lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080520111424.GB25791@wotan.suse.de>
Date:	Tue, 20 May 2008 13:14:24 +0200
From:	Nick Piggin <npiggin@...e.de>
To:	Robin Holt <holt@....com>
Cc:	Christoph Lameter <clameter@....com>,
	Nick Piggin <nickpiggin@...oo.com.au>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Andrea Arcangeli <andrea@...ranet.com>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Jack Steiner <steiner@....com>,
	Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	kvm-devel@...ts.sourceforge.net,
	Kanoj Sarcar <kanojsarcar@...oo.com>,
	Roland Dreier <rdreier@...co.com>,
	Steve Wise <swise@...ngridcomputing.com>,
	linux-kernel@...r.kernel.org, Avi Kivity <avi@...ranet.com>,
	linux-mm@...ck.org, general@...ts.openfabrics.org,
	Hugh Dickins <hugh@...itas.com>,
	Rusty Russell <rusty@...tcorp.com.au>,
	Anthony Liguori <aliguori@...ibm.com>,
	Chris Wright <chrisw@...hat.com>,
	Marcelo Tosatti <marcelo@...ck.org>,
	Eric Dumazet <dada1@...mosbay.com>,
	"Paul E. McKenney" <paulmck@...ibm.com>
Subject: Re: [PATCH 08 of 11] anon-vma-rwsem

On Tue, May 20, 2008 at 06:05:29AM -0500, Robin Holt wrote:
> On Tue, May 20, 2008 at 12:50:25PM +0200, Nick Piggin wrote:
> > On Tue, May 20, 2008 at 05:01:11AM -0500, Robin Holt wrote:
> > > On Tue, May 20, 2008 at 07:31:46AM +0200, Nick Piggin wrote:
> > > > 
> > > > Really? You can get the information through via a sleeping messaging API,
> > > > but not a non-sleeping one? What is the difference from the hardware POV?
> > > 
> > > That was covered in the early very long discussion about 28 seconds.
> > > The read timeout for the BTE is 28 seconds and it automatically retried
> > > for certain failures.  In interrupt context, that is 56 seconds without
> > > any subsequent interrupts of that or lower priority.
> > 
> > I thought you said it would be possible to get the required invalidate
> > information without using the BTE. Couldn't you use XPMEM pages in
> > the kernel to read the data out of, if nothing else?
> 
> I was wrong about that.  I thought it was safe to do an uncached write,
> but it turns out any processor write is uncontained and the MCA that
> surfaces would be fatal.  Likewise for the uncached read.

Oh, so the BTE transfer is purely for fault isolation. I was thinking
you guys might have sufficient control of the hardware to be able to
do it at the level of CPU memory operations, but if it is some
limitation of ia64, then I guess that's a problem.

How do you do fault isolation of userspace XPMEM accesses?
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