From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 69C77C433EF for ; Tue, 17 May 2022 13:29:09 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B97196B0072; Tue, 17 May 2022 09:29:08 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B1E766B0073; Tue, 17 May 2022 09:29:08 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 997DB8D0001; Tue, 17 May 2022 09:29:08 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 87FB36B0072 for ; Tue, 17 May 2022 09:29:08 -0400 (EDT) Received: from smtpin06.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 5A40A210D8 for ; Tue, 17 May 2022 13:29:08 +0000 (UTC) X-FDA: 79475315976.06.DA06245 Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by imf01.hostedemail.com (Postfix) with ESMTP id 2FEAD400BA for ; Tue, 17 May 2022 13:28:50 +0000 (UTC) Received: by mail-pf1-f169.google.com with SMTP id 204so16894748pfx.3 for ; Tue, 17 May 2022 06:29:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance-com.20210112.gappssmtp.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=+EPish+mrSvGMlugaYsp/hj+HbUv1tOHcvdoYDFMU50=; b=U+ft39WXLfz5BURlNF2xfDGqiD8mKFTLSuSjjVrY8GNFrAqi5aiZmFzWiyJD8jF7Kh i8pryLD3i5Ge9ofKiKMwmLEHhBWlPZ10Se/4QibleB3rD6RHVLenBF3DAXzYiRaUn6/c 86j/iVF2UfZK80TBSsLyjzv3EnRKrlcrTJkSfqQgmUL3A/R08e3kKiGH4uOjWjrgfzA9 GBogXDfi0Fwj/yQXdjMYj/ss83Pin8XSdgv65RgoWvuYgOq6bHj2ZgwYrSQ8Vrlcy6vi ODxTf3OKG6amIPDJeIj7daN7puClDTJkBV91jS9+B+twGmHFlMOyDSnb00a6oOjKXqsL OGGg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=+EPish+mrSvGMlugaYsp/hj+HbUv1tOHcvdoYDFMU50=; b=wvJf3OVeqxomZdg45Y8kMqoIM0VzEmUd/HT8Jj1kDKDwO2AseWSjtewQ3qJQI4L+J+ gp2bw8/rlLzSKje0GRjtgzcXFm5TmNOdQvvzyEXBTGvnWgRX0K1Y16LGpu6CX2o4Jire h9l+ZIkUgqOdV+m2KrqjQLiuhYoMcoGg9bxT2dN47UP6iE3+DW5SToSteldlZk+Snw25 TKCaO6OVLlB0s0qnPcy51uSxDeQFp6OaqO9/FMbSPb+vtdTN+0Pup7vbrPgwPA3ni5Eb 1BZzQ7wuS8z9RrjXlBx2NRmuRxmEdEhcb1+hpT5bIn7SuJ0PPbUnWxTQ9zsqX1Y7xpxm afqA== X-Gm-Message-State: AOAM532GsSpNFOurmp9gEkTOkagUG6PSOTPWT0zGbTDq401emlPf6+Nn aKkY8UYntVYS6GyD4E20IKN8sw== X-Google-Smtp-Source: ABdhPJwa40qG9PO39EGGS11h9k4RbrhHjKO6J4GlJn4jQb2sjJ7HymyZpMwfFvgEXqB2i5T8g5JBXw== X-Received: by 2002:a63:8ac1:0:b0:3db:515d:76d2 with SMTP id y184-20020a638ac1000000b003db515d76d2mr20034744pgd.152.1652794144749; Tue, 17 May 2022 06:29:04 -0700 (PDT) Received: from localhost ([139.177.225.234]) by smtp.gmail.com with ESMTPSA id c2-20020a62f842000000b0050dc762813csm9068864pfm.22.2022.05.17.06.29.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 May 2022 06:29:04 -0700 (PDT) Date: Tue, 17 May 2022 21:29:01 +0800 From: Muchun Song To: Hyeonggon Yoo <42.hyeyoo@gmail.com> Cc: YoMccU66auLAPEHa@casper.infradead.org, Steven Rostedt , Shakeel Butt , Roman Gushchin , Vlastimil Babka , Matthew Wilcox , kernel@openvz.org, linux-kernel@vger.kernel.org, Ingo Molnar , Andrew Morton , linux-mm@kvack.org, Joonsoo Kim , David Rientjes , Pekka Enberg , Christoph Lameter , Michal Hocko Subject: Re: [PATCH v2] tracing: add ACCOUNT flag for allocations from marked slab caches Message-ID: References: <8ef9de6a-7497-07f7-852c-befcc3843771@openvz.