linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Stefan Roesch <shr@devkernel.io>
To: David Hildenbrand <david@redhat.com>
Cc: kernel-team@fb.com, akpm@linux-foundation.org,
	linux-fsdevel@vger.kernel.org, hannes@cmpxchg.org,
	riel@surriel.com, linux-kernel@vger.kernel.org,
	linux-mm@kvack.org
Subject: Re: [PATCH v2] proc/ksm: add ksm stats to /proc/pid/smaps
Date: Wed, 16 Aug 2023 09:22:03 -0700	[thread overview]
Message-ID: <qvqwmsyrgdof.fsf@devbig1114.prn1.facebook.com> (raw)
In-Reply-To: <ad33c7f1-8c7c-27b6-7c2e-adbb349f2dff@redhat.com>


David Hildenbrand <david@redhat.com> writes:

> On 15.08.23 19:10, Stefan Roesch wrote:
>> David Hildenbrand <david@redhat.com> writes:
>>
>>> Sorry for the late reply, Gmail once again decided to classify your mails as
>>> spam (for whatever reason).
>>>
>>> On 11.08.23 18:28, Stefan Roesch wrote:
>>>> With madvise and prctl KSM can be enabled for different VMA's. Once it
>>>> is enabled we can query how effective KSM is overall. However we cannot
>>>> easily query if an individual VMA benefits from KSM.
>>>> This commit adds a KSM section to the /prod/<pid>/smaps file. It reports
>>>> how many of the pages are KSM pages.
>>>> Here is a typical output:
>>>> 7f420a000000-7f421a000000 rw-p 00000000 00:00 0
>>>> Size:             262144 kB
>>>> KernelPageSize:        4 kB
>>>> MMUPageSize:           4 kB
>>>> Rss:               51212 kB
>>>> Pss:                8276 kB
>>>> Shared_Clean:        172 kB
>>>> Shared_Dirty:      42996 kB
>>>> Private_Clean:       196 kB
>>>> Private_Dirty:      7848 kB
>>>> Referenced:        15388 kB
>>>> Anonymous:         51212 kB
>>>> KSM:               41376 kB
>>>> LazyFree:              0 kB
>>>> AnonHugePages:         0 kB
>>>> ShmemPmdMapped:        0 kB
>>>> FilePmdMapped:         0 kB
>>>> Shared_Hugetlb:        0 kB
>>>> Private_Hugetlb:       0 kB
>>>> Swap:             202016 kB
>>>> SwapPss:            3882 kB
>>>> Locked:                0 kB
>>>> THPeligible:    0
>>>> ProtectionKey:         0
>>>> ksm_state:          0
>>>> ksm_skip_base:      0
>>>> ksm_skip_count:     0
>>>> VmFlags: rd wr mr mw me nr mg anon
>>>> This information also helps with the following workflow:
>>>> - First enable KSM for all the VMA's of a process with prctl.
>>>> - Then analyze with the above smaps report which VMA's benefit the most
>>>> - Change the application (if possible) to add the corresponding madvise
>>>> calls for the VMA's that benefit the most
>>>> Signed-off-by: Stefan Roesch <shr@devkernel.io>
>>>> ---
>>>>    Documentation/filesystems/proc.rst | 3 +++
>>>>    fs/proc/task_mmu.c                 | 5 +++++
>>>>    2 files changed, 8 insertions(+)
>>>> diff --git a/Documentation/filesystems/proc.rst
>>>> b/Documentation/filesystems/proc.rst
>>>> index 7897a7dafcbc..4ef3c0bbf16a 100644
>>>> --- a/Documentation/filesystems/proc.rst
>>>> +++ b/Documentation/filesystems/proc.rst
>>>> @@ -461,6 +461,7 @@ Memory Area, or VMA) there is a series of lines such as the following::
>>>>        Private_Dirty:         0 kB
>>>>        Referenced:          892 kB
>>>>        Anonymous:             0 kB
>>>> +    KSM:                   0 kB
>>>>        LazyFree:              0 kB
>>>>        AnonHugePages:         0 kB
>>>>        ShmemPmdMapped:        0 kB
>>>> @@ -501,6 +502,8 @@ accessed.
>>>>    a mapping associated with a file may contain anonymous pages: when MAP_PRIVATE
>>>>    and a page is modified, the file page is replaced by a private anonymous copy.
>>>>    +"KSM" shows the amount of anonymous memory that has been de-duplicated.
>>>
>>>
>>> How do we want to treat memory that has been deduplicated into the shared
>>> zeropage?
>>>
>>> It would also match this description.
>>>
>>> See in mm-stable:
>>>
>>> commit 30ff6ed9a65c7e73545319fc15f7bcf9c52457eb
>>> Author: xu xin <xu.xin16@zte.com.cn>
>>> Date:   Tue Jun 13 11:09:28 2023 +0800
>>>
>>>      ksm: support unsharing KSM-placed zero pages
>>>
>>>      Patch series "ksm: support tracking KSM-placed zero-pages", v10.
>> I see two approaches how to deal with zero page:
>>   - If zero page is not enabled, it works as is
>>   - If enabled
>>      - Document that zero page is accounted for the current vma or
>>      - Pass in the pte from smaps_pte_entry() to smaps_account() so we can
>>      determine if this is a zero page.
>
> That's probably the right thing to do: make the stat return the same value
> independent of the usage of the shared zeropage.
>

I'll update the documentation accordingly.

>>      I'm not sure what to do about smaps_pmd_entry in that case. We
>>      probably don't care about compund pages.
>
> No, KSM only places the shared zeropage for PTEs, no need to handle PMDs.


      reply	other threads:[~2023-08-16 16:22 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-08-11 16:28 Stefan Roesch
2023-08-15  7:19 ` David Hildenbrand
2023-08-15 17:10   ` Stefan Roesch
2023-08-16  9:39     ` David Hildenbrand
2023-08-16 16:22       ` Stefan Roesch [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=qvqwmsyrgdof.fsf@devbig1114.prn1.facebook.com \
    --to=shr@devkernel.io \
    --cc=akpm@linux-foundation.org \
    --cc=david@redhat.com \
    --cc=hannes@cmpxchg.org \
    --cc=kernel-team@fb.com \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=riel@surriel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox