This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


Re: [Xen-devel] Dom0 pvops kernel booting: release dom0-2.6.24-B0

To: "Stephen C. Tweedie" <sct@xxxxxxxxxx>
Subject: Re: [Xen-devel] Dom0 pvops kernel booting: release dom0-2.6.24-B0
From: "Michael Marineau" <mike@xxxxxxxxxxxx>
Date: Fri, 15 Feb 2008 15:10:22 -0800
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Fri, 15 Feb 2008 15:10:49 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references:x-google-sender-auth; bh=ymZAggAlSrzh6L75qMRVMVRDjG4+xGqIshfvzZauhmQ=; b=SJeI46bAA04GaRQ06vfruBUCAbaaIRdOvVs8bCYncc1DTVvnu+nDmkO5c5Mhd6CBHiH/MLiSjJWXuYrB4Ac7djTmqWHjpL9PZh4CZXRyZyM2ly54wDSQbLB6Xx9nJ/Id8YxZ6PPshluU2AN3x/4JkY9ezgZD4ahmV5Uho+Ca1Io=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references:x-google-sender-auth; b=PF9bZO63IQ3Uaoc079Bb6ZRdEZjcrJ2PudOGCxSwu4vpArjyMZHdazQOOWFdJA+bpIxhC0EfOgzDa9+N55pFR1pE6LmCEDKEvTqi8l7ksFBW4gMrHCBcglXlJqWkb9kpVnbyaWtf/wz/41IooxZvojaR732Yq6F28Jym8ApwE3w=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <1202312872.29606.8.camel@xxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <1202312872.29606.8.camel@xxxxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
On Wed, Feb 6, 2008 at 7:47 AM, Stephen C. Tweedie <sct@xxxxxxxxxx> wrote:
> Hi all,
>  I've substantially cleaned up the Xen contiguous region handling and the
>  pfn/mfn translations in the dma mapping layer, and rebased everything
>  cleanly on top of v2.6.24.  The resulting patch queue can be viewed as
>  tag "dom0-2.6.24-B0" on the dom0-pvops git tree at
>         git://et.redhat.com/linux-2.6-dom0-pvops.git
>  or equivalently on gitweb at
> http://git.et.redhat.com/?p=linux-2.6-dom0-pvops.git;a=shortlog;h=dom0-2.6.24-B0
>  As usual, a mergeable, fast-forwarding development branch is being
>  maintained on the git master branch, with tag "dom0-2.6.24-B0-dev",
>  which has an identical git tree but with the full development history
>  behind it.
>  New in this release:
>       * Added full mtrr support from Mark McLoughlin
>       * Added xen_(create|destroy)_contiguous region handling
>       * Added full Xen dma support to enable booting a dom0 kernel
>  Support for the dom0 xend userland is still missing, and there is no
>  swiotlb yet; but the dom0 kernel boots successfully on a HV and I've had
>  a best uptime of nearly an hour so far.  I'm getting soft lockups under
>  load, but it's not clear if that's a dom0 problem or a latent pv_ops
>  bug.
>  Enjoy!
>  Cheers,
>   Stephen

I took a stab at getting this booting but it dies when trying to make
a call to bios32_indirect in arch/x86/pci/pcbios.c, the address
apparently is triggering a page fault that of course cannot be
handled. Here is the resulting oops:

PCI: BIOS32 Service Directory structure at 0xc00f62d0
PCI: BIOS32 Service Directory entry at 0xfd5d7
BUG: unable to handle kernel paging request at virtual address c00fd5d7
printing eip: c00fd5d7 *pdpt = 000000003e006001
Oops: 0011 [#1] SMP
Modules linked in:

Pid: 1, comm: swapper Not tainted (2.6.24-osl1-gd076f0f0-dirty #9)
EIP: 0061:[<c00fd5d7>] EFLAGS: 00010046 CPU: 0
EIP is at 0xc00fd5d7
EAX: 49435024 EBX: 00000000 ECX: 00000000 EDX: c0600b36
ESI: 00000200 EDI: c0675a84 EBP: c06d0ff4 ESP: ed023ed4
 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: e021
Process swapper (pid: 1, ti=ed023000 task=ed022a90 task.ti=ed023000)
Stack: c0459af4 00000061 00000001 c0166fd7 c15a0900 ed0007c0 49435024 000fd5d7
       c00f62d0 00000000 c06d0ff4 c0459b68 c05a851d ed045e00 00000200 00000000
       c0675a9c c06d0ff4 c0450135 c06bf56b ed047480 c062f7e0 00000cff 000fd5d7
Call Trace:
 [<c0459af4>] bios32_service+0x30/0x93
 [<c0166fd7>] kfree+0x95/0x9b
 [<c0459b68>] check_pcibios+0x11/0x14d
 [<c0450135>] dmi_get_year+0x28/0x52
 [<c06bf56b>] pci_sanity_check+0x2c/0xe8
 [<c0459f20>] pci_find_bios+0xc8/0xec
 [<c06bf521>] pci_pcbios_init+0xe/0x2c
 [<c06bf4f2>] pci_access_init+0x17/0x38
 [<c06a3cb8>] kernel_init+0x0/0xa3
 [<c06a3b37>] do_initcalls+0x73/0x1b2
 [<c019688e>] get_inode_number+0x30/0x54
 [<c0196c11>] proc_register+0x85/0x9f
 [<c0196e4a>] create_proc_entry+0x76/0x89
 [<c014b051>] register_irq_proc+0x77/0x93
 [<c0196db5>] proc_mkdir_mode+0x30/0x43
 [<c06a3cb8>] kernel_init+0x0/0xa3
 [<c06a3d19>] kernel_init+0x61/0xa3
 [<c01080a3>] kernel_thread_helper+0x7/0x10
Code: 8b 0e 23 3b 66 2b d1 66 b8 01 00 eb 04 66 b8 00 00 66 59 66 81 e1 00 f0 6
EIP: [<c00fd5d7>] 0xc00fd5d7 SS:ESP e021:ed023ed4
---[ end trace ca143223eefdc828 ]---
Michael Marineau
Oregon State University

Xen-devel mailing list

<Prev in Thread] Current Thread [Next in Thread>