From nobody Wed Oct 8 00:41:25 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 759752566F5; Thu, 3 Jul 2025 16:26:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1751560010; cv=none; b=n6YOtIkAgSARBMc3AfB/5ph0foxdus91XyAbnV8egXpnoTawVQkoiVWRP8tjG5A4OqhIehm2tAzK7yc9ddP4XDVka6qbdiFB5QSypNAgjadlUxZSYkOjzzdlqyTqT6DarhmTbnIulo3X+q7eAMMWq14S9TL9GUNivD9jtdQlxHI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1751560010; c=relaxed/simple; bh=sHk5RpacHVScooaj/Y+sk96HDvaUhpAnndDJawkuV2o=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=U59LTX3dg/xJ//IwDprN8CV0fhFv+YgNESW2dbjVwjT5R+Mpjo8cHz8Qpx5Kb+VLwCHfeU48imfsF02P/5otVB+7I1vHtqopNjuf7yQmzHUiI6/9oEpXki34+MRpKEo0AzSYB1WkXe3EL8nVx2Mea0hGhKTrw/Vmh3b00WGVFOU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=HedWyBd+; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="HedWyBd+" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6AB96C4CEF1; Thu, 3 Jul 2025 16:26:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1751560010; bh=sHk5RpacHVScooaj/Y+sk96HDvaUhpAnndDJawkuV2o=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=HedWyBd+fVrdJb7ZFB/ZzloAW5DC4A1rKR/JSNuloo+jbi7hjbeDbB7FGQlJ1KWuE 6NmREHEpbyfWVqH4rcAM/BJSagP6kb28oPtkWbyY2+NoxZXbfbRRWsT+dploeGpNHA qnIiZPl0FmanZrR4+l/BC6mgQetitQCsKR9fAGKT9TdVXdbbxxPyQUftdMg3Iw2FJ/ rBq9tm3FhcZpKt5u0LbiB5HGzeMbBMkmmncxAAU9Uq5uzWyAep7rXhjBBvQndcrbzj js9B1tuRUZNgboMdhGdkAdZO1hBH1v0CpcrkhA4qexOs5KJ5HnMU2iuMLVL7iKV8tN +QO1yIk65wHhQ== From: Mark Brown Date: Thu, 03 Jul 2025 17:23:22 +0100 Subject: [PATCH v2 1/3] arm64/hwcap: Add hwcap for FEAT_LSFE Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250703-arm64-lsfe-v2-1-eced80999cb4@kernel.org> References: <20250703-arm64-lsfe-v2-0-eced80999cb4@kernel.org> In-Reply-To: <20250703-arm64-lsfe-v2-0-eced80999cb4@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet , Marc Zyngier , Oliver Upton , Joey Gouly , Suzuki K Poulose , Shuah Khan Cc: linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-kselftest@vger.kernel.org, Mark Brown X-Mailer: b4 0.15-dev-cff91 X-Developer-Signature: v=1; a=openpgp-sha256; l=3594; i=broonie@kernel.org; h=from:subject:message-id; bh=sHk5RpacHVScooaj/Y+sk96HDvaUhpAnndDJawkuV2o=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBoZq9BbLBYY6ZPTr0ScopGZi7pIWUwFpkjiTLYw WiIYcMaHGGJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCaGavQQAKCRAk1otyXVSH 0Hu5B/4h6S7uymGyXHFARqr6EOo69IpLGfhMt/L+m18jiaE5K2pRwiGMm9j0TsKuyvbjw6EzASR 5cF640qfgCn58dJlciWVoN5glmq3lkyLmwgkBT7NwWObKxqseS1mTx+H56c5dvoCPup88slMMZS skjgrdQN4kupB3S/B613366W9atbvcHFGkHcZFMuZt1oKIFKeUVK8Znq2uMWK1HF+Q73YpT9uZH YCylRwuOsIolEGK6Xcq23L+n2KDhQB8i+TPjHnt5ua4Cd8ul+kAjR98lwhsPKL7qop0an+k6GK2 XBvbkOQKsc5C5Waner0/reOHrx104rlKcoGp5lkZd5Cfee6M X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB FEAT_LSFE (Large System Float Extension), providing atomic floating point memory operations, is optional from v9.5. This feature adds no new architectural stare and we have no immediate use for it in the kernel so simply provide a hwcap for it to support discovery by userspace. Signed-off-by: Mark Brown --- Documentation/arch/arm64/elf_hwcaps.rst | 4 ++++ arch/arm64/include/asm/hwcap.h | 1 + arch/arm64/include/uapi/asm/hwcap.h | 1 + arch/arm64/kernel/cpufeature.c | 2 ++ arch/arm64/kernel/cpuinfo.c | 1 + 5 files changed, 9 insertions(+) diff --git a/Documentation/arch/arm64/elf_hwcaps.rst b/Documentation/arch/a= rm64/elf_hwcaps.rst index 69d7afe56853..aafb969ca263 100644 --- a/Documentation/arch/arm64/elf_hwcaps.rst +++ b/Documentation/arch/arm64/elf_hwcaps.rst @@ -435,6 +435,10 @@ HWCAP2_SME_SF8DP4 HWCAP2_POE Functionality implied by ID_AA64MMFR3_EL1.S1POE =3D=3D 0b0001. =20 +HWCAP3_LSFE + Functionality implied by ID_AA64ISAR3_EL1.LSFE =3D=3D 0b0001 + + 4. Unused AT_HWCAP bits ----------------------- =20 diff --git a/arch/arm64/include/asm/hwcap.h b/arch/arm64/include/asm/hwcap.h index 1c3f9617d54f..f8d02c14e5a2 100644 --- a/arch/arm64/include/asm/hwcap.h +++ b/arch/arm64/include/asm/hwcap.h @@ -176,6 +176,7 @@ #define KERNEL_HWCAP_POE __khwcap2_feature(POE) =20 #define __khwcap3_feature(x) (const_ilog2(HWCAP3_ ## x) + 128) +#define KERNEL_HWCAP_LSFE __khwcap3_feature(LSFE) =20 /* * This yields a mask that user programs can use to figure out what diff --git a/arch/arm64/include/uapi/asm/hwcap.h b/arch/arm64/include/uapi/= asm/hwcap.h index 705a7afa8e58..339b9dbf7cfc 100644 --- a/arch/arm64/include/uapi/asm/hwcap.h +++ b/arch/arm64/include/uapi/asm/hwcap.h @@ -143,5 +143,6 @@ /* * HWCAP3 flags - for AT_HWCAP3 */ +#define HWCAP3_LSFE (1 << 0) =20 #endif /* _UAPI__ASM_HWCAP_H */ diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c index b34044e20128..726054ac8091 100644 --- a/arch/arm64/kernel/cpufeature.c +++ b/arch/arm64/kernel/cpufeature.c @@ -278,6 +278,7 @@ static const struct arm64_ftr_bits ftr_id_aa64isar2[] = =3D { =20 static const struct arm64_ftr_bits ftr_id_aa64isar3[] =3D { ARM64_FTR_BITS(FTR_VISIBLE, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64ISAR3_E= L1_FPRCVT_SHIFT, 4, 0), + ARM64_FTR_BITS(FTR_VISIBLE, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64ISAR3_E= L1_LSFE_SHIFT, 4, 0), ARM64_FTR_BITS(FTR_VISIBLE, FTR_NONSTRICT, FTR_LOWER_SAFE, ID_AA64ISAR3_E= L1_FAMINMAX_SHIFT, 4, 0), ARM64_FTR_END, }; @@ -3175,6 +3176,7 @@ static const struct arm64_cpu_capabilities arm64_elf_= hwcaps[] =3D { HWCAP_CAP(ID_AA64ISAR1_EL1, I8MM, IMP, CAP_HWCAP, KERNEL_HWCAP_I8MM), HWCAP_CAP(ID_AA64ISAR2_EL1, LUT, IMP, CAP_HWCAP, KERNEL_HWCAP_LUT), HWCAP_CAP(ID_AA64ISAR3_EL1, FAMINMAX, IMP, CAP_HWCAP, KERNEL_HWCAP_FAMINM= AX), + HWCAP_CAP(ID_AA64ISAR3_EL1, LSFE, IMP, CAP_HWCAP, KERNEL_HWCAP_LSFE), HWCAP_CAP(ID_AA64MMFR2_EL1, AT, IMP, CAP_HWCAP, KERNEL_HWCAP_USCAT), #ifdef CONFIG_ARM64_SVE HWCAP_CAP(ID_AA64PFR0_EL1, SVE, IMP, CAP_HWCAP, KERNEL_HWCAP_SVE), diff --git a/arch/arm64/kernel/cpuinfo.c b/arch/arm64/kernel/cpuinfo.c index c1f2b6b04b41..2a1efe8e1fdf 100644 --- a/arch/arm64/kernel/cpuinfo.c +++ b/arch/arm64/kernel/cpuinfo.c @@ -160,6 +160,7 @@ static const char *const hwcap_str[] =3D { [KERNEL_HWCAP_SME_SFEXPA] =3D "smesfexpa", [KERNEL_HWCAP_SME_STMOP] =3D "smestmop", [KERNEL_HWCAP_SME_SMOP4] =3D "smesmop4", + [KERNEL_HWCAP_LSFE] =3D "lsfe", }; =20 #ifdef CONFIG_COMPAT --=20 2.39.5 From nobody Wed Oct 8 00:41:25 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0EA74256C8D; Thu, 3 Jul 2025 16:26:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1751560013; cv=none; b=gb+jJcLvxS7SBLsAGUblbqcayarf0BEhlYwkIDEUO74899GJwyZ1KLC+3HiWw+hHeTvhN/nKQ+7hWzDR5XXMFDfeTaI9N7IUUuXC2p8pUCjPmrqqFRhktoH9VNTKcjKBSgoGazMoTM6VMKWI34lyUUPEoV0b9Zr+LFaeWaNxgyQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1751560013; c=relaxed/simple; bh=90CTXdhM4nXMyJJrevGmqFnP/+4mWVosryCVClyymX0=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=hjJlpFhuuiyNT1zCAoxU8RhFeuyJQj0tFbHTkLxnas1tiY+NBDcrYhf6euHVEZk6/c2WxxwSuTtveaM3hzFy8aE7dV5EytLgGg6VvDclsfzCWso8K4sHfJaQhqZbvo1xyzNEbNT+RUd1+cZgNlI4F2uvD5KokpfuGJBFPXcPB/I= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=CEixGJF1; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="CEixGJF1" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6259FC4CEEE; Thu, 3 Jul 2025 16:26:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1751560012; bh=90CTXdhM4nXMyJJrevGmqFnP/+4mWVosryCVClyymX0=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=CEixGJF1mZ2cvbi1whnnoBju4b6BNMXqM+52MvLEa731G3dWLfx7wm9QqaaE0ff6w 92x6T0QqUD7m+vWr6+Wi8RexCsndRtgvTUsnnRSCmCpYhyt1P5aOqUp/lPCIDL9PWv E2NhPFlXGMbz6LhfjRDr4NwbpvmJ7eq26aWN/HMfSkAkB2OB5sVVwxkx3CGpwWC2Zf RTnvzGswGgYT0OLz1QS5MqpTnWBLof6z6CS/kiZpRSnKNAEq3i+r1QYDwmDpVaYlO/ XNHFznVxWDeqC6q9Rl6J8wbcHBjkyyMKYKGlSBJR1QJoeLdkyrByX9yEqaYN7VBgRF 5AIaCR3s2l3Rg== From: Mark Brown Date: Thu, 03 Jul 2025 17:23:23 +0100 Subject: [PATCH v2 2/3] KVM: arm64: Expose FEAT_LSFE to guests Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250703-arm64-lsfe-v2-2-eced80999cb4@kernel.org> References: <20250703-arm64-lsfe-v2-0-eced80999cb4@kernel.org> In-Reply-To: <20250703-arm64-lsfe-v2-0-eced80999cb4@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet , Marc Zyngier , Oliver Upton , Joey Gouly , Suzuki K Poulose , Shuah Khan Cc: linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-kselftest@vger.kernel.org, Mark Brown X-Mailer: b4 0.15-dev-cff91 X-Developer-Signature: v=1; a=openpgp-sha256; l=1325; i=broonie@kernel.org; h=from:subject:message-id; bh=90CTXdhM4nXMyJJrevGmqFnP/+4mWVosryCVClyymX0=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBoZq9C+PfNQji4jba2ZysHPz8RoGObA6Pa/ZuWX F9jDQV8oHmJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCaGavQgAKCRAk1otyXVSH 0NURB/9mggTPUYzWc+KsavFv2cEdY88MaY/uPfK+lU0MZ/eV24pYzWxdyncYKMlpvGOTW/22arP LU2zJ7Cl/P9ppUb3g/ZXttd2/xPMyK0YtGfiOiNhXCmqHEh0Z3lQ5e2Q8m/p7MMsPsoncg0Fm/X yGVSILA+DZNaV0LVr8Xn2IM2F/8VAKutGl+eZrB9egoZpVRamvADN9B7neZ6T/QCFYOWnzONmRR RHELmLfa6K2FKCb66+BrJVabOZGUeG4xEbYMPjlnBj1iBZZZNxc6IYH/Nlp9em53JThcIcqADab l31LOKbssiK1EmDk52tldTp9jYGCP+85/8XlOzI77kCwqk1p X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB FEAT_LSFE (Large System Float Extension), providing atomic floating point memory operations, is optional from v9.5. This feature adds no new architectural state, expose the relevant ID register field to guests so they can discover it. Signed-off-by: Mark Brown --- arch/arm64/kvm/sys_regs.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c index 76c2f0da821f..be685422bf9b 100644 --- a/arch/arm64/kvm/sys_regs.c +++ b/arch/arm64/kvm/sys_regs.c @@ -1636,7 +1636,8 @@ static u64 __kvm_read_sanitised_id_reg(const struct k= vm_vcpu *vcpu, val &=3D ~ARM64_FEATURE_MASK(ID_AA64ISAR2_EL1_WFxT); break; case SYS_ID_AA64ISAR3_EL1: - val &=3D ID_AA64ISAR3_EL1_FPRCVT | ID_AA64ISAR3_EL1_FAMINMAX; + val &=3D ID_AA64ISAR3_EL1_FPRCVT | ID_AA64ISAR3_EL1_LSFE | + ID_AA64ISAR3_EL1_FAMINMAX; break; case SYS_ID_AA64MMFR2_EL1: val &=3D ~ID_AA64MMFR2_EL1_CCIDX_MASK; @@ -2921,6 +2922,7 @@ static const struct sys_reg_desc sys_reg_descs[] =3D { ID_AA64ISAR2_EL1_APA3 | ID_AA64ISAR2_EL1_GPA3)), ID_WRITABLE(ID_AA64ISAR3_EL1, (ID_AA64ISAR3_EL1_FPRCVT | + ID_AA64ISAR3_EL1_LSFE | ID_AA64ISAR3_EL1_FAMINMAX)), ID_UNALLOCATED(6,4), ID_UNALLOCATED(6,5), --=20 2.39.5 From nobody Wed Oct 8 00:41:25 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5DBB02550BA; Thu, 3 Jul 2025 16:26:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1751560017; cv=none; b=nnlsyNGcjzqmPlowdHZDGfiGMwjmJDH1cJvBbp6PCNTB7uaB1biXYhHIZajfFbMc0TDnXO9c9w1w9ovPGHdsbxLnyI3wNlqMoqb77fqZQQj6rqKhaUbWtrF2abhUQ/vOqwKg+sXVR12mQJ6jkJACB4qHPSGLk3XvuSL1LIqIk7o= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1751560017; c=relaxed/simple; bh=0se/eq+gWDDz/zPGLfe64NetxynymgwpyPlKXYP8XIU=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=TRcCSWFJybUQIbCzOy3ZrmrDXtqxlSbUs/QRebW9ATKsjNU5UVoLXsaEamHlRhaQE52jJ+F/UaxUl/SEhUZNZJhk0jB2iuM+7PjVSuBgP8L9HcoCzZppBykxQvJ/ZalbbOsqtimh46AtfyFDLurVZUBb/AMHCOb4KAeGY0TID+w= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=F9xYnMul; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="F9xYnMul" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 57858C4CEE3; Thu, 3 Jul 2025 16:26:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1751560015; bh=0se/eq+gWDDz/zPGLfe64NetxynymgwpyPlKXYP8XIU=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=F9xYnMulVuNGNvAGTBMpLlkUdOXV29MzVXEe033VuqVu/tGe+RWsJngzdz4IffUZF