Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp2407434ybg; Fri, 5 Jun 2020 13:09:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwGcZUqNmTo+JhL/twpjsCSDLdkSJJGGh4XRqduGcZqzAzRAx31zOadTHZLUHqqvnno8d37 X-Received: by 2002:a17:906:404:: with SMTP id d4mr10852968eja.173.1591387782166; Fri, 05 Jun 2020 13:09:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591387782; cv=none; d=google.com; s=arc-20160816; b=0d4C+Nqfa+pnQUv5IwyaEB8n8dKTqW15WfuZBKA7C8Tb+qniGt3TucLhA9gIwGYFhS pl9Gd/OyBqh+cEhXUdKDsBYfqdNqfTF69LrSS3JXeSOxgVEjOmuS3pMcQ4sBb+QTzWNo YrUuXpBB4j6s09kdk1amsn/kzvD7bfZ3fAWk5xlaBXZ9kZhaPjpxzY0XVtrwSPBbsZW+ 4CSG5wWqmjf5/8PqBJfl/4DeJjwzF2C41GK68IWiNDLhhDF8SCxse3W21QXOFQM/rzK9 ie3hc2OHz9A+wXvxwDPnJgSC6x4ZnKRfah6ZIW05B1q0u2q5/MSwj0//9CTSFMuvmJCi hMOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=vyUeT5m1I+PRnN6B0n1G9VMFnsfbFrFTHaUNqn7kf3Y=; b=nTxltLhK9SkN7TrfOC8n7/X0v9i5JQ5hdLo9jxtO3X0scpCLFKF3px5Dg7YH39apSB /5GZ2tbtdG3CHrx24ePUeYEiL6tduG5cAm1R+atqPxFZzdH/IBDXtTclsCy5VC0ZgOKR Vz0amVFF0TwW/9Z6zueyEC0scxCJL7UX/wO5EAsymb2zF3sIEBLjGAV+ff/MoTKSs6Jo XcPIJTWcUWdZj1xLXyTDd/8+NI06HoSAWdeXlUVrYmPMHCmtGZQ8wrilQQB69UekagWo Yh+Es1kudHBHJr3Dc2GsyYV8gkhHKc0lMcaSnRd6j+TS10hM+GFZBmdxLWwFbVPXqwg0 gKoA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c11si4895706edn.383.2020.06.05.13.09.19; Fri, 05 Jun 2020 13:09:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728194AbgFEUGx (ORCPT + 99 others); Fri, 5 Jun 2020 16:06:53 -0400 Received: from mga14.intel.com ([192.55.52.115]:55629 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727863AbgFEUGw (ORCPT ); Fri, 5 Jun 2020 16:06:52 -0400 IronPort-SDR: qLCGo+iyW5O1JSOnOSsv1dq/jtaV76EGpwu1yhLYo6KzJrHBQs6s73tcFkK7OSWlpGwHSIkg78 m/Mp3p4AXDUw== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jun 2020 13:06:52 -0700 IronPort-SDR: vuidcrLsSHUvLnHM78ClpxSJeqGc1d3MaeNx3OBTZpmjtVUy5Y5t1NWeE+1lmsl8lGzaGx7iSI EjIelMGv2OzA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,477,1583222400"; d="scan'208";a="378839299" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.152]) by fmsmga001.fm.intel.com with ESMTP; 05 Jun 2020 13:06:52 -0700 Date: Fri, 5 Jun 2020 13:06:51 -0700 From: Sean Christopherson To: Vitaly Kuznetsov Cc: kvm@vger.kernel.org, Paolo Bonzini , Wanpeng Li , Jim Mattson , linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 1/2] KVM: nVMX: Properly handle kvm_read/write_guest_virt*() result Message-ID: <20200605200651.GC11449@linux.intel.com> References: <20200605115906.532682-1-vkuznets@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200605115906.532682-1-vkuznets@redhat.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 05, 2020 at 01:59:05PM +0200, Vitaly Kuznetsov wrote: > Introduce vmx_handle_memory_failure() as an interim solution. Heh, "interim". I'll take the over on that :-D. > Note, nested_vmx_get_vmptr() now has three possible outcomes: OK, PF, > KVM_EXIT_INTERNAL_ERROR and callers need to know if userspace exit is > needed (for KVM_EXIT_INTERNAL_ERROR) in case of failure. We don't seem > to have a good enum describing this tristate, just add "int *ret" to > nested_vmx_get_vmptr() interface to pass the information. > > Reported-by: syzbot+2a7156e11dc199bdbd8a@syzkaller.appspotmail.com > Suggested-by: Sean Christopherson > Signed-off-by: Vitaly Kuznetsov > --- ... > +/* > + * Handles kvm_read/write_guest_virt*() result and either injects #PF or returns > + * KVM_EXIT_INTERNAL_ERROR for cases not currently handled by KVM. Return value > + * indicates whether exit to userspace is needed. > + */ > +int vmx_handle_memory_failure(struct kvm_vcpu *vcpu, int r, > + struct x86_exception *e) > +{ > + if (r == X86EMUL_PROPAGATE_FAULT) { > + kvm_inject_emulated_page_fault(vcpu, e); > + return 1; > + } > + > + /* > + * In case kvm_read/write_guest_virt*() failed with X86EMUL_IO_NEEDED > + * while handling a VMX instruction KVM could've handled the request A nit similar to your observation on the shortlog, this isn't limited to VMX instructions. > + * correctly by exiting to userspace and performing I/O but there > + * doesn't seem to be a real use-case behind such requests, just return > + * KVM_EXIT_INTERNAL_ERROR for now. > + */ > + vcpu->run->exit_reason = KVM_EXIT_INTERNAL_ERROR; > + vcpu->run->internal.suberror = KVM_INTERNAL_ERROR_EMULATION; > + vcpu->run->internal.ndata = 0; > + > + return 0; > +}