From: "Cédric Le Goater" <clg@redhat.com>
To: Shameer Kolothum <skolothumtho@nvidia.com>,
qemu-arm@nongnu.org, qemu-devel@nongnu.org
Cc: eric.auger@redhat.com, peter.maydell@linaro.org, jgg@nvidia.com,
nicolinc@nvidia.com, ddutile@redhat.com, berrange@redhat.com,
nathanc@nvidia.com, mochs@nvidia.com, smostafa@google.com,
wangzhou1@hisilicon.com, jiangkunkun@huawei.com,
jonathan.cameron@huawei.com, zhangfei.gao@linaro.org,
zhenzhong.duan@intel.com, yi.l.liu@intel.com, kjaju@nvidia.com
Subject: Re: [PATCH v6 31/33] Extend get_cap() callback to support PASID
Date: Thu, 11 Dec 2025 16:26:44 +0100 [thread overview]
Message-ID: <0b95b9d4-1f6f-4034-b343-d3961c57c342@redhat.com> (raw)
In-Reply-To: <20251120132213.56581-32-skolothumtho@nvidia.com>
On 11/20/25 14:22, Shameer Kolothum wrote:
> Modify get_cap() callback so that it can return cap via an output
> uint64_t param. And add support for generic iommu hw capability
> info and max_pasid_log2(pasid width).
This is doing multiple changes. Please split.
Thanks,
C.
> Reviewed-by: Jonathan Cameron <jonathan.cameron@huawei.com>
> Signed-off-by: Shameer Kolothum <skolothumtho@nvidia.com>
> ---
> backends/iommufd.c | 23 ++++++++++++++++++-----
> hw/i386/intel_iommu.c | 8 +++++---
> hw/vfio/container-legacy.c | 8 ++++++--
> include/system/host_iommu_device.h | 18 ++++++++++++------
> 4 files changed, 41 insertions(+), 16 deletions(-)
>
> diff --git a/backends/iommufd.c b/backends/iommufd.c
> index 6381f9664b..718d63f5cf 100644
> --- a/backends/iommufd.c
> +++ b/backends/iommufd.c
> @@ -523,19 +523,32 @@ bool host_iommu_device_iommufd_detach_hwpt(HostIOMMUDeviceIOMMUFD *idev,
> return idevc->detach_hwpt(idev, errp);
> }
>
> -static int hiod_iommufd_get_cap(HostIOMMUDevice *hiod, int cap, Error **errp)
> +static int hiod_iommufd_get_cap(HostIOMMUDevice *hiod, int cap_id,
> + uint64_t *out_cap, Error **errp)
> {
> HostIOMMUDeviceCaps *caps = &hiod->caps;
>
> - switch (cap) {
> + g_assert(out_cap);
> +
> + switch (cap_id) {
> case HOST_IOMMU_DEVICE_CAP_IOMMU_TYPE:
> - return caps->type;
> + *out_cap = caps->type;
> + break;
> case HOST_IOMMU_DEVICE_CAP_AW_BITS:
> - return vfio_device_get_aw_bits(hiod->agent);
> + *out_cap = vfio_device_get_aw_bits(hiod->agent);
> + break;
> + case HOST_IOMMU_DEVICE_CAP_GENERIC_HW:
> + *out_cap = caps->hw_caps;
> + break;
> + case HOST_IOMMU_DEVICE_CAP_MAX_PASID_LOG2:
> + *out_cap = caps->max_pasid_log2;
> + break;
> default:
> - error_setg(errp, "%s: unsupported capability %x", hiod->name, cap);
> + *out_cap = 0;
> + error_setg(errp, "%s: unsupported capability %x", hiod->name, cap_id);
> return -EINVAL;
> }
> + return 0;
> }
>
> static void hiod_iommufd_class_init(ObjectClass *oc, const void *data)
> diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c
> index 78b142ccea..d5c131a814 100644
> --- a/hw/i386/intel_iommu.c
> +++ b/hw/i386/intel_iommu.c
> @@ -4605,6 +4605,7 @@ static bool vtd_check_hiod(IntelIOMMUState *s, HostIOMMUDevice *hiod,
> Error **errp)
> {
> HostIOMMUDeviceClass *hiodc = HOST_IOMMU_DEVICE_GET_CLASS(hiod);
> + uint64_t out_cap;
> int ret;
>
> if (!hiodc->get_cap) {
> @@ -4613,12 +4614,13 @@ static bool vtd_check_hiod(IntelIOMMUState *s, HostIOMMUDevice *hiod,
> }
>
> /* Common checks */
