diff options
author | SeongJae Park <sj@kernel.org> | 2022-01-14 14:10:50 -0800 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2022-01-15 16:30:33 +0200 |
commit | 76fd0285b447991267e838842c0be7395eb454bb (patch) | |
tree | 3237bb3b04ecac3eda048f6467afeb8f3bcd8a30 /mm/huge_memory.c | |
parent | 962fe7a6b1b2f9deb1b31b3344afa3b11afdf7ab (diff) | |
download | linux-76fd0285b447991267e838842c0be7395eb454bb.tar.bz2 |
mm/damon: hide kernel pointer from tracepoint event
DAMON's virtual address spaces monitoring primitive uses 'struct pid *'
of the target process as its monitoring target id. The kernel address
is exposed as-is to the user space via the DAMON tracepoint,
'damon_aggregated'.
Though primarily only privileged users are allowed to access that, it
would be better to avoid unnecessarily exposing kernel pointers so.
Because the trace result is only required to be able to distinguish each
target, we aren't need to use the pointer as-is.
This makes the tracepoint to use the index of the target in the
context's targets list as its id in the tracepoint, to hide the kernel
space address.
Link: https://lkml.kernel.org/r/20211229131016.23641-5-sj@kernel.org
Signed-off-by: SeongJae Park <sj@kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'mm/huge_memory.c')
0 files changed, 0 insertions, 0 deletions