[Kernel-packages] [Bug 1350373] Re: Kernel BUG in paravirt_enter_lazy_mmu when running as a Xen PV guest

2014-11-13 Thread David Vrabel
PVH is experimental and the hypervisor ABI is subject to change so I wouldn't try making it work in a distro kernel. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1350373 Title: Kernel

[Kernel-packages] [Bug 1368724] Re: Xen guests may hang after migration or suspend/resume

2014-09-29 Thread David Vrabel
** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1368724 Title: Xen guests may hang after migration or s

[Kernel-packages] [Bug 1368724] Re: Xen guests may hang after migration or suspend/resume

2014-09-12 Thread David Vrabel
FYI, resume is an integral part of migration or domain restore. I've adjusted the test case accordingly. ** Description changed: [Impact] Xen guests may hang during resume after a migration or suspend. The predominately affects HVM guests. [Test Case] - Create a Xen guest and attempt

[Kernel-packages] [Bug 1368724] [NEW] Xen guests may hang after migration or suspend/resume

2014-09-12 Thread David Vrabel
Public bug reported: Xen guests may hang during resume after a migration or suspend. The predominately affects HVM guests. The following upstream commits (tagged for stable) fix the hangs. "x86/xen: resume timer irqs early" https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/

[Kernel-packages] [Bug 1304001] Re: xen:balloon errors in 14.04 beta

2014-09-12 Thread David Vrabel
The suggested (minimal) fix is now upstream. https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3dcf63677d4eb7fdfc13290c8558c301d2588fe8 I did /not/ tag it for stable because I do not consider this bug sufficiently critical. -- You received this bug notification because

[Kernel-packages] [Bug 1304001] Re: xen:balloon errors in 14.04 beta

2014-08-28 Thread David Vrabel
Sorry, it appears launchpad ate all the tabs. ** Patch added: "xen/balloon: cancel ballooning if adding new memory failed" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1304001/+attachment/4189295/+files/0001-xen-balloon-cancel-ballooning-if-adding-new-memory-f.patch -- You received t

[Kernel-packages] [Bug 1304001] Re: xen:balloon errors in 14.04 beta

2014-08-28 Thread David Vrabel
Can you try this patch? 8<-- xen/balloon: cancel ballooning if adding new memory failed If the balloon driver is adding additional memory regions to the balloon and add_memory() fails it will likely continuously fail so cancel the balloon operation. Signed-off-by: Da

[Kernel-packages] [Bug 1304001] Re: xen:balloon errors in 14.04 beta

2014-08-27 Thread David Vrabel
"xen:balloon: reserve_additional_memory: add_memory() failed: -17" can only occur in HVM guests if the balloon target is set above the maximum allowed by the guest's memory map. This is likely a bug in the EC2 toolstack. Perhaps this was introduced as a workaround for the problem fixed by c275a57f

[Kernel-packages] [Bug 1350373] Re: Kernel BUG in paravirt_enter_lazy_mmu when running as a Xen PV guest

2014-08-06 Thread David Vrabel
Thanks Stefan, I have tested that test kernel and it seems ok. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1350373 Title: Kernel BUG in paravirt_enter_lazy_mmu when running as a Xen P

[Kernel-packages] [Bug 1350373] Re: Kernel BUG in paravirt_enter_lazy_mmu when running as a Xen PV guest

2014-08-01 Thread David Vrabel
Thanks for the test kernel. Unfortunately it crashes in gnttab_init() when booting. I think the backport to 3.13 is not correct. I will try to produced a working backported patch. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in

[Kernel-packages] [Bug 1350373] Re: Kernel BUG in paravirt_enter_lazy_mmu when running as a Xen PV guest

2014-08-01 Thread David Vrabel
Here is a working patch against 3.13.10. ** Patch added: "[PATCH 3.13.10] x86/xen: safely map and unmap grant frames when in atomic context" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1350373/+attachment/4167411/+files/0001-x86-xen-safely-map-and-unmap-grant-frames-when-in-at.patch

[Kernel-packages] [Bug 1350373] Re: Kernel BUG in paravirt_enter_lazy_mmu when running as a Xen PV guest

2014-07-31 Thread David Vrabel
Commit b7dd0e350e0bd4c0fddcc9b8958342700b00b168 (x86/xen: safely map and unmap grant frames when in atomic context) https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b7dd0e350e0bd4c0fddcc9b8958342700b00b168 -- You received this bug notification because you are a member o

[Kernel-packages] [Bug 1350373] Re: Kernel BUG in paravirt_enter_lazy_mmu when running as a Xen PV guest

2014-07-30 Thread David Vrabel
** Summary changed: - Kernel BUG in paravirt_lazy_mmu when running as a Xen PV guest + Kernel BUG in paravirt_enter_lazy_mmu when running as a Xen PV guest -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.laun

[Kernel-packages] [Bug 1350373] Re: Kernel BUG in paravirt_lazy_mmu when running as a Xen PV guest

2014-07-30 Thread David Vrabel
appport-collect crashed when attempting to view the report so I've not attached any additional logs as requested by the bot. I hope this isn't a problem since I have already diagnosed the bug and provided the correct fix. ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- Y

[Kernel-packages] [Bug 1350373] [NEW] Kernel BUG in paravirt_lazy_mmu when running as a Xen PV guest

2014-07-30 Thread David Vrabel
Public bug reported: Xen PV guests may crash during boot in paravirt_enter_lazy_mmu() while expanding the grant table (usually when requested by blkfront, when booting). See an example trace below. This is caused by calling functions that are unsafe in atomic context. The fix (which has been su