Received: by 10.192.165.148 with SMTP id m20csp3451317imm; Mon, 7 May 2018 12:31:32 -0700 (PDT) X-Google-Smtp-Source: AB8JxZr4l1/6QU+XKhRgozz5jTSZkI1Bb1LY7qrdLgf0CbncbdsgHxKMlWaJ4hUt0QlgnexlUZYq X-Received: by 2002:a24:4151:: with SMTP id x78-v6mr2956527ita.0.1525721492170; Mon, 07 May 2018 12:31:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525721492; cv=none; d=google.com; s=arc-20160816; b=eQoIx1fFlW4/CaJ8wMkUcE4z7iKZebgiHIbAKoZ2H9IenR7if2R/xkxTHgld0DxTpM STnY5srNWuARacGbjYyRh/DQeBCuxgIEJEqAA4Fr60HbYkqlgbDX9oJT7MaxICshS5CM vwb+ThruNhM0Qn0UlWELqv2zqRHocl2tODWkx74A/V9vWsxLg5WYsmjlCB7mfnSoHNt+ ZM/1X3LaIRiSwbkXJ3zJ4jP5aDXaBE7GEpgMNq6uRPLsXRCIj58QhmPh9PdNuTDcEHOf 9jbb7JI8USqXi7z7rSy1zB80+TM7178DMUjPoblyfUWpchB0CZ7LliS1R1Ninfxv1QpK WUdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=xHeFms3RddA0GLwUYtOGoYHleZzxVgVOUtIlPRfgp2E=; b=QqJsPG4faehv1IP+ZpURJ9YRxqqdJu7OLGt7hDFUye83iF5baXWk+bD/YuQ1sqoH2L YsYSA7n5uJP1fLgEOqpTPjWhTNX4amGlqcBR4TzbW6lnDv5jSSo4hfbhBHZXeHkC1F2N DyDDPL4oud+bk1v40PlPWGjhPJxAzazO7MfHifUdGf0f0zM85qCkegrAMVnNQEUjfOP6 kDUWgBFHrkDB/z+Ip0swan2zf2aNWmOr0axuJ1UyTsOJXuT04jT88Lqc22tU7Y9IsfUE +TWW/8vXCrtOusSM0oj8UIiXvyFE31gt6azU079ifOpDyFnKcERc3zSQRB4uXPjvGaJX bHdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel-com.20150623.gappssmtp.com header.s=20150623 header.b=bI0VpbOZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n202-v6si7790635ita.10.2018.05.07.12.31.19; Mon, 07 May 2018 12:31:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@intel-com.20150623.gappssmtp.com header.s=20150623 header.b=bI0VpbOZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752778AbeEGTam (ORCPT + 99 others); Mon, 7 May 2018 15:30:42 -0400 Received: from mail-oi0-f54.google.com ([209.85.218.54]:45467 "EHLO mail-oi0-f54.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752081AbeEGTal (ORCPT ); Mon, 7 May 2018 15:30:41 -0400 Received: by mail-oi0-f54.google.com with SMTP id b130-v6so26214497oif.12 for ; Mon, 07 May 2018 12:30:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=xHeFms3RddA0GLwUYtOGoYHleZzxVgVOUtIlPRfgp2E=; b=bI0VpbOZN2FSEIixb7pMQ1s5d50W801xQlVBj3eLftpQNQuBdX4LOLi7yvBCTHu5V0 fNf2Af2bUfCrz27IngAu9ily5lzoE5aeF5BerI1Yy9Gbu187ysIT0Dw6Ujyzn2BDbMaj a6kNOz5F9qukZzhF3CTd0CV76AQEhwEWOALru7OTtVWOsn/WZnunrDhRq9aGsR145F/f HABd52+LDmtKOq8LAiwyBkEC+AQPHCptKojshQ3K4t78R15ui/namVt3qAUhuy9ao4sl 3puu8iRdrGvDqffcX09u+uA+DKiVvnXs+bJVZBlumL+lxMrVQKOGihb+LWynWjAj9UE0 eo0w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=xHeFms3RddA0GLwUYtOGoYHleZzxVgVOUtIlPRfgp2E=; b=TzzA69KytX4JH6cI8wcIw+g/B1q+0RMHn2NR+LCcpVHxYw2GHRhNhFG4pUXH7B/1Ig Iz4fYWvvN95DWMaFbRmHIsW1UpOAdAdOqZ4lBBcCNqQ+UVTzwXsFQeKcQ8fJSh1aH9DK 0dFPosDmsx+WavOekwP/j8UiOtjKic14pfdnfdHFJX62YR6eHDwZDdweB0AHWijQCqvc cpN79D7d4KzQkawiJIt635Gny1Kn8d7AzHzJ3EJTe2T+/l4hPbED7qzo+ciTKF7bF9gW HoTyw613CzBJGTJofCJMD9fxwrIzJTGSuJ1egxvh+/scXyymJZDsldSCuzoUTWO9vopa o0LQ== X-Gm-Message-State: ALQs6tDjvRyVlwBk/80QaoPHvTrGSmVU7JwEWBiCH1uWEP9hGOQqn/S3 Ww71LfCdAi2EtRDsJVxtX7U1s3+xbvDNhZErrZmRPg== X-Received: by 2002:aca:41d6:: with SMTP id o205-v6mr25145956oia.72.1525721441168; Mon, 07 May 2018 12:30:41 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a9d:2d36:0:0:0:0:0 with HTTP; Mon, 7 May 2018 12:30:40 -0700 (PDT) In-Reply-To: <20180507191857.GA15604@bombadil.infradead.org> References: <1525704627-30114-1-git-send-email-yehs1@lenovo.com> <20180507184622.GB12361@bombadil.infradead.org> <20180507191857.GA15604@bombadil.infradead.org> From: Dan Williams Date: Mon, 7 May 2018 12:30:40 -0700 Message-ID: Subject: Re: [RFC PATCH v1 0/6] use mm to manage NVDIMM (pmem) zone To: Matthew Wilcox Cc: Huaisheng Ye , Michal Hocko , Linux Kernel Mailing List , linux-nvdimm , Tetsuo Handa , chengnt@lenovo.com, pasha.tatashin@oracle.com, Sasha Levin , Linux MM , Johannes Weiner , Andrew Morton , colyli@suse.de, Mel Gorman , Vlastimil Babka , Dave Hansen Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 7, 2018 at 12:18 PM, Matthew Wilcox wrote: > On Mon, May 07, 2018 at 11:57:10AM -0700, Dan Williams wrote: >> I think adding yet one more mm-zone is the wrong direction. Instead, >> what we have been considering is a mechanism to allow a device-dax >> instance to be given back to the kernel as a distinct numa node >> managed by the VM. It seems it times to dust off those patches. > > I was wondering how "safe" we think that ability is. NV-DIMM pages > (obviously) differ from normal pages by their non-volatility. Do we > want their contents from the previous boot to be observable? If not, > then we need the BIOS to clear them at boot-up, which means we would > want no kernel changes at all; rather the BIOS should just describe > those pages as if they were DRAM (after zeroing them). Certainly the BIOS could do it, but the impetus for having a kernel mechanism to do the same is for supporting the configuration flexibility afforded by namespaces, or otherwise having the capability when the BIOS does not offer it. However, you are right that there are extra security implications when System-RAM is persisted, perhaps requiring the capacity to be explicitly locked / unlocked could address that concern?