WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

[Xen-ia64-devel] Re: blkbk/netbk modules fail to load on fedora xen/ia64

Hi, Aron and all

netbk/xennet modules fail to load by using xen-ia64-unstable again.
This issue is caused by the following patches.
http://xenbits.xensource.com/ext/xen-ia64-unstable.hg?cs=c757ebffd500

We can probably resolve this issue.
1. Tristan's xencomm patches is applied. 
   (I test by using xen-ia64-unstable,
    but these patches have some issue.)
2. revert the below patch. 
   (I have not test yet.)
3. built in these modules. 
   (I have not test yet.)

I think the best way is 1.
But Tristan's patches still have some issues.
What do you think about this?

Best Regards,

Akio Takebe

>Akio Takebe wrote:  [Thu Sep 21 2006, 09:53:16PM EDT]
>> I can solve this problem by using dom0_mem=1G.
>
>This allows blkbk/netbk to load, but I guess a domU won't install yet.
>xenguest-install fails with a panic in dom0.  I used this command:
>
>    xenguest-install -n domu -r 1024 -f /root/domu.img \
>    -l http://hummer.zko.hp.com/fedora/linux/core/development/ia64/os/ \
>    -s 4 --nographics -p -x 'ide0=noprobe ide1=noprobe ide2=noprobe ide3=
>noprobe'
>
>Here is the output on the dom0 console:
>
>(XEN) ### domain f000000007bb4080: rid=80000-c0000 mp_rid=2000
>(XEN) arch_domain_create: domain=f000000007bb4080
>(XEN) DomainU EFI build up: ACPI 2.0=0x1000
>(XEN) dom mem: type=13, attr=0x8000000000000008, range=[0x0000000000000000-
>0x0000000000001000) (4KB)
>(XEN) dom mem: type=10, attr=0x8000000000000008, range=[0x0000000000001000-
>0x0000000000002000) (4KB)
>(XEN) dom mem: type= 6, attr=0x8000000000000008, range=[0x0000000000002000-
>0x0000000000003000) (4KB)
>(XEN) dom mem: type= 7, attr=0x0000000000000008, range=[0x0000000000003000-
>0x000000003fff4000) (1023MB)
>(XEN) dom mem: type=12, attr=0x0000000000000001, range=[0x00000ffffc000000-
>0x0000100000000000) (64MB)
>audit(1158891786.948:4): dev=vif1.0 prom=256 old_prom=0 auid=4294967295
>kernel unaligned access to 0xa0000002009e405f, ip=0xa000000100295e91
>kernel unaligned access to 0xa0000002009e4067, ip=0xa000000100295e91
>kernel unaligned access to 0xa0000002009e406f, ip=0xa000000100295e91
>kernel unaligned access to 0xa0000002009e4077, ip=0xa000000100295e91
>kernel unaligned access to 0xa0000002009e407f, ip=0xa000000100295e91
>(XEN) vcpu_get_lrr0: Unmasked interrupts unsupported
>(XEN) vcpu_get_lrr1: Unmasked interrupts unsupported
>(XEN) Linux version 2.6.18-1.2679.fc6xen (brewbuilder@xxxxxxxxxxxxxxxxxxxx
>com) (gcc version 4.1.1 20060917 (Red Hat 4.1.1-23)) #1 SMP Wed Sep 20 01:
>18:10 EDT 2006
>EFI v1.00 by Xen/ia64: SALsystab=0x2178 ACPI 2.0=0x1000
>rsvd_region[0]: [0xe000000000002228, 0xe0000000000022f0)
>rsvd_region[1]: [0xe000000000003000, 0xe000000000003030)
>rsvd_region[2]: [0xe000000004000000, 0xe000000004c2899b)
>rsvd_region[3]: [0xe000000004c2c000, 0xe00000000597ac00)
>rsvd_region[4]: [0xe00000003fff4000, 0xe00000003fff8000)
>rsvd_region[5]: [0xffffffffffffffff, 0xffffffffffffffff)
>Initial ramdisk at: 0xe000000004c2c000 (13954048 bytes)
>SAL 0.1: Xen/ia64 Xen/ia64 version 0.0
>SAL: AP wakeup using external interrupt vector 0xf3
>xen_pal_emulator: UNIMPLEMENTED PAL CALL 42!!!!
>(XEN) No logical to physical processor mapping available
>ACPI: Local APIC address c0000000fee00000
>ACPI: Error parsing MADT - no IOSAPIC entries
>1 CPUs available, 1 CPUs total
>Running on Xen! start_info_pfn=0xfffd nr_pages=65536 flags=0x0
>*** CALLED SAL_MC_SET_PARAMS.  IGNORED...
>(XEN) *** CALLED SAL_MC_SET_PARAMS.  IGNORED...
>(XEN) *** CALLED SAL_SET_VECTORS 0.  IGNORED...
>(XEN) *** CALLED SAL_SET_VECTORS 1.  IGNORED...
>(XEN) MCA related initialization done
>SMP: Allowing 1 CPUs, 0 hotplug CPUs
>Built 1 zonelists.  Total pages: 61440
>Kernel command line:   method=http://hummer.zko.hp.com/fedora/linux/core/
>development/ia64/os/  ide0=noprobe ide1=noprobe ide2=noprobe ide3=noprobe
>ide_setup: ide0=noprobe
>ide_setup: ide1=noprobe
>ide_setup: ide2=noprobe
>ide_setup: ide3=noprobe
>PID hash table entries: 4096 (order: 12, 32768 bytes)
>Console: colour dummy device 80x25
>(file=grant_table.c, line=704) gnttab_transfer: error writing resp 0/1
>kernel BUG at drivers/xen/netback/netback.c:631!
>swapper[0]: bugcheck! 0 [1]
>Modules linked in: loop xt_physdev bridge netloop netbk blkbk autofs4 hidp 
>rfcomm l2cap bluetooth sunrpc ip_conntrack_netbios_ns ipt_REJECT 
>iptable_filter ip_tables xt_state ip_conntrack nfnetlink xt_tcpudp 
>ip6table_filter ip6_tables x_tables ipv6 vfat fat dm_multipath button 
>parport_pc lp parport ide_cd sg e1000 cdrom dm_snapshot dm_zero dm_mirror 
>dm_mod mptspi mptscsih mptbase scsi_transport_spi sd_mod scsi_mod ext3 jbd 
>ehci_hcd ohci_hcd uhci_hcd
>
>Pid: 0, CPU 0, comm:              swapper
>psr : 0000001008026010 ifs : 8000000000000694 ip  : [<a000000200c80590>]   
> Not tainted
>ip is at net_rx_action+0x990/0x17a0 [netbk]
>unat: 0000000000000000 pfs : 8000000000000694 rsc : 0000000000000008
>rnat: 0000000000000000 bsps: 0000000000000000 pr  : 0000000000019665
>ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70433f
>csd : 0000000000000000 ssd : 0000000000000000
>b0  : a000000200c80590 b6  : a0000001000b80c0 b7  : a0000002007c36c0
>f6  : 1003e00000000000000a0 f7  : 1003e20c49ba5e353f7cf
>f8  : 1003e00000000000004e2 f9  : 1003e000000000fa00000
>f10 : 1003e000000003b9aca00 f11 : 1003e431bde82d7b634db
>r1  : a000000100bcee60 r2  : a0000001009e5758 r3  : a0000001009e59f0
>r8  : 0000000000000034 r9  : a0000001009da5e0 r10 : a0000001009e5788
>r11 : a0000001009e5788 r12 : a000000100733b10 r13 : a00000010072c000
>r14 : a0000001009e5758 r15 : 0000000000000000 r16 : f100000000004c18
>r17 : a0000001009e59f0 r18 : a0000001008978fc r19 : 0000000000000001
>r20 : 0000000000000000 r21 : a0000001009cf4b0 r22 : 0000000000000000
>r23 : a000000100780900 r24 : a0000001009cf4b0 r25 : a0000001009e5760
>r26 : a0000001009e5760 r27 : 000000003fffff00 r28 : a00000010072d018
>r29 : e000000026a58060 r30 : a00000010072c02c r31 : e000000026a5802c
>
>Call Trace:
> [<a00000010001c900>] show_stack+0x40/0xa0
>                                sp=a0000001007336a0 bsp=a00000010072d4d0
> [<a00000010001d200>] show_regs+0x840/0x880
>                                sp=a000000100733870 bsp=a00000010072d478
> [<a0000001000415e0>] die+0x1c0/0x2a0
>                                sp=a000000100733870 bsp=a00000010072d430
> [<a000000100041710>] die_if_kernel+0x50/0x80
>                                sp=a000000100733890 bsp=a00000010072d400
> [<a0000001005de6e0>] ia64_bad_break+0x280/0x4a0
>                                sp=a000000100733890 bsp=a00000010072d3d0
> [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
>                                sp=a000000100733940 bsp=a00000010072d3d0
> [<a000000200c80590>] net_rx_action+0x990/0x17a0 [netbk]
>                                sp=a000000100733b10 bsp=a00000010072d330
> [<a00000010008f460>] tasklet_action+0x320/0x5e0
>                                sp=a000000100733bb0 bsp=a00000010072d308
> [<a00000010008e250>] __do_softirq+0x1f0/0x3a0
>                                sp=a000000100733bb0 bsp=a00000010072d290
> [<a00000010008e540>] do_softirq+0x140/0x2a0
>                                sp=a000000100733bb0 bsp=a00000010072d230
> [<a00000010008e720>] irq_exit+0x80/0xa0
>                                sp=a000000100733bb0 bsp=a00000010072d218
> [<a0000001003b45d0>] evtchn_do_upcall+0x170/0x260
>                                sp=a000000100733bb0 bsp=a00000010072d180
> [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
>                                sp=a000000100733bb0 bsp=a00000010072d180
> [<e000000000000810>] 0xe000000000000810
>                                sp=a000000100733d80 bsp=a00000010072d130
> [<a000000100066150>] xen_pal_call_static+0xd0/0x100
>                                sp=a000000100733d80 bsp=a00000010072d110
> <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20
>in_atomic():1, irqs_disabled():0
>
>Call Trace:
> [<a00000010001c900>] show_stack+0x40/0xa0
>                                sp=a000000100733680 bsp=a00000010072d588
> [<a00000010001c990>] dump_stack+0x30/0x60
>                                sp=a000000100733850 bsp=a00000010072d570
> [<a00000010006d8e0>] __might_sleep+0x2a0/0x2c0
>                                sp=a000000100733850 bsp=a00000010072d548
> [<a0000001000bf7a0>] down_read+0x20/0x60
>                                sp=a000000100733850 bsp=a00000010072d528
> [<a0000001000a88a0>] blocking_notifier_call_chain+0x20/0x80
>                                sp=a000000100733850 bsp=a00000010072d4f0
> [<a000000100083470>] profile_task_exit+0x30/0x60
>                                sp=a000000100733850 bsp=a00000010072d4d0
> [<a000000100087580>] do_exit+0x40/0x1420
>                                sp=a000000100733850 bsp=a00000010072d478
> [<a0000001000416a0>] die+0x280/0x2a0
>                                sp=a000000100733870 bsp=a00000010072d430
> [<a000000100041710>] die_if_kernel+0x50/0x80
>                                sp=a000000100733890 bsp=a00000010072d400
> [<a0000001005de6e0>] ia64_bad_break+0x280/0x4a0
>                                sp=a000000100733890 bsp=a00000010072d3d0
> [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
>                                sp=a000000100733940 bsp=a00000010072d3d0
> [<a000000200c80590>] net_rx_action+0x990/0x17a0 [netbk]
>                                sp=a000000100733b10 bsp=a00000010072d330
> [<a00000010008f460>] tasklet_action+0x320/0x5e0
>                                sp=a000000100733bb0 bsp=a00000010072d308
> [<a00000010008e250>] __do_softirq+0x1f0/0x3a0
>                                sp=a000000100733bb0 bsp=a00000010072d290
> [<a00000010008e540>] do_softirq+0x140/0x2a0
>                                sp=a000000100733bb0 bsp=a00000010072d230
> [<a00000010008e720>] irq_exit+0x80/0xa0
>                                sp=a000000100733bb0 bsp=a00000010072d218
> [<a0000001003b45d0>] evtchn_do_upcall+0x170/0x260
>                                sp=a000000100733bb0 bsp=a00000010072d180
> [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0
>                                sp=a000000100733bb0 bsp=a00000010072d180
> [<e000000000000810>] 0xe000000000000810
>                                sp=a000000100733d80 bsp=a00000010072d130
> [<a000000100066150>] xen_pal_call_static+0xd0/0x100
>                                sp=a000000100733d80 bsp=a00000010072d110
>Kernel panic - not syncing: Aiee, killing interrupt handler!



_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel