[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-18 Thread Khaled El Mously
Hey Zhanglei.

We do not have a 5.16 Ubuntu kernel. We do have 5.15 kernels. 
The current mainline version is 5.18 not 5.16.

I have built 2 kernels, one 5.18 and one 5.15 kernel for you.

5.15: 
https://kernel.ubuntu.com/~kmously/kernel-kmously-45afdcc-gwrv/


5.18:
https://kernel.ubuntu.com/~kmously/kernel-kmously-469ac56-or1l/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-17 Thread Khaled El Mously
Thanks Zhanglei. Great. We have identified the problem patch, which is
this one:

380cd49e207ba4  ata: ahci: Add Green Sardine vendor ID as
board_ahci_mobile


But I am not really sure why this patch is causing a problem.

The patch only adds one new line as you can see here:
https://pastebin.ubuntu.com/p/TDXdRttc4M/plain

Looks like it is altering the behaviour of "PCI device ID 1022:7901"
which is supposed to be AMD "Green Sardine". From what I found online,
"Green Sardine" is an AMD APU (CPU + GPU) but I believe you are using an
AMD EPYC server, so I don't understand why you would be affected at all.

Looking at the SOS report you provided, I see the device ID for the SATA
controller is 1022:7901 even though you are using EPYC. Again, not
really sure why.

I don't understand why there is a conflict in device IDs like this.

I will see if I can find out more information.

Do you know if the problem happens with any disk you hotplug, or just
this one?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-16 Thread Khaled El Mously
Hello Zhanglei. Thanks. This means:

3000: BUG
3002: NO BUG
3003: NO BUG
3004: NO BUG
3005: BUG
3006: NO BUG


There are only 5 patches between 3005 and 3006 so one of them is the problem. 
You can see the list of patches here: 

https://pastebin.canonical.com/p/TkvDGcfHWk/plain/

Only one of them seems related to sata which is "ata: ahci: Add Green
Sardine vendor ID as board_ahci_mobile" So maybe this is the one.

Please test kernel 3007 from here:

https://kernel.ubuntu.com/~kmously/kernel-kmously-3b63e74-Mkii/

If this fails, then this will be the last kernel we have to test. Please
make sure you are running version 3007. Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-14 Thread Khaled El Mously
Hello Zhanglei. Thanks for the update. This means:

3000: BUG
3002: NO BUG
3003: NO BUG
3004: NO BUG
3005: BUG


We are getting very close now. Please try version 3006 from this link:

https://kernel.ubuntu.com/~kmously/kernel-kmously-c756bab-RGcD/


Please make sure you are running 3006. Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-12 Thread Khaled El Mously
Hello again Zhanglei.

This means that so far:

3000: BUG
3002: NO BUG
3003: NO BUG
3004: NO BUG

You can find kernel 3005 here:

https://kernel.ubuntu.com/~kmously/kernel-kmously-039f206-aRqC/

Please ensure you are running version -3005. Thank you

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-12 Thread Khaled El Mously
Thanks Zhanglei. I am building 3005 now. It should be ready in about 30
minutes. I will update again soon

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964527] Re: Enable CONFIG_UNICODE for linux-gcp

2022-05-12 Thread Khaled El Mously
** Changed in: linux-gcp (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964527

Title:
  Enable CONFIG_UNICODE for linux-gcp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1964527/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-12 Thread Khaled El Mously
Thanks Zhanglei. This means that so far:

3000: BUG
3002: NO BUG
3003: NO BUG


We are getting closer. This is the remaining set of patches:

00501b41aaf73f (tag: test-3000, tag: fail1) s390/pci: move pseudo-MMIO to 
prevent MIO overlap
14914e943b0ca5 cpufreq: Fix get_cpu_device() failure in add_cpu_dev_symlink()
02a3dc73620247 rt2x00: do not mark device gone on EPROTO errors during start
d0c736f3c95a8e kprobes: Limit max data_size of the kretprobe instances
1101e48029ef8b vrf: Reset IPCB/IP6CB when processing outbound pkts in vrf dev 
xmit
8ac948debe102a net/smc: Avoid warning of possible recursive locking
844b74044432ab perf report: Fix memory leaks around perf_tip()
ef0a82700dd088 perf hist: Fix memory leak of a perf_hpp_fmt
25b5451cf6b834 net: ethernet: dec: tulip: de4x5: fix possible array overflows 
in type3_infoblock()
79ab9e40571039 net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' 
may be out of bound
60cbd2bb3e4920 ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array 
overflow in hns_dsaf_ge_srst_by_port()
380cd49e207ba4 ata: ahci: Add Green Sardine vendor ID as board_ahci_mobile
02ce9dcd0056d0 scsi: iscsi: Unblock session then wake up error handler
39fe9db370a672 thermal: core: Reset previous low and high trip during thermal 
zone init
9c4257be2b4e87 (tag: test-3004) btrfs: check-integrity: fix a warning on write 
caching disabled disk
7888748df21e65 s390/setup: avoid using memblock_enforce_memory_limit
ec02be4afbaa32 platform/x86: thinkpad_acpi: Fix WWAN device disabled issue 
after S3 deep
ecaf617d2d911f net: return correct error code
cf471f304c7bdd atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
ef48e7dac2b4a5 net/smc: Transfer remaining wait queue entries during fallback
f5a7ae1664ea55 mac80211: do not access the IV when it was stripped
04e2506c0a0f0e drm/sun4i: fix unmet dependency on RESET_CONTROLLER for 
PHY_SUN6I_MIPI_DPHY
cc02a02a96d745 gfs2: Fix length of holes reported at end-of-file
db58cf66b9ed5f can: j1939: j1939_tp_cmd_recv(): check the dst address of 
TP.CM_BAM
5891df6f755bdc arm64: dts: mcbin: support 2W SFP modules
e7ef1451808ba8 of: clk: Make  self-contained
a8e84f43323809 NFSv42: Fix pagecache invalidation after COPY/CLONE
87243d366e21dd UBUNTU: upstream stable to v5.4.163
8dedcf4867336b Linux 5.4.163
fe61be970fa57f tty: hvc: replace BUG_ON() with negative return value
ae65528da134f8 (tag: test-3003, tag: pass2) xen/netfront: don't trust the 
backend response data blindly



The bottom commit (3003) passed and the top commit (3000) failed, so the 
problem is one of the patches in between. We are now about to test kernel 3004 
in the middle.

You can find kernel 3004 here:

https://kernel.ubuntu.com/~kmously/kernel-kmously-721de44-fWzO/


Please ensure you are running version -3004. Thank you

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-11 Thread Khaled El Mously
Hello Zhanglei. Thanks for the update.

From my understanding, so far:

3000:  BUG
3002:  NO BUG


I have the next kernel, 3003, available here:

https://kernel.ubuntu.com/~kmously/kernel-kmously-8243717-Kutu

Once again, please ensure that you are testing with -3003 when testing.
Thank you

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-10 Thread Khaled El Mously
Hello Zhanglei,

Thanks for the update. I am a little surprised that this kernel failed.
There are 2 SATA related changes in kernel -100 which I suspected were
the root cause. However, the kernel that I provided (version 3000) did
NOT contain those patches, so I expected it to work.

The patches that I suspected were the cause are:

  sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl
  sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl


In any case, maybe my assumption was incorrect. We can continue to bisect 
anyway.

I am unable to provide all the kernels in one shot because the next
kernel that we should test depends on the results of the test before it.
If I give them all in one shot, I would have to give you 270 kernels to
test instead of 9. We have already done the first bisect. Now we have
125 patches (instead of 270) so should be another 7 tests at most.

The next kernel is available here:

https://kernel.ubuntu.com/~kmously/kernel-kmously-440f762-4e4H/


This is version 3002. Please, when the engineer tests this kernel, make sure to 
type "uname -r" to confirm that it is version 3002. That way we can be 100% 
sure we are testing the right kernel.

Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EPYC (Asus) server

2022-05-09 Thread Khaled El Mously
Hello Zhanglei, thanks for confirming the working/broken versions.

I am not sure if I will be able to reproduce the issue myself. There are
270 changes between -99 and -100.  If you can help me bisect them, we
should be able to quickly identify the problem. Would you be able to
test the kernels I provide so we can identify the breaking commit? We
might need to test up to 9 more kernels.

I have built the first test kernel. It can be found at:

https://kernel.ubuntu.com/~kmously/kernel-kmously-d60b65f-bspU/

If you can, please install the linux-image, linux-modules and linux-
modules-extra packages from the above link and attempt to reproduce the
problem. Thank you.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EPYC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1971576] Re: SATA device hot plug regression on AMD EYPC (Asus) server

2022-05-05 Thread Khaled El Mously
Hello @zhanglei-mao thanks for creating the bug report.

There is a large time difference between those 5.4 kernels. 5.4.0-42 is
from June 2020 and 5.4.0-109 is very recent. Is it possible to find out
the first non-working 5.4 kernel? We would need to do a bisect.

Do you think you might be able to test the 5.4.0-75 kernel to try to
reproduce this problem?

Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971576

Title:
  SATA device hot plug regression on AMD EYPC (Asus) server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964527] Re: Enable CONFIG_UNICODE for linux-gcp

2022-04-26 Thread Khaled El Mously
The change for this bug has been committed to the gcp kernel. The next
focal/linux-gcp kernel release (5.4.0-1073 or later) should contain the
updated configuration. The bionic/linux-gcp-5.4 kernel will receive the
update as well.

Thanks for reporting the issue, @lhaley, and thanks for your patience!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964527

Title:
  Enable CONFIG_UNICODE for linux-gcp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1964527/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964527] Re: Enable CONFIG_UNICODE for linux-gcp

2022-04-26 Thread Khaled El Mously
** Changed in: linux-gcp (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964527

Title:
  Enable CONFIG_UNICODE for linux-gcp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1964527/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964527] Re: Enable CONFIG_UNICODE for linux-gcp

2022-04-20 Thread Khaled El Mously
** Changed in: linux-gcp (Ubuntu Focal)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964527

Title:
  Enable CONFIG_UNICODE for linux-gcp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1964527/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925421] Re: arm64 support

2022-04-18 Thread Khaled El Mously
** No longer affects: linux-gcp (Ubuntu Bionic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925421

Title:
  arm64 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1925421/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925421] Re: arm64 support

2022-03-30 Thread Khaled El Mously
** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-gcp (Ubuntu Groovy)

** No longer affects: linux-gcp (Ubuntu Hirsute)

** No longer affects: linux-gcp (Ubuntu Impish)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925421

Title:
  arm64 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1925421/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1947099] Re: ipconfig does not honour user-requested timeouts in some cases

2022-03-21 Thread Khaled El Mously
A [ Regression potential ] section was added to the description.

@Łukasz Zemczak let me know if there are other details you would like.
Thank you!

** Description changed:

- 
  [Impact]
  In some cases, ipconfig can take a longer time than the user-specified 
timeouts, causing unexpected delays.
  
  [Test Plan]
  Any situation where ipconfig encounters an error sending the DHCP packet, it 
will automatically set a delay of 10 seconds, which could be longer than the 
user-specified timeout. It can be reproduced by creating a dummy interface and 
attempting to run ipconfig on it with a timeout value of less than 10:
  
  # ip link add eth1 type dummy
  # date; /usr/lib/klibc/bin/ipconfig -t 2 eth1; date
  Thu Nov 18 04:46:13 EST 2021
  IP-Config: eth1 hardware address ae:e0:f5:9d:7e:00 mtu 1500 DHCP RARP
  IP-Config: no response after 2 secs - giving up
  Thu Nov 18 04:46:23 EST 2021
  
  ^ Notice above, ipconfig thinks that it waited 2 seconds, but the
  timestamps show an actual delay of 10 seconds.
  
  [Where problems could occur]
  Please see reproduction steps above. We are seeing this in production too 
(see comment #2).
  
  [Other Info]
  A patch to fix the issue is being proposed here. It is a safe fix - it only 
checks before going into sleep that the timeout never exceeds the 
user-requested value.
  
  [Original Description]
  
  In some cases, ipconfig can take longer than the user-specified
  timeouts, causing unexpected delays.
  
  in main.c, in function loop(), the process can go into
  process_timeout_event() (or process_receive_event() ) and if it
  encounters an error situation, will set an attempt to "try again later"
  at time equal now + 10 seconds by setting
  
  s->expire = now + 10;
  
  This can happen at any time during the main event loop, which can end up
  extending the user-specified timeout if "now + 10" is greater than
  "start_time + user-specified-timeout".
  
  I believe a patch like the following is needed to avoid this problem:
  
  --- a/usr/kinit/ipconfig/main.c
  +++ b/usr/kinit/ipconfig/main.c
  @@ -437,6 +437,13 @@ static int loop(void)
  
  if (timeout > s->expire - now.tv_sec)
  timeout = s->expire - now.tv_sec;
  +
  +   /* Compensate for already-lost time */
  +   gettimeofday(, NULL);
  +   if (now.tv_sec + timeout > start + loop_timeout) {
  +   timeout = loop_timeout - (now.tv_sec - start);
  +   printf("Lowered timeout to match user request 
= (%d s) \n", timeout);
  +   }
  }
  
  I believe the current behaviour is buggy. This is confirmed when the
  following line is executed:
  
  if (loop_timeout >= 0 &&
  now.tv_sec - start >= loop_timeout) {
  printf("IP-Config: no response after %d "
     "secs - giving up\n", loop_timeout);
  rc = -1;
  goto bail;
  }
  
  'loop_timeout' is the user-specified time-out. With a value of 2, in
  case of error, this line prints:
  
  IP-Config: no response after 2 secs - giving up
  
  So it thinks that it waited 2 seconds - however, in reality it had
  actually waited for 10 seconds.
  
  The suggested code-change ensures that the timeout that is actually used
  never exceeds the user-specified timeout.
+ 
+ 
+ [ Regression potential ]
+ 
+ This change ensures that user-specified timeouts are never exceeded, which is 
a problem that appears to happen only in case of interface errors. 
+ It may be that someone is relying on current behaviour where they receive 
DHCP offers after their specified timeout (but within the 10-second error 
timeout). However, 1) that is buggy behaviour and should be exposed. Such a 
user would need to update their specified timeout to make it long enough to 
receive the DHCP offer (setting the timeout to 10 would keep the existing 
behaviour). 2) I think it is unlikely that such a scenario exists at all. The 
10-second timeout problem happens when there are problems with the interface 
that prevent it from even sending out the DHCP request. I think it is very 
unlikely (or even, impossible) that DHCP offers would be received on a dead 
interface.
+ 
+ Based on the above points, I consider the regression potential to be
+ very low for this change. I do not expect anyone who is currently using
+ ipconfig successfully to notice this change.
+ 
+ I believe the only difference introduced by this is the reduction of
+ delays caused by dead or problematic network interfaces. Those error
+ delays are shortened such that they never exceeed user-specified
+ timeouts.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

[Bug 1947099] Re: ipconfig does not honour user-requested timeouts in some cases

2022-03-21 Thread Khaled El Mously
Hello @Łukasz Zemczak

I understand your concern about breaking existing behaviour.

I would like to clarify 2 things:
 1) The change introduced here only ensures that user-requested timeouts are 
never exceeded. That means that if something is currently accepting DHCP offers 
after the specified timeout has expired, then that is buggy behaviour. It would 
make sense that such behaviour would change after this change. If such a user 
exists, they would need to change their timeout values so as to be long enough 
to receive the DHCP offer that they want. I think it makes sense that such 
buggy behaviour would get exposed with this fix.
 2) That said, I consider it very unlikely for that scenario to even exist. The 
main reason is that the bug (going over the specified timeout) happens in the 
case where there is a problem bringing up the interface, so the ipconfig logic 
simply says "try again in 10 seconds" in that case, even if that 10 seconds is 
longer than the entire specified timeout. Since this happens when there are 
interface problems, it can be safely assumed that no DHCP offers will be 
received anyway on that problematic interface (in fact, no DHCP request was 
even sent out). These 10 seconds are just dead time, basically.

So I would consider it unlikely that anyone who is successfully using
ipconfig today would even notice a change. This patch should only affect
those 10-seconds delays caused by problematic interfaces not normal
functioning interfaces, (and even then, it would only affect them if the
user-specified timeout is less than 10 seconds).

I am not sure what you mean by how it differs from focal+. The last time
I checked, the timeout-bug was affecting ipconfig in both focal and
bionic (and upstream HEAD). However, we are only interested in Bionic
since Focal does not even use ipconfig it uses dhclient instead.

I will add a regression-potential section to the description with more
info. Thanks.

I will try to expand the regression-potential section with additional
info about this.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947099

Title:
  ipconfig does not honour user-requested timeouts in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1947099/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1965075] Re: arm64 suport

2022-03-15 Thread Khaled El Mously
** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-oracle (Ubuntu)

** No longer affects: linux-oracle (Ubuntu Bionic)

** No longer affects: linux-oracle (Ubuntu Focal)

** No longer affects: linux-oracle (Ubuntu Jammy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965075

Title:
  arm64 suport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1965075/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1965075] [NEW] arm64 suport

2022-03-15 Thread Khaled El Mously
Public bug reported:


[Impact]
No support for arm64 currently

[Fix]
Add arm64 support, including hardware support patches

[Test]
Confirm that it boots on desired arm64 hardware, as well as VMs

[Regression Potential]
This was never working on arm64 so there should be no risk of regression.
The requested changes included some refactorings of early memory initialization 
code (all arches) so this presents a small risk. The changes were tested on 
arm64 as well amd64.

** Affects: linux-oracle (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-oracle (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: linux-oracle (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: linux-oracle (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Also affects: linux-oracle (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965075

Title:
  arm64 suport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1965075/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964527] [NEW] Enable CONFIG_UNICODE for linux-gcp

2022-03-10 Thread Khaled El Mously
Public bug reported:

See https://lists.ubuntu.com/archives/kernel-team/2022-March/128565.html

NOTE: This config is enabled in other gcp kernels and in non-gcp
kernels.

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Assignee: Khaled El Mously (kmously)
 Status: New

** Affects: linux-gcp (Ubuntu Focal)
 Importance: Undecided
 Assignee: Khaled El Mously (kmously)
 Status: New

** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: klibc (Ubuntu)

** Also affects: linux-gcp (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux-gcp (Ubuntu Focal)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux-gcp (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964527

Title:
  Enable CONFIG_UNICODE for linux-gcp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1964527/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953575] Re: Update gvnic driver code

2022-03-06 Thread Khaled El Mously
** Tags removed: verification-needed-impish
** Tags added: verification-done-impish

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953575

Title:
  Update gvnic driver code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1953575/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953575] Re: Update gvnic driver code

2022-03-06 Thread Khaled El Mously
** Changed in: linux-gcp (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: linux-gcp (Ubuntu Impish)
   Status: In Progress => Fix Committed

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953575

Title:
  Update gvnic driver code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1953575/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953575] Re: Update gvnic driver code

2022-03-01 Thread Khaled El Mously
** Also affects: linux-gcp (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Changed in: linux-gcp (Ubuntu Impish)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux-gcp (Ubuntu Impish)
   Importance: Undecided => Medium

** Changed in: linux-gcp (Ubuntu Impish)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953575

Title:
  Update gvnic driver code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1953575/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957744] Re: Unable to set correct resolutions on virtual displays

2022-01-30 Thread Khaled El Mously
** Tags removed: verification-needed-impish
** Tags added: verification-done-impish

** Tags removed: verification-needed-focal

** Tags removed: verification-needed-hirsute
** Tags added: verification-done-hirsute

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957744

Title:
  Unable to set correct resolutions on virtual displays

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1957744/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959173] Re: Vulnerability in af_packet handling

2022-01-30 Thread Khaled El Mously
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959173

Title:
  Vulnerability in af_packet handling

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1959173/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959173] [NEW] Vulnerability in af_packet handling

2022-01-26 Thread Khaled El Mously
Public bug reported:

CVE-2021-22600

A vulnerability, which was classified as critical, was found in Linux
Kernel. Affected is the function packet_set_ring of the file
net/packet/af_packet.c. The manipulation with an unknown input leads to
a memory corruption vulnerability. This is going to have an impact on
confidentiality, integrity, and availability.

The weakness was released 01/26/2022. The advisory is shared for
download at git.kernel.org. This vulnerability is traded as
CVE-2021-22600 since 01/05/2021. The exploitability is told to be easy.
It is possible to launch the attack remotely. A authentication is
required for exploitation. There are known technical details, but no
exploit is available. The current price for an exploit might be approx.
USD $5k-$25k (estimation calculated on 01/26/2022).

Applying a patch is able to eliminate this problem. The fix is
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755

More information at:
https://partnerissuetracker.corp.google.com/issues/215427453

** Affects: linux-gke (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gke (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Also affects: linux-gke (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: klibc (Ubuntu)

** Also affects: linux-gke (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959173

Title:
  Vulnerability in af_packet handling

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1959173/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1957744] [NEW] Unable to set correct resolutions on virtual displays

2022-01-12 Thread Khaled El Mously
Public bug reported:

See
https://canonical.lightning.force.com/lightning/r/Case/5004K09qFamQAE/view
for more info

** Affects: linux-oracle (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-oracle (Ubuntu Hirsute)
 Importance: Undecided
 Status: New

** Affects: linux-oracle (Ubuntu Impish)
 Importance: Undecided
 Status: New

** Also affects: linux-oracle (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: klibc (Ubuntu)

** Also affects: linux-oracle (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957744

Title:
  Unable to set correct resolutions on virtual displays

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1957744/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956575] Re: [Regression] Focal kernel 5.4.0-92.103 fails to boot when Secure Encrypted Virtualization(SEV) is enabled

2022-01-06 Thread Khaled El Mously
Hello @Louis,

Are you able to confirm whether the 4.15 kernels are affected by this
problem?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956575

Title:
  [Regression] Focal kernel  5.4.0-92.103 fails to boot when Secure
  Encrypted Virtualization(SEV) is enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1956575/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1955655] Re: kernel-5.13.0-23-generic : Unable to boot when Secure Encrypted Virtualization( SEV) is enabled without setting swiotlb boot param

2022-01-05 Thread Khaled El Mously
I'm not sure I see a panic in the attached kernel log.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955655

Title:
  kernel-5.13.0-23-generic : Unable to boot when Secure Encrypted
  Virtualization( SEV) is enabled without setting swiotlb boot param

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1955655/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953575] [NEW] Update gvnic driver code

2021-12-07 Thread Khaled El Mously
Public bug reported:

The GCE internal team responsible for gVNIC would like to have driver
updates backported for both Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.


[Impact]
Missing functionality from the Google gvnic driver


[Test Plan]
Confirm that gvnic module still loads and operates the gvnic driver. More 
extensive testing done by the gvnic developers at GCE


[Regression potential]
Possible regression in gvnic behaviour or functionality. Changes are confined 
to the gvnic driver code so regression potential is limited to gvnic only.


