Summary: | sys-kernel/vanilla-sources-2.6.-{37,38}.* WARNING: at block/blk-core.c:260 blk_remove_plug+0x1d/0x41() | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Marcin Mirosław <bug> |
Component: | [OLD] Core system | Assignee: | Gentoo Kernel Bug Wranglers and Kernel Maintainers <kernel> |
Status: | RESOLVED UPSTREAM | ||
Severity: | minor | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.gossamer-threads.com/lists/xen/devel/205944?do=post_view_threaded#205944 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Attachments: |
kernel config
dmesg message.log from boot, kernel 3.0.0-rc4 |
Description
Marcin Mirosław
2011-03-12 14:01:35 UTC
Created attachment 265633 [details]
kernel config
Created attachment 265635 [details]
dmesg
Please test with vanilla-sources-2.6.38 $ uname -r 2.6.38 Still the same problem. [ 1.523385] udevd (465): /proc/465/oom_adj is deprecated, please use /proc/465/oom_score_adj instead. [ 2.853472] EXT4-fs (xvda5): re-mounted. Opts: acl [ 4.723519] blkfront: xvda: empty write barrier op failed [ 4.723524] blkfront: xvda: barriers disabled [ 4.984114] ------------[ cut here ]------------ [ 4.984123] WARNING: at block/blk-core.c:352 blk_start_queue+0x1d/0x2f() [ 4.984126] Modules linked in: [ 4.984132] Pid: 0, comm: swapper Not tainted 2.6.38 #1 [ 4.984135] Call Trace: [ 4.984141] [<c102316b>] ? warn_slowpath_common+0x6a/0x7d [ 4.984145] [<c10eb1c4>] ? blk_start_queue+0x1d/0x2f [ 4.984150] [<c102318b>] ? warn_slowpath_null+0xd/0x10 [ 4.984155] [<c10eb1c4>] ? blk_start_queue+0x1d/0x2f [ 4.984160] [<c115eee2>] ? kick_pending_request_queues+0x19/0x27 [ 4.984165] [<c115f0b5>] ? blkif_interrupt+0x1c5/0x1dc [ 4.984171] [<c1046508>] ? handle_IRQ_event+0x16/0x92 [ 4.984176] [<c1047970>] ? handle_fasteoi_irq+0x5c/0x82 [ 4.984182] [<c1132899>] ? __xen_evtchn_do_upcall+0x9b/0xf5 [ 4.984187] [<c1133b17>] ? xen_evtchn_do_upcall+0x16/0x23 [ 4.984193] [<c1007317>] ? xen_do_upcall+0x7/0xc [ 4.984198] [<c10013a7>] ? hypercall_page+0x3a7/0x1000 [ 4.984202] [<c1004a24>] ? xen_safe_halt+0xf/0x19 [ 4.984207] [<c100bbce>] ? default_idle+0x29/0x47 [ 4.984212] [<c1005c8c>] ? cpu_idle+0x77/0x91 [ 4.984217] [<c132462e>] ? start_kernel+0x2a2/0x2a8 [ 4.984222] [<c1325406>] ? xen_start_kernel+0x5bd/0x5c5 [ 4.984225] ---[ end trace df33656ffc6bc32d ]--- [ 4.984228] ------------[ cut here ]------------ [ 4.984232] WARNING: at block/blk-core.c:260 blk_remove_plug+0x1d/0x41() [ 4.984234] Modules linked in: [ 4.984239] Pid: 0, comm: swapper Tainted: G W 2.6.38 #1 [ 4.984242] Call Trace: [ 4.984246] [<c102316b>] ? warn_slowpath_common+0x6a/0x7d [ 4.984251] [<c10eb091>] ? blk_remove_plug+0x1d/0x41 [ 4.984255] [<c102318b>] ? warn_slowpath_null+0xd/0x10 [ 4.984260] [<c10eb091>] ? blk_remove_plug+0x1d/0x41 [ 4.984264] [<c10eb0c0>] ? __blk_run_queue+0xb/0x61 [ 4.984269] [<c115eee2>] ? kick_pending_request_queues+0x19/0x27 [ 4.984273] [<c115f0b5>] ? blkif_interrupt+0x1c5/0x1dc [ 4.984279] [<c1046508>] ? handle_IRQ_event+0x16/0x92 [ 4.984283] [<c1047970>] ? handle_fasteoi_irq+0x5c/0x82 [ 4.984288] [<c1132899>] ? __xen_evtchn_do_upcall+0x9b/0xf5 [ 4.984293] [<c1133b17>] ? xen_evtchn_do_upcall+0x16/0x23 [ 4.984298] [<c1007317>] ? xen_do_upcall+0x7/0xc [ 4.984303] [<c10013a7>] ? hypercall_page+0x3a7/0x1000 [ 4.984307] [<c1004a24>] ? xen_safe_halt+0xf/0x19 [ 4.984312] [<c100bbce>] ? default_idle+0x29/0x47 [ 4.984317] [<c1005c8c>] ? cpu_idle+0x77/0x91 [ 4.984321] [<c132462e>] ? start_kernel+0x2a2/0x2a8 [ 4.984326] [<c1325406>] ? xen_start_kernel+0x5bd/0x5c5 [ 4.984329] ---[ end trace df33656ffc6bc32e ]--- [ 5.426529] EXT4-fs (xvda1): mounted filesystem with ordered data mode. Opts: (null) [ 5.437676] ------------[ cut here ]------------ [ 5.437684] WARNING: at block/blk-core.c:352 blk_start_queue+0x1d/0x2f() [ 5.437687] Modules linked in: [ 5.437692] Pid: 0, comm: swapper Tainted: G W 2.6.38 #1 [ 5.437695] Call Trace: [ 5.437702] [<c102316b>] ? warn_slowpath_common+0x6a/0x7d [ 5.437706] [<c10eb1c4>] ? blk_start_queue+0x1d/0x2f [ 5.437711] [<c102318b>] ? warn_slowpath_null+0xd/0x10 [ 5.437716] [<c10eb1c4>] ? blk_start_queue+0x1d/0x2f [ 5.437721] [<c115eee2>] ? kick_pending_request_queues+0x19/0x27 [ 5.437726] [<c115f0b5>] ? blkif_interrupt+0x1c5/0x1dc [ 5.437732] [<c1046508>] ? handle_IRQ_event+0x16/0x92 [ 5.437737] [<c1047970>] ? handle_fasteoi_irq+0x5c/0x82 [ 5.437743] [<c1132899>] ? __xen_evtchn_do_upcall+0x9b/0xf5 [ 5.437748] [<c1133b17>] ? xen_evtchn_do_upcall+0x16/0x23 [ 5.437754] [<c1007317>] ? xen_do_upcall+0x7/0xc [ 5.437758] [<c10013a7>] ? hypercall_page+0x3a7/0x1000 [ 5.437763] [<c1004a24>] ? xen_safe_halt+0xf/0x19 [ 5.437769] [<c100bbce>] ? default_idle+0x29/0x47 [ 5.437773] [<c1005c8c>] ? cpu_idle+0x77/0x91 [ 5.437778] [<c132462e>] ? start_kernel+0x2a2/0x2a8 [ 5.437783] [<c1325406>] ? xen_start_kernel+0x5bd/0x5c5 [ 5.437786] ---[ end trace df33656ffc6bc32f ]--- [ 5.437789] ------------[ cut here ]------------ [ 5.437793] WARNING: at block/blk-core.c:260 blk_remove_plug+0x1d/0x41() [ 5.437795] Modules linked in: [ 5.437800] Pid: 0, comm: swapper Tainted: G W 2.6.38 #1 [ 5.437803] Call Trace: [ 5.437807] [<c102316b>] ? warn_slowpath_common+0x6a/0x7d [ 5.437812] [<c10eb091>] ? blk_remove_plug+0x1d/0x41 [ 5.437816] [<c102318b>] ? warn_slowpath_null+0xd/0x10 [ 5.437821] [<c10eb091>] ? blk_remove_plug+0x1d/0x41 [ 5.437825] [<c10eb0c0>] ? __blk_run_queue+0xb/0x61 [ 5.437830] [<c115eee2>] ? kick_pending_request_queues+0x19/0x27 [ 5.437834] [<c115f0b5>] ? blkif_interrupt+0x1c5/0x1dc [ 5.437840] [<c1046508>] ? handle_IRQ_event+0x16/0x92 [ 5.437844] [<c1047970>] ? handle_fasteoi_irq+0x5c/0x82 [ 5.437849] [<c1132899>] ? __xen_evtchn_do_upcall+0x9b/0xf5 [ 5.437854] [<c1133b17>] ? xen_evtchn_do_upcall+0x16/0x23 [ 5.437859] [<c1007317>] ? xen_do_upcall+0x7/0xc [ 5.437864] [<c10013a7>] ? hypercall_page+0x3a7/0x1000 [ 5.437868] [<c1004a24>] ? xen_safe_halt+0xf/0x19 [ 5.437873] [<c100bbce>] ? default_idle+0x29/0x47 [ 5.437878] [<c1005c8c>] ? cpu_idle+0x77/0x91 [ 5.437882] [<c132462e>] ? start_kernel+0x2a2/0x2a8 [ 5.437887] [<c1325406>] ? xen_start_kernel+0x5bd/0x5c5 [ 5.437890] ---[ end trace df33656ffc6bc330 ]--- [ 5.658496] EXT4-fs (dm-3): mounted filesystem with ordered data mode. Opts: (null) [ 5.733584] EXT4-fs (dm-2): mounted filesystem with ordered data mode. Opts: (null) [ 5.823870] EXT4-fs (dm-9): mounted filesystem with ordered data mode. Opts: (null) Should I see xen_start_kernel in a vanilla kernel oops? Disregard that comment. I can't see to find anything useful on your issue, can you please take to upstream at bugzilla.kernel.org Unfortunally, i can't try git-sources (with compilled debug) now. I'll try to do it as soon as it be possible. I found another report of this bug in a wiki, but without further information. You can try git-sources, just in case, but I think this bug should be reported upstream (if you do so, make sure that