Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756152AbdIHO2B (ORCPT ); Fri, 8 Sep 2017 10:28:01 -0400 Received: from szxga01-in.huawei.com ([45.249.212.187]:11767 "EHLO szxga01-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755569AbdIHO1y (ORCPT ); Fri, 8 Sep 2017 10:27:54 -0400 From: gengdongjiu To: Peter Maydell CC: "Michael S. Tsirkin" , Igor Mammedov , Zhaoshenglong , "Paolo Bonzini" , QEMU Developers , qemu-arm , kvm-devel , "edk2-devel@lists.01.org" , Christoffer Dall , Marc Zyngier , "Will Deacon" , James Morse , Tyler Baicar , Ard Biesheuvel , "Ingo Molnar" , "bp@suse.de" , Shiju Jose , "zjzhang@codeaurora.org" , arm-mail-list , "kvmarm@lists.cs.columbia.edu" , "lkml - Kernel Mailing List" , "linux-acpi@vger.kernel.org" , "devel@acpica.org" , "John Garry" , Jonathan Cameron , Shameerali Kolothum Thodi , huangdaode , "Wangzhou (B)" , Huangshaoyu , Wuquanming , Linuxarm , "Zhengqiang (turing)" Subject: Re: [PATCH v11 4/6] target-arm: kvm64: detect guest RAS EXTENSION feature Thread-Topic: [PATCH v11 4/6] target-arm: kvm64: detect guest RAS EXTENSION feature Thread-Index: AdMop0zlouCLF3RfQKKP0rckbM+0Iw== Date: Fri, 8 Sep 2017 14:26:59 +0000 Message-ID: <0184EA26B2509940AA629AE1405DD7F2015F5973@DGGEMA503-MBX.china.huawei.com> Accept-Language: zh-CN, en-US Content-Language: zh-CN X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.45.61.121] Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A0B0201.59B2A8C0.0173,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0, ip=169.254.1.143, so=2014-11-16 11:51:01, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 9227055aee3b93ee7963f2038e4654c0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by nfs id v88ES5lU012664 Content-Length: 4059 Lines: 95 Hi Peter, Sorry for my late response. > > On 18 August 2017 at 15:23, Dongjiu Geng wrote: > > check if kvm supports guest RAS EXTENSION. if so, set corresponding > > feature bit for vcpu. > > > > Signed-off-by: Dongjiu Geng > > --- > > linux-headers/linux/kvm.h | 1 + > > target/arm/cpu.h | 3 +++ > > target/arm/kvm64.c | 8 ++++++++ > > 3 files changed, 12 insertions(+) > > > > diff --git a/linux-headers/linux/kvm.h b/linux-headers/linux/kvm.h > > index 7971a4f..2aa176e 100644 > > --- a/linux-headers/linux/kvm.h > > +++ b/linux-headers/linux/kvm.h > > @@ -929,6 +929,7 @@ struct kvm_ppc_resize_hpt { #define > > KVM_CAP_PPC_SMT_POSSIBLE 147 #define KVM_CAP_HYPERV_SYNIC2 148 > > #define KVM_CAP_HYPERV_VP_INDEX 149 > > +#define KVM_CAP_ARM_RAS_EXTENSION 150 > > > > #ifdef KVM_CAP_IRQ_ROUTING > > > > Hi. Changes to linux-headers need to be done as a patch of their own created using scripts/update-linux-headers.sh run against a mainline > kernel tree (and with a commit message that quotes the kernel commit hash used). This ensures that we have a consistent set of headers > that don't diverge from the kernel copy. Sure, I will, thanks a lot for your reminder. > > > diff --git a/target/arm/cpu.h b/target/arm/cpu.h index > > b39d64a..6b0961b 100644 > > --- a/target/arm/cpu.h > > +++ b/target/arm/cpu.h > > @@ -611,6 +611,8 @@ struct ARMCPU { > > > > /* CPU has memory protection unit */ > > bool has_mpu; > > + /* CPU has ras extension unit */ > > + bool has_ras_extension; > > /* PMSAv7 MPU number of supported regions */ > > uint32_t pmsav7_dregion; > > > > @@ -1229,6 +1231,7 @@ enum arm_features { > > ARM_FEATURE_THUMB_DSP, /* DSP insns supported in the Thumb encodings */ > > ARM_FEATURE_PMU, /* has PMU support */ > > ARM_FEATURE_VBAR, /* has cp15 VBAR */ > > + ARM_FEATURE_RAS_EXTENSION, /*has RAS extension support */ > > Missing space after '/*' ? Yes, thanks for the pointing out. > > > }; > > > > static inline int arm_feature(CPUARMState *env, int feature) diff > > --git a/target/arm/kvm64.c b/target/arm/kvm64.c index a16abc8..0781367 > > 100644 > > --- a/target/arm/kvm64.c > > +++ b/target/arm/kvm64.c > > @@ -518,6 +518,14 @@ int kvm_arch_init_vcpu(CPUState *cs) > > unset_feature(&env->features, ARM_FEATURE_PMU); > > } > > > > + if (kvm_check_extension(cs->kvm_state, KVM_CAP_ARM_RAS_EXTENSION)) { > > + cpu->has_ras_extension = true; > > + set_feature(&env->features, ARM_FEATURE_RAS_EXTENSION); > > + } else { > > + cpu->has_ras_extension = false; > > + unset_feature(&env->features, ARM_FEATURE_RAS_EXTENSION); > > + } > > + > > Shouldn't we need to also tell the kernel that we actually want it to expose RAS to the guest? Compare the PMU code in this function, > where we set a kvm_init_features bit to do this. > (This suggests that your ABI for the kernel part of this feature may not be correct?) In the PMU code, it indeed sets a kvm_init_features bit. Here ARM James has a concern that we are depend on the host CPU RAS extension, He means that if userspace receives the SIGBUS delivered by host memory_failure(), user space should record the CPER for guest and handling the error regardless whether host CPU supports RAS extension. But I think if user space receives the SIGBUS signal, that means host CPU RAS module detects the error or CPU consumes the poison data, thus we should check whether physical CPU support RAS extension. > > You should also not be calling set_feature() here -- if the CPU features bit doesn't say "this CPU should have the RAS extensions" we > shouldn't create a CPU with them. Instead you should set it in kvm_arm_get_host_cpu_features() (again, compare the PMU code). Understand, I will loop you to another mail thread to consult with you that whether userspace should detect CPU RAS extension. If all agree to detect CPU RAS feature, I will fix the issue that you pointing out. > > thanks > -- PMM