On 2011-01-24 13:36, Jan Kiszka wrote:
On 2011-01-24 12:17, Marcelo Tosatti wrote:
On Mon, Jan 10, 2011 at 09:32:00AM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Currently, we only configure and process MCE-related SIGBUS events if
CONFIG_IOTHREAD is enabled. Fix this by
On 2011-01-25 17:49, Stefan Berger wrote:
On 01/25/2011 02:26 AM, Jan Kiszka wrote:
Do you see a chance to look closer at the issue yourself? E.g.
instrument the kernel's irqchip models and dump their states once your
guest is stuck?
The device runs on iRQ 3. So I applied this patch here.
On 2011-01-25 20:13, Alex Williamson wrote:
On Tue, 2011-01-25 at 17:35 +0100, Jan Kiszka wrote:
On 2011-01-25 15:53, Avi Kivity wrote:
On 01/25/2011 04:41 PM, Alex Williamson wrote:
kvm: Allow memory slot array to grow on demand
Remove fixed KVM_MEMORY_SLOTS limit, allowing
Hi,
The changes we made are very less, mostly disabling default QEMU VGA.
But there are few problems that we are still working on
1. The display on the monitor, probably only appears after the KMS is
enabled. It does not display the grub menu and booting log.
Sounds like you're not
On Tuesday 25 January 2011 20:47:38 Avi Kivity wrote:
On 01/19/2011 10:21 AM, Sheng Yang wrote:
We already got an guest MMIO address for that in the exit
information. I've created a chain of handler in qemu to handle it.
But we already decoded the table and entry...
But
On 01/25/2011 07:58 PM, Michael S. Tsirkin wrote:
On Tue, Jan 25, 2011 at 07:33:40PM +0200, Avi Kivity wrote:
On 01/25/2011 04:59 PM, Michael S. Tsirkin wrote:
On Tue, Jan 25, 2011 at 04:53:44PM +0200, Avi Kivity wrote:
For the other lookups, which we
believe will succeed, we can
On Wed, Jan 26, 2011 at 11:17:11AM +0200, Avi Kivity wrote:
On 01/25/2011 07:58 PM, Michael S. Tsirkin wrote:
On Tue, Jan 25, 2011 at 07:33:40PM +0200, Avi Kivity wrote:
On 01/25/2011 04:59 PM, Michael S. Tsirkin wrote:
On Tue, Jan 25, 2011 at 04:53:44PM +0200, Avi Kivity wrote:
For
On 01/25/2011 07:43 PM, Alex Williamson wrote:
On Tue, 2011-01-25 at 19:11 +0200, Avi Kivity wrote:
On 01/25/2011 04:57 PM, Alex Williamson wrote:
On Tue, 2011-01-25 at 12:23 +0200, Avi Kivity wrote:
On 01/25/2011 07:37 AM, Alex Williamson wrote:
On Mon, 2011-01-24 at
On 01/26/2011 11:20 AM, Michael S. Tsirkin wrote:
On Wed, Jan 26, 2011 at 11:17:11AM +0200, Avi Kivity wrote:
On 01/25/2011 07:58 PM, Michael S. Tsirkin wrote:
On Tue, Jan 25, 2011 at 07:33:40PM +0200, Avi Kivity wrote:
On 01/25/2011 04:59 PM, Michael S. Tsirkin wrote:
On Tue, Jan
On 01/25/2011 08:00 PM, Michael S. Tsirkin wrote:
I see now. Yes, a flag in spte would help. changes in slots would then
have to update all these flags.
That's easy, we drop all sptes.
Ah, right. Hmm cpu has no flag to distinguish mmio sptes somehow already?
No.
On Wed, Jan 26, 2011 at 11:23:21AM +0200, Avi Kivity wrote:
On 01/26/2011 11:20 AM, Michael S. Tsirkin wrote:
On Wed, Jan 26, 2011 at 11:17:11AM +0200, Avi Kivity wrote:
On 01/25/2011 07:58 PM, Michael S. Tsirkin wrote:
On Tue, Jan 25, 2011 at 07:33:40PM +0200, Avi Kivity wrote:
On
Record mmio write event to replay it upon failover.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
exec.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/exec.c b/exec.c
index e950df2..c81fd09 100644
--- a/exec.c
+++ b/exec.c
@@ -33,6 +33,7 @@
event-tap function is called only when it is on.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
net.c |9 +
1 files changed, 9 insertions(+), 0 deletions(-)
diff --git a/net.c b/net.c
index 9ba5be2..1176124 100644
--- a/net.c
+++ b/net.c
@@ -36,6 +36,7 @@
#include
Hi,
This patch series is a revised version of Kemari for KVM, which
applied comments for the previous post. The current code is based on
qemu.git 0bfe006c5380c5f8a485a55ded3329fbbc224396.
The changes from v0.2.6 - v0.2.7 are:
- add AIOCB, AIOPool and cancel functions (Kevin)
- insert event-tap
To utilize ft_trans_file function, savevm needs interfaces to be
exported.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
hw/hw.h |5 ++
savevm.c | 149 ++
2 files changed, 154 insertions(+), 0 deletions(-)
diff
The option looks like, -incoming protocol:address:port,ft_mode
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
migration.c |6 ++
1 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/migration.c b/migration.c
index 1752cf4..29d4fb1 100644
--- a/migration.c
+++
Record ioport event to replay it upon failover.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
ioport.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/ioport.c b/ioport.c
index aa4188a..74aebf5 100644
--- a/ioport.c
+++ b/ioport.c
@@ -27,6 +27,7 @@
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
vl.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/vl.c b/vl.c
index 8bbb785..9faeb27 100644
--- a/vl.c
+++ b/vl.c
@@ -162,6 +162,7 @@ int main(int argc, char **argv)
#include qemu-queue.h
#include
event-tap function is called only when it is on, and requests sent
from device emulators.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
block.c | 15 +++
1 files changed, 15 insertions(+), 0 deletions(-)
diff --git a/block.c b/block.c
index ff2795b..e4df9b6
Currently FdMigrationState doesn't support read(), and this patch
introduces it to get response from the other side.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
migration-tcp.c | 15 +++
migration.c | 13 +
migration.h |3 +++
3 files
Introduce qemu_savevm_state_{begin,commit} to send the memory and
device info together, while avoiding cancelling memory state tracking.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
savevm.c | 93 ++
sysemu.h |
When ft_mode is set in the header, tcp_accept_incoming_migration()
sets ft_trans_incoming() as a callback, and call
qemu_file_get_notify() to receive FT transaction iteratively. We also
need a hack no to close fd before moving to ft_transaction mode, so
that we can reuse the fd for it.
event-tap controls when to start FT transaction, and provides proxy
functions to called from net/block devices. While FT transaction, it
queues up net/block requests, and flush them when the transaction gets
completed.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
Signed-off-by:
Introduce migrate_ft_trans_put_ready() which kicks the FT transaction
cycle. When ft_mode is on, migrate_fd_put_ready() would open
ft_trans_file and turn on event_tap. To end or cancel FT transaction,
ft_mode and event_tap is turned off. migrate_ft_trans_get_ready() is
called to receive ack
Introduce skip_header parameter to qemu_loadvm_state() so that it can
be called iteratively without reading the header.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
migration.c |2 +-
savevm.c| 24 +---
sysemu.h|2 +-
3 files changed, 15
Currently buf size is fixed at 32KB. It would be useful if it could
be flexible.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
hw/hw.h |2 ++
savevm.c | 20 +++-
2 files changed, 21 insertions(+), 1 deletions(-)
diff --git a/hw/hw.h b/hw/hw.h
index
For regular migration inuse == 0 always as requests are flushed before
save. However, event-tap log when enabled introduces an extra queue
for requests which is not being flushed, thus the last inuse requests
are left in the event-tap queue. Move the last_avail_idx value sent
to the remote back
Make deleting handlers robust against deletion of any elements in a
handler by using a deleted flag like in file descriptors.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
vl.c | 13 +
1 files changed, 9 insertions(+), 4 deletions(-)
diff --git a/vl.c b/vl.c
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
---
qemu-char.c |2 +-
qemu_socket.h |1 +
2 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/qemu-char.c b/qemu-char.c
index edc9ad6..737d347 100644
--- a/qemu-char.c
+++ b/qemu-char.c
@@ -2116,7 +2116,7 @@ static
This code implements VM transaction protocol. Like buffered_file, it
sits between savevm and migration layer. With this architecture, VM
transaction protocol is implemented mostly independent from other
existing code.
