[{"id":3678024,"web_url":"http://patchwork.ozlabs.org/comment/3678024/","msgid":"<ddka3tcpcus5od4hmzauxyyqzwodqdeyzj4ttq4op5iusfugve@yacboe7mg5e2>","list_archive_url":null,"date":"2026-04-16T08:56:17","subject":"Re: [PATCH] RISC-V: KVM: Fix invalid HVA warning in steal-time\n recording","submitter":{"id":92377,"url":"http://patchwork.ozlabs.org/api/people/92377/","name":"Andrew Jones","email":"andrew.jones@oss.qualcomm.com"},"content":"On Wed, Apr 15, 2026 at 07:52:16AM +0000, Jiakai Xu wrote:\n> kvm_riscv_vcpu_record_steal_time() assumes that the steal-time shared\n> memory GPA (vcpu->arch.sta.shmem) is always backed by a valid guest\n> memory slot. However, this assumption is not guaranteed by the KVM\n> userspace ABI.\n> \n> A malicious or buggy userspace can set the STA shared memory GPA via\n> KVM_SET_ONE_REG without establishing a corresponding memory region via\n> KVM_SET_USER_MEMORY_REGION. In such cases, the GPA cannot be translated\n> to a valid HVA and kvm_vcpu_gfn_to_hva() returns an error address.\n> \n> The current implementation incorrectly treats this as a kernel warning\n> using WARN_ON(), which may escalate to a kernel panic when panic_on_warn\n> is enabled.\n> \n> This is not a kernel bug condition but a normal invalid configuration\n> from userspace, and should be handled gracefully.\n> \n> Fix it by removing WARN_ON() and treating invalid HVA as a normal\n> failure case, resetting the STA shared memory state.\n> \n> Fixes: e9f12b5fff8ad0 (\"RISC-V: KVM: Implement SBI STA extension\")\n> Signed-off-by: Jiakai Xu <xujiakai2025@iscas.ac.cn>\n> Signed-off-by: Jiakai Xu <jiakaiPeanut@gmail.com>\n> Assisted-by: OpenClaw:DeepSeek-V3.2\n> ---\n>  arch/riscv/kvm/vcpu_sbi_sta.c | 2 +-\n>  1 file changed, 1 insertion(+), 1 deletion(-)\n> \n> diff --git a/arch/riscv/kvm/vcpu_sbi_sta.c b/arch/riscv/kvm/vcpu_sbi_sta.c\n> index 3b834709b429f..60e50296a0085 100644\n> --- a/arch/riscv/kvm/vcpu_sbi_sta.c\n> +++ b/arch/riscv/kvm/vcpu_sbi_sta.c\n> @@ -46,7 +46,7 @@ void kvm_riscv_vcpu_record_steal_time(struct kvm_vcpu *vcpu)\n>  \tgfn = shmem >> PAGE_SHIFT;\n>  \thva = kvm_vcpu_gfn_to_hva(vcpu, gfn);\n>  \n> -\tif (WARN_ON(kvm_is_error_hva(hva))) {\n> +\tif (kvm_is_error_hva(hva)) {\n>  \t\tvcpu->arch.sta.shmem = INVALID_GPA;\n>  \t\treturn;\n>  \t}\n> -- \n> 2.34.1\n>\n\nReviewed-by: Andrew Jones <andrew.jones@oss.qualcomm.com>","headers":{"Return-Path":"\n <kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=MnNza6rz;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=qualcomm.com header.i=@qualcomm.com header.a=rsa-sha256\n header.s=qcppdkim1 header.b=NbxAPdKo;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com\n header.a=rsa-sha256 header.s=google header.b=f/svGJYb;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=temperror (SPF Temporary Error: DNS Timeout)\n smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:3::133;\n helo=bombadil.infradead.org;\n envelope-from=kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fxBhn3CvKz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 16 Apr 2026 18:56:33 +1000 (AEST)","from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wDIWQ-00000002CdV-0B16;\n\tThu, 16 Apr 2026 08:56:26 +0000","from mx0b-0031df01.pphosted.com ([205.220.180.131])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wDIWM-00000002Cbt-4AHy\n\tfor kvm-riscv@lists.infradead.org;\n\tThu, 16 Apr 2026 08:56:24 +0000","from pps.filterd (m0279869.ppops.net [127.0.0.1])\n\tby mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63G6ohx1218870\n\tfor <kvm-riscv@lists.infradead.org>; Thu, 16 Apr 2026 08:56:22 GMT","from mail-dl1-f69.google.com (mail-dl1-f69.google.com\n [74.125.82.69])\n\tby mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4djtuygg7b-1\n\t(version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT)\n\tfor <kvm-riscv@lists.infradead.org>; Thu, 16 Apr 2026 08:56:21 +0000 (GMT)","by mail-dl1-f69.google.com with SMTP id\n a92af1059eb24-12c56ad1a90so19045937c88.0\n        for <kvm-riscv@lists.infradead.org>;\n Thu, 16 Apr 2026 01:56:21 -0700 (PDT)","from localhost (ip-86-49-249-15.bb.vodafone.cz. [86.49.249.15])\n        by smtp.gmail.com with ESMTPSA id\n a92af1059eb24-12c5e6b6a05sm5919161c88.14.2026.04.16.01.56.19\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Thu, 16 Apr 2026 01:56:19 -0700 (PDT)"],"DKIM-Signature":["v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References:\n\tMessage-ID:Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=0q1tg8GOfgOORshIsMmVR18fQaAlmIfdCQ6fJ8C1LZA=; b=MnNza6rz/hGNpk\n\tUpMF/pgafyw2+sPSgCECxmZbeNGg0UI4zjigWruNYye8B0SPonxZFbAHgj7n9L3n13OD1bYGVgkHe\n\trjIzsexOVam9RR9XlR8NbYjhoffDMvcECrO/MsxTO6zNF3g4TUHNqXa+PRXud2BXp70NAp83b8Rh8\n\t4xHTvxInq5K4VcmF2foL4xkr6h1/YqXRKBbqsL86lK2nhG8TosP1mjODE15gsK2fYsmS5YFJTGSUh\n\tjbLXzc0Yc0KB4vL9bLwDusCji2nnbIJkK4QHrMpLy4KJmQhjvbN79i9WjTYHl8QZe/GA6ahZ5EgHe\n\tUUxbIRkYkVfrp3zaTK/A==;","v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h=\n\tcc:content-type:date:from:in-reply-to:message-id:mime-version\n\t:references:subject:to; s=qcppdkim1; bh=7PJKkSl8igezGMSjj7lPVu8P\n\tECVNUlUo2WNQqgBP0H4=; b=NbxAPdKoDsZzWMXdXMrFQoUQxjz31jjjxA/6ZbLe\n\tRevTpxrcJ5W3ZfKhvZXzz59whcSQ/ePhzXVzjs1ci0f9z1Rst7ygLV8ft+RaWocI\n\tATrwYD5ULhHpxIDwxu9VayTd3UZp1idaxB4KMM/mBmH7UlfYMLAmGUGMqiz0lVAE\n\tEphmRqC63AJzfBcl8I5yrQ6sMjM9zxR1e7a/sc5i/xnXOaXL+aBvXiavsjzugbDV\n\tgiCzqIh2ZcMQQIDeubrBvG8d1yM1UmzGYfGOfEGV/DCrx+LpAYqpOqstytoHZqMR\n\tdFFf1sbGIoMUDzEho72lSHF9uDLZ/O+KBHFIicULn8pSLg==","v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=oss.qualcomm.com; s=google; t=1776329781; x=1776934581;\n darn=lists.infradead.org;\n        h=in-reply-to:content-disposition:mime-version:references:message-id\n         :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to;\n        bh=7PJKkSl8igezGMSjj7lPVu8PECVNUlUo2WNQqgBP0H4=;\n        b=f/svGJYboks70Aduje9hYDP4BJWK5xVJrYBMC4xepSGm05Rzfr0hkADQuW2zni41cj\n         RdKJeUJyrMa4smsUoR3lOixYt3y7qJDixO68ubPysKSD+6Yh+Uvwz+MqdeHDV/62PlZR\n         TMDLxl7hvWQIj3W8OegY0nbQ5WPbGb9ScMDj2HFfybjjlr20SgtQOa9KuyYJHxGHeQWQ\n         2ZHSj07tKvUgbg1f9qwmQ+/VnFzeeXC6B1TYMo1ibq0yBMgNwGOIKv8hCVHV/+f6vZuA\n         LVlHvi8AzsfjGVRcNdSEziLzsGNf4tzKreqiwi/rBSaSEZyODMa5g/02UpmIvGoY9Cws\n         9uSA=="],"X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1776329781; x=1776934581;\n        h=in-reply-to:content-disposition:mime-version:references:message-id\n         :subject:cc:to:from:date:x-gm-gg:x-gm-message-state:from:to:cc\n         :subject:date:message-id:reply-to;\n        bh=7PJKkSl8igezGMSjj7lPVu8PECVNUlUo2WNQqgBP0H4=;\n        b=GovdP2Vf0JM363fHeZzEpmqKKfjDU/GB2mUxqG5RfMUmRP+S+OuUNKtGTQxuaUySRs\n         nKMZ4ga7CFJjK0E6pvFSY6smYxNlFjIyIxrxuy74Hg4LCH/d+UfskcKeDGHS8Rz6OnHp\n         