From owner-freebsd-xen@FreeBSD.ORG Mon Aug 26 11:06:55 2013 Return-Path: Delivered-To: freebsd-xen@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id BF9221C6 for ; Mon, 26 Aug 2013 11:06:55 +0000 (UTC) (envelope-from owner-bugmaster@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id ACB3F287A for ; Mon, 26 Aug 2013 11:06:55 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r7QB6tFk066157 for ; Mon, 26 Aug 2013 11:06:55 GMT (envelope-from owner-bugmaster@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r7QB6tlm066154 for freebsd-xen@FreeBSD.org; Mon, 26 Aug 2013 11:06:55 GMT (envelope-from owner-bugmaster@FreeBSD.org) Date: Mon, 26 Aug 2013 11:06:55 GMT Message-Id: <201308261106.r7QB6tlm066154@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: gnats set sender to owner-bugmaster@FreeBSD.org using -f From: FreeBSD bugmaster To: freebsd-xen@FreeBSD.org Subject: Current problem reports assigned to freebsd-xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2013 11:06:55 -0000 Note: to view an individual PR, use: http://www.freebsd.org/cgi/query-pr.cgi?pr=(number). The following is a listing of current problems submitted by FreeBSD users. These represent problem reports covering all versions including experimental development code and obsolete releases. S Tracker Resp. Description -------------------------------------------------------------------------------- o kern/180788 xen [xen] [panic] XEN PV kernel 9.2-BETA1 panics on boot o kern/180403 xen [xen] Problems with GENERIC and XENHVM kernels with Xe o kern/180402 xen [xen] XEN kernel does not load in XenClient 4.5.5 o kern/179814 xen [xen] mountroot fails with error=19 under Xen on 9-STA o kern/176471 xen [xen] xn driver crash on detach o kern/176053 xen [xen] [patch] i386: Correct wrong usage of vsnprintf() o kern/175954 xen [xen] XENHVM xn network driver extreme packet loss dur o kern/175822 xen [xen] FreeBSD 9.1 does not work with Xen 4.0 o kern/175757 xen [xen] [patch] xen pvhvm looses keyboard input from VNC o kern/171873 xen [xen] xn network device floods warning in dmesg o kern/171118 xen [xen] FreeBSD XENHVM guest doesn't shutdown cleanly o kern/166174 xen [xen] Problems ROOT MOUNT ERROR o kern/165418 xen [xen] Problems mounting root filesystem from XENHVM o kern/164630 xen [xen] XEN HVM kernel: run_interrupt_driven_hooks: stil o kern/164450 xen [xen] Failed to install FreeeBSD 9.0-RELEASE from CD i o kern/162677 xen [xen] FreeBSD not compatible with "Current Stable Xen" o kern/161318 xen [xen] sysinstall crashes with floating point exception o kern/155468 xen [xen] Xen PV i386 multi-kernel CPU system is not worki o kern/155353 xen [xen] [patch] put "nudging TOD" message under boot_ver o kern/154833 xen [xen]: xen 4.0 - DomU freebsd8.2RC3 i386, XEN kernel. o kern/154473 xen [xen] xen 4.0 - DomU freebsd8.1 i386, XEN kernel. Not o kern/154472 xen [xen] xen 4.0 - DomU freebsd8.1 i386 xen kernel reboot o kern/154428 xen [xen] xn0 network interface and PF - Massive performan o kern/153674 xen [xen] i386/XEN idle thread shows wrong percentages o kern/153672 xen [xen] [panic] i386/XEN panics under heavy fork load o kern/153620 xen [xen] Xen guest system clock drifts in AWS EC2 (FreeBS o kern/153477 xen [xen] XEN pmap code abuses vm page queue lock o kern/153150 xen [xen] xen/ec2: disable checksum offloading on interfac o kern/152228 xen [xen] [panic] Xen/PV panic with machdep.idle_mwait=1 o kern/144629 xen [xen] FreeBSD 8-RELEASE XEN pvm networking doesn't wor o kern/143398 xen [xen] FreeBSD 8-RELEASE XEN pvm networking doesn't wor o kern/143340 xen [xen] FreeBSD 8-RELEASE XEN pvm networking doesn't wor f kern/143069 xen [xen] [panic] Xen Kernel Panic - Memory modified after f kern/135667 xen ufs filesystem corruption on XEN DomU system f kern/135421 xen [xen] FreeBSD Xen PVM DomU network failure - netfronc. f kern/135178 xen [xen] Xen domU outgoing data transfer stall when TSO i p kern/135069 xen [xen] FreeBSD-current/Xen SMP doesn't function at all f i386/124516 xen [xen] FreeBSD-CURRENT Xen Kernel Segfaults when config o kern/118734 xen [xen] FreeBSD 6.3-RC1 and FreeBSD 7.0-BETA 4 fail to b 39 problems total. From owner-freebsd-xen@FreeBSD.ORG Mon Aug 26 15:21:10 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 8DBB3721 for ; Mon, 26 Aug 2013 15:21:10 +0000 (UTC) (envelope-from ederbsd@gmail.com) Received: from mail-vb0-x22d.google.com (mail-vb0-x22d.google.com [IPv6:2607:f8b0:400c:c02::22d]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 4D55F2B41 for ; Mon, 26 Aug 2013 15:21:10 +0000 (UTC) Received: by mail-vb0-f45.google.com with SMTP id e15so2110577vbg.18 for ; Mon, 26 Aug 2013 08:21:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=X4S+vqarNgJwI+RYSxHNzxbaK90uV2leIBsIJQ/Dgjg=; b=gSp8tZYD3qcxnv5vLx9V7jpYoKBMdoI3xAyjO/ed5sihX9OE0623H0/SNOk2BSDrpl dV+KX8YrkFtKuzk4PgcTI4PIzDPqJrdgLjbALnfbdc1euUi7mCZ4PtlG48sWuVBKytRw mGISRH5gQxiFWfxiIjADeKfsCp088OmsmnVfhqF5H/3stSiluOmZGO/hToSDazHuEPsO uIKXvdzWObciYElvNRr0MCjFeJlCU5gax1jOxHNzKEVAmorRwDV04zKyFQ0xgsb9BPjS xWRb/Sd0ktWLJSWkqm7yGIQtR83yde3IPPfOjqbpQSieVE489It/DfTLeETOYevstxYX 71mw== MIME-Version: 1.0 X-Received: by 10.52.186.65 with SMTP id fi1mr180387vdc.41.1377530468726; Mon, 26 Aug 2013 08:21:08 -0700 (PDT) Received: by 10.58.214.165 with HTTP; Mon, 26 Aug 2013 08:21:08 -0700 (PDT) In-Reply-To: References: Date: Mon, 26 Aug 2013 12:21:08 -0300 Message-ID: Subject: Re: [FreeBSD 9.1 and XenServer 5.6.0] From: Ederson de Moura To: Sergey Kandaurov Content-Type: text/plain; charset=ISO-8859-1 X-Content-Filtered-By: Mailman/MimeDel 2.1.14 Cc: freebsd-xen@freebsd.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Aug 2013 15:21:10 -0000 Hi, Karl: Is no media in the driver, the iso image was also removed! still the problem persists. Sergey: The problem remains, did the change in "/etc/ttys" as described here: http://wiki.sysconfig.org.uk/display/howto/Xen+FreeBSD+8.2+DomU+%28PV%29+--+Step+by+Step+Howto But when I reboot, the system hangs at the same stage. Regards, EDM. On 23 August 2013 13:02, Sergey Kandaurov wrote: > On 23 August 2013 16:45, Ederson de Moura wrote: > > Hello guys, > > > > I installed FreeBSD 9.1 (64 bit) in XenServer (5.6.0)! It's running > > perfectly, following the tutorial below: > > > > > http://www.vanhal-ict.nl/1/post/2012/8/freebsd-9-domu-on-xen-part-i-installing-freebsd.html > > > > But the moment you recompile the kernel GENERIC, the system hangs on > load. Even > > making the changes suggested in the tutorial (Part II: Optimizing > FreeBSD) or > > not. > > > > The system does not load! as follows my print: > > > > http://200.189.101.110/~edm/FreeBSD-Xen-Stop.png > > > > Reloading the old kernel, the system up! Does anyone have any idea what > could > > be the problem? > > > > Best regards, > > > > Also, I would check if multiuser output is properly routed. Check your > /etc/ttys. I don't remember well but to get them you probably need to > replace ttyv0 with xc0 which is the default Xen console instead of UART. > > That would answer why you see kernel messages and don't see multiuser ones > which usually appear right after "cd0" string or close to. > > -- > wbr, > pluknet > -- Ederson de Moura http://sites.google.com/site/edersondemoura/ From owner-freebsd-xen@FreeBSD.ORG Tue Aug 27 05:09:19 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 0A75933B for ; Tue, 27 Aug 2013 05:09:19 +0000 (UTC) (envelope-from bounces+73574-0602-freebsd-xen=freebsd.org@sendgrid.me) Received: from o3.shared.sendgrid.net (o3.shared.sendgrid.net [208.117.48.85]) by mx1.freebsd.org (Postfix) with SMTP id BD6322ACC for ; Tue, 27 Aug 2013 05:09:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sendgrid.info; h=from :mime-version:to:subject:content-type; s=smtpapi; bh=bWN7F9DWX5b IaOHOJO7ZULlZM1c=; b=u96cIeyOZwYglc3CPxW4EjJLBNRfg7+Oz2dkrbz+6I1 vsYvBRJfmjH56kjPT0tKdCfZLQ5iWMrFPI6vyb+a0WeP/F3ykkIxoDkarWtukWME YwYiXDrdM7RDXZrkaiL+kXOSpUUGqJUBrbP6XRoM05yhOZwy+4z3t8c5iV+IaWT4 = Received: by with SMTP id mf96.23463.521C347C1 Tue, 27 Aug 2013 05:09:16 +0000 (GMT) Received: from mail.tarsnap.com (unknown [10.60.208.15]) by mi20 (SG) with ESMTP id 140be2cf4f8.6e4f.d0c85 for ; Tue, 27 Aug 2013 05:09:12 +0000 (UTC) Received: (qmail 83703 invoked from network); 27 Aug 2013 05:09:11 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by ec2-107-20-205-189.compute-1.amazonaws.com with ESMTP; 27 Aug 2013 05:09:11 -0000 Received: (qmail 4673 invoked from network); 27 Aug 2013 05:08:34 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by clamshell.daemonology.net with SMTP; 27 Aug 2013 05:08:34 -0000 Message-ID: <521C3452.8080209@freebsd.org> Date: Mon, 26 Aug 2013 22:08:34 -0700 From: Colin Percival User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:17.0) Gecko/20130816 Thunderbird/17.0.8 MIME-Version: 1.0 To: freebsd-xen@FreeBSD.org Subject: CFT: replacing XENHVM kernel config with GENERIC + xenhvm.ko X-Enigmail-Version: 1.5.1 Content-Type: multipart/mixed; boundary="------------060705000905050805040400" X-SG-EID: RUbAm5H8PjswBj/QH+sYVehaJogg3iBnZcyVi1bw/Iy5TdO3IONudzzeF9W2ODCqEJcluuWwV4J5sI6aZ8htgKkNj3v1wZYJyBVnIsJ6LWgUsYJDcHE39UFeUIEA+Rp9fPyVt2xnYPOcV0Uw1lwgQMqj34F8gjcxSqbXMmhR0SQ= X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2013 05:09:19 -0000 This is a multi-part message in MIME format. --------------060705000905050805040400 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Hi all, I've attached a patch which eliminates the XENHVM kernel configuration and instead allows FreeBSD to run under Xen/HVM with PV drivers by loading a new xenhvm.ko module from the boot loader. This will mean that FreeBSD virtual machines running under Xen/HVM will be able to run "straight off the ISO" binaries; this will also mean they will be able to use FreeBSD Update to update the kernel. I have spent about 10 minutes testing this in Amazon EC2. Please help me out by doing some more testing. ;-) The fine details: 1. I've created a new kernel module for i386 and amd64, "xenhvm", with all of the source files which were added via "options XENHVM" and "device xenpci". 2. I have removed those from sys/conf/files and sys/conf/options.*; those options are now meaningless. 3. I moved the "detect Xen and disable QEMU emulated devices" code from sys/amd64/amd64/machdep.c to the kernel module MOD_LOAD event handler. 4. I have made the PCPU values required by Xen/HVM support -- two unsigned ints -- unconditionally compiled in. This is the only change to the GENERIC kernel. 5. I have removed the XENHVM kernel configuration files. Depending on feedback from freebsd-xen@ I hope to send this to freebsd-current for wider review later this week and then commit it before the FreeBSD 10.0 code freeze starts on September 7th. -- Colin Percival Security Officer Emeritus, FreeBSD | The power to serve Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid --------------060705000905050805040400 Content-Type: text/plain; charset=us-ascii; name="mod_xenhvm.patch" Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="mod_xenhvm.patch" Index: sys/amd64/amd64/machdep.c =================================================================== --- sys/amd64/amd64/machdep.c (revision 254941) +++ sys/amd64/amd64/machdep.c (working copy) @@ -1910,14 +1910,6 @@ if (env != NULL) strlcpy(kernelname, env, sizeof(kernelname)); -#ifdef XENHVM - if (inw(0x10) == 0x49d2) { - if (bootverbose) - printf("Xen detected: disabling emulated block and network devices\n"); - outw(0x10, 3); - } -#endif - cpu_probe_amdc1e(); #ifdef FDT Index: sys/amd64/conf/XENHVM =================================================================== --- sys/amd64/conf/XENHVM (revision 254941) +++ sys/amd64/conf/XENHVM (working copy) @@ -1,22 +0,0 @@ -# -# XENHVM -- Xen HVM kernel configuration file for FreeBSD/amd64 -# -# $FreeBSD$ -# -include GENERIC -ident XENHVM - -# -# Adaptive locks rely on a lock-free pointer read to determine the run state -# of the thread holding a lock when under contention; under a virtualisation -# system, the thread run state may not accurately reflect whether the thread -# (or rather its host VCPU) is actually executing. As such, disable this -# optimisation. -# -options NO_ADAPTIVE_MUTEXES -options NO_ADAPTIVE_RWLOCKS -options NO_ADAPTIVE_SX - -# Xen HVM support -options XENHVM -device xenpci Index: sys/amd64/include/pcpu.h =================================================================== --- sys/amd64/include/pcpu.h (revision 254941) +++ sys/amd64/include/pcpu.h (working copy) @@ -42,14 +42,10 @@ #endif #endif -#ifdef XENHVM #define PCPU_XEN_FIELDS \ ; \ unsigned int pc_last_processed_l1i; \ unsigned int pc_last_processed_l2i -#else -#define PCPU_XEN_FIELDS -#endif /* * The SMP parts are setup in pmap.c and locore.s for the BSP, and Index: sys/conf/files =================================================================== --- sys/conf/files (revision 254941) +++ sys/conf/files (working copy) @@ -2490,16 +2490,14 @@ clean "wpi.fw" dev/xe/if_xe.c optional xe dev/xe/if_xe_pccard.c optional xe pccard -dev/xen/balloon/balloon.c optional xen | xenhvm -dev/xen/blkfront/blkfront.c optional xen | xenhvm -dev/xen/blkback/blkback.c optional xen | xenhvm +dev/xen/balloon/balloon.c optional xen +dev/xen/blkfront/blkfront.c optional xen +dev/xen/blkback/blkback.c optional xen dev/xen/console/console.c optional xen dev/xen/console/xencons_ring.c optional xen -dev/xen/control/control.c optional xen | xenhvm -dev/xen/netback/netback.c optional xen | xenhvm -dev/xen/netfront/netfront.c optional xen | xenhvm -dev/xen/xenpci/xenpci.c optional xenpci -dev/xen/xenpci/evtchn.c optional xenpci +dev/xen/control/control.c optional xen +dev/xen/netback/netback.c optional xen +dev/xen/netfront/netfront.c optional xen dev/xl/if_xl.c optional xl pci dev/xl/xlphy.c optional xl pci fs/deadfs/dead_vnops.c standard @@ -3813,18 +3811,18 @@ vm/vm_unix.c standard vm/vm_zeroidle.c standard vm/vnode_pager.c standard -xen/gnttab.c optional xen | xenhvm -xen/features.c optional xen | xenhvm +xen/gnttab.c optional xen +xen/features.c optional xen xen/evtchn/evtchn.c optional xen -xen/evtchn/evtchn_dev.c optional xen | xenhvm -xen/xenbus/xenbus_if.m optional xen | xenhvm -xen/xenbus/xenbus.c optional xen | xenhvm -xen/xenbus/xenbusb_if.m optional xen | xenhvm -xen/xenbus/xenbusb.c optional xen | xenhvm -xen/xenbus/xenbusb_front.c optional xen | xenhvm -xen/xenbus/xenbusb_back.c optional xen | xenhvm -xen/xenstore/xenstore.c optional xen | xenhvm -xen/xenstore/xenstore_dev.c optional xen | xenhvm +xen/evtchn/evtchn_dev.c optional xen +xen/xenbus/xenbus_if.m optional xen +xen/xenbus/xenbus.c optional xen +xen/xenbus/xenbusb_if.m optional xen +xen/xenbus/xenbusb.c optional xen +xen/xenbus/xenbusb_front.c optional xen +xen/xenbus/xenbusb_back.c optional xen +xen/xenstore/xenstore.c optional xen +xen/xenstore/xenstore_dev.c optional xen xdr/xdr.c optional krpc | nfslockd | nfsclient | nfsserver | nfscl | nfsd xdr/xdr_array.c optional krpc | nfslockd | nfsclient | nfsserver | nfscl | nfsd xdr/xdr_mbuf.c optional krpc | nfslockd | nfsclient | nfsserver | nfscl | nfsd Index: sys/conf/options.amd64 =================================================================== --- sys/conf/options.amd64 (revision 254941) +++ sys/conf/options.amd64 (working copy) @@ -64,7 +64,5 @@ # BPF just-in-time compiler BPF_JITTER opt_bpf.h -XENHVM opt_global.h - # options for the Intel C600 SAS driver (isci) ISCI_LOGGING opt_isci.h Index: sys/conf/options.i386 =================================================================== --- sys/conf/options.i386 (revision 254941) +++ sys/conf/options.i386 (working copy) @@ -119,7 +119,6 @@ NATIVE opt_global.h XEN opt_global.h -XENHVM opt_global.h # options for the Intel C600 SAS driver (isci) ISCI_LOGGING opt_isci.h Index: sys/i386/conf/XENHVM =================================================================== --- sys/i386/conf/XENHVM (revision 254941) +++ sys/i386/conf/XENHVM (working copy) @@ -1,22 +0,0 @@ -# -# XENHVM -- Xen HVM kernel configuration file for FreeBSD/i386 -# -# $FreeBSD$ -# -include GENERIC -ident XENHVM - -# -# Adaptive locks rely on a lock-free pointer read to determine the run state -# of the thread holding a lock when under contention; under a virtualisation -# system, the thread run state may not accurately reflect whether the thread -# (or rather its host VCPU) is actually executing. As such, disable this -# optimisation. -# -options NO_ADAPTIVE_MUTEXES -options NO_ADAPTIVE_RWLOCKS -options NO_ADAPTIVE_SX - -# Xen HVM support -options XENHVM -device xenpci Index: sys/i386/include/pcpu.h =================================================================== --- sys/i386/include/pcpu.h (revision 254941) +++ sys/i386/include/pcpu.h (working copy) @@ -77,7 +77,7 @@ int pc_ipi_to_irq[NR_IPIS]; \ char __pad[77] -#elif defined(XENHVM) +#else /* !XEN */ #define PCPU_XEN_FIELDS \ ; \ @@ -84,13 +84,6 @@ unsigned int pc_last_processed_l1i; \ unsigned int pc_last_processed_l2i; \ char __pad[229] - -#else /* !XEN && !XENHVM */ - -#define PCPU_XEN_FIELDS \ - ; \ - char __pad[237] - #endif #define PCPU_MD_FIELDS \ Index: sys/modules/Makefile =================================================================== --- sys/modules/Makefile (revision 254941) +++ sys/modules/Makefile (working copy) @@ -363,6 +363,7 @@ ${_wpifw} \ ${_x86bios} \ ${_xe} \ + ${_xenhvm} \ xl \ ${_zfs} \ zlib \ @@ -370,6 +371,7 @@ .if ${MACHINE_CPUARCH} == "i386" || ${MACHINE_CPUARCH} == "amd64" _filemon= filemon _vmware= vmware +_xenhvm= xenhvm .endif .if ${MACHINE_CPUARCH} != "powerpc" && ${MACHINE_CPUARCH} != "arm" && \ Index: sys/modules/xenhvm/Makefile =================================================================== --- sys/modules/xenhvm/Makefile (revision 0) +++ sys/modules/xenhvm/Makefile (working copy) @@ -0,0 +1,21 @@ +# $FreeBSD$ + +KMOD= xenhvm + +DEVXENDIR= ${.CURDIR}/../../dev/xen/ +XENDIR= ${.CURDIR}/../../xen/ +.PATH: ${DEVXENDIR}/balloon ${DEVXENDIR}/blkfront ${DEVXENDIR}/blkback \ + ${DEVXENDIR}/control ${DEVXENDIR}/netback ${DEVXENDIR}/netfront \ + ${DEVXENDIR}/xenpci ${XENDIR}/ ${XENDIR}/evtchn \ + ${XENDIR}/xenbus ${XENDIR}/xenstore + +SRCS= xenhvm_mod.c \ + balloon.c blkfront.c blkback.c control.c netback.c netfront.c \ + xenpci.c evtchn.c gnttab.c features.c evtchn_dev.c \ + xenbus.c xenbusb.c xenbusb_front.c xenbusb_back.c \ + xenbus_if.c xenbus_if.h xenbusb_if.c xenbusb_if.h \ + xenstore.c xenstore_dev.c +MFILES= xen/xenbus/xenbus_if.m xen/xenbus/xenbusb_if.m +CFLAGS+= -DXENHVM + +.include Index: sys/xen/xenhvm_mod.c =================================================================== --- sys/xen/xenhvm_mod.c (revision 0) +++ sys/xen/xenhvm_mod.c (working copy) @@ -0,0 +1,32 @@ +#include +__FBSDID("$FreeBSD"); + +#include +#include +#include +#include + +static int +xenhvm_modevent(module_t mod, int type, void *arg) +{ + + switch (type) { + case MOD_LOAD: + if (inw(0x10) == 0x49d2) { + if (bootverbose) + printf("Xen detected: disabling emulated block and network devices\n"); + outw(0x10, 3); + } + return (0); + } + + return (EOPNOTSUPP); +} + +static moduledata_t xenhvm_mod = { + "xenhvm", + xenhvm_modevent, + 0 +}; + +DECLARE_MODULE(xenhvm, xenhvm_mod, SI_SUB_DRIVERS, SI_ORDER_FIRST); --------------060705000905050805040400-- From owner-freebsd-xen@FreeBSD.ORG Tue Aug 27 08:37:12 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 4A3EE920 for ; Tue, 27 Aug 2013 08:37:12 +0000 (UTC) (envelope-from kpielorz_lst@tdx.co.uk) Received: from mail.tdx.com (mail.tdx.com [62.13.128.18]) by mx1.freebsd.org (Postfix) with ESMTP id 103E4268F for ; Tue, 27 Aug 2013 08:37:11 +0000 (UTC) Received: from Mail-PC.tdx.co.uk (storm.tdx.co.uk [62.13.130.251]) (authenticated bits=0) by mail.tdx.com (8.14.3/8.14.3/) with ESMTP id r7R8b4Lf084081 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 27 Aug 2013 09:37:04 +0100 (BST) Date: Tue, 27 Aug 2013 09:37:06 +0100 From: Karl Pielorz To: Ederson de Moura , Sergey Kandaurov Subject: Re: [FreeBSD 9.1 and XenServer 5.6.0] Message-ID: <5CF16D18E795801142336E70@Mail-PC.tdx.co.uk> In-Reply-To: References: X-Mailer: Mulberry/4.0.8 (Win32) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline Cc: freebsd-xen@freebsd.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2013 08:37:12 -0000 --On 26 August 2013 12:21 -0300 Ederson de Moura wrote: > Hi, > > Karl: Is no media in the driver, the iso image was also removed! still the > problem persists. > > Sergey: The problem remains, did the change in "/etc/ttys" as described > here: > > http://wiki.sysconfig.org.uk/display/howto/Xen+FreeBSD+8.2+DomU+%28PV%29+ > --+Step+by+Step+Howto > > But when I reboot, the system hangs at the same stage. It still sounds like it might be the same problem - even just having the CDROM drive "available" (with no media mounted) for the VM caused it to hang, in the end I had to log into the XenServer console and use 'xe vbd-destroy uuid= UUID of the CDROM for my VM' to actually remove the CDROM from the VM. On my system if the kernel came up and showed a CDROM even being detected (regardless of if it had media in it or not) - it didn't boot. The only way to boot it was to remove the CDROM from the VM completely (so it doesn't show as detected by the kernel). -Karl From owner-freebsd-xen@FreeBSD.ORG Tue Aug 27 22:51:01 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id CB1A6AB1 for ; Tue, 27 Aug 2013 22:51:01 +0000 (UTC) (envelope-from sean_bruno@yahoo.com) Received: from nm12-vm10.bullet.mail.gq1.yahoo.com (nm12-vm10.bullet.mail.gq1.yahoo.com [98.136.218.139]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 8CF9428F6 for ; Tue, 27 Aug 2013 22:51:01 +0000 (UTC) Received: from [98.137.12.188] by nm12.bullet.mail.gq1.yahoo.com with NNFMP; 27 Aug 2013 22:45:05 -0000 Received: from [208.71.42.199] by tm9.bullet.mail.gq1.yahoo.com with NNFMP; 27 Aug 2013 22:45:05 -0000 Received: from [127.0.0.1] by smtp210.mail.gq1.yahoo.com with NNFMP; 27 Aug 2013 22:45:05 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1377643505; bh=yqKifi/ZbYMgybZiGWsZ0fWPuKNqjFhFyzIKFJhzS5A=; h=X-Yahoo-Newman-Id:X-Yahoo-Newman-Property:X-YMail-OSG:X-Yahoo-SMTP:X-Rocket-Received:Subject:From:Reply-To:To:Cc:In-Reply-To:References:Content-Type:Date:Message-ID:Mime-Version:X-Mailer; b=Idw7yi/p4G2OdyYuix+fcsBJlhds3oLb6Qpwi0bLdqe9eYL/DbRWr2GU5GAuhw6gOi35eElkXmxB3bWoKEX0m35+hL1beh3Ai00zmlko61e8iaF0SgCyn8Smlv3xgYsQTJyEpR21H6ep/jxs4DYttheGNSuzlP2GxQbVNkzj9qU= X-Yahoo-Newman-Id: 530024.38303.bm@smtp210.mail.gq1.yahoo.com X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: PGWrQ8kVM1lkIqfKZ5JUBDm4VgcFmJLBDFCmxIVFubu_WBQ vPmHm.WTKeAV3lrbz8LqGsiXJcNWI9EsYnkXxeJISnDYiREkqnCgjMiwssca QYOZMSGVx6Ce1CpUfe7RDpvzVTJMmNJmjda_9ujqAzJJd_8jH_QpRLKammVs u1G1xwhw.tWrolJv7WIQ8TUPz8.2ThsltDzWRcryoGVo4Zrx5guzFkRbwob5 zxBn52hs.OcnfkCUxJJr1i8krG.YV_QtT5aCcIpGrknrF4zj4udsclnGZSru HOkLvyYbZpQ9gRhKJ88q5ssOC7u_xLd2ZIdytBa6wSZow_MQGAXh3wkblOLV ACbpuaMKspjaWYrOopI0lVSseaf1_dGJv_Dmc85Hhc76YRsuCUTOZiwdVcxa NwY2c1pCNsPRIsm4BaBSRzm8iuDmP1VCcUaa68671LToKW34_VJh3L7mx99c QehUclMpqnZvMlxp07Gr08K9ZgS1Vpv34l4VUQvVfTxyxrOHH24jexRA2f43 MWt6uY02Ij9FOVqobvLfkxVg.Mtjcrwpz1lDDI4aAGKc0DbhjklpdvHNOQUx dYQ-- X-Yahoo-SMTP: u5BKR6OswBC_iZJVfGRoMkTIpc8pEA4- X-Rocket-Received: from [10.73.160.242] (sean_bruno@209.131.62.116 with ) by smtp210.mail.gq1.yahoo.com with SMTP; 27 Aug 2013 15:45:04 -0700 PDT Subject: Re: CFT: replacing XENHVM kernel config with GENERIC + xenhvm.ko From: Sean Bruno To: Colin Percival In-Reply-To: <521C3452.8080209@freebsd.org> References: <521C3452.8080209@freebsd.org> Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="=-dsnHfNzYIWVjD/CFc16Y" Date: Tue, 27 Aug 2013 15:45:03 -0700 Message-ID: <1377643503.6359.15.camel@localhost> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Cc: freebsd-xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: sbruno@freebsd.org List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Aug 2013 22:51:02 -0000 --=-dsnHfNzYIWVjD/CFc16Y Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable On Mon, 2013-08-26 at 22:08 -0700, Colin Percival wrote: > Hi all, >=20 > I've attached a patch which eliminates the XENHVM kernel configuration an= d > instead allows FreeBSD to run under Xen/HVM with PV drivers by loading a > new xenhvm.ko module from the boot loader. This will mean that FreeBSD > virtual machines running under Xen/HVM will be able to run "straight off > the ISO" binaries; this will also mean they will be able to use FreeBSD > Update to update the kernel. >=20 > I have spent about 10 minutes testing this in Amazon EC2. Please help me > out by doing some more testing. ;-) >=20 > The fine details: > 1. I've created a new kernel module for i386 and amd64, "xenhvm", with al= l > of the source files which were added via "options XENHVM" and "device xen= pci". > 2. I have removed those from sys/conf/files and sys/conf/options.*; those > options are now meaningless. > 3. I moved the "detect Xen and disable QEMU emulated devices" code from > sys/amd64/amd64/machdep.c to the kernel module MOD_LOAD event handler. > 4. I have made the PCPU values required by Xen/HVM support -- two unsigne= d > ints -- unconditionally compiled in. This is the only change to the GENE= RIC > kernel. > 5. I have removed the XENHVM kernel configuration files. >=20 > Depending on feedback from freebsd-xen@ I hope to send this to freebsd-cu= rrent > for wider review later this week and then commit it before the FreeBSD 10= .0 > code freeze starts on September 7th. Seems like you've got a winner there. $ uname -a FreeBSD ujvl 10.0-CURRENT FreeBSD 10.0-CURRENT #0 r254959M: Tue Aug 27 18:29:11 EDT 2013 sbruno@ujvl:/usr/obj/usr/src/sys/GENERIC amd64 $ kldstat Id Refs Address Size Name 1 21 0xffffffff80200000 168eaa0 kernel 2 1 0xffffffff8188f000 76ef8 xenhvm.ko 3 1 0xffffffff81a12000 34e0 ums.ko 4 1 0xffffffff81a16000 312c5 pf.ko 5 1 0xffffffff81a48000 643d nullfs.ko 6 1 0xffffffff81a4f000 52c1 fdescfs.ko ------------------------------------------------------------------------ Copyright (c) 1992-2013 The FreeBSD Project. Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD is a registered trademark of The FreeBSD Foundation. FreeBSD 10.0-CURRENT #0 r254959M: Tue Aug 27 18:29:11 EDT 2013 sbruno@ujvl:/usr/obj/usr/src/sys/GENERIC amd64 FreeBSD clang version 3.3 (tags/RELEASE_33/final 183502) 20130610 WARNING: WITNESS option enabled, expect reduced performance. CPU: Intel(R) Xeon(R) CPU E5620 @ 2.40GHz (2400.05-MHz K8-class CPU) Origin =3D "GenuineIntel" Id =3D 0x206c2 Family =3D 0x6 Model =3D 0x2c Stepping =3D 2 Features=3D0x1781fbff Features2=3D0x81b82201 AMD Features=3D0x28100800 AMD Features2=3D0x1 real memory =3D 536870912 (512 MB) avail memory =3D 490692608 (467 MB) Event timer "LAPIC" quality 400 ACPI APIC Table: FreeBSD/SMP: Multiprocessor System Detected: 2 CPUs FreeBSD/SMP: 1 package(s) x 2 core(s) cpu0 (BSP): APIC ID: 0 cpu1 (AP): APIC ID: 2 ioapic0: Changing APIC ID to 1 MADT: Forcing active-low polarity and level trigger for SCI ioapic0 irqs 0-47 on motherboard random: initialized kbd1 at kbdmux0 acpi0: on motherboard acpi0: Power Button (fixed) acpi0: Sleep Button (fixed) acpi0: reservation of 0, a0000 (3) failed cpu0: on acpi0 cpu1: on acpi0 attimer0: port 0x40-0x43 irq 0 on acpi0 Timecounter "i8254" frequency 1193182 Hz quality 0 Event timer "i8254" frequency 1193182 Hz quality 100 atrtc0: port 0x70-0x71 irq 8 on acpi0 Event timer "RTC" frequency 32768 Hz quality 0 Timecounter "ACPI-fast" frequency 3579545 Hz quality 900 acpi_timer0: <32-bit timer at 3.579545MHz> port 0xb008-0xb00b on acpi0 pcib0: port 0xcf8-0xcff on acpi0 pci0: on pcib0 isab0: at device 1.0 on pci0 isa0: on isab0 atapci0: port 0x1f0-0x1f7,0x3f6,0x170-0x177,0x376,0xc1a0-0xc1af at device 1.1 on pci0 ata0: at channel 0 on atapci0 ata1: at channel 1 on atapci0 uhci0: port 0xc180-0xc19f irq 23 at device 1.2 on pci0 usbus0: controller did not stop usbus0 on uhci0 pci0: at device 1.3 (no driver attached) vgapci0: mem 0xf0000000-0xf1ffffff,0xf3040000-0xf3040fff at device 2.0 on pci0 xenpci0: port 0xc000-0xc0ff mem 0xf2000000-0xf2ffffff irq 28 at device 3.0 on pci0 xenstore0: on xenpci0 atkbdc0: port 0x60,0x64 irq 1 on acpi0 atkbd0: irq 1 on atkbdc0 kbd0 at atkbd0 atkbd0: [GIANT-LOCKED] psm0: irq 12 on atkbdc0 psm0: [GIANT-LOCKED] psm0: model IntelliMouse Explorer, device ID 4 fdc0: port 0x3f0-0x3f5,0x3f7 irq 6 drq 2 on acpi0 fdc0: does not respond device_attach: fdc0 attach returned 6 uart0: <16550 or compatible> port 0x3f8-0x3ff irq 4 flags 0x10 on acpi0 ppc0: port 0x378-0x37f irq 7 on acpi0 ppc0: Generic chipset (NIBBLE-only) in COMPATIBLE mode ppbus0: on ppc0 lpt0: on ppbus0 lpt0: Interrupt-driven port ppi0: on ppbus0 qpi0: on motherboard orm0: at iomem 0xc9000-0xc97ff on isa0 sc0: at flags 0x100 on isa0 sc0: VGA <16 virtual consoles, flags=3D0x300> vga0: at port 0x3c0-0x3df iomem 0xa0000-0xbffff on isa0 fdc0: No FDOUT register! Timecounters tick every 10.000 msec usbus0: 12Mbps Full Speed USB v1.0 xctrl0: on xenstore0 ugen0.1: at usbus0 uhub0: on usbus0 xenbusb_front0: on xenstore0 can't re-use a leaf (max_requests)! xn0: at device/vif/0 on xenbusb_front0 xn0: Ethernet address: 00:16:3e:0b:9b:56 xn1: at device/vif/1 on xenbusb_front0 xn1: Ethernet address: 00:16:3e:50:c5:a7 xenbusb_back0: on xenstore0 xn0: backend features: feature-sg feature-gso-tcp4 xn1: backend features: feature-sg feature-gso-tcp4 xbd0: 20480MB at device/vbd/768 on xenbusb_front0 xbd0: attaching as ada0 SMP: AP CPU #1 Launched! WARNING: WITNESS option enabled, expect reduced performance. uhub0: 2 ports with 2 removable, self powered Root mount waiting for: usbus0 Root mount waiting for: usbus0 ugen0.2: at usbus0 Trying to mount root from ufs:/dev/ada0p2 [rw]... xn0: 2 link states coalesced ums0: on usbus0 ums0: 3 buttons and [Z] coordinates ID=3D0 --=-dsnHfNzYIWVjD/CFc16Y Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (FreeBSD) iQEcBAABAgAGBQJSHSvvAAoJEBkJRdwI6BaHluwIAIFqc2CzgmO2yz0swT/piSbR g87DzRw6777CbW5N6zAsqKIuuTTmpkRhnG4XuzjH1POZltceuAjx0N1lN/P8Zbuv jF9FxiBgZW+RFeCc3CAda8fmrHsfsl375vhAi6eL81DGQQL122h+yZ78TgYffL0M VRc21oCa28BXYlVTS+yj3WrsWel9sNlHTlI4vqMPf6rVnfqwlMU1IoSWKcEW/QdC S26vaYCcd+fB9pIX5RKuH4rPsu0baq7DBeXUY2Px9u/jJCDIZzNDQrQ/aVCW4u1Z n98wov5/tSJYcVHBr5ujJzYNMf2qcDk2yyXT+FcidfiR3OGEBJT9LwJzRBqhd2Q= =6/vn -----END PGP SIGNATURE----- --=-dsnHfNzYIWVjD/CFc16Y-- From owner-freebsd-xen@FreeBSD.ORG Wed Aug 28 15:31:42 2013 Return-Path: Delivered-To: freebsd-xen@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 650FC439 for ; Wed, 28 Aug 2013 15:31:42 +0000 (UTC) (envelope-from kpielorz_lst@tdx.co.uk) Received: from mail.tdx.com (mail.tdx.com [62.13.128.18]) by mx1.freebsd.org (Postfix) with ESMTP id 2E94B2176 for ; Wed, 28 Aug 2013 15:31:41 +0000 (UTC) Received: from Mail-PC.tdx.co.uk (storm.tdx.co.uk [62.13.130.251]) (authenticated bits=0) by mail.tdx.com (8.14.3/8.14.3/) with ESMTP id r7SFVZqr039275 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 28 Aug 2013 16:31:35 +0100 (BST) Date: Wed, 28 Aug 2013 16:31:36 +0100 From: Karl Pielorz To: freebsd-xen@FreeBSD.org Subject: XenServer 6.2 tools for FreeBSD 9 'Guest'? Message-ID: <2217D79A5CD4C9E06B7F8D3A@Mail-PC.tdx.co.uk> X-Mailer: Mulberry/4.0.8 (Win32) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2013 15:31:42 -0000 Hi, We've got XenServer now running a couple of FreeBSD 9.2-RC2 VM's (running the XENHVM kernel). Is there any up to date 'xen tools' setup guide or anything anywhere we can look at? I've seen 'xen-tools' in the ports collection - but once installed it doesn't seem to do a lot. I'm looking to enable things like suspending VM's and migration etc. Any pointers? - Google turns up a lot of stuff, but mostly for much older versions of Xen & FreeBSD. -Karl From owner-freebsd-xen@FreeBSD.ORG Wed Aug 28 15:45:05 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 26ED67FF; Wed, 28 Aug 2013 15:45:05 +0000 (UTC) (envelope-from roger.pau@citrix.com) Received: from SMTP.EU.CITRIX.COM (smtp.eu.citrix.com [46.33.159.39]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 746802248; Wed, 28 Aug 2013 15:45:04 +0000 (UTC) X-IronPort-AV: E=Sophos;i="4.89,976,1367971200"; d="scan'208";a="8184798" Received: from lonpex01cl03.citrite.net ([10.30.203.103]) by LONPIPO01.EU.CITRIX.COM with ESMTP/TLS/AES128-SHA; 28 Aug 2013 15:44:57 +0000 Received: from [172.16.1.30] (10.30.203.1) by LONPEX01CL03.citrite.net (10.30.203.103) with Microsoft SMTP Server id 14.2.342.4; Wed, 28 Aug 2013 16:44:55 +0100 Message-ID: <521E1AF7.8070905@citrix.com> Date: Wed, 28 Aug 2013 17:44:55 +0200 From: =?ISO-8859-1?Q?Roger_Pau_Monn=E9?= User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: Colin Percival Subject: Re: CFT: replacing XENHVM kernel config with GENERIC + xenhvm.ko References: <521C3452.8080209@freebsd.org> In-Reply-To: <521C3452.8080209@freebsd.org> Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.30.203.1] Cc: "freebsd-xen@freebsd.org" X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2013 15:45:05 -0000 On 27/08/13 07:08, Colin Percival wrote: > Hi all, > > I've attached a patch which eliminates the XENHVM kernel configuration and > instead allows FreeBSD to run under Xen/HVM with PV drivers by loading a > new xenhvm.ko module from the boot loader. This will mean that FreeBSD > virtual machines running under Xen/HVM will be able to run "straight off > the ISO" binaries; this will also mean they will be able to use FreeBSD > Update to update the kernel. > > I have spent about 10 minutes testing this in Amazon EC2. Please help me > out by doing some more testing. ;-) Hello Colin, I'm sorry to say this, but I'm not sure this is the best way to move forward, I would prefer to just have the files merged directly into the GENERIC kernel rather than having to load a module. Also with the PVHVM changes I've posted earlier I'm modifying some common files, which cannot be put into a module, so it makes me wonder if it's worth it to have some Xen specific code into a module while the rest of it is already integrated into GENERIC. Roger. From owner-freebsd-xen@FreeBSD.ORG Wed Aug 28 15:53:44 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id D04CCBF9 for ; Wed, 28 Aug 2013 15:53:44 +0000 (UTC) (envelope-from roger.pau@citrix.com) Received: from SMTP.EU.CITRIX.COM (smtp.eu.citrix.com [46.33.159.39]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 2BC342323 for ; Wed, 28 Aug 2013 15:53:43 +0000 (UTC) X-IronPort-AV: E=Sophos;i="4.89,976,1367971200"; d="scan'208";a="8185195" Received: from lonpex01cl01.citrite.net ([10.30.203.101]) by LONPIPO01.EU.CITRIX.COM with ESMTP/TLS/AES128-SHA; 28 Aug 2013 15:53:43 +0000 Received: from [172.16.1.30] (10.30.203.1) by LONPEX01CL01.citrite.net (10.30.203.101) with Microsoft SMTP Server id 14.2.342.4; Wed, 28 Aug 2013 16:53:42 +0100 Message-ID: <521E1D04.6030202@citrix.com> Date: Wed, 28 Aug 2013 17:53:40 +0200 From: =?ISO-8859-1?Q?Roger_Pau_Monn=E9?= User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: Karl Pielorz Subject: Re: XenServer 6.2 tools for FreeBSD 9 'Guest'? References: <2217D79A5CD4C9E06B7F8D3A@Mail-PC.tdx.co.uk> In-Reply-To: <2217D79A5CD4C9E06B7F8D3A@Mail-PC.tdx.co.uk> Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.30.203.1] Cc: freebsd-xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2013 15:53:44 -0000 On 28/08/13 17:31, Karl Pielorz wrote: > > Hi, > > We've got XenServer now running a couple of FreeBSD 9.2-RC2 VM's > (running the XENHVM kernel). > > Is there any up to date 'xen tools' setup guide or anything anywhere we > can look at? > > I've seen 'xen-tools' in the ports collection - but once installed it > doesn't seem to do a lot. I'm looking to enable things like suspending > VM's and migration etc. Using the XENHVM kernel should already provide you with everything needed for migration (suspension and resume). From a quick look at the xen-tools package, it contains utilities to interact with xenstore, which you probably don't need. From owner-freebsd-xen@FreeBSD.ORG Wed Aug 28 17:09:55 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id D3919F8E for ; Wed, 28 Aug 2013 17:09:55 +0000 (UTC) (envelope-from mcdouga9@egr.msu.edu) Received: from mail.egr.msu.edu (hill.egr.msu.edu [35.9.37.162]) by mx1.freebsd.org (Postfix) with ESMTP id ABBDF287D for ; Wed, 28 Aug 2013 17:09:55 +0000 (UTC) Received: from hill (localhost [127.0.0.1]) by mail.egr.msu.edu (Postfix) with ESMTP id 670B2438B7 for ; Wed, 28 Aug 2013 13:02:51 -0400 (EDT) X-Virus-Scanned: amavisd-new at egr.msu.edu Received: from mail.egr.msu.edu ([127.0.0.1]) by hill (hill.egr.msu.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z6Pp6aLbsQTv for ; Wed, 28 Aug 2013 13:02:51 -0400 (EDT) Received: from EGR authenticated sender Message-ID: <521E2D3B.3080005@egr.msu.edu> Date: Wed, 28 Aug 2013 13:02:51 -0400 From: Adam McDougall User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:17.0) Gecko/20130824 Thunderbird/17.0.8 MIME-Version: 1.0 To: freebsd-xen@freebsd.org Subject: Re: XenServer 6.2 tools for FreeBSD 9 'Guest'? References: <2217D79A5CD4C9E06B7F8D3A@Mail-PC.tdx.co.uk> In-Reply-To: <2217D79A5CD4C9E06B7F8D3A@Mail-PC.tdx.co.uk> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2013 17:09:55 -0000 On 08/28/13 11:31, Karl Pielorz wrote: > > Hi, > > We've got XenServer now running a couple of FreeBSD 9.2-RC2 VM's > (running the XENHVM kernel). > > Is there any up to date 'xen tools' setup guide or anything anywhere we > can look at? > > I've seen 'xen-tools' in the ports collection - but once installed it > doesn't seem to do a lot. I'm looking to enable things like suspending > VM's and migration etc. > > Any pointers? - Google turns up a lot of stuff, but mostly for much > older versions of Xen & FreeBSD. > > -Karl Try the xe-guest-utilities which uses xen-tools. You may have to hack /usr/local/sbin/xe-update-guest-attrs near the bottom to provide a MinorVersion and/or MicroVersion higher than the default to get the hypervisor to accept it as recent enough. For example under a 6.0.2 environment you could try: xenstore_write_cached "attr/PVAddons/MajorVersion" "6" xenstore_write_cached "attr/PVAddons/MinorVersion" "0" xenstore_write_cached "attr/PVAddons/MicroVersion" "99" Once you enable and run /usr/local/etc/rc.d/xenguest you should be in business. From owner-freebsd-xen@FreeBSD.ORG Wed Aug 28 18:29:26 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 42F20A14 for ; Wed, 28 Aug 2013 18:29:26 +0000 (UTC) (envelope-from bounces+73574-0602-freebsd-xen=freebsd.org@sendgrid.me) Received: from o3.shared.sendgrid.net (o3.shared.sendgrid.net [208.117.48.85]) by mx1.freebsd.org (Postfix) with SMTP id BCDCF2D7D for ; Wed, 28 Aug 2013 18:29:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sendgrid.info; h=from :mime-version:to:cc:subject:references:in-reply-to:content-type :content-transfer-encoding; s=smtpapi; bh=IEHD2nl9JHNmU29U4EJmp/ TkG68=; b=C03jeIRm7d6S0nR8Ag8KB46crrNJ7CMBz9Vc0ufTys/CoglotBqS6C Bpn0fb2NwypTN2bJYJURHUFLhM/Ykd12r472vq5EUhLc+BalVhpKKYCl1S1Wm6q7 UCeUDdcreMK8rHrVcjQgB+/FYTpjGWYoQiB6iAc1OfB+ZR47C14qQ= Received: by with SMTP id filter-167.20963.521E41842 Wed, 28 Aug 2013 18:29:24 +0000 (GMT) Received: from mail.tarsnap.com (unknown [10.60.208.17]) by mi22 (SG) with ESMTP id 140c62feb8d.301c.4dbdbb for ; Wed, 28 Aug 2013 18:29:23 +0000 (UTC) Received: (qmail 57765 invoked from network); 28 Aug 2013 18:29:21 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by ec2-107-20-205-189.compute-1.amazonaws.com with ESMTP; 28 Aug 2013 18:29:21 -0000 Received: (qmail 5947 invoked from network); 28 Aug 2013 18:28:54 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by clamshell.daemonology.net with SMTP; 28 Aug 2013 18:28:54 -0000 Message-ID: <521E4166.10703@freebsd.org> Date: Wed, 28 Aug 2013 11:28:54 -0700 From: Colin Percival User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:17.0) Gecko/20130816 Thunderbird/17.0.8 MIME-Version: 1.0 To: =?ISO-8859-1?Q?Roger_Pau_Monn=E9?= Subject: Re: CFT: replacing XENHVM kernel config with GENERIC + xenhvm.ko References: <521C3452.8080209@freebsd.org> <521E1AF7.8070905@citrix.com> In-Reply-To: <521E1AF7.8070905@citrix.com> X-Enigmail-Version: 1.5.1 Content-Type: text/plain; charset=ISO-8859-1 content-transfer-encoding: quoted-printable X-SG-EID: RUbAm5H8PjswBj/QH+sYVehaJogg3iBnZcyVi1bw/IzlUllSJbHItO8GzJMhW68Y/g0BMdFx5rOctgIBbkQ9bAhF9nd2VoSM+fTEc3A9I38CrOqnAtqZq86euHRJqo7OzFJAgWRhDI+cnmaxeBBgN1Pc4HaKHu+cdDQ8cb8rsGw= Cc: "freebsd-xen@freebsd.org" X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2013 18:29:26 -0000 Hi Roger,=0D =0D On 08/28/13 08:44, Roger Pau Monn=E9 wrote:=0D > On 27/08/13 07:08, Colin Percival wrote:=0D >> I've attached a patch which eliminates the XENHVM kernel configuration a= nd=0D >> instead allows FreeBSD to run under Xen/HVM with PV drivers by loading a= =0D >> new xenhvm.ko module from the boot loader.=0D > =0D > I'm sorry to say this, but I'm not sure this is the best way to move=0D > forward, I would prefer to just have the files merged directly into the= =0D > GENERIC kernel rather than having to load a module. Also with the PVHVM= =0D > changes I've posted earlier I'm modifying some common files, which=0D > cannot be put into a module, so it makes me wonder if it's worth it to=0D > have some Xen specific code into a module while the rest of it is=0D > already integrated into GENERIC.=0D =0D Are your changes going to be integrated into HEAD in time for 10.0-RELEASE?= =0D (i.e., before the code freeze starts, 10 days from now?)=0D =0D I don't care about the "module" bit; the important part to me is getting=0D rid of the XENHVM kernel configuration file so that the GENERIC kernel whic= h=0D ships with the release (with or without modules) will be able to run on EC2= .=0D =0D The reason I opted for a module was that with the freeze being under two=0D weeks away this was a way to ensure that the HVM bits couldn't possibly=0D cause problems for !Xen systems.=0D =0D -- =0D Colin Percival=0D Security Officer Emeritus, FreeBSD | The power to serve=0D Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid= =0D From owner-freebsd-xen@FreeBSD.ORG Wed Aug 28 20:19:56 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 097B22F2 for ; Wed, 28 Aug 2013 20:19:56 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id D26CE24F4 for ; Wed, 28 Aug 2013 20:19:55 +0000 (UTC) Received: from compute3.internal (compute3.nyi.mail.srv.osa [10.202.2.43]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id 82E53217FF for ; Wed, 28 Aug 2013 16:19:54 -0400 (EDT) Received: from web3 ([10.202.2.213]) by compute3.internal (MEProxy); Wed, 28 Aug 2013 16:19:54 -0400 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=message-id:from:to:mime-version :content-transfer-encoding:content-type:subject:date:in-reply-to :references; s=smtpout; bh=OvR67ojVAmY5qdxNDrlP/NZrfOY=; b=KdWm9 8dGKdNHxfiWlWCcG0RhEjUegouqkR2YyVqD3bn9Cc833emgKNL5NBxF2ms/q535t iuEhuOGmMqbLntFy7LCV04uGjQFHfkqGOd8ZA7tppqbG0dAAo0qZ+FF603zuTsiY wqO32yyITPHLDM6lt4mXEywKlJqBHS/c9XEJz8= Received: by web3.nyi.mail.srv.osa (Postfix, from userid 99) id 147F3B00003; Wed, 28 Aug 2013 16:19:54 -0400 (EDT) Message-Id: <1377721194.12931.15282961.5E63C834@webmail.messagingengine.com> X-Sasl-Enc: Gm/UvfhcmTN3TrO83E65awZt1V8EAufH4BTiteop1heu 1377721194 From: Mark Felder To: freebsd-xen@freebsd.org MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="ISO-8859-1" X-Mailer: MessagingEngine.com Webmail Interface - ajax-be0d4992 Subject: Re: XenServer 6.2 tools for FreeBSD 9 'Guest'? Date: Wed, 28 Aug 2013 15:19:54 -0500 In-Reply-To: <521E1D04.6030202@citrix.com> References: <2217D79A5CD4C9E06B7F8D3A@Mail-PC.tdx.co.uk> <521E1D04.6030202@citrix.com> X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2013 20:19:56 -0000 On Wed, Aug 28, 2013, at 10:53, Roger Pau Monn=E9 wrote: > On 28/08/13 17:31, Karl Pielorz wrote: > >=20 > > Hi, > >=20 > > We've got XenServer now running a couple of FreeBSD 9.2-RC2 VM's > > (running the XENHVM kernel). > >=20 > > Is there any up to date 'xen tools' setup guide or anything anywhere we > > can look at? > >=20 > > I've seen 'xen-tools' in the ports collection - but once installed it > > doesn't seem to do a lot. I'm looking to enable things like suspending > > VM's and migration etc. >=20 > Using the XENHVM kernel should already provide you with everything > needed for migration (suspension and resume). From a quick look at the > xen-tools package, it contains utilities to interact with xenstore, > which you probably don't need. >=20 Roger, XenServer and XCP require guest utilities to talk to something in the hypervisor before they permit you to do migrations. Maybe you could ask someone at Citrix in the XenServer group to disable that ridiculous requirement in future releases? From owner-freebsd-xen@FreeBSD.ORG Wed Aug 28 20:26:34 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id EB701518 for ; Wed, 28 Aug 2013 20:26:34 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id C03512582 for ; Wed, 28 Aug 2013 20:26:34 +0000 (UTC) Received: from compute3.internal (compute3.nyi.mail.srv.osa [10.202.2.43]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id DDCA621914 for ; Wed, 28 Aug 2013 16:26:26 -0400 (EDT) Received: from web3 ([10.202.2.213]) by compute3.internal (MEProxy); Wed, 28 Aug 2013 16:26:26 -0400 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=message-id:from:to:mime-version :content-transfer-encoding:content-type:in-reply-to:references :subject:date; s=smtpout; bh=mMRnQ/mHgVRTJpQb4DK+zPWG5Rw=; b=Flt dhEUGPwhLMuWcJnymZsoKWa229fBuinW7tX1rkHjisJs42/sIyGNh8ziz853cZR0 CN0Y+hzjzhLy4PgNAA0HJDpA1sOjtox+8SoNIiOD5Yge9h4R5jPid3YiPjXTbRdv HUDHbVru4twJTzRkMMO3Mii0uTlYY35t+dNLC9yg= Received: by web3.nyi.mail.srv.osa (Postfix, from userid 99) id BDC2CB00003; Wed, 28 Aug 2013 16:26:26 -0400 (EDT) Message-Id: <1377721586.15553.15286097.0A171F06@webmail.messagingengine.com> X-Sasl-Enc: VGF9HUsY4GRbJKDj4c8MdT8offbDQN8S5azNoDgE2yPv 1377721586 From: Mark Felder To: freebsd-xen@freebsd.org MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="ISO-8859-1" X-Mailer: MessagingEngine.com Webmail Interface - ajax-be0d4992 In-Reply-To: <521E4166.10703@freebsd.org> References: <521C3452.8080209@freebsd.org> <521E1AF7.8070905@citrix.com> <521E4166.10703@freebsd.org> Subject: Re: CFT: replacing XENHVM kernel config with GENERIC + xenhvm.ko Date: Wed, 28 Aug 2013 15:26:26 -0500 X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Aug 2013 20:26:35 -0000 On Wed, Aug 28, 2013, at 13:28, Colin Percival wrote: > Hi Roger, >=20 > On 08/28/13 08:44, Roger Pau Monn=E9 wrote: > > On 27/08/13 07:08, Colin Percival wrote: > >> I've attached a patch which eliminates the XENHVM kernel configuration= and > >> instead allows FreeBSD to run under Xen/HVM with PV drivers by loading= a > >> new xenhvm.ko module from the boot loader. > >=20 > > I'm sorry to say this, but I'm not sure this is the best way to move > > forward, I would prefer to just have the files merged directly into the > > GENERIC kernel rather than having to load a module. Also with the PVHVM > > changes I've posted earlier I'm modifying some common files, which > > cannot be put into a module, so it makes me wonder if it's worth it to > > have some Xen specific code into a module while the rest of it is > > already integrated into GENERIC. >=20 > Are your changes going to be integrated into HEAD in time for > 10.0-RELEASE? > (i.e., before the code freeze starts, 10 days from now?) >=20 This is important to me as well. I need to know what to help test if we have 10 days to nail this down. It will be embarrassing to not have XENHVM in GENERIC by 10.0. From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 08:36:30 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 23064AF4 for ; Thu, 29 Aug 2013 08:36:30 +0000 (UTC) (envelope-from kpielorz_lst@tdx.co.uk) Received: from mail.tdx.com (mail.tdx.com [62.13.128.18]) by mx1.freebsd.org (Postfix) with ESMTP id DF6ED2F54 for ; Thu, 29 Aug 2013 08:36:29 +0000 (UTC) Received: from Mail-PC.tdx.co.uk (storm.tdx.co.uk [62.13.130.251]) (authenticated bits=0) by mail.tdx.com (8.14.3/8.14.3/) with ESMTP id r7T8aPiF027044 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 29 Aug 2013 09:36:25 +0100 (BST) Date: Thu, 29 Aug 2013 09:36:24 +0100 From: Karl Pielorz To: Adam McDougall , freebsd-xen@freebsd.org Subject: Re: XenServer 6.2 tools for FreeBSD 9 'Guest'? Message-ID: <9D903368B8769B0F3BF2DD9B@Mail-PC.tdx.co.uk> In-Reply-To: <521E2D3B.3080005@egr.msu.edu> References: <2217D79A5CD4C9E06B7F8D3A@Mail-PC.tdx.co.uk> <521E2D3B.3080005@egr.msu.edu> X-Mailer: Mulberry/4.0.8 (Win32) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 08:36:30 -0000 --On 28 August 2013 13:02 -0400 Adam McDougall wrote: > Try the xe-guest-utilities which uses xen-tools. You may have to hack > /usr/local/sbin/xe-update-guest-attrs near the bottom to provide a > MinorVersion and/or MicroVersion higher than the default to get the > hypervisor to accept it as recent enough. I installed the xe-guest-utilities port, and ran up /usr/local/etc/rc.d/xenguest. Without changing anything - XenServer has now 'lit' the 'Suspend' options - and will let me take snapshots, 'including memory' - so I'd guess it's worked, Thanks! -Karl From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 10:07:30 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id E529B78A for ; Thu, 29 Aug 2013 10:07:30 +0000 (UTC) (envelope-from kpielorz_lst@tdx.co.uk) Received: from mail.tdx.com (mail.tdx.com [62.13.128.18]) by mx1.freebsd.org (Postfix) with ESMTP id AED3E25FA for ; Thu, 29 Aug 2013 10:07:30 +0000 (UTC) Received: from Mail-PC.tdx.co.uk (storm.tdx.co.uk [62.13.130.251]) (authenticated bits=0) by mail.tdx.com (8.14.3/8.14.3/) with ESMTP id r7TA7Sb4034091 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 29 Aug 2013 11:07:29 +0100 (BST) Date: Thu, 29 Aug 2013 11:07:30 +0100 From: Karl Pielorz To: freebsd-xen@freebsd.org Subject: Console 'lag'? Message-ID: <974A077DC3EC33CC574373B6@Mail-PC.tdx.co.uk> X-Mailer: Mulberry/4.0.8 (Win32) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 10:07:31 -0000 So we've got our test FreeBSD 9.2-RC3 amd64 system running under Xen Server 6.2 - with the xen 'guest' tools enabled (i.e. Xen Server can see it can suspend / resume the guest etc.) We've noticed the console under XenCenter 'lags' sometimes - or, more accurately it doesn't update until you hit a key. Best example is: root@v1:~ #echo "Hello World!" Hello World! You *sometimes* don't get the prompt back, until you press a key. Other examples would be running 'ps ax' - nothing appears to happen - again, until you press another key. This is only a cosmetic annoyance - just wondered if it was a known issue / any fix for it? -Karl From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 10:13:29 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 2A71BE26 for ; Thu, 29 Aug 2013 10:13:29 +0000 (UTC) (envelope-from kpielorz_lst@tdx.co.uk) Received: from mail.tdx.com (mail.tdx.com [62.13.128.18]) by mx1.freebsd.org (Postfix) with ESMTP id E813F270D for ; Thu, 29 Aug 2013 10:13:28 +0000 (UTC) Received: from Mail-PC.tdx.co.uk (storm.tdx.co.uk [62.13.130.251]) (authenticated bits=0) by mail.tdx.com (8.14.3/8.14.3/) with ESMTP id r7TADR7Y034827 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 29 Aug 2013 11:13:27 +0100 (BST) Date: Thu, 29 Aug 2013 11:13:29 +0100 From: Karl Pielorz To: freebsd-xen@freebsd.org Subject: Snapshots with 'disk and memory' take a very long time? / calcru: runtime went backwards Message-ID: <1958E3417C6A3D217AEC0451@Mail-PC.tdx.co.uk> X-Mailer: Mulberry/4.0.8 (Win32) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 10:13:29 -0000 Now we've got the ability to take snapshots with 'memory' - they seem to take a very long time... Setup is FreeBSD 9.2-RC3 amd64 XENHVM system running under Xen Server 6.2, on a reasonably fast machine (all SSD storage). In XenCenter a 'disk snapshot' completes in 3 seconds, however selecting 'Snapshot the virtual machine's disks and memory' takes over a minute? We're new to Xen - so I've no idea if that's a good, or bad time? - The guest host goes comatose while it's happening as well. Also once the snapshot is complete the console starts filling with lots of: " calcru: runtime went backwards from 752 usec to 717 usec for pid X " (Lots of values for 'from' and 'to' and lots, i.e. all PID's). Restarting the VM fixes this. Any pointers? - aside from switching the kernel to XENHVM, installing 'xe-guest-utilities' and 'removing' the CDROM drive from the image - it's all stock settings. Thanks, -Karl From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 10:26:57 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 8B99B4FB for ; Thu, 29 Aug 2013 10:26:57 +0000 (UTC) (envelope-from kpielorz_lst@tdx.co.uk) Received: from mail.tdx.com (mail.tdx.com [62.13.128.18]) by mx1.freebsd.org (Postfix) with ESMTP id 53D3728B2 for ; Thu, 29 Aug 2013 10:26:56 +0000 (UTC) Received: from Mail-PC.tdx.co.uk (storm.tdx.co.uk [62.13.130.251]) (authenticated bits=0) by mail.tdx.com (8.14.3/8.14.3/) with ESMTP id r7TAQtC0035682 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 29 Aug 2013 11:26:56 +0100 (BST) Date: Thu, 29 Aug 2013 11:26:55 +0100 From: Karl Pielorz To: freebsd-xen@freebsd.org Subject: Re: Snapshots with 'disk and memory' take a very long time? / calcru: runtime went backwards Message-ID: In-Reply-To: <1958E3417C6A3D217AEC0451@Mail-PC.tdx.co.uk> References: <1958E3417C6A3D217AEC0451@Mail-PC.tdx.co.uk> X-Mailer: Mulberry/4.0.8 (Win32) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 10:26:57 -0000 --On 29 August 2013 11:13 +0100 Karl Pielorz wrote: > Also once the snapshot is complete the console starts filling with lots > of: > > " > calcru: runtime went backwards from 752 usec to 717 usec for pid X > " > > (Lots of values for 'from' and 'to' and lots, i.e. all PID's). > > Restarting the VM fixes this. As does just 'leaving' the system as well - having done it a few times now to test, the calcru errors do stop being issued after a while. I don't know if their cosmetic (can be ignored) or not though. -Karl From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 12:24:20 2013 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 7940AFE0 for ; Thu, 29 Aug 2013 12:24:20 +0000 (UTC) (envelope-from feld@FreeBSD.org) Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 4DBCC2281 for ; Thu, 29 Aug 2013 12:24:19 +0000 (UTC) Received: from compute1.internal (compute1.nyi.mail.srv.osa [10.202.2.41]) by gateway1.nyi.mail.srv.osa (Postfix) with ESMTP id 5AC5C20853 for ; Thu, 29 Aug 2013 08:24:19 -0400 (EDT) Received: from web3 ([10.202.2.213]) by compute1.internal (MEProxy); Thu, 29 Aug 2013 08:24:19 -0400 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d= messagingengine.com; h=message-id:from:to:mime-version :content-transfer-encoding:content-type:in-reply-to:references :subject:date; s=smtpout; bh=sIFwvG7T22c112tZ2FeAgeduUEc=; b=Aqo a2xQRXINyLNBeBXUR0cL/y+KJ8aXhiiSqgm7AVqc1oCdqicgTVmnPnpHHe9rphih XJnFRPS8Zgm6YHOuFJ2TvHSb8g6x6o9ZqRfqyJx3XLmMU5k4PnYwidN+65Xs7tv/ 5fz5l7tzCAZM7d9qm/JVjWX090vKytgCnusiyX08= Received: by web3.nyi.mail.srv.osa (Postfix, from userid 99) id 3D0E0B0002F; Thu, 29 Aug 2013 08:24:19 -0400 (EDT) Message-Id: <1377779059.3933.15540421.7DD4FEAD@webmail.messagingengine.com> X-Sasl-Enc: mOX18V7wiOWdPwFNnWOayuB/vPhfpgIGW834CfZGKKWM 1377779059 From: Mark Felder To: freebsd-xen@freebsd.org MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain X-Mailer: MessagingEngine.com Webmail Interface - ajax-be0d4992 In-Reply-To: <9D903368B8769B0F3BF2DD9B@Mail-PC.tdx.co.uk> References: <2217D79A5CD4C9E06B7F8D3A@Mail-PC.tdx.co.uk> <521E2D3B.3080005@egr.msu.edu> <9D903368B8769B0F3BF2DD9B@Mail-PC.tdx.co.uk> Subject: Re: XenServer 6.2 tools for FreeBSD 9 'Guest'? Date: Thu, 29 Aug 2013 07:24:19 -0500 X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 12:24:20 -0000 On Thu, Aug 29, 2013, at 3:36, Karl Pielorz wrote: > > > --On 28 August 2013 13:02 -0400 Adam McDougall > wrote: > > > Try the xe-guest-utilities which uses xen-tools. You may have to hack > > /usr/local/sbin/xe-update-guest-attrs near the bottom to provide a > > MinorVersion and/or MicroVersion higher than the default to get the > > hypervisor to accept it as recent enough. > > I installed the xe-guest-utilities port, and ran up > /usr/local/etc/rc.d/xenguest. > > Without changing anything - XenServer has now 'lit' the 'Suspend' options > - > and will let me take snapshots, 'including memory' - so I'd guess it's > worked, > > Thanks! > Let me know if you run into any issues as I'm the one who cobbled xe-guest-utilities together from several other people's previous work. From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 16:32:25 2013 Return-Path: Delivered-To: xen@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 01538E7D for ; Thu, 29 Aug 2013 16:32:25 +0000 (UTC) (envelope-from gibbs@FreeBSD.org) Received: from aslan.scsiguy.com (aslan.scsiguy.com [70.89.174.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id B425D2655 for ; Thu, 29 Aug 2013 16:32:21 +0000 (UTC) Received: from [192.168.6.133] (207-225-98-3.dia.static.qwest.net [207.225.98.3]) (authenticated bits=0) by aslan.scsiguy.com (8.14.7/8.14.5) with ESMTP id r7TGWHgn083639 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 29 Aug 2013 16:32:18 GMT (envelope-from gibbs@FreeBSD.org) From: "Justin T. Gibbs" Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable Subject: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. Date: Thu, 29 Aug 2013 10:32:12 -0600 Message-Id: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> To: xen@FreeBSD.org Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) X-Mailer: Apple Mail (2.1508) X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (aslan.scsiguy.com [70.89.174.89]); Thu, 29 Aug 2013 16:32:18 +0000 (UTC) X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 16:32:25 -0000 I've been working to get the next chunk of Spectra/Roger Pau Monn=E9 Xen = work into head. The latest version of the patch I'm working on can be = found here: http://people.freebsd.org/~gibbs/xen_intr.diff I will continue my testing today and commit it tonight unless I hear = complaints. Comments, corrections, improvements, and bug reports = welcome. -- Justin= From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 18:53:36 2013 Return-Path: Delivered-To: xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 3ABDD8AE; Thu, 29 Aug 2013 18:53:36 +0000 (UTC) (envelope-from roger.pau@citrix.com) Received: from SMTP.EU.CITRIX.COM (smtp.eu.citrix.com [46.33.159.39]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 859ED20D1; Thu, 29 Aug 2013 18:53:32 +0000 (UTC) X-IronPort-AV: E=Sophos;i="4.89,984,1367971200"; d="scan'208";a="8245005" Received: from lonpmailmx01.citrite.net ([10.30.203.162]) by LONPIPO01.EU.CITRIX.COM with ESMTP/TLS/RC4-MD5; 29 Aug 2013 18:53:25 +0000 Received: from [172.16.1.30] (10.68.19.166) by LONPMAILMX01.citrite.net (10.30.203.162) with Microsoft SMTP Server id 8.3.298.1; Thu, 29 Aug 2013 19:53:23 +0100 Message-ID: <521F98A2.80904@citrix.com> Date: Thu, 29 Aug 2013 20:53:22 +0200 From: =?ISO-8859-1?Q?Roger_Pau_Monn=E9?= User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: "Justin T. Gibbs" Subject: Re: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. References: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> In-Reply-To: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 8bit Cc: xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 18:53:36 -0000 On 29/08/13 18:32, Justin T. Gibbs wrote: > I've been working to get the next chunk of Spectra/Roger Pau Monné Xen work into head. The latest version of the patch I'm working on can be found here: > > http://people.freebsd.org/~gibbs/xen_intr.diff > > I will continue my testing today and commit it tonight unless I hear complaints. Comments, corrections, improvements, and bug reports welcome. Hello Justin, Thanks, the patch looks OK to me, just one minor nit, could you add: Sponsored by: Citrix Systems R&D to the commit message. Roger. From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 19:15:50 2013 Return-Path: Delivered-To: xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 3A23616E for ; Thu, 29 Aug 2013 19:15:50 +0000 (UTC) (envelope-from bounces+73574-ef5a-xen=freebsd.org@sendgrid.me) Received: from o3.shared.sendgrid.net (o3.shared.sendgrid.net [208.117.48.85]) by mx1.freebsd.org (Postfix) with SMTP id C3BC92254 for ; Thu, 29 Aug 2013 19:15:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sendgrid.info; h=from :mime-version:to:cc:subject:references:in-reply-to:content-type :content-transfer-encoding; s=smtpapi; bh=po9E6/9wey2tUsZ1XhZNCI BSd7w=; b=K8VYB89Eep7t3UNd4odBEoe8Jyusonkkz/u+zzOC+qj03TUjqPfts1 doYzacARaqfAyMNG7hl/m9VJBcetsHizJPPJk9lELHdQ34oMAVk+O9VlqXVDKoMi w3eNnAR5qm+P7xbOC2H5huDGTEjJFuFlXD67U5J2muWozpIiQlFuw= Received: by with SMTP id mf74.15829.521F9DE48 Thu, 29 Aug 2013 19:15:48 +0000 (GMT) Received: from mail.tarsnap.com (unknown [10.60.208.13]) by mi21 (SG) with ESMTP id 140cb80c5af.1072.6c49ec for ; Thu, 29 Aug 2013 19:15:48 +0000 (UTC) Received: (qmail 18176 invoked from network); 29 Aug 2013 19:15:47 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by ec2-107-20-205-189.compute-1.amazonaws.com with ESMTP; 29 Aug 2013 19:15:47 -0000 Received: (qmail 16690 invoked from network); 29 Aug 2013 19:15:17 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by clamshell.daemonology.net with SMTP; 29 Aug 2013 19:15:17 -0000 Message-ID: <521F9DC5.6040606@freebsd.org> Date: Thu, 29 Aug 2013 12:15:17 -0700 From: Colin Percival User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:17.0) Gecko/20130816 Thunderbird/17.0.8 MIME-Version: 1.0 To: "Justin T. Gibbs" Subject: Re: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. References: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> In-Reply-To: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> X-Enigmail-Version: 1.5.1 Content-Type: text/plain; charset=ISO-8859-1 content-transfer-encoding: quoted-printable X-SG-EID: HYUZykSZ9jYPqvLIDxmiHLTFoapJS5N/uhO1I8ZuJQ+YugyScvCoaSeUI/yWym0lTqTHupDItz0IRQfRKmUsj225GOsCDMmJT3a9QHYAq1R02/hdeUpdkurRUwihnM+zhzZGD5KoaK9HHm6RfyP7vA== X-SendGrid-Contentd-ID: {"test_id":"1377803749"} Cc: xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 19:15:50 -0000 On 08/29/13 09:32, Justin T. Gibbs wrote:=0D > I've been working to get the next chunk of Spectra/Roger Pau Monn=E9 Xen = work into head. The latest version of the patch I'm working on can be foun= d here:=0D > =0D > http://people.freebsd.org/~gibbs/xen_intr.diff=0D > =0D > I will continue my testing today and commit it tonight unless I hear comp= laints. Comments, corrections, improvements, and bug reports welcome.