From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6A52DECDE28 for ; Wed, 11 Sep 2019 09:23:57 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 409EF2089F for ; Wed, 11 Sep 2019 09:23:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727138AbfIKJXx (ORCPT ); Wed, 11 Sep 2019 05:23:53 -0400 Received: from mx1.redhat.com ([209.132.183.28]:56984 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726911AbfIKJXx (ORCPT ); Wed, 11 Sep 2019 05:23:53 -0400 Received: from mail-qt1-f200.google.com (mail-qt1-f200.google.com [209.85.160.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 3857A11A24 for ; Wed, 11 Sep 2019 09:23:52 +0000 (UTC) Received: by mail-qt1-f200.google.com with SMTP id o13so17473734qtr.15 for ; Wed, 11 Sep 2019 02:23:52 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=mYSD9hRnX/6v3ywsydqfkpFUdOIKRrBI76zwVnPyG4o=; b=eTVRPIEF1k7xz8M0/Fjjjo8s5usKFhmR6RhRFs1VXFIUCGakKLKpkbktD1vQiTu/bq OHAZ8bkuAhG8bN8tRxqfuEJBGs2e+0yaM9S9II09Zfqsg+zlkTTsUqLQTT1yQxyZ/h5X V7b6ZE9MV+grrRhg10a3sQz6rrbuulDYpO5nZ+Q0AYBizRAGIi2wEwWn53PUx3y9s9KH YDQa64E12SqcNQhYxOySCRmH9iYOLYz8OiMC3N2Z5H5yk2luwail2PtEB5q0lWDvfhD3 ghY6Q5E0wrOSuWiRmXOMdzipoFm7pUIg7P/fbDYYVaENh0i5J2AAGsXhGAvnWJIGHB3w j6nw== X-Gm-Message-State: APjAAAWDfUlyrqHU9hE8/6AT+V93mNz5CuYsAEvlWH1oHJy+UP8QO0BW WZY9BleyEeYFF4NaSUHhJjlGc50Z3168SAyeyRu9XNtLOLX/7v5eW6HDdpECBUAr+1zGc4EDQV5 cXpKfGztzbxQW X-Received: by 2002:a37:a503:: with SMTP id o3mr33610734qke.115.1568193831418; Wed, 11 Sep 2019 02:23:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqz8QR5cKcd/uXRYlQ318mPxE6jSP+97aQIMCCQ/RUZeDP873f/PJ5B1bFEAkiTG92ijMAd8cg== X-Received: by 2002:a37:a503:: with SMTP id o3mr33610704qke.115.1568193831205; Wed, 11 Sep 2019 02:23:51 -0700 (PDT) Received: from redhat.com ([80.74.107.118]) by smtp.gmail.com with ESMTPSA id r13sm5657063qkm.48.2019.09.11.02.23.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Sep 2019 02:23:50 -0700 (PDT) Date: Wed, 11 Sep 2019 05:23:40 -0400 From: "Michael S. Tsirkin" To: David Hildenbrand Cc: "Dr. David Alan Gilbert" , Alexander Duyck , Michal Hocko , virtio-dev@lists.oasis-open.org, kvm list , Catalin Marinas , Dave Hansen , LKML , Matthew Wilcox , linux-mm , Andrew Morton , will@kernel.org, linux-arm-kernel@lists.infradead.org, Oscar Salvador , Yang Zhang , Pankaj Gupta , Konrad Rzeszutek Wilk , Nitesh Narayan Lal , Rik van Riel , lcapitulino@redhat.com, "Wang, Wei W" , Andrea Arcangeli , ying.huang@intel.com, Paolo Bonzini , Dan Williams , Fengguang Wu , Alexander Duyck , "Kirill A. Shutemov" Subject: Re: [virtio-dev] Re: [PATCH v9 0/8] stg mail -e --version=v9 \ Message-ID: <20190911051819-mutt-send-email-mst@kernel.org> References: <20190907172225.10910.34302.stgit@localhost.localdomain> <20190910124209.GY2063@dhcp22.suse.cz> <20190910144713.GF2063@dhcp22.suse.cz> <20190910161818.GF2797@work-vm> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org On Tue, Sep 10, 2019 at 06:22:37PM +0200, David Hildenbrand wrote: > On 10.09.19 18:18, Dr. David Alan Gilbert wrote: > > * Alexander Duyck (alexander.duyck@gmail.com) wrote: > >> On Tue, Sep 10, 2019 at 7:47 AM Michal Hocko wrote: > >>> > >>> On Tue 10-09-19 07:42:43, Alexander Duyck wrote: > >>>> On Tue, Sep 10, 2019 at 5:42 AM Michal Hocko wrote: > >>>>> > >>>>> I wanted to review "mm: Introduce Reported pages" just realize that I > >>>>> have no clue on what is going on so returned to the cover and it didn't > >>>>> really help much. I am completely unfamiliar with virtio so please bear > >>>>> with me. > >>>>> > >>>>> On Sat 07-09-19 10:25:03, Alexander Duyck wrote: > >>>>> [...] > >>>>>> This series provides an asynchronous means of reporting to a hypervisor > >>>>>> that a guest page is no longer in use and can have the data associated > >>>>>> with it dropped. To do this I have implemented functionality that allows > >>>>>> for what I am referring to as unused page reporting > >>>>>> > >>>>>> The functionality for this is fairly simple. When enabled it will allocate > >>>>>> statistics to track the number of reported pages in a given