lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ad33c7f1-8c7c-27b6-7c2e-adbb349f2dff@redhat.com>
Date:   Wed, 16 Aug 2023 11:39:52 +0200
From:   David Hildenbrand <david@...hat.com>
To:     Stefan Roesch <shr@...kernel.io>
Cc:     kernel-team@...com, akpm@...ux-foundation.org,
        linux-fsdevel@...r.kernel.org, hannes@...xchg.org,
        riel@...riel.com, linux-kernel@...r.kernel.org, linux-mm@...ck.org
Subject: Re: [PATCH v2] proc/ksm: add ksm stats to /proc/pid/smaps

On 15.08.23 19:10, Stefan Roesch wrote:
> 
> David Hildenbrand <david@...hat.com> writes:
> 
>> Sorry for the late reply, Gmail once again decided to classify your mails as
>> spam (for whatever reason).
>>
>> On 11.08.23 18:28, Stefan Roesch wrote:
>>> With madvise and prctl KSM can be enabled for different VMA's. Once it
>>> is enabled we can query how effective KSM is overall. However we cannot
>>> easily query if an individual VMA benefits from KSM.
>>> This commit adds a KSM section to the /prod/<pid>/smaps file. It reports
>>> how many of the pages are KSM pages.
>>> Here is a typical output:
>>> 7f420a000000-7f421a000000 rw-p 00000000 00:00 0
>>> Size:             262144 kB
>>> KernelPageSize:        4 kB
>>> MMUPageSize:           4 kB
>>> Rss:               51212 kB
>>> Pss:                8276 kB
>>> Shared_Clean:        172 kB
>>> Shared_Dirty:      42996 kB
>>> Private_Clean:       196 kB
>>> Private_Dirty:      7848 kB
>>> Referenced:        15388 kB
>>> Anonymous:         51212 kB
>>> KSM:               41376 kB
>>> LazyFree:              0 kB
>>> AnonHugePages:         0 kB
>>> ShmemPmdMapped:        0 kB
>>> FilePmdMapped:         0 kB
>>> Shared_Hugetlb:        0 kB
>>> Private_Hugetlb:       0 kB
>>> Swap:             202016 kB
>>> SwapPss:            3882 kB
>>> Locked:                0 kB
>>> THPeligible:    0
>>> ProtectionKey:         0
>>> ksm_state:          0
>>> ksm_skip_base:      0
>>> ksm_skip_count:     0
>>> VmFlags: rd wr mr mw me nr mg anon
>>> This information also helps with the following workflow:
>>> - First enable KSM for all the VMA's of a process with prctl.
>>> - Then analyze with the above smaps report which VMA's benefit the most
>>> - Change the application (if possible) to add the corresponding madvise
>>> calls for the VMA's that benefit the most
>>> Signed-off-by: Stefan Roesch <shr@...kernel.io>
>>> ---
>>>    Documentation/filesystems/proc.rst | 3 +++
>>>    fs/proc/task_mmu.c                 | 5 +++++
>>>    2 files changed, 8 insertions(+)
>>> diff --git a/Documentation/filesystems/proc.rst
>>> b/Documentation/filesystems/proc.rst
>>> index 7897a7dafcbc..4ef3c0bbf16a 100644
>>> --- a/Documentation/filesystems/proc.rst
>>> +++ b/Documentation/filesystems/proc.rst
>>> @@ -461,6 +461,7 @@ Memory Area, or VMA) there is a series of lines such as the following::
>>>        Private_Dirty:         0 kB
>>>        Referenced:          892 kB
>>>        Anonymous:             0 kB
>>> +    KSM:                   0 kB
>>>        LazyFree:              0 kB
>>>        AnonHugePages:         0 kB
>>>        ShmemPmdMapped:        0 kB
>>> @@ -501,6 +502,8 @@ accessed.
>>>    a mapping associated with a file may contain anonymous pages: when MAP_PRIVATE
>>>    and a page is modified, the file page is replaced by a private anonymous copy.
>>>    +"KSM" shows the amount of anonymous memory that has been de-duplicated.
>>
>>
>> How do we want to treat memory that has been deduplicated into the shared
>> zeropage?
>>
>> It would also match this description.
>>
>> See in mm-stable:
>>
>> commit 30ff6ed9a65c7e73545319fc15f7bcf9c52457eb
>> Author: xu xin <xu.xin16@....com.cn>
>> Date:   Tue Jun 13 11:09:28 2023 +0800
>>
>>      ksm: support unsharing KSM-placed zero pages
>>
>>      Patch series "ksm: support tracking KSM-placed zero-pages", v10.
> 
> I see two approaches how to deal with zero page:
>   - If zero page is not enabled, it works as is
>   - If enabled
>      - Document that zero page is accounted for the current vma or
>      - Pass in the pte from smaps_pte_entry() to smaps_account() so we can
>      determine if this is a zero page.

That's probably the right thing to do: make the stat return the same 
value independent of the usage of the shared zeropage.

>      I'm not sure what to do about smaps_pmd_entry in that case. We
>      probably don't care about compund pages.

No, KSM only places the shared zeropage for PTEs, no need to handle PMDs.

-- 
Cheers,

David / dhildenb

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