From: Gregory Price <gourry@gourry.net>
To: Jonathan Cameron <jonathan.cameron@huawei.com>
Cc: "Cheatham, Benjamin" <benjamin.cheatham@amd.com>,
linux-cxl@vger.kernel.org
Subject: Re: RFC: CXL Isolation Support
Date: Mon, 2 Feb 2026 11:50:56 -0500 [thread overview]
Message-ID: <aYDV8EwSx8pM_Fw8@gourry-fedora-PF4VCD3F> (raw)
In-Reply-To: <20260202155905.00000cb0@huawei.com>
On Mon, Feb 02, 2026 at 03:59:05PM +0000, Jonathan Cameron wrote:
> On Fri, 30 Jan 2026 16:30:51 -0500
> Gregory Price <gourry@gourry.net> wrote:
>
> > But even then, you have bigger issues for shared file-backed VMAs.
> >
> > e.g. imagine libc gets demoted and comes back poisoned: kabloooey
> >
> > But, you can at least get data from the system that the link went
> > down and even have a chance to investigate before nicely blowing up.
> >
> > Which is at least much more helpful.
>
> Let's pretend it's tagged (just for ease of thinking about it).
> So shareable that happens not be shared ever.
>
> Application specific memory isolated to one application - using
> famfs or similar.
>
> Then it's safe enough, but maybe not that useful. It's a possible
> path to get to a world in which type 3 mem an be isolated.
>
Absolutely. I agree any kind of explicit-use isolation is feasible to
implement large-scale recoverability.
But I suppose to clarify my concerns - I think isolation guarantees
require much more clarity on how involved BIOS can be.
Auto-regions online memory as nodes by default. If CXL memory is online
as a node (in the current kernel) - then isolation is broken, even in
ZONE_MOVABLE. No amount of desire for recoverability is feasible.
This obviously changes if the exposure is limited via some explicit
mechanism (FAMFS, N_MEMORY_PRIVATE, etc). But this is already true
of those paths - users of FAMFS will get SIGBUS'd instead of MCE'd on
poison, for example.
So if isolation is desired, then the default opinion should be that all
management of the CXL bus (endpoints, decoders, etc) should be deferred
to the driver and not programmed by the BIOS.
Auto-regions are basically incompatible with this feature.
(for more useless information - see: $REASONS)
~Gregory
--- $REASONS
This is partially informed by the fact that auto-regions are defined
as BIOS-programmed decoders - which the current driver auto-plugs
into the dax_kmem driver, and we're stuck with that unfortunate
backwards compatibility story for quite some time.
And the platform which use auto-regions may not adhere to expected
programming patterns due to some subtle deviations from the spec.
So tearing complexes down and reprogramming them may not even be
feasible. ( cough Zen5 :[ )
But more generally, proposing additional features for auto-regions
creates an incentive to push ever-increasingly-complex policy down
into the BIOS, which will just lead to sadness and heartache.
next prev parent reply other threads:[~2026-02-02 16:50 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-01-30 19:47 RFC: CXL Isolation Support Cheatham, Benjamin
2026-01-30 21:30 ` Gregory Price
2026-02-02 15:59 ` Jonathan Cameron
2026-02-02 16:50 ` Gregory Price [this message]
2026-02-02 17:31 ` Cheatham, Benjamin
2026-02-02 17:30 ` Cheatham, Benjamin
2026-02-02 19:52 ` Gregory Price
2026-02-02 15:52 ` Jonathan Cameron
2026-02-02 19:28 ` Vikram Sethi
2026-02-02 20:20 ` dan.j.williams
2026-02-05 20:49 ` Cheatham, Benjamin
2026-02-05 21:52 ` dan.j.williams
2026-02-05 22:54 ` Gregory Price
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aYDV8EwSx8pM_Fw8@gourry-fedora-PF4VCD3F \
--to=gourry@gourry.net \
--cc=benjamin.cheatham@amd.com \
--cc=jonathan.cameron@huawei.com \
--cc=linux-cxl@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox