WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] Xen 4.0 + PVOPS + Intel VTD + USB EHCI = BUG()

To: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Subject: Re: [Xen-devel] Xen 4.0 + PVOPS + Intel VTD + USB EHCI = BUG()
From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
Date: Wed, 27 Jan 2010 15:22:57 -0500
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>, Daniel Stodden <daniel.stodden@xxxxxxxxxx>
Delivery-date: Wed, 27 Jan 2010 12:30:30 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <1264534209.20881.5.camel@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: National Security Agency
References: <1264114494.4147.29.camel@xxxxxxxxxxxxxxxxxxxxxxx> <1264198204.20158.22.camel@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx> <20100122221231.GA32286@xxxxxxxxxxxxxxxxxxx> <1264198967.20158.23.camel@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx> <20100122224307.GA9943@xxxxxxxxxxxxxxxxxxx> <1264461835.20158.67.camel@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx> <20100126144212.GA10928@xxxxxxxxxxxxxxxxxxx> <1264524172.20158.82.camel@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx> <20100126165724.GA13847@xxxxxxxxxxxxxxxxxxx> <1264527964.20158.87.camel@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx> <20100126181949.GA14346@xxxxxxxxxxxxxxxxxxx> <1264534209.20881.5.camel@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
On Tue, 2010-01-26 at 14:30 -0500, David P. Quigley wrote:
> I have a small update on the problem. It does seem like it is tied to
> VT-D because I just turned it off in the bios and the dom0 manages to
> boot on top of xen and I can log in. Are there any options for VT-D that
> you would like me to try to help pin point the problem?
> 
> Dave
> 
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel


So I've managed to get my dom0 booting on top of xen however now I'm
running into a problem where my domU is kernel oopsing on startup. The
traces I've gotten seem to be in the memory allocation functions.
Normally this is a sign of memory corruption. Considering this VM was
working perfectly with the 2.6.31.10 dom0 based on the Novell patches
and xen 4.0 I don't think it is the VM that is the problem (however I
can try starting it under kvm to be certain. Any suggestions on what I
can do to try to hunt down the memory corruption?

Dave




_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel