[Bug 1394327] Re: unmapping of persistent grants in qemu

2014-12-17 Thread Xing Lin
thanks for verifying it, Stefan!

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1394327

Title:
  unmapping of persistent grants in qemu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1394327/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


Re: [Bug 1394327] Please test proposed package

2014-12-16 Thread Xing Lin
Hi,

I am pretty busy this week. I shall be able to do the test this weekend or
next week. Thanks,

-Xing

On Tue, Dec 16, 2014 at 7:18 AM, Chris J Arges 1394...@bugs.launchpad.net
wrote:

 Hello Xing, or anyone else affected,

 Accepted qemu into utopic-proposed. The package will build now and be
 available at http://launchpad.net/ubuntu/+source/qemu/2.1+dfsg-
 4ubuntu6.4 in a few hours, and then in the -proposed repository.

 Please help us by testing this new package.  See
 https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
 enable and use -proposed.  Your feedback will aid us getting this update
 out to other Ubuntu users.

 If this package fixes the bug for you, please add a comment to this bug,
 mentioning the version of the package you tested, and change the tag
 from verification-needed to verification-done. If it does not fix the
 bug for you, please add a comment stating that, and change the tag to
 verification-failed.  In either case, details of your testing will help
 us make a better decision.

 Further information regarding the verification process can be found at
 https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
 advance!

 --
 You received this bug notification because you are subscribed to the bug
 report.
 https://bugs.launchpad.net/bugs/1394327

 Title:
   unmapping of persistent grants in qemu

 Status in qemu package in Ubuntu:
   Fix Released
 Status in qemu source package in Trusty:
   Fix Committed
 Status in qemu source package in Utopic:
   Fix Committed
 Status in Debian GNU/Linux:
   Fix Released

 Bug description:
   A patch was discussed in xen-devel mailing list, to deal with unmapping
 of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not
 included in any stable qemu release (including 2.0.2, 2.1.2 and 2.2.0-rc2 )
 yet. The patch is available here.

 http://lists.xenproject.org/archives/html/xen-devel/2014-11/msg01112.html

   Without this patch, when creating a xen guest from OpenStack, using
   the Xen+libvirt approach, it will result in dom0 kernel crashes, with
   dmesg as following.


   [ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent
 grants: enabled; indirect descriptors: disabled;
   [ 9443.132818]  xvda: xvda1
   [ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use!
   [ 9444.604496] deferring g.e. 0x30 (pfn 0x)
   [ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use!
   [ 9444.604502] deferring g.e. 0x31 (pfn 0x)
   [ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use!
   [ 9444.604508] deferring g.e. 0x32 (pfn 0x)
  lots of them
   [ 9444.604719] xen:grant_table: WARNING: g.e. 0xe still in use!
   [ 9444.604721] deferring g.e. 0xe (pfn 0x)
   [ 9444.604723] xen:grant_table: WARNING: g.e. 0xd still in use!
   [ 9444.604725] deferring g.e. 0xd (pfn 0x)
   [ 9448.325408] [ cut here ]
   [ 9448.325421] WARNING: CPU: 5 PID: 19902 at
 /build/buildd/linux-3.13.0/arch/x86/xen/multicalls.c:129 xen_mc_flush+0x
   1a9/0x1b0()
   [ 9448.325492] CPU: 5 PID: 19902 Comm: sudo Tainted: GF  O
 3.13.0-33-generic #58-Ubuntu
   [ 9448.325494] Hardware name: Dell Inc. PowerEdge R710/00W9X3, BIOS
 2.1.15 09/02/2010
   [ 9448.325497]  0009 8802d13d9aa8 8171bd04
 
