[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Re: [Xen-users] boot a existing windows in hvm domain



No, it's a processor mode halfway between real mode and protected mode which
all x86 processors support, but which vmxassist is really rather bad at
handling. If this is a big-real-mode copy loop then that might explain why
the loop is executing so bizarrely, and may mean you are out of luck until
we retire vmxassist.

 -- Keir

On 8/8/07 16:50, "Brady Chen" <chenchp@xxxxxxxxx> wrote:

> "big-real-mode"? is it something related to PAE? my CPU is Intel
> T2400, Centrino Duo
> thanks
> 
> [root@localhost firmware]# cat /proc/cpuinfo
> processor       : 0
> vendor_id       : GenuineIntel
> cpu family      : 6
> model           : 14
> model name      : Genuine Intel(R) CPU           T2400  @ 1.83GHz
> stepping        : 8
> cpu MHz         : 1828.831
> cache size      : 2048 KB
> fdiv_bug        : no
> hlt_bug         : no
> f00f_bug        : no
> coma_bug        : no
> fpu             : yes
> fpu_exception   : yes
> cpuid level     : 10
> wp              : yes
> flags           : fpu tsc msr pae mce cx8 apic mtrr mca cmov pat
> clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe nx constant_tsc pni
> monitor vmx est tm2 xtpr
> bogomips        : 3660.35
> 
> processor       : 1
> vendor_id       : GenuineIntel
> cpu family      : 6
> model           : 14
> model name      : Genuine Intel(R) CPU           T2400  @ 1.83GHz
> stepping        : 8
> cpu MHz         : 1828.831
> cache size      : 2048 KB
> fdiv_bug        : no
> hlt_bug         : no
> f00f_bug        : no
> coma_bug        : no
> fpu             : yes
> fpu_exception   : yes
> cpuid level     : 10
> wp              : yes
> flags           : fpu tsc msr pae mce cx8 apic mtrr mca cmov pat
> clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe nx constant_tsc up pni
> monitor vmx est tm2 xtprbogomips        : 3660.35
> 
> 
> On 8/8/07, Mats Petersson <mats@xxxxxxxxxxxxxxxxx> wrote:
>> At 14:32 08/08/2007, Keir Fraser wrote:
>>> Disassembled the interesting bit by hand:
>>> 
>>> D700: 66 03 DF               add %edi,%ebx
>>> D703: 66 83 C3 02            add $2,%ebx
>>> D707: 66 81 C7 FE 01 00 00   add $0x1fe,%edi
>>> D70E: 66 49                  dec %ecx
>>> D710: 66 0B C9               or  %ecx,%ecx
>>> D713: 0F 84 17 00            jz  0xd72e
>>> D717: 26 67 8B 03            mov %es:(%ebx),%ax
>>> D71B: 26 67 89 07            mov %ax,%es:(%edi)
>>> D71F: 66 83 C3 02            add $2,%ebx
>>> D723: 66 81 C7 00 02 00 00   add $0x200,%edi
>>> D72A: 66 49                  dec %ecx
>>> D72C: EB E2                  jmp 0xd710
>>> D72E: 66 61                  popal
>>> D730: 90                     nop
>>> D731: 1F                     pop %ds
>>> D732: 07                     pop %es
>>> D733: C3                     ret
>> 
>> 
>> Any chance that the segment(s) involved are "big-real-mode"?
>> 
>> --
>> Mats
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.