From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424475; cv=pass; d=zohomail.com; s=zohoarc; b=P93OmEGeh/F0+o+ckyWDtnwzb1CC7QpVTaVfaOsABnwL9/iCkE8EPRGtrnHtKFxy68hUCz/p4qDsvVjMOlvnofLlJLscZs9aaAQOLffgDiXoyHKRUm/nQi/r3vCVFID1UXywVd/SWznBWk7rl+VtYr0IBDBoMbTb/iniF72s5mE= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424475; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=ItAZUsrNP/kQbD1XLZycfFYOYS11uWOEy8QUfDmF3zM=; b=ZjddXrie2dkk9m12mHrFCDvXlbZ1D0w4hzDJomP4IKF7ohRtn4dRBT1bLhGpHe0mHs4KhAagc+HE6nHkKJxVpstUhZ1V/1ZTAI7SVd2PQLWlFzL7vjBIxcVGK3LodvFr91HPfQQbhcpra4LvOrYo7JmPIqybhRWwVXFiJrIKKkw= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424475563967.1317048669996; Mon, 26 Jan 2026 02:47:55 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK5Z-0006z5-K5; Mon, 26 Jan 2026 05:44:57 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5X-0006yI-CG; Mon, 26 Jan 2026 05:44:55 -0500 Received: from mail-westus3azlp170100009.outbound.protection.outlook.com ([2a01:111:f403:c107::9] helo=PH7PR06CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5U-0005J2-SF; Mon, 26 Jan 2026 05:44:55 -0500 Received: from MN2PR05CA0047.namprd05.prod.outlook.com (2603:10b6:208:236::16) by PH7PR12MB7889.namprd12.prod.outlook.com (2603:10b6:510:27f::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.14; Mon, 26 Jan 2026 10:44:45 +0000 Received: from BL6PEPF0002256E.namprd02.prod.outlook.com (2603:10b6:208:236:cafe::87) by MN2PR05CA0047.outlook.office365.com (2603:10b6:208:236::16) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.7 via Frontend Transport; Mon, 26 Jan 2026 10:44:35 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF0002256E.mail.protection.outlook.com (10.167.249.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:44:45 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:29 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:25 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ILJkgNknHUPzc2rBPkAww3tmBTsM1sV9YH4md2S9r+cws7OoPJ3xGrHS+CGbMdFdZ5s3mb2E1CRRdB6FoOl7g20ts8PKoB4x4cRldFg6D7dgMYen2sIFYvVDrKgxDqiP64bAWah/0j2PXTEvOmJXjVjje4pfqStgir5aDid7Ga6YkKYYKa6CuYNzoz6nzo0MS2F4iILTpJ1a0bMt0d+WlibEqX75H9fvJmoAC32riATr9VnbGAMFi66PCJ3WKE8x30D/ftk6LA5g1R7nBMZh0cqEGNd2YusPrHx90DWEvne5I3GjnYDe9ZGJrsaal6BnWrno4xxZKaHtx5jbZTBr3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ItAZUsrNP/kQbD1XLZycfFYOYS11uWOEy8QUfDmF3zM=; b=DJLMS4kNMI6OoAWekv3dTlx2yIFM6IiWutlCjoCAypQWg8OebZaIs9ndcg/DxdyVczYL8ev88PfD0tnRXTA7XIo3aKs2o1fanWACASaPneWwyPSPYedO3sB78CEdfa5jG1mapdO6qPyS9uiVXo4KRFoxvJXMxitWKDH48NlnDb4BhEL2SxdsONBE2L1NncF1hpN+GHSSG6ds6wZJmMJAIKGQrCRbp3rPZZ5aj8CS07uj3SqdB+2zY9PE8h9BgqZC2HwgA/DuYMDmAGce880dxF4cph/iFzX3w7pqPzxwfBVLrBJhjPGlPbIP2UZGRTgMD7I/X1yFjdbp7Eu19o3YEg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ItAZUsrNP/kQbD1XLZycfFYOYS11uWOEy8QUfDmF3zM=; b=lzDZC0TySaucxUHbGhbBZllatycgKNlHirxTXNMM7QiGEOC2VBBKkyuIXFOm6AVrTZ/IFiuNzZuZN6LhG9/e+B0vcBNeX4w8FgKJY7psE1EDYtzUDTLQjQBvIgnJ2F51wrB1c/vrgyJPv+PT+8Kc8DvYvEQ4Whcx/UQsseyzHPucyW/IaYhv22385Xqw2iFnVOzfrWaeFju48RzaJ15Ndu3j6TG3/2dtHEY1qUPuoOLtFhpubrszN7et0iXClrmUhMbZoezLV507uFUBo+RsiwmFBEJLN98GFa+kdCQW9f9sSr5EQofkA24/IEpOZs1hvg5RwYgAPdpZFju+6bzAZw== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 01/37] backends/iommufd: Introduce iommufd_backend_alloc_viommu Date: Mon, 26 Jan 2026 10:42:58 +0000 Message-ID: <20260126104342.253965-2-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF0002256E:EE_|PH7PR12MB7889:EE_ X-MS-Office365-Filtering-Correlation-Id: 9f574f89-59e8-4b11-0e51-08de5cc7ebbd X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|7416014|376014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?M/YKGLpH9c/V1adJscVbIdfQ7iYG/V6Buj6iOdDPe/rXuNV2gcflkVmCfTMA?= =?us-ascii?Q?i3Qpohr44jTW/y5TogMbrMakpWqyPwzz3xYC9N8D0rn3GgaO4uM2C2OxlROC?= =?us-ascii?Q?I/wR0eQvcsOSOZdxLsOBNXAUEMsSvq+RMtHNGgJli59uHH8GRnFenJli8B21?= =?us-ascii?Q?BYuBQ/VgslqBMQGQnhsBDL/c//dVb/XZmNLc4OYjNLGo7T26ahni0cMX1CRO?= =?us-ascii?Q?AfesGjln9/FCH5wG+vRMEjZ1noh4CR+Nf433/NHrBGz7EaXJb9ktWfAuMZcr?= =?us-ascii?Q?27mvFat5d+EKU24vjsmVpq5IPoLiNAKYb6DXVzLMixX100KSMlIVQeu1rkhn?= =?us-ascii?Q?Wi0tpdLOLXlz71/ZEaWGwgILaQWqLWDzT4Omn1nafRMarJmwUSRLvqS7PXaA?= =?us-ascii?Q?HilESU+E0T/b73qTB/GIn9K0PH3az/3Tn3tJcnTxR3IZ1RyDlm8FScQxV3wX?= =?us-ascii?Q?76LwIb3XXAWfh1KXA6Wj7mwzbmYcXGinrT+m5kmO4hAWQMvk13GC1aPYvNGS?= =?us-ascii?Q?5uKi+Q5tRybVHAy+pvBTBTNP2rfYgZDUhA8i+XzAUk4dr7h3R7uATYazBYyq?= =?us-ascii?Q?7XPNtWBKcS08SyXdQvtadjEt8gVjRu+V09pMk71YR779EiMm9LedPoN2pQUf?= =?us-ascii?Q?zTQAsW1zAaCKWlvZMqUpUlrxEwrCzVRDofy106e28/QQz3ieBaOg2tIH1ZnJ?= =?us-ascii?Q?twx3GhskIlqMfKf7pR9XuAxiRag0A6/hueMlVnxwrbJDKck/8GhIRA511RYb?= =?us-ascii?Q?qhcRJ9RopG4Rt4Q+qjxWdvrzVF0KlGjZVXlJnlwAWbAG7gdNVW+K8VlUAwH1?= =?us-ascii?Q?dB7L15yldtp8Dm8ovXoXx6GjOcKb63YGze3jTL2vtINy36wNoB1Z5a19Z3ys?= =?us-ascii?Q?gaoBXEYJFUmTTVXB7tvh9uo4RFYlvsIv35gPvdgwm5m6mNuoo+o4z6PC5GnM?= =?us-ascii?Q?XADaZno2zcJNPg3ew7lK3KChg9B6Cdlaeawnh6Keek3MsiNl+mutFpn9pPhV?= =?us-ascii?Q?jkoGM9lSss3BNiFmapz/5EzUAgru4IEQbQGddde7JMCz4TLvwR8CTJX7JHv5?= =?us-ascii?Q?UURkpu6qnEWm7F0eodPGnmoX74m5kRxemRruYR8ycGIAeHVWEMlZv8ZJil1L?= =?us-ascii?Q?hxyWEMl+DDUAyEyWdRAgxy1W/ICxhUSjJgRJ3jLZk2AK38YJXesUF5UaEzvI?= =?us-ascii?Q?oY9sLCVoj5QcF5VZ3DF1YOKvE11dM00yNbpeOaQ/GQrJJmStCxOJr9k5mt8Y?= =?us-ascii?Q?DCiCFlIXcFr2sjP0Mm4WdnBaoRudgYIOKHdtguSFM/WxLCDBwxMFMJC9ay8P?= =?us-ascii?Q?l90QMEoJYz5KxXCL9FabIx+4nEoeFwcyGPsRhGoukElczd+ClDbSeeGCb2So?= =?us-ascii?Q?5eseGCjI83PtR3TSULcOQs2hIh55p0fx4OK6hg+6LFUEaP7PHJsQZI3Z3Rbe?= =?us-ascii?Q?OpWVT/4GAxVKHeMxgFrXd+X7Xqx7NJ63/xw8VjLSt5CtAtMJ+xbDZp6pjOV1?= =?us-ascii?Q?CnTDp/UG5myCSi4k7TJBVn2CQBsH/Vf8AhxhefqFteuP57LWvGxswLZRkI3l?= =?us-ascii?Q?nURNldvDfVdjyi3++H6J0STl6gfcNGyAJ0p1CMqAfyI2wDn7C0swJfYzr1xo?= =?us-ascii?Q?ugNrtIT2J134JuIKgGkKx+vJZrUn1h1+toHGZHPxvLOsjSmA/fZidsf2DKSd?= =?us-ascii?Q?0B7I4g=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(7416014)(376014)(36860700013)(1800799024); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:44:45.4564 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 9f574f89-59e8-4b11-0e51-08de5cc7ebbd X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF0002256E.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB7889 Received-SPF: permerror client-ip=2a01:111:f403:c107::9; envelope-from=skolothumtho@nvidia.com; helo=PH7PR06CU001.outbound.protection.outlook.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424475881158500 Content-Type: text/plain; charset="utf-8" From: Nicolin Chen Add a helper to allocate a viommu object. Also introduce a struct IOMMUFDViommu that can be used later by vendor IOMMU implementations. Signed-off-by: Nicolin Chen Reviewed-by: Eric Auger Reviewed-by: Jonathan Cameron Signed-off-by: Shameer Kolothum Tested-by: Zhangfei Gao Tested-by: Eric Auger Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- backends/iommufd.c | 26 ++++++++++++++++++++++++++ backends/trace-events | 1 + include/system/iommufd.h | 14 ++++++++++++++ 3 files changed, 41 insertions(+) diff --git a/backends/iommufd.c b/backends/iommufd.c index 086bd67aea..c65dc41d71 100644 --- a/backends/iommufd.c +++ b/backends/iommufd.c @@ -447,6 +447,32 @@ bool iommufd_backend_invalidate_cache(IOMMUFDBackend *= be, uint32_t id, return !ret; } =20 +bool iommufd_backend_alloc_viommu(IOMMUFDBackend *be, uint32_t dev_id, + uint32_t viommu_type, uint32_t hwpt_id, + uint32_t *out_viommu_id, Error **errp) +{ + int ret; + struct iommu_viommu_alloc alloc_viommu =3D { + .size =3D sizeof(alloc_viommu), + .type =3D viommu_type, + .dev_id =3D dev_id, + .hwpt_id =3D hwpt_id, + }; + + ret =3D ioctl(be->fd, IOMMU_VIOMMU_ALLOC, &alloc_viommu); + + trace_iommufd_backend_alloc_viommu(be->fd, dev_id, viommu_type, hwpt_i= d, + alloc_viommu.out_viommu_id, ret); + if (ret) { + error_setg_errno(errp, errno, "IOMMU_VIOMMU_ALLOC failed"); + return false; + } + + g_assert(out_viommu_id); + *out_viommu_id =3D alloc_viommu.out_viommu_id; + return true; +} + bool host_iommu_device_iommufd_attach_hwpt(HostIOMMUDeviceIOMMUFD *idev, uint32_t hwpt_id, Error **errp) { diff --git a/backends/trace-events b/backends/trace-events index e1992ba12f..1ae94c4290 100644 --- a/backends/trace-events +++ b/backends/trace-events @@ -21,3 +21,4 @@ iommufd_backend_free_id(int iommufd, uint32_t id, int ret= ) " iommufd=3D%d id=3D%d (% iommufd_backend_set_dirty(int iommufd, uint32_t hwpt_id, bool start, int r= et) " iommufd=3D%d hwpt=3D%u enable=3D%d (%d)" iommufd_backend_get_dirty_bitmap(int iommufd, uint32_t hwpt_id, uint64_t i= ova, uint64_t size, uint64_t flags, uint64_t page_size, int ret) " iommufd= =3D%d hwpt=3D%u iova=3D0x%"PRIx64" size=3D0x%"PRIx64" flags=3D0x%"PRIx64" p= age_size=3D0x%"PRIx64" (%d)" iommufd_backend_invalidate_cache(int iommufd, uint32_t id, uint32_t data_t= ype, uint32_t entry_len, uint32_t entry_num, uint32_t done_num, uint64_t da= ta_ptr, int ret) " iommufd=3D%d id=3D%u data_type=3D%u entry_len=3D%u entry= _num=3D%u done_num=3D%u data_ptr=3D0x%"PRIx64" (%d)" +iommufd_backend_alloc_viommu(int iommufd, uint32_t dev_id, uint32_t type, = uint32_t hwpt_id, uint32_t viommu_id, int ret) " iommufd=3D%d type=3D%u dev= _id=3D%u hwpt_id=3D%u viommu_id=3D%u (%d)" diff --git a/include/system/iommufd.h b/include/system/iommufd.h index 1392706b83..bc4acd1e8b 100644 --- a/include/system/iommufd.h +++ b/include/system/iommufd.h @@ -38,6 +38,16 @@ struct IOMMUFDBackend { /*< public >*/ }; =20 +/* + * Virtual IOMMU object that represents physical IOMMU's virtualization + * support + */ +typedef struct IOMMUFDViommu { + IOMMUFDBackend *iommufd; + uint32_t s2_hwpt_id; /* ID of stage 2 HWPT */ + uint32_t viommu_id; /* virtual IOMMU ID of allocated object */ +} IOMMUFDViommu; + bool iommufd_backend_connect(IOMMUFDBackend *be, Error **errp); void iommufd_backend_disconnect(IOMMUFDBackend *be); =20 @@ -59,6 +69,10 @@ bool iommufd_backend_alloc_hwpt(IOMMUFDBackend *be, uint= 32_t dev_id, uint32_t data_type, uint32_t data_len, void *data_ptr, uint32_t *out_hwpt, Error **errp); +bool iommufd_backend_alloc_viommu(IOMMUFDBackend *be, uint32_t dev_id, + uint32_t viommu_type, uint32_t hwpt_id, + uint32_t *out_hwpt, Error **errp); + bool iommufd_backend_set_dirty_tracking(IOMMUFDBackend *be, uint32_t hwpt_= id, bool start, Error **errp); bool iommufd_backend_get_dirty_bitmap(IOMMUFDBackend *be, uint32_t hwpt_id, --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424428; cv=pass; d=zohomail.com; s=zohoarc; b=ZGCMXVVtUp/DKRJuDcIPtpyHEEIw0SWQa+IJ9t+EI1/1DIRtKTB4NlAXq9ldg6pVm5E9vVR80xPNh7V7H+uFMWil9v969mRM5dBbJPdUlEtII2+LoSTEB0JJbifq7Q9svOYHjDpS0LZwiNik0H9tURrdWjmwo4pmmftnsUbAum0= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424428; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=TTIwjt1gOPpcKklu4rXxoF7zGNlWrWPuD4ZGhLf5xZs=; b=fgOoSq4SOcHPsXnBF25yrK0VJcmxx2l0ZiIrfVL+NE3so1+5G1GdyqvWTKl8EVSrM5wceESUWhhi6il3+XdQG0oZJTZo0mjQYRG++fZC2ikM5oW+0woMA54/uWnbdv8EYmIA7G3nSUVFbGSgDreOiMxz7qtF5HSnpnuDhcGQ3tY= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424428652489.1637942291303; Mon, 26 Jan 2026 02:47:08 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7B-0000I3-BU; Mon, 26 Jan 2026 05:46:37 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6Z-0007Ou-BJ; Mon, 26 Jan 2026 05:46:05 -0500 Received: from mail-westus2azlp170120002.outbound.protection.outlook.com ([2a01:111:f403:c007::2] helo=MW6PR02CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6X-0005a7-B1; Mon, 26 Jan 2026 05:45:58 -0500 Received: from BY5PR04CA0029.namprd04.prod.outlook.com (2603:10b6:a03:1d0::39) by PH7PR12MB6763.namprd12.prod.outlook.com (2603:10b6:510:1ad::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.10; Mon, 26 Jan 2026 10:44:46 +0000 Received: from SJ1PEPF000023D5.namprd21.prod.outlook.com (2603:10b6:a03:1d0:cafe::56) by BY5PR04CA0029.outlook.office365.com (2603:10b6:a03:1d0::39) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:44:43 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023D5.mail.protection.outlook.com (10.167.244.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:44:46 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:34 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:30 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=sYfLRbDF1WNni+BBUXJrnwk0Rdfu13npZlF9JWsTVbrMOEU5CX13OIF7Eyp3+iEYrFcD3jCX4JiGJt0EixnGYqnRdM4M8qStqGCmF36diclrsIkqZSX8we9vvBnDXSTrME43Gu0QdHqEvQoxjMfSur0ZvRDkG+PosjdzFH2jBcKSqEFc78IsjHvgAqMuvzaBlwU/F/Ysm7Y4g/hY3orYeeQaCg1OHKFFKh1WykLRmuLRWbKAHvkvgWAvWEx5+EXyLZnH2BglpxhwM5aUnMw4eXS8yWEEbs4yEPgtprsSyTMwa6pqo/JYNuS9uRoQvjhjYJ3v23mfXwJHWjhJydTc1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=TTIwjt1gOPpcKklu4rXxoF7zGNlWrWPuD4ZGhLf5xZs=; b=giPkC5mEBnU+xXJK/M/fVmC94mSCzmIEaO6zMlR+/Ab8dUbJZSnlKq+Ij1eTipiTpNNoWXyOUQ72dq9KmhbnmyTOKVsdDGjKj8rM2XOKBGqWu464BAv2KqpD/voKS0gTrInQicbLcoZh4kUtgssFmfW2EDHjn2mIyIwc86gt8b3EQhLnit3DiqqC6O+F7k+lBWF1BJB3zatXaS3ZjwUHNvOi/qNwu9IPnIBjp7Qcbupt8AbInCY2DA/U/o6oy19MxikopeSce5yEm41dOvuSwaqzzU8Tuvmp3Vx1OqwViepOiavTlHAtSTKKEnsr/g5NCuJ4LMOkLccnpIJmOeieng== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TTIwjt1gOPpcKklu4rXxoF7zGNlWrWPuD4ZGhLf5xZs=; b=Znfy4EIwDvfxmmhvpFwfJQbkrQIFeAxb4jIrfZppoGHzDOPKAOBhze8oPAtgRFRKv3gr+18qwFL2vAQXhsNI0km3z+6F5b4JXfU/aghQKoLcwfz0uybcpXBjg6fz5Sxj/6B0udWlzLoyAjRRuZfeCsoq7n4r2cetFkpo3qtJSzyAEwDKaTLatJf1258/dxx2gkzoLMAOfB2prmIfeJKapyyo8ygPSH9nW1m5XtLU0Tnp4N2rZzGsPxvsKBV0leP/zuFUlbOhkSCUIZ2l8/F5Dp6OyYdLlCDiOVGVSPCvvxO9gd3NKAIaj4yFW32zbCJ5VzyC8snACNZp4d9ZAfG28w== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 02/37] backends/iommufd: Introduce iommufd_backend_alloc_vdev Date: Mon, 26 Jan 2026 10:42:59 +0000 Message-ID: <20260126104342.253965-3-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023D5:EE_|PH7PR12MB6763:EE_ X-MS-Office365-Filtering-Correlation-Id: 084394ce-c806-4bd1-2f99-08de5cc7ec42 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|82310400026|1800799024|7416014|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?jZ3CcZVYHiEDhF+UWrcoxr5eWZiv+2jKywyNLNLqQvml5BTRzla15r2jwKqk?= =?us-ascii?Q?pkX1gwCgzqRMOmFI2kayi7oCEAsRPRfe4P9U8xvclps1Hwy7E4FnG1YzJQcF?= =?us-ascii?Q?N8DXrvn1ZkFkEd+lg2/IFobs7tfMDKzSFx7R86Sdn0SMR58ONQ5SVI3c6HU6?= =?us-ascii?Q?LDZpn3uAMT8Duhev9fTMR2Cuca/fkBie4tJ7B8m37IRd0Z8fHfvdeVLqhU8U?= =?us-ascii?Q?Dkx52UQgdUz0GMElFrunI0oSfU9FXVsVl6gude5y9W7U3zYC6upo0LFU4eqs?= =?us-ascii?Q?kYJSA/jKA1ceGC5s+JQnXG5Q65gJJRZ0wai6XNyt8lCeV5V1OL4S1eRrs00k?= =?us-ascii?Q?aizgdH70OtU0kln07Tdr4GaT+LVMc6EwpC6efMPQkTM7sxF/fSTWkgpWgRsv?= =?us-ascii?Q?aUUTM1Zk7GyTSZkDlJyUMUpQ6aRIjIH3YEkK5bvpkubQwrQ1Lwv+tVebRlUv?= =?us-ascii?Q?g2vM08bONRaNkyRHFZOOzIpDc56e4GCFMqPqLQ6a4rSd13ErXGY5SoWVwxA9?= =?us-ascii?Q?tI6z7m+dX2mniDOH0fIHyVz85ZrIL96hX0CozMRF5cF5JheAYap1ex2mU2Ic?= =?us-ascii?Q?4KHNsZ4/+hBlFYod5dIzPgC0FBOYQQzEqr8tLfcnN3JncYbMINcG/IYBldzy?= =?us-ascii?Q?eTBBMNw8ZwXvUNz0zHeTs+j6uAW+drf6jzqZxWf1RAV/B440VJe0W2BjhIS+?= =?us-ascii?Q?s/+VNwbiJqCAWyjfV/gmvZbwrMJ02PkhLBUXsnnzREp7DoYfX0mw0pvafSIQ?= =?us-ascii?Q?x45RV+k0F6JIr9egZXz4v1eK5BQN8Y4csDfGm9cvIXm+q8WIPti4D1CKfe2F?= =?us-ascii?Q?rkWvI2OnmRwNqPVxRRT7vImC/JYqal6jDAan3r948cB0SyG/zCfEUpBFRFqt?= =?us-ascii?Q?+5idg7pd9Ql3NTBwPqGWpbz+8KtR5aEB2acZIfwHnxzNle8V1mFMlk2chlM8?= =?us-ascii?Q?Re82g8M7o5RyH43stqTMBYYc8UiykNEJxiWkcFIyxQBsvApUwHVhfBvbuMvH?= =?us-ascii?Q?4liDh0A2sRhrjwKaGx2tENpqYk3OHXPyb4IazWTiY1D6m+YUfxP7lUvW4KvB?= =?us-ascii?Q?U++vMZbY6nzyreIvY7NSS6NXnfN/pZxQB0Yuxj9dbOfPZBEcEJI8o+Ge/3qc?= =?us-ascii?Q?U8/dwvO/vVI19Z7vc9EnFfsbUedE38SQ13NIlRv210RWe2aL6ybZoDSaTfOD?= =?us-ascii?Q?cNTDrcWyhwGnoIaxb00h/hat0CLkTbUTb/u9od5IH/Rd+cLzeXx/VNtEC/Mo?= =?us-ascii?Q?UesTuB97FP+l8RWjsmuHdMIifbX13u0wzvIP1z86TD01380EWc3lMPjr8PXT?= =?us-ascii?Q?t5ccU+SkrFmb83rnbw/atXcdIS0yP3A2frVALfCYZaEH5yIkZ28zflaUgMvj?= =?us-ascii?Q?c7as9OxaIwj1FRcWU21tfKcQg8p2ssA1DE4WM2jV/hofCV7LfC8bsmebtX2a?= =?us-ascii?Q?XhDyQCBWUlqHswPkciAMXI6hl3VlSyrGG8d78a172iZrDSiJ9zHB3+mhjFiz?= =?us-ascii?Q?W9lTbJW0O7G/vSvwobSzfj1XlSDHKEB+EuaNXl2ZjVVBNtJkkyj0VxpZJDhm?= =?us-ascii?Q?3vBy0RA6+TI2etJJjn5llVAvT/uk6aLzQzS/QVgXBKancaP94DZjsk9AbjHy?= =?us-ascii?Q?rnn7aWHLcx+3+oj4jeLuD+o2PJaEWCDBJ8FP/Zgw32uxSo7qrByrBxEAaVRr?= =?us-ascii?Q?BBx+gQ=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(36860700013)(82310400026)(1800799024)(7416014)(376014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:44:46.4452 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 084394ce-c806-4bd1-2f99-08de5cc7ec42 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023D5.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB6763 Received-SPF: permerror client-ip=2a01:111:f403:c007::2; envelope-from=skolothumtho@nvidia.com; helo=MW6PR02CU001.outbound.protection.outlook.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424431277154100 Content-Type: text/plain; charset="utf-8" From: Nicolin Chen Add a helper to allocate an iommufd device's virtual device (in the user space) per a viommu instance. While at it, introduce a struct IOMMUFDVdev for later use by vendor IOMMU implementations. Signed-off-by: Nicolin Chen Reviewed-by: Eric Auger Signed-off-by: Shameer Kolothum Reviewed-by: Jonathan Cameron Tested-by: Zhangfei Gao Tested-by: Eric Auger Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- backends/iommufd.c | 27 +++++++++++++++++++++++++++ backends/trace-events | 1 + include/system/iommufd.h | 12 ++++++++++++ 3 files changed, 40 insertions(+) diff --git a/backends/iommufd.c b/backends/iommufd.c index c65dc41d71..e3a3c1480e 100644 --- a/backends/iommufd.c +++ b/backends/iommufd.c @@ -473,6 +473,33 @@ bool iommufd_backend_alloc_viommu(IOMMUFDBackend *be, = uint32_t dev_id, return true; } =20 +bool iommufd_backend_alloc_vdev(IOMMUFDBackend *be, uint32_t dev_id, + uint32_t viommu_id, uint64_t virt_id, + uint32_t *out_vdev_id, Error **errp) +{ + int ret; + struct iommu_vdevice_alloc alloc_vdev =3D { + .size =3D sizeof(alloc_vdev), + .viommu_id =3D viommu_id, + .dev_id =3D dev_id, + .virt_id =3D virt_id, + }; + + ret =3D ioctl(be->fd, IOMMU_VDEVICE_ALLOC, &alloc_vdev); + + trace_iommufd_backend_alloc_vdev(be->fd, dev_id, viommu_id, virt_id, + alloc_vdev.out_vdevice_id, ret); + + if (ret) { + error_setg_errno(errp, errno, "IOMMU_VDEVICE_ALLOC failed"); + return false; + } + + g_assert(out_vdev_id); + *out_vdev_id =3D alloc_vdev.out_vdevice_id; + return true; +} + bool host_iommu_device_iommufd_attach_hwpt(HostIOMMUDeviceIOMMUFD *idev, uint32_t hwpt_id, Error **errp) { diff --git a/backends/trace-events b/backends/trace-events index 1ae94c4290..14a7ecf5aa 100644 --- a/backends/trace-events +++ b/backends/trace-events @@ -22,3 +22,4 @@ iommufd_backend_set_dirty(int iommufd, uint32_t hwpt_id, = bool start, int ret) " iommufd_backend_get_dirty_bitmap(int iommufd, uint32_t hwpt_id, uint64_t i= ova, uint64_t size, uint64_t flags, uint64_t page_size, int ret) " iommufd= =3D%d hwpt=3D%u iova=3D0x%"PRIx64" size=3D0x%"PRIx64" flags=3D0x%"PRIx64" p= age_size=3D0x%"PRIx64" (%d)" iommufd_backend_invalidate_cache(int iommufd, uint32_t id, uint32_t data_t= ype, uint32_t entry_len, uint32_t entry_num, uint32_t done_num, uint64_t da= ta_ptr, int ret) " iommufd=3D%d id=3D%u data_type=3D%u entry_len=3D%u entry= _num=3D%u done_num=3D%u data_ptr=3D0x%"PRIx64" (%d)" iommufd_backend_alloc_viommu(int iommufd, uint32_t dev_id, uint32_t type, = uint32_t hwpt_id, uint32_t viommu_id, int ret) " iommufd=3D%d type=3D%u dev= _id=3D%u hwpt_id=3D%u viommu_id=3D%u (%d)" +iommufd_backend_alloc_vdev(int iommufd, uint32_t dev_id, uint32_t viommu_i= d, uint64_t virt_id, uint32_t vdev_id, int ret) " iommufd=3D%d dev_id=3D%u = viommu_id=3D%u virt_id=3D0x%"PRIx64" vdev_id=3D%u (%d)" diff --git a/include/system/iommufd.h b/include/system/iommufd.h index bc4acd1e8b..567dfb7b1d 100644 --- a/include/system/iommufd.h +++ b/include/system/iommufd.h @@ -48,6 +48,14 @@ typedef struct IOMMUFDViommu { uint32_t viommu_id; /* virtual IOMMU ID of allocated object */ } IOMMUFDViommu; =20 +/* + * Virtual device object for a physical device bind to a vIOMMU. + */ +typedef struct IOMMUFDVdev { + uint32_t vdevice_id; /* object handle for vDevice */ + uint32_t virt_id; /* virtual device ID */ +} IOMMUFDVdev; + bool iommufd_backend_connect(IOMMUFDBackend *be, Error **errp); void iommufd_backend_disconnect(IOMMUFDBackend *be); =20 @@ -73,6 +81,10 @@ bool iommufd_backend_alloc_viommu(IOMMUFDBackend *be, ui= nt32_t dev_id, uint32_t viommu_type, uint32_t hwpt_id, uint32_t *out_hwpt, Error **errp); =20 +bool iommufd_backend_alloc_vdev(IOMMUFDBackend *be, uint32_t dev_id, + uint32_t viommu_id, uint64_t virt_id, + uint32_t *out_vdev_id, Error **errp); + bool iommufd_backend_set_dirty_tracking(IOMMUFDBackend *be, uint32_t hwpt_= id, bool start, Error **errp); bool iommufd_backend_get_dirty_bitmap(IOMMUFDBackend *be, uint32_t hwpt_id, --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424398; cv=pass; d=zohomail.com; s=zohoarc; b=nOYgMleKnUXnbuvXrQ91aw6ZXpsDS1mL3M9t5oB7kf8vNAK0M7Buh7qvWC7MKWSFnDyroFQBSyoV012KHyivhV3Z0htM13RbvWerissEDHCK+5Wah3Q9AoeMvl3akPm9ltX4C5hscjgbHaKSXN+5ztHl+zIeiC2GNHskPxVviDw= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424398; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=hBqMcbOHB9k23ifT++u+ZZdOfbwDumy71Od+aJ01uEM=; b=Zvy6FNgzwBYqFd23C+8jmvEErM0IMFl95D9lZQ8pKeiz9hJpdy6okc1Xxerg9uuHvWj+lF/vsbb3HZla23xL2hOE/kOnus6Za0Q7IL0Ga7BqsVYV9jIFLK1WGttZ9LUcxdXfz6esn52Z4cWj0kOP1SyaHIxMzp6rLD863g+rKG8= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424398444448.7268807129983; Mon, 26 Jan 2026 02:46:38 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK5i-00072N-7M; Mon, 26 Jan 2026 05:45:06 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5e-00071J-2k; Mon, 26 Jan 2026 05:45:03 -0500 Received: from mail-northcentralusazlp170120005.outbound.protection.outlook.com ([2a01:111:f403:c105::5] helo=CH5PR02CU005.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5a-0005JY-4o; Mon, 26 Jan 2026 05:45:00 -0500 Received: from BY5PR04CA0006.namprd04.prod.outlook.com (2603:10b6:a03:1d0::16) by IA0PPFD7DCFAC03.namprd12.prod.outlook.com (2603:10b6:20f:fc04::be7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:44:52 +0000 Received: from SJ1PEPF000023D5.namprd21.prod.outlook.com (2603:10b6:a03:1d0:cafe::3a) by BY5PR04CA0006.outlook.office365.com (2603:10b6:a03:1d0::16) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.15 via Frontend Transport; Mon, 26 Jan 2026 10:44:50 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023D5.mail.protection.outlook.com (10.167.244.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:44:52 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:39 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:35 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=vmrloygs2ZG5SBIW6cdDn+4ZbE8wpRTNlYfJUYOd6B0gWoZYJZmV/9g0GK8d0orcJ9PocvAio6elMqjUBnvWiIbOfkKTcfmsBnm7ZicC4mnF7qUP92eXLUXtaN9KnQNKIWjC694VyWhL4YnsvTM8m/4LKk85hnWXw+rgN6oJIBFGKOiH3nzIQ1zbwrbFqu2TfaNj+GQVf4hNpn6KoU5Y/3xlwiPkOKtqP5k7iYmIKQRwQsJygt+DELezRS1u+Y7S6k2YN6M46cYvTyl7pkz/7ha/GS8K49vJQ4dcswEK0O+dYZThZVtO/UbzKIdEoWBHMsIfHXrri79/BYH1fIRuIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hBqMcbOHB9k23ifT++u+ZZdOfbwDumy71Od+aJ01uEM=; b=JY8+zQV+3DBamLMLDKAVzhzt2EM2jgnbV4BUZs4iKJ7Ww8lXM1PWGMgZOZA8EPGiH42juegSwjL1HQbyN6d+HbdVf0gDI4uDRQZlZvUj8THnCVFktgwkH2SAGw0RM0jfNhPDtnyDXs0DyxIEtN33SMiHL1A3WPMvVwiDjMl2dYseVw0bDaVB7+d8+VXCkvza5Tvz7cuRj8fCFNQuCFBwthBx4Ky6AdCIVcLuFDu7qpzygtPi2zk0QFoaexwcVbHAYKo9K6W7NDtwzFqnZptlc7wFbAoMb7cqQb2HjP083K4ltZSOiSOp/DsKNmWA0OPXb1VtpQbN/LokW6hYxddUiA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hBqMcbOHB9k23ifT++u+ZZdOfbwDumy71Od+aJ01uEM=; b=Jd0PdLu7heiw84gp8cxTWb71UF+3XEinlWITfNaJ23mvZfU4PQESdhTJNIV9ZV/9e1opAQqdThjZmXq4WlxaPex+dISDngNJu+KJ5brbaMccWj9bbakQXTQbMoygkLyMQ4dDXW0/ISTOf3QuUjyNZaFT3JuI5H/K757ftOtXIo66wnRaIROKSIuQijr9E2kCR5puO+zWVJqzN8hMFvq0jlCk0QolLiXu1rNQ9GVTMf3+OgFN3O+M75CfAWpPTX+roxIB9AvVAj3ApJaFsi6BTl7Hyma9umIx3v0H5re85fKbPccTcBe7jO2bWvI3xKcTAOAJn28kBwdcv/XH/hVQQA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 03/37] hw/arm/smmu-common: Factor out common helper functions and export Date: Mon, 26 Jan 2026 10:43:00 +0000 Message-ID: <20260126104342.253965-4-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023D5:EE_|IA0PPFD7DCFAC03:EE_ X-MS-Office365-Filtering-Correlation-Id: 433329f7-6128-4121-70b7-08de5cc7efa8 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|376014|7416014|1800799024|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?YOJZ3ZZSIeXE2SLiwBYNJXrt7EfNURbctzMi13NHcionddcKCZoGU4IkQwDW?= =?us-ascii?Q?LCxron8Nel0r63uACPK8gl968zdyjiBJApkgRJw5nFgm4/vgYxyJkYpN05cv?= =?us-ascii?Q?K+ABQ+H4vCo1LsB9zyFPSYhZaFd/DTitEhzjz7zwHLdom8C6neW4ULrCLz5z?= =?us-ascii?Q?dBos5NCT1jWUddXVmQqf7fSoPtyO2faHDa4CxPmZGpfSkPKX8Qmk52Vj+0iQ?= =?us-ascii?Q?uu3MnMeA4RP23DtE0jauIWaFsyoqr6pvLWr4AQ0YR43ZxKiQlxVRy46TrRp7?= =?us-ascii?Q?nLwZoXoeVqyn369xHuyKyDvSYXMLHAONuPzvGCYYDBBq4f7T5ht7IqAzz6g6?= =?us-ascii?Q?X2dCHRRPwDfr7AtfOv18BG8Vi3o/tZO573dKRdURSG/z2PlVVTsv5jkuBlhK?= =?us-ascii?Q?lY0Dkt6IKty73lHOPCUdzooebAyYwoLaAUHqKMdOjHyxlpxSB0ymArsLCypw?= =?us-ascii?Q?eKbMrdjCJmHTU0sZbe9pt9bdY7TxlHwubx9BUjMSeFzw7ygdwAlNQqJfiYud?= =?us-ascii?Q?AhIckTt6kU8YB4vd6SEmXxe7zNFU16b0rsndkgdsWnbQvwtTOj6zwFRAzsxs?= =?us-ascii?Q?IoYrg4GJD75oWRt/WBmzCufmsg/0CW+Qhqh9e3K5velgP2Y0BQFJHKe5Mfw7?= =?us-ascii?Q?bonCKvnzOsm3vpg4qrricfBEHCV21XGQ5BBcab5fpWGbfROqATCFJ9yS6GSf?= =?us-ascii?Q?/Ql+aWcqwUaoqKldOuRTKy23z27+8KORXh72ByBH73938yZhT2rAR0e5GYP5?= =?us-ascii?Q?jthQu8xtGDnc0ZY6+GnCTFcnB16SXY6b90+1unoDIaGtE8Tiz/yUB09OH55j?= =?us-ascii?Q?U+Sz2jLvO6yiNn6Og2rSlSdvC4D7IsrKVmJXPKl1fmAewhgBzSTCHQQkMUqD?= =?us-ascii?Q?8DF/Gh5jvctKRjEspp5uAACaC11V2TmAfX8Kq8p13MIbFaKtuLJsYRkiWI2s?= =?us-ascii?Q?uZy9f0PJUWS1XK6H/mMpB5ylRW82y9yS+QRAm+yv6OcHv+2SPB/s+q0cRmmv?= =?us-ascii?Q?19/hSpqttqfchpWXndTMOsx2G9pLHSX3x8JaRB8+wsR3U7xC1mUbFWf6D6mp?= =?us-ascii?Q?iIO4kcpctlh7HtXxmEA9GEPnrcwx+m+Jmb0gRh7WQ0oQe50+wRqj0vICJDqv?= =?us-ascii?Q?khc2yIH/BMCXAOGf3HBuTnJxUp4YKgTqocqLksZCX2rLiilRMWxtVsPcTXoi?= =?us-ascii?Q?giN30h/g5i4qLYMkcwEdb36A82WtUJ4ymdv5kx0sCnV00S+qpZMAJBkjhs87?= =?us-ascii?Q?VHsPEu/qKIKtuSrKuuKNYTANeuxSBk1LiUHdUkf0Tgf7qgWfsrFd3Op77s9z?= =?us-ascii?Q?BJy1HD+W+M/WOF/lKN7Acn4UrB0tUE8vpNlSMgUcg5epeehTfk/ec4aXGX18?= =?us-ascii?Q?319/2j9VaguOoW6auR9GZERkkxzEdmR7A9BS9i8+ufg2JL0dxlvHp+qMSpyF?= =?us-ascii?Q?bvd7Tny50Zz1/ApkLdsE5qMsTas2SFeZeT5ZPrqUnbmnMtRJfvu0wigalrz5?= =?us-ascii?Q?n7mT8cu318LccYqm9z7DHtGcIIn0RXoIMvUX4H8MNU1jC4qXOl0z23SUE+1G?= =?us-ascii?Q?usdDdoCu6rNGt8DJB3WVtdM2QWZ0dIgHyx5vqpvHh8SwFBT44naYpTIzHFHM?= =?us-ascii?Q?mENuDWzEIgzWfPQkmS/e+f2Dyq9uJ0mb+hhja8frR5rkLEiwPISqu1wz+4OK?= =?us-ascii?Q?tdrPyQ=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(376014)(7416014)(1800799024)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:44:52.1836 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 433329f7-6128-4121-70b7-08de5cc7efa8 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023D5.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PPFD7DCFAC03 Received-SPF: permerror client-ip=2a01:111:f403:c105::5; envelope-from=skolothumtho@nvidia.com; helo=CH5PR02CU005.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424401034154100 Content-Type: text/plain; charset="utf-8" Factor out common helper functions and export. Subsequent patches for smmuv3 accel support will make use of this. Signed-off-by: Nicolin Chen Reviewed-by: Eric Auger Signed-off-by: Shameer Kolothum Reviewed-by: Jonathan Cameron Tested-by: Zhangfei Gao Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmu-common.c | 44 +++++++++++++++++++++--------------- include/hw/arm/smmu-common.h | 6 +++++ 2 files changed, 32 insertions(+), 18 deletions(-) diff --git a/hw/arm/smmu-common.c b/hw/arm/smmu-common.c index cdcfb1343d..1492d7dd95 100644 --- a/hw/arm/smmu-common.c +++ b/hw/arm/smmu-common.c @@ -847,12 +847,24 @@ SMMUPciBus *smmu_find_smmu_pcibus(SMMUState *s, uint8= _t bus_num) return NULL; } =20 -static AddressSpace *smmu_find_add_as(PCIBus *bus, void *opaque, int devfn) +void smmu_init_sdev(SMMUState *s, SMMUDevice *sdev, PCIBus *bus, int devfn) { - SMMUState *s =3D opaque; - SMMUPciBus *sbus =3D g_hash_table_lookup(s->smmu_pcibus_by_busptr, bus= ); - SMMUDevice *sdev; static unsigned int index; + g_autofree char *name =3D g_strdup_printf("%s-%d-%d", s->mrtypename, d= evfn, + index++); + sdev->smmu =3D s; + sdev->bus =3D bus; + sdev->devfn =3D devfn; + + memory_region_init_iommu(&sdev->iommu, sizeof(sdev->iommu), + s->mrtypename, OBJECT(s), name, UINT64_MAX); + address_space_init(&sdev->as, MEMORY_REGION(&sdev->iommu), name); + trace_smmu_add_mr(name); +} + +SMMUPciBus *smmu_get_sbus(SMMUState *s, PCIBus *bus) +{ + SMMUPciBus *sbus =3D g_hash_table_lookup(s->smmu_pcibus_by_busptr, bus= ); =20 if (!sbus) { sbus =3D g_malloc0(sizeof(SMMUPciBus) + @@ -861,23 +873,19 @@ static AddressSpace *smmu_find_add_as(PCIBus *bus, vo= id *opaque, int devfn) g_hash_table_insert(s->smmu_pcibus_by_busptr, bus, sbus); } =20 + return sbus; +} + +static AddressSpace *smmu_find_add_as(PCIBus *bus, void *opaque, int devfn) +{ + SMMUState *s =3D opaque; + SMMUPciBus *sbus =3D smmu_get_sbus(s, bus); + SMMUDevice *sdev; + sdev =3D sbus->pbdev[devfn]; if (!sdev) { - char *name =3D g_strdup_printf("%s-%d-%d", s->mrtypename, devfn, i= ndex++); - sdev =3D sbus->pbdev[devfn] =3D g_new0(SMMUDevice, 1); - - sdev->smmu =3D s; - sdev->bus =3D bus; - sdev->devfn =3D devfn; - - memory_region_init_iommu(&sdev->iommu, sizeof(sdev->iommu), - s->mrtypename, - OBJECT(s), name, UINT64_MAX); - address_space_init(&sdev->as, - MEMORY_REGION(&sdev->iommu), name); - trace_smmu_add_mr(name); - g_free(name); + smmu_init_sdev(s, sdev, bus, devfn); } =20 return &sdev->as; diff --git a/include/hw/arm/smmu-common.h b/include/hw/arm/smmu-common.h index b49b2f27fa..f5060cf36f 100644 --- a/include/hw/arm/smmu-common.h +++ b/include/hw/arm/smmu-common.h @@ -184,6 +184,12 @@ OBJECT_DECLARE_TYPE(SMMUState, SMMUBaseClass, ARM_SMMU) /* Return the SMMUPciBus handle associated to a PCI bus number */ SMMUPciBus *smmu_find_smmu_pcibus(SMMUState *s, uint8_t bus_num); =20 +/* Return the SMMUPciBus handle associated to a PCI bus */ +SMMUPciBus *smmu_get_sbus(SMMUState *s, PCIBus *bus); + +/* Initialize SMMUDevice handle associated to a SMMUPciBus */ +void smmu_init_sdev(SMMUState *s, SMMUDevice *sdev, PCIBus *bus, int devfn= ); + /* Return the stream ID of an SMMU device */ static inline uint16_t smmu_get_sid(SMMUDevice *sdev) { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424369; cv=pass; d=zohomail.com; s=zohoarc; b=Qi/H1OlwsGQB0sVnvglEUmipVa9RZz3KmI91XkOZWiKQPv/QeWLk2srfUOCpwR5C33LPmvHm7G0Sx4ih49oa7NegbUH9pJi5MQrzsERHeSGKndXk/+vdIr7pFVWFqJnARxic3BOlQ6pZqzBfCqqPYA7j5CeQ2MDnssBFo2XqsDM= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424369; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=0sLTdlTkQkI82nizZ9ZBHUwEpMDenQNMu4zTFpytN3M=; b=kgMCPw9sTPXnIztLx7Lvcz+6eMZObdF3yZHQAnQhEhYJDLd17y4jw0qELc3ens5EYsZck2ziwkFXb/YXLpSSONTO2+cM090zeodTZXdNVhjtGw4M0rPQoRl2DoIzGK1vGhkhlj5fAF7AW8rNAghhQHRUU6cF3lw1h4I5776LAzQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424369588576.1137417929353; Mon, 26 Jan 2026 02:46:09 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK5r-0007AA-75; Mon, 26 Jan 2026 05:45:15 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5o-00074C-G8; Mon, 26 Jan 2026 05:45:12 -0500 Received: from mail-northcentralusazlp170100001.outbound.protection.outlook.com ([2a01:111:f403:c105::1] helo=CH1PR05CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5i-0005Uz-26; Mon, 26 Jan 2026 05:45:12 -0500 Received: from BL0PR01CA0033.prod.exchangelabs.com (2603:10b6:208:71::46) by DM4PR12MB5819.namprd12.prod.outlook.com (2603:10b6:8:63::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.11; Mon, 26 Jan 2026 10:44:59 +0000 Received: from BL6PEPF00022573.namprd02.prod.outlook.com (2603:10b6:208:71:cafe::76) by BL0PR01CA0033.outlook.office365.com (2603:10b6:208:71::46) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:44:40 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022573.mail.protection.outlook.com (10.167.249.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:44:59 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:44 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:40 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=rwpLgYF5GSEbhwVqkICCw6Lbsjyc6VZK2UzuyCtXj/SsPkYRu+4hZsIbXK2Xnj/fRyLIsDbp2li3qtKLuiLxqisZDDNEapPALVGtqIMCuL+/2nnoWArysxI1U9FzEWneYL8wJX8KaqMwYRhHP3kA+KveJM4GdGwpOFvhgY70HPz37yLNRogotdg0KfTKWOgX1U8TbxfbeTuw2PDx7o0KJagltNkhlCyGg18a/38UHE7DWX1zp7HABY6iR09Om0qknRwuErggd7pPJjupI/hGinI1Hyx5pgPl48Ek/9NOeE324qIeCgl3QlbkMNWfhP1RusGrcV3C0yTAum9uhMdRaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0sLTdlTkQkI82nizZ9ZBHUwEpMDenQNMu4zTFpytN3M=; b=mT3kueV2hCPt04h7pxBj2LiDmcg5K5SPJ5YILhyUDvfXWVor00nXYQC9TglPWxSQrOTbHyH+p3cS9yXMwtnOMMbMrzbhL/gsTIYR2nkP6/yvebownlXbUUw53XwueGCW/C/N4kBkRrGCef+Y7fAk8SDwjcERmXj3KQfNe5TdQ+AVDIEqhOG4t0glYr/xq5SuEtdNzS25MFqD6VQWNxz4UFlEgt93Ca+FLqqdJWGEb9tWq48iGJ6sAFfmP0jP6i/WW/yYBbSkW4KjnL2EJZjjHI40AAjG2iOWoNNR8qJYl0l2u+aITS1TZEjrwerdHEMPfNn4PwKma5mAtzm0dtmT+g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0sLTdlTkQkI82nizZ9ZBHUwEpMDenQNMu4zTFpytN3M=; b=RH2dXuhdlucEySTRn+J1EJlMHB+r8iDSS+J72XgMCN4dfEUGd/TxAG2FgShSqB7vFSh4kuTGLHOEIXnkCzH+ivb5QHN4MA5zAK0qLiO3Tpld1HmuGpucCFVxJ5UIXg0SAFgEKT9RJ14wr7kC/Jhri+sYDbVcse7jFrXm8G0krbh6ojFrMrZ2L06/BI8iLS0WXr2m5a4gInrftx/njiGpZqg/B8kK/5zg+ZBmmDaIB8rm38rnnbwj1JqIirrUEqPABO42MtapcNqVodi0qFzRflFeVjHe5t+2Ojv9wL/63WcWPQCHk3NUYoAJaNY1NsS6NDqq2QToBAnb6X5D1jGZWw== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 04/37] hw/arm/smmu-common: Make iommu ops part of SMMUState Date: Mon, 26 Jan 2026 10:43:01 +0000 Message-ID: <20260126104342.253965-5-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022573:EE_|DM4PR12MB5819:EE_ X-MS-Office365-Filtering-Correlation-Id: fce9e269-d9b0-43d9-82d7-08de5cc7f3f1 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|1800799024|7416014|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: =?utf-8?B?YkJjdTJPREsyZ21pUGloTFlzTVYwT1ZQdEFicFdHQVN1Yis0aUhVZjBvZDhK?= =?utf-8?B?eUdTSWRkUVRQY0tYK0UxRHRubnp3b0xRWnF0TytBOXdZbmhSc0M4VEN2RHEr?= =?utf-8?B?Q1Z1YUh4WWNBZTNOZ24rZ1JjNGFwV0cyMmJEUFU1OEVWdDdQOUx6TDNvNUg2?= =?utf-8?B?NWdyVHRkVlhFdllWbWQzLzFOcmNsc1ZZaG51NzBvdHplQ0JwcTYrMy9PYitL?= =?utf-8?B?NklJU2ZpVmdhQk05ekowNmJpdUs5M3VJVFMwYkN6bUY2YmxFUTczR3VzZ2Fn?= =?utf-8?B?MUFNVFAvbUcvaC8xTE5TYmxtbnFJZkY1QWEybHR0cGh6YWg3MFVlZ0wrUnY0?= =?utf-8?B?Yk8zVFBiMGpic3ZzWlYyb1N3eGdRUTBPR2VjRFQrWUZtUS9lNmRrcS9HdUVu?= =?utf-8?B?cnh0cDErcGxqaTFRblpxMkV3QW84bFE5MTJKdnNQTXFJeUVkMHpoTEZrM1Fr?= =?utf-8?B?Q0NiaEp0dk1TMXhRUkNQdmVmanhCeTRLOEhtYldreTVsOUlvQXZJQmhxd0ho?= =?utf-8?B?OVRBVFNDRVJpdEJSTHVWZUtpa3pvTjYvZEtmazIvK3paYkhteHpObUlBSHVv?= =?utf-8?B?M28yUDJ0bk1nNUR0ZmFqZDFEWGtiMFEyOWhCYlhPdzVSaUZXOHo1Q2VjdWNn?= =?utf-8?B?cWpxR0JmZnpSNjliN3Z3QXF4SG5LZjNlQ3laQnZoejk1MjRJYjZmWTJVd0Nr?= =?utf-8?B?VCsycG9Vdy8rZE9JL2g5Rk9JZWIwL0xwY0puTXpvSFRoaGdQdk8zRFJ2SXZa?= =?utf-8?B?OVpFV0dmMi9NT2N6UnBocUZ2SmxSblNxUks4b21OTmNzYjJxUE11cGs4RjRK?= =?utf-8?B?ejMwOE55UnFWcFhFcXJhRUg1V2V2akozdFpJaktnMjMvNmFPTVhpN1UwZzRa?= =?utf-8?B?TlVsUFNIVVlObTRJQjFjbTBCZGRTNTJQV01sUld4Y1U1K1Q3RTRtRGRxL2tY?= =?utf-8?B?UlZaNjRVR2kzcCthd3hNek5Fb1U3VGN0SWlScGt6ZFQrOXQzeC9qeFh2Um9U?= =?utf-8?B?NmtKRldIQytSamxieEtzWlFFQ09hRG1MbnJHemNvSmw2bmJWMk80YlllMkhC?= =?utf-8?B?cW16NDllSFN3dUg3bjJyK04raC84RXQwUENNaHJOZURVdzcrR1FYUGhnS2Jn?= =?utf-8?B?MkdldU1ibTJrWlQ3S1Vrdmtlb3dEMDhoTTZnTkpRZjBMYm5CK1VZbzU1Rmdm?= =?utf-8?B?NkJTcGI0YmdVSys4eVAzaGtUYVV3bDd4aXluS250WkY2c1hsZzZKQXV1ejVr?= =?utf-8?B?TFpSOUNYbnZKaG9yV09MWFk2bm9LYnppN3pWQWNJRlFYT2pITXA3MWVzck5v?= =?utf-8?B?Qm02Qnd2RG1SWnYvVlFoaHV5UnNTWnNsKytMQjVOckNQOFZMOUxrMmNLMWxw?= =?utf-8?B?dERiVnNrRmlzcGF5WldlY1hGMnNWM0NVbDRIbDQ5bHZTekpIUFhGL052K0xw?= =?utf-8?B?aU5sbnY3QVZYVVRsZStxU0JZcStCNkczcGNzYVRYcFd6Q3MxbjVETUR4aG9V?= =?utf-8?B?UmlZUVJZUjhNang3d1doQmlHSnR3UC96SVFORUxIWUwxNzRmdFVtTVFGM0dZ?= =?utf-8?B?ejN2S1VKL2tuQ0lTc1B3L2U5Wm51ODRBSkFGSzJaR2cvclNtaERqcWlFb0Qr?= =?utf-8?B?bHh6U0VUVVh3SG9MKzJzSXVJTXdxUHB1TjNrbmxHOUNOR2dabEhtVHdiQita?= =?utf-8?B?Q0FRdm05OVJ5THg0UGVYUDZHb0J1R0w3dGZVOEhXQnR5L3JLSzhXbWN4ZGNr?= =?utf-8?B?Qy9rNTlOWG40YTlWUm5LRmMvR3FybkVMYnkwQ1JIeUx5SVAraUdqdjRkUFpM?= =?utf-8?B?UWg1YXB1K1JtVTJTNGlnRzA4aUxqVjBjLzRuK1Zqd3RQeFpqdUVhUStWWXk0?= =?utf-8?B?U2NwNnN3NXppQ0Y2OUVQWGVsSmFNNVBVdm5hL1JLUUd5SzNkcTUvTi9ZamU1?= =?utf-8?B?RlhLcUpmbzJucmpDUmpVUG5IVHhQZjdtZVA3QXZDSlZkWTZESmdoS3ZlOFp0?= =?utf-8?B?V0lsTVYwWjdMVUZJR0RGOUlTWGJwdUpVc1dyYmdTU3Fmbkw4T3ZHb2d0aElD?= =?utf-8?B?c3ZqUFEvT2ZnUVFsM08vVm5tQnFTNXkwODczQktFZGt5QVljU09ZVkJZYVRN?= =?utf-8?B?bE8yQTBaM2lFRWFlL1VSQ0ltVmRHL01MT2NuS2RzY2gvWlRkNlErVndNRUlB?= =?utf-8?B?eEJjREFvd21KaFJmemtwcE1YMHVUWlpxeVlrMGsrR0FYRFhvTXV6TWwxWWZv?= =?utf-8?B?TmZNL1pCemNVbmsrU2NqY2IzWHdRPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(376014)(1800799024)(7416014)(82310400026)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:44:59.2331 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: fce9e269-d9b0-43d9-82d7-08de5cc7f3f1 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022573.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB5819 Received-SPF: permerror client-ip=2a01:111:f403:c105::1; envelope-from=skolothumtho@nvidia.com; helo=CH1PR05CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424371820158500 Make iommu ops part of SMMUState and set to the current default smmu_ops. No functional change intended. This will allow=C2=A0SMMUv3 accel implementa= tion to set a=C2=A0different=C2=A0iommu ops later. Reviewed-by: Jonathan Cameron Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Tested-by: Zhangfei Gao Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmu-common.c | 7 +++++-- include/hw/arm/smmu-common.h | 1 + 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/hw/arm/smmu-common.c b/hw/arm/smmu-common.c index 1492d7dd95..58c4452b1f 100644 --- a/hw/arm/smmu-common.c +++ b/hw/arm/smmu-common.c @@ -959,6 +959,9 @@ static void smmu_base_realize(DeviceState *dev, Error *= *errp) "smmu-secure-memory-view"); } =20 + if (!s->iommu_ops) { + s->iommu_ops =3D &smmu_ops; + } /* * We only allow default PCIe Root Complex(pcie.0) or pxb-pcie based e= xtra * root complexes to be associated with SMMU. @@ -978,9 +981,9 @@ static void smmu_base_realize(DeviceState *dev, Error *= *errp) } =20 if (s->smmu_per_bus) { - pci_setup_iommu_per_bus(pci_bus, &smmu_ops, s); + pci_setup_iommu_per_bus(pci_bus, s->iommu_ops, s); } else { - pci_setup_iommu(pci_bus, &smmu_ops, s); + pci_setup_iommu(pci_bus, s->iommu_ops, s); } return; } diff --git a/include/hw/arm/smmu-common.h b/include/hw/arm/smmu-common.h index f5060cf36f..7b975abc25 100644 --- a/include/hw/arm/smmu-common.h +++ b/include/hw/arm/smmu-common.h @@ -166,6 +166,7 @@ struct SMMUState { AddressSpace memory_as; MemoryRegion *secure_memory; AddressSpace secure_memory_as; + const PCIIOMMUOps *iommu_ops; }; =20 struct SMMUBaseClass { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424344; cv=pass; d=zohomail.com; s=zohoarc; b=j6D/mnJzVBGJyX+HFsTr6J2Rh8erFWerlvDe2K+r9P5G8lbdSpNHL0u232CwZyMhz4oaIHy3jbg0Ok4qgo9BQUX9Zyf5LE+d5hvTNmw9+pCn3hPHFXCUmZLsWiGIye+5DoMuykILbvVL9jLzmcLiG0Tm3kq45PXIBjYC0Ho6zJE= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424344; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=gt9dNFuCiu8mQx1gnk/QJZVIThykWJ8fjsq3vzqy0Tg=; b=MX0rU8XrKQ3XBGd7vw1kf/nPJ3ZrKOtsqSEywj2l6ABurCuZe0t1L5xZQjUsHtgWgTs4jzIV3UH5bpWSxAoYV1yQ/nVfcBCs3g7iHl66IYqSJ+yXfGWBMFERa+2MsnE6wiqutj2ai6+oHau4zjxOeX+dIGF+aoJBe7usS2YZpT8= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 176942434425232.85213941452571; Mon, 26 Jan 2026 02:45:44 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK5n-00073v-62; Mon, 26 Jan 2026 05:45:11 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5l-00073O-AS; Mon, 26 Jan 2026 05:45:09 -0500 Received: from mail-westus3azlp170110003.outbound.protection.outlook.com ([2a01:111:f403:c107::3] helo=PH0PR06CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5j-0005V7-9y; Mon, 26 Jan 2026 05:45:09 -0500 Received: from PH3PEPF0000409A.namprd05.prod.outlook.com (2603:10b6:518:1::46) by BL1PR12MB5755.namprd12.prod.outlook.com (2603:10b6:208:392::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:45:01 +0000 Received: from SJ1PEPF000023DA.namprd21.prod.outlook.com (2a01:111:f403:c902::13) by PH3PEPF0000409A.outlook.office365.com (2603:1036:903:49::3) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.4 via Frontend Transport; Mon, 26 Jan 2026 10:45:00 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023DA.mail.protection.outlook.com (10.167.244.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:45:00 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:49 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:45 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=H60b0Hm97BGuMnHINy7ghTpXIUBWZ4COF9agQNjRGj3Gr0Vu/QWLoAr5ukQT3bP3+qJj+Du+fedOk4KM69uZOP5ba76LyRmsDMU7ttS+Bu4kBCjXzrcZCxYRh+YLPAOTQ76CGX+k6/nUd0CBxk+cFNJxTJjGf4jWKZpDFzNTG3W2QVARyyWD0qcGEN4uhg4LW4+ezw8t/uA/A6FTMq0PHJVTVAK4GWB4hifdL7yC65iHyweaHyXG6p3BTT3iMoIcxIZX5QiHB7tOaSURaQSZhIwtSH0Yr6fXsRBPIk4D7rNHCMKLhTyU7cTY0Jask4RDX27njXMBrHkOzpG+IK9ihw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=gt9dNFuCiu8mQx1gnk/QJZVIThykWJ8fjsq3vzqy0Tg=; b=dNZmNXSS1bjZz4HsiiRJdTp1Fi4CVUEur8x3j4TyRd1n+qSvy7dH3EuixmE7zAzdMvow2pjZn5W0rdjH6AFMgbtoCga9zbWprc1GW+7KIwdgG26f6F6Pe3yV1lKL1vFPqV0RjdEPmRcjzcWJlbFcvEMseSjXS4gkK+CLe+7JhIxPYJeHpo6OALVKGa+3ti5c9vhhwvghZVPPgnk3hHnJ/I4LCUB+g4LTAeXU5mD2RNxof0v8BwVzKuX2AZUuetkz88lcc5xycfIU1cqVuLKjIlIfHc19g6P7xJtQIEAFvNGf7KWSnf9L4AIRPveb7JGr9RoYr78xl5uVgbcrkcXX9g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gt9dNFuCiu8mQx1gnk/QJZVIThykWJ8fjsq3vzqy0Tg=; b=amBNXZ5pI0LBktTQuLN0/egqvzhAU5EaR0jj3cDrKU+Zp5rTstx9FHKHx1IqFVfAjlkShhN5lJJvP7LEmQ97NIV0+0FM+J7pUn1kuT+CxHi3e2l3XuKXci1ShOyACuzrSfolL537MLypTB+Gujt8Nos4Fn3mtXJ1gYNtwvHx3zcRCf8dewuTn0e4/VYAM+IzO/y2CNB7ykFMj9gNqFoCZRXYK8Bft6ZmSxXQ29CX+stk+EUHAgeR1wYhK9Tpbae3hECJYMxuZ1WQ/wO7fYPshrzTzkNIlr1tn0B5lv3aNDApnyldEk5pIhNZJiYgVGjfG1MLUf+f7L5KzUayupvBnA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 05/37] hw/arm/smmuv3-accel: Introduce smmuv3 accel device Date: Mon, 26 Jan 2026 10:43:02 +0000 Message-ID: <20260126104342.253965-6-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023DA:EE_|BL1PR12MB5755:EE_ X-MS-Office365-Filtering-Correlation-Id: 77c0da49-42a2-4b3e-c7f6-08de5cc7f46e X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|1800799024|7416014|376014|82310400026; X-Microsoft-Antispam-Message-Info: =?utf-8?B?N1k0MFRzWnFWVzBjVUtweHluZFNUNWlTUW1LbUg3NUUya1ZZdU83cWpYaXdO?= =?utf-8?B?M0JZNnBkc2ZHQ1VNbmlObEtHOVdYVGlCRDhJUkUwOGFFZXZhR1RpZDFJWEYy?= =?utf-8?B?cWtJTjVnS3NhMlNVNW0xNlRiQUJ5N2lSdnF2WTFkMkhObm5uRzNvUWJUK2pL?= =?utf-8?B?dXpJS25FYWhCUGxtNVBGcW9NWkdzdmF2K0pRbldzNFJza0FVMGVBRllwTmRX?= =?utf-8?B?RXBZMEtVa25oejZPaTRXcTJhcUtQV2t2ekZxM2tIcU00bmdsWXJ3bXlpOFJk?= =?utf-8?B?cTUvTEtXZmtxVkszY04rTzRPdWI4bXJtbUZsb1I5RTZqQmhmMENLQmF0U0ZT?= =?utf-8?B?aFcxaHNoNVNnL3FUa3VuQnhxQ3JpcnA3NXp1SElJSG9KRW03M1hyYnNodDdD?= =?utf-8?B?N0hsaVlQSHF2Z1lUb0c1OG5mWkhQN1dJQ3JMWkJSbWFNYTRwajB4ZFk2djY4?= =?utf-8?B?Q041SVA2Wm1rQ2ZGdzkvMGNURmpFNkR0bzhVMktVZDNWOEM0QytXTE43ZEhv?= =?utf-8?B?Z3dNekJEOU90RUJlTDZKeUVBOXBjbmRyRmV0OWJiRWM5U240a1ZBSkFVNnhS?= =?utf-8?B?ZEJDekovOHp4WjRmTWFaRzBLcFJaWE5nd2NZNnZTV0Q5RVk4NVBFVnVqWERX?= =?utf-8?B?Z3gxaUpmZlVnS2RUZW4wOWQxdjB5N1lhNjBNaGhzRjErZmRDWFdxT1FRRCsy?= =?utf-8?B?L2F4RXRKSGtOR04ydWhEVGtNNEFldHJ2MjJ4VURPbUt2Zm9iUVBMUU9WcHdP?= =?utf-8?B?YW1RZkVwL2VNOHkweG90NWR3V0VSVC8rUHNXSkNFUmJtMi8wRnJhYy94WGpJ?= =?utf-8?B?SjA1RitUaWpYWGI3UWdoSk9ON2s0SktnNTN3QVZoOFhNRkdNV3VoNXo3WFlq?= =?utf-8?B?TnJvcnRhVmNUUDFzbnRwN2RDRzdLUWRUZGRPa3B2ZkYrMmROVFByeVVzRzhB?= =?utf-8?B?VVpNbVBjWGpJSjdyNEFyWlVXNFowWHRhSjM0WmZNVVh6dGx0VG9XT1Fnd3hI?= =?utf-8?B?QUUxTE5sUGU3bklvS05BT0VMa2ZWQnVEaFJJUEU1ZlRMdDN6QkRlYXYwZitX?= =?utf-8?B?eDllNkVraHF0MUVyNC8wUnFFWHlPRENDQU1PemVEdWo4M2ZhL2liWGY1enBM?= =?utf-8?B?cVdlRjlvUzdOMnhlOEtWc1BXZVk1aklGYW1rN2p4bC9jNXlVdEx6YUZMcXlT?= =?utf-8?B?OTVNRTFwY3VOSW5xeE4xZGw4Yk5HU3NQdkpQQlVEN1Z3UE5zckdpSTJVa29I?= =?utf-8?B?K2MyRVUzdFUvY29oQVhmMSthYXlHTE1pNHUxaWVnbUVoQVpaMmFMaC9Hb212?= =?utf-8?B?N3lwd1p1VG1vR1dCeGFSK2tOMHFqSUlZYzZIcHo1VENRZnJ1TzVjZXJUeXI5?= =?utf-8?B?cmFPNFFzUExjVWxGbk1kYk1HK0tNR0FDb21YSzF5ZkVia2RoZEVYOU5JeTUx?= =?utf-8?B?aWtkMHBnbk9BQ0tmZ0xJSHZaV2Q2Tkcrc29aME1lNFE4Ym5YeWw4LzNlS1Bn?= =?utf-8?B?OVJ1cUdkL2k4VnBab0h3U2VvMDJuV25NREFQbWtlanpaYm9BVDhybFkwL0hr?= =?utf-8?B?L1hvREszZWVOajdZa1lZR1F1anNrM0RIc3h6RG9McWExTEEySHA4aFpWQjFJ?= =?utf-8?B?RUdjWjA4ZGoxaEprNEFGTmYvZ25ESWhoanRCc01VOHFONDdRT2Y1RU9rQkNn?= =?utf-8?B?bkczK1o5cUxKWmgzUm5Lc2xiTG1OcFlOVyt1c1IvQmMxbGlXdUN5eElaWnFq?= =?utf-8?B?U2pGRjZSbkQybkUwWTFwWE1vYUFWY3VjWlVoSXJPSTNNYkw2bkJMZzBJS0kv?= =?utf-8?B?ZVF5dkJYNkRVZi90dm03ZjZ3L1lad082MDM3Vks4aVRDK1VPeHdteHBCbkx1?= =?utf-8?B?MHR0R1FiQmY0Q0l4UW1hcU9RTGdENkZ5L1NsZGdRM1NTbTM2M2xlQmpNOC9N?= =?utf-8?B?UzBmTE9YVW1ZalBXd05ka05aUzNxaXZlTlR6V0Z0YksvcFRnNFlhSjlwQ3ha?= =?utf-8?B?bkU2M0d1a28zVGdURzdLaEtja1YwOVFBOVQ3TSt2ZG0vdmNFRDBCQmlkSHZM?= =?utf-8?B?OVhUU1ZhOXBQQnJvSEZOTWN3SVJVRUFCZVJMaVFPS1NzY2VSU0piQmhCTFBK?= =?utf-8?B?ZER2Sm1DTzlJVzgvbDZudEFSUlhXQ1dGckF3SXZ0cUVzWXFiNFQyOUtWN0Jl?= =?utf-8?B?bXhyUkY4d1BKb21ZWno5c2w1YmxuYWFkVjZXZnVFSEJNLzhUSVVZVkpFU2tp?= =?utf-8?B?NlpRM1cva0VrK3pBZUtQVmRrU0VBPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(36860700013)(1800799024)(7416014)(376014)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:00.1912 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 77c0da49-42a2-4b3e-c7f6-08de5cc7f46e X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023DA.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR12MB5755 Received-SPF: permerror client-ip=2a01:111:f403:c107::3; envelope-from=skolothumtho@nvidia.com; helo=PH0PR06CU001.outbound.protection.outlook.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424346000154100 Set up dedicated PCIIOMMUOps for the accel SMMUv3, since it will need different callback handling in upcoming patches. This also adds a CONFIG_ARM_SMMUV3_ACCEL build option so the feature can be disabled at compile time. Because we now include CONFIG_DEVICES in the header to check for ARM_SMMUV3_ACCEL, the meson file entry for smmuv3.c needs to be changed to arm_ss.add. The =E2=80=9Caccel=E2=80=9D property isn=E2=80=99t user visible yet and it = will be introduced in a later patch once all the supporting pieces are ready. Signed-off-by: Shameer Kolothum Reviewed-by: Nicolin Chen Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Tested-by: Zhangfei Gao Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/Kconfig | 5 ++++ hw/arm/meson.build | 3 ++- hw/arm/smmuv3-accel.c | 59 +++++++++++++++++++++++++++++++++++++++++ hw/arm/smmuv3-accel.h | 27 +++++++++++++++++++ hw/arm/smmuv3.c | 5 ++++ include/hw/arm/smmuv3.h | 3 +++ 6 files changed, 101 insertions(+), 1 deletion(-) create mode 100644 hw/arm/smmuv3-accel.c create mode 100644 hw/arm/smmuv3-accel.h diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig index 97d747e206..c66c452737 100644 --- a/hw/arm/Kconfig +++ b/hw/arm/Kconfig @@ -626,8 +626,13 @@ config FSL_IMX8MP_EVK depends on TCG select FSL_IMX8MP =20 +config ARM_SMMUV3_ACCEL + bool + depends on ARM_SMMUV3 + config ARM_SMMUV3 bool + select ARM_SMMUV3_ACCEL if IOMMUFD =20 config FSL_IMX6UL bool diff --git a/hw/arm/meson.build b/hw/arm/meson.build index aeaf654790..c250487e64 100644 --- a/hw/arm/meson.build +++ b/hw/arm/meson.build @@ -84,7 +84,8 @@ arm_common_ss.add(when: 'CONFIG_ARMSSE', if_true: files('= armsse.c')) arm_common_ss.add(when: 'CONFIG_FSL_IMX7', if_true: files('fsl-imx7.c', 'm= cimx7d-sabre.c')) arm_common_ss.add(when: 'CONFIG_FSL_IMX8MP', if_true: files('fsl-imx8mp.c'= )) arm_common_ss.add(when: 'CONFIG_FSL_IMX8MP_EVK', if_true: files('imx8mp-ev= k.c')) -arm_common_ss.add(when: 'CONFIG_ARM_SMMUV3', if_true: files('smmuv3.c')) +arm_ss.add(when: 'CONFIG_ARM_SMMUV3', if_true: files('smmuv3.c')) +arm_ss.add(when: 'CONFIG_ARM_SMMUV3_ACCEL', if_true: files('smmuv3-accel.c= ')) arm_common_ss.add(when: 'CONFIG_FSL_IMX6UL', if_true: files('fsl-imx6ul.c'= , 'mcimx6ul-evk.c')) arm_common_ss.add(when: 'CONFIG_NRF51_SOC', if_true: files('nrf51_soc.c')) arm_common_ss.add(when: 'CONFIG_XEN', if_true: files( diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c new file mode 100644 index 0000000000..99ef0db8c4 --- /dev/null +++ b/hw/arm/smmuv3-accel.c @@ -0,0 +1,59 @@ +/* + * Copyright (c) 2025 Huawei Technologies R & D (UK) Ltd + * Copyright (C) 2025 NVIDIA + * Written by Nicolin Chen, Shameer Kolothum + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +#include "qemu/osdep.h" + +#include "hw/arm/smmuv3.h" +#include "smmuv3-accel.h" + +static SMMUv3AccelDevice *smmuv3_accel_get_dev(SMMUState *bs, SMMUPciBus *= sbus, + PCIBus *bus, int devfn) +{ + SMMUDevice *sdev =3D sbus->pbdev[devfn]; + SMMUv3AccelDevice *accel_dev; + + if (sdev) { + return container_of(sdev, SMMUv3AccelDevice, sdev); + } + + accel_dev =3D g_new0(SMMUv3AccelDevice, 1); + sdev =3D &accel_dev->sdev; + + sbus->pbdev[devfn] =3D sdev; + smmu_init_sdev(bs, sdev, bus, devfn); + return accel_dev; +} + +/* + * Find or add an address space for the given PCI device. + * + * If a device matching @bus and @devfn already exists, return its + * corresponding address space. Otherwise, create a new device entry + * and initialize address space for it. + */ +static AddressSpace *smmuv3_accel_find_add_as(PCIBus *bus, void *opaque, + int devfn) +{ + SMMUState *bs =3D opaque; + SMMUPciBus *sbus =3D smmu_get_sbus(bs, bus); + SMMUv3AccelDevice *accel_dev =3D smmuv3_accel_get_dev(bs, sbus, bus, d= evfn); + SMMUDevice *sdev =3D &accel_dev->sdev; + + return &sdev->as; +} + +static const PCIIOMMUOps smmuv3_accel_ops =3D { + .get_address_space =3D smmuv3_accel_find_add_as, +}; + +void smmuv3_accel_init(SMMUv3State *s) +{ + SMMUState *bs =3D ARM_SMMU(s); + + bs->iommu_ops =3D &smmuv3_accel_ops; +} diff --git a/hw/arm/smmuv3-accel.h b/hw/arm/smmuv3-accel.h new file mode 100644 index 0000000000..0dc6b00d35 --- /dev/null +++ b/hw/arm/smmuv3-accel.h @@ -0,0 +1,27 @@ +/* + * Copyright (c) 2025 Huawei Technologies R & D (UK) Ltd + * Copyright (C) 2025 NVIDIA + * Written by Nicolin Chen, Shameer Kolothum + * + * SPDX-License-Identifier: GPL-2.0-or-later + */ + +#ifndef HW_ARM_SMMUV3_ACCEL_H +#define HW_ARM_SMMUV3_ACCEL_H + +#include "hw/arm/smmu-common.h" +#include CONFIG_DEVICES + +typedef struct SMMUv3AccelDevice { + SMMUDevice sdev; +} SMMUv3AccelDevice; + +#ifdef CONFIG_ARM_SMMUV3_ACCEL +void smmuv3_accel_init(SMMUv3State *s); +#else +static inline void smmuv3_accel_init(SMMUv3State *s) +{ +} +#endif + +#endif /* HW_ARM_SMMUV3_ACCEL_H */ diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index 985dfb345f..95d44f81ed 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -32,6 +32,7 @@ #include "qapi/error.h" =20 #include "hw/arm/smmuv3.h" +#include "smmuv3-accel.h" #include "smmuv3-internal.h" #include "smmu-internal.h" =20 @@ -1882,6 +1883,10 @@ static void smmu_realize(DeviceState *d, Error **err= p) SysBusDevice *dev =3D SYS_BUS_DEVICE(d); Error *local_err =3D NULL; =20 + if (s->accel) { + smmuv3_accel_init(s); + } + c->parent_realize(d, &local_err); if (local_err) { error_propagate(errp, local_err); diff --git a/include/hw/arm/smmuv3.h b/include/hw/arm/smmuv3.h index d183a62766..bb7076286b 100644 --- a/include/hw/arm/smmuv3.h +++ b/include/hw/arm/smmuv3.h @@ -63,6 +63,9 @@ struct SMMUv3State { qemu_irq irq[4]; QemuMutex mutex; char *stage; + + /* SMMU has HW accelerator support for nested S1 + s2 */ + bool accel; }; =20 typedef enum { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424411; cv=pass; d=zohomail.com; s=zohoarc; b=aiXILALbm0Z8qPG6IdsA9lIVkw0mYbjRpSZ3UL/fUorEKJLzJLmyLOKBnowyfRcuQA+HIEeKhJUERfnwZaH3uQBqV6ean26ySiZ/iXLnvFhf4WZxz/4jPKpuhLQay1/gU+yF4UhYm5BLySy3JAkWhlH+P3qiwRVJODrciARxJvk= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424411; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=8wuORsJgSJ1EOp2fzKSUJZ2s6IuItU3PMCcW8TNslek=; b=ON0ogMd49GJ4a8aq0keglgJ3Y8Vq+Q00hQPFpo/guVAoTjKA8cVSQmhaUFtOHcGlRaEVrdRWugPFmFTI8FxTLZ30h7jhcFXRzrFm4c84aoUddTF07ufTX5mGMppn9xK2QQ6fHqKRGENHmwWqv7igzP6i4+xv9/GGI2zqv05OvN8= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 17694244118756.0485182497973256; Mon, 26 Jan 2026 02:46:51 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK5u-0007Cs-7D; Mon, 26 Jan 2026 05:45:18 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5q-00079I-Af; Mon, 26 Jan 2026 05:45:14 -0500 Received: from mail-westcentralusazlp170130007.outbound.protection.outlook.com ([2a01:111:f403:c112::7] helo=CY3PR05CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5o-0005WT-PI; Mon, 26 Jan 2026 05:45:14 -0500 Received: from BL0PR0102CA0043.prod.exchangelabs.com (2603:10b6:208:25::20) by DS4PR12MB999076.namprd12.prod.outlook.com (2603:10b6:8:2fa::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.11; Mon, 26 Jan 2026 10:45:07 +0000 Received: from BL6PEPF0002256F.namprd02.prod.outlook.com (2603:10b6:208:25:cafe::25) by BL0PR0102CA0043.outlook.office365.com (2603:10b6:208:25::20) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.14 via Frontend Transport; Mon, 26 Jan 2026 10:46:25 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF0002256F.mail.protection.outlook.com (10.167.249.37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:45:06 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:55 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:50 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=AYplx+3KCy2/2KEGLorpfY4ducIRhZXe964+vwDvdzOUUHj9KmO+f2LIxV8h2vKmz56TKT22fzo3NgtOkeWnPjZusUaHj7wLsA8NZSGO9yWT7XHDPqC3wPZDfHuP1SHhoZIECUtzDovvOSkQ7t8N8LooOVYQYZblDe9mmzXXRvqMii1bjgKs65n5td34d4fcH9YMmvUFS3W+MWpJY2ZI/G+8G9CAuNCflpL85+JwJK9S9RnlzN8d4oxzzj6l4KtAm77xQooi8F1xmjVr2EPUiMgRf9RdR3dEmL4/gD3ej9gXuXuifMlw6QVRfe9n5jbeHLp4m2FZlWwXe1Rbfgf4pA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8wuORsJgSJ1EOp2fzKSUJZ2s6IuItU3PMCcW8TNslek=; b=KBski4CEchpwiT4RtRimYeE74TaB9Rdc6IS2s/xJUNqPMvEukSBMuqFejX54xrIrheUQ0Fc+xNENNCjHTKOVN1i4UYvF4MrdD0wWAHLgK+guWXTvxnep0Ki7m9C9AcwuCciuVyIOV5fULvFtxxZ34D6tJF4dI069LmKaQSa4NlkdxMgoxsyQda/SXzzm0ewQ81XUc2NoF83UGnOFUQLLb58gHez70rxUQzVWnr1S+ll5Q1bMXadtZFSwdMTxo6BqLm4Z8gRWEeXM25lg3iDim3adOEHNYSH8dCtj4XCMxe0w9M3bCCP5PjskJLZfz9dDfKjiF07b+x3t3UGNOuHj6A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8wuORsJgSJ1EOp2fzKSUJZ2s6IuItU3PMCcW8TNslek=; b=SnA1h1GXYv4MOdPWq7K8oULNAi484Jx/Qyqc6kZRQRJnpAi4rRoBuQyIGc5qWAm/z2G0hMO4pPab1jlfoqJhtvWKjWn2lgbrd8x0bpJTeihv1rXe/7ZyKd3tLGaJSilFF7LmNPHOLAFUVAyICwhJ+6URdlVZw+x+da+7xPKtiBBQoHZl6OxHjAy8z5MqL+MDic+JNWTRHHb5LnIP5b4zCcELb6rBEre2N79jDJAmZm2yoDrfBQ0QnHzD/ZzjrGA9+pwQzLdUJ9KMfYTObvjBYRNBIsTV3RgzaK109UlomJ2hqPGsBDlcHxvGmHnFPpD45TFcY/wF7TglDKNhnvjoxA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 06/37] hw/arm/smmuv3-accel: Initialize shared system address space Date: Mon, 26 Jan 2026 10:43:03 +0000 Message-ID: <20260126104342.253965-7-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF0002256F:EE_|DS4PR12MB999076:EE_ X-MS-Office365-Filtering-Correlation-Id: 288f066b-de3d-4033-8fe9-08de5cc7f876 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|7416014|376014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?4zE6FqbECohzTH8wEEdYZrzvZunXpHOJkkLRwPap5yHAZd6ts2txJ4f/1C6S?= =?us-ascii?Q?ckb7PO/1jX3k8+nJ8zhpyN3w23y6zQdCbbDWIp93PQsF75dcADoJlHvcQXgT?= =?us-ascii?Q?pmsKbAS8qQY4xGcHVVTeMmZY3JXHIG45lv5cZlaGtdyBFvL8F4Qp9R7z1XFv?= =?us-ascii?Q?ASBDCOKLBSqTN6bpCJ7UZUVtU8N45Dz8Zo8p1TW5M/8tIvAO6FozxXCn7DQ7?= =?us-ascii?Q?udhe5Eu+mV0xfxTeOP99sB84/Obljef8lliO2r8C2Aw8AN0ZcQyXCP4iZFUx?= =?us-ascii?Q?9WGlFjhSFItN97nldbOsV3DLWkiFnX1V/nHHFvPu2nLfltGdBMeWb+heMVlA?= =?us-ascii?Q?8JaNq19WMYGNRW0QUV+AA5247vCKva7lN5AsfWTt4c9AF9ziM4LNjpcPNVNU?= =?us-ascii?Q?ELUTDSjnsF43YWd6MCAV4zNEOGLyZXq6FHyB0P0JInvIn+CAEgPpmoS3iCnw?= =?us-ascii?Q?xA1D5zlgAaJUTRoRCdLI48yOyXTwUT0hknxMaL8aydLj6hKo+A+5CsflgXh8?= =?us-ascii?Q?RZWQ2XQobPcFna/rY9dA3ppmiGD54bh7BSxHq35p0m2efQ8wVNhlOU4kcD/8?= =?us-ascii?Q?Xyd3s1tq3UXrGKM0FxGxO09WgwK4unC1nnVWq+I5yTFVxmPDszxBddOviQtd?= =?us-ascii?Q?6+AbKiwleGj4lKkhLCOTctkLkUEQyejyWpMTyTtqFNPAFf6zUF15KVtNAnO/?= =?us-ascii?Q?5HvcjYw5nwxmczj68kKnQOxUpl4Dc73PJpBnckrAH/z24U+TXALt5gpfsrWe?= =?us-ascii?Q?sUYZfPX5S8LgfYZuwaRzPKy/ek9yIJj0rtumO6AtmUrQZ8CDBIDYukCIhVrk?= =?us-ascii?Q?ePCt8vddG2Tfmj9LPtzIdqHtvDAPY0ZckYXsxePpDAZ0W1oz+Yn6wQSOk8AU?= =?us-ascii?Q?t1vwWQ7moL/Pe41Nc7moyHw2WDKhh0PYnW6/ebT+JJ7RKZijW/JyCHmRIm7U?= =?us-ascii?Q?76N5zC1Iv7NV8Lz55ozlB7Ba6nhrzFR9tT2SEeCYdNFWU5aLi4A9Db6MWhXj?= =?us-ascii?Q?wwMP3Af7PQs3AMPoDckyjA191QCbCsL0q0mYh2CFnuG1hcsnYogQNgxroI3E?= =?us-ascii?Q?/qz0QgMc+helXnn8pCUA4b1KINdsjDt9UTiNU3b2J1Rm+CGBlDc/A131a3QW?= =?us-ascii?Q?HYbSkygNtgaW44+S3UJ96RjDY2HnKZ82hc2GztPGEx7z/g6PdcCiA7KqGYdP?= =?us-ascii?Q?ps9O91U3iYLPGHoL6WVpga2gQswNGtLyq+Fxcuk2xlQ6Zo15qdikh58ttojZ?= =?us-ascii?Q?dIWyYq4XSCBHi3kvW9S+cRmM38RJ8ErO5eXiiPbSVfy54xUzk4JKL19atgVA?= =?us-ascii?Q?jhMG9w1/W4pVNyvI1FNWH0OxRoKiSxREcy7SofOvRtMLmFGGOmb2iQsjn3rG?= =?us-ascii?Q?svQpfWwkKpdgC1TLRxpx0Hf/JPptrBku6kpsSf/ZhYKTwIMbxozbLr1EM/1Q?= =?us-ascii?Q?TOcQsK+5ZYEZ/AXS69B3GOrh/bvrEqCIcMaRiXh8grbxKcUczBXxfGaHoigq?= =?us-ascii?Q?SLJHDe5aSXqXbM6fNoaoFtjPpEU2ralD0VOJ8xgC+bZyu57MiJwCNwr5b/vy?= =?us-ascii?Q?nnBNWs2S0GdqWf50YbmLu1pxsAZJJZQ0IIv14jg6lD+ZjWRfelryur1om8zf?= =?us-ascii?Q?uRW+lV4pfn/Qx3pBgaxkSQ2CS+6seCXECqHSZ5vrKUd8oKl4CT+PIqV8rcA4?= =?us-ascii?Q?llQBKw=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(7416014)(376014)(36860700013)(1800799024); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:06.8174 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 288f066b-de3d-4033-8fe9-08de5cc7f876 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF0002256F.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS4PR12MB999076 Received-SPF: permerror client-ip=2a01:111:f403:c112::7; envelope-from=skolothumtho@nvidia.com; helo=CY3PR05CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424413698158500 Content-Type: text/plain; charset="utf-8" To support accelerated SMMUv3 instances, introduce a shared system-wide AddressSpace (shared_as_sysmem) that aliases the global system memory. This shared AddressSpace will be used in a subsequent patch for all vfio-pci devices behind all accelerated SMMUv3 instances within a VM. Sharing a single system AddressSpace ensures that all devices behind accelerated SMMUv3s use the same system address space pointer. This allows VFIO/iommufd to reuse a single IOAS ID in iommufd_cdev_attach(), enabling the Stage-2 page tables to be shared within the VM rather than duplicated for each SMMUv3 instance. Reviewed-by: Nicolin Chen Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Tested-by: Zhangfei Gao Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index 99ef0db8c4..b2eded743e 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -11,6 +11,14 @@ #include "hw/arm/smmuv3.h" #include "smmuv3-accel.h" =20 +/* + * The root region aliases the global system memory, and shared_as_sysmem + * provides a shared Address Space referencing it. This Address Space is u= sed + * by all vfio-pci devices behind all accelerated SMMUv3 instances within = a VM. + */ +static MemoryRegion root, sysmem; +static AddressSpace *shared_as_sysmem; + static SMMUv3AccelDevice *smmuv3_accel_get_dev(SMMUState *bs, SMMUPciBus *= sbus, PCIBus *bus, int devfn) { @@ -51,9 +59,27 @@ static const PCIIOMMUOps smmuv3_accel_ops =3D { .get_address_space =3D smmuv3_accel_find_add_as, }; =20 +static void smmuv3_accel_as_init(SMMUv3State *s) +{ + + if (shared_as_sysmem) { + return; + } + + memory_region_init(&root, OBJECT(s), "root", UINT64_MAX); + memory_region_init_alias(&sysmem, OBJECT(s), "smmuv3-accel-sysmem", + get_system_memory(), 0, + memory_region_size(get_system_memory())); + memory_region_add_subregion(&root, 0, &sysmem); + + shared_as_sysmem =3D g_new0(AddressSpace, 1); + address_space_init(shared_as_sysmem, &root, "smmuv3-accel-as-sysmem"); +} + void smmuv3_accel_init(SMMUv3State *s) { SMMUState *bs =3D ARM_SMMU(s); =20 bs->iommu_ops =3D &smmuv3_accel_ops; + smmuv3_accel_as_init(s); } --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424541; cv=pass; d=zohomail.com; s=zohoarc; b=kwBmiChXTY9/D8dGQNP1mMdESLkzn7toYRZuLjtskTpue4HDnjY9fxowEOMd4781ehEyAigRVTVrfmv8Y3RP+08REBSuOkIN/j3dyMJvRCeyy0oVOEEG3RuQyC8a89E0I9IXEiVhoqn7rpMIRbj/vHQAshoe+7RhxwyrDc6bxUc= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424541; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=5zdsbSiBZWdnVa6W/nOPXnMkvGsScBnWnKlk/LxrCt4=; b=kybWW4pPJF/xbpfvwhF+4kNmEXHNlkKnDzNf+y0w9+6d7kXAA/j5bHSA1DrRBPTsTInaSmb7XiXDyUkuP+hVfO0EIBatyuFSyFR2rCRoK458n1NNPUJ81d9EC5nrg3Kp5Ek7xwJr6RbnDn8UZ7YvyP0Q75lz82joRI3QYts5oac= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424541912894.01555655883; Mon, 26 Jan 2026 02:49:01 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK5v-0007EG-S0; Mon, 26 Jan 2026 05:45:19 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5t-0007C1-5N; Mon, 26 Jan 2026 05:45:17 -0500 Received: from mail-eastusazlp17011000f.outbound.protection.outlook.com ([2a01:111:f403:c100::f] helo=BL2PR02CU003.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5r-0005Wx-PC; Mon, 26 Jan 2026 05:45:16 -0500 Received: from SJ0PR05CA0172.namprd05.prod.outlook.com (2603:10b6:a03:339::27) by PH7PR12MB8156.namprd12.prod.outlook.com (2603:10b6:510:2b5::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:45:10 +0000 Received: from SJ1PEPF000023D3.namprd21.prod.outlook.com (2603:10b6:a03:339:cafe::73) by SJ0PR05CA0172.outlook.office365.com (2603:10b6:a03:339::27) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.6 via Frontend Transport; Mon, 26 Jan 2026 10:44:39 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023D3.mail.protection.outlook.com (10.167.244.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:45:10 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:00 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:44:56 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=VoVLF1DQHlgR2cIjksoRLM0GBw8uwT09rtIZjG7wyISlLqPsBjNpfvBfIVxCefPIVLaSRtr8jXZWI3L7qjMjLZtXhTet6/gdFrp+FuMHgGlogxPWpUiYq2EjsZLYPkmy0G72+fbzkIRIuEdhR9Nqgck3fCKwNIlSDTGgtdnPZdMRQgnFfgIvFD6jqbZSQL4K3yjqff+CFMCRo93dA8yGnqFI3wK8YHpJltLh5s61an5Z8tyU0ExgjhC5AYkgs3csIWKsVquzLeos70b5IrXx3rgDz8VZn6zsCBZP8Ynam6pOTVK5LPAi33m1hMZ1VYSL3gCFRXaHIncQOvrj9btZOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=5zdsbSiBZWdnVa6W/nOPXnMkvGsScBnWnKlk/LxrCt4=; b=QdiAP2BURsI+apJ04EVfXYrSvzXLfzo9msa62y+Xdct0JZT/qaX3jNASojEPoO1HC1ZzVeAkgyCLi2zGaWL9mmpYNZoG0aDvxtMRfsTBxKuBuNOqewFbaiS3mXj0DW7nYNP9OjWHNAkYToH11nixaqbZW/j/8Ga2UiTmdGnCvtTSVylcSmytX3H4cg37xKSeMj9PNED3RiQ7kU1GO4ebSf4GcuXdt+JvxI+CirPub3QGZCtGGPiRlhcMxnI9NXBH9SDNNmgf5WLeaCQjMpBbJbLov8boiM7G4i87Dk3RaSZaMINlaYrmNHcIi4GphxviTEsoBMVkGQgfwI4O3RGuTA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5zdsbSiBZWdnVa6W/nOPXnMkvGsScBnWnKlk/LxrCt4=; b=gKCYefOeRI6MCAvDZZ2pdGZuwhK2fjPovKWKuYrNiauGlhmyXm6gVHJ/Zul9axMx8yHBHfLvNYZo6LmOUFX2O0HCoiVQEzB7dLlgSwckRa61hcdUhu1hMJN67dnph5nDnlgJGARprVdYgkrhodWxp96vz/L0Udgnjbb5xLoilRnlN9wbdwIMSE3y5eGiXz+VVIP911A+UseXSBTWQ4FBpj76ZHtDy7DTfxSekb+aVUD22eBdRC6eg+otHT6UNondysRf61JXKkw7n4akFnzUjTU3XR7kS7KzFcZAXPKncTxH9oCoTQkqp0AV5UxtffP9h8vkciRLGYghWvX6SrvLow== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , , "Michael S . Tsirkin" Subject: [PATCH v9 07/37] hw/pci/pci: Move pci_init_bus_master() after adding device to bus Date: Mon, 26 Jan 2026 10:43:04 +0000 Message-ID: <20260126104342.253965-8-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023D3:EE_|PH7PR12MB8156:EE_ X-MS-Office365-Filtering-Correlation-Id: 609204ed-1704-4dcd-a661-08de5cc7fa47 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|7416014|376014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?Gs5WJTRY/mi9stKeFRPV8evmyjLDQhqGi1rQBDJJxhdZWNAlEeLaAjkGy0WK?= =?us-ascii?Q?1Pa416GqnGD6fjcUblf036JGJYiAq3sORkUzalMuZuvJ452uMWNy445PDJau?= =?us-ascii?Q?TqdCRjCHAiFN9sSj5NBdLhaIKE4w/ZrrJbKTq41emilNdbR9QtXp8cylcWp4?= =?us-ascii?Q?yHsUCy/0X1pKyhBqkyUgphm+/lECnLERf5pkWnQFdeKwA8C7J3dBln5g52qE?= =?us-ascii?Q?W0pLYkt7GKVD4KZ6NCUCUh2nFrSrBKNwC/7bkPd062qkVdiaS5KLaz7XqXvu?= =?us-ascii?Q?EhEBD6WLNkX1u13TJhvH2qj0t0Ilx14oXWr2Ve1uWAkRfrj2vmmLDOIKyoLi?= =?us-ascii?Q?XpipR6cOjfl9H6ieig/JFHicJ0q+lypdRwhqsyX0WABP5cVqM+VYZoaudHJT?= =?us-ascii?Q?Q5VPt7JeGINX4m9yPjZlCDB+NeYx0mnivDHkstUMg1q/CpR0vRz/vbqJKSIK?= =?us-ascii?Q?1Y1C3jFLP6tBLA/E/YELuc8s1WT9fALvF6GmiCDLDtM27CI5ioKQpVfqRRVT?= =?us-ascii?Q?N6v8ikOL5lAQu3F/xGEWqmAhR3OKBr/oqejaIFjiuMGKP+Izh2hvn/yrk345?= =?us-ascii?Q?oxmK82YmC5W1zJBW5VfUdDw3PpY6x4UPcALm5A6XLt6ZZz6bvaqSsANNuntY?= =?us-ascii?Q?WqD1OEYdIZFKfBuJ7FeyPdve5eI060+6aiQdnWH5aaj/j7L9o2WZbp4mNBcN?= =?us-ascii?Q?kTN/hTp0kuiAW/jpamC4+3UXpn2uiWkTSeOpTf+qSIYlnclCTtcxoBMfrGTE?= =?us-ascii?Q?cvGSQo4NK0TSPQ/cXuHwjc0HztfLueFg7NhFy+FSDm4uDSz3ZBhPXvxDCokF?= =?us-ascii?Q?fmX6c64ptEy58pCPl0EPqqPn2XLBcEPnhAKCOPNFpOWXjKH1nQQbbXxcnya3?= =?us-ascii?Q?eKTwk5iPugOA+D8k+L86kIi8ismiYoLeYxyba2gOksXU44M+IYcDjqx1eR+t?= =?us-ascii?Q?xR9C1QfkvvHx0wT+hPjlj4VfTE5IyByH+NS30sGef1+RX47xzQ5Yu+fAULr3?= =?us-ascii?Q?ngPDdvg8HCic7jW2SsS5W+g7dzExSfR7/0aOspSZzRE3OpJ67VOvenFEYF4Y?= =?us-ascii?Q?BiAdIYVyMBVWUjLFiVG0gxv9wGi22e2yRh9VlxVAveOmBFpXpiP+zpLxcCXy?= =?us-ascii?Q?7IxmEDFQ6rppMA6Hr0jmTqqVCOXh9lfHQDOEF78uwyEs3OiYmYeYQolFyHw6?= =?us-ascii?Q?VufywpQ2quaupl42ZcK0jAgYfGNfSQOQLxMFPqAwllN1FKuRUbNLmcPtEUjQ?= =?us-ascii?Q?aPZzEwhH8fO7Q06f2v6b0FsJd3NeSh0SmXJPVzSfWmA3b7C2IictF9LzjSCt?= =?us-ascii?Q?ePzxFwqjyKs8j3Wdq2R/N/WR3D7NQwEbXMs4usHhIga1x30luMFSre0JpBif?= =?us-ascii?Q?GyTdieM0MvT3BvIE7MZrksEZclGgibOCG0TdtnU6klQZhKw0fLeKNuzUlOF9?= =?us-ascii?Q?B0GK3MJJ2oZ9DY2oIdgMO2bEu9sZ7M1OVspKhPvudr+pNK8rmM0rzDj+KLny?= =?us-ascii?Q?BUr3SVgVYLXsssu1jcYHeFjXZN8YGQIH/R1B9BdnsMw/PaA0RudL7jXjbzyf?= =?us-ascii?Q?kLlIGxizAzMF1LID4qVttcUSYbS+4Go7OFkfjYiXwzjUAbeNkekql34ARiZE?= =?us-ascii?Q?RYR0gU9Icd6zy/N0kG7wGjY1UJlbtX8BzcX2yp3h9UeR52WrlQolxF+v7sF3?= =?us-ascii?Q?fgIffQ=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(7416014)(376014)(36860700013)(1800799024); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:10.0113 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 609204ed-1704-4dcd-a661-08de5cc7fa47 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023D3.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB8156 Received-SPF: permerror client-ip=2a01:111:f403:c100::f; envelope-from=skolothumtho@nvidia.com; helo=BL2PR02CU003.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424544550154100 Content-Type: text/plain; charset="utf-8" During PCI hotplug, in do_pci_register_device(), pci_init_bus_master() is called before storing the pci_dev pointer in bus->devices[devfn]. This causes a problem if pci_init_bus_master() (via its get_address_space() callback) attempts to retrieve the device using pci_find_device(), since the PCI device is not yet visible on the bus. Fix this by moving the pci_init_bus_master() call to after the device has been added to bus->devices[devfn]. This prepares for a subsequent patch where the accel SMMUv3 get_address_space() callback retrieves the pci_dev to identify the attached device type. No functional change intended. Cc: Michael S. Tsirkin Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Reviewed-by: Nicolin Chen Reviewed-by: Michael S. Tsirkin Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- hw/pci/pci.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/hw/pci/pci.c b/hw/pci/pci.c index 8cbf5f5d70..229ea7cfb1 100644 --- a/hw/pci/pci.c +++ b/hw/pci/pci.c @@ -1381,9 +1381,6 @@ static PCIDevice *do_pci_register_device(PCIDevice *p= ci_dev, pci_dev->bus_master_as.max_bounce_buffer_size =3D pci_dev->max_bounce_buffer_size; =20 - if (phase_check(PHASE_MACHINE_READY)) { - pci_init_bus_master(pci_dev); - } pci_dev->irq_state =3D 0; pci_config_alloc(pci_dev); =20 @@ -1427,6 +1424,9 @@ static PCIDevice *do_pci_register_device(PCIDevice *p= ci_dev, pci_dev->config_write =3D config_write; bus->devices[devfn] =3D pci_dev; pci_dev->version_id =3D 2; /* Current pci device vmstate version */ + if (phase_check(PHASE_MACHINE_READY)) { + pci_init_bus_master(pci_dev); + } return pci_dev; } =20 --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424459; cv=pass; d=zohomail.com; s=zohoarc; b=a+0LV4p8/qGC4HrYt7bNKF2oYamiK8uI0QRpDWePaapiy/GTl1EvjyM9pnCC+99058/ANSevUopG1cy+Z4q0B57D2PaLTiDETZ+FhKuWlww+ghmc6e2nGvweY8gSqVBgkW0BnTZGKa0h2euhhXHHJJy3mUU6LGXLIOTh75/YR3U= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424459; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=dfL78QxawWk1kmmyGUPbMSftSkIGNd2UokE738ZQNM0=; b=Y2rlFXV2c+OWWbRO2Bd+FaotOHe78kM1BzyhML3e5HXLukDahvaT/8R2Mz0Yey75fotsmjlIiLIBZzClnvQXt4ELoVl1oYs6//moIT5o+SxhxcIwkzLtPCwqjdq7uWhE9u4oSaO1aaTALfpXDKIWCUY8iOK7yGzBcCESX1oQBQs= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424459242373.6628401271963; Mon, 26 Jan 2026 02:47:39 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK74-0007qo-21; Mon, 26 Jan 2026 05:46:30 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK60-0007Fh-PY; Mon, 26 Jan 2026 05:45:31 -0500 Received: from mail-centralusazlp170100005.outbound.protection.outlook.com ([2a01:111:f403:c111::5] helo=DM1PR04CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK5z-0005Xp-7n; Mon, 26 Jan 2026 05:45:24 -0500 Received: from BL1PR13CA0222.namprd13.prod.outlook.com (2603:10b6:208:2bf::17) by SJ1PR12MB6217.namprd12.prod.outlook.com (2603:10b6:a03:458::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.9; Mon, 26 Jan 2026 10:45:17 +0000 Received: from BL6PEPF00022570.namprd02.prod.outlook.com (2603:10b6:208:2bf:cafe::9) by BL1PR13CA0222.outlook.office365.com (2603:10b6:208:2bf::17) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.6 via Frontend Transport; Mon, 26 Jan 2026 10:45:13 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022570.mail.protection.outlook.com (10.167.249.38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:45:16 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:05 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:01 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=rwop5/tiSDAVgR+1/LHWuWQyyWFrTrvYrya5RJ6b5w1IK1MjaXl1KwDehfVjraigzr8EMyAVxkrYsRqclD0/5C+u5LghIDBiquu79ZfX8Ee0LQSMQO6HrMcobkl6MTtgNEVOW8pJpK4cgh2mBNqH2Cnwoepve7UyEqoHalOkJ7R1KS9MF7JIm72YEvL3cqC6jYYdyQIc2GpQ7KrPkEhL2B2AJsd3KT/Rv+ZRjCoEZIAEmYio5KpcR885ICVuK5l+4Aw5MPPb8VGzUyJlgcjMOVxcABks3FbFtpfRV0ooHTEbGqL5puR+VoTrym6dCJt2+jEFZhSOjT+QxESe2LIXsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dfL78QxawWk1kmmyGUPbMSftSkIGNd2UokE738ZQNM0=; b=g369MvMSYbdoj5a2fs1l5iz1H7nA+0qY1HDTQuxLX4JhLFkm7uh128JuNGXkjh2apzjx+hDp8yCdf/m2ngHsI7CMj7KcuxfBqc1XxsOJaWsHjeDoZ0tZ8w0wfSXzaCLK4n9T0UPUg0VGXS6xAHqN755ZZvzLBgPusH1ehJ492zC/DGmRKR50hqdYPO3G6VDnWU15UHRQIEIxUO0BxmKmLJpyMNLLW/9hNPJfdl+pB5iCfOfjGgEz6gYe4JpqpRJHWXEtthNAZaHHNjdvbtQDlfJ28ide6K9hO4P7ym5EMqKzl9biy0NTy71Ncj/ts2j/4EnJk3OfMUP0vBs4ToOfUQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dfL78QxawWk1kmmyGUPbMSftSkIGNd2UokE738ZQNM0=; b=WvfyvHLNaRrTA5LgwQmRmkdazd7pI3ZCENIcpK+zZA3fOx3Qcspe9HBjxrbhujSE42AGYR3lXoKesEJ1ZUIEpy5CvOtKUohhVPGeJj+Soc4See1E56ytgsBmO5s6B8CRCVuzxk+UDmSb6lvB+6K/Ze9E2EPXKIabHRwqi2Kjh2ZTMHxU8fpLKLNqOQUqWDpYZlumrtOOPSXZ+iw9LcZ0apfJO0DwOUQn4FdBbBkD35YP3vpvRS+/XHnLkmmWwOqkRGPXFi035pn3/x3A4eVci8I8M/XsbQoei5k68bn3S9n01T0KluWU9VoUY9kW8GSuv4HqrOVQZo2FwC7xWGsFWA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , , "Michael S . Tsirkin" Subject: [PATCH v9 08/37] hw/pci/pci: Add optional supports_address_space() callback Date: Mon, 26 Jan 2026 10:43:05 +0000 Message-ID: <20260126104342.253965-9-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022570:EE_|SJ1PR12MB6217:EE_ X-MS-Office365-Filtering-Correlation-Id: 8f0f5ff6-431b-452a-5f19-08de5cc7fe79 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|1800799024|376014|7416014|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?CSfYdmFi9ImFE5TTuT0H0AhSbFMkdDowRUHphuB2u8iE/fDIFFNclTvlrZPt?= =?us-ascii?Q?lmCspY/oD6mGTauB4+pCtJb8Z8qhClmbH3IB4R42AbPDwkCgdp05Ds7Ds+Mo?= =?us-ascii?Q?WXkPyJi3zlI5+IomZy1f1XxUl05/xCCHEmu613cwrONEd8dfUc5XTkXe+M1x?= =?us-ascii?Q?ZUc6J1ZtbthGsObtcbtAeaJSlyRw2hjtNb1eUiPluDUZ90OabjUZoZRZI3BP?= =?us-ascii?Q?cpgHidwU25PXJqSLDN7iaJjt27/3p1vBkP9v4Pf9G3wS9Dl79q8yCYecHEzt?= =?us-ascii?Q?LRLWJKOXigJkwu+2haFhP4qT6oZQ/AtEvSdPOJuKmaxAJprQcwBXBaR0ce/1?= =?us-ascii?Q?MmdLbWui3kZUdIYZAHE1l9kea91K4u4RiHyOwpfRpRLi/azwrLPG0keu8MO+?= =?us-ascii?Q?6ahrLbhgVDqwHsHpazdf+NcZxWe6pLf52ENvMSsrfc3EUTYxhzQV0eDuOgrU?= =?us-ascii?Q?8GD7cpQTslQqCMIWhCRDMVErgE7x+2pIyl/hInEZNtaCux8BQ0WOFV0tKmhz?= =?us-ascii?Q?bNCShJZYgs+wc+B2+BkPcVvh5UFbLuRi63qRQVLlGox/dh7yHZoIf/IcTtyr?= =?us-ascii?Q?NfRzIjuN660DqzAdHYEQ6Hee/4K9LnOUwHWzoDSS2m8NHbvfFcEu5Sa+YDA2?= =?us-ascii?Q?hm44fW7JEnzf8aKiZYZUXfYbCoUCxbMHhTIpg+xOax0Si1/T8rnzU+CvEPwX?= =?us-ascii?Q?fxkjKd5ZQcbGwIL0uR5yAlwUImLuxjz9RgeT86RvDVe1ecktx7+DVemQLm+i?= =?us-ascii?Q?LVtMrQmR8CDGdl8aehrSKYTnzR0/x3PnDCBfCNFWnm0NdHQppOZXuS+UDCVw?= =?us-ascii?Q?uqZNr3oyV3XQkKsLjhcCcGfdLsOYcTFHPKY5V+0nZiiy1KYS7SvKQN32SbzE?= =?us-ascii?Q?pfLf0tr3f7Kc3rXOeNgJFDpypfTrRRSKozvwzJ3iRKOO76cHoJVH0YHTctmK?= =?us-ascii?Q?bKXDNwNqIBvJq278PlF2GyOh0sMvw5ZC05yloYjRwQw2OVXsJ3UKh0WpiLH9?= =?us-ascii?Q?sU0Ey4ldkdRUFS83WQP8T1lJlFCzSN+HFXC4rKim9mTrfjQyzgjs8O7Da9tC?= =?us-ascii?Q?+QZ6/6UioPfdi6LXK+UXGGgE8NzEN0JnRMI8DYJCWgznAALQMdGwnjRENqGD?= =?us-ascii?Q?BuFIvow5LxFgf+982XDm92pr7EZfm9sGQvjPUu6ub6g7cKHpOoMfhI/KXIQn?= =?us-ascii?Q?2VL/qSYD5vkQJOjwq8rrhPgT67nJK+1GSaYAgfq1N2iJQW2il93qpObpMWi6?= =?us-ascii?Q?ycvc0BCCHrZpq0/dJ5tmAjlgr4V85vRWLlfhaijDEwPU3AuxnjSlyPvaNQ+T?= =?us-ascii?Q?EVkzXwSEUs8CGooRUYA5qzNLCpYCW9J3UakKqFTqn29wXXi1omyzj53buH59?= =?us-ascii?Q?H0Qq9/LPyFTruVnIQwSH3B4Sr8COSY/CwchXvsazhKmLFP+H14rt6P8n0SDP?= =?us-ascii?Q?VWnhA9vNE5XLe1E0Dfc/4ShCCQX8hQR6YAPpGJSPgjIjfltTwFW7x3KTdbb3?= =?us-ascii?Q?G2GuGZMVHAXNQ1HlZgdBNew+eRCQhALTld9nM86QmcCLDn9QWF4rYpCYVjrm?= =?us-ascii?Q?bXsDhHYQM8BV7+wdOSFA31r5Oret1tuQ2m4vZ0y9FDhiHQ3iDr+jWMkY7+qA?= =?us-ascii?Q?KyiglBuDhGJO2Xe2CKz/AfSGr4Y8VglgGB7RjWxywkYh972NRxV/SX2hnsUD?= =?us-ascii?Q?R8eEUg=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(36860700013)(1800799024)(376014)(7416014)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:16.8975 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8f0f5ff6-431b-452a-5f19-08de5cc7fe79 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022570.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ1PR12MB6217 Received-SPF: permerror client-ip=2a01:111:f403:c111::5; envelope-from=skolothumtho@nvidia.com; helo=DM1PR04CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424461511154100 Content-Type: text/plain; charset="utf-8" Introduce an optional supports_address_space() callback in PCIIOMMUOps to allow a vIOMMU implementation to reject devices that should not be attached to it. Currently, get_address_space() is the first and mandatory callback into the vIOMMU layer, which always returns an address space. For certain setups, su= ch as hardware accelerated vIOMMUs (e.g. ARM SMMUv3 with accel=3Don), attaching emulated endpoint devices is undesirable as it may impact the behavior or performance of VFIO passthrough devices, for example, by triggering unnecessary invalidations on the host IOMMU. The new callback allows a vIOMMU to check and reject unsupported devices early during PCI device registration. Cc: Michael S. Tsirkin Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Reviewed-by: Nicolin Chen Reviewed-by: Michael S. Tsirkin Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- hw/pci/pci.c | 20 ++++++++++++++++++++ include/hw/pci/pci.h | 19 +++++++++++++++++++ 2 files changed, 39 insertions(+) diff --git a/hw/pci/pci.c b/hw/pci/pci.c index 229ea7cfb1..101e745bd5 100644 --- a/hw/pci/pci.c +++ b/hw/pci/pci.c @@ -135,6 +135,21 @@ static void pci_set_master(PCIDevice *d, bool enable) d->is_master =3D enable; /* cache the status */ } =20 +static bool +pci_device_supports_iommu_address_space(PCIDevice *dev, Error **errp) +{ + PCIBus *bus; + PCIBus *iommu_bus; + int devfn; + + pci_device_get_iommu_bus_devfn(dev, &iommu_bus, &bus, &devfn); + if (iommu_bus && iommu_bus->iommu_ops->supports_address_space) { + return iommu_bus->iommu_ops->supports_address_space(bus, + iommu_bus->iommu_opaque, devfn, errp); + } + return true; +} + static void pci_init_bus_master(PCIDevice *pci_dev) { AddressSpace *dma_as =3D pci_device_iommu_address_space(pci_dev); @@ -1424,6 +1439,11 @@ static PCIDevice *do_pci_register_device(PCIDevice *= pci_dev, pci_dev->config_write =3D config_write; bus->devices[devfn] =3D pci_dev; pci_dev->version_id =3D 2; /* Current pci device vmstate version */ + if (!pci_device_supports_iommu_address_space(pci_dev, errp)) { + do_pci_unregister_device(pci_dev); + bus->devices[devfn] =3D NULL; + return NULL; + } if (phase_check(PHASE_MACHINE_READY)) { pci_init_bus_master(pci_dev); } diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h index 6fd8984c99..ddb0c98e9f 100644 --- a/include/hw/pci/pci.h +++ b/include/hw/pci/pci.h @@ -417,6 +417,25 @@ typedef struct IOMMUPRINotifier { * framework for a set of devices on a PCI bus. */ typedef struct PCIIOMMUOps { + /** + * @supports_address_space: Optional pre-check to determine whether a = PCI + * device can be associated with an IOMMU. If this callback returns tr= ue, + * the IOMMU accepts the device association and get_address_space() ca= n be + * called to obtain the address_space to be used. + * + * @bus: the #PCIBus being accessed. + * + * @opaque: the data passed to pci_setup_iommu(). + * + * @devfn: device and function number. + * + * @errp: pass an Error out only when return false + * + * Returns: true if the device can be associated with an IOMMU, false + * otherwise with errp set. + */ + bool (*supports_address_space)(PCIBus *bus, void *opaque, int devfn, + Error **errp); /** * @get_address_space: get the address space for a set of devices * on a PCI bus. --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424460; cv=pass; d=zohomail.com; s=zohoarc; b=PjUocdmwtH918ogt/VkCYvGU14Taa6yYRi6g3s7C9rfIxj1zGaoXHqm/hBJLVKrm0lNhXrzOZ6tqd0x/Q1o0eu/7dRmCjCfTxe+X9Ear+IqbWpmCqU4Bx4qbQiHUMFgiEgkKqWrPXv+3fG0ELDBvlSQ81/vrzkww9SiOrjrAD98= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424460; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=vtOUfsa1VCInpnm7XuU/uj+SqVHRjuzwS6zpRaRNLIY=; b=gg0JQHZqfeYKJZSKOlxe1A5eE7O63YDGoaqvlo7jwIM5vZgdzKr+As6aAvTjT5+iiwze1YCzek0rbeLULybAmMaKkyIqkkV5rqVZhu1cUR6BRpOgo06jxXlLeDve3ln+gRr0J0K2JtBTynUbf3qiSPgYzuoyUFDoWxUHy9Kpk5Y= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424460964184.78085252538892; Mon, 26 Jan 2026 02:47:40 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK75-0008BA-3V; Mon, 26 Jan 2026 05:46:31 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6C-0007K4-Q9; Mon, 26 Jan 2026 05:45:42 -0500 Received: from mail-northcentralusazlp170100001.outbound.protection.outlook.com ([2a01:111:f403:c105::1] helo=CH1PR05CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6B-0005YY-BG; Mon, 26 Jan 2026 05:45:36 -0500 Received: from BLAPR03CA0170.namprd03.prod.outlook.com (2603:10b6:208:32f::17) by DS7PR12MB6141.namprd12.prod.outlook.com (2603:10b6:8:9b::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.11; Mon, 26 Jan 2026 10:45:27 +0000 Received: from BL6PEPF00022572.namprd02.prod.outlook.com (2603:10b6:208:32f:cafe::9c) by BLAPR03CA0170.outlook.office365.com (2603:10b6:208:32f::17) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:45:27 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022572.mail.protection.outlook.com (10.167.249.40) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:45:27 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:11 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:06 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=bFgI6fLtb5Mg9/PMj8WSNJFc7kBJJyY6Q+1f/qEZNaEEnPjBRNixb1W3dV0sORADU5maAas4NSlvyPGH9waQwz4h+I/2ebbkcJ2CFPlGU45EfkHvt6Ck7WSm9mR3eO835PC0AxNsA5jCPWqpma/minVMxYU1NwuMGIHzrmQyVh7m10EfxsMbfrR1ULVFyOgzhwwjILM20SWMcNcRprl7OlYPpDAbm1BDRh3mtW0bqf12GfbOic1o742PIyHDPX78hNA5fhnkGvI42Z80NnJ5wqTTZ8Qfi0qKB5a12VIDA1IrnbDIGfQcjg6dNN4cnGNbenDkZmTdhjIcePGIk4gTvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vtOUfsa1VCInpnm7XuU/uj+SqVHRjuzwS6zpRaRNLIY=; b=BWOpCL+HAHs83b1hqrnso70I1Foeaw/NoV4Nj6cm6V9Dq13H6aXjeGnPwYYGTuXwv+YyzpNdjCaOa/7pORGpio4oDuhCgLlJ4VumkQuwuU98HQyhdvfqydA/XBiZqXyApAmAFdhbCfrJFvR2RreKMteUYbhrSYItH9XhFNXQ5gQlq6mdsitO4Ug1EnOab4h8rgprdJzDCeEvd5lUrldWju4jXpdxvpgNDkQ1w7zkwJtpNF62ZiON0IDOPEjiUr46iIb+WPtiOeoXz3J1Q8r1IWgCi2qCN/s6QIZgkLHrXLYQJngm4//bclpiTgOGMLfY0AG6HXkspLFqcaMiOnNXOg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vtOUfsa1VCInpnm7XuU/uj+SqVHRjuzwS6zpRaRNLIY=; b=WORGlen0fYDL22EkfFuWOawQUNeeXjA8UofJTbfJtMkjFqwdpdqu6tBRvuLsMwI+5b+jJDpkZ9PzmTehkW9FpcngqO62mWzFV3Uns2EmZzUWEEnq2Q0u7pEjW4EAsAzi9qvPcBdmmTlgjrVLLDwd1mIyJlldd0h0yNKmD8wt99x8AXoZta7nowAf1eHYnZKC0TX1bOGv1yIVy4hRSu7Ibr81Ho0gVl6XeeQ3JRfSVgJI5i/1+khGlBLivWsit4ZYRbCyrcPU2VoVX99lyByO3Yead8T2fqYTu8jSq2D8Vw7kQBfxWHCNEcewnb8OqDXpw4WOg2tJJzOWB/qHgaU3QQ== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 09/37] hw/pci-bridge/pci_expander_bridge: Move TYPE_PXB_PCIE_DEV to header Date: Mon, 26 Jan 2026 10:43:06 +0000 Message-ID: <20260126104342.253965-10-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022572:EE_|DS7PR12MB6141:EE_ X-MS-Office365-Filtering-Correlation-Id: d11e670c-20f1-47e2-8035-08de5cc804ab X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|82310400026|376014|36860700013|7416014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?jhLIFL224bLVdAZ6aZEhwBN4TqwfSel5tkCMJ2EO8xUkOs+OhHbVMFMmhPTw?= =?us-ascii?Q?4BY8p162lfRCCccPOtVwT7jXRs4cMPO7aLblROVxqJlYCGV8Mq+sWiIh8tWw?= =?us-ascii?Q?RH7fwxHdMEfHkq+5QUFdw6VEfZt/pm4u+3WFVq3SCxyZSVR744cxgRl2+Q16?= =?us-ascii?Q?2R0bI2uEti8/GTm+93B0xNvbMskG4iaQEss/Ex4n44C+fIqMpZkMQCsy+H1e?= =?us-ascii?Q?gcCHf4MS5Qch5/c7TZ/L9nm7cQeQcT7LcbIuTR4m/Yoly0PuAGh9R711h4mn?= =?us-ascii?Q?sceBMkc3y411KtxnMqg4bm2IfbZTi1PV0bPbxzqJL8kFPzP3u6BsLTXJ9wCu?= =?us-ascii?Q?yJtvnJoA66cvudCkJ9gqEeP3HgGEXpNtTArJOY7NmPRFbiRCBDocwXdhTbg/?= =?us-ascii?Q?45moMWLmMZM2C6NTbwtHG7fyEuPKoftajGd8o0uaNNOpJg067iE534wtoq1s?= =?us-ascii?Q?sf+jn/E/l4bKWHT49gnkpQwE4kgbceJG7rb2aEybaXIPgL+zm38G0rqERVMu?= =?us-ascii?Q?gvsCImWDFXraQGDwgVDd/OfglE8HaoIgcOLiNPMx3FqhInDS2lCs9Ldpa3KO?= =?us-ascii?Q?1qDqkIKHk15ZUtZrPXhEDO9B7544PgJqW8/U97tCvnQ1AmF7ibwxinFzpj+N?= =?us-ascii?Q?52EgN0+sQ640s7wnKdcnylXPUhPGRoLnTJVx7dr9/cYwQldIFA4UN7cXg1YL?= =?us-ascii?Q?oh5J0by4a3PbFuL732pLLIGYZIF03wj+oSdOXlu4Lp7DW8M75PSC5rGvHVgU?= =?us-ascii?Q?WTS8/7O7n5QmNfBBrGo/R0U98O2suu9ZBtC/NwinwWlbRu0D1/Z2p+WIYEwz?= =?us-ascii?Q?r06KaGc2H/Q0CEjQXP/On/RnzfrRTe5wcEWFLJ8MLUfh959eaDolTCJBPgrL?= =?us-ascii?Q?tHENk4r/Bus0XZ8M7O5fArtArLGoTMVfEd3QG96uKK5ifsRj3GVcC49qTQ8w?= =?us-ascii?Q?BlJ//oGuSIsSofDvmgU2IBjjJpiQpA8cVhi/fEyOszt2pe+umfM68ko4/OFb?= =?us-ascii?Q?WiXNoSveSBI0d8ADz5ESVnus1NyzTEZDzUuUR5xDmAmGgiNubBqyw5+ADAY/?= =?us-ascii?Q?677gRfIpgvnHfPyLGwEPwph0HL7WznnkbZfN7tbSIbK/HApy3ht1z2OcUp9c?= =?us-ascii?Q?AjD4pyOzmikDOCnW+Itwn3ikd1637knMFBf3axzD4ZINd4As8336ZaNDOBmO?= =?us-ascii?Q?jn37tblF/BFtlKjQF0nSYAUPB3xGMSOvyczoRxhPAGhqj7Bl/92RkWpBJPGk?= =?us-ascii?Q?sMURxGC2mcjmmtHAQDpoWCjzmkzfhH6r5QXzaRnGpEu4T2ETmuku48NW31Gj?= =?us-ascii?Q?fAvuQUfYbHOHvcYWfWXyPe667NA9R53vGpzMCPtejCoh7aLVCexLWmYFUnh+?= =?us-ascii?Q?Id3Ofk/3UuuqsWhOR+jEqWC2g5yjWz1S53KVNZobZqTGaIDXSADT0fKORO5k?= =?us-ascii?Q?efoFiW+RQ+h8tjNU600WfOAhRIlLNouCgDUvVBq0GKXV7+hQJdSvRAnQ+p1L?= =?us-ascii?Q?XYbO76efq/BARcdJXp8ohX7acvTgML2u4FE70D+fwfw4ZF96AtXKS6bYGH0f?= =?us-ascii?Q?s1WEL59MfJ4EVD5Ledi4El1fR9esOc1miESGofVYb7od3roiAUhBkCjni6EL?= =?us-ascii?Q?j5PNAqqUx1ZkEI28Wch9Af/bsFpEi+E0GfM8mgexWAaaAlQQn0RSbcloiJEJ?= =?us-ascii?Q?uSYXoA=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(82310400026)(376014)(36860700013)(7416014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:27.2917 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d11e670c-20f1-47e2-8035-08de5cc804ab X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022572.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR12MB6141 Received-SPF: permerror client-ip=2a01:111:f403:c105::1; envelope-from=skolothumtho@nvidia.com; helo=CH1PR05CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424463497154100 Content-Type: text/plain; charset="utf-8" Move the TYPE_PXB_PCIE_DEV definition to header so that it can be referenced by other code in subsequent patch. Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Reviewed-by: Nicolin Chen Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- hw/pci-bridge/pci_expander_bridge.c | 1 - include/hw/pci/pci_bridge.h | 1 + 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/hw/pci-bridge/pci_expander_bridge.c b/hw/pci-bridge/pci_expand= er_bridge.c index 08d40aa2ea..b6e2eb7969 100644 --- a/hw/pci-bridge/pci_expander_bridge.c +++ b/hw/pci-bridge/pci_expander_bridge.c @@ -48,7 +48,6 @@ struct PXBBus { char bus_path[8]; }; =20 -#define TYPE_PXB_PCIE_DEV "pxb-pcie" OBJECT_DECLARE_SIMPLE_TYPE(PXBPCIEDev, PXB_PCIE_DEV) =20 static GList *pxb_dev_list; diff --git a/include/hw/pci/pci_bridge.h b/include/hw/pci/pci_bridge.h index a055fd8d32..b61360b900 100644 --- a/include/hw/pci/pci_bridge.h +++ b/include/hw/pci/pci_bridge.h @@ -106,6 +106,7 @@ typedef struct PXBPCIEDev { =20 #define TYPE_PXB_PCIE_BUS "pxb-pcie-bus" #define TYPE_PXB_CXL_BUS "pxb-cxl-bus" +#define TYPE_PXB_PCIE_DEV "pxb-pcie" #define TYPE_PXB_DEV "pxb" OBJECT_DECLARE_SIMPLE_TYPE(PXBDev, PXB_DEV) =20 --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424405; cv=pass; d=zohomail.com; s=zohoarc; b=IK0/1kCSEyNcqR9MuY0LG7MC+q8OO7Zi6NMptVexlqP48HgoqSIiNgwk8uCfJzri6bzbhhIIKB44I+rAHe3aMF0QNPhkByd64c+XuAknNGC14huw6mJOx1vAjuEdXpoS2pu5VteqMOwU2tylJChSnfS17wLrj8LyXEs+P/GWpFw= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424405; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=0Bhp2dmPHJ0YgWIRTcoQHpWneYWyVs7+X8bO0sf7bS0=; b=M63cFc0nsa7bgfqQSgWp8il9UGuw9uGNNc3lKsmrU8xLn5UxV9c+UgzZ8ogVxXIUg3A7gsaUcrRm66oMHEe3mnZ5fFB50IlbzzuD7CmK6caxJOVY9q75EO98R8IWSZETrCtRUaOGCnwrMGLW9Os/rwClRdDq0TxG0tuPnwq5KQ4= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424405671572.4545321165733; Mon, 26 Jan 2026 02:46:45 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7B-0000iV-Sq; Mon, 26 Jan 2026 05:46:39 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6J-0007Ns-RW; Mon, 26 Jan 2026 05:45:50 -0500 Received: from mail-westcentralusazlp170130007.outbound.protection.outlook.com ([2a01:111:f403:c112::7] helo=CY3PR05CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6I-0005Z5-0Y; Mon, 26 Jan 2026 05:45:43 -0500 Received: from BL0PR01CA0004.prod.exchangelabs.com (2603:10b6:208:71::17) by SJ5PPF09E5F035B.namprd12.prod.outlook.com (2603:10b6:a0f:fc02::988) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:45:34 +0000 Received: from BL6PEPF00022573.namprd02.prod.outlook.com (2603:10b6:208:71:cafe::25) by BL0PR01CA0004.outlook.office365.com (2603:10b6:208:71::17) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:45:18 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022573.mail.protection.outlook.com (10.167.249.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:45:34 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:16 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:11 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=K+RAU81iR2/nh4af7Y0TfC7sEHkRnsr+lXFkRroqgZRL9HCmb34GxrHtQLwcIb4b3fXRxhfiv7MT8tA6eQPNE4k2rPD+o2Fyj7iJ/msT2qloHwkfRL0uw2DtH2zIacDRJKWHE6ZIXzJLPz/Ne41vsklfdukcqO+iBl9hwlhVy1jUaxOCutExTJU5QXneApqMUKsqrkoz2wT+tx+9phG1kZvyhFt45MbVkA1lOlZ8WNkub245exQxi1vmjWV1HCpvGscazRk0DbbNt5Khy5vcgi8JXeLPn31CixiS37JCzUWp+wIWYzQl72yiR01rC3qddYZUwYiN/brVg8qyVg8G5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0Bhp2dmPHJ0YgWIRTcoQHpWneYWyVs7+X8bO0sf7bS0=; b=MeppukrndZQB+F8jXldB1itZaRVnHisixL2ECA3aWAKIFyJgae3uCTEIYatBSwy715OvSF7KtqX6vxigWZbyT7Ck3z7gVzvR0GxSB+4Nab3idUOR+uED4EVCmhKH8lO8f51QHGQCOc1ja62YG/m+8PFGl+0UkmI+J9edUVajbr8d3X06f8epJFZqcCu/hdTONV7bgVbXOeEAnEBsTb7qOIy49gmnS4V+WwCIdYuHA++PV+FUGPqhwMvZ/yyD8u48c2p8I+QF6cxfkZH2xmN8eW9dvEYSI9gLiUmPnqfLLX1bbf/Qrf/fukrtln5TUhDCcL2V8Uzf5IzXbKRFWy1TdQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0Bhp2dmPHJ0YgWIRTcoQHpWneYWyVs7+X8bO0sf7bS0=; b=qD+cSN8Y12lt+cLPuydGHDLiBwXfldwDXOPu3xLnfTp0jmQ9NZCrYKOmD2C5fz04p/saKWiWyUsUeDUPX2b+0TrR2sQvcK0++tDMURvahsS3jvukGjLpqXzSm+dpzCRSZb50OAYqAQZYAMlxYpnnfM2S0g8UR09Rs+hL9pyo7EVK6w3SRO0M6bHutBp7BebIqDNPRH/Aboorygulwu+6cFPsUlK7EoEQzOEt1ZJznLQLdGWCCYfjIb/D0B1BCOqzMbVB+De0U85IPFIITzdv3IzpDXo83y25Q92aaRkFea7FWLXpJ9p0wuT9TPzwFcQawordQTCw26jZo54YYmmt2A== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 10/37] hw/arm/smmuv3-accel: Restrict accelerated SMMUv3 to vfio-pci endpoints with iommufd Date: Mon, 26 Jan 2026 10:43:07 +0000 Message-ID: <20260126104342.253965-11-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022573:EE_|SJ5PPF09E5F035B:EE_ X-MS-Office365-Filtering-Correlation-Id: e81615af-7c5a-40ef-5395-08de5cc808df X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|1800799024|82310400026|376014|7416014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?a2RKalVFUkdNVHlDU2lka0dXSzhFL3Vpb0tBOUhiaTBrVXI2SG11NFVlbkQx?= =?utf-8?B?NUpCK3I4ZjFOTGlxdHIrZDd5czQvdVppejRqTmxaZnRudjBCN1hlUEJscDVN?= =?utf-8?B?M1Fod2Zsd0twYnRGL0xtaVBCd3B2YXFmOGlYT3VLcDNxSnB2K01YcjliSFRH?= =?utf-8?B?UFlkRW56aGRKVVdhNWlKSGswVkpFQnZ2L2IzY0F5U3JWeHF5YjJwN0FWdEdW?= =?utf-8?B?R2NRV3gzY3FsdjVpa081Mm9IdmVZZzY0L1QwWUg4dHlKYUUxc3RJZ2UrWllC?= =?utf-8?B?ZUI5OUd6a2FLSkxKTjZibzcrQ2R4S0pWdHpySHNOTkhlSUhGdUlXMlBES3Zv?= =?utf-8?B?WUtqcnA4Wm0xK2hCa3pLelVoTUduVHhTb1N2bE1aekw5NFVjaUhnN1JhNkNZ?= =?utf-8?B?QXJ2UkZBVnpmeWx4L3NKYjlmWTBnZnRxTTJVQ2x3Vk92cE5HNEJiZndwVG9O?= =?utf-8?B?U1ZLN3dSYzRTQ3JiRmtHRlJWOG9sdXYzOFhmM2lwMWFoWHg2WGZ4SkhuRlhE?= =?utf-8?B?WGcvZVkyQzNkWU9QcXVSS2lrMDBTQmVKRDJVK1RmbTl4Y1dyK21Lb0JrZUkz?= =?utf-8?B?RkZlOXE5Ri9Yb3F4dTd2ck9nRFhhTTJDREJhL3FwL2g3WDE1VzFjdnU1dlBy?= =?utf-8?B?a1Q2R1lsQjQzMW5RdGgrdTFRd1Jza1oxb0JDS24yS0VIb0F5bFVTbzJlZlQx?= =?utf-8?B?YkhzZjlSaGVQcERyZ3VmMWhVS1pxY0N5UUtKMlJjR1NXODhraHB0RE84QlZT?= =?utf-8?B?cDUzM3pib2ZaMlpKYjRHK2RSYmhLODR5K0JnYzZaT3E5NFNNWDFIUmlwUEVO?= =?utf-8?B?YlBVVzNSOWtuUEI5QU5zVFgzOXFJcmp2WjRqSXFFNU9qUUdzM1M0YlJ3TGFY?= =?utf-8?B?bjUwOFg5LzdHV0h2VUIzSlVJc2ZiQ3hSb0RwTnVNZ1RaeEU2dDNiOEZjSFFP?= =?utf-8?B?TW1DRHZ1VXR1bnlJRWVrTjFGN1c3WXdaZm9FOTBwYkZIYWhWblRsSHBhRGtn?= =?utf-8?B?SnUya285S3FvK2kvNjZlTXdqVXZoOHF5c2hqOVJSS1hienlTelVDbkRwWkNu?= =?utf-8?B?S3BFYlM4VmdhWHVEUEVIM3ZKT2FMUkJ2cHUrczVOVU9WRHdJT1Q1K29ld1Y1?= =?utf-8?B?dXIrNWlEQlZqOC91U0U5ZGxHaWpWRTVzdTN2YWd3UlFIZGJOdGRlRjgxNTMv?= =?utf-8?B?MStCNkJ5V0VoK0oyUWc0VTNLWHlPcHJHdjhyYVdrSzkzZ0pJQWFvb29hTHBR?= =?utf-8?B?ZEpodU5DT0NWSzg1aU13SXVWOUJGNFpNa3BBb3B0T0dCN3Y3bDFmKzg2c0sr?= =?utf-8?B?cWJBZzNVb2ZtbFEvbTk5R0NzYVJ0NmUrQlp1WDhwNDhNZDQrRm5qQXl4SUgw?= =?utf-8?B?QkRsUERoSmR1MW8zWC9EQzFpbC9xRkhiSTBYVnQwa0ZJa2IycmxIRHp6eWEv?= =?utf-8?B?RlRkWG5QbXlqbVpGV3BrM3lEUUpEN1BNYmdLelZqdDdlaVppRVJ2OGptNEVr?= =?utf-8?B?ZTdadUhjeGFPVncyeFgybHRrejlqNXhvdHhPcEdjLzZySEF4UW5ZU2dKUVhH?= =?utf-8?B?MmdHbittWXRMYWlLK1ZLeitUY3FCdTBkV1ZVNnFwcXF2TlFNVThuWDlpN3Fj?= =?utf-8?B?UTNXOVRhWExiY1NhWkxaaXUwUVhYVzUzU2I1MEFIS0JSMklKeFlvQnltSWRX?= =?utf-8?B?Z0RodTZVOWZORWxpRHJtUjE2ZkdNRzlUQWUweWJXKzl3Y1FCaE4wNkpOODNh?= =?utf-8?B?YmkvekZHQ09ERDBmeXlIdHdQdldRSzlndHdjWk5OcFY4Y3o3bVhGQWJNNUJ5?= =?utf-8?B?TUFzb2dPYms4RFplVEdHa0xTd1dhWEx6YVFUY3l2bzEvWkNXWkZCMmJSVGY5?= =?utf-8?B?QjZZeU01djZteVREN1dKNUkyZ3V0NC9JWFJIZzN0aVVXWHlhMHdGbi9hcTNX?= =?utf-8?B?WDZTMFBSM1dENGxxd05FNk9hM1pYd3hwQ3dwczNJK0UyaERTUGkydXpaeEc0?= =?utf-8?B?bjVqTzVUR1pPVW1yamUvNUhGL1B2T3o2azR2dXI4eEYrVHN4dEdyQ1BFRC9Y?= =?utf-8?B?TDNlb2FQRGxXMXJQaFZ1QzJML2l0S2c3ajlxaEZmYmVvSmsvaHZQbmdFMkFO?= =?utf-8?B?U0ovcUcrMVFzUEtVUnMvWmYyYnhJMHFWLzFrRmVpRXFUeXcyUzU3NitiOHlB?= =?utf-8?B?aDVyMWFueU01OWZwRmFnVUhIUVZsYnhTaGF0Q3N6Z2dQRXNORTF4RHFxbURY?= =?utf-8?B?dXpmWXVhU0Rld2xFUzVJREdxMjNnPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(36860700013)(1800799024)(82310400026)(376014)(7416014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:34.2813 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: e81615af-7c5a-40ef-5395-08de5cc808df X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022573.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ5PPF09E5F035B Received-SPF: permerror client-ip=2a01:111:f403:c112::7; envelope-from=skolothumtho@nvidia.com; helo=CY3PR05CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424407684158500 Accelerated SMMUv3 is only meaningful when a device can leverage the host SMMUv3 in nested mode (S1+S2 translation). To keep the model consistent and correct, this mode is restricted to vfio-pci endpoint devices using the iommufd backend. Non-endpoint emulated devices such as PCIe root ports and bridges are also permitted so that vfio-pci devices can be attached downstream. All other device types are unsupported in accelerated mode. Implement supports_address_space() callback to reject all such unsupported devices. This restriction also avoids complications with IOTLB invalidations. Some TLBI commands (e.g. CMD_TLBI_NH_ASID) lack an associated SID, making it difficult to trace the originating device. Allowing emulated endpoints would require invalidating both QEMU=E2=80=99s software IOTLB and the host= =E2=80=99s hardware IOTLB, which can significantly degrade performance. A key design choice is the address space returned for accelerated vfio-pci endpoints. VFIO core has a container that manages an HWPT. By default, it allocates a stage-1 normal HWPT, unless vIOMMU requests for a nesting parent HWPT for accelerated cases. VFIO core adds a listener for that HWPT and sets up a handler vfio_container_region_add() where it checks the memory region. -If the region is a non-IOMMU translated one (system address space), VFIO treats it as RAM and handles all stage-2 mappings for the core allocated nesting parent HWPT. -If the region is an IOMMU address space, VFIO instead enables IOTLB notifier handling and translation replay, skipping the RAM listener and therefore not installing stage-2 mappings. For accelerated SMMUv3, correct operation requires the S1+S2 nesting model, and therefore VFIO must take the "system address space" path so that stage-2 mappings are properly built. Returning an alias of the system address space ensures this happens. Returning the IOMMU address space would omit stage-2 mapping and break nested translation. Another option considered was forcing a pre-registration path using vfio_prereg_listener() to set up stage-2 mappings, but this requires changes in VFIO core and was not adopted. Returning an alias of the system address space keeps the design aligned with existing VFIO/iommufd nesting flows and avoids the need for cross-subsystem changes. In summary: - vfio-pci devices(with iommufd as backend) return an address space aliased to system address space. - bridges and root ports return the IOMMU address space. Reviewed-by: Jonathan Cameron Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 77 ++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 76 insertions(+), 1 deletion(-) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index b2eded743e..2fcd301322 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -7,8 +7,13 @@ */ =20 #include "qemu/osdep.h" +#include "qemu/error-report.h" =20 #include "hw/arm/smmuv3.h" +#include "hw/pci/pci_bridge.h" +#include "hw/pci-host/gpex.h" +#include "hw/vfio/pci.h" + #include "smmuv3-accel.h" =20 /* @@ -37,6 +42,48 @@ static SMMUv3AccelDevice *smmuv3_accel_get_dev(SMMUState= *bs, SMMUPciBus *sbus, return accel_dev; } =20 +/* + * Only allow PCIe bridges, pxb-pcie roots, and GPEX roots so vfio-pci + * endpoints can sit downstream. Accelerated SMMUv3 requires a vfio-pci + * endpoint using the iommufd backend; all other device types are rejected. + * This avoids supporting emulated endpoints, which would complicate IOTLB + * invalidation and hurt performance. + */ +static bool smmuv3_accel_pdev_allowed(PCIDevice *pdev, bool *vfio_pci) +{ + + if (object_dynamic_cast(OBJECT(pdev), TYPE_PCI_BRIDGE) || + object_dynamic_cast(OBJECT(pdev), TYPE_PXB_PCIE_DEV) || + object_dynamic_cast(OBJECT(pdev), TYPE_GPEX_ROOT_DEVICE)) { + return true; + } else if ((object_dynamic_cast(OBJECT(pdev), TYPE_VFIO_PCI))) { + *vfio_pci =3D true; + if (object_property_get_link(OBJECT(pdev), "iommufd", NULL)) { + return true; + } + } + return false; +} + +static bool smmuv3_accel_supports_as(PCIBus *bus, void *opaque, int devfn, + Error **errp) +{ + PCIDevice *pdev =3D pci_find_device(bus, pci_bus_num(bus), devfn); + bool vfio_pci =3D false; + + if (pdev && !smmuv3_accel_pdev_allowed(pdev, &vfio_pci)) { + if (vfio_pci) { + error_setg(errp, "vfio-pci endpoint devices without an iommufd= " + "backend not allowed when using arm-smmuv3,accel=3D= on"); + + } else { + error_setg(errp, "Emulated endpoint devices are not allowed wh= en " + "using arm-smmuv3,accel=3Don"); + } + return false; + } + return true; +} /* * Find or add an address space for the given PCI device. * @@ -47,15 +94,43 @@ static SMMUv3AccelDevice *smmuv3_accel_get_dev(SMMUStat= e *bs, SMMUPciBus *sbus, static AddressSpace *smmuv3_accel_find_add_as(PCIBus *bus, void *opaque, int devfn) { + PCIDevice *pdev =3D pci_find_device(bus, pci_bus_num(bus), devfn); SMMUState *bs =3D opaque; SMMUPciBus *sbus =3D smmu_get_sbus(bs, bus); SMMUv3AccelDevice *accel_dev =3D smmuv3_accel_get_dev(bs, sbus, bus, d= evfn); SMMUDevice *sdev =3D &accel_dev->sdev; + bool vfio_pci =3D false; =20 - return &sdev->as; + if (pdev && !smmuv3_accel_pdev_allowed(pdev, &vfio_pci)) { + /* Should never be here: supports_address_space() filters these ou= t */ + g_assert_not_reached(); + } + + /* + * In the accelerated mode, a vfio-pci device attached via the iommufd + * backend must remain in the system address space. Such a device is + * always translated by its physical SMMU (using either a stage-2-only + * STE or a nested STE), where the parent stage-2 page table is alloca= ted + * by the VFIO core to back the system address space. + * + * Return the shared_as_sysmem aliased to the global system memory in = this + * case. Sharing address_space_memory also allows devices under differ= ent + * vSMMU instances in the same VM to reuse a single nesting parent HWP= T in + * the VFIO core. + * + * For non-endpoint emulated devices such as PCIe root ports and bridg= es, + * which may use the normal emulated translation path and software IOT= LBs, + * return the SMMU's IOMMU address space. + */ + if (vfio_pci) { + return shared_as_sysmem; + } else { + return &sdev->as; + } } =20 static const PCIIOMMUOps smmuv3_accel_ops =3D { + .supports_address_space =3D smmuv3_accel_supports_as, .get_address_space =3D smmuv3_accel_find_add_as, }; =20 --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424576; cv=pass; d=zohomail.com; s=zohoarc; b=NzuP4CFjIzoU5lqMzz5Cgl6FjhcMiqtVwlmRShNdFZqCJZmzf/Vrr/KRXR+4ZykUoKPvzIOHRY4p67AjG6DHOzxb65FHdubB+X3Awz0IqrjOYPXrRHa9Yw42JiMUFUymcUzfDrTenknGfdBqup43jQ5CBlNrSGTGFiI4apQKSZ0= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424576; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=AcUeHppzCyKZe1Ws3ggNg1sFEVuDRyqBUlnhaoF/oVg=; b=jo0ECKNRqsFvM49kvFs4zqMactUQQMW9Y26ZIk5lEO4jCCrRN8LhZ1ItOdGeyseRwZTkT7tN+ocsOzp39R5mfm6RlGxul8A3za/CvMTWtCo1W4r7fZqmgj3+L+oS/yX6hPcamgX7nukvVcBJQAsZtb3y/Ajz6a3MtR3sY7+FnDs= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424576086855.3521619350213; Mon, 26 Jan 2026 02:49:36 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK77-00005g-CG; Mon, 26 Jan 2026 05:46:33 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6R-0007Ok-AD; Mon, 26 Jan 2026 05:46:05 -0500 Received: from mail-westus2azlp170100005.outbound.protection.outlook.com ([2a01:111:f403:c005::5] helo=CO1PR03CU002.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6P-0005Zd-VA; Mon, 26 Jan 2026 05:45:51 -0500 Received: from BLAPR03CA0152.namprd03.prod.outlook.com (2603:10b6:208:32f::16) by LV3PR12MB9142.namprd12.prod.outlook.com (2603:10b6:408:198::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.9; Mon, 26 Jan 2026 10:45:40 +0000 Received: from BL6PEPF00022572.namprd02.prod.outlook.com (2603:10b6:208:32f:cafe::e2) by BLAPR03CA0152.outlook.office365.com (2603:10b6:208:32f::16) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.15 via Frontend Transport; Mon, 26 Jan 2026 10:45:34 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022572.mail.protection.outlook.com (10.167.249.40) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:45:40 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:22 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:18 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=trFVDrOm0gvZ28u+RgktBi0i6E0Xevamf4I5pJq//b/umM7NhnlBNdC699hBH8bAdF+aI8ESWDcvq5yn26lhQu6vL3ucWCApCvvZ38vGeGR/ngwsnPDc25FonqG99O5XKyeu7fm+uXxdSuljV3aH7UFWvpwCF5rwJY6ApGuceX+PaH/7fyoVVNUCSe4NMMuxFQUxAcDHui8WRg2Ywt4PMnYd0sx6NxnTXbv+oGOb2DUzrh9hIsIGT4dPvfNRzuVU2z/HoTOhaOa+ozSb8pVO/ZWF+imk272V0qRIVfMM5NuVAMR/zC3L5iXGkFibp/rQ9JTR+UchKhPE88yWCXwS6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=AcUeHppzCyKZe1Ws3ggNg1sFEVuDRyqBUlnhaoF/oVg=; b=wu7JqZzoDf4QrZpaWFNMML51KRn3bKSN/iD+1gT2MnQ/ooayv2T34Ij35itrwoaRyZQ1I5u0QFTb51ou0XLUAjBZc7o2D8m1wtQ8+lxJUWH0YCNOX7ZuWctbZgCb4+SbZbGpJ0VNcFwQfiw6GKzAUtdE7PYgdXfZmuCi1+T4Nimm8RFTEyFELH6z6boavg7Ni4uP+GS7To01482T3E6mFSxIyuO+hjC48BE4b7WoPmK0tB+5uSGNUJwb9TAwAhR20PB8aSlH1aET/iAuLUMCBgR6A2UgCMHM51Xq5+9gVJwXsqQc6XM9mcN8zJZDJpDpRJQx5P+qTD1xLSH+9kA/dg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AcUeHppzCyKZe1Ws3ggNg1sFEVuDRyqBUlnhaoF/oVg=; b=PMvTjULBaT41HDdKO9OayjMvsvqK8kltOUpKbJRv6gCT9bQO++VuWBZL5EhHBJWSMOEGyp2ZnHMnzcwekSg6jW948jf9kgU/fIWj7io46AgW8UvqW/K9Hqcn3IUaJuHV0GhExm0IebwcYmc6k+N61DddBPdHv3/eL7lBWUPHo2n9EBoRagM9mIBBJizVTV83Q0fZZ7lOUIz0b8oxkCEq4a/Z0p1ynYtX7T31MVLZ+NOMvUaAOh1zmDV8HurtQLLWVunapsyij1FFkcrm4esft5Buznl3KN5S6pFaw7429F9J+GFphj7F0tK9pFcW+qQyNjlWHa0AaHU0cmehd0CbQA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 11/37] hw/arm/smmuv3: Implement get_viommu_cap() callback Date: Mon, 26 Jan 2026 10:43:08 +0000 Message-ID: <20260126104342.253965-12-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022572:EE_|LV3PR12MB9142:EE_ X-MS-Office365-Filtering-Correlation-Id: 7c100312-3e57-453c-8af9-08de5cc80c4a X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|7416014|1800799024|36860700013|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?v92lFfoSYxPHlLh6YtPhDxVlQrT0IIXBdD2A6UtHQ+KK39s0zB72FpoK+LUe?= =?us-ascii?Q?YhF5g8qhtdPuG8c9OOlZXSdM1eG2dXvVdkabzUbgchDHEzGA2J/tv6Dd1nZT?= =?us-ascii?Q?PDqUbOTgk/d1Ve5hR7EA4vWKtRoLdtiE3KRW9+mkuRqdaAF9wrjY4G+4n2Si?= =?us-ascii?Q?eFpoITwxI/2RqDBsQ9/83mS6yKy8lNf7q+tw+Sq/MoEVCl7o63gKqUv8lkNw?= =?us-ascii?Q?QLpCSpZY37fe+bxo6w1r6oNoM3avFIRIfXZgLn04CL9rsSeQ47AefkPuVeJB?= =?us-ascii?Q?CWqTrjECAKMPSx9CcC8SIntA3c/5ypMyHFbcVgb5VpyluR4TQ6XUphUOz2t5?= =?us-ascii?Q?KoDW3X6IRWRjS6CwUAQLTHmpKk/BqhHh5CJqpn4L2XWrcc83pGlPpep/sG9T?= =?us-ascii?Q?Jw9Seu+ujDyaiPA8BAFVFWFm/7cJ2OlS8j3UZV9lsAIVBaEW7GPLbFqlhrv9?= =?us-ascii?Q?yiLwurFhcpEw+BG0tOIBQdapvFC5FNVmWmcWgKyfnvYsg1WtbaY/i6e/rLBP?= =?us-ascii?Q?qxUx4yVmXVtrkd0fqow1lNxQVQ5q27nI/Sit7TeCts912EwrYc0KnlSvMAyF?= =?us-ascii?Q?3zgOXTiUDkYzy3kconIzM6+0G/F7fChHKOa0K/COhEMSopKyXkcT6Do2zT0V?= =?us-ascii?Q?TA81dN+BkxO2q7cJl8/rpOCHKkJJCo4UjfoORUsVNX9nWb/+Iji0vZ76FrdC?= =?us-ascii?Q?oGFZYGVsbtwDzGEKP/Cu2ZW0Tn5kVfhAbSFr4pF6iyeT72bQzqiwTDPuQtZp?= =?us-ascii?Q?jwsFSx6o25KFckBDmrv5TcVI8oecc5ib2N2KmiogAiWf1YgyApWm8VuixAOQ?= =?us-ascii?Q?emkIsejKQi/K2Ks1mKU8rS2R0DnESX8bTm347ps54EFAid7c2MNSO/YUE1V8?= =?us-ascii?Q?ieQCLW+fX8UnTMiGLjyxGQHe1XlacW9ajeLUwqTVm1KOuRmKQsrhkHXaM1fF?= =?us-ascii?Q?vdoDyiNonaHgUHqeq/y8G/+R6Qj1VH8dq8YRg9GyqmVSPwIfoCkyRiiAOaob?= =?us-ascii?Q?f8UOpK/gJsvJyymYfjG7seu7WQ3wuGBcRUc2Q+pfGbAy0JuYD8WjuSh2hkCy?= =?us-ascii?Q?pK6m+OXQrjgL+GTsb23YVm1Ff4rq3Y1e3Uc20xjKQxVimzq1pq7mTIFW2Qjb?= =?us-ascii?Q?/tcibJoIGoofqmzUNkaxEilUWilkVdixBjFAjUOaYxmgsk8LtPu4RgkMWTwc?= =?us-ascii?Q?bbW3rMiZDERGrJuYe3FRZDB/BsST21KcVThMt6HmXy9LVZ0iaD5TZ5ymlLfD?= =?us-ascii?Q?ChqHw9BopBHNSIVyBpst3KJDb6S6iLZZbAvOlWQmg4fPAzl1kYz0sFUQBHbd?= =?us-ascii?Q?N/tqcxy0FgxyLgyDZNBwG89tvnsjWIX+X3KgfCUyaxuuWOkbuNHJhDOJshZX?= =?us-ascii?Q?wbiJkE7qL3yEAL54MqTDa6wHZDaIVdhN14f5xdBQaY/NuymGQfNycByh5zvJ?= =?us-ascii?Q?6CtUgbCMo9jFAUCX1vgvn3mgRc6DTSR3pWtynFHgYsdvfKzswnqOUVfYAgx/?= =?us-ascii?Q?Il96YNcaC0bpsiUS5dy8kG41X6QTQypjPyip1GoL8/VBjTZ+gCmxtNIHafBN?= =?us-ascii?Q?WYEbI8lrVWjRtlkGwO9c4GXcnQtIf4JDMudNG1iyIMsebhTpq/+t9PHu7WX1?= =?us-ascii?Q?Pd1xqctuxxujcVvjDyqNlnn0QtcHX1pSAH+9rGmNX8BRTgzF6GCgCLY/AoPh?= =?us-ascii?Q?MJwX3Q=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(376014)(7416014)(1800799024)(36860700013)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:40.0786 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7c100312-3e57-453c-8af9-08de5cc80c4a X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022572.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV3PR12MB9142 Received-SPF: permerror client-ip=2a01:111:f403:c005::5; envelope-from=skolothumtho@nvidia.com; helo=CO1PR03CU002.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424578102158500 Content-Type: text/plain; charset="utf-8" For accelerated SMMUv3, we need nested parent domain creation. Add the callback support so that VFIO can create a nested parent. Reviewed-by: Nicolin Chen Reviewed-by: Jonathan Cameron Signed-off-by: Shameer Kolothum Tested-by: Zhangfei Gao Reviewed-by: Eric Auger Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index 2fcd301322..be09cf8b73 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -10,6 +10,7 @@ #include "qemu/error-report.h" =20 #include "hw/arm/smmuv3.h" +#include "hw/core/iommu.h" #include "hw/pci/pci_bridge.h" #include "hw/pci-host/gpex.h" #include "hw/vfio/pci.h" @@ -129,9 +130,21 @@ static AddressSpace *smmuv3_accel_find_add_as(PCIBus *= bus, void *opaque, } } =20 +static uint64_t smmuv3_accel_get_viommu_flags(void *opaque) +{ + /* + * We return VIOMMU_FLAG_WANT_NESTING_PARENT to inform VFIO core to cr= eate a + * nesting parent which is required for accelerated SMMUv3 support. + * The real HW nested support should be reported from host SMMUv3 and = if + * it doesn't, the nesting parent allocation will fail anyway in VFIO = core. + */ + return VIOMMU_FLAG_WANT_NESTING_PARENT; +} + static const PCIIOMMUOps smmuv3_accel_ops =3D { .supports_address_space =3D smmuv3_accel_supports_as, .get_address_space =3D smmuv3_accel_find_add_as, + .get_viommu_flags =3D smmuv3_accel_get_viommu_flags, }; =20 static void smmuv3_accel_as_init(SMMUv3State *s) --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424453; cv=pass; d=zohomail.com; s=zohoarc; b=a1RFzebUDgZMm1V5ZSgjphHLzFgbC6eyM+BIwJOy4ARK0ay6JQxDjfaeV+lAjebO3Ky2CpyKOAnihzcb2PX2i3SsL1m7jnwwIfGqi9XEww6PAEHHYf+VnYLebuq7PcW8bWBtBNoi/di8JD8inPJhchi/oMQ5nAE2Fvm7Osvk/s4= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424453; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=JKCfcHUMLySaKP0i4PoaBiQ/Ox+j/JOGjVfgCM+heNM=; b=ejP6dlB4Qof98B38sSKIpa/PyXH8YjjHRhkXK4ROMvpa+0sWOHGR6wfv6BtYNXdILiLX5OhKrMx6nbXgmPjGKqdJwQXuoH/3By4yWeR8RTpN13xAxcn2DZGhQarV830osSjyAr5v7D3rsCgDB7Rrro5SUaymFwE5AmTXjY7t9XI= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 17694244538571012.1758646620202; Mon, 26 Jan 2026 02:47:33 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7L-0000pL-6k; Mon, 26 Jan 2026 05:46:48 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6R-0007Ol-Ui; Mon, 26 Jan 2026 05:46:05 -0500 Received: from mail-westusazlp170120002.outbound.protection.outlook.com ([2a01:111:f403:c001::2] helo=SJ2PR03CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6P-0005ZU-UB; Mon, 26 Jan 2026 05:45:51 -0500 Received: from SJ2PR07CA0015.namprd07.prod.outlook.com (2603:10b6:a03:505::28) by DM6PR12MB4187.namprd12.prod.outlook.com (2603:10b6:5:212::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:45:40 +0000 Received: from SJ1PEPF000023D7.namprd21.prod.outlook.com (2603:10b6:a03:505:cafe::68) by SJ2PR07CA0015.outlook.office365.com (2603:10b6:a03:505::28) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:45:43 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023D7.mail.protection.outlook.com (10.167.244.72) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:45:39 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:27 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:23 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=OolpbJnDBgraDhjebVa0IwQ32vriKuYofgdfzjMUPsSrhjbGqNVkynvZcM/FELC1IOKspQrGIX4vLwHLkMKLwx6SHxaudw+t0f95EaJtVmBZMbSzstfO8Jw/0zWSBJ3/RFZZLItOQqZzK0RCYEEmPJ455xhv6F7tvSSmMYCrIJS77DSqk/Jt4t0PBgMKgv7YnHZefUptNzpuIzHxlAitbwWFaNbCjAJCK4hkxjctMIVoSrmRsmrmckbwxOeUs+4Pc0OvAMxvdJqQtsGkch29w6nevKFvABuGm+WIGMmpl26rBzvNlfyz/wiAj6TuubBs14iLxhb4xzxKSxfLyTqGrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JKCfcHUMLySaKP0i4PoaBiQ/Ox+j/JOGjVfgCM+heNM=; b=rEW4mRHg2157aL3vcdvIda8GjeVS2fyQGJ++gHbn243OukazCXv/eT3k/3khi7Q19Yb35AcB7aZOAREBiOzqlPHBOQ2xF6E4mQ4NufWdb1HTgcUq+Ej9Cs/kX7cM7VxtqWtqiXgFq3z2rz68QAd0KEZ9mTJAkAibJAidVt9INmA/9TRZi8PW32letUH85zxkVCzRFkKFznvYcRUQXHWGRejX8Wf+CmM8XVtrsYIrIKJBHsAavqmKA7f0J355IFzzsryw9IO1X6eENaMm/ayoG86DsQ67BmbXkt4hKoe1gvSMZspWmcAyOxI0t5/6K34PCJGypNJhwoPu1qbCkKqTww== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JKCfcHUMLySaKP0i4PoaBiQ/Ox+j/JOGjVfgCM+heNM=; b=de7Mz7vwioRO/B2+Sv/8rwFTc3ie1LbY3y3d0YQPfNe6UwjX/hJGul1PxF7jpvjXIMowoZ4Pv80ZVO0AOU5VI/PZ8U/vDsvKc3oQezxyaauPfXreaLnGosTVx6ngWDmXoV5OXkOPBAMvcMHtsjmOYVb1xGgBwo2aClMor+gYVSmI6rAR7cmTmaqhEZINEaO5WtL5DYpaIu2lOdtp36to/jmuxExL8Xp86uu4ijDA/dyaq17lEHhQBGCDttybNPHYoBcFaOZqNNMZ5KPF8TJKt1zGGF4rfC9pWsUStSZbneb88wa0DoOaPI0Ob820ge1IfVBPuYKqsVg1b4hfIJU5tg== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 12/37] hw/arm/smmuv3-accel: Add set/unset_iommu_device callback Date: Mon, 26 Jan 2026 10:43:09 +0000 Message-ID: <20260126104342.253965-13-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023D7:EE_|DM6PR12MB4187:EE_ X-MS-Office365-Filtering-Correlation-Id: 5e076fa9-4566-465e-5916-08de5cc80bf1 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|7416014|1800799024|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: =?utf-8?B?RWJPQmhvV3NJQnd4cjg3K1diaUxyZkJXT0Fzb1V4bmQ2WFJvMmMrbnIzQnVx?= =?utf-8?B?WnRVbHNsamhRK25EWUZ3R0FoUUNsd3lJbHNCUVlGOGlUUGg0WUdSSC91U042?= =?utf-8?B?cWhtUVBEYjlUajdZWnNZcjhQRSt0WjFCTzU5c0RZVGorQXlyQm14ckIzUDJ6?= =?utf-8?B?S3dVRjBQajRkcStnTW5zZk05clp3ZklSZFFlZmdxWVBXYlFuVTB6QTdhNm9Z?= =?utf-8?B?eTdDTVQyZXU3QjN2NlQreUM0Tm54NjZlZStYZjcyazhnRG1pNkFJa2xqWENO?= =?utf-8?B?OXdmb2pwM2krOXBxWTdmRGJPdk9tTkN1Q3BEeWhnRDNmYWd1NWsrOTVYTjRi?= =?utf-8?B?QzlydGU0Vm5BbUg1UjhDRnUyNjZiVjBCYjllakUxN2dSaElTbFdaQkxpazBm?= =?utf-8?B?TUpsbmJGbE1NVFhyVWZGUWMrY3hJTXU0MmlsU1Q5UDNRbkc4WXhucnVvQ0hN?= =?utf-8?B?V0V5cEJNTER4dSt3Mkd0YkFCRC80dFNyYXF3b0E4WU05bWtKVUY3TWxVSEMy?= =?utf-8?B?NHNpZy9wRmx3TEFNRCtlMGtvVW53SHZhclRYS3ZhSXZuN1lmOWlWbEVzRStC?= =?utf-8?B?M0VHQ1drMWxwaXVwelJkK2VveXNDNWxuRXUxRDNFUkdTR09pTzNhRFpLYzRQ?= =?utf-8?B?SGVEVlZ3d0tyeXFxREcvbmxUd0lEdVZhcjgrUnVTK2FtMEtOWFhDTlBNSXAy?= =?utf-8?B?VDlodUd2aTFpUHFOQ2QydHk4OFdWUitwWVd2RHVYQjNNR0RUMnVvdjJmK01k?= =?utf-8?B?b3o3UnNaV1p6YkoxZ1lzOEpKUGxIcmYrTXZDOVhROVFNZU40QWQ2UitRdUdz?= =?utf-8?B?U1BFT0NOZDJYdTZ3TVBTRFp2VlRaNzg1bHQ4NDhuUGUxZFZtanhLYWRjY2ds?= =?utf-8?B?Yklvb2o2aGxtMHR6VXR4aWY0d05sRXI2WWhFMzZwK1JUUVNPa0lYdjRNUnM0?= =?utf-8?B?TlJyQzRTK3A5QWVHcFZjUDBXYWx1MXFoM0hFVmswZ3pFU0dEVjlhdy9ZN0RY?= =?utf-8?B?ZXJTSjlqaUNUTzUzRXJnQk1UVEM0dW9TaVZSV2M1bUFKRmt2WjA5Ym55OFNL?= =?utf-8?B?YkZhLzJPSjRjUHVhellENks3ZHNZN1dzRjNBY0FhUkxFZ21iT2FLNW5kSUJG?= =?utf-8?B?cWx3dkptc0UxK21xbThMUnhKT3d5MmUybHhENWZIU01NTlNOcnBoMGZDem9k?= =?utf-8?B?ZkFGZEprZUZHMEUvcXVhZ2lpUFZpcmMrdUFJWUw3Rk9IY0hrSm05Z0NBQ2ha?= =?utf-8?B?ZFN2UWJ4a0N1dlpzUWtPR3RrOHBYd0l5NEJYQzdVMDJDOHprbFRQOFFZMVFn?= =?utf-8?B?OXVaWkp0Z1dnZDBJQ2lMUDIrWlgwTUpZemFTb0czaWRRK01uU0Rrd3IyQWZu?= =?utf-8?B?d0hkQkNQZFhqSDhua0Zyc2RaY0hRM2kwWFJDYjJYaVNsdzMwMmVGZm8waFFn?= =?utf-8?B?YmdlYU4yakdTcnRQaWVPSStxWDcreDZuSjlDVllqeTBuWjBoUWowWGtXRnlB?= =?utf-8?B?Znc0eXcwN2I0blh1Uk9RbjRTUnVpdDlUSFNzTlVGOWlkRUUrK2VxaVdEVVM4?= =?utf-8?B?Q3FZNDNOZlpQeWVuZ21DK1AzcTkvWi9WY0w5WmdBbDEwVENtcE9Ua1BoeFUv?= =?utf-8?B?UHFCWHlWV1NLdmVzb3d6Qzdoa2RFdG9XaG1mMFVWcVJWblNZK0doL1NFQndk?= =?utf-8?B?SXVSQ29EL1hUWkV3Q1J5QUl6YVh2by9uMEhPaUpEWGhwNUtoY1NDT1VDVVJE?= =?utf-8?B?aFFOL3UyN2lkTjNkbHlLbWNEajVmUGZFekxiUG5VVUZSYWZTVDNtaG1xT2Nw?= =?utf-8?B?MDdCK2tnQ0c5VU8wTlhYS053dTh1cHllMTRvR3VjaEg2d2tic050NUdYZEly?= =?utf-8?B?UVgwbGsxcDdlSzAwRjcyTm8xU2doZmErbkxwcW1ndEcxRzRweit1OHFxdjdl?= =?utf-8?B?SW11RUIzdFltSzFkTjZnQ09RaE1CaHJwdDlSZFNoQjRqSWUzdmRDNG1VeGlN?= =?utf-8?B?OEhJeklraks1Z1FubW1SRmlUR20wODRmcjJZR2tJN090amdqeDE5R0FhWTNY?= =?utf-8?B?bVRMZ1NJL0N0RDdIbzA0d0FqdEJQMHhFanlvZnRlZjZJZTZLODNnK1ZkdzJq?= =?utf-8?B?S1JNK0NTZTh5TGpIelgxNThHOGpTSlIwbWRNSlNxb0pROTdwQ1IxeStqeldS?= =?utf-8?B?TzQvM0wvTzkzQVZvZ05rdDFmbURYa3puZExLT29xazRPQnZGQjZvaDkwSytk?= =?utf-8?B?YmFnOGsxL1pEVkl6ejdtc1JJdkpBPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(376014)(7416014)(1800799024)(82310400026)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:39.6216 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5e076fa9-4566-465e-5916-08de5cc80bf1 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023D7.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR12MB4187 Received-SPF: permerror client-ip=2a01:111:f403:c001::2; envelope-from=skolothumtho@nvidia.com; helo=SJ2PR03CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424455796158500 From: Nicolin Chen Implement the VFIO/PCI callbacks to attach and detach a HostIOMMUDevice to a vSMMUv3 when accel=3Don, - set_iommu_device(): attach a HostIOMMUDevice to a vIOMMU - unset_iommu_device(): detach and release associated resources In SMMUv3 accel=3Don mode, the guest SMMUv3 is backed by the host SMMUv3 via IOMMUFD. A vIOMMU object (created via IOMMU_VIOMMU_ALLOC) provides a per-VM, security-isolated handle to the physical SMMUv3. Without a vIOMMU, the vSMMUv3 cannot relay guest operations to the host hardware nor maintain isolation across VMs or devices. Therefore, set_iommu_device() allocates a vIOMMU object if one does not already exist. There are two main points to consider in this implementation: 1) VFIO core allocates and attaches a S2 HWPT that acts as the nesting parent for nested HWPTs(IOMMU_DOMAIN_NESTED). This parent HWPT will be shared across multiple vSMMU instances within a VM. 2) A device cannot attach directly to a vIOMMU. Instead, it attaches through a proxy nested HWPT (IOMMU_DOMAIN_NESTED). Based on the STE configuration,there are three types of nested HWPTs: bypass, abort, and translate. -The bypass and abort proxy HWPTs are pre-allocated. When SMMUv3 operates in global abort or bypass modes, as controlled by the GBPA register, or issues a vSTE for bypass or abort we attach these pre-allocated nested HWPTs. -The translate HWPT requires a vDEVICE to be allocated first, since invalidations and events depend on a valid vSID. -The vDEVICE allocation and attach operations for vSTE based HWPTs are implemented in subsequent patches. In summary, a device placed behind a vSMMU instance must have a vSID for translate vSTE. The bypass and abort vSTEs are pre-allocated as proxy nested HWPTs and is attached based on GBPA register. The core-managed nesting parent S2 HWPT is used as parent S2 HWPT for all the nested HWPTs and is intended to be shared across vSMMU instances within the same VM. set_iommu_device(): - Reuse an existing vIOMMU for the same physical SMMU if available. If not, allocate a new one using the nesting parent S2 HWPT. - Pre-allocate two proxy nested HWPTs (bypass and abort) under the vIOMMU and install one based on GBPA.ABORT value. - Add the device to the vIOMMU=E2=80=99s device list. unset_iommu_device(): - Re-attach device to the nesting parent S2 HWPT. - Remove the device from the vIOMMU=E2=80=99s device list. - If the list is empty, free the proxy HWPTs (bypass and abort) and release the vIOMMU object. Introduce struct SMMUv3AccelState, representing an accelerated SMMUv3 instance backed by an iommufd vIOMMU object, and storing the bypass and abort proxy HWPT IDs. Signed-off-by: Nicolin Chen Signed-off-by: Shameer Kolothum Tested-by: Zhangfei Gao Reviewed-by: Eric Auger Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 156 +++++++++++++++++++++++++++++++++ hw/arm/smmuv3-accel.h | 18 ++++ hw/arm/trace-events | 4 + include/hw/arm/smmuv3-common.h | 3 + include/hw/arm/smmuv3.h | 1 + 5 files changed, 182 insertions(+) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index be09cf8b73..9c2b917a11 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -8,6 +8,7 @@ =20 #include "qemu/osdep.h" #include "qemu/error-report.h" +#include "trace.h" =20 #include "hw/arm/smmuv3.h" #include "hw/core/iommu.h" @@ -15,6 +16,7 @@ #include "hw/pci-host/gpex.h" #include "hw/vfio/pci.h" =20 +#include "smmuv3-internal.h" #include "smmuv3-accel.h" =20 /* @@ -43,6 +45,157 @@ static SMMUv3AccelDevice *smmuv3_accel_get_dev(SMMUStat= e *bs, SMMUPciBus *sbus, return accel_dev; } =20 +static uint32_t smmuv3_accel_gbpa_hwpt(SMMUv3State *s, SMMUv3AccelState *a= ccel) +{ + return FIELD_EX32(s->gbpa, GBPA, ABORT) ? + accel->abort_hwpt_id : accel->bypass_hwpt_id; +} + +static bool +smmuv3_accel_alloc_viommu(SMMUv3State *s, HostIOMMUDeviceIOMMUFD *idev, + Error **errp) +{ + SMMUv3AccelState *accel =3D s->s_accel; + struct iommu_hwpt_arm_smmuv3 bypass_data =3D { + .ste =3D { SMMU_STE_CFG_BYPASS | SMMU_STE_VALID, 0x0ULL }, + }; + struct iommu_hwpt_arm_smmuv3 abort_data =3D { + .ste =3D { SMMU_STE_VALID, 0x0ULL }, + }; + uint32_t s2_hwpt_id =3D idev->hwpt_id; + uint32_t viommu_id, hwpt_id; + IOMMUFDViommu *viommu; + + if (!iommufd_backend_alloc_viommu(idev->iommufd, idev->devid, + IOMMU_VIOMMU_TYPE_ARM_SMMUV3, + s2_hwpt_id, &viommu_id, errp)) { + return false; + } + + viommu =3D g_new0(IOMMUFDViommu, 1); + viommu->viommu_id =3D viommu_id; + viommu->s2_hwpt_id =3D s2_hwpt_id; + viommu->iommufd =3D idev->iommufd; + + /* + * Pre-allocate HWPTs for S1 bypass and abort cases. These will be att= ached + * later for guest STEs or GBPAs that require bypass or abort configur= ation. + */ + if (!iommufd_backend_alloc_hwpt(idev->iommufd, idev->devid, viommu_id, + 0, IOMMU_HWPT_DATA_ARM_SMMUV3, + sizeof(abort_data), &abort_data, + &accel->abort_hwpt_id, errp)) { + goto free_viommu; + } + + if (!iommufd_backend_alloc_hwpt(idev->iommufd, idev->devid, viommu_id, + 0, IOMMU_HWPT_DATA_ARM_SMMUV3, + sizeof(bypass_data), &bypass_data, + &accel->bypass_hwpt_id, errp)) { + goto free_abort_hwpt; + } + + /* Attach a HWPT based on SMMUv3 GBPA.ABORT value */ + hwpt_id =3D smmuv3_accel_gbpa_hwpt(s, accel); + if (!host_iommu_device_iommufd_attach_hwpt(idev, hwpt_id, errp)) { + goto free_bypass_hwpt; + } + accel->viommu =3D viommu; + return true; + +free_bypass_hwpt: + iommufd_backend_free_id(idev->iommufd, accel->bypass_hwpt_id); +free_abort_hwpt: + iommufd_backend_free_id(idev->iommufd, accel->abort_hwpt_id); +free_viommu: + iommufd_backend_free_id(idev->iommufd, viommu->viommu_id); + g_free(viommu); + return false; +} + +static bool smmuv3_accel_set_iommu_device(PCIBus *bus, void *opaque, int d= evfn, + HostIOMMUDevice *hiod, Error **e= rrp) +{ + HostIOMMUDeviceIOMMUFD *idev =3D HOST_IOMMU_DEVICE_IOMMUFD(hiod); + SMMUState *bs =3D opaque; + SMMUv3State *s =3D ARM_SMMUV3(bs); + SMMUPciBus *sbus =3D smmu_get_sbus(bs, bus); + SMMUv3AccelDevice *accel_dev =3D smmuv3_accel_get_dev(bs, sbus, bus, d= evfn); + + if (!idev) { + return true; + } + + if (accel_dev->idev) { + if (accel_dev->idev !=3D idev) { + error_setg(errp, "Device already has an associated idev 0x%x", + idev->devid); + return false; + } + return true; + } + + if (s->s_accel->viommu) { + goto done; + } + + if (!smmuv3_accel_alloc_viommu(s, idev, errp)) { + error_append_hint(errp, "Unable to alloc vIOMMU: idev devid 0x%x: = ", + idev->devid); + return false; + } + +done: + accel_dev->idev =3D idev; + accel_dev->s_accel =3D s->s_accel; + QLIST_INSERT_HEAD(&s->s_accel->device_list, accel_dev, next); + trace_smmuv3_accel_set_iommu_device(devfn, idev->devid); + return true; +} + +static void smmuv3_accel_unset_iommu_device(PCIBus *bus, void *opaque, + int devfn) +{ + SMMUState *bs =3D opaque; + SMMUPciBus *sbus =3D g_hash_table_lookup(bs->smmu_pcibus_by_busptr, bu= s); + HostIOMMUDeviceIOMMUFD *idev; + SMMUv3AccelDevice *accel_dev; + SMMUv3AccelState *accel; + SMMUDevice *sdev; + + if (!sbus) { + return; + } + + sdev =3D sbus->pbdev[devfn]; + if (!sdev) { + return; + } + + accel_dev =3D container_of(sdev, SMMUv3AccelDevice, sdev); + idev =3D accel_dev->idev; + accel =3D accel_dev->s_accel; + /* Re-attach the default s2 hwpt id */ + if (!host_iommu_device_iommufd_attach_hwpt(idev, idev->hwpt_id, NULL))= { + error_report("Unable to attach the default HW pagetable: idev devi= d " + "0x%x", idev->devid); + } + + accel_dev->idev =3D NULL; + accel_dev->s_accel =3D NULL; + QLIST_REMOVE(accel_dev, next); + trace_smmuv3_accel_unset_iommu_device(devfn, idev->devid); + + if (QLIST_EMPTY(&accel->device_list)) { + iommufd_backend_free_id(accel->viommu->iommufd, accel->bypass_hwpt= _id); + iommufd_backend_free_id(accel->viommu->iommufd, accel->abort_hwpt_= id); + iommufd_backend_free_id(accel->viommu->iommufd, + accel->viommu->viommu_id); + g_free(accel->viommu); + accel->viommu =3D NULL; + } +} + /* * Only allow PCIe bridges, pxb-pcie roots, and GPEX roots so vfio-pci * endpoints can sit downstream. Accelerated SMMUv3 requires a vfio-pci @@ -145,6 +298,8 @@ static const PCIIOMMUOps smmuv3_accel_ops =3D { .supports_address_space =3D smmuv3_accel_supports_as, .get_address_space =3D smmuv3_accel_find_add_as, .get_viommu_flags =3D smmuv3_accel_get_viommu_flags, + .set_iommu_device =3D smmuv3_accel_set_iommu_device, + .unset_iommu_device =3D smmuv3_accel_unset_iommu_device, }; =20 static void smmuv3_accel_as_init(SMMUv3State *s) @@ -168,6 +323,7 @@ void smmuv3_accel_init(SMMUv3State *s) { SMMUState *bs =3D ARM_SMMU(s); =20 + s->s_accel =3D g_new0(SMMUv3AccelState, 1); bs->iommu_ops =3D &smmuv3_accel_ops; smmuv3_accel_as_init(s); } diff --git a/hw/arm/smmuv3-accel.h b/hw/arm/smmuv3-accel.h index 0dc6b00d35..efb631db4f 100644 --- a/hw/arm/smmuv3-accel.h +++ b/hw/arm/smmuv3-accel.h @@ -10,10 +10,28 @@ #define HW_ARM_SMMUV3_ACCEL_H =20 #include "hw/arm/smmu-common.h" +#include "system/iommufd.h" +#ifdef CONFIG_LINUX +#include +#endif #include CONFIG_DEVICES =20 +/* + * Represents an accelerated SMMU instance backed by an iommufd vIOMMU obj= ect. + * Holds bypass and abort proxy HWPT IDs used for device attachment. + */ +typedef struct SMMUv3AccelState { + IOMMUFDViommu *viommu; + uint32_t bypass_hwpt_id; + uint32_t abort_hwpt_id; + QLIST_HEAD(, SMMUv3AccelDevice) device_list; +} SMMUv3AccelState; + typedef struct SMMUv3AccelDevice { SMMUDevice sdev; + HostIOMMUDeviceIOMMUFD *idev; + QLIST_ENTRY(SMMUv3AccelDevice) next; + SMMUv3AccelState *s_accel; } SMMUv3AccelDevice; =20 #ifdef CONFIG_ARM_SMMUV3_ACCEL diff --git a/hw/arm/trace-events b/hw/arm/trace-events index f3386bd7ae..2aaa0c40c7 100644 --- a/hw/arm/trace-events +++ b/hw/arm/trace-events @@ -66,6 +66,10 @@ smmuv3_notify_flag_del(const char *iommu) "DEL SMMUNotif= ier node for iommu mr=3D%s smmuv3_inv_notifiers_iova(const char *name, int asid, int vmid, uint64_t i= ova, uint8_t tg, uint64_t num_pages, int stage) "iommu mr=3D%s asid=3D%d vm= id=3D%d iova=3D0x%"PRIx64" tg=3D%d num_pages=3D0x%"PRIx64" stage=3D%d" smmu_reset_exit(void) "" =20 +#smmuv3-accel.c +smmuv3_accel_set_iommu_device(int devfn, uint32_t devid) "devfn=3D0x%x (id= ev devid=3D0x%x)" +smmuv3_accel_unset_iommu_device(int devfn, uint32_t devid) "devfn=3D0x%x (= idev devid=3D0x%x)" + # strongarm.c strongarm_uart_update_parameters(const char *label, int speed, char parity= , int data_bits, int stop_bits) "%s speed=3D%d parity=3D%c data=3D%d stop= =3D%d" strongarm_ssp_read_underrun(void) "SSP rx underrun" diff --git a/include/hw/arm/smmuv3-common.h b/include/hw/arm/smmuv3-common.h index f644618f38..153310248d 100644 --- a/include/hw/arm/smmuv3-common.h +++ b/include/hw/arm/smmuv3-common.h @@ -100,6 +100,9 @@ REG32(STE_7, 28) #define STE_CFG_ABORT(config) (!(config & 0x4)) #define STE_CFG_BYPASS(config) (config =3D=3D 0x4) =20 +#define SMMU_STE_VALID (1ULL << 0) +#define SMMU_STE_CFG_BYPASS (1ULL << 3) + /* Update STE fields */ #define STE_SET_VALID(ste, v) = \ ((ste)->word[0] =3D FIELD_DP32((ste)->word[0], STE_0, VALID, (v))) diff --git a/include/hw/arm/smmuv3.h b/include/hw/arm/smmuv3.h index bb7076286b..e54ece2d38 100644 --- a/include/hw/arm/smmuv3.h +++ b/include/hw/arm/smmuv3.h @@ -66,6 +66,7 @@ struct SMMUv3State { =20 /* SMMU has HW accelerator support for nested S1 + s2 */ bool accel; + struct SMMUv3AccelState *s_accel; }; =20 typedef enum { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424451; cv=pass; d=zohomail.com; s=zohoarc; b=STAwSKBeN+dgkCSOuBS3aAPUPcOs4uR95qoEzdcM9LM7YkWmJC/D1HgTOE6apOcxxXb2sOdywJvlRZD8+zc0pDCw4Pc/7n56Za/yh6sKHYxaX41CSHgxbwJei2olCD2jlIZQz0iffvxmkgLcYL4TTbMWTgQBZwbc3IGY6qrvVvQ= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424451; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=U0sY8m+iCrT5Mwo3cqZZRZlXcXlfqszZJU5WClJnu0g=; b=Zi8qig6oP/N9o2d4GghWoEyyWqpK9af51HRp1vF1fLzqiPci3EWGzPba9LPjtTEIk6Z8XCOwBMn+Gj1AS0dPZTV4C7ikdfzovsaikNy0BOrmPtxw20P4zbjdKkhHWQCW2y7rUUVfrmOVFtFRJmpE1K+5wX3WNfpYq895v1amT4Q= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424451521992.1065626497333; Mon, 26 Jan 2026 02:47:31 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK74-00083N-6T; Mon, 26 Jan 2026 05:46:30 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6X-0007Ot-Ln; Mon, 26 Jan 2026 05:46:05 -0500 Received: from mail-northcentralusazlp170120005.outbound.protection.outlook.com ([2a01:111:f403:c105::5] helo=CH5PR02CU005.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6V-0005a3-Uv; Mon, 26 Jan 2026 05:45:57 -0500 Received: from BL1PR13CA0023.namprd13.prod.outlook.com (2603:10b6:208:256::28) by BN5PR12MB9488.namprd12.prod.outlook.com (2603:10b6:408:2a9::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:45:49 +0000 Received: from BL6PEPF00022574.namprd02.prod.outlook.com (2603:10b6:208:256:cafe::9c) by BL1PR13CA0023.outlook.office365.com (2603:10b6:208:256::28) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.7 via Frontend Transport; Mon, 26 Jan 2026 10:45:26 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022574.mail.protection.outlook.com (10.167.249.42) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:45:49 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:34 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:28 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=BkfAtSkZWV+BQ0rQvD2c5Hj5xVe4dZ8WHu88a7pBty27WbnegxHuiD4Jcw9nYaUOiFSICRT5vA9vl/8bSyNcIYyiallCikPZlSdeOx9L4YneJJydrRjn8X3XeJBpBG6cHqw5Nd0Osf92PqeN/uiVyePa2H6OKizc1Ce6w5eJNSN7kw0lA5+hoVMmALQOYbDUpi6qOCwEqxt0oLZ3Ag5QIqlMkSK7Z9Yi7wAsoPaySHHB9yQiHSPZyqk3RctWXKCRkPZejPUX+j1Fv90Ny0YXqun7fcOaamiIvjwnqL61NV8dTr494dfb4peItDrL8uoO0W1H4tIjyKShhxNVoGCkZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=U0sY8m+iCrT5Mwo3cqZZRZlXcXlfqszZJU5WClJnu0g=; b=fYR8fecWMDzyvzVul/Tn0N4ARxT02cuRy6IJ9uGhy8jLZ9+gfvDA02F80iNFe/qCgolWeKT5GPwhEFX/JQMoZ+oPEecb16qBjj+2uegmTCLVHylheeKUrXpPf09aBwAZ/AygiltoBBKyxLvOMS/tUWUn9o7oilzx3A8KOgSenFFNwpHtzW+NsESxWSJlyB8zCh98IHrBB9qHgI+bDGBun2iShOkvVt08UsUjfIknyg6gdR6LoIOPG2I6lA8V1UocJiQLQokGvUV08cako0y5xVWKUi7dOf5SRljgjw4F7902i6kVNoszqGECl4vRbMsTdr4uZcLV//ix5uln22W1mA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=U0sY8m+iCrT5Mwo3cqZZRZlXcXlfqszZJU5WClJnu0g=; b=GTmdDUGTofJ/H9uAIZ8zbbbx5YFeueSq9FyHjrHKuvQZQzWd4Y+Od7ljQLLuUEzztIxHQ/yULXcSLU94LGE7lXSPYffJLrq0zPTilNylFk0Q4gzvzKa9bp9TEl4M0yksQlLQjMpfnZKAlHI22rDgNkpnspdnQcqoiHG2LQBjUVcuy6aiMweIY8KelSogvsLDJByNdYGws3qzgO0VCOiqNUztqRObohj2+daMv9JF7OrQgUEsCGRLpvGRSx6+1Z7Hr+lTBLzqj/dJhtqD2nVIaMbi94+1T4UGWIVUTlORn/OYlAoEjB91eLuIQIzWVai5vMSkv2mhnblUi8N0XdP9mA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 13/37] hw/arm/smmuv3: propagate smmuv3_cmdq_consume() errors to caller Date: Mon, 26 Jan 2026 10:43:10 +0000 Message-ID: <20260126104342.253965-14-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022574:EE_|BN5PR12MB9488:EE_ X-MS-Office365-Filtering-Correlation-Id: eb1d3972-a98b-45af-f870-08de5cc811a2 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|1800799024|7416014|376014|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?9kWYSxzLwgOJuCU0gMpbr/P8iOyFr7KNz3iHfzeUjptbfIKM1ce39tloHB8B?= =?us-ascii?Q?bxWjeLmvQXXAda00h/tpkaF4fsd4vk+1EPtnIA9ahFx71uhDnmNQImTc+HRG?= =?us-ascii?Q?mntM/mmAwZ0JkUwU4WRutkyaY1ZeYAFhsqiCbJnefU66WpB0EteTN+4rrRd/?= =?us-ascii?Q?zuabrv/Up6Ac/U6s5YfAHe71H0Nq+OH+yXEhlbFjcH6u7PJ17aax/efaYCzp?= =?us-ascii?Q?aRCnYl9A2/VtDSTkHWMNVKz6bHia41ZKcto73qPqDMnuyzysfM4ad0Y3L55I?= =?us-ascii?Q?AtN4WnlN8wt0gKp5tzbGwm6CmNqvj35wwvVNIna6z9MqxON28T+iIIzTt9+J?= =?us-ascii?Q?0q7Ij2WYzCFj6P4ZsGPZNjvVRP7qNaBJfEMQKXAjHvYQyQBp8278yqM834BW?= =?us-ascii?Q?67CY+zVn0pD28oAaRsUjD4kA0BCxoDakaluJiIg7ZuVzmvbQj7ZlnTmbC1UY?= =?us-ascii?Q?ry+DfPTm49sElgNwlRohdqMUF+LgdQ00NCTKKXvR3x+vKw+TMHlHh3kjhTjM?= =?us-ascii?Q?QCszYByE0ukRaRRb3Zz/d8fp1QOzwq+g9RqZL2gXL2Eu2pbTrKnMTRP8+tLt?= =?us-ascii?Q?2IDJfAEZQFjLNUa7ozrCgwKkbAycZmnCoMa6TCEmvS5ytpYU/PrR2Nr5OkcK?= =?us-ascii?Q?zaaFfucs3DBqwq89wixGuClf4RHtQHC5bSwA/qANt3PchF92FRfITfCi5s0j?= =?us-ascii?Q?kQ9eSeKfIeb4Tv9j8giXPhgn3n8NX1AMBFDOUZzgpOGZApLP30Xhbi8s7z91?= =?us-ascii?Q?HYYwRW5Gi1YW1mj+89b6gOt5TRyYEcpxEQCNFVKMP1ebV1b0LJFNWO9PC88C?= =?us-ascii?Q?7eNtktHNjB3AG42iCcgtRMpMNzTggJfToWPjDw6KqksexWZ2t11eQ9lm7tm2?= =?us-ascii?Q?aE8BZywuTg8Z7LBR0RtE38Oznp0WH/LT8cWf35T1nl3OYRTrSmpjo8DnlMA1?= =?us-ascii?Q?C4RtwT+fYU0JfWK4w76uBNfFbUs8b90jWtPrGJtgv4WHNv3P2kq0hT7mxHmY?= =?us-ascii?Q?PnQUdvGynznSbEMWz9xch59jAMpPD0YGacXCXTn+lqcE7VF7vaXVjfdwhWKA?= =?us-ascii?Q?wEq/rikxKkqduGLA610cKAE8zxm8k0tA/fNIUJJRJpu6hLSmZ5JTmLByH/a8?= =?us-ascii?Q?iV7iXrhuNSTxJhc0q+qm0n7CRPdvAGallFseyH4RE/AdtLJ9Yz/ThK7ywYru?= =?us-ascii?Q?TAbq3BLumusTVImFo/LY1M8XlFjhT+2lErieMrotNuyJr5AroNwE5QOfNaK1?= =?us-ascii?Q?F+TyTO2dgvk6kjpx+SvaPhYJkwvfpa+XOTcvb+rsizKXiyHZrEjLgprK0B/z?= =?us-ascii?Q?eTqHYu6MnmUEUJYkpEvo880x/XyU7MlfNcTPqP+6IV/nzFz1kTO9OwL1nZv5?= =?us-ascii?Q?eBO+kcd7IpWL7f0uuobi52boGnpKOiVCBywAm0Nh9ujsMZLRycJubTcKI1is?= =?us-ascii?Q?K+sCLKL8/LcxNb+TZi0Cb2zXjtCQIlXeBb9jBDuBwha9bSULe5NDg65RNFz7?= =?us-ascii?Q?AGlqEAROdTwqNgtTZQZtEC39YBRDiNoAEDn39HZ6fSBeZYd9SsCyUQ3WS3ZE?= =?us-ascii?Q?45cGsYK1IkkxX/EqUmoYt6YcsCAvO1q2kS1RfV4AU0tkRLBOLyObOWcgUExI?= =?us-ascii?Q?lUyTOx/ol1LUAYkyfIp+roY9VCPzZNso7EJ/OrDlK5a8KJUXcZglhndr7bhO?= =?us-ascii?Q?giv8PA=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(36860700013)(1800799024)(7416014)(376014)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:49.0418 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: eb1d3972-a98b-45af-f870-08de5cc811a2 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022574.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN5PR12MB9488 Received-SPF: permerror client-ip=2a01:111:f403:c105::5; envelope-from=skolothumtho@nvidia.com; helo=CH5PR02CU005.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424453637154100 Content-Type: text/plain; charset="utf-8" smmuv3_cmdq_consume() is updated to return detailed errors via errp. Although this is currently a no-op, it prepares the ground for accel SMMUv3 specific command handling where proper error reporting will be useful. Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3.c | 67 +++++++++++++++++++++++++++---------------------- 1 file changed, 37 insertions(+), 30 deletions(-) diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index 95d44f81ed..ade2b43ab8 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -1279,7 +1279,7 @@ static void smmuv3_range_inval(SMMUState *s, Cmd *cmd= , SMMUStage stage) } } =20 -static int smmuv3_cmdq_consume(SMMUv3State *s) +static int smmuv3_cmdq_consume(SMMUv3State *s, Error **errp) { SMMUState *bs =3D ARM_SMMU(s); SMMUCmdError cmd_error =3D SMMU_CERROR_NONE; @@ -1547,42 +1547,44 @@ static MemTxResult smmu_writell(SMMUv3State *s, hwa= ddr offset, static MemTxResult smmu_writel(SMMUv3State *s, hwaddr offset, uint64_t data, MemTxAttrs attrs) { + Error *local_err =3D NULL; + switch (offset) { case A_CR0: s->cr[0] =3D data; s->cr0ack =3D data & ~SMMU_CR0_RESERVED; /* in case the command queue has been enabled */ - smmuv3_cmdq_consume(s); - return MEMTX_OK; + smmuv3_cmdq_consume(s, &local_err); + break; case A_CR1: s->cr[1] =3D data; - return MEMTX_OK; + break; case A_CR2: s->cr[2] =3D data; - return MEMTX_OK; + break; case A_IRQ_CTRL: s->irq_ctrl =3D data; - return MEMTX_OK; + break; case A_GERRORN: smmuv3_write_gerrorn(s, data); /* * By acknowledging the CMDQ_ERR, SW may notify cmds can * be processed again */ - smmuv3_cmdq_consume(s); - return MEMTX_OK; + smmuv3_cmdq_consume(s, &local_err); + break; case A_GERROR_IRQ_CFG0: /* 64b */ s->gerror_irq_cfg0 =3D deposit64(s->gerror_irq_cfg0, 0, 32, data); - return MEMTX_OK; + break; case A_GERROR_IRQ_CFG0 + 4: s->gerror_irq_cfg0 =3D deposit64(s->gerror_irq_cfg0, 32, 32, data); - return MEMTX_OK; + break; case A_GERROR_IRQ_CFG1: s->gerror_irq_cfg1 =3D data; - return MEMTX_OK; + break; case A_GERROR_IRQ_CFG2: s->gerror_irq_cfg2 =3D data; - return MEMTX_OK; + break; case A_GBPA: /* * If UPDATE is not set, the write is ignored. This is the only @@ -1592,71 +1594,76 @@ static MemTxResult smmu_writel(SMMUv3State *s, hwad= dr offset, /* Ignore update bit as write is synchronous. */ s->gbpa =3D data & ~R_GBPA_UPDATE_MASK; } - return MEMTX_OK; + break; case A_STRTAB_BASE: /* 64b */ s->strtab_base =3D deposit64(s->strtab_base, 0, 32, data); - return MEMTX_OK; + break; case A_STRTAB_BASE + 4: s->strtab_base =3D deposit64(s->strtab_base, 32, 32, data); - return MEMTX_OK; + break; case A_STRTAB_BASE_CFG: s->strtab_base_cfg =3D data; if (FIELD_EX32(data, STRTAB_BASE_CFG, FMT) =3D=3D 1) { s->sid_split =3D FIELD_EX32(data, STRTAB_BASE_CFG, SPLIT); s->features |=3D SMMU_FEATURE_2LVL_STE; } - return MEMTX_OK; + break; case A_CMDQ_BASE: /* 64b */ s->cmdq.base =3D deposit64(s->cmdq.base, 0, 32, data); s->cmdq.log2size =3D extract64(s->cmdq.base, 0, 5); if (s->cmdq.log2size > SMMU_CMDQS) { s->cmdq.log2size =3D SMMU_CMDQS; } - return MEMTX_OK; + break; case A_CMDQ_BASE + 4: /* 64b */ s->cmdq.base =3D deposit64(s->cmdq.base, 32, 32, data); - return MEMTX_OK; + break; case A_CMDQ_PROD: s->cmdq.prod =3D data; - smmuv3_cmdq_consume(s); - return MEMTX_OK; + smmuv3_cmdq_consume(s, &local_err); + break; case A_CMDQ_CONS: s->cmdq.cons =3D data; - return MEMTX_OK; + break; case A_EVENTQ_BASE: /* 64b */ s->eventq.base =3D deposit64(s->eventq.base, 0, 32, data); s->eventq.log2size =3D extract64(s->eventq.base, 0, 5); if (s->eventq.log2size > SMMU_EVENTQS) { s->eventq.log2size =3D SMMU_EVENTQS; } - return MEMTX_OK; + break; case A_EVENTQ_BASE + 4: s->eventq.base =3D deposit64(s->eventq.base, 32, 32, data); - return MEMTX_OK; + break; case A_EVENTQ_PROD: s->eventq.prod =3D data; - return MEMTX_OK; + break; case A_EVENTQ_CONS: s->eventq.cons =3D data; - return MEMTX_OK; + break; case A_EVENTQ_IRQ_CFG0: /* 64b */ s->eventq_irq_cfg0 =3D deposit64(s->eventq_irq_cfg0, 0, 32, data); - return MEMTX_OK; + break; case A_EVENTQ_IRQ_CFG0 + 4: s->eventq_irq_cfg0 =3D deposit64(s->eventq_irq_cfg0, 32, 32, data); - return MEMTX_OK; + break; case A_EVENTQ_IRQ_CFG1: s->eventq_irq_cfg1 =3D data; - return MEMTX_OK; + break; case A_EVENTQ_IRQ_CFG2: s->eventq_irq_cfg2 =3D data; - return MEMTX_OK; + break; default: qemu_log_mask(LOG_UNIMP, "%s Unexpected 32-bit access to 0x%"PRIx64" (WI)\n", __func__, offset); - return MEMTX_OK; + break; } + + if (local_err) { + error_report_err(local_err); + } + return MEMTX_OK; } =20 static MemTxResult smmu_write_mmio(void *opaque, hwaddr offset, uint64_t d= ata, --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424545; cv=pass; d=zohomail.com; s=zohoarc; b=C4CvRJFPdCicgEVwe/kHrAVfHMVf//Jiz2gORvmJuafsiov+boajPSiqwqQlA8D3ta3DnhTsqZLclyVlcz2pmDUcr/DiHg+fTAnYNCXgp8pAKWPD30jR7sm07FMQ+UaeRcqTGfhVPZYcHqzPnw8zNBgqZvpEewksT5Kmn6z2LA8= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424545; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=mhsEHnKE4qYLS5Uz/f9Ukllw3Gi8G60LhBInlsybxbs=; b=CekDCXS/YXGRMzMsNjCUCJVvDvtbnPY+w7Ii3+fmfeN0SWFyydmDOvCU8D70YdBBk6zG1MT5epaWbDA7nBzH0WpJ9xHRsJGBbM/JTP/Wu3noAmwHKXaOQDfOKPtnQEnDyI28gO3kSCpeF9W2G9lNquQWiwvXhWuH2IJaMtRsRkE= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 17694245454261011.2802090642529; Mon, 26 Jan 2026 02:49:05 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK75-0008CU-AD; Mon, 26 Jan 2026 05:46:31 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6b-0007Oz-As; Mon, 26 Jan 2026 05:46:05 -0500 Received: from mail-westus3azlp170100009.outbound.protection.outlook.com ([2a01:111:f403:c107::9] helo=PH7PR06CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6Z-0005aO-1S; Mon, 26 Jan 2026 05:46:01 -0500 Received: from MN2PR05CA0049.namprd05.prod.outlook.com (2603:10b6:208:236::18) by PH7PR12MB5733.namprd12.prod.outlook.com (2603:10b6:510:1e0::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:45:51 +0000 Received: from BL6PEPF0002256E.namprd02.prod.outlook.com (2603:10b6:208:236:cafe::4c) by MN2PR05CA0049.outlook.office365.com (2603:10b6:208:236::18) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.7 via Frontend Transport; Mon, 26 Jan 2026 10:45:28 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF0002256E.mail.protection.outlook.com (10.167.249.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:45:51 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:37 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:33 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ZcUwes2R7Lj2i5qsNTZVmlsogpNNShUOtDXg3+L7Sz10PhC/Hnh+5538Icpky5t5lTSJCLMj2Piz//miqfzP5uJjwVwNpJ8Nusy/N3ebbrNi1NlIRu3Wm/Q6edTHY56SDKsEIPmSmRJRErIGKxdBDWVw6nVDTvxzK4Hj+DxhCp91w75AgYKnkwh6izYjINdkR9Q4AiMB3uMMn+vWuEMYOLWMXSp/8Nq6JMNzcyngalwQF7Q61DlwTF92lI8GMZrkw5NvPj8IZ2Nu6zNAcEPorNX8HPkOHcCrlmHL68U51ughU1yYMeQEd/T8raWrD9jHR9X/0RT+9jFluYJABzORaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mhsEHnKE4qYLS5Uz/f9Ukllw3Gi8G60LhBInlsybxbs=; b=AnVoaKPHkkJvDN+aaD/GHXlpD5OyxHJMmImH/Lb+aqrrSHn2Zq6XQnMCxmLfbqMQpA6bwUIX398SuyRnnHkO1e0xxXjj3FgSYvp7R8IZMv2RdgtaZI9hwwMsVNLg0eUKDw6z1/1bFidMp5TSl3izbZPoQcxZKAxXTaWgG5gvtMcZn7vxBHEB47KnkYKpg90zxG+42iP/qaPBYDrF/sWULBa0BMUhU7AWixxygC0ox6srISsLuyQPtzRr1nlrOjoUzEGwYaRZFP35l8h2QGI/kq7Ynn8MxM5/xRAxKCNSsCGa3o1ziCrirIyuGrQ1my3nxu+CGnWYgxtzXWpCCG+Mcw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mhsEHnKE4qYLS5Uz/f9Ukllw3Gi8G60LhBInlsybxbs=; b=pcLP8+IDwGpwh4hlFqlRIOLkKko8+YnME54Vbvc66vm/WkI0M9u7gRZ5UFZ7WaRU77wDV5c2pty40nQyD8QVq6DMJw8BdeeIhHn+w4gd/Euv2AS2oVY7KveCZJ+pTshm1u0nDbQuwsofr9OSI8WnsXBySmj+hS+1EMH7FQ5yaJa0owcp4ba9cU+aAgkm4gFLzQVhCriN4o2OW7Cp9eGrxQGH/URnFM1IuoYg5+Ysypq8kRDunNcOp2A6ZGKgpYktav1JpiGBxbEVazXPHI9kn8XVC31mygUtk8WrbVJjclPmETvB3iuCbQE0/kfNd0UbeWQq9dEyu7DK/+PuAO4hWg== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 14/37] hw/arm/smmuv3-accel: Add nested vSTE install/uninstall support Date: Mon, 26 Jan 2026 10:43:11 +0000 Message-ID: <20260126104342.253965-15-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF0002256E:EE_|PH7PR12MB5733:EE_ X-MS-Office365-Filtering-Correlation-Id: 4949bbe0-2af2-4153-f344-08de5cc812f7 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|82310400026|376014|7416014|36860700013; X-Microsoft-Antispam-Message-Info: =?utf-8?B?NitkV3pWUXQyQ2xwajR5V0pyZElaMjVKRVNPd3pqMGZ4Z2tlL2ZDWFlNVmV6?= =?utf-8?B?VzF1TXFGUzAwck1ja0ZLSnlQbE42NXRGWElZWlBBNEhINkdHaWdxRWc5Yjlw?= =?utf-8?B?RWk0elVLSmJtSDU4c3JBWWpHdTlJdjE5Uk5rcGZ3VnMwQWFpUVBlS2JBc0p1?= =?utf-8?B?UThuNXlBZnRRMUFDTFduRWhUVkdxaTRwdW94REhpVjRPSnA1Mkl5TzNCM3k2?= =?utf-8?B?U2I5OXpncjk5WG5SVkE0VU52VmxQOFppSkVmQmNkaHMxMGZWREx6Wlp2dVNJ?= =?utf-8?B?MzMxdFpGYWRCQnFER0F1bGVROW9UVndQNTBIYTlmSGd1VlcwWU5vaDFna2sz?= =?utf-8?B?UVZQeVZLSVMrZVVGZ3B4NkdTRWZrL25iOHBGUHdKWGFxdStUZEdzWXhKUFdJ?= =?utf-8?B?Uys0V0J2Zm5DVTVCaTB2N2hsdXpxSFREWWlNUm5sRUpVcEFic3ZsRmFpWWsr?= =?utf-8?B?WlZNT0JFanIzc2wrY2JlMnRqTjVtQ0RqakNRblRGR0luTTRoSUxmZTMwTy9v?= =?utf-8?B?bzFXeE9ZNjVUcHdsN2l6eXdSTzNBa25zb1NaZG54b0Uram4ybmZXWDIzNU5q?= =?utf-8?B?anB0UTNmb0VMVjVWZjVWNGcyL1M0VTRLekVXSmtYanJkSEVQb1ZXZnJ1OEI4?= =?utf-8?B?R3Zjd1MzT3NYaFJ2SHBFbmdRTVEyckwxUDlxbjgza3V5dCtBY0ltNXJJeWJU?= =?utf-8?B?VWM1VllvMExDcFhuU2xFY2licmtKNVVDMzhxSFhmdmUwcmcwRkc1NTFnNkh1?= =?utf-8?B?MHBnMml0bDJWTlRsblpTL0luL1FnSzRVSDJ3THErTGhoU0FnYXBLWFBLRzZR?= =?utf-8?B?cEYvZW4weXIveVJYakY2WVNmaHFHc0ZqVnpkbjE3WkwvMUs3cjB1SGZDTlp2?= =?utf-8?B?VGJRRlBJeDNhK2NjWEJNMGVEWkFiSTZNT3dSK0dtYjhzTytqMWFtTUxXWTF6?= =?utf-8?B?ZEdNWGp0akdVWUEwMkZQVVZKQkttWGMxSDJ3ajBVVXJRWU8vS2NlVDJLWGRZ?= =?utf-8?B?Wkp1ekEwSmttY1ZjeWFudWhXT0hVeVROZnBucTcwejJHRmJ3YTFybURBUUZ1?= =?utf-8?B?QStPMnh5U1hCeE1hN2V5R3BuNnFNRGl4cmU1M1VFUmVqaUlndXM4NVowTWRm?= =?utf-8?B?V1E0M3dNdHZab3kwWHA2VmJrMGRoMTlmSDM2VVBTUGMwWDZLYkdMYUNzbkM5?= =?utf-8?B?SzRESmVOQjZ3MUhRY3doRVZQdnU2Rm85YXlmNDRwQU9JL2FFd29nZVJwbkgv?= =?utf-8?B?QlFSak1PMWJWaVhwR3YzTDNBd2ZvSUFDdVRlb0lwZVVJV0l0aTcxTG9HRlFl?= =?utf-8?B?bTAyQWZEMVp2SG1aekQzTGsvcjdheU9KZm9uV2hwaWpFVStpTm5UWWdwVTdG?= =?utf-8?B?UWgxeVd5RWVvZ2o0MUJpSUdSQWpSZTZBSi9VeVRYL3FidEVrYnErTWhVQUhO?= =?utf-8?B?UndLcUZCYmxGSC9PRkR2b3ZEcEU3OTRWKzZHeHF5RFhzTjRmdWRzbUxmZ01H?= =?utf-8?B?TUlYdjEzWmpGakQwa0RpQVoyTG53Vk5PbFZCZGdRemZDQ05Kb0hsT1hBdGR2?= =?utf-8?B?NTRTUkYzMks1OHZDWEZQTHlENXc0T2ZZYm1MQnhqQ3gzMjhxS2hnckl3UzdT?= =?utf-8?B?ZHZleS9rZmZYNklnbitQVjJpZlRlc3BBZHIwa0pjRzM2bjBURzJuU2tXeHRr?= =?utf-8?B?aVozSHlta3pjYVN1bVkxdXRlSFpvT1NwS1dIVG9ZYkNaNm5LNHlmcDhZbEFX?= =?utf-8?B?bXlIVXh6TFFrWnVLSEFYMU1uTXkxV3JzaVY4UFRLNTJobm1aenRZSngwTGRi?= =?utf-8?B?V0FLWDM3QXFpZ2Z2cjRTa01YaDcyb1Z3N3RuUlZua0h6dHE4SW9vNVdqV1N1?= =?utf-8?B?cXh1OS83YVduc0RCTnhoU0pmNll6STAzZnoyTEJEUHpCamdFWWR3akUydnhU?= =?utf-8?B?WHYweFc5NVExb2Y4WE1EbHd0M1FSR0VMYmxyZmVIRHI3a3N2MmpXQkh1TWVs?= =?utf-8?B?QXBHUDRzRkRJd1c1SkJBNzdTOW1hTGpTeklTYU1CRG9acXNLQmJLSEZCcTRr?= =?utf-8?B?eFFRNUNuSWZwNEtHWVlLWUpGdWVqL1BVcS91ZUhndXNZb1lpYVAzaUxwbUJ2?= =?utf-8?B?cVpXejJMWlA1THVaVDJxaTRNamhFeHFYM0NyMFlUVXV2VFRXQmh5bVdrcTJJ?= =?utf-8?B?TG1IYVhOL09mYUF5OEZXQzFLS3Rpd2pTYUx3ckc3T08vam13aHRiZkd1cEhw?= =?utf-8?B?eFhGVWlvVGMrZXVvUlpnaU1DRGlnPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(82310400026)(376014)(7416014)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:51.2702 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4949bbe0-2af2-4153-f344-08de5cc812f7 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF0002256E.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB5733 Received-SPF: permerror client-ip=2a01:111:f403:c107::9; envelope-from=skolothumtho@nvidia.com; helo=PH7PR06CU001.outbound.protection.outlook.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424546582154100 From: Nicolin Chen A device placed behind a vSMMU instance must have corresponding vSTEs (bypass, abort, or translate) installed. The bypass and abort proxy nested HWPTs are pre-allocated. For translat HWPT, a vDEVICE object is allocated and associated with the vIOMMU for each guest device. This allows the host kernel to establish a virtual SID to physical SID mapping, which is required for handling invalidations and event reporting. An translate HWPT is allocated based on the guest STE configuration and attached to the device when the guest issues SMMU_CMD_CFGI_STE or SMMU_CMD_CFGI_STE_RANGE, provided the STE enables S1 translation. If the guest STE is invalid or S1 translation is disabled, the device is attached to one of the pre-allocated ABORT or BYPASS HWPTs instead. While at it, export smmu_find_ste() for use here. Signed-off-by: Nicolin Chen Signed-off-by: Shameer Kolothum Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 197 +++++++++++++++++++++++++++++++++ hw/arm/smmuv3-accel.h | 22 ++++ hw/arm/smmuv3-internal.h | 1 + hw/arm/smmuv3.c | 11 +- hw/arm/trace-events | 2 + include/hw/arm/smmuv3-common.h | 18 +++ 6 files changed, 249 insertions(+), 2 deletions(-) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index 9c2b917a11..877b7e0e17 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -51,6 +51,188 @@ static uint32_t smmuv3_accel_gbpa_hwpt(SMMUv3State *s, = SMMUv3AccelState *accel) accel->abort_hwpt_id : accel->bypass_hwpt_id; } =20 +static bool +smmuv3_accel_alloc_vdev(SMMUv3AccelDevice *accel_dev, int sid, Error **err= p) +{ + SMMUv3AccelState *accel =3D accel_dev->s_accel; + HostIOMMUDeviceIOMMUFD *idev =3D accel_dev->idev; + IOMMUFDVdev *vdev =3D accel_dev->vdev; + uint32_t vdevice_id; + + if (!idev || vdev) { + return true; + } + + if (!iommufd_backend_alloc_vdev(idev->iommufd, idev->devid, + accel->viommu->viommu_id, sid, + &vdevice_id, errp)) { + return false; + } + + vdev =3D g_new(IOMMUFDVdev, 1); + vdev->vdevice_id =3D vdevice_id; + vdev->virt_id =3D sid; + accel_dev->vdev =3D vdev; + return true; +} + +static SMMUS1Hwpt * +smmuv3_accel_dev_alloc_translate(SMMUv3AccelDevice *accel_dev, STE *ste, + Error **errp) +{ + uint64_t ste_0 =3D (uint64_t)ste->word[0] | (uint64_t)ste->word[1] << = 32; + uint64_t ste_1 =3D (uint64_t)ste->word[2] | (uint64_t)ste->word[3] << = 32; + HostIOMMUDeviceIOMMUFD *idev =3D accel_dev->idev; + SMMUv3AccelState *accel =3D accel_dev->s_accel; + struct iommu_hwpt_arm_smmuv3 nested_data =3D { + .ste =3D { + cpu_to_le64(ste_0 & STE0_MASK), + cpu_to_le64(ste_1 & STE1_MASK), + }, + }; + uint32_t hwpt_id =3D 0, flags =3D 0; + SMMUS1Hwpt *s1_hwpt; + + if (!iommufd_backend_alloc_hwpt(idev->iommufd, idev->devid, + accel->viommu->viommu_id, flags, + IOMMU_HWPT_DATA_ARM_SMMUV3, + sizeof(nested_data), &nested_data, + &hwpt_id, errp)) { + return NULL; + } + + s1_hwpt =3D g_new0(SMMUS1Hwpt, 1); + s1_hwpt->hwpt_id =3D hwpt_id; + trace_smmuv3_accel_translate_ste(accel_dev->vdev->virt_id, hwpt_id, + nested_data.ste[1], nested_data.ste[0= ]); + return s1_hwpt; +} + +bool smmuv3_accel_install_ste(SMMUv3State *s, SMMUDevice *sdev, int sid, + Error **errp) +{ + SMMUEventInfo event =3D {.type =3D SMMU_EVT_NONE, .sid =3D sid, + .inval_ste_allowed =3D true}; + SMMUv3AccelState *accel =3D s->s_accel; + SMMUv3AccelDevice *accel_dev; + HostIOMMUDeviceIOMMUFD *idev; + uint32_t config, hwpt_id =3D 0; + SMMUS1Hwpt *s1_hwpt =3D NULL; + const char *type; + STE ste; + + if (!accel || !accel->viommu) { + return true; + } + + accel_dev =3D container_of(sdev, SMMUv3AccelDevice, sdev); + if (!accel_dev->s_accel) { + return true; + } + + idev =3D accel_dev->idev; + if (!smmuv3_accel_alloc_vdev(accel_dev, sid, errp)) { + return false; + } + + if (smmu_find_ste(sdev->smmu, sid, &ste, &event)) { + /* No STE found, nothing to install */ + return true; + } + + /* + * Install the STE based on SMMU enabled/config: + * - attach a pre-allocated HWPT for abort/bypass + * - or a new HWPT for translate STE + * + * Note: The vdev remains associated with accel_dev even if HWPT + * attach/alloc fails, since the Guest=E2=80=93Host SID mapping stays + * valid as long as the device is behind the accelerated SMMUv3. + */ + if (!smmu_enabled(s)) { + hwpt_id =3D smmuv3_accel_gbpa_hwpt(s, accel); + } else { + config =3D STE_CONFIG(&ste); + + if (!STE_VALID(&ste) || STE_CFG_ABORT(config)) { + hwpt_id =3D accel->abort_hwpt_id; + } else if (STE_CFG_BYPASS(config)) { + hwpt_id =3D accel->bypass_hwpt_id; + } else if (STE_CFG_S1_TRANSLATE(config)) { + s1_hwpt =3D smmuv3_accel_dev_alloc_translate(accel_dev, &ste, = errp); + if (!s1_hwpt) { + return false; + } + hwpt_id =3D s1_hwpt->hwpt_id; + } + } + + if (!hwpt_id) { + error_setg(errp, "Invalid STE config for sid 0x%x", + smmu_get_sid(&accel_dev->sdev)); + return false; + } + + if (!host_iommu_device_iommufd_attach_hwpt(idev, hwpt_id, errp)) { + if (s1_hwpt) { + iommufd_backend_free_id(idev->iommufd, s1_hwpt->hwpt_id); + g_free(s1_hwpt); + } + return false; + } + + /* Free the previous s1_hwpt */ + if (accel_dev->s1_hwpt) { + iommufd_backend_free_id(idev->iommufd, accel_dev->s1_hwpt->hwpt_id= ); + g_free(accel_dev->s1_hwpt); + } + + accel_dev->s1_hwpt =3D s1_hwpt; + if (hwpt_id =3D=3D accel->abort_hwpt_id) { + type =3D "abort"; + } else if (hwpt_id =3D=3D accel->bypass_hwpt_id) { + type =3D "bypass"; + } else { + type =3D "translate"; + } + + trace_smmuv3_accel_install_ste(sid, type, hwpt_id); + return true; +} + +bool smmuv3_accel_install_ste_range(SMMUv3State *s, SMMUSIDRange *range, + Error **errp) +{ + SMMUv3AccelState *accel =3D s->s_accel; + SMMUv3AccelDevice *accel_dev; + Error *local_err =3D NULL; + bool all_ok =3D true; + + if (!accel || !accel->viommu) { + return true; + } + + QLIST_FOREACH(accel_dev, &accel->device_list, next) { + uint32_t sid =3D smmu_get_sid(&accel_dev->sdev); + + if (sid >=3D range->start && sid <=3D range->end) { + if (!smmuv3_accel_install_ste(s, &accel_dev->sdev, + sid, &local_err)) { + error_append_hint(&local_err, "Device 0x%x: Failed to inst= all " + "STE\n", sid); + error_report_err(local_err); + local_err =3D NULL; + all_ok =3D false; + } + } + } + + if (!all_ok) { + error_setg(errp, "Failed to install all STEs properly"); + } + return all_ok; +} + static bool smmuv3_accel_alloc_viommu(SMMUv3State *s, HostIOMMUDeviceIOMMUFD *idev, Error **errp) @@ -161,6 +343,7 @@ static void smmuv3_accel_unset_iommu_device(PCIBus *bus= , void *opaque, HostIOMMUDeviceIOMMUFD *idev; SMMUv3AccelDevice *accel_dev; SMMUv3AccelState *accel; + IOMMUFDVdev *vdev; SMMUDevice *sdev; =20 if (!sbus) { @@ -181,6 +364,20 @@ static void smmuv3_accel_unset_iommu_device(PCIBus *bu= s, void *opaque, "0x%x", idev->devid); } =20 + if (accel_dev->s1_hwpt) { + iommufd_backend_free_id(accel_dev->idev->iommufd, + accel_dev->s1_hwpt->hwpt_id); + g_free(accel_dev->s1_hwpt); + accel_dev->s1_hwpt =3D NULL; + } + + vdev =3D accel_dev->vdev; + if (vdev) { + iommufd_backend_free_id(accel->viommu->iommufd, vdev->vdevice_id); + g_free(vdev); + accel_dev->vdev =3D NULL; + } + accel_dev->idev =3D NULL; accel_dev->s_accel =3D NULL; QLIST_REMOVE(accel_dev, next); diff --git a/hw/arm/smmuv3-accel.h b/hw/arm/smmuv3-accel.h index efb631db4f..4e20b646dc 100644 --- a/hw/arm/smmuv3-accel.h +++ b/hw/arm/smmuv3-accel.h @@ -27,19 +27,41 @@ typedef struct SMMUv3AccelState { QLIST_HEAD(, SMMUv3AccelDevice) device_list; } SMMUv3AccelState; =20 +typedef struct SMMUS1Hwpt { + uint32_t hwpt_id; +} SMMUS1Hwpt; + typedef struct SMMUv3AccelDevice { SMMUDevice sdev; HostIOMMUDeviceIOMMUFD *idev; + SMMUS1Hwpt *s1_hwpt; + IOMMUFDVdev *vdev; QLIST_ENTRY(SMMUv3AccelDevice) next; SMMUv3AccelState *s_accel; } SMMUv3AccelDevice; =20 #ifdef CONFIG_ARM_SMMUV3_ACCEL void smmuv3_accel_init(SMMUv3State *s); +bool smmuv3_accel_install_ste(SMMUv3State *s, SMMUDevice *sdev, int sid, + Error **errp); +bool smmuv3_accel_install_ste_range(SMMUv3State *s, SMMUSIDRange *range, + Error **errp); #else static inline void smmuv3_accel_init(SMMUv3State *s) { } +static inline bool +smmuv3_accel_install_ste(SMMUv3State *s, SMMUDevice *sdev, int sid, + Error **errp) +{ + return true; +} +static inline bool +smmuv3_accel_install_ste_range(SMMUv3State *s, SMMUSIDRange *range, + Error **errp) +{ + return true; +} #endif =20 #endif /* HW_ARM_SMMUV3_ACCEL_H */ diff --git a/hw/arm/smmuv3-internal.h b/hw/arm/smmuv3-internal.h index 687ee6aaca..a6464425ec 100644 --- a/hw/arm/smmuv3-internal.h +++ b/hw/arm/smmuv3-internal.h @@ -353,6 +353,7 @@ typedef struct SMMUEventInfo { } while (0) =20 void smmuv3_record_event(SMMUv3State *s, SMMUEventInfo *event); +int smmu_find_ste(SMMUv3State *s, uint32_t sid, STE *ste, SMMUEventInfo *e= vent); =20 static inline int oas2bits(int oas_field) { diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index ade2b43ab8..7e29284267 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -630,8 +630,7 @@ bad_ste: * Supports linear and 2-level stream table * Return 0 on success, -EINVAL otherwise */ -static int smmu_find_ste(SMMUv3State *s, uint32_t sid, STE *ste, - SMMUEventInfo *event) +int smmu_find_ste(SMMUv3State *s, uint32_t sid, STE *ste, SMMUEventInfo *e= vent) { dma_addr_t addr, strtab_base; uint32_t log2size; @@ -1341,6 +1340,10 @@ static int smmuv3_cmdq_consume(SMMUv3State *s, Error= **errp) } =20 trace_smmuv3_cmdq_cfgi_ste(sid); + if (!smmuv3_accel_install_ste(s, sdev, sid, errp)) { + cmd_error =3D SMMU_CERROR_ILL; + break; + } smmuv3_flush_config(sdev); =20 break; @@ -1361,6 +1364,10 @@ static int smmuv3_cmdq_consume(SMMUv3State *s, Error= **errp) sid_range.end =3D sid_range.start + mask; =20 trace_smmuv3_cmdq_cfgi_ste_range(sid_range.start, sid_range.en= d); + if (!smmuv3_accel_install_ste_range(s, &sid_range, errp)) { + cmd_error =3D SMMU_CERROR_ILL; + break; + } smmu_configs_inv_sid_range(bs, sid_range); break; } diff --git a/hw/arm/trace-events b/hw/arm/trace-events index 2aaa0c40c7..8135c0c734 100644 --- a/hw/arm/trace-events +++ b/hw/arm/trace-events @@ -69,6 +69,8 @@ smmu_reset_exit(void) "" #smmuv3-accel.c smmuv3_accel_set_iommu_device(int devfn, uint32_t devid) "devfn=3D0x%x (id= ev devid=3D0x%x)" smmuv3_accel_unset_iommu_device(int devfn, uint32_t devid) "devfn=3D0x%x (= idev devid=3D0x%x)" +smmuv3_accel_translate_ste(uint32_t vsid, uint32_t hwpt_id, uint64_t ste_1= , uint64_t ste_0) "vSID=3D0x%x hwpt_id=3D0x%x ste=3D%"PRIx64":%"PRIx64 +smmuv3_accel_install_ste(uint32_t vsid, const char * type, uint32_t hwpt_i= d) "vSID=3D0x%x ste type=3D%s hwpt_id=3D0x%x" =20 # strongarm.c strongarm_uart_update_parameters(const char *label, int speed, char parity= , int data_bits, int stop_bits) "%s speed=3D%d parity=3D%c data=3D%d stop= =3D%d" diff --git a/include/hw/arm/smmuv3-common.h b/include/hw/arm/smmuv3-common.h index 153310248d..415b7ccde5 100644 --- a/include/hw/arm/smmuv3-common.h +++ b/include/hw/arm/smmuv3-common.h @@ -99,10 +99,28 @@ REG32(STE_7, 28) #define STE_CFG_S2_ENABLED(config) (config & 0x2) #define STE_CFG_ABORT(config) (!(config & 0x4)) #define STE_CFG_BYPASS(config) (config =3D=3D 0x4) +#define STE_CFG_S1_TRANSLATE(config) (config =3D=3D 0x5) =20 #define SMMU_STE_VALID (1ULL << 0) #define SMMU_STE_CFG_BYPASS (1ULL << 3) =20 +#define STE0_V MAKE_64BIT_MASK(0, 1) +#define STE0_CONFIG MAKE_64BIT_MASK(1, 3) +#define STE0_S1FMT MAKE_64BIT_MASK(4, 2) +#define STE0_CTXPTR MAKE_64BIT_MASK(6, 50) +#define STE0_S1CDMAX MAKE_64BIT_MASK(59, 5) +#define STE0_MASK (STE0_S1CDMAX | STE0_CTXPTR | STE0_S1FMT | STE0_CONFI= G | \ + STE0_V) + +#define STE1_S1DSS MAKE_64BIT_MASK(0, 2) +#define STE1_S1CIR MAKE_64BIT_MASK(2, 2) +#define STE1_S1COR MAKE_64BIT_MASK(4, 2) +#define STE1_S1CSH MAKE_64BIT_MASK(6, 2) +#define STE1_S1STALLD MAKE_64BIT_MASK(27, 1) +#define STE1_EATS MAKE_64BIT_MASK(28, 2) +#define STE1_MASK (STE1_EATS | STE1_S1STALLD | STE1_S1CSH | STE1_S1COR= | \ + STE1_S1CIR | STE1_S1DSS) + /* Update STE fields */ #define STE_SET_VALID(ste, v) = \ ((ste)->word[0] =3D FIELD_DP32((ste)->word[0], STE_0, VALID, (v))) --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424625; cv=pass; d=zohomail.com; s=zohoarc; b=L7TwsJR6JzEBOPA8Q5SyFXWulKUkuQGy/elwj8d7Lx0KypkYVjDrXB9Anb8Hx8vINzQWhpayxk+BjVoo2eq66GCojk4kkk6ZZEHh7jZ1dA2Odw9cv8eZ9gxXGuwDmMWqKgAZX9cA1gcY+mCg9XebiF32HncvSfdPTXmiNI/qeMg= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424625; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=xavTP8KHrX32K5bg362PtYMS5/8g4n7c16CAaxYEi3I=; b=Snw5or+xNx3GRQFtK0btK5JXkLB6bR6w8KeKKWToQ9aBJG8CysWxg1WZQYd13FnOayMxEW0zTw9WisAxbO/nNj9en6lcP2DQMKVXQKRIpcSxuplw/8Hb7AKiFr3yKtSJjdwYU5AEND7fhIN0RW214QjLdZ9vwkV45mcJQXUm410= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424625704301.472080378892; Mon, 26 Jan 2026 02:50:25 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7y-0002QC-5F; Mon, 26 Jan 2026 05:47:26 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6i-0007Vt-Qd; Mon, 26 Jan 2026 05:46:12 -0500 Received: from mail-westusazlp170100001.outbound.protection.outlook.com ([2a01:111:f403:c000::1] helo=BYAPR05CU005.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6g-0005au-FS; Mon, 26 Jan 2026 05:46:08 -0500 Received: from MN2PR05CA0042.namprd05.prod.outlook.com (2603:10b6:208:236::11) by PH7PR12MB7257.namprd12.prod.outlook.com (2603:10b6:510:205::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:45:59 +0000 Received: from BL6PEPF0002256E.namprd02.prod.outlook.com (2603:10b6:208:236:cafe::98) by MN2PR05CA0042.outlook.office365.com (2603:10b6:208:236::11) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.7 via Frontend Transport; Mon, 26 Jan 2026 10:45:58 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF0002256E.mail.protection.outlook.com (10.167.249.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:45:58 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:43 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:38 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=jIe6sW/imBUF1Y6t8PXmRXgf+IQleZpn3pqtCLqC8+0Ke9zsg6k9+KiL2UmQUy9gzDqtbFkn54y5Oe4Esk18hoDubz1B4wo7svsww/TCvPkgeK/vjlSL2gyikjOBKfRCDXdH0uKM7eNh/6DYdDXtWdFDNEAMtSzHV6RmJfbkd1TFfkJE13M779pIyF/Lm0p/rTVC91goH6BT4/tcfSPb570GEkzy1T+2yVimI4sTdoCJa4pefim0aKioh+K6XSyPM+0CsPA2crLOoaMyxE3YnKbu/7ZIZtZ2Haz8oXNDRasUzDWf1j9nOZx++O9CcWiiuQ4LcEtHa307D+2x3kqs7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xavTP8KHrX32K5bg362PtYMS5/8g4n7c16CAaxYEi3I=; b=aAGSDjSAKgZUbVO6eNW/DItinUUiJLrhnlwebP+bEp9X5mSaJIfIuL6hEiBsUqeo0ZDb0WUngkBNOHK+gBW/CjpQeZ/aSf2kAnc2ipyUCYAObJjP7vLAVF17Al/qTpfJEIfjLrAgXdpkIZevCierqNdiuFqRtG6xATXgku2WhNG0ibiU/RvoHTK2Uf9Qp02FjBhE1CJcJcDwSHqnvz5cU+DvXn24bu6crK2acYw29/rB2fAbB4V80ACicXzGTGHKLIIzj2zQ9YTzIDClArrYpBa4R9KUuUqtGDzRacGBnlJFldRA5xvjE/V1F5MfNEExTWS0kH984n2hxXAdXAfNUQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xavTP8KHrX32K5bg362PtYMS5/8g4n7c16CAaxYEi3I=; b=fvRZMPDGxcmY/sUExnWv3ULBUcVN+EJg/l1+DV7xXa/q/eEgKB3F7i7XCFv/ot0RkiretpX5giyFDNNiFH2nS4uOdUTo15bvpgPGrdDepl/aNSVm0OO/xJYNdly4avSUfxHuISPukv34wwUlbLEy2QzPR2iVfD6Yg6pJFQuF5jhs+pnOu4hTSp0a50fjTsRHJoA5Zxe9U10RxMB4Cu+YHDOOtaqv6z6Vio18khxHkQE2CPBk8kMsqKEv5oQICniOe0OUcUrNqoJWze+tVOpRYdmBg+k83lbGkzgFosRYsvQJcbhA2Bw+bpZV3BtLAqQK2b3qU9k76vYuYMAmsA7piA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 15/37] hw/arm/smmuv3-accel: Install SMMUv3 GBPA based hwpt Date: Mon, 26 Jan 2026 10:43:12 +0000 Message-ID: <20260126104342.253965-16-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF0002256E:EE_|PH7PR12MB7257:EE_ X-MS-Office365-Filtering-Correlation-Id: 077236c9-6e77-4e81-d7ee-08de5cc81771 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|7416014|82310400026|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?sDsyt6U7/jeTJWszPh3qWa/Ro47HOBXY8vMnnT5ZCVKLi2XgKXpCNRYIKnn1?= =?us-ascii?Q?rSjh7oFLov6/3EczNy+zYkrDw5yVwG3zopX0Zw/tgQUt+A0HI/9/CQgd+1Dy?= =?us-ascii?Q?QkE/RXfrmTe59fH3Sn1jxrOsqTgXZywNH+Xgxpsea+5CXuYkXhjTr4wGEblS?= =?us-ascii?Q?DfD3jTNqJsTJPyhh3QFlnFITLuC/gRi85ew1N9CDyTnGCMOvmSFGndYvpo5K?= =?us-ascii?Q?O1fF+lC6aPf7VnNqPCy4dgqoTuf6C4G93CE7dsKjI+c7Z9UXgf2JmDOpgF2t?= =?us-ascii?Q?r0z7Y0vHfoyPKt3sAMhscGhYbrTdZeTpvl/QKMbpNKTYucWabHloz3adtPyF?= =?us-ascii?Q?pTXMhr4/729GGkzWttZ5Rs5u1IvUoj2haGFg6GhuXQgn9XWXPzx50E+grI32?= =?us-ascii?Q?EJLPYSjTxFVyxFyCA9SVV3M4JoiarG9/VeX1bBkKVSnFFmqxO7Cx8SkQBK13?= =?us-ascii?Q?BpkLjuWYw8YAKMKDjTauFUmbQ+dj211vjKx+oqtdn4YT0fJaVkwpEpWcP7eJ?= =?us-ascii?Q?leHxWxu3eVliWOsrBrEbU3kWRKvM2YK6qp00FgAHyDTEVaDUMBIS8yMYD2u2?= =?us-ascii?Q?2Bo9vBdDs1WVwAozJffShogQgKEavX3FipJCxV4nlpioMTa5sujdTkWzMg9X?= =?us-ascii?Q?k91S0oMXtFFS2EAUyk9DpQIShTb/NedZq6PcbarLYQaVzdmLNVMHhtlM07Hh?= =?us-ascii?Q?IcpgFqfU4atadY8A0yf6ndXPuAJGpnAjxm3m+38L3P5gm/UW50qQoqBemBi/?= =?us-ascii?Q?1hgNEtlfIilAMSFORG9PVveoFqrUPbqUtwY9vz96NMX1DB9/v4yxpKdzIDxz?= =?us-ascii?Q?NvrumPOJpfu7aVwemMTjUFrfHEKFCIWiMIF2sHZ6T4ycL16YZTkWPORgZwQU?= =?us-ascii?Q?5tm9t96VBzy/s30aCzphpeY/BzQFQ6O/7mFuia1eozGDZSvkc+kqr9bSfyOa?= =?us-ascii?Q?v706OBN5Jqedv93AtUE14BNS9vmAkVEp7vWbQ6GOsDF1pzhfFYlcLh6pRAVK?= =?us-ascii?Q?lJhlaxjzKUgxJqH9NG81WrJSyikGdIM+HARLC/6lIiHEjXp2UdEzvoWC5BTc?= =?us-ascii?Q?ERdgjp04DxpVMQYIc9agYJoxmm0rAoG9cDdeuwVLg2UX0mkqGm7KGckMFRx4?= =?us-ascii?Q?2EUfGdNUi1MgSd+9RbeX0jV3SMq9layWo1xW5WXKjT8OA3h5MstiyCWz0fMV?= =?us-ascii?Q?hy4cRYTV7pWSCnXoR4Nul2I9qFRXqi7G8DbVW3bpG7WkJsnoTAuqvqXA3r/5?= =?us-ascii?Q?rT61AMu4PkElYQMuwMuVYmF5uFMNvbCKL9/GtHr7Njeh6tcjk+RuOqu/r0LQ?= =?us-ascii?Q?AoiHlwnlpUqRVhJxuEuzyPy5fL8vRzmTGGFd1oLMUsy4j7471kYncZeh7Zsl?= =?us-ascii?Q?vEvzLxlLdmka6SjssAE7jM7Gec9T80+7jF7BYY/lfannDlrn37KOzImgJjV4?= =?us-ascii?Q?Thuhzd/s3IHwNbTR5x3KkPAOCsWC4ZgsDN0nenL80DawR8QbXJS2yVkJfQ2W?= =?us-ascii?Q?42KNWEPOnm84eSX0Duv2Huc/uq5Q6tG9XmypPVuep5VkwtLQ/I/XpwWqk181?= =?us-ascii?Q?sYXZZzyji+DKFhrYgUX8N/4s1C+g+1kQ2YimZLB5p2NnIZsAzrv+GSD07m3D?= =?us-ascii?Q?rCFHBkLmEr501bQAh05/BOf6huR1eH/sp87HaX4+0jmgI8qnjv6DME7aZHNG?= =?us-ascii?Q?7ylq4g=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(376014)(7416014)(82310400026)(36860700013)(1800799024); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:45:58.7876 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 077236c9-6e77-4e81-d7ee-08de5cc81771 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF0002256E.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB7257 Received-SPF: permerror client-ip=2a01:111:f403:c000::1; envelope-from=skolothumtho@nvidia.com; helo=BYAPR05CU005.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424626403158500 Content-Type: text/plain; charset="utf-8" On guest reboot or on GBPA update, attach a nested HWPT based on the GPBA.ABORT bit which either aborts all incoming transactions or bypasses them. Reviewed-by: Eric Auger Reviewed-by: Nicolin Chen Tested-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 36 ++++++++++++++++++++++++++++++++++++ hw/arm/smmuv3-accel.h | 9 +++++++++ hw/arm/smmuv3.c | 2 ++ 3 files changed, 47 insertions(+) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index 877b7e0e17..c125974d12 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -499,6 +499,42 @@ static const PCIIOMMUOps smmuv3_accel_ops =3D { .unset_iommu_device =3D smmuv3_accel_unset_iommu_device, }; =20 +/* Based on SMUUv3 GPBA.ABORT configuration, attach a corresponding HWPT */ +bool smmuv3_accel_attach_gbpa_hwpt(SMMUv3State *s, Error **errp) +{ + SMMUv3AccelState *accel =3D s->s_accel; + SMMUv3AccelDevice *accel_dev; + Error *local_err =3D NULL; + bool all_ok =3D true; + uint32_t hwpt_id; + + if (!accel || !accel->viommu) { + return true; + } + + hwpt_id =3D smmuv3_accel_gbpa_hwpt(s, accel); + QLIST_FOREACH(accel_dev, &accel->device_list, next) { + if (!host_iommu_device_iommufd_attach_hwpt(accel_dev->idev, hwpt_i= d, + &local_err)) { + error_append_hint(&local_err, "Failed to attach GBPA hwpt %u f= or " + "idev devid %u", hwpt_id, accel_dev->idev->d= evid); + error_report_err(local_err); + local_err =3D NULL; + all_ok =3D false; + } + } + if (!all_ok) { + error_setg(errp, "Failed to attach all GBPA based HWPTs properly"); + } + return all_ok; +} + +void smmuv3_accel_reset(SMMUv3State *s) +{ + /* Attach a HWPT based on GBPA reset value */ + smmuv3_accel_attach_gbpa_hwpt(s, NULL); +} + static void smmuv3_accel_as_init(SMMUv3State *s) { =20 diff --git a/hw/arm/smmuv3-accel.h b/hw/arm/smmuv3-accel.h index 4e20b646dc..c7ed4dce3a 100644 --- a/hw/arm/smmuv3-accel.h +++ b/hw/arm/smmuv3-accel.h @@ -46,6 +46,8 @@ bool smmuv3_accel_install_ste(SMMUv3State *s, SMMUDevice = *sdev, int sid, Error **errp); bool smmuv3_accel_install_ste_range(SMMUv3State *s, SMMUSIDRange *range, Error **errp); +bool smmuv3_accel_attach_gbpa_hwpt(SMMUv3State *s, Error **errp); +void smmuv3_accel_reset(SMMUv3State *s); #else static inline void smmuv3_accel_init(SMMUv3State *s) { @@ -62,6 +64,13 @@ smmuv3_accel_install_ste_range(SMMUv3State *s, SMMUSIDRa= nge *range, { return true; } +static inline bool smmuv3_accel_attach_gbpa_hwpt(SMMUv3State *s, Error **e= rrp) +{ + return true; +} +static inline void smmuv3_accel_reset(SMMUv3State *s) +{ +} #endif =20 #endif /* HW_ARM_SMMUV3_ACCEL_H */ diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index 7e29284267..7a32afd800 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -1600,6 +1600,7 @@ static MemTxResult smmu_writel(SMMUv3State *s, hwaddr= offset, if (data & R_GBPA_UPDATE_MASK) { /* Ignore update bit as write is synchronous. */ s->gbpa =3D data & ~R_GBPA_UPDATE_MASK; + smmuv3_accel_attach_gbpa_hwpt(s, &local_err); } break; case A_STRTAB_BASE: /* 64b */ @@ -1887,6 +1888,7 @@ static void smmu_reset_exit(Object *obj, ResetType ty= pe) } =20 smmuv3_init_regs(s); + smmuv3_accel_reset(s); } =20 static void smmu_realize(DeviceState *d, Error **errp) --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424509; cv=pass; d=zohomail.com; s=zohoarc; b=Y/KBe+ZpzwOLksAmb+CZ4xJRHjxfGu9/BvqVeqeNhp+DJ7ZcUA54JIJlEaXuUCpWAECoSzEdLgoM+Hh6FxIPRfE/y9Q1ULgxitKIo02nU39OeRhSuCu1ilcA0wwSCg8nHz9IuwEzLaiKNFGDg643LuPnaHtP9HrV7D/6iC8PL+o= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424509; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=FzoI0/TBEhY/XObDFiLgCWE6MjZgwsUY7XlD0V1vKPs=; b=nyDcyDzezmFQkaNKfPUwtb5tzbd4Sn4tKi/f+zrCjzq2km5i8jSjRHH8G9+hLsZTkN+NRgs0828IuAFQTMMFkoNzroU7tJZJ/B5a9cMIUvxUFKs6FHXjRZWtpaWvvngUdhgfCWdpT7N0Mp3XJE0AEQs12yHSo6aWpOtKJ6/xb1M= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424509016906.7322014104993; Mon, 26 Jan 2026 02:48:29 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK80-0002Y8-9L; Mon, 26 Jan 2026 05:47:28 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6j-0007WG-Pq; Mon, 26 Jan 2026 05:46:15 -0500 Received: from mail-centralusazlp170100005.outbound.protection.outlook.com ([2a01:111:f403:c111::5] helo=DM1PR04CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6i-0005ay-6W; Mon, 26 Jan 2026 05:46:09 -0500 Received: from PH7P220CA0058.NAMP220.PROD.OUTLOOK.COM (2603:10b6:510:32b::9) by LV2PR12MB999098.namprd12.prod.outlook.com (2603:10b6:408:353::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:46:01 +0000 Received: from SJ1PEPF000023D8.namprd21.prod.outlook.com (2603:10b6:510:32b:cafe::ea) by PH7P220CA0058.outlook.office365.com (2603:10b6:510:32b::9) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.15 via Frontend Transport; Mon, 26 Jan 2026 10:45:59 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023D8.mail.protection.outlook.com (10.167.244.73) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:46:01 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:48 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:43 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=BqfLrQJ87yXJfrY6xtghseiD3DtfCJlfHmptoh37eHKAEebIF5rLEF2QGChSBmb3IK5hb2h9l85Pk6sAgwgpIJK6FJllS7+HXm4kds9+EtaU8uh3Td2VH+qXvxQ4dPWC7sGSdykbXlgQI3gOtuDG17Y8niLCDHrumL7GF3wiAjhhZqS//THtsa6bIz94WnvKiVPJRn+e6F0WErQGBonMlCtxpFPUNtmz/79kuSj2C0z4IE1IX9/ifIZQnaZj1z0lSrys/1jKJowGvPS5De4vYw7STca7yK269uu7OL4b9dOir0wrfuZYgp/iN92WGFh37j30DKdXcslO7JXT99vPlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=FzoI0/TBEhY/XObDFiLgCWE6MjZgwsUY7XlD0V1vKPs=; b=XuURcp05gOS+tQuors+k3cGvFZVKBhaNKBcZ3BkxsGUHJ9ijL3j606n348dqXv08RUkIh8J0tmsPry85GUM4jvaXgOQCyAISbRbkbWp3kCnmSGA/2LtrKplvhsCOCECe0R63GbhtEvasKcHn/E0uT8/J81YV5NeTzxUdt+0/z9nVIhHU3qehFQAsfsgWQkNoHqqaAy2z23FbFIFftK18l+bC5Q+1iixE2XWFxVEpBM8LjXzfxNpht778N2d8GwYBBsjpvfJG6NaeXm19G/vbx58kw9RWoXBk6bTMjGXx5Tv4KlCKZB6nxNZdMSwD7yG5iLZyLYNfXb3HTTkBxLLM0g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FzoI0/TBEhY/XObDFiLgCWE6MjZgwsUY7XlD0V1vKPs=; b=EtEXa/xqiawBuzIrJYJc5bibx9IxRlIWgFAiAAdTa43VSyiJ6ekW3wctuFtXwHopzNzxWxLQSdytH7Xa35FQG9jMqDNGuRxWMGIknVjKvnS1+546MdepE8O3P6+nYc/r4r7Dh5Enb7pRvmQfqAyfLOM3zIZ48D8sOsvUOok1t9IRGPFFKKXpi3U7l48xkyXtUs40+ugi9cCB0O7aAcVW6+RLSnYQ+5XK5kCpYJPUUeqQwDjYRwiIIjc3IsMXVu+HqCzdWUGeYJUA3Eg/8KjMOkQeKnSiLCzsZAzID8B7Drord8l08mLlDgocfVgvxEXQpf3TcAEpuqBdIcw3c9DYQA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , , "Michael S . Tsirkin" Subject: [PATCH v9 16/37] hw/pci/pci: Introduce a callback to retrieve the MSI doorbell GPA directly Date: Mon, 26 Jan 2026 10:43:13 +0000 Message-ID: <20260126104342.253965-17-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023D8:EE_|LV2PR12MB999098:EE_ X-MS-Office365-Filtering-Correlation-Id: d44c9739-f8fa-4ed0-90d5-08de5cc818b9 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|36860700013|7416014|376014|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?cyabImElIXZj6i+sed77JKQHvOVv5txUZQ93wEYXKqFjDaHqpgDjcIiStjq0?= =?us-ascii?Q?Et8HG/ukMyaiKD2VBMZymuJnGreYLFLrOo00NWxu2uOHWQKcQY6x8e/7L7mx?= =?us-ascii?Q?RbKC8j7eX4Wp1+fDc6Y+HGHp+UVsCL9FWaj0zOybZjdXwhP3zrhv2kCnyGUu?= =?us-ascii?Q?mP/42iiEoK7qoOiWu8P5bmH5S7G/C9HTneUtRDRee9DkrEyekNSgi+7Fq8Q5?= =?us-ascii?Q?Dc8U0kWj6ro0RozhDFDUzrDGj6BtoILQppBh3pQs0hJ8PoHjaYPPm3lOh0Qd?= =?us-ascii?Q?G+wK3O4QDRbPu18hEQFOFhdk5CgoTMxXo6y5PPLW/MkHZLDINDIVSCor6pVq?= =?us-ascii?Q?k4O5miTXFdjatvySL6fnQNXlCz+QWxAPcfdELg2pYXJzCFLwZgoGT2To2rYS?= =?us-ascii?Q?1IOyTFV4FQ/N3yT21AUOMd8wR9ssx98Aeow4ctm8sghgfPI0OTp+h5uSnUlE?= =?us-ascii?Q?PsAX9T51lptwT4EyLvJ41W1UK+3UT59+IhQDWxNJn9YoAKBKP0sKtsTLowCy?= =?us-ascii?Q?TtkUUe5EPLX85nMKEJroBZGyWj9Xi3kv+KPGi/ULalw+1GnJJH22sHqYUzLp?= =?us-ascii?Q?uL+KhxP8YKGtp5LrgZIKqOFousTER7TLCpxxAN0J4clY/Utkd91b7r7HCq6V?= =?us-ascii?Q?CLP14xkljK29LW9Wowm/hwVwb+fQrxuHSfIsb1DUKrTKMrs9VHYumkbJTvuN?= =?us-ascii?Q?INbxY6DKjj+HhLfARyzAyozjlQHkg7AiQWr/FeMBvSAzY2PJ+IBtPRndFk9l?= =?us-ascii?Q?TS1E+IlPw8WafxSpQ2Qrv+jfbg7E2GYuUV2fvFH7alcJcQ1rKOBt0kZGjiRc?= =?us-ascii?Q?BtPX/1OoGAnNyIQWkLbFmGRLGigpClFGmxWv+Ugu0UGSFc5Z4MaU/Drki9Ka?= =?us-ascii?Q?qslIUYv/RpC0HpWRjL8LB7A5y/7fzoVmlxCfSeAqRrXcPhVv3gK/8P1ByPXt?= =?us-ascii?Q?0d4kpBFZ3a9+6esoM5O9a0sSr28ReqTfus0orJ+t1WSXNVk+n86IraUFQYKT?= =?us-ascii?Q?tJKh27qd0qXg/VdRVRMYz3xWlg4LSsDoBTTBGb8s6a9s2OjwqNSIx7goOEtd?= =?us-ascii?Q?k+fLunaVh0TDr77Bs3NngoXmZtvokkb1MyBGryIQC+w+gukX7IQUU4ctArXr?= =?us-ascii?Q?zgPhXQQiBCCZgxUxKQAgH96QM29KOZZg3iQzAB2mO1iknFClqm3TwNCs1u2j?= =?us-ascii?Q?C5+MN9pzcgKNxYpSRpZcB3DfRfXMNyvSFWb+FPE+8mncv0psVvC2qXErwdCW?= =?us-ascii?Q?d+QVvdLjuRvokvN+812NS56/c5PZkKdl/4i0prCCpuslr/nprLOjvau1uzSo?= =?us-ascii?Q?LS6UV4+wrEnjTI9WyopWgGtKJos4pPrTJ7dXsK/WXIwDRfatLQhsUHbiSk24?= =?us-ascii?Q?TBBANZ584BU7sqnIVkZK2bE0TMH7Osa39c1v7gfH7uW2KyPyJoRCfMmQ0ywb?= =?us-ascii?Q?ip04GVd6RqQsMeg6OXnKmh26NDfzPr+MgptXEHKxVOCgUyelDXiieStljnvV?= =?us-ascii?Q?YNDFN+XfJuk9vDyAZ558tVCCOuUgAUdGfxgqoTIOncLQiaXcshBTBpxUwBfz?= =?us-ascii?Q?YRhJdJPE8Ut2NQqqpfceVFDjUHGQknQXoXtekrsfa5WAVS58WQo8iz8oKE38?= =?us-ascii?Q?1AFX4GqXUBEdUMmJnh71RZs8mKR7srzXFIrSVaqwSV1PDc9fsi699lGbT6cZ?= =?us-ascii?Q?DXcJSQ=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(36860700013)(7416014)(376014)(1800799024); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:01.0589 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d44c9739-f8fa-4ed0-90d5-08de5cc818b9 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023D8.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV2PR12MB999098 Received-SPF: permerror client-ip=2a01:111:f403:c111::5; envelope-from=skolothumtho@nvidia.com; helo=DM1PR04CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424509997158500 Content-Type: text/plain; charset="utf-8" For certain vIOMMU implementations, such as SMMUv3 in accelerated mode, the translation tables are programmed directly into the physical SMMUv3 in a nested configuration. While QEMU knows where the guest tables live, safely walking them in software would require trapping and ordering all guest invalidations on every command queue. Without this, QEMU could race with guest updates and walk stale or freed page tables. This constraint is fundamental to the design of HW-accelerated vSMMU when used with downstream vfio-pci endpoint devices, where QEMU must never walk guest translation tables and must rely on the physical SMMU for translation. Future accelerated vSMMU features, such as virtual CMDQ, will also prevent trapping invalidations, reinforcing this restriction. For vfio-pci endpoints behind such a vSMMU, the only translation QEMU needs is for the MSI doorbell used when setting up KVM MSI route tables. Instead of attempting a software walk, introduce an optional vIOMMU callback that returns the MSI doorbell GPA directly. kvm_arch_fixup_msi_route() uses this callback when available and ignores the guest provided IOVA in that case. If the vIOMMU does not implement the callback, we fall back to the existing IOMMU based address space translation path. This ensures correct MSI routing for accelerated SMMUv3 + VFIO passthrough while avoiding unsafe software walks of guest translation tables. As a related change, replace RCU_READ_LOCK_GUARD() with explicit rcu_read_lock()/rcu_read_unlock(). The introduction of an early goto (set_doorbell) path means the RCU read side critical section can no longer be safely scoped using RCU_READ_LOCK_GUARD(). Cc: Michael S. Tsirkin Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Reviewed-by: Michael S. Tsirkin Tested-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Signed-off-by: Shameer Kolothum --- hw/pci/pci.c | 17 +++++++++++++++++ include/hw/pci/pci.h | 17 +++++++++++++++++ target/arm/kvm.c | 18 +++++++++++++++++- 3 files changed, 51 insertions(+), 1 deletion(-) diff --git a/hw/pci/pci.c b/hw/pci/pci.c index 101e745bd5..9035caca92 100644 --- a/hw/pci/pci.c +++ b/hw/pci/pci.c @@ -2979,6 +2979,23 @@ bool pci_device_get_iommu_bus_devfn(PCIDevice *dev, = PCIBus **piommu_bus, return aliased; } =20 +bool pci_device_iommu_msi_direct_gpa(PCIDevice *dev, hwaddr *out_doorbell) +{ + PCIBus *bus; + PCIBus *iommu_bus; + int devfn; + + pci_device_get_iommu_bus_devfn(dev, &iommu_bus, &bus, &devfn); + if (iommu_bus) { + if (iommu_bus->iommu_ops->get_msi_direct_gpa) { + *out_doorbell =3D iommu_bus->iommu_ops->get_msi_direct_gpa(bus, + iommu_bus->iommu_opaque, devfn); + return true; + } + } + return false; +} + AddressSpace *pci_device_iommu_address_space(PCIDevice *dev) { PCIBus *bus; diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h index ddb0c98e9f..d9835dfd0d 100644 --- a/include/hw/pci/pci.h +++ b/include/hw/pci/pci.h @@ -683,6 +683,22 @@ typedef struct PCIIOMMUOps { uint32_t pasid, bool priv_req, bool exec_req, hwaddr addr, bool lpig, uint16_t prgi, bool is= _read, bool is_write); + /** + * @get_msi_direct_gpa: get the guest physical address of MSI doorbell + * for the device on a PCI bus. + * + * Optional callback. If implemented, it must return a valid guest + * physical address for the MSI doorbell + * + * @bus: the #PCIBus being accessed. + * + * @opaque: the data passed to pci_setup_iommu(). + * + * @devfn: device and function number + * + * Returns: the guest physical address of the MSI doorbell. + */ + uint64_t (*get_msi_direct_gpa)(PCIBus *bus, void *opaque, int devfn); } PCIIOMMUOps; =20 bool pci_device_get_iommu_bus_devfn(PCIDevice *dev, PCIBus **piommu_bus, @@ -691,6 +707,7 @@ AddressSpace *pci_device_iommu_address_space(PCIDevice = *dev); bool pci_device_set_iommu_device(PCIDevice *dev, HostIOMMUDevice *hiod, Error **errp); void pci_device_unset_iommu_device(PCIDevice *dev); +bool pci_device_iommu_msi_direct_gpa(PCIDevice *dev, hwaddr *out_doorbell); =20 /** * pci_device_get_viommu_flags: get vIOMMU flags. diff --git a/target/arm/kvm.c b/target/arm/kvm.c index 48f853fff8..0828e8b87b 100644 --- a/target/arm/kvm.c +++ b/target/arm/kvm.c @@ -1621,26 +1621,42 @@ int kvm_arch_fixup_msi_route(struct kvm_irq_routing= _entry *route, return 0; } =20 + /* + * We do have an IOMMU address space, but for some vIOMMU implementati= ons + * (e.g. accelerated SMMUv3) the translation tables are programmed into + * the physical SMMUv3 in the host (nested S1=3Dguest, S2=3Dhost). QEM= U cannot + * walk these tables in a safe way, so in that case we obtain the MSI + * doorbell GPA directly from the vIOMMU backend and ignore the gIOVA + * @address. + */ + if (pci_device_iommu_msi_direct_gpa(dev, &doorbell_gpa)) { + goto set_doorbell; + } + /* MSI doorbell address is translated by an IOMMU */ =20 - RCU_READ_LOCK_GUARD(); + rcu_read_lock(); =20 mr =3D address_space_translate(as, address, &xlat, &len, true, MEMTXATTRS_UNSPECIFIED); =20 if (!mr) { + rcu_read_unlock(); return 1; } =20 mrs =3D memory_region_find(mr, xlat, 1); =20 if (!mrs.mr) { + rcu_read_unlock(); return 1; } =20 doorbell_gpa =3D mrs.offset_within_address_space; memory_region_unref(mrs.mr); + rcu_read_unlock(); =20 +set_doorbell: route->u.msi.address_lo =3D doorbell_gpa; route->u.msi.address_hi =3D doorbell_gpa >> 32; =20 --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424577; cv=pass; d=zohomail.com; s=zohoarc; b=ab/oc/ih3XXY3IsOXFnv14fK4cn37Jq7FTOS11CJOCscgd3e9SEOLvjwwQPZ8M/KRT0nL0V1/XkocFS/frekxIWmaJwgKv56h0f6vbNlGItLJ95EdkzRUzWU31UW66nAqGtUZBLENmtta2hZH0KM6lf2w+OlqS7MHtuzRYC9mSY= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424577; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=a3X14qvreyiCNTcEpkEHgyfxpvTPNGi7wM3/BjAnLug=; b=JnXrSRHahLGdMGd2iQvTEX9eQictrjBmNcUfdpuGd17wS8Itd2I9ElwB1be23xHS1SutSyN2OaUab5mBwj7h6GqxbSq0wvX96v4UJ6bGOlKGjg1SSt3v75bloIA/GNjtfZ/wtRtMT8GsvUSqUDRj9wYEQFtzqAzBtBAIN1r9K+4= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424577632640.4716417423424; Mon, 26 Jan 2026 02:49:37 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7u-0001wS-Ko; Mon, 26 Jan 2026 05:47:22 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6x-0007rv-UU; Mon, 26 Jan 2026 05:46:29 -0500 Received: from mail-westusazlp170100001.outbound.protection.outlook.com ([2a01:111:f403:c000::1] helo=BYAPR05CU005.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6p-0005be-9M; Mon, 26 Jan 2026 05:46:17 -0500 Received: from MN2PR05CA0062.namprd05.prod.outlook.com (2603:10b6:208:236::31) by CH1PR12MB9621.namprd12.prod.outlook.com (2603:10b6:610:2b2::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.16; Mon, 26 Jan 2026 10:46:06 +0000 Received: from BL6PEPF0002256E.namprd02.prod.outlook.com (2603:10b6:208:236:cafe::74) by MN2PR05CA0062.outlook.office365.com (2603:10b6:208:236::31) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.6 via Frontend Transport; Mon, 26 Jan 2026 10:45:39 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF0002256E.mail.protection.outlook.com (10.167.249.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:46:06 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:53 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:49 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ni371AmqvBbrajbvUTBQC7XCY55hXDazdMf20W5dyQU9vdTpnlWHi2YW8HIPQAMZA3GX+qSfUrMCWJZpQ6gcXYxQkbq1U05e0ISQzYcdXP4OP1YhnJFb5g5w+JL89pMi58Tsim0r1GnB0OR35R0Np1bXyTdIAg0u7Tkf3z7y4vrQPYFX477KHK8O5Tt1xcuZdolPYWinjfdlFZPgj68oJ92T0eZokTRlgVrUrjFSGHQVBO+XLVzONE2uTPiU+h663YpaZ/a1bIcr1wQz8Cfp2dE2a2F48EfDnTjNTQ+nyC//2jsbwKALev+5MZYI4tWRjarN06yQohwUGcCKOEShwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=a3X14qvreyiCNTcEpkEHgyfxpvTPNGi7wM3/BjAnLug=; b=AE613yYdr+7LMajWqRqpyVxPyPUAhBocnTc1zeLhaLSfhRSiVFkjiSLlWxqd9kMjJFNFHp5m9FBbx4JSsROZrzq3giBjs4IfLQhu73tgoC8eD/At4AjwRJiuYgDetY64/zpmZfPT44yfvtZexbLnwbbU/66lq2NsAfNxJXyfz2xblDR0JHm4TdJHfcuOeejnCfGxKSEvFpdTUB6brUPcO+xKhuYwDgYyxeX8XaFy8m35sBNX7VUHoLdFWHMsaLC6PRDarS4Ewy45kUl11Q89wMFem8Drdocyu/9nhL3LdF+mWHpEz4JTNNDaqZ/RCpFYqhTHXOLitbWSt00UBnSpSw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=a3X14qvreyiCNTcEpkEHgyfxpvTPNGi7wM3/BjAnLug=; b=XXMC+tJh7XwJ+j+3PZlVU65F4TzaCdK9VwV6fePuUbbmH/cCYv3/MTHpSCKovwhWGG5cqEF25/xbvRWZ8fVXUdpaqgj7q/Oa6U6fBOScks4mQxzzoKaq+DnyAmjRpoPLECYRLqC5fimsZX19aQftVJUODwoU+lHFkl7wo6WUaP84uS9CqZoCawKAellOuU23J7FrNMX77kJyrqmyoHq+ZRHHst4OS7rGJirren3Zg/AXk7sms94m1mVJ5pK1kCAf3yLpUef2X7zhVw/naOOzHH+hY1R465AK1bYGfKwP0S5PEbFgmIzT6rolEOW+5zZMPIuU/EeBJHcjyOwPDzWUfw== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 17/37] hw/arm/smmuv3-accel: Implement get_msi_direct_gpa callback Date: Mon, 26 Jan 2026 10:43:14 +0000 Message-ID: <20260126104342.253965-18-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF0002256E:EE_|CH1PR12MB9621:EE_ X-MS-Office365-Filtering-Correlation-Id: 4b2be45e-2a7e-40e7-3235-08de5cc81bc2 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|36860700013|82310400026|376014|7416014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?z3FN9r5/XsbkXIFqN5NnpXA3aKqBXAAmOru0+kaU0nHonX9eh1rsE1yt+Wgd?= =?us-ascii?Q?o/Gus+53SR1wngn9qu7uA6Sfx4toyz8Z1cOw5B8D2TCFre5XnnVOHfqVsvOm?= =?us-ascii?Q?sQIoo5pHichmqwOY4puwcT6tWNWfYz71m/tRvtW+xgfFORC8SyaiyCs294rP?= =?us-ascii?Q?BTE/gc4jAtHJ89epHWXI/FqlYp1GAW5cVe16IAqM8IE5fQ9ggEJs/flqXw71?= =?us-ascii?Q?pu+2w49qNfzri056l3tsFxw6wVpUMcD2ATRfjhk+xrHi7ZOo2Qf00nkNDQJT?= =?us-ascii?Q?QbDAIX9xn4SMlkyDXruCPsPxndQ2s3Pm0hxUPVRQGNhCkXsAH7Mt02E63zSG?= =?us-ascii?Q?OAKTEVB6ysZMecdCp4BZfqfgfbcLxc/oy0u1++hLH0MP33m7dSAr2p/uOPos?= =?us-ascii?Q?tetrzBmuPc5ie4Z1lUeJT+iQp2/njoqm86a84wzFObzBLn4r5jIHK4NLvg2G?= =?us-ascii?Q?k/qh8mX3anspVbH55WFzMrInt15eABi15MGnryk9L4JhACUA630AWQ0bUxEL?= =?us-ascii?Q?zG7yc+Zr43gYHlnK9DJsSKZjnTpEhZj+EXgjERxaViILOKd0Uzdjg0bEecIZ?= =?us-ascii?Q?BqI8EeQbrigIPAFOC1XEMNz1X9zIWdv/bVzcOFSVnXfN8qJMTJk7aRlUGBv5?= =?us-ascii?Q?Yw4xnns2BZKwvRvMiaYbxsZTvQwlTbc3MdwQD0cNDNcVqvgWqc5jB2vvRMMC?= =?us-ascii?Q?Ue/EiacAsrdER0fvRfJ40d+51RFbsQ+TGf9/kInAvL17hpU6SSUpoCbFY75i?= =?us-ascii?Q?+FNVg2LAUoW3DYt/6QRn4EL/i8IhnZwXIgbsciqR7tL0CeKsSeZ2O+ocGvXs?= =?us-ascii?Q?X6TbmC/lA7boKdfjmf312HCKtSUa53FXJ+q4QjLK1sneQcf8TNahLpP4kYle?= =?us-ascii?Q?XJyLqXvg1qGbjyO/LnGEHU9N0/+1Di9z8HsQQfTGaw3aJQTJJK+iEs9WEITG?= =?us-ascii?Q?ZaZ2sn+Pkp1Yde25qyxzrcbRvKGFGAECJ3ujrqZqYzXSDV1p3Bed4BuK3P+R?= =?us-ascii?Q?XDh0fzNk4hRAzC+n/a0ybFTKIcTGrvwkampQDo4B8cIEKCvFf73HXo3CkXKy?= =?us-ascii?Q?EXFcrl/gF+s0RMf3OsZIexMskNCVcY2WhIuIv8/e135P3CK7HP5oYwGfSJIv?= =?us-ascii?Q?ueDEkViAv2QE0n8ZEb83v3dDY+Icvlm8Y61a+CDNV5jJ3sJz7uzVidV2mLxA?= =?us-ascii?Q?9S43Oqmv25thfuVGPDDvdSpqP9uxx/gj2ceMTqgs09I49kcQXHIpBY62poAv?= =?us-ascii?Q?wao/qTpXA4kQ8n5UN9oOY58iQV/FZQUKr9vseFcJD+Q5ckAITtDYYv3ABYOY?= =?us-ascii?Q?Zo3Xe3yJhHi16QhdTFUifgDc3mUYPYc5t3fp5LAuIA10ievnRgbbDcQ9mfXI?= =?us-ascii?Q?RwTN4/e7dW2nSKzEvAKk5KrVw+gvGSbTBrclZevs+klYvHXWeuhLfqZrQ7no?= =?us-ascii?Q?YgXFdbbORTbUvzHROpeGokWpGc33pwsgN/jmlMDOTwuUaRK0n7Ec1/aIpado?= =?us-ascii?Q?0aBA6KhqdPIz07/TF959+DA4cB7f8F0JwPtg6Y2XafjWNJfO8p42AwmIUEV5?= =?us-ascii?Q?6I0uuNtNuzQPbenJRHnHgRhj5/qXl4BXWWp0gMR48ZhuWZKWxhVuzRjSnrSD?= =?us-ascii?Q?v7HXgiSKyL0b4TY8kbBT7Z3YpnSQIAx4Y4m8cqAO68y+q8UIByZSdP7V+mnK?= =?us-ascii?Q?AoWk5A=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(36860700013)(82310400026)(376014)(7416014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:06.0132 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4b2be45e-2a7e-40e7-3235-08de5cc81bc2 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF0002256E.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH1PR12MB9621 Received-SPF: permerror client-ip=2a01:111:f403:c000::1; envelope-from=skolothumtho@nvidia.com; helo=BYAPR05CU005.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424578123158500 Content-Type: text/plain; charset="utf-8" Accelerated SMMUv3 instances rely on the physical SMMUv3 for nested translation (guest Stage-1, host Stage-2). In this mode, the guest Stage-1 tables are programmed directly into hardware, and QEMU must not attempt to walk them for translation, as doing so is not reliably safe. For vfio-pci endpoints behind such a vSMMU, the only translation QEMU needs to perform is for the MSI doorbell used during KVM MSI setup. Implement the callback so that kvm_arch_fixup_msi_route() can retrieve the MSI doorbell GPA directly, instead of attempting a software walk of the guest translation tables. Also introduce an SMMUv3 device property to carry the MSI doorbell GPA. This property will be set by the virt machine in a subsequent patch. Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 10 ++++++++++ hw/arm/smmuv3.c | 2 ++ include/hw/arm/smmuv3.h | 1 + 3 files changed, 13 insertions(+) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index c125974d12..c6ee123cdf 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -393,6 +393,15 @@ static void smmuv3_accel_unset_iommu_device(PCIBus *bu= s, void *opaque, } } =20 +static uint64_t smmuv3_accel_get_msi_gpa(PCIBus *bus, void *opaque, int de= vfn) +{ + SMMUState *bs =3D opaque; + SMMUv3State *s =3D ARM_SMMUV3(bs); + + g_assert(s->msi_gpa); + return s->msi_gpa; +} + /* * Only allow PCIe bridges, pxb-pcie roots, and GPEX roots so vfio-pci * endpoints can sit downstream. Accelerated SMMUv3 requires a vfio-pci @@ -497,6 +506,7 @@ static const PCIIOMMUOps smmuv3_accel_ops =3D { .get_viommu_flags =3D smmuv3_accel_get_viommu_flags, .set_iommu_device =3D smmuv3_accel_set_iommu_device, .unset_iommu_device =3D smmuv3_accel_unset_iommu_device, + .get_msi_direct_gpa =3D smmuv3_accel_get_msi_gpa, }; =20 /* Based on SMUUv3 GPBA.ABORT configuration, attach a corresponding HWPT */ diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index 7a32afd800..6ed9914b1e 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -1998,6 +1998,8 @@ static const Property smmuv3_properties[] =3D { * Defaults to stage 1 */ DEFINE_PROP_STRING("stage", SMMUv3State, stage), + /* GPA of MSI doorbell, for SMMUv3 accel use. */ + DEFINE_PROP_UINT64("msi-gpa", SMMUv3State, msi_gpa, 0), }; =20 static void smmuv3_instance_init(Object *obj) diff --git a/include/hw/arm/smmuv3.h b/include/hw/arm/smmuv3.h index e54ece2d38..5616a8a2be 100644 --- a/include/hw/arm/smmuv3.h +++ b/include/hw/arm/smmuv3.h @@ -67,6 +67,7 @@ struct SMMUv3State { /* SMMU has HW accelerator support for nested S1 + s2 */ bool accel; struct SMMUv3AccelState *s_accel; + uint64_t msi_gpa; }; =20 typedef enum { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424661; cv=pass; d=zohomail.com; s=zohoarc; b=jgLkK6K/XpC9Bh5im17bEA3FGqErEZQYYYNEPnZNkGBU1k3sIDXH4Y2hab/JCrdTUAcraFohQQCJ9h3zICoQVOAjPNW9byGud8l6tE8DFSugOuNjmPedca5tqmGfvuSZSsZFBuRDi1irjC2Mm9qrcvbJ18JKdEIlfOQ8/6qw41o= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424661; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=UigXJqVNdH4o31UVHBSKCeurMuBL3OTd10uVITZEwaE=; b=hVPUEAPgWBPoT052Be9x12thIi6BRv1UV6Atpcr7s6A4vMUN+HkVCCzYqkhJx545p8ppY1m2k1b6HTPJPp92QKeSx2Zx1iX90wy4SIL06YVY34KkuULTQ8ygQt0xK7e1I2CBz1cxAuo0fsAiT2IX+UZXX9ZTR3yIB7wk3bHU/vQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424661806571.9078457956399; Mon, 26 Jan 2026 02:51:01 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK76-0008R8-MU; Mon, 26 Jan 2026 05:46:32 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6x-0007rx-Sz; Mon, 26 Jan 2026 05:46:29 -0500 Received: from mail-westcentralusazlp170100005.outbound.protection.outlook.com ([2a01:111:f403:c112::5] helo=CY7PR03CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6s-0005bs-BM; Mon, 26 Jan 2026 05:46:19 -0500 Received: from BL1PR13CA0003.namprd13.prod.outlook.com (2603:10b6:208:256::8) by MW6PR12MB8899.namprd12.prod.outlook.com (2603:10b6:303:248::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.16; Mon, 26 Jan 2026 10:46:10 +0000 Received: from BL6PEPF00022574.namprd02.prod.outlook.com (2603:10b6:208:256:cafe::a5) by BL1PR13CA0003.outlook.office365.com (2603:10b6:208:256::8) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.7 via Frontend Transport; Mon, 26 Jan 2026 10:46:17 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022574.mail.protection.outlook.com (10.167.249.42) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:46:09 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:58 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:53 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=YwDl4h9SOtaQvtn5FWQch0sD68fztjewOvOkf2VWP0q2CT3H4kKaFXYIF4rBfTWfSphvBzzLitJYqcY/znlOOSjTZeuyQqZaRtI//sRpUjC+OKh3bVY4civIg/mkAj/wgVm+sfOq9JmaTrp1kJOLtxZe9zGmADhReZawBG3uP1IwACXYwWIAZLcxhDu7EtPZwTJOUzlhbti3tYO5dAmtEJzljE6grbzdJYvCwq/NL6c+nfnD069sKfDalz8f9D5kVtdtMiWPVF+kQ6NiqNkiNYtB/SlnxI8jdT5Uy5l5VNIV2OrM6OwyPnG/EuwpSVVk7QhozvvjkLvZvCVpAFrCCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UigXJqVNdH4o31UVHBSKCeurMuBL3OTd10uVITZEwaE=; b=CaGsSnsmNeL619SceV1SedPDZuPJgAWuOMjtTBAU0w0VIXdVbJf3h78EwmJ+YtmIKMDM5setzqpRAXpaKmfRylbjYcOxgiiCeSZqc3dVo/5zQKjqJTy+qTIC1/nzSOqoEeTwFRT4T4dbRTznmE/LWzWMs175DdH9QaPo1RDcyRZyamp1z+YtcfI37HKx5GaOT/Wlhdqcd+kyD2nWm8GjPngHWaSN6jCkkNH1yd7A79xgYRc11a3Pp1nbroCBFPg/Z0wAnlAErf6+V/R2dTMiNBFtKr1jkSAdEm451ZtsqgGVs8THR4OGV/915Kv2FFQXNXBaXdULkowf1ct4E9daHQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UigXJqVNdH4o31UVHBSKCeurMuBL3OTd10uVITZEwaE=; b=hbyknNOgqBlQkVdB82iYYhsBqTofgCpeGYzzpVw/4G9RXYQBlDbuQMAHh5MvEsYv+x9u8rJ9IE9ZANMD4V1kAaW2QWcitTGgXzl6se95nEDDRF/q/IVKJwWlIArOtQ3dZb9F/K6sxTGD/0g+6sqdvjriE3ZLju2iVqaz/1CoF/TdpSk7cTXkuBDl/gn+Se043MNOgRHltC20ohHRK+AfDUFOc8SQ0gWChDhYK1cokI1PkIvYNByDhb5bKZ/hLsbFxfkP8BYI5P9CnsB6uy0iPMR54No1tpFTkAPwjt5LYysSN5dqjmJkBAN4NT53x+zjghd0OiBPt0JcNC2+vtqUmQ== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 18/37] hw/arm/virt: Set msi-gpa property Date: Mon, 26 Jan 2026 10:43:15 +0000 Message-ID: <20260126104342.253965-19-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022574:EE_|MW6PR12MB8899:EE_ X-MS-Office365-Filtering-Correlation-Id: c4646377-ccaa-49e5-070a-08de5cc81e18 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|36860700013|82310400026|1800799024|7416014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?NGxy38zJ5Asa+ifGd+4IqJcvFg3aWGd9GjJrI1u5sAud9a5rBu5nActVYeWW?= =?us-ascii?Q?wej+jV1TMqBDvuziw9FLmCozVyczHFGiWlh9my4o45y2nbqiHBrUAoO0xHnY?= =?us-ascii?Q?EXqWk8wq02oSgxFvIW5HVEAz7rmYnMAJoNHeap0WJ5jajhy8DDBNRufEpHPB?= =?us-ascii?Q?ND0gL/GKhMOvYCg0JlxZV0uiu/ee/g72Y8MYZC27KZ15rhMWha8tyLGIKOqe?= =?us-ascii?Q?pAq5ipgpt/Tw/Oi9JKPH7fdXWrBrlF1ziFxHkaapJWPRhT0e9wI1WjCS1Ad1?= =?us-ascii?Q?K9CW/2XXY9IFvV5F1AMvYzggS/GsmClzGbLYH2cFVDrC5ujlgEMV1XFBHRho?= =?us-ascii?Q?KSJfi7pS9oIuzWJWiI42McH8oiIai0pvHVn9AdmEZjz53iYIrAmZQQDlVMAl?= =?us-ascii?Q?mFK7KEnQtPvY8qOWajNC6FZeGxoyIiYUxLpQrHRW6yTyslU/aJjC952hBzCe?= =?us-ascii?Q?6T5/teLQDCA+wTfDHay5nYfk6ckZeMowSh3+dIC940bIj59yNAmyfSoWU6o3?= =?us-ascii?Q?eONXZEkZtPIIKIgP6EBno/UExHPicIFRqh+BWQGxTFDOcdE4zHt1i8SS2A73?= =?us-ascii?Q?70vKzANMzrD9rRJSH2RtqF7CYFBHIU7f0AujJvphQPgStR/by01J0EPy6SiQ?= =?us-ascii?Q?/qSg7xys3/omD5xFGzMyv4xl6wfFY/bBNgDuLgaAmEDw6U9fmNecVPQ8HQ4X?= =?us-ascii?Q?M7UA6D4h9r3q2fN51FykKfYgDDdsQSb9zHKzN2Ingd7X/Bo4mxDNbukPfQM5?= =?us-ascii?Q?ro1wJ4MnYHwJ5XRKkOgkvRjsJw/54x+MREuwGTO9QXKBjoFgwCgvGkqwlHR8?= =?us-ascii?Q?kvuIlxXYptL3otRF+Lw2S+3mbhDYffMTZRONW6Cm0N/FF23zbwNQHEiiJWHO?= =?us-ascii?Q?syCece1bEgEFLy0vW4oynRb0rNaJHej3AQQSwVUE2R0sAJwaOYAbAvXtVHgh?= =?us-ascii?Q?zg5O3NsQLuSHh3YU2Mom2y07HV5AT+yMvcf0Xp49eP9sbfd5hYzyFXZniSTk?= =?us-ascii?Q?haFqdh8Wp046yHaIGT/mroeXTwwSBRoYbmBGyoZOwGrfLDr+QscQ7QT4M4jJ?= =?us-ascii?Q?tYmtQXNIBRJsK2m4bC2rfizr9IQ9VWYW36pJe+abhM73tc4meSNrhq/cvFjc?= =?us-ascii?Q?sGmpP8NzHAJoDS2YpgAUffl3pOupDKjY5M3r7MG4Pixm7DeKN2t6IUzDWQS1?= =?us-ascii?Q?JgMckSBQe3ttouBuhw5qIyotpGtJzJyPFRY7qBrwPDQGcM6GjXeQXv0xVvNJ?= =?us-ascii?Q?k9i67/0cUns5a19ZTktHrxS/0NTitmVPjuApYYBpt0CrjfcSBQrnRZEsqIpT?= =?us-ascii?Q?aBFjp7JDmyq516jQQNLP6hgL+kKYyJu/5opF+KALRD1ispj8uoyCjyLdTYh6?= =?us-ascii?Q?J//lALBTNQfXNZ1URwO5Ag6zeK72sZjRrxNbU7TYoMe2ot4qhkZ5ayvdHs4J?= =?us-ascii?Q?TDkeQgoWPcudn8zpNKQdp68A4/4ofERV75dcBaqP7pLvuft0YtO3VCS3pG5Q?= =?us-ascii?Q?FQlctwna4cWvMtPnpLteGI6Mhe72Ta4X6g5176eljCg613rwcxheUp0Z9kA0?= =?us-ascii?Q?fmVmg5e34vFNmmVNRkWSevzdIg0WYGiyoAevPLL9m65cL4QgqjL+yeZn823c?= =?us-ascii?Q?E/1zMBB64hhtZG9mYbcJN3+KSDC4B87/XG+OOHdsWa31eCE+zCWZYBxnVDMV?= =?us-ascii?Q?tuy+uQ=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(376014)(36860700013)(82310400026)(1800799024)(7416014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:09.9203 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c4646377-ccaa-49e5-070a-08de5cc81e18 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022574.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW6PR12MB8899 Received-SPF: permerror client-ip=2a01:111:f403:c112::5; envelope-from=skolothumtho@nvidia.com; helo=CY7PR03CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424662346154100 Content-Type: text/plain; charset="utf-8" Set the MSI doorbell GPA property for accelerated SMMUv3 devices for use by KVM MSI setup. Also, since any meaningful use of vfio-pci devices with an accelerated SMMUv3 requires both KVM and a kernel irqchip, ensure those are specified when accel=3Don is selected. Reviewed-by: Nicolin Chen Tested-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Signed-off-by: Shameer Kolothum --- hw/arm/virt.c | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/hw/arm/virt.c b/hw/arm/virt.c index 4badc1a734..91fec582ed 100644 --- a/hw/arm/virt.c +++ b/hw/arm/virt.c @@ -3061,6 +3061,26 @@ static void virt_machine_device_pre_plug_cb(HotplugH= andler *hotplug_dev, object_property_set_link(OBJECT(dev), "secure-memory", OBJECT(vms->secure_sysmem), NULL); } + if (object_property_find(OBJECT(dev), "accel") && + object_property_get_bool(OBJECT(dev), "accel", &error_abort)) { + hwaddr db_start =3D 0; + + if (!kvm_enabled() || !kvm_irqchip_in_kernel()) { + error_setg(errp, "SMMUv3 accel=3Don requires KVM with " + "kernel-irqchip=3Don support"); + return; + } + + if (vms->msi_controller =3D=3D VIRT_MSI_CTRL_ITS) { + /* GITS_TRANSLATER page + offset */ + db_start =3D base_memmap[VIRT_GIC_ITS].base + 0x10000 + 0x= 40; + } else if (vms->msi_controller =3D=3D VIRT_MSI_CTRL_GICV2M) { + /* MSI_SETSPI_NS page + offset */ + db_start =3D base_memmap[VIRT_GIC_V2M].base + 0x40; + } + object_property_set_uint(OBJECT(dev), "msi-gpa", db_start, + &error_abort); + } } } =20 --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424617; cv=pass; d=zohomail.com; s=zohoarc; b=j8MNBYWDmzcml8yD9KDy7278Ohx6wF/jo0g2figkCfnX7kFQSqgbAxGiKeWLi82O0aKIP8jNi9+c9BIZtbvQHIpRAq6zWlQNWcWzBWgGzcHnZNKwfAwA40sAxBE6LLXRDAUB79h79vh40Hu26nzaCwCNt+f34VMg0BIMckVigKM= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424617; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=cDr7W8lcVBuyUlNJYOZar7ZEpfqiPid5kYrSkpuLZoI=; b=djKxMlVjgo3fibTs1PI6x723jnGb2SxhNDNLYR7nOtZc/u4iwMFcCdeOzEw6RCTo1owWa9+AV298Cmpz3wHrtV60HYqpIqubLSoPGog+a4LkjtClMaiFzOHStLnFcE+yJCahBuJFKv+7fdVTzjldu9dknKVIH4SgjxXgVu7tE6g= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 17694246175471017.2609108032783; Mon, 26 Jan 2026 02:50:17 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7s-0001kJ-Tw; Mon, 26 Jan 2026 05:47:21 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6x-0007ry-SA; Mon, 26 Jan 2026 05:46:28 -0500 Received: from mail-westcentralusazlp170130007.outbound.protection.outlook.com ([2a01:111:f403:c112::7] helo=CY3PR05CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK6t-0005c6-1d; Mon, 26 Jan 2026 05:46:21 -0500 Received: from BL1PR13CA0008.namprd13.prod.outlook.com (2603:10b6:208:256::13) by CH3PR12MB8482.namprd12.prod.outlook.com (2603:10b6:610:15b::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:46:14 +0000 Received: from BL6PEPF00022574.namprd02.prod.outlook.com (2603:10b6:208:256:cafe::65) by BL1PR13CA0008.outlook.office365.com (2603:10b6:208:256::13) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.6 via Frontend Transport; Mon, 26 Jan 2026 10:46:03 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022574.mail.protection.outlook.com (10.167.249.42) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:46:13 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:03 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:45:59 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=NvswgsSywV/vXfnxjGtJXEKOBLrnpE2+Vc3zacuqXIqVSMh5hAaO0pvW7aky9C4oL5xnj+XJD2dvX75JH6OREEeOsgs3mRlIX20kUlr4rFoiDeZWwb7H2Rt1q2FEso867fNUoFELwLmoZcyQqYKtC5FsHGFLbWV5iJP8q/Odajxqhao2U+lU/hLtIEeoqJJExdOO0sPEfRwnLsV1V2LYk3yxslQUNp0mN4AYSYtqB0g+dwWo0IXysSdZkbB6nf2bnlMLpLCTnMnmiiTPh+jmS6fYjkHzck2KU24iskFWcAseFGHndGXvDnXmLuxNOgpnQ/DDwJWe4DWuxqap0KAVnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cDr7W8lcVBuyUlNJYOZar7ZEpfqiPid5kYrSkpuLZoI=; b=yhbMwpDNs8u+AH3gDMUMqd+IXUS21bf5zQ4Lu84D8M6YsUjserm/2n52IC6awSiICAt2UYNi6iz5TkCTbQxpbQH4GtiNcJvoa5HVsaEKdRbBNjyrd+aJjOimb+34as6QrDzxXFUMBRnceP5Q5x6BjvIhd+CFx8VD1QKTE27Xo/WOlgoNEpyaoz7qrNfigX4RjCgfE1GlTHUym7Ou2X5jgywnoTD/1Xs/becvwYDULiX89AliSIu5TzhrbQA+ypM9h92gvoACISY+nrq7qwd+vgFN+Nk8+oztdRacbR0f3jPGolUHxm38B/YVEjec9LRZ7WXJYKB8Z3hEtzn0ozcOHA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cDr7W8lcVBuyUlNJYOZar7ZEpfqiPid5kYrSkpuLZoI=; b=qZEk0JMa7igSqEZ53kAfveOzV5BILfUIJMgxtsZ8k1ZM6I33KweGl6dQA0zU1CWKapDE7D3+vLTWY5tbHN55HdaGzFUB49cT5x8iQMxSfyn96ftg9POtKuDrCFViS73VWhkXRRrcAXiEB+ARvK9ldkDh8pG4SWplDWR9K9Dnq2YlWyiY9kjyX7mQGDFe1YUassASN09fUAsgNXthFsl+jSMUOE37yEYTGNQW+ErORcdofQca8IWGdh7m12KFdLEsfItw4JtGVT2Hr9OXyhc8Y8JaTDjDvJ3hkrBHi4V52tHb0aO/gWPKbetH6korrtgR8817hAM8uaUamLcgZUkEDA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 19/37] hw/arm/smmuv3-accel: Add support to issue invalidation cmd to host Date: Mon, 26 Jan 2026 10:43:16 +0000 Message-ID: <20260126104342.253965-20-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022574:EE_|CH3PR12MB8482:EE_ X-MS-Office365-Filtering-Correlation-Id: fe6dff2d-f867-4682-e820-08de5cc82075 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|7416014|376014|1800799024|36860700013; X-Microsoft-Antispam-Message-Info: =?utf-8?B?bnoxQnR0TWl1M3B6cTRJdGJHOGtnMHFmWEsvWVIvMGJvcE5EaGEzc3d1RmRN?= =?utf-8?B?cjhlZGtlK3ZjQmRRcW1OTldhbXdrMUJyVlU3OHhncTByTVBDV1N0ZzNaeVh5?= =?utf-8?B?OTM2c3dLc056UVdNNDk5NTBLbXQzcnB5Rkh6TEhPYmt6OERtZEVYVGFMS2hG?= =?utf-8?B?QUt4cXdnV0RxSlZkSVpUeDBlbzhKd1RZdkh2d0dqVEtPUDVxZjVMRTJHMTVm?= =?utf-8?B?dk8xNHJtNUN1aWpyOWFDR2dZalkvaGFyVEZucXJuelg4SzFqUXZBNm8wdnpL?= =?utf-8?B?N3pkQmJSL2phaEFzWUgyalJQTVR6MzlWWi9UdU9HTGdBdmQ3VjhQM1hTZ3hV?= =?utf-8?B?N21zbmQ3Q3JXRDUzWlRNb1ZnQnFXYnE3U0lIYUZ0N1BsRXVBVytURTU5SjRl?= =?utf-8?B?c2I2UnVKUHQ1QjJEMUg0Y3Rab3V4ZklPQlJNSlhRUGdsd2tLQmJnWlYyTmpY?= =?utf-8?B?U3ZKY3FEYTJlcjl4S0xrbnU1RkxqRHdHQWw4cnBQWi9MdlpjeSswOGRVam9n?= =?utf-8?B?TVZRTiszKzdoSTRZeXNxd3g3N3FKaTg3Z3QxbXluaU5uclRXell3OGRKN3B2?= =?utf-8?B?S24zQWQyYmlTdXVFaWF2Q0FQQkxWc1VkaUtld3BNWUFsRHdzOXZidWcyVWQ2?= =?utf-8?B?SnpBeFcwZXI1WHhxTmU0UzFHOXdGTitCeCtuUGVTUFV5Q1VJTm0vMkpHamxt?= =?utf-8?B?TjN4UnFzdEJwb0VuSHdhbFB6TVpIYnJ3citWeVFISy9rYXI3Nm9lRTlxTXpM?= =?utf-8?B?ZWJlQUJSZDFUQ2hocjh0akNwbnh1ZGMvenFHbXYrMGFyaDJxQ2w4L3pnZVBC?= =?utf-8?B?NS9tdWF3YU0vQzBiUHZHWnBCZXowamZxSlV1U3MvVnQ1dkU4TjcxYnBHVXpI?= =?utf-8?B?S3NYWVV2OWs5WGpqMVFoNDlyOHY5dlFoVlA1cWx1Z1FiZ1VMK1N1TmdnZy9k?= =?utf-8?B?cU9rRzVDSlgzUEVaSHRvL2h2MTk3MlQ4M0NPOXRIdFR0OVRnT3d6S2xnNFla?= =?utf-8?B?M1hmZndLQzVncUtpNCtUL0l5eTBpRDB5cWQycEk5VWVlUUUxMHFwaUJ4MExu?= =?utf-8?B?Tlhzd3h2NmNScXVqa3F5dXdqcEVSZzY0ZjQ4TkNqbVZnKzVqY0U0Z0FkTi9x?= =?utf-8?B?bTZ2ejZUTUh1eWRZUEswbWhJUlM0eGRlUm1OTmw5NVhjTlB2Q1FVUWx3RHJy?= =?utf-8?B?QklCem5SMkNxK1lvdGFMZDEwenF4Z29RWUhSRzdyOWE2SCtPVUtpNnFQS0lW?= =?utf-8?B?bWVkckVHa293VFNxY0g3WUpGaUVHZnA0K1BiMzdZN016SlhJYjV4Q1pMTHRJ?= =?utf-8?B?SzkwSXFVOGVacGduRmRDd0ZKS0doWFcrL3k3bE9aR3haS2JJZk5mMVFWczM4?= =?utf-8?B?TGtvY1c0UzZLZHptb3JmcmV4RlpFaExOU2d3Rzg3bEVyckIvdnBXNG1vek55?= =?utf-8?B?UzdsMnM1ck0ybDYrdFIvK3h0Nmd1TnNKR2xLV0lONkgrVWlrYzJTRk95Szdq?= =?utf-8?B?WVdWNlZDQWJ5aVNGa1FpYjNYeS9zdkZ4RVhhQ25XbzNvY3c0ZmgvWWxVOVBi?= =?utf-8?B?YVVDcmNpVkNnRVhVWHRvQVNudkZUTlVhVW5aT1d3b3o1QUprOW9uZWd3Y1Ix?= =?utf-8?B?cm9sakRWY1EwdWlSUTFHQlVsdjVTWFZDUXBudFA4UjZqeFF3cVJKMzdQdlNn?= =?utf-8?B?bDVkSXZjQW5HOVFpVktOKzRnOVA4VlNiYkJsU2JIRHRiMWdXNFlNdnNFaCtX?= =?utf-8?B?RmZBVWYxSXdkTkdjWEJaZFI2Z1pOMFpabHBIenJoYUEzbG05aFRkcXZVT0Ev?= =?utf-8?B?VWVJVkkwMGV4b1RIUkF1Zm9ZaURTcjRFY1dsNmdLNVZ3OGQ1aStkWVdRUi9R?= =?utf-8?B?R1hpNkJ5RzdnNGZ0RzRmRmtFMGtsTzlKYkplVTNGK2tyRUd5S2hEOGVEV3dY?= =?utf-8?B?N3JWQnpZWEt3MHpYUkdQcVZLMFI3S2h6UWVrSmU1bUdpVloyMEwxa3ZodTd0?= =?utf-8?B?YUhQNHZQQzljQU8xZENBbXJSNzFwUkZOQ1c3UHZBRm5COU9vSTl4N3lrdFdq?= =?utf-8?B?MldVdTZSMm5VUmtkQm5vbjJhQ3ZCd2lyakEyU1g2azlSL1RIZEpGbFZaRHFz?= =?utf-8?B?UzF1MzF4S09LS0JBYjZQMlFRZkhubWFmalZlNkJPSTd4UmFiYTFvNkFZYThW?= =?utf-8?B?UG5Hb3BoM2FQY0dTK0tQU3NtekJZa2R6bUxrNWtZRHJtakQxamMrY0UyZDNv?= =?utf-8?B?ZWN3U1c4MVJFem1JaXJXS2RCTUZnPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(7416014)(376014)(1800799024)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:13.9201 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: fe6dff2d-f867-4682-e820-08de5cc82075 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022574.