Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp8854067ybl; Fri, 17 Jan 2020 02:15:00 -0800 (PST) X-Google-Smtp-Source: APXvYqxi98UtKHrEDfKIGQlIlcc0Kky+S2gFfpCEdO5Ln2YMUJ3RUR/vuVlLYq0Fvbl1whjF0c8+ X-Received: by 2002:aca:1111:: with SMTP id 17mr2706127oir.37.1579256100056; Fri, 17 Jan 2020 02:15:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579256100; cv=none; d=google.com; s=arc-20160816; b=ynEg0RTk9t4d1t/eJ3q4GPg+vFtURy9jYiOfqaGBZvFjFeB5rCb+9Pv66VuKwQarnL CHUxuW55vtpeEnc1PymvbNCR/btr+YhGGdu1LQcrf5h7EHzy9mTOBeXtHHkvQSE2z4Nv aLv+dCRG2I4ftDPojfiunptElyEAZSN/tEBbzHip61I8ibe/mcReEXk8BbirIbPdPu5G Mw5N5/vqrf9v44U0vojBDytAX5FZxO4IjvzSWcUkDpVoOMwlLj5BCQGS8YNE8xwduUfH /r/lnLfXLqe+gqCO6xIcUMejjP1M4aPdPp4pkRbw885aMhsi2Wzm9VYGbOXANOU1O8b5 N3cA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=SqR9zvJRH10rDYodKfUi2LrWe1UHnJMd+vNm8zOqq3Y=; b=SisjyF0KfEqTerjIvlDymnU92ZXPRbsZarxE0C7vvmIIcud8KhMrnbJKFo37pa3Zze X67U6/fmeTDxPMbwxY0coz/+/uIVH2Mrkrlv5GpB2g6LMovnEOFdYC+vbex38tLt+Y+1 2kaRbcQU4s6mWtZcOtm/LYVZvkJgakScgIhGrVK2+VNLCSGLO3sYqKFYMbZf0nMZv59v KAN5LbOXdPvEpLuiof1zsla4+mlhIJTLn4OvQhzpjPsoq2lOJmyjaal63jeSq6y0hSJE SpnE4NiGGMwUA4cnimrh+3QzK5DQviRCiovHUZwer8j2Q0ImDnK/48thKYfEuFGmrEeD 6h9A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a7si7840946oti.135.2020.01.17.02.14.48; Fri, 17 Jan 2020 02:15:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726752AbgAQKNg (ORCPT + 99 others); Fri, 17 Jan 2020 05:13:36 -0500 Received: from relay.sw.ru ([185.231.240.75]:51224 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726220AbgAQKNg (ORCPT ); Fri, 17 Jan 2020 05:13:36 -0500 Received: from dhcp-172-16-24-104.sw.ru ([172.16.24.104]) by relay.sw.ru with esmtp (Exim 4.92.3) (envelope-from ) id 1isOcs-0006AZ-Kl; Fri, 17 Jan 2020 13:13:14 +0300 Subject: Re: [PATCH v2 4/5] mm/madvise: allow KSM hints for remote API To: Minchan Kim , Andrew Morton Cc: LKML , linux-mm , linux-api@vger.kernel.org, oleksandr@redhat.com, Suren Baghdasaryan , Tim Murray , Daniel Colascione , Sandeep Patil , Sonny Rao , Brian Geffon , Michal Hocko , Johannes Weiner , Shakeel Butt , John Dias , christian.brauner@ubuntu.com, sjpark@amazon.de, Minchan Kim References: <20200116235953.163318-1-minchan@kernel.org> <20200116235953.163318-5-minchan@kernel.org> From: Kirill Tkhai Message-ID: <37338e14-5a55-1926-b6c1-5f98b6a6fdb5@virtuozzo.com> Date: Fri, 17 Jan 2020 13:13:14 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <20200116235953.163318-5-minchan@kernel.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 17.01.2020 02:59, Minchan Kim wrote: > From: Oleksandr Natalenko > > It all began with the fact that KSM works only on memory that is marked > by madvise(). And the only way to get around that is to either: > > * use LD_PRELOAD; or > * patch the kernel with something like UKSM or PKSM. > > (i skip ptrace can of worms here intentionally) > > To overcome this restriction, lets employ a new remote madvise API. This > can be used by some small userspace helper daemon that will do auto-KSM > job for us. > > I think of two major consumers of remote KSM hints: > > * hosts, that run containers, especially similar ones and especially in > a trusted environment, sharing the same runtime like Node.js; > > * heavy applications, that can be run in multiple instances, not > limited to opensource ones like Firefox, but also those that cannot be > modified since they are binary-only and, maybe, statically linked. > > Speaking of statistics, more numbers can be found in the very first > submission, that is related to this one [1]. For my current setup with > two Firefox instances I get 100 to 200 MiB saved for the second instance > depending on the amount of tabs. > > 1 FF instance with 15 tabs: > > $ echo "$(cat /sys/kernel/mm/ksm/pages_sharing) * 4 / 1024" | bc > 410 > > 2 FF instances, second one has 12 tabs (all the tabs are different): > > $ echo "$(cat /sys/kernel/mm/ksm/pages_sharing) * 4 / 1024" | bc > 592 > > At the very moment I do not have specific numbers for containerised > workload, but those should be comparable in case the containers share > similar/same runtime. > > [1] https://lore.kernel.org/patchwork/patch/1012142/ > > Signed-off-by: Oleksandr Natalenko > Signed-off-by: Minchan Kim > --- > mm/madvise.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/mm/madvise.c b/mm/madvise.c > index 84cffd0900f1..89557998d287 100644 > --- a/mm/madvise.c > +++ b/mm/madvise.c > @@ -1000,6 +1000,8 @@ process_madvise_behavior_valid(int behavior) > switch (behavior) { > case MADV_COLD: > case MADV_PAGEOUT: > + case MADV_MERGEABLE: > + case MADV_UNMERGEABLE: > return true; > default: > return false; Remote madvise on KSM parameters should be OK. One thing is madvise_behavior_valid() places MADV_MERGEABLE/UNMERGEABLE in #ifdef brackes, so -EINVAL is returned by madvise() syscall if KSM is not enabled. Here we should follow the same way for symmetry.