Hi, I am pretty busy this week. I shall be able to do the test this weekend or next week. Thanks,
-Xing On Tue, Dec 16, 2014 at 7:18 AM, Chris J Arges <[email protected]> wrote: > Hello Xing, or anyone else affected, > > Accepted qemu into utopic-proposed. The package will build now and be > available at http://launchpad.net/ubuntu/+source/qemu/2.1+dfsg- > 4ubuntu6.4 in a few hours, and then in the -proposed repository. > > Please help us by testing this new package. See > https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to > enable and use -proposed. Your feedback will aid us getting this update > out to other Ubuntu users. > > If this package fixes the bug for you, please add a comment to this bug, > mentioning the version of the package you tested, and change the tag > from verification-needed to verification-done. If it does not fix the > bug for you, please add a comment stating that, and change the tag to > verification-failed. In either case, details of your testing will help > us make a better decision. > > Further information regarding the verification process can be found at > https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in > advance! > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1394327 > > Title: > unmapping of persistent grants in qemu > > Status in qemu package in Ubuntu: > Fix Released > Status in qemu source package in Trusty: > Fix Committed > Status in qemu source package in Utopic: > Fix Committed > Status in Debian GNU/Linux: > Fix Released > > Bug description: > A patch was discussed in xen-devel mailing list, to deal with unmapping > of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not > included in any stable qemu release (including 2.0.2, 2.1.2 and 2.2.0-rc2 ) > yet. The patch is available here. > > http://lists.xenproject.org/archives/html/xen-devel/2014-11/msg01112.html > > Without this patch, when creating a xen guest from OpenStack, using > the Xen+libvirt approach, it will result in dom0 kernel crashes, with > dmesg as following. > > > [ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent > grants: enabled; indirect descriptors: disabled; > [ 9443.132818] xvda: xvda1 > [ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use! > [ 9444.604496] deferring g.e. 0x30 (pfn 0xffffffffffffffff) > [ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use! > [ 9444.604502] deferring g.e. 0x31 (pfn 0xffffffffffffffff) > [ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use! > [ 9444.604508] deferring g.e. 0x32 (pfn 0xffffffffffffffff) > ==== lots of them==== > [ 9444.604719] xen:grant_table: WARNING: g.e. 0xe still in use! > [ 9444.604721] deferring g.e. 0xe (pfn 0xffffffffffffffff) > [ 9444.604723] xen:grant_table: WARNING: g.e. 0xd still in use! > [ 9444.604725] deferring g.e. 0xd (pfn 0xffffffffffffffff) > [ 9448.325408] ------------[ cut here ]------------ > [ 9448.325421] WARNING: CPU: 5 PID: 19902 at > /build/buildd/linux-3.13.0/arch/x86/xen/multicalls.c:129 xen_mc_flush+0x > 1a9/0x1b0() > [ 9448.325492] CPU: 5 PID: 19902 Comm: sudo Tainted: GF O > 3.13.0-33-generic #58-Ubuntu > [ 9448.325494] Hardware name: Dell Inc. PowerEdge R710/00W9X3, BIOS > 2.1.15 09/02/2010 > [ 9448.325497] 0000000000000009 ffff8802d13d9aa8 ffffffff8171bd04 > 0000000000000000 > [ 9448.325501] ffff8802d13d9ae0 ffffffff810676cd 0000000000000000 > 0000000000000001 > [ 9448.325505] ffff88030418ffe0 ffff88031d6ab180 0000000000000010 > ffff8802d13d9af0 > [ 9448.325509] Call Trace: > [ 9448.325518] [<ffffffff8171bd04>] dump_stack+0x45/0x56 > [ 9448.325523] [<ffffffff810676cd>] warn_slowpath_common+0x7d/0xa0 > [ 9448.325526] [<ffffffff810677aa>] warn_slowpath_null+0x1a/0x20 > [ 9448.325530] [<ffffffff81004e99>] xen_mc_flush+0x1a9/0x1b0 > [ 9448.325534] [<ffffffff81006b99>] xen_set_pud_hyper+0x109/0x110 > [ 9448.325538] [<ffffffff81006c3b>] xen_set_pud+0x9b/0xb0 > [ 9448.325543] [<ffffffff81177f06>] __pmd_alloc+0xd6/0x110 > [ 9448.325548] [<ffffffff81182218>] move_page_tables+0x678/0x720 > [ 9448.325552] [<ffffffff8117ddb7>] ? vma_adjust+0x337/0x7d0 > [ 9448.325557] [<ffffffff811c23fd>] shift_arg_pages+0xbd/0x1b0 > [ 9448.325560] [<ffffffff81181671>] ? mprotect_fixup+0x151/0x290 > [ 9448.325564] [<ffffffff811c26cb>] setup_arg_pages+0x1db/0x200 > [ 9448.325570] [<ffffffff81213edc>] load_elf_binary+0x41c/0xd80 > [ 9448.325576] [<ffffffff8131d503>] ? ima_get_action+0x23/0x30 > [ 9448.325579] [<ffffffff8131c7e2>] ? process_measurement+0x82/0x2c0 > [ 9448.325584] [<ffffffff811c2f7f>] search_binary_handler+0x8f/0x1b0 > [ 9448.325587] [<ffffffff811c44f7>] do_execve_common.isra.22+0x5a7/0x7e0 > [ 9448.325591] [<ffffffff811c49c6>] SyS_execve+0x36/0x50 > [ 9448.325596] [<ffffffff8172cc99>] stub_execve+0x69/0xa0 > [ 9448.325599] ---[ end trace 53ac16782e751c0a ]--- > [ 9448.347994] ------------[ cut here ]------------ > [ 9448.348004] WARNING: CPU: 1 PID: 19902 at > /build/buildd/linux-3.13.0/mm/mmap.c:2736 exit_mmap+0x16b/0x170() > > To manage notifications about this bug go to: > https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1394327/+subscriptions > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1394327 Title: unmapping of persistent grants in qemu To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1394327/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
