From Stefano Stabellini – http://lists.xensource.com/archives/html/xen-devel/2010-08/msg00649.html
this is the long awaited patch series to add xen device model support in qemu; the main author is Anthony Perard.
Developing this series we tried to come up with the cleanest possible solution from the qemu point of view, limiting the amount of changes to common code as much as possible. The end result still requires a couple of hooks in piix_pci but overall the impact should be very limited.
The current series gives you an upstream qemu device model able to boot a Linux or a Windows HVM guest; some features are still missing compared to the current qemu-xen, among which vga dirty bits, pci passthrough and stubdomain support.
For any of you that want to try it, this is the step by step guide:
– clone a fresh copy of xen-unstable.hg, make and install; note that the xen-unstable make system will clone a linux tree and a qemu-xen tree by default: you can avoid the former just executing ‘make xen’ and ‘make tools’ instead of ‘make world’;
– configure qemu using xen-dm-softmmu as target and extra-ldflags and extra-cflags pointing at the xen-unstable build directory, something like this should work:
./configure –target-list=xen-dm-softmmu –extra-cflags=”-I$HOME/xen-unstable/dist/install/usr/include” –extra-ldflags=”-L$HOME/xen-unstable/dist/install/usr/lib” –enable-xen
– build qemu and install the newly compiled binary (xen-dm-softmmu/qemu-system-xen);
– edit your VM config file and modify device_model to point at it.
Currently only xl (not xend) knows how to spawn the new qemu device model with the right command line options.
As you can see the build and test procedures are not straightforward yet, but in the near future we plan to provide a way to select an upstream qemu tree for use as xen device model directly from the xen-unstable build system.
The patch series adds a new target with the whole xen device model machinery; each patch contains a detailed description.
Read more
In safety-critical industries like automotive and industrial systems, trust is non-negotiable. When building software that controls critical hardware, like braking systems or factory automation, you need confidence. The software must behave exactly as intended. Every time. On the actual device. That's why the Xen Project is investing in
The annual Xen Summit is right around the corner, and there has never been a more exciting time to be part of the Xen Project. As enterprise and industrial needs shift and proprietary vendors rethink their licensing, the industry is ready for strong, open alternatives. Xen stands out not only
Xen is open, secure, and built for the future. As the new Community Manager, I’m focused on growing the Xen community, welcoming new contributors, and ensuring a thriving ecosystem. Let’s build the future of virtualization together!
The Xen Project has released Xen 4.20 🎉! This release introduces a range of enhancements that further solidify its position as the premier open-source hypervisor. It delivers important security updates, improved performance, and broader hardware support. Xen has doubled down as the best choice for cloud providers, enterprise users, and