Hi, Aron and all
netbk/xennet modules fail to load by using xen-ia64-unstable again.
This issue is caused by the following patches.
http://xenbits.xensource.com/ext/xen-ia64-unstable.hg?cs=c757ebffd500
We can probably resolve this issue.
1. Tristan's xencomm patches is applied.
(I test by using xen-ia64-unstable,
but these patches have some issue.)
2. revert the below patch.
(I have not test yet.)
3. built in these modules.
(I have not test yet.)
I think the best way is 1.
But Tristan's patches still have some issues.
What do you think about this?
Best Regards,
Akio Takebe
>Akio Takebe wrote: [Thu Sep 21 2006, 09:53:16PM EDT]
>> I can solve this problem by using dom0_mem=1G.
>
>This allows blkbk/netbk to load, but I guess a domU won't install yet.
>xenguest-install fails with a panic in dom0. I used this command:
>
> xenguest-install -n domu -r 1024 -f /root/domu.img \
> -l http://hummer.zko.hp.com/fedora/linux/core/development/ia64/os/ \
> -s 4 --nographics -p -x 'ide0=noprobe ide1=noprobe ide2=noprobe ide3=
>noprobe'
>
>Here is the output on the dom0 console:
>
>(XEN) ### domain f000000007bb4080: rid=80000-c0000 mp_rid=2000
>(XEN) arch_domain_create: domain=f000000007bb4080
>(XEN) DomainU EFI build up: ACPI 2.0=0x1000
>(XEN) dom mem: type=13, attr=0x8000000000000008, range=[0x0000000000000000-
>0x0000000000001000) (4KB)
>(XEN) dom mem: type=10, attr=0x8000000000000008, range=[0x0000000000001000-
>0x0000000000002000) (4KB)
>(XEN) dom mem: type= 6, attr=0x8000000000000008, range=[0x0000000000002000-
>0x0000000000003000) (4KB)
>(XEN) dom mem: type= 7, attr=0x0000000000000008, range=[0x0000000000003000-
>0x000000003fff4000) (1023MB)
>(XEN) dom mem: type=12, attr=0x0000000000000001, range=[0x00000ffffc000000-
>0x0000100000000000) (64MB)
>audit(1158891786.948:4): dev=vif1.0 prom=256 old_prom=0 auid=4294967295
>kernel unaligned access to 0xa0000002009e405f, ip=0xa000000100295e91
>kernel unaligned access to 0xa0000002009e4067, ip=0xa000000100295e91
>kernel unaligned access to 0xa0000002009e406f, ip=0xa000000100295e91
>kernel unaligned access to 0xa0000002009e4077, ip=0xa000000100295e91
>kernel unaligned access to 0xa0000002009e407f, ip=0xa000000100295e91
>(XEN) vcpu_get_lrr0: Unmasked interrupts unsupported
>(XEN) vcpu_get_lrr1: Unmasked interrupts unsupported
>(XEN) Linux version 2.6.18-1.2679.fc6xen (brewbuilder@xxxxxxxxxxxxxxxxxxxx
>com) (gcc version 4.1.1 20060917 (Red Hat 4.1.1-23)) #1 SMP Wed Sep 20 01:
>18:10 EDT 2006
>EFI v1.00 by Xen/ia64: SALsystab=0x2178 ACPI 2.0=0x1000
>rsvd_region[0]: [0xe000000000002228, 0xe0000000000022f0)
>rsvd_region[1]: [0xe000000000003000, 0xe000000000003030)
>rsvd_region[2]: [0xe000000004000000, 0xe000000004c2899b)
>rsvd_region[3]: [0xe000000004c2c000, 0xe00000000597ac00)
>rsvd_region[4]: [0xe00000003fff4000, 0xe00000003fff8000)
>rsvd_region[5]: [0xffffffffffffffff, 0xffffffffffffffff)
>Initial ramdisk at: 0xe000000004c2c000 (13954048 bytes)
>SAL 0.1: Xen/ia64 Xen/ia64 version 0.0
>SAL: AP wakeup using external interrupt vector 0xf3
>xen_pal_emulator: UNIMPLEMENTED PAL CALL 42!!!!
>(XEN) No logical to physical processor mapping available
>ACPI: Local APIC address c0000000fee00000
>ACPI: Error parsing MADT - no IOSAPIC entries
>1 CPUs available, 1 CPUs total
>Running on Xen! start_info_pfn=0xfffd nr_pages=65536 flags=0x0
>*** CALLED SAL_MC_SET_PARAMS. IGNORED...
>(XEN) *** CALLED SAL_MC_SET_PARAMS. IGNORED...
>(XEN) *** CALLED SAL_SET_VECTORS 0. IGNORED...
>(XEN) *** CALLED SAL_SET_VECTORS 1. IGNORED...
>(XEN) MCA related initialization done
>SMP: Allowing 1 CPUs, 0 hotplug CPUs
>Built 1 zonelists. Total pages: 61440
>Kernel command line: method=http://hummer.zko.hp.com/fedora/linux/core/
>development/ia64/os/ ide0=noprobe ide1=noprobe ide2=noprobe ide3=noprobe
>ide_setup: ide0=noprobe
>ide_setup: ide1=noprobe
>ide_setup: ide2=noprobe
>ide_setup: ide3=noprobe
>PID hash table entries: 4096 (order: 12, 32768 bytes)
>Console: colour dummy device 80x25
>(file=grant_table.c, line=704) gnttab_transfer: error writing resp 0/1
>kernel BUG at drivers/xen/netback/netback.c:631!
>swapper[0]: bugcheck! 0 [1]
>Modules linked in: loop xt_physdev bridge netloop netbk blkbk autofs4 hidp
>rfcomm l2cap bluetooth sunrpc ip_conntrack_netbios_ns ipt_REJECT
>iptable_filter ip_tables xt_state ip_conntrack nfnetlink xt_tcpudp
>ip6table_filter ip6_tables x_tables ipv6 vfat fat dm_multipath button
>parport_pc lp parport ide_cd sg e1000 cdrom dm_snapshot dm_zero dm_mirror
>dm_mod mptspi mptscsih mptbase scsi_transport_spi sd_mod scsi_mod ext3 jbd
>ehci_hcd ohci_hcd uhci_hcd
>
>Pid: 0, CPU 0, comm: swapper
>psr : 0000001008026010 ifs : 8000000000000694 ip : [<a000000200c80590>]
> Not tainted
>ip is at net_rx_action+0x990/0x17a0 [netbk]
>unat: 0000000000000000 pfs : 8000000000000694 rsc : 0000000000000008
>rnat: 0000000000000000 bsps: 0000000000000000 pr : 0000000000019665
>ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70433f
>csd : 0000000000000000 ssd : 0000000000000000
>b0 : a000000200c80590 b6 : a0000001000b80c0 b7 : a0000002007c36c0
>f6 : 1003e00000000000000a0 f7 : 1003e20c49ba5e353f7cf
>f8 : 1003e00000000000004e2 f9 : 1003e000000000fa00000
>f10 : 1003e000000003b9aca00 f11 : 1003e431bde82d7b634db
>r1 : a000000100bcee60 r2 : a0000001009e5758 r3 : a0000001009e59f0
>r8 : 0000000000000034 r9 : a0000001009da5e0 r10 : a0000001009e5788
>r11 : a0000001009e5788 r12 : a000000100733b10 r13 : a00000010072c000
>r14 : a0000001009e5758 r15 : 0000000000000000 r16 : f100000000004c18
>r17 : a0000001009e59f0 r18 : a0000001008978fc r19 : 0000000000000001
>r20 : 0000000000000000 r21 : a0000001009cf4b0 r22 : 0000000000000000
>r23 : a000000100780900 r24 : a0000001009cf4b0 r25 : a0000001009e5760
>r26 : a0000001009e5760 r27 : 000000003fffff00 r28 : a00000010072d018
>r29 : e000000026a58060 r30 : a00000010072c02c r31 : e000000026a5802c
>
>Call Trace:
> [<a00000010001c900>] show_stack+0x40/0xa0
> sp=a0000001007336a0 bsp=a00000010072d4d0
> [<a00000010001d200>] show_regs+0x840/0x880
> sp=a000000100733870 bsp=a00000010072d478
> [<a0000001000415e0>] die+0x1c0/0x2a0
> sp=a000000100733870 bsp=a00000010072d430
> [<a000000100041710>] die_if_kernel+0x50/0x80
> sp=a000000100733890 bsp=a00000010072d400
> [<a0000001005de6e0>] ia64_bad_break+0x280/0x4a0
> sp=a000000100733890 bsp=a00000010072d3d0
> [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
> sp=a000000100733940 bsp=a00000010072d3d0
> [<a000000200c80590>] net_rx_action+0x990/0x17a0 [netbk]
> sp=a000000100733b10 bsp=a00000010072d330
> [<a00000010008f460>] tasklet_action+0x320/0x5e0
> sp=a000000100733bb0 bsp=a00000010072d308
> [<a00000010008e250>] __do_softirq+0x1f0/0x3a0
> sp=a000000100733bb0 bsp=a00000010072d290
> [<a00000010008e540>] do_softirq+0x140/0x2a0
> sp=a000000100733bb0 bsp=a00000010072d230
> [<a00000010008e720>] irq_exit+0x80/0xa0
> sp=a000000100733bb0 bsp=a00000010072d218
> [<a0000001003b45d0>] evtchn_do_upcall+0x170/0x260
> sp=a000000100733bb0 bsp=a00000010072d180
> [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
> sp=a000000100733bb0 bsp=a00000010072d180
> [<e000000000000810>] 0xe000000000000810
> sp=a000000100733d80 bsp=a00000010072d130
> [<a000000100066150>] xen_pal_call_static+0xd0/0x100
> sp=a000000100733d80 bsp=a00000010072d110
> <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20
>in_atomic():1, irqs_disabled():0
>
>Call Trace:
> [<a00000010001c900>] show_stack+0x40/0xa0
> sp=a000000100733680 bsp=a00000010072d588
> [<a00000010001c990>] dump_stack+0x30/0x60
> sp=a000000100733850 bsp=a00000010072d570
> [<a00000010006d8e0>] __might_sleep+0x2a0/0x2c0
> sp=a000000100733850 bsp=a00000010072d548
> [<a0000001000bf7a0>] down_read+0x20/0x60
> sp=a000000100733850 bsp=a00000010072d528
> [<a0000001000a88a0>] blocking_notifier_call_chain+0x20/0x80
> sp=a000000100733850 bsp=a00000010072d4f0
> [<a000000100083470>] profile_task_exit+0x30/0x60
> sp=a000000100733850 bsp=a00000010072d4d0
> [<a000000100087580>] do_exit+0x40/0x1420
> sp=a000000100733850 bsp=a00000010072d478
> [<a0000001000416a0>] die+0x280/0x2a0
> sp=a000000100733870 bsp=a00000010072d430
> [<a000000100041710>] die_if_kernel+0x50/0x80
> sp=a000000100733890 bsp=a00000010072d400
> [<a0000001005de6e0>] ia64_bad_break+0x280/0x4a0
> sp=a000000100733890 bsp=a00000010072d3d0
> [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
> sp=a000000100733940 bsp=a00000010072d3d0
> [<a000000200c80590>] net_rx_action+0x990/0x17a0 [netbk]
> sp=a000000100733b10 bsp=a00000010072d330
> [<a00000010008f460>] tasklet_action+0x320/0x5e0
> sp=a000000100733bb0 bsp=a00000010072d308
> [<a00000010008e250>] __do_softirq+0x1f0/0x3a0
> sp=a000000100733bb0 bsp=a00000010072d290
> [<a00000010008e540>] do_softirq+0x140/0x2a0
> sp=a000000100733bb0 bsp=a00000010072d230
> [<a00000010008e720>] irq_exit+0x80/0xa0
> sp=a000000100733bb0 bsp=a00000010072d218
> [<a0000001003b45d0>] evtchn_do_upcall+0x170/0x260
> sp=a000000100733bb0 bsp=a00000010072d180
> [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
> sp=a000000100733bb0 bsp=a00000010072d180
> [<e000000000000810>] 0xe000000000000810
> sp=a000000100733d80 bsp=a00000010072d130
> [<a000000100066150>] xen_pal_call_static+0xd0/0x100
> sp=a000000100733d80 bsp=a00000010072d110
>Kernel panic - not syncing: Aiee, killing interrupt handler!
_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel
|