|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] Dom0 pvops kernel booting: release dom0-2.6.24-B0
On Fri, Feb 15, 2008 at 03:10:22PM -0800, Michael Marineau wrote:
> On Wed, Feb 6, 2008 at 7:47 AM, Stephen C. Tweedie <sct@xxxxxxxxxx> wrote:
> > Hi all,
> >
> > I've substantially cleaned up the Xen contiguous region handling and the
> > pfn/mfn translations in the dma mapping layer, and rebased everything
> > cleanly on top of v2.6.24. The resulting patch queue can be viewed as
> > tag "dom0-2.6.24-B0" on the dom0-pvops git tree at
> >
> > git://et.redhat.com/linux-2.6-dom0-pvops.git
> >
> > or equivalently on gitweb at
> >
> >
> > http://git.et.redhat.com/?p=linux-2.6-dom0-pvops.git;a=shortlog;h=dom0-2.6.24-B0
> >
> > As usual, a mergeable, fast-forwarding development branch is being
> > maintained on the git master branch, with tag "dom0-2.6.24-B0-dev",
> > which has an identical git tree but with the full development history
> > behind it.
> >
> > New in this release:
> >
> > * Added full mtrr support from Mark McLoughlin
> > * Added xen_(create|destroy)_contiguous region handling
> > * Added full Xen dma support to enable booting a dom0 kernel
> >
> > Support for the dom0 xend userland is still missing, and there is no
> > swiotlb yet; but the dom0 kernel boots successfully on a HV and I've had
> > a best uptime of nearly an hour so far. I'm getting soft lockups under
> > load, but it's not clear if that's a dom0 problem or a latent pv_ops
> > bug.
> >
> > Enjoy!
> >
Hello!
Are there any plans to update dom0 pv_ops tree for 2.6.26 or other newer
kernels?
It seems Jeremy has gotten x86_64 xen domU patches submitted for 2.6.27
inclusion..
-- Pasi
> > Cheers,
> > Stephen
>
> I took a stab at getting this booting but it dies when trying to make
> a call to bios32_indirect in arch/x86/pci/pcbios.c, the address
> apparently is triggering a page fault that of course cannot be
> handled. Here is the resulting oops:
>
> PCI: BIOS32 Service Directory structure at 0xc00f62d0
> PCI: BIOS32 Service Directory entry at 0xfd5d7
> BUG: unable to handle kernel paging request at virtual address c00fd5d7
> printing eip: c00fd5d7 *pdpt = 000000003e006001
> Oops: 0011 [#1] SMP
> Modules linked in:
>
> Pid: 1, comm: swapper Not tainted (2.6.24-osl1-gd076f0f0-dirty #9)
> EIP: 0061:[<c00fd5d7>] EFLAGS: 00010046 CPU: 0
> EIP is at 0xc00fd5d7
> EAX: 49435024 EBX: 00000000 ECX: 00000000 EDX: c0600b36
> ESI: 00000200 EDI: c0675a84 EBP: c06d0ff4 ESP: ed023ed4
> DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: e021
> Process swapper (pid: 1, ti=ed023000 task=ed022a90 task.ti=ed023000)
> Stack: c0459af4 00000061 00000001 c0166fd7 c15a0900 ed0007c0 49435024 000fd5d7
> c00f62d0 00000000 c06d0ff4 c0459b68 c05a851d ed045e00 00000200 00000000
> c0675a9c c06d0ff4 c0450135 c06bf56b ed047480 c062f7e0 00000cff 000fd5d7
> Call Trace:
> [<c0459af4>] bios32_service+0x30/0x93
> [<c0166fd7>] kfree+0x95/0x9b
> [<c0459b68>] check_pcibios+0x11/0x14d
> [<c0450135>] dmi_get_year+0x28/0x52
> [<c06bf56b>] pci_sanity_check+0x2c/0xe8
> [<c0459f20>] pci_find_bios+0xc8/0xec
> [<c06bf521>] pci_pcbios_init+0xe/0x2c
> [<c06bf4f2>] pci_access_init+0x17/0x38
> [<c06a3cb8>] kernel_init+0x0/0xa3
> [<c06a3b37>] do_initcalls+0x73/0x1b2
> [<c019688e>] get_inode_number+0x30/0x54
> [<c0196c11>] proc_register+0x85/0x9f
> [<c0196e4a>] create_proc_entry+0x76/0x89
> [<c014b051>] register_irq_proc+0x77/0x93
> [<c0196db5>] proc_mkdir_mode+0x30/0x43
> [<c06a3cb8>] kernel_init+0x0/0xa3
> [<c06a3d19>] kernel_init+0x61/0xa3
> [<c01080a3>] kernel_thread_helper+0x7/0x10
> =======================
> Code: 8b 0e 23 3b 66 2b d1 66 b8 01 00 eb 04 66 b8 00 00 66 59 66 81 e1 00 f0
> 6
> EIP: [<c00fd5d7>] 0xc00fd5d7 SS:ESP e021:ed023ed4
> ---[ end trace ca143223eefdc828 ]---
> --
> Michael Marineau
> Oregon State University
> mike@xxxxxxxxxxxx
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- Re: [Xen-devel] Dom0 pvops kernel booting: release dom0-2.6.24-B0,
Pasi Kärkkäinen <=
|
|
|
|
|