Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp201804pxu; Wed, 7 Oct 2020 00:17:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw99GWWrGa3+95AbdLNJwrJMwVJuU4khlQMXAcVJS+FeM3wO9lGarWQVOCgy8YU4COOxxWh X-Received: by 2002:aa7:c054:: with SMTP id k20mr2111396edo.224.1602055051675; Wed, 07 Oct 2020 00:17:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602055051; cv=none; d=google.com; s=arc-20160816; b=htEUhySL5RcD4BstwOixtT3f9FAkAWNSBvWkFjgPGxnTzOQvutpfjZ+R7vna6lnjb7 ElF5F172vowI3oPRjJ8mPRDvsyXLvDNlX2rILxc4Mvd7uODCVJjo0Sw+dXrzH2n2UvYT rSuy0zpg2qRYgmSQYFwm2jks9evPjzXBd2nkYP/nYVUgGz8SfNc5SqiIkQiG5HtahQDm XWSr34gG2vSKcDe7yxHiP0jzwZEEyop/a2+a6J1FF34BnYQiP4QOC1rqKE2I9SalEKyK Z3gIRGcjmF8VGecgrPhdUn53cAjnow5TXetQX79p8ERixd+ytBrqxmpq2jKcK8aSwT2A D50A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=OxApDNVBe9qJrgKMXpVHXXem1zXkEyX41XgSrJ5ico4=; b=IDryZHzdNr3MXkLK0xqs5o/axEtRiW9Jy9c9oDCmE0lMbipLNS5XNMAJv3LgYYnUFj AZvA+deU0/v1pxVJReSF/rkUdKZDapk0Mqoc5/a4XlRbVyKQEWcrl1MMlSLP5xgR9Ynb HU6qM2B2Fl/FtT5q3vkvEFfNtkLH8nvzBO0TcjZrFCv4TcWEAuaCvU308CtRGMNqubwg wTQdkXwvIXJiA6frl4cSwQPx3GHFswYX3q1Z072ZDbcO6U96Gx9Jew3GgFVabJFxTgOZ 3pGm6BMiDpJm9R6cyXE3BpJDgu3oD4M1G+O7OHNwalqGf79oeZWOD3qLFVfObzFyIvWE K1ew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=izglYSq4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p21si768807edx.207.2020.10.07.00.17.08; Wed, 07 Oct 2020 00:17:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=izglYSq4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727697AbgJGHPR (ORCPT + 99 others); Wed, 7 Oct 2020 03:15:17 -0400 Received: from smtp-fw-6002.amazon.com ([52.95.49.90]:52470 "EHLO smtp-fw-6002.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727684AbgJGHPR (ORCPT ); Wed, 7 Oct 2020 03:15:17 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1602054916; x=1633590916; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version; bh=OxApDNVBe9qJrgKMXpVHXXem1zXkEyX41XgSrJ5ico4=; b=izglYSq4Ixoe7yY7ZGzN5swP1eOo/D22sXd38EY5B823NCNIMoVFVqcG TsIE7BQf8rdok08kyOMAE9vl3rb+meLkx4NcvWdsrFA4Nx8eJtTEJJ9S2 PkBRoLJPCTqxVbu57Eouxqg+okwCaqB+kOyevV7Qi8X2lg+z8OkQtQhiM U=; X-IronPort-AV: E=Sophos;i="5.77,345,1596499200"; d="scan'208";a="58523428" Received: from iad12-co-svc-p1-lb1-vlan3.amazon.com (HELO email-inbound-relay-1d-74cf8b49.us-east-1.amazon.com) ([10.43.8.6]) by smtp-border-fw-out-6002.iad6.amazon.com with ESMTP; 07 Oct 2020 07:15:15 +0000 Received: from EX13D31EUA004.ant.amazon.com (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38]) by email-inbound-relay-1d-74cf8b49.us-east-1.amazon.com (Postfix) with ESMTPS id CC8FAC09AE; Wed, 7 Oct 2020 07:15:03 +0000 (UTC) Received: from u3f2cd687b01c55.ant.amazon.com (10.43.162.73) by EX13D31EUA004.ant.amazon.com (10.43.165.161) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 7 Oct 2020 07:14:47 +0000 From: SeongJae Park To: CC: SeongJae Park , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Subject: [RFC v9 01/10] damon/dbgfs: Allow users to set initial monitoring target regions Date: Wed, 7 Oct 2020 09:14:00 +0200 Message-ID: <20201007071409.12174-2-sjpark@amazon.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20201007071409.12174-1-sjpark@amazon.com> References: <20201007071409.12174-1-sjpark@amazon.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.43.162.73] X-ClientProxiedBy: EX13D31UWA003.ant.amazon.com (10.43.160.130) To EX13D31EUA004.ant.amazon.com (10.43.165.161) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: SeongJae Park Some 'damon-dbgfs' users would want to monitor only a part of the entire virtual memory address space. The framework users in the kernel space could use '->init_target_regions' callback or even set the regions inside the context struct as they want, but 'damon-dbgfs' users cannot. For the reason, this commit introduces a new debugfs file, 'init_region'. 'damon-dbgfs' users can specify which initial monitoring target address regions they want by writing special input to the file. The input should describe each region in each line in below form: Note that the regions will be updated to cover entire memory mapped regions after 'regions update interval'. If you want the regions to not be updated after the initial setting, you could set the interval as a very long time, say, a few decades. Signed-off-by: SeongJae Park --- mm/damon/dbgfs.c | 154 ++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 151 insertions(+), 3 deletions(-) diff --git a/mm/damon/dbgfs.c b/mm/damon/dbgfs.c index 9390ed9b9304..28076557ea86 100644 --- a/mm/damon/dbgfs.c +++ b/mm/damon/dbgfs.c @@ -523,6 +523,147 @@ static ssize_t dbgfs_target_ids_write(struct file *file, return ret; } +static ssize_t sprint_init_regions(struct damon_ctx *c, char *buf, ssize_t len) +{ + struct damon_target *t; + struct damon_region *r; + int written = 0; + int rc; + + damon_for_each_target(t, c) { + damon_for_each_region(r, t) { + rc = scnprintf(&buf[written], len - written, + "%lu %lu %lu\n", + t->id, r->ar.start, r->ar.end); + if (!rc) + return -ENOMEM; + written += rc; + } + } + return written; +} + +static ssize_t dbgfs_init_regions_read(struct file *file, char __user *buf, + size_t count, loff_t *ppos) +{ + struct damon_ctx *ctx = file->private_data; + char *kbuf; + ssize_t len; + + kbuf = kmalloc(count, GFP_KERNEL); + if (!kbuf) + return -ENOMEM; + + mutex_lock(&ctx->kdamond_lock); + if (ctx->kdamond) { + mutex_unlock(&ctx->kdamond_lock); + return -EBUSY; + } + + len = sprint_init_regions(ctx, kbuf, count); + mutex_unlock(&ctx->kdamond_lock); + if (len < 0) + goto out; + len = simple_read_from_buffer(buf, count, ppos, kbuf, len); + +out: + kfree(kbuf); + return len; +} + +static int add_init_region(struct damon_ctx *c, + unsigned long target_id, struct damon_addr_range *ar) +{ + struct damon_target *t; + struct damon_region *r, *prev; + int rc = -EINVAL; + + if (ar->start >= ar->end) + return -EINVAL; + + damon_for_each_target(t, c) { + if (t->id == target_id) { + r = damon_new_region(ar->start, ar->end); + if (!r) + return -ENOMEM; + damon_add_region(r, t); + if (damon_nr_regions(t) > 1) { + prev = damon_prev_region(r); + if (prev->ar.end > r->ar.start) { + damon_destroy_region(r); + return -EINVAL; + } + } + rc = 0; + } + } + return rc; +} + +static int set_init_regions(struct damon_ctx *c, const char *str, ssize_t len) +{ + struct damon_target *t; + struct damon_region *r, *next; + int pos = 0, parsed, ret; + unsigned long target_id; + struct damon_addr_range ar; + int err; + + damon_for_each_target(t, c) { + damon_for_each_region_safe(r, next, t) + damon_destroy_region(r); + } + + while (pos < len) { + ret = sscanf(&str[pos], "%lu %lu %lu%n", + &target_id, &ar.start, &ar.end, &parsed); + if (ret != 3) + break; + err = add_init_region(c, target_id, &ar); + if (err) + goto fail; + pos += parsed; + } + + return 0; + +fail: + damon_for_each_target(t, c) { + damon_for_each_region_safe(r, next, t) + damon_destroy_region(r); + } + return err; +} + +static ssize_t dbgfs_init_regions_write(struct file *file, + const char __user *buf, size_t count, + loff_t *ppos) +{ + struct damon_ctx *ctx = file->private_data; + char *kbuf; + ssize_t ret = count; + int err; + + kbuf = user_input_str(buf, count, ppos); + if (IS_ERR(kbuf)) + return PTR_ERR(kbuf); + + mutex_lock(&ctx->kdamond_lock); + if (ctx->kdamond) { + ret = -EBUSY; + goto unlock_out; + } + + err = set_init_regions(ctx, kbuf, ret); + if (err) + ret = err; + +unlock_out: + mutex_unlock(&ctx->kdamond_lock); + kfree(kbuf); + return ret; +} + static ssize_t dbgfs_kdamond_pid_read(struct file *file, char __user *buf, size_t count, loff_t *ppos) { @@ -584,6 +725,13 @@ static const struct file_operations target_ids_fops = { .write = dbgfs_target_ids_write, }; +static const struct file_operations init_regions_fops = { + .owner = THIS_MODULE, + .open = damon_dbgfs_open, + .read = dbgfs_init_regions_read, + .write = dbgfs_init_regions_write, +}; + static const struct file_operations kdamond_pid_fops = { .owner = THIS_MODULE, .open = damon_dbgfs_open, @@ -593,9 +741,9 @@ static const struct file_operations kdamond_pid_fops = { static int dbgfs_fill_ctx_dir(struct dentry *dir, struct damon_ctx *ctx) { const char * const file_names[] = {"attrs", "record", "schemes", - "target_ids", "kdamond_pid"}; - const struct file_operations *fops[] = {&attrs_fops, - &record_fops, &schemes_fops, &target_ids_fops, + "target_ids", "init_regions", "kdamond_pid"}; + const struct file_operations *fops[] = {&attrs_fops, &record_fops, + &schemes_fops, &target_ids_fops, &init_regions_fops, &kdamond_pid_fops}; int i; -- 2.17.1