Signed-off-by: Yoshiaki Tamura tamura.yoshi...@lab.ntt.co.jp
Signed-off-by:
On 01/25/2011 08:29 PM, Ruben Kerkhof wrote:
When you say suddenly, this was with no changes to software and hardware?
The host software and hardware hasn't changed in the two months since
the machine has been running. 2.6.34.7 kernel and qemu-kvm 0.13.
We host customer vms on it though, so
On 01/26/2011 11:39 AM, Michael S. Tsirkin wrote:
On Wed, Jan 26, 2011 at 11:23:21AM +0200, Avi Kivity wrote:
On 01/26/2011 11:20 AM, Michael S. Tsirkin wrote:
On Wed, Jan 26, 2011 at 11:17:11AM +0200, Avi Kivity wrote:
On 01/25/2011 07:58 PM, Michael S. Tsirkin wrote:
On Tue, Jan
On Tue, 2011-01-25 at 19:27 -0200, Glauber Costa wrote:
On Tue, 2011-01-25 at 22:07 +0100, Peter Zijlstra wrote:
On Tue, 2011-01-25 at 18:47 -0200, Glauber Costa wrote:
On Tue, 2011-01-25 at 21:13 +0100, Peter Zijlstra wrote:
On Tue, 2011-01-25 at 18:02 -0200, Glauber Costa wrote:
On 01/25/2011 04:35 PM, Stefan Hajnoczi wrote:
On Tue, Jan 25, 2011 at 2:26 PM, Avi Kivitya...@redhat.com wrote:
On 01/25/2011 12:06 AM, Anthony Liguori wrote:
On 01/24/2011 07:25 AM, Chris Wright wrote:
Please send in any agenda items you are interested in covering.
- coroutines for
Hello
I have RHEL4 with kernel 2.6.9
I'm trying to compile kvm-kmod-2.6.30
After make command returns:
-
[root@maeko kvm-kmod-2.6.30]# make
make -C /lib/modules/2.6.9-67.ELsmp/build M=`pwd` \
LINUXINCLUDE=-I`pwd`/include -Iinclude \
\
On 01/24/2011 08:06 PM, Glauber Costa wrote:
KVM, which stands for KVM Virtual Memory (I wanted to call it KVM Virtual
Mojito),
is a piece of shared memory that is visible to both the hypervisor and the guest
kernel - but not the guest userspace.
The basic idea is that the guest can tell the
On 01/24/2011 08:06 PM, Glauber Costa wrote:
KVM, which stands for KVM Virtual Memory (I wanted to call it KVM Virtual
Mojito),
is a piece of shared memory that is visible to both the hypervisor and the guest
kernel - but not the guest userspace.
The basic idea is that the guest can tell the
On 01/24/2011 08:06 PM, Glauber Costa wrote:
As a proof of concept to KVM - Kernel Virtual Memory, this patch
implements wallclock grabbing on top of it. At first, it may seem
as a waste of work to just redo it, since it is working well. But over the
time, other MSRs were added - think ASYNC_PF
On 01/26/2011 12:48 PM, antoni artigues wrote:
Hello
I have RHEL4 with kernel 2.6.9
I'm trying to compile kvm-kmod-2.6.30
2.6.9 is way too old for kvm-kmod. Any particular reason why you want
kvm over such an old host?
--
error compiling committee.c: too many arguments to function
--
To
On 01/23/2011 01:25 PM, Matteo Signorini wrote:
Hi,
I'm having some problems understanding the sysenter instruction.
As far as I know, in order to successfully call the sysenter instruction,
MSR_IA32_SYSENTER_CS and MSR_IA32_SYSENTER_EIP registers have to be
correctly set.
So I printed the
Hello
Well, we have a 32 nodes cluster. With RHEL4 and 2.6.9 kernel in all the
nodes. The cluster is in production. Now, is not possible to update each
of the 32 nodes.
We want to use opennebula with KVM in the cluster. So, we are trying to
compile the kvm-kmod.
Is not possible? Do we need to
On Wed, Jan 26, 2011 at 09:09:25AM +0100, Jan Kiszka wrote:
On 2011-01-24 13:36, Jan Kiszka wrote:
On 2011-01-24 12:17, Marcelo Tosatti wrote:
On Mon, Jan 10, 2011 at 09:32:00AM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
Currently, we only configure and process
On 01/26/2011 03:14 AM, Jan Kiszka wrote:
On 2011-01-25 17:49, Stefan Berger wrote:
On 01/25/2011 02:26 AM, Jan Kiszka wrote:
Do you see a chance to look closer at the issue yourself? E.g.
instrument the kernel's irqchip models and dump their states once your
guest is stuck?
