From: Stefan Roesch <shr@devkernel.io>
To: David Hildenbrand <david@redhat.com>
Cc: kernel-team@fb.com, akpm@linux-foundation.org,
linux-fsdevel@vger.kernel.org, hannes@cmpxchg.org,
riel@surriel.com, linux-kernel@vger.kernel.org,
linux-mm@kvack.org
Subject: Re: [PATCH v2] proc/ksm: add ksm stats to /proc/pid/smaps
Date: Wed, 16 Aug 2023 09:22:03 -0700 [thread overview]
Message-ID: <qvqwmsyrgdof.fsf@devbig1114.prn1.facebook.com> (raw)
In-Reply-To: <ad33c7f1-8c7c-27b6-7c2e-adbb349f2dff@redhat.com>
David Hildenbrand <david@redhat.com> writes:
> On 15.08.23 19:10, Stefan Roesch wrote:
>> David Hildenbrand <david@redhat.com> writes:
>>
>>> Sorry for the late reply, Gmail once again decided to classify your mails as
>>> spam (for whatever reason).
>>>
>>> On 11.08.23 18:28, Stefan Roesch wrote:
>>>> With madvise and prctl KSM can be enabled for different VMA's. Once it
>>>> is enabled we can query how effective KSM is overall. However we cannot
>>>> easily query if an individual VMA benefits from KSM.
>>>> This commit adds a KSM section to the /prod/<pid>/smaps file. It reports
>>>> how many of the pages are KSM pages.
>>>> Here is a typical output:
>>>> 7f420a000000-7f421a000000 rw-p 00000000 00:00 0
>>>> Size: 262144 kB
>>>> KernelPageSize: 4 kB
>>>> MMUPageSize: 4 kB
>>>> Rss: 51212 kB
>>>> Pss: 8276 kB
>>>> Shared_Clean: 172 kB
>>>> Shared_Dirty: 42996 kB
>>>> Private_Clean: 196 kB
>>>> Private_Dirty: 7848 kB
>>>> Referenced: 15388 kB
>>>> Anonymous: 51212 kB
>>>> KSM: 41376 kB
>>>> LazyFree: 0 kB
>>>> AnonHugePages: 0 kB
>>>> ShmemPmdMapped: 0 kB
>>>> FilePmdMapped: 0 kB
>>>> Shared_Hugetlb: 0 kB
>>>> Private_Hugetlb: 0 kB
>>>> Swap: 202016 kB
>>>> SwapPss: 3882 kB
>>>> Locked: 0 kB
>>>> THPeligible: 0
>>>> ProtectionKey: 0
>>>> ksm_state: 0
>>>> ksm_skip_base: 0
>>>> ksm_skip_count: 0
>>>> VmFlags: rd wr mr mw me nr mg anon
>>>> This information also helps with the following workflow:
>>>> - First enable KSM for all the VMA's of a process with prctl.
>>>> - Then analyze with the above smaps report which VMA's benefit the most
>>>> - Change the application (if possible) to add the corresponding madvise
>>>> calls for the VMA's that benefit the most
>>>> Signed-off-by: Stefan Roesch <shr@devkernel.io>
>>>> ---
>>>> Documentation/filesystems/proc.rst | 3 +++
>>>> fs/proc/task_mmu.c | 5 +++++
>>>> 2 files changed, 8 insertions(+)
>>>> diff --git a/Documentation/filesystems/proc.rst
>>>> b/Documentation/filesystems/proc.rst
>>>> index 7897a7dafcbc..4ef3c0bbf16a 100644
>>>> --- a/Documentation/filesystems/proc.rst
>>>> +++ b/Documentation/filesystems/proc.rst
>>>> @@ -461,6 +461,7 @@ Memory Area, or VMA) there is a series of lines such as the following::
>>>> Private_Dirty: 0 kB
>>>> Referenced: 892 kB
>>>> Anonymous: 0 kB
>>>> + KSM: 0 kB
>>>> LazyFree: 0 kB
>>>> AnonHugePages: 0 kB
>>>> ShmemPmdMapped: 0 kB
>>>> @@ -501,6 +502,8 @@ accessed.
>>>> a mapping associated with a file may contain anonymous pages: when MAP_PRIVATE
>>>> and a page is modified, the file page is replaced by a private anonymous copy.
>>>> +"KSM" shows the amount of anonymous memory that has been de-duplicated.
>>>
>>>
>>> How do we want to treat memory that has been deduplicated into the shared
>>> zeropage?
>>>
>>> It would also match this description.
>>>
>>> See in mm-stable:
>>>
>>> commit 30ff6ed9a65c7e73545319fc15f7bcf9c52457eb
>>> Author: xu xin <xu.xin16@zte.com.cn>
>>> Date: Tue Jun 13 11:09:28 2023 +0800
>>>
>>> ksm: support unsharing KSM-placed zero pages
>>>
>>> Patch series "ksm: support tracking KSM-placed zero-pages", v10.
>> I see two approaches how to deal with zero page:
>> - If zero page is not enabled, it works as is
>> - If enabled
>> - Document that zero page is accounted for the current vma or
>> - Pass in the pte from smaps_pte_entry() to smaps_account() so we can
>> determine if this is a zero page.
>
> That's probably the right thing to do: make the stat return the same value
> independent of the usage of the shared zeropage.
>
I'll update the documentation accordingly.
>> I'm not sure what to do about smaps_pmd_entry in that case. We
>> probably don't care about compund pages.
>
> No, KSM only places the shared zeropage for PTEs, no need to handle PMDs.
prev parent reply other threads:[~2023-08-16 16:22 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-08-11 16:28 Stefan Roesch
2023-08-15 7:19 ` David Hildenbrand
2023-08-15 17:10 ` Stefan Roesch
2023-08-16 9:39 ` David Hildenbrand
2023-08-16 16:22 ` Stefan Roesch [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=qvqwmsyrgdof.fsf@devbig1114.prn1.facebook.com \
--to=shr@devkernel.io \
--cc=akpm@linux-foundation.org \
--cc=david@redhat.com \
--cc=hannes@cmpxchg.org \
--cc=kernel-team@fb.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=riel@surriel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox