From nobody Fri Nov 21 10:01:45 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) client-ip=8.43.85.245; envelope-from=devel-bounces@lists.libvirt.org; helo=lists.libvirt.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) smtp.mailfrom=devel-bounces@lists.libvirt.org; arc=fail (Bad Signature); dmarc=pass(p=reject dis=none) header.from=lists.libvirt.org Return-Path: Received: from lists.libvirt.org (lists.libvirt.org [8.43.85.245]) by mx.zohomail.com with SMTPS id 1763603425794912.8610275313251; Wed, 19 Nov 2025 17:50:25 -0800 (PST) Received: by lists.libvirt.org (Postfix, from userid 993) id CC94143DC1; Wed, 19 Nov 2025 20:50:24 -0500 (EST) Received: from [172.19.199.50] (lists.libvirt.org [8.43.85.245]) by lists.libvirt.org (Postfix) with ESMTP id 5EAFC441ED; Wed, 19 Nov 2025 20:46:34 -0500 (EST) Received: by lists.libvirt.org (Postfix, from userid 993) id E36CE41ADB; Wed, 19 Nov 2025 20:42:53 -0500 (EST) Received: from PH8PR06CU001.outbound.protection.outlook.com (mail-westus3azon11012008.outbound.protection.outlook.com [40.107.209.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (3072 bits)) (No client certificate requested) by lists.libvirt.org (Postfix) with ESMTPS id BAE6D43FC7 for ; Wed, 19 Nov 2025 20:42:51 -0500 (EST) Received: from SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) by DS0PR12MB7826.namprd12.prod.outlook.com (2603:10b6:8:148::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9343.10; Thu, 20 Nov 2025 01:42:46 +0000 Received: from SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd]) by SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd%6]) with mapi id 15.20.9343.009; Thu, 20 Nov 2025 01:42:46 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-26) on lists.libvirt.org X-Spam-Level: X-Spam-Status: No, score=-5.0 required=5.0 tests=ARC_SIGNED,ARC_VALID,BAYES_00, DKIM_INVALID,DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED, RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_PASS autolearn=unavailable autolearn_force=no version=4.0.1 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=mfXHu9ABw5liuoY9TaLeGHMW96JXAiTpk2JAoM9f7p8nM95XZ2n24vgR/9COXKYpcGKTzfw//C5wZRD5HNjVceeZznQgB+93XdJLekgd09fhiZKTmd7I14aN9gZNJ5nhkMkpdc2pzC37hztKCnrDvhjluLvuDNuvVCNEWA1fEAE2JaeGEEoGGGT2o3W7JZozY7L9zuJLrc7bJNnnwu7Cx/X0UT/QA8Z9cMeHYHfeSBxtSOkn2xc6kcTC4kYp4W9KqvN/E/5qfD3qbYxkEmAZCsshnqOw+jtP2HML+4lgXp0mSzh+ajcaQw5hcusurZsyCLFKoJsdVyFAZ2ZUJCTe7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=4BRWhxETsuk781WWcgcm2Yl8ZrRc2reFD4RmZ4buxiE=; b=NjxRBT5KCB0xd3winddyUUGLttTIAWHksc5zxZITOV+bvxgG55vbuvt9UBRydYA4LQT87qUJyHFr0OAQ1P6gJXA6ZDWIKuIa6/jdPG9INRRUuhJKMrwb5F1uz225DNhREix7It9F5prcL96SMAIK1gzZVybed5nfh3acMokHZKDK2AjAJdTKZvWdEAD+8DPl4HTi7lo7qQP+W0ErmG0dj7lsNPMKbyQhiTotZHXR/OQ0vGgCYzvCWuhTW9MJh7zb448WUfbaoj7u1pNsRwNx5Eay8iGJlwLa9X2MFmCu405zl9NyrtYMEwQ52qWA670qUG6PRVMF+MMP29YT/HV+8A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4BRWhxETsuk781WWcgcm2Yl8ZrRc2reFD4RmZ4buxiE=; b=QtQU6YECH7Xf5NsyoWZVV/Wnj2vN5CB7ygNZa8AQFYKNVdvOM6swr50aMoQ5B08qje2Mzi1wZfqSroDHG3iTznYJK1uqYebPakLRNudhOUVLni49i+5x1jWAKibvtpUKqR8EqY3xdW3ilDzK6mceq1hEUIrP2VPmFvF/Bhx2vfIjiRgR0szG3MKzTtce7zYprFq7tzdvRFi1WQIrfcHjKY52efas6yz3GqqRZzqolCsrWiw8ZB+KkrLWGsqep1wAr1zN1UnaPjrhjZ4nmus3nGIHAWgTg3U2lXdwugKPebAD6zqwPH51qO2y+0gYedYK+j+342g3BA84dlCjsje2rw== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; To: devel@lists.libvirt.org Subject: [PATCH 1/4] conf: Support multiple device-pluggable smmuv3 IOMMUs Date: Wed, 19 Nov 2025 17:42:40 -0800 Message-ID: <20251120014243.2678797-2-nathanc@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120014243.2678797-1-nathanc@nvidia.com> References: <20251120014243.2678797-1-nathanc@nvidia.com> Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: SJ0P220CA0021.NAMP220.PROD.OUTLOOK.COM (2603:10b6:a03:41b::8) To SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN7SPRMB0025:EE_|DS0PR12MB7826:EE_ X-MS-Office365-Filtering-Correlation-Id: 398f7700-c6f5-499e-c283-08de27d61ad3 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|366016|376014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?om/8VRoFJ6asvfm4k2xrlaXxuk3nfEkP5qU2rsIab5cYoXK3DznRh3sVk9GH?= =?us-ascii?Q?LAlDyefeLYE9DHInlvaDwNaSn+JIyEr+DwvueQWhiC8g8WELMVtwjxAv64sV?= =?us-ascii?Q?9WwbMzPzTM1hOWnQ6gnqCBojKvPwx5xS8RVlY5KgeG7ReTOkelV2kS+CW4W/?= =?us-ascii?Q?6LDr2AwlspVBk60uPjwPhAgq7HUODLs9ASNKccBoVWe+ibACIsBArFEef6tv?= =?us-ascii?Q?9wvBYPgV79/RK9hXrbiQkOa2swtbu7BqNXG443Km8wzpnvv6DsPw77bTbxHK?= =?us-ascii?Q?f0kjYy3RJfW/Pdi2qw61Pgd9NoIjFip5XS2Ig067yl1oZOS1nFlv5Q6e3lo7?= =?us-ascii?Q?MrPaqXmTFTft1RuPavPYFuuIhmyckbd0wv+lQIOR9F4H7ngszQJC15l7lIDX?= =?us-ascii?Q?DRnv7GLskp0jqfnj04w/EAPnG+0dJQH48MFlFWOAceYoe0zKCPYA39ujvn9l?= =?us-ascii?Q?LilVdn8UtAB3FiLaa6Dbt4HU27Hnuv2Dqszif/unXpWy8xXcyPAuY4T8TisS?= =?us-ascii?Q?ejSKNt93x7B1PQ/cYs9swkED6AuvMeK3KCBaMr7RQ8jSmlV8kQ1bIKkBr8dN?= =?us-ascii?Q?9EvHEa2fTHn7USOCiEqpc2gbLcsW4+eSv9E0O/cUbHjyJo/Ry5DuBVxMGRNN?= =?us-ascii?Q?Mi8N1p5LIG+CZgzAf6VY8hTPfkj6eJ/11TOwO6qw3QzYNVAhcC5fYO4jntXO?= =?us-ascii?Q?/P8rxmj3CDBnkYjaXiY47QnW9Ts3tIxAcXp3SrgqgXDr+mvkBrB7taczVut5?= =?us-ascii?Q?8yMMdt0UTGVZusdKxdo8EU/6fXyIZTNE9Za7BBapguhrBk0HLDAYulL561lP?= =?us-ascii?Q?lQXKHfGWj0XePoRFWM99yGPZOEUmRY/W3ahn8cqY+a39FniXGdkjpdHTgNbn?= =?us-ascii?Q?62+9Jp9s1u3HNcP2/mSlJzkolMMXI0zcLQgIRUHIpyeS/eoSijMJ/ytd0LEi?= =?us-ascii?Q?VNsUaaEymoEXaXzYzJItyQhulhoULUuXf1Mx5z5OzZwYo4GoRGE+1E1NS46d?= =?us-ascii?Q?Kj1nePN77nxkqRh3bCh689g/8a9gCviPu2dRag9hziD7//gqmn/kM8riZouT?= =?us-ascii?Q?ibzwcsbyDJQHc8ocOZd9Nkckm6PpjWfjtFjuDSRUFQ4k+eJE7pbYjBT4GT5D?= =?us-ascii?Q?pb7W1pYN1YVA53TPyqDy1ote4nFidqx/IBxCHZv/OL9GnG8FVOjR0mb3u7nb?= =?us-ascii?Q?JZu2HQ8F0xSGSji2FtoVeVuTSxLyyMXd5Jnjl18tXWpQTCMM8eRo4Y6UUtNB?= =?us-ascii?Q?6Y5TsnlOpNIV6P2TEo6ovEJ7Dgmdq3pk8xyme+NRBMOsdtO/5AuY7JQz2LOu?= =?us-ascii?Q?vJziNKupNkxoNoI3K1+0VwMHOFRKeKMqMXc4M4JEIn16+rwcCdEtk/OOHRkh?= =?us-ascii?Q?5No8lg6NHX6DqF4DXMaO8lfbtTKhMKNkqRbaeRzAP6BJi5biYrceG0KMgPUC?= =?us-ascii?Q?ZSMZTFatovRJmXvYHRF3ZnVSD53nT6ZA?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN7SPRMB0025.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?HUjG3goWP7cZbsueHFjpvG2yoe6MSQ1iRawngifjaZJt4lPp2SI78TGevp0E?= =?us-ascii?Q?AQ2okAAJTuA1SaZSN41CP4emnT1YdVNkWUc/amW01rW7r51vd7lsEIo+MtF1?= =?us-ascii?Q?qxsh6pfuVbE1WEgLV70wxfl0slScio2U38L8BmHNlh6OUXBqlbNdYO7y//k6?= =?us-ascii?Q?TOQlv0i314SCBoHXdMLBQ4zIK2gVMtlTy5Nq34hr2Q6TudKcvHlsmffWUWUD?= =?us-ascii?Q?lzT+HFWxZHGyC4u461VpIW6+9CivOtAPrfstpr2HDcNtlfFpwcl9iMILTLXb?= =?us-ascii?Q?9EAZA9xkBuewiC7Ur/4m4mOlCEVdI9Ak8DToajCCU3jBeMjqheWANbywzaLx?= =?us-ascii?Q?7g1ee2ar2+sHJrn5YIdgAa9p6ldMSO+svKphM4NmdmQl/AScAL+JaGO8GxxS?= =?us-ascii?Q?amVULnqpulB0+SmF6jjBS3y17kMA9Wd0r442vxLfcZ6rBNE0M78KmsTTDkAu?= =?us-ascii?Q?fXyCYy6zKxTW9zLWaMQsToTC99UsOgH5bXNSzWoru8X8kMSg3kdAmOprMTQb?= =?us-ascii?Q?0VA67WV3CEnCC+Pm84nz1MRfmd30wT/lBlNptLEonS0Alw9rqVO6fS10fC+4?= =?us-ascii?Q?sSVQUUdedpMVBhUji6sdHeT+IhxEnmr3G6uwJeEI8oNHkwRvCljKnIpvNKW2?= =?us-ascii?Q?qxhyMqMWIsvVMcaw43gFdw/aF+ZErTG0Atpu4EcWsCCI95ZymyDOpqUiB3xP?= =?us-ascii?Q?igMTyauAv0LnMSrp7SfsDh5zRzZXT/yZg1Aeb9E9+MgZ5u9O5sOA8+l2T5OZ?= =?us-ascii?Q?Auu909SUuAk0d5DaySQc9kjTj/8u4hxhYLoazbNJTjSiC4pWALYgywM13S51?= =?us-ascii?Q?UjgSlL1a+Dx6XdVaG4zXa8PiVjeWGwefMzjeGe19h8A/L2BII7GDCCExrX3x?= =?us-ascii?Q?ezcU6vVlevwaoPXfBTqmQEk3BgiRqzK1Za3WXtJdgH2uvWqjfRxqp/pB+D/j?= =?us-ascii?Q?mKK0cKNilfPAZJzN0WNe8SMd0HTiWGQ+ernjyWV0MusTJTGPRa3KSW5wgDKb?= =?us-ascii?Q?6Ln87NcpAYJTMA6eJKKmdOa20eSUEeYTCEFnqqWZRcjEjRCL8hEaUvCBLe3M?= =?us-ascii?Q?wPSCQ3oSWOC7XB6oNPXnc2rzKjN+IVumwaXS8QSVDSSopIyweYJiTepQoKJU?= =?us-ascii?Q?s546orDD9Tlb7s1wP3CMKkp3kyWZ+HMxR4o5Bk69SvEaguL5QFqUm9/qYhcI?= =?us-ascii?Q?YqLSAap14vwGs1bl92JFxFbaDYiYnQyq2VeADCHOgAKEI4g4R3j0V3SPDp4v?= =?us-ascii?Q?MDqpLwR8DNO+7mXEByTJ6UF38JeBesF+NQFJyBFeVJJj9vYAyUqTFqDWmDaf?= =?us-ascii?Q?XiiRBqFqMwTVL1Yl5RNRGBhOclGyUMYPPGG+lK50/hnL6uHPo+ZKmae6rMLE?= =?us-ascii?Q?EQ6Vg4zyPpdFUGL1q/4QXldm0HTPFVGshNqaQ+VoW/MR2Z12riwb7QlNDtPu?= =?us-ascii?Q?CaqxJFuUFWiTaLVXdgHWUgFeJ8sdPJRxRbZAYotcsrx2z3NxURUsxndVEa1s?= =?us-ascii?Q?ceayzYCtEmJwB52YLi3jPkWAtq2Zp0zro1v9l3VyiFWgo2ViblUBnEMX9iAL?= =?us-ascii?Q?igF/mvldTS2/MmAOtM+Tqp+GYAo3f7KOCOIe2G3y?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: 398f7700-c6f5-499e-c283-08de27d61ad3 X-MS-Exchange-CrossTenant-AuthSource: SN7SPRMB0025.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Nov 2025 01:42:46.0794 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 0/jbiD3l51cXxInquVs4G3Gh6N95Bl0ocoMoSNxWf4XJX7UlnOrYWvMAS8Hp8OxWyjKKP5Du+/4Z1+dBfjKOSw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB7826 Message-ID-Hash: HNWIFJU46PBSMANPW4SCHQHVMBQY6C36 X-Message-ID-Hash: HNWIFJU46PBSMANPW4SCHQHVMBQY6C36 X-MailFrom: nathanc@nvidia.