Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp5972246rwd; Mon, 5 Jun 2023 11:01:20 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4yALPGlSnYtnwfC6IILW3/74k50kmpPGYrrEx4F+j8tMrL0zrwW2f1HixZgA0nyG/sKPE0 X-Received: by 2002:a05:6a00:3316:b0:645:834c:f521 with SMTP id cq22-20020a056a00331600b00645834cf521mr190928pfb.17.1685988080093; Mon, 05 Jun 2023 11:01:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685988080; cv=none; d=google.com; s=arc-20160816; b=FrZ2cwd2vCgoqISqga7If00ggHMe9YR+eCXViIIo8lvYtL7eZxfMuwH6gM/v+jiCwR dugQHFmo2JMVKxtHel9IVsnct49TT9aRtFJVUn48dDpsswmBXhs4bK4xZI5JZ+D9iI+B wLmGHgm5TNNoDh6Yb833levstaF5kz9uJnOF0cbe5LFEUGB2W8d5eUR9a/LyLcGbFe8q JyEiCA4lyb8Nr6gQ+pwOQl2czRw8U5B7cIE3xTrsaZ5nV9iDI4ozy965fNFxJQfZ7SQk 9GkYrLpT1EcXIybKhrGRIGpwJ5YEmqtHH0GudcGIvPjUbFXEHz48AarDzQXNEtUML3bY ZHmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=RG1Vf4f9HIU1bbqIVHc2ClXIn/bILbm6vJIb0AYNvUM=; b=nSnh9Q3bKKO1aa75LJ04JTwpwkWoofj75i/HwCXw07/QD9QDEaZYHCFU7ceJ/GJuoi 3yvsRLtNexH2FI8KuXrkB9OvadDW8qgt73Yy4kpCApMQ7Z7tdc38xmgWJ/JD0OEVuKXR j16evaqimNEUTKV38TWCVTdek47L5E+FTcA/bPmWlaTeVJ3ocXdQ42G5f5dEaJbyctT0 bhNlPNcmLIYRfQhhYSWqRWbDP9dQY2vExDm2wNn4bxbpxEdbbpRFX7177aig+/c+ZwbK AmIqMsYTLBHep20wxVjm1sedtlScMvx2HpK7WFH0dMp03xP8/G3haKA4lPSCEaH9a3Vc ZiOw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g205-20020a6252d6000000b006543a5c8fb7si4488781pfb.286.2023.06.05.11.00.49; Mon, 05 Jun 2023 11:01:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233779AbjFERqL (ORCPT + 99 others); Mon, 5 Jun 2023 13:46:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54758 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232648AbjFERqJ (ORCPT ); Mon, 5 Jun 2023 13:46:09 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9CE6CEA for ; Mon, 5 Jun 2023 10:46:08 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 29A4D628D3 for ; Mon, 5 Jun 2023 17:46:08 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0C15BC433EF; Mon, 5 Jun 2023 17:46:04 +0000 (UTC) From: Catalin Marinas To: linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, Kristina Martsenko Cc: Will Deacon , Marc Zyngier , Oliver Upton , James Morse , Suzuki K Poulose , Zenghui Yu , Mark Rutland , Mark Brown , Luis Machado , Vladimir Murzin , linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 00/11] arm64: Support for Armv8.8 memcpy instructions in userspace Date: Mon, 5 Jun 2023 18:46:02 +0100 Message-Id: <168598715797.875812.8370226994264203453.b4-ty@arm.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230509142235.3284028-1-kristina.martsenko@arm.com> References: <20230509142235.3284028-1-kristina.martsenko@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 09 May 2023 15:22:24 +0100, Kristina Martsenko wrote: > The Armv8.8 extension adds new instructions to perform memcpy(), memset() and > memmove() operations in hardware (FEAT_MOPS). This series adds support for > using the new instructions in userspace. More information can be found in the > cover letter for v1: > https://lore.kernel.org/linux-arm-kernel/20230216160012.272345-1-kristina.martsenko@arm.com/ > > Changes in v2: > - Removed booting.rst requirement for HCRX_EL2.MCE2 > - Changed HCRX_EL2 cpucap to be STRICT_BOOT type > - Changed HCRX_EL2.SMPME to be set for the guest and unset for the host > - Moved HCRX_EL2 initialization into init_el2_state(), dropped ISB > - Simplified conditional checks in mops exception handler with XOR > - Added comments from Arm ARM into mops exception handler > - Converted cpucaps to use the new ARM64_CPUID_FIELDS() helper > - Added MOPS to hwcaps kselftest > - Improved commit messages > - Rebased onto v6.4-rc1 > - v1: https://lore.kernel.org/linux-arm-kernel/20230216160012.272345-1-kristina.martsenko@arm.com/ > > [...] Applied to arm64 (for-next/feat_mops), thanks! [01/11] KVM: arm64: initialize HCRX_EL2 https://git.kernel.org/arm64/c/af94aad4c915 [02/11] arm64: cpufeature: detect FEAT_HCX https://git.kernel.org/arm64/c/b0c756fe996a [03/11] KVM: arm64: switch HCRX_EL2 between host and guest https://git.kernel.org/arm64/c/306b4c9f7120 [04/11] arm64: mops: document boot requirements for MOPS https://git.kernel.org/arm64/c/f32c053b9806 [05/11] arm64: mops: don't disable host MOPS instructions from EL2 https://git.kernel.org/arm64/c/b1319c0e9559 [06/11] KVM: arm64: hide MOPS from guests https://git.kernel.org/arm64/c/3172613fbcbb [07/11] arm64: mops: handle MOPS exceptions https://git.kernel.org/arm64/c/8536ceaa7471 [08/11] arm64: mops: handle single stepping after MOPS exception https://git.kernel.org/arm64/c/8cd076a67dc8 [09/11] arm64: mops: detect and enable FEAT_MOPS https://git.kernel.org/arm64/c/b7564127ffcb [10/11] arm64: mops: allow disabling MOPS from the kernel command line https://git.kernel.org/arm64/c/3e1dedb29d0f [11/11] kselftest/arm64: add MOPS to hwcap test https://git.kernel.org/arm64/c/d8a324f102cc -- Catalin