Received: by 2002:a05:7412:b795:b0:e2:908c:2ebd with SMTP id iv21csp411759rdb; Thu, 2 Nov 2023 07:18:03 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGE2FRpKfTPmz9ZObwGdpZC+UeqT6f/wJrMwCOWeHo5VRZvk9yODW+D3tQ51Drq3uVxkX1i X-Received: by 2002:a17:90a:199d:b0:280:c98f:2092 with SMTP id 29-20020a17090a199d00b00280c98f2092mr3687239pji.33.1698934682762; Thu, 02 Nov 2023 07:18:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698934682; cv=none; d=google.com; s=arc-20160816; b=UgAQBSoLthBtLCs+JLKkg4PphN1VCveV+p/HFG5ZOY4ZvH2FNWKf/9TQ3zcB8/ogQr iCTqlM18351C9G9a2SNpAAC3LOR3TDx+8dvEj6qKeDO+MAmJ6QCP6ONdQH0DLqLv0TNU mVN/7cpJ6f63B054OfXblWHYiQJjVLsOf7/nwsnJCcCBNqh3lZmhBPPD7o+OKWH3//Su WmN1mw4oRCKFfujpEvXT9acu0tFj9IHHcMurGk1BY823U07HzOd5dP6R8TNPaiLjplDF ithhG7ZNi4tT82jyq84qje6TuVOXWd9P7fYirAAg2/yNK6BqYhb7/AJ4OmEdqUJ2foSE QDGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=c7O2KSplInLsDb19B+zn/jm8iaKKD/NZ+yWSezVEL04=; fh=xK+wiX2TTq7O2X4TlNj4MXVc7h6ma8eyuy1Ur/RMLHE=; b=BhyXGNfTzUeN59brSTSNaJtW+Nb2VFRCjVKte+LEUWN/TR+aPrAwSGu5j+4BiW1pNO d5EwsF53/CNEIyZq0FH/eDRbdcm99rWyfnCJRQDf+6/ip6ZsiN16g1CzjrqfMhnx/JsG rj1iKtCeBDJhue/t6gLe3nCS3Q/1L9MhALsSR+NKVNgMx/t/JLvDbNkuMqBXLCGUO1lX ONbWr4UKGw+zXN+aLQMgYxu7HenXhPqK3gUY+Iqhg6Xhwqf8tRVEByz9kI1MNM06BJiA z3rP4TxdK5SSpMYQbBCWYJuq9kvDQM2rhnrO0r44cTC+AOqlbStqs5a2p4EewPfyShIf jbmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=OsLIgabC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id cp5-20020a17090afb8500b0028074aabfecsi2784497pjb.128.2023.11.02.07.18.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Nov 2023 07:18:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=OsLIgabC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 31BEE80AEB34; Thu, 2 Nov 2023 07:17:43 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376787AbjKBORa (ORCPT + 99 others); Thu, 2 Nov 2023 10:17:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51112 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376772AbjKBOR3 (ORCPT ); Thu, 2 Nov 2023 10:17:29 -0400 Received: from mail-qt1-x835.google.com (mail-qt1-x835.google.com [IPv6:2607:f8b0:4864:20::835]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 31DFE187 for ; Thu, 2 Nov 2023 07:17:26 -0700 (PDT) Received: by mail-qt1-x835.google.com with SMTP id d75a77b69052e-41cc537ed54so4936501cf.2 for ; Thu, 02 Nov 2023 07:17:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1698934645; x=1699539445; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=c7O2KSplInLsDb19B+zn/jm8iaKKD/NZ+yWSezVEL04=; b=OsLIgabCoGKVlVZSp8tm2b2oZ9ZHoUwL2ONfJDXKG7vLOh9Gy0Q7creS9+9vSDkWXo J4xO3IfflUSoz3agNqV8SLG0gC3te/x7TZ6sYp2bdeugnbXNHrdXCRBRSWhOzHl2XBY7 wGZgK9FUiGVmDp3dikT6mr4V2SLGfpYH3fJHliQdXLxkK67GEghvvvL9gs168X/DP0Gi 3e/4Cvdsx7r3PCHKdyc3vDTgChBRl+AE0wFDw/BxswdRpDyk/eUcDLWQUAL3WRayU5k7 Z8q5wNFPiOne9g28KQTrHgWxLH4nylI+k2KnZFOk1VzNYCJERVO5Qw6Bos7EnD7outx6 Gcmg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698934645; x=1699539445; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=c7O2KSplInLsDb19B+zn/jm8iaKKD/NZ+yWSezVEL04=; b=YhXx6ByXAOrJeYvxKYag70iDIrAT8UCUR7OeFdA9/JYSfa48kHdQJAXTMzJd3C7RTF 9uBChpBARM+370UgYMvdC7fhdKXYfJOqLMbpYX46ZMrY1jOogDdvdY2ZhdIwdG+ob7OD jtHM8aHlQeva74aVqY8mg2EPj+bJYQOXZesx89FMoJvEF3X66ZriHWz6BG6OnKwWp4nQ wwXxTsSRWW4YyBPUUQurfkq93UvFNFNLV3Tcl0lwK1KuEr5v/iGvDDKG7H+RW0Uv/G2Z gKzEDGo7X8ncXBak+um9YHAfM99oGdZA1sR01B5HIgasADI15gF3T20VjlKgAMWD+Oc/ CwUw== X-Gm-Message-State: AOJu0YzYSPg3anzbiJU3jdVbr3QeKDFGWxSYasbIv5FogM5mKDTczOVG