This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


Re: [Xen-devel] [PATCH] Make "xm mem-set" be lower bound ondomX-min-mem

To: "Puthiyaparambil, Aravindh" <aravindh.puthiyaparambil@xxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH] Make "xm mem-set" be lower bound ondomX-min-mem
From: Keir Fraser <Keir.Fraser@xxxxxxxxxxxx>
Date: Sat, 20 May 2006 16:27:00 +0100
Cc: Ky Srinivasan <ksrinivasan@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Sat, 20 May 2006 08:32:06 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <EF8D308BE33AF54D8934DF26520252D30484B6FC@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <EF8D308BE33AF54D8934DF26520252D30484B6FC@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx

On 20 May 2006, at 16:14, Puthiyaparambil, Aravindh wrote:

In lieu of the recent emails about ballooning, do you still want me to
look into making the balloon driver back off when it goes down the OOM
path? Or is it better for that too to be taken care of by some of the
higher level management tools?

The OS itself can tell best whether a given memory target is too restrictive and will cause major problems. So hooking off the OOM paths does make sense. The "2% test" is a suitable static check for now -- it might make sense to keep it even when we do have a more dynamic detection and backoff method. These in-kernel checks can complement safety catches in higher-level management tools which might stop a user from e.g. setting a target that is too low for Linux and prevent that target from ever being passed to the guest.

 -- Keir

Xen-devel mailing list