Displaying 20 results from an estimated 34 matches for "config_dmar".
2011 Mar 12
2
merge error in intel_agp_insert_sg_entries() in xen.git
...;asm/smp.h>
#include "agp.h"
+#include <xen/page.h>
+#include <asm/xen/page.h>
/*
* If we have Intel graphics, we''re not going to have anything other than
* an Intel IOMMU. So make the correct use of the PCI DMA API contingent
* on the Intel IOMMU support (CONFIG_DMAR).
* Only newer chipsets need to bother with this, of course.
+ *
+ * Xen guests accessing graphics hardware also need proper translation
+ * between pseudo-physical addresses and real machine addresses, which
+ * is also achieved by using the DMA API.
*/
-#ifdef CONFIG_DMAR
+#if defined(CONFIG_...
2012 Jul 20
2
X not working under xen
...ee
the attached log xorg_vesa.log)
- when using the fbdev driver it tries to start but the screen goes
blank and I can''t get the terminal back. However I can login using a
serial cable. I see that dom0 is alive and the Xorg server failed to
start.
( see the attached log xorg_fbdev.log).
CONFIG_DMAR (now it is CONFIG_INTEL_IOMMU) is on per
http://wiki.xen.org/wiki/Paravirtualized_DRM. The kernel config is
attached as well.
Am I missing something to get it working? The Xorg server starts just
fine when booting dom0 without xen.
Thanks in advance.
--
Best regards,
Dmitry Ivanov
A: Because it...
2011 Oct 04
3
Asterisk (Trixbox) - VirtualBox - Linux Host
someone have been installed Asterisk (Trixbox) on VirtualBox which is
installed on a Linux host (Ubuntu server 10.04 specifically).
I want to know if it is convenient or not, and the reaseons if i should on
shouldn't do it.
Thanks in advance.!
--
Esteban L. Cacavelos de Amoriza
Cel: 0981 220 429
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2010 Jan 21
47
What is the state of blktap2?
I''m currently working on moving storage services into their own domain
and I''ve been looking at blktap2. I''ve been trying to get an image
mounted with blktap2 and for some odd reason and tapdisk2 keeps hanging
instead of quitting at the end. I haven''t removed any of the storage
startup code at this point so everything should be as it normally is in
xen-unstable.
2008 Feb 08
4
VT-d support in HVM?
Hi,
I''ve recently setup a few machines with 3.2 64bit without any unresolvable problem.
These machines all run pv domU''s and a view "basic" hvm domUs.
As I''ve got one machine left for internal use and testing, I would like to take a
look at pciback with VT-d support (bios screen shows a VT-d [enable|disable]).
My question is, do I need to add patches, or use
2008 Feb 08
4
VT-d support in HVM?
Hi,
I''ve recently setup a few machines with 3.2 64bit without any unresolvable problem.
These machines all run pv domU''s and a view "basic" hvm domUs.
As I''ve got one machine left for internal use and testing, I would like to take a
look at pciback with VT-d support (bios screen shows a VT-d [enable|disable]).
My question is, do I need to add patches, or use
2010 Sep 17
27
Problem: Pattern with vertical colored lines on the dom0 screen
Hi list,
I have a problem with a new laptop (reproducable on other machines too) and the
xen hypervisor.
When the hypervisor gets booted with VESA mode 800x600 I see some messages and
then the screen contents is switched into a pattern of vertical colored lines
and never comes back.
In text mode all works well, but later the pattern appears when the X servers
starts.
I disabled VTd in the bios
2008 Oct 20
13
[PATCH 00/13] ia64/pv_ops, xen: more paravirtualization.
This patchset is for more paravirtualization on ia64/pv_ops.
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S) by multi compile
- support save/restore
For this purpose, the followings needs to be paravirtualized
- ar.itc instruction
- sched_clock()
This is because timer may changed before/after saving/restoring.
For convenience the working full
2008 Oct 20
13
[PATCH 00/13] ia64/pv_ops, xen: more paravirtualization.
This patchset is for more paravirtualization on ia64/pv_ops.
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S) by multi compile
- support save/restore
For this purpose, the followings needs to be paravirtualized
- ar.itc instruction
- sched_clock()
This is because timer may changed before/after saving/restoring.
For convenience the working full
2008 Nov 25
13
[PATCH 00/13] ia64/pv_ops, xen: more paravirtualization. TAKE 2
This patchset is for more paravirtualization on ia64/xen domU.
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S) by multi compile
- support save/restore
For this purpose, the followings needs to be paravirtualized
- ar.itc instruction
- sched_clock()
This is because timer may changed before/after saving/restoring.
For convenience the working full
2008 Nov 25
13
[PATCH 00/13] ia64/pv_ops, xen: more paravirtualization. TAKE 2
This patchset is for more paravirtualization on ia64/xen domU.
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S) by multi compile
- support save/restore
For this purpose, the followings needs to be paravirtualized
- ar.itc instruction
- sched_clock()
This is because timer may changed before/after saving/restoring.
For convenience the working full
2009 Mar 04
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 5
This patch set is for the next merge window.
They are just enhancements of the already merged patches or ia64
porting from x86 paravirt techniques and that their quality is enough
for merge.
This patch set is for more paravirtualization on ia64/xen domU.
This patch set does
- remove existing warnings
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S) by multi
2009 Mar 04
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 5
This patch set is for the next merge window.
They are just enhancements of the already merged patches or ia64
porting from x86 paravirt techniques and that their quality is enough
for merge.
This patch set is for more paravirtualization on ia64/xen domU.
This patch set does
- remove existing warnings
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S) by multi
2008 Dec 12
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 3
This patch set is intended for the next merge window. They are just
enhancements of the already merged patches or ia64 porting from x86
paravirt techniques and that their quality is enough for merge.
This patch set is for more paravirtualization on ia64/xen domU.
This patch set does
- remove existing warnings
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S)
2008 Dec 12
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 3
This patch set is intended for the next merge window. They are just
enhancements of the already merged patches or ia64 porting from x86
paravirt techniques and that their quality is enough for merge.
This patch set is for more paravirtualization on ia64/xen domU.
This patch set does
- remove existing warnings
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S)
2008 Dec 22
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 4
This patch set is intended for the next merge window. They are just
enhancements of the already merged patches or ia64 porting from x86
paravirt techniques and that their quality is enough for merge.
This patch set is for more paravirtualization on ia64/xen domU.
This patch set does
- remove existing warnings
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S)
2008 Dec 22
15
[PATCH 00/15] ia64/pv_ops, xen: more paravirtualization. TAKE 4
This patch set is intended for the next merge window. They are just
enhancements of the already merged patches or ia64 porting from x86
paravirt techniques and that their quality is enough for merge.
This patch set is for more paravirtualization on ia64/xen domU.
This patch set does
- remove existing warnings
- paravirtualize fsys call (fsys.S) by multi compile
- paravirtualize gate page (gate.S)
2008 Nov 21
22
[PATCH 0/13 v7] PCI: Linux kernel SR-IOV support
Greetings,
Following patches are intended to support SR-IOV capability in the
Linux kernel. With these patches, people can turn a PCI device with
the capability into multiple ones from software perspective, which
will benefit KVM and achieve other purposes such as QoS, security,
and etc.
The Physical Function and Virtual Function drivers using the SR-IOV
APIs will come soon!
Major changes from
2008 Nov 21
22
[PATCH 0/13 v7] PCI: Linux kernel SR-IOV support
Greetings,
Following patches are intended to support SR-IOV capability in the
Linux kernel. With these patches, people can turn a PCI device with
the capability into multiple ones from software perspective, which
will benefit KVM and achieve other purposes such as QoS, security,
and etc.
The Physical Function and Virtual Function drivers using the SR-IOV
APIs will come soon!
Major changes from
2008 Nov 21
22
[PATCH 0/13 v7] PCI: Linux kernel SR-IOV support
Greetings,
Following patches are intended to support SR-IOV capability in the
Linux kernel. With these patches, people can turn a PCI device with
the capability into multiple ones from software perspective, which
will benefit KVM and achieve other purposes such as QoS, security,
and etc.
The Physical Function and Virtual Function drivers using the SR-IOV
APIs will come soon!
Major changes from