WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

[Xen-ia64-devel] Re: blkbk/netbk modules fail to load on fedora xen/ia64

To: Akio Takebe <takebe_akio@xxxxxxxxxxxxxx>
Subject: [Xen-ia64-devel] Re: blkbk/netbk modules fail to load on fedora xen/ia64
From: Aron Griffis <aron@xxxxxx>
Date: Thu, 21 Sep 2006 22:29:31 -0400
Cc: jean-paul.pigache@xxxxxxxx, "Silbermann, Martine" <martine.silbermann@xxxxxx>, David Cardos <david.cardos@xxxxxx>, xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Thu, 21 Sep 2006 19:29:50 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <7AC6DDE9DEC138takebe_akio@xxxxxxxxxxxxxx>
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
Mail-followup-to: Akio Takebe <takebe_akio@xxxxxxxxxxxxxx>, jean-paul.pigache@xxxxxxxx, Alex Williamson <alex.williamson@xxxxxx>, "Silbermann, Martine" <martine.silbermann@xxxxxx>, David Cardos <david.cardos@xxxxxx>, "Oguchi, Yoshi" <y-oguchi@xxxxxxxxxxxxxx>, "Zhang, Xiantao" <xiantao.zhang@xxxxxxxxx>, Kouya SHIMURA <kouya@xxxxxxxxxxxxxx>, xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
References: <20060922011305.GA28162@xxxxxxxxx> <7AC6DDE9DEC138takebe_akio@xxxxxxxxxxxxxx>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.5.13 (2006-08-11)
Akio Takebe wrote:  [Thu Sep 21 2006, 09:53:16PM EDT]
> I can solve this problem by using dom0_mem=1G.

This allows blkbk/netbk to load, but I guess a domU won't install yet.
xenguest-install fails with a panic in dom0.  I used this command:

    xenguest-install -n domu -r 1024 -f /root/domu.img \
    -l http://hummer.zko.hp.com/fedora/linux/core/development/ia64/os/ \
    -s 4 --nographics -p -x 'ide0=noprobe ide1=noprobe ide2=noprobe 
ide3=noprobe'

Here is the output on the dom0 console:

(XEN) ### domain f000000007bb4080: rid=80000-c0000 mp_rid=2000
(XEN) arch_domain_create: domain=f000000007bb4080
(XEN) DomainU EFI build up: ACPI 2.0=0x1000
(XEN) dom mem: type=13, attr=0x8000000000000008, 
range=[0x0000000000000000-0x0000000000001000) (4KB)
(XEN) dom mem: type=10, attr=0x8000000000000008, 
range=[0x0000000000001000-0x0000000000002000) (4KB)
(XEN) dom mem: type= 6, attr=0x8000000000000008, 
range=[0x0000000000002000-0x0000000000003000) (4KB)
(XEN) dom mem: type= 7, attr=0x0000000000000008, 
range=[0x0000000000003000-0x000000003fff4000) (1023MB)
(XEN) dom mem: type=12, attr=0x0000000000000001, 
range=[0x00000ffffc000000-0x0000100000000000) (64MB)
audit(1158891786.948:4): dev=vif1.0 prom=256 old_prom=0 auid=4294967295
kernel unaligned access to 0xa0000002009e405f, ip=0xa000000100295e91
kernel unaligned access to 0xa0000002009e4067, ip=0xa000000100295e91
kernel unaligned access to 0xa0000002009e406f, ip=0xa000000100295e91
kernel unaligned access to 0xa0000002009e4077, ip=0xa000000100295e91
kernel unaligned access to 0xa0000002009e407f, ip=0xa000000100295e91
(XEN) vcpu_get_lrr0: Unmasked interrupts unsupported
(XEN) vcpu_get_lrr1: Unmasked interrupts unsupported
(XEN) Linux version 2.6.18-1.2679.fc6xen (brewbuilder@xxxxxxxxxxxxxxxxxxxxxxx) 
(gcc version 4.1.1 20060917 (Red Hat 4.1.1-23)) #1 SMP Wed Sep 20 01:18:10 EDT 
2006
EFI v1.00 by Xen/ia64: SALsystab=0x2178 ACPI 2.0=0x1000
rsvd_region[0]: [0xe000000000002228, 0xe0000000000022f0)
rsvd_region[1]: [0xe000000000003000, 0xe000000000003030)
rsvd_region[2]: [0xe000000004000000, 0xe000000004c2899b)
rsvd_region[3]: [0xe000000004c2c000, 0xe00000000597ac00)
rsvd_region[4]: [0xe00000003fff4000, 0xe00000003fff8000)
rsvd_region[5]: [0xffffffffffffffff, 0xffffffffffffffff)
Initial ramdisk at: 0xe000000004c2c000 (13954048 bytes)
SAL 0.1: Xen/ia64 Xen/ia64 version 0.0
SAL: AP wakeup using external interrupt vector 0xf3
xen_pal_emulator: UNIMPLEMENTED PAL CALL 42!!!!
(XEN) No logical to physical processor mapping available
ACPI: Local APIC address c0000000fee00000
ACPI: Error parsing MADT - no IOSAPIC entries
1 CPUs available, 1 CPUs total
Running on Xen! start_info_pfn=0xfffd nr_pages=65536 flags=0x0
*** CALLED SAL_MC_SET_PARAMS.  IGNORED...
(XEN) *** CALLED SAL_MC_SET_PARAMS.  IGNORED...
(XEN) *** CALLED SAL_SET_VECTORS 0.  IGNORED...
(XEN) *** CALLED SAL_SET_VECTORS 1.  IGNORED...
(XEN) MCA related initialization done
SMP: Allowing 1 CPUs, 0 hotplug CPUs
Built 1 zonelists.  Total pages: 61440
Kernel command line:   
method=http://hummer.zko.hp.com/fedora/linux/core/development/ia64/os/  
ide0=noprobe ide1=noprobe ide2=noprobe ide3=noprobe
ide_setup: ide0=noprobe
ide_setup: ide1=noprobe
ide_setup: ide2=noprobe
ide_setup: ide3=noprobe
PID hash table entries: 4096 (order: 12, 32768 bytes)
Console: colour dummy device 80x25
(file=grant_table.c, line=704) gnttab_transfer: error writing resp 0/1
kernel BUG at drivers/xen/netback/netback.c:631!
swapper[0]: bugcheck! 0 [1]
Modules linked in: loop xt_physdev bridge netloop netbk blkbk autofs4 hidp 
rfcomm l2cap bluetooth sunrpc ip_conntrack_netbios_ns ipt_REJECT iptable_filter 
ip_tables xt_state ip_conntrack nfnetlink xt_tcpudp ip6table_filter ip6_tables 
x_tables ipv6 vfat fat dm_multipath button parport_pc lp parport ide_cd sg 
e1000 cdrom dm_snapshot dm_zero dm_mirror dm_mod mptspi mptscsih mptbase 
scsi_transport_spi sd_mod scsi_mod ext3 jbd ehci_hcd ohci_hcd uhci_hcd

Pid: 0, CPU 0, comm:              swapper
psr : 0000001008026010 ifs : 8000000000000694 ip  : [<a000000200c80590>]    Not 
tainted
ip is at net_rx_action+0x990/0x17a0 [netbk]
unat: 0000000000000000 pfs : 8000000000000694 rsc : 0000000000000008
rnat: 0000000000000000 bsps: 0000000000000000 pr  : 0000000000019665
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70433f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a000000200c80590 b6  : a0000001000b80c0 b7  : a0000002007c36c0
f6  : 1003e00000000000000a0 f7  : 1003e20c49ba5e353f7cf
f8  : 1003e00000000000004e2 f9  : 1003e000000000fa00000
f10 : 1003e000000003b9aca00 f11 : 1003e431bde82d7b634db
r1  : a000000100bcee60 r2  : a0000001009e5758 r3  : a0000001009e59f0
r8  : 0000000000000034 r9  : a0000001009da5e0 r10 : a0000001009e5788
r11 : a0000001009e5788 r12 : a000000100733b10 r13 : a00000010072c000
r14 : a0000001009e5758 r15 : 0000000000000000 r16 : f100000000004c18
r17 : a0000001009e59f0 r18 : a0000001008978fc r19 : 0000000000000001
r20 : 0000000000000000 r21 : a0000001009cf4b0 r22 : 0000000000000000
r23 : a000000100780900 r24 : a0000001009cf4b0 r25 : a0000001009e5760
r26 : a0000001009e5760 r27 : 000000003fffff00 r28 : a00000010072d018
r29 : e000000026a58060 r30 : a00000010072c02c r31 : e000000026a5802c

Call Trace:
 [<a00000010001c900>] show_stack+0x40/0xa0
                                sp=a0000001007336a0 bsp=a00000010072d4d0
 [<a00000010001d200>] show_regs+0x840/0x880
                                sp=a000000100733870 bsp=a00000010072d478
 [<a0000001000415e0>] die+0x1c0/0x2a0
                                sp=a000000100733870 bsp=a00000010072d430
 [<a000000100041710>] die_if_kernel+0x50/0x80
                                sp=a000000100733890 bsp=a00000010072d400
 [<a0000001005de6e0>] ia64_bad_break+0x280/0x4a0
                                sp=a000000100733890 bsp=a00000010072d3d0
 [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
                                sp=a000000100733940 bsp=a00000010072d3d0
 [<a000000200c80590>] net_rx_action+0x990/0x17a0 [netbk]
                                sp=a000000100733b10 bsp=a00000010072d330
 [<a00000010008f460>] tasklet_action+0x320/0x5e0
                                sp=a000000100733bb0 bsp=a00000010072d308
 [<a00000010008e250>] __do_softirq+0x1f0/0x3a0
                                sp=a000000100733bb0 bsp=a00000010072d290
 [<a00000010008e540>] do_softirq+0x140/0x2a0
                                sp=a000000100733bb0 bsp=a00000010072d230
 [<a00000010008e720>] irq_exit+0x80/0xa0
                                sp=a000000100733bb0 bsp=a00000010072d218
 [<a0000001003b45d0>] evtchn_do_upcall+0x170/0x260
                                sp=a000000100733bb0 bsp=a00000010072d180
 [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
                                sp=a000000100733bb0 bsp=a00000010072d180
 [<e000000000000810>] 0xe000000000000810
                                sp=a000000100733d80 bsp=a00000010072d130
 [<a000000100066150>] xen_pal_call_static+0xd0/0x100
                                sp=a000000100733d80 bsp=a00000010072d110
 <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():1, irqs_disabled():0

Call Trace:
 [<a00000010001c900>] show_stack+0x40/0xa0
                                sp=a000000100733680 bsp=a00000010072d588
 [<a00000010001c990>] dump_stack+0x30/0x60
                                sp=a000000100733850 bsp=a00000010072d570
 [<a00000010006d8e0>] __might_sleep+0x2a0/0x2c0
                                sp=a000000100733850 bsp=a00000010072d548
 [<a0000001000bf7a0>] down_read+0x20/0x60
                                sp=a000000100733850 bsp=a00000010072d528
 [<a0000001000a88a0>] blocking_notifier_call_chain+0x20/0x80
                                sp=a000000100733850 bsp=a00000010072d4f0
 [<a000000100083470>] profile_task_exit+0x30/0x60
                                sp=a000000100733850 bsp=a00000010072d4d0
 [<a000000100087580>] do_exit+0x40/0x1420
                                sp=a000000100733850 bsp=a00000010072d478
 [<a0000001000416a0>] die+0x280/0x2a0
                                sp=a000000100733870 bsp=a00000010072d430
 [<a000000100041710>] die_if_kernel+0x50/0x80
                                sp=a000000100733890 bsp=a00000010072d400
 [<a0000001005de6e0>] ia64_bad_break+0x280/0x4a0
                                sp=a000000100733890 bsp=a00000010072d3d0
 [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
                                sp=a000000100733940 bsp=a00000010072d3d0
 [<a000000200c80590>] net_rx_action+0x990/0x17a0 [netbk]
                                sp=a000000100733b10 bsp=a00000010072d330
 [<a00000010008f460>] tasklet_action+0x320/0x5e0
                                sp=a000000100733bb0 bsp=a00000010072d308
 [<a00000010008e250>] __do_softirq+0x1f0/0x3a0
                                sp=a000000100733bb0 bsp=a00000010072d290
 [<a00000010008e540>] do_softirq+0x140/0x2a0
                                sp=a000000100733bb0 bsp=a00000010072d230
 [<a00000010008e720>] irq_exit+0x80/0xa0
                                sp=a000000100733bb0 bsp=a00000010072d218
 [<a0000001003b45d0>] evtchn_do_upcall+0x170/0x260
                                sp=a000000100733bb0 bsp=a00000010072d180
 [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
                                sp=a000000100733bb0 bsp=a00000010072d180
 [<e000000000000810>] 0xe000000000000810
                                sp=a000000100733d80 bsp=a00000010072d130
 [<a000000100066150>] xen_pal_call_static+0xd0/0x100
                                sp=a000000100733d80 bsp=a00000010072d110
Kernel panic - not syncing: Aiee, killing interrupt handler!


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel