|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] [PATCH 0 of 4] aio event fd support to blktap2
Hmm. DEBUG_SG set, I didn't try that yet, but I didn't expect issues
either. Let's see if I manage a repro.
Daniel
On Wed, 2010-02-03 at 14:15 -0500, David P. Quigley wrote:
> ------------[ cut here ]------------
> kernel BUG at
> /home/dpquigl/linux-2.6-pvops.git/include/linux/scatterlist.h:65!
> invalid opcode: 0000 [#1] SMP
> last sysfs file: /sys/devices/virtual/block/tapdevc/removable
> CPU 1
> Modules linked in: nfs fscache ipt_MASQUERADE iptable_nat nf_nat nfsd bridge
> lockd stp nfs_acl llc auth_rpcgss bnep exportfs sco l2cap bluetooth rfkill
> sunrpc ip6t_REJECT nf_conntrack_ipv6 ip6table_filter ip6_tables ipv6
> dm_multipath uinput snd_hda_codec_analog snd_hda_intel snd_hda_codec radeon
> snd_hwdep snd_seq ttm snd_seq_device drm snd_pcm snd_timer snd ppdev
> ata_generic soundcore e1000e dcdbas parport_pc i2c_algo_bit i2c_i801
> snd_page_alloc iTCO_wdt serio_raw joydev parport pcspkr pata_acpi wmi
> iTCO_vendor_support i2c_core [last unloaded: microcode]
> Pid: 17105, comm: vol_id Not tainted 2.6.31.6-pvops-dom0 #20 OptiPlex 960
>
> RIP: e030:[<ffffffff81267d75>] [<ffffffff81267d75>] sg_set_page+0x35/0x67
> RSP: e02b:ffff8801bf03f538 EFLAGS: 00010293
> RAX: 0000000000000000 RBX: ffff8801c482e7a0 RCX: 0000000000000000
> RDX: 0000000000001000 RSI: ffffea000b7dec40 RDI: ffff8801c482e7a0
> RBP: ffff8801bf03f548 R08: 0000000087654321 R09: 0000000000000000
> R10: 0000000000000001 R11: 0000000000000000 R12: ffff8801bf066470
> R13: ffff8801bf078000 R14: ffff8801ddd4f320 R15: ffff8801bf066400
> FS: 00007f1cc9fdf6f0(0000) GS:ffffc900001d9000(0000) knlGS:0000000000000000
> CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 0000000001cf75a8 CR3: 00000001ca1df000 CR4: 0000000000002660
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Process vol_id (pid: 17105, threadinfo ffff8801bf03e000, task
> ffff8801c650c880)
> Stack:
> ffff8801bf03f558 000000000e73a217 ffff8801bf03f5c8 ffffffff8126867d
> <0> ffff8801bf03f588 ffffffff8108e686 0000000000000000 000000000173a217
> <0> ffff8801c482e7a0 0000000000000000 ffff8801bf03f5c8 000000000e73a217
> Call Trace:
> [<ffffffff8126867d>] blk_rq_map_sg+0x1c8/0x2ff
> [<ffffffff8108e686>] ? getnstimeofday+0x6e/0xd8
> [<ffffffff81313d73>] blktap_device_process_request+0xb7/0x973
> [<ffffffff81133d26>] ? check_object+0x184/0x1d3
> [<ffffffff8100f61f>] ? xen_restore_fl_direct_end+0x0/0x1
> [<ffffffff8109aab3>] ? lock_acquired+0x2b4/0x2d7
> [<ffffffff8100f61f>] ? xen_restore_fl_direct_end+0x0/0x1
> [<ffffffff813148b3>] ? blktap_device_do_request+0x1e7/0x2ca
> [<ffffffff813148b3>] ? blktap_device_do_request+0x1e7/0x2ca
> [<ffffffff813148c1>] blktap_device_do_request+0x1f5/0x2ca
> [<ffffffff81074b70>] ? del_timer+0x63/0x85
> [<ffffffff810fb538>] ? sync_page_killable+0x0/0x5e
> [<ffffffff81261134>] __generic_unplug_device+0x44/0x5f
> [<ffffffff8100f632>] ? check_events+0x12/0x20
> [<ffffffff8126118c>] generic_unplug_device+0x3d/0x64
> [<ffffffff8100eb68>] ? xen_force_evtchn_callback+0x20/0x36
> [<ffffffff8125dfdd>] blk_unplug+0x38/0x53
> [<ffffffff8125e01d>] blk_backing_dev_unplug+0x25/0x3b
> [<ffffffff8108430a>] ? prepare_to_wait_exclusive+0x34/0x8b
> [<ffffffff811682ce>] block_sync_page+0x47/0x62
> [<ffffffff810fb51b>] sync_page+0x5f/0x7c
> [<ffffffff8100f632>] ? check_events+0x12/0x20
> [<ffffffff810fb559>] sync_page_killable+0x21/0x5e
> [<ffffffff8151365c>] __wait_on_bit_lock+0x55/0xb2
> [<ffffffff8100f61f>] ? xen_restore_fl_direct_end+0x0/0x1
> [<ffffffff810fb310>] __lock_page_killable+0x73/0x8e
> [<ffffffff81084132>] ? wake_bit_function+0x0/0x5a
> [<ffffffff810fb376>] lock_page_killable+0x4b/0x66
> [<ffffffff810fd596>] generic_file_aio_read+0x385/0x52f
> [<ffffffff81141ed4>] do_sync_read+0xfa/0x14b
> [<ffffffff8100eb68>] ? xen_force_evtchn_callback+0x20/0x36
> [<ffffffff810840d3>] ? autoremove_wake_function+0x0/0x5f
> [<ffffffff81225eec>] ? security_file_permission+0x29/0x3f
> [<ffffffff81142692>] vfs_read+0xba/0x12b
> [<ffffffff811427f5>] sys_read+0x59/0x91
> [<ffffffff81014fb2>] system_call_fastpath+0x16/0x1b
> Code: 44 00 00 65 48 8b 04 25 28 00 00 00 48 89 45 f8 31 c0 40 f6 c6 03 48 8b
> 47 08 74 04 0f 0b eb fe 41 b8 21 43 65 87 4c 39 07 74 04 <0f> 0b eb fe a8 01
> 74 04 0f 0b eb fe 83 e0 03 89 4f 10 89 57 14
> RIP [<ffffffff81267d75>] sg_set_page+0x35/0x67
> RSP <ffff8801bf03f538>
> ---[ end trace c72cd6244d0817d8 ]---
>
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|