Message ID | 1537994851-36254-1-git-send-email-gengdongjiu@huawei.com (mailing list archive) |
---|---|
Headers | show
Return-Path: <qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org> Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 92516180E for <patchwork-qemu-devel@patchwork.kernel.org>; Wed, 26 Sep 2018 12:45:18 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 84F3E2A399 for <patchwork-qemu-devel@patchwork.kernel.org>; Wed, 26 Sep 2018 12:45:18 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 75BD42A3EA; Wed, 26 Sep 2018 12:45:18 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.0 required=2.0 tests=BAYES_00,DATE_IN_FUTURE_06_12, MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 24E7B2A399 for <patchwork-qemu-devel@patchwork.kernel.org>; Wed, 26 Sep 2018 12:45:18 +0000 (UTC) Received: from localhost ([::1]:58733 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from <qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org>) id 1g59Bt-0004LS-Ga for patchwork-qemu-devel@patchwork.kernel.org; Wed, 26 Sep 2018 08:45:17 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:54944) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from <gengdongjiu@huawei.com>) id 1g59AP-0002K9-HD for qemu-devel@nongnu.org; Wed, 26 Sep 2018 08:43:46 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from <gengdongjiu@huawei.com>) id 1g59AO-0003YU-Pt for qemu-devel@nongnu.org; Wed, 26 Sep 2018 08:43:45 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:2652 helo=huawei.com) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from <gengdongjiu@huawei.com>) id 1g59AJ-0003Tb-BS; Wed, 26 Sep 2018 08:43:39 -0400 Received: from DGGEMS401-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 4449D4D57AFB5; Wed, 26 Sep 2018 20:43:30 +0800 (CST) Received: from localhost.localdomain (10.143.28.90) by DGGEMS401-HUB.china.huawei.com (10.3.19.201) with Microsoft SMTP Server id 14.3.399.0; Wed, 26 Sep 2018 20:43:23 +0800 From: Dongjiu Geng <gengdongjiu@huawei.com> To: <peter.maydell@linaro.org>, <drjones@redhat.com>, <shannon.zhaosl@gmail.com>, <qemu-devel@nongnu.org>, <qemu-arm@nongnu.org>, <gengdongjiu@huawei.com> Date: Wed, 26 Sep 2018 16:47:29 -0400 Message-ID: <1537994851-36254-1-git-send-email-gengdongjiu@huawei.com> X-Mailer: git-send-email 1.9.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.143.28.90] X-CFilter-Loop: Reflected X-detected-operating-system: by eggs.gnu.org: GNU/Linux 3.x [fuzzy] X-Received-From: 45.249.212.190 Subject: [Qemu-devel] [PATCH v10 0/2] add support for VCPU event states X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: <qemu-devel.nongnu.org> List-Unsubscribe: <https://lists.nongnu.org/mailman/options/qemu-devel>, <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe> List-Archive: <http://lists.nongnu.org/archive/html/qemu-devel/> List-Post: <mailto:qemu-devel@nongnu.org> List-Help: <mailto:qemu-devel-request@nongnu.org?subject=help> List-Subscribe: <https://lists.nongnu.org/mailman/listinfo/qemu-devel>, <mailto:qemu-devel-request@nongnu.org?subject=subscribe> Errors-To: qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org Sender: "Qemu-devel" <qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org> X-Virus-Scanned: ClamAV using ClamSMTP |
Series |
add support for VCPU event states
|
expand
|
From: g00384164 <g00384164@huawei.com> Support KVM_GET/SET_VCPU_EVENTS to get/set the SError exception state, and support the state migration. Now the VCPU event only includes the SError exception status, it can be extended if needed. When do migration, If source machine has serror pending, the target machine is also needed to pend this serror regardless of whether target machine can support to set the serror syndrome. Note: Because I do not have arm32 environment, I only this patch in the KVM64, not test it in the KVM32. So I need someone else test it in the 32 bit KVM platform. Thanks. Dongjiu Geng (2): linux-headers: Update to linux kernel 4.19-rc5 target/arm: Add support for VCPU event states include/standard-headers/linux/input.h | 9 +++-- linux-headers/asm-arm/kvm.h | 13 +++++++ linux-headers/asm-arm64/kvm.h | 13 +++++++ linux-headers/asm-x86/kvm.h | 1 + linux-headers/linux/kvm.h | 2 + linux-headers/linux/vhost.h | 2 +- target/arm/cpu.h | 7 ++++ target/arm/kvm32.c | 70 ++++++++++++++++++++++++++++++++++ target/arm/kvm64.c | 68 +++++++++++++++++++++++++++++++++ target/arm/machine.c | 22 +++++++++++ 10 files changed, 202 insertions(+), 5 deletions(-)