Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3891498ybl; Mon, 9 Dec 2019 01:44:59 -0800 (PST) X-Google-Smtp-Source: APXvYqwMt/se4HoBAHFuaDYXIGbx0ul8KJGd2DWzC6l9x5uBOlVUj7m8ic0h7UvurFv+E3umN8Yu X-Received: by 2002:a05:6808:14d:: with SMTP id h13mr24160340oie.58.1575884699280; Mon, 09 Dec 2019 01:44:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575884699; cv=none; d=google.com; s=arc-20160816; b=SjKa0L+BeGrcYLao92/Pi+csqzG8eXCWgkwDr0A/9VYEhk/xtheTdiosu5CI6Vv4x0 XSUpNmnvU4vi8/CeNLxvgwcQ9lXJfPqNRvu8zgsLU+xO6OjGrbG2k8za9OcY4d3O7iXP g4QiQzelWcFfvNUn7owxDvCUcQUK5krue6Cp0NF4lrCigQ2xzjDdQCn+XVovKdRN6sRp 2GCUt4sc6gQ1Lf5wxkt//dx8cb+JNuZBteeUPJuz3LB4A5PVsTdnjlIF9PWeTDDAM8m6 cohywax87o7q3p3J+2f+0sCqu52FARL/HDF0F3wXe3Ld9IYuv/FQruOCPWQd3srERvKv wXfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=wEx8DxEEneTrL1ygpDLbj8KnPCQgR/FP6RxAQvau8nw=; b=ldwrPqWWNbp2JBnSN53xwomY7P1GQUcqYrn5tsXO0ctkBj+Elyl3tiJTLe70KdtQs4 Fvb+YA3GUrbHPUaO3+blMMeMY3t7jukgYfg/oNCei6iP9qur8UYw86T3PO2OWF58ZDaK Q8IN83c+5b5OYt1b0ENBGKlIBcnJa+PzeI3gmGUFoItIza7AXgohaZHhtwGIWZM5Vtpz mjum+IWzjn1Ooa9otafU5HZWw1pEiZVVRg33iisym/knJw1UXt+hKnqdNi0c7/vnSpHj GEgPYu8qmugNv9gmvW3AhK6n6wFeWucOYdzgTTqxmTqjpWOGH5jdLRBEaB4ExE4zkbD7 KQxg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t8si12325292otq.59.2019.12.09.01.44.48; Mon, 09 Dec 2019 01:44:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727572AbfLIJjG (ORCPT + 99 others); Mon, 9 Dec 2019 04:39:06 -0500 Received: from mx2.suse.de ([195.135.220.15]:43186 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727388AbfLIJjG (ORCPT ); Mon, 9 Dec 2019 04:39:06 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 3F59BB1A3; Mon, 9 Dec 2019 09:39:04 +0000 (UTC) Subject: Re: [PATCH v3 0/1] xen/blkback: Squeeze page pools if a memory pressure To: SeongJae Park , axboe@kernel.dk, konrad.wilk@oracle.com, roger.pau@citrix.com Cc: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, pdurrant@amazon.com, sj38.park@gmail.com, xen-devel@lists.xenproject.org References: <20191209085839.21215-1-sjpark@amazon.com> From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= Message-ID: <954f7beb-9d40-253e-260b-4750809bf808@suse.com> Date: Mon, 9 Dec 2019 10:39:02 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.1 MIME-Version: 1.0 In-Reply-To: <20191209085839.21215-1-sjpark@amazon.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09.12.19 09:58, SeongJae Park wrote: > Each `blkif` has a free pages pool for the grant mapping. The size of > the pool starts from zero and be increased on demand while processing > the I/O requests. If current I/O requests handling is finished or 100 > milliseconds has passed since last I/O requests handling, it checks and > shrinks the pool to not exceed the size limit, `max_buffer_pages`. > > Therefore, `blkfront` running guests can cause a memory pressure in the > `blkback` running guest by attaching a large number of block devices and > inducing I/O. I'm having problems to understand how a guest can attach a large number of block devices without those having been configured by the host admin before. If those devices have been configured, dom0 should be ready for that number of devices, e.g. by having enough spare memory area for ballooned pages. So either I'm missing something here or your reasoning for the need of the patch is wrong. Juergen