This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


Re: [Xen-users] PCI Passthrough for Windows error

To: "Fabian Flägel" <fabigant@xxxxxxxxxxxxxx>
Subject: Re: [Xen-users] PCI Passthrough for Windows error
From: "Nome Sobrenome" <colchaodemola@xxxxxxxxx>
Date: Mon, 17 Nov 2008 08:06:51 -0300
Cc: xen-users@xxxxxxxxxxxxxxxxxxx, billy lau <billylau1@xxxxxxxxx>
Delivery-date: Mon, 17 Nov 2008 03:07:27 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:cc:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references; bh=opxSIlryfIu8MM4Sb596boWL54q+F2gVtkh0p5LwU8k=; b=FM78cri0zvpyc928htSq7TE0sExtfeZFTmRjlMnpF0m08btJg2KJokMBuT42GBn8J6 iHwN9p0gWfso4XsBI9XQhF96baa1l4FFxx9QWzYwamqKFjtF8hU4DtUj+6RZ+xKqpoYb K9f1NiHMDV8Kx8cHN9xuXCvLldxfJD8L9Mn6s=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:cc:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references; b=Cl3mpQjTn+WR+QNB76fLnv5lpYw9DhqWcyejHPfZvA8uaYBWNOhmiGOGZqHAKx7bAs 1lyn5hLSslkwXro7Uk84CnwaYx10MzLcSd01IJU4aRR3rCo/NMKN1DDdnlk4/90VP6KV Hjd1RoOuUCtEfOpjg+pAufctoYellP3N3fOoM=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <38600a10811170304j11c851d8xbb0e47cf2e5df9aa@xxxxxxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <20487119.post@xxxxxxxxxxxxxxx> <6b5ba5140811161350j3cc4e42ct1e7870e53c34babe@xxxxxxxxxxxxxx> <4920A74C.7070603@xxxxxxxxx> <6b5ba5140811161507qf5bd994h731fd8f79378e653@xxxxxxxxxxxxxx> <4920A926.708@xxxxxxxxx> <38600a10811170304j11c851d8xbb0e47cf2e5df9aa@xxxxxxxxxxxxxx>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
On Mon, Nov 17, 2008 at 8:04 AM, Fabian Flägel <fabigant@xxxxxxxxxxxxxx> wrote:
> [snip a lot]
>>> I see. Well, for now, the first thing is to make sure that your machine
>>> supports Vt-d. Once you made sure that, then perhaps you could try xen
>>> unstable. I too had some problems with Xen 3.3.0 earlier.
>>> - billy
>> Is VTd available on AMD machines ? I have IOMMU enabled  in BIOS , but i
>> dont know it that is the same thing.
> No. Intel implements a secure virtual machine (svm) with Intel VT (CPU) and
> Intel VT-d (I/O). The same does AMD with AMD-V and IOMMU.
How can i see if the processor supports IOMMU ? I can see in bios it
is enabled. But how do i check if the processor really supports it ?

> Regards
> Fabian

Xen-users mailing list