Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2937808rwb; Wed, 30 Nov 2022 13:01:57 -0800 (PST) X-Google-Smtp-Source: AA0mqf7mFgsUZ3YMN8fStJT82TbjxbXMKJLtnE1BMnLi8K8h37hE26BIvUXYqJNmpcUqc5u1tHpq X-Received: by 2002:a17:906:9f11:b0:7b4:7758:f1e1 with SMTP id fy17-20020a1709069f1100b007b47758f1e1mr45198811ejc.145.1669842117154; Wed, 30 Nov 2022 13:01:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669842117; cv=none; d=google.com; s=arc-20160816; b=hDrd84UTz8KoRKZIQPN84ubMl3O2QwacV6D1I5mHYAPbJn6wDi+YLU/XiLubUvQ7af swvQiBYtr0d5mey9YnyCN7zSVNn6x+B8Z9SjhyzQiK5wFNPXNIu4/xI1bf9k1oHtpgSm 5H3DFIVLTsTfk+YKDvYzB7elyeMIBxyPE8hbl+KVfnOPqrJvemYZr8OTYW3aYgxuym2X nh0lK5QWC8z6pEAildQhqpkaaxE/5Bf0GSP3Cw2qF8z9gXAvDVkk/6PWPJfg7vU2Ntbm UwkANpxIo6jOcRNqbeojB/6beYHQvd49tgjSCouOmpmV7XLA0KQK9ze2vudouRUrr6RG d1Gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=oqWZr+rMFBv+3UK6ndr40maA24XDjNNUYzdIaCPCPPA=; b=WNLOMKbSc3UIIC52JxMKYBpkaI51XV5WFxDVXT+uORnwf7zDfJD0gXgsLvyEjJhFUk BlIRP/g3xGiMLQYUotK4/++rcYs61DVu4ALYj4pZvi4Ig2Tgmwqn3jHhUNDno3Dq+Dxw rTRw1DcEpEuVFhrYg/OES8TVwM6p5WgMvYt8r57q6xbeEty1HuG2r+tD9l+af05j6Ufd hmUYWxS0C+ERXAW3Aab8ZzK2YU1zv8vAswTT7ZDqHK7IM1FNiO9ebjYBGTBuN3LmIQkK 1wKB62gxpZ8nvUZ4e2DBvVogwYy76Mq97Kx0IERH+Ov4V8oduVmkqpqWjmM+H/Ha5WSt 1Yvw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OVOWegpH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r8-20020aa7d148000000b0046775f92f19si2088101edo.50.2022.11.30.13.01.36; Wed, 30 Nov 2022 13:01:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OVOWegpH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229810AbiK3UJp (ORCPT + 83 others); Wed, 30 Nov 2022 15:09:45 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43670 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229535AbiK3UJn (ORCPT ); Wed, 30 Nov 2022 15:09:43 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 767C1578F8; Wed, 30 Nov 2022 12:09:42 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 1BF0061DAE; Wed, 30 Nov 2022 20:09:42 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B6E10C433C1; Wed, 30 Nov 2022 20:09:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1669838981; bh=mMfylySxLnXAU3Y/Ax0ptN/yAL+W24Pd1ZjoQYO0TNY=; h=From:To:Cc:Subject:Date:From; b=OVOWegpHTQu7HgDi5T28oMfUtZ6xEOjyqsSvUcSgGZD2WwrM7aI9E32riHaGk+p40 fg2Ofgr8mrpTViZHf6X68TDuNWNSJpTXSrfqNkgpXVbby/UpzyZu95q29s4i7mT9LI J9e7G1IY7EuCKw4BpXVQl6OjTSdnPhbVq/JoHyBtxoGdQfWiFRX6RBwP1yjaO2DlFW JlXmVy+OlE3i2+6EqL5SsiHGBHVz00303Z0e8hEPuz28Yy7xpEy0LwqGN328UMwXxp Eej0roYZh93xzOp1vToPsURhX9EZDYMw0bfrOQ342qn4+je4UG/eZMkI11UqWMrBZc GzLqpbfjuzdmg== From: SeongJae Park To: Andrew Morton Cc: SeongJae Park , Jonathan Corbet , Shuah Khan , damon@lists.linux.dev, linux-mm@kvack.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH v2 00/11] implement DAMOS filtering for anon pages and Date: Wed, 30 Nov 2022 20:09:26 +0000 Message-Id: <20221130200937.118005-1-sj@kernel.org> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Changes from RFC v1 (https://lore.kernel.org/damon/20221124212114.136863-1-sj@kernel.org/) - sysfs: Clean up filters directory from scheme directory cleanup path - sysfs: Link newly created filter to the scheme - sysfs: Ignore removed memcg when checking path - sysfs: Guard 'struct mem_cgroup' access with CONFIG_MEMCG (kernel test robot) ---- DAMOS let users do system operations in a data access pattern oriented way. The data access pattern, which is extracted by DAMON, is somewhat accurate more than what user space could know in many cases. However, in some situation, users could know something more than the kernel about the pattern or some special requirements for some types of memory or processes. For example, some users would have slow swap devices and knows latency-ciritical processes and therefore want to use DAMON-based proactive reclamation (DAMON_RECLAIM) for only non-anonymous pages of non-latency-critical processes. For such restriction, users could exclude the memory regions from the initial monitoring regions and use non-dynamic monitoring regions update monitoring operations set including fvaddr and paddr. They could also adjust the DAMOS target access pattern. For dynamically changing memory layout and access pattern, those would be not enough. To help the case, add an interface, namely DAMOS filters, which can be used to avoid the DAMOS actions be applied to specific types of memory, to DAMON kernel API (damon.h). At the moment, it supports filtering anonymous pages and/or specific memory cgroups in or out for each DAMOS scheme. This patchset adds the support for all DAMOS actions that 'paddr' monitoring operations set supports ('pageout', 'lru_prio', and 'lru_deprio'), and the functionality is exposed via DAMON kernel API (damon.h) the DAMON sysfs interface (/sys/kernel/mm/damon/admins/), and DAMON_RECLAIM module parameters. Patches Sequence ---------------- First patch implements DAMOS filter interface to DAMON kernel API. Second patch makes the physical address space monitoring operations set to support the filters from all supporting DAMOS actions. Third patch adds anonymous pages filter support to DAMON_RECLAIM, and the fourth patch documents the DAMON_RECLAIM's new feature. Fifth to seventh patches implement DAMON sysfs files for support of the filters, and eighth patch connects the file to use DAMOS filters feature. Ninth patch adds simple self test cases for DAMOS filters of the sysfs interface. Finally, following two patches (tenth and eleventh) document the new features and interfaces. SeongJae Park (11): mm/damon/core: implement damos filter mm/damon/paddr: support DAMOS filters mm/damon/reclaim: add a parameter called skip_anon for avoiding anonymous pages reclamation Docs/admin-guide/damon/reclaim: document 'skip_anon' parameter mm/damon/sysfs-schemes: implement filters directory mm/damon/sysfs-schemes: implement filter directory mm/damon/sysfs-schemes: connect filter directory and filters directory mm/damon/sysfs-schemes: implement scheme filters selftests/damon/sysfs: test filters directory Docs/admin-guide/mm/damon/usage: document DAMOS filters of sysfs Docs/ABI/damon: document scheme filters files .../ABI/testing/sysfs-kernel-mm-damon | 29 ++ .../admin-guide/mm/damon/reclaim.rst | 9 + Documentation/admin-guide/mm/damon/usage.rst | 48 ++- include/linux/damon.h | 51 +++ mm/damon/core.c | 39 ++ mm/damon/paddr.c | 71 +++- mm/damon/reclaim.c | 19 + mm/damon/sysfs-schemes.c | 370 +++++++++++++++++- tools/testing/selftests/damon/sysfs.sh | 29 ++ 9 files changed, 652 insertions(+), 13 deletions(-) -- 2.25.1