[PATCH] KVM: arm/arm64: Signal SIGBUS when stage2 discovers hwpoison memory
James Morse
james.morse at arm.com
Fri Apr 7 09:12:32 PDT 2017
Hi gengdongjiu,
On 06/04/17 16:06, gengdongjiu wrote:
> Below is my previous idea:
> When signalling Qemu, Qemu generate GHES ,then Qemu/kvmtool inject
> the SEA/SEI to guest OS. For different reason, Qemu/.KVMtool injects
> diferent notification type. if inject SEA/SEI/IRQ, guest OS handle the
> guest SEA/SEI/IRQ. handling guest OS SEA/SEI and IRQ guest OS software
> logical is different.
> for example, guest OS call API "ghes_notify_sea" when happening SEA;
> call API "ghes_notify_sei" when happening SEI.
Sounds reasonable. Qemu shouldn't have to care what the guest OS is so the
injecting notifications should stick to KVM APIs.
> so what is your suggested way to notify guest OS after Qemu generating the CPER?
[...]
> so for the notification guest OS, I think Qemu uses IOCTL to let KVM
> inject error may be better.
I agree.
Synchronous External Abort is something that can always be delivered, Qemu can
make it look like SEA was taken on a vcpu by modifying the registers using KVM's
KVM_SET_ONE_REG ioctl(). The pseudo code for what is required is in the
ARM-ARM's 'AArch64.TakeException'.
SError Interrupt is more complicated as it can be masked. Fortunately the
architecture has a way to inject SError into a guest using HCR_EL2.VSE, I think
KVM should allow users-space to inject SError with this. Marc and Christoffer
will have the best idea about how such an API should work. To be useful for
injecting SEI we need to be able to set VSESR_EL2 along with the HCR_EL2.VSE bit.
KVM will need to know about the RAS extensions to save/restore some of the new
registers listed in A1.7.5 of the new ARM-ARM.
Thanks,
James
More information about the linux-arm-kernel
mailing list