From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0628.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe02::628]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id EBED7208F79D7 for ; Wed, 29 Mar 2017 03:36:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=GHjDWXq2TwCuBgN1cDlA5zbAigNcgfyu6WrjMZewA2s=; b=Q0vmprG+uTNZwPq7gdHKFGFAa1mAJUWXNcuuj89U0u/CuJwPYcUFL8vR5u0MeSIQvbbIyLM/WBblbsMxUW7Fq3ieerydPvU94CKiIRisl9V4uBGyM//pNBICy6y5U0wL8+wSol9TnoJKW57O02bRSLtI0kC8l4WjGTHoRqZIOpY= Authentication-Results: huawei.com; dkim=none (message not signed) header.d=none;huawei.com; dmarc=none action=none header.from=arm.com; Received: from e104320-lin (217.140.96.140) by DB5PR08MB1080.eurprd08.prod.outlook.com (2a01:111:e400:c585::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.991.14; Wed, 29 Mar 2017 10:36:30 +0000 Date: Wed, 29 Mar 2017 11:36:59 +0100 From: Achin Gupta To: gengdongjiu CC: , , , , , James Morse , Christoffer Dall , , Marc Zyngier , , , , , , , , , , , , , , , , , Message-ID: <20170329103658.GQ23682@e104320-lin> References: <76795e20-2f20-1e54-cfa5-7444f28b18ee@huawei.com> <20170321113428.GC15920@cbox> <58D17AF0.2010802@arm.com> <20170321193933.GB31111@cbox> <58DA3F68.6090901@arm.com> <20170328112328.GA31156@cbox> <20170328115413.GJ23682@e104320-lin> <58DA67BA.8070404@arm.com> <5b7352f4-4965-3ed5-3879-db871797be47@huawei.com> MIME-Version: 1.0 In-Reply-To: <5b7352f4-4965-3ed5-3879-db871797be47@huawei.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-Originating-IP: [217.140.96.140] X-ClientProxiedBy: AM5PR04CA0009.eurprd04.prod.outlook.com (2603:10a6:206:1::22) To DB5PR08MB1080.eurprd08.prod.outlook.com (2a01:111:e400:c585::15) X-MS-Office365-Filtering-Correlation-Id: 47157378-0cc4-4d23-42ad-08d4768f7777 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(48565401081)(201703131423075)(201703031133081); SRVR:DB5PR08MB1080; X-Microsoft-Exchange-Diagnostics: 1; DB5PR08MB1080; 3:HD3uCjQPX6uZg+twOGu/v8hEutq7K+BzG9N32aWBzqm+qlG67Xme2QGmn6YpK1tKfJBvv8lW7el39SxCQYJHG5/ahTxdQWAfQdJ8qVuZwRSAL6BC9ZweEuSd0adUxvS1WKHJ7TkENoVUaHIJCQTfZJBQThs1HkBOuftjWieik7kLX42Ifa06/EBew+/YkC0JszVTrVH+Ir/qLIMXINNN40ev0eWooI2JYIndovWZrp3XMah6KXrS66qt8pQABjCCHHpklm3g7zvoR/DP7VQ157zIJC9lN/j8pnaw327PAFPWZGqrYb2XO2Q5R2IonNpEcwC2ZBxRTkbLWovDWfuMVTrNqNCn7my9Pe+CNOmlsxk=; 25:wDGf3MNiXB9c+0A3G2fERu2iGf5bByv8vykiFTCFXje0+NuDhus9fDaydhkK2uBPE9XnNEyTn8BZg6xsc6XeQKo51ler08xOAj4ZumJXk/IkFYqMRtqbVi4w7Egl7P0U9+M+PHd0VRWJ+mfS8tssbnfeGG5jZ+QCuL8Uyvu+7lM/t03xyvdaJr5ePTf26eS0PGNoJhctmbqXtlC7AnVJ4RnZ04DOtNZm4a6bw/9Cyyo72kx4QcGyQr9OpymupeNJOEV9r+FEW5ljeQyzLtZvISv6YgCKo/cXDjTdYbSQlZG+CgP4/bHHWUYLGXDqi4Gf5BF5/7vQTfLcxSrqWUnizwgV3MLQi7MKLLDsX0xhUnoOHwgQJ27CVpkv2EpG0bIAV6AK0rVhzFlTqNCkuiimFDMRbHp0rqfsb/w4oOQ3btvQC/8V4l3rrX6Phq6K8WLYr6haP2K5EvtefNz2y6lbDQ== X-LD-Processed: f34e5979-57d9-4aaa-ad4d-b122a662184d,ExtAddr X-Microsoft-Exchange-Diagnostics: 1; DB5PR08MB1080; 31:7wTN9hilGtcu66N4xrN51817YOQYKBFYNnSVrXhPkv2Vn06v2HC5I7l9n+tDYSy8IZvEaTzlJ3l59sgHHREtlQ+Kv6UcaLOuB+dgwESr1ljjTpNviHLbbFZ52rgMJwoS7bJCoX+AtrzxkO5HtqqpA6q5rcxz5Mq5f1j8eOybJ22skqf6OLjPRJqMtK05Tl/wrAdaJzCOcEGw1UzvkjdZUL8iWGyYOr5Sq+DKB7NkR5APExlbuoxcVvK6YKLfk2AG; 20:DNbBtf1n2PKmLGX7VhR2p4WdawkicO7ZmL+Fb918gvgfCw7mOvw6kTBB0VQbEROCQUcKsXOTpSFVswD5aeD0pit1yybOfzHR27lLomJTrEljcZO8dlw/sTcYEU4aJmk2bREJRGUzRGt2+GNwAGULvWYwSklsiMf3NC3hzLm87kA= NoDisclaimer: True X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(20558992708506)(192374486261705)(35073007944872); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040449)(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026)(6041248)(20161123560025)(20161123555025)(201703131423074)(201702281528074)(201703061421074)(201703061406074)(20161123558025)(20161123564025)(20161123562025)(6072148); SRVR:DB5PR08MB1080; BCL:0; PCL:0; RULEID:; SRVR:DB5PR08MB1080; X-Microsoft-Exchange-Diagnostics: 1; DB5PR08MB1080; 4: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 X-Forefront-PRVS: 0261CCEEDF X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39400400002)(39450400003)(39860400002)(39840400002)(39410400002)(39850400002)(24454002)(23676002)(5660300001)(50466002)(66066001)(93886004)(7416002)(47776003)(33656002)(55016002)(9686003)(33716001)(189998001)(38730400002)(53936002)(6496005)(53546009)(86362001)(110136004)(4001350100001)(81166006)(2950100002)(83506001)(25786009)(76176999)(3846002)(1076002)(50986999)(8676002)(305945005)(6116002)(229853002)(42186005)(6246003)(6916009)(2906002)(6666003)(7736002)(54356999)(2870700001)(4326008)(18370500001)(107986001); DIR:OUT; SFP:1101; SCL:1; SRVR:DB5PR08MB1080; H:e104320-lin; FPR:; SPF:None; MLV:sfv; LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtEQjVQUjA4TUIxMDgwOzIzOnZlTHE0VmhsWTNJenZyV0ZJVG1oTHljbENk?= =?utf-8?B?K2Y1USszdHZtL1FZaGd1ZFR2eW8yMVJGNjZ4V0RXK0NvaFBHWlh6aStBbm83?= =?utf-8?B?L1NXNGluZGc0L0lDSXMrNFR6QmprREVZdGd1NjAwSHcwdVVmeXZyaHZzYjNT?= =?utf-8?B?cGpNUTZUWUFrZjg5cmtzcUtIVjdBaXlQYUJaQkFKKzl4MEFtN0xIMjltTmlK?= =?utf-8?B?NVZDeEFZT2I4SHFkR2QyTjFzTXNxUkhvMHpvcFgySFBzQWNmckFnM29QQTZO?= =?utf-8?B?R1ZGamlEellOWVJRVHI3c0JyckJuYUVKZDE5cFpEMmkvYU9QTTZzSW43KzhZ?= =?utf-8?B?Nk5XZkNwNUhranBTcE9oOTgweWRNSTZIbzlvaTZrVkZMSFZIMUVHQ1dIVEVa?= =?utf-8?B?Q0JnZEQyODk1L0pKVmtmMVluQ3B5cGNoSUFNdHFyTGxkaFcweGpKb3ByY1ZK?= =?utf-8?B?a3VXeEorWUo0d3lGNTl5bzFBZkpQeDJFRXphdVpJZkJXb0ZnaGQ3Wnk0VkRE?= =?utf-8?B?QUQ2Q3pKcGhwM0xwVU52Qmc5WWxDZjNKUVoxUm1uV0QreG50ZXFScUVlak15?= =?utf-8?B?ZWJpWWJUL1IzZ0dEVmdZYVlxNVM5RUpCMkhkcU1HV3ovOXFieEpIa0NYUGIw?= =?utf-8?B?ZWN3S1RJMFJmU0d2bEp3NTdDaDNieUFTODR1ancwcDNZZm5LYjRVenEzQVVB?= =?utf-8?B?eU96Y05DUk9Ba2g5b3drS2ZpbDZQdW1Xc0lZYk9OcUM3VnJxNzY5aDdRSHVJ?= =?utf-8?B?RVR5OExYS0NZVXE3S252cU5DcUx0bVZ6MzE4NWdOaTV5alE2QkU4Qm5uT2pP?= =?utf-8?B?UmlKdE1MTFZ3aWFaYkRmbTdlbkdVZmFEWm9MSTdPMUFkSVFEdlU5ZkNTOWRX?= =?utf-8?B?SVRNdStsTnVvNkNlamQ0aWxLalF2RU1NOWxjOFBGZUdKdndhd3NuUXV0Z1My?= =?utf-8?B?L0FDRnRPRmFuaWRIS0hSbXBLRVN2TmV2Q3ZkNVpQOVRmcWZndGtEanBmSHhU?= =?utf-8?B?UGlNVnEyaWVuUXQ1NThEZmhRVysxOHpyL09sUjdqSnlKbVpJQnhUT2w0bmRx?= =?utf-8?B?emlCZjJCUkQ4V05UenRhenhCRkJ6MFNjTjdqNnlpdmpJMlo5SENtU1B1OUg2?= =?utf-8?B?cVdjTUNBQWxUckZKMFZUMTVLZUdvVkNHMlFkWSsvbWliNkpCOWpkdVRMTzNG?= =?utf-8?B?ZkVLT2dDa3h6eUIwUEpNd1dPZE5YTnpvZGlRY0ZVU3BxU2RWN0xKZm1lNWtx?= =?utf-8?B?aE1STWNiQjRlLzBDRk93a2YzK3VhcTdzOE1IRHF2Ylp0d252cm9HYjRTME9a?= =?utf-8?B?eXhmb1R2bnNvZ3lobXRuc1Z6dXVUTFlVazVIUWQwQXZhSFRKMmE3TDFQT3dR?= =?utf-8?B?RHJoOTF2RDYvRDZsQVpWQnN4VGZhUXBET0NzRkVNeUVsWGFGOVVnZDNXNysy?= =?utf-8?B?SE85MW0zc1l3MFhMdElGa214TDhIczlKL2xHdTZxVGpnUm5xRWtzem5qR04v?= =?utf-8?B?NEx3bHhtWTA3eVhjKzBUZXJPbkl5M3RwdGRiVzRqYVkvTGY4UFJQUEI2Uzcw?= =?utf-8?B?b1A4WXZwaithYlpPMy8yRU1JNnRmZDhHZnM1VWYrbHhxYWZ2OEc5ZDNmUmE2?= =?utf-8?B?K0hPbDhsOUh5US8zUFZJbzkrRWQzZUpCdjB2VER1cmFHUHFGenQyK3lYWTBE?= =?utf-8?Q?xqrEJnJdh5R0WUGUsl7UXfi6qU+FtmXc2lnpXMw?= X-Microsoft-Exchange-Diagnostics: 1; DB5PR08MB1080; 6:pXjYtGX8xaD9y6+KFFDxwlbJi+DqEaJCauXKLoFrsYGdj+69flCTkNvFkb/PQhlelnFRR8AcTZf7u39ycyw6GNSJfVxfZMToBkCeBaamlc1eeIUbY23y5pcPi1mvYQVvar04IH/oT4gVWwCu/R588GnfscMMiJoAS6nZ7cc6ZfpSXAqBx6hJEknNsGYYCx2Jto3VHtCero2SSQ3LuO8xw/C6BYcdJ2sdxj+Sm3zGwzKgrpf3NTYy3fMj93KYt5dJxBDum55LvTP1aUj9gCkRavRMaWxQ2OrWJ2W2WSE/L0ibI6Jzaj/9ZH0ZslEk+a6cbX9DL2qW4McK35SwoXlJQTsQ4qC0WLeMCcg0sSOwwqIxy23kXt2wQNGST19udii9BATaO4U/1xxq6Lqpa30Ri4AZDR5IhLX4HuB4umbTFWQ=; 5:oNYygag/EXu9T6pYmPnZb8A+PPP1yDGVRrpySxdjVHhJBmqDgWchig8zOwU2G9GVUIKJxCK94qO7a0X4d31hFAjfhr2/djDtX+L+QlbLUqqSJEsOF9tuBsrNQs8WXsD9F9M3oaxnt5z8gNFIjuFiig==; 24:O05UfraOhxW+rs7h5zcONxNnia7MJq2uh+ym6knvp7n87ikQGWnCaLwK1D0gojhUTtr8yu1EWeuaA2+fw6N6QkFNaUIqCPSUJkqY2BYdOYs= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DB5PR08MB1080; 7:Q4y6LL4V7rOJNWoY+MAbrHIIaOowoOmWCQv0qC/d1ebh3Uwggodi8linRugsp9GvnlKxiDFDH/vMsFwgD2AKR3mz4WpmPm30wHDe4FWd/iYZ/D/g/A5Umf0viZ0zhc95Re7Ryz5p0dzZagHgR8DqO2Y4D8QJyOqK8d6fWu3OXjxhfkm2Ti3jy/B5WdC5tmr7OKt/YcFASRXjeniuZ9X76eEXbwP+bj5Mg02297mvySNh0HSfujVf7ujd1zFDWvMxRFjom0BHIB+fCbN39Am6OdG7fdleBQZ7Rx6tlhhuWCOO7uzqKWo7/4hbC+iKBxGlCVYlSyqwWI3d9d4Wqa+CWg== X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2017 10:36:30.9847 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB5PR08MB1080 Subject: Re: [PATCH] kvm: pass the virtual SEI syndrome to guest OS X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Mar 2017 10:36:35 -0000 Content-Type: text/plain; charset="utf-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit Hi gengdongjiu, On Wed, Mar 29, 2017 at 05:36:37PM +0800, gengdongjiu wrote: > > Hi Laszlo/Biesheuvel/Qemu developer, > > Now I encounter a issue and want to consult with you in ARM64 platform, as described below: > > when guest OS happen synchronous or asynchronous abort, kvm needs to send the error address to Qemu or UEFI through sigbus to dynamically generate APEI table. from my investigation, there are two ways: > > (1) Qemu get the error address, and generate the APEI table, then notify UEFI to know this generation, then inject abort error to guest OS, guest OS read the APEI table. > (2) Qemu get the error address, and let UEFI to generate the APEI table, then inject abort error to guest OS, guest OS read the APEI table. Just being pedantic! I don't think we are talking about creating the APEI table dynamically here. The issue is: Once KVM has received an error that is destined for a guest it will raise a SIGBUS to Qemu. Now before Qemu can inject the error into the guest OS, a CPER (Common Platform Error Record) has to be generated corresponding to the error source (GHES corresponding to memory subsystem, processor etc) to allow the guest OS to do anything meaningful with the error. So who should create the CPER is the question. At the EL3/EL2 interface (Secure Firmware and OS/Hypervisor), an error arrives at EL3 and secure firmware (at EL3 or a lower secure exception level) is responsible for creating the CPER. ARM is experimenting with using a Standalone MM EDK2 image in the secure world to do the CPER creation. This will avoid adding the same code in ARM TF in EL3 (better for security). The error will then be injected into the OS/Hypervisor (through SEA/SEI/SDEI) through ARM Trusted Firmware. Qemu is essentially fulfilling the role of secure firmware at the EL2/EL1 interface (as discussed with Christoffer below). So it should generate the CPER before injecting the error. This is corresponds to (1) above apart from notifying UEFI (I am assuming you mean guest UEFI). At this time, the guest OS already knows where to pick up the CPER from through the HEST. Qemu has to create the CPER and populate its address at the address exported in the HEST. Guest UEFI should not be involved in this flow. Its job was to create the HEST at boot and that has been done by this stage. Qemu folk will be able to add but it looks like support for CPER generation will need to be added to Qemu. We need to resolve this. Do shout if I am missing anything above. cheers, Achin > > > Do you think which modules generates the APEI table is better? UEFI or Qemu? > > > > > On 2017/3/28 21:40, James Morse wrote: > > Hi gengdongjiu, > > > > On 28/03/17 13:16, gengdongjiu wrote: > >> On 2017/3/28 19:54, Achin Gupta wrote: > >>> On Tue, Mar 28, 2017 at 01:23:28PM +0200, Christoffer Dall wrote: > >>>> On Tue, Mar 28, 2017 at 11:48:08AM +0100, James Morse wrote: > >>>>> On the host, part of UEFI is involved to generate the CPER records. > >>>>> In a guest?, I don't know. > >>>>> Qemu could generate the records, or drive some other component to do it. > >>>> > >>>> I think I am beginning to understand this a bit. Since the guet UEFI > >>>> instance is specifically built for the machine it runs on, QEMU's virt > >>>> machine in this case, they could simply agree (by some contract) to > >>>> place the records at some specific location in memory, and if the guest > >>>> kernel asks its guest UEFI for that location, things should just work by > >>>> having logic in QEMU to process error reports and populate guest memory. > >>>> > >>>> Is this how others see the world too? > >>> > >>> I think so! > >>> > >>> AFAIU, the memory where CPERs will reside should be specified in a GHES entry in > >>> the HEST. Is this not the case with a guest kernel i.e. the guest UEFI creates a > >>> HEST for the guest Kernel? > >>> > >>> If so, then the question is how the guest UEFI finds out where QEMU (acting as > >>> EL3 firmware) will populate the CPERs. This could either be a contract between > >>> the two or a guest DXE driver uses the MM_COMMUNICATE call (see [1]) to ask QEMU > >>> where the memory is. > >> > >> whether invoke the guest UEFI will be complex? not see the advantage. it seems x86 Qemu > >> directly generate the ACPI table, but I am not sure, we are checking the qemu > > logical. > >> let Qemu generate CPER record may be clear. > > > > At boot UEFI in the guest will need to make sure the areas of memory that may be > > used for CPER records are reserved. Whether UEFI or Qemu decides where these are > > needs deciding, (but probably not here)... > > > > At runtime, when an error has occurred, I agree it would be simpler (fewer > > components involved) if Qemu generates the CPER records. But if UEFI made the > > memory choice above they need to interact and it gets complicated again. The > > CPER records are defined in the UEFI spec, so I would expect UEFI to contain > > code to generate/parse them. > > > > > > Thanks, > > > > James > > > > > > . > > >