Received: by 2002:a05:7412:b130:b0:e2:908c:2ebd with SMTP id az48csp1758067rdb; Sun, 19 Nov 2023 09:01:58 -0800 (PST) X-Google-Smtp-Source: AGHT+IEXePMg7eixsRtrCZAWU6YctlFy47l6flaP5SsCS4g6l3FZzNu5Uh2yHgwkNhiw4Dp6bV/C X-Received: by 2002:a17:90b:4b0f:b0:280:23e1:e4dd with SMTP id lx15-20020a17090b4b0f00b0028023e1e4ddmr6846672pjb.17.1700413318101; Sun, 19 Nov 2023 09:01:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700413318; cv=none; d=google.com; s=arc-20160816; b=b77j14Y5mP5HmLmHv6pgQKUOeg+HhaWYrUpFlJ15Aykgv/3ymgOFRNzV0ywamSwzaS 0VJWp6AENvUqL1iJksiLwLQhWl0OxWNNGN26U5gOTvAAg6JfCmLA0jT0XHu6lJLRGtuf 9rZmQuT+72359y1M4Xrnrsgl1elrIj/VE18tzNGaPQlaMQWa0w8hMdT0+le5liuOIzLr 8guUNjqafR1ilgW4IaTHDTiX8rUt+KGHuxxwR5MoMPEJQCPtovETb3V79S8vFK8XkniL ge1G9mFlnfGxcSXBoJMJ/gse1s7PYgkZhYn51K90BRQIRzQAj5sMrgcQmkkiXRlKIFA1 fZ0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=Xrs2erpem8GEbese+mCyuj0HW9DxyPryK98RWAK1TAs=; fh=ON0oQ90Z4xnjbNCGsyMgiRbLR29nyOKvbeaw6TmRihk=; b=YlD6yzHWgoIKJtFMzuc2V11e+cVp/AxZbrU62xWSmHeEtPv3kuL4s9Y8r+cDnqXO4y tkgj+pqufTOz5bO+bM0fyak1EYMANAE0y7TD1rZKipzMyFFCwL9BGgX6fneGn6gEIc9h n1WJe22cwzptr/Bd+PWTHbxdisGC2WTU+UwdfKdd77rrWJwm2/EVBnZbuyOsVa40e8vU sXuBWBk3PdMi4EuNe6dI+RbpLX+QZNpNh9h3JymiguIe1ipy07pJT88ndqTDohTISNqk 7CDK5vhl00jJExGWBaljkayDVRpe5lPLU+9cx8d+Nyx9MHkMb4PqDgINshmJuUpFzr2S XSgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id z9-20020a17090a540900b0028511909e15si2918512pjh.136.2023.11.19.09.01.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 19 Nov 2023 09:01:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id A4656805CEBC; Sun, 19 Nov 2023 09:01:53 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231575AbjKSRBY (ORCPT + 99 others); Sun, 19 Nov 2023 12:01:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49814 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231822AbjKSRAu (ORCPT ); Sun, 19 Nov 2023 12:00:50 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 913AA1FCC; Sun, 19 Nov 2023 08:59:51 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 635671007; Sun, 19 Nov 2023 09:00:37 -0800 (PST) Received: from e121798.cable.virginm.net (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 36E813F6C4; Sun, 19 Nov 2023 08:59:46 -0800 (PST) From: Alexandru Elisei To: catalin.marinas@arm.com, will@kernel.org, oliver.upton@linux.dev, maz@kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, yuzenghui@huawei.com, arnd@arndb.de, akpm@linux-foundation.org, mingo@redhat.com, peterz@infradead.org, juri.lelli@redhat.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, rostedt@goodmis.org, bsegall@google.com, mgorman@suse.de, bristot@redhat.com, vschneid@redhat.com, mhiramat@kernel.org, rppt@kernel.org, hughd@google.com Cc: pcc@google.com, steven.price@arm.com, anshuman.khandual@arm.com, vincenzo.frascino@arm.com, david@redhat.com, eugenis@google.com, kcc@google.com, hyesoo.yu@samsung.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH RFC v2 25/27] KVM: arm64: Disable MTE if tag storage is enabled Date: Sun, 19 Nov 2023 16:57:19 +0000 Message-Id: <20231119165721.9849-26-alexandru.elisei@arm.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20231119165721.9849-1-alexandru.elisei@arm.com> References: <20231119165721.9849-1-alexandru.elisei@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Sun, 19 Nov 2023 09:01:53 -0800 (PST) KVM allows MTE enabled VMs to be created when the backing VMA does not have MTE enabled. Without changes to how KVM allocates memory for a VM, it is impossible at the moment to discern when the corresponding tag storage needs to be reserved. For now, disable MTE in KVM if tag storage is enabled. Signed-off-by: Alexandru Elisei --- arch/arm64/kvm/arm.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c index e5f75f1f1085..5b33c532c62a 100644 --- a/arch/arm64/kvm/arm.c +++ b/arch/arm64/kvm/arm.c @@ -29,6 +29,7 @@ #include #include #include +#include #include #include #include @@ -86,7 +87,8 @@ int kvm_vm_ioctl_enable_cap(struct kvm *kvm, break; case KVM_CAP_ARM_MTE: mutex_lock(&kvm->lock); - if (!system_supports_mte() || kvm->created_vcpus) { + if (!system_supports_mte() || tag_storage_enabled() || + kvm->created_vcpus) { r = -EINVAL; } else { r = 0; @@ -279,7 +281,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) r = 1; break; case KVM_CAP_ARM_MTE: - r = system_supports_mte(); + r = system_supports_mte() && !tag_storage_enabled(); break; case KVM_CAP_STEAL_TIME: r = kvm_arm_pvtime_supported(); -- 2.42.1