WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

RE: [Xen-ia64-devel] [PATCH] Fix freeing of privregs structure fordomVTi

To: Masaki Kanno <kanno.masaki@xxxxxxxxxxxxxx>
Subject: RE: [Xen-ia64-devel] [PATCH] Fix freeing of privregs structure fordomVTi
From: Alex Williamson <alex.williamson@xxxxxx>
Date: Tue, 16 Jan 2007 13:58:24 -0700
Cc: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Tue, 16 Jan 2007 12:57:57 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <9C738A3962B4Ekanno.masaki@xxxxxxxxxxxxxx>
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: HP OSLO R&D
References: <51CFAB8CB6883745AE7B93B3E084EBE207DDEC@xxxxxxxxxxxxxxxxxxxxxxxxxxxx> <9C738A3962B4Ekanno.masaki@xxxxxxxxxxxxxx>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
On Mon, 2007-01-15 at 21:49 +0900, Masaki Kanno wrote:
> Hi,
> 
> I made a patch to modify initialization of VCPU of dom0/domU. 

Hi Kan,

   I get softlockups in dom0 (like shown below) with this patch.  These
occur when running multiple domVTs and shutting them down at the same
time.  Could you please investigate?  Thanks,

        Alex

-- 
Alex Williamson                             HP Open Source & Linux Org.

BUG: soft lockup detected on CPU#0!
Modules linked in:

Pid: 3179, CPU 0, comm:              qemu-dm
psr : 00001410085a6010 ifs : 8000000000000006 ip  : [<a000000100068b02>]    Not 
tainted
ip is at __hypercall+0x2/0x20
unat: 0000000000000000 pfs : 8000000000000510 rsc : 000000000000000b
rnat: 0000000000000000 bsps: 0000000000000000 pr  : 0000000000695a9b
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a00000010006a3f0 b6  : a00000010006a2c0 b7  : 0000000000000000
f6  : 000000000000000000000 f7  : 000000000000000000000
f8  : 000000000000000000000 f9  : 000000000000000000000
f10 : 000000000000000000000 f11 : 000000000000000000000
r1  : a00000010104ec60 r2  : 0000000000000030 r3  : f000000007c2fec8
r8  : 0000000000000000 r9  : a000000100e73228 r10 : 0000000000000000
r11 : 00000000008ea860 r12 : e0000004ab95fcb0 r13 : e0000004ab958000
r14 : 0000000000000000 r15 : 0000000000000000 r16 : 00000000008ea840
r17 : 000000000008ea84 r18 : 000000000008ea84 r19 : 0000000000000001
r20 : 0009804c8a70033f r21 : a000000100e75600 r22 : a000000201176858
r23 : ffffffffffffffff r24 : 00000000000b0000 r25 : e0000004ae8a3650
r26 : 8000000000000510 r27 : 000000000000000b r28 : a000000100068b00
r29 : 00001412085a6010 r30 : 8000000000000006 r31 : 0000000000695a9b

Call Trace:
 [<a00000010001cfe0>] show_stack+0x40/0xa0
                                sp=e0000004ab95f910 bsp=e0000004ab959608
 [<a00000010001d8e0>] show_regs+0x840/0x880
                                sp=e0000004ab95fae0 bsp=e0000004ab9595a8
 [<a0000001000d7f70>] softlockup_tick+0x130/0x160
                                sp=e0000004ab95fae0 bsp=e0000004ab959578
 [<a0000001000a1ea0>] do_timer+0x9a0/0x9c0
                                sp=e0000004ab95fae0 bsp=e0000004ab959538
 [<a000000100042190>] timer_interrupt+0x1f0/0x380
                                sp=e0000004ab95fae0 bsp=e0000004ab9594f8
 [<a0000001000d8200>] handle_IRQ_event+0x160/0x240
                                sp=e0000004ab95fae0 bsp=e0000004ab9594b8
 [<a0000001000d8580>] __do_IRQ+0x2a0/0x3c0
                                sp=e0000004ab95fae0 bsp=e0000004ab959470
 [<a0000001006a2f60>] evtchn_do_upcall+0x1c0/0x320
                                sp=e0000004ab95fae0 bsp=e0000004ab9593d0
 [<a000000100068ea0>] xen_event_callback+0x380/0x3c0
                                sp=e0000004ab95fae0 bsp=e0000004ab9593d0


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel