Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751922AbdIMLwc (ORCPT ); Wed, 13 Sep 2017 07:52:32 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:6473 "EHLO szxga04-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751380AbdIMLwa (ORCPT ); Wed, 13 Sep 2017 07:52:30 -0400 Subject: Re: [PATCH v11 6/6] target-arm: kvm64: Handle SError interrupt for the guest OS To: Peter Maydell References: <0184EA26B2509940AA629AE1405DD7F2015FE17F@DGGEMA503-MBX.china.huawei.com> <5552cf68-b998-686b-8e7e-710399c2b014@huawei.com> CC: James Morse , "Michael S. Tsirkin" , Igor Mammedov , Zhaoshenglong , Paolo Bonzini , "QEMU Developers" , qemu-arm , kvm-devel , "edk2-devel@lists.01.org" , Christoffer Dall , Marc Zyngier , Will Deacon , Tyler Baicar , Ard Biesheuvel , "Ingo Molnar" , "bp@suse.de" , Shiju Jose , "zjzhang@codeaurora.org" , arm-mail-list , "kvmarm@lists.cs.columbia.edu" , "lkml - Kernel Mailing List" , "linux-acpi@vger.kernel.org" , "devel@acpica.org" , "John Garry" , Jonathan Cameron , Shameerali Kolothum Thodi , huangdaode , "Wangzhou (B)" , Huangshaoyu , Wuquanming , Linuxarm , "Zhengqiang (turing)" From: gengdongjiu Message-ID: Date: Wed, 13 Sep 2017 19:51:56 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.142.68.147] X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090204.59B91BEB.00A1,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0, ip=0.0.0.0, so=2014-11-16 11:51:01, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 15ca247d2cce4cb8bdac82ce9979ed6f Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1054 Lines: 28 On 2017/9/13 18:52, Peter Maydell wrote: > This question seems to be not really related to the review > comment that it is responding to. > > (1) If the host does not support notifying us about > errors, then there is clearly nothing to do in this > code, because we will never get a notification. > > (2) If the host does support notifying us about errors, > but we choose not to expose RAS to the guest, then > there's not much to do either. We probably just want > to take whatever the default behaviour is for any > application when it touches memory that's bad. > We definitely don't want to tell the guest anything. > > (3) If the host supports notification, and we choose > to expose RAS to the guest, then we need to do > whatever we have to do to notify the guest. > > If we're in this signal handler and also > arm_feature(env, ARM_FEATURE_RAS) is false then that > is case (2), and my point is that doing anything with > the guest 'syndrome' value looks like the wrong thing. Peter, your explanation is clear. OK, understand, thanks.