Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1792447yba; Fri, 10 May 2019 00:50:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqwguqiq7SurzCttaz/PbemI5aNJE+m//RvESgvsnuic3KPdso/LwyavNKM+52kGAQqCPu2T X-Received: by 2002:a63:2a89:: with SMTP id q131mr11452253pgq.359.1557474648537; Fri, 10 May 2019 00:50:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557474648; cv=none; d=google.com; s=arc-20160816; b=lGfztAQHA4auZTqcuPc34owSLhkmeEFob4CXk1SlUSxD5Baj1x/z8DclyoOKyx6qqp AkmLjIaPxX4XIADub2QnYGVLJ6RTL+NRMCWZ0VYTkoSAgOhnECi2BEY0mvtCEsRS5bsj DFALdDqYM6ukYZZdQ4TPDyTnpH1Grg56Rny2Hbj554fH7AU7zxQM+uISmGG351+95tYb whKV+VfUMgiRPuXlHxtadXEGpVYDBWPq/6J0wfLgwBX9IxmvHF2T838CzFL3Pkx0afkZ DsSTzIhxbv+l0gxBHG99YuRgAzCAeFlVW/yyfLHngCZwRTFtsK2NJpwmwdHIYO0HzSKw oXSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=mlMuZ+baS9vhQtlkYflvWcBmyvS2Oox5GVM3xd9Ae4c=; b=zD63iGXJlkdKRcxoamGBCwY3zJyXakDYhe3RR670gUQVMvEaE2pQ2lgKtcmmnKy55T jA/XsORvb+f07QStI1tec/2SIm7oGFDQSvF5MWmM6o6tTUCZldKNn1XxOg5wiUfItBF0 YqQjB/RX4xg0eewxpQmpnXxH6TgZFjiDdhUAG3gdhd/smeEUh6H8mK9nT0jbyYka/8ox U5LaZ7YZiDJy2AKC3/e/dJjz7E6lFLja6c8cuv+9cUyCghwfIic1HknzXZVwDI17h0Ca t7S9boM1qPUPMw8E/AgIcQMBYtWoGYUtmK5aqrECqw7mnj3LUPHnj7ZgLsrzmEuxSMYm 4XnA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b1si6456194pgj.536.2019.05.10.00.50.32; Fri, 10 May 2019 00:50:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727254AbfEJHVh (ORCPT + 99 others); Fri, 10 May 2019 03:21:37 -0400 Received: from mail-qt1-f196.google.com ([209.85.160.196]:33806 "EHLO mail-qt1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727224AbfEJHVf (ORCPT ); Fri, 10 May 2019 03:21:35 -0400 Received: by mail-qt1-f196.google.com with SMTP id j6so5518581qtq.1 for ; Fri, 10 May 2019 00:21:35 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=mlMuZ+baS9vhQtlkYflvWcBmyvS2Oox5GVM3xd9Ae4c=; b=aGUQ/xvIGXvCbBCyhPebNNC1xnr8BfM2Fi/DrOY+bhEdiT4wWBuKgaYImXTkSBd+gC yP2naY5gNYnDBW86gJRWpAAU2huTAm/9hQ+6MP0MNZxevTF6LuFfP4wCN+7QFEQERKUq /4TV/kmImKfm8t8CZvu+m53S6QMKXeUcTZkWSOuHmbPMEpqfM3GjjVbg+GWyv2PNK+1W K0/5iM2Igt9uh2ZyTRQk16aQU6zZ1QuUG1vUYy+MMUEdolTZ9bb6qPKjFv4PmVZbvehI kZgB7RM8bOKCenr29z3++kz931ZOKbJltaXd6N71xiAa3w8ZC8tRds9ia4Sha/1C/Jpd ++Pw== X-Gm-Message-State: APjAAAXmeviiyiMRZgKtQLr1lIb+SKFJD+fYiEkXdbPisPv1PBZj4PKF duCTh9cCvrPBK6RCdIUdPpdl7YA5rDkZ4w== X-Received: by 2002:a0c:b28e:: with SMTP id r14mr7753580qve.158.1557472894619; Fri, 10 May 2019 00:21:34 -0700 (PDT) Received: from localhost (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id 124sm1641385qkj.59.2019.05.10.00.21.33 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Fri, 10 May 2019 00:21:33 -0700 (PDT) From: Oleksandr Natalenko To: linux-kernel@vger.kernel.org Cc: Kirill Tkhai , Vlastimil Babka , Michal Hocko , Matthew Wilcox , Pavel Tatashin , Timofey Titovets , Aaron Tomlin , linux-mm@kvack.org Subject: [PATCH RFC 3/4] mm/ksm: allow anonymous memory automerging Date: Fri, 10 May 2019 09:21:24 +0200 Message-Id: <20190510072125.18059-4-oleksandr@redhat.