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: 2FEAD400BA Authentication-Results: imf01.hostedemail.com; dkim=pass header.d=bytedance-com.20210112.gappssmtp.com header.s=20210112 header.b=U+ft39WX; spf=pass (imf01.hostedemail.com: domain of songmuchun@bytedance.com designates 209.85.210.169 as permitted sender) smtp.mailfrom=songmuchun@bytedance.com; dmarc=pass (policy=none) header.from=bytedance.com X-Rspam-User: X-Stat-Signature: 9zu3kjjh8fsp8o8h578ebfxnh1f8xz4y X-HE-Tag: 1652794130-38838 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Tue, May 17, 2022 at 08:59:31PM +0900, Hyeonggon Yoo wrote: > On Tue, May 17, 2022 at 12:44:14PM +0300, Vasily Averin wrote: > > dSlab caches marked with SLAB_ACCOUNT force accounting for every > > allocation from this cache even if __GFP_ACCOUNT flag is not passed. > > Unfortunately, at the moment this flag is not visible in ftrace output, > > and this makes it difficult to analyze the accounted allocations. > > > > This patch adds the __GFP_ACCOUNT flag for allocations from slab caches > > marked with SLAB_ACCOUNT to the ftrace output > > --- > > v2: > > 1) handle kmem_cache_alloc_node() too, thanks to Shakeel > > 2) rework kmem_cache_alloc* tracepoints to use cachep instead > > of current cachep->*size parameters. Now kmalloc[_node] and > > kmem_cache_alloc[_node] tracepoints do not use common template > > > > NB: kmem_cache_alloc_node tracepoint in SLOB cannot be switched to cachep, > > therefore it was replaced by kmalloc_node tracepoint. > > --- > > VvS: is this acceptable? Maybe I should split this patch? > > > > Signed-off-by: Vasily Averin > > --- > > include/trace/events/kmem.h | 82 +++++++++++++++++++++++++++---------- > > mm/slab.c | 7 +--- > > mm/slab_common.c | 7 ++-- > > mm/slob.c | 10 ++--- > > mm/slub.c | 6 +-- > > 5 files changed, 71 insertions(+), 41 deletions(-) > > > > diff --git a/include/trace/events/kmem.h b/include/trace/events/kmem.h > > index 71c141804222..3b4f96e4a607 100644 > > --- a/include/trace/events/kmem.h > > +++ b/include/trace/events/kmem.h > > @@ -9,7 +9,7 @@ > > #include > > #include > > > > -DECLARE_EVENT_CLASS(kmem_alloc, > > +TRACE_EVENT(kmalloc, > > > > TP_PROTO(unsigned long call_site, > > const void *ptr, > > @@ -43,23 +43,41 @@ DECLARE_EVENT_CLASS(kmem_alloc, > > show_gfp_flags(__entry->gfp_flags)) > > ); > > > > -DEFINE_EVENT(kmem_alloc, kmalloc, > > +TRACE_EVENT(kmem_cache_alloc, > > > > - TP_PROTO(unsigned long call_site, const void *ptr, > > - size_t bytes_req, size_t bytes_alloc, gfp_t gfp_flags), > > + TP_PROTO(unsigned long call_site, > > + const void *ptr, > > + struct kmem_cache *s, > > + gfp_t gfp_flags), > > > > - TP_ARGS(call_site, ptr, bytes_req, bytes_alloc, gfp_flags) > > -); > > + TP_ARGS(call_site, ptr, s, gfp_flags), > > > > -DEFINE_EVENT(kmem_alloc, kmem_cache_alloc, > > + TP_STRUCT__entry( > > + __field( unsigned long, call_site ) > > + __field( const void *, ptr ) > > + __field( size_t, bytes_req ) > > + __field( size_t, bytes_alloc ) > > + __field( unsigned long, gfp_flags ) > > + ), > > > > - TP_PROTO(unsigned long call_site, const void *ptr, > > - size_t bytes_req, size_t bytes_alloc, gfp_t gfp_flags), > > + TP_fast_assign( > > + __entry->call_site = call_site; > > + __entry->ptr = ptr; > > + __entry->bytes_req = s->object_size; > > + __entry->bytes_alloc = s->size; > > + __entry->gfp_flags = (__force unsigned long)gfp_flags | > > + (s->flags & SLAB_ACCOUNT ? __GFP_ACCOUNT : 0); > > + ), > > This is a bit of lie. SLAB_ACCOUNT is not a gfp flag. > Maybe it is not a problem since the functionalities of SLAB_ACCOUNT and __GFP_ACCOUNT are similar. > IMO the problem here is that we don't know which cache kernel is allocating > from. What about just printing name of cache and remove bytes_req, > bytes_alloc? Is it a problem? Because we have changed the behavior to users. Should we treat the tracepoint as a stable API to users? If so, I think we should not change the parameter of this tracepoint. Maybe I am wrong, just some thoughts from me. Thanks. > > And then you can check if the cache uses SLAB_ACCOUNT or not. >