Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp563270ybg; Tue, 9 Jun 2020 07:26:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzlU2mCKmTqTxAYCkM9dn6uHF2AAZdDfHF7iElcGvAfPpKnv1fGkdnLwRRl8o3UE/lYtvs/ X-Received: by 2002:a17:907:2072:: with SMTP id qp18mr24829320ejb.179.1591712803779; Tue, 09 Jun 2020 07:26:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591712803; cv=none; d=google.com; s=arc-20160816; b=UFN4oVd02TePx/siDasrhqrfaAlS5n1TD9UAcLKH1DN9NZ0Em0RHw+AxdbFwOWL/Dv JQYX9OQEx4tXDP9ZcXRB+wZ+dT7a7TvwMrHX+YSxHUkINkOKQCvg/CJZua2rg1vB3bCI j/ZU+BMewsS1h/2PKOLrwVIrQyjazoe+ZhM+0TB57TWZGETu+g7fcw3HZG16/BOuBRWD 0wMYhOQkoT47DDeVsan6gKiwPkSP8B0w0YufXHNkKTlDPQjolBQhToZHwCSeZNZPACFv umZx6ruGn4yt0kMrK+IK9VYZ1YM3L6YTfalUBvjAe2CfTh8tRbR2z8QVMiPOu5Opf8aW OTwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:ironport-sdr:dkim-signature; bh=Z0IurggP0Ne0aRf1k3oi5eHLQ+CxnTgV+b+ukC/GSlc=; b=prvWfthve1u1f3RBT/cY+IdTI5YzXmtCBkPQzfWoMW8WSJ6yTkwnauo7RaEqMIcR3D k8iskYuxz1spJ5bxtnWXIs6VJD3lJ/aQHd295HXaz3aeuMfd7+/O2XhO0XJR1RtDfTAV IM/U7cgK6FMjfGdVfQDDBr3sStucRI9cB6V2Qh8kctmkcvlP1r5naiW4RtJgW1NyN3iH f7PkzIRv0brM2Q65WBm2qQPbWzNYr/hmLv7ZHZhpG8PZ2qnRjQJE3ZSOowTigj4QdU4m 5NCWB4Z4WLZiHAlh+S9mnMxDlYlRTynm2LfsERFXuWPhWYcdgYyr3IORyWOqd3XTK5QQ MTnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b="sku1/o1u"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h12si10581313eji.721.2020.06.09.07.26.19; Tue, 09 Jun 2020 07:26:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b="sku1/o1u"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730316AbgFIOVa (ORCPT + 99 others); Tue, 9 Jun 2020 10:21:30 -0400 Received: from smtp-fw-9101.amazon.com ([207.171.184.25]:56059 "EHLO smtp-fw-9101.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728601AbgFIOV3 (ORCPT ); Tue, 9 Jun 2020 10:21:29 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1591712488; x=1623248488; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version; bh=Z0IurggP0Ne0aRf1k3oi5eHLQ+CxnTgV+b+ukC/GSlc=; b=sku1/o1u3raFG7rgF8jBNL01Q68T5481lBLmB+rVuxeJY9+qGHzx3uR6 xkHB8TqNKkON3M1c3OzRQMIIHZIwC1UvTVTAJ2/dJ5TD+Xv5v4GDHlteQ 49Yr8c8rgWHmF66O4WusKgr+c9WgZQ3yGXzh+LpnbNY89H0/jsYzY6c9n M=; IronPort-SDR: IoIAhU2gdayHbH5DmuXPA0GLLungqSc+dCSDwl0z1N7LUvk9RzMBQM8e69uAV4+d7Y2POSHQp1 Vcc5IQNbm24w== X-IronPort-AV: E=Sophos;i="5.73,492,1583193600"; d="scan'208";a="42677853" Received: from sea32-co-svc-lb4-vlan3.sea.corp.amazon.com (HELO email-inbound-relay-1e-303d0b0e.us-east-1.amazon.com) ([10.47.23.38]) by smtp-border-fw-out-9101.sea19.amazon.com with ESMTP; 09 Jun 2020 14:21:24 +0000 Received: from EX13MTAUEA002.ant.amazon.com (iad55-ws-svc-p15-lb9-vlan3.iad.amazon.com [10.40.159.166]) by email-inbound-relay-1e-303d0b0e.us-east-1.amazon.com (Postfix) with ESMTPS id 6BD7AA244A; Tue, 9 Jun 2020 14:21:13 +0000 (UTC) Received: from EX13D31EUA001.ant.amazon.com (10.43.165.15) by EX13MTAUEA002.ant.amazon.com (10.43.61.77) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 9 Jun 2020 14:21:12 +0000 Received: from u886c93fd17d25d.ant.amazon.com (10.43.162.109) by EX13D31EUA001.ant.amazon.com (10.43.165.15) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 9 Jun 2020 14:20:56 +0000 From: SeongJae Park To: CC: SeongJae Park , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: [RFC v3 03/10] mm/damon/debugfs: Allow users to set initial monitoring target regions Date: Tue, 9 Jun 2020 16:19:34 +0200 Message-ID: <20200609141941.19184-4-sjpark@amazon.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200609141941.19184-1-sjpark@amazon.com> References: <20200609141941.19184-1-sjpark@amazon.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.43.162.109] X-ClientProxiedBy: EX13D30UWC004.ant.amazon.com (10.43.162.4) To EX13D31EUA001.ant.amazon.com (10.43.165.15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: SeongJae Park Some users would want to monitor only a part of the entire virtual memory address space. The '->init_target_regions' callback is therefore provided, but only programming interface can use it. For the reason, this commit introduces a new debugfs file, 'init_region'. Users can specify which initial monitoring target address regions they want by writing special input to the file. The input should describe each region in each line in below form: This commit also makes the default '->init_target_regions' callback, 'kdamon_init_vm_regions()' to do nothing if the user has set the initial target regions already. Note that the regions will be updated to cover entire memory mapped regions after 'regions update interval'. If you want the regions to not be updated after the initial setting, you could set the interval as a very long time, say, a few decades. Signed-off-by: SeongJae Park --- mm/damon.c | 168 +++++++++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 162 insertions(+), 6 deletions(-) diff --git a/mm/damon.c b/mm/damon.c index b55d501365c0..2d8322e6558f 100644 --- a/mm/damon.c +++ b/mm/damon.c @@ -491,8 +491,10 @@ void kdamond_init_vm_regions(struct damon_ctx *ctx) { struct damon_task *t; - damon_for_each_task(t, ctx) - damon_init_vm_regions_of(ctx, t); + damon_for_each_task(t, ctx) { + if (!nr_damon_regions(t)) + damon_init_vm_regions_of(ctx, t); + } } /* @@ -1721,6 +1723,153 @@ static ssize_t debugfs_record_write(struct file *file, return ret; } +static ssize_t sprint_init_regions(struct damon_ctx *c, char *buf, ssize_t len) +{ + struct damon_task *t; + struct damon_region *r; + int written = 0; + int rc; + + damon_for_each_task(t, c) { + damon_for_each_region(r, t) { + rc = snprintf(&buf[written], len - written, + "%d %lu %lu\n", + t->pid, r->ar.start, r->ar.end); + if (!rc) + return -ENOMEM; + written += rc; + } + } + return written; +} + +static ssize_t debugfs_init_regions_read(struct file *file, char __user *buf, + size_t count, loff_t *ppos) +{ + struct damon_ctx *ctx = &damon_user_ctx; + char *kbuf; + ssize_t len; + + kbuf = kmalloc(count, GFP_KERNEL); + if (!kbuf) + return -ENOMEM; + + mutex_lock(&ctx->kdamond_lock); + if (ctx->kdamond) { + mutex_unlock(&ctx->kdamond_lock); + return -EBUSY; + } + + len = sprint_init_regions(ctx, kbuf, count); + mutex_unlock(&ctx->kdamond_lock); + if (len < 0) + goto out; + len = simple_read_from_buffer(buf, count, ppos, kbuf, len); + +out: + kfree(kbuf); + return len; +} + +static int add_init_region(struct damon_ctx *c, + int pid, struct damon_addr_range *ar) +{ + struct damon_task *t; + struct damon_region *r, *prev; + int rc = -EINVAL; + + if (ar->start >= ar->end) + return -EINVAL; + + damon_for_each_task(t, c) { + if (t->pid == pid) { + r = damon_new_region(c, ar->start, ar->end); + if (!r) + return -ENOMEM; + damon_add_region(r, t); + if (nr_damon_regions(t) > 1) { + prev = damon_prev_region(r); + if (prev->ar.end > r->ar.start) { + damon_destroy_region(r); + return -EINVAL; + } + } + rc = 0; + } + } + return rc; +} + +static int set_init_regions(struct damon_ctx *c, const char *str, ssize_t len) +{ + struct damon_task *t; + struct damon_region *r, *next; + int pos = 0, parsed, ret; + int pid; + struct damon_addr_range ar; + int err; + + damon_for_each_task(t, c) { + damon_for_each_region_safe(r, next, t) + damon_destroy_region(r); + } + + while (pos < len) { + ret = sscanf(&str[pos], "%d %lu %lu%n", + &pid, &ar.start, &ar.end, &parsed); + if (ret != 3) + break; + err = add_init_region(c, pid, &ar); + if (err) + goto fail; + pos += parsed; + } + + return 0; + +fail: + damon_for_each_task(t, c) { + damon_for_each_region_safe(r, next, t) + damon_destroy_region(r); + } + return err; +} + +static ssize_t debugfs_init_regions_write(struct file *file, const char __user + *buf, size_t count, loff_t *ppos) +{ + struct damon_ctx *ctx = &damon_user_ctx; + char *kbuf; + ssize_t ret; + int err; + + if (*ppos) + return -EINVAL; + + kbuf = kmalloc(count, GFP_KERNEL); + if (!kbuf) + return -ENOMEM; + + ret = simple_write_to_buffer(kbuf, count, ppos, buf, count); + if (ret < 0) + goto out; + + mutex_lock(&ctx->kdamond_lock); + if (ctx->kdamond) { + ret = -EBUSY; + goto unlock_out; + } + + err = set_init_regions(ctx, kbuf, ret); + if (err) + ret = err; + +unlock_out: + mutex_unlock(&ctx->kdamond_lock); +out: + kfree(kbuf); + return ret; +} static ssize_t debugfs_attrs_read(struct file *file, char __user *buf, size_t count, loff_t *ppos) @@ -1802,6 +1951,12 @@ static const struct file_operations record_fops = { .write = debugfs_record_write, }; +static const struct file_operations init_regions_fops = { + .owner = THIS_MODULE, + .read = debugfs_init_regions_read, + .write = debugfs_init_regions_write, +}; + static const struct file_operations attrs_fops = { .owner = THIS_MODULE, .read = debugfs_attrs_read, @@ -1812,10 +1967,11 @@ static struct dentry *debugfs_root; static int __init damon_debugfs_init(void) { - const char * const file_names[] = {"attrs", "record", "schemes", - "pids", "monitor_on"}; - const struct file_operations *fops[] = {&attrs_fops, &record_fops, - &schemes_fops, &pids_fops, &monitor_on_fops}; + const char * const file_names[] = {"attrs", "init_regions", "record", + "schemes", "pids", "monitor_on"}; + const struct file_operations *fops[] = {&attrs_fops, + &init_regions_fops, &record_fops, &schemes_fops, &pids_fops, + &monitor_on_fops}; int i; debugfs_root = debugfs_create_dir("damon", NULL); -- 2.17.1