From: Catalin Marinas <catalin.marinas@arm.com>
To: Mark Brown <broonie@kernel.org>
Cc: Will Deacon <will@kernel.org>,
Shuah Khan <skhan@linuxfoundation.org>,
Shuah Khan <shuah@kernel.org>,
Alan Hayward <alan.hayward@arm.com>,
Luis Machado <luis.machado@arm.com>,
Salil Akerkar <Salil.Akerkar@arm.com>,
Basant Kumar Dwivedi <Basant.KumarDwivedi@arm.com>,
Szabolcs Nagy <szabolcs.nagy@arm.com>,
linux-arm-kernel@lists.infradead.org,
linux-kselftest@vger.kernel.org
Subject: Re: [PATCH v6 13/37] arm64/sme: Basic enumeration support
Date: Thu, 9 Dec 2021 18:41:26 +0000 [thread overview]
Message-ID: <YbJN1ujpDP1RG1Ll@arm.com> (raw)
In-Reply-To: <20211115152835.3212149-14-broonie@kernel.org>
On Mon, Nov 15, 2021 at 03:28:11PM +0000, Mark Brown wrote:
> diff --git a/arch/arm64/include/uapi/asm/hwcap.h b/arch/arm64/include/uapi/asm/hwcap.h
> index 7b23b16f21ce..6f8ca04b6566 100644
> --- a/arch/arm64/include/uapi/asm/hwcap.h
> +++ b/arch/arm64/include/uapi/asm/hwcap.h
> @@ -76,5 +76,13 @@
> #define HWCAP2_BTI (1 << 17)
> #define HWCAP2_MTE (1 << 18)
> #define HWCAP2_ECV (1 << 19)
> +#define HWCAP2_SME (1 << 20)
> +#define HWCAP2_SME_I16I64 (1 << 21)
> +#define HWCAP2_SME_F64F64 (1 << 22)
> +#define HWCAP2_SME_I8I32 (1 << 23)
> +#define HWCAP2_SME_F16F32 (1 << 24)
> +#define HWCAP2_SME_B16F32 (1 << 25)
> +#define HWCAP2_SME_F32F32 (1 << 26)
> +#define HWCAP2_SME_FA64 (1 << 27)
At this pace we'll need HWCAP3 pretty soon (since we only allocated
32-bit in each). I wonder whether we could instead not bother at all and
just provide user-space emulation for ID_AA64SMFR0_EL1.
> #endif /* _UAPI__ASM_HWCAP_H */
> diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c
> index 81824c7ea74f..3cf60819c354 100644
> --- a/arch/arm64/kernel/cpufeature.c
> +++ b/arch/arm64/kernel/cpufeature.c
> @@ -246,6 +246,7 @@ static const struct arm64_ftr_bits ftr_id_aa64pfr0[] = {
> };
>
> static const struct arm64_ftr_bits ftr_id_aa64pfr1[] = {
> + ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR1_SME_SHIFT, 4, 0),
> ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR1_MPAMFRAC_SHIFT, 4, 0),
> ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64PFR1_RASFRAC_SHIFT, 4, 0),
> ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_MTE),
> @@ -278,6 +279,24 @@ static const struct arm64_ftr_bits ftr_id_aa64zfr0[] = {
> ARM64_FTR_END,
> };
>
> +static const struct arm64_ftr_bits ftr_id_aa64smfr0[] = {
> + ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SME),
> + FTR_STRICT, FTR_EXACT, ID_AA64SMFR0_FA64_SHIFT, 1, 0),
> + ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SME),
> + FTR_STRICT, FTR_EXACT, ID_AA64SMFR0_I16I64_SHIFT, 4, 0),
> + ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SME),
> + FTR_STRICT, FTR_EXACT, ID_AA64SMFR0_F64F64_SHIFT, 1, 0),
> + ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SME),
> + FTR_STRICT, FTR_EXACT, ID_AA64SMFR0_I8I32_SHIFT, 4, 0),
> + ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SME),
> + FTR_STRICT, FTR_EXACT, ID_AA64SMFR0_F16F32_SHIFT, 1, 0),
> + ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SME),
> + FTR_STRICT, FTR_EXACT, ID_AA64SMFR0_B16F32_SHIFT, 1, 0),
> + ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_SME),
> + FTR_STRICT, FTR_EXACT, ID_AA64SMFR0_F32F32_SHIFT, 1, 0),
> + ARM64_FTR_END,
> +};
> +
> static const struct arm64_ftr_bits ftr_id_aa64mmfr0[] = {
> ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_ECV_SHIFT, 4, 0),
> ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64MMFR0_FGT_SHIFT, 4, 0),
> @@ -628,6 +647,7 @@ static const struct __ftr_reg_entry {
> ARM64_FTR_REG_OVERRIDE(SYS_ID_AA64PFR1_EL1, ftr_id_aa64pfr1,
> &id_aa64pfr1_override),
> ARM64_FTR_REG(SYS_ID_AA64ZFR0_EL1, ftr_id_aa64zfr0),
> + ARM64_FTR_REG(SYS_ID_AA64SMFR0_EL1, ftr_id_aa64smfr0),
>
> /* Op1 = 0, CRn = 0, CRm = 5 */
> ARM64_FTR_REG(SYS_ID_AA64DFR0_EL1, ftr_id_aa64dfr0),
> @@ -939,6 +959,7 @@ void __init init_cpu_features(struct cpuinfo_arm64 *info)
> init_cpu_ftr_reg(SYS_ID_AA64PFR0_EL1, info->reg_id_aa64pfr0);
> init_cpu_ftr_reg(SYS_ID_AA64PFR1_EL1, info->reg_id_aa64pfr1);
> init_cpu_ftr_reg(SYS_ID_AA64ZFR0_EL1, info->reg_id_aa64zfr0);
> + init_cpu_ftr_reg(SYS_ID_AA64SMFR0_EL1, info->reg_id_aa64smfr0);
>
> if (id_aa64pfr0_32bit_el0(info->reg_id_aa64pfr0))
> init_32bit_cpu_features(&info->aarch32);
> @@ -2370,6 +2391,30 @@ static const struct arm64_cpu_capabilities arm64_features[] = {
> .matches = has_cpuid_feature,
> .min_field_value = 1,
> },
> +#ifdef CONFIG_ARM64_SME
> + {
> + .desc = "Scalable Matrix Extension",
> + .type = ARM64_CPUCAP_SYSTEM_FEATURE,
> + .capability = ARM64_SME,
> + .sys_reg = SYS_ID_AA64PFR1_EL1,
> + .sign = FTR_UNSIGNED,
> + .field_pos = ID_AA64PFR1_SME_SHIFT,
> + .min_field_value = ID_AA64PFR1_SME,
> + .matches = has_cpuid_feature,
> + .cpu_enable = sme_kernel_enable,
> + },
> + {
> + .desc = "FA64",
> + .type = ARM64_CPUCAP_SYSTEM_FEATURE,
> + .capability = ARM64_SME_FA64,
> + .sys_reg = SYS_ID_AA64SMFR0_EL1,
> + .sign = FTR_UNSIGNED,
> + .field_pos = ID_AA64SMFR0_FA64_SHIFT,
> + .min_field_value = ID_AA64SMFR0_FA64,
> + .matches = has_feature_flag,
> + .cpu_enable = fa64_kernel_enable,
> + },
I'll comment here rather than the patch introducing has_feature_flag():
an alternative would be to add a .field_width option and in
feature_matches() use cpuid_feature_extract_field_width() directly. All
the arm64_ftr_bits entries already have a width, so just generalise it
for arm64_cpu_capabilities.
--
Catalin
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2021-12-09 18:43 UTC|newest]
Thread overview: 49+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-11-15 15:27 [PATCH v6 00/37] arm64/sme: Initial support for the Scalable Matrix Extension Mark Brown
2021-11-15 15:27 ` [PATCH v6 01/37] arm64/sve: Make sysctl interface for SVE reusable by SME Mark Brown
2021-11-15 15:28 ` [PATCH v6 02/37] arm64/sve: Generalise vector length configuration prctl() for SME Mark Brown
2021-11-15 15:28 ` [PATCH v6 03/37] arm64/sve: Minor clarification of ABI documentation Mark Brown
2021-11-15 15:28 ` [PATCH v6 04/37] kselftest/arm64: Parameterise ptrace vector length information Mark Brown
2021-11-15 15:28 ` [PATCH v6 05/37] kselftest/arm64: Allow signal tests to trigger from a function Mark Brown
2021-12-09 13:39 ` Catalin Marinas
2021-11-15 15:28 ` [PATCH v6 06/37] kselftest/arm64: Add a test program to exercise the syscall ABI Mark Brown
2021-12-09 17:05 ` Catalin Marinas
2021-12-09 19:13 ` Mark Brown
2021-12-10 10:18 ` Catalin Marinas
2021-12-10 13:25 ` Mark Brown
2021-11-15 15:28 ` [PATCH v6 07/37] tools/nolibc: Implement gettid() Mark Brown
2021-11-15 15:28 ` [PATCH v6 08/37] arm64: cpufeature: Add has_feature_flag() match function Mark Brown
2021-11-15 15:28 ` [PATCH v6 09/37] arm64/sme: Provide ABI documentation for SME Mark Brown
2021-11-15 15:28 ` [PATCH v6 10/37] arm64/sme: System register and exception syndrome definitions Mark Brown
2021-11-15 15:28 ` [PATCH v6 11/37] arm64/sme: Define macros for manually encoding SME instructions Mark Brown
2021-11-15 15:28 ` [PATCH v6 12/37] arm64/sme: Early CPU setup for SME Mark Brown
2021-11-15 15:28 ` [PATCH v6 13/37] arm64/sme: Basic enumeration support Mark Brown
2021-12-09 18:41 ` Catalin Marinas [this message]
2021-12-09 19:28 ` Mark Brown
2021-12-10 10:41 ` Catalin Marinas
2021-12-10 13:59 ` Mark Brown
2021-11-15 15:28 ` [PATCH v6 14/37] arm64/sme: Identify supported SME vector lengths at boot Mark Brown
2021-11-15 15:28 ` [PATCH v6 15/37] arm64/sme: Implement sysctl to set the default vector length Mark Brown
2021-11-15 15:28 ` [PATCH v6 16/37] arm64/sme: Implement vector length configuration prctl()s Mark Brown
2021-11-15 15:28 ` [PATCH v6 17/37] arm64/sme: Implement support for TPIDR2 Mark Brown
2021-11-15 15:28 ` [PATCH v6 18/37] arm64/sme: Implement SVCR context switching Mark Brown
2021-11-15 15:28 ` [PATCH v6 19/37] arm64/sme: Implement streaming SVE " Mark Brown
2021-11-15 15:28 ` [PATCH v6 20/37] arm64/sme: Implement ZA " Mark Brown
2021-11-15 15:28 ` [PATCH v6 21/37] arm64/sme: Implement traps and syscall handling for SME Mark Brown
2021-11-15 15:28 ` [PATCH v6 22/37] arm64/sme: Implement streaming SVE signal handling Mark Brown
2021-11-15 15:28 ` [PATCH v6 23/37] arm64/sme: Implement ZA " Mark Brown
2021-11-15 15:28 ` [PATCH v6 24/37] arm64/sme: Implement ptrace support for streaming mode SVE registers Mark Brown
2021-11-15 15:28 ` [PATCH v6 25/37] arm64/sme: Add ptrace support for ZA Mark Brown
2021-11-15 15:28 ` [PATCH v6 26/37] arm64/sme: Disable streaming mode and ZA when flushing CPU state Mark Brown
2021-11-15 15:28 ` [PATCH v6 27/37] arm64/sme: Save and restore streaming mode over EFI runtime calls Mark Brown
2021-11-15 15:28 ` [PATCH v6 28/37] arm64/sme: Provide Kconfig for SME Mark Brown
2021-11-15 15:28 ` [PATCH v6 29/37] kselftest/arm64: sme: Add streaming SME support to vlset Mark Brown
2021-11-15 15:28 ` [PATCH v6 30/37] kselftest/arm64: Add tests for TPIDR2 Mark Brown
2021-11-15 15:28 ` [PATCH v6 31/37] kselftest/arm64: Extend vector configuration API tests to cover SME Mark Brown
2021-11-15 15:28 ` [PATCH v6 32/37] kselftest/arm64: sme: Provide streaming mode SVE stress test Mark Brown
2021-11-15 15:28 ` [PATCH v6 33/37] kselftest/arm64: Add stress test for SME ZA context switching Mark Brown
2021-11-15 15:28 ` [PATCH v6 34/37] kselftest/arm64: signal: Add SME signal handling tests Mark Brown
2021-11-15 15:28 ` [PATCH v6 35/37] kselftest/arm64: Add streaming SVE to SVE ptrace tests Mark Brown
2021-11-15 15:28 ` [PATCH v6 36/37] kselftest/arm64: Add coverage for the ZA ptrace interface Mark Brown
2021-11-15 15:28 ` [PATCH v6 37/37] kselftest/arm64: Add SME support to syscall ABI test Mark Brown
2021-12-09 18:51 ` [PATCH v6 00/37] arm64/sme: Initial support for the Scalable Matrix Extension Catalin Marinas
2021-12-09 19:36 ` Mark Brown
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=YbJN1ujpDP1RG1Ll@arm.com \
--to=catalin.marinas@arm.com \
--cc=Basant.KumarDwivedi@arm.com \
--cc=Salil.Akerkar@arm.com \
--cc=alan.hayward@arm.com \
--cc=broonie@kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=luis.machado@arm.com \
--cc=shuah@kernel.org \
--cc=skhan@linuxfoundation.org \
--cc=szabolcs.nagy@arm.com \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).