Ms+kR1fds+jLBN1D9JtC0Zg12cGFLuHJJms0QXmDUzaBlEhDR6fjxSvVZB0FLkBX+OFt\n         pXf/+lsjsKnWC43xVA50EnAZQBOt+MKLFhPE0Mir0pVxgc3jnl8e0fn/wrXpXnxuUu1k\n         iBhJLPdk/TpmpNjCvPEE2IGpucNglY92E/kB71SBe2qyvAemahgW7P2TfYD0g+vbNW+8\n         Zn4w==","X-Gm-Message-State":"AOJu0YwzbENkb+wp797gdz63MsOwum0r4vRrwBiiwzog0UjKJ2shM6nj\n\t7jHkmXosMrSDfQTs7wFuXpPrA9ZaXr2fCOIhIwtQOTHFzYcfUgSTPg5RkEBdSZjsBPlnYZGTHww\n\tHw3p7xKb0yB1zmRfSi3d7lke90mXpQIcF9y68dKnxgM7LKKn9QIjpB4fgfQ7LA4mHIjbt","X-Gm-Gg":"AeBDietAJNrm2N7UxVILdb+SCKo1t4tk/L5dVG4KNMm0AQRzvtlYBGnJpIeZrBmSkrC\n\tx7abHETZHORuDKoKikhDAe9MXGHnaR1fA70NbjxjJh9kqABwXKeIsM3o6sUDaNoEciiiw73l8yH\n\tiN3zSQpUTCyRxtFKCnuRbnsQOq94QFQk4mqvjVocsHfmoHHtYCL/pWfJMEzumVBAqsFGGU14Qhm\n\tYyRS2rbR54xWp2mEHNIDYyg8OJcpBCjaz6Gr/J9UVHs/+F9o3MoHBBw8i8jo8+TQmO0Af978v1g\n\tggBhf+HDuMAf9WSNHZisXuS/8/vCc8Zacj+AiOO1fxh5iVd7cHbdd1Ix2pZmwtFJdWTcMhXLwDR\n\tqsx0bski5tumTNmTVYH9pIfYHUehsQ+kkT9GQKNNSJU0PPFtuDsiBRC+NwYIt","X-Received":["by 2002:a05:7022:ec6:b0:11d:f89d:85a0 with SMTP id\n a92af1059eb24-12c34edf982mr14938560c88.27.1776329780602;\n        Thu, 16 Apr 2026 01:56:20 -0700 (PDT)","by 2002:a05:7022:ec6:b0:11d:f89d:85a0 with SMTP id\n a92af1059eb24-12c34edf982mr14938542c88.27.1776329780065;\n        Thu, 16 Apr 2026 01:56:20 -0700 (PDT)"],"Date":"Thu, 16 Apr 2026 10:56:17 +0200","From":"Andrew Jones <andrew.jones@oss.qualcomm.com>","To":"Jiakai Xu <xujiakai2025@iscas.ac.cn>","Cc":"kvm-riscv@lists.infradead.org, kvm@vger.kernel.org,\n        linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org,\n        Albert Ou <aou@eecs.berkeley.edu>, Alexandre Ghiti <alex@ghiti.fr>,\n        Andrew Jones <ajones@ventanamicro.com>,\n        Anup Patel <anup@brainfault.org>, Atish Patra <atish.patra@linux.dev>,\n        Palmer Dabbelt <palmer@dabbelt.com>, Paul Walmsley <pjw@kernel.org>,\n        Jiakai Xu <jiakaiPeanut@gmail.com>","Subject":"Re: [PATCH] RISC-V: KVM: Fix invalid HVA warning in steal-time\n recording","Message-ID":"<ddka3tcpcus5od4hmzauxyyqzwodqdeyzj4ttq4op5iusfugve@yacboe7mg5e2>","References":"<20260415075216.2757427-1-xujiakai2025@iscas.ac.cn>","MIME-Version":"1.0","Content-Disposition":"inline","In-Reply-To":"<20260415075216.2757427-1-xujiakai2025@iscas.ac.cn>","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDE2MDA4MyBTYWx0ZWRfX4/sc0qYI1rvi\n SBptvC/Baqhx5uWOcAEgJNRnUG/ufFjTpUgLcCrVyv1dZ0+19VT/PzQRLDyccXEw/jaMO2HZ0uP\n glzzNaz4W3BuSGTRCIgxbltxDZAV2jX4YeQJ2szTw6/mLiGQDp6KO2dGYfVL03/fE0/SGfdEWv0\n JzltJ6GTdNZ5ZOOOolPxU9AGN/9RDkzWHnPAb1zhyoGVWq2NMYL4ntae3vDQSUTDq1ZBPwOzLh4\n 2w0HDaJflgcRsFNHihNdB/FlgeEoo3AhIyE1LEKDGvC/+SVjP/iVW87QmResBk7kxMgx4dpmALf\n hY9KWq1FbTw77jRvCklMChPHJ1C4bsZkmw1Mfwm8C7zImxaRuFlQC7x7bH0OZ2P1wZPHiOX05Ww\n apwfDL+phFrpk5RVY5d8zjMh5HEcyXIXodgtgagSfEcN/79Eh9fywEbSMHvlu0cpVuByLyxWzdy\n mdnXXLHQkx0K9wvCLVw==","X-Proofpoint-ORIG-GUID":"LQh8uTDoJeKUsfp4uzMd6e7CINZucUcO","X-Authority-Analysis":"v=2.4 cv=Ipgutr/g c=1 sm=1 tr=0 ts=69e0a435 cx=c_pps\n a=kVLUcbK0zfr7ocalXnG1qA==:117 a=fuErIE+P63Icv3tqjtEZBw==:17\n a=kj9zAlcOel0A:10 a=A5OVakUREuEA:10 a=s4-Qcg_JpJYA:10\n a=VkNPw1HP01LnGYTKEx00:22 a=u7WPNUs3qKkmUXheDGA7:22 a=_glEPmIy2e8OvE2BGh3C:22\n a=pGLkceISAAAA:8 a=EUspDBNiAAAA:8 a=KdkbrdStzu5tqnZBQrIA:9 a=CjuIK1q_8ugA:10\n