Jeremy Fitzhardinge
2009-Jan-31 01:42 UTC
[Xen-devel] [PATCH 2/3] xen: make direct versions of irq_enable/disable/save/restore to common code
Now that x86-64 has directly accessible percpu variables, it can also implement the direct versions of these operations, which operate on a vcpu_info structure directly embedded in the percpu area. In fact, the 64-bit versions are more or less identical, and so can be shared. The only two differences are: 1. xen_restore_fl_direct takes its argument in eax on 32-bit, and rdi on 64-bit. Unfortunately it isn''t possible to directly refer to the 2nd lsb of rdi directly (as you can with %ah), so the code isn''t quite as dense. 2. check_events needs to variants to save different registers. Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com> --- arch/x86/xen/Makefile | 3 arch/x86/xen/xen-asm.S | 140 +++++++++++++++++++++++++++++++++++++++++++++ arch/x86/xen/xen-asm.h | 12 +++ arch/x86/xen/xen-asm_32.S | 113 ++++-------------------------------- arch/x86/xen/xen-asm_64.S | 136 +------------------------------------------ 5 files changed, 171 insertions(+), 233 deletions(-) ==================================================================--- a/arch/x86/xen/Makefile +++ b/arch/x86/xen/Makefile @@ -6,7 +6,8 @@ endif obj-y := enlighten.o setup.o multicalls.o mmu.o irq.o \ - time.o xen-asm_$(BITS).o grant-table.o suspend.o + time.o xen-asm.o xen-asm_$(BITS).o \ + grant-table.o suspend.o obj-$(CONFIG_SMP) += smp.o spinlock.o obj-$(CONFIG_XEN_DEBUG_FS) += debugfs.o \ No newline at end of file ==================================================================--- /dev/null +++ b/arch/x86/xen/xen-asm.S @@ -0,0 +1,140 @@ +/* + Asm versions of Xen pv-ops, suitable for either direct use or inlining. + The inline versions are the same as the direct-use versions, with the + pre- and post-amble chopped off. + + This code is encoded for size rather than absolute efficiency, + with a view to being able to inline as much as possible. + + We only bother with direct forms (ie, vcpu in percpu data) of + the operations here; the indirect forms are better handled in + C, since they''re generally too large to inline anyway. + */ + +#include <asm/asm-offsets.h> +#include <asm/percpu.h> +#include <asm/processor-flags.h> + +#include "xen-asm.h" + +/* + Enable events. This clears the event mask and tests the pending + event status with one and operation. If there are pending + events, then enter the hypervisor to get them handled. + */ +ENTRY(xen_irq_enable_direct) + /* Unmask events */ + movb $0, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask + + /* Preempt here doesn''t matter because that will deal with + any pending interrupts. The pending check may end up being + run on the wrong CPU, but that doesn''t hurt. */ + + /* Test for pending */ + testb $0xff, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_pending + jz 1f + +2: call check_events +1: +ENDPATCH(xen_irq_enable_direct) + ret + ENDPROC(xen_irq_enable_direct) + RELOC(xen_irq_enable_direct, 2b+1) + + +/* + Disabling events is simply a matter of making the event mask + non-zero. + */ +ENTRY(xen_irq_disable_direct) + movb $1, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask +ENDPATCH(xen_irq_disable_direct) + ret + ENDPROC(xen_irq_disable_direct) + RELOC(xen_irq_disable_direct, 0) + +/* + (xen_)save_fl is used to get the current interrupt enable status. + Callers expect the status to be in X86_EFLAGS_IF, and other bits + may be set in the return value. We take advantage of this by + making sure that X86_EFLAGS_IF has the right value (and other bits + in that byte are 0), but other bits in the return value are + undefined. We need to toggle the state of the bit, because + Xen and x86 use opposite senses (mask vs enable). + */ +ENTRY(xen_save_fl_direct) + testb $0xff, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask + setz %ah + addb %ah,%ah +ENDPATCH(xen_save_fl_direct) + ret + ENDPROC(xen_save_fl_direct) + RELOC(xen_save_fl_direct, 0) + + +/* + In principle the caller should be passing us a value return + from xen_save_fl_direct, but for robustness sake we test only + the X86_EFLAGS_IF flag rather than the whole byte. After + setting the interrupt mask state, it checks for unmasked + pending events and enters the hypervisor to get them delivered + if so. + */ +ENTRY(xen_restore_fl_direct) +#ifdef CONFIG_X86_64 + testw $X86_EFLAGS_IF, %di +#else + testb $X86_EFLAGS_IF>>8, %ah +#endif + setz PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask + /* Preempt here doesn''t matter because that will deal with + any pending interrupts. The pending check may end up being + run on the wrong CPU, but that doesn''t hurt. */ + + /* check for unmasked and pending */ + cmpw $0x0001, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_pending + jz 1f +2: call check_events +1: +ENDPATCH(xen_restore_fl_direct) + ret + ENDPROC(xen_restore_fl_direct) + RELOC(xen_restore_fl_direct, 2b+1) + + +/* + Force an event check by making a hypercall, + but preserve regs before making the call. + */ +check_events: +#ifdef CONFIG_X86_32 + push %eax + push %ecx + push %edx + call xen_force_evtchn_callback + pop %edx + pop %ecx + pop %eax +#else + push %rax + push %rcx + push %rdx + push %rsi + push %rdi + push %r8 + push %r9 + push %r10 + push %r11 + call xen_force_evtchn_callback + pop %r11 + pop %r10 + pop %r9 + pop %r8 + pop %rdi + pop %rsi + pop %rdx + pop %rcx + pop %rax +#endif + ret + ==================================================================--- /dev/null +++ b/arch/x86/xen/xen-asm.h @@ -0,0 +1,12 @@ +#ifndef _XEN_XEN_ASM_H +#define _XEN_XEN_ASM_H + +#include <linux/linkage.h> + +#define RELOC(x, v) .globl x##_reloc; x##_reloc=v +#define ENDPATCH(x) .globl x##_end; x##_end=. + +/* Pseudo-flag used for virtual NMI, which we don''t implement yet */ +#define XEN_EFLAGS_NMI 0x80000000 + +#endif ==================================================================--- a/arch/x86/xen/xen-asm_32.S +++ b/arch/x86/xen/xen-asm_32.S @@ -11,101 +11,28 @@ generally too large to inline anyway. */ -#include <linux/linkage.h> - -#include <asm/asm-offsets.h> +//#include <asm/asm-offsets.h> #include <asm/thread_info.h> -#include <asm/percpu.h> #include <asm/processor-flags.h> #include <asm/segment.h> #include <xen/interface/xen.h> -#define RELOC(x, v) .globl x##_reloc; x##_reloc=v -#define ENDPATCH(x) .globl x##_end; x##_end=. - -/* Pseudo-flag used for virtual NMI, which we don''t implement yet */ -#define XEN_EFLAGS_NMI 0x80000000 - +#include "xen-asm.h" + /* - Enable events. This clears the event mask and tests the pending - event status with one and operation. If there are pending - events, then enter the hypervisor to get them handled. + Force an event check by making a hypercall, + but preserve regs before making the call. */ -ENTRY(xen_irq_enable_direct) - /* Unmask events */ - movb $0, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_mask - - /* Preempt here doesn''t matter because that will deal with - any pending interrupts. The pending check may end up being - run on the wrong CPU, but that doesn''t hurt. */ - - /* Test for pending */ - testb $0xff, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_pending - jz 1f - -2: call check_events -1: -ENDPATCH(xen_irq_enable_direct) +check_events: + push %eax + push %ecx + push %edx + call xen_force_evtchn_callback + pop %edx + pop %ecx + pop %eax ret - ENDPROC(xen_irq_enable_direct) - RELOC(xen_irq_enable_direct, 2b+1) - - -/* - Disabling events is simply a matter of making the event mask - non-zero. - */ -ENTRY(xen_irq_disable_direct) - movb $1, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_mask -ENDPATCH(xen_irq_disable_direct) - ret - ENDPROC(xen_irq_disable_direct) - RELOC(xen_irq_disable_direct, 0) - -/* - (xen_)save_fl is used to get the current interrupt enable status. - Callers expect the status to be in X86_EFLAGS_IF, and other bits - may be set in the return value. We take advantage of this by - making sure that X86_EFLAGS_IF has the right value (and other bits - in that byte are 0), but other bits in the return value are - undefined. We need to toggle the state of the bit, because - Xen and x86 use opposite senses (mask vs enable). - */ -ENTRY(xen_save_fl_direct) - testb $0xff, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_mask - setz %ah - addb %ah,%ah -ENDPATCH(xen_save_fl_direct) - ret - ENDPROC(xen_save_fl_direct) - RELOC(xen_save_fl_direct, 0) - - -/* - In principle the caller should be passing us a value return - from xen_save_fl_direct, but for robustness sake we test only - the X86_EFLAGS_IF flag rather than the whole byte. After - setting the interrupt mask state, it checks for unmasked - pending events and enters the hypervisor to get them delivered - if so. - */ -ENTRY(xen_restore_fl_direct) - testb $X86_EFLAGS_IF>>8, %ah - setz PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_mask - /* Preempt here doesn''t matter because that will deal with - any pending interrupts. The pending check may end up being - run on the wrong CPU, but that doesn''t hurt. */ - - /* check for unmasked and pending */ - cmpw $0x0001, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_pending - jz 1f -2: call check_events -1: -ENDPATCH(xen_restore_fl_direct) - ret - ENDPROC(xen_restore_fl_direct) - RELOC(xen_restore_fl_direct, 2b+1) /* We can''t use sysexit directly, because we''re not running in ring0. @@ -289,17 +216,3 @@ lea 4(%edi),%esp /* point esp to new frame */ 2: jmp xen_do_upcall - -/* - Force an event check by making a hypercall, - but preserve regs before making the call. - */ -check_events: - push %eax - push %ecx - push %edx - call xen_force_evtchn_callback - pop %edx - pop %ecx - pop %eax - ret ==================================================================--- a/arch/x86/xen/xen-asm_64.S +++ b/arch/x86/xen/xen-asm_64.S @@ -11,143 +11,15 @@ generally too large to inline anyway. */ -#include <linux/linkage.h> - -#include <asm/asm-offsets.h> +#include <asm/errno.h> +#include <asm/percpu.h> #include <asm/processor-flags.h> -#include <asm/errno.h> #include <asm/segment.h> -#include <asm/percpu.h> #include <xen/interface/xen.h> -#define RELOC(x, v) .globl x##_reloc; x##_reloc=v -#define ENDPATCH(x) .globl x##_end; x##_end=. - -/* Pseudo-flag used for virtual NMI, which we don''t implement yet */ -#define XEN_EFLAGS_NMI 0x80000000 - -#if 1 -/* - FIXME: x86_64 now can support direct access to percpu variables - via a segment override. Update xen accordingly. - */ -#define BUG ud2a -#endif - -/* - Enable events. This clears the event mask and tests the pending - event status with one and operation. If there are pending - events, then enter the hypervisor to get them handled. - */ -ENTRY(xen_irq_enable_direct) - BUG - - /* Unmask events */ - movb $0, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask - - /* Preempt here doesn''t matter because that will deal with - any pending interrupts. The pending check may end up being - run on the wrong CPU, but that doesn''t hurt. */ - - /* Test for pending */ - testb $0xff, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_pending - jz 1f - -2: call check_events -1: -ENDPATCH(xen_irq_enable_direct) - ret - ENDPROC(xen_irq_enable_direct) - RELOC(xen_irq_enable_direct, 2b+1) - -/* - Disabling events is simply a matter of making the event mask - non-zero. - */ -ENTRY(xen_irq_disable_direct) - BUG - - movb $1, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask -ENDPATCH(xen_irq_disable_direct) - ret - ENDPROC(xen_irq_disable_direct) - RELOC(xen_irq_disable_direct, 0) - -/* - (xen_)save_fl is used to get the current interrupt enable status. - Callers expect the status to be in X86_EFLAGS_IF, and other bits - may be set in the return value. We take advantage of this by - making sure that X86_EFLAGS_IF has the right value (and other bits - in that byte are 0), but other bits in the return value are - undefined. We need to toggle the state of the bit, because - Xen and x86 use opposite senses (mask vs enable). - */ -ENTRY(xen_save_fl_direct) - BUG - - testb $0xff, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask - setz %ah - addb %ah,%ah -ENDPATCH(xen_save_fl_direct) - ret - ENDPROC(xen_save_fl_direct) - RELOC(xen_save_fl_direct, 0) - -/* - In principle the caller should be passing us a value return - from xen_save_fl_direct, but for robustness sake we test only - the X86_EFLAGS_IF flag rather than the whole byte. After - setting the interrupt mask state, it checks for unmasked - pending events and enters the hypervisor to get them delivered - if so. - */ -ENTRY(xen_restore_fl_direct) - BUG - - testb $X86_EFLAGS_IF>>8, %ah - setz PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask - /* Preempt here doesn''t matter because that will deal with - any pending interrupts. The pending check may end up being - run on the wrong CPU, but that doesn''t hurt. */ - - /* check for unmasked and pending */ - cmpw $0x0001, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_pending - jz 1f -2: call check_events -1: -ENDPATCH(xen_restore_fl_direct) - ret - ENDPROC(xen_restore_fl_direct) - RELOC(xen_restore_fl_direct, 2b+1) - - -/* - Force an event check by making a hypercall, - but preserve regs before making the call. - */ -check_events: - push %rax - push %rcx - push %rdx - push %rsi - push %rdi - push %r8 - push %r9 - push %r10 - push %r11 - call xen_force_evtchn_callback - pop %r11 - pop %r10 - pop %r9 - pop %r8 - pop %rdi - pop %rsi - pop %rdx - pop %rcx - pop %rax - ret - +#include "xen-asm.h" + ENTRY(xen_adjust_exception_frame) mov 8+0(%rsp),%rcx mov 8+8(%rsp),%r11 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Jeremy Fitzhardinge
2009-Feb-02 21:55 UTC
[Xen-devel] [PATCH 2/3] xen: make direct versions of irq_enable/disable/save/restore to common code
Now that x86-64 has directly accessible percpu variables, it can also implement the direct versions of these operations, which operate on a vcpu_info structure directly embedded in the percpu area. In fact, the 64-bit versions are more or less identical, and so can be shared. The only two differences are: 1. xen_restore_fl_direct takes its argument in eax on 32-bit, and rdi on 64-bit. Unfortunately it isn''t possible to directly refer to the 2nd lsb of rdi directly (as you can with %ah), so the code isn''t quite as dense. 2. check_events needs to variants to save different registers. Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com> --- arch/x86/xen/Makefile | 3 arch/x86/xen/xen-asm.S | 140 +++++++++++++++++++++++++++++++++++++++++++++ arch/x86/xen/xen-asm.h | 12 +++ arch/x86/xen/xen-asm_32.S | 113 ++++-------------------------------- arch/x86/xen/xen-asm_64.S | 136 +------------------------------------------ 5 files changed, 171 insertions(+), 233 deletions(-) ==================================================================--- a/arch/x86/xen/Makefile +++ b/arch/x86/xen/Makefile @@ -6,7 +6,8 @@ endif obj-y := enlighten.o setup.o multicalls.o mmu.o irq.o \ - time.o xen-asm_$(BITS).o grant-table.o suspend.o + time.o xen-asm.o xen-asm_$(BITS).o \ + grant-table.o suspend.o obj-$(CONFIG_SMP) += smp.o spinlock.o obj-$(CONFIG_XEN_DEBUG_FS) += debugfs.o \ No newline at end of file ==================================================================--- /dev/null +++ b/arch/x86/xen/xen-asm.S @@ -0,0 +1,140 @@ +/* + Asm versions of Xen pv-ops, suitable for either direct use or inlining. + The inline versions are the same as the direct-use versions, with the + pre- and post-amble chopped off. + + This code is encoded for size rather than absolute efficiency, + with a view to being able to inline as much as possible. + + We only bother with direct forms (ie, vcpu in percpu data) of + the operations here; the indirect forms are better handled in + C, since they''re generally too large to inline anyway. + */ + +#include <asm/asm-offsets.h> +#include <asm/percpu.h> +#include <asm/processor-flags.h> + +#include "xen-asm.h" + +/* + Enable events. This clears the event mask and tests the pending + event status with one and operation. If there are pending + events, then enter the hypervisor to get them handled. + */ +ENTRY(xen_irq_enable_direct) + /* Unmask events */ + movb $0, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask + + /* Preempt here doesn''t matter because that will deal with + any pending interrupts. The pending check may end up being + run on the wrong CPU, but that doesn''t hurt. */ + + /* Test for pending */ + testb $0xff, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_pending + jz 1f + +2: call check_events +1: +ENDPATCH(xen_irq_enable_direct) + ret + ENDPROC(xen_irq_enable_direct) + RELOC(xen_irq_enable_direct, 2b+1) + + +/* + Disabling events is simply a matter of making the event mask + non-zero. + */ +ENTRY(xen_irq_disable_direct) + movb $1, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask +ENDPATCH(xen_irq_disable_direct) + ret + ENDPROC(xen_irq_disable_direct) + RELOC(xen_irq_disable_direct, 0) + +/* + (xen_)save_fl is used to get the current interrupt enable status. + Callers expect the status to be in X86_EFLAGS_IF, and other bits + may be set in the return value. We take advantage of this by + making sure that X86_EFLAGS_IF has the right value (and other bits + in that byte are 0), but other bits in the return value are + undefined. We need to toggle the state of the bit, because + Xen and x86 use opposite senses (mask vs enable). + */ +ENTRY(xen_save_fl_direct) + testb $0xff, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask + setz %ah + addb %ah,%ah +ENDPATCH(xen_save_fl_direct) + ret + ENDPROC(xen_save_fl_direct) + RELOC(xen_save_fl_direct, 0) + + +/* + In principle the caller should be passing us a value return + from xen_save_fl_direct, but for robustness sake we test only + the X86_EFLAGS_IF flag rather than the whole byte. After + setting the interrupt mask state, it checks for unmasked + pending events and enters the hypervisor to get them delivered + if so. + */ +ENTRY(xen_restore_fl_direct) +#ifdef CONFIG_X86_64 + testw $X86_EFLAGS_IF, %di +#else + testb $X86_EFLAGS_IF>>8, %ah +#endif + setz PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask + /* Preempt here doesn''t matter because that will deal with + any pending interrupts. The pending check may end up being + run on the wrong CPU, but that doesn''t hurt. */ + + /* check for unmasked and pending */ + cmpw $0x0001, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_pending + jz 1f +2: call check_events +1: +ENDPATCH(xen_restore_fl_direct) + ret + ENDPROC(xen_restore_fl_direct) + RELOC(xen_restore_fl_direct, 2b+1) + + +/* + Force an event check by making a hypercall, + but preserve regs before making the call. + */ +check_events: +#ifdef CONFIG_X86_32 + push %eax + push %ecx + push %edx + call xen_force_evtchn_callback + pop %edx + pop %ecx + pop %eax +#else + push %rax + push %rcx + push %rdx + push %rsi + push %rdi + push %r8 + push %r9 + push %r10 + push %r11 + call xen_force_evtchn_callback + pop %r11 + pop %r10 + pop %r9 + pop %r8 + pop %rdi + pop %rsi + pop %rdx + pop %rcx + pop %rax +#endif + ret + ==================================================================--- /dev/null +++ b/arch/x86/xen/xen-asm.h @@ -0,0 +1,12 @@ +#ifndef _XEN_XEN_ASM_H +#define _XEN_XEN_ASM_H + +#include <linux/linkage.h> + +#define RELOC(x, v) .globl x##_reloc; x##_reloc=v +#define ENDPATCH(x) .globl x##_end; x##_end=. + +/* Pseudo-flag used for virtual NMI, which we don''t implement yet */ +#define XEN_EFLAGS_NMI 0x80000000 + +#endif ==================================================================--- a/arch/x86/xen/xen-asm_32.S +++ b/arch/x86/xen/xen-asm_32.S @@ -11,101 +11,28 @@ generally too large to inline anyway. */ -#include <linux/linkage.h> - -#include <asm/asm-offsets.h> +//#include <asm/asm-offsets.h> #include <asm/thread_info.h> -#include <asm/percpu.h> #include <asm/processor-flags.h> #include <asm/segment.h> #include <xen/interface/xen.h> -#define RELOC(x, v) .globl x##_reloc; x##_reloc=v -#define ENDPATCH(x) .globl x##_end; x##_end=. - -/* Pseudo-flag used for virtual NMI, which we don''t implement yet */ -#define XEN_EFLAGS_NMI 0x80000000 - +#include "xen-asm.h" + /* - Enable events. This clears the event mask and tests the pending - event status with one and operation. If there are pending - events, then enter the hypervisor to get them handled. + Force an event check by making a hypercall, + but preserve regs before making the call. */ -ENTRY(xen_irq_enable_direct) - /* Unmask events */ - movb $0, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_mask - - /* Preempt here doesn''t matter because that will deal with - any pending interrupts. The pending check may end up being - run on the wrong CPU, but that doesn''t hurt. */ - - /* Test for pending */ - testb $0xff, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_pending - jz 1f - -2: call check_events -1: -ENDPATCH(xen_irq_enable_direct) +check_events: + push %eax + push %ecx + push %edx + call xen_force_evtchn_callback + pop %edx + pop %ecx + pop %eax ret - ENDPROC(xen_irq_enable_direct) - RELOC(xen_irq_enable_direct, 2b+1) - - -/* - Disabling events is simply a matter of making the event mask - non-zero. - */ -ENTRY(xen_irq_disable_direct) - movb $1, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_mask -ENDPATCH(xen_irq_disable_direct) - ret - ENDPROC(xen_irq_disable_direct) - RELOC(xen_irq_disable_direct, 0) - -/* - (xen_)save_fl is used to get the current interrupt enable status. - Callers expect the status to be in X86_EFLAGS_IF, and other bits - may be set in the return value. We take advantage of this by - making sure that X86_EFLAGS_IF has the right value (and other bits - in that byte are 0), but other bits in the return value are - undefined. We need to toggle the state of the bit, because - Xen and x86 use opposite senses (mask vs enable). - */ -ENTRY(xen_save_fl_direct) - testb $0xff, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_mask - setz %ah - addb %ah,%ah -ENDPATCH(xen_save_fl_direct) - ret - ENDPROC(xen_save_fl_direct) - RELOC(xen_save_fl_direct, 0) - - -/* - In principle the caller should be passing us a value return - from xen_save_fl_direct, but for robustness sake we test only - the X86_EFLAGS_IF flag rather than the whole byte. After - setting the interrupt mask state, it checks for unmasked - pending events and enters the hypervisor to get them delivered - if so. - */ -ENTRY(xen_restore_fl_direct) - testb $X86_EFLAGS_IF>>8, %ah - setz PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_mask - /* Preempt here doesn''t matter because that will deal with - any pending interrupts. The pending check may end up being - run on the wrong CPU, but that doesn''t hurt. */ - - /* check for unmasked and pending */ - cmpw $0x0001, PER_CPU_VAR(xen_vcpu_info)+XEN_vcpu_info_pending - jz 1f -2: call check_events -1: -ENDPATCH(xen_restore_fl_direct) - ret - ENDPROC(xen_restore_fl_direct) - RELOC(xen_restore_fl_direct, 2b+1) /* We can''t use sysexit directly, because we''re not running in ring0. @@ -289,17 +216,3 @@ lea 4(%edi),%esp /* point esp to new frame */ 2: jmp xen_do_upcall - -/* - Force an event check by making a hypercall, - but preserve regs before making the call. - */ -check_events: - push %eax - push %ecx - push %edx - call xen_force_evtchn_callback - pop %edx - pop %ecx - pop %eax - ret ==================================================================--- a/arch/x86/xen/xen-asm_64.S +++ b/arch/x86/xen/xen-asm_64.S @@ -11,143 +11,15 @@ generally too large to inline anyway. */ -#include <linux/linkage.h> - -#include <asm/asm-offsets.h> +#include <asm/errno.h> +#include <asm/percpu.h> #include <asm/processor-flags.h> -#include <asm/errno.h> #include <asm/segment.h> -#include <asm/percpu.h> #include <xen/interface/xen.h> -#define RELOC(x, v) .globl x##_reloc; x##_reloc=v -#define ENDPATCH(x) .globl x##_end; x##_end=. - -/* Pseudo-flag used for virtual NMI, which we don''t implement yet */ -#define XEN_EFLAGS_NMI 0x80000000 - -#if 1 -/* - FIXME: x86_64 now can support direct access to percpu variables - via a segment override. Update xen accordingly. - */ -#define BUG ud2a -#endif - -/* - Enable events. This clears the event mask and tests the pending - event status with one and operation. If there are pending - events, then enter the hypervisor to get them handled. - */ -ENTRY(xen_irq_enable_direct) - BUG - - /* Unmask events */ - movb $0, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask - - /* Preempt here doesn''t matter because that will deal with - any pending interrupts. The pending check may end up being - run on the wrong CPU, but that doesn''t hurt. */ - - /* Test for pending */ - testb $0xff, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_pending - jz 1f - -2: call check_events -1: -ENDPATCH(xen_irq_enable_direct) - ret - ENDPROC(xen_irq_enable_direct) - RELOC(xen_irq_enable_direct, 2b+1) - -/* - Disabling events is simply a matter of making the event mask - non-zero. - */ -ENTRY(xen_irq_disable_direct) - BUG - - movb $1, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask -ENDPATCH(xen_irq_disable_direct) - ret - ENDPROC(xen_irq_disable_direct) - RELOC(xen_irq_disable_direct, 0) - -/* - (xen_)save_fl is used to get the current interrupt enable status. - Callers expect the status to be in X86_EFLAGS_IF, and other bits - may be set in the return value. We take advantage of this by - making sure that X86_EFLAGS_IF has the right value (and other bits - in that byte are 0), but other bits in the return value are - undefined. We need to toggle the state of the bit, because - Xen and x86 use opposite senses (mask vs enable). - */ -ENTRY(xen_save_fl_direct) - BUG - - testb $0xff, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask - setz %ah - addb %ah,%ah -ENDPATCH(xen_save_fl_direct) - ret - ENDPROC(xen_save_fl_direct) - RELOC(xen_save_fl_direct, 0) - -/* - In principle the caller should be passing us a value return - from xen_save_fl_direct, but for robustness sake we test only - the X86_EFLAGS_IF flag rather than the whole byte. After - setting the interrupt mask state, it checks for unmasked - pending events and enters the hypervisor to get them delivered - if so. - */ -ENTRY(xen_restore_fl_direct) - BUG - - testb $X86_EFLAGS_IF>>8, %ah - setz PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask - /* Preempt here doesn''t matter because that will deal with - any pending interrupts. The pending check may end up being - run on the wrong CPU, but that doesn''t hurt. */ - - /* check for unmasked and pending */ - cmpw $0x0001, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_pending - jz 1f -2: call check_events -1: -ENDPATCH(xen_restore_fl_direct) - ret - ENDPROC(xen_restore_fl_direct) - RELOC(xen_restore_fl_direct, 2b+1) - - -/* - Force an event check by making a hypercall, - but preserve regs before making the call. - */ -check_events: - push %rax - push %rcx - push %rdx - push %rsi - push %rdi - push %r8 - push %r9 - push %r10 - push %r11 - call xen_force_evtchn_callback - pop %r11 - pop %r10 - pop %r9 - pop %r8 - pop %rdi - pop %rsi - pop %rdx - pop %rcx - pop %rax - ret - +#include "xen-asm.h" + ENTRY(xen_adjust_exception_frame) mov 8+0(%rsp),%rcx mov 8+8(%rsp),%r11 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Ingo Molnar
2009-Feb-05 15:00 UTC
[Xen-devel] Re: [PATCH 2/3] xen: make direct versions of irq_enable/disable/save/restore to common code
* Tejun Heo <htejun@gmail.com> wrote:> Hello, > > Jeremy Fitzhardinge wrote: > > Now that x86-64 has directly accessible percpu variables, it can also > > implement the direct versions of these operations, which operate on a > > vcpu_info structure directly embedded in the percpu area. > > > > In fact, the 64-bit versions are more or less identical, and so can be > > shared. The only two differences are: > > 1. xen_restore_fl_direct takes its argument in eax on 32-bit, and rdi on > > 64-bit. > > Unfortunately it isn''t possible to directly refer to the 2nd lsb of > > rdi directly > > (as you can with %ah), so the code isn''t quite as dense. > > 2. check_events needs to variants to save different registers. > > > > Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com> > > --- > > arch/x86/xen/Makefile | 3 arch/x86/xen/xen-asm.S | 140 > > +++++++++++++++++++++++++++++++++++++++++++++ > > arch/x86/xen/xen-asm.h | 12 +++ > > arch/x86/xen/xen-asm_32.S | 113 ++++-------------------------------- > > arch/x86/xen/xen-asm_64.S | 136 > > +------------------------------------------ > > 5 files changed, 171 insertions(+), 233 deletions(-) > ... > > ==================================================================> > --- a/arch/x86/xen/xen-asm_32.S > > +++ b/arch/x86/xen/xen-asm_32.S > > @@ -11,101 +11,28 @@ > > generally too large to inline anyway. > > */ > > > > -#include <linux/linkage.h> > > - > > -#include <asm/asm-offsets.h> > > +//#include <asm/asm-offsets.h> > > Applied without the above addition of //btw., that''s still worth fixing, plus the comments styles could be standardized. And this should grow an extra space after the comma: lea 4(%edi),%esp /* point esp to new frame */ (there''s 5-6 similar instructions in that file with this problem - the rest is fine.) Ingo _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Boris Derzhavets
2009-Feb-05 15:24 UTC
[Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box
Console output stops with messages:- peth1 : no IPV6 routers present eth1 : no IPV6 routers present Press Ctrl+Alt+F2 and login :- # xm info host : ServerUbuntu release : 2.6.29-rc3-tip version : #8 SMP Thu Feb 5 09:15:44 EST 2009 machine : x86_64 nr_cpus : 2 nr_nodes : 1 cores_per_socket : 2 threads_per_core : 1 cpu_mhz : 3005 hw_caps : bfebfbff:20100800:00000000:00000140:0008e3fd:00000000:00000001:00000000 virt_caps : hvm total_memory : 8191 free_memory : 7035 node_to_cpu : node0:0-1 node_to_memory : node0:7035 xen_major : 3 xen_minor : 4 xen_extra : -unstable xen_caps : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64 xen_scheduler : credit xen_pagesize : 4096 platform_params : virt_start=0xffff800000000000 xen_changeset : Fri Jan 30 11:12:57 2009 +0900 19130:c8962b24fb50 cc_compiler : gcc version 4.3.2 (Ubuntu 4.3.2-1ubuntu11) cc_compile_by : root cc_compile_domain : cc_compile_date : Mon Feb 2 10:28:03 EST 2009 xend_config_format : 4 # xm dmesg __ __ _____ _ _ _ _ _ \ \/ /___ _ __ |___ /| || | _ _ _ __ ___| |_ __ _| |__ | | ___ \ // _ \ ''_ \ |_ \| || |_ __| | | | ''_ \/ __| __/ _` | ''_ \| |/ _ \ / \ __/ | | | ___) |__ _|__| |_| | | | \__ \ || (_| | |_) | | __/ /_/\_\___|_| |_| |____(_) |_| \__,_|_| |_|___/\__\__,_|_.__/|_|\___| (XEN) Xen version 3.4-unstable (root@) (gcc version 4.3.2 (Ubuntu 4.3.2-1ubuntu11) ) Mon Feb 2 10:28:03 EST 2009 (XEN) Latest ChangeSet: Fri Jan 30 11:12:57 2009 +0900 19130:c8962b24fb50 (XEN) Command line: dom0_mem=1024M (XEN) Video information: (XEN) VGA is text mode 80x25, font 8x16 (XEN) VBE/DDC methods: none; EDID transfer time: 0 seconds (XEN) EDID info not retrieved because no DDC retrieval method detected (XEN) Disc information: (XEN) Found 0 MBR signatures (XEN) Found 2 EDD information structures (XEN) Xen-e820 RAM map: (XEN) 0000000000000000 - 000000000009ec00 (usable) (XEN) 000000000009ec00 - 00000000000a0000 (reserved) (XEN) 00000000000e4000 - 0000000000100000 (reserved) (XEN) 0000000000100000 - 00000000cff80000 (usable) (XEN) 00000000cff80000 - 00000000cff8e000 (ACPI data) (XEN) 00000000cff8e000 - 00000000cffe0000 (ACPI NVS) (XEN) 00000000cffe0000 - 00000000d0000000 (reserved) (XEN) 00000000fee00000 - 00000000fee01000 (reserved) (XEN) 00000000ffe00000 - 0000000100000000 (reserved) (XEN) 0000000100000000 - 0000000230000000 (usable) (XEN) System RAM: 8191MB (8387704kB) (XEN) ACPI: RSDP 000FBB80, 0014 (r0 ACPIAM) (XEN) ACPI: RSDT CFF80000, 003C (r1 A_M_I_ OEMRSDT 10000730 MSFT 97) (XEN) ACPI: FACP CFF80200, 0084 (r2 A_M_I_ OEMFACP 10000730 MSFT 97) (XEN) ACPI: DSDT CFF805C0, 8E13 (r1 A0840 A0840001 1 INTL 20060113) (XEN) ACPI: FACS CFF8E000, 0040 (XEN) ACPI: APIC CFF80390, 006C (r1 A_M_I_ OEMAPIC 10000730 MSFT 97) (XEN) ACPI: MCFG CFF80400, 003C (r1 A_M_I_ OEMMCFG 10000730 MSFT 97) (XEN) ACPI: OEMB CFF8E040, 0081 (r1 A_M_I_ AMI_OEM 10000730 MSFT 97) (XEN) ACPI: HPET CFF893E0, 0038 (r1 A_M_I_ OEMHPET 10000730 MSFT 97) (XEN) ACPI: OSFR CFF89420, 00B0 (r1 A_M_I_ OEMOSFR 10000730 MSFT 97) (XEN) Domain heap initialised (XEN) Processor #0 7:7 APIC version 20 (XEN) Processor #1 7:7 APIC version 20 (XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-23 (XEN) Enabling APIC mode: Flat. Using 1 I/O APICs (XEN) Using scheduler: SMP Credit Scheduler (credit) (XEN) Detected 3005.623 MHz processor. (XEN) VMX: Supported advanced features: (XEN) - APIC MMIO access virtualisation (XEN) - APIC TPR shadow (XEN) - Virtual NMI (XEN) - MSR direct-access bitmap (XEN) HVM: VMX enabled (XEN) CPU0: Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz stepping 06 (XEN) Booting processor 1/1 eip 8c000 (XEN) CPU1: Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz stepping 06 (XEN) Total of 2 processors activated. (XEN) ENABLING IO-APIC IRQs (XEN) -> Using new ACK method (XEN) checking TSC synchronization across 2 CPUs: passed. (XEN) Platform timer is 14.318MHz HPET (XEN) Brought up 2 CPUs (XEN) I/O virtualisation disabled (XEN) *** LOADING DOMAIN 0 *** (XEN) Xen kernel: 64-bit, lsb, compat32 (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x200000 -> 0x8eaea0 (XEN) PHYSICAL MEMORY ARRANGEMENT: (XEN) Dom0 alloc.: 0000000210000000->0000000220000000 (196608 pages to be allocated) (XEN) VIRTUAL MEMORY ARRANGEMENT: (XEN) Loaded kernel: ffffffff80200000->ffffffff808eaea0 (XEN) Init. ramdisk: ffffffff808eb000->ffffffff8b8c5c00 (XEN) Phys-Mach map: ffffffff8b8c6000->ffffffff8bac6000 (XEN) Start info: ffffffff8bac6000->ffffffff8bac64b4 (XEN) Page tables: ffffffff8bac7000->ffffffff8bb28000 (XEN) Boot stack: ffffffff8bb28000->ffffffff8bb29000 (XEN) TOTAL: ffffffff80000000->ffffffff8bc00000 (XEN) ENTRY ADDRESS: ffffffff80766200 (XEN) Dom0 has maximum 2 VCPUs (XEN) Scrubbing Free RAM: .......................................................................done. (XEN) Xen trace buffers: disabled (XEN) Std. Loglevel: Errors and warnings (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) (XEN) Xen is relinquishing VGA console. (XEN) *** Serial input -> DOM0 (type ''CTRL-a'' three times to switch input to Xen) (XEN) Freed 128kB init memory. (XEN) ioapic_guest_write: apic=0, pin=2, old_irq=0, new_irq=-1 (XEN) ioapic_guest_write: old_entry=000009f0, new_entry=00010900 (XEN) ioapic_guest_write: Attempt to remove IO-APIC pin of in-use IRQ! (XEN) irq.c:877: dom0: pirq 2 or vector 152 already mapped (XEN) d0:v0: reserved bit in page table (ec=000D) (XEN) Pagetable walk from 00007f99ce64c000: (XEN) L4[0x0ff] = 00000001ef3bf067 00000000000387bf (XEN) L3[0x067] = 00000001ef3aa067 00000000000387aa (XEN) L2[0x073] = 00000001ef3c8067 00000000000387c8 (XEN) L1[0x04c] = fffff7fffffff237 ffffffffffffffff (XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e033:[<00007f99cf8915e5>] (XEN) RFLAGS: 0000000000010246 EM: 0 CONTEXT: pv guest (XEN) rax: 0000000000000000 rbx: 000000000250e1b0 rcx: 0000000000000000 (XEN) rdx: 00007f99ce64c000 rsi: 0000000000000000 rdi: 0000000000000000 (XEN) rbp: 0000000010000000 rsp: 00007fffdb09b4e0 r8: 000000000250e930 (XEN) r9: 7efefefefefefeff r10: 00007fffdb09b260 r11: 0000000000477f20 (XEN) r12: 000000000250e9e0 r13: 000000000250e170 r14: 00007fffdb09b508 (XEN) r15: 00000000024f78a0 cr0: 0000000080050033 cr4: 00000000000026f0 (XEN) cr3: 00000001ef38c000 cr2: 00007f99ce64c000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=00007fffdb09b4e0: (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 00007f99cf8976a0 00007f99ce64c000 000000000250e800 0000000000000000 (XEN) 0000000000000000 00000000024eced0 0000000000000000 0000000000000001 (XEN) 0000000000000000 000000000046a189 00007fffdb09b6f8 0000000ad2e912f2 (XEN) 00000000007e5800 00000000498af897 00000000024fded0 00007fffdb09b750 (XEN) 0000000000000000 0000000000432ab0 00000000007e5800 00000000007e57d0 (XEN) 00000000007e5728 0000000000433526 0000000000000001 00007fffdb09b5ec (XEN) 00007fffdb09b5e4 00007fffdb09b5e0 00007fffdb09b6f8 0000000a004314bb (XEN) 0000000100000000 0000000000572055 00007f99d0df75c8 0000000000572010 (XEN) 0000000000000000 0000000000432ab0 00007fffdb09b6f0 0000000000000000 (XEN) 0000000000000000 00007f99d0e06466 0000000000000000 00007fffdb09b6f8 (XEN) 0000000a00000000 00000000004332a0 0000000000572010 c020df530e6e6114 (XEN) 0000000000432ab0 00007fffdb09b6f0 0000000000000000 0000000000000000 (XEN) 3fdf6940620e6114 3f137e93c62c6114 0000000000000000 0000000000000000 (XEN) 0000000000000000 000000000000000a 00000000004332a0 0000000000572000 (XEN) 0000000000000000 0000000000000000 0000000000432ab0 0000000000432ad9 (XEN) 00007fffdb09b6e8 000000000000001c 000000000000000a 00007fffdb09beba (XEN) 00007fffdb09becb 00007fffdb09bece 00007fffdb09bed2 00007fffdb09bed9 (XEN) 00007fffdb09bedb 00007fffdb09bee1 00007fffdb09bef7 00007fffdb09bf01 (XEN) 00007fffdb09bf05 0000000000000000 00007fffdb09bf09 00007fffdb09bf14 (XEN) d0:v1: reserved bit in page table (ec=000D) (XEN) Pagetable walk from 00007fcf5052e000: (XEN) L4[0x0ff] = 000000021a5b7067 000000000000a5b7 (XEN) L3[0x13d] = 000000021a5b3067 000000000000a5b3 (XEN) L2[0x082] = 000000021a5dc067 000000000000a5dc (XEN) L1[0x12e] = fffff7fffffff237 ffffffffffffffff (XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]---- (XEN) CPU: 1 (XEN) RIP: e033:[<00007fcf517735e5>] (XEN) RFLAGS: 0000000000010246 EM: 0 CONTEXT: pv guest (XEN) rax: 0000000000000000 rbx: 00000000018b51b0 rcx: 0000000000000000 (XEN) rdx: 00007fcf5052e000 rsi: 0000000000000000 rdi: 0000000000000000 (XEN) rbp: 0000000010000000 rsp: 00007fff5cf7ba00 r8: 00000000018b5930 (XEN) r9: 7efefefefefefeff r10: 00007fff5cf7b780 r11: 0000000000477f20 (XEN) r12: 00000000018b59e0 r13: 00000000018b5170 r14: 00007fff5cf7ba28 (XEN) r15: 000000000189e8a0 cr0: 0000000080050033 cr4: 00000000000026f0 (XEN) cr3: 000000021a5b8000 cr2: 00007fcf5052e000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=00007fff5cf7ba00: (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 00007fcf517796a0 00007fcf5052e000 00000000018b5800 0000000000000000 (XEN) 0000000000000000 0000000001893ed0 0000000000000000 0000000000000001 (XEN) 0000000000000000 000000000046a189 00007fff5cf7bc18 0000000a54d732f2 (XEN) 00000000007e5800 00000000498af89b 00000000018a4ed0 00007fff5cf7bc70 (XEN) 0000000000000000 0000000000432ab0 00000000007e5800 00000000007e57d0 (XEN) 00000000007e5728 0000000000433526 0000000000000001 00007fff5cf7bb0c (XEN) 00007fff5cf7bb04 00007fff5cf7bb00 00007fff5cf7bc18 0000000a004314bb (XEN) 0000000100000000 0000000000572055 00007fcf52cd95c8 0000000000572010 (XEN) 0000000000000000 0000000000432ab0 00007fff5cf7bc10 0000000000000000 (XEN) 0000000000000000 00007fcf52ce8466 0000000000000000 00007fff5cf7bc18 (XEN) 0000000a00000000 00000000004332a0 0000000000572010 c02607e04952a172 (XEN) 0000000000432ab0 00007fff5cf7bc10 0000000000000000 0000000000000000 (XEN) 3fd8be0f3ff2a172 3fb8a27d4110a172 0000000000000000 0000000000000000 (XEN) 0000000000000000 000000000000000a 00000000004332a0 0000000000572000 (XEN) 0000000000000000 0000000000000000 0000000000432ab0 0000000000432ad9 (XEN) 00007fff5cf7bc08 000000000000001c 000000000000000a 00007fff5cf7ceba (XEN) 00007fff5cf7cecb 00007fff5cf7cece 00007fff5cf7ced2 00007fff5cf7ced9 (XEN) 00007fff5cf7cedb 00007fff5cf7cee1 00007fff5cf7cef7 00007fff5cf7cf01 (XEN) 00007fff5cf7cf05 0000000000000000 00007fff5cf7cf09 00007fff5cf7cf14 (XEN) d0:v0: reserved bit in page table (ec=000D) (XEN) Pagetable walk from 00007f1bc2a40000: (XEN) L4[0x0fe] = 00000001ec765067 000000000003b365 (XEN) L3[0x06f] = 00000001f3a17067 0000000000033e17 (XEN) L2[0x015] = 00000001ee10e067 000000000003990e (XEN) L1[0x040] = fffff7fffffff237 ffffffffffffffff (XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e033:[<00007f1bc3c855e5>] (XEN) RFLAGS: 0000000000010246 EM: 0 CONTEXT: pv guest (XEN) rax: 0000000000000000 rbx: 0000000000c421b0 rcx: 0000000000000000 (XEN) rdx: 00007f1bc2a40000 rsi: 0000000000000000 rdi: 0000000000000000 (XEN) rbp: 0000000010000000 rsp: 00007fffcf48ef10 r8: 0000000000c42930 (XEN) r9: 7efefefefefefeff r10: 00007fffcf48ec90 r11: 0000000000477f20 (XEN) r12: 0000000000c429e0 r13: 0000000000c42170 r14: 00007fffcf48ef38 (XEN) r15: 0000000000c2b8a0 cr0: 0000000080050033 cr4: 00000000000026f0 (XEN) cr3: 00000001edc5a000 cr2: 00007f1bc2a40000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=00007fffcf48ef10: (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 00007f1bc3c8b6a0 00007f1bc2a40000 0000000000c42800 0000000000000000 (XEN) 0000000000000000 0000000000c20ed0 0000000000000000 0000000000000001 (XEN) 0000000000000000 000000000046a189 00007fffcf48f128 0000000ac72852f2 (XEN) 00000000007e5800 00000000498af8a0 0000000000c31ed0 00007fffcf48f180 (XEN) 0000000000000000 0000000000432ab0 00000000007e5800 00000000007e57d0 (XEN) 00000000007e5728 0000000000433526 0000000000000001 00007fffcf48f01c (XEN) 00007fffcf48f014 00007fffcf48f010 00007fffcf48f128 0000000a004314bb (XEN) 0000000100000000 0000000000572055 00007f1bc51eb5c8 0000000000572010 (XEN) 0000000000000000 0000000000432ab0 00007fffcf48f120 0000000000000000 (XEN) 0000000000000000 00007f1bc51fa466 0000000000000000 00007fffcf48f128 (XEN) 0000000a00000000 00000000004332a0 0000000000572010 c02d59cc73036600 (XEN) 0000000000432ab0 00007fffcf48f120 0000000000000000 0000000000000000 (XEN) 3fd2c75d93c36600 3e1ad3f33b416600 0000000000000000 0000000000000000 (XEN) 0000000000000000 000000000000000a 00000000004332a0 0000000000572000 (XEN) 0000000000000000 0000000000000000 0000000000432ab0 0000000000432ad9 (XEN) 00007fffcf48f118 000000000000001c 000000000000000a 00007fffcf48feba (XEN) 00007fffcf48fecb 00007fffcf48fece 00007fffcf48fed2 00007fffcf48fed9 (XEN) 00007fffcf48fedb 00007fffcf48fee1 00007fffcf48fef7 00007fffcf48ff01 (XEN) 00007fffcf48ff05 0000000000000000 00007fffcf48ff09 00007fffcf48ff14 # df -h works fine. SATA drive attached to Intel ICH9R (AHCI) detected at boot up Regardless ifconfig and "brctl show" reports seem to be good. Local IP obtained via dhcp is 192.168.1.34 and /etc/init.d/networking restart seems to release old IP and obtain new one pretty soon . Xen Host is uncreachable on the LAN. Attempt to ping 192.168.1.1 (ADSL Modem) fails with message :- No IPV6 router present and vice-versa i cannot ping Xen Host from the LAN. Attempt to run:- # startx obviosly fails. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Ingo Molnar
2009-Feb-05 16:57 UTC
[Xen-devel] Re: [PATCH] x86: style fascism for xen assemblies
* Tejun Heo <htejun@gmail.com> wrote:> Impact: style cleanup > > Make the following sytle cleanups. > > * drop unnecessary //#include from xen-asm_32.S > * compulsive adding of space after comma > * reformat multiline comments > > Signed-off-by: Tejun Heo <tj@kernel.org> > --- > Committed to #tj-upstream. Please pull from > > git://git.kernel.org/pub/scm/linux/kernel/git/tj/misc.git tj-percpu > > to receive the modpost fix and this one.pulled, thanks Tejun. (I have amended the cleanups - there was a typo in the changelog and a few places were missing.) Ingo _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Boris Derzhavets
2009-Feb-05 17:13 UTC
Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box
Due to ZYXEL P 660 RT2 is not IPV6 router i''ve tried to disable IPV6 on Ubuntu 8.10 Server. 1. Via blacklist 2. Just rebuilding kernel (worst option) and IPV6 got disabled either way i choosed. During the session i do can obtain new IP via # /etc/networking restart report goes to screen nicely. Four DHCP commands as usual However Dom0 doesn''t really get on the LAN. It keeps stay unpingable in both directions --- On Thu, 2/5/09, Boris Derzhavets <bderzhavets@yahoo.com> wrote: From: Boris Derzhavets <bderzhavets@yahoo.com> Subject: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box To: "Jeremy Fitzhardinge" <jeremy@goop.org> Cc: "Xen-devel" <xen-devel@lists.xensource.com> Date: Thursday, February 5, 2009, 10:24 AM Console output stops with messages:- peth1 : no IPV6 routers present eth1 : no IPV6 routers present Press Ctrl+Alt+F2 and login :- # xm info host : ServerUbuntu release : 2.6.29-rc3-tip version : #8 SMP Thu Feb 5 09:15:44 EST 2009 machine : x86_64 nr_cpus : 2 nr_nodes : 1 cores_per_socket : 2 threads_per_core : 1 cpu_mhz : 3005 hw_caps : bfebfbff:20100800:00000000:00000140:0008e3fd:00000000:00000001:00000000 virt_caps : hvm total_memory : 8191 free_memory : 7035 node_to_cpu : node0:0-1 node_to_memory : node0:7035 xen_major : 3 xen_minor : 4 xen_extra : -unstable xen_caps : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64 xen_scheduler : credit xen_pagesize : 4096 platform_params : virt_start=0xffff800000000000 xen_changeset : Fri Jan 30 11:12:57 2009 +0900 19130:c8962b24fb50 cc_compiler : gcc version 4.3.2 (Ubuntu 4.3.2-1ubuntu11) cc_compile_by : root cc_compile_domain : cc_compile_date : Mon Feb 2 10:28:03 EST 2009 xend_config_format : 4 # xm dmesg __ __ _____ _ _ _ _ _ \ \/ /___ _ __ |___ /| || | _ _ _ __ ___| |_ __ _| |__ | | ___ \ // _ \ ''_ \ |_ \| || |_ __| | | | ''_ \/ __| __/ _` | ''_ \| |/ _ \ / \ __/ | | | ___) |__ _|__| |_| | | | \__ \ || (_| | |_) | | __/ /_/\_\___|_| |_| |____(_) |_| \__,_|_| |_|___/\__\__,_|_.__/|_|\___| (XEN) Xen version 3.4-unstable (root@) (gcc version 4.3.2 (Ubuntu 4.3.2-1ubuntu11) ) Mon Feb 2 10:28:03 EST 2009 (XEN) Latest ChangeSet: Fri Jan 30 11:12:57 2009 +0900 19130:c8962b24fb50 (XEN) Command line: dom0_mem=1024M (XEN) Video information: (XEN) VGA is text mode 80x25, font 8x16 (XEN) VBE/DDC methods: none; EDID transfer time: 0 seconds (XEN) EDID info not retrieved because no DDC retrieval method detected (XEN) Disc information: (XEN) Found 0 MBR signatures (XEN) Found 2 EDD information structures (XEN) Xen-e820 RAM map: (XEN) 0000000000000000 - 000000000009ec00 (usable) (XEN) 000000000009ec00 - 00000000000a0000 (reserved) (XEN) 00000000000e4000 - 0000000000100000 (reserved) (XEN) 0000000000100000 - 00000000cff80000 (usable) (XEN) 00000000cff80000 - 00000000cff8e000 (ACPI data) (XEN) 00000000cff8e000 - 00000000cffe0000 (ACPI NVS) (XEN) 00000000cffe0000 - 00000000d0000000 (reserved) (XEN) 00000000fee00000 - 00000000fee01000 (reserved) (XEN) 00000000ffe00000 - 0000000100000000 (reserved) (XEN) 0000000100000000 - 0000000230000000 (usable) (XEN) System RAM: 8191MB (8387704kB) (XEN) ACPI: RSDP 000FBB80, 0014 (r0 ACPIAM) (XEN) ACPI: RSDT CFF80000, 003C (r1 A_M_I_ OEMRSDT 10000730 MSFT 97) (XEN) ACPI: FACP CFF80200, 0084 (r2 A_M_I_ OEMFACP 10000730 MSFT 97) (XEN) ACPI: DSDT CFF805C0, 8E13 (r1 A0840 A0840001 1 INTL 20060113) (XEN) ACPI: FACS CFF8E000, 0040 (XEN) ACPI: APIC CFF80390, 006C (r1 A_M_I_ OEMAPIC 10000730 MSFT 97) (XEN) ACPI: MCFG CFF80400, 003C (r1 A_M_I_ OEMMCFG 10000730 MSFT 97) (XEN) ACPI: OEMB CFF8E040, 0081 (r1 A_M_I_ AMI_OEM 10000730 MSFT 97) (XEN) ACPI: HPET CFF893E0, 0038 (r1 A_M_I_ OEMHPET 10000730 MSFT 97) (XEN) ACPI: OSFR CFF89420, 00B0 (r1 A_M_I_ OEMOSFR 10000730 MSFT 97) (XEN) Domain heap initialised (XEN) Processor #0 7:7 APIC version 20 (XEN) Processor #1 7:7 APIC version 20 (XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-23 (XEN) Enabling APIC mode: Flat. Using 1 I/O APICs (XEN) Using scheduler: SMP Credit Scheduler (credit) (XEN) Detected 3005.623 MHz processor. (XEN) VMX: Supported advanced features: (XEN) - APIC MMIO access virtualisation (XEN) - APIC TPR shadow (XEN) - Virtual NMI (XEN) - MSR direct-access bitmap (XEN) HVM: VMX enabled (XEN) CPU0: Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz stepping 06 (XEN) Booting processor 1/1 eip 8c000 (XEN) CPU1: Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz stepping 06 (XEN) Total of 2 processors activated. (XEN) ENABLING IO-APIC IRQs (XEN) -> Using new ACK method (XEN) checking TSC synchronization across 2 CPUs: passed. (XEN) Platform timer is 14.318MHz HPET (XEN) Brought up 2 CPUs (XEN) I/O virtualisation disabled (XEN) *** LOADING DOMAIN 0 *** (XEN) Xen kernel: 64-bit, lsb, compat32 (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x200000 -> 0x8eaea0 (XEN) PHYSICAL MEMORY ARRANGEMENT: (XEN) Dom0 alloc.: 0000000210000000->0000000220000000 (196608 pages to be allocated) (XEN) VIRTUAL MEMORY ARRANGEMENT: (XEN) Loaded kernel: ffffffff80200000->ffffffff808eaea0 (XEN) Init. ramdisk: ffffffff808eb000->ffffffff8b8c5c00 (XEN) Phys-Mach map: ffffffff8b8c6000->ffffffff8bac6000 (XEN) Start info: ffffffff8bac6000->ffffffff8bac64b4 (XEN) Page tables: ffffffff8bac7000->ffffffff8bb28000 (XEN) Boot stack: ffffffff8bb28000->ffffffff8bb29000 (XEN) TOTAL: ffffffff80000000->ffffffff8bc00000 (XEN) ENTRY ADDRESS: ffffffff80766200 (XEN) Dom0 has maximum 2 VCPUs (XEN) Scrubbing Free RAM: .......................................................................done. (XEN) Xen trace buffers: disabled (XEN) Std. Loglevel: Errors and warnings (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) (XEN) Xen