Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1427746pxb; Wed, 10 Feb 2021 08:09:23 -0800 (PST) X-Google-Smtp-Source: ABdhPJxQn/UfziJhuBcX5RONtE4nAL3qKa5ErjMEJKiUWbZoJUMhnQTbASJbvb+TytLbA7n81qpx X-Received: by 2002:a17:906:f6c4:: with SMTP id jo4mr3609340ejb.67.1612973363062; Wed, 10 Feb 2021 08:09:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612973363; cv=none; d=google.com; s=arc-20160816; b=0pDITY3ra56R/+uJCchsc4J6AVB0NH8HaJoBheWY/4RpAv5o83AIRH44GKydKxKpSR /V8frhz33djVpZp9vJvxiikTHOxLrLEIjl5W5CSvckkS1A+TJJzrppVc/B8IqaJoH2fN ZckUy7bJtAB09C66GeUYHPrOiFX20/WCtqVd8PiyE87U1AZJDACxa8LGHCvSUt2jfWy7 4UjXBrsaYV8JLRWux5YP/I4k+ReRhwkjLPANYa4KYV9HK2GYeUSIWfupUh3Qv2etzwh6 eQlREKNfENN7TKZSoMXcyIno/aOnfkOUDwgBgpypDRl0odi4ezdkq7ReGSjrUijuoetQ 5Q+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=IaC1nboMM34dMZwBKDhXEZvh4CdWxlFgUcgluJXQ3hY=; b=GtkUJXPpPsY5ZRz/WFZRAJH6rY2aP+F80+E4znT5mEo0nf+hnt6J2wLkO1Pherdw3h TbdHiWYl0S1oAMdURVeFNBYN3bhNt12fuk6XMnCUKClq3I+Rch/EQzgFAvVZgYdNvK8c O32O5VIsaqXkoPLd681grTfQyE1X7bTMu+qAr9WUvemnSi693ByTvIN5RIddiTGquKW7 OL5Bqh0MWbnuigzothxw2pTWVM6zkQI/bFTzTbukEgvj3S8tw8QBdFKlhvHoLmgncIrg FmB6VUIE20GjovZaidArojEQ/sqrKLLjks2xlXZX6fcoOWkRCvt5LQBcGdpP/n8YaRWQ GAzA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w14si1693717ede.222.2021.02.10.08.08.52; Wed, 10 Feb 2021 08:09:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231596AbhBJQEb (ORCPT + 99 others); Wed, 10 Feb 2021 11:04:31 -0500 Received: from foss.arm.com ([217.140.110.172]:39946 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232086AbhBJQED (ORCPT ); Wed, 10 Feb 2021 11:04:03 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7E0BA113E; Wed, 10 Feb 2021 08:03:16 -0800 (PST) Received: from [192.168.1.179] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id EE5D83F73B; Wed, 10 Feb 2021 08:03:13 -0800 (PST) Subject: Re: [RFC PATCH v8 5/5] KVM: arm64: ioctl to fetch/store tags in a guest To: Peter Maydell Cc: Catalin Marinas , Marc Zyngier , Will Deacon , James Morse , Julien Thierry , Suzuki K Poulose , kvmarm , arm-mail-list , lkml - Kernel Mailing List , Dave Martin , Mark Rutland , Thomas Gleixner , QEMU Developers , Juan Quintela , "Dr. David Alan Gilbert" , Richard Henderson , Haibo Xu , Andrew Jones References: <20210205135803.48321-1-steven.price@arm.com> <20210205135803.48321-6-steven.price@arm.com> From: Steven Price Message-ID: <1e09d70a-1443-c7bd-2d16-f50bc3993a83@arm.com> Date: Wed, 10 Feb 2021 16:03:34 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/02/2021 17:31, Peter Maydell wrote: > On Fri, 5 Feb 2021 at 13:58, Steven Price wrote: >> >> The VMM may not wish to have it's own mapping of guest memory mapped >> with PROT_MTE because this causes problems if the VMM has tag checking >> enabled (the guest controls the tags in physical RAM and it's unlikely >> the tags are correct for the VMM). >> >> Instead add a new ioctl which allows the VMM to easily read/write the >> tags from guest memory, allowing the VMM's mapping to be non-PROT_MTE >> while the VMM can still read/write the tags for the purpose of >> migration. >> >> Signed-off-by: Steven Price >> --- >> arch/arm64/include/uapi/asm/kvm.h | 13 +++++++ >> arch/arm64/kvm/arm.c | 57 +++++++++++++++++++++++++++++++ >> include/uapi/linux/kvm.h | 1 + >> 3 files changed, 71 insertions(+) > > Missing the update to the docs in Documentation/virtual/kvm/api.txt :-) Good point - although I was secretly hoping to get some feedback on the concepts before writing the documentation! But I guess the documentation will help with the review. I'll include some in the next posting. Thanks, Steve