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR12MB8482 Received-SPF: permerror client-ip=2a01:111:f403:c112::7; envelope-from=skolothumtho@nvidia.com; helo=CY3PR05CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424619666154100 Provide a helper and use that to issue the invalidation cmd to host SMMUv3. We only issue one cmd at a time for now. Support for batching of commands=C2=A0will be added later after analysing t= he impact. Reviewed-by: Jonathan Cameron Tested-by: Zhangfei Gao Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 36 ++++++++++++++++++++++++++++++++++++ hw/arm/smmuv3-accel.h | 8 ++++++++ hw/arm/smmuv3.c | 16 ++++++++++++++++ 3 files changed, 60 insertions(+) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index c6ee123cdf..89dc6f991c 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -233,6 +233,42 @@ bool smmuv3_accel_install_ste_range(SMMUv3State *s, SM= MUSIDRange *range, return all_ok; } =20 +/* + * This issues the invalidation cmd to the host SMMUv3. + * + * sdev is non-NULL for SID based invalidations (e.g. CFGI_CD), and NULL f= or + * non SID invalidations such as SMMU_CMD_TLBI_NH_ASID and SMMU_CMD_TLBI_N= H_VA. + */ +bool smmuv3_accel_issue_inv_cmd(SMMUv3State *bs, void *cmd, SMMUDevice *sd= ev, + Error **errp) +{ + SMMUv3State *s =3D ARM_SMMUV3(bs); + SMMUv3AccelState *accel =3D s->s_accel; + uint32_t entry_num =3D 1; + + /* + * No accel or viommu means no VFIO/IOMMUFD devices, nothing to + * invalidate. + */ + if (!accel || !accel->viommu) { + return true; + } + + /* + * SID based invalidations (e.g. CFGI_CD) apply only to vfio-pci endpo= ints + * with a valid vIOMMU vdev. + */ + if (sdev && !container_of(sdev, SMMUv3AccelDevice, sdev)->vdev) { + return true; + } + + /* Single command (entry_num =3D 1); no need to check returned entry_n= um */ + return iommufd_backend_invalidate_cache( + accel->viommu->iommufd, accel->viommu->viommu_id, + IOMMU_VIOMMU_INVALIDATE_DATA_ARM_SMMUV3, + sizeof(Cmd), &entry_num, cmd, errp); +} + static bool smmuv3_accel_alloc_viommu(SMMUv3State *s, HostIOMMUDeviceIOMMUFD *idev, Error **errp) diff --git a/hw/arm/smmuv3-accel.h b/hw/arm/smmuv3-accel.h index c7ed4dce3a..41b37e3122 100644 --- a/hw/arm/smmuv3-accel.h +++ b/hw/arm/smmuv3-accel.h @@ -47,6 +47,8 @@ bool smmuv3_accel_install_ste(SMMUv3State *s, SMMUDevice = *sdev, int sid, bool smmuv3_accel_install_ste_range(SMMUv3State *s, SMMUSIDRange *range, Error **errp); bool smmuv3_accel_attach_gbpa_hwpt(SMMUv3State *s, Error **errp); +bool smmuv3_accel_issue_inv_cmd(SMMUv3State *s, void *cmd, SMMUDevice *sde= v, + Error **errp); void smmuv3_accel_reset(SMMUv3State *s); #else static inline void smmuv3_accel_init(SMMUv3State *s) @@ -68,6 +70,12 @@ static inline bool smmuv3_accel_attach_gbpa_hwpt(SMMUv3S= tate *s, Error **errp) { return true; } +static inline bool +smmuv3_accel_issue_inv_cmd(SMMUv3State *s, void *cmd, SMMUDevice *sdev, + Error **errp) +{ + return true; +} static inline void smmuv3_accel_reset(SMMUv3State *s) { } diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index 6ed9914b1e..4efef73373 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -1388,6 +1388,10 @@ static int smmuv3_cmdq_consume(SMMUv3State *s, Error= **errp) =20 trace_smmuv3_cmdq_cfgi_cd(sid); smmuv3_flush_config(sdev); + if (!smmuv3_accel_issue_inv_cmd(s, &cmd, sdev, errp)) { + cmd_error =3D SMMU_CERROR_ILL; + break; + } break; } case SMMU_CMD_TLBI_NH_ASID: @@ -1411,6 +1415,10 @@ static int smmuv3_cmdq_consume(SMMUv3State *s, Error= **errp) trace_smmuv3_cmdq_tlbi_nh_asid(asid); smmu_inv_notifiers_all(&s->smmu_state); smmu_iotlb_inv_asid_vmid(bs, asid, vmid); + if (!smmuv3_accel_issue_inv_cmd(s, &cmd, NULL, errp)) { + cmd_error =3D SMMU_CERROR_ILL; + break; + } break; } case SMMU_CMD_TLBI_NH_ALL: @@ -1438,6 +1446,10 @@ static int smmuv3_cmdq_consume(SMMUv3State *s, Error= **errp) trace_smmuv3_cmdq_tlbi_nsnh(); smmu_inv_notifiers_all(&s->smmu_state); smmu_iotlb_inv_all(bs); + if (!smmuv3_accel_issue_inv_cmd(s, &cmd, NULL, errp)) { + cmd_error =3D SMMU_CERROR_ILL; + break; + } break; case SMMU_CMD_TLBI_NH_VAA: case SMMU_CMD_TLBI_NH_VA: @@ -1446,6 +1458,10 @@ static int smmuv3_cmdq_consume(SMMUv3State *s, Error= **errp) break; } smmuv3_range_inval(bs, &cmd, SMMU_STAGE_1); + if (!smmuv3_accel_issue_inv_cmd(s, &cmd, NULL, errp)) { + cmd_error =3D SMMU_CERROR_ILL; + break; + } break; case SMMU_CMD_TLBI_S12_VMALL: { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424451; cv=pass; d=zohomail.com; s=zohoarc; b=SM/OLnf1iWUpCShzwa7Mevtgvm0MzuOukuaxK3+zESkZ3w3yEaUzvAPJn6Y2Zcl4Kp8jX6cbSHtHJxQ9apt+mdx+diwiQct+D8TaIF2b0QpmXpZ1W5Acp/gjqRVcKg/2WT5S5yuk0OozhghAXANSvVCU641Nll3szDBhnZvEZ+c= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424451; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=o1xsAzGDAdcdPNV6VOkSzf89JAEVK1A+rmJSTaHldLI=; b=E15fl+TDrevd4/C25ifFjM7AW/0uOFY0/Tti31CUbHvlUhxjNkzpLTu+M+as6SZvnImyC8c4/vUWU8OWJzXru4q+VPbHnlitSfhBCsQZKGkXSQDb0A1O3vRHU+EUTtCrPEq1AJEUzBfa0umGycCJ4filmJIMukC19WnB5OsGFMM= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424451813213.16031888282123; Mon, 26 Jan 2026 02:47:31 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7j-0001E1-CR; Mon, 26 Jan 2026 05:47:13 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK71-00083O-LQ; Mon, 26 Jan 2026 05:46:30 -0500 Received: from mail-eastusazlp170120007.outbound.protection.outlook.com ([2a01:111:f403:c101::7] helo=BL0PR03CU003.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK70-0005dp-1N; Mon, 26 Jan 2026 05:46:27 -0500 Received: from BY3PR05CA0027.namprd05.prod.outlook.com (2603:10b6:a03:254::32) by DM4PR12MB5747.namprd12.prod.outlook.com (2603:10b6:8:5e::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.16; Mon, 26 Jan 2026 10:46:19 +0000 Received: from SJ1PEPF000023D6.namprd21.prod.outlook.com (2603:10b6:a03:254:cafe::28) by BY3PR05CA0027.outlook.office365.com (2603:10b6:a03:254::32) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.6 via Frontend Transport; Mon, 26 Jan 2026 10:45:55 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023D6.mail.protection.outlook.com (10.167.244.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:46:19 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:08 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:03 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=lpj45J4beU0e3HgJAldSdiRGkVcu/8aCUTp0g/taDDXx08/AAMXBmD2Nx8nCu/57S7OBItUGgRUKNu4v/OQgdwbd3ALrgK21oL1z4gSLwJ+fM5L+oD0DFsquTh2soC77QJ2NvgHJbS0u0XdMJmwHA+kucozJ1ORHN0DSf5GO7egXmo9wOVn9nMI3xovtAjnmMzd7xK2zHCPOxCqPFjwxFllqf0+S6ue0UKF0/XlN4UyOgesGdjXQ/0iH4qfEq09OzwtuZOPqVx1WF3IxXGgz2K3DEwbXVZA6HGRskYzmJzVz0sPwZIjwhBgs99jG7gWVLt5oSTvgzxHMCzgwEnGajw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=o1xsAzGDAdcdPNV6VOkSzf89JAEVK1A+rmJSTaHldLI=; b=SHfE6eF0/fL9e3dUFynBRWqjgdw7W8j7UUc/n3gzpRIgvbCxEc3EGOfh5+SQjsq7Wu8Q4jWTSiQmLmJw44bUFvnnBHHBRExFvaHNr+NOAi5LzzqNRIiH210kX9qJE3eQm9QqUzJV+fyf7moGtqatF6UFpIHPwA8ldRCmHRwbzZyjTs5WwK/r+G3Q4oA2FesqGY3yt9pOoZux6Pdc2/xUS8jm4IiQRmQJO6f8E16FSkGJ3jDWq3JG0lZVC6gQyT+cuwtGZN/iVfLvHnZRMeVV0NC9Mz3CukXEl8XAKBIiedP1NKJEYhOnGAjzIT/7B1VqfOaOHAtbYfKFu5BIQbxpeg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=o1xsAzGDAdcdPNV6VOkSzf89JAEVK1A+rmJSTaHldLI=; b=Lw3UuEstNQ2TR3ybAES0qEyr6TIAT9ZJfCw3aPmKgoC+ANeEKOafqRO5L7OdCYD0puJHBQou+6y2uZwbw3eFbFSevkr6dBuUS2xqVUrnSfbIKWzAANffjr8cxcj2NCBG6RssLliq3FDrajL25VVitTcsxJPYZCmpLHWJvsNFQoNU1eicQ5AKCXkHqURVcN3oXyq7IQvFJ+J2FNMDUBIt+AFiq8sR3iNvF3HhUWzyPtExt+vMfSOVX3uhXgqbA3OLOKHKmI4Bnmi7V2zYO/IyY/oYRRIJUvDX/Kwfpg5xXDzQXUv7U/CLHScSVF4Jb65Ww1aKq8qbKw6Dsm3bLknIjA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 20/37] hw/arm/smmuv3: Initialize ID registers early during realize() Date: Mon, 26 Jan 2026 10:43:17 +0000 Message-ID: <20260126104342.253965-21-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023D6:EE_|DM4PR12MB5747:EE_ X-MS-Office365-Filtering-Correlation-Id: 8a1465e7-cec1-4fae-7fb3-08de5cc823a4 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|376014|7416014|1800799024|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?F21qrdtKJMOf0EYTzcuV0r3ppElw/ue6QisvtZDKEgLPGxP2ksr4WdqI6+fU?= =?us-ascii?Q?xirqIvbIU54GFKal/JIAw+UlXnM5ZWjHEZ+9OTFw/glQ6MoU79yd/L3sIGJ5?= =?us-ascii?Q?/As4KAxU43FT9NlrOqDijrD9Ni9qLCUZZGuD+oh2f46ytXEgXB1cufNJlJ8z?= =?us-ascii?Q?F8V+838iQ2pekwp43LU5/JQNX5N1QvHvv/Nw1sD/jnV4wQJoQD/V8aR9xpwI?= =?us-ascii?Q?A+Ke7BmJynP81EwGjKDA66PQtl7kWUuvGBhLwQrny23t3fcaGq404gGn+dfO?= =?us-ascii?Q?es9BTRGt/x7/lMg8IZBtNjxCE5ZZaNech7t6l1F54xWI9+WkaIo2khR7mZO0?= =?us-ascii?Q?pBr38acPUfZOK1vXTzD3WEXmLqD0Huj41ADaUrtfTvAwrqoudDJGrRYyhu/N?= =?us-ascii?Q?nTzU0CSYXWOeZWRArPMHO+bVHOI8NIuje0YDbGvyzmk2i+BQD2FYLz8wSSXF?= =?us-ascii?Q?kBfnzNMzomgbHUjdMIiZQvyZCOvqgH9W3B+ItV9UK1PTt9SKBExUW89JpGf+?= =?us-ascii?Q?K9zmrtGnP56xIlabQoUp5oowtF25q7XZQO1S6rrlBJxwdqOXp9NPLpy5w0qE?= =?us-ascii?Q?IiAcJfbNGC1nZj+IBswHyA2P+y6ejl+GH+KFsG8Fs6Aqzk4Q0bJ8pRVW+IMx?= =?us-ascii?Q?O9GAO/irBW3oZKFsKjojbXd3K4Tu34WoF7UoaEHCHA3j1IHOYj4BzV9cpuEt?= =?us-ascii?Q?rRKxwjrE255B2FJ/+UqrkQKwa4vRuRzDpazqf721++qlNgx5zcsvet7HBSV8?= =?us-ascii?Q?l8AdS5wHWkTnVIqE2cDhVhwZ2yUIX+GOgvCozA5YUorZvqwjyjCaUr+9KgSG?= =?us-ascii?Q?ndqL6aDCLZf2evPSCIimNS6ozKcNa90bP0R+3rytmmE1/ecBE4vUExQ88Lx9?= =?us-ascii?Q?46Cg5rS07KBH6oNipIB/SSDjT4CSE5ULYosYDfepoq2SbVbuM+yfKbLTiE0G?= =?us-ascii?Q?3ln56IvWebSAnzdR0oy1105WSwr1MWwWHIoe7eHB29EzzpYGQ1TF/WK1Y7KQ?= =?us-ascii?Q?myHXzUMZu/9W2tr9cYvzGSqQ6mjFS3FHf4WfMHfHmc5EaXgrtGXfRgVOgdHa?= =?us-ascii?Q?Tmp3e47Gn3NNLadapCB9zW4nl4AJmdDwViAse21C8nUd5ox4Asuy2NRqlQY5?= =?us-ascii?Q?sa5IO5dlw77euEuUoOrOzBGSqYLkHbfdt16TpiI0HEb1IvCGIGhxJ70/+Rqg?= =?us-ascii?Q?CTzmaXLaei/eCxSVkqsCmQLGxrVxpwf39LcVuESdh24IIyD3Y7wBTg7ckNUd?= =?us-ascii?Q?DqYSFWjS99nPrELGJP9wSmboBHyzFbgVoIGhDXMNiYMeVAMtxqut6e0FOeEl?= =?us-ascii?Q?KUci5wnJN6aTUyfHNaoP5G0MiQfwg5mJQQyYDm2BCx4dL0O7iGyR772fTrrc?= =?us-ascii?Q?rpq1zlL6yYWcJQFOyElSCMZj4feU4a1wF5zkZlN+NEIP2arzhZ/fGLPnmGFY?= =?us-ascii?Q?kxYRxDki9ZptocVotAGkaZteQTbONYYn92GSBnY78142HbIQ174s8LpwNOv9?= =?us-ascii?Q?DSQHCW/1VoAH5CGpsOWp2Rse+yx+LvnF+pX5DXga8CdchVA13GeuLirxF0z/?= =?us-ascii?Q?RWzUDYo4mdnZ9T7VcwiiS2xcPhWKI083+l80InxWUBaO8dJxJgPrmMXI2lT9?= =?us-ascii?Q?jHwnc9AA3Rh9j4BTtQfJi19r/4JhIVAlVmsbCCGO+tqHpWTWcNm4NaavLRwK?= =?us-ascii?Q?2tcNaA=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(36860700013)(376014)(7416014)(1800799024)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:19.2881 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8a1465e7-cec1-4fae-7fb3-08de5cc823a4 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023D6.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB5747 Received-SPF: permerror client-ip=2a01:111:f403:c101::7; envelope-from=skolothumtho@nvidia.com; helo=BL0PR03CU003.outbound.protection.outlook.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424453760158500 Content-Type: text/plain; charset="utf-8" Factor out ID register init into smmuv3_init_id_regs() and call it from realize(). This ensures ID registers are initialized early for use in the accelerated SMMUv3 path and will be utilized in subsequent patch. Other registers remain initialized in smmuv3_reset(). Reviewed-by: Nicolin Chen Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3.c | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-) diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index 4efef73373..e301bb467d 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -258,7 +258,12 @@ void smmuv3_record_event(SMMUv3State *s, SMMUEventInfo= *info) info->recorded =3D true; } =20 -static void smmuv3_init_regs(SMMUv3State *s) +/* + * Called during realize(), as the ID registers will be accessed early in = the + * SMMUv3 accel path for feature compatibility checks. The remaining regis= ters + * are initialized later in smmuv3_reset(). + */ +static void smmuv3_init_id_regs(SMMUv3State *s) { /* Based on sys property, the stages supported in smmu will be adverti= sed.*/ if (s->stage && !strcmp("2", s->stage)) { @@ -298,7 +303,11 @@ static void smmuv3_init_regs(SMMUv3State *s) s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, GRAN4K, 1); s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, GRAN16K, 1); s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, GRAN64K, 1); + s->aidr =3D 0x1; +} =20 +static void smmuv3_reset(SMMUv3State *s) +{ s->cmdq.base =3D deposit64(s->cmdq.base, 0, 5, SMMU_CMDQS); s->cmdq.prod =3D 0; s->cmdq.cons =3D 0; @@ -310,7 +319,6 @@ static void smmuv3_init_regs(SMMUv3State *s) =20 s->features =3D 0; s->sid_split =3D 0; - s->aidr =3D 0x1; s->cr[0] =3D 0; s->cr0ack =3D 0; s->irq_ctrl =3D 0; @@ -1903,7 +1911,7 @@ static void smmu_reset_exit(Object *obj, ResetType ty= pe) c->parent_phases.exit(obj, type); } =20 - smmuv3_init_regs(s); + smmuv3_reset(s); smmuv3_accel_reset(s); } =20 @@ -1935,6 +1943,7 @@ static void smmu_realize(DeviceState *d, Error **errp) sysbus_init_mmio(dev, &sys->iomem); =20 smmu_init_irq(s, dev); + smmuv3_init_id_regs(s); } =20 static const VMStateDescription vmstate_smmuv3_queue =3D { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424444; cv=pass; d=zohomail.com; s=zohoarc; b=MbXyuZ9GO/UBoFuN4tN84aFZTbTrUcTytGnp0rxXJpw6roHCnEa0uLqRMoyYqWm7IamSzw+T/k4K0S973wM28Whu96J/4QxtP9n8ksbRjabFO1ERKooWeYK4n5Xq/wMF9dzFBmMtNsHopA3aVlJT4IyMl2ya56VX1UvcVbHiSVQ= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424444; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Nr17xfYvG8GllODuWFtLwMWj4+SdmkHQWfMv/dYea7U=; b=I+rKF4ViUY5m3cVCmaJxY0BMohEsoof60KWEzSVySdpvTvAybUGlrNz8khzDGKTJhnjcx7vNMGsyRrmEpWYhQQ+J066ZSWEtBCK+7x9QAP9ZA6Olt9w7BioxTaWjkdaB41y9QJo9f8W1X1mMJTwXIHy2OKfTDNYns5WJy0HxIv0= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 176942444417087.54026261875617; Mon, 26 Jan 2026 02:47:24 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7Q-0000zy-Nl; Mon, 26 Jan 2026 05:46:52 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7A-0000h1-De; Mon, 26 Jan 2026 05:46:37 -0500 Received: from mail-northcentralusazlp170100001.outbound.protection.outlook.com ([2a01:111:f403:c105::1] helo=CH1PR05CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK78-0005fg-ID; Mon, 26 Jan 2026 05:46:36 -0500 Received: from MN0P220CA0026.NAMP220.PROD.OUTLOOK.COM (2603:10b6:208:52e::19) by LV5PR12MB9827.namprd12.prod.outlook.com (2603:10b6:408:305::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:46:28 +0000 Received: from BL6PEPF00022571.namprd02.prod.outlook.com (2603:10b6:208:52e:cafe::34) by MN0P220CA0026.outlook.office365.com (2603:10b6:208:52e::19) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:46:19 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022571.mail.protection.outlook.com (10.167.249.39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:46:28 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:14 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:10 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=miyi0WCUo6zCerbtegQP2TAHp3g5zAUfQoyaYEdv5SVL6BLJVrglR402ODe9J2QYT2RkFWYJeeBXPEnhLCDOFA+f2rrDaZjFoe3Z3oqs54AMzDxjAbd2GbGO76bYZbanx5usaf8pBlTssKqvVqankI2xMSKGRqqTNCPZB+Mc7YOsnyEywilxlglpR6ut3G/jz7eb2U8yyw7aQl5Htr7ruQ4YThV7zzAKnepD1RKN8eM/NZEXqKPWxtDVj3C6IbSXopfhPRm0qRYtTHcQ4j2gY/tXCrgk8xp3w19dC/CvzVNd4zcYddKmWbFZyw6c7JNkxjJXfprlZ/j/i2IvYpOK4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Nr17xfYvG8GllODuWFtLwMWj4+SdmkHQWfMv/dYea7U=; b=NZIMvQcrb8+t7VPO0zt1/2egJEgPVZYu29KmLrfwEQgGhonrku/2mRtUwe61dH4ftNQT1TjHTnxDyu3bqG0YOimsUrPsoCsqYRnCJZQ9r5djwbVZF/m5pCQiDEwXDmrQqTf4R+LWMh6tLyVU0f2104ePO4eKrXDa91T1gqe0Lc501nkcAidi3FJnAte2WXeINfo47GXyeXiPryl8pBTTUevAy2Aak6p6iKbVb2g2gjwTMgpDc+c5nQMhGA/dIXvwkMjDP33GcALsPxB2BAlVhycl7llRYg5mmZwY8x+xHyWAaVlayngRFQXH7WzW5tGbsfuYV8pClWV7XORTbpbn+Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Nr17xfYvG8GllODuWFtLwMWj4+SdmkHQWfMv/dYea7U=; b=A1hEHcEFz80wGEb/8mM0nV8dg7ZsNGv9dd/TWJGIdWgVLTnHmrBe+vHsiSdiTRVYEAncfi9OXtzohe9Jzynp4u/UC+7bYomeduN9pcb+bYq2sdNw1JDl2Osg3NONxOX2TZd9sCRs5eu3XXy89wkjaNQgqnd7GcA+6J+Ztz8ErK3tMN2PtBgFm/lQXiC6DwAmRoBmDzw9417L40blICv0MTTHf/YlXsxMnmNI2a617Ds7/gGpY6jsmGEuBmgPZLd1zH8aBO2PuGkOBADYejPGgi9+fo7BMnFucZx9Z34wSwUAVSMQxn/s3TgkBSDGeL75pwaBbz99JQJd0ztH207gMw== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 21/37] hw/arm/smmuv3-accel: Get host SMMUv3 hw info and validate Date: Mon, 26 Jan 2026 10:43:18 +0000 Message-ID: <20260126104342.253965-22-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022571:EE_|LV5PR12MB9827:EE_ X-MS-Office365-Filtering-Correlation-Id: 98647f4d-d95b-4967-38f2-08de5cc82920 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|1800799024|82310400026|376014|7416014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?ZRQUQNPp+sPj4dF4a7/Lh7WP1B6WHeijUJXpGgdGY21ZboHFoe8aU9qlUS6Q?= =?us-ascii?Q?KxGPvwEVtkMCYnzheIi4Vp2Q/Z8Bi5alSqCyjuHQCZ5O4dio8FxMjstIIv4/?= =?us-ascii?Q?AUfekfmStlWZtkpVFFmdRmW41gddNUXC1z9wCmXPC2F2JcrlVSzsd7jum0W2?= =?us-ascii?Q?KahDbcprBbDwsfZaMhXD/GfN+7VBa6KGps9hUzKZlY5L+F5KfWjqNLKjt4sy?= =?us-ascii?Q?SXa5XD5KDqJ5/dU6ReRaYSqpSvj2pYr2dI2KbEK/9G59Gd2WzMi4vOVuxPFR?= =?us-ascii?Q?0LD1Pl6XTzloahRWMayC5JvdXNeauee6vAtr+FSG792UCyIYcm8dzTjE5c7S?= =?us-ascii?Q?zGXVHr4ntlGv8b1mtHiwOfbQSZXdizUBkv8J+yLTlAH9gZzfQirE9FwHb7dC?= =?us-ascii?Q?g9ohc7kzUd8eCjWbbC3xlK+qRonp8JLvHZiG/8cYea0Dahyx1Ss5jsZmMhQd?= =?us-ascii?Q?k52dzJB+xgTzxsfQAjl/7QoKP80LykFY+oMM3osL+wRkJ/Q5ZcmF1T4CmoBR?= =?us-ascii?Q?5u9ndJUUJy+v3sHxpHzsVbX5Z2ojcAaLEBMT4Gb99nXZTZWU5um++1SbtZ8x?= =?us-ascii?Q?WC8FMj67QnUq7PMWwxszA2bmZpRR0Kjor00Eje1O6ONbrDA0/pGgkpU6qwVH?= =?us-ascii?Q?uDDsOE3HB4fuuQKf9LPcdV3z25nsGuFVDEnMyVYvHbh7yUYC6iIFf6gzZ2i8?= =?us-ascii?Q?b0zXnF6QRceMzFGAnQawsq9U1dedAd8FG64dM/ETyhsVCYKRuD9nkwchtCzk?= =?us-ascii?Q?qrrpgs87Jf57MlCjcXWZppeQECPHgiJk97AVuyKJs6tmUQwkPOfENbij78JL?= =?us-ascii?Q?Jk7ZwJU6fwsXeO+AvRV0Re+RtPldKKBDBbfU8ZvBCj8EOn4jBcjuIkBRslu3?= =?us-ascii?Q?DTPH+KKg/tX04exbh8AnsXv/rzhMx5cDbufrl98zaub+VKfb4KF1xaRKgzRw?= =?us-ascii?Q?UHuqtqukVqacjc3z6I0ftv/oFgMY8iN8GKkq66SBObCkbXXjFnUb4KWH0bgR?= =?us-ascii?Q?JMnS/jSjBJ8yc1esbtaiaDm3bOYOBP8eu3cn/ww92ighxSxUjtn3Zz7PHFPA?= =?us-ascii?Q?G9VyIDgibyy1ZfPeOARmdUGf1nmiWwsM6GxM5232aFo+nTr8hs38mWzN6/+8?= =?us-ascii?Q?NS2soWZfrNIkuBIJjGvMIsVlE3S+c4I5OHd/5ZWELQ5f+IAacDRnKupeN4H5?= =?us-ascii?Q?y+rJNZe9Aj2i3QLebBz/KNuH/1GOKiFlDQco5rGDReM2TVMCSTbp13oErhW2?= =?us-ascii?Q?PW8Oau9hQDoc09L25yaUpRvQJItT/sNnBhIyTGnFhp/N7rd3y8zP62o5VfjO?= =?us-ascii?Q?GlALpIraZ9ii6wzOOpo2L87+bQCYIkDL85Ldlkjas/cYEZvr5AlsUfbUT9C0?= =?us-ascii?Q?wjbhkRzAN5mAvRE94fVnLzDIAqJiIplhuuUQt7WMz7EtKIl73JUO1QwEYDCR?= =?us-ascii?Q?WPLb22i5BkQz+rPm2fK6TLlxyqPn6MVsuzrh+oCSrKib9rFfA0lPaEkP/F/Y?= =?us-ascii?Q?SsQe+QAf1eStsRpR7OXZDm0znEha+s4839IbgEwHG0OsXE0b9SQmBgoAhE8h?= =?us-ascii?Q?SU/KcaqXLhSN9bXUzsZXxnT+5iAQN1nDBqs4CuOG+aqJPEKpHyWDw+rF3i/8?= =?us-ascii?Q?8Ge8mcO8jlxiaOSTqS9bBYsdjv9H12IfmibRoEnTK/OSuv8CzYNtVTtxP5by?= =?us-ascii?Q?v2f25Q=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(36860700013)(1800799024)(82310400026)(376014)(7416014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:28.4432 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 98647f4d-d95b-4967-38f2-08de5cc82920 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022571.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV5PR12MB9827 Received-SPF: permerror client-ip=2a01:111:f403:c105::1; envelope-from=skolothumtho@nvidia.com; helo=CH1PR05CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424445780158500 Content-Type: text/plain; charset="utf-8" Just before the device gets attached to the SMMUv3, make sure QEMU SMMUv3 features are compatible with the host SMMUv3. Not all fields in the host SMMUv3 IDR registers are meaningful for userspac= e. Only the following fields can be used: - IDR0: ST_LEVEL, TERM_MODEL, STALL_MODEL, TTENDIAN, CD2L, ASID16, TTF - IDR1: SIDSIZE, SSIDSIZE - IDR3: BBML, RIL - IDR5: VAX, GRAN64K, GRAN16K, GRAN4K For now, the check is to make sure the features are in sync to enable basic accelerated SMMUv3 support. AIDR is not checked, as hardware implementations often provide a mix of architecture features regardless of the revision reported in AIDR. Note that SSIDSIZE check will be added later when support for PASID is introduced. Reviewed-by: Nicolin Chen Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 101 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 101 insertions(+) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index 89dc6f991c..33011962e3 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -27,6 +27,99 @@ static MemoryRegion root, sysmem; static AddressSpace *shared_as_sysmem; =20 +static bool +smmuv3_accel_check_hw_compatible(SMMUv3State *s, + struct iommu_hw_info_arm_smmuv3 *info, + Error **errp) +{ + /* QEMU SMMUv3 supports both linear and 2-level stream tables */ + if (FIELD_EX32(info->idr[0], IDR0, STLEVEL) !=3D + FIELD_EX32(s->idr[0], IDR0, STLEVEL)) { + error_setg(errp, "Host SMMUv3 Stream Table format mismatch " + "(host STLEVEL=3D%u, QEMU STLEVEL=3D%u)", + FIELD_EX32(info->idr[0], IDR0, STLEVEL), + FIELD_EX32(s->idr[0], IDR0, STLEVEL)); + return false; + } + + /* QEMU SMMUv3 supports only little-endian translation table walks */ + if (FIELD_EX32(info->idr[0], IDR0, TTENDIAN) > + FIELD_EX32(s->idr[0], IDR0, TTENDIAN)) { + error_setg(errp, "Host SMMUv3 doesn't support Little-endian " + "translation table"); + return false; + } + + /* QEMU SMMUv3 supports only AArch64 translation table format */ + if (FIELD_EX32(info->idr[0], IDR0, TTF) < + FIELD_EX32(s->idr[0], IDR0, TTF)) { + error_setg(errp, "Host SMMUv3 doesn't support AArch64 translation " + "table format"); + return false; + } + + /* QEMU SMMUv3 supports SIDSIZE 16 */ + if (FIELD_EX32(info->idr[1], IDR1, SIDSIZE) < + FIELD_EX32(s->idr[1], IDR1, SIDSIZE)) { + error_setg(errp, "Host SMMUv3 SIDSIZE not compatible " + "(host=3D%u, QEMU=3D%u)", + FIELD_EX32(info->idr[1], IDR1, SIDSIZE), + FIELD_EX32(s->idr[1], IDR1, SIDSIZE)); + return false; + } + + /* QEMU SMMUv3 supports Range Invalidation by default */ + if (FIELD_EX32(info->idr[3], IDR3, RIL) !=3D + FIELD_EX32(s->idr[3], IDR3, RIL)) { + error_setg(errp, "Host SMMUv3 doesn't support Range Invalidation"); + return false; + } + + /* QEMU SMMUv3 supports GRAN4K/GRAN16K/GRAN64K translation granules */ + if (FIELD_EX32(info->idr[5], IDR5, GRAN4K) !=3D + FIELD_EX32(s->idr[5], IDR5, GRAN4K)) { + error_setg(errp, "Host SMMUv3 doesn't support 4K translation granu= le"); + return false; + } + if (FIELD_EX32(info->idr[5], IDR5, GRAN16K) !=3D + FIELD_EX32(s->idr[5], IDR5, GRAN16K)) { + error_setg(errp, "Host SMMUv3 doesn't support 16K translation gran= ule"); + return false; + } + if (FIELD_EX32(info->idr[5], IDR5, GRAN64K) !=3D + FIELD_EX32(s->idr[5], IDR5, GRAN64K)) { + error_setg(errp, "Host SMMUv3 doesn't support 64K translation gran= ule"); + return false; + } + + return true; +} + +static bool +smmuv3_accel_hw_compatible(SMMUv3State *s, HostIOMMUDeviceIOMMUFD *idev, + Error **errp) +{ + struct iommu_hw_info_arm_smmuv3 info; + uint32_t data_type; + uint64_t caps; + + if (!iommufd_backend_get_device_info(idev->iommufd, idev->devid, &data= _type, + &info, sizeof(info), &caps, errp)= ) { + return false; + } + + if (data_type !=3D IOMMU_HW_INFO_TYPE_ARM_SMMUV3) { + error_setg(errp, "Wrong data type (%d) for Host SMMUv3 device info= ", + data_type); + return false; + } + + if (!smmuv3_accel_check_hw_compatible(s, &info, errp)) { + return false; + } + return true; +} + static SMMUv3AccelDevice *smmuv3_accel_get_dev(SMMUState *bs, SMMUPciBus *= sbus, PCIBus *bus, int devfn) { @@ -353,6 +446,14 @@ static bool smmuv3_accel_set_iommu_device(PCIBus *bus,= void *opaque, int devfn, return true; } =20 + /* + * Check the host SMMUv3 associated with the dev is compatible with the + * QEMU SMMUv3 accel. + */ + if (!smmuv3_accel_hw_compatible(s, idev, errp)) { + return false; + } + if (s->s_accel->viommu) { goto done; } --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424651; cv=pass; d=zohomail.com; s=zohoarc; b=G/ShOzlE3FZxNJOCmkzPoqbcqfLucnW1QUw5yYgkL6JQUx5j3Sx7LwJiv8QhMkYwRjxEjB6vF5whAo0L2kQXuXaskVlFB+TGTra0J8F7tbyXGjrZTZrMAEMZG3MsO59ZUT9Wg49v5LWM9jnY4gjGBzlteBQsKkKpH9wx6sUxDhM= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424651; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=3S2YabeeZo3+GE/L5e9ZiNn70KgxEa2AlHPuQK2Ckfg=; b=MRVSoN3/UzG0cmyi8/jPuOLBbaewXL6rV5SWlQhHjD1pdh1pE8RXwEOc/84QKzcKjXOYDp5yRwgw3pKYpQTksJuf76I5qAUq1THqYCSqWDsuaP+urT0SMDbehNBnl+VN7IBtnMizqvMsyldjajHxDsQSNxfT50/qpZCwLev3BME= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424651706840.9638968436811; Mon, 26 Jan 2026 02:50:51 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7s-0001hT-Sg; Mon, 26 Jan 2026 05:47:20 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7B-0000iT-Gq; Mon, 26 Jan 2026 05:46:37 -0500 Received: from mail-westcentralusazlp170130007.outbound.protection.outlook.com ([2a01:111:f403:c112::7] helo=CY3PR05CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK79-0005fr-2N; Mon, 26 Jan 2026 05:46:37 -0500 Received: from PH7P220CA0047.NAMP220.PROD.OUTLOOK.COM (2603:10b6:510:32b::6) by DM4PR12MB7765.namprd12.prod.outlook.com (2603:10b6:8:113::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:46:29 +0000 Received: from SJ1PEPF000023D8.namprd21.prod.outlook.com (2603:10b6:510:32b:cafe::1d) by PH7P220CA0047.outlook.office365.com (2603:10b6:510:32b::6) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:46:29 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023D8.mail.protection.outlook.com (10.167.244.73) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:46:29 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:19 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:15 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=M8GyN9Tfi4Z1gX17r8ASmWjz5/0zRtHihepYVh42tlyMaq2vPQoJ9BViWu0hidDzfoe1Yrwilp1owrRSFbeYj/XGFY+cPfPkjRT2WixImzFfiWzu+HEI+FhTO4OVMk0UtknNu5SRjwIDJmkA4pfFniCo3zb8GHKtzjf8NjX2b0lswNBVfZM2EgHELM9auOrFohMXpxuTQd9MPacJFMSWmGwqXoh4YL1uTn6kRB5NzAZuXLtiO96TXvhWkG60jw1ihjyT7YvI91AIMwOTGcd6YmGAAo2oI4/cgqVdSiDNZMJpGspU6YlK4HsyjaZdr1ZmGyas2rUWC/SWOm4/6wM+xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3S2YabeeZo3+GE/L5e9ZiNn70KgxEa2AlHPuQK2Ckfg=; b=jnfkcbqtJ9ZYJALOveSDQ6221ENHKVXIPVjQwKtWzrw2jReKnIY2nrOJPxMKDrtOZdhhNXz4jKAxLX7fKHYG0WidhbkDTccfAPpWQZng868wyJIrNQdms1NGGnQESAKgJePg0bLrQFPGvIuavgDXLzQzxB20uAV9UrF4oqbLp8sJqR/OoJN+61ueF9Ze8dpYmR2dwHh0+qe2wXW1lT6rWG8HcHS1DXNo4a5/BXm3FIiqYrmSSae4UaPffoHvzcMCAqTjlxnpMWz+4wKk9KhYt3yVxbriC20UBBkEp5wiqjWlAZUq1/LzwdZU9XYpd01qzGcX3eu42HrBYLmJXULCWg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3S2YabeeZo3+GE/L5e9ZiNn70KgxEa2AlHPuQK2Ckfg=; b=mXRSaKdZJbM2kYtIy+4ANsJQcLqJUtRSfZyJp7zrl9Br5+1tpLM+UzoK/YtASJ+S1u4MhE+BBd/bHzHRc3nCEfLlMQ47HmaLyKSbSf1OfAKXt/kZ38PSJ/GtsP57xF4WRYhBaKu+4NS9T1GDQbJFW3SiZYaJWzHCmjg1oI3Kyatktv6Snz7XI2MWV4HST/Lx95pv5PTjQsGnoChu2z7D0K6ZuXAgp51LNMxDieMkUr4zT57WDbNnnq5QHrDryXa5az1ZwjPsZtW6AkBbWtdIY+aCksuwegQqCsxZ9dVVVvRcPI01z5GP2QMV4Hznaw7AdRJyQJWSR5Lfp2wKKd7fLg== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , , "Michael S . Tsirkin" Subject: [PATCH v9 22/37] hw/pci-host/gpex: Allow to generate preserve boot config DSM #5 Date: Mon, 26 Jan 2026 10:43:19 +0000 Message-ID: <20260126104342.253965-23-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023D8:EE_|DM4PR12MB7765:EE_ X-MS-Office365-Filtering-Correlation-Id: 8707b570-7fc5-491c-e480-08de5cc82974 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|36860700013|82310400026|376014|7416014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?RXhSVE9YMEovOTN3VXl1bWJlTUs1V2FxTWhtcHlwSVZJakxZaDdVdGtha1My?= =?utf-8?B?bkw1S09XdmFkOTJvdksrQ1FBN0Z5L2ErS2hnZnFyTXJnNzVxMDNhZnNWVWRi?= =?utf-8?B?K1BsQzFKOUdkdjYxUHl2Tm13dWhvVHk4KzM5VGs0bFF3SFM0NjRFMkRlbDRk?= =?utf-8?B?U3hYWHRzbEQ4S3RzN0VwVzZ0T1p2QmVDcVJ6OEQvYmtWR2tiNFBUQVQ1T25L?= =?utf-8?B?S09pM1RHbWJNR0Z1NE5JWldINStOcW15VXBFakRDdFYwNHN3VkpLeXpCUTVn?= =?utf-8?B?WmtQTDhoYkVlN2htUkpoc3hMZ05CQ2orODVjT09FQ0tmbzJoSXREREt1b2VB?= =?utf-8?B?bXJDL2x0aXpHeEdCTnpvYWNiNXhEajRtUVI3MUhSZGRrZnJZNmJja0xhY0hE?= =?utf-8?B?dTZTeGZrZEJaMEJuUXdYQ3VmM0VOdllQakx3bmVnendweDhwWHBubjN0RnVY?= =?utf-8?B?TDFTaG00ZndLS2I3UnZzZzhsS3NHY3dvUmRzSFc2ZzhtMzhpclpFMHdNSjVW?= =?utf-8?B?OUdYWU9mODVJWTYxM2lyMFN4TlViQjI0TElPeVBZb1hrWVlYVndMRWgzamhD?= =?utf-8?B?RHExODlpMHB3QzRlRmxrdkxUY1F5ZEV4VjBOQmFsQzRoTVBsaWkwTFRDVmw3?= =?utf-8?B?ZXkrUDl2UlZaSUg0aFhTeGJHQ1BTYnRoQkUzWWROWCtoWFprVk5mY1hQbXBp?= =?utf-8?B?bVlab3lWWWREZ2UvZms0QTFPSzhEMlRtc3QxekNUOG1iblVPeHJCdFErMmw3?= =?utf-8?B?OUZ6eHRtL1RSR1F6OEFDZXp4Q1BkekMydlJZRjlWN3hWV0VFY1ZvMTZmL2xL?= =?utf-8?B?THdyZnJIN0ZQUThjRzNVMVZyS0FxaHR2OXRTT0J2OUZXS0ZlZ1ZJcGF4RFNR?= =?utf-8?B?Vm54V0F1emVMejdxVjFLS3hhVUw0eGxRZThhZGNrYWZ1RnRKN0NHaE5ncE5S?= =?utf-8?B?WUdKSGViM09wNjFEc0pDOHN6b2ZJUU00dVU0Unl2ZC93VThxbXBQRHVMRG5y?= =?utf-8?B?dVVQSVN2YVkrbXFVWmF1Sm1wK3pBV3hFMzk5T1Q2eDg4TFJWWm5UbFZIMWcw?= =?utf-8?B?KzBWS0U0OGhwRXM0KzQ2VW1jMGZRWDVLenF6aTBmbDB6ZHJadFZ4b1g1Q0Q5?= =?utf-8?B?bDB6UkhrR045N3NIdXNwYVdCWWJPOVlBcHVPNHcxeTJQdURzQkpsdElIU2xZ?= =?utf-8?B?cWxsNlRWUGlYaU9FSFJPemVXeFhNQUwvZ3VOb0RWNVV1RzRRUmYzblBDV1lY?= =?utf-8?B?SjZkcWN0S0JxU2xkNUFxaWQxdmUrb0FaNElvbTRoZEZvdDZ6clRHYmNaQ3Zp?= =?utf-8?B?alJnOURBRytKSmN6MDQ5bzBYL1hyR1hoZWdoWlBYZUZka0pGTy9LYUdEaFBG?= =?utf-8?B?ZndqT1ZzR0s2cWdUOWU0YWxKNHBmdmEwMHllSnRDUWNBZGJPWGZOb3h1MXVv?= =?utf-8?B?bDZpVDhSZTJOeDlYWXhKT3NTSU0zZElDdDRpaCtoZzI0SHVOZWtqTHBhOGNr?= =?utf-8?B?SmRseVYxQ2dPRGJXcTlaaXM5a1BFZzV2aEVZSTBCUE53WUYrSVdNZnF3eWVy?= =?utf-8?B?c3ZyQnNkT1gvazFQcG1scU9GMTcrSXc4bjF3VDNhOVEvWHpVd1QzT1VsVGtO?= =?utf-8?B?YS9wU00vSnFuUjRCckdvaVEzMExZOWNWQm83UjdjdTQ5R1lvcGNtcmg3SzZw?= =?utf-8?B?blVLc0phQy9pbHFzVmxDOXFlMTFYLytZa0gyUHZVUTg4SExSbkc2Nmx3SjRk?= =?utf-8?B?SVJLQndDaGdUaU1IckliU0ZxVTdoVTNtY2VONzRqVTRYbFg5TlNoWjlzNDRX?= =?utf-8?B?V1czUkpDZCtHQUFTWWlUMEk1Vzg1dWJ1UTk3MHlmN0ZoRDdLZG92dG9MRVU1?= =?utf-8?B?Q2ZESU9OblluZEU4QVl0L3NUS1A3bkVXUW1RWkFoc3ZsMjV0LzJ2WjhrK3pQ?= =?utf-8?B?VDVQaW0xbzBBdm5KZjloV1UrcGhqRFNBVmtrcUJzUmw2U1EzRG9tbFZjSGRK?= =?utf-8?B?Ukc1RUphRDQzUmMwTjArVTlLMXRES2IxMGZEYW5iNDlOd2dRY3ZCVEx3T0ZN?= =?utf-8?B?Z1A4QVhUS2g2Z1JHVHoxUmVZWUJabXV3UUFjWE81SVppaUcxV0J3S0VFYVZH?= =?utf-8?B?K2ZHM05KUEVRdElud1Qvcm5mYzhySWw5OTBQdXYxNUdsdzAwdWZqMEJDVTNJ?= =?utf-8?B?dUVqRmM1emJSWlN0NkRCWDU5bzhaNll6OWJuMUF0TEUxYTVMeXFFSEdRYUhy?= =?utf-8?B?VFhLM1N6enZzY1pOaWhWb2YrODNnPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(36860700013)(82310400026)(376014)(7416014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:29.1656 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8707b570-7fc5-491c-e480-08de5cc82974 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023D8.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB7765 Received-SPF: permerror client-ip=2a01:111:f403:c112::7; envelope-from=skolothumtho@nvidia.com; helo=CY3PR05CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424652420158500 From: Eric Auger Add a 'preserve_config' field in struct GPEXConfig and, if set, generate the _DSM function #5 for preserving PCI boot configurations. This will be used for SMMUv3 accel=3Don support in subsequent patch. When SMMUv3 acceleration (accel=3Don) is enabled, QEMU exposes IORT Reserved Memory Region (RMR) nodes to support MSI doorbell translations. As per the Arm IORT specification, using IORT RMRs mandates the presence of _DSM function #5 so that the OS retains the firmware-assigned PCI configuration. Hence, this patch adds conditional support for generating _DSM #5. According to the ACPI Specification, Revision 6.6, Section 9.1.1 - =E2=80=9C_DSM (Device Specific Method)=E2=80=9D, " If Function Index is zero, the return is a buffer containing one bit for each function index, starting with zero. Bit 0 indicates whether there is support for any functions other than function 0 for the specified UUID and Revision ID. If set to zero, no functions are supported (other than function zero) for the specified UUID and Revision ID. If set to one, at least one additional function is supported. For all other bits in the buffer, a bit is set to zero to indicate if that function index is not supported for the specific UUID and Revision ID. (For example, bit 1 set to 0 indicates that function index 1 is not supported for the specific UUID and Revision ID.) " Please refer PCI Firmware Specification, Revision 3.3, Section 4.6.5 =E2=80= =94 "_DSM for Preserving PCI Boot Configurations" for Function 5 of _DSM method. Also, while at it, move the byte_list declaration to the top of the function for clarity. At the moment, DSM generation is not yet enabled. The resulting AML when preserve_config=3Dtrue is: Method (_DSM, 4, NotSerialized) { If ((Arg0 =3D=3D ToUUID ("e5c937d0-3553-4d7a-9117-ea4d19c3434d"= ))) { If ((Arg2 =3D=3D Zero)) { Return (Buffer (One) { 0x21 }) } If ((Arg2 =3D=3D 0x05)) { Return (Zero) } } ... } Cc: Michael S. Tsirkin Signed-off-by: Eric Auger [Shameer: Removed possible duplicate _DSM creations] Signed-off-by: Shameer Kolothum Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Reviewed-by: Michael S. Tsirkin Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/pci-host/gpex-acpi.c | 29 +++++++++++++++++++++++------ include/hw/pci-host/gpex.h | 1 + 2 files changed, 24 insertions(+), 6 deletions(-) diff --git a/hw/pci-host/gpex-acpi.c b/hw/pci-host/gpex-acpi.c index 4587baeb78..d9820f9b41 100644 --- a/hw/pci-host/gpex-acpi.c +++ b/hw/pci-host/gpex-acpi.c @@ -51,10 +51,11 @@ static void acpi_dsdt_add_pci_route_table(Aml *dev, uin= t32_t irq, } } =20 -static Aml *build_pci_host_bridge_dsm_method(void) +static Aml *build_pci_host_bridge_dsm_method(bool preserve_config) { Aml *method =3D aml_method("_DSM", 4, AML_NOTSERIALIZED); Aml *UUID, *ifctx, *ifctx1, *buf; + uint8_t byte_list[1] =3D {0}; =20 /* PCI Firmware Specification 3.0 * 4.6.1. _DSM for PCI Express Slot Information @@ -64,10 +65,23 @@ static Aml *build_pci_host_bridge_dsm_method(void) UUID =3D aml_touuid("E5C937D0-3553-4D7A-9117-EA4D19C3434D"); ifctx =3D aml_if(aml_equal(aml_arg(0), UUID)); ifctx1 =3D aml_if(aml_equal(aml_arg(2), aml_int(0))); - uint8_t byte_list[1] =3D {0}; + if (preserve_config) { + /* support functions other than 0, specifically function 5 */ + byte_list[0] =3D 0x21; + } buf =3D aml_buffer(1, byte_list); aml_append(ifctx1, aml_return(buf)); aml_append(ifctx, ifctx1); + if (preserve_config) { + Aml *ifctx2 =3D aml_if(aml_equal(aml_arg(2), aml_int(5))); + /* + * 0 - The operating system must not ignore the PCI configuration = that + * firmware has done at boot time. + */ + aml_append(ifctx2, aml_return(aml_int(0))); + aml_append(ifctx, ifctx2); + } + aml_append(method, ifctx); =20 byte_list[0] =3D 0; @@ -77,12 +91,13 @@ static Aml *build_pci_host_bridge_dsm_method(void) } =20 static void acpi_dsdt_add_host_bridge_methods(Aml *dev, - bool enable_native_pcie_hotp= lug) + bool enable_native_pcie_hotp= lug, + bool preserve_config) { /* Declare an _OSC (OS Control Handoff) method */ aml_append(dev, build_pci_host_bridge_osc_method(enable_native_pcie_hotplug= )); - aml_append(dev, build_pci_host_bridge_dsm_method()); + aml_append(dev, build_pci_host_bridge_dsm_method(preserve_config)); } =20 void acpi_dsdt_add_gpex(Aml *scope, struct GPEXConfig *cfg) @@ -152,7 +167,8 @@ void acpi_dsdt_add_gpex(Aml *scope, struct GPEXConfig *= cfg) build_cxl_osc_method(dev); } else { /* pxb bridges do not have ACPI PCI Hot-plug enabled */ - acpi_dsdt_add_host_bridge_methods(dev, true); + acpi_dsdt_add_host_bridge_methods(dev, true, + cfg->preserve_config); } =20 aml_append(scope, dev); @@ -227,7 +243,8 @@ void acpi_dsdt_add_gpex(Aml *scope, struct GPEXConfig *= cfg) } aml_append(dev, aml_name_decl("_CRS", rbuf)); =20 - acpi_dsdt_add_host_bridge_methods(dev, cfg->pci_native_hotplug); + acpi_dsdt_add_host_bridge_methods(dev, cfg->pci_native_hotplug, + cfg->preserve_config); =20 Aml *dev_res0 =3D aml_device("%s", "RES0"); aml_append(dev_res0, aml_name_decl("_HID", aml_string("PNP0C02"))); diff --git a/include/hw/pci-host/gpex.h b/include/hw/pci-host/gpex.h index 695886dedd..1da9c85bce 100644 --- a/include/hw/pci-host/gpex.h +++ b/include/hw/pci-host/gpex.h @@ -46,6 +46,7 @@ struct GPEXConfig { int irq; PCIBus *bus; bool pci_native_hotplug; + bool preserve_config; }; =20 typedef struct GPEXIrq GPEXIrq; --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424440; cv=pass; d=zohomail.com; s=zohoarc; b=ilVx3/4UkdMnvQluEA3ezqVGUehI0QCe8f6yrKatqK6EVVrxzKYxX15j/gCnVPKF1UPFn7AuUX1YqOEtZiLkuhei6pvbmsPCAx/xq8HES0aniim0BBo1xMgvbkv96wn8HlQDgsrtr1gIl1BkI3ZPxKpyUFHQcOF1SelVFq94oPA= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424440; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=zA1yAJkIlJK3Xd9aLsr8potIy9Mqjz7zJmJjjulNe3I=; b=VTvHLIZntQsbqg1hHRU0ymbXE9OSdZX9rSpc4bxOnyaFLQT2VUCgNSPBe5ChCn9tV7V8+55BaO8R++rS4cR7cICoTF9VyFDIUWFSEeHptnp366FGg8P2Am76rRvsUeaqcOr8Z/UD+sZs0zujR/MHsVKWH62tLDvpP8qyzHO/gl0= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424440396900.2144733847925; Mon, 26 Jan 2026 02:47:20 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7d-00015S-3t; Mon, 26 Jan 2026 05:47:11 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7H-0000pV-EO; Mon, 26 Jan 2026 05:46:45 -0500 Received: from mail-northcentralusazlp170130007.outbound.protection.outlook.com ([2a01:111:f403:c105::7] helo=CH4PR04CU002.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7F-0005hJ-4z; Mon, 26 Jan 2026 05:46:42 -0500 Received: from MN0P220CA0028.NAMP220.PROD.OUTLOOK.COM (2603:10b6:208:52e::21) by DM4PR12MB5841.namprd12.prod.outlook.com (2603:10b6:8:64::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:46:36 +0000 Received: from BL6PEPF00022571.namprd02.prod.outlook.com (2603:10b6:208:52e:cafe::67) by MN0P220CA0028.outlook.office365.com (2603:10b6:208:52e::21) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:46:26 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022571.mail.protection.outlook.com (10.167.249.39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:46:35 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:25 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:20 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=gS1wxaKJdTXlbPhfs87AOBL20dmwQcwfJjfGioPiJMcs7zMR13js6XbS2gbb0jIZMGoxEAPB9G9nrW9mvvdYUeEp7n+glVLbyJjnOhhiGjgJGC2HQq0h5Ue2g4Ug56s0aGtQ+VtXVpB7H8Wx1sVKTlguOpPd1KeoA3Pd+4WR8OhNIxrYIk/jDPVV4QMmP2NIVy6ybE/Rv+GfxI7vleV8SDHWWBQ2andXjfdczZ27/FHMTMuFNxwowgNBieI1i6HvkueIAvw1wmP68rAMasy3Pw6VXQR5E/DiYTil1b1yvdKsGjUqbYJ4Is1Ramho8Ttji1tCx+K6PVlshn//2FOEPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=zA1yAJkIlJK3Xd9aLsr8potIy9Mqjz7zJmJjjulNe3I=; b=wvgjsjLVy+xgbSCyBFHGdIm83th+g5yPRyrEnh60rC914zAQKcF7t6TerBX+GdIKZp3jZV1WQ1j2g0zO8rv84jQiiuDEYBXorQGl9T3P2JbcPKKPyIzILvKGoqWog5xRS2KLcMIAIlOqpzqggrl7mijf3q74Bm4832rPRWE1llefWOIwbkcHSBdRm2FhEjDIjXd1v0HyV/j+IuM/KxVwNfcABdVoa/tf+GjLS29HplXmslo/dtcI02VdHsP63GptyJtiJiCv0RwD6J5YaZcJwcl1ZCePm+GWSGeANSyUMXZ4PXC3xldocEoVBoDlCjC9Hmqak/rxXVY1VSQPvoVtSA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zA1yAJkIlJK3Xd9aLsr8potIy9Mqjz7zJmJjjulNe3I=; b=Z8P2z2TtQDksxlUlSowAqLaAmVGEG3bNoQRkxEo9qNB+jtiPNB5ZVHQqdPXZ9NoIe3rKesOz4nhyDNsUC4QbypaxdKtvEMAeWi8uwqBxi7RmBS11LBo4+GTCEzcYrTKvkgy6w26jIqPk66GliqMuV0eIfofTHXyXVLAoEI3upsl4m0Ky+uEOo25HIuO7P40gJg8LGz6+8PAfPw0LcxSS9FNqrpPY0a6+9DI0XyGGoK7oP+slBTTjrY/vZ81NDTIiBMv1TwNr6u9NeRnQlRS1Yc/DaN01HYwrf5xjl4Qy4WKDkzsgUVUvNipaDSkFR9uGFaYB6EYK/PoFMGRtqF/pXA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 23/37] hw/arm/virt: Set PCI preserve_config for accel SMMUv3 Date: Mon, 26 Jan 2026 10:43:20 +0000 Message-ID: <20260126104342.253965-24-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022571:EE_|DM4PR12MB5841:EE_ X-MS-Office365-Filtering-Correlation-Id: 9093d9b3-321b-4a9b-4f47-08de5cc82da0 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|30052699003|1800799024|82310400026|376014|7416014|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?3kUXkHwaA047oW6qLvuV8Pyckqwy53Q00XBHqAHmuwdKWsiY1rKeBYS7t4Px?= =?us-ascii?Q?yBZyqKqIeK6UQU+nO8SghdyGSfqOHlU0Y6qbwnHi862BrCDt9A/gzyu74yD7?= =?us-ascii?Q?V6oLWJfdEfLv3zQkO4ZC4vEYMG+d/iVacDJN1xJpcXqsXJByZ9X7gEhzDzsl?= =?us-ascii?Q?9BgTCYq4jq8rYPp7MxlvlmRjkJ5HpC/HQrqzPnK3tnrSEKizJ0O9ol+1TIVo?= =?us-ascii?Q?JIbJIxT7P5ImIlhbVK3MOsPGDDzLLOyqiJ+qQjH7daDwV7tL3TXD1JzD94vb?= =?us-ascii?Q?j45vye6FsJzNOF/oI8UWlHW11CM63YCyUxV7bciWyLUjMNw9J/K1UTBiaAoX?= =?us-ascii?Q?FCnGniDB3p/4hoX7X34RmxNVaF/fkAZg3DlOXW3ir+TgJF64TDw1i/4C6gfg?= =?us-ascii?Q?7WDLLDYEQ/UYYGs0DIk0+J4/OI6t7hGyiJY9iLEwluwdrEjVsOGDWsu3lR/S?= =?us-ascii?Q?OY1FKRulLb/fRmJVW3lXgAa9kwQq+bIL6CmfA2sYOpxQ1mApNV+z0V2dt4DR?= =?us-ascii?Q?16YkXopxYh8CKvjLMmm6XdOibW33eRp/sze4UhoTeOjz5wSkc0psxbVan5Uh?= =?us-ascii?Q?YfmAk5KtNjYMgSU6z6nEJdMbFx9enW6HKZINlpgIGEyvR75fHUNl3e8nlUzJ?= =?us-ascii?Q?gbT1TdefIJH26R1QA72Nz8vtftj1SKotnLLSWsDSP4pLRXvqtO7t2WzmmQbv?= =?us-ascii?Q?IuzDchiLY0CqEAgrOmcTuv1ra78AMTtPVmKivKmgJ0KUxwwwDMZcaocrgs6F?= =?us-ascii?Q?yJCV1otZVcTSwFfD/OJ8Kx6tpeNJ72r/jJUyhbrrNXfmSijX1H+Lx2Jf03VY?= =?us-ascii?Q?So/pAtyFmM8LTcNANG+G4O10PJXW+ZFWIiR7VOWuVJFEATlIQitazODCoc1l?= =?us-ascii?Q?LDl1ipLdP95XEu2Cj4Tz8zntRCDxod/WmtEEe+AXmp5lP59A0qsg5EP7FeD9?= =?us-ascii?Q?fF2byGl8dm7kAZR6vijBOoASFoRnnG3q8BP6l7vPSeNvyTVABDi69OxP7xMv?= =?us-ascii?Q?dk7AGiUwhDNGU3Jqablax5WyPV2TC2W3+TIandHKVUvqq7YQ7IPUl7ES4kee?= =?us-ascii?Q?HPtueqWpg/gkRnB/IoTsqv/dKqInxjkNuoRfPDBTA8Z+eDExBIFxHzXQFElE?= =?us-ascii?Q?QWjVcNvWazpU98H0ESLhYmKIG4lbc6c/Ech1cZrHoVRhxgsCVFSxxrsBisze?= =?us-ascii?Q?QU6gB4OZMC7v4Mgnp/Ob/rvy0PbYUu4r+uOaPGs8GiQFeZxqW23yIX9ckvV8?= =?us-ascii?Q?pXlvFA0e8J1uum8yQJZmEM8BXoaG+mAIHs7kKSrGe5Z++KU/ZuBpJpPHt9w1?= =?us-ascii?Q?STh7Kjsn94OZ71wvpqoYUztIEEzMKqHroVHp2Aiq+yEE7mi9xql3hGKbah4y?= =?us-ascii?Q?vzcIP8ibg4/lXJznr6Pa9slzWcJzweHq5ktAgeenjMvFoEMDDvPRHKW5oaC+?= =?us-ascii?Q?/L4NeJkIVIjbAGGaIT9DIv/8I+owlX8xZhMQlCaA+Vhpfh++r/zA45dCtzHn?= =?us-ascii?Q?I8i+yro1+RxASygCMXx+bYahgn05WZEw16nljbmRfgNKkGk3Xr6sSutfa/uR?= =?us-ascii?Q?/u6Y4QctZS4UeiNqNluoKrX6OaM4Scm99FwitR99na7SilUAsfPmQ55q2WcT?= =?us-ascii?Q?tlWqzkANhPTZRuMaHUaVuUOPHXC4gRPIN6WJwcWiupzQUhxvWSD2nTQy0a5t?= =?us-ascii?Q?gbnixg=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(30052699003)(1800799024)(82310400026)(376014)(7416014)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:35.9984 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 9093d9b3-321b-4a9b-4f47-08de5cc82da0 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022571.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB5841 Received-SPF: permerror client-ip=2a01:111:f403:c105::7; envelope-from=skolothumtho@nvidia.com; helo=CH4PR04CU002.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424457473154100 Content-Type: text/plain; charset="utf-8" Introduce a new pci_preserve_config field in virt machine state which allows the generation of DSM #5. This field is only set if accel SMMU is instantiated. In a subsequent patch, SMMUv3 accel mode will make use of IORT RMR nodes to enable nested translation of MSI doorbell addresses. IORT RMR requires _DSM #5 to be set for the PCI host bridge so that the Guest kernel preserves the PCI boot configuration. Reviewed-by: Jonathan Cameron Tested-by: Zhangfei Gao Reviewed-by: Eric Auger Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/virt-acpi-build.c | 8 ++++++++ hw/arm/virt.c | 1 + include/hw/arm/virt.h | 1 + 3 files changed, 10 insertions(+) diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c index 03b4342574..9032a5df1c 100644 --- a/hw/arm/virt-acpi-build.c +++ b/hw/arm/virt-acpi-build.c @@ -164,6 +164,14 @@ static void acpi_dsdt_add_pci(Aml *scope, const MemMap= Entry *memmap, .pci_native_hotplug =3D !acpi_pcihp, }; =20 + /* + * Accel SMMU requires RMRs for MSI 1-1 mapping, which require _DSM + * function 5 (_DSM for Preserving PCI Boot Configurations). + */ + if (vms->pci_preserve_config) { + cfg.preserve_config =3D true; + } + if (vms->highmem_mmio) { cfg.mmio64 =3D memmap[VIRT_HIGH_PCIE_MMIO]; } diff --git a/hw/arm/virt.c b/hw/arm/virt.c index 91fec582ed..899b02e1f7 100644 --- a/hw/arm/virt.c +++ b/hw/arm/virt.c @@ -3080,6 +3080,7 @@ static void virt_machine_device_pre_plug_cb(HotplugHa= ndler *hotplug_dev, } object_property_set_uint(OBJECT(dev), "msi-gpa", db_start, &error_abort); + vms->pci_preserve_config =3D true; } } } diff --git a/include/hw/arm/virt.h b/include/hw/arm/virt.h index 5907d41dbb..3b382bdf49 100644 --- a/include/hw/arm/virt.h +++ b/include/hw/arm/virt.h @@ -182,6 +182,7 @@ struct VirtMachineState { bool legacy_smmuv3_present; MemoryRegion *sysmem; MemoryRegion *secure_sysmem; + bool pci_preserve_config; }; =20 #define VIRT_ECAM_ID(high) (high ? VIRT_HIGH_PCIE_ECAM : VIRT_PCIE_ECAM) --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424447; cv=pass; d=zohomail.com; s=zohoarc; b=RyVnxPTlq0QHoQJQ38uRVgjdYH/Md1hl2Bqje4T5HP2i5BfGTkyMOmoKJL3IxRUjGgr/4p3nXJ+l7cwoIAPZ1510Lr9qkDZ3laX1zzxpTPrPsK9IVj6TsateBGKZIqsx34GAMvVOq2SYT/dy7o/H/Ikcr2Rlm65SkDzVInF4JHs= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424447; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=z9/z9vcnNHyTjYwUUCXKWpKjzDVknRD6okAP9TjBN/w=; b=Ht81/TG3QrT4twAu3ZkdZg5Ot4I6KqBTzSaNm+oUYTyHVK2zx6fAFY8oTzgZIU/kDBBsy/zPu0SPF7jy7V/G7oKRI+tW2cIpZR5aKwXGELbcqNiXRFVyzFLS3de3c6Gyxc9I4wEGyNyi+AeDqaJAihQx24sSMLvdJm5lsXekZ6c= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424447621539.6109817310537; Mon, 26 Jan 2026 02:47:27 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7w-0002EU-M6; Mon, 26 Jan 2026 05:47:24 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7M-0000vv-AZ; Mon, 26 Jan 2026 05:46:48 -0500 Received: from mail-westus3azlp170120001.outbound.protection.outlook.com ([2a01:111:f403:c107::1] helo=PH8PR06CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7K-0005hu-Uz; Mon, 26 Jan 2026 05:46:48 -0500 Received: from SJ2PR07CA0002.namprd07.prod.outlook.com (2603:10b6:a03:505::25) by LV8PR12MB9153.namprd12.prod.outlook.com (2603:10b6:408:185::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.10; Mon, 26 Jan 2026 10:46:40 +0000 Received: from SJ1PEPF000023D7.namprd21.prod.outlook.com (2603:10b6:a03:505:cafe::25) by SJ2PR07CA0002.outlook.office365.com (2603:10b6:a03:505::25) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:46:41 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023D7.mail.protection.outlook.com (10.167.244.72) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:46:40 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:29 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:25 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=vh2XSjilzVZ8hbX1keQgt9Od3W8Lbycjsdv6ANvrxhyrvp38F99//eOWTZVtKGSyY0d1qnk7oNqTcWpso/O1j/rtyYH2IIKdqam5HK6XiWod7kLFfytrKb5dtf0hu5o37AtmzGvTpYT7AxBSXLq3+VSYG9bHHsCOoFboIxroJVWFM+fxcxnyL0XwnOdgad2JmYWzCkdzqSyVcPL/q4toJ+2Wve4Tq0hQv6/jGiGxT4QXfkCnDehlYrWHRgRm0ShggKjzzayRX0ayW14zHX4WgR2eug4/gNvYPn0SwP7DqGVaWbcC8PrzCV062i1245A2NZi6VWuXsiXAoW2YciHVhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=z9/z9vcnNHyTjYwUUCXKWpKjzDVknRD6okAP9TjBN/w=; b=nDFIg8dxn8GE6Bn4xWrPUEZSpxnlejz8L7HhtnA02ujVJchsaOV1blW66okdednTo/jyOsJy9gZHGOIXGRRE/JpHALwxSI7qpOIAH4BF7Bbqx6Ris/CFh6+0MH8MfdnwI5ue3LXpoyMOJx/dJu91OT3mhit4pOUt5hEEgiWPpWVvQcQopeg86zayJkWrN0CJQ8+xR5aTrL3qgjTo8AAGQCyz51skRkQq3OmHZU3D6gBUMY22om1o+NcFEOFhhZutCXUjQFwzgBDzJdmcLAdBrW4MHsc0ysYtSz2PI0g7+SvUK/RgjhEN4FHo1gEwmHXo/9FgnRxLTdTNej6tr3+Daw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=z9/z9vcnNHyTjYwUUCXKWpKjzDVknRD6okAP9TjBN/w=; b=lqz+DbRpU0XWkpwKVjlMwvJaZ0sGUiiMGZo8XE98NYkju572kOwqS/25RDyyfCWzH7mBCI0qOJcwQAyccY5/td6Zjfpim4GWKjQowaEIIk8iZERvytJ6syNrg2M3n2obKnBBKq6wnopHZiLo0FsdLuvs0eVmz7Ko+R6ukkJUHXHaYD+Ddw8IAV8VksIuAv/TmEvSoKS3Yx+/nNj2aogIb9bIt3zqlt7YqbfXSeEXfuObN3fuHyJtVV5Qe8GLgEQi3F7gHR19cbYzuNs4hlCHemdpeoHEfSp2CZkCNtbdSFnDMWuxwg0XgcC3gECNFtT3Y7y767C376VAZFAmgMpOxA== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 24/37] tests/qtest/bios-tables-test: Prepare for IORT revison upgrade Date: Mon, 26 Jan 2026 10:43:21 +0000 Message-ID: <20260126104342.253965-25-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023D7:EE_|LV8PR12MB9153:EE_ X-MS-Office365-Filtering-Correlation-Id: 2e2f3ea1-fffb-4618-f402-08de5cc83023 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|82310400026|7416014|376014|36860700013; X-Microsoft-Antispam-Message-Info: =?utf-8?B?YzlZTHJObnBCNXlQa1c4VXZKbTZ5T2hZNHIrNk9jT0E3T2VodExDTTBqT1Ju?= =?utf-8?B?c0N3S3o3STlJY1ZXeG80NkxBMVdpNmJqMHIxNXI1VmdsNktNeGtVa25wUW1M?= =?utf-8?B?d2xYSUhGZk50SDhEUGVhTEJRWmREWlJrUnRRSEJBMTNHVmo4TXpPWEI3c1E3?= =?utf-8?B?dUYxZXpTYnRobDNWaUU2UGRObFZkMW0wVDEweFFuQVVocUIycnBiTzA3QTl5?= =?utf-8?B?WG51WTVKbnlSU2ZPU3dZVDNNVm5jRHMxZk1hVHFiL0U2bGRVcUE1c2JWNkhF?= =?utf-8?B?Q1hjemtvWDdycjFFa2Q5ZFY2dUFTSUtpQTBHTDRUWDh6a3VNUWo5NEs3NEtI?= =?utf-8?B?YkZpRkJqNHZWUW9LbmxMWWwzTWtZRVR1VUhid3JMaUs2cUJpNFhBajZpanhp?= =?utf-8?B?N04zNStaNmNKRWJsQTR2VTZzL2tuSk8vUXNmVFRvOG83eTNJZjNKc3pQVElC?= =?utf-8?B?OXdobmNmVmgrdDBHdjRnMFBpZDFQNkFTZUVkZGlKRzJ6d3JFa2dqY1FTdjlm?= =?utf-8?B?cjZsbVljZnh5aE15Szdva2h4MWllTnVOR21QZDFvYllnY2duOEppbnQ5bWph?= =?utf-8?B?ZmFuQXpZLzVQWUswV29NbnZaSXpOS1gxTERRLzVaaGJ1WlM2bEFCWGdOQjRj?= =?utf-8?B?QzVjOEdBVEg4dzM4Ty9OamMvcU1lMmF4a3JQM014YUdlUWdaT2lDTEd5cjVF?= =?utf-8?B?UGlDSDJKWHhQa2FVajlLR3lqVWllVEIrbXVod0FhZ3poZFJid1ZRZ0ZGUFdj?= =?utf-8?B?ZWdML3lGdExlUC9zd3NuS0VybEhVN2xGNzFnRHBVSkZMSEtJTGpFYkEzWmlY?= =?utf-8?B?OWd6Nlp0MHZBNEJNV1ljanZvSmhtcWZJREV5QURMUm51bENMMXMzeVFvMTBo?= =?utf-8?B?UTh2ZGo0RjYzTW1VL1JuYjV3WVB5bkpsc2JVeVE0M2ZZNk41d3p5OTM1TnFm?= =?utf-8?B?bnNKOUYyRHRxOWNmUlBLUVdjK2J3dzUyNmtzV1ZDc0VJaElrbmVicDlGekpu?= =?utf-8?B?MEd2RlEzNUxYd0hoOHl5OC9PZ3BOUERrLzFZdUNwQUtEQkpRblgzRlRpVitM?= =?utf-8?B?RitxUTh0Tm5wUWpuOGllRGpDcFBFL1JFb0poN2lzeDY0UHVZa2ZUMnlzZ0l4?= =?utf-8?B?YU9GVUp3a2tIMGpqVkNSSG1rNGszL1prR3FEbHVuRVRHM3NkUkE3cXl2Vlkw?= =?utf-8?B?RUtJdUI0RWUyR2p6SnhyMHlxNWtHaDFGdVVaRVhUZFdnZVhQaWxMSjNNMG8z?= =?utf-8?B?Z3JkWTVvR3RIM1lCcXJUeTUwTjJLOENselFlaTNPS3pUVU42YTRHZ0lHRStz?= =?utf-8?B?Ulh0a0hxVGtWKytqT0xBSmJKOEZlWG96Rjc4WURTUDlnWkcwdmZuVmdtc3hN?= =?utf-8?B?NHlQODBVSWdhOVY5NWl1bk53aFRTQnVDRjBvQUJyWUF4TzVqeWhzUFhsYUsr?= =?utf-8?B?K0dBRWdvMkcyUFhjV2NNZUQwNERPT0MyRE02aStBRU41YjY5NHdvUC9sclZ5?= =?utf-8?B?ZWs2Y3pnbTA4alVycU9iODlJOVY3bE5QUWNSUjBQdTg3a2lCdEFtNEhGQTBU?= =?utf-8?B?SWxnMlFSNURmY1NRbWFnalR2b3g4blZPR2hDR1U5YXNGT09renBROURZS3Z4?= =?utf-8?B?bzY0MXdRaXNQQ05YeU0xTlZpMDFtWXloczhWNkthR3M1azZQamxYNENzU2lv?= =?utf-8?B?czZWUGdhcFNuUU1pdS9WWnFTMHhmLzdsaFZXSmgxTWZmYUlMQ3FzVFA5WjRr?= =?utf-8?B?SHpST1FLb29vQzNmVml6akpiNy9HRFhhOElKZithRzN5bFE0M05FOVFDVnZo?= =?utf-8?B?K1EybmFaU0lPSzNGUTZINFN4ZUlxK3IzdG45RjNpNjA0a2p5OTgydUdWYTgw?= =?utf-8?B?dXBOK0h6QWFGODhDaU9LVDV6Q0Y5YkRrSzRvaWQzZ1o4T2xFdnR1OUt1WlBW?= =?utf-8?B?Yit0YjFQRlRZaG9oU1ZvcVJmUnVGU0NOYm5veWd2RXpYQVhCcHFBS0owZHRa?= =?utf-8?B?V0NSTUlmMHJFVnhlZDlRWVNGdTNiMkFnZThnNzUxVnBMQkZxb0M3d2xzclJX?= =?utf-8?B?NXQrQU8xT3VXclJDYVdvWWpzWjcrdW52cWtvNi9iRzQ1YVVEWGdhUTFCYkZS?= =?utf-8?B?aEN0K1VEOElua0o5RW1ZUkIwcmlLSzlNbXEvNjRnMkMyK2FDZHJFSEp4RDQ0?= =?utf-8?B?MUxGdUVPWVlHN1J1Z2NmcStkUGg5SEVPVEwvSUxnakdNUHZ6QmM1NnhqT0JZ?= =?utf-8?B?TnZqeGhrdndKNFZULzNMVVVJY3lRPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(82310400026)(7416014)(376014)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:40.3766 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 2e2f3ea1-fffb-4618-f402-08de5cc83023 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023D7.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV8PR12MB9153 Received-SPF: permerror client-ip=2a01:111:f403:c107::1; envelope-from=skolothumtho@nvidia.com; helo=PH8PR06CU001.outbound.protection.outlook.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424449839158500 Subsequent patch will upgrade IORT revision to 5 to add support for IORT RMR nodes. Add the affected IORT blobs to=C2=A0allowed-diff list for bios-table tests. Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum --- tests/qtest/bios-tables-test-allowed-diff.h | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios= -tables-test-allowed-diff.h index dfb8523c8b..3279638ad0 100644 --- a/tests/qtest/bios-tables-test-allowed-diff.h +++ b/tests/qtest/bios-tables-test-allowed-diff.h @@ -1 +1,5 @@ /* List of comma-separated changed AML files to ignore */ +"tests/data/acpi/aarch64/virt/IORT", +"tests/data/acpi/aarch64/virt/IORT.its_off", +"tests/data/acpi/aarch64/virt/IORT.smmuv3-legacy", +"tests/data/acpi/aarch64/virt/IORT.smmuv3-dev", --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424575; cv=pass; d=zohomail.com; s=zohoarc; b=imKJK32VlMP/dhnOxQiAIg4tQZVZ6rnTGidiYRSFuT65YXzoIHs9ssoZ0EW+R5w+nAs+NlTxNfmti7f+W2A7+Z3MVO+pvhjE5w2h5kbBD53/mAQ9u1dvVCbMPKU0ks8kDGmZZWTxgz7Tre+gsFfOVIPoG+oYkWWZw0y9/yl1vsQ= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424575; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=RC6Crp8vDp2anvqfGe5iDEqRDEbEjq5GvJe7vLQhGkk=; b=LwVU/1WHuDhVriW64smlmEOeRsXNw8aDsZ/1w+WcL4Jy7MjqnPJDcM4+/uubrFJWQHk8z+aLpa85tS0Z2mGH+aGnTU0cBAVX5c+7IXZEx+yRSfdkRO9CYLVV2ZR7U6FDCEVzahrBwv+uV/D55COjZa2+APsWRzRs0gre6imyZyI= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424575762125.29280296769639; Mon, 26 Jan 2026 02:49:35 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7w-0002F0-Ms; Mon, 26 Jan 2026 05:47:24 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7Q-00011u-1S; Mon, 26 Jan 2026 05:46:52 -0500 Received: from mail-westus2azlp170120002.outbound.protection.outlook.com ([2a01:111:f403:c007::2] helo=MW6PR02CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7O-0005iJ-0L; Mon, 26 Jan 2026 05:46:51 -0500 Received: from SJ0PR05CA0176.namprd05.prod.outlook.com (2603:10b6:a03:339::31) by MW3PR12MB4410.namprd12.prod.outlook.com (2603:10b6:303:5b::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:46:43 +0000 Received: from SJ1PEPF000023D3.namprd21.prod.outlook.com (2603:10b6:a03:339:cafe::9c) by SJ0PR05CA0176.outlook.office365.com (2603:10b6:a03:339::31) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.7 via Frontend Transport; Mon, 26 Jan 2026 10:46:16 +0000 Received: from mail.nvidia.com (216.228.117.160) by SJ1PEPF000023D3.mail.protection.outlook.com (10.167.244.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.0 via Frontend Transport; Mon, 26 Jan 2026 10:46:43 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:35 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:30 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=KTMb76Vt4TEUbIx9ykum65x+K40T85WS41AixI5jGjEy6tl39u7ji91lpPSipo+rrr7swsPhJE+ZrpIhcpkhFYfGT7DmI++pN+QXAfoz40LXaxRptB7aobUcRYhXOiW1noLtUa8axc40ttA4Eh0aS+YrrtnOJTevJxy17/32raf243umBCNy0eYlmNrojhlK6Mun5RpkvkIUeIGgiXYZ8S8/qeP+IG6BDhWtY5sXI9B4LGxloAwpb6ST4z1ddnj+6P6NRlqecEe9kh+Uxeg9tTaQDcXMUuIWTV+Ql/H5LP6Ev6taSWUtCefuLGuddZ0mjPAUKMj1Jroq8m2hwPPfDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RC6Crp8vDp2anvqfGe5iDEqRDEbEjq5GvJe7vLQhGkk=; b=w6e/RnTuO0zG1+h21iIX96hncudfxs+5sUTWXzGn7SREvQG0uwWkFTjH83A6oHsqQlS2DCTpQCwvOV43zXgGfKTRfoX8MCh+pkzraPxOEEwKSxNzcDUMavooRY2R4xgvQo+ZYKZaAg2Q2nlTnjwTPIR/XInGITFxJ6x1IFhCz7qtSC5axTMtYnAi0EnbhFk2BKgbI63YKRG5ntXx7m97zwkNlrULQF52hOQ5FeTXhuaso6leLY5gL2xh0C/KgyZ5WtIQIlAR0Co8HIyY5wyoLjVyN59R9z6km3L7uAsMtymAOKX0MJacr1bBrbi78A3JhQ0WcEpD6mT5xzfOqul2pQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RC6Crp8vDp2anvqfGe5iDEqRDEbEjq5GvJe7vLQhGkk=; b=dExc1dOS17MBlgC936sgJ3jV5nLSbL69E00+69yZvVE9zrnOE6MZi+hDeKx01BKcl40ukvm+K2XnHbVGFzqxbq7fwRZSNh+ltyTSjq8GVfSPTm8iSeH2sdf7zANF47IPUxNyQkSIFRBeBomWcvauznfAmSDzyiUJ3caoPO/2kPLJbRhQl1X8/LJzp459XGUTKAE0g+ydpTx7f538lLF5AQTjaHq7DsmgZzEHAhAl06MoE5zXk4garnjJwxwWRQRDykKF18FWaJTtygAlWrhuZXw5uNWGrFcNbwG1ua/kRASMMkYxAVkaGPQHN6HV4cYjt+1qXkDWl7goJti+lR+r7g== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , , Jean-Philippe Brucker Subject: [PATCH v9 25/37] hw/arm/virt-acpi-build: Add IORT RMR regions to handle MSI nested binding Date: Mon, 26 Jan 2026 10:43:22 +0000 Message-ID: <20260126104342.253965-26-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ1PEPF000023D3:EE_|MW3PR12MB4410:EE_ X-MS-Office365-Filtering-Correlation-Id: fa4e56e9-592f-48f3-2183-08de5cc83205 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|1800799024|7416014|376014|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?YBr1cPO4f4X2TgypfMofd+Ti8XmHIKW1lEaceWlcoBLwvoZlfa8QPhUmWZzr?= =?us-ascii?Q?3EnyqU4zJ9Y00xy9eKzOT3wN5Kz4lO7r4TP1ET5fCSCRCXkn++HBmpGm5yb3?= =?us-ascii?Q?GctIfHPU9GyOUoTpdGakq5FFkLSUejEy8yWgI5YUL3b0p9ugqZYlQHg67BDD?= =?us-ascii?Q?VJRT9yqQC0IIuUhb6EY0P+077/3V+fm6QTfIQ98Cg0K9uYbnci3+EsTp0xS3?= =?us-ascii?Q?Amwt7p8tXFcA+tYlUrIqYBwH3mo36sp0eGNw+BzXrWDRI3cnVF8RmK0BUHjz?= =?us-ascii?Q?jPHOAQ5sXYUIvvZtFvZaTL7DFLTpQ6Of1hwIp491R0HV1zNqGwOvKtHdlDRw?= =?us-ascii?Q?xpZEi4Wmwvr08jm5LxRt55k7Blb0A3UMbHLRgdxeO18gUM+EDpaABKi6AalA?= =?us-ascii?Q?QerGhgOzCJKAHIRhJSp+PLpLxUmJaaovs8qNAacG1L1GebUZ7ox84zrOZ3s1?= =?us-ascii?Q?eKcvwwEpz4T+pLQUszH7ReaPeIg2Q8vZa203blfZjxyFfoDn15N+w8zkvQt6?= =?us-ascii?Q?RWWB4vuHlatwue5kqfKM8oE1A4f3bqOn69ZQZcWkxSSdXeEpZ8ZcKDzWSo/n?= =?us-ascii?Q?KnkB64JURBc2yA4rDa2lplI/kQXhoFNCG0FJ8GPj6AD6vQj6XvFria8TJ6dm?= =?us-ascii?Q?y7g0dbVYPkGMj8OrUlMztFZ+egpfibjTVY3Dz+6lUkdOTiUJaswzgDliSrmr?= =?us-ascii?Q?KV0APZBeNipSRrhMgg1vqlEHihdNKXddTdDW6ADhP6qcV+ecDBY/SbmozUcc?= =?us-ascii?Q?b3XtQUwrqZDABWi56k/BxSEbCyxfEcKh8Q7J68SapjheWqEzdwg+oN2TsQXV?= =?us-ascii?Q?uSdWWwTqa8YCA4VXZoYXmzuZgz8J1dMBLBJw9whUv+u7bvMkuG4tqbujmBhR?= =?us-ascii?Q?JbKJnqpyt9rApy6+L2fUPS5YO+KPcZ9RlB54r99zo/92gbi/ZpGlPU9/V0QA?= =?us-ascii?Q?oTaXXlJRoXLQM9W2IrHO8EEx7tCtocN2Wtqd9zRxY6HdHak/uyNXNTvVvHN7?= =?us-ascii?Q?jWJ+iC8YJ/1g5FrT117fRssECB1sxUPtn8TmIPZKAZ/Gdi5LhD2B+vOcZ442?= =?us-ascii?Q?MxFS28jnrn1t3Oxu7pCAZCitFngp/oHrpsaS9BDa7t+sg2ioDTCzbA/yojmA?= =?us-ascii?Q?5WzYSoKku9fHkq9dBqjLZaodC/Qc3iyqVO7OTtiKxrb76yuRt5e+H3LaUjEi?= =?us-ascii?Q?cMhwWus3emLCv6UIptmOC6N3EIXtF6W12huviy/03Ywt3aXtPYiW9j7neRgu?= =?us-ascii?Q?ofVZiv04xjf7EEAZuimWIXvpHf+FZs61zec0J3IcRC+MNovc1ziOd3v/h9HG?= =?us-ascii?Q?V/CUOwSkwGxnlJMXgmUg2JHjL6DZzVj/qr5aGR5937PlY9EgZQe87qUrG9/H?= =?us-ascii?Q?q/UpRfrjjZL1HqbVVv5AF1WdMcAZ3+hRGABxm11Stz/0ANyKUgYoSLXLk2UR?= =?us-ascii?Q?/zLweoUHDK+hdUzNwsf88eNJtram8OtvIG5xLMNw1MFhpON8Y3lVJL65xXyF?= =?us-ascii?Q?C966nDR4QiZvjbJNhWvjzFfpcTHvE1PXjSPFgquOog/27qPYpXhJ/5DCi1X+?= =?us-ascii?Q?EZBagA69VRsoICa+6Ka1Di8jzXJSAeFtyIuyaRVdDFFYqN/LIhdBQDTqSye7?= =?us-ascii?Q?LzXzCkw6XTRQxd/Y3MmGYZyhH0QOgxdqDNtWwJauVUAclIBFS8BbGPv9uSf5?= =?us-ascii?Q?3VoA+Q=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(1800799024)(7416014)(376014)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:43.5221 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: fa4e56e9-592f-48f3-2183-08de5cc83205 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF000023D3.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW3PR12MB4410 Received-SPF: permerror client-ip=2a01:111:f403:c007::2; envelope-from=skolothumtho@nvidia.com; helo=MW6PR02CU001.outbound.protection.outlook.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424577120154100 Content-Type: text/plain; charset="utf-8" From: Eric Auger To handle SMMUv3 accel=3Don mode(which configures the host SMMUv3 in nested mode), it is practical to expose the guest with reserved memory regions (RMRs) covering the IOVAs used by the host kernel to map physical MSI doorbells. Those IOVAs belong to [0x8000000, 0x8100000] matching MSI_IOVA_BASE and MSI_IOVA_LENGTH definitions in kernel arm-smmu-v3 driver. This is the window used to allocate IOVAs matching physical MSI doorbells. With those RMRs, the guest is forced to use a flat mapping for this range. Hence the assigned device is programmed with one IOVA from this range. Stage 1, owned by the guest has a flat mapping for this IOVA. Stage2, owned by the VMM then enforces a mapping from this IOVA to the physical MSI doorbell. The creation of those RMR nodes is only relevant if nested stage SMMU is in use, along with VFIO. As VFIO devices can be hotplugged, all RMRs need to be created in advance. Initialise AcpiIortSMMUv3Dev structures to avoid using uninitialised state when building the IORT, as legacy and device SMMUv3 paths populate different fields now(e.g. accel). Signed-off-by: Eric Auger Suggested-by: Jean-Philippe Brucker Signed-off-by: Nicolin Chen Signed-off-by: Shameer Kolothum Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/virt-acpi-build.c | 115 +++++++++++++++++++++++++++++++++++---- 1 file changed, 105 insertions(+), 10 deletions(-) diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c index 9032a5df1c..4ae4cbc6cd 100644 --- a/hw/arm/virt-acpi-build.c +++ b/hw/arm/virt-acpi-build.c @@ -257,6 +257,29 @@ static void acpi_dsdt_add_tpm(Aml *scope, VirtMachineS= tate *vms) #define ROOT_COMPLEX_ENTRY_SIZE 36 #define IORT_NODE_OFFSET 48 =20 +#define IORT_RMR_NUM_ID_MAPPINGS 1 +#define IORT_RMR_NUM_MEM_RANGE_DESC 1 +#define IORT_RMR_COMMON_HEADER_SIZE 28 +#define IORT_RMR_MEM_RANGE_DESC_SIZE 20 + +/* + * IORT RMR flags: + * Bit[0] =3D 0 Disallow remapping of reserved ranges + * Bit[1] =3D 0 Unprivileged access + * Bits[9:2] =3D 0x00 Device nGnRnE memory + */ +#define IORT_RMR_FLAGS 0 + +/* + * MSI doorbell IOVA window used by the host kernel SMMUv3 driver. + * Described in IORT RMR nodes to reserve the IOVA range where the host + * kernel maps physical MSI doorbells for devices. This ensures guests + * preserve a flat mapping for MSI doorbell in nested SMMUv3(accel=3Don) + * configurations. + */ +#define MSI_IOVA_BASE 0x8000000 +#define MSI_IOVA_LENGTH 0x100000 + /* * Append an ID mapping entry as described by "Table 4 ID mapping format" = in * "IO Remapping Table System Software on ARM Platforms", Chapter 3. @@ -265,7 +288,8 @@ static void acpi_dsdt_add_tpm(Aml *scope, VirtMachineSt= ate *vms) * Note that @id_count gets internally subtracted by one, following the sp= ec. */ static void build_iort_id_mapping(GArray *table_data, uint32_t input_base, - uint32_t id_count, uint32_t out_ref) + uint32_t id_count, uint32_t out_ref, + uint32_t flags) { build_append_int_noprefix(table_data, input_base, 4); /* Input base */ /* Number of IDs - The number of IDs in the range minus one */ @@ -273,7 +297,7 @@ static void build_iort_id_mapping(GArray *table_data, u= int32_t input_base, build_append_int_noprefix(table_data, input_base, 4); /* Output base */ build_append_int_noprefix(table_data, out_ref, 4); /* Output Reference= */ /* Flags */ - build_append_int_noprefix(table_data, 0 /* Single mapping (disabled) *= /, 4); + build_append_int_noprefix(table_data, flags, 4); } =20 struct AcpiIortIdMapping { @@ -321,6 +345,7 @@ typedef struct AcpiIortSMMUv3Dev { GArray *rc_smmu_idmaps; /* Offset of the SMMUv3 IORT Node relative to the start of the IORT */ size_t offset; + bool accel; } AcpiIortSMMUv3Dev; =20 /* @@ -330,7 +355,7 @@ typedef struct AcpiIortSMMUv3Dev { static int populate_smmuv3_legacy_dev(GArray *sdev_blob) { VirtMachineState *vms =3D VIRT_MACHINE(qdev_get_machine()); - AcpiIortSMMUv3Dev sdev; + AcpiIortSMMUv3Dev sdev =3D {0}; =20 sdev.rc_smmu_idmaps =3D g_array_new(false, true, sizeof(AcpiIortIdMapp= ing)); object_child_foreach_recursive(object_get_root(), iort_host_bridges, @@ -362,10 +387,10 @@ static int smmuv3_dev_idmap_compare(gconstpointer a, = gconstpointer b) static int iort_smmuv3_devices(Object *obj, void *opaque) { VirtMachineState *vms =3D VIRT_MACHINE(qdev_get_machine()); + AcpiIortSMMUv3Dev sdev =3D {0}; GArray *sdev_blob =3D opaque; AcpiIortIdMapping idmap; PlatformBusDevice *pbus; - AcpiIortSMMUv3Dev sdev; int min_bus, max_bus; SysBusDevice *sbdev; PCIBus *bus; @@ -375,6 +400,9 @@ static int iort_smmuv3_devices(Object *obj, void *opaqu= e) } =20 bus =3D PCI_BUS(object_property_get_link(obj, "primary-bus", &error_ab= ort)); + if (object_property_find(obj, "accel")) { + sdev.accel =3D object_property_get_bool(obj, "accel", &error_abort= ); + } pbus =3D PLATFORM_BUS_DEVICE(vms->platform_bus_dev); sbdev =3D SYS_BUS_DEVICE(obj); sdev.base =3D platform_bus_get_mmio_addr(pbus, sbdev, 0); @@ -448,10 +476,69 @@ static void create_rc_its_idmaps(GArray *its_idmaps, = GArray *smmuv3_devs) } } =20 +static void +build_iort_rmr_nodes(GArray *table_data, GArray *smmuv3_devices, uint32_t = *id) +{ + AcpiIortSMMUv3Dev *sdev; + AcpiIortIdMapping *idmap; + int i; + + for (i =3D 0; i < smmuv3_devices->len; i++) { + uint16_t rmr_len; + int bdf; + + sdev =3D &g_array_index(smmuv3_devices, AcpiIortSMMUv3Dev, i); + if (!sdev->accel) { + continue; + } + + /* + * Spec reference:Arm IO Remapping Table(IORT), ARM DEN 0049E.d, + * Section 3.1.1.5 "Reserved Memory Range node" + */ + idmap =3D &g_array_index(sdev->rc_smmu_idmaps, AcpiIortIdMapping, = 0); + bdf =3D idmap->input_base; + rmr_len =3D IORT_RMR_COMMON_HEADER_SIZE + + (IORT_RMR_NUM_ID_MAPPINGS * ID_MAPPING_ENTRY_SIZE) + + (IORT_RMR_NUM_MEM_RANGE_DESC * IORT_RMR_MEM_RANGE_DESC_= SIZE); + + /* Table 18 Reserved Memory Range Node */ + build_append_int_noprefix(table_data, 6 /* RMR */, 1); /* Type */ + /* Length */ + build_append_int_noprefix(table_data, rmr_len, 2); + build_append_int_noprefix(table_data, 3, 1); /* Revision */ + build_append_int_noprefix(table_data, (*id)++, 4); /* Identifier */ + /* Number of ID mappings */ + build_append_int_noprefix(table_data, IORT_RMR_NUM_ID_MAPPINGS, 4); + /* Reference to ID Array */ + build_append_int_noprefix(table_data, IORT_RMR_COMMON_HEADER_SIZE,= 4); + + /* RMR specific data */ + + /* Flags */ + build_append_int_noprefix(table_data, IORT_RMR_FLAGS, 4); + /* Number of Memory Range Descriptors */ + build_append_int_noprefix(table_data, IORT_RMR_NUM_MEM_RANGE_DESC,= 4); + /* Reference to Memory Range Descriptors */ + build_append_int_noprefix(table_data, IORT_RMR_COMMON_HEADER_SIZE + + (IORT_RMR_NUM_ID_MAPPINGS * ID_MAPPING_ENTRY_SIZE)= , 4); + build_iort_id_mapping(table_data, bdf, idmap->id_count, sdev->offs= et, + 1); + + /* Table 19 Memory Range Descriptor */ + + /* Physical Range offset */ + build_append_int_noprefix(table_data, MSI_IOVA_BASE, 8); + /* Physical Range length */ + build_append_int_noprefix(table_data, MSI_IOVA_LENGTH, 8); + build_append_int_noprefix(table_data, 0, 4); /* Reserved */ + } +} + /* * Input Output Remapping Table (IORT) * Conforms to "IO Remapping Table System Software on ARM Platforms", - * Document number: ARM DEN 0049E.b, Feb 2021 + * Document number: ARM DEN 0049E.d, Feb 2022 */ static void build_iort(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms) @@ -465,7 +552,7 @@ build_iort(GArray *table_data, BIOSLinker *linker, Virt= MachineState *vms) GArray *smmuv3_devs =3D g_array_new(false, true, sizeof(AcpiIortSMMUv3= Dev)); GArray *rc_its_idmaps =3D g_array_new(false, true, sizeof(AcpiIortIdMa= pping)); =20 - AcpiTable table =3D { .sig =3D "IORT", .rev =3D 3, .oem_id =3D vms->oe= m_id, + AcpiTable table =3D { .sig =3D "IORT", .rev =3D 5, .oem_id =3D vms->oe= m_id, .oem_table_id =3D vms->oem_table_id }; /* Table 2 The IORT */ acpi_table_begin(&table, table_data); @@ -491,6 +578,13 @@ build_iort(GArray *table_data, BIOSLinker *linker, Vir= tMachineState *vms) nb_nodes++; /* ITS */ rc_mapping_count +=3D rc_its_idmaps->len; } + /* Calculate RMR nodes required. One per SMMUv3 with accelerated m= ode */ + for (i =3D 0; i < num_smmus; i++) { + sdev =3D &g_array_index(smmuv3_devs, AcpiIortSMMUv3Dev, i); + if (sdev->accel) { + nb_nodes++; + } + } } else { if (vms->its) { nb_nodes =3D 2; /* RC and ITS */ @@ -563,7 +657,7 @@ build_iort(GArray *table_data, BIOSLinker *linker, Virt= MachineState *vms) /* Array of ID mappings */ if (smmu_mapping_count) { /* Output IORT node is the ITS Group node (the first node). */ - build_iort_id_mapping(table_data, 0, 0x10000, IORT_NODE_OFFSET= ); + build_iort_id_mapping(table_data, 0, 0x10000, IORT_NODE_OFFSET= , 0); } } =20 @@ -615,7 +709,7 @@ build_iort(GArray *table_data, BIOSLinker *linker, Virt= MachineState *vms) AcpiIortIdMapping, j); /* Output IORT node is the SMMUv3 node. */ build_iort_id_mapping(table_data, range->input_base, - range->id_count, sdev->offset); + range->id_count, sdev->offset, 0); } } =20 @@ -628,7 +722,7 @@ build_iort(GArray *table_data, BIOSLinker *linker, Virt= MachineState *vms) range =3D &g_array_index(rc_its_idmaps, AcpiIortIdMapping,= i); /* Output IORT node is the ITS Group node (the first node)= . */ build_iort_id_mapping(table_data, range->input_base, - range->id_count, IORT_NODE_OFFSET); + range->id_count, IORT_NODE_OFFSET, 0= ); } } } else { @@ -637,9 +731,10 @@ build_iort(GArray *table_data, BIOSLinker *linker, Vir= tMachineState *vms) * SMMU: RC -> ITS. * Output IORT node is the ITS Group node (the first node). */ - build_iort_id_mapping(table_data, 0, 0x10000, IORT_NODE_OFFSET); + build_iort_id_mapping(table_data, 0, 0x10000, IORT_NODE_OFFSET, 0); } =20 + build_iort_rmr_nodes(table_data, smmuv3_devs, &id); acpi_table_end(linker, &table); g_array_free(rc_its_idmaps, true); for (i =3D 0; i < num_smmus; i++) { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424560; cv=pass; d=zohomail.com; s=zohoarc; b=JTRRMphbFJ63JtW0hzccX4qgGOnSdn9hUZqeVqv/fYolhD4Qvuiwjt4SO0wIUY9U8+PrBR/KQxMC02d6IXQYnbYaU3lvi/0bPgZgLYCz7Ai6VPk7wvUDXjMIkPRxz+ASwGVK/tdimf3Fg+GpmxlGcwG8fljCmLpx+RUAYe6EjVk= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424560; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=oDnRsvAi//efRK5JnNaaRJq2ZkhxcZYysAZUVBtJ74g=; b=hZL50+yZuZztiGZ21szOWtomeCxGA+evBiOAqyQDKudyUN/vDM2MrOwul9RT711L2+G8zhhR/vabTf9Z390u/W+D8jC4H4yxxFs8RwkeSL20bEtLieuQFwTadJWes1cVBjekDd9L4ap+d3+q0lv7FhrxtkwF349KsImrfZqfzjc= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424560741709.1118286685405; Mon, 26 Jan 2026 02:49:20 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK82-0002vz-NX; Mon, 26 Jan 2026 05:47:30 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7W-0001Eo-P9; Mon, 26 Jan 2026 05:47:04 -0500 Received: from mail-centralusazlp170110009.outbound.protection.outlook.com ([2a01:111:f403:c111::9] helo=DM5PR21CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7U-0005j0-VS; Mon, 26 Jan 2026 05:46:58 -0500 Received: from BL0PR0102CA0062.prod.exchangelabs.com (2603:10b6:208:25::39) by DS0PR12MB7804.namprd12.prod.outlook.com (2603:10b6:8:142::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.11; Mon, 26 Jan 2026 10:46:49 +0000 Received: from BL6PEPF0002256F.namprd02.prod.outlook.com (2603:10b6:208:25:cafe::8f) by BL0PR0102CA0062.outlook.office365.com (2603:10b6:208:25::39) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.14 via Frontend Transport; Mon, 26 Jan 2026 10:48:03 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF0002256F.mail.protection.outlook.com (10.167.249.37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:46:49 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:40 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:35 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=vi0zvVbO4fDb1Dgra8pzRt9xvpkn9XElVpnVDcFyXsM6uqS/JrPpAgRUcRo+KJ6QC34TMPNHEMJ0Of2qd8uilCibmgWvTLLb8pFaUhNOZsIjy10RRZ1gK5NbuM+PEyqJgjrgof6ky57DQO4cDJCTkmJX0oQawDxUR5+X8IIaPYmdS8exPaJnVqC6iIYeSXF7VyfdPIy2vOJ0GHpMXbtrDN6WW8dNC8f4tzm1AHbV0rtcXch4NACS2brCbtdge1dONShi5yKDdwtBPbgnBtodDoCgt+hWXFZ8CROAQjWjEgjvB6V0ujQYj9DBmbx9N5lzQr+lDrlYBzg0lNvFDY78/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oDnRsvAi//efRK5JnNaaRJq2ZkhxcZYysAZUVBtJ74g=; b=Jz+SNL9vkmsHxs7eHHHakq4KkoTK2V3bugZwhraZY64bpP1r1mtjsJVqKjAafiDD5Qr9pG2LWajlkIDB+pnUgV653hyW9l8CgbbW3ANlbXTendfueivKRrsajd8UtSiSe+sEqcx+PnbjIgHFqyHhoesBDrUurEgEWZbi1UtvMoIpvCfBwD10BbHOac7jq41zk//PMon+cV/trrtlSbPBjJ9+peH9ACpFpAFQPS9RiU5qhesK7iHwoOvVJeHgrbAk1eM58fZ1chc5Vfd+qkl4EOmazWQuQ0If8usjsohzL3HVXlJrcQ0lze2wtfhPj76cGIPRd/WY2vEx5fhv6h/7kQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oDnRsvAi//efRK5JnNaaRJq2ZkhxcZYysAZUVBtJ74g=; b=aiQiKA7g4OEJ2U9w/Cpe69WoMaBQe+FLScBXDtocOk/bU2zC0H3nHHIv9oimKTa6Vv6PU+ndlCdyV+XB4fPBbX8ybSef5OCIq5dv1EwpZsHwnwrYCXHgbEOFXmm3LPlzTvlq25kijQmRUOqmZAjPOpFytM+AibRy/5i2ZMF5IS3VtSuS8NvsUmcpe7k5BVTsaF+Xwf5KJINjzY1v1/RL3iVZIvwmyZQNgwsp6C1JjcHwbEYBLRC8RBZv2lFFkrr9CNYUauxnwsiWxbRQx3s0nI7O5FJpniyymZBwTIdT3nH8FrU2Z26/IhsRRDOI2XlMQQJFqUoCbwJr919ELrm9Iw== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 26/37] tests/qtest/bios-tables-test: Update IORT blobs after revision upgrade Date: Mon, 26 Jan 2026 10:43:23 +0000 Message-ID: <20260126104342.253965-27-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF0002256F:EE_|DS0PR12MB7804:EE_ X-MS-Office365-Filtering-Correlation-Id: e4d7bac6-f8b3-4f65-1a99-08de5cc835be X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|7416014|376014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?on+sUrVQVhxqkL/G445ia97M0qDYyGiWzC/4yPFr28dUgvOPI4dW9bo7k3YH?= =?us-ascii?Q?/+l9OwJoePCMyTCafGAjjq5pgqst3Nc2O9uwKlx+ymnEqgsCcpChzVt/Hqpg?= =?us-ascii?Q?7E2d8k2Diq5PqzJwGrhXkBR9BnYOTjVe4PZOFNrVWuCKJis1W7tdn8dfI6dk?= =?us-ascii?Q?g1IjsEzyuv7Q1Je354MCjcCVG1ILo5HSgT9SI08PIzhT8O/PSkG/A4dDrTo3?= =?us-ascii?Q?oOW8JxKVEk6ErPKqFB+T7cIP3tivOjlD84EWsp5+q6ok6BHpbdTd1QsZA7VB?= =?us-ascii?Q?cWR3+ufrLbWabXKoUv4tuk14CvBQMPDLXMiDX4rderFwMILAtmcBdmk6vifE?= =?us-ascii?Q?VCrHr3MXAhhPgBfuFQM35KWJzbgKua5KptepV0XNQzjUcqosZGqcpUCBWTFU?= =?us-ascii?Q?q0PSx/dZhptDbEFmBOShUlTegkKoy8WUGM3vRrRhSg0bDyW0Uu4OYtS9Zkrd?= =?us-ascii?Q?pXi0foIuBn2rRM4L6C9dFOXKF9Epz5+F+GjWlLCDEkZHAwfOF/MkMFO7wtWv?= =?us-ascii?Q?CTM1z8hDYG7zPRYNUFKLg5pEmzRLXnEnoXtXaBZdBxQmdT6OfsYuVisqxVtH?= =?us-ascii?Q?SO/fxnMRVTFWEsoaXba5DOH9GCvaTHxB/RxvHXhTs+/aoxASfd4MF9R21DHA?= =?us-ascii?Q?b9BZDeJqp7YXqvVt/throh1gusnsJPLl4GQzWYmMPcv6Nedc8EJ1XU0L4ksO?= =?us-ascii?Q?f/aFwDhc//Mb7pSUyrgiea2AbG4hsqk3qf/foL6amQKOy70wiOrO2DP8Tn9a?= =?us-ascii?Q?GAtr3b3tcMOMAtGXZXyOQSmNuM5HOF/B6nt00Rjcc/YEbtMgKUOY7NI60yBB?= =?us-ascii?Q?pXxwdGgEZEYe41Jaj4Q7YOgc6GRioZA722US+wfnd8hhhISmqoSCXKmmIpM6?= =?us-ascii?Q?+n1GA6C+9ZrHOaAVrMu9FEkN4KJZnf+vNCVgRbGCkL/1HsE6DRAsDVdYGEnW?= =?us-ascii?Q?mpVOL9Jo6ky2x3RSZJtCs1/zAlT9uiO+dxylOrwMdz8NJZJq3qz6yohQJn9M?= =?us-ascii?Q?AlZ4FaNqAUntkmRE//CTsEGnFb2aXyOsqK5P3vxxp3sV6dpqblkKKwwPKzS8?= =?us-ascii?Q?y1a/d6dC7ch3Fd22IaanFGnoRL/pQxHKIOVu79455+csu8yhC+VDv0a5lKr9?= =?us-ascii?Q?wtTSKPHxm5BMqESV1mgOtwyUc5aRR7p65qqtpmaV7ScoIIQOEeh97KcZKsMb?= =?us-ascii?Q?9OqPkuIEqvcvyXhFVJV4x/z1Ek+NdjTPaiMvG/D5YrJdAHxegXJIuXhdVgIl?= =?us-ascii?Q?rk/b/PdaDDNB/h1h0AY5CF7TrCAR4QvKlBDNuzlwxH8rfXKfhiMr7iqJSI0M?= =?us-ascii?Q?7KkH2ffBmxQ10qEOV5mGetvXNVNg56NSo1KBZvmiQnTnUojqVb66Cys5lacB?= =?us-ascii?Q?tQ2NKIIAPzbZSoWemR+Q3aP4offxfUHBVRlz5voce235DkfyWfyoGbWVNqkC?= =?us-ascii?Q?ellKRecyGwmsbFUz7pL1udOIz1CBpp2CMGXf4HG7e4V5VL3relAqjACDIAIL?= =?us-ascii?Q?METR4XtOz4pfXFwN1UjGRzlU/6yEccKdpJm+RyVO2xgn9rQWQdkbXfNeErMv?= =?us-ascii?Q?i9Rd1U6uB2m9YvMhTKtNojo/rU939cxzkAeKQuFx4bEN1Hgj48NFF39zuQaQ?= =?us-ascii?Q?ThS7whTFDdg3xDWYVCl/1O4vqOF9zLJqnssWhV0HzywbTeFmhxLLOa6x9jZv?= =?us-ascii?Q?KWFNFw=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(7416014)(376014)(36860700013)(1800799024); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:49.6108 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: e4d7bac6-f8b3-4f65-1a99-08de5cc835be X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF0002256F.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB7804 Received-SPF: permerror client-ip=2a01:111:f403:c111::9; envelope-from=skolothumtho@nvidia.com; helo=DM5PR21CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424562828154100 Content-Type: text/plain; charset="utf-8" Update the reference IORT blobs after revision upgrade for RMR node support. This affects the aarch64 'virt' IORT tests. IORT diff is the same for all the tests: /* * Intel ACPI Component Architecture * AML/ASL+ Disassembler version 20230628 (64-bit version) * Copyright (c) 2000 - 2023 Intel Corporation * - * Disassembly of tests/data/acpi/aarch64/virt/IORT, Mon Oct 20 14:42:41 2= 025 + * Disassembly of /tmp/aml-B4ZRE3, Mon Oct 20 14:42:41 2025 * * ACPI Data Table [IORT] * * Format: [HexOffset DecimalOffset ByteLength] FieldName : FieldValue (i= n hex) */ [000h 0000 004h] Signature : "IORT" [IO Remapping Tab= le] [004h 0004 004h] Table Length : 00000080 -[008h 0008 001h] Revision : 03 -[009h 0009 001h] Checksum : B3 +[008h 0008 001h] Revision : 05 +[009h 0009 001h] Checksum : B1 [00Ah 0010 006h] Oem ID : "BOCHS " [010h 0016 008h] Oem Table ID : "BXPC " [018h 0024 004h] Oem Revision : 00000001 [01Ch 0028 004h] Asl Compiler ID : "BXPC" [020h 0032 004h] Asl Compiler Revision : 00000001 ... Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum --- tests/data/acpi/aarch64/virt/IORT | Bin 128 -> 128 bytes tests/data/acpi/aarch64/virt/IORT.its_off | Bin 172 -> 172 bytes tests/data/acpi/aarch64/virt/IORT.smmuv3-dev | Bin 364 -> 364 bytes tests/data/acpi/aarch64/virt/IORT.smmuv3-legacy | Bin 276 -> 276 bytes tests/qtest/bios-tables-test-allowed-diff.h | 4 ---- 5 files changed, 4 deletions(-) diff --git a/tests/data/acpi/aarch64/virt/IORT b/tests/data/acpi/aarch64/vi= rt/IORT index 7efd0ce8a6b3928efa7e1373f688ab4c5f50543b..a234aae4c2d04668d34313836d3= 2ca20e19c0880 100644 GIT binary patch delta 18 ZcmZo*Y+&T_^bZPYU|?Wi-8hk}3;-#Q1d;#% delta 18 ZcmZo*Y+&T_^bZPYU|?Wi-aL`33;-#O1d;#% diff --git a/tests/data/acpi/aarch64/virt/IORT.its_off b/tests/data/acpi/aa= rch64/virt/IORT.its_off index c10da4e61dd00e7eb062558a2735d49ca0b20620..0cf52b52f671637bf4dbc9e0fc8= 0c3c73d0b01d3 100644 GIT binary patch delta 18 ZcmZ3(xQ3C-(?2L=3D4FdxM>(q%{ivTdM1ttIh delta 18 ZcmZ3(xQ3C-(?2L=3D4FdxM^Yn>aivTdK1ttIh diff --git a/tests/data/acpi/aarch64/virt/IORT.smmuv3-dev b/tests/data/acpi= /aarch64/virt/IORT.smmuv3-dev index 67be268f62afbf2d9459540984da5e9340afdaaa..43a15fe2bf6cc650ffcbceff869= 19ea892928c0e 100644 GIT binary patch delta 19 acmaFE^oEJc(?2LAhmnDS^~6T5Bt`%|fCYU3 delta 19 acmaFE^oEJc(?2LAhmnDS`P4?PBt`%|eg%C1 diff --git a/tests/data/acpi/aarch64/virt/IORT.smmuv3-legacy b/tests/data/a= cpi/aarch64/virt/IORT.smmuv3-legacy index 41981a449fc306b80cccd87ddec3c593a8d72c07..5779d0e225a62b9cd70bebbacb7= fd1e519c9e3c4 100644 GIT binary patch delta 19 acmbQjG=3D+)F(?2Lggpq-P)oUXc7b5^FiUXej delta 19 acmbQjG=3D+)F(?2Lggpq-P*=3DHjc7b5^Fhy$Mh diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios= -tables-test-allowed-diff.h index 3279638ad0..dfb8523c8b 100644 --- a/tests/qtest/bios-tables-test-allowed-diff.h +++ b/tests/qtest/bios-tables-test-allowed-diff.h @@ -1,5 +1 @@ /* List of comma-separated changed AML files to ignore */ -"tests/data/acpi/aarch64/virt/IORT", -"tests/data/acpi/aarch64/virt/IORT.its_off", -"tests/data/acpi/aarch64/virt/IORT.smmuv3-legacy", -"tests/data/acpi/aarch64/virt/IORT.smmuv3-dev", --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424472; cv=pass; d=zohomail.com; s=zohoarc; b=jkID/4r7gxptL3XMKzlwDvBdz7seex09PjLEkNuwO3tvGklCQGNCFi4j+nL4konzdfk3Ny0WrkzD17lHIKXOto0XoQAwPeDmwg+OJFxTE5uYzPHQpg4GbcPB+QwY1J+VD0XVe2ryQtxE34ov9FSAZQuP0xyRLKiRL7mDtYIQXPU= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424472; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=7uvEMLfnPpjfI4pRy/79USmx/OL3kyxZUOgMXAAK7Bg=; b=iFXRru91fh86D+k2xZ6hkiKhwu48Dj3vUJjMZw1WfSscN3JML34dnAwNJ7lLXVb2eifkIaRSshX/U1tiecaaUbYSb/wpjf1ct/RbVNpeDtDaqP385hQxG3PISAgEveBCOKFh1cJUOISERcDOuRXN/omWADBDQKekjxblBmHKWBo= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424472515493.07851064790293; Mon, 26 Jan 2026 02:47:52 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK80-0002gx-T6; Mon, 26 Jan 2026 05:47:28 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7e-0001IW-9w; Mon, 26 Jan 2026 05:47:11 -0500 Received: from mail-centralusazlp170110009.outbound.protection.outlook.com ([2a01:111:f403:c111::9] helo=DM5PR21CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7b-0005jY-2S; Mon, 26 Jan 2026 05:47:06 -0500 Received: from SN7PR04CA0029.namprd04.prod.outlook.com (2603:10b6:806:f2::34) by SJ1PR12MB6121.namprd12.prod.outlook.com (2603:10b6:a03:45c::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:46:55 +0000 Received: from SN1PEPF000397AE.namprd05.prod.outlook.com (2603:10b6:806:f2:cafe::ca) by SN7PR04CA0029.outlook.office365.com (2603:10b6:806:f2::34) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.15 via Frontend Transport; Mon, 26 Jan 2026 10:46:46 +0000 Received: from mail.nvidia.com (216.228.117.160) by SN1PEPF000397AE.mail.protection.outlook.com (10.167.248.52) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:46:55 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:45 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:40 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=IHwPTr/2LvTHjrtNuI1IUtwJHk7j4EXbVj7iapsmdH1WmR7S5SV985auZScn6JBFdqj7KTQ2vdRd4LdInSJxNuvA9eWfK/I5LMzSzMxDdubNjr0cTjaj06A3dXCtQ1+RG03hp9Jtyb5/xHm9Jea5P04EmgTvOSNq4k0ld4nDSPzHPdAseK6duJ3j5YJO0TuAp18VEtNgMEv9ll+WiJnlojx9cThW0ux/rZTho0dLZ/TYecY+av2iwJ8z3jSGBFNnJsR3+e4g4WMI0XwxNm8XtEgGi9YUx3RTTUxCjxTN6BMoRluKxVl8E3BVlgzax+TTP7uCQC10Lxwbq88VnuOMBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7uvEMLfnPpjfI4pRy/79USmx/OL3kyxZUOgMXAAK7Bg=; b=WlHk779jAKkjGNRxd9PqJcPU9TuVFRyQS3zCi1TShR0M6JWf7snKyzBk1o3yJkOaw5QFKn53KGYaLLJy6Dsp0KCo61DEErkaAjoPJ/IVpq/5CYRJEGSH/EsbFndGiIbebFgydEgyREFIBMA42iNfNDgKDgzggOrYpFKJzLUVbYzZt2SvhW0t1t54NO7wD9fJR/xE7+nYwqSZK2hBGUD+VrmHeOjfV/Dcs0aif0EDpmGEkCm7NQgV6T2ycw7O3y3e37bsU3yBiFskepZjtlsomU7YHLBWWH4PqkrSRw5Ze/PLOv0FgXWYsgLgnfuun7MLkEY3hnVaHatOdKDpBB3kEg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7uvEMLfnPpjfI4pRy/79USmx/OL3kyxZUOgMXAAK7Bg=; b=gHD5a2MNQyrE7Y2plU1PRYerUxbGK0S7MEPBdsThyLe2cHQf/RgY8cz9X+g32WTp0g/qLwKZbbq5HWLvAlLSWp3v/7lhFcAINDag4qwipASgGRA9pkoaSGudmKerDiggKxH3zOiDXojWcBWc6A6lYelxLCOyFzZJzLwGbS3D5REAq6CsfmHiWQaMqEyfLacIewoHm2LbpfcmfC2GasAeC4vWdVDV5GdWTTCC/1H3oroXw9207P9pFzuqTD8RCHEbN/u75hpzEnbLdq3X3KVyt7YKKWTW10nZz73nVhXg6BFqxFlurKXlnhr6jFo4UExmTJ4Z4gxA4IxFQHyERC4ueQ== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 27/37] hw/arm/smmuv3: Block migration when accel is enabled Date: Mon, 26 Jan 2026 10:43:24 +0000 Message-ID: <20260126104342.253965-28-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF000397AE:EE_|SJ1PR12MB6121:EE_ X-MS-Office365-Filtering-Correlation-Id: 7cc80387-4f10-417d-627b-08de5cc83933 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|36860700013|376014|7416014|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?QwfSggm9CZTihyaH7OoZtekLR9ZnfLcIh+8Wm7VzNRyABDWWg1StPWUnCW45?= =?us-ascii?Q?kIiJObiUlc7+jjg7+U52WIW8NHUl2qjJiPtBMjt5YaGTyO2weeNmY1tUlcnA?= =?us-ascii?Q?rousGMp91qQBxvr0dVB0aNpDWGuMYcK6JOf3dgD1283QzVjRUU87Vp1hWfjZ?= =?us-ascii?Q?DPR8wiRvvBKyE6X3zS5ijFReYqwNM7ijNgZtHIFMqxTg0LTsvaceKzCYSp1V?= =?us-ascii?Q?TImBie0mMcrAFRPjtuz3dl1Ly9XsbICjKFwCMBp9V+XtCuq7AyECx8z/PYcm?= =?us-ascii?Q?M2Nprk9SS0HeboS+vQX+VLDyJXEEpL8adAfEx466ZgV91PIwjQWDcZu5pWY+?= =?us-ascii?Q?H0KJcwEFUiFMYN/FQJSYeXaEp6eg1kNjb8C8pptZDzmo63SkOskixyvhupaZ?= =?us-ascii?Q?28ruD58nVCUEKYCYkJvgBg/fvt68GXpwMQLw5YfGWcPDAf7vbuf2heWVpjyY?= =?us-ascii?Q?+0Xn35E0pXmKbIcqdpj38LL+a8hPxY4tPG5swmzhkdSR2jsQW4SF9THw30EF?= =?us-ascii?Q?RXZfjf5ZgdHVIxGl9xg2KpKtu6Rlxoh+4OFp/NpNF86PF+O5AvNM2bYHyseA?= =?us-ascii?Q?eGXnm81OxVRNNa8RTWffEm+P5sUc6OYflh9+vGH4TySKv39HPidMDGw8iszy?= =?us-ascii?Q?vel393m6iH582vdaP8R5h+6ANUGcGevVoVMbwPBKWNf8UXQx34yKVcAv0aTU?= =?us-ascii?Q?ayIx2YJUnPjUAE+scc+18B5riUi8aCJ/a6fYuxJurvosjaAFmu1BvWn11DLY?= =?us-ascii?Q?u0kpG3AfZo9ELtlqpJuJQZgnBnbwlOT53lbvxrkrj+fT1NZgkBIOvYohRh44?= =?us-ascii?Q?quMndRKxHEXivtGLVWHLOca8CWfVyK5rv/GjFwAJUiBTI3Dt9/0cb3KSV05n?= =?us-ascii?Q?YbmEUqLocirUi3h5lYLxKIlQKdJI1fGP7ffPr6uF7ECWuYhiG550eFR7rPFv?= =?us-ascii?Q?OqVIt3BYN+OMc06KjxXUm8EVDrpBLqEYwCNDvQUC5Nt4NE84Thyo+yKp2jWn?= =?us-ascii?Q?FeqVgxa2CAJspMwc1AcxYuSVSyiVQ24tZL9hd7DVV7RANFUCCwVVplfcDH26?= =?us-ascii?Q?Z56m3d50kF0CkvEVghSglfytriZq+Z80smknGcB+l91YwgJXzRnX3epaVFlC?= =?us-ascii?Q?F+PsiG5fnTGe5MR/0ApA3Qtxqy8HjtoIW9PqQwuPO8hpFRtgzDEBR/QPEYMN?= =?us-ascii?Q?WKkM2PMs4CaEuVek1mE35+n6jsUO1rok7WTGElvEYtBrMV0U9DAPbvEbNXed?= =?us-ascii?Q?EmGMIl4rYB0oFs8XkG968BTmYJRovXXuS6yI9nixS0P4WVNK0aeLbt/GB50L?= =?us-ascii?Q?o1I8z02HsB7pdGdzadyxIFAG3Pvs1ai5Ur9GBZ5v98cvj02jwoJecmpRwD2N?= =?us-ascii?Q?VeYNdpDDOZ/HyIEnvzuNAimicBi/TAX61ZQaIMn6aOX07Zw++jRhlOtqBvmp?= =?us-ascii?Q?3tg5w+UPIo2j8SeD8fmfE4Dw1pApOWkuvtOlIE/gH6LpUBCMoqfLDojmuN5E?= =?us-ascii?Q?aofXUbDXWFgNSf5YwRk6u3dBkTHXoJrBE0rR+8Z5yYgBAhVyFYfDqL5w6E8k?= =?us-ascii?Q?MmlxMtIg1Zx6/nheKtLkI/XRf11pm9MC4TJFhS7IttjVMVCyTdNVrVQUR9F0?= =?us-ascii?Q?rECblJMl9HKPueO7aVk6J1nbZsK/T/stqFqnLBcYxtvVacDbpKjW9FrT8f3C?= =?us-ascii?Q?dVbcYA=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(36860700013)(376014)(7416014)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:46:55.4628 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7cc80387-4f10-417d-627b-08de5cc83933 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF000397AE.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ1PR12MB6121 Received-SPF: permerror client-ip=2a01:111:f403:c111::9; envelope-from=skolothumtho@nvidia.com; helo=DM5PR21CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424473644154100 Content-Type: text/plain; charset="utf-8" Live migration is not supported when the SMMUv3 accelerator mode is enabled. Add a migration blocker to prevent migration in this configuration. Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3.c | 6 ++++++ include/hw/arm/smmuv3.h | 1 + 2 files changed, 7 insertions(+) diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index e301bb467d..2be056d792 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -20,6 +20,7 @@ #include "qemu/bitops.h" #include "hw/core/irq.h" #include "hw/core/sysbus.h" +#include "migration/blocker.h" #include "migration/vmstate.h" #include "hw/core/qdev-properties.h" #include "hw/core/qdev.h" @@ -1925,6 +1926,11 @@ static void smmu_realize(DeviceState *d, Error **err= p) =20 if (s->accel) { smmuv3_accel_init(s); + error_setg(&s->migration_blocker, "Migration not supported with SM= MUv3 " + "accelerator mode enabled"); + if (migrate_add_blocker(&s->migration_blocker, errp) < 0) { + return; + } } =20 c->parent_realize(d, &local_err); diff --git a/include/hw/arm/smmuv3.h b/include/hw/arm/smmuv3.h index 5616a8a2be..9c39acd5ca 100644 --- a/include/hw/arm/smmuv3.h +++ b/include/hw/arm/smmuv3.h @@ -68,6 +68,7 @@ struct SMMUv3State { bool accel; struct SMMUv3AccelState *s_accel; uint64_t msi_gpa; + Error *migration_blocker; }; =20 typedef enum { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424649; cv=pass; d=zohomail.com; s=zohoarc; b=chwmvH/ucVdjFX6c4rP8QC6SfNDMmAxdYfYVtB7RmeK+oOx8hskmuoSoD3aMsra/wGIMZbcfLtx8jZSC7EJxiUGjCCEc37UIcVfcFOXSl2sKeC7MgH0lRsXBhr3E1NFAc2X/PDkkvkEtluzaQLFD1SrP7Dzk1BtmLpaD8AUc7NY= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424649; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=gNxBEwVoxffxnC8GNALxIwk0s6QWYmH1UQApLenitbA=; b=TcpfLxer9bUE3IEnRFBBXdoa+n0dlgM2jS9LNKpJoVLqO+Ewn2SkQBPmmJtMC193D3QXv9P/VjsYBunG3g/fXd2VE0LxKW9C36staXUPZOiFFq75DThwIfE0qC+bjv5Xh4+EkyRppeiTY/IXjWURc4vE5oRKN6PgfFWvWF2rnYc= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424649408191.80906826494925; Mon, 26 Jan 2026 02:50:49 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK81-0002l9-DU; Mon, 26 Jan 2026 05:47:29 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7j-0001N7-WD; Mon, 26 Jan 2026 05:47:13 -0500 Received: from mail-centralusazlp170110009.outbound.protection.outlook.com ([2a01:111:f403:c111::9] helo=DM5PR21CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7i-0005k0-Ak; Mon, 26 Jan 2026 05:47:11 -0500 Received: from SN7PR04CA0007.namprd04.prod.outlook.com (2603:10b6:806:f2::12) by MN2PR12MB4485.namprd12.prod.outlook.com (2603:10b6:208:269::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:47:03 +0000 Received: from SN1PEPF000397AE.namprd05.prod.outlook.com (2603:10b6:806:f2:cafe::38) by SN7PR04CA0007.outlook.office365.com (2603:10b6:806:f2::12) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:46:54 +0000 Received: from mail.nvidia.com (216.228.117.160) by SN1PEPF000397AE.mail.protection.outlook.com (10.167.248.52) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:47:03 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:49 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:45 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TEv61mri+QvDuicZsk4MydxBe2ubbMJsWj0VjBg9iEZwjmYJghBsJv87fSovkCBugE4RWtJJdoKEyq1oftOyGP027MX07uOiGTiCzqrYN3Nwd9i3RK8zWm80fGIZRgtlPx4qsacbVBkSRMFGkLMDLyC7Jfm0oIghxQuLX+vzgDzOBjHHjiKE6Wk6GGTK4ee0QSj4GOXGF2k7edLCZ0n2Yz0en91aVaBZ8JVtat81tbOWZC3uFpjMh6V+xJvsfHBfw82d4RKgRZq9graQbtAMtoo1DqWQSjTAaqgvCXN/29bsbXJD5CnPrEPR1ERefLR006o1D1YH2cPpueWzQNhNnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=gNxBEwVoxffxnC8GNALxIwk0s6QWYmH1UQApLenitbA=; b=RkQhkURk0G9BPcKL/RktPnhMBb5hi3ZVfQ3SKO3LjPzNDb1nJ8xO3Tl3gpvrtRubIRy2x9gXpzjyXV0X80f9Ygko1UMbbj56DGrz+XrhybtDa38mkrd8Tpke8Uo+U0DQeE5MhlGgyv+7ukGe3CcJN9GsXbmglisn/A9bWVx4wvedjb3lqSgEfE09//SjYtYheKLjtpzxbydrdTtSxaneCuYP6/6hCe3LR2y2cCVquhhVLsvyyuQk2UKy34g5gXvHPUBfLJ9TQMZ781gcVap2UqeZ3I7v+Nne3Y813/zFycGX8URc8EKbnt9FYRnD4zgP5EA5uM+gzK85gL9wezWh3w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gNxBEwVoxffxnC8GNALxIwk0s6QWYmH1UQApLenitbA=; b=eCjq8p3c3HTAsMMUR7x5h1OiumRPIacAB31/XDWmwXOatERW1lFprCmedNWf2BgBBSvTIT3DbPwfxQAwHAWx+EsqpXL0URmPleN1LF/s6g4gwoKKShIvvWcLTfrIyOlTV7mfUwTpm3trWFshLFx6iCnxVczOvhK1IfJBxksnLtBQoIuUxC1/vaLWt0r2DsROXALZGEbTKTNRbQevHX6w/hg+O5c9EqtBHWvwNxmZowqUxd2NkXNRTBUnrDWyjOe0neR2kaymgTY1Go69rwAnARG45bU/HsKK1ucPulYRO3tdXHJlP1gvEOqJiYsQWDPEaRh7zxOAJsOH1guo4Zyptg== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 28/37] hw/arm/smmuv3: Add accel property for SMMUv3 device Date: Mon, 26 Jan 2026 10:43:25 +0000 Message-ID: <20260126104342.253965-29-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF000397AE:EE_|MN2PR12MB4485:EE_ X-MS-Office365-Filtering-Correlation-Id: b0e453f1-7372-45d7-ca85-08de5cc83e1f X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|7416014|376014|36860700013|82310400026|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?VBJE+ToSSWnNfQWj3DhLowBDXc8XRzro8CHWcrcmlbU/xYiv53oNkMw7MCCY?= =?us-ascii?Q?3VndWQKN+o03AaIr1058ovBmGjQ1r3yzQsPbITRqUYO5YHGThsWxTkW0kVLn?= =?us-ascii?Q?sipIahqVXgmnN9itrAky0vI6o9BvN2Ey1dlzpAxlhulEEmQr+qiorjVTSr9d?= =?us-ascii?Q?DybiNenA4RMryvGdXzhVFO+c4lbPY+yN9sQ6A6bF9RtU61f+tdGeP5wwGQT8?= =?us-ascii?Q?jC+WNm8pfEGUCGUPDHG0M1D0DHIOx5W7rC/9+ixDP2Aoml7MDU6Ji3lyL7CO?= =?us-ascii?Q?cfZkuccC8R+dO58EkWZPFOnZZXyk9qa3O0A6vTMfOwPe5zbiRfMt4SGvE903?= =?us-ascii?Q?UkAtn1Nf8zHwXJV5sWY5+qY0XVdMJVeauSnP+L09C0RcQX7Czp4U4Zn4cdBR?= =?us-ascii?Q?NV14DeWQxJssr1tuAWICH8YglJvipbJPaPt4lp11sUi8f+wp/IMwRqHMCSlG?= =?us-ascii?Q?xwn4J1HYbTWc1w9HLmvIEj8rjEt/YhOmo/38RdtvO0CNGBSSWGmQ31gbd5Ai?= =?us-ascii?Q?3zP8jvs0KdGuZFSgWFZShiUXR6xoCHVsPqiWwdFk7LLxR/ntThAgXl+AaLJU?= =?us-ascii?Q?Q4gbgKfsV12tk50iXDQfOA5tNJixkdHJZbMBG/LhkjyMr0W1GhP6VRHemXVf?= =?us-ascii?Q?Vf3wmJly435Zz6uEMu9xEBrDab68gGhwwM1piS0GXou2wbK+WJjOnsbtSNB6?= =?us-ascii?Q?a8+VqGza9/cl+MY51XVxzXIyJL1/G+dWn8EitbZka7eaIuV5SOy2EdHYNX6Z?= =?us-ascii?Q?A5q3qOFc9Sf7dCh75f81o8dhRnZrX87vdZe6RwfG/dLgt8piKTJZI52PT0pH?= =?us-ascii?Q?QTteig9Lbsh0mIiONs1OrIbjn8aEWRZM6DfLUON8lhh3dVweKEmO5f5GX+w1?= =?us-ascii?Q?yD1NKDY1nRTyw8yoB3aSK1qn+GXY1QNFzA5pyyfCyvQReB6/C3I11n1dZKn+?= =?us-ascii?Q?AD80qkMh8wsv+CtY4FTLnKV/wBm+NhZkEg6fx3hwvSvbeZiuIb0OxTlZP4E5?= =?us-ascii?Q?2LDG1EIQgzYVWP0VhLoGpLNm9ypdxDLv3R2HSiaFJ8hbresYaw4u53NxS+NN?= =?us-ascii?Q?5Hz9QVaoBiuPOa+wCy8d+slRDGomvetxAafB+83MFp2fVLk/kTu0P6kJ/fAA?= =?us-ascii?Q?ulS0a5E0EWFZZL5yxDDVkRDhsiCXHdxx5xEsR6aR7il1cLNF4mvdeyFHIzwm?= =?us-ascii?Q?VSigffsj3HZnP5hWM7nU16Neywg4s0Wru042b25TQVbkk/z5P7fZqcVnyo2t?= =?us-ascii?Q?rLnYopacocAv8eUZxTO5OCU8q9lgZOUGZQNEfBoqtqk7taUxgCgcuIxHKhGJ?= =?us-ascii?Q?UsAVtpdGos1vJXVTKefg8FjigGa6vPlTjHtUClAtxgk2IS1GR0rmACTM2WHB?= =?us-ascii?Q?FXv0M/Z2WNE7DIrjUY487vTbSDDr/0IggkcGDbLal93lhhe17uslSzGJh8pJ?= =?us-ascii?Q?jiV63QuTuAf6u6JGs9Pme3rmqxVYoQdYddv9/tJLS/jrSylzo/WB909/DHhk?= =?us-ascii?Q?ynuLFvWLHqWnSl18P12NHW/kwHLWh044WnSX/sJa/Q/hYKukQi0yFi6O9OYe?= =?us-ascii?Q?UzlYFZlbaej1uLbzpgj43CUEzfo34q6+PaYuSG/xd8x4nELoF1OCWJ3zmITS?= =?us-ascii?Q?EvFUZ4nqg1uS/8TjCroujPVOTUeYnAtIQlAN41SugFdKvaTNaK0xjABZ95Hm?= =?us-ascii?Q?h5ItBg=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(7416014)(376014)(36860700013)(82310400026)(1800799024); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:47:03.7115 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: b0e453f1-7372-45d7-ca85-08de5cc83e1f X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF000397AE.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR12MB4485 Received-SPF: permerror client-ip=2a01:111:f403:c111::9; envelope-from=skolothumtho@nvidia.com; helo=DM5PR21CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424650410158500 Content-Type: text/plain; charset="utf-8" Add an "accel" property to enable SMMUv3 accelerator mode. Accelerator mode relies on IORT RMR entries for MSI support and is therefore not supported when booting with a device tree. In this mode, the host SMMUv3 operates in nested translation (Stage-1 + Stage-2), with the guest owning the Stage-1 page tables. Expose only Stage-1 to the guest to ensure it uses the correct page table format Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3.c | 32 ++++++++++++++++++++++++++++++++ hw/arm/virt-acpi-build.c | 4 +--- hw/arm/virt.c | 22 +++++++++++++--------- 3 files changed, 46 insertions(+), 12 deletions(-) diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index 2be056d792..8ca1d4ad35 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -1916,6 +1916,29 @@ static void smmu_reset_exit(Object *obj, ResetType t= ype) smmuv3_accel_reset(s); } =20 +static bool smmu_validate_property(SMMUv3State *s, Error **errp) +{ +#ifndef CONFIG_ARM_SMMUV3_ACCEL + if (s->accel) { + error_setg(errp, "accel=3Don support not compiled in"); + return false; + } +#endif + + if (!s->accel) { + return true; + } + + /* If no stage specified, SMMUv3 defaults to stage 1 */ + if (s->stage && strcmp(s->stage, "1")) { + error_setg(errp, + "Only stage1 is supported for SMMUv3 with accel=3Don"); + return false; + } + + return true; +} + static void smmu_realize(DeviceState *d, Error **errp) { SMMUState *sys =3D ARM_SMMU(d); @@ -1924,6 +1947,10 @@ static void smmu_realize(DeviceState *d, Error **err= p) SysBusDevice *dev =3D SYS_BUS_DEVICE(d); Error *local_err =3D NULL; =20 + if (!smmu_validate_property(s, errp)) { + return; + } + if (s->accel) { smmuv3_accel_init(s); error_setg(&s->migration_blocker, "Migration not supported with SM= MUv3 " @@ -2029,6 +2056,7 @@ static const Property smmuv3_properties[] =3D { * Defaults to stage 1 */ DEFINE_PROP_STRING("stage", SMMUv3State, stage), + DEFINE_PROP_BOOL("accel", SMMUv3State, accel, false), /* GPA of MSI doorbell, for SMMUv3 accel use. */ DEFINE_PROP_UINT64("msi-gpa", SMMUv3State, msi_gpa, 0), }; @@ -2052,6 +2080,10 @@ static void smmuv3_class_init(ObjectClass *klass, co= nst void *data) device_class_set_props(dc, smmuv3_properties); dc->hotpluggable =3D false; dc->user_creatable =3D true; + + object_class_property_set_description(klass, "accel", + "Enable SMMUv3 accelerator support. Allows host SMMUv3 to be " + "configured in nested mode for vfio-pci dev assignment"); } =20 static int smmuv3_notify_flag_changed(IOMMUMemoryRegion *iommu, diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c index 4ae4cbc6cd..3126aca42c 100644 --- a/hw/arm/virt-acpi-build.c +++ b/hw/arm/virt-acpi-build.c @@ -400,9 +400,7 @@ static int iort_smmuv3_devices(Object *obj, void *opaqu= e) } =20 bus =3D PCI_BUS(object_property_get_link(obj, "primary-bus", &error_ab= ort)); - if (object_property_find(obj, "accel")) { - sdev.accel =3D object_property_get_bool(obj, "accel", &error_abort= ); - } + sdev.accel =3D object_property_get_bool(obj, "accel", &error_abort); pbus =3D PLATFORM_BUS_DEVICE(vms->platform_bus_dev); sbdev =3D SYS_BUS_DEVICE(obj); sdev.base =3D platform_bus_get_mmio_addr(pbus, sbdev, 0); diff --git a/hw/arm/virt.c b/hw/arm/virt.c index 899b02e1f7..390845c503 100644 --- a/hw/arm/virt.c +++ b/hw/arm/virt.c @@ -1491,8 +1491,8 @@ static void create_smmuv3_dt_bindings(const VirtMachi= neState *vms, hwaddr base, g_free(node); } =20 -static void create_smmuv3_dev_dtb(VirtMachineState *vms, - DeviceState *dev, PCIBus *bus) +static void create_smmuv3_dev_dtb(VirtMachineState *vms, DeviceState *dev, + PCIBus *bus, Error **errp) { PlatformBusDevice *pbus =3D PLATFORM_BUS_DEVICE(vms->platform_bus_dev); SysBusDevice *sbdev =3D SYS_BUS_DEVICE(dev); @@ -1500,10 +1500,15 @@ static void create_smmuv3_dev_dtb(VirtMachineState = *vms, hwaddr base =3D platform_bus_get_mmio_addr(pbus, sbdev, 0); MachineState *ms =3D MACHINE(vms); =20 - if (!(vms->bootinfo.firmware_loaded && virt_is_acpi_enabled(vms)) && - strcmp("pcie.0", bus->qbus.name)) { - warn_report("SMMUv3 device only supported with pcie.0 for DT"); - return; + if (!(vms->bootinfo.firmware_loaded && virt_is_acpi_enabled(vms))) { + if (object_property_get_bool(OBJECT(dev), "accel", &error_abort)) { + error_setg(errp, "SMMUv3 with accel=3Don not supported for DT"= ); + return; + } + if (strcmp("pcie.0", bus->qbus.name)) { + warn_report("SMMUv3 device only supported with pcie.0 for DT"); + return; + } } base +=3D vms->memmap[VIRT_PLATFORM_BUS].base; irq +=3D vms->irqmap[VIRT_PLATFORM_BUS]; @@ -3061,8 +3066,7 @@ static void virt_machine_device_pre_plug_cb(HotplugHa= ndler *hotplug_dev, object_property_set_link(OBJECT(dev), "secure-memory", OBJECT(vms->secure_sysmem), NULL); } - if (object_property_find(OBJECT(dev), "accel") && - object_property_get_bool(OBJECT(dev), "accel", &error_abort)) { + if (object_property_get_bool(OBJECT(dev), "accel", &error_abort)) { hwaddr db_start =3D 0; =20 if (!kvm_enabled() || !kvm_irqchip_in_kernel()) { @@ -3117,7 +3121,7 @@ static void virt_machine_device_plug_cb(HotplugHandle= r *hotplug_dev, return; } =20 - create_smmuv3_dev_dtb(vms, dev, bus); + create_smmuv3_dev_dtb(vms, dev, bus, errp); } } =20 --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424626; cv=pass; d=zohomail.com; s=zohoarc; b=ADImTLkbirmhzxSjJk5oyer9N13J4N0Dga7gDmqaRvT3O3fkdu6v2tivS6fwOu7wrZHUln6TV9dEJbP3YxCOh8SLi3I+uEiO0cFr2gDmKbCex0PMm0JE9OR8mtL0Y+2qvx8A97xvJwKz28aWsFi6ITUfuUb3DBdt5c1YE/4EwiY= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424626; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=6Ii8j999A3tds4SbfY5q1ANlB4mABjg7IBMHh4tl+MA=; b=OSLR8RXKpeOSnblFBBzCMgtacSFpoibCq1Iq/gCRJUFQcVboq7cpiHiR+KMFJcLX5OLC0DxWsC6Y9tY3qz8j3gyHcEQ8Pz4JO/qD1N8e4fTOND5jxiiirC2zatjST28lXBB0H5dRRCQn74pQt6Fk6A+dII1ySoflhY7ooVop7s8= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424626018918.4680329640935; Mon, 26 Jan 2026 02:50:26 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK7x-0002OP-TA; Mon, 26 Jan 2026 05:47:25 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7u-0001u4-2E; Mon, 26 Jan 2026 05:47:22 -0500 Received: from mail-northcentralusazlp170130007.outbound.protection.outlook.com ([2a01:111:f403:c105::7] helo=CH4PR04CU002.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7s-0005kh-DB; Mon, 26 Jan 2026 05:47:21 -0500 Received: from BL0PR01CA0004.prod.exchangelabs.com (2603:10b6:208:71::17) by SJ2PR12MB9140.namprd12.prod.outlook.com (2603:10b6:a03:55f::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.11; Mon, 26 Jan 2026 10:47:12 +0000 Received: from BL6PEPF00022573.namprd02.prod.outlook.com (2603:10b6:208:71:cafe::33) by BL0PR01CA0004.outlook.office365.com (2603:10b6:208:71::17) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:46:55 +0000 Received: from mail.nvidia.com (216.228.117.161) by BL6PEPF00022573.mail.protection.outlook.com (10.167.249.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:47:11 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:55 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:50 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=gIB7Ob/QuPlnrRKo0L6z9MY0zmhlfG5FYzMClGA5XrZe/ZWo7BwzL9UUOghjSw/qfi25wneGKZmWGkyIgwRybvqcEkmLZiPLAMbUwo0F99rLdE+OsUaW6uBRwqOH1LvTnf42BXOYbpE2hD9JwxyluhzvehV7F8S1YZdh18KP/EVXT1OgenP5M386JXWO2Uecyvk0vsawTsgWEJeF+waF2bfIX1HgzEOM4xN5AByVJ0Yizn5R6nqoObGekTYy9Ke6qJq08NoBorpXHpKCjhTNUyDcxOjZ/r8CYMNe0I8MGRZSApMDZcz4KDr1GNMXWkc5GYlusfKMLzkgoykQf3ep/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6Ii8j999A3tds4SbfY5q1ANlB4mABjg7IBMHh4tl+MA=; b=rDx6wjlPSbhCBWP7LVbqNrwZ3jHY5zsDRaQ5PYwIhEIiLHPoL/R6YnPIhykZLJ8qQ7wsabI4A4N9hitQ77fA3go6YApQ5Sll1BZTQxVOKz55OpuS5GzHR3S2AMlQO0d14ikWnbyKT6stXaMWL/YIOT2ri9FTKRNr+BLTz7NpgrIIpBWqVoT1IHWupSaAuIcWamW6Z5MhnzpjezG+DsHB5dJzlKf2eXQQa8vmfU78qBdk3S4+TscAYu+Zo60rewlk1UA2xN8X9tyCpfcONsWyhHuzaE31Z+4KEluWjh1uWbVdhEt0hdi/TcEb/hz8L33ytgt1tqwWtPj2LrhwWFBp6g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6Ii8j999A3tds4SbfY5q1ANlB4mABjg7IBMHh4tl+MA=; b=T0pLFYuZGsQc3MINR9qw+jouNtuAq1UDWk/HntHDUI/I2ydD+eTGnwr18R4ZQLtiS8OiphRd6hOo+oTwEjEiblj7xdgtGgTqjgWtyrmNm9EZNTlrGsYacZ6FjuapC+oapiPgAQi8/yI3YhT1csTT0ZvSIrTmfKg/xMPjf+kdX8V2fKg6yyYK2eK7hQEnoV4xSBUmjlc6V6Hm41TPp/hQ/E3xogtTbb6gjy3cXVkgMhIo2Wns3vQC2EYXmvC67xIhbaUzPfPQHxtTdYHW/febiC5t2g1CaQAdx3S1ZvAj5o/oc8YzE+R0jP9G2gOBOJ4+KlofmzJIGBgFTO73zMh9wg== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 29/37] hw/arm/smmuv3-accel: Add a property to specify RIL support Date: Mon, 26 Jan 2026 10:43:26 +0000 Message-ID: <20260126104342.253965-30-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL6PEPF00022573:EE_|SJ2PR12MB9140:EE_ X-MS-Office365-Filtering-Correlation-Id: 84925fb7-1aa9-4435-ef8e-08de5cc84301 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|82310400026|7416014|376014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?utf-8?B?bDBvcFNST3lGVGxRQ2FsUWtIbWhhclY5eVhJRE40MHR3SUhRRW5jNVViRURu?= =?utf-8?B?aXFSaDllYnFVMEFycDVLVkJEZkJ1aTFQTUpLNWVPbFBHTHBRZUlTakl1aTQ4?= =?utf-8?B?STh5OUwzWE05UlJRcXQzYm5IL21CWnhwaHJvZjNDUUNYQmF1d2tMK0JpUk5K?= =?utf-8?B?QlpOUUNwQk54MDdXdDlTaTNzNXZ4M1pEYzk0TUp6b0RmSzBwekV1dDhFN1RG?= =?utf-8?B?VHZxVUVRdExtMFV6YmdaWWFZVzU4anEvd2xiZnE5MlhSNFg4T2VSWlViVGpW?= =?utf-8?B?dmVSb1M3VlF2R25IaWpCU05hUlV3TjdiUDVuQ1RwTmY2MERPdURvRVVTam5z?= =?utf-8?B?YzNiaDlkeGYzZ0psVkhNaTNFamFzSHZJNUhsU1ZqRzY3eXBUcWtYcDlxbW8v?= =?utf-8?B?aUpyb3U3eUxKVWhDeUNtVDNuL0dnWmdRUXR6ZXJnaFRLSnozV1NjSGNyekNt?= =?utf-8?B?TjVmbWt3QUNOUlJXR0E4c1Ywd05sUGtsUU1uK2IrVnR0THRSTHhjVmVIcEpV?= =?utf-8?B?NHpSeUVrK1FqbjMzVklvSTNRV1hpSGlpNEwwZ3dPQk9aVWZNRWRjby9OTEdN?= =?utf-8?B?d1F6Skh0V3dJbDNSQnNxZXFYLzR2RGxMM1p5cTY5cXlZUUNzL3V1Qkc5bWtQ?= =?utf-8?B?bmo1UE4xSjlCblc1VlVjWGw0eWcvTzNwcE0wVWRjN2p5TTN2b2NKUHgvQ1RW?= =?utf-8?B?UEdPeTRYMFRLdWVpKzg5bU9QeFBpd0pZREx1bDk2QlRJdHYrZEZwVllNOGZo?= =?utf-8?B?MDNsc0FOZGRub2NCVzZ5L0FnYkw3TXlGQzhGc1Y1a00vM2R2SWVhZ1RNR3ZG?= =?utf-8?B?c25lc1ZBT2xFcXhmYVpJdGlsMWxvS0pjc2JoRXQxZkwwNUZZK1JvZE9sVGQ3?= =?utf-8?B?VWtIYWdUTkhFWjdCN3ZST09hWWtuZTRzZmZOUk1FajEvbmt1MEtUM1U4WTVr?= =?utf-8?B?ZDg3NzJub2J5dmtmbno1cXRPZ1pSR1V3SWlNK3V1YUgwSUdxMThXcVNVOFlo?= =?utf-8?B?RTJzd21MaGYvMG9CTG43dDc2Vk9IVlJRc0dOUHZCN3h0b0JaWjRrMXpGV1VK?= =?utf-8?B?TnFNdUJsOWVvbDcra2YrMXpOVXg5WGZ6UDA2NTFwV0ZRRkgzV1VvQzFGY3A0?= =?utf-8?B?dmk0Q1k2ZnRRVmpzakZBLzBDWVNTYlFHa2lsamZpMDdsclVJemdDUFkyZGli?= =?utf-8?B?UXl0TzFVaE1zR2ROMTdOdVFRR0t1M1dPeUxyNDU2bm5TU1pGeStTay9NRm5P?= =?utf-8?B?UkJvZjc4czkvTlkwczZ6NVNlU01mUXJuVnR4OHlxck96NkNnRXcyOHM0MTE5?= =?utf-8?B?L2x2ZDAyK0J5cTE4Zm1GMlE4UVJlZ1ZvcjRBa2hjWkF1NzB0bXRkQldRZUFR?= =?utf-8?B?cFJzK0VzRUdObUpwSDVTb2Q3R0poenBnZGtoejZ2L25VN0ozVGN2L1VwK01D?= =?utf-8?B?S1dlYkhhNUlJMGZIVW5tWll5Zk1QTjN4TlpWSS9JR29mSm5kNHhqeXU1L0Vv?= =?utf-8?B?ZkpUY2pXZGEvbTJxc0ovRHpVVExTQktISUd1cXVtWnl1ZnNxM3QzVEgwZGRm?= =?utf-8?B?OW5OMTZwSlFacThlSXNLd05xZjkwaTlqUTBmQWdxV3l2bmpQQWJUMFkyanBF?= =?utf-8?B?SDRvVUhQajBrMkxWUTIxS2ltZzZiSzVzaU94bGdKQVA5VUtRQzJOL3I2bWpQ?= =?utf-8?B?Q1gzYjlOV2NpOHA2aVFvMllYSlFST3pnajNpL1duR2xjdnhsZGJOM1dHOGEx?= =?utf-8?B?N1Y0MlRrV0VZSm12eUdhaDlENlBxdUozcjFQc3NGSTlXSC9HYWpyTTdrMi9H?= =?utf-8?B?aGRzNzNheDMrOXhxbE1pa1g1Uk03blE0QlJKT1grWGpQcHFuWkNXOXg1UkZ0?= =?utf-8?B?ZVlKa1JvZU91dkdLRk1vaWJYYmJpenRySlBPQmhUY0xOZ3RXRkpsbWJ4Szd3?= =?utf-8?B?MzNpcXRzWWxQOEZ3ZjRWSnJET0wyMTFPUHQyNERibTNSdHg0dTh4WnEyL1A2?= =?utf-8?B?Tlhpcy9BVmtwRU1JRVVocExMbGZjRitxR2dOakE1WGRNdC95UGE0TStVa1E1?= =?utf-8?B?Y2NFdmp0V1VlcFJESEhnaURYei9jKzVWWjEyZVpSaU4rU001emladVZnUVBG?= =?utf-8?B?czFhUnB2WkNxcEJDbi9tQ2N4ZWtHQnNhSTlkcmJyTjRTelNQbkU2M1R5U2Nr?= =?utf-8?B?dnJDcGJWS0FxYUZhSVNBUXdFUTNQTEl6YXF0Zm05a1lacjhrRzdFS2N6RWov?= =?utf-8?B?bDB2aVB3eFRPZ0pUU3RBQmdpMFpBPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(82310400026)(7416014)(376014)(36860700013)(1800799024); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:47:11.8812 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 84925fb7-1aa9-4435-ef8e-08de5cc84301 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BL6PEPF00022573.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ2PR12MB9140 Received-SPF: permerror client-ip=2a01:111:f403:c105::7; envelope-from=skolothumtho@nvidia.com; helo=CH4PR04CU002.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424626419158500 Currently QEMU SMMUv3 has RIL support by default. But if accelerated mode is enabled, RIL has=C2=A0to be compatible with host SMMUv3 support. Add a property so that the user can specify this. Reviewed-by: Jonathan Cameron Tested-by: Zhangfei Gao Reviewed-by: Eric Auger Reviewed-by: Nicolin Chen Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 14 ++++++++++++-- hw/arm/smmuv3-accel.h | 4 ++++ hw/arm/smmuv3.c | 9 +++++++++ include/hw/arm/smmuv3.h | 1 + 4 files changed, 26 insertions(+), 2 deletions(-) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index 33011962e3..df82f1e32a 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -68,8 +68,8 @@ smmuv3_accel_check_hw_compatible(SMMUv3State *s, return false; } =20 - /* QEMU SMMUv3 supports Range Invalidation by default */ - if (FIELD_EX32(info->idr[3], IDR3, RIL) !=3D + /* User can disable QEMU SMMUv3 Range Invalidation support */ + if (FIELD_EX32(info->idr[3], IDR3, RIL) < FIELD_EX32(s->idr[3], IDR3, RIL)) { error_setg(errp, "Host SMMUv3 doesn't support Range Invalidation"); return false; @@ -646,6 +646,16 @@ static const PCIIOMMUOps smmuv3_accel_ops =3D { .get_msi_direct_gpa =3D smmuv3_accel_get_msi_gpa, }; =20 +void smmuv3_accel_idr_override(SMMUv3State *s) +{ + if (!s->accel) { + return; + } + + /* By default QEMU SMMUv3 has RIL. Update IDR3 if user has disabled it= */ + s->idr[3] =3D FIELD_DP32(s->idr[3], IDR3, RIL, s->ril); +} + /* Based on SMUUv3 GPBA.ABORT configuration, attach a corresponding HWPT */ bool smmuv3_accel_attach_gbpa_hwpt(SMMUv3State *s, Error **errp) { diff --git a/hw/arm/smmuv3-accel.h b/hw/arm/smmuv3-accel.h index 41b37e3122..a8a64802ec 100644 --- a/hw/arm/smmuv3-accel.h +++ b/hw/arm/smmuv3-accel.h @@ -49,6 +49,7 @@ bool smmuv3_accel_install_ste_range(SMMUv3State *s, SMMUS= IDRange *range, bool smmuv3_accel_attach_gbpa_hwpt(SMMUv3State *s, Error **errp); bool smmuv3_accel_issue_inv_cmd(SMMUv3State *s, void *cmd, SMMUDevice *sde= v, Error **errp); +void smmuv3_accel_idr_override(SMMUv3State *s); void smmuv3_accel_reset(SMMUv3State *s); #else static inline void smmuv3_accel_init(SMMUv3State *s) @@ -76,6 +77,9 @@ smmuv3_accel_issue_inv_cmd(SMMUv3State *s, void *cmd, SMM= UDevice *sdev, { return true; } +static inline void smmuv3_accel_idr_override(SMMUv3State *s) +{ +} static inline void smmuv3_accel_reset(SMMUv3State *s) { } diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index 8ca1d4ad35..cb619f19df 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -305,6 +305,7 @@ static void smmuv3_init_id_regs(SMMUv3State *s) s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, GRAN16K, 1); s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, GRAN64K, 1); s->aidr =3D 0x1; + smmuv3_accel_idr_override(s); } =20 static void smmuv3_reset(SMMUv3State *s) @@ -1926,6 +1927,10 @@ static bool smmu_validate_property(SMMUv3State *s, E= rror **errp) #endif =20 if (!s->accel) { + if (!s->ril) { + error_setg(errp, "ril can only be disabled if accel=3Don"); + return false; + } return true; } =20 @@ -2059,6 +2064,8 @@ static const Property smmuv3_properties[] =3D { DEFINE_PROP_BOOL("accel", SMMUv3State, accel, false), /* GPA of MSI doorbell, for SMMUv3 accel use. */ DEFINE_PROP_UINT64("msi-gpa", SMMUv3State, msi_gpa, 0), + /* RIL can be turned off for accel cases */ + DEFINE_PROP_BOOL("ril", SMMUv3State, ril, true), }; =20 static void smmuv3_instance_init(Object *obj) @@ -2084,6 +2091,8 @@ static void smmuv3_class_init(ObjectClass *klass, con= st void *data) object_class_property_set_description(klass, "accel", "Enable SMMUv3 accelerator support. Allows host SMMUv3 to be " "configured in nested mode for vfio-pci dev assignment"); + object_class_property_set_description(klass, "ril", + "Disable range invalidation support (for accel=3Don)"); } =20 static int smmuv3_notify_flag_changed(IOMMUMemoryRegion *iommu, diff --git a/include/hw/arm/smmuv3.h b/include/hw/arm/smmuv3.h index 9c39acd5ca..533a2182e8 100644 --- a/include/hw/arm/smmuv3.h +++ b/include/hw/arm/smmuv3.h @@ -69,6 +69,7 @@ struct SMMUv3State { struct SMMUv3AccelState *s_accel; uint64_t msi_gpa; Error *migration_blocker; + bool ril; }; =20 typedef enum { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424550; cv=pass; d=zohomail.com; s=zohoarc; b=Ya4T/hpElIkBhH2n5zUC6FJxzMI/jti8xWyCR8PVFtjE6lRWRBEgduWX9m4l/WHnSKruyioEuOuNHmy0CBqalZYhaO5N8MNAPjmDkCxxtpjxFIhNOhJJbCeWaVx0tYcXkZNB3woCuy8F/LwH49joJkyvBAzU2MT9lD1cyy0O250= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424550; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=xzKmiMzWkQ1gI/bYLaW1zL76IR5rD6/GhEp75br9aRM=; b=R9aPpLA6MRVfHnFsNKCTQsK47C7rSMpfhu8SqQ8hcHMK8RhLzstg/E3FkL+jZN2F6KLwzLczfTBkizZohIoYc4cPa7tnyMq9pfr3F0w/iReFphZJ1d3lLYUEdU6P6x52ApN7sbVd2bcAsZSaTcU8zbz2ZV0uF3E/6gwCrpP4roE= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424550962207.5223118629391; Mon, 26 Jan 2026 02:49:10 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkK8I-0003kD-Bk; Mon, 26 Jan 2026 05:47:48 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK80-0002jZ-OO; Mon, 26 Jan 2026 05:47:28 -0500 Received: from mail-westus2azlp170100005.outbound.protection.outlook.com ([2a01:111:f403:c005::5] helo=CO1PR03CU002.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkK7y-0005lA-PZ; Mon, 26 Jan 2026 05:47:28 -0500 Received: from SN7PR04CA0016.namprd04.prod.outlook.com (2603:10b6:806:f2::21) by DS0PR12MB7680.namprd12.prod.outlook.com (2603:10b6:8:11c::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.11; Mon, 26 Jan 2026 10:47:20 +0000 Received: from SN1PEPF000397AE.namprd05.prod.outlook.com (2603:10b6:806:f2:cafe::da) by SN7PR04CA0016.outlook.office365.com (2603:10b6:806:f2::21) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.15 via Frontend Transport; Mon, 26 Jan 2026 10:47:23 +0000 Received: from mail.nvidia.com (216.228.117.160) by SN1PEPF000397AE.mail.protection.outlook.com (10.167.248.52) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:47:19 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:47:00 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:46:55 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=NZcJA6lmqruN5avqX5aa9i8C6YWhJg12Yfu9LgFkOv3tHi5K3uotC1yLY0qf2Ct1M2JdPX2/IBpHoj/mJcVOiCXuFzkbLMyqQsubJnLyelMO4TXTfDzqhK3OLY5NJ8geNVSlR6mxBucTB4KyTp7M2BqYWLXOWRD/xwI6Pu9vzhRLezpb688BgIOYkarOr/EEjEnDon5gTU4THNcGCOzq9ESfLnyMmR1QCeROdcY1Vyjd/DJLb5vcwj1kz4Z+pZH4mdmZBeykDaSTTawUrRVpQdq7WjBJ8tBJlyVc1mfid6GMwF/d8FtBfhYZZJ02GIimfJd13hKP2C3vkXlHgO+TAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xzKmiMzWkQ1gI/bYLaW1zL76IR5rD6/GhEp75br9aRM=; b=dXLOrAn1xo1MFJ7cA3f5AWAjGwQ8Y+gephOlIzkshFpaac8pYOhX7XyGGULJKZ9CNP28TkGWgq/swu7xSru9pGknNt7P1YfvuQImVMvmrGJTksjSkaLf+kxdO+QptGEFtJensiBJGnpYMWB4ntnYN3ygJ5d4STalIvC5KCXlxXuBm/Vly3XYP6izzLUz1Derg3D5gHug+jox7S17fomGi/lW3+GcDjhXarD53U7ArHqQFDG6sKcAHf/bsny+TKAnsi026sgLdi0dntIuJDFZJ8KemB59LO+lqrVw7J6mymkh2YbSZvQnnXjysinmYzBAp+Bj3bGTPshGGsTkgkV3NQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xzKmiMzWkQ1gI/bYLaW1zL76IR5rD6/GhEp75br9aRM=; b=Ncf5cnq/sAZ+9NM9iND6mpPkXV3HyhYlGHs1oAUKEcBNlkRDD+HeSuxDAsYO7Fmr4JQTO+yUEtgUalaScrPuiGDnqqM/3wozV7zEzwYXW0qMVMIBEetpVskBsZ7BmEYNWpq7W3/Rw34i11Hs/NVnJVzVyJqwod16KLTwJTfULFY748rY6QoufR9SorFMhLTNATmMFlryDg9ZOPt0TqFlxgGxYVOzK06MPNhHbYoRQFTLu2p3St8pFmiguInvTLMbJug46bKAnM2PWv4Swgou2wVw3YKs5V0CqyzMbTdmRlnMdWjVc+QwQRvH+txrROJWwuQAvlxF9HhtGCnQues6sQ== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 30/37] hw/arm/smmuv3-accel: Add support for ATS Date: Mon, 26 Jan 2026 10:43:27 +0000 Message-ID: <20260126104342.253965-31-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF000397AE:EE_|DS0PR12MB7680:EE_ X-MS-Office365-Filtering-Correlation-Id: 8180fa7c-eac6-49fe-d964-08de5cc847bb X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|36860700013|1800799024|7416014|82310400026; X-Microsoft-Antispam-Message-Info: =?utf-8?B?U0Z6aWhDWWRlckpHZXJiRHM5UUo0OEVZaExCVmZEOFZ1T1dydkVpbHZQOGdP?= =?utf-8?B?NE1Fd0tPTVBXN3BVc0I1UitEbldSUVREQndiYWc1MDJSUzltTWxlYWVPVFpL?= =?utf-8?B?M2VJK2tEYUJSNlM2ZmxqakxuTDJGbDBBcUhYWWJMamwvQ1BxN0d6K3lTSjlH?= =?utf-8?B?MkovN2hUZlhhYjBhUGhEOUhOMDJMdHNsMjJZRXRkaEY3MmVQcUFpR1hzUmtl?= =?utf-8?B?YmFZcyttdWd4MGZYU0l3QWdoNFNaT0xQMENwb2tzQk1JZFhBSGtLdmNRWDNl?= =?utf-8?B?RVQxeTdLNVJEZ0JwTElGSEwzR3hERlp4ajdabGE0dzJUb3JhVnp2UmJxT1Ax?= =?utf-8?B?c1J1VloraXFNb1NGQnZ0YUk1OXFQT3RzYmk1b1YxVXdsLzBTRG5qMVZLU05N?= =?utf-8?B?YlYzT1BZZEFLUEE0SCtjUFNtN2Y1U2dmY0d4cjZ4K0FKSXJLYTRncldFMEpn?= =?utf-8?B?ZXNlMGdVSmNEN0JiY003OUFHMllvYmVZb2xsb016TFdGNDVXcWtTbkV0eHhQ?= =?utf-8?B?N0VyWWp1bTM0NzdEWmxRc21UbmI4bUM0RzZPTEh4Q0JWOTlSKzdZVm85MGxS?= =?utf-8?B?cUQ0OFBZbjJVQmV2YUQxZ2g1Y3MrdzJGeUo1SEMrNkRseU9kVERLaUd0d2pC?= =?utf-8?B?MlJGb1NKaEF0WXN1SG0yR1o5b3hEckw5dmVvTDIxSlBCTVVUTEl4UjNSOHVX?= =?utf-8?B?dDNUREdpQnhEbThUejRJVnc0WGZKbnlGd0M0Q3VVb3NvWXVObDNtVkxBaWhm?= =?utf-8?B?clQ4eEVlQ2hGcFJSWWVBRFY4WENLTCt0TW16bjZkaXNFM2hhNDBpVGVieFBH?= =?utf-8?B?ajV4eUhwc1N6R3pRbUorWmhvNERBaWp2SDN1R1lPQkN3c2wxYkxKcmI0aTBv?= =?utf-8?B?c2xGYU5CdjJJNEZrUXlBeEk1Tnpzd1NZQW5BVHVQVUJxdGttMmUvcm82aEFv?= =?utf-8?B?ZkpFOEpTeGJmVVZxbXRGVGIrSjFlSkV6OThQS2dCOTg4TVRvNHFzM2xhd3JD?= =?utf-8?B?ZU9iM1VuVW41N2lKK2YvMFdBYXplczhVR3Z1a0dEN2ZzS2t1ZjhMZDBBbHcw?= =?utf-8?B?WDdxOWtwSkJsK013ZjA0MVRQRHQyZ1N4ZHlLbWFEKzgyaUg5cWxnbUxjdnRu?= =?utf-8?B?YVcyQVFBWCttYTNqK09ROUVDRmdIZWpIbG9SWTZhMmpYWEp5dG5kYk1KbEpR?= =?utf-8?B?TXMrcnVPUGtjZGVXb0x2Z1lsVGpVeUFwSGVGbUI0SEovLzVHcEtlWGN6a0Ns?= =?utf-8?B?QktwaWVTYkJkREgwS3R4TEc3dWkzNXhwQzMvR3VMYkhwdjRVMmZndi8wclgv?= =?utf-8?B?c2g3MzUzRm1rbFZGZHhYbFdLdkFNRlJmeUZ3MjNmbzFpbHJGa05hY0xONnBh?= =?utf-8?B?UXB4TWRiV1l6c1RFWG1ibFRVeVUvUVBQOVVsTXN6blZLYzNWQ1FtTHpNOGps?= =?utf-8?B?ak95NFB3MmxyR09YYzh5K041Vk1lMVg5dkQvT2NkNnlkRmVnN05IZGxwemdF?= =?utf-8?B?Q1JLdWFKU2FLZEQzK0VzQWVxOCtFZGRUeE5HVjZFMjlwd1VJcUo4M1dyQ0xI?= =?utf-8?B?UjJ3dUJUOHhta3BtVk9xS20vL2V5b2Y5Y0RzTkhvN291WG50bmc2aFFXS285?= =?utf-8?B?RDFuTElsTWV0RmNWWm05d1ZWSWNWRnVMa0NQbm9NeEcwSHhhMXZiQUlLd1BJ?= =?utf-8?B?Mm9MZE9sa2dnMThrZHNDZVBPOGx4dTViNmZxN0laR0ZLWVJwK29kdjNZUTk3?= =?utf-8?B?Ym41OUs0QXVCZTFKUGRrMEFYdGV1cTZjTjU3TFBLMzdXTGM2NXptbURaTk00?= =?utf-8?B?M09uOEowT2FDc09JM1FOUllNT2RDQkNnUFN4emVGMjV3V3lSaFJ3Nk1EQlE0?= =?utf-8?B?bjdBVE85a2VCNXdpYkNyNkQzQUJvazZpekEveGFOZ3dUR1NHZTZBVllSWjZs?= =?utf-8?B?ZmFPcG9xTGdUVnEvYUhUekp5MTNBdUVLNUovbnBCNFpmVis3Z2N4WElESGFU?= =?utf-8?B?QXFoRzhmSDVlRC95UTQxcEVhSVdCSjFrUVNoN1Z5Zlc0MjVsUkJhZlgvbTFR?= =?utf-8?B?MzJ2WmVsdmduNjFFd1lUR1NTRGFQaXNISWM0RG94aStEOHhFMXlDdGs2MWwx?= =?utf-8?B?UkdKSHlKYlJyS2VSTERzSVBvY291WlAyamQ3RDBqRmkyRUFwemNLQ1NpQmRO?= =?utf-8?B?cFdBTytOaUFWM3JEcENCTUt6czJkWHVoZTBnbjR2TDd2UGFOOXVhWHI3ZWFO?= =?utf-8?B?Vk9FWHNUTWpSYzZYaWo3SmFKWDF3PT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(376014)(36860700013)(1800799024)(7416014)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:47:19.8337 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8180fa7c-eac6-49fe-d964-08de5cc847bb X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF000397AE.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB7680 Received-SPF: permerror client-ip=2a01:111:f403:c005::5; envelope-from=skolothumtho@nvidia.com; helo=CO1PR03CU002.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424552735154100 QEMU SMMUv3 does not enable ATS (Address Translation Services) by default. When accelerated mode is enabled and the host SMMUv3 supports ATS, it can be useful to report ATS capability to the guest so it can take advantage of it if the device also supports ATS. Note: ATS support cannot be reliably detected from the host SMMUv3 IDR registers alone, as firmware ACPI IORT tables may override them. The user must therefore ensure the support before enabling it. The ATS support enabled here is only relevant for vfio-pci endpoints, as SMMUv3 accelerated mode does not support emulated endpoint devices. QEMU=E2=80=99s SMMUv3 implementation still lacks support for handling ATS translation requests, which would be required for emulated endpoints. Reviewed-by: Jonathan Cameron Tested-by: Zhangfei Gao Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 3 +++ hw/arm/smmuv3.c | 24 +++++++++++++++++++++++- hw/arm/virt-acpi-build.c | 10 ++++++++-- include/hw/arm/smmuv3.h | 1 + 4 files changed, 35 insertions(+), 3 deletions(-) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index df82f1e32a..a97abc1f79 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -654,6 +654,9 @@ void smmuv3_accel_idr_override(SMMUv3State *s) =20 /* By default QEMU SMMUv3 has RIL. Update IDR3 if user has disabled it= */ s->idr[3] =3D FIELD_DP32(s->idr[3], IDR3, RIL, s->ril); + + /* QEMU SMMUv3 has no ATS. Advertise ATS if opt-in by property */ + s->idr[0] =3D FIELD_DP32(s->idr[0], IDR0, ATS, s->ats); } =20 /* Based on SMUUv3 GPBA.ABORT configuration, attach a corresponding HWPT */ diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index cb619f19df..ca086ba00a 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -1498,13 +1498,27 @@ static int smmuv3_cmdq_consume(SMMUv3State *s, Erro= r **errp) */ smmuv3_range_inval(bs, &cmd, SMMU_STAGE_2); break; + case SMMU_CMD_ATC_INV: + { + SMMUDevice *sdev =3D smmu_find_sdev(bs, CMD_SID(&cmd)); + + if (!sdev || !s->ats) { + trace_smmuv3_unhandled_cmd(type); + break; + } + + if (!smmuv3_accel_issue_inv_cmd(s, &cmd, sdev, errp)) { + cmd_error =3D SMMU_CERROR_ILL; + break; + } + break; + } case SMMU_CMD_TLBI_EL3_ALL: case SMMU_CMD_TLBI_EL3_VA: case SMMU_CMD_TLBI_EL2_ALL: case SMMU_CMD_TLBI_EL2_ASID: case SMMU_CMD_TLBI_EL2_VA: case SMMU_CMD_TLBI_EL2_VAA: - case SMMU_CMD_ATC_INV: case SMMU_CMD_PRI_RESP: case SMMU_CMD_RESUME: case SMMU_CMD_STALL_TERM: @@ -1931,6 +1945,10 @@ static bool smmu_validate_property(SMMUv3State *s, E= rror **errp) error_setg(errp, "ril can only be disabled if accel=3Don"); return false; } + if (s->ats) { + error_setg(errp, "ats can only be enabled if accel=3Don"); + return false; + } return true; } =20 @@ -2066,6 +2084,7 @@ static const Property smmuv3_properties[] =3D { DEFINE_PROP_UINT64("msi-gpa", SMMUv3State, msi_gpa, 0), /* RIL can be turned off for accel cases */ DEFINE_PROP_BOOL("ril", SMMUv3State, ril, true), + DEFINE_PROP_BOOL("ats", SMMUv3State, ats, false), }; =20 static void smmuv3_instance_init(Object *obj) @@ -2093,6 +2112,9 @@ static void smmuv3_class_init(ObjectClass *klass, con= st void *data) "configured in nested mode for vfio-pci dev assignment"); object_class_property_set_description(klass, "ril", "Disable range invalidation support (for accel=3Don)"); + object_class_property_set_description(klass, "ats", + "Enable/disable ATS support (for accel=3Don). Please ensure host " + "platform has ATS support before enabling this"); } =20 static int smmuv3_notify_flag_changed(IOMMUMemoryRegion *iommu, diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c index 3126aca42c..c145678185 100644 --- a/hw/arm/virt-acpi-build.c +++ b/hw/arm/virt-acpi-build.c @@ -346,6 +346,7 @@ typedef struct AcpiIortSMMUv3Dev { /* Offset of the SMMUv3 IORT Node relative to the start of the IORT */ size_t offset; bool accel; + bool ats; } AcpiIortSMMUv3Dev; =20 /* @@ -401,6 +402,7 @@ static int iort_smmuv3_devices(Object *obj, void *opaqu= e) =20 bus =3D PCI_BUS(object_property_get_link(obj, "primary-bus", &error_ab= ort)); sdev.accel =3D object_property_get_bool(obj, "accel", &error_abort); + sdev.ats =3D object_property_get_bool(obj, "ats", &error_abort); pbus =3D PLATFORM_BUS_DEVICE(vms->platform_bus_dev); sbdev =3D SYS_BUS_DEVICE(obj); sdev.base =3D platform_bus_get_mmio_addr(pbus, sbdev, 0); @@ -544,6 +546,7 @@ build_iort(GArray *table_data, BIOSLinker *linker, Virt= MachineState *vms) int i, nb_nodes, rc_mapping_count; AcpiIortSMMUv3Dev *sdev; size_t node_size; + bool ats_needed =3D false; int num_smmus =3D 0; uint32_t id =3D 0; int rc_smmu_idmaps_len =3D 0; @@ -579,6 +582,9 @@ build_iort(GArray *table_data, BIOSLinker *linker, Virt= MachineState *vms) /* Calculate RMR nodes required. One per SMMUv3 with accelerated m= ode */ for (i =3D 0; i < num_smmus; i++) { sdev =3D &g_array_index(smmuv3_devs, AcpiIortSMMUv3Dev, i); + if (sdev->ats) { + ats_needed =3D true; + } if (sdev->accel) { nb_nodes++; } @@ -678,8 +684,8 @@ build_iort(GArray *table_data, BIOSLinker *linker, Virt= MachineState *vms) build_append_int_noprefix(table_data, 0, 2); /* Reserved */ /* Table 15 Memory Access Flags */ build_append_int_noprefix(table_data, 0x3 /* CCA =3D CPM =3D DACS =3D = 1 */, 1); - - build_append_int_noprefix(table_data, 0, 4); /* ATS Attribute */ + /* ATS Attribute */ + build_append_int_noprefix(table_data, ats_needed, 4); /* MCFG pci_segment */ build_append_int_noprefix(table_data, 0, 4); /* PCI Segment number */ =20 diff --git a/include/hw/arm/smmuv3.h b/include/hw/arm/smmuv3.h index 533a2182e8..242d6429ed 100644 --- a/include/hw/arm/smmuv3.h +++ b/include/hw/arm/smmuv3.h @@ -70,6 +70,7 @@ struct SMMUv3State { uint64_t msi_gpa; Error *migration_blocker; bool ril; + bool ats; }; =20 typedef enum { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424661; cv=pass; d=zohomail.com; s=zohoarc; b=QPmB1A5CRh4B7G+roUYRtfw3IRDuZdu7hg71T6Td3tzCh2PO4a3LrLrNUYqn1tWmTbH4VpuYHF0xF42ZjsEHQ2CEm5VAQSRhfF8Qm2Reheciklzv9eoqawQEW0Qkd3ik2KH3HyCjkl5udlS8PTOzTApHpb8Y28qc1hcK28rQEjY= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424661; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=m52r4TxU6csU1hkdxng+K9140zOy6CU4VRXrtdoxDgs=; b=NCYRn5F+FzfG0gyX/eomO3GswawZX6eyA7kGgt/qT/Sl6T4fur4dxSgPm+mo/3BBjgIWelhV8VL2DxOV9GvYw050/Vc2G+oiEDQzd5ikuwOeXQhw48PkoULIDHTfSJhJbvM65EPR47149mrj5zlHcVjbEGo1zZ6tbTxq0QAMlvw= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424661974529.6536613718205; Mon, 26 Jan 2026 02:51:01 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkKBE-0002j7-8K; Mon, 26 Jan 2026 05:50:48 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKAR-0001X6-41; Mon, 26 Jan 2026 05:50:00 -0500 Received: from mail-northcentralusazlp170120005.outbound.protection.outlook.com ([2a01:111:f403:c105::5] helo=CH5PR02CU005.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKAK-0005uc-O9; Mon, 26 Jan 2026 05:49:56 -0500 Received: from CH2PR16CA0011.namprd16.prod.outlook.com (2603:10b6:610:50::21) by MN2PR12MB4080.namprd12.prod.outlook.com (2603:10b6:208:1d9::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.12; Mon, 26 Jan 2026 10:49:44 +0000 Received: from CH2PEPF0000013B.namprd02.prod.outlook.com (2603:10b6:610:50:cafe::39) by CH2PR16CA0011.outlook.office365.com (2603:10b6:610:50::21) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:49:45 +0000 Received: from mail.nvidia.com (216.228.117.161) by CH2PEPF0000013B.mail.protection.outlook.com (10.167.244.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:49:44 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:49:34 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:47:00 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=QI04JdoCXE0wtwzSqa4dKkAaw5X3qNuGtqQXSSBlJKax3vj0pIC2/wQ6Hmqh0bP7n97xBWUGk06A3vy+kPiKmiuzcThzx+libwH94KlLmFlCw5dNM1by2+GF8dl9W1OMPo/4FZJKrUYDQ1/84+4uNCbOlwXJOSjGi/f/xO6a3+phc2/R1rGSISOkkHMXGjNuIemJRhPl7lKEHpNuHbl3SBh+4g7IWGAn8oTMKKRfLdTXnwMSQu1085OT8/guWaFkpYCyQGs0P0Nis/d4ys+IZdewtgAKc5Ewn7M5GQLXw8Wi0hmibuu0Bgp3ZGHnQw2MPVngEn3+XylWnUeTK6T6yw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=m52r4TxU6csU1hkdxng+K9140zOy6CU4VRXrtdoxDgs=; b=xPZxqUNpHQF1V6C6dmfWAtveBFAd4yjefagE/qtrqnOCiiRlDkw3w7qctJRZqB8YjAi0YiE2A2EIGv+GIWDe+ZcQibLjS8/DFTrbxLK4vf/sRtzVJXVZVxl44wft/N1a8i65x3EUwesyg1v1t/bJijjukNcExl1xwKyG21OoEAMy+s5bXtAxQJF7hE8Izb0/5vIr6PSwoHxQvw7MDBiEeZwsvWh4tx8N0cAcfGqsobWBwkYCik21uw6nscZC6PBC7r07zEYYJHoABaFrUR9WhzgpMN0c9l1cOfk0dk9nMbx2373hFR0j3F/nwoqp7Gxpz+Rzg+5G6cfmqeVL8EmT1w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=m52r4TxU6csU1hkdxng+K9140zOy6CU4VRXrtdoxDgs=; b=DTpnGZqXZ6QMB3q8EIZEyFyUg3B87Q4+D1WQyXLHGF1aY7auA5VHvvn/emVbREQ4UZ6oSAqVb2y9JeJIUOzpvm8hXVA2uWa6MGJMUG7ZdsTmwmtie9xczUhWSkDN54IQloaV5b+gKe2wg6iAw7OcJsr6fdE2TtDluYgBradcSlx+LHWi0LhgB7hakMXSO+thQy5gMQaL4Wnz3F+Ztgx4AmxVfI+Z6HUnku2y5IQJXH3AH8waAIVp4mGnTLCEcR5Y9ZgqP//Vj7ZY5dXw9Y2LFZDgILffaM1rFzIvsahZGAGhMvI7zOM+TR1tZWjwYnDO+vTmDOACKMDJn4LtmzVGvg== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 31/37] hw/arm/smmuv3-accel: Add property to specify OAS bits Date: Mon, 26 Jan 2026 10:43:28 +0000 Message-ID: <20260126104342.253965-32-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF0000013B:EE_|MN2PR12MB4080:EE_ X-MS-Office365-Filtering-Correlation-Id: 0f1013f1-5f7f-4914-299b-08de5cc89dd1 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|1800799024|7416014|376014|82310400026; X-Microsoft-Antispam-Message-Info: =?utf-8?B?VkNXeUova2R0alFwOENuTkc1V0lKVDgxaUE4OTlJQjBCZWo0aFVkYlFpaWVQ?= =?utf-8?B?Zm9ScHBXTVJnUDIwT0E1WHBWZ21jMVZ0OTRDU3ZiUDJkVWlkR2dXaEJlc3lw?= =?utf-8?B?ay81Mk10RzBRWUZoQVR3bmFRYmR2Q0NtRFE1U0hpbGRka3NraTFMZnkzdFd5?= =?utf-8?B?VFVPb25zZitkL25wUk9HcGxqYTAxTHdBY21qUk81R05OZFluaE1jUmNNZjF3?= =?utf-8?B?aU5XUDUveWtzSjFMazhXWmdHWHhPNFpBNFUvcU5Ga1NsaXo1U0ZGdWlzTWpJ?= =?utf-8?B?eGs1THRpMEF0bUNQSjZMWHpUSjFmZGVHWElyOE9XVXJlaURKWkJrVzlibC82?= =?utf-8?B?RXVTSlFBT0Jid0dDTzZYT2YwUGJlWHI2ci9yQWFsTU9peXl5TThmRVRmc3VM?= =?utf-8?B?bitQaE5ONEF0UmszNlczeXdMaFB1ZzNtZTFGS3BHTjEwcStIL3F4eXFXYTNY?= =?utf-8?B?Qk9QazkxWllDMjg4MzBMKy9vWEVJYzFVWjJsTzVPNjlpUFJKZTNSYmVTelYr?= =?utf-8?B?RExFTUVJNzRYSVRBQkt5VmFudXZobHJ3SlZhZGdONTNMRjcweFFPaC9tN0Ru?= =?utf-8?B?dlpnc1ZOend3RE1iS3prYThLZWFTa2NxRHVYdGZWZzJESmVrZC9qR1BCdGJF?= =?utf-8?B?WDJCY2ZTUlgyWlNESnpwdHhkenREUWUwNHNoOHlRVkkwa0lURXdOT3dnYlpV?= =?utf-8?B?VUZ1SmNSd24zbHVFdENlMlBWY2o0dDR2VCs3dmhlMnJYSXFrY09OWEl5UC9P?= =?utf-8?B?RmtReXl1OUE0dnVUU1B3dWt2T2NvNGlnckJBN1VVWUlha3h1em5LMDU0L1Zy?= =?utf-8?B?SDRHQ3RSbWZKSUUrR1BReFhLREpJNW5rMXZnUVdGNXdZRnptNEIyREQvbFRX?= =?utf-8?B?TGVZRmdXOWdpbEdyYzRSZ0ZOWGJWSlRSWjY3Wk0zSm1MTWlZYjNId2tqdHVp?= =?utf-8?B?NmJhRGVtUTNGQjRVVVNpLzNmZk5ZUEJKS0tUWXAxdkJZY1hxd0FyTnJIV09p?= =?utf-8?B?V2lWbUd0K2xNdnJ5Q29KWnBidFphT2tLbWJ2eHBvV01UVEY2NkFOdHBEbjBT?= =?utf-8?B?aHN0aWpqTkNDRDlMQ041UDQ2TXorWFR2SE5Wb2tDSVhDTDdwYjNFUWMzTUtJ?= =?utf-8?B?U2Z1cm5hNjZyMmVGODZ4Z01DOEEvbU1wcXdCU3JQYWRYTFVtWkVSRWVBQnhh?= =?utf-8?B?R3h3dXRpU0xMdk14emFhd0p0bTNJaXhXL2JiRlZmeHFseWliaFJIaDUyK29t?= =?utf-8?B?TGhJTUdTSzB3TWlhbTlpUStVMDJGN3VzM09aZ1cxOXB2bjkvUEVOK1k1dGxv?= =?utf-8?B?cGZTN3Vmc0ZBTjVBNVhZYTNBM0Y2VEN1VktCNW02bEl2OWZpTFA0N0tOZXd4?= =?utf-8?B?bDlHZmdRVFhnM3NaU3dCRW1SYVNpSTNSemMyNkxzN3YzYlJGa3JSbU93TGJM?= =?utf-8?B?anFTZVNSeXQwalhISmhnVFNGWDJ5MC9iUDc0NTRLWkYrckVEZWdEeGxYMFVy?= =?utf-8?B?Ly9aVXdiN21RSlJQQk5zTTQ5UDhSc09KcFRjWjhqZ1ZESTNiQ1hTQkpSWjZu?= =?utf-8?B?K1Q0aE93SXU2d0xpSjNKTXlaRytBekYzaGROVGt3SVhYMXE2RUxzdm1tRndn?= =?utf-8?B?ejIwY3dXcG15U3N5eXVhYlpvMmtqeGc4YVhzNXlyTFQ0Mno4VytTalh5Tis1?= =?utf-8?B?TmlJNVEwNEZ3c3pOdlF1SFA2S3FmU0NCdjRoNWx4V3hNRm5ia0dQbUxHYmFy?= =?utf-8?B?M1RsYUgwNTNMSHpYeVNVOFVWS2lZcWYzV2w1TWx3TFRGekxsa3JLUWVJZXNE?= =?utf-8?B?N3lkdG9HNW9LMlJpdDlOcmVDN0xRZmJlT3EyTUQvWWROSVREOGUzeVJmU0xS?= =?utf-8?B?NW5BdkdRbEEwRmFXQjk5V2V0d2s4QkRMemxNaTNoWldSNEVISWhzczgzVzBI?= =?utf-8?B?WEhJYUtaMGI3UDZXQVpZSlBqMC9xVk1CL2FTSW9ueDhNYXI0UjZKa0VyMVpj?= =?utf-8?B?dzNtayt3NTJvL1RLSVlyNWhjVlplTEtoYnU5eFNnQ2kyWlNMQ05PM0ZoR1Nx?= =?utf-8?B?WXR5WVJNYXh3cFQxMmM5Mk5Sd0QxbkxPcEEvTjkvYmI1WjExSTNNZ21MdUdx?= =?utf-8?B?NTZoL3c4cTZPVXJPK0NBNWgycVM4Tmx1bmtGQm5hTXR2STZJWXJra3JVRGtt?= =?utf-8?B?dnJ2RndOelRRZkcrZVpvdElPSmpOZTZJbEd6Vi95Z0ozQU5zb0tFSlhYMkhJ?= =?utf-8?B?VThTZlIvMVV6TUdONmRVa0UxcjlBPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(36860700013)(1800799024)(7416014)(376014)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:49:44.2491 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 0f1013f1-5f7f-4914-299b-08de5cc89dd1 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF0000013B.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR12MB4080 Received-SPF: permerror client-ip=2a01:111:f403:c105::5; envelope-from=skolothumtho@nvidia.com; helo=CH5PR02CU005.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424664209154100 QEMU SMMUv3 currently sets the output address size (OAS) to 44 bits. With accelerator mode enabled, a device may use SVA, where CPU page tables are shared with the SMMU, requiring an OAS at least as large as the CPU=E2=80=99s output address size. A user option is added to configure this. However, the OAS value advertised by the virtual SMMU must remain compatible with the capabilities of the host SMMUv3. In accelerated mode, the host SMMU performs stage-2 translation and must be able to consume the intermediate physical addresses (IPA) produced by stage-1. The OAS exposed by the virtual SMMU defines the maximum IPA width that stage-1 translations may generate. For AArch64 implementations, the maximum usable IPA size on the host SMMU is determined by its own OAS. Check that the configured OAS does not exceed what the host SMMU can safely support. Tested-by: Zhangfei Gao Reviewed-by: Nicolin Chen Reviewed-by: Eric Auger Reviewed-by: Jonathan Cameron Tested-by: Eric Auger Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 22 ++++++++++++++++++++++ hw/arm/smmuv3.c | 16 +++++++++++++++- include/hw/arm/smmuv3-common.h | 5 ++++- include/hw/arm/smmuv3.h | 1 + 4 files changed, 42 insertions(+), 2 deletions(-) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index a97abc1f79..ea420afeb7 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -27,6 +27,14 @@ static MemoryRegion root, sysmem; static AddressSpace *shared_as_sysmem; =20 +static int smmuv3_oas_bits(uint32_t oas) +{ + static const int map[] =3D { 32, 36, 40, 42, 44, 48, 52, 56 }; + + g_assert(oas < ARRAY_SIZE(map)); + return map[oas]; +} + static bool smmuv3_accel_check_hw_compatible(SMMUv3State *s, struct iommu_hw_info_arm_smmuv3 *info, @@ -74,6 +82,15 @@ smmuv3_accel_check_hw_compatible(SMMUv3State *s, error_setg(errp, "Host SMMUv3 doesn't support Range Invalidation"); return false; } + /* Check OAS value opted is compatible with Host SMMUv3 IPA */ + if (FIELD_EX32(info->idr[5], IDR5, OAS) < + FIELD_EX32(s->idr[5], IDR5, OAS)) { + error_setg(errp, "Host SMMUv3 supports only %d-bit IPA, but the vS= MMU " + "OAS implies %d-bit IPA", + smmuv3_oas_bits(FIELD_EX32(info->idr[5], IDR5, OAS)), + smmuv3_oas_bits(FIELD_EX32(s->idr[5], IDR5, OAS))); + return false; + } =20 /* QEMU SMMUv3 supports GRAN4K/GRAN16K/GRAN64K translation granules */ if (FIELD_EX32(info->idr[5], IDR5, GRAN4K) !=3D @@ -657,6 +674,11 @@ void smmuv3_accel_idr_override(SMMUv3State *s) =20 /* QEMU SMMUv3 has no ATS. Advertise ATS if opt-in by property */ s->idr[0] =3D FIELD_DP32(s->idr[0], IDR0, ATS, s->ats); + + /* Advertise 48-bit OAS in IDR5 when requested (default is 44 bits). */ + if (s->oas =3D=3D SMMU_OAS_48BIT) { + s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, OAS, SMMU_IDR5_OAS_48); + } } =20 /* Based on SMUUv3 GPBA.ABORT configuration, attach a corresponding HWPT */ diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index ca086ba00a..cb02184d2d 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -299,7 +299,8 @@ static void smmuv3_init_id_regs(SMMUv3State *s) s->idr[3] =3D FIELD_DP32(s->idr[3], IDR3, RIL, 1); s->idr[3] =3D FIELD_DP32(s->idr[3], IDR3, BBML, 2); =20 - s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, OAS, SMMU_IDR5_OAS); /* 44 b= its */ + /* OAS: 44 bits */ + s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, OAS, SMMU_IDR5_OAS_44); /* 4K, 16K and 64K granule support */ s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, GRAN4K, 1); s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, GRAN16K, 1); @@ -1949,6 +1950,10 @@ static bool smmu_validate_property(SMMUv3State *s, E= rror **errp) error_setg(errp, "ats can only be enabled if accel=3Don"); return false; } + if (s->oas !=3D SMMU_OAS_44BIT) { + error_setg(errp, "OAS must be 44 bits when accel=3Doff"); + return false; + } return true; } =20 @@ -1959,6 +1964,11 @@ static bool smmu_validate_property(SMMUv3State *s, E= rror **errp) return false; } =20 + if (s->oas !=3D SMMU_OAS_44BIT && s->oas !=3D SMMU_OAS_48BIT) { + error_setg(errp, "OAS can only be set to 44 or 48 bits"); + return false; + } + return true; } =20 @@ -2085,6 +2095,7 @@ static const Property smmuv3_properties[] =3D { /* RIL can be turned off for accel cases */ DEFINE_PROP_BOOL("ril", SMMUv3State, ril, true), DEFINE_PROP_BOOL("ats", SMMUv3State, ats, false), + DEFINE_PROP_UINT8("oas", SMMUv3State, oas, 44), }; =20 static void smmuv3_instance_init(Object *obj) @@ -2115,6 +2126,9 @@ static void smmuv3_class_init(ObjectClass *klass, con= st void *data) object_class_property_set_description(klass, "ats", "Enable/disable ATS support (for accel=3Don). Please ensure host " "platform has ATS support before enabling this"); + object_class_property_set_description(klass, "oas", + "Specify Output Address Size (for accel=3Don). Supported values " + "are 44 or 48 bits. Defaults to 44 bits"); } =20 static int smmuv3_notify_flag_changed(IOMMUMemoryRegion *iommu, diff --git a/include/hw/arm/smmuv3-common.h b/include/hw/arm/smmuv3-common.h index 415b7ccde5..abe3565357 100644 --- a/include/hw/arm/smmuv3-common.h +++ b/include/hw/arm/smmuv3-common.h @@ -342,7 +342,10 @@ REG32(IDR5, 0x14) FIELD(IDR5, VAX, 10, 2); FIELD(IDR5, STALL_MAX, 16, 16); =20 -#define SMMU_IDR5_OAS 4 +#define SMMU_OAS_44BIT 44 +#define SMMU_OAS_48BIT 48 +#define SMMU_IDR5_OAS_44 4 +#define SMMU_IDR5_OAS_48 5 =20 REG32(IIDR, 0x18) REG32(AIDR, 0x1c) diff --git a/include/hw/arm/smmuv3.h b/include/hw/arm/smmuv3.h index 242d6429ed..d488a39cd0 100644 --- a/include/hw/arm/smmuv3.h +++ b/include/hw/arm/smmuv3.h @@ -71,6 +71,7 @@ struct SMMUv3State { Error *migration_blocker; bool ril; bool ats; + uint8_t oas; }; =20 typedef enum { --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424658; cv=pass; d=zohomail.com; s=zohoarc; b=lcH6I5B49nGcpUlAfOvzo4w2HEZX6nhDw+JIWjASzvx84m8Gyy7KoKOaEIeW6LCX1Lv/hSZbK5R9OREoNQxHOAjEkFnDG8EJAgVsPxJHW3jlHSj+bwLXGn2wtKM1sMNrSpanJuyDBoD2ToOI8TzPJVT+mCgDt/8jCHby7uiFTuo= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424658; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=t5BU+DOUQmpX64C1uCWW7bOgE7Mi6tAx5KeioyOARu8=; b=myir2gZkF++C0qgHJfyYgFWmy19BrB/0hGkct4V3/tb/uvESQrECKRtaas8Yj7N2J2Ou1yAaQ5Jd/eBGpq5H7WPQYcmPNk0m+aI/Q9NtKcuvicR4xY5i6h8eoielW41+zz0ir+nghz6HjB/30hwmkbkOz4CV25IE4srvu6YrL00= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424658028372.5388473729637; Mon, 26 Jan 2026 02:50:58 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkKBE-0002rI-LQ; Mon, 26 Jan 2026 05:50:48 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKAf-0001zA-Vn; Mon, 26 Jan 2026 05:50:15 -0500 Received: from mail-southcentralusazlp170110003.outbound.protection.outlook.com ([2a01:111:f403:c10d::3] helo=SN4PR0501CU005.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKAe-00068W-7e; Mon, 26 Jan 2026 05:50:13 -0500 Received: from PH5P220CA0009.NAMP220.PROD.OUTLOOK.COM (2603:10b6:510:34a::14) by SN7PR12MB8170.namprd12.prod.outlook.com (2603:10b6:806:32c::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:50:05 +0000 Received: from SN1PEPF000397B0.namprd05.prod.outlook.com (2603:10b6:510:34a:cafe::30) by PH5P220CA0009.outlook.office365.com (2603:10b6:510:34a::14) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:50:10 +0000 Received: from mail.nvidia.com (216.228.117.160) by SN1PEPF000397B0.mail.protection.outlook.com (10.167.248.54) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:50:04 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:49:47 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:49:43 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Dxkf1OuBCVMw9UWJeJjoXqVTUCozHIj16dGoC+C4+mg6pr6JLMaC0wX7PxyI/yjZ7Z8USt/kfDdOOrvEnQ5u6A1FiUxh7htChtGcdRmnd/3WOCAed9f2Y6Pmjwt+VlaSKaoVNoQX14oF45UR0TM5SEWxggE5/BnyWD/+zzQ8GIduw5KSDOsWYwzH3AVgxQnSkJC1LOyIWym5BlIMMHb1dyLJa8hBVsZJgX91XNayzR7TmxJma4sXGVT/AxIBwMlEz/Ls6bgH/PJC/E46uPfsGQyAIxDLBB43KEVxdygyWZpOo8r32K54f1o3PZ/kEDJR8Ek/YzoRM7tbpOFfZ2qLFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=t5BU+DOUQmpX64C1uCWW7bOgE7Mi6tAx5KeioyOARu8=; b=wUWYb+YZf56eR82SMrHsvhyEWRH0PrR3y9vsU61KbR3zO8E208PSgkn852snYZaHC5MLLrTNlt2pkPpISBfnTVDPw3dPnlRi5vQ9ssFrN39kketD71hrYUoAE9tNPGt77w2HBsMiw52RfUdab0BA5r4PTn+58UXAwIFyvuQSN8cGXjnf72MMbuBWLEG6lqErp0beKYnWV68GXp2qXuIHvPbbJZGfWm4ogf2gkVbbf5SIenI9A/Kg4YqU0BmmXMI10Egx+DbNg5KjrzMiAaawq52dloT2VPx3E3y1ptAp9mztl1/q4yua7iUHbMxgU3+iZI7GuCbX26EkWVnYUUSkFQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t5BU+DOUQmpX64C1uCWW7bOgE7Mi6tAx5KeioyOARu8=; b=FWulHf3cZSbYkGEb1cPhSPTRgT60IRTjqN9vpfd4AylSjMkc1YN47pXLjPu5kz2RoC5E0g6UtxO+vHbmm4ZE93FY1LOJ1MJDzN7D1SyjsvesLojUHAUDQoRDpiOUrlaf9E5nkdhnAEJGprJdswqoc+fOUDs0T4Co4M4JJ4kGE3e3xWAXGjmtxeBFPOgDwh1QeToNZ3xzbNffqGi/VJsvhsvoGFVC0PGLsbqdcANeG6tSLrDk5AFAQgAyt8/wbNfF7XdeT+r/JVq1dvy6dAcHtGfGaFxleKsbTiOgqoAOkF2Hmia1nvDE38MGprSptk/CbdjJSDQ24zk037+e+0pn0A== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 32/37] backends/iommufd: Retrieve PASID width from iommufd_backend_get_device_info() Date: Mon, 26 Jan 2026 10:43:29 +0000 Message-ID: <20260126104342.253965-33-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF000397B0:EE_|SN7PR12MB8170:EE_ X-MS-Office365-Filtering-Correlation-Id: c457e538-7405-4344-ded6-08de5cc8aa2c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|7416014|376014|36860700013|1800799024|82310400026; X-Microsoft-Antispam-Message-Info: =?utf-8?B?Y3h4TEUvd1c4cjE3SENkd1dSRlRPaVdtd3BMVnp3MkRxUGFhcjh5cUpXZXI0?= =?utf-8?B?Q1Rxa3pNZDdMSHk4NGpHOWt6UkhHajYxVFIrQVZKMUh5US9QVHpiS0d4d2tN?= =?utf-8?B?UTlVZm10TWs3My9zeVNaN1AvbFBoeUNSUnk4WXMrU3FEd3g5THk4bUR4VkhX?= =?utf-8?B?ZkhKSGZQS3h4Zi9DenowN1l6T2ZocVVsYUZBcmx5T1pHWm8yZkZZTVUxbTVB?= =?utf-8?B?Skx5TGp1UExqMkRBOFVGVUZMSERPRnBvRjZFL0IwcjlPMWg4YkFMU3phaEtX?= =?utf-8?B?MEdZNUhPbXM0ZFFvTGxrb0JhTlVKbW90RHM0TnE5Vm11MUZUVXU5WWg0VGVG?= =?utf-8?B?ZGRKZnBBNElHVVFjZ0s5enViV0hMazZvR3hmbGt5UnA1UHVMU3dNb2tXWDNx?= =?utf-8?B?alBBNVVSQ3lSV1RPRDh6SEtyOFpaNGVMTHZDYTRmOUhQOGlEeHFkSUxXS2x1?= =?utf-8?B?SVZ3SENaSnZkVWJNclhTR0hsYWhDSHo2eGFWUitzR0Y5VzMrbC9yMTM2c21F?= =?utf-8?B?bkxWNy9HV3g4bUJsM0NMRjZjTTF4UTRjQVVKY0FzVGRBL1E5VFAzeCtHb2hB?= =?utf-8?B?OTd5dkRqcDE0VGx0OXlGNjFUcGw1WFlVWEZha245ZU1HcUo0OVdJWWcvRUhN?= =?utf-8?B?dnlMak9vS0N5Q3A0R24vYkRpNW94VzRzQmU5Y3RZQU10SGxqVGFWSnZIeTEv?= =?utf-8?B?YktOOVJ6U2U0ZDhhNVRudGVwZ2xWVDQ5dEd4cHJ6cGFLbit1SWxPZndKSWVK?= =?utf-8?B?RTJFc1Q1Q2xCemx3d3NERml6WldUZ2wwd05pZ0U0akpWZ2ZkSUxDczdNWGpS?= =?utf-8?B?RnhFV2NXdjIxa1RuS01UMU9rL2tmZHZFZkdYcXZqSWlFR0FYVXdGVHpEYjh2?= =?utf-8?B?MWh3ZWNTd0gvRGNKQnhBRGJOd2RuUzRqbHNzM0NSRGJlOUVKK1gzNVNWWUEw?= =?utf-8?B?anZUNG9LK2lZY01CS1lZYmgwd2ZOeEh1OTNTY2NmVGRNbE9OMHlUc2ZLY1pq?= =?utf-8?B?bUNTTkxXYkwzZ2ZDOFJRQVloNXRuY2pVbTlhZlY0OGFBU29QTjM1ZXRyR1dy?= =?utf-8?B?T205cEc4M0N1czhuNHYzODZFa212ZTdiUU16cjlpTi9YR3g4enJ4ZHd5a3Bo?= =?utf-8?B?dzk3QjN6NFpSWk0rcnczZXVZWTFRZGJhdVZmSkpTa295RXpna1p3bjRTTitD?= =?utf-8?B?bHQ1RElFQnFhUzNBb2ROTjNaLzhhSnRQVWhqZzJEZTFMcFlMSnZpL0FuWFdE?= =?utf-8?B?S21GSmhWaFFWZGJBUDAvZk5lVEh3QnB2dzlES1pnWFZBN08xM0hMMGNvUklu?= =?utf-8?B?dFJMWGhZQ0pRWTdpRVdCdlJJcTJjTUR6YUM3cEJYN0xSOUhhQ2hFZDR0TVZ3?= =?utf-8?B?aHhSeVV3aDI0TDJQQnpWUGo4MG81MjJRemF0L016dG5IaFBNVzl1L2ZkKzBo?= =?utf-8?B?ZDFUazFOblZzMkk3bjBWcHRaeFI3dGh2R2w3cFVxOTMxUlZUTDFpNXIwSktp?= =?utf-8?B?NFhIbnlTTXRqdE5qYWtwKzB1ajVoSmtOdW9kVGlnVnpmWm5MbkV6U1Fkc0NE?= =?utf-8?B?d2k0L2FuRGVQV0Q3M3ZUV0FLQmVxNGZtRXFRcTRja0tJcFRJUFRaNHhQV01K?= =?utf-8?B?anFES1ZXUmpxd0poVGRIMVg0dVZoZkpxcGYyWWQ4cFNiVTlVaXBIcUE4Z2xh?= =?utf-8?B?VyttRGwxQkdlUnM1TDhXckJKUS9yVUJERmplK3dDUEpwdStvSUFuRndMSjJa?= =?utf-8?B?S3d4UmdGa3Q0amRKNTM5T291RWNtOE1OYnJUeitCNmVteDdvakxLQnl0eHhv?= =?utf-8?B?K2VhZER0ckJRbTF6a3N3R29QbTZ4SHQ5a1lSRGpESHY0V1l5LzU0TENGZzhh?= =?utf-8?B?dVdEWTdPRFhDbHp6SnV1S2JjbFhmell0R0orZS92SmN5eGhrMytHcjZTQXc0?= =?utf-8?B?Y1k2NGpCb0k2WlR1dUJoRDNYRjhWQi9nMVZFcWIrUnpqRllYUTBwUXRKLzQ2?= =?utf-8?B?OVlrcnFLT2R1S2hsVm5VVGYyNi9YOElXK0twRXIrVnNMQi9iQmYwbG5hdlJT?= =?utf-8?B?M216UjRrWU5BRGFUd05hV2hhbHM3ZmNXSWRQeDNrWGo3dktOWjNUTnlpbnAy?= =?utf-8?B?bDZ0QkZscnVCbnBSck01Sll4S29tcEZSL2pRZ0JMM3oyeTRCUjdnaFVGMjF6?= =?utf-8?B?dDJwclUwOVpJSWVpZityZjllTkN2MXU5T280YmJsUzdneU0rNlJSbG56cGxW?= =?utf-8?B?ZFkyaXh1NDRLbnQyWnFkeHNTWjd3PT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(7416014)(376014)(36860700013)(1800799024)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:50:04.9955 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: c457e538-7405-4344-ded6-08de5cc8aa2c X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF000397B0.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR12MB8170 Received-SPF: permerror client-ip=2a01:111:f403:c10d::3; envelope-from=skolothumtho@nvidia.com; helo=SN4PR0501CU005.outbound.protection.outlook.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424658419158500 Retrieve PASID width from iommufd_backend_get_device_info() and store it in HostIOMMUDeviceCaps for later use. Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Nicolin Chen Reviewed-by: C=C3=A9dric Le Goater Tested-by: Eric Auger Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- backends/iommufd.c | 6 +++++- hw/arm/smmuv3-accel.c | 3 ++- hw/vfio/iommufd.c | 6 ++++-- include/system/host_iommu_device.h | 3 +++ include/system/iommufd.h | 3 ++- 5 files changed, 16 insertions(+), 5 deletions(-) diff --git a/backends/iommufd.c b/backends/iommufd.c index e3a3c1480e..9b63d74083 100644 --- a/backends/iommufd.c +++ b/backends/iommufd.c @@ -389,7 +389,8 @@ bool iommufd_backend_get_dirty_bitmap(IOMMUFDBackend *b= e, =20 bool iommufd_backend_get_device_info(IOMMUFDBackend *be, uint32_t devid, uint32_t *type, void *data, uint32_t = len, - uint64_t *caps, Error **errp) + uint64_t *caps, uint8_t *max_pasid_lo= g2, + Error **errp) { struct iommu_hw_info info =3D { .size =3D sizeof(info), @@ -408,6 +409,9 @@ bool iommufd_backend_get_device_info(IOMMUFDBackend *be= , uint32_t devid, g_assert(caps); *caps =3D info.out_capabilities; =20 + if (max_pasid_log2) { + *max_pasid_log2 =3D info.out_max_pasid_log2; + } return true; } =20 diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index ea420afeb7..342944da23 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -121,7 +121,8 @@ smmuv3_accel_hw_compatible(SMMUv3State *s, HostIOMMUDev= iceIOMMUFD *idev, uint64_t caps; =20 if (!iommufd_backend_get_device_info(idev->iommufd, idev->devid, &data= _type, - &info, sizeof(info), &caps, errp)= ) { + &info, sizeof(info), &caps, NULL, + errp)) { return false; } =20 diff --git a/hw/vfio/iommufd.c b/hw/vfio/iommufd.c index 2947e1b80f..131612eb83 100644 --- a/hw/vfio/iommufd.c +++ b/hw/vfio/iommufd.c @@ -398,7 +398,7 @@ static bool iommufd_cdev_autodomains_get(VFIODevice *vb= asedev, */ if (!iommufd_backend_get_device_info(vbasedev->iommufd, vbasedev->devi= d, &type, &caps, sizeof(caps), &hw_c= aps, - errp)) { + NULL, errp)) { return false; } =20 @@ -939,19 +939,21 @@ static bool hiod_iommufd_vfio_realize(HostIOMMUDevice= *hiod, void *opaque, HostIOMMUDeviceCaps *caps =3D &hiod->caps; VendorCaps *vendor_caps =3D &caps->vendor_caps; enum iommu_hw_info_type type; + uint8_t max_pasid_log2; uint64_t hw_caps; =20 hiod->agent =3D opaque; =20 if (!iommufd_backend_get_device_info(vdev->iommufd, vdev->devid, &type, vendor_caps, sizeof(*vendor_caps), - &hw_caps, errp)) { + &hw_caps, &max_pasid_log2, errp))= { return false; } =20 hiod->name =3D g_strdup(vdev->name); caps->type =3D type; caps->hw_caps =3D hw_caps; + caps->max_pasid_log2 =3D max_pasid_log2; =20 idev =3D HOST_IOMMU_DEVICE_IOMMUFD(hiod); idev->iommufd =3D vdev->iommufd; diff --git a/include/system/host_iommu_device.h b/include/system/host_iommu= _device.h index ab849a4a82..bfb2b60478 100644 --- a/include/system/host_iommu_device.h +++ b/include/system/host_iommu_device.h @@ -30,6 +30,8 @@ typedef union VendorCaps { * @hw_caps: host platform IOMMU capabilities (e.g. on IOMMUFD this repres= ents * the @out_capabilities value returned from IOMMU_GET_HW_INFO i= octl) * + * @max_pasid_log2: width of PASIDs supported by host IOMMU device + * * @vendor_caps: host platform IOMMU vendor specific capabilities (e.g. on * IOMMUFD this represents a user-space buffer filled by ker= nel * with host IOMMU @type specific hardware information data) @@ -37,6 +39,7 @@ typedef union VendorCaps { typedef struct HostIOMMUDeviceCaps { uint32_t type; uint64_t hw_caps; + uint8_t max_pasid_log2; VendorCaps vendor_caps; } HostIOMMUDeviceCaps; #endif diff --git a/include/system/iommufd.h b/include/system/iommufd.h index 567dfb7b1d..80d72469a9 100644 --- a/include/system/iommufd.h +++ b/include/system/iommufd.h @@ -71,7 +71,8 @@ int iommufd_backend_unmap_dma(IOMMUFDBackend *be, uint32_= t ioas_id, hwaddr iova, uint64_t size); bool iommufd_backend_get_device_info(IOMMUFDBackend *be, uint32_t devid, uint32_t *type, void *data, uint32_t = len, - uint64_t *caps, Error **errp); + uint64_t *caps, uint8_t *max_pasid_lo= g2, + Error **errp); bool iommufd_backend_alloc_hwpt(IOMMUFDBackend *be, uint32_t dev_id, uint32_t pt_id, uint32_t flags, uint32_t data_type, uint32_t data_len, --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424713; cv=pass; d=zohomail.com; s=zohoarc; b=nLNQ7v0yCKYLDVdgi3wxd0DsS40dBG/87DpTnanmdDxBUs+BVthQ26eDY8IA+kpwpBcKWVYLQTI9/Xafpb7KWqRqrmhtp8aij7ZvVeXc29bb4VvY//NkHibVg6MisO/mgNHDBrjCXpd6VQXmZjn6tr2783Nnfvg3RJQY/QAVmws= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424713; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=OmM4cORkcprDrP5Ena+1uLLf1dDIBdMqxcuRP8CvyG8=; b=WUJek2zx23KkjcHasFCg32T9URmEKCDue8malN4e3uBRkzK1KGBUOMK9UEziLglhE1yxy1kiC6R/dto1Q32WHTEZtBgwvXcr0RM7oaRqZ0SZu8LGRfewxiPrcnVKUnTQCRBHQhF7O3iHySryQZcwdgUrWIX7JN1law1oPDp8l/8= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 17694247133142.3401030330027197; Mon, 26 Jan 2026 02:51:53 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkKBI-0003Qz-R2; Mon, 26 Jan 2026 05:50:52 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKAm-0002BS-AC; Mon, 26 Jan 2026 05:50:20 -0500 Received: from mail-northcentralusazlp170120005.outbound.protection.outlook.com ([2a01:111:f403:c105::5] helo=CH5PR02CU005.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKAk-00069S-O2; Mon, 26 Jan 2026 05:50:20 -0500 Received: from SA9PR03CA0009.namprd03.prod.outlook.com (2603:10b6:806:20::14) by DS0PR12MB8042.namprd12.prod.outlook.com (2603:10b6:8:141::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:50:12 +0000 Received: from SN1PEPF000397B2.namprd05.prod.outlook.com (2603:10b6:806:20:cafe::3a) by SA9PR03CA0009.outlook.office365.com (2603:10b6:806:20::14) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.15 via Frontend Transport; Mon, 26 Jan 2026 10:50:14 +0000 Received: from mail.nvidia.com (216.228.117.160) by SN1PEPF000397B2.mail.protection.outlook.com (10.167.248.56) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:50:12 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:49:57 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:49:53 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=JkW8bKFWBghYnICL8rXgUw17Xp/JOK5YufNdW/goARqNT80/jmuNwqKkoXabiOwCAckOwlh5XQFfvNsIkTmtjtLzGx5OpcgBwEOn25l1Q39OMBr2EwNQSsflpYlKp2j6TmlL/JUvTwiWSAOvQ9CIur5x4zPQz0nghmVrmJDvPLuv8DRNIndCaFJpZ7ijE5mKyiA0L4QyepVN1UtLA70DGhiFgw2uefcdvs+zVzvNbg2gBvLYbcEW7UegKdx0UwNIPgnLt+qzPoMT+0c/RxTUKd7ZJ7hdonhmJWs4c1BqxlKlbOfjX/m2YaCxxG5U/Vff52X7fJowVZiNCHHuOROSBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OmM4cORkcprDrP5Ena+1uLLf1dDIBdMqxcuRP8CvyG8=; b=t5v8Z4kjqSVy43YAqohX1rMVN7HRGewcuHbJFeGQMUs5+dddu7qmkWCDtP3TDHJZsJySFJ9/ya9v9AhG3xv0jMstoygHMGRy5mDLiS1ke8oI95cgwAnSEhyA+uAgPz8uFXWoOKe+9QRU5ShWQhPyvPr/oAyk14R5IEGVxRK9BvFtATIZ52viTeumLvkj8juM1BBaGPi52pxrQP/VpN+ZR9XK8H4EU2TWOeQviOS7trF/fePxjDKGB5exXcRuVSe9NihFatTC9z23S1kz0YZrxootE/LLf5bZh7Wtwx8oY+7psMafM7VoxRZLSARSWAVQpr38P9x8kbaHsPWsavU1zw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OmM4cORkcprDrP5Ena+1uLLf1dDIBdMqxcuRP8CvyG8=; b=XhZIQKGFpKwhPDApMU4yq6b6fCKXGrhsH+4F+8uaBr062qn/gllc++rMLrh+OaJDWFoyyJ4cC3y24+ay1iMSHxTZ/4RRfS8n6Tw5F1s+k3Afz8KJj0ARlRH7F7MXvMquUBLtVbpIUNmuS3phgOp+BTp9khUO4tpjW0n/JaaiIjZcnPwUvrB3m4hgmrtLOuPR0vb2t7kbUGLZVcd0eyEntuVmNl0clSc0sk5ybR9jWVq7y+qi2jZi8kUc43Hgy45J3eEeOax7D2HCZCb8cpGiMOAJd4wSdu6loiqiWl0yAupOKy0WLQYw4edkwsMXrFM/mkIXasH6GoXmfABZnWVdcw== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 33/37] backends/iommufd: Add get_pasid_info() callback Date: Mon, 26 Jan 2026 10:43:30 +0000 Message-ID: <20260126104342.253965-34-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF000397B2:EE_|DS0PR12MB8042:EE_ X-MS-Office365-Filtering-Correlation-Id: 7637926a-caae-42c8-d6ac-08de5cc8aeae X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|376014|7416014|1800799024|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?9tiz40ixHSmukEUw3t3FO92lmDKjHLVDEI1g6QBRLFmrl/SEeSW7vdC1AQcx?= =?us-ascii?Q?o8RGAeCdxabzQ75RlHsvlRduMXgGEbx8BUqhTJAGghXTvc+GvD8s4VCcUA5C?= =?us-ascii?Q?NUDhzGDk18HE+mmADWElxZBd3TEWUNCJb4akmftd+jbXkNRJsc/AZUmP49dc?= =?us-ascii?Q?MQ0jgtEkuUeZxz/oQBILguxEsxauG4tEYiHqhcucdNOyKLGRcRUOZS+PSN40?= =?us-ascii?Q?kYKiFB+J5Dww6z5YWXtAQ+1U7xXcyKS93NQoZFkehyp2/Qi35bB0iHinm+wH?= =?us-ascii?Q?TnbFvCeR6oFRgx4402spH87oMXuGkgIDXhNniPyG4DfvK3PsBMiHTO4hNG9o?= =?us-ascii?Q?diBDV6mBVk7v8pIDKVlH42YbDA6fz3WJk2N3aM5aCxbWN9atLopjhc8d1OOM?= =?us-ascii?Q?RqwIFNNug1MvN/5eJFrmjsHACUBQFR7Vk6A/BeC9RlIzQX2qhEZiXeObaajr?= =?us-ascii?Q?s4EI1IoEzLxgMNdzSWjwBN3P1v5Xhun/tWGG0FmYadMBHaoWkM2z3xti6ie6?= =?us-ascii?Q?2BzzSp067qNcg/rvd9s7h0KSvPZDfBH5/DeCFchk9XfQmQEUwqseFieNyI14?= =?us-ascii?Q?qzc5Vjrp9zdffKkVx1O2NukvWGRgPGx5lZgzDAv81U7IY0Hp0aPhTD2y6Emf?= =?us-ascii?Q?UxCJqm1i4qhh8md4kybOs3X5qMeAc81GmPAsfJUlHM1DffCOoA8jrQMQj4Y9?= =?us-ascii?Q?XgdnmBaCNYO04q6xeWDbu0liT3Y7Y0QyF7okLtCF9Dsp8qbwtAm2YfigJiJH?= =?us-ascii?Q?/A0mc8ucGBZIH3vxnrZCYqcbFxtT381NMo/u0cwNEkD8lIIyhxATQsDApF2C?= =?us-ascii?Q?eYG6YuEQmpFRel0aF3y9xZ+EDfShTwuvstYLO/6CZqBcAxiqW4eV8hitooeI?= =?us-ascii?Q?EdZOC52qkKd79GfHhiXqj48YalT8GcbGHhHgkkSVdwUPclYUg6c+kVvD5NGT?= =?us-ascii?Q?atJhHuDfalfMvvqr0Bs/rHRBl/m6SyJsNG9OwuaBNUNdcwJA1sxnsWj1msWC?= =?us-ascii?Q?YHPlLN7FRx+o9FASBd6yTJgYsk+Dn6sze4blj/hzGn6YW/+44ABG+vuQbiUn?= =?us-ascii?Q?GVAA6BR5qjmwlGhAq4PngOFzcnD1foyoGj4ZSdJu/5t/Zec37mdPKZYK3x3h?= =?us-ascii?Q?j0djOQ67kgS4VAuY57lU4zpD8ckTWm7lwXaHcH3Nlw8vX7XcdQB3N9vJTY7J?= =?us-ascii?Q?Y3l4LeyuWfHZdd5mtHQprfIT++04Oub3ickho7RrJDWaAEksxEikt6urIuih?