Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp5109631yba; Mon, 13 May 2019 05:37:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqzRcnC6PAeQTtW4mhGkuvfJJ1ZP3LY0fUcTRIm9/5+YkkOURMrTkF9770yPZWCsJ9d1NM5v X-Received: by 2002:a63:eb55:: with SMTP id b21mr2549455pgk.67.1557751061657; Mon, 13 May 2019 05:37:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557751061; cv=none; d=google.com; s=arc-20160816; b=gBTGAJSw9zOFtOqLI31UsStRNIEE8JPEcBDvKRkcu60JPGCRYJNdMvIqMuC0AW6uXR ryfyDbGBB4vZzrr5djCfPl+wLsUuR9rpbASRgMha3Xou+nSTLwHbrUi8UFERgOUcUFm3 LWEXBfbgwYQiZTDqYmYK5JPtfy60HNggt8nfmoGz/8l9YxE63Cul5LyYU1cRUExh4s0u JocjGpS2rAVdeF3eVuMHNBmla9RG3wBXInNsm1YfkW8OY4fiL/elzwyDw2O4XvHvMzAf CFq/UlwD3DpHvD48YNGCEKciMPS9gIyEdhxpMCYTfhjXJdIp5OMmt4SwDdIWD/BgB+zM ka9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=fXonh0Cb0dxgFIhZGmnGLJLJ19PHXe+EhVuhVcJmlIQ=; b=GSw6qdPGoeWJlJiDdPZ7eJjmgLPsjkpinkCiW5u+mcfs10kYMqeu2/YPC7f55uBPGs /m4nTINqSjjNaVg7vFN8UjZvbxQKm51RsrJbQrbwoJSsakJjBUg236F1Qu01iF1kGP3r BJ1kX/reWvXHfjRoUkW/+iYQ4I7Pq4ad5/9flSHnobYYAv7AQXhXpRd+e3A3gaMnLh+Q NE3X4/EKnPxBcLqL47fSLQCKLFkLjQ4bNAOkMFGNFcxIwf6hGMY0x/WA6JYNN6JrRVZr kahHhuLCEyc+uVBxkWs/cdkQsf71YbHfVcl+FclgWvEIM6uRf2KcbGPK5fzNEJ5fAbK4 4kwg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r15si4783599pgi.16.2019.05.13.05.37.25; Mon, 13 May 2019 05:37:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729449AbfEMLdU (ORCPT + 99 others); Mon, 13 May 2019 07:33:20 -0400 Received: from mail-wm1-f66.google.com ([209.85.128.66]:54078 "EHLO mail-wm1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729391AbfEMLdT (ORCPT ); Mon, 13 May 2019 07:33:19 -0400 Received: by mail-wm1-f66.google.com with SMTP id 198so13454788wme.3 for ; Mon, 13 May 2019 04:33:17 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=fXonh0Cb0dxgFIhZGmnGLJLJ19PHXe+EhVuhVcJmlIQ=; b=GDvnrvznA2q0O1S0tIsoUG8KnDWncvcHk0Og3wG+k0qSaXBv8Qu7iGJEvqCOPD8fcG 9K0jxiEBvj8fqUzdHfl7fbSssUQLC9XjNGXmFBtPOUagj7TR8tl1kxD79KVcWJXpzcRu vTiA5KJ5t+ntDUdGznCSJFERkrsNmdvzGHhhC9JjPsyJvfTJ9GGtYSXmZ6Bd4AgvnqeC vUUtDfrs+v8voD9IbNTcnQX1pWB1y5McTTfkMbqWDKSsTObqT8kFp3mKiJV44tQLoBdY 7T89cHzg5IrjA2nI1o5eY+CACXXea0Mzn7u5otMGih2Zb2UzibUEG/XTlw6E7VVy1nbs doxQ== X-Gm-Message-State: APjAAAWNyIbLNwOCJF/6mCB6+XMg0njhkRud17aQmLSosQPKZfKazpM9 y3PQU5k9bzbC5NBWnEqGfuGAMA== X-Received: by 2002:a1c:3cc2:: with SMTP id j185mr15630534wma.26.1557747196861; Mon, 13 May 2019 04:33:16 -0700 (PDT) Received: from localhost (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id i17sm13493947wrr.46.2019.05.13.04.33.15 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 13 May 2019 04:33:15 -0700 (PDT) Date: Mon, 13 May 2019 13:33:15 +0200 From: Oleksandr Natalenko To: Kirill Tkhai Cc: linux-kernel@vger.kernel.org, Vlastimil Babka , Michal Hocko , Matthew Wilcox , Pavel Tatashin , Timofey Titovets , Aaron Tomlin , linux-mm@kvack.org Subject: Re: [PATCH RFC 0/4] mm/ksm: add option to automerge VMAs Message-ID: <20190513113314.lddxv4kv5ajjldae@butterfly.localdomain> References: <20190510072125.18059-1-oleksandr@redhat.com> <36a71f93-5a32-b154-b01d-2a420bca2679@virtuozzo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <36a71f93-5a32-b154-b01d-2a420bca2679@virtuozzo.com> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi. On Mon, May 13, 2019 at 01:38:43PM +0300, Kirill Tkhai wrote: > On 10.05.2019 10:21, Oleksandr Natalenko wrote: > > By default, KSM works only on memory that is marked by madvise(). And the > > only way to get around that is to either: > > > > * use LD_PRELOAD; or > > * patch the kernel with something like UKSM or PKSM. > > > > Instead, lets implement a so-called "always" mode, which allows marking > > VMAs as mergeable on do_anonymous_page() call automatically. > > > > The submission