{"id":831232,"url":"http://patchwork.ozlabs.org/api/1.2/patches/831232/?format=json","web_url":"http://patchwork.ozlabs.org/project/glibc/patch/1509101470-7881-24-git-send-email-Dave.Martin@arm.com/","project":{"id":41,"url":"http://patchwork.ozlabs.org/api/1.2/projects/41/?format=json","name":"GNU C Library","link_name":"glibc","list_id":"libc-alpha.sourceware.org","list_email":"libc-alpha@sourceware.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<1509101470-7881-24-git-send-email-Dave.Martin@arm.com>","list_archive_url":null,"date":"2017-10-27T10:51:05","name":"[v4,23/28] arm64/sve: KVM: Treat guest SVE use as undefined instruction execution","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"ff702674acb760006be37586c8d446813639c387","submitter":{"id":26612,"url":"http://patchwork.ozlabs.org/api/1.2/people/26612/?format=json","name":"Dave Martin","email":"Dave.Martin@arm.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/glibc/patch/1509101470-7881-24-git-send-email-Dave.Martin@arm.com/mbox/","series":[{"id":10555,"url":"http://patchwork.ozlabs.org/api/1.2/series/10555/?format=json","web_url":"http://patchwork.ozlabs.org/project/glibc/list/?series=10555","date":"2017-10-27T10:50:42","name":"ARM Scalable Vector Extension (SVE)","version":4,"mbox":"http://patchwork.ozlabs.org/series/10555/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/831232/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/831232/checks/","tags":{},"related":[],"headers":{"Return-Path":"<libc-alpha-return-86465-incoming=patchwork.ozlabs.org@sourceware.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":["patchwork-incoming@bilbo.ozlabs.org","mailing list libc-alpha@sourceware.org"],"Authentication-Results":["ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=sourceware.org\n\t(client-ip=209.132.180.131; helo=sourceware.org;\n\tenvelope-from=libc-alpha-return-86465-incoming=patchwork.ozlabs.org@sourceware.org;\n\treceiver=<UNKNOWN>)","ozlabs.org; dkim=pass (1024-bit key;\n\tsecure) header.d=sourceware.org header.i=@sourceware.org\n\theader.b=\"hf3Gdg3O\"; dkim-atps=neutral","sourceware.org; auth=none"],"Received":["from sourceware.org (server1.sourceware.org [209.132.180.131])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3yNglb5VQ3z9rxj\n\tfor <incoming@patchwork.ozlabs.org>;\n\tFri, 27 Oct 2017 21:55:55 +1100 (AEDT)","(qmail 120778 invoked by alias); 27 Oct 2017 10:52:06 -0000","(qmail 120730 invoked by uid 89); 27 Oct 2017 10:52:06 -0000"],"DomainKey-Signature":"a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id\n\t:list-unsubscribe:list-subscribe:list-archive:list-post\n\t:list-help:sender:from:to:cc:subject:date:message-id:in-reply-to\n\t:references:mime-version:content-type:content-transfer-encoding;\n\tq=dns; s=default; b=X88His65T0cH6cLNFoAM1wfnfgXDkUeXkeVDRWPu8v/\n\t7lD+6OFSFzNyoo3ke5RnaYr0Urx8NuAKNVmecT4mfeWcZQZZj4uZbc4zIGbAB/qS\n\trW/u/kEFF+O5KQqIu7fP+Jsz25Ltaj/c1+1EbSZhyZwzKPxRy4+MJmX3jGbrsiIk\n\t=","DKIM-Signature":"v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id\n\t:list-unsubscribe:list-subscribe:list-archive:list-post\n\t:list-help:sender:from:to:cc:subject:date:message-id:in-reply-to\n\t:references:mime-version:content-type:content-transfer-encoding;\n\ts=default; bh=Wen5xjj3C9y2MT4s83c+C2LUjNo=; b=hf3Gdg3OyRbbDDr8g\n\tQcH3kA3ZNh+C3mMobpnqwvjVu4XdPDLgQBGs/HFP/2aaBU2rD3YDp1oGtanlcGTf\n\t+Hv9tz4JOTvXPgHD/US5EYoAoi9Iq3xKoU9WXkZUyjxu74sgKy1Gxqgq9eN546su\n\tnSWhs62tO3c/tMAQvH1kQITdPY=","Mailing-List":"contact libc-alpha-help@sourceware.org; run by ezmlm","Precedence":"bulk","List-Id":"<libc-alpha.sourceware.org>","List-Unsubscribe":"<mailto:libc-alpha-unsubscribe-incoming=patchwork.ozlabs.org@sourceware.org>","List-Subscribe":"<mailto:libc-alpha-subscribe@sourceware.org>","List-Archive":"<http://sourceware.org/ml/libc-alpha/>","List-Post":"<mailto:libc-alpha@sourceware.org>","List-Help":"<mailto:libc-alpha-help@sourceware.org>,\n\t<http://sourceware.org/ml/#faqs>","Sender":"libc-alpha-owner@sourceware.org","X-Virus-Found":"No","X-Spam-SWARE-Status":"No, score=-26.9 required=5.0 tests=BAYES_00, GIT_PATCH_0,\n\tGIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, RP_MATCHES_RCVD,\n\tSPF_PASS autolearn=ham version=3.3.2 spammy=Hx-languages-length:1547","X-HELO":"foss.arm.com","From":"Dave Martin <Dave.Martin@arm.com>","To":"linux-arm-kernel@lists.infradead.org","Cc":"Catalin Marinas <catalin.marinas@arm.com>, Will Deacon\n\t<will.deacon@arm.com>, \tArd Biesheuvel <ard.biesheuvel@linaro.org>,\n\t=?utf-8?q?Alex_Benn=C3=A9?= =?utf-8?q?e?= <alex.bennee@linaro.org>,\n\tSzabolcs Nagy <szabolcs.nagy@arm.com>, Okamoto Takayuki\n\t<tokamoto@jp.fujitsu.com>, \tkvmarm@lists.cs.columbia.edu,\n\tlibc-alpha@sourceware.org, \tlinux-arch@vger.kernel.org","Subject":"[PATCH v4 23/28] arm64/sve: KVM: Treat guest SVE use as undefined\n\tinstruction execution","Date":"Fri, 27 Oct 2017 11:51:05 +0100","Message-Id":"<1509101470-7881-24-git-send-email-Dave.Martin@arm.com>","In-Reply-To":"<1509101470-7881-1-git-send-email-Dave.Martin@arm.com>","References":"<1509101470-7881-1-git-send-email-Dave.Martin@arm.com>","MIME-Version":"1.0","Content-Type":"text/plain; charset=UTF-8","Content-Transfer-Encoding":"8bit"},"content":"When trapping forbidden attempts by a guest to use SVE, we want the\nguest to see a trap consistent with SVE not being implemented.\n\nThis patch injects an undefined instruction exception into the\nguest in response to such an exception.\n\nSigned-off-by: Dave Martin <Dave.Martin@arm.com>\nReviewed-by: Alex Bennée <alex.bennee@linaro.org>\nAcked-by: Catalin Marinas <catalin.marinas@arm.com>\nAcked-by: Christoffer Dall <christoffer.dall@linaro.org>\n---\n arch/arm64/kvm/handle_exit.c | 8 ++++++++\n 1 file changed, 8 insertions(+)","diff":"diff --git a/arch/arm64/kvm/handle_exit.c b/arch/arm64/kvm/handle_exit.c\nindex 7debb74..b712479 100644\n--- a/arch/arm64/kvm/handle_exit.c\n+++ b/arch/arm64/kvm/handle_exit.c\n@@ -147,6 +147,13 @@ static int kvm_handle_unknown_ec(struct kvm_vcpu *vcpu, struct kvm_run *run)\n \treturn 1;\n }\n \n+static int handle_sve(struct kvm_vcpu *vcpu, struct kvm_run *run)\n+{\n+\t/* Until SVE is supported for guests: */\n+\tkvm_inject_undefined(vcpu);\n+\treturn 1;\n+}\n+\n static exit_handle_fn arm_exit_handlers[] = {\n \t[0 ... ESR_ELx_EC_MAX]\t= kvm_handle_unknown_ec,\n \t[ESR_ELx_EC_WFx]\t= kvm_handle_wfx,\n@@ -160,6 +167,7 @@ static exit_handle_fn arm_exit_handlers[] = {\n \t[ESR_ELx_EC_HVC64]\t= handle_hvc,\n \t[ESR_ELx_EC_SMC64]\t= handle_smc,\n \t[ESR_ELx_EC_SYS64]\t= kvm_handle_sys_reg,\n+\t[ESR_ELx_EC_SVE]\t= handle_sve,\n \t[ESR_ELx_EC_IABT_LOW]\t= kvm_handle_guest_abort,\n \t[ESR_ELx_EC_DABT_LOW]\t= kvm_handle_guest_abort,\n \t[ESR_ELx_EC_SOFTSTP_LOW]= kvm_handle_guest_debug,\n","prefixes":["v4","23/28"]}