List of changes:

3712db620c613 gve: DQO: Configure interrupts on device up
a9fd7559a367a gve: Check TX QPL was actually assigned
c69a8892d5836 gve: fix the wrong AdminQ buffer overflow check
f48adc2842b17 gve: DQO: Remove incorrect prefetch
98fd04939ae7e gve: Simplify code and axe the use of a deprecated API
56c0904d8491d gve: Propagate error codes to caller
86cd2b58d1e63 gve: DQO: Fix off by one in gve_rx_dqo()
ea364622fb118 gve: Fix warnings reported for DQO patchset
8890e8783c6e6 gve: DQO: Add RX path
abfc55f80d423 gve: DQO: Add TX path
ef63867982913 gve: DQO: Add ring allocation and initialization
dc3e0aef11bf0 gve: DQO: Add core netdev features
873fd9825efd7 gve: Update adminq commands to support DQO queues
543dc0e670472 gve: Add DQO fields for core data structures
b580730931348 gve: Add dqo descriptors
74e123d3c62b2 gve: Add support for DQO RX PTYPE map
a9a3bfdd5f679 gve: adminq: DQO specific device descriptor logic
3e6d068c103f8 gve: Introduce per netdev `enum gve_queue_format`
a6b09c93c1735 gve: Introduce a new model for device options
34d6b75678979 gve: Add support for raw addressing in the tx path
30b6221596699 Revert "gve: Check TX QPL was actually assigned"
98478993bb3f9 gve: Make gve_rx_slot_page_info.page_offset an absolute offset
ff4b20bb7e5f4 gve: gve_rx_copy: Move padding to an argument
5fc5c482008b5 gve: Move some static functions to a common file
ed1e0daeee1ac gve: Rx Buffer Recycling
da57760d6370d gve: Add support for raw addressing to the rx path
b512608f33d8e gve: Add support for raw addressing device option
e85394c77cdce gve: Enable Link Speed Reporting in the driver.
8961791d8ba16 gve: Batch AQ commands for creating and destroying queues.
50bafd6d5a041 gve: NIC stats for report-stats and for ethtool
feccb84085904 gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags.
08578185ab296 gve: Use dev_info/err instead of netif_info/err.
613ed2d16246f gve: Add stats for gve.
250d220740d21 gve: Get and set Rx copybreak via ethtool

** Affects: linux-gcp (Ubuntu)
 Importance: Undecided
 Assignee: Khaled El Mously (kmously)
 Status: In Progress

** Affects: linux-gcp (Ubuntu Focal)
 Importance: Undecided
 Assignee: Khaled El Mously (kmously)
 Status: In Progress

** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: klibc (Ubuntu)

** Description changed:

  The GCE internal team responsible for gVNIC would like to have driver
  updates backported for both Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
+ 
+ 
+ [Impact]
+ Missing functionality from the Google gvnic driver
+ 
+ 
+ [Test Plan]
+ Confirm that gvnic module still loads and operates the gvnic driver. More 
extensive testing done by the gvnic developers at GCE
+ 
+ 
+ [Regression potential]
+ Possible regression in gvnic behaviour or functionality. Changes are confined 
to the gvnic driver code so regression potential is limited to gvnic only.
+ 
+ 
+ 
+ List of changes:
+ 
+ 3712db620c613 gve: DQO: Configure interrupts on device up
+ a9fd7559a367a gve: Check TX QPL was actually assigned
+ c69a8892d5836 gve: fix the wrong AdminQ buffer overflow check
+ f48adc2842b17 gve: DQO: Remove incorrect prefetch
+ 98fd04939ae7e gve: Simplify code and axe the use of a deprecated API
+ 56c0904d8491d gve: Propagate error codes to caller
+ 86cd2b58d1e63 gve: DQO: Fix off by one in gve_rx_dqo()
+ ea364622fb118 gve: Fix warnings reported for DQO patchset
+ 8890e8783c6e6 gve: DQO: Add RX path
+ abfc55f80d423 gve: DQO: Add TX path
+ ef63867982913 gve: DQO: Add ring allocation and initialization
+ dc3e0aef11bf0 gve: DQO: Add core netdev features
+ 873fd9825efd7 gve: Update adminq commands to support DQO queues
+ 543dc0e670472 gve: Add DQO fields for core data structures
+ b580730931348 gve: Add dqo descriptors
+ 74e123d3c62b2 gve: Add support for DQO RX PTYPE map
+ a9a3bfdd5f679 gve: adminq: DQO specific device descriptor logic
+ 3e6d068c103f8 gve: Introduce per netdev `enum gve_queue_format`
+ a6b09c93c1735 gve: Introduce a new model for device options
+ 34d6b75678979 gve: Add support for raw addressing in the tx path
+ 30b6221596699 Revert "gve: Check TX QPL was actually assigned"
+ 98478993bb3f9 gve: Make gve_rx_slot_page_info.page_offset an absolute offset
+ ff4b20bb7e5f4 gve: gve_rx_copy: Move padding to an argument
+ 5fc5c482008b5 gve: Move some static functions to a common file
+ ed1e0daeee1ac gve:

[Bug 1947099] Re: ipconfig does not honour user-requested timeouts in some cases

2021-12-05 Thread Khaled El Mously
Patch proposed upstream:

https://lists.zytor.com/archives/klibc/2021-December/004629.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947099

Title:
  ipconfig does not honour user-requested timeouts in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1947099/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1947099] Re: ipconfig does not honour user-requested timeouts in some cases

2021-11-18 Thread Khaled El Mously
(updated the bug description with further details according to the SRU
template, including reproduction steps)

** Description changed:

  ** SRU TEMPLATE DRAFT **
  
  [Impact]
+ In some cases, ipconfig can take a longer time than the user-specified 
timeouts, causing unexpected delays.
+ 
+ [Test Plan]
+ Any situation where ipconfig encounters an error sending the DHCP packet, it 
will automatically set a delay of 10 seconds, which could be longer than the 
user-specified timeout. It can be reproduced by creating a dummy interface and 
attempting to run ipconfig on it with a timeout value of less than 10:
+ 
+ # ip link add eth1 type dummy
+ # date; /usr/lib/klibc/bin/ipconfig -t 2 eth1; date
+ Thu Nov 18 04:46:13 EST 2021
+ IP-Config: eth1 hardware address ae:e0:f5:9d:7e:00 mtu 1500 DHCP RARP
+ IP-Config: no response after 2 secs - giving up
+ Thu Nov 18 04:46:23 EST 2021
  
  
- [Test Plan]
+ ^ Notice above, ipconfig thinks that it waited 2 seconds, but the
+ timestamps show an actual delay of 10 seconds.
  
  
  [Where problems could occur]
+ Please see reproduction steps above. We are seeing this in production too 
(see comment #2).
  
  
  [Other Info]
+ A patch to fix the issue is being proposed here. It is a safe fix - it only 
checks before going into sleep that the timeout never exceeds the 
user-requested value.
  
  
  [Original Description]
  
  In some cases, ipconfig can take longer than the user-specified
  timeouts, causing unexpected delays.
  
  in main.c, in function loop(), the process can go into
  process_timeout_event() (or process_receive_event() ) and if it
  encounters an error situation, will set an attempt to "try again later"
  at time equal now + 10 seconds by setting
  
  s->expire = now + 10;
  
  This can happen at any time during the main event loop, which can end up
  extending the user-specified timeout if "now + 10" is greater than
  "start_time + user-specified-timeout".
  
  I believe a patch like the following is needed to avoid this problem:
  
  --- a/usr/kinit/ipconfig/main.c
  +++ b/usr/kinit/ipconfig/main.c
  @@ -437,6 +437,13 @@ static int loop(void)
  
  if (timeout > s->expire - now.tv_sec)
  timeout = s->expire - now.tv_sec;
  +
  +   /* Compensate for already-lost time */
  +   gettimeofday(, NULL);
  +   if (now.tv_sec + timeout > start + loop_timeout) {
  +   timeout = loop_timeout - (now.tv_sec - start);
  +   printf("Lowered timeout to match user request 
= (%d s) \n", timeout);
  +   }
  }
  
  I believe the current behaviour is buggy. This is confirmed when the
  following line is executed:
  
  if (loop_timeout >= 0 &&
  now.tv_sec - start >= loop_timeout) {
  printf("IP-Config: no response after %d "
     "secs - giving up\n", loop_timeout);
  rc = -1;
  goto bail;
  }
  
  'loop_timeout' is the user-specified time-out. With a value of 2, in
  case of error, this line prints:
  
  IP-Config: no response after 2 secs - giving up
  
  So it thinks that it waited 2 seconds - however, in reality it had
  actually waited for 10 seconds.
  
  The suggested code-change ensures that the timeout that is actually used
  never exceeds the user-specified timeout.

** Description changed:

- ** SRU TEMPLATE DRAFT **
  
  [Impact]
  In some cases, ipconfig can take a longer time than the user-specified 
timeouts, causing unexpected delays.
  
  [Test Plan]
  Any situation where ipconfig encounters an error sending the DHCP packet, it 
will automatically set a delay of 10 seconds, which could be longer than the 
user-specified timeout. It can be reproduced by creating a dummy interface and 
attempting to run ipconfig on it with a timeout value of less than 10:
  
  # ip link add eth1 type dummy
  # date; /usr/lib/klibc/bin/ipconfig -t 2 eth1; date
  Thu Nov 18 04:46:13 EST 2021
  IP-Config: eth1 hardware address ae:e0:f5:9d:7e:00 mtu 1500 DHCP RARP
  IP-Config: no response after 2 secs - giving up
  Thu Nov 18 04:46:23 EST 2021
  
- 
  ^ Notice above, ipconfig thinks that it waited 2 seconds, but the
  timestamps show an actual delay of 10 seconds.
- 
  
  [Where problems could occur]
  Please see reproduction steps above. We are seeing this in production too 
(see comment #2).
  
- 
  [Other Info]
  A patch to fix the issue is being proposed here. It is a safe fix - it only 
checks before going into sleep that the timeout never exceeds the 
user-requested value.
- 
  
  [Original Description]
  
  In some cases, ipconfig can take longer than the user-specified
  timeouts, causing unexpected delays.
  
  in main.c, in function loop(), the process can go 

[Bug 1947099] Re: ipconfig does not honour user-requested timeouts in some cases

2021-11-17 Thread Khaled El Mously
Hello @Eric.

> What make Bionic more susceptible to this particular problem ? Bionic
kernel version in use ? else ?

I believe klibc/ipconfig itself is susceptible to the problem in Bionic
and Focal and elsewhere. However, Focal (which uses klibc 2.0.7) uses
dhclient for networking initialization instead of ipconfig, therefore I
am not really concerned about fixing the ipconfig issue in Focal since
it is not causing any noticeable problems.

I have checked the HEAD of the klibc project and it appears that
ipconfig is still susceptible to the timeout problem. Sure I can propose
the patch upstream if you like - however, even if they accept it I
believe we will still need to apply it separately for Bionic because I
do not expect that Bionic will receive any major updates for klibc, so
it will not get any upstream fixes. It will remain on 2.0.4 as far as I
know. It is currently version 2.0.4-9ubuntu2 in Bionic which means we
are carrying (2?) Ubuntu-specific patches on top of 2.0.4. I believe
this fix can be added as well to produce 2.0.4-9ubuntu3.

I will attempt to upstream this fix to klibc, but I believe the change
to Bionic should happen in parallel/independently since the upstream
patch will not make its way back to Bionic (which is stuck at 2.0.4, as
mentioned above).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947099

Title:
  ipconfig does not honour user-requested timeouts in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1947099/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1947099] Re: ipconfig does not honour user-requested timeouts in some cases

2021-11-16 Thread Khaled El Mously
Hi @Eric - thanks for the follow-up and sorry for the delayed reply.

> I don't see this piece of code in the klibc upstream project[0]

Are you referring to the piece of code that I am suggesting as a fix? If
so, it makes sense that it doesn't exist elsewhere, which is why I am
suggesting it be incorporated into klibc. I have checked upstream klibc
2.0.4 which is the version that Bionic uses and it applies cleanly
there.

I am not sure that it would help us to get the fix upstreamed in a new
version of klibc since the problem is only affecting Bionic, and Bionic
uses klibc 2.0.4 + some Ubuntu changes. I assumed we can just add the
additional fix as another Ubuntu-specific change on top ?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947099

Title:
  ipconfig does not honour user-requested timeouts in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1947099/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1947099] Re: ipconfig does not honour user-requested timeouts in some cases

2021-10-14 Thread Khaled El Mously
For some background info, this issue is affecting one of the instance
types of a cloud partner. The instance has 18 physical ethernet
interfaces (bonded), but only one of which has a media connection. On
boot-up, ipconfig is called to do DHCP for all 18 devices. 17 of them
fail to send a DHCP request (because no media is connected), and so each
one ends up taking 10 seconds, even though the user-specified timeout
for each interface was only 2. This delays the entire boot-up sequence
by about 3 minutes.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947099

Title:
  ipconfig does not honour user-requested timeouts in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1947099/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1947099] Re: ipconfig does not honour user-requested timeouts in some cases

2021-10-14 Thread Khaled El Mously
Adding a debdiff of the patch as well. I am not sure if I generated it
correctly though..

** Patch added: "Suggested patch that fixes the problem"
   
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1947099/+attachment/5532730/+files/honour-user-requested-timeouts-in-all-cases.patch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947099

Title:
  ipconfig does not honour user-requested timeouts in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1947099/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1947099] Re: ipconfig does not honour user-requested timeouts in some cases

2021-10-14 Thread Khaled El Mously
** Description changed:

  In some cases, ipconfig can take longer than the user-specified
  timeouts, causing unexpected delays.
  
  in main.c, in function loop(), the process can go into
  process_timeout_event() (or process_receive_event() ) and if it
  encounters an error situation, will set an attempt to "try again later"
  at time equal now + 10 seconds by setting
  
  s->expire = now + 10;
  
- 
- This can happen at any time during the main event loop, which can end up 
extending the user-specified timeout if "now + 10" is greater than "start_time 
+ user-specified-timeout".
+ This can happen at any time during the main event loop, which can end up
+ extending the user-specified timeout if "now + 10" is greater than
+ "start_time + user-specified-timeout".
  
  I believe a patch like the following is needed to avoid this problem:
  
  --- a/usr/kinit/ipconfig/main.c
  +++ b/usr/kinit/ipconfig/main.c
  @@ -437,6 +437,13 @@ static int loop(void)
  
- if (timeout > s->expire - now.tv_sec)
- timeout = s->expire - now.tv_sec;
+ if (timeout > s->expire - now.tv_sec)
+ timeout = s->expire - now.tv_sec;
  +
  +   /* Compensate for already-lost time */
  +   gettimeofday(, NULL);
  +   if (now.tv_sec + timeout > start + loop_timeout) {
  +   timeout = loop_timeout - (now.tv_sec - start);
  +   printf("Lowered timeout to match user request 
= (%d s) \n", timeout);
  +   }
- }
+ }
+ 
+ 
+ I believe the current behaviour is buggy. This is confirmed when the 
following line is executed:
+ 
+ 
+ if (loop_timeout >= 0 &&
+ now.tv_sec - start >= loop_timeout) {
+ printf("IP-Config: no response after %d "
+"secs - giving up\n", loop_timeout);
+ rc = -1;
+ goto bail;
+ }
+ 
+ 
+ 'loop_timeout' is the user-specified time-out. With a value of 2, in case of 
error, this line prints: 
+ 
+ IP-Config: no response after 2 secs - giving up
+ 
+ 
+ So it thinks that it waited 2 seconds - however, in reality it had actually 
waited for 10 seconds.
+ 
+ The suggested code-change ensures that the timeout that is actually used
+ never exceeds the user-specified timeout.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947099

Title:
  ipconfig does not honour user-requested timeouts in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1947099/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1947099] [NEW] ipconfig does not honour user-requested timeouts in some cases

2021-10-13 Thread Khaled El Mously
Public bug reported:

In some cases, ipconfig can take longer than the user-specified
timeouts, causing unexpected delays.

in main.c, in function loop(), the process can go into
process_timeout_event() (or process_receive_event() ) and if it
encounters an error situation, will set an attempt to "try again later"
at time equal now + 10 seconds by setting

s->expire = now + 10;


This can happen at any time during the main event loop, which can end up 
extending the user-specified timeout if "now + 10" is greater than "start_time 
+ user-specified-timeout".

I believe a patch like the following is needed to avoid this problem:

--- a/usr/kinit/ipconfig/main.c
+++ b/usr/kinit/ipconfig/main.c
@@ -437,6 +437,13 @@ static int loop(void)

if (timeout > s->expire - now.tv_sec)
timeout = s->expire - now.tv_sec;
+
+   /* Compensate for already-lost time */
+   gettimeofday(, NULL);
+   if (now.tv_sec + timeout > start + loop_timeout) {
+   timeout = loop_timeout - (now.tv_sec - start);
+   printf("Lowered timeout to match user request = 
(%d s) \n", timeout);
+   }
}

** Affects: klibc (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: klibc (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Also affects: klibc (Ubuntu Bionic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947099

Title:
  ipconfig does not honour user-requested timeouts in some cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1947099/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1940261] Re: ubuntu_seccomp 11-basic-basic_errors failure on X/oracle

2021-10-13 Thread Khaled El Mously
Found on:
 2021.09.27/bionic/linux-gcp-4.15/4.15.0-1110.124

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940261

Title:
  ubuntu_seccomp 11-basic-basic_errors failure on X/oracle

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1940261/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1945559] Re: Failed to start Kernel Modules and small Ubuntu resolution

2021-10-04 Thread Khaled El Mously
@Muhammed: It may be a good idea also to try a fresh Ubuntu 18.04
installation inside a different VM (with the same exact settings as this
one) to see if it has the same issues.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945559

Title:
  Failed to start Kernel Modules and small Ubuntu resolution

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1945559/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1943902] Re: NVME errors in confidential vms

2021-09-16 Thread Khaled El Mously
** Description changed:

  See
  https://canonical.lightning.force.com/lightning/r/Case/5004K09WBzrQAG/view
  for more info
  
  [Impact]
  Using nvme with swiotlb in confidential VMs can encounter hardware read/write 
errors.
  
  [Fix]
  
- The following upstream patches address this:
+ The following upstream patches from v5.12 address this:
  
  3d2d861eb03e nvme-pci: set min_align_mask
  1f221a0d0dbf swiotlb: respect min_align_mask
  16fc3cef33a0 swiotlb: don't modify orig_addr in swiotlb_tbl_sync_single
  26a7e094783d swiotlb: refactor swiotlb_tbl_map_single
  ca10d0f8e530 swiotlb: clean up swiotlb_tbl_unmap_single
  c32a77fd1878 swiotlb: factor out a nr_slots helper
  c7fbeca757fe swiotlb: factor out an io_tlb_offset helper
  b5d7ccb7aac3 swiotlb: add a IO_TLB_SIZE define
  
  [Test]
  
  Using a confidential VM, with 'swiotlb=force' set on the kernel command
  line, and an additional nvme device attached:
  
  $ sudo mkfs.xfs -f /dev/nvme2n1
  meta-data=/dev/nvme2n1   isize=512agcount=4, agsize=131072 blks
   =   sectsz=512   attr=2, projid32bit=1
   =   crc=1finobt=1, sparse=0, rmapbt=0, 
refl
  ink=0
  data =   bsize=4096   blocks=524288, imaxpct=25
   =   sunit=0  swidth=0 blks
  naming   =version 2  bsize=4096   ascii-ci=0 ftype=1
  log  =internal log   bsize=4096   blocks=2560, version=2
   =   sectsz=512   sunit=0 blks, lazy-count=1
  realtime =none   extsz=4096   blocks=0, rtextents=0
  mkfs.xfs: pwrite failed: Input/output error
  
  Note the input/output error
  
  The error no longer happens with the fixes applied.
  
  [Regression Potential]
  
  Low risk as the patches are mostly clean-up and refactor.
  Regression in swiotlb could cause hardware read/write errors

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1943902

Title:
  NVME errors in confidential vms

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1943902/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1943902] Re: NVME errors in confidential vms

2021-09-16 Thread Khaled El Mously
** Description changed:

  See
  https://canonical.lightning.force.com/lightning/r/Case/5004K09WBzrQAG/view
  for more info
  
  [Impact]
- Using nvme hardware that uses swiotlb in confidential VMs can encounter 
hardware read/write errors.
- 
+ Using nvme hardware that uses in confidential VMs can encounter hardware 
read/write errors.
  
  [Fix]
  
  The following upstream patches address this:
  
  3d2d861eb03e nvme-pci: set min_align_mask
  1f221a0d0dbf swiotlb: respect min_align_mask
  16fc3cef33a0 swiotlb: don't modify orig_addr in swiotlb_tbl_sync_single
  26a7e094783d swiotlb: refactor swiotlb_tbl_map_single
  ca10d0f8e530 swiotlb: clean up swiotlb_tbl_unmap_single
  c32a77fd1878 swiotlb: factor out a nr_slots helper
  c7fbeca757fe swiotlb: factor out an io_tlb_offset helper
  b5d7ccb7aac3 swiotlb: add a IO_TLB_SIZE define
  
- 
  [Test]
  
  Using a confidential VM, with 'swiotlb=force' set on the kernel command
- line, and an additional swiotlb nvme device attached:
+ line, and an additional nvme device attached:
  
- $ sudo mkfs.xfs -f /dev/nvme2n1
- meta-data=/dev/nvme2n1   isize=512agcount=4, agsize=131072 blks   
  
-  =   sectsz=512   attr=2, projid32bit=1   
  
-  =   crc=1finobt=1, sparse=0, rmapbt=0, 
refl
- ink=0 
  
- data =   bsize=4096   blocks=524288, imaxpct=25   
  
-  =   sunit=0  swidth=0 blks   
  
- naming   =version 2  bsize=4096   ascii-ci=0 ftype=1  
  
- log  =internal log   bsize=4096   blocks=2560, version=2  
  
-  =   sectsz=512   sunit=0 blks, lazy-count=1  
  
- realtime =none   extsz=4096   blocks=0, rtextents=0   
  
+ $ sudo mkfs.xfs -f /dev/nvme2n1
+ meta-data=/dev/nvme2n1   isize=512agcount=4, agsize=131072 blks
+  =   sectsz=512   attr=2, projid32bit=1
+  =   crc=1finobt=1, sparse=0, rmapbt=0, 
refl
+ ink=0
+ data =   bsize=4096   blocks=524288, imaxpct=25
+  =   sunit=0  swidth=0 blks
+ naming   =version 2  bsize=4096   ascii-ci=0 ftype=1
+ log  =internal log   bsize=4096   blocks=2560, version=2
+  =   sectsz=512   sunit=0 blks, lazy-count=1
+ realtime =none   extsz=4096   blocks=0, rtextents=0
  mkfs.xfs: pwrite failed: Input/output error
- 
  
  Note the input/output error
  
  The error no longer happens with the fixes applied.
  
+ 
  [Regression Potential]
+ 
+ Low risk as the patches are mostly clean-up and refactor.
+ Regression in swiotlb could cause hardware read/write errors

** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-oracle (Ubuntu)

** Also affects: linux-gcp (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp-5.4 (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-gcp-5.4 (Ubuntu Focal)

** No longer affects: linux-gcp (Ubuntu Bionic)

** Changed in: linux-gcp (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux-gcp-5.4 (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux-gcp (Ubuntu Focal)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux-gcp-5.4 (Ubuntu Bionic)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Description changed:

  See
  https://canonical.lightning.force.com/lightning/r/Case/5004K09WBzrQAG/view
  for more info
  
  [Impact]
- Using nvme hardware that uses in confidential VMs can encounter hardware 
read/write errors.
+ Using nvme with swiotlb in confidential VMs can encounter hardware read/write 
errors.
  
  [Fix]
  
  The following upstream patches address this:
  
  3d2d861eb03e nvme-pci: set min_align_mask
  1f221a0d0dbf swiotlb: respect min_align_mask
  16fc3cef33a0 swiotlb: don't modify orig_addr in swiotlb_tbl_sync_single
  26a7e094783d swiotlb: refactor swiotlb_tbl_map_single
  ca10d0f8e530 swiotlb: clean up swiotlb_tbl_unmap_single
  c32a77fd1878 swiotlb: factor out a nr_slots helper
  c7fbeca757fe swiotlb: factor out an io_tlb_offset helper
  b5d7ccb7aac3 swiotlb: add a IO_TLB_SIZE define
  
  [Test]
  
  Using a confidential VM, with 'swiotlb=force' set on the kernel command
  line, and an additional nvme device attached:
  
  $ sudo mkfs.xfs -f /dev/nvme2n1
  meta-data=/dev/nvme2n1   isize=512agcount=4, agsize=131072 blks
   =   sectsz=512   attr=2, p

[Bug 1943902] [NEW] NVME errors in confidential vms

2021-09-16 Thread Khaled El Mously
Public bug reported:

See
https://canonical.lightning.force.com/lightning/r/Case/5004K09WBzrQAG/view
for more info

[Impact]
Using nvme hardware that uses swiotlb in confidential VMs can encounter 
hardware read/write errors.


[Fix]

The following upstream patches address this:

3d2d861eb03e nvme-pci: set min_align_mask
1f221a0d0dbf swiotlb: respect min_align_mask
16fc3cef33a0 swiotlb: don't modify orig_addr in swiotlb_tbl_sync_single
26a7e094783d swiotlb: refactor swiotlb_tbl_map_single
ca10d0f8e530 swiotlb: clean up swiotlb_tbl_unmap_single
c32a77fd1878 swiotlb: factor out a nr_slots helper
c7fbeca757fe swiotlb: factor out an io_tlb_offset helper
b5d7ccb7aac3 swiotlb: add a IO_TLB_SIZE define


[Test]

Using a confidential VM, with 'swiotlb=force' set on the kernel command
line, and an additional swiotlb nvme device attached:

$ sudo mkfs.xfs -f /dev/nvme2n1
meta-data=/dev/nvme2n1   isize=512agcount=4, agsize=131072 blks 
 =   sectsz=512   attr=2, projid32bit=1 
 =   crc=1finobt=1, sparse=0, rmapbt=0, refl
ink=0   
data =   bsize=4096   blocks=524288, imaxpct=25 
 =   sunit=0  swidth=0 blks 
naming   =version 2  bsize=4096   ascii-ci=0 ftype=1
log  =internal log   bsize=4096   blocks=2560, version=2
 =   sectsz=512   sunit=0 blks, lazy-count=1
realtime =none   extsz=4096   blocks=0, rtextents=0 
mkfs.xfs: pwrite failed: Input/output error


Note the input/output error

The error no longer happens with the fixes applied.

[Regression Potential]

** Affects: linux-oracle (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1943902

Title:
  NVME errors in confidential vms

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1943902/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925421] Re: arm64 support

2021-08-16 Thread Khaled El Mously
** Tags removed: verification-needed-groovy verification-needed-hirsute
** Tags added: verification-done-groovy verification-done-hirsute

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925421

Title:
  arm64 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1925421/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1840488] Re: Disable Bluetooth in cloud kernels

2021-08-13 Thread Khaled El Mously
** Tags removed: verification-needed-focal verification-needed-hirsute
** Tags added: verification-done-focal verification-done-hirsute

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840488

Title:
  Disable Bluetooth in cloud kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1840488/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1938976] [NEW] linux-gke: Do not build/ship aufs.ko

2021-08-04 Thread Khaled El Mously
Public bug reported:

See https://partnerissuetracker.corp.google.com/issues/194431474 for
more information

[Impact]
aufs.ko to be removed

[Fix]
Set CONFIG_AUFS_FS to N.

[Test]
Confirm that aufs.ko no longer being built.

[Regression Potential]
No expected regression (aufs functionality will be disabled)

** Affects: linux-gke (Ubuntu)
 Importance: Undecided
 Assignee: Khaled El Mously (kmously)
 Status: In Progress

** Affects: linux-gke-5.4 (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-gke-5.4 (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: linux-gke (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Also affects: linux-gke (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-oracle (Ubuntu)

** Changed in: linux-gke (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux-gke (Ubuntu)
   Status: New => In Progress

** Description changed:

  See https://partnerissuetracker.corp.google.com/issues/194431474 for
  more information
+ 
+ [Impact]
+ aufs.ko to be removed
+ 
+ [Fix]
+ Set CONFIG_AUFS_FS to N.
+ 
+ [Test]
+ Confirm that aufs.ko no longer being built.
+ 
+ [Regression Potential]
+ No expected regression (aufs functionality will be disabled)

** Also affects: linux-gke (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gke (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-gke-5.4 (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-gke-5.4 (Ubuntu Focal)

** No longer affects: linux-gke (Ubuntu Bionic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938976

Title:
  linux-gke: Do not build/ship aufs.ko

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1938976/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928686] Re: Oracle kernel has Android related config options disabled

2021-08-01 Thread Khaled El Mously
** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** Summary changed:

- Oracle kernel has Android related config options disabled
+ Some cloud kernels have Android related config options disabled

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928686

Title:
  Some cloud kernels have Android related config options disabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1928686/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1840488] Re: Disable Bluetooth in cloud kernels

2021-07-27 Thread Khaled El Mously
** No longer affects: linux-gke-4.15 (Ubuntu Focal)

** No longer affects: linux-gke-4.15 (Ubuntu Eoan)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840488

Title:
  Disable Bluetooth in cloud kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1840488/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1840488] Re: Disable Bluetooth in cloud kernels

2021-07-25 Thread Khaled El Mously
** Also affects: linux-aws (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gke-4.15 (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-gke-5.0 (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: linux-gke-4.15 (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: linux-gke-5.0 (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: linux-gke-4.15 (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: linux-gke-5.0 (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Changed in: linux-gcp (Ubuntu Focal)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840488

Title:
  Disable Bluetooth in cloud kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1840488/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931254] Re: Google Confidential Compute fails to boot with 1.47

2021-07-08 Thread Khaled El Mously
** Description changed:

  # Overview
  
  Hirsute and Impish daily builds are currently not booting on Google
  Confidential Compute.  Confidential compute is Google's platform that
  enables the use of Secure Encrypted Virtualization extension via AMD
  EPYC CPUs. Booting an image with version 1.45 works, but once upgraded
  to 1.47, the VM no longer boots, and instead the kernel panics.
  
  Launching the image with secure boot, but without confidential compute
  works as expected.
  
  # Expected result
  
  The system is able to reboot after the upgrade.
  
  # Actual result
  
  Kernel panic: https://paste.ubuntu.com/p/mHrvVc6qBc/
  
  # Steps to reproduce
  
  Launch a VM in GCE with confidential compute enabled with a serial
  v20210511a or later and look at the serial log for the kernel panic.
  Example CLI command to launch a VM:
  
  $ gcloud beta compute instances create $USER-confidential-testing --zone
  =us-west1-b --machine-type=n2d-standard-2 --image=daily-ubuntu-2104
  -hirsute-v20210511a --image-project=ubuntu-os-cloud-devel
  --confidential-compute --maintenance-policy=TERMINATE
  
  The last known good working image is daily-
  ubuntu-2104-hirsute-v20210510. The upgrade that fails is when shim
  signed is updated from 1.46+15.4-0ubuntu1 to 1.47+15.4-0ubuntu2
  
  # Logs & notes
  
  * 20210510 manifest (good): https://paste.ubuntu.com/p/QjnMPcJj7G/
  * 20210511a manifest (bad): https://paste.ubuntu.com/p/PvJQwRXHcG/
  * diff between manifests: https://paste.ubuntu.com/p/4nJtGxqGn7/
  * serial logs of failed boot: https://paste.ubuntu.com/p/mHrvVc6qBc/
  
  # Cause:
  
  shim changed the memory type for pages reserved for EFI runtime
  services, from EfiRuntimeServicesData to EfiBootServicesData.
  
  Memory reserved for EFI runtime/boot services must be remapped as
  encrypted in the kernel (during boot) if SEV (secure encrypted
  virtualization) is enabled. The original kernel implementation of
  ioremap only correctly mapped the region as encrypted for
  EfiRuntimeServicesData regions, so when shim changed the type to
  EfiBootServicesData the kernel bug was exposed
  
  Note that this affects all 5.11 kernels not just gcp. It is possible
  that gcp is the only cloud that uses sev currently (for "Confidential
  Computing").
  
  # Fix:
  
  Both EfiRuntimeServicesData and EfiBootServicesData must be mapped as
  encrypted if SEV is active, as per:
  
  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8d651ee9c71bb12fc0c8eb2786b66cbe5aa3e43b
  
+ 
+ # Test
+ 
+ Without the fix applied, confirmed that I was able to reproduce the issue 
described here (complete failure to boot, kernel panic)
+ With fix, confirmed no issues booting
+ 
  # Regression potential
  
  The fix could potentially cause boot failures, if a memory region is
  marked encrypted when it shouldn't be. I assume in that case it would
  cause a panic similar to the one seen here for this bug:
  
  general protection fault, probably for non-canonical address
  0x314836c31124d346:  [#1] SMP NOPTI

** Summary changed:

- Google Confidential Compute fails to boot with 1.47
+ Google Confidential Compute fails to boot with shim version 1.47

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931254

Title:
  Google Confidential Compute fails to boot with shim version 1.47

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1931254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931254] Re: Google Confidential Compute fails to boot with 1.47

2021-07-08 Thread Khaled El Mously
gression potential
  
  The fix could potentially cause boot failures, if a memory region is
  marked encrypted when it isn't. I assume it would cause a panic similar
  to the one seen here for this bug:
  
  general protection fault, probably for non-canonical address
  0x314836c31124d346:  [#1] SMP NOPTI

** Description changed:

  # Overview
  
  Hirsute and Impish daily builds are currently not booting on Google
  Confidential Compute.  Confidential compute is Google's platform that
  enables the use of Secure Encrypted Virtualization extension via AMD
  EPYC CPUs. Booting an image with version 1.45 works, but once upgraded
  to 1.47, the VM no longer boots, and instead the kernel panics.
  
  Launching the image with secure boot, but without confidential compute
  works as expected.
  
  # Expected result
  
  The system is able to reboot after the upgrade.
  
  # Actual result
  
  Kernel panic: https://paste.ubuntu.com/p/mHrvVc6qBc/
  
  # Steps to reproduce
  
  Launch a VM in GCE with confidential compute enabled with a serial
  v20210511a or later and look at the serial log for the kernel panic.
  Example CLI command to launch a VM:
  
  $ gcloud beta compute instances create $USER-confidential-testing --zone
  =us-west1-b --machine-type=n2d-standard-2 --image=daily-ubuntu-2104
  -hirsute-v20210511a --image-project=ubuntu-os-cloud-devel
  --confidential-compute --maintenance-policy=TERMINATE
  
  The last known good working image is daily-
  ubuntu-2104-hirsute-v20210510. The upgrade that fails is when shim
  signed is updated from 1.46+15.4-0ubuntu1 to 1.47+15.4-0ubuntu2
  
  # Logs & notes
  
  * 20210510 manifest (good): https://paste.ubuntu.com/p/QjnMPcJj7G/
  * 20210511a manifest (bad): https://paste.ubuntu.com/p/PvJQwRXHcG/
  * diff between manifests: https://paste.ubuntu.com/p/4nJtGxqGn7/
  * serial logs of failed boot: https://paste.ubuntu.com/p/mHrvVc6qBc/
  
  # Cause:
  
  shim changed the memory type for pages reserved for EFI runtime
  services, from EfiRuntimeServicesData to EfiBootServicesData.
  
