Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3641516pxk; Tue, 29 Sep 2020 02:19:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwngGnwKBoz5PLyuXJ5P7TRHa2hgLL2Im/6AKiLi5H3gMDu/PHh+eFQCMBXz9GHzw/UDy+u X-Received: by 2002:aa7:dad8:: with SMTP id x24mr2177802eds.19.1601371180610; Tue, 29 Sep 2020 02:19:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601371180; cv=none; d=google.com; s=arc-20160816; b=xCDuKolqESeS0lwCU+m43DWuEngerJ91YS8Zf5IL5dtOzk9AI0Fq1G9ckTQr6/WEqi cW0XP6xY/xTBqVwXzjaOeUI5N1lPLq56zQmFSYt7XHfBBJE9yerSaEvKDGRc2z6jmKLy SAx3fqnASFFx6Md9sy+FImi7UR0BcDXtc6+6JnED94Bi9LozcTiJN6wQunMsoxs4V2/Q FUdeFg0GhcpvZ6Uiwn8ZLQCiILjCNfYHMnp4YNSyWX0T2U6JVgNQJG6wE5w/2JXAJKuc UQ4ioOZgNs5DPtZMRmFi94HWrnW9XYD7Gx738yM7W4NT8PprgEaK8ewHozA+NiyjoKA7 LqiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=ypt8LgdMVSyUFDx2ajf/v0PrV4X2XJYzLdUlFmhUgvY=; b=wIaYCwHEpz0HuzHaJajqN+kiTA3hlMOTaoxNmRYcTTQutzxJkzigwGWTf473FGSgET QMyb2fZlU2WbUjpaBUKc73mNoWUvCItx4oEy2K5WwimGmdL0H8h2LcEm4183YC0Enbus xiwN9Acn7gRc6xxh0O6HZFJXOStfgxk11SQrobOgTkNU79RCbVDBnSc+OWje8E9N5L+a 0EwKMpdHusvovz60/1DmzWSVLFW3L/PjpzdgIbTJz0auG+QbzgmdRUVs7ND93LGsdILh 19owAq0gWurlTWulZK05KeipD4WtQPgK0GGut3i+s9QZnoU+FgjQMQF8Qs3z51tZQQxk PPRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IErnP0ZN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w17si2330014ejq.623.2020.09.29.02.19.17; Tue, 29 Sep 2020 02:19:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IErnP0ZN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725372AbgI2JP3 (ORCPT + 99 others); Tue, 29 Sep 2020 05:15:29 -0400 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:43148 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727991AbgI2JP0 (ORCPT ); Tue, 29 Sep 2020 05:15:26 -0400 Dkim-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1601370925; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ypt8LgdMVSyUFDx2ajf/v0PrV4X2XJYzLdUlFmhUgvY=; b=IErnP0ZNfhDa8KU44aPKScYFZPDEsmX6LZTrTV5RssM5gRArlCvRp3/FQTlOkrNYvfHdLf 9VMQ6ADxzn7uswhrdvpy2aXmFXy2z31ON40gNlisrTShHlrGgBi4lb2dNasK1Y52IEu826 W2hxsPpbaYyaBNH3V7i7yHHP2/KcKBw= Received: from mail-wr1-f71.google.com (mail-wr1-f71.google.com [209.85.221.71]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-590-ejG1kumxNuSrQq8eWoOYNA-1; Tue, 29 Sep 2020 05:15:23 -0400 X-MC-Unique: ejG1kumxNuSrQq8eWoOYNA-1 Received: by mail-wr1-f71.google.com with SMTP id g6so1503418wrv.3 for ; Tue, 29 Sep 2020 02:15:23 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=ypt8LgdMVSyUFDx2ajf/v0PrV4X2XJYzLdUlFmhUgvY=; b=iu6X8NXHKvgvO/c101O+r1yzT+XYhSQfYdYBGKO0B4Cls+SV//rD0/UEmeyU7K5sPe o0P9cJxlQlvQ9t8iseUCmvgFwxlAugFDMaokZqZTsvDVbRrQqQ5triZFqSTzaW//wMjh 4gJIUmC+XF/Is2fOiTIgXxiu9NcnthK/Fe3vAzwIpvXIvbUJ7jWgFq3VYIOEmwM6DbN4 Zu3n9bHwnBX5m0ws2LcD5232KHTh6uGfProPPxDdur/c989JpihyIpN8bLJ1oIH4Mh+Q 91PwyneZTZ32bsXUhKLJHjgHU4049sDtz9DOlcYG4OeaPCZTQMpmngsDGvIHNHxtIr5M MS1A== X-Gm-Message-State: AOAM533U7SvW1IOhKzfEwFrcjC0IqzIC9+HiVJ/Ca87mrC7+/upaY8nP gA9L86RVV8fyimkGC6xkDUyGdTVMnVifr/CiKqh3AC1EqyxiOdInqv8Yhm72C9uY7gHQ0pHfZrB 26f1sYbGz42Bc9bl0oyOqFd8b X-Received: by 2002:a1c:7912:: with SMTP id l18mr3442452wme.124.1601370922093; Tue, 29 Sep 2020 02:15:22 -0700 (PDT) X-Received: by 2002:a1c:7912:: with SMTP id l18mr3442435wme.124.1601370921899; Tue, 29 Sep 2020 02:15:21 -0700 (PDT) Received: from ?IPv6:2001:b07:6468:f312:9dbe:2c91:3d1b:58c6? ([2001:b07:6468:f312:9dbe:2c91:3d1b:58c6]) by smtp.gmail.com with ESMTPSA id o15sm4501936wmh.29.2020.09.29.02.15.20 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 29 Sep 2020 02:15:21 -0700 (PDT) Subject: Re: [RFC PATCH 3/3] KVM: x86: Use KVM_BUG/KVM_BUG_ON to handle bugs that are fatal to the VM To: Sean Christopherson Cc: Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Marc Zyngier , James Morse , Julien Thierry , Suzuki K Poulose , linux-arm-kernel@lists.infradead.org, Huacai Chen , Aleksandar Markovic , linux-mips@vger.kernel.org, Paul Mackerras , kvm-ppc@vger.kernel.org, Christian Borntraeger , Janosch Frank , David Hildenbrand , Cornelia Huck , Claudio Imbrenda References: <20200923224530.17735-1-sean.j.christopherson@intel.com> <20200923224530.17735-4-sean.j.christopherson@intel.com> <878scze4l5.fsf@vitty.brq.redhat.com> <20200924181134.GB9649@linux.intel.com> <87k0wichht.fsf@vitty.brq.redhat.com> <20200925171233.GC31528@linux.intel.com> <731dd323-8c66-77ff-cf15-4bbdea34bcf9@redhat.com> <20200929035257.GH31514@linux.intel.com> From: Paolo Bonzini Message-ID: Date: Tue, 29 Sep 2020 11:15:19 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.11.0 MIME-Version: 1.0 In-Reply-To: <20200929035257.GH31514@linux.intel.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 29/09/20 05:52, Sean Christopherson wrote: >> I think usage should be limited to dangerous cases, basically WARN_ON >> level. However I agree with Vitaly that KVM_GET_* should be allowed. > > On the topic of feedback from Vitaly, while dredging through my mailbox I > rediscovered his suggestion of kvm->kvm_internal_bug (or maybe just > kvm->internal_bug) instead of kvm->vm_bugged[*]. Also agrees with KVM_EXIT_INTERNAL_ERROR. >> The other question is whether to return -EIO or KVM_EXIT_INTERNAL_ERROR. >> The latter is more likely to be handled already by userspace. > > And probably less confusing for unsuspecting users. E.g. -EIO is most > likely to be interpreted as "I screwed up", whereas KVM_EXIT_INTERNAL_ERROR > will correctly be read as "KVM screwed up". All good points, seems like you have enough review material for the non-RFC version. Paolo