From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pa0-f50.google.com (mail-pa0-f50.google.com [209.85.220.50]) by kanga.kvack.org (Postfix) with ESMTP id E576C6B0253 for ; Mon, 7 Mar 2016 16:38:55 -0500 (EST) Received: by mail-pa0-f50.google.com with SMTP id tt10so23328728pab.3 for ; Mon, 07 Mar 2016 13:38:55 -0800 (PST) Received: from shards.monkeyblade.net (shards.monkeyblade.net. [2001:4f8:3:36:211:85ff:fe63:a549]) by mx.google.com with ESMTP id g24si8261908pfj.91.2016.03.07.13.38.55 for ; Mon, 07 Mar 2016 13:38:55 -0800 (PST) Date: Mon, 07 Mar 2016 16:38:50 -0500 (EST) Message-Id: <20160307.163850.1494834587897617780.davem@davemloft.net> Subject: Re: [PATCH v2] sparc64: Add support for Application Data Integrity (ADI) From: David Miller In-Reply-To: <56DDF3C4.7070701@oracle.com> References: <56DDC776.3040003@oracle.com> <20160307.141600.1873883635480850431.davem@davemloft.net> <56DDF3C4.7070701@oracle.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: khalid.aziz@oracle.com Cc: rob.gardner@oracle.com, corbet@lwn.net, akpm@linux-foundation.org, dingel@linux.vnet.ibm.com, bob.picco@oracle.com, kirill.shutemov@linux.intel.com, aneesh.kumar@linux.vnet.ibm.com, aarcange@redhat.com, arnd@arndb.de, sparclinux@vger.kernel.org, mhocko@suse.cz, chris.hyser@oracle.com, richard@nod.at, vbabka@suse.cz, koct9i@gmail.com, oleg@redhat.com, gthelen@google.com, jack@suse.cz, xiexiuqi@huawei.com, Vineet.Gupta1@synopsys.com, luto@kernel.org, ebiederm@xmission.com, bsegall@google.com, geert@linux-m68k.org, dave@stgolabs.net, adobriyan@gmail.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org From: Khalid Aziz Date: Mon, 7 Mar 2016 14:33:56 -0700 > On 03/07/2016 12:16 PM, David Miller wrote: >> From: Khalid Aziz >> Date: Mon, 7 Mar 2016 11:24:54 -0700 >> >>> Tags can be cleared by user by setting tag to 0. Tags are >>> automatically cleared by the hardware when the mapping for a virtual >>> address is removed from TSB (which is why swappable pages are a >>> problem), so kernel does not have to do it as part of clean up. >> >> You might be able to crib some bits for the Tag in the swp_entry_t, >> it's >> 64-bit and you can therefore steal bits from the offset field. >> >> That way you'll have the ADI tag in the page tables, ready to >> re-install >> at swapin time. >> > > That is a possibility but limited in scope. An address range covered > by a single TTE can have large number of tags. Version tags are set on > cacheline. In extreme case, one could set a tag for each set of > 64-bytes in a page. Also tags are set completely in userspace and no > transition occurs to kernel space, so kernel has no idea of what tags > have been set. I have not found a way to query the MMU on tags. > > I will think some more about it. That would mean that ADI is impossible to use for swappable memory. ... If that's true I'm extremely disappointed that they devoted so much silicon and engineering to this feature yet didn't take that one critical step to make it generally useful. :( We could have a way to do this via the kernel, wherein the user has a contract with us. Basically we have a call to pass the Tags (what granularity to use for this is a design point, pages, cache lines, etc.) into the kernel and the user agrees not to change them behind the kernel's back. In return the kernel agrees to restore the tags upon swapin. So we could support something for swappable pages, it would just be more work. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org