Diff for /wikisrc/ports/xen/howto.mdwn between versions 1.179 and 1.180

version 1.179, 2020/11/15 14:11:07 version 1.180, 2020/11/15 14:31:58
Line 15  Style of guest |Supported by NetBSD Line 15  Style of guest |Supported by NetBSD
 PV              |Yes (dom0, domU)  PV              |Yes (dom0, domU)
 HVM             |Yes (domU)  HVM             |Yes (domU)
 PVHVM           |current-only (domU)  PVHVM           |current-only (domU)
 PVHv2           |current-only (domU, dom0 not yet)  PVH             |current-only (domU, dom0 not yet)
 """]]  """]]
   
 In Para-Virtualized (PV) mode, the guest OS does not attempt to access  In Para-Virtualized (PV) mode, the guest OS does not attempt to access
Line 29  The dom0 runs qemu to emulate hardware. Line 29  The dom0 runs qemu to emulate hardware.
 In PVHVM mode, the guest runs as HVM, but additionally can use PV  In PVHVM mode, the guest runs as HVM, but additionally can use PV
 drivers for efficiency.  drivers for efficiency.
   
 In PVHv2 mode, operation is similar to PVHVM, except that qemu is not  There have been two PVH modes: original PVH and PVHv2.  Original PVH
 run and thus the PV interfaces for console, disks, networking are the  was based on PV mode and is no longer relevant at all.  PVHv2 is
 only way to access these resources.  (There was an original PVH mode  basically lightweight HVM with PV drivers.  A critical feature of it
 that is no longer in use, and now, sometimes PVHv2 is referred to as  is that qemu is not needed; the hypervisor can do the emulation that
 simply PVH.)  is required.  Thus, a dom0 can be PVHv2.
   
   The source code uses PVH and config files use pvh; this refers to PVHv2.
   
 At boot, the dom0 kernel is loaded as a module with Xen as the kernel.  At boot, the dom0 kernel is loaded as a module with Xen as the kernel.
 The dom0 can start one or more domUs.  (Booting is explained in detail  The dom0 can start one or more domUs.  (Booting is explained in detail
Line 429  down cleanly on dom0 shutdown, add the f Line 431  down cleanly on dom0 shutdown, add the f
 xendomains="domU-netbsd domU-linux"  xendomains="domU-netbsd domU-linux"
 """]]  """]]
   
 #Creating a domU  # Creating a domU
   
 Creating domUs is almost entirely independent of operating system.  We  Creating domUs is almost entirely independent of operating system.  We
 have already presented the basics of config files.  Note that you must  have already presented the basics of config files.  Note that you must
 have already completed the dom0 setup so that "xl list" works.  have already completed the dom0 setup so that "xl list" works.
   
 Creating a NetBSD domU  Creating a NetBSD PV domU
 ----------------------  --------------------------
   
 See the earlier config file, and adjust memory.  Decide on how much  See the earlier config file, and adjust memory.  Decide on how much
 storage you will provide, and prepare it (file or LVM).  storage you will provide, and prepare it (file or LVM).
Line 551  To get the Linux console right, you need Line 553  To get the Linux console right, you need
 to your configuration since not all Linux distributions auto-attach a  to your configuration since not all Linux distributions auto-attach a
 tty to the xen console.  tty to the xen console.
   
   ## Creating a NetBSD HVM domU
   
   Use type='hmv', probably.  Use a GENERIC kernel within the disk image.
   
   ## Creating a NetBSD PVH domU
   
   Use type='pvh'.
   
   \todo Explain where the kernel comes from.
   
   
 Creating a Solaris domU  Creating a Solaris domU
 -----------------------  -----------------------
   
Line 561  See possibly outdated Line 574  See possibly outdated
 PCI passthrough: Using PCI devices in guest domains  PCI passthrough: Using PCI devices in guest domains
 ---------------------------------------------------  ---------------------------------------------------
   
   NB: PCI passthrough only works on some Xen versions and as of 2020 it
   is not clear that it works on any version in pkgsrc.  Reports
   confirming or denying this notion should be sent to port-xen@.
   
 The dom0 can give other domains access to selected PCI  The dom0 can give other domains access to selected PCI
 devices. This can allow, for example, a non-privileged domain to have  devices. This can allow, for example, a non-privileged domain to have
 access to a physical network interface or disk controller.  However,  access to a physical network interface or disk controller.  However,
Line 662  A second issue is multiple CPUs.  With N Line 679  A second issue is multiple CPUs.  With N
 multiple vcpus, and it is typical for VPS providers to enable multiple  multiple vcpus, and it is typical for VPS providers to enable multiple
 CPUs for NetBSD domUs.  CPUs for NetBSD domUs.
   
   ## Complexities due to Xen changes
   
   Xen has many security advisories and people running Xen systems make
   different choices.
   
   ### stub domains
   
   Some (Linux only?) dom0 systems use something called "stub domains" to
   isolate qemu from the dom0 system, as a security and reliabilty
   mechanism when running HVM domUs.  Somehow, NetBSD's GENERIC kernel
   ends up using PIO for disks rather than DMA.  Of course, all of this
   is emulated, but emulated PIO is unusably slow.  This problem is not
   currently understood.
   
   ### Grant tables
   
   There are multiple versions of using grant tables, and some security
   advisories have suggested disabling some versions.  Some versions of
   NetBSD apparently only use specific versions and this can lead to
   "NetBSD current doesn't run on hosting provider X" situations.
   
   \todo Explain better.
   
 pvgrub  pvgrub
 ------  ------
   

Removed from v.1.179  
changed lines
  Added in v.1.180


CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb