[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] warning trace while starting domU



Environment: Xen 4.1.1 with Linux 3.0.4 kernel (compiled with DEBUG enabled)

I am chasing the warning trace while starting domU. Trace is as follows


Sep 12 22:18:58 ucs-xen24-srv1 kernel: ------------[ cut here ]------------
Sep 12 22:18:58 ucs-xen24-srv1 kernel: WARNING: at arch/x86/xen/mmu.c:486 xen_make_pte_debug+0xdb/0x187()
Sep 12 22:18:58 ucs-xen24-srv1 kernel: Hardware name: N20-B6625-1
Sep 12 22:18:58 ucs-xen24-srv1 kernel: 0xec0f1000 is using VM_IO, but it is 0xfffff000!
Sep 12 22:18:58 ucs-xen24-srv1 kernel: Modules linked in: veth raid1 vnp iptable_filter ip_tables bridge stp ipmi_si ipmi_devintf ipmi_msghandler nbd hoop bonding xt_tcpudp x_tables ipv6 xenfs loop dm_mirror dm_region_hash dm_log dm_multipath scsi_dh dm_mod thermal fan parport nvram sg ub enic acpi_power_meter hwmon 8250_pnp button 8250 i2c_i801 ehci_hcd serial_core ioatdma i2c_core iTCO_wdt iTCO_vendor_support uhci_hcd dca pcspkr mptsas mptscsih mptbase scsi_transport_sas sd_mod scsi_mod ext3 jbd mbcache [last unloaded: ip_tables]
Sep 12 22:18:58 ucs-xen24-srv1 kernel: Pid: 16534, comm: xend Tainted: G        W   3.0.1-11.xen0 #1
Sep 12 22:18:58 ucs-xen24-srv1 kernel: Call Trace:
Sep 12 22:18:58 ucs-xen24-srv1 kernel:  [<c100647f>] ? xen_make_pte_debug+0xdb/0x187
Sep 12 22:18:58 ucs-xen24-srv1 kernel:  [<c10351e0>] warn_slowpath_common+0x76/0x8b
Sep 12 22:18:58 ucs-xen24-srv1 kernel:  [<c100647f>] ? xen_make_pte_debug+0xdb/0x187
Sep 12 22:18:58 ucs-xen24-srv1 kernel:  [<c1035271>] warn_slowpath_fmt+0x2e/0x30
Sep 12 22:18:58 ucs-xen24-srv1 kernel:  [<c100647f>] xen_make_pte_debug+0xdb/0x187
Sep 12 22:18:58 ucs-xen24-srv1 kernel:  [<c100466e>] __raw_callee_save_xen_make_pte_debug+0x6/0x8
Sep 12 22:18:59 ucs-xen24-srv1 kernel:  [<c1004db9>] ? remap_area_mfn_pte_fn+0x60/0xf7
Sep 12 22:18:59 ucs-xen24-srv1 kernel:  [<c10842b9>] apply_to_page_range+0x1fe/0x307
Sep 12 22:18:59 ucs-xen24-srv1 kernel:  [<c100514c>] xen_remap_domain_mfn_range+0xd3/0x107
Sep 12 22:18:59 ucs-xen24-srv1 logger: /etc/xen/scripts/block: add XENBUS_PATH=backend/vbd/1/768
Sep 12 22:18:59 ucs-xen24-srv1 logger: /etc/xen/scripts/block: add XENBUS_PATH=backend/vbd/1/832
Sep 12 22:18:59 ucs-xen24-srv1 kernel:  [<c1004d59>] ? xen_make_pte+0x113/0x113
Sep 12 22:18:59 ucs-xen24-srv1 logger: /etc/xen/scripts/block: add XENBUS_PATH=backend/vbd/1/5632
Sep 12 22:18:59 ucs-xen24-srv1 logger: /etc/xen/scripts/block: add XENBUS_PATH=backend/vbd/1/5696
Sep 12 22:18:59 ucs-xen24-srv1 VRM: TP_SKT.c(1193): m_skt_connect(): Failed to connect to remote host, err=No route to host, 113
Sep 12 22:18:59 ucs-xen24-srv1 kernel:  [<c1007097>] ? xen_restore_fl_direct_reloc+0x4/0x4
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c1005352>] ? xen_flush_tlb+0x5f/0x6c
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c1024766>] ? kernel_map_pages+0xab/0x104
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c107288d>] ? get_page_from_freelist+0x255/0x39c
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c10044a5>] ? xen_mc_flush+0x101/0x1b6
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c1072b9e>] ? __alloc_pages_nodemask+0xd9/0x561
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c10823eb>] ? do_wp_page+0x348/0x879
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<f818909b>] mmap_batch_fn+0x3c/0x5b [xenfs]
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<f8188c53>] traverse_pages+0x75/0x89 [xenfs]
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<f8189022>] privcmd_ioctl+0x2ad/0x2ea [xenfs]
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<f818905f>] ? privcmd_ioctl+0x2ea/0x2ea [xenfs]
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c10884a7>] ? vma_link+0x4f/0x8d
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<f8188d75>] ? free_page_list+0x3b/0x3b [xenfs]
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c10a4734>] vfs_ioctl+0x24/0x37
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c10a48a5>] do_vfs_ioctl+0x8a/0x4df
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c1089284>] ? sys_brk+0x101/0x101
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c1089011>] ? do_mmap_pgoff+0x2bb/0x2df
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c10a4d2d>] sys_ioctl+0x33/0x57
Sep 12 22:19:00 ucs-xen24-srv1 kernel:  [<c1251d9c>] sysenter_do_call+0x12/0x2c
Sep 12 22:19:00 ucs-xen24-srv1 kernel: ---[ end trace 4eaa2a86a8e2da26 ]---

 

Following is the code from where the trace is coming. It’s clear from the code that this warning trace is observed only when the debug kernel is used. Also warning appears only once (WARN_ONCE) while starting first domU.

 

File: linux-3.0.4/arch/x86/xen/mmu.c

#ifdef CONFIG_XEN_DEBUG

pte_t xen_make_pte_debug(pteval_t pte)

{

        phys_addr_t addr = (pte & PTE_PFN_MASK);

        phys_addr_t other_addr;

        bool io_page = false;

        pte_t _pte;

 

        if (pte & _PAGE_IOMAP)

                io_page = true;

 

        _pte = xen_make_pte(pte);

 

        if (!addr)

                return _pte;

 

        if (io_page &&                                                                 

            (xen_initial_domain() || addr >= ISA_END_ADDRESS)) {

                other_addr = pfn_to_mfn(addr >> PAGE_SHIFT) << PAGE_SHIFT;

                WARN_ONCE(addr != other_addr,

                        "0x%lx is using VM_IO, but it is 0x%lx!\n",

                        (unsigned long)addr, (unsigned long)other_addr);

        } else {

                pteval_t iomap_set = (_pte.pte & PTE_FLAGS_MASK) & _PAGE_IOMAP;

                other_addr = (_pte.pte & PTE_PFN_MASK);

                WARN_ONCE((addr == other_addr) && (!io_page) && (!iomap_set),

                        "0x%lx is missing VM_IO (and wasn't fixed)!\n",

                        (unsigned long)addr);

        }

 

        return _pte;

}

PV_CALLEE_SAVE_REGS_THUNK(xen_make_pte_debug);

#endif



When googled, I found this link http://www.gossamer-threads.com/lists/xen/devel/217630, but could not find the patch he is talking about.


Could you please help me resolving this warning? or provide me more pointers and direction for debugging. Thank you in advance.


~Shri

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.