[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [IA64] Weekly benchmark results [2009ww16]



Hi Yamahata-san,

On <20090424120910.GG22299%yamahata@xxxxxxxxxxxxx>,
 Isaku Yamahata wrote:
> 
> Can you please try this patch?

NaT consumption occurred on tapdisk while PV and HVM were booting up.
Please see the attachment file.

TEST ENVIRONMENT
    Machine          : HP rx2620
    Kernel           : 2.6.18.8-xen
    Changeset        : 19562:5599cc1e0a84 (ia64/xen-unstable)
                       863:464a925d73f1   (ia64/linux-2.6.18-xen)
                       136:eb97cb2936d6   (efi-vfirmware)
                       08251d3            (qemu-xen-unstable)
    Dom0 OS          : RHEL5.3 (2P)
    DomU OS          : RHEL4U2 (2P, using tap:aio)
    DomVTi OS        : RHEL5.2 (2P, with PV-on-HVM drivers)
    CONFIG_QEMU      : ioemu-remote

Best regards,
-- 
  KUWAMURA Shin'ya
tapdisk[4201]: NaT consumption 2216203124768 [1]
Modules linked in: xt_physdev ipt_MASQUERADE iptable_nat ip_nat xt_state 
ip_conntrack nfnetlink ipt_REJECT iptable_filter ip_tables bonding ip6t_REJECT 
xt_tcpudp ip6table_filter ip6_tables x_tables ipv6 dm_mirror dm_multipath

Pid: 4201, CPU 0, comm:              tapdisk
psr : 0000121008426010 ifs : 8000000000000814 ip  : [<a0000001001107c1>]    
Tainted: GF    
ip is at get_user_pages+0x2e1/0x740
unat: 0000000000000000 pfs : 4000000000000814 rsc : 0000000000000007
rnat: dfe0000000000000 bsps: 000000000000ffe5 pr  : 000000000069a999
ldrs: 0000000000000000 ccv : 00000000000200d2 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a000000100110530 b6  : a000000100245020 b7  : a00000010000ad40
f6  : 1003e0000000000000000 f7  : 1003e0000000000000001
f8  : 1003e0000000000000400 f9  : 1003efffffffffffffa01
f10 : 1003e000000000000003d f11 : 1003e0000000000000100
r1  : a000000101155540 r2  : 2000000000500000 r3  : e00000019e722140
r8  : e00000019e722138 r9  : e0000001b5e26380 r10 : e0000001b53c4890
r11 : 0000000000000000 r12 : e00000019e4c7db0 r13 : e00000019e4c0000
r14 : 0000000000004000 r15 : 0000000000000001 r16 : e00000019e722138
r17 : e00000019e722140 r18 : 2000000000500000 r19 : e00000019e722178
r20 : e0000001b53c4888 r21 : 000000000000000c r22 : 0000000000007fff
r23 : e0000001b53c47a4 r24 : e0000001b53c47d8 r25 : e0000001b53c47d0
r26 : 0000000000000000 r27 : 0000000000000000 r28 : 0000000000000004
r29 : 0000000000000000 r30 : e0000001b53c47b8 r31 : 0000000000003fff

Call Trace:
 [<a00000010001db00>] show_stack+0x40/0xa0
                                sp=e00000019e4c77d0 bsp=e00000019e4c1690
 [<a00000010001e760>] show_regs+0x840/0x880
                                sp=e00000019e4c79a0 bsp=e00000019e4c1638
 [<a000000100043440>] die+0x1c0/0x380
                                sp=e00000019e4c79a0 bsp=e00000019e4c15e8
 [<a000000100043650>] die_if_kernel+0x50/0x80
                                sp=e00000019e4c79c0 bsp=e00000019e4c15b8
 [<a0000001000447d0>] ia64_fault+0x1150/0x1260
                                sp=e00000019e4c79c0 bsp=e00000019e4c1560
 [<a0000001000702a0>] xen_leave_kernel+0x0/0x3e0
                                sp=e00000019e4c7be0 bsp=e00000019e4c1560
 [<a0000001001107c0>] get_user_pages+0x2e0/0x740
                                sp=e00000019e4c7db0 bsp=e00000019e4c14c0
 [<a000000100199f10>] dio_get_page+0xf0/0x380
                                sp=e00000019e4c7db0 bsp=e00000019e4c1468
 [<a00000010019ba50>] __blockdev_direct_IO+0x850/0x1aa0
                                sp=e00000019e4c7db0 bsp=e00000019e4c1388
 [<a0000001002451f0>] ext3_direct_IO+0x1d0/0x360
                                sp=e00000019e4c7db0 bsp=e00000019e4c1310
 [<a0000001000edfe0>] generic_file_direct_IO+0x160/0x220
                                sp=e00000019e4c7dc0 bsp=e00000019e4c12b8
 [<a0000001000ee480>] __generic_file_aio_read+0x1a0/0x3e0
                                sp=e00000019e4c7dc0 bsp=e00000019e4c1260
 [<a0000001000ee8b0>] generic_file_aio_read+0xb0/0xe0
                                sp=e00000019e4c7de0 bsp=e00000019e4c1228
 [<a000000100189370>] aio_pread+0xb0/0x200
                                sp=e00000019e4c7df0 bsp=e00000019e4c11e0
 [<a00000010018bb60>] aio_run_iocb+0x300/0x4e0
                                sp=e00000019e4c7df0 bsp=e00000019e4c11b0
 [<a00000010018d630>] io_submit_one+0x5f0/0x7c0
                                sp=e00000019e4c7df0 bsp=e00000019e4c1170
 [<a00000010018e580>] sys_io_submit+0x180/0x2c0
                                sp=e00000019e4c7df0 bsp=e00000019e4c10e8
 [<a000000100014520>] ia64_ret_from_syscall+0x0/0x40
                                sp=e00000019e4c7e30 bsp=e00000019e4c10e8
 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.