Message ID | 20230823131350.114942-37-alexandru.elisei@arm.com (mailing list archive) |
---|---|
State | New |
Headers | show
Return-Path: <owner-linux-mm@kvack.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4474EEE49A3 for <linux-mm@archiver.kernel.org>; Wed, 23 Aug 2023 13:18:05 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id CF0AF280075; Wed, 23 Aug 2023 09:18:04 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id CA02628005D; Wed, 23 Aug 2023 09:18:04 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B8F2A280075; Wed, 23 Aug 2023 09:18:04 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id AA89128005D for <linux-mm@kvack.org>; Wed, 23 Aug 2023 09:18:04 -0400 (EDT) Received: from smtpin26.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 82E1412011A for <linux-mm@kvack.org>; Wed, 23 Aug 2023 13:18:04 +0000 (UTC) X-FDA: 81155422488.26.E57CC68 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by imf15.hostedemail.com (Postfix) with ESMTP id DBFB9A002A for <linux-mm@kvack.org>; Wed, 23 Aug 2023 13:18:02 +0000 (UTC) Authentication-Results: imf15.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=arm.com; spf=pass (imf15.hostedemail.com: domain of alexandru.elisei@arm.com designates 217.140.110.172 as permitted sender) smtp.mailfrom=alexandru.elisei@arm.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1692796682; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=9AOAnFETym/czjm3ze8Okub0g9qDJ3BTMU9kvePKXwE=; b=8iN9sfIcmj4e4ef1MhiEhe5jPIvlxfj8J+4QJUTB8kC6GDdzzmazq283a6fQVnYtON6x77 97OfCTfiJRa1p9Cqk8/78h0kCcb8boKWR+Ry5wfcPsmb6Si4/RxTIDkgmUtWiF+kIL4AhF ko/y6ia0hmDog10Ja8YQ8py31bs8eMM= ARC-Authentication-Results: i=1; imf15.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=arm.com; spf=pass (imf15.hostedemail.com: domain of alexandru.elisei@arm.com designates 217.140.110.172 as permitted sender) smtp.mailfrom=alexandru.elisei@arm.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1692796683; a=rsa-sha256; cv=none; b=EThdXEk38RvW6xt+ozrf3OiewlrVDnZRMAEg93hjv446gHL7iRBK16pvxLYC/R6nGrX8xQ YmWNyt/4c7g+R8lxOJJzdBZAL5vMQNCTjlxaOeW8vTitaOBgealb/2iSIM6UlgVMKPKjRg sXLh9ahwarKgLI7Gp0doTd58n9xjeHU= Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B64F11688; Wed, 23 Aug 2023 06:18:42 -0700 (PDT) Received: from e121798.cable.virginm.net (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 58BFD3F740; Wed, 23 Aug 2023 06:17:56 -0700 (PDT) From: Alexandru Elisei <alexandru.elisei@arm.com> To: catalin.marinas@arm.com, will@kernel.org, oliver.upton@linux.dev, maz@kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, yuzenghui@huawei.com, arnd@arndb.de, akpm@linux-foundation.org, mingo@redhat.com, peterz@infradead.org, juri.lelli@redhat.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, rostedt@goodmis.org, bsegall@google.com, mgorman@suse.de, bristot@redhat.com, vschneid@redhat.com, mhiramat@kernel.org, rppt@kernel.org, hughd@google.com Cc: pcc@google.com, steven.price@arm.com, anshuman.khandual@arm.com, vincenzo.frascino@arm.com, david@redhat.com, eugenis@google.com, kcc@google.com, hyesoo.yu@samsung.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org Subject: [PATCH RFC 36/37] KVM: arm64: Disable MTE is tag storage is enabled Date: Wed, 23 Aug 2023 14:13:49 +0100 Message-Id: <20230823131350.114942-37-alexandru.elisei@arm.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230823131350.114942-1-alexandru.elisei@arm.com> References: <20230823131350.114942-1-alexandru.elisei@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Rspamd-Server: rspam09 X-Rspamd-Queue-Id: DBFB9A002A X-Stat-Signature: atrxiwquot531nynew8oa456g58bzoa8 X-Rspam-User: X-HE-Tag: 1692796682-581480 X-HE-Meta: U2FsdGVkX18Mr5qUn0wRiy9u5ct8SpMHr+TvAPTgBNrBtr2KRQDZ+jYO4MZuOAvVRys8P2Jb05022tLTy5jX2xpng53r+wDOM5/RFa5fl3UxPfhA4xu8dBk5s/6IzgN8MUaUkd4bp4BNyiZM7s2j1XK876bXD6+e2q4SGDc+CiZ0v/fZlMpn5394sc62/pqv4NdU2nUuaJWxIyLbhAU7IX6l3RFh6v2lDPf8c5x9fNqIHNk7PLUdrnKznOzA70j13FBTclAdJ2/iTILP7ej/4Ou+4VsK2FX+HmnYqF1GRtbDT5uBJ8FFHF41pgGwwODZ2bmUFk4DDciR4tWvhgBokoEHDZk+jMOQEknxacWW7HjAv32PT1+kjjoeFOnUuCXu4pg7zN5oZzlOS1A4S/rQAsDNBNvcusKzlFXMM9L8B/DgztJseOH6qlDBIZbJn/5Z/EEEaHGEao1qNOFveIgzNUIO/JgNSO7zXtZVekc9KGZJ96/gYO0tCoY7neXYslzqSxDZVVJuqVqK1ETvsSXI5MkoRhTbKtPAvfjmDsi6wOCMQBqADrcmc44yEywQGNKMpXvWKmk2cy2pUU643x9nFyuGFixnGkfMGg1EJKiWvWU1l8600q4fPS6G4PjIhhaLNKkqoSDDCFtE8aDhmHG32iHdjqGR4EgaoKTkh0roIuXWgD5ZwVLsRpZp4y/Dlm2V7u2my5MOeHSfoADipc+txBPEWmsREuugZhDvW/UGjAa7CBIJwo3Vr9U5tmGyaenPLm8e7TG2/dm0g7WEWASWSIENw9myqz20R8YmvpLOsoVrBiyaZi10TkOM+IBV4O+t0q7um2XFE5kfQdE2ECDrFlk9HRMusQXkbHWvVjej6l/O6iHYLgVJiALd+s/8xQbRggVQsI05EoPXlX3cm+qkfi6A43xxks36fkBV8v3uDViTunZ+YeKV5ib3uVC0qNYzljm7RQiaSc82BWNLegp M1qQVG91 uZeVQyH+3IEkyaHvQAEiVBfTlDfcbS7ah9Ktt82qXbJJJHAvt/cM00WGii4UgZ0H+5w41wJ3GfZsD/FCzqJELqNwwfvUCscdSsSzrxiT2pVsfGJTQi/WvpA9lQDNRGgM2MTDEUB2MWplaS35E/F36PQvIOrIcGosRPh/xutPe9fjI4hnsfCKf2Yuf+/uuAEv/oICl X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: <linux-mm.kvack.org> |
Series |
[RFC,01/37] mm: page_alloc: Rename gfp_to_alloc_flags_cma -> gfp_to_alloc_flags_fast
|
expand
|
diff --git a/arch/arm64/kvm/arm.c b/arch/arm64/kvm/arm.c index 72dc53a75d1c..1f39c2d5223d 100644 --- a/arch/arm64/kvm/arm.c +++ b/arch/arm64/kvm/arm.c @@ -38,6 +38,7 @@ #include <asm/kvm_mmu.h> #include <asm/kvm_pkvm.h> #include <asm/kvm_emulate.h> +#include <asm/memory_metadata.h> #include <asm/sections.h> #include <kvm/arm_hypercalls.h> @@ -85,7 +86,8 @@ int kvm_vm_ioctl_enable_cap(struct kvm *kvm, break; case KVM_CAP_ARM_MTE: mutex_lock(&kvm->lock); - if (!system_supports_mte() || kvm->created_vcpus) { + if (!system_supports_mte() || metadata_storage_enabled() || + kvm->created_vcpus) { r = -EINVAL; } else { r = 0; @@ -277,7 +279,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) r = 1; break; case KVM_CAP_ARM_MTE: - r = system_supports_mte(); + r = system_supports_mte() && !metadata_storage_enabled(); break; case KVM_CAP_STEAL_TIME: r = kvm_arm_pvtime_supported();
KVM allows MTE enabled VMs to be created when the backing memory is does not have MTE enabled. Without changes to how KVM allocates memory for a VM, it is impossible to discern when the corresponding tag storage needs to be reserved. For now, disable MTE in KVM if tag storage is enabled. Signed-off-by: Alexandru Elisei <alexandru.elisei@arm.com> --- arch/arm64/kvm/arm.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)