[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Dom0 pvops kernel booting: release dom0-2.6.24-B0
On Wed, Feb 6, 2008 at 7:47 AM, Stephen C. Tweedie <sct@xxxxxxxxxx> wrote: > Hi all, > > I've substantially cleaned up the Xen contiguous region handling and the > pfn/mfn translations in the dma mapping layer, and rebased everything > cleanly on top of v2.6.24. The resulting patch queue can be viewed as > tag "dom0-2.6.24-B0" on the dom0-pvops git tree at > > git://et.redhat.com/linux-2.6-dom0-pvops.git > > or equivalently on gitweb at > > > http://git.et.redhat.com/?p=linux-2.6-dom0-pvops.git;a=shortlog;h=dom0-2.6.24-B0 > > As usual, a mergeable, fast-forwarding development branch is being > maintained on the git master branch, with tag "dom0-2.6.24-B0-dev", > which has an identical git tree but with the full development history > behind it. > > New in this release: > > * Added full mtrr support from Mark McLoughlin > * Added xen_(create|destroy)_contiguous region handling > * Added full Xen dma support to enable booting a dom0 kernel > > Support for the dom0 xend userland is still missing, and there is no > swiotlb yet; but the dom0 kernel boots successfully on a HV and I've had > a best uptime of nearly an hour so far. I'm getting soft lockups under > load, but it's not clear if that's a dom0 problem or a latent pv_ops > bug. > > Enjoy! > > Cheers, > Stephen I took a stab at getting this booting but it dies when trying to make a call to bios32_indirect in arch/x86/pci/pcbios.c, the address apparently is triggering a page fault that of course cannot be handled. Here is the resulting oops: PCI: BIOS32 Service Directory structure at 0xc00f62d0 PCI: BIOS32 Service Directory entry at 0xfd5d7 BUG: unable to handle kernel paging request at virtual address c00fd5d7 printing eip: c00fd5d7 *pdpt = 000000003e006001 Oops: 0011 [#1] SMP Modules linked in: Pid: 1, comm: swapper Not tainted (2.6.24-osl1-gd076f0f0-dirty #9) EIP: 0061:[<c00fd5d7>] EFLAGS: 00010046 CPU: 0 EIP is at 0xc00fd5d7 EAX: 49435024 EBX: 00000000 ECX: 00000000 EDX: c0600b36 ESI: 00000200 EDI: c0675a84 EBP: c06d0ff4 ESP: ed023ed4 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: e021 Process swapper (pid: 1, ti=ed023000 task=ed022a90 task.ti=ed023000) Stack: c0459af4 00000061 00000001 c0166fd7 c15a0900 ed0007c0 49435024 000fd5d7 c00f62d0 00000000 c06d0ff4 c0459b68 c05a851d ed045e00 00000200 00000000 c0675a9c c06d0ff4 c0450135 c06bf56b ed047480 c062f7e0 00000cff 000fd5d7 Call Trace: [<c0459af4>] bios32_service+0x30/0x93 [<c0166fd7>] kfree+0x95/0x9b [<c0459b68>] check_pcibios+0x11/0x14d [<c0450135>] dmi_get_year+0x28/0x52 [<c06bf56b>] pci_sanity_check+0x2c/0xe8 [<c0459f20>] pci_find_bios+0xc8/0xec [<c06bf521>] pci_pcbios_init+0xe/0x2c [<c06bf4f2>] pci_access_init+0x17/0x38 [<c06a3cb8>] kernel_init+0x0/0xa3 [<c06a3b37>] do_initcalls+0x73/0x1b2 [<c019688e>] get_inode_number+0x30/0x54 [<c0196c11>] proc_register+0x85/0x9f [<c0196e4a>] create_proc_entry+0x76/0x89 [<c014b051>] register_irq_proc+0x77/0x93 [<c0196db5>] proc_mkdir_mode+0x30/0x43 [<c06a3cb8>] kernel_init+0x0/0xa3 [<c06a3d19>] kernel_init+0x61/0xa3 [<c01080a3>] kernel_thread_helper+0x7/0x10 ======================= Code: 8b 0e 23 3b 66 2b d1 66 b8 01 00 eb 04 66 b8 00 00 66 59 66 81 e1 00 f0 6 EIP: [<c00fd5d7>] 0xc00fd5d7 SS:ESP e021:ed023ed4 ---[ end trace ca143223eefdc828 ]--- -- Michael Marineau Oregon State University mike@xxxxxxxxxxxx _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |