From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.2 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id DCAEDC63797 for ; Thu, 22 Jul 2021 16:08:22 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id C227C6127C for ; Thu, 22 Jul 2021 16:08:22 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229529AbhGVP1q (ORCPT ); Thu, 22 Jul 2021 11:27:46 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:54843 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229453AbhGVP1o (ORCPT ); Thu, 22 Jul 2021 11:27:44 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1626970098; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=3U847PHnf4U65UGOCngARDgU60RbpKGtHQBvo8vLQMk=; b=A74QmyrbgeCr3S3NWJvzbNZp21+W68ouOw2tz9OV8iwBPkwP1pwEHrWg0/8BfXXJ9AVZ3I Lql1IiW3+dQVLhwWbbnq1xWEuuUMCIPk4otQC3c8nZ0PCYcAxj4VN05HGMAbFk+5LMqSqa Nsmnki3F4+FuUdybHIXdRWXqbzR6YcY= Received: from mail-qt1-f200.google.com (mail-qt1-f200.google.com [209.85.160.200]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-347-e0NY0vvYNlCavHVL2dZ-rg-1; Thu, 22 Jul 2021 12:08:16 -0400 X-MC-Unique: e0NY0vvYNlCavHVL2dZ-rg-1 Received: by mail-qt1-f200.google.com with SMTP id z19-20020a05622a0613b02902682e86c382so3635839qta.4 for ; Thu, 22 Jul 2021 09:08:16 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=3U847PHnf4U65UGOCngARDgU60RbpKGtHQBvo8vLQMk=; b=qyjPBwMob//u8ijX9FQGUPA7gGcEYhxVi2wufwFV/NQFFLbwgkwW/hlYUPDLrKiLfD ZVN5ueuCpYhoShS3t7JKZAianOgr/+F5LAZgvJ75YYdcuq78GwKLLvvZhTFoXbzpw9K6 HxaOujVbV5bO0nBbwkqiTdC4oMpemwd7dO5nBfiTmf610MRJVKxQzIk/vjlKizbtxlaA +Q+x8VDN5RHJXgnFYkdegQJfT7jMBk6ykOBb2zJ8ekvSiy3dX2MI88ytX3xnfqLRCsTx wfwd5bwOCzg60LYAozduDZHzEjCMu+K63WvNfG1pbe6+2y3vy8LVEER7rhwndDHKTS4o L0NQ== X-Gm-Message-State: AOAM533XRtS4wnDDl6mlPOWUbF5fK0Y/sJmSt59M1ZugoSzxb9/RkaSz HAjFVqp7sjwt1GdMHnroLyMVZzaPQakWGMf4C1Q4Z0EZ4YIM4vvAwWZ6vrPhLTnXyicww69cOoO clhbUMDjsSMoZny46im8Y6Co0 X-Received: by 2002:a37:aa4d:: with SMTP id t74mr369156qke.349.1626970096017; Thu, 22 Jul 2021 09:08:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwOAfTVWI6Es3Kyjx9S24QkB57/OJo27WVgVachrPC9UqBcZ9Sp+Gm3lgckZ30VEbgTQEbVYQ== X-Received: by 2002:a37:aa4d:: with SMTP id t74mr369131qke.349.1626970095702; Thu, 22 Jul 2021 09:08:15 -0700 (PDT) Received: from t490s (bras-base-toroon474qw-grc-65-184-144-111-238.dsl.bell.ca. [184.144.111.238]) by smtp.gmail.com with ESMTPSA id q3sm12838601qkn.14.2021.07.22.09.08.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 22 Jul 2021 09:08:15 -0700 (PDT) Date: Thu, 22 Jul 2021 12:08:13 -0400 From: Peter Xu To: David Hildenbrand Cc: Ivan Teterevkov , Tiberiu Georgescu , "linux-kernel@vger.kernel.org" , "linux-mm@kvack.org" , Axel Rasmussen , Nadav Amit , Jerome Glisse , "Kirill A . Shutemov" , Jason Gunthorpe , Alistair Popple , Andrew Morton , Andrea Arcangeli , Matthew Wilcox , Mike Kravetz , Hugh Dickins , Miaohe Lin , Mike Rapoport , "Carl Waldspurger [C]" , Florian Schmidt , "ovzxemul@gmail.com" Subject: Re: [PATCH v5 24/26] mm/pagemap: Recognize uffd-wp bit for shmem/hugetlbfs Message-ID: References: <5c3c84ee-02f6-a2af-13b8-5dcf70676641@redhat.com> <3a316327-0971-6c30-ca23-a2f9d580f97d@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <3a316327-0971-6c30-ca23-a2f9d580f97d@redhat.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 22, 2021 at 08:27:07AM +0200, David Hildenbrand wrote: > On 22.07.21 00:57, Peter Xu wrote: > > On Wed, Jul 21, 2021 at 06:28:03PM -0400, Peter Xu wrote: > > > Hi, Ivan, > > > > > > On Wed, Jul 21, 2021 at 07:54:44PM +0000, Ivan Teterevkov wrote: > > > > On Wed, Jul 21, 2021 4:20 PM +0000, David Hildenbrand wrote: > > > > > On 21.07.21 16:38, Ivan Teterevkov wrote: > > > > > > On Mon, Jul 19, 2021 5:56 PM +0000, Peter Xu wrote: > > > > > > > I'm also curious what would be the real use to have an accurate > > > > > > > PM_SWAP accounting. To me current implementation may not provide > > > > > > > accurate value but should be good enough for most cases. However not > > > > > > > sure whether it's also true for your use case. > > > > > > > > > > > > We want the PM_SWAP bit implemented (for shared memory in the pagemap > > > > > > interface) to enhance the live migration for some fraction of the > > > > > > guest VMs that have their pages swapped out to the host swap. Once > > > > > > those pages are paged in and transferred over network, we then want to > > > > > > release them with madvise(MADV_PAGEOUT) and