From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id B1970CD5BB1 for ; Thu, 21 May 2026 13:03:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Type:MIME-Version: References:In-Reply-To:Subject:Cc:To:From:Message-ID:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=KseMWYA9Jr+H+xyRY9PEDU6eP4OJzZ07RtFA0ZPZDpM=; b=bOI/VXz/bgsb8dCoVrSL0Mu76L 5dSJwYTbtd8Z5d4A4v6jzfnmnggXutlxfD5JuleUehw2gfofAx3duExABy7Sm/WyByAx5XSre2SXZ cdMFTi17ZQsdhOfqvIAZfPyuDjk1KMkJqfdzZSRlilmNc4PfyrO55ORi9WdenOIFfQTPvB0nsseph ryFW5wxjig/okD9JGAw1mLzDMN5aVfKtRXedIE2ETa/vvkzrbAT9fuPxdl9KYEozljMdmamAIsTaa eUTpyUUOBUSqhomtaQndZ/lUkaLvWybBtR+CLfgkV2IvF0lsx7nNsigUolUo3JFat7ZH/hy+WGKCx sYAJ8hNA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.99.1 #2 (Red Hat Linux)) id 1wQ337-00000007ns4-3p58; Thu, 21 May 2026 13:02:53 +0000 Received: from sea.source.kernel.org ([2600:3c0a:e001:78e:0:1991:8:25]) by bombadil.infradead.org with esmtps (Exim 4.99.1 #2 (Red Hat Linux)) id 1wQ335-00000007nrX-3x6m for linux-arm-kernel@lists.infradead.org; Thu, 21 May 2026 13:02:53 +0000 Received: from smtp.kernel.org (quasi.space.kernel.org [100.103.45.18]) by sea.source.kernel.org (Postfix) with ESMTP id 5B2D04357D; Thu, 21 May 2026 13:02:51 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3A9EC1F000E9; Thu, 21 May 2026 13:02:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel.org; s=k20260515; t=1779368571; bh=KseMWYA9Jr+H+xyRY9PEDU6eP4OJzZ07RtFA0ZPZDpM=; h=Date:From:To:Cc:Subject:In-Reply-To:References; b=J89UkpcsSbAQyKPZHklpnfU67IWP/NGR3yXsGOGIu+FCamaJh8yz4S2Bozimedpmc zyt1dv0k3dQhPoAbqrQwLHakE/ADclQ02ef80H1VXz3Epznh1U7uvm0byBb0ac9cvd S1emvq/rqsuYWFR2rWBQJ1yMaSc6f2ZErIbVlT7N+nmuoR1P4cKckB/HnUpaV4gpFa 157kQzM8SRXA6sCPriIupaJsss3z1StTCzjcBTm/xQCnuo7nhcR9CGGaBkCS6lctpi ollLw+6vwZQCEhGHjm119odnglTItg/0F+a7m8GqXiKn3xUSDIPm0zoRs/bPJQ9JH4 PAfp/+ahVUbkQ== Received: from sofa.misterjones.org ([185.219.108.64] helo=goblin-girl.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.98.2) (envelope-from ) id 1wQ333-00000004pBR-0eto; Thu, 21 May 2026 13:02:49 +0000 Date: Thu, 21 May 2026 14:02:48 +0100 Message-ID: <86bje8x6dj.wl-maz@kernel.org> From: Marc Zyngier To: Steven Price Cc: kvm@vger.kernel.org, kvmarm@lists.linux.dev, Catalin Marinas , Will Deacon , James Morse , Oliver Upton , Suzuki K Poulose , Zenghui Yu , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Joey Gouly , Alexandru Elisei , Christoffer Dall , Fuad Tabba , linux-coco@lists.linux.dev, Ganapatrao Kulkarni , Gavin Shan , Shanker Donthineni , Alper Gun , "Aneesh Kumar K . V" , Emi Kisanuki , Vishal Annapurve , WeiLin.Chang@arm.com, Lorenzo.Pieralisi2@arm.com Subject: Re: [PATCH v14 06/44] arm64: RMI: Check for RMI support at init In-Reply-To: <20260513131757.116630-7-steven.price@arm.com> References: <20260513131757.116630-1-steven.price@arm.com> <20260513131757.116630-7-steven.price@arm.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/30.1 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: steven.price@arm.com, kvm@vger.kernel.org, kvmarm@lists.linux.dev, catalin.marinas@arm.com, will@kernel.org, james.morse@arm.com, oliver.upton@linux.dev, suzuki.poulose@arm.com, yuzenghui@huawei.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, joey.gouly@arm.com, alexandru.elisei@arm.com, christoffer.dall@arm.com, tabba@google.com, linux-coco@lists.linux.dev, gankulkarni@os.amperecomputing.com, gshan@redhat.com, sdonthineni@nvidia.com, alpergun@google.com, aneesh.kumar@kernel.org, fj0570is@fujitsu.com, vannapurve@google.com, WeiLin.Chang@arm.com, Lorenzo.Pieralisi2@arm.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.9.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20260521_060252_021806_1C32EC2A X-CRM114-Status: GOOD ( 32.14 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Wed, 13 May 2026 14:17:14 +0100, Steven Price wrote: > > Query the RMI version number and check if it is a compatible version. > The first two feature registers are read and exposed for future code to > use. > > Signed-off-by: Steven Price > --- > v14: > * This moves the basic RMI setup into the 'kernel' directory. This is > because RMI will be used for some features outside of KVM so should > be available even if KVM isn't compiled in. > --- > arch/arm64/include/asm/rmi_cmds.h | 3 ++ > arch/arm64/kernel/Makefile | 2 +- > arch/arm64/kernel/cpufeature.c | 1 + > arch/arm64/kernel/rmi.c | 65 +++++++++++++++++++++++++++++++ > 4 files changed, 70 insertions(+), 1 deletion(-) > create mode 100644 arch/arm64/kernel/rmi.c > > diff --git a/arch/arm64/include/asm/rmi_cmds.h b/arch/arm64/include/asm/rmi_cmds.h > index 04f7066894e9..9179934925c5 100644 > --- a/arch/arm64/include/asm/rmi_cmds.h > +++ b/arch/arm64/include/asm/rmi_cmds.h > @@ -10,6 +10,9 @@ > > #include > > +extern unsigned long rmm_feat_reg0; > +extern unsigned long rmm_feat_reg1; > + > struct rtt_entry { > unsigned long walk_level; > unsigned long desc; > diff --git a/arch/arm64/kernel/Makefile b/arch/arm64/kernel/Makefile > index 74b76bb70452..d68f351aae75 100644 > --- a/arch/arm64/kernel/Makefile > +++ b/arch/arm64/kernel/Makefile > @@ -34,7 +34,7 @@ obj-y := debug-monitors.o entry.o irq.o fpsimd.o \ > cpufeature.o alternative.o cacheinfo.o \ > smp.o smp_spin_table.o topology.o smccc-call.o \ > syscall.o proton-pack.o idle.o patching.o pi/ \ > - rsi.o jump_label.o > + rsi.o jump_label.o rmi.o > > obj-$(CONFIG_COMPAT) += sys32.o signal32.o \ > sys_compat.o > diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c > index 6d53bb15cf7b..8bdd95a8c2de 100644 > --- a/arch/arm64/kernel/cpufeature.c > +++ b/arch/arm64/kernel/cpufeature.c > @@ -292,6 +292,7 @@ static const struct arm64_ftr_bits ftr_id_aa64isar3[] = { > static const struct arm64_ftr_bits ftr_id_aa64pfr0[] = { > ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL1_CSV3_SHIFT, 4, 0), > ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL1_CSV2_SHIFT, 4, 0), > + ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL1_RME_SHIFT, 4, 0), > ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL1_DIT_SHIFT, 4, 0), > ARM64_FTR_BITS(FTR_HIDDEN, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL1_AMU_SHIFT, 4, 0), > ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR0_EL1_MPAM_SHIFT, 4, 0), > diff --git a/arch/arm64/kernel/rmi.c b/arch/arm64/kernel/rmi.c > new file mode 100644 > index 000000000000..99c1ccc35c11 > --- /dev/null > +++ b/arch/arm64/kernel/rmi.c > @@ -0,0 +1,65 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Copyright (C) 2023-2025 ARM Ltd. > + */ > + > +#include > + > +#include > + > +unsigned long rmm_feat_reg0; > +unsigned long rmm_feat_reg1; What is the requirement for making those globally accessible? Can't they be made static and use an accessor that returns them? Can the variables be made __ro_after_init? > + > +static int rmi_check_version(void) > +{ > + struct arm_smccc_res res; > + unsigned short version_major, version_minor; > + unsigned long host_version = RMI_ABI_VERSION(RMI_ABI_MAJOR_VERSION, > + RMI_ABI_MINOR_VERSION); > + unsigned long aa64pfr0 = read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1); > + > + /* If RME isn't supported, then RMI can't be */ > + if (cpuid_feature_extract_unsigned_field(aa64pfr0, ID_AA64PFR0_EL1_RME_SHIFT) == 0) > + return -ENXIO; > + > + arm_smccc_1_1_invoke(SMC_RMI_VERSION, host_version, &res); > + > + if (res.a0 == SMCCC_RET_NOT_SUPPORTED) > + return -ENXIO; > + > + version_major = RMI_ABI_VERSION_GET_MAJOR(res.a1); > + version_minor = RMI_ABI_VERSION_GET_MINOR(res.a1); > + > + if (res.a0 != RMI_SUCCESS) { > + unsigned short high_version_major, high_version_minor; > + > + high_version_major = RMI_ABI_VERSION_GET_MAJOR(res.a2); > + high_version_minor = RMI_ABI_VERSION_GET_MINOR(res.a2); > + > + pr_err("Unsupported RMI ABI (v%d.%d - v%d.%d) we want v%d.%d\n", > + version_major, version_minor, > + high_version_major, high_version_minor, > + RMI_ABI_MAJOR_VERSION, > + RMI_ABI_MINOR_VERSION); > + return -ENXIO; > + } > + > + pr_info("RMI ABI version %d.%d\n", version_major, version_minor); > + > + return 0; > +} > + > +static int __init arm64_init_rmi(void) > +{ > + /* Continue without realm support if we can't agree on a version */ > + if (rmi_check_version()) > + return 0; > + > + if (WARN_ON(rmi_features(0, &rmm_feat_reg0))) > + return 0; > + if (WARN_ON(rmi_features(1, &rmm_feat_reg1))) > + return 0; > + > + return 0; > +} > +subsys_initcall(arm64_init_rmi); Is there any reliance on this being executed before or after KVM's own initialisation? If so, this should be captured. M. -- Without deviation from the norm, progress is not possible.