From: Dave Hansen <dave.hansen@intel.com>
To: Jue Wang <juew@google.com>
Cc: Erdem Aktas <erdemaktas@google.com>,
almasrymina@google.com, dave.hansen@linux.intel.com,
gthelen@google.com, jiaqiyan@google.com, linux-mm@kvack.org,
naoya.horiguchi@nec.com, seanjc@google.com, tony.luck@intel.com
Subject: Re: [RFC] Expose a memory poison detector ioctl to user space.
Date: Mon, 2 May 2022 08:30:49 -0700 [thread overview]
Message-ID: <0d9086d3-520e-795e-4d26-f87d0e73d8c6@intel.com> (raw)
In-Reply-To: <CAPcxDJ40r7p=dmCNYA6Nvvgc0gwTiKnX71291aXa59_=D1F89A@mail.gmail.com>
On 4/29/22 12:46, Jue Wang wrote:
> 1. Reading via direct mapping from guest private memory should not
> generate #MC and it should result in expected memory error poisoning
> behavior (to be confirmed).
>
> 2. Reading via direct mapping from SEV-SNP guest private memory does
> not generate #MC or #PF.
There are two different things you need to look at here:
1. What is the *implementation* today?
2. What is the architecture to which the hardware vendors will commit?
Let's say that, today, a TDX host accessing guest-private memory doesn't
trigger the error handling that you want. Then, this scheme simply
won't work on today's TDX hardware. You can only hope for better
hardware in the future.
Now, consider if you get lucky: Today, a TDX host accessing
guest-private memory *DOES* trigger the error handling that you want.
That's great, but it doesn't mean that the behavior will stick. Intel
might change it _tomorrow_ without telling anyone because folks believe
it to be software-invisible.
Either way, you need to extract promises from hardware vendors if you
want to depend on this scheme.
next prev parent reply other threads:[~2022-05-02 15:30 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-04-25 16:34 Jue Wang
2022-04-26 15:40 ` Dave Hansen
2022-04-26 17:57 ` Jue Wang
2022-04-26 18:02 ` Jue Wang
2022-04-26 18:21 ` Dave Hansen
2022-04-26 19:25 ` Jue Wang
2022-04-26 19:52 ` Luck, Tony
2022-04-26 20:06 ` Jue Wang
2022-04-26 18:20 ` Dave Hansen
2022-04-26 19:23 ` Jue Wang
2022-04-26 19:39 ` Dave Hansen
2022-04-26 19:50 ` Jue Wang
2022-04-28 16:15 ` Erdem Aktas
2022-04-28 16:34 ` Dave Hansen
2022-04-29 19:46 ` Jue Wang
2022-04-29 21:10 ` Dave Hansen
2022-04-29 21:32 ` Jue Wang
2022-04-29 21:44 ` Jue Wang
2022-04-29 22:29 ` Dave Hansen
2022-04-29 22:53 ` Jue Wang
2022-05-02 15:30 ` Dave Hansen [this message]
2022-05-02 17:19 ` David Hildenbrand
2022-05-02 17:30 ` Jue Wang
2022-05-02 17:33 ` David Hildenbrand
2022-05-02 17:36 ` Jue Wang
2022-05-02 17:38 ` David Hildenbrand
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=0d9086d3-520e-795e-4d26-f87d0e73d8c6@intel.com \
--to=dave.hansen@intel.com \
--cc=almasrymina@google.com \
--cc=dave.hansen@linux.intel.com \
--cc=erdemaktas@google.com \
--cc=gthelen@google.com \
--cc=jiaqiyan@google.com \
--cc=juew@google.com \
--cc=linux-mm@kvack.org \
--cc=naoya.horiguchi@nec.com \
--cc=seanjc@google.com \
--cc=tony.luck@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox