[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] 2.6.39.3 PV DomU kernel warnings



Hello,

I've recently created guest domain and I'm getting some kernel
warnings on boot that I'm concerned about.  Here is some information
for my host and guest machines.

Dom0:
  - 64-bit
  - Xen 4.1.1
  - Linux kernel 3.0 (upstream)

DomU:
  - 32-bit
  - Linux kernel 2.6.39.3 (included with Xen 4.1.1)
  - raw image format (blktap2:aio)

dmesg | less contains the following:
...
[    0.000000] remap_numa_kva: ec600000 to pfn 0003f600
[    0.000000] 1 multicall(s) failed: cpu 0
[    0.000000] Pid: 0, comm: swapper Not tainted 2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c1485660>] ? printk+0x1d/0x25
[    0.000000]  [<c1004931>] xen_mc_flush+0x141/0x1c0
[    0.000000]  [<c102fdd0>] ? lookup_address+0xc0/0xe0
[    0.000000]  [<c10049c6>] ? __xen_mc_entry+0x16/0xf0
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000]   call  1/1: op=1 arg=[c16e99a0] result=-22
xen_extend_mmu_update+0x4a/0x70
[    0.000000] ------------[ cut here ]------------
[    0.000000] WARNING: at arch/x86/xen/multicalls.c:182
xen_mc_flush+0x1b2/0x1c0()
[    0.000000] Modules linked in:
[    0.000000] Pid: 0, comm: swapper Not tainted 2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c104ee82>] warn_slowpath_common+0x72/0xa0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c104eed2>] warn_slowpath_null+0x22/0x30
[    0.000000]  [<c10049a2>] xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c100529a>] ? xen_extend_mmu_update+0x4a/0x70
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000] ---[ end trace a7919e7f17c0a725 ]---
[    0.000000] remap_numa_kva: ec800000 to pfn 0003f800
[    0.000000] 1 multicall(s) failed: cpu 0
[    0.000000] Pid: 0, comm: swapper Tainted: G        W   2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c1485660>] ? printk+0x1d/0x25
[    0.000000]  [<c1004931>] xen_mc_flush+0x141/0x1c0
[    0.000000]  [<c102fdd0>] ? lookup_address+0xc0/0xe0
[    0.000000]  [<c10049c6>] ? __xen_mc_entry+0x16/0xf0
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000]   call  1/1: op=1 arg=[c16e99a0] result=-22
xen_extend_mmu_update+0x4a/0x70
[    0.000000] ------------[ cut here ]------------
[    0.000000] WARNING: at arch/x86/xen/multicalls.c:182
xen_mc_flush+0x1b2/0x1c0()
[    0.000000] Modules linked in:
[    0.000000] Pid: 0, comm: swapper Tainted: G        W   2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c104ee82>] warn_slowpath_common+0x72/0xa0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c104eed2>] warn_slowpath_null+0x22/0x30
[    0.000000]  [<c10049a2>] xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c100529a>] ? xen_extend_mmu_update+0x4a/0x70
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000] ---[ end trace a7919e7f17c0a726 ]---
[    0.000000] remap_numa_kva: eca00000 to pfn 0003fa00
[    0.000000] 1 multicall(s) failed: cpu 0
[    0.000000] Pid: 0, comm: swapper Tainted: G        W   2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c1485660>] ? printk+0x1d/0x25
[    0.000000]  [<c1004931>] xen_mc_flush+0x141/0x1c0
[    0.000000]  [<c102fdd0>] ? lookup_address+0xc0/0xe0
[    0.000000]  [<c10049c6>] ? __xen_mc_entry+0x16/0xf0
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000]   call  1/1: op=1 arg=[c16e99a0] result=-22
