Message ID | 202304131346489021903@zte.com.cn |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b0ea:0:b0:3b6:4342:cba0 with SMTP id b10csp816979vqo; Wed, 12 Apr 2023 23:10:13 -0700 (PDT) X-Google-Smtp-Source: AKy350aQ0X1NvAIfHe0Q+B/2X8DuAa0cyVhOsQjpA/QbQVXnnW1wEKlLAU03AkaKDFTJfvjW+L+G X-Received: by 2002:a05:6402:382:b0:502:61d8:233b with SMTP id o2-20020a056402038200b0050261d8233bmr1470207edv.19.1681366212980; Wed, 12 Apr 2023 23:10:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681366212; cv=none; d=google.com; s=arc-20160816; b=IrgQWAqlfKvPG0XAUHigJtuaKTFTvSueU8v54BVXntDJwpHLweBySvR7dbJJqzbm0/ X3bH4+RtthAbJgfjIlskh6gi4E601ZVqbsmu/LnSBl0jtc0FTXGYx0zNUTz1EUPDtyEH LBLSzJnHoxlpSY6VK77tLNhyKkdLMhbrEG57KW3coJEsXGf7xUiIQalL3PnsEeFskj5J JTd+zGIooQBE92v02Ot7SkJrApkL3k0A3l5NSyL0WIam0nr5B9FYiFlsz26KtoFlca3C sABR2eiI/WbfBIOdu4Q8iYAQXDgKRi/KFOd8o1RgFi8w0RNYx473hirS0z07Uoo3tHHK CdVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:cc:to:from:mime-version:message-id:date; bh=IlGuldjKLcEGrpuvwIk0b1HBgjiAyBs1a3eiLygBCz4=; b=D5pXRJXO3+DmJs1/tVhyr8Dv/YYdOZQtHvyuJ4IZGQp/MeZwIWiiWxtNzIbj/jmI3s jOgyQ3hf7+3sFRo5It/gtdLgnu1PFAjJARzVeeSutc44LtewFZsOtcRrGIX6lwpd/Lvt 6jyPtGs8a15q31yTAYR0Ry/tvUjSNCLwtvEvCzZ7UCcpXPqGMwy5AVkEx/nXgnH7Gttw HL7/H4s3EYvEB2EvEFYOOn04EjxDhURn/yfixhibwTK6JJMDFKf4GXkiEZHRJkVA4SKL 8FN2tqWuxYcCgUHxgnMjcRvxrIy7ONsrL07c4rrWdhiZZpm8iFzV+BkxHRP5yQg44lgq uF1w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zte.com.cn Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i1-20020a056402054100b005049ca83135si944319edx.511.2023.04.12.23.09.49; Wed, 12 Apr 2023 23:10:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=zte.com.cn Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229739AbjDMFq4 (ORCPT <rfc822;peter110.wang@gmail.com> + 99 others); Thu, 13 Apr 2023 01:46:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229482AbjDMFqz (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 13 Apr 2023 01:46:55 -0400 Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.35]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C0DDBE40 for <linux-kernel@vger.kernel.org>; Wed, 12 Apr 2023 22:46:53 -0700 (PDT) Received: from mse-fl2.zte.com.cn (unknown [10.5.228.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4PxpVg6Yncz4xVnK; Thu, 13 Apr 2023 13:46:51 +0800 (CST) Received: from szxlzmapp06.zte.com.cn ([10.5.230.252]) by mse-fl2.zte.com.cn with SMTP id 33D5klSF069087; Thu, 13 Apr 2023 13:46:47 +0800 (+08) (envelope-from yang.yang29@zte.com.cn) Received: from mapi (szxlzmapp01[null]) by mapi (Zmail) with MAPI id mid14; Thu, 13 Apr 2023 13:46:48 +0800 (CST) Date: Thu, 13 Apr 2023 13:46:48 +0800 (CST) X-Zmail-TransId: 2b0364379748ffffffffc3a-dc384 X-Mailer: Zmail v1.0 Message-ID: <202304131346489021903@zte.com.cn> Mime-Version: 1.0 From: <yang.yang29@zte.com.cn> To: <akpm@linux-foundation.org>, <david@redhat.com> Cc: <imbrenda@linux.ibm.com>, <linux-kernel@vger.kernel.org>, <linux-mm@kvack.org>, <ran.xiaokai@zte.com.cn>, <xu.xin.sc@gmail.com>, <xu.xin16@zte.com.cn>, <yang.yang29@zte.com.cn> Subject: =?utf-8?q?=5BPATCH_v7_0/6=5D_ksm=3A_support_tracking_KSM-placed_zer?= =?utf-8?q?o-pages?= Content-Type: text/plain; charset="UTF-8" X-MAIL: mse-fl2.zte.com.cn 33D5klSF069087 X-Fangmail-Gw-Spam-Type: 0 X-Fangmail-Anti-Spam-Filtered: true X-Fangmail-MID-QID: 6437974B.000/4PxpVg6Yncz4xVnK X-Spam-Status: No, score=0.6 required=5.0 tests=BAYES_00,SORTED_RECIPS, SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1763040258115107477?= X-GMAIL-MSGID: =?utf-8?q?1763040258115107477?= |
Series |
ksm: support tracking KSM-placed zero-pages
|
|
Message
Yang Yang
April 13, 2023, 5:46 a.m. UTC
From: xu xin <xu.xin16@zte.com.cn>
The core idea of this patch set is to enable users to perceive the number
of any pages merged by KSM, regardless of whether use_zero_page switch has
been turned on, so that users can know how much free memory increase is
really due to their madvise(MERGEABLE) actions. But the problem is, when
enabling use_zero_pages, all empty pages will be merged with kernel zero
pages instead of with each other as use_zero_pages is disabled, and then
these zero-pages are no longer monitored by KSM.
The motivations to do this is seen at:
https://lore.kernel.org/lkml/202302100915227721315@zte.com.cn/
In one word, we hope to implement the support for KSM-placed zero pages
tracking without affecting the feature of use_zero_pages, so that app
developer can also benefit from knowing the actual KSM profit by getting
KSM-placed zero pages to optimize applications eventually when
/sys/kernel/mm/ksm/use_zero_pages is enabled.
the patch uses pte_mkdirty (related with architecture) to mark KSM-placed
zero pages. Some architecture(like sparc64) treat R/O dirty PTEs as
writable, which will break KSM pages state (wrprotect) and affect
the KSM functionality. For safety, we restrict this feature only to the
tested and known-working architechtures (ARM, ARM64, and X86) fow now.
Change log
----------
v6->v7:
This is an all-newed version which is different from v6 which relys on KSM's
rmap_item. The patch series don't rely on rmap_item but pte_dirty, so the
general handling of tracking KSM-placed zero-pages is simplified a lot.
For safety, we restrict this feature only to the tested and known-working
architechtures (ARM, ARM64, and X86) fow now.
xu xin (6):
ksm: support unsharing KSM-placed zero pages
ksm: count all zero pages placed by KSM
ksm: add ksm zero pages for each process
ksm: add documentation for ksm zero pages
ksm: update the calculation of KSM profit
selftest: add a testcase of ksm zero pages
Documentation/admin-guide/mm/ksm.rst | 26 +++++---
fs/proc/base.c | 3 +
include/linux/ksm.h | 27 ++++++++
include/linux/mm_types.h | 11 +++-
mm/Kconfig | 23 ++++++-
mm/ksm.c | 28 ++++++++-
mm/memory.c | 7 ++-
tools/testing/selftests/mm/ksm_functional_tests.c | 75 +++++++++++++++++++++++
8 files changed, 187 insertions(+), 13 deletions(-)
Comments
On 13.04.23 07:46, yang.yang29@zte.com.cn wrote: > From: xu xin <xu.xin16@zte.com.cn> > > The core idea of this patch set is to enable users to perceive the number > of any pages merged by KSM, regardless of whether use_zero_page switch has > been turned on, so that users can know how much free memory increase is > really due to their madvise(MERGEABLE) actions. But the problem is, when > enabling use_zero_pages, all empty pages will be merged with kernel zero > pages instead of with each other as use_zero_pages is disabled, and then > these zero-pages are no longer monitored by KSM. > > The motivations to do this is seen at: > https://lore.kernel.org/lkml/202302100915227721315@zte.com.cn/ > > In one word, we hope to implement the support for KSM-placed zero pages > tracking without affecting the feature of use_zero_pages, so that app > developer can also benefit from knowing the actual KSM profit by getting > KSM-placed zero pages to optimize applications eventually when > /sys/kernel/mm/ksm/use_zero_pages is enabled. > Thanks for the update! > the patch uses pte_mkdirty (related with architecture) to mark KSM-placed > zero pages. Some architecture(like sparc64) treat R/O dirty PTEs as > writable, which will break KSM pages state (wrprotect) and affect With [1] that should be resolved and we should be able to enable it unconditionally. Further, ideally this should get based on [2], such that we can include the zeropages in the ksm and per-mm profit calculation. Last but not least, I realized that we also have to handle the case when khugepaged replaces a shared zeropage by a THP. I think that should be easy by adjusting the counters in the the is_zero_pfn() handling in mm/khugepaged.c:__collapse_huge_page_copy(). > the KSM functionality. For safety, we restrict this feature only to the > tested and known-working architechtures (ARM, ARM64, and X86) fow now. > > Change log > ---------- > v6->v7: > This is an all-newed version which is different from v6 which relys on KSM's > rmap_item. The patch series don't rely on rmap_item but pte_dirty, so the > general handling of tracking KSM-placed zero-pages is simplified a lot. > > For safety, we restrict this feature only to the tested and known-working > architechtures (ARM, ARM64, and X86) fow now. Yeah, with [1] this can be further simplified. I'll be on vacation starting on Thursday for ~1.5 weeks, not sure if I get to review before that. But it's unlikely that we'll make the upcoming merge windows, so I guess we still have time (especially, for [1] and [2] to land) [1] https://lkml.kernel.org/r/20230411142512.438404-4-david@redhat.com [2] https://lkml.kernel.org/r/20230413233115.1878303-1-shr@devkernel.io