Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1654847rdb; Wed, 31 Jan 2024 05:28:03 -0800 (PST) X-Google-Smtp-Source: AGHT+IGmbfDIp6aZ4/FGDg4a9c96eorqPj2zoGYdZwLUXR1IygBHanZWs0Kz9HRGo1QgTAh7ZbE1 X-Received: by 2002:a05:622a:208:b0:42a:907c:2fa4 with SMTP id b8-20020a05622a020800b0042a907c2fa4mr1947841qtx.41.1706707683402; Wed, 31 Jan 2024 05:28:03 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706707683; cv=pass; d=google.com; s=arc-20160816; b=sigTaX71mCLR/iAJ31vYxpx+lsj2CjY3ts2xTYkr5Yy4kGw0yp0VgQp6ZHPmuTAvvW Rs56139FEt4q+SbYIq/DSIkjE/+Ne+I6i+UQEsgLSnWC+NuC/xDOitcLwZ5INwNcPj5u bxx9O4bbKxplrHWwyD2StnUadHk24nmEXtHh2ID0pc0d0J89jAhxl52dCAvJvsFooeZ0 EOj1jcUGJucBRYnvdre9W+22AQmHspJr0PGyZEm/aGrRqY+sw2nbwx4Ext35s4WAWdf8 T3oXoOT8OflwGGJB8HqaDNpHf/zFx8KcV65vx0nY5OHM6wFxS9gLz6hdBKeNOTcXKkPk Bb4Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=I2qyiQP0z6sSvghFMwR4kQDP9/DnoQWFCfAHrK0dld8=; fh=PD0elEdTrYi08NlZD59Slke0TJ/lKRusimcDzPNo2E4=; b=LAXAzkfFMVZ3EiUC1rW2ESkf0NAcm3PQrSGOKVzbBaVztUJFyo9IRQzwDmptQVbfS0 RAL3FuhbdtMNclhEXm2/GybHO6yC8LlNs7vyKbFYWrCnfJw+giEwDe/GICIw2cqMLFM9 50CAWN/1D8H16TsA3gFtrVB2cofz1Lg5GTVZB4j9k0P7BZkXHaPuphDnVUlZ75aif06v +Qs2SNdRqyeQAbodEj1+gyIrzTxaeEhjKLiA8Yhwj+rPPnP+XQwSF1J+zjOIZHFuYQyw bDAirTztukIK2XXlCvhUIac7ZSfdFKTIsBUe6pU4FKOQNdeaJDIFK2xMGfUG96dAmxOm KKeg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-46496-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-46496-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com X-Forwarded-Encrypted: i=1; AJvYcCVMz1/Aqe7ytEOglCk2pMn/RNtZvGK2/V9MVXbsBfsWQs52DZLYpsE/FQ858xVulD4NEzvRCSk8aoLLqaAJxXZaQ/UWSbUCqAej12NWXg== Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id t10-20020a05622a148a00b0042aa94859a0si5795389qtx.738.2024.01.31.05.28.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 31 Jan 2024 05:28:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-46496-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-46496-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-46496-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 1CD561C21909 for ; Wed, 31 Jan 2024 13:28:03 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DD3D57BAF0; Wed, 31 Jan 2024 13:27:51 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8D4EA7BAE5; Wed, 31 Jan 2024 13:27:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706707671; cv=none; b=jHfQuV27Vai/s/9GPaXoYvXWv8n8Cr0MqbnLF5pg4erqWf3kqYqbCSfxlZ+a4jaufmZx2Gn7GD+6d8Hkag1m2NGwouhIB9WfThOM28k+68FnHOwz9jjbJOAizK35ArL+QaMGHe03TOWS8n+6UGLYXhMyOpnEknF7dswU5bcxNA4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706707671; c=relaxed/simple; bh=yjPKe3SsGoBdZkqJvFpS8eiF0fp4OCL9lHXBD+iqiDQ=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=O32HJGvs79BdUG3slsA53LFrscvxg2zaWMjINl5D2TXr5l+ZNe9A/2GvF78f6BanswKLx2kjz8m3wbN25agzEt+unoXrRN60GDVIUtye60wcLEeSXzbChYqYtyIllaLuk8huIKEse2qSBO/MuFX7XpVdBCbCYUjMLrn3lESQ6BM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 379B6DA7; Wed, 31 Jan 2024 05:28:31 -0800 (PST) Received: from raptor (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 031EC3F738; Wed, 31 Jan 2024 05:27:42 -0800 (PST) Date: Wed, 31 Jan 2024 13:27:36 +0000 From: Alexandru Elisei To: Anshuman Khandual Cc: catalin.marinas@arm.com, will@kernel.org, oliver.upton@linux.dev, maz@kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, yuzenghui@huawei.com, arnd@arndb.de, akpm@linux-foundation.org, mingo@redhat.com, peterz@infradead.org, juri.lelli@redhat.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, rostedt@goodmis.org, bsegall@google.com, mgorman@suse.de, bristot@redhat.com, vschneid@redhat.com, mhiramat@kernel.org, rppt@kernel.org, hughd@google.com, pcc@google.com, steven.price@arm.com, vincenzo.frascino@arm.com, david@redhat.com, eugenis@google.com, kcc@google.com, hyesoo.yu@samsung.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org Subject: Re: [PATCH RFC v3 06/35] mm: cma: Make CMA_ALLOC_SUCCESS/FAIL count the number of pages Message-ID: References: <20240125164256.4147-1-alexandru.elisei@arm.com> <20240125164256.4147-7-alexandru.elisei@arm.com> <0a71c87a-ae2c-4a61-8adb-3a51d6369b99@arm.com> <2cb8288c-5378-4968-a75b-8462b41998c6@arm.com> <8cd39b48-7fb8-40b2-8d6c-e6fc2b48f86d@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8cd39b48-7fb8-40b2-8d6c-e6fc2b48f86d@arm.com> Hi, On Wed, Jan 31, 2024 at 10:10:05AM +0530, Anshuman Khandual wrote: > > > On 1/30/24 17:28, Alexandru Elisei wrote: > > Hi, > > > > On Tue, Jan 30, 2024 at 10:22:11AM +0530, Anshuman Khandual wrote: > >> > >> On 1/29/24 17:21, Alexandru Elisei wrote: > >>> Hi, > >>> > >>> On Mon, Jan 29, 2024 at 02:54:20PM +0530, Anshuman Khandual wrote: > >>>> > >>>> On 1/25/24 22:12, Alexandru Elisei wrote: > >>>>> The CMA_ALLOC_SUCCESS, respectively CMA_ALLOC_FAIL, are increased by one > >>>>> after each cma_alloc() function call. This is done even though cma_alloc() > >>>>> can allocate an arbitrary number of CMA pages. When looking at > >>>>> /proc/vmstat, the number of successful (or failed) cma_alloc() calls > >>>>> doesn't tell much with regards to how many CMA pages were allocated via > >>>>> cma_alloc() versus via the page allocator (regular allocation request or > >>>>> PCP lists refill). > >>>>> > >>>>> This can also be rather confusing to a user who isn't familiar with the > >>>>> code, since the unit of measurement for nr_free_cma is the number of pages, > >>>>> but cma_alloc_success and cma_alloc_fail count the number of cma_alloc() > >>>>> function calls. > >>>>> > >>>>> Let's make this consistent, and arguably more useful, by having > >>>>> CMA_ALLOC_SUCCESS count the number of successfully allocated CMA pages, and > >>>>> CMA_ALLOC_FAIL count the number of pages the cma_alloc() failed to > >>>>> allocate. > >>>>> > >>>>> For users that wish to track the number of cma_alloc() calls, there are > >>>>> tracepoints for that already implemented. > >>>>> > >>>>> Signed-off-by: Alexandru Elisei > >>>>> --- > >>>>> mm/cma.c | 4 ++-- > >>>>> 1 file changed, 2 insertions(+), 2 deletions(-) > >>>>> > >>>>> diff --git a/mm/cma.c b/mm/cma.c > >>>>> index f49c95f8ee37..dbf7fe8cb1bd 100644 > >>>>> --- a/mm/cma.c > >>>>> +++ b/mm/cma.c > >>>>> @@ -517,10 +517,10 @@ struct page *cma_alloc(struct cma *cma, unsigned long count, > >>>>> pr_debug("%s(): returned %p\n", __func__, page); > >>>>> out: > >>>>> if (page) { > >>>>> - count_vm_event(CMA_ALLOC_SUCCESS); > >>>>> + count_vm_events(CMA_ALLOC_SUCCESS, count); > >>>>> cma_sysfs_account_success_pages(cma, count); > >>>>> } else { > >>>>> - count_vm_event(CMA_ALLOC_FAIL); > >>>>> + count_vm_events(CMA_ALLOC_FAIL, count); > >>>>> if (cma) > >>>>> cma_sysfs_account_fail_pages(cma, count); > >>>>> } > >>>> Without getting into the merits of this patch - which is actually trying to do > >>>> semantics change to /proc/vmstat, wondering how is this even related to this > >>>> particular series ? If required this could be debated on it's on separately. > >>> Having the number of CMA pages allocated and the number of CMA pages freed > >>> allows someone to infer how many tagged pages are in use at a given time: > >> That should not be done in CMA which is a generic multi purpose allocator. > > > Ah, ok. Let me rephrase that: Having the number of CMA pages allocated, the > > number of failed CMA page allocations and the number of freed CMA pages > > allows someone to infer how many CMA pages are in use at a given time. > > That's valuable information for software designers and system > > administrators, as it allows them to tune the number of CMA pages available > > in a system. > > > > Or put another way: what would you consider to be more useful? Knowing the > > number of cma_alloc()/cma_release() calls, or knowing the number of pages > > that cma_alloc()/cma_release() allocated or freed? > > There is still value in knowing how many times cma_alloc() succeeded or failed > regardless of the cumulative number pages involved over the time. Actually the > count helps to understand how cma_alloc() performed overall as an allocator. > > But on the cma_release() path there is no chances of failure apart from - just > when the caller itself provides an wrong input. So there are no corresponding > CMA_RELEASE_SUCCESS/CMA_RELEASE_FAIL vmstat counters in there - for a reason ! > > Coming back to CMA based pages being allocated and freed, there is already an > interface via sysfs (CONFIG_CMA_SYSFS) which gets updated in cma_alloc() path > via cma_sysfs_account_success_pages() and cma_sysfs_account_fail_pages(). > > #ls /sys/kernel/mm/cma/ > alloc_pages_fail alloc_pages_success > > Why these counters could not meet your requirements ? Also 'struct cma' can > be updated to add an element 'nr_pages_freed' to be tracked in cma_release(), > providing free pages count as well. > > There are additional debug fs based elements (CONFIG_CMA_DEBUGFS) available. > > #ls /sys/kernel/debug/cma/ > alloc base_pfn bitmap count free maxchunk order_per_bit used Ok, I'll have a look at those, thank you for the suggestion. Thanks, Alex