From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4206FC43219 for ; Thu, 24 Nov 2022 10:39:17 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 717776B0071; Thu, 24 Nov 2022 05:39:16 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 6C72E6B0072; Thu, 24 Nov 2022 05:39:16 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 58F9C6B0074; Thu, 24 Nov 2022 05:39:16 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 4B5246B0071 for ; Thu, 24 Nov 2022 05:39:16 -0500 (EST) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 13B411A062B for ; Thu, 24 Nov 2022 10:39:16 +0000 (UTC) X-FDA: 80167988712.15.9C0F96E Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf18.hostedemail.com (Postfix) with ESMTP id 5DC0A1C000B for ; Thu, 24 Nov 2022 10:39:15 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id A1FF6B826C8; Thu, 24 Nov 2022 10:39:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 531F3C433C1; Thu, 24 Nov 2022 10:39:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1669286352; bh=L1+jBgistF0AFANuNIFVPs/iK+/oLopvwHGSP0X0ATQ=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=jJqBTlJKSqMBMarfbumGPWbm5RAFoYbgOYpXbaMrbhhXCfvbmCoXnGpivtFpeZwjJ paJN86JEL53PgITILBqempYlp77s6xcao2H+IgVbvWt8ynBxXve0WO7WJMZZbw3vXu jZhcf7BQZVV/jhynfB8n6TA/FYb/aoAXWKWQXhN+NnC3RstRmFaPoOlP/FHKnZ9TC6 eCaHxLU5TN2axuBcwQYGwOXLu9dgPEzKppV9yuSpUEt4C1NVjCFwB0HXSwwpGM3KfD PCOcTdolEMfynHrQm5VDM8dT8IyfdgUvN/5vK5sAT1k5m/FAgEs5k4N9qsKRcFzMBl OEHk3OuPNs6Jg== Received: from sofa.misterjones.org ([185.219.108.64] helo=goblin-girl.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1oy9dO-008LQm-31; Thu, 24 Nov 2022 10:39:10 +0000 Date: Thu, 24 Nov 2022 10:39:09 +0000 Message-ID: <86a64gocvm.wl-maz@kernel.org> From: Marc Zyngier To: Peter Collingbourne , linux-mm , Andrew Morton Cc: linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, Cornelia Huck , Catalin Marinas , Will Deacon , Evgenii Stepanov , kvm@vger.kernel.org, Steven Price , Vincenzo Frascino Subject: Re: [PATCH v5 0/8] KVM: arm64: permit MAP_SHARED mappings with MTE enabled In-Reply-To: References: <20221104011041.290951-1-pcc@google.com> <86a656r8nh.wl-maz@kernel.org> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pcc@google.com, linux-mm@kvack.org, akpm@linux-foundation.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, cohuck@redhat.com, catalin.marinas@arm.com, will@kernel.org, eugenis@google.com, kvm@vger.kernel.org, steven.price@arm.com, vincenzo.frascino@arm.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1669286355; a=rsa-sha256; cv=none; b=kEnGoHhMo67GJeGAMXWuBhieDka9HHV7ri8xVr30nOiP+Nq1aqVLjdxS/0ab8zri4yggy+ pxvGFmhIW7hds3nSUJr1G+++Qu1bBYwPlVS6lNULUXJwSCEBmcTW7x0iDeOUfy6L9K9daj /GZG34fBQxvg2fX4AlIZObP8uIC41rQ= ARC-Authentication-Results: i=1; imf18.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=jJqBTlJK; spf=pass (imf18.hostedemail.com: domain of maz@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=maz@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1669286355; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=bKmmeD8HrBrEMT/ctPXxf0fZyaXM7pF7hjEyJUOCPp0=; b=Ce7t3h6qlnY/ez+EVgwEF8W6SP+/KTGdmC5h9UEoRaCq9wdCtbWRCjF1plWm3CLz+XaASu eIAQsIk0dNMS2AbS9kNBGe27JiTOWkhFTsdbiFID+SOFu9LNnIgnF9gxCQn9JDZvgIMIO1 JyOVr5vvH5ydv/l45vGbU3+WDtKzp2A= X-Stat-Signature: 6x3cgyj19t9y45h66t1jstmtxwomweea X-Rspamd-Queue-Id: 5DC0A1C000B X-Rspam-User: Authentication-Results: imf18.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=jJqBTlJK; spf=pass (imf18.hostedemail.com: domain of maz@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=maz@kernel.org; dmarc=pass (policy=none) header.from=kernel.org X-Rspamd-Server: rspam10 X-HE-Tag: 1669286355-155836 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Fri, 04 Nov 2022 17:42:27 +0000, Peter Collingbourne wrote: > > On Fri, Nov 4, 2022 at 9:23 AM Marc Zyngier wrote: > > > > On Fri, 04 Nov 2022 01:10:33 +0000, > > Peter Collingbourne wrote: > > > > > > Hi, > > > > > > This patch series allows VMMs to use shared mappings in MTE enabled > > > guests. The first five patches were taken from Catalin's tree [1] which > > > addressed some review feedback from when they were previously sent out > > > as v3 of this series. The first patch from Catalin's tree makes room > > > for an additional PG_arch_3 flag by making the newer PG_arch_* flags > > > arch-dependent. The next four patches are based on a series that > > > Catalin sent out prior to v3, whose cover letter [2] I quote from below: > > > > > > > This series aims to fix the races between initialising the tags on a > > > > page and setting the PG_mte_tagged flag. Currently the flag is set > > > > either before or after that tag initialisation and this can lead to CoW > > > > copying stale tags. The first patch moves the flag setting after the > > > > tags have been initialised, solving the CoW issue. However, concurrent > > > > mprotect() on a shared mapping may (very rarely) lead to valid tags > > > > being zeroed. > > > > > > > > The second skips the sanitise_mte_tags() call in kvm_set_spte_gfn(), > > > > deferring it to user_mem_abort(). The outcome is that no > > > > sanitise_mte_tags() can be simplified to skip the pfn_to_online_page() > > > > check and only rely on VM_MTE_ALLOWED vma flag that can be checked in > > > > user_mem_abort(). > > > > > > > > The third and fourth patches use PG_arch_3 as a lock for page tagging, > > > > based on Peter Collingbourne's idea of a two-bit lock. > > > > > > > > I think the first patch can be queued but the rest needs some in depth > > > > review and test. With this series (if correct) we could allos MAP_SHARED > > > > on KVM guest memory but this is to be discussed separately as there are > > > > some KVM ABI implications. > > > > > > In this v5 I rebased Catalin's tree onto -next again. Please double check > > > > Please don't do use -next as a base. In-flight series should be based > > on a *stable* tag, either 6.0 or one of the early -RCs. If there is a > > known conflict with -next, do mention it in the cover letter and > > provide a resolution. > > Okay, I will keep that in mind. > > > > my rebase, which resolved the conflict with commit a8e5e5146ad0 ("arm64: > > > mte: Avoid setting PG_mte_tagged if no tags cleared or restored"). > > > > This commit seems part of -rc1, so I guess the patches directly apply > > on top of that tag? > > Yes, sorry, this also applies cleanly to -rc1. > > > > I now have Reviewed-by for all patches except for the last one, which adds > > > the documentation. Thanks for the reviews so far, and please take a look! > > > > I'd really like the MM folks (list now cc'd) to look at the relevant > > patches (1 and 5) and ack them before I take this. > > Okay, here are the lore links for the convenience of the MM folks: > https://lore.kernel.org/all/20221104011041.290951-2-pcc@google.com/ > https://lore.kernel.org/all/20221104011041.290951-6-pcc@google.com/ I have not seen any Ack from the MM folks so far, and we're really running out of runway for this merge window. Short of someone shouting now, I'll take the series into the kvmarm tree early next week. Thanks, -- Without deviation from the norm, progress is not possible.