| 
    
 [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] xen-unstable: commit commit 63753b3e0dc56efb1acf94fa46f3fee7bc59281c leaves HVM guest dangling after shutdown or destroy.
 
Tuesday, April 30, 2013, 4:18:28 PM, you wrote:
>>>> On 30.04.13 at 15:55, Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> wrote:
>> On Wed, Apr 24, 2013 at 10:31:20AM +0100, George Dunlap wrote:
>>> On Tue, Apr 23, 2013 at 4:35 PM, Roger Pau Monnà <roger.pau@xxxxxxxxxx> 
>>> wrote:
>>> > On 20/04/13 20:56, Konrad Rzeszutek Wilk wrote:
>>> >>
>>> >>
>>> >> Sander Eikelenboom <linux@xxxxxxxxxxxxxx> wrote:
>>> >>
>>> >>> Hi,
>>> >>>
>>> >>> Commit 63753b3e0dc56efb1acf94fa46f3fee7bc59281c x86: allow
>>> >>> VCPUOP_register_vcpu_info to work again on PVHVM guests
>>> >>>
>>> >>> Leaves HVM guests dangling after shutdown or destroy:
>>> >>>
>>> >>> xl list gives:
>>> >>> (null)                                      16     0     4     --p--d
>>> >>>   11.5
>>> >>> (null)                                      17     0     1     --ps-d
>>> >>>   12.0
>>> >>>
>>> >>> (first was destroyed, second shutdown)
>>> >>>
>>> >>> The actual xl and qemu processes are gone, so guest only seem to be
>>> >>> still registered in the hypervisor.
>>> >>>
>>> >>> Another thing this seems to trigger (and that perhaps needs fixing) is
>>> >>> that a "xl shutdown --all --wait" doesn't wait anymore.
>>> >>> It returns immediately, probably due to the "nullified" name ?
>>> >>
>>> >> Is this only happening with Linux guests?
>>> >
>>> > AFAIK this seems to happen with guests that use
>>> > VCPUOP_register_vcpu_info (I'm seeing the same on FreeBSD).
>>> 
>>> Are we leaving a reference to a page dangling around somewhere?
>> 
>> <nods> That is my thinking. George, if you would not mind - could you add
>> this to the list of bugs for Xen 4.3 I am responsible for.
> Perhaps you can take this off the list again right away: A brief look
> at the code shows that unmap_vcpu_info() is being called only for
> PV guests. Patch below/attached (compile tested only).
> Jan
Works for me (tm)
Thx
Sander
> x86: call unmap_vcpu_info() regardless of guest type
> This fixes a regression from 63753b3e ("x86: allow
> VCPUOP_register_vcpu_info to work again on PVHVM guests").
> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
> --- a/xen/arch/x86/domain.c
> +++ b/xen/arch/x86/domain.c
> @@ -2013,7 +2013,11 @@ int domain_relinquish_resources(struct d
>  
>          /* Drop the in-use references to page-table bases. */
>          for_each_vcpu ( d, v )
> +        {
>              vcpu_destroy_pagetables(v);
> +
> +            unmap_vcpu_info(v);
> +        }
>  
>          if ( !is_hvm_domain(d) )
>          {
> @@ -2025,8 +2029,6 @@ int domain_relinquish_resources(struct d
>                   * mappings.
>                   */
>                  destroy_gdt(v);
> -
> -                unmap_vcpu_info(v);
>              }
>  
>              if ( d->arch.pv_domain.pirq_eoi_map != NULL )
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
  | 
  
![]()  | 
            
         Lists.xenproject.org is hosted with RackSpace, monitoring our  |