Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp645917ybe; Wed, 11 Sep 2019 02:28:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqxxEalU3ExaGXtIetw4CP8+vtQP3qyJZ5CtPeeOR9/GV0Pk3zcAVT9VRlojumaUOIYoMjl8 X-Received: by 2002:a50:e40a:: with SMTP id d10mr36536845edm.194.1568194106958; Wed, 11 Sep 2019 02:28:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568194106; cv=none; d=google.com; s=arc-20160816; b=rgbazK5kt6KK0tts2kbOVxFryo5WD056eXCJaLXwlq0XqSSmy7JojAmTmYqqlgGFaZ Y5UABwfZ8oAFz3Uekf2bERKdeFj8LFUOoO7HhbqAsu+N+FdZ2nwjKaAA7njzT2x06F/7 O6fxWhArfSCOIpGnqGd5jgvgsey7cMvt8Jn7trVgJqvfz81lHx9/3qX9pmyYXAbYyJgS 87/Y8YcqvSaf70Pp4o4LQmENCoS7W2rDn6PW68PdV3OX+Do6c2XDnQ7A/gEgyA6cdJ6l raXrBE37JnDBcOUDrzX+qfzwrjtKw9XlOxmJeoYKgADpu2b3bFs3B0lVoOkGbXO9diXX tWuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=mYSD9hRnX/6v3ywsydqfkpFUdOIKRrBI76zwVnPyG4o=; b=VvhKzS/WyZDHcTAA9YKVWsCYFNnBZAxw+KSlP19egSQtdSO+doT+Jq1MBNFFsIQBX0 k0izITTANJp6o+IjGYj1jv8O4DMptfcjaxtFXQKcdoTmE/IQ7qAJmN1FZ0+YXKxRU4Fo Get3xmHZkn1zGip54elJLvL7xj21A2l3lBSNIp/xXyONZhf+EaofJjE1jGPVVjse+Qgk 23jF6kEOu+HDaFZmHoM5lxAcQ05Semw7r4pNcpc30QE7xIQZdaB38H61RBXabDj7NcVR 15tBOHmd/iXpO5RUztx2Icx9zJotAqwAM31FihK/LLhxE/gJepxAg1NJ5vvORmnXWdew dEXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id dk20si10975563ejb.3.2019.09.11.02.28.02; Wed, 11 Sep 2019 02:28:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727476AbfIKJXx (ORCPT + 99 others); Wed, 11 Sep 2019 05:23:53 -0400 Received: from mx1.redhat.com ([209.132.183.28]:58154 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726928AbfIKJXx (ORCPT ); Wed, 11 Sep 2019 05:23:53 -0400 Received: from mail-qt1-f199.google.com (mail-qt1-f199.google.com [209.85.160.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 3F82E7BDD2 for ; Wed, 11 Sep 2019 09:23:52 +0000 (UTC) Received: by mail-qt1-f199.google.com with SMTP id f19so23119588qtq.1 for ; Wed, 11 Sep 2019 02:23:52 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=mYSD9hRnX/6v3ywsydqfkpFUdOIKRrBI76zwVnPyG4o=; b=N6G+isrkTJ01lXD9/zy+SfTf9d+sOHAyZokCSRI6ju6cQfLNJcC7/6B+PFaWNkrufO SXbzxjMiyQRSjMjie/7piWD0tLr93TpErcXFnV7RWQCZDDecVyzCorp7yqHYlrTujADa 9kD/jaOjghEaeHE01IVS2hXIGf1u+jaPgYG0O+xz4hYic61CrYQcgVYo3i3clnbTvU7S ZE/41SKgWZVCfPk2jEWEVuEihc9cCvTL6g+abl3A1WeI9DHxekM4AT/0d8leAO29Uoot J6MAMYWeWgKkvDIQpgUw3y+XdygoycSdS26lZSZJw0r6LUiUmGcebWZLeoG+KTJEfJxn u3pA== X-Gm-Message-State: APjAAAVhVjRhuj03ve2rjhvE0Ao5GUIOqBpGI2VTsyZ/p1DJzxRm6rmI ivQQe5xBoVeJ0niLMnigtoAfdNajRRJrCX7wxZkhZxs3TMhtJ0XESyZvZNmQDnjFIJOkgOvAEgt bYC+Ii++GpAvlHyP2aRlZVHZ6 X-Received: by 2002:a37:a503:: with SMTP id o3mr33610733qke.115.1568193831418; Wed, 11 Sep 2019 02:23:51 -0700 (PDT) X-Received: by 2002:a37:a503:: with SMTP id o3mr33610704qke.115.1568193831205; Wed, 11 Sep 2019 02:23:51 -0700 (PDT) Received: from redhat.com ([80.74.107.118]) by smtp.gmail.com with ESMTPSA id r13sm5657063qkm.48.2019.09.11.02.23.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Sep 2019 02:23:50 -0700 (PDT) Date: Wed, 11 Sep 2019 05:23:40 -0400 From: "Michael S. Tsirkin" To: David Hildenbrand Cc: "Dr. David Alan Gilbert" , Alexander Duyck , Michal Hocko , virtio-dev@lists.oasis-open.org, kvm list , Catalin Marinas , Dave Hansen , LKML , Matthew Wilcox , linux-mm , Andrew Morton , will@kernel.org, linux-arm-kernel@lists.infradead.org, Oscar Salvador , Yang Zhang , Pankaj Gupta , Konrad Rzeszutek Wilk , Nitesh Narayan Lal , Rik van Riel , lcapitulino@redhat.com, "Wang, Wei W" , Andrea Arcangeli , ying.huang@intel.com, Paolo Bonzini , Dan Williams , Fengguang Wu , Alexander Duyck , "Kirill A. Shutemov" Subject: Re: [virtio-dev] Re: [PATCH v9 0/8] stg mail -e --version=v9 \ Message-ID: <20190911051819-mutt-send-email-mst@kernel.org> References: <20190907172225.10910.34302.stgit@localhost.localdomain> <20190910124209.GY2063@dhcp22.suse.cz> <20190910144713.GF2063@dhcp22.suse.cz> <20190910161818.GF2797@work-vm> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 10, 2019 at 06:22:37PM +0200, David Hildenbrand wrote: > On 10.09.19 18:18, Dr. David Alan Gilbert wrote: > > * Alexander Duyck (alexander.duyck@gmail.com) wrote: > >> On Tue, Sep 10, 2019 at 7:47 AM Michal Hocko wrote: > >>> > >>> On Tue 10-09-19 07:42:43, Alexander Duyck wrote: > >>>> On Tue, Sep 10, 2019 at 5:42 AM Michal Hocko wrote: > >>>>> > >>>>> I wanted to review "mm: Introduce Reported pages" just realize that I > >>>>> have no clue on what is going on so returned to the cover and it didn't > >>>>> really help much. I am completely unfamiliar with virtio so please bear > >>>>> with me. > >>>>> > >>>>> On Sat 07-09-19 