|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] Dom0 pvops kernel booting: release dom0-2.6.24-B0
On Wed, Feb 6, 2008 at 7:47 AM, Stephen C. Tweedie <sct@xxxxxxxxxx> wrote:
> Hi all,
>
> I've substantially cleaned up the Xen contiguous region handling and the
> pfn/mfn translations in the dma mapping layer, and rebased everything
> cleanly on top of v2.6.24. The resulting patch queue can be viewed as
> tag "dom0-2.6.24-B0" on the dom0-pvops git tree at
>
> git://et.redhat.com/linux-2.6-dom0-pvops.git
>
> or equivalently on gitweb at
>
>
> http://git.et.redhat.com/?p=linux-2.6-dom0-pvops.git;a=shortlog;h=dom0-2.6.24-B0
>
> As usual, a mergeable, fast-forwarding development branch is being
> maintained on the git master branch, with tag "dom0-2.6.24-B0-dev",
> which has an identical git tree but with the full development history
> behind it.
>
> New in this release:
>
> * Added full mtrr support from Mark McLoughlin
> * Added xen_(create|destroy)_contiguous region handling
> * Added full Xen dma support to enable booting a dom0 kernel
>
> Support for the dom0 xend userland is still missing, and there is no
> swiotlb yet; but the dom0 kernel boots successfully on a HV and I've had
> a best uptime of nearly an hour so far. I'm getting soft lockups under
> load, but it's not clear if that's a dom0 problem or a latent pv_ops
> bug.
>
> Enjoy!
>
> Cheers,
> Stephen
I took a stab at getting this booting but it dies when trying to make
a call to bios32_indirect in arch/x86/pci/pcbios.c, the address
apparently is triggering a page fault that of course cannot be
handled. Here is the resulting oops:
PCI: BIOS32 Service Directory structure at 0xc00f62d0
PCI: BIOS32 Service Directory entry at 0xfd5d7
BUG: unable to handle kernel paging request at virtual address c00fd5d7
printing eip: c00fd5d7 *pdpt = 000000003e006001
Oops: 0011 [#1] SMP
Modules linked in:
Pid: 1, comm: swapper Not tainted (2.6.24-osl1-gd076f0f0-dirty #9)
EIP: 0061:[<c00fd5d7>] EFLAGS: 00010046 CPU: 0
EIP is at 0xc00fd5d7
EAX: 49435024 EBX: 00000000 ECX: 00000000 EDX: c0600b36
ESI: 00000200 EDI: c0675a84 EBP: c06d0ff4 ESP: ed023ed4
DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: e021
Process swapper (pid: 1, ti=ed023000 task=ed022a90 task.ti=ed023000)
Stack: c0459af4 00000061 00000001 c0166fd7 c15a0900 ed0007c0 49435024 000fd5d7
c00f62d0 00000000 c06d0ff4 c0459b68 c05a851d ed045e00 00000200 00000000
c0675a9c c06d0ff4 c0450135 c06bf56b ed047480 c062f7e0 00000cff 000fd5d7
Call Trace:
[<c0459af4>] bios32_service+0x30/0x93
[<c0166fd7>] kfree+0x95/0x9b
[<c0459b68>] check_pcibios+0x11/0x14d
[<c0450135>] dmi_get_year+0x28/0x52
[<c06bf56b>] pci_sanity_check+0x2c/0xe8
[<c0459f20>] pci_find_bios+0xc8/0xec
[<c06bf521>] pci_pcbios_init+0xe/0x2c
[<c06bf4f2>] pci_access_init+0x17/0x38
[<c06a3cb8>] kernel_init+0x0/0xa3
[<c06a3b37>] do_initcalls+0x73/0x1b2
[<c019688e>] get_inode_number+0x30/0x54
[<c0196c11>] proc_register+0x85/0x9f
[<c0196e4a>] create_proc_entry+0x76/0x89
[<c014b051>] register_irq_proc+0x77/0x93
[<c0196db5>] proc_mkdir_mode+0x30/0x43
[<c06a3cb8>] kernel_init+0x0/0xa3
[<c06a3d19>] kernel_init+0x61/0xa3
[<c01080a3>] kernel_thread_helper+0x7/0x10
=======================
Code: 8b 0e 23 3b 66 2b d1 66 b8 01 00 eb 04 66 b8 00 00 66 59 66 81 e1 00 f0 6
EIP: [<c00fd5d7>] 0xc00fd5d7 SS:ESP e021:ed023ed4
---[ end trace ca143223eefdc828 ]---
--
Michael Marineau
Oregon State University
mike@xxxxxxxxxxxx
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|