a=vr4QvYf-bLy2KjpDp97w:22","X-Proofpoint-GUID":"LQh8uTDoJeKUsfp4uzMd6e7CINZucUcO","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-16_02,2026-04-13_04,2025-10-01_01","X-Proofpoint-Spam-Details":"rule=outbound_notspam policy=outbound score=0\n priorityscore=1501 bulkscore=0 clxscore=1015 impostorscore=0\n lowpriorityscore=0 adultscore=0 malwarescore=0 phishscore=0 spamscore=0\n suspectscore=0 classifier=typeunknown authscore=0 authtc= authcc=\n route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2604070000\n definitions=main-2604160083","X-CRM114-Version":"20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ","X-CRM114-CacheID":"sfid-20260416_015623_143236_2516C5CC ","X-CRM114-Status":"GOOD (  26.85  )","X-Spam-Score":"-2.8 (--)","X-Spam-Report":"Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  On Wed, Apr 15, 2026 at 07:52:16AM +0000, Jiakai Xu wrote:\n    > kvm_riscv_vcpu_record_steal_time() assumes that the steal-time shared >\n    memory GPA (vcpu->arch.sta.shmem) is always backed by a valid guest [...]    \n Content analysis details:   (-2.8 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n  0.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The\n                             query to Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                        [205.220.180.131 listed in\n sa-trusted.bondedsender.org]\n  0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n                              Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                             [205.220.180.131 listed in\n sa-accredit.habeas.com]\n  0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n                              Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                           [205.220.180.131 listed in\n bl.score.senderscore.com]\n -0.7 RCVD_IN_DNSWL_LOW      RBL: Sender listed at https://www.dnswl.org/, low\n                             trust\n                             [205.220.180.131 listed in list.dnswl.org]\n -0.0 SPF_PASS               SPF: sender matches SPF record\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]","X-BeenThere":"kvm-riscv@lists.infradead.org","X-Mailman-Version":"2.1.34","Precedence":"list","List-Id":"<kvm-riscv.lists.infradead.org>","List-Unsubscribe":"<http://lists.infradead.org/mailman/options/kvm-riscv>,\n <mailto:kvm-riscv-request@lists.infradead.org?subject=unsubscribe>","List-Archive":"<http://lists.infradead.org/pipermail/kvm-riscv/>","List-Post":"<mailto:kvm-riscv@lists.infradead.org>","List-Help":"<mailto:kvm-riscv-request@lists.infradead.org?subject=help>","List-Subscribe":"<http://lists.infradead.org/mailman/listinfo/kvm-riscv>,\n <mailto:kvm-riscv-request@lists.infradead.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Sender":"\"kvm-riscv\" <kvm-riscv-bounces@lists.infradead.org>","Errors-To":"kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"}},{"id":3678516,"web_url":"http://patchwork.ozlabs.org/comment/3678516/","msgid":"<SE3PR04MB8922199111036C3396AB7BEFF3202@SE3PR04MB8922.apcprd04.prod.outlook.com>","list_archive_url":null,"date":"2026-04-17T06:40:13","subject":"Re: [PATCH] RISC-V: KVM: Fix invalid HVA warning in steal-time\n recording","submitter":{"id":91422,"url":"http://patchwork.ozlabs.org/api/people/91422/","name":"Nutty.Liu","email":"nutty.liu@hotmail.com"},"content":"On 4/15/2026 3:52 PM, Jiakai Xu wrote:\n> kvm_riscv_vcpu_record_steal_time() assumes that the steal-time shared\n> memory GPA (vcpu->arch.sta.shmem) is always backed by a valid guest\n> memory slot. However, this assumption is not guaranteed by the KVM\n> userspace ABI.\n>\n> A malicious or buggy userspace can set the STA shared memory GPA via\n> KVM_SET_ONE_REG without establishing a corresponding memory region via\n> KVM_SET_USER_MEMORY_REGION. In such cases, the GPA cannot be translated\n> to a valid HVA and kvm_vcpu_gfn_to_hva() returns an error address.\n>\n> The current implementation incorrectly treats this as a kernel warning\n> using WARN_ON(), which may escalate to a kernel panic when panic_on_warn\n> is enabled.\n>\n> This is not a kernel bug condition but a normal invalid configuration\n> from userspace, and should be handled gracefully.\n>\n> Fix it by removing WARN_ON() and treating invalid HVA as a normal\n> failure case, resetting the STA shared memory state.\n>\n> Fixes: e9f12b5fff8ad0 (\"RISC-V: KVM: Implement SBI STA extension\")\n> Signed-off-by: Jiakai Xu <xujiakai2025@iscas.ac.cn>\n> Signed-off-by: Jiakai Xu <jiakaiPeanut@gmail.com>\n> Assisted-by: OpenClaw:DeepSeek-V3.2\nReviewed-by: Nutty Liu <nutty.liu@hotmail.com>\n\nThanks,\nNutty\n> ---\n>   arch/riscv/kvm/vcpu_sbi_sta.c | 2 +-\n>   1 file changed, 1 insertion(+), 1 deletion(-)\n>\n> diff --git a/arch/riscv/kvm/vcpu_sbi_sta.c b/arch/riscv/kvm/vcpu_sbi_sta.c\n> index 3b834709b429f..60e50296a0085 100644\n> --- a/arch/riscv/kvm/vcpu_sbi_sta.c\n> +++ b/arch/riscv/kvm/vcpu_sbi_sta.c\n> @@ -46,7 +46,7 @@ void kvm_riscv_vcpu_record_steal_time(struct kvm_vcpu *vcpu)\n>   \tgfn = shmem >> PAGE_SHIFT;\n>   \thva = kvm_vcpu_gfn_to_hva(vcpu, gfn);\n>   \n> -\tif (WARN_ON(kvm_is_error_hva(hva))) {\n> +\tif (kvm_is_error_hva(hva)) {\n>   \t\tvcpu->arch.sta.shmem = INVALID_GPA;\n>   \t\treturn;\n>   \t}","headers":{"Return-Path":"\n <kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=vui3800z;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=hotmail.com header.i=@hotmail.com header.a=rsa-sha256\n header.s=selector1 header.b=cS2IanOo;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fxld46cCLz1yGt\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 17 Apr 2026 16:40:40 +1000 (AEST)","from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wDcsX-00000003YIp-4AFZ;\n\tFri, 17 Apr 2026 06:40:38 +0000","from mail-japaneastazolkn19013081.outbound.protection.outlook.com\n ([52.103.43.81] helo=TYDPR03CU002.outbound.protection.outlook.com)\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wDcsU-00000003YIJ-2eHv;\n\tFri, 17 Apr 2026 06:40:36 +0000","from SE3PR04MB8922.apcprd04.prod.outlook.com (2603:1096:101:2e9::7)\n by TYUPR04MB6691.apcprd04.prod.outlook.com (2603:1096:400:353::13) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9818.25; Fri, 17 Apr\n 2026 06:40:22 +0000","from SE3PR04MB8922.apcprd04.prod.outlook.com\n ([fe80::3450:f139:5238:8f58]) by SE3PR04MB8922.apcprd04.prod.outlook.com\n ([fe80::3450:f139:5238:8f58%6]) with mapi id 15.20.9818.023; Fri, 17 Apr 2026\n 06:40:22 +0000"],"DKIM-Signature":["v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:Content-Type:\n\tContent-Transfer-Encoding:List-Subscribe:List-Help:List-Post:List-Archive:\n\tList-Unsubscribe:List-Id:MIME-Version:In-Reply-To:From:References:Cc:To:\n\tSubject:Date:Message-ID:Reply-To:Content-ID:Content-Description:Resent-Date:\n\tResent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner;\n\tbh=qZFMOtrTgbm66Li546Q25+z8G8516g5ssSWTbpJmcP4=; b=vui3800zYHpaOVtW3gZ64CN5vc\n\tZdr6Pori0OXtcoIIbOl31Xx4WKbd4vQPtW3Vqdawp0zcm6cL6a4yi1rIHcJLrSVpYjFopHUun9cID\n\tQSioYReAGTFL1MxPzlmYIcI411T0lvwl+N855BY9fPbqoMj7DFR2bJjPq6Wf+U84DWS4JsAK/FGn4\n\tgaC9CXgiMQQF1oRanhJ54ik4eIubDVhlZ4zHYtjDukIalA6VUaoJXup6oaDzc11+d8JCo1oRi2PXt\n\tUmYy63EuyWqqgyN30k50JJbiiq4ocP0uaDmf0EtbNiaR7PwHly/EUvxCddrivyMs/uQ0xeBrCz/Q2\n\t/U30bmbw==;","v=1; a=rsa-sha256; c=relaxed/relaxed; d=hotmail.com;\n s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=kTTvM4pNNp/FVINMQDki/2ds+R8K6qmLsHyNhgZ9ooE=;\n b=cS2IanOoNrHDB2i1wOFArzmEgQBNhx5C11GYDJ2MzZZAo9VxhlnwGh7qb8qjoiYEiKKpTyYq8TsiLdoXCj4fboL6U57MCDkKGt3ugA4PXD8zNfUwxBx6UtzTtfqwhV2fEvSvaNh+wdrZ9drQEAbO6tBX10ZfElXrVvR9ELy7nxsf2c+sNztWohEK5y0IBuzzaOYrzsrtvaSYygsGEg6yb6M/8KceJSffnsfHIVPP/6zMoKMCsOPW0CfkI8wPLk462H7rup0bC2jhm7sLvEOs67CvcJVBROHGVXN3c0pX6bntEnicvcxIw9FNoKORXCSqOCW8v8LO3Q1L3QMAPj8BIw=="],"ARC-Seal":"i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=yBm3tka+luAzH1tky6f4c3S8b3+09Dyjz9B6dMC9qY7N7NePbm9XmyrTnsM8ydrVWe7YiTh63/KHmaoBl5Kd3vZH7fWvwChA1Ey717suWxuFgIZZW5YfzLchhoXXXClpeA9Nbd8MUetQAAJvllmsfxQZebdRQEJYLxOwEDWyHXg1gx50341jcP3riW8T0m+MLD/HpahyYsdj4bZ94g39xu3pcv6ab4DEJRzfGmPj73mjqDLHAfMQZbNOXoUNNlCOsbpAusGXPgL87TKiWKWPb/ZGxJ9tq4HW3zfjSSXmN55SIIl+lj6m1qFHMCl747Jqm4wXxQpdGxH7FchLvK2oug==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=kTTvM4pNNp/FVINMQDki/2ds+R8K6qmLsHyNhgZ9ooE=;\n b=q0YSSY/rVFPhUwGMSYXtKNkPlDVGQpNyOhsHaXybMPuefUSBYMWr87BSFx+tXEGY+at08npAp9zKcATETDbuQJRNGt+XsCnB6o3MFHcfne6PYjMVETqzCrANERDzvoXovXKS3cYfFJXtOJhJ3X/ujOofopahYhjENgK54gCUn5LKNddAUuKQnGyXuWiZgqCTYNdKHpTuRmkkbKFUYg3e+uiJl4LRKoRidNAfS7aTrzVw/afmtv/ofLQ1C7ohLHyGfPhGqCaR7QRdn2uwHric3PL8KFtTFVuyA8N2Zwp9DF9ynCZ4LKMYDshmVzPggVZGdK88SPNiF699L7jg2EzENA==","ARC-Authentication-Results":"i=1; mx.microsoft.com 1; spf=none; dmarc=none;\n dkim=none; arc=none","Message-ID":"\n <SE3PR04MB8922199111036C3396AB7BEFF3202@SE3PR04MB8922.apcprd04.prod.outlook.com>","Date":"Fri, 17 Apr 2026 14:40:13 +0800","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH] RISC-V: KVM: Fix invalid HVA warning in steal-time\n recording","To":"Jiakai Xu <xujiakai2025@iscas.ac.cn>, kvm-riscv@lists.infradead.org,\n kvm@vger.kernel.org, linux-kernel@vger.kernel.org,\n linux-riscv@lists.infradead.org","Cc":"Albert Ou <aou@eecs.berkeley.edu>, Alexandre Ghiti <alex@ghiti.fr>,\n Andrew Jones <ajones@ventanamicro.com>, Anup Patel <anup@brainfault.org>,\n Atish Patra <atish.patra@linux.dev>, Palmer Dabbelt <palmer@dabbelt.com>,\n Paul Walmsley <pjw@kernel.org>, Jiakai Xu <jiakaiPeanut@gmail.com>","References":"<20260415075216.2757427-1-xujiakai2025@iscas.ac.cn>","Content-Language":"en-US","From":"\"Nutty.Liu\" <nutty.liu@hotmail.com>","In-Reply-To":"<20260415075216.2757427-1-xujiakai2025@iscas.ac.cn>","X-ClientProxiedBy":"SG2P153CA0020.APCP153.PROD.OUTLOOK.COM (2603:1096:4:c7::7)\n To SE3PR04MB8922.apcprd04.prod.outlook.com (2603:1096:101:2e9::7)","X-Microsoft-Original-Message-ID":"\n <ad9a743c-92a4-49b0-b537-c4d5fbebfebc@hotmail.com>","MIME-Version":"1.0","X-MS-Exchange-MessageSentRepresentingType":"1","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"SE3PR04MB8922:EE_|TYUPR04MB6691:EE_","X-MS-Office365-Filtering-Correlation-Id":"79480f79-983b-4fa9-d36c-08de9c4c32bb","X-Microsoft-Antispam":"\n BCL:0;ARA:14566002|23021999003|8060799015|41001999006|19110799012|15080799012|51005399006|6090799003|461199028|5072599009|3412199025|440099028|40105399003;","X-Microsoft-Antispam-Message-Info":"=?utf-8?q?agcNze19LAIpbtVnzv51ixfpMJlSf0S?=\n\t=?utf-8?q?TsIuu5aAsiHrAqca84DRFfa7n1TqVwpEn5mzRcV2RY+PBbSIRRkRsVLueVKb01UQo?=\n\t=?utf-8?q?yW3F3XjvtLq3oG2aP66Hckdd7zWYjs4XMZato7bCimMYdFnU/aZXToQ0FsJdmpMff?=\n\t=?utf-8?q?lcR6VCnPH0BHvTIa78t1XLI9jvhjGrg7uKrqOap4nQJ3T+1ooKi5/glUiihg2KMc2?=\n\t=?utf-8?q?3fRLlePx5rlnhSmtDzYROqBC7sj4taW/G3Xjntm6ctzA/6pBDOwTv5L7I0jItey4A?=\n\t=?utf-8?q?8W+UQIJcTkW2MFwNcRgjKeuNLqUbZAoABALPPhkTqeiyhe1CH7bu36K1QWlOJSRzU?=\n\t=?utf-8?q?qM7IUyeeNRknjzS8zPbWJYAccyITlpSVDTzSqe92KT84Ff3EkTmkSipmcbgAuTnnM?=\n\t=?utf-8?q?rYHTpC+e/Jp4WcMiYQy76tD8UMU1gqdeXIf1ugvx8kfaE5dd9evxDxKe6n5iIZqkQ?=\n\t=?utf-8?q?IK3xB5ejVKGViwIql0zNWL68cv7fhViyZoB2eaNNkyhioLUj8u+7XSf/aEWa6AExb?=\n\t=?utf-8?q?UAry5rpipob441PR3L6e3vFURtmf1AVziVGh7ef7gJ0J1oz0wWUnbC+nue4Zq0430?=\n\t=?utf-8?q?lNQAlT5rrQeImXE2oD2UwncEO7LLsn8+SXLSqRhtdMeKH+aKrgZYuoL75r2Pkz0N7?=\n\t=?utf-8?q?cZxrTm4OQpXqiDpeSOHo9i0Avh+bNo9sXiMHypxmQUx4dXcBXSyoUj/4tP39mQ2UA?=\n\t=?utf-8?q?VVL/p1QYfSNxoUgdXXcBbDNJ7TiXykxkkMbcTzOsN/pyqL93XWJkbyt8Kgxgu+D1e?=\n\t=?utf-8?q?0l8DDuWhp3PRiZLiuWJZL3ggBO6UkHdp+APEieiDqfADMKYtrRp+1bKNcqH0SI2UM?=\n\t=?utf-8?q?OtF12lx37oE8iwRy8uLRAcwzBInPs/AQRv3FCBbD5qYKn/rUmhNQjj7MzFf7ugzsr?=\n\t=?utf-8?q?JTJv3rihnMIUeO4Zxv/NQeFLWKWrgwp+VZnctS42Q=3D=3D?=","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"=?utf-8?q?aLNG896xsVrUvhoi1lvoczboO0mV?=\n\t=?utf-8?q?gsrVoVh+3n2mYf822idJ0cIImzVfOtSu1p0+/VacYMmp4Ysq1QuVQIFmjuISTP8BU?=\n\t=?utf-8?q?TSfHRzkXTbOE9gGFGlF9+TAMDMfI9XS6HzAF64MvzbUB3NvGeRNPvpV/hTuW+swVl?=\n\t=?utf-8?q?SKqiRtD4kW4O0lSOylsJHoy58K6jMt9TBczZsYyk9HrgA3apC0hoEGtEfC0mkftNZ?=\n\t=?utf-8?q?tSNt/3Q8dlgAO3H35MaEmRtDahSyKqF0ddqOiCHUCL3HchuS66Sa+yoiHeoAf6QFd?=\n\t=?utf-8?q?lsWCEPlL88ZVUsHDHOfnyzhIZ2cq4aD5DxQv92pYig8hIkkBMuAs7kJbsBk3/xl2C?=\n\t=?utf-8?q?b03wvlM2+GSwqju3++rwzY3zxaHwEj3zaqL3f0EVFRFYbk2rUVOibux26mXx/8Gch?=\n\t=?utf-8?q?dnRPHKyr8/65QQJgO6dwAFxV0BpL/Rw5H68rwR4hRlwHPXl1CSoWSV0tEadE6xwzp?=\n\t=?utf-8?q?BmlqAQpokCFnGm6m0F+Dut8cxoDiry0Ddvag5PidyCpjmHh6HyzhYXc/AhIPKzFkT?=\n\t=?utf-8?q?Err0L7t02GhptoQHhUFzLdxghvIWh8ZQKblxG7aeYrz2QJZWQgfTCJKME+MdMi7uW?=\n\t=?utf-8?q?HPK6woP+JNeIjyJoXoZ79uLiDRZJe268Gy3KDAEbwvHvZ+MY8GrPmz0xG4sl54SN/?=\n\t=?utf-8?q?kcydwatAAN9GMuExZgcTTEjsljmBUutn1H2j4Xzo9fsVx1CZw8Zyoz24w8K6Rjw+z?=\n\t=?utf-8?q?dtTRgpEhy0w7ECfACy8FIs4I3fPrCT0nNIdf3P9NUE2NDpilUUB6O5/z7WIG61mZL?=\n\t=?utf-8?q?zkDzi9L6BAYciw9SJe/lTFKjVw/dYyU5Syf9PfQUBqeUi4WiihtwubKkRLcm7aLcj?=\n\t=?utf-8?q?M6ZyfbvEYuQVofRCgff+wTkxPKyZ/HFhJhx0bGyH5I5rIx1+C0UJbitGyqU1IPcYj?=\n\t=?utf-8?q?NExmtJ0EvTBYQ6DpHyII4RMFB/HBEr0fMy6mn/BuHc0MD8lA40CVnv7KTPK5al2+w?=\n\t=?utf-8?q?BtwDjgLClGqa2Ai6fKUB67TC32u3RSYL9MH+YDEwpS1pf+YViHLLpdQKc5tpmarLe?=\n\t=?utf-8?q?9kkHK0tGSxoLInMOR3hp5pjT70IHdQ9cAgk/hjUcvspLmcotKk5d+m9P3ZwTMdGF3?=\n\t=?utf-8?q?4flS4tsURV10BHdx8tWdaAuJe6R82pRwxIQUS5XdBRiasBo0HXGVrUCYohBIHWqZq?=\n\t=?utf-8?q?tgjUr7DtYC9KGU/i2IOh7x7vZ5LtKaw6pZGkhl/IdaESlhjV2n05WXwpFwKKWTy8N?=\n\t=?utf-8?q?+WNoC7+9Sr3RvKzw6Wpd9fn4ElgqWwVaOal4USMwNNpFLtaMywt6TQmmyGeFaRCe5?=\n\t=?utf-8?q?oqxmFq4e0oXkntxPgw8+q9Pk6mHSY4D+F5CQgvSw4nPP+hXGv4qLGfVyq8rd8yOUv?=\n\t=?utf-8?q?9np4CjIosUMU5eD?=","X-OriginatorOrg":"sct-15-20-9412-4-msonline-outlook-c3e7a.templateTenant","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 79480f79-983b-4fa9-d36c-08de9c4c32bb","X-MS-Exchange-CrossTenant-AuthSource":"SE3PR04MB8922.apcprd04.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Internal","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"17 Apr 2026 06:40:22.2688\n (UTC)","X-MS-Exchange-CrossTenant-FromEntityHeader":"Hosted","X-MS-Exchange-CrossTenant-Id":"84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa","X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg":"\n 00000000-0000-0000-0000-000000000000","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"TYUPR04MB6691","X-CRM114-Version":"20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ","X-CRM114-CacheID":"sfid-20260416_234034_705917_E909344C ","X-CRM114-Status":"GOOD (  20.69  )","X-Spam-Score":"-1.2 (-)","X-Spam-Report":"Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  On 4/15/2026 3:52 PM,\n Jiakai Xu wrote: > kvm_riscv_vcpu_record_steal_time()\n    assumes that the steal-time shared > memory GPA (vcpu->arch.sta.shmem) is\n    always backed by a valid guest > memory slot. How [...]\n Content analysis details:   (-1.2 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -0.0 RCVD_IN_DNSWL_NONE     RBL: Sender listed at https://www.dnswl.org/, no\n                             trust\n                             [52.103.43.81 listed in list.dnswl.org]\n -0.0 SPF_PASS               SPF: sender matches SPF record\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n  0.9 FORGED_HOTMAIL_RCVD2   hotmail.com 'From' address, but no 'Received:'\n  0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail\n provider\n                             [nutty.liu(at)hotmail.com]\n  0.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The\n                             query to Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                           [52.103.43.81 listed in\n sa-trusted.bondedsender.org]\n  0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n                              Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                             [52.103.43.81 listed in sa-accredit.habeas.com]\n  0.0 RCVD_IN_MSPIKE_H2      RBL: Average reputation (+2)\n                             [52.103.43.81 listed in wl.mailspike.net]\n  0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n                              Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                             [52.103.43.81 listed in bl.score.senderscore.com]","X-BeenThere":"kvm-riscv@lists.infradead.org","X-Mailman-Version":"2.1.34","Precedence":"list","List-Id":"<kvm-riscv.lists.infradead.org>","List-Unsubscribe":"<http://lists.infradead.org/mailman/options/kvm-riscv>,\n <mailto:kvm-riscv-request@lists.infradead.org?subject=unsubscribe>","List-Archive":"<http://lists.infradead.org/pipermail/kvm-riscv/>","List-Post":"<mailto:kvm-riscv@lists.infradead.org>","List-Help":"<mailto:kvm-riscv-request@lists.infradead.org?subject=help>","List-Subscribe":"<http://lists.infradead.org/mailman/listinfo/kvm-riscv>,\n <mailto:kvm-riscv-request@lists.infradead.org?subject=subscribe>","Content-Transfer-Encoding":"7bit","Content-Type":"text/plain; charset=\"us-ascii\"; Format=\"flowed\"","Sender":"\"kvm-riscv\" <kvm-riscv-bounces@lists.infradead.org>","Errors-To":"kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"}}]