xen_extend_mmu_update+0x4a/0x70
[    0.000000] ------------[ cut here ]------------
[    0.000000] WARNING: at arch/x86/xen/multicalls.c:182
xen_mc_flush+0x1b2/0x1c0()
[    0.000000] Modules linked in:
[    0.000000] Pid: 0, comm: swapper Tainted: G        W   2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c104ee82>] warn_slowpath_common+0x72/0xa0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c104eed2>] warn_slowpath_null+0x22/0x30
[    0.000000]  [<c10049a2>] xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c100529a>] ? xen_extend_mmu_update+0x4a/0x70
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000] ---[ end trace a7919e7f17c0a727 ]---
[    0.000000] remap_numa_kva: ecc00000 to pfn 0003fc00
[    0.000000] 1 multicall(s) failed: cpu 0
[    0.000000] Pid: 0, comm: swapper Tainted: G        W   2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c1485660>] ? printk+0x1d/0x25
[    0.000000]  [<c1004931>] xen_mc_flush+0x141/0x1c0
[    0.000000]  [<c102fdd0>] ? lookup_address+0xc0/0xe0
[    0.000000]  [<c10049c6>] ? __xen_mc_entry+0x16/0xf0
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000]   call  1/1: op=1 arg=[c16e99a0] result=-22
xen_extend_mmu_update+0x4a/0x70
[    0.000000] ------------[ cut here ]------------
[    0.000000] WARNING: at arch/x86/xen/multicalls.c:182
xen_mc_flush+0x1b2/0x1c0()
[    0.000000] Modules linked in:
[    0.000000] Pid: 0, comm: swapper Tainted: G        W   2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c104ee82>] warn_slowpath_common+0x72/0xa0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c104eed2>] warn_slowpath_null+0x22/0x30
[    0.000000]  [<c10049a2>] xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c100529a>] ? xen_extend_mmu_update+0x4a/0x70
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000] ---[ end trace a7919e7f17c0a728 ]---
[    0.000000] remap_numa_kva: ece00000 to pfn 0003fe00
[    0.000000] 1 multicall(s) failed: cpu 0
[    0.000000] Pid: 0, comm: swapper Tainted: G        W   2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c1485660>] ? printk+0x1d/0x25
[    0.000000]  [<c1004931>] xen_mc_flush+0x141/0x1c0
[    0.000000]  [<c102fdd0>] ? lookup_address+0xc0/0xe0
[    0.000000]  [<c10049c6>] ? __xen_mc_entry+0x16/0xf0
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000]   call  1/1: op=1 arg=[c16e99a0] result=-22
xen_extend_mmu_update+0x4a/0x70
[    0.000000] ------------[ cut here ]------------
[    0.000000] WARNING: at arch/x86/xen/multicalls.c:182
xen_mc_flush+0x1b2/0x1c0()
[    0.000000] Modules linked in:
[    0.000000] Pid: 0, comm: swapper Tainted: G        W   2.6.39.3-smp #1
[    0.000000] Call Trace:
[    0.000000]  [<c104ee82>] warn_slowpath_common+0x72/0xa0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c10049a2>] ? xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c104eed2>] warn_slowpath_null+0x22/0x30
[    0.000000]  [<c10049a2>] xen_mc_flush+0x1b2/0x1c0
[    0.000000]  [<c100529a>] ? xen_extend_mmu_update+0x4a/0x70
[    0.000000]  [<c100665d>] xen_set_pmd_hyper+0x7d/0x80
[    0.000000]  [<c1034829>] set_pmd_pfn+0xa9/0xf0
[    0.000000]  [<c1671f46>] initmem_init+0x554/0x641
[    0.000000]  [<c13a9bcf>] ? dmi_check_system+0x1f/0x50
[    0.000000]  [<c16642b9>] setup_arch+0xa41/0xb4c
[    0.000000]  [<c100705e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8
