{"id":2221555,"url":"http://patchwork.ozlabs.org/api/1.2/patches/2221555/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-pci/patch/20260409185254.3869808-2-zhiw@nvidia.com/","project":{"id":28,"url":"http://patchwork.ozlabs.org/api/1.2/projects/28/?format=json","name":"Linux PCI development","link_name":"linux-pci","list_id":"linux-pci.vger.kernel.org","list_email":"linux-pci@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260409185254.3869808-2-zhiw@nvidia.com>","list_archive_url":null,"date":"2026-04-09T18:52:54","name":"[v3,1/1] rust: pci: add extended capability and SR-IOV support","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"9b70d0982c1d54f1a0eb2686feab0215ad9fee9a","submitter":{"id":88076,"url":"http://patchwork.ozlabs.org/api/1.2/people/88076/?format=json","name":"Zhi Wang","email":"zhiw@nvidia.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/linux-pci/patch/20260409185254.3869808-2-zhiw@nvidia.com/mbox/","series":[{"id":499342,"url":"http://patchwork.ozlabs.org/api/1.2/series/499342/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-pci/list/?series=499342","date":"2026-04-09T18:52:54","name":"Rust PCI capability infrastructure and SR-IOV support","version":3,"mbox":"http://patchwork.ozlabs.org/series/499342/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2221555/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2221555/checks/","tags":{},"related":[],"headers":{"Return-Path":"\n <linux-pci+bounces-52227-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=Nvidia.com header.i=@Nvidia.com header.a=rsa-sha256\n header.s=selector2 header.b=hpGya+Uw;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-52227-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com\n header.b=\"hpGya+Uw\"","smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=40.107.200.42","smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=nvidia.com","smtp.subspace.kernel.org;\n spf=fail smtp.mailfrom=nvidia.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fs8GV4hplz1yHG\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 10 Apr 2026 04:53:38 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 87C20300C01A\n\tfor <incoming@patchwork.ozlabs.org>; Thu,  9 Apr 2026 18:53:36 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id E3A9E314A90;\n\tThu,  9 Apr 2026 18:53:35 +0000 (UTC)","from CH5PR02CU005.outbound.protection.outlook.com\n (mail-northcentralusazon11012042.outbound.protection.outlook.com\n [40.107.200.42])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 860CE2F6184;\n\tThu,  9 Apr 2026 18:53:32 +0000 (UTC)","from PH7P221CA0020.NAMP221.PROD.OUTLOOK.COM (2603:10b6:510:32a::6)\n by IA1PR12MB8240.namprd12.prod.outlook.com (2603:10b6:208:3f2::14) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.21; Thu, 9 Apr\n 2026 18:53:25 +0000","from CY4PEPF0000E9CF.namprd03.prod.outlook.com\n (2603:10b6:510:32a:cafe::c) by PH7P221CA0020.outlook.office365.com\n (2603:10b6:510:32a::6) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9769.41 via Frontend Transport; Thu,\n 9 Apr 2026 18:53:24 +0000","from mail.nvidia.com (216.228.118.232) by\n CY4PEPF0000E9CF.mail.protection.outlook.com (10.167.241.134) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9769.17 via Frontend Transport; Thu, 9 Apr 2026 18:53:24 +0000","from drhqmail201.nvidia.com (10.126.190.180) by mail.nvidia.com\n (10.127.129.5) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20; Thu, 9 Apr\n 2026 11:53:07 -0700","from drhqmail202.nvidia.com (10.126.190.181) by\n drhqmail201.nvidia.com (10.126.190.180) with Microsoft SMTP Server\n (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.2.2562.20; Thu, 9 Apr 2026 11:53:06 -0700","from inno-dell.nvidia.com (10.127.8.12) by mail.nvidia.com\n (10.126.190.181) with Microsoft SMTP Server id 15.2.2562.20 via Frontend\n Transport; Thu, 9 Apr 2026 11:53:01 -0700"],"ARC-Seal":["i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1775760815; cv=fail;\n b=i1nLpvm8ucDGeK3X5DV6VxLaQHHY+IyQkzu4JyEz848ohXs47VrtUAD8bp9M/tQUsCUs/AffYrP40t3mDGNgdu8gWkcr7xhaIzCoCpSoQ2K/jhfJQE0B/SZbmWBaTuBQcnxmYgDDVFbQ1Gl2MEjbzGPe5CjR5jF8684jbA/KVw0=","i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=cN6NlYN0TVJExF2MzM8EzENkjvXf9o7O/3cS8LAaSN1D1wNocOJTubD4PODfE+GCtf5fVAygVVcedRskhaxufRYLrFJpPLfUBYSatYmcMDfSrBK53Irmhg41761wmSsTkPEkYnaNPs5CSH3a23JkIULmHBdnPMNiCa6kQH5qHgietHSPsQSL61siiodFvCq77ZxZXdTouQYCueWNJMlV0HUbAdBVzAGFGYLOHNTw0Iz+IwYuOEzOenbYoYB3GBbbIMYNQIY9BY5rXsf/qmcyWH9nW6GWOpBxsIfU+GQMrBp49e8n5FKJmo10RaOO8Yg35jxa/X3Ke23q7viImm/tUw=="],"ARC-Message-Signature":["i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1775760815; c=relaxed/simple;\n\tbh=m9bvymGeZ/YmQirzz+TJtjFlkq8zjLPK10lqbA1YkXY=;\n\th=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version:Content-Type;\n b=aeqqvtNXkTXqzyP+fx7LIs+rFJyIJ1IsDLVK9s5rEytKv5JOwByvKJu31QL4/w3wopuQc65Lafe0aNP2eZXpJkFIslbkhBVoPOzSUs+Nh/JQzPW7zoAyA+zcMrqSd2dOw3gz9ZC+PYEzvRze2/cnTFLmPFoHjcMxpa0WdMN1jRE=","i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=jRAnjWbbYyB5fbyY/BLNK8QZUiDXrJ92IVIETenff4E=;\n b=FRwyp3a6G6e5ly2um7Up2emu0ZWlPz0guB6UWRhRHFg9g9xzXsBoCx3g24am0DlS1mat7U+ilR65xg29bOJmdmJElqGMU1EJYbGyGCLfwMfj+ufrg5hSGP+zWC5fBhm2I5Gh1V/v31bpaw9QMCdetEbopjBQWGpZqcTh42p0DtrFHgNowUDQi0mOIC9x280HcuU6W71Gc9qa26yjhKf6ZOLG3Q1kHUYTDGn+HJ4tdyz1sA8ChnuRM67Qm8lISFPL1ztVxA0T/y3ClTJQiggx8rr5AgH8HzleVzxCfIgewGuXGz4hImZbBHG7WGAmMJszV5gMyMFJfaQAgg3JVeOlKQ=="],"ARC-Authentication-Results":["i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=nvidia.com;\n spf=fail smtp.mailfrom=nvidia.com;\n dkim=pass (2048-bit key) header.d=Nvidia.com header.i=@Nvidia.com\n header.b=hpGya+Uw; arc=fail smtp.client-ip=40.107.200.42","i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 216.228.118.232) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=nvidia.com;\n dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com;\n dkim=none (message not signed); arc=none (0)"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com;\n s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=jRAnjWbbYyB5fbyY/BLNK8QZUiDXrJ92IVIETenff4E=;\n b=hpGya+UwQQJJ35Ye0w207Q+prYVzNekHicw3awRB+R8PpvUM0YWc9S3vbC/x8N95nQvzu7/uUZw3KTQjAABLHY2uhfPJWodXxz2iz3q8xAfawh5H0EM6vBxW1EbVMwDW0SZDY9u5CrlIXouKI7zrOdjJlHQKeJqQ2bZoJE0rsRdkeZV/o9BZ942qCErBfUWCZeK/jqLrrJ4DFd2lDkLd6Nltfo/XPotruOuQbH0hu3Q9uyeRye9ao2tLzUCMX5u+pfrqUAkk8pbP1qV7IjprC51QqgdShHDEXyr8hh7yqbpSWSGwFe4gnuKroEhQSHTXvEofQfbOb5BlD5Cq2H4baQ==","X-MS-Exchange-Authentication-Results":"spf=pass (sender IP is 216.228.118.232)\n smtp.mailfrom=nvidia.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=nvidia.com;","Received-SPF":"Pass (protection.outlook.com: domain of nvidia.com designates\n 216.228.118.232 as permitted sender) receiver=protection.outlook.com;\n client-ip=216.228.118.232; helo=mail.nvidia.com; pr=C","From":"Zhi Wang <zhiw@nvidia.com>","To":"<rust-for-linux@vger.kernel.org>, <linux-pci@vger.kernel.org>,\n\t<linux-kernel@vger.kernel.org>","CC":"<dakr@kernel.org>, <aliceryhl@google.com>, <bhelgaas@google.com>,\n\t<kwilczynski@kernel.org>, <ojeda@kernel.org>, <boqun@kernel.org>,\n\t<gary@garyguo.net>, <bjorn3_gh@protonmail.com>, <lossin@kernel.org>,\n\t<a.hindborg@kernel.org>, <tmgross@umich.edu>, <markus.probst@posteo.de>,\n\t<cjia@nvidia.com>, <smitra@nvidia.com>, <ankita@nvidia.com>,\n\t<aniketa@nvidia.com>, <kwankhede@nvidia.com>, <targupta@nvidia.com>,\n\t<acourbot@nvidia.com>, <joelagnelf@nvidia.com>, <jhubbard@nvidia.com>,\n\t<kjaju@nvidia.com>, <zhiwang@kernel.org>, Zhi Wang <zhiw@nvidia.com>","Subject":"[PATCH v3 1/1] rust: pci: add extended capability and SR-IOV support","Date":"Thu, 9 Apr 2026 21:52:54 +0300","Message-ID":"<20260409185254.3869808-2-zhiw@nvidia.com>","X-Mailer":"git-send-email 2.51.0","In-Reply-To":"<20260409185254.3869808-1-zhiw@nvidia.com>","References":"<20260409185254.3869808-1-zhiw@nvidia.com>","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"8bit","X-NV-OnPremToCloud":"ExternallySecured","X-EOPAttributedMessage":"0","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"CY4PEPF0000E9CF:EE_|IA1PR12MB8240:EE_","X-MS-Office365-Filtering-Correlation-Id":"03252093-9cb0-4a32-aaa7-08de96694772","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam":"\n\tBCL:0;ARA:13230040|36860700016|376014|7416014|82310400026|1800799024|13003099007|56012099003|22082099003|18002099003;","X-Microsoft-Antispam-Message-Info":"\n\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","X-Forefront-Antispam-Report":"\n\tCIP:216.228.118.232;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc7edge1.nvidia.com;CAT:NONE;SFS:(13230040)(36860700016)(376014)(7416014)(82310400026)(1800799024)(13003099007)(56012099003)(22082099003)(18002099003);DIR:OUT;SFP:1101;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n\t9GNY1YQ7RbScTU+mGZfx67+Q7LcbmzJNbDtCrombaA9VVDx6fTK+feKOSuJ4YiJdjwle32F8XmWARBYJcBiTgZZ2cqntSD6miFbGQQ+f8Ta/FyiTYbF8z7A8lqxF1mym5/0GT2skfYOpsAY+57skiAhlNDVnTFSMPfz1U9xs5yf1HaXFPD6SiVMKK0hlMBzQqY2AyMu4iH9MncpVcBpqkqTpkZ+1BOTbd78thx3FYfP3Hxz6MiKL22ZD0xdjuWZRj2x0R5Jy1fzHQ60LcxAIW3pscvuwp4dun7tKiO6MqZzvT0/6eJrjZXoKhGxHSrE5c+zZQdmGscksJvLQ9LVIMu2H83Vhm1Cmkv4lxiWr0xTv8LI2lmQsRDG5j+YTi3NFLCSU6RMBPNE/+QtqOUes/O4VDBKYqTVPyVNm2ly3DiOpUUdf+g+qF9hJHuUcmTgr","X-OriginatorOrg":"Nvidia.com","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"09 Apr 2026 18:53:24.6335\n (UTC)","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 03252093-9cb0-4a32-aaa7-08de96694772","X-MS-Exchange-CrossTenant-Id":"43083d15-7273-40c1-b7db-39efd9ccc17a","X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp":"\n TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.118.232];Helo=[mail.nvidia.com]","X-MS-Exchange-CrossTenant-AuthSource":"\n\tCY4PEPF0000E9CF.namprd03.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Anonymous","X-MS-Exchange-CrossTenant-FromEntityHeader":"HybridOnPrem","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"IA1PR12MB8240"},"content":"Introduce extended PCI capability support in rust PCI abstraction.\n\nImplement ExtCapability<T> for PCI extended capability regions. It\ndelegates IoCapable to the underlying ConfigSpace, so io_project!/io_read!\n/io_write! work directly on capability register structs.\n\nAlso add a rust helper for the PCI_EXT_CAP_NEXT() macro.\n\nLink: https://lore.kernel.org/rust-for-linux/20260126215957.541180-1-zhiw@nvidia.com/\nCc: Gary Guo <gary@garyguo.net>\nSigned-off-by: Zhi Wang <zhiw@nvidia.com>\n---\n rust/helpers/pci.c     |   5 +\n rust/kernel/pci.rs     |   7 ++\n rust/kernel/pci/cap.rs | 256 +++++++++++++++++++++++++++++++++++++++++\n 3 files changed, 268 insertions(+)\n create mode 100644 rust/kernel/pci/cap.rs","diff":"diff --git a/rust/helpers/pci.c b/rust/helpers/pci.c\nindex e44905317d75..5043c9909d44 100644\n--- a/rust/helpers/pci.c\n+++ b/rust/helpers/pci.c\n@@ -24,6 +24,11 @@ __rust_helper bool rust_helper_dev_is_pci(const struct device *dev)\n \treturn dev_is_pci(dev);\n }\n \n+__rust_helper u32 rust_helper_pci_ext_cap_next(u32 header)\n+{\n+\treturn PCI_EXT_CAP_NEXT(header);\n+}\n+\n #ifndef CONFIG_PCI_MSI\n __rust_helper int rust_helper_pci_alloc_irq_vectors(struct pci_dev *dev,\n \t\t\t\t\t\t    unsigned int min_vecs,\ndiff --git a/rust/kernel/pci.rs b/rust/kernel/pci.rs\nindex af74ddff6114..962c6656dc96 100644\n--- a/rust/kernel/pci.rs\n+++ b/rust/kernel/pci.rs\n@@ -31,10 +31,17 @@\n     },\n };\n \n+mod cap;\n mod id;\n mod io;\n mod irq;\n \n+pub use self::cap::{\n+    ExtCapId,\n+    ExtCapability,\n+    ExtSriovCapability,\n+    ExtSriovRegs, //\n+};\n pub use self::id::{\n     Class,\n     ClassMask,\ndiff --git a/rust/kernel/pci/cap.rs b/rust/kernel/pci/cap.rs\nnew file mode 100644\nindex 000000000000..1a25ef4cc633\n--- /dev/null\n+++ b/rust/kernel/pci/cap.rs\n@@ -0,0 +1,256 @@\n+// SPDX-License-Identifier: GPL-2.0\n+\n+//! PCI extended capability support.\n+\n+use super::{\n+    ConfigSpace,\n+    Extended, //\n+};\n+use crate::{\n+    bindings,\n+    io::{\n+        Io,\n+        IoCapable,\n+        Region, //\n+    },\n+    prelude::*,\n+    ptr::KnownSize, //\n+};\n+\n+/// PCI extended capability IDs.\n+#[repr(u16)]\n+#[derive(Debug, Clone, Copy, PartialEq, Eq)]\n+pub enum ExtCapId {\n+    /// Single Root I/O Virtualization.\n+    // CAST: `PCI_EXT_CAP_ID_SRIOV` is `0x10`, which fits in `u16`.\n+    Sriov = bindings::PCI_EXT_CAP_ID_SRIOV as u16,\n+}\n+\n+impl ExtCapId {\n+    fn as_raw(self) -> u16 {\n+        self as u16\n+    }\n+}\n+\n+/// An extended PCI capability that implements [`Io`].\n+///\n+/// # Examples\n+///\n+/// ```no_run\n+/// use kernel::pci::{\n+///     self,\n+///     ExtSriovCapability, //\n+/// };\n+/// use kernel::io::Io;\n+///\n+/// fn probe_sriov(pdev: &pci::Device<kernel::device::Core>) -> Result<(), kernel::error::Error> {\n+///     let config = pdev.config_space_extended()?;\n+///     let sriov = ExtSriovCapability::find(&config)?;\n+///\n+///     let total_vfs = kernel::io_read!(&sriov, .total_vfs);\n+///     let vf_offset = kernel::io_read!(&sriov, .vf_offset);\n+///     let bar0 = kernel::io_read!(&sriov, .vf_bar[0]);\n+///     kernel::io_write!(&sriov, .num_vfs, 4u16);\n+///     let bar0_64 = sriov.read_vf_bar64(0)?;\n+///\n+///     Ok(())\n+/// }\n+/// ```\n+///\n+/// # Invariants\n+///\n+/// `ptr` is within the device's extended configuration space at a valid\n+/// capability. For sized `T`, the region is at least `size_of::<T>()` bytes.\n+pub struct ExtCapability<'a, T: ?Sized + KnownSize = Region<0>> {\n+    config: &'a ConfigSpace<'a, Extended>,\n+    ptr: *mut T,\n+}\n+\n+impl<T: ?Sized + KnownSize> Io for ExtCapability<'_, T> {\n+    type Type = T;\n+\n+    #[inline]\n+    fn as_ptr(&self) -> *mut T {\n+        self.ptr\n+    }\n+}\n+\n+macro_rules! impl_ext_cap_io_capable {\n+    ($ty:ty) => {\n+        impl<T: ?Sized + KnownSize> IoCapable<$ty> for ExtCapability<'_, T> {\n+            #[inline]\n+            unsafe fn io_read(&self, address: *mut $ty) -> $ty {\n+                // SAFETY: The caller guarantees `address` is within bounds of\n+                // this capability, which is within the config space.\n+                unsafe { self.config.io_read(address) }\n+            }\n+\n+            #[inline]\n+            unsafe fn io_write(&self, value: $ty, address: *mut $ty) {\n+                // SAFETY: The caller guarantees `address` is within bounds of\n+                // this capability, which is within the config space.\n+                unsafe { self.config.io_write(value, address) }\n+            }\n+        }\n+    };\n+}\n+\n+impl_ext_cap_io_capable!(u8);\n+impl_ext_cap_io_capable!(u16);\n+impl_ext_cap_io_capable!(u32);\n+\n+impl<'a> ExtCapability<'a> {\n+    /// Base offset of this capability in configuration space.\n+    #[inline]\n+    pub fn offset(&self) -> usize {\n+        self.ptr.addr()\n+    }\n+\n+    /// Size of this capability region in bytes.\n+    #[inline]\n+    pub fn size(&self) -> usize {\n+        KnownSize::size(self.ptr)\n+    }\n+\n+    /// Cast to a typed capability, checking that the region is large enough.\n+    pub fn cast_sized<U>(self) -> Result<ExtCapability<'a, U>> {\n+        if self.size() < core::mem::size_of::<U>() {\n+            return Err(EINVAL);\n+        }\n+\n+        // INVARIANT: `self` already satisfies the invariant (ptr is within extended config\n+        // space at a valid capability), and the size check above guarantees the region is at\n+        // least `size_of::<U>()` bytes.\n+        Ok(ExtCapability {\n+            config: self.config,\n+            ptr: core::ptr::without_provenance_mut(self.offset()),\n+        })\n+    }\n+}\n+\n+impl ConfigSpace<'_, Extended> {\n+    /// Finds an extended capability by ID, returning an untyped [`ExtCapability`].\n+    pub fn find_ext_capability(&self, cap: ExtCapId) -> Result<ExtCapability<'_>> {\n+        let offset = usize::from(\n+            // SAFETY: `self.pdev` is valid by the type invariant of `ConfigSpace`.\n+            unsafe {\n+                bindings::pci_find_ext_capability(self.pdev.as_raw(), i32::from(cap.as_raw()))\n+            },\n+        );\n+\n+        if offset == 0 {\n+            return Err(ENODEV);\n+        }\n+\n+        Ok(self.make_ext_capability(offset))\n+    }\n+\n+    /// Finds the next extended capability with `cap` after `start`.\n+    pub fn find_next_ext_capability(&self, start: u16, cap: ExtCapId) -> Result<ExtCapability<'_>> {\n+        let offset = usize::from(\n+            // SAFETY: `self.pdev` is valid by the type invariant of `ConfigSpace`.\n+            unsafe {\n+                bindings::pci_find_next_ext_capability(\n+                    self.pdev.as_raw(),\n+                    start,\n+                    i32::from(cap.as_raw()),\n+                )\n+            },\n+        );\n+\n+        if offset == 0 {\n+            return Err(ENODEV);\n+        }\n+\n+        Ok(self.make_ext_capability(offset))\n+    }\n+\n+    fn make_ext_capability(&self, offset: usize) -> ExtCapability<'_> {\n+        let size = self.calculate_ext_cap_size(offset);\n+\n+        let ptr = core::ptr::slice_from_raw_parts_mut::<u8>(\n+            core::ptr::without_provenance_mut(offset),\n+            size,\n+            // CAST: `Region<0>` is a DST like `[u8]`, so this pointer cast preserves metadata.\n+        ) as *mut Region<0>;\n+\n+        // INVARIANT: `offset` was returned by `pci_find_ext_capability` /\n+        // `pci_find_next_ext_capability`, which guarantees it points to a valid capability\n+        // within the extended configuration space. `size` is bounded by the next capability\n+        // offset or the end of the configuration space.\n+        ExtCapability { config: self, ptr }\n+    }\n+\n+    fn calculate_ext_cap_size(&self, offset: usize) -> usize {\n+        let header = self.try_read32(offset).unwrap_or(0);\n+        // SAFETY: Pure bit manipulation, no preconditions.\n+        // CAST: The next-cap pointer is a 12-bit field (max 0xFFC), always fits in `usize`.\n+        let next_ptr = unsafe { bindings::pci_ext_cap_next(header) } as usize;\n+\n+        if next_ptr > offset {\n+            next_ptr - offset\n+        } else {\n+            KnownSize::size(self.as_ptr()) - offset\n+        }\n+    }\n+}\n+\n+/// SR-IOV register layout per PCIe spec (64 bytes starting at cap offset).\n+#[repr(C)]\n+pub struct ExtSriovRegs {\n+    /// Extended capability header.\n+    pub header: u32,\n+    /// SR-IOV capabilities.\n+    pub cap: u32,\n+    /// SR-IOV control.\n+    pub ctrl: u16,\n+    /// SR-IOV status.\n+    pub status: u16,\n+    /// Initial VFs.\n+    pub initial_vfs: u16,\n+    /// Total VFs.\n+    pub total_vfs: u16,\n+    /// Number of VFs.\n+    pub num_vfs: u16,\n+    /// Function dependency link.\n+    pub func_dep_link: u16,\n+    /// First VF offset.\n+    pub vf_offset: u16,\n+    /// VF stride.\n+    pub vf_stride: u16,\n+    _reserved: u16,\n+    /// VF device ID.\n+    pub vf_device_id: u16,\n+    /// Supported page sizes.\n+    pub supported_page_sizes: u32,\n+    /// System page size.\n+    pub system_page_size: u32,\n+    /// VF BARs (BAR0–BAR5).\n+    pub vf_bar: [u32; 6],\n+    /// VF migration state array offset.\n+    pub migration_state: u32,\n+}\n+\n+/// SR-IOV capability. See [`ExtCapability`] for usage.\n+pub type ExtSriovCapability<'a> = ExtCapability<'a, ExtSriovRegs>;\n+\n+impl ExtCapability<'_, ExtSriovRegs> {\n+    /// Find the SR-IOV capability, or `ENODEV` if not present.\n+    #[inline]\n+    pub fn find<'a>(\n+        config: &'a ConfigSpace<'_, Extended>,\n+    ) -> Result<ExtCapability<'a, ExtSriovRegs>> {\n+        config.find_ext_capability(ExtCapId::Sriov)?.cast_sized()\n+    }\n+\n+    /// Reads a 64-bit VF BAR from two consecutive 32-bit slots.\n+    #[inline]\n+    pub fn read_vf_bar64(&self, bar_index: usize) -> Result<u64> {\n+        if bar_index >= 5 {\n+            return Err(EINVAL);\n+        }\n+        let low = crate::io_read!(self, .vf_bar[bar_index]?);\n+        let high = crate::io_read!(self, .vf_bar[bar_index + 1]?);\n+        Ok((u64::from(high) << 32) | u64::from(low))\n+    }\n+}\n","prefixes":["v3","1/1"]}