   [ 9448.325501]  8802d13d9ae0 810676cd 
 0001
   [ 9448.325505]  88030418ffe0 88031d6ab180 0010
 8802d13d9af0
   [ 9448.325509] Call Trace:
   [ 9448.325518]  [8171bd04] dump_stack+0x45/0x56
   [ 9448.325523]  [810676cd] warn_slowpath_common+0x7d/0xa0
   [ 9448.325526]  [810677aa] warn_slowpath_null+0x1a/0x20
   [ 9448.325530]  [81004e99] xen_mc_flush+0x1a9/0x1b0
   [ 9448.325534]  [81006b99] xen_set_pud_hyper+0x109/0x110
   [ 9448.325538]  [81006c3b] xen_set_pud+0x9b/0xb0
   [ 9448.325543]  [81177f06] __pmd_alloc+0xd6/0x110
   [ 9448.325548]  [81182218] move_page_tables+0x678/0x720
   [ 9448.325552]  [8117ddb7] ? vma_adjust+0x337/0x7d0
   [ 9448.325557]  [811c23fd] shift_arg_pages+0xbd/0x1b0
   [ 9448.325560]  [81181671] ? mprotect_fixup+0x151/0x290
   [ 9448.325564]  [811c26cb] setup_arg_pages+0x1db/0x200
   [ 9448.325570]  [81213edc] load_elf_binary+0x41c/0xd80
   [ 9448.325576]  [8131d503] ? ima_get_action+0x23/0x30
   [ 9448.325579]  [8131c7e2] ? process_measurement+0x82/0x2c0
   [ 9448.325584]  [811c2f7f] search_binary_handler+0x8f/0x1b0
   [ 9448.325587]  [811c44f7] do_execve_common.isra.22+0x5a7/0x7e0
   [ 9448.325591]  [811c49c6] SyS_execve+0x36/0x50
   [ 9448.325596]  [8172cc99] stub_execve+0x69/0xa0
   [ 9448.325599] ---[ end trace 53ac16782e751c0a ]---
   [ 9448.347994] [ cut here ]
   [ 9448.348004] 

[Bug 1394327] [NEW] unmapping of persistent grants in qemu

2014-11-19 Thread Xing Lin
Public bug reported:

A patch was discussed in xen-devel mailing list, to deal with unmapping of 
persistent grants in qemu for Xen on 12 Nov 2014. This patch is not included in 
any stable qemu release (including 2.0.2, 2.1.2 and 2.2.0-rc2 ) yet. The patch 
is available here. 
http://lists.xenproject.org/archives/html/xen-devel/2014-11/msg01112.html

Without this patch, when creating a xen guest from OpenStack, using the
Xen+libvirt approach, it will result in dom0 kernel crashes, with dmesg
as following.


[ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent grants: 
enabled; indirect descriptors: disabled;
[ 9443.132818]  xvda: xvda1
[ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use!
[ 9444.604496] deferring g.e. 0x30 (pfn 0x)
[ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use!
[ 9444.604502] deferring g.e. 0x31 (pfn 0x)
[ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use!
[ 9444.604508] deferring g.e. 0x32 (pfn 0x)
   lots of them
[ 9444.604719] xen:grant_table: WARNING: g.e. 0xe still in use!
[ 9444.604721] deferring g.e. 0xe (pfn 0x)
[ 9444.604723] xen:grant_table: WARNING: g.e. 0xd still in use!
[ 9444.604725] deferring g.e. 0xd (pfn 0x)
[ 9448.325408] [ cut here ]
[ 9448.325421] WARNING: CPU: 5 PID: 19902 at 
/build/buildd/linux-3.13.0/arch/x86/xen/multicalls.c:129 xen_mc_flush+0x
1a9/0x1b0()
[ 9448.325492] CPU: 5 PID: 19902 Comm: sudo Tainted: GF  O 
3.13.0-33-generic #58-Ubuntu
[ 9448.325494] Hardware name: Dell Inc. PowerEdge R710/00W9X3, BIOS 2.1.15 
09/02/2010
[ 9448.325497]  0009 8802d13d9aa8 8171bd04 

