Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1609921ybh; Thu, 16 Jul 2020 17:49:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwzrP3PQqH2mxUPN+B/RBn+bKL4YeBNCFzgeeUn+Vnq3gVCXC9hCsUNvxbjBIvLGyBqArn0 X-Received: by 2002:a17:906:6499:: with SMTP id e25mr6140941ejm.352.1594946978384; Thu, 16 Jul 2020 17:49:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594946978; cv=none; d=google.com; s=arc-20160816; b=updQAZtm1pINnhRMlWXU2byT78refwQIYefDZt9Xin4lYnlj5hy0ChdfUGmXlGxRF0 TNsM6/v5g9/SVgdNS/ccdi5Va13FK7Ol8tDUCRMMgFtU3gRVmncNBZh/C2TcsnhLBfyN qc/LG9YnFeqPuqA+F3qW/Zr5Y0nvBcx0O6xOUWwUe/ASkcmaAdaeQp8kg6F6wcEqrm21 tOP8KCwZOCDoVsovGa0l3gwxDsK30xB0K6gzasx/D6FQEoepr0saJDmZ0/94WitIqIWT vXVKN/cXVoQQF8yuwf+1R3ThaGkzl7oR218igJE0/eLvdVB4wvnIN1+RKAvzjPMfxOd5 rLbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=6naa2MqV7Ilc0GHL/Mq4CUNJ5DExO6g8I7ykNmCXYjM=; b=VRZ58wq8ijGTuBJ6j5kG0BRnqk6fW2CU8bEi/2FhkosEmYhF2v996x9JzrkwPDSH5C xk/j6kqSOMaDFK3oYaBawg93BsK26qFr/DwOGHQiH8Td2IoGgPFgOcyT9gndUxxOuoGm dp8vIarprolAemw6AAIL56JXXsHaFIUj1hZOxYI/dSvX5K6uustb0wGjIGwBxEIV+kqC SLB+Kczw0rZfkKEJdbalqjckflTbrVFV/BkgHKfn0mLIGnqkLr1d1JtKk7GGlX9Bkd09 xhpmXON75iewlOfhYn+/8aSEpZiFwd4gzkKZGGzZPVSeHoa337XpJNuWvb1B43HVTMMI b8FQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=aDfBJa1h; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ca5si4161926edb.511.2020.07.16.17.49.15; Thu, 16 Jul 2020 17:49:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=aDfBJa1h; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726422AbgGQArI (ORCPT + 99 others); Thu, 16 Jul 2020 20:47:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58608 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726138AbgGQArH (ORCPT ); Thu, 16 Jul 2020 20:47:07 -0400 Received: from mail-lj1-x241.google.com (mail-lj1-x241.google.com [IPv6:2a00:1450:4864:20::241]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 63811C08C5C0 for ; Thu, 16 Jul 2020 17:47:07 -0700 (PDT) Received: by mail-lj1-x241.google.com with SMTP id x9so10574704ljc.5 for ; Thu, 16 Jul 2020 17:47:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=6naa2MqV7Ilc0GHL/Mq4CUNJ5DExO6g8I7ykNmCXYjM=; b=aDfBJa1hKKV7jQJMC4EkqGeKU8mOarpu+ZSU10Qpf+G9Nh3PYJhtHwujbuBCQmkOFu FuAeKE7ejE0Ik9kImelQWrHk10ad8cjgH+25v+6Jd6hSkNFZ2QlPHholWxXxQLpWXUmj D/SlOaorHGtk44E3bgOYqQ0Xgz6eKP6apjln5UL5IGgJQrbOSfubbuvXeSNmc0uOf0LO MSfrrLslmhd0BlMca3sw+twVNL9nHo53f5m/44P1VhHfsvwAqpYUqhfGYjq+zDCaAXNs oz7tDJ4BFehqSL3eHOS3BrxGZ5L6x3TkNZb8x3MxPNBMRDEeuWm2NqXm3BlAVGGnsPVL Vyxw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=6naa2MqV7Ilc0GHL/Mq4CUNJ5DExO6g8I7ykNmCXYjM=; b=gz4x2xyI3Tz3qreMeNYSF23ChtjtcFYPqs9njLfgqGBWXYedLMAVPP4vtGEiHFBWtR UHl+RUH3sUGsG6Js0PjMUIO9nJpPgtib8HNx7IJTbSHTPttcDPoGsGSa8julTGq3955D 4u/wI/MWwjEApsS7qZNDhs+a6sG7UUECWMm5c3wVkAnkalsEuNcgoEO4yOXauszTjmCG bLPGTgFwMx90PLNvF1mdUQxqYpVQqrnjShihCr8bRThrKQKJpH2h5L61DQYNbSCLM8g2 ptWnI37TCXd65JTVPybDDck7y94AT4VX4G6vS4XCk27pM+kWyGf7g2FbXlB5iE8rCu+s ASuw== X-Gm-Message-State: AOAM531NUT7fs+9fgpRCuYU2JBUNJnLemnPB0s7QZPUxSdiwTx7bxmlw WX59siKzsNXdDLNUO1jICrSizGzRJ2gGg3KVo+Cv4g== X-Received: by 2002:a2e:9907:: with SMTP id v7mr3295592lji.347.1594946825212; Thu, 16 Jul 2020 17:47:05 -0700 (PDT) MIME-Version: 1.0 References: <20200713084144.4430-1-sjpark@amazon.com> <20200713084144.4430-7-sjpark@amazon.com> In-Reply-To: <20200713084144.4430-7-sjpark@amazon.com> From: Shakeel Butt Date: Thu, 16 Jul 2020 17:46:54 -0700 Message-ID: Subject: Re: [PATCH v18 06/14] mm/damon: Implement callbacks for the virtual memory address spaces To: SeongJae Park Cc: Andrew Morton , SeongJae Park , Jonathan.Cameron@huawei.com, Andrea Arcangeli , acme@kernel.org, alexander.shishkin@linux.intel.com, amit@kernel.org, benh@kernel.crashing.org, brendan.d.gregg@gmail.com, Brendan Higgins , Qian Cai , Colin Ian King , Jonathan Corbet , David Hildenbrand , dwmw@amazon.com, foersleo@amazon.de, Ian Rogers , jolsa@redhat.com, "Kirill A. Shutemov" , mark.rutland@arm.com, Mel Gorman , Minchan Kim , Ingo Molnar , namhyung@kernel.org, "Peter Zijlstra (Intel)" , Randy Dunlap , Rik van Riel , David Rientjes , Steven Rostedt , rppt@kernel.org, sblbir@amazon.com, shuah@kernel.org, sj38.park@gmail.com, snu@amazon.de, Vlastimil Babka , Vladimir Davydov , Yang Shi , Huang Ying , linux-damon@amazon.com, Linux MM , linux-doc@vger.kernel.org, LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 13, 2020 at 1:44 AM SeongJae Park wrote: > > From: SeongJae Park > > This commit introduces a reference implementation of the address space > specific low level primitives for the virtual address space, so that > users of DAMON can easily monitor the data accesses on virtual address > spaces of specific processes by simply configuring the implementation to > be used by DAMON. > > The low level primitives for the fundamental access monitoring are > defined in two parts: > 1. Identification of the monitoring target address range for the address > space. > 2. Access check of specific address range in the target space. > > The reference implementation for the virtual address space provided by > this commit is designed as below. > > PTE Accessed-bit Based Access Check > ----------------------------------- > > The implementation uses PTE Accessed-bit for basic access checks. That > is, it clears the bit for next sampling target page and checks whether > it set again after one sampling period. To avoid disturbing other > Accessed bit users such as the reclamation logic, the implementation > adjusts the ``PG_Idle`` and ``PG_Young`` appropriately, as same to the > 'Idle Page Tracking'. > > VMA-based Target Address Range Construction > ------------------------------------------- > > Only small parts in the super-huge virtual address space of the > processes are mapped to physical memory and accessed. Thus, tracking > the unmapped address regions is just wasteful. However, because DAMON > can deal with some level of noise using the adaptive regions adjustment > mechanism, tracking every mapping is not strictly required but could > even incur a high overhead in some cases. That said, too huge unmapped > areas inside the monitoring target should be removed to not take the > time for the adaptive mechanism. > > For the reason, this implementation converts the complex mappings to > three distinct regions that cover every mapped area of the address > space. Also, the two gaps between the three regions are the two biggest > unmapped areas in the given address space. The two biggest unmapped > areas would be the gap between the heap and the uppermost mmap()-ed > region, and the gap between the lowermost mmap()-ed region and the stack > in most of the cases. Because these gaps are exceptionally huge in > usual address spacees, excluding these will be sufficient to make a > reasonable trade-off. Below shows this in detail:: > > > > > (small mmap()-ed regions and munmap()-ed regions) > > > > > Signed-off-by: SeongJae Park > Reviewed-by: Leonard Foerster [snip] > + > +static void damon_mkold(struct mm_struct *mm, unsigned long addr) > +{ > + pte_t *pte = NULL; > + pmd_t *pmd = NULL; > + spinlock_t *ptl; > + > + if (follow_pte_pmd(mm, addr, NULL, &pte, &pmd, &ptl)) > + return; > + > + if (pte) { > + if (pte_young(*pte)) { Any reason for skipping mmu_notifier_clear_young()? Why exclude VMs as DAMON's target applications? > + clear_page_idle(pte_page(*pte)); > + set_page_young(pte_page(*pte)); > + } > + *pte = pte_mkold(*pte); > + pte_unmap_unlock(pte, ptl); > + return; > + } > +