From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752766AbbKBEX1 (ORCPT ); Sun, 1 Nov 2015 23:23:27 -0500 Received: from mx1.redhat.com ([209.132.183.28]:56590 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751878AbbKBEXT (ORCPT ); Sun, 1 Nov 2015 23:23:19 -0500 Message-ID: <5636E531.5050907@redhat.com> Date: Sun, 01 Nov 2015 23:23:13 -0500 From: Jon Masters Organization: Red Hat, Inc. User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0 MIME-Version: 1.0 To: Timur Tabi , Fu Wei , Mark Rutland CC: Linaro ACPI Mailman List , linux-watchdog@vger.kernel.org, devicetree@vger.kernel.org, LKML , linux-doc@vger.kernel.org, Wei Fu , Arnd Bergmann , Guenter Roeck , Vipul Gandhi , Wim Van Sebroeck , Leo Duran , Jon Corbet , Catalin Marinas , Will Deacon , Rafael Wysocki , Dave Young , Pratyush Anand , Suravee Suthikulpanit , Rob Herring Subject: Re: [PATCH v8 1/5] Documentation: add sbsa-gwdt driver documentation References: <1445961999-9506-1-git-send-email-fu.wei@linaro.org> <1445961999-9506-2-git-send-email-fu.wei@linaro.org> <20151027162257.GJ3091@leverpostej> <5633BCA4.1050400@codeaurora.org> <20151030190514.GD30791@leverpostej> <5636E14B.8000305@codeaurora.org> In-Reply-To: <5636E14B.8000305@codeaurora.org> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/01/2015 11:06 PM, Timur Tabi wrote: > Fu Wei wrote: >> In virtualization system, Linux kernel with KVM support as a >> Hypervisor, and guest are using a one of SBSA watchdog. >> WS0 is handled by guest OS, and WS1 will be handled by Hypervisor. > > I don't see how that would work, because the host kernel cannot > reconfigure the behavior of WS1. > > Besides, don't KVM guests use some kind of software and/or > paravirtualized watchdog? Indeed, this is my expectation. IIRC the hardware watchdog initially defined in SBSA was intended for bare metal use to have something people could start implementing while we worked on the future (the language around register frames relates to secure/non-secure ELs in my recollection). For now, I expect an emulated watchdog for VMs, which ideally would be a software implementation of the same SBSA watchdog. Jon.