[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-ia64-devel][PATCH 3/3]provide hypercall the same pathwithsyscall
Hi Alex, Sorry, I ignored multicall, This patch makes domU boot. > Also, it would be > nice to include performance data when submitting patches which improve > performance. I didn't get the performance data, This patch definitely shorts the path of hypercall. Most of scratch registers don't need to be saved/restored. So this patch should be good for performance --Anthony Alex Williamson write on 2007年1月13日 7:16: > On Fri, 2007-01-12 at 13:20 +0800, Xu, Anthony wrote: >> Xu, Anthony write on 2007年1月11日 15:12: >>> provide hypercall the same path with syscall >>> most of scrach registers don't need to be saved/restored it is good >>> for performance >>> >>> --Anthony > > Hi Anthony, > > There seems to be a problem with these. With all 4 patches > applied, > I can't boot a domU (4-way, 4G). My dom0 is configured as a 2-way, > 16G. > Trying to boot the domU results in the panic below. Also, it would be > nice to include performance data when submitting patches which improve > performance. Thanks, > > Alex > > TCP bind hash table entries: 65536 (order: 6, 1048576 bytes) > TCP: Hash tables configured (established 524288 bind 65536) > TCP reno registered > TCP bic registered > NET: Registered protocol family 1 > NET: Registered protocol family 17 > (XEN) *** xen_handle_domain_access: exception table lookup failed, > iip=0xc005803891c800, addr=0xc005803891c800, spinning... (XEN) $$$$$ > PANIC in domain 0 (k6=0xf000000007c28000): *** > xen_handle_domain_access: exception table lookup failed, > iip=0xc005803891c800, addr=0xc005803891c800, spinning... (XEN) d > 0xf000000007c50080 domid 0 (XEN) vcpu 0xf000000007c28000 vcpu 0 (XEN) > (XEN) CPU 4 (XEN) psr : 0000101008226018 ifs : 8000000000000006 ip : > [<00c005803891c800>] (XEN) ip is at ??? > (XEN) unat: 0000000000000000 pfs : 0000000000000918 rsc : > 0000000000000003 (XEN) rnat: f000000007c2fdc0 bsps: bfffff0000400088 > pr : 000000000015a999 (XEN) ldrs: 0000000000000000 ccv : > 0000000080000003 fpsr: 0009804c0270033f (XEN) csd : 0000000000000000 > ssd : 0000000000000000 (XEN) b0 : f000000004031de0 b6 : > 00c005803891c808 b7 : f000000004002e20 (XEN) f6 : > 000000000000000000000 f7 : 000000000000000000000 (XEN) f8 : > 000000000000000000000 f9 : 000000000000000000000 (XEN) f10 : > 000000000000000000000 f11 : 000000000000000000000 (XEN) r1 : > 00cc000760467e31 r2 : f0000100fdc44338 r3 : f0000100fdc44339 (XEN) > r8 : f000000004029e48 r9 : 0000000000000001 r10 : 0000000000000000 > (XEN) r11 : 0000000000150259 r12 : f000000007c2fe00 r13 : > f000000007c28000 (XEN) r14 : 00c005803891c808 r15 : f000000004c40018 > r16 : 0000000080000003 (XEN) r17 : f000000004c40050 r18 : > f000000004c40051 r19 : f0000100fdc44378 (XEN) r20 : f000000004c40090 > r21 : 0000000000000000 r22 : 0000000000000080 (XEN) r23 : > a000000100c2bb80 r24 : 0000005000000080 r25 : 0000000000000000 (XEN) > r26 : 0000000000000000 r27 : 000000000000044e r28 : 0000000000000000 > (XEN) r29 : 0000000000000002 r30 : 0000000000000000 r31 : > 0000000000000695 (XEN) (XEN) Call Trace: (XEN) [<f0000000040b1490>] > show_stack+0x80/0xa0 (XEN) > sp=f000000007c2f8b0 bsp=f000000007c294b0 (XEN) [<f000000004086880>] > panic_domain+0x120/0x170 (XEN) > sp=f000000007c2fa80 bsp=f000000007c29448 (XEN) [<f00000000407afe0>] > ia64_do_page_fault+0x5e0/0x5f0 (XEN) > sp=f000000007c2fbc0 bsp=f000000007c293b0 (XEN) [<f0000000040aa680>] > ia64_leave_kernel+0x0/0x300 (XEN) > sp=f000000007c2fc00 bsp=f000000007c293b0 (XEN) domain_crash_sync > called from xenmisc.c:175 (XEN) Domain 0 (vcpu#0) crashed on cpu#4: > (XEN) d 0xf000000007c50080 domid 0 > (XEN) vcpu 0xf000000007c28000 vcpu 0 > (XEN) > (XEN) CPU 4 > (XEN) psr : 0000141208026010 ifs : 0000000000000006 ip : > [<a000000100068762>] (XEN) ip is at ??? > (XEN) unat: 0000000000000000 pfs : 800000000000040e rsc : > 0000000000000008 (XEN) rnat: 0000000000000000 bsps: a000000100c251b0 > pr : 0000000000155a65 (XEN) ldrs: 0000000001500000 ccv : > 0000000000000000 fpsr: 0009804c0270433f (XEN) csd : 0000000000000000 > ssd : 0000000000000000 (XEN) b0 : a00000010006e270 b6 : > a0000001006c4440 b7 : a0000001009dbe60 (XEN) f6 : > 1003e0000000000000000 f7 : 000000000000000000000 (XEN) f8 : > 000000000000000000000 f9 : 000000000000000000000 (XEN) f10 : > 000000000000000000000 f11 : 000000000000000000000 (XEN) r1 : > a00000010104ec60 r2 : a000000100e755a0 r3 : a000000100e755a0 (XEN) > r8 : 0000000000000001 r9 : fffffffffff04c18 r10 : 0000000000000000 > (XEN) r11 : a000000100dca648 r12 : a000000100c2bb20 r13 : > a000000100c24000 (XEN) r14 : 0000000000004000 r15 : 000000000000000d > r16 : 0000000000000000 (XEN) r17 : a000000100c2bb80 r18 : > a000000100c2bb88 r19 : a000000100c2bb70 (XEN) r20 : a0000001011242f8 > r21 : a0000001011382f8 r22 : a0000001011242f8 (XEN) r23 : > a000000100c2bb80 r24 : 0000000000000001 r25 : 0000000000000000 (XEN) > r26 : 0000000000000000 r27 : a000000100c2bbb0 r28 : 0000000000000000 > (XEN) r29 : 0000000000000001 r30 : 0000000000000000 r31 : > a0000001011483fc (XEN) (XEN) Call Trace: (XEN) [<f0000000040b1490>] > show_stack+0x80/0xa0 (XEN) > sp=f000000007c2f8b0 bsp=f000000007c29500 (XEN) [<f00000000401f370>] > __domain_crash+0xf0/0x130 (XEN) > sp=f000000007c2fa80 bsp=f000000007c294d8 (XEN) [<f00000000401f3f0>] > __domain_crash_synchronous+0x40/0xf0 (XEN) > sp=f000000007c2fa80 bsp=f000000007c294b0 (XEN) [<f0000000040868c0>] > panic_domain+0x160/0x170 (XEN) > sp=f000000007c2fa80 bsp=f000000007c29448 (XEN) [<f00000000407afe0>] > ia64_do_page_fault+0x5e0/0x5f0 (XEN) > sp=f000000007c2fbc0 bsp=f000000007c293b0 (XEN) [<f0000000040aa680>] > ia64_leave_kernel+0x0/0x300 (XEN) > sp=f000000007c2fc00 bsp=f000000007c293b0 (XEN) > (XEN) Call Trace: > (XEN) [<f0000000040b1490>] show_stack+0x80/0xa0 > (XEN) sp=f000000007c2f8b0 > bsp=f000000007c29500 (XEN) [<f00000000401f380>] > __domain_crash+0x100/0x130 (XEN) > sp=f000000007c2fa80 bsp=f000000007c294d8 (XEN) [<f00000000401f3f0>] > __domain_crash_synchronous+0x40/0xf0 (XEN) > sp=f000000007c2fa80 bsp=f000000007c294b0 (XEN) [<f0000000040868c0>] > panic_domain+0x160/0x170 (XEN) > sp=f000000007c2fa80 bsp=f000000007c29448 (XEN) [<f00000000407afe0>] > ia64_do_page_fault+0x5e0/0x5f0 (XEN) > sp=f000000007c2fbc0 bsp=f000000007c293b0 (XEN) [<f0000000040aa680>] > ia64_leave_kernel+0x0/0x300 (XEN) > sp=f000000007c2fc00 bsp=f000000007c293b0 (XEN) Domain 0 crashed: > rebooting machine in 5 seconds. Attachment:
hypercall_fix.patch _______________________________________________ Xen-ia64-devel mailing list Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-ia64-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |