From nobody Mon Apr 6 18:24:00 2026 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 4E43F3EDADE; Wed, 18 Mar 2026 15:55:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773849364; cv=none; b=UUhc8yYxP89hSRmflqU40vWf52cgYwUe8qyOnPAtZgxgKIdCDUvSx578I6RzwSTpx/SVxKUZFsnRz/vz1JnTmG3pAUgzG59pUhnBAk0To2KarvafAFCUrrgX5SduyyZaMbIUh+w0d85m4NKqTuMC2+p10Mp42sR4YKzlQCTRzqw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773849364; c=relaxed/simple; bh=KhnkdJJApHJU6WWNDUuNSX8XXZlnCTAebv2v5VjqPmM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Ggu9+6RfH3YazNwV+VImzjCbfyIMA2pf4jAF7WflTwJLXSzJ+RivcgT9yztL1ptxPClutJ+GVgByv7yZQ0wSekYHanPHziXJ176C86efTY53W585wyl0uWrHKjfDXeuGw7t0BmMOv/2+qZYFtecMUf/XU2eV4381RzPiDxsmniQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C95722103; Wed, 18 Mar 2026 08:55:50 -0700 (PDT) Received: from e122027.arm.com (unknown [10.57.61.122]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id A90973F73B; Wed, 18 Mar 2026 08:55:53 -0700 (PDT) From: Steven Price To: kvm@vger.kernel.org, kvmarm@lists.linux.dev Cc: Steven Price , Catalin Marinas , Marc Zyngier , Will Deacon , James Morse , Oliver Upton , Suzuki K Poulose , Zenghui Yu , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Joey Gouly , Alexandru Elisei , Christoffer Dall , Fuad Tabba , linux-coco@lists.linux.dev, Ganapatrao Kulkarni , Gavin Shan , Shanker Donthineni , Alper Gun , "Aneesh Kumar K . V" , Emi Kisanuki , Vishal Annapurve Subject: [PATCH v13 25/48] arm64: RMI: Set RIPAS of initial memslots Date: Wed, 18 Mar 2026 15:53:49 +0000 Message-ID: <20260318155413.793430-26-steven.price@arm.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260318155413.793430-1-steven.price@arm.com> References: <20260318155413.793430-1-steven.price@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The memory which the realm guest accesses must be set to RIPAS_RAM. Iterate over the memslots and set all gmem memslots to RIPAS_RAM. Signed-off-by: Steven Price --- New patch for v12. --- arch/arm64/kvm/rmi.c | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) diff --git a/arch/arm64/kvm/rmi.c b/arch/arm64/kvm/rmi.c index b48f4e12e4e0..38349c7b34f4 100644 --- a/arch/arm64/kvm/rmi.c +++ b/arch/arm64/kvm/rmi.c @@ -883,12 +883,44 @@ static int realm_set_ipa_state(struct kvm_vcpu *vcpu, return ret; } =20 +static int realm_init_ipa_state(struct kvm *kvm, + unsigned long gfn, + unsigned long pages) +{ + return ripas_change(kvm, NULL, gfn_to_gpa(gfn), gfn_to_gpa(gfn + pages), + RIPAS_INIT, NULL); +} + static int realm_ensure_created(struct kvm *kvm) { /* Provided in later patch */ return -ENXIO; } =20 +static int set_ripas_of_protected_regions(struct kvm *kvm) +{ + struct kvm_memslots *slots; + struct kvm_memory_slot *memslot; + int idx, bkt; + int ret =3D 0; + + idx =3D srcu_read_lock(&kvm->srcu); + + slots =3D kvm_memslots(kvm); + kvm_for_each_memslot(memslot, bkt, slots) { + if (!kvm_slot_has_gmem(memslot)) + continue; + + ret =3D realm_init_ipa_state(kvm, memslot->base_gfn, + memslot->npages); + if (ret) + break; + } + srcu_read_unlock(&kvm->srcu, idx); + + return ret; +} + int kvm_arm_rmi_populate(struct kvm *kvm, struct kvm_arm_rmi_populate *args) { @@ -1206,6 +1238,10 @@ int kvm_activate_realm(struct kvm *kvm) return ret; } =20 + ret =3D set_ripas_of_protected_regions(kvm); + if (ret) + return ret; + ret =3D rmi_realm_activate(virt_to_phys(realm->rd)); if (ret) return -ENXIO; --=20 2.43.0