Received: by 10.192.165.156 with SMTP id m28csp1584685imm; Wed, 11 Apr 2018 23:14:07 -0700 (PDT) X-Google-Smtp-Source: AIpwx49x3nOvRD93q3FWtSKqAU4xR+oZpoCYLVvwhsRL/zuJ9nHptU9SrVh6ggK/J2LDixSEfR6W X-Received: by 2002:a17:902:bd4a:: with SMTP id b10-v6mr8201036plx.271.1523513647746; Wed, 11 Apr 2018 23:14:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523513647; cv=none; d=google.com; s=arc-20160816; b=eMqEWIP/i/2Q1vDCH60FSlgbKbkA/+EwNN8FzRBmHFnVug0JeepldNgRDhBT++R0M8 bS75qouMcLKMjcw2wXsq1f8m4v33gnAKQSLsSdUK7tZ9/U/EzQBHIOgFmOL06eKap3J9 v1+Onqav4v2LUQ/mHNWJZhdn8GdDWStSWfp/hae/xpK1wtpR75/yhG3au720x2FaPkgL V4yefIKun51AamGZVqi/GzjTZBEiSgDLD/9whlrhdKe3/nwSOGYN0DcmdbYERQ1Ai9x0 k7BMjutXcVP91s8nUdigxMNUwUdATEEeEeo9HHI8lm/fwdIwogGmeGfu3cbekzs/r/y2 QPCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=zR5OJYFy8MQDrB2XtEvkJq/8qBH4785bVZNc8ak6kAw=; b=kTWVFQ2RyCn/ee/iu6H7TKtCtcCix5kRuxD71lh5xTu2GgBk9Wu1zdgRGlwPerqYVj sc+9MAaxmFy538220FLB+U1dVTN9IEn5BtnU/+tesKYCpqdUemXvjg8SLbfBXgn7nyue QyHYKay1G6WLbXKMTyhpas5XYFVGcRQlGUo2IXgDSi3BZp6rrjeDoy/sQMw7mGjdEWbl Weca7yp9u5PoAcMNTz19JaKoybs0m+y2fRiL2mMc0EijSXe+DSBMcFcFDTmSyKiI+AWU BhU16YKiSMLLRGrEXgHNIEl8W8zG/+tBQ8a/DiXJJkB/4SfnQmlLLGslC1UsfmF0G4/F ILcg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e6si1832666pgn.473.2018.04.11.23.13.30; Wed, 11 Apr 2018 23:14:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752483AbeDLGKq (ORCPT + 99 others); Thu, 12 Apr 2018 02:10:46 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:6737 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1750743AbeDLGKp (ORCPT ); Thu, 12 Apr 2018 02:10:45 -0400 Received: from DGGEMS407-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 1ADEE75BAB63B; Thu, 12 Apr 2018 14:10:28 +0800 (CST) Received: from [127.0.0.1] (10.142.68.147) by DGGEMS407-HUB.china.huawei.com (10.3.19.207) with Microsoft SMTP Server id 14.3.361.1; Thu, 12 Apr 2018 14:10:21 +0800 Subject: Re: [PATCH v11 0/4] set VSESR_EL2 by user space and support NOTIFY_SEI notification To: James Morse CC: , , , , , , , , , , , , , , , , , References: <1523309796-36423-1-git-send-email-gengdongjiu@huawei.com> From: gengdongjiu Message-ID: <5161fb31-e5bb-872c-3e12-d7d38326aaca@huawei.com> Date: Thu, 12 Apr 2018 14:09:35 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-Originating-IP: [10.142.68.147] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, thanks for this mail. On 2018/4/10 22:15, James Morse wrote: > Hi Dongjiu Geng, > > On 09/04/18 22:36, Dongjiu Geng wrote: >> 1. Detect whether KVM can set set guest SError syndrome >> 2. Support to Set VSESR_EL2 and inject SError by user space. >> 3. Support live migration to keep SError pending state and VSESR_EL2 value. >> 4. ACPI 6.1 adds support for NOTIFY_SEI as a GHES notification mechanism, so support this >> notification in software, KVM or kernel ARCH code call handle_guest_sei() to let ACP driver >> to handle this notification. > > Please don't post code during the merge-window, will this apply to v4.17-rc1? We > can't know until its tagged. I do not know when it is merge-window. About the apply version, it does not have limited. > > > This series is doing two separate things, please split it into two series. OK, thanks! > > But on the ACPI front: I don't see how any OS can support your NOTIFY_SEI when > firmware is ignoring the normal world's PSTATE.A. > > The latest lobe of that discussion was on the list here: > https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1611496.html I have replied the mail. I still have some questions that need to clarify with you. After clarification, we will follow that. The question is in the reply of this mail "https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1611496.html" > > > As it is, we would need to spot SError being delivered while SError is masked, > spray nasty messages about firmware being horrifically buggy, then panic(). For > a corrected error, this looks bad, but its preferable to letting firmware > silently overwrite the exception registers, causing linux to spin through the > vectors 'eret' with all exceptions masked. > I still think its best to wait for firmware that does the right thing. Let us discuss that in another mail. In a summary, I think firmware follow below rule can be OK, right? 1. The exception came from the EL that SError should be routed to(according to hcr_EL2.{AMO, TGE}),but PSTATE.A was set, EL3 firmware can't deliver SError; 2. The exception came from the EL that SError should not be routed to(according to hcr_EL2.{AMO, TGE}),even though the PSTATE.A was set,EL3 firmware still deliver SError > > > Thanks, > > James > > . >