free area. > >>>>>> When the number of free pages exceeds this value plus a high water value, > >>>>>> currently 32, it will begin performing page reporting which consists of > >>>>>> pulling pages off of free list and placing them into a scatter list. The > >>>>>> scatterlist is then given to the page reporting device and it will perform > >>>>>> the required action to make the pages "reported", in the case of > >>>>>> virtio-balloon this results in the pages being madvised as MADV_DONTNEED > >>>>>> and as such they are forced out of the guest. After this they are placed > >>>>>> back on the free list, > >>>>> > >>>>> And here I am reallly lost because "forced out of the guest" makes me > >>>>> feel that those pages are no longer usable by the guest. So how come you > >>>>> can add them back to the free list. I suspect understanding this part > >>>>> will allow me to understand why we have to mark those pages and prevent > >>>>> merging. > >>>> > >>>> Basically as the paragraph above mentions "forced out of the guest" > >>>> really is just the hypervisor calling MADV_DONTNEED on the page in > >>>> question. So the behavior is the same as any userspace application > >>>> that calls MADV_DONTNEED where the contents are no longer accessible > >>>> from userspace and attempting to access them will result in a fault > >>>> and the page being populated with a zero fill on-demand page, or a > >>>> copy of the file contents if the memory is file backed. > >>> > >>> As I've said I have no idea about virt so this doesn't really tell me > >>> much. Does that mean that if somebody allocates such a page and tries to > >>> access it then virt will handle a fault and bring it back? > >> > >> Actually I am probably describing too much as the MADV_DONTNEED is the > >> hypervisor behavior in response to the virtio-balloon notification. A > >> more thorough explanation of it can be found by just running "man > >> madvise", probably best just to leave it at that since I am probably > >> confusing things by describing hypervisor behavior in a kernel patch > >> set. > >> > >> For the most part all the page reporting really does is provide a way > >> to incrementally identify unused regions of memory in the buddy > >> allocator. That in turn is used by virtio-balloon in a polling thread > >> to report to the hypervisor what pages are not in use so that it can > >> make a decision on what to do with the pages now that it knows they > >> are unused. > >> > >> All this is providing is just a report and it is optional if the > >> hypervisor will act on it or not. If the hypervisor takes some sort of > >> action on the page, then the expectation is that the hypervisor will > >> use some sort of mechanism such as a page fault to discover when the > >> page is used again. > > > > OK, that's interestingly different (but OK) from some other schemes that > > hav ebeen described which *require* the guest to somehow indicate the > > page is in use before starting to use the page again. > > > > virtio-balloon also has a mode where the guest would not have to > indicate to the host before re-using a page. Only > VIRTIO_BALLOON_F_MUST_TELL_HOST enforces this. So it's not completely new. VIRTIO_BALLOON_F_MUST_TELL_HOST is a bit different. When it's not set, guest still must tell host about pages in use, it just can batch these notifications sending them possibly after page has been used. So even with VIRTIO_BALLOON_F_MUST_TELL_HOST off you don't skip the notification. >From hypervisor point of view, this feature is very much like adding page to the balloon and immediately taking it out of the balloon again, just doing it in one operation. The main difference is the contents of the page, which matters with poisoning: in that case hypervisor is expected to hand back page with the poisoning content. Not so with regular deflate where page contents is undefined. Well and also the new interface is optimized for large chunks of memory since we'll likely be dealing with such. > > Dave > > > -- > > Thanks, > > David / dhildenb