I have a question which may sound stupid.
Is the dom0 mainly responsible for administration of other VMs?
If a PC only needs running HVM and doesn't need any administration, is
it possible that Xen doesn't start dom0 but setup VM environment and
start-up HVM image?
What modification do I need, such as drivers, memory management, file
systems?
Best regards,
Hu Jia Yi
Ext: 20430
Tel: 65-67510430
-----Original Message-----
From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of
xen-devel-request@xxxxxxxxxxxxxxxxxxx
Sent: Friday, September 07, 2007 8:02 AM
To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: Xen-devel Digest, Vol 31, Issue 26
Send Xen-devel mailing list submissions to
xen-devel@xxxxxxxxxxxxxxxxxxx
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel
or, via email, send a message with subject or body 'help' to
xen-devel-request@xxxxxxxxxxxxxxxxxxx
You can reach the person managing the list at
xen-devel-owner@xxxxxxxxxxxxxxxxxxx
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Xen-devel digest..."
Today's Topics:
1. Likely VMX Assist Issue from Ubuntu bug report (Zulauf, John)
2. Re: Likely VMX Assist Issue from Ubuntu bug report
(Mats Petersson)
3. Re: [VTD-NEO][patch 0/6] Intel VT-d/Neocleus 1:1 mreged code
for PCI passthrough (John Byrne)
4. RE: [VTD-NEO][patch 0/6] Intel VT-d/Neocleus 1:1 mreged code
for PCI passthrough (Kay, Allen M)
----------------------------------------------------------------------
Message: 1
Date: Thu, 6 Sep 2007 15:02:46 -0700
From: "Zulauf, John" <john.zulauf@xxxxxxxxx>
Subject: [Xen-devel] Likely VMX Assist Issue from Ubuntu bug report
To: <xen-devel@xxxxxxxxxxxxxxxxxxx>
Message-ID:
<BD262A443AD428499D90AF8368C4528DA20404@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain; charset="us-ascii"
"fancy isolinux screen on install isos hang xen/kvm HVM guests"
https://bugs.launchpad.net/ubuntu/+bug/83642
Bug is in state "confirmed" and while the concensus on the bug thread is
"we probably shouldn't be doing fancy things in protected mode", this
seems like a fairly important distro to be borked for 3.2 (or 3.1.1
whatever).
I've verified this using the i386 Ubuntu tip:
http://cdimage.ubuntu.com/releases/gutsy/tribe-5/gutsy-desktop-i386.iso
FYI
John Zulauf
Quoting the Ubuntu bug:
I'm working with ubuntu on Xen right now, and this is a very bad
problem. Both the server and desktop install CD's, for both dapper and
edgy, use fancy full screen (vbe based?) isolinux install screens. Could
we please do away with these screens on the server or alternate install
CD? These fancy screens are causing fully virtualized guests that try to
boot from these CD's to crash before the boot screen is even drawn. This
is true for both Xen and KVM.
To clarify, this does not cause the -host- to crash, just the guest, but
you get a blank screen and wonder what happened.
Background (mostly speculation, but I think it's right):
Intel designed VT in a strange way, such that only protected mode
instructions are allowed o be virtualized. Anything done in real mode
must be emulated...every instruction. The Xen and KVM folks have
emulated enough to get things working, but have not handled every
instruction, including apparently some of the fancy (VBE?) graphics
isolinux on the ubuntu boot cd's is using. (FreeBSD's btx loader also
has problems)
For reference, AMD's SVM analogue does, in fact, virtualize real mode
instructions on the processor, and I'm able to boot all install CD's
just fine on an AMD machine. This is an Intel VT .... 'quirk'.
The mini.iso network install CD loads just fine and works, and I can
install over an emulated network. And that CD includes a splash screen
w/ isolinux, so it's not all VBE operations that cause problems. You
should still be able to have a splash screen, but more then that might
cause the problems.
I've filed a bug against Xen about this, and I just tried KVM and ran
into the same issue, so I'm assuming it's th same problem. But until the
Xen folks figure out what instructions need to be emulated, and take
enough time to care, or Intel comes out with an updated VT
implementation that does what AMD's does, we can't just boot up a ubuntu
install CD on virtual machines and have it work.
My requested solution is that isolinux use just the standard (preferably
text) menu and options on the server and/or alternate install CD. Having
one full, officially supported install CD that doesn't crash Xen/KVM
when trying to install a ubuntu would go a long way towards helping
those of us trying to use ubuntu in a virtual environment out. Besides,
while I really appreciate all the fancy boot options for a desktop
machine, but I would prefer a plain text option for servers anyway. I
do, however, see why some would like the opposite.
Would it be possible to get the feisty 'server' install CD to forgo the
fancy bootup options?
NOTE: I think I understand what's going on, but if I'm missing something
obvious, please tell me.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
http://lists.xensource.com/archives/html/xen-devel/attachments/20070906/
c7a1a927/attachment.htm
------------------------------
Message: 2
Date: Thu, 06 Sep 2007 23:13:37 +0100
From: Mats Petersson <mats@xxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] Likely VMX Assist Issue from Ubuntu bug
report
To: "Zulauf, John"
<john.zulauf@xxxxxxxxx>,<xen-devel@xxxxxxxxxxxxxxxxxxx>
Message-ID: <46e07b6e.1185300a.4139.05c4@xxxxxxxxxxxxx>
Content-Type: text/plain; charset="us-ascii"; format=flowed
At 23:02 06/09/2007, Zulauf, John wrote:
>Content-class: urn:content-classes:message
>Content-Type: multipart/alternative;
> boundary="----_=_NextPart_001_01C7F0D1.A664E607"
>
>"fancy isolinux screen on install isos hang xen/kvm HVM guests"
>
><https://bugs.launchpad.net/ubuntu/+bug/83642>https://bugs.launchpad.ne
t/ubuntu/+bug/83642
>
>Bug is in state "confirmed" and while the concensus on the bug
>thread is "we probably shouldn't be doing fancy things in protected
>mode", this seems like a fairly important distro to be borked for
>3.2 (or 3.1.1 whatever).
>
>I've verified this using the i386 Ubuntu tip:
><http://cdimage.ubuntu.com/releases/gutsy/tribe-5/gutsy-desktop-i386.is
o>http://cdimage.ubuntu.com/releases/gutsy/tribe-5/gutsy-desktop-i386.is
o
As far as I know, this is still the case. And the reason is, as
stated in the bug-report, that the Intel people decided to not allow
real-mode code to be virtualized. This is not a problem in itself,
because VM8086 mode can cover most of the code, with a bit of
"VMXAssist" to fix up privileged instructions not allows in VM8086
mode. However, there is a problem, and that is that the state of
segment registers isn't maintained when switching from protected mode
back to real-mode. This is often used by boot-loading code to load
data into memory that is normally not reachable from real-mode (that
is, memory above 1M).
--
Mats
>
>FYI
>
>John Zulauf
>
>Quoting the Ubuntu bug:
>
>I'm working with ubuntu on Xen right now, and this is a very bad
>problem. Both the server and desktop install CD's, for both dapper
>and edgy, use fancy full screen (vbe based?) isolinux install
>screens. Could we please do away with these screens on the server or
>alternate install CD? These fancy screens are causing fully
>virtualized guests that try to boot from these CD's to crash before
>the boot screen is even drawn. This is true for both Xen and KVM.
>
>To clarify, this does not cause the -host- to crash, just the guest,
>but you get a blank screen and wonder what happened.
>
>Background (mostly speculation, but I think it's right):
>Intel designed VT in a strange way, such that only protected mode
>instructions are allowed o be virtualized. Anything done in real
>mode must be emulated...every instruction. The Xen and KVM folks
>have emulated enough to get things working, but have not handled
>every instruction, including apparently some of the fancy (VBE?)
