WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [PATCH 0 of 4] aio event fd support to blktap2

Hmm. DEBUG_SG set, I didn't try that yet, but I didn't expect issues
either. Let's see if I manage a repro.

Daniel

On Wed, 2010-02-03 at 14:15 -0500, David P. Quigley wrote:

> ------------[ cut here ]------------
> kernel BUG at 
> /home/dpquigl/linux-2.6-pvops.git/include/linux/scatterlist.h:65!
> invalid opcode: 0000 [#1] SMP 
> last sysfs file: /sys/devices/virtual/block/tapdevc/removable
> CPU 1 
> Modules linked in: nfs fscache ipt_MASQUERADE iptable_nat nf_nat nfsd bridge 
> lockd stp nfs_acl llc auth_rpcgss bnep exportfs sco l2cap bluetooth rfkill 
> sunrpc ip6t_REJECT nf_conntrack_ipv6 ip6table_filter ip6_tables ipv6 
> dm_multipath uinput snd_hda_codec_analog snd_hda_intel snd_hda_codec radeon 
> snd_hwdep snd_seq ttm snd_seq_device drm snd_pcm snd_timer snd ppdev 
> ata_generic soundcore e1000e dcdbas parport_pc i2c_algo_bit i2c_i801 
> snd_page_alloc iTCO_wdt serio_raw joydev parport pcspkr pata_acpi wmi 
> iTCO_vendor_support i2c_core [last unloaded: microcode]
> Pid: 17105, comm: vol_id Not tainted 2.6.31.6-pvops-dom0 #20 OptiPlex 960     
>             
> RIP: e030:[<ffffffff81267d75>]  [<ffffffff81267d75>] sg_set_page+0x35/0x67
> RSP: e02b:ffff8801bf03f538  EFLAGS: 00010293
> RAX: 0000000000000000 RBX: ffff8801c482e7a0 RCX: 0000000000000000
> RDX: 0000000000001000 RSI: ffffea000b7dec40 RDI: ffff8801c482e7a0
> RBP: ffff8801bf03f548 R08: 0000000087654321 R09: 0000000000000000
> R10: 0000000000000001 R11: 0000000000000000 R12: ffff8801bf066470
> R13: ffff8801bf078000 R14: ffff8801ddd4f320 R15: ffff8801bf066400
> FS:  00007f1cc9fdf6f0(0000) GS:ffffc900001d9000(0000) knlGS:0000000000000000
> CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 0000000001cf75a8 CR3: 00000001ca1df000 CR4: 0000000000002660
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Process vol_id (pid: 17105, threadinfo ffff8801bf03e000, task 
> ffff8801c650c880)
> Stack:
>  ffff8801bf03f558 000000000e73a217 ffff8801bf03f5c8 ffffffff8126867d
> <0> ffff8801bf03f588 ffffffff8108e686 0000000000000000 000000000173a217
> <0> ffff8801c482e7a0 0000000000000000 ffff8801bf03f5c8 000000000e73a217
> Call Trace:
>  [<ffffffff8126867d>] blk_rq_map_sg+0x1c8/0x2ff
>  [<ffffffff8108e686>] ? getnstimeofday+0x6e/0xd8
>  [<ffffffff81313d73>] blktap_device_process_request+0xb7/0x973
>  [<ffffffff81133d26>] ? check_object+0x184/0x1d3
>  [<ffffffff8100f61f>] ? xen_restore_fl_direct_end+0x0/0x1
>  [<ffffffff8109aab3>] ? lock_acquired+0x2b4/0x2d7
>  [<ffffffff8100f61f>] ? xen_restore_fl_direct_end+0x0/0x1
>  [<ffffffff813148b3>] ? blktap_device_do_request+0x1e7/0x2ca
>  [<ffffffff813148b3>] ? blktap_device_do_request+0x1e7/0x2ca
>  [<ffffffff813148c1>] blktap_device_do_request+0x1f5/0x2ca
>  [<ffffffff81074b70>] ? del_timer+0x63/0x85
>  [<ffffffff810fb538>] ? sync_page_killable+0x0/0x5e
>  [<ffffffff81261134>] __generic_unplug_device+0x44/0x5f
>  [<ffffffff8100f632>] ? check_events+0x12/0x20
>  [<ffffffff8126118c>] generic_unplug_device+0x3d/0x64
>  [<ffffffff8100eb68>] ? xen_force_evtchn_callback+0x20/0x36
>  [<ffffffff8125dfdd>] blk_unplug+0x38/0x53
>  [<ffffffff8125e01d>] blk_backing_dev_unplug+0x25/0x3b
>  [<ffffffff8108430a>] ? prepare_to_wait_exclusive+0x34/0x8b
>  [<ffffffff811682ce>] block_sync_page+0x47/0x62
>  [<ffffffff810fb51b>] sync_page+0x5f/0x7c
>  [<ffffffff8100f632>] ? check_events+0x12/0x20
>  [<ffffffff810fb559>] sync_page_killable+0x21/0x5e
>  [<ffffffff8151365c>] __wait_on_bit_lock+0x55/0xb2
>  [<ffffffff8100f61f>] ? xen_restore_fl_direct_end+0x0/0x1
>  [<ffffffff810fb310>] __lock_page_killable+0x73/0x8e
>  [<ffffffff81084132>] ? wake_bit_function+0x0/0x5a
>  [<ffffffff810fb376>] lock_page_killable+0x4b/0x66
>  [<ffffffff810fd596>] generic_file_aio_read+0x385/0x52f
>  [<ffffffff81141ed4>] do_sync_read+0xfa/0x14b
>  [<ffffffff8100eb68>] ? xen_force_evtchn_callback+0x20/0x36
>  [<ffffffff810840d3>] ? autoremove_wake_function+0x0/0x5f
>  [<ffffffff81225eec>] ? security_file_permission+0x29/0x3f
>  [<ffffffff81142692>] vfs_read+0xba/0x12b
>  [<ffffffff811427f5>] sys_read+0x59/0x91
>  [<ffffffff81014fb2>] system_call_fastpath+0x16/0x1b
> Code: 44 00 00 65 48 8b 04 25 28 00 00 00 48 89 45 f8 31 c0 40 f6 c6 03 48 8b 
> 47 08 74 04 0f 0b eb fe 41 b8 21 43 65 87 4c 39 07 74 04 <0f> 0b eb fe a8 01 
> 74 04 0f 0b eb fe 83 e0 03 89 4f 10 89 57 14 
> RIP  [<ffffffff81267d75>] sg_set_page+0x35/0x67
>  RSP <ffff8801bf03f538>
> ---[ end trace c72cd6244d0817d8 ]---
> 
> 



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel