From patchwork Mon Dec 26 01:59:49 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yang Yang X-Patchwork-Id: 13081557 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 09CB9C46467 for ; Mon, 26 Dec 2022 02:00:06 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5C327900003; Sun, 25 Dec 2022 21:00:06 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 54C8B900002; Sun, 25 Dec 2022 21:00:06 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3ED72900003; Sun, 25 Dec 2022 21:00:06 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 25E3A900002 for ; Sun, 25 Dec 2022 21:00:06 -0500 (EST) Received: from smtpin04.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id DFAE41603EC for ; Mon, 26 Dec 2022 02:00:05 +0000 (UTC) X-FDA: 80282801970.04.22EA995 Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.40]) by imf22.hostedemail.com (Postfix) with ESMTP id 17FD9C0002 for ; Mon, 26 Dec 2022 02:00:02 +0000 (UTC) Authentication-Results: imf22.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=zte.com.cn; spf=pass (imf22.hostedemail.com: domain of yang.yang29@zte.com.cn designates 63.216.63.40 as permitted sender) smtp.mailfrom=yang.yang29@zte.com.cn ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1672020004; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references; bh=wRIA3TrXg9egaMK2KPz6cqTPlPcBq1r9kqhHaA9mhqI=; b=LxDb9FD/WFyVZ6rhV/kbc0S1NmrRI679443YeT1ygwQZ8RCCC0YVRCF4kbq3Lu64HMChcs juG+pMcczHlXp96WJSK9M3/CR07AfqemQOqxedZHwlbjxkD0Y/o0ZS5hSEwErsHqI18wD3 Cg73krjdvzeETJ5Q3ZBTr95pM5aVlRg= ARC-Authentication-Results: i=1; imf22.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=zte.com.cn; spf=pass (imf22.hostedemail.com: domain of yang.yang29@zte.com.cn designates 63.216.63.40 as permitted sender) smtp.mailfrom=yang.yang29@zte.com.cn ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1672020004; a=rsa-sha256; cv=none; b=JN90e6lFDtiQ7KGvugxKDKWpFEuXBkXExDQUKqx9raHtcMDIkd6GxNTgCuIQQREVr/y9A4 bcwyePJVPIzVF+2xCHMPlBjzKLOq4uLbhGkVmjyMJt2WWx5gEBrAhTLhvzKIChYIQkpUYF 26MXpWB/S4w5sRBEtsnaeBpyp5tcaKw= Received: from mse-fl1.zte.com.cn (unknown [10.5.228.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4NgLZd1yvRz8QrkZ; Mon, 26 Dec 2022 09:59:53 +0800 (CST) Received: from szxlzmapp03.zte.com.cn ([10.5.231.207]) by mse-fl1.zte.com.cn with SMTP id 2BQ1xmFw050306; Mon, 26 Dec 2022 09:59:48 +0800 (+08) (envelope-from yang.yang29@zte.com.cn) Received: from mapi (szxlzmapp01[null]) by mapi (Zmail) with MAPI id mid14; Mon, 26 Dec 2022 09:59:49 +0800 (CST) Date: Mon, 26 Dec 2022 09:59:49 +0800 (CST) X-Zmail-TransId: 2b0363a9001558a5e838 X-Mailer: Zmail v1.0 Message-ID: <202212260959492929897@zte.com.cn> Mime-Version: 1.0 From: To: Cc: , , , , , , , , Subject: =?utf-8?q?=5BPATCH_v4_0/6=5D_ksm=3A_support_tracking_KSM-placed_zer?= =?utf-8?q?o-pages?= X-MAIL: mse-fl1.zte.com.cn 2BQ1xmFw050306 X-Fangmail-Gw-Spam-Type: 0 X-FangMail-Miltered: at cgslv5.04-192.168.250.137.novalocal with ID 63A90019.000 by FangMail milter! X-FangMail-Envelope: 1672019993/4NgLZd1yvRz8QrkZ/63A90019.000/10.5.228.132/[10.5.228.132]/mse-fl1.zte.com.cn/ X-Fangmail-Anti-Spam-Filtered: true X-Fangmail-MID-QID: 63A90019.000/4NgLZd1yvRz8QrkZ X-Rspamd-Queue-Id: 17FD9C0002 X-Stat-Signature: afeq7w56b4zu4cgpj3dumyz7i3u894gq X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1672020002-654972 X-HE-Meta: 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: xu xin The core idea of this patch set is to enable users to perceive the number of any pages merged by KSM, regardless of whether use_zero_page switch has been turned on, so that users can know how much free memory increase is really due to their madvise(MERGEABLE) actions. But the problem