From nobody Thu Oct 2 07:43:29 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4FBB92E54D1; Thu, 18 Sep 2025 19:44:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1758224671; cv=none; b=AJQvXQhkHvTmTGrqGarZU8gO1TfjUTHx6zODRQuFFbUKTmRwmTXa5gf1uPDSwfdKAXvsQeN9BecOSD818daOpDaPorGNaQGYjlENjcb568NFJT/6VBdR3i5b4M3z8g+JhXQYojkPgtZNw0DOnQGKMBYEhTS7P+DFdCz12IUVC0A= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1758224671; c=relaxed/simple; bh=3YA+RKjt5eLwcy44RlCM6dNazad9TJ2w7e1lAKycE+4=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=pgZITVxuFhY2S9m+AUhOmXxkbKqqRERYjVWtJI73Ibj7byfanTqT2rgzdkGwfRQTcQrzOTfd2T3doXBhaUqKCPLZViFDOmix+lwunTcYUOgCzd0JwxW5gvu3Aw7Lqal079vxETsL9SlHT3pFGRMtiSZbt3UjhN/hBc+uAiea7No= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=LsShNhSl; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="LsShNhSl" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 66369C4CEF0; Thu, 18 Sep 2025 19:44:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1758224670; bh=3YA+RKjt5eLwcy44RlCM6dNazad9TJ2w7e1lAKycE+4=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=LsShNhSlOosgCCjv3ZZn1EVchSl3vU8pr8DxN45VfTpA5TG2NX6aNYeu9rPMq5DBg udxhVjXaA1OG9vRBXO6ooa13dAV140tSVHM84bLL29YKK+CfS5jAFtU304qGLreLuD 0fcV0Z5wAlRxYX6CztaqfsoaovPvVn0IN0niD909yU01a1ebTtWyycg0U0Id17i1c3 QJFjj93cWYLoSNwhwpVYJBWVL+cwittfC4Lt4tTACTKH+/nNUgvaRGpFb15Y+lXeAC /RDo3Sr/O1jJSP19VGLgtyY62tsYggT3lcx+iW6HMvLFGNRZVfimRTTmLpr5HNSbex d04r+4NOL9KnQ== From: Mark Brown Date: Thu, 18 Sep 2025 20:42:06 +0100 Subject: [PATCH v4 1/2] KVM: arm64: Expose FEAT_LSFE to guests Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250918-arm64-lsfe-v4-1-0abc712101c7@kernel.org> References: <20250918-arm64-lsfe-v4-0-0abc712101c7@kernel.org> In-Reply-To: <20250918-arm64-lsfe-v4-0-0abc712101c7@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet , Marc Zyngier , Oliver Upton , Joey Gouly , Suzuki K Poulose , Shuah Khan Cc: linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-kselftest@vger.kernel.org, Mark Brown X-Mailer: b4 0.15-dev-56183 X-Developer-Signature: v=1; a=openpgp-sha256; l=1325; i=broonie@kernel.org; h=from:subject:message-id; bh=3YA+RKjt5eLwcy44RlCM6dNazad9TJ2w7e1lAKycE+4=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBozGEXE5gzxW4DG9tsIWlE41BKvJvGpyQ63RKmO HOUNqzPdgaJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCaMxhFwAKCRAk1otyXVSH 0F5vB/9btFoOAaaoJWCjjm7nW75Ob1/HiIkQfOGZ2fXHaFGNJBNqxyUxKlocd2E4VYhzrPXdqhn WIn8Be+Su4uKhY3qEuZkOxJHJ1popYnXrqdtq2PWVLZRlGKNHTWNNrpGRw9qeX2bsHnusJtACOu d9rkXvLKAX5t4K9pv4Khk652f8VCjBd7oIZWz2e1y+Vbiv/fHHyA6MvAodcFl88f5WX2Hge1Rvo GxtpOVwLqSv6J5I7gK1HmGsV3NPII5OmQoqD1w3g1jdrdK4D488GCMF4FYWs900EUPNlQHzu4IY eKEy/SfjPQLvbzN4fg1Zk71QJxkD0AeCRTjB1axR6IbenZlC X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB FEAT_LSFE (Large System Float Extension), providing atomic floating point memory operations, is optional from v9.5. This feature adds no new architectural state, expose the relevant ID register field to guests so they can discover it. Signed-off-by: Mark Brown Reviewed-by: Oliver Upton --- arch/arm64/kvm/sys_regs.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c index 82ffb3b3b3cf..08e2cb94bff3 100644 --- a/arch/arm64/kvm/sys_regs.c +++ b/arch/arm64/kvm/sys_regs.c @@ -1642,7 +1642,8 @@ static u64 __kvm_read_sanitised_id_reg(const struct k= vm_vcpu *vcpu, val &=3D ~ARM64_FEATURE_MASK(ID_AA64ISAR2_EL1_WFxT); break; case SYS_ID_AA64ISAR3_EL1: - val &=3D ID_AA64ISAR3_EL1_FPRCVT | ID_AA64ISAR3_EL1_FAMINMAX; + val &=3D ID_AA64ISAR3_EL1_FPRCVT | ID_AA64ISAR3_EL1_LSFE | + ID_AA64ISAR3_EL1_FAMINMAX; break; case SYS_ID_AA64MMFR2_EL1: val &=3D ~ID_AA64MMFR2_EL1_CCIDX_MASK; @@ -2991,6 +2992,7 @@ static const struct sys_reg_desc sys_reg_descs[] =3D { ID_AA64ISAR2_EL1_APA3 | ID_AA64ISAR2_EL1_GPA3)), ID_WRITABLE(ID_AA64ISAR3_EL1, (ID_AA64ISAR3_EL1_FPRCVT | + ID_AA64ISAR3_EL1_LSFE | ID_AA64ISAR3_EL1_FAMINMAX)), ID_UNALLOCATED(6,4), ID_UNALLOCATED(6,5), --=20 2.47.2 From nobody Thu Oct 2 07:43:29 2025 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3CB722E7BAA; Thu, 18 Sep 2025 19:44:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1758224674; cv=none; b=cLd4aZI86xvSep6U9bXfFWb/DSWnj5R/NX9A36MdiyFsV3ArL7LUOUA1FCfeJfbZBzEIqMFNjb9dxncvYWMRYWW8nAOtiXetT2kmV2kUsIFuuPyDE2WI9scBxu9qcBAMVvnH01NkekkgBt7XHaz0/UtryoHG42DG/by2SMnQQdc= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1758224674; c=relaxed/simple; bh=UMBZVNHnp7TR0KnOMakwtyW6HfF9SvkIdo+R8of+svU=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=HHg26Z5pLfKEId/qN7Z07XzCZuhQY7Occ8BGeizlVvi2wTJmiqdwQBB8m0GV2ZeuNNWK7ebCO5vGyWsbiocv7ZX/9JcQ1fz4Oerbp63T8OEfZ0HLrV9xpydcd8c5PpsWQKXgprLB05iYI3rEYY79mgv388vmvjP6bXqdmk5hOnI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=bUqtbVT+; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="bUqtbVT+" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4FCDFC4CEFA; Thu, 18 Sep 2025 19:44:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1758224673; bh=UMBZVNHnp7TR0KnOMakwtyW6HfF9SvkIdo+R8of+svU=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=bUqtbVT+0haYvdTHb6blpWAGsyWfD6JaY7UKgBi4jOSopmDbJZHeCxFoFu+/fht0G N6gsaEeuXYxUNx19h3M20zlrQSQvN/OOpS7UNh+0vG8Atrw4GeFRl23UBOHHnD0OPN sQwQu96Xbick4kY2JWoZuAwyghOmjSAmasf/n/qttCnRE/bjEqTF8y+Bz4ODB2N9C8 cf2einhRiGSWw5T0zRs9DOHxZkYqbWMyGqGFegKcqdGEBgQyjSYzcJcDgfXQnVdRt/ HoYZmNvUfikhEe256UpFX4Y98kGQpyREMS0OqFmDyQuV64M0UU9+aiDL3PQGBwyc0o cezmwQxnZIilg== From: Mark Brown Date: Thu, 18 Sep 2025 20:42:07 +0100 Subject: [PATCH v4 2/2] kselftest/arm64: Add lsfe to the hwcaps test Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250918-arm64-lsfe-v4-2-0abc712101c7@kernel.org> References: <20250918-arm64-lsfe-v4-0-0abc712101c7@kernel.org> In-Reply-To: <20250918-arm64-lsfe-v4-0-0abc712101c7@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet , Marc Zyngier , Oliver Upton , Joey Gouly , Suzuki K Poulose , Shuah Khan Cc: linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-kselftest@vger.kernel.org, Mark Brown X-Mailer: b4 0.15-dev-56183 X-Developer-Signature: v=1; a=openpgp-sha256; l=1389; i=broonie@kernel.org; h=from:subject:message-id; bh=UMBZVNHnp7TR0KnOMakwtyW6HfF9SvkIdo+R8of+svU=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBozGEYpaN8KxqpqbIpix7Q/eUM4BVEie2c349je H2Lt7wGNx2JATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCaMxhGAAKCRAk1otyXVSH 0Ok9B/4v32pVhq4xEn2WtqPBqKENxP6kucAsLZtwxf5iwOSrCiG9KVi/6YaIAC1kx/sjTIVaD9L mKEAYyfwg5c8BxtzTnuaHiK0R5mccV5TOEWPCLDMGeYsCfAVxI+uVBIUJ2Mbg7tyxUylzzmbwg6 8Vn7mCxnstbDXzMVPy5OS73MNdRuJjzIsVe1dmV9cd1Fa/1eOBriDvdJYymtpApHcWiI5N0u5fJ m+NBZORlDiLa9d86fk+c7KVVLr5ahog42FmW/pYrdJHXOkWKbtFlyrW0SuXfcxYsmX53b4Fa4iU JF8LnIEBKNjJysOhlR0xW4jvKcBXNGNJdual7Un8QJbbKubP X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB This feature has no traps associated with it so the SIGILL is not reliable. Signed-off-by: Mark Brown --- tools/testing/selftests/arm64/abi/hwcap.c | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/tools/testing/selftests/arm64/abi/hwcap.c b/tools/testing/self= tests/arm64/abi/hwcap.c index 002ec38a8bbb..0f9a64932481 100644 --- a/tools/testing/selftests/arm64/abi/hwcap.c +++ b/tools/testing/selftests/arm64/abi/hwcap.c @@ -17,6 +17,8 @@ #include #include =20 +#include + #include "../../kselftest.h" =20 #define TESTS_PER_HWCAP 3 @@ -169,6 +171,18 @@ static void lse128_sigill(void) : "cc", "memory"); } =20 +static void lsfe_sigill(void) +{ + float __attribute__ ((aligned (16))) mem; + register float *memp asm ("x0") =3D &mem; + + /* STFADD H0, [X0] */ + asm volatile(".inst 0x7c20801f" + : "+r" (memp) + : + : "memory"); +} + static void lut_sigill(void) { /* LUTI2 V0.16B, { V0.16B }, V[0] */ @@ -762,6 +776,13 @@ static const struct hwcap_data { .cpuinfo =3D "lse128", .sigill_fn =3D lse128_sigill, }, + { + .name =3D "LSFE", + .at_hwcap =3D AT_HWCAP3, + .hwcap_bit =3D HWCAP3_LSFE, + .cpuinfo =3D "lsfe", + .sigill_fn =3D lsfe_sigill, + }, { .name =3D "LUT", .at_hwcap =3D AT_HWCAP2, --=20 2.47.2