Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp580320pxj; Thu, 17 Jun 2021 09:07:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwD1c9gC+Za6YdfIToWqXxVuvcZGpJCx5pdr3DONcchTVmTRn7p72Uwsn0Wa2ZAzJyNEiUL X-Received: by 2002:a17:907:98ae:: with SMTP id ju14mr5989900ejc.173.1623946023181; Thu, 17 Jun 2021 09:07:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623946023; cv=none; d=google.com; s=arc-20160816; b=hiBy7wkdL9hpZ6/FbK1E+bPccfHO0CqXX2Pjr4+mSFYtgyiIC4nhfnSjKqwcvYo2Ds FgMVOR8xu03M49T166j9hVZEppwCvYMPDqBDB8YICNL6kwWpoeNRKq8Elp5gJ1kK/rxv DI0QJ4Y+xMoqcV0d+Ymdu9kfdTivNmsZKeAvbPTlphAXWlG0JvPWnYBU+pW5QK6P5tqS 6LCV8tRVxrGJeDNJZPcJRdgMVtcjh/w+Op3cbwZg+DnjOaq5vUB9BlnGbDRfXe4pnOoX /8aVu/SvMu2mwEoSiQWPCMj+Ln0mTXzrL3LcKupkoFVhA8Tp7GyLNat9Rjo7OdaOpSTk sTHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=aYUA7OzY5FYbPDeo4tK1QzEmMvgod8dLeDiRjwYN/VI=; b=JzaVDZdGx6emyIWPNH0y0WvGXcB5F+3anqRR8Ag2vsfwRRabnuLc6a2EmvP8cFV1rI U7bzYx3zNrLkl+y8E/LXJ0RvacxxJIBxY2bFMcLEsX0O4zT7QRcyftN8LrodCHekGPqS Twmo7iZoEPM1QIoN3dheSZCvXRG0qbPY54SzBZlWqrR/oKdDrlHZE4ltux31WdcbHKHJ 6x+7inS6/nqZK8c698aGft+k34vzrLswK93sDgVY0h0tqFULin5+U5rXJNDKZiGZ/hP0 +ogos36l5f7M3KyOGCiNQOsySyJvlGlor+v79v/zufL2hM701gCUP6BzXqTPvNhjLnsI kN1w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 21si6124126ejc.63.2021.06.17.09.06.37; Thu, 17 Jun 2021 09:07:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232418AbhFQN0i (ORCPT + 99 others); Thu, 17 Jun 2021 09:26:38 -0400 Received: from foss.arm.com ([217.140.110.172]:53560 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229931AbhFQN0g (ORCPT ); Thu, 17 Jun 2021 09:26:36 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0412F106F; Thu, 17 Jun 2021 06:24:29 -0700 (PDT) Received: from [192.168.1.179] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 57AE23F719; Thu, 17 Jun 2021 06:24:26 -0700 (PDT) Subject: Re: [PATCH v15 0/7] MTE support for KVM guest To: Marc Zyngier , Catalin Marinas Cc: Will Deacon , James Morse , Julien Thierry , Suzuki K Poulose , kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Dave Martin , Mark Rutland , Thomas Gleixner , qemu-devel@nongnu.org, Juan Quintela , "Dr. David Alan Gilbert" , Richard Henderson , Peter Maydell , Haibo Xu , Andrew Jones References: <20210614090525.4338-1-steven.price@arm.com> <20210617121322.GC6314@arm.com> <87im2cd443.wl-maz@kernel.org> From: Steven Price Message-ID: Date: Thu, 17 Jun 2021 14:24:25 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: <87im2cd443.wl-maz@kernel.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 17/06/2021 14:15, Marc Zyngier wrote: > On Thu, 17 Jun 2021 13:13:22 +0100, > Catalin Marinas wrote: >> >> On Mon, Jun 14, 2021 at 10:05:18AM +0100, Steven Price wrote: >>> I realise there are still open questions[1] around the performance of >>> this series (the 'big lock', tag_sync_lock, introduced in the first >>> patch). But there should be no impact on non-MTE workloads and until we >>> get real MTE-enabled hardware it's hard to know whether there is a need >>> for something more sophisticated or not. Peter Collingbourne's patch[3] >>> to clear the tags at page allocation time should hide more of the impact >>> for non-VM cases. So the remaining concern is around VM startup which >>> could be effectively serialised through the lock. >> [...] >>> [1]: https://lore.kernel.org/r/874ke7z3ng.wl-maz%40kernel.org >> >> Start-up, VM resume, migration could be affected by this lock, basically >> any time you fault a page into the guest. As you said, for now it should >> be fine as long as the hardware doesn't support MTE or qemu doesn't >> enable MTE in guests. But the problem won't go away. > > Indeed. And I find it odd to say "it's not a problem, we don't have > any HW available". By this token, why should we merge this work the > first place, or any of the MTE work that has gone into the kernel over > the past years? > >> We have a partial solution with an array of locks to mitigate against >> this but there's still the question of whether we should actually bother >> for something that's unlikely to happen in practice: MAP_SHARED memory >> in guests (ignoring the stage 1 case for now). >> >> If MAP_SHARED in guests is not a realistic use-case, we have the vma in >> user_mem_abort() and if the VM_SHARED flag is set together with MTE >> enabled for guests, we can reject the mapping. > > That's a reasonable approach. I wonder whether we could do that right > at the point where the memslot is associated with the VM, like this: > > diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c > index a36a2e3082d8..ebd3b3224386 100644 > --- a/arch/arm64/kvm/mmu.c > +++ b/arch/arm64/kvm/mmu.c > @@ -1376,6 +1376,9 @@ int kvm_arch_prepare_memory_region(struct kvm *kvm, > if (!vma) > break; > > + if (kvm_has_mte(kvm) && vma->vm_flags & VM_SHARED) > + return -EINVAL; > + > /* > * Take the intersection of this VMA with the memory region > */ > > which takes the problem out of the fault path altogether? We document > the restriction and move on. With that, we can use a non-locking > version of mte_sync_page_tags(). Does this deal with the case where the VMAs are changed after the memslot is created? While we can do the check here to give the VMM a heads-up if it gets it wrong, I think we also need it in user_mem_abort() to deal with a VMM which mmap()s over the VA of the memslot. Or am I missing something? But if everyone is happy with the restriction (just for KVM) of not allowing MTE+VM_SHARED then that sounds like a good way forward. Thanks, Steve >> We can discuss the stage 1 case separately from this series. > > Works for me. > > Thanks, > > M. >