buf); + + virCommandAddArgList(cmd, "-object", egmObjStr, NULL); + } + return 0; } =20 @@ -3653,6 +3686,7 @@ qemuBuildMemoryDeviceProps(virQEMUDriverConfig *cfg, dynamicMemslots =3D mem->target.virtio_mem.dynamicMemslots; break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: @@ -7053,6 +7087,7 @@ qemuAppendDomainMemoryMachineParams(virBuffer *buf, case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -7781,6 +7816,13 @@ qemuBuildNumaCommandLine(virQEMUDriverConfig *cfg, hmat =3D true; } =20 + for (i =3D 0; i < def->nmems; i++) { + if (def->mems[i]->model =3D=3D VIR_DOMAIN_MEMORY_MODEL_EGM) { + if (qemuBuildMemoryDimmBackendStr(cmd, def->mems[i], def, cfg,= priv) < 0) + goto cleanup; + } + } + nodeBackends =3D g_new0(virJSONValue *, ncells); nodemask =3D g_new0(virBitmap *, ncells); =20 @@ -7816,8 +7858,18 @@ qemuBuildNumaCommandLine(virQEMUDriverConfig *cfg, for (i =3D 0; i < ncells; i++) { ssize_t initiator =3D virDomainNumaGetNodeInitiator(def->numa, i); unsigned long long memSize =3D virDomainNumaGetNodeMemorySize(def-= >numa, i); + bool egmBacked =3D false; + size_t k; + + for (k =3D 0; k < def->nmems; k++) { + if (def->mems[k]->model =3D=3D VIR_DOMAIN_MEMORY_MODEL_EGM && + def->mems[k]->targetNode =3D=3D (int)i) { + egmBacked =3D true; + break; + } + } =20 - if (needBackend && memSize > 0) { + if (needBackend && memSize > 0 && !egmBacked) { g_autoptr(virJSONValue) tcProps =3D NULL; =20 if (qemuBuildThreadContextProps(&tcProps, &nodeBackends[i], @@ -7847,7 +7899,11 @@ qemuBuildNumaCommandLine(virQEMUDriverConfig *cfg, =20 if (memSize > 0) { if (needBackend) { - virBufferAsprintf(&buf, ",memdev=3Dram-node%zu", i); + if (egmBacked) { + virBufferAsprintf(&buf, ",memdev=3Dmem%s", def->mems[k= ]->info.alias); + } else { + virBufferAsprintf(&buf, ",memdev=3Dram-node%zu", i); + } } else { virBufferAsprintf(&buf, ",mem=3D%llu", memSize / 1024); } @@ -7911,6 +7967,9 @@ qemuBuildMemoryDeviceCommandLine(virCommand *cmd, for (i =3D 0; i < def->nmems; i++) { g_autoptr(virJSONValue) props =3D NULL; =20 + if (def->mems[i]->model =3D=3D VIR_DOMAIN_MEMORY_MODEL_EGM) + continue; + if (qemuBuildMemoryDimmBackendStr(cmd, def->mems[i], def, cfg, pri= v) < 0) return -1; =20 @@ -7931,6 +7990,9 @@ qemuBuildMemoryDeviceCommandLine(virCommand *cmd, case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: break; =20 + /* EGM memory backing is via memory-backend-file object */ + case VIR_DOMAIN_MEMORY_MODEL_EGM: + break; case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; diff --git a/src/qemu/qemu_domain.c b/src/qemu/qemu_domain.c index 375e0e441a..75095b4de8 100644 --- a/src/qemu/qemu_domain.c +++ b/src/qemu/qemu_domain.c @@ -7220,6 +7220,7 @@ qemuDomainUpdateMemoryDeviceInfo(virDomainObj *vm, break; =20 case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -7454,7 +7455,8 @@ qemuDomainAlignMemorySizes(virDomainDef *def) def->mems[i]->size =3D VIR_ROUND_UP(def->mems[i]->size, align); } =20 - hotplugmem +=3D def->mems[i]->size; + if (def->mems[i]->model !