Received: by 2002:ab2:60d1:0:b0:1f7:5705:b850 with SMTP id i17csp132971lqm; Tue, 30 Apr 2024 15:38:10 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCX0oGoYY33G/Z/xtRa48X/V/I63KjdTqYVi61u56/uE7/SQZWLS7Nif3FWoi/4jok8008a60m0FWokRg4uwoO9lkYyZ/RcAPLp0UxYexg== X-Google-Smtp-Source: AGHT+IFQcG3Lnjn5uScDVg1ubvCfoFZXqxpMf2EvhUR8T2BS7ectoHS0x33zs49uftr6bzBLkvVO X-Received: by 2002:a17:90b:104:b0:2b0:d249:4e88 with SMTP id p4-20020a17090b010400b002b0d2494e88mr1008086pjz.26.1714516690033; Tue, 30 Apr 2024 15:38:10 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714516690; cv=pass; d=google.com; s=arc-20160816; b=MQnqkiRMzYJJmJP3lMb8SJdkjHRZsWkk7PgYYUsciNZ5NZ4yl6NmL9fFRNPY7uWxpt v4DZz6ihT5YzoRDo/xfbrtWdEk2fOpPZfcx+wQ+N3LXyE+Dmz5WiejBef9puFvxf1L5B GyulSGlctbspsdXhVem2XEQL0ROzQhf7F5xj8/iGFuJ4YX1a5pPmwAPYDVoMyubrp+ej 1hmmMyDbkfP+94MenwWq6V+dGWq9kw9ehQZe4ytFsmIHoFhzDQQE2W4jtviDSofYXtEH zCOsWgjvCkPBqiSTDN6kXlMH+D7vubaqLmi+0u5IRYErFHpdP4c9uTYmt5l/51/YT+NR BwJA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=J1MYiigHTz2ARmlrPI5thPeGD4kl5zJ18yxnkET8n9g=; fh=G1r0sJ0F/0v82zumykPUwC7a5Du5vVkWNEWao5ifD3o=; b=iF9hTVklzhp1LbM08FsrE1Xrh3eeIgQ/Ei3YrTvnxME6FgPBBiKAs4mT7Bqnmyl4zb 3B8VWbZylU4k8pQWHdXIQc/L1uuG5QAccWtMrtr0nCN45jy9nW6g1F4BclHSDlWjBXrS N5QSk91+WwNNY7b056Ch4O8f03a/C6K5MYxzx/ZkT3RT/S9kZR4kPNKqFy/WvV0dMDrC 6vQZVYcnbFfcTSQiJup4SQ03AFgB0UDllFZfMEG/hld3xMZMxhAsLpDHGpOopcDVAO6q yay98+Xn7xZ9A1bhgoOWQKwiD+Cs96GvXEOosjt0ubONqpx59Xiq2HoN2CoOM7cWDDGj ldng==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BqDUdrAY; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-164657-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-164657-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id gq18-20020a17090b105200b002adefef518esi181825pjb.163.2024.04.30.15.38.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Apr 2024 15:38:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-164657-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BqDUdrAY; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-164657-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-164657-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 52D1E2853F3 for ; Tue, 30 Apr 2024 19:51:45 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id D420D1A38CD; Tue, 30 Apr 2024 19:51:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="BqDUdrAY" Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 40A33199E80; Tue, 30 Apr 2024 19:51:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.16 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714506673; cv=none; b=eX4gw/K7Jcjg7eDGjpEcQxpFhW9hnFJKYZDWztO3Msz7/blTOWMTh3QWpth/i1dUkL4eRHrLJbqs9PK8CIvHpfGo6lQ4RGT154oNt4mWBfFuVN2W/fEYISy31x1v2FbG84JGEFqmg41RTYRv9Rnk+h36+ZEr+t6GnNBYK9as538= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714506673; c=relaxed/simple; bh=J0blwLx2hBzl0eYexavgK9sNle3oc2zPuc7qAUujQts=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=gVF3zrzD3u6EL/meiP4i4c3Vh7XcYJhX4Y+7+75qoiCAnaZgw0NJkY0jEUH2OILjbJKJcWPJJsPk1WoT9SYL7xM6ssEkPNYOFu6wVp6hfJz+OW4kvpVMU9bqXW7ZVgkeUP8OQAPOs/WkNMWVwgWX9x6XYuiBIur8+l9hYWs9iq8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=BqDUdrAY; arc=none smtp.client-ip=198.175.65.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1714506672; x=1746042672; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=J0blwLx2hBzl0eYexavgK9sNle3oc2zPuc7qAUujQts=; b=BqDUdrAYXBXe9PEsNSSoDTt/jTlpLKq3vzK3YQzuGXC4H5atWWCRakzn Ed7Ap6/ArAHAhQyP/nMkWjFz7a+grExFla69hYDESJ468UFrraKnVK/BQ 8q18Hx6miiTf/HkLnVI3ispKiXCN6bWumDOwxd9YqxqfIU19yghppaLLZ fL/7vrzDkQtSv/0S/niIuQbfUeUvx+wer7ibAvytu5YQyBhdTEn4M912r j0TTUirLn3jErlzNtm+UHdcFmk08jFfchKXtu83GdfwPHwFImYhmmT6rb smzRINprLWiUxVhovyz1VGydqVvr3/yav2BtjXz8HtaTGc8htynVpuIcO Q==; X-CSE-ConnectionGUID: 0G6XvUvOQ+iSVd/Utm1QnQ== X-CSE-MsgGUID: B9Z2WXG9TfWvsmOfb24uCQ== X-IronPort-AV: E=McAfee;i="6600,9927,11060"; a="10355559" X-IronPort-AV: E=Sophos;i="6.07,243,1708416000"; d="scan'208";a="10355559" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by orvoesa108.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Apr 2024 12:51:09 -0700 X-CSE-ConnectionGUID: iU5fBlWQRT2SfLxj8vZsFw== X-CSE-MsgGUID: raUjK7ZTSGqejwRgyWRycw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,243,1708416000"; d="scan'208";a="31280294" Received: from b4969161e530.jf.intel.com ([10.165.56.46]) by orviesa003.jf.intel.com with ESMTP; 30 Apr 2024 12:51:08 -0700 From: Haitao Huang To: jarkko@kernel.org, dave.hansen@linux.intel.com, kai.huang@intel.com, tj@kernel.org, mkoutny@suse.com, linux-kernel@vger.kernel.org, linux-sgx@vger.kernel.org, x86@kernel.org, cgroups@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, sohil.mehta@intel.com, tim.c.chen@linux.intel.com Cc: zhiquan1.li@intel.com, kristen@linux.intel.com, seanjc@google.com, zhanb@microsoft.com, anakrish@microsoft.com, mikko.ylinen@linux.intel.com, yangjie@microsoft.com, chrisyan@microsoft.com Subject: [PATCH v13 00/14] Add Cgroup support for SGX EPC memory Date: Tue, 30 Apr 2024 12:50:54 -0700 Message-Id: <20240430195108.5676-1-haitao.huang@linux.intel.com> X-Mailer: git-send-email 2.25.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit SGX Enclave Page Cache (EPC) memory allocations are separate from normal RAM allocations, and are managed solely by the SGX subsystem. The existing cgroup memory controller cannot be used to limit or account for SGX EPC memory, which is a desirable feature in some environments, e.g., support for pod level control in a Kubernates cluster on a VM or bare-metal host [1,2]. This patchset implements the support for sgx_epc memory within the misc cgroup controller. A user can use the misc cgroup controller to set and enforce a max limit on total EPC usage per cgroup. The implementation reports current usage and events of reaching the limit per cgroup as well as the total system capacity. Much like normal system memory, EPC memory can be overcommitted via virtual memory techniques and pages can be swapped out of the EPC to their backing store, which are normal system memory allocated via shmem and accounted by the memory controller. Similar to per-cgroup reclamation done by the memory controller, the EPC misc controller needs to implement a per-cgroup EPC reclaiming process: when the EPC usage of a cgroup reaches its hard limit ('sgx_epc' entry in the 'misc.max' file), the cgroup starts swapping out some EPC pages within the same cgroup to make room for new allocations. For that, this implementation tracks reclaimable EPC pages in a separate LRU list in each cgroup, and below are more details and justification of this design. Track EPC pages in per-cgroup LRUs (from Dave) ---------------------------------------------- tl;dr: A cgroup hitting its limit should be as similar as possible to the system running out of EPC memory. The only two choices to implement that are nasty changes the existing LRU scanning algorithm, or to add new LRUs. The result: Add a new LRU for each cgroup and scans those instead. Replace the existing global cgroup with the root cgroup's LRU (only when this new support is compiled in, obviously). The existing EPC memory management aims to be a miniature version of the core VM where EPC memory can be overcommitted and reclaimed. EPC allocations can wait for reclaim. The alternative to waiting would have been to send a signal and let the enclave die. This series attempts to implement that same logic for cgroups, for the same reasons: it's preferable to wait for memory to become available and let reclaim happen than to do things that are fatal to enclaves. There is currently a global reclaimable page SGX LRU list. That list (and the existing scanning algorithm) is essentially useless for doing reclaim when a cgroup hits its limit because the cgroup's pages are scattered around that LRU. It is unspeakably inefficient to scan a linked list with millions of entries for what could be dozens of pages from a cgroup that needs reclaim. Even if unspeakably slow reclaim was accepted, the existing scanning algorithm only picks a few pages off the head of the global LRU. It would either need to hold the list locks for unreasonable amounts of time, or be taught to scan the list in pieces, which has its own challenges. Unreclaimable Enclave Pages --------------------------- There are a variety of page types for enclaves, each serving different purposes [5]. Although the SGX architecture supports swapping for all types, some special pages, e.g., Version Array(VA) and Secure Enclave Control Structure (SECS)[5], holds meta data of reclaimed pages and enclaves. That makes reclamation of such pages more intricate to manage. The SGX driver global reclaimer currently does not swap out VA pages. It only swaps the SECS page of an enclave when all other associated pages have been swapped out. The cgroup reclaimer follows the same approach and does not track those in per-cgroup LRUs and considers them as unreclaimable pages. The allocation of these pages is counted towards the usage of a specific cgroup and is subject to the cgroup's set EPC limits. Earlier versions of this series implemented forced enclave-killing to reclaim VA and SECS pages. That was designed to enforce the 'max' limit, particularly in scenarios where a user or administrator reduces this limit post-launch of enclaves. However, subsequent discussions [3, 4] indicated that such preemptive enforcement is not necessary for the misc-controllers. Therefore, reclaiming SECS/VA pages by force-killing enclaves were removed, and the limit is only enforced at the time of new EPC allocation request. When a cgroup hits its limit but nothing left in the LRUs of the subtree, i.e., nothing to reclaim in the cgroup, any new attempt to allocate EPC within that cgroup will result in an 'ENOMEM'. Unreclaimable Guest VM EPC Pages -------------------------------- The EPC pages allocated for guest VMs by the virtual EPC driver are not reclaimable by the host kernel [6]. Therefore an EPC cgroup also treats those as unreclaimable and returns ENOMEM when its limit is hit and nothing reclaimable left within the cgroup. The virtual EPC driver translates the ENOMEM error resulted from an EPC allocation request into a SIGBUS to the user process exactly the same way handling host running out of physical EPC. This work was originally authored by Sean Christopherson a few years ago, and previously modified by Kristen C. Accardi to utilize the misc cgroup controller rather than a custom controller. I have been updating the patches based on review comments since V2 [7-17], simplified the implementation/design, added selftest scripts, fixed some stability issues found from testing. Thanks to all for the review/test/tags/feedback provided on the previous versions. I appreciate your further reviewing/testing and providing tags if appropriate. --- v13: - Only allocate workqueue for SGX cgroup when misc is enabled and BUG_ON() when allocation fails - Add more tags - Commit logs and style improvements (Kai) - Test script improvements (Jarkko) V12: - Integrate test scripts to kselftests "run_tests" target. (Jarkko) - Remove CGROUP_SGX_EPC kconfig, conditionally compile with CGROUP_MISC enabled. (Jarkko) - Explain why taking 'struct misc_cg *cg' as parameter, but not 'struct misc_res *res' in the changelog for patch #2. (Kai) - Remove "unlikely" in patch #2 (Kai) V11: - Update copyright years and use c style (Kai) - Improve and simplify test scripts: remove cgroup-tools and bash dependency, drop cgroup v1. (Jarkko, Michal) - Add more stub/wrapper functions to minimize #ifdefs in c file. (Kai) - Revise commit message for patch #8 to clarify design rational (Kai) - Print error instead of WARN for init failure. (Kai) - Add check for need to queue an async reclamation before returning from sgx_cgroup_try_charge(), do so if needed. V10: - Use enum instead of boolean for the 'reclaim' parameters in sgx_alloc_epc_page(). (Dave, Jarkko) - Pass mm struct instead of a boolean 'indirect'. (Dave, Jarkko) - Add comments/macros to clarify the cgroup async reclaimer design. (Kai) - Simplify sgx_reclaim_pages() signature, removing a pointer passed in. (Kai) - Clarify design of sgx_cgroup_reclaim_pages(). (Kai) - Does not return a value for callers to check. - Its usage pattern is similar to that of sgx_reclaim_pages() now - Add cond_resched() in the loop in the cgroup reclaimer to improve liveliness. - Add logic for cgroup level reclamation in sgx_reclaim_direct() - Restructure V9 patches 7-10 to make them flow better. (Kai) - Disable cgroup if workqueue allocation failed during init. (Kai) - Shorten names for EPC cgroup functions, structures and variables. (Jarkko) - Separate out a helper for for addressing single iteration of the loop in sgx_cgroup_try_charge(). (Jarkko) - More cleanup/clarifying/comments/style fixes. (Kai, Jarkko) V9: - Add comments for static variables outside functions. (Jarkko) - Remove unnecessary ifs. (Tim) - Add more Reviewed-By: tags from Jarkko and TJ. V8: - Style fixes. (Jarkko) - Abstract _misc_res_free/alloc() (Jarkko) - Remove unneeded NULL checks. (Jarkko) V7: - Split the large patch for the final EPC implementation, #10 in V6, into smaller ones. (Dave, Kai) - Scan and reclaim one cgroup at a time, don't split sgx_reclaim_pages() into two functions (Kai) - Removed patches to introduce the EPC page states, list for storing candidate pages for reclamation. (not needed due to above changes) - Make ops one per resource type and store them in array (Michal) - Rename the ops struct to misc_res_ops, and enforce the constraints of required callback functions (Jarkko) - Initialize epc cgroup in sgx driver init function. (Kai) - Moved addition of priv field to patch 4 where it was used first. (Jarkko) - Split sgx_get_current_epc_cg() out of sgx_epc_cg_try_charge() (Kai) - Use a static for root cgroup (Kai) [1]https://lore.kernel.org/all/DM6PR21MB11772A6ED915825854B419D6C4989@DM6PR21MB1177.namprd21.prod.outlook.com/ [2]https://lore.kernel.org/all/ZD7Iutppjj+muH4p@himmelriiki/ [3]https://lore.kernel.org/lkml/7a1a5125-9da2-47b6-ba0f-cf24d84df16b@intel.com/ [4]https://lore.kernel.org/lkml/yz44wukoic3syy6s4fcrngagurkjhe2hzka6kvxbajdtro3fwu@zd2ilht7wcw3/ [5]Documentation/arch/x86/sgx.rst, Section"Enclave Page Types" [6]Documentation/arch/x86/sgx.rst, Section "Virtual EPC" [7]v2: https://lore.kernel.org/all/20221202183655.3767674-1-kristen@linux.intel.com/ [8]v3: https://lore.kernel.org/linux-sgx/20230712230202.47929-1-haitao.huang@linux.intel.com/ [9]v4: https://lore.kernel.org/all/20230913040635.28815-1-haitao.huang@linux.intel.com/ [10]v5: https://lore.kernel.org/all/20230923030657.16148-1-haitao.huang@linux.intel.com/ [11]v6: https://lore.kernel.org/linux-sgx/20231030182013.40086-1-haitao.huang@linux.intel.com/ [12]v7: https://lore.kernel.org/linux-sgx/20240122172048.11953-1-haitao.huang@linux.intel.com/T/#t [13]v8: https://lore.kernel.org/linux-sgx/20240130020938.10025-1-haitao.huang@linux.intel.com/T/#t [14]v9: https://lore.kernel.org/lkml/20240205210638.157741-1-haitao.huang@linux.intel.com/T/ [15]v10: https://lore.kernel.org/linux-sgx/20240328002229.30264-1-haitao.huang@linux.intel.com/T/#t [16]v11: https://lore.kernel.org/lkml/20240410182558.41467-1-haitao.huang@linux.intel.com/ [17]v12: https://lore.kernel.org/lkml/20240416032011.58578-1-haitao.huang@linux.intel.com/ Haitao Huang (3): x86/sgx: Replace boolean parameters with enums x86/sgx: Charge mem_cgroup for per-cgroup reclamation selftests/sgx: Add scripts for EPC cgroup testing Kristen Carlson Accardi (9): cgroup/misc: Add per resource callbacks for CSS events cgroup/misc: Export APIs for SGX driver cgroup/misc: Add SGX EPC resource type x86/sgx: Implement basic EPC misc cgroup functionality x86/sgx: Abstract tracking reclaimable pages in LRU x86/sgx: Add basic EPC reclamation flow for cgroup x86/sgx: Implement async reclamation for cgroup x86/sgx: Abstract check for global reclaimable pages x86/sgx: Turn on per-cgroup EPC reclamation Sean Christopherson (2): x86/sgx: Add sgx_epc_lru_list to encapsulate LRU list Docs/x86/sgx: Add description for cgroup support Documentation/arch/x86/sgx.rst | 83 +++++ arch/x86/kernel/cpu/sgx/Makefile | 1 + arch/x86/kernel/cpu/sgx/encl.c | 41 +-- arch/x86/kernel/cpu/sgx/encl.h | 7 +- arch/x86/kernel/cpu/sgx/epc_cgroup.c | 317 ++++++++++++++++++ arch/x86/kernel/cpu/sgx/epc_cgroup.h | 101 ++++++ arch/x86/kernel/cpu/sgx/ioctl.c | 10 +- arch/x86/kernel/cpu/sgx/main.c | 217 ++++++++---- arch/x86/kernel/cpu/sgx/sgx.h | 50 ++- arch/x86/kernel/cpu/sgx/virt.c | 2 +- include/linux/misc_cgroup.h | 41 +++ kernel/cgroup/misc.c | 107 ++++-- tools/testing/selftests/sgx/Makefile | 3 +- tools/testing/selftests/sgx/README | 109 ++++++ tools/testing/selftests/sgx/ash_cgexec.sh | 16 + tools/testing/selftests/sgx/config | 4 + .../selftests/sgx/run_epc_cg_selftests.sh | 295 ++++++++++++++++ tools/testing/selftests/sgx/settings | 2 + .../selftests/sgx/watch_misc_for_tests.sh | 11 + 19 files changed, 1307 insertions(+), 110 deletions(-) create mode 100644 arch/x86/kernel/cpu/sgx/epc_cgroup.c create mode 100644 arch/x86/kernel/cpu/sgx/epc_cgroup.h create mode 100644 tools/testing/selftests/sgx/README create mode 100755 tools/testing/selftests/sgx/ash_cgexec.sh create mode 100644 tools/testing/selftests/sgx/config create mode 100755 tools/testing/selftests/sgx/run_epc_cg_selftests.sh create mode 100644 tools/testing/selftests/sgx/settings create mode 100755 tools/testing/selftests/sgx/watch_misc_for_tests.sh base-commit: ed30a4a51bb196781c8058073ea720133a65596f -- 2.25.1