This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


Re: [Xen-devel] [IA64] Weekly benchmark results [2009ww16]

Hi Yamahata-san,

On <20090424120910.GG22299%yamahata@xxxxxxxxxxxxx>,
 Isaku Yamahata wrote:
> Can you please try this patch?

NaT consumption occurred on tapdisk while PV and HVM were booting up.
Please see the attachment file.

    Machine          : HP rx2620
    Kernel           :
    Changeset        : 19562:5599cc1e0a84 (ia64/xen-unstable)
                       863:464a925d73f1   (ia64/linux-2.6.18-xen)
                       136:eb97cb2936d6   (efi-vfirmware)
                       08251d3            (qemu-xen-unstable)
    Dom0 OS          : RHEL5.3 (2P)
    DomU OS          : RHEL4U2 (2P, using tap:aio)
    DomVTi OS        : RHEL5.2 (2P, with PV-on-HVM drivers)
    CONFIG_QEMU      : ioemu-remote

Best regards,
  KUWAMURA Shin'ya
tapdisk[4201]: NaT consumption 2216203124768 [1]
Modules linked in: xt_physdev ipt_MASQUERADE iptable_nat ip_nat xt_state 
ip_conntrack nfnetlink ipt_REJECT iptable_filter ip_tables bonding ip6t_REJECT 
xt_tcpudp ip6table_filter ip6_tables x_tables ipv6 dm_mirror dm_multipath

Pid: 4201, CPU 0, comm:              tapdisk
psr : 0000121008426010 ifs : 8000000000000814 ip  : [<a0000001001107c1>]    
Tainted: GF    
ip is at get_user_pages+0x2e1/0x740
unat: 0000000000000000 pfs : 4000000000000814 rsc : 0000000000000007
rnat: dfe0000000000000 bsps: 000000000000ffe5 pr  : 000000000069a999
ldrs: 0000000000000000 ccv : 00000000000200d2 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a000000100110530 b6  : a000000100245020 b7  : a00000010000ad40
f6  : 1003e0000000000000000 f7  : 1003e0000000000000001
f8  : 1003e0000000000000400 f9  : 1003efffffffffffffa01
f10 : 1003e000000000000003d f11 : 1003e0000000000000100
r1  : a000000101155540 r2  : 2000000000500000 r3  : e00000019e722140
r8  : e00000019e722138 r9  : e0000001b5e26380 r10 : e0000001b53c4890
r11 : 0000000000000000 r12 : e00000019e4c7db0 r13 : e00000019e4c0000
r14 : 0000000000004000 r15 : 0000000000000001 r16 : e00000019e722138
r17 : e00000019e722140 r18 : 2000000000500000 r19 : e00000019e722178
r20 : e0000001b53c4888 r21 : 000000000000000c r22 : 0000000000007fff
r23 : e0000001b53c47a4 r24 : e0000001b53c47d8 r25 : e0000001b53c47d0
r26 : 0000000000000000 r27 : 0000000000000000 r28 : 0000000000000004
r29 : 0000000000000000 r30 : e0000001b53c47b8 r31 : 0000000000003fff

Call Trace:
 [<a00000010001db00>] show_stack+0x40/0xa0
                                sp=e00000019e4c77d0 bsp=e00000019e4c1690
 [<a00000010001e760>] show_regs+0x840/0x880
                                sp=e00000019e4c79a0 bsp=e00000019e4c1638
 [<a000000100043440>] die+0x1c0/0x380
                                sp=e00000019e4c79a0 bsp=e00000019e4c15e8
 [<a000000100043650>] die_if_kernel+0x50/0x80
                                sp=e00000019e4c79c0 bsp=e00000019e4c15b8
 [<a0000001000447d0>] ia64_fault+0x1150/0x1260
                                sp=e00000019e4c79c0 bsp=e00000019e4c1560
 [<a0000001000702a0>] xen_leave_kernel+0x0/0x3e0
                                sp=e00000019e4c7be0 bsp=e00000019e4c1560
 [<a0000001001107c0>] get_user_pages+0x2e0/0x740
                                sp=e00000019e4c7db0 bsp=e00000019e4c14c0
 [<a000000100199f10>] dio_get_page+0xf0/0x380
                                sp=e00000019e4c7db0 bsp=e00000019e4c1468
 [<a00000010019ba50>] __blockdev_direct_IO+0x850/0x1aa0
                                sp=e00000019e4c7db0 bsp=e00000019e4c1388
 [<a0000001002451f0>] ext3_direct_IO+0x1d0/0x360
                                sp=e00000019e4c7db0 bsp=e00000019e4c1310
 [<a0000001000edfe0>] generic_file_direct_IO+0x160/0x220
                                sp=e00000019e4c7dc0 bsp=e00000019e4c12b8
 [<a0000001000ee480>] __generic_file_aio_read+0x1a0/0x3e0
                                sp=e00000019e4c7dc0 bsp=e00000019e4c1260
 [<a0000001000ee8b0>] generic_file_aio_read+0xb0/0xe0
                                sp=e00000019e4c7de0 bsp=e00000019e4c1228
 [<a000000100189370>] aio_pread+0xb0/0x200
                                sp=e00000019e4c7df0 bsp=e00000019e4c11e0
 [<a00000010018bb60>] aio_run_iocb+0x300/0x4e0
                                sp=e00000019e4c7df0 bsp=e00000019e4c11b0
 [<a00000010018d630>] io_submit_one+0x5f0/0x7c0
                                sp=e00000019e4c7df0 bsp=e00000019e4c1170
 [<a00000010018e580>] sys_io_submit+0x180/0x2c0
                                sp=e00000019e4c7df0 bsp=e00000019e4c10e8
 [<a000000100014520>] ia64_ret_from_syscall+0x0/0x40
                                sp=e00000019e4c7e30 bsp=e00000019e4c10e8
Xen-devel mailing list