ost...@goodmis.org> wrote:
> On Tue, 24 Apr 2018 16:45:05 -0400
> Steven Rostedt <rost...@goodmis.org> wrote:
> > On Tue, 24 Apr 2018 20:39:27 +
> > Wei Wang <w...@google.com> wrote:
> >
> > > The config is not something new and it is controlling pr_deb
:
> On Tue, 24 Apr 2018 16:45:05 -0400
> Steven Rostedt wrote:
> > On Tue, 24 Apr 2018 20:39:27 +0000
> > Wei Wang wrote:
> >
> > > The config is not something new and it is controlling pr_debug and
> > > pr_devel, so might not be too annoying, IMHO. But I
From: Wei Wang <w...@google.com>
Signed-off-by: Wei Wang <w...@google.com>
---
include/linux/kernel.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/linux/kernel.h b/include/linux/kernel.h
index 6a1eb0b0aad96..e37e40ff14bba 100644
--- a/include/linux/ke
From: Wei Wang
Signed-off-by: Wei Wang
---
include/linux/kernel.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/linux/kernel.h b/include/linux/kernel.h
index 6a1eb0b0aad96..e37e40ff14bba 100644
--- a/include/linux/kernel.h
+++ b/include/linux/kernel.h
@@ -664,7
On Tue, Apr 24, 2018, 12:26 Steven Rostedt <rost...@goodmis.org> wrote:
> On Tue, 24 Apr 2018 19:20:03 +0000
> Wei Wang <w...@google.com> wrote:
> > checkpatch.pl sounds good. One thing to add is we have many off tree
> > patches with abuse trace_printk
On Tue, Apr 24, 2018, 12:26 Steven Rostedt wrote:
> On Tue, 24 Apr 2018 19:20:03 +
> Wei Wang wrote:
> > checkpatch.pl sounds good. One thing to add is we have many off tree
> > patches with abuse trace_printk. Also as you mentioned, given this is
> > really n
, Apr 24, 2018 at 12:14 PM Steven Rostedt <rost...@goodmis.org> wrote:
> On Tue, 24 Apr 2018 19:02:34 +0000
> Wei Wang <w...@google.com> wrote:
> > We have seen many cases vendor have shipped kernel/drivers with it, and
> > have to clean up that every year. This
, Apr 24, 2018 at 12:14 PM Steven Rostedt wrote:
> On Tue, 24 Apr 2018 19:02:34 +
> Wei Wang wrote:
> > We have seen many cases vendor have shipped kernel/drivers with it, and
> > have to clean up that every year. This was brought up in an internal
> > discussion and
him "I think this change makes sense at a high level, but there could
be non-obvious reasons why this isn't the way things are handled right now."
On Tue, Apr 24, 2018 at 11:51 AM Steven Rostedt <rost...@goodmis.org> wrote:
> On Tue, 24 Apr 2018 11:08:10 -0700
> Wei Wang &
him "I think this change makes sense at a high level, but there could
be non-obvious reasons why this isn't the way things are handled right now."
On Tue, Apr 24, 2018 at 11:51 AM Steven Rostedt wrote:
> On Tue, 24 Apr 2018 11:08:10 -0700
> Wei Wang wrote:
> > From: Wei Wang
From: Wei Wang <w...@google.com>
trace_printk will cause trace_printk_init_buffers executed in kernel
start, which will increase memory and also show bad warnings in
production kernel.
Signed-off-by: Wei Wang <w...@google.com>
---
include/linux/kernel.h | 17 ++
From: Wei Wang
trace_printk will cause trace_printk_init_buffers executed in kernel
start, which will increase memory and also show bad warnings in
production kernel.
Signed-off-by: Wei Wang
---
include/linux/kernel.h | 17 +
include/linux/trace_events.h | 4
2
On 04/11/2018 07:25 AM, Michael S. Tsirkin wrote:
On Tue, Apr 10, 2018 at 01:54:29PM -0700, Andrew Morton wrote:
On Tue, 10 Apr 2018 21:19:31 +0300 "Michael S. Tsirkin" wrote:
Andrew, were your questions answered? If yes could I bother you for an ack on
this?