10:25:03, Alexander Duyck wrote: > >>>>> [...] > >>>>>> This series provides an asynchronous means of reporting to a hypervisor > >>>>>> that a guest page is no longer in use and can have the data associated > >>>>>> with it dropped. To do this I have implemented functionality that allows > >>>>>> for what I am referring to as unused page reporting > >>>>>> > >>>>>> The functionality for this is fairly simple. When enabled it will allocate > >>>>>> statistics to track the number of reported pages in a given free area. > >>>>>> When the number of free pages exceeds this value plus a high water value, > >>>>>> currently 32, it will begin performing page reporting which consists of > >>>>>> pulling pages off of free list and placing them into a scatter list. The > >>>>>> scatterlist is then given to the page reporting device and it will perform > >>>>>> the required action to make the pages "reported", in the case of > >>>>>> virtio-balloon this results in the pages being madvised as MADV_DONTNEED > >>>>>> and as such they are forced out of the guest. After this they are placed > >>>>>> back on the free list, > >>>>> > >>>>> And here I am reallly lost because "forced out of the guest" makes me > >>>>> feel that those pages are no longer usable by the guest. So how come you > >>>>> can add them back to the free list. I suspect understanding this part > >>>>> will allow me to understand why we have to mark those pages and prevent > >>>>> merging. > >>>> > >>>> Basically as the paragraph above mentions "forced out of the guest" > >>>> really is just the hypervisor calling MADV_DONTNEED on the page in > >>>> question. So the behavior is the same as any userspace application > >>>> that calls MADV_DONTNEED where the contents are no longer accessible > >>>> from userspace and attempting to access them will result in a fault > >>>> and the page being populated with a zero fill on-demand page, or a > >>>> copy of the file contents if the memory is file backed. > >>> > >>> As I've said I have no idea about virt so this doesn't really tell me > >>> much. Does that mean that if somebody allocates such a page and tries to > >>> access it then virt will handle a fault and bring it back? > >> > >> Actually I am probably describing too much as the MADV_DONTNEED is the > >> hypervisor behavior in response to the virtio-balloon notification. A > >> more thorough explanation of it can be found by just running "man > >> madvise", probably best just to leave it at that since I am probably > >> confusing things by describing hypervisor behavior in a kernel patch > >> set. > >> > >> For the most part all the page reporting really does is provide a way > >> to incrementally identify unused regions of memory in the buddy > >> allocator. That in turn is used by virtio-balloon in a polling thread > >> to report to the hypervisor what pages are not in use so that it can > >> make a decision on what to do with the pages now that it knows they > >> are unused. > >> > >> All this is providing is just a report and it is optional if the > >> hypervisor will act on it or not. If the hypervisor takes some sort of > >> action on the page, then the expectation is that the hypervisor will > >> use some sort of mechanism such as a page fault to discover when the > >> page is used again. > > > > OK, that's interestingly different (but OK) from some other schemes that > > hav ebeen described which *require* the guest to somehow indicate the > > page is in use before starting to use the page again. > > > > virtio-balloon also has a mode where the guest would not have to > indicate to the host before re-using a page. Only > VIRTIO_BALLOON_F_MUST_TELL_HOST enforces this. So it's not completely new. VIRTIO_BALLOON_F_MUST_TELL_HOST is a bit different. When it's not set, guest still must tell host about pages in use, it just can batch these notifications sending them possibly after page has been used. So even with VIRTIO_BALLOON_F_MUST_TELL_HOST off you don't skip the notification. From hypervisor point of view, this feature is very much like adding page to the balloon and immediately taking it out of the balloon again, just doing it in one operation. The main difference is the contents of the page, which matters with poisoning: in that case hypervisor is expected to hand back page with the poisoning content. Not so with regular deflate where page contents is undefined. Well and also the new interface is optimized for large chunks of memory since we'll likely be dealing with such. > > Dave > > > -- > > Thanks, > > David / dhildenb