Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1111711imm; Fri, 29 Jun 2018 11:34:26 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKvaVC5qQLVgJiePPyskgZeOen1MtQZ+n+4BYhQVLOVc6DkSOCAavrswxrG7O9w+9sHUSIb X-Received: by 2002:a65:6292:: with SMTP id f18-v6mr13593760pgv.85.1530297266538; Fri, 29 Jun 2018 11:34:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530297266; cv=none; d=google.com; s=arc-20160816; b=VnySD6bA1pHRe7mzpHF733yqcFwAJ+oQGx/+To/rw7wTzQWHwtO2dvpigJ03j6Y0al yp4KHaLijmMyM8rsIWAjVriaNayaK47F5vezjy1KlOi7R6ZLMaQmBL+hOwKQmfWC2KP3 ISo+aO4SESp+3SyK3RlJzVnNSUounlFFJOxX7Y72mHKaIVuILO6OIxINBuBXsD9+NOCe odW1QMn4w6bS6cnk03XTGIKDAGxtL4PJCfm6LQZ/sCfy9gm6fECgWVkjKjJXMkXmnEyo LEqSsTxIiX/6LWk5kH6YCFxG7jB0bp+zbSOOWTm6Ce/yaoWKliPs564xwWPkLYpImrXR PadA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:cc:from:references:to:subject:arc-authentication-results; bh=Fl4TlmsMkvnZcsWD6qfFsgK7YvcreL8wiDM+8cPH0EM=; b=Jb1NXmHpfoKfVxTEZ2MKAEK+dGy6grHNCZ0SLjguoXY62wOOcFyurIdeMqjjNgg0/x jtRKyyhuyUt9oUkO0Ith7bI23r/uyRpMyXju/VaSiLolPGASqGViEA1r51EnsrLRDku7 cWGHByTGzUZDJ68yfQPZ872MjEoszg6V1lpaFeSr38EocOOsaRwLIUEleTqPucITEI4w RjZvmF8o5Xp0UICPUZxSC0LLJ4BcPH1AxLsUwLYPkrAyQ85EpPr9R9GcLnhvnjWd4Qdk g9b1TY1i6UDao00bpNJI6tf3GkzmtOcr4BA+iI0SFRGaM0WpnDoiV0A3OgcNUyBuev01 0/Dw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k72-v6si10016801pfj.141.2018.06.29.11.34.12; Fri, 29 Jun 2018 11:34:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966720AbeF2P6v (ORCPT + 99 others); Fri, 29 Jun 2018 11:58:51 -0400 Received: from foss.arm.com ([217.140.101.70]:36470 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934265AbeF2P6t (ORCPT ); Fri, 29 Jun 2018 11:58:49 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 06B6518A; Fri, 29 Jun 2018 08:58:49 -0700 (PDT) Received: from [10.1.206.34] (melchizedek.cambridge.arm.com [10.1.206.34]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 33AE73F5C0; Fri, 29 Jun 2018 08:58:46 -0700 (PDT) Subject: Re: [PATCH v5 2/2] arm64: KVM: export the capability to set guest SError syndrome To: Dongjiu Geng References: <1529960309-2513-1-git-send-email-gengdongjiu@huawei.com> <1529960309-2513-3-git-send-email-gengdongjiu@huawei.com> From: James Morse Cc: rkrcmar@redhat.com, corbet@lwn.net, christoffer.dall@arm.com, marc.zyngier@arm.com, linux@armlinux.org.uk, catalin.marinas@arm.com, will.deacon@arm.com, kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-acpi@vger.kernel.org Message-ID: Date: Fri, 29 Jun 2018 16:58:44 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <1529960309-2513-3-git-send-email-gengdongjiu@huawei.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Dongjiu Geng, This patch doesn't apply on v4.18-rc2. Documentation/virtual/kvm/api.txt already has a 8.18 section. I guess you based this on v4.17. For posting patches, please use the latest 'rc' from Linus' tree, (or the maintainer's tree listed in MAINTAINERS for the tree you are targeting if the maintainer has started to pick up patches). Thanks, James On 25/06/18 21:58, Dongjiu Geng wrote: > For the arm64 RAS Extension, user space can inject a virtual-SError > with specified ESR. So user space needs to know whether KVM support > to inject such SError, this interface adds this query for this capability. > > KVM will check whether system support RAS Extension, if supported, KVM > returns true to user space, otherwise returns false. > diff --git a/Documentation/virtual/kvm/api.txt b/Documentation/virtual/kvm/api.txt > index 3732097..86b3808 100644 > --- a/Documentation/virtual/kvm/api.txt > +++ b/Documentation/virtual/kvm/api.txt > @@ -4628,3 +4628,14 @@ Architectures: s390 > This capability indicates that kvm will implement the interfaces to handle > reset, migration and nested KVM for branch prediction blocking. The stfle > facility 82 should not be provided to the guest without this capability. > + > +8.14 KVM_CAP_ARM_SET_SERROR_ESR > + > +Architectures: arm, arm64 > + > +This capability indicates that userspace can specify the syndrome value reported > +to the guest OS when guest takes a virtual SError interrupt exception. > +If KVM has this capability, userspace can only specify the ISS field for the ESR > +syndrome, it can not specify the EC field which is not under control by KVM. > +If this virtual SError is taken to EL1 using AArch64, this value will be reported > +in ISS filed of ESR_EL1.