[Bug 1394327] Re: unmapping of persistent grants in qemu
thanks for verifying it, Stefan! -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1394327 Title: unmapping of persistent grants in qemu To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1394327/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
Re: [Bug 1394327] Please test proposed package
Hi, I am pretty busy this week. I shall be able to do the test this weekend or next week. Thanks, -Xing On Tue, Dec 16, 2014 at 7:18 AM, Chris J Arges 1394...@bugs.launchpad.net wrote: Hello Xing, or anyone else affected, Accepted qemu into utopic-proposed. The package will build now and be available at http://launchpad.net/ubuntu/+source/qemu/2.1+dfsg- 4ubuntu6.4 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, and change the tag from verification-needed to verification-done. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed. In either case, details of your testing will help us make a better decision. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance! -- You received this bug notification because you are subscribed to the bug report. https://bugs.launchpad.net/bugs/1394327 Title: unmapping of persistent grants in qemu Status in qemu package in Ubuntu: Fix Released Status in qemu source package in Trusty: Fix Committed Status in qemu source package in Utopic: Fix Committed Status in Debian GNU/Linux: Fix Released Bug description: A patch was discussed in xen-devel mailing list, to deal with unmapping of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not included in any stable qemu release (including 2.0.2, 2.1.2 and 2.2.0-rc2 ) yet. The patch is available here. http://lists.xenproject.org/archives/html/xen-devel/2014-11/msg01112.html Without this patch, when creating a xen guest from OpenStack, using the Xen+libvirt approach, it will result in dom0 kernel crashes, with dmesg as following. [ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent grants: enabled; indirect descriptors: disabled; [ 9443.132818] xvda: xvda1 [ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use! [ 9444.604496] deferring g.e. 0x30 (pfn 0x) [ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use! [ 9444.604502] deferring g.e. 0x31 (pfn 0x) [ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use! [ 9444.604508] deferring g.e. 0x32 (pfn 0x) lots of them [ 9444.604719] xen:grant_table: WARNING: g.e. 0xe still in use! [ 9444.604721] deferring g.e. 0xe (pfn 0x) [ 9444.604723] xen:grant_table: WARNING: g.e. 0xd still in use! [ 9444.604725] deferring g.e. 0xd (pfn 0x) [ 9448.325408] [ cut here ] [ 9448.325421] WARNING: CPU: 5 PID: 19902 at /build/buildd/linux-3.13.0/arch/x86/xen/multicalls.c:129 xen_mc_flush+0x 1a9/0x1b0() [ 9448.325492] CPU: 5 PID: 19902 Comm: sudo Tainted: GF O 3.13.0-33-generic #58-Ubuntu [ 9448.325494] Hardware name: Dell Inc. PowerEdge R710/00W9X3, BIOS 2.1.15 09/02/2010 [ 9448.325497] 0009 8802d13d9aa8 8171bd04 [ 9448.325501] 8802d13d9ae0 810676cd 0001 [ 9448.325505] 88030418ffe0 88031d6ab180 0010 8802d13d9af0 [ 9448.325509] Call Trace: [ 9448.325518] [8171bd04] dump_stack+0x45/0x56 [ 9448.325523] [810676cd] warn_slowpath_common+0x7d/0xa0 [ 9448.325526] [810677aa] warn_slowpath_null+0x1a/0x20 [ 9448.325530] [81004e99] xen_mc_flush+0x1a9/0x1b0 [ 9448.325534] [81006b99] xen_set_pud_hyper+0x109/0x110 [ 9448.325538] [81006c3b] xen_set_pud+0x9b/0xb0 [ 9448.325543] [81177f06] __pmd_alloc+0xd6/0x110 [ 9448.325548] [81182218] move_page_tables+0x678/0x720 [ 9448.325552] [8117ddb7] ? vma_adjust+0x337/0x7d0 [ 9448.325557] [811c23fd] shift_arg_pages+0xbd/0x1b0 [ 9448.325560] [81181671] ? mprotect_fixup+0x151/0x290 [ 9448.325564] [811c26cb] setup_arg_pages+0x1db/0x200 [ 9448.325570] [81213edc] load_elf_binary+0x41c/0xd80 [ 9448.325576] [8131d503] ? ima_get_action+0x23/0x30 [ 9448.325579] [8131c7e2] ? process_measurement+0x82/0x2c0 [ 9448.325584] [811c2f7f] search_binary_handler+0x8f/0x1b0 [ 9448.325587] [811c44f7] do_execve_common.isra.22+0x5a7/0x7e0 [ 9448.325591] [811c49c6] SyS_execve+0x36/0x50 [ 9448.325596] [8172cc99] stub_execve+0x69/0xa0 [ 9448.325599] ---[ end trace 53ac16782e751c0a ]--- [ 9448.347994] [ cut here ] [ 9448.348004]
[Bug 1394327] [NEW] unmapping of persistent grants in qemu
Public bug reported: A patch was discussed in xen-devel mailing list, to deal with unmapping of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not included in any stable qemu release (including 2.0.2, 2.1.2 and 2.2.0-rc2 ) yet. The patch is available here. http://lists.xenproject.org/archives/html/xen-devel/2014-11/msg01112.html Without this patch, when creating a xen guest from OpenStack, using the Xen+libvirt approach, it will result in dom0 kernel crashes, with dmesg as following. [ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent grants: enabled; indirect descriptors: disabled; [ 9443.132818] xvda: xvda1 [ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use! [ 9444.604496] deferring g.e. 0x30 (pfn 0x) [ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use! [ 9444.604502] deferring g.e. 0x31 (pfn 0x) [ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use! [ 9444.604508] deferring g.e. 0x32 (pfn 0x) lots of them [ 9444.604719] xen:grant_table: WARNING: g.e. 0xe still in use! [ 9444.604721] deferring g.e. 0xe (pfn 0x) [ 9444.604723] xen:grant_table: WARNING: g.e. 0xd still in use! [ 9444.604725] deferring g.e. 0xd (pfn 0x) [ 9448.325408] [ cut here ] [ 9448.325421] WARNING: CPU: 5 PID: 19902 at /build/buildd/linux-3.13.0/arch/x86/xen/multicalls.c:129 xen_mc_flush+0x 1a9/0x1b0() [ 9448.325492] CPU: 5 PID: 19902 Comm: sudo Tainted: GF O 3.13.0-33-generic #58-Ubuntu [ 9448.325494] Hardware name: Dell Inc. PowerEdge R710/00W9X3, BIOS 2.1.15 09/02/2010 [ 9448.325497] 0009 8802d13d9aa8 8171bd04 [ 9448.325501] 8802d13d9ae0 810676cd 0001 [ 9448.325505] 88030418ffe0 88031d6ab180 0010 8802d13d9af0 [ 9448.325509] Call Trace: [ 9448.325518] [8171bd04] dump_stack+0x45/0x56 [ 9448.325523] [810676cd] warn_slowpath_common+0x7d/0xa0 [ 9448.325526] [810677aa] warn_slowpath_null+0x1a/0x20 [ 9448.325530] [81004e99] xen_mc_flush+0x1a9/0x1b0 [ 9448.325534] [81006b99] xen_set_pud_hyper+0x109/0x110 [ 9448.325538] [81006c3b] xen_set_pud+0x9b/0xb0 [ 9448.325543] [81177f06] __pmd_alloc+0xd6/0x110 [ 9448.325548] [81182218] move_page_tables+0x678/0x720 [ 9448.325552] [8117ddb7] ? vma_adjust+0x337/0x7d0 [ 9448.325557] [811c23fd] shift_arg_pages+0xbd/0x1b0 [ 9448.325560] [81181671] ? mprotect_fixup+0x151/0x290 [ 9448.325564] [811c26cb] setup_arg_pages+0x1db/0x200 [ 9448.325570] [81213edc] load_elf_binary+0x41c/0xd80 [ 9448.325576] [8131d503] ? ima_get_action+0x23/0x30 [ 9448.325579] [8131c7e2] ? process_measurement+0x82/0x2c0 [ 9448.325584] [811c2f7f] search_binary_handler+0x8f/0x1b0 [ 9448.325587] [811c44f7] do_execve_common.isra.22+0x5a7/0x7e0 [ 9448.325591] [811c49c6] SyS_execve+0x36/0x50 [ 9448.325596] [8172cc99] stub_execve+0x69/0xa0 [ 9448.325599] ---[ end trace 53ac16782e751c0a ]--- [ 9448.347994] [ cut here ] [ 9448.348004] WARNING: CPU: 1 PID: 19902 at /build/buildd/linux-3.13.0/mm/mmap.c:2736 exit_mmap+0x16b/0x170() ** Affects: qemu (Ubuntu) Importance: Undecided Status: New ** Description changed: - A patch was discussed in xen-devel mailing list, to deal with unmapping - of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not - included in any stable qemu release (including 2.0.2, 2.1.2 and - 2.2.0-rc2 ) yet. Without this patch, when creating a xen guest from - OpenStack, using the Xen+libvirt approach, it will result in dom0 kernel - crashes, with dmesg as following. + A patch was discussed in xen-devel mailing list, to deal with unmapping of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not included in any stable qemu release (including 2.0.2, 2.1.2 