[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] Xen 4.5 development update
- To: "Zytaruk, Kelly" <Kelly.Zytaruk@xxxxxxx>, Don Slutz <dslutz@xxxxxxxxxxx>, "konrad.wilk@xxxxxxxxxx" <konrad.wilk@xxxxxxxxxx>, "andrew.cooper3@xxxxxxxxxx" <andrew.cooper3@xxxxxxxxxx>, "andrew.bennieston@xxxxxxxxxx" <andrew.bennieston@xxxxxxxxxx>, "avanzini.arianna@xxxxxxxxx" <avanzini.arianna@xxxxxxxxx>, "ufimtseva@xxxxxxxxx" <ufimtseva@xxxxxxxxx>, "boris.ostrovsky@xxxxxxxxxx" <boris.ostrovsky@xxxxxxxxxx>, "bob.liu@xxxxxxxxxx" <bob.liu@xxxxxxxxxx>, "msw@xxxxxxxxxx" <msw@xxxxxxxxxx>, "david.vrabel@xxxxxxxxxx" <david.vrabel@xxxxxxxxxx>, "daniel.kiper@xxxxxxxxxx" <daniel.kiper@xxxxxxxxxx>, "roger.pau@xxxxxxxxxx" <roger.pau@xxxxxxxxxx>, "tiejun.chen@xxxxxxxxx" <tiejun.chen@xxxxxxxxx>, "mukesh.rathor@xxxxxxxxxx" <mukesh.rathor@xxxxxxxxxx>, "Wei.Liu2@xxxxxxxxxx" <Wei.Liu2@xxxxxxxxxx>, "stefano.stabellini@xxxxxxxxxxxxx" <stefano.stabellini@xxxxxxxxxxxxx>, "julien.grall@xxxxxxxxxx" <julien.grall@xxxxxxxxxx>, "malcolm.crossley@xxxxxxxxxx" <malcolm.crossley@xxxxxxxxxx>, "zoltan.kiss@xxxxxxxxxx" <zoltan.kiss@xxxxxxxxxx>, "feng.wu@xxxxxxxxx" <feng.wu@xxxxxxxxx>, "Paul.Durrant@xxxxxxxxxx" <Paul.Durrant@xxxxxxxxxx>, "JBeulich@xxxxxxxx" <JBeulich@xxxxxxxx>, "olaf@xxxxxxxxx" <olaf@xxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Don Slutz <dslutz@xxxxxxxxxxx>
- Date: Fri, 30 May 2014 10:09:13 -0400
- Delivery-date: Fri, 30 May 2014 14:09:33 +0000
- List-id: Xen developer discussion <xen-devel.lists.xen.org>
On 5/30/2014 9:57 AM, Zytaruk, Kelly wrote:
On 5/27/2014 2:06 PM, konrad.wilk@xxxxxxxxxx wrote:
Below is a summary of the projects / features being worked on for the
4.5 time frame that I had been gathering.
* Don Slutz Prognosis: 100 %
Bigger PCI hole in QEMU
Re-write of HPET
An additional new feature:
VMware backdoor (hypercall)
Hi Don, I'm not familiar with this feature but it intrigues me. Can you
provide a very short description of what it is?
Support a sub-set of possible commands via port 0x5658 including VMware
RPC channels that allow VMware tools to run in the Guest.
This also allows requesting a clean shutdown (and reboot) of the Guest
if VMware tools is running.
Is this for the VMWare backdoor port at I/O address 0x5658?
Yes.
Is the scenario, VMWare running in a Xen guest VM?
If you mean VMware tools, then yes.
-Don Slutz
Thanks,
Kelly
-Don Slutz
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|