preserve the working set > > > > > > of the guest VMs to reduce the thrashing of the host swap. > > > > > > > > > > There are 3 possibilities I think (swap is just another variant of the page cache): > > > > > > > > > > 1) The page is not in the page cache, e.g., it resides on disk or in a swap file. > > > > > pte_none(). > > > > > 2) The page is in the page cache and is not mapped into the page table. > > > > > pte_none(). > > > > > 3) The page is in the page cache and mapped into the page table. > > > > > !pte_none(). > > > > > > > > > > Do I understand correctly that you want to identify 1) and indicate it via > > > > > PM_SWAP? > > > > > > > > Yes, and I also want to outline the context so we're on the same page. > > > > > > > > This series introduces the support for userfaultfd-wp for shared memory > > > > because once a shared page is swapped, its PTE is cleared. Upon retrieval > > > > from a swap file, there's no way to "recover" the _PAGE_SWP_UFFD_WP flag > > > > because unlike private memory it's not kept in PTE or elsewhere. > > > > > > > > We came across the same issue with PM_SWAP in the pagemap interface, but > > > > fortunately, there's the place that we could query: the i_pages field of > > > > the struct address_space (XArray). In https://lkml.org/lkml/2021/7/14/595 > > > > we do it similarly to what shmem_fault() does when it handles #PF. > > > > > > > > Now, in the context of this series, we were exploring whether it makes > > > > any practical sense to introduce more brand new flags to the special > > > > PTE to populate the pagemap flags "on the spot" from the given PTE. > > > > > > > > However, I can't see how (and why) to achieve that specifically for > > > > PM_SWAP even with an extra bit: the XArray is precisely what we need for > > > > the live migration use case. Another flag PM_SOFT_DIRTY suffers the same > > > > problem as UFFD_WP_SWP_PTE_SPECIAL before this patch series, but we don't > > > > need it at the moment. > > > > > > > > Hope that clarification makes sense? > > > > > > Yes it helps, thanks. > > > > > > So I can understand now on how that patch comes initially, even if it may not > > > work for PM_SOFT_DIRTY but it seems working indeed for PM_SWAP. > > > > > > However I have a concern that I raised also in the other thread: I think > > > there'll be an extra and meaningless xa_load() for all the real pte_none()s > > > that aren't swapped out but just having no page at the back from the very > > > beginning. That happens much more frequent when the memory being observed by > > > pagemap is mapped in a huge chunk and sparsely mapped. > > > > > > With old code we'll simply skip those ptes, but now I have no idea how much > > > overhead would a xa_load() brings. > > Let's benchmark it then. Yes that's a good idea. The goal should be that we won't regress any existing pagemap users due to too slow sampling. > I feel like we really shouldn't be storing > unnecessarily data in page tables if they are readily available somehwere > else, because ... > > > > > > > Btw, I think there's a way to implement such an idea similar to the swap > > > special uffd-wp pte - when page reclaim of shmem pages, instead of putting a > > > none pte there maybe we can also have one bit set in the none pte showing that > > > this pte is swapped out. When the page faulted back we just drop that bit. > > > > > > That bit could be also scanned by pagemap code to know that this page was > > > swapped out. That should be much lighter than xa_load(), and that identifies > > > immediately from a real none pte just by reading the value. > > ... we are optimizing a corner case feature (pagemap) by affecting other > system parts. Just imagine > > 1. Forking: will always have to copy the whole page tables for shemem > instead of optimizing. > 2. New shmem mappings: will always have to sync back that bit from the > pagecache Both points seem valid. Not sure whether we can still keep the behavior single-process only, that should satisfy e.g. the guest tracking use case and I believe most of the cases. Then for fork() we can ignore this bit, and for new mappings we ignore too. But I do confess that's a new limitation even if so. > > And these are just the things that immediately come to mind. There is > certainly more (e.g., page table reclaim [1]). > > > > > > > Do you think this would work? > > > > Btw, I think that's what Tiberiu used to mention, but I think I just changed my > > mind.. Sorry to have brought such a confusion. > > > > So what I think now is: we can set it (instead of zeroing the pte) right at > > unmapping the pte of page reclaim. Code-wise, that can be a special flag > > (maybe, TTU_PAGEOUT?) passed over to try_to_unmap() of shrink_page_list() to > > differenciate from other try_to_unmap()s. > > > > I think that bit can also be dropped correctly e.g. when punching a hole in the > > file, then rmap_walk() can find and drop the marker (I used to suspect uffd-wp > > bit could get left-overs, but after a second thought here similarly, it seems > > it won't; as long as hole punching and vma unmapping will always be able to > > scan those marker ptes, then it seems all right to drop them correctly). > > > > But that's my wild thoughts; I could have missed something too. > > > > Adding to that, Peter can you enlighten me how uffd-wp on shmem combined > with the uffd-wp bit in page tables is supposed to work in general when > talking about multiple processes? > > Shmem means any process can modify any memory. To be able to properly catch > writes to such memory, the only way I can see it working is > > 1. All processes register uffd-wp on the shmem VMA > 2. All processes arm uffd-wp by setting the same uffd-wp bits in their page > tables for the affected shmem > 3. All processes synchronize, sending each other uffd-wp events when they > receive one > > This is quite ... suboptimal I have to say. This is really the only way I > can imagine uffd-wp to work reliably. Is there any obvious way to make this > work I am missing? > > But then, all page tables are already supposed to contain the uffd-wp bit. > Which makes me think that we can actually get rid of the uffd-wp bit in the > page table for pte_none() entries and instead store this information > somewhere else (in the page cache?) for all entries combined. > > So that simplification would result in > > 1. All processes register uffd-wp on the shmem VMA > 2. One processes wp-protects uffd-wp via the page cache (we can update all > PTEs in other processes) > 3. All processes synchronize, sending each other uffd-wp events when they > receive one > > The semantics of uffd-wp on shmem would be different to what we have so far > ... which would be just fine as we never had uffd-wp on shared memory. > > In an ideal world, 1. and 3. wouldn't be required and all registered uffd > listeners would be notified when any process writes to it. This is also a good point at least to be fully discussed, I wished there could be the ideal world, but I just don't yet know whether it exists.. As you see even if we want to do some trick in page cache it'll still need at least step 1 to have that process be okay and be aware of such trick otherwise there'll start to evolve more complicated privilege relationships. It's also easier to do like what we have right now, e.g. one vma is bind to only one uffd, and that uffd is definitely bind to the current mm. If we allow cross-process operations that'll be hard to tell how that works - say processes A,B,C shared the memory and wanted to wr-protect it, who (which uffd, as there can be three) should be servicing the fault from someone? Why that process has that privilege? I can't quickly tell. So the per-mm idea and keep things within pgtables do sound okay, and simplify things like this so all things are at least self-contained within one process, for either privilege or the rest. I also don't know whether dropping the uffd-wp bit will be easy for shmem. The page can be wr-protected for other reasons (e.g. soft dirty), even if we check the vma VM_UFFD_WP flag we won't be able to identify whether this is wr-protected by uffd. I don't see how we can avoid false positives otherwise. > > > Sure, for single-user shmem it would work just like !shmem, but then, maybe > that user really shouldn't be using shmem. But maybe I am missing something > important :) I see this in a bit different perspective; normally shmem and uffd-wp come from two different requirements: (1) shmem is definitely for data sharing, while (2) uffd-wp is for tracking page changes. When the requriements meet each other, we'll need something like this series. I don't know how it will go at last, but I hope we can fill up the gap so uffd-wp can be close to a complete stage. Thanks! -- Peter Xu