Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.2/patches/2223450/?format=api
{ "id": 2223450, "url": "http://patchwork.ozlabs.org/api/1.2/patches/2223450/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260415105552.622421-20-skolothumtho@nvidia.com/", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/1.2/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260415105552.622421-20-skolothumtho@nvidia.com>", "list_archive_url": null, "date": "2026-04-15T10:55:40", "name": "[v4,19/31] hw/arm/tegra241-cmdqv: Allocate HW VCMDQs on base register programming", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "67c1d647217bdea0c89a6865d77439798cc1263c", "submitter": { "id": 91580, "url": "http://patchwork.ozlabs.org/api/1.2/people/91580/?format=api", "name": "Shameer Kolothum Thodi", "email": "skolothumtho@nvidia.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260415105552.622421-20-skolothumtho@nvidia.com/mbox/", "series": [ { "id": 499965, "url": "http://patchwork.ozlabs.org/api/1.2/series/499965/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=499965", "date": "2026-04-15T10:55:21", "name": "hw/arm/virt: Introduce Tegra241 CMDQV support for accelerated SMMUv3", "version": 4, "mbox": "http://patchwork.ozlabs.org/series/499965/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2223450/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2223450/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=Nvidia.com header.i=@Nvidia.com header.a=rsa-sha256\n header.s=selector2 header.b=EK2MWn2j;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists1p.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists1p.gnu.org (lists1p.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fwdSY6BGsz1yHM\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 15 Apr 2026 20:59:25 +1000 (AEST)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists1p.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1wCxx3-0002FO-L4; Wed, 15 Apr 2026 06:58:33 -0400", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists1p.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <skolothumtho@nvidia.com>)\n id 1wCxwn-0001dU-Vo; Wed, 15 Apr 2026 06:58:19 -0400", "from mail-westus3azlp170100009.outbound.protection.outlook.com\n ([2a01:111:f403:c107::9] helo=PH7PR06CU001.outbound.protection.outlook.com)\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <skolothumtho@nvidia.com>)\n id 1wCxwd-00048i-42; Wed, 15 Apr 2026 06:58:17 -0400", "from MN0PR03CA0020.namprd03.prod.outlook.com (2603:10b6:208:52f::27)\n by PH8PR12MB6843.namprd12.prod.outlook.com (2603:10b6:510:1ca::14)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.20; Wed, 15 Apr\n 2026 10:58:00 +0000", "from BL02EPF00021F6B.namprd02.prod.outlook.com\n (2603:10b6:208:52f:cafe::1c) by MN0PR03CA0020.outlook.office365.com\n (2603:10b6:208:52f::27) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.49 via Frontend Transport; Wed,\n 15 Apr 2026 10:57:59 +0000", "from mail.nvidia.com (216.228.117.161) by\n BL02EPF00021F6B.mail.protection.outlook.com (10.167.249.7) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9769.17 via Frontend Transport; Wed, 15 Apr 2026 10:57:59 +0000", "from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com\n (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Wed, 15 Apr\n 2026 03:57:45 -0700", "from NV-2Y5XW94.nvidia.com (10.126.230.37) by rnnvmail201.nvidia.com\n (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Wed, 15 Apr\n 2026 03:57:41 -0700" ], "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=YK1ZsxWJ2YunerBJwxFGHgevJJXoGFvgrnJLwdd1kcJ7ms8xImhicaRAL54FLlIVKU46l/wPV9gLJSFSGatcZwlN+kSxpKJu/bLZtoGMOUbYAmFm8xYQbxKywsr2sDEf8corWmOpfyT+7wu5b4ScbVU2tNUSryM4EwA2kEpyaOTQ/muf4bceFATIYbocoVLUrsz6gau6SQFFTGrqGIFuz0IlmJo5AfNTFS/RyESr7HPJXP5ddQJlZ48FtcPCufWW/PgrkdVKi2RYH1IBoVVu0TPMtynL4C6LFTT9E7UlfRFC2XAVzgp0DMOTAf/6BsnG0DFqH7X1b7M88Sam+LdqQg==", "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=+9DLOFcifzj837AUe7jnzWPo14/2YneH1gFZE/ch9RI=;\n b=vgTSKvoangbNEOnzXY3w+ECyqx0ljkOPO0kbAraZiC7GJVv0G2HTnlCE4AAnzRLohuIOgbaOk+Fb5zSVQHv53FFIEbaQXnHtPW6j7NkrRGlmeT+gO6dA7e7E7MRstxcS6CPSD7O7P34qvJPKSy80xc0J0Rst9W998nH/jcu9y4BxNRPuNhPyXIXwFbJ3lP1bacGEWgRUCt5/YaVWbUwTbtE079nHIH7cyu6KAehcDVTdabjhvHS0zcqdIRqr/bVn540sHeKji18aIuzgT0vS0aRFDHLp9X/CqePSbC16nd4Y0ypWgy941UAs3XG9NWYnkhTZq+kRrnanxMiWkaTaSg==", "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 216.228.117.161) smtp.rcpttodomain=nongnu.org smtp.mailfrom=nvidia.com;\n dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com;\n dkim=none (message not signed); arc=none (0)", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com;\n s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=+9DLOFcifzj837AUe7jnzWPo14/2YneH1gFZE/ch9RI=;\n b=EK2MWn2jllgYh8T7vQ+IAQOEXCyWYm2znhsgfOSvRGZs9Ex1vzt/mHF4xP8C4uS+gJVi+LBdF5gYXQjHX1BMYX+L+8zrqJNhPSYk7Y+Ftr1rz8bXc2N1eGy91ih1DVi17DV0fak/JVmCTWMLXC653KefkZwASoE/4esVrqoJacj9DSSUqhxIrpP4pzGDoCqJladSElYJJCX1IyS/yScwn8ZkWO6WmbyloCNpwXQurQT60kdl6RgcKiVXpu1Z4qXbi1K0l8R0RSjC9+fGYoX3rxjOnJqmifS+yRjIX5J7wCJzAeO/DHvMiuJeBPrCUkFDLb5aMKYZEuUE0pOJpwy/cg==", "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 216.228.117.161)\n smtp.mailfrom=nvidia.com;\n dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=nvidia.com;", "Received-SPF": [ "Pass (protection.outlook.com: domain of nvidia.com designates\n 216.228.117.161 as permitted sender) receiver=protection.outlook.com;\n client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C", "permerror client-ip=2a01:111:f403:c107::9;\n envelope-from=skolothumtho@nvidia.com;\n helo=PH7PR06CU001.outbound.protection.outlook.com" ], "From": "Shameer Kolothum <skolothumtho@nvidia.com>", "To": "<qemu-arm@nongnu.org>, <qemu-devel@nongnu.org>", "CC": "<eric.auger@redhat.com>, <peter.maydell@linaro.org>, <clg@redhat.com>,\n <alex@shazbot.org>, <nicolinc@nvidia.com>, <nathanc@nvidia.com>,\n <mochs@nvidia.com>, <jan@nvidia.com>, <jgg@nvidia.com>,\n <jonathan.cameron@huawei.com>, <zhenzhong.duan@intel.com>,\n <kjaju@nvidia.com>, <phrdina@redhat.com>, <skolothumtho@nvidia.com>", "Subject": "[PATCH v4 19/31] hw/arm/tegra241-cmdqv: Allocate HW VCMDQs on base\n register programming", "Date": "Wed, 15 Apr 2026 11:55:40 +0100", "Message-ID": "<20260415105552.622421-20-skolothumtho@nvidia.com>", "X-Mailer": "git-send-email 2.43.0", "In-Reply-To": "<20260415105552.622421-1-skolothumtho@nvidia.com>", "References": "<20260415105552.622421-1-skolothumtho@nvidia.