From nobody Wed Dec 17 16:11:44 2025 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 46072346A13; Wed, 17 Dec 2025 10:12:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765966362; cv=none; b=MSruycECi+puf2eSFSfTyausXmRO+t4+3LxuhPrTy1jcEysYqtAQMcGgKeoZwc15S4IMNNkd5SB6I1LHQNfv/VIayY33C928fvp3wMQ669O8yABczpBS2fyyZHN/wdnKceLgyRSYFmBD91v4cWcUBS9pB2/jzW2epiASLBwrJwA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765966362; c=relaxed/simple; bh=fNh1f8M6yk7IVQH2mYMeJP+CXVDu8JaXGAgr3QAY/J8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Dv9Rfi1JAKa8bTMkSeeKPwUXhQnEO+GzU407zmdZKXpsWNLBJQ94Rzn/ThCjvdK+22qR+td+2rgS6eqGwRwioqHThwjauRA53pDIzuNp4l34ByqELrhyTpVVtzMeZOSZ0RnKj6omVjqPoojB73SdkUHWT77larEfbrnQfeHIGuI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com; spf=fail smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9FB771517; Wed, 17 Dec 2025 02:12:32 -0800 (PST) Received: from e122027.arm.com (unknown [10.57.45.201]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id ADCDE3F73B; Wed, 17 Dec 2025 02:12:35 -0800 (PST) From: Steven Price To: kvm@vger.kernel.org, kvmarm@lists.linux.dev Cc: Steven Price , Catalin Marinas , Marc Zyngier , Will Deacon , James Morse , Oliver Upton , Suzuki K Poulose , Zenghui Yu , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Joey Gouly , Alexandru Elisei , Christoffer Dall , Fuad Tabba , linux-coco@lists.linux.dev, Ganapatrao Kulkarni , Gavin Shan , Shanker Donthineni , Alper Gun , "Aneesh Kumar K . V" , Emi Kisanuki , Vishal Annapurve Subject: [PATCH v12 11/46] arm64: RMI: Activate realm on first VCPU run Date: Wed, 17 Dec 2025 10:10:48 +0000 Message-ID: <20251217101125.91098-12-steven.price@arm.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251217101125.91098-1-steven.price@arm.com> References: <20251217101125.91098-1-steven.price@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" When a VCPU migrates to another physical CPU check if this is the first time the guest has run, and if so activate the realm. Before the realm can be activated it must first be created, this is a stub in this patch and will be filled in by a later patch. Signed-off-by: Steven Price --- New patch for v12 --- arch/arm64/include/asm/kvm_rmi.h | 1 + arch/arm64/kvm/arm.c | 6 +++++ arch/arm64/kvm/rmi.c | 42 ++++++++++++++++++++++++++++++++ 3 files changed, 49 insertions(+) diff --git a/arch/arm64/include/asm/kvm_rmi.h b/arch/arm64/include/asm/kvm_= rmi.h index cb7350f8a01a..e4534af06d96 100644 --- a/arch/arm64/include/asm/kvm_rmi.h +++ b/arch/arm64/include/asm/kvm_rmi.h @@ -69,6 +69,7 @@ void kvm_init_rmi(void); u32 kvm_realm_ipa_limit(void); =20 int kvm_init_realm_vm(struct kvm *kvm); +int kvm_activate_realm(struct kvm *kvm); void kvm_destroy_realm(struct kvm *kvm); void kvm_realm_destroy_rtts(struct kvm *kvm); =20 diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c index 941d1bec8e77..542df37b9e82 100644 --- a/arch/arm64/kvm/arm.c +++ b/arch/arm64/kvm/arm.c @@ -951,6 +951,12 @@ int kvm_arch_vcpu_run_pid_change(struct kvm_vcpu *vcpu) return ret; } =20 + if (kvm_is_realm(vcpu->kvm)) { + ret =3D kvm_activate_realm(kvm); + if (ret) + return ret; + } + mutex_lock(&kvm->arch.config_lock); set_bit(KVM_ARCH_FLAG_HAS_RAN_ONCE, &kvm->arch.flags); mutex_unlock(&kvm->arch.config_lock); diff --git a/arch/arm64/kvm/rmi.c b/arch/arm64/kvm/rmi.c index e57e8b7eafa9..98929382c365 100644 --- a/arch/arm64/kvm/rmi.c +++ b/arch/arm64/kvm/rmi.c @@ -223,6 +223,48 @@ void kvm_realm_destroy_rtts(struct kvm *kvm) WARN_ON(realm_tear_down_rtt_range(realm, 0, (1UL << ia_bits))); } =20 +static int realm_ensure_created(struct kvm *kvm) +{ + /* Provided in later patch */ + return -ENXIO; +} + +int kvm_activate_realm(struct kvm *kvm) +{ + struct realm *realm =3D &kvm->arch.realm; + int ret; + + if (!kvm_is_realm(kvm)) + return -ENXIO; + + if (kvm_realm_state(kvm) =3D=3D REALM_STATE_ACTIVE) + return 0; + + guard(mutex)(&kvm->arch.config_lock); + /* Check again with the lock held */ + if (kvm_realm_state(kvm) =3D=3D REALM_STATE_ACTIVE) + return 0; + + ret =3D realm_ensure_created(kvm); + if (ret) + return ret; + + /* Mark state as dead in case we fail */ + WRITE_ONCE(realm->state, REALM_STATE_DEAD); + + if (!irqchip_in_kernel(kvm)) { + /* Userspace irqchip not yet supported with realms */ + return -EOPNOTSUPP; + } + + ret =3D rmi_realm_activate(virt_to_phys(realm->rd)); + if (ret) + return -ENXIO; + + WRITE_ONCE(realm->state, REALM_STATE_ACTIVE); + return 0; +} + void kvm_destroy_realm(struct kvm *kvm) { struct realm *realm =3D &kvm->arch.realm; --=20 2.43.0