From patchwork Mon Jan 23 17:37:28 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefan Roesch X-Patchwork-Id: 4414 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:eb09:0:0:0:0:0 with SMTP id s9csp1742361wrn; Mon, 23 Jan 2023 10:04:05 -0800 (PST) X-Google-Smtp-Source: AMrXdXtyCnhhrkhr+QThmYDLa2y/kmLDTN5cmf/sq55aOBpQmyx++Jo9afu49UAhomLnp8fsBw5l X-Received: by 2002:a17:907:a056:b0:84d:28d9:ce6 with SMTP id gz22-20020a170907a05600b0084d28d90ce6mr25495341ejc.35.1674497044839; Mon, 23 Jan 2023 10:04:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674497044; cv=none; d=google.com; s=arc-20160816; b=sTNs7bJVcDnbNQPTUvQAjy+JFrWgg1fL3vsa3fSq5MkDMDwnx8aG1/ZdlWEOKK5Pq0 HBJv6yGOvxjRJf0ufrnE3Xv0XuYxDgCPZoZJE8JSVjcPWKHOctiHyBzJVp/4hAiES2fb arQ/SNIgY3j6iVcdbEbz/2sEL1Q+xD8tTqE1UzTk1uy0YwjF8LV70oxN5i4M9lJN07ax mbtb+ddNm1M17tEbvgnFIo9dgTc/RKT4z1rbKhFmOuqAeEmZ2R01WQGbW1CVArzbRm6h J+hgMPrkg/HWpVDeVwBURKvkpWht/5K10/PaIxH7l/2mMA/7E2uq5wlpQ4zqXjk+2Hb/ iiCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=7YglR1CZKXAvC4T+wdwQslngclaaFB6aU7ngklOpDRU=; b=slGkKBy7MKyimVWkcJ+k5FkmKOiObm1H3nwFH/YUPNZGEvfW8RV9TvK/q6aGN1lx5f fmz3gNX9BpFFxPoZ9afXUea9o6FnVYRHcmlCV/Sx7x7yXBFfsAmNBOSlrwl7Qcp0aJwI iLFpNQzPey5jEDfZxdS3I44NHgqjOAAgbZBX0Ndilt0SAemnVHO+nFTiBALP9XalQ+L1 gLhVPJdFFfthmKpkrJBqY8rFHWlt9LNTtABL8fGEh1GXiviIP053KlBWBIl4eKCFyRWC HlYJ3DEv8UPxk7RpyPJ0LXtUg+jsRPIW16aX+eIwWVB0TsGa85R+q4Hix9e1fFYTFmPH 6vJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hw9-20020a170907a0c900b008775e580cd8si19652795ejc.298.2023.01.23.10.03.41; Mon, 23 Jan 2023 10:04:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232770AbjAWR5r (ORCPT + 99 others); Mon, 23 Jan 2023 12:57:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35894 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232883AbjAWR5p (ORCPT ); Mon, 23 Jan 2023 12:57:45 -0500 Received: from 66-220-144-178.mail-mxout.facebook.com (66-220-144-178.mail-mxout.facebook.com [66.220.144.178]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 27BFD2D14B for ; Mon, 23 Jan 2023 09:57:42 -0800 (PST) Received: by dev0134.prn3.facebook.com (Postfix, from userid 425415) id 3F89A5616BD1; Mon, 23 Jan 2023 09:37:56 -0800 (PST) From: Stefan Roesch To: linux-mm@kvack.org Cc: shr@devkernel.io, linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-trace-kernel@vger.kernel.org Subject: [RESEND RFC PATCH v1 00/20] mm: process/cgroup ksm support Date: Mon, 23 Jan 2023 09:37:28 -0800 Message-Id: <20230123173748.1734238-1-shr@devkernel.io> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 X-Spam-Status: No, score=2.4 required=5.0 tests=BAYES_00,RDNS_DYNAMIC, SPF_HELO_PASS,SPF_NEUTRAL,SUSPICIOUS_RECIPS,TVD_RCVD_IP autolearn=no autolearn_force=no version=3.4.6 X-Spam-Level: ** X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1755837413413673617?= X-GMAIL-MSGID: =?utf-8?q?1755837413413673617?= So far KSM can only be enabled by calling madvise for memory regions. What is required to enable KSM for more workloads is to enable / disable it at the process / cgroup level. 1. New options for prctl system command This patch series adds two new options to the prctl system call. The first one allows to enable KSM at the process level and the second one to query the setting. The setting will be inherited by child processes. With the above setting, KSM can be enabled for the seed process of a cgroup and all processes in the cgroup will inherit the setting. 2. Changes to KSM processing When KSM is enabled at the process level, the KSM code will iterate over all the VMA's and enable KSM for the eligible VMA's. When forking a process that has KSM enabled, the setting will be inherited by the new child process. In addition when KSM is disabled for a process, KSM will be disabled for the VMA's where KSM has been enabled. 3. Add tracepoints to KSM Currently KSM has no tracepoints. This adds tracepoints to the key KSM functions to make it easier to debug KSM. 4. Add general_profit metric The general_profit metric of KSM is specified in the documentation, but not calculated. This adds the general profit metric to /sys/kernel/debug/mm/ksm. 5. Add more metrics to ksm_stat This adds the process profit and ksm type metric to /proc//ksm_stat. 6. Add more tests to ksm_tests This adds an option to specify the merge type to the ksm_tests. This allows to test madvise and prctl KSM. It also adds a new option to query if prctl KSM has been enabled. It adds a fork test to verify that the KSM process setting is inherited by client processes. Stefan Roesch (20): mm: add new flag to enable ksm per process mm: add flag to __ksm_enter mm: add flag to __ksm_exit call mm: invoke madvise for all vmas in scan_get_next_rmap_item mm: support disabling of ksm for a process mm: add new prctl option to get and set ksm for a process mm: add tracepoints to ksm mm: split off pages_volatile function mm: expose general_profit metric docs: document general_profit sysfs knob mm: calculate ksm process profit metric mm: add ksm_merge_type() function mm: expose ksm process profit metric in ksm_stat mm: expose ksm merge type in ksm_stat docs: document new procfs ksm knobs tools: add new prctl flags to prctl in tools dir selftests/vm: add KSM prctl merge test selftests/vm: add KSM get merge type test selftests/vm: add KSM fork test selftests/vm: add two functions for debugging merge outcome Documentation/ABI/testing/sysfs-kernel-mm-ksm | 8 + Documentation/admin-guide/mm/ksm.rst | 8 +- MAINTAINERS | 1 + fs/proc/base.c | 5 + include/linux/ksm.h | 19 +- include/linux/sched/coredump.h | 1 + include/trace/events/ksm.h | 257 ++++++++++++++++++ include/uapi/linux/prctl.h | 2 + kernel/sys.c | 29 ++ mm/ksm.c | 134 ++++++++- tools/include/uapi/linux/prctl.h | 2 + tools/testing/selftests/vm/Makefile | 3 +- tools/testing/selftests/vm/ksm_tests.c | 254 ++++++++++++++--- 13 files changed, 665 insertions(+), 58 deletions(-) create mode 100644 include/trace/events/ksm.h base-commit: c1649ec55708ae42091a2f1bca1ab49ecd722d55