>graphics isolinux on the ubuntu boot cd's is using. (FreeBSD's btx
>loader also has problems)
>
>For reference, AMD's SVM analogue does, in fact, virtualize real
>mode instructions on the processor, and I'm able to boot all install
>CD's just fine on an AMD machine. This is an Intel VT .... 'quirk'.
>
>The mini.iso network install CD loads just fine and works, and I can
>install over an emulated network. And that CD includes a splash
>screen w/ isolinux, so it's not all VBE operations that cause
>problems. You should still be able to have a splash screen, but more
>then that might cause the problems.
>
>I've filed a bug against Xen about this, and I just tried KVM and
>ran into the same issue, so I'm assuming it's th same problem. But
>until the Xen folks figure out what instructions need to be
>emulated, and take enough time to care, or Intel comes out with an
>updated VT implementation that does what AMD's does, we can't just
>boot up a ubuntu install CD on virtual machines and have it work.
>
>My requested solution is that isolinux use just the standard
>(preferably text) menu and options on the server and/or alternate
>install CD. Having one full, officially supported install CD that
>doesn't crash Xen/KVM when trying to install a ubuntu would go a
>long way towards helping those of us trying to use ubuntu in a
>virtual environment out. Besides, while I really appreciate all the
>fancy boot options for a desktop machine, but I would prefer a plain
>text option for servers anyway. I do, however, see why some would
>like the opposite.
>
>Would it be possible to get the feisty 'server' install CD to forgo
>the fancy bootup options?
>
>NOTE: I think I understand what's going on, but if I'm missing
>something obvious, please tell me.
>
>_______________________________________________
>Xen-devel mailing list
>Xen-devel@xxxxxxxxxxxxxxxxxxx
>http://lists.xensource.com/xen-devel
------------------------------
Message: 3
Date: Thu, 06 Sep 2007 16:16:29 -0700
From: John Byrne <john.l.byrne@xxxxxx>
Subject: Re: [Xen-devel] [VTD-NEO][patch 0/6] Intel VT-d/Neocleus 1:1
mreged code for PCI passthrough
To: "Kay, Allen M" <allen.m.kay@xxxxxxxxx>
Cc: Guy Zana <guy@xxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx, Keir
Fraser <keir@xxxxxxxxxxxxx>
Message-ID: <46E08A4D.8050706@xxxxxx>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
When I use these patches and start a nativedom with a directly-assigned
NIC and no IOMMU, I get a lock up. Running the same
domain/configuration/machine with the direct-io.hg tree worked fine. The
crash output is below. If you'd like more information, let me know.
John Byrne
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) pt_irq.c:81:d1 invalid assert_option value
(XEN) WARNING: send pio with something already pending (9)?
(XEN) domain_crash_sync called from hvm.c:485
(XEN) Domain 1 (vcpu#0) crashed on cpu#7:
(XEN) ----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----
(XEN) CPU: 7
(XEN) EIP: 0000:[<00100fcb>]
(XEN) EFLAGS: 00000002 CONTEXT: hvm
(XEN) eax: 00000064 ebx: 001390c4 ecx: 001390c4 edx: 000000e9
(XEN) esi: 00103762 edi: 00101bf0 ebp: 00139038 esp: 00139038
(XEN) cr0: 00000011 cr4: 00000000 cr3: 00000000 cr2: 00000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0000
(XEN) domain_crash_sync called from hvm.c:132
(XEN) domain_crash_sync called from hvm.c:132
(XEN) domain_crash_sync called from hvm.c:132
(XEN) domain_crash_sync called from hvm.c:132
....
(XEN) *** [ Xen-3.0-unstable x86_32 debug=n Not tainted ]----(XEN)
----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----(XEN) e
x86_32 debug=n Not tainted ]----
(XEN) ----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----
(XEN) CPU: 6
(XEN) CPU: 6(XEN) idle_loop+0x1b/0x90+010246 CONTEXT: hypervisor
(XEN) EFLAGS: 00010246 CONTEXT: hypervisor
(XEN) eax: 00000300 ebx: ffbe7fb4 ecx: 00000000 edx: 00000006
(XEN) esi: ff1a8430 edi: 91d91b27 ebp: 0000001c esp: ffbe7fa8
(XEN) cr0: 8005003b cr4: 000026d0 cr3: 3c6ee000 cr2: b7bf7000
(XEN) ds: e010 es: e010 fs: 0000 gs: 0000 ss: e010 cs: e008
(XEN) do_page_fault+0x45/0x3b0
(XEN) (XEN) Xen stac00010246Xen stac00010246
CR3: 00000000(XEN) ffbea080
ax: 6563696c ebx: 0000e010 ecx: 00010246 edx: ff1b7fb4(XEN)
ffbea080 00000001
si: 0000e010 edi: 00000000 ebp: ff1b40ec esp: ff1b40a8(XEN)
00000000
s: e010 es: e010 fs: 0000 gs: 0000 ss: e010(XEN) c1351f90
00000006 00000006
00000006
(XEN) c03d7180 00000000 000e0007 c01013a7 00000061 00000246 c1351f8c
00000069
(XEN) 0000007b 0000007b 00000000 00000000 00000006 ffbea080
(XEN) Xen call trace:
(XEN) [<ff1209fb>] idle_loop+0x1b/0x90
(XEN)
Kay, Allen M wrote:
> The following 6 patches contains merge of Intel VT-d and Neocleus' 1:1
> mapping patches for enabling HVM guest direct device access that were
> last submitted around end of May. These patches applied cleanly to
> changeset 15730.
>
> To enabled xen vt-d code, add "ioapic_ack=old" to xen boot parameter
in
> grub.conf on systems with VT-d hardware.
>
> To enabled xen 1:1 mapping code, add "enabled_nativedom=1" to xen boot
> parameter in grub.conf.
>
> Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx>
> Signed-off-by: Guy Zana <guy@xxxxxxxxxxxx>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel
>
------------------------------
Message: 4
Date: Thu, 6 Sep 2007 17:00:31 -0700
From: "Kay, Allen M" <allen.m.kay@xxxxxxxxx>
Subject: RE: [Xen-devel] [VTD-NEO][patch 0/6] Intel VT-d/Neocleus 1:1
mreged code for PCI passthrough
To: "John Byrne" <john.l.byrne@xxxxxx>
Cc: Guy Zana <guy@xxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx, Keir
Fraser <keir@xxxxxxxxxxxxx>
Message-ID:
<13A2F7DE1BAEA345A61DD40F303ED7A66C5CF9@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain; charset="us-ascii"
Other than minor changes while rebasing from 15521 to 15730. The
following files have been modified that might affect functionality:
Tools/hvmloader/32bitbios_support.c:
removed a hack to increase highbiosarea size.
Tools/ioemu/hw/pass-throught.c/pt_pci_write_config():
for is_native=1 case, pass-through pci config writes. Otherwise,
pass-through only access to command register (for vt-d case). Note that
we will use a different switch variable once it is added.
These are minor changes, you might want to replace these file from the
ones from direct-io tree to see if it fixes your problem.
Allen
>-----Original Message-----
>From: John Byrne [mailto:john.l.byrne@xxxxxx]
>Sent: Thursday, September 06, 2007 4:16 PM
>To: Kay, Allen M
>Cc: xen-devel@xxxxxxxxxxxxxxxxxxx; Guy Zana; Keir Fraser
>Subject: Re: [Xen-devel] [VTD-NEO][patch 0/6] Intel
>VT-d/Neocleus 1:1 mreged code for PCI passthrough
>
>When I use these patches and start a nativedom with a
>directly-assigned
>NIC and no IOMMU, I get a lock up. Running the same
>domain/configuration/machine with the direct-io.hg tree worked
>fine. The
>crash output is below. If you'd like more information, let me know.
>
>John Byrne
>
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) pt_irq.c:81:d1 invalid assert_option value
>(XEN) WARNING: send pio with something already pending (9)?
>(XEN) domain_crash_sync called from hvm.c:485
>(XEN) Domain 1 (vcpu#0) crashed on cpu#7:
>(XEN) ----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----
>(XEN) CPU: 7
>(XEN) EIP: 0000:[<00100fcb>]
>(XEN) EFLAGS: 00000002 CONTEXT: hvm
>(XEN) eax: 00000064 ebx: 001390c4 ecx: 001390c4 edx: 000000e9
>(XEN) esi: 00103762 edi: 00101bf0 ebp: 00139038 esp: 00139038
>(XEN) cr0: 00000011 cr4: 00000000 cr3: 00000000 cr2: 00000000
>(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: 0000
>(XEN) domain_crash_sync called from hvm.c:132
>(XEN) domain_crash_sync called from hvm.c:132
>(XEN) domain_crash_sync called from hvm.c:132
>(XEN) domain_crash_sync called from hvm.c:132
>....
>(XEN) *** [ Xen-3.0-unstable x86_32 debug=n Not tainted ]----(XEN)
>----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----(XEN) e
>x86_32 debug=n Not tainted ]----
>(XEN) ----[ Xen-3.0-unstable x86_32 debug=n Not tainted ]----
>(XEN) CPU: 6
>(XEN) CPU: 6(XEN) idle_loop+0x1b/0x90+010246 CONTEXT: hypervisor
>
>(XEN) EFLAGS: 00010246 CONTEXT: hypervisor
>(XEN) eax: 00000300 ebx: ffbe7fb4 ecx: 00000000 edx: 00000006
>(XEN) esi: ff1a8430 edi: 91d91b27 ebp: 0000001c esp: ffbe7fa8
>(XEN) cr0: 8005003b cr4: 000026d0 cr3: 3c6ee000 cr2: b7bf7000
>(XEN) ds: e010 es: e010 fs: 0000 gs: 0000 ss: e010 cs: e008
>(XEN) do_page_fault+0x45/0x3b0
>(XEN) (XEN) Xen stac00010246Xen stac00010246
>CR3: 00000000(XEN) ffbea080
> ax: 6563696c ebx: 0000e010 ecx: 00010246 edx: ff1b7fb4(XEN)
>ffbea080 00000001
> si: 0000e010 edi: 00000000 ebp: ff1b40ec esp: ff1b40a8(XEN)
>00000000
> s: e010 es: e010 fs: 0000 gs: 0000 ss: e010(XEN) c1351f90
>00000006 00000006
> 00000006
>(XEN) c03d7180 00000000 000e0007 c01013a7 00000061 00000246
>c1351f8c
>00000069
>(XEN) 0000007b 0000007b 00000000 00000000 00000006 ffbea080
>(XEN) Xen call trace:
>(XEN) [<ff1209fb>] idle_loop+0x1b/0x90
>(XEN)
>
>
>Kay, Allen M wrote:
>> The following 6 patches contains merge of Intel VT-d and
>Neocleus' 1:1
>> mapping patches for enabling HVM guest direct device access that were
>> last submitted around end of May. These patches applied cleanly to
>> changeset 15730.
>>
>> To enabled xen vt-d code, add "ioapic_ack=old" to xen boot
>parameter in
>> grub.conf on systems with VT-d hardware.
>>
>> To enabled xen 1:1 mapping code, add "enabled_nativedom=1"
>to xen boot
>> parameter in grub.conf.
>>
>> Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx>
>> Signed-off-by: Guy Zana <guy@xxxxxxxxxxxx>
>>
>> _______________________________________________
>> Xen-devel mailing list
>> Xen-devel@xxxxxxxxxxxxxxxxxxx
>> http://lists.xensource.com/xen-devel
>>
>
------------------------------
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
End of Xen-devel Digest, Vol 31, Issue 26
*****************************************
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|