TlFfr0OzdjCXXzY5GuscScdCqMN4WdRq00y7yQ79g33zU0CeoS7fDu5zmWPpovhul5 ZpqA/v/ijUwmYLGzJmt8RMJ2UuKToISDuzKDPkyqtBjsZ0ev9agFlQ4yyBi80TBfV+ c9pcjON/ohz7/AITWDxJYIcAcipay9tALB0V3775LUsr27Z0zso2ElZBpm547GWVvL /Seqd/LMJsI+P9t4/SG/wnc32xVf9Rwn8YlZIaCiUv6D0bP+sqI5ZeiRE+LEbZPRwp cUgjf2kBSiWFA== From: Mark Brown Date: Thu, 03 Jul 2025 17:23:24 +0100 Subject: [PATCH v2 3/3] kselftest/arm64: Add lsfe to the hwcaps test Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250703-arm64-lsfe-v2-3-eced80999cb4@kernel.org> References: <20250703-arm64-lsfe-v2-0-eced80999cb4@kernel.org> In-Reply-To: <20250703-arm64-lsfe-v2-0-eced80999cb4@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet , Marc Zyngier , Oliver Upton , Joey Gouly , Suzuki K Poulose , Shuah Khan Cc: linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-kselftest@vger.kernel.org, Mark Brown X-Mailer: b4 0.15-dev-cff91 X-Developer-Signature: v=1; a=openpgp-sha256; l=1403; i=broonie@kernel.org; h=from:subject:message-id; bh=0se/eq+gWDDz/zPGLfe64NetxynymgwpyPlKXYP8XIU=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBoZq9DrX1z69CleuGaYuiPYfm4x17/sToCyk2zP Nm99VorSU2JATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCaGavQwAKCRAk1otyXVSH 0LtRB/45/MTmfubRL3pBtMgXgWZMq82PR/jkn5ACdHwS7IGViT7FD2ZmgEzsylFTLDfTmP4bjqb pbVkdOsCSZJylYyOKBy6J9aDXd7tjwVYbfLr1jFUylvwqe2j5aZ27QCwhe1PC+DOzTvNkqEzvEB UIUPledQkbmnZJXMySkE4RVNqUaTB8ws5T8BGrQjz+ncH0gVf+yZfXpkdxiXetLZ4QTqNj1FjDR ip9vM1mAiEyMlpLqJeNt0L/XcFLEWNFVgOO78k+oVlAMlESket+6r99C6oAxaBjOv9nmGxTRVCw 0i3NukLDRtFDCW/v6+sTv43stjBooDOAlxzXewZLYPF/ko5z X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB This feature has no traps associated with it so the SIGILL is not reliable. Signed-off-by: Mark Brown --- tools/testing/selftests/arm64/abi/hwcap.c | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/tools/testing/selftests/arm64/abi/hwcap.c b/tools/testing/self= tests/arm64/abi/hwcap.c index 35f521e5f41c..faa0f82f27e0 100644 --- a/tools/testing/selftests/arm64/abi/hwcap.c +++ b/tools/testing/selftests/arm64/abi/hwcap.c @@ -17,6 +17,8 @@ #include #include =20 +#include + #include "../../kselftest.h" =20 #define TESTS_PER_HWCAP 3 @@ -165,6 +167,18 @@ static void lse128_sigill(void) : "cc", "memory"); } =20 +static void lsfe_sigill(void) +{ + float __attribute__ ((aligned (16))) mem =3D 0; + register float *memp asm ("x0") =3D &mem; + + /* LDFADD H0, H0, [X0] */ + asm volatile(".inst 0x7c200000" + : "+r" (memp) + : + : "cc", "memory"); +} + static void lut_sigill(void) { /* LUTI2 V0.16B, { V0.16B }, V[0] */ @@ -758,6 +772,13 @@ static const struct hwcap_data { .cpuinfo =3D "lse128", .sigill_fn =3D lse128_sigill, }, + { + .name =3D "LSFE", + .at_hwcap =3D AT_HWCAP3, + .hwcap_bit =3D HWCAP3_LSFE, + .cpuinfo =3D "lsfe", + .sigill_fn =3D lsfe_sigill, + }, { .name =3D "LUT", .at_hwcap =3D AT_HWCAP2, --=20 2.39.5