From patchwork Tue Aug 13 10:43:52 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 13761750 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 22A92208AD; Tue, 13 Aug 2024 10:44:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1723545850; cv=none; b=cAoJw3O5CaFYAXHItSjeKxAauj/oOz8wIbCHGuhL9z+AeWYwbKadWWdpbnn4RStO47kgDWa5QwAaj5DQp7Ah3aVunZiddcdVbkI3PTMUfzYmqTARye8s+0QpBqL0R2xXMHEA/H79yWwtIVt9Y4WRIHosTNPklnmxDQx47+vwSIY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1723545850; c=relaxed/simple; bh=KeAEfHGzQzII5PNpXANK31ac/qnVj2yuiImhA5avUVY=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=FvrSL9S+rwGbCeYdsLDCu2IeMafbNsw7kAfIC0Hv5vHBmAHybB7N3LkhdrVXNP3CglBiTQFTGvR7v4dL1K+HK68MRFpZX93qik0gKTkN60pvMT0HhBhHeV8Burusml0suHRfE/4cqtGgvQsgVFyiVoDSvV6fOt9iGuAQofedC2I= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=qHuxyvBd; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="qHuxyvBd" Received: by smtp.kernel.org (Postfix) with ESMTPSA id A42C9C4AF0B; Tue, 13 Aug 2024 10:44:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1723545849; bh=KeAEfHGzQzII5PNpXANK31ac/qnVj2yuiImhA5avUVY=; h=From:To:Cc:Subject:Date:From; b=qHuxyvBdOdpzMhJavvgEjaLnFY81a+R8A2ajo4+t8Pbp11VG/QUxP1GvmjZBzBc/r ol9mB5kJ7ME4xMRa12S7lyAAowvNlSk/Xv4musANzFPo1ztszVk1DKoX6Tg6SgNyuH RqvcZoZ9RIJliDSH/4wNS5YA67toUUWbiBwpn8ws1QKvUptal7Fr2CbVfSisQfLbVV HUVlFaWN89I3kq592Tw+AV+IF+efDoL+uvS6OHYrpb5WjRsAkFkVrBasr60+7R/WqI dRdjYmZhuWTRv2vt0X5S+pIy1EUfUY/8sf5h/6WjnvMsrDT41aYTo/myVFa2vt2RF3 xJqVuAyW/c0tA== Received: from sofa.misterjones.org ([185.219.108.64] helo=valley-girl.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1sdp0Z-003JD1-Kh; Tue, 13 Aug 2024 11:44:07 +0100 From: Marc Zyngier To: kvmarm@lists.linux.dev, linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org Cc: James Morse , Suzuki K Poulose , Oliver Upton , Zenghui Yu , Fuad Tabba , Joey Gouly , Mark Brown Subject: [PATCH v3 0/8] KVM: arm64: Add support for FP8 Date: Tue, 13 Aug 2024 11:43:52 +0100 Message-Id: <20240813104400.1956132-1-maz@kernel.org> X-Mailer: git-send-email 2.39.2 Precedence: bulk X-Mailing-List: kvm@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: kvmarm@lists.linux.dev, linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, oliver.upton@linux.dev, yuzenghui@huawei.com, tabba@google.com, joey.gouly@arm.com, broonie@kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false Although FP8 support was merged in 6.9, the KVM side was dropped, with no sign of it being picked up again. Given that its absence is getting in the way of NV upstreaming (HCRX_EL2 needs fleshing out), here's a small series addressing it. The support is following the save/restore model established for the rest of the FP code, with FPMR being tied to it. The sole additions are the handling of traps in a nested context, and the corresponding ID registers being made writable. As an extra cleanup, SVCR and FPMR are moved into the sysreg array. Patches are on top of v6.11-rc1. Note that this is compile-tested only, as I have no access to FP8 HW or model (and running NV in a model is not something I wish to entertain ever again). * From v2 [2] - Add missing kern_hyp_va() when dereferencing vcpu->kvm on nVHE setups * From v1 [1] - Correctly save/restore the guest state (duh), including pKVM (double duh) - Add a predicate for FPMR support in a VM, as this gets used more than twice... [1] https://lore.kernel.org/r/20240708154438.1218186-1-maz@kernel.org [2] https://lore.kernel.org/r/20240708154438.1218186-1-maz@kernel.org Marc Zyngier (8): KVM: arm64: Move SVCR into the sysreg array KVM: arm64: Add predicate for FPMR support in a VM KVM: arm64: Move FPMR into the sysreg array KVM: arm64: Add save/restore support for FPMR KVM: arm64: Honor trap routing for FPMR KVM: arm64: Expose ID_AA64FPFR0_EL1 as a writable ID reg KVM: arm64: Enable FP8 support when available and configured KVM: arm64: Expose ID_AA64PFR2_EL1 to userspace and guests arch/arm64/include/asm/kvm_host.h | 20 ++++++++++-- arch/arm64/kvm/emulate-nested.c | 8 +++++ arch/arm64/kvm/fpsimd.c | 5 +-- arch/arm64/kvm/hyp/include/hyp/switch.h | 3 ++ arch/arm64/kvm/hyp/nvhe/hyp-main.c | 9 ++++++ arch/arm64/kvm/hyp/nvhe/switch.c | 9 ++++++ arch/arm64/kvm/hyp/vhe/switch.c | 3 ++ arch/arm64/kvm/sys_regs.c | 42 +++++++++++++++++++++++-- 8 files changed, 92 insertions(+), 7 deletions(-)