introduces a new sysctl knob as well as kernel cmdline option > > to control which mode to use. The default mode is to maintain old > > (madvise-based) behaviour. > > > > Due to security concerns, this submission also introduces VM_UNMERGEABLE > > vmaflag for apps to explicitly opt out of automerging. Because of adding > > a new vmaflag, the whole work is available for 64-bit architectures only. > >> This patchset is based on earlier Timofey's submission [1], but it doesn't > > use dedicated kthread to walk through the list of tasks/VMAs. > > > > For my laptop it saves up to 300 MiB of RAM for usual workflow (browser, > > terminal, player, chats etc). Timofey's submission also mentions > > containerised workload that benefits from automerging too. > > This all approach looks complicated for me, and I'm not sure the shown profit > for desktop is big enough to introduce contradictory vma flags, boot option > and advance page fault handler. Also, 32/64bit defines do not look good for > me. I had tried something like this on my laptop some time ago, and > the result was bad even in absolute (not in memory percentage) meaning. > Isn't LD_PRELOAD trick enough to desktop? Your workload is same all the time, > so you may statically insert correct preload to /etc/profile and replace > your mmap forever. > > Speaking about containers, something like this may have a sense, I think. > The probability of that several containers have the same pages are higher, > than that desktop applications have the same pages; also LD_PRELOAD for > containers is not applicable. Yes, I get your point. But the intention is to avoid another hacky trick (LD_PRELOAD), thus *something* should *preferably* be done on the kernel level instead. > But 1)this could be made for trusted containers only (are there similar > issues with KSM like with hardware side-channel attacks?!); Regarding side-channel attacks, yes, I think so. Were those openssl guys who complained about it?.. > 2) the most > shared data for containers in my experience is file cache, which is not > supported by KSM. > > There are good results by the link [1], but it's difficult to analyze > them without knowledge about what happens inside them there. > > Some of tests have "VM" prefix. What the reason the hypervisor don't mark > their VMAs as mergeable? Can't this be fixed in hypervisor? What is the > generic reason that VMAs are not marked in all the tests? Timofey, could you please address this? Also, just for the sake of another piece of stats here: $ echo "$(cat /sys/kernel/mm/ksm/pages_sharing) * 4 / 1024" | bc 526 > In case of there is a fundamental problem of calling madvise, can't we > just implement an easier workaround like a new write-only file: > > #echo $task > /sys/kernel/mm/ksm/force_madvise > > which will mark all anon VMAs as mergeable for a passed task's mm? > > A small userspace daemon may write mergeable tasks there from time to time. > > Then we won't need to introduce additional vm flags and to change > anon pagefault handler, and the changes will be small and only > related to mm/ksm.c, and good enough for both 32 and 64 bit machines. Yup, looks appealing. Two concerns, though: 1) we are falling back to scanning through the list of tasks (I guess this is what we wanted to avoid, although this time it happens in the userspace); 2) what kinds of opt-out we should maintain? Like, what if force_madvise is called, but the task doesn't want some VMAs to be merged? This will required new flag anyway, it seems. And should there be another write-only file to unmerge everything forcibly for specific task? Thanks. P.S. Cc'ing Pavel properly this time. -- Best regards, Oleksandr Natalenko (post-factum) Senior Software Maintenance Engineer