[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] xen:arm boot failures after commit 1c92a2aa*



On Wed, Sep 24, 2014 at 5:26 AM, Ian Campbell <Ian.Campbell@xxxxxxxxxx> wrote:
> On Wed, 2014-09-24 at 05:17 -0700, Suriyan Ramasami wrote:
>> Hello,
>>     I just noticed that after commit
>> 1c92a2aaf8c681efea9a3125e63d45b2d0083abf in master -  xen: arm:
>> support for up to 48-bit IPA addressing on arm64 - odroid xu fails to
>> boot. I am wondering if that effects Arndale too and other ARM boards.
>
> It didn't affect Arndale in my tests yesterday.
>
> Did you bisect to exactly that commit or did you update a bunch of stuff
> to end up there?
>

I reverted the commits from HEAD one by one till I could boot. I could
boot with commit "xen:arm support for up to 48 bit physical
addressing".
From the next commit on = 1c92a2a* and later it gives the panic.

>> The output on XEN console is as follows:
>>
>> (XEN) P2M: 40-bit IPA
>> (XEN) P2M: 3 levels with order-1 root, VTCR 0x80003518
>> (XEN) *** LOADING DOMAIN 0 ***
>> (XEN) Loading kernel from boot module @ 0000000060000000
>> (XEN) Allocating 1:1 mappings totalling 512MB for dom0:
>> (XEN) BANK[0] 0x00000080000000-0x000000a0000000 (512MB)
>> (XEN) Loading zImage from 0000000060000000 to 
>> 0000000087c00000-0000000087f10478
>> (XEN)
>> (XEN) ****************************************
>> (XEN) Panic on CPU 0:
>> (XEN) Unable to map translate guest address
>
> Can you turn that panic into a BUG_ON please so we can see the register
> state.

With BUG_ON this is the output:

(XEN) P2M: 40-bit IPA
(XEN) P2M: 3 levels with order-1 root, VTCR 0x80003518
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Loading kernel from boot module @ 0000000060000000
(XEN) Allocating 1:1 mappings totalling 512MB for dom0:
(XEN) BANK[0] 0x00000080000000-0x000000a0000000 (512MB)
(XEN) Loading zImage from 0000000060000000 to 0000000087c00000-0000000087f10478
(XEN) Xen BUG at kernel.c:181
(XEN) CPU0: Unexpected Trap: Undefined Instruction
(XEN) ----[ Xen-4.5-unstable  arm32  debug=y  Tainted:    C ]----
(XEN) CPU:    0
(XEN) PC:     002417a4 __bug+0x28/0x40
(XEN) CPSR:   2000005a MODE:Hypervisor
(XEN)      R0: 0026f6d4 R1: 00000000 R2: 00000000 R3: 00000fff
(XEN)      R4: 000000b5 R5: 00264518 R6: 00000000 R7: 00001000
(XEN)      R8: 00000001 R9: 00000000 R10:00000000 R11:002a7ac4 R12:00000001
(XEN) HYP: SP: 002a7abc LR: 002417a4
(XEN)
(XEN)   VTCR_EL2: 80003518
(XEN)  VTTBR_EL2: 00010000be8f6000
(XEN)
(XEN)  SCTLR_EL2: 30cd187f
(XEN)    HCR_EL2: 000000000038643f
(XEN)  TTBR0_EL2: 00000000be8e8000
(XEN)
(XEN)    ESR_EL2: 00000000
(XEN)  HPFAR_EL2: 0000000025806840
(XEN)      HDFAR: 4850d4e0
(XEN)      HIFAR: 9908898c
(XEN)
(XEN) Xen stack trace from sp=002a7abc:
(XEN)    00000001 002a7b1c 0024c6bc 87c00000 00000000 87f10478 00000000 00310478
(XEN)    00000000 60000000 00000000 87c00000 00000000 00000000 0026aa64 4005a000
(XEN)    002f0500 002a7ba0 40046000 00000000 0026aa64 4005a000 40037000 002a7b24
(XEN)    0024ca74 002a7eac 00248d5c a0000000 00000000 00000200 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    4ffbff58 00000000 00000000 40046000 4005a000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 4ff80000 00000000 00000000
(XEN)    00000000 00000001 00000000 80000000 00000000 20000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 87c00000 00000000 002904d0 00000000 88000000
(XEN)    00000000 88200000 00000000 0024c518 00000000 60000000 00000000 00310478
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) Xen call trace:
(XEN)    [<002417a4>] __bug+0x28/0x40 (PC)
(XEN)    [<002417a4>] __bug+0x28/0x40 (LR)
(XEN)    [<0024c6bc>] kernel_zimage_load+0x1a4/0x1ac
(XEN)    [<0024ca74>] kernel_load+0x10/0x14
(XEN)    [<00248d5c>] construct_dom0+0x684/0xaec
(XEN)    [<0027d310>] start_xen+0xc20/0xe40
(XEN)    [<8020011c>] 8020011c
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) CPU0: Unexpected Trap: Undefined Instruction
(XEN)
(XEN) ****************************************
(XEN)
(XEN) Manual reset required ('noreboot' specified)


>
>> (XEN) ****************************************
>> (XEN)
>> (XEN) Manual reset required ('noreboot' specified)
>>
>> Thanks
>> - Suriyan
>
>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.