Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp216515imm; Wed, 30 May 2018 22:05:11 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLAL+agYfCPZiUS1bLQYEJIvvOFxEBrNWWb4YmUhGTJxpKXA6JcaYe/FTW2PIjWFdfIL6cj X-Received: by 2002:a63:343:: with SMTP id 64-v6mr4402202pgd.354.1527743111190; Wed, 30 May 2018 22:05:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527743111; cv=none; d=google.com; s=arc-20160816; b=o8IhaNMh+x5A/qpr70+QS+k5mK9f2AoFzSJ2dxcgli3mzEOvUp94KI7VGTbCGRO/Ji DpKWcbdUbvS65EwBZ5hqfvsxepJKGUrfc9QSWTv9BSfJl+0xYKIMj1+KAQVuwczJv7P0 vFEi9M6PbSc99283JEQfdNAlE43qKbrwDdVh0ejP/YL1Hzp0P0if0ATQk+1yCJ34Zxzh +sZOZO7/PG6vAuLSbJN/bu59CYgiqIOnM+9hUvQtdH+hhdBvzLJlvmrE5cH2mhmiVP2n bceAur3wW9QTW1xyTcI7hLBhT5eDrv9GLM6bm32Wt7Lui1AoSfU7vmfTN1dWkwPMJx6f 2wqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:to :from:arc-authentication-results; bh=0xm4zqUFsB/wZNVpsKQc2u4ZOm5xBlmBYf08qtbgpls=; b=CFcWvTyOATa7YjvRcPIi6ynh2xAMBXCD/LhSVdd1Up+7f2q8FbvOQ1iY2Z+lYoNcAg fanQDuClGIC/o9TJ1HOjTydDOE7M6iCNBghksFpMiVBgblDSrl6zkkd5kYOAH+7I6OBS lnjmCgneLVe2Dk6ySN6aaPqA5j/57LVa0qa1fcFX4/vxear6D+3Ug2/VlB/YQw9JTJJ+ ld9OXtG3ZE3TRuvUDzphGCSwHiTvBr3jjPcOymU7qpzk+WaTV7wr2Y+Em2jbOTe6hFIq w6Pb0Eq2U1T0WWSX+8dYWqw1zYIOkojY4McRJqAGKj9+fzC7xWlVNq62lwhdZh9InRAW x4OA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v32-v6si36257977plb.273.2018.05.30.22.04.57; Wed, 30 May 2018 22:05:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753946AbeEaFDp (ORCPT + 99 others); Thu, 31 May 2018 01:03:45 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:52225 "EHLO huawei.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1753898AbeEaFDl (ORCPT ); Thu, 31 May 2018 01:03:41 -0400 Received: from DGGEMS405-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id 92BB9FF387608; Thu, 31 May 2018 13:03:36 +0800 (CST) Received: from localhost.localdomain (10.143.28.90) by DGGEMS405-HUB.china.huawei.com (10.3.19.205) with Microsoft SMTP Server id 14.3.382.0; Thu, 31 May 2018 13:03:30 +0800 From: Dongjiu Geng To: , , , , , , , , , , , , , Subject: [PATCH v1 0/2] support to set VSESR_EL2 by user space Date: Thu, 31 May 2018 21:08:57 +0800 Message-ID: <1527772139-19665-1-git-send-email-gengdongjiu@huawei.com> X-Mailer: git-send-email 1.9.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.143.28.90] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series patch is separated from https://www.spinics.net/lists/kvm/msg168917.html 1. Detect whether KVM can set set guest SError syndrome 2. Support to Set VSESR_EL2 and inject SError by user space. 3. Support live migration to keep SError pending state and VSESR_EL2 value The user space patch is here: https://lists.gnu.org/archive/html/qemu-devel/2018-05/msg06965.html Dongjiu Geng (2): arm64: KVM: export the capability to set guest SError syndrome arm/arm64: KVM: Add KVM_GET/SET_VCPU_EVENTS Documentation/virtual/kvm/api.txt | 42 +++++++++++++++++++++++++++++++++--- arch/arm/include/asm/kvm_host.h | 6 ++++++ arch/arm/kvm/guest.c | 12 +++++++++++ arch/arm64/include/asm/kvm_emulate.h | 5 +++++ arch/arm64/include/asm/kvm_host.h | 7 ++++++ arch/arm64/include/uapi/asm/kvm.h | 13 +++++++++++ arch/arm64/kvm/guest.c | 36 +++++++++++++++++++++++++++++++ arch/arm64/kvm/inject_fault.c | 7 +++++- arch/arm64/kvm/reset.c | 4 ++++ include/uapi/linux/kvm.h | 1 + virt/kvm/arm/arm.c | 21 ++++++++++++++++++ 11 files changed, 150 insertions(+), 4 deletions(-) -- 2.7.4