[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] PCI Passthrough on Xen 3.3


  • To: xen-users <xen-users@xxxxxxxxxxxxxxxxxxx>
  • From: Paul Schulze <avlex@xxxxxxx>
  • Date: Sun, 30 Nov 2008 22:30:25 +0100
  • Delivery-date: Sun, 30 Nov 2008 13:31:18 -0800
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=mime-version:content-transfer-encoding:message-id:content-type:to :from:subject:date:x-pgp-agent:x-mailer:sender; b=cNHoXrjunvnSaO9idkcr5eipWpOtCuqbxTUovDG+SFN00ML3bvWj0lRsRlFrc3T4rS FqQA7uvac/FhafdBx2zK3O5rUXpixSRT0g3DAnJYq2oMeKEf+xM+6pWqgX/BHeB+fHu7 Gl+r5Ehomr3rGIIraTeYFwSMTB9F/YFafpC/8=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi everyone,

I am currently considering to upgrade my Ubuntu Hardy Dom0 from Xen 3.2 to 3.3, but I am a bit concerned about some of my DomUs that rely on PCI Passthrough. Are there any restrictions or problems with PCI Passthrough in Xen 3.3, anything I have to look out for, especially with the Hardy Dom0 kernel in mind?

Thanks,


Paul.

- --
Paul Schulze
Mail: avlex  gmx  net ($1@$2.$3)
Public Key: http://solaris-net.dyndns.org/keys/key_avlex.asc

"Making mistakes is human,
but to really screw things up, you need Computers"



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFJMwXyYDWOGtiChoARAtujAJ47s6X1kYlK5/dwuNbY3G5Uxb9CsACgh0aH
IyDRdK+K0OkTkcZctVTI2J4=
=1Gb0
-----END PGP SIGNATURE-----

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.