On 2/25/26 1:31 PM, Pierrick Bouvier wrote:
On 2/21/26 2:19 AM, Tao Tang wrote:
Temporarily:
- enable S_IDR1.SEL2,
- change AIDR to 0x2 to indicate SMMUv3.2,
- use smaller SID size and Cmd/Evt queue size.

Signed-off-by: Tao Tang <[email protected]>
---
   hw/arm/smmuv3.c                | 3 ++-
   include/hw/arm/smmuv3-common.h | 6 +++---
   2 files changed, 5 insertions(+), 4 deletions(-)


I have been able to boot hafnium with:
- instructions at
https://hnusdr.github.io/2025/08/09/Test-Secure-SMMU-with-Hafnium-ENG/
- the current patch
- qemu-system-aarch64 -global arm-smmuv3.secure-impl=on ...

In case someone else wants to reproduce this easily:

```
git clone https://github.com/p-b-o/qemu-linux-stack
cd qemu-linux-stack
git checkout optee-secure-smmu
./build.sh # only requires podman and qemu-user-static
./run.sh /path/to/qemu-system-aarch64
```

Tested-by: Pierrick Bouvier <[email protected]>

If we could have a device access directly from optee, it could be used to exercise secure translation as well. However, I'm not really sure it's how optee is supposed to be used, and it has very limited hardware support and abstractions.

Reply via email to