[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [GIT PULL] (xen) stable/for-jens-3.10 xenwatch: page allocation failure: order:7, mode:0x10c0d0



Thursday, April 25, 2013, 10:43:33 AM, you wrote:

> On 25/04/13 10:35, Roger Pau Monné wrote:
>> On 24/04/13 20:16, Sander Eikelenboom wrote:
>>> Friday, April 19, 2013, 4:44:01 PM, you wrote:
>>>
>>>> Hey Jens,
>>>
>>>> Please in your spare time (if there is such a thing at a conference)
>>>> pull this branch:
>>>
>>>>  git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git 
>>>> stable/for-jens-3.10
>>>
>>>> for your v3.10 branch. Sorry for being so late with this.
>>>
>>> <big snip></big snip>
>>>
>>>> Anyhow, please pull and if possible include the nice overview I typed up 
>>>> in the
>>>> merge commit.
>>>
>>>>  Documentation/ABI/stable/sysfs-bus-xen-backend |  18 +
>>>>  drivers/block/xen-blkback/blkback.c            | 843 
>>>> ++++++++++++++++---------
>>>>  drivers/block/xen-blkback/common.h             | 145 ++++-
>>>>  drivers/block/xen-blkback/xenbus.c             |  38 ++
>>>>  drivers/block/xen-blkfront.c                   | 490 +++++++++++---
>>>>  include/xen/interface/io/blkif.h               |  53 ++
>>>>  6 files changed, 1188 insertions(+), 399 deletions(-)
>>>
>>>> Roger Pau Monne (7):
>>>>       xen-blkback: print stats about persistent grants
>>>>       xen-blkback: use balloon pages for all mappings
>>>>       xen-blkback: implement LRU mechanism for persistent grants
>>>>       xen-blkback: move pending handles list from blkbk to pending_req
>>>>       xen-blkback: make the queue of free requests per backend
>>>>       xen-blkback: expand map/unmap functions
>>>>       xen-block: implement indirect descriptors
>>>
>>>
>>> Hi Konrad / Roger,
>>>
>>> I tried this pull on top of latest Linus latest linux-3.9 tree, but 
>>> although it seems to boot and work fine at first, i seem to get trouble 
>>> after running for about a day.
>>> Without this pull it runs fine for several days.
>>>
>>> Trying to start a new guest I ended up with the splat below. In the output 
>>> of xl-dmesg i seem to see more of these than before:
>>> (XEN) [2013-04-24 14:37:40] grant_table.c:1250:d1 Expanding dom (1) grant 
>>> table from (9) to (10) frames
>> 
>> Hello Sander,
>> 
>> Thanks for the report, it is expected to see more messages regarding
>> grant table expansion with this patch, since we are using up to 1056
>> persistent grants for each backend. Could you try lowering down the
>> maximum number of persistent grants to see if that prevents running out
>> of memory:
>> 
>> # echo 384 > /sys/module/xen_blkback/parameters/max_persistent_grants

> And the number of free pages keep in blkback cache:

# echo 256 >> /sys/module/xen_blkback/parameters/max_buffer_pages

With both set .. it still bails out after sometime when trying to start a new 
guest.


[ 9871.923198] Pid: 54, comm: xenwatch Not tainted 3.9.0-rc8-20130424-jens+ #1
[ 9871.934278] Call Trace:
[ 9871.945146]  [<ffffffff81100c51>] warn_alloc_failed+0xf1/0x140
[ 9871.956094]  [<ffffffff811021f1>] ? __alloc_pages_direct_compact+0x211/0x230
[ 9871.967048]  [<ffffffff811028af>] __alloc_pages_nodemask+0x69f/0x960
[ 9871.978092]  [<ffffffff8113a161>] alloc_pages_current+0xb1/0x160
[ 9871.989065]  [<ffffffff81100679>] __get_free_pages+0x9/0x40
[ 9871.999999]  [<ffffffff81142af4>] __kmalloc+0x134/0x160
[ 9872.010845]  [<ffffffff815832d0>] xen_blkbk_probe+0x170/0x2f0
[ 9872.021667]  [<ffffffff81474ce7>] xenbus_dev_probe+0x77/0x130
[ 9872.032542]  [<ffffffff8156a390>] ? __driver_attach+0xa0/0xa0
[ 9872.043453]  [<ffffffff8156a151>] driver_probe_device+0x81/0x220
[ 9872.054115]  [<ffffffff8198198c>] ? klist_next+0x8c/0x110
[ 9872.064454]  [<ffffffff8156a390>] ? __driver_attach+0xa0/0xa0
[ 9872.074610]  [<ffffffff8156a3db>] __device_attach+0x4b/0x50
[ 9872.084541]  [<ffffffff815684e8>] bus_for_each_drv+0x68/0x90
[ 9872.094282]  [<ffffffff8156a0c9>] device_attach+0x89/0x90
[ 9872.103751]  [<ffffffff81569258>] bus_probe_device+0xa8/0xd0
[ 9872.113158]  [<ffffffff81567c80>] device_add+0x650/0x720
[ 9872.122379]  [<ffffffff81573103>] ? device_pm_sleep_init+0x43/0x70
[ 9872.131304]  [<ffffffff81567d69>] device_register+0x19/0x20
[ 9872.139948]  [<ffffffff8147495b>] xenbus_probe_node+0x14b/0x160
[ 9872.148414]  [<ffffffff815685b4>] ? bus_for_each_dev+0xa4/0xb0
[ 9872.156603]  [<ffffffff81474b2c>] xenbus_dev_changed+0x1bc/0x1c0
[ 9872.164631]  [<ffffffff810b67f7>] ? lock_release+0x117/0x260
[ 9872.172551]  [<ffffffff81474f66>] backend_changed+0x16/0x20
[ 9872.180427]  [<ffffffff81472f5e>] xenwatch_thread+0x4e/0x150
[ 9872.188238]  [<ffffffff8108abb0>] ? wake_up_bit+0x40/0x40
[ 9872.196032]  [<ffffffff81472f10>] ? xs_watch+0x60/0x60
[ 9872.203841]  [<ffffffff8108a546>] kthread+0xd6/0xe0
[ 9872.211567]  [<ffffffff8108a470>] ? __init_kthread_worker+0x70/0x70
[ 9872.219075]  [<ffffffff819979bc>] ret_from_fork+0x7c/0xb0
[ 9872.226329]  [<ffffffff8108a470>] ? __init_kthread_worker+0x70/0x70
[ 9872.233416] Mem-Info:
[ 9872.241071] Node 0 DMA per-cpu:
[ 9872.248137] CPU    0: hi:    0, btch:   1 usd:   0
[ 9872.255108] CPU    1: hi:    0, btch:   1 usd:   0
[ 9872.262090] CPU    2: hi:    0, btch:   1 usd:   0
[ 9872.269069] CPU    3: hi:    0, btch:   1 usd:   0
[ 9872.275890] CPU    4: hi:    0, btch:   1 usd:   0
[ 9872.282629] CPU    5: hi:    0, btch:   1 usd:   0
[ 9872.289393] Node 0 DMA32 per-cpu:
[ 9872.296163] CPU    0: hi:  186, btch:  31 usd:  53
[ 9872.302701] CPU    1: hi:  186, btch:  31 usd:  72
[ 9872.308924] CPU    2: hi:  186, btch:  31 usd:  66
[ 9872.314937] CPU    3: hi:  186, btch:  31 usd:  30
[ 9872.320649] CPU    4: hi:  186, btch:  31 usd: 110
[ 9872.326032] CPU    5: hi:  186, btch:  31 usd: 163
[ 9872.331185] active_anon:4510 inactive_anon:10674 isolated_anon:0
[ 9872.331185]  active_file:21063 inactive_file:161965 isolated_file:0
[ 9872.331185]  unevictable:519 dirty:127 writeback:0 unstable:0
[ 9872.331185]  free:3448 slab_reclaimable:8061 slab_unreclaimable:10395
[ 9872.331185]  mapped:3916 shmem:321 pagetables:1249 bounce:0
[ 9872.331185]  free_cma:0
[ 9872.358911] Node 0 DMA free:3836kB min:64kB low:80kB high:96kB 
active_anon:0kB inactive_anon:4kB active_file:76kB inactive_file:10748kB 
unevictable:0kB isolated(anon):0kB isolated(file):0kB present:15992kB 
managed:15908kB mlocked:0kB dirty:0kB writeback:0kB mapped:0kB shmem:0kB 
slab_reclaimable:1004kB slab_unreclaimable:224kB kernel_stack:16kB 
pagetables:0kB unstable:0kB bounce:0kB free_cma:0kB writeback_tmp:0kB 
pages_scanned:0 all_unreclaimable? no
[ 9872.374281] lowmem_reserve[]: 0 884 884 884
[ 9872.379566] Node 0 DMA32 free:9916kB min:3772kB low:4712kB high:5656kB 
active_anon:17968kB inactive_anon:42692kB active_file:84192kB 
inactive_file:637180kB unevictable:2084kB isolated(anon):0kB isolated(file):0kB 
present:1032192kB managed:905896kB mlocked:2084kB dirty:524kB writeback:0kB 
mapped:15800kB shmem:1284kB slab_reclaimable:31240kB slab_unreclaimable:41352kB 
kernel_stack:2160kB pagetables:5016kB unstable:0kB bounce:0kB free_cma:0kB 
writeback_tmp:0kB pages_scanned:0 all_unreclaimable? no
[ 9872.402980] lowmem_reserve[]: 0 0 0 0
[ 9872.409005] Node 0 DMA: 5*4kB (M) 13*8kB (M) 104*16kB (M) 4*32kB (MR) 2*64kB 
(R) 0*128kB 1*256kB (R) 1*512kB (R) 1*1024kB (R) 0*2048kB 0*4096kB = 3836kB
[ 9872.415521] Node 0 DMA32: 1665*4kB (UEMR) 206*8kB (MR) 10*16kB (UMR) 5*32kB 
(R) 0*64kB 4*128kB (R) 1*256kB (R) 1*512kB (R) 0*1024kB 0*2048kB 0*4096kB = 
9908kB
[ 9872.428594] 183858 total pagecache pages
[ 9872.435128] 0 pages in swap cache
[ 9872.441781] Swap cache stats: add 7, delete 7, find 3/3
[ 9872.448409] Free swap  = 2097148kB
[ 9872.455042] Total swap = 2097148kB
[ 9872.465414] 262143 pages RAM
[ 9872.471913] 28027 pages reserved
[ 9872.478443] 295127 pages shared
[ 9872.484909] 207989 pages non-shared
[ 9872.491387] vbd vbd-20-768: 12 creating block interface
[ 9872.499259] vbd vbd-20-768: 12 xenbus_dev_probe on backend/vbd/20/768
[ 9872.506942] vbd: probe of vbd-20-768 failed with error -12


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.