From: Sasha Levin <levinsasha928@gmail.com>
To: Alexander Graf <agraf@suse.de>
Cc: Matt Evans <matt@ozlabs.org>,
kvm-ppc@vger.kernel.org, KVM list <kvm@vger.kernel.org>
Subject: Re: [PATCH] KVM: PPC: Add KVM_CAP_NR_VCPUS and KVM_CAP_MAX_VCPUS
Date: Tue, 20 Dec 2011 15:32:48 +0000 [thread overview]
Message-ID: <1324395168.22797.25.camel@lappy> (raw)
In-Reply-To: <6373C89E-DA45-4F95-941B-818C137A9C41@suse.de>
On Tue, 2011-12-20 at 16:17 +0100, Alexander Graf wrote:
> On 08.12.2011, at 03:55, Matt Evans wrote:
>
> > PPC KVM lacks these two capabilities, and as such a userland system must assume
> > a max of 4 VCPUs (following api.txt). With these, a userland can determine
> > a more realistic limit.
> >
> > Signed-off-by: Matt Evans <matt@ozlabs.org>
> > ---
> >
> > Alex: For when you're back in civilisation -- the kvmtool/PPC stuff will be
> > limited to 4 VCPUs until the kernel returns something for these caps.
> >
> > Cheers, Matt
> >
> > arch/powerpc/kvm/powerpc.c | 15 +++++++++++++++
> > 1 files changed, 15 insertions(+), 0 deletions(-)
> >
> > diff --git a/arch/powerpc/kvm/powerpc.c b/arch/powerpc/kvm/powerpc.c
> > index 7c7220c..3f7219d 100644
> > --- a/arch/powerpc/kvm/powerpc.c
> > +++ b/arch/powerpc/kvm/powerpc.c
> > @@ -245,6 +245,21 @@ int kvm_dev_ioctl_check_extension(long ext)
> > r = 2;
> > break;
> > #endif
> > + case KVM_CAP_NR_VCPUS:
> > + /*
> > + * Recommending a number of CPUs is somewhat arbitrary; we return the number of present
> > + * CPUs for -HV (since a host will have secondary threads "offline"), and for other KVM
> > + * implementations just count online CPUs.
> > + */
> > +#ifdef CONFIG_KVM_BOOK3S_64_HV
> > + r = num_present_cpus();
> > +#else
> > + r = num_online_cpus();
> > +#endif
>
> That will essentially restrict us to not allow overcommitting when in the scope of a single VM. Is that what we want? You could easily run a 32-way guest on a 4-way host, even with _HV.
>
> Maybe some really big number makes more sense here.
These two caps are defined pretty well on x86:
KVM_CAP_MAX_VCPUS - Absolute possible number of vcpus we can squeeze in
a single guest due to some technical limitation. On x86 it's limited to
254 due to not supporting IRQ remapping.
KVM_CAP_NR_VCPUS - This is actually an arbitrary number which reflects
the point at which adding more vcpus over this number will actually
cause a performance hit.
--
Sasha.
WARNING: multiple messages have this Message-ID (diff)
From: Sasha Levin <levinsasha928@gmail.com>
To: Alexander Graf <agraf@suse.de>
Cc: Matt Evans <matt@ozlabs.org>,
kvm-ppc@vger.kernel.org, KVM list <kvm@vger.kernel.org>
Subject: Re: [PATCH] KVM: PPC: Add KVM_CAP_NR_VCPUS and KVM_CAP_MAX_VCPUS
Date: Tue, 20 Dec 2011 17:32:48 +0200 [thread overview]
Message-ID: <1324395168.22797.25.camel@lappy> (raw)
In-Reply-To: <6373C89E-DA45-4F95-941B-818C137A9C41@suse.de>
On Tue, 2011-12-20 at 16:17 +0100, Alexander Graf wrote:
> On 08.12.2011, at 03:55, Matt Evans wrote:
>
> > PPC KVM lacks these two capabilities, and as such a userland system must assume
> > a max of 4 VCPUs (following api.txt). With these, a userland can determine
> > a more realistic limit.
> >
> > Signed-off-by: Matt Evans <matt@ozlabs.org>
> > ---
> >
> > Alex: For when you're back in civilisation -- the kvmtool/PPC stuff will be
> > limited to 4 VCPUs until the kernel returns something for these caps.
> >
> > Cheers, Matt
> >
> > arch/powerpc/kvm/powerpc.c | 15 +++++++++++++++
> > 1 files changed, 15 insertions(+), 0 deletions(-)
> >
> > diff --git a/arch/powerpc/kvm/powerpc.c b/arch/powerpc/kvm/powerpc.c
> > index 7c7220c..3f7219d 100644
> > --- a/arch/powerpc/kvm/powerpc.c
> > +++ b/arch/powerpc/kvm/powerpc.c
> > @@ -245,6 +245,21 @@ int kvm_dev_ioctl_check_extension(long ext)
> > r = 2;
> > break;
> > #endif
> > + case KVM_CAP_NR_VCPUS:
> > + /*
> > + * Recommending a number of CPUs is somewhat arbitrary; we return the number of present
> > + * CPUs for -HV (since a host will have secondary threads "offline"), and for other KVM
> > + * implementations just count online CPUs.
> > + */
> > +#ifdef CONFIG_KVM_BOOK3S_64_HV
> > + r = num_present_cpus();
> > +#else
> > + r = num_online_cpus();
> > +#endif
>
> That will essentially restrict us to not allow overcommitting when in the scope of a single VM. Is that what we want? You could easily run a 32-way guest on a 4-way host, even with _HV.
>
> Maybe some really big number makes more sense here.
These two caps are defined pretty well on x86:
KVM_CAP_MAX_VCPUS - Absolute possible number of vcpus we can squeeze in
a single guest due to some technical limitation. On x86 it's limited to
254 due to not supporting IRQ remapping.
KVM_CAP_NR_VCPUS - This is actually an arbitrary number which reflects
the point at which adding more vcpus over this number will actually
cause a performance hit.
--
Sasha.
next prev parent reply other threads:[~2011-12-20 15:32 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-12-08 2:55 [PATCH] KVM: PPC: Add KVM_CAP_NR_VCPUS and KVM_CAP_MAX_VCPUS Matt Evans
2011-12-20 15:17 ` Alexander Graf
2011-12-20 15:17 ` Alexander Graf
2011-12-20 15:32 ` Sasha Levin [this message]
2011-12-20 15:32 ` Sasha Levin
2011-12-20 15:45 ` Alexander Graf
2011-12-20 15:45 ` Alexander Graf
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1324395168.22797.25.camel@lappy \
--to=levinsasha928@gmail.com \
--cc=agraf@suse.de \
--cc=kvm-ppc@vger.kernel.org \
--cc=kvm@vger.kernel.org \
--cc=matt@ozlabs.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.