|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] [IA64] Weekly benchmark results [2009ww24]
Hi,
I report a benchmark result of this week on IPF using
xen-unstable and linux-2.6.18-xen. # not ia64 tree
- DomVTi cannot use tap:aio. When a guest started, dom0 hit BUG_ON()
at mm/rmap.c:522 and the guest hung up. Thus we used vbd.
I attached the dom0 call trace.
# Notice that DomU can use tap:aio.
TEST ENVIRONMENT
Machine : Tiger4
Kernel : 2.6.18.8-xen
Changeset : 19745:55ca7ef865b4 (xen-unstable)
903:e4790de3234a (linux-2.6.18-xen)
137:3ad73b4314e3 (efi-vfirmware)
e0bb6b8 (qemu-xen-unstable)
Dom0 OS : RHEL4 U2 (2P)
DomU OS : RHEL4 U2 (8P, using tap:aio)
DomVTi OS : RHEL4 U2 (8P, with PV-on-HVM drivers)
TEST RESULTS
DomU:
unixbench4.1.0 : Pass
bonnie++-1.03 : Pass
ltp-full-20070930 : Pass
iozone3_191 : Pass
lmbench-3.0-a5 : Pass
DomVTi: # file:
unixbench4.1.0 : Pass
bonnie++-1.03 : Pass
ltp-full-20070930 : Pass
iozone3_191 : Pass
lmbench-3.0-a5 : Pass
Best regards,
KUWAMURA Shin'ya and FUJITSU members
kernel BUG at /home/kuwa/proj/linux-2.6.18-xen.hg/mm/rmap.c:522!
tapdisk2[7632]: bugcheck! 0 [1]
Modules linked in: dm_multipath
Pid: 7632, CPU 0, comm: tapdisk2
psr : 0000101008526030 ifs : 8000000000000207 ip : [<a00000010011f7e0>]
Tainted: GF
ip is at page_remove_rmap+0xa0/0x100
unat: 0000000000000000 pfs : 4000000000000207 rsc : 0000000000000007
rnat: 000000000000000a bsps: ffffffffffffffff pr : 269002555595a9a5
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0 : a00000010011f7e0 b6 : a0000001000c7580 b7 : a000000100505f60
f6 : 1003e0000000000000028 f7 : 1003e28f5c28f5c28f5c3
f8 : 1003e00000000000000fa f9 : 1003e0000000032000000
f10 : 1003e000000003b9aca00 f11 : 1003ed6bf94d5e57a42bd
r1 : a000000101178d10 r2 : a000000100d58000 r3 : a000000100f7a3a0
r8 : 0000000000000044 r9 : 0000000000000000 r10 : a000000100fa64c0
r11 : 0000000000000000 r12 : e00000005768f890 r13 : e000000057688000
r14 : 0000000000000000 r15 : 0000000000000001 r16 : fffffffffff04c18
r17 : e000000077d77de8 r18 : 0000000000000001 r19 : fffffffffff04c18
r20 : 0000000000000004 r21 : 0000000000000001 r22 : 0000000000000000
r23 : e000000077d70048 r24 : e000000001105450 r25 : e000000001105448
r26 : e000000001105428 r27 : 0000000000000073 r28 : 0000000000000073
r29 : 0000000000000073 r30 : e000000057688034 r31 : e000000001104cd0
Call Trace:
[<a00000010001c150>] show_stack+0x50/0xa0
sp=e00000005768f400 bsp=e0000000576894e0
[<a00000010001ca20>] show_regs+0x820/0x840
sp=e00000005768f5d0 bsp=e000000057689498
[<a000000100043390>] die+0x1d0/0x380
sp=e00000005768f5d0 bsp=e000000057689450
[<a000000100043580>] die_if_kernel+0x40/0x60
sp=e00000005768f5f0 bsp=e000000057689420
[<a0000001000437e0>] ia64_bad_break+0x240/0x480
sp=e00000005768f5f0 bsp=e0000000576893f0
[<a00000010006fde0>] xen_leave_kernel+0x0/0x3e0
sp=e00000005768f6c0 bsp=e0000000576893f0
[<a00000010011f7e0>] page_remove_rmap+0xa0/0x100
sp=e00000005768f890 bsp=e0000000576893b8
[<a00000010010f6a0>] unmap_vmas+0x820/0x1360
sp=e00000005768f890 bsp=e0000000576892a0
[<a000000100110320>] zap_page_range+0x140/0x4e0
sp=e00000005768fa00 bsp=e000000057689250
[<a0000001006e4180>] blktap_device_fast_flush+0xe0/0x5e0
sp=e00000005768fac0 bsp=e0000000576891d8
[<a0000001006e48a0>] blktap_unmap+0x220/0x260
sp=e00000005768fcf0 bsp=e000000057689190
[<a0000001006e4c50>] blktap_device_finish_request+0x30/0x220
sp=e00000005768fcf0 bsp=e000000057689138
[<a0000001006e23a0>] blktap_ring_ioctl+0x400/0xa00
sp=e00000005768fcf0 bsp=e0000000576890d8
[<a000000100170590>] do_ioctl+0x150/0x180
sp=e00000005768fe10 bsp=e000000057689098
[<a000000100170e30>] vfs_ioctl+0x870/0x8c0
sp=e00000005768fe10 bsp=e000000057689040
[<a000000100170ee0>] sys_ioctl+0x60/0xc0
sp=e00000005768fe20 bsp=e000000057688fc0
[<a000000100014560>] ia64_ret_from_syscall+0x0/0x40
sp=e00000005768fe30 bsp=e000000057688fc0
[<a000000000010900>] __kernel_syscall_via_break+0x0/0x20
sp=e000000057690000 bsp=e000000057688fc0
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-devel] [IA64] Weekly benchmark results [2009ww24],
KUWAMURA Shin'ya <=
|
|
|
|
|