{"id":808342,"url":"http://patchwork.ozlabs.org/api/1.0/patches/808342/?format=json","project":{"id":41,"url":"http://patchwork.ozlabs.org/api/1.0/projects/41/?format=json","name":"GNU C Library","link_name":"glibc","list_id":"libc-alpha.sourceware.org","list_email":"libc-alpha@sourceware.org","web_url":"","scm_url":"","webscm_url":""},"msgid":"<1504198860-12951-24-git-send-email-Dave.Martin@arm.com>","date":"2017-08-31T17:00:55","name":"[v2,23/28] arm64/sve: KVM: Treat guest SVE use as undefined instruction execution","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"ff702674acb760006be37586c8d446813639c387","submitter":{"id":26612,"url":"http://patchwork.ozlabs.org/api/1.0/people/26612/?format=json","name":"Dave Martin","email":"Dave.Martin@arm.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/glibc/patch/1504198860-12951-24-git-send-email-Dave.Martin@arm.com/mbox/","series":[{"id":882,"url":"http://patchwork.ozlabs.org/api/1.0/series/882/?format=json","date":"2017-08-31T17:00:32","name":"ARM Scalable Vector Extension (SVE)","version":2,"mbox":"http://patchwork.ozlabs.org/series/882/mbox/"}],"check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/808342/checks/","tags":{},"headers":{"Return-Path":"<libc-alpha-return-83978-incoming=patchwork.ozlabs.org@sourceware.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":["patchwork-incoming@bilbo.ozlabs.org","mailing list libc-alpha@sourceware.org"],"Authentication-Results":["ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=sourceware.org\n\t(client-ip=209.132.180.131; helo=sourceware.org;\n\tenvelope-from=libc-alpha-return-83978-incoming=patchwork.ozlabs.org@sourceware.org;\n\treceiver=<UNKNOWN>)","ozlabs.org; dkim=pass (1024-bit key;\n\tsecure) header.d=sourceware.org header.i=@sourceware.org\n\theader.b=\"kgBJ6YqW\"; dkim-atps=neutral","sourceware.org; auth=none"],"Received":["from sourceware.org (server1.sourceware.org [209.132.180.131])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xjpdc0QjQz9s81\n\tfor <incoming@patchwork.ozlabs.org>;\n\tFri,  1 Sep 2017 03:04:51 +1000 (AEST)","(qmail 84783 invoked by alias); 31 Aug 2017 17:02:12 -0000","(qmail 84683 invoked by uid 89); 31 Aug 2017 17:02:12 -0000"],"DomainKey-Signature":"a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id\n\t:list-unsubscribe:list-subscribe:list-archive:list-post\n\t:list-help:sender:from:to:cc:subject:date:message-id:in-reply-to\n\t:references; q=dns; s=default; b=Af2LjdFIwmDw5MoG66IKq91hk6bF++o\n\tPAo3qCz7wFw4nBcaUs4BGVzd24Q735XO+fqPMgW6Yi0+g0DlAEbokI+dyk38MBaT\n\t0imieelw20/3NgraMEW1tcuOCNU8S7ElJkAOw+gczHente14v2cv1ZfA59acb7xp\n\tyD+Tygw0ireQ=","DKIM-Signature":"v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id\n\t:list-unsubscribe:list-subscribe:list-archive:list-post\n\t:list-help:sender:from:to:cc:subject:date:message-id:in-reply-to\n\t:references; s=default; bh=+mmKWyKy7l6LuBkIJFN6AN2P/dk=; b=kgBJ6\n\tYqW6unyIhqhOISXEf3VXM30sPHMjYn2rrewIVGE7+9o2qY7TVVlTEXe/O9YyWa3z\n\tnx1MOkBlGuBZKILSy16WXM2UUB98OP3mH8AEGuKyTYrsKSdPXlzCeXw1KmXzhqWl\n\t/8zXNO6+nlNCrZKi3IsDKWap1tK1S1VICx9VNg=","Mailing-List":"contact libc-alpha-help@sourceware.org; run by ezmlm","Precedence":"bulk","List-Id":"<libc-alpha.sourceware.org>","List-Unsubscribe":"<mailto:libc-alpha-unsubscribe-incoming=patchwork.ozlabs.org@sourceware.org>","List-Subscribe":"<mailto:libc-alpha-subscribe@sourceware.org>","List-Archive":"<http://sourceware.org/ml/libc-alpha/>","List-Post":"<mailto:libc-alpha@sourceware.org>","List-Help":"<mailto:libc-alpha-help@sourceware.org>,\n\t<http://sourceware.org/ml/#faqs>","Sender":"libc-alpha-owner@sourceware.org","X-Virus-Found":"No","X-Spam-SWARE-Status":"No, score=-26.9 required=5.0 tests=BAYES_00, GIT_PATCH_0,\n\tGIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, RP_MATCHES_RCVD,\n\tSPF_PASS autolearn=ham version=3.3.2 spammy=Hx-languages-length:1387,\n\tUntil, Hx-spam-relays-external:ESMTPA","X-HELO":"foss.arm.com","From":"Dave Martin <Dave.Martin@arm.com>","To":"linux-arm-kernel@lists.infradead.org","Cc":"Catalin Marinas <catalin.marinas@arm.com>, Will Deacon\n\t<will.deacon@arm.com>, \tArd Biesheuvel <ard.biesheuvel@linaro.org>,\n\t=?utf-8?q?Alex_Benn=C3=A9?= =?utf-8?q?e?= <alex.bennee@linaro.org>,\n\tSzabolcs Nagy <szabolcs.nagy@arm.com>, Richard Sandiford\n\t<richard.sandiford@arm.com>, \tkvmarm@lists.cs.columbia.edu,\n\tlibc-alpha@sourceware.org, \tlinux-arch@vger.kernel.org, Christoffer Dall\n\t<christoffer.dall@linaro.org>, \tMarc Zyngier <marc.zyngier@arm.com>","Subject":"[PATCH v2 23/28] arm64/sve: KVM: Treat guest SVE use as undefined\n\tinstruction execution","Date":"Thu, 31 Aug 2017 18:00:55 +0100","Message-Id":"<1504198860-12951-24-git-send-email-Dave.Martin@arm.com>","In-Reply-To":"<1504198860-12951-1-git-send-email-Dave.Martin@arm.com>","References":"<1504198860-12951-1-git-send-email-Dave.Martin@arm.com>"},"content":"When trapping forbidden attempts by a guest to use SVE, we want the\nguest to see a trap consistent with SVE not being implemented.\n\nThis patch injects an undefined instruction exception into the\nguest in response to such an exception.\n\nSigned-off-by: Dave Martin <Dave.Martin@arm.com>\n---\n arch/arm64/kvm/handle_exit.c | 8 ++++++++\n 1 file changed, 8 insertions(+)","diff":"diff --git a/arch/arm64/kvm/handle_exit.c b/arch/arm64/kvm/handle_exit.c\nindex 17d8a16..e3e42d0 100644\n--- a/arch/arm64/kvm/handle_exit.c\n+++ b/arch/arm64/kvm/handle_exit.c\n@@ -147,6 +147,13 @@ static int kvm_handle_unknown_ec(struct kvm_vcpu *vcpu, struct kvm_run *run)\n \treturn 1;\n }\n \n+static int handle_sve(struct kvm_vcpu *vcpu, struct kvm_run *run)\n+{\n+\t/* Until SVE is supported for guests: */\n+\tkvm_inject_undefined(vcpu);\n+\treturn 1;\n+}\n+\n static exit_handle_fn arm_exit_handlers[] = {\n \t[0 ... ESR_ELx_EC_MAX]\t= kvm_handle_unknown_ec,\n \t[ESR_ELx_EC_WFx]\t= kvm_handle_wfx,\n@@ -160,6 +167,7 @@ static exit_handle_fn arm_exit_handlers[] = {\n \t[ESR_ELx_EC_HVC64]\t= handle_hvc,\n \t[ESR_ELx_EC_SMC64]\t= handle_smc,\n \t[ESR_ELx_EC_SYS64]\t= kvm_handle_sys_reg,\n+\t[ESR_ELx_EC_SVE]\t= handle_sve,\n \t[ESR_ELx_EC_IABT_LOW]\t= kvm_handle_guest_abort,\n \t[ESR_ELx_EC_DABT_LOW]\t= kvm_handle_guest_abort,\n \t[ESR_ELx_EC_SOFTSTP_LOW]= kvm_handle_guest_debug,\n","prefixes":["v2","23/28"]}