[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] pci-passthrough: suspected kmemleaks
Hi Konrad, I encountered these suspected kmemleaks after starting a VM with pci device passed through, of which some seem potential related to pciback. -- Sander unreferenced object 0xffff88002ff077e0 (size 72): comm "swapper", pid 1, jiffies 4294667523 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 0e 01 01 00 00 00 00 00 ................ 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff81119500>] kmem_cache_alloc+0x136/0x185 [<ffffffff81285377>] acpi_ut_allocate_object_desc_dbg+0x4c/0x88 [<ffffffff812853d5>] acpi_ut_create_internal_object_dbg+0x22/0x88 [<ffffffff81273dbf>] acpi_ex_read_data_from_field+0xf2/0x157 [<ffffffff81278ce3>] acpi_ex_resolve_node_to_value+0x18f/0x220 [<ffffffff8127481b>] acpi_ex_resolve_to_value+0x205/0x216 [<ffffffff8126ecb0>] acpi_ds_evaluate_name_path+0x7a/0xff [<ffffffff8126d8ab>] acpi_ds_exec_end_op+0x94/0x3d9 [<ffffffff8127f78b>] acpi_ps_parse_loop+0x80a/0x98b [<ffffffff8127e835>] acpi_ps_parse_aml+0x9a/0x2d9 [<ffffffff8127ffd2>] acpi_ps_execute_method+0x1dd/0x2ab [<ffffffff8127b79a>] acpi_ns_evaluate+0xee/0x1b6 [<ffffffff8127b964>] acpi_ns_exec_module_code_list+0x102/0x17e [<ffffffff812840c4>] acpi_initialize_objects+0x1f/0x59 [<ffffffff819d1d5b>] acpi_init+0x102/0x2cc unreferenced object 0xffff88002f0b71e0 (size 32): comm "swapper", pid 1, jiffies 4294668424 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 [<ffffffff81243e54>] pci_enable_device+0xe/0x10 [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e unreferenced object 0xffff88002f0b7200 (size 32): comm "swapper", pid 1, jiffies 4294668426 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 [<ffffffff81243e54>] pci_enable_device+0xe/0x10 [<ffffffff812401f3>] pci_enable_bridges+0x2a/0x4e unreferenced object 0xffff88002c0b5ea0 (size 32): comm "swapper", pid 1, jiffies 4294669364 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 [<ffffffff81243e54>] pci_enable_device+0xe/0x10 [<ffffffff81243ed0>] pcim_enable_device+0x7a/0x9a unreferenced object 0xffff88002c0b5ba0 (size 32): comm "swapper", pid 1, jiffies 4294669478 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 [<ffffffff81243efe>] pci_enable_device_mem+0xe/0x10 [<ffffffff815c5b0c>] e1000_probe+0x39/0xbcd unreferenced object 0xffff88002c0b5d40 (size 32): comm "swapper", pid 1, jiffies 4294669478 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1 [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87 [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138 [<ffffffff8124d053>] pci_enable_msi_block+0x26c/0x306 [<ffffffff8137af57>] e1000e_set_interrupt_capability+0xd2/0x114 [<ffffffff815c5e04>] e1000_probe+0x331/0xbcd [<ffffffff8124505b>] local_pci_probe+0x12/0x16 [<ffffffff812452d9>] pci_device_probe+0x5c/0x86 unreferenced object 0xffff88002c0b5e80 (size 32): comm "swapper", pid 1, jiffies 4294669592 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff81299cb8>] xen_allocate_pirq+0x99/0x185 [<ffffffff8103bef3>] xen_register_pirq+0x3e/0x98 [<ffffffff8103bf8f>] xen_register_gsi+0x42/0xb3 [<ffffffff810535bd>] acpi_register_gsi+0x22/0x5f [<ffffffff812699ed>] acpi_pci_irq_enable+0x11f/0x212 [<ffffffff8149ddf4>] pcibios_enable_device+0x29/0x2d [<ffffffff81243dbe>] do_pci_enable_device+0x28/0x40 [<ffffffff81243e2b>] __pci_enable_device_flags+0x55/0x70 [<ffffffff81243e54>] pci_enable_device+0xe/0x10 [<ffffffff815d3e61>] i801_probe+0x98/0x2b4 unreferenced object 0xffff88002ff01c40 (size 32): comm "xenstored", pid 5411, jiffies 4295057498 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1 [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8 [<ffffffff81299a49>] bind_evtchn_to_irqhandler+0x22/0x5b [<ffffffff8129f11c>] evtchn_bind_to_user+0x4c/0x57 [<ffffffff8129f235>] evtchn_ioctl+0x10e/0x2ed [<ffffffff8112cbb8>] vfs_ioctl+0x2a/0x78 [<ffffffff8112d12b>] do_vfs_ioctl+0x4aa/0x4e7 [<ffffffff8112d1bd>] sys_ioctl+0x55/0x77 [<ffffffff8103dd42>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88002f0bb498 (size 8): comm "xenbus", pid 34, jiffies 4295058172 hex dump (first 8 bytes): 77 00 0b 2f 00 88 ff ff w../.... backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff8129ba45>] xenbus_thread+0xcc/0x281 [<ffffffff81093376>] kthread+0x7d/0x85 [<ffffffff8103eeaa>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88002b9a5a08 (size 8): comm "xenbus", pid 34, jiffies 4295058332 hex dump (first 8 bytes): 77 00 9a 2b 00 88 ff ff w..+.... backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff8129ba45>] xenbus_thread+0xcc/0x281 [<ffffffff81093376>] kthread+0x7d/0x85 [<ffffffff8103eeaa>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88002ff06258 (size 8): comm "xenbus", pid 34, jiffies 4295059316 hex dump (first 8 bytes): 77 00 f0 2f 00 88 ff ff w../.... backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff8129ba45>] xenbus_thread+0xcc/0x281 [<ffffffff81093376>] kthread+0x7d/0x85 [<ffffffff8103eeaa>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88002f0b7060 (size 32): comm "xenconsoled", pid 5417, jiffies 4295059743 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1 [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8 [<ffffffff81299a49>] bind_evtchn_to_irqhandler+0x22/0x5b [<ffffffff8129f11c>] evtchn_bind_to_user+0x4c/0x57 [<ffffffff8129f235>] evtchn_ioctl+0x10e/0x2ed [<ffffffff8112cbb8>] vfs_ioctl+0x2a/0x78 [<ffffffff8112d12b>] do_vfs_ioctl+0x4aa/0x4e7 [<ffffffff8112d1bd>] sys_ioctl+0x55/0x77 [<ffffffff8103dd42>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88002ff01980 (size 32): comm "xenwatch", pid 33, jiffies 4295062339 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1 [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8 [<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a [<ffffffff812a1945>] pciback_attach+0x1b8/0x2a6 [<ffffffff812a2078>] pciback_frontend_changed+0x69/0x51e [<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82 [<ffffffff8129d872>] frontend_changed+0xb/0xd [<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d [<ffffffff81093376>] kthread+0x7d/0x85 [<ffffffff8103eeaa>] child_rip+0xa/0x20 unreferenced object 0xffff88002f0b70a0 (size 32): comm "xenwatch", pid 33, jiffies 4295062501 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1 [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8 [<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a [<ffffffff812a6102>] blkif_map+0x17d/0x1bc [<ffffffff812a572a>] frontend_changed+0x1b7/0x244 [<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82 [<ffffffff8129d872>] frontend_changed+0xb/0xd [<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d [<ffffffff81093376>] kthread+0x7d/0x85 [<ffffffff8103eeaa>] child_rip+0xa/0x20 unreferenced object 0xffff88002bac1de0 (size 32): comm "pciback_workque", pid 640, jiffies 4295062583 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1 [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87 [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138 [<ffffffff8124ccb3>] pci_enable_msix+0x3c2/0x3d3 [<ffffffff812a3c29>] pciback_enable_msix+0xa6/0x106 [<ffffffff812a159e>] pciback_do_op+0xd7/0x148 [<ffffffff8108f723>] worker_thread+0x22c/0x332 [<ffffffff81093376>] kthread+0x7d/0x85 unreferenced object 0xffff88002bac1940 (size 32): comm "pciback_workque", pid 640, jiffies 4295062583 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1 [<ffffffff81299b3c>] xen_create_msi_irq+0xba/0x19d [<ffffffff8103be17>] xen_setup_msi_irqs+0x39/0x87 [<ffffffff8149c7b6>] xen_pci_setup_msi_irqs+0x34/0x1be [<ffffffff81058114>] arch_setup_msi_irqs+0x38/0x138 [<ffffffff8124ccb3>] pci_enable_msix+0x3c2/0x3d3 [<ffffffff812a3c29>] pciback_enable_msix+0xa6/0x106 [<ffffffff812a159e>] pciback_do_op+0xd7/0x148 [<ffffffff8108f723>] worker_thread+0x22c/0x332 [<ffffffff81093376>] kthread+0x7d/0x85 unreferenced object 0xffff88002f0b7900 (size 32): comm "xenwatch", pid 33, jiffies 4295063153 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff815bd155>] kmemleak_alloc+0x21/0x44 [<ffffffff8111a046>] __kmalloc+0x1c1/0x1ea [<ffffffff81056dbf>] kzalloc_node+0xf/0x11 [<ffffffff8105741a>] get_one_free_irq_cfg+0x1a/0x45 [<ffffffff8105754e>] arch_init_chip_data+0x1a/0x39 [<ffffffff815bcb63>] irq_to_desc_alloc_node+0x18d/0x1b7 [<ffffffff812995cd>] find_unbound_irq+0x68/0xa1 [<ffffffff81299765>] bind_evtchn_to_irq+0x34/0xb8 [<ffffffff812999ea>] bind_interdomain_evtchn_to_irqhandler+0x3d/0x7a [<ffffffff812ad21d>] netif_map+0x1a3/0x303 [<ffffffff812ac674>] frontend_changed+0x306/0x5b6 [<ffffffff8129d6b9>] xenbus_otherend_changed+0x79/0x82 [<ffffffff8129d872>] frontend_changed+0xb/0xd [<ffffffff8129bd14>] xenwatch_thread+0x11a/0x14d [<ffffffff81093376>] kthread+0x7d/0x85 [<ffffffff8103eeaa>] child_rip+0xa/0x20 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |