Message ID | 202212300911327101708@zte.com.cn |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:4e01:0:0:0:0:0 with SMTP id p1csp2667537wrt; Thu, 29 Dec 2022 17:13:50 -0800 (PST) X-Google-Smtp-Source: AMrXdXt9iEmkXX64cTPFZ/2FTO/ueRy7NIdUFiU8w9154ayc4Rt4pMPC+D+MdL3OLk7gaUt5mpEb X-Received: by 2002:a05:6a20:9596:b0:a3:ca9a:ff82 with SMTP id iu22-20020a056a20959600b000a3ca9aff82mr36593187pzb.61.1672362830440; Thu, 29 Dec 2022 17:13:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672362830; cv=none; d=google.com; s=arc-20160816; b=fOYf2xUSKzKqYu07dHqBaKu9679YCUiodemMamZ/3YMIy+IXnpzNfn72FiPPclaGjf Rw150voABdO5kcIcsyh2IdqDjTCm6s/RotshRsTAVyOnyuDDHnXR4cEUvneAPbf6scuD HzHPVmRDwZ+1gcm/Ioevt0N1u4QfGU0ILzPUD305kejywtl0mIJ002tcNcYvRMFPNmKE DPMMtPvRjh/50rJmm+uqEgJynZB6SlKfkVmCrKVlDNQQ7Y/cb2j/VGAtH4foX5d2QBSa 1L4dytwsZ6Ldrsw5pGQRLHhcKmp36IODSqXB4BkUPVawNCBXOwN6b6X2Djb9b3HYlEKY ao/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:cc:to:from:mime-version:message-id:date; bh=c/wh2POJ+J+EwSvGAi/4q4fm1dKsarKtBYeUG5A5a+A=; b=mFedZEREiSAHsbI0DzxnpW7VBphF/U60ATIfC53AAguTOhxb4SWzSr7GuVQcBm94wZ 4ZiCBgJYpdVEqXvRNIUIoeCx6jo8PyJV6t1FGuwDZbkz0kSggnnxSRHKm+SgRG871yTd a3DKAZ5AjVtQVTvCiKU4/cJgjaT6lpP4E0xKNIAyDLu7G2V46Aj+cdqowCWJ2EJrvECo Xrp4U2hcZzAEuEhQbH/AZROctxo7PckD/6bMQBtNwtQ+PuitJMS7nCdOPrPO0lJXlZrv JI2HjnCvW3La7p4yT1wGShhszjlgHah4lX4ZaNzU6tANTjyxaqglNUn6b0EZ0jt4NgNn f0Ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zte.com.cn Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q129-20020a634387000000b0047872f423a5si19837787pga.830.2022.12.29.17.13.36; Thu, 29 Dec 2022 17:13:50 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zte.com.cn Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229826AbiL3BLp (ORCPT <rfc822;cscallsign@gmail.com> + 99 others); Thu, 29 Dec 2022 20:11:45 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34050 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229537AbiL3BLl (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 29 Dec 2022 20:11:41 -0500 Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.40]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D87E09FED for <linux-kernel@vger.kernel.org>; Thu, 29 Dec 2022 17:11:39 -0800 (PST) Received: from mse-fl1.zte.com.cn (unknown [10.5.228.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4NjnK42wzVz8QrkZ; Fri, 30 Dec 2022 09:11:36 +0800 (CST) Received: from szxlzmapp04.zte.com.cn ([10.5.231.166]) by mse-fl1.zte.com.cn with SMTP id 2BU1BVr1080628; Fri, 30 Dec 2022 09:11:31 +0800 (+08) (envelope-from yang.yang29@zte.com.cn) Received: from mapi (szxlzmapp01[null]) by mapi (Zmail) with MAPI id mid14; Fri, 30 Dec 2022 09:11:32 +0800 (CST) Date: Fri, 30 Dec 2022 09:11:32 +0800 (CST) X-Zmail-TransId: 2b0363ae3ac4ffffffffd3caddca X-Mailer: Zmail v1.0 Message-ID: <202212300911327101708@zte.com.cn> Mime-Version: 1.0 From: <yang.yang29@zte.com.cn> To: <akpm@linux-foundation.org> Cc: <david@redhat.com>, <imbrenda@linux.ibm.com>, <jiang.xuexin@zte.com.cn>, <linux-kernel@vger.kernel.org>, <linux-mm@kvack.org>, <ran.xiaokai@zte.com.cn>, <xu.xin.sc@gmail.com>, <xu.xin16@zte.com.cn>, <yang.yang29@zte.com.cn> Subject: =?utf-8?q?=5BPATCH_v5_0/6=5D_ksm=3A_support_tracking_KSM-placed_zer?= =?utf-8?q?o-pages?= Content-Type: text/plain; charset="UTF-8" X-MAIL: mse-fl1.zte.com.cn 2BU1BVr1080628 X-Fangmail-Gw-Spam-Type: 0 X-FangMail-Miltered: at cgslv5.04-192.168.250.137.novalocal with ID 63AE3AC8.000 by FangMail milter! X-FangMail-Envelope: 1672362696/4NjnK42wzVz8QrkZ/63AE3AC8.000/10.5.228.132/[10.5.228.132]/mse-fl1.zte.com.cn/<yang.yang29@zte.com.cn> X-Fangmail-Anti-Spam-Filtered: true X-Fangmail-MID-QID: 63AE3AC8.000/4NjnK42wzVz8QrkZ X-Spam-Status: No, score=0.6 required=5.0 tests=BAYES_00,RCVD_IN_MSPIKE_H2, SORTED_RECIPS,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1753599527692642657?= X-GMAIL-MSGID: =?utf-8?q?1753599527692642657?= |
Series |
ksm: support tracking KSM-placed zero-pages
|
|
Message
Yang Yang
Dec. 30, 2022, 1:11 a.m. UTC
From: xu xin <xu.xin16@zte.com.cn>
The core idea of this patch set is to enable users to perceive the number of any
pages merged by KSM, regardless of whether use_zero_page switch has been turned
on, so that users can know how much free memory increase is really due to their
madvise(MERGEABLE) actions. But the problem is, when enabling use_zero_pages,
all empty pages will be merged with kernel zero pages instead of with each
other as use_zero_pages is disabled, and then these zero-pages are no longer
monitored by KSM.
The motivations for me to do this contains three points:
1) MADV_UNMERGEABLE and other ways to trigger unsharing will *not*
unshare the shared zeropage as placed by KSM (which is against the
MADV_UNMERGEABLE documentation at least); see the link:
https://lore.kernel.org/lkml/4a3daba6-18f9-d252-697c-197f65578c44@redhat.com/
2) We cannot know how many pages are zero pages placed by KSM when
enabling use_zero_pages, which hides the critical information about
how much actual memory are really saved by KSM. Knowing how many
ksm-placed zero pages are helpful for user to use the policy of madvise
(MERGEABLE) better because they can see the actual profit brought by KSM.
3) The zero pages placed-by KSM are different from those initial empty page
(filled with zeros) which are never touched by applications. The former
is active-merged by KSM while the later have never consume actual memory.
use_zero_pages is useful, not only because of cache colouring as described
in doc, but also because use_zero_pages can accelerate merging empty pages
when there are plenty of empty pages (full of zeros) as the time of
page-by-page comparisons (unstable_tree_search_insert) is saved. So we hope to
implement the support for ksm zero page tracking without affecting the feature
of use_zero_pages.
Zero pages may be the most common merged pages in actual environment(not only VM but
also including other application like containers). Enabling use_zero_pages in the
environment with plenty of empty pages(full of zeros) will be very useful. Users and
app developer can also benefit from knowing the proportion of zero pages in all
merged pages to optimize applications.
With the patch series, we can both unshare zero-pages(KSM-placed) accurately
and count ksm zero pages with enabling use_zero_pages.
v4->v5:
---
1) fix warning: mm/ksm.c:3238:9: warning: no previous prototype for 'zero_pages_sharing_show'
[-Wmissing-prototypes].
In [PATCH 3/6] (ksm: count all zero pages placed by KSM), declare the function
ssize_t zero_pages_sharing_show(struct kobject *kobj...) as 'static'.
2) In [PATCH 6/6],fix error of "} while (end_scans < start_scans + 20);" to
"} while (end_scans < start_scans + 2);" in wait_two_full_scans().
---
v3->v4:
1) The patch series are readjusted to adapt to these recent changes of break_ksm()
from David Hildenbrand's commits:
https://lore.kernel.org/all/20221021101141.84170-9-david@redhat.com/T/#u
2) Some changes of patch itself:
In [patch 2/6], add a check of mm exiting in unshare_zero_pages in case of
unsharing the zero pages whose process is exiting; form a new function
clean_rmap_item_zero_flag(), and add it after stable_tree_search() to fix;
In [patch 3/6], all decreasing actions of zero pages count are put in
clean_rmap_item_zero_flag(), which is more accurate.
3) Add a selftest of unsharing and counting ksm-placed zero pages.
---
v2->v3:
1) Add more descriptive information in cover letter.
2) In [patch 2/5], add more commit log for explaining reasons.
3) In [patch 2/5], fix misuse of break_ksm() in unmerge_ksm_pages():
break_ksm(vma, addr, NULL) -> break_ksm(vma, addr, false);
---
v1->v2:
[patch 4/5] fix build warning, mm/ksm.c:550, misleading indentation; statement
'rmap_item->mm->ksm_zero_pages_sharing--;' is not part of the previous 'if'.
*** BLURB HERE ***
xu xin (6):
ksm: abstract the function try_to_get_old_rmap_item
ksm: support unsharing zero pages placed by KSM
ksm: count all zero pages placed by KSM
ksm: count zero pages for each process
ksm: add zero_pages_sharing documentation
selftest: add testing unsharing and counting ksm zero page
Documentation/admin-guide/mm/ksm.rst | 7 +
fs/proc/base.c | 1 +
include/linux/mm_types.h | 7 +-
mm/ksm.c | 183 +++++++++++++++++-----
tools/testing/selftests/vm/ksm_functional_tests.c | 105 ++++++++++++-
5 files changed, 261 insertions(+), 42 deletions(-)