and 2.2.0-rc2 ) yet. The patch is available here. + http://lists.xenproject.org/archives/html/xen-devel/2014-11/msg01112.html + + Without this patch, when creating a xen guest from OpenStack, using the + Xen+libvirt approach, it will result in dom0 kernel crashes, with dmesg + as following. + [ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent grants: enabled; indirect descriptors: disabled; [ 9443.132818] xvda: xvda1 [ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use! [ 9444.604496] deferring g.e. 0x30 (pfn 0x) [ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use! [ 9444.604502] deferring g.e. 0x31 (pfn 0x) [ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use! [ 9444.604508] deferring g.e. 0x32 (pfn 0x) - lots of them + lots of them [ 9444.604719] xen:grant_table: WARNING: g.e. 0xe
[Bug 1394326] [NEW] unmapping of persistent grants in qemu
Public bug reported: A patch was discussed in xen-devel mailing list, to deal with unmapping of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not included in any stable qemu release (including 2.0.2, 2.1.2 and 2.2.0-rc2 ) yet. Without this patch, when creating a xen guest from OpenStack, using the Xen+libvirt approach, it will result in dom0 kernel crashes, with dmesg as following. [ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent grants: enabled; indirect descriptors: disabled; [ 9443.132818] xvda: xvda1 [ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use! [ 9444.604496] deferring g.e. 0x30 (pfn 0x) [ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use! [ 9444.604502] deferring g.e. 0x31 (pfn 0x) [ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use! [ 9444.604508] deferring g.e. 0x32 (pfn 0x) lots of them [ 9444.604719] xen:grant_table: WARNING: g.e. 0xe still in use! [ 9444.604721] deferring g.e. 0xe (pfn 0x) [ 9444.604723] xen:grant_table: WARNING: g.e. 0xd still in use! [ 9444.604725] deferring g.e. 0xd (pfn 0x) [ 9448.325408] [ cut here ] [ 9448.325421] WARNING: CPU: 5 PID: 19902 at /build/buildd/linux-3.13.0/arch/x86/xen/multicalls.c:129 xen_mc_flush+0x 1a9/0x1b0() [ 9448.325492] CPU: 5 PID: 19902 Comm: sudo Tainted: GF O 3.13.0-33-generic #58-Ubuntu [ 9448.325494] Hardware name: Dell Inc. PowerEdge R710/00W9X3, BIOS 2.1.15 09/02/2010 [ 9448.325497] 0009 8802d13d9aa8 8171bd04 [ 9448.325501] 8802d13d9ae0 810676cd 0001 [ 9448.325505] 88030418ffe0 88031d6ab180 0010 8802d13d9af0 [ 9448.325509] Call Trace: [ 9448.325518] [8171bd04] dump_stack+0x45/0x56 [ 9448.325523] [810676cd] warn_slowpath_common+0x7d/0xa0 [ 9448.325526] [810677aa] warn_slowpath_null+0x1a/0x20 [ 9448.325530] [81004e99] xen_mc_flush+0x1a9/0x1b0 [ 9448.325534] [81006b99] xen_set_pud_hyper+0x109/0x110 [ 9448.325538] [81006c3b] xen_set_pud+0x9b/0xb0 [ 9448.325543] [81177f06] __pmd_alloc+0xd6/0x110 [ 9448.325548] [81182218] move_page_tables+0x678/0x720 [ 9448.325552] [8117ddb7] ? vma_adjust+0x337/0x7d0 [ 9448.325557] [811c23fd] shift_arg_pages+0xbd/0x1b0 [ 9448.325560] [81181671] ? mprotect_fixup+0x151/0x290 [ 9448.325564] [811c26cb] setup_arg_pages+0x1db/0x200 [ 9448.325570] [81213edc] load_elf_binary+0x41c/0xd80 [ 9448.325576] [8131d503] ? ima_get_action+0x23/0x30 [ 9448.325579] [8131c7e2] ? process_measurement+0x82/0x2c0 [ 9448.325584] [811c2f7f] search_binary_handler+0x8f/0x1b0 [ 9448.325587] [811c44f7] do_execve_common.isra.22+0x5a7/0x7e0 [ 9448.325591] [811c49c6] SyS_execve+0x36/0x50 [ 9448.325596] [8172cc99] stub_execve+0x69/0xa0 [ 9448.325599] ---[ end trace 53ac16782e751c0a ]--- [ 9448.347994] [ cut here ] [ 9448.348004] WARNING: CPU: 1 PID: 19902 at /build/buildd/linux-3.13.0/mm/mmap.c:2736 exit_mmap+0x16b/0x170() ** Affects: qemu (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1394326 Title: unmapping of persistent grants in qemu To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1394326/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs