Message ID | 20220426203843.45238-1-sj@kernel.org (mailing list archive) |
---|---|
Headers | show
Return-Path: <owner-linux-mm@kvack.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 92A7FC433F5 for <linux-mm@archiver.kernel.org>; Tue, 26 Apr 2022 20:38:53 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 1E6B56B0073; Tue, 26 Apr 2022 16:38:53 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 196966B0074; Tue, 26 Apr 2022 16:38:53 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 037E76B0075; Tue, 26 Apr 2022 16:38:52 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (relay.hostedemail.com [64.99.140.25]) by kanga.kvack.org (Postfix) with ESMTP id EAC4F6B0073 for <linux-mm@kvack.org>; Tue, 26 Apr 2022 16:38:52 -0400 (EDT) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay11.hostedemail.com (Postfix) with ESMTP id C0E9080F6E for <linux-mm@kvack.org>; Tue, 26 Apr 2022 20:38:52 +0000 (UTC) X-FDA: 79400194104.21.D918EAA Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf03.hostedemail.com (Postfix) with ESMTP id B3E4E20043 for <linux-mm@kvack.org>; Tue, 26 Apr 2022 20:38:48 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id F07B4B82324; Tue, 26 Apr 2022 20:38:50 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 105F8C385A4; Tue, 26 Apr 2022 20:38:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651005529; bh=7FM2Cl7AYC/kifHZh+3Yf++v1gAZu2HGgYiMvm091PM=; h=From:To:Cc:Subject:Date:From; b=NazlHfNpSvgyX+SbULKpToTFyGeXYPFyIMsGsOw0k4k5foImoKxEh/1s+kyiY/TQ3 lcC0ZW7RJn6eBepwpRHydi2VOANXlAyAm0zvUWh5mngliAz+jqKcZtIee5VmRINhaf T4IK7klTBVVzp9Pl7P6TZ03Klu8iZmCmr54zGZfUTpWH9lSvMpjZqUf32Kld3oFZRL xoMnCxhm7dm8ASpLW/7QhI2cH/LT8h5h2KYQYHnR9PYsuQ0CG6LqENNBnFGZUY1xrO zkjbzHVe5O0d41z/xTqP8kGC0yhF6CRdRcBjO3Fw/Vsp2spdP/T28oVu7A0gw9ZBkH hP65n/n7Bp54g== From: sj@kernel.org To: akpm@linux-foundation.org Cc: linux-damon@amazon.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, SeongJae Park <sj@kernel.org> Subject: [PATCH 0/4] mm/damon: allow users know which monitoring ops are available Date: Tue, 26 Apr 2022 20:38:39 +0000 Message-Id: <20220426203843.45238-1-sj@kernel.org> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Stat-Signature: rta4hg8fffqubpxedwdzn1tpyt91ymxw X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: B3E4E20043 X-Rspam-User: Authentication-Results: imf03.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=NazlHfNp; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf03.hostedemail.com: domain of sj@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=sj@kernel.org X-HE-Tag: 1651005528-879484 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: <linux-mm.kvack.org> |
Series |
mm/damon: allow users know which monitoring ops are available
|
expand
|
From: SeongJae Park <sj@kernel.org> DAMON users can configure it for vaious address spaces including virtual address spaces and the physical address space by setting its monitoring operations set with appropriate one for their purpose. However, there is no celan and simple way to know exactly which monitoring operations sets are available on the currently running kernel. This patchset adds functions for the purpose on DAMON's kernel API ('damon_is_registered_ops()') and sysfs interface ('avail_operations' file under each context directory). SeongJae Park (4): mm/damon/core: add a function for damon_operations registration checks mm/damon/sysfs: add a file for listing available monitoring ops selftets/damon/sysfs: test existence and permission of avail_operations Docs/{ABI,admin-guide}/damon: document 'avail_operations' sysfs file .../ABI/testing/sysfs-kernel-mm-damon | 10 +++++++- Documentation/admin-guide/mm/damon/usage.rst | 18 +++++++++----- include/linux/damon.h | 1 + mm/damon/core.c | 24 ++++++++++++++++--- mm/damon/sysfs.c | 19 +++++++++++++++ tools/testing/selftests/damon/sysfs.sh | 1 + 6 files changed, 63 insertions(+), 10 deletions(-)