Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp5718561ybe; Tue, 10 Sep 2019 07:51:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqyqyKq/To29yZQbqs8JeuDnJYCXPU7cAAp0nvGuMng0ff19fNasZucU4Yd+vH3zIO2di1WM X-Received: by 2002:a05:6402:3ca:: with SMTP id t10mr31391829edw.271.1568127115731; Tue, 10 Sep 2019 07:51:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568127115; cv=none; d=google.com; s=arc-20160816; b=dbImkqXI1fUf8wPDH1eOfOMSBimyarQGNkhEc5V14DPe9q/TwuZzQ9TCHRwspmmWN4 nSpfLXOsL9C3tomB3sqnoLJxe6O+s6SdDy3HkybI0JoifoDrgi6n/wYU4uwXDIGD1ySd PczSLQPUgUPP26IR7Z9fCt4Q3f8BCkJVZbKeXxmI4aN9baO75VuO/E6Yj11W4sAJIsNq JFlHFmyG7WPmnJB5ZaYT9GRnk1y8UwYC7blpE6yrmLqos9nldXJwJo3mydofbQM1RvAM x4+b3RhVOOUqrB+Qdtk2Rl03UkpfD2RsPEk751mrkj2BQVtochCTRJtwc6UhJw4aUHej EOZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=ZeyIhi6Qz3d9MjUWSF/MxdiWgb/XuSDtNa/fHGjUA8A=; b=I6x1GTAMXJBG6MkcMyuU8MvljmOjmNjfpsMgyxkNmHGseFbZg1PAkKK9/WEMIg7tCu x/u3b6S9gJV4mJMJ1wYril2ajou8pyirLC3OQxEg8bfmKVhB4g4jOXaj6e+Y/wP/XXdI KPZix0q3XslmunovTFl0eBphdVtfMIgLbyi/B2sB8lPbRq63Eru3u/s2D2gpsAqprghu RSH4jhmkyDqw5xVLMO+iHDwKXZkyd05skJPg5d+y7oqitACXTMVJMTmZnXutJ5bWb/tQ iM3kznZhC9tzcGyp3p9Mt+5umBH4aKqT+wHL2JxGbPKSSy1YzGlzrQBVTkh5lC+6yy40 cVww== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id lu11si9102433ejb.215.2019.09.10.07.51.31; Tue, 10 Sep 2019 07:51:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393658AbfIJOrS (ORCPT + 99 others); Tue, 10 Sep 2019 10:47:18 -0400 Received: from mx2.suse.de ([195.135.220.15]:48628 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726132AbfIJOrR (ORCPT ); Tue, 10 Sep 2019 10:47:17 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id AA491ABD2; Tue, 10 Sep 2019 14:47:14 +0000 (UTC) Date: Tue, 10 Sep 2019 16:47:13 +0200 From: Michal Hocko To: Alexander Duyck Cc: virtio-dev@lists.oasis-open.org, kvm list , "Michael S. Tsirkin" , Catalin Marinas , David Hildenbrand , Dave Hansen , LKML , Matthew Wilcox , linux-mm , Andrew Morton , will@kernel.org, linux-arm-kernel@lists.infradead.org, Oscar Salvador , Yang Zhang , Pankaj Gupta , Konrad Rzeszutek Wilk , Nitesh Narayan Lal , Rik van Riel , lcapitulino@redhat.com, "Wang, Wei W" , Andrea Arcangeli , ying.huang@intel.com, Paolo Bonzini , Dan Williams , Fengguang Wu , Alexander Duyck , "Kirill A. Shutemov" Subject: Re: [PATCH v9 0/8] stg mail -e --version=v9 \ Message-ID: <20190910144713.GF2063@dhcp22.suse.cz> References: <20190907172225.10910.34302.stgit@localhost.localdomain> <20190910124209.GY2063@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 10-09-19 07:42:43, Alexander Duyck wrote: > On Tue, Sep 10, 2019 at 5:42 AM Michal Hocko wrote: > > > > I wanted to review "mm: Introduce Reported pages" just realize that I > > have no clue on what is going on so returned to the cover and it didn't > > really help much. I am completely unfamiliar with virtio so please bear > > with me. > > > > On Sat 07-09-19 10:25:03, Alexander Duyck wrote: > > [...] > > > This series provides an asynchronous means of reporting to a hypervisor > > > that a guest page is no longer in use and can have the data associated > > > with it dropped. To do this I have implemented functionality that allows > > > for what I am referring to as unused page reporting > > > > > > The functionality for this is fairly simple. When enabled it will allocate > > > statistics to track the number of reported pages in a given free area. > > > When the number of free pages exceeds this value plus a high water value, > > > currently 32, it will begin performing page reporting which consists of > > > pulling pages off of free list and placing them into a scatter list. The > > > scatterlist is then given to the page reporting device and it will perform > > > the required action to make the pages "reported", in the case of > > > virtio-balloon this results in the pages being madvised as MADV_DONTNEED > > > and as such they are forced out of the guest. After this they are placed > > > back on the free list, > > > > And here I am reallly lost because "forced out of the guest" makes me > > feel that those pages are no longer usable by the guest. So how come you > > can add them back to the free list. I suspect understanding this part > > will allow me to understand why we have to mark those pages and prevent > > merging. > > Basically as the paragraph above mentions "forced out of the guest" > really is just the hypervisor calling MADV_DONTNEED on the page in > question. So the behavior is the same as any userspace application > that calls MADV_DONTNEED where the contents are no longer accessible > from userspace and attempting to access them will result in a fault > and the page being populated with a zero fill on-demand page, or a > copy of the file contents if the memory is file backed. As I've said I have no idea about virt so this doesn't really tell me much. Does that mean that if somebody allocates such a page and tries to access it then virt will handle a fault and bring it back? -- Michal Hocko SUSE Labs