MgEG3/VE4IupFpyYyo2Xh/unbLGaBkdlXyTB0a9eKw== X-Received: by 2002:a05:6214:d88:b0:66d:3a0f:97a with SMTP id e8-20020a0562140d8800b0066d3a0f097amr20020837qve.6.1698934645120; Thu, 02 Nov 2023 07:17:25 -0700 (PDT) MIME-Version: 1.0 References: <20231027182217.3615211-1-seanjc@google.com> <20231027182217.3615211-19-seanjc@google.com> In-Reply-To: <20231027182217.3615211-19-seanjc@google.com> From: Fuad Tabba Date: Thu, 2 Nov 2023 14:16:49 +0000 Message-ID: Subject: Re: [PATCH v13 18/35] KVM: x86: "Reset" vcpu->run->exit_reason early in KVM_RUN To: Sean Christopherson Cc: Paolo Bonzini , Marc Zyngier , Oliver Upton , Huacai Chen , Michael Ellerman , Anup Patel , Paul Walmsley , Palmer Dabbelt , Albert Ou , Alexander Viro , Christian Brauner , "Matthew Wilcox (Oracle)" , Andrew Morton , kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Xiaoyao Li , Xu Yilun , Chao Peng , Jarkko Sakkinen , Anish Moorthy , David Matlack , Yu Zhang , Isaku Yamahata , =?UTF-8?B?TWlja2HDq2wgU2FsYcO8bg==?= , Vlastimil Babka , Vishal Annapurve , Ackerley Tng , Maciej Szmigiero , David Hildenbrand , Quentin Perret , Michael Roth , Wang , Liam Merwick , Isaku Yamahata , "Kirill A . Shutemov" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 02 Nov 2023 07:17:43 -0700 (PDT) On Fri, Oct 27, 2023 at 7:23=E2=80=AFPM Sean Christopherson wrote: > > Initialize run->exit_reason to KVM_EXIT_UNKNOWN early in KVM_RUN to reduc= e > the probability of exiting to userspace with a stale run->exit_reason tha= t > *appears* to be valid. > > To support fd-based guest memory (guest memory without a corresponding > userspace virtual address), KVM will exit to userspace for various memory > related errors, which userspace *may* be able to resolve, instead of usin= g > e.g. BUS_MCEERR_AR. And in the more distant future, KVM will also likely > utilize the same functionality to let userspace "intercept" and handle > memory faults when the userspace mapping is missing, i.e. when fast gup() > fails. > > Because many of KVM's internal APIs related to guest memory use '0' to > indicate "success, continue on" and not "exit to userspace", reporting > memory faults/errors to userspace will set run->exit_reason and > corresponding fields in the run structure fields in conjunction with a > a non-zero, negative return code, e.g. -EFAULT or -EHWPOISON. And becaus= e > KVM already returns -EFAULT in many paths, there's a relatively high > probability that KVM could return -EFAULT without setting run->exit_reaso= n, > in which case reporting KVM_EXIT_UNKNOWN is much better than reporting > whatever exit reason happened to be in the run structure. > > Note, KVM must wait until after run->immediate_exit is serviced to > sanitize run->exit_reason as KVM's ABI is that run->exit_reason is > preserved across KVM_RUN when run->immediate_exit is true. > > Link: https://lore.kernel.org/all/20230908222905.1321305-1-amoorthy@googl= e.com > Link: https://lore.kernel.org/all/ZFFbwOXZ5uI%2Fgdaf@google.com > Signed-off-by: Sean Christopherson > --- Reviewed-by: Fuad Tabba Tested-by: Fuad Tabba Cheers, /fuad > arch/x86/kvm/x86.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index ee3cd8c3c0ef..f41dbb1465a0 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -10963,6 +10963,7 @@ static int vcpu_run(struct kvm_vcpu *vcpu) > { > int r; > > + vcpu->run->exit_reason =3D KVM_EXIT_UNKNOWN; > vcpu->arch.l1tf_flush_l1d =3D true; > > for (;;) { > -- > 2.42.0.820.g83a721a137-goog >