Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1626337pxf; Fri, 19 Mar 2021 11:22:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxILWrbRu1u7qUPlkd9ACCNrlRFjjtBF8u+Rhp4ApQ8Dxrhv642GXGucyIuMCL1I8aG++PK X-Received: by 2002:a05:6402:270e:: with SMTP id y14mr11117288edd.283.1616178156977; Fri, 19 Mar 2021 11:22:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616178156; cv=none; d=google.com; s=arc-20160816; b=q9cL2nbQyUNGh7g1Kyn9ZNZMHXihvfcsRqVh6vp40kWFEfAwlvCy7lm68zas5LTTzw RlsxNelOvPwMLmQNkFcAnD22fAPEY16hbR6qUBFX5T1denr/x6/zJWKcIf1tt7IHBoVl Cy+xtE7sZ1hd73vnsPuyDwZZtTuR7qRI81wzW3oNdP8DwiR0bjXzUlcw88g8YC1cZs87 QDLutClF5X+drEX3OhJkxxjySEkDRHvvZ5lOwk6WTregFAuWdmYv/dAat4U2jWM/xCic 8tqMHI/W91hNoQ8oV33zW4YRO0Fe4PgHruBOOrt+kPWRVXm7DG3h4e5mo4RiKzWqslax lRvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:sender:dkim-signature; bh=+Y8V4e2Y/cYVNFx5v7FpeMFjnoVxeZfsqiFDE1cJkBk=; b=kyr5nFdEJTiJd3MeAlUoftbmPfif5rIL+NZ05TiKnz372P2/pi37Urd7bHZF1n3L5S 8GdmIr4LkI4N5EA2mh5ce6HowcEQCjIwZKrg2Q1BPYiiK7Ui2SNhgw4RlJogxTPTpRdW 2SQ+SQTzExMdA9tzOcEPKVa6V4rEDxDVyhzQCIQr23y0fmh2OJY6CtFOtygeKeL4phit n3StY5vEaESed0queJeAom7EQcyc/CEbNl4eYwbE6afxCEjIZVCqb11BGYD02bWMsxMr fzhAxPsVPadmrbmxLjKNt4uINHzOaRQu4LwPzoVMmn5PtcmL7rZz4AfvR+fISZrv+a/V 3zNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=omXpfZjg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gn42si5579506ejc.583.2021.03.19.11.22.14; Fri, 19 Mar 2021 11:22:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=omXpfZjg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230219AbhCSSTH (ORCPT + 99 others); Fri, 19 Mar 2021 14:19:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48466 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230324AbhCSSSo (ORCPT ); Fri, 19 Mar 2021 14:18:44 -0400 Received: from mail-pf1-x434.google.com (mail-pf1-x434.google.com [IPv6:2607:f8b0:4864:20::434]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C7A93C06174A; Fri, 19 Mar 2021 11:18:41 -0700 (PDT) Received: by mail-pf1-x434.google.com with SMTP id j25so6463930pfe.2; Fri, 19 Mar 2021 11:18:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=+Y8V4e2Y/cYVNFx5v7FpeMFjnoVxeZfsqiFDE1cJkBk=; b=omXpfZjgBPzRaxnThzF9S5v1tuFuBcmJpvWvxAvWeZQ6BxYedBfwkPETfJx7Y2w+XS q3bOaFwozAySgDTa1AhINYXGyXBbR8gmBPFBL74Rfy2rwQvANTJLjDMYVVx9zqSgtJiy XZGdoqy8yu2ryDQENFhro2JkxCjBLt65/+tye4Q0B6u+vJ5bI2hsIn0YjUOMAdTlOA/p xHrpt1tW0HBNYblhaE4590a6A9r9lad2r/vVzwasXR4/5eYGLv0BpUnKc1rgl8V/6QRk 6nrs+LfBDmTJuyCqrRqQijA+jLGp936WfPuMKCRXZwSgwRS3jVhrEqvO0HwS86wBtD5D L3fg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition :content-transfer-encoding:in-reply-to; bh=+Y8V4e2Y/cYVNFx5v7FpeMFjnoVxeZfsqiFDE1cJkBk=; b=H+mNLJ/m5lQAqzJXES6nEkTSpDWhEpfnT/ld8MIXlakActjxGl5T7PpxeHhR56UQQe 9nQ59V+0s84gi0+HZ/br1S3XymiK8KZZ5l/aB7LH2bo48G8bCWSYperZoh79pQLHe0ve fB9UMhHDWON69zOrCUQ9mKvp26KstSoeq5lG22xmvgAhAcPeb2TOenWeufNST9mWHyeA 9XoXqpqS/0SY8cZulN5sko2/23X1r8vhOuQ5ITL8RcZQrQ6OkRUWfCUVXYJ2J6iC91FG XoH2xvxeymdz7PiRWEnuG72BRQJ5XdaYyN++w0wOQtAwR4cj4CVcljom2BLpObROIxQH 40ZA== X-Gm-Message-State: AOAM532AD+G5+dVf9dHXhOW8XAD9h2sXqH3gmqtQ3iD3fxxt7wMcldO4 J1AuZDi9FwDLMi75UsqB+L8= X-Received: by 2002:a65:5c42:: with SMTP id v2mr12802624pgr.339.1616177921284; Fri, 19 Mar 2021 11:18:41 -0700 (PDT) Received: from google.com ([2620:15c:211:201:2033:9813:e1ed:7060]) by smtp.gmail.com with ESMTPSA id w189sm5988654pfw.86.2021.03.19.11.18.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 19 Mar 2021 11:18:40 -0700 (PDT) Sender: Minchan Kim Date: Fri, 19 Mar 2021 11:18:38 -0700 From: Minchan Kim To: Dmitry Osipenko Cc: Greg Kroah-Hartman , Andrew Morton , linux-mm , LKML , joaodias@google.com, willy@infradead.org, david@redhat.com, surenb@google.com, John Hubbard , Nicolas Chauvet , "linux-tegra@vger.kernel.org" Subject: Re: [PATCH v4] mm: cma: support sysfs Message-ID: References: <33ec18ef-8652-643a-1a53-ff7c3caf4399@gmail.com> <78883205-e6da-5bc4-dcec-b6eb921567b1@gmail.com> <72db59eb-75dc-d1ed-7a83-17052e8f22a8@gmail.com> <82bde114-60c0-3fde-43f4-844522b80673@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <82bde114-60c0-3fde-43f4-844522b80673@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 19, 2021 at 08:29:29PM +0300, Dmitry Osipenko wrote: > 19.03.2021 19:30, Minchan Kim пишет: > > On Fri, Mar 19, 2021 at 07:24:05PM +0300, Dmitry Osipenko wrote: > >> 19.03.2021 18:50, Greg Kroah-Hartman пишет: > >>>> Then initialization order won't be a problem. > >>> I don't understand the problem here, what is wrong with the patch as-is? > >> > >> The cma->stat is NULL at the time when CMA is used on ARM because > >> cma->stat is initialized at the subsys level. This is the problem, > >> apparently. > > > > That's true. > > > >> > >>> Also, watch out, if you only make the kobject dynamic, how are you going > >>> to get backwards from the kobject to the values you want to send to > >>> userspace in the show functions? > >> > >> Still there should be a wrapper around the kobj with a back reference to > >> the cma entry. If you're suggesting that I should write a patch, then I > >> may take a look at it later on. Although, I assume that Minchan could > >> just correct this patch and re-push it to -next. > > > > This is ateempt to address it. Unless any objection, let me send it to > > akpm. > > > > From 29a9fb4f300b754ebf55e6182ba84127658ef504 Mon Sep 17 00:00:00 2001 > > From: Minchan Kim > > Date: Fri, 22 Jan 2021 12:31:56 -0800 > > Subject: [PATCH] mm: cma: support sysfs > > > > Since CMA is getting used more widely, it's more important to > > keep monitoring CMA statistics for system health since it's > > directly related to user experience. > > > > This patch introduces sysfs statistics for CMA, in order to provide > > some basic monitoring of the CMA allocator. > > > > * the number of CMA page successful allocations > > * the number of CMA page allocation failures > > > > These two values allow the user to calcuate the allocation > > failure rate for each CMA area. > > > > e.g.) > > /sys/kernel/mm/cma/WIFI/alloc_pages_[success|fail] > > /sys/kernel/mm/cma/SENSOR/alloc_pages_[success|fail] > > /sys/kernel/mm/cma/BLUETOOTH/alloc_pages_[success|fail] > > > > The cma_stat was intentionally allocated by dynamic allocation > > to harmonize with kobject lifetime management. > > https://lore.kernel.org/linux-mm/YCOAmXqt6dZkCQYs@kroah.com/ > > > > Signed-off-by: Minchan Kim > > --- > > Documentation/ABI/testing/sysfs-kernel-mm-cma | 25 ++++ > > mm/Kconfig | 7 ++ > > mm/Makefile | 1 + > > mm/cma.c | 7 +- > > mm/cma.h | 20 ++++ > > mm/cma_sysfs.c | 107 ++++++++++++++++++ > > 6 files changed, 165 insertions(+), 2 deletions(-) > > create mode 100644 Documentation/ABI/testing/sysfs-kernel-mm-cma > > create mode 100644 mm/cma_sysfs.c > > > > diff --git a/Documentation/ABI/testing/sysfs-kernel-mm-cma b/Documentation/ABI/testing/sysfs-kernel-mm-cma > > new file mode 100644 > > index 000000000000..02b2bb60c296 > > --- /dev/null > > +++ b/Documentation/ABI/testing/sysfs-kernel-mm-cma > > @@ -0,0 +1,25 @@ > > +What: /sys/kernel/mm/cma/ > > +Date: Feb 2021 > > +Contact: Minchan Kim > > +Description: > > + /sys/kernel/mm/cma/ contains a subdirectory for each CMA > > + heap name (also sometimes called CMA areas). > > + > > + Each CMA heap subdirectory (that is, each > > + /sys/kernel/mm/cma/ directory) contains the > > + following items: > > + > > + alloc_pages_success > > + alloc_pages_fail > > + > > +What: /sys/kernel/mm/cma//alloc_pages_success > > +Date: Feb 2021 > > +Contact: Minchan Kim > > +Description: > > + the number of pages CMA API succeeded to allocate > > + > > +What: /sys/kernel/mm/cma//alloc_pages_fail > > +Date: Feb 2021 > > +Contact: Minchan Kim > > +Description: > > + the number of pages CMA API failed to allocate > > diff --git a/mm/Kconfig b/mm/Kconfig > > index 24c045b24b95..febb7e8e24de 100644 > > --- a/mm/Kconfig > > +++ b/mm/Kconfig > > @@ -513,6 +513,13 @@ config CMA_DEBUGFS > > help > > Turns on the DebugFS interface for CMA. > > > > +config CMA_SYSFS > > + bool "CMA information through sysfs interface" > > + depends on CMA && SYSFS > > + help > > + This option exposes some sysfs attributes to get information > > + from CMA. > > + > > config CMA_AREAS > > int "Maximum count of the CMA areas" > > depends on CMA > > diff --git a/mm/Makefile b/mm/Makefile > > index 72227b24a616..56968b23ed7a 100644 > > --- a/mm/Makefile > > +++ b/mm/Makefile > > @@ -109,6 +109,7 @@ obj-$(CONFIG_CMA) += cma.o > > obj-$(CONFIG_MEMORY_BALLOON) += balloon_compaction.o > > obj-$(CONFIG_PAGE_EXTENSION) += page_ext.o > > obj-$(CONFIG_CMA_DEBUGFS) += cma_debug.o > > +obj-$(CONFIG_CMA_SYSFS) += cma_sysfs.o > > obj-$(CONFIG_USERFAULTFD) += userfaultfd.o > > obj-$(CONFIG_IDLE_PAGE_TRACKING) += page_idle.o > > obj-$(CONFIG_DEBUG_PAGE_REF) += debug_page_ref.o > > diff --git a/mm/cma.c b/mm/cma.c > > index 908f04775686..ac050359faae 100644 > > --- a/mm/cma.c > > +++ b/mm/cma.c > > @@ -507,10 +507,13 @@ struct page *cma_alloc(struct cma *cma, size_t count, unsigned int align, > > > > pr_debug("%s(): returned %p\n", __func__, page); > > out: > > - if (page) > > + if (page) { > > count_vm_event(CMA_ALLOC_SUCCESS); > > - else > > + cma_sysfs_alloc_pages_count(cma, count); > > + } else { > > count_vm_event(CMA_ALLOC_FAIL); > > + cma_sysfs_fail_pages_count(cma, count); > > + } > > > > return page; > > } > > diff --git a/mm/cma.h b/mm/cma.h > > index 42ae082cb067..70fd7633fe01 100644 > > --- a/mm/cma.h > > +++ b/mm/cma.h > > @@ -3,6 +3,12 @@ > > #define __MM_CMA_H__ > > > > #include > > +#include > > + > > +struct cma_kobject { > > + struct cma *cma; > > + struct kobject kobj; > > +}; > > > > struct cma { > > unsigned long base_pfn; > > @@ -16,6 +22,13 @@ struct cma { > > struct debugfs_u32_array dfs_bitmap; > > #endif > > char name[CMA_MAX_NAME]; > > +#ifdef CONFIG_CMA_SYSFS > > + /* the number of CMA page successful allocations */ > > + atomic64_t nr_pages_succeeded; > > + /* the number of CMA page allocation failures */ > > + atomic64_t nr_pages_failed; > > + struct cma_kobject *kobj; > > +#endif > > }; > > > > extern struct cma cma_areas[MAX_CMA_AREAS]; > > @@ -26,4 +39,11 @@ static inline unsigned long cma_bitmap_maxno(struct cma *cma) > > return cma->count >> cma->order_per_bit; > > } > > > > +#ifdef CONFIG_CMA_SYSFS > > +void cma_sysfs_alloc_pages_count(struct cma *cma, size_t count); > > +void cma_sysfs_fail_pages_count(struct cma *cma, size_t count); > > +#else > > +static inline void cma_sysfs_alloc_pages_count(struct cma *cma, size_t count) {}; > > +static inline void cma_sysfs_fail_pages_count(struct cma *cma, size_t count) {}; > > +#endif > > #endif > > diff --git a/mm/cma_sysfs.c b/mm/cma_sysfs.c > > new file mode 100644 > > index 000000000000..ca093e9e9f64 > > --- /dev/null > > +++ b/mm/cma_sysfs.c > > @@ -0,0 +1,107 @@ > > +// SPDX-License-Identifier: GPL-2.0 > > +/* > > + * CMA SysFS Interface > > + * > > + * Copyright (c) 2021 Minchan Kim > > + */ > > + > > +#include > > +#include > > +#include > > + > > +#include "cma.h" > > + > > +void cma_sysfs_alloc_pages_count(struct cma *cma, size_t count) > > +{ > > + atomic64_add(count, &cma->nr_pages_succeeded); > > +} > > + > > +void cma_sysfs_fail_pages_count(struct cma *cma, size_t count) > > +{ > > + atomic64_add(count, &cma->nr_pages_failed); > > +} > > + > > +#define CMA_ATTR_RO(_name) \ > > + static struct kobj_attribute _name##_attr = __ATTR_RO(_name) > > + > > +static ssize_t alloc_pages_success_show(struct kobject *kobj, > > + struct kobj_attribute *attr, char *buf) > > The indentations are still wrong. > > CHECK: Alignment should match open parenthesis Hmm, I didn't know that we have that kinds of rule. Maybe, my broken checkpatch couldn't catch it up. Thanks. $ ./scripts/checkpatch.pl 0001-mm-cma-support-sysfs.patch Traceback (most recent call last): File "scripts/spdxcheck.py", line 6, in from ply import lex, yacc < snip > > > > + if (ZERO_OR_NULL_PTR(cma_kobjs)) > > + goto out; > > + > > + do { > > + cma = &cma_areas[i]; > > + cma->kobj = &cma_kobjs[i]; > > Does cma really need are pointer to cma_kobj? Do you mean something like this? struct cma { .. .. struct kobject *kobj; }; Then, how could we we make kobject dynamic model? We need to get struct cma from kboj like below. static ssize_t alloc_pages_success_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf) { struct cma_kobject *cma_kobj = container_of(kobj, struct cma_kobject, kobj); struct cma *cma = cma_kobj->cma; return sysfs_emit(buf, "%llu\n", atomic64_read(&cma->nr_pages_succeeded)); } So kobj should be not a pointer in the container struct. Am I missing your point? Otherwise, it would be great if you suggest better idea. < snip> > > + kobject_put(&cma->kobj->kobj); > > + goto out; > > + } > > + } while (++i < cma_area_count); > > + > > + return 0; > > +out: > > + while (--i >= 0) { > > + cma = &cma_areas[i]; > > + kobject_put(&cma->kobj->kobj); > > Should the cma->kobj be set to NULL by cma_kobj_release() if cma->kobj is really needed? True. Then, let's fix cma_kobj_release, too. > > > + } > > + > > + kfree(cma_kobjs); > > + kobject_put(cma_kobj_root); > > + > > + return -ENOMEM; > > +} > > +subsys_initcall(cma_sysfs_init); > > > > Tested-by: Dmitry Osipenko Thanks!