[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Dom0 pvops kernel booting: release dom0-2.6.24-B0


  • To: "Stephen C. Tweedie" <sct@xxxxxxxxxx>
  • From: "Michael Marineau" <mike@xxxxxxxxxxxx>
  • Date: Fri, 15 Feb 2008 15:10:22 -0800
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Fri, 15 Feb 2008 15:10:49 -0800
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references:x-google-sender-auth; b=PF9bZO63IQ3Uaoc079Bb6ZRdEZjcrJ2PudOGCxSwu4vpArjyMZHdazQOOWFdJA+bpIxhC0EfOgzDa9+N55pFR1pE6LmCEDKEvTqi8l7ksFBW4gMrHCBcglXlJqWkb9kpVnbyaWtf/wz/41IooxZvojaR732Yq6F28Jym8ApwE3w=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

On Wed, Feb 6, 2008 at 7:47 AM, Stephen C. Tweedie <sct@xxxxxxxxxx> wrote:
> Hi all,
>
>  I've substantially cleaned up the Xen contiguous region handling and the
>  pfn/mfn translations in the dma mapping layer, and rebased everything
>  cleanly on top of v2.6.24.  The resulting patch queue can be viewed as
>  tag "dom0-2.6.24-B0" on the dom0-pvops git tree at
>
>         git://et.redhat.com/linux-2.6-dom0-pvops.git
>
>  or equivalently on gitweb at
>
>         
> http://git.et.redhat.com/?p=linux-2.6-dom0-pvops.git;a=shortlog;h=dom0-2.6.24-B0
>
>  As usual, a mergeable, fast-forwarding development branch is being
>  maintained on the git master branch, with tag "dom0-2.6.24-B0-dev",
>  which has an identical git tree but with the full development history
>  behind it.
>
>  New in this release:
>
>       * Added full mtrr support from Mark McLoughlin
>       * Added xen_(create|destroy)_contiguous region handling
>       * Added full Xen dma support to enable booting a dom0 kernel
>
>  Support for the dom0 xend userland is still missing, and there is no
>  swiotlb yet; but the dom0 kernel boots successfully on a HV and I've had
>  a best uptime of nearly an hour so far.  I'm getting soft lockups under
>  load, but it's not clear if that's a dom0 problem or a latent pv_ops
>  bug.
>
>  Enjoy!
>
>  Cheers,
>   Stephen

I took a stab at getting this booting but it dies when trying to make
a call to bios32_indirect in arch/x86/pci/pcbios.c, the address
apparently is triggering a page fault that of course cannot be
handled. Here is the resulting oops:

PCI: BIOS32 Service Directory structure at 0xc00f62d0
PCI: BIOS32 Service Directory entry at 0xfd5d7
BUG: unable to handle kernel paging request at virtual address c00fd5d7
printing eip: c00fd5d7 *pdpt = 000000003e006001
Oops: 0011 [#1] SMP
Modules linked in:

Pid: 1, comm: swapper Not tainted (2.6.24-osl1-gd076f0f0-dirty #9)
EIP: 0061:[<c00fd5d7>] EFLAGS: 00010046 CPU: 0
EIP is at 0xc00fd5d7
EAX: 49435024 EBX: 00000000 ECX: 00000000 EDX: c0600b36
ESI: 00000200 EDI: c0675a84 EBP: c06d0ff4 ESP: ed023ed4
 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: e021
Process swapper (pid: 1, ti=ed023000 task=ed022a90 task.ti=ed023000)
Stack: c0459af4 00000061 00000001 c0166fd7 c15a0900 ed0007c0 49435024 000fd5d7
       c00f62d0 00000000 c06d0ff4 c0459b68 c05a851d ed045e00 00000200 00000000
       c0675a9c c06d0ff4 c0450135 c06bf56b ed047480 c062f7e0 00000cff 000fd5d7
Call Trace:
 [<c0459af4>] bios32_service+0x30/0x93
 [<c0166fd7>] kfree+0x95/0x9b
 [<c0459b68>] check_pcibios+0x11/0x14d
 [<c0450135>] dmi_get_year+0x28/0x52
 [<c06bf56b>] pci_sanity_check+0x2c/0xe8
 [<c0459f20>] pci_find_bios+0xc8/0xec
 [<c06bf521>] pci_pcbios_init+0xe/0x2c
 [<c06bf4f2>] pci_access_init+0x17/0x38
 [<c06a3cb8>] kernel_init+0x0/0xa3
 [<c06a3b37>] do_initcalls+0x73/0x1b2
 [<c019688e>] get_inode_number+0x30/0x54
 [<c0196c11>] proc_register+0x85/0x9f
 [<c0196e4a>] create_proc_entry+0x76/0x89
 [<c014b051>] register_irq_proc+0x77/0x93
 [<c0196db5>] proc_mkdir_mode+0x30/0x43
 [<c06a3cb8>] kernel_init+0x0/0xa3
 [<c06a3d19>] kernel_init+0x61/0xa3
 [<c01080a3>] kernel_thread_helper+0x7/0x10
 =======================
Code: 8b 0e 23 3b 66 2b d1 66 b8 01 00 eb 04 66 b8 00 00 66 59 66 81 e1 00 f0 6
EIP: [<c00fd5d7>] 0xc00fd5d7 SS:ESP e021:ed023ed4
---[ end trace ca143223eefdc828 ]---
-- 
Michael Marineau
Oregon State University
mike@xxxxxxxxxxxx

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.