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190510072125.18059-1-oleksandr@redhat.com> References: <20190510072125.18059-1-oleksandr@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Introduce 2 KSM modes: * madvise, which is default and maintains old behaviour; and * always, in which new anonymous allocations are marked as eligible for merging. The mode is controlled either via sysfs or via kernel cmdline for VMAs to be marked as soon as possible during the boot process. Previously introduced ksm_enter() helper is used to hook into do_anonymous_page() and mark each eligible VMA as ready for merging. This avoids introducing separate kthread to walk through the task/VMAs list. Signed-off-by: Oleksandr Natalenko --- include/linux/ksm.h | 3 +++ mm/ksm.c | 65 +++++++++++++++++++++++++++++++++++++++++++++ mm/memory.c | 6 +++++ 3 files changed, 74 insertions(+) diff --git a/include/linux/ksm.h b/include/linux/ksm.h index bc13f228e2ed..3c076b35259c 100644 --- a/include/linux/ksm.h +++ b/include/linux/ksm.h @@ -21,6 +21,9 @@ struct mem_cgroup; #ifdef CONFIG_KSM int ksm_madvise(struct vm_area_struct *vma, unsigned long start, unsigned long end, int advice, unsigned long *vm_flags); +#ifdef VM_UNMERGEABLE +bool ksm_mode_always(void); +#endif int ksm_enter(struct mm_struct *mm, struct vm_area_struct *vma, unsigned long *vm_flags); int __ksm_enter(struct mm_struct *mm); diff --git a/mm/ksm.c b/mm/ksm.c index 0fb5f850087a..6a2280b875cc 100644 --- a/mm/ksm.c +++ b/mm/ksm.c @@ -295,6 +295,12 @@ static int ksm_nr_node_ids = 1; static unsigned long ksm_run = KSM_RUN_STOP; static void wait_while_offlining(void); +#ifdef VM_UNMERGEABLE +#define KSM_MODE_MADVISE 0 +#define KSM_MODE_ALWAYS 1 +static unsigned long ksm_mode = KSM_MODE_MADVISE; +#endif + static DECLARE_WAIT_QUEUE_HEAD(ksm_thread_wait); static DECLARE_WAIT_QUEUE_HEAD(ksm_iter_wait); static DEFINE_MUTEX(ksm_thread_mutex); @@ -2478,6 +2484,36 @@ int ksm_madvise(struct vm_area_struct *vma, unsigned long start, return 0; } +#ifdef VM_UNMERGEABLE +bool ksm_mode_always(void) +{ + return ksm_mode == KSM_MODE_ALWAYS; +} + +static int __init setup_ksm_mode(char *str) +{ + int ret = 0; + + if (!str) + goto out; + + if (!strcmp(str, "madvise")) { + ksm_mode = KSM_MODE_MADVISE; + ret = 1; + } else if (!strcmp(str, "always")) { + ksm_mode = KSM_MODE_ALWAYS; + ret = 1; + } + +out: + if (!ret) + pr_warn("ksm_mode= cannot parse, ignored\n"); + + return ret; +} +__setup("ksm_mode=", setup_ksm_mode); +#endif + int ksm_enter(struct mm_struct *mm, struct vm_area_struct *vma, unsigned long *vm_flags) { @@ -2881,6 +2917,35 @@ static void wait_while_offlining(void) static struct kobj_attribute _name##_attr = \ __ATTR(_name, 0644, _name##_show, _name##_store) +#ifdef VM_UNMERGEABLE +static ssize_t mode_show(struct kobject *kobj, struct kobj_attribute *attr, + char *buf) +{ + switch (ksm_mode) { + case KSM_MODE_MADVISE: + return sprintf(buf, "always [madvise]\n"); + case KSM_MODE_ALWAYS: + return sprintf(buf, "[always] madvise\n"); + } + + return sprintf(buf, "always [madvise]\n"); +} + +static ssize_t mode_store(struct kobject *kobj, struct kobj_attribute *attr, + const char *buf, size_t count) +{ + if (!memcmp("madvise", buf, min(sizeof("madvise")-1, count))) + ksm_mode = KSM_MODE_MADVISE; + else if (!memcmp("always", buf, min(sizeof("always")-1, count))) + ksm_mode = KSM_MODE_ALWAYS; + else + return -EINVAL; + + return count; +} +KSM_ATTR(mode); +#endif + static ssize_t sleep_millisecs_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf) { diff --git a/mm/memory.c b/mm/memory.c index ab650c21bccd..08f3f92de310 100644 --- a/mm/memory.c +++ b/mm/memory.c @@ -2994,6 +2994,12 @@ static vm_fault_t do_anonymous_page(struct vm_fault *vmf) update_mmu_cache(vma, vmf->address, vmf->pte); unlock: pte_unmap_unlock(vmf->pte, vmf->ptl); + +#if defined(CONFIG_KSM) && defined(VM_UNMERGEABLE) + if (ksm_mode_always()) + ksm_enter(vma->vm_mm, vma, &vma->vm_flags); +#endif + return ret; release: mem_cgroup_cancel_charge(page, memcg, false); -- 2.21.0