[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Re: [b.g.o.358549] blkfront: Move blkif_interrupt into a tasklet.



On Wed, May 04, 2011 at 04:08:08PM +0200, Marcin MirosÅaw wrote:
> Hello!
> I'm hitted by issue described there:
> http://lists.xensource.com/archives/html/xen-devel/2010-09/msg00164.html
> . I'm using 32bit guest (no SMP) on 64 xen-server. On hardened-kernel
> (grsec)-2.6.{35,36} there is silence in dmesg (i don't remember what was
> going on on earlier kernels). On hardened-kernel-2.6.{37,38} and on
> vanilla-kernel-2.6.{37,38,39} and git-sources-2.6.39_rc5-r7 problem exists.

Do you always get this when you try to mount a filesystem with
barriers? And do you see this _only_ with 32-bit guests, but not with 64-bit 
ones?

> Here is link to gentoo bugzilla entry: http://bugs.gentoo.org/358549 .
> If any information could be usefull please let me know.
> Thanks for help!
> Marcin
> 
> 
> 
> [   71.870518] ------------[ cut here ]------------
> [   71.870529] WARNING: at block/blk-core.c:239 blk_start_queue+0x20/0x32()
> [   71.870532] Modules linked in: iptable_filter xt_iprange tun sit tunnel4
> xt_TCPMSS ip6table_mangle nf_conntrack_ipv6 nf_defrag_ipv6 xt_state ip6t_rt
> ip6table_filter xt_owner xt_NFQUEUE xt_multiport xt_mark xt_hashlimit
> xt_connmark ip6_tables fuse usbcore
> [   71.870578] Pid: 0, comm: swapper Tainted: G        W
> 2.6.39-rc5-git7 #1
> [   71.870581] Call Trace:
> [   71.870588]  [<c1025763>] warn_slowpath_common+0x65/0x7a
> [   71.870593]  [<c10f2879>] ? blk_start_queue+0x20/0x32
> [   71.870598]  [<c1025787>] warn_slowpath_null+0xf/0x13
> [   71.870602]  [<c10f2879>] blk_start_queue+0x20/0x32
> [   71.870608]  [<c116b4ba>] kick_pending_request_queues+0x1c/0x2a
> [   71.870613]  [<c116b68d>] blkif_interrupt+0x1c5/0x1db
> [   71.870619]  [<c104a6ec>] handle_irq_event_percpu+0x28/0x114
> [   71.870624]  [<c104a7f4>] handle_irq_event+0x1c/0x28
> [   71.870628]  [<c104bc39>] handle_fasteoi_irq+0x59/0x6f
> [   71.870633]  [<c113dc93>] __xen_evtchn_do_upcall+0x10f/0x198
> [   71.870638]  [<c113ea11>] xen_evtchn_do_upcall+0x19/0x27
> [   71.870644]  [<c1237197>] xen_do_upcall+0x7/0xc
> [   71.870650]  [<c104007b>] ? posix_clock_release+0x23/0x35
> [   71.870655]  [<c10013a7>] ? hypercall_page+0x3a7/0x1000
> [   71.870660]  [<c1004cd7>] ? xen_safe_halt+0x12/0x1d
> [   71.870665]  [<c100b77d>] default_idle+0x2c/0x4c
> [   71.870670]  [<c1005eae>] cpu_idle+0x74/0x8e
> [   71.870676]  [<c122edba>] rest_init+0x52/0x54
> [   71.870680]  [<c133c668>] start_kernel+0x29d/0x2a4
> [   71.870685]  [<c133c076>] i386_start_kernel+0x65/0x67
> [   71.870690]  [<c133d42e>] xen_start_kernel+0x568/0x570
> [   71.870693] ---[ end trace 5c490816ac9331f5 ]---
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.