* [RFT] kvm with Windows optimization
@ 2007-10-25 17:23 Avi Kivity
[not found] ` <4720D122.4070606-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
[not found] ` <10EA09EFD8728347A513008B6B0DA77A02125FBD@pdsmsx411.ccr.corp.intel.com>
0 siblings, 2 replies; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 17:23 UTC (permalink / raw)
To: kvm-devel
This is a request for testing of an experimental kvm feature that
dramatically accelerates some Windows releases (when running with the
ACPI HAL, and especially with guest SMP). The feature detects accesses
by the guest to the Task Priority Register (TPR) and patches them at
runtime to a kvm-friendly code snipped that is provided by the BIOS.
The upshot of all that is that
http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
required, and Windows SMP no longer runs like a dog; it's quite snappy
from my very limited testing.
Please download the test release from
http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
Once it has received some exposure, I'll merge it into mainline.
Credit for the original idea is due to Ben Serebrin.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720D122.4070606-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-25 17:34 ` Haydn Solomon
[not found] ` <b75785ba0710251034q77a83b98pc784be19c842b807-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-25 17:51 ` Anthony Liguori
` (3 subsequent siblings)
4 siblings, 1 reply; 53+ messages in thread
From: Haydn Solomon @ 2007-10-25 17:34 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
[-- Attachment #1.1: Type: text/plain, Size: 1945 bytes --]
On compilation I get the following error.
../qemu-kvm.h:41: error: redefinition of 'kvm_log_tpr'
../qemu-kvm.h:41: error: previous definition of 'kvm_log_tpr' was here
make[2]: *** [i8259.o] Error 1
make[2]: Leaving directory
`/root/Download/software/tpr-opt-1/qemu/x86_64-softmmu'
make[1]: *** [subdir-x86_64-softmmu] Error 2
make[1]: Leaving directory `/root/Download/software/tpr-opt-1/qemu'
make: *** [qemu] Error 2
Any help would be appreciated. Thanks.
Haydn
On 10/25/07, Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org> wrote:
>
> This is a request for testing of an experimental kvm feature that
> dramatically accelerates some Windows releases (when running with the
> ACPI HAL, and especially with guest SMP). The feature detects accesses
> by the guest to the Task Priority Register (TPR) and patches them at
> runtime to a kvm-friendly code snipped that is provided by the BIOS.
>
> The upshot of all that is that
> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
> required, and Windows SMP no longer runs like a dog; it's quite snappy
> from my very limited testing.
>
> Please download the test release from
> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
> Once it has received some exposure, I'll merge it into mainline.
>
> Credit for the original idea is due to Ben Serebrin.
>
> --
> error compiling committee.c: too many arguments to function
>
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems? Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/
> _______________________________________________
> kvm-devel mailing list
> kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
> https://lists.sourceforge.net/lists/listinfo/kvm-devel
>
[-- Attachment #1.2: Type: text/html, Size: 2700 bytes --]
[-- Attachment #2: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #3: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <b75785ba0710251034q77a83b98pc784be19c842b807-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
@ 2007-10-25 17:35 ` Avi Kivity
[not found] ` <4720D3F0.8010103-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 17:35 UTC (permalink / raw)
To: Haydn Solomon; +Cc: kvm-devel
Haydn Solomon wrote:
> On compilation I get the following error.
>
> ../qemu-kvm.h:41: error: redefinition of 'kvm_log_tpr'
> ../qemu-kvm.h:41: error: previous definition of 'kvm_log_tpr' was here
> make[2]: *** [i8259.o] Error 1
> make[2]: Leaving directory
> `/root/Download/software/tpr-opt-1/qemu/x86_64-softmmu'
> make[1]: *** [subdir-x86_64-softmmu] Error 2
> make[1]: Leaving directory `/root/Download/software/tpr-opt-1/qemu'
> make: *** [qemu] Error 2
>
> Any help would be appreciated. Thanks.
I uploaded a new version that fixes this. Same location.
Now back to reviewing and applying patches.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720D3F0.8010103-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-25 17:39 ` Haydn Solomon
[not found] ` <b75785ba0710251039x63551396yc9d5e24df0f56ad7-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Haydn Solomon @ 2007-10-25 17:39 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
[-- Attachment #1.1: Type: text/plain, Size: 819 bytes --]
Thanks, that was quick.
On 10/25/07, Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org> wrote:
>
> Haydn Solomon wrote:
> > On compilation I get the following error.
> >
> > ../qemu-kvm.h:41: error: redefinition of 'kvm_log_tpr'
> > ../qemu-kvm.h:41: error: previous definition of 'kvm_log_tpr' was here
> > make[2]: *** [i8259.o] Error 1
> > make[2]: Leaving directory
> > `/root/Download/software/tpr-opt-1/qemu/x86_64-softmmu'
> > make[1]: *** [subdir-x86_64-softmmu] Error 2
> > make[1]: Leaving directory `/root/Download/software/tpr-opt-1/qemu'
> > make: *** [qemu] Error 2
> >
> > Any help would be appreciated. Thanks.
>
> I uploaded a new version that fixes this. Same location.
>
>
> Now back to reviewing and applying patches.
>
> --
> error compiling committee.c: too many arguments to function
>
>
[-- Attachment #1.2: Type: text/html, Size: 1216 bytes --]
[-- Attachment #2: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #3: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720D122.4070606-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 17:34 ` Haydn Solomon
@ 2007-10-25 17:51 ` Anthony Liguori
[not found] ` <4720D7A8.6060102-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-25 18:27 ` Anthony Liguori
` (2 subsequent siblings)
4 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-25 17:51 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
[-- Attachment #1: Type: text/plain, Size: 953 bytes --]
Avi Kivity wrote:
> This is a request for testing of an experimental kvm feature that
> dramatically accelerates some Windows releases (when running with the
> ACPI HAL, and especially with guest SMP). The feature detects accesses
> by the guest to the Task Priority Register (TPR) and patches them at
> runtime to a kvm-friendly code snipped that is provided by the BIOS.
>
> The upshot of all that is that
> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
> required, and Windows SMP no longer runs like a dog; it's quite snappy
> from my very limited testing.
>
> Please download the test release from
> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
> Once it has received some exposure, I'll merge it into mainline.
>
> Credit for the original idea is due to Ben Serebrin.
>
>
Sweet!
I needed the following patch to compile. Will let you know how testing
goes.
Regards,
Anthony Liguori
[-- Attachment #2: tpr-opt-1-compile.diff --]
[-- Type: text/x-patch, Size: 487 bytes --]
diff -ur a/qemu/qemu-kvm.h b/qemu/qemu-kvm.h
--- a/qemu/qemu-kvm.h 2007-10-25 11:55:25.000000000 -0500
+++ b/qemu/qemu-kvm.h 2007-10-25 12:48:38.000000000 -0500
@@ -30,7 +30,6 @@
#define ALIGN(x, y) (((x)+(y)-1) & ~((y)-1))
#define BITMAP_SIZE(m) (ALIGN(((m)>>TARGET_PAGE_BITS), HOST_LONG_BITS) / 8)
-#endif
extern int kvm_tpr_log_enabled;
void kvm_do_log_tpr(int write);
@@ -42,3 +41,4 @@
if (kvm_tpr_log_enabled && addr == 0xfee00080)
kvm_do_log_tpr(write);
}
+#endif
[-- Attachment #3: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #4: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720D7A8.6060102-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-25 18:03 ` Avi Kivity
[not found] ` <4720DA66.6040303-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 18:03 UTC (permalink / raw)
To: Anthony Liguori; +Cc: kvm-devel
Anthony Liguori wrote:
> Avi Kivity wrote:
>> This is a request for testing of an experimental kvm feature that
>> dramatically accelerates some Windows releases (when running with the
>> ACPI HAL, and especially with guest SMP). The feature detects
>> accesses by the guest to the Task Priority Register (TPR) and patches
>> them at runtime to a kvm-friendly code snipped that is provided by
>> the BIOS.
>>
>> The upshot of all that is that
>> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
>> required, and Windows SMP no longer runs like a dog; it's quite
>> snappy from my very limited testing.
>>
>> Please download the test release from
>> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
>> Once it has received some exposure, I'll merge it into mainline.
>>
>> Credit for the original idea is due to Ben Serebrin.
>>
>>
>
> Sweet!
>
> I needed the following patch to compile. Will let you know how
> testing goes.
>
I already applied that, plus another minor fix, so I recommend
re-downloading. Should have given it a new name.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <b75785ba0710251039x63551396yc9d5e24df0f56ad7-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
@ 2007-10-25 18:07 ` Jindrich Makovicka
2007-10-25 18:10 ` Avi Kivity
0 siblings, 1 reply; 53+ messages in thread
From: Jindrich Makovicka @ 2007-10-25 18:07 UTC (permalink / raw)
To: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
On Thu, 25 Oct 2007 13:39:33 -0400
"Haydn Solomon" <haydn.solomon-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> wrote:
> Thanks, that was quick.
Finally, this (pre)release solved the long standing Java IE Plugin
lockup problem for me. Thanks a lot!
--
Jindrich Makovicka
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720DA66.6040303-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-25 18:08 ` Anthony Liguori
[not found] ` <4720DBA1.7050003-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-25 18:08 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Anthony Liguori wrote:
>> Avi Kivity wrote:
>>> This is a request for testing of an experimental kvm feature that
>>> dramatically accelerates some Windows releases (when running with
>>> the ACPI HAL, and especially with guest SMP). The feature detects
>>> accesses by the guest to the Task Priority Register (TPR) and
>>> patches them at runtime to a kvm-friendly code snipped that is
>>> provided by the BIOS.
>>>
>>> The upshot of all that is that
>>> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
>>> required, and Windows SMP no longer runs like a dog; it's quite
>>> snappy from my very limited testing.
>>>
>>> Please download the test release from
>>> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
>>> Once it has received some exposure, I'll merge it into mainline.
>>>
>>> Credit for the original idea is due to Ben Serebrin.
>>>
>>>
>>
>> Sweet!
>>
>> I needed the following patch to compile. Will let you know how
>> testing goes.
>>
>
> I already applied that, plus another minor fix, so I recommend
> re-downloading. Should have given it a new name.
What's the minor fix? During the second stage of installing winxp, I
just got the following BUG(). Have to reboot to check and see if this
is specific to your branch.
[68630.390361] ------------[ cut here ]------------
[68630.390367] kernel BUG at /home/anthony/tmp/b/kernel/mmu.c:308!
[68630.390370] invalid opcode: 0000 [1] SMP
[68630.390372] CPU 1
[68630.390374] Modules linked in: kvm_intel kvm nfs lockd sunrpc tun
i915 drm af_packet rfcomm l2cap thinkpad_acpi ppdev acpi_cpufreq
cpufreq_stats cpufreq_ondemand freq_table cpufreq_userspace
cpufreq_conservative cpufreq_powersave sbs ac battery bay dock container
button video ipv6 bridge ipt_REJECT xt_state xt_tcpudp iptable_filter
ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack
nfnetlink ip_tables x_tables sbp2 lp arc4 ecb blkcipher snd_hda_intel
snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss joydev
iwl4965 snd_seq_midi iwlwifi_mac80211 hci_usb snd_rawmidi
snd_seq_midi_event snd_seq snd_timer bluetooth pcmcia cfg80211 usbhid
hid sdhci mmc_core snd_seq_device serio_raw parport_pc parport
yenta_socket rsrc_nonstatic pcmcia_core pcspkr psmouse snd soundcore
intel_agp shpchp pci_hotplug snd_page_alloc evdev ext3 jbd mbcache sg
sr_mod cdrom sd_mod ata_piix ohci1394 ieee1394 ata_generic libata
scsi_mod ehci_hcd uhci_hcd usbcore e1000 thermal processor fan fuse
apparmor commoncap
[68630.390435] Pid: 15055, comm: qemu-system-x86 Not tainted
2.6.22-14-generic #1
[68630.390437] RIP: 0010:[<ffffffff8837f905>] [<ffffffff8837f905>]
:kvm:mmu_memory_cache_alloc+0x25/0x30
[68630.390451] RSP: 0018:ffff810041e3b9b8 EFLAGS: 00010246
[68630.390453] RAX: 0000000000000000 RBX: ffffc2000109dea0 RCX:
ffff81003f47c080
[68630.390456] RDX: ffff81003f47c088 RSI: 0000000000000028 RDI:
ffff810042d103e0
[68630.390458] RBP: ffff81004eaf9460 R08: 0000000000000000 R09:
0000000000000004
[68630.390460] R10: 0000000003a94163 R11: 0000000000000000 R12:
ffff810042d10000
[68630.390463] R13: 0000000000000000 R14: ffff81004eaf9460 R15:
ffff810042d10000
[68630.390465] FS: 00002b08de4add40(0000) GS:ffff81000102c280(0000)
knlGS:0000000000000000
[68630.390468] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
[68630.390470] CR2: 0000000000010000 CR3: 00000000284ef000 CR4:
00000000000026e0
[68630.390473] Process qemu-system-x86 (pid: 15055, threadinfo
ffff810041e3a000, task ffff81003b9346e0)
[68630.390475] Stack: ffffc2000109dea0 ffffffff8837fa16
000000002149d043 0000000000000002
[68630.390480] 000000002149d000 ffffffff883801ad 00002b08df4e4000
0000000000003a94
[68630.390484] 0000000000000000 0000000000000000 0000000003a94000
0000000003a94000
[68630.390487] Call Trace:
[68630.390496] [<ffffffff8837fa16>] :kvm:rmap_add+0xf6/0x110
[68630.390507] [<ffffffff883801ad>]
:kvm:paging32_set_pte_common+0x10d/0x2b0
[68630.390523] [<ffffffff88380399>] :kvm:paging32_set_pte+0x49/0x50
[68630.390534] [<ffffffff883809dd>] :kvm:kvm_mmu_pte_write+0x33d/0x3b0
[68630.390553] [<ffffffff8837a6cd>]
:kvm:emulator_write_emulated_onepage+0x9d/0x100
[68630.390564] [<ffffffff88382da8>] :kvm:x86_emulate_insn+0x5e8/0x4450
[68630.390574] [<ffffffff8855f467>] :kvm_intel:vmcs_readl+0x17/0x20
[68630.390586] [<ffffffff8837acff>] :kvm:emulate_instruction+0x1af/0x2f0
[68630.390596] [<ffffffff88562090>] :kvm_intel:handle_exception+0x240/0x2b0
[68630.390603] [<ffffffff88387aa9>] :kvm:apic_update_ppr+0x29/0x60
[68630.390615] [<ffffffff8837ca74>] :kvm:kvm_vcpu_ioctl+0xe54/0x11b0
[68630.390622] [<ffffffff8026e624>] add_to_page_cache_lru+0x24/0x40
[68630.390628] [<ffffffff8028f088>] shmem_getpage+0x298/0x7e0
[68630.390652] [<ffffffff802a84f5>] core_sys_select+0x275/0x300
[68630.390670] [<ffffffff80240719>] __dequeue_signal+0x19/0x1d0
[68630.390677] [<ffffffff8023ffce>] recalc_sigpending+0xe/0x30
[68630.390680] [<ffffffff8024212c>] dequeue_signal+0x5c/0x190
[68630.390685] [<ffffffff8024f4f9>] getnstimeofday+0x39/0xa0
[68630.390692] [<ffffffff802a6e05>] do_ioctl+0x35/0xe0
[68630.390698] [<ffffffff802a6f24>] vfs_ioctl+0x74/0x2d0
[68630.390705] [<ffffffff802a7215>] sys_ioctl+0x95/0xb0
[68630.390712] [<ffffffff80209e8e>] system_call+0x7e/0x83
[68630.390723]
[68630.390724]
[68630.390725] Code: 0f 0b eb fe 0f 1f 80 00 00 00 00 48 81 c7 e0 03 00
00 be 28
[68630.390733] RIP [<ffffffff8837f905>]
:kvm:mmu_memory_cache_alloc+0x25/0x30
[68630.390742] RSP <ffff810041e3b9b8>
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720DBA1.7050003-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-25 18:09 ` Avi Kivity
0 siblings, 0 replies; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 18:09 UTC (permalink / raw)
To: Anthony Liguori; +Cc: kvm-devel
Anthony Liguori wrote:
> Avi Kivity wrote:
>> Anthony Liguori wrote:
>>> Avi Kivity wrote:
>>>> This is a request for testing of an experimental kvm feature that
>>>> dramatically accelerates some Windows releases (when running with
>>>> the ACPI HAL, and especially with guest SMP). The feature detects
>>>> accesses by the guest to the Task Priority Register (TPR) and
>>>> patches them at runtime to a kvm-friendly code snipped that is
>>>> provided by the BIOS.
>>>>
>>>> The upshot of all that is that
>>>> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no
>>>> longer required, and Windows SMP no longer runs like a dog; it's
>>>> quite snappy from my very limited testing.
>>>>
>>>> Please download the test release from
>>>> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a
>>>> spin. Once it has received some exposure, I'll merge it into
>>>> mainline.
>>>>
>>>> Credit for the original idea is due to Ben Serebrin.
>>>>
>>>>
>>>
>>> Sweet!
>>>
>>> I needed the following patch to compile. Will let you know how
>>> testing goes.
>>>
>>
>> I already applied that, plus another minor fix, so I recommend
>> re-downloading. Should have given it a new name.
>
> What's the minor fix? During the second stage of installing winxp, I
> just got the following BUG(). Have to reboot to check and see if this
> is specific to your branch.
>
Unrelated to the below, I guess. It prevents BSODs, not BUGs.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
2007-10-25 18:07 ` Jindrich Makovicka
@ 2007-10-25 18:10 ` Avi Kivity
[not found] ` <4720DC12.8050303-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 18:10 UTC (permalink / raw)
To: Jindrich Makovicka; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Jindrich Makovicka wrote:
> On Thu, 25 Oct 2007 13:39:33 -0400
> "Haydn Solomon" <haydn.solomon-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> wrote:
>
>
>> Thanks, that was quick.
>>
>
> Finally, this (pre)release solved the long standing Java IE Plugin
> lockup problem for me. Thanks a lot!
>
>
No, this release is meant to cause problems, not fix them.
(but thanks for the reminder)
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720DC12.8050303-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-25 18:15 ` Haydn Solomon
[not found] ` <b75785ba0710251115h7ef5cbfek492a588e80349e04-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-26 10:09 ` Avi Kivity
1 sibling, 1 reply; 53+ messages in thread
From: Haydn Solomon @ 2007-10-25 18:15 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
[-- Attachment #1.1: Type: text/plain, Size: 1529 bytes --]
I also had a problem installing windows xp. Got the following error
localhost kernel: ------------[ cut here ]------------
Message from syslogd@ at Thu Oct 25 13:59:27 2007 ...
localhost kernel: invalid opcode: 0000 [1] SMP
Installed windows xp with the following options
/usr/local/kvm/bin/qemu-system-x86_64 \
-hda windowsxp.img \
-m 400 \
-localtime \
-smp 2 \
-boot d \
-cdrom /home/hsolomon/isos/en_winxp_pro_with_sp2.iso &
Haydn
On 10/25/07, Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org> wrote:
>
> Jindrich Makovicka wrote:
> > On Thu, 25 Oct 2007 13:39:33 -0400
> > "Haydn Solomon" <haydn.solomon-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> wrote:
> >
> >
> >> Thanks, that was quick.
> >>
> >
> > Finally, this (pre)release solved the long standing Java IE Plugin
> > lockup problem for me. Thanks a lot!
> >
> >
>
> No, this release is meant to cause problems, not fix them.
>
> (but thanks for the reminder)
>
> --
> error compiling committee.c: too many arguments to function
>
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems? Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/
> _______________________________________________
> kvm-devel mailing list
> kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
> https://lists.sourceforge.net/lists/listinfo/kvm-devel
>
[-- Attachment #1.2: Type: text/html, Size: 2262 bytes --]
[-- Attachment #2: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #3: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <b75785ba0710251115h7ef5cbfek492a588e80349e04-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
@ 2007-10-25 18:20 ` Avi Kivity
[not found] ` <4720DE65.2030209-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 18:20 UTC (permalink / raw)
To: Haydn Solomon
Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Haydn Solomon wrote:
> I also had a problem installing windows xp. Got the following error
I guess I'll have to test that too.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720D122.4070606-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 17:34 ` Haydn Solomon
2007-10-25 17:51 ` Anthony Liguori
@ 2007-10-25 18:27 ` Anthony Liguori
[not found] ` <4720E023.8050804-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-26 9:47 ` Gildas
2007-10-29 15:04 ` Test for the feature, RE: [RFT] kvm with Windows optimization Zhao, Yunfeng
4 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-25 18:27 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> This is a request for testing of an experimental kvm feature that
> dramatically accelerates some Windows releases (when running with the
> ACPI HAL, and especially with guest SMP). The feature detects accesses
> by the guest to the Task Priority Register (TPR) and patches them at
> runtime to a kvm-friendly code snipped that is provided by the BIOS.
>
> The upshot of all that is that
> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
> required, and Windows SMP no longer runs like a dog; it's quite snappy
> from my very limited testing.
>
> Please download the test release from
> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
> Once it has received some exposure, I'll merge it into mainline.
>
> Credit for the original idea is due to Ben Serebrin.
>
BTW, is it wise to enable this by default for all guests? Ignoring the
fact that we're modifying guest's memory without its knowledge, if a
guest unmaps the VA mappings for the BIOS then all sorts of problems
could occur.
Regards,
Anthony Liguori
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720E023.8050804-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-25 18:34 ` Avi Kivity
2007-10-26 3:32 ` Dong, Eddie
1 sibling, 0 replies; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 18:34 UTC (permalink / raw)
To: Anthony Liguori; +Cc: kvm-devel
Anthony Liguori wrote:
> Avi Kivity wrote:
>
>> This is a request for testing of an experimental kvm feature that
>> dramatically accelerates some Windows releases (when running with the
>> ACPI HAL, and especially with guest SMP). The feature detects accesses
>> by the guest to the Task Priority Register (TPR) and patches them at
>> runtime to a kvm-friendly code snipped that is provided by the BIOS.
>>
>> The upshot of all that is that
>> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
>> required, and Windows SMP no longer runs like a dog; it's quite snappy
>> from my very limited testing.
>>
>> Please download the test release from
>> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
>> Once it has received some exposure, I'll merge it into mainline.
>>
>> Credit for the original idea is due to Ben Serebrin.
>>
>>
>
> BTW, is it wise to enable this by default for all guests? Ignoring the
> fact that we're modifying guest's memory without its knowledge, if a
> guest unmaps the VA mappings for the BIOS then all sorts of problems
> could occur
I'd like to make this the default and add an option to disable it.
The code is careful to try to detect Windows, and we can tighten the
check in case it misfires. I'd like things to Just Work (they may also
Just Crash, but hopefully we can fix this).
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720DE65.2030209-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-25 18:38 ` Anthony Liguori
[not found] ` <4720E2AF.3070404-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-25 18:38 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Avi Kivity wrote:
> Haydn Solomon wrote:
>
>> I also had a problem installing windows xp. Got the following error
>>
>
>
> I guess I'll have to test that too.
>
I hit it again, this time about half-way through the second stage
install of Windows XP (last time it was almost immediately). This is
with your updated tree. I'll next try to reproduce with the latest git.
Regards,
Anthony Liguori
[ 1577.621100] ------------[ cut here ]------------
[ 1577.621106] kernel BUG at /home/anthony/tmp/2/tpr-opt-1/kernel/mmu.c:308!
[ 1577.621108] invalid opcode: 0000 [1] SMP
[ 1577.621111] CPU 1
[ 1577.621113] Modules linked in: tun kvm_intel kvm i915 drm af_packet
rfcomm l2cap thinkpad_acpi ppdev acpi_cpufreq cpufreq_stats
cpufreq_ondemand freq_table cpufreq_userspace cpufreq_conservative
cpufreq_powersave sbs ac battery bay dock container button video ipv6
bridge ipt_REJECT xt_state xt_tcpudp iptable_filter ipt_MASQUERADE
iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nfnetlink ip_tables
x_tables sbp2 lp arc4 ecb blkcipher snd_hda_intel snd_pcm_oss
snd_mixer_oss snd_pcm snd_seq_dummy iwl4965 iwlwifi_mac80211 snd_seq_oss
parport_pc snd_seq_midi snd_rawmidi parport cfg80211 pcmcia hci_usb
bluetooth snd_seq_midi_event snd_seq snd_timer snd_seq_device intel_agp
sdhci mmc_core serio_raw psmouse pcspkr yenta_socket rsrc_nonstatic
pcmcia_core snd soundcore shpchp pci_hotplug snd_page_alloc joydev evdev
ext3 jbd mbcache usbhid hid sg sr_mod sd_mod cdrom ata_piix ehci_hcd
ohci1394 ieee1394 ata_generic libata scsi_mod uhci_hcd usbcore e1000
thermal processor fan fuse apparmor commoncap
[ 1577.621172] Pid: 7788, comm: qemu-system-x86 Not tainted
2.6.22-14-generic #1
[ 1577.621175] RIP: 0010:[<ffffffff8837d905>] [<ffffffff8837d905>]
:kvm:mmu_memory_cache_alloc+0x25/0x30
[ 1577.621188] RSP: 0018:ffff8100441819b8 EFLAGS: 00010246
[ 1577.621190] RAX: 0000000000000000 RBX: ffffc200010c1968 RCX:
ffff81001eebc080
[ 1577.621193] RDX: ffff81001eebc088 RSI: 0000000000000028 RDI:
ffff8100388543e0
[ 1577.621195] RBP: ffff81000377f060 R08: 0000000000000000 R09:
0000000000000004
[ 1577.621197] R10: 00000000081ed163 R11: 0000000000000000 R12:
ffff810038854000
[ 1577.621200] R13: 0000000000000000 R14: ffff81000377f060 R15:
ffff810038854000
[ 1577.621202] FS: 00002b7827310d40(0000) GS:ffff81000102c280(0000)
knlGS:0000000000000000
[ 1577.621205] CS: 0010 DS: 002b ES: 002b CR0: 000000008005003b
[ 1577.621207] CR2: 0000000001002ff8 CR3: 0000000054f45000 CR4:
00000000000026e0
[ 1577.621210] Process qemu-system-x86 (pid: 7788, threadinfo
ffff810044180000, task ffff81000d4d8dc0)
[ 1577.621212] Stack: ffffc200010c1968 ffffffff8837da16
00000000441c6043 0000000000000002
[ 1577.621216] 00000000441c6000 ffffffff8837e1ad 00002b7828552000
00000000000081ed
[ 1577.621220] 0000000000000000 0000000000000000 00000000081ed000
00000000081ed000
[ 1577.621223] Call Trace:
[ 1577.621233] [<ffffffff8837da16>] :kvm:rmap_add+0xf6/0x110
[ 1577.621243] [<ffffffff8837e1ad>]
:kvm:paging32_set_pte_common+0x10d/0x2b0
[ 1577.621258] [<ffffffff8837e399>] :kvm:paging32_set_pte+0x49/0x50
[ 1577.621269] [<ffffffff8837e9dd>] :kvm:kvm_mmu_pte_write+0x33d/0x3b0
[ 1577.621287] [<ffffffff883786cd>]
:kvm:emulator_write_emulated_onepage+0x9d/0x100
[ 1577.621298] [<ffffffff88380da8>] :kvm:x86_emulate_insn+0x5e8/0x4450
[ 1577.621308] [<ffffffff88396467>] :kvm_intel:vmcs_readl+0x17/0x20
[ 1577.621320] [<ffffffff88378cff>] :kvm:emulate_instruction+0x1af/0x2f0
[ 1577.621328] [<ffffffff88399090>] :kvm_intel:handle_exception+0x240/0x2b0
[ 1577.621336] [<ffffffff88385ab9>] :kvm:apic_update_ppr+0x29/0x60
[ 1577.621347] [<ffffffff8837aa74>] :kvm:kvm_vcpu_ioctl+0xe54/0x11b0
[ 1577.621355] [<ffffffff8026e000>] file_read_actor+0x0/0x150
[ 1577.621366] [<ffffffff8022cacc>] task_rq_lock+0x4c/0x90
[ 1577.621372] [<ffffffff8022f30c>] try_to_wake_up+0x5c/0x3f0
[ 1577.621385] [<ffffffff802a84f5>] core_sys_select+0x275/0x300
[ 1577.621391] [<ffffffff8022ca03>] __wake_up+0x43/0x70
[ 1577.621402] [<ffffffff80240719>] __dequeue_signal+0x19/0x1d0
[ 1577.621409] [<ffffffff8023ffce>] recalc_sigpending+0xe/0x30
[ 1577.621412] [<ffffffff8024212c>] dequeue_signal+0x5c/0x190
[ 1577.621416] [<ffffffff8024f4f9>] getnstimeofday+0x39/0xa0
[ 1577.621423] [<ffffffff802a6e05>] do_ioctl+0x35/0xe0
[ 1577.621428] [<ffffffff802a6f24>] vfs_ioctl+0x74/0x2d0
[ 1577.621435] [<ffffffff802a7215>] sys_ioctl+0x95/0xb0
[ 1577.621442] [<ffffffff80209e8e>] system_call+0x7e/0x83
[ 1577.621452]
[ 1577.621453]
[ 1577.621454] Code: 0f 0b eb fe 0f 1f 80 00 00 00 00 48 81 c7 e0 03 00
00 be 28
[ 1577.621462] RIP [<ffffffff8837d905>]
:kvm:mmu_memory_cache_alloc+0x25/0x30
[ 1577.621471] RSP <ffff8100441819b8>
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720E2AF.3070404-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-25 18:49 ` Avi Kivity
[not found] ` <4720E53A.7040803-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 18:54 ` Fabian Deutsch
1 sibling, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 18:49 UTC (permalink / raw)
To: Anthony Liguori
Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Anthony Liguori wrote:
> Avi Kivity wrote:
>> Haydn Solomon wrote:
>>
>>> I also had a problem installing windows xp. Got the following error
>>>
>>
>>
>> I guess I'll have to test that too.
