Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/808342/?format=api
{ "id": 808342, "url": "http://patchwork.ozlabs.org/api/patches/808342/?format=api", "web_url": "http://patchwork.ozlabs.org/project/glibc/patch/1504198860-12951-24-git-send-email-Dave.Martin@arm.com/", "project": { "id": 41, "url": "http://patchwork.ozlabs.org/api/projects/41/?format=api", "name": "GNU C Library", "link_name": "glibc", "list_id": "libc-alpha.sourceware.org", "list_email": "libc-alpha@sourceware.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<1504198860-12951-24-git-send-email-Dave.Martin@arm.com>", "list_archive_url": null, "date": "2017-08-31T17:00:55", "name": "[v2,23/28] arm64/sve: KVM: Treat guest SVE use as undefined instruction execution", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "ff702674acb760006be37586c8d446813639c387", "submitter": { "id": 26612, "url": "http://patchwork.ozlabs.org/api/people/26612/?format=api", "name": "Dave Martin", "email": "Dave.Martin@arm.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/glibc/patch/1504198860-12951-24-git-send-email-Dave.Martin@arm.com/mbox/", "series": [ { "id": 882, "url": "http://patchwork.ozlabs.org/api/series/882/?format=api", "web_url": "http://patchwork.ozlabs.org/project/glibc/list/?series=882", "date": "2017-08-31T17:00:32", "name": "ARM Scalable Vector Extension (SVE)", "version": 2, "mbox": "http://patchwork.ozlabs.org/series/882/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/808342/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/808342/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<libc-alpha-return-83978-incoming=patchwork.ozlabs.org@sourceware.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": [ "patchwork-incoming@bilbo.ozlabs.org", "mailing list libc-alpha@sourceware.org" ], "Authentication-Results": [ "ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=sourceware.org\n\t(client-ip=209.132.180.131; helo=sourceware.org;\n\tenvelope-from=libc-alpha-return-83978-incoming=patchwork.ozlabs.org@sourceware.org;\n\treceiver=<UNKNOWN>)", "ozlabs.org; dkim=pass (1024-bit key;\n\tsecure) header.d=sourceware.org header.i=@sourceware.org\n\theader.b=\"kgBJ6YqW\"; dkim-atps=neutral", "sourceware.org; auth=none" ], "Received": [ "from sourceware.org (server1.sourceware.org [209.132.180.131])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xjpdc0QjQz9s81\n\tfor <incoming@patchwork.ozlabs.org>;\n\tFri, 1 Sep 2017 03:04:51 +1000 (AEST)", "(qmail 84783 invoked by alias); 31 Aug 2017 17:02:12 -0000", "(qmail 84683 invoked by uid 89); 31 Aug 2017 17:02:12 -0000" ], "DomainKey-Signature": "a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id\n\t:list-unsubscribe:list-subscribe:list-archive:list-post\n\t:list-help:sender:from:to:cc:subject:date:message-id:in-reply-to\n\t:references; q=dns; s=default; b=Af2LjdFIwmDw5MoG66IKq91hk6bF++o\n\tPAo3qCz7wFw4nBcaUs4BGVzd24Q735XO+fqPMgW6Yi0+g0DlAEbokI+dyk38MBaT\n\t0imieelw20/3NgraMEW1tcuOCNU8S7ElJkAOw+gczHente14v2cv1ZfA59acb7xp\n\tyD+Tygw0ireQ=", "DKIM-Signature": "v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id\n\t:list-unsubscribe:list-subscribe:list-archive:list-post\n\t:list-help:sender:from:to:cc:subject:date:message-id:in-reply-to\n\t:references; s=default; bh=+mmKWyKy7l6LuBkIJFN6AN2P/dk=; b=kgBJ6\n\tYqW6unyIhqhOISXEf3VXM30sPHMjYn2rrewIVGE7+9o2qY7TVVlTEXe/O9YyWa3z\n\tnx1MOkBlGuBZKILSy16WXM2UUB98OP3mH8AEGuKyTYrsKSdPXlzCeXw1KmXzhqWl\n\t/8zXNO6+nlNCrZKi3IsDKWap1tK1S1VICx9VNg=", "Mailing-List": "contact libc-alpha-help@sourceware.org; run by ezmlm", "Precedence": "bulk", "List-Id": "<libc-alpha.sourceware.org>", "List-Unsubscribe": "<mailto:libc-alpha-unsubscribe-incoming=patchwork.ozlabs.org@sourceware.org>", "List-Subscribe": "<mailto:libc-alpha-subscribe@sourceware.org>", "List-Archive": "<http://sourceware.org/ml/libc-alpha/>", "List-Post": "<mailto:libc-alpha@sourceware.org>", "List-Help": "<mailto:libc-alpha-help@sourceware.org>,\n\t<http://sourceware.org/ml/#faqs>", "Sender": "libc-alpha-owner@sourceware.org", "X-Virus-Found": "No", "X-Spam-SWARE-Status": "No, score=-26.9 required=5.0 tests=BAYES_00, GIT_PATCH_0,\n\tGIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, RP_MATCHES_RCVD,\n\tSPF_PASS autolearn=ham version=3.3.2 spammy=Hx-languages-length:1387,\n\tUntil, Hx-spam-relays-external:ESMTPA", "X-HELO": "foss.arm.com", "From": "Dave Martin <Dave.Martin@arm.com>", "To": "linux-arm-kernel@lists.infradead.org", "Cc": "Catalin Marinas <catalin.marinas@arm.com>, Will Deacon\n\t<will.deacon@arm.com>, \tArd Biesheuvel <ard.biesheuvel@linaro.org>,\n\t=?utf-8?q?Alex_Benn=C3=A9?= =?utf-8?q?e?= <alex.bennee@linaro.org>,\n\tSzabolcs Nagy <szabolcs.nagy@arm.com>, Richard Sandiford\n\t<richard.sandiford@arm.com>, \tkvmarm@lists.cs.columbia.edu,\n\tlibc-alpha@sourceware.org, \tlinux-arch@vger.kernel.org, Christoffer Dall\n\t<christoffer.dall@linaro.org>, \tMarc Zyngier <marc.zyngier@arm.com>", "Subject": "[PATCH v2 23/28] arm64/sve: KVM: Treat guest SVE use as undefined\n\tinstruction execution", "Date": "Thu, 31 Aug 2017 18:00:55 +0100", "Message-Id": "<1504198860-12951-24-git-send-email-Dave.Martin@arm.com>", "In-Reply-To": "<1504198860-12951-1-git-send-email-Dave.Martin@arm.com>", "References": "<1504198860-12951-1-git-send-email-Dave.Martin@arm.com>" }, "content": "When trapping forbidden attempts by a guest to use SVE, we want the\nguest to see a trap consistent with SVE not being implemented.\n\nThis patch injects an undefined instruction exception into the\nguest in response to such an exception.\n\nSigned-off-by: Dave Martin <Dave.Martin@arm.com>\n---\n arch/arm64/kvm/handle_exit.c | 8 ++++++++\n 1 file changed, 8 insertions(+)", "diff": "diff --git a/arch/arm64/kvm/handle_exit.c b/arch/arm64/kvm/handle_exit.c\nindex 17d8a16..e3e42d0 100644\n--- a/arch/arm64/kvm/handle_exit.c\n+++ b/arch/arm64/kvm/handle_exit.c\n@@ -147,6 +147,13 @@ static int kvm_handle_unknown_ec(struct kvm_vcpu *vcpu, struct kvm_run *run)\n \treturn 1;\n }\n \n+static int handle_sve(struct kvm_vcpu *vcpu, struct kvm_run *run)\n+{\n+\t/* Until SVE is supported for guests: */\n+\tkvm_inject_undefined(vcpu);\n+\treturn 1;\n+}\n+\n static exit_handle_fn arm_exit_handlers[] = {\n \t[0 ... ESR_ELx_EC_MAX]\t= kvm_handle_unknown_ec,\n \t[ESR_ELx_EC_WFx]\t= kvm_handle_wfx,\n@@ -160,6 +167,7 @@ static exit_handle_fn arm_exit_handlers[] = {\n \t[ESR_ELx_EC_HVC64]\t= handle_hvc,\n \t[ESR_ELx_EC_SMC64]\t= handle_smc,\n \t[ESR_ELx_EC_SYS64]\t= kvm_handle_sys_reg,\n+\t[ESR_ELx_EC_SVE]\t= handle_sve,\n \t[ESR_ELx_EC_IABT_LOW]\t= kvm_handle_guest_abort,\n \t[ESR_ELx_EC_DABT_LOW]\t= kvm_handle_guest_abort,\n \t[ESR_ELx_EC_SOFTSTP_LOW]= kvm_handle_guest_debug,\n", "prefixes": [ "v2", "23/28" ] }