[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Xen 4.5 development update



On 5/30/2014 9:57 AM, Zytaruk, Kelly wrote:
On 5/27/2014 2:06 PM, konrad.wilk@xxxxxxxxxx wrote:
Below is a summary of the projects / features being worked on for the
4.5 time frame that I had been gathering.

* Don Slutz  Prognosis:   100 %
      Bigger PCI hole in QEMU
      Re-write of HPET
An additional new feature:

VMware backdoor (hypercall)

Hi Don,  I'm not familiar with this feature but it intrigues me.  Can you 
provide a very short description of what it is?

Support a sub-set of possible commands via port 0x5658 including VMware RPC channels that allow VMware tools to run in the Guest. This also allows requesting a clean shutdown (and reboot) of the Guest if VMware tools is running.

Is this for the VMWare backdoor port at I/O address 0x5658?

Yes.

  Is the scenario, VMWare running in a Xen guest VM?

If you mean VMware tools, then yes.

   -Don Slutz

Thanks,
Kelly


     -Don Slutz

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.