WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 1742] Passthrough VF does not work after DomU reboot

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1742] Passthrough VF does not work after DomU reboot
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Mon, 14 Feb 2011 16:49:47 -0800
Delivery-date: Mon, 14 Feb 2011 16:49:54 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <bug-1742-3@xxxxxxxxxxxxxxxxxxxxxxxxxxx/bugzilla/>
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1742





------- Comment #2 from jason.kwon@xxxxxxxxxxxx  2011-02-14 16:49 -------
msi.c WARN message:

(XEN) Xen WARN at msi.c:635
(XEN) ----[ Xen-4.1.0-rc4-pre  x86_64  debug=y  Not tainted ]----
(XEN) CPU:    1
(XEN) RIP:    e008:[<ffff82c480160ef8>] pci_enable_msi+0x464/0x960
(XEN) RFLAGS: 0000000000010206   CONTEXT: hypervisor
(XEN) rax: 0000000000000000   rbx: 00000000e1500000   rcx: 0000000000000001
(XEN) rdx: ffff82c480257a40   rsi: 0000000000000246   rdi: ffff82c480257a40
(XEN) rbp: ffff830199fefdd8   rsp: ffff830199fefd08   r8:  0000000000000010
(XEN) r9:  0000000000000038   r10: 0000000000000072   r11: 0000000000000010
(XEN) r12: ffff830199fefea8   r13: 0000000000000003   r14: ffff830199f66bf0
(XEN) r15: ffff830199fefe28   cr0: 0000000080050033   cr4: 00000000000026f0
(XEN) cr3: 000000019f50c000   cr2: 000000000264a000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff830199fefd08:
(XEN)    0000000000000282 ffff830199fefd28 ffff82c4801236b2 01ff830100000003
(XEN)    ffff830100000003 ffff82c48012a4e0 0000000000000020 00000070c0028e40
(XEN)    ffff830199578fa0 0000000300000034 0000000100000010 0000000300000072
(XEN)    0000000100000010 00000000000e1500 00000000000e1500 00000000e1500000
(XEN)    00000000e1500000 ffff83019e988378 0000000000000202 ffff830199fefdb8
(XEN)    ffff82c480123627 ffff830199fefea8 ffff8301992ba000 0000000000000034
(XEN)    000000000000002a 00000000ffffffed ffff830199fefe58 ffff82c480162cdf
(XEN)    ffff83019e820808 00000000802d44c0 00000000000000d0 000000000000002a
(XEN)    00000000000000a8 ffff83019e841580 ffff830199f66bf0 ffff830199fefe38
(XEN)    ffff82c480123627 ffff830199fefea8 0000000002430004 0000000000000034
(XEN)    000000000000002a 0000000000000006 ffff830199fefef8 ffff82c480176a21
(XEN)    ffff830199feff18 ffff8300df7d6000 0000000000000001 ffffffffffffffff
(XEN)    0000008100000003 0000000000000000 00000000e1500000 0000000000000202
(XEN)    0000008100000003 000000000000002a 00000000e1500000 0000000000000033
(XEN)    ffff8301992ba000 ffff82c480165f22 ffff8300df7d6000 00007fffbd3dc4f0
(XEN)    0000000000305000 0000000000305000 00007cfe660100c7 ffff82c480208b68
(XEN)    ffffffff8100942a 0000000000000021 0000000000000006 0000000000305000
(XEN)    0000000000305000 00007fffbd3dc4f0 ffff88003ee51e88 ffff88003ff0b780
(XEN)    0000000000000282 0000000200000035 0000000000000000 0000000000000001
(XEN)    0000000000000021 ffffffff8100942a 0000000000000001 0000000002430004
(XEN) Xen call trace:
(XEN)    [<ffff82c480160ef8>] pci_enable_msi+0x464/0x960
(XEN)    [<ffff82c480162cdf>] map_domain_pirq+0x213/0x30d
(XEN)    [<ffff82c480176a21>] do_physdev_op+0x951/0x12f0
(XEN)    [<ffff82c480208b68>] syscall_enter+0xc8/0x122
(XEN)

Sample IOMMU page fault message:

(XEN) [VT-D]iommu.c:853: iommu_fault_status: Primary Pending Fault
(XEN) [VT-D]iommu.c:841: INTR-REMAP: Request device [03:10.0] fault index 26,
iommu reg = ffff82c3fff56000
(XEN) INTR-REMAP:[fault reason 22h] Present field in the IRTE entry is clear


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs