All of lore.kernel.org
 help / color / mirror / Atom feed
From: James Bottomley <jejb@linux.ibm.com>
To: David Hildenbrand <david@redhat.com>, Michal Hocko <mhocko@suse.com>
Cc: Mike Rapoport <rppt@kernel.org>,
	Mike Rapoport <rppt@linux.ibm.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Alexander Viro <viro@zeniv.linux.org.uk>,
	Andy Lutomirski <luto@kernel.org>, Arnd Bergmann <arnd@arndb.de>,
	Borislav Petkov <bp@alien8.de>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Christopher Lameter <cl@linux.com>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	Elena Reshetova <elena.reshetova@intel.com>,
	"H. Peter Anvin" <hpa@zytor.com>, Ingo Molnar <mingo@redhat.com>,
	"Kirill A. Shutemov" <kirill@shutemov.name>,
	Matthew Wilcox <willy@infradead.org>,
	Mark Rutland <mark.rutland@arm.com>,
	Michael Kerrisk <mtk.manpages@gmail.com>,
	Palmer Dabbelt <palmer@dabbelt.com>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	Peter Zijlstra <peterz@infradead.org>,
	Rick Edgecombe <rick.p.edgecombe@intel.com>,
	Roman Gushchin <guro@fb.com>, Shakeel Butt <shakeelb@google.com>,
	Shuah Khan <shuah@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	Tycho Andersen <tycho@tycho.ws>, Will Deacon <wil l@kernel.org>,
	linux-api@vger.kernel.org, linux-arch@vger.kernel.org,
	linux-arm-kernel@lists.infradead.org,
	linux-fsdevel@vger.kernel.org, linux-mm@kvack.org,
	linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org,
	linux-nvdimm@lists.01.org, linux-riscv@lists.infradead.org,
	x86@kernel.org, Hagen Paul Pfeifer <hagen@jauu.net>,
	Palmer Dabbelt <palmerdabbelt@google.com>
Subject: Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
Date: Tue, 16 Feb 2021 08:44:04 -0800	[thread overview]
Message-ID: <000cfaa0a9a09f07c5e50e573393cda301d650c9.camel@linux.ibm.com> (raw)
In-Reply-To: <dfd7db5c-a8c7-0676-59f8-70aa6bcaabe7@redhat.com>

On Tue, 2021-02-16 at 17:34 +0100, David Hildenbrand wrote:
> On 16.02.21 17:25, James Bottomley wrote:
> > On Mon, 2021-02-15 at 20:20 +0100, Michal Hocko wrote:
> > [...]
> > > > >    What kind of flags are we talking about and why would that
> > > > > be a problem with memfd_create interface? Could you be more
> > > > > specific please?
> > > > 
> > > > You mean what were the ioctl flags in the patch series linked
> > > > above? They were SECRETMEM_EXCLUSIVE and SECRETMEM_UNCACHED in
> > > > patch 3/5.
> > > 
> > > OK I see. How many potential modes are we talking about? A few or
> > > potentially many?
> >   
> > Well I initially thought there were two (uncached or not) until you
> > came up with the migratable or non-migratable, which affects the
> > security properties.  But now there's also potential for hardware
> > backing, like mktme,  described by flags as well.  I suppose you
> > could also use RDT to restrict which cache the data goes into: say
> > L1 but not L2 on to lessen the impact of fully uncached (although
> > the big thrust of uncached was to blunt hyperthread side
> > channels).  So there is potential for quite a large expansion even
> > though I'd be willing to bet that a lot of the modes people have
> > thought about turn out not to be very effective in the field.
> 
> Thanks for the insight. I remember that even the "uncached" parts
> was effectively nacked by x86 maintainers (I might be wrong).

It wasn't liked by x86 maintainers, no.  Plus there's no
architecturally standard mechanism for making a page uncached and, as
the arm people pointed out, sometimes no way of ensuring it's never
cached.

>  For the other parts, the question is what we actually want to let
> user space configure.
> 
> Being able to specify "Very secure" "maximum secure" "average
> secure"  all doesn't really make sense to me.

Well, it doesn't to me either unless the user feels a cost/benefit, so
if max cost $100 per invocation and average cost nothing, most people
would chose average unless they had a very good reason not to.  In your
migratable model, if we had separate limits for non-migratable and
migratable, with non-migratable being set low to prevent exhaustion,
max secure becomes a highly scarce resource, whereas average secure is
abundant then having the choice might make sense.

>  The discussion regarding migratability only really popped up because
> this is a user-visible thing and not being able to migrate can be a
> real problem (fragmentation, ZONE_MOVABLE, ...).

I think the biggest use will potentially come from hardware
acceleration.  If it becomes simple to add say encryption to a secret
page with no cost, then no flag needed.  However, if we only have a
limited number of keys so once we run out no more encrypted memory then
it becomes a costly resource and users might want a choice of being
backed by encryption or not.

James

_______________________________________________
Linux-nvdimm mailing list -- linux-nvdimm@lists.01.org
To unsubscribe send an email to linux-nvdimm-leave@lists.01.org

WARNING: multiple messages have this Message-ID (diff)
From: James Bottomley <jejb@linux.ibm.com>
To: David Hildenbrand <david@redhat.com>, Michal Hocko <mhocko@suse.com>
Cc: Mike Rapoport <rppt@kernel.org>,
	Mike Rapoport <rppt@linux.ibm.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Alexander Viro <viro@zeniv.linux.org.uk>,
	Andy Lutomirski <luto@kernel.org>, Arnd Bergmann <arnd@arndb.de>,
	Borislav Petkov <bp@alien8.de>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Christopher Lameter <cl@linux.com>,
	Dan Williams <dan.j.williams@intel.com>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	Elena Reshetova <elena.reshetova@intel.com>,
	"H. Peter Anvin" <hpa@zytor.com>, Ingo Molnar <mingo@redhat.com>,
	"Kirill A. Shutemov" <kirill@shutemov.name>,
	Matthew Wilcox <willy@infradead.org>,
	Mark Rutland <mark.rutland@arm.com>,
	Michael Kerrisk <mtk.manpages@gmail.com>,
	Palmer Dabbelt <palmer@dabbelt.com>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	Peter Zijlstra <peterz@infradead.org>,
	Rick Edgecombe <rick.p.edgecombe@intel.com>,
	Roman Gushchin <guro@fb.com>, Shakeel Butt <shakeelb@google.com>,
	Shuah Khan <shuah@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	Tycho Andersen <tycho@tycho.ws>, Will Deacon <will@kernel.org>,
	linux-api@vger.kernel.org, linux-arch@vger.kernel.org,
	linux-arm-kernel@lists.infradead.org,
	linux-fsdevel@vger.kernel.org, linux-mm@kvack.org,
	linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org,
	linux-nvdimm@lists.01.org, linux-riscv@lists.infradead.org,
	x86@kernel.org, Hagen Paul Pfeifer <hagen@jauu.net>,
	Palmer Dabbelt <palmerdabbelt@google.com>
Subject: Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
Date: Tue, 16 Feb 2021 08:44:04 -0800	[thread overview]
Message-ID: <000cfaa0a9a09f07c5e50e573393cda301d650c9.camel@linux.ibm.com> (raw)
In-Reply-To: <dfd7db5c-a8c7-0676-59f8-70aa6bcaabe7@redhat.com>

On Tue, 2021-02-16 at 17:34 +0100, David Hildenbrand wrote:
> On 16.02.21 17:25, James Bottomley wrote:
> > On Mon, 2021-02-15 at 20:20 +0100, Michal Hocko wrote:
> > [...]
> > > > >    What kind of flags are we talking about and why would that
> > > > > be a problem with memfd_create interface? Could you be more
> > > > > specific please?
> > > > 
> > > > You mean what were the ioctl flags in the patch series linked
> > > > above? They were SECRETMEM_EXCLUSIVE and SECRETMEM_UNCACHED in
> > > > patch 3/5.
> > > 
> > > OK I see. How many potential modes are we talking about? A few or
> > > potentially many?
> >   
> > Well I initially thought there were two (uncached or not) until you
> > came up with the migratable or non-migratable, which affects the
> > security properties.  But now there's also potential for hardware
> > backing, like mktme,  described by flags as well.  I suppose you
> > could also use RDT to restrict which cache the data goes into: say
> > L1 but not L2 on to lessen the impact of fully uncached (although
> > the big thrust of uncached was to blunt hyperthread side
> > channels).  So there is potential for quite a large expansion even
> > though I'd be willing to bet that a lot of the modes people have
> > thought about turn out not to be very effective in the field.
> 
> Thanks for the insight. I remember that even the "uncached" parts
> was effectively nacked by x86 maintainers (I might be wrong).

It wasn't liked by x86 maintainers, no.  Plus there's no
architecturally standard mechanism for making a page uncached and, as
the arm people pointed out, sometimes no way of ensuring it's never
cached.

>  For the other parts, the question is what we actually want to let
> user space configure.
> 
> Being able to specify "Very secure" "maximum secure" "average
> secure"  all doesn't really make sense to me.

Well, it doesn't to me either unless the user feels a cost/benefit, so
if max cost $100 per invocation and average cost nothing, most people
would chose average unless they had a very good reason not to.  In your
migratable model, if we had separate limits for non-migratable and
migratable, with non-migratable being set low to prevent exhaustion,
max secure becomes a highly scarce resource, whereas average secure is
abundant then having the choice might make sense.

>  The discussion regarding migratability only really popped up because
> this is a user-visible thing and not being able to migrate can be a
> real problem (fragmentation, ZONE_MOVABLE, ...).

I think the biggest use will potentially come from hardware
acceleration.  If it becomes simple to add say encryption to a secret
page with no cost, then no flag needed.  However, if we only have a
limited number of keys so once we run out no more encrypted memory then
it becomes a costly resource and users might want a choice of being
backed by encryption or not.

James



WARNING: multiple messages have this Message-ID (diff)
From: James Bottomley <jejb@linux.ibm.com>
To: David Hildenbrand <david@redhat.com>, Michal Hocko <mhocko@suse.com>
Cc: Mark Rutland <mark.rutland@arm.com>,
	Peter Zijlstra <peterz@infradead.org>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	linux-mm@kvack.org, linux-kselftest@vger.kernel.org,
	"H. Peter Anvin" <hpa@zytor.com>,
	Christopher Lameter <cl@linux.com>, Shuah Khan <shuah@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	Elena Reshetova <elena.reshetova@intel.com>,
	linux-arch@vger.kernel.org, Tycho Andersen <tycho@tycho.ws>,
	linux-nvdimm@lists.01.org, Will Deacon <will@kernel.org>,
	x86@kernel.org, Matthew Wilcox <willy@infradead.org>,
	Mike Rapoport <rppt@linux.ibm.com>,
	Ingo Molnar <mingo@redhat.com>,
	Michael Kerrisk <mtk.manpages@gmail.com>,
	Palmer Dabbelt <palmerdabbelt@google.com>,
	Arnd Bergmann <arnd@arndb.de>,
	Hagen Paul Pfeifer <hagen@jauu.net>,
	Borislav Petkov <bp@alien8.de>,
	Alexander Viro <viro@zeniv.linux.org.uk>,
	Andy Lutomirski <luto@kernel.org>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	"Kirill A. Shutemov" <kirill@shutemov.name>,
	Dan Williams <dan.j.williams@intel.com>,
	linux-arm-kernel@lists.infradead.org, linux-api@vger.kernel.org,
	linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org,
	Palmer Dabbelt <palmer@dabbelt.com>,
	linux-fsdevel@vger.kernel.org, Shakeel Butt <shakeelb@google.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Rick Edgecombe <rick.p.edgecombe@intel.com>,
	Roman Gushchin <guro@fb.com>, Mike Rapoport <rppt@kernel.org>
Subject: Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
Date: Tue, 16 Feb 2021 08:44:04 -0800	[thread overview]
Message-ID: <000cfaa0a9a09f07c5e50e573393cda301d650c9.camel@linux.ibm.com> (raw)
In-Reply-To: <dfd7db5c-a8c7-0676-59f8-70aa6bcaabe7@redhat.com>

On Tue, 2021-02-16 at 17:34 +0100, David Hildenbrand wrote:
> On 16.02.21 17:25, James Bottomley wrote:
> > On Mon, 2021-02-15 at 20:20 +0100, Michal Hocko wrote:
> > [...]
> > > > >    What kind of flags are we talking about and why would that
> > > > > be a problem with memfd_create interface? Could you be more
> > > > > specific please?
> > > > 
> > > > You mean what were the ioctl flags in the patch series linked
> > > > above? They were SECRETMEM_EXCLUSIVE and SECRETMEM_UNCACHED in
> > > > patch 3/5.
> > > 
> > > OK I see. How many potential modes are we talking about? A few or
> > > potentially many?
> >   
> > Well I initially thought there were two (uncached or not) until you
> > came up with the migratable or non-migratable, which affects the
> > security properties.  But now there's also potential for hardware
> > backing, like mktme,  described by flags as well.  I suppose you
> > could also use RDT to restrict which cache the data goes into: say
> > L1 but not L2 on to lessen the impact of fully uncached (although
> > the big thrust of uncached was to blunt hyperthread side
> > channels).  So there is potential for quite a large expansion even
> > though I'd be willing to bet that a lot of the modes people have
> > thought about turn out not to be very effective in the field.
> 
> Thanks for the insight. I remember that even the "uncached" parts
> was effectively nacked by x86 maintainers (I might be wrong).

It wasn't liked by x86 maintainers, no.  Plus there's no
architecturally standard mechanism for making a page uncached and, as
the arm people pointed out, sometimes no way of ensuring it's never
cached.

>  For the other parts, the question is what we actually want to let
> user space configure.
> 
> Being able to specify "Very secure" "maximum secure" "average
> secure"  all doesn't really make sense to me.

Well, it doesn't to me either unless the user feels a cost/benefit, so
if max cost $100 per invocation and average cost nothing, most people
would chose average unless they had a very good reason not to.  In your
migratable model, if we had separate limits for non-migratable and
migratable, with non-migratable being set low to prevent exhaustion,
max secure becomes a highly scarce resource, whereas average secure is
abundant then having the choice might make sense.

>  The discussion regarding migratability only really popped up because
> this is a user-visible thing and not being able to migrate can be a
> real problem (fragmentation, ZONE_MOVABLE, ...).

I think the biggest use will potentially come from hardware
acceleration.  If it becomes simple to add say encryption to a secret
page with no cost, then no flag needed.  However, if we only have a
limited number of keys so once we run out no more encrypted memory then
it becomes a costly resource and users might want a choice of being
backed by encryption or not.

James



_______________________________________________
linux-riscv mailing list
linux-riscv@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-riscv

WARNING: multiple messages have this Message-ID (diff)
From: James Bottomley <jejb@linux.ibm.com>
To: David Hildenbrand <david@redhat.com>, Michal Hocko <mhocko@suse.com>
Cc: Mark Rutland <mark.rutland@arm.com>,
	Peter Zijlstra <peterz@infradead.org>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	linux-mm@kvack.org, linux-kselftest@vger.kernel.org,
	"H. Peter Anvin" <hpa@zytor.com>,
	Christopher Lameter <cl@linux.com>, Shuah Khan <shuah@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	Elena Reshetova <elena.reshetova@intel.com>,
	linux-arch@vger.kernel.org, Tycho Andersen <tycho@tycho.ws>,
	linux-nvdimm@lists.01.org, Will Deacon <will@kernel.org>,
	x86@kernel.org, Matthew Wilcox <willy@infradead.org>,
	Mike Rapoport <rppt@linux.ibm.com>,
	Ingo Molnar <mingo@redhat.com>,
	Michael Kerrisk <mtk.manpages@gmail.com>,
	Palmer Dabbelt <palmerdabbelt@google.com>,
	Arnd Bergmann <arnd@arndb.de>,
	Hagen Paul Pfeifer <hagen@jauu.net>,
	Borislav Petkov <bp@alien8.de>,
	Alexander Viro <viro@zeniv.linux.org.uk>,
	Andy Lutomirski <luto@kernel.org>,
	Paul Walmsley <paul.walmsley@sifive.com>,
	"Kirill A. Shutemov" <kirill@shutemov.name>,
	Dan Williams <dan.j.williams@intel.com>,
	linux-arm-kernel@lists.infradead.org, linux-api@vger.kernel.org,
	linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org,
	Palmer Dabbelt <palmer@dabbelt.com>,
	linux-fsdevel@vger.kernel.org, Shakeel Butt <shakeelb@google.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Rick Edgecombe <rick.p.edgecombe@intel.com>,
	Roman Gushchin <guro@fb.com>, Mike Rapoport <rppt@kernel.org>
Subject: Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
Date: Tue, 16 Feb 2021 08:44:04 -0800	[thread overview]
Message-ID: <000cfaa0a9a09f07c5e50e573393cda301d650c9.camel@linux.ibm.com> (raw)
In-Reply-To: <dfd7db5c-a8c7-0676-59f8-70aa6bcaabe7@redhat.com>

On Tue, 2021-02-16 at 17:34 +0100, David Hildenbrand wrote:
> On 16.02.21 17:25, James Bottomley wrote:
> > On Mon, 2021-02-15 at 20:20 +0100, Michal Hocko wrote:
> > [...]
> > > > >    What kind of flags are we talking about and why would that
> > > > > be a problem with memfd_create interface? Could you be more
> > > > > specific please?
> > > > 
> > > > You mean what were the ioctl flags in the patch series linked
> > > > above? They were SECRETMEM_EXCLUSIVE and SECRETMEM_UNCACHED in
> > > > patch 3/5.
> > > 
> > > OK I see. How many potential modes are we talking about? A few or
> > > potentially many?
> >   
> > Well I initially thought there were two (uncached or not) until you
> > came up with the migratable or non-migratable, which affects the
> > security properties.  But now there's also potential for hardware
> > backing, like mktme,  described by flags as well.  I suppose you
> > could also use RDT to restrict which cache the data goes into: say
> > L1 but not L2 on to lessen the impact of fully uncached (although
> > the big thrust of uncached was to blunt hyperthread side
> > channels).  So there is potential for quite a large expansion even
> > though I'd be willing to bet that a lot of the modes people have
> > thought about turn out not to be very effective in the field.
> 
> Thanks for the insight. I remember that even the "uncached" parts
> was effectively nacked by x86 maintainers (I might be wrong).

It wasn't liked by x86 maintainers, no.  Plus there's no
architecturally standard mechanism for making a page uncached and, as
the arm people pointed out, sometimes no way of ensuring it's never
cached.

>  For the other parts, the question is what we actually want to let
> user space configure.
> 
> Being able to specify "Very secure" "maximum secure" "average
> secure"  all doesn't really make sense to me.

Well, it doesn't to me either unless the user feels a cost/benefit, so
if max cost $100 per invocation and average cost nothing, most people
would chose average unless they had a very good reason not to.  In your
migratable model, if we had separate limits for non-migratable and
migratable, with non-migratable being set low to prevent exhaustion,
max secure becomes a highly scarce resource, whereas average secure is
abundant then having the choice might make sense.

>  The discussion regarding migratability only really popped up because
> this is a user-visible thing and not being able to migrate can be a
> real problem (fragmentation, ZONE_MOVABLE, ...).

I think the biggest use will potentially come from hardware
acceleration.  If it becomes simple to add say encryption to a secret
page with no cost, then no flag needed.  However, if we only have a
limited number of keys so once we run out no more encrypted memory then
it becomes a costly resource and users might want a choice of being
backed by encryption or not.

James



_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  reply	other threads:[~2021-02-16 16:46 UTC|newest]

Thread overview: 293+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-02-08  8:49 [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas Mike Rapoport
2021-02-08  8:49 ` Mike Rapoport
2021-02-08  8:49 ` Mike Rapoport
2021-02-08  8:49 ` Mike Rapoport
2021-02-08  8:49 ` [PATCH v17 01/10] mm: add definition of PMD_PAGE_ORDER Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49 ` [PATCH v17 02/10] mmap: make mlock_future_check() global Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49 ` [PATCH v17 03/10] riscv/Kconfig: make direct map manipulation options depend on MMU Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49 ` [PATCH v17 04/10] set_memory: allow set_direct_map_*_noflush() for multiple pages Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49 ` [PATCH v17 05/10] set_memory: allow querying whether set_direct_map_*() is actually enabled Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49 ` [PATCH v17 06/10] arm64: kfence: fix header inclusion Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49 ` [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08 10:49   ` Michal Hocko
2021-02-08 10:49     ` Michal Hocko
2021-02-08 10:49     ` Michal Hocko
2021-02-08 10:49     ` Michal Hocko
2021-02-08 21:26     ` Mike Rapoport
2021-02-08 21:26       ` Mike Rapoport
2021-02-08 21:26       ` Mike Rapoport
2021-02-08 21:26       ` Mike Rapoport
2021-02-09  8:47       ` Michal Hocko
2021-02-09  8:47         ` Michal Hocko
2021-02-09  8:47         ` Michal Hocko
2021-02-09  8:47         ` Michal Hocko
2021-02-09  9:09         ` Mike Rapoport
2021-02-09  9:09           ` Mike Rapoport
2021-02-09  9:09           ` Mike Rapoport
2021-02-09  9:09           ` Mike Rapoport
2021-02-09 13:17           ` Michal Hocko
2021-02-09 13:17             ` Michal Hocko
2021-02-09 13:17             ` Michal Hocko
2021-02-09 13:17             ` Michal Hocko
2021-02-11  7:13             ` Mike Rapoport
2021-02-11  7:13               ` Mike Rapoport
2021-02-11  7:13               ` Mike Rapoport
2021-02-11  7:13               ` Mike Rapoport
2021-02-11  8:39               ` Michal Hocko
2021-02-11  8:39                 ` Michal Hocko
2021-02-11  8:39                 ` Michal Hocko
2021-02-11  8:39                 ` Michal Hocko
2021-02-11  9:01                 ` David Hildenbrand
2021-02-11  9:01                   ` David Hildenbrand
2021-02-11  9:01                   ` David Hildenbrand
2021-02-11  9:01                   ` David Hildenbrand
2021-02-11  9:38                   ` Michal Hocko
2021-02-11  9:38                     ` Michal Hocko
2021-02-11  9:38                     ` Michal Hocko
2021-02-11  9:38                     ` Michal Hocko
2021-02-11  9:48                     ` David Hildenbrand
2021-02-11  9:48                       ` David Hildenbrand
2021-02-11  9:48                       ` David Hildenbrand
2021-02-11  9:48                       ` David Hildenbrand
2021-02-11 10:02                     ` David Hildenbrand
2021-02-11 10:02                       ` David Hildenbrand
2021-02-11 10:02                       ` David Hildenbrand
2021-02-11 10:02                       ` David Hildenbrand
2021-02-11 11:29                       ` Mike Rapoport
2021-02-11 11:29                         ` Mike Rapoport
2021-02-11 11:29                         ` Mike Rapoport
2021-02-11 11:29                         ` Mike Rapoport
2021-02-11 11:27                   ` Mike Rapoport
2021-02-11 11:27                     ` Mike Rapoport
2021-02-11 11:27                     ` Mike Rapoport
2021-02-11 11:27                     ` Mike Rapoport
2021-02-11 12:07                     ` David Hildenbrand
2021-02-11 12:07                       ` David Hildenbrand
2021-02-11 12:07                       ` David Hildenbrand
2021-02-11 12:07                       ` David Hildenbrand
2021-02-11 23:09                       ` Mike Rapoport
2021-02-11 23:09                         ` Mike Rapoport
2021-02-11 23:09                         ` Mike Rapoport
2021-02-11 23:09                         ` Mike Rapoport
2021-02-12  9:18                         ` David Hildenbrand
2021-02-12  9:18                           ` David Hildenbrand
2021-02-12  9:18                           ` David Hildenbrand
2021-02-12  9:18                           ` David Hildenbrand
2021-02-14  9:19                           ` Mike Rapoport
2021-02-14  9:19                             ` Mike Rapoport
2021-02-14  9:19                             ` Mike Rapoport
2021-02-14  9:19                             ` Mike Rapoport
2021-02-14  9:58                             ` David Hildenbrand
2021-02-14  9:58                               ` David Hildenbrand
2021-02-14  9:58                               ` David Hildenbrand
2021-02-14  9:58                               ` David Hildenbrand
2021-02-14 19:21                               ` James Bottomley
2021-02-14 19:21                                 ` James Bottomley
2021-02-14 19:21                                 ` James Bottomley
2021-02-14 19:21                                 ` James Bottomley
2021-02-15  9:13                                 ` Michal Hocko
2021-02-15  9:13                                   ` Michal Hocko
2021-02-15  9:13                                   ` Michal Hocko
2021-02-15  9:13                                   ` Michal Hocko
2021-02-15 18:14                                   ` James Bottomley
2021-02-15 18:14                                     ` James Bottomley
2021-02-15 18:14                                     ` James Bottomley
2021-02-15 18:14                                     ` James Bottomley
2021-02-15 19:20                                     ` Michal Hocko
2021-02-15 19:20                                       ` Michal Hocko
2021-02-15 19:20                                       ` Michal Hocko
2021-02-15 19:20                                       ` Michal Hocko
2021-02-16 16:25                                       ` James Bottomley
2021-02-16 16:25                                         ` James Bottomley
2021-02-16 16:25                                         ` James Bottomley
2021-02-16 16:25                                         ` James Bottomley
2021-02-16 16:34                                         ` David Hildenbrand
2021-02-16 16:34                                           ` David Hildenbrand
2021-02-16 16:34                                           ` David Hildenbrand
2021-02-16 16:34                                           ` David Hildenbrand
2021-02-16 16:44                                           ` James Bottomley [this message]
2021-02-16 16:44                                             ` James Bottomley
2021-02-16 16:44                                             ` James Bottomley
2021-02-16 16:44                                             ` James Bottomley
2021-02-16 17:16                                             ` David Hildenbrand
2021-02-16 17:16                                               ` David Hildenbrand
2021-02-16 17:16                                               ` David Hildenbrand
2021-02-16 17:16                                               ` David Hildenbrand
2021-02-17 16:19                                               ` James Bottomley
2021-02-17 16:19                                                 ` James Bottomley
2021-02-17 16:19                                                 ` James Bottomley
2021-02-17 16:19                                                 ` James Bottomley
2021-02-22  9:38                                                 ` David Hildenbrand
2021-02-22  9:38                                                   ` David Hildenbrand
2021-02-22  9:38                                                   ` David Hildenbrand
2021-02-22  9:38                                                   ` David Hildenbrand
2021-02-22 10:50                                                   ` David Hildenbrand
2021-02-22 10:50                                                     ` David Hildenbrand
2021-02-22 10:50                                                     ` David Hildenbrand
2021-02-22 10:50                                                     ` David Hildenbrand
2021-02-16 16:51                                         ` Michal Hocko
2021-02-16 16:51                                           ` Michal Hocko
2021-02-16 16:51                                           ` Michal Hocko
2021-02-16 16:51                                           ` Michal Hocko
2021-02-11 11:20                 ` Mike Rapoport
2021-02-11 11:20                   ` Mike Rapoport
2021-02-11 11:20                   ` Mike Rapoport
2021-02-11 11:20                   ` Mike Rapoport
2021-02-11 12:30                   ` Michal Hocko
2021-02-11 12:30                     ` Michal Hocko
2021-02-11 12:30                     ` Michal Hocko
2021-02-11 12:30                     ` Michal Hocko
2021-02-11 22:59                     ` Mike Rapoport
2021-02-11 22:59                       ` Mike Rapoport
2021-02-11 22:59                       ` Mike Rapoport
2021-02-11 22:59                       ` Mike Rapoport
2021-02-12  9:02                       ` Michal Hocko
2021-02-12  9:02                         ` Michal Hocko
2021-02-12  9:02                         ` Michal Hocko
2021-02-12  9:02                         ` Michal Hocko
2021-02-08  8:49 ` [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08 10:18   ` Michal Hocko
2021-02-08 10:18     ` Michal Hocko
2021-02-08 10:18     ` Michal Hocko
2021-02-08 10:18     ` Michal Hocko
2021-02-08 10:32     ` David Hildenbrand
2021-02-08 10:32       ` David Hildenbrand
2021-02-08 10:32       ` David Hildenbrand
2021-02-08 10:32       ` David Hildenbrand
2021-02-08 10:51       ` Michal Hocko
2021-02-08 10:51         ` Michal Hocko
2021-02-08 10:51         ` Michal Hocko
2021-02-08 10:51         ` Michal Hocko
2021-02-08 10:53         ` David Hildenbrand
2021-02-08 10:53           ` David Hildenbrand
2021-02-08 10:53           ` David Hildenbrand
2021-02-08 10:53           ` David Hildenbrand
2021-02-08 10:57           ` Michal Hocko
2021-02-08 10:57             ` Michal Hocko
2021-02-08 10:57             ` Michal Hocko
2021-02-08 10:57             ` Michal Hocko
2021-02-08 11:13             ` David Hildenbrand
2021-02-08 11:13               ` David Hildenbrand
2021-02-08 11:13               ` David Hildenbrand
2021-02-08 11:13               ` David Hildenbrand
2021-02-08 11:14               ` David Hildenbrand
2021-02-08 11:14                 ` David Hildenbrand
2021-02-08 11:14                 ` David Hildenbrand
2021-02-08 11:14                 ` David Hildenbrand
2021-02-08 11:26                 ` David Hildenbrand
2021-02-08 11:26                   ` David Hildenbrand
2021-02-08 11:26                   ` David Hildenbrand
2021-02-08 11:26                   ` David Hildenbrand
2021-02-08 12:17                   ` Michal Hocko
2021-02-08 12:17                     ` Michal Hocko
2021-02-08 12:17                     ` Michal Hocko
2021-02-08 12:17                     ` Michal Hocko
2021-02-08 13:34                     ` Michal Hocko
2021-02-08 13:34                       ` Michal Hocko
2021-02-08 13:34                       ` Michal Hocko
2021-02-08 13:34                       ` Michal Hocko
2021-02-08 13:40                     ` David Hildenbrand
2021-02-08 13:40                       ` David Hildenbrand
2021-02-08 13:40                       ` David Hildenbrand
2021-02-08 13:40                       ` David Hildenbrand
2021-02-08 21:28     ` Mike Rapoport
2021-02-08 21:28       ` Mike Rapoport
2021-02-08 21:28       ` Mike Rapoport
2021-02-08 21:28       ` Mike Rapoport
2021-02-22  7:34   ` Matthew Garrett
2021-02-22  7:34     ` Matthew Garrett
2021-02-22  7:34     ` Matthew Garrett
2021-02-22  7:34     ` Matthew Garrett
2021-02-22 10:23     ` Mike Rapoport
2021-02-22 10:23       ` Mike Rapoport
2021-02-22 10:23       ` Mike Rapoport
2021-02-22 10:23       ` Mike Rapoport
2021-02-22 18:27       ` Matthew Garrett
2021-02-22 18:27         ` Matthew Garrett
2021-02-22 18:27         ` Matthew Garrett
2021-02-22 18:27         ` Matthew Garrett
2021-02-22 19:17       ` Dan Williams
2021-02-22 19:17         ` Dan Williams
2021-02-22 19:17         ` Dan Williams
2021-02-22 19:17         ` Dan Williams
2021-02-22 19:17         ` Dan Williams
2021-02-22 19:21         ` James Bottomley
2021-02-22 19:21           ` James Bottomley
2021-02-22 19:21           ` James Bottomley
2021-02-22 19:21           ` James Bottomley
2021-02-08  8:49 ` [PATCH v17 09/10] arch, mm: wire up memfd_secret system call where relevant Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49 ` [PATCH v17 10/10] secretmem: test: add basic selftest for memfd_secret(2) Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  8:49   ` Mike Rapoport
2021-02-08  9:27 ` [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas David Hildenbrand
2021-02-08  9:27   ` David Hildenbrand
2021-02-08  9:27   ` David Hildenbrand
2021-02-08  9:27   ` David Hildenbrand
2021-02-08 21:13   ` Mike Rapoport
2021-02-08 21:13     ` Mike Rapoport
2021-02-08 21:13     ` Mike Rapoport
2021-02-08 21:13     ` Mike Rapoport
2021-02-08 21:38     ` David Hildenbrand
2021-02-08 21:38       ` David Hildenbrand
2021-02-08 21:38       ` David Hildenbrand
2021-02-08 21:38       ` David Hildenbrand
2021-02-09  8:59       ` Michal Hocko
2021-02-09  8:59         ` Michal Hocko
2021-02-09  8:59         ` Michal Hocko
2021-02-09  8:59         ` Michal Hocko
2021-02-09  9:15         ` David Hildenbrand
2021-02-09  9:15           ` David Hildenbrand
2021-02-09  9:15           ` David Hildenbrand
2021-02-09  9:15           ` David Hildenbrand
2021-02-09  9:53           ` Michal Hocko
2021-02-09  9:53             ` Michal Hocko
2021-02-09  9:53             ` Michal Hocko
2021-02-09  9:53             ` Michal Hocko
2021-02-09 10:23             ` David Hildenbrand
2021-02-09 10:23               ` David Hildenbrand
2021-02-09 10:23               ` David Hildenbrand
2021-02-09 10:23               ` David Hildenbrand
2021-02-09 10:30               ` David Hildenbrand
2021-02-09 10:30                 ` David Hildenbrand
2021-02-09 10:30                 ` David Hildenbrand
2021-02-09 10:30                 ` David Hildenbrand
2021-02-09 13:25               ` Michal Hocko
2021-02-09 13:25                 ` Michal Hocko
2021-02-09 13:25                 ` Michal Hocko
2021-02-09 13:25                 ` Michal Hocko
2021-02-09 16:17                 ` David Hildenbrand
2021-02-09 16:17                   ` David Hildenbrand
2021-02-09 16:17                   ` David Hildenbrand
2021-02-09 16:17                   ` David Hildenbrand
2021-02-09 20:08                   ` Michal Hocko
2021-02-09 20:08                     ` Michal Hocko
2021-02-09 20:08                     ` Michal Hocko
2021-02-09 20:08                     ` Michal Hocko

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=000cfaa0a9a09f07c5e50e573393cda301d650c9.camel@linux.ibm.com \
    --to=jejb@linux.ibm.com \
    --cc=akpm@linux-foundation.org \
    --cc=arnd@arndb.de \
    --cc=bp@alien8.de \
    --cc=catalin.marinas@arm.com \
    --cc=cl@linux.com \
    --cc=dave.hansen@linux.intel.com \
    --cc=david@redhat.com \
    --cc=elena.reshetova@intel.com \
    --cc=guro@fb.com \
    --cc=hpa@zytor.com \
    --cc=kirill@shutemov.name \
    --cc=luto@kernel.org \
    --cc=mark.rutland@arm.com \
    --cc=mhocko@suse.com \
    --cc=mingo@redhat.com \
    --cc=mtk.manpages@gmail.com \
    --cc=palmer@dabbelt.com \
    --cc=paul.walmsley@sifive.com \
    --cc=peterz@infradead.org \
    --cc=rick.p.edgecombe@intel.com \
    --cc=rppt@kernel.org \
    --cc=rppt@linux.ibm.com \
    --cc=shakeelb@google.com \
    --cc=shuah@kernel.org \
    --cc=tglx@linutronix.de \
    --cc=tycho@tycho.ws \
    --cc=viro@zeniv.linux.org.uk \
    --cc=willy@infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.