From: Dave Hansen <dave.hansen@intel.com>
To: Jue Wang <juew@google.com>,
Naoya Horiguchi <naoya.horiguchi@nec.com>,
Tony Luck <tony.luck@intel.com>,
Dave Hansen <dave.hansen@linux.intel.com>
Cc: Jiaqi Yan <jiaqiyan@google.com>, Greg Thelen <gthelen@google.com>,
Mina Almasry <almasrymina@google.com>,
linux-mm@kvack.org
Subject: Re: [RFC] Expose a memory poison detector ioctl to user space.
Date: Tue, 26 Apr 2022 08:40:44 -0700 [thread overview]
Message-ID: <b4c6c741-3109-c1ea-00fd-725f7a44fe66@intel.com> (raw)
In-Reply-To: <20220425163451.3818838-1-juew@google.com>
From your description, you have me mostly convinced that this is
something that needs to get fixed. The hardware patrol scrubber(s)
address the same basic problem, but don't seem to be flexible to your
specific needs.
But, have hardware vendors been receptive at all to making the patrol
scrubbers more tunable?
On 4/25/22 09:34, Jue Wang wrote:
> /* Could stop and return after the 1st poison is detected */
> #define MCESCAN_IOCTL_SCAN 0
>
> struct SysramRegion {
> /* input */
> uint64_t first_byte; /* first page-aligned physical address to scan */
> uint64_t length; /* page-aligned length of memory region to scan */
> /* output */
> uint32_t poisoned; /* 1 - a poisoned page is found, 0 - otherwise */
> uint32_t poisoned_pfn; /* PFN of the 1st detected poisoned page */
> }
So, the ioctl() caller has to know the physical address layout of the
system?
While this is a good start at a conversation, I think you might want to
back up a bit. You alluded to a few requirements that you have, like:
* Adjustable detector resource use based on system utilization
* Adjustable scan rate to ensure issues are found at a deterministic
rate
* Detector must be able to find errors in allocated, in-use memory
What about SEV-SNP or TDX private memory? It might be unmapped *and*
limited in how it can be accessed. For instance, TDX hosts can't
practically read guest memory. SEV-SNP hosts have special page mapping
requirements; the cost can't create arbitrary mappings with arbitrary
mapping sizes. What would this ioctl() do if asked to scan a TDX guest
private page?
Is doing it from userspace a strict requirement?
Would the detector just read memory?
Are there any other physical addresses which are RAM but should not have
the detector used on them?
next prev parent reply other threads:[~2022-04-26 15:39 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-04-25 16:34 Jue Wang
2022-04-26 15:40 ` Dave Hansen [this message]
2022-04-26 17:57 ` Jue Wang
2022-04-26 18:02 ` Jue Wang
2022-04-26 18:21 ` Dave Hansen
2022-04-26 19:25 ` Jue Wang
2022-04-26 19:52 ` Luck, Tony
2022-04-26 20:06 ` Jue Wang
2022-04-26 18:20 ` Dave Hansen
2022-04-26 19:23 ` Jue Wang
2022-04-26 19:39 ` Dave Hansen
2022-04-26 19:50 ` Jue Wang
2022-04-28 16:15 ` Erdem Aktas
2022-04-28 16:34 ` Dave Hansen
2022-04-29 19:46 ` Jue Wang
2022-04-29 21:10 ` Dave Hansen
2022-04-29 21:32 ` Jue Wang
2022-04-29 21:44 ` Jue Wang
2022-04-29 22:29 ` Dave Hansen
2022-04-29 22:53 ` Jue Wang
2022-05-02 15:30 ` Dave Hansen
2022-05-02 17:19 ` David Hildenbrand
2022-05-02 17:30 ` Jue Wang
2022-05-02 17:33 ` David Hildenbrand
2022-05-02 17:36 ` Jue Wang
2022-05-02 17:38 ` David Hildenbrand
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=b4c6c741-3109-c1ea-00fd-725f7a44fe66@intel.com \
--to=dave.hansen@intel.com \
--cc=almasrymina@google.com \
--cc=dave.hansen@linux.intel.com \
--cc=gthelen@google.com \
--cc=jiaqiyan@google.com \
--cc=juew@google.com \
--cc=linux-mm@kvack.org \
--cc=naoya.horiguchi@nec.com \
--cc=tony.luck@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox