Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp8368595rwb; Tue, 13 Dec 2022 05:40:47 -0800 (PST) X-Google-Smtp-Source: AA0mqf41isLX3xgmwCSGr3+dul2q1QXujZHmH5O8jUcs7zmS3L92/1GLYfFvQ5WUbK5BrgHCRIz3 X-Received: by 2002:a05:6402:351:b0:46c:a3c1:2059 with SMTP id r17-20020a056402035100b0046ca3c12059mr23489615edw.9.1670938847638; Tue, 13 Dec 2022 05:40:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670938847; cv=none; d=google.com; s=arc-20160816; b=E9HWUJ6YrLxXKx7BSc2+mFSBqmbez6f+WMUDe+21WEujGdqsj9h0vazrFG2I/hhp3c bLxSrvifL4FQ94BROV8Uh7BT8gdcAFstVU+Md89MgPoyLCgKAMbhbkt+wF49WWTPLCfY hiAaIKNo8FkD90sScgBMPgOnNvo9xkKwei9xZXVCPnYCLz079/r/39CVO9yY1FyrRV9/ 8Ng9M+OQC/hjL/48PfOf0stTlP9An3pU7uzYgsWS87qEIwTHFoQ5reynVkrAO+SeHpGB pknQdLj0hY0QKO4X8iN3LJrW/4WuG4eErCHZTxx6e8EpC8X7ccXu6PjOeov5EwrazUi+ tnMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=jCqi0zLl4neKqhNu6te2FT/paH6an4Ah7DOZSem0w0w=; b=qTjZ+iddlZNy4rVbgslf6/4op4aoY1JlSmpIJM7H30uG8lcMof8M815wxTcrhgwvBn jmYHbF53oumkFUXbnoYrrh+u/Ipf0CFfzwWQ/umwur89gYwm2ndK+hyxsXRfFvPGV7bf MuqlqjX7HjtjAxH9Cd+/vAN0lEoYnJSWtf+Qk9KRMiYX9I4KKlptAdf7DKVjHIA58KEL MAPEYaOEXBo7mbjnK+03EBlh0GUlYtR0abR11f+1TtnjE3/oM9ziTz+hWZz/hewdMhQ9 bpxRx5REUHNbacPZnjxog0Qwbla/6zsPBJ4lKQn9X6APDUKhvQ1KAoeqNHjbwgZEeG/r yU4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Fyj6jZkK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g12-20020a056402090c00b00463d1e263b1si11278572edz.364.2022.12.13.05.40.21; Tue, 13 Dec 2022 05:40:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Fyj6jZkK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235493AbiLMNX5 (ORCPT + 73 others); Tue, 13 Dec 2022 08:23:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40538 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230061AbiLMNXy (ORCPT ); Tue, 13 Dec 2022 08:23:54 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E6D6817E34 for ; Tue, 13 Dec 2022 05:23:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1670937787; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=jCqi0zLl4neKqhNu6te2FT/paH6an4Ah7DOZSem0w0w=; b=Fyj6jZkKDUsXOahliSE+JhOUvqdxbrkwlAU6I5DDyk+0NNibEd3tWKiBFq/zr6NmshXG3b x8udX+uSkzo4DlQcZvbKNIRzeJOePy0vnJha0pT7l6okdcaxUnJXslqXdwOEHk4YM/9BRX sxGgmSnpOzy/h+CKXDQtUyqicqpzjDY= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-207-povTBys8N7W3dA1ntFi-OQ-1; Tue, 13 Dec 2022 08:23:03 -0500 X-MC-Unique: povTBys8N7W3dA1ntFi-OQ-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id E62DE1C0878E; Tue, 13 Dec 2022 13:23:02 +0000 (UTC) Received: from lorien.usersys.redhat.com (unknown [10.22.17.27]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 771A8492B00; Tue, 13 Dec 2022 13:23:02 +0000 (UTC) Date: Tue, 13 Dec 2022 08:22:58 -0500 From: Phil Auld To: Greg Kroah-Hartman Cc: Vishal Chourasia , Peter Zijlstra , linux-kernel@vger.kernel.org, mingo@redhat.com, vincent.guittot@linaro.org, vschneid@redhat.com, srikar@linux.vnet.ibm.com, sshegde@linux.ibm.com, linuxppc-dev@lists.ozlabs.org, ritesh.list@gmail.com, aneesh.kumar@linux.ibm.com Subject: Re: sched/debug: CPU hotplug operation suffers in a large cpu systems Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Dec 13, 2022 at 07:23:54AM +0100 Greg Kroah-Hartman wrote: > On Mon, Dec 12, 2022 at 02:17:58PM -0500, Phil Auld wrote: > > Hi, > > > > On Tue, Nov 08, 2022 at 01:24:39PM +0100 Greg Kroah-Hartman wrote: > > > On Tue, Nov 08, 2022 at 03:30:46PM +0530, Vishal Chourasia wrote: > > > > > > > > Thanks Greg & Peter for your direction. > > > > > > > > While we pursue the idea of having debugfs based on kernfs, we thought about > > > > having a boot time parameter which would disable creating and updating of the > > > > sched_domain debugfs files and this would also be useful even when the kernfs > > > > solution kicks in, as users who may not care about these debugfs files would > > > > benefit from a faster CPU hotplug operation. > > > > > > Ick, no, you would be adding a new user/kernel api that you will be > > > required to support for the next 20+ years. Just to get over a > > > short-term issue before you solve the problem properly. > > > > I'm not convinced moving these files from debugfs to kernfs is the right > > fix. That will take it from ~50 back to ~20 _minutes_ on these systems. > > I don't think either of those numbers is reasonable. > > > > The issue as I see it is the full rebuild for every change with no way to > > batch the changes. How about something like the below? > > > > This puts the domains/* files under the sched_verbose flag. About the only > > thing under that flag now are the detailed topology discovery printks anyway > > so this fits together nicely. > > > > This way the files would be off by default (assuming you don't boot with > > sched_verbose) and can be created at runtime by enabling verbose. Multiple > > changes could also be batched by disabling/makeing changes/re-enabling. > > > > It does not create a new API, uses one that is already there. > > The idea seems good, the implementation might need a bit of work :) More than the one comment below? Let me know. > > > > If you really do not want these debugfs files, just disable debugfs from > > > your system. That should be a better short-term solution, right? > > > > We do find these files useful at times for debugging issue and looking > > at what's going on on the system. > > > > > > > > Or better yet, disable SCHED_DEBUG, why can't you do that? > > > > Same with this... useful information with (modulo issues like this) > > small cost. There are also tuning knobs that are only available > > with SCHED_DEBUG. > > > > > > Cheers, > > Phil > > > > --------------- > > > > sched/debug: Put sched/domains files under verbose flag > > > > The debug files under sched/domains can take a long time to regenerate, > > especially when updates are done one at a time. Move these files under > > the verbose debug flag. Allow changes to verbose to trigger generation > > of the files. This lets a user batch the updates but still have the > > information available. The detailed topology printk messages are also > > under verbose. > > > > Signed-off-by: Phil Auld > > --- > > kernel/sched/debug.c | 68 ++++++++++++++++++++++++++++++++++++++++++-- > > 1 file changed, 66 insertions(+), 2 deletions(-) > > > > diff --git a/kernel/sched/debug.c b/kernel/sched/debug.c > > index 1637b65ba07a..2eb51ee3ccab 100644 > > --- a/kernel/sched/debug.c > > +++ b/kernel/sched/debug.c > > @@ -280,6 +280,31 @@ static const struct file_operations sched_dynamic_fops = { > > > > __read_mostly bool sched_debug_verbose; > > > > +static ssize_t sched_verbose_write(struct file *filp, const char __user *ubuf, > > + size_t cnt, loff_t *ppos); > > + > > +static int sched_verbose_show(struct seq_file *m, void *v) > > +{ > > + if (sched_debug_verbose) > > + seq_puts(m,"Y\n"); > > + else > > + seq_puts(m,"N\n"); > > + return 0; > > +} > > + > > +static int sched_verbose_open(struct inode *inode, struct file *filp) > > +{ > > + return single_open(filp, sched_verbose_show, NULL); > > +} > > + > > +static const struct file_operations sched_verbose_fops = { > > + .open = sched_verbose_open, > > + .write = sched_verbose_write, > > + .read = seq_read, > > + .llseek = seq_lseek, > > + .release = seq_release, > > +}; > > + > > static const struct seq_operations sched_debug_sops; > > > > static int sched_debug_open(struct inode *inode, struct file *filp) > > @@ -303,7 +328,7 @@ static __init int sched_init_debug(void) > > debugfs_sched = debugfs_create_dir("sched", NULL); > > > > debugfs_create_file("features", 0644, debugfs_sched, NULL, &sched_feat_fops); > > - debugfs_create_bool("verbose", 0644, debugfs_sched, &sched_debug_verbose); > > + debugfs_create_file("verbose", 0644, debugfs_sched, NULL, &sched_verbose_fops); > > #ifdef CONFIG_PREEMPT_DYNAMIC > > debugfs_create_file("preempt", 0644, debugfs_sched, NULL, &sched_dynamic_fops); > > #endif > > @@ -402,15 +427,23 @@ void update_sched_domain_debugfs(void) > > if (!debugfs_sched) > > return; > > > > + if (!sched_debug_verbose) > > + return; > > + > > if (!cpumask_available(sd_sysctl_cpus)) { > > if (!alloc_cpumask_var(&sd_sysctl_cpus, GFP_KERNEL)) > > return; > > cpumask_copy(sd_sysctl_cpus, cpu_possible_mask); > > } > > > > - if (!sd_dentry) > > + if (!sd_dentry) { > > sd_dentry = debugfs_create_dir("domains", debugfs_sched); > > > > + /* rebuild sd_sysclt_cpus if empty since it gets cleared below */ > > + if (cpumask_first(sd_sysctl_cpus) >= nr_cpu_ids) > > + cpumask_copy(sd_sysctl_cpus, cpu_online_mask); > > + } > > + > > for_each_cpu(cpu, sd_sysctl_cpus) { > > struct sched_domain *sd; > > struct dentry *d_cpu; > > @@ -443,6 +476,37 @@ void dirty_sched_domain_sysctl(int cpu) > > > > #endif /* CONFIG_SMP */ > > > > +static ssize_t sched_verbose_write(struct file *filp, const char __user *ubuf, > > + size_t cnt, loff_t *ppos) > > +{ > > + struct dentry *dentry = filp->f_path.dentry; > > + bool orig = sched_debug_verbose; > > + bool bv; > > + int r; > > + > > + r = kstrtobool_from_user(ubuf, cnt, &bv); > > + if (!r) { > > + mutex_lock(&sched_domains_mutex); > > + r = debugfs_file_get(dentry); > > + if (unlikely(r)) > > + return r; > > + sched_debug_verbose = bv; > > + debugfs_file_put(dentry); > > Why the get/put of the debugfs dentry? for just this single value? That's what debugfs_file_write_bool() does, which is where I got that since that's really what this is doing. I couldn't see a good way to make this just call that. I suppose the get/put may not be needed since the only way this should go away is under that mutex too. ... erm, yeah, that return is a problem ... I'll fix that. Also, this was originally on v6.1-rc7. I can rebase when I repost but I didn't want to do it on a random commit so I picked (at the time) the latest tag. Should I just use the head of Linux? Thanks, Phil > > thanks, > > greg k-h > --