WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

Re: [Xen-ia64-devel] [Patch] Pass the bare LSAPIC ID to dom0

On Mon, 2007-07-23 at 22:00 +0900, Akio Takebe wrote:
> Hi, Alex and Tristan
> 
> Alex, Thank you for your information,
> and could you try this patch?
> I modified SRAT and lsapic of dom0 for disable cpus.
> This patch work fine on our PRIMEQUEST.

  This patch gets me to the same point as Yongkang, then I take the
bugcheck below.  I think we at least need vcpu_get_lid() to return the
proper value before we can expect this to work.  With this patch,
MADT/SRAT id/eid != vpu_get_lid().

   As Tristan mentioned, this patch is only a small step towards NUMA
support.  To make the SRAT processor entries meaningful, vcpus need have
affinity to run on the node they represent.  Does that scheduling exist?
Without it, the guest OS may actually make more bad decisions in
scheduling that it does now without locality info.  To make use of the
SRAT memory entries, I think we need to adopt a model similar to what we
talked about previously, where each node has a pool of VP memory.
Perhaps in the short term, the best way to handle the SRAT is to simply
delete it from dom0, or make all the entries disabled.

   BTW, a minor nit on the patch, it's not an error to not have an SRAT
table.  It's perfectly legitimate for SMP systems not to provide one.
Thanks,

        Alex


kernel BUG at 
/home/awilliam/xen/20070723/linux-2.6.18-xen.hg/drivers/xen/core/evtchn.c:376!
swapper[1]: bugcheck! 0 [1]
Modules linked in:

Pid: 1, CPU 0, comm:              swapper
psr : 00001010085a6010 ifs : 8000000000000692 ip  : [<a0000001006d3b90>]    Not 
tainted
ip is at bind_virq_to_irqhandler+0x110/0x280
unat: 0000000000000000 pfs : 4000000000000692 rsc : 0000000000000007
rnat: 0000000000000000 bsps: 0000000000000000 pr  : 0000000000009681
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70433f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a0000001006d3b90 b6  : a0000001006da720 b7  : 0000000000000000
f6  : 000000000000000000000 f7  : 000000000000000000000
f8  : 000000000000000000000 f9  : 000000000000000000000
f10 : 000000000000000000000 f11 : 000000000000000000000
r1  : a0000001011435f0 r2  : a000000100d18000 r3  : a000000100f44c30
r8  : 0000000000000060 r9  : fffffffffff00001 r10 : fffffffffff04c18
r11 : ffffffffffffee61 r12 : e00000007f967d50 r13 : e00000007f960000
r14 : 0000000000000001 r15 : fffffffffff00001 r16 : 0000000000000000
r17 : a000000100f6c728 r18 : 0000000000000000 r19 : 0000000000000000
r20 : 0009804c8a70433f r21 : a00000010006d4c0 r22 : 0000000000000000
r23 : 0000000000000000 r24 : fffffffffff00000 r25 : 0000000000000000
r26 : a000000100f6c710 r27 : a000000100f562b0 r28 : a000000100f6c740
r29 : a000000100eb9ab8 r30 : a000000100eb9ab8 r31 : a000000100f438f0

Call Trace:
 [<a00000010001d640>] show_stack+0x40/0xa0
                                sp=e00000007f9678e0 bsp=e00000007f9612c8
 [<a00000010001e2a0>] show_regs+0x840/0x880
                                sp=e00000007f967ab0 bsp=e00000007f961270
 [<a000000100042a20>] die+0x1c0/0x380
                                sp=e00000007f967ab0 bsp=e00000007f961228
 [<a000000100042c30>] die_if_kernel+0x50/0x80
                                sp=e00000007f967ad0 bsp=e00000007f9611f0
 [<a000000100044360>] ia64_bad_break+0x280/0x4a0
                                sp=e00000007f967ad0 bsp=e00000007f9611c8
 [<a0000001000693a0>] xen_leave_kernel+0x0/0x3e0
                                sp=e00000007f967b80 bsp=e00000007f9611c8
 [<a0000001006d3b90>] bind_virq_to_irqhandler+0x110/0x280
                                sp=e00000007f967d50 bsp=e00000007f961138
 [<a000000100019670>] xen_register_percpu_irq+0x4b0/0x8e0
                                sp=e00000007f967d60 bsp=e00000007f9610f0
 [<a000000100019c40>] xen_smp_intr_init_early+0x40/0xc0
                                sp=e00000007f967d60 bsp=e00000007f9610c8
 [<a000000100019dd0>] xen_platform_send_ipi+0x50/0x2e0
                                sp=e00000007f967d60 bsp=e00000007f9610a0
 [<a00000010001a100>] ia64_send_ipi+0xa0/0x120
                                sp=e00000007f967d60 bsp=e00000007f961068
 [<a000000100063be0>] __cpu_up+0x3e0/0x980
                                sp=e00000007f967d60 bsp=e00000007f961010
 [<a0000001000ce970>] cpu_up+0x170/0x2c0
                                sp=e00000007f967e00 bsp=e00000007f960fd0
 [<a000000100011720>] init+0x140/0x840
                                sp=e00000007f967e00 bsp=e00000007f960f98
 [<a00000010001bb10>] kernel_thread_helper+0x30/0x60
                                sp=e00000007f967e30 bsp=e00000007f960f70
 [<a0000001000110e0>] start_kernel_thread+0x20/0x40
                                sp=e00000007f967e30 bsp=e00000007f960f70
 <0>Kernel panic - not syncing: Attempted to kill init!

-- 
Alex Williamson                             HP Open Source & Linux Org.


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel