From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.5 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0A7D5C433ED for ; Tue, 27 Apr 2021 11:26:44 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 950F561185 for ; Tue, 27 Apr 2021 11:26:43 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 950F561185 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=infradead.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id EF84D6B0036; Tue, 27 Apr 2021 07:26:42 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id EA6B76B006E; Tue, 27 Apr 2021 07:26:42 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D47976B0070; Tue, 27 Apr 2021 07:26:42 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0183.hostedemail.com [216.40.44.183]) by kanga.kvack.org (Postfix) with ESMTP id BA2636B0036 for ; Tue, 27 Apr 2021 07:26:42 -0400 (EDT) Received: from smtpin34.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id 6C6848249980 for ; Tue, 27 Apr 2021 11:26:42 +0000 (UTC) X-FDA: 78077919444.34.3D35A10 Received: from casper.infradead.org (casper.infradead.org [90.155.50.34]) by imf13.hostedemail.com (Postfix) with ESMTP id 138EBE00010B for ; Tue, 27 Apr 2021 11:26:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=7jRpqar9SQV8YDRO6fEObuydnQktt3oGyEBIeNr8C2Y=; b=uft5BnsdR+cxu63relHri/o/dC 1oydk+1v/Xa0mTUxScG5CEcyKOUSD3+QP7yjBdd4jYiTdp78lreavZPffw1BPuXiP+i/VcLV9LfMF rJiebDefsRamz8Ok/eVZSuzBiaIaauXGwOfzDcTc1+JduO5QRWaJPZeJYaSksb+fy5YRudomSa3By Xs8UcBfZPboxhyV1scpQn7icBKVSJ/nihbM/FAy6+ojmpvg3T0TUADPHGUYUOWaD7Uwr85GJnN9zm D+7jWZcNZJlFbn1XPB34u3ULf+nhnbd2QrQizfRw2MeUZ8VYsZXV37HRRjcGNgQkGQM+CCvZXvAeR /FAqr1LA==; Received: from willy by casper.infradead.org with local (Exim 4.94 #2 (Red Hat Linux)) id 1lbLqJ-006qFz-SO; Tue, 27 Apr 2021 11:25:33 +0000 Date: Tue, 27 Apr 2021 12:25:27 +0100 From: Matthew Wilcox To: Xiongwei Song Cc: Xiongwei Song , cl@linux.com, penberg@kernel.org, rientjes@google.com, iamjoonsoo.kim@lge.com, akpm@linux-foundation.org, vbabka@suse.cz, linux-mm@kvack.org, Linux Kernel Mailing List Subject: Re: [PATCH] mm: append __GFP_COMP flag for trace_malloc Message-ID: <20210427112527.GX235567@casper.infradead.org> References: <1619491400-1904-1-git-send-email-sxwjean@me.com> <20210427025358.GV235567@casper.infradead.org> <20210427033632.GW235567@casper.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Stat-Signature: j6f5xpxk5poc7bqx1ppmjw5jhkdatyb3 X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 138EBE00010B Received-SPF: none (infradead.org>: No applicable sender policy available) receiver=imf13; identity=mailfrom; envelope-from=""; helo=casper.infradead.org; client-ip=90.155.50.34 X-HE-DKIM-Result: pass/pass X-HE-Tag: 1619522793-671795 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Tue, Apr 27, 2021 at 01:30:48PM +0800, Xiongwei Song wrote: > Hi Mattew, > > One more thing I should explain, the kmalloc_order() appends the > __GFP_COMP flags, > not by the caller. > > void *kmalloc_order(size_t size, gfp_t flags, unsigned int order) > { > ........................................................... > > flags |= __GFP_COMP; > page = alloc_pages(flags, order); > ........................................................... > return ret; > } > EXPORT_SYMBOL(kmalloc_order); > > #ifdef CONFIG_TRACING > void *kmalloc_order_trace(size_t size, gfp_t flags, unsigned int order) > { > void *ret = kmalloc_order(size, flags, order); > trace_kmalloc(_RET_IP_, ret, size, PAGE_SIZE << order, flags); > return ret; > } > EXPORT_SYMBOL(kmalloc_order_trace); > #endif Yes, I understood that. What I don't understand is why appending the __GFP_COMP to the trace would have been less confusing for you. Suppose I have some code which calls: kmalloc(10 * 1024, GFP_ATOMIC|__GFP_NOWARN|__GFP_NOMEMALLOC); and I see in my logs 0.08% call_site=ffffffff851d0cb0 ptr=0xffff8c04a4ca0000 bytes_req=10176 bytes_alloc=16384 gfp_flags=GFP_ATOMIC|__GFP_NOWARN|__GFP_NOMEMALLOC|__GFP_COMP That seems to me _more_ confusing because I would wonder "Where did that __GFP_COMP come from?" > > Regards, > Xiongwei > > On Tue, Apr 27, 2021 at 12:11 PM Xiongwei Song wrote: > > > > On Tue, Apr 27, 2021 at 11:36 AM Matthew Wilcox wrote: > > > > > > On Tue, Apr 27, 2021 at 11:29:32AM +0800, Xiongwei Song wrote: > > > > On Tue, Apr 27, 2021 at 10:54 AM Matthew Wilcox wrote: > > > > > > > > > > On Tue, Apr 27, 2021 at 10:43:20AM +0800, Xiongwei Song wrote: > > > > > > From: Xiongwei Song > > > > > > > > > > > > When calling kmalloc_order, the flags should include __GFP_COMP here, > > > > > > so that trace_malloc can trace the precise flags. > > > > > > > > > > I suppose that depends on your point of view. > > > > Correct. > > > > > > > > Should we report the > > > > > flags used by the caller, or the flags that we used to allocate memory? > > > > > And why does it matter? > > > > When I capture kmem:kmalloc events on my env with perf: > > > > (perf record -p my_pid -e kmem:kmalloc) > > > > I got the result below: > > > > 0.08% call_site=ffffffff851d0cb0 ptr=0xffff8c04a4ca0000 > > > > bytes_req=10176 bytes_alloc=16384 > > > > gfp_flags=GFP_ATOMIC|__GFP_NOWARN|__GFP_NOMEMALLOC > > > > > > Hmm ... if you have a lot of allocations about this size, that would > > > argue in favour of adding a kmem_cache of 10880 [*] bytes. That way, > > > we'd get 3 allocations per 32kB instead of 2. > > I understand you. But I don't think our process needs this size. This size > > may be a bug in our code or somewhere, I don't know the RC for now. > > > > > [*] 32768 / 3, rounded down to a 64 byte cacheline > > > > > > But I don't understand why this confused you. Your caller at > > > ffffffff851d0cb0 didn't specify __GFP_COMP. I'd be more confused if > > > this did report __GFP_COMP. > > > > > I just wanted to save some time when debugging. > > > > Regards