>>
>
> I hit it again, this time about half-way through the second stage
> install of Windows XP (last time it was almost immediately). This is
> with your updated tree. I'll next try to reproduce with the latest git.
Can you try upping the 'min' parameter below:
> static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
> {
> int r;
>
> kvm_mmu_free_some_pages(vcpu);
> r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
> pte_chain_cache, 4);
> if (r)
> goto out;
> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
> rmap_desc_cache, 1);
> if (r)
> goto out;
> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
> if (r)
> goto out;
> r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
> mmu_page_header_cache, 4);
> out:
> return r;
> }
These are the (4, 1, 8, 4) values in the call to
mmu_topup_memory_cache. Perhaps one of them is too low.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720E53A.7040803-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-25 18:54 ` Anthony Liguori
[not found] ` <4720E65F.8070204-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-25 18:54 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Avi Kivity wrote:
> Anthony Liguori wrote:
>> Avi Kivity wrote:
>>> Haydn Solomon wrote:
>>>
>>>> I also had a problem installing windows xp. Got the following error
>>>>
>>>
>>>
>>> I guess I'll have to test that too.
>>>
>>
>> I hit it again, this time about half-way through the second stage
>> install of Windows XP (last time it was almost immediately). This is
>> with your updated tree. I'll next try to reproduce with the latest git.
>
> Can you try upping the 'min' parameter below:
>
>> static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
>> {
>> int r;
>>
>> kvm_mmu_free_some_pages(vcpu);
>> r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
>> pte_chain_cache, 4);
>> if (r)
>> goto out;
>> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
>> rmap_desc_cache, 1);
>> if (r)
>> goto out;
>> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
>> if (r)
>> goto out;
>> r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
>> mmu_page_header_cache, 4);
>> out:
>> return r;
>> }
>
>
> These are the (4, 1, 8, 4) values in the call to
> mmu_topup_memory_cache. Perhaps one of them is too low.
Sure. Would this be affected at all by your tpr patch? IIUC, if this
is the problem, it should be reproducible with the latest git too?
Regards,
Anthony Liguori
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720E2AF.3070404-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-25 18:49 ` Avi Kivity
@ 2007-10-25 18:54 ` Fabian Deutsch
1 sibling, 0 replies; 53+ messages in thread
From: Fabian Deutsch @ 2007-10-25 18:54 UTC (permalink / raw)
To: Anthony Liguori, avi-atKUWr5tajBWk0Htik3J/w
Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f,
makovick-Re5JQEeQqe8AvxtiuMwx3w
Hey,
> Avi Kivity wrote:
> > Haydn Solomon wrote:
> >
> >> I also had a problem installing windows xp. Got the following error
> >>
> >
> >
> > I guess I'll have to test that too.
> >
>
> I hit it again, this time about half-way through the second stage
> install of Windows XP (last time it was almost immediately). This is
> with your updated tree. I'll next try to reproduce with the latest git.
>
I tried to install a Windows 2003 guest.
I get the following error:
http://pastebin.ca/749466
It appeard during the disk formating process.
- fabiand
> Regards,
>
> Anthony Liguori
>
>
> [ 1577.621100] ------------[ cut here ]------------
> [ 1577.621106] kernel BUG at
> /home/anthony/tmp/2/tpr-opt-1/kernel/mmu.c:308!
> [ 1577.621108] invalid opcode: 0000 [1] SMP
> [ 1577.621111] CPU 1
> [ 1577.621113] Modules linked in: tun kvm_intel kvm i915 drm af_packet
> rfcomm l2cap thinkpad_acpi ppdev acpi_cpufreq cpufreq_stats
> cpufreq_ondemand freq_table cpufreq_userspace cpufreq_conservative
> cpufreq_powersave sbs ac battery bay dock container button video ipv6
> bridge ipt_REJECT xt_state xt_tcpudp iptable_filter ipt_MASQUERADE
> iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nfnetlink ip_tables
> x_tables sbp2 lp arc4 ecb blkcipher snd_hda_intel snd_pcm_oss
> snd_mixer_oss snd_pcm snd_seq_dummy iwl4965 iwlwifi_mac80211 snd_seq_oss
> parport_pc snd_seq_midi snd_rawmidi parport cfg80211 pcmcia hci_usb
> bluetooth snd_seq_midi_event snd_seq snd_timer snd_seq_device intel_agp
> sdhci mmc_core serio_raw psmouse pcspkr yenta_socket rsrc_nonstatic
> pcmcia_core snd soundcore shpchp pci_hotplug snd_page_alloc joydev evdev
> ext3 jbd mbcache usbhid hid sg sr_mod sd_mod cdrom ata_piix ehci_hcd
> ohci1394 ieee1394 ata_generic libata scsi_mod uhci_hcd usbcore e1000
> thermal processor fan fuse apparmor commoncap
> [ 1577.621172] Pid: 7788, comm: qemu-system-x86 Not tainted
> 2.6.22-14-generic #1
> [ 1577.621175] RIP: 0010:[<ffffffff8837d905>] [<ffffffff8837d905>]
> :kvm:mmu_memory_cache_alloc+0x25/0x30
> [ 1577.621188] RSP: 0018:ffff8100441819b8 EFLAGS: 00010246
> [ 1577.621190] RAX: 0000000000000000 RBX: ffffc200010c1968 RCX:
> ffff81001eebc080
> [ 1577.621193] RDX: ffff81001eebc088 RSI: 0000000000000028 RDI:
> ffff8100388543e0
> [ 1577.621195] RBP: ffff81000377f060 R08: 0000000000000000 R09:
> 0000000000000004
> [ 1577.621197] R10: 00000000081ed163 R11: 0000000000000000 R12:
> ffff810038854000
> [ 1577.621200] R13: 0000000000000000 R14: ffff81000377f060 R15:
> ffff810038854000
> [ 1577.621202] FS: 00002b7827310d40(0000) GS:ffff81000102c280(0000)
> knlGS:0000000000000000
> [ 1577.621205] CS: 0010 DS: 002b ES: 002b CR0: 000000008005003b
> [ 1577.621207] CR2: 0000000001002ff8 CR3: 0000000054f45000 CR4:
> 00000000000026e0
> [ 1577.621210] Process qemu-system-x86 (pid: 7788, threadinfo
> ffff810044180000, task ffff81000d4d8dc0)
> [ 1577.621212] Stack: ffffc200010c1968 ffffffff8837da16
> 00000000441c6043 0000000000000002
> [ 1577.621216] 00000000441c6000 ffffffff8837e1ad 00002b7828552000
> 00000000000081ed
> [ 1577.621220] 0000000000000000 0000000000000000 00000000081ed000
> 00000000081ed000
> [ 1577.621223] Call Trace:
> [ 1577.621233] [<ffffffff8837da16>] :kvm:rmap_add+0xf6/0x110
> [ 1577.621243] [<ffffffff8837e1ad>]
> :kvm:paging32_set_pte_common+0x10d/0x2b0
> [ 1577.621258] [<ffffffff8837e399>] :kvm:paging32_set_pte+0x49/0x50
> [ 1577.621269] [<ffffffff8837e9dd>] :kvm:kvm_mmu_pte_write+0x33d/0x3b0
> [ 1577.621287] [<ffffffff883786cd>]
> :kvm:emulator_write_emulated_onepage+0x9d/0x100
> [ 1577.621298] [<ffffffff88380da8>] :kvm:x86_emulate_insn+0x5e8/0x4450
> [ 1577.621308] [<ffffffff88396467>] :kvm_intel:vmcs_readl+0x17/0x20
> [ 1577.621320] [<ffffffff88378cff>] :kvm:emulate_instruction+0x1af/0x2f0
> [ 1577.621328] [<ffffffff88399090>]
> :kvm_intel:handle_exception+0x240/0x2b0
> [ 1577.621336] [<ffffffff88385ab9>] :kvm:apic_update_ppr+0x29/0x60
> [ 1577.621347] [<ffffffff8837aa74>] :kvm:kvm_vcpu_ioctl+0xe54/0x11b0
> [ 1577.621355] [<ffffffff8026e000>] file_read_actor+0x0/0x150
> [ 1577.621366] [<ffffffff8022cacc>] task_rq_lock+0x4c/0x90
> [ 1577.621372] [<ffffffff8022f30c>] try_to_wake_up+0x5c/0x3f0
> [ 1577.621385] [<ffffffff802a84f5>] core_sys_select+0x275/0x300
> [ 1577.621391] [<ffffffff8022ca03>] __wake_up+0x43/0x70
> [ 1577.621402] [<ffffffff80240719>] __dequeue_signal+0x19/0x1d0
> [ 1577.621409] [<ffffffff8023ffce>] recalc_sigpending+0xe/0x30
> [ 1577.621412] [<ffffffff8024212c>] dequeue_signal+0x5c/0x190
> [ 1577.621416] [<ffffffff8024f4f9>] getnstimeofday+0x39/0xa0
> [ 1577.621423] [<ffffffff802a6e05>] do_ioctl+0x35/0xe0
> [ 1577.621428] [<ffffffff802a6f24>] vfs_ioctl+0x74/0x2d0
> [ 1577.621435] [<ffffffff802a7215>] sys_ioctl+0x95/0xb0
> [ 1577.621442] [<ffffffff80209e8e>] system_call+0x7e/0x83
> [ 1577.621452]
> [ 1577.621453]
> [ 1577.621454] Code: 0f 0b eb fe 0f 1f 80 00 00 00 00 48 81 c7 e0 03 00
> 00 be 28
> [ 1577.621462] RIP [<ffffffff8837d905>]
> :kvm:mmu_memory_cache_alloc+0x25/0x30
> [ 1577.621471] RSP <ffff8100441819b8>
>
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems? Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/
> _______________________________________________
> kvm-devel mailing list
> kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
> https://lists.sourceforge.net/lists/listinfo/kvm-devel
--
Fabian Deutsch <fabian.deutsch-Mmb7MZpHnFY@public.gmane.org>
Hinter dem Gartel 26a
D-27711 Osterholz-Scharmbeck
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720E65F.8070204-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-25 19:01 ` Avi Kivity
[not found] ` <4720E80E.5070506-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 19:01 UTC (permalink / raw)
To: Anthony Liguori
Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Anthony Liguori wrote:
>>
>>> static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
>>> {
>>> int r;
>>>
>>> kvm_mmu_free_some_pages(vcpu);
>>> r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
>>> pte_chain_cache, 4);
>>> if (r)
>>> goto out;
>>> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
>>> rmap_desc_cache, 1);
>>> if (r)
>>> goto out;
>>> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
>>> if (r)
>>> goto out;
>>> r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
>>> mmu_page_header_cache, 4);
>>> out:
>>> return r;
>>> }
>>
>>
>> These are the (4, 1, 8, 4) values in the call to
>> mmu_topup_memory_cache. Perhaps one of them is too low.
>
> Sure. Would this be affected at all by your tpr patch?
I believe not, but the code doesn't care what I believe.
> IIUC, if this is the problem, it should be reproducible with the
> latest git too?
One difference is that the tpr patch disables nx. That causes Windows
to go into 32-bit paging mode (nice that it has both pae and nonpae in
the same kernel), which may change things.
You can try booting your host with nx disabled to get the same effect
(or disable nx cpuid in kvm).
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720E80E.5070506-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-25 19:09 ` Haydn Solomon
[not found] ` <b75785ba0710251209sdcba9cdrd2a6eb84c549581a-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-25 21:00 ` Anthony Liguori
2007-10-25 23:31 ` Anthony Liguori
2 siblings, 1 reply; 53+ messages in thread
From: Haydn Solomon @ 2007-10-25 19:09 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
[-- Attachment #1.1: Type: text/plain, Size: 1806 bytes --]
I was able to complete an installation of windows xp using -smp 1. However,
I would like to test on an existing virtual machine with applications
already installed on it. Changing the HAL to ACPI should be enough for me to
test the windows optimization right feature right?
On 10/25/07, Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org> wrote:
>
> Anthony Liguori wrote:
> >>
> >>> static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
> >>> {
> >>> int r;
> >>>
> >>> kvm_mmu_free_some_pages(vcpu);
> >>> r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
> >>> pte_chain_cache, 4);
> >>> if (r)
> >>> goto out;
> >>> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
> >>> rmap_desc_cache, 1);
> >>> if (r)
> >>> goto out;
> >>> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
> >>> if (r)
> >>> goto out;
> >>> r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
> >>> mmu_page_header_cache, 4);
> >>> out:
> >>> return r;
> >>> }
> >>
> >>
> >> These are the (4, 1, 8, 4) values in the call to
> >> mmu_topup_memory_cache. Perhaps one of them is too low.
> >
> > Sure. Would this be affected at all by your tpr patch?
>
> I believe not, but the code doesn't care what I believe.
>
> > IIUC, if this is the problem, it should be reproducible with the
> > latest git too?
>
> One difference is that the tpr patch disables nx. That causes Windows
> to go into 32-bit paging mode (nice that it has both pae and nonpae in
> the same kernel), which may change things.
>
> You can try booting your host with nx disabled to get the same effect
> (or disable nx cpuid in kvm).
>
> --
> error compiling committee.c: too many arguments to function
>
>
[-- Attachment #1.2: Type: text/html, Size: 3074 bytes --]
[-- Attachment #2: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #3: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <b75785ba0710251209sdcba9cdrd2a6eb84c549581a-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
@ 2007-10-25 19:09 ` Avi Kivity
0 siblings, 0 replies; 53+ messages in thread
From: Avi Kivity @ 2007-10-25 19:09 UTC (permalink / raw)
To: Haydn Solomon
Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Haydn Solomon wrote:
> I was able to complete an installation of windows xp using -smp 1.
> However, I would like to test on an existing virtual machine with
> applications already installed on it. Changing the HAL to ACPI should
> be enough for me to test the windows optimization right feature right?
>
Yes.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720E80E.5070506-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 19:09 ` Haydn Solomon
@ 2007-10-25 21:00 ` Anthony Liguori
[not found] ` <472103E8.8070605-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-25 23:31 ` Anthony Liguori
2 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-25 21:00 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Avi Kivity wrote:
> Anthony Liguori wrote:
>>>
>>>> static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
>>>> {
>>>> int r;
>>>>
>>>> kvm_mmu_free_some_pages(vcpu);
>>>> r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
>>>> pte_chain_cache, 4);
>>>> if (r)
>>>> goto out;
>>>> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
>>>> rmap_desc_cache, 1);
>>>> if (r)
>>>> goto out;
>>>> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
>>>> if (r)
>>>> goto out;
>>>> r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
>>>> mmu_page_header_cache, 4);
>>>> out:
>>>> return r;
>>>> }
>>>
>>>
>>> These are the (4, 1, 8, 4) values in the call to
>>> mmu_topup_memory_cache. Perhaps one of them is too low.
>>
>> Sure. Would this be affected at all by your tpr patch?
>
> I believe not, but the code doesn't care what I believe.
>
>> IIUC, if this is the problem, it should be reproducible with the
>> latest git too?
>
> One difference is that the tpr patch disables nx. That causes Windows
> to go into 32-bit paging mode (nice that it has both pae and nonpae in
> the same kernel), which may change things.
>
> You can try booting your host with nx disabled to get the same effect
> (or disable nx cpuid in kvm).
I've disabled NX in KVM and that didn't reproduce the issue in the
current git.
If I double all of the memory caches, I can't seem to reproduce.
However, as soon as I reduce rmap_desc_cache down to 1, I can reproduce.
I'll try to see if just setting the rmap_desc_cache line to 2 is enough
to make the problem go away.
How can the guest provoke this BUG() based on the cache size? Should
the cache size only affect performance?
Regards,
Anthony Liguori
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720E80E.5070506-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 19:09 ` Haydn Solomon
2007-10-25 21:00 ` Anthony Liguori
@ 2007-10-25 23:31 ` Anthony Liguori
[not found] ` <47212748.4070001-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-25 23:31 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
[-- Attachment #1: Type: text/plain, Size: 1142 bytes --]
Avi Kivity wrote:
> Anthony Liguori wrote:
>>>
>>>> static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
>>>> {
>>>> int r;
>>>>
>>>> kvm_mmu_free_some_pages(vcpu);
>>>> r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
>>>> pte_chain_cache, 4);
>>>> if (r)
>>>> goto out;
>>>> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
>>>> rmap_desc_cache, 1);
>>>> if (r)
>>>> goto out;
>>>> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
>>>> if (r)
>>>> goto out;
>>>> r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
>>>> mmu_page_header_cache, 4);
>>>> out:
>>>> return r;
>>>> }
>>>
>>>
>>> These are the (4, 1, 8, 4) values in the call to
>>> mmu_topup_memory_cache. Perhaps one of them is too low.
>>
>> Sure. Would this be affected at all by your tpr patch?
Using the following patch, I'm getting really good results. I'll keep
running test cases tonight and see if I can trigger anything.
Windows is *much* faster with your patch, very nice work!
Regards,
Anthony Liguori
[-- Attachment #2: tpr-out-up-rmap_desc_cache.diff --]
[-- Type: text/x-patch, Size: 919 bytes --]
Subject: [PATCH][TPR OPT] Increase rmap_desc_cache
From: Anthony Liguori <aliguori-r/Jw6+rmf7HQT0dZR+AlfA@public.gmane.org>
Cc: Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
Using kvm-test to replay the second stage of a WinXP Pro install, I can
reliably trigger a BUG_ON() in the mmu. It usually happens during the first
run.
With this patch applied, I've been able to replay the install for the past few
hours (probably 10 or so installs) without hitting the BUG_ON().
Signed-off-by: Anthony Liguori <aliguori-r/Jw6+rmf7HQT0dZR+AlfA@public.gmane.org>
--- a/kernel/mmu.c 2007-10-25 12:36:18.000000000 -0500
+++ b/kernel/mmu.c 2007-10-25 17:09:55.000000000 -0500
@@ -280,7 +280,7 @@
if (r)
goto out;
r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
- rmap_desc_cache, 1);
+ rmap_desc_cache, 2);
if (r)
goto out;
r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
[-- Attachment #3: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #4: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <47212748.4070001-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-26 1:14 ` Haydn Solomon
2007-10-28 16:26 ` Avi Kivity
1 sibling, 0 replies; 53+ messages in thread
From: Haydn Solomon @ 2007-10-26 1:14 UTC (permalink / raw)
To: Anthony Liguori
Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f,
Avi Kivity
[-- Attachment #1.1: Type: text/plain, Size: 1708 bytes --]
I've been running windows xp sp2 all day with acpi uniprocessor HAL and it's
noticeable much faster...blazing fast. I can imagine how much faster it will
be when -smp 2 works. Once it did hang up on me after installing an office
application and prompted for registration online. Other than that it's been
superb. I'll continue using it and look out for anything unusual. Thanks and
great piece of work.
On 10/25/07, Anthony Liguori <anthony-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org> wrote:
>
> Avi Kivity wrote:
> > Anthony Liguori wrote:
> >>>
> >>>> static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
> >>>> {
> >>>> int r;
> >>>>
> >>>> kvm_mmu_free_some_pages(vcpu);
> >>>> r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
> >>>> pte_chain_cache, 4);
> >>>> if (r)
> >>>> goto out;
> >>>> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
> >>>> rmap_desc_cache, 1);
> >>>> if (r)
> >>>> goto out;
> >>>> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
> >>>> if (r)
> >>>> goto out;
> >>>> r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
> >>>> mmu_page_header_cache, 4);
> >>>> out:
> >>>> return r;
> >>>> }
> >>>
> >>>
> >>> These are the (4, 1, 8, 4) values in the call to
> >>> mmu_topup_memory_cache. Perhaps one of them is too low.
> >>
> >> Sure. Would this be affected at all by your tpr patch?
>
> Using the following patch, I'm getting really good results. I'll keep
> running test cases tonight and see if I can trigger anything.
>
> Windows is *much* faster with your patch, very nice work!
>
> Regards,
>
> Anthony Liguori
>
>
[-- Attachment #1.2: Type: text/html, Size: 3075 bytes --]
[-- Attachment #2: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #3: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720E023.8050804-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-25 18:34 ` Avi Kivity
@ 2007-10-26 3:32 ` Dong, Eddie
[not found] ` <10EA09EFD8728347A513008B6B0DA77A0248295E-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
1 sibling, 1 reply; 53+ messages in thread
From: Dong, Eddie @ 2007-10-26 3:32 UTC (permalink / raw)
To: Anthony Liguori, Avi Kivity; +Cc: kvm-devel
> BTW, is it wise to enable this by default for all guests?
> Ignoring the
> fact that we're modifying guest's memory without its knowledge, if a
> guest unmaps the VA mappings for the BIOS then all sorts of problems
> could occur.
>
Good movement!
But, Vista won't work with patching. The memory guard in vista
will make the system refuse to service. Maybe we need a option
to check if it is vista.
Eddie
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <472103E8.8070605-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-26 8:16 ` Avi Kivity
[not found] ` <4721A255.5050603-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-26 8:16 UTC (permalink / raw)
To: Anthony Liguori
Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Anthony Liguori wrote:
> Avi Kivity wrote:
>
>> Anthony Liguori wrote:
>>
>>>>> static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
>>>>> {
>>>>> int r;
>>>>>
>>>>> kvm_mmu_free_some_pages(vcpu);
>>>>> r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
>>>>> pte_chain_cache, 4);
>>>>> if (r)
>>>>> goto out;
>>>>> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
>>>>> rmap_desc_cache, 1);
>>>>> if (r)
>>>>> goto out;
>>>>> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
>>>>> if (r)
>>>>> goto out;
>>>>> r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
>>>>> mmu_page_header_cache, 4);
>>>>> out:
>>>>> return r;
>>>>> }
>>>>>
>>>> These are the (4, 1, 8, 4) values in the call to
>>>> mmu_topup_memory_cache. Perhaps one of them is too low.
>>>>
>>> Sure. Would this be affected at all by your tpr patch?
>>>
>> I believe not, but the code doesn't care what I believe.
>>
>>
>>> IIUC, if this is the problem, it should be reproducible with the
>>> latest git too?
>>>
>> One difference is that the tpr patch disables nx. That causes Windows
>> to go into 32-bit paging mode (nice that it has both pae and nonpae in
>> the same kernel), which may change things.
>>
>> You can try booting your host with nx disabled to get the same effect
>> (or disable nx cpuid in kvm).
>>
>
> I've disabled NX in KVM and that didn't reproduce the issue in the
> current git.
>
> If I double all of the memory caches, I can't seem to reproduce.
> However, as soon as I reduce rmap_desc_cache down to 1, I can reproduce.
>
> I'll try to see if just setting the rmap_desc_cache line to 2 is enough
> to make the problem go away.
>
> How can the guest provoke this BUG() based on the cache size? Should
> the cache size only affect performance?
>
>
The memory caches are a little misnamed; they're really preallocation
buffers.
They serve two purposes: to avoid allocation in atomic contexts (that's
no longer needed since preempt notifiers) and to avoid complex error
recovery paths. We make sure there are enough objects to satisfy worst
case behavior and assume all allocations will work.
Regarding the rmap memory cache failure, I can't think of a reason why
we'll need to add more than one rmap entry per fault.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <10EA09EFD8728347A513008B6B0DA77A0248295E-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
@ 2007-10-26 8:58 ` Avi Kivity
[not found] ` <4721AC51.3090108-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-26 13:20 ` Anthony Liguori
2007-10-26 14:08 ` Anthony Liguori
2 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-26 8:58 UTC (permalink / raw)
To: Dong, Eddie; +Cc: kvm-devel
Dong, Eddie wrote:
>> BTW, is it wise to enable this by default for all guests?
>> Ignoring the
>> fact that we're modifying guest's memory without its knowledge, if a
>> guest unmaps the VA mappings for the BIOS then all sorts of problems
>> could occur.
>>
>>
> Good movement!
>
> But, Vista won't work with patching. The memory guard in vista
> will make the system refuse to service. Maybe we need a option
> to check if it is vista.
>
>
Thanks for the hint; I'll add that. I think Vista hits the tpr much
less frequently, so it can work well without the optimization.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4721AC51.3090108-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-26 9:46 ` Dong, Eddie
[not found] ` <10EA09EFD8728347A513008B6B0DA77A02482C0D-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Dong, Eddie @ 2007-10-26 9:46 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Dong, Eddie wrote:
>>> BTW, is it wise to enable this by default for all guests?
>>> Ignoring the
>>> fact that we're modifying guest's memory without its knowledge, if a
>>> guest unmaps the VA mappings for the BIOS then all sorts of
>>> problems could occur.
>>>
>>>
>> Good movement!
>>
>> But, Vista won't work with patching. The memory guard in vista
>> will make the system refuse to service. Maybe we need a option to
>> check if it is vista.
>>
>>
>
> Thanks for the hint; I'll add that. I think Vista hits the tpr much
> less frequently, so it can work well without the optimization.
>
Curious: How do u know ROM is mapped 0xf00000000 in Windows?
Eddie
kvm_get_sregs(kvm_context, env->cpu_index, &sregs);
probe = (rip & 0xf0000000) + 0xe0000;
phys = map_addr(&sregs, probe, &perms);
if (phys != 0xe0000)
return 0;
printf("bios ok at %lx\n", (long)probe);
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720D122.4070606-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
` (2 preceding siblings ...)
2007-10-25 18:27 ` Anthony Liguori
@ 2007-10-26 9:47 ` Gildas
[not found] ` <b2ace7f20710260247s5b2a32cay5112a8931d57402f-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-29 15:04 ` Test for the feature, RE: [RFT] kvm with Windows optimization Zhao, Yunfeng
4 siblings, 1 reply; 53+ messages in thread
From: Gildas @ 2007-10-26 9:47 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
[-- Attachment #1: Type: text/plain, Size: 3289 bytes --]
2007/10/25, Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org>:
> This is a request for testing of an experimental kvm feature that
> dramatically accelerates some Windows releases (when running with the
> ACPI HAL, and especially with guest SMP). The feature detects accesses
> by the guest to the Task Priority Register (TPR) and patches them at
> runtime to a kvm-friendly code snipped that is provided by the BIOS.
>
> The upshot of all that is that
> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
> required, and Windows SMP no longer runs like a dog; it's quite snappy
> from my very limited testing.
>
> Please download the test release from
> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
> Once it has received some exposure, I'll merge it into mainline.
>
> Credit for the original idea is due to Ben Serebrin.
>
> --
> error compiling committee.c: too many arguments to function
Hi Avi,
On an intel machine running 64 bits ubuntu with kernel 2.6.20, using
the archive downloaded this morning at 10 o'clock GMT with the
following md5sum:
6a793d217a067ede35b41684395446e9 ../sources/tpr-opt-1.tar.gz
I tried to install windows xp sp2 with the following command line:
qemu-system-x86_64 -smp 2 -m 1024 -hda /dev/vg1/winxp -cdrom
/home/gl03/iso/xpsp2_install_cd.iso
First part of the install goes fine but after the reboot it BSOD with
DRIVER_IRQL_NOT_LESS_OR_EQUAL (see snapshot included).
Latest lines of dmesg:
[83827.197075] Fault when IDT_Vectoring
[83827.209680] Fault when IDT_Vectoring
[83827.209733] Fault when IDT_Vectoring
[83827.769998] Fault when IDT_Vectoring
[83827.770056] Fault when IDT_Vectoring
[83828.703089] Fault when IDT_Vectoring
[83828.705896] Fault when IDT_Vectoring
[83828.710527] Fault when IDT_Vectoring
[83828.718736] Fault when IDT_Vectoring
[83828.747251] Fault when IDT_Vectoring
[83828.774862] Fault when IDT_Vectoring
[83830.262231] Fault when IDT_Vectoring
[83838.101244] Fault when IDT_Vectoring
[83841.053300] Fault when IDT_Vectoring
[83841.053359] Fault when IDT_Vectoring
[83858.432652] Fault when IDT_Vectoring
[83858.432693] Fault when IDT_Vectoring
Latest lines in the console:
check insn
rip: 807033de
insn: c7 05
instruction ok at 807033e4 tpr fffe0080
check bios
bios ok at 800e0000
vapic_phys e2000
patching insn at 807033de
insn: c7 05
patched code: 807033de 68 41 00 00 00 e8 fc dc 9d ff
check insn
rip: 80703b39
insn: 8b 0d
instruction ok at 80703b3f tpr fffe0080
check bios
bios ok at 800e0000
vapic_phys e2000
patching insn at 80703b39
insn: 8b 0d
patched code: 80703b39 90 e8 71 d5 9d ff a3 80 00 fe
check insn
rip: 80703b3f
insn: a3 80
instruction ok at 80703b44 tpr fffe0080
check bios
bios ok at 800e0000
vapic_phys e2000
patching insn at 80703b3f
insn: a3 80
patched code: 80703b3f e8 99 d5 9d ff 9d 83 c4 08 c1
check insn
rip: 807039cc
insn: 89 0d
instruction ok at 807039d2 tpr fffe0080
check bios
bios ok at 800e0000
vapic_phys e2000
patching insn at 807039cc
insn: 89 0d
patched code: 807039cc 51 e8 12 d7 9d ff a1 80 00 fe
check insn
rip: 807039d2
insn: a1 80
instruction ok at 807039d7 tpr fffe0080
check bios
bios ok at 800e0000
vapic_phys e2000
patching insn at 807039d2
insn: a1 80
patched code: 807039d2 e8 a9 d6 9d ff 33 c0 f3 90 c3
Regards,
Gildas
[-- Attachment #2: winxp_ptr_opt_BSOD.png --]
[-- Type: image/png, Size: 11971 bytes --]
[-- Attachment #3: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #4: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <10EA09EFD8728347A513008B6B0DA77A02482C0D-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
@ 2007-10-26 10:01 ` Avi Kivity
0 siblings, 0 replies; 53+ messages in thread
From: Avi Kivity @ 2007-10-26 10:01 UTC (permalink / raw)
To: Dong, Eddie; +Cc: kvm-devel
Dong, Eddie wrote:
>>>
>>>
>> Thanks for the hint; I'll add that. I think Vista hits the tpr much
>> less frequently, so it can work well without the optimization.
>>
>>
> Curious: How do u know ROM is mapped 0xf00000000 in Windows?
> Eddie
>
>
> kvm_get_sregs(kvm_context, env->cpu_index, &sregs);
>
> probe = (rip & 0xf0000000) + 0xe0000;
> phys = map_addr(&sregs, probe, &perms);
> if (phys != 0xe0000)
> return 0;
> printf("bios ok at %lx\n", (long)probe);
>
I checked :)
It's actually not mapped at 0xf0000000. On normal Windows XP it is
mapped at 0x80000000, with /3GB it is mapped at 0xe0000000. The code
checks it is within the same 256MB segment as the code that's hitting
tpr. It could probably be improved.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <b2ace7f20710260247s5b2a32cay5112a8931d57402f-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
@ 2007-10-26 10:02 ` Avi Kivity
[not found] ` <4721BB45.20906-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-26 10:02 UTC (permalink / raw)
To: Gildas; +Cc: kvm-devel
Gildas wrote:
> 2007/10/25, Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org>:
>
>> This is a request for testing of an experimental kvm feature that
>> dramatically accelerates some Windows releases (when running with the
>> ACPI HAL, and especially with guest SMP). The feature detects accesses
>> by the guest to the Task Priority Register (TPR) and patches them at
>> runtime to a kvm-friendly code snipped that is provided by the BIOS.
>>
>> The upshot of all that is that
>> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
>> required, and Windows SMP no longer runs like a dog; it's quite snappy
>> from my very limited testing.
>>
>> Please download the test release from
>> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
>> Once it has received some exposure, I'll merge it into mainline.
>>
>> Credit for the original idea is due to Ben Serebrin.
>>
>> --
>> error compiling committee.c: too many arguments to function
>>
>
> Hi Avi,
>
> On an intel machine running 64 bits ubuntu with kernel 2.6.20, using
> the archive downloaded this morning at 10 o'clock GMT with the
> following md5sum:
>
>
Right, installs seem not to like this release, but running an existing
VM seems to work fine (mostly).
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4720DC12.8050303-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 18:15 ` Haydn Solomon
@ 2007-10-26 10:09 ` Avi Kivity
[not found] ` <4721BCCD.4000401-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
1 sibling, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-26 10:09 UTC (permalink / raw)
To: Jindrich Makovicka; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
[-- Attachment #1: Type: text/plain, Size: 813 bytes --]
Avi Kivity wrote:
> Jindrich Makovicka wrote:
>
>> On Thu, 25 Oct 2007 13:39:33 -0400
>> "Haydn Solomon" <haydn.solomon-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> wrote:
>>
>>
>>
>>> Thanks, that was quick.
>>>
>>>
>> Finally, this (pre)release solved the long standing Java IE Plugin
>> lockup problem for me. Thanks a lot!
>>
>>
>>
>
> No, this release is meant to cause problems, not fix them.
>
> (but thanks for the reminder)
>
>
It's probably due to disabling NX (which is an unwanted side effect of
this). Java generates executable code, so it probably needs to modify
protection attributes. Maybe we're bad at this.
Can you check the attached patch? Against normal kvm, not the windows
accelerator.
--
error compiling committee.c: too many arguments to function
[-- Attachment #2: no-nx.patch --]
[-- Type: text/x-patch, Size: 392 bytes --]
diff --git a/drivers/kvm/x86.c b/drivers/kvm/x86.c
index 1fe209d..e08e749 100644
--- a/drivers/kvm/x86.c
+++ b/drivers/kvm/x86.c
@@ -194,7 +194,7 @@ static void cpuid_fix_nx_cap(struct kvm_vcpu *vcpu)
break;
}
}
- if (entry && (entry->edx & (1 << 20)) && !(efer & EFER_NX)) {
+ if (entry) {
entry->edx &= ~(1 << 20);
printk(KERN_INFO "kvm: guest NX capability removed\n");
}
[-- Attachment #3: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #4: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply related [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4721BB45.20906-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-26 10:29 ` Gildas
[not found] ` <b2ace7f20710260329p1f1a8459q68c8a2274a5731c3-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Gildas @ 2007-10-26 10:29 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
2007/10/26, Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org>:
> Gildas wrote:
> > 2007/10/25, Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org>:
> >
> >> This is a request for testing of an experimental kvm feature that
> >> dramatically accelerates some Windows releases (when running with the
> >> ACPI HAL, and especially with guest SMP). The feature detects accesses
> >> by the guest to the Task Priority Register (TPR) and patches them at
> >> runtime to a kvm-friendly code snipped that is provided by the BIOS.
> >>
> >> The upshot of all that is that
> >> http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
> >> required, and Windows SMP no longer runs like a dog; it's quite snappy
> >> from my very limited testing.
> >>
> >> Please download the test release from
> >> http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
> >> Once it has received some exposure, I'll merge it into mainline.
> >>
> >> Credit for the original idea is due to Ben Serebrin.
> >>
> >> --
> >> error compiling committee.c: too many arguments to function
> >>
> >
> > Hi Avi,
> >
> > On an intel machine running 64 bits ubuntu with kernel 2.6.20, using
> > the archive downloaded this morning at 10 o'clock GMT with the
> > following md5sum:
> >
> >
>
> Right, installs seem not to like this release, but running an existing
> VM seems to work fine (mostly).
A windows 2000 sp4 installation crashes as well (this time with
WORKER_THREAD_RETURNED_A_BAD_IRQL). This was reproduceable. I've
restarted the installation with -no-kvm-irq and it seems to work fine
so long (it didn't crash where it crashed previously).
I've restarted windows xp install and this time I had the following:
[86852.991254] ------------[ cut here ]------------
[86852.991260] kernel BUG at /home/gl03/sources/tpr-opt-1/kernel/mmu.c:308!
