[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

AW: Re: Re: AW: Re: [Xen-devel] AW: Load increase after memory upgrade?



>b). If you just want to use the later version of a kernel for DomU, you 
don't
>need the xen pciback. You need the xen pcifront - which has some 
bug-fixes in 2.6.39.

I started with this one. First observation: seems to generate high load 
(~20% in xentop, as opposed
to ~10% with the Xenified kernel).

Xen 4.1.1 with stable/2.6.39.x from Konrad xen.git.

Also a WARNING came up during boot, but everything works. But I thought 
you would eventually be able to 
read something from it:

[    2.850254] WARNING: at kernel/irq/handle.c:130 
handle_irq_event_percpu+0xa0/0x15f()
[    2.850274] irq 28 handler interrupt_hw+0x0/0x1b7 [saa7146] enabled 
interrupts
[    2.850288] Modules linked in: budget_ci(+) b2c2_flexcop(+) 
ir_rc5_decoder budget_core dvb_core ir_nec_decoder snd_pcm cx24123 
saa7146 snd_timer cx24113 snd ttpci_eeprom s5h1420 soundcore rc_core 
snd_page_alloc i2c_core pcspkr ext3 jbd mbcache xen_netfront 
xen_blkfront
[    2.850374] Pid: 141, comm: udevd Not tainted 2.6.39.2-xen-686 #4
[    2.850384] Call Trace:
[    2.850398]  [<c10361e8>] ? warn_slowpath_common+0x6a/0x7b
[    2.850411]  [<c107536b>] ? handle_irq_event_percpu+0xa0/0x15f
[    2.850424]  [<c103625f>] ? warn_slowpath_fmt+0x28/0x2c
[    2.850437]  [<c107536b>] ? handle_irq_event_percpu+0xa0/0x15f
[    2.850451]  [<d51cfe32>] ? SAA7146_IER_DISABLE+0x36/0x36 [saa7146]
[    2.850465]  [<c107544b>] ? handle_irq_event+0x21/0x37
[    2.850478]  [<c1076d36>] ? handle_fasteoi_irq+0x66/0x7e
[    2.850492]  [<c11a8515>] ? __xen_evtchn_do_upcall+0x129/0x1b0
[    2.850506]  [<c11a913b>] ? xen_evtchn_do_upcall+0x18/0x26
[    2.850519]  [<c12aea97>] ? xen_do_upcall+0x7/0xc
[    2.850532]  [<c114b407>] ? strcmp+0x8/0x19
[    2.850545]  [<c1104287>] ? sysfs_dentry_revalidate+0x38/0x88
[    2.850559]  [<c10ca1d1>] ? walk_component+0x18c/0x2b4
[    2.850571]  [<c1103437>] ? sysfs_permission+0x49/0x4f
[    2.850583]  [<c10ca96a>] ? link_path_walk+0x14f/0x38a
[    2.850597]  [<c1113e66>] ? security_file_alloc+0xc/0xd
[    2.850610]  [<c10cb9db>] ? path_openat+0x7f/0x27d
[    2.850623]  [<c10cbc7d>] ? do_filp_open+0x21/0x60
[    2.850635]  [<c10bdc68>] ? kmem_cache_alloc+0x21/0xd9
[    2.850647]  [<c10c921e>] ? getname_flags+0x20/0xbd
[    2.850660]  [<c10c04f4>] ? do_sys_open+0x58/0xd1
[    2.850672]  [<c10c05b1>] ? sys_open+0x1e/0x23
[    2.850684]  [<c12a901c>] ? syscall_call+0x7/0xb
[    2.850694] ---[ end trace 5b96651124c9fbda ]---




_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.