lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080615135906.091354918@attica.americas.sgi.com>
Date:	Sun, 15 Jun 2008 08:59:06 -0500
From:	steiner@....com
To:	akpm@...l.org, linux-kernel@...r.kernel.org
Cc:	mingo@...e.hu, tglx@...utronix.de, holt@....com,
	andrea@...ranet.com
Subject: [patch 00/13] GRU Driver V2 - Overview

This series of patches adds a driver for the SGI UV GRU. The driver is still
in development but it currently compiles for both x86_64 & IA64. All simple
regression tests pass on IA64. Although features remain to be added, I'd like to
start the process of getting the driver into the kernel. Additional kernel
drivers will depend on services provide by the GRU driver.

The GRU is a hardware resource located in the system chipset. The GRU
contains memory that is mmaped into the user address space. This memory is
used to communicate with the GRU to perform functions such as load/store,
scatter/gather, bcopy, AMOs, etc.  The GRU is directly accessed by user
instructions using user virtual addresses. GRU instructions (ex., bcopy) use
user virtual addresses for operands.

The GRU contains a large TLB that is functionally very similar to processor TLBs.
Because the external contains a TLB with user virtual address, it requires
callouts from the core VM system when certain types of changes are made to
the process page tables. There are several MMUOPS patches currently being
discussed but none has been accepted into the kernel. The GRU driver
is built using version V18 from Andrea Arcangeli.

Changes from V1 -> V2

	- lots of macro cleanup in gru_headers.h
	- coverted numerous macros to inline functions
	- deleted all (most) macros & functions that were used only
	  on the system simulator.
	- removed open coded ROUND_UP()
	- added missing EXPORTS
	- changed "address" parameteres to GRU kernel instructions
	  from void* to unsigned long. The values are physical addresses
	  (virtual is used only in user mode)
	- added GRU_DEBUG config option to enable GRU debug code.

Open Issues:
	- use of /proc vs. /sys for resource allocation statistics
	- inline macros for GRU kernel instructions
	- __ia64__  -> CONFIG_IA64, etc.
	- Use of hugepages (currently, GRU returns errors
	  to user if a hugepage reference is attempted)
	- Need better algorithms to handle oversubscription of
	  GRU resources. Current algorithm is functional but
	  crude.

Areas of Special Concern - would like careful community review:
	- use of get_user_pages() & follow_page() - (patch 6)



--- jack
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