I also tried the prebuilt image and without luck:

$ ./l4image -i bootstrap_L4Linux-mag.elf launch
...

io      | Exception: Address not available: attaching ELF segment: backtrace ...
io      | L4Re: FATAL: could not load binary
mag     | libio: Warning: Finding 'icu' in system bus failed with
'Void capability invoked'
fb-drv  | libio: Warning: Finding 'icu' in system bus failed with
'Void capability invoked'
mag     | Hello from MAG

On Sun, Mar 20, 2022 at 10:38 PM Haohui Mai <ricet...@gmail.com> wrote:
>
> Hello,
>
> I'm trying to run the l4linux-mag example in the L4Re snapshot. It
> seems it will result in an unresolved page fault using the current
> snapshot (22.01.0):
>
> Loading: rom/ramdisk-amd64.rd
> INITRD: Size of RAMdisk is 4096KiB
> RAMdisk from 01816000 to 01c16000 [4096KiB]
> l4lx_thread_create: Created thread 429 (timer0) (u:b3001c00,
> v:00000000, sp:01557f28)
> WARNING: Unknown rdmsr: c0000100 at 0x212a20
> WARNING: Unknown wrmsr: c0000100 at 0x212a33
> WARNING: Unknown rdmsr: c0000100 at 0x212a4f
> WARNING: Unknown wrmsr: c0000100 at 0x212a70
> Non-resolvable page fault at 3612f82, ip 302265.
> Page fault (non-resolved): pfa=3612f82 pc=302265
> Non-resolvable page fault at 3612f82, ip 302265.
> Page fault (non-resolved): pfa=3612f82 pc=302265
> qemu-system-x86_64: terminating on signal 2
>
> Changing the console from ttyS0 to ttyLv0 will go a little bit
> further, but still result in a page fault:
>
> BUG: unable to handle page fault for address: 0000000003612f80
> #PF: user write access in kernel mode
> #PF: error_code(0x0006) - not-present page
> PGD 0 P4D 0
> Oops: 0006 [#1] SMP
> CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.15.0-l4-ge2ad9258b98e #2
> RIP: 0028:cache_alloc_refill+0x365/0x610
> Code: 54 24 24 31 db 85 d2 74 2e 49 8b 44 24 50 48 85 c0 74 11 89 df
> 41 0f af 7c 24 14 49 03 7d 28 ff d0 0f 1f 00 49 8b 55 20 89 d8 <88> 1c
> 02 83 c3 01 41 39 5c 24 24 77 d2 45 85 f6 0f 85 fd 01 00 00
> RSP: 319f9f00:000000001006bca0 EFLAGS: 00000246 ORIG_RAX: 00000000000000f0
> RAX: 0000000000000000 RBX: 0000000000000000 RCX: 6db6db6db6db6db7
> RDX: 0000000003612f80 RSI: 0000000000000001 RDI: 0000000000e57840
> RBP: 000000000000003c R08: 00000000000194ff R09: 0000000000000002
> R10: 00000000000194f8 R11: 0000000000000006 R12: 000000001001fc00
> R13: 00000880000bd3f0 R14: 0000000000000400 R15: 0000000000000dc0
> FS:  ffffffffffffffff(0000) GS:ffffffffffffffff(0000) knlGS:ffffffffffffffff
> CS:  0028 DS: 0023 ES: 0023 CR0: ffffffffffffffff
> CR2: ffffffffffffffff CR3: ffffffffffffffff CR4: ffffffffffffffff
> Call Trace:
>  ? idr_alloc_cyclic+0x52/0xb0
>  kmem_cache_alloc+0xc7/0xe0
>  __kernfs_new_node.constprop.0+0x59/0x1a0
>  ? vsnprintf+0x3e6/0x5b0
>  ? kernfs_link_sibling+0x8d/0xd0
>  ? kernfs_next_descendant_post+0x7d/0x90
>  ? kernfs_activate+0x5a/0x80
>  ? kernfs_add_one+0xdd/0x130
>  kernfs_new_node+0x1b/0x40
>  __kernfs_create_file+0x20/0xb0
>  sysfs_add_file_mode_ns+0x96/0x180
>  sysfs_create_file_ns+0x5d/0x90
>  bus_create_file+0x3f/0x60
>  bus_register+0x180/0x240
>  subsys_system_register+0x16/0x40
>  ? ntp_init+0x21/0x21
>  init_clocksource_sysfs+0xe/0x1f
>  do_one_initcall+0x44/0x190
>  kernel_init_freeable+0x161/0x1ab
>  ? rest_init+0xb0/0xb0
>  kernel_init+0x11/0x100
>
> Any ideas to debug this? Your help is appreciated.
>
> Thanks,
> Haohui

_______________________________________________
l4-hackers mailing list
l4-hackers@os.inf.tu-dresden.de
https://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers

Reply via email to