* [ANNOUNCE] kvm-43 release
@ 2007-09-21 5:38 Avi Kivity
[not found] ` <46F358D2.9000009-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 6+ messages in thread
From: Avi Kivity @ 2007-09-21 5:38 UTC (permalink / raw)
To: kvm-devel
Only one fix, but an important one. It fixes booting of newer Linux
versions, which experienced disk and keyboard problems without
-no-kvm-irqchip.
As usual, if you have an issue please try with -no-kvm-irqchip and report.
Changes since kvm-42:
- fix ioapic edge-triggered interrupt handling
Notes:
If you use the modules bundled with kvm-43, you can use any version
of Linux from 2.6.9 upwards.
If you use the modules bundled with Linux 2.6.20, you need to use
kvm-12.
If you use the modules bundled with Linux 2.6.21, you need to use
kvm-17.
Modules from Linux 2.6.22 and up will work with any kvm version from
kvm-22. Some features may only be available in newer releases.
For best performance, use Linux 2.6.23-rc2 or later as the host.
http://kvm.qumranet.com
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [ANNOUNCE] kvm-43 release
[not found] ` <46F358D2.9000009-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-09-21 15:23 ` Gerd Hoffmann
[not found] ` <46F3E1E7.7010602-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
0 siblings, 1 reply; 6+ messages in thread
From: Gerd Hoffmann @ 2007-09-21 15:23 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Only one fix, but an important one. It fixes booting of newer Linux
> versions, which experienced disk and keyboard problems without
> -no-kvm-irqchip.
>
> As usual, if you have an issue please try with -no-kvm-irqchip and report.
Updated from -41. Now my libkvm-using-tool's
kvm_callbacks->try_push_interrupts() callback isn't called any more.
Hmm. Guess due to the lapic/irqchip changes. Are there any additional
initializations I have to do now?
As there isn't any real pic-like hardware emulated maybe using
try_to_push_interrupts is a bad idea anyway and I should better move the
code (checks state and calls kvm_inject_irq() if needed) to the
pre_kvm_run() callback?
hints anyone?
Gerd
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [ANNOUNCE] kvm-43 release
[not found] ` <46F3E1E7.7010602-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
@ 2007-09-22 6:36 ` Avi Kivity
[not found] ` <46F4B800.20408-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 6+ messages in thread
From: Avi Kivity @ 2007-09-22 6:36 UTC (permalink / raw)
To: Gerd Hoffmann; +Cc: kvm-devel
Gerd Hoffmann wrote:
> Avi Kivity wrote:
>
>> Only one fix, but an important one. It fixes booting of newer Linux
>> versions, which experienced disk and keyboard problems without
>> -no-kvm-irqchip.
>>
>> As usual, if you have an issue please try with -no-kvm-irqchip and report.
>>
>
> Updated from -41. Now my libkvm-using-tool's
> kvm_callbacks->try_push_interrupts() callback isn't called any more.
> Hmm. Guess due to the lapic/irqchip changes. Are there any additional
> initializations I have to do now?
>
> As there isn't any real pic-like hardware emulated maybe using
> try_to_push_interrupts is a bad idea anyway and I should better move the
> code (checks state and calls kvm_inject_irq() if needed) to the
> pre_kvm_run() callback?
>
> hints anyone?
>
You can call kvm_disable_irqchip_creation() to kill in-kernel pic and
friends.
(the logic is inverted -- the function should be
kvm_enable_irqchip_creation() so that this problem would not occur)
--
Any sufficiently difficult bug is indistinguishable from a feature.
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [ANNOUNCE] kvm-43 release
[not found] ` <46F4B800.20408-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-09-24 9:43 ` Gerd Hoffmann
[not found] ` <46F786DF.7020600-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
0 siblings, 1 reply; 6+ messages in thread
From: Gerd Hoffmann @ 2007-09-24 9:43 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> You can call kvm_disable_irqchip_creation() to kill in-kernel pic and
> friends.
>
> (the logic is inverted -- the function should be
> kvm_enable_irqchip_creation() so that this problem would not occur)
Ok, will try, next question first though as I'm running in trouble much
earlier in -44: I get suspious page faults.
I *think* it happens because I'm changing guest page tables from outside
(i.e. host application), and the new intel pgtable optimization bits
don't expect that (yes, it is a vt box).
A quick scan of kvmctl.h doesn't show anything which looks like I could
call to tell kvm the guest page tables have been modified. Hints how to
handle this?
thanks,
Gerd
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [ANNOUNCE] kvm-43 release
[not found] ` <46F786DF.7020600-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
@ 2007-09-24 9:51 ` Avi Kivity
[not found] ` <46F7889B.70000-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 6+ messages in thread
From: Avi Kivity @ 2007-09-24 9:51 UTC (permalink / raw)
To: Gerd Hoffmann; +Cc: kvm-devel
Gerd Hoffmann wrote:
> Avi Kivity wrote:
>
>> You can call kvm_disable_irqchip_creation() to kill in-kernel pic and
>> friends.
>>
>> (the logic is inverted -- the function should be
>> kvm_enable_irqchip_creation() so that this problem would not occur)
>>
>
> Ok, will try, next question first though as I'm running in trouble much
> earlier in -44: I get suspious page faults.
>
> I *think* it happens because I'm changing guest page tables from outside
> (i.e. host application), and the new intel pgtable optimization bits
> don't expect that (yes, it is a vt box).
>
Well, the older implementation doesn't expect that either. You can
disable the optimization with bypass_guest_pf=0, though.
> A quick scan of kvmctl.h doesn't show anything which looks like I could
> call to tell kvm the guest page tables have been modified. Hints how to
> handle this?
>
>
There's a kvm_mmu_zap_all() function, but it isn't exposed. It's very
coarse grained, but can be used for experiments.
You could write a new ioctl that tells kvm that some pages were modified
by the host; that's useful for guests which page out page tables (and
so, during page in, disk dma could overwrite a page table).
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [ANNOUNCE] kvm-43 release
[not found] ` <46F7889B.70000-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-09-24 10:11 ` Gerd Hoffmann
0 siblings, 0 replies; 6+ messages in thread
From: Gerd Hoffmann @ 2007-09-24 10:11 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
>> I *think* it happens because I'm changing guest page tables from outside
>> (i.e. host application), and the new intel pgtable optimization bits
>> don't expect that (yes, it is a vt box).
>
> Well, the older implementation doesn't expect that either. You can
> disable the optimization with bypass_guest_pf=0, though.
Thanks. Using bypass_guest_pf=0 and irqchip_disable() brings things
back to -41 level of functionality.
kvm not expecting both guest and host app changing pagetables could
explain other problems I'm seeing though, so maybe i better fix that.
Long term it isn't planned to stay that way anyway, it's just handy for
proof-of-concept because userspace is very easy to hack and debug ...
thanks,
Gerd
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2007-09-24 10:11 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-09-21 5:38 [ANNOUNCE] kvm-43 release Avi Kivity
[not found] ` <46F358D2.9000009-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-09-21 15:23 ` Gerd Hoffmann
[not found] ` <46F3E1E7.7010602-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2007-09-22 6:36 ` Avi Kivity
[not found] ` <46F4B800.20408-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-09-24 9:43 ` Gerd Hoffmann
[not found] ` <46F786DF.7020600-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2007-09-24 9:51 ` Avi Kivity
[not found] ` <46F7889B.70000-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-09-24 10:11 ` Gerd Hoffmann
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox