Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3448269imm; Sun, 1 Jul 2018 22:15:11 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfJFx2gok7+XNTUiL8DLynQ/tHyh8QrvUBetzsFOUj/bnieBH4xnuEP9KXNqaZzb4Azt7Us X-Received: by 2002:a17:902:7888:: with SMTP id q8-v6mr19306999pll.79.1530508511001; Sun, 01 Jul 2018 22:15:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530508510; cv=none; d=google.com; s=arc-20160816; b=gF+f4esbqoP3NAoqa6YjrjEBsMQHcEDxWxFVwOc9RfQ71n6raOyTRbpEerB/hYLd4w 8s9lQ9qmBLVKtqq1ZC50CUMd4lFxBR3tcIJJOYv8VxG+KEjFpIAl1L5iZV5oLZhsY61G 77nxZ+7muJVujxC1mPZtClqg8RLwyWZ48D8X6ZS62TnAkKo4ZhEDwa2zTlpYhhBWz/9B nQKZJpr749IFYePFj9aCUK0fpNMz2nuxmrMurElhl0mwVfOIEPy2LSbMHbnE/030evOJ wxG5JURq2m0KTAw17cKAksSamcw1SFPsX8s5dXzG8nFQ1aQCyBZZvgHSqp5GV9WbSyzH kLOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=SyRBOC81B2mF+DJY90diiJ+exfVjjzfd+1bZDuNyUzg=; b=WCbqMQ/f5zZYxr44Rft2N/EZv8mkgNtZCWxjyz0hX2JfhF8zogLeU1Ivb9+atGl4bv 3ii6GNDs0AzP0e4VnBhq9wCxlKkjuIuZ50rWPW7WVzoPhXf6qfVmjd6etv5dsqJ3Qs+w lCgbi4faxUb/7A9mUMMr/D1tyaVAuzFqP18GhnFkkO0xehKFlskItLlrpEUJoFEbztCb lES0n1a9tmY6uuuFqulvIx1EQObr0OEsUivL0KIxlWqr2oRwfo8RKxwWJk8+tx3hDSmZ VkZkkpI89B1F8/jtZggomNKWlVcgs8oepAshHlETB80pzkCBmX/C67BHdU0iMnej8Kdx RdFA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g131-v6si1258113pgc.204.2018.07.01.22.14.46; Sun, 01 Jul 2018 22:15:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752766AbeGBETM (ORCPT + 99 others); Mon, 2 Jul 2018 00:19:12 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:9189 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752294AbeGBETI (ORCPT ); Mon, 2 Jul 2018 00:19:08 -0400 Received: from DGGEMS412-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id DCF72E9C4A0A7; Mon, 2 Jul 2018 12:18:53 +0800 (CST) Received: from [127.0.0.1] (10.142.68.147) by DGGEMS412-HUB.china.huawei.com (10.3.19.212) with Microsoft SMTP Server id 14.3.382.0; Mon, 2 Jul 2018 12:18:51 +0800 Subject: Re: [PATCH v5 2/2] arm64: KVM: export the capability to set guest SError syndrome To: James Morse CC: , , , , , , , , , , , References: <1529960309-2513-1-git-send-email-gengdongjiu@huawei.com> <1529960309-2513-3-git-send-email-gengdongjiu@huawei.com> From: gengdongjiu Message-ID: Date: Mon, 2 Jul 2018 12:18:02 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.142.68.147] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, On 2018/6/29 23:58, James Morse wrote: > Hi Dongjiu Geng, > > This patch doesn't apply on v4.18-rc2. > > Documentation/virtual/kvm/api.txt already has a 8.18 section. I guess you based > this on v4.17. Yes, indeed I based on v4.17. > > For posting patches, please use the latest 'rc' from Linus' tree, (or the > maintainer's tree listed in MAINTAINERS for the tree you are targeting if the > maintainer has started to pick up patches). Ok, I will rebase it using the latest 'rc' from Linus' tree. thanks for the reminder. > > > Thanks, > > James > > > On 25/06/18 21:58, Dongjiu Geng wrote: >> For the arm64 RAS Extension, user space can inject a virtual-SError >> with specified ESR. So user space needs to know whether KVM support >> to inject such SError, this interface adds this query for this capability. >> >> KVM will check whether system support RAS Extension, if supported, KVM >> returns true to user space, otherwise returns false. > > >> diff --git a/Documentation/virtual/kvm/api.txt b/Documentation/virtual/kvm/api.txt >> index 3732097..86b3808 100644 >> --- a/Documentation/virtual/kvm/api.txt >> +++ b/Documentation/virtual/kvm/api.txt >> @@ -4628,3 +4628,14 @@ Architectures: s390 >> This capability indicates that kvm will implement the interfaces to handle >> reset, migration and nested KVM for branch prediction blocking. The stfle >> facility 82 should not be provided to the guest without this capability. >> + >> +8.14 KVM_CAP_ARM_SET_SERROR_ESR >> + >> +Architectures: arm, arm64 >> + >> +This capability indicates that userspace can specify the syndrome value reported >> +to the guest OS when guest takes a virtual SError interrupt exception. >> +If KVM has this capability, userspace can only specify the ISS field for the ESR >> +syndrome, it can not specify the EC field which is not under control by KVM. >> +If this virtual SError is taken to EL1 using AArch64, this value will be reported >> +in ISS filed of ESR_EL1. > > > > > . >