From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 113D6C4321E for ; Tue, 29 Nov 2022 14:21:57 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 83A916B0072; Tue, 29 Nov 2022 09:21:56 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 7EA676B0074; Tue, 29 Nov 2022 09:21:56 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 6D9A06B0075; Tue, 29 Nov 2022 09:21:56 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 5F9FD6B0072 for ; Tue, 29 Nov 2022 09:21:56 -0500 (EST) Received: from smtpin01.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 635071A043B for ; Tue, 29 Nov 2022 09:34:00 +0000 (UTC) X-FDA: 80185968240.01.153A310 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf19.hostedemail.com (Postfix) with ESMTP id 0B83B1A000E for ; Tue, 29 Nov 2022 09:33:59 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 7D2DE615F9; Tue, 29 Nov 2022 09:33:57 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D7284C433B5; Tue, 29 Nov 2022 09:33:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1669714436; bh=ytWdPWoB0JLE0rRUZJi+OM1M3Tzfp92cT1vL1sIg8v8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Y6JH88oo4vC9v6ACmJS+9+NyoNhLVThp44OSn2zWEDbHiPU3tjy1NGI88c8Dik4+s e4LJ+fJz5twYy0FB0LwIDXO6T8xb5xDJHIBMcReDOSfTVwWYO8kc4czV9/2MH8MF4c 8d3gi8ruxhHrgakpzA2JlUCDxGOTd7c9IO1DBJri9COdFMeTLh1Z+8+LmPFprlZxcR NR2+RynL7ufl+FiGNkikBmb1GYoqydCm/hfbe2kct7f+fk8e4xOf6W/xqlBTo8mbrx HYqaCIxCDd3Rv+6ltHolWJc9bOv09NJa9IP3Wo/Fw86SBdIRXkeILgagnYbAJOZqec mi7n0Ux4LNybg== Received: from sofa.misterjones.org ([185.219.108.64] helo=valley-girl.lan) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1ozwzy-009Jpu-AB; Tue, 29 Nov 2022 09:33:54 +0000 From: Marc Zyngier To: Peter Collingbourne , kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-mm Cc: Steven Price , Catalin Marinas , Evgenii Stepanov , Cornelia Huck , kvm@vger.kernel.org, Vincenzo Frascino , Will Deacon Subject: Re: [PATCH v5 0/8] KVM: arm64: permit MAP_SHARED mappings with MTE enabled Date: Tue, 29 Nov 2022 09:33:51 +0000 Message-Id: <166971432264.1905185.15808052624158484529.b4-ty@kernel.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20221104011041.290951-1-pcc@google.com> References: <20221104011041.290951-1-pcc@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pcc@google.com, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, steven.price@arm.com, catalin.marinas@arm.com, eugenis@google.com, cohuck@redhat.com, kvm@vger.kernel.org, vincenzo.frascino@arm.com, will@kernel.org X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false ARC-Authentication-Results: i=1; imf19.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=Y6JH88oo; spf=pass (imf19.hostedemail.com: domain of maz@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=maz@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1669714440; a=rsa-sha256; cv=none; b=yIL5bfrkiVI3Y6LOzwhGvr0fE7oDT4FVlSmbbNKLUSmwZ8DtB9h29jHRmKUOaGoeX9RT6D 4OkhA1pLgMcDiuD6Q5KxbDj3/4BAoBYoLw8+fl/oAfk9WnpmJrVFsJOoAWQSgiWp/nad3x CvaNQLWahL11C/vCHdzQvBeEI1jtGJM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1669714440; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=tGdxdNzU4mKNZaGKjCP/4YYdk5z1oEzrlwh5zJ9vwQM=; b=rK38juf65bySf3/pdKvlg0RZrDuLdYv/ScNLG8sp3ogKkTjUiB2GBn/PmZhJEyMfeE7d5g LtfEfEi5dF9iCEY5yk7zEVtIZYynYof2+XXPsuMdumB9hn7I6oIppOItyw1lv7AG9RwDgV W2PwYTnuNPihQKch2p+vU+sOB78BIOo= X-Rspam-User: X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 0B83B1A000E Authentication-Results: imf19.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=Y6JH88oo; spf=pass (imf19.hostedemail.com: domain of maz@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=maz@kernel.org; dmarc=pass (policy=none) header.from=kernel.org X-Stat-Signature: whde16mrekhh7bqor7udpnoo76j395ca X-HE-Tag: 1669714439-364199 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Thu, 3 Nov 2022 18:10:33 -0700, Peter Collingbourne wrote: > This patch series allows VMMs to use shared mappings in MTE enabled > guests. The first five patches were taken from Catalin's tree [1] which > addressed some review feedback from when they were previously sent out > as v3 of this series. The first patch from Catalin's tree makes room > for an additional PG_arch_3 flag by making the newer PG_arch_* flags > arch-dependent. The next four patches are based on a series that > Catalin sent out prior to v3, whose cover letter [2] I quote from below: > > [...] No feedback has been received, so this code is obviously perfect. Applied to next, thanks! [1/8] mm: Do not enable PG_arch_2 for all 64-bit architectures commit: b0284cd29a957e62d60c2886fd663be93c56f9c0 [2/8] arm64: mte: Fix/clarify the PG_mte_tagged semantics commit: e059853d14ca4ed0f6a190d7109487918a22a976 [3/8] KVM: arm64: Simplify the sanitise_mte_tags() logic commit: 2dbf12ae132cc78048615cfa19c9be64baaf0ced [4/8] mm: Add PG_arch_3 page flag commit: ef6458b1b6ca3fdb991ce4182e981a88d4c58c0f [5/8] arm64: mte: Lock a page for MTE tag initialisation commit: d77e59a8fccde7fb5dd8c57594ed147b4291c970 [6/8] KVM: arm64: unify the tests for VMAs in memslots when MTE is enabled commit: d89585fbb30869011b326ef26c94c3137d228df9 [7/8] KVM: arm64: permit all VM_MTE_ALLOWED mappings with MTE enabled commit: c911f0d4687947915f04024aa01803247fcf7f1a [8/8] Documentation: document the ABI changes for KVM_CAP_ARM_MTE commit: a4baf8d2639f24d4d31983ff67c01878e7a5393f Cheers, M. -- Without deviation from the norm, progress is not possible.