Received: by 2002:a05:7412:da14:b0:e2:908c:2ebd with SMTP id fe20csp19297rdb; Thu, 5 Oct 2023 15:08:17 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGvOgYwPH2U85mAvH7tTNDMaZFDKVTW65Ux0LI0CmWDmzN5+tayTaqBjiNKPu98Yy8tU7K6 X-Received: by 2002:a05:6870:71c1:b0:1e1:300e:ee95 with SMTP id p1-20020a05687071c100b001e1300eee95mr8129023oag.45.1696543697027; Thu, 05 Oct 2023 15:08:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696543696; cv=none; d=google.com; s=arc-20160816; b=ryNUsW4ySLJepaZUQBvZPkKeO/6pYQwfPsI6UFyyBIR5mk42mg3Rf92oHEHjrOJPTo paj7xWOasGY9Z5j8ikapunblBv0aDclblWAe8T0m8CaCQJynnDTfWdBVHqoQKgNeh5vz u0LGHrF9RN1M9wzrXg3+huYdL12TzwPSjgEge+6D7DtDGRQ22KHjY02VawahseFnQUNN SjxUCZgo99LC/PYO5POQoYXqAhsWFKz7G8AD2D+8KPbvtxumzz8F5p+g/ljED4MIuQgW Bo2YW83G3p6PPtfmt/wjyLikuL1yXma8LQ0ciGqlk6zncrcEqpTsbFUGQ3eb+7QROA9Q z9cg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=jVEDH7DIG0wbfSQq3l//NlGrUn25Tt5fS9CoqUlLrR0=; fh=TS0XqLZzmd+6T3cYCi4ykRQbZPqlHPYf9YHyhgUFHRg=; b=hbYUAhzxnq2ktoTBocdcHata/U4XND9IdAFi5BGefG9Kr6soz+dk/iqyERERoFQI8C YjGPD0mA5SpQaotk42XpiXuIqlr7SJIRCDvA76o9GBhbPJ9JshJZKE7UCOysp6E/MIHK f/NiRum+w+yJWUMqXAZ1W3kPSKCsZbljTGgSe8HwKn3pqwXoB0zaqkX0MLtDItEydPUm p/6MYoBukwWdtmQl6FQht8wFsx3XjoyWc2ZspFyk5Rs+uOFbmHX7CfhQgKKfb132T0CU SuRIiqK+tYQOVUSHWBZ6h2x/A3HjFsXzMjYqe0OjmWNnQRigNZ+KoAnBQf4u8nDLMLLW 2zIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=dX5L6pPB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from howler.vger.email (howler.vger.email. [23.128.96.34]) by mx.google.com with ESMTPS id w63-20020a638242000000b00565f65e16bfsi2215639pgd.762.2023.10.05.15.08.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Oct 2023 15:08:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) client-ip=23.128.96.34; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=dX5L6pPB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 819DF85BF2DF; Thu, 5 Oct 2023 15:08:14 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231924AbjJEWH7 (ORCPT + 99 others); Thu, 5 Oct 2023 18:07:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60810 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229789AbjJEWH6 (ORCPT ); Thu, 5 Oct 2023 18:07:58 -0400 Received: from mail-oo1-xc32.google.com (mail-oo1-xc32.google.com [IPv6:2607:f8b0:4864:20::c32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 081B89E for ; Thu, 5 Oct 2023 15:07:57 -0700 (PDT) Received: by mail-oo1-xc32.google.com with SMTP id 006d021491bc7-57ba2cd3507so831414eaf.2 for ; Thu, 05 Oct 2023 15:07:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1696543676; x=1697148476; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=jVEDH7DIG0wbfSQq3l//NlGrUn25Tt5fS9CoqUlLrR0=; b=dX5L6pPBp1HQzqDZfR+NFyZRAi89ORDqfdZ4I+0Xr4obaWr6STir7HyDyxBu0G/wv4 3vIFNmphOlQcRcrR17OudbWHm05ITkW0S5sTVKi+m2H1qrpeZjxPgwiWLNhcMqHcv9EQ 6qO6rxPAdRLqvLUCe0i3uPeSxz11mvsU95pJeV5w1FEHheN6lg4TmUqGUSjcWcJSb0mB +5xpSzZ7wJPNCzQiz8ADUibZudDOTZzDN1w2RQoXKR7wfjBKeUrTab4MwD0PmHQS2Sys rKIkP5mBbQNc5WsusDNl4IJyW+x6EOR2VUpCzBBQmxBP983LQECNk/lipjlefx9b5d06 IMKw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696543676; x=1697148476; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=jVEDH7DIG0wbfSQq3l//NlGrUn25Tt5fS9CoqUlLrR0=; b=QG27ZVoAp2omlMRGAK+Kxs6W5Dbv0+RDrOY/xE6tglWAa5UwFbxlD9lR8zej9vrhAq Eeli9NrG0RwqDhwUhh1+e+Tl3CCLGOral/AY6r7UjtZdhhzPRHuA5QEvJmQna1PRy/+N ChgPAfWFRqOFRXDLNR576W1qFcuzZzAGUND3WnkECfFRM1p93rrOOJc/Ow0X7GXcH8Ek 18PEhxrziWIKt0QVtluCm88s71s+umcTUOR/2LeciQOM24ozWGvMcxNaVne5tgSO0KVo f0mzmfhkCG5o8z6rFL8SsUzN8LrSq7u7AHjE4MeCVMh3deKCLBYNyRBBKzYb456bi9vQ Kslg== X-Gm-Message-State: AOJu0YxK9NgfmKAzk6GEuWg/KDW7SDqkl1FxspDPlunQ76CnepLfFbWm 8mnGccUN+aQ7fRoaNbxQgLuE49DZJZ0aUqRkaUd2nA== X-Received: by 2002:a4a:270d:0:b0:57b:4f1e:96e4 with SMTP id l13-20020a4a270d000000b0057b4f1e96e4mr6802480oof.1.1696543676303; Thu, 05 Oct 2023 15:07:56 -0700 (PDT) MIME-Version: 1.0 References: <20230914015531.1419405-1-seanjc@google.com> <20230914015531.1419405-8-seanjc@google.com> <117db856-9aec-e91c-b1d4-db2b90ae563d@intel.com> In-Reply-To: From: Anish Moorthy Date: Thu, 5 Oct 2023 15:07:19 -0700 Message-ID: Subject: Re: [RFC PATCH v12 07/33] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace To: Sean Christopherson Cc: Xiaoyao Li , Paolo Bonzini , Marc Zyngier , Oliver Upton , Huacai Chen , Michael Ellerman , Anup Patel , kvm@vger.kernel.org, kvmarm@lists.linux.dev, kvm-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, Chao Peng , Fuad Tabba , Jarkko Sakkinen , Yu Zhang , Isaku Yamahata , Xu Yilun , Vlastimil Babka , Vishal Annapurve , Ackerley Tng , Maciej Szmigiero , David Hildenbrand , Quentin Perret , Michael Roth , Wang , Liam Merwick , Isaku Yamahata Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Thu, 05 Oct 2023 15:08:14 -0700 (PDT) On Tue, Oct 3, 2023 at 4:46=E2=80=AFPM Sean Christopherson wrote: > > The only way a KVM_EXIT_MEMORY_FAULT that actually reaches userspace coul= d be > "unreliable" is if something other than a memory_fault exit clobbered the= union, > but didn't signal its KVM_EXIT_* reason. And that would be an egregious = bug that > isn't unique to KVM_EXIT_MEMORY_FAULT, i.e. the same data corruption woul= d affect > each and every other KVM_EXIT_* reason. Keep in mind the case where an "unreliable" annotation sets up a KVM_EXIT_MEMORY_FAULT, KVM_RUN ends up continuing, then something unrelated comes up and causes KVM_RUN to EFAULT. Although this at least is a case of "outdated" information rather than blatant corruption. IIRC the last time this came up we said that there's minimal harm in userspace acting on the outdated info, but it seems like another good argument for just restricting the annotations to paths we know are reliable. What if the second EFAULT above is fatal (as I understand all are today) and sets up subsequent KVM_RUNs to crash and burn somehow? Seems like that'd be a safety issue.