[Bug 1394327] Please test proposed package

Xing Lin linxingnku at gmail.com
Tue Dec 16 17:21:04 UTC 2014


Hi,

I am pretty busy this week. I shall be able to do the test this weekend or
next week. Thanks,

-Xing

On Tue, Dec 16, 2014 at 7:18 AM, Chris J Arges <1394327 at bugs.launchpad.net>
wrote:

> Hello Xing, or anyone else affected,
>
> Accepted qemu into utopic-proposed. The package will build now and be
> available at http://launchpad.net/ubuntu/+source/qemu/2.1+dfsg-
> 4ubuntu6.4 in a few hours, and then in the -proposed repository.
>
> Please help us by testing this new package.  See
> https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
> enable and use -proposed.  Your feedback will aid us getting this update
> out to other Ubuntu users.
>
> If this package fixes the bug for you, please add a comment to this bug,
> mentioning the version of the package you tested, and change the tag
> from verification-needed to verification-done. If it does not fix the
> bug for you, please add a comment stating that, and change the tag to
> verification-failed.  In either case, details of your testing will help
> us make a better decision.
>
> Further information regarding the verification process can be found at
> https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
> advance!
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1394327
>
> Title:
>   unmapping of persistent grants in qemu
>
> Status in qemu package in Ubuntu:
>   Fix Released
> Status in qemu source package in Trusty:
>   Fix Committed
> Status in qemu source package in Utopic:
>   Fix Committed
> Status in Debian GNU/Linux:
>   Fix Released
>
> Bug description:
>   A patch was discussed in xen-devel mailing list, to deal with unmapping
> of persistent grants in qemu for Xen on 12 Nov 2014. This patch is not
> included in any stable qemu release (including 2.0.2, 2.1.2 and 2.2.0-rc2 )
> yet. The patch is available here.
>
> http://lists.xenproject.org/archives/html/xen-devel/2014-11/msg01112.html
>
>   Without this patch, when creating a xen guest from OpenStack, using
>   the Xen+libvirt approach, it will result in dom0 kernel crashes, with
>   dmesg as following.
>
>
>   [ 9443.130600] blkfront: xvda: flush diskcache: enabled; persistent
> grants: enabled; indirect descriptors: disabled;
>   [ 9443.132818]  xvda: xvda1
>   [ 9444.604489] xen:grant_table: WARNING: g.e. 0x30 still in use!
>   [ 9444.604496] deferring g.e. 0x30 (pfn 0xffffffffffffffff)
>   [ 9444.604499] xen:grant_table: WARNING: g.e. 0x31 still in use!
>   [ 9444.604502] deferring g.e. 0x31 (pfn 0xffffffffffffffff)
>   [ 9444.604505] xen:grant_table: WARNING: g.e. 0x32 still in use!
>   [ 9444.604508] deferring g.e. 0x32 (pfn 0xffffffffffffffff)
>     ==== lots of them====
>   [ 9444.604719] xen:grant_table: WARNING: g.e. 0xe still in use!
>   [ 9444.604721] deferring g.e. 0xe (pfn 0xffffffffffffffff)
>   [ 9444.604723] xen:grant_table: WARNING: g.e. 0xd still in use!
>   [ 9444.604725] deferring g.e. 0xd (pfn 0xffffffffffffffff)
>   [ 9448.325408] ------------[ cut here ]------------
>   [ 9448.325421] WARNING: CPU: 5 PID: 19902 at
> /build/buildd/linux-3.13.0/arch/x86/xen/multicalls.c:129 xen_mc_flush+0x
>   1a9/0x1b0()
>   [ 9448.325492] CPU: 5 PID: 19902 Comm: sudo Tainted: GF          O
> 3.13.0-33-generic #58-Ubuntu
>   [ 9448.325494] Hardware name: Dell Inc. PowerEdge R710/00W9X3, BIOS
> 2.1.15 09/02/2010
>   [ 9448.325497]  0000000000000009 ffff8802d13d9aa8 ffffffff8171bd04
> 0000000000000000
>   [ 9448.325501]  ffff8802d13d9ae0 ffffffff810676cd 0000000000000000
> 0000000000000001
>   [ 9448.325505]  ffff88030418ffe0 ffff88031d6ab180 0000000000000010
> ffff8802d13d9af0
>   [ 9448.325509] Call Trace:
>   [ 9448.325518]  [<ffffffff8171bd04>] dump_stack+0x45/0x56
>   [ 9448.325523]  [<ffffffff810676cd>] warn_slowpath_common+0x7d/0xa0
>   [ 9448.325526]  [<ffffffff810677aa>] warn_slowpath_null+0x1a/0x20
>   [ 9448.325530]  [<ffffffff81004e99>] xen_mc_flush+0x1a9/0x1b0
>   [ 9448.325534]  [<ffffffff81006b99>] xen_set_pud_hyper+0x109/0x110
>   [ 9448.325538]  [<ffffffff81006c3b>] xen_set_pud+0x9b/0xb0
>   [ 9448.325543]  [<ffffffff81177f06>] __pmd_alloc+0xd6/0x110
>   [ 9448.325548]  [<ffffffff81182218>] move_page_tables+0x678/0x720
>   [ 9448.325552]  [<ffffffff8117ddb7>] ? vma_adjust+0x337/0x7d0
>   [ 9448.325557]  [<ffffffff811c23fd>] shift_arg_pages+0xbd/0x1b0
>   [ 9448.325560]  [<ffffffff81181671>] ? mprotect_fixup+0x151/0x290
>   [ 9448.325564]  [<ffffffff811c26cb>] setup_arg_pages+0x1db/0x200
>   [ 9448.325570]  [<ffffffff81213edc>] load_elf_binary+0x41c/0xd80
>   [ 9448.325576]  [<ffffffff8131d503>] ? ima_get_action+0x23/0x30
>   [ 9448.325579]  [<ffffffff8131c7e2>] ? process_measurement+0x82/0x2c0
>   [ 9448.325584]  [<ffffffff811c2f7f>] search_binary_handler+0x8f/0x1b0
>   [ 9448.325587]  [<ffffffff811c44f7>] do_execve_common.isra.22+0x5a7/0x7e0
>   [ 9448.325591]  [<ffffffff811c49c6>] SyS_execve+0x36/0x50
>   [ 9448.325596]  [<ffffffff8172cc99>] stub_execve+0x69/0xa0
>   [ 9448.325599] ---[ end trace 53ac16782e751c0a ]---
>   [ 9448.347994] ------------[ cut here ]------------
>   [ 9448.348004] WARNING: CPU: 1 PID: 19902 at
> /build/buildd/linux-3.13.0/mm/mmap.c:2736 exit_mmap+0x16b/0x170()
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1394327/+subscriptions
>

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1394327

Title:
  unmapping of persistent grants in qemu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1394327/+subscriptions



More information about the Ubuntu-server-bugs mailing list