[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-ia64-devel] Re: blkbk/netbk modules fail to load on fedora xen/ia64
Hi, Aron and all netbk/xennet modules fail to load by using xen-ia64-unstable again. This issue is caused by the following patches. http://xenbits.xensource.com/ext/xen-ia64-unstable.hg?cs=c757ebffd500 We can probably resolve this issue. 1. Tristan's xencomm patches is applied. (I test by using xen-ia64-unstable, but these patches have some issue.) 2. revert the below patch. (I have not test yet.) 3. built in these modules. (I have not test yet.) I think the best way is 1. But Tristan's patches still have some issues. What do you think about this? Best Regards, Akio Takebe >Akio Takebe wrote: [Thu Sep 21 2006, 09:53:16PM EDT] >> I can solve this problem by using dom0_mem=1G. > >This allows blkbk/netbk to load, but I guess a domU won't install yet. >xenguest-install fails with a panic in dom0. I used this command: > > xenguest-install -n domu -r 1024 -f /root/domu.img \ > -l http://hummer.zko.hp.com/fedora/linux/core/development/ia64/os/ \ > -s 4 --nographics -p -x 'ide0=noprobe ide1=noprobe ide2=noprobe ide3= >noprobe' > >Here is the output on the dom0 console: > >(XEN) ### domain f000000007bb4080: rid=80000-c0000 mp_rid=2000 >(XEN) arch_domain_create: domain=f000000007bb4080 >(XEN) DomainU EFI build up: ACPI 2.0=0x1000 >(XEN) dom mem: type=13, attr=0x8000000000000008, range=[0x0000000000000000- >0x0000000000001000) (4KB) >(XEN) dom mem: type=10, attr=0x8000000000000008, range=[0x0000000000001000- >0x0000000000002000) (4KB) >(XEN) dom mem: type= 6, attr=0x8000000000000008, range=[0x0000000000002000- >0x0000000000003000) (4KB) >(XEN) dom mem: type= 7, attr=0x0000000000000008, range=[0x0000000000003000- >0x000000003fff4000) (1023MB) >(XEN) dom mem: type=12, attr=0x0000000000000001, range=[0x00000ffffc000000- >0x0000100000000000) (64MB) >audit(1158891786.948:4): dev=vif1.0 prom=256 old_prom=0 auid=4294967295 >kernel unaligned access to 0xa0000002009e405f, ip=0xa000000100295e91 >kernel unaligned access to 0xa0000002009e4067, ip=0xa000000100295e91 >kernel unaligned access to 0xa0000002009e406f, ip=0xa000000100295e91 >kernel unaligned access to 0xa0000002009e4077, ip=0xa000000100295e91 >kernel unaligned access to 0xa0000002009e407f, ip=0xa000000100295e91 >(XEN) vcpu_get_lrr0: Unmasked interrupts unsupported >(XEN) vcpu_get_lrr1: Unmasked interrupts unsupported >(XEN) Linux version 2.6.18-1.2679.fc6xen (brewbuilder@xxxxxxxxxxxxxxxxxxxx >com) (gcc version 4.1.1 20060917 (Red Hat 4.1.1-23)) #1 SMP Wed Sep 20 01: >18:10 EDT 2006 >EFI v1.00 by Xen/ia64: SALsystab=0x2178 ACPI 2.0=0x1000 >rsvd_region[0]: [0xe000000000002228, 0xe0000000000022f0) >rsvd_region[1]: [0xe000000000003000, 0xe000000000003030) >rsvd_region[2]: [0xe000000004000000, 0xe000000004c2899b) >rsvd_region[3]: [0xe000000004c2c000, 0xe00000000597ac00) >rsvd_region[4]: [0xe00000003fff4000, 0xe00000003fff8000) >rsvd_region[5]: [0xffffffffffffffff, 0xffffffffffffffff) >Initial ramdisk at: 0xe000000004c2c000 (13954048 bytes) >SAL 0.1: Xen/ia64 Xen/ia64 version 0.0 >SAL: AP wakeup using external interrupt vector 0xf3 >xen_pal_emulator: UNIMPLEMENTED PAL CALL 42!!!! >(XEN) No logical to physical processor mapping available >ACPI: Local APIC address c0000000fee00000 >ACPI: Error parsing MADT - no IOSAPIC entries >1 CPUs available, 1 CPUs total >Running on Xen! start_info_pfn=0xfffd nr_pages=65536 flags=0x0 >*** CALLED SAL_MC_SET_PARAMS. IGNORED... >(XEN) *** CALLED SAL_MC_SET_PARAMS. IGNORED... >(XEN) *** CALLED SAL_SET_VECTORS 0. IGNORED... >(XEN) *** CALLED SAL_SET_VECTORS 1. IGNORED... >(XEN) MCA related initialization done >SMP: Allowing 1 CPUs, 0 hotplug CPUs >Built 1 zonelists. Total pages: 61440 >Kernel command line: method=http://hummer.zko.hp.com/fedora/linux/core/ >development/ia64/os/ ide0=noprobe ide1=noprobe ide2=noprobe ide3=noprobe >ide_setup: ide0=noprobe >ide_setup: ide1=noprobe >ide_setup: ide2=noprobe >ide_setup: ide3=noprobe >PID hash table entries: 4096 (order: 12, 32768 bytes) >Console: colour dummy device 80x25 >(file=grant_table.c, line=704) gnttab_transfer: error writing resp 0/1 >kernel BUG at drivers/xen/netback/netback.c:631! >swapper[0]: bugcheck! 0 [1] >Modules linked in: loop xt_physdev bridge netloop netbk blkbk autofs4 hidp >rfcomm l2cap bluetooth sunrpc ip_conntrack_netbios_ns ipt_REJECT >iptable_filter ip_tables xt_state ip_conntrack nfnetlink xt_tcpudp >ip6table_filter ip6_tables x_tables ipv6 vfat fat dm_multipath button >parport_pc lp parport ide_cd sg e1000 cdrom dm_snapshot dm_zero dm_mirror >dm_mod mptspi mptscsih mptbase scsi_transport_spi sd_mod scsi_mod ext3 jbd >ehci_hcd ohci_hcd uhci_hcd > >Pid: 0, CPU 0, comm: swapper >psr : 0000001008026010 ifs : 8000000000000694 ip : [<a000000200c80590>] > Not tainted >ip is at net_rx_action+0x990/0x17a0 [netbk] >unat: 0000000000000000 pfs : 8000000000000694 rsc : 0000000000000008 >rnat: 0000000000000000 bsps: 0000000000000000 pr : 0000000000019665 >ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70433f >csd : 0000000000000000 ssd : 0000000000000000 >b0 : a000000200c80590 b6 : a0000001000b80c0 b7 : a0000002007c36c0 >f6 : 1003e00000000000000a0 f7 : 1003e20c49ba5e353f7cf >f8 : 1003e00000000000004e2 f9 : 1003e000000000fa00000 >f10 : 1003e000000003b9aca00 f11 : 1003e431bde82d7b634db >r1 : a000000100bcee60 r2 : a0000001009e5758 r3 : a0000001009e59f0 >r8 : 0000000000000034 r9 : a0000001009da5e0 r10 : a0000001009e5788 >r11 : a0000001009e5788 r12 : a000000100733b10 r13 : a00000010072c000 >r14 : a0000001009e5758 r15 : 0000000000000000 r16 : f100000000004c18 >r17 : a0000001009e59f0 r18 : a0000001008978fc r19 : 0000000000000001 >r20 : 0000000000000000 r21 : a0000001009cf4b0 r22 : 0000000000000000 >r23 : a000000100780900 r24 : a0000001009cf4b0 r25 : a0000001009e5760 >r26 : a0000001009e5760 r27 : 000000003fffff00 r28 : a00000010072d018 >r29 : e000000026a58060 r30 : a00000010072c02c r31 : e000000026a5802c > >Call Trace: > [<a00000010001c900>] show_stack+0x40/0xa0 > sp=a0000001007336a0 bsp=a00000010072d4d0 > [<a00000010001d200>] show_regs+0x840/0x880 > sp=a000000100733870 bsp=a00000010072d478 > [<a0000001000415e0>] die+0x1c0/0x2a0 > sp=a000000100733870 bsp=a00000010072d430 > [<a000000100041710>] die_if_kernel+0x50/0x80 > sp=a000000100733890 bsp=a00000010072d400 > [<a0000001005de6e0>] ia64_bad_break+0x280/0x4a0 > sp=a000000100733890 bsp=a00000010072d3d0 > [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0 > sp=a000000100733940 bsp=a00000010072d3d0 > [<a000000200c80590>] net_rx_action+0x990/0x17a0 [netbk] > sp=a000000100733b10 bsp=a00000010072d330 > [<a00000010008f460>] tasklet_action+0x320/0x5e0 > sp=a000000100733bb0 bsp=a00000010072d308 > [<a00000010008e250>] __do_softirq+0x1f0/0x3a0 > sp=a000000100733bb0 bsp=a00000010072d290 > [<a00000010008e540>] do_softirq+0x140/0x2a0 > sp=a000000100733bb0 bsp=a00000010072d230 > [<a00000010008e720>] irq_exit+0x80/0xa0 > sp=a000000100733bb0 bsp=a00000010072d218 > [<a0000001003b45d0>] evtchn_do_upcall+0x170/0x260 > sp=a000000100733bb0 bsp=a00000010072d180 > [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0 > sp=a000000100733bb0 bsp=a00000010072d180 > [<e000000000000810>] 0xe000000000000810 > sp=a000000100733d80 bsp=a00000010072d130 > [<a000000100066150>] xen_pal_call_static+0xd0/0x100 > sp=a000000100733d80 bsp=a00000010072d110 > <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20 >in_atomic():1, irqs_disabled():0 > >Call Trace: > [<a00000010001c900>] show_stack+0x40/0xa0 > sp=a000000100733680 bsp=a00000010072d588 > [<a00000010001c990>] dump_stack+0x30/0x60 > sp=a000000100733850 bsp=a00000010072d570 > [<a00000010006d8e0>] __might_sleep+0x2a0/0x2c0 > sp=a000000100733850 bsp=a00000010072d548 > [<a0000001000bf7a0>] down_read+0x20/0x60 > sp=a000000100733850 bsp=a00000010072d528 > [<a0000001000a88a0>] blocking_notifier_call_chain+0x20/0x80 > sp=a000000100733850 bsp=a00000010072d4f0 > [<a000000100083470>] profile_task_exit+0x30/0x60 > sp=a000000100733850 bsp=a00000010072d4d0 > [<a000000100087580>] do_exit+0x40/0x1420 > sp=a000000100733850 bsp=a00000010072d478 > [<a0000001000416a0>] die+0x280/0x2a0 > sp=a000000100733870 bsp=a00000010072d430 > [<a000000100041710>] die_if_kernel+0x50/0x80 > sp=a000000100733890 bsp=a00000010072d400 > [<a0000001005de6e0>] ia64_bad_break+0x280/0x4a0 > sp=a000000100733890 bsp=a00000010072d3d0 > [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0 > sp=a000000100733940 bsp=a00000010072d3d0 > [<a000000200c80590>] net_rx_action+0x990/0x17a0 [netbk] > sp=a000000100733b10 bsp=a00000010072d330 > [<a00000010008f460>] tasklet_action+0x320/0x5e0 > sp=a000000100733bb0 bsp=a00000010072d308 > [<a00000010008e250>] __do_softirq+0x1f0/0x3a0 > sp=a000000100733bb0 bsp=a00000010072d290 > [<a00000010008e540>] do_softirq+0x140/0x2a0 > sp=a000000100733bb0 bsp=a00000010072d230 > [<a00000010008e720>] irq_exit+0x80/0xa0 > sp=a000000100733bb0 bsp=a00000010072d218 > [<a0000001003b45d0>] evtchn_do_upcall+0x170/0x260 > sp=a000000100733bb0 bsp=a00000010072d180 > [<a000000100065a00>] xen_leave_kernel+0x0/0x3b0 > sp=a000000100733bb0 bsp=a00000010072d180 > [<e000000000000810>] 0xe000000000000810 > sp=a000000100733d80 bsp=a00000010072d130 > [<a000000100066150>] xen_pal_call_static+0xd0/0x100 > sp=a000000100733d80 bsp=a00000010072d110 >Kernel panic - not syncing: Aiee, killing interrupt handler! _______________________________________________ Xen-ia64-devel mailing list Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-ia64-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |