Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10914996ybi; Thu, 25 Jul 2019 07:02:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqw+YHXtViPcq4zPp/oJSc+Atdy0VPawiJkPHJOc7E53PoNS57GVGWrj2FIRJ8nPPb13/gna X-Received: by 2002:a62:1d11:: with SMTP id d17mr16978924pfd.249.1564063326335; Thu, 25 Jul 2019 07:02:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564063326; cv=none; d=google.com; s=arc-20160816; b=pmBtTdqUfAmH4iVZ/gTVeJ6a1QgWozdpyUUY7l/EOW8X8/aRHZ/KBdi5HRGG0U9Row o1zk2FDnQfjmBZk+xulOTinYxMgoJ4bS0aB4dt17o0ipXv8jqGeUyFvA1BuXIQKfypg6 B36Jpl6RjMkKRZcRNRG2+UZGC5fPd1DzS/iNpoM1dHF7sUTgyzqPoxBQG0TMIElNXkWY y6JrlMJMvoRUTsxxFtl2Bhr2yTgrTC/CmnaJ3JVcsndEInI35FHNO5CGAYD/PPOX+ydi R9NZ7Gjap4z90ClyT6qHUVTr1jIbmklAmu1t59HhhXMqGr2/d+LhXxKRFHWST2GrqceG oRZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=YuqdbeMc0Z6F+kRmBooY0IF2RTIo014POZE7/70s+Jk=; b=iFDPiNLkaIjPlFng3oKYOFZ59NUjfUmsss5teq3fHOKGmaTDzGwlHClHaxU1YAz3au 2Dwa9GnssShjqDHrNRUUvWnkmlwuzlr3fF+xOXSyTdFgrh8+UBP532d2eJ+5WSMpq91F 3VKby4UZ1EFEcXP4/m0KAdgOKwWmehkz1iFBpdkw9USC+lzR6WEoBY4GvAI8yIr6r38O iNUMOWQFCT7gxZt06N+5BfBg2Up/j6syNYmrNDstpbVJZgF/jBXgO6PvMgRG0g57Dyj/ wz0G1cZQLGZlCOTH2/4j6A1x1nJ0Vsju+KHzDcoAZO/4oQHsxatpPR0A3bSFiUqXrf9Y dDxA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z26si17616839pfj.247.2019.07.25.07.01.50; Thu, 25 Jul 2019 07:02:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389326AbfGYMsl (ORCPT + 99 others); Thu, 25 Jul 2019 08:48:41 -0400 Received: from foss.arm.com ([217.140.110.172]:56642 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725901AbfGYMsl (ORCPT ); Thu, 25 Jul 2019 08:48:41 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B302E152D; Thu, 25 Jul 2019 05:48:40 -0700 (PDT) Received: from [10.1.196.105] (eglon.cambridge.arm.com [10.1.196.105]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 2545A3F71F; Thu, 25 Jul 2019 05:48:39 -0700 (PDT) Subject: Re: [PATCH] KVM: arm64: Update kvm_arm_exception_class and esr_class_str for new EC To: Zenghui Yu Cc: marc.zyngier@arm.com, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, catalin.marinas@arm.com, will@kernel.org, julien.thierry@arm.com, suzuki.poulose@arm.com, mark.rutland@arm.com, linux-kernel@vger.kernel.org, amit.kachhap@arm.com, Dave.Martin@arm.com, wanghaibin.wang@huawei.com References: <1562992854-972-1-git-send-email-yuzenghui@huawei.com> From: James Morse Message-ID: Date: Thu, 25 Jul 2019 13:48:38 +0100 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <1562992854-972-1-git-send-email-yuzenghui@huawei.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 13/07/2019 05:40, Zenghui Yu wrote: > We've added two ESR exception classes for new ARM hardware extensions: > ESR_ELx_EC_PAC and ESR_ELx_EC_SVE. > > This patch updates "kvm_arm_exception_class" for these two EC, which the > new EC will be parsed in kvm_exit trace events (for guest's usage of new EC will be visible to user-space via kvm_exit() trace events... ? > Pointer Authentication and Scalable Vector Extension). The same updates > to "esr_class_str" for ESR_ELx_EC_PAC, by which we can get more accurate > debug info. Its accurate either way round. This stops the trace-point print from printing the EC in hex, instead giving it a name, like we do for all the others. > Trivial changes, update them in one go. (I don't think this bit needs to go in the git-log!) > diff --git a/arch/arm64/include/asm/kvm_arm.h b/arch/arm64/include/asm/kvm_arm.h > index a8b205e..ddf9d76 100644 > --- a/arch/arm64/include/asm/kvm_arm.h > +++ b/arch/arm64/include/asm/kvm_arm.h > @@ -316,9 +316,10 @@ > > #define kvm_arm_exception_class \ > ECN(UNKNOWN), ECN(WFx), ECN(CP15_32), ECN(CP15_64), ECN(CP14_MR), \ > - ECN(CP14_LS), ECN(FP_ASIMD), ECN(CP10_ID), ECN(CP14_64), ECN(SVC64), \ > - ECN(HVC64), ECN(SMC64), ECN(SYS64), ECN(IMP_DEF), ECN(IABT_LOW), \ > - ECN(IABT_CUR), ECN(PC_ALIGN), ECN(DABT_LOW), ECN(DABT_CUR), \ > + ECN(CP14_LS), ECN(FP_ASIMD), ECN(CP10_ID), ECN(PAC), ECN(CP14_64), \ > + ECN(SVC64), ECN(HVC64), ECN(SMC64), ECN(SYS64), ECN(SVE), \ > + ECN(IMP_DEF), ECN(IABT_LOW), ECN(IABT_CUR), \ > + ECN(PC_ALIGN), ECN(DABT_LOW), ECN(DABT_CUR), \ > ECN(SP_ALIGN), ECN(FP_EXC32), ECN(FP_EXC64), ECN(SERROR), \ > ECN(BREAKPT_LOW), ECN(BREAKPT_CUR), ECN(SOFTSTP_LOW), \ > ECN(SOFTSTP_CUR), ECN(WATCHPT_LOW), ECN(WATCHPT_CUR), \ Do we need to add: ESR_ELx_EC_ILL ESR_ELx_EC_HVC32 ESR_ELx_EC_SMC32 (I don't see how any of the _CUR entries could ever happen as these EC originally come from ESR_EL2, but they're harmless) > diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c > index 8c03456..969e156 100644 > --- a/arch/arm64/kernel/traps.c > +++ b/arch/arm64/kernel/traps.c > @@ -734,6 +734,7 @@ asmlinkage void __exception do_sysinstr(unsigned int esr, struct pt_regs *regs) > [ESR_ELx_EC_CP14_LS] = "CP14 LDC/STC", > [ESR_ELx_EC_FP_ASIMD] = "ASIMD", > [ESR_ELx_EC_CP10_ID] = "CP10 MRC/VMRS", > + [ESR_ELx_EC_PAC] = "PAC", > [ESR_ELx_EC_CP14_64] = "CP14 MCRR/MRRC", > [ESR_ELx_EC_ILL] = "PSTATE.IL", > [ESR_ELx_EC_SVC32] = "SVC (AArch32)", Reviewed-by: James Morse Thanks, James