Re: VMWARE GSX Port?

2006-03-02 Thread Kip Macy
-CURRENT runs on 3.0 as a domU. There is partial dom0 support. The
changes have not gone back into the mainline because xenbus is
extremely difficult to integrate cleanly. You can check on the state
of the xen3 branch in perforce.

 -Kip



On 3/2/06, Ashok Shrestha <[EMAIL PROTECTED]> wrote:
> According to the Xen website, it's been ported to FreeBSD
> [http://wiki.xensource.com/xenwiki/OSCompatibility].
>
> Anybody know where port is?
>
> -Ashok Shrestha
>
>
> On 2/28/06, Seán C. Farley <[EMAIL PROTECTED]> wrote:
> > On Tue, 28 Feb 2006, Mike Silbersack wrote:
> >
> > > On Sat, 25 Feb 2006, Scott Long wrote:
> > >
> > >> Ashok Shrestha wrote:
> > >>> VMWARE GSX was released recently for free.
> > >>> [http://www.vmware.com/news/releases/server_beta.html]
> > >>>
> > >>> Is anyone working on a port for this?
> > >>
> > >> I've started on it, but I haven't made much progress yet.
> > >
> > > Anyone who's interested in working on it should make sure to start
> > > with the VMWare 3 port (which works at present), and Orlando's beta
> > > 4.5 port:
> > >
> > > http://www.break.net/orlando/freebsd.html
> >
> > Also, check out Wietse Venema's changes[1] done on top of Orlando's
> > work.
> >
> > Seán
> >   1. 
> > http://lists.freebsd.org/pipermail/freebsd-emulation/2006-February/001843.html
> > --
> > [EMAIL PROTECTED]
> >
>
>
> --
> Ashok Shrestha
> ___
> freebsd-hackers@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>
___
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: VMWARE GSX Port?

2006-03-02 Thread Ashok Shrestha
According to the Xen website, it's been ported to FreeBSD
[http://wiki.xensource.com/xenwiki/OSCompatibility].

Anybody know where port is?

-Ashok Shrestha


On 2/28/06, Seán C. Farley <[EMAIL PROTECTED]> wrote:
> On Tue, 28 Feb 2006, Mike Silbersack wrote:
>
> > On Sat, 25 Feb 2006, Scott Long wrote:
> >
> >> Ashok Shrestha wrote:
> >>> VMWARE GSX was released recently for free.
> >>> [http://www.vmware.com/news/releases/server_beta.html]
> >>>
> >>> Is anyone working on a port for this?
> >>
> >> I've started on it, but I haven't made much progress yet.
> >
> > Anyone who's interested in working on it should make sure to start
> > with the VMWare 3 port (which works at present), and Orlando's beta
> > 4.5 port:
> >
> > http://www.break.net/orlando/freebsd.html
>
> Also, check out Wietse Venema's changes[1] done on top of Orlando's
> work.
>
> Seán
>   1. 
> http://lists.freebsd.org/pipermail/freebsd-emulation/2006-February/001843.html
> --
> [EMAIL PROTECTED]
>


--
Ashok Shrestha
___
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Accessing address space of a process through kld!!

2006-03-02 Thread Julian Elischer

alc (Alan Cox) is ill at the moment so may not be responding.
___
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: unversal watchdog

2006-03-02 Thread Brian Reichert
On Wed, Mar 01, 2006 at 10:20:03PM -0700, M. Warner Losh wrote:
> : You can do it with /etc/ttys. Actually this point is missing by many
> : FreeBSD administrators, people just think of /etc/ttys in term of
> : terminals and stuff :) But if youi'll open the man page you would
> : found the following:

It may have already been volunteered already; has the OP explored
daemontools?

I'll note that its master 'svscan' script is launched by an rc.d
script (a decision of the port maintainer), not init directly, but
that's not a hard change to affect...

> Warner

-- 
Brian Reichert  <[EMAIL PROTECTED]>
55 Crystal Ave. #286Daytime number: (603) 434-6842
Derry NH 03038-1725 USA BSD admin/developer at large
___
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


vn_lock(9)' LK_UPGRADE|LK_RETRY safety

2006-03-02 Thread Kostik Belousov
Assume that thread owns LK_SHARED lock on vnode vp, and the call
vn_lock(vp, LK_UPGRADE|LK_RETRY, curthread) is made. Is this upgrade
safe from dropping shared lock during the retries made in vn_lock ?

Man page for lockmgr says that failed LK_UPGRADE request
returns with shared lock dropped. But, from the review
of the code for lockmgr() and esp. acquire(), it seems
that it is impossible to get error (due to absence of LK_NOWAIT
and empty flags & zero timeout for msleep). Consequently,
it seems that shared lock will not be dropped. Is this true ?

Anyway, for instance, lookup(9) (sys/kern/vfs_lookup.c, line 552,
rev. 1.88) uses such call and does not check for errors. 

Best regards,
Kostik Belousov


pgp99H52qApj8.pgp
Description: PGP signature


Re: Accessing address space of a process through kld!!

2006-03-02 Thread Andrey Simonenko
On Wed, Mar 01, 2006 at 10:54:49AM -0500, John Baldwin wrote:

> > I have two questions about this function:
> > 
> > 1.  vm_fault() does not guarantee, that (possibly) faulted in page
> > will be in the object or in one of backing objects when
> > vm_fault() returns, because a page can become not resident
> > again.  Why not to wire needed page in vm_fault() (by giving
> > a special flag to vm_fault() function)?
> > 
> > 2.  When the object which owns the page is unlocked, which lock
> > guarantees, then m will point to a page?  I mean m, which is
> > used in vm_page_hold(m), which is called after VM_OBJECT_UNLOCK()
> > (I mean a gap of time between VM_OBJECT_UNLOCK() and
> > vm_page_lock_queues() function calls).
> > 
> > Can you answer these two question?  Thanks.
> 
> Those are outside of my realm of knowledge unfortunately, but there are
> some other folks you can ask including probably truckman@ and [EMAIL 
> PROTECTED]

I'll wait some time for answers and may be will ask them directly
in a private mail.  Probably I need to create situation to force
proc_rwmem() to make possibly incorrect step.

Less than one year ago I found several bugs in FreeBSD VM subsystem
(I found that bugs from theoretical understanding how everything works).
Then I wrote userland programs to simulate that bugs.  With one test
program VM simply incorrectly worked and with another test program VM
panics.  I sent two comments about this to hackers@ mailing list, but
haven't received any response (I just asked to give more strict
description of VM semantics).

(in groups.google.com type "wired shared comments freebsd" and
see two comment in the top of the search results)



I see similar problems (?) as I described above in another parts of
the system.  For example vfs_export.c:vfs_export_lookup() function
references np after releasing lock on head of corresponding PATRICIA
tree:

RADIX_NODE_HEAD_LOCK(rnh);
np = (struct netcred *)
(*rnh->rnh_matchaddr)(saddr, rnh);
RADIX_NODE_HEAD_UNLOCK(rnh);
if (np && np->netc_rnodes->rn_flags & RNF_ROOT)
np = NULL;

Also references to heads of PATRICIA trees are not protected by
any lock.

I think that everything works, because there is another mutex
which protects these structures.  For example Giant is acquired
in nfs_srvsubs.c:nfsrv_fhtovp() before calling VFS_CHECKEXP and
it is also acquired at some point in mount() path and lock on it
occasionally is not lost in another function, for example in
msleep().
___
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"