On 10/19/22 12:53, Konstantin Khlebnikov wrote:
On Wed, 19 Oct 2022 at 12:57, Alexander Atanasov
wrote:
Currently balloon drivers (Virtio,XEN, HyperV, VMWare, ...)
inflate and deflate the guest memory size but there is no
way to know how much the memory size is changed by them.
On 26.07.2022 16:45, Michael S. Tsirkin wrote:
On Mon, Jul 25, 2022 at 11:27:53PM +0300, Andrey Zhadchenko wrote:
Although QEMU virtio is quite fast, there is still some room for
improvements. Disk latency can be reduced if we handle virito-blk requests
in host kernel istead of passing them to Q
ell, this has been broken since the statistics code
> was originally added in 2.6.34.
>
> Fixes: 9564e138b1f6 ("virtio: Add memory statistics reporting to the balloon
> driver (V4)")
> Signed-off-by: Arnd Bergmann
Reviewed-by: Denis V. Lunev
> ---
> drivers/virti
on size check at the end of the probe to match
original behaviour.
Signed-off-by: Konstantin Neumoin
Signed-off-by: Denis V. Lunev
CC: Michael S. Tsirkin
---
drivers/virtio/virtio_balloon.c | 2 ++
1 file changed, 2 insertions(+)
Changes from v1:
- fixed description
- removed update_balloon_siz
checked the condition before start waiting and started balloon operations
if necessary.
Right now balloon is not inflated if ballon target is set before the
driver is loaded.
Signed-off-by: Konstantin Neumoin
Signed-off-by: Denis V. Lunev
CC: "Michael S. Tsirkin"
---
drivers/virtio/virtio
: Konstantin Neumoin
Signed-off-by: Denis V. Lunev
CC: Michael S. Tsirkin
---
drivers/virtio/virtio_balloon.c | 15 +++
1 file changed, 15 insertions(+)
diff --git a/drivers/virtio/virtio_balloon.c b/drivers/virtio/virtio_balloon.c
index 4e7003d..253bf05 100644
--- a/drivers/virtio
than taken, and raise a "BUG" in balloon_page_dequeue when page list
will be empty.
So, the simplest solution would be to check that the number of releases
pages is less or equal to the number taken pages.
Signed-off-by: Konstantin Neumoin
Signed-off-by: Denis V. Lunev
CC: Michael
On 02/23/2016 06:53 PM, Michael S. Tsirkin wrote:
On Tue, Feb 23, 2016 at 06:26:47PM +0300, Denis V. Lunev wrote:
On 02/23/2016 06:10 PM, Michael S. Tsirkin wrote:
On Tue, Feb 16, 2016 at 06:50:52PM +0300, Denis V. Lunev wrote:
From: Igor Redko
Add a new field, VIRTIO_BALLOON_S_AVAIL, to
On 02/23/2016 06:10 PM, Michael S. Tsirkin wrote:
On Tue, Feb 16, 2016 at 06:50:52PM +0300, Denis V. Lunev wrote:
From: Igor Redko
Add a new field, VIRTIO_BALLOON_S_AVAIL, to virtio_balloon memory
statistics protocol, corresponding to 'Available' in /proc/meminfo.
It indica
patch).
Signed-off-by: Igor Redko
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Michael S. Tsirkin
CC: Andrew Morton
---
fs/proc/meminfo.c | 31 +--
include/linux/mm.h | 1 +
mm/page_alloc.c| 43 +++
3
Igor Redko
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Michael S. Tsirkin
CC: Andrew Morton
---
drivers/virtio/virtio_balloon.c | 6 ++
include/uapi/linux/virtio_balloon.h | 3 ++-
2 files changed, 8 insertions(+), 1 deletion(-)
diff --git a/drivers/virtio/virtio_balloon.c
hestration software to improve memory management
of different VMs under overcommit.
Signed-off-by: Igor Redko
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Michael S. Tsirkin
CC: Andrew Morton
Igor Redko (2):
calculate 'available' memory in the separate function
vi
setup SINT's routing
* inject SINT's into destination vCPU by 'hyperv-synic-test-device'
* wait for SINT's isr's completion
* clear Hyper-V SynIC evt/msg pages and destroy SINT's routing
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V
On 10/26/2015 01:03 PM, Peter Maydell wrote:
On 26 October 2015 at 09:50, Andrey Smetanin wrote:
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "K. Y. Srinivasan"
CC: Gleb Natapov
CC: Paolo Bonzini
CC: Roman
From: Andrey Smetanin
A new vcpu exit is introduced to notify the userspace of the
changes in Hyper-V SynIC configuration triggered by guest writing to the
corresponding MSRs.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: &q
gured SINT, and irq_routing api is extended to support GSI-SINT
mapping.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "K. Y. Srinivasan"
CC: Gleb Natapov
CC: Paolo Bonzini
Changes v2:
* do not use posted interrupts
From: Andrey Smetanin
Moved Hyper-V synic contants from guest Hyper-V drivers private
header into x86 arch uapi Hyper-V header.
Added Hyper-V synic msr's flags into x86 arch uapi Hyper-V header.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: V
y may need to cause vmexits too.
To achieve that, introduce a new bitmap dedicated specifically for
ioapic-handled vectors, and populate EOI exit bitmap from it for now.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "K. Y.
From: Andrey Smetanin
Any other irq routing types (MSI, S390_ADAPTER, upcoming Hyper-V
SynIC) map one-to-one to GSI.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "K. Y. Srinivasan"
CC: Gleb Natapov
CC: Pao
pdate mappings for arch-specific irq routing entries
(in particular, the upcoming Hyper-V synthetic interrupts).
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "K. Y. Srinivasan"
CC: Gleb Natapov
CC: Paolo Bonzini
--
From: Andrey Smetanin
Factor out kvm_notify_acked_gsi() helper to iterate over EOI listeners
and notify those matching the given gsi.
It will be reused in the upcoming Hyper-V SynIC implementation.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC
: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "K. Y. Srinivasan"
CC: Gleb Natapov
CC: Paolo Bonzini
---
include/linux/kvm_host.h | 4
virt/kvm/eventfd.c | 13 -
2 files changed, 16 insertions(+), 1 deletio
From: Andrey Smetanin
The loop(for) inside irqfd_update() is unnecessary
because any other value for irq_entry.type will just trigger
schedule_work(&irqfd->inject).
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC
writing to the
corresponding MSRs.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "K. Y. Srinivasan"
CC: Gleb Natapov
CC: Paolo Bonzini
Changes v2:
* irqchip/eventfd preparation improvements to support
arch specific r
On 10/12/2015 04:42 PM, Eric Blake wrote:
On 10/09/2015 07:39 AM, Denis V. Lunev wrote:
From: Andrey Smetanin
A new vcpu exit is introduced to notify the userspace of the
changes in Hyper-V synic configuraion triggered by guest writing to the
s/configuraion/configuration/
Is 'synic'
writing to the
corresponding MSRs.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "K. Y. Srinivasan"
CC: Gleb Natapov
CC: Paolo Bonzini
___
Virtualization mailing list
V
From: Andrey Smetanin
A new vcpu exit is introduced to notify the userspace of the
changes in Hyper-V synic configuraion triggered by guest writing to the
corresponding MSRs.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "
is extended to support GSI-SINT
mapping.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
Signed-off-by: Denis V. Lunev
CC: Vitaly Kuznetsov
CC: "K. Y. Srinivasan"
CC: Gleb Natapov
CC: Paolo Bonzini
---
arch/powerpc/kvm/mpic.c | 18 +++
arch/s390/kvm/interrupt.c
On 08/20/2015 12:49 AM, Denis V. Lunev wrote:
Though there is a problem in this setup. The end-user and hosting provider
have signed SLA agreement in which some amount of memory is guaranted for
the guest. The good thing is that this memory will be given to the guest
when the guest will really
-by: Denis V. Lunev
CC: Michael S. Tsirkin
___
Virtualization mailing list
Virtualization@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/virtualization
avoid to call
adjust_managed_page_count with VIRTIO_BALLOON_F_DEFLATE_ON_OOM set.
Signed-off-by: Denis V. Lunev
CC: Michael S. Tsirkin
---
drivers/virtio/virtio_balloon.c | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/drivers/virtio/virtio_balloon.c b/drivers/virtio
and rename it to release_pages_balloon. The function originally takes
arrays of pfns and now it takes pointer to struct virtio_ballon.
This change is necessary to conditionally call adjust_managed_page_count
in the next patch.
Signed-off-by: Denis V. Lunev
CC: Michael S. Tsirkin
---
drivers
ead of EDX.
Signed-off-by: Andrey Smetanin
Signed-off-by: Denis V. Lunev
CC: Nick Meier
CC: K. Y. Srinivasan
CC: Haiyang Zhang
---
arch/x86/include/asm/mshyperv.h | 1 +
arch/x86/kernel/cpu/mshyperv.c | 1 +
drivers/hv/vmbus_drv.c | 4 ++--
3 files changed, 4 insertions(+), 2
.
Allocate virtio feature bit for this: it is not set by default,
the the guest will not deflate virtio balloon on OOM without explicit
permission from host.
Signed-off-by: Raushaniya Maksudova
Signed-off-by: Denis V. Lunev
CC: Rusty Russell
CC: Michael S. Tsirkin
---
drivers/virtio/virtio_balloon.c
: Raushaniya Maksudova
Signed-off-by: Denis V. Lunev
CC: Rusty Russell
CC: Michael S. Tsirkin
___
Virtualization mailing list
Virtualization@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/virtualization
From: Raushaniya Maksudova
This value would be useful in the next patch to provide the amount of
the freed memory for OOM killer.
Signed-off-by: Raushaniya Maksudova
Signed-off-by: Denis V. Lunev
CC: Rusty Russell
CC: Michael S. Tsirkin
---
drivers/virtio/virtio_balloon.c | 5 -
1 file
On 14/10/14 13:10, Michael S. Tsirkin wrote:
On Tue, Oct 14, 2014 at 10:14:05AM +1030, Rusty Russell wrote:
"Michael S. Tsirkin" writes:
On Mon, Oct 13, 2014 at 04:02:52PM +1030, Rusty Russell wrote:
"Denis V. Lunev" writes:
From: Raushaniya Maksudova
Excessive virt
From: Raushaniya Maksudova
This value would be useful in the next patch to provide the amount of
the freed memory for OOM killer.
Signed-off-by: Raushaniya Maksudova
Signed-off-by: Denis V. Lunev
CC: Rusty Russell
CC: Michael S. Tsirkin
---
drivers/virtio/virtio_balloon.c | 5 -
1 file
implementation of virtio_balloon
callback, so now leak_balloon() function returns number of freed pages.
Patch 2 implements virtio_balloon callback itself.
Changes from v1:
- minor cosmetic tweaks suggested by rusty@
Signed-off-by: Raushaniya Maksudova
Signed-off-by: Denis V. Lunev
CC: Rusty Russell
CC
-off-by: Raushaniya Maksudova
Signed-off-by: Denis V. Lunev
CC: Rusty Russell
CC: Michael S. Tsirkin
---
drivers/virtio/virtio_balloon.c | 48 +
1 file changed, 48 insertions(+)
diff --git a/drivers/virtio/virtio_balloon.c b/drivers/virtio
On 13/10/14 09:32, Rusty Russell wrote:
"Denis V. Lunev" writes:
From: Raushaniya Maksudova
Excessive virtio_balloon inflation can cause invocation of OOM-killer,
when Linux is under severe memory pressure. Various mechanisms are
responsible for correct virtio_balloon memory
implementation of virtio_balloon
callback, so now leak_balloon() function returns number of freed pages.
Patch 2 implements virtio_balloon callback itself.
Signed-off-by: Raushaniya Maksudova
Signed-off-by: Denis V. Lunev
CC: Rusty Russell
CC: Michael S. Tsirkin
CC: virtualization@lists.linux
From: Raushaniya Maksudova
This value would be useful in the next patch to provide the amount of
the freed memory for OOM killer.
Accessing to vb->num_pfns outside of vb->balloon_lock is wrong and unsafe.
Signed-off-by: Raushaniya Maksudova
Signed-off-by: Denis V. Lunev
CC: Rusty Russe
-off-by: Raushaniya Maksudova
Signed-off-by: Denis V. Lunev
CC: Rusty Russell
CC: Michael S. Tsirkin
CC: virtualization@lists.linux-foundation.org
---
drivers/virtio/virtio_balloon.c | 46 +
1 file changed, 46 insertions(+)
diff --git a/drivers/virtio
44 matches
Mail list logo