0552c42c39
- kvm-Introduce-event-loop-base-abstract-class.patch [bz#2031024] - kvm-util-main-loop-Introduce-the-main-loop-into-QOM.patch [bz#2031024] - kvm-util-event-loop-base-Introduce-options-to-set-the-th.patch [bz#2031024] - kvm-qcow2-Improve-refcount-structure-rebuilding.patch [bz#2072379] - kvm-iotests-108-Test-new-refcount-rebuild-algorithm.patch [bz#2072379] - kvm-qcow2-Add-errp-to-rebuild_refcount_structure.patch [bz#2072379] - kvm-iotests-108-Fix-when-missing-user_allow_other.patch [bz#2072379] - kvm-virtio-net-setup-vhost_dev-and-notifiers-for-cvq-onl.patch [bz#2070804] - kvm-virtio-net-align-ctrl_vq-index-for-non-mq-guest-for-.patch [bz#2070804] - kvm-vhost-vdpa-fix-improper-cleanup-in-net_init_vhost_vd.patch [bz#2070804] - kvm-vhost-net-fix-improper-cleanup-in-vhost_net_start.patch [bz#2070804] - kvm-vhost-vdpa-backend-feature-should-set-only-once.patch [bz#2070804] - kvm-vhost-vdpa-change-name-and-polarity-for-vhost_vdpa_o.patch [bz#2070804] - kvm-virtio-net-don-t-handle-mq-request-in-userspace-hand.patch [bz#2070804] - kvm-Revert-globally-limit-the-maximum-number-of-CPUs.patch [bz#2094270] - kvm-vfio-common-remove-spurious-warning-on-vfio_listener.patch [bz#2086262] - Resolves: bz#2031024 (Add support for fixing thread pool size [QEMU]) - Resolves: bz#2072379 (Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs)) - Resolves: bz#2070804 (PXE boot crash qemu when using multiqueue vDPA) - Resolves: bz#2094270 (Do not set the hard vCPU limit to the soft vCPU limit in downstream qemu-kvm anymore) - Resolves: bz#2086262 ([Win11][tpm]vfio_listener_region_del received unaligned region)
59 lines
2.2 KiB
Diff
59 lines
2.2 KiB
Diff
From 5ab8613582fd56b847fe75750acb5b7255900b35 Mon Sep 17 00:00:00 2001
|
|
From: Vitaly Kuznetsov <vkuznets@redhat.com>
|
|
Date: Thu, 9 Jun 2022 11:55:15 +0200
|
|
Subject: [PATCH 15/16] Revert "globally limit the maximum number of CPUs"
|
|
|
|
RH-Author: Vitaly Kuznetsov <vkuznets@redhat.com>
|
|
RH-MergeRequest: 99: Revert "globally limit the maximum number of CPUs"
|
|
RH-Commit: [1/1] 13100d4a2209b2190a3654c1f9cf4ebade1e8d24 (vkuznets/qemu-kvm-c9s)
|
|
RH-Bugzilla: 2094270
|
|
RH-Acked-by: Andrew Jones <drjones@redhat.com>
|
|
RH-Acked-by: Cornelia Huck <cohuck@redhat.com>
|
|
RH-Acked-by: Thomas Huth <thuth@redhat.com>
|
|
|
|
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2094270
|
|
Brew: https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=45871149
|
|
Upstream Status: RHEL-only
|
|
Tested: with upstream kernel
|
|
|
|
Downstream QEMU carries a patch that sets the hard limit of possible vCPUs
|
|
to the value that the KVM code of the kernel recommends as soft limit.
|
|
Upstream KVM code has been changed recently to not use an arbitrary soft
|
|
limit anymore, but to cap the value on the amount of available physical
|
|
CPUs of the host. This defeats the purpose of the downstream change in
|
|
QEMU completely. Drop the downstream-only patch to allow CPU overcommit.
|
|
|
|
This reverts commit 6669f6fa677d43144f39d6ad59725b7ba622f1c2.
|
|
|
|
Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
|
---
|
|
accel/kvm/kvm-all.c | 12 ------------
|
|
1 file changed, 12 deletions(-)
|
|
|
|
diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c
|
|
index fdf0e4d429..5f1377ca04 100644
|
|
--- a/accel/kvm/kvm-all.c
|
|
+++ b/accel/kvm/kvm-all.c
|
|
@@ -2430,18 +2430,6 @@ static int kvm_init(MachineState *ms)
|
|
soft_vcpus_limit = kvm_recommended_vcpus(s);
|
|
hard_vcpus_limit = kvm_max_vcpus(s);
|
|
|
|
-#ifdef HOST_PPC64
|
|
- /*
|
|
- * On POWER, the kernel advertises a soft limit based on the
|
|
- * number of CPU threads on the host. We want to allow exceeding
|
|
- * this for testing purposes, so we don't want to set hard limit
|
|
- * to soft limit as on x86.
|
|
- */
|
|
-#else
|
|
- /* RHEL doesn't support nr_vcpus > soft_vcpus_limit */
|
|
- hard_vcpus_limit = soft_vcpus_limit;
|
|
-#endif
|
|
-
|
|
while (nc->name) {
|
|
if (nc->num > soft_vcpus_limit) {
|
|
warn_report("Number of %s cpus requested (%d) exceeds "
|
|
--
|
|
2.31.1
|
|
|