WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 1728] New: [vt-d] [vt-d] Xen panic on PAE when enable io

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1728] New: [vt-d] [vt-d] Xen panic on PAE when enable iommu
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Wed, 26 Jan 2011 18:10:51 -0800
Delivery-date: Wed, 26 Jan 2011 18:11:09 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1728

           Summary: [vt-d] [vt-d] Xen panic on PAE when enable iommu
           Product: Xen
           Version: unstable
          Platform: Other
        OS/Version: Windows
            Status: NEW
          Severity: normal
          Priority: P1
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: shaohui.zheng@xxxxxxxxx


Environment:
------------
Service Arch (ia32/ia32e/IA64): PAE
Guest Arch (ia32/ia32e/IA64): 
Guest OS Type (Linux/Windows):
Change Set: 22764:75b6287626ee, 22812:73b3debb90cf
Hardware: Westmere-EP,Westmere-EX
Other:



Bug detailed description:
--------------------------

Xen panic on PAE host if enable iommu in grub parameter, This issue happens on
WSM-EP only, we did not see it on Sandy Bridge.

(XEN) Xen call trace:
(XEN)    [<ff1df95e>] pci_conf_read32+0x47/0x95
(XEN)    [<ff13e5d9>] pci_vtd_quirk+0x69/0x97
(XEN)    [<ff225b6f>] intel_iommu_dom0_init+0x93/0x18c
(XEN)    [<ff2257e3>] iommu_dom0_init+0xc1/0xc9
(XEN)    [<ff22e84c>] construct_dom0+0x1ac7/0x1adb
(XEN)    [<ff23672e>] __start_xen+0x2128/0x217a
(XEN)    [<ff10006c>] __high_start+0x58/0x5a
(XEN)    

it is a regression between CS 22654 and 22764.


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>