Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933091AbdC1Nky (ORCPT ); Tue, 28 Mar 2017 09:40:54 -0400 Received: from foss.arm.com ([217.140.101.70]:49044 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933026AbdC1Nko (ORCPT ); Tue, 28 Mar 2017 09:40:44 -0400 Message-ID: <58DA67BA.8070404@arm.com> Date: Tue, 28 Mar 2017 14:40:10 +0100 From: James Morse User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.6.0 MIME-Version: 1.0 To: gengdongjiu CC: Achin Gupta , Christoffer Dall , xiexiuqi@huawei.com, Marc Zyngier , catalin.marinas@arm.com, will.deacon@arm.com, christoffer.dall@linaro.org, rkrcmar@redhat.com, suzuki.poulose@arm.com, andre.przywara@arm.com, mark.rutland@arm.com, vladimir.murzin@arm.com, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, wangxiongfeng2@huawei.com, wuquanming@huawei.com, huangshaoyu@huawei.com, Leif.Lindholm@linaro.com, nd@arm.com Subject: Re: [PATCH] kvm: pass the virtual SEI syndrome to guest OS References: <7055772d-2a20-6e0c-2bf8-204bc9ef52a5@arm.com> <22fb583f-a33e-15f8-a059-fb112b27dd4f@arm.com> <58CFF058.8020205@arm.com> <76795e20-2f20-1e54-cfa5-7444f28b18ee@huawei.com> <20170321113428.GC15920@cbox> <58D17AF0.2010802@arm.com> <20170321193933.GB31111@cbox> <58DA3F68.6090901@arm.com> <20170328112328.GA31156@cbox> <20170328115413.GJ23682@e104320-lin> In-Reply-To: Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2196 Lines: 49 Hi gengdongjiu, On 28/03/17 13:16, gengdongjiu wrote: > On 2017/3/28 19:54, Achin Gupta wrote: >> On Tue, Mar 28, 2017 at 01:23:28PM +0200, Christoffer Dall wrote: >>> On Tue, Mar 28, 2017 at 11:48:08AM +0100, James Morse wrote: >>>> On the host, part of UEFI is involved to generate the CPER records. >>>> In a guest?, I don't know. >>>> Qemu could generate the records, or drive some other component to do it. >>> >>> I think I am beginning to understand this a bit. Since the guet UEFI >>> instance is specifically built for the machine it runs on, QEMU's virt >>> machine in this case, they could simply agree (by some contract) to >>> place the records at some specific location in memory, and if the guest >>> kernel asks its guest UEFI for that location, things should just work by >>> having logic in QEMU to process error reports and populate guest memory. >>> >>> Is this how others see the world too? >> >> I think so! >> >> AFAIU, the memory where CPERs will reside should be specified in a GHES entry in >> the HEST. Is this not the case with a guest kernel i.e. the guest UEFI creates a >> HEST for the guest Kernel? >> >> If so, then the question is how the guest UEFI finds out where QEMU (acting as >> EL3 firmware) will populate the CPERs. This could either be a contract between >> the two or a guest DXE driver uses the MM_COMMUNICATE call (see [1]) to ask QEMU >> where the memory is. > > whether invoke the guest UEFI will be complex? not see the advantage. it seems x86 Qemu > directly generate the ACPI table, but I am not sure, we are checking the qemu logical. > let Qemu generate CPER record may be clear. At boot UEFI in the guest will need to make sure the areas of memory that may be used for CPER records are reserved. Whether UEFI or Qemu decides where these are needs deciding, (but probably not here)... At runtime, when an error has occurred, I agree it would be simpler (fewer components involved) if Qemu generates the CPER records. But if UEFI made the memory choice above they need to interact and it gets complicated again. The CPER records are defined in the UEFI spec, so I would expect UEFI to contain code to generate/parse them. Thanks, James