Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2201502rwb; Wed, 30 Nov 2022 03:52:27 -0800 (PST) X-Google-Smtp-Source: AA0mqf4S0G4QcxtiEIBccAFDJDnabQf8FC9+U2SF0uc/Y9VJh1syNCcmwnLjf9ZpwCuPPXGItYhx X-Received: by 2002:a17:90a:fb86:b0:219:26b5:d41e with SMTP id cp6-20020a17090afb8600b0021926b5d41emr18794981pjb.20.1669809147429; Wed, 30 Nov 2022 03:52:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669809147; cv=none; d=google.com; s=arc-20160816; b=CtUtZMWcqj5jhiHRytOMVyTdpQCC9cEu907vJCwACTsLsr+7I6UAEGv36xJ7XOfg3r zWUZfUvDh9rfHz7atxRUUFaQSNoUAWdS8VbNlj9EfoiC6w4RN2KeYrpuXugShvxX3BwQ 6M4eSma796YdRV0gwoxjYCaIuWyCeSa+PhVTaeL5vPsbsoZwC4arcr4H0gDmaswKEGr7 4jSd/n5iwG4uOviOy29Gpqd2ymmbgWoLlFSTALrvN4SP2hlYq0IAb7eONF7znc0ZZE8X xOB2VvIW7t2kZ+R0rTLNRgf4zZBfh0GaR7JBgjuDboXO4RCQS90kql5R/PhoJYswpqrl 9cNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:to:content-language:subject:cc:user-agent:mime-version :date:message-id:dkim-signature; bh=CRMXlK9q6IxkBVdAVSylNuZOok6ssVWzGlvip1y2a0U=; b=SqEPlF1Au4G7LnuAA4lr8E/8iPQtwpFJHakYlUCv1qkmvav7KnxKaRnOrHsZP5ZDzq 8V32xk+CItXQk+hh7ClsMvGDE5IMEnceWST1ceE6Sxr4WxbRKIXWIkCk/HyRlZNQzZOg sDHarloLtAuBg7BmgWa75fBMdQJYxm5de2hbwKywaojQKTl6rVefm/lW2cGkfeGbiP30 fUhdWoy/1O0O8wx6A3BIvL36K5z80g7j4KJDuu2Rk4S7qVR8bTt8JprSSM5J9qBnwiNy rv0e6S9dzIHXKUbkpWP+3JWt3jU8/AYnUKljBAsGXe9FFN31WSYWNqHILPPGlSuaN6Pd hrlA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=eqmoQWHm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s9-20020a17090330c900b0016d2e8c2233si990381plc.333.2022.11.30.03.52.16; Wed, 30 Nov 2022 03:52:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=eqmoQWHm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232460AbiK3Lmf (ORCPT + 84 others); Wed, 30 Nov 2022 06:42:35 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35916 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229468AbiK3Lmc (ORCPT ); Wed, 30 Nov 2022 06:42:32 -0500 Received: from madras.collabora.co.uk (madras.collabora.co.uk [IPv6:2a00:1098:0:82:1000:25:2eeb:e5ab]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A24752EF23; Wed, 30 Nov 2022 03:42:30 -0800 (PST) Received: from [192.168.10.9] (unknown [39.45.24.242]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: usama.anjum) by madras.collabora.co.uk (Postfix) with ESMTPSA id 19C756602B30; Wed, 30 Nov 2022 11:42:21 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1669808548; bh=9XxmEbSKYgeKKnokakfeqMw6DJF63EW/WOBjbUfGkcw=; h=Date:Cc:Subject:To:References:From:In-Reply-To:From; b=eqmoQWHm1Y0AOAaCC4L2WSnMjWwwdEznVS6JbSYcnA8AH+uQgY/cfFfYDN6mBF1fF q15WIefsFjY+C2EAjXjzniJe6Ay9kqUgjZlg5nvM2Fjxh7T9Hi6Yvy1O5cWV8CvUV6 K6KqiOHffYJ8e9mTeVg2Ya2vUaMuwfcpIPgWDqRpBebQYJ/5ITNTx9JM5vozes0/Nc E2cxBwN/zhkmJ34MvqYGNPgyqhSm6FshGgpYr0Atrxwb9WGANwd8Og1RcQ3ZtoB9I0 s7mdl4k5JcWg2zjkZpLS/jOBZA7O6SDgWiGLYZBCFRM72fm8RG3Fhv6xITMVmeevWi 7Lj2oVSAkf+xw== Message-ID: <3d069746-d440-f1a6-1b64-5ee196c2fc21@collabora.com> Date: Wed, 30 Nov 2022 16:42:17 +0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.5.0 Cc: Muhammad Usama Anjum , Suren Baghdasaryan , Greg KH , Christian Brauner , Peter Xu , Yang Shi , Vlastimil Babka , Zach O'Keefe , "Matthew Wilcox (Oracle)" , "Gustavo A. R. Silva" , Dan Williams , kernel@collabora.com, Gabriel Krisman Bertazi , Peter Enderborg , "open list : KERNEL SELFTEST FRAMEWORK" , Shuah Khan , open list , "open list : PROC FILESYSTEM" , "open list : MEMORY MANAGEMENT" , =?UTF-8?B?TWljaGHFgiBNaXJvc8WCYXc=?= , Andrei Vagin , Danylo Mocherniuk , Alexander Viro , Andrew Morton , Paul Gofman , Cyrill Gorcunov Subject: Re: [PATCH v6 0/3] Implement IOCTL to get and/or the clear info about PTEs Content-Language: en-US To: David Hildenbrand , Peter Xu References: <20221109102303.851281-1-usama.anjum@collabora.com> <9c167d01-ef09-ec4e-b4a1-2fff62bf01fe@redhat.com> <6fdce544-8d4f-8b3c-9208-735769a9e624@collabora.com> <254130e7-7fb1-6cf1-e8fa-5bc2d4450431@collabora.com> From: Muhammad Usama Anjum In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/21/22 8:55 PM, David Hildenbrand wrote: > On 21.11.22 16:00, Muhammad Usama Anjum wrote: >> Hello, >> >> Thank you for replying. >> >> On 11/14/22 8:46 PM, David Hildenbrand wrote: >>>> The soft-dirtiness is stored in the PTE. VMA is marked dirty to store the >>>> dirtiness for reused regions. Clearing the soft-dirty status of whole >>>> process is straight forward. When we want to clear/monitor the >>>> soft-dirtiness of a part of the virtual memory, there is a lot of internal >>>> noise. We don't want the non-dirty pages to become dirty because of how >>>> the >>>> soft-dirty feature has been working. Soft-dirty feature wasn't being used >>>> the way we want to use now. While monitoring a part of memory, it is not >>>> acceptable to get non-dirty pages as dirty. Non-dirty pages become dirty >>>> when the two VMAs are merged without considering if they both are dirty or >>>> not (34228d473efe). To monitor changes over the memory, sometimes VMAs are >>>> split to clear the soft-dirty bit in the VMA flags. But sometimes kernel >>>> decide to merge them backup. It is so waste of resources. >>> >>> Maybe you'd want a per-process option to not merge if the VM_SOFTDIRTY >>> property differs. But that might be just one alternative for handling this >>> case. >>> >>>> >>>> To keep things consistent, the default behavior of the IOCTL is to output >>>> even the extra non-dirty pages as dirty from the kernel noise. A optional >>>> PAGEMAP_NO_REUSED_REGIONS flag is added for those use cases which aren't >>>> tolerant of extra non-dirty pages. This flag can be considered as >>>> something >>>> which is by-passing the already present buggy implementation in the >>>> kernel. >>>> It is not buggy per say as the issue can be solved if we don't allow the >>>> two VMA which have different soft-dirty bits to get merged. But we are >>>> allowing that so that the total number of VMAs doesn't increase. This was >>>> acceptable at the time, but now with the use case of monitoring a part of >>>> memory for soft-dirty doesn't want this merging. So either we need to >>>> revert 34228d473efe and PAGEMAP_NO_REUSED_REGIONS flag will not be needed >>>> or we should allow PAGEMAP_NO_REUSED_REGIONS or similar mechanism to >>>> ignore >>>> the extra dirty pages which aren't dirty in reality. >>>> >>>> When PAGEMAP_NO_REUSED_REGIONS flag is used, only the PTEs are checked to >>>> find if the pages are dirty. So re-used regions cannot be detected. This >>>> has the only side-effect of not checking the VMAs. So this is >>>> limitation of >>>> using this flag which should be acceptable in the current state of code. >>>> This limitation is okay for the users as they can clear the soft-dirty bit >>>> of the VMA before starting to monitor a range of memory for >>>> soft-dirtiness. >>>> >>>> >>>>> Please separate that part out from the other changes; I am still not >>>>> convinced that we want this and what the semantical implications are. >>>>> >>>>> Let's take a look at an example: can_change_pte_writable() >>>>> >>>>>       /* Do we need write faults for softdirty tracking? */ >>>>>       if (vma_soft_dirty_enabled(vma) && !pte_soft_dirty(pte)) >>>>>           return false; >>>>> >>>>> We care about PTE softdirty tracking, if it is enabled for the VMA. >>>>> Tracking is enabled if: vma_soft_dirty_enabled() >>>>> >>>>>       /* >>>>>        * Soft-dirty is kind of special: its tracking is enabled when >>>>>        * the vma flags not set. >>>>>        */ >>>>>       return !(vma->vm_flags & VM_SOFTDIRTY); >>>>> >>>>> Consequently, if VM_SOFTDIRTY is set, we are not considering the >>>>> soft_dirty >>>>> PTE bits accordingly. >>>> Sorry, I'm unable to completely grasp the meaning of the example. We have >>>> followed clear_refs_write() to write the soft-dirty bit clearing code in >>>> the current patch. Dirtiness of the VMA and the PTE may be set >>>> independently. Newer allocated memory has dirty bit set in the VMA. When >>>> something is written the memory, the soft dirty bit is set in the PTEs as >>>> well regardless if the soft dirty bit is set in the VMA or not. >>>> >>> >>> Let me try to find a simple explanation: >>> >>> After clearing a SOFTDIRTY PTE flag inside an area with VM_SOFTDIRTY set, >>> there are ways that PTE could get written to and it could become dirty, >>> without the PTE becoming softdirty. >>> >>> Essentially, inside a VMA with VM_SOFTDIRTY set, the PTE softdirty values >>> might be stale: there might be entries that are softdirty even though the >>> PTE is *not* marked softdirty. >> Can someone please share the example to reproduce this? In all of my >> testing, even if I ignore VM_SOFTDIRTY and only base my decision of >> soft-dirtiness on individual pages, it always passes. > > Quick reproducer (the first and easiest one that triggered :) ) > attached. > > With no kernel changes, it works as expected. > > # ./softdirty_mprotect > > > With the following kernel change to simulate what you propose it fails: > > diff --git a/fs/proc/task_mmu.c b/fs/proc/task_mmu.c > index d22687d2e81e..f2c682bf7f64 100644 > --- a/fs/proc/task_mmu.c > +++ b/fs/proc/task_mmu.c > @@ -1457,8 +1457,8 @@ static pagemap_entry_t pte_to_pagemap_entry(struct > pagemapread *pm, >                 flags |= PM_FILE; >         if (page && !migration && page_mapcount(page) == 1) >                 flags |= PM_MMAP_EXCLUSIVE; > -       if (vma->vm_flags & VM_SOFTDIRTY) > -               flags |= PM_SOFT_DIRTY; > +       //if (vma->vm_flags & VM_SOFTDIRTY) > +       //      flags |= PM_SOFT_DIRTY; >   >         return make_pme(frame, flags); >  } > > > # ./softdirty_mprotect > Page #1 should be softdirty > Thank you so much for sharing the issue and reproducer. After remapping the second part of the memory and m-protecting + m-unprotecting the whole memory, the PTE of the first half of the memory doesn't get marked as soft dirty even after writing multiple times to it. Even if soft-dirtiness is cleared on the whole process, the PTE of the first half memory doesn't get dirty. This seems like more of a bug in mprotect. The mprotect should not mess up with the soft-dirty flag in the PTEs. I'm debugging this. I hope to find the issue soon. Soft-dirty tracking in PTEs should be working correctly irrespective of the VM_SOFTDIRTY is set or not on the VMA. Cyrill has said in [1]: > ioctl might be an option indeed It brings some hope to this patch-set. [1] https://lore.kernel.org/all/Y4W0axw0ZgORtfkt@grain/ -- BR, Muhammad Usama Anjum