Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1594098pxf; Fri, 19 Mar 2021 10:34:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxPAghodyxPtBDTJYVESuP5YJZ8Y/mdQiGRGxtnJrq9WgwpsEFtoBJ5RUXxfGHtbWamobre X-Received: by 2002:a17:906:7fc4:: with SMTP id r4mr5596562ejs.81.1616175287591; Fri, 19 Mar 2021 10:34:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616175287; cv=none; d=google.com; s=arc-20160816; b=Rg9NndO2VBIzVWxPseciwQs/ocV+fPMGuvHFx37ZHnOdRl3YOPQNw64lOC/mqtAbXC oM15NiWw94nsCW3jNS7YhHjTEEbiMFvd79zCA1dORGqhwxJikACnqDD6KUowEIGsTxwg dE2ypsaecQhaIUTYlBVxSCBmHvDmJUCTmNVqyuScjH1lJtQusT9+0eh/CEa8SqP/aCCo vSxQKFSsliYafXwmpDehaQqXkqzkI9q2AJ/mc9dTsOnWJt6qhVMzKadK9O3fUqzG8D/H GbNs44QxWyHQ51xR7OXuu4gGBYVT9JPy5r2YtCEOGELHIULdnvddEsVDDT4NbNDWiO0z DHNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=cy2Irpbz4qk+WltFDzDSfC5epYt0eCHfQLX7UE6kz04=; b=CDaYSjhf2eYUAEqipYzgOHgdQ4nuk2tE8QK/eEYPVeSE3G7bmebw6WokGUfINWpbGz i1b+1AKxTbo9zYek1AwuWnuodtCseH9C5u1X/Cd7CSV27QoMOpBhKPBh5JGvbr7xCNcC ABjLnMGJYitfLdPdKiSBvLGNNNegfoh9uKrej8n8kmE8U/vLhfx6fqXq5oYwOV4N233h CHKEDQU3JU1JYXPCDG9tOoyzKchUr0irFhA2lcB2/j8U3bYOvHrZCLM2SlkHiUqtjzuM AnLmq3LZRmWctLXST88Hg1VA5obwiOjk2aU/1gzcikv00O870fI+HToThwKkNOSBYMEn 1JkA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=NNulOJuX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l12si4848876ejn.151.2021.03.19.10.34.23; Fri, 19 Mar 2021 10:34:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=NNulOJuX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230223AbhCSR3u (ORCPT + 99 others); Fri, 19 Mar 2021 13:29:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37814 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230041AbhCSR3d (ORCPT ); Fri, 19 Mar 2021 13:29:33 -0400 Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com [IPv6:2a00:1450:4864:20::12f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D0903C06174A; Fri, 19 Mar 2021 10:29:32 -0700 (PDT) Received: by mail-lf1-x12f.google.com with SMTP id a198so11182027lfd.7; Fri, 19 Mar 2021 10:29:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=cy2Irpbz4qk+WltFDzDSfC5epYt0eCHfQLX7UE6kz04=; b=NNulOJuXVv210l+pFrGFDWhcN41WBxbks8BJDH58Xh89LnvQaRW48zLynfeFW/rm95 kpPQIyGpjGhm8YSzqXoLyrae5WTLDYIeiHpMgPbCr2UGoJdkoC6v/AsCgfbrzzr9Q9Mg 0XFOFwhE3DGErrBvKEYTEpZbJkJoSUhaCllP70yBFL84Xy0kmPKwrgXKUFGtYY4Rp7vh wbt8brJamxN1cwJgjon5GIzWPfErMv6OYIF+3LiIhcMfLKpVEGcA9DC7no+UdQv0tOg1 wPTxSSUcCNttLCIwijHEAomQGcnM1JI1xsf6OBgWkMz68QPIXatlM3WGI9XEdFNO4I7b JQgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=cy2Irpbz4qk+WltFDzDSfC5epYt0eCHfQLX7UE6kz04=; b=kx0wyZhzWJVFIGiwPnd+hKk47pWa+jfuFCXEzZYE+BYOfZ+KXSwUfgeOjtWYSlqXdI WxjQFMuqxAxsEHBeEnCx0diMPp9ivY6D/OROKZUzkdivYIQmCLsSoCFMlMgpayMBs2s5 VHjAzbgNEaYaBM9po3uSeszo+DpG/QQBzfYuw9t+tmwT2s7X0oF6Aa8J3WuZnAzO7UlN WsqzL6fmEmPzvEkKS4GnvLjpxwRHXLJYJ4/CwpfgHjnqnqb2IM5fgn/Pkd6nqNxRMuK3 kEaZMollZCWEgnHa4UMEv75jXdjTSELQlDWGb9UKG4k6v2vtf0yAuXziEi8xvBnwuhWc UX4w== X-Gm-Message-State: AOAM531xd82AM8cBWZ4LEcNvR88OQvcXdF2rPb7BgfijB91JQlFY1hMg 4Lstee0ZmfLlZneY/X9paX8PBQGyjU0= X-Received: by 2002:a05:6512:6c3:: with SMTP id u3mr1346362lff.443.1616174971051; Fri, 19 Mar 2021 10:29:31 -0700 (PDT) Received: from [192.168.2.145] (109-252-193-52.dynamic.spd-mgts.ru. [109.252.193.52]) by smtp.googlemail.com with ESMTPSA id s29sm849380ljo.136.2021.03.19.10.29.29 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 19 Mar 2021 10:29:30 -0700 (PDT) Subject: Re: [PATCH v4] mm: cma: support sysfs To: Minchan Kim Cc: Greg Kroah-Hartman , Andrew Morton , linux-mm , LKML , joaodias@google.com, willy@infradead.org, david@redhat.com, surenb@google.com, John Hubbard , Nicolas Chauvet , "linux-tegra@vger.kernel.org" References: <33ec18ef-8652-643a-1a53-ff7c3caf4399@gmail.com> <78883205-e6da-5bc4-dcec-b6eb921567b1@gmail.com> <72db59eb-75dc-d1ed-7a83-17052e8f22a8@gmail.com> From: Dmitry Osipenko Message-ID: <82bde114-60c0-3fde-43f4-844522b80673@gmail.com> Date: Fri, 19 Mar 2021 20:29:29 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 19.03.2021 19:30, Minchan Kim пишет: > On Fri, Mar 19, 2021 at 07:24:05PM +0300, Dmitry Osipenko wrote: >> 19.03.2021 18:50, Greg Kroah-Hartman пишет: >>>> Then initialization order won't be a problem. >>> I don't understand the problem here, what is wrong with the patch as-is? >> >> The cma->stat is NULL at the time when CMA is used on ARM because >> cma->stat is initialized at the subsys level. This is the problem, >> apparently. > > That's true. > >> >>> Also, watch out, if you only make the kobject dynamic, how are you going >>> to get backwards from the kobject to the values you want to send to >>> userspace in the show functions? >> >> Still there should be a wrapper around the kobj with a back reference to >> the cma entry. If you're suggesting that I should write a patch, then I >> may take a look at it later on. Although, I assume that Minchan could >> just correct this patch and re-push it to -next. > > This is ateempt to address it. Unless any objection, let me send it to > akpm. > > From 29a9fb4f300b754ebf55e6182ba84127658ef504 Mon Sep 17 00:00:00 2001 > From: Minchan Kim > Date: Fri, 22 Jan 2021 12:31:56 -0800 > Subject: [PATCH] mm: cma: support sysfs > > Since CMA is getting used more widely, it's more important to > keep monitoring CMA statistics for system health since it's > directly related to user experience. > > This patch introduces sysfs statistics for CMA, in order to provide > some basic monitoring of the CMA allocator. > > * the number of CMA page successful allocations > * the number of CMA page allocation failures > > These two values allow the user to calcuate the allocation > failure rate for each CMA area. > > e.g.) > /sys/kernel/mm/cma/WIFI/alloc_pages_[success|fail] > /sys/kernel/mm/cma/SENSOR/alloc_pages_[success|fail] > /sys/kernel/mm/cma/BLUETOOTH/alloc_pages_[success|fail] > > The cma_stat was intentionally allocated by dynamic allocation > to harmonize with kobject lifetime management. > https://lore.kernel.org/linux-mm/YCOAmXqt6dZkCQYs@kroah.com/ > > Signed-off-by: Minchan Kim > --- > Documentation/ABI/testing/sysfs-kernel-mm-cma | 25 ++++ > mm/Kconfig | 7 ++ > mm/Makefile | 1 + > mm/cma.c | 7 +- > mm/cma.h | 20 ++++ > mm/cma_sysfs.c | 107 ++++++++++++++++++ > 6 files changed, 165 insertions(+), 2 deletions(-) > create mode 100644 Documentation/ABI/testing/sysfs-kernel-mm-cma > create mode 100644 mm/cma_sysfs.c > > diff --git a/Documentation/ABI/testing/sysfs-kernel-mm-cma b/Documentation/ABI/testing/sysfs-kernel-mm-cma > new file mode 100644 > index 000000000000..02b2bb60c296 > --- /dev/null > +++ b/Documentation/ABI/testing/sysfs-kernel-mm-cma > @@ -0,0 +1,25 @@ > +What: /sys/kernel/mm/cma/ > +Date: Feb 2021 > +Contact: Minchan Kim > +Description: > + /sys/kernel/mm/cma/ contains a subdirectory for each CMA > + heap name (also sometimes called CMA areas). > + > + Each CMA heap subdirectory (that is, each > + /sys/kernel/mm/cma/ directory) contains the > + following items: > + > + alloc_pages_success > + alloc_pages_fail > + > +What: /sys/kernel/mm/cma//alloc_pages_success > +Date: Feb 2021 > +Contact: Minchan Kim > +Description: > + the number of pages CMA API succeeded to allocate > + > +What: /sys/kernel/mm/cma//alloc_pages_fail > +Date: Feb 2021 > +Contact: Minchan Kim > +Description: > + the number of pages CMA API failed to allocate > diff --git a/mm/Kconfig b/mm/Kconfig > index 24c045b24b95..febb7e8e24de 100644 > --- a/mm/Kconfig > +++ b/mm/Kconfig > @@ -513,6 +513,13 @@ config CMA_DEBUGFS > help > Turns on the DebugFS interface for CMA. > > +config CMA_SYSFS > + bool "CMA information through sysfs interface" > + depends on CMA && SYSFS > + help > + This option exposes some sysfs attributes to get information > + from CMA. > + > config CMA_AREAS > int "Maximum count of the CMA areas" > depends on CMA > diff --git a/mm/Makefile b/mm/Makefile > index 72227b24a616..56968b23ed7a 100644 > --- a/mm/Makefile > +++ b/mm/Makefile > @@ -109,6 +109,7 @@ obj-$(CONFIG_CMA) += cma.o > obj-$(CONFIG_MEMORY_BALLOON) += balloon_compaction.o > obj-$(CONFIG_PAGE_EXTENSION) += page_ext.o > obj-$(CONFIG_CMA_DEBUGFS) += cma_debug.o > +obj-$(CONFIG_CMA_SYSFS) += cma_sysfs.o > obj-$(CONFIG_USERFAULTFD) += userfaultfd.o > obj-$(CONFIG_IDLE_PAGE_TRACKING) += page_idle.o > obj-$(CONFIG_DEBUG_PAGE_REF) += debug_page_ref.o > diff --git a/mm/cma.c b/mm/cma.c > index 908f04775686..ac050359faae 100644 > --- a/mm/cma.c > +++ b/mm/cma.c > @@ -507,10 +507,13 @@ struct page *cma_alloc(struct cma *cma, size_t count, unsigned int align, > > pr_debug("%s(): returned %p\n", __func__, page); > out: > - if (page) > + if (page) { > count_vm_event(CMA_ALLOC_SUCCESS); > - else > + cma_sysfs_alloc_pages_count(cma, count); > + } else { > count_vm_event(CMA_ALLOC_FAIL); > + cma_sysfs_fail_pages_count(cma, count); > + } > > return page; > } > diff --git a/mm/cma.h b/mm/cma.h > index 42ae082cb067..70fd7633fe01 100644 > --- a/mm/cma.h > +++ b/mm/cma.h > @@ -3,6 +3,12 @@ > #define __MM_CMA_H__ > > #include > +#include > + > +struct cma_kobject { > + struct cma *cma; > + struct kobject kobj; > +}; > > struct cma { > unsigned long base_pfn; > @@ -16,6 +22,13 @@ struct cma { > struct debugfs_u32_array dfs_bitmap; > #endif > char name[CMA_MAX_NAME]; > +#ifdef CONFIG_CMA_SYSFS > + /* the number of CMA page successful allocations */ > + atomic64_t nr_pages_succeeded; > + /* the number of CMA page allocation failures */ > + atomic64_t nr_pages_failed; > + struct cma_kobject *kobj; > +#endif > }; > > extern struct cma cma_areas[MAX_CMA_AREAS]; > @@ -26,4 +39,11 @@ static inline unsigned long cma_bitmap_maxno(struct cma *cma) > return cma->count >> cma->order_per_bit; > } > > +#ifdef CONFIG_CMA_SYSFS > +void cma_sysfs_alloc_pages_count(struct cma *cma, size_t count); > +void cma_sysfs_fail_pages_count(struct cma *cma, size_t count); > +#else > +static inline void cma_sysfs_alloc_pages_count(struct cma *cma, size_t count) {}; > +static inline void cma_sysfs_fail_pages_count(struct cma *cma, size_t count) {}; > +#endif > #endif > diff --git a/mm/cma_sysfs.c b/mm/cma_sysfs.c > new file mode 100644 > index 000000000000..ca093e9e9f64 > --- /dev/null > +++ b/mm/cma_sysfs.c > @@ -0,0 +1,107 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * CMA SysFS Interface > + * > + * Copyright (c) 2021 Minchan Kim > + */ > + > +#include > +#include > +#include > + > +#include "cma.h" > + > +void cma_sysfs_alloc_pages_count(struct cma *cma, size_t count) > +{ > + atomic64_add(count, &cma->nr_pages_succeeded); > +} > + > +void cma_sysfs_fail_pages_count(struct cma *cma, size_t count) > +{ > + atomic64_add(count, &cma->nr_pages_failed); > +} > + > +#define CMA_ATTR_RO(_name) \ > + static struct kobj_attribute _name##_attr = __ATTR_RO(_name) > + > +static ssize_t alloc_pages_success_show(struct kobject *kobj, > + struct kobj_attribute *attr, char *buf) The indentations are still wrong. CHECK: Alignment should match open parenthesis #321: FILE: mm/cma_sysfs.c:28: +static ssize_t alloc_pages_success_show(struct kobject *kobj, + struct kobj_attribute *attr, char *buf) > +{ > + struct cma_kobject *cma_kobj = container_of(kobj, struct cma_kobject, kobj); > + struct cma *cma = cma_kobj->cma; > + > + return sysfs_emit(buf, "%llu\n", atomic64_read(&cma->nr_pages_succeeded)); > +} > +CMA_ATTR_RO(alloc_pages_success); > + > +static ssize_t alloc_pages_fail_show(struct kobject *kobj, > + struct kobj_attribute *attr, char *buf) CHECK: Alignment should match open parenthesis #331: FILE: mm/cma_sysfs.c:38: +static ssize_t alloc_pages_fail_show(struct kobject *kobj, + struct kobj_attribute *attr, char *buf) > +{ > + struct cma_kobject *cma_kobj = container_of(kobj, struct cma_kobject, kobj); > + struct cma *cma = cma_kobj->cma; > + > + return sysfs_emit(buf, "%llu\n", atomic64_read(&cma->nr_pages_failed)); > +} > +CMA_ATTR_RO(alloc_pages_fail); > + > +static void cma_kobj_release(struct kobject *kobj) > +{ > + struct cma_kobject *cma_kobj = container_of(kobj, struct cma_kobject, kobj); > + > + kfree(cma_kobj); > +} > + > +static struct attribute *cma_attrs[] = { > + &alloc_pages_success_attr.attr, > + &alloc_pages_fail_attr.attr, > + NULL, > +}; > +ATTRIBUTE_GROUPS(cma); > + > +static struct cma_kobject *cma_kobjs; > +static struct kobject *cma_kobj_root; > + > +static struct kobj_type cma_ktype = { > + .release = cma_kobj_release, > + .sysfs_ops = &kobj_sysfs_ops, > + .default_groups = cma_groups > +}; > + > +static int __init cma_sysfs_init(void) > +{ > + int i = 0; > + struct cma *cma; > + > + cma_kobj_root = kobject_create_and_add("cma", mm_kobj); > + if (!cma_kobj_root) > + return -ENOMEM; > + > + cma_kobjs = kcalloc(cma_area_count, sizeof(struct cma_kobject), > + GFP_KERNEL); CHECK: Alignment should match open parenthesis #373: FILE: mm/cma_sysfs.c:80: + cma_kobjs = kcalloc(cma_area_count, sizeof(struct cma_kobject), + GFP_KERNEL); > + if (ZERO_OR_NULL_PTR(cma_kobjs)) > + goto out; > + > + do { > + cma = &cma_areas[i]; > + cma->kobj = &cma_kobjs[i]; Does cma really need are pointer to cma_kobj? > + cma->kobj->cma = cma; > + if (kobject_init_and_add(&cma->kobj->kobj, &cma_ktype, > + cma_kobj_root, "%s", cma->name)) { CHECK: Alignment should match open parenthesis #382: FILE: mm/cma_sysfs.c:89: + if (kobject_init_and_add(&cma->kobj->kobj, &cma_ktype, + cma_kobj_root, "%s", cma->name)) { > + kobject_put(&cma->kobj->kobj); > + goto out; > + } > + } while (++i < cma_area_count); > + > + return 0; > +out: > + while (--i >= 0) { > + cma = &cma_areas[i]; > + kobject_put(&cma->kobj->kobj); Should the cma->kobj be set to NULL by cma_kobj_release() if cma->kobj is really needed? > + } > + > + kfree(cma_kobjs); > + kobject_put(cma_kobj_root); > + > + return -ENOMEM; > +} > +subsys_initcall(cma_sysfs_init); > Tested-by: Dmitry Osipenko