From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 86871C433E1 for ; Thu, 20 Aug 2020 15:52:42 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 4A05722D70 for ; Thu, 20 Aug 2020 15:52:42 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="rXdI/2i+" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4A05722D70 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id D16B88D0033; Thu, 20 Aug 2020 11:52:41 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id CC6078D0001; Thu, 20 Aug 2020 11:52:41 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id BB44F8D0033; Thu, 20 Aug 2020 11:52:41 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0087.hostedemail.com [216.40.44.87]) by kanga.kvack.org (Postfix) with ESMTP id A00548D0001 for ; Thu, 20 Aug 2020 11:52:41 -0400 (EDT) Received: from smtpin24.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id 5BB48362A for ; Thu, 20 Aug 2020 15:52:41 +0000 (UTC) X-FDA: 77171389722.24.gate89_3c1525427031 Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin24.hostedemail.com (Postfix) with ESMTP id 329411A4A0 for ; Thu, 20 Aug 2020 15:52:41 +0000 (UTC) X-HE-Tag: gate89_3c1525427031 X-Filterd-Recvd-Size: 6519 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf03.hostedemail.com (Postfix) with ESMTP for ; Thu, 20 Aug 2020 15:52:40 +0000 (UTC) Received: from kernel.org (unknown [87.70.91.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 50D6F22D02; Thu, 20 Aug 2020 15:52:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597938759; bh=olFkF8WbsFuHtZd9ChmwDnMhq4dAB75kWwSK+0maCo0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=rXdI/2i+uTIyui9Dqky2lOsnOB5jHumUoz9vyCWVksi+jCX/cin2X0NAhZkvzzrrA kwB1mQk9tmImk5FV5Ln6HbAMWznc6VF7fXJ8iI6/UHeReZUV1SP7agq0ae+f8/MDDg S/yXBOXnLzIrn/7Y0W5T1dTvbgWrpaeScrKjGVKk= Date: Thu, 20 Aug 2020 18:52:28 +0300 From: Mike Rapoport To: David Hildenbrand Cc: Andrew Morton , Alexander Viro , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Catalin Marinas , Christopher Lameter , Dan Williams , Dave Hansen , Elena Reshetova , "H. Peter Anvin" , Idan Yaniv , Ingo Molnar , James Bottomley , "Kirill A. Shutemov" , Matthew Wilcox , Mark Rutland , Mike Rapoport , Michael Kerrisk , Palmer Dabbelt , Paul Walmsley , Peter Zijlstra , Thomas Gleixner , Tycho Andersen , Will Deacon , linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org, linux-riscv@lists.infradead.org, x86@kernel.org Subject: Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot Message-ID: <20200820155228.GZ752365@kernel.org> References: <20200818141554.13945-1-rppt@kernel.org> <20200818141554.13945-7-rppt@kernel.org> <03ec586d-c00c-c57e-3118-7186acb7b823@redhat.com> <20200819115335.GU752365@kernel.org> <10bf57a9-c3c2-e13c-ca50-e872b7a2db0c@redhat.com> <20200819173347.GW752365@kernel.org> <6c8b30fb-1b6c-d446-0b09-255b79468f7c@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6c8b30fb-1b6c-d446-0b09-255b79468f7c@redhat.com> X-Rspamd-Queue-Id: 329411A4A0 X-Spamd-Result: default: False [0.00 / 100.00] X-Rspamd-Server: rspam02 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Wed, Aug 19, 2020 at 07:45:29PM +0200, David Hildenbrand wrote: > On 19.08.20 19:33, Mike Rapoport wrote: > > On Wed, Aug 19, 2020 at 02:10:43PM +0200, David Hildenbrand wrote: > >> On 19.08.20 13:53, Mike Rapoport wrote: > >>> On Wed, Aug 19, 2020 at 12:49:05PM +0200, David Hildenbrand wrote: > >>>> On 18.08.20 16:15, Mike Rapoport wrote: > >>>>> From: Mike Rapoport > >>>>> > >>>>> Taking pages out from the direct map and bringing them back may create > >>>>> undesired fragmentation and usage of the smaller pages in the direct > >>>>> mapping of the physical memory. > >>>>> > >>>>> This can be avoided if a significantly large area of the physical memory > >>>>> would be reserved for secretmem purposes at boot time. > >>>>> > >>>>> Add ability to reserve physical memory for secretmem at boot time using > >>>>> "secretmem" kernel parameter and then use that reserved memory as a global > >>>>> pool for secret memory needs. > >>>> > >>>> Wouldn't something like CMA be the better fit? Just wondering. Then, the > >>>> memory can actually be reused for something else while not needed. > >>> > >>> The memory allocated as secret is removed from the direct map and the > >>> boot time reservation is intended to reduce direct map fragmentatioan > >>> and to avoid splitting 1G pages there. So with CMA I'd still need to > >>> allocate 1G chunks for this and once 1G page is dropped from the direct > >>> map it still cannot be reused for anything else until it is freed. > >>> > >>> I could use CMA to do the boot time reservation, but doing the > >>> reservesion directly seemed simpler and more explicit to me. > >> > >> Well, using CMA would give you the possibility to let the memory be used > >> for other purposes until you decide it's the right time to take it + > >> remove the direct mapping etc. > > > > I still can't say I follow you here. If I reseve a CMA area as a pool > > for secret memory 1G pages, it is still reserved and it still cannot be > > used for other purposes, right? > > So, AFAIK, if you create a CMA pool it can be used for any MOVABLE > allocations (similar to ZONE_MOVABLE) until you actually allocate CMA > memory from that region. Other allocations on that are will then be > migrated away (using alloc_contig_range()). > > For example, if you have a 1~GiB CMA area, you could allocate 4~MB pages > from that CMA area on demand (removing the direct mapping, etc ..), and > free when no longer needed (instantiating the direct mapping). The free > memory in that area could used for MOVABLE allocations. The boot time resrvation is intended to avoid splitting 1G pages in the direct map. Without the boot time reservation, we maintain a pool of 2M pages so the 1G pages are split and 2M pages remain unsplit. If I scale your example to match the requirement to avoid splitting 1G pages in the direct map, that would mean creating a CMA area of several tens of gigabytes and then doing cma_alloc() of 1G each time we need to refill the secretmem pool. It is quite probable that we won't be able to get 1G from CMA after the system worked for some time. With boot time reservation we won't need physcally contiguous 1G to satisfy smaller allocation requests for secretmem because we don't need to maintain 1G mappings in the secretmem pool. That said, I believe the addition of the boot time reservation, either direct or with CMA, can be added as an incrememntal patch after the "core" functionality is merged. > Please let me know if I am missing something important. > > -- > Thanks, > > David / dhildenb > -- Sincerely yours, Mike.