From mboxrd@z Thu Jan 1 00:00:00 1970 From: Don Slutz Subject: Re: [RFC PATCH 00/10] Xen VMware tools support Date: Thu, 19 Dec 2013 09:08:16 -0500 Message-ID: <52B2FDD0.6030208@terremark.com> References: <1386875718-28166-1-git-send-email-dslutz@terremark.com> <20131217190337.GA25371@phenom.dumpdata.com> <52B241D5.5070204@terremark.com> <1387446639.9925.12.camel@kazak.uk.xensource.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; Format="flowed" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1387446639.9925.12.camel@kazak.uk.xensource.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Ian Campbell Cc: Keir Fraser , Jun Nakajima , Stefano Stabellini , Ian Jackson , Eddie Dong , Don Slutz , xen-devel@lists.xen.org, Jan Beulich , Boris Ostrovsky , Suravee Suthikulpanit List-Id: xen-devel@lists.xenproject.org On 12/19/13 04:50, Ian Campbell wrote: > On Wed, 2013-12-18 at 19:46 -0500, Don Slutz wrote: >> On 12/17/13 14:03, Konrad Rzeszutek Wilk wrote: >>> On Thu, Dec 12, 2013 at 02:15:08PM -0500, Don Slutz wrote: >>>> From: Don Slutz >>>> >>>> See >>>> >>>> http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1009458 >>> Can you say how this benefits Xen to detect this and take >>> advantage of it? Or is this Xen emulating VMWare so to a guest >>> it looks like its running under VMWare? >> This is Xen emulating part of VMWare. Some parts of guests will think >> it is running on VMware. > That doesn't answer the important part Konrad's question though: how > this benefits Xen. > > A series like this should have a cover letter which explains what the > feature is, what use case it solves, why this is a useful thing and why > it is worth the burden of maintaining it going forward. > > Ian. > > I see. Some quick points that might help, I am working on a much better description. This is a small part of the changes needed to allow running linux and windows (and others) guests that were built on VMware and run run them unchanged on Xen. This small part is the start of Xen support of VMware backdoor io port which is how VMware tools (a standard addition installed on a guest) communicates to the hypervisor. I picked this subset to start with because it only has changes in Xen. Some of this code is already in QEMU and so KVM has some of this already. QEMU supported backdoor commands include VMware mouse support. A later patch set exists that links these changes, new code and Xen changes to QEMU to provide VMware mouse support under Xen. The important part is that VMware mouse is an absolute position mouse and so network delays do not effect usage of the virtual mouse. -Don Slutz