= =?us-ascii?Q?DPI+0wR9EQtdiyFY4bw8jGCkOSpvHSkccBllxbTvZGPTyn26utmrdIy+KntZ?= =?us-ascii?Q?MVFj8ICDEQjX6lDrLKwbu0e3rhx2oBMDnu0nwQbREUisWShjZLuxPSS8X7ly?= =?us-ascii?Q?UNSGnd2Xzy5Lhitd8lOFcHEFiGcvdsxgQAgnM4nEK6wC2u43is3jbP5NybFh?= =?us-ascii?Q?k3DRN9Ek+2rF09nzd3aRUHI2WinK07iaRf2im8bkRaIZtVkQYnk6utosA3hP?= =?us-ascii?Q?9pK1smC4tIThW6I9St+C+bCViVxrh1PDDUal3KIF/Kndhg8gltyGe1LYFFfs?= =?us-ascii?Q?Y1Ox/FU4FZhmdP9mNI5mTuWEmnt3hJR47J1xn90ylDZwtbgPXiH1NBsaZadF?= =?us-ascii?Q?AA2CYsW3Z8YP6aZ59Ivt3a0Nh27zrx7lMuOTfHM6Vh/PWRhUHDTwcozoDtNV?= =?us-ascii?Q?3haH+A=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230040)(36860700013)(376014)(7416014)(1800799024)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:50:12.5680 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7637926a-caae-42c8-d6ac-08de5cc8aeae X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF000397B2.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB8042 Received-SPF: permerror client-ip=2a01:111:f403:c105::5; envelope-from=skolothumtho@nvidia.com; helo=CH5PR02CU005.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424714562158500 Content-Type: text/plain; charset="utf-8" The get_pasid_info callback retrieves PASID capability information when the HostIOMMUDevice backend supports it. Currently, only the Linux IOMMUFD backend provides this information. This will be used by a subsequent patch to synthesize a PASID capability for vfio-pci devices behind a vIOMMU that supports PASID. Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Nicolin Chen Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- backends/iommufd.c | 17 +++++++++++++++++ include/system/host_iommu_device.h | 17 +++++++++++++++++ 2 files changed, 34 insertions(+) diff --git a/backends/iommufd.c b/backends/iommufd.c index 9b63d74083..13822df82f 100644 --- a/backends/iommufd.c +++ b/backends/iommufd.c @@ -539,11 +539,28 @@ static int hiod_iommufd_get_cap(HostIOMMUDevice *hiod= , int cap, Error **errp) } } =20 +static bool hiod_iommufd_get_pasid_info(HostIOMMUDevice *hiod, + PasidInfo *pasid_info) +{ + HostIOMMUDeviceCaps *caps =3D &hiod->caps; + + if (!caps->max_pasid_log2) { + return false; + } + + g_assert(pasid_info); + pasid_info->exec_perm =3D (caps->hw_caps & IOMMU_HW_CAP_PCI_PASID_EXEC= ); + pasid_info->priv_mod =3D (caps->hw_caps & IOMMU_HW_CAP_PCI_PASID_PRIV); + pasid_info->max_pasid_log2 =3D caps->max_pasid_log2; + return true; +} + static void hiod_iommufd_class_init(ObjectClass *oc, const void *data) { HostIOMMUDeviceClass *hioc =3D HOST_IOMMU_DEVICE_CLASS(oc); =20 hioc->get_cap =3D hiod_iommufd_get_cap; + hioc->get_pasid_info =3D hiod_iommufd_get_pasid_info; }; =20 static const TypeInfo types[] =3D { diff --git a/include/system/host_iommu_device.h b/include/system/host_iommu= _device.h index bfb2b60478..f000301583 100644 --- a/include/system/host_iommu_device.h +++ b/include/system/host_iommu_device.h @@ -59,6 +59,12 @@ struct HostIOMMUDevice { #endif }; =20 +typedef struct PasidInfo { + bool exec_perm; + bool priv_mod; + uint8_t max_pasid_log2; +} PasidInfo; + /** * struct HostIOMMUDeviceClass - The base class for all host IOMMU devices. * @@ -116,6 +122,17 @@ struct HostIOMMUDeviceClass { * @hiod: handle to the host IOMMU device */ uint64_t (*get_page_size_mask)(HostIOMMUDevice *hiod); + /** + * @get_pasid_info: Return the PASID information associated with the + * @hiod Host IOMMU device. + * + * @hiod: handle to the host IOMMU device + * + * @pasid_info: If success, returns the PASID related information. + * + * Returns: true on success, false on failure. + */ + bool (*get_pasid_info)(HostIOMMUDevice *hiod, PasidInfo *pasid_info); }; =20 /* --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424659; cv=pass; d=zohomail.com; s=zohoarc; b=LzrkMssU3PE/6mPVQu4hFhS5Yfkjv+SoOFKvGDUxL0ILR3g728PI+zly6oGtdLtGcHrKSJchpYQXuCTvWzlDQkKd1qNwHRvtO0gQqbT1s1KFLlH0MmRTpO/t63GwhUH+8PfySgmIvziT3qADjZgpMGQF7QrlU6izpPhtDezrwqo= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424659; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=mlYWbYPk2t2WmYsb3fa/uMdMYru2Uo1JnSfr90dWI9M=; b=boq9huiXThwwe/BvTcvI7WRlFfeLHMLKvXo+HuLYGXNxP6A08kW8I/XhgXOMhiMf1xIAAypTctk2HMzqpVfDlc+R5TqiNdjtXav7CC1ZIR3RIDFb0+dU1/UC3Je6v93Exe27iKz6iq5DXKbJyaULBO4DBnNHOAh5Eg8wrSsatc0= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424659027533.1456587136329; Mon, 26 Jan 2026 02:50:59 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkKBH-0003II-Vv; Mon, 26 Jan 2026 05:50:52 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKB6-0002YC-Nm; Mon, 26 Jan 2026 05:50:43 -0500 Received: from mail-southcentralusazlp170130001.outbound.protection.outlook.com ([2a01:111:f403:c10c::1] helo=SA9PR02CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKB1-0006AR-Sp; Mon, 26 Jan 2026 05:50:38 -0500 Received: from CH0P221CA0019.NAMP221.PROD.OUTLOOK.COM (2603:10b6:610:11c::8) by SA1PR12MB999108.namprd12.prod.outlook.com (2603:10b6:806:4a2::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:50:29 +0000 Received: from CH2PEPF0000013D.namprd02.prod.outlook.com (2603:10b6:610:11c:cafe::40) by CH0P221CA0019.outlook.office365.com (2603:10b6:610:11c::8) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:50:32 +0000 Received: from mail.nvidia.com (216.228.117.161) by CH2PEPF0000013D.mail.protection.outlook.com (10.167.244.69) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:50:28 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:50:13 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:50:09 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=gEnSMEyFPZDU9hGTmbs0uhmyyNHHnIUHpN6IwI4P25r6ZKKPubzjnoIxbZPvJJQ8pjATnUj52MUJ/pCA1renTJhx3kxmKCOji2LMMsHrDVT5EdkYGEZGluxrfjwByGdWWYrTGcB730bS0DlS4Y/4AAhiQIF3gqR5Gkw2yEBYnx0xPP7wTNwOjq8OtlqW412+jsk0YGDiPi/8qFMnB1rzim5pK2Ic2J7vXcrlpAjtXyzdXwBRbKlShNMg119lo0XKSmnNGOxf64XYhB3oYwc4quL+BuaywRwy16W0n4R6H99M+E30eJBSAN729z2J0ikeoj4d1N7V+lThstZ8dO6v9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mlYWbYPk2t2WmYsb3fa/uMdMYru2Uo1JnSfr90dWI9M=; b=ko3/KQZOdgNuIvyY6FoaRmGIJXi3VW/alCY02IRrDtqiQ3Q+tdF4e42eEAKKDISdzL+N62Svel4qlLhdL9XbmxNFXVOhLaruLubjrhdSQnMOJT59HzEq+jnugy6t0NWjpPpc5l6LcW041fvCWAMrE9iun4t0gs6gZnJMigmX+aYkYCKXl4F+k7jtbXsv03yrR0V6c+HhFAql+z004U28tQ3wgx2YlRESF+URSvtCiVvVCmxV16mSoHQkY7PZehLCaRf9POgy/gTP3bsEHv4ua6RrPHKrZuFciUCJXcbnskWlE8vNP6gIW7UweAePv563cLFFQgOlARD6m0nU0fYg+g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mlYWbYPk2t2WmYsb3fa/uMdMYru2Uo1JnSfr90dWI9M=; b=QDDo64aYwrqbUyX5dvMWFCdOQIQHU4hQ8Fx8EiDPiApgTUIdxf2Jr9KMOlbICkAh7fOo2zK5xFhx/3p67uwhzrPHt1O9WtwJ6dHff3MPmtQWRLlRtUYjYwFl6clMecy5Sw4wRJ6iArX3+gVvx9X3kdE0K26srSVyeZN8UmwNpeo696Qs0+ho3yVWqiQr2xGhXvhbyyR/RA6YkfH4WTCYTwI2/MJ12TLT2zyywylGyvgzOizh+3FKTztzv/CEU9ZFPFD2NvUCsQ+aWNuuZq5IQxVxtYWOcrnTULL7qK16Lfvi8U1dif9AlRbyFrqpOuIUf1btFP/uQW0kkyI3g9efyQ== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , , "Michael S . Tsirkin" Subject: [PATCH v9 34/37] hw/pci: Add helper to insert PCIe extended capability at a fixed offset Date: Mon, 26 Jan 2026 10:43:31 +0000 Message-ID: <20260126104342.253965-35-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF0000013D:EE_|SA1PR12MB999108:EE_ X-MS-Office365-Filtering-Correlation-Id: 2a66b02e-5d46-425c-101c-08de5cc8b853 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|82310400026|7416014|36860700013|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?FwgjNBhj6kNUjp5QkLDgVVIQpofNuoLR5E4Y2/Dtn+QNiOz8xtGmqjQ4AGUf?= =?us-ascii?Q?AgCFf9EQpKFQ0DEHiwTKWNIlb3tVsmuUd0yMFB22Nl8Qev+HaUIDegMy+zHC?= =?us-ascii?Q?1GruPKWr5rza9pTc6WpXdDxeC1TyscGKetStz7LFfnnVeEgV52ghvcGty+BN?= =?us-ascii?Q?a/4BkBFY8JagK2ZggpAd/stXMevbPBf4FXXqf7ilIaeNuQwFydkGrOITpXnU?= =?us-ascii?Q?MCoGmPu8JyhJoOGaMXXaSdIA6NMyNQD52jC+xSTKXYMzUwCXpquSCoPPC3yS?= =?us-ascii?Q?UjAOO40oujJnkMvT/iqPoLKpP8LFhbORahHSeuTEWWikvaAL+BVG0GmPBI0B?= =?us-ascii?Q?147xqQY5lEpp/fLxvj0bFJpHARycWOYt1mABUznC+kGl8nya0YoeeQtlEtBD?= =?us-ascii?Q?CEuKz/8uFkRt/upZs2Dyxh6nHq6mkfT0BwndKeSJXvYLUXrqfD0aDzMxwkvx?= =?us-ascii?Q?1m08RuS7DHUxVJhRd4+B00jCBz5bwPoWkxfdaaIZGdDaiHmUPXy/t7HP9bt2?= =?us-ascii?Q?PqxnNf6cnlcnEkkJSssizHoIFSvreHx/jUiD+P78qGmkrbWebkfakosjZfS5?= =?us-ascii?Q?oj2dND/Yt6YxbLJw+X0FIl2QFx7DoTy7m9tdpCW1CdlxNMaRfJIp08LYor4b?= =?us-ascii?Q?BEw+nwpHsreUtBk3iEkHeWRkWUvoELd7ENHGE0SF+t9Slx5/LAFOQd2njMWY?= =?us-ascii?Q?zbShIi+nf6rPrIQjyuOCu/mUIAhdpbOwuHL4m2eVjURW5r3t/JIM8e19i3ke?= =?us-ascii?Q?9MiqEMqEYzs/1Mng8IKogRs+uF7c4rGWu+n08tPNzO+2DjxdWfNvRDkOnVtK?= =?us-ascii?Q?RFVyfJ0+iSiOx4GXfR3ZKfYb5GYh8XGGNhFTiONA+Wv37f0NvUxYhmyUYr+A?= =?us-ascii?Q?pJvu5bUFTezRSCFE63AaWSjFrKfhvpYkhkWQVSFAqe7EkN8hTWiILSNdQgZJ?= =?us-ascii?Q?MrR2jU9O04Xs8k7D3Ljbh+J5yp6pQeWtMx9EYaMY9SkSnb/f095RKY0inncl?= =?us-ascii?Q?SGdPvttA7XJ7mqgNjhhbsusg3qHC596gKNguM2sb+Fie8wDNq8pMuPKeFY5Z?= =?us-ascii?Q?qUfZ5hmLSG8/u8C/RnJvdngQeDBdZ6Qt/nxqhW6Dlyq54cO5jqFF5q7kvF+V?= =?us-ascii?Q?2Kcqu0ti1Kp1Aq5P1/1SrWBO2/PIiZ5xC5jH2BfT19ZyAGXmYQEkABEJCdnG?= =?us-ascii?Q?k6s3WJfJFp8oKtToYeD6eiPB5s2dcebCrPwqyv7KkKQUWOan2WZa74hBJity?= =?us-ascii?Q?ADrETpPoDP9UTenazuU9SS/yvh5ne6ttPWhAZvE5u2VeUqRjKT/d0HDC5fUo?= =?us-ascii?Q?MOlm2vCLYaZ/Saxw6l0eIvPXGQ0/aKxvwljqZHQ7BW0xtASm6kmA9ke8Mq+L?= =?us-ascii?Q?CKf15teR6VfNc0s5X9N6I3moj2Emsb/kQAz53B3enKo1S0W/yuPjiINBH3oA?= =?us-ascii?Q?Kak3e7FknXyGBin+77e5KADs41PVPpFxANOgIc2TErjetxS/eIvha+Q+O/Ep?= =?us-ascii?Q?J1/qPyfLhQu/s1vYNMK30F/zWv+lk7YJmOfEatzku3nuP79CizJDCx9o2/x+?= =?us-ascii?Q?ej3FVfataWhVXdXSmuQBQrPKldLnf02Ihhv/17bg+iJaGkolq52CiHz88aPa?= =?us-ascii?Q?zXbBbnIeQ313ez1uEKFxlQMDO5qxLixmPg+rCjpZvzXJjpF5QMGwrXxqRuXt?= =?us-ascii?Q?s0QUJQ=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(82310400026)(7416014)(36860700013)(376014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:50:28.7247 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 2a66b02e-5d46-425c-101c-08de5cc8b853 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF0000013D.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR12MB999108 Received-SPF: permerror client-ip=2a01:111:f403:c10c::1; envelope-from=skolothumtho@nvidia.com; helo=SA9PR02CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424660269154100 Content-Type: text/plain; charset="utf-8" Add pcie_insert_capability(), a helper to insert a PCIe extended capability into an existing extended capability list at a caller specified offset. Unlike pcie_add_capability(), which always appends a capability to the end of the list, this helper preserves the existing list ordering while allowing insertion at an arbitrary offset. The helper only validates that the insertion does not overwrite an existing PCIe extended capability header, since corrupting a header would break the extended capability linked list. Validation of overlaps with other configuration space registers or capability-specific register blocks is left to the caller. Reviewed-by: Michael S. Tsirkin Reviewed-by: Eric Auger Tested-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: Jonathan Cameron Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- hw/pci/pcie.c | 69 +++++++++++++++++++++++++++++++++++++++++++ include/hw/pci/pcie.h | 2 ++ 2 files changed, 71 insertions(+) diff --git a/hw/pci/pcie.c b/hw/pci/pcie.c index b302de6419..aa9024e532 100644 --- a/hw/pci/pcie.c +++ b/hw/pci/pcie.c @@ -1050,6 +1050,75 @@ static void pcie_ext_cap_set_next(PCIDevice *dev, ui= nt16_t pos, uint16_t next) pci_set_long(dev->config + pos, header); } =20 +/* + * Insert a PCIe extended capability at a given offset. + * + * This helper only validates that the insertion does not overwrite an + * existing PCIe extended capability header, as corrupting a header would + * break the extended capability linked list. + * + * The caller must ensure that (offset, size) does not overlap with other + * registers or capability-specific register blocks. Overlaps with + * capability-specific registers are not checked and are considered a + * user-controlled override. + * + * Note: Best effort helper. The PCIe spec does not require extended + * capabilities to be ordered, but most devices use a forward-linked list. + * Devices that do not consistently use a forward-linked list may cause + * insertion to fail. + */ +bool pcie_insert_capability(PCIDevice *dev, uint16_t cap_id, uint8_t cap_v= er, + uint16_t offset, uint16_t size) +{ + uint16_t pos =3D PCI_CONFIG_SPACE_SIZE, prev =3D 0; + uint32_t header; + + assert(pci_is_express(dev)); + + if (!QEMU_IS_ALIGNED(offset, PCI_EXT_CAP_ALIGN) || + size < 8 || + offset < PCI_CONFIG_SPACE_SIZE || + offset >=3D PCIE_CONFIG_SPACE_SIZE || + offset + size > PCIE_CONFIG_SPACE_SIZE) { + return false; + } + + header =3D pci_get_long(dev->config + pos); + if (!header) { + /* No extended capability present, insertion must be at the ECAP h= ead */ + if (offset !=3D pos) { + return false; + } + pci_set_long(dev->config + pos, PCI_EXT_CAP(cap_id, cap_ver, 0)); + goto out; + } + + while (header && pos && offset >=3D pos) { + uint16_t next =3D PCI_EXT_CAP_NEXT(header); + + /* Reject insertion inside an existing ECAP header (4 bytes) */ + if (offset < pos + PCI_EXT_CAP_ALIGN) { + return false; + } + + prev =3D pos; + pos =3D next; + header =3D pos ? pci_get_long(dev->config + pos) : 0; + } + + pci_set_long(dev->config + offset, PCI_EXT_CAP(cap_id, cap_ver, pos)); + if (prev) { + pcie_ext_cap_set_next(dev, prev, offset); + } + +out: + /* Make capability read-only by default */ + memset(dev->wmask + offset, 0, size); + memset(dev->w1cmask + offset, 0, size); + /* Check capability by default */ + memset(dev->cmask + offset, 0xFF, size); + return true; +} /* * Caller must supply valid (offset, size) such that the range wouldn't * overlap with other capability or other registers. diff --git a/include/hw/pci/pcie.h b/include/hw/pci/pcie.h index c880ae1e04..d68bfa6257 100644 --- a/include/hw/pci/pcie.h +++ b/include/hw/pci/pcie.h @@ -133,6 +133,8 @@ uint16_t pcie_find_capability(PCIDevice *dev, uint16_t = cap_id); void pcie_add_capability(PCIDevice *dev, uint16_t cap_id, uint8_t cap_ver, uint16_t offset, uint16_t size); +bool pcie_insert_capability(PCIDevice *dev, uint16_t cap_id, uint8_t cap_v= er, + uint16_t offset, uint16_t size); void pcie_sync_bridge_lnk(PCIDevice *dev); =20 void pcie_acs_init(PCIDevice *dev, uint16_t offset); --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424662; cv=pass; d=zohomail.com; s=zohoarc; b=gmXdpKQLUdvsUjO2EmNjJxAl0CiBz7SKtm3phDi9KZqetnu9MVmRVHpwzmP6MGRefB9LPliDmBd2COhoGnux7nc9FCeS+a5MJBoX1AkrsbG1tJrURKk+4DipYt6irIwUJUjwfr4WN1mZYgYThVdYPCjTMsQWCmWQOoEOrfm+vtE= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424662; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=XPEGxV12DxrdTNPvl66io414JLC2IDqCvf6IA/LHqSA=; b=Y/Beom4fBJ5V6vm3tkD9t0gUpjkv2UZxR8qBvCQgRuZRRJ9bojONTWvrJCVHloAV8NMlfcx8gPWxuOTRB5HPBdEVguZlQxI1x25BE3u6KdIv8Ry++TJzsVaixnCxtv/f+4nEwG2iyYACmWn2X+RATdlxC/P4A915x8swC6/zvTw= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424662908688.6768390648161; Mon, 26 Jan 2026 02:51:02 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkKBM-0003qr-FK; Mon, 26 Jan 2026 05:50:56 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKBA-0002bI-Gz; Mon, 26 Jan 2026 05:50:46 -0500 Received: from mail-centralusazlp170110009.outbound.protection.outlook.com ([2a01:111:f403:c111::9] helo=DM5PR21CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKB6-0006As-Sy; Mon, 26 Jan 2026 05:50:43 -0500 Received: from CH0PR04CA0067.namprd04.prod.outlook.com (2603:10b6:610:74::12) by BL1PR12MB5995.namprd12.prod.outlook.com (2603:10b6:208:39b::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:50:35 +0000 Received: from CH2PEPF00000140.namprd02.prod.outlook.com (2603:10b6:610:74:cafe::3b) by CH0PR04CA0067.outlook.office365.com (2603:10b6:610:74::12) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.16 via Frontend Transport; Mon, 26 Jan 2026 10:50:37 +0000 Received: from mail.nvidia.com (216.228.117.161) by CH2PEPF00000140.mail.protection.outlook.com (10.167.244.72) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:50:34 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:50:20 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:50:15 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=FFbg86qfuO556JzhevQN97Edppj4b5LIr222oD56cnSNxU0lfJVmjZkTQKieAhyTkehFBJokNXNl7MzZfjQq7w47fbYcko43xlLGTnKft8k3EaNKJ7tXKfg2Dk4uPLR7iUI0kbCLa+m5o6+jayB4OyTZ4dTWHm8xqMLcRTfdbubwo2L0ISL+/OmJwrYRnRFqTgW2u92DXuKJyXzBGxQMDWqGXYz6vS+/SOPPHMu6kBLZYNBcP9Hhk5WiVnGJwEXd3elbzcb3ZX3zZk6vqh75zCWA9m0Zax2hapDVgmCb5LAg9elOmL1YYnRjy4NNjsyJ6r589Qk77Ikgy5tXtBWN7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XPEGxV12DxrdTNPvl66io414JLC2IDqCvf6IA/LHqSA=; b=YsnF3Snqiq2qolt6gXMwIZY+R2RxKbFdE5GS1ZMw336Gksk3NQdnPpQThbgXN5nAHN0NoshPBFQa1tWszhysXeGyHoVvYF3PGZ51uupWPCLRVRFgw+9IhkfOdFJK/iUGWfMC1S7mNnlswWxfc/bj6+RxOkAnSZbtkQlOVKndRlpXY9KjaZDSrGPAfzO8V3gV6B7opXaXDrd+klF4KeYez34n+g22onliLB+6WYUj9iLbzhZjpuzkcy24TwWwl++hE0nAE2rgRDmseZlAxkp3bFw3HWuJnoYmmmGOIVebLbpXu2Iej716UFQ9cGwotrhmyM0pkN6nmtZPzpm51Jen+Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XPEGxV12DxrdTNPvl66io414JLC2IDqCvf6IA/LHqSA=; b=HHZZxUnat2WxrfFbAiOOagPkicrqwTinl5tixxp5F1qM6H3zBfuivMKAi3rVxOs6tnCQVe6dWUDXQBFjU1yGNUnap25qjIfGp4UaRBZRNCSgFEZmdKzJBfHuOOSHsT2q5UoBg/vBs0ZheO36zrOwZrH/f0cZ+MuvaV3dm2+y+otEqv2RhvIvmaUvKSaMRiy5Zst66tW/lz3Y/czz+i7rg2gcL4ySPI8GIy7Kt2dTtimvZYgig1IiuhsGoe7pVBoRGyYWG74IM2LCLgVXn42l0WhCMAYG9kQfx62/rYdGJPn0Xi7TVw2tfHkr/q3TIm60/3oSwfZ2sLVwDJhovxWLWg== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , , "Michael S . Tsirkin" Subject: [PATCH v9 35/37] hw/pci: Factor out common PASID capability initialization Date: Mon, 26 Jan 2026 10:43:32 +0000 Message-ID: <20260126104342.253965-36-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF00000140:EE_|BL1PR12MB5995:EE_ X-MS-Office365-Filtering-Correlation-Id: e6938dbb-dff6-42cc-5e0c-08de5cc8bbf6 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|1800799024|7416014|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?Sg4IiqNafqAwWlrtuMlwHzmi6Cyv2MUB+NLN0kNsYyIX49JzR0QmcllojQYb?= =?us-ascii?Q?4yDU6khnzIJhH1fAbdKfIQz1TdRckXtNs+cjhvCvHko5vdf2zK6BiaS0OzXq?= =?us-ascii?Q?eUSQTlXVupzMPmZLtmt21bE0qpLAVHLH2vyh6W2KgKrIr0yxUPJ6M2gG6D4C?= =?us-ascii?Q?nl4tkoQQxeqBAYz3t/tQwOL8Fhk9LxRjBhap4+91Yt2r/+CP5nYm6BAHa2q4?= =?us-ascii?Q?CWeTSdn6WvyIRWKGHh7SSGkcD/k1QSFv9O0Xl8LIg24FYsrmUAZmuUB5g1+C?= =?us-ascii?Q?FHXCDkLdgFvEpbC+qL/oSCktu+zql7trxwOfkImi2pS2r8lbTmYAAuExU0rr?= =?us-ascii?Q?w87zbocP3B0ivjljlKffW25G7BtaI7qG7jFgigAJ1pqD5dTSeoKZa5aWME/R?= =?us-ascii?Q?cHcgwqezt8eTWcmANRk6S3J4HDq/trxQLnPMwJqeDYctyEscE1nUdNihUNNW?= =?us-ascii?Q?nvdMdWMVESY2YMQtPO58Of3juK/FnqO5fASL62yItV25i1ZMwVO2mUCqWesH?= =?us-ascii?Q?M0YXAZBUOPmC4qXfBgwTDyxoyhdJtBFRDdT06TnDlojiEvQESIzaoCD2u+hI?= =?us-ascii?Q?mJtsbXT5WwWkU/hWPpprU+P7fVYMBOlfSmueyeir7gsjEmqt3+p/4sPKAhpA?= =?us-ascii?Q?/Ru/v/1hnMmO5FHXh+HolEcUP5ukZJp8RAasMs2kbx7Sd6EPZuxG/UDVsgw7?= =?us-ascii?Q?QXlLjRF4Hj7YG9xidbd/93OtCYX62dPEAttPVJq99azcsKPX2Z4xzbZ6FLIr?= =?us-ascii?Q?yCluV68Zh3UH0IP8q6ZSfjE+Je9SOXEM1bMmUW3oZQlz5viWsKSIeyxuruuw?= =?us-ascii?Q?lpE0uPC/IRD4Iz1kzYfCmqutFChALyf42Cj7GMY+lQ1dyAO/omBxdSuQ1bAk?= =?us-ascii?Q?/n12FlhqM3aWNjDCPL2QoMAM8uYkZSiK5ZmBGNXs5AoRG4ygYxLoGZuVwLLQ?= =?us-ascii?Q?NQB1hREwqEQMS51XMWAIUljYsjq1eTs490u8xzGu1v+gumBy+TB0e1+hC0vq?= =?us-ascii?Q?F35DoZtmLnp3dwib82G0oEg3Si8Kt2EjFqaz7UwwTLNenJ40le3gTd8mP/gC?= =?us-ascii?Q?zm9uhxWnygynTx5DmswwCI5JwcN+ISwMxvT2ab2YxCzzJcRk9T7a7r8xy8wH?= =?us-ascii?Q?Z8X/AU7My+XbEZh/o0ePTmZ1pjV2Ymn6RaogZehw6Utcdnekmu72NpGHsb0g?= =?us-ascii?Q?Z77+eu9hUkDvzOkZsOUFr3azdvX/ycndsgHA4hfKN5yRF4H/1VqoVf7ghe2a?= =?us-ascii?Q?b80gKjTrFwTy6gN5C7ioE50ibWcjzneTkARSsNNRkhrAqczV4DbGTOBBJle0?= =?us-ascii?Q?kY7ck+XpimfFz+SC5vNyb2cTEC42CEfUvgNWPKp9L/lN3HdWn99laGpRtbEd?= =?us-ascii?Q?n7dfLqO7E5k35bDzX0Yu2fVsrAA1Mz+CDE9H1bE5l8bC/RbiXoedykk1RcuJ?= =?us-ascii?Q?mIZlVzBjXJ6GgyeCZkAHSjBC263Al0CGFZImLfsCRRFBQ1EQk2J26j+ljRS4?= =?us-ascii?Q?TkCotAdaWix3od8ZdGfvgxyc+uMSqV25lheMDPAN+qilclgxtYBP1GNXkFGU?= =?us-ascii?Q?MsAR6Ni7rvNglz4izMbHWnNE2gOMycDelLUUKDr0mNCxQ0RSiuVqyeJC0FVo?= =?us-ascii?Q?HkC+Y9TuvAHSmIK1VKUFl9rvsyD6csNTrxJ/c/QIbAaRGeOtNBGRzdyersJL?= =?us-ascii?Q?dBnktw=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(376014)(1800799024)(7416014)(82310400026)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:50:34.8317 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: e6938dbb-dff6-42cc-5e0c-08de5cc8bbf6 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF00000140.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR12MB5995 Received-SPF: permerror client-ip=2a01:111:f403:c111::9; envelope-from=skolothumtho@nvidia.com; helo=DM5PR21CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424664437158500 Content-Type: text/plain; charset="utf-8" Refactor PCIe PASID capability initialization by moving the common register init into a new helper, pcie_pasid_common_init(). Subsequent patch to synthesize a vPASID will make use of this helper. No functional change intended. Cc: Michael S. Tsirkin Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Reviewed-by: Michael S. Tsirkin Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- hw/pci/pcie.c | 19 ++++++++++++------- include/hw/pci/pcie.h | 2 ++ 2 files changed, 14 insertions(+), 7 deletions(-) diff --git a/hw/pci/pcie.c b/hw/pci/pcie.c index aa9024e532..c481c16c0f 100644 --- a/hw/pci/pcie.c +++ b/hw/pci/pcie.c @@ -1284,18 +1284,13 @@ void pcie_acs_reset(PCIDevice *dev) } } =20 -/* PASID */ -void pcie_pasid_init(PCIDevice *dev, uint16_t offset, uint8_t pasid_width, - bool exec_perm, bool priv_mod) +void pcie_pasid_common_init(PCIDevice *dev, uint16_t offset, + uint8_t pasid_width, bool exec_perm, bool priv= _mod) { static const uint16_t control_reg_rw_mask =3D 0x07; uint16_t capability_reg; =20 assert(pasid_width <=3D PCI_EXT_CAP_PASID_MAX_WIDTH); - - pcie_add_capability(dev, PCI_EXT_CAP_ID_PASID, PCI_PASID_VER, offset, - PCI_EXT_CAP_PASID_SIZEOF); - capability_reg =3D ((uint16_t)pasid_width) << PCI_PASID_CAP_WIDTH_SHIF= T; capability_reg |=3D exec_perm ? PCI_PASID_CAP_EXEC : 0; capability_reg |=3D priv_mod ? PCI_PASID_CAP_PRIV : 0; @@ -1307,6 +1302,16 @@ void pcie_pasid_init(PCIDevice *dev, uint16_t offset= , uint8_t pasid_width, pci_set_word(dev->wmask + offset + PCI_PASID_CTRL, control_reg_rw_mask= ); =20 dev->exp.pasid_cap =3D offset; + +} + +/* PASID */ +void pcie_pasid_init(PCIDevice *dev, uint16_t offset, uint8_t pasid_width, + bool exec_perm, bool priv_mod) +{ + pcie_add_capability(dev, PCI_EXT_CAP_ID_PASID, PCI_PASID_VER, offset, + PCI_EXT_CAP_PASID_SIZEOF); + pcie_pasid_common_init(dev, offset, pasid_width, exec_perm, priv_mod); } =20 /* PRI */ diff --git a/include/hw/pci/pcie.h b/include/hw/pci/pcie.h index d68bfa6257..fc02aeb169 100644 --- a/include/hw/pci/pcie.h +++ b/include/hw/pci/pcie.h @@ -155,6 +155,8 @@ void pcie_cap_slot_unplug_cb(HotplugHandler *hotplug_de= v, DeviceState *dev, void pcie_cap_slot_unplug_request_cb(HotplugHandler *hotplug_dev, DeviceState *dev, Error **errp); =20 +void pcie_pasid_common_init(PCIDevice *dev, uint16_t offset, + uint8_t pasid_width, bool exec_perm, bool priv= _mod); void pcie_pasid_init(PCIDevice *dev, uint16_t offset, uint8_t pasid_width, bool exec_perm, bool priv_mod); void pcie_pri_init(PCIDevice *dev, uint16_t offset, uint32_t outstanding_p= r_cap, --=20 2.43.0 From nobody Sat Feb 7 05:53:48 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424711; cv=pass; d=zohomail.com; s=zohoarc; b=O/UbmaD60o5H6vMAuJ9aqKYjOBI3n674dQPJtIZ+vQ2FB8yQZwsH6fv3iBK15Se0OisgUqI9LTKzn3pyCh5QhUSQsXIvq//jU+J0IvIIgHtByXzSd9CBWPtXIAS5VbV9lcYJ0tlX9NWC/pPGvijAQZ8RfMHy6+7bIBTHCXbYR9U= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424711; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=DwWgCfTF0zXec4V3TH3IuZo8wthPdmcpjsMZjo1Rl2M=; b=JRVE76ZbRYGSaBDoENUMTcfNCTVr2vzoOt+cELAK1JYgp0c2onX0zeJBdKo1MR1ci0/gStslRC47LoD3qpfEU6zafEY+BW9dm1fkWKSN+lNtBMJkDjEjfXiPJ2uE6sxEyG3VgmhLfa1IQQiTTCfdVhELccN8U2lAjNljKWA8+Bw= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1769424711750186.40786412087948; Mon, 26 Jan 2026 02:51:51 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkKBK-0003av-8i; Mon, 26 Jan 2026 05:50:54 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKBF-00034D-Qf; Mon, 26 Jan 2026 05:50:49 -0500 Received: from mail-westusazlp170120002.outbound.protection.outlook.com ([2a01:111:f403:c001::2] helo=SJ2PR03CU001.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKBD-0006CY-Jl; Mon, 26 Jan 2026 05:50:49 -0500 Received: from CH2PR05CA0013.namprd05.prod.outlook.com (2603:10b6:610::26) by IA0PPF4D923B935.namprd12.prod.outlook.com (2603:10b6:20f:fc04::bcd) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.10; Mon, 26 Jan 2026 10:50:41 +0000 Received: from CH2PEPF0000013C.namprd02.prod.outlook.com (2603:10b6:610:0:cafe::86) by CH2PR05CA0013.outlook.office365.com (2603:10b6:610::26) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.6 via Frontend Transport; Mon, 26 Jan 2026 10:50:44 +0000 Received: from mail.nvidia.com (216.228.117.161) by CH2PEPF0000013C.mail.protection.outlook.com (10.167.244.73) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:50:41 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:50:26 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:50:22 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=PO+BcmIiq4PQ4KDbOvmQt5X9UrsSWujSO1AmPxGVMXLneHnuuUz2cTC+grGCrTqPE8gw1GrUDTAAKmQb561lZ5YLkQE/KYmTes8CljPGPwB/y61FqwdNBBgbVRrjnHWrfsFp8eycPxXeIydymWsr/30Hev3sShzZc3TgbxzEY9IRLgzbGWhl80wA7QMVKivp0Mt+r6RLfzz4t27mzrTKuayPXTyA/KGVvRfBgqkgwJVHifjyMavEWc8DFE8iJZvrhEDIlbD5J+WdXEAKm+kWdVLQcxsmwKR0+Xa5sHIFjr4RIJVVDb3yv/9ImK89I1/OK2y/vqxTZnwf2kd/hMErTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DwWgCfTF0zXec4V3TH3IuZo8wthPdmcpjsMZjo1Rl2M=; b=O4KLU0iJu4dcyHf/G7DrfL+noWug9fIJ5qq4nA+yVMKzDHE4ddg4By6BcjPVYa4tAGutDLpfZTIgdRqYxuiUEakda9JZJlNqAnk+DQfZ/LJ6GNihcv5ZyCFIvQtsFkkty4t9CGWqZY2POGSCcJdRIoOwnP686Qb0zYQD8/ib+23s/TzWP6v8ufeB6TgGT6PVqT79/SiX3jYnUqyxdgMLb7TO9vohQ/pf0VKViypUgdCYDGuwdAEN4Tq1ptOf0TKiBOih2Q0nL1/gGQ4K3RInlTCzUMuRHJ7Ffdz3WjbNlBmRn0w057vSueiQies/Kix+QBB4rNXrKj5a+mR/3AEW5Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DwWgCfTF0zXec4V3TH3IuZo8wthPdmcpjsMZjo1Rl2M=; b=OyB+mV3d+6aPpnmcdxtLNNo7Pasr7/QJhjYGSLCprzkvf7x1yjTBLcKybfYkLmYJbyPY4/fqORK6nNlgHGWLU+y6FMYh2Yd5GZmxl7LxMwnf4poaQtFhrRJTZnJUsPD0t8oVjRtdbPmfOibiSq6Ye0/WxY/VvWagcWGUwJ0llFqDoW07GamV8g0wq8A+FoNDeAqQiqzPHs8fFml2CYYR3Qg1OuwE5Q2Z99PCiCZqbc2Qp/zoxJEm+7TUEWIWH7rQTveHqbUDa5drDRtGy3Rz9Ap9F6/qStf/T4J+Zs1BA4hwTp0pnFDIm6CCH82Voxk1k5qHrIiix2tvETRqt7zkXQ== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 36/37] hw/vfio/pci: Synthesize PASID capability for vfio-pci devices Date: Mon, 26 Jan 2026 10:43:33 +0000 Message-ID: <20260126104342.253965-37-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF0000013C:EE_|IA0PPF4D923B935:EE_ X-MS-Office365-Filtering-Correlation-Id: 39c9afa7-4b85-4886-57af-08de5cc8c015 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|36860700013|7416014|82310400026|376014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?OWo2ajdMY2ZYd1QyV2FyNTdMY2Nuam9kdFJlOWwxOEx5Wnh2U0VIZE8rWjR4?= =?utf-8?B?Z1FyUThkWG43MExmNTZoY0JpWnF1WmhDY2E0dWJKa3pkdTRhUml1ZkkxMUdi?= =?utf-8?B?TXp1UTlVNnF3SmYvWkNtZmxPR3RWRkVBc2ZKUi8yN2ZnZ1BVN0xONTZiL1N3?= =?utf-8?B?RFM1NjQ2aGpTaVVra0hSdzVjTERSTWNkZGpNUEYwSi9XN0RmcjJlWGU0WkVL?= =?utf-8?B?QXlzQ0Z3TEFDei9Namd5UENoMk9vN2E2R2RObGVycExlUzVCN2JianBaTWJF?= =?utf-8?B?VU5ycTVhc2llRFpVanFkUTY4NjUwZnJUOE1wYndQYzJIZE1Yc01CdnVtRmx1?= =?utf-8?B?M1cybE16SXFiMzhjTkVLSWdGRUFVMVR6T3dvdDdtekdLWXhBRFg5Ym9RenJa?= =?utf-8?B?OGVEL2Y1N2dDS1BCZ3p5TjBwR0RwbndxSVZJUDZOOHJqN0lLZE4wMjdYTUky?= =?utf-8?B?bkhWUWNzRTFkSmwzdGVKTlhvK0Y5NkRndmhGdEVMZC8yMTN6NUdTZTkrS3Bj?= =?utf-8?B?UkRSSERlS3NhSXA2cU91akJnaFVjbzJKRU1hbTdjMjFKSENzZ0gyUlN5QUhr?= =?utf-8?B?M2FRd3c0RnJ1ckUvMFJoRHU5VmFzRmxhWERvSDhxRW1TMjE1NGs1bFRqZHBX?= =?utf-8?B?eU1PNWV5M1F1NWNIcVNpSG5kRWg0clVtNkMwYVdxampPcFZabzByNGdFNXdR?= =?utf-8?B?U2tTWllweDRSRDRQK0p2MXdzeWVKcXA4TmluSDJyUE9HZFZRMER0S1FkaHc5?= =?utf-8?B?SXF0M3NoSHNaZ3laeVM0cmV0ZjJlSHBaM21tNTBmLytORjcyQ2NNa2dNdFhS?= =?utf-8?B?WG5JMU11VktLdThON2ZFT3h5NkRPSm5NZVU0NGhNSWpMSzVoSy9NUzRHejlC?= =?utf-8?B?NXBXOS9IL2tQY2VwcUdic3dqVkZoRVhMajV6N0lEMVRYcm9SV2I0ZysyeFho?= =?utf-8?B?SW85Y0p1aG5YaUtwRWhzSCtVckdZK0pBSkd4ZUY2NkF2cCszelF0Z20vTndr?= =?utf-8?B?b3lYNm4rNkV4dGtJQmNLcXdOVXZIMExmZXA2WHNtSW16clJ5Wko4TWtXd0VY?= =?utf-8?B?Z084RlV6S1dQMmRXOVlPSUREcWkvMEZrdDdUbThiSnUrWDhGVDRpamc2Q3RY?= =?utf-8?B?TGJaUkNLN2VhVEJncktsRStjSlExVkRXM2VkazVvd21NNVE4Qzh2Wk91SVhT?= =?utf-8?B?aHFTWW55WjZNWlFzVldQZTlzQi82OXZQVDV1eVdodUovanBsVWxNTk1LQmYr?= =?utf-8?B?Ymh5Y3JOVGFXNEFub25kV2xWWXpOdEQ5UHorZytyRUdQNGt5N0xNQ3lRSTha?= =?utf-8?B?SmF1Z2FnNktIbld5bzFUQ013eDRYN05UODVZR0lJY3lsOXRvTFJwdXgwSEwz?= =?utf-8?B?a2ZwQWM5UzBmTnZqdWJzWVJVVGJKNy93NEtBTjZENDRlbXhJaEJlYWd5U3Jl?= =?utf-8?B?K1VtMzRNa2MwZUNDYUppZVdNaGlJamwvcFF1czFYWGV6ZHJmVUJCWXUzVnYw?= =?utf-8?B?blprMHZrT05SM01waWNCd0t6QWtLdHBYaklEcXp6NEpBaGo0a2pHMG5JbE15?= =?utf-8?B?Sm1ycmJ5MWllb3Y2bWlVRk5VWXg0NTlNako3eEtTaHo0UWJGaFN4RGFZVzNp?= =?utf-8?B?cFplbEhnVUlTNjM3YkVqcW0xdGFsNGoySVVaMkU1ZUNFdnAzYUZ4MCt3WjFl?= =?utf-8?B?eXlsNDcwbVRHT1poaXVHNk9STmxtNDhDR0Z0c2FwVVFodXE3R1MzN09zRlpP?= =?utf-8?B?Uzg1ZkZEMFRjZDF5bittczNsZ2kxM0R4Ulcvb1pSaVJNKzFKZ0tvREM3UEFC?= =?utf-8?B?aUhMNFNFNGRveUFvMmdCZDhOVzlZZS9GSnpNS0xyZHczR1ErbGFVSXgwdTV5?= =?utf-8?B?YzdkN0FUblBFV3RCbDJ2SjNWbDdLUkZENm5WZFZkQVlWUk1NVm9CbVd3MSt4?= =?utf-8?B?bG9vRmdrblB6akl3NUdobzYwUmtGbEpqQnJEL0RvWWNBci9YYTdnUnZSa1Uv?= =?utf-8?B?SHcvbk15ZnZiQ1d2WUpFR2xnN1hIb2NUcWdsaEd3NVpMVzhzaUhocS9xbGN5?= =?utf-8?B?bTRmaCsyMVF3SVpqS0RmWTFvbFJkKzMvUWxPYWhZV3lGYU85VFBhQWVyUytU?= =?utf-8?B?VHh5dzFaT0tQb0Zkd0JwcXM4R0RpYzF1eitOazZtdVZkRURSbkIyKzF6K3Fu?= =?utf-8?B?U0RGM2FORmdNYnIvYUkrTWZQT3g3RUt1bjlQMktLRkpzcUpEUzd0cFZLSWlP?= =?utf-8?B?YSsyODZpMVZJUG94eHlnOGFkR3JBPT0=?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(36860700013)(7416014)(82310400026)(376014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:50:41.7501 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 39c9afa7-4b85-4886-57af-08de5cc8c015 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF0000013C.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PPF4D923B935 Received-SPF: permerror client-ip=2a01:111:f403:c001::2; envelope-from=skolothumtho@nvidia.com; helo=SJ2PR03CU001.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424712639158500 Add support for synthesizing a PCIe PASID extended capability for vfio-pci devices when PASID is enabled via a vIOMMU and supported by the host IOMMU backend. PASID capability parameters are retrieved via IOMMUFD APIs and the capability is inserted into the PCIe extended capability list using the insertion helper. A new x-vpasid-cap-offset property allows explicit control over the placement; by default the capability is placed at the end of the PCIe extended configuration space. If the kernel does not expose PASID information or insertion fails, the device continues without PASID support. Reviewed-by: Jonathan Cameron Tested-by: Eric Auger Tested-by: Zhangfei Gao Reviewed-by: C=C3=A9dric Le Goater Signed-off-by: Shameer Kolothum Reviewed-by: Yi Liu --- hw/vfio/pci.c | 75 +++++++++++++++++++++++++++++++++++++++++ hw/vfio/pci.h | 1 + hw/vfio/trace-events | 1 + include/hw/core/iommu.h | 1 + 4 files changed, 78 insertions(+) diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c index c734472721..36d8fbe872 100644 --- a/hw/vfio/pci.c +++ b/hw/vfio/pci.c @@ -24,6 +24,7 @@ #include =20 #include "hw/core/hw-error.h" +#include "hw/core/iommu.h" #include "hw/pci/msi.h" #include "hw/pci/msix.h" #include "hw/pci/pci_bridge.h" @@ -2498,9 +2499,62 @@ static int vfio_setup_rebar_ecap(VFIOPCIDevice *vdev= , uint16_t pos) return 0; } =20 +/* + * Try to retrieve PASID capability information via IOMMUFD APIs and, + * if supported, synthesize a PASID PCIe extended capability for the + * VFIO device. + * + * Use user-specified PASID capability offset if provided, otherwise + * place it at the end of the PCIe extended configuration space. + */ +static bool vfio_pci_synthesize_pasid_cap(VFIOPCIDevice *vdev, Error **err= p) +{ + HostIOMMUDevice *hiod =3D vdev->vbasedev.hiod; + HostIOMMUDeviceClass *hiodc; + PasidInfo pasid_info; + PCIDevice *pdev =3D PCI_DEVICE(vdev); + uint16_t pasid_offset; + + if (!hiod) { + return true; + } + + hiodc =3D HOST_IOMMU_DEVICE_GET_CLASS(hiod); + if (!hiodc || !hiodc->get_pasid_info || + !hiodc->get_pasid_info(hiod, &pasid_info) || + !(pci_device_get_viommu_flags(pdev) & VIOMMU_FLAG_PASID_SUPPORTED)= ) { + return true; + } + + /* Use user-specified offset if set, otherwise place PASID at the end.= */ + if (vdev->vpasid_cap_offset) { + pasid_offset =3D vdev->vpasid_cap_offset; + } else { + pasid_offset =3D PCIE_CONFIG_SPACE_SIZE - PCI_EXT_CAP_PASID_SIZEOF; + } + + if (!pcie_insert_capability(pdev, PCI_EXT_CAP_ID_PASID, PCI_PASID_VER, + pasid_offset, PCI_EXT_CAP_PASID_SIZEOF)) { + error_setg(errp, "vfio: Placing PASID capability at offset 0x%x fa= iled", + pasid_offset); + return false; + } + trace_vfio_pci_synthesize_pasid_cap(vdev->vbasedev.name, pasid_offset); + + pcie_pasid_common_init(pdev, pasid_offset, pasid_info.max_pasid_log2, + pasid_info.exec_perm, pasid_info.priv_mod); + + /* PASID capability is fully emulated by QEMU */ + memset(vdev->emulated_config_bits + pdev->exp.pasid_cap, 0xff, + PCI_EXT_CAP_PASID_SIZEOF); + return true; +} + static void vfio_add_ext_cap(VFIOPCIDevice *vdev) { PCIDevice *pdev =3D PCI_DEVICE(vdev); + bool pasid_cap_added =3D false; + Error *err =3D NULL; uint32_t header; uint16_t cap_id, next, size; uint8_t cap_ver; @@ -2578,12 +2632,24 @@ static void vfio_add_ext_cap(VFIOPCIDevice *vdev) pcie_add_capability(pdev, cap_id, cap_ver, next, size); } break; + /* + * VFIO kernel does not expose the PASID CAP today. We may synthes= ize + * one later through IOMMUFD APIs. If VFIO ever starts exposing it, + * record its presence here so we do not create a duplicate CAP. + */ + case PCI_EXT_CAP_ID_PASID: + pasid_cap_added =3D true; + /* fallthrough */ default: pcie_add_capability(pdev, cap_id, cap_ver, next, size); } =20 } =20 + if (!pasid_cap_added && !vfio_pci_synthesize_pasid_cap(vdev, &err)) { + error_report_err(err); + } + /* Cleanup chain head ID if necessary */ if (pci_get_word(pdev->config + PCI_CONFIG_SPACE_SIZE) =3D=3D 0xFFFF) { pci_set_word(pdev->config + PCI_CONFIG_SPACE_SIZE, 0); @@ -3756,6 +3822,8 @@ static const Property vfio_pci_properties[] =3D { TYPE_IOMMUFD_BACKEND, IOMMUFDBackend *), #endif DEFINE_PROP_BOOL("skip-vsc-check", VFIOPCIDevice, skip_vsc_check, true= ), + DEFINE_PROP_UINT16("x-vpasid-cap-offset", VFIOPCIDevice, + vpasid_cap_offset, 0), }; =20 #ifdef CONFIG_IOMMUFD @@ -3913,6 +3981,13 @@ static void vfio_pci_class_init(ObjectClass *klass, = const void *data) "destination when doing live " "migration of device state via " "multifd channels"); + object_class_property_set_description(klass, /* 11.0 */ + "x-vpasid-cap-offset", + "PCIe extended configuration spa= ce offset at which to place a " + "synthetic PASID extended capabi= lity when PASID is enabled via " + "a vIOMMU. A value of 0 (default= ) places the capability at the " + "end of the extended configurati= on space. The offset must be " + "4-byte aligned and within the P= CIe extended configuration space"); } =20 static const TypeInfo vfio_pci_info =3D { diff --git a/hw/vfio/pci.h b/hw/vfio/pci.h index 0f78cf9cdb..d6495d7f29 100644 --- a/hw/vfio/pci.h +++ b/hw/vfio/pci.h @@ -187,6 +187,7 @@ struct VFIOPCIDevice { bool defer_kvm_irq_routing; bool clear_parent_atomics_on_exit; bool skip_vsc_check; + uint16_t vpasid_cap_offset; VFIODisplay *dpy; Notifier irqchip_change_notifier; VFIOPCICPR cpr; diff --git a/hw/vfio/trace-events b/hw/vfio/trace-events index 180e3d526b..b48c4abe7a 100644 --- a/hw/vfio/trace-events +++ b/hw/vfio/trace-events @@ -40,6 +40,7 @@ vfio_pci_hot_reset_result(const char *name, const char *r= esult) "%s hot reset: % vfio_pci_populate_device_config(const char *name, unsigned long size, unsi= gned long offset, unsigned long flags) "Device '%s' config: size: 0x%lx, of= fset: 0x%lx, flags: 0x%lx" vfio_pci_populate_device_get_irq_info_failure(const char *errstr) "VFIO_DE= VICE_GET_IRQ_INFO failure: %s" vfio_mdev(const char *name, bool is_mdev) " (%s) is_mdev %d" +vfio_pci_synthesize_pasid_cap(const char *name, uint16_t offset) "%s off= set: 0x%x" vfio_add_ext_cap_dropped(const char *name, uint16_t cap, uint16_t offset) = "%s 0x%x@0x%x" vfio_pci_reset(const char *name) " (%s)" vfio_pci_reset_flr(const char *name) "%s FLR/VFIO_DEVICE_RESET" diff --git a/include/hw/core/iommu.h b/include/hw/core/iommu.h index d5401a397b..86af315c15 100644 --- a/include/hw/core/iommu.h +++ b/include/hw/core/iommu.h @@ -20,6 +20,7 @@ enum viommu_flags { /* vIOMMU needs nesting parent HWPT to create nested HWPT */ VIOMMU_FLAG_WANT_NESTING_PARENT =3D BIT_ULL(0), + VIOMMU_FLAG_PASID_SUPPORTED =3D BIT_ULL(1), }; =20 /* Host IOMMU quirks. Extracted from host IOMMU capabilities */ --=20 2.43.0 From nobody Sat Feb 7 05:53:49 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass(p=reject dis=none) header.from=nvidia.com ARC-Seal: i=2; a=rsa-sha256; t=1769424711; cv=pass; d=zohomail.com; s=zohoarc; b=NMpLFdw9Aac+mlPc2pmhQ1V7YPVCKG1Xy6dzOnpgb/0u/zsZl+Z0R9KRT17cgdPeY05l+q2AMGBsva6k+9bTJzjN3jtkFW1c54u4n8yqukd1ECRB64M6U3Q6WxRQmYYjObcLyp4NyWQ4weodaPlUoO5+IEdvHjF0Gb3GBf5Noms= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1769424711; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Ov4tQAUHPzrhFsFrfKxGL6wrulTQ2yGB8yRjycHkvuM=; b=LHGFLknL3MUwbmreUtqmNuaNkskjcYelw0d9gfqgZachvSOmw5j2pjMrnpKUaQ5T65FamM/KXE6dSV8J+9E0AROpEhHBnFhqq9ri+uVuIXNLWU5DjUguWMCHTEF0xCgg2wAHo64fmekVNqxE8z4GYl1T2BESArttfAgl0FmMXJE= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; arc=pass (i=1 dmarc=pass fromdomain=nvidia.com); dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 176942471160882.29844228503214; Mon, 26 Jan 2026 02:51:51 -0800 (PST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1vkKBQ-0004NN-Ak; Mon, 26 Jan 2026 05:51:00 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKBO-0004D5-Tk; Mon, 26 Jan 2026 05:50:58 -0500 Received: from mail-northcentralusazlp170120005.outbound.protection.outlook.com ([2a01:111:f403:c105::5] helo=CH5PR02CU005.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1vkKBN-0006Fl-3D; Mon, 26 Jan 2026 05:50:58 -0500 Received: from CH2PR05CA0030.namprd05.prod.outlook.com (2603:10b6:610::43) by IA1PR12MB8407.namprd12.prod.outlook.com (2603:10b6:208:3d9::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.15; Mon, 26 Jan 2026 10:50:48 +0000 Received: from CH2PEPF0000013C.namprd02.prod.outlook.com (2603:10b6:610:0:cafe::da) by CH2PR05CA0030.outlook.office365.com (2603:10b6:610::43) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9564.7 via Frontend Transport; Mon, 26 Jan 2026 10:50:46 +0000 Received: from mail.nvidia.com (216.228.117.161) by CH2PEPF0000013C.mail.protection.outlook.com (10.167.244.73) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.3 via Frontend Transport; Mon, 26 Jan 2026 10:50:48 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:50:32 -0800 Received: from NV-2Y5XW94.nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Mon, 26 Jan 2026 02:50:28 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Yx/asK5q1ejmjEJR8T/EOvn+DWQptw9KMx3x1DoJFAtX9YktqnywBUb2OhQPfROE++0DzBN/tCYM+l/D4I72F/NPPrUWu3LAqKoT6YtLzxD3NS8onbRrsX3NoquJ450OSJvxoePtJa/GeGU4ShCrSBzjlOsPe703nZ6Lo8ShEgfLwlYHYpV65lwqxe0cT2gLYNSbhH6orarrg8Gb9i7FdySUdTtlPq3sP/bjEwrDNaM6ss8WavJUdZHgczQjOLfzaXw6KkSMd5DOXGqSgjtSSlhQOpxM/J1kP+LSmR4vG9FlI8tHcSvrecHMZFZTb19OS/bywWGBn3gVsVjHgmJ+Vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Ov4tQAUHPzrhFsFrfKxGL6wrulTQ2yGB8yRjycHkvuM=; b=IpPoNICPpO2VYypY6PqvtJ0XpW3UyTkdFWIM0fDyIRYbdCmKg6CJLD82xwelMDBzOT4THoyipfnhYleVNZdjCu0vgDOLUZDEkGS5JSHkT6bcpzoX91iMZEFHh2sPwSr0UhkzqW5BesRl75sTnkdyb7mynt0n/r1YryO8/B1KJXX39cVrVWG5jxGbSNlTXC8zfgso5sGYe4Mto1vDDdaq3n/1vuUKb69O8uZ7uOw+vcIzH7lF9BqogWph+qk3oRBfd7klCo5v0R8I9krAK40lvcVxNvmShF//zrNVOA9I1aF4K4UlrsUK1QMgRZGZOHAPP/te4mdchXoXxcQ+1FUZdw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ov4tQAUHPzrhFsFrfKxGL6wrulTQ2yGB8yRjycHkvuM=; b=uI21Wz3Zv90PUwr9hx8BLZUzeUfNNCGmIMxfyO7YUcuhek4RrFgamDO9fE5w3zC97AAGKqeu5dJfaQ8mHlP5uP/o2HcxOzxsDPhhV8OjiAJaqvkOpqrPVAP23hgQ0Eg/wwybRI5zflx5R3MHfhGrOu6AuUjFy+RTJrsgd1BYL4ypFs/0RCXYVrmE2mxbkG9tq+STIsKi+UQKRhUATCFVC+ApYGR6deZZu3TUtnfB4eIKzM1LQZytHtGuuL+jhFNYf5pxKIgfulzaym+tKHBYqc444quAvO4mYFpSLNmJj2LkseB5vlVQnNiy7w3ektAWDyhgdn7t1uyQSYX75BV13w== X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C From: Shameer Kolothum To: , CC: , , , , , , , , , , , , , , , , , , Subject: [PATCH v9 37/37] hw/arm/smmuv3-accel: Make SubstreamID support configurable Date: Mon, 26 Jan 2026 10:43:34 +0000 Message-ID: <20260126104342.253965-38-skolothumtho@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126104342.253965-1-skolothumtho@nvidia.com> References: <20260126104342.253965-1-skolothumtho@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CH2PEPF0000013C:EE_|IA1PR12MB8407:EE_ X-MS-Office365-Filtering-Correlation-Id: 91470b8f-7123-4ff7-63e4-08de5cc8c414 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|82310400026|376014|7416014|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?EnbkiS3wP9CccqX4iRdXf1jv6r16XrBlasAn1nkV938BPChPG+b6kfB6dGnS?= =?us-ascii?Q?klpkK3ibuPAjFxdO5a3RdeUAQFRM2jbCWZeepZCOvMkcriraH9Um9MtBclU6?= =?us-ascii?Q?CKZwZr/auQTVBBBty5y45UQ7CBkoSEwcppVepeP0CZeaVgRgFLD6J6c7AZi4?= =?us-ascii?Q?UbTiw+elFY3EKPyFamQQ0SutagiC4wZP1TUOr2OpLm3Al41+TUa/lQOYh3Q0?= =?us-ascii?Q?IacyBtvDuwkH/Ck/LFUkOxNkOL/H6dtHRzkn7tb+O1VgbQ5dxgMKq1ggoSBq?= =?us-ascii?Q?YbMjBp4ZIRGnKp0osVZzw+z2PtqG29vnVVultLSc2qWVMjHcuH1Vt0MqdlgS?= =?us-ascii?Q?WyjmMDdXJil1q8I5LO9S9BWI4Wf7cp+0LvlsnLfRoXR2GcJyqlHNP2KmDEc4?= =?us-ascii?Q?4hNnJCooflHafAEczxINIWGYvqDTuF8Z1QapBCsUMx5J40rWLUqbh0BQIuTd?= =?us-ascii?Q?uUI7exrkZhlmZuX7XNnj55+X6hI92vAwDjixcvnXWkBM56tvme8frtZzdQVx?= =?us-ascii?Q?+nnobRAtOzwBOkjDEEXb5p2pqkyKW68StP+AbEkc0DQG8bF59jDtXwQqYyZw?= =?us-ascii?Q?yxgJpBpOvSKqQwr2M9zQrCfHHk1+LbV0HbxQNZW/QFxPOZNHR8Y3TowMJBbY?= =?us-ascii?Q?/4FILqs6HmMEZRX3etJNqEt5/7Af8Q3zu1qxPo084owXlBdRcSk7wUaS8Zrl?= =?us-ascii?Q?6BZ8oIPZeRP0ba7W3aVXttzBqBty3PLrIdWFz2++LlkGFQnb7w54Yg8ghyMh?= =?us-ascii?Q?aG1PjvbMqse2S5CnTmJw0xEv337EgZ+chJZTCYgPNWWaeLLwKWVPyouSABEg?= =?us-ascii?Q?4ww6QjEAG60OnW8NilCYokHHSFToxmfce4ndU3RmqoXn09/KmReClmgDFtU+?= =?us-ascii?Q?IF8TdEee96AO7TIkKPQ+AWS3972vmPN1iSBwRc8X17N34ffZkWRQx8cl4BsC?= =?us-ascii?Q?1ieMH9UtXfgZ38+PzwFZtOdDiM888DQDrgKNL7IJGn/Fv+Jqt8P4qvZrJODv?= =?us-ascii?Q?8aCXwJCtsyCbe6psZxtaxd1GzYm2P5Zo/o3U1QssV+hVSrK6HL8Mky7281nt?= =?us-ascii?Q?xpGJ7W6+enJH5OMcsfCxUqT+CRwAtarNuw8fSIuOVgMzHdr0Y+QdiebLT+tF?= =?us-ascii?Q?lpiYTlvGuCEDTZxPLXZ3neCkjeAKANIbCUjm8wmek9szExEq1OphWZXepr49?= =?us-ascii?Q?4trR/OR9e64tcvxyUEtrhozK3SxNad5ZC7fQar9DHwiHGVVPX3J0f+rs+4as?= =?us-ascii?Q?sNoCtTrREPiC8qWBkCvSqPy4OstnM9FxC838NpcElwMPqN5mvpP8rBONAbSF?= =?us-ascii?Q?2x400EBRn2E/+kLCGrYHWPCNCSthP404SqBbpplLJ1VaESOhjxpVibg+KXSj?= =?us-ascii?Q?Ocg2LK3cplIbr9H0fKNyPmKc0PEQr/fw17MYWfcgkyJX/lXP0sVHqHMBd+1r?= =?us-ascii?Q?G0+tc1Z79lXbyxilvq38u/i9Xo//1a0d8B3kIBj+620ZiFTyMpfUPAW+2xpu?= =?us-ascii?Q?lvCVW0CtKoWoHXbqi1P2NNVz8il3vU97JmnS+xLmW2wnXXFWcM/AkHVE+etV?= =?us-ascii?Q?ED3so66UU7K6vwJLPW7cz9UeHe9sBBQ/gnyqm3j98VeN04OswcMceXhDFipN?= =?us-ascii?Q?Cp8Id2CZG6PovXx1iR3Cv0PBrTpiCTjtX/9lUu+KhMAXxOR9UZGQ/3cgjFHG?= =?us-ascii?Q?EB44pw=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(82310400026)(376014)(7416014)(36860700013); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jan 2026 10:50:48.4559 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 91470b8f-7123-4ff7-63e4-08de5cc8c414 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: CH2PEPF0000013C.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR12MB8407 Received-SPF: permerror client-ip=2a01:111:f403:c105::5; envelope-from=skolothumtho@nvidia.com; helo=CH5PR02CU005.outbound.protection.outlook.com X-Spam_score_int: -14 X-Spam_score: -1.5 X-Spam_bar: - X-Spam_report: (-1.5 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FORGED_SPF_HELO=0.587, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_NONE=0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: qemu development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: qemu-devel-bounces+importer=patchew.org@nongnu.org X-ZohoMail-DKIM: pass (identity @Nvidia.com) X-ZM-MESSAGEID: 1769424712623158500 Content-Type: text/plain; charset="utf-8" QEMU SMMUv3 currently reports no SubstreamID support, forcing SSID to zero. This prevents accelerated use cases such as Shared Virtual Addressing (SVA), which require multiple Stage-1 context descriptors indexed by SubstreamID. Add a new "ssidsize" property to explicitly configure the number of bits used for SubstreamIDs. A value greater than zero enables SubstreamID support and advertises PASID capability to the vIOMMU. The requested SSIDSIZE is validated against host SMMUv3 capabilities and is only supported when accel=3Don. Reviewed-by: Jonathan Cameron Reviewed-by: Eric Auger Reviewed-by: Nicolin Chen Tested-by: Eric Auger Tested-by: Zhangfei Gao Signed-off-by: Shameer Kolothum --- hw/arm/smmuv3-accel.c | 25 ++++++++++++++++++++++++- hw/arm/smmuv3.c | 22 ++++++++++++++++++++-- include/hw/arm/smmuv3-common.h | 1 + include/hw/arm/smmuv3.h | 1 + 4 files changed, 46 insertions(+), 3 deletions(-) diff --git a/hw/arm/smmuv3-accel.c b/hw/arm/smmuv3-accel.c index 342944da23..f5cd4df336 100644 --- a/hw/arm/smmuv3-accel.c +++ b/hw/arm/smmuv3-accel.c @@ -76,6 +76,16 @@ smmuv3_accel_check_hw_compatible(SMMUv3State *s, return false; } =20 + /* Check SSIDSIZE value opted-in is compatible with Host SMMUv3 SSIDSI= ZE */ + if (FIELD_EX32(info->idr[1], IDR1, SSIDSIZE) < + FIELD_EX32(s->idr[1], IDR1, SSIDSIZE)) { + error_setg(errp, "Host SMMUv3 SSIDSIZE not compatible " + "(host=3D%u, QEMU=3D%u)", + FIELD_EX32(info->idr[1], IDR1, SSIDSIZE), + FIELD_EX32(s->idr[1], IDR1, SSIDSIZE)); + return false; + } + /* User can disable QEMU SMMUv3 Range Invalidation support */ if (FIELD_EX32(info->idr[3], IDR3, RIL) < FIELD_EX32(s->idr[3], IDR3, RIL)) { @@ -652,7 +662,14 @@ static uint64_t smmuv3_accel_get_viommu_flags(void *op= aque) * The real HW nested support should be reported from host SMMUv3 and = if * it doesn't, the nesting parent allocation will fail anyway in VFIO = core. */ - return VIOMMU_FLAG_WANT_NESTING_PARENT; + uint64_t flags =3D VIOMMU_FLAG_WANT_NESTING_PARENT; + SMMUState *bs =3D opaque; + SMMUv3State *s =3D ARM_SMMUV3(bs); + + if (s->ssidsize) { + flags |=3D VIOMMU_FLAG_PASID_SUPPORTED; + } + return flags; } =20 static const PCIIOMMUOps smmuv3_accel_ops =3D { @@ -680,6 +697,12 @@ void smmuv3_accel_idr_override(SMMUv3State *s) if (s->oas =3D=3D SMMU_OAS_48BIT) { s->idr[5] =3D FIELD_DP32(s->idr[5], IDR5, OAS, SMMU_IDR5_OAS_48); } + + /* + * By default QEMU SMMUv3 has no SubstreamID support. Update IDR1 if u= ser + * has enabled it. + */ + s->idr[1] =3D FIELD_DP32(s->idr[1], IDR1, SSIDSIZE, s->ssidsize); } =20 /* Based on SMUUv3 GPBA.ABORT configuration, attach a corresponding HWPT */ diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c index cb02184d2d..c08d58c579 100644 --- a/hw/arm/smmuv3.c +++ b/hw/arm/smmuv3.c @@ -611,9 +611,11 @@ static int decode_ste(SMMUv3State *s, SMMUTransCfg *cf= g, } } =20 - if (STE_S1CDMAX(ste) !=3D 0) { + /* Multiple context descriptors require SubstreamID support */ + if (!s->ssidsize && STE_S1CDMAX(ste) !=3D 0) { qemu_log_mask(LOG_UNIMP, - "SMMUv3 does not support multiple context descriptor= s yet\n"); + "SMMUv3: multiple S1 context descriptors require Substream= ID support. " + "Configure ssidsize > 0 (requires accel=3Don)\n"); goto bad_ste; } =20 @@ -1954,6 +1956,10 @@ static bool smmu_validate_property(SMMUv3State *s, E= rror **errp) error_setg(errp, "OAS must be 44 bits when accel=3Doff"); return false; } + if (s->ssidsize) { + error_setg(errp, "ssidsize can only be set if accel=3Don"); + return false; + } return true; } =20 @@ -1968,6 +1974,11 @@ static bool smmu_validate_property(SMMUv3State *s, E= rror **errp) error_setg(errp, "OAS can only be set to 44 or 48 bits"); return false; } + if (s->ssidsize > SMMU_SSID_MAX_BITS) { + error_setg(errp, "ssidsize must be in the range 0 to %d", + SMMU_SSID_MAX_BITS); + return false; + } =20 return true; } @@ -2096,6 +2107,7 @@ static const Property smmuv3_properties[] =3D { DEFINE_PROP_BOOL("ril", SMMUv3State, ril, true), DEFINE_PROP_BOOL("ats", SMMUv3State, ats, false), DEFINE_PROP_UINT8("oas", SMMUv3State, oas, 44), + DEFINE_PROP_UINT8("ssidsize", SMMUv3State, ssidsize, 0), }; =20 static void smmuv3_instance_init(Object *obj) @@ -2129,6 +2141,12 @@ static void smmuv3_class_init(ObjectClass *klass, co= nst void *data) object_class_property_set_description(klass, "oas", "Specify Output Address Size (for accel=3Don). Supported values " "are 44 or 48 bits. Defaults to 44 bits"); + object_class_property_set_description(klass, "ssidsize", + "Number of bits used to represent SubstreamIDs (SSIDs). " + "A value of N allows SSIDs in the range [0 .. 2^N - 1]. " + "Valid range is 0-20, where 0 disables SubstreamID support. " + "Defaults to 0. A value greater than 0 is required to enable " + "PASID support."); } =20 static int smmuv3_notify_flag_changed(IOMMUMemoryRegion *iommu, diff --git a/include/hw/arm/smmuv3-common.h b/include/hw/arm/smmuv3-common.h index abe3565357..67a23fbeaa 100644 --- a/include/hw/arm/smmuv3-common.h +++ b/include/hw/arm/smmuv3-common.h @@ -311,6 +311,7 @@ REG32(IDR1, 0x4) FIELD(IDR1, TABLES_PRESET, 30, 1) FIELD(IDR1, ECMDQ, 31, 1) =20 +#define SMMU_SSID_MAX_BITS 20 #define SMMU_IDR1_SIDSIZE 16 #define SMMU_CMDQS 19 #define SMMU_EVENTQS 19 diff --git a/include/hw/arm/smmuv3.h b/include/hw/arm/smmuv3.h index d488a39cd0..26b2fc42fd 100644 --- a/include/hw/arm/smmuv3.h +++ b/include/hw/arm/smmuv3.h @@ -72,6 +72,7 @@ struct SMMUv3State { bool ril; bool ats; uint8_t oas; + uint8_t ssidsize; }; =20 typedef enum { --=20 2.43.0