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; header-match-devel.lists.libvirt.org-0; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: skolothumtho@nvidia.com, nicolinc@nvidia.com, nathanc@nvidia.com, mochs@nvidia.com X-Mailman-Version: 3.3.10 Precedence: list List-Id: Development discussions about the libvirt library & tools Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: From: Nathan Chen via Devel Reply-To: Nathan Chen X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZM-MESSAGEID: 1763603427934019100 Content-Type: text/plain; charset="utf-8" Add support for parsing multiple IOMMU devices from the VM definition when "smmuv3" is the IOMMU model. Signed-off-by: Nathan Chen Reviewed-by: J=C3=A1n Tomko --- src/conf/domain_conf.c | 84 +++++++++++++++----- src/conf/domain_conf.h | 9 ++- src/conf/domain_validate.c | 33 +++++--- src/conf/schemas/domaincommon.rng | 4 +- src/libvirt_private.syms | 2 + src/qemu/qemu_alias.c | 15 ++-- src/qemu/qemu_command.c | 128 +++++++++++++++--------------- src/qemu/qemu_domain.c | 2 +- src/qemu/qemu_domain_address.c | 5 +- src/qemu/qemu_driver.c | 8 +- src/qemu/qemu_postparse.c | 9 ++- src/qemu/qemu_validate.c | 2 +- 12 files changed, 182 insertions(+), 119 deletions(-) diff --git a/src/conf/domain_conf.c b/src/conf/domain_conf.c index d2dea6952e..0c7a32b03c 100644 --- a/src/conf/domain_conf.c +++ b/src/conf/domain_conf.c @@ -4141,7 +4141,9 @@ void virDomainDefFree(virDomainDef *def) virDomainCryptoDefFree(def->cryptos[i]); g_free(def->cryptos); =20 - virDomainIOMMUDefFree(def->iommu); + for (i =3D 0; i < def->niommus; i++) + virDomainIOMMUDefFree(def->iommus[i]); + g_free(def->iommus); =20 virDomainPstoreDefFree(def->pstore); =20 @@ -5013,9 +5015,9 @@ virDomainDeviceInfoIterateFlags(virDomainDef *def, } =20 device.type =3D VIR_DOMAIN_DEVICE_IOMMU; - if (def->iommu) { - device.data.iommu =3D def->iommu; - if ((rc =3D cb(def, &device, &def->iommu->info, opaque)) !=3D 0) + for (i =3D 0; i < def->niommus; i++) { + device.data.iommu =3D def->iommus[i]; + if ((rc =3D cb(def, &device, &def->iommus[i]->info, opaque)) !=3D = 0) return rc; } =20 @@ -16536,6 +16538,42 @@ virDomainInputDefFind(const virDomainDef *def, } =20 =20 +bool +virDomainIOMMUDefEquals(const virDomainIOMMUDef *a, + const virDomainIOMMUDef *b) +{ + if (a->model !=3D b->model || + a->intremap !=3D b->intremap || + a->caching_mode !=3D b->caching_mode || + a->eim !=3D b->eim || + a->iotlb !=3D b->iotlb || + a->aw_bits !=3D b->aw_bits || + a->dma_translation !=3D b->dma_translation) + return false; + + if (a->info.type !=3D VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE && + !virDomainDeviceInfoAddressIsEqual(&a->info, &b->info)) + return false; + + return true; +} + + +ssize_t +virDomainIOMMUDefFind(const virDomainDef *def, + const virDomainIOMMUDef *iommu) +{ + size_t i; + + for (i =3D 0; i < def->niommus; i++) { + if (virDomainIOMMUDefEquals(iommu, def->iommus[i])) + return i; + } + + return -1; +} + + bool virDomainVsockDefEquals(const virDomainVsockDef *a, const virDomainVsockDef *b) @@ -20205,19 +20243,22 @@ virDomainDefParseXML(xmlXPathContextPtr ctxt, } VIR_FREE(nodes); =20 + /* Parsing iommu device definitions */ if ((n =3D virXPathNodeSet("./devices/iommu", ctxt, &nodes)) < 0) return NULL; =20 - if (n > 1) { - virReportError(VIR_ERR_XML_ERROR, "%s", - _("only a single IOMMU device is supported")); - return NULL; - } + if (n > 0) + def->iommus =3D g_new0(virDomainIOMMUDef *, n); =20 - if (n > 0) { - if (!(def->iommu =3D virDomainIOMMUDefParseXML(xmlopt, nodes[0], - ctxt, flags))) + for (i =3D 0; i < n; i++) { + virDomainIOMMUDef *iommu; + + iommu =3D virDomainIOMMUDefParseXML(xmlopt, nodes[i], ctxt, flags); + + if (!iommu) return NULL; + + def->iommus[def->niommus++] =3D iommu; } VIR_FREE(nodes); =20 @@ -22696,15 +22737,17 @@ virDomainDefCheckABIStabilityFlags(virDomainDef *= src, goto error; } =20 - if (!!src->iommu !=3D !!dst->iommu) { - virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s", - _("Target domain IOMMU device count does not match = source")); + if (src->niommus !=3D dst->niommus) { + virReportError(VIR_ERR_CONFIG_UNSUPPORTED, + _("Target domain IOMMU device count %1$zu does not = match source %2$zu"), + dst->niommus, src->niommus); goto error; } =20 - if (src->iommu && - !virDomainIOMMUDefCheckABIStability(src->iommu, dst->iommu)) - goto error; + for (i =3D 0; i < src->niommus; i++) { + if (!virDomainIOMMUDefCheckABIStability(src->iommus[i], dst->iommu= s[i])) + goto error; + } =20 if (!!src->vsock !=3D !!dst->vsock) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s", @@ -29560,8 +29603,9 @@ virDomainDefFormatInternalSetRootName(virDomainDef = *def, for (n =3D 0; n < def->ncryptos; n++) { virDomainCryptoDefFormat(buf, def->cryptos[n], flags); } - if (def->iommu) - virDomainIOMMUDefFormat(buf, def->iommu); + + for (n =3D 0; n < def->niommus; n++) + virDomainIOMMUDefFormat(buf, def->iommus[n]); =20 if (def->vsock) virDomainVsockDefFormat(buf, def->vsock); diff --git a/src/conf/domain_conf.h b/src/conf/domain_conf.h index 11eb46ae53..6aa716b907 100644 --- a/src/conf/domain_conf.h +++ b/src/conf/domain_conf.h @@ -3303,6 +3303,9 @@ struct _virDomainDef { size_t nwatchdogs; virDomainWatchdogDef **watchdogs; =20 + size_t niommus; + virDomainIOMMUDef **iommus; + /* At maximum 2 TPMs on the domain if a TPM Proxy is present. */ size_t ntpms; virDomainTPMDef **tpms; @@ -3312,7 +3315,6 @@ struct _virDomainDef { virDomainNVRAMDef *nvram; virCPUDef *cpu; virDomainRedirFilterDef *redirfilter; - virDomainIOMMUDef *iommu; virDomainVsockDef *vsock; virDomainPstoreDef *pstore; =20 @@ -4320,6 +4322,11 @@ virDomainShmemDef *virDomainShmemDefRemove(virDomain= Def *def, size_t idx) ssize_t virDomainInputDefFind(const virDomainDef *def, const virDomainInputDef *input) ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) G_GNUC_WARN_UNUSED_RESULT; +bool virDomainIOMMUDefEquals(const virDomainIOMMUDef *a, + const virDomainIOMMUDef *b); +ssize_t virDomainIOMMUDefFind(const virDomainDef *def, + const virDomainIOMMUDef *iommu) + ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) G_GNUC_WARN_UNUSED_RESULT; bool virDomainVsockDefEquals(const virDomainVsockDef *a, const virDomainVsockDef *b) ATTRIBUTE_NONNULL(1) ATTRIBUTE_NONNULL(2) G_GNUC_WARN_UNUSED_RESULT; diff --git a/src/conf/domain_validate.c b/src/conf/domain_validate.c index 8085d782c5..3339fc83e0 100644 --- a/src/conf/domain_validate.c +++ b/src/conf/domain_validate.c @@ -1844,21 +1844,28 @@ virDomainDefCputuneValidate(const virDomainDef *def) static int virDomainDefIOMMUValidate(const virDomainDef *def) { - if (!def->iommu) - return 0; + size_t i; =20 - if (def->iommu->intremap =3D=3D VIR_TRISTATE_SWITCH_ON && - def->features[VIR_DOMAIN_FEATURE_IOAPIC] !=3D VIR_DOMAIN_IOAPIC_QE= MU) { - virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s", - _("IOMMU interrupt remapping requires split I/O API= C (ioapic driver=3D'qemu')")); - return -1; - } + for (i =3D 0; i < def->niommus; i++) { + virDomainIOMMUDef *iommu =3D def->iommus[i]; + if (def->niommus > 1 && iommu->model !=3D VIR_DOMAIN_IOMMU_MODEL_S= MMUV3) { + virReportError(VIR_ERR_XML_ERROR, "%s", + _("IOMMU model smmuv3 must be specified for mul= tiple IOMMU definitions")); + } =20 - if (def->iommu->eim =3D=3D VIR_TRISTATE_SWITCH_ON && - def->iommu->intremap !=3D VIR_TRISTATE_SWITCH_ON) { - virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s", - _("IOMMU eim requires interrupt remapping to be ena= bled")); - return -1; + if (iommu->intremap =3D=3D VIR_TRISTATE_SWITCH_ON && + def->features[VIR_DOMAIN_FEATURE_IOAPIC] !=3D VIR_DOMAIN_IOAPI= C_QEMU) { + virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s", + _("IOMMU interrupt remapping requires split I/O= APIC (ioapic driver=3D'qemu')")); + return -1; + } + + if (iommu->eim =3D=3D VIR_TRISTATE_SWITCH_ON && + iommu->intremap !=3D VIR_TRISTATE_SWITCH_ON) { + virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s", + _("IOMMU eim requires interrupt remapping to be= enabled")); + return -1; + } } =20 return 0; diff --git a/src/conf/schemas/domaincommon.rng b/src/conf/schemas/domaincom= mon.rng index 75b5124c33..ae3fa95904 100644 --- a/src/conf/schemas/domaincommon.rng +++ b/src/conf/schemas/domaincommon.rng @@ -6964,9 +6964,9 @@ - + - + diff --git a/src/libvirt_private.syms b/src/libvirt_private.syms index fb482fff40..4e57e4a8f6 100644 --- a/src/libvirt_private.syms +++ b/src/libvirt_private.syms @@ -495,6 +495,8 @@ virDomainInputSourceGrabToggleTypeToString; virDomainInputSourceGrabTypeFromString; virDomainInputSourceGrabTypeToString; virDomainInputTypeToString; +virDomainIOMMUDefEquals; +virDomainIOMMUDefFind; virDomainIOMMUDefFree; virDomainIOMMUDefNew; virDomainIOMMUModelTypeFromString; diff --git a/src/qemu/qemu_alias.c b/src/qemu/qemu_alias.c index b0bc057bd1..400ce73283 100644 --- a/src/qemu/qemu_alias.c +++ b/src/qemu/qemu_alias.c @@ -650,10 +650,14 @@ qemuAssignDeviceVsockAlias(virDomainVsockDef *vsock) =20 =20 static void -qemuAssignDeviceIOMMUAlias(virDomainIOMMUDef *iommu) +qemuAssignDeviceIOMMUAlias(virDomainDef *def, + virDomainIOMMUDef **iommu) { - if (!iommu->info.alias) - iommu->info.alias =3D g_strdup("iommu0"); + size_t i; + for (i =3D 0; i < def->niommus; i++) { + if (!iommu[i]->info.alias) + iommu[i]->info.alias =3D g_strdup_printf("iommu%zu", i); + } } =20 =20 @@ -769,8 +773,9 @@ qemuAssignDeviceAliases(virDomainDef *def) if (def->vsock) { qemuAssignDeviceVsockAlias(def->vsock); } - if (def->iommu) - qemuAssignDeviceIOMMUAlias(def->iommu); + if (def->niommus > 0) { + qemuAssignDeviceIOMMUAlias(def, def->iommus); + } for (i =3D 0; i < def->ncryptos; i++) { qemuAssignDeviceCryptoAlias(def, def->cryptos[i]); } diff --git a/src/qemu/qemu_command.c b/src/qemu/qemu_command.c index c56c321a6e..9c8330645b 100644 --- a/src/qemu/qemu_command.c +++ b/src/qemu/qemu_command.c @@ -6244,84 +6244,82 @@ qemuBuildIOMMUCommandLine(virCommand *cmd, const virDomainDef *def, virQEMUCaps *qemuCaps) { + size_t i; g_autoptr(virJSONValue) props =3D NULL; g_autoptr(virJSONValue) wrapperProps =3D NULL; - const virDomainIOMMUDef *iommu =3D def->iommu; - - if (!iommu) - return 0; =20 - switch (iommu->model) { - case VIR_DOMAIN_IOMMU_MODEL_INTEL: - if (virJSONValueObjectAdd(&props, - "s:driver", "intel-iommu", - "s:id", iommu->info.alias, - "S:intremap", qemuOnOffAuto(iommu->intre= map), - "T:caching-mode", iommu->caching_mode, - "S:eim", qemuOnOffAuto(iommu->eim), - "T:device-iotlb", iommu->iotlb, - "z:aw-bits", iommu->aw_bits, - "T:dma-translation", iommu->dma_translat= ion, - NULL) < 0) - return -1; + for (i =3D 0; i < def->niommus; i++) { + virDomainIOMMUDef *iommu =3D def->iommus[i]; + switch (iommu->model) { + case VIR_DOMAIN_IOMMU_MODEL_INTEL: + if (virJSONValueObjectAdd(&props, + "s:driver", "intel-iommu", + "s:id", iommu->info.alias, + "S:intremap", qemuOnOffAuto(iommu->i= ntremap), + "T:caching-mode", iommu->caching_mod= e, + "S:eim", qemuOnOffAuto(iommu->eim), + "T:device-iotlb", iommu->iotlb, + "z:aw-bits", iommu->aw_bits, + "T:dma-translation", iommu->dma_tran= slation, + NULL) < 0) + return -1; =20 - if (qemuBuildDeviceCommandlineFromJSON(cmd, props, def, qemuCaps) = < 0) - return -1; + if (qemuBuildDeviceCommandlineFromJSON(cmd, props, def, qemuCa= ps) < 0) + return -1; =20 - return 0; + break; + case VIR_DOMAIN_IOMMU_MODEL_VIRTIO: + if (virJSONValueObjectAdd(&props, + "s:driver", "virtio-iommu", + "s:id", iommu->info.alias, + NULL) < 0) { + return -1; + } =20 - case VIR_DOMAIN_IOMMU_MODEL_VIRTIO: - if (virJSONValueObjectAdd(&props, - "s:driver", "virtio-iommu", - "s:id", iommu->info.alias, - NULL) < 0) { - return -1; - } + if (qemuBuildDeviceAddressProps(props, def, &iommu->info) < 0) + return -1; =20 - if (qemuBuildDeviceAddressProps(props, def, &iommu->info) < 0) - return -1; + if (qemuBuildDeviceCommandlineFromJSON(cmd, props, def, qemuCa= ps) < 0) + return -1; =20 - if (qemuBuildDeviceCommandlineFromJSON(cmd, props, def, qemuCaps) = < 0) - return -1; + break; + case VIR_DOMAIN_IOMMU_MODEL_SMMUV3: + /* There is no -device for SMMUv3, so nothing to be done here = */ + break; =20 - return 0; + case VIR_DOMAIN_IOMMU_MODEL_AMD: + if (virJSONValueObjectAdd(&wrapperProps, + "s:driver", "AMDVI-PCI", + "s:id", iommu->info.alias, + NULL) < 0) + return -1; =20 - case VIR_DOMAIN_IOMMU_MODEL_SMMUV3: - /* There is no -device for SMMUv3, so nothing to be done here */ - return 0; + if (qemuBuildDeviceAddressProps(wrapperProps, def, &iommu->inf= o) < 0) + return -1; =20 - case VIR_DOMAIN_IOMMU_MODEL_AMD: - if (virJSONValueObjectAdd(&wrapperProps, - "s:driver", "AMDVI-PCI", - "s:id", iommu->info.alias, - NULL) < 0) - return -1; + if (qemuBuildDeviceCommandlineFromJSON(cmd, wrapperProps, def,= qemuCaps) < 0) + return -1; =20 - if (qemuBuildDeviceAddressProps(wrapperProps, def, &iommu->info) <= 0) - return -1; + if (virJSONValueObjectAdd(&props, + "s:driver", "amd-iommu", + "s:pci-id", iommu->info.alias, + "S:intremap", qemuOnOffAuto(iommu->i= ntremap), + "T:pt", iommu->pt, + "T:xtsup", iommu->xtsup, + "T:device-iotlb", iommu->iotlb, + NULL) < 0) + return -1; =20 - if (qemuBuildDeviceCommandlineFromJSON(cmd, wrapperProps, def, qem= uCaps) < 0) - return -1; + if (qemuBuildDeviceCommandlineFromJSON(cmd, props, def, qemuCa= ps) < 0) + return -1; =20 - if (virJSONValueObjectAdd(&props, - "s:driver", "amd-iommu", - "s:pci-id", iommu->info.alias, - "S:intremap", qemuOnOffAuto(iommu->intre= map), - "T:pt", iommu->pt, - "T:xtsup", iommu->xtsup, - "T:device-iotlb", iommu->iotlb, - NULL) < 0) - return -1; + break; =20 - if (qemuBuildDeviceCommandlineFromJSON(cmd, props, def, qemuCaps) = < 0) + case VIR_DOMAIN_IOMMU_MODEL_LAST: + default: + virReportEnumRangeError(virDomainIOMMUModel, iommu->model); return -1; - - return 0; - - case VIR_DOMAIN_IOMMU_MODEL_LAST: - default: - virReportEnumRangeError(virDomainIOMMUModel, iommu->model); - return -1; + } } =20 return 0; @@ -7158,8 +7156,8 @@ qemuBuildMachineCommandLine(virCommand *cmd, if (qemuAppendDomainFeaturesMachineParam(&buf, def, qemuCaps) < 0) return -1; =20 - if (def->iommu) { - switch (def->iommu->model) { + if (def->niommus =3D=3D 1) { + switch (def->iommus[0]->model) { case VIR_DOMAIN_IOMMU_MODEL_SMMUV3: virBufferAddLit(&buf, ",iommu=3Dsmmuv3"); break; @@ -7172,7 +7170,7 @@ qemuBuildMachineCommandLine(virCommand *cmd, =20 case VIR_DOMAIN_IOMMU_MODEL_LAST: default: - virReportEnumRangeError(virDomainIOMMUModel, def->iommu->model= ); + virReportEnumRangeError(virDomainIOMMUModel, def->iommus[0]->m= odel); return -1; } } diff --git a/src/qemu/qemu_domain.c b/src/qemu/qemu_domain.c index 0ac9ae0658..ac56fc7cb4 100644 --- a/src/qemu/qemu_domain.c +++ b/src/qemu/qemu_domain.c @@ -8371,7 +8371,7 @@ qemuDomainGetMemLockLimitBytes(virDomainDef *def) int factor =3D nvdpa + nnvme; =20 if (nvfio) { - if (def->iommu) + if (def->niommus > 0) factor +=3D nvfio; else factor +=3D 1; diff --git a/src/qemu/qemu_domain_address.c b/src/qemu/qemu_domain_address.c index 6d5c4785e8..7233df888c 100644 --- a/src/qemu/qemu_domain_address.c +++ b/src/qemu/qemu_domain_address.c @@ -2396,9 +2396,8 @@ qemuDomainAssignDevicePCISlots(virDomainDef *def, /* Nada - none are PCI based (yet) */ } =20 - if (def->iommu) { - virDomainIOMMUDef *iommu =3D def->iommu; - + for (i =3D 0; i < def->niommus; i++) { + virDomainIOMMUDef *iommu =3D def->iommus[i]; switch (iommu->model) { case VIR_DOMAIN_IOMMU_MODEL_VIRTIO: case VIR_DOMAIN_IOMMU_MODEL_AMD: diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c index 1f7e587f61..1e0289b35d 100644 --- a/src/qemu/qemu_driver.c +++ b/src/qemu/qemu_driver.c @@ -6902,12 +6902,12 @@ qemuDomainAttachDeviceConfig(virDomainDef *vmdef, break; =20 case VIR_DOMAIN_DEVICE_IOMMU: - if (vmdef->iommu) { + if (vmdef->niommus > 0) { virReportError(VIR_ERR_OPERATION_INVALID, "%s", _("domain already has an iommu device")); return -1; } - vmdef->iommu =3D g_steal_pointer(&dev->data.iommu); + VIR_APPEND_ELEMENT(vmdef->iommus, vmdef->niommus, dev->data.iommu); break; =20 case VIR_DOMAIN_DEVICE_VIDEO: @@ -7121,12 +7121,12 @@ qemuDomainDetachDeviceConfig(virDomainDef *vmdef, break; =20 case VIR_DOMAIN_DEVICE_IOMMU: - if (!vmdef->iommu) { + if ((idx =3D virDomainIOMMUDefFind(vmdef, dev->data.iommu)) < 0) { virReportError(VIR_ERR_OPERATION_FAILED, "%s", _("matching iommu device not found")); return -1; } - g_clear_pointer(&vmdef->iommu, virDomainIOMMUDefFree); + VIR_DELETE_ELEMENT(vmdef->iommus, idx, vmdef->niommus); break; =20 case VIR_DOMAIN_DEVICE_VIDEO: diff --git a/src/qemu/qemu_postparse.c b/src/qemu/qemu_postparse.c index fd27f8be27..dc5ade829a 100644 --- a/src/qemu/qemu_postparse.c +++ b/src/qemu/qemu_postparse.c @@ -1470,7 +1470,7 @@ qemuDomainDefAddDefaultDevices(virQEMUDriver *driver, } } =20 - if (addIOMMU && !def->iommu && + if (addIOMMU && !def->iommus && def->niommus =3D=3D 0 && virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_INTEL_IOMMU) && virQEMUCapsGet(qemuCaps, QEMU_CAPS_INTEL_IOMMU_INTREMAP) && virQEMUCapsGet(qemuCaps, QEMU_CAPS_INTEL_IOMMU_EIM)) { @@ -1482,7 +1482,8 @@ qemuDomainDefAddDefaultDevices(virQEMUDriver *driver, iommu->intremap =3D VIR_TRISTATE_SWITCH_ON; iommu->eim =3D VIR_TRISTATE_SWITCH_ON; =20 - def->iommu =3D g_steal_pointer(&iommu); + def->iommus =3D g_new0(virDomainIOMMUDef *, 1); + def->iommus[def->niommus++] =3D g_steal_pointer(&iommu); } =20 if (qemuDomainDefAddDefaultAudioBackend(driver, def) < 0) @@ -1558,8 +1559,8 @@ qemuDomainDefEnableDefaultFeatures(virDomainDef *def, * domain already has IOMMU without inremap. This will be fixed in * qemuDomainIOMMUDefPostParse() but there domain definition can't be * modified so change it now. */ - if (def->iommu && - (def->iommu->intremap =3D=3D VIR_TRISTATE_SWITCH_ON || + if (def->iommus && def->niommus =3D=3D 1 && + (def->iommus[0]->intremap =3D=3D VIR_TRISTATE_SWITCH_ON || qemuDomainNeedsIOMMUWithEIM(def)) && def->features[VIR_DOMAIN_FEATURE_IOAPIC] =3D=3D VIR_DOMAIN_IOAPIC_= NONE) { def->features[VIR_DOMAIN_FEATURE_IOAPIC] =3D VIR_DOMAIN_IOAPIC_QEM= U; diff --git a/src/qemu/qemu_validate.c b/src/qemu/qemu_validate.c index 5008391707..da08fd17cd 100644 --- a/src/qemu/qemu_validate.c +++ b/src/qemu/qemu_validate.c @@ -907,7 +907,7 @@ qemuValidateDomainVCpuTopology(const virDomainDef *def,= virQEMUCaps *qemuCaps) QEMU_MAX_VCPUS_WITHOUT_EIM); return -1; } - if (!def->iommu || def->iommu->eim !=3D VIR_TRISTATE_SWITCH_ON) { + if (!def->iommus || def->iommus[0]->eim !=3D VIR_TRISTATE_SWITCH_O= N) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, _("more than %1$d vCPUs require extended interr= upt mode enabled on the iommu device"), QEMU_MAX_VCPUS_WITHOUT_EIM); --=20 2.43.0 From nobody Fri Nov 21 10:01:45 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) client-ip=8.43.85.245; envelope-from=devel-bounces@lists.libvirt.org; helo=lists.libvirt.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) smtp.mailfrom=devel-bounces@lists.libvirt.org; arc=fail (Bad Signature); dmarc=pass(p=reject dis=none) header.from=lists.libvirt.org Return-Path: Received: from lists.libvirt.org (lists.libvirt.org [8.43.85.245]) by mx.zohomail.com with SMTPS id 1763603265155243.99461388749978; Wed, 19 Nov 2025 17:47:45 -0800 (PST) Received: by lists.libvirt.org (Postfix, from userid 993) id 2C2F344102; Wed, 19 Nov 2025 20:47:44 -0500 (EST) Received: from [172.19.199.50] (lists.libvirt.org [8.43.85.245]) by lists.libvirt.org (Postfix) with ESMTP id A75D144127; Wed, 19 Nov 2025 20:45:34 -0500 (EST) Received: by lists.libvirt.org (Postfix, from userid 993) id 69B5541ADB; Wed, 19 Nov 2025 20:42:52 -0500 (EST) Received: from PH8PR06CU001.outbound.protection.outlook.com (mail-westus3azon11012008.outbound.protection.outlook.com [40.107.209.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (3072 bits)) (No client certificate requested) by lists.libvirt.org (Postfix) with ESMTPS id A221A41ADB for ; Wed, 19 Nov 2025 20:42:50 -0500 (EST) Received: from SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) by DS0PR12MB7826.namprd12.prod.outlook.com (2603:10b6:8:148::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9343.10; Thu, 20 Nov 2025 01:42:47 +0000 Received: from SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd]) by SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd%6]) with mapi id 15.20.9343.009; Thu, 20 Nov 2025 01:42:47 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-26) on lists.libvirt.org X-Spam-Level: X-Spam-Status: No, score=-5.0 required=5.0 tests=ARC_SIGNED,ARC_VALID,BAYES_00, DKIM_INVALID,DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED, RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_PASS autolearn=unavailable autolearn_force=no version=4.0.1 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ZrFDgceD2WBt91nMX3Ju44riV20WvEjDLsUnjTXo1WhWuhs3+DYT9D9UQA+i0FleNffRB7IfVmUTam4im7O8GEZas4sTdQZInZbeQuAAhHXTg1FpyvulpbTgzDsOQoV6gHUo0xFkv1x54Xqky76E63tGZ5qKCWqNRruAuWpWZPOXBbziv8KhqxfeXtDzjekawY1GYd5K56GdzOmc2kJDTafHFj6BHdhzABWSUQ0ySHpH/HaIjlk8VoRou8MJzmwaAEvbCqiNJioVsVCXeGNe9BJ1EiLsXzppBBvasiu5IuSBiPtvQQmAnj/hXO/En92GkKDVKzDdVmD53+yEdww21Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oX8vPpLCrnsu5yTTwYvrKlxTpuY3cEtnSCrLyMYABxg=; b=ZP3M1igCPJgoXzTyBjrkRC8EHRxQC6B2WDd2YjnVILR7fiO8l7eUEh26sAwh+r/LAF14USbQTU0KOtiEypG5EiAPgWTkruOue2Vcb1EM8TO+I5Zpfud3LQVu8qYkSW4Hjj0n18w27WdZSUc5pc78ywTVzrVjlwt2sONkyB60Fd1NnnTNF9DFZ7W9NKJcrAMf3lpuv9pmNi0i6UUE+mHPPl+4Fy3gpkyyB8uo/xVvtlCmhM6VH4T8vgOEGsQbrri5o89P2Xl/zNsrRMrqXbNFFEUtMOU2CdPiH6a/5Bh9zeBcqi5RGwSZFRprlOxIyJ23FD7OrWe2LMnd74gUpWbVuQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oX8vPpLCrnsu5yTTwYvrKlxTpuY3cEtnSCrLyMYABxg=; b=kouaQSiM6yCdWiaQFNLwJkshz0OSy831ktuyXm6FNdg8cgsJap8W3WZgZpNw7aAkbPjSfj+oDxjP15Jxqu3vGlZ5Z3MLeY3Qxna+VYmHD8ieQmS54B6Hkamwwr7bfDjTzFVSJO+fYxRJ6mBvQy3oJdkkbuAmdR/oXt2whhRgYlJwhvAEO0P3iXe47fodP0uz0mayiqgtlvSS5XYxYhamcWAT33ZFCxB7wgFS/I59+BB+Cb78vJgewvgcVGZ/jvFU5hUbuiiFzkk/Lv4mYVM3Jxa5xTRsGd197vquYDRbhkiiT5RUDY98X1ftS4Ts0k/CPaUwk9Fd3odbcW6O1j8mVg== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; To: devel@lists.libvirt.org Subject: [PATCH 2/4] qemu: Implement pluggable-device smmuv3 Date: Wed, 19 Nov 2025 17:42:41 -0800 Message-ID: <20251120014243.2678797-3-nathanc@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120014243.2678797-1-nathanc@nvidia.com> References: <20251120014243.2678797-1-nathanc@nvidia.com> Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: SJ0P220CA0001.NAMP220.PROD.OUTLOOK.COM (2603:10b6:a03:41b::7) To SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN7SPRMB0025:EE_|DS0PR12MB7826:EE_ X-MS-Office365-Filtering-Correlation-Id: 1521594a-0fe0-4c5a-17db-08de27d61ba0 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|366016|376014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?HzJ0xRn7vp6OTyijKnE+tQFxJ+f6qeAN0BaxDnDnvb4tibL6R1grbv7xA8K2?= =?us-ascii?Q?7xmemqpnCDmxviQx8gKmRcgInaYeN5VIOiWrPgFJdjBztKGzuCUKSZ61cBb5?= =?us-ascii?Q?hdKas7qikAUkxgcLfn4RsAoim9L2UbN2RkxRZ2EGDXYRYymhU9czQ6C496UV?= =?us-ascii?Q?jXSI5KhXqwxAW/Qn35nw0IiHe6SyNaOYVS6EOAdwHlwsqCLXAmIE1p9harqk?= =?us-ascii?Q?fpudJF7iECKAcxeGRr5bExmxEwrx288RIgGp2i2MUHM0hvVvdV72EeMqsu+O?= =?us-ascii?Q?USB58LWZBQ6LWNVoJyJy+8J7bc2w4oaxL88KF9mtKwRYZmjSSRPuu+DOWmU9?= =?us-ascii?Q?IMOl+kSeiGZtfjQN/gJpB31wkv/T0+SdDxIwYSdJgO9ry3dSMfUsjJ7HJ2jP?= =?us-ascii?Q?Sy5dS+wRDAK8e38z7fC6Nx5/WeHQSxsbQDGh8pjb2z6c0zymJVrpN+9rnpSy?= =?us-ascii?Q?FoClRVbhW7u77s2p/1Htbkgxq6rJeYxC9bFNgFttN1pn4pKz33FgwuP0/IoM?= =?us-ascii?Q?4qF6lDaltKpR6L6M+eLljBT5ASdFKXmadEJHGQqh/ifhL0DHf5PSYSQgm1Sb?= =?us-ascii?Q?UBK6H/6ze5rYPRW5UKEBj/DxwtfGKT+tE0hE+TyL9iXA/Pc0oAilJcnuqch8?= =?us-ascii?Q?G7XfbPfHim6N1vTdOliEmxieDjkYrWKXeKxPTUWfdJNiOKhNM8hN6deDNO+k?= =?us-ascii?Q?OCnyaPVdqSod7wYG2WP7acfqJjXv0WSGtnPpNoH557eZ9vpW/eNvpjaEKCu8?= =?us-ascii?Q?xYwotB70Ye74nTxY+jLgzDst4172ozEFyj+v7wEMaYt0zeGRnsz5XQfm99mZ?= =?us-ascii?Q?fNlGAuRAL7LVAZeRPUYM3vWKvq3KFop8U7IbbG8BydSWM7o08j4ny7T4NufN?= =?us-ascii?Q?BJwKHJQKjDZxt0lw1LgpokwGZYN+fkiTxsmmyBS1GBCgwjjemDddgy7s3xgj?= =?us-ascii?Q?R2rpD3BYqSvX6enYQFEE7STB2c7JJ137cIrLQ6kSe2nnTSTCf4Y3VJgbypB9?= =?us-ascii?Q?5g5WIdIWOUJaeLWFW5WjI19ibHGECmHh3dB7XXB8hADILsoARt1vI820L+jn?= =?us-ascii?Q?yMsICKqvh7NkR/JmHvwe0mvgYQSoyJBBngk5nE1Vy+T2TCLYgaGaifGI2CFV?= =?us-ascii?Q?CEXwtUMuggpa7j9dYop7/f3JUaLbSauNwF0s6PMyaDgx4zk8OtAnndpjqKsv?= =?us-ascii?Q?19x22cKAlhqZ5vEiIv/1vn/FpnWPB25YpRtq+z5A3MNsOX5ZB5dJgm1z8a5e?= =?us-ascii?Q?I4dZmFanb7L2aerDHz1jQn+kHR0xnRb4GTQ6FL15iNlgs6O2Z2j5X0cUVPKH?= =?us-ascii?Q?wV2OjUa/Cy1FhE4PfjSqPU39eAv7pA+Au1eusgiknJh7K9RYay8LSNyTldQS?= =?us-ascii?Q?QueOjJgWNwPn2LvH4Gg5z1R2FA7dZqEob1+HdXQcmcv3uMTT2GCZhRkLcQwu?= =?us-ascii?Q?kxkTfrMuiCBrBkeaoBpEslWvLsoUGQtm?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN7SPRMB0025.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?D9hipPT53Rnm/v+7dp2biB1nAwrVpDglOR8F8XXf7lMPtr8jh+WXjnUT9C9X?= =?us-ascii?Q?QtNJgBaC1ptFP6/3NVI5e39++hGzKgsscTl59w70ciueX6Xu6F440UyBzlvE?= =?us-ascii?Q?ZKx8xC97pwGZaUt2Ly7cwqIa5yGzJsYhIzJUf65HoHE+xXbvflNbHGE1o4o/?= =?us-ascii?Q?6DjHWwr368CZEj17UD2SwJQ5YaUXwwMh2+zrrt4sUz/lRLS7UzXolMUxunQF?= =?us-ascii?Q?olduD+DJ2me4SyayL2bCblatqAwdmilVxiOvaAOgqSL3mPYBnn8Xlh2CEFCL?= =?us-ascii?Q?HYSpXxPP2C+Pf6Trqc5sSa1y0SUoXIxDi/MgGiqc9Z3oUKpqRFqtDBSfkj2M?= =?us-ascii?Q?yd/HS3JcDwwpmnNXzTf/48JwEMnfaXPdenmTSZ49hYgEocqzJgqQyfDNHizr?= =?us-ascii?Q?NTkbT5oDevMz36+iPNGSK+EpBz9OwErYPke5S1mf/2rdpIipGah1hS9aRXvp?= =?us-ascii?Q?o3O326wXImwLGCKh0JzjjNCKvAyfK5Mfqp0Y9JuvPQGE0JjBtJUkDDDLH90e?= =?us-ascii?Q?nAr1EZt0TbVA+/wWyk9biucQUS7oHb+RAr9RW8ZctACI7LOdU8v64bt97sHd?= =?us-ascii?Q?SIws3fXMiMnb3y0vVZ+gfLW/lrbDO+Q6ET8IRl/oWNbUPRm+6j/k457bzKbg?= =?us-ascii?Q?Q2geFRavqog+EfAmj7gfWhvXcLJttJOa6QFMAwQchoGevGY4Arbmndnowz3i?= =?us-ascii?Q?krN01a+lVi4SUUVDTc+2e1qUj2lHwCQH4Xz7hY+MmeobxIUOg1izRGLI+nMX?= =?us-ascii?Q?pa5Mf0O13flrQRn7NlNuf4iwxm/fWz5zxngkM+c+uP1W+ygm1HBGDiNYc2JK?= =?us-ascii?Q?XTx6MxgC6MFhzgjNYbP89ihpW91qmQxE8vzO0kJpI1KLePx0gn5HC5t1WxCQ?= =?us-ascii?Q?JKtOZ3Z8NRoUS1S2R6a2xnMQIolvMbb9tOoOa4cSW9xNYxyywHAqSrwrk6d2?= =?us-ascii?Q?ayvujmrpJawBAjPdkXAvcsbB+ReWcCqM4UytPH7dH6Xahs3pxlcQr9opTYUO?= =?us-ascii?Q?h+Edxm3qJFYTvuSvRzIcOJeSy2J3ZJ1wQVN+QQuy5sNIX/A401fYbG2PmeNa?