{"id":808324,"url":"http://patchwork.ozlabs.org/api/1.0/patches/808324/?format=json","project":{"id":41,"url":"http://patchwork.ozlabs.org/api/1.0/projects/41/?format=json","name":"GNU C Library","link_name":"glibc","list_id":"libc-alpha.sourceware.org","list_email":"libc-alpha@sourceware.org","web_url":"","scm_url":"","webscm_url":""},"msgid":"<1504198860-12951-7-git-send-email-Dave.Martin@arm.com>","date":"2017-08-31T17:00:38","name":"[v2,06/28] arm64/sve: System register and exception syndrome definitions","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"ce5738d199d93b3dd599d16cdecdef9c042d2425","submitter":{"id":26612,"url":"http://patchwork.ozlabs.org/api/1.0/people/26612/?format=json","name":"Dave Martin","email":"Dave.Martin@arm.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/glibc/patch/1504198860-12951-7-git-send-email-Dave.Martin@arm.com/mbox/","series":[{"id":882,"url":"http://patchwork.ozlabs.org/api/1.0/series/882/?format=json","date":"2017-08-31T17:00:32","name":"ARM Scalable Vector Extension (SVE)","version":2,"mbox":"http://patchwork.ozlabs.org/series/882/mbox/"}],"check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/808324/checks/","tags":{},"headers":{"Return-Path":"<libc-alpha-return-83965-incoming=patchwork.ozlabs.org@sourceware.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":["patchwork-incoming@bilbo.ozlabs.org","mailing list libc-alpha@sourceware.org"],"Authentication-Results":["ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=sourceware.org\n\t(client-ip=209.132.180.131; helo=sourceware.org;\n\tenvelope-from=libc-alpha-return-83965-incoming=patchwork.ozlabs.org@sourceware.org;\n\treceiver=<UNKNOWN>)","ozlabs.org; dkim=pass (1024-bit key;\n\tsecure) header.d=sourceware.org header.i=@sourceware.org\n\theader.b=\"s8q6D3XD\"; dkim-atps=neutral","sourceware.org; auth=none"],"Received":["from sourceware.org (server1.sourceware.org [209.132.180.131])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xjpZV4gLDz9t2Q\n\tfor <incoming@patchwork.ozlabs.org>;\n\tFri,  1 Sep 2017 03:02:09 +1000 (AEST)","(qmail 79742 invoked by alias); 31 Aug 2017 17:01:40 -0000","(qmail 79632 invoked by uid 89); 31 Aug 2017 17:01:39 -0000"],"DomainKey-Signature":"a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id\n\t:list-unsubscribe:list-subscribe:list-archive:list-post\n\t:list-help:sender:from:to:cc:subject:date:message-id:in-reply-to\n\t:references:mime-version:content-type:content-transfer-encoding;\n\tq=dns; s=default; b=IiovkA7v0HQR3cciYs8GstIL5HN3jSV8IMRZe9ga5i/\n\thY8BsnsnpL+/dzVWOv9ehqRtg8qkfFsBIyyaFbC9tHvWtl3OF6vpDbZGLiopvY2j\n\t6oliW5c1n/33mqcPiSPY9vuNrV2GAuyrTcvTtLQ+IWbipAel/ah43X4M+J6BA89w\n\t=","DKIM-Signature":"v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id\n\t:list-unsubscribe:list-subscribe:list-archive:list-post\n\t:list-help:sender:from:to:cc:subject:date:message-id:in-reply-to\n\t:references:mime-version:content-type:content-transfer-encoding;\n\ts=default; bh=YrsFKNly0LeDbtpdSUNIuSsBuTo=; b=s8q6D3XDigWhp1v5w\n\t0fXcIV3VQU+Oy9dJe5YV7fTBXymMrljpcVx7us4BLIvdkAQPsy9DG1t04N+rRg7g\n\ty0cQsarYZZFZl7ov7Zv7mrxgMlL/1t44wcULXf5VIPm963JXUgjgeKmFCTYc0/Mu\n\tcendcF9xiBneuwQJ8CXVArgXIY=","Mailing-List":"contact libc-alpha-help@sourceware.org; run by ezmlm","Precedence":"bulk","List-Id":"<libc-alpha.sourceware.org>","List-Unsubscribe":"<mailto:libc-alpha-unsubscribe-incoming=patchwork.ozlabs.org@sourceware.org>","List-Subscribe":"<mailto:libc-alpha-subscribe@sourceware.org>","List-Archive":"<http://sourceware.org/ml/libc-alpha/>","List-Post":"<mailto:libc-alpha@sourceware.org>","List-Help":"<mailto:libc-alpha-help@sourceware.org>,\n\t<http://sourceware.org/ml/#faqs>","Sender":"libc-alpha-owner@sourceware.org","X-Virus-Found":"No","X-Spam-SWARE-Status":"No, score=-26.9 required=5.0 tests=BAYES_00, GIT_PATCH_0,\n\tGIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, RP_MATCHES_RCVD,\n\tSPF_PASS autolearn=ham version=3.3.2 spammy=1ul, 3497, IMP,\n\t6037","X-HELO":"foss.arm.com","From":"Dave Martin <Dave.Martin@arm.com>","To":"linux-arm-kernel@lists.infradead.org","Cc":"Catalin Marinas <catalin.marinas@arm.com>, Will Deacon\n\t<will.deacon@arm.com>, \tArd Biesheuvel <ard.biesheuvel@linaro.org>,\n\t=?utf-8?q?Alex_Benn=C3=A9?= =?utf-8?q?e?= <alex.bennee@linaro.org>,\n\tSzabolcs Nagy <szabolcs.nagy@arm.com>, Richard Sandiford\n\t<richard.sandiford@arm.com>, \tkvmarm@lists.cs.columbia.edu,\n\tlibc-alpha@sourceware.org, \tlinux-arch@vger.kernel.org","Subject":"[PATCH v2 06/28] arm64/sve: System register and exception syndrome\n\tdefinitions","Date":"Thu, 31 Aug 2017 18:00:38 +0100","Message-Id":"<1504198860-12951-7-git-send-email-Dave.Martin@arm.com>","In-Reply-To":"<1504198860-12951-1-git-send-email-Dave.Martin@arm.com>","References":"<1504198860-12951-1-git-send-email-Dave.Martin@arm.com>","MIME-Version":"1.0","Content-Type":"text/plain; charset=UTF-8","Content-Transfer-Encoding":"8bit"},"content":"The SVE architecture adds some system registers, ID register fields\nand a dedicated ESR exception class.\n\nThis patch adds the appropriate definitions that will be needed by\nthe kernel.\n\nSigned-off-by: Dave Martin <Dave.Martin@arm.com>\nCc: Alex Bennée <alex.bennee@linaro.org>\n\n---\n\nChanges since v1\n----------------\n\nRequested by Alex Bennée:\n\n* Add comments to clarify CPACR_EL1_ZEN_ELxEN bit meanings.\n* Add comment clarifying the status of the LEN field expansion bits.\n---\n arch/arm64/include/asm/esr.h     |  3 ++-\n arch/arm64/include/asm/kvm_arm.h |  1 +\n arch/arm64/include/asm/sysreg.h  | 21 +++++++++++++++++++++\n arch/arm64/kernel/traps.c        |  1 +\n 4 files changed, 25 insertions(+), 1 deletion(-)","diff":"diff --git a/arch/arm64/include/asm/esr.h b/arch/arm64/include/asm/esr.h\nindex 66ed8b6..014d7d8 100644\n--- a/arch/arm64/include/asm/esr.h\n+++ b/arch/arm64/include/asm/esr.h\n@@ -43,7 +43,8 @@\n #define ESR_ELx_EC_HVC64\t(0x16)\n #define ESR_ELx_EC_SMC64\t(0x17)\n #define ESR_ELx_EC_SYS64\t(0x18)\n-/* Unallocated EC: 0x19 - 0x1E */\n+#define ESR_ELx_EC_SVE\t\t(0x19)\n+/* Unallocated EC: 0x1A - 0x1E */\n #define ESR_ELx_EC_IMP_DEF\t(0x1f)\n #define ESR_ELx_EC_IABT_LOW\t(0x20)\n #define ESR_ELx_EC_IABT_CUR\t(0x21)\ndiff --git a/arch/arm64/include/asm/kvm_arm.h b/arch/arm64/include/asm/kvm_arm.h\nindex 61d694c..dbf0537 100644\n--- a/arch/arm64/include/asm/kvm_arm.h\n+++ b/arch/arm64/include/asm/kvm_arm.h\n@@ -185,6 +185,7 @@\n #define CPTR_EL2_TCPAC\t(1 << 31)\n #define CPTR_EL2_TTA\t(1 << 20)\n #define CPTR_EL2_TFP\t(1 << CPTR_EL2_TFP_SHIFT)\n+#define CPTR_EL2_TZ\t(1 << 8)\n #define CPTR_EL2_DEFAULT\t0x000033ff\n \n /* Hyp Debug Configuration Register bits */\ndiff --git a/arch/arm64/include/asm/sysreg.h b/arch/arm64/include/asm/sysreg.h\nindex 480ecd6..36fe2ae 100644\n--- a/arch/arm64/include/asm/sysreg.h\n+++ b/arch/arm64/include/asm/sysreg.h\n@@ -145,6 +145,7 @@\n \n #define SYS_ID_AA64PFR0_EL1\t\tsys_reg(3, 0, 0, 4, 0)\n #define SYS_ID_AA64PFR1_EL1\t\tsys_reg(3, 0, 0, 4, 1)\n+#define SYS_ID_AA64ZFR0_EL1\t\tsys_reg(3, 0, 0, 4, 4)\n \n #define SYS_ID_AA64DFR0_EL1\t\tsys_reg(3, 0, 0, 5, 0)\n #define SYS_ID_AA64DFR1_EL1\t\tsys_reg(3, 0, 0, 5, 1)\n@@ -163,6 +164,8 @@\n #define SYS_ACTLR_EL1\t\t\tsys_reg(3, 0, 1, 0, 1)\n #define SYS_CPACR_EL1\t\t\tsys_reg(3, 0, 1, 0, 2)\n \n+#define SYS_ZCR_EL1\t\t\tsys_reg(3, 0, 1, 2, 0)\n+\n #define SYS_TTBR0_EL1\t\t\tsys_reg(3, 0, 2, 0, 0)\n #define SYS_TTBR1_EL1\t\t\tsys_reg(3, 0, 2, 0, 1)\n #define SYS_TCR_EL1\t\t\tsys_reg(3, 0, 2, 0, 2)\n@@ -253,6 +256,8 @@\n \n #define SYS_PMCCFILTR_EL0\t\tsys_reg (3, 3, 14, 15, 7)\n \n+#define SYS_ZCR_EL2\t\t\tsys_reg(3, 4, 1, 2, 0)\n+\n #define SYS_DACR32_EL2\t\t\tsys_reg(3, 4, 3, 0, 0)\n #define SYS_IFSR32_EL2\t\t\tsys_reg(3, 4, 5, 0, 1)\n #define SYS_FPEXC32_EL2\t\t\tsys_reg(3, 4, 5, 3, 0)\n@@ -335,6 +340,7 @@\n #define ID_AA64ISAR1_DPB_SHIFT\t\t0\n \n /* id_aa64pfr0 */\n+#define ID_AA64PFR0_SVE_SHIFT\t\t32\n #define ID_AA64PFR0_GIC_SHIFT\t\t24\n #define ID_AA64PFR0_ASIMD_SHIFT\t\t20\n #define ID_AA64PFR0_FP_SHIFT\t\t16\n@@ -343,6 +349,7 @@\n #define ID_AA64PFR0_EL1_SHIFT\t\t4\n #define ID_AA64PFR0_EL0_SHIFT\t\t0\n \n+#define ID_AA64PFR0_SVE\t\t\t0x1\n #define ID_AA64PFR0_FP_NI\t\t0xf\n #define ID_AA64PFR0_FP_SUPPORTED\t0x0\n #define ID_AA64PFR0_ASIMD_NI\t\t0xf\n@@ -444,6 +451,20 @@\n #endif\n \n \n+/*\n+ * The ZCR_ELx_LEN_* definitions intentionally include bits [8:4] which\n+ * are reserved by the SVE architecture for future expansion of the LEN\n+ * field, with compatible semantics.\n+ */\n+#define ZCR_ELx_LEN_SHIFT\t0\n+#define ZCR_ELx_LEN_SIZE\t9\n+#define ZCR_ELx_LEN_MASK\t0x1ff\n+\n+#define CPACR_EL1_ZEN_EL1EN\t(1 << 16) /* enable EL1 access */\n+#define CPACR_EL1_ZEN_EL0EN\t(1 << 17) /* enable EL0 access, if EL1EN set */\n+#define CPACR_EL1_ZEN\t\t(CPACR_EL1_ZEN_EL1EN | CPACR_EL1_ZEN_EL0EN)\n+\n+\n /* Safe value for MPIDR_EL1: Bit31:RES1, Bit30:U:0, Bit24:MT:0 */\n #define SYS_MPIDR_SAFE_VAL\t\t(1UL << 31)\n \ndiff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c\nindex 5ea4b85..f202932 100644\n--- a/arch/arm64/kernel/traps.c\n+++ b/arch/arm64/kernel/traps.c\n@@ -603,6 +603,7 @@ static const char *esr_class_str[] = {\n \t[ESR_ELx_EC_HVC64]\t\t= \"HVC (AArch64)\",\n \t[ESR_ELx_EC_SMC64]\t\t= \"SMC (AArch64)\",\n \t[ESR_ELx_EC_SYS64]\t\t= \"MSR/MRS (AArch64)\",\n+\t[ESR_ELx_EC_SVE]\t\t= \"SVE\",\n \t[ESR_ELx_EC_IMP_DEF]\t\t= \"EL3 IMP DEF\",\n \t[ESR_ELx_EC_IABT_LOW]\t\t= \"IABT (lower EL)\",\n \t[ESR_ELx_EC_IABT_CUR]\t\t= \"IABT (current EL)\",\n","prefixes":["v2","06/28"]}