From nobody Tue Feb 10 01:20:13 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BCB423161B5; Wed, 21 Jan 2026 08:27:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768984039; cv=none; b=aWjTKh7I9UDHjR9jdw3oa5auNdhNCcL3La/jaDG+MUT4aSrLTqGbX638VPTUuOwwFKb2yby8GE3b0VV8cwvvjWsFE+WxCbwkXmNVginN+WpUpNqSpe3B3/uPCZJQ32tZmovotTEnWzkM7QCqpYPgQWycfcxzNLwfzHgb80d3LK4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768984039; c=relaxed/simple; bh=r68ZJJJ1c7EdvRJdPd1/xrzeCtM1H4vRuF8Sk5sagfo=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=iKdqzcr5quye5qGY8HUv+YmNRVuRdFqt3b5/sEzwEdhJZyJaK1ZjTo+veE7FlqDHc3qe0mE4K4uhBw08Llma4WxhVOmYQwDcyq7fjbpzTCrV9NNuqUXsI0f1Ts/EbbObQ5pnmB+gfOHlMSqRWINLUaVP+6eHH1v4JQceejOAqE0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=d8bqYrmy; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="d8bqYrmy" Received: by smtp.kernel.org (Postfix) with ESMTPS id 54989C16AAE; Wed, 21 Jan 2026 08:27:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1768984039; bh=r68ZJJJ1c7EdvRJdPd1/xrzeCtM1H4vRuF8Sk5sagfo=; h=From:Date:Subject:References:In-Reply-To:To:Cc:Reply-To:From; b=d8bqYrmyq14J/TY1vZXDknH7w87TyZyLl+S14hUghuModX9AJ2mzrEJGgnzd5slwM fu2WfP10uH3NltgSh3BYcWAtbaNoduPhJ5viLDRHV5o4bCB6lyBzD5fnYF+m4/A6mj hCciz9vBQvDIP6rQvGRa8g5L/Sex4MJCu0w9yid9QjH3gPPhqn+hxXQhyT20ss2JIm fgqigz3FxthYHqDAmw5WEmc0IeONopl3ZthjYWZLg7PIWVdyNCyP+SRyjjuiaV/BVu VTevcnHjtkNYhW/QbYozbIem1R7ydqCLgwAmKijiG3OIZfxJL+qd9wy7wzRE5bebK8 vYS5t6qoia5bw== Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 48AEEC44500; Wed, 21 Jan 2026 08:27:19 +0000 (UTC) From: Per Larsen via B4 Relay Date: Wed, 21 Jan 2026 08:27:13 +0000 Subject: [PATCH v5 2/2] KVM: arm64: Support FFA_MSG_SEND_DIRECT_REQ2 in host handler Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20260121-host-direct-messages-v5-2-2c1614c94e80@google.com> References: <20260121-host-direct-messages-v5-0-2c1614c94e80@google.com> In-Reply-To: <20260121-host-direct-messages-v5-0-2c1614c94e80@google.com> To: Marc Zyngier , Joey Gouly , Suzuki K Poulose , Zenghui Yu , Catalin Marinas , Will Deacon , Yeoreum Yun , Ben Horgan , Oliver Upton Cc: Armelle Laine , Sebastien Ene , linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org, Per Larsen X-Mailer: b4 0.14.2 X-Developer-Signature: v=1; a=ed25519-sha256; t=1768984038; l=2874; i=perlarsen@google.com; s=20250508; h=from:subject:message-id; bh=qhcYKwAWcN8zYuALz8BfQQd2qzT5+68uMqM1AI8ru7s=; b=wDNdZFgbPAKqh1Dj89bs6SryRSDS5CvEDvRzSjZaKAPy0slJ3E9kCleOP7/iPjEB4/da2+K3r ymUkX9NRNvfCfCo/ixmNyp4fFXE9K07y+kkhLDTnbJgeG+MhqOTLQzi X-Developer-Key: i=perlarsen@google.com; a=ed25519; pk=jjc/Ta4VmrLRmMoahP6d1mBcKzvWU+nsmdtYe2oS2kQ= X-Endpoint-Received: by B4 Relay for perlarsen@google.com/20250508 with auth_id=402 X-Original-From: Per Larsen Reply-To: perlarsen@google.com From: Per Larsen FF-A 1.2 adds the DIRECT_REQ2 messaging interface which is similar to the existing FFA_MSG_SEND_DIRECT_{REQ,RESP} functions and can use the existing handler function. Add support for FFA_MSG_SEND_DIRECT_REQ2 in the host ffa handler. Reviewed-by: Yeoreum Yun Signed-off-by: Per Larsen --- arch/arm64/kvm/hyp/nvhe/ffa.c | 17 ++++++++++++++--- 1 file changed, 14 insertions(+), 3 deletions(-) diff --git a/arch/arm64/kvm/hyp/nvhe/ffa.c b/arch/arm64/kvm/hyp/nvhe/ffa.c index 9967916278a7ca051500946ef2fcfe7bb40e0e8d..17b92f7faaf68e56aef0ebbe587= 10b7485a87231 100644 --- a/arch/arm64/kvm/hyp/nvhe/ffa.c +++ b/arch/arm64/kvm/hyp/nvhe/ffa.c @@ -684,11 +684,12 @@ static bool ffa_call_supported(u64 func_id) case FFA_NOTIFICATION_GET: case FFA_NOTIFICATION_INFO_GET: /* Optional interfaces added in FF-A 1.2 */ - case FFA_MSG_SEND_DIRECT_REQ2: /* Optional per 7.5.1 */ case FFA_MSG_SEND_DIRECT_RESP2: /* Optional per 7.5.1 */ case FFA_CONSOLE_LOG: /* Optional per 13.1: not in Table 13.1 */ case FFA_PARTITION_INFO_GET_REGS: /* Optional for virtual instances per 1= 3.1 */ return false; + case FFA_MSG_SEND_DIRECT_REQ2: /* Optional per 7.5.1 */ + return hyp_ffa_version >=3D FFA_VERSION_1_2; } =20 return true; @@ -866,6 +867,7 @@ static void do_ffa_direct_msg(struct arm_smccc_1_2_regs= *res, struct kvm_cpu_context *ctxt, u64 vm_handle) { + DECLARE_REG(u64, func_id, ctxt, 0); DECLARE_REG(u32, flags, ctxt, 2); =20 struct arm_smccc_1_2_regs *args =3D (void *)&ctxt->regs.regs[0]; @@ -875,8 +877,12 @@ static void do_ffa_direct_msg(struct arm_smccc_1_2_reg= s *res, return; } =20 - /* filter out framework messages and validate SBZ/MBZ bits */ - if (flags) { + /* + * filter out framework messages and validate SBZ/MBZ flag bits. + * FFA_MSG_SEND_DIRECT_REQ2 implies flag-less partition message. + */ + if ((func_id =3D=3D FFA_MSG_SEND_DIRECT_REQ || + func_id =3D=3D FFA_FN64_MSG_SEND_DIRECT_REQ) && flags) { ffa_to_smccc_error(res, FFA_RET_INVALID_PARAMETERS); return; } @@ -942,6 +948,10 @@ bool kvm_host_ffa_handler(struct kvm_cpu_context *host= _ctxt, u32 func_id) case FFA_PARTITION_INFO_GET: do_ffa_part_get(&res, host_ctxt); goto out_handled; + case FFA_MSG_SEND_DIRECT_REQ2: + if (!ffa_call_supported(func_id)) + goto out_not_supported; + fallthrough; case FFA_MSG_SEND_DIRECT_REQ: case FFA_FN64_MSG_SEND_DIRECT_REQ: do_ffa_direct_msg(&res, host_ctxt, HOST_FFA_ID); @@ -951,6 +961,7 @@ bool kvm_host_ffa_handler(struct kvm_cpu_context *host_= ctxt, u32 func_id) if (ffa_call_supported(func_id)) return false; /* Pass through */ =20 +out_not_supported: ffa_to_smccc_error(&res, FFA_RET_NOT_SUPPORTED); out_handled: ffa_set_retval(host_ctxt, &res); --=20 2.52.0.457.g6b5491de43-goog