=3D VIR_DOMAIN_MEMORY_MODEL_EGM) + hotplugmem +=3D def->mems[i]->size; =20 if (def->mems[i]->size > maxmemkb) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, @@ -7942,6 +7944,12 @@ qemuDomainDefValidateMemoryHotplugDevice(const virDo= mainMemoryDef *mem, virDomainMemoryModelTypeToString(mem->model)); return -1; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + virReportError(VIR_ERR_CONFIG_UNSUPPORTED, + _("hotplug is not supported for the %1$s device"), + virDomainMemoryModelTypeToString(mem->model)); + return -1; + case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: return -1; @@ -8000,6 +8008,7 @@ qemuDomainDefValidateMemoryHotplug(const virDomainDef= *def, case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_LAST: case VIR_DOMAIN_MEMORY_MODEL_NONE: break; @@ -8047,6 +8056,8 @@ qemuDomainDefValidateMemoryHotplug(const virDomainDef= *def, =20 case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: /* sgx epc memory does not support hotplug, skip this check */ + case VIR_DOMAIN_MEMORY_MODEL_EGM: + /* egm memory does not support hotplug, skip this check */ case VIR_DOMAIN_MEMORY_MODEL_LAST: case VIR_DOMAIN_MEMORY_MODEL_NONE: break; diff --git a/src/qemu/qemu_domain_address.c b/src/qemu/qemu_domain_address.c index 774541ca06..0d9f2b5649 100644 --- a/src/qemu/qemu_domain_address.c +++ b/src/qemu/qemu_domain_address.c @@ -303,6 +303,7 @@ qemuDomainPrimeVirtioDeviceAddresses(virDomainDef *def, case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; } @@ -1033,6 +1034,7 @@ qemuDomainDeviceCalculatePCIConnectFlags(virDomainDev= iceDef *dev, case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_LAST: return 0; } @@ -2455,6 +2457,7 @@ qemuDomainAssignDevicePCISlots(virDomainDef *def, case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; } @@ -3151,6 +3154,7 @@ qemuDomainAssignMemoryDeviceSlot(virDomainObj *vm, return qemuDomainEnsureVirtioAddress(&releaseaddr, vm, &dev); =20 case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -3178,6 +3182,7 @@ qemuDomainReleaseMemoryDeviceSlot(virDomainObj *vm, break; =20 case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; @@ -3212,6 +3217,7 @@ qemuDomainAssignMemorySlots(virDomainDef *def) /* handled in qemuDomainAssignPCIAddresses() */ break; case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c index b0eff443aa..9d17c159e4 100644 --- a/src/qemu/qemu_driver.c +++ b/src/qemu/qemu_driver.c @@ -6704,6 +6704,7 @@ qemuDomainAttachMemoryConfig(virDomainDef *vmdef, case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: break; case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: diff --git a/src/qemu/qemu_hotplug.c b/src/qemu/qemu_hotplug.c index fb426deb1a..890bb052b6 100644 --- a/src/qemu/qemu_hotplug.c +++ b/src/qemu/qemu_hotplug.c @@ -7348,6 +7348,7 @@ qemuDomainChangeMemoryLiveValidateChange(const virDom= ainMemoryDef *oldDef, case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_LAST: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, _("cannot modify memory of model '%1$s'"), diff --git a/src/qemu/qemu_monitor_json.c b/src/qemu/qemu_monitor_json.c index c121c05ffd..2c2273d927 100644 --- a/src/qemu/qemu_monitor_json.c +++ b/src/qemu/qemu_monitor_json.c @@ -7088,6 +7088,7 @@ qemuMonitorJSONGetMemoryDeviceInfo(qemuMonitor *mon, switch ((virDomainMemoryModel) model) { case VIR_DOMAIN_MEMORY_MODEL_DIMM: case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM: /* While 'id' attribute is marked as optional in QEMU's QAPI diff --git a/src/qemu/qemu_postparse.c b/src/qemu/qemu_postparse.c index fd27f8be27..b23dd94d2c 100644 --- a/src/qemu/qemu_postparse.c +++ b/src/qemu/qemu_postparse.c @@ -1838,6 +1838,7 @@ qemuDomainDefNumaAutoAdd(virDomainDef *def, case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; } diff --git a/src/qemu/qemu_process.c b/src/qemu/qemu_process.c index 9926998f85..e41767a70f 100644 --- a/src/qemu/qemu_process.c +++ b/src/qemu/qemu_process.c @@ -4066,6 +4066,7 @@ qemuProcessDomainMemoryDefNeedHugepagesPath(const vir= DomainMemoryDef *mem, case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_MEM: pagesize =3D mem->source.virtio_mem.pagesize; break; + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM: @@ -4155,6 +4156,7 @@ qemuProcessNeedMemoryBackingPath(virDomainDef *def, case VIR_DOMAIN_MEMORY_MODEL_NVDIMM: case VIR_DOMAIN_MEMORY_MODEL_VIRTIO_PMEM: case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC: + case VIR_DOMAIN_MEMORY_MODEL_EGM: case VIR_DOMAIN_MEMORY_MODEL_LAST: /* Backed by user provided path. Not stored in memory * backing dir anyway. */ diff --git a/src/qemu/qemu_validate.c b/src/qemu/qemu_validate.c index 3e8fdb2268..e8d6fe21cb 100644 --- a/src/qemu/qemu_validate.c +++ b/src/qemu/qemu_validate.c @@ -5812,6 +5812,12 @@ qemuValidateDomainDeviceDefMemory(const virDomainMem= oryDef *mem, =20 break; =20 + case VIR_DOMAIN_MEMORY_MODEL_EGM: + if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_ACPI_EGM_MEMORY)) { + virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s", + _("ACPI EGM memory device is not supported with = this QEMU binary")); + return -1; + } case VIR_DOMAIN_MEMORY_MODEL_NONE: case VIR_DOMAIN_MEMORY_MODEL_LAST: break; --=20 2.43.0 From nobody Sun Feb 8 08:46:42 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) client-ip=8.43.85.245; envelope-from=devel-bounces@lists.libvirt.org; helo=lists.libvirt.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) smtp.mailfrom=devel-bounces@lists.libvirt.org; arc=fail (Bad Signature); dmarc=pass(p=reject dis=none) header.from=lists.libvirt.org Return-Path: Received: from lists.libvirt.org (lists.libvirt.org [8.43.85.245]) by mx.zohomail.com with SMTPS id 1762480219714179.4827535877032; Thu, 6 Nov 2025 17:50:19 -0800 (PST) Received: by lists.libvirt.org (Postfix, from userid 993) id 9282941BEA; Thu, 6 Nov 2025 20:50:18 -0500 (EST) Received: from [172.19.199.29] (lists.libvirt.org [8.43.85.245]) by lists.libvirt.org (Postfix) with ESMTP id D775344608; Thu, 6 Nov 2025 20:43:58 -0500 (EST) Received: by lists.libvirt.org (Postfix, from userid 993) id 59255442FA; Thu, 6 Nov 2025 20:43:08 -0500 (EST) Received: from SJ2PR03CU001.outbound.protection.outlook.com (mail-westusazon11012055.outbound.protection.outlook.com [52.101.43.55]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (3072 bits) server-digest SHA256) (No client certificate requested) by lists.libvirt.org (Postfix) with ESMTPS id 7925B44309 for ; Thu, 6 Nov 2025 20:43:00 -0500 (EST) Received: from SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) by DM4PR12MB5746.namprd12.prod.outlook.com (2603:10b6:8:5d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9298.12; Fri, 7 Nov 2025 01:42:54 +0000 Received: from SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd]) by SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd%6]) with mapi id 15.20.9298.006; Fri, 7 Nov 2025 01:42:54 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-26) on lists.libvirt.org X-Spam-Level: X-Spam-Status: No, score=-5.0 required=5.0 tests=ARC_SIGNED,ARC_VALID,BAYES_00, DKIM_INVALID,DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED, RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_PASS autolearn=unavailable autolearn_force=no version=4.0.1 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=qk3JVPvXUjCEYupcqR0yxZHqBY7r4D67UbbF+qtIc8Z2NvM6uVh0yW6LKOaAZehrwSCyqGsRKuHiNM5sNPSWQmR8gxORSDSQBFWgOLqCYZ84cpAn8y5VIoPpAyep+OyXgIT/dVS6i/w9tCcx6kq4giE4dFhpJ6/Upxa/EMsSUcGdDxkFWis6LNDOD/SObm1kAug/DVo/cG28AJ61e4o2fJg51SPl3QPbwPcnR8LwlChmrN7LXJcT6gKvkPaLhqj6gl4SqSkL0IhepDNmbHy5N1TwLQZZD8nMMkI9dorPDx/Fp/U/Y+d0pIDGaXQynvcpYr4M71WpoDidqL7KOGeg2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=WLNLUEtGJ03+bCWLXwpMl6dfpmcRYd6uPoqAjOurPLg=; b=e7DACLr2HSic9ba7gepMUKFJinmof5yVBM6mDYZnktPCM2UH7sB4i/S8pSayypRNP8u/JmFdO24H6bfFpxCdc0p4HpnOXYEDouT9Au/1HVoQAcTOLG8fEoI6k8SUxdf3N78cMQISlbRfg+PWt4GcgDeSpGIFLC2KxjZ7Y8UQNLflJBbxOx0+zMhuMC/OKHNhMZSgS3VqBBJu7vmdadgTBPiW1L4EfbqZ0Er3hhPE0eZNPp7I0EMSOumrgO1quAyRcy5+ifCYannD6ItBn3IwPDlbfwpPiL5kf4kHbn/bNhOxX9ufxNKwVkep06k8yIjmO3kIvDuFeX7uSMH6RDw6lw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WLNLUEtGJ03+bCWLXwpMl6dfpmcRYd6uPoqAjOurPLg=; b=ePuSaNlvCTD9h61gw5re8VI7fa80oVgJiIDRHxKWzCiBYrB9xuK2a4gr5h7dwsMrY8Hgtc8I6MUTHfgf7YZQe1i1KypW6lMEy2hSe4b/NjURrf65Kqq5Q1UDF9Z6ITu1Qik2gsVIuchiieifLWZsRhLKyNlX2bZukNKTBYHTZsSdXxGin+6i7XiwA8jIg3PSriD4sLovPzUIm2CQcvr4Sk7mQKxmyi3FVdtT1pMStvf1b8D5OS7c73mV8QTYv89ktR5z98c5XucujTu4PIW1I4qKQcgpHvd0dOVj1kcqDSxLzfIz66X5LoZ84n35BR1zWSCyk5Hnu58xEpFThep7sw== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; To: devel@lists.libvirt.org Subject: [RFC PATCH v2 4/4] tests: Add qemuxmlconftest for ACPI EGM memory device Date: Thu, 6 Nov 2025 17:42:47 -0800 Message-ID: <20251107014247.1280693-5-nathanc@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251107014247.1280693-1-nathanc@nvidia.com> References: <20251107014247.1280693-1-nathanc@nvidia.com> Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: SJ0PR03CA0070.namprd03.prod.outlook.com (2603:10b6:a03:331::15) To SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN7SPRMB0025:EE_|DM4PR12MB5746:EE_ X-MS-Office365-Filtering-Correlation-Id: bcf0eb67-fe9a-4e6b-9e32-08de1d9ef83c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?3JzMFzBbLyA6J2HGYvuiNmig6DOhFcVQVxBm4i6u5nw8HHF0Y+Wg/t0jEuqr?= =?us-ascii?Q?R8wvLeXDEDg4cXNvt3jXYuQjXGsOWWeaQQMl7ANLEA76dV1aL+LGq7FjjuCc?= =?us-ascii?Q?jPkOx736dazTq/4HjdgcGYGHYocqTNvaZDcvgfFiLtSD7sfCIjBdOVy6NMAI?= =?us-ascii?Q?8Iu/0LBhMX+oONU3lKHoiWczGCRFnV3Ufyg+5re/viTC049m6gP8SY7bXH60?= =?us-ascii?Q?NPz2a2low89IbizbaZ7s8NuiRPR/GXL/jPp2t2PTRsvpzSjCEXUb9yFS6eHB?= =?us-ascii?Q?O9JJmuTkCTUU40FI3H2FeTncWdS4FGUr1yNvSlgNCU3w2xMCZYQWj97Xj2sd?= =?us-ascii?Q?J5V8OgYDxH2D/75TvcrQ7DJgdxWYUDyWucoEw5CjbTMAXTemhWS283rfJeAh?= =?us-ascii?Q?BkIN41cBUsHqQ+09k54NjRR2h1JIhR7DJekRnAePxXy5NPNsKMFyPPDoc/5F?= =?us-ascii?Q?6ByIWBNAbBzzN7oR0T5Tq3lCMu6oe8+ZKjvE0gPxg4fcPXt1B0yy8F33pVDd?= =?us-ascii?Q?9bv5QnweuuoOXxIa4M7PzLZEkS5DyUjNV+bj7MUCrxXMgl2+FC9/siGI0Xmu?= =?us-ascii?Q?WZRyUvaQVsdSoh3fyMhB4TMXFEWyQZcCnUrEMqYRB8Ku0Zr0rNLH7zAN26aO?= =?us-ascii?Q?qjDouiMWd1etkYiMOb6yhL8rorvVBP8NnPO61Kc0ubZ+r0JoHU9tsx3BVC0F?= =?us-ascii?Q?txzCZcPv/i5R5+yWvNDmJNx6eJ1yS9Ca/3AsEfnehzb3NdaU8niaE/1dDIfT?= =?us-ascii?Q?d3nxB/+r+bc3FT4ydowEXSombxDXLDx0giJXxTZtC1Xzh29uKOUJrwDuzp/k?= =?us-ascii?Q?hn3aCaDuHEbhZhvOexFv1JHvQDJF1dZfMCDo+avBqETqXRM+Q4ybZi4b5JFT?= =?us-ascii?Q?4kwoyr9hwOoSgkPNs0OdzWn6fLyQ8wYq+fZo7d3M7tASmJfpC24EOIV0KBaV?= =?us-ascii?Q?XsoHy5EaZHqv5LmbT0nmWKbvKuGp+lvuslbxHrzeW70DuFV7FfOFN70DDAvl?= =?us-ascii?Q?O995kSmcr3OEByRvUH/0izm21jJ7D+Uq/nmB8nw2DJcYBqRzJ8g8wIkXZ+Wk?= =?us-ascii?Q?P09BqB40IznRIUqmMZXMYQ3zUqpn1XD+Vyh79osLI9tTe6I9cX2QPdp1GSvL?= =?us-ascii?Q?6GrTaqV1UbBEfwqV0fEG5nGJ55YklsqMTfgBQGcVRNdgP42XxkkRfyVUdVP3?= =?us-ascii?Q?t+opQKvYQDsp84b9TEoqHHQPpRQHP2zb77o4X+dhTdQLoNxdFNRg64an+Qt3?= =?us-ascii?Q?KkmPPSHS1K1v1S1POYG7GSTac4TXhmxpPEaQ+nUCtH74kSnoWpYnBpI5l7Gz?= =?us-ascii?Q?k/2T/yZEPPBBT7EiwHrmodlEf1uJi/n+F0uf4rd9KZ1AK4OcWZM5Csx55Bnw?= =?us-ascii?Q?vXMFMO69VBU29O+2rGkbBdaiyhi48KLyhHCx1ZF/YEWFTJ7CnyUxmSqOsFSZ?= =?us-ascii?Q?Ts79pKyaXYSxSCWINZwrFpx0/TKqjLG6?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN7SPRMB0025.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?K4tptCTO0ck53UA1O3/n3xx07cEYi27+mjfNcIyNFDO4a+Gp8bHU8ReOaKyi?= =?us-ascii?Q?gEG/KupQRpkS9D/BRPtKjMfjbFA1T2Er8LP5bUqdkIT3PZ0o0hOrSXPsJXUB?= =?us-ascii?Q?2Xxz6IjGYtqoCCst7tEv1snL8kaqhb9+07PEpem4O7/xZ04uSF8C6yYVZI/N?= =?us-ascii?Q?mdx4HQKa+5WRUcoKAC8sRBuUuEYUKkwokrE0YPIsiv9F+tG0wKUSHUBTUbRQ?= =?us-ascii?Q?FXt6UM3Pg2S3jG7D5W7Rp+YgXPoAdMQWZtwDDuOkdD/zNUQen0m8aOPYntPd?= =?us-ascii?Q?U39PIZzQu8Tybo70mQ1IMplJNHnG+Qa9oc39rJuEKNEIKw7O2gt7cl0CHawF?= =?us-ascii?Q?G1uXK7gdS+SUuk+kD1cIYB8Bb8Qvcll576UJ2Yl83XRO/XA9MwIUfi7bLJsb?= =?us-ascii?Q?pyNbzy87nfOk5Uj0f5/4xpKDiKSXEgPu94K1DD0PNfAEfy833aI7eUjj5BlH?= =?us-ascii?Q?sZxe+BnW8jgFaj2vY3f+LqKlAMKi2UzEMNJbCsOPlC7rZwLGUi3iapgZTClq?= =?us-ascii?Q?caNop4F3xLmrM9kWN/R8JqbiXbjuhm0cqeiQHM8wyqb8AxnRAsvvcqJxFZVV?= =?us-ascii?Q?oUdS07PPM5KXMxWErY1afM5a8iIsqiOpvQm/8rm1QdMt5TusHlvw2r/XJsPq?= =?us-ascii?Q?WwKJ4n5wQquEUoV0AKSUUo58FAfghQqBZhDwfE6Wl6SLjPjRu0ApUvWFZ6Ds?= =?us-ascii?Q?/jqIiMsGmcgWrRpISc7oIW+mDawnGha0C0P4gQazJPqWSr+LMydtEc/rZZwb?= =?us-ascii?Q?2Ls8sjTnUoM9vxxqQOiESzXByIvg89ExsQMPpZF2AqR89Dn7dyY8bV+4eYjs?= =?us-ascii?Q?yNACun5zEL4vB40kxCbgNKkmGDke5+Gc6YRYRhym4ZNV9rIahoRs8nBNAinL?= =?us-ascii?Q?qFnoTmvosqNDCClOoklFxYpY+hC7hytdI/EPwiysxEQ/P7Raq6x/44wUeNaI?= =?us-ascii?Q?NS/3lKB7Uv4jOnj4cEF+LQBJwU7W7FGs45psFty3HJKTEvo9O71/UaasFyt4?= =?us-ascii?Q?8TFUWenIIqU1ruMhFvJfAixxq24b9MuSaDZMBk+uoS8xrj1GNwhkR+qBOcyw?= =?us-ascii?Q?4tDGbcxTVGy4s1mPuy0OBFU/iK79U8UgApUdUcxSw6+48RqhQec13ljjOWOu?= =?us-ascii?Q?OEyz+vqjm0zjzpa01Q1po+llcC/cTL0ZtVg3qt09VgTWz88yT6rVDJmVr0XG?= =?us-ascii?Q?MFVhIlt55xqSQSwLieZ/yUtixVPimMmko3KW7n7vXKVwbUjZfl8Uek7U69tA?= =?us-ascii?Q?o1cUGTrdYguLFiYwNZZl3CeL0i4cThx0xgxLipqbLYEb+RHmosbLY3FbBo66?= =?us-ascii?Q?fnfEpIiHv+rA1R3ZfQJ5HzSTGjN3mvsTGFpFZnHw5z3i2uzj/XNZcaMRBTuJ?= =?us-ascii?Q?orjmVHB2pLo02ryPflBF4jNxNvmHGyBhTPnNQ8Jr97ZJ6JrHKbeMgKWaWcPh?= =?us-ascii?Q?5IGgSz2YxRVfGRMjeTiyL1dtZfTCX2/M6qKrM4zEa/DiCFEhVgB13Sgue8Wl?= =?us-ascii?Q?Mp+CU4u9AeG0atKDR9Xy1Q/NA1pPz9VGZK82Xh1G785IkgnWWA/0cEAuPnWw?= =?us-ascii?Q?5Ihka9qWvDAAVoIu5FBVbz5vAKcPADwe1p+ZZ00O?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: bcf0eb67-fe9a-4e6b-9e32-08de1d9ef83c X-MS-Exchange-CrossTenant-AuthSource: SN7SPRMB0025.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Nov 2025 01:42:54.1026 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Uv0YuBIl0Hv4X1J9SNguBk9h0dXL/Y2eyngUga3JkEB1fr7UvAFdeOgCAyr+dbMTky72yhCPX37JXaRVpT0x6A== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB5746 Message-ID-Hash: O7TNUOAOJXTZ6HY7GJZF6F7REBOW4NPR X-Message-ID-Hash: O7TNUOAOJXTZ6HY7GJZF6F7REBOW4NPR X-MailFrom: nathanc@nvidia.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; header-match-devel.lists.libvirt.org-0; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: skolothumtho@nvidia.com, nicolinc@nvidia.com, nathanc@nvidia.com, mochs@nvidia.com X-Mailman-Version: 3.3.10 Precedence: list List-Id: Development discussions about the libvirt library & tools Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: From: Nathan Chen via Devel Reply-To: Nathan Chen X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZM-MESSAGEID: 1762480222131154100 Content-Type: text/plain; charset="utf-8" From: Ian May Add test coverage for the ACPI EGM memory device feature: - Add test case to qemuxmlconftest.c for aarch64 architecture - Add acpi-egm-memory capability to QEMU 10.0.0 aarch64 capabilities - Create test input XML with EGM device configuration - Generate expected output XML and QEMU command line args - Update validation to skip filesystem checks during tests The test validates XML parsing, formatting, device validation, and QEMU command line generation for the EGM device. Filesystem validation is conditionally skipped in test environments while preserving full validation for production use. Signed-off-by: Ian May Signed-off-by: Nathan Chen --- src/conf/domain_conf.c | 5 +- src/conf/domain_postparse.c | 5 +- src/qemu/qemu_domain.c | 2 + src/util/virfile.h | 2 +- tests/meson.build | 1 + tests/qemuegmmock.c | 67 +++++++++++++++++++ .../acpi-egm-memory.aarch64-latest.args | 36 ++++++++++ .../acpi-egm-memory.aarch64-latest.xml | 57 ++++++++++++++++ tests/qemuxmlconfdata/acpi-egm-memory.xml | 33 +++++++++ tests/qemuxmlconftest.c | 8 ++- 10 files changed, 212 insertions(+), 4 deletions(-) create mode 100644 tests/qemuegmmock.c create mode 100644 tests/qemuxmlconfdata/acpi-egm-memory.aarch64-latest.ar= gs create mode 100644 tests/qemuxmlconfdata/acpi-egm-memory.aarch64-latest.xml create mode 100644 tests/qemuxmlconfdata/acpi-egm-memory.xml diff --git a/src/conf/domain_conf.c b/src/conf/domain_conf.c index ac97b44b9e..077303fc19 100644 --- a/src/conf/domain_conf.c +++ b/src/conf/domain_conf.c @@ -8781,8 +8781,11 @@ virDomainDefGetMemoryInitial(const virDomainDef *def) size_t i; unsigned long long ret =3D def->mem.total_memory; =20 - for (i =3D 0; i < def->nmems; i++) + for (i =3D 0; i < def->nmems; i++) { + if (def->mems[i]->model =3D=3D VIR_DOMAIN_MEMORY_MODEL_EGM) + continue; ret -=3D def->mems[i]->size; + } =20 return ret; } diff --git a/src/conf/domain_postparse.c b/src/conf/domain_postparse.c index 0181d21f0e..bb4a61b7d8 100644 --- a/src/conf/domain_postparse.c +++ b/src/conf/domain_postparse.c @@ -44,8 +44,11 @@ virDomainDefPostParseMemory(virDomainDef *def, numaMemory =3D virDomainNumaGetMemorySize(def->numa); =20 /* calculate the sizes of hotplug memory */ - for (i =3D 0; i < def->nmems; i++) + for (i =3D 0; i < def->nmems; i++) { + if (def->mems[i]->model =3D=3D VIR_DOMAIN_MEMORY_MODEL_EGM) + continue; hotplugMemory +=3D def->mems[i]->size; + } =20 if (numaMemory) { /* update the sizes in XML if nothing was set in the XML or ABI up= date diff --git a/src/qemu/qemu_domain.c b/src/qemu/qemu_domain.c index 75095b4de8..72b7fd7047 100644 --- a/src/qemu/qemu_domain.c +++ b/src/qemu/qemu_domain.c @@ -8039,6 +8039,8 @@ qemuDomainDefValidateMemoryHotplug(const virDomainDef= *def, } =20 for (i =3D 0; i < def->nmems; i++) { + if (def->mems[i]->model =3D=3D VIR_DOMAIN_MEMORY_MODEL_EGM) + continue; hotplugMemory +=3D def->mems[i]->size; =20 switch (def->mems[i]->model) { diff --git a/src/util/virfile.h b/src/util/virfile.h index ce2ffb8ed4..5203ef4425 100644 --- a/src/util/virfile.h +++ b/src/util/virfile.h @@ -167,7 +167,7 @@ int virFileReadHeaderQuiet(const char *path, int maxlen= , char **buf) int virFileReadLimFD(int fd, int maxlen, char **buf) G_GNUC_WARN_UNUSED_RESULT ATTRIBUTE_NONNULL(3); int virFileReadAll(const char *path, int maxlen, char **buf) - G_GNUC_WARN_UNUSED_RESULT ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(3); + G_GNUC_WARN_UNUSED_RESULT ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(3) AT= TRIBUTE_MOCKABLE; int virFileReadAllQuiet(const char *path, int maxlen, char **buf) G_GNUC_WARN_UNUSED_RESULT ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(3); int virFileReadBufQuiet(const char *file, char *buf, int len) diff --git a/tests/meson.build b/tests/meson.build index 0d76d37959..312c05a5f1 100644 --- a/tests/meson.build +++ b/tests/meson.build @@ -174,6 +174,7 @@ if conf.has('WITH_QEMU') { 'name': 'qemucaps2xmlmock' }, { 'name': 'qemucapsprobemock', 'link_with': [ test_qemu_driver_lib ] }, { 'name': 'qemucpumock' }, + { 'name': 'qemuegmmock' }, { 'name': 'qemuhotplugmock', 'link_with': [ test_qemu_driver_lib, test= _utils_qemu_lib, test_utils_lib ] }, { 'name': 'qemuxml2argvmock' }, { 'name': 'virhostidmock' }, diff --git a/tests/qemuegmmock.c b/tests/qemuegmmock.c new file mode 100644 index 0000000000..c915212f45 --- /dev/null +++ b/tests/qemuegmmock.c @@ -0,0 +1,67 @@ +/* + * Copyright (C) 2024 Red Hat, Inc. + * SPDX-License-Identifier: LGPL-2.1-or-later + */ + +#include +#include + +#include "internal.h" +#include "virfile.h" +#include "virmock.h" + +static bool (*real_virFileExists)(const char *path); +static int (*real_access)(const char *path, int mode); +static int (*real_virFileReadAll)(const char *path, int maxlen, char **buf= ); + +static void +init_syms(void) +{ + if (real_virFileExists && real_access && real_virFileReadAll) + return; + + VIR_MOCK_REAL_INIT(virFileExists); + VIR_MOCK_REAL_INIT(access); + VIR_MOCK_REAL_INIT(virFileReadAll); +} + +bool +virFileExists(const char *path) +{ + init_syms(); + + /* Mock EGM device paths for testing */ + if (g_str_has_prefix(path, "/dev/egm") || + g_str_has_prefix(path, "/sys/class/egm/")) + return true; + + return real_virFileExists(path); +} + +int +access(const char *path, int mode) +{ + init_syms(); + + /* Mock EGM device paths for testing */ + if (g_str_has_prefix(path, "/dev/egm") || + g_str_has_prefix(path, "/sys/class/egm/")) + return 0; /* success */ + + return real_access(path, mode); +} + +int +virFileReadAll(const char *path, int maxlen, char **buf) +{ + init_syms(); + + /* Mock EGM GPU device file for testing */ + if (g_str_has_prefix(path, "/sys/class/egm/") && + g_str_has_suffix(path, "/gpu_devices")) { + *buf =3D g_strdup("0000:01:00.0\n"); + return strlen(*buf); + } + + return real_virFileReadAll(path, maxlen, buf); +} diff --git a/tests/qemuxmlconfdata/acpi-egm-memory.aarch64-latest.args b/te= sts/qemuxmlconfdata/acpi-egm-memory.aarch64-latest.args new file mode 100644 index 0000000000..938b085d56 --- /dev/null +++ b/tests/qemuxmlconfdata/acpi-egm-memory.aarch64-latest.args @@ -0,0 +1,36 @@ +LC_ALL=3DC \ +PATH=3D/bin \ +HOME=3D/var/lib/libvirt/qemu/domain--1-egm \ +USER=3Dtest \ +LOGNAME=3Dtest \ +XDG_DATA_HOME=3D/var/lib/libvirt/qemu/domain--1-egm/.local/share \ +XDG_CACHE_HOME=3D/var/lib/libvirt/qemu/domain--1-egm/.cache \ +XDG_CONFIG_HOME=3D/var/lib/libvirt/qemu/domain--1-egm/.config \ +/usr/bin/qemu-system-aarch64 \ +-name guest=3Degm,debug-threads=3Don \ +-S \ +-object '{"qom-type":"secret","id":"masterKey0","format":"raw","file":"/va= r/lib/libvirt/qemu/domain--1-egm/master-key.aes"}' \ +-machine virt,usb=3Doff,gic-version=3D3,dump-guest-core=3Doff,acpi=3Doff \ +-accel kvm \ +-cpu host \ +-m size=3D524288k,maxmem=3D524288k \ +-overcommit mem-lock=3Doff \ +-smp 1,sockets=3D1,dies=3D1,clusters=3D1,cores=3D1,threads=3D1 \ +-object '{"qom-type":"memory-backend-file","id":"memegm0","mem-path":"/dev= /egm0","share":true,"size":536870912}' \ +-object acpi-egm-memory,id=3Degm0,pci-dev=3Dua-hostdev0,node=3D0 \ +-numa node,nodeid=3D0,cpus=3D0,memdev=3Dmemegm0 \ +-uuid 00010203-0405-4607-8809-0a0b0c0d0e0f \ +-display none \ +-no-user-config \ +-nodefaults \ +-chardev socket,id=3Dcharmonitor,fd=3D1729,server=3Don,wait=3Doff \ +-mon chardev=3Dcharmonitor,id=3Dmonitor,mode=3Dcontrol \ +-rtc base=3Dutc \ +-no-shutdown \ +-boot strict=3Don \ +-device '{"driver":"pcie-root-port","port":8,"chassis":1,"id":"pci.1","bus= ":"pcie.0","multifunction":true,"addr":"0x1"}' \ +-device '{"driver":"pcie-root-port","port":9,"chassis":2,"id":"pci.2","bus= ":"pcie.0","addr":"0x1.0x1"}' \ +-audiodev '{"id":"audio1","driver":"none"}' \ +-device '{"driver":"vfio-pci","host":"0000:01:00.0","id":"ua-hostdev0","bu= s":"pci.1","addr":"0x0"}' \ +-sandbox on,obsolete=3Ddeny,elevateprivileges=3Ddeny,spawn=3Ddeny,resource= control=3Ddeny \ +-msg timestamp=3Don diff --git a/tests/qemuxmlconfdata/acpi-egm-memory.aarch64-latest.xml b/tes= ts/qemuxmlconfdata/acpi-egm-memory.aarch64-latest.xml new file mode 100644 index 0000000000..81928b316c --- /dev/null +++ b/tests/qemuxmlconfdata/acpi-egm-memory.aarch64-latest.xml @@ -0,0 +1,57 @@ + + egm + 00010203-0405-4607-8809-0a0b0c0d0e0f + 524288 + 524288 + 524288 + 1 + + hvm + + + + + + + + + + + + + destroy + restart + destroy + + /usr/bin/qemu-system-aarch64 + + + + +
+ + + + +
+ +