All of lore.kernel.org
 help / color / mirror / Atom feed
From: Andres Lagar-Cavilla <andres@lagarcavilla.org>
To: xen-devel@lists.xensource.com
Cc: ian.campbell@citrix.com, andres@gridcentric.ca, tim@xen.org,
	keir.xen@gmail.com, JBeulich@suse.com, ian.jackson@citrix.com,
	adin@gridcentric.ca
Subject: [PATCH 00 of 18] Memory sharing overhaul
Date: Thu, 08 Dec 2011 02:47:15 -0500	[thread overview]
Message-ID: <patchbomb.1323330435@xdev.gridcentric.ca> (raw)

This patch series proposes an overhaul of the memory sharing code.

Aside from bug fixes and cleanups, the main features are:
- Polling of stats via libxc, libxl and console
- Removal of global sharing hashtable and global sharing lock 
 (if audit disabled)
- Turned sharing audits into a domctl
- New domctl to populate vacant physmap entries with shared 
 pages.

As a result, the domctl interface to sharing changes. The only in-tree
consumer of this interface is updated in the current series. It is 
important that if any out-of-tree consumer exists, that they state
their opinion on this interface change.

Patches 5 to 8, 10, 11, 15 and 18 are tools patches.

Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org>
Signed-off-by: Adin Scannell <adin@scannell.ca>

 xen/arch/x86/mm.c                     |    6 +-
 xen/arch/x86/mm/mem_sharing.c         |   91 +++--
 xen/arch/x86/mm.c                     |    2 +-
 xen/arch/x86/mm/mem_sharing.c         |  526 +++++++++++++++++----------------
 xen/include/asm-x86/mem_sharing.h     |   15 +-
 xen/include/asm-x86/mm.h              |   11 +-
 xen/include/public/domctl.h           |    3 +
 xen/arch/x86/mm/mem_sharing.c         |   65 +++-
 xen/include/public/domctl.h           |    9 +
 tools/libxc/xc_memshr.c               |    3 +-
 tools/libxc/xenctrl.h                 |    1 +
 tools/libxc/xc_memshr.c               |   19 +-
 tools/libxc/xenctrl.h                 |    7 +-
 tools/blktap2/drivers/Makefile        |    2 +-
 tools/blktap2/drivers/tapdisk-image.c |    2 +-
 tools/blktap2/drivers/tapdisk-vbd.c   |    6 +-
 tools/blktap2/drivers/tapdisk.h       |    6 +-
 tools/memshr/bidir-daemon.c           |    4 +
 tools/memshr/bidir-hash.h             |   13 +-
 tools/memshr/interface.c              |   31 +-
 tools/memshr/memshr.h                 |   11 +-
 tools/libxl/xl.h                      |    1 +
 tools/libxl/xl_cmdimpl.c              |   85 +++++
 tools/libxl/xl_cmdtable.c             |    6 +
 xen/arch/x86/mm.c                     |    6 -
 xen/arch/x86/mm/mem_sharing.c         |   31 +-
 xen/arch/x86/x86_64/compat/mm.c       |    6 +
 xen/arch/x86/x86_64/mm.c              |    7 +
 xen/include/asm-x86/mem_sharing.h     |    1 +
 xen/include/public/memory.h           |    1 +
 tools/libxc/xc_private.c              |   10 +
 tools/libxc/xenctrl.h                 |    4 +
 tools/libxl/Makefile                  |    2 +-
 tools/libxl/xl_cmdimpl.c              |   13 +-
 xen/arch/x86/mm.c                     |    4 +-
 xen/include/asm-x86/mm.h              |    3 +
 xen/arch/x86/mm.c                     |   16 +-
 xen/arch/x86/mm/mem_sharing.c         |  169 +++++++++-
 xen/arch/x86/mm/mm-locks.h            |    6 +-
 xen/include/asm-x86/mm.h              |    2 +-
 xen/arch/x86/mm/mem_sharing.c         |  106 ++++++
 xen/include/public/domctl.h           |    3 +-
 tools/libxc/xc_memshr.c               |   23 +
 tools/libxc/xenctrl.h                 |    6 +
 xen/arch/ia64/xen/mm.c                |    6 +
 xen/arch/x86/mm/mem_sharing.c         |    8 +
 xen/common/keyhandler.c               |    7 +-
 xen/include/xen/mm.h                  |    3 +
 xen/arch/x86/mm/mem_sharing.c         |   17 +-
 xen/include/public/domctl.h           |    1 +
 tools/libxc/xc_memshr.c               |   14 +
 tools/libxc/xenctrl.h                 |    2 +
 52 files changed, 1005 insertions(+), 397 deletions(-)

