Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1550380pxf; Fri, 19 Mar 2021 09:32:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwjqUEsiKioNPTgzYX4Htmd5KiG6JsTgzXA9JfjAhEkLojd6nqfgHraQT7WNjGqwRSdTmmS X-Received: by 2002:a17:906:9243:: with SMTP id c3mr5529826ejx.388.1616171519964; Fri, 19 Mar 2021 09:31:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616171519; cv=none; d=google.com; s=arc-20160816; b=Y6vD4bZY6UsEcJ4YIhhy7NhEKCHXGIhuW7Z6l+w9G7BNSlXu5wd3GLIJwWEYlZLauH kFIim91tWTyClL13Jgrxa7AynSTq9uOl6rouyzX6ruvRuBs7/VJH3gPns2av3MqvKVAL ybHv0ts/1VnrpgVvP+Hpt2qFC2db+vvY0+1PHc8+QScvOGDtyexcfx/3u2eLkernvmL5 wx08NHaaDkXvZhPyS89cA0NSvNF7jjBLDagmCHX9LyV6rAlTevLFAPjmFhd/SrvJwQbZ ZhPERbvwxCA2ySumZq9RGBjxNnEnVx7G2kWIifOWyxA+l43e/oSRD7wiuv0nMzBBdQfU cLIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:sender:dkim-signature; bh=KskjzBV3rfk7FRDeNN3GQyij+s9GzuOuc0wnxa5sFs8=; b=qWoRB6FL/mqz8DRftVvB4Tq+8pktQ8D1Ou0H0ICoRRKUl4LOITjsPbPytGZ/d81VPK lT3jF9Ubq1Fp6TpwCszTevshO5gWd6C1W7ABRA6xxr+OR7W4cWbgqeRfwOl4p8Gje0LN uxwbHJdIbkodz49PyKhf1G2KmJ8tCaMcsjTXAVKzXlvBb9IsDUhC5vdrdXSrTzl5dq+R s4ULpw9n20D2I1nqF5Y7uAloHg1UAMZTxIqdY6TRASCiLaS8oVTMni6D8Qgub24+x4RT 12gCWEpbwySmGSbtx5jchWJbhcmiOhluI/BzlAM6tCkrS4DIfwUyW2EVS8jy+HnvcHl6 j5mg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=mwaVtrri; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i25si4367420edt.491.2021.03.19.09.31.37; Fri, 19 Mar 2021 09:31:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=mwaVtrri; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229941AbhCSQa2 (ORCPT + 99 others); Fri, 19 Mar 2021 12:30:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53142 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229949AbhCSQaM (ORCPT ); Fri, 19 Mar 2021 12:30:12 -0400 Received: from mail-pg1-x536.google.com (mail-pg1-x536.google.com [IPv6:2607:f8b0:4864:20::536]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4F61FC06174A; Fri, 19 Mar 2021 09:30:12 -0700 (PDT) Received: by mail-pg1-x536.google.com with SMTP id n11so4028438pgm.12; Fri, 19 Mar 2021 09:30:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=KskjzBV3rfk7FRDeNN3GQyij+s9GzuOuc0wnxa5sFs8=; b=mwaVtrri9sSp4u8EuvxDMgpiekB565gp/WBhxMaUSg4Li8tlW+Azr5sDlrqBB7pPg4 oukDDoCNyhEqp1Hyc7gTrlNNMqTDbuuO5Dlzdwt0k4SxIcq0fIzDRZVfvaasIr9A23Ni pRHsg6j4B0NTYTggP3Nh0zP8goqjLQJzAsRK4CurYNMSSrf0/utqzsYp6mPjutpgWDy2 EWjOWsNy/m4b4hqQyBHjQdoTXsHoGk2RJVaEq4CJIukNj+GSG3ccc3kSHDR3iWDvwTkD /pK7QuDiyp0vkOlGb5rYJaIF2ikf3x4LgMUGxFwbKvfvh9jtTCch/dxbbu20ogJcnvJ1 4mPQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition :content-transfer-encoding:in-reply-to; bh=KskjzBV3rfk7FRDeNN3GQyij+s9GzuOuc0wnxa5sFs8=; b=GZLbfFoGZ1T+7Incx67pirCFTqll7jNepXqXyRHtD1Q6IzaggecMOju0xbZdDYxQgH qkwgRE/uVP3ORCknW2pLc9krIUnWRi4pnnGLDdx1SISsJSReFUQgOBkFpos0bb1XioxA 0vNI1NNA0euFBtForPUsnxiLGXmrblgpcFHCPrgVfcGvt8n+LkgwYR+BnJibkLsY4bwx QjoSXx1HPvF24GsatpnUoGrHuUHMPwk+dMIsty0L3V/Nk7ra1BGevX+UyOQRy4DtQor1 b68hB0d30o9DpWupW1qeABS7J1802gnS875TKSYdlMG1wB7bk/k/elCxg8zrHNrPcYNz aiPQ== X-Gm-Message-State: AOAM531ID0i9kGh4eYmCFdCC4WhSM3dKPMmxkV5AKttFRsPJ5yjoKU+p I5sKx3Sv+TkSDXI2PF0E2po= X-Received: by 2002:aa7:8702:0:b029:200:50a8:2354 with SMTP id b2-20020aa787020000b029020050a82354mr10088573pfo.72.1616171411787; Fri, 19 Mar 2021 09:30:11 -0700 (PDT) Received: from google.com ([2620:15c:211:201:913d:5573:c956:f033]) by smtp.gmail.com with ESMTPSA id c6sm6640842pfj.99.2021.03.19.09.30.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 19 Mar 2021 09:30:10 -0700 (PDT) Sender: Minchan Kim Date: Fri, 19 Mar 2021 09:30:08 -0700 From: Minchan Kim To: Dmitry Osipenko Cc: Greg Kroah-Hartman , Andrew Morton , linux-mm , LKML , joaodias@google.com, willy@infradead.org, david@redhat.com, surenb@google.com, John Hubbard , Nicolas Chauvet , "linux-tegra@vger.kernel.org" Subject: Re: [PATCH v4] mm: cma: support sysfs Message-ID: References: <33ec18ef-8652-643a-1a53-ff7c3caf4399@gmail.com> <78883205-e6da-5bc4-dcec-b6eb921567b1@gmail.com> <72db59eb-75dc-d1ed-7a83-17052e8f22a8@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <72db59eb-75dc-d1ed-7a83-17052e8f22a8@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 19, 2021 at 07:24:05PM +0300, Dmitry Osipenko wrote: > 19.03.2021 18:50, Greg Kroah-Hartman пишет: > >> Then initialization order won't be a problem. > > I don't understand the problem here, what is wrong with the patch as-is? > > The cma->stat is NULL at the time when CMA is used on ARM because > cma->stat is initialized at the subsys level. This is the problem, > apparently. That's true. > > > Also, watch out, if you only make the kobject dynamic, how are you going > > to get backwards from the kobject to the values you want to send to > > userspace in the show functions? > > Still there should be a wrapper around the kobj with a back reference to > the cma entry. If you're suggesting that I should write a patch, then I > may take a look at it later on. Although, I assume that Minchan could > just correct this patch and re-push it to -next. This is ateempt to address it. Unless any objection, let me send it to akpm. From 29a9fb4f300b754ebf55e6182ba84127658ef504 Mon Sep 17 00:00:00 2001 From: Minchan Kim Date: Fri, 22 Jan 2021 12:31:56 -0800 Subject: [PATCH] mm: cma: support sysfs Since CMA is getting used more widely, it's more important to keep monitoring CMA statistics for system health since it's directly related to user experience. This patch introduces sysfs statistics for CMA, in order to provide some basic monitoring of the CMA allocator. * the number of CMA page successful allocations * the number of CMA page allocation failures These two values allow the user to calcuate the allocation failure rate for each CMA area. e.g.) /sys/kernel/mm/cma/WIFI/alloc_pages_[success|fail] /sys/kernel/mm/cma/SENSOR/alloc_pages_[success|fail] /sys/kernel/mm/cma/BLUETOOTH/alloc_pages_[success|fail] The cma_stat was intentionally allocated by dynamic allocation to harmonize with kobject lifetime management. https://lore.kernel.org/linux-mm/YCOAmXqt6dZkCQYs@kroah.com/ Signed-off-by: Minchan Kim --- Documentation/ABI/testing/sysfs-kernel-mm-cma | 25 ++++ mm/Kconfig | 7 ++ mm/Makefile | 1 + mm/cma.c | 7 +- mm/cma.h | 20 ++++ mm/cma_sysfs.c | 