is relinquishing VGA console. (XEN) *** Serial input -> DOM0 (type ''CTRL-a'' three times to switch input to Xen) (XEN) Freed 128kB init memory. (XEN) ioapic_guest_write: apic=0, pin=2, old_irq=0, new_irq=-1 (XEN) ioapic_guest_write: old_entry=000009f0, new_entry=00010900 (XEN) ioapic_guest_write: Attempt to remove IO-APIC pin of in-use IRQ! (XEN) irq.c:877: dom0: pirq 2 or vector 152 already mapped (XEN) d0:v0: reserved bit in page table (ec=000D) (XEN) Pagetable walk from 00007f99ce64c000: (XEN) L4[0x0ff] = 00000001ef3bf067 00000000000387bf (XEN) L3[0x067] = 00000001ef3aa067 00000000000387aa (XEN) L2[0x073] = 00000001ef3c8067 00000000000387c8 (XEN) L1[0x04c] = fffff7fffffff237 ffffffffffffffff (XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e033:[<00007f99cf8915e5>] (XEN) RFLAGS: 0000000000010246 EM: 0 CONTEXT: pv guest (XEN) rax: 0000000000000000 rbx: 000000000250e1b0 rcx: 0000000000000000 (XEN) rdx: 00007f99ce64c000 rsi: 0000000000000000 rdi: 0000000000000000 (XEN) rbp: 0000000010000000 rsp: 00007fffdb09b4e0 r8: 000000000250e930 (XEN) r9: 7efefefefefefeff r10: 00007fffdb09b260 r11: 0000000000477f20 (XEN) r12: 000000000250e9e0 r13: 000000000250e170 r14: 00007fffdb09b508 (XEN) r15: 00000000024f78a0 cr0: 0000000080050033 cr4: 00000000000026f0 (XEN) cr3: 00000001ef38c000 cr2: 00007f99ce64c000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=00007fffdb09b4e0: (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 00007f99cf8976a0 00007f99ce64c000 000000000250e800 0000000000000000 (XEN) 0000000000000000 00000000024eced0 0000000000000000 0000000000000001 (XEN) 0000000000000000 000000000046a189 00007fffdb09b6f8 0000000ad2e912f2 (XEN) 00000000007e5800 00000000498af897 00000000024fded0 00007fffdb09b750 (XEN) 0000000000000000 0000000000432ab0 00000000007e5800 00000000007e57d0 (XEN) 00000000007e5728 0000000000433526 0000000000000001 00007fffdb09b5ec (XEN) 00007fffdb09b5e4 00007fffdb09b5e0 00007fffdb09b6f8 0000000a004314bb (XEN) 0000000100000000 0000000000572055 00007f99d0df75c8 0000000000572010 (XEN) 0000000000000000 0000000000432ab0 00007fffdb09b6f0 0000000000000000 (XEN) 0000000000000000 00007f99d0e06466 0000000000000000 00007fffdb09b6f8 (XEN) 0000000a00000000 00000000004332a0 0000000000572010 c020df530e6e6114 (XEN) 0000000000432ab0 00007fffdb09b6f0 0000000000000000 0000000000000000 (XEN) 3fdf6940620e6114 3f137e93c62c6114 0000000000000000 0000000000000000 (XEN) 0000000000000000 000000000000000a 00000000004332a0 0000000000572000 (XEN) 0000000000000000 0000000000000000 0000000000432ab0 0000000000432ad9 (XEN) 00007fffdb09b6e8 000000000000001c 000000000000000a 00007fffdb09beba (XEN) 00007fffdb09becb 00007fffdb09bece 00007fffdb09bed2 00007fffdb09bed9 (XEN) 00007fffdb09bedb 00007fffdb09bee1 00007fffdb09bef7 00007fffdb09bf01 (XEN) 00007fffdb09bf05 0000000000000000 00007fffdb09bf09 00007fffdb09bf14 (XEN) d0:v1: reserved bit in page table (ec=000D) (XEN) Pagetable walk from 00007fcf5052e000: (XEN) L4[0x0ff] = 000000021a5b7067 000000000000a5b7 (XEN) L3[0x13d] = 000000021a5b3067 000000000000a5b3 (XEN) L2[0x082] = 000000021a5dc067 000000000000a5dc (XEN) L1[0x12e] = fffff7fffffff237 ffffffffffffffff (XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]---- (XEN) CPU: 1 (XEN) RIP: e033:[<00007fcf517735e5>] (XEN) RFLAGS: 0000000000010246 EM: 0 CONTEXT: pv guest (XEN) rax: 0000000000000000 rbx: 00000000018b51b0 rcx: 0000000000000000 (XEN) rdx: 00007fcf5052e000 rsi: 0000000000000000 rdi: 0000000000000000 (XEN) rbp: 0000000010000000 rsp: 00007fff5cf7ba00 r8: 00000000018b5930 (XEN) r9: 7efefefefefefeff r10: 00007fff5cf7b780 r11: 0000000000477f20 (XEN) r12: 00000000018b59e0 r13: 00000000018b5170 r14: 00007fff5cf7ba28 (XEN) r15: 000000000189e8a0 cr0: 0000000080050033 cr4: 00000000000026f0 (XEN) cr3: 000000021a5b8000 cr2: 00007fcf5052e000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=00007fff5cf7ba00: (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 00007fcf517796a0 00007fcf5052e000 00000000018b5800 0000000000000000 (XEN) 0000000000000000 0000000001893ed0 0000000000000000 0000000000000001 (XEN) 0000000000000000 000000000046a189 00007fff5cf7bc18 0000000a54d732f2 (XEN) 00000000007e5800 00000000498af89b 00000000018a4ed0 00007fff5cf7bc70 (XEN) 0000000000000000 0000000000432ab0 00000000007e5800 00000000007e57d0 (XEN) 00000000007e5728 0000000000433526 0000000000000001 00007fff5cf7bb0c (XEN) 00007fff5cf7bb04 00007fff5cf7bb00 00007fff5cf7bc18 0000000a004314bb (XEN) 0000000100000000 0000000000572055 00007fcf52cd95c8 0000000000572010 (XEN) 0000000000000000 0000000000432ab0 00007fff5cf7bc10 0000000000000000 (XEN) 0000000000000000 00007fcf52ce8466 0000000000000000 00007fff5cf7bc18 (XEN) 0000000a00000000 00000000004332a0 0000000000572010 c02607e04952a172 (XEN) 0000000000432ab0 00007fff5cf7bc10 0000000000000000 0000000000000000 (XEN) 3fd8be0f3ff2a172 3fb8a27d4110a172 0000000000000000 0000000000000000 (XEN) 0000000000000000 000000000000000a 00000000004332a0 0000000000572000 (XEN) 0000000000000000 0000000000000000 0000000000432ab0 0000000000432ad9 (XEN) 00007fff5cf7bc08 000000000000001c 000000000000000a 00007fff5cf7ceba (XEN) 00007fff5cf7cecb 00007fff5cf7cece 00007fff5cf7ced2 00007fff5cf7ced9 (XEN) 00007fff5cf7cedb 00007fff5cf7cee1 00007fff5cf7cef7 00007fff5cf7cf01 (XEN) 00007fff5cf7cf05 0000000000000000 00007fff5cf7cf09 00007fff5cf7cf14 (XEN) d0:v0: reserved bit in page table (ec=000D) (XEN) Pagetable walk from 00007f1bc2a40000: (XEN) L4[0x0fe] = 00000001ec765067 000000000003b365 (XEN) L3[0x06f] 00000001f3a17067 0000000000033e17 (XEN) L2[0x015] = 00000001ee10e067 000000000003990e (XEN) L1[0x040] = fffff7fffffff237 ffffffffffffffff (XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e033:[<00007f1bc3c855e5>] (XEN) RFLAGS: 0000000000010246 EM: 0 CONTEXT: pv guest (XEN) rax: 0000000000000000 rbx: 0000000000c421b0 rcx: 0000000000000000 (XEN) rdx: 00007f1bc2a40000 rsi: 0000000000000000 rdi: 0000000000000000 (XEN) rbp: 0000000010000000 rsp: 00007fffcf48ef10 r8: 0000000000c42930 (XEN) r9: 7efefefefefefeff r10: 00007fffcf48ec90 r11: 0000000000477f20 (XEN) r12: 0000000000c429e0 r13: 0000000000c42170 r14: 00007fffcf48ef38 (XEN) r15: 0000000000c2b8a0 cr0: 0000000080050033 cr4: 00000000000026f0 (XEN) cr3: 00000001edc5a000 cr2: 00007f1bc2a40000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=00007fffcf48ef10: (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 00007f1bc3c8b6a0 00007f1bc2a40000 0000000000c42800 0000000000000000 (XEN) 0000000000000000 0000000000c20ed0 0000000000000000 0000000000000001 (XEN) 0000000000000000 000000000046a189 00007fffcf48f128 0000000ac72852f2 (XEN) 00000000007e5800 00000000498af8a0 0000000000c31ed0 00007fffcf48f180 (XEN) 0000000000000000 0000000000432ab0 00000000007e5800 00000000007e57d0 (XEN) 00000000007e5728 0000000000433526 0000000000000001 00007fffcf48f01c (XEN) 00007fffcf48f014 00007fffcf48f010 00007fffcf48f128 0000000a004314bb (XEN) 0000000100000000 0000000000572055 00007f1bc51eb5c8 0000000000572010 (XEN) 0000000000000000 0000000000432ab0 00007fffcf48f120 0000000000000000 (XEN) 0000000000000000 00007f1bc51fa466 0000000000000000 00007fffcf48f128 (XEN) 0000000a00000000 00000000004332a0 0000000000572010 c02d59cc73036600 (XEN) 0000000000432ab0 00007fffcf48f120 0000000000000000 0000000000000000 (XEN) 3fd2c75d93c36600 3e1ad3f33b416600 0000000000000000 0000000000000000 (XEN) 0000000000000000 000000000000000a 00000000004332a0 0000000000572000 (XEN) 0000000000000000 0000000000000000 0000000000432ab0 0000000000432ad9 (XEN) 00007fffcf48f118 000000000000001c 000000000000000a 00007fffcf48feba (XEN) 00007fffcf48fecb 00007fffcf48fece 00007fffcf48fed2 00007fffcf48fed9 (XEN) 00007fffcf48fedb 00007fffcf48fee1 00007fffcf48fef7 00007fffcf48ff01 (XEN) 00007fffcf48ff05 0000000000000000 00007fffcf48ff09 00007fffcf48ff14 # df -h works fine. SATA drive attached to Intel ICH9R (AHCI) detected at boot up Regardless ifconfig and "brctl show" reports seem to be good. Local IP obtained via dhcp is 192.168.1.34 and /etc/init.d/networking restart seems to release old IP and obtain new one pretty soon . Xen Host is uncreachable on the LAN. Attempt to ping 192.168.1.1 (ADSL Modem) fails with message :- No IPV6 router present and vice-versa i cannot ping Xen Host from the LAN. Attempt to run:- # startx obviosly fails. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Jeremy Fitzhardinge
2009-Feb-05 17:31 UTC
[Xen-devel] Re: [PATCH] x86: style fascism for xen assemblies
Tejun Heo wrote:> Impact: style cleanup > > Make the following sytle cleanups. > > * drop unnecessary //#include from xen-asm_32.S >Fine.> * compulsive adding of space after comma >Fine.> * reformat multiline comments >I don''t really like what you''ve done here. There are two problems: * If you''re going to convert comments of the form /* This is a small comment which happens to be longer than a line. */ then you should convert it to full winged-style, rather than just sticking ''*'' on the front of the second line. * All the big block comments look crowded and cramped now, which makes them harder to read and maintain. All those ''*''s are just visual noise. (They make a bit more sense in C code to distinguish comment from code, but asm code looks so different from comment that they''re not necessary here.) But Ingo''s already pulled it, so I guess I''m stuck with it. J _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Ingo Molnar
2009-Feb-05 17:34 UTC
[Xen-devel] Re: [PATCH] x86: style fascism for xen assemblies
* Jeremy Fitzhardinge <jeremy@goop.org> wrote:> Tejun Heo wrote: >> Impact: style cleanup >> >> Make the following sytle cleanups. >> >> * drop unnecessary //#include from xen-asm_32.S >> > Fine. >> * compulsive adding of space after comma >> > Fine. >> * reformat multiline comments >> > > I don''t really like what you''ve done here. There are two problems: > > * If you''re going to convert comments of the form > > /* This is a small comment which > happens to be longer than a line. */ > > > then you should convert it to full winged-style, rather than just > sticking ''*'' on the front of the second line. > * All the big block comments look crowded and cramped now, which > makes them harder to read and maintain. All those ''*''s are just > visual noise. (They make a bit more sense in C code to distinguish > comment from code, but asm code looks so different from comment > that they''re not necessary here.) > > But Ingo''s already pulled it, so I guess I''m stuck with it.i pulled it and i already fixed all the proper winged style comments as well. Could you double-check the end result please? Ingo _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Boris Derzhavets
2009-Feb-06 06:31 UTC
Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box
Build 2.6.29-rc3 with the most recent change set and load under Xen Unstable Logged into Dom0. Was able to load F10 PV DomU via prepared image. DomU obtained IP (192.168.1.38) via DHCP . Opened ssh connection to Dom0 192.168.1.34 (Ubuntu 8.10 Server) LAN is still unavailable for both DomU & Dom0. --- On Thu, 2/5/09, Boris Derzhavets <bderzhavets@yahoo.com> wrote: From: Boris Derzhavets <bderzhavets@yahoo.com> Subject: Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box To: "Jeremy Fitzhardinge" <jeremy@goop.org> Cc: "Xen-devel" <xen-devel@lists.xensource.com> Date: Thursday, February 5, 2009, 12:13 PM Due to ZYXEL P 660 RT2 is not IPV6 router i''ve tried to disable IPV6 on Ubuntu 8.10 Server. 1. Via blacklist 2. Just rebuilding kernel (worst option) and IPV6 got disabled either way i choosed. During the session i do can obtain new IP via # /etc/networking restart report goes to screen nicely. Four DHCP commands as usual However Dom0 doesn''t really get on the LAN. It keeps stay unpingable in both directions --- On Thu, 2/5/09, Boris Derzhavets <bderzhavets@yahoo.com> wrote: From: Boris Derzhavets <bderzhavets@yahoo.com> Subject: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box To: "Jeremy Fitzhardinge" <jeremy@goop.org> Cc: "Xen-devel" <xen-devel@lists.xensource.com> Date: Thursday, February 5, 2009, 10:24 AM Console output stops with messages:- peth1 : no IPV6 routers present eth1 : no IPV6 routers present Press Ctrl+Alt+F2 and login :- # xm info host : ServerUbuntu release : 2.6.29-rc3-tip version : #8 SMP Thu Feb 5 09:15:44 EST 2009 machine : x86_64 nr_cpus : 2 nr_nodes : 1 cores_per_socket : 2 threads_per_core : 1 cpu_mhz : 3005 hw_caps : bfebfbff:20100800:00000000:00000140:0008e3fd:00000000:00000001:00000000 virt_caps : hvm total_memory : 8191 free_memory : 7035 node_to_cpu : node0:0-1 node_to_memory : node0:7035 xen_major : 3 xen_minor : 4 xen_extra : -unstable xen_caps : xen-3.0-x86_64 xen-3.0-x86_32p hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64 xen_scheduler : credit xen_pagesize : 4096 platform_params : virt_start=0xffff800000000000 xen_changeset : Fri Jan 30 11:12:57 2009 +0900 19130:c8962b24fb50 cc_compiler : gcc version 4.3.2 (Ubuntu 4.3.2-1ubuntu11) cc_compile_by : root cc_compile_domain : cc_compile_date : Mon Feb 2 10:28:03 EST 2009 xend_config_format : 4 # xm dmesg __ __ _____ _ _ _ _ _ \ \/ /___ _ __ |___ /| || | _ _ _ __ ___| |_ __ _| |__ | | ___ \ // _ \ ''_ \ |_ \| || |_ __| | | | ''_ \/ __| __/ _` | ''_ \| |/ _ \ / \ __/ | | | ___) |__ _|__| |_| | | | \__ \ || (_| | |_) | | __/ /_/\_\___|_| |_| |____(_) |_| \__,_|_| |_|___/\__\__,_|_.__/|_|\___| (XEN) Xen version 3.4-unstable (root@) (gcc version 4.3.2 (Ubuntu 4.3.2-1ubuntu11) ) Mon Feb 2 10:28:03 EST 2009 (XEN) Latest ChangeSet: Fri Jan 30 11:12:57 2009 +0900 19130:c8962b24fb50 (XEN) Command line: dom0_mem=1024M (XEN) Video information: (XEN) VGA is text mode 80x25, font 8x16 (XEN) VBE/DDC methods: none; EDID transfer time: 0 seconds (XEN) EDID info not retrieved because no DDC retrieval method detected (XEN) Disc information: (XEN) Found 0 MBR signatures (XEN) Found 2 EDD information structures (XEN) Xen-e820 RAM map: (XEN) 0000000000000000 - 000000000009ec00 (usable) (XEN) 000000000009ec00 - 00000000000a0000 (reserved) (XEN) 00000000000e4000 - 0000000000100000 (reserved) (XEN) 0000000000100000 - 00000000cff80000 (usable) (XEN) 00000000cff80000 - 00000000cff8e000 (ACPI data) (XEN) 00000000cff8e000 - 00000000cffe0000 (ACPI NVS) (XEN) 00000000cffe0000 - 00000000d0000000 (reserved) (XEN) 00000000fee00000 - 00000000fee01000 (reserved) (XEN) 00000000ffe00000 - 0000000100000000 (reserved) (XEN) 0000000100000000 - 0000000230000000 (usable) (XEN) System RAM: 8191MB (8387704kB) (XEN) ACPI: RSDP 000FBB80, 0014 (r0 ACPIAM) (XEN) ACPI: RSDT CFF80000, 003C (r1 A_M_I_ OEMRSDT 10000730 MSFT 97) (XEN) ACPI: FACP CFF80200, 0084 (r2 A_M_I_ OEMFACP 10000730 MSFT 97) (XEN) ACPI: DSDT CFF805C0, 8E13 (r1 A0840 A0840001 1 INTL 20060113) (XEN) ACPI: FACS CFF8E000, 0040 (XEN) ACPI: APIC CFF80390, 006C (r1 A_M_I_ OEMAPIC 10000730 MSFT 97) (XEN) ACPI: MCFG CFF80400, 003C (r1 A_M_I_ OEMMCFG 10000730 MSFT 97) (XEN) ACPI: OEMB CFF8E040, 0081 (r1 A_M_I_ AMI_OEM 10000730 MSFT 97) (XEN) ACPI: HPET CFF893E0, 0038 (r1 A_M_I_ OEMHPET 10000730 MSFT 97) (XEN) ACPI: OSFR CFF89420, 00B0 (r1 A_M_I_ OEMOSFR 10000730 MSFT 97) (XEN) Domain heap initialised (XEN) Processor #0 7:7 APIC version 20 (XEN) Processor #1 7:7 APIC version 20 (XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-23 (XEN) Enabling APIC mode: Flat. Using 1 I/O APICs (XEN) Using scheduler: SMP Credit Scheduler (credit) (XEN) Detected 3005.623 MHz processor. (XEN) VMX: Supported advanced features: (XEN) - APIC MMIO access virtualisation (XEN) - APIC TPR shadow (XEN) - Virtual NMI (XEN) - MSR direct-access bitmap (XEN) HVM: VMX enabled (XEN) CPU0: Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz stepping 06 (XEN) Booting processor 1/1 eip 8c000 (XEN) CPU1: Intel(R) Core(TM)2 Duo CPU E8400 @ 3.00GHz stepping 06 (XEN) Total of 2 processors activated. (XEN) ENABLING IO-APIC IRQs (XEN) -> Using new ACK method (XEN) checking TSC synchronization across 2 CPUs: passed. (XEN) Platform timer is 14.318MHz HPET (XEN) Brought up 2 CPUs (XEN) I/O virtualisation disabled (XEN) *** LOADING DOMAIN 0 *** (XEN) Xen kernel: 64-bit, lsb, compat32 (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x200000 -> 0x8eaea0 (XEN) PHYSICAL MEMORY ARRANGEMENT: (XEN) Dom0 alloc.: 0000000210000000->0000000220000000 (196608 pages to be allocated) (XEN) VIRTUAL MEMORY ARRANGEMENT: (XEN) Loaded kernel: ffffffff80200000->ffffffff808eaea0 (XEN) Init. ramdisk: ffffffff808eb000->ffffffff8b8c5c00 (XEN) Phys-Mach map: ffffffff8b8c6000->ffffffff8bac6000 (XEN) Start info: ffffffff8bac6000->ffffffff8bac64b4 (XEN) Page tables: ffffffff8bac7000->ffffffff8bb28000 (XEN) Boot stack: ffffffff8bb28000->ffffffff8bb29000 (XEN) TOTAL: ffffffff80000000->ffffffff8bc00000 (XEN) ENTRY ADDRESS: ffffffff80766200 (XEN) Dom0 has maximum 2 VCPUs (XEN) Scrubbing Free RAM: .......................................................................done. (XEN) Xen trace buffers: disabled (XEN) Std. Loglevel: Errors and warnings (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) (XEN) Xen is relinquishing VGA console. (XEN) *** Serial input -> DOM0 (type ''CTRL-a'' three times to switch input to Xen) (XEN) Freed 128kB init memory. (XEN) ioapic_guest_write: apic=0, pin=2, old_irq=0, new_irq=-1 (XEN) ioapic_guest_write: old_entry=000009f0, new_entry=00010900 (XEN) ioapic_guest_write: Attempt to remove IO-APIC pin of in-use IRQ! (XEN) irq.c:877: dom0: pirq 2 or vector 152 already mapped (XEN) d0:v0: reserved bit in page table (ec=000D) (XEN) Pagetable walk from 00007f99ce64c000: (XEN) L4[0x0ff] = 00000001ef3bf067 00000000000387bf (XEN) L3[0x067] = 00000001ef3aa067 00000000000387aa (XEN) L2[0x073] = 00000001ef3c8067 00000000000387c8 (XEN) L1[0x04c] = fffff7fffffff237 ffffffffffffffff (XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e033:[<00007f99cf8915e5>] (XEN) RFLAGS: 0000000000010246 EM: 0 CONTEXT: pv guest (XEN) rax: 0000000000000000 rbx: 000000000250e1b0 rcx: 0000000000000000 (XEN) rdx: 00007f99ce64c000 rsi: 0000000000000000 rdi: 0000000000000000 (XEN) rbp: 0000000010000000 rsp: 00007fffdb09b4e0 r8: 000000000250e930 (XEN) r9: 7efefefefefefeff r10: 00007fffdb09b260 r11: 0000000000477f20 (XEN) r12: 000000000250e9e0 r13: 000000000250e170 r14: 00007fffdb09b508 (XEN) r15: 00000000024f78a0 cr0: 0000000080050033 cr4: 00000000000026f0 (XEN) cr3: 00000001ef38c000 cr2: 00007f99ce64c000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=00007fffdb09b4e0: (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 00007f99cf8976a0 00007f99ce64c000 000000000250e800 0000000000000000 (XEN) 0000000000000000 00000000024eced0 0000000000000000 0000000000000001 (XEN) 0000000000000000 000000000046a189 00007fffdb09b6f8 0000000ad2e912f2 (XEN) 00000000007e5800 00000000498af897 00000000024fded0 00007fffdb09b750 (XEN) 0000000000000000 0000000000432ab0 00000000007e5800 00000000007e57d0 (XEN) 00000000007e5728 0000000000433526 0000000000000001 00007fffdb09b5ec (XEN) 00007fffdb09b5e4 00007fffdb09b5e0 00007fffdb09b6f8 0000000a004314bb (XEN) 0000000100000000 0000000000572055 00007f99d0df75c8 0000000000572010 (XEN) 0000000000000000 0000000000432ab0 00007fffdb09b6f0 0000000000000000 (XEN) 0000000000000000 00007f99d0e06466 0000000000000000 00007fffdb09b6f8 (XEN) 0000000a00000000 00000000004332a0 0000000000572010 c020df530e6e6114 (XEN) 0000000000432ab0 00007fffdb09b6f0 0000000000000000 0000000000000000 (XEN) 3fdf6940620e6114 3f137e93c62c6114 0000000000000000 0000000000000000 (XEN) 0000000000000000 000000000000000a 00000000004332a0 0000000000572000 (XEN) 0000000000000000 0000000000000000 0000000000432ab0 0000000000432ad9 (XEN) 00007fffdb09b6e8 000000000000001c 000000000000000a 00007fffdb09beba (XEN) 00007fffdb09becb 00007fffdb09bece 00007fffdb09bed2 00007fffdb09bed9 (XEN) 00007fffdb09bedb 00007fffdb09bee1 00007fffdb09bef7 00007fffdb09bf01 (XEN) 00007fffdb09bf05 0000000000000000 00007fffdb09bf09 00007fffdb09bf14 (XEN) d0:v1: reserved bit in page table (ec=000D) (XEN) Pagetable walk from 00007fcf5052e000: (XEN) L4[0x0ff] = 000000021a5b7067 000000000000a5b7 (XEN) L3[0x13d] = 000000021a5b3067 000000000000a5b3 (XEN) L2[0x082] = 000000021a5dc067 000000000000a5dc (XEN) L1[0x12e] = fffff7fffffff237 ffffffffffffffff (XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]---- (XEN) CPU: 1 (XEN) RIP: e033:[<00007fcf517735e5>] (XEN) RFLAGS: 0000000000010246 EM: 0 CONTEXT: pv guest (XEN) rax: 0000000000000000 rbx: 00000000018b51b0 rcx: 0000000000000000 (XEN) rdx: 00007fcf5052e000 rsi: 0000000000000000 rdi: 0000000000000000 (XEN) rbp: 0000000010000000 rsp: 00007fff5cf7ba00 r8: 00000000018b5930 (XEN) r9: 7efefefefefefeff r10: 00007fff5cf7b780 r11: 0000000000477f20 (XEN) r12: 00000000018b59e0 r13: 00000000018b5170 r14: 00007fff5cf7ba28 (XEN) r15: 000000000189e8a0 cr0: 0000000080050033 cr4: 00000000000026f0 (XEN) cr3: 000000021a5b8000 cr2: 00007fcf5052e000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=00007fff5cf7ba00: (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 00007fcf517796a0 00007fcf5052e000 00000000018b5800 0000000000000000 (XEN) 0000000000000000 0000000001893ed0 0000000000000000 0000000000000001 (XEN) 0000000000000000 000000000046a189 00007fff5cf7bc18 0000000a54d732f2 (XEN) 00000000007e5800 00000000498af89b 00000000018a4ed0 00007fff5cf7bc70 (XEN) 0000000000000000 0000000000432ab0 00000000007e5800 00000000007e57d0 (XEN) 00000000007e5728 0000000000433526 0000000000000001 00007fff5cf7bb0c (XEN) 00007fff5cf7bb04 00007fff5cf7bb00 00007fff5cf7bc18 0000000a004314bb (XEN) 0000000100000000 0000000000572055 00007fcf52cd95c8 0000000000572010 (XEN) 0000000000000000 0000000000432ab0 00007fff5cf7bc10 0000000000000000 (XEN) 0000000000000000 00007fcf52ce8466 0000000000000000 00007fff5cf7bc18 (XEN) 0000000a00000000 00000000004332a0 0000000000572010 c02607e04952a172 (XEN) 0000000000432ab0 00007fff5cf7bc10 0000000000000000 0000000000000000 (XEN) 3fd8be0f3ff2a172 3fb8a27d4110a172 0000000000000000 0000000000000000 (XEN) 0000000000000000 000000000000000a 00000000004332a0 0000000000572000 (XEN) 0000000000000000 0000000000000000 0000000000432ab0 0000000000432ad9 (XEN) 00007fff5cf7bc08 000000000000001c 000000000000000a 00007fff5cf7ceba (XEN) 00007fff5cf7cecb 00007fff5cf7cece 00007fff5cf7ced2 00007fff5cf7ced9 (XEN) 00007fff5cf7cedb 00007fff5cf7cee1 00007fff5cf7cef7 00007fff5cf7cf01 (XEN) 00007fff5cf7cf05 0000000000000000 00007fff5cf7cf09 00007fff5cf7cf14 (XEN) d0:v0: reserved bit in page table (ec=000D) (XEN) Pagetable walk from 00007f1bc2a40000: (XEN) L4[0x0fe] = 00000001ec765067 000000000003b365 (XEN) L3[0x06f] 00000001f3a17067 0000000000033e17 (XEN) L2[0x015] = 00000001ee10e067 000000000003990e (XEN) L1[0x040] = fffff7fffffff237 ffffffffffffffff (XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e033:[<00007f1bc3c855e5>] (XEN) RFLAGS: 0000000000010246 EM: 0 CONTEXT: pv guest (XEN) rax: 0000000000000000 rbx: 0000000000c421b0 rcx: 0000000000000000 (XEN) rdx: 00007f1bc2a40000 rsi: 0000000000000000 rdi: 0000000000000000 (XEN) rbp: 0000000010000000 rsp: 00007fffcf48ef10 r8: 0000000000c42930 (XEN) r9: 7efefefefefefeff r10: 00007fffcf48ec90 r11: 0000000000477f20 (XEN) r12: 0000000000c429e0 r13: 0000000000c42170 r14: 00007fffcf48ef38 (XEN) r15: 0000000000c2b8a0 cr0: 0000000080050033 cr4: 00000000000026f0 (XEN) cr3: 00000001edc5a000 cr2: 00007f1bc2a40000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) Guest stack trace from rsp=00007fffcf48ef10: (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) 00007f1bc3c8b6a0 00007f1bc2a40000 0000000000c42800 0000000000000000 (XEN) 0000000000000000 0000000000c20ed0 0000000000000000 0000000000000001 (XEN) 0000000000000000 000000000046a189 00007fffcf48f128 0000000ac72852f2 (XEN) 00000000007e5800 00000000498af8a0 0000000000c31ed0 00007fffcf48f180 (XEN) 0000000000000000 0000000000432ab0 00000000007e5800 00000000007e57d0 (XEN) 00000000007e5728 0000000000433526 0000000000000001 00007fffcf48f01c (XEN) 00007fffcf48f014 00007fffcf48f010 00007fffcf48f128 0000000a004314bb (XEN) 0000000100000000 0000000000572055 00007f1bc51eb5c8 0000000000572010 (XEN) 0000000000000000 0000000000432ab0 00007fffcf48f120 0000000000000000 (XEN) 0000000000000000 00007f1bc51fa466 0000000000000000 00007fffcf48f128 (XEN) 0000000a00000000 00000000004332a0 0000000000572010 c02d59cc73036600 (XEN) 0000000000432ab0 00007fffcf48f120 0000000000000000 0000000000000000 (XEN) 3fd2c75d93c36600 3e1ad3f33b416600 0000000000000000 0000000000000000 (XEN) 0000000000000000 000000000000000a 00000000004332a0 0000000000572000 (XEN) 0000000000000000 0000000000000000 0000000000432ab0 0000000000432ad9 (XEN) 00007fffcf48f118 000000000000001c 000000000000000a 00007fffcf48feba (XEN) 00007fffcf48fecb 00007fffcf48fece 00007fffcf48fed2 00007fffcf48fed9 (XEN) 00007fffcf48fedb 00007fffcf48fee1 00007fffcf48fef7 00007fffcf48ff01 (XEN) 00007fffcf48ff05 0000000000000000 00007fffcf48ff09 00007fffcf48ff14 # df -h works fine. SATA drive attached to Intel ICH9R (AHCI) detected at boot up Regardless ifconfig and "brctl show" reports seem to be good. Local IP obtained via dhcp is 192.168.1.34 and /etc/init.d/networking restart seems to release old IP and obtain new one pretty soon . Xen Host is uncreachable on the LAN. Attempt to ping 192.168.1.1 (ADSL Modem) fails with message :- No IPV6 router present and vice-versa i cannot ping Xen Host from the LAN. Attempt to run:- # startx obviosly fails. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Jeremy Fitzhardinge
2009-Feb-06 06:54 UTC
Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box
Boris Derzhavets wrote:> Build 2.6.29-rc3 with the most recent change set and load under Xen > Unstable > Logged into Dom0. > Was able to load F10 PV DomU via prepared image. > DomU obtained IP (192.168.1.38) via DHCP . > Opened ssh connection to Dom0 192.168.1.34 (Ubuntu 8.10 Server) > > LAN is still unavailable for both DomU & Dom0. >So you''re saying that you got internal host<->guest networking going, but external networking fails. What''s your ethernet hardware? Does it fail to probe, or does it probe but not work? J _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Boris Derzhavets
2009-Feb-06 12:01 UTC
Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box
My board is ASUS P5K Premium/WIFI. Second Ethernet Adapter Realtek 8110SC (eth1) is attached to ADSL Modem (emulating local DHCP server for intranet ) and is working as xen bridge. # ifconfig # brctl show looks fine, just like under Xen 3.3.1 with xen-ified kernel Interface "eth1" fails to work with LAN, but obtains IP address for Dom0 via DHCP request to ADSL Modem. I am able do DHCPRELEASE and DHCPREQUEST via "eth1" whenever i want. But, i cannot ping IP of ADSL modem from Dom0 , which clearly shows up in DHCPOFFER & DHCPACK responses. F10 DomU obtained IP via this bridge also with no problems and communicates via ssh with Dom0.>Does it fail to probe, or does it probe but >not work?Sorry,what exactly means "probe" eth1 ? --- On Fri, 2/6/09, Jeremy Fitzhardinge <jeremy@goop.org> wrote: From: Jeremy Fitzhardinge <jeremy@goop.org> Subject: Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box To: bderzhavets@yahoo.com Cc: "Xen-devel" <xen-devel@lists.xensource.com> Date: Friday, February 6, 2009, 1:54 AM Boris Derzhavets wrote:> Build 2.6.29-rc3 with the most recent change set and load under XenUnstable> Logged into Dom0. > Was able to load F10 PV DomU via prepared image. > DomU obtained IP (192.168.1.38) via DHCP . > Opened ssh connection to Dom0 192.168.1.34 (Ubuntu 8.10 Server) > > LAN is still unavailable for both DomU & Dom0. >So you''re saying that you got internal host<->guest networking going, but external networking fails. ***** YES ***** What''s your ethernet hardware? Does it fail to probe, or does it probe but not work? J _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Jeremy Fitzhardinge
2009-Feb-06 16:57 UTC
Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box
Boris Derzhavets wrote:> > >Does it fail to probe, or does it probe but > >not work? > > > Sorry,what exactly means "probe" eth1 ? >Can you post the output of "lspci -v", "ifconfig -a", and any messages in "dmesg" relating to your ethernet devices? Thanks, J _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Boris Derzhavets
2009-Feb-06 19:49 UTC
Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box
Here they go:- # lspci -v 00:00.0 Host bridge: Intel Corporation 82G33/G31/P35/P31 Express DRAM Controller (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8295 Flags: bus master, fast devsel, latency 0 Capabilities: [e0] Vendor Specific Information <?> Kernel modules: intel-agp 00:01.0 PCI bridge: Intel Corporation 82G33/G31/P35/P31 Express PCI Express Root Port (rev 02) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=01, subordinate=01, sec-latency=0 I/O behind bridge: 0000b000-0000bfff Memory behind bridge: fa000000-fe8fffff Prefetchable memory behind bridge: 00000000d0000000-00000000dfffffff Capabilities: [88] Subsystem: ASUSTeK Computer Inc. Device 8295 Capabilities: [80] Power Management version 3 Capabilities: [90] Message Signalled Interrupts: Mask- 64bit- Queue=0/0 Enable- Capabilities: [a0] Express Root Port (Slot+), MSI 00 Capabilities: [100] Virtual Channel <?> Capabilities: [140] Root Complex Link <?> Kernel driver in use: pcieport-driver Kernel modules: shpchp 00:1a.0 USB Controller: Intel Corporation 82801I (ICH9 Family) USB UHCI Controller #4 (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, medium devsel, latency 0, IRQ 29 I/O ports at a800 [size=32] Capabilities: [50] Vendor Specific Information <?> Kernel driver in use: uhci_hcd Kernel modules: uhci-hcd 00:1a.1 USB Controller: Intel Corporation 82801I (ICH9 Family) USB UHCI Controller #5 (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, medium devsel, latency 0, IRQ 33 I/O ports at a880 [size=32] Capabilities: [50] Vendor Specific Information <?> Kernel driver in use: uhci_hcd Kernel modules: uhci-hcd 00:1a.2 USB Controller: Intel Corporation 82801I (ICH9 Family) USB UHCI Controller #6 (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, medium devsel, latency 0, IRQ 34 I/O ports at ac00 [size=32] Capabilities: [50] Vendor Specific Information <?> Kernel driver in use: uhci_hcd Kernel modules: uhci-hcd 00:1a.7 USB Controller: Intel Corporation 82801I (ICH9 Family) USB2 EHCI Controller #2 (rev 02) (prog-if 20) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, medium devsel, latency 0, IRQ 34 Memory at f9fffc00 (32-bit, non-prefetchable) [size=1K] Capabilities: [50] Power Management version 2 Capabilities: [58] Debug port: BAR=1 offset=00a0 Capabilities: [98] Vendor Specific Information <?> Kernel driver in use: ehci_hcd Kernel modules: ehci-hcd 00:1b.0 Audio device: Intel Corporation 82801I (ICH9 Family) HD Audio Controller (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, fast devsel, latency 0, IRQ 32 Memory at f9ff8000 (64-bit, non-prefetchable) [size=16K] Capabilities: [50] Power Management version 2 Capabilities: [60] Message Signalled Interrupts: Mask- 64bit+ Queue=0/0 Enable- Capabilities: [70] Express Root Complex Integrated Endpoint, MSI 00 Capabilities: [100] Virtual Channel <?> Capabilities: [130] Root Complex Link <?> Kernel driver in use: HDA Intel Kernel modules: snd-hda-intel 00:1c.0 PCI bridge: Intel Corporation 82801I (ICH9 Family) PCI Express Port 1 (rev 02) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=04, subordinate=04, sec-latency=0 Prefetchable memory behind bridge: 00000000f8f00000-00000000f8ffffff Capabilities: [40] Express Root Port (Slot+), MSI 00 Capabilities: [80] Message Signalled Interrupts: Mask- 64bit- Queue=0/0 Enable- Capabilities: [90] Subsystem: ASUSTeK Computer Inc. Device 8277 Capabilities: [a0] Power Management version 2 Capabilities: [100] Virtual Channel <?> Capabilities: [180] Root Complex Link <?> Kernel driver in use: pcieport-driver Kernel modules: shpchp 00:1c.4 PCI bridge: Intel Corporation 82801I (ICH9 Family) PCI Express Port 5 (rev 02) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=03, subordinate=03, sec-latency=0 I/O behind bridge: 0000d000-0000dfff Memory behind bridge: fea00000-feafffff Capabilities: [40] Express Root Port (Slot+), MSI 00 Capabilities: [80] Message Signalled Interrupts: Mask- 64bit- Queue=0/0 Enable- Capabilities: [90] Subsystem: ASUSTeK Computer Inc. Device 8277 Capabilities: [a0] Power Management version 2 Capabilities: [100] Virtual Channel <?> Capabilities: [180] Root Complex Link <?> Kernel driver in use: pcieport-driver Kernel modules: shpchp 00:1c.5 PCI bridge: Intel Corporation 82801I (ICH9 Family) PCI Express Port 6 (rev 02) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=02, subordinate=02, sec-latency=0 I/O behind bridge: 0000c000-0000cfff Memory behind bridge: fe900000-fe9fffff Capabilities: [40] Express Root Port (Slot+), MSI 00 Capabilities: [80] Message Signalled Interrupts: Mask- 64bit- Queue=0/0 Enable- Capabilities: [90] Subsystem: ASUSTeK Computer Inc. Device 8277 Capabilities: [a0] Power Management version 2 Capabilities: [100] Virtual Channel <?> Capabilities: [180] Root Complex Link <?> Kernel driver in use: pcieport-driver Kernel modules: shpchp 00:1d.0 USB Controller: Intel Corporation 82801I (ICH9 Family) USB UHCI Controller #1 (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, medium devsel, latency 0, IRQ 35 I/O ports at a080 [size=32] Capabilities: [50] Vendor Specific Information <?> Kernel driver in use: uhci_hcd Kernel modules: uhci-hcd 00:1d.1 USB Controller: Intel Corporation 82801I (ICH9 Family) USB UHCI Controller #2 (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, medium devsel, latency 0, IRQ 36 I/O ports at a400 [size=32] Capabilities: [50] Vendor Specific Information <?> Kernel driver in use: uhci_hcd Kernel modules: uhci-hcd 00:1d.2 USB Controller: Intel Corporation 82801I (ICH9 Family) USB UHCI Controller #3 (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, medium devsel, latency 0, IRQ 34 I/O ports at a480 [size=32] Capabilities: [50] Vendor Specific Information <?> Kernel driver in use: uhci_hcd Kernel modules: uhci-hcd 00:1d.7 USB Controller: Intel Corporation 82801I (ICH9 Family) USB2 EHCI Controller #1 (rev 02) (prog-if 20) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, medium devsel, latency 0, IRQ 35 Memory at f9fff800 (32-bit, non-prefetchable) [size=1K] Capabilities: [50] Power Management version 2 Capabilities: [58] Debug port: BAR=1 offset=00a0 Capabilities: [98] Vendor Specific Information <?> Kernel driver in use: ehci_hcd Kernel modules: ehci-hcd 00:1e.0 PCI bridge: Intel Corporation 82801 PCI Bridge (rev 92) (prog-if 01) Flags: bus master, fast devsel, latency 0 Bus: primary=00, secondary=05, subordinate=05, sec-latency=32 I/O behind bridge: 0000e000-0000efff Memory behind bridge: feb00000-febfffff Prefetchable memory behind bridge: 0000000050000000-00000000500fffff Capabilities: [50] Subsystem: ASUSTeK Computer Inc. Device 8277 00:1f.0 ISA bridge: Intel Corporation 82801IR (ICH9R) LPC Interface Controller (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, medium devsel, latency 0 Capabilities: [e0] Vendor Specific Information <?> Kernel modules: iTCO_wdt 00:1f.2 SATA controller: Intel Corporation 82801IR/IO/IH (ICH9R/DO/DH) 6 port SATA AHCI Controller (rev 02) (prog-if 01) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: bus master, 66MHz, medium devsel, latency 0, IRQ 32 I/O ports at 9c00 [size=8] I/O ports at 9880 [size=4] I/O ports at 9800 [size=8] I/O ports at 9480 [size=4] I/O ports at 9400 [size=32] Memory at f9ffe800 (32-bit, non-prefetchable) [size=2K] Capabilities: [80] Message Signalled Interrupts: Mask- 64bit- Queue=0/4 Enable- Capabilities: [70] Power Management version 3 Capabilities: [a8] SATA HBA <?> Capabilities: [b0] Vendor Specific Information <?> Kernel driver in use: ahci 00:1f.3 SMBus: Intel Corporation 82801I (ICH9 Family) SMBus Controller (rev 02) Subsystem: ASUSTeK Computer Inc. Device 8277 Flags: medium devsel, IRQ 5 Memory at f9fff400 (64-bit, non-prefetchable) [size=256] I/O ports at 0400 [size=32] Kernel modules: i2c-i801 01:00.0 VGA compatible controller: nVidia Corporation GeForce 8500 GT (rev a1) Subsystem: Micro-Star International Co., Ltd. Device 0960 Flags: bus master, fast devsel, latency 0, IRQ 11 Memory at fd000000 (32-bit, non-prefetchable) [size=16M] Memory at d0000000 (64-bit, prefetchable) [size=256M] Memory at fa000000 (64-bit, non-prefetchable) [size=32M] I/O ports at bc00 [size=128] Expansion ROM at fe8e0000 [disabled] [size=128K] Capabilities: [60] Power Management version 2 Capabilities: [68] Message Signalled Interrupts: Mask- 64bit+ Queue=0/0 Enable- Capabilities: [78] Express Endpoint, MSI 00 Capabilities: [100] Virtual Channel <?> Capabilities: [128] Power Budgeting <?> Capabilities: [600] Vendor Specific Information <?> Kernel modules: nvidiafb 02:00.0 Ethernet controller: Marvell Technology Group Ltd. 88E8056 PCI-E Gigabit Ethernet Controller (rev 12) Subsystem: ASUSTeK Computer Inc. Device 81f8 Flags: bus master, fast devsel, latency 0, IRQ 30 Memory at fe9fc000 (64-bit, non-prefetchable) [size=16K] I/O ports at c800 [size=256] Expansion ROM at fe9c0000 [disabled] [size=128K] Capabilities: [48] Power Management version 3 Capabilities: [50] Vital Product Data <?> Capabilities: [5c] Message Signalled Interrupts: Mask- 64bit+ Queue=0/0 Enable- Capabilities: [e0] Express Legacy Endpoint, MSI 00 Capabilities: [100] Advanced Error Reporting <?> Kernel driver in use: sky2 Kernel modules: sky2 03:00.0 SATA controller: JMicron Technologies, Inc. JMicron 20360/20363 AHCI Controller (rev 03) (prog-if 01) Subsystem: ASUSTeK Computer Inc. Device 824f Flags: bus master, fast devsel, latency 0, IRQ 29 Memory at feafe000 (32-bit, non-prefetchable) [size=8K] Expansion ROM at feae0000 [disabled] [size=64K] Capabilities: [68] Power Management version 2 Capabilities: [50] Express Legacy Endpoint, MSI 01 Kernel driver in use: ahci 03:00.1 IDE interface: JMicron Technologies, Inc. JMicron 20360/20363 AHCI Controller (rev 03) (prog-if 85 [Master SecO PriO]) Subsystem: ASUSTeK Computer Inc. Device 824f Flags: bus master, fast devsel, latency 0, IRQ 30 I/O ports at dc00 [size=8] I/O ports at d880 [size=4] I/O ports at d800 [size=8] I/O ports at d480 [size=4] I/O ports at d400 [size=16] Capabilities: [68] Power Management version 2 Kernel driver in use: pata_jmicron Kernel modules: pata_acpi, ata_generic 05:03.0 FireWire (IEEE 1394): Agere Systems FW323 (rev 70) (prog-if 10) Subsystem: ASUSTeK Computer Inc. Device 8294 Flags: bus master, medium devsel, latency 64, IRQ 36 Memory at febff000 (32-bit, non-prefetchable) [size=4K] Capabilities: [44] Power Management version 2 Kernel driver in use: ohci1394 Kernel modules: ohci1394 05:04.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL-8110SC/8169SC Gigabit Ethernet (rev 10) Subsystem: ASUSTeK Computer Inc. Device 820d Flags: bus master, 66MHz, medium devsel, latency 64, IRQ 29 I/O ports at e800 [size=256] Memory at febfec00 (32-bit, non-prefetchable) [size=256] Expansion ROM at 50000000 [disabled] [size=128K] Capabilities: [dc] Power Management version 2 Kernel driver in use: r8169 Kernel modules: r8169 # ifconfig -a eth0 Link encap:Ethernet HWaddr 00:1e:8c:25:d9:23 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) Interrupt:30 eth1 Link encap:Ethernet HWaddr 00:1e:8c:25:cc:a5 inet addr:192.168.1.34 Bcast:192.168.1.255 Mask:255.255.255.0 inet6 addr: fe80::21e:8cff:fe25:cca5/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:3 errors:0 dropped:0 overruns:0 frame:0 TX packets:44 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:1381 (1.3 KB) TX bytes:5043 (5.0 KB) lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:9 errors:0 dropped:0 overruns:0 frame:0 TX packets:9 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:792 (792.0 B) TX bytes:792 (792.0 B) pan0 Link encap:Ethernet HWaddr 32:5e:fa:ff:98:76 BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) peth1 Link encap:Ethernet HWaddr 00:1e:8c:25:cc:a5 inet6 addr: fe80::21e:8cff:fe25:cca5/64 Scope:Link UP BROADCAST RUNNING PROMISC MULTICAST MTU:1500 Metric:1 RX packets:45 errors:0 dropped:0 overruns:0 frame:0 TX packets:79 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:5017 (5.0 KB) TX bytes:10746 (10.7 KB) Interrupt:29 Base address:0x6c00 wlan0 Link encap:Ethernet HWaddr 00:15:af:51:c2:c0 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) wmaster0 Link encap:UNSPEC HWaddr 00-15-AF-51-C2-C0-00-00-00-00-00-00-00-00-00-00 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) # dmesg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [ 5.099964] r8169 0000:05:04.0: no PCI Express capability [ 5.100428] eth1: RTL8169sc/8110sc at 0xffffc20000056c00, 00:1e:8c:25:cc:a5, XID 18000000 IRQ 29 [ 5.110866] sdb6 sdb7 > [ 5.138566] sd 1:0:0:0: [sdb] Attached SCSI disk [ 5.148671] sr0: scsi3-mmc drive: 48x/48x writer cd/rw xa/form2 cdda tray [ 5.148720] Uniform CD-ROM driver Revision: 3.20 [ 5.148852] sr 8:0:0:0: Attached scsi CD-ROM sr0 [ 5.290088] usb 7-3: new high speed USB device using ehci_hcd and address 2 [ 5.446738] usb 7-3: configuration #1 chosen from 1 choice [ 5.820039] usb 6-2: new low speed USB device using uhci_hcd and address 2 [ 5.978633] usb 6-2: configuration #1 chosen from 1 choice [ 5.997158] usbcore: registered new interface driver hiddev [ 6.009751] input: HID 062a:0001 as /devices/pci0000:00/0000:00:1d.2/usb6/6-2/6-2:1.0/input/input2 [ 6.030237] generic-usb 0003:062A:0001.0001: input,hidraw0: USB HID v1.10 Mouse [HID 062a:0001] on usb-0000:00:1d.2-2/input0 [ 6.030312] usbcore: registered new interface driver usbhid [ 6.030358] usbhid: v2.6:USB HID core driver [ 6.173226] kjournald starting. Commit interval 5 seconds [ 6.173300] EXT3-fs: mounted filesystem with ordered data mode. [ 6.410240] ieee1394: Host added: ID:BUS[0-00:1023] GUID[001e8c00000473b7] [ 10.766791] udevd version 124 started [ 11.147927] pci_hotplug: PCI Hot Plug PCI Core version: 0.5 [ 11.177198] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 [ 11.273671] input: Power Button (FF) as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 [ 11.310050] ACPI: Power Button (FF) [PWRF] [ 11.310206] input: Power Button (CM) as /devices/LNXSYSTM:00/device:00/PNP0C0C:00/input/input4 [ 11.350043] ACPI: Power Button (CM) [PWRB] [ 11.659143] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 11.659318] serial8250: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A [ 11.748988] 00:0a: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A [ 11.926605] iTCO_vendor_support: vendor-support=0 [ 12.030139] cfg80211: Using static regulatory domain info [ 12.030195] cfg80211: Regulatory domain: US [ 12.030244] (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) [ 12.030299] (2402000 KHz - 2472000 KHz @ 40000 KHz), (600 mBi, 2700 mBm) [ 12.030345] (5170000 KHz - 5190000 KHz @ 40000 KHz), (600 mBi, 2300 mBm) [ 12.030391] (5190000 KHz - 5210000 KHz @ 40000 KHz), (600 mBi, 2300 mBm) [ 12.030437] (5210000 KHz - 5230000 KHz @ 40000 KHz), (600 mBi, 2300 mBm) [ 12.030483] (5230000 KHz - 5330000 KHz @ 40000 KHz), (600 mBi, 2300 mBm) [ 12.030529] (5735000 KHz - 5835000 KHz @ 40000 KHz), (600 mBi, 3000 mBm) [ 12.030574] cfg80211: Calling CRDA for country: US [ 12.033590] input: PC Speaker as /devices/platform/pcspkr/input/input5 [ 12.118118] iTCO_wdt: Intel TCO WatchDog Timer Driver v1.04 [ 12.118313] iTCO_wdt: Found a ICH9R TCO device (Version=2, TCOBASE=0x0860) [ 12.118450] iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) [ 13.492895] xen: enabling pci device 0000:00:1b.0 pin 1 [ 13.492900] xen: registering gsi 22 triggering 0 polarity 1 [ 13.492903] xen_allocate_pirq: returning irq 32 for gsi 22 [ 13.492950] xen: --> irq=32 [ 13.492953] xen_set_ioapic_routing: irq 32 gsi 22 vector 176 ioapic 0 pin 22 triggering 0 polarity 1 [ 13.493014] HDA Intel 0000:00:1b.0: PCI INT A -> GSI 22 (level, low) -> IRQ 32 [ 13.493068] xen: PCI device 0000:00:1b.0 pin 1 -> irq 32 [ 13.493200] HDA Intel 0000:00:1b.0: setting latency timer to 64 [ 13.618131] wmaster0 (rtl8187): not using net_device_ops yet [ 13.618580] phy0: Selected rate control algorithm ''minstrel'' [ 13.672245] wlan0 (rtl8187): not using net_device_ops yet [ 13.672712] phy0: hwaddr 00:15:af:51:c2:c0, RTL8187vB (default) V1 + rtl8225z2 [ 13.672794] usbcore: registered new interface driver rtl8187 [ 14.667785] loop: module loaded [ 14.745107] lp: driver loaded but no devices found [ 15.058440] Adding 3903784k swap on /dev/sdb2. Priority:-1 extents:1 across:3903784k [ 15.387912] EXT3 FS on sdb1, internal journal [ 16.031166] ip_tables: (C) 2000-2006 Netfilter Core Team [ 16.102561] r8169: eth1: link up [ 17.308389] NET: Registered protocol family 17 [ 23.209332] NET: Registered protocol family 10 [ 25.011700] warning: `avahi-daemon'' uses 32-bit capabilities (legacy support in use) [ 25.232315] ppdev: user-space parallel port driver [ 26.512891] Bluetooth: Core ver 2.14 [ 26.513710] NET: Registered protocol family 31 [ 26.513713] Bluetooth: HCI device and connection manager initialized [ 26.513717] Bluetooth: HCI socket layer initialized [ 26.536520] Bluetooth: L2CAP ver 2.11 [ 26.536524] Bluetooth: L2CAP socket layer initialized [ 26.550291] Bluetooth: SCO (Voice Link) ver 0.6 [ 26.550294] Bluetooth: SCO socket layer initialized [ 26.588863] Bluetooth: BNEP (Ethernet Emulation) ver 1.3 [ 26.588867] Bluetooth: BNEP filters: protocol multicast [ 26.767338] Bluetooth: RFCOMM socket layer initialized [ 26.767349] Bluetooth: RFCOMM TTY layer initialized [ 26.767351] Bluetooth: RFCOMM ver 1.10 [ 30.372288] r8169: peth1: link up [ 30.390009] device peth1 entered promiscuous mode [ 30.401524] eth1: topology change detected, propagating [ 30.401528] eth1: port 1(peth1) entering forwarding state [ 30.873356] sky2 eth0: enabling interface [ 30.873450] ADDRCONF(NETDEV_UP): eth0: link is not ready [ 33.111552] ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 33.981571] xenbus_probe wake_waiting [ 33.981629] xenbus_probe wake_waiting [ 33.982366] xenbus_probe_devices backend [ 33.982504] xenbus_probe_devices failed xenbus_directory [ 33.982550] backend_probe_and_watch devices probed ok [ 33.982697] backend_probe_and_watch watch add ok ok [ 33.982742] backend_probe_and_watch all done [ 33.982785] xenbus_probe_devices device [ 33.982921] xenbus_probe_devices failed xenbus_directory [ 33.982966] frontend_probe_and_watch devices probed ok [ 33.983106] frontend_probe_and_watch watch add ok ok [ 33.983151] frontend_probe_and_watch all done [ 40.920011] peth1: no IPv6 routers present [ 41.310011] eth1: no IPv6 routers present --- On Fri, 2/6/09, Jeremy Fitzhardinge <jeremy@goop.org> wrote: From: Jeremy Fitzhardinge <jeremy@goop.org> Subject: Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box To: bderzhavets@yahoo.com Cc: "Xen-devel" <xen-devel@lists.xensource.com> Date: Friday, February 6, 2009, 11:57 AM Boris Derzhavets wrote:> > >Does it fail to probe, or does it probe but > >not work? > > Sorry,what exactly means "probe" eth1 ?Can you post the output of "lspci -v", "ifconfig -a", and any messages in "dmesg" relating to your ethernet devices? Thanks, J _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Boris Derzhavets
2009-Feb-06 20:08 UTC
Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box
Just in case , complete output # dmesg > boot.messages is attached. --- On Fri, 2/6/09, Jeremy Fitzhardinge <jeremy@goop.org> wrote: From: Jeremy Fitzhardinge <jeremy@goop.org> Subject: Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box To: bderzhavets@yahoo.com Cc: "Xen-devel" <xen-devel@lists.xensource.com> Date: Friday, February 6, 2009, 11:57 AM Boris Derzhavets wrote:> > >Does it fail to probe, or does it probe but > >not work? > > Sorry,what exactly means "probe" eth1 ?Can you post the output of "lspci -v", "ifconfig -a", and any messages in "dmesg" relating to your ethernet devices? Thanks, J _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
Boris Derzhavets
2009-Feb-07 09:48 UTC
Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box
I was able to obtain access to LAN and WAN ( via ADSL) from Xen Unstable (2.6.29-rc3 kernel) Dom0 just made a switch to first integrated Ethernet Adapter - Marvell Yukon 8056 (ASUS P5K Premium/WIFI) I believe we have a kernel driver issue with RTL 8110SC/8169 Gigabit Ethernet. Same Xen Unstable Dom0 with Novell''s xen-ified kernel 2.6.27.5 works fine with Realtek Gigabit Ethernet 8110SC/8169. Thanks. Boris. --- On Fri, 2/6/09, Jeremy Fitzhardinge <jeremy@goop.org> wrote: From: Jeremy Fitzhardinge <jeremy@goop.org> Subject: Re: [Xen-devel] Booting up the most recent 2.6.29-rc3 (pv_ops Dom0 support) under Xen Unstable on Intel SATA (AHCI) box To: bderzhavets@yahoo.com Cc: "Xen-devel" <xen-devel@lists.xensource.com> Date: Friday, February 6, 2009, 11:57 AM Boris Derzhavets wrote:> > >Does it fail to probe, or does it probe but > >not work? > > Sorry,what exactly means "probe" eth1 ?Can you post the output of "lspci -v", "ifconfig -a", and any messages in "dmesg" relating to your ethernet devices? Thanks, J _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel