lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue,  6 Oct 2020 21:05:50 -0400
From:   jglisse@...hat.com
To:     linux-kernel@...r.kernel.org
Cc:     Jérôme Glisse <jglisse@...hat.com>,
        Andrew Morton <akpm@...ux-foundation.org>,
        Alexander Viro <viro@...iv.linux.org.uk>,
        linux-fsdevel@...r.kernel.org, Tejun Heo <tj@...nel.org>,
        Jan Kara <jack@...e.cz>, Josef Bacik <jbacik@...com>
Subject: [PATCH 01/14] mm/pxa: page exclusive access add header file for all helpers.

From: Jérôme Glisse <jglisse@...hat.com>

Add include/linux/page-xa.h where all helpers related to Page eXclusive
Acces (PXA) will be added (in following patches).

Also introduce MAPPING_NULL as a temporary define use to simplify the
mass modifications to stop relying on struct page.mapping and instead
pass down mapping pointer from the context (either from inode when in
syscall operating on a file or from vma->vm_file when operating on some
virtual address.

This is temporary define, do not use !

Signed-off-by: Jérôme Glisse <jglisse@...hat.com>
Cc: Andrew Morton <akpm@...ux-foundation.org>
Cc: Alexander Viro <viro@...iv.linux.org.uk>
Cc: linux-fsdevel@...r.kernel.org
Cc: Tejun Heo <tj@...nel.org>
Cc: Jan Kara <jack@...e.cz>
Cc: Josef Bacik <jbacik@...com>
---
 include/linux/mm.h      |  5 ++++
 include/linux/page-xa.h | 66 +++++++++++++++++++++++++++++++++++++++++
 2 files changed, 71 insertions(+)
 create mode 100644 include/linux/page-xa.h

diff --git a/include/linux/mm.h b/include/linux/mm.h
index 16b799a0522cd..d165961c58c45 100644
--- a/include/linux/mm.h
+++ b/include/linux/mm.h
@@ -3130,5 +3130,10 @@ unsigned long wp_shared_mapping_range(struct address_space *mapping,
 
 extern int sysctl_nr_trim_pages;
 
+
+/* Page exclusive access do depend on some helpers define in here. */
+#include <linux/page-xa.h>
+
+
 #endif /* __KERNEL__ */
 #endif /* _LINUX_MM_H */
diff --git a/include/linux/page-xa.h b/include/linux/page-xa.h
new file mode 100644
index 0000000000000..8ac9e6dc051e0
--- /dev/null
+++ b/include/linux/page-xa.h
@@ -0,0 +1,66 @@
+/* SPDX-License-Identifier: GPL-2.0-or-later */
+/*
+ * Page eXclusive Acess (PXA) is a generic mechanism to allow exclusive access
+ * to a file back or an anonymous page. Exclusive access means that no one can
+ * write to page except the owner of the protection (but the page can still be
+ * read). The exclusive access can be _broken_ at anytime and this can not be
+ * block (so anyone using that feature must be ready to give away the exclusive
+ * access at _any_ time and must do so in a timely fashion).
+ *
+ * Using PXA allows to implement few different features:
+ *  - KSM (Kernel Shared Memory) where page with same content are deduplicated
+ *    using a unique page and all mapping are updated to read only. This allow
+ *    to save memory for workload with a lot of pages in different process that
+ *    end up with same content (multiple VM for instance).
+ *
+ *  - NUMA duplication (sort of the opposite of KSM) here a page is duplicated
+ *    into multiple read only copy with each copy using physical memory local a
+ *    NUMA node (or a device). This allow to improve performance by minimizing
+ *    cross node memory transaction and also help minimizing bus traffic. It
+ *    does however use more memory, so what you gain in performance you loose
+ *    in available resources.
+ *
+ *  - Exclusive write access to a page, for instance you can use regular write
+ *    instruction and still get atomic behavior (as you are the only being able
+ *    to write you the garantee that no one can race with you).
+ *
+ * And any other use cases you can think of ...
+ *
+ * See Documentation/vm/page-xa.rst for further informations.
+ *
+ * Authors:
+ *  Jérôme Glisse
+ */
+#ifndef LINUX_PAGE_XA_H
+#define LINUX_PAGE_XA_H
+
+#include <linux/page-flags.h>
+#include <linux/mm_types.h>
+
+
+/*
+ * MAPPING_NULL this is temporary define use to simplify the mass modificaitons
+ * to stop relying on struct page.mapping and instead pass down mapping pointer
+ * from the context (either from inode when in syscall operating on a file or
+ * from vma->vm_file when operating on some virtual address range).
+ *
+ * DO NOT USE ! THIS IS ONLY FOR SEMANTIC PATCHES SIMPLIFICATION !
+ */
+#define MAPPING_NULL NULL
+
+
+/**
+ * PageXA() - is page under exclusive acces ?
+ *
+ * This function checks if a page is under exclusive access.
+ *
+ * @page: Pointer to page to be queried.
+ * @Return: True, if it is under exclusive access, false otherwise.
+ */
+static inline bool PageXA(struct page *page)
+{
+	return false;
+}
+
+
+#endif /* LINUX_PAGE_XA_H */
-- 
2.26.2

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