[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Re: [b.g.o.358549] blkfront: Move blkif_interrupt into a tasklet.
On Wed, May 04, 2011 at 04:08:08PM +0200, Marcin MirosÅaw wrote: > Hello! > I'm hitted by issue described there: > http://lists.xensource.com/archives/html/xen-devel/2010-09/msg00164.html > . I'm using 32bit guest (no SMP) on 64 xen-server. On hardened-kernel > (grsec)-2.6.{35,36} there is silence in dmesg (i don't remember what was > going on on earlier kernels). On hardened-kernel-2.6.{37,38} and on > vanilla-kernel-2.6.{37,38,39} and git-sources-2.6.39_rc5-r7 problem exists. Do you always get this when you try to mount a filesystem with barriers? And do you see this _only_ with 32-bit guests, but not with 64-bit ones? > Here is link to gentoo bugzilla entry: http://bugs.gentoo.org/358549 . > If any information could be usefull please let me know. > Thanks for help! > Marcin > > > > [ 71.870518] ------------[ cut here ]------------ > [ 71.870529] WARNING: at block/blk-core.c:239 blk_start_queue+0x20/0x32() > [ 71.870532] Modules linked in: iptable_filter xt_iprange tun sit tunnel4 > xt_TCPMSS ip6table_mangle nf_conntrack_ipv6 nf_defrag_ipv6 xt_state ip6t_rt > ip6table_filter xt_owner xt_NFQUEUE xt_multiport xt_mark xt_hashlimit > xt_connmark ip6_tables fuse usbcore > [ 71.870578] Pid: 0, comm: swapper Tainted: G W > 2.6.39-rc5-git7 #1 > [ 71.870581] Call Trace: > [ 71.870588] [<c1025763>] warn_slowpath_common+0x65/0x7a > [ 71.870593] [<c10f2879>] ? blk_start_queue+0x20/0x32 > [ 71.870598] [<c1025787>] warn_slowpath_null+0xf/0x13 > [ 71.870602] [<c10f2879>] blk_start_queue+0x20/0x32 > [ 71.870608] [<c116b4ba>] kick_pending_request_queues+0x1c/0x2a > [ 71.870613] [<c116b68d>] blkif_interrupt+0x1c5/0x1db > [ 71.870619] [<c104a6ec>] handle_irq_event_percpu+0x28/0x114 > [ 71.870624] [<c104a7f4>] handle_irq_event+0x1c/0x28 > [ 71.870628] [<c104bc39>] handle_fasteoi_irq+0x59/0x6f > [ 71.870633] [<c113dc93>] __xen_evtchn_do_upcall+0x10f/0x198 > [ 71.870638] [<c113ea11>] xen_evtchn_do_upcall+0x19/0x27 > [ 71.870644] [<c1237197>] xen_do_upcall+0x7/0xc > [ 71.870650] [<c104007b>] ? posix_clock_release+0x23/0x35 > [ 71.870655] [<c10013a7>] ? hypercall_page+0x3a7/0x1000 > [ 71.870660] [<c1004cd7>] ? xen_safe_halt+0x12/0x1d > [ 71.870665] [<c100b77d>] default_idle+0x2c/0x4c > [ 71.870670] [<c1005eae>] cpu_idle+0x74/0x8e > [ 71.870676] [<c122edba>] rest_init+0x52/0x54 > [ 71.870680] [<c133c668>] start_kernel+0x29d/0x2a4 > [ 71.870685] [<c133c076>] i386_start_kernel+0x65/0x67 > [ 71.870690] [<c133d42e>] xen_start_kernel+0x568/0x570 > [ 71.870693] ---[ end trace 5c490816ac9331f5 ]--- > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |