Received: by 2002:a05:7412:5112:b0:fa:6e18:a558 with SMTP id fm18csp561018rdb; Tue, 23 Jan 2024 07:50:43 -0800 (PST) X-Google-Smtp-Source: AGHT+IGub0d+xsA3yxPFb00P6xtzJMeOGmD2W6oOTsPchBWu2jT3JauODZAluP/j1jfND9/GVKSP X-Received: by 2002:a05:6402:2707:b0:55c:9b8b:45d0 with SMTP id y7-20020a056402270700b0055c9b8b45d0mr218999edd.46.1706025043523; Tue, 23 Jan 2024 07:50:43 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706025043; cv=pass; d=google.com; s=arc-20160816; b=HCd2sDq3AmHbGrAItowMkurGim6kpWpZdTK3jbg3iC2XhG7jk2iD+chInBV83BIdAP X2hsEZxmHutmhKrvuSnfqEqVhtPRybEnjMXGoHp6Da/qljYh00yvl/QMUm5vLO8aeCB8 C/HRPfshH5qX+pUZGHiTG4bSJPpjqN+oIsBfT3UCBF4aMxdxpdJOvMITuKVoZasPld45 QQVLmpes55lnz15dn9gk37JKNd6dnmMV2fOmMlEdCP9e2hVrwbxqxQHFTENvg6foQx7m R1ZAvFl1fckmMWpuhkh/yGFKX7nkgIL1bZRvBDLMNOiJmCsz0fZf8Rt7HgJzQyOUGIr+ rtPg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=mkwoBOvelYLX3HElteBgCfdRQG3rgopw5FgVMkc3McQ=; fh=uYUdXSypgvEjVdoPV0cPDvuseGbP+aWlrBghwZwQ+i0=; b=P8pc9OJsfFaHx3pJRTcy07gQQ87BkTHYyuENmltkKBPJHUFr3aMs1VdVz2VPW+GBaX +ZsgEEzaDx4VRHAvlysuyNhOWljTwAagIBmJSlvsI4T/pC/IV1esRHIwAE3bXXuI2jna NU4rJ8Ge/f4CqYEan9dkmak8BF/RhcGAxLhcTyazMKaDitXZLQvkhsMM9YrmG4ZA0pJh gq1bEcP9mZfqHzy4bLYyQINiXKXeHyGtHQOyCcB8kCwm+63m4gN0OBMAgpErz7hSmtAV GoX4hG6RnETpscktVy8R41c/fmx7fq4+foVfAsJa4ig6q81nkLGiy6vpQvXPTNEIWTEZ H/Zg== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-35584-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-35584-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id x3-20020a50ba83000000b0055a57d7c420si5024056ede.630.2024.01.23.07.50.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 23 Jan 2024 07:50:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-35584-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-35584-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-35584-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 4921E1F2A78A for ; Tue, 23 Jan 2024 15:50:43 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id EA660604B8; Tue, 23 Jan 2024 15:44:32 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B335C5FF07; Tue, 23 Jan 2024 15:44:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706024672; cv=none; b=ZXQ84dO1Ia2jcgGhYOuSZGl/igBobDiuVlMHfK6utD/aWvqRyaoy34bc4WzUyfvifi/u7jX1SqVhEzi5+Cq0BjAIeneKoBG56cH6VXG8TvFFyFBE4yihW9CavAJuW1UqGZk4+lbhLmqpiVR2gItgltu5vTOM31fBPIvg17MyaGA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706024672; c=relaxed/simple; bh=+UBMBwqjM4LUVFP6+vP3hZIWmeh/+RFBlTBKRI4wpMM=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=Ii/HgVgFQwn9JzHVmOGDqZzJYvbFtkdWLowQ+Co2A8l6w0teJhcXS95ZmcoAKC5rjV++O1Kmfprjoq7AI7XxC3acvnLtNDxV7yL2r5zOJiyyZ/MDNHtg5num2DNkbH3W+xLA/Qm8HqyuGNJ1cqjRe+5nup4xrAuby7qGjtEHpgo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 178871FB; Tue, 23 Jan 2024 07:45:12 -0800 (PST) Received: from e133380.arm.com (e133380.arm.com [10.1.197.58]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id AC65E3F5A1; Tue, 23 Jan 2024 07:44:25 -0800 (PST) Date: Tue, 23 Jan 2024 15:44:23 +0000 From: Dave Martin To: Mark Brown Cc: Catalin Marinas , Will Deacon , Jonathan Corbet , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Edmund Grimley-Evans Subject: Re: [PATCH 1/4] arm64/sve: Remove bitrotted comment about syscall behaviour Message-ID: References: <20240122-arm64-sve-sme-doc-v1-0-3d492e45265b@kernel.org> <20240122-arm64-sve-sme-doc-v1-1-3d492e45265b@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240122-arm64-sve-sme-doc-v1-1-3d492e45265b@kernel.org> On Mon, Jan 22, 2024 at 08:41:51PM +0000, Mark Brown wrote: > When we documented that we always clear state not shared with FPSIMD we Where / when? > didn't catch all of the places that mentioned that state might not be > cleared, remove a lingering reference. > > Reported-by: Edmund Grimley-Evans > Signed-off-by: Mark Brown > --- > Documentation/arch/arm64/sve.rst | 5 ----- > 1 file changed, 5 deletions(-) > > diff --git a/Documentation/arch/arm64/sve.rst b/Documentation/arch/arm64/sve.rst > index 0d9a426e9f85..b45a2da19bf1 100644 > --- a/Documentation/arch/arm64/sve.rst > +++ b/Documentation/arch/arm64/sve.rst > @@ -117,11 +117,6 @@ the SVE instruction set architecture. > * The SVE registers are not used to pass arguments to or receive results from > any syscall. > > -* In practice the affected registers/bits will be preserved or will be replaced > - with zeros on return from a syscall, but userspace should not make > - assumptions about this. The kernel behaviour may vary on a case-by-case > - basis. > - This was originally an intentionally conservative statement, to allow the kernel the flexibility to relax the register zeroing behaviour in the future. It would have permitted not always disabling a task's SVE across a syscall, for example. There were some concerns about security and testability that meant that we didn't use this flexibility to begin with. If we are making an irrevocable commitment not to use this flexibility ever, then this comment can go, but if we're not totally sure then I think it would be harmless to keep it (?) (Feel free to point me to the relevant past discussion that I may have missed.) [...] Cheers ---Dave