From: SeongJae Park <sj@kernel.org>
To: Liew Rui Yan <aethernet65535@gmail.com>
Cc: SeongJae Park <sj@kernel.org>, damon@lists.linux.dev, linux-mm@kvack.org
Subject: Re: (sashiko review) [RFC v5] mm/damon: add synchronous commit for commit_inputs
Date: Tue, 24 Mar 2026 19:53:16 -0700 [thread overview]
Message-ID: <20260325025317.86571-1-sj@kernel.org> (raw)
In-Reply-To: <20260325013939.18167-1-aethernet65535@gmail.com>
Forwarding Sashiko review for doing discussions via mails.
# review url: https://sashiko.dev/#/patchset/20260325013939.18167-1-aethernet65535@gmail.com
# start of sashiko.dev inline review
commit 60ccea4154b0c58741fae2323454a5a9496b67fa
Author: Liew Rui Yan <aethernet65535@gmail.com>
mm/damon: add synchronous commit for commit_inputs
Writing invalid parameters to sysfs followed by commit_inputs=Y previously
failed silently. This patch uses damon_call() to synchronously commit
parameters in the kdamond thread's safe context, returning validation errors
immediately to userspace.
Link: https://lore.kernel.org/20260318153731.97470-1-aethernet65535@gmail.com
> diff --git a/mm/damon/lru_sort.c b/mm/damon/lru_sort.c
> index 554559d72976..a2410f648b51 100644
> --- a/mm/damon/lru_sort.c
> +++ b/mm/damon/lru_sort.c
[ ... ]
> +static int damon_lru_sort_commit_inputs_store(const char *val,
> + const struct kernel_param *kp)
> +{
> + bool commit_inputs_request;
> int err;
> + struct damon_call_control control = {
> + .fn = damon_lru_sort_commit_inputs_fn,
> + .data = ctx,
> + .repeat = false,
> + };
>
> - if (!commit_inputs)
> + err = kstrtobool(val, &commit_inputs_request);
> + if (err)
> + return err;
> +
> + if (!commit_inputs_request)
> return 0;
>
> - err = damon_lru_sort_apply_parameters();
> - commit_inputs = false;
> - return err;
> + /*
> + * Skip damon_call() during early boot or when kdamond is
> + * not running to avoid NULL pointer dereference.
> + */
> + if (!ctx)
> + return -EBUSY;
> +
> + err = damon_call(ctx, &control);
Can this sequence lead to a system-wide deadlock on kernel_param_lock?
Because damon_lru_sort_commit_inputs_store() is a sysfs .set callback, it
executes with the global kernel_param_lock held.
If kdamond_fn terminates (e.g., due to an invalid parameter like addr_unit=3
causing a non-power-of-2 min_region_sz), it processes its exit sequence by
calling kdamond_call(ctx, true) to flush pending requests. After flushing, it
eventually sets ctx->kdamond = NULL at the very end of the thread.
If a user writes to commit_inputs exactly in the window after
kdamond_call() finishes but before ctx->kdamond = NULL is set:
Thread 1 (kdamond_fn):
kdamond_call(ctx, true);
Thread 2 (sysfs write):
damon_call(ctx, &control);
if (damon_is_running(ctx))
wait_for_completion(&control.completion);
Thread 1 (kdamond_fn):
ctx->kdamond = NULL;
Thread 2 will sleep indefinitely in wait_for_completion(). Because Thread 2
holds the global kernel_param_lock, this permanently freezes all module
parameter sysfs interfaces system-wide.
> + if (err) {
> + /*
> + * If kdamond is not running, damon_call() returns -EINVAL.
> + * Remap it to -EBUSY to better reflect that the operation
> + * failed due to the current state of the system.
> + */
> + if (err == -EINVAL && !damon_is_running(ctx))
> + return -EBUSY;
> +
> + return err;
> + }
> +
> + return control.return_code;
> }
> diff --git a/mm/damon/reclaim.c b/mm/damon/reclaim.c
> index 86da14778658..4cbd67e08d56 100644
> --- a/mm/damon/reclaim.c
> +++ b/mm/damon/reclaim.c
[ ... ]
> + /*
> + * Skip damon_call() during early boot or when kdamond is
> + * not running to avoid NULL pointer dereference.
> + */
> + if (!ctx)
> + return -EBUSY;
> +
> + err = damon_call(ctx, &control);
Does this code share the same kernel_param_lock deadlock potential as
damon_lru_sort_commit_inputs_store() described above?
# end of sashiko.dev inline review
# review url: https://sashiko.dev/#/patchset/20260325013939.18167-1-aethernet65535@gmail.com
#
# hkml [1] generated a draft of this mail. It can be regenerated
# using below command:
#
# hkml patch sashiko_dev --for_forwarding \
# 20260325013939.18167-1-aethernet65535@gmail.com
#
# [1] https://github.com/sjp38/hackermail
Sent using hkml (https://github.com/sjp38/hackermail)
next prev parent reply other threads:[~2026-03-25 2:53 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-25 1:39 [RFC v5] mm/damon: add synchronous commit for commit_inputs Liew Rui Yan
2026-03-25 2:53 ` SeongJae Park [this message]
2026-03-25 7:17 ` (sashiko review) " Liew Rui Yan
2026-03-25 14:19 ` SeongJae Park
2026-03-26 6:15 ` Liew Rui Yan
2026-03-27 5:08 ` SeongJae Park
2026-03-25 14:29 ` SeongJae Park
2026-03-26 6:16 ` Liew Rui Yan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260325025317.86571-1-sj@kernel.org \
--to=sj@kernel.org \
--cc=aethernet65535@gmail.com \
--cc=damon@lists.linux.dev \
--cc=linux-mm@kvack.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox