This document describes the
instructions to build HVM IO domain. The hypervisor is based on xvm-3.3 and domain 0
based on onnv_121.
1. Upgrade domain 0
1) Install Nevada build 121 onto the
system which supports Intel virtualization technology for direct IO.
Make sure Intel vt-d is enabled in BIOS setting.
2) Build the BFU archive from onnv_121
with patches.
$ hg clone
ssh://anon@hg.opensolaris.org/hg/onnv/onnv-gate
$ cd onnv-gate
$ hg update -C onnv_121
$ hg qinit
$ hg qimport pci-device-reservation
$ hg qpush
$ hg qimport xen-hcall-extension
$ hg qpush
Download closed binary archives from
http://dlc.sun.com/osol/on/downloads/b121/. Unpatch the tar ball
under onnv-gate.
$ bzcat on-closed-bins-nd.i386.tar.bz2
| tar xf -
$ bzcat on-closed-bins.i386.tar.bz2 |
tar xf -
Setup env script and run nightly
$ cp usr/src/tools/env/opensolaris.sh
./
$ edit opensolaris.sh
$ nightly opensolaris.sh
3) BFU the system installed by step 1
with the archive built during step 2.
2. Build xvm-3.3 packages
1) Pull a xvm-3.3 code base under local
directory
$ wget
http://dlc.sun.com/osol/on/downloads/b121/xvm-src.tar.bz2
Or,
Pull it from
ssh://anon@hg.opensolaris.org/hg/xen-gate/xvm-3.3+(sub-gates)
2) import the patch for xen.hg and
qemu.hg
$ cd xen.hg
$ hg qpush -a
$ hg qimport python-pci-aug27
$ hg qpush
$ cd qemu.hg
$ hg qpush -a
$ hg qimport pci-passthrough-aug27
$ hg qpush
3) build the packages
$ export XVM_WS=`pwd`
$ ./sunos.hg/bin/build-all full
3. Upgrade xvm-3.3 packages
# svcadm disable xvm/domains
xvm/console xvm/xend xvm/store xvm/virtd
# pkgrm SUNWlibvirt SUNWlibvirtr
SUNWurlgrabber SUNWvdisk SUNWvirtinst SUNWxvmdomr SUNWxvmdomu
SUNWxvmh SUNWxvmhvm SUNWxvmr SUNWxvmu
# pkgadd -d . SUNWlibvirt SUNWlibvirtr
SUNWurlgrabber SUNWvdisk SUNWvirtinst SUNWxvmdomr SUNWxvmdomu
SUNWxvmh SUNWxvmhvm SUNWxvmr SUNWxvmu
# svcadm enable xvm/domains xvm/console
xvm/xend xvm/store xvm/virtd
# reboot
4. Enable xend to access pci device configure
space
# svccfg -s xend setprop
start/privileges = all
# svcadm refresh xend
# svcadm restart xend
5. Configure grub boot menu
# edit [/rpool]/boot/grub/menu.lst
title Solaris xVM
findroot (rootfs0,0,a)
kernel$ /boot/$ISADIR/xen.gz iommu=1
module$
/platform/i86xpv/kernel/$ISADIR/unix
/platform/i86xpv/kernel/$ISADIR/unix -B
pci-reserve="[1:0:0],[1:0:1],[3:0:0]"
module$
/platform/i86pc/$ISADIR/boot_archive
where, "iommu=1" enables the
hypervisor to support Intel vt-d; "-B
pci-reserve="[1:0:0],[1:0:1],[3:0:0]"" asks domain 0
to reserve pci devices for pass-through purpose.
6. pass through a pci device to HVM guest
1) below is a sample xm configure file
for pci device pass-through
#### start of the configure file,
pt-sample.py ####
import os, re
arch = os.uname()[4]
if re.search('64', arch):
arch_libdir = 'lib64'
else:
arch_libdir = 'lib'
kernel = "/usr/lib/xen/boot/hvmloader"
builder='hvm'
memory = 512
shadow_memory = 8
name = "r48"
vcpus=2
pci = [ '01:00.0' ]
disk = [
'file:/export/home/allen/iodomain/images/ia32e_rhel4u8.img,hdc,w' ]
device_model = '/usr/' + arch_libdir +
'/xen/bin/qemu-dm'
boot='c'
vnc=1
vnclisten="0.0.0.0"
vncconsole=1
vncpasswd=''
nographic=0
stdvga=0
serial='null'
on_poweroff = 'destroy'
on_reboot = 'restart'
on_crash = 'preserve'
#### end of the configure file,
pt-sample.py ####
where, "pci = [ '01:00.0' ]"
tells xm to pass through pci device with bdf [1,0,0] to the guest.
2) create the hvm guest domain
# xm create -c pt-sample.py
You will find the pass-through device,
when you logon the domain.
分享到:
相关推荐
DNGuard HVM Unpacker whats new: Dnguarg HVM 3.71 trial support!
Full Dnguard 3.68 support. Dnguard trial should be all supported! Dnguard 3.69/3.70 are not yet supported. Recommended OS: Windows XP ...DNGuard_HVM_Unpackerfr4.exe should be loaded by Framework 4.0
PV2HVM 要求 必须在 EC2 实例上运行 适用于 Ruby 的 AWS 开发工具包 具有 EC2 管理员权限的 EC2 实例配置文件 源 AMI 必须是您自己的 AMI(或允许创建根快照卷) 源 AMI 已安装 grub 源根卷不得分区(root_device_...
HVM的HookFramework 下载 转到“ 。 客户端最近一次成功运行CI。 移至底部,您将看到工件。 下载Jars和OS library 跑 下载后。 您的磁盘具有以下文件: Jars.zip `- api-1.0.0.jar - The api for developers `-...
DNGuard_HVM_Unpackerfr4 By CodeCracker Support 3.8_Trial 3.74_Trial How to use 1.If your system is XP and install .NetFramework4, you can use it right away. If your system is Windows 7,8,10, you...
不会用不要乱弄 专去HVM壳10和11运行不了 打开没反应记得换xp系统或在VM下操作
xp系统的HVM脱壳,必须是xp系统,.net 2.0和4.0的库都可以
【DNGuard.HVM 3.6】Net企业级加密.zip
DNGuard HVM采用的是纯虚拟机处理层的内核.兼容目前所有的32位.Net 框架版本,Net 1.1,2.0,3.0,3.5 以及其所有子版本(如beta x,CTP,RC,sp x等).支持泛型方法的加密.加密保护过程不依赖 ildasm 和 ilasm.支持 C++/CLI...
xen guest 配置文件,作为参考,方便 大家搭建环境
DNGuard_HVM_Unpacker_Fr4
【DNGuard.HVM 3.6】Net企业级加密
自己用libsvm封的svm matlab,有例子 不错的源码 很好
convert.sh运行以下步骤,一旦完成,您就可以在部署清单中引用新的 HVM 友好的干细胞。 剧本... 从提供的 PV AMI 启动 PV 实例 从 Amazon Linux 启动 HVM 实例 停止 PV 实例 停止 HVM 实例 用 PV 根磁盘替换 HVM 根...
DNGuard_HVM专业脱壳工具
1.安装ubuntu时使用的virt-install的...--hvm \ --os-type linux \ --network network=default \ --os-variant ubuntuquantal \ --graphics none \ --console pty,target_type=serial \ --location /data/00_osfile/u
测试是基于 Excel(R) 的工具,可以从 https://sourceforge.net/projects/entov-hvm/files/ENTOV-HVM/ 免费下载。 该测试侧重于将创新传播到后期采用者的关键加速器,并且旨在在没有支持测试的知识体系的先验知识的...
Get set subcommands: the second argument of the hypercall is a pointer to a xen_hvm_param struct.
人类病毒 适用于Coursera上从的机器语言的虚拟机。 平台 该平台是一个16位的冯·诺依曼机器,由一个CPU,两个独立的存储器模块(分别用作指令存储器和数据存储器)组成。CPU由ALU和三个寄存器..../hvm [inputfile.hex]