Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp4160870pxy; Mon, 26 Apr 2021 20:38:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy+gP5+tWq8kSy91uSjL8oOg9FCNsq+4khNRh9XW3aEDI33h84x0CL1JeiZBUDk/V0IWQHe X-Received: by 2002:a17:906:8285:: with SMTP id h5mr9679357ejx.456.1619494695769; Mon, 26 Apr 2021 20:38:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619494695; cv=none; d=google.com; s=arc-20160816; b=pNAP8qMTAwjW74kP73Fpkiv5m5N5tbW1GyBQZl9U4dmtaUAQfptlu35Ipf4hmwwOUh yY4kLkG/HcERhn9jp52/dUZkKfg/G7jkn20ao2lcpxfn5ey/qDy0AdsUU5/T6/2OXh5A 9ydceUDQCnrN6RfIdDEvX9aHTil/BaVKte8U4/VjflIMNTi0WEGEepjDITwZfDo1jXcs eL2l5ylE/0mokBYZakBLUB9JvuXSt7Pw/t3JUdhMW1MJOpPUa/75RUjiJa9b05eniUdv bZBSHugWw2JvVW36gymW7vqiX6RzDi9oWSBRq9shNsvnHGAN08IiYaPBpuORJmmiQPR5 7LuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=ANnb4BwdsJgmq/ngwPXPAcMleywCXQ3VIzlu/GWL+j8=; b=yQwhQ6FbI85vpvjdNlTFdcbvgc8xZCPRkvR330zFAUTIDx2ELKscb6wx88T7lhFx8F XEI7a/3zgQIqnR7k3lc2GcPfbN4cNShAM3SqB04Il+zG/uDZn/ZnBUCky3cdEG/M11IR q3Xie64X8iQQqYbDZsh0UWlLFxG5fV8aX7J31BzHKgohGUt/HqxpCUSNdbuSGOKvhvi7 TvV9HhnBJo12qrm1+3VrINyzGoccZ7Kztv+QqeTPfubnvRtkIOV3jpBZ37npd0nomsl7 KTbQk8s2/NkOOr055cFd5leEyZaXPfIzotXNoosPJyOLptU/dIoTgwSndX4i1RjWhmm7 7CHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=YbE8TFo8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i6si1290381edv.142.2021.04.26.20.37.51; Mon, 26 Apr 2021 20:38:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=YbE8TFo8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232295AbhD0Dho (ORCPT + 99 others); Mon, 26 Apr 2021 23:37:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51754 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231363AbhD0Dhm (ORCPT ); Mon, 26 Apr 2021 23:37:42 -0400 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 46779C061574 for ; Mon, 26 Apr 2021 20:37:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=ANnb4BwdsJgmq/ngwPXPAcMleywCXQ3VIzlu/GWL+j8=; b=YbE8TFo8bThfJ9RPb+iSuOjGVQ ORpBqVTGkE+DtxIy43Gj78IGNx2o5/o2sVIV6/IP9LlNNsqnw34sirZi5JAgoQTC/yOe6DD/1wa4+ emRFw+I8JUng9GOPCN8Vav00R0XuHrnNae/yqXWbPC5GHlfxVjYLW/F+/Pl5BPf+liqA0Rc45ieRK ikg4H1ETqI7k4uZpt6ik0X2YppSzkRpGzv9m+1DxIjDV4bi/4UwDzr8+LkfhspfGveOEQdKUTHZsq OtUTRyVr6JLdgVupdefQ9utV17Ribe8tBrpr+jxtCgkCDHM+cQAu/bLxtuzbv1+NwaCx0T73PSs51 nN88gaYA==; Received: from willy by casper.infradead.org with local (Exim 4.94 #2 (Red Hat Linux)) id 1lbEWW-006QLu-T6; Tue, 27 Apr 2021 03:36:38 +0000 Date: Tue, 27 Apr 2021 04:36:32 +0100 From: Matthew Wilcox To: Xiongwei Song Cc: Xiongwei Song , cl@linux.com, penberg@kernel.org, rientjes@google.com, iamjoonsoo.kim@lge.com, akpm@linux-foundation.org, vbabka@suse.cz, linux-mm@kvack.org, Linux Kernel Mailing List Subject: Re: [PATCH] mm: append __GFP_COMP flag for trace_malloc Message-ID: <20210427033632.GW235567@casper.infradead.org> References: <1619491400-1904-1-git-send-email-sxwjean@me.com> <20210427025358.GV235567@casper.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 27, 2021 at 11:29:32AM +0800, Xiongwei Song wrote: > On Tue, Apr 27, 2021 at 10:54 AM Matthew Wilcox wrote: > > > > On Tue, Apr 27, 2021 at 10:43:20AM +0800, Xiongwei Song wrote: > > > From: Xiongwei Song > > > > > > When calling kmalloc_order, the flags should include __GFP_COMP here, > > > so that trace_malloc can trace the precise flags. > > > > I suppose that depends on your point of view. > Correct. > > Should we report the > > flags used by the caller, or the flags that we used to allocate memory? > > And why does it matter? > When I capture kmem:kmalloc events on my env with perf: > (perf record -p my_pid -e kmem:kmalloc) > I got the result below: > 0.08% call_site=ffffffff851d0cb0 ptr=0xffff8c04a4ca0000 > bytes_req=10176 bytes_alloc=16384 > gfp_flags=GFP_ATOMIC|__GFP_NOWARN|__GFP_NOMEMALLOC Hmm ... if you have a lot of allocations about this size, that would argue in favour of adding a kmem_cache of 10880 [*] bytes. That way, we'd get 3 allocations per 32kB instead of 2. [*] 32768 / 3, rounded down to a 64 byte cacheline But I don't understand why this confused you. Your caller at ffffffff851d0cb0 didn't specify __GFP_COMP. I'd be more confused if this did report __GFP_COMP.