summaryrefslogtreecommitdiffstats
path: root/arch/arm64/kvm
diff options
context:
space:
mode:
authorPeter Collingbourne <pcc@google.com>2022-11-03 18:10:40 -0700
committerMarc Zyngier <maz@kernel.org>2022-11-29 09:26:07 +0000
commitc911f0d4687947915f04024aa01803247fcf7f1a (patch)
tree885642137cf684a9563263f0c88a475e553f6f30 /arch/arm64/kvm
parentd89585fbb30869011b326ef26c94c3137d228df9 (diff)
downloadlinux-stable-c911f0d4687947915f04024aa01803247fcf7f1a.tar.gz
linux-stable-c911f0d4687947915f04024aa01803247fcf7f1a.tar.bz2
linux-stable-c911f0d4687947915f04024aa01803247fcf7f1a.zip
KVM: arm64: permit all VM_MTE_ALLOWED mappings with MTE enabled
Certain VMMs such as crosvm have features (e.g. sandboxing) that depend on being able to map guest memory as MAP_SHARED. The current restriction on sharing MAP_SHARED pages with the guest is preventing the use of those features with MTE. Now that the races between tasks concurrently clearing tags on the same page have been fixed, remove this restriction. Note that this is a relaxation of the ABI. Signed-off-by: Peter Collingbourne <pcc@google.com> Reviewed-by: Catalin Marinas <catalin.marinas@arm.com> Reviewed-by: Steven Price <steven.price@arm.com> Reviewed-by: Cornelia Huck <cohuck@redhat.com> Signed-off-by: Marc Zyngier <maz@kernel.org> Link: https://lore.kernel.org/r/20221104011041.290951-8-pcc@google.com
Diffstat (limited to 'arch/arm64/kvm')
-rw-r--r--arch/arm64/kvm/mmu.c8
1 files changed, 0 insertions, 8 deletions
diff --git a/arch/arm64/kvm/mmu.c b/arch/arm64/kvm/mmu.c
index 9ff9a271cf01..b9402d8b5a90 100644
--- a/arch/arm64/kvm/mmu.c
+++ b/arch/arm64/kvm/mmu.c
@@ -1110,14 +1110,6 @@ static void sanitise_mte_tags(struct kvm *kvm, kvm_pfn_t pfn,
static bool kvm_vma_mte_allowed(struct vm_area_struct *vma)
{
- /*
- * VM_SHARED mappings are not allowed with MTE to avoid races
- * when updating the PG_mte_tagged page flag, see
- * sanitise_mte_tags for more details.
- */
- if (vma->vm_flags & VM_SHARED)
- return false;
-
return vma->vm_flags & VM_MTE_ALLOWED;
}