= =?us-ascii?Q?YLb+b2AqbXDCP8ohRg1eiUlJm44vtd03KwnwjJZP8qvpj0lu1Vcg4K6HqxCd?= =?us-ascii?Q?w2aBrOU4ES7lHzJ+slFTVHwuu9f1DdPm3QihJHDKtPiWD4EkKgydrlV0V07o?= =?us-ascii?Q?+y7HSaEUmXaPowa1NGB2D6aUEQQ6P4E7HQYGQYcIHztLmWYATnKdCNN+UQdc?= =?us-ascii?Q?7Jr86iT+6Q5xtTECB4/H03uGv0Xii909v2xQsP6n+TnDDaHPZ9G+fpl5ZQ1d?= =?us-ascii?Q?P86+Gfpqg6GlFyenIODB0jmRRCsZ4a4DNLwTSWJTJJgh97Yz7BpaxXF4UE4E?= =?us-ascii?Q?n+3F35c4X9kBClfX3YChZdOGOs2IuFw21bBSDXErnIkKYtCvSfV2I4gfnqQ8?= =?us-ascii?Q?m33NqV8Vh6VYR4ehG2hIwPar4AdRNGnJ75nELVtgv6iFv1ljyfrAhB+mZz67?= =?us-ascii?Q?zkYWLKHNrBoE5u3lcMffeWkfwXIXwc4sxkw9NkrWbRPwPAStaZXTibu29TJy?= =?us-ascii?Q?63egT90u7kDLE+1i/9G02lZkQDefQRdV8rF5FUHy?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1521594a-0fe0-4c5a-17db-08de27d61ba0 X-MS-Exchange-CrossTenant-AuthSource: SN7SPRMB0025.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Nov 2025 01:42:47.3810 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: mziC0eD5H/UEmFGcAAf31IeNDw4OH2px8ShR6t4aFRmHTuKyJowWMEH2aGelBTKilFoKzhB7yLrhP4sFWuPagw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB7826 Message-ID-Hash: T55A5XGZNJKKNXWYB4MOIFTPPHHNDIXJ X-Message-ID-Hash: T55A5XGZNJKKNXWYB4MOIFTPPHHNDIXJ X-MailFrom: nathanc@nvidia.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; header-match-devel.lists.libvirt.org-0; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: skolothumtho@nvidia.com, nicolinc@nvidia.com, nathanc@nvidia.com, mochs@nvidia.com X-Mailman-Version: 3.3.10 Precedence: list List-Id: Development discussions about the libvirt library & tools Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: From: Nathan Chen via Devel Reply-To: Nathan Chen X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZM-MESSAGEID: 1763603267741019100 Content-Type: text/plain; charset="utf-8" Introduce support for "pciBus" driver attribute for "smmuv3" IOMMU model. The "pciBus" attribute indicates the index of the controller that a smmuv3 IOMMU device is attached to, and differentiates the device-pluggable arm-smmuv3 model from the virt-machine-associated smmuv3 model. Signed-off-by: Nathan Chen Reviewed-by: J=C3=A1n Tomko --- docs/formatdomain.rst | 4 +++ src/conf/domain_conf.c | 16 +++++++++ src/conf/domain_conf.h | 1 + src/conf/domain_validate.c | 28 +++++++++++++-- src/conf/schemas/domaincommon.rng | 5 +++ src/qemu/qemu_command.c | 58 +++++++++++++++++++++++++++++-- 6 files changed, 106 insertions(+), 6 deletions(-) diff --git a/docs/formatdomain.rst b/docs/formatdomain.rst index c6d0b183d0..160e7ad9c7 100644 --- a/docs/formatdomain.rst +++ b/docs/formatdomain.rst @@ -9238,6 +9238,10 @@ Example: Enable x2APIC mode. Useful for higher number of guest CPUs. :since:`Since 11.5.0` (QEMU/KVM and ``amd`` model only) =20 + ``pciBus`` + The ``pciBus`` attribute notes the index of the controller that an + IOMMU device is attached to. (QEMU/KVM and ``smmuv3`` model only) + The ``virtio`` IOMMU devices can further have ``address`` element as descr= ibed in `Device addresses`_ (address has to by type of ``pci``). =20 diff --git a/src/conf/domain_conf.c b/src/conf/domain_conf.c index 0c7a32b03c..af9c4cc39b 100644 --- a/src/conf/domain_conf.c +++ b/src/conf/domain_conf.c @@ -2815,6 +2815,8 @@ virDomainIOMMUDefNew(void) =20 iommu =3D g_new0(virDomainIOMMUDef, 1); =20 + iommu->pci_bus =3D -1; + return g_steal_pointer(&iommu); } =20 @@ -14497,6 +14499,10 @@ virDomainIOMMUDefParseXML(virDomainXMLOption *xmlo= pt, if (virXMLPropTristateSwitch(driver, "passthrough", VIR_XML_PROP_N= ONE, &iommu->pt) < 0) return NULL; + + if (virXMLPropInt(driver, "pciBus", 10, VIR_XML_PROP_NONE, + &iommu->pci_bus, -1) < 0) + return NULL; } =20 if (virDomainDeviceInfoParseXML(xmlopt, node, ctxt, @@ -22223,6 +22229,12 @@ virDomainIOMMUDefCheckABIStability(virDomainIOMMUD= ef *src, dst->aw_bits, src->aw_bits); return false; } + if (src->pci_bus !=3D dst->pci_bus) { + virReportError(VIR_ERR_CONFIG_UNSUPPORTED, + _("Target domain IOMMU device pci_bus value '%1$d' = does not match source '%2$d'"), + dst->pci_bus, src->pci_bus); + return false; + } if (src->dma_translation !=3D dst->dma_translation) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, _("Target domain IOMMU device dma translation '%1$s= ' does not match source '%2$s'"), @@ -28554,6 +28566,10 @@ virDomainIOMMUDefFormat(virBuffer *buf, virBufferAsprintf(&driverAttrBuf, " xtsup=3D'%s'", virTristateSwitchTypeToString(iommu->xtsup)); } + if (iommu->pci_bus >=3D 0) { + virBufferAsprintf(&driverAttrBuf, " pciBus=3D'%d'", + iommu->pci_bus); + } =20 virXMLFormatElement(&childBuf, "driver", &driverAttrBuf, NULL); =20 diff --git a/src/conf/domain_conf.h b/src/conf/domain_conf.h index 6aa716b907..4c78589c9e 100644 --- a/src/conf/domain_conf.h +++ b/src/conf/domain_conf.h @@ -3055,6 +3055,7 @@ struct _virDomainIOMMUDef { virTristateSwitch eim; virTristateSwitch iotlb; unsigned int aw_bits; + int pci_bus; virDomainDeviceInfo info; virTristateSwitch dma_translation; virTristateSwitch xtsup; diff --git a/src/conf/domain_validate.c b/src/conf/domain_validate.c index 3339fc83e0..8bbea5f000 100644 --- a/src/conf/domain_validate.c +++ b/src/conf/domain_validate.c @@ -1853,6 +1853,11 @@ virDomainDefIOMMUValidate(const virDomainDef *def) _("IOMMU model smmuv3 must be specified for mul= tiple IOMMU definitions")); } =20 + if (def->niommus > 1 && iommu->pci_bus < 0) { + virReportError(VIR_ERR_XML_ERROR, "%s", + _("device-pluggable IOMMU with pciBus attribute= must be specified for multiple IOMMU definitions")); + } + if (iommu->intremap =3D=3D VIR_TRISTATE_SWITCH_ON && def->features[VIR_DOMAIN_FEATURE_IOAPIC] !=3D VIR_DOMAIN_IOAPI= C_QEMU) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s", @@ -3107,13 +3112,28 @@ virDomainIOMMUDefValidate(const virDomainIOMMUDef *= iommu) { switch (iommu->model) { case VIR_DOMAIN_IOMMU_MODEL_SMMUV3: + if (iommu->intremap !=3D VIR_TRISTATE_SWITCH_ABSENT || + iommu->caching_mode !=3D VIR_TRISTATE_SWITCH_ABSENT || + iommu->eim !=3D VIR_TRISTATE_SWITCH_ABSENT || + iommu->iotlb !=3D VIR_TRISTATE_SWITCH_ABSENT || + iommu->aw_bits !=3D 0 || + iommu->dma_translation !=3D VIR_TRISTATE_SWITCH_ABSENT || + iommu->xtsup !=3D VIR_TRISTATE_SWITCH_ABSENT || + iommu->pt !=3D VIR_TRISTATE_SWITCH_ABSENT) { + virReportError(VIR_ERR_XML_ERROR, + _("iommu model '%1$s' doesn't support some addi= tional attributes"), + virDomainIOMMUModelTypeToString(iommu->model)); + return -1; + } + break; case VIR_DOMAIN_IOMMU_MODEL_VIRTIO: if (iommu->intremap !=3D VIR_TRISTATE_SWITCH_ABSENT || iommu->caching_mode !=3D VIR_TRISTATE_SWITCH_ABSENT || iommu->eim !=3D VIR_TRISTATE_SWITCH_ABSENT || iommu->iotlb !=3D VIR_TRISTATE_SWITCH_ABSENT || iommu->aw_bits !=3D 0 || - iommu->dma_translation !=3D VIR_TRISTATE_SWITCH_ABSENT) { + iommu->dma_translation !=3D VIR_TRISTATE_SWITCH_ABSENT || + iommu->pci_bus >=3D 0) { virReportError(VIR_ERR_XML_ERROR, _("iommu model '%1$s' doesn't support additiona= l attributes"), virDomainIOMMUModelTypeToString(iommu->model)); @@ -3125,7 +3145,8 @@ virDomainIOMMUDefValidate(const virDomainIOMMUDef *io= mmu) if (iommu->caching_mode !=3D VIR_TRISTATE_SWITCH_ABSENT || iommu->eim !=3D VIR_TRISTATE_SWITCH_ABSENT || iommu->aw_bits !=3D 0 || - iommu->dma_translation !=3D VIR_TRISTATE_SWITCH_ABSENT) { + iommu->dma_translation !=3D VIR_TRISTATE_SWITCH_ABSENT || + iommu->pci_bus >=3D 0) { virReportError(VIR_ERR_XML_ERROR, _("iommu model '%1$s' doesn't support some addi= tional attributes"), virDomainIOMMUModelTypeToString(iommu->model)); @@ -3135,7 +3156,8 @@ virDomainIOMMUDefValidate(const virDomainIOMMUDef *io= mmu) =20 case VIR_DOMAIN_IOMMU_MODEL_INTEL: if (iommu->pt !=3D VIR_TRISTATE_SWITCH_ABSENT || - iommu->xtsup !=3D VIR_TRISTATE_SWITCH_ABSENT) { + iommu->xtsup !=3D VIR_TRISTATE_SWITCH_ABSENT || + iommu->pci_bus >=3D 0) { virReportError(VIR_ERR_XML_ERROR, _("iommu model '%1$s' doesn't support some addi= tional attributes"), virDomainIOMMUModelTypeToString(iommu->model)); diff --git a/src/conf/schemas/domaincommon.rng b/src/conf/schemas/domaincom= mon.rng index ae3fa95904..9afc679258 100644 --- a/src/conf/schemas/domaincommon.rng +++ b/src/conf/schemas/domaincommon.rng @@ -6322,6 +6322,11 @@ + + + + + diff --git a/src/qemu/qemu_command.c b/src/qemu/qemu_command.c index 9c8330645b..16521bb4e5 100644 --- a/src/qemu/qemu_command.c +++ b/src/qemu/qemu_command.c @@ -6239,6 +6239,51 @@ qemuBuildBootCommandLine(virCommand *cmd, } =20 =20 +static virJSONValue * +qemuBuildPCINestedSmmuv3DevProps(const virDomainDef *def, + const virDomainIOMMUDef *iommu, + size_t id) +{ + g_autoptr(virJSONValue) props =3D NULL; + g_autofree char *bus =3D NULL; + g_autofree char *smmuv3_id =3D NULL; + size_t i; + + for (i =3D 0; i < def->ncontrollers; i++) { + virDomainControllerDef *cont =3D def->controllers[i]; + if (cont->idx =3D=3D iommu->pci_bus) { + if (cont->type =3D=3D VIR_DOMAIN_CONTROLLER_TYPE_PCI) { + const char *alias =3D cont->info.alias; + + if (!alias) { + return NULL; + } else { + bus =3D g_strdup(alias); + } + break; + } + } + } + + if (!bus) { + virReportError(VIR_ERR_INTERNAL_ERROR, "%s", + _("Could not find a suitable controller for smmuv3= .")); + return NULL; + } + + smmuv3_id =3D g_strdup_printf("smmuv3.%zu", id); + + if (virJSONValueObjectAdd(&props, + "s:driver", "arm-smmuv3", + "s:primary-bus", bus, + "s:id", smmuv3_id, + NULL) < 0) + return NULL; + + return g_steal_pointer(&props); +} + + static int qemuBuildIOMMUCommandLine(virCommand *cmd, const virDomainDef *def, @@ -6268,6 +6313,7 @@ qemuBuildIOMMUCommandLine(virCommand *cmd, return -1; =20 break; + case VIR_DOMAIN_IOMMU_MODEL_VIRTIO: if (virJSONValueObjectAdd(&props, "s:driver", "virtio-iommu", @@ -6283,9 +6329,6 @@ qemuBuildIOMMUCommandLine(virCommand *cmd, return -1; =20 break; - case VIR_DOMAIN_IOMMU_MODEL_SMMUV3: - /* There is no -device for SMMUv3, so nothing to be done here = */ - break; =20 case VIR_DOMAIN_IOMMU_MODEL_AMD: if (virJSONValueObjectAdd(&wrapperProps, @@ -6315,6 +6358,15 @@ qemuBuildIOMMUCommandLine(virCommand *cmd, =20 break; =20 + case VIR_DOMAIN_IOMMU_MODEL_SMMUV3: + if (iommu->pci_bus >=3D 0) { + if (!(props =3D qemuBuildPCINestedSmmuv3DevProps(def, iomm= u, i))) + return -1; + if (qemuBuildDeviceCommandlineFromJSON(cmd, props, def, qe= muCaps) < 0) + return -1; + } + break; + case VIR_DOMAIN_IOMMU_MODEL_LAST: default: virReportEnumRangeError(virDomainIOMMUModel, iommu->model); --=20 2.43.0 From nobody Fri Nov 21 10:01:45 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) client-ip=8.43.85.245; envelope-from=devel-bounces@lists.libvirt.org; helo=lists.libvirt.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) smtp.mailfrom=devel-bounces@lists.libvirt.org; arc=fail (Bad Signature); dmarc=pass(p=reject dis=none) header.from=lists.libvirt.org Return-Path: Received: from lists.libvirt.org (lists.libvirt.org [8.43.85.245]) by mx.zohomail.com with SMTPS id 1763603322972970.2798553467729; Wed, 19 Nov 2025 17:48:42 -0800 (PST) Received: by lists.libvirt.org (Postfix, from userid 993) id 76AF7440DA; Wed, 19 Nov 2025 20:48:42 -0500 (EST) Received: from [172.19.199.50] (lists.libvirt.org [8.43.85.245]) by lists.libvirt.org (Postfix) with ESMTP id 2A28244072; Wed, 19 Nov 2025 20:46:27 -0500 (EST) Received: by lists.libvirt.org (Postfix, from userid 993) id ED59C43FC5; Wed, 19 Nov 2025 20:42:52 -0500 (EST) Received: from PH8PR06CU001.outbound.protection.outlook.com (mail-westus3azon11012008.outbound.protection.outlook.com [40.107.209.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (3072 bits)) (No client certificate requested) by lists.libvirt.org (Postfix) with ESMTPS id 2136F43FC3 for ; Wed, 19 Nov 2025 20:42:51 -0500 (EST) Received: from SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) by DS0PR12MB7826.namprd12.prod.outlook.com (2603:10b6:8:148::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9343.10; Thu, 20 Nov 2025 01:42:48 +0000 Received: from SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd]) by SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd%6]) with mapi id 15.20.9343.009; Thu, 20 Nov 2025 01:42:48 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-26) on lists.libvirt.org X-Spam-Level: X-Spam-Status: No, score=-5.0 required=5.0 tests=ARC_SIGNED,ARC_VALID,BAYES_00, DKIM_INVALID,DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED, RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_PASS autolearn=unavailable autolearn_force=no version=4.0.1 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=XrVOpz/20MhtWyHqfGHsk4vXQyA4Kpo1PZwNzfr2oCKZdOI6NbWPhuml4hmM4se53BSDkVeS1IH9wjGrp5we1HEeBBc3+j+JalaFP+bWuScEMW7/5gvjeIeqleGxqzUk5tbEDZ1fbphxaIaGQJ5PwHcoM0OrCEgZn1EJUM+GBjAVu5+D+V/5A6JhYNK3vkKZRWalgsI0T0zh6pmKPpYzbsjHKgzn9CoxoD9RKPAiCVTTaiDZxtQHsusu4ek+JVi++PhTlQWgryJPOlPxGC/jk+7IIiBJ9rF1/Wp/IB3xmXf594mqgTzZ5MS44hkAfDseQm64Iwe/ZxXyHbKeVyYiYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=G/S+88yhD/qhB4t175tP/wIzy900xpqxAhgz6XF5YMI=; b=tcIXinwTYPpDH5rChvdnR3m08jLQ7gM6nkJ2BJokNS+YE+6HqHZqtRcNIasKVvczhvP+fSwsjwbzy5O00G+Q6YzKqg4C9vYr2BSqnuUk5ECxH/QfD6Nkh2w/OLyFVt4n6obiPO0Yvjn/Ecu0akIqPeiEggRQ2ozhmLRakde40e3atuK01o5LNXUWRKBk3hD1U0/axDADe+i6Y7GRMIFZnTmy4KEgB7p89/x9olJ5c+0KKlqNbeIgFhJ0WX7nWmSstWT6t7Mszcq6C4J7yE+ougRyc/PooOMssvmS9jMToGsk3jQlnXrVFq1X/fiIn+402YF9E0qpUB617BMF67ydOQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=G/S+88yhD/qhB4t175tP/wIzy900xpqxAhgz6XF5YMI=; b=Y1/LybX63PdxVggapcPTZ/FRWm7xclFY9ess06KaqpEVBSfhARVABeulRRSgs82Udma4ZM0t/XE434ssr0G3guEkwx3HEvszQEI+TfH+7Fq1vLnIHDziHEgqeIeDbN7DDhi0Q7XomErFxLXpCq9SQTsgks+IJfe1PpKKiYwM9AL1yp/bU5K00VR/UWKWXLGVB6DwOMLeniDCymLPL2xPftoZiXjPLR/LgH1ofgvbmcr0dTPnvZtF21Vo/X8BJp9LTAPH/PhtkhkAvEHfWJW/4l60G/bhMD6DzSd+xf4hiyRelGLR62iOqG578eNz5L/8uDeTsSI4QnbYtwi8gkB1og== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; To: devel@lists.libvirt.org Subject: [PATCH 3/4] qemu: Format IOMMU devices after controllers Date: Wed, 19 Nov 2025 17:42:42 -0800 Message-ID: <20251120014243.2678797-4-nathanc@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120014243.2678797-1-nathanc@nvidia.com> References: <20251120014243.2678797-1-nathanc@nvidia.com> Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: SJ0PR03CA0191.namprd03.prod.outlook.com (2603:10b6:a03:2ef::16) To SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN7SPRMB0025:EE_|DS0PR12MB7826:EE_ X-MS-Office365-Filtering-Correlation-Id: 28523c85-03cf-49cd-4ca1-08de27d61c4d X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|366016|376014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?5aROzoQ8jHdUqfn3xpSb1ibTHjKM/E9dX1fti1p7WWCXWLCVdpiFm7rsVCTz?= =?us-ascii?Q?Iw9d92T/Ow/17oSASqP1CLpwmOQdBdkQSuMVUJTC4gObflSI732Cg3xV0XZc?= =?us-ascii?Q?/qGNt8dk6m1u92LQY3AsdmuCINyQ7i5jVx1MC/F8iMSzW5N+5Kh+45tUbx9c?= =?us-ascii?Q?Epww4/Z+YadAD9IczMWjTbnyjRT/U40lP3CYcuwgo4AbrRgGTuRfZDnab5ly?= =?us-ascii?Q?o2dd5BYh6GdyYsSoXYjfhtNyUEs7N6851UcLTwFl0hFKe3WC2gDqIiFB4KaH?= =?us-ascii?Q?XuKNvXgm2s6Wq149C+5vsrwkZMSWgce3O1anXlPULWjeYF8kaJ90NMG6Sxt6?= =?us-ascii?Q?txO9vGx2n/6QY+L0zlPEVwm50tT7QiH9A5qzM45Wp5Y74DUkfoMr/xxIzJ12?= =?us-ascii?Q?PqbeTeVi2zlwjh5CSFV5erpn8HFEzjhQbhZyQdsZGMEu+lVWiEnDbLLGrmVm?= =?us-ascii?Q?ixCYKxZUgNxmfxEA51LkNGnSiZA0QkhmEQpNXCiEY2QLCIAd44hMzk9Y1suH?= =?us-ascii?Q?lpLaClhyvujjQQUe0v1YuKbH3pN7byQtbr+GROr1FSJawNWBzPz9nOHOKtvc?= =?us-ascii?Q?j83NPr2l2CRdh4VvVF/nwvDO/DTlzT0bjbvZt0YGrsE8t5Cp2IRO1pDOt/HP?= =?us-ascii?Q?edSZK2CMC5gB8HAnzm+y262trnZP8L/t1s5R0zWxcvzXbxVQFxwQEXDcwH3V?= =?us-ascii?Q?cX+yUSJwHS5z6+4QlZ9PYKU0sa3X1TgmIqZMNQjL984S72otr6sPGPql3cMb?= =?us-ascii?Q?7I3YoUZVGM8+HLOporZj3I/87tXMUCRO5FfwRZfF63gra/BGclnP4G9ns5Rp?= =?us-ascii?Q?G591VIwfIn9MDiDMHKfEBacdR6bP3YncDUoaVRvxqLsOkg6lpYBEslLD0W0n?= =?us-ascii?Q?mbSQ7KQyVmSN1MtNlfS6GxO1983KJyvBV0H6WespIt28KX1Iu4qjJeEOqD8S?= =?us-ascii?Q?OU+BLmXQlMal9InDJw3jRcyCEHAZgV8/OKnCCEerEKyXJF3eipuN5JNnrQKw?= =?us-ascii?Q?A38Dmza3lcpbOCzF9beNOyBmGcMnN9lWoodLEhWo75uFkr+FAto9johQO5ZA?= =?us-ascii?Q?AU4WeWnxyafCz2Ma27lgkBxKHjHAON4MKzaX4WHt10F8ZNJAg6HsweQAQF9J?= =?us-ascii?Q?qE4djn6xuHpIc6pR7ZxO+0byo7rMT81V1D//gQuxsB14XR+5dZQmQFZ60RYQ?= =?us-ascii?Q?Mw7ldkwz0E0orHmUGCWXmXZ+Am7QmIchPgjIkxVRs1ST1NQCTsoB1F8KHSPs?= =?us-ascii?Q?mxUZqQHPm4XQkUUBbOHm3wOmoDt34AcYhweR6PP4mnDysPIMGcf0+k+y2eRx?= =?us-ascii?Q?3wnL/0lMXIiIzYGvNL824fh0oatG6DX9tjtadsK3qEf6O7uD7FMCZG7ZkhWJ?= =?us-ascii?Q?kBVB+pqH7xPn1MKZgRyH7Gn3qSNRWC0W/y3/dp/cQApy3qXMD9uCyOEamQvy?= =?us-ascii?Q?HUy4spR0bYZbSUzV9c07BuJn5bC8duPU?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN7SPRMB0025.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?B8Tib0zSM9q8LiYWywzzoYtJrGFZqTwiPiiVNUCfb4yuHIqHOhQ/8BLlR0nm?= =?us-ascii?Q?xK5Bn/+zwpMQDIoRLyp0zn8L1Cx9RJOBYpK2LorBrt1c9DG5dkEcpj25vFXs?= =?us-ascii?Q?xKFF7rh4qujYr9QC72XGcjqka6ly74RI50ZgstTsQidm9bRa1WVKnx29UDKA?= =?us-ascii?Q?LL5a4piYMKmaNG+vtqU6cEoHHM2PwuRng6eT0DmzYcehNelxn0xIKDXvO/zs?= =?us-ascii?Q?TtP3MMTAbZOGYF8h1qypR07aujU52eZ0CJU6zkSmAUM/PS/mxWJb+BQ5Qkli?= =?us-ascii?Q?OAceIwn/pS5pRq5bM0IJ2uEq0vITkjWx0ZBEE7Xx12hB+wmMWQ3jFT02P1DF?= =?us-ascii?Q?4/P7ueo8dAjfJk1rLYi1wJq+nLbBzMvNydW5p1Vrp1xQvbbcSooTw9nbfVb1?= =?us-ascii?Q?WeeR2xMSEBVm/lrcuKEsoaU+2N9qmsg8OPCg2CEkldFzvJGOIo5PuzBtQ+co?= =?us-ascii?Q?qv86T9L1jaIkQaXBfuok/Ag4ytL2eYxUujNOnhXFNYHOZnSbjDTlSckJnGRl?= =?us-ascii?Q?ZSHvfT7I5AV4TVwbEM6QYm5dznUNANr16My+cSTU42FaSINamFFtQyOxepAb?= =?us-ascii?Q?SaPXzPScyKSYBk2O2HnRzOJk74caHiZNiuWtJicMczQpyX4DaJptTsAG6i7Y?= =?us-ascii?Q?vmB0DDpGz67StW+CH6v95Q1MKFQCXM4/p71W6pNV2IibbCk5YTRtWMNGGXaC?