Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp576666pxj; Thu, 17 Jun 2021 09:03:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwDDAUUZ4xw7Up9vRMofIBC0/eqC/0S+YNMjywTZ1nnFb5Y9loVv9IMNNVSQSZ3+XGv/+hv X-Received: by 2002:a17:906:3411:: with SMTP id c17mr6125138ejb.480.1623945806403; Thu, 17 Jun 2021 09:03:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623945806; cv=none; d=google.com; s=arc-20160816; b=MxphA39Nyms47KHfW7zUJdsv/BdU9kJ9sjbgIxOgqDLLiQyGjSj3l193wBFcq4da9J gK99nk6ZQalc4OxX6WzkeyExoK4LE0vuZ4xSCUWp5eIA97Ze5Bq+/STNyBqocV/qrNYw WgJO7Z7JI8qaYrFtuprcGlAvioRhMkY0R+b9ngEsCC/CrTpmUxc+F4qGmPVoLKELxkB7 y5JrYWOtmtoxYEsZ8JUlVa+LGwspz6fGrp2ZDUkLLrcW/DiW1uiFHKt36SQwhcpzGv7w I1B+jdF04Tv+z72QpuY6y7oPR/2oXUfbeTa90e69ucUr42EZqDOdd6tO3BbyIUO39ztc inXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=A6GGkkckfcDMez4sFA3yaiv2rEc7djsjPcIIrJsHge0=; b=I6vqoGfU4xW6tJqh/bP6rsDFAv/W6aQCZNEN1tgnVdA9tSQ4cjWOKPGDtxjvZRG/wc mzozoGfu5WKiuBxN4ys58dYf+Y4dI2zLATSarkott/rBAcmKsA9vcYCTdnJzHNOsd/mo aJLxmz04LQFaXPdy1RQKO0Vd2XnTS6EJopb/IQzs+6JuniIaK5tX05VLXI6x36ve4RQ3 jh97yaHLXpq2yv+FjDpe50Q5VlVzuXz0WS5wY2nZR5v1JwicyAP5FcJGHhbu4QxoFNQA 5a0y44svbumdp5s6zj+TPVFHcTSTatl8qnWTJGYzM4YRLksAz8ZMvZphhHwQn6gQGsBX TgEQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u15si5744199eju.32.2021.06.17.09.03.02; Thu, 17 Jun 2021 09:03:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232645AbhFQMPf (ORCPT + 99 others); Thu, 17 Jun 2021 08:15:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:36972 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232382AbhFQMPf (ORCPT ); Thu, 17 Jun 2021 08:15:35 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C580D610EA; Thu, 17 Jun 2021 12:13:24 +0000 (UTC) Date: Thu, 17 Jun 2021 13:13:22 +0100 From: Catalin Marinas To: Steven Price Cc: Marc Zyngier , Will Deacon , James Morse , Julien Thierry , Suzuki K Poulose , kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Dave Martin , Mark Rutland , Thomas Gleixner , qemu-devel@nongnu.org, Juan Quintela , "Dr. David Alan Gilbert" , Richard Henderson , Peter Maydell , Haibo Xu , Andrew Jones Subject: Re: [PATCH v15 0/7] MTE support for KVM guest Message-ID: <20210617121322.GC6314@arm.com> References: <20210614090525.4338-1-steven.price@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210614090525.4338-1-steven.price@arm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 14, 2021 at 10:05:18AM +0100, Steven Price wrote: > I realise there are still open questions[1] around the performance of > this series (the 'big lock', tag_sync_lock, introduced in the first > patch). But there should be no impact on non-MTE workloads and until we > get real MTE-enabled hardware it's hard to know whether there is a need > for something more sophisticated or not. Peter Collingbourne's patch[3] > to clear the tags at page allocation time should hide more of the impact > for non-VM cases. So the remaining concern is around VM startup which > could be effectively serialised through the lock. [...] > [1]: https://lore.kernel.org/r/874ke7z3ng.wl-maz%40kernel.org Start-up, VM resume, migration could be affected by this lock, basically any time you fault a page into the guest. As you said, for now it should be fine as long as the hardware doesn't support MTE or qemu doesn't enable MTE in guests. But the problem won't go away. We have a partial solution with an array of locks to mitigate against this but there's still the question of whether we should actually bother for something that's unlikely to happen in practice: MAP_SHARED memory in guests (ignoring the stage 1 case for now). If MAP_SHARED in guests is not a realistic use-case, we have the vma in user_mem_abort() and if the VM_SHARED flag is set together with MTE enabled for guests, we can reject the mapping. We can discuss the stage 1 case separately from this series. -- Catalin