xen:balloon errors in 14.04 beta
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
High
|
Tim Gardner | ||
Precise |
Fix Released
|
Undecided
|
Unassigned | ||
Trusty |
Fix Released
|
Undecided
|
Stefan Bader | ||
Utopic |
Fix Released
|
High
|
Stefan Bader |
Bug Description
SRU Justification:
[Impact]
The following errors may occur on HVM instances on EC2: xen:balloon: reserve_
[Test Case]
Boot Ubuntu Trusty 3.13 series HVM instances and check dmesg for this error message.
[Fix]
A minimal fix for this bug can be found here:
https:/
This allows the ballooning to be cancelled if adding new memory failed which means that the error message is printed once instead of repeatedly.
There should still be effort to root cause this issue and determine how to avoid the ballooning errors in the first place. I still think this patch should be applied to alleviate symptoms until root cause is discovered.
--
Xen balloon errors on HVM instances on EC2 (Xen 4.2.amazon):
ubuntu@
Linux ip-10-63-20-99 3.13.0-23-generic #45-Ubuntu SMP Fri Apr 4 06:58:38 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
ubuntu@
[ 0.000000] xen:events: Xen HVM callback vector for event delivery is enabled
[ 0.494613] xen:balloon: Initialising balloon driver
[ 0.496046] xen_balloon: Initialising balloon driver
[ 0.500077] xen:balloon: reserve_
[ 0.541047] Switched to clocksource xen
[ 0.562579] xen: --> pirq=16 -> irq=8 (gsi=8)
[ 0.562622] xen: --> pirq=17 -> irq=12 (gsi=12)
[ 0.562649] xen: --> pirq=18 -> irq=1 (gsi=1)
[ 0.562673] xen: --> pirq=19 -> irq=6 (gsi=6)
[ 0.562705] xen: --> pirq=20 -> irq=4 (gsi=4)
[ 0.920527] xen: --> pirq=21 -> irq=47 (gsi=47)
[ 0.920596] xen:grant_table: Grant tables using version 1 layout
[ 1.029661] xen_netfront: Initialising Xen virtual ethernet driver
[ 1.236083] xenbus_
[ 2.516067] xen:balloon: reserve_
[ 6.533941] xen:balloon: reserve_
[ 14.560075] xen:balloon: reserve_
[ 30.592064] xen:balloon: reserve_
[ 62.688153] xen:balloon: reserve_
[ 94.752164] xen:balloon: reserve_
[ 126.816161] xen:balloon: reserve_
[ 158.880084] xen:balloon: reserve_
[ 190.944069] xen:balloon: reserve_
[ 223.008141] xen:balloon: reserve_
[ 255.072112] xen:balloon: reserve_
[ 287.136190] xen:balloon: reserve_
[ 319.200053] xen:balloon: reserve_
[ 351.264164] xen:balloon: reserve_
[ 383.328080] xen:balloon: reserve_
[ 415.392077] xen:balloon: reserve_
[ 447.456112] xen:balloon: reserve_
[ 479.520128] xen:balloon: reserve_
[ 511.584110] xen:balloon: reserve_
[ 543.648181] xen:balloon: reserve_
[ 575.712070] xen:balloon: reserve_
[ 607.776178] xen:balloon: reserve_
affects: | linux-meta (Ubuntu) → linux (Ubuntu) |
tags: |
added: kernel-da-key removed: kernel-key |
Changed in linux (Ubuntu): | |
status: | Confirmed → Incomplete |
tags: | added: kernel-request-3.13.0-24.46 |
Changed in linux (Ubuntu): | |
status: | Incomplete → Confirmed |
tags: | added: patch |
Changed in linux (Ubuntu Utopic): | |
assignee: | nobody → Tim Gardner (timg-tpi) |
status: | Confirmed → In Progress |
Changed in linux (Ubuntu Utopic): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Trusty): | |
assignee: | nobody → Stefan Bader (smb) |
status: | New → In Progress |
description: | updated |
tags: | added: verification-failed-trusty |
tags: | removed: kernel-request-3.13.0-24.46 |
tags: | added: cts |
Changed in linux (Ubuntu Trusty): | |
status: | Triaged → Fix Committed |
Changed in linux (Ubuntu Utopic): | |
assignee: | Tim Gardner (timg-tpi) → Stefan Bader (smb) |
status: | Triaged → Fix Committed |
Changed in linux (Ubuntu): | |
status: | Triaged → Fix Released |
tags: |
added: verification-done-trusty removed: verification-needed-trusty |
tags: |
added: verification-done removed: verification-done-trusty verification-done-utopic |
Changed in linux (Ubuntu Precise): | |
status: | New → Fix Committed |
Did this issue start happening after an update/upgrade? Was there a kernel version where you were not having this particular problem? This will help determine if the problem you are seeing is the result of the introduction of a regression, and when this regression was introduced. If this is a regression, we can perform a kernel bisect to identify the commit that introduced the problem.