[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [IA64] Weekly benchmark results [2009ww24]



Hi,

I report a benchmark result of this week on IPF using
xen-unstable and linux-2.6.18-xen. # not ia64 tree

- DomVTi cannot use tap:aio. When a guest started, dom0 hit BUG_ON()
  at mm/rmap.c:522 and the guest hung up. Thus we used vbd.
  I attached the dom0 call trace.
  # Notice that DomU can use tap:aio.


TEST ENVIRONMENT
    Machine          : Tiger4
    Kernel           : 2.6.18.8-xen
    Changeset        : 19745:55ca7ef865b4 (xen-unstable)
                       903:e4790de3234a   (linux-2.6.18-xen)
                       137:3ad73b4314e3   (efi-vfirmware)
                       e0bb6b8            (qemu-xen-unstable)
    Dom0 OS          : RHEL4 U2 (2P)
    DomU OS          : RHEL4 U2 (8P, using tap:aio)
    DomVTi OS        : RHEL4 U2 (8P, with PV-on-HVM drivers)

TEST RESULTS
  DomU:
    unixbench4.1.0    : Pass
    bonnie++-1.03     : Pass
    ltp-full-20070930 : Pass
    iozone3_191       : Pass
    lmbench-3.0-a5    : Pass
  DomVTi: # file:
    unixbench4.1.0    : Pass
    bonnie++-1.03     : Pass
    ltp-full-20070930 : Pass
    iozone3_191       : Pass
    lmbench-3.0-a5    : Pass

Best regards,
KUWAMURA Shin'ya and FUJITSU members
kernel BUG at /home/kuwa/proj/linux-2.6.18-xen.hg/mm/rmap.c:522!
tapdisk2[7632]: bugcheck! 0 [1]
Modules linked in: dm_multipath

Pid: 7632, CPU 0, comm:             tapdisk2
psr : 0000101008526030 ifs : 8000000000000207 ip  : [<a00000010011f7e0>]    
Tainted: GF    
ip is at page_remove_rmap+0xa0/0x100
unat: 0000000000000000 pfs : 4000000000000207 rsc : 0000000000000007
rnat: 000000000000000a bsps: ffffffffffffffff pr  : 269002555595a9a5
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a00000010011f7e0 b6  : a0000001000c7580 b7  : a000000100505f60
f6  : 1003e0000000000000028 f7  : 1003e28f5c28f5c28f5c3
f8  : 1003e00000000000000fa f9  : 1003e0000000032000000
f10 : 1003e000000003b9aca00 f11 : 1003ed6bf94d5e57a42bd
r1  : a000000101178d10 r2  : a000000100d58000 r3  : a000000100f7a3a0
r8  : 0000000000000044 r9  : 0000000000000000 r10 : a000000100fa64c0
r11 : 0000000000000000 r12 : e00000005768f890 r13 : e000000057688000
r14 : 0000000000000000 r15 : 0000000000000001 r16 : fffffffffff04c18
r17 : e000000077d77de8 r18 : 0000000000000001 r19 : fffffffffff04c18
r20 : 0000000000000004 r21 : 0000000000000001 r22 : 0000000000000000
r23 : e000000077d70048 r24 : e000000001105450 r25 : e000000001105448
r26 : e000000001105428 r27 : 0000000000000073 r28 : 0000000000000073
r29 : 0000000000000073 r30 : e000000057688034 r31 : e000000001104cd0

Call Trace:
 [<a00000010001c150>] show_stack+0x50/0xa0
                                sp=e00000005768f400 bsp=e0000000576894e0
 [<a00000010001ca20>] show_regs+0x820/0x840
                                sp=e00000005768f5d0 bsp=e000000057689498
 [<a000000100043390>] die+0x1d0/0x380
                                sp=e00000005768f5d0 bsp=e000000057689450
 [<a000000100043580>] die_if_kernel+0x40/0x60
                                sp=e00000005768f5f0 bsp=e000000057689420
 [<a0000001000437e0>] ia64_bad_break+0x240/0x480
                                sp=e00000005768f5f0 bsp=e0000000576893f0
 [<a00000010006fde0>] xen_leave_kernel+0x0/0x3e0
                                sp=e00000005768f6c0 bsp=e0000000576893f0
 [<a00000010011f7e0>] page_remove_rmap+0xa0/0x100
                                sp=e00000005768f890 bsp=e0000000576893b8
 [<a00000010010f6a0>] unmap_vmas+0x820/0x1360
                                sp=e00000005768f890 bsp=e0000000576892a0
 [<a000000100110320>] zap_page_range+0x140/0x4e0
                                sp=e00000005768fa00 bsp=e000000057689250
 [<a0000001006e4180>] blktap_device_fast_flush+0xe0/0x5e0
                                sp=e00000005768fac0 bsp=e0000000576891d8
 [<a0000001006e48a0>] blktap_unmap+0x220/0x260
                                sp=e00000005768fcf0 bsp=e000000057689190
 [<a0000001006e4c50>] blktap_device_finish_request+0x30/0x220
                                sp=e00000005768fcf0 bsp=e000000057689138
 [<a0000001006e23a0>] blktap_ring_ioctl+0x400/0xa00
                                sp=e00000005768fcf0 bsp=e0000000576890d8
 [<a000000100170590>] do_ioctl+0x150/0x180
                                sp=e00000005768fe10 bsp=e000000057689098
 [<a000000100170e30>] vfs_ioctl+0x870/0x8c0
                                sp=e00000005768fe10 bsp=e000000057689040
 [<a000000100170ee0>] sys_ioctl+0x60/0xc0
                                sp=e00000005768fe20 bsp=e000000057688fc0
 [<a000000100014560>] ia64_ret_from_syscall+0x0/0x40
                                sp=e00000005768fe30 bsp=e000000057688fc0
 [<a000000000010900>] __kernel_syscall_via_break+0x0/0x20
                                sp=e000000057690000 bsp=e000000057688fc0
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.