Hi Konrad,
This time the grabbing application became an hung application again in the VM,
it seems you are right, available mem is down to 0.
It always used to work with 512mb assigned to the domain.
Most probably a bug in the xhci code i assume ?
Attached: Some hopefully relevant data from /proc
--
Sander
Aug 8 20:16:17 security kernel: [ 721.555787] BUG: soft lockup - CPU#0 stuck
for 82s! [kmemleak:374]
Aug 8 20:16:17 security kernel: [ 721.555790] Modules linked in: fuse saa7115
em28xx v4l2_common videodev v4l1_compat v4l2_compat_ioctl32 videobuf_vmalloc
videobuf_core tveeprom evdev i2c_core pcspkr thermal_sys [last unloaded:
scsi_wait_scan]
Aug 8 20:16:17 security kernel: [ 721.555814] CPU 0
Aug 8 20:16:17 security kernel: [ 721.555816] Modules linked in: fuse saa7115
em28xx v4l2_common videodev v4l1_compat v4l2_compat_ioctl32 videobuf_vmalloc
videobuf_core tveeprom evdev i2c_core pcspkr thermal_sys [last unloaded:
scsi_wait_scan]
Aug 8 20:16:17 security kernel: [ 721.555838]
Aug 8 20:16:17 security kernel: [ 721.555841] Pid: 374, comm: kmemleak Not
tainted 2.6.35-rc6+xen-2.6.35-rc6-xen-isoc-20100808-l3-mutex-dma-ed+ #7 /
Aug 8 20:16:17 security kernel: [ 721.555847] RIP: e030:[<ffffffff81006318>]
[<ffffffff81006318>] xen_restore_fl_direct+0x18/0x1b
Aug 8 20:16:17 security kernel: [ 721.555858] RSP: e02b:ffff88001d8abe40
EFLAGS: 00000246
Aug 8 20:16:17 security kernel: [ 721.555861] RAX: 0000000000000000 RBX:
0000000000000000 RCX: ffff88001f7626d0
Aug 8 20:16:17 security kernel: [ 721.555865] RDX: 0000000000000000 RSI:
0000000000000200 RDI: 0000000000000200
Aug 8 20:16:17 security kernel: [ 721.555869] RBP: 0000000000000001 R08:
fffc000000000000 R09: ffff88001d8abdb0
Aug 8 20:16:17 security kernel: [ 721.555873] R10: 000000000000000c R11:
ffffea00002fdef8 R12: 0000000000000200
Aug 8 20:16:17 security kernel: [ 721.555877] R13: 0000000000000000 R14:
ffffea00002fdf01 R15: 0000000000000001
Aug 8 20:16:17 security kernel: [ 721.555886] FS: 00007fc794dfc910(0000)
GS:ffff880002ced000(0000) knlGS:0000000000000000
Aug 8 20:16:17 security kernel: [ 721.555891] CS: e033 DS: 0000 ES: 0000
CR0: 000000008005003b
Aug 8 20:16:17 security kernel: [ 721.555894] CR2: 0000000001840078 CR3:
000000001e40b000 CR4: 0000000000000660
Aug 8 20:16:17 security kernel: [ 721.559780] DR0: 0000000000000000 DR1:
0000000000000000 DR2: 0000000000000000
Aug 8 20:16:17 security kernel: [ 721.559780] DR3: 0000000000000000 DR6:
00000000ffff0ff0 DR7: 0000000000000400
Aug 8 20:16:17 security kernel: [ 721.559780] Process kmemleak (pid: 374,
threadinfo ffff88001d8aa000, task ffff88001fd918d0)
Aug 8 20:16:17 security kernel: [ 721.559780] Stack:
Aug 8 20:16:17 security kernel: [ 721.559780] ffffffff8142d77e
ffffffff810c638e 0000000000000000 ffff8800126e0260
Aug 8 20:16:17 security kernel: [ 721.559780] <0> ffffea00002fdf00
ffffffff810c6967 ffff8800149b02b0 ffffea00002fded0
Aug 8 20:16:17 security kernel: [ 721.559780] <0> 000000000000dad6
ffffea00002fdf08 0000000000020000 0000000000000000
Aug 8 20:16:17 security kernel: [ 721.559780] Call Trace:
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff8142d77e>] ?
