Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2194287/?format=api
{ "id": 2194287, "url": "http://patchwork.ozlabs.org/api/patches/2194287/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260208082252.288-1-clement.mathieu--drif@eviden.com/", "project": { "id": 14, "url": "http://patchwork.ozlabs.org/api/projects/14/?format=api", "name": "QEMU Development", "link_name": "qemu-devel", "list_id": "qemu-devel.nongnu.org", "list_email": "qemu-devel@nongnu.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260208082252.288-1-clement.mathieu--drif@eviden.com>", "list_archive_url": null, "date": "2026-02-08T08:22:52", "name": "intel_iommu: Do not report recoverable faults to host", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "dc5354053b5a66227b0a20f5643788b18c31e001", "submitter": { "id": 88394, "url": "http://patchwork.ozlabs.org/api/people/88394/?format=api", "name": "Clement Mathieu--Drif", "email": "clement.mathieu--drif@eviden.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/qemu-devel/patch/20260208082252.288-1-clement.mathieu--drif@eviden.com/mbox/", "series": [ { "id": 491412, "url": "http://patchwork.ozlabs.org/api/series/491412/?format=api", "web_url": "http://patchwork.ozlabs.org/project/qemu-devel/list/?series=491412", "date": "2026-02-08T08:22:52", "name": "intel_iommu: Do not report recoverable faults to host", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/491412/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2194287/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2194287/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=eviden.com header.i=@eviden.com header.a=rsa-sha256\n header.s=mail header.b=Rftj/wnt;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org\n (client-ip=209.51.188.17; helo=lists.gnu.org;\n envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from lists.gnu.org (lists.gnu.org [209.51.188.17])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4f81Bl1G1Vz1xvc\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 08 Feb 2026 19:26:37 +1100 (AEDT)", "from localhost ([::1] helo=lists1p.gnu.org)\n\tby lists.gnu.org with esmtp (Exim 4.90_1)\n\t(envelope-from <qemu-devel-bounces@nongnu.org>)\n\tid 1vp07H-0000ky-Q6; Sun, 08 Feb 2026 03:26:03 -0500", "from eggs.gnu.org ([2001:470:142:3::10])\n by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <clement.mathieu--drif@eviden.com>)\n id 1vp07G-0000kp-SI\n for qemu-devel@nongnu.org; Sun, 08 Feb 2026 03:26:02 -0500", "from smtppost.atos.net ([193.56.114.177] helo=smarthost4.atos.net)\n by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)\n (Exim 4.90_1) (envelope-from <clement.mathieu--drif@eviden.com>)\n id 1vp07C-0003zm-N9\n for qemu-devel@nongnu.org; Sun, 08 Feb 2026 03:26:02 -0500", "from smtp0.atos-infogerance.fr ([193.56.241.18])\n by smarthost4.atos.net with ESMTP/TLS/TLS_AES_256_GCM_SHA384;\n 08 Feb 2026 09:25:54 +0100", "from smtp-hub.atos-infogerance.fr (smtp-hub.atos-infogerance.fr\n [193.56.47.18])\n by smtp0.atos-infogerance.fr (8.15.2/8.15.2) with ESMTPS id 6188PrKL044134\n (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO);\n Sun, 8 Feb 2026 09:25:53 +0100", "from rocky.hd2c.dom ([129.181.244.14])\n by smtp-hub.atos-infogerance.fr (envelope-from\n clement.mathieu--drif@eviden.com) (8.15.2/8.15.2) with ESMTP id\n 6188Prfv035233; Sun, 8 Feb 2026 09:25:53 +0100", "from openbmc (unknown [10.22.85.22])\n by rocky.hd2c.dom (Postfix) with ESMTP id 0A8BA256CA5;\n Sun, 8 Feb 2026 09:25:53 +0100 (CET)", "by openbmc (Postfix, from userid 0)\n id 05EE9812AF4D; Sun, 08 Feb 2026 08:25:53 +0000 (UTC)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=eviden.com; i=@eviden.com; q=dns/txt; s=mail;\n t=1770539158; x=1802075158;\n h=from:to:cc:subject:date:message-id:mime-version:\n content-transfer-encoding;\n bh=C5hjxpopGC8KhVf5BeBDT3IdeMMhGZqqRh9FeUo9hBA=;\n b=Rftj/wntkVVu15vIPERJPmpV4sr2crnXDDX7N+yT7sExW9TO3eESDbd8\n G3ODvzK5ebfh25yWkA7LIHcb7ixNqZGJoe8wtPRewn7/LQFA50zwOIj5z\n pKvD8JFWHvqFqGSQbyWFnyqwWvT8aZnk93Xih4apdLQVXehqdmfncypd3\n euUcqleE+ihc+93EPJQi8utAPAYc21vm6dnYl0/gqNXVLxpVzOgFB4Yyf\n 76jEqJiRgxd5rMezwlV3JDLHErK6RRMj58gZNUQTn8D8pdCB4rDs/aJ3k\n zT/EE9gmTsY2AuNoUXFnZCSC/hor1swgCER4EbTXAms3yX6d3dlsZwOeu g==;", "X-CSE-ConnectionGUID": "AJX8+2OOSDC5kbzRIu7laQ==", "X-CSE-MsgGUID": "EK2SX1IlSYWbAlN+xNPbhQ==", "X-IronPort-AV": "E=Sophos;i=\"6.21,279,1763420400\"; d=\"scan'208\";a=\"824682994\"", "X-MGA-submission": "\n MDHWJ/EG4BFs71hpbiILMefWnWs77FPrQWkCGMxDrwjF6AAhB0QtRtKJsmSyRXjQXtalWqpB3afNumnk3XCQqv7dVtbGbcRBKtEv+LwfgSc3Dhxw/J9N5QxJkwJfR8qLwlX7egv4925zfSNzBmWk+mkk", "From": "Clement Mathieu--Drif <clement.mathieu--drif@eviden.com>", "To": "qemu-devel@nongnu.org", "Cc": "pbonzini@redhat.com, peterx@redhat.com, david@redhat.com, mst@redhat.com,\n jasowang@redhat.com, zhenzhong.duan@intel.com, kevin.tian@intel.com,\n yi.l.liu@intel.com, joao.m.martins@oracle.com,\n Clement Mathieu--Drif <clement.mathieu--drif@eviden.com>", "Subject": "[PATCH] intel_iommu: Do not report recoverable faults to host", "Date": "Sun, 8 Feb 2026 08:22:52 +0000", "Message-ID": "<20260208082252.288-1-clement.mathieu--drif@eviden.com>", "X-Mailer": "git-send-email 2.52.0", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Received-SPF": "pass client-ip=193.56.114.177;\n envelope-from=clement.mathieu--drif@eviden.com; helo=smarthost4.atos.net", "X-Spam_score_int": "-43", "X-Spam_score": "-4.4", "X-Spam_bar": "----", "X-Spam_report": "(-4.4 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1,\n DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,\n RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001,\n RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_PASS=-0.001,\n SPF_PASS=-0.001 autolearn=ham autolearn_force=no", "X-Spam_action": "no action", "X-BeenThere": "qemu-devel@nongnu.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "qemu development <qemu-devel.nongnu.org>", "List-Unsubscribe": "<https://lists.nongnu.org/mailman/options/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe>", "List-Archive": "<https://lists.nongnu.org/archive/html/qemu-devel>", "List-Post": "<mailto:qemu-devel@nongnu.org>", "List-Help": "<mailto:qemu-devel-request@nongnu.org?subject=help>", "List-Subscribe": "<https://lists.nongnu.org/mailman/listinfo/qemu-devel>,\n <mailto:qemu-devel-request@nongnu.org?subject=subscribe>", "Errors-To": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org", "Sender": "qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org" }, "content": "Signed-off-by: Clement Mathieu--Drif <clement.mathieu--drif@eviden.com>\n---\n hw/i386/intel_iommu.c | 26 ++++++++++++++++++++++++--\n 1 file changed, 24 insertions(+), 2 deletions(-)", "diff": "diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c\nindex dd00079a40..0735b24ac0 100644\n--- a/hw/i386/intel_iommu.c\n+++ b/hw/i386/intel_iommu.c\n@@ -1857,6 +1857,21 @@ static const bool vtd_qualified_faults[] = {\n [VTD_FR_MAX] = false,\n };\n \n+static const bool vtd_recoverable_faults[] = {\n+ [VTD_FR_WRITE] = true,\n+ [VTD_FR_READ] = true,\n+ [VTD_FR_PASID_DIR_ENTRY_P] = true,\n+ [VTD_FR_PASID_ENTRY_P] = true,\n+ [VTD_FR_FS_PAGING_ENTRY_INV] = true,\n+ [VTD_FR_FS_PAGING_ENTRY_P] = true,\n+ [VTD_FR_FS_PAGING_ENTRY_RSVD] = true,\n+ [VTD_FR_PASID_ENTRY_FSPTPTR_INV] = true,\n+ [VTD_FR_FS_NON_CANONICAL] = true,\n+ [VTD_FR_FS_PAGING_ENTRY_US] = true,\n+ [VTD_FR_SM_WRITE] = true,\n+ [VTD_FR_MAX] = false,\n+};\n+\n /* To see if a fault condition is \"qualified\", which is reported to software\n * only if the FPD field in the context-entry used to process the faulting\n * request is 0.\n@@ -1866,6 +1881,11 @@ static inline bool vtd_is_qualified_fault(VTDFaultReason fault)\n return vtd_qualified_faults[fault];\n }\n \n+static inline bool vtd_is_recoverable_fault(VTDFaultReason fault, int iommu_idx)\n+{\n+ return iommu_idx == VTD_IDX_ATS && vtd_recoverable_faults[fault];\n+}\n+\n static inline bool vtd_is_interrupt_addr(hwaddr addr)\n {\n return VTD_INTERRUPT_ADDR_FIRST <= addr && addr <= VTD_INTERRUPT_ADDR_LAST;\n@@ -2237,8 +2257,10 @@ static bool vtd_do_iommu_translate(VTDAddressSpace *vtd_as, PCIBus *bus,\n }\n \n if (ret_fr) {\n- vtd_report_fault(s, -ret_fr, is_fpd_set, source_id,\n- addr, is_write, pasid != PCI_NO_PASID, pasid);\n+ if (!vtd_is_recoverable_fault(-ret_fr, iommu_idx)) {\n+ vtd_report_fault(s, -ret_fr, is_fpd_set, source_id,\n+ addr, is_write, pasid != PCI_NO_PASID, pasid);\n+ }\n goto error;\n }\n \n", "prefixes": [] }