is, when enabling use_zero_pages, all empty pages will be merged with kernel zero pages instead of with each other as use_zero_pages is disabled, and then these zero-pages are no longer monitored by KSM. The motivations for me to do this contains three points: 1) MADV_UNMERGEABLE and other ways to trigger unsharing will *not* unshare the shared zeropage as placed by KSM (which is against the MADV_UNMERGEABLE documentation at least); see the link: https://lore.kernel.org/lkml/4a3daba6-18f9-d252-697c-197f65578c44@redhat.com/ 2) We cannot know how many pages are zero pages placed by KSM when enabling use_zero_pages, which hides the critical information about how much actual memory are really saved by KSM. Knowing how many ksm-placed zero pages are helpful for user to use the policy of madvise (MERGEABLE) better because they can see the actual profit brought by KSM. 3) The zero pages placed-by KSM are different from those initial empty page (filled with zeros) which are never touched by applications. The former is active-merged by KSM while the later have never consume actual memory. use_zero_pages is useful, not only because of cache colouring as described in doc, but also because use_zero_pages can accelerate merging empty pages when there are plenty of empty pages (full of zeros) as the time of page-by-page comparisons (unstable_tree_search_insert) is saved. So we hope to implement the support for ksm zero page tracking without affecting the feature of use_zero_pages. Zero pages may be the most common merged pages in actual environment(not only VM but also including other application like containers). Enabling use_zero_pages in the environment with plenty of empty pages(full of zeros) will be very useful. Users and app developer can also benefit from knowing the proportion of zero pages in all merged pages to optimize applications. With the patch series, we can both unshare zero-pages(KSM-placed) accurately and count ksm zero pages with enabling use_zero_pages. --- v3->v4: 1) The patch series are readjusted to adapt to these recent changes of break_ksm() from David Hildenbrand's commits: https://lore.kernel.org/all/20221021101141.84170-9-david@redhat.com/T/#u 2) Some changes of patch itself: In [patch 2/6], add a check of mm exiting in unshare_zero_pages in case of unsharing the zero pages whose process is exiting; form a new function clean_rmap_item_zero_flag(), and add it after stable_tree_search() to fix; In [patch 3/6], all decreasing actions of zero pages count are put in clean_rmap_item_zero_flag(), which is more accurate. 3) Add a selftest of unsharing and counting ksm-placed zero pages. --- v2->v3: 1) Add more descriptive information in cover letter. 2) In [patch 2/5], add more commit log for explaining reasons. 3) In [patch 2/5], fix misuse of break_ksm() in unmerge_ksm_pages(): break_ksm(vma, addr, NULL) -> break_ksm(vma, addr, false); --- v1->v2: [patch 4/5] fix build warning, mm/ksm.c:550, misleading indentation; statement 'rmap_item->mm->ksm_zero_pages_sharing--;' is not part of the previous 'if'. *** BLURB HERE *** xu xin (6): ksm: abstract the function try_to_get_old_rmap_item Message-ID: <20221011022150.322212-1-xu.xin16@zte.com.cn> (raw) ksm: support unsharing zero pages placed by KSM ksm: count all zero pages placed by KSM ksm: count zero pages for each process ksm: add zero_pages_sharing documentation selftest: add testing unsharing and counting ksm zero pages Documentation/admin-guide/mm/ksm.rst | 7 + fs/proc/base.c | 1 + include/linux/mm_types.h | 7 +- mm/ksm.c | 187 +++++++++++++++++----- tools/testing/selftests/vm/ksm_functional_tests.c | 104 +++++++++++- 5 files changed, 264 insertions(+), 42 deletions(-)