[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [IA64] Weekly benchmark results [2009ww24]
Hi, I report a benchmark result of this week on IPF using xen-unstable and linux-2.6.18-xen. # not ia64 tree - DomVTi cannot use tap:aio. When a guest started, dom0 hit BUG_ON() at mm/rmap.c:522 and the guest hung up. Thus we used vbd. I attached the dom0 call trace. # Notice that DomU can use tap:aio. TEST ENVIRONMENT Machine : Tiger4 Kernel : 2.6.18.8-xen Changeset : 19745:55ca7ef865b4 (xen-unstable) 903:e4790de3234a (linux-2.6.18-xen) 137:3ad73b4314e3 (efi-vfirmware) e0bb6b8 (qemu-xen-unstable) Dom0 OS : RHEL4 U2 (2P) DomU OS : RHEL4 U2 (8P, using tap:aio) DomVTi OS : RHEL4 U2 (8P, with PV-on-HVM drivers) TEST RESULTS DomU: unixbench4.1.0 : Pass bonnie++-1.03 : Pass ltp-full-20070930 : Pass iozone3_191 : Pass lmbench-3.0-a5 : Pass DomVTi: # file: unixbench4.1.0 : Pass bonnie++-1.03 : Pass ltp-full-20070930 : Pass iozone3_191 : Pass lmbench-3.0-a5 : Pass Best regards, KUWAMURA Shin'ya and FUJITSU members kernel BUG at /home/kuwa/proj/linux-2.6.18-xen.hg/mm/rmap.c:522! tapdisk2[7632]: bugcheck! 0 [1] Modules linked in: dm_multipath Pid: 7632, CPU 0, comm: tapdisk2 psr : 0000101008526030 ifs : 8000000000000207 ip : [<a00000010011f7e0>] Tainted: GF ip is at page_remove_rmap+0xa0/0x100 unat: 0000000000000000 pfs : 4000000000000207 rsc : 0000000000000007 rnat: 000000000000000a bsps: ffffffffffffffff pr : 269002555595a9a5 ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f csd : 0000000000000000 ssd : 0000000000000000 b0 : a00000010011f7e0 b6 : a0000001000c7580 b7 : a000000100505f60 f6 : 1003e0000000000000028 f7 : 1003e28f5c28f5c28f5c3 f8 : 1003e00000000000000fa f9 : 1003e0000000032000000 f10 : 1003e000000003b9aca00 f11 : 1003ed6bf94d5e57a42bd r1 : a000000101178d10 r2 : a000000100d58000 r3 : a000000100f7a3a0 r8 : 0000000000000044 r9 : 0000000000000000 r10 : a000000100fa64c0 r11 : 0000000000000000 r12 : e00000005768f890 r13 : e000000057688000 r14 : 0000000000000000 r15 : 0000000000000001 r16 : fffffffffff04c18 r17 : e000000077d77de8 r18 : 0000000000000001 r19 : fffffffffff04c18 r20 : 0000000000000004 r21 : 0000000000000001 r22 : 0000000000000000 r23 : e000000077d70048 r24 : e000000001105450 r25 : e000000001105448 r26 : e000000001105428 r27 : 0000000000000073 r28 : 0000000000000073 r29 : 0000000000000073 r30 : e000000057688034 r31 : e000000001104cd0 Call Trace: [<a00000010001c150>] show_stack+0x50/0xa0 sp=e00000005768f400 bsp=e0000000576894e0 [<a00000010001ca20>] show_regs+0x820/0x840 sp=e00000005768f5d0 bsp=e000000057689498 [<a000000100043390>] die+0x1d0/0x380 sp=e00000005768f5d0 bsp=e000000057689450 [<a000000100043580>] die_if_kernel+0x40/0x60 sp=e00000005768f5f0 bsp=e000000057689420 [<a0000001000437e0>] ia64_bad_break+0x240/0x480 sp=e00000005768f5f0 bsp=e0000000576893f0 [<a00000010006fde0>] xen_leave_kernel+0x0/0x3e0 sp=e00000005768f6c0 bsp=e0000000576893f0 [<a00000010011f7e0>] page_remove_rmap+0xa0/0x100 sp=e00000005768f890 bsp=e0000000576893b8 [<a00000010010f6a0>] unmap_vmas+0x820/0x1360 sp=e00000005768f890 bsp=e0000000576892a0 [<a000000100110320>] zap_page_range+0x140/0x4e0 sp=e00000005768fa00 bsp=e000000057689250 [<a0000001006e4180>] blktap_device_fast_flush+0xe0/0x5e0 sp=e00000005768fac0 bsp=e0000000576891d8 [<a0000001006e48a0>] blktap_unmap+0x220/0x260 sp=e00000005768fcf0 bsp=e000000057689190 [<a0000001006e4c50>] blktap_device_finish_request+0x30/0x220 sp=e00000005768fcf0 bsp=e000000057689138 [<a0000001006e23a0>] blktap_ring_ioctl+0x400/0xa00 sp=e00000005768fcf0 bsp=e0000000576890d8 [<a000000100170590>] do_ioctl+0x150/0x180 sp=e00000005768fe10 bsp=e000000057689098 [<a000000100170e30>] vfs_ioctl+0x870/0x8c0 sp=e00000005768fe10 bsp=e000000057689040 [<a000000100170ee0>] sys_ioctl+0x60/0xc0 sp=e00000005768fe20 bsp=e000000057688fc0 [<a000000100014560>] ia64_ret_from_syscall+0x0/0x40 sp=e00000005768fe30 bsp=e000000057688fc0 [<a000000000010900>] __kernel_syscall_via_break+0x0/0x20 sp=e000000057690000 bsp=e000000057688fc0 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |