[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-ia64-devel] [Patch] Pass the bare LSAPIC ID to dom0
On Mon, 2007-07-23 at 22:00 +0900, Akio Takebe wrote: > Hi, Alex and Tristan > > Alex, Thank you for your information, > and could you try this patch? > I modified SRAT and lsapic of dom0 for disable cpus. > This patch work fine on our PRIMEQUEST. This patch gets me to the same point as Yongkang, then I take the bugcheck below. I think we at least need vcpu_get_lid() to return the proper value before we can expect this to work. With this patch, MADT/SRAT id/eid != vpu_get_lid(). As Tristan mentioned, this patch is only a small step towards NUMA support. To make the SRAT processor entries meaningful, vcpus need have affinity to run on the node they represent. Does that scheduling exist? Without it, the guest OS may actually make more bad decisions in scheduling that it does now without locality info. To make use of the SRAT memory entries, I think we need to adopt a model similar to what we talked about previously, where each node has a pool of VP memory. Perhaps in the short term, the best way to handle the SRAT is to simply delete it from dom0, or make all the entries disabled. BTW, a minor nit on the patch, it's not an error to not have an SRAT table. It's perfectly legitimate for SMP systems not to provide one. Thanks, Alex kernel BUG at /home/awilliam/xen/20070723/linux-2.6.18-xen.hg/drivers/xen/core/evtchn.c:376! swapper[1]: bugcheck! 0 [1] Modules linked in: Pid: 1, CPU 0, comm: swapper psr : 00001010085a6010 ifs : 8000000000000692 ip : [<a0000001006d3b90>] Not tainted ip is at bind_virq_to_irqhandler+0x110/0x280 unat: 0000000000000000 pfs : 4000000000000692 rsc : 0000000000000007 rnat: 0000000000000000 bsps: 0000000000000000 pr : 0000000000009681 ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70433f csd : 0000000000000000 ssd : 0000000000000000 b0 : a0000001006d3b90 b6 : a0000001006da720 b7 : 0000000000000000 f6 : 000000000000000000000 f7 : 000000000000000000000 f8 : 000000000000000000000 f9 : 000000000000000000000 f10 : 000000000000000000000 f11 : 000000000000000000000 r1 : a0000001011435f0 r2 : a000000100d18000 r3 : a000000100f44c30 r8 : 0000000000000060 r9 : fffffffffff00001 r10 : fffffffffff04c18 r11 : ffffffffffffee61 r12 : e00000007f967d50 r13 : e00000007f960000 r14 : 0000000000000001 r15 : fffffffffff00001 r16 : 0000000000000000 r17 : a000000100f6c728 r18 : 0000000000000000 r19 : 0000000000000000 r20 : 0009804c8a70433f r21 : a00000010006d4c0 r22 : 0000000000000000 r23 : 0000000000000000 r24 : fffffffffff00000 r25 : 0000000000000000 r26 : a000000100f6c710 r27 : a000000100f562b0 r28 : a000000100f6c740 r29 : a000000100eb9ab8 r30 : a000000100eb9ab8 r31 : a000000100f438f0 Call Trace: [<a00000010001d640>] show_stack+0x40/0xa0 sp=e00000007f9678e0 bsp=e00000007f9612c8 [<a00000010001e2a0>] show_regs+0x840/0x880 sp=e00000007f967ab0 bsp=e00000007f961270 [<a000000100042a20>] die+0x1c0/0x380 sp=e00000007f967ab0 bsp=e00000007f961228 [<a000000100042c30>] die_if_kernel+0x50/0x80 sp=e00000007f967ad0 bsp=e00000007f9611f0 [<a000000100044360>] ia64_bad_break+0x280/0x4a0 sp=e00000007f967ad0 bsp=e00000007f9611c8 [<a0000001000693a0>] xen_leave_kernel+0x0/0x3e0 sp=e00000007f967b80 bsp=e00000007f9611c8 [<a0000001006d3b90>] bind_virq_to_irqhandler+0x110/0x280 sp=e00000007f967d50 bsp=e00000007f961138 [<a000000100019670>] xen_register_percpu_irq+0x4b0/0x8e0 sp=e00000007f967d60 bsp=e00000007f9610f0 [<a000000100019c40>] xen_smp_intr_init_early+0x40/0xc0 sp=e00000007f967d60 bsp=e00000007f9610c8 [<a000000100019dd0>] xen_platform_send_ipi+0x50/0x2e0 sp=e00000007f967d60 bsp=e00000007f9610a0 [<a00000010001a100>] ia64_send_ipi+0xa0/0x120 sp=e00000007f967d60 bsp=e00000007f961068 [<a000000100063be0>] __cpu_up+0x3e0/0x980 sp=e00000007f967d60 bsp=e00000007f961010 [<a0000001000ce970>] cpu_up+0x170/0x2c0 sp=e00000007f967e00 bsp=e00000007f960fd0 [<a000000100011720>] init+0x140/0x840 sp=e00000007f967e00 bsp=e00000007f960f98 [<a00000010001bb10>] kernel_thread_helper+0x30/0x60 sp=e00000007f967e30 bsp=e00000007f960f70 [<a0000001000110e0>] start_kernel_thread+0x20/0x40 sp=e00000007f967e30 bsp=e00000007f960f70 <0>Kernel panic - not syncing: Attempted to kill init! -- Alex Williamson HP Open Source & Linux Org. _______________________________________________ Xen-ia64-devel mailing list Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-ia64-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |