Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp587476pxx; Mon, 26 Oct 2020 16:05:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwb0Ll86xeOHlAF4cWdcf9yGzAEmaLDfskqxTQ6bzBNmOJFaCo1PtRFr2QN+Pj6o9G0v/n+ X-Received: by 2002:a50:fd17:: with SMTP id i23mr2391930eds.50.1603753558526; Mon, 26 Oct 2020 16:05:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603753558; cv=none; d=google.com; s=arc-20160816; b=rx2lijyqUTgYRkk8/sZ/5oqzr+7KK2McCI+qIhS5fRg3vzDTEkwrhDQRtM7wl2vSCj J/krLWUp9/+sNdKnsdGBj56EK5CyFPZt51jPKvOFt7Cc+7KR5CJhGurCgGxy6gQv8BIP aCunWmSh931irtcvyUHQp+r44f2ilHjrreIYmNRLIAl1Ac4x67mqO+Ia1MS/vEfFXlXe VOMobwU7sl4HMd1F1GwNqaQME60zvjdh9gH7XVSSk3P7Sa9em9L7mozzk6llDm6LCJmT +ht8CZiHZao4xj3myDsMeVVo/F/Ew5t9bb8P7s4chNW71TaNMwtY77707jAj1Oa43TJ/ SNlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=r+mCNpQKoLYS0cKe9gsuBWfJkOF9C6u8QJ1xcrxdLas=; b=FqV9iT2VfyJdxVyIF3+hwz8v3B7dkBP67Xqb4q4H7oUNIqq3BJyvFMIRxG/Nrx1slU Bi40onLDT5GJsAJVALpkkpNo4KbOhIFjLXk04QC4RQBug2mKvJ4GkqDXtfGuc8gi/nTI y/vEk0cNvcKgjxYYO1MYa7U3zbxBCGm0rPvNzF4j0nf8b334SrTQ+0eoR3TSkFURkRBg fiUqqHJiVKWkznV1PUlDJrCzj33xUJ36k1J+PeT5FmSMWFW6BChn0UJM1CQA7o6heBn9 L92uOILvpjhZu1PAxcEv4X9djtNqwgsEP7qz62wEYJAN6DTYsgFWUvYGPM8YSARqtDYE 9IOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g9si7829318edr.404.2020.10.26.16.05.36; Mon, 26 Oct 2020 16:05:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1780265AbgJZReK (ORCPT + 99 others); Mon, 26 Oct 2020 13:34:10 -0400 Received: from mx2.suse.de ([195.135.220.15]:43898 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1780087AbgJZReI (ORCPT ); Mon, 26 Oct 2020 13:34:08 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id BE5E7AEFE; Mon, 26 Oct 2020 17:34:06 +0000 (UTC) From: Vlastimil Babka To: Andrew Morton Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, Alexander Potapenko , Kees Cook , Michal Hocko , David Hildenbrand , Mateusz Nosek , Vlastimil Babka Subject: [PATCH 3/3] mm, page_alloc: reduce static keys in prep_new_page() Date: Mon, 26 Oct 2020 18:33:58 +0100 Message-Id: <20201026173358.14704-4-vbabka@suse.cz> X-Mailer: git-send-email 2.29.0 In-Reply-To: <20201026173358.14704-1-vbabka@suse.cz> References: <20201026173358.14704-1-vbabka@suse.cz> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org prep_new_page() will always zero a new page (regardless of __GFP_ZERO) when init_on_alloc is enabled, but will also always skip zeroing if the page was already zeroed on free by init_on_free or page poisoning. The latter check implemented by free_pages_prezeroed() can involve two different static keys. As prep_new_page() is really a hot path, let's introduce a single static key free_pages_not_prezeroed for this purpose and initialize it in init_mem_debugging(). Signed-off-by: Vlastimil Babka --- mm/page_alloc.c | 21 ++++++++++++++------- 1 file changed, 14 insertions(+), 7 deletions(-) diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 2a1be197649d..980780f5f242 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -171,6 +171,8 @@ EXPORT_SYMBOL(init_on_alloc); DEFINE_STATIC_KEY_FALSE_RO(init_on_free); EXPORT_SYMBOL(init_on_free); +static DEFINE_STATIC_KEY_TRUE_RO(free_pages_not_prezeroed); + static bool _init_on_alloc_enabled_early __read_mostly = IS_ENABLED(CONFIG_INIT_ON_ALLOC_DEFAULT_ON); static int __init early_init_on_alloc(char *buf) @@ -777,6 +779,16 @@ void init_mem_debugging() } } + /* + * We have a special static key that controls whether prep_new_page will + * never need to zero the page. This mode is enabled when page is + * already zeroed by init_on_free or page_poisoning zero mode. + */ + if (_init_on_free_enabled_early || + (IS_ENABLED(CONFIG_PAGE_POISONING_ZERO) + && page_poisoning_enabled())) + static_branch_disable(&free_pages_not_prezeroed); + #ifdef CONFIG_PAGE_POISONING /* * Page poisoning is debug page alloc for some arches. If @@ -2216,12 +2228,6 @@ static inline int check_new_page(struct page *page) return 1; } -static inline bool free_pages_prezeroed(void) -{ - return (IS_ENABLED(CONFIG_PAGE_POISONING_ZERO) && - page_poisoning_enabled_static()) || want_init_on_free(); -} - #ifdef CONFIG_DEBUG_VM /* * With DEBUG_VM enabled, order-0 pages are checked for expected state when @@ -2291,7 +2297,8 @@ static void prep_new_page(struct page *page, unsigned int order, gfp_t gfp_flags { post_alloc_hook(page, order, gfp_flags); - if (!free_pages_prezeroed() && want_init_on_alloc(gfp_flags)) + if (static_branch_likely(&free_pages_not_prezeroed) + && want_init_on_alloc(gfp_flags)) kernel_init_free_pages(page, 1 << order); if (order && (gfp_flags & __GFP_COMP)) -- 2.29.0