WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

AW: Re: Re: AW: Re: [Xen-devel] AW: Load increase after memory upgrade?

To: "konrad.wilk" <konrad.wilk@xxxxxxxxxx>
Subject: AW: Re: Re: AW: Re: [Xen-devel] AW: Load increase after memory upgrade?
From: "Carsten Schiers" <carsten@xxxxxxxxxx>
Date: Tue, 28 Jun 2011 22:17:16 +0200
Cc: linux <linux@xxxxxxxxxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Tue, 28 Jun 2011 13:19:29 -0700
Dkim-signature: v=1; a=rsa-sha256; c=simple; d=mail.zeus06.de; h=date: from:to:cc:message-id:in-reply-to:subject:mime-version: content-type:content-transfer-encoding; q=dns/txt; s=beta; bh=Lq vM7pIzOrxe+zbA2H940G7PH2szH3Zgpi5DeYkPFDA=; b=lbEkw4rCqHk3AsRsCN p9zNJuH3C7THA+MTorHlIHyGddSAILFpfKo6dMdXI03sqv1c+3pwkvQCpVCcRZOj 6TbyeSU58YipXxLvxGDBKF3XHgPKAmmkumfd51a8Mcln8m44ooWLhVxSuA0z5d4M 6eXP7fByzNw8WxeWvK1jrbzGw=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20110628145721.GC16290@xxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
>b). If you just want to use the later version of a kernel for DomU, you 
don't
>need the xen pciback. You need the xen pcifront - which has some 
bug-fixes in 2.6.39.

I started with this one. First observation: seems to generate high load 
(~20% in xentop, as opposed
to ~10% with the Xenified kernel).

Xen 4.1.1 with stable/2.6.39.x from Konrad xen.git.

Also a WARNING came up during boot, but everything works. But I thought 
you would eventually be able to 
read something from it:

[    2.850254] WARNING: at kernel/irq/handle.c:130 
handle_irq_event_percpu+0xa0/0x15f()
[    2.850274] irq 28 handler interrupt_hw+0x0/0x1b7 [saa7146] enabled 
interrupts
[    2.850288] Modules linked in: budget_ci(+) b2c2_flexcop(+) 
ir_rc5_decoder budget_core dvb_core ir_nec_decoder snd_pcm cx24123 
saa7146 snd_timer cx24113 snd ttpci_eeprom s5h1420 soundcore rc_core 
snd_page_alloc i2c_core pcspkr ext3 jbd mbcache xen_netfront 
xen_blkfront
[    2.850374] Pid: 141, comm: udevd Not tainted 2.6.39.2-xen-686 #4
[    2.850384] Call Trace:
[    2.850398]  [<c10361e8>] ? warn_slowpath_common+0x6a/0x7b
[    2.850411]  [<c107536b>] ? handle_irq_event_percpu+0xa0/0x15f
[    2.850424]  [<c103625f>] ? warn_slowpath_fmt+0x28/0x2c
[    2.850437]  [<c107536b>] ? handle_irq_event_percpu+0xa0/0x15f
[    2.850451]  [<d51cfe32>] ? SAA7146_IER_DISABLE+0x36/0x36 [saa7146]
[    2.850465]  [<c107544b>] ? handle_irq_event+0x21/0x37
[    2.850478]  [<c1076d36>] ? handle_fasteoi_irq+0x66/0x7e
[    2.850492]  [<c11a8515>] ? __xen_evtchn_do_upcall+0x129/0x1b0
[    2.850506]  [<c11a913b>] ? xen_evtchn_do_upcall+0x18/0x26
[    2.850519]  [<c12aea97>] ? xen_do_upcall+0x7/0xc
[    2.850532]  [<c114b407>] ? strcmp+0x8/0x19
[    2.850545]  [<c1104287>] ? sysfs_dentry_revalidate+0x38/0x88
[    2.850559]  [<c10ca1d1>] ? walk_component+0x18c/0x2b4
[    2.850571]  [<c1103437>] ? sysfs_permission+0x49/0x4f
[    2.850583]  [<c10ca96a>] ? link_path_walk+0x14f/0x38a
[    2.850597]  [<c1113e66>] ? security_file_alloc+0xc/0xd
[    2.850610]  [<c10cb9db>] ? path_openat+0x7f/0x27d
[    2.850623]  [<c10cbc7d>] ? do_filp_open+0x21/0x60
[    2.850635]  [<c10bdc68>] ? kmem_cache_alloc+0x21/0xd9
[    2.850647]  [<c10c921e>] ? getname_flags+0x20/0xbd
[    2.850660]  [<c10c04f4>] ? do_sys_open+0x58/0xd1
[    2.850672]  [<c10c05b1>] ? sys_open+0x1e/0x23
[    2.850684]  [<c12a901c>] ? syscall_call+0x7/0xb
[    2.850694] ---[ end trace 5b96651124c9fbda ]---




_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel