Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1765519ybh; Thu, 16 Jul 2020 23:54:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx/klkTuf3wdWWGxMFkfjH3eoRhefovzCgec7f/6R6U9LWZ2+mOB/Y8Q3hKFl0SYTrEWFXT X-Received: by 2002:a17:906:7005:: with SMTP id n5mr6870458ejj.130.1594968875075; Thu, 16 Jul 2020 23:54:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594968875; cv=none; d=google.com; s=arc-20160816; b=xtH9ptrOe5fEoOyHgq9IehlOjHDkqOObrFFoOZ8JzO/nZ8BlUodN/UHlPGevkfgeQY 5rVK3m+E18W0Ey5se6vrkoMNaGafUbHOBB0j0AZN1EaiB6NSy/ny178dgs3dndO+ll6A KCQ64iB7E9QH+4t8+TqKgVRPIuezamKiHIQcRxinpNtdZ36aXEEtkD2qGHVxI6ZfDDfh aaW+Wat0B9d/e+z0GihYP6E4kpN2RDWu+hfAgAQpnKSe71TcaPjeWwvRlEdGGeo3pMQ7 lRMtdURHVpJIPrh0y5Sr7Av8zJXcGMO4UzvvxLfR4564mi1XlvPooWiuodQymDLXYzIV VnTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:in-reply-to:message-id:date :subject:cc:to:from:ironport-sdr:dkim-signature; bh=UbdGYUcxs3f2PzsC5b1THW/4XAQ8PtwmIHoCMkMyeJk=; b=Jexf57Yt+v9v8A5aaSGmpzUCa6rxwRFnC0/diJmX1XEyRYcy8SdVifnOHwdijqd2OJ W/s+ysvIuEsYIYbDHMJ9ppkn03Xa0DEmhG29n9MosHzRMXLVv0gTiHw5DgwY6gJ5MJd9 Baea8OnR+mPJYI8ynZ1tNRD0/0iMeT9L3CYXalQY0Od3/fZvobTlPVrMlnD/RfbsSS0h HsF8T2aJvUTvRxKEs/5JP75fmYZinEET5w/ckXj7erMHBf0ZhEGafC0n4VYcjNsfPfg6 Qd7MTD6i0xZ7dyw7cgVHWuWotGKFhda/RMrY6Grai3JgNOyhlIT+xN9XYBt2xRGLVusH Q8rQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=Rrb7gJLl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id mc27si4627983ejb.272.2020.07.16.23.54.11; Thu, 16 Jul 2020 23:54:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=Rrb7gJLl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727840AbgGQGx7 (ORCPT + 99 others); Fri, 17 Jul 2020 02:53:59 -0400 Received: from smtp-fw-9102.amazon.com ([207.171.184.29]:41598 "EHLO smtp-fw-9102.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726656AbgGQGx7 (ORCPT ); Fri, 17 Jul 2020 02:53:59 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1594968839; x=1626504839; h=from:to:cc:subject:date:message-id:in-reply-to: mime-version; bh=UbdGYUcxs3f2PzsC5b1THW/4XAQ8PtwmIHoCMkMyeJk=; b=Rrb7gJLlTejWNjHhxPf0sop+CiHL4c3KGpf8J4E8uAMjZRzUxzamTAwb 1ZuAZ5os1kKMFXUywS8kf1UPh7DHkmsRPiC8cbAXCy6QjejPmnDHiIscJ KxhoVwG/LV1Te0LxdbJxjM/K06TVSumU7MtNkMNGmHKv2Q3IsF87AW8K5 Q=; IronPort-SDR: jTvzNbc6LpWJ1wdVACIj01E7k7YcB0jnHfAPb0ZjxcDFQlY+r7xF67ZzlciV069UlBFd+uFpyb pV3oC7mKs+AQ== X-IronPort-AV: E=Sophos;i="5.75,362,1589241600"; d="scan'208";a="60527465" Received: from sea32-co-svc-lb4-vlan3.sea.corp.amazon.com (HELO email-inbound-relay-2b-a7fdc47a.us-west-2.amazon.com) ([10.47.23.38]) by smtp-border-fw-out-9102.sea19.amazon.com with ESMTP; 17 Jul 2020 06:53:51 +0000 Received: from EX13MTAUEA002.ant.amazon.com (pdx4-ws-svc-p6-lb7-vlan2.pdx.amazon.com [10.170.41.162]) by email-inbound-relay-2b-a7fdc47a.us-west-2.amazon.com (Postfix) with ESMTPS id 7C722C1B5E; Fri, 17 Jul 2020 06:53:48 +0000 (UTC) Received: from EX13D31EUA004.ant.amazon.com (10.43.165.161) by EX13MTAUEA002.ant.amazon.com (10.43.61.77) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Fri, 17 Jul 2020 06:53:47 +0000 Received: from u886c93fd17d25d.ant.amazon.com (10.43.161.34) by EX13D31EUA004.ant.amazon.com (10.43.165.161) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Fri, 17 Jul 2020 06:53:30 +0000 From: SeongJae Park To: Shakeel Butt CC: SeongJae Park , Andrew Morton , SeongJae Park , , Andrea Arcangeli , , , , , , Brendan Higgins , Qian Cai , Colin Ian King , Jonathan Corbet , "David Hildenbrand" , , , Ian Rogers , , "Kirill A. Shutemov" , , Mel Gorman , Minchan Kim , Ingo Molnar , , "Peter Zijlstra (Intel)" , Randy Dunlap , Rik van Riel , David Rientjes , Steven Rostedt , , , , , , Vlastimil Babka , Vladimir Davydov , Yang Shi , Huang Ying , , Linux MM , , LKML Subject: Re: Re: [PATCH v18 06/14] mm/damon: Implement callbacks for the virtual memory address spaces Date: Fri, 17 Jul 2020 08:53:13 +0200 Message-ID: <20200717065313.8870-1-sjpark@amazon.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: (raw) MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.43.161.34] X-ClientProxiedBy: EX13D37UWA001.ant.amazon.com (10.43.160.61) To EX13D31EUA004.ant.amazon.com (10.43.165.161) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 16 Jul 2020 17:46:54 -0700 Shakeel Butt wrote: > On Mon, Jul 13, 2020 at 1:44 AM SeongJae Park wrote: > > > > From: SeongJae Park > > > > This commit introduces a reference implementation of the address space > > specific low level primitives for the virtual address space, so that > > users of DAMON can easily monitor the data accesses on virtual address > > spaces of specific processes by simply configuring the implementation to > > be used by DAMON. > > > > The low level primitives for the fundamental access monitoring are > > defined in two parts: > > 1. Identification of the monitoring target address range for the address > > space. > > 2. Access check of specific address range in the target space. > > > > The reference implementation for the virtual address space provided by > > this commit is designed as below. > > > > PTE Accessed-bit Based Access Check > > ----------------------------------- > > > > The implementation uses PTE Accessed-bit for basic access checks. That > > is, it clears the bit for next sampling target page and checks whether > > it set again after one sampling period. To avoid disturbing other > > Accessed bit users such as the reclamation logic, the implementation > > adjusts the ``PG_Idle`` and ``PG_Young`` appropriately, as same to the > > 'Idle Page Tracking'. > > > > VMA-based Target Address Range Construction > > ------------------------------------------- > > > > Only small parts in the super-huge virtual address space of the > > processes are mapped to physical memory and accessed. Thus, tracking > > the unmapped address regions is just wasteful. However, because DAMON > > can deal with some level of noise using the adaptive regions adjustment > > mechanism, tracking every mapping is not strictly required but could > > even incur a high overhead in some cases. That said, too huge unmapped > > areas inside the monitoring target should be removed to not take the > > time for the adaptive mechanism. > > > > For the reason, this implementation converts the complex mappings to > > three distinct regions that cover every mapped area of the address > > space. Also, the two gaps between the three regions are the two biggest > > unmapped areas in the given address space. The two biggest unmapped > > areas would be the gap between the heap and the uppermost mmap()-ed > > region, and the gap between the lowermost mmap()-ed region and the stack > > in most of the cases. Because these gaps are exceptionally huge in > > usual address spacees, excluding these will be sufficient to make a > > reasonable trade-off. Below shows this in detail:: > > > > > > > > > > (small mmap()-ed regions and munmap()-ed regions) > > > > > > > > > > Signed-off-by: SeongJae Park > > Reviewed-by: Leonard Foerster > [snip] > > + > > +static void damon_mkold(struct mm_struct *mm, unsigned long addr) > > +{ > > + pte_t *pte = NULL; > > + pmd_t *pmd = NULL; > > + spinlock_t *ptl; > > + > > + if (follow_pte_pmd(mm, addr, NULL, &pte, &pmd, &ptl)) > > + return; > > + > > + if (pte) { > > + if (pte_young(*pte)) { > > Any reason for skipping mmu_notifier_clear_young()? Why exclude VMs as > DAMON's target applications? Obviously my mistake, thank you for pointing this! I will add the function call in the next spin. Thanks, SeongJae Park > > > + clear_page_idle(pte_page(*pte)); > > + set_page_young(pte_page(*pte)); > > + } > > + *pte = pte_mkold(*pte); > > + pte_unmap_unlock(pte, ptl); > > + return; > > + } > > +