The device runs
On 2011-01-26 13:01, Marcelo Tosatti wrote:
On Wed, Jan 26, 2011 at 09:09:25AM +0100, Jan Kiszka wrote:
On 2011-01-24 13:36, Jan Kiszka wrote:
On 2011-01-24 12:17, Marcelo Tosatti wrote:
On Mon, Jan 10, 2011 at 09:32:00AM +0100, Jan Kiszka wrote:
From: Jan Kiszka jan.kis...@siemens.com
On Wed, Jan 26, 2011 at 11:54:21AM +0200, Avi Kivity wrote:
On 01/26/2011 11:39 AM, Michael S. Tsirkin wrote:
On Wed, Jan 26, 2011 at 11:23:21AM +0200, Avi Kivity wrote:
On 01/26/2011 11:20 AM, Michael S. Tsirkin wrote:
On Wed, Jan 26, 2011 at 11:17:11AM +0200, Avi Kivity wrote:
On
On 2011-01-26 13:05, Stefan Berger wrote:
On 01/26/2011 03:14 AM, Jan Kiszka wrote:
On 2011-01-25 17:49, Stefan Berger wrote:
On 01/25/2011 02:26 AM, Jan Kiszka wrote:
Do you see a chance to look closer at the issue yourself? E.g.
instrument the kernel's irqchip models and dump their states
On Wed, 2011-01-26 at 13:06 +0200, Avi Kivity wrote:
On 01/24/2011 08:06 PM, Glauber Costa wrote:
KVM, which stands for KVM Virtual Memory (I wanted to call it KVM Virtual
Mojito),
is a piece of shared memory that is visible to both the hypervisor and the
guest
kernel - but not the
On Wed, 2011-01-26 at 13:12 +0200, Avi Kivity wrote:
On 01/24/2011 08:06 PM, Glauber Costa wrote:
KVM, which stands for KVM Virtual Memory (I wanted to call it KVM Virtual
Mojito),
is a piece of shared memory that is visible to both the hypervisor and the
guest
kernel - but not the
On Wed, 2011-01-26 at 13:13 +0200, Avi Kivity wrote:
On 01/24/2011 08:06 PM, Glauber Costa wrote:
As a proof of concept to KVM - Kernel Virtual Memory, this patch
implements wallclock grabbing on top of it. At first, it may seem
as a waste of work to just redo it, since it is working well.
On 01/26/2011 01:37 PM, antoni artigues wrote:
Hello
Well, we have a 32 nodes cluster. With RHEL4 and 2.6.9 kernel in all the
nodes. The cluster is in production. Now, is not possible to update each
of the 32 nodes.
We want to use opennebula with KVM in the cluster. So, we are trying to
On 01/20/2011 11:36 PM, Rik van Riel wrote:
Keep track of which task is running a KVM vcpu. This helps us
figure out later what task to wake up if we want to boost a
vcpu that got preempted.
Unfortunately there are no guarantees that the same task
always keeps the same vcpu, so we can only
On 01/26/2011 07:09 AM, Jan Kiszka wrote:
On 2011-01-26 13:05, Stefan Berger wrote:
On 01/26/2011 03:14 AM, Jan Kiszka wrote:
On 2011-01-25 17:49, Stefan Berger wrote:
On 01/25/2011 02:26 AM, Jan Kiszka wrote:
Do you see a chance to look closer at the issue yourself? E.g.
instrument the
On 2011-01-26 14:08, Stefan Berger wrote:
On 01/26/2011 07:09 AM, Jan Kiszka wrote:
On 2011-01-26 13:05, Stefan Berger wrote:
On 01/26/2011 03:14 AM, Jan Kiszka wrote:
On 2011-01-25 17:49, Stefan Berger wrote:
On 01/25/2011 02:26 AM, Jan Kiszka wrote:
Do you see a chance to look closer at
On 2011-01-26 14:15, Jan Kiszka wrote:
On 2011-01-26 14:08, Stefan Berger wrote:
On 01/26/2011 07:09 AM, Jan Kiszka wrote:
On 2011-01-26 13:05, Stefan Berger wrote:
On 01/26/2011 03:14 AM, Jan Kiszka wrote:
On 2011-01-25 17:49, Stefan Berger wrote:
On 01/25/2011 02:26 AM, Jan Kiszka wrote:
On 01/26/2011 08:31 AM, Jan Kiszka wrote:
On 2011-01-26 14:15, Jan Kiszka wrote:
On 2011-01-26 14:08, Stefan Berger wrote:
On 01/26/2011 07:09 AM, Jan Kiszka wrote:
On 2011-01-26 13:05, Stefan Berger wrote:
On 01/26/2011 03:14 AM, Jan Kiszka wrote:
On 2011-01-25 17:49, Stefan Berger wrote:
On Wed, Jan 26, 2011 at 10:52, Avi Kivity a...@redhat.com wrote:
On 01/25/2011 08:29 PM, Ruben Kerkhof wrote:
When you say suddenly, this was with no changes to software and
hardware?
The host software and hardware hasn't changed in the two months since
the machine has been running.
On 01/26/2011 02:13 PM, Glauber Costa wrote:
- it doesn't lend itself will to live migration. Extra state must be
maintained in the hypervisor.
Yes, but can be queried at any time as well. I don't do it in this
patch, but this is explicitly mentioned in my TODO.
Using the existing method
On 01/26/2011 02:14 PM, Glauber Costa wrote:
On Wed, 2011-01-26 at 13:12 +0200, Avi Kivity wrote:
On 01/24/2011 08:06 PM, Glauber Costa wrote:
KVM, which stands for KVM Virtual Memory (I wanted to call it KVM Virtual
Mojito),
is a piece of shared memory that is visible to both the
On 01/26/2011 02:20 PM, Glauber Costa wrote:
On Wed, 2011-01-26 at 13:13 +0200, Avi Kivity wrote:
On 01/24/2011 08:06 PM, Glauber Costa wrote:
As a proof of concept to KVM - Kernel Virtual Memory, this patch
implements wallclock grabbing on top of it. At first, it may seem
as a
On Tue, Jan 25, 2011 at 03:09:34PM -0600, Steve Dobbelstein wrote:
I am working on a KVM network performance issue found in our lab running
the DayTrader benchmark. The benchmark throughput takes a significant hit
when running the application server in a KVM guest verses on bare metal.
We
On 01/26/2011 08:01 AM, Avi Kivity wrote:
Suggest moving the code to vcpu_load(), where it can execute under the
protection of vcpu-mutex.
I've made the suggested changes by you and Peter, and
will re-post the patch series in a bit...
--
All rights reversed
--
To unsubscribe from this list:
On Wed, 2011-01-26 at 17:14 +0200, Avi Kivity wrote:
On 01/26/2011 02:14 PM, Glauber Costa wrote:
On Wed, 2011-01-26 at 13:12 +0200, Avi Kivity wrote:
On 01/24/2011 08:06 PM, Glauber Costa wrote:
KVM, which stands for KVM Virtual Memory (I wanted to call it KVM
Virtual Mojito),
On Wed, 2011-01-26 at 17:12 +0200, Avi Kivity wrote:
On 01/26/2011 02:13 PM, Glauber Costa wrote:
- it doesn't lend itself will to live migration. Extra state must be
maintained in the hypervisor.
Yes, but can be queried at any time as well. I don't do it in this
patch, but this
On Wed, 2011-01-26 at 10:57 +0100, Peter Zijlstra wrote:
On Tue, 2011-01-25 at 19:27 -0200, Glauber Costa wrote:
On Tue, 2011-01-25 at 22:07 +0100, Peter Zijlstra wrote:
On Tue, 2011-01-25 at 18:47 -0200, Glauber Costa wrote:
On Tue, 2011-01-25 at 21:13 +0100, Peter Zijlstra wrote:
On Wed, 2011-01-26 at 17:17 +0200, Avi Kivity wrote:
On 01/26/2011 02:20 PM, Glauber Costa wrote:
On Wed, 2011-01-26 at 13:13 +0200, Avi Kivity wrote:
On 01/24/2011 08:06 PM, Glauber Costa wrote:
As a proof of concept to KVM - Kernel Virtual Memory, this patch
implements
On Wed, 2011-01-26 at 13:43 -0200, Glauber Costa wrote:
yes, but once this delta is subtracted from rq-clock_task, this value is not
used to dictate power, unless I am mistaken.
power is adjusted according to scale_rt_power(), which does it using the
values of rq-rt_avg, rq-age_stamp, and
On Wed, 2011-01-26 at 17:46 +0100, Peter Zijlstra wrote:
it uses a per-cpu virt_steal_time() clock which is
expected to return steal-time in ns.
This clock should return u64 and wrap on u64 and be provided when
CONFIG_SCHED_PARAVIRT.
--
To unsubscribe from this list: send the line unsubscribe
Some time ago in this list it was mentioned that old kernels pre-2.6.28
don't work well with KVM.
(in particular we have a machine with 2.6.24)
Unfortunately the type of problem was not mentioned in the posts I could
find. Is that a performance problem, a stability problem, or a data
corruption
Reviewed-by: Christoph Lameter c...@linux.com
--
To unsubscribe from this list: send the line unsubscribe kvm in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
On Wed, 2011-01-26 at 17:46 +0100, Peter Zijlstra wrote:
On Wed, 2011-01-26 at 13:43 -0200, Glauber Costa wrote:
yes, but once this delta is subtracted from rq-clock_task, this value is
not
used to dictate power, unless I am mistaken.
power is adjusted according to scale_rt_power(),
Keep track of which task is running a KVM vcpu. This helps us
figure out later what task to wake up if we want to boost a
vcpu that got preempted.
Unfortunately there are no guarantees that the same task
always keeps the same vcpu, so we can only track the task
across a single run of the vcpu.
Use the buddy mechanism to implement yield_task_fair. This
allows us to skip onto the next highest priority se at every
level in the CFS tree, unless doing so would introduce gross
unfairness in CPU time distribution.
We order the buddy selection in pick_next_entity to check
yield first, then
Instead of sleeping in kvm_vcpu_on_spin, which can cause gigantic
slowdowns of certain workloads, we instead use yield_to to get
another VCPU in the same KVM guest to run sooner.
This seems to give a 10-15% speedup in certain workloads.
Signed-off-by: Rik van Riel r...@redhat.com
Signed-off-by:
When running SMP virtual machines, it is possible for one VCPU to be
spinning on a spinlock, while the VCPU that holds the spinlock is not
currently running, because the host scheduler preempted it to run
something else.
Both Intel and AMD CPUs have a feature that detects when a virtual
CPU is
With CONFIG_FAIR_GROUP_SCHED, each task_group has its own cfs_rq.
Yielding to a task from another cfs_rq may be worthwhile, since
a process calling yield typically cannot use the CPU right now.
Therefor, we want to check the per-cpu nr_running, not the
cgroup local one.
Signed-off-by: Rik van
The clear_buddies function does not seem to play well with the concept
of hierarchical runqueues. In the following tree, task groups are
represented by 'G', tasks by 'T', next by 'n' and last by 'l'.
(nl)
/\
G(nl) G
/ \ \
T(l) T(n) T
This situation can arise when a
From: Mike Galbraith efa...@gmx.de
Currently only implemented for fair class tasks.
Add a yield_to_task method() to the fair scheduling class. allowing the
caller of yield_to() to accelerate another thread in it's thread group,
task group.
Implemented via a scheduler hint, using cfs_rq-next to
Hi Balbir,
On Tue, Jan 25, 2011 at 2:10 PM, Balbir Singh bal...@linux.vnet.ibm.com wrote:
Changelog v4
1. Add max_unmapped_ratio and use that as the upper limit
to check when to shrink the unmapped page cache (Christoph
Lameter)
Changelog v2
1. Use a config option to enable the code
On 01/20/2011 11:27 PM, Marcelo Tosatti wrote:
Sure :-), there is the simply test result of kernbench:
Before patch:
real5m6.493s
user3m57.847s
sys
Hi, Andrew,
On Thu, 2011-01-20 at 23:50 +0800, Marcelo Tosatti wrote:
On Mon, Jan 17, 2011 at 08:47:39AM +0800, Huang Ying wrote:
Hi, Andrew,
On Sun, 2011-01-16 at 23:35 +0800, Avi Kivity wrote:
On 01/14/2011 03:37 AM, Huang Ying wrote:
On Thu, 2011-01-13 at 18:43 +0800, Avi Kivity
80 matches
Mail list logo