Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3714894imm; Mon, 20 Aug 2018 03:34:16 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwDvZ3DQvgo9ZvcMGp/l0MdD3kFCksTo2Rft+AUgO0UHcEd7Z51tNVoFaJtNPD8uQMNjeqw X-Received: by 2002:a17:902:50ec:: with SMTP id c41-v6mr45028898plj.269.1534761256745; Mon, 20 Aug 2018 03:34:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534761256; cv=none; d=google.com; s=arc-20160816; b=Xtacmm84am36p4wmPEn1CVyknclIDft7itSmyIbDOozMvqcQ+OtxBkfxRj9djNCHp3 WW4UIz0BuzcLx3/Ea0jLO28lIokwS9CJpL7oflpZz5gTFS2iY9VugbQ/9FZF4qvi3dsg jQG/qZgc50tuef0vu5asE86alG6wDajqMd6gnLUe+kqMRX1+4bTY+E0YNKP8zW+hhu6m p0wCagbCPBJQW00pZiWf3/rycv1Q3RsxJQ29kuG1F4810bYDEAW5Pr30aMjujmsDr9uX 4NAsflBsrp8L470iRNRuZzQ10wg2kgGFzpOz80sb25/QYh9HWjfCd5vcbyjl6Em+kb5o ugsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:to :from:arc-authentication-results; bh=GDb4ovJi8VTgIxZFTEWO+IjpvDbICCTaD2a8A2ueRMM=; b=XzMD1lr2jB1C+vgjB8cSOiRUFPZmfTjtZSqYjOlbNBC5jpPqLsPJkVZ3Eo9whHEVXu MUy96D3Cm8A4/+DojaebGEEo584LNrN9OTk05vLRynX2k/RYv7ZO9Cs+Xj2prJi2yuH6 i/7cZMZm2iRTVQ7+n7K6v0kdhlW9XsIuYGhNqvN2zUWtEVL4gOtKf4T4ihffc6x9uEIL dXacgIuhFYA6akXQqt/r7vGFW9gDS9gr0sLcpkFAhj+kWJjc84ZoerQ1FyJRhSuOlFxn zwc+JIdhP/DBNViIhpXkGxr4giHakHKQ4fcg6J7YjAcAGrZMDyZwAWpDMb/OzDHLVAj0 O2uA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b23-v6si9225287pls.349.2018.08.20.03.34.01; Mon, 20 Aug 2018 03:34:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726483AbeHTNsA (ORCPT + 99 others); Mon, 20 Aug 2018 09:48:00 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:43850 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725948AbeHTNsA (ORCPT ); Mon, 20 Aug 2018 09:48:00 -0400 Received: from DGGEMS409-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id B440EEFC3AEEB; Mon, 20 Aug 2018 18:32:48 +0800 (CST) Received: from localhost.localdomain (10.143.28.90) by DGGEMS409-HUB.china.huawei.com (10.3.19.209) with Microsoft SMTP Server id 14.3.399.0; Mon, 20 Aug 2018 18:32:43 +0800 From: Dongjiu Geng To: , , , , , , Subject: [PATCH] arm64: KVM: rename the capability to set guest SError syndrome Date: Mon, 20 Aug 2018 14:37:31 -0400 Message-ID: <1534790251-15847-1-git-send-email-gengdongjiu@huawei.com> X-Mailer: git-send-email 1.9.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.143.28.90] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the documentation description, this capability's name is KVM_CAP_ARM_SET_SERROR_ESR, but in the header file this capability's name is KVM_CAP_ARM_INJECT_SERROR_ESR, so it is better to use a same name. Signed-off-by: Dongjiu Geng --- In the Documentation/virtual/kvm/api.txt: +8.19 KVM_CAP_ARM_SET_SERROR_ESR In the include/uapi/linux/kvm.h: +#define KVM_CAP_ARM_INJECT_SERROR_ESR 156 So in above two files, the capability's name is not same, it is better to use a same name. --- arch/arm64/kvm/reset.c | 2 +- include/uapi/linux/kvm.h | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/arm64/kvm/reset.c b/arch/arm64/kvm/reset.c index e37c78b..57dc6be 100644 --- a/arch/arm64/kvm/reset.c +++ b/arch/arm64/kvm/reset.c @@ -77,7 +77,7 @@ int kvm_arch_dev_ioctl_check_extension(struct kvm *kvm, long ext) case KVM_CAP_ARM_PMU_V3: r = kvm_arm_support_pmu_v3(); break; - case KVM_CAP_ARM_INJECT_SERROR_ESR: + case KVM_CAP_ARM_SET_SERROR_ESR: r = cpus_have_const_cap(ARM64_HAS_RAS_EXTN); break; case KVM_CAP_SET_GUEST_DEBUG: diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index 07548de..fab7525 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -951,7 +951,7 @@ struct kvm_ppc_resize_hpt { #define KVM_CAP_HYPERV_TLBFLUSH 155 #define KVM_CAP_S390_HPAGE_1M 156 #define KVM_CAP_NESTED_STATE 157 -#define KVM_CAP_ARM_INJECT_SERROR_ESR 158 +#define KVM_CAP_ARM_SET_SERROR_ESR 158 #ifdef KVM_CAP_IRQ_ROUTING -- 2.7.4