=0D =0D Could this patch be split into functional and non-functional components? I= t's=0D distracting having everything mixed up together in a single megapatch. Eve= n=0D committing the s/unlikely/__predict_false/ separately would help.=0D =0D How do you intend to have Xen HVM work in the GENERIC kernel configuration?= =0D Will you be adding 'options XENHVM' to GENERIC?=0D =0D -- =0D Colin Percival=0D Security Officer Emeritus, FreeBSD | The power to serve=0D Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid= =0D From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 19:22:36 2013 Return-Path: Delivered-To: xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id CB39B436; Thu, 29 Aug 2013 19:22:36 +0000 (UTC) (envelope-from roger.pau@citrix.com) Received: from SMTP.EU.CITRIX.COM (smtp.eu.citrix.com [46.33.159.39]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id F377222F1; Thu, 29 Aug 2013 19:22:35 +0000 (UTC) X-IronPort-AV: E=Sophos;i="4.89,985,1367971200"; d="scan'208";a="8246314" Received: from lonpmailmx01.citrite.net ([10.30.203.162]) by LONPIPO01.EU.CITRIX.COM with ESMTP/TLS/RC4-MD5; 29 Aug 2013 19:22:34 +0000 Received: from [172.16.1.30] (10.68.19.166) by LONPMAILMX01.citrite.net (10.30.203.162) with Microsoft SMTP Server id 8.3.298.1; Thu, 29 Aug 2013 20:22:33 +0100 Message-ID: <521F9F79.60900@citrix.com> Date: Thu, 29 Aug 2013 21:22:33 +0200 From: =?ISO-8859-1?Q?Roger_Pau_Monn=E9?= User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: Colin Percival Subject: Re: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. References: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> <521F9DC5.6040606@freebsd.org> In-Reply-To: <521F9DC5.6040606@freebsd.org> Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 8bit Cc: "Justin T. Gibbs" , xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 19:22:36 -0000 On 29/08/13 21:15, Colin Percival wrote: > On 08/29/13 09:32, Justin T. Gibbs wrote: >> I've been working to get the next chunk of Spectra/Roger Pau Monné Xen work into head. The latest version of the patch I'm working on can be found here: >> >> http://people.freebsd.org/~gibbs/xen_intr.diff >> >> I will continue my testing today and commit it tonight unless I hear complaints. Comments, corrections, improvements, and bug reports welcome. > > Could this patch be split into functional and non-functional components? It's > distracting having everything mixed up together in a single megapatch. Even > committing the s/unlikely/__predict_false/ separately would help. > > How do you intend to have Xen HVM work in the GENERIC kernel configuration? > Will you be adding 'options XENHVM' to GENERIC? I'm currently working on this, I expect to have a patch ready tomorrow (I still have to test it on bare metal). Roger. From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 19:29:47 2013 Return-Path: Delivered-To: xen@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 59F4A536; Thu, 29 Aug 2013 19:29:47 +0000 (UTC) (envelope-from gibbs@FreeBSD.org) Received: from aslan.scsiguy.com (www.scsiguy.com [70.89.174.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 2FCAC2333; Thu, 29 Aug 2013 19:29:46 +0000 (UTC) Received: from [192.168.6.133] (207-225-98-3.dia.static.qwest.net [207.225.98.3]) (authenticated bits=0) by aslan.scsiguy.com (8.14.7/8.14.5) with ESMTP id r7TJTdpH084580 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 29 Aug 2013 19:29:40 GMT (envelope-from gibbs@FreeBSD.org) Content-Type: text/plain; charset=iso-8859-1 Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) Subject: Re: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. From: "Justin T. Gibbs" In-Reply-To: <521F9DC5.6040606@freebsd.org> Date: Thu, 29 Aug 2013 13:29:34 -0600 Content-Transfer-Encoding: quoted-printable Message-Id: References: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> <521F9DC5.6040606@freebsd.org> To: Colin Percival X-Mailer: Apple Mail (2.1508) X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (aslan.scsiguy.com [70.89.174.89]); Thu, 29 Aug 2013 19:29:40 +0000 (UTC) Cc: xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 19:29:47 -0000 On Aug 29, 2013, at 1:15 PM, Colin Percival = wrote: > On 08/29/13 09:32, Justin T. Gibbs wrote: >> I've been working to get the next chunk of Spectra/Roger Pau Monn=E9 = Xen work into head. The latest version of the patch I'm working on can = be found here: >>=20 >> http://people.freebsd.org/~gibbs/xen_intr.diff >>=20 >> I will continue my testing today and commit it tonight unless I hear = complaints. Comments, corrections, improvements, and bug reports = welcome. >=20 > Could this patch be split into functional and non-functional = components? It's > distracting having everything mixed up together in a single megapatch. = Even > committing the s/unlikely/__predict_false/ separately would help. It could, but it would delay an already long delayed process in getting = this work into the tree. > How do you intend to have Xen HVM work in the GENERIC kernel = configuration? > Will you be adding 'options XENHVM' to GENERIC? Yes. -- Justin= From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 19:37:01 2013 Return-Path: Delivered-To: xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 910E571F for ; Thu, 29 Aug 2013 19:37:01 +0000 (UTC) (envelope-from bounces+73574-ef5a-xen=freebsd.org@sendgrid.me) Received: from o3.shared.sendgrid.net (o3.shared.sendgrid.net [208.117.48.85]) by mx1.freebsd.org (Postfix) with SMTP id 436122395 for ; Thu, 29 Aug 2013 19:37:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sendgrid.info; h=from :mime-version:to:cc:subject:references:in-reply-to:content-type :content-transfer-encoding; s=smtpapi; bh=jizVhzZsxTadUTV1L0MYqz Gz4KM=; b=UplU9tFMVEVYNtKXiSKRJmlfPcdNOwF+ZMc8vXsr4ynf9Izz3gRuCz GvYeKHnb6DpI08u89KORSx7gX70vUszQsawQOzXrvh6roLKmF8D+2bZdWPcwuPaR Xd4JiSgQBnWPQ4ov2mxuCMlm/UDJBgDFZWbye19+9gjNBWooyUX8M= Received: by with SMTP id mf11.7526.521FA2DC6 Thu, 29 Aug 2013 19:37:00 +0000 (GMT) Received: from mail.tarsnap.com (unknown [10.60.208.15]) by mi20 (SG) with ESMTP id 140cb942c42.6e5e.99f26b for ; Thu, 29 Aug 2013 19:37:00 +0000 (UTC) Received: (qmail 18828 invoked from network); 29 Aug 2013 19:36:59 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by ec2-107-20-205-189.compute-1.amazonaws.com with ESMTP; 29 Aug 2013 19:36:59 -0000 Received: (qmail 16806 invoked from network); 29 Aug 2013 19:36:29 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by clamshell.daemonology.net with SMTP; 29 Aug 2013 19:36:29 -0000 Message-ID: <521FA2BC.2060707@freebsd.org> Date: Thu, 29 Aug 2013 12:36:28 -0700 From: Colin Percival User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:17.0) Gecko/20130816 Thunderbird/17.0.8 MIME-Version: 1.0 To: "Justin T. Gibbs" Subject: Re: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. References: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> In-Reply-To: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> X-Enigmail-Version: 1.5.1 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-SG-EID: HYUZykSZ9jYPqvLIDxmiHLTFoapJS5N/uhO1I8ZuJQ9R5+gWqqnZHUo3N3mSXwG40xkGLb2+Ot7Eszv21gHbJqwjT2tfGOuVXSD9fG/0xVAFMXHBigwMGQrigNp5M5Uke4nr1fh/2rSYxQcgphbAbw== Cc: xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 19:37:01 -0000 In sys/x86/xen/hvm.c: +/** + * If non-zero, the hypervisor has been configured to use a direct + * IDT event callback to the + */ This comment seems to be missing part of its -- Colin Percival Security Officer Emeritus, FreeBSD | The power to serve Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 19:39:21 2013 Return-Path: Delivered-To: xen@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 492B9777; Thu, 29 Aug 2013 19:39:21 +0000 (UTC) (envelope-from gibbs@FreeBSD.org) Received: from aslan.scsiguy.com (www.scsiguy.com [70.89.174.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 0770D23AF; Thu, 29 Aug 2013 19:39:20 +0000 (UTC) Received: from [192.168.6.133] (207-225-98-3.dia.static.qwest.net [207.225.98.3]) (authenticated bits=0) by aslan.scsiguy.com (8.14.7/8.14.5) with ESMTP id r7TJdJsT084636 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 29 Aug 2013 19:39:20 GMT (envelope-from gibbs@FreeBSD.org) Content-Type: text/plain; charset=iso-8859-1 Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) Subject: Re: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. From: "Justin T. Gibbs" In-Reply-To: <521FA2BC.2060707@freebsd.org> Date: Thu, 29 Aug 2013 13:39:14 -0600 Content-Transfer-Encoding: 7bit Message-Id: <32A063DA-DAD2-407E-A0EC-FA5733C29C4C@FreeBSD.org> References: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> <521FA2BC.2060707@freebsd.org> To: Colin Percival X-Mailer: Apple Mail (2.1508) X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (aslan.scsiguy.com [70.89.174.89]); Thu, 29 Aug 2013 19:39:20 +0000 (UTC) Cc: xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 19:39:21 -0000 On Aug 29, 2013, at 1:36 PM, Colin Percival wrote: > In sys/x86/xen/hvm.c: > +/** > + * If non-zero, the hypervisor has been configured to use a direct > + * IDT event callback to the > + */ > > This comment seems to be missing part of its Fixed. -- Justin From owner-freebsd-xen@FreeBSD.ORG Thu Aug 29 23:10:25 2013 Return-Path: Delivered-To: xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 3C6E994B for ; Thu, 29 Aug 2013 23:10:25 +0000 (UTC) (envelope-from sean_bruno@yahoo.com) Received: from nm23-vm0.bullet.mail.ne1.yahoo.com (nm23-vm0.bullet.mail.ne1.yahoo.com [98.138.91.57]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id E85DF2188 for ; Thu, 29 Aug 2013 23:10:24 +0000 (UTC) Received: from [98.138.101.131] by nm23.bullet.mail.ne1.yahoo.com with NNFMP; 29 Aug 2013 23:03:28 -0000 Received: from [98.138.226.60] by tm19.bullet.mail.ne1.yahoo.com with NNFMP; 29 Aug 2013 23:03:28 -0000 Received: from [127.0.0.1] by smtp211.mail.ne1.yahoo.com with NNFMP; 29 Aug 2013 23:03:28 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1377817408; bh=nMKkg/V4EIm2IMKiPo1kQDsx6sRoKjt5De6VdhtCfPE=; h=X-Yahoo-Newman-Id:X-Yahoo-Newman-Property:X-YMail-OSG:X-Yahoo-SMTP:X-Rocket-Received:Subject:From:Reply-To:To:Cc:In-Reply-To:References:Content-Type:Date:Message-ID:Mime-Version:X-Mailer; b=YW4mGm4i64piFRBf4Qlsd5D/bi+X7d4aOmTrYdvBz8TkrMR9vIymxo7uYAFxl/glhMVj1t+8Q4cLG4sJgtQmmi/qBDYCE7dPTN1ctveus8X37/QY6KMXsWEq/kv+q2u24jYTmskgM5bv8jdO+KRQE4Jcd2dqY7p73mcrxnVO/SE= X-Yahoo-Newman-Id: 912722.28108.bm@smtp211.mail.ne1.yahoo.com X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: 0uNAmDAVM1kBtLzOZQ5UPPMz_8q778W8jpemFHrWT8o9PrK .a3ne67dFapLYBOOqUOsAOqVVOV8uuDUpL6IOQWTbKIx3aJKNHQrJJEsOgIx VzLRAnkLPEhWj2kezgC0lG_g.CFbd6vgXza55e03b69djWK1TU5jrXJ0yZoD Xy6sbBmuL9RFfblb2lBvylJljwnR8WQ2z8CF.XcXWk2P46zfO.3q4D7KAPGk xehQOpxjafmBItnooc3zAvRTvvSesKC3IF.IUr.w1fH10yrQ5ao3ztH7HNtQ TF5vulLWGDNWRWcOj.6imgcezNG26rhKIdeaLDFwGdwDX1csxhsZJF0g92he .gfmhX6yvoo75l3Whflzx97PS0jV5C1G7Gf82a.pBaCNd94xGLXSEseJn4DI dKAt.QttrPCUISuZJkIdaRet5R_ZTejaKK_ulMWr4MBAGc13naTNnud2VTA_ 9bQN0ly.J_Gyl7sOwAVJuQ6pzBHUtxdWps1opE9f95l06qLS.UncfFKkQrFi 7j55OZl30IWN933PZIDTQDQxM85pIrNvBKgNLttNMu_YP5H0jubnsEPr6JCS Kwb9StIdCh1ob6A_s9.LpanjB0cFmD7RETA-- X-Yahoo-SMTP: u5BKR6OswBC_iZJVfGRoMkTIpc8pEA4- X-Rocket-Received: from [10.73.160.242] (sean_bruno@209.131.62.116 with ) by smtp211.mail.ne1.yahoo.com with SMTP; 29 Aug 2013 16:03:28 -0700 PDT Subject: Re: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. From: Sean Bruno To: "Justin T. Gibbs" In-Reply-To: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> References: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="=-EOqerkqeKzx1uglB19Bu" Date: Thu, 29 Aug 2013 16:03:28 -0700 Message-ID: <1377817408.31696.7.camel@localhost> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Cc: xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: sbruno@freebsd.org List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Aug 2013 23:10:25 -0000 --=-EOqerkqeKzx1uglB19Bu Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable On Thu, 2013-08-29 at 10:32 -0600, Justin T. Gibbs wrote: > I've been working to get the next chunk of Spectra/Roger Pau Monn=E9 Xen = work into head. The latest version of the patch I'm working on can be foun= d here: >=20 > http://people.freebsd.org/~gibbs/xen_intr.diff >=20 > I will continue my testing today and commit it tonight unless I hear comp= laints. Comments, corrections, improvements, and bug reports welcome. >=20 > -- > Justin > _______________________________________________ > freebsd-xen@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-xen > To unsubscribe, send any mail to "freebsd-xen-unsubscribe@freebsd.org" so far, so good here in RootBSD.net land. FreeBSD ujvl 10.0-CURRENT FreeBSD 10.0-CURRENT #1 r255040: Thu Aug 29 16:33:24 EDT 2013 sbruno@ujvl:/usr/obj/usr/src/sys/XENHVM amd64 FreeBSD ujvl 10.0-CURRENT FreeBSD 10.0-CURRENT #1 r255040: Thu Aug 29 16:33:24 EDT 2013 sbruno@ujvl:/usr/obj/usr/src/sys/XENHVM amd64 root@ujvl:/usr/home/sbruno # dmesg Copyright (c) 1992-2013 The FreeBSD Project. Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD is a registered trademark of The FreeBSD Foundation. FreeBSD 10.0-CURRENT #1 r255040: Thu Aug 29 16:33:24 EDT 2013 sbruno@ujvl:/usr/obj/usr/src/sys/XENHVM amd64 FreeBSD clang version 3.3 (tags/RELEASE_33/final 183502) 20130610 WARNING: WITNESS option enabled, expect reduced performance. XEN: Hypervisor version 4.1 detected. CPU: Intel(R) Xeon(R) CPU E5620 @ 2.40GHz (2400.05-MHz K8-class CPU) Origin =3D "GenuineIntel" Id =3D 0x206c2 Family =3D 0x6 Model =3D 0x2c Stepping =3D 2 Features=3D0x1781fbff Features2=3D0x81b82201 AMD Features=3D0x28100800 AMD Features2=3D0x1 real memory =3D 536870912 (512 MB) avail memory =3D 490733568 (468 MB) Event timer "LAPIC" quality 400 ACPI APIC Table: FreeBSD/SMP: Multiprocessor System Detected: 2 CPUs FreeBSD/SMP: 1 package(s) x 2 core(s) cpu0 (BSP): APIC ID: 0 cpu1 (AP): APIC ID: 2 ioapic0: Changing APIC ID to 1 MADT: Forcing active-low polarity and level trigger for SCI ioapic0 irqs 0-47 on motherboard random: initialized kbd1 at kbdmux0 acpi0: on motherboard acpi0: Power Button (fixed) acpi0: Sleep Button (fixed) acpi0: reservation of 0, a0000 (3) failed cpu0: on acpi0 cpu1: on acpi0 attimer0: port 0x40-0x43 irq 0 on acpi0 Timecounter "i8254" frequency 1193182 Hz quality 0 Event timer "i8254" frequency 1193182 Hz quality 100 atrtc0: port 0x70-0x71 irq 8 on acpi0 Event timer "RTC" frequency 32768 Hz quality 0 Timecounter "ACPI-fast" frequency 3579545 Hz quality 900 acpi_timer0: <32-bit timer at 3.579545MHz> port 0xb008-0xb00b on acpi0 pcib0: port 0xcf8-0xcff on acpi0 pci0: on pcib0 isab0: at device 1.0 on pci0 isa0: on isab0 atapci0: port 0x1f0-0x1f7,0x3f6,0x170-0x177,0x376,0xc1a0-0xc1af at device 1.1 on pci0 ata0: at channel 0 on atapci0 ata1: at channel 1 on atapci0 uhci0: port 0xc180-0xc19f irq 23 at device 1.2 on pci0 usbus0: controller did not stop usbus0 on uhci0 pci0: at device 1.3 (no driver attached) vgapci0: mem 0xf0000000-0xf1ffffff,0xf3040000-0xf3040fff at device 2.0 on pci0 xenpci0: port 0xc000-0xc0ff mem 0xf2000000-0xf2ffffff irq 28 at device 3.0 on pci0 xenstore0: on xenpci0 atkbdc0: port 0x60,0x64 irq 1 on acpi0 atkbd0: irq 1 on atkbdc0 kbd0 at atkbd0 atkbd0: [GIANT-LOCKED] psm0: irq 12 on atkbdc0 psm0: [GIANT-LOCKED] psm0: model IntelliMouse Explorer, device ID 4 fdc0: port 0x3f0-0x3f5,0x3f7 irq 6 drq 2 on acpi0 fdc0: does not respond device_attach: fdc0 attach returned 6 uart0: <16550 or compatible> port 0x3f8-0x3ff irq 4 flags 0x10 on acpi0 ppc0: port 0x378-0x37f irq 7 on acpi0 ppc0: Generic chipset (NIBBLE-only) in COMPATIBLE mode ppbus0: on ppc0 lpt0: on ppbus0 lpt0: Interrupt-driven port ppi0: on ppbus0 qpi0: on motherboard orm0: at iomem 0xc9000-0xc97ff on isa0 sc0: at flags 0x100 on isa0 sc0: VGA <16 virtual consoles, flags=3D0x300> vga0: at port 0x3c0-0x3df iomem 0xa0000-0xbffff on isa0 fdc0: No FDOUT register! Timecounters tick every 10.000 msec usbus0: 12Mbps Full Speed USB v1.0 xenbusb_front0: on xenstore0 ugen0.1: at usbus0 uhub0: on usbus0 xn0: at device/vif/0 on xenbusb_front0 xn0: Ethernet address: 00:16:3e:0b:9b:56 xn1: at device/vif/1 on xenbusb_front0 xn1: Ethernet address: 00:16:3e:50:c5:a7 xenbusb_back0: on xenstore0 xctrl0: on xenstore0 xn0: backend features: feature-sg feature-gso-tcp4 xn1: backend features: feature-sg feature-gso-tcp4 xbd0: 20480MB at device/vbd/768 on xenbusb_front0 xbd0: attaching as ada0 SMP: AP CPU #1 Launched! WARNING: WITNESS option enabled, expect reduced performance. uhub0: 2 ports with 2 removable, self powered Root mount waiting for: usbus0 Root mount waiting for: usbus0 ugen0.2: at usbus0 Trying to mount root from ufs:/dev/ada0p2 [rw]... xn0: 2 link states coalesced ums0: on usbus0 ums0: 3 buttons and [Z] coordinates ID=3D0 --=-EOqerkqeKzx1uglB19Bu Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (FreeBSD) iQEcBAABAgAGBQJSH9M4AAoJEBkJRdwI6BaHo0AIAImot/w7pPWEzjKEIDgEV5a5 Fat9nJbkT8+OU9JARPF5rTxbyGKort2OfM9u29dnNZR4qJ3NqfmslgwCE2Ql4zqx OzHVJsOUbQ2cO5wT+8ru+RDakcydRZQv41rrCTkTwelr3hJS0vSHfTeWO9pb+GbD eC9AIJbkYx+uiXx7TZY1p2IJRpw4KrVAsCs7NdBEAiH7RbZjA8wddqudBc9AIKga kCVfLn6wghWkyUP3Q8D0E3vTyc9bOKTROr0ag3fYQVPZm8mVvaWuZVV4zSxvRz1r Sba5MB7++aZ7FSKcxdq3hfuJSofmD1gOgrV9DODxlXYmz/aJW0f5CmjjNIWjoaI= =OXxL -----END PGP SIGNATURE----- --=-EOqerkqeKzx1uglB19Bu-- From owner-freebsd-xen@FreeBSD.ORG Fri Aug 30 14:19:00 2013 Return-Path: Delivered-To: xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 7A7EA995; Fri, 30 Aug 2013 14:19:00 +0000 (UTC) (envelope-from roger.pau@citrix.com) Received: from SMTP.EU.CITRIX.COM (smtp.eu.citrix.com [46.33.159.39]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 4F1D9288B; Fri, 30 Aug 2013 14:18:58 +0000 (UTC) X-IronPort-AV: E=Sophos;i="4.89,991,1367971200"; d="scan'208,223";a="8273093" Received: from lonpex01cl03.citrite.net ([10.30.203.103]) by LONPIPO01.EU.CITRIX.COM with ESMTP/TLS/AES128-SHA; 30 Aug 2013 14:18:56 +0000 Received: from [172.16.1.30] (10.30.203.1) by LONPEX01CL03.citrite.net (10.30.203.103) with Microsoft SMTP Server id 14.2.342.4; Fri, 30 Aug 2013 15:18:56 +0100 Message-ID: <5220A9CE.1090207@citrix.com> Date: Fri, 30 Aug 2013 16:18:54 +0200 From: =?ISO-8859-1?Q?Roger_Pau_Monn=E9?= User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: "Justin T. Gibbs" Subject: Re: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. References: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> <521F9DC5.6040606@freebsd.org> In-Reply-To: Content-Type: multipart/mixed; boundary="------------020007000202010003090706" X-Originating-IP: [10.30.203.1] Cc: xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2013 14:19:00 -0000 --------------020007000202010003090706 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 8bit On 29/08/13 21:29, Justin T. Gibbs wrote: > On Aug 29, 2013, at 1:15 PM, Colin Percival wrote: > >> On 08/29/13 09:32, Justin T. Gibbs wrote: >>> I've been working to get the next chunk of Spectra/Roger Pau Monné Xen work into head. The latest version of the patch I'm working on can be found here: >>> >>> http://people.freebsd.org/~gibbs/xen_intr.diff >>> >>> I will continue my testing today and commit it tonight unless I hear complaints. Comments, corrections, improvements, and bug reports welcome. >> >> Could this patch be split into functional and non-functional components? It's >> distracting having everything mixed up together in a single megapatch. Even >> committing the s/unlikely/__predict_false/ separately would help. > > It could, but it would delay an already long delayed process in getting this work into the tree. > >> How do you intend to have Xen HVM work in the GENERIC kernel configuration? >> Will you be adding 'options XENHVM' to GENERIC? I'm attaching a patch that introduces Xen support into GENERIC, it can be found as usual on my git tree: http://xenbits.xen.org/gitweb/?p=people/royger/freebsd.git;a=shortlog;h=refs/heads/xenhvm_merge_generic It builds on top of my previous PVHVM series, which is now halfway committed to HEAD. I've tested it under Xen using the GENERIC kernel (for both i386 and amd64), and everything seems to be fine, and I've also tested it on bare metal amd64, which also seems to be running fine. Roger. --------------020007000202010003090706 Content-Type: text/plain; charset="UTF-8"; x-mac-type=0; x-mac-creator=0; name="0001-xen-merge-XENHVM-into-GENERIC.patch" Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="0001-xen-merge-XENHVM-into-GENERIC.patch" >From e4303d73826577e7a9bd3031d201aa02a31b720a Mon Sep 17 00:00:00 2001 From: Roger Pau Monne Date: Thu, 29 Aug 2013 12:00:50 +0200 Subject: [PATCH] xen: merge XENHVM into GENERIC Merge Xen PVHVM support into generic for both amd64 and i386. sys/amd64/amd64/mp_machdep.c: sys/amd64/include/cpu.h: sys/i386/i386/mp_machdep.c: sys/i386/include/cpu.h: - Introduce two new CPU hooks, for initialization and resume purposes. This allows us to get rid of the XENHVM ifdefs in mp_machdep, and also sets some hooks into common code that can be used by others. sys/amd64/conf/XENHVM: sys/i386/conf/XENHVM: - Remove this configs now that GENERIC has builtin support for Xen. sys/kern/subr_smp.c: - Make sure there are no pending IPIs when suspending with the GENERIC kernel. sys/x86/xen/hvm.c: - Add cpu resume operation, that will be called from mp_machdep using the new hooks. - Remove the CPU_FOREACH call in xen_hvm_init, it is not needed, and at the point were xen_hvm_init gets called we still don't know how many CPUs there are on the system. - Gate xen_hvm_init_cpu only to systems running under Xen. sys/x86/xen/xen_intr.c: - Gate the setup of event channels only to systems running under Xen. --- sys/amd64/amd64/mp_machdep.c | 33 +++++++++++------------------- sys/amd64/conf/GENERIC | 4 +++ sys/amd64/conf/XENHVM | 22 -------------------- sys/amd64/include/cpu.h | 2 + sys/i386/conf/GENERIC | 4 +++ sys/i386/conf/XENHVM | 22 -------------------- sys/i386/i386/mp_machdep.c | 33 +++++++++++------------------- sys/i386/include/cpu.h | 2 + sys/kern/subr_smp.c | 2 - sys/x86/xen/hvm.c | 45 ++++++++++++++++++++++++++++++++--------- sys/x86/xen/xen_intr.c | 3 ++ 11 files changed, 74 insertions(+), 98 deletions(-) delete mode 100644 sys/amd64/conf/XENHVM delete mode 100644 sys/i386/conf/XENHVM diff --git a/sys/amd64/amd64/mp_machdep.c b/sys/amd64/amd64/mp_machdep.c index def7335..81c2fe6 100644 --- a/sys/amd64/amd64/mp_machdep.c +++ b/sys/amd64/amd64/mp_machdep.c @@ -71,10 +71,6 @@ __FBSDID("$FreeBSD$"); #include #include -#ifdef XENHVM -#include -#endif - #define WARMBOOT_TARGET 0 #define WARMBOOT_OFF (KERNBASE + 0x0467) #define WARMBOOT_SEG (KERNBASE + 0x0469) @@ -126,7 +122,9 @@ static u_long *ipi_hardclock_counts[MAXCPU]; /* Machinery for allowing non-native IPI mechanisms */ DPCPU_DEFINE(struct cpu_ops, cpu_ops) = { - .ipi_vectored = lapic_ipi_vectored + .ipi_vectored = lapic_ipi_vectored, + .cpu_init = NULL, + .cpu_resume = NULL, }; extern inthand_t IDTVEC(fast_syscall), IDTVEC(fast_syscall32); @@ -157,7 +155,7 @@ int cpu_apic_ids[MAXCPU]; int apic_cpuids[MAX_APIC_ID + 1]; /* Holds pending bitmap based IPIs per CPU */ -static volatile u_int cpu_ipi_pending[MAXCPU]; +volatile u_int cpu_ipi_pending[MAXCPU]; static u_int boot_address; static int cpu_logical; /* logical cpus per core */ @@ -621,6 +619,7 @@ init_secondary(void) u_int cpuid; int cpu, gsel_tss, x; struct region_descriptor ap_gdt; + struct cpu_ops *cpu_ops; /* Set by the startup code for us to use */ cpu = bootAP; @@ -721,10 +720,9 @@ init_secondary(void) /* set up FPU state on the AP */ fpuinit(); -#ifdef XENHVM - /* register vcpu_info area */ - xen_hvm_init_cpu(); -#endif + cpu_ops = DPCPU_PTR(cpu_ops); + if (cpu_ops->cpu_init) + cpu_ops->cpu_init(); /* A quick check from sanity claus */ cpuid = PCPU_GET(cpuid); @@ -1436,12 +1434,11 @@ void cpususpend_handler(void) { u_int cpu; + struct cpu_ops *cpu_ops; cpu = PCPU_GET(cpuid); -#ifdef XENHVM KASSERT((!mtx_owned(&smp_ipi_mtx)), ("IPI in process while suspending")); -#endif if (savectx(susppcbs[cpu])) { ctx_fpusave(susppcbs[cpu]->pcb_fpususpend); @@ -1461,15 +1458,9 @@ cpususpend_handler(void) while (!CPU_ISSET(cpu, &started_cpus)) ia32_pause(); -#ifdef XENHVM - /* - * Reset pending bitmap IPIs, because Xen doesn't preserve pending - * event channels on migration. - */ - cpu_ipi_pending[cpu] = 0; - /* register vcpu_info area */ - xen_hvm_init_cpu(); -#endif + cpu_ops = DPCPU_PTR(cpu_ops); + if (cpu_ops->cpu_resume) + cpu_ops->cpu_resume(); /* Resume MCA and local APIC */ mca_resume(); diff --git a/sys/amd64/conf/GENERIC b/sys/amd64/conf/GENERIC index 08865a8..7c059f7 100644 --- a/sys/amd64/conf/GENERIC +++ b/sys/amd64/conf/GENERIC @@ -72,6 +72,7 @@ options KDTRACE_FRAME # Ensure frames are compiled in options KDTRACE_HOOKS # Kernel DTrace hooks options DDB_CTF # Kernel ELF linker loads CTF data options INCLUDE_CONFIG_FILE # Include this file in kernel +options XENHVM # Include Xen support # Debugging support. Always need this: options KDB # Enable kernel debugger support. @@ -340,3 +341,6 @@ device vtnet # VirtIO Ethernet device device virtio_blk # VirtIO Block device device virtio_scsi # VirtIO SCSI device device virtio_balloon # VirtIO Memory Balloon device + +# Xen support +device xenpci # Generic Xen bus diff --git a/sys/amd64/conf/XENHVM b/sys/amd64/conf/XENHVM deleted file mode 100644 index ee745ec..0000000 --- a/sys/amd64/conf/XENHVM +++ /dev/null @@ -1,22 +0,0 @@ -# -# XENHVM -- Xen HVM kernel configuration file for FreeBSD/amd64 -# -# $FreeBSD$ -# -include GENERIC -ident XENHVM - -# -# Adaptive locks rely on a lock-free pointer read to determine the run state -# of the thread holding a lock when under contention; under a virtualisation -# system, the thread run state may not accurately reflect whether the thread -# (or rather its host VCPU) is actually executing. As such, disable this -# optimisation. -# -options NO_ADAPTIVE_MUTEXES -options NO_ADAPTIVE_RWLOCKS -options NO_ADAPTIVE_SX - -# Xen HVM support -options XENHVM -device xenpci diff --git a/sys/amd64/include/cpu.h b/sys/amd64/include/cpu.h index 92b119d..ad627b6 100644 --- a/sys/amd64/include/cpu.h +++ b/sys/amd64/include/cpu.h @@ -59,6 +59,8 @@ * implementation, or hvm for Xen specific implementation. */ struct cpu_ops { + void (*cpu_init)(void); + void (*cpu_resume)(void); void (*ipi_vectored)(u_int, int); }; diff --git a/sys/i386/conf/GENERIC b/sys/i386/conf/GENERIC index 5e6bfd5..1cdd8ee 100644 --- a/sys/i386/conf/GENERIC +++ b/sys/i386/conf/GENERIC @@ -72,6 +72,7 @@ options MAC # TrustedBSD MAC Framework options KDTRACE_HOOKS # Kernel DTrace hooks options DDB_CTF # Kernel ELF linker loads CTF data options INCLUDE_CONFIG_FILE # Include this file in kernel +options XENHVM # Include Xen support # Debugging support. Always need this: options KDB # Enable kernel debugger support. @@ -354,3 +355,6 @@ device vtnet # VirtIO Ethernet device device virtio_blk # VirtIO Block device device virtio_scsi # VirtIO SCSI device device virtio_balloon # VirtIO Memory Balloon device + +# Xen support +device xenpci # Generic Xen bus diff --git a/sys/i386/conf/XENHVM b/sys/i386/conf/XENHVM deleted file mode 100644 index 9e1b52e..0000000 --- a/sys/i386/conf/XENHVM +++ /dev/null @@ -1,22 +0,0 @@ -# -# XENHVM -- Xen HVM kernel configuration file for FreeBSD/i386 -# -# $FreeBSD$ -# -include GENERIC -ident XENHVM - -# -# Adaptive locks rely on a lock-free pointer read to determine the run state -# of the thread holding a lock when under contention; under a virtualisation -# system, the thread run state may not accurately reflect whether the thread -# (or rather its host VCPU) is actually executing. As such, disable this -# optimisation. -# -options NO_ADAPTIVE_MUTEXES -options NO_ADAPTIVE_RWLOCKS -options NO_ADAPTIVE_SX - -# Xen HVM support -options XENHVM -device xenpci diff --git a/sys/i386/i386/mp_machdep.c b/sys/i386/i386/mp_machdep.c index 1d25ee5..8881b63 100644 --- a/sys/i386/i386/mp_machdep.c +++ b/sys/i386/i386/mp_machdep.c @@ -83,10 +83,6 @@ __FBSDID("$FreeBSD$"); #include #include -#ifdef XENHVM -#include -#endif - #define WARMBOOT_TARGET 0 #define WARMBOOT_OFF (KERNBASE + 0x0467) #define WARMBOOT_SEG (KERNBASE + 0x0469) @@ -173,7 +169,9 @@ static u_long *ipi_hardclock_counts[MAXCPU]; /* Machinery for allowing non-native IPI mechanisms */ DPCPU_DEFINE(struct cpu_ops, cpu_ops) = { - .ipi_vectored = lapic_ipi_vectored + .ipi_vectored = lapic_ipi_vectored, + .cpu_init = NULL, + .cpu_resume = NULL, }; /* @@ -202,7 +200,7 @@ int cpu_apic_ids[MAXCPU]; int apic_cpuids[MAX_APIC_ID + 1]; /* Holds pending bitmap based IPIs per CPU */ -static volatile u_int cpu_ipi_pending[MAXCPU]; +volatile u_int cpu_ipi_pending[MAXCPU]; static u_int boot_address; static int cpu_logical; /* logical cpus per core */ @@ -674,6 +672,7 @@ init_secondary(void) int gsel_tss; int x, myid; u_int cpuid, cr0; + struct cpu_ops *cpu_ops; /* bootAP is set in start_ap() to our ID. */ myid = bootAP; @@ -757,10 +756,9 @@ init_secondary(void) /* set up SSE registers */ enable_sse(); -#ifdef XENHVM - /* register vcpu_info area */ - xen_hvm_init_cpu(); -#endif + cpu_ops = DPCPU_PTR(cpu_ops); + if (cpu_ops->cpu_init) + cpu_ops->cpu_init(); #ifdef PAE /* Enable the PTE no-execute bit. */ @@ -1528,12 +1526,11 @@ void cpususpend_handler(void) { u_int cpu; + struct cpu_ops *cpu_ops; cpu = PCPU_GET(cpuid); -#ifdef XENHVM KASSERT((!mtx_owned(&smp_ipi_mtx)), ("IPI in process while suspending")); -#endif if (savectx(susppcbs[cpu])) { wbinvd(); @@ -1551,15 +1548,9 @@ cpususpend_handler(void) while (!CPU_ISSET(cpu, &started_cpus)) ia32_pause(); -#ifdef XENHVM - /* - * Reset pending bitmap IPIs, because Xen doesn't preserve pending - * event channels on migration. - */ - cpu_ipi_pending[cpu] = 0; - /* register vcpu_info area */ - xen_hvm_init_cpu(); -#endif + cpu_ops = DPCPU_PTR(cpu_ops); + if (cpu_ops->cpu_resume) + cpu_ops->cpu_resume(); /* Resume MCA and local APIC */ mca_resume(); diff --git a/sys/i386/include/cpu.h b/sys/i386/include/cpu.h index f00b14d..5880224 100644 --- a/sys/i386/include/cpu.h +++ b/sys/i386/include/cpu.h @@ -59,6 +59,8 @@ * implementation, or hvm for Xen specific implementation. */ struct cpu_ops { + void (*cpu_init)(void); + void (*cpu_resume)(void); void (*ipi_vectored)(u_int, int); }; diff --git a/sys/kern/subr_smp.c b/sys/kern/subr_smp.c index b5694aa..77bb501 100644 --- a/sys/kern/subr_smp.c +++ b/sys/kern/subr_smp.c @@ -225,7 +225,6 @@ generic_stop_cpus(cpuset_t map, u_int type) CTR2(KTR_SMP, "stop_cpus(%s) with %u type", cpusetobj_strprint(cpusetbuf, &map), type); -#ifdef XENHVM /* * When migrating a PVHVM domain we need to make sure there are * no IPIs in progress, because on resume we must rebind all @@ -234,7 +233,6 @@ generic_stop_cpus(cpuset_t map, u_int type) */ if (type == IPI_SUSPEND) mtx_lock_spin(&smp_ipi_mtx); -#endif if (stopping_cpu != PCPU_GET(cpuid)) while (atomic_cmpset_int(&stopping_cpu, NOCPU, diff --git a/sys/x86/xen/hvm.c b/sys/x86/xen/hvm.c index 7d086ab..7a1bc85 100644 --- a/sys/x86/xen/hvm.c +++ b/sys/x86/xen/hvm.c @@ -96,6 +96,9 @@ extern volatile int smp_tlb_wait; extern vm_offset_t smp_tlb_addr1; extern vm_offset_t smp_tlb_addr2; +/* IPI related variables */ +extern volatile u_int cpu_ipi_pending[MAXCPU]; + #ifdef __i386__ extern void pmap_lazyfix_action(void); #endif @@ -226,6 +229,21 @@ xen_cpustophard_handler(void *arg) return (FILTER_HANDLED); } +/* XEN diverged cpu operations */ + +static void xen_hvm_resume_cpu() +{ + u_int cpuid = PCPU_GET(cpuid); + + /* + * Reset pending bitmap IPIs, because Xen doesn't preserve pending + * event channels on migration. + */ + cpu_ipi_pending[cpuid] = 0; + /* register vcpu_info area */ + xen_hvm_init_cpu(); +} + static int xen_translate_ipi(u_int vector) { @@ -382,13 +400,22 @@ xen_cpu_ipi_init(int cpu) } static void -xen_init_ipis(void) +xen_setup_cpus(void) { int i; - if (xen_hvm_domain() && xen_vector_callback_enabled) { - CPU_FOREACH(i) - xen_cpu_ipi_init(i); + if (xen_hvm_domain()) { + CPU_FOREACH(i) { + struct cpu_ops *cpu_ops = DPCPU_ID_PTR(i, cpu_ops); + + KASSERT((cpu_ops->cpu_init == NULL), ("cpu_init hook not NULL")); + cpu_ops->cpu_init = xen_hvm_init_cpu; + KASSERT((cpu_ops->cpu_resume == NULL), ("cpu_resume hook not NULL")); + cpu_ops->cpu_resume = xen_hvm_resume_cpu; + + if (xen_vector_callback_enabled) + xen_cpu_ipi_init(i); + } } } @@ -563,8 +590,6 @@ xen_hvm_resume(void) static void xen_hvm_init(void *dummy __unused) { - int i; - if (xen_hvm_init_hypercall_stubs() != 0) return; @@ -573,9 +598,6 @@ xen_hvm_init(void *dummy __unused) xen_hvm_init_shared_info_page(); xen_hvm_set_callback(NULL); xen_hvm_disable_emulated_devices(); - /* Clean vcpu_info */ - CPU_FOREACH(i) - DPCPU_ID_SET(i, vcpu_info, NULL); } void xen_hvm_init_cpu(void) @@ -585,6 +607,9 @@ void xen_hvm_init_cpu(void) struct vcpu_register_vcpu_info info; int rc; + if (!xen_domain()) + return; + if (DPCPU_GET(vcpu_info) != NULL) /* * vcpu_info has already been set, @@ -606,5 +631,5 @@ void xen_hvm_init_cpu(void) } SYSINIT(xen_hvm_init, SI_SUB_HYPERVISOR, SI_ORDER_FIRST, xen_hvm_init, NULL); -SYSINIT(xen_init_ipis, SI_SUB_SMP, SI_ORDER_FIRST, xen_init_ipis, NULL); +SYSINIT(xen_init_ipis, SI_SUB_SMP, SI_ORDER_FIRST, xen_setup_cpus, NULL); SYSINIT(xen_hvm_init_cpu, SI_SUB_INTR, SI_ORDER_FIRST, xen_hvm_init_cpu, NULL); diff --git a/sys/x86/xen/xen_intr.c b/sys/x86/xen/xen_intr.c index 466279a..cf4aa8d 100644 --- a/sys/x86/xen/xen_intr.c +++ b/sys/x86/xen/xen_intr.c @@ -609,6 +609,9 @@ xen_intr_init(void *dummy __unused) struct xen_intr_pcpu_data *pcpu; int i; + if (!xen_domain()) + return 0; + mtx_init(&xen_intr_isrc_lock, "xen-irq-lock", NULL, MTX_DEF); /* -- 1.7.7.5 (Apple Git-26) --------------020007000202010003090706-- From owner-freebsd-xen@FreeBSD.ORG Fri Aug 30 20:25:44 2013 Return-Path: Delivered-To: xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id D2B802B0 for ; Fri, 30 Aug 2013 20:25:44 +0000 (UTC) (envelope-from bounces+73574-ef5a-xen=freebsd.org@sendgrid.me) Received: from o3.shared.sendgrid.net (o3.shared.sendgrid.net [208.117.48.85]) by mx1.freebsd.org (Postfix) with SMTP id 660692D41 for ; Fri, 30 Aug 2013 20:25:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sendgrid.info; h=from :mime-version:to:cc:subject:references:in-reply-to:content-type :content-transfer-encoding; s=smtpapi; bh=c8i4Lzl7Mlt0LpuIJspE7R y4sBo=; b=JSjP+I5hLV6FZefpky9gekNppfCV0tTkf52LPFbd8ZQOhqjQeuYBte 0aDRihfcuZwcxuiLLpMZ2BffSzyo4sPxzhhN8hDFWO/p4zv2wdSfJ+atVAWPjwKZ KnjRKFLfyZwIdf8ovHK/gAQeD8/CoFp6EX49IDqPwnRC8wfM6C8AA= Received: by with SMTP id mf99.22444.5220FFC76 Fri, 30 Aug 2013 20:25:43 +0000 (GMT) Received: from mail.tarsnap.com (unknown [10.60.208.15]) by mi18 (SG) with ESMTP id 140d0e72379.5d09.32857d for ; Fri, 30 Aug 2013 20:25:43 +0000 (UTC) Received: (qmail 77576 invoked from network); 30 Aug 2013 20:25:41 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by ec2-107-20-205-189.compute-1.amazonaws.com with ESMTP; 30 Aug 2013 20:25:41 -0000 Received: (qmail 22795 invoked from network); 30 Aug 2013 20:25:07 -0000 Received: from unknown (HELO clamshell.daemonology.net) (127.0.0.1) by clamshell.daemonology.net with SMTP; 30 Aug 2013 20:25:07 -0000 Message-ID: <5220FFA3.6040809@freebsd.org> Date: Fri, 30 Aug 2013 13:25:07 -0700 From: Colin Percival User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:17.0) Gecko/20130816 Thunderbird/17.0.8 MIME-Version: 1.0 To: =?UTF-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?= Subject: Re: [CFR] Event channel Interrupts and unified Xen interrupt infrastructure. References: <7D29BB74-2341-4164-B2B8-85A4CAB3A6CE@FreeBSD.org> <521F9DC5.6040606@freebsd.org> <5220A9CE.1090207@citrix.com> In-Reply-To: <5220A9CE.1090207@citrix.com> X-Enigmail-Version: 1.5.1 Content-Type: text/plain; charset=UTF-8 content-transfer-encoding: quoted-printable X-SG-EID: HYUZykSZ9jYPqvLIDxmiHLTFoapJS5N/uhO1I8ZuJQ+BUOtFuDK/FuS3ylgITk2O7rC5Bcmki8ZPr+i2QH/cBX7rUAm0js58+SBosOfWHIPZsUTyC2Uhx7sibDhMQRAltsJvMEYK00EpOwWNz+mlow== Cc: "Justin T. Gibbs" , xen@FreeBSD.org X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Aug 2013 20:25:44 -0000 On 08/30/13 07:18, Roger Pau Monn=C3=A9 wrote:=0D > I'm attaching a patch that introduces Xen support into GENERIC, it can=0D > be found as usual on my git tree:=0D > =0D > http://xenbits.xen.org/gitweb/?p=3Dpeople/royger/freebsd.git;a=3Dshortlog= ;h=3Drefs/heads/xenhvm_merge_generic=0D > =0D > It builds on top of my previous PVHVM series, which is now halfway=0D > committed to HEAD. I've tested it under Xen using the GENERIC kernel=0D > (for both i386 and amd64), and everything seems to be fine, and I've=0D > also tested it on bare metal amd64, which also seems to be running fine.= =0D =0D Looks good to me, I look forward to this getting into the tree.=0D =0D -- =0D Colin Percival=0D Security Officer Emeritus, FreeBSD | The power to serve=0D Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid= =0D