Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2938220pxk; Sun, 4 Oct 2020 18:32:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyxO/HMNdVS5kF0ZIN3gW+KTfrskC6sWbXrOEwJZa6du214dE0sfOrbw9uW4XG+yzxQnx/d X-Received: by 2002:a17:906:1c50:: with SMTP id l16mr3941584ejg.144.1601861566400; Sun, 04 Oct 2020 18:32:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601861566; cv=none; d=google.com; s=arc-20160816; b=GoLzfkelKQbhtdRBwKNQSrMt8bULddRnSdHpnPnjN+aF2RxEmNeOwT6Tmr9RJnpb3L tD71MesP+Te+j3z0xtPZ8ZjsDwOxH4AXmukFl4ZiErPUqh8cC7ZefTbCNP+ujCWV0O3s tk/soJwl4j/okm5YZc0yd99TpqD3zZIoxsLz0QhXzThD1r/OLnwsvOTbhSn9UwbGgFZC kUmbKPNB+lTQ3BNjXjRdbwnVwRELYQdAxZ48a1kGJXr6Kj+pMZZ8AN9T//6OZk3xeXto pTIrK6uznkG6Sg7fYw4d5rePzb3JwZD9b65MHjLW40CxNBVEKWVZlmpg+iYzJxPWX6VW l1Cw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=0qSk/poAAlh1rgBkhNlRg8Se+ak0sbI4FbkVJHltdr8=; b=yXciGLPw/rAwv/y/w1Vaspva7gQfRIqYqDuAOZLE96FT+DewsxjIGGFvLaVBTEAjKi mQjw07MrzY8mQbGB4GC0cFTBS8A8sQC7lBd8XIKyQq7HJKGOLF/4tvdncIf/sYAKGBl/ Gjr1xkq33qLwJfXdVDXNSdpXSy/wrDZZ3yjBDk6q8vi1kk1g/iBx9Ok1RsjXjHx4SzIK byxUTJMo8LsNHimIYPfHFPTnNv3FJ8oZ0wtJiKbFg8yCznydLgqqKvVW8348sytZ5/Km ptZwMttEKGjzNbw3gB649mak5SeeRPBjAdEPDmnYOw4hGl0U4acceFLtLyEa3iPkfUfD u5IA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=mLsD6Ikb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id oc24si3853317ejb.530.2020.10.04.18.32.14; Sun, 04 Oct 2020 18:32:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=mLsD6Ikb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725904AbgJEBbG (ORCPT + 99 others); Sun, 4 Oct 2020 21:31:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60394 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725848AbgJEBbF (ORCPT ); Sun, 4 Oct 2020 21:31:05 -0400 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 76957C0613CE; Sun, 4 Oct 2020 18:31:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=0qSk/poAAlh1rgBkhNlRg8Se+ak0sbI4FbkVJHltdr8=; b=mLsD6Ikb8fCqRb4wFjxC2fwp7H 6AZNCciLtFbL3K6A/wkL/KkLBPZy63j6xad5I+eGexCvUSzAawRSWB0tAdmZ7ZjYWVMF3u1f4beLl EbuXu14fMeGwt9DUP7PyljNUqC8MBZec4xbzRZSYz6ZN6GG5dYcqh1bJlJrWFT9cDzBmtFSPtlLJu kIIBNzWc4yqOVkAo8+t3bFu9lVqUhmSdJJ+4WqfNVlVt1NZqh73O8P6aEucOpbm07TzfjFJ9w15hx OCTIdqdw4YvYD+7ySVKJ8qdr7E4U+75LrjQl9Q7jSF/VaWMm5twQhGbPE9SWxKPX6+Og1NAIGU/Az +viEtQWA==; Received: from willy by casper.infradead.org with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1kPFL3-00023F-T2; Mon, 05 Oct 2020 01:30:54 +0000 Date: Mon, 5 Oct 2020 02:30:53 +0100 From: Matthew Wilcox To: Jarkko Sakkinen Cc: x86@kernel.org, linux-sgx@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-mm@kvack.org, Andrew Morton , Jethro Beekman , Haitao Huang , Chunyang Hui , Jordan Hand , Nathaniel McCallum , Seth Moore , Darren Kenny , Sean Christopherson , Suresh Siddha , andriy.shevchenko@linux.intel.com, asapek@google.com, bp@alien8.de, cedric.xing@intel.com, chenalexchen@google.com, conradparker@google.com, cyhanish@google.com, dave.hansen@intel.com, haitao.huang@intel.com, kai.huang@intel.com, kai.svahn@intel.com, kmoy@google.com, ludloff@google.com, luto@kernel.org, nhorman@redhat.com, puiterwijk@redhat.com, rientjes@google.com, tglx@linutronix.de, yaozhangx@google.com, mikko.ylinen@intel.com Subject: Re: [PATCH v39 11/24] x86/sgx: Add SGX enclave driver Message-ID: <20201005013053.GJ20115@casper.infradead.org> References: <20201003045059.665934-1-jarkko.sakkinen@linux.intel.com> <20201003045059.665934-12-jarkko.sakkinen@linux.intel.com> <20201003195440.GD20115@casper.infradead.org> <20201004215049.GA43926@linux.intel.com> <20201004222750.GI20115@casper.infradead.org> <20201004234153.GA49415@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201004234153.GA49415@linux.intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 05, 2020 at 02:41:53AM +0300, Jarkko Sakkinen wrote: > On Sun, Oct 04, 2020 at 11:27:50PM +0100, Matthew Wilcox wrote: > > int ret = 0; > > > > mutex_lock(&encl->lock); > > rcu_read_lock(); > > Right, so xa_*() take RCU lock implicitly and xas_* do not. Not necessarily the RCU lock ... I did document all this in xarray.rst: https://www.kernel.org/doc/html/latest/core-api/xarray.html > > while (xas.index < idx_end) { > > page = xas_next(&xas); > > It should iterate through every possible page index within the range, > even the ones that do not have an entry, i.e. this loop also checks > that there are no empty slots. > > Does xas_next() go through every possible index, or skip the non-empty > ones? xas_next(), as its documentation says, will move to the next array index: https://www.kernel.org/doc/html/latest/core-api/xarray.html#c.xas_next > > if (!page || (~page->vm_max_prot_bits & vm_prot_bits)) > > ret = -EACCESS; > > break; > > } > > } > > rcu_read_unlock(); > > mutex_unlock(&encl->lock); > > In my Geminilake NUC the maximum size of the address space is 64GB for > an enclave, and it is not fixed but can grow in microarchitectures > beyond that. > > That means that in (*artificial*) worst case the locks would be kept for > 64*1024*1024*1024/4096 = 16777216 iterations. Oh, there's support for that on the XArray API too. xas_lock_irq(&xas); xas_for_each_marked(&xas, page, end, PAGECACHE_TAG_DIRTY) { xas_set_mark(&xas, PAGECACHE_TAG_TOWRITE); if (++tagged % XA_CHECK_SCHED) continue; xas_pause(&xas); xas_unlock_irq(&xas); cond_resched(); xas_lock_irq(&xas); } xas_unlock_irq(&xas);