public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
* [ANNOUNCE] kvm-43 release
@ 2007-09-21  5:38 Avi Kivity
       [not found] ` <46F358D2.9000009-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
  0 siblings, 1 reply; 6+ messages in thread
From: Avi Kivity @ 2007-09-21  5:38 UTC (permalink / raw)
  To: kvm-devel

Only one fix, but an important one.  It fixes booting of newer Linux
versions, which experienced disk and keyboard problems without
-no-kvm-irqchip.

As usual, if you have an issue please try with -no-kvm-irqchip and report.

Changes since kvm-42:
- fix ioapic edge-triggered interrupt handling

Notes:
     If you use the modules bundled with kvm-43, you can use any version
of Linux from 2.6.9 upwards.
     If you use the modules bundled with Linux 2.6.20, you need to use
kvm-12.
     If you use the modules bundled with Linux 2.6.21, you need to use
kvm-17.
     Modules from Linux 2.6.22 and up will work with any kvm version from
kvm-22.  Some features may only be available in newer releases.
     For best performance, use Linux 2.6.23-rc2 or later as the host.

http://kvm.qumranet.com



-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [ANNOUNCE] kvm-43 release
       [not found] ` <46F358D2.9000009-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-09-21 15:23   ` Gerd Hoffmann
       [not found]     ` <46F3E1E7.7010602-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
  0 siblings, 1 reply; 6+ messages in thread
From: Gerd Hoffmann @ 2007-09-21 15:23 UTC (permalink / raw)
  To: Avi Kivity; +Cc: kvm-devel

Avi Kivity wrote:
> Only one fix, but an important one.  It fixes booting of newer Linux
> versions, which experienced disk and keyboard problems without
> -no-kvm-irqchip.
> 
> As usual, if you have an issue please try with -no-kvm-irqchip and report.

Updated from -41.  Now my libkvm-using-tool's
kvm_callbacks->try_push_interrupts() callback isn't called any more.
Hmm.  Guess due to the lapic/irqchip changes.  Are there any additional
initializations I have to do now?

As there isn't any real pic-like hardware emulated maybe using
try_to_push_interrupts is a bad idea anyway and I should better move the
code (checks state and calls kvm_inject_irq() if needed) to the
pre_kvm_run() callback?

hints anyone?

  Gerd


-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [ANNOUNCE] kvm-43 release
       [not found]     ` <46F3E1E7.7010602-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
@ 2007-09-22  6:36       ` Avi Kivity
       [not found]         ` <46F4B800.20408-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
  0 siblings, 1 reply; 6+ messages in thread
From: Avi Kivity @ 2007-09-22  6:36 UTC (permalink / raw)
  To: Gerd Hoffmann; +Cc: kvm-devel

Gerd Hoffmann wrote:
> Avi Kivity wrote:
>   
>> Only one fix, but an important one.  It fixes booting of newer Linux
>> versions, which experienced disk and keyboard problems without
>> -no-kvm-irqchip.
>>
>> As usual, if you have an issue please try with -no-kvm-irqchip and report.
>>     
>
> Updated from -41.  Now my libkvm-using-tool's
> kvm_callbacks->try_push_interrupts() callback isn't called any more.
> Hmm.  Guess due to the lapic/irqchip changes.  Are there any additional
> initializations I have to do now?
>
> As there isn't any real pic-like hardware emulated maybe using
> try_to_push_interrupts is a bad idea anyway and I should better move the
> code (checks state and calls kvm_inject_irq() if needed) to the
> pre_kvm_run() callback?
>
> hints anyone?
>   

You can call kvm_disable_irqchip_creation() to kill in-kernel pic and 
friends.

(the logic is inverted -- the function should be 
kvm_enable_irqchip_creation() so that this problem would not occur)

-- 
Any sufficiently difficult bug is indistinguishable from a feature.


-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [ANNOUNCE] kvm-43 release
       [not found]         ` <46F4B800.20408-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-09-24  9:43           ` Gerd Hoffmann
       [not found]             ` <46F786DF.7020600-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
  0 siblings, 1 reply; 6+ messages in thread
From: Gerd Hoffmann @ 2007-09-24  9:43 UTC (permalink / raw)
  To: Avi Kivity; +Cc: kvm-devel

Avi Kivity wrote:
> You can call kvm_disable_irqchip_creation() to kill in-kernel pic and
> friends.
> 
> (the logic is inverted -- the function should be
> kvm_enable_irqchip_creation() so that this problem would not occur)

Ok, will try, next question first though as I'm running in trouble much
earlier in -44:  I get suspious page faults.

I *think* it happens because I'm changing guest page tables from outside
(i.e. host application), and the new intel pgtable optimization bits
don't expect that (yes, it is a vt box).

A quick scan of kvmctl.h doesn't show anything which looks like I could
call to tell kvm the guest page tables have been modified.  Hints how to
handle this?

thanks,
  Gerd

-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [ANNOUNCE] kvm-43 release
       [not found]             ` <46F786DF.7020600-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
@ 2007-09-24  9:51               ` Avi Kivity
       [not found]                 ` <46F7889B.70000-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
  0 siblings, 1 reply; 6+ messages in thread
From: Avi Kivity @ 2007-09-24  9:51 UTC (permalink / raw)
  To: Gerd Hoffmann; +Cc: kvm-devel

Gerd Hoffmann wrote:
> Avi Kivity wrote:
>   
>> You can call kvm_disable_irqchip_creation() to kill in-kernel pic and
>> friends.
>>
>> (the logic is inverted -- the function should be
>> kvm_enable_irqchip_creation() so that this problem would not occur)
>>     
>
> Ok, will try, next question first though as I'm running in trouble much
> earlier in -44:  I get suspious page faults.
>
> I *think* it happens because I'm changing guest page tables from outside
> (i.e. host application), and the new intel pgtable optimization bits
> don't expect that (yes, it is a vt box).
>   

Well, the older implementation doesn't expect that either.  You can 
disable the optimization with bypass_guest_pf=0, though.

> A quick scan of kvmctl.h doesn't show anything which looks like I could
> call to tell kvm the guest page tables have been modified.  Hints how to
> handle this?
>
>   

There's a kvm_mmu_zap_all() function, but it isn't exposed.  It's very 
coarse grained, but can be used for experiments.

You could write a new ioctl that tells kvm that some pages were modified 
by the host; that's useful for guests which page out page tables (and 
so, during page in, disk dma could overwrite a page table).


-- 
error compiling committee.c: too many arguments to function


-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [ANNOUNCE] kvm-43 release
       [not found]                 ` <46F7889B.70000-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-09-24 10:11                   ` Gerd Hoffmann
  0 siblings, 0 replies; 6+ messages in thread
From: Gerd Hoffmann @ 2007-09-24 10:11 UTC (permalink / raw)
  To: Avi Kivity; +Cc: kvm-devel

>> I *think* it happens because I'm changing guest page tables from outside
>> (i.e. host application), and the new intel pgtable optimization bits
>> don't expect that (yes, it is a vt box).
> 
> Well, the older implementation doesn't expect that either.  You can
> disable the optimization with bypass_guest_pf=0, though.

Thanks.  Using bypass_guest_pf=0 and irqchip_disable() brings things
back to -41 level of functionality.

kvm not expecting both guest and host app changing pagetables could
explain other problems I'm seeing though, so maybe i better fix that.
Long term it isn't planned to stay that way anyway, it's just handy for
proof-of-concept because userspace is very easy to hack and debug ...

thanks,
  Gerd



-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2007-09-24 10:11 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-09-21  5:38 [ANNOUNCE] kvm-43 release Avi Kivity
     [not found] ` <46F358D2.9000009-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-09-21 15:23   ` Gerd Hoffmann
     [not found]     ` <46F3E1E7.7010602-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2007-09-22  6:36       ` Avi Kivity
     [not found]         ` <46F4B800.20408-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-09-24  9:43           ` Gerd Hoffmann
     [not found]             ` <46F786DF.7020600-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2007-09-24  9:51               ` Avi Kivity
     [not found]                 ` <46F7889B.70000-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-09-24 10:11                   ` Gerd Hoffmann

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox