WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] PCI passthrough issue

To: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] PCI passthrough issue
From: Ian Campbell <Ian.Campbell@xxxxxxxxxx>
Date: Fri, 4 Feb 2011 13:50:49 +0000
Delivery-date: Fri, 04 Feb 2011 05:52:45 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4D4BFBE4.6080809@xxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: Citrix Systems, Inc.
References: <4D47F9CF.2040107@xxxxxxxxxxx> <1296566401.13091.171.camel@xxxxxxxxxxxxxxxxxxxxxx> <4D4814CE.5050303@xxxxxxxxxxx> <1296569931.13091.194.camel@xxxxxxxxxxxxxxxxxxxxxx> <4D48234F.2020907@xxxxxxxxxxx> <4D4828D9.6090601@xxxxxxxxxxx> <1296577389.13091.288.camel@xxxxxxxxxxxxxxxxxxxxxx> <4D488355.8010706@xxxxxxxxxxx> <1296638873.13091.315.camel@xxxxxxxxxxxxxxxxxxxxxx> <4D4930F3.608@xxxxxxxxxxx> <20110202174250.GA8148@xxxxxxxxxxxx> <4D4BBC15.4080201@xxxxxxxxxxx> <1296809586.13091.546.camel@xxxxxxxxxxxxxxxxxxxxxx> <4D4BBEC6.8070809@xxxxxxxxxxx> <4D4BD121.2080505@xxxxxxxxxxx> <1296817460.13091.646.camel@xxxxxxxxxxxxxxxxxxxxxx> <4D4BE212.1090400@xxxxxxxxxxx> <1296818935.13091.648.camel@xxxxxxxxxxxxxxxxxxxxxx> <4D4BFBE4.6080809@xxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
On Fri, 2011-02-04 at 13:15 +0000, Jean Baptiste Favre wrote:

> 
> >> What is a bit strange here is that I don't any more the KERN_CRIT printk
> >> message.
> >> Could be a false positive ?
> > 
> > Worth bearing in mind, lets see what the next test run produces.
> Seems that I got this messge only with copybreak=0.
> With default value (128), no such message
> 
> More, with copybreak=0, all packets are dropped (even a ping with
> default packet size is dropped. Same with ping -s1)

Hang on, I thought you previously said copybreak=0 made everything work
ok. If that isn't definitely the case then we may be following a red
herring.

Are you saying that copybreak=0 + this patch breaks? That would be very
surprising since the patch doesn't cause any flow control differences.

Perhaps there is some difference between your self-built kernels and the
Debian kernels you started with? Perhaps you should try the self built
kernel with no patches, just to confirm it behaves the same as the
Debian kernels?

> > Thanks.
> > 
> > Please gather the tcpdump's too.
> Both tcpdump from GW and domU are Attached.

Were these collected with or without patches? With or without ethtool -K
options? With or without copybreak?

Please try and be explicit about everything you post, there are lots of
variables in the air.

> Commands were:
> 
> domU# tcpdump -n -w domU.cap -s0 -i eth0 ether host 00:1f:c6:eb:71:43 or
> ether broadcast
> 
> gw# tcpdump -n -w gw.cap -s0 -i br0 ether host 00:1f:c6:eb:71:43 or
> ether broadcast

So no 0x20 anywhere in what the gw sent as the reply and still no clue
where the value came from...

Ian.


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>