Still not
On 04/11/2018 07:25 AM, Michael S. Tsirkin wrote:
On Tue, Apr 10, 2018 at 01:54:29PM -0700, Andrew Morton wrote:
On Tue, 10 Apr 2018 21:19:31 +0300 "Michael S. Tsirkin" wrote:
Andrew, were your questions answered? If yes could I bother you for an ack on
this?
Still not very happy that
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Sign
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michael S
stack to have simpler
implementation;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, please reference
https://lwn.net/Articles/743660/
Wei Wang (4):
mm: suppo
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Suggested-by: Michael S. Tsirkin <m...@r
stack to have simpler
implementation;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, please reference
https://lwn.net/Articles/743660/
Wei Wang (4):
mm: suppo
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang
Suggested-by: Michael S. Tsirkin
Cc: Michael S. Tsirkin
Cc: Michal
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Cc: Andrew Morton <a...@linux-foundation.org>
Cc: Micha
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang
Cc: Andrew Morton
Cc: Michal Hocko
Cc: Michael S. Tsirkin
Acked-by: Andrew Morton
---
mm
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Signed-off-by: Liang Li <liang.z...@intel.com>
Cc: Michal Hocko <mho...@kernel.org&
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michal Hocko
Cc: Andrew Morton
Cc: Michael S. Tsirkin
Acked-by: Michal Hocko
---
include/li
On 04/09/2018 02:03 PM, Michael S. Tsirkin wrote:
On Fri, Apr 06, 2018 at 08:17:23PM +0800, Wei Wang wrote:
Negotiation of the VIRTIO_BALLOON_F_FREE_PAGE_HINT feature indicates the
support of reporting hints of guest free pages to host via virtio-balloon.
Host requests the guest to report free
On 04/09/2018 02:03 PM, Michael S. Tsirkin wrote:
On Fri, Apr 06, 2018 at 08:17:23PM +0800, Wei Wang wrote:
Negotiation of the VIRTIO_BALLOON_F_FREE_PAGE_HINT feature indicates the
support of reporting hints of guest free pages to host via virtio-balloon.
Host requests the guest to report free
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Signed-off-by: Liang Li <liang.z...@intel.com>
Cc: Michal Hocko <mho...@kernel.org&
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Suggested-by: Michael S. Tsirkin <m...@r
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michal Hocko
Cc: Andrew Morton
Cc: Michael S. Tsirkin
Acked-by: Michal Hocko
---
include/li
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang
Suggested-by: Michael S. Tsirkin
Cc: Michael S. Tsirkin
Cc: Michal
ss this flag check later;
- init_vqs: change to put some variables on stack to have simpler
implementation;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, plea
ss this flag check later;
- init_vqs: change to put some variables on stack to have simpler
implementation;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, plea
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Sign
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michael S
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Cc: Andrew Morton <a...@linux-foundation.org>
Cc: Micha
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang
Cc: Andrew Morton
Cc: Michal Hocko
Cc: Michael S. Tsirkin
Acked-by: Andrew Morton
---
mm
On 04/04/2018 02:47 AM, Michael S. Tsirkin wrote:
On Wed, Apr 04, 2018 at 12:10:03AM +0800, Wei Wang wrote:
+static int add_one_sg(struct virtqueue *vq, unsigned long pfn, uint32_t len)
+{
+ struct scatterlist sg;
+ unsigned int unused;
+
+ sg_init_table(, 1
On 04/04/2018 02:47 AM, Michael S. Tsirkin wrote:
On Wed, Apr 04, 2018 at 12:10:03AM +0800, Wei Wang wrote:
+static int add_one_sg(struct virtqueue *vq, unsigned long pfn, uint32_t len)
+{
+ struct scatterlist sg;
+ unsigned int unused;
+
+ sg_init_table(, 1
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Signed-off-by: Liang Li <liang.z...@intel.com>
Cc: Michal Hocko <mho...@kernel.org&
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michal Hocko
Cc: Andrew Morton
Cc: Michael S. Tsirkin
Acked-by: Michal Hocko
---
include/li
t_vqs: change to put some variables on stack to have simpler
implementation;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, please reference
https:/
t_vqs: change to put some variables on stack to have simpler
implementation;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, please reference
https:/
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Sign
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Suggested-by: Michael S. Tsirkin <m...@r
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Cc: Andrew Morton <a...@linux-foundation.org>
Cc: Micha
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michael S
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang
Suggested-by: Michael S. Tsirkin
Cc: Michael S. Tsirkin
Cc: Michal
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang
Cc: Andrew Morton
Cc: Michal Hocko
Cc: Michael S. Tsirkin
Acked-by: Andrew Morton
---
mm
On 03/27/2018 05:22 AM, Andrew Morton wrote:
On Mon, 26 Mar 2018 10:39:51 +0800 Wei Wang <wei.w.w...@intel.com> wrote:
This patch adds support to walk through the free page blocks in the
system and report them via a callback function. Some page blocks may
leave the free list after zone
On 03/27/2018 05:22 AM, Andrew Morton wrote:
On Mon, 26 Mar 2018 10:39:51 +0800 Wei Wang wrote:
This patch adds support to walk through the free page blocks in the
system and report them via a callback function. Some page blocks may
leave the free list after zone->lock is released,
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Suggested-by: Michael S. Tsirkin <m...@r
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang
Suggested-by: Michael S. Tsirkin
Cc: Michael S. Tsirkin
Cc: Michal
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Signed-off-by: Liang Li <liang.z...@intel.com>
Cc: Michal Hocko <mho...@kernel.org>
C
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Cc: Andrew Morton <a...@linux-foundation.org>
Cc: Micha
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michal Hocko
Cc: Michael S. Tsirkin
Acked-by: Michal Hocko
---
include/linux/mm.h | 6
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang
Cc: Andrew Morton
Cc: Michal Hocko
Cc: Michael S. Tsirkin
---
mm/page_poison.c | 6 ++
1 file
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Sign
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michael S
tion;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, please reference
https://lwn.net/Articles/743660/
Wei Wang (4):
mm: support reporting free page blocks
tion;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, please reference
https://lwn.net/Articles/743660/
Wei Wang (4):
mm: support reporting free page blocks
On Sun, Mar 18, 2018 at 7:37 PM Huang, Ying <ying.hu...@intel.com> wrote:
> Wei Wang <w...@google.com> writes:
> > Android devices boot time benefits by bigger readahead window setting
from
> > init. This patch will make readahead window a config so early boot ca
On Sun, Mar 18, 2018 at 7:37 PM Huang, Ying wrote:
> Wei Wang writes:
> > Android devices boot time benefits by bigger readahead window setting
from
> > init. This patch will make readahead window a config so early boot can
> > benefit by it as well.
> Can you change
On Fri, Mar 16, 2018 at 2:59 PM Andrew Morton <a...@linux-foundation.org>
wrote:
> On Fri, 16 Mar 2018 21:51:48 + Wei Wang <wei.vince.w...@gmail.com>
wrote:
> > On Fri, Mar 16, 2018, 14:33 Andrew Morton <a...@linux-foundation.org>
wrote:
> >
> > > O
On Fri, Mar 16, 2018 at 2:59 PM Andrew Morton
wrote:
> On Fri, 16 Mar 2018 21:51:48 +0000 Wei Wang
wrote:
> > On Fri, Mar 16, 2018, 14:33 Andrew Morton
wrote:
> >
> > > On Fri, 16 Mar 2018 11:25:08 -0700 Wei Wang wrote:
> > >
> > > > Change
From: Wei Wang <w...@google.com>
Change VM_MAX_READAHEAD value from the default 128KB to a configurable
value. This will allow the readahead window to grow to a maximum size
bigger than 128KB during boot, which could benefit to sequential read
throughput and thus boot performance.
