data_type
large_stringclasses
3 values
source
large_stringclasses
29 values
code
large_stringlengths
98
49.4M
filepath
large_stringlengths
5
161
message
large_stringclasses
234 values
commit
large_stringclasses
234 values
subject
large_stringclasses
418 values
critique
large_stringlengths
101
1.26M
metadata
dict
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Introduce SMMU_SEC_SID_S to represent SEC_SID == 1, meaning Secure. And then provide smmu_get_address_space, a SMMU instance-based address space selector. The helper now returns the per-device memory/secure-memory AddressSpace and reports missing spaces. Signed-off-by: Tao Tang <tangtao1634@phytium.com.cn> --- hw/arm...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:02:26 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
When decoding a Stream Table Entry (STE) from the Secure stream table that enables stage-2 translation, verify that the SMMU implementation advertises Secure stage-2 support via S_IDR1.SEL2. If stage-2 is requested but S_IDR1.SEL2 is 0, mark the STE as ILLEGAL. This implements the requirement from the Arm SMMUv3 archi...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:02:28 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
The current definition of the SMMU_CR0_RESERVED mask is incorrect. It mistakenly treats bit 10 (DPT_WALK_EN) as a reserved bit while treating bit 9 (RES0) as an implemented bit. According to the SMMU architecture specification, the layout for CR0 is: | 31:11| RES0 | | 10 | DPT_WALK_EN | | 9 | RES0 ...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:02:20 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
The FIELD macro for the SMMU enable bit in the CR0 register was incorrectly named SMMU_ENABLE. The ARM SMMUv3 Architecture Specification (both older IHI 0070.E.a and newer IHI 0070.G.b) consistently refers to the SMMU enable bit as SMMUEN. This change makes our implementation consistent with the manual. Signed-off-b...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:02:21 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Cache the SEC_SID inside SMMUTransCfg to keep configuration lookups tied to the correct register bank. Plumb the SEC_SID through tracepoints and queue helpers so diagnostics and event logs always show which security interface emitted the record. To support this, the SEC_SID is placed in SMMUEventInfo so the bank is id...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:02:25 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Extend the register and queue helper routines to accept an explicit SEC_SID argument instead of hard-coding the non-secure bank. All existing callers are updated to pass SMMU_SEC_SID_NS, so the behavior remains identical. This prepares the code for handling additional security state banks in the future. So Non-secure ...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:02:24 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Hi all, This is v4 of the Secure SMMUv3 series. Many thanks to everyone who reviewed the earlier versions. This revision focuses on tightening architectural compliance, improving integration points, and making the SEC_SID plumbing complete across the fast paths. This revision contains 31 commits in total. Only one p...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:02:19 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Rework the SMMUv3 state management by introducing a banked register structure. This is a purely mechanical refactoring with no functional changes. To support multiple security states, a new enum, SMMUSecSID, is introduced to identify each state, sticking to the spec terminology. A new structure, SMMUv3RegBank, is the...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:02:23 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
The Arm SMMUv3 architecture defines a set of registers for managing secure transactions and context. This patch introduces the definitions for these secure registers within the SMMUv3 device model internal header. Signed-off-by: Tao Tang <tangtao1634@phytium.com.cn> Reviewed-by: Eric Auger <eric.auger@redhat.com> Lin...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:02:22 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Adapt the configuration cache to support multiple security states by introducing a composite key, SMMUConfigKey. This key combines the SMMUDevice with SEC_SID, preventing aliasing between Secure and Non-secure configurations for the same device, also the future Realm and Root configurations. The cache lookup, insertio...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:14:37 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Add helper macros for NS and NSTable bits and group PTE attribute accessors for clarity. No functional change beyond the new helpers. Signed-off-by: Tao Tang <tangtao1634@phytium.com.cn> --- hw/arm/smmu-internal.h | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-) diff --git a/hw/arm/smmu-intern...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:15:44 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
With NSCFG definitions in place, record the per-table NSCFG bits in SMMUTransTableInfo during CD decode for later use. Signed-off-by: Tao Tang <tangtao1634@phytium.com.cn> --- hw/arm/smmuv3.c | 1 + include/hw/arm/smmu-common.h | 1 + 2 files changed, 2 insertions(+) diff --git a/hw/arm/smmuv3.c b/hw/ar...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:16:32 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
This is a non-functional preparation step that adds storage for resolved security state in SMMUTLBEntry. Together with the earlier commits that added NSCFG handling and PTE NS/NSTable helpers, the plumbing is complete and we can now refactor the PTW flow to handle Secure state. Signed-off-by: Tao Tang <tangtao1634@ph...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:16:40 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Make smmuv3_cmdq_consume() security-state aware by passing sec_sid from smmu_writel() call sites (CR0/GERRORN/CMDQ_PROD paths), instead of hardcoding non-secure state. The related AddressSpace and MemTxAttrs are also obtained based on sec_sid. Also move CMD_SSEC legality checking to a single early check before command...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:17:14 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
