From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.3 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6600BC433DB for ; Wed, 13 Jan 2021 16:59:51 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id C19A22343B for ; Wed, 13 Jan 2021 16:59:50 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org C19A22343B Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=suse.cz Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id D6C908D0075; Wed, 13 Jan 2021 11:59:49 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id CF5358D006A; Wed, 13 Jan 2021 11:59:49 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C0A8F8D0075; Wed, 13 Jan 2021 11:59:49 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0007.hostedemail.com [216.40.44.7]) by kanga.kvack.org (Postfix) with ESMTP id A6E7E8D006A for ; Wed, 13 Jan 2021 11:59:49 -0500 (EST) Received: from smtpin23.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id 5B6743633 for ; Wed, 13 Jan 2021 16:59:49 +0000 (UTC) X-FDA: 77701363698.23.guide92_591434c2751f Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin23.hostedemail.com (Postfix) with ESMTP id 38F5A37604 for ; Wed, 13 Jan 2021 16:59:49 +0000 (UTC) X-HE-Tag: guide92_591434c2751f X-Filterd-Recvd-Size: 3248 Received: from mx2.suse.de (mx2.suse.de [195.135.220.15]) by imf39.hostedemail.com (Postfix) with ESMTP for ; Wed, 13 Jan 2021 16:59:48 +0000 (UTC) X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 6D039AB92; Wed, 13 Jan 2021 16:59:47 +0000 (UTC) To: Johannes Berg , linux-mm@kvack.org Cc: linux-kernel@vger.kernel.org, Andrew Morton , Catalin Marinas , Johannes Berg , Christoph Lameter , David Rientjes , Joonsoo Kim , Pekka Enberg References: <20210113170931.929f808099d2.I117b6764e725b3192318bbcf4269b13b709539ae@changeid> From: Vlastimil Babka Subject: Re: [PATCH] mm/slub: disable user tracing for kmemleak caches Message-ID: <1db7c986-25c4-884e-4fbf-9af348bdff6f@suse.cz> Date: Wed, 13 Jan 2021 17:59:43 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.6.0 MIME-Version: 1.0 In-Reply-To: <20210113170931.929f808099d2.I117b6764e725b3192318bbcf4269b13b709539ae@changeid> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 1/13/21 5:09 PM, Johannes Berg wrote: > From: Johannes Berg >=20 > If kmemleak is enabled, it uses a kmem cache for its own objects. > These objects are used to hold information kmemleak uses, including > a stack trace. If slub_debug is also turned on, each of them has > *another* stack trace, so the overhead adds up, and on my tests (on > ARCH=3Dum, admittedly) 2/3rds of the allocations end up being doing > the stack tracing. >=20 > Turn off SLAB_STORE_USER if SLAB_NOLEAKTRACE was given, to avoid > storing the essentially same data twice. >=20 > Signed-off-by: Johannes Berg How about stripping away SLAB_STORE_USER only if it's added from the glob= al slub_debug variable? In case somebody lists one of the kmemleak caches explicitly in "slub_debug=3D..." instead of just booting with "slub_debug= ", we should honor that. > --- > Perhaps instead it should go the other way around, and kmemleak > could even use/access the stack trace that's already in there ... > But I don't really care too much, I can just turn off slub debug > for the kmemleak caches via the command line anyway :-) >=20 > --- > mm/slub.c | 11 ++++++++++- > 1 file changed, 10 insertions(+), 1 deletion(-) >=20 > diff --git a/mm/slub.c b/mm/slub.c > index 34dcc09e2ec9..625a32a6645b 100644 > --- a/mm/slub.c > +++ b/mm/slub.c > @@ -1446,7 +1446,16 @@ slab_flags_t kmem_cache_flags(unsigned int objec= t_size, > } > } > =20 > - return flags | slub_debug; > + flags |=3D slub_debug; > + > + /* > + * If the slab cache is for debugging (e.g. kmemleak) then > + * don't store user (stack trace) information. > + */ > + if (flags & SLAB_NOLEAKTRACE) > + flags &=3D ~SLAB_STORE_USER; > + > + return flags; > } > #else /* !CONFIG_SLUB_DEBUG */ > static inline void setup_object_debug(struct kmem_cache *s, >=20