Hi gengdongjiu, On 06/04/17 16:06, gengdongjiu wrote: > Below is my previous idea: > When signalling Qemu, Qemu generate GHES ,then Qemu/kvmtool inject > the SEA/SEI to guest OS. For different reason, Qemu/.KVMtool injects > diferent notification type. if inject SEA/SEI/IRQ, guest OS handle the > guest SEA/SEI/IRQ. handling guest OS SEA/SEI and IRQ guest OS software > logical is different. > for example, guest OS call API "ghes_notify_sea" when happening SEA; > call API "ghes_notify_sei" when happening SEI. Sounds reasonable. Qemu shouldn't have to care what the guest OS is so the injecting notifications should stick to KVM APIs. > so what is your suggested way to notify guest OS after Qemu generating the CPER? [...] > so for the notification guest OS, I think Qemu uses IOCTL to let KVM > inject error may be better. I agree. Synchronous External Abort is something that can always be delivered, Qemu can make it look like SEA was taken on a vcpu by modifying the registers using KVM's KVM_SET_ONE_REG ioctl(). The pseudo code for what is required is in the ARM-ARM's 'AArch64.TakeException'. SError Interrupt is more complicated as it can be masked. Fortunately the architecture has a way to inject SError into a guest using HCR_EL2.VSE, I think KVM should allow users-space to inject SError with this. Marc and Christoffer will have the best idea about how such an API should work. To be useful for injecting SEI we need to be able to set VSESR_EL2 along with the HCR_EL2.VSE bit. KVM will need to know about the RAS extensions to save/restore some of the new registers listed in A1.7.5 of the new ARM-ARM. Thanks, James _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm