* Re: [9front] vmx(1) vs openbsd [not found] <1251C16DB5CD3CEFEE590AAFCE4C4543@ewsd.inri.net> @ 2020-06-25 3:48 ` ori 2020-06-25 6:55 ` hiro 2020-06-26 1:55 ` sl 0 siblings, 2 replies; 4+ messages in thread From: ori @ 2020-06-25 3:48 UTC (permalink / raw) To: sl, 9front > http://plan9.stanleylieber.com/hardware/thinkpad/x210/pre-1st-gen-1920x1200/sysinfo > > vmx -M 2G -n ether0 -d /dev/sdE1/data -v vesa:1280x800 /tmp/bsd.67 device=sd0a > > http://plan9.stanleylieber.com/vmx/img/20200624.vmx.openbsd67.png > > vmx(1) itself did not crash. is there something maybe wonky with my machine's > support for intel virtualization extensions? i had no trouble booting openbsd > on my x250[0], but this is the first time i've tried to boot a local disk > guest from a tls-booted host. > > sl > > [0] http://plan9.stanleylieber.com/hardware/thinkpad/x250/20cm-cto1ww/sysinfo xgetbv is an instruction that we probably don't emulate yet. Seems to be somethign that OpenBSD calls as part of the spectre-class attack mitigations. (Specifically, MDS). We can probably work around it by lying around cpuid, but it'd be better to fix it right. Not sure what that means yet. ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [9front] vmx(1) vs openbsd 2020-06-25 3:48 ` [9front] vmx(1) vs openbsd ori @ 2020-06-25 6:55 ` hiro 2020-06-26 2:56 ` Ori Bernstein 2020-06-26 1:55 ` sl 1 sibling, 1 reply; 4+ messages in thread From: hiro @ 2020-06-25 6:55 UTC (permalink / raw) To: 9front can't you just disable spectre mitigations on bsd? ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [9front] vmx(1) vs openbsd 2020-06-25 6:55 ` hiro @ 2020-06-26 2:56 ` Ori Bernstein 0 siblings, 0 replies; 4+ messages in thread From: Ori Bernstein @ 2020-06-26 2:56 UTC (permalink / raw) To: 9front; +Cc: hiro On Thu, 25 Jun 2020 08:55:59 +0200, hiro <23hiro@gmail.com> wrote: > can't you just disable spectre mitigations on bsd? > By editing the code and rebuilding the kernel. -- Ori Bernstein ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [9front] vmx(1) vs openbsd 2020-06-25 3:48 ` [9front] vmx(1) vs openbsd ori 2020-06-25 6:55 ` hiro @ 2020-06-26 1:55 ` sl 1 sibling, 0 replies; 4+ messages in thread From: sl @ 2020-06-26 1:55 UTC (permalink / raw) To: 9front >> http://plan9.stanleylieber.com/hardware/thinkpad/x210/pre-1st-gen-1920x1200/sysinfo >> >> vmx -M 2G -n ether0 -d /dev/sdE1/data -v vesa:1280x800 /tmp/bsd.67 device=sd0a >> >> http://plan9.stanleylieber.com/vmx/img/20200624.vmx.openbsd67.png >> >> vmx(1) itself did not crash. is there something maybe wonky with my machine's >> support for intel virtualization extensions? i had no trouble booting openbsd >> on my x250[0], but this is the first time i've tried to boot a local disk >> guest from a tls-booted host. >> >> sl >> >> [0] http://plan9.stanleylieber.com/hardware/thinkpad/x250/20cm-cto1ww/sysinfo > > xgetbv is an instruction that we probably don't emulate yet. > Seems to be somethign that OpenBSD calls as part of the > spectre-class attack mitigations. (Specifically, MDS). > > We can probably work around it by lying around cpuid, > but it'd be better to fix it right. Not sure what that > means yet. i believe the last time i booted this openbsd installation in vmx(1) it was using a slightly older version of the 6.6 kernel. the current 6.6 kernel on the ftp sites (presumably patched?) fails the same way. sl ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2020-06-26 2:56 UTC | newest] Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- [not found] <1251C16DB5CD3CEFEE590AAFCE4C4543@ewsd.inri.net> 2020-06-25 3:48 ` [9front] vmx(1) vs openbsd ori 2020-06-25 6:55 ` hiro 2020-06-26 2:56 ` Ori Bernstein 2020-06-26 1:55 ` sl
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).