107 ++++++++++++++++++ 6 files changed, 165 insertions(+), 2 deletions(-) create mode 100644 Documentation/ABI/testing/sysfs-kernel-mm-cma create mode 100644 mm/cma_sysfs.c diff --git a/Documentation/ABI/testing/sysfs-kernel-mm-cma b/Documentation/ABI/testing/sysfs-kernel-mm-cma new file mode 100644 index 000000000000..02b2bb60c296 --- /dev/null +++ b/Documentation/ABI/testing/sysfs-kernel-mm-cma @@ -0,0 +1,25 @@ +What: /sys/kernel/mm/cma/ +Date: Feb 2021 +Contact: Minchan Kim +Description: + /sys/kernel/mm/cma/ contains a subdirectory for each CMA + heap name (also sometimes called CMA areas). + + Each CMA heap subdirectory (that is, each + /sys/kernel/mm/cma/ directory) contains the + following items: + + alloc_pages_success + alloc_pages_fail + +What: /sys/kernel/mm/cma//alloc_pages_success +Date: Feb 2021 +Contact: Minchan Kim +Description: + the number of pages CMA API succeeded to allocate + +What: /sys/kernel/mm/cma//alloc_pages_fail +Date: Feb 2021 +Contact: Minchan Kim +Description: + the number of pages CMA API failed to allocate diff --git a/mm/Kconfig b/mm/Kconfig index 24c045b24b95..febb7e8e24de 100644 --- a/mm/Kconfig +++ b/mm/Kconfig @@ -513,6 +513,13 @@ config CMA_DEBUGFS help Turns on the DebugFS interface for CMA. +config CMA_SYSFS + bool "CMA information through sysfs interface" + depends on CMA && SYSFS + help + This option exposes some sysfs attributes to get information + from CMA. + config CMA_AREAS int "Maximum count of the CMA areas" depends on CMA diff --git a/mm/Makefile b/mm/Makefile index 72227b24a616..56968b23ed7a 100644 --- a/mm/Makefile +++ b/mm/Makefile @@ -109,6 +109,7 @@ obj-$(CONFIG_CMA) += cma.o obj-$(CONFIG_MEMORY_BALLOON) += balloon_compaction.o obj-$(CONFIG_PAGE_EXTENSION) += page_ext.o obj-$(CONFIG_CMA_DEBUGFS) += cma_debug.o +obj-$(CONFIG_CMA_SYSFS) += cma_sysfs.o obj-$(CONFIG_USERFAULTFD) += userfaultfd.o obj-$(CONFIG_IDLE_PAGE_TRACKING) += page_idle.o obj-$(CONFIG_DEBUG_PAGE_REF) += debug_page_ref.o diff --git a/mm/cma.c b/mm/cma.c index 908f04775686..ac050359faae 100644 --- a/mm/cma.c +++ b/mm/cma.c @@ -507,10 +507,13 @@ struct page *cma_alloc(struct cma *cma, size_t count, unsigned int align, pr_debug("%s(): returned %p\n", __func__, page); out: - if (page) + if (page) { count_vm_event(CMA_ALLOC_SUCCESS); - else + cma_sysfs_alloc_pages_count(cma, count); + } else { count_vm_event(CMA_ALLOC_FAIL); + cma_sysfs_fail_pages_count(cma, count); + } return page; } diff --git a/mm/cma.h b/mm/cma.h index 42ae082cb067..70fd7633fe01 100644 --- a/mm/cma.h +++ b/mm/cma.h @@ -3,6 +3,12 @@ #define __MM_CMA_H__ #include +#include + +struct cma_kobject { + struct cma *cma; + struct kobject kobj; +}; struct cma { unsigned long base_pfn; @@ -16,6 +22,13 @@ struct cma { struct debugfs_u32_array dfs_bitmap; #endif char name[CMA_MAX_NAME]; +#ifdef CONFIG_CMA_SYSFS + /* the number of CMA page successful allocations */ + atomic64_t nr_pages_succeeded; + /* the number of CMA page allocation failures */ + atomic64_t nr_pages_failed; + struct cma_kobject *kobj; +#endif }; extern struct cma cma_areas[MAX_CMA_AREAS]; @@ -26,4 +39,11 @@ static inline unsigned long cma_bitmap_maxno(struct cma *cma) return cma->count >> cma->order_per_bit; } +#ifdef CONFIG_CMA_SYSFS +void cma_sysfs_alloc_pages_count(struct cma *cma, size_t count); +void cma_sysfs_fail_pages_count(struct cma *cma, size_t count); +#else +static inline void cma_sysfs_alloc_pages_count(struct cma *cma, size_t count) {}; +static inline void cma_sysfs_fail_pages_count(struct cma *cma, size_t count) {}; +#endif #endif diff --git a/mm/cma_sysfs.c b/mm/cma_sysfs.c new file mode 100644 index 000000000000..ca093e9e9f64 --- /dev/null +++ b/mm/cma_sysfs.c @@ -0,0 +1,107 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * CMA SysFS Interface + * + * Copyright (c) 2021 Minchan Kim + */ + +#include +#include +#include + +#include "cma.h" + +void cma_sysfs_alloc_pages_count(struct cma *cma, size_t count) +{ + atomic64_add(count, &cma->nr_pages_succeeded); +} + +void cma_sysfs_fail_pages_count(struct cma *cma, size_t count) +{ + atomic64_add(count, &cma->nr_pages_failed); +} + +#define CMA_ATTR_RO(_name) \ + static struct kobj_attribute _name##_attr = __ATTR_RO(_name) + +static ssize_t alloc_pages_success_show(struct kobject *kobj, + struct kobj_attribute *attr, char *buf) +{ + struct cma_kobject *cma_kobj = container_of(kobj, struct cma_kobject, kobj); + struct cma *cma = cma_kobj->cma; + + return sysfs_emit(buf, "%llu\n", atomic64_read(&cma->nr_pages_succeeded)); +} +CMA_ATTR_RO(alloc_pages_success); + +static ssize_t alloc_pages_fail_show(struct kobject *kobj, + struct kobj_attribute *attr, char *buf) +{ + struct cma_kobject *cma_kobj = container_of(kobj, struct cma_kobject, kobj); + struct cma *cma = cma_kobj->cma; + + return sysfs_emit(buf, "%llu\n", atomic64_read(&cma->nr_pages_failed)); +} +CMA_ATTR_RO(alloc_pages_fail); + +static void cma_kobj_release(struct kobject *kobj) +{ + struct cma_kobject *cma_kobj = container_of(kobj, struct cma_kobject, kobj); + + kfree(cma_kobj); +} + +static struct attribute *cma_attrs[] = { + &alloc_pages_success_attr.attr, + &alloc_pages_fail_attr.attr, + NULL, +}; +ATTRIBUTE_GROUPS(cma); + +static struct cma_kobject *cma_kobjs; +static struct kobject *cma_kobj_root; + +static struct kobj_type cma_ktype = { + .release = cma_kobj_release, + .sysfs_ops = &kobj_sysfs_ops, + .default_groups = cma_groups +}; + +static int __init cma_sysfs_init(void) +{ + int i = 0; + struct cma *cma; + + cma_kobj_root = kobject_create_and_add("cma", mm_kobj); + if (!cma_kobj_root) + return -ENOMEM; + + cma_kobjs = kcalloc(cma_area_count, sizeof(struct cma_kobject), + GFP_KERNEL); + if (ZERO_OR_NULL_PTR(cma_kobjs)) + goto out; + + do { + cma = &cma_areas[i]; + cma->kobj = &cma_kobjs[i]; + cma->kobj->cma = cma; + if (kobject_init_and_add(&cma->kobj->kobj, &cma_ktype, + cma_kobj_root, "%s", cma->name)) { + kobject_put(&cma->kobj->kobj); + goto out; + } + } while (++i < cma_area_count); + + return 0; +out: + while (--i >= 0) { + cma = &cma_areas[i]; + kobject_put(&cma->kobj->kobj); + } + + kfree(cma_kobjs); + kobject_put(cma_kobj_root); + + return -ENOMEM; +} +subsys_initcall(cma_sysfs_init); -- 2.31.0.rc2.261.g7f71774620-goog