[ 9448.325501]  8802d13d9ae0 810676cd  
0001
[ 9448.325505]  88030418ffe0 88031d6ab180 0010 
8802d13d9af0
[ 9448.325509] Call Trace:
[ 9448.325518]  [8171bd04] dump_stack+0x45/0x56
[ 9448.325523]  [810676cd] warn_slowpath_common+0x7d/0xa0
[ 9448.325526]  [810677aa] warn_slowpath_null+0x1a/0x20
[ 9448.325530]  [81004e99] xen_mc_flush+0x1a9/0x1b0
[ 9448.325534]  [81006b99] xen_set_pud_hyper+0x109/0x110
[ 9448.325538]  [81006c3b] xen_set_pud+0x9b/0xb0
[ 9448.325543]  [81177f06] __pmd_alloc+0xd6/0x110
[ 9448.325548]  [81182218] move_page_tables+0x678/0x720
[ 9448.325552]  [8117ddb7] ? vma_adjust+0x337/0x7d0
[ 9448.325557]  [811c23fd] shift_arg_pages+0xbd/0x1b0
[ 9448.325560]  [81181671] ? mprotect_fixup+0x151/0x290
[ 9448.325564]  [811c26cb] setup_arg_pages+0x1db/0x200
[ 9448.325570]  [81213edc] load_elf_binary+0x41c/0xd80
[ 9448.325576]  [8131d503] ? ima_get_action+0x23/0x30
[ 9448.325579]  [8131c7e2] ? process_measurement+0x82/0x2c0
[ 9448.325584]  [811c2f7f] search_binary_handler+0x8f/0x1b0
[ 9448.325587]  [811c44f7] do_execve_common.isra.22+0x5a7/0x7e0
[ 9448.325591]  [811c49c6] SyS_execve+0x36/0x50
[ 9448.325596]  [8172cc99] stub_execve+0x69/0xa0
[ 9448.325599] ---[ end trace 53ac16782e751c0a ]---
[ 9448.347994] [ cut here ]
[ 9448.348004] WARNING: CPU: 1 PID: 19902 at 
/build/buildd/linux-3.13.0/mm/mmap.c:2736 exit_mmap+0x16b/0x170()

** Affects: qemu (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

- A patch was discussed in xen-devel mailing list, to deal with unmapping
- of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not
- included in any stable qemu release (including 2.0.2, 2.1.2 and
- 2.2.0-rc2 ) yet. Without this patch, when creating a xen guest from
- OpenStack, using the Xen+libvirt approach, it will result in dom0 kernel
- crashes, with dmesg as following.
+ A patch was discussed in xen-devel mailing list, to deal with unmapping of 
persistent grants in qemu for Xen on 12 Nov 2014. This patch is not included in 
any stable qemu release (including 2.0.2, 2.1.2 and 2.2.0-rc2 ) yet. The patch 
is available here. 
+ http://lists.xenproject.org/archives/html/xen-devel/2014-11/msg01112.html
+ 
+ Without this patch, when creating a xen guest from OpenStack, using the
+ Xen+libvirt approach, it will result in dom0 kernel crashes, with dmesg
+ as following.
+ 
  
  [ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent grants: 
enabled; indirect descriptors: disabled;
  [ 9443.132818]  xvda: xvda1
  [ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use!
  [ 9444.604496] deferring g.e. 0x30 (pfn 0x)
  [ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use!
  [ 9444.604502] deferring g.e. 0x31 (pfn 0x)
  [ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use!
  [ 9444.604508] deferring g.e. 0x32 (pfn 0x)
-    lots of them
+    lots of them
  [ 9444.604719] xen:grant_table: WARNING: g.e. 0xe 

[Bug 1394326] [NEW] unmapping of persistent grants in qemu

2014-11-19 Thread Xing Lin
Public bug reported:

A patch was discussed in xen-devel mailing list, to deal with unmapping
of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not
included in any stable qemu release (including 2.0.2, 2.1.2 and
2.2.0-rc2 ) yet. Without this patch, when creating a xen guest from
OpenStack, using the Xen+libvirt approach, it will result in dom0 kernel
crashes, with dmesg as following.

[ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent grants: 
enabled; indirect descriptors: disabled;
[ 9443.132818]  xvda: xvda1
[ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use!
[ 9444.604496] deferring g.e. 0x30 (pfn 0x)
[ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use!
[ 9444.604502] deferring g.e. 0x31 (pfn 0x)
[ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use!
[ 9444.604508] deferring g.e. 0x32 (pfn 0x)
   lots of them
[ 9444.604719] xen:grant_table: WARNING: g.e. 0xe still in use!
[ 9444.604721] deferring g.e. 0xe (pfn 0x)
[ 9444.604723] xen:grant_table: WARNING: g.e. 0xd still in use!
[ 9444.604725] deferring g.e. 0xd (pfn 0x)
[ 9448.325408] [ cut here ]
[ 9448.325421] WARNING: CPU: 5 PID: 19902 at 
/build/buildd/linux-3.13.0/arch/x86/xen/multicalls.c:129 xen_mc_flush+0x
1a9/0x1b0()
[ 9448.325492] CPU: 5 PID: 19902 Comm: sudo Tainted: GF  O 
3.13.0-33-generic #58-Ubuntu
[ 9448.325494] Hardware name: Dell Inc. PowerEdge R710/00W9X3, BIOS 2.1.15 
09/02/2010
[ 9448.325497]  0009 8802d13d9aa8 8171bd04 

[ 9448.325501]  8802d13d9ae0 810676cd  
0001
[ 9448.325505]  88030418ffe0 88031d6ab180 0010 
8802d13d9af0
[ 9448.325509] Call Trace:
[ 9448.325518]  [8171bd04] dump_stack+0x45/0x56
[ 9448.325523]  [810676cd] warn_slowpath_common+0x7d/0xa0
[ 9448.325526]  [810677aa] warn_slowpath_null+0x1a/0x20
[ 9448.325530]  [81004e99] xen_mc_flush+0x1a9/0x1b0
[ 9448.325534]  [81006b99] xen_set_pud_hyper+0x109/0x110
[ 9448.325538]  [81006c3b] xen_set_pud+0x9b/0xb0
[ 9448.325543]  [81177f06] __pmd_alloc+0xd6/0x110
[ 9448.325548]  [81182218] move_page_tables+0x678/0x720
[ 9448.325552]  [8117ddb7] ? vma_adjust+0x337/0x7d0
[ 9448.325557]  [811c23fd] shift_arg_pages+0xbd/0x1b0
[ 9448.325560]  [81181671] ? mprotect_fixup+0x151/0x290
[ 9448.325564]  [811c26cb] setup_arg_pages+0x1db/0x200
[ 9448.325570]  [81213edc] load_elf_binary+0x41c/0xd80
[ 9448.325576]  [8131d503] ? ima_get_action+0x23/0x30
[ 9448.325579]  [8131c7e2] ? process_measurement+0x82/0x2c0
[ 9448.325584]  [811c2f7f] search_binary_handler+0x8f/0x1b0
[ 9448.325587]  [811c44f7] do_execve_common.isra.22+0x5a7/0x7e0
[ 9448.325591]  [811c49c6] SyS_execve+0x36/0x50
[ 9448.325596]  [8172cc99] stub_execve+0x69/0xa0
[ 9448.325599] ---[ end trace 53ac16782e751c0a ]---
[ 9448.347994] [ cut here ]
[ 9448.348004] WARNING: CPU: 1 PID: 19902 at 
/build/buildd/linux-3.13.0/mm/mmap.c:2736 exit_mmap+0x16b/0x170()

** Affects: qemu (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1394326

Title:
  unmapping of persistent grants in qemu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1394326/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs