Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp747208imm; Fri, 8 Jun 2018 04:44:30 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKgYv4Kz2WuLEWK9yN5O+kcukaQQ78sDK6NwgtFuCVM9QfRDgQUyrlrV6tRCaVp29haXqa+ X-Received: by 2002:a17:902:570f:: with SMTP id k15-v6mr6275330pli.17.1528458270181; Fri, 08 Jun 2018 04:44:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528458270; cv=none; d=google.com; s=arc-20160816; b=wipYzxPYsYdws0PLoq58aGwwrXmf07Q8npZkkJmdPLKYGgTPbKZvGKYZV3FkN6rjB2 V/nZy5JH6o0IFfOWOf3c5jvjhNDdMr1A8DpqKbISBtd/GtXTN2DIPwLskUciL1gotwGo SA0RavRQZHqHu/T0DJSVuEKbjWDON2oGs5/VZCxPcNp5Jso0FhntQubGLH9UCFtubGXU L0Xs3RVrQPYuIrbS9kYHbth8DUuZN6LAgxsLHPDBE1pMFswrpLUhnfwypmt0nBV6TqW+ JKkENbXBcsmSV/BO48CErHnS1Nc5eAiBbxB6UbJZ9+jBhujaE4rMXGs3FQUxNh7ox1fG Xk4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:to :from:arc-authentication-results; bh=llmYW6/seJar+sXRjphqLdz0EcP+pUvLrFnY5MJLbOk=; b=Qq91FPJGyffABHF7A43cSAlNmhP0NWKWRyXWyb5hSRxh7qEg1EqfVXVtIGifxbCurD qGRGLD6Wwj0dMIIs+kkGoXg9gYRe2DJL/ioLE5npywTYyxkCPG+deDMFYtlWZLLipnC/ KfKqouAFFJogihjxESGQ/yj7qM5Rt1ONLdFz8LGlySFs6WkhvZzY8RlKU4EZD/z0UVoU sBsaP5ZVP7oert3mCJY0O88Zb8VoEcGCh/MqGtcOUCUw60yDlSOFx4gwGmFWCv4VfGHf rk8l0aKcD2fgX89YbNGLZmEPD3AgHWYjtUFK72BHQAGzNPMIahMA1TfZnMtwns7yt6WB w31A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 18-v6si31578900pfr.242.2018.06.08.04.44.14; Fri, 08 Jun 2018 04:44:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752729AbeFHLnp (ORCPT + 99 others); Fri, 8 Jun 2018 07:43:45 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:8705 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751485AbeFHLnl (ORCPT ); Fri, 8 Jun 2018 07:43:41 -0400 Received: from DGGEMS402-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id E3AFB46B124F; Fri, 8 Jun 2018 19:43:25 +0800 (CST) Received: from localhost.localdomain (10.143.28.90) by DGGEMS402-HUB.china.huawei.com (10.3.19.202) with Microsoft SMTP Server id 14.3.382.0; Fri, 8 Jun 2018 19:43:17 +0800 From: Dongjiu Geng To: , , , , , , , , , , , , , Subject: [PATCH RESEND v4 0/2] support exception state migration and set VSESR_EL2 by user space Date: Sat, 9 Jun 2018 03:48:38 +0800 Message-ID: <1528487320-2873-1-git-send-email-gengdongjiu@huawei.com> X-Mailer: git-send-email 1.9.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.143.28.90] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series patch is separated from https://www.spinics.net/lists/kvm/msg168917.html 1. Detect whether KVM can set set guest SError syndrome 2. Support to Set VSESR_EL2 and inject SError by user space. 3. Support live migration to keep SError pending state and VSESR_EL2 value The user space patch is here: https://www.mail-archive.com/qemu-devel@nongnu.org/msg539534.html Dongjiu Geng (2): arm64: KVM: export the capability to set guest SError syndrome arm/arm64: KVM: Add KVM_GET/SET_VCPU_EVENTS Documentation/virtual/kvm/api.txt | 42 +++++++++++++++++++++++++++++++++--- arch/arm/include/asm/kvm_host.h | 6 ++++++ arch/arm/include/uapi/asm/kvm.h | 12 +++++++++++ arch/arm/kvm/guest.c | 12 +++++++++++ arch/arm64/include/asm/kvm_emulate.h | 5 +++++ arch/arm64/include/asm/kvm_host.h | 7 ++++++ arch/arm64/include/uapi/asm/kvm.h | 13 +++++++++++ arch/arm64/kvm/guest.c | 36 +++++++++++++++++++++++++++++++ arch/arm64/kvm/inject_fault.c | 6 +++--- arch/arm64/kvm/reset.c | 4 ++++ include/uapi/linux/kvm.h | 1 + virt/kvm/arm/arm.c | 19 ++++++++++++++++ 12 files changed, 157 insertions(+), 6 deletions(-) -- 2.7.4