> - ret = hiodc->get_cap(hiod, HOST_IOMMU_DEVICE_CAP_AW_BITS, errp);
> + ret = hiodc->get_cap(hiod, HOST_IOMMU_DEVICE_CAP_AW_BITS, &out_cap, errp);
> if (ret < 0) {
> return false;
> }
> - if (s->aw_bits > ret) {
> - error_setg(errp, "aw-bits %d > host aw-bits %d", s->aw_bits, ret);
> + if (s->aw_bits > out_cap) {
> + error_setg(errp, "aw-bits %d > host aw-bits 0x%" PRIx64, s->aw_bits,
> + out_cap);
> return false;
> }
>
> diff --git a/hw/vfio/container-legacy.c b/hw/vfio/container-legacy.c
> index 32c260b345..1acf063762 100644
> --- a/hw/vfio/container-legacy.c
> +++ b/hw/vfio/container-legacy.c
> @@ -1203,15 +1203,19 @@ static bool hiod_legacy_vfio_realize(HostIOMMUDevice *hiod, void *opaque,
> }
>
> static int hiod_legacy_vfio_get_cap(HostIOMMUDevice *hiod, int cap,
> - Error **errp)
> + uint64_t *out_cap, Error **errp)
> {
> + g_assert(out_cap);
> +
> switch (cap) {
> case HOST_IOMMU_DEVICE_CAP_AW_BITS:
> - return vfio_device_get_aw_bits(hiod->agent);
> + *out_cap = vfio_device_get_aw_bits(hiod->agent);
> + break;
> default:
> error_setg(errp, "%s: unsupported capability %x", hiod->name, cap);
> return -EINVAL;
> }
> + return 0;
> }
>
> static GList *
> diff --git a/include/system/host_iommu_device.h b/include/system/host_iommu_device.h
> index bfb2b60478..4e891e5225 100644
> --- a/include/system/host_iommu_device.h
> +++ b/include/system/host_iommu_device.h
> @@ -88,19 +88,21 @@ struct HostIOMMUDeviceClass {
> * @get_cap: check if a host IOMMU device capability is supported.
> *
> * Optional callback, if not implemented, hint not supporting query
> - * of @cap.
> + * of @cap_id.
> *
> * @hiod: pointer to a host IOMMU device instance.
> *
> - * @cap: capability to check.
> + * @cap_id: capability to check.
> + *
> + * @out_cap: 0 if a @cap_id is unsupported or else the capability
> + * value for @cap_id.
> *
> * @errp: pass an Error out when fails to query capability.
> *
> - * Returns: <0 on failure, 0 if a @cap is unsupported, or else
> - * 1 or some positive value for some special @cap,
> - * i.e., HOST_IOMMU_DEVICE_CAP_AW_BITS.
> + * Returns: <0 if @cap_id is not supported, 0 on success.
> */
> - int (*get_cap)(HostIOMMUDevice *hiod, int cap, Error **errp);
> + int (*get_cap)(HostIOMMUDevice *hiod, int cap_id, uint64_t *out_cap,
> + Error **errp);
> /**
> * @get_iova_ranges: Return the list of usable iova_ranges along with
> * @hiod Host IOMMU device
> @@ -123,6 +125,10 @@ struct HostIOMMUDeviceClass {
> */
> #define HOST_IOMMU_DEVICE_CAP_IOMMU_TYPE 0
> #define HOST_IOMMU_DEVICE_CAP_AW_BITS 1
> +/* Generic IOMMU HW capability info */
> +#define HOST_IOMMU_DEVICE_CAP_GENERIC_HW 2
> +/* PASID width */
> +#define HOST_IOMMU_DEVICE_CAP_MAX_PASID_LOG2 3
>
> #define HOST_IOMMU_DEVICE_CAP_AW_BITS_MAX 64
> #endif
next prev parent reply other threads:[~2025-12-11 15:27 UTC|newest]
Thread overview: 101+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-20 13:21 [PATCH v6 00/33] hw/arm/virt: Add support for user-creatable accelerated SMMUv3 Shameer Kolothum
2025-11-20 13:21 ` [PATCH v6 01/33] backends/iommufd: Introduce iommufd_backend_alloc_viommu Shameer Kolothum
2025-11-20 13:21 ` [PATCH v6 02/33] backends/iommufd: Introduce iommufd_backend_alloc_vdev Shameer Kolothum
2025-11-20 13:21 ` [PATCH v6 03/33] hw/arm/smmu-common: Factor out common helper functions and export Shameer Kolothum
2025-11-20 13:21 ` [PATCH v6 04/33] hw/arm/smmu-common: Make iommu ops part of SMMUState Shameer Kolothum
2025-12-11 11:03 ` Cédric Le Goater
2025-11-20 13:21 ` [PATCH v6 05/33] hw/arm/smmuv3-accel: Introduce smmuv3 accel device Shameer Kolothum
2025-12-11 12:54 ` Cédric Le Goater
2025-12-12 5:48 ` Shameer Kolothum
2025-11-20 13:21 ` [PATCH v6 06/33] hw/arm/smmuv3-accel: Initialize shared system address space Shameer Kolothum
2025-12-08 17:05 ` Eric Auger
2025-11-20 13:21 ` [PATCH v6 07/33] hw/pci/pci: Move pci_init_bus_master() after adding device to bus Shameer Kolothum
2025-11-20 20:44 ` Nicolin Chen
2025-11-20 13:21 ` [PATCH v6 08/33] hw/pci/pci: Add optional supports_address_space() callback Shameer Kolothum
2025-11-20 20:51 ` Nicolin Chen
2025-11-21 10:38 ` Shameer Kolothum
2025-11-21 17:28 ` Nicolin Chen
2025-11-21 17:32 ` Shameer Kolothum
2025-12-11 14:40 ` Cédric Le Goater
2025-12-12 5:54 ` Shameer Kolothum
2025-11-20 13:21 ` [PATCH v6 09/33] hw/pci-bridge/pci_expander_bridge: Move TYPE_PXB_PCIE_DEV to header Shameer Kolothum
2025-11-20 20:52 ` Nicolin Chen
2025-11-20 13:21 ` [PATCH v6 10/33] hw/arm/smmuv3-accel: Restrict accelerated SMMUv3 to vfio-pci endpoints with iommufd Shameer Kolothum
2025-11-20 13:21 ` [PATCH v6 11/33] hw/arm/smmuv3: Implement get_viommu_cap() callback Shameer Kolothum
2025-11-20 13:21 ` [PATCH v6 12/33] hw/arm/smmuv3-accel: Add set/unset_iommu_device callback Shameer Kolothum
2025-12-09 7:57 ` Eric Auger
2025-12-11 13:41 ` Cédric Le Goater
2025-11-20 13:21 ` [PATCH v6 13/33] hw/arm/smmuv3: propagate smmuv3_cmdq_consume() errors to caller Shameer Kolothum
2025-11-20 20:59 ` Nicolin Chen
2025-12-04 16:28 ` Eric Auger
2025-11-20 13:21 ` [PATCH v6 14/33] hw/arm/smmuv3-accel: Add nested vSTE install/uninstall support Shameer Kolothum
2025-12-09 8:14 ` Eric Auger
2025-11-20 13:21 ` [PATCH v6 15/33] hw/arm/smmuv3-accel: Install SMMUv3 GBPA based hwpt Shameer Kolothum
2025-11-20 21:03 ` Nicolin Chen
2025-11-20 13:21 ` [PATCH v6 16/33] hw/pci/pci: Introduce a callback to retrieve the MSI doorbell GPA directly Shameer Kolothum
2025-11-20 21:05 ` Nicolin Chen
2025-12-04 16:38 ` Eric Auger
2025-12-04 18:57 ` Shameer Kolothum
2025-12-08 17:03 ` Eric Auger
2025-11-20 13:21 ` [PATCH v6 17/33] hw/arm/smmuv3: Add support for providing a direct MSI doorbell GPA Shameer Kolothum
2025-11-20 21:21 ` Nicolin Chen
2025-11-21 9:57 ` Shameer Kolothum
2025-11-21 17:56 ` Nicolin Chen
2025-11-24 8:05 ` Shameer Kolothum
2025-11-24 18:34 ` Nicolin Chen
2025-11-24 19:01 ` Shameer Kolothum
2025-11-24 20:08 ` Nicolin Chen
2025-12-11 14:03 ` Cédric Le Goater
2025-11-20 13:21 ` [PATCH v6 18/33] hw/arm/smmuv3-accel: Add support to issue invalidation cmd to host Shameer Kolothum
2025-11-20 13:21 ` [PATCH v6 19/33] hw/arm/smmuv3: Initialize ID registers early during realize() Shameer Kolothum
2025-11-20 13:22 ` [PATCH v6 20/33] hw/arm/smmuv3-accel: Get host SMMUv3 hw info and validate Shameer Kolothum
2025-11-20 21:27 ` Nicolin Chen
2025-11-20 21:30 ` Nicolin Chen
2025-11-20 13:22 ` [PATCH v6 21/33] hw/pci-host/gpex: Allow to generate preserve boot config DSM #5 Shameer Kolothum
2025-11-20 13:22 ` [PATCH v6 22/33] hw/arm/virt: Set PCI preserve_config for accel SMMUv3 Shameer Kolothum
2025-11-20 13:22 ` [PATCH v6 23/33] tests/qtest/bios-tables-test: Prepare for IORT revison upgrade Shameer Kolothum
2025-11-20 13:22 ` [PATCH v6 24/33] hw/arm/virt-acpi-build: Add IORT RMR regions to handle MSI nested binding Shameer Kolothum
2025-11-20 13:22 ` [PATCH v6 25/33] tests/qtest/bios-tables-test: Update IORT blobs after revision upgrade Shameer Kolothum
2025-11-20 13:22 ` [PATCH v6 26/33] hw/arm/smmuv3: Add accel property for SMMUv3 device Shameer Kolothum
2025-12-11 15:11 ` Cédric Le Goater
2025-11-20 13:22 ` [PATCH v6 27/33] hw/arm/smmuv3-accel: Add a property to specify RIL support Shameer Kolothum
2025-11-20 21:34 ` Nicolin Chen via
2025-11-21 10:04 ` Shameer Kolothum
2025-12-11 15:14 ` Cédric Le Goater
2025-11-20 13:22 ` [PATCH v6 28/33] hw/arm/smmuv3-accel: Add support for ATS Shameer Kolothum
2025-11-20 21:40 ` Nicolin Chen
2025-11-24 12:00 ` Zhangfei Gao
2025-11-24 12:48 ` Shameer Kolothum
2025-12-08 17:36 ` Eric Auger
2025-11-20 13:22 ` [PATCH v6 29/33] hw/arm/smmuv3-accel: Add property to specify OAS bits Shameer Kolothum
2025-11-20 21:47 ` Nicolin Chen
2025-12-08 17:17 ` Eric Auger
2025-12-11 15:23 ` Cédric Le Goater
2025-11-20 13:22 ` [PATCH v6 30/33] backends/iommufd: Retrieve PASID width from iommufd_backend_get_device_info() Shameer Kolothum
2025-11-20 21:50 ` Nicolin Chen
2025-12-11 15:24 ` Cédric Le Goater
2025-11-20 13:22 ` [PATCH v6 31/33] Extend get_cap() callback to support PASID Shameer Kolothum
2025-11-20 21:56 ` Nicolin Chen
2025-12-08 17:20 ` Eric Auger
2025-12-11 15:26 ` Cédric Le Goater [this message]
2025-11-20 13:22 ` [PATCH v6 32/33] vfio: Synthesize vPASID capability to VM Shameer Kolothum
2025-11-20 21:59 ` Nicolin Chen
2025-12-09 9:51 ` Eric Auger
2025-12-09 11:17 ` Yi Liu
2025-11-20 13:22 ` [PATCH v6 33/33] hw/arm/smmuv3-accel: Add support for PASID enable Shameer Kolothum
2025-11-20 22:09 ` Nicolin Chen
2025-11-21 10:22 ` Shameer Kolothum
2025-11-21 17:50 ` Nicolin Chen
2025-11-21 18:36 ` Nicolin Chen
2025-11-21 18:44 ` Jason Gunthorpe
2025-11-24 8:17 ` Shameer Kolothum
2025-11-20 17:06 ` [PATCH v6 00/33] hw/arm/virt: Add support for user-creatable accelerated SMMUv3 Nicolin Chen
2025-11-24 12:09 ` Zhangfei Gao
2025-12-08 10:08 ` Duan, Zhenzhong
2025-12-08 11:15 ` Shameer Kolothum
2025-12-09 2:30 ` Duan, Zhenzhong
2025-12-09 3:33 ` Yi Liu
2025-12-09 10:31 ` Cédric Le Goater
2025-12-10 15:07 ` Shameer Kolothum
2025-12-10 16:07 ` Cédric Le Goater
2025-12-10 16:18 ` Eric Auger
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=0b95b9d4-1f6f-4034-b343-d3961c57c342@redhat.com \
--to=clg@redhat.com \
--cc=berrange@redhat.com \
--cc=ddutile@redhat.com \
--cc=eric.auger@redhat.com \
--cc=jgg@nvidia.com \
--cc=jiangkunkun@huawei.com \
--cc=jonathan.cameron@huawei.com \
--cc=kjaju@nvidia.com \
--cc=mochs@nvidia.com \
--cc=nathanc@nvidia.com \
--cc=nicolinc@nvidia.com \
--cc=peter.maydell@linaro.org \
--cc=qemu-arm@nongnu.org \
--cc=qemu-devel@nongnu.org \
--cc=skolothumtho@nvidia.com \
--cc=smostafa@google.com \
--cc=wangzhou1@hisilicon.com \
--cc=yi.l.liu@intel.com \
--cc=zhangfei.gao@linaro.org \
--cc=zhenzhong.duan@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).