|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] arm: xl vcpu-pin leads to oom-killer slashing processes
On 05.12.18 14:15, Julien Grall wrote: Yes, it thinks so. But it is not linked to domain .What do you mean? It should be read as "But it is not linked to domain memory size". A memory corruption by Xen is extremely unlikely. I believe in that. So it looks like to me this is a related to your domain (kernel or userspace), possibly because memory has not been freed correctly. It might be. But happens only with and right after vcpu pinning. Below a list of questions to answer: - Can you give the steps to reproduce it from boot? The step is single and trivial, just try to pin vcpus from Dom0. - How much memory left do you have before calling xl vcpu-pin?
Meminfo says
root@salvator-x:~# cat /proc/meminfo
MemTotal: 2995828 kB
MemFree: 2810360 kB
MemAvailable: 2758420 kB
Top says:
Mem: 185592K used, 2810236K free, 21020K shrd, 0K buff, 53000K cached
CPU: 0% usr 8% sys 0% nic 91% idle 0% io 0% irq 0% sirq
- When exactly do you pin the vCPUs? (i.e how long after boot) Right after login. - What are the other programs running? How much memory are they using? Weston, systemd daemons, Xen daemons, other Yocto daemons. Actually, nothing special. -- Sincerely, Andrii Anisov. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |