Re: [PATCH] mm/uffd: UFFD_FEATURE_WP_ZEROPAGE

From: David Hildenbrand
Date: Tue Feb 21 2023 - 07:44:21 EST


"
UFFD_FEATURE_WP_UNPOPULATED: for anonymous memory, if PTEs/PMDs are still
unpopulated (no page mapped), uffd-wp protection to work will not require a
previous manual population (e.g., using MADV_POPULATE_READ). The kernel
might or might not populate the shared zeropage for that purpose. So after a
uffd-wp protection with UFFD_FEATURE_WP_UNPOPULATED enabled, the PTEs/PMDs
might or might not be populated.
"

I would really hope we don't mention "manual population" in the man page or
header comments for app developers.

That's "how to workaound some issue", I'll read it as "with flag XXX you
don't need to work around (issue YYY) by doing ZZZ".

It's much more straightforward to state what the flag will do. The
workaround can be documented somewhere but that shouldn't be in the general
description of the feature.

I don't have a strong opinion on the name, though. I guess you would like
the new feature to avoid using the term zeropage; I'm fine with changing it.


For example, it has to be clear that when doing an uffd-wp protect +
unprotect, that there could be suddenly zeropages mapped (observable via
uffd-missing later, /proc/pagemap).

I'd be fine with something like that.

[...]


[...]

Similarly, with zeropages (as in your current patch), getting a THP later
allocated requires going through khugepaged. In comparison, a PMD marker
could more easily avoid that. The huge zeropage can work around that, but
you'd still need an MADV_DONTNEED on the hole huge zeropage first to remove
it, in order to replace it with a "real" THP.

IMHO relying on khugepaged is fine.

Note again that the whole wr-protect idea so far is always talking on
PAGE_SIZE. Any write happened in whatever PMD/PUD marker will go into:

- A pte marker population storm, which happens _inside_ a page fault of
the workload thread (rather than the monitor thread),

- The bigger the pte marker (PUD > PMD > PTE), the higher possibility
that it'll trigger such a storm as long as any of the page is written.

It means no matter which way we choose, as long as a write happened the
whole THP idea will get lost as long as the tracking is still in progress.

I still think zeropage should be rare in serious productions, I think it's
more likely that above will happen easily in practise and it can have an
negative impact on page faults. Even if we give more chance of having THPs
in the future, we at least pay something else. It's hard to tell which is
more worthwhile.

Not to mention that'll introduce more compexity to the kernel besides the
anonymous support, which should still be relatively straightforward.

So I'm fine with switching to pte markers, but I'd leave the PMD+ markers
alone for now.

[...]



I wasn't really eager on this before because the workaround of pre-read
works good already (I assume slightly slower but it's fine; not until
someone starts to worry). But if we want to extend soft-dirty that's not
good at all to have any new user being requested to prefault memory and
figuring out why it's needed.


Having that said, I have the feeling that you and Muhammad have a plan to
make it work using uffd-wp and I won't interfere. It would be nicer to use
softdirty infrastructure IMHO, though.

Thanks. If you have any good idea on reusing soft-dirty, please shoot.
I'll be perfectly happy with it as long as it resolves the issue for
Muhammad. Trust me - I wished the soft dirty thing worked out, but
unfortunately it didn't.. Because at least so far uffd-wp has two major
issues as I can see:

(1) Memory type limitations (e.g. general fs memories stop working)

[1]

(2) Tracing uffd application is, afaict, impossible

I guess the nice thing is, that you can only track individual ranges, you
don't have to enable it for the whole process. I assume softdirty tracking
could be similarly extended, but with uffd-wp this comes naturally.


So if there's better way to do with soft-dirty or anything else (and I
assume it'll not be limited to any of above) it's time to say..

I started discussing that [1] but as nobody seemed to care about my input I
decided to not further spend my time on that. But maybe it's a more
fundamental issue we'd have to solve to get this clean.

The idea of merging VMAs during clear_refs sounds interesting.

Yes. the required changes would be fairly minimal. But I guess we'd still have to tackle some of the other issues to make it work really precise. (e.g., MADV_DONTNEED)



The problem I had with the original approach is that it required precise
softdirty tracking even when nobody cared about softdirty tracking, and that
it made wrong assumptions about the meaning of VM_SOFTDIRTY. We shouldn't
have to worry about any of that if it's disabled (just like with uffd-wp).


The semantical difference I see is that with uffd-wp, initially (pte_none())
all PTEs are "dirty". With soft-dirty, initially (pte_none()) all PTEs are
"clean". We work around that with VM_SOFTIDRTY, which sets all PTEs of a VMA
effectively dirty.


Maybe we should rethink that approach and logically track soft-clean
instead. That is, everything is assumed to be soft-dirty until we set it
clean on a PTE/PMD/PUD level. Setting something clean is wp'ing a PTE and
marking it soft-clean (which is, clearing the soft-dirty bit logically).

To me both solutions should be mostly the same but just inverted bits. The
bits (for async) doesn't make sense before the "trigger" is pulled, then
it's about 0/1 with inverted meanings to me. It's just that soft-dirty
will naturally work well with none ptes but uffd-wp is not (since none pte
has all bits 0).

I think what we really want to avoid is, creating a new VMA and requiring to populate page tables just to set the PTEs softdirty.

The VMA flag is one way, but it might prevent merging as we discovered. Changing the semantic of "pte_none()" to mean " dirty" is another one.



The special case is when we don't have anything mapped yet, which is the
same thing we are trying to handle AFAICS for uffd-wp here. A PTE
(pte_none()) in which case we have to install a soft-dirty PTE/PMD marker to
remember that we marked it as clean -- or map the shared zeropage to mark
that one clean (not set the soft-dirty bit).

Yes, soft-dirty is another valid user to pte markers; that's also in my
very original proposal of it. If we can have async-uffd-wp then it's
easier because the uffd-wp marker will simply be reused naturally.


Further, I would propose to have VM_SOFTDIRTY_ENABLED flags per VMA and
interfaces to (a) enable/disable it either for some VMAs or the whole MM and
(b) a process toggle to automatically enable softclean tracking on new VMAs.
So we can really only care about it when someone cares about softdirty
tracking. The old "VM_SOFTDIRTY" flag could go, because everything
(pte_none()) starts out softdirty. So VM_SOFTDIRTY -> VM_SOFTDIRTY_ENABLED
with changed semantics.

Enabling softdirty-tracking on a VMA might have to go over PTEs, to make
sure we really don't have any soft-clean leftovers due to imprecise
soft-dirty tracking on VMA level while it was disabled (setting all PTEs
soft-dirty if they not already are). Might require a thought if it's really
required.

Note that I think this resembles what we are doing with uffd-wp. Not sure if
we'd still have to handle some unmap handling on pagecache pages. We might
want to remember that they are soft-clean using a PTE marker.


Requires some more thought, but I'm going to throw it out here that I think
there might be ways to modify softdirty tracking.

As you mentioned, I think the new proposal is growing into uffd-wp-alike.
I think that's (maybe) also another reason why reusing uffd here is a good
idea, because we don't need to reinvent everything.

Need a new vma flag to identify from old? Uffd-wp already has it.

What happens if shmem swapped out? Uffd-wp handles it.

Need to be accurate and walk the pgtables? Uffd-wp does it..

Simply because we cared about getting it precise for uffd-wp, which nobody cared for before for soft-dirty. And yes, there are similar issues to be solve.

You are much rather turning uffd-wp with the async mode into a soft-dirty replacement, instead using what we learned with uffd-wp to make soft-dirty more precise.

Fair enough, I won't interfere. The natural way for me to tackle this would be to try fixing soft-dirty instead, or handle the details on how soft-dirty is implemented internally: not exposing to user space that we are using uffd-wp under the hood, for example.


Maybe that would be a reasonable approach? Handle this all internally if possible, and remove the old soft-dirty infrastructure once it's working.

We wouldn't be able to use uffd-wp + softdirty, but who really cares I guess ...


One thing I didn't mention before (mostly referring to the 1st major
"defect" of using uffd-wp above I said [1] on memory types): _maybe_ we can
someday extend at least async mode of uffd-wp to all memory types, so it'll
even get everything covered. So far I don't see a strong requirement of
doing so, but I don't see a major blocker either.

Architecture support is, of course, another issue. Of course, if we could replace soft-dirty tracking by uffd-wp internally that would make things easier ...


While the other "uffd cannot be nested" defect is actually the same to
soft-dirty (no way to have a tracee being able to clear_refs itself or
it'll also go a mess), it's just that we can still use soft-dirty to track
an uffd application.

I wonder if we really care about that. Would be good to know if there are any relevant softdirty users still around ... from what I understoodm even CRIU wants to handle it using uffd-wp.




The other thing is it provides a way to make anon and !anon behave the same
on empty ptes; it's a pity that it was not already like that.

In an ideal world, we'd simply be using PTE markers unconditionally I think
and avoid this zeropage feature :/

Is there any particular reason to have UFFD_FEATURE_WP_ZEROPAGE and not
simply always do that unconditionally? (sure, we have to indicate to user
space that it now works as expected) Are we really expecting to break user
space by protecting what was asked for to protect?

I suspect so.

From high level, the major functional changes will be:

(1) The user will start to receive more WP message with zero page being
reported,

(2) Wr-protecting a very sparse memory can be much slower

I would expect there're cases where the app just works as usual.

However in some other cases the user may really not care about zero pages
at all, and I had a feeling that's actually the majority.

Live snapshot is actually special because IIUC the old semantics should
work perfectly if the guest OS won't try to sanity check freed pages being
all zeros.. IOW that's some corner case, and if we can control that we may
not even need WP_ZEROPAGE too for QEMU, iiuc. For many other apps people
may leverage this (ignoring mem holes) and make the app faster.

Normally when I'm not confident of any functional change, I'd rather use a
flag. Luckily uffd is very friendly to that, so the user can have better
control of what to expect. Some future app may explicitly want to always
ignore zero pages when on extremely sparse mem, and without the flag it
can't choose.



We can always optimize this behavior in the future with either
PMD/PUD/.. pte markers as you said, but IMHO that just needs further
justification on the complexity, and also on whether that's beneficial to
the majority to become the default behavior.

As I said, usually any new features require good justification. Maybe there
really is a measurable performance gain (less syscalls, less pgtable walks).

Muhammad may have a word to say here; let's see whether he has any comment.

Besides that, as I replied above I'll collect some data in my next post
regardless, with an attempt to optimize with huge zeropages on top.

If we can agree on making the shared zeropage an implementation detail, that
would be great and I'd see long-term value in that.

[1]
https://lkml.kernel.org/r/d95d59d7-308d-831c-d8bd-16d06e66e8af@xxxxxxxxxx

So I assume there's no major issue to not continue with a new version, then
I'll move on.

Jup.

--
Thanks,

David / dhildenb