Sign
From: Wei Wang
Change VM_MAX_READAHEAD value from the default 128KB to a configurable
value. This will allow the readahead window to grow to a maximum size
bigger than 128KB during boot, which could benefit to sequential read
throughput and thus boot performance.
Signed-off-by: Wei Wang
On 02/13/2018 06:16 PM, Michal Hocko wrote:
On Fri 09-02-18 16:08:14, Wei Wang wrote:
The PAGE_POISON macro is used in page_poison.c only, so avoid exporting
it. Also remove the "mm/debug-pagealloc.c" related comment, which is
obsolete.
Why is this an improvement? I thought the w
On 02/13/2018 06:16 PM, Michal Hocko wrote:
On Fri 09-02-18 16:08:14, Wei Wang wrote:
The PAGE_POISON macro is used in page_poison.c only, so avoid exporting
it. Also remove the "mm/debug-pagealloc.c" related comment, which is
obsolete.
Why is this an improvement? I thought the w
On 02/09/2018 11:14 AM, Michael S. Tsirkin wrote:
On Fri, Feb 09, 2018 at 11:11:39AM +0800, Wei Wang wrote:
On 02/09/2018 03:55 AM, Michael S. Tsirkin wrote:
On Thu, Feb 08, 2018 at 05:50:16PM +0800, Wei Wang wrote:
Details:
Set up a Ping-Pong local live migration, where the guest ceaselessy
On 02/09/2018 11:14 AM, Michael S. Tsirkin wrote:
On Fri, Feb 09, 2018 at 11:11:39AM +0800, Wei Wang wrote:
On 02/09/2018 03:55 AM, Michael S. Tsirkin wrote:
On Thu, Feb 08, 2018 at 05:50:16PM +0800, Wei Wang wrote:
Details:
Set up a Ping-Pong local live migration, where the guest ceaselessy
The PAGE_POISON macro is used in page_poison.c only, so avoid exporting
it. Also remove the "mm/debug-pagealloc.c" related comment, which is
obsolete.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Cc: Andrew Morton <a...@linux-foundation.org>
Cc: Michal Hocko <mho...@
The PAGE_POISON macro is used in page_poison.c only, so avoid exporting
it. Also remove the "mm/debug-pagealloc.c" related comment, which is
obsolete.
Signed-off-by: Wei Wang
Cc: Andrew Morton
Cc: Michal Hocko
Cc: Michael S. Tsirkin
---
include/linux/poison.h | 7 ---
mm/pag
On 02/09/2018 03:55 AM, Michael S. Tsirkin wrote:
On Thu, Feb 08, 2018 at 05:50:16PM +0800, Wei Wang wrote:
Details:
Set up a Ping-Pong local live migration, where the guest ceaselessy
migrates between the source and destination. Linux compilation,
i.e. make bzImage -j4, is performed during
On 02/09/2018 03:55 AM, Michael S. Tsirkin wrote:
On Thu, Feb 08, 2018 at 05:50:16PM +0800, Wei Wang wrote:
Details:
Set up a Ping-Pong local live migration, where the guest ceaselessy
migrates between the source and destination. Linux compilation,
i.e. make bzImage -j4, is performed during
Move the PAGE_POISON value to page_poison.c and add a function to enable
callers from a kernel module to get the poison value if the page poisoning
feature is in use. This also avoids callers directly checking PAGE_POISON
regardless of whether the feature is enabled.
Signed-off-by: Wei Wang
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Suggested-by: Michael S. Tsirkin <m...@r
Move the PAGE_POISON value to page_poison.c and add a function to enable
callers from a kernel module to get the poison value if the page poisoning
feature is in use. This also avoids callers directly checking PAGE_POISON
regardless of whether the feature is enabled.
Signed-off-by: Wei Wang
Cc
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang
Suggested-by: Michael S. Tsirkin
Cc: Michael S. Tsirkin
Cc: Michal
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Sign
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michael S
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Signed-off-by: Liang Li <liang.z...@intel.com>
Cc: Michal Hocko <mho...@kernel.org>
C
t;balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, please reference
https://lwn.net/Articles/743660/
Wei Wang (4):
mm: support reporting free page blocks
virtio-balloon: VIRTIO_BALLOON_F_FREE_PAGE_HINT
mm/p
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michal Hocko
Cc: Michael S. Tsirkin
Acked-by: Michal Hocko
---
include/linux/mm.h | 6
t;balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog, please reference
https://lwn.net/Articles/743660/
Wei Wang (4):
mm: support reporting free page blocks
virtio-balloon: VIRTIO_BALLOON_F_FREE_PAGE_HINT
mm/p
On 02/08/2018 02:34 AM, Michael S. Tsirkin wrote:
On Wed, Feb 07, 2018 at 02:54:30PM +0800, Wei Wang wrote:
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off
On 02/08/2018 02:34 AM, Michael S. Tsirkin wrote:
On Wed, Feb 07, 2018 at 02:54:30PM +0800, Wei Wang wrote:
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off
On 02/07/2018 12:34 PM, Michael S. Tsirkin wrote:
On Wed, Feb 07, 2018 at 11:01:06AM +0800, Wei Wang wrote:
Negotiation of the VIRTIO_BALLOON_F_FREE_PAGE_HINT feature indicates the
support of reporting hints of guest free pages to host via virtio-balloon.
Host requests the guest to report free
On 02/07/2018 12:34 PM, Michael S. Tsirkin wrote:
On Wed, Feb 07, 2018 at 11:01:06AM +0800, Wei Wang wrote:
Negotiation of the VIRTIO_BALLOON_F_FREE_PAGE_HINT feature indicates the
support of reporting hints of guest free pages to host via virtio-balloon.
Host requests the guest to report free
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Sign
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michael S
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Suggested-by: Michael S. Tsirkin <m...@r
The VIRTIO_BALLOON_F_PAGE_POISON feature bit is used to indicate if the
guest is using page poisoning. Guest writes to the poison_val config
field to tell host about the page poisoning value in use.
Signed-off-by: Wei Wang
Suggested-by: Michael S. Tsirkin
Cc: Michael S. Tsirkin
Cc: Michal
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Cc: Andrew Morton <a...@linux-foundation.org>
Cc: Micha
In some usages, e.g. virtio-balloon, a kernel module needs to know if
page poisoning is in use. This patch exposes the page_poisoning_enabled
function to kernel modules.
Signed-off-by: Wei Wang
Cc: Andrew Morton
Cc: Michal Hocko
Cc: Michael S. Tsirkin
---
mm/page_poison.c | 6 ++
1 file
iscuss this flag check later;
- init_vqs: change to put some variables on stack to have simpler
implementation;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Signed-off-by: Liang Li <liang.z...@intel.com>
Cc: Michal Hocko <mho...@kernel.org>
C
iscuss this flag check later;
- init_vqs: change to put some variables on stack to have simpler
implementation;
- add destroy_workqueue(vb->balloon_wq);
v21->v22:
- add_one_sg: some code and comment re-arrangement
- send_cmd_id: handle a cornercase
For previous ChangeLog
ges but are written after the report function
returns will be captured by the hypervisor, and they will be added to the
next round of memory transfer.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michal Hocko
Cc: Michael S. Tsirkin
Acked-by: Michal Hocko
---
include/linux/mm.h | 6
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang <wei.w.w...@intel.com>
Sign
sending the starting cmd id, so the guest doesn't need to
kick after filling an element to the vq.
Host may also requests the guest to stop the reporting in advance by
sending the stop cmd id to the guest via the configuration register.
Signed-off-by: Wei Wang
Signed-off-by: Liang Li
Cc: Michael S
301 - 400 of 1020 matches
Mail list logo