= =?us-ascii?Q?Rp6b+Gmwo8T3TzB5lIN8N1tAs8v0ZTIRgEOdpRuMpgllRgOzKZwVAIvyk4Yq?= =?us-ascii?Q?AHnAGeJikln8lJDm1kaXMR0qV/4YE0K1JiASkl92Z7T68ioZrOrv1aTtPR97?= =?us-ascii?Q?EYfYCXIc6j7l5wt5QTdEhm4xfTQnZ7k4dRSOmmmzL6LFJM4DdYr7x2CV1Tkm?= =?us-ascii?Q?CNopiaqw2Jsjq9HPtKtbsRAn56Qcoa66O/QLlzlHIWpqmorBBNo0cZu33Ww8?= =?us-ascii?Q?EV9flG4VkSA3hQoqp7Cv+s4JrVWe75uCjx1fVMZVn0Mcq+q9uwMx6Sqj6jXY?= =?us-ascii?Q?ZcZMbifD5n0GoR3FebvqrT+oZqgNWN3EzF8qq6gOrIT+WMLI/Tu8PLMAULLP?= =?us-ascii?Q?GXwpqdvBACBKqLkXAELOC+cQhT5J5MFhF6ihhmfhkQwakV19NRkdj6kT0Png?= =?us-ascii?Q?ii87XF2kU+RfWOmh3mRz1Lsqgq3cxDAPcDXa+u1kZlZTJnMJcFMVe9xjWW82?= =?us-ascii?Q?S9hRzF2AOe0VbXW673PL2tzPhPsY6RTqkeNOQGAUMzRZfZdnWVRG/uczchPs?= =?us-ascii?Q?voDStYVvN9ev1EFatOUVt1zgvRtXcq2j4il5EbtseG38VgVs3n2bYY3t/Jwj?= =?us-ascii?Q?MEV9SfrJffq4tzop+XFy3VZYDO1Samb1Kz9yS4CAZlUDA+5A3pEN3qwxcW+6?= =?us-ascii?Q?tWp4kY0/9dr1ijB+OsI8bPbhz8M4E6fyh5JdxCcHrJJi5fKmt1WytULIr5Wc?= =?us-ascii?Q?p+GynQT8aot+CpXd7sDHRQ9lsHgYP2Gv7RUyd43QUNOpHSfVOmljDeAMyIxK?= =?us-ascii?Q?iBFhPDrXojmYksnwe0v7PdoVRStZwOlsw9ji60F5Y8rLAKOAwg6Cl05W2/n0?= =?us-ascii?Q?OAu5adE4Bmn6xKTeFIp2l0/36ZaPQ2P+1CfyRe0P?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: 28523c85-03cf-49cd-4ca1-08de27d61c4d X-MS-Exchange-CrossTenant-AuthSource: SN7SPRMB0025.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Nov 2025 01:42:48.5227 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: +cJOCsEtXQ3u+fzOMhh+E53pd6cdj67nxTlz05eWSWQpI7XvosZ+pP54cfEBcEZfsf9yFp0P82MoZAm2ni/zxg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB7826 Message-ID-Hash: M2CDX7UIEPB6NMRT3HJYBBL2M3DHLCWW X-Message-ID-Hash: M2CDX7UIEPB6NMRT3HJYBBL2M3DHLCWW X-MailFrom: nathanc@nvidia.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; header-match-devel.lists.libvirt.org-0; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: skolothumtho@nvidia.com, nicolinc@nvidia.com, nathanc@nvidia.com, mochs@nvidia.com X-Mailman-Version: 3.3.10 Precedence: list List-Id: Development discussions about the libvirt library & tools Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: From: Nathan Chen via Devel Reply-To: Nathan Chen X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZM-MESSAGEID: 1763603325864018900 Content-Type: text/plain; charset="utf-8" Format qemu arguments for IOMMU devices after controllers as the multi-SMMUv3 model associates SMMUv3 devices with hostdevs by plugging them into the same controller upstream. Signed-off-by: Nathan Chen Reviewed-by: J=C3=A1n Tomko --- src/qemu/qemu_command.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/qemu/qemu_command.c b/src/qemu/qemu_command.c index 16521bb4e5..d414d6d02f 100644 --- a/src/qemu/qemu_command.c +++ b/src/qemu/qemu_command.c @@ -10871,15 +10871,15 @@ qemuBuildCommandLine(virDomainObj *vm, if (qemuBuildBootCommandLine(cmd, def) < 0) return NULL; =20 - if (qemuBuildIOMMUCommandLine(cmd, def, qemuCaps) < 0) - return NULL; - if (qemuBuildGlobalControllerCommandLine(cmd, def) < 0) return NULL; =20 if (qemuBuildControllersCommandLine(cmd, def, qemuCaps) < 0) return NULL; =20 + if (qemuBuildIOMMUCommandLine(cmd, def, qemuCaps) < 0) + return NULL; + if (qemuBuildMemoryDeviceCommandLine(cmd, cfg, def, priv) < 0) return NULL; =20 --=20 2.43.0 From nobody Fri Nov 21 10:01:45 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) client-ip=8.43.85.245; envelope-from=devel-bounces@lists.libvirt.org; helo=lists.libvirt.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of lists.libvirt.org designates 8.43.85.245 as permitted sender) smtp.mailfrom=devel-bounces@lists.libvirt.org; arc=fail (Bad Signature); dmarc=pass(p=reject dis=none) header.from=lists.libvirt.org Return-Path: Received: from lists.libvirt.org (lists.libvirt.org [8.43.85.245]) by mx.zohomail.com with SMTPS id 1763603565074260.6178036492174; Wed, 19 Nov 2025 17:52:45 -0800 (PST) Received: by lists.libvirt.org (Postfix, from userid 993) id F26323F359; Wed, 19 Nov 2025 20:52:43 -0500 (EST) Received: from [172.19.199.50] (lists.libvirt.org [8.43.85.245]) by lists.libvirt.org (Postfix) with ESMTP id 9BCE044217; Wed, 19 Nov 2025 20:46:39 -0500 (EST) Received: by lists.libvirt.org (Postfix, from userid 993) id 97C8E43FC0; Wed, 19 Nov 2025 20:42:54 -0500 (EST) Received: from PH8PR06CU001.outbound.protection.outlook.com (mail-westus3azon11012008.outbound.protection.outlook.com [40.107.209.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (3072 bits)) (No client certificate requested) by lists.libvirt.org (Postfix) with ESMTPS id 35FEE43FBF for ; Wed, 19 Nov 2025 20:42:52 -0500 (EST) Received: from SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) by DS0PR12MB7826.namprd12.prod.outlook.com (2603:10b6:8:148::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9343.10; Thu, 20 Nov 2025 01:42:49 +0000 Received: from SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd]) by SN7SPRMB0025.namprd12.prod.outlook.com ([fe80::eec4:cde6:1a24:ccdd%6]) with mapi id 15.20.9343.009; Thu, 20 Nov 2025 01:42:49 +0000 X-Spam-Checker-Version: SpamAssassin 4.0.1 (2024-03-26) on lists.libvirt.org X-Spam-Level: X-Spam-Status: No, score=-5.0 required=5.0 tests=ARC_SIGNED,ARC_VALID,BAYES_00, DKIM_INVALID,DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,RCVD_IN_VALIDITY_RPBL_BLOCKED, RCVD_IN_VALIDITY_SAFE_BLOCKED,SPF_PASS autolearn=unavailable autolearn_force=no version=4.0.1 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Sr8x4NOJfJWxPTkO3gPqVIc1sFoFZ5KfhZb58Tq8aSQwOqvo2MzgzEUQxv6oSWbIcm7T+1DkkbJxPTP4V8WToF1DYN3Xst7wnpn3fSym9KDL0mx3k0BmVmHjfskQtPo02SCycKJZyMCaf7jMcxZrW7cGPDYZ5KOnKFTgqT408pUNwqea8qzFX/9zahP1iGkZq1z1e9ooY2hVV7Qe/6GfHQuPYMalbeAZKEHnXyMwlWy28anYAAZgUeCura4CQINftBPOPYDmjuBTLf8aj8acTTcEiyK+sYGLRz+gX34le0rypWDDuboxcYUJWGwBTjVNtq2A4TzYpkhfK96wdNm87Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9raxrG11L3WTF6XVoX1IQNcim0Z07vGidEspTjiw530=; b=TxDC3vl7lXCRa+8cZ1nhhKfaM2Y8L/bkpzk6pxqOFz4YSM1WIsLLEC1Zsg9QZ3OVI2C6aTIiX9wjrzL2BpXH9pltyt3N9EXbxUXdLtmjRHXuZu8Cqe+38H3nvThZH5y+l2uhFngSs58Mn1E5RQM/+/BXDuxkwlU9HMT/cRjEwft0Ef/yeO2DoK5vEILHsVqB7uSswFCL44RKZ3IOWDNpRl49Zac4PjexbuTD+96VVKsxw9Dg5D2OMOaJIrhdUAfx2SFPzUGnKCATbY1+K/X6UpJxqMzl2EqF6mvyiidPiKltkGa59o84nRwNnRuteB4PxCCgQfyzpZom+rOOSgIKeA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9raxrG11L3WTF6XVoX1IQNcim0Z07vGidEspTjiw530=; b=rkYgNdCyfLKlFqYa0Yh8860CD8TUfO2mlETKGtboa9Sdy3+YdBNm1rIbxcA+yrBwm1zd6lb4i+7Y3f9AeInMccOUKgFQs0SlDWuaAcQ84HvCb5M6o0VvBzOOyIwJJencsswfgwI7hG8lapUXGT3fsNGN/kPJFde+VgvnYkypoH89lWrUb2yzl/kXl5ZSuUlZW9tJAhfPar0Xn/j6UzznCD5kviCIweQFfiBhZIo8+7yNGBcT6i/M4DNKdJw44yvgKtYYUU7OSYgN0dXVdjAGfT1zICbl4P+ei2IBgJgc1aCgKpbP6cslx1kPZ3WC4z0Yzani/nf7S1u1sKu1N7/DoQ== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; To: devel@lists.libvirt.org Subject: [PATCH 4/4] tests: qemuxmlconfdata: provide device-pluggable smmuv3 sample XML and CLI args Date: Wed, 19 Nov 2025 17:42:43 -0800 Message-ID: <20251120014243.2678797-5-nathanc@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251120014243.2678797-1-nathanc@nvidia.com> References: <20251120014243.2678797-1-nathanc@nvidia.com> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ClientProxiedBy: SJ0P220CA0003.NAMP220.PROD.OUTLOOK.COM (2603:10b6:a03:41b::34) To SN7SPRMB0025.namprd12.prod.outlook.com (2603:10b6:806:32f::22) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN7SPRMB0025:EE_|DS0PR12MB7826:EE_ X-MS-Office365-Filtering-Correlation-Id: cb759361-fedc-405c-9000-08de27d61d03 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|366016|376014|1800799024; X-Microsoft-Antispam-Message-Info: =?utf-8?B?c3dHZk9PN1RXK1phSGU1em9yOGRQaWdIOFhlUGdlWC9HUE5HV1AzSkRoRFMz?= =?utf-8?B?V05BVTZldkpwYWUxMTIrN29nUURLQjNvQVcwdWtRcmxlV29oOUJteUxZZVhL?= =?utf-8?B?eDBqRDRLMU9XZjRXUkdMZVI3dVBRQ1d4bTcxTmg0VEF0b3cyNGl1R3BGWEUv?= =?utf-8?B?U0ZURlIyRU92SlJyWEdPdVdDNk94c3pTdmVmVlJJRUNNMVNLWGRvRW9uampu?= =?utf-8?B?M1RURExPZXRhRmpLUlFhb3pOcjBpQVNyd1hGalA2dEdLS2xhQUxseHpyK3RB?= =?utf-8?B?NFU2ditpRGdiSnhPWmwyaTlPS3haa3FDUUc2MGk0bXZ4YzZYOVpmZHVzcDgy?= =?utf-8?B?MGpCbzRnRDlMRmFETTAwa1ozaC90ZGljRXdzZjlmdkNteUlWZTRMQ1R4UDBL?= =?utf-8?B?eGpoOFNIYU5mRTRXQ004bDNxdkZnWXlLTlgvS1hZcWkzbFhXTkNrSVd2Zy82?= =?utf-8?B?bDFrT3pSVlE3NlNrQzFMNzR3NlhvRlA3V05SQnZBdjcyRlUrZVUzU3kwamhr?= =?utf-8?B?Q2hPK1lRWVhmRncrbDhkTWpqRUtRakxmdTVXbnBUZ2x4SnAvbWJDNlBWSkNB?= =?utf-8?B?amxnZEtTa1gvRDNFcnpZeVR1MmlWc2dweXpFL2lwWVVqcGVVT0tvTHFKbWE1?= =?utf-8?B?UXRxMko4L0dHQlRIcDUrWFNuMkFsY05NTloyQUZHTFBuVml0bmhuZE1ra0dt?= =?utf-8?B?bzl3TUs2dE1oT0FqRHNIekZPVUxUcUVTR0lrQW9xREJuQmhNemhsajZubTJZ?= =?utf-8?B?T2xPZ3hsOW1XYXkxdzQvRllhSlRpc1VCSVVYeE1TYjBieHhkZDlxVEwwK2tV?= =?utf-8?B?aEJKL2NtYkl5RW5FVVhLWXc1bzRmOXhJdjc1eWdLalBlUDA4SFE1TENPS1ZJ?= =?utf-8?B?TnBWUEw0K1RvM3ZlMXJnMzczZ3ZISkN6VGErV00xbmxZUThHS1VJd25QNjFr?= =?utf-8?B?QjRhQWhTdnUzUm5uRlMwZUFHVUM5aWdKbUpacENZQkNRK2xFU3kvRkt6a0tx?= =?utf-8?B?VDFBY0cxZlllTHJib3Fpd2FKUFpES1RRanA2KzNaNk9DdzgyUlhNaVhOMUpO?= =?utf-8?B?Vm53cW01OGdndGpyb3FkV054SHpieGJGWXl3WUNRRGp1V1g5YzJVbk9xNVRm?= =?utf-8?B?eWsvVzcyUHRqN3BYR2xIWW5Fc0hER0V5Yi9odDRZc09JZ2ZWN3ZhSzlZSTRq?= =?utf-8?B?cWRVTzRqSVJ1QWhvN3paTURneTY5bWdMMU1UVnl0cFlJWHZkOXlWWnZONW1w?= =?utf-8?B?emgwSGpFa3grUWR5M2pPczk1NnpKVUJyVHZ5eVdKTW1oT1hjckFZUFdBclJS?= =?utf-8?B?UHVSTmJRRDdHZENrWlNLWkpTZkpYdzdnR2xnb2oxZWNRNjVFU2lGT0xaemRm?= =?utf-8?B?UUhzMlYvdHlYQ0doOGhVWUkxYUxGMS85aG9UejZXM2lZSUUwVGlZUXZkU1Ni?= =?utf-8?B?NUU2NUlpRTlRdXhPMXZYc3FsU3BqUTJpcW9GanZNWnVubHZZODVaY2E5eXhG?= =?utf-8?B?UVZsUzBWUUE1QWhNQktMZ3RneHN2dFVUOG5ndzNBUjJURytGaEgxempSM2di?= =?utf-8?B?OHRlWkIrUVIzVndWSGxlSnpoSUdBaG0zNFNadFUxclBINURzckRWV1JmdDdS?= =?utf-8?B?YWE3SVh4eGpWZ1RCNkptYUFudkIvZ3hWK2RHZFhPRkwzRTNrV3ltVXp3T0dW?= =?utf-8?B?UEwzZ0c2cUh4QTErSW5WUUxKY1FpNXlaRHlXWHk1YWJoVS95Wlc1NkdTYkVm?= =?utf-8?B?WC9kLzBqTlNzOUEvM0o0QU5INGp6NWNZdUN1dDZqNVNIWkU4dDd3eUtNcmFN?= =?utf-8?B?Smd0TWFFTGdtREQzTElZay8zcXB6QzdBQU0xcHp0NWRoaHV1MWxJaHRJWHor?= =?utf-8?B?eWZnRTdzQ1pXYnh5bEZZNUQrdVlEa051aFNjdWZrTmtUYUlFekxHMTh4UVFT?= =?utf-8?Q?Vum7KxJDMrhk562wW3uAd+O5S0YG6Qks?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN7SPRMB0025.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RlQ5QmxsWHh5ZTAxRUVUZFUrVDRJK24wdFhkY003NTMzUGIrR205cWxFOGpv?= =?utf-8?B?TWtuR3MxNzIwOCtEemNOTlA5QXZ1MkRTaXc1Y3F1eUV3YVIwRmc1Zy9Ta1FC?= =?utf-8?B?UmxvUnRteS90UndiRy9USEpSOHFJTkR1VGVNNzBUVEZPc3MxUzR6YjIwVzVU?= =?utf-8?B?aHhocnkxYk1xekFwNTBTdVZmeFhMUzcvSTAzVUF6WGZOU1B6dnFYK0hBT1dH?= =?utf-8?B?Vnk1Y2dEV2dFYVBSS1pHWmZ2TVhrVXZOa3RHbjE1RkFneEM5Z3ZwTW9SdmZP?= =?utf-8?B?bG8xYlNsZnRWMWt1RjhJZEFDb014K0MwWHIvVjhLVjVvMFVWUk11aTNhOVlY?= =?utf-8?B?cm9qMWlYQWh4M2oybzA1MFNXeTN0ZWplN0djUVVnSnFhTTdiaFVjOG5SK0ds?= =?utf-8?B?WW96cFVxRndOMUVwUGYxRzU0QlJlaVJOWFRLUWJ3Y2xTRU5Ld3J0eDhvVnRQ?= =?utf-8?B?M3N0NlBSK3M2bDNEWGlobEF3VklrZjRuQnA3ek5CK3BlU0k5T2tmd0ZoTUNQ?= =?utf-8?B?TWxIeWV2QUtTaGdPdU1OWk1CZzdxUWM0eEJSeHBVYUsxMHhwb0JVM0ZXYmFI?= =?utf-8?B?Z1E5VnVOdUYyYjgwV2swTEdsUm9NZTE4Rm80MVhWdHpMSUN2QTlpMEUzT1Ex?= =?utf-8?B?cUVuWjlsb1NEakdRUiszcW5TMU55VDYrYnN2RG1NMDFCenlxTEdkTFRYQXdp?= =?utf-8?B?MDBPQnBRK21POURxYUVCVUZVM0JHVWFVeXdZdmlDbmtEcVdCOFRDU0h4NjUr?= =?utf-8?B?Tlh4ZndtK3lKMCt4Vll5Szd4WXA1Z1VnbWtLK3cyL1ZvdUpJSFJZbW8rU2Nm?= =?utf-8?B?OVRiTWFCV3ZzQWxSK29uTjUwU1JLYlRKME1NMWhFSmpaVnlMcVh4WjV2ZVQz?= =?utf-8?B?SldpRnJTZ3F3d0ZUMFVUVk5qNzZRUmNCUmI1YXRLdmhTQjYxT0tURXViTzBW?= =?utf-8?B?Z1lITlQxL2JpbmF6NFFBWW5rMm0wejNDMmlRUEEyM2tSckFtY3hZU201U3FD?= =?utf-8?B?bzFFdDZZTVlrbzZCM0wyaWpyVW9wc1hCSkY5aVRCUEk1MXQvbFEwMjY0MG16?= =?utf-8?B?R0I1OGpOY3Y4RTl3QWZBU3dyejRYYWdZNUdhUXpkZW5GQ1M5aDd5S0NBUlA3?= =?utf-8?B?d3JBc0VHcUpGZ3ZYck1Gck1vaEhublhINkFBVlFXeFRaY0IzQ3J2NEF4eVlN?= =?utf-8?B?Y01qck1lYTZrcVhHWHlycXlodytCUjAvNTNsTGl4K3JJQ09rRkFKbTdnR2hl?= =?utf-8?B?T3BTTmRrV0RHV1gzRWdtVnNTVTVvd1VFNTUvc1hDZmZ3cElLOXBDVzhnNXBo?= =?utf-8?B?TWJEOU1MQ2ZUVVQzL2syN0dDYWJndjJhOElNK0JHelpMaFFIaEVZMHpsUUdj?= =?utf-8?B?eWM3QmgyVmdjOFpOYzh1bWRndzVUVmsvZExxMEhGMTRqeFdyTTlOdExRajV4?= =?utf-8?B?Z3JpZjgySG10VDNXUkE1RGF3YVZGMSsrM0N0M2F2SENnb1NoNlJjblYvRzhG?= =?utf-8?B?VzcyRm9TTjhWb1RrWE5wMWRHQVd1M0FROHVoMEp4REhLN3NjN1Q3STJKV1BO?= =?utf-8?B?TExkREc3T1R2WFVnalJiNFV4Qkw3QnNXRzV3UEt0VWl6UE5ORG9LeWhVTW1P?= =?utf-8?B?YWRGR0hMQmJuVlA2UTFIUEtYZk41NzUrY1JiRllhZmMwbWhnTlZEWi9LSGJ4?= =?utf-8?B?RHlqdnBKS25pNVJpWmpUR0VUL2lOMWdSRGFQTEhHd2FOcG05MUYxMlpGVndy?= =?utf-8?B?Umx2QktNbHZ1dXBZaWtRT0ZEb1Y5cUxUbzVQZUxKVVpXWUQvM1psNXNQN0w2?= =?utf-8?B?ZjB4SU5UbWpTMWJpMkNUb1pCQ0FaSFJxejJtSjd3WFVWdTdyWWl6SWxvdGxW?= =?utf-8?B?QzhCMGxreTdyNEsxWmxHOXBXS1J3cWFsVE16SlI1YnFadHU4VnQzUmJlbldL?= =?utf-8?B?NXA4NlFWZlRFeXdPblRnUDV3WGVHdnRNUGZMK21WTG9GODUvajdmUWhSYUFF?= =?utf-8?B?UmFpR3hlL2dSVkxuU0lldWk4QkJ3Mkc0bXl6VXBiajJLR1hqZjlNd3huMDlT?= =?utf-8?B?bFdRRDUzcTkyMGpoU0Zsb21vMEdBK3RCYmd0djFQVC9oQVFsNUU0N1YwWU9Y?= =?utf-8?Q?WdyAP459ddyqUxpC3fEliATCH?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: cb759361-fedc-405c-9000-08de27d61d03 X-MS-Exchange-CrossTenant-AuthSource: SN7SPRMB0025.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Nov 2025 01:42:49.7073 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: G+GJi3OGtiSQjUH88HrlxMrPBBkCPG7yOlBZzT/WiuRA9SC8xAYH5LyEEdnNStpeIMpp7zVsfALZGYzTkaHhJQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB7826 Message-ID-Hash: MVCFIKP3DVBVST4FGD3L3W57DJUXDZ5S X-Message-ID-Hash: MVCFIKP3DVBVST4FGD3L3W57DJUXDZ5S X-MailFrom: nathanc@nvidia.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; header-match-devel.lists.libvirt.org-0; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: skolothumtho@nvidia.com, nicolinc@nvidia.com, nathanc@nvidia.com, mochs@nvidia.com X-Mailman-Version: 3.3.10 Precedence: list List-Id: Development discussions about the libvirt library & tools Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: From: Nathan Chen via Devel Reply-To: Nathan Chen X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZM-MESSAGEID: 1763603568470019101 Provide sample XML and CLI args for the device-pluggable smmuv3 XML schema for virt machine type. Signed-off-by: Nathan Chen Reviewed-by: J=C3=A1n Tomko --- .../iommu-smmuv3-pci-bus.aarch64-latest.args | 41 ++++++++++++ .../iommu-smmuv3-pci-bus.aarch64-latest.xml | 62 +++++++++++++++++++ .../qemuxmlconfdata/iommu-smmuv3-pci-bus.xml | 49 +++++++++++++++ tests/qemuxmlconftest.c | 1 + 4 files changed, 153 insertions(+) create mode 100644 tests/qemuxmlconfdata/iommu-smmuv3-pci-bus.aarch64-late= st.args create mode 100644 tests/qemuxmlconfdata/iommu-smmuv3-pci-bus.aarch64-late= st.xml create mode 100644 tests/qemuxmlconfdata/iommu-smmuv3-pci-bus.xml diff --git a/tests/qemuxmlconfdata/iommu-smmuv3-pci-bus.aarch64-latest.args= b/tests/qemuxmlconfdata/iommu-smmuv3-pci-bus.aarch64-latest.args new file mode 100644 index 0000000000..092fcf4623 --- /dev/null +++ b/tests/qemuxmlconfdata/iommu-smmuv3-pci-bus.aarch64-latest.args @@ -0,0 +1,41 @@ +LC_ALL=3DC \ +PATH=3D/bin \ +HOME=3D/var/lib/libvirt/qemu/domain--1-guest \ +USER=3Dtest \ +LOGNAME=3Dtest \ +XDG_DATA_HOME=3D/var/lib/libvirt/qemu/domain--1-guest/.local/share \ +XDG_CACHE_HOME=3D/var/lib/libvirt/qemu/domain--1-guest/.cache \ +XDG_CONFIG_HOME=3D/var/lib/libvirt/qemu/domain--1-guest/.config \ +/usr/bin/qemu-system-aarch64 \ +-name guest=3Dguest,debug-threads=3Don \ +-S \ +-object '{"qom-type":"secret","id":"masterKey0","format":"raw","file":"/va= r/lib/libvirt/qemu/domain--1-guest/master-key.aes"}' \ +-machine virt,usb=3Doff,gic-version=3D2,dump-guest-core=3Doff,memory-backe= nd=3Dmach-virt.ram,acpi=3Doff \ +-accel tcg \ +-cpu cortex-a15 \ +-m size=3D1048576k \ +-object '{"qom-type":"memory-backend-ram","id":"mach-virt.ram","size":1073= 741824}' \ +-overcommit mem-lock=3Doff \ +-smp 1,sockets=3D1,cores=3D1,threads=3D1 \ +-uuid 1ccfd97d-5eb4-478a-bbe6-88d254c16db7 \ +-display none \ +-no-user-config \ +-nodefaults \ +-chardev socket,id=3Dcharmonitor,fd=3D1729,server=3Don,wait=3Doff \ +-mon chardev=3Dcharmonitor,id=3Dmonitor,mode=3Dcontrol \ +-rtc base=3Dutc \ +-no-shutdown \ +-boot strict=3Don \ +-device '{"driver":"pxb-pcie","bus_nr":252,"id":"pci.1","bus":"pcie.0","ad= dr":"0x1"}' \ +-device '{"driver":"pxb-pcie","bus_nr":248,"id":"pci.2","bus":"pcie.0","ad= dr":"0x2"}' \ +-device '{"driver":"pcie-root-port","port":0,"chassis":21,"id":"pci.3","bu= s":"pci.1","addr":"0x0"}' \ +-device '{"driver":"pcie-root-port","port":168,"chassis":22,"id":"pci.4","= bus":"pci.2","addr":"0x0"}' \ +-device '{"driver":"arm-smmuv3","primary-bus":"pci.1","id":"smmuv3.0"}' \ +-device '{"driver":"arm-smmuv3","primary-bus":"pci.2","id":"smmuv3.1"}' \ +-audiodev '{"id":"audio1","driver":"none"}' \ +-object '{"qom-type":"rng-random","id":"objrng0","filename":"/dev/urandom"= }' \ +-device '{"driver":"virtio-rng-pci","rng":"objrng0","id":"rng0","bus":"pci= .3","addr":"0x0"}' \ +-object '{"qom-type":"rng-random","id":"objrng1","filename":"/dev/urandom"= }' \ +-device '{"driver":"virtio-rng-pci","rng":"objrng1","id":"rng1","bus":"pci= .4","addr":"0x0"}' \ +-sandbox on,obsolete=3Ddeny,elevateprivileges=3Ddeny,spawn=3Ddeny,resource= control=3Ddeny \ +-msg timestamp=3Don diff --git a/tests/qemuxmlconfdata/iommu-smmuv3-pci-bus.aarch64-latest.xml = b/tests/qemuxmlconfdata/iommu-smmuv3-pci-bus.aarch64-latest.xml new file mode 100644 index 0000000000..c0618c02ab --- /dev/null +++ b/tests/qemuxmlconfdata/iommu-smmuv3-pci-bus.aarch64-latest.xml @@ -0,0 +1,62 @@ + + guest + 1ccfd97d-5eb4-478a-bbe6-88d254c16db7 + 1048576 + 1048576 + 1 + + hvm + + + + + + + cortex-a15 + + + destroy + restart + destroy + + /usr/bin/qemu-system-aarch64 + + + + + +
+ + + + +
+ + + + +
+ + + + +
+ +