Thanks for the mail.
On 2018/2/10 1:44, James Morse wrote:
>> its ESR is 0, can not control the virtual SError's syndrom value, it does
>> not have
>> such registers to control that.
> My point was its more nuanced than this: the ARM-ARM's
> TakeVirtualSErrorException() pseudo-code lets virtual-SError have an
> implementation defined syndrome. I've never seen Juno generate anything other
> than '0', but it might do something different on a thursday.
I checked the "aarch64/exceptions/asynch/AArch64.TakeVirtualSErrorException",
you are right, the virtual SError's syndrome value can be 0 or implementation
defined value, not always 0,
which is decided by the "exception.syndrome<24>".
thanks for the clarification.
> The point? We can't know what a CPU without the RAS extensions puts in there.
> Why Does this matter? When migrating a pending SError we have to know the
> difference between 'use this 64bit value', and 'the CPU will generate it'.
> If I make an SError pending with ESR=0 on a CPU with VSESR, I can't migrated
> a system that generates an impdef SError-ESR, because I can't know it will be
But it will have a issue,
For the target system, before taking the SError, no one can know whether its
is IMPLEMENTATION DEFINED or architecturally defined.
when the virtual SError is taken, the ESR_ELx.IDS will be updated, then we can
whether the ESR value is impdef or architecturally defined.
It seems migration is only allowed only when target system and source system
all support RAS extension, because we do not know
whether its syndrome is IMPLEMENTATION DEFINED or architecturally defined.
>> Does Juno not have RAS Extension?
> It's two types of v8.0 CPU, no RAS extensions.
>> if yes, I think we can only inject an SError, but can not change its ESR
>> because it does not have vsesr_el2.
> I agree, this means we need to be able to tell the difference between
> and 'pending with this ESR'.
>>> Just because we can't control the ESR doesn't mean injecting an SError isn't
>>> something user-space may want to do.
>> yes, we may need to support user-space injects an SError even through CPU
>> does not have RAS Extension.
>>> If we tackle migration of pending-SError first, I think that will give us
>>> API to create a new pending SError with/without an ESR as appropriate.
>> sure, we should. Last week, I checked the KVM_GET/SET_VCPU_EVENTS IOCTL, it
>> should meet our
>> migration requirements