Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3141imm; Mon, 2 Jul 2018 06:45:16 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJDk7VFY2QG3bBO+uj9wk+U1p07ZxFCxe7Nkh/l50zIQHsf2/WqXd5Hag8PU8ObwCugis0v X-Received: by 2002:a63:6b86:: with SMTP id g128-v6mr22252890pgc.344.1530539116423; Mon, 02 Jul 2018 06:45:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530539116; cv=none; d=google.com; s=arc-20160816; b=qN17f89NQ2vLySB0gkydcKJlwKDR6bFbCF5e3IzZnd7zSBFpQU3yTcox9IKLvKxlWD BTxMrT9J7WelFV/CehPWWBUUP4Uvj+sshh0hgWTR02H7i/ImovEotqOzVY8m+4t1XEYg znc9mh5BKNaeR9JBdIXVnfICg0bbGsVULy8Zauf957TvAqyYFknzrR3iSYiCj0b33Ons dO2IUpn0MSxDt1dRXL/61ENffqRseJ9+AmJRuz/qmNpN5S+vgb59eh+LCqD9v7T1p2+L i1Sy8n0768PBIwh2ComHdWLvmEws+hllfp7inMai5yR6cAg/QdsKjgt1XgwCyjRVgdKy 8ziA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from:arc-authentication-results; bh=YFZDoMPPxGeoSKsbv4BtRr8kQpqNhPhWHj1tkrIw0dk=; b=db3eWM1lHg0Tum14+xhdz7CQ2POZvwPYxOXlWvJTENin5DJnxVQJFEaip7+fNK4cgG xXXqguIJsWiAkPKHRiRB0I0bt5r08gwtD1uk4vPCJWdqnsRshBjowzfCIdvas4pjKpau 6dvHlk9s6BQ/OJLvbA1CerP7sBTavNxVaK0F7eDpD2xeD5TjQtN/jb5R/CX3XZQSMpsx RRtpY5VAJEufE++Hji9edrbFlCOXnnCs+y7pqw2NzXDr4kmqEFNruTvywuwNP69QVlks xq07TasQV93uWO59WXxMsAmrygE6VeukSvq/1eCCfsZR0/d10YAOBdpwTZID95PpX9wD d9cg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k2-v6si16196367plt.374.2018.07.02.06.44.49; Mon, 02 Jul 2018 06:45:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752767AbeGBNnY (ORCPT + 99 others); Mon, 2 Jul 2018 09:43:24 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:58090 "EHLO huawei.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1752378AbeGBNnU (ORCPT ); Mon, 2 Jul 2018 09:43:20 -0400 Received: from DGGEMS407-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id 22AD4B42A522E; Mon, 2 Jul 2018 21:43:17 +0800 (CST) Received: from localhost.localdomain (10.143.28.91) by DGGEMS407-HUB.china.huawei.com (10.3.19.207) with Microsoft SMTP Server id 14.3.382.0; Mon, 2 Jul 2018 21:43:09 +0800 From: Dongjiu Geng To: , , , , , , , , , , , CC: , Subject: [PATCH RESEND v6 0/2] support exception state migration and set VSESR_EL2 by user space Date: Mon, 2 Jul 2018 21:43:04 +0800 Message-ID: <1530538986-4024-1-git-send-email-gengdongjiu@huawei.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.143.28.91] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series patch is separated from https://www.spinics.net/lists/kvm/msg168917.html 1. Detect whether KVM can set set guest SError syndrome 2. Support to Set VSESR_EL2 and inject SError by user space. 3. Support live migration to keep SError pending state and VSESR_EL2 value The user space patch is here: https://www.mail-archive.com/qemu-devel@nongnu.org/msg539534.html BTW: The user space patch is needed to rebase Dongjiu Geng (2): arm/arm64: KVM: Add KVM_GET/SET_VCPU_EVENTS arm64: KVM: export the capability to set guest SError syndrome Documentation/virtual/kvm/api.txt | 44 ++++++++++++++++++++++++++++++---- arch/arm64/include/asm/kvm_emulate.h | 5 ++++ arch/arm64/include/asm/kvm_host.h | 7 ++++++ arch/arm64/include/uapi/asm/kvm.h | 13 ++++++++++ arch/arm64/kvm/guest.c | 46 ++++++++++++++++++++++++++++++++++++ arch/arm64/kvm/inject_fault.c | 6 ++--- arch/arm64/kvm/reset.c | 4 ++++ include/uapi/linux/kvm.h | 1 + virt/kvm/arm/arm.c | 21 ++++++++++++++++ 9 files changed, 140 insertions(+), 7 deletions(-) -- 2.7.4