From nobody Sat Oct 4 01:44:57 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3C6081F130B; Fri, 22 Aug 2025 01:54:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755827683; cv=none; b=bR8DLaR4rrlHpU+OG6lPajpKh+XEgBYD5aTQqbkotlqyPH7JWLvKAQxsTPqCBF1ISyU2zplEdBerIlwDB4UvcBX9rFzNCpCpoG+h8CtuyS4qzo1isahLmno8flTXyxCnN5kKjN3yCekNqm4qH0dUpSDmI7hNP8Ci17CJAkN7AKo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755827683; c=relaxed/simple; bh=Rg1wsJ3gpmGTtJKL2YMiJAj+B1RPC9bu8N2e6PnFCu0=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=ClQUKtyUgHd0H+XDgTOnC3nHRHAOwK98imXEvroXv5iwH26RJvsBciJy4oH3DaHJ0XpXvR1RVlu0DMWASh/yYKIjwfmKlH/64ljpUxvdTApys6NnlnlAUKE7Go+bIwtCIc8Qcr+O4wwNg7eoeh/eXxkrkxCsWctLl9cuzOWTI/M= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Wwz3Hn43; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Wwz3Hn43" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 72170C116B1; Fri, 22 Aug 2025 01:54:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1755827682; bh=Rg1wsJ3gpmGTtJKL2YMiJAj+B1RPC9bu8N2e6PnFCu0=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=Wwz3Hn43I4TquZgTqBapPavDvDPrSDY0GbGUdVMxjTCGrDRz43aE0Z4t/z/qmOtm9 WY69Em/82JCGfEbij5ZJxRkXaDKWLiXbJosNB2gXSpr+kJ74g8HHct0rWW6phMsWSa o54Gs/nxoXHEYsdYsusgI9fJV0BEJhYPOBQyQrCe6Y3K88MyiOzKVJzQRwO2zQUPSS EFhyiBMQKFQ3B+kgWfEmfKS/mh7hhzOjOEa2S/hlFYUqN29YgdNdbw+zpknd1lv4hb iiHeLWQ1a+Qd5Jn4GC03qnejFMSR5GrfjaFXapoe92K8+38XYXDNkbANzhcjv2b+Xh rX1GA7tVDcUNQ== From: Mark Brown Date: Fri, 22 Aug 2025 02:53:33 +0100 Subject: [PATCH v7 04/29] arm64/fpsimd: Check enable bit for FA64 when saving EFI state Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250822-kvm-arm64-sme-v7-4-7a65d82b8b10@kernel.org> References: <20250822-kvm-arm64-sme-v7-0-7a65d82b8b10@kernel.org> In-Reply-To: <20250822-kvm-arm64-sme-v7-0-7a65d82b8b10@kernel.org> To: Marc Zyngier , Oliver Upton , Joey Gouly , Catalin Marinas , Suzuki K Poulose , Will Deacon , Paolo Bonzini , Jonathan Corbet , Shuah Khan Cc: Dave Martin , Fuad Tabba , Mark Rutland , linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, Mark Brown X-Mailer: b4 0.15-dev-cff91 X-Developer-Signature: v=1; a=openpgp-sha256; l=1451; i=broonie@kernel.org; h=from:subject:message-id; bh=Rg1wsJ3gpmGTtJKL2YMiJAj+B1RPC9bu8N2e6PnFCu0=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBop827+eIQAcHDPaqxZNzgiRFdwTfBj3rLnDk4q YKB0Ewgl6+JATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCaKfNuwAKCRAk1otyXVSH 0E5fB/4vQ1VVoOwzKnTblIqSntVYv6to2xDnjsx05+jvOatP0D5l8W/MkuG25NE4GJzFiT7NIFy nhlID/y9VrgB4Ab4RZKT/jDKiSgqKUHYAkbssTQM9jiHDqlo3rOKk6k41lmV8r7L6Iq06Y+rE+v EeaEhzIXNKO9YknisQP9nCmr+eILqG2s0CwFvWh7Iml8CzxSkR3H5UhEYNO6pAs3c0lL3kg+eta FwKHivsn3UaWPKWo5yWNrAnS2v1rlmWv+g3r4ADjjaGZJlystQfEoy4PW67W8P7NofucKPk77ph WGNe/wQtOF3OLWTqR75LP550N18yIAT1b8cRZhozoNlgFYpm X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB Currently when deciding if we need to save FFR when in streaming mode prior to EFI calls we check if FA64 is supported by the system. Since KVM guest support will mean that FA64 might be enabled and disabled at runtime switch to checking if traps for FA64 are enabled in SMCR_EL1 instead. Signed-off-by: Mark Brown --- arch/arm64/kernel/fpsimd.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/arch/arm64/kernel/fpsimd.c b/arch/arm64/kernel/fpsimd.c index 77f9dfaffe8b..de2897d6208c 100644 --- a/arch/arm64/kernel/fpsimd.c +++ b/arch/arm64/kernel/fpsimd.c @@ -1908,6 +1908,11 @@ static bool efi_sm_state; * either doing something wrong or you need to propose some refactoring. */ =20 +static bool fa64_enabled(void) +{ + return read_sysreg_s(SYS_SMCR_EL1) & SMCR_ELx_FA64; +} + /* * __efi_fpsimd_begin(): prepare FPSIMD for making an EFI runtime services= call */ @@ -1940,7 +1945,7 @@ void __efi_fpsimd_begin(void) * Unless we have FA64 FFR does not * exist in streaming mode. */ - if (!system_supports_fa64()) + if (!fa64_enabled()) ffr =3D !(svcr & SVCR_SM_MASK); } =20 @@ -1988,7 +1993,7 @@ void __efi_fpsimd_end(void) * Unless we have FA64 FFR does not * exist in streaming mode. */ - if (!system_supports_fa64()) + if (!fa64_enabled()) ffr =3D false; } } --=20 2.39.5