_raw_read_unlock_irqrestore+0xd/0xe
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c638e>] ?
find_and_get_object+0x4a/0x75
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c6967>] ?
scan_block+0x4a/0xf7
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c6ce9>] ?
kmemleak_scan+0x1a2/0x3e9
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c737c>] ?
kmemleak_scan_thread+0x0/0x9b
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c737c>] ?
kmemleak_scan_thread+0x0/0x9b
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c73d5>] ?
kmemleak_scan_thread+0x59/0x9b
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff81054051>] ?
kthread+0x79/0x81
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810094e4>] ?
kernel_thread_helper+0x4/0x10
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810088e3>] ?
int_ret_from_sys_call+0x7/0x1b
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff8142dadd>] ?
retint_restore_args+0x5/0x6
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810094e0>] ?
kernel_thread_helper+0x0/0x10
Aug 8 20:16:17 security kernel: [ 721.559780] Code: 44 00 00 65 f6 04 25 21
b0 00 00 ff 0f 94 c4 00 e4 c3 90 66 f7 c7 00 02 65 0f 94 04 25 21 b0 00 00 65
66 83 3c 25 20 b0 00 00 01 <74> 05 e8 01 00 00 00 c3 50 51 52 56 57 41 50 41 51
41 52 41 53
Aug 8 20:16:17 security kernel: [ 721.559780] Call Trace:
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff8142d77e>] ?
_raw_read_unlock_irqrestore+0xd/0xe
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c638e>] ?
find_and_get_object+0x4a/0x75
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c6967>] ?
scan_block+0x4a/0xf7
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c6ce9>] ?
kmemleak_scan+0x1a2/0x3e9
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c737c>] ?
kmemleak_scan_thread+0x0/0x9b
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c737c>] ?
kmemleak_scan_thread+0x0/0x9b
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810c73d5>] ?
kmemleak_scan_thread+0x59/0x9b
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff81054051>] ?
kthread+0x79/0x81
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810094e4>] ?
kernel_thread_helper+0x4/0x10
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810088e3>] ?
int_ret_from_sys_call+0x7/0x1b
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff8142dadd>] ?
retint_restore_args+0x5/0x6
Aug 8 20:16:17 security kernel: [ 721.559780] [<ffffffff810094e0>] ?
kernel_thread_helper+0x0/0x10
Aug 8 20:16:19 security kernel: [ 724.187104] kmemleak: 5 new suspected
memory leaks (see /sys/kernel/debug/kmemleak)
Aug 8 20:16:46 security motion: [0] Thread 1 - Watchdog timeout, trying to do
a graceful restart
Aug 8 20:17:01 security /USR/SBIN/CRON[1865]: (root) CMD ( cd / && run-parts
--report /etc/cron.hourly)
Aug 8 20:17:46 security motion: [0] Thread 1 - Watchdog timeout, did NOT
restart graceful,killing it!
Aug 8 20:17:46 security motion: [0] Calling vid_close() from motion_cleanup
Aug 8 20:17:46 security motion: [0] Closing video device /dev/kworld
Aug 8 20:20:17 security kernel: [ 961.780121] INFO: task motion:1257 blocked
for more than 120 seconds.
Aug 8 20:20:17 security kernel: [ 961.780155] "echo 0 >
/proc/sys/kernel/hung_task_timeout_secs" disables this message.
Aug 8 20:20:17 security kernel: [ 961.780177] motion D
ffff88001ef60bc0 0 1257 1 0x00000000
Aug 8 20:20:17 security kernel: [ 961.780207] ffff88001fd155d0
0000000000000282 ffffffff81005cc5 00000000000145c0
Aug 8 20:20:17 security kernel: [ 961.780243] ffff88001e41dfd8
ffff88001e41dfd8 ffff88001ef60930 00000000000145c0
Aug 8 20:20:17 security kernel: [ 961.780278] 00000000000145c0
00000000000145c0 ffff88001ef60930 0000000000000000
Aug 8 20:20:17 security kernel: [ 961.780313] Call Trace:
Aug 8 20:20:17 security kernel: [ 961.780337] [<ffffffff81005cc5>] ?
xen_force_evtchn_callback+0x9/0xa
Aug 8 20:20:17 security kernel: [ 961.780365] [<ffffffffa002eaa6>] ?
video_ioctl2+0x0/0x32e [videodev]
Aug 8 20:20:17 security kernel: [ 961.780388] [<ffffffff8142c544>] ?
__mutex_lock_slowpath+0x12f/0x22c
Aug 8 20:20:17 security kernel: [ 961.780409] [<ffffffff8142c64a>] ?
mutex_lock+0x9/0x1e
Aug 8 20:20:17 security kernel: [ 961.780430] [<ffffffffa0017e58>] ?
videobuf_streamoff+0x13/0x35 [videobuf_core]
Aug 8 20:20:17 security kernel: [ 961.780454] [<ffffffff81005cc5>] ?
xen_force_evtchn_callback+0x9/0xa
Aug 8 20:20:17 security kernel: [ 961.780478] [<ffffffffa003d573>] ?
vidioc_streamoff+0x7e/0xb5 [em28xx]
Aug 8 20:20:17 security kernel: [ 961.780500] [<ffffffffa002c5fe>] ?
__video_do_ioctl+0x181f/0x3cc7 [videodev]
Aug 8 20:20:17 security kernel: [ 961.780523] [<ffffffff8100631f>] ?
xen_restore_fl_direct_end+0x0/0x1
Aug 8 20:20:17 security kernel: [ 961.780544] [<ffffffff8142d714>] ?
_raw_spin_unlock_irqrestore+0xc/0xd
Aug 8 20:20:17 security kernel: [ 961.780564] [<ffffffff813941dd>] ?
sock_def_readable+0x3b/0x5d
Aug 8 20:20:17 security kernel: [ 961.780585] [<ffffffff814043a6>] ?
unix_dgram_sendmsg+0x428/0x4b2
Aug 8 20:20:17 security kernel: [ 961.780606] [<ffffffff810058fa>] ?
xen_set_pte_at+0x196/0x1b6
Aug 8 20:20:17 security kernel: [ 961.780625] [<ffffffff810036bd>] ?
__raw_callee_save_xen_make_pte+0x11/0x1e
Aug 8 20:20:17 security kernel: [ 961.780648] [<ffffffff8139115e>] ?
sock_sendmsg+0xd1/0xec
Aug 8 20:20:17 security kernel: [ 961.780669] [<ffffffff810b0b00>] ?
__do_fault+0x40f/0x44a
Aug 8 20:20:17 security kernel: [ 961.780689] [<ffffffff81005cc5>] ?
xen_force_evtchn_callback+0x9/0xa
Aug 8 20:20:17 security kernel: [ 961.780709] [<ffffffff81006332>] ?
check_events+0x12/0x20
Aug 8 20:20:17 security kernel: [ 961.780730] [<ffffffffa002ed38>] ?
video_ioctl2+0x292/0x32e [videodev]
Aug 8 20:20:17 security kernel: [ 961.780750] [<ffffffff81002616>] ?
xen_write_msr_safe+0x5d/0x79
Aug 8 20:20:17 security kernel: [ 961.780770] [<ffffffff81007337>] ?
__switch_to+0x1b3/0x2a4
Aug 8 20:20:17 security kernel: [ 961.780790] [<ffffffff8100622a>] ?
xen_sched_clock+0xf/0x8c
Aug 8 20:20:17 security kernel: [ 961.780810] [<ffffffff81005cc5>] ?
xen_force_evtchn_callback+0x9/0xa
Aug 8 20:20:17 security kernel: [ 961.780830] [<ffffffff81006332>] ?
check_events+0x12/0x20
Aug 8 20:20:17 security kernel: [ 961.780850] [<ffffffffa002a10b>] ?
v4l2_ioctl+0x38/0x3a [videodev]
Aug 8 20:20:17 security kernel: [ 961.780870] [<ffffffff810d54be>] ?
vfs_ioctl+0x69/0x92
Aug 8 20:20:17 security kernel: [ 961.780889] [<ffffffff810d596e>] ?
do_vfs_ioctl+0x411/0x43c
Aug 8 20:20:17 security kernel: [ 961.780909] [<ffffffff810c96b4>] ?
vfs_write+0x134/0x169
Aug 8 20:20:17 security kernel: [ 961.780928] [<ffffffff810d59ea>] ?
sys_ioctl+0x51/0x70
Aug 8 20:20:17 security kernel: [ 961.780947] [<ffffffff810086c2>] ?
system_call_fastpath+0x16/0x1b
Aug 8 20:22:17 security kernel: [ 1081.780140] INFO: task motion:1257 blocked
for more than 120 seconds.
