Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4227951ybg; Tue, 29 Oct 2019 04:09:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqzxPWuU6czTl1MSDTr/FEbqI86vqLIOzxvGlu8382UT9TdRFQhzomi9MW6n1ESfd+5x/nX+ X-Received: by 2002:a50:d7c9:: with SMTP id m9mr25427129edj.93.1572347388756; Tue, 29 Oct 2019 04:09:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572347388; cv=none; d=google.com; s=arc-20160816; b=MaULtKNz1BZItNHrw60y0IajOczKDCb10ypsDNm0yNwV5Ewb1+ikVQlOaRR1hqXi3n 5COkMaLY5olyi2gJWncIrvx/vAm5FKI0Rzb6jnHCPyt7QYIFIZHhUSNv4SJSbkDEJvhN pUBp5dO94Yv23nyuOw05BY36KqPJiioDfwMu+6RXRW1PPIImH+hXOtMPfqQCap3wKENU Q7ZleUzR4SGobhDo8y843yFAp+y+2AQkf4CsCQ9xdqMGBSABjI0sZoOA3KQu0gqCZDoW 9CP4uOU/k5By0MwDGUwNBsuTNNV9hEnIDboTXcFX0Zw+3N5gflizMc2nTJM1L6YII/mW 8GlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=+A6UywETYJYuDOxxyFC60DXKJQrKyf8NTefS2oZI0S8=; b=OVpryP7WUMNjDMjW6nuDayrgEylpE7NqIVBg6EgtE7aJy9HBL4dj2xJ6i5P9xYBuBp 1fDspgxn2mKpIiOBRMxnhvfJ8bU0Ebj2Op3DJhqTvBX7VLXQLCOoIP1dZDyJrMYsm9Jy zIOjM7xlxJLS5AZoXkXN++NCtEsW1H7erPTqkg3Yy40n+Y0WiGnl4tFxCYK8/N2TMUe9 CKmkE5PtgdgxieEP35U0G8cUv9lLM3pi1I0KlOn5RjDupADgiHIszoaf4yiNrXKIJKDx uOdu0p7bSM9CDa4/gQOGJHKyJye5JZZonrdOhOUhfPHMyYNM/mfWOXnyiTF6mlhedS8p 4+zw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e25si8420807ejc.74.2019.10.29.04.09.23; Tue, 29 Oct 2019 04:09:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728152AbfJ2KMF (ORCPT + 99 others); Tue, 29 Oct 2019 06:12:05 -0400 Received: from gentwo.org ([3.19.106.255]:37920 "EHLO gentwo.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725867AbfJ2KMF (ORCPT ); Tue, 29 Oct 2019 06:12:05 -0400 Received: by gentwo.org (Postfix, from userid 1002) id 199B33EF15; Tue, 29 Oct 2019 10:12:04 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by gentwo.org (Postfix) with ESMTP id 1877F3EF14; Tue, 29 Oct 2019 10:12:04 +0000 (UTC) Date: Tue, 29 Oct 2019 10:12:04 +0000 (UTC) From: Christopher Lameter X-X-Sender: cl@www.lameter.com To: Mike Rapoport cc: "Kirill A. Shutemov" , linux-kernel@vger.kernel.org, Alexey Dobriyan , Andrew Morton , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Dave Hansen , James Bottomley , Peter Zijlstra , Steven Rostedt , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , linux-api@vger.kernel.org, linux-mm@kvack.org, x86@kernel.org, Mike Rapoport Subject: Re: [PATCH RFC] mm: add MAP_EXCLUSIVE to create exclusive user mappings In-Reply-To: <20191029085551.GA18773@rapoport-lnx> Message-ID: References: <1572171452-7958-1-git-send-email-rppt@kernel.org> <1572171452-7958-2-git-send-email-rppt@kernel.org> <20191028123124.ogkk5ogjlamvwc2s@box> <20191028130018.GA7192@rapoport-lnx> <20191028131623.zwuwguhm4v4s5imh@box> <20191029085551.GA18773@rapoport-lnx> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 29 Oct 2019, Mike Rapoport wrote: > I've talked with Thomas yesterday and he suggested something similar: > > When the MAP_EXCLUSIVE request comes for the first time, we allocate a huge > page for it and then use this page as a pool of 4K pages for subsequent > requests. Once this huge page is full we allocate a new one and append it > to the pool. When all the 4K pages that comprise the huge page are freed > the huge page is collapsed. Or write a device driver that allows you to mmap a secure area and avoid all core kernel modifications? /dev/securemem or so? It may exist already.