[Xen-ia64-devel] [Patch] sync_console in ia64_init_handler

2006-10-19 Thread Akio Takebe
Hi,

This patch fix the following issue.

1. boot xen
2. push INIT bottun
3. Nothing is printed to serial console.

I add console_start_sync() into ia64_init_handler().
Then this issue is fixed.

Signed-off-by: Akio Takebe [EMAIL PROTECTED]
Signed-off-by: Masaki Kanno [EMAIL PROTECTED]


diff -r 06ed19691f6d xen/arch/ia64/linux-xen/mca.c
--- a/xen/arch/ia64/linux-xen/mca.c Tue Oct 17 15:49:05 2006 -0600
+++ b/xen/arch/ia64/linux-xen/mca.c Thu Oct 19 14:49:59 2006 +0900
@@ -80,6 +80,7 @@
 #ifdef XEN
 #include xen/symbols.h
 #include xen/mm.h
+#include xen/console.h
 #endif
 
 #if defined(IA64_MCA_DEBUG_INFO)
@@ -1240,6 +1241,7 @@ ia64_init_handler (struct pt_regs *pt, s
 */
ms = (pal_min_state_area_t *)(ia64_sal_to_os_handoff_state.
pal_min_state | (6ul61));
 #else
+   console_start_sync();
/* Xen virtual address in region 7. */
ms = __va((pal_min_state_area_t *)(ia64_sal_to_os_handoff_state
[cpu].pal_min_state));
 #endif


Best Regards,

Akio Takebe

init_handler_console_sync.patch
Description: Binary data
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel

[Xen-ia64-devel] Xen/IA64 Healthiness Report -Cset#11824

2006-10-19 Thread You, Yongkang
Xen/IA64 Healthiness Report

VTI Windows creation failure has been fixed in latest changeset. 
SMP VTI hang Xen0 issue has been fixed in latest changeset.

Testing Environment:

Platform: Tiger4
Processor: Itanium 2 Processor
Logic Processors number: 8 (2 processors with Due Core)
PAL version: 8.15
Service OS: RHEL4u3 IA64 SMP with 2 VCPUs
VTI Guest OS: RHEL4u2  RHEL4u3
XenU Guest OS: RHEL4u2
Xen IA64 Unstable tree: 11824:ee7799388ab1
Xen Schedule: credit
VTI Guest Firmware MD5: ea1815932b91e5a6481bb64468e50254

Summary Test Report:
-
  Total cases: 16
  Passed:16
  Failed: 0

Detailed test cases info:
-
1. One_VTI_without_vifpass
2. One_VTI   pass
3. One_XenU pass
4. Two_VTI_Coexist   pass
5. One_VTI_and_One_XenU   pass
6. Two_XenU_Coexist pass
7. One_VTI_4096M   pass
8. VTI_Network   pass
9. XenU_Network pass
10. One_SMP_XenU  pass
11. One_SMP_VTIpass
12. UP_VTI_LTP  pass
13. VTI_Kernel_Build  pass
14. Four_VTI_Coexist  pass
15. VTI_Windows pass
16. VTI_Win_Linux_XenU_Coexist  pass

Notes:
-

The last stable changeset:
-
11824:ee7799388ab1

Best Regards,
Yongkang (Kangkang) 永康

___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel


Re: [Xen-ia64-devel] BUG at mm.c:605

2006-10-19 Thread DOI Tsunehisa
Hi Alex,

Alex Williamson wrote:
Ok, should I simply revert xen-ia64-unstable cset 11636:3470d9cd27e5?
   Basically, yes. But we can't avoid hypervisor crash during domain
 destruction.

   I think to modify above patch to remove VT-i domain checker like
 attaced patch, until we will success to seek for the right fix.
 
This seems worse.  Instead of having an identifiable crash footprint,
 the system just hangs with this patch.  Thanks,

 I see.  In this time, I inserted dump_stack() at the condition.
What do you think about it ?

Thanks
- Tsuneshisa Doi

Preliminary fix to avoid hypervisor crash during domain destruction

Signed-off-by: Tsunehisa Doi [EMAIL PROTECTED]

diff -r ee7799388ab1 xen/arch/ia64/xen/mm.c
--- a/xen/arch/ia64/xen/mm.cWed Oct 18 22:07:18 2006 -0600
+++ b/xen/arch/ia64/xen/mm.cThu Oct 19 17:01:41 2006 +0900
@@ -399,11 +399,11 @@ gmfn_to_mfn_foreign(struct domain *d, un
unsigned long pte;
 
// This function may be called from __gnttab_copy()
-   // during destruction of VT-i domain with PV-on-HVM driver.
+   // during domain destruction with VNIF copy receiver.
// ** FIXME: This is not SMP-safe yet about p2m table. **
if (unlikely(d-arch.mm.pgd == NULL)) {
-   if (VMX_DOMAIN(d-vcpu[0]))
-   return INVALID_MFN;
+   dump_stack();   // collect footprint
+   return INVALID_MFN;
}
pte = lookup_domain_mpa(d,gpfn  PAGE_SHIFT, NULL);
if (!pte) {
___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel

[Xen-ia64-devel] Re: PATCH: makes XEN virtual mapping more flexible

2006-10-19 Thread Tristan Gingold
Le Jeudi 19 Octobre 2006 06:22, Alex Williamson a écrit :
 On Wed, 2006-10-18 at 11:53 +0200, Tristan Gingold wrote:
  Hi,
 
  By making xen virtual mapping more flexible I am able to run Xen within
  XenVTi.  This is very useful to debug Xen and also to test the VTi code.
 
  Tested by running domU and domVTI.

 Hi Tristan,

I get segfaults with this patch on both domVTI and domU.  My RHEL4U3
 VTI domain hit errors in the init scripts and my SMP domU couldn't
 complete a kernel compile.  Thanks,
Unfortunatly I confirm :-(

Tristan.

___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel


[Xen-ia64-devel] [SMP_VTI] Create/destroy 2 SMP_VTI will make xen0 hang

2006-10-19 Thread Zhang, Jingke
Hi all,
On Cset 11824, when I create/destroy 2 SMP_VTI for about 20 times,
xen0 may hang. I did not get the serial port log. The reproducing way is
very easy, just following these steps:
1. Create 2 SMP_VTI domains at the same time;
2. Wait 20 seconds (just a short time interval), note: Not let them boot
up;
3. Destroy them and repeat from step1.
Do the create/destroy operations for 20-30 times, xen0 will hang.

Thanks,
Zhangjingke

___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel


[Xen-ia64-devel] Thanks!

2006-10-19 Thread Tristan Gingold
Hi,

before leaving Bull I'd like to thanks everyone.

Thanks to HP for initiating Xen/ia64 and managing the project in a very 
democratic way.

Thanks to Intel for bringing its OEM to Xen.

Thanks to every contributors.  The xen/ia64 community is small but very 
active.  Xen/ia64 has made amazing progresses.

If any thanks to those I have forgotten!

If you need to reach me, my private email is [EMAIL PROTECTED]


Tristan.

___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel


RE: [Xen-ia64-devel] Thanks!

2006-10-19 Thread Xu, Anthony
Hi Tristan,

I have to say it's my pleasure to work with you.
Your broad knowledge, smartness and kindness impressed everybody in this 
mailing list a lot.


Anthony

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tristan Gingold
Sent: 2006年10月19日 16:56
To: xen-ia64-devel
Subject: [Xen-ia64-devel] Thanks!

Hi,

before leaving Bull I'd like to thanks everyone.

Thanks to HP for initiating Xen/ia64 and managing the project in a very
democratic way.

Thanks to Intel for bringing its OEM to Xen.

Thanks to every contributors.  The xen/ia64 community is small but very
active.  Xen/ia64 has made amazing progresses.

If any thanks to those I have forgotten!

If you need to reach me, my private email is [EMAIL PROTECTED]


Tristan.

___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel

___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel


[Xen-ia64-devel] PATCH: remove unused vmx/mm.c file.

2006-10-19 Thread Tristan Gingold
Hi,

this file is not used.
Tested by compiling.

Tristan.
# HG changeset patch
# User [EMAIL PROTECTED]
# Node ID 79e2af384825b9ed8f742d64e39eb44f1c69a32f
# Parent  ee7799388ab14c0ad2c2e0ed02db37d2445b687a
Remove unused file.

Signed-off-by: Tristan Gingold [EMAIL PROTECTED]

diff -r ee7799388ab1 -r 79e2af384825 xen/arch/ia64/vmx/mm.c
--- a/xen/arch/ia64/vmx/mm.c	Wed Oct 18 22:07:18 2006 -0600
+++ /dev/null	Thu Jan 01 00:00:00 1970 +
@@ -1,153 +0,0 @@
-/**
- * arch/ia64/mm.c
- * 
- * Copyright (c) 2002-2005 K A Fraser
- * Copyright (c) 2004 Christian Limpach
- * Copyright (c) 2005, Intel Corporation.
- *  Xuefei Xu (Anthony Xu) ([EMAIL PROTECTED])
- * 
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- * 
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- * 
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
- */
-
-/*
- * A description of the x86 page table API:
- * 
- * Domains trap to do_mmu_update with a list of update requests.
- * This is a list of (ptr, val) pairs, where the requested operation
- * is *ptr = val.
- * 
- * Reference counting of pages:
- * 
- * Each page has two refcounts: tot_count and type_count.
- * 
- * TOT_COUNT is the obvious reference count. It counts all uses of a
- * physical page frame by a domain, including uses as a page directory,
- * a page table, or simple mappings via a PTE. This count prevents a
- * domain from releasing a frame back to the free pool when it still holds
- * a reference to it.
- * 
- * TYPE_COUNT is more subtle. A frame can be put to one of three
- * mutually-exclusive uses: it might be used as a page directory, or a
- * page table, or it may be mapped writable by the domain [of course, a
- * frame may not be used in any of these three ways!].
- * So, type_count is a count of the number of times a frame is being 
- * referred to in its current incarnation. Therefore, a page can only
- * change its type when its type count is zero.
- * 
- * Pinning the page type:
- * --
- * The type of a page can be pinned/unpinned with the commands
- * MMUEXT_[UN]PIN_L?_TABLE. Each page can be pinned exactly once (that is,
- * pinning is not reference counted, so it can't be nested).
- * This is useful to prevent a page's type count falling to zero, at which
- * point safety checks would need to be carried out next time the count
- * is increased again.
- * 
- * A further note on writable page mappings:
- * -
- * For simplicity, the count of writable mappings for a page may not
- * correspond to reality. The 'writable count' is incremented for every
- * PTE which maps the page with the _PAGE_RW flag set. However, for
- * write access to be possible the page directory entry must also have
- * its _PAGE_RW bit set. We do not check this as it complicates the 
- * reference counting considerably [consider the case of multiple
- * directory entries referencing a single page table, some with the RW
- * bit set, others not -- it starts getting a bit messy].
- * In normal use, this simplification shouldn't be a problem.
- * However, the logic can be added if required.
- * 
- * One more note on read-only page mappings:
- * -
- * We want domains to be able to map pages for read-only access. The
- * main reason is that page tables and directories should be readable
- * by a domain, but it would not be safe for them to be writable.
- * However, domains have free access to rings 1  2 of the Intel
- * privilege model. In terms of page protection, these are considered
- * to be part of 'supervisor mode'. The WP bit in CR0 controls whether
- * read-only restrictions are respected in supervisor mode -- if the 
- * bit is clear then any mapped page is writable.
- * 
- * We get round this by always setting the WP bit and disallowing 
- * updates to it. This is very unlikely to cause a problem for guest
- * OS's, which will generally use the WP bit to simplify copy-on-write
- * implementation (in that case, OS wants a fault when it writes to
- * an application-supplied buffer).
- */
-
-#include xen/config.h
-//#include public/xen.h
-#include xen/init.h
-#include xen/lib.h
-#include xen/mm.h
-#include xen/errno.h
-#include asm/vmx_vcpu.h
-#include asm/vmmu.h
-#include asm/regionreg.h
-#include asm/vmx_mm_def.h
-/*
-

Re: [Xen-ia64-devel] Thanks!

2006-10-19 Thread Doi . Tsunehisa
Hi Tristan,

  Thank you for many advices and suggestion.  I've been fortunate
to have good time to work with you.

You (Tristan.Gingold) said:
 Hi,
 
 before leaving Bull I'd like to thanks everyone.
 
 Thanks to HP for initiating Xen/ia64 and managing the project in a very 
 democratic way.
 
 Thanks to Intel for bringing its OEM to Xen.
 
 Thanks to every contributors.  The xen/ia64 community is small but very 
 active.  Xen/ia64 has made amazing progresses.
 
 If any thanks to those I have forgotten!
 
 If you need to reach me, my private email is [EMAIL PROTECTED]
 
 
 Tristan.
 
 ___
 Xen-ia64-devel mailing list
 Xen-ia64-devel@lists.xensource.com
 http://lists.xensource.com/xen-ia64-devel
 

___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel


Re: [Xen-ia64-devel] Thanks!

2006-10-19 Thread Alex Williamson
On Thu, 2006-10-19 at 10:56 +0200, Tristan Gingold wrote:

 Thanks to every contributors.  The xen/ia64 community is small but very 
 active.  Xen/ia64 has made amazing progresses.

Tristan,

   You've played a huge part in our progress.  Thank you for all your
contributions!  I hope that we'll see you again even after you've left
Bull.  Thanks,

Alex 

-- 
Alex Williamson HP Open Source  Linux Org.


___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel


Re: [Xen-ia64-devel] Thanks!

2006-10-19 Thread Al Stone
On Thu, 2006-10-19 at 10:56 +0200, Tristan Gingold wrote:
 before leaving Bull I'd like to thanks everyone.

And I would like to thank you -- your contributions have been
enormous.

I wish you the best of luck in whatever you do next!

-- 
Ciao,
al
--
Al Stone  Alter Ego:
Open Source and Linux RD Debian Developer
Hewlett-Packard Company   http://www.debian.org
E-mail: [EMAIL PROTECTED][EMAIL PROTECTED]
--


___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel


Re: [Xen-ia64-devel] Thanks!

2006-10-19 Thread Aron Griffis
Tristan Gingold wrote:  [Thu Oct 19 2006, 04:56:24AM EDT]
 before leaving Bull I'd like to thanks everyone.

Tristan, thank you for helping out to get xen/ia64 into Fedora!

Aron

___
Xen-ia64-devel mailing list
Xen-ia64-devel@lists.xensource.com
http://lists.xensource.com/xen-ia64-devel