Received: by 2002:ab2:6c55:0:b0:1fd:c486:4f03 with SMTP id v21csp551143lqp; Wed, 12 Jun 2024 09:09:04 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXY6x39Yu3I06nRuG0W8BmGq2TjGKAXQBwytUlmhQae9MTbXWcsAHxTSfk7/Mxt94DyJN7EqA9lqlZOjv0Jzw3ZaZVDj9cOZ6tomKNhCQ== X-Google-Smtp-Source: AGHT+IF1hAfbPhlpPQMxVMPzh2l+MhgSwo0cw1Q2kme9XNue/iAitaTTU8vLe+H/iu9cjDsO8lMS X-Received: by 2002:a05:620a:24c8:b0:795:49eb:c2ec with SMTP id af79cd13be357-7981014d236mr12594485a.38.1718208544452; Wed, 12 Jun 2024 09:09:04 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718208544; cv=pass; d=google.com; s=arc-20160816; b=0THoAqB1wR5fptsJ2hesiKTsO8yPx0mlEX/IsTQV5iUUYIdryyp7ncBOVJC/GZaE4a QQnxxfOCwWUzSbZO3cwQ6uQFHobngXW4a8/ocj5a+U0bcLCbE4EDNypPz2BjDn0tzMV/ dPrCt7cPK5NAytWpM2HX9nIqLuOVCcCKUVujd43dA7pSbaaufeWEuoyJ7tQbJpkxni3p MUAgTQOkwFMsrbce3BiDaJnhBmWpD+iwdYtq7CdQsE61bGs4wRi8yA5RI56pbI5qbkTN 117BLyxB44gIAVmotva+ilDTY4/pqzsagnvQ8CD+CkCPN23C0pxhqloiuP+FlDr0O7Uu vQjg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from; bh=UPA39rmJjLqI0LT+dvz068/NOlRwufbgQdseHlU5Vl0=; fh=nvRSVYfMXwZFlmO4eLbdzOhRbl2x0Zh0NO/8oOj9urE=; b=wv1EhgaLkYZRQj4cdNtuv+9Caw11EWHnZBaNoapTkNZCTHACmMJgM9XSkC7HGcohw4 RomJ2W72PTfd+YfQ1lDe6rHtIL1ZYcsXxYAMyG1jXroC33LOA+dLBV+k3/mn0gSHV2SM SMyadzqdMNFxXMu8rxpoY/44ChioTG09dMWB2Wn3oFgknT8Z5twoWrw7ljH5aGdfWCRG YXIBrJfluvWK3UZwvwrnODQsSyvlCoHmRMLWiGNMgNLli0utU/sRzMxl6Hi++4fVHNf4 aUc6KhPEOjN4Ko6LB2mrgJpJO490bWuOB5YhlN7r1NOHqzwlxrPonwiNekwKynpVTyy5 PsBg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-211871-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-211871-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id af79cd13be357-7955234b0ebsi1108367585a.218.2024.06.12.09.09.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 12 Jun 2024 09:09:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-211871-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-211871-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-211871-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 332C11C22149 for ; Wed, 12 Jun 2024 16:08:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 54778180A8C; Wed, 12 Jun 2024 16:08:33 +0000 (UTC) Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C957C16EC13; Wed, 12 Jun 2024 16:08:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718208512; cv=none; b=gr+RKnwrlQdFubhj4lSkZCvAqYnPNiZDicVoE6/7PtNhbWY5R+vv5ig89FIlzWHzRSX5zkAAT32ls3iZSxkpuZFqGG4masEhBoVbKHYpnKW3hMSElKUkE8UgeBR/4v3lZFM0r48+ikVdkbxpftozcw8u59jjNjsgL5gYhZLU4zk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718208512; c=relaxed/simple; bh=W1z/9u3rEgHbPdyNnjpzPdL3NJwPRc2YbEoijhy0DxA=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version:Content-Type; b=X9Q1jCBcSf9soamP67e2iIeA7FPXhAPlOUiyVpPd5bwQWy7cy+Gygnm2TtPwnypGUWvFd5n1ljNHXMjOZI3js2EjGTULH34Xi5NHaFxBniqYK2z9MNhcl7MWDlzCCXefY/gfBOzH+slSUpSCJEm4TC8YCzDpYpbsuKCHaanfMNw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id D4C44C116B1; Wed, 12 Jun 2024 16:08:30 +0000 (UTC) From: Catalin Marinas To: Will Deacon , Shuah Khan , Mark Brown Cc: Johannes Nixdorf , Ard Biesheuvel , Dave Martin , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kselftest@vger.kernel.org Subject: Re: [PATCH] kselftest/arm64: Include kernel mode NEON in fp-stress Date: Wed, 12 Jun 2024 17:08:28 +0100 Message-Id: <171820848287.4013585.16773584820853103152.b4-ty@arm.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240521-arm64-fp-stress-kernel-v1-1-e38f107baad4@kernel.org> References: <20240521-arm64-fp-stress-kernel-v1-1-e38f107baad4@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit On Tue, 21 May 2024 19:18:26 +0100, Mark Brown wrote: > Currently fp-stress only covers userspace use of floating point, it does > not cover any kernel mode uses. Since currently kernel mode floating > point usage can't be preempted and there are explicit preemption points in > the existing implementations this isn't so important for fp-stress but > when we readd preemption it will be good to try to exercise it. > > When the arm64 accelerated crypto operations are implemented we can > relatively straightforwardly trigger kernel mode floating point usage by > using the crypto userspace API to hash data, using the splice() support > in an effort to minimise copying. We use /proc/crypto to check which > accelerated implementations are available, picking the first symmetric > hash we find. We run the kernel mode test unconditionally, replacing the > second copy of the FPSIMD testcase for systems with FPSIMD only. If we > don't think there are any suitable kernel mode implementations we fall back > to running another copy of fpsimd-stress. > > [...] Applied to arm64 (for-next/kselftest), thanks! [1/1] kselftest/arm64: Include kernel mode NEON in fp-stress https://git.kernel.org/arm64/c/d5859510d35d -- Catalin