[Touch-packages] [Bug 1956954] Re: Can't load seccomp filter

2022-01-24 Thread Nino Škopac
My hunch is that the Puppeteer instances (which are Chromium instances) saturate the allocated memory limit for BPF, because they restart quite a lot, so maybe each time a new instance starts, it makes BPF allocate more memory, until it's full. But I have no idea: - how does JIT memory limit

[Touch-packages] [Bug 1956954] Re: Can't load seccomp filter

2022-01-24 Thread Paride Legovini
Hi, glad to know it worked. There is some heuristics behind the default bpf_jit_limit [1], it isn't a simple hardcoded value. We may discuss bumping the default in Ubuntu, but I don't think that's a good idea: the in-kernel heuristics has certainly been well thought, and just bumping the number is

[Touch-packages] [Bug 1956954] Re: Can't load seccomp filter

2022-01-23 Thread Nino Škopac
I confirmed the solution, it worked. Also, I tried to submit the patch against the linux kernel (and/or Seccomp-BPF subtree) following the official kernel guide (https://www.kernel.org/doc/html/latest/process/submitting-patches.html) but I couldn't even find the 33554432 value by doing: git

[Touch-packages] [Bug 1956954] Re: Can't load seccomp filter

2022-01-13 Thread Paride Legovini
If you want to change the value without rebooting that's: sudo sysctl net.core.bpf_jit_limit=264241152 Add it to /etc/sysctl.conf if you want to set it automatically at boot, but it's more meaningful to test as you said: wait for the issue to happen and then change the value while the system

[Touch-packages] [Bug 1956954] Re: Can't load seccomp filter

2022-01-13 Thread Nino Škopac
Dear Paride, Thank you so much I'll wait for the issue to resurface and *then* bump the value in order to have conclusive evidence. How should I do it? echo "net.core.bpf_jit_limit = 262144000" >> /etc/sysctl.conf (as sudo) Will that work without restart? Because the problem goes away

[Touch-packages] [Bug 1956954] Re: Can't load seccomp filter

2022-01-13 Thread Paride Legovini
Hi Nino, I found a RedHat bug [1] that describes a similar situation (affected is dhclient on ppc64le, but the error is the same). The suggested workaround is setting net.core.bpf_jit_limit = 262144000 via sysctl. I checked and on amd64 I find net.core.bpf_jit_limit = 264241152 while on

[Touch-packages] [Bug 1956954] Re: Can't load seccomp filter

2022-01-12 Thread Nino Škopac
Dear Lucas, I've mentioned in the SO post that I linked that the nature of the issue is intermittent. I would be happy to provide additional logs next time I encounter the issue. Could you please advise on how do I collect additional logs? Regards, Nino -- You received this bug notification

[Touch-packages] [Bug 1956954] Re: Can't load seccomp filter

2022-01-12 Thread Lucas Kanashiro
Thanks for taking the time to report this bug and trying to make Ubuntu better. I am not familiar with Puppeteer but since you think this might be related to kernel, could you please provide any system logs so we can understand what is happening? In a regular arm64 VM I am able to run "apt update