kernel@gentoo.org is added to the CC list, so that the bug status can be tracked). If you'd like, I could report it to b.k.o The warning is caused by "WARN_ON(!irqs_disabled)", in 2 functions inside blk-core.c, which means that for some reason the Interrupt Flag is probably not set properly, although this code runs 'inside' a spin_lock_irqsave/spin_lock_irqrestore block. I'm not reporting upstream because i don't have vnc access to xen VM. If VM hangs i need a couple hours to get assistance from admin. I can't do bisect etc, and i can't do quick test if new patch will be available :( Ok, # uname -a Linux hermes 2.6.39-rc5-git7 and i got: 71.870518] ------------[ cut here ]------------ [ 71.870529] WARNING: at block/blk-core.c:239 blk_start_queue+0x20/0x32() [ 71.870532] Modules linked in: iptable_filter xt_iprange tun sit tunnel4 xt_TCPMSS ip6table_mangle nf_conntrack_ipv6 nf_defrag_ipv6 xt_state ip6t_rt ip6table_filter xt_owner xt_NFQUEUE xt_multiport xt_mark xt_hashlimit xt_connmark ip6_tables fuse usbcore [ 71.870578] Pid: 0, comm: swapper Tainted: G W 2.6.39-rc5-git7 #1 [ 71.870581] Call Trace: [ 71.870588] [<c1025763>] warn_slowpath_common+0x65/0x7a [ 71.870593] [<c10f2879>] ? blk_start_queue+0x20/0x32 [ 71.870598] [<c1025787>] warn_slowpath_null+0xf/0x13 [ 71.870602] [<c10f2879>] blk_start_queue+0x20/0x32 [ 71.870608] [<c116b4ba>] kick_pending_request_queues+0x1c/0x2a [ 71.870613] [<c116b68d>] blkif_interrupt+0x1c5/0x1db [ 71.870619] [<c104a6ec>] handle_irq_event_percpu+0x28/0x114 [ 71.870624] [<c104a7f4>] handle_irq_event+0x1c/0x28 [ 71.870628] [<c104bc39>] handle_fasteoi_irq+0x59/0x6f [ 71.870633] [<c113dc93>] __xen_evtchn_do_upcall+0x10f/0x198 [ 71.870638] [<c113ea11>] xen_evtchn_do_upcall+0x19/0x27 [ 71.870644] [<c1237197>] xen_do_upcall+0x7/0xc [ 71.870650] [<c104007b>] ? posix_clock_release+0x23/0x35 [ 71.870655] [<c10013a7>] ? hypercall_page+0x3a7/0x1000 [ 71.870660] [<c1004cd7>] ? xen_safe_halt+0x12/0x1d [ 71.870665] [<c100b77d>] default_idle+0x2c/0x4c [ 71.870670] [<c1005eae>] cpu_idle+0x74/0x8e [ 71.870676] [<c122edba>] rest_init+0x52/0x54 [ 71.870680] [<c133c668>] start_kernel+0x29d/0x2a4 [ 71.870685] [<c133c076>] i386_start_kernel+0x65/0x67 [ 71.870690] [<c133d42e>] xen_start_kernel+0x568/0x570 [ 71.870693] ---[ end trace 5c490816ac9331f5 ]--- problem still exists. I just found a discussion in xen-devel about the same bug, but in a 2.6.32 kernel. [1] It seems that they didn't fix it, but they proposed a solution: ********************************************************** Either: Can you add a bunch of similar WARN_ONs along that path? Or: This lock is quite coarse-grained. The lock only matters for queue access, and we know irqs are reenabled, so no need for flags. In fact we only need to spin_lock_irq around the __blk_end_ calls and kick_pending_. ********************************************************** I can provide a patch for the second solution, if you want, to silence the warning, or you can try to debug it (with WARN_ONs). Of course, you can also reply to the thread at the xen-devel mailing list, to inform upstream that the bug isn't solved. And, you can also file a bug at the Kernel Bugzilla. [1] http://lists.xensource.com/archives/html/xen-devel/2010-09/msg00165.html Continue to work this on the upstream mailing list. Any fix identified we will try to back port Created attachment 278407 [details]
message.log from boot, kernel 3.0.0-rc4
|