[    0.000000]  [<c165e515>] start_kernel+0xc1/0x395
[    0.000000]  [<c165e0ce>] i386_start_kernel+0xbd/0xc5
[    0.000000]  [<c166184f>] xen_start_kernel+0x5bf/0x5c7
[    0.000000]  [<c140906e>] ? tcp_recvmsg+0x1ee/0xaf0
[    0.000000] ---[ end trace a7919e7f17c0a729 ]---
[    0.000000] High memory starts at vaddr ed1fe000
[    0.000000]   mapped low ram: 0 - 2d1fe000
[    0.000000]   low ram: 0 - 2d1fe000
[    0.000000] Zone PFN ranges:
...
[    0.779197] Write protecting the kernel text: 4652k
[    0.779669] Write protecting the kernel read-only data: 1416k
[    0.779683] NX-protecting the kernel data: 3540k
[    1.862969] udev[778]: starting version 165
[    2.270282] ------------[ cut here ]------------
[    2.270308] WARNING: at block/blk-core.c:239 blk_start_queue+0x5c/0x80()
[    2.270317] Modules linked in: ext2 ext4 mbcache jbd2
[    2.270339] Pid: 888, comm: kworker/u:0 Tainted: G        W   2.6.39.3-smp #1
[    2.270348] Call Trace:
[    2.270359]  [<c104ee82>] warn_slowpath_common+0x72/0xa0
[    2.270369]  [<c11f4bfc>] ? blk_start_queue+0x5c/0x80
[    2.270378]  [<c11f4bfc>] ? blk_start_queue+0x5c/0x80
[    2.270388]  [<c104eed2>] warn_slowpath_null+0x22/0x30
[    2.270397]  [<c11f4bfc>] blk_start_queue+0x5c/0x80
[    2.270408]  [<c12d5121>] kick_pending_request_queues+0x21/0x30
[    2.270418]  [<c12d52f4>] blkif_interrupt+0x1c4/0x250
[    2.270429]  [<c10a2870>] handle_irq_event_percpu+0x50/0x1f0
[    2.270446]  [<c10071ea>] ? xen_force_evtchn_callback+0x1a/0x30
[    2.270456]  [<c10071ea>] ? xen_force_evtchn_callback+0x1a/0x30
[    2.270466]  [<c10a2a4b>] handle_irq_event+0x3b/0x60
[    2.270476]  [<c10a4aee>] handle_fasteoi_irq+0x4e/0xc0
[    2.270487]  [<c1285423>] __xen_evtchn_do_upcall+0x173/0x210
[    2.270497]  [<c1286fa0>] xen_evtchn_do_upcall+0x20/0x40
[    2.270508]  [<c14894d7>] xen_do_upcall+0x7/0xc
[    2.270519]  [<c10c007b>] ? ftrace_define_fields_context_switch+0x5b/0x190
[    2.270529]  [<c10c00e0>] ? ftrace_define_fields_context_switch+0xc0/0x190
[    2.270539]  [<c1002227>] ? hypercall_page+0x227/0x1000
[    2.270549]  [<c10071ea>] ? xen_force_evtchn_callback+0x1a/0x30
[    2.270559]  [<c1007950>] check_events+0x8/0xc
[    2.270568]  [<c100790f>] ? xen_irq_enable_direct_reloc+0x4/0x4
[    2.270579]  [<c1052bb5>] ? do_exit+0x4f5/0x800
[    2.270589]  [<c1065330>] ____call_usermodehelper+0x90/0x90
[    2.270599]  [<c10652a0>] ? __request_module+0x1a0/0x1a0
[    2.270608]  [<c148947e>] kernel_thread_helper+0x6/0x10
[    2.270616] ---[ end trace a7919e7f17c0a72b ]---
[    2.365512] EXT4-fs (dm-0): mounted filesystem with ordered data
mode. Opts: (null)
[    2.366010] ------------[ cut here ]------------
[    2.366025] WARNING: at block/blk-core.c:239 blk_start_queue+0x5c/0x80()
[    2.366033] Modules linked in: ext2 ext4 mbcache jbd2
[    2.366057] Pid: 1, comm: init Tainted: G        W   2.6.39.3-smp #1
[    2.366058] Call Trace:
[    2.366058]  [<c104ee82>] warn_slowpath_common+0x72/0xa0
[    2.366058]  [<c11f4bfc>] ? blk_start_queue+0x5c/0x80
[    2.366058]  [<c11f4bfc>] ? blk_start_queue+0x5c/0x80
[    2.366058]  [<c104eed2>] warn_slowpath_null+0x22/0x30
[    2.366058]  [<c11f4bfc>] blk_start_queue+0x5c/0x80
[    2.366058]  [<c12d5121>] kick_pending_request_queues+0x21/0x30
[    2.366058]  [<c12d52f4>] blkif_interrupt+0x1c4/0x250
[    2.366058]  [<c10a2870>] handle_irq_event_percpu+0x50/0x1f0
[    2.366058]  [<c106cfb1>] ? remove_wait_queue+0x41/0x50
[    2.366058]  [<c10a2a4b>] handle_irq_event+0x3b/0x60
[    2.366058]  [<c10a4aee>] handle_fasteoi_irq+0x4e/0xc0
[    2.366058]  [<c1285423>] __xen_evtchn_do_upcall+0x173/0x210
[    2.366058]  [<c1286fa0>] xen_evtchn_do_upcall+0x20/0x40
[    2.366058]  [<c14894d7>] xen_do_upcall+0x7/0xc
[    2.366058] ---[ end trace a7919e7f17c0a72c ]---
[    2.425230] ------------[ cut here ]------------
[    2.425258] WARNING: at block/blk-core.c:239 blk_start_queue+0x5c/0x80()
[    2.425267] Modules linked in: ext2 ext4 mbcache jbd2
[    2.425288] Pid: 788, comm: udevd Tainted: G        W   2.6.39.3-smp #1
[    2.425296] Call Trace:
[    2.425306]  [<c104ee82>] warn_slowpath_common+0x72/0xa0
[    2.425315]  [<c11f4bfc>] ? blk_start_queue+0x5c/0x80
[    2.425324]  [<c11f4bfc>] ? blk_start_queue+0x5c/0x80
[    2.425333]  [<c104eed2>] warn_slowpath_null+0x22/0x30
[    2.425342]  [<c11f4bfc>] blk_start_queue+0x5c/0x80
[    2.425352]  [<c12d5121>] kick_pending_request_queues+0x21/0x30
[    2.425361]  [<c12d52f4>] blkif_interrupt+0x1c4/0x250
[    2.425371]  [<c1214423>] ? copy_to_user+0x33/0x50
[    2.425381]  [<c10a2870>] handle_irq_event_percpu+0x50/0x1f0
[    2.425391]  [<c10a2a4b>] handle_irq_event+0x3b/0x60
[    2.425400]  [<c10a4aee>] handle_fasteoi_irq+0x4e/0xc0
[    2.425411]  [<c1285423>] __xen_evtchn_do_upcall+0x173/0x210
[    2.425421]  [<c1286fa0>] xen_evtchn_do_upcall+0x20/0x40
[    2.425431]  [<c14894d7>] xen_do_upcall+0x7/0xc
[    2.425438] ---[ end trace a7919e7f17c0a72d ]---
[    2.426755] ------------[ cut here ]------------
[    2.426768] WARNING: at block/blk-core.c:239 blk_start_queue+0x5c/0x80()
[    2.426776] Modules linked in: ext2 ext4 mbcache jbd2
[    2.426797] Pid: 781, comm: udevd Tainted: G        W   2.6.39.3-smp #1
[    2.426805] Call Trace:
[    2.426819]  [<c104ee82>] warn_slowpath_common+0x72/0xa0
[    2.426828]  [<c11f4bfc>] ? blk_start_queue+0x5c/0x80
[    2.426837]  [<c11f4bfc>] ? blk_start_queue+0x5c/0x80
[    2.426846]  [<c104eed2>] warn_slowpath_null+0x22/0x30
[    2.426855]  [<c11f4bfc>] blk_start_queue+0x5c/0x80
[    2.426864]  [<c12d5121>] kick_pending_request_queues+0x21/0x30
[    2.426873]  [<c12d52f4>] blkif_interrupt+0x1c4/0x250
[    2.426883]  [<c10a2870>] handle_irq_event_percpu+0x50/0x1f0
[    2.426892]  [<c106cfb1>] ? remove_wait_queue+0x41/0x50
[    2.426902]  [<c10a2a4b>] handle_irq_event+0x3b/0x60
[    2.426911]  [<c10a4aee>] handle_fasteoi_irq+0x4e/0xc0
[    2.426920]  [<c1285423>] __xen_evtchn_do_upcall+0x173/0x210
[    2.426929]  [<c1286fa0>] xen_evtchn_do_upcall+0x20/0x40
[    2.426939]  [<c14894d7>] xen_do_upcall+0x7/0xc
[    2.426946] ---[ end trace a7919e7f17c0a72e ]---
[    3.083682] udev[948]: starting version 165
[    3.295127] rtc_cmos rtc_cmos: rtc core: registered rtc_cmos as rtc0
[    3.295194] rtc_cmos: probe of rtc_cmos failed with error -38
...

Any idea on what is going on and whether or not these warnings are
serious would be helpful.  I've tried the 3.0 kernel on the guest
domain with the same effect.  I've Googled for these warnings with no
success.  Has anyone else seen these warnings?

Thanks for checking this out.

Chris

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.