The event queue producer path wrote entries through address_space_memory with MEMTXATTRS_UNSPECIFIED, so produced entries did not use the sec_sid-selected DMA context. Pass AddressSpace and MemTxAttrs to queue_write() from sec_sid, and assert that the selected AddressSpace exists before producing entries. Signed-off-...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:17:23 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Enhance the page table walker to correctly handle secure and non-secure memory accesses. This change introduces logic to select the appropriate address space and enforce architectural security policies during walks. The page table walker now correctly processes Secure Stage 1 translations. Key changes include: - The ...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:16:49 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Add a STAGE1_SUPPORTED check in the CMD_CFGI_CD and CMD_CFGI_CD_ALL path and return CERROR_ILL when stage-1 translation is not implemented, matching the architecture requirement (IHI 0070G.b, page 176). Fixes: 32cfd7f39e08 ("hw/arm/smmuv3: Cache/invalidate config data") Signed-off-by: Tao Tang <tangtao1634@phytium.com...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:17:33 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
To prevent aliasing between secure and non-secure translations for the same address space, the IOTLB lookup key must incorporate the security state of the transaction. This commit: - expands SMMUIOTLBKey with SEC_SID field for cache key differentiation - extends SMMUIOTLBPageInvInfo with SEC_SID for invalidation filte...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:16:57 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Refactor CMDQ invalidation paths to carry security state and apply cache invalidation per sec_sid instead of globally. Extend common IOTLB/config invalidation helpers with sec_sid filtering, while keeping SMMU_SEC_SID_NUM as the full-invalidate mode. In smmuv3, propagate sec_sid/ssec through CFGI and TLBI handling, an...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:17:41 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Extend IOMMU notifier functions to be SEC_SID-aware, ensuring that invalidation notifications are dispatched to the correct security-aware address space. This ensures IOMMU notifier events (e.g., to VFIO) are correctly routed to the appropriate security world's address space, maintaining isolation between secure and n...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:17:06 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Add helper functions smmu_msi_supported() and smmu_gerror_irq_cfg_writable() to check accessibility of GERROR_IRQ_CFG registers. Reading returns RES0 when MSI is not supported. Writing is ignored when GERROR_IRQEN is set. Additionally, mask reserved bits on writes using SMMU_GERROR_IRQ_CFG0_RESERVED. Fixes: fae4be38b...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:17:49 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Add access control for SMMU_STRTAB_BASE and SMMU_CR2 registers to ensure they can only be modified when the SMMU is disabled. This implements: - smmuv3_smmu_disabled_stable(): Check whether the SMMU is in a stable disabled state (CR0.SMMUEN == 0 and CR0ACK.SMMUEN == 0); - smmu_strtab_base_writable(): returns true o...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:18:16 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Add access control for command queue and event queue related registers to ensure they can only be modified under proper conditions. For command queue (CMDQ): - smmu_cmdq_disabled_stable(): checks CMDQ bit in CR0/CR0ACK - smmu_cmdq_base_writable(): checks IDR1.QUEUES_PRESET==0 and CMDQ disabled For event queue (EVTQ):...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:18:23 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Modify the main MMIO handlers (smmu_write_mmio, smmu_read_mmio) to determine the security state of the target register based on its memory-mapped offset. By checking if the offset is within the secure register space (>= SMMU_SECURE_REG_START), the handlers can deduce the register's SEC_SID (reg_sec_sid). This SID is t...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:18:29 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Arm SMMUv3 uses a SEC_SID (StreamID Security state) to determine the security state of the programming interface that controls a transaction. The architecture explicitly states that the association between a device and its SEC_SID is a system-defined property, not something derived from the physical address space. We ...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:18:50 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
This patch hardens the security validation within the main MMIO dispatcher functions (smmu_read_mmio and smmu_write_mmio). First, accesses to the secure register space are now correctly gated by whether the SECURE_IMPL feature is enabled in the model. This prevents guest software from accessing the secure programming ...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:18:42 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Implement read/write handlers for the SMMU_S_INIT secure-only register. Writing INV_ALL provides a mechanism for software to perform a global invalidation of ALL caches within the SMMU, including IOTLBs and configuration caches across all security states. The MMIO dispatcher decodes the target register bank from the ...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:18:36 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Add a secure-impl device property and advertise it through S_IDR1.SECURE_IMPL. Usage: -global arm-smmuv3,secure-impl=true Add the smmuv3/bank_s migration subsection for the secure register bank. Serialize secure bank state including GBPA, IRQ config, stream table and queue state. Signed-off-by: Tao Tang <tangtao...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:19:26 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Initialize the secure register bank (SMMU_SEC_SID_S) with sane default values during the SMMU's reset sequence. This change ensures that key fields, such as the secure ID registers, GBPA reset value, and queue entry sizes, are set to a known-good state. The SECURE_IMPL attribute of the S_IDR1 register will be introduc...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:19:18 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Parse each PCI device's sec-sid property during SMMU device initialization and cache it in SMMUDevice::sec_sid. Support "non-secure" and "secure", default to non-secure when unspecified, and reject invalid values with an explicit error. Use sdev->sec_sid in smmuv3_translate() to select the register bank instead of hard...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:19:07 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Temporarily: - enable S_IDR1.SEL2, - change AIDR to 0x2 to indicate SMMUv3.2, - use smaller SID size and Cmd/Evt queue size. Signed-off-by: Tao Tang <tangtao1634@phytium.com.cn> --- hw/arm/smmuv3.c | 3 ++- include/hw/arm/smmuv3-common.h | 6 +++--- 2 files changed, 5 insertions(+), 4 deletions(-) dif...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 21 Feb 2026 18:19:33 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:02 AM, Tao Tang wrote: Thinking about this one, I don't see any case where we would like to silently return here. Instead, could we check that directly in smmuv3_realize? If arm-smmuv3.secure-impl is enabled, then we should have s->secure_memory set accordingly. As well, we can decide to enable secure-...
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 12:36:04 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:02 AM, Tao Tang wrote: As an alternative, you can simply pass SMMUState where it's missing (like smmu_ptw_64_s2) and call smmu_get_address_space from there. It will avoid having to keep this in cfg. Maybe there is another reason I missed? Regards, Pierrick
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 12:52:07 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:02 AM, Tao Tang wrote: Would that be possible to add all switch values, and use g_assert_not_reached() for SMMU_SEC_SID_NUM. This way, when adding SMMU_SEC_SID_R, we'll be directly blocked at compilation because case is missing. Regards, Pierrick
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 12:55:45 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:16 AM, Tao Tang wrote: Does it requires so much refactor it's better to keep it as a field in cfg instead? Having SMMUState passed there would allow to reuse smmu_get_address_space. Overall looks good, and my remarks above are more suggestions than blocking comments.
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 13:12:00 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:19 AM, Tao Tang wrote: I have been able to boot hafnium with: - instructions at https://hnusdr.github.io/2025/08/09/Test-Secure-SMMU-with-Hafnium-ENG/ - the current patch - qemu-system-aarch64 -global arm-smmuv3.secure-impl=on ... In case someone else wants to reproduce this easily: ``` git clone https...
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 13:31:32 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:17 AM, Tao Tang wrote: Sounds great! This will be automatically be handled if we check in smmu_base_realize that secure smmu support should be available, as mentioned on one of the previous patch. Reviewed-by: Pierrick Bouvier <pierrick.bouvier@linaro.org>
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 13:35:40 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:17 AM, Tao Tang wrote: Looks ok overall. Using SMMU_SEC_SID_NUM as a special value to trigger all flush/invalidate works, but it's a bit surprising to read to be honest. It could be more explicit to introduce the two next functions: smmu_iotlb_inv_by_sec_sid(SMMUState *s, SMMUSecSID sec_sid) smmuv3_flu...
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 13:47:35 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:18 AM, Tao Tang wrote: It seems like we use the same pattern a lot of time for various SMMU registers, and makes me wonder if we could not introduce proper register definitions with callbacks similar to Arm *_reginfo. That said, it's definitely out of the scope for this series: Reviewed-by: Pierrick Bo...
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 13:59:07 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:18 AM, Tao Tang wrote: In practice, it's not yet clear how will get this TDISP T-bit, since it's part of encrypted payload. So far, we are detecting config fetch and dynamically switching a given device to a new sec_sid accordingly. Thus, we *might* end up reusing this field eventually. All that said,...
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 14:05:26 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/25/26 1:31 PM, Pierrick Bouvier wrote: If we could have a device access directly from optee, it could be used to exercise secure translation as well. However, I'm not really sure it's how optee is supposed to be used, and it has very limited hardware support and abstractions.
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 14:07:51 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On 2/21/26 2:19 AM, Tao Tang wrote: As mentioned before, should we enable it automatically in case secure-memory address space is available at realize time? Otherwise, congrats for the great series! Reviewed-by: Pierrick Bouvier <pierrick.bouvier@linaro.org>
{ "author": "Pierrick Bouvier <pierrick.bouvier@linaro.org>", "date": "Wed, 25 Feb 2026 14:20:42 -0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:02:20PM +0800, Tao Tang wrote: I think fixes as this, should be separate, that would make the series smaller. Reviewed-by: Mostafa Saleh <smostafa@google.com> Thanks, Mostafa
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:31:05 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:02:21PM +0800, Tao Tang wrote: Same comment about fixes. Reviewed-by: Mostafa Saleh <smostafa@google.com> Thanks, Mostafa
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:31:47 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:02:22PM +0800, Tao Tang wrote: Reviewed-by: Mostafa Saleh <smostafa@google.com> Thanks, Mostafa
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:33:49 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:02:23PM +0800, Tao Tang wrote: There are a few warning from scripts/checkpatch.pl, plus some other nits I mentioned, otherwise: Reviewed-by: Mostafa Saleh <smostafa@google.com> Sometimes you have: SMMUv3RegBank *bank = smmuv3_bank(s, SMMU_SEC_SID_NS); Others SMMUv3RegBank *bk = smmuv3_bank...
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:38:03 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:02:25PM +0800, Tao Tang wrote: What does this defend against? Thanks, Mostafa
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:39:18 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:02:28PM +0800, Tao Tang wrote: The IDR is not currently set, we can just safely return bad_ste for “SMMU_SEC_SID_S”, no need to complicate things until SEL2 is supported. Thanks, Mostafa
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:39:55 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:16:32PM +0800, Tao Tang wrote: I feel this patch would be better squashed with how it’s used, but no strong opinion. Thanks, Mostafa
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:41:04 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:16:40PM +0800, Tao Tang wrote: I am not sure about this, when I added stage-2 I re-used the same TLB instance as it might be used for nesting, and we can have end-to-end cached entires. For secure state, I think it’s cleaner to instantiate a new TLB, as both states can never mix, and in this...
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:45:46 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:17:06PM +0800, Tao Tang wrote: I don’t think that VFIO cares about secure regime, my guess is to keep the functions as this and don’t call them for secure invalidations. Thanks, Mostafa
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:47:55 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:17:33PM +0800, Tao Tang wrote: This is a separate fix, it can be sent standalone to make this series smaller, similarly the first patch. Also the "Fixes" comment is not accurate, that was probably broken from the stage-2 implementation which was added later. Reviewed-by: Mostafa Saleh <smos...
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:49:10 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
On Sat, Feb 21, 2026 at 06:18:29PM +0800, Tao Tang wrote: This breaks all registers above 4k? For example, TCU registers/PMU reside on some of this area and if SW writes to those this might be aliased to something as CR0, which might disable the SMMU and bypass some security checks. (in case it’s managed by the hyperv...
{ "author": "Mostafa Saleh <smostafa@google.com>", "date": "Fri, 27 Feb 2026 14:59:21 +0000", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Hi Pierrick, On 2026/2/26 04:52, Pierrick Bouvier wrote: My original motivation for having an extra ns_as (and caching as/txattrs) was tied to the architectural semantics: a transaction being "secure" does not automatically mean the walk can access Secure PAS. Whether the walk can touch Secure PAS (or is effectiv...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Fri, 27 Feb 2026 23:20:48 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Hi Pierrick, On 2026/2/26 04:55, Pierrick Bouvier wrote: Thanks for the suggestion. I'll refactor it like below:     switch (sec_sid) {     case SMMU_SEC_SID_S:         return ARMSS_Secure;     case SMMU_SEC_SID_NS:         return ARMSS_NonSecure;     case SMMU_SEC_SID_NUM:         g_assert_not_reached(); ...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Fri, 27 Feb 2026 23:35:39 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Hi Pierrick, On 2026/2/26 05:47, Pierrick Bouvier wrote: Thank you for the review and the suggestion. I agree that using SMMU_SEC_SID_NUM as a special value to trigger a full flush/invalidate is not ideal in terms of readability. I will adopt your approach and split the functions in the next version. Best regard...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Fri, 27 Feb 2026 23:41:31 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Hi Pierrick, On 2026/2/26 05:59, Pierrick Bouvier wrote: Thanks for your suggestion. I will consider refactoring it after merging the current series. Best regards, Tao
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Fri, 27 Feb 2026 23:44:22 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Hi Pierrick, On 2026/2/26 05:31, Pierrick Bouvier wrote: Thanks for the test! Hafnium is indeed a good way to exercise Secure register and Secure command queue access. Best regards, Tao
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 28 Feb 2026 00:13:24 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
As a preliminary step towards a multi-security-state configuration cache, introduce MemTxAttrs and AddressSpace * members to the SMMUTransCfg struct. The goal is to cache these attributes so that internal functions can use them directly. To facilitate this, hw/arm/arm-security.h is now included in smmu-common.h. This ...
null
null
null
[RFC v4 08/31] hw/arm/smmuv3: Plumb transaction attributes into config helpers
Hi Pierrick, On 2026/2/26 06:20, Pierrick Bouvier wrote: Let me take this opportunity to address the same concern you raised across patches #07, #17, and #30 on the secure-impl vs secure-memory topic. My initial intent was a demand-driven (lazy) validation model — i.e. only validate Secure capability when a devi...
{ "author": "Tao Tang <tangtao1634@phytium.com.cn>", "date": "Sat, 28 Feb 2026 00:16:15 +0800", "is_openbsd": false, "thread_id": "aaGsS9ldIqXZqhpk@google.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
If the Guest provides a DMA address that is associated with a ram device (such as a VFIO PCI device region and not its system memory), then we can obtain the hva (host virtual address) by invoking address_space_translate() followed by memory_region_get_ram_ptr(). We cannot use dma_memory_map() because for memory regio...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:06 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
There are cases when a blob resource's backing might get detached and re-attached again such as when the underlying object is getting migrated in the Guest. In these situations, we need to obtain a new dmabuf fd, which can be done by calling virtio_gpu_init_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:05 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
Having a way to figure out the region index (or bar) associated with a memory region is helpful in various scenarios. For example, this capability can be useful in retrieving the region info needed for mapping a part of a VFIO region or creating a dmabuf. Cc: Alex Williamson <alex@shazbot.org> Cc: Cédric Le Goater <cl...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:11 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
This is prep-work for adding the ability to create dmabuf fds from VFIO devices in addition to udmabuf. Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson <...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:07 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
In order to mmap a dmabuf, we first need to create a placeholder mapping that would fit the entire size of the dmabuf. This mapping would then be replaced with smaller mappings of individual dmabuf segments. Cc: Alex Williamson <alex@shazbot.org> Cc: Cédric Le Goater <clg@redhat.com> Signed-off-by: Vivek Kasireddy <vi...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:13 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
In addition to memfd, a blob resource can also have its backing storage in a VFIO device region. Since, there is no effective way to determine where the backing storage is located, we first try to create a dmabuf assuming it is in memfd. If that fails, we try to create a dmabuf assuming it is in VFIO device region. So...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:14 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
The virtio-gpu driver running in the Guest VM can create Guest blob resources (by importing dmabufs) that are backed by System RAM. This is made possible by making use of memfd memory backend and udmabuf driver on the Host side. However, in order to create Guest blobs that are backed by vfio-pci device regions (which h...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:04 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
There is no need to wrap the call to qemu_ram_block_from_host() with rcu_read_lock/unlock as we already hold a reference to the memory region that owns the ram block. Note that, the reference was obtained via dma_memory_map() while creating the mapping. Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Benn...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:08 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
Make the error handling more robust in virtio_gpu_init_udmabuf() by introducing 'Error **' parameter to capture errors and an enum to categorize Guest and Host errors. This allows for better error reporting and handling of errors from virtio_gpu_create_udmabuf() and virtio_gpu_remap_dmabuf(). Cc: Marc-André Lureau <ma...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:10 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
In order to create a dmabuf associated with a buffer that spans multiple ranges, we first need to identify the VFIO region and index the buffer (represented by iovec) belongs to and then translate its addresses to offsets within that region. The qemu_ram_block_from_host() API gives us both the region and the offset in...
{ "author": "Vivek Kasireddy <vivek.kasireddy@intel.com>", "date": "Mon, 23 Feb 2026 00:00:12 -0800", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
On 2026/02/23 17:00, Vivek Kasireddy wrote: This is VFIO's implementation and shouldn't be here. Follow what hw/vfio/iommufd-stubs.c, the previously-mentioned example, does. This logic is faulty. err is not set by vfio_device_create_dmabuf(), so it reports a guest error even when the memory is compatible with vfio...
{ "author": "Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp>", "date": "Tue, 24 Feb 2026 12:51:55 +0900", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
On 2026/02/23 17:00, Vivek Kasireddy wrote: include/qapi/error.h says: Do what it says. Non-negative if *errp is set. Negative otherwise. It is a valid ramblock even if rb->fd < 0. It is just "incompatible" with udmabuf. s/mem/memory/ The log is not that long so we can have a full correct spelling. This print...
{ "author": "Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp>", "date": "Tue, 24 Feb 2026 12:58:36 +0900", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
Hi Akihiko, Ok, I'll move this file to hw/vfio directory. Maybe I misunderstood your previous comment about this but I thought we are going to assume that if both virtio_gpu_create_udmabuf() and vfio_device_create_dmabuf() fail (assuming Guest error in case of virtio_gpu_create_udmabuf ()) then it is reasonable to as...
{ "author": "\"Kasireddy, Vivek\" <vivek.kasireddy@intel.com>", "date": "Wed, 25 Feb 2026 06:03:48 +0000", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
Hi Akihiko, Ok, I'll change the values in the following way: typedef enum VirtIOGPUErrorType { VIRTIO_GPU_NO_ERROR = 1, /* Guest is responsible for this error */ VIRTIO_GPU_GUEST_ERROR = -1, /* Host is at fault for this error */ VIRTIO_GPU_HOST_ERROR = -2, } VirtIOGPUErrorType; Does "IOV memory ad...
{ "author": "\"Kasireddy, Vivek\" <vivek.kasireddy@intel.com>", "date": "Wed, 25 Feb 2026 06:04:46 +0000", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
On 2026/02/25 15:03, Kasireddy, Vivek wrote: It's not what I suggested. What I suggested is as follows: https://lore.kernel.org/qemu-devel/c7c03384-4815-4032-89bd-de1ef90bb949@rsg.ci.i.u-tokyo.ac.jp/ It is not correct to assume vfio_device_create_dmabuf() is failed due to a guest error when virtio_gpu_create_udmabu...
{ "author": "Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp>", "date": "Wed, 25 Feb 2026 15:14:35 +0900", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
On 2026/02/25 15:04, Kasireddy, Vivek wrote: scripts/checkpatch.pl explicitly allows to have a longer line for string literals. Priotize the user-visible behavior than keeping the code tidy. Do not locally override the behavior of the codebase-wide infrastructure. If you think a guest error needs to be logged by ...
{ "author": "Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp>", "date": "Wed, 25 Feb 2026 15:33:52 +0900", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
Hi Akihiko, Sounds good. I'll replace mem with memory. Ok, I'll change it such that error_report_err(local_err) is only done in the case of Host error. And, in the case of Guest error, I plan to just have error_free(local_err) in addition to invoking qemu_log_mask(). Thanks, Vivek
{ "author": "\"Kasireddy, Vivek\" <vivek.kasireddy@intel.com>", "date": "Thu, 26 Feb 2026 06:18:28 +0000", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
Hi Akihiko, Ok, I plan to add the following enum and make it available to VFIO and virtio-gpu-dmabuf.c: typedef enum DmabufCreateErrorType { DMABUF_CREATE_NO_ERROR = 1, /* Guest is responsible for this error */ DMABUF_CREATE_GUEST_ERROR = -1, /* Host is at fault for this error */ DMABUF_CREATE_HOST...
{ "author": "\"Kasireddy, Vivek\" <vivek.kasireddy@intel.com>", "date": "Thu, 26 Feb 2026 06:22:34 +0000", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
On 2026/02/26 15:22, Kasireddy, Vivek wrote: When there is no error, vfio_device_create_dmabuf() should return the file descriptor instead (see e.g., qemu_open()). I would prefix the names VFIO and put it into include/hw/vfio/vfio-device.h. In that case, using it for udmabuf is cheating, but I think it's fine sinc...
{ "author": "Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp>", "date": "Thu, 26 Feb 2026 18:55:58 +0900", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
Avoid the manual g_free() calls for the list pointer by using g_autofree in virtio_gpu_create_udmabuf(). Cc: Marc-André Lureau <marcandre.lureau@redhat.com> Cc: Alex Bennée <alex.bennee@linaro.org> Cc: Akihiko Odaki <odaki@rsg.ci.i.u-tokyo.ac.jp> Cc: Dmitry Osipenko <dmitry.osipenko@collabora.com> Cc: Alex Williamson ...
null
null
null
[PATCH v7 05/10] virtio-gpu-dmabuf: Use g_autofree for the list pointer
Hi Akihiko, Ok, I'll remove DMABUF_CREATE_NO_ERROR from this enum and follow your suggestion to return fd in case of no error. Ok, got it. I'll rename and move the enum to vfio-device.h. Thanks, Vivek
{ "author": "\"Kasireddy, Vivek\" <vivek.kasireddy@intel.com>", "date": "Fri, 27 Feb 2026 02:06:23 +0000", "is_openbsd": false, "thread_id": "20260223080200.468558-1-vivek.kasireddy@intel.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Emmanuel Blot <eblot@rivosinc.com> Follow vendor-device syntax used with other RISCV cores Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> --- hw/riscv/opentitan.c | 2 +- target/riscv/cpu-qom.h | 2 +- target/riscv/cpu.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/hw/riscv/o...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Thu, 27 Apr 2023 19:39:11 +0200", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
This is the start of efforts to contribute code from the lowRISC fork of QEMU to bring the QEMU support for OpenTitan machines in line with Earl Grey 1.0 by adding a new machine called ot-earlgrey. This work was done by Emmanuel Blot and Loïc Lefort from Rivos, and various people at lowRISC. This patch set in particula...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Fri, 20 Feb 2026 15:02:47 +0000", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Loïc Lefort <loic@rivosinc.com> Signed-off-by: Loïc Lefort <loic@rivosinc.com> --- include/hw/opentitan/ot_common.h | 93 ++++++++++++++++++++++++++++++++ 1 file changed, 93 insertions(+) create mode 100644 include/hw/opentitan/ot_common.h diff --git a/include/hw/opentitan/ot_common.h b/include/hw/opentitan/o...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Fri, 17 Feb 2023 16:10:15 +0100", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Emmanuel Blot <eblot@rivosinc.com> Use a separate Kconfig symbols for Ibex UART, Timer, and SPI devices: having an Ibex CPU does not imply usage of these specific implementations. Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> --- hw/char/Kconfig | 3 +++ hw/char/meson.build | 2 +- hw/riscv/Kconfig...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Mon, 30 Jan 2023 13:14:50 +0100", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- target/riscv/cpu.c | 2 +- target/riscv/cpu.h | 7 ++++ target/riscv/ibex_csr.c | 85 ++++++++++++++++++++++++++++++++++++++++ target/riscv/m...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Tue, 07 Feb 2023 16:59:35 +0100", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Emmanuel Blot <eblot@rivosinc.com> 1. Define a generic version of lowrisc-ibex core that can be used in several machines: - leave MISA empty so that generic properties can be defined for this core - remove all arbitrary default properties but ISA I,C,U which are mandatory for ibex - define default mtvec whic...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Thu, 27 Apr 2023 19:45:37 +0200", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> --- target/riscv/cpu.c | 24 ++++++++++++++++++++++++ target/riscv/cpu_cfg_fields.h.inc | 7 +++++++ 2 files changed, 31 insertions(+) diff --git a/target/riscv/cpu.c b/target/riscv/cpu.c index 507061e8e9..73aa...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Wed, 15 Feb 2023 18:17:31 +0100", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Lex Bailey <lex.bailey@lowrisc.org> Includes existing MIT licenced code (already published elsewhere) --- hw/opentitan/Kconfig | 2 + hw/opentitan/meson.build | 1 + hw/opentitan/ot_alert.c | 668 ++++++++++++++++++++++++++++++++ h...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Thu, 16 Feb 2023 17:11:22 +0100", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Lex Bailey <lex.bailey@lowrisc.org> --- MAINTAINERS | 14 +- hmp-commands-info.hx | 12 ++ hw/riscv/Kconfig | 3 + hw/riscv/ibex_common.c | 316 ++++++++++++++++++++++++++++++++ hw/riscv/meson.build ...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Mon, 05 Jun 2023 12:24:08 +0200", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> --- target/riscv/ibex_csr.c | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) diff --git a/target/riscv/ibex_csr.c b/target/riscv/ibex_csr.c index d62638bbfb..a6e815e782 100644 --- a/target/riscv/ibex_csr.c...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Wed, 29 Mar 2023 19:16:44 +0200", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
From: Emmanuel Blot <eblot@rivosinc.com> also adds property no_epmp_cfg on EarlGrey machine to disable default ePMP configuration. Usage: qemu-system-riscv32 -M ot-earlgrey,no-epmp-cfg=true [...] Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Loïc Lefort <loic@rivosinc.com> --- hw/riscv/ot_earlg...
{ "author": "~lexbaileylowrisc <lexbaileylowrisc@git.sr.ht>", "date": "Wed, 15 Feb 2023 18:18:54 +0100", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
Hey Lex! For some reason it looks like your patches are all dated to 2023, probably the original date of the change made. Besides that, it looks like its not on top of the master branch so they don't apply cleanly when I try to pull them down (the two quick culprits I saw are the hw/core/* files that got moved to be j...
{ "author": "Nabih Estefan <nabihestefan@google.com>", "date": "Fri, 20 Feb 2026 14:33:40 -0800", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
On Thu, 2023-04-27 at 19:39 +0200, ~lexbaileylowrisc wrote: Reviewed-by: Alistair Francis <alistair.francis@wdc.com> Alistair
{ "author": "Alistair Francis <Alistair.Francis@wdc.com>", "date": "Thu, 26 Feb 2026 23:46:48 +0000", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
On Mon, 2023-01-30 at 13:14 +0100, ~lexbaileylowrisc wrote: Your patch titles are a little long. You don't need to include `qemu` or `[ot]` in the patch and commit titles. Why is this required though? You are missing your SoB here (and in other patches) Why does this need to be changed? Alistair
{ "author": "Alistair Francis <Alistair.Francis@wdc.com>", "date": "Thu, 26 Feb 2026 23:49:26 +0000", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
On Mon, 2023-06-05 at 12:24 +0200, ~lexbaileylowrisc wrote: A change like this should be it's own patch. But we should leave as is. It seems a bit strange to change it to a email that has never reviewed or even submitted a patch. If you guys want to help maintain things that's great! But let's start off with some re...
{ "author": "Alistair Francis <Alistair.Francis@wdc.com>", "date": "Thu, 26 Feb 2026 23:58:28 +0000", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
On Tue, 2023-02-07 at 16:59 +0100, ~lexbaileylowrisc wrote: You need to add commit messages This needs to be above the SoB We don't want custom CSRs here Is new MIT code allowed in QEMU? Alistair
{ "author": "Alistair Francis <Alistair.Francis@wdc.com>", "date": "Fri, 27 Feb 2026 00:04:06 +0000", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
On Thu, 2023-04-27 at 19:45 +0200, ~lexbaileylowrisc wrote: There seems to be some extra churn in this patch We want to match the QEMU code style Alistair
{ "author": "Alistair Francis <Alistair.Francis@wdc.com>", "date": "Fri, 27 Feb 2026 00:10:40 +0000", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
From: Emmanuel Blot <eblot@rivosinc.com> Signed-off-by: Emmanuel Blot <eblot@rivosinc.com> Includes existing MIT licenced code (already published elsewhere) --- include/hw/riscv/ibex_irq.h | 69 +++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 include/hw/riscv/ibex_irq.h di...
null
null
null
[PATCH qemu 10/11] [ot] hw/riscv: add an IRQ wrapper
On Fri, 2026-02-20 at 15:02 +0000, ~lexbaileylowrisc wrote: Thanks for the patches! I think we should just use the existing OpenTitan machine instead of adding a new one I gave a bunch of comments and some of them will apply to the entire series. In general: - Commits need SoB lines and commit messages describin...
{ "author": "Alistair Francis <Alistair.Francis@wdc.com>", "date": "Fri, 27 Feb 2026 00:19:41 +0000", "is_openbsd": false, "thread_id": "281f648affa677c3e3b9659b08b780c2abc9bb59.camel@wdc.com.mbox.gz" }
lkml_critique
qemu-devel
>From Windows 8.1 onwards ISA serial IRQs cannot be shared when ACPI Revision 5.0 is used in the FACP table. The reason for this is that if a 2-byte IRQ Descriptor is used then the interrupt is considered to be high true, edge sensitive, non-shareable. Since legacy serial ports COM1/3 and COM2/4 share an IRQ then if mo...
null
null
null
[PATCH 0/5] isa-serial: acpi: declare shared IRQs for COM1/3 and COM2/4
The existing aml_interrupt() uses the Extended Interrupt Descriptor to store the interrupt information, however newer Windows will only parse the standard IRQ Descriptor when enumerating ISA serial ports. Signed-off-by: Mark Cave-Ayland <mark.caveayland@nutanix.com> --- include/hw/acpi/aml-build.h | 2 ++ hw/acpi/am...
{ "author": "Mark Cave-Ayland <mark.caveayland@nutanix.com>", "date": "Fri, 27 Feb 2026 13:44:55 +0000", "is_openbsd": false, "thread_id": "20260227134611.1229390-4-mark.caveayland@nutanix.com.mbox.gz" }
lkml_critique
qemu-devel
>From Windows 8.1 onwards ISA serial IRQs cannot be shared when ACPI Revision 5.0 is used in the FACP table. The reason for this is that if a 2-byte IRQ Descriptor is used then the interrupt is considered to be high true, edge sensitive, non-shareable. Since legacy serial ports COM1/3 and COM2/4 share an IRQ then if mo...
null
null
null
[PATCH 0/5] isa-serial: acpi: declare shared IRQs for COM1/3 and COM2/4
Signed-off-by: Mark Cave-Ayland <mark.caveayland@nutanix.com> --- tests/qtest/bios-tables-test-allowed-diff.h | 47 +++++++++++++++++++++ 1 file changed, 47 insertions(+) diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h index dfb8523c8b..cef44135bc 100644 --- a/te...
{ "author": "Mark Cave-Ayland <mark.caveayland@nutanix.com>", "date": "Fri, 27 Feb 2026 13:44:57 +0000", "is_openbsd": false, "thread_id": "20260227134611.1229390-4-mark.caveayland@nutanix.com.mbox.gz" }
lkml_critique
qemu-devel
>From Windows 8.1 onwards ISA serial IRQs cannot be shared when ACPI Revision 5.0 is used in the FACP table. The reason for this is that if a 2-byte IRQ Descriptor is used then the interrupt is considered to be high true, edge sensitive, non-shareable. Since legacy serial ports COM1/3 and COM2/4 share an IRQ then if mo...
null
null
null
[PATCH 0/5] isa-serial: acpi: declare shared IRQs for COM1/3 and COM2/4
These functions are required to generate a suitable _PRS entry for the ISA serial ports. Signed-off-by: Mark Cave-Ayland <mark.caveayland@nutanix.com> --- include/hw/acpi/aml-build.h | 2 ++ hw/acpi/aml-build-stub.c | 10 ++++++++++ hw/acpi/aml-build.c | 15 +++++++++++++++ 3 files changed, 27 insertions(...
{ "author": "Mark Cave-Ayland <mark.caveayland@nutanix.com>", "date": "Fri, 27 Feb 2026 13:44:56 +0000", "is_openbsd": false, "thread_id": "20260227134611.1229390-4-mark.caveayland@nutanix.com.mbox.gz" }