[86852.991262] invalid opcode: 0000 [1] SMP
[86852.991265] CPU 1
[86852.991267] Modules linked in: kvm_intel kvm binfmt_misc rfcomm
l2cap bluetooth ppdev i915 drm acpi_cpufreq cpufreq_ondemand
cpufreq_powersave cpufreq_stats freq_table cpufreq_userspace
cpufreq_conservative dev_acpi sony_acpi tc1100_wmi pcc_acpi sbs i2c_ec
i2c_core battery ac video asus_acpi button backlight dock container
ipv6 nls_utf8 ntfs sbp2 lp fuse joydev pcmcia snd_hda_intel
snd_hda_codec snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy
snd_seq_oss snd_seq_midi snd_rawmidi yenta_socket rsrc_nonstatic
pcmcia_core iTCO_wdt iTCO_vendor_support af_packet snd_seq_midi_event
snd_seq ipw3945 tifm_7xx1 parport_pc parport sdhci snd_timer
snd_seq_device pcspkr tpm_infineon tpm tpm_bios serio_raw ieee80211
ieee80211_crypt mmc_core intel_agp psmouse tifm_core snd soundcore
snd_page_alloc shpchp pci_hotplug tsdev evdev sr_mod cdrom generic
ext3 jbd mbcache sg sd_mod ohci1394 ieee1394 ata_piix tg3 ahci
ehci_hcd uhci_hcd usbcore ata_generic libata scsi_mod thermal
processor fan dm_mod fbcon tileblit font bitblit softcursor vesafb
cfbcopyarea cfbimgblt cfbfillrect capability commoncap
[86852.991337] Pid: 12492, comm: qemu-system-x86 Not tainted
2.6.20-16-generic #2
[86852.991340] RIP: 0010:[<ffffffff883aa877>] [<ffffffff883aa877>]
:kvm:mmu_memory_cache_alloc+0x7/0x30
[86852.991354] RSP: 0018:ffff810024b039c8 EFLAGS: 00010246
[86852.991356] RAX: 0000000000000000 RBX: ffffc2000082a868 RCX: ffff810033c54080
[86852.991359] RDX: ffff810033c54088 RSI: 0000000000000028 RDI: ffff810025232820
[86852.991361] RBP: ffff810034771750 R08: 0000000000000000 R09: 0000000000000004
[86852.991363] R10: 00000000145cd963 R11: 0000000000000000 R12: ffff810025232440
[86852.991366] R13: 0000000000000000 R14: ffff810034771750 R15: ffff810025232440
[86852.991369] FS: 00002acc64f8a5b0(0000) GS:ffff81007dbd8ec0(0000)
knlGS:0000000000000000
[86852.991372] CS: 0010 DS: 002b ES: 002b CR0: 000000008005003b
[86852.991374] CR2: 0000000001001ad8 CR3: 0000000008b86000 CR4: 00000000000026e0
[86852.991377] Process qemu-system-x86 (pid: 12492, threadinfo
ffff810024b02000, task ffff8100713c9820)
[86852.991379] Stack: ffffc2000082a868 ffffffff883aa95c
000000002a6c6043 0000000000000002
[86852.991384] 000000002a6c6000 ffffffff883ab2ab 0000000000000001
00000000000145cd
[86852.991388] 0000000000000000 0000000000000000 00000000145cd000
00000000145cd000
[86852.991391] Call Trace:
[86852.991402] [<ffffffff883aa95c>] :kvm:rmap_add+0xac/0x130
[86852.991414] [<ffffffff883ab2ab>] :kvm:paging32_set_pte_common+0x1fb/0x270
[86852.991434] [<ffffffff883ab369>] :kvm:paging32_set_pte+0x49/0x50
[86852.991448] [<ffffffff883ab8b3>] :kvm:kvm_mmu_pte_write+0x273/0x380
[86852.991472] [<ffffffff883a5685>]
:kvm:emulator_write_emulated_onepage+0x85/0x100
[86852.991485] [<ffffffff883b022a>] :kvm:x86_emulate_insn+0x2b9a/0x4200
[86852.991497] [<ffffffff883c24f7>] :kvm_intel:vmcs_readl+0x17/0x20
[86852.991512] [<ffffffff883a5c74>] :kvm:emulate_instruction+0x174/0x2d0
[86852.991524] [<ffffffff883c501f>] :kvm_intel:handle_exception+0x18f/0x290
[86852.991532] [<ffffffff883b2739>] :kvm:apic_update_ppr+0x29/0x60
[86852.991546] [<ffffffff883a6fb1>] :kvm:kvm_vcpu_ioctl+0x411/0x1120
[86852.991553] [<ffffffff8028b6e8>] __activate_task+0x38/0x60
[86852.991560] [<ffffffff80248dac>] try_to_wake_up+0x3dc/0x400
[86852.991577] [<ffffffff8028b454>] __wake_up_common+0x44/0x80
[86852.991587] [<ffffffff8022f7a3>] __wake_up+0x43/0x70
[86852.991598] [<ffffffff802dd1e9>] core_sys_select+0x289/0x2e0
[86852.991620] [<ffffffff8029a058>] __dequeue_signal+0x168/0x1e0
[86852.991629] [<ffffffff80270a74>] do_gettimeofday+0x44/0x90
[86852.991637] [<ffffffff8025de20>] getnstimeofday+0x10/0x30
[86852.991648] [<ffffffff8024362f>] do_ioctl+0x2f/0xa0
[86852.991654] [<ffffffff80231592>] vfs_ioctl+0x2a2/0x2e0
[86852.991664] [<ffffffff8024e7dc>] sys_ioctl+0x6c/0xb0
[86852.991673] [<ffffffff8026111e>] system_call+0x7e/0x83
[86852.991688]
[86852.991690]
[86852.991690] Code: 0f 0b 0f 1f 80 00 00 00 00 eb fe 83 e8 01 48 89
f2 31 f6 89
[86852.991700] RIP [<ffffffff883aa877>] :kvm:mmu_memory_cache_alloc+0x7/0x30
[86852.991709] RSP <ffff810024b039c8>
[86852.991711] <6>kvm: guest NX capability removed
[86883.412300] kvm: guest NX capability removed
process is in defunct/zombi mode now and can't be killed.
Regards,
Gildas
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <b2ace7f20710260329p1f1a8459q68c8a2274a5731c3-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
@ 2007-10-26 10:34 ` Avi Kivity
[not found] ` <4721C2B2.7000205-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-26 10:34 UTC (permalink / raw)
To: Gildas; +Cc: kvm-devel
Gildas wrote:
>>>
>> Right, installs seem not to like this release, but running an existing
>> VM seems to work fine (mostly).
>>
>
> A windows 2000 sp4 installation crashes as well (this time with
> WORKER_THREAD_RETURNED_A_BAD_IRQL). This was reproduceable. I've
> restarted the installation with -no-kvm-irq and it seems to work fine
> so long (it didn't crash where it crashed previously).
>
no-kvm-irq kills the optimization, though.
> I've restarted windows xp install and this time I had the following:
> [86852.991254] ------------[ cut here ]------------
> [86852.991260] kernel BUG at /home/gl03/sources/tpr-opt-1/kernel/mmu.c:308!
>
Anthony posted a fix for this (which I don't understand yet).
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Remove hardware from host and add to guest?
[not found] ` <4721C2B2.7000205-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-26 12:42 ` Back, Michael (ext)
[not found] ` <003F437218F04842B2A6976FA19368B18B85DB-EA/R+3GEQKtclD5KMHf1bFOnKfhBOm/VrE5yTffgRl4@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Back, Michael (ext) @ 2007-10-26 12:42 UTC (permalink / raw)
To: kvm-devel
Hi,
is it with kvm possible to remove a hardware (for example: a second
PCI-E Graphiccard)- mybe on boottime like by xen.
And add dedicated this removed hardware (for example: a second PCI-E
Graphiccard) to a guest system (for example: to improve the 3D-Graphic).
With best regards,
Michael
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <10EA09EFD8728347A513008B6B0DA77A0248295E-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2007-10-26 8:58 ` Avi Kivity
@ 2007-10-26 13:20 ` Anthony Liguori
[not found] ` <4721E98F.3020807-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-26 14:08 ` Anthony Liguori
2 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-26 13:20 UTC (permalink / raw)
To: Dong, Eddie; +Cc: kvm-devel, Avi Kivity
Dong, Eddie wrote:
>> BTW, is it wise to enable this by default for all guests?
>> Ignoring the
>> fact that we're modifying guest's memory without its knowledge, if a
>> guest unmaps the VA mappings for the BIOS then all sorts of problems
>> could occur.
>>
>>
> Good movement!
>
> But, Vista won't work with patching. The memory guard in vista
> will make the system refuse to service. Maybe we need a option
> to check if it is vista.
>
Are you sure that Vista isn't just verifying memory during
startup/driver load? Seems odd to periodically scan memory.
In the recently released Windows Hypervisor specification, in section
13.2.2 (Local APIC Memory-mapped Accesses), it's dictated that the APIC
can only be accessed through 6 instructions. They are all >= 5 byte
instructions. When I first saw that, I figured they were also patching.
Regards,
Anthony Liguori
> Eddie
>
>
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4721E98F.3020807-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-26 13:24 ` Avi Kivity
[not found] ` <4721EAA9.1090202-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-26 13:24 UTC (permalink / raw)
To: Anthony Liguori; +Cc: kvm-devel
Anthony Liguori wrote:
>>
>> Good movement!
>>
>> But, Vista won't work with patching. The memory guard in vista
>> will make the system refuse to service. Maybe we need a option
>> to check if it is vista.
>>
>>
>
> Are you sure that Vista isn't just verifying memory during
> startup/driver load? Seems odd to periodically scan memory.
>
> In the recently released Windows Hypervisor specification, in section
> 13.2.2 (Local APIC Memory-mapped Accesses), it's dictated that the APIC
> can only be accessed through 6 instructions. They are all >= 5 byte
> instructions. When I first saw that, I figured they were also patching.
>
Six? My hack patches five. Which one did I miss?
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4721EAA9.1090202-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-26 13:35 ` Anthony Liguori
[not found] ` <4721ED0F.7080404-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-26 13:35 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Anthony Liguori wrote:
>>>
>>> Good movement!
>>>
>>> But, Vista won't work with patching. The memory guard in vista will
>>> make the system refuse to service. Maybe we need a option
>>> to check if it is vista.
>>>
>>
>> Are you sure that Vista isn't just verifying memory during
>> startup/driver load? Seems odd to periodically scan memory.
>>
>> In the recently released Windows Hypervisor specification, in section
>> 13.2.2 (Local APIC Memory-mapped Accesses), it's dictated that the
>> APIC can only be accessed through 6 instructions. They are all >= 5
>> byte instructions. When I first saw that, I figured they were also
>> patching.
>>
>
> Six? My hack patches five. Which one did I miss?
FF /6 PUSH m32
Also note, that it says that all addresses are required to be 4-byte
aligned.
Regards,
Anthony LIguori
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4721ED0F.7080404-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-26 13:38 ` Avi Kivity
[not found] ` <4721EDED.8090204-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-26 13:38 UTC (permalink / raw)
To: Anthony Liguori; +Cc: kvm-devel
Anthony Liguori wrote:
> Avi Kivity wrote:
>> Anthony Liguori wrote:
>>>>
>>>> Good movement!
>>>>
>>>> But, Vista won't work with patching. The memory guard in vista will
>>>> make the system refuse to service. Maybe we need a option
>>>> to check if it is vista.
>>>>
>>>
>>> Are you sure that Vista isn't just verifying memory during
>>> startup/driver load? Seems odd to periodically scan memory.
>>>
>>> In the recently released Windows Hypervisor specification, in
>>> section 13.2.2 (Local APIC Memory-mapped Accesses), it's dictated
>>> that the APIC can only be accessed through 6 instructions. They are
>>> all >= 5 byte instructions. When I first saw that, I figured they
>>> were also patching.
>>>
>>
>> Six? My hack patches five. Which one did I miss?
>
> FF /6 PUSH m32
>
Thanks. That's easy to add.
> Also note, that it says that all addresses are required to be 4-byte
> aligned.
Which addresses? The tpr address is obviously 4 byte aligned.
The instruction pointer?!
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4721EDED.8090204-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-26 13:47 ` Anthony Liguori
0 siblings, 0 replies; 53+ messages in thread
From: Anthony Liguori @ 2007-10-26 13:47 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Anthony Liguori wrote:
>> Avi Kivity wrote:
>>> Anthony Liguori wrote:
>>>>>
>>>>> Good movement!
>>>>>
>>>>> But, Vista won't work with patching. The memory guard in vista
>>>>> will make the system refuse to service. Maybe we need a option
>>>>> to check if it is vista.
>>>>>
>>>>
>>>> Are you sure that Vista isn't just verifying memory during
>>>> startup/driver load? Seems odd to periodically scan memory.
>>>>
>>>> In the recently released Windows Hypervisor specification, in
>>>> section 13.2.2 (Local APIC Memory-mapped Accesses), it's dictated
>>>> that the APIC can only be accessed through 6 instructions. They
>>>> are all >= 5 byte instructions. When I first saw that, I figured
>>>> they were also patching.
>>>>
>>>
>>> Six? My hack patches five. Which one did I miss?
>>
>> FF /6 PUSH m32
>>
>
> Thanks. That's easy to add.
>
>> Also note, that it says that all addresses are required to be 4-byte
>> aligned.
>
> Which addresses? The tpr address is obviously 4 byte aligned.
The tpr address.
Regards,
Anthony Liguori
> The instruction pointer?!
>
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4721A255.5050603-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-26 13:52 ` Anthony Liguori
0 siblings, 0 replies; 53+ messages in thread
From: Anthony Liguori @ 2007-10-26 13:52 UTC (permalink / raw)
To: Avi Kivity; +Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Avi Kivity wrote:
> Anthony Liguori wrote:
>> Avi Kivity wrote:
>>
>>> Anthony Liguori wrote:
>>>
>>>>>> static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
>>>>>> {
>>>>>> int r;
>>>>>>
>>>>>> kvm_mmu_free_some_pages(vcpu);
>>>>>> r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
>>>>>> pte_chain_cache, 4);
>>>>>> if (r)
>>>>>> goto out;
>>>>>> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
>>>>>> rmap_desc_cache, 1);
>>>>>> if (r)
>>>>>> goto out;
>>>>>> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
>>>>>> if (r)
>>>>>> goto out;
>>>>>> r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
>>>>>> mmu_page_header_cache, 4);
>>>>>> out:
>>>>>> return r;
>>>>>> }
>>>>>>
>>>>> These are the (4, 1, 8, 4) values in the call to
>>>>> mmu_topup_memory_cache. Perhaps one of them is too low.
>>>>>
>>>> Sure. Would this be affected at all by your tpr patch?
>>> I believe not, but the code doesn't care what I believe.
>>>
>>>
>>>> IIUC, if this is the problem, it should be reproducible with the
>>>> latest git too?
>>>>
>>> One difference is that the tpr patch disables nx. That causes
>>> Windows to go into 32-bit paging mode (nice that it has both pae and
>>> nonpae in the same kernel), which may change things.
>>>
>>> You can try booting your host with nx disabled to get the same
>>> effect (or disable nx cpuid in kvm).
>>>
>>
>> I've disabled NX in KVM and that didn't reproduce the issue in the
>> current git.
>>
>> If I double all of the memory caches, I can't seem to reproduce.
>> However, as soon as I reduce rmap_desc_cache down to 1, I can reproduce.
>>
>> I'll try to see if just setting the rmap_desc_cache line to 2 is
>> enough to make the problem go away.
>>
>> How can the guest provoke this BUG() based on the cache size? Should
>> the cache size only affect performance?
>>
>>
>
> The memory caches are a little misnamed; they're really preallocation
> buffers.
>
> They serve two purposes: to avoid allocation in atomic contexts
> (that's no longer needed since preempt notifiers) and to avoid complex
> error recovery paths. We make sure there are enough objects to
> satisfy worst case behavior and assume all allocations will work.
FWIW, two people in IRC just reported the same BUG in kvm-48 and the
nightly snapshot. I asked them both to post more thorough descriptions
here. That leads me to suspect that the problem wasn't introduced by
your TPR optimization.
Regards,
Anthony Liguori
> Regarding the rmap memory cache failure, I can't think of a reason why
> we'll need to add more than one rmap entry per fault.
>
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <10EA09EFD8728347A513008B6B0DA77A0248295E-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2007-10-26 8:58 ` Avi Kivity
2007-10-26 13:20 ` Anthony Liguori
@ 2007-10-26 14:08 ` Anthony Liguori
[not found] ` <4721F4DC.2010501-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-26 14:08 UTC (permalink / raw)
To: Dong, Eddie; +Cc: kvm-devel, Avi Kivity
Dong, Eddie wrote:
>> BTW, is it wise to enable this by default for all guests?
>> Ignoring the
>> fact that we're modifying guest's memory without its knowledge, if a
>> guest unmaps the VA mappings for the BIOS then all sorts of problems
>> could occur.
>>
>>
> Good movement!
>
> But, Vista won't work with patching. The memory guard in vista
> will make the system refuse to service. Maybe we need a option
> to check if it is vista.
>
FWIW, I successfully installed and booted Vista Enterprise Edition with
the TPR optimization patch.
Regards,
Anthony Liguori
> Eddie
>
>
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4721BCCD.4000401-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-27 18:45 ` Jindrich Makovicka
0 siblings, 0 replies; 53+ messages in thread
From: Jindrich Makovicka @ 2007-10-27 18:45 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
On Fri, 26 Oct 2007 12:09:17 +0200
Avi Kivity <avi-atKUWr5tajBWk0Htik3J/w@public.gmane.org> wrote:
> Avi Kivity wrote:
> It's probably due to disabling NX (which is an unwanted side effect
> of this). Java generates executable code, so it probably needs to
> modify protection attributes. Maybe we're bad at this.
>
> Can you check the attached patch? Against normal kvm, not the
> windows accelerator.
You are right, patched kvm-48 works too. It seems that NX is the
culprit.
--
Jindrich Makovicka
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: Remove hardware from host and add to guest?
[not found] ` <003F437218F04842B2A6976FA19368B18B85DB-EA/R+3GEQKtclD5KMHf1bFOnKfhBOm/VrE5yTffgRl4@public.gmane.org>
@ 2007-10-27 22:25 ` Dor Laor
0 siblings, 0 replies; 53+ messages in thread
From: Dor Laor @ 2007-10-27 22:25 UTC (permalink / raw)
To: Back, Michael (ext); +Cc: kvm-devel
Back, Michael (ext) wrote:
>
> Hi,
> is it with kvm possible to remove a hardware (for example: a second
> PCI-E Graphiccard)- mybe on boottime like by xen.
> And add dedicated this removed hardware (for example: a second PCI-E
> Graphiccard) to a guest system (for example: to improve the 3D-Graphic).
>
> With best regards,
> Michael
>
We have code for regular pci and non-shared interrupts.
It is capable of doing nic pass through. We're in the process of merging
them with
latest kvm code.
Regards,
Dor.
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems? Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/
> _______________________________________________
> kvm-devel mailing list
> kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
> https://lists.sourceforge.net/lists/listinfo/kvm-devel
>
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <47212748.4070001-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-26 1:14 ` Haydn Solomon
@ 2007-10-28 16:26 ` Avi Kivity
1 sibling, 0 replies; 53+ messages in thread
From: Avi Kivity @ 2007-10-28 16:26 UTC (permalink / raw)
To: Anthony Liguori
Cc: Jindrich Makovicka, kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
Anthony Liguori wrote:
>
> Using the following patch, I'm getting really good results.
> --- a/kernel/mmu.c 2007-10-25 12:36:18.000000000 -0500
> +++ b/kernel/mmu.c 2007-10-25 17:09:55.000000000 -0500
> @@ -280,7 +280,7 @@
> if (r)
> goto out;
> r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
> - rmap_desc_cache, 1);
> + rmap_desc_cache, 2);
> if (r)
> goto out;
> r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
>
I think I know what's happening.
We get a write page fault on a page that's not shadowed. Turns out it's
a page table page, so we map it read-only, and also rmap it.
Since it's a page table page, we emulate the write and try to map the
just-written pte as well, since it's likely somebody will access the
memory pointed-to by the pte. This consumes another rmap entry, and we
go boom.
This didn't happen previously, because we didn't rmap read-only pages,
so the first mapping did not consume an rmap entry. With swapping
enabled, we do map read only pages, so we see this.
The correct fix is probably to call mmu_topup_memory_pages() from where
we do the emulated write, but this seems difficult.
--
error compiling committee.c: too many arguments to function
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4721F4DC.2010501-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-29 8:18 ` Dong, Eddie
[not found] ` <10EA09EFD8728347A513008B6B0DA77A024CE569-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Dong, Eddie @ 2007-10-29 8:18 UTC (permalink / raw)
To: Anthony Liguori; +Cc: kvm-devel, Avi Kivity
Anthony Liguori wrote:
> Dong, Eddie wrote:
>>> BTW, is it wise to enable this by default for all guests?
>>> Ignoring the
>>> fact that we're modifying guest's memory without its knowledge, if a
>>> guest unmaps the VA mappings for the BIOS then all sorts of
>>> problems could occur.
>>>
>>>
>> Good movement!
>>
>> But, Vista won't work with patching. The memory guard in vista
>> will make the system refuse to service. Maybe we need a option to
>> check if it is vista.
>>
>
> FWIW, I successfully installed and booted Vista Enterprise Edition
> with the TPR optimization patch.
>
32 bits or 64 bits?
See
http://blogs.msdn.com/windowsvistasecurity/archive/2006/08/11/695993.asp
x
It says:
There are many brand new security features in Windows Vista, but Kernel
Patch Protection is actually not one of them. Kernel Patch Protection
was first supported on x64 (AMD64 and Intel EMT64T) CPU architecture
versions of Microsoft Windows including Microsoft Windows Server 2003
SP1 and Windows XP Microsoft Windows XP Professional x64 Edition. (Patch
protection is currently not supported on x86 or ia64 architectures.)
Though, as the use of 64-bit computers is increasing, Windows Vista
users will end up benefiting most from this technology.
Seems Vista 32 is not using patchguard yet, not sure about next SP.
If above is true, it looks like we are OK for current stage.
thx,eddie
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <10EA09EFD8728347A513008B6B0DA77A024CE569-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
@ 2007-10-29 13:29 ` Anthony Liguori
[not found] ` <4725E022.6070202-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-29 13:29 UTC (permalink / raw)
To: Dong, Eddie; +Cc: kvm-devel, Avi Kivity
Dong, Eddie wrote:
> Anthony Liguori wrote:
>
>> Dong, Eddie wrote:
>>
>>>> BTW, is it wise to enable this by default for all guests?
>>>> Ignoring the
>>>> fact that we're modifying guest's memory without its knowledge, if a
>>>> guest unmaps the VA mappings for the BIOS then all sorts of
>>>> problems could occur.
>>>>
>>>>
>>>>
>>> Good movement!
>>>
>>> But, Vista won't work with patching. The memory guard in vista
>>> will make the system refuse to service. Maybe we need a option to
>>> check if it is vista.
>>>
>>>
>> FWIW, I successfully installed and booted Vista Enterprise Edition
>> with the TPR optimization patch.
>>
>>
> 32 bits or 64 bits?
> See
> http://blogs.msdn.com/windowsvistasecurity/archive/2006/08/11/695993.asp
> x
>
> It says:
>
> There are many brand new security features in Windows Vista, but Kernel
> Patch Protection is actually not one of them. Kernel Patch Protection
> was first supported on x64 (AMD64 and Intel EMT64T) CPU architecture
> versions of Microsoft Windows including Microsoft Windows Server 2003
> SP1 and Windows XP Microsoft Windows XP Professional x64 Edition. (Patch
> protection is currently not supported on x86 or ia64 architectures.)
> Though, as the use of 64-bit computers is increasing, Windows Vista
> users will end up benefiting most from this technology.
>
> Seems Vista 32 is not using patchguard yet, not sure about next SP.
> If above is true, it looks like we are OK for current stage.
> thx,eddie
>
I tested 32-bit Vista. We'll have to try 64-bit Vista and see if it
gets upset.
Regards,
Anthony Liguori
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Test for the feature, RE: [RFT] kvm with Windows optimization
[not found] ` <4720D122.4070606-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
` (3 preceding siblings ...)
2007-10-26 9:47 ` Gildas
@ 2007-10-29 15:04 ` Zhao, Yunfeng
4 siblings, 0 replies; 53+ messages in thread
From: Zhao, Yunfeng @ 2007-10-29 15:04 UTC (permalink / raw)
To: Avi Kivity, kvm-devel
[-- Attachment #1: Type: text/plain, Size: 4988 bytes --]
I didn't some tests against the release.
Basically, it works well, and no any new regressions has been introduced.
The booting speed of windows is also much faster.
But I still failed to boot 64bit smp XP and 2k3.
And after run a series of tests, I found a defunct qemu process.
############################################################
[root@vt-dp8 ~]# ps aux|grep qemu
root 12645 0.0 0.0 60284 720 pts/7 S+ 22:30 0:00 grep qemu
root 20656 0.3 0.0 0 0 ? Zl 20:37 0:20 [qemu-system-x86] <defunct>
############################################################
I checked the log, it happened when creating 64bit vista.
If run the test case separately, the issue will not happen.
I also noticed some kernel message printed on console
###########################################################
Message from syslogd@vt-dp8 at Mon Oct 29 20:38:07 2007 ...
vt-dp8 kernel: ------------[ cut here ]------------
Message from syslogd@vt-dp8 at Mon Oct 29 20:38:07 2007 ...
vt-dp8 kernel: ------------[ cut here ]------------
Message from syslogd@vt-dp8 at Mon Oct 29 20:38:07 2007 ...
vt-dp8 kernel: invalid opcode: 0000 [1] SMP
Message from syslogd@vt-dp8 at Mon Oct 29 20:38:07 2007 ...
vt-dp8 kernel: invalid opcode: 0000 [1] SMP
############################################################
1. boot four 32-bit guest in parallel PASS
2. boot four 64-bit guest in parallel PASS
3. boot 4G 64-bit guest FAIL
4. boot 4G pae guest PASS
5. boot 32-bit linux and 32 bit windows guest in parallel PASS
6. boot 32-bit guest with 1500M memory PASS
7. boot 64-bit guest with 1500M memory PASS
8. boot 32-bit guest with 256M memory PASS
9. boot 64-bit guest with 256M memory PASS
10. boot two 32-bit windows xp in parallel PASS
11. boot four 32-bit different guest in para PASS
12. save/restore 64-bit linux guests FAIL
13. save/restore 32-bit linux guests FAIL
14. boot 32-bit SMP windows 2003 with ACPI enabled PASS
15. boot 32bit SMP Windows 2000 with ACPI enabled FAIL
16. boot 32-bit SMP Windows xp with ACPI enabled FAIL
17. boot 32-bit Windows 2000 without ACPI PASS
18. boot 64-bit Windows xp with ACPI enabled PASS
19. boot 32-bit Windows xp without ACPI PASS
20. boot 64-bit vista FAIL
21. kernel build in 32-bit linux guest OS PASS
22. kernel build in 64-bit linux guest OS PASS
23. LTP on SMP 32-bit linux guest OS PASS
24. LTP on SMP 64-bit linux guest OS PASS
25. boot 64-bit guests with ACPI enabled PASS
26. boot 32-bit x-server PASS
27. boot 64-bit SMP windows XP with ACPI enabled FAIL
28. boot 64-bit SMP windows 2003 with ACPI enabled FAIL
>-----Original Message-----
>From: kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
>[mailto:kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org] On Behalf Of Avi Kivity
>Sent: 2007年10月26日 1:24
>To: kvm-devel
>Subject: [kvm-devel] [RFT] kvm with Windows optimization
>
>This is a request for testing of an experimental kvm feature that
>dramatically accelerates some Windows releases (when running with the
>ACPI HAL, and especially with guest SMP). The feature detects accesses
>by the guest to the Task Priority Register (TPR) and patches them at
>runtime to a kvm-friendly code snipped that is provided by the BIOS.
>
>The upshot of all that is that
>http://kvm.qumranet.com/kvmwiki/Windows_ACPI_Workaround is no longer
>required, and Windows SMP no longer runs like a dog; it's quite snappy
>from my very limited testing.
>
>Please download the test release from
>http://people.qumranet.com/avi/tpr-opt-1.tar.gz and give it a spin.
>Once it has received some exposure, I'll merge it into mainline.
>
>Credit for the original idea is due to Ben Serebrin.
>
>--
>error compiling committee.c: too many arguments to function
>
>
>-------------------------------------------------------------------------
>This SF.net email is sponsored by: Splunk Inc.
>Still grepping through log files to find problems? Stop.
>Now Search log events and configuration files using AJAX and a browser.
>Download your FREE copy of Splunk now >> http://get.splunk.com/
>_______________________________________________
>kvm-devel mailing list
>kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
>https://lists.sourceforge.net/lists/listinfo/kvm-devel
[-- Attachment #2: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #3: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: Test for the feature RE: [RFT] kvm with Windows optimization
[not found] ` <10EA09EFD8728347A513008B6B0DA77A02125FBD-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
@ 2007-10-30 4:01 ` Avi Kivity
[not found] ` <4726ACB6.6070207-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-30 4:01 UTC (permalink / raw)
To: Zhao, Yunfeng; +Cc: kvm-devel
[-- Attachment #1: Type: text/plain, Size: 1049 bytes --]
Zhao, Yunfeng wrote:
> I didn't some tests against the release.
> Basically, it works well, and no any new regressions has been introduced.
> The booting speed of windows is also much faster.
>
> But I still failed to boot 64bit smp XP and 2k3.
> And after run a series of tests, I found a defunct qemu process.
> ############################################################
> [root@vt-dp8 ~]# ps aux|grep qemu
> root 12645 0.0 0.0 60284 720 pts/7 S+ 22:30 0:00 grep qemu
> root 20656 0.3 0.0 0 0 ? Zl 20:37 0:20 [qemu-system-x86] <defunct>
> ############################################################
> I checked the log, it happened when creating 64bit vista.
> If run the test case separately, the issue will not happen.
>
>
A bug was fixed in mainline for this issue, so it is not related to the
optimization. I still need to make sure it doesn't harm 64-bit Windows.
I'll rebase and release a new version in a few days.
--
Any sufficiently difficult bug is indistinguishable from a feature.
[-- Attachment #2: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #3: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4725E022.6070202-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-30 4:03 ` Avi Kivity
[not found] ` <4726ACFC.5090907-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Avi Kivity @ 2007-10-30 4:03 UTC (permalink / raw)
To: Anthony Liguori; +Cc: kvm-devel
Anthony Liguori wrote:
> Dong, Eddie wrote:
>> Anthony Liguori wrote:
>>
>>> Dong, Eddie wrote:
>>>
>>>>> BTW, is it wise to enable this by default for all guests?
>>>>> Ignoring the
>>>>> fact that we're modifying guest's memory without its knowledge, if a
>>>>> guest unmaps the VA mappings for the BIOS then all sorts of
>>>>> problems could occur.
>>>>>
>>>>>
>>>> Good movement!
>>>>
>>>> But, Vista won't work with patching. The memory guard in vista
>>>> will make the system refuse to service. Maybe we need a option to
>>>> check if it is vista.
>>>>
>>> FWIW, I successfully installed and booted Vista Enterprise Edition
>>> with the TPR optimization patch.
>>>
>>>
>> 32 bits or 64 bits?
>> See
>> http://blogs.msdn.com/windowsvistasecurity/archive/2006/08/11/695993.asp
>> x
>>
>> It says:
>>
>> There are many brand new security features in Windows Vista, but Kernel
>> Patch Protection is actually not one of them. Kernel Patch Protection
>> was first supported on x64 (AMD64 and Intel EMT64T) CPU architecture
>> versions of Microsoft Windows including Microsoft Windows Server 2003
>> SP1 and Windows XP Microsoft Windows XP Professional x64 Edition. (Patch
>> protection is currently not supported on x86 or ia64 architectures.)
>> Though, as the use of 64-bit computers is increasing, Windows Vista
>> users will end up benefiting most from this technology.
>> Seems Vista 32 is not using patchguard yet, not sure about next SP.
>> If above is true, it looks like we are OK for current stage.
>> thx,eddie
>>
>
> I tested 32-bit Vista. We'll have to try 64-bit Vista and see if it
> gets upset.
>
btw, it may have not triggered because the hack didn't recognize Vista's
memory map.
--
Any sufficiently difficult bug is indistinguishable from a feature.
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: Test for the feature RE: [RFT] kvm with Windows optimization
[not found] ` <4726ACB6.6070207-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-30 4:21 ` Anthony Liguori
[not found] ` <4726B13D.2020101-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
0 siblings, 1 reply; 53+ messages in thread
From: Anthony Liguori @ 2007-10-30 4:21 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
[-- Attachment #1: Type: text/plain, Size: 1829 bytes --]
Avi Kivity wrote:
> Zhao, Yunfeng wrote:
>
>> I didn't some tests against the release.
>> Basically, it works well, and no any new regressions has been introduced.
>> The booting speed of windows is also much faster.
>>
>> But I still failed to boot 64bit smp XP and 2k3.
>> And after run a series of tests, I found a defunct qemu process.
>> ############################################################
>> [root@vt-dp8 ~]# ps aux|grep qemu
>> root 12645 0.0 0.0 60284 720 pts/7 S+ 22:30 0:00 grep qemu
>> root 20656 0.3 0.0 0 0 ? Zl 20:37 0:20 [qemu-system-x86] <defunct>
>> ############################################################
>> I checked the log, it happened when creating 64bit vista.
>> If run the test case separately, the issue will not happen.
>>
>>
>>
>
> A bug was fixed in mainline for this issue, so it is not related to the
> optimization. I still need to make sure it doesn't harm 64-bit Windows.
>
Does 64-bit Windows ever access the TPR through MMIO? Wouldn't it just
use cr8?
Regards,
Anthony Liguori
> I'll rebase and release a new version in a few days.
>
>
> ------------------------------------------------------------------------
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems? Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/
> ------------------------------------------------------------------------
>
> _______________________________________________
> kvm-devel mailing list
> kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
> https://lists.sourceforge.net/lists/listinfo/kvm-devel
>
[-- Attachment #2: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #3: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: Test for the feature RE: [RFT] kvm with Windows optimization
[not found] ` <4726B13D.2020101-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
@ 2007-10-30 4:27 ` Avi Kivity
0 siblings, 0 replies; 53+ messages in thread
From: Avi Kivity @ 2007-10-30 4:27 UTC (permalink / raw)
To: Anthony Liguori; +Cc: kvm-devel
[-- Attachment #1: Type: text/plain, Size: 1348 bytes --]
Anthony Liguori wrote:
> Avi Kivity wrote:
>
>> Zhao, Yunfeng wrote:
>>
>>
>>> I didn't some tests against the release.
>>> Basically, it works well, and no any new regressions has been introduced.
>>> The booting speed of windows is also much faster.
>>>
>>> But I still failed to boot 64bit smp XP and 2k3.
>>> And after run a series of tests, I found a defunct qemu process.
>>> ############################################################
>>> [root@vt-dp8 ~]# ps aux|grep qemu
>>> root 12645 0.0 0.0 60284 720 pts/7 S+ 22:30 0:00 grep qemu
>>> root 20656 0.3 0.0 0 0 ? Zl 20:37 0:20 [qemu-system-x86] <defunct>
>>> ############################################################
>>> I checked the log, it happened when creating 64bit vista.
>>> If run the test case separately, the issue will not happen.
>>>
>>>
>>>
>>>
>> A bug was fixed in mainline for this issue, so it is not related to the
>> optimization. I still need to make sure it doesn't harm 64-bit Windows.
>>
>>
>
> Does 64-bit Windows ever access the TPR through MMIO? Wouldn't it just
> use cr8?
>
It always uses cr8. However my slash'n'burn did touch something
cr8-related, so I can't be sure 64-bit Windows isn't affected.
--
Any sufficiently difficult bug is indistinguishable from a feature.
[-- Attachment #2: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #3: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply [flat|nested] 53+ messages in thread
* Re: [RFT] kvm with Windows optimization
[not found] ` <4726ACFC.5090907-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
@ 2007-10-30 5:02 ` Anthony Liguori
0 siblings, 0 replies; 53+ messages in thread
From: Anthony Liguori @ 2007-10-30 5:02 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm-devel
Avi Kivity wrote:
> Anthony Liguori wrote:
>> Dong, Eddie wrote:
>>> Anthony Liguori wrote:
>>>
>>>> Dong, Eddie wrote:
>>>>
>>>>>> BTW, is it wise to enable this by default for all guests?
>>>>>> Ignoring the
>>>>>> fact that we're modifying guest's memory without its knowledge, if a
>>>>>> guest unmaps the VA mappings for the BIOS then all sorts of
>>>>>> problems could occur.
>>>>>>
>>>>>>
>>>>> Good movement!
>>>>>
>>>>> But, Vista won't work with patching. The memory guard in vista
>>>>> will make the system refuse to service. Maybe we need a option to
>>>>> check if it is vista.
>>>>>
>>>> FWIW, I successfully installed and booted Vista Enterprise Edition
>>>> with the TPR optimization patch.
>>>>
>>>>
>>> 32 bits or 64 bits?
>>> See
>>> http://blogs.msdn.com/windowsvistasecurity/archive/2006/08/11/695993.asp
>>>
>>> x
>>>
>>> It says:
>>>
>>> There are many brand new security features in Windows Vista, but Kernel
>>> Patch Protection is actually not one of them. Kernel Patch Protection
>>> was first supported on x64 (AMD64 and Intel EMT64T) CPU architecture
>>> versions of Microsoft Windows including Microsoft Windows Server 2003
>>> SP1 and Windows XP Microsoft Windows XP Professional x64 Edition.
>>> (Patch
>>> protection is currently not supported on x86 or ia64 architectures.)
>>> Though, as the use of 64-bit computers is increasing, Windows Vista
>>> users will end up benefiting most from this technology.
>>> Seems Vista 32 is not using patchguard yet, not sure about next SP.
>>> If above is true, it looks like we are OK for current stage.
>>> thx,eddie
>>>
>>
>> I tested 32-bit Vista. We'll have to try 64-bit Vista and see if it
>> gets upset.
>>
>
> btw, it may have not triggered because the hack didn't recognize
> Vista's memory map.
>
It successfully patched instructions. Not as many as with XP but it was
at least a few.
Regards,
Anthony Liguori
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
^ permalink raw reply [flat|nested] 53+ messages in thread
end of thread, other threads:[~2007-10-30 5:02 UTC | newest]
Thread overview: 53+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-10-25 17:23 [RFT] kvm with Windows optimization Avi Kivity
[not found] ` <4720D122.4070606-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 17:34 ` Haydn Solomon
[not found] ` <b75785ba0710251034q77a83b98pc784be19c842b807-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-25 17:35 ` Avi Kivity
[not found] ` <4720D3F0.8010103-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 17:39 ` Haydn Solomon
[not found] ` <b75785ba0710251039x63551396yc9d5e24df0f56ad7-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-25 18:07 ` Jindrich Makovicka
2007-10-25 18:10 ` Avi Kivity
[not found] ` <4720DC12.8050303-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 18:15 ` Haydn Solomon
[not found] ` <b75785ba0710251115h7ef5cbfek492a588e80349e04-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-25 18:20 ` Avi Kivity
[not found] ` <4720DE65.2030209-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 18:38 ` Anthony Liguori
[not found] ` <4720E2AF.3070404-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-25 18:49 ` Avi Kivity
[not found] ` <4720E53A.7040803-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 18:54 ` Anthony Liguori
[not found] ` <4720E65F.8070204-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-25 19:01 ` Avi Kivity
[not found] ` <4720E80E.5070506-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 19:09 ` Haydn Solomon
[not found] ` <b75785ba0710251209sdcba9cdrd2a6eb84c549581a-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-25 19:09 ` Avi Kivity
2007-10-25 21:00 ` Anthony Liguori
[not found] ` <472103E8.8070605-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-26 8:16 ` Avi Kivity
[not found] ` <4721A255.5050603-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-26 13:52 ` Anthony Liguori
2007-10-25 23:31 ` Anthony Liguori
[not found] ` <47212748.4070001-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-26 1:14 ` Haydn Solomon
2007-10-28 16:26 ` Avi Kivity
2007-10-25 18:54 ` Fabian Deutsch
2007-10-26 10:09 ` Avi Kivity
[not found] ` <4721BCCD.4000401-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-27 18:45 ` Jindrich Makovicka
2007-10-25 17:51 ` Anthony Liguori
[not found] ` <4720D7A8.6060102-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-25 18:03 ` Avi Kivity
[not found] ` <4720DA66.6040303-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-25 18:08 ` Anthony Liguori
[not found] ` <4720DBA1.7050003-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-25 18:09 ` Avi Kivity
2007-10-25 18:27 ` Anthony Liguori
[not found] ` <4720E023.8050804-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-25 18:34 ` Avi Kivity
2007-10-26 3:32 ` Dong, Eddie
[not found] ` <10EA09EFD8728347A513008B6B0DA77A0248295E-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2007-10-26 8:58 ` Avi Kivity
[not found] ` <4721AC51.3090108-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-26 9:46 ` Dong, Eddie
[not found] ` <10EA09EFD8728347A513008B6B0DA77A02482C0D-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2007-10-26 10:01 ` Avi Kivity
2007-10-26 13:20 ` Anthony Liguori
[not found] ` <4721E98F.3020807-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-26 13:24 ` Avi Kivity
[not found] ` <4721EAA9.1090202-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-26 13:35 ` Anthony Liguori
[not found] ` <4721ED0F.7080404-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-26 13:38 ` Avi Kivity
[not found] ` <4721EDED.8090204-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-26 13:47 ` Anthony Liguori
2007-10-26 14:08 ` Anthony Liguori
[not found] ` <4721F4DC.2010501-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-29 8:18 ` Dong, Eddie
[not found] ` <10EA09EFD8728347A513008B6B0DA77A024CE569-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2007-10-29 13:29 ` Anthony Liguori
[not found] ` <4725E022.6070202-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-30 4:03 ` Avi Kivity
[not found] ` <4726ACFC.5090907-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-30 5:02 ` Anthony Liguori
2007-10-26 9:47 ` Gildas
[not found] ` <b2ace7f20710260247s5b2a32cay5112a8931d57402f-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-26 10:02 ` Avi Kivity
[not found] ` <4721BB45.20906-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-26 10:29 ` Gildas
[not found] ` <b2ace7f20710260329p1f1a8459q68c8a2274a5731c3-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2007-10-26 10:34 ` Avi Kivity
[not found] ` <4721C2B2.7000205-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-26 12:42 ` Remove hardware from host and add to guest? Back, Michael (ext)
[not found] ` <003F437218F04842B2A6976FA19368B18B85DB-EA/R+3GEQKtclD5KMHf1bFOnKfhBOm/VrE5yTffgRl4@public.gmane.org>
2007-10-27 22:25 ` Dor Laor
2007-10-29 15:04 ` Test for the feature, RE: [RFT] kvm with Windows optimization Zhao, Yunfeng
[not found] ` <10EA09EFD8728347A513008B6B0DA77A02125FBD@pdsmsx411.ccr.corp.intel.com>
[not found] ` <10EA09EFD8728347A513008B6B0DA77A02125FBD-wq7ZOvIWXbNpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2007-10-30 4:01 ` Test for the feature " Avi Kivity
[not found] ` <4726ACB6.6070207-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-10-30 4:21 ` Anthony Liguori
[not found] ` <4726B13D.2020101-rdkfGonbjUSkNkDKm+mE6A@public.gmane.org>
2007-10-30 4:27 ` Avi Kivity
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox