I'm going to point out the security aspect, and that e.g., Windows used toIf I'm not mistaken the security aspect exists today. When KSM is
enable it system-wide before getting taught by security experts otherwise.
Details on KSM and security aspects can be found in that thread.
enabled with madvise this is the same.
[...]
Long story short: one has to be very careful with that and only enable it for
very carefully selected worklads. Letting a workload opt-in on a VMA level is
most probably safer than an admin blindly turning this on for random processes
... >>
My understanding is that there were problems with the patch and how it
[1] https://lore.kernel.org/all/20220517092701.1662641-1-xu.xin16@xxxxxxxxxx/
[2] https://lore.kernel.org/all/20220609055658.703472-1-xu.xin16@xxxxxxxxxx/
exposed KSM. The other objection was the enable-all configuration
option.