Aug 8 20:22:17 security kernel: [ 1081.780172] "echo 0 >
/proc/sys/kernel/hung_task_timeout_secs" disables this message.
Aug 8 20:22:17 security kernel: [ 1081.780194] motion D
ffff88001ef60bc0 0 1257 1 0x00000000
Aug 8 20:22:17 security kernel: [ 1081.780224] ffff88001fd155d0
0000000000000282 ffffffff81005cc5 00000000000145c0
Aug 8 20:22:17 security kernel: [ 1081.780261] ffff88001e41dfd8
ffff88001e41dfd8 ffff88001ef60930 00000000000145c0
Aug 8 20:22:17 security kernel: [ 1081.780295] 00000000000145c0
00000000000145c0 ffff88001ef60930 0000000000000000
Aug 8 20:22:17 security kernel: [ 1081.780330] Call Trace:
Aug 8 20:22:17 security kernel: [ 1081.780355] [<ffffffff81005cc5>] ?
xen_force_evtchn_callback+0x9/0xa
Aug 8 20:22:17 security kernel: [ 1081.780382] [<ffffffffa002eaa6>] ?
video_ioctl2+0x0/0x32e [videodev]
Aug 8 20:22:17 security kernel: [ 1081.780405] [<ffffffff8142c544>] ?
__mutex_lock_slowpath+0x12f/0x22c
Aug 8 20:22:17 security kernel: [ 1081.780426] [<ffffffff8142c64a>] ?
mutex_lock+0x9/0x1e
Aug 8 20:22:17 security kernel: [ 1081.780447] [<ffffffffa0017e58>] ?
videobuf_streamoff+0x13/0x35 [videobuf_core]
Aug 8 20:22:17 security kernel: [ 1081.780471] [<ffffffff81005cc5>] ?
xen_force_evtchn_callback+0x9/0xa
Aug 8 20:22:17 security kernel: [ 1081.780495] [<ffffffffa003d573>] ?
vidioc_streamoff+0x7e/0xb5 [em28xx]
Aug 8 20:22:17 security kernel: [ 1081.780517] [<ffffffffa002c5fe>] ?
__video_do_ioctl+0x181f/0x3cc7 [videodev]
Aug 8 20:22:17 security kernel: [ 1081.780540] [<ffffffff8100631f>] ?
xen_restore_fl_direct_end+0x0/0x1
Aug 8 20:22:17 security kernel: [ 1081.780561] [<ffffffff8142d714>] ?
_raw_spin_unlock_irqrestore+0xc/0xd
Aug 8 20:22:17 security kernel: [ 1081.780581] [<ffffffff813941dd>] ?
sock_def_readable+0x3b/0x5d
Aug 8 20:22:17 security kernel: [ 1081.780602] [<ffffffff814043a6>] ?
unix_dgram_sendmsg+0x428/0x4b2
Aug 8 20:22:17 security kernel: [ 1081.780622] [<ffffffff810058fa>] ?
xen_set_pte_at+0x196/0x1b6
Aug 8 20:22:17 security kernel: [ 1081.780642] [<ffffffff810036bd>] ?
__raw_callee_save_xen_make_pte+0x11/0x1e
Aug 8 20:22:17 security kernel: [ 1081.780666] [<ffffffff8139115e>] ?
sock_sendmsg+0xd1/0xec
Aug 8 20:22:17 security kernel: [ 1081.780686] [<ffffffff810b0b00>] ?
__do_fault+0x40f/0x44a
Aug 8 20:22:17 security kernel: [ 1081.780706] [<ffffffff81005cc5>] ?
xen_force_evtchn_callback+0x9/0xa
Aug 8 20:22:17 security kernel: [ 1081.780726] [<ffffffff81006332>] ?
check_events+0x12/0x20
Aug 8 20:22:17 security kernel: [ 1081.780747] [<ffffffffa002ed38>] ?
video_ioctl2+0x292/0x32e [videodev]
Aug 8 20:22:17 security kernel: [ 1081.780767] [<ffffffff81002616>] ?
xen_write_msr_safe+0x5d/0x79
Aug 8 20:22:17 security kernel: [ 1081.780787] [<ffffffff81007337>] ?
__switch_to+0x1b3/0x2a4
Aug 8 20:22:17 security kernel: [ 1081.780806] [<ffffffff8100622a>] ?
xen_sched_clock+0xf/0x8c
Aug 8 20:22:17 security kernel: [ 1081.780826] [<ffffffff81005cc5>] ?
xen_force_evtchn_callback+0x9/0xa
Aug 8 20:22:17 security kernel: [ 1081.780847] [<ffffffff81006332>] ?
check_events+0x12/0x20
Aug 8 20:22:17 security kernel: [ 1081.780866] [<ffffffffa002a10b>] ?
v4l2_ioctl+0x38/0x3a [videodev]
Aug 8 20:22:17 security kernel: [ 1081.780886] [<ffffffff810d54be>] ?
vfs_ioctl+0x69/0x92
Aug 8 20:22:17 security kernel: [ 1081.780905] [<ffffffff810d596e>] ?
do_vfs_ioctl+0x411/0x43c
Aug 8 20:22:17 security kernel: [ 1081.780925] [<ffffffff810c96b4>] ?
vfs_write+0x134/0x169
Aug 8 20:22:17 security kernel: [ 1081.780943] [<ffffffff810d59ea>] ?
sys_ioctl+0x51/0x70
Aug 8 20:22:17 security kernel: [ 1081.780961] [<ffffffff810086c2>] ?
system_call_fastpath+0x16/0x1b
Friday, August 6, 2010, 5:17:43 PM, you wrote:
> On Fri, Aug 06, 2010 at 11:21:11AM +0200, Sander Eikelenboom wrote:
>> Hi Konrad,
>>
>> Hmm it seems that 2.6.33 tree does seem to work for 1 VM with a
>> videograbber, but doesn't for the VM which seem to cause the freeze.
>> It does spit out some stacktraces after a while of not functioning, with
>> since is OOM i will be something else caused by the fall out and not
>> anywhere near the root cause.
>> Although this at least didn't freeze the complete system :-)
>> I will try some more configurations to see if i can find a pattern somehow
>> ...
>>
>> --
>> Sander
>>
>> [ 1269.032133] submit of urb 0 failed (error=-90)
>> [ 1274.153341] motion: page allocation failure. order:6, mode:0xd4
> That is a 256kB request for memery.
>> [ 1274.153375] Pid: 1884, comm: motion Not tainted 2.6.33 #5
>> [ 1274.153391] Call Trace:
>> [ 1274.153416] [<ffffffff810e4665>] __alloc_pages_nodemask+0x5b2/0x62b
>> [ 1274.153440] [<ffffffff810338b9>] ? xen_force_evtchn_callback+0xd/0xf
>> [ 1274.153461] [<ffffffff810e46f5>] __get_free_pages+0x17/0x5f
>> [ 1274.153483] [<ffffffff8128042e>] xen_swiotlb_alloc_coherent+0x3c/0xe2
>> [ 1274.153507] [<ffffffff81410931>] hcd_buffer_alloc+0xfa/0x11f
>> [ 1274.153527] [<ffffffff81403e0c>] usb_buffer_alloc+0x17/0x1d
>> [ 1274.153562] [<ffffffffa003f39e>] em28xx_init_isoc+0x16a/0x32b [em28xx]
>> [ 1274.153585] [<ffffffff815ec0b9>] ? __down_read+0x47/0xed
>> [ 1274.153613] [<ffffffffa003a4ac>] buffer_prepare+0xd7/0x10d [em28xx]
>> [ 1274.153639] [<ffffffffa0016dac>] videobuf_qbuf+0x308/0x3f4
>> [videobuf_core]
>> [ 1274.153667] [<ffffffffa0039cb3>] vidioc_qbuf+0x35/0x3a [em28xx]
>> [ 1274.153697] [<ffffffffa0028229>] __video_do_ioctl+0x11ab/0x373b
>> [videodev]
>> [ 1274.153720] [<ffffffff814b51cd>] ? sock_def_readable+0x54/0x5f
>> [ 1274.153743] [<ffffffff81541f65>] ? unix_dgram_sendmsg+0x3f1/0x43e
>> [ 1274.153764] [<ffffffff810313b5>] ?
