lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251213032128.50837-1-sj@kernel.org>
Date: Fri, 12 Dec 2025 19:21:27 -0800
From: SeongJae Park <sj@...nel.org>
To: JaeJoon Jung <rgbi3307@...il.com>
Cc: SeongJae Park <sj@...nel.org>,
	Andrew Morton <akpm@...ux-foundation.org>,
	damon@...ts.linux.dev,
	linux-kernel@...r.kernel.org,
	linux-mm@...ck.org
Subject: Re: [RFC PATCH v3 07/37] mm/damon/core: apply access reports to high level snapshot

On Sat, 13 Dec 2025 10:10:38 +0900 JaeJoon Jung <rgbi3307@...il.com> wrote:

> On Sat, 13 Dec 2025 at 08:11, SeongJae Park <sj@...nel.org> wrote:
> >
> > On Fri, 12 Dec 2025 22:20:04 +0900 JaeJoon Jung <rgbi3307@...il.com> wrote:
> >
> > > On Mon, 8 Dec 2025 at 15:35, SeongJae Park <sj@...nel.org> wrote:
> > > >
> > > > Now any DAMON API callers can report their observed access information.
> > > > The DAMON core layer is just ignoring those, though.  Update the core to
> > > > use the reported information at building the high level access pattern
> > > > snapshot.
> > >
> > > It seems inefficient to repeatedly access the damon_access_reports[1000] array
> > > using a for loop in the kdamond_check_reported_accesses() function.
> > > It is inefficient to for loop through the entire
> > > damon_access_reports[1000] array.
> > > When CONFIG_HZ and jiffies are increased as follows and
> > > damond sample_interval is 5000us (5ms), the time flow diagram is as follows.
> > >
> > > CONFIG_HZ 1000, jiffies == 1ms
> > > damond sample_interval == 5000us (5ms)
> > >
> > > reports_len(==): [0 ... 5]
> > >                                                      [*]
> > >         0    1    2    3    4    5     6    7    8    9        997    998     999
> > >         [====|====|====|====|====]-----|----|----|----|  ....  |------|-------|
> > > jiffies++    1    2    3    4    5     0    0    0    0        0      0       0
> > > damond_fn(sample interval)      -5[0<]
> > >
> > > reports_len(==): [997 ... 2]
> > >                                   [*]
> > >         0      1      2    3    4    5     6    7    8    9        997   998   999
> > >         [======|======]----|----|----|-----|----|----|----|  ....  [=====|=====]
> > > jiffies++   1001      1002 3    4    5     6    7    8    9        997   998   999
> > > damond_fn(sample interval)
> > >                             -5[997<]
> >
> > Please use fixed-length fonts for something like above, from next time.  I
> > fixed the diagram with my best effort, as above.  But I still fail at
> > understanding your point.  More clarification about what the diagram means
> > would be nice.
> 
> Thank you for readjusting the font to fit.  The first diagram above is when
> reports_len is processed normally starting from 0 to reports_len.
> The second diagram shows the process where reports_len increases to its
> maximum values of 997, 998, 999, and then returns to 0.

Thank you for adding this clarification.

> The biggest problem here is that the latter part of the array is not processed.

I don't get what "processed" is meaning, and what is the latter part of the
array that not processed, and why it is a problem.  Could you please clarify?

> 
> >
> > >
> > > It seems that only the section corresponding to the sample interval ([==|==])
> > > can be cycled as follows.  And, how about enjoying damon_access_reports[1000]
> > > as damon_access_reports[500]?  Even if it reduce the 1000ms to 500ms
> > > array space, it seems that it can sufficiently report and process within
> > > the sample interval of 5ms.
> >
> > Are you assuming the the reports can be made only once per 1 millisecond?  That
> > is not true.  The design assumes any kernel API caller could make the report,
> > so more than one report can be made within one millisecond.  Am I
> > missingsomething?
> 
> jiffies 1ms is just to simply unfold the passage of time when
> CONFIG_HZ is set to 1000.
> This is a simplification to help it understand the flow of time.

So I understand you are saying that only one report can be made per jiffy.  But
that doesn't answer my question because I'm saying that design allows any
report at any time.  Any number of reports can be made within one jiffy time
interval.

> 
> >
> > >
> > >  static unsigned int kdamond_check_reported_accesses(struct damon_ctx *ctx)
> > >  {
> > > -       int i;
> > > +       int i = damon_access_reports_len;
> > > +       unsigned int nr = 0;
> > >         struct damon_access_report *report;
> > >         struct damon_target *t;
> > >
> > > @@ -2904,16 +2905,18 @@ static unsigned int
> > > kdamond_check_reported_accesses(struct damon_ctx *ctx)
> > >                 return 0;
> > >
> > >         mutex_lock(&damon_access_reports_lock);
> > > -       for (i = 0; i < damon_access_reports_len; i++) {
> > > -               report = &damon_access_reports[i];
> > > -               if (time_before(report->report_jiffies,
> > > -                                       jiffies -
> > > -                                       usecs_to_jiffies(
> > > -                                               ctx->attrs.sample_interval)))
> > > -                       continue;
> > > +       report = &damon_access_reports[i];
> > > +       while (time_after(report->report_jiffies,
> > > +               jiffies - usecs_to_jiffies(ctx->attrs.sample_interval))) {
> > >                 damon_for_each_target(t, ctx)
> > >                         kdamond_apply_access_report(report, t, ctx);
> > > +               if (++nr >= DAMON_ACCESS_REPORTS_CAP)
> > > +                       break;
> > > +
> > > +               i = (i == 0) ? (DAMON_ACCESS_REPORTS_CAP - 1) : (i - 1);
> > > +               report = &damon_access_reports[i];
> > >         }
> > > +
> > >         mutex_unlock(&damon_access_reports_lock);
> > >         /* For nr_accesses_bp, absence of access should also be reported. */
> > >         return kdamond_apply_zero_access_report(ctx);
> > > }
> >
> > So I still don't get your points before the above code diff, but I understand
> > this code diff.
> >
> > I agree this is more efficient.  I will consider doing something like this in
> > the next spin.
> 
> What I tried above is to process the current array [1000] as
> efficiently as possible.
> But, if I think again, It would be better to store it in a linked-list
> and process it
> in FIFO mode whenever requested in damon_report_page_fault(),
> damon_report_access(report)
> instead of storing it in an array.  I'm also analyzing the source code
> starting this week,
> so I'll organize it a bit more and get back to you with my opinion.

I personally don't feel linked list is specially better than the current
ring-buffer like implementation at the moment.  But I would be happy to learn
new ideas.  Please feel free to revisit when you get a chance.


Thanks,
SJ

[...]

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