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-Originating-IP": "[10.126.230.37]", "X-ClientProxiedBy": "rnnvmail203.nvidia.com (10.129.68.9) To\n rnnvmail201.nvidia.com (10.129.68.8)", "X-EOPAttributedMessage": "0", "X-MS-PublicTrafficType": "Email", "X-MS-TrafficTypeDiagnostic": "BL02EPF00021F6B:EE_|PH8PR12MB6843:EE_", "X-MS-Office365-Filtering-Correlation-Id": "95d5088c-89fe-48db-fbab-08de9adddba3", "X-MS-Exchange-SenderADCheck": "1", "X-MS-Exchange-AntiSpam-Relay": "0", "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|1800799024|36860700016|82310400026|376014|56012099003|18002099003|22082099003;", "X-Microsoft-Antispam-Message-Info": "\n 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", "X-Forefront-Antispam-Report": "CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1;\n SRV:;\n IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE;\n SFS:(13230040)(1800799024)(36860700016)(82310400026)(376014)(56012099003)(18002099003)(22082099003);\n DIR:OUT; SFP:1101;", "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1", "X-MS-Exchange-AntiSpam-MessageData-0": "\n ajwxM8QDwYU7x1bR/fn0H/CpGYTsGxBPiBWgpTlbcA4OuZbaaaCA0zmmPdXD8us1ewHkdeLhV0U5jV+jRi0yIJyp0To18+W4onWLI3Q8KW/kxM5BlRJHCeghQpv8yPf7e/4ZWwrZ+sZFuMgdmA3gvpeeAotDLB8ukqRp9yG2QUzqLIZL1ELeatau8t0QudZ6SnA3fH08NFCljxqjSkON1DaTzU2mpRmIxpN9XJ9Vm26ajI9hCriLfN7cTAgzl15SmrTfaApbc/PdXn0z6ri2zMpsgPVhZYSXGmEeLPw8hJKnloD87oDiTpeFTC+8GL+tGR9/Z/LU64dcVi8aWV6tkI0cewaXZkSeaDmirevM0hsK+hbVi9xYuOfdhv5wXBCJekMERKu4c5orHigwDlNTsk3BtEokyT8FxCnlOC8FcagBxsGCY0SVsYNGEaN2NXne", "X-OriginatorOrg": "Nvidia.com", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "15 Apr 2026 10:57:59.4674 (UTC)", "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 95d5088c-89fe-48db-fbab-08de9adddba3", "X-MS-Exchange-CrossTenant-Id": "43083d15-7273-40c1-b7db-39efd9ccc17a", "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161];\n Helo=[mail.nvidia.com]", "X-MS-Exchange-CrossTenant-AuthSource": "\n BL02EPF00021F6B.namprd02.prod.outlook.com", "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous", "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "PH8PR12MB6843", "X-Spam_score_int": "-25", "X-Spam_score": "-2.6", "X-Spam_bar": "--", "X-Spam_report": "(-2.6 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.54,\n DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "From: Nicolin Chen <nicolinc@nvidia.com>\n\nAdd support for allocating IOMMUFD hardware queues when the guest\nprograms the VCMDQ BASE registers.\n\nVCMDQ_EN is part of the VCMDQ_CONFIG register, which is accessed\nthrough the VINTF Page0 region. A subsequent patch maps this region\ndirectly into the guest address space, so QEMU does not trap writes\nto VCMDQ_CONFIG.\n\nSince VCMDQ_EN writes are not trapped, QEMU cannot allocate the\nhardware queue based on that bit. Instead, allocate the IOMMUFD\nhardware queue when the guest writes a VCMDQ BASE register with a\nvalid RAM-backed address and when CMDQV and VINTF are enabled.\n\nIf a hardware queue was previously allocated for the same VCMDQ,\nfree it before reallocation.\n\nWrites with invalid addresses are ignored.\n\nAll allocated VCMDQs are freed when CMDQV or VINTF is disabled.\n\nSigned-off-by: Nicolin Chen <nicolinc@nvidia.com>\nSigned-off-by: Shameer Kolothum <skolothumtho@nvidia.com>\n---\n hw/arm/tegra241-cmdqv.h | 11 +++++++\n hw/arm/tegra241-cmdqv.c | 70 +++++++++++++++++++++++++++++++++++++++--\n 2 files changed, 78 insertions(+), 3 deletions(-)", "diff": "diff --git a/hw/arm/tegra241-cmdqv.h b/hw/arm/tegra241-cmdqv.h\nindex 88572ad939..039d86374f 100644\n--- a/hw/arm/tegra241-cmdqv.h\n+++ b/hw/arm/tegra241-cmdqv.h\n@@ -44,6 +44,7 @@ typedef struct Tegra241CMDQV {\n MemoryRegion mmio_cmdqv;\n qemu_irq irq;\n IOMMUFDVeventq *veventq;\n+ IOMMUFDHWqueue *vcmdq[TEGRA241_CMDQV_MAX_CMDQ];\n void *vintf_page0;\n \n /* Register Cache */\n@@ -348,6 +349,16 @@ A_VI_VCMDQi_CONS_INDX_BASE_DRAM_L(1)\n A_VI_VCMDQi_CONS_INDX_BASE_DRAM_H(0)\n A_VI_VCMDQi_CONS_INDX_BASE_DRAM_H(1)\n \n+static inline bool tegra241_cmdq_enabled(Tegra241CMDQV *cmdqv)\n+{\n+ return cmdqv->status & R_STATUS_CMDQV_ENABLED_MASK;\n+}\n+\n+static inline bool tegra241_vintf_enabled(Tegra241CMDQV *cmdqv)\n+{\n+ return cmdqv->vintf_status & R_VINTF0_STATUS_ENABLE_OK_MASK;\n+}\n+\n const SMMUv3AccelCmdqvOps *tegra241_cmdqv_get_ops(void);\n \n #endif /* HW_ARM_TEGRA241_CMDQV_H */\ndiff --git a/hw/arm/tegra241-cmdqv.c b/hw/arm/tegra241-cmdqv.c\nindex cdd941cec9..b5f2f74cf2 100644\n--- a/hw/arm/tegra241-cmdqv.c\n+++ b/hw/arm/tegra241-cmdqv.c\n@@ -15,6 +15,66 @@\n #include \"tegra241-cmdqv.h\"\n #include \"trace.h\"\n \n+static void tegra241_cmdqv_free_vcmdq(Tegra241CMDQV *cmdqv, int index)\n+{\n+ IOMMUFDViommu *viommu = cmdqv->s_accel->viommu;\n+ IOMMUFDHWqueue *vcmdq = cmdqv->vcmdq[index];\n+\n+ if (!vcmdq) {\n+ return;\n+ }\n+ iommufd_backend_free_id(viommu->iommufd, vcmdq->hw_queue_id);\n+ g_free(vcmdq);\n+ cmdqv->vcmdq[index] = NULL;\n+}\n+\n+static void tegra241_cmdqv_free_all_vcmdq(Tegra241CMDQV *cmdqv)\n+{\n+ /* Free in reverse order to avoid \"resource busy\" error */\n+ for (int i = (TEGRA241_CMDQV_MAX_CMDQ - 1); i >= 0; i--) {\n+ tegra241_cmdqv_free_vcmdq(cmdqv, i);\n+ }\n+}\n+\n+static bool tegra241_cmdqv_setup_vcmdq(Tegra241CMDQV *cmdqv, int index,\n+ Error **errp)\n+{\n+ SMMUv3AccelState *accel = cmdqv->s_accel;\n+ uint64_t base_mask = (uint64_t)R_VCMDQ0_BASE_L_ADDR_MASK |\n+ (uint64_t)R_VCMDQ0_BASE_H_ADDR_MASK << 32;\n+ uint64_t addr = cmdqv->vcmdq_base[index] & base_mask;\n+ uint64_t log2 = cmdqv->vcmdq_base[index] & R_VCMDQ0_BASE_L_LOG2SIZE_MASK;\n+ uint64_t size = 1ULL << (log2 + 4);\n+ IOMMUFDViommu *viommu = accel->viommu;\n+ IOMMUFDHWqueue *hw_queue;\n+ uint32_t hw_queue_id;\n+\n+ /* Ignore any invalid address. This may come as part of reset etc. */\n+ if (!address_space_is_ram(&address_space_memory, addr) ||\n+ !address_space_is_ram(&address_space_memory, addr + size - 1)) {\n+ return true;\n+ }\n+\n+ if (!tegra241_cmdq_enabled(cmdqv) || !tegra241_vintf_enabled(cmdqv)) {\n+ return true;\n+ }\n+\n+ tegra241_cmdqv_free_vcmdq(cmdqv, index);\n+\n+ if (!iommufd_backend_alloc_hw_queue(viommu->iommufd, viommu->viommu_id,\n+ IOMMU_HW_QUEUE_TYPE_TEGRA241_CMDQV,\n+ index, addr, size, &hw_queue_id,\n+ errp)) {\n+ return false;\n+ }\n+ hw_queue = g_new(IOMMUFDHWqueue, 1);\n+ hw_queue->hw_queue_id = hw_queue_id;\n+ hw_queue->viommu = viommu;\n+ cmdqv->vcmdq[index] = hw_queue;\n+\n+ return true;\n+}\n+\n /*\n * Read a VCMDQ register using VCMDQ0_* offsets.\n *\n@@ -63,7 +123,7 @@ static uint64_t tegra241_cmdqv_read_vcmdq(Tegra241CMDQV *cmdqv, hwaddr offset0,\n */\n static void tegra241_cmdqv_write_vcmdq(Tegra241CMDQV *cmdqv, hwaddr offset0,\n int index, uint64_t value,\n- unsigned size)\n+ unsigned size, Error **errp)\n {\n switch (offset0) {\n case A_VCMDQ0_CONS_INDX:\n@@ -91,11 +151,13 @@ static void tegra241_cmdqv_write_vcmdq(Tegra241CMDQV *cmdqv, hwaddr offset0,\n (cmdqv->vcmdq_base[index] & 0xffffffff00000000ULL) |\n (value & 0xffffffffULL);\n }\n+ tegra241_cmdqv_setup_vcmdq(cmdqv, index, errp);\n return;\n case A_VCMDQ0_BASE_H:\n cmdqv->vcmdq_base[index] =\n (cmdqv->vcmdq_base[index] & 0xffffffffULL) |\n ((uint64_t)value << 32);\n+ tegra241_cmdqv_setup_vcmdq(cmdqv, index, errp);\n return;\n case A_VCMDQ0_CONS_INDX_BASE_DRAM_L:\n if (size == 8) {\n@@ -204,6 +266,7 @@ static void tegra241_cmdqv_config_vintf_write(Tegra241CMDQV *cmdqv,\n cmdqv->vintf_status |= R_VINTF0_STATUS_ENABLE_OK_MASK;\n }\n } else {\n+ tegra241_cmdqv_free_all_vcmdq(cmdqv);\n tegra241_cmdqv_munmap_vintf_page0(cmdqv, errp);\n cmdqv->vintf_status &= ~R_VINTF0_STATUS_ENABLE_OK_MASK;\n }\n@@ -329,6 +392,7 @@ static void tegra241_cmdqv_write_mmio(void *opaque, hwaddr offset,\n if (value & R_CONFIG_CMDQV_EN_MASK) {\n cmdqv->status |= R_STATUS_CMDQV_ENABLED_MASK;\n } else {\n+ tegra241_cmdqv_free_all_vcmdq(cmdqv);\n cmdqv->status &= ~R_STATUS_CMDQV_ENABLED_MASK;\n }\n break;\n@@ -363,7 +427,7 @@ static void tegra241_cmdqv_write_mmio(void *opaque, hwaddr offset,\n */\n index = (offset - CMDQV_VCMDQ_PAGE0_BASE) / CMDQV_VCMDQ_STRIDE;\n tegra241_cmdqv_write_vcmdq(cmdqv, offset - index * CMDQV_VCMDQ_STRIDE,\n- index, value, size);\n+ index, value, size, &local_err);\n break;\n case A_VI_VCMDQ0_BASE_L ... A_VI_VCMDQ1_CONS_INDX_BASE_DRAM_H:\n /* Same VINTF-to-VCMDQ translation as VINTF Page0 case above */\n@@ -373,7 +437,7 @@ static void tegra241_cmdqv_write_mmio(void *opaque, hwaddr offset,\n /* Same decode logic as VCMDQ Page0 case above */\n index = (offset - CMDQV_VCMDQ_PAGE1_BASE) / CMDQV_VCMDQ_STRIDE;\n tegra241_cmdqv_write_vcmdq(cmdqv, offset - index * CMDQV_VCMDQ_STRIDE,\n- index, value, size);\n+ index, value, size, &local_err);\n break;\n default:\n qemu_log_mask(LOG_UNIMP, \"%s unhandled write access at 0x%\" PRIx64 \"\\n\",\n", "prefixes": [ "v4", "19/31" ] }