>> __raw_callee_save_xen_pud_val+0x11/0x1e
>> [ 1274.153793] [<ffffffffa0039c7e>] ? vidioc_qbuf+0x0/0x3a [em28xx]
>> [ 1274.153814] [<ffffffff814b208b>] ? sock_sendmsg+0xa3/0xbc
>> [ 1274.153837] [<ffffffff8123349b>] ? avc_has_perm+0x4e/0x60
>> [ 1274.153855] [<ffffffff810338b9>] ? xen_force_evtchn_callback+0xd/0xf
>> [ 1274.153880] [<ffffffffa002aab1>] video_ioctl2+0x2f8/0x3af [videodev]
>> [ 1274.153901] [<ffffffff810357df>] ? __switch_to+0x265/0x277
>> [ 1274.153924] [<ffffffffa0026122>] v4l2_ioctl+0x38/0x3a [videodev]
>> [ 1274.153944] [<ffffffff8111ec90>] vfs_ioctl+0x72/0x9e
>> [ 1274.153961] [<ffffffff8111f1d7>] do_vfs_ioctl+0x4a0/0x4e1
>> [ 1274.153980] [<ffffffff8111f26d>] sys_ioctl+0x55/0x77
>> [ 1274.154000] [<ffffffff81112e6a>] ? sys_write+0x60/0x70
>> [ 1274.154009] [<ffffffff81036cc2>] system_call_fastpath+0x16/0x1b
>> [ 1274.154126] Mem-Info:
>> [ 1274.154138] DMA per-cpu:
>> [ 1274.154151] CPU 0: hi: 0, btch: 1 usd: 0
>> [ 1274.154165] CPU 1: hi: 0, btch: 1 usd: 0
>> [ 1274.154180] DMA32 per-cpu:
>> [ 1274.154202] CPU 0: hi: 186, btch: 31 usd: 0
>> [ 1274.154220] CPU 1: hi: 186, btch: 31 usd: 78
>> [ 1274.154241] active_anon:248 inactive_anon:326 isolated_anon:0
>> [ 1274.154244] active_file:132 inactive_file:105 isolated_file:41
>> [ 1274.154247] unevictable:0 dirty:0 writeback:19 unstable:0
>> [ 1274.154250] free:1309 slab_reclaimable:642 slab_unreclaimable:3111
>> [ 1274.154254] mapped:100846 shmem:4 pagetables:1187 bounce:0
>> [ 1274.154313] DMA free:2036kB min:80kB low:100kB high:120kB active_anon:0kB
>> inactive_anon:24kB active_file:20kB inactive_file:0kB unevictable:0kB
>> isolated(anon):0kB isolated(file):0kB present:14752kB mlocked:0kB dirty:0kB
>> writeback:0kB mapped:12804kB shmem:0kB slab_reclaimable:16kB
>> slab_unreclaimable:40kB kernel_stack:0kB pagetables:24kB unstable:0kB
>> bounce:0kB writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no
>> [ 1274.154375] lowmem_reserve[]: 0 489 489 489
>> [ 1274.154415] DMA32 free:3200kB min:2788kB low:3484kB high:4180kB
>> active_anon:992kB inactive_anon:1280kB active_file:508kB inactive_file:420kB
>> unevictable:0kB isolated(anon):0kB isolated(file):164kB present:500960kB
>> mlocked:0kB dirty:0kB writeback:76kB mapped:390580kB shmem:16kB
>> slab_reclaimable:2552kB slab_unreclaimable:12404kB kernel_stack:592kB
>> pagetables:4724kB unstable:0kB bounce:0kB writeback_tmp:0kB
>> pages_scanned:160 all_unreclaimable? no
>> [ 1274.154481] lowmem_reserve[]: 0 0 0 0
>> [ 1274.154508] DMA: 7*4kB 1*8kB 1*16kB 0*32kB 1*64kB 1*128kB 1*256kB 1*512kB
>> 1*1024kB 0*2048kB 0*4096kB = 2036kB
>> [ 1274.154571] DMA32: 409*4kB 33*8kB 2*16kB 0*32kB 0*64kB 0*128kB 1*256kB
>> 0*512kB 1*1024kB 0*2048kB 0*4096kB = 3212kB
>> [ 1274.154634] 429 total pagecache pages
>> [ 1274.154646] 161 pages in swap cache
>> [ 1274.154658] Swap cache stats: add 344422, delete 344260, find 99167/143153
>> [ 1274.154673] Free swap = 476756kB
>> [ 1274.154684] Total swap = 524280kB
>> [ 1274.160880] 131072 pages RAM
>> [ 1274.160902] 21934 pages reserved
>> [ 1274.160914] 101195 pages shared
>> [ 1274.160925] 6309 pages non-shared
>> [ 1274.160963] unable to allocate 185088 bytes for transfer buffer 4
> Though here it says it is 185 kbytes. Hmm.. You got 3MB in DMA32 and 2MB
> in DMA so that should be enough.
> I am not that familiar with the VM, so the instinctive thing I can think
> of is to raise the amount of memory your guest has from the 512MB to
> 768MB. Does 'proc/meminfo' when this happens show you an excedingly
> small amount of MemFree?
>> [ 1287.634682] motion invoked oom-killer: gfp_mask=0x201da, order=0,
>> oom_adj=0
>> [ 1287.634719] motion cpuset=/ mems_allowed=0
>>
>>
>>
>>
>> Thursday, August 5, 2010, 4:52:14 PM, you wrote:
>>
>> > On Thu, Aug 05, 2010 at 11:48:44AM +0200, Sander Eikelenboom wrote:
>> >> Hi Konrad/Jeremy,
>> >>
>> >> I have tested the last 2 days with the vm's with passthroughed devices
>> >> shutdown, and no freeze so far.
>> >> I'm running now with one of the vm's that runs an old 2.6.33 kernel from
>> >> an old tree from Konrad together with some hacked up patches for
>> >> xhci/usb3 support.
>> >> That seems to be running fine for some time now (although not a full 2
>> >> days yet).
>> >>
>> >> So my other vm seems to cause the freeze.
>> >>
>> >> - This one uses the devel/merge.2.6.35-rc6.t2 as domU kernel, i think i
>> >> should try an older version of pci-front/xen-swiotlb perhaps.
>> >> - It has both a usb2 and usb3 controller passed through, but the xhci
>> >> module has much changed since the hacked up patches from the kernel in de
>> >> working domU vm
>> >> - Most probably the drivers for the videograbbers will have changed
>> >>
>> >> So i suspect:
>> >> - newer pci-front / xen-swiotlb
>> >> - xhci/usb3 driver
>> >> - drivers videograbber
>> >>
>> >> Most probable would be a roque dma transfer that can't be catched by xen
>> >> / pciback I guess, and therefore would be hard to debug ?
>>
>> > The SWIOTLB "brains" by themselves haven't changed since the
>> > uhh...2.6.33. The code internals that just got Ack-ed upstream looks quite
>> > similar to the one that Jeremy carries in xen/stable-2.6.32.x. The
>> > outside plumbing parts are the ones that changed.
>>
>> > The fixes in the pci-front, well, most of those are "burocractic" in
>> > nature - set the ownership to this, make hotplug work, etc. The big
>> > fixes were the MSI/MSI-X ones but those were big news a couple of months
>> > ago (and I think that was when 2.6.34 came out).
>>
>> > The videograbber (vl4) stack trace you sent to me some time ago looked
>> > liked a mutex was held for a very very long time... which I wonder if
>> > that is the cmpxch compiler bug that has hit some folks. Are you using
>> > Debian?
>>
>> > But we can do something easy. I can rebase my 2.6.33 kernel with the
>> > latest Xen-SWIOTLB/SWIOTLB engine + Xen PCI front, and we can eliminate the
>> > SWIOTLB/PCIfront being at fault here.. Let me do that if your 2.6.33
>> > VM guest is running fine for the last two days.
>>
>>
>>
>>
>> --
>> Best regards,
>> Sander mailto:linux@xxxxxxxxxxxxxx
--
Best regards,
Sander mailto:linux@xxxxxxxxxxxxxx
interrupts.txt
Description: Text document
meminfo.txt
Description: Text document
slabinfo.txt
Description: Text document
vmallacinfo.txt
Description: Text document
vmstat.txt
Description: Text document
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|