[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] Xen 4.5 development update
- To: Don Slutz <dslutz@xxxxxxxxxxx>, "konrad.wilk@xxxxxxxxxx" <konrad.wilk@xxxxxxxxxx>, "andrew.cooper3@xxxxxxxxxx" <andrew.cooper3@xxxxxxxxxx>, "andrew.bennieston@xxxxxxxxxx" <andrew.bennieston@xxxxxxxxxx>, "avanzini.arianna@xxxxxxxxx" <avanzini.arianna@xxxxxxxxx>, "ufimtseva@xxxxxxxxx" <ufimtseva@xxxxxxxxx>, "boris.ostrovsky@xxxxxxxxxx" <boris.ostrovsky@xxxxxxxxxx>, "bob.liu@xxxxxxxxxx" <bob.liu@xxxxxxxxxx>, "msw@xxxxxxxxxx" <msw@xxxxxxxxxx>, "david.vrabel@xxxxxxxxxx" <david.vrabel@xxxxxxxxxx>, "daniel.kiper@xxxxxxxxxx" <daniel.kiper@xxxxxxxxxx>, "roger.pau@xxxxxxxxxx" <roger.pau@xxxxxxxxxx>, "tiejun.chen@xxxxxxxxx" <tiejun.chen@xxxxxxxxx>, "mukesh.rathor@xxxxxxxxxx" <mukesh.rathor@xxxxxxxxxx>, "Wei.Liu2@xxxxxxxxxx" <Wei.Liu2@xxxxxxxxxx>, "stefano.stabellini@xxxxxxxxxxxxx" <stefano.stabellini@xxxxxxxxxxxxx>, "julien.grall@xxxxxxxxxx" <julien.grall@xxxxxxxxxx>, "malcolm.crossley@xxxxxxxxxx" <malcolm.crossley@xxxxxxxxxx>, "zoltan.kiss@xxxxxxxxxx" <zoltan.kiss@xxxxxxxxxx>, "feng.wu@xxxxxxxxx" <feng.wu@xxxxxxxxx>, "Paul.Durrant@xxxxxxxxxx" <Paul.Durrant@xxxxxxxxxx>, "JBeulich@xxxxxxxx" <JBeulich@xxxxxxxx>, "olaf@xxxxxxxxx" <olaf@xxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: "Zytaruk, Kelly" <Kelly.Zytaruk@xxxxxxx>
- Date: Fri, 30 May 2014 13:57:26 +0000
- Accept-language: en-US
- Delivery-date: Fri, 30 May 2014 13:58:19 +0000
- List-id: Xen developer discussion <xen-devel.lists.xen.org>
- Thread-index: AQHPedZ0hYpEBkdFBk+ScQqZbIMQ/ZtZLeYA///61VA=
- Thread-topic: [Xen-devel] Xen 4.5 development update
>
> On 5/27/2014 2:06 PM, konrad.wilk@xxxxxxxxxx wrote:
> > Below is a summary of the projects / features being worked on for the
> > 4.5 time frame that I had been gathering.
> >
> > * Don Slutz Prognosis: 100 %
> > Bigger PCI hole in QEMU
> > Re-write of HPET
>
> An additional new feature:
>
> VMware backdoor (hypercall)
>
Hi Don, I'm not familiar with this feature but it intrigues me. Can you
provide a very short description of what it is?
Is this for the VMWare backdoor port at I/O address 0x5658? Is the scenario,
VMWare running in a Xen guest VM?
Thanks,
Kelly
>
>
> -Don Slutz
> >
> >
> > _______________________________________________
> > Xen-devel mailing list
> > Xen-devel@xxxxxxxxxxxxx
> > http://lists.xen.org/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|