______________________________________________________________________
This email has been scanned by the Symantec Email Security.cloud service.
For more information please visit http://www.symanteccloud.com
______________________________________________________________________

             reply	other threads:[~2011-12-08  7:47 UTC|newest]

Thread overview: 42+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-12-08  7:47 Andres Lagar-Cavilla [this message]
2011-12-08  7:47 ` [PATCH 01 of 18] x86/mm: Code style fixes in mem_sharing.c Andres Lagar-Cavilla
2011-12-08 11:11   ` Tim Deegan
2011-12-08 16:16     ` Andres Lagar-Cavilla
2011-12-08 21:54       ` Tim Deegan
2011-12-08  7:47 ` [PATCH 02 of 18] x86/mm: Making a page sharable sets PGT_validated, but making a page private doesn't expect it Andres Lagar-Cavilla
2011-12-08 11:16   ` Tim Deegan
2011-12-08  7:47 ` [PATCH 03 of 18] x86/mm: Eliminate hash table in sharing code as index of shared mfns Andres Lagar-Cavilla
2011-12-08 22:13   ` Tim Deegan
2011-12-08  7:47 ` [PATCH 04 of 18] x86/mm: Update mem sharing interface to (re)allow sharing of grants Andres Lagar-Cavilla
2011-12-08 22:20   ` Tim Deegan
2011-12-09  2:57     ` Andres Lagar-Cavilla
2011-12-08  7:47 ` [PATCH 05 of 18] Tools: Do not assume sharing target is dom0 in libxc wrappers Andres Lagar-Cavilla
2011-12-09 10:01   ` Ian Jackson
2011-12-08  7:47 ` [PATCH 06 of 18] Tools: Update libxc mem sharing interface Andres Lagar-Cavilla
2011-12-09  9:59   ` Ian Jackson
2011-12-08  7:47 ` [PATCH 07 of 18] Tools: Update memshr tool to use new sharing API Andres Lagar-Cavilla
2011-12-09  9:59   ` Ian Jackson
2011-12-08  7:47 ` [PATCH 08 of 18] Tools: Add a sharing command to xl for information about shared pages Andres Lagar-Cavilla
2011-12-09 10:08   ` Ian Jackson
2011-12-09 14:43     ` Andres Lagar-Cavilla
2011-12-09 10:10   ` Ian Campbell
2011-12-09 11:29     ` Ian Jackson
2011-12-08  7:47 ` [PATCH 09 of 18] x86/mm: Check how many mfns are shared, in addition to how many are saved Andres Lagar-Cavilla
2011-12-08 22:27   ` Tim Deegan
2011-12-08  7:47 ` [PATCH 10 of 18] Tools: Expose to libxc the total number of shared frames and space saved Andres Lagar-Cavilla
2011-12-08  7:47 ` [PATCH 11 of 18] Tools: Allow libxl/xl to expose " Andres Lagar-Cavilla
2011-12-09 10:02   ` Ian Jackson
2011-12-08  7:47 ` [PATCH 12 of 18] x86/mm: Make page_lock/unlock() in arch/x86/mm.c externally callable Andres Lagar-Cavilla
2011-12-08 22:38   ` Tim Deegan
2011-12-08 23:06     ` Keir Fraser
2011-12-09  3:01       ` Andres Lagar-Cavilla
2011-12-09  8:17         ` Keir Fraser
2011-12-09 14:47           ` Andres Lagar-Cavilla
2011-12-09  2:54     ` Andres Lagar-Cavilla
2011-12-09  8:51       ` Jan Beulich
2011-12-09 14:53         ` Andres Lagar-Cavilla
2011-12-09 15:06           ` Jan Beulich
2011-12-09 17:34             ` Andres Lagar-Cavilla
2011-12-09 14:57       ` Tim Deegan
2011-12-09 14:59         ` Andres Lagar-Cavilla
2011-12-09 15:02         ` Keir Fraser

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=patchbomb.1323330435@xdev.gridcentric.ca \
    --to=andres@lagarcavilla.org \
    --cc=JBeulich@suse.com \
    --cc=adin@gridcentric.ca \
    --cc=andres@gridcentric.ca \
    --cc=ian.campbell@citrix.com \
    --cc=ian.jackson@citrix.com \
    --cc=keir.xen@gmail.com \
    --cc=tim@xen.org \
    --cc=xen-devel@lists.xensource.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.