  Memory reserved for EFI runtime/boot services must be remapped as
  encrypted in the kernel (during boot) if SEV (secure encrypted
  virtualization) is enabled. The original kernel implementation of
  ioremap only correctly mapped the region as encrypted for
  EfiRuntimeServicesData regions, so when shim changed the type to
  EfiBootServicesData the kernel bug was exposed
  
  # Fix:
  
  Both EfiRuntimeServicesData and EfiBootServicesData must be mapped as
  encrypted if SEV is active, as per:
  
  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8d651ee9c71bb12fc0c8eb2786b66cbe5aa3e43b
  
  # Regression potential
  
  The fix could potentially cause boot failures, if a memory region is
- marked encrypted when it isn't. I assume it would cause a panic similar
- to the one seen here for this bug:
+ marked encrypted when it shouldn't be. I assume in that case it would
+ cause a panic similar to the one seen here for this bug:
  
  general protection fault, probably for non-canonical address
  0x314836c31124d346:  [#1] SMP NOPTI

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-gcp (Ubuntu)

** No longer affects: linux-gcp (Ubuntu Hirsute)

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux (Ubuntu Hirsute)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux (Ubuntu)
   Status: New => In Progress

** Changed in: linux (Ubuntu Hirsute)
   Status: New => In Progress

** Description changed:

  # Overview
  
  Hirsute and Impish daily builds are currently not booting on Google
  Confidential Compute.  Confidential compute is Google's platform that
  enables the use of Secure Encrypted Virtualization extension via AMD
  EPYC CPUs. Booting an image with version 1.45 works, but once upgraded
  to 1.47, the VM no longer boots, and instead the kernel panics.
  
  Launching the image with secure boot, but without confidential compute
  works as expected.
  
  # Expected result
  
  The system is able to reboot after the upgrade.
  
  # Actual result
  
  Kernel panic: https://paste.ubuntu.com/p/mHrvVc6qBc/
  
  # Steps to reproduce
  
  Launch a VM in GCE with confidential compute enabled with a serial
  v20210511a or later and look at the serial log for the kernel panic.
  Example CLI command to launch a VM:
  
  $ gcloud beta compute instances create $USER-confidential-testing --zone
  =us-west1-b --machine-type=n2d-standard-2 --image=daily-ubuntu-2104
  -hirsute-v20210511a --image-project=ubuntu-os-cloud-devel
  --confidential-compute --maintenance-policy=TERMINATE
  
  The last known good working image is daily-
  ubuntu-2104-hirsute-v20210510. The upgrade that fails is when shim
  signed is updated from 1.46+15.4-0ubuntu1 to 1.47+15.4-0ubuntu2
  
  # Logs & notes
  
  * 20210510 manifest (good)

[Bug 1931254] Re: Google Confidential Compute fails to boot with 1.47

2021-07-07 Thread Khaled El Mously
** Also affects: linux-gcp (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931254

Title:
  Google Confidential Compute fails to boot with 1.47

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1931254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931254] Re: Google Confidential Compute fails to boot with 1.47

2021-06-29 Thread Khaled El Mously
@Peter Gonda -- You seem to be 100% correct.

Thank you for the helpful pointer!

I have confirmed the fix and shim-side of the changes that exposed the
issue.

I will SRU the fix asap.

** No longer affects: shim-signed (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931254

Title:
  Google Confidential Compute fails to boot with 1.47

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1931254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927682] Re: netfilter: x_tables: fix compat match/target pad out-of-bound write

2021-06-16 Thread Khaled El Mously
** Also affects: linux-5.4 (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-5.4 (Ubuntu Focal)

** No longer affects: linux-5.4 (Ubuntu Groovy)

** No longer affects: linux-5.4 (Ubuntu Hirsute)

** Changed in: linux-5.4 (Ubuntu Bionic)
   Status: New => Fix Released

** No longer affects: linux (Ubuntu Bionic)

** Changed in: linux (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927682

Title:
   netfilter: x_tables: fix compat match/target pad out-of-bound write

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1927682/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928686] Re: Oracle kernel has Android related config options disabled

2021-06-14 Thread Khaled El Mously
In 4.15, CONFIG_ASHMEM and CONFIG_ANDROID_BINDER_IPC can only be
compiled as =y (not =m)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928686

Title:
  Oracle kernel has Android related config options disabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1928686/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928686] Re: Oracle kernel has Android related config options disabled

2021-06-14 Thread Khaled El Mously
@Simon, is this needed in the 4.15 kernel?

** No longer affects: linux-oracle (Ubuntu Impish)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928686

Title:
  Oracle kernel has Android related config options disabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1928686/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928686] Re: Oracle kernel has Android related config options disabled

2021-06-14 Thread Khaled El Mously
** Also affects: linux-oracle (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Impish)
   Importance: Undecided
   Status: Confirmed

** Also affects: linux-oracle (Ubuntu Bionic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928686

Title:
  Oracle kernel has Android related config options disabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1928686/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1931959] [NEW] iscsi-related backports requested for Oracle-cloud

2021-06-14 Thread Khaled El Mously
Public bug reported:

As part of some work to enable high performance iscsi storage leveraging
multipath, Oracle submitted and landed patches upstream, which were
released as part of 5.10.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a242d59d6b908341c0d426bc6e7f8e28871cbd0
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0610959fbbca62b534f1f276873fd297f76b164b

commit 2a242d59d6b908341c0d426bc6e7f8e28871cbd0
Author: Mike Christie michael.chris...@oracle.com
Date: Thu Oct 1 10:35:53 2020 -0500

scsi: core: Add limitless cmd retry support

commit 0610959fbbca62b534f1f276873fd297f76b164b
Author: Mike Christie michael.chris...@oracle.com
Date: Thu Oct 1 10:35:54 2020 -0500

scsi: sd: Allow user to configure command retries


See 
https://canonical.lightning.force.com/lightning/r/Case/5004K05pykQQAQ/view 
for more info.

[Impact]
Optimizations/improvements in iscsi-code

[Fix]
2 patches - see above

[Test]
Build, boot, initiate an iscsi connection to a target.

[Regression Potential]
Possible impact on iscsi functionality.

** Affects: linux-oracle (Ubuntu)
 Importance: Undecided
 Assignee: Khaled El Mously (kmously)
 Status: New

** Affects: linux-oracle (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: linux-oracle (Ubuntu Groovy)
 Importance: Undecided
 Status: New

** Also affects: linux-oracle (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Changed in: linux-oracle (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1931959

Title:
  iscsi-related backports requested for Oracle-cloud

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1931959/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928744] Re: Disk IO very slow on kernel 4.15.0-142-generic

2021-06-08 Thread Khaled El Mously
Thanks for the extensive testing, Mariusz. (I assume -137 doesn't have
the performance problem?)

So, for comment #9 - the difference in loaded modules comes down to 20
additional modules that were loaded when performance was bad:

-ip6_tables 28672 0
-iptable_filter 16384 0
-ip_tables 28672 1 iptable_filter
-x_tables 40960 3 iptable_filter,ip6_tables,ip_tables
-tcp_diag 16384 0
-udp_diag 16384 0
-inet_diag 24576 2 tcp_diag,udp_diag
-cpuid 16384 0
-btrfs 1155072 0
-zstd_compress 163840 1 btrfs
-xor 24576 1 btrfs
-raid6_pq 114688 1 btrfs
-ufs 77824 0
-qnx4 16384 0
-minix 32768 0
-ntfs 102400 0
-msdos 20480 0
-jfs 188416 0
-xfs 1204224 0
-libcrc32c 16384 1 xfs


Seems they are mostly filesystem modules and iptables modules. It is possible 
that this could affect performance - though unlikely to cause performance 
issues simply by them being loaded. If they are causing the performance hit it 
would probably mean that some thing else is running not just additional modules 
loaded in memory.

So, if I understand correctly, -140 seemed initially fine, but after
some time, performance degrades. That makes things a bit more
interesting. Do you see those additional modules loaded when performance
is degraded? Note that all those additional modules don't seem to have
any external dependencies other than themselves - they depend only on
each other. So it should be easily possible to unload them and see if
that "fixes" the performance issue.

By the way, kernels -143 and -144 have been released since this bug was
created. Maybe it is worthwhile to also try those kernels?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928744

Title:
  Disk IO very slow on kernel 4.15.0-142-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1928744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1929920] [NEW] 'sudo' commands fail with "already defined" errors on oracle images

2021-05-28 Thread Khaled El Mously
Public bug reported:

The problem was first noticed when it caused these errors:

http://10.246.72.9/5.11.0-1007.7-oracle/hirsute-linux-oracle-oracle-
amd64-5.11.0-VM.Standard2.1-ubuntu_qrt_kernel_security/ubuntu_qrt_kernel_security/results/ubuntu_qrt_kernel_security
.test-kernel-security.py/debug/ubuntu_qrt_kernel_security.test-kernel-
security.py.DEBUG.html


and Sam has narrowed it down to a problem running sudo commands, which
all fail with the error:

Alias "x" already defined


This affects the 2021-05-10 SRU cycle. More info on this Trello card:

https://trello.com/c/dZXTo7L3/1257-alias-x-already-defined-error-
triggered-by-sudo-in-oracle-hirsute

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: sru-20210510

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: kernel-sru-workflow

** Tags added: sru-20210510

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1929920

Title:
  'sudo' commands fail with "already defined" errors on oracle images

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1929920/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927050] Re: Enable BLK_DEV_NVME =y to support "shielded VM minimal images"

2021-05-27 Thread Khaled El Mously
** Tags removed: verification-needed-bionic verification-needed-focal 
verification-needed-groovy
** Tags added: verification-done-bionic verification-done-focal 
verification-done-groovy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927050

Title:
  Enable BLK_DEV_NVME =y to support "shielded VM minimal images"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1927050/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928744] Re: Disk IO very slow on kernel 4.15.0-142-generic

2021-05-20 Thread Khaled El Mously
Hi @Mariusz - thank you for the bug report. That certainly sounds like a
kernel bug based on your description.

Doing a kernel bisect is probably the fastest approach to identifying
the offending change. There are 392 changes between -136 and -142 so it
could take up to 9 tests for a full bisect.

@Mariusz, is it possible to find out which (if any) of the intermediate
kernels between -136 and -142 are affected ?

If you don't have any of the intermediate kernels installed already, you
can install them with a command like this one:

sudo apt-get install linux-image-4.15.0-137-generic linux-
headers-4.15.0-137-generic linux-modules-4.15.0-137-generic linux-
modules-extra-4.15.0-137-generic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928744

Title:
  Disk IO very slow on kernel 4.15.0-142-generic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1928744/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928021] [NEW] ubuntu_sysdig_smoke_test: "test_060_nx" fails on focal/linux-oracle

2021-05-10 Thread Khaled El Mously
Public bug reported:

Example failure:

http://10.246.72.9/5.4.0-1045.49-oracle/focal-linux-oracle-oracle-
amd64-5.4.0-VM.Standard2.1-ubuntu_qrt_kernel_security/ubuntu_qrt_kernel_security/results/ubuntu_qrt_kernel_security
.test-kernel-security.py/debug/ubuntu_qrt_kernel_security.test-kernel-
security.py.DEBUG.html


Failure output: 

585.FAIL: test_060_nx (__main__.KernelSecurityTest)
586.NX bit is working
587.--
588.Traceback (most recent call last):
589.File "./test-kernel-security.py", line 554, in test_060_nx
590.self.assertShellExitEquals(rie_expected, ["./nx-test-rie", "data"])
591.File 
"/home/ubuntu/autotest/client/tmp/ubuntu_qrt_kernel_security/src/qa-regression-testing/scripts/testlib.py",
 line 1166, in assertShellExitEquals
592.self.assertEqual(expected, rc, msg + result + report)
593.AssertionError: Got exit code -11, expected 0
594.Command: './nx-test-rie', 'data'
595.Output:
596.rodata:0x559730ee5008
597.data: 0x559730ee7010
598.bss: 0x559730ef7040
599.brk: 0x5597313a62b0
600.rw: 0x7fa963894000
601.rwx: 0x7fa963867000
602.stack: 0x7ffe099e9eb0
603.Dump of /proc/self/maps:
604.559730ee3000-559730ee4000 r--p  08:01 1562993 
/home/ubuntu/autotest/client/tmp/ubuntu_qrt_kernel_security/src/qa-regression-testing/scripts/kernel-security/nx/nx-test-rie
605.559730ee4000-559730ee5000 r-xp 1000 08:01 1562993 
/home/ubuntu/autotest/client/tmp/ubuntu_qrt_kernel_security/src/qa-regression-testing/scripts/kernel-security/nx/nx-test-rie
606.559730ee5000-559730ee6000 r--p 2000 08:01 1562993 
/home/ubuntu/autotest/client/tmp/ubuntu_qrt_kernel_security/src/qa-regression-testing/scripts/kernel-security/nx/nx-test-rie
607.559730ee6000-559730ee7000 r--p 2000 08:01 1562993 
/home/ubuntu/autotest/client/tmp/ubuntu_qrt_kernel_security/src/qa-regression-testing/scripts/kernel-security/nx/nx-test-rie
608.559730ee7000-559730ee8000 rw-p 3000 08:01 1562993 
/home/ubuntu/autotest/client/tmp/ubuntu_qrt_kernel_security/src/qa-regression-testing/scripts/kernel-security/nx/nx-test-rie
609.559730ee8000-559730ef8000 rw-p  00:00 0
610.5597313a5000-5597313c6000 rw-p  00:00 0 [heap]
611.7fa96366b000-7fa96369 r--p  08:01 45790 
/usr/lib/x86_64-linux-gnu/libc-2.31.so
612.7fa96369-7fa963808000 r-xp 00025000 08:01 45790 
/usr/lib/x86_64-linux-gnu/libc-2.31.so
613.7fa963808000-7fa963852000 r--p 0019d000 08:01 45790 
/usr/lib/x86_64-linux-gnu/libc-2.31.so
614.7fa963852000-7fa963853000 ---p 001e7000 08:01 45790 
/usr/lib/x86_64-linux-gnu/libc-2.31.so
615.7fa963853000-7fa963856000 r--p 001e7000 08:01 45790 
/usr/lib/x86_64-linux-gnu/libc-2.31.so
616.7fa963856000-7fa963859000 rw-p 001ea000 08:01 45790 
/usr/lib/x86_64-linux-gnu/libc-2.31.so
617.7fa963859000-7fa96385f000 rw-p  00:00 0
618.7fa963867000-7fa963868000 rwxp  00:00 0
619.7fa963868000-7fa963869000 r--p  08:01 45783 
/usr/lib/x86_64-linux-gnu/ld-2.31.so
620.7fa963869000-7fa96388c000 r-xp 1000 08:01 45783 
/usr/lib/x86_64-linux-gnu/ld-2.31.so
621.7fa96388c000-7fa963894000 r--p 00024000 08:01 45783 
/usr/lib/x86_64-linux-gnu/ld-2.31.so
622.7fa963894000-7fa963895000 rw-p  00:00 0
623.7fa963895000-7fa963896000 r--p 0002c000 08:01 45783 
/usr/lib/x86_64-linux-gnu/ld-2.31.so
624.7fa963896000-7fa963897000 rw-p 0002d000 08:01 45783 
/usr/lib/x86_64-linux-gnu/ld-2.31.so
625.7fa963897000-7fa963898000 rw-p  00:00 0
626.7ffe099cb000-7ffe099ec000 rwxp  00:00 0 [stack]
627.7ffe099ee000-7ffe099f1000 r--p  00:00 0 [vvar]
628.7ffe099f1000-7ffe099f2000 r-xp  00:00 0 [vdso]
629.ff60-ff601000 --xp  00:00 0 [vsyscall]
630.Attempting to execute function at 0x559730ee7010
631.If this program seg-faults, the region was enforced as non-executable...
632.
633.
634.--
635.Ran 125 tests in 73.445s
636.
637.FAILED (failures=1)



This failure is expected on the 5.4 oracle kernel, since it no longer assumes 
READ_IMPLIES_EXEC personality by default, as per this change: 

https://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-
oracle/+git/focal/commit/?id=0e74912698dc008056759c501e7de3c551daedf1


So this test will fail from now on on f/oracle.

The test should treat f/oracle as it treats the 5.8 kernels - it should
expect a return output of -11 not 0.

** Affects: qa-regression-testing
 Importance: Undecided
 Status: New

** Also affects: qa-regression-testing
   Importance: Undecided
   Status: New

** No longer affects: linux-oracle (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928021


[Bug 1927682] Re: netfilter: x_tables: fix compat match/target pad out-of-bound write

2021-05-07 Thread Khaled El Mously
** Description changed:

  This issue:
  
  
https://github.com/torvalds/linux/commit/b29c457a6511435960115c0f548c4360d5f4801d
+ 
+ 
+ [Impact]
+ Data corruption and/or leak.
+ 
+ [Fix]
+ Zero out entire data structure beforehand
+ 
+ 
+ [Test]
+ Boot-test only so far.
+ 
+ [Regression Potential]
+ Possible effect on iptables/nftables. Though considered minimal risk as the 
patch has only a very localized effect and is accepted upstream in v5.12

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: kernel-sru-workflow

** Also affects: linux (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Groovy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927682

Title:
   netfilter: x_tables: fix compat match/target pad out-of-bound write

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1927682/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927050] Re: Enable BLK_DEV_NVME =y to support "shielded VM minimal images"

2021-05-06 Thread Khaled El Mously
** Also affects: linux-gcp (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp-4.15 (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Changed in: linux-gcp-4.15 (Ubuntu Hirsute)
   Status: New => Invalid

** Changed in: linux-gcp (Ubuntu Hirsute)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927050

Title:
  Enable BLK_DEV_NVME =y to support "shielded VM minimal images"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1927050/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927050] Re: Enable BLK_DEV_NVME =y to support "shielded VM minimal images"

2021-05-04 Thread Khaled El Mously
** Description changed:

  This is requested by CPC -- see the title.
+ 
+ [Impact]
+ nvme.ko exists outside the kernel currently
+ 
+ [Fix]
+ Enable BLK_DEV_NVME=y 
+ 
+ [Test]
+ Tested by CPC crew / Google: 
+ 
+ > The test images have passed testing and we would like this enabled so we
+ > can have minimal images boot with NVME boot disk and so we can enable
+ > GCE confidential VMs with minimal images.
+ 
+ 
+ [Regression Potential]
+ Not aware of any.

** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux (Ubuntu)

** Changed in: linux-gcp (Ubuntu)
   Status: New => In Progress

** Changed in: linux-gcp (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927050

Title:
  Enable BLK_DEV_NVME =y to support "shielded VM minimal images"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1927050/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927050] [NEW] Enable BLK_DEV_NVME =y to support "shielded VM minimal images"

2021-05-03 Thread Khaled El Mously
Public bug reported:

This is requested by CPC -- see the title.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927050

Title:
  Enable BLK_DEV_NVME =y to support "shielded VM minimal images"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1927050/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925421] Re: arm64 support

2021-04-30 Thread Khaled El Mously
** Changed in: linux-oracle (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925421

Title:
  arm64 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1925421/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925421] Re: arm64 support

2021-04-26 Thread Khaled El Mously
** Description changed:

+ See
+ https://canonical.lightning.force.com/lightning/r/Case/5003z2BzFG4AAN/view
+ for more info
  
- https://canonical.lightning.force.com/lightning/r/Case/5003z2BzFG4AAN/view
+ 
+ [Impact]
+ No support for arm64 currently
+ 
+ 
+ [Fix]
+ Add arm64 support, including hardware support patches
+ 
+ [Test]
+ Confirm that it boots on desired arm64 hardware, as well as VMs
+ 
+ [Regression Potential]
+ This was never working on arm64 so there should be no risk of regression.
+ The requested changes included some refactorings of early memory 
initialization code (all arches) so this presents a small risk. The changes 
were tested on arm64 as well amd64.

** Also affects: linux-oracle (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux (Ubuntu)

** Changed in: linux-oracle (Ubuntu)
   Status: New => In Progress

** Changed in: linux-oracle (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925421

Title:
  arm64 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1925421/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925421] Re: arm64 support

2021-04-22 Thread Khaled El Mously
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-oracle (Ubuntu)

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux (Ubuntu)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925421

Title:
  arm64 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925421/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925421] Re: arm64 support

2021-04-22 Thread Khaled El Mously
** Description changed:

- Please
+ 
+ https://canonical.lightning.force.com/lightning/r/Case/5003z2BzFG4AAN/view

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925421

Title:
  arm64 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1925421/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925421] [NEW] arm64 support

2021-04-22 Thread Khaled El Mously
Public bug reported:

Please

** Affects: linux-oracle (Ubuntu)
 Importance: Undecided
 Assignee: Khaled El Mously (kmously)
 Status: New

** Also affects: linux-oracle (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux (Ubuntu)

** Changed in: linux-oracle (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925421

Title:
  arm64 support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1925421/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1918668] Re: improper memcg accounting causes NULL pointer derefs

2021-04-09 Thread Khaled El Mously
To verify:
 - I installed groovy on 'durin' (in the maas pod), which installed with kernel 
-48.
 - Enabled -proposed, installed the new -49 kernel. (this automatically runs 
update-grub)
 - rebooted, confirmed that -49 is running.
 - ran update-grub manually.

No NULL dereferences were observed.
Marking as verified.

** Tags removed: verification-needed-groovy
** Tags added: verification-done-groovy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918668

Title:
  improper memcg accounting causes NULL pointer derefs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1918668/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1908264] Re: Disable Atari partition support for cloud kernels

2021-04-08 Thread Khaled El Mously
** No longer affects: linux-gke (Ubuntu Hirsute)

** No longer affects: linux-gke (Ubuntu Groovy)

** No longer affects: linux-gke (Ubuntu Bionic)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908264

Title:
  Disable Atari partition support for cloud kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1908264/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1908264] Re: Disable Atari partition support for cloud kernels

2021-04-07 Thread Khaled El Mously
** Also affects: linux-gkeop (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-gkeop (Ubuntu Xenial)

** No longer affects: linux-gkeop (Ubuntu Bionic)

** No longer affects: linux-gkeop (Ubuntu Groovy)

** No longer affects: linux-gkeop (Ubuntu Hirsute)

** No longer affects: linux-oracle (Ubuntu Xenial)

** No longer affects: linux-gke (Ubuntu Xenial)

** No longer affects: linux-gcp (Ubuntu Xenial)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908264

Title:
  Disable Atari partition support for cloud kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1908264/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921825] Re: Kernel panic on `5.4.0-1033-gke` (Kernel panic - not syncing: Aiee, killing interrupt handler!) possibly iscsi related

2021-04-06 Thread Khaled El Mously
** Changed in: linux-gke (Ubuntu Focal)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921825

Title:
   Kernel panic on `5.4.0-1033-gke` (Kernel panic - not syncing: Aiee,
  killing interrupt handler!) possibly iscsi related

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1921825/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921825] Re: Kernel panic on `5.4.0-1033-gke` (Kernel panic - not syncing: Aiee, killing interrupt handler!) possibly iscsi related

2021-04-01 Thread Khaled El Mously
** Description changed:

+ [Impact]
+ Kernel panic during high iscsi activity
+ 
+ 
  This stacktrace
  
  [  223.386958] BUG: scheduling while atomic: iscsiadm/18136/0x0200
  [  223.393390] Modules linked in: tcp_diag inet_diag xt_nat ipt_REJECT 
nf_reject_ipv4 xt_tcpudp ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs sch_htb ebt_ip 
ebtable_filter ebtables veth xt_mark br_netfilter iptable_mangle xt_MASQUERADE 
xt_comment xt_addrtype iptable_nat binfmt_misc iptable_filter bpfilter 
xt_conntrack nf_nat bridge stp llc xfrm_user xfrm_algo aufs overlay 
nls_iso8859_1 dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel crypto_simd 
cryptd glue_helper input_leds serio_raw sch_fq_codel sunrpc ib_iser rdma_cm 
iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi 
virtio_rng ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
raid0 multipath linear psmouse virtio_net net_failover failover
  [  223.393429] CPU: 6 PID: 18136 Comm: iscsiadm Kdump: loaded Not tainted 
5.4.0-1033-gke #35~18.04.1-Ubuntu
  [  223.393430] Hardware name: Google Google Compute Engine/Google Compute 
Engine, BIOS Google 01/01/2011
  [  223.393430] Call Trace:
  [  223.393439]  dump_stack+0x6d/0x95
  [  223.393464]  __schedule_bug+0x55/0x70
  [  223.393467]  __schedule+0x61b/0x710
  [  223.393469]  schedule+0x33/0xa0
  [  223.393472]  __lock_sock+0x7d/0xc0
  [  223.393475]  ? wait_woken+0x80/0x80
  [  223.393477]  lock_sock_nested+0x64/0x70
  [  223.393479]  inet_getname+0xaa/0xe0
  [  223.393482]  kernel_getpeername+0x1b/0x20
  [  223.393485]  iscsi_sw_tcp_conn_get_param+0xa6/0x110 [iscsi_tcp]
  [  223.393494]  show_conn_ep_param_ISCSI_PARAM_CONN_ADDRESS+0x7e/0xa0 
[scsi_transport_iscsi]
  [  223.393496]  dev_attr_show+0x1d/0x50
  [  223.393499]  sysfs_kf_seq_show+0xa1/0x110
  [  223.393502]  kernfs_seq_show+0x27/0x30
  [  223.393504]  seq_read+0xda/0x420
  [  223.393506]  kernfs_fop_read+0x141/0x1a0
  [  223.393510]  __vfs_read+0x1b/0x40
  [  223.393512]  vfs_read+0x8e/0x130
  [  223.393513]  ksys_read+0xa7/0xe0
  [  223.393515]  __x64_sys_read+0x1a/0x20
  [  223.393518]  do_syscall_64+0x57/0x190
  [  223.393521]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
  [  223.393523] RIP: 0033:0x7f45793ce910
  [  223.393525] Code: b6 fe ff ff 48 8d 3d 0f be 08 00 48 83 ec 08 e8 06 db 01 
00 66 0f 1f 44 00 00 83 3d f9 2d 2c 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 
f0 ff ff 73 31 c3 48 83 ec 08 e8 de 9b 01 00 48 89 04 24
  [  223.393526] RSP: 002b:7ffd9fa13688 EFLAGS: 0246 ORIG_RAX: 

  [  223.393527] RAX: ffda RBX: 7ffd9fa13820 RCX: 
7f45793ce910
  [  223.393528] RDX: 0100 RSI: 7ffd9fa13720 RDI: 
0003
  [  223.393528] RBP: 7ffd9fa13720 R08:  R09: 

  [  223.393529] R10: 0064 R11: 0246 R12: 
0003
  [  223.393530] R13: 7ffd9fa13c60 R14: 555b0d613708 R15: 
555b0d613300
  [  223.393581] sd 1:0:0:0: [sdb] Write Protect is off
  [  223.393583] sd 1:0:0:0: [sdb] Mode Sense: 43 00 10 08
  [  223.393660] iscsiadm[18136]: segfault at 7ffd9fa12e58 ip 555b0ccd95af 
sp 7ffd9fa12e60 error 6 in iscsiadm[555b0ccb4000+58000]
  [  223.393666] Code: ba 00 02 00 00 48 81 ec 10 04 00 00 48 89 e7 48 8d 9c 24 
00 02 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 08 04 00 00 31 c0  3c ed 
00 00 ba 00 02 00 00 4c 89 ee 48 89 e7 e8 6c ed 00 00 ba
  [  223.394992] sd 1:0:0:0: alua: transition timeout set to 60 seconds
  [  223.394997] sd 1:0:0:0: alua: port group 02 state N non-preferred supports 
TOlUSNA
  [  223.395018] sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, 
supports DPO and FUA
  [  223.395435] Kernel panic - not syncing: Aiee, killing interrupt handler!
  [  223.396802] sd 1:0:0:0: [sdb] Optimal transfer size 262144 bytes
  [  223.402387] CPU: 6 PID: 18136 Comm: iscsiadm Kdump: loaded Tainted: G  
  W 5.4.0-1033-gke #35~18.04.1-Ubuntu
  [  223.402388] Hardware name: Google Google Compute Engine/Google Compute 
Engine, BIOS Google 01/01/2011
  [  223.402389] Call Trace:
  [  223.402395]  dump_stack+0x6d/0x95
  [  223.402398]  panic+0xfe/0x2e4
  [  223.402400]  do_exit+0x899/0xb90
  [  223.402402]  do_group_exit+0x43/0xa0
  [  223.402406]  get_signal+0x14f/0x860
  [  223.402409]  do_signal+0x34/0x6d0
  [  223.402414]  ? __bad_area_nosemaphore+0x149/0x1f0
  [  223.457597]  exit_to_usermode_loop+0x8e/0x100
  [  223.462090]  prepare_exit_to_usermode+0x91/0xa0
  [  223.466782]  retint_user+0x8/0x8
  [  223.470131] RIP: 0033:0x555b0ccd95af
  [  223.473827] Code: ba 00 02 00 00 48 81 ec 10 04 00 00 48 89 e7 48 8d 9c 24 
00 02 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 08 04 00 00 31 c0  3c ed 
00 00 ba 00 02 00 00 4c 89 ee 48 89 e7 e8 6c ed 00 00 ba
  [  223.492991] RSP: 002b:7ffd9fa12e60 EFLAGS: 00010246
  [  

[Bug 1921825] Re: Kernel panic on `5.4.0-1033-gke` (Kernel panic - not syncing: Aiee, killing interrupt handler!) possibly iscsi related

2021-04-01 Thread Khaled El Mously
** Also affects: linux-gke (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-gcp (Ubuntu)

** No longer affects: linux-gcp (Ubuntu Focal)

** Changed in: linux-gke (Ubuntu)
 Assignee: (unassigned) => Khaled El Mously (kmously)

** Changed in: linux-gke (Ubuntu Focal)
 Assignee: (unassigned) => Khaled El Mously (kmously)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921825

Title:
   Kernel panic on `5.4.0-1033-gke` (Kernel panic - not syncing: Aiee,
  killing interrupt handler!) possibly iscsi related

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gke/+bug/1921825/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921825] Re: Kernel panic on `5.4.0-1033-gke` (Kernel panic - not syncing: Aiee, killing interrupt handler!) possibly iscsi related

2021-03-30 Thread Khaled El Mously
60 RCX: 
7f45793ce335
  [  223.505579] RDX: 0200 RSI: 555b0cf146a0 RDI: 
7ffd9fa12e60
  [  223.513025] RBP: 7ffd9fa13ecc R08:  R09: 
80808000
  [  223.520268] R10: 0075 R11: 0246 R12: 
7ffd9fa13540
  [  223.527521] R13: 7ffd9fa13540 R14: 0200 R15: 
555b0d613300
  
+ Which happens during high iscsi activity
  
- Which happens during high iscsi activity
+ 
+ This issue is also identified in linux-5.8, reported here (
+ https://lkml.org/lkml/2020/7/28/1085 ) for example. It affects the
+ gcp-5.4 kernel specifically because gcp-5.4 has backported
+ '1b66d253610c7 ("bpf: Add get{peer, sock}name attach types for
+ sock_addr")' which introduces the issue.
+ 
+ The fix is
+ 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bcf3a2953d36bbfb9bd44ccb3db0897d935cc485
+ from 5.9

** Changed in: linux-gcp (Ubuntu Focal)
 Assignee: (unassigned) => Khaled El Mously (kmously)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921825

Title:
   Kernel panic on `5.4.0-1033-gke` (Kernel panic - not syncing: Aiee,
  killing interrupt handler!) possibly iscsi related

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/1921825/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1921825] [NEW] Kernel panic on `5.4.0-1033-gke` (Kernel panic - not syncing: Aiee, killing interrupt handler!) possibly iscsi related

2021-03-30 Thread Khaled El Mously
Public bug reported:

This stacktrace

[  223.386958] BUG: scheduling while atomic: iscsiadm/18136/0x0200
[  223.393390] Modules linked in: tcp_diag inet_diag xt_nat ipt_REJECT 
nf_reject_ipv4 xt_tcpudp ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs sch_htb ebt_ip 
ebtable_filter ebtables veth xt_mark br_netfilter iptable_mangle xt_MASQUERADE 
xt_comment xt_addrtype iptable_nat binfmt_misc iptable_filter bpfilter 
xt_conntrack nf_nat bridge stp llc xfrm_user xfrm_algo aufs overlay 
nls_iso8859_1 dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel crypto_simd 
cryptd glue_helper input_leds serio_raw sch_fq_codel sunrpc ib_iser rdma_cm 
iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi 
virtio_rng ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
raid0 multipath linear psmouse virtio_net net_failover failover
[  223.393429] CPU: 6 PID: 18136 Comm: iscsiadm Kdump: loaded Not tainted 
5.4.0-1033-gke #35~18.04.1-Ubuntu
[  223.393430] Hardware name: Google Google Compute Engine/Google Compute 
Engine, BIOS Google 01/01/2011
[  223.393430] Call Trace:
[  223.393439]  dump_stack+0x6d/0x95
[  223.393464]  __schedule_bug+0x55/0x70
[  223.393467]  __schedule+0x61b/0x710
[  223.393469]  schedule+0x33/0xa0
[  223.393472]  __lock_sock+0x7d/0xc0
[  223.393475]  ? wait_woken+0x80/0x80
[  223.393477]  lock_sock_nested+0x64/0x70
[  223.393479]  inet_getname+0xaa/0xe0
[  223.393482]  kernel_getpeername+0x1b/0x20
[  223.393485]  iscsi_sw_tcp_conn_get_param+0xa6/0x110 [iscsi_tcp]
[  223.393494]  show_conn_ep_param_ISCSI_PARAM_CONN_ADDRESS+0x7e/0xa0 
[scsi_transport_iscsi]
[  223.393496]  dev_attr_show+0x1d/0x50
[  223.393499]  sysfs_kf_seq_show+0xa1/0x110
[  223.393502]  kernfs_seq_show+0x27/0x30
[  223.393504]  seq_read+0xda/0x420
[  223.393506]  kernfs_fop_read+0x141/0x1a0
[  223.393510]  __vfs_read+0x1b/0x40
[  223.393512]  vfs_read+0x8e/0x130
[  223.393513]  ksys_read+0xa7/0xe0
[  223.393515]  __x64_sys_read+0x1a/0x20
[  223.393518]  do_syscall_64+0x57/0x190
[  223.393521]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  223.393523] RIP: 0033:0x7f45793ce910
[  223.393525] Code: b6 fe ff ff 48 8d 3d 0f be 08 00 48 83 ec 08 e8 06 db 01 
00 66 0f 1f 44 00 00 83 3d f9 2d 2c 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 
f0 ff ff 73 31 c3 48 83 ec 08 e8 de 9b 01 00 48 89 04 24
[  223.393526] RSP: 002b:7ffd9fa13688 EFLAGS: 0246 ORIG_RAX: 

[  223.393527] RAX: ffda RBX: 7ffd9fa13820 RCX: 7f45793ce910
[  223.393528] RDX: 0100 RSI: 7ffd9fa13720 RDI: 0003
[  223.393528] RBP: 7ffd9fa13720 R08:  R09: 
[  223.393529] R10: 0064 R11: 0246 R12: 0003
[  223.393530] R13: 7ffd9fa13c60 R14: 555b0d613708 R15: 555b0d613300
[  223.393581] sd 1:0:0:0: [sdb] Write Protect is off
[  223.393583] sd 1:0:0:0: [sdb] Mode Sense: 43 00 10 08
[  223.393660] iscsiadm[18136]: segfault at 7ffd9fa12e58 ip 555b0ccd95af sp 
7ffd9fa12e60 error 6 in iscsiadm[555b0ccb4000+58000]
[  223.393666] Code: ba 00 02 00 00 48 81 ec 10 04 00 00 48 89 e7 48 8d 9c 24 
00 02 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 08 04 00 00 31 c0  3c ed 
00 00 ba 00 02 00 00 4c 89 ee 48 89 e7 e8 6c ed 00 00 ba
[  223.394992] sd 1:0:0:0: alua: transition timeout set to 60 seconds
[  223.394997] sd 1:0:0:0: alua: port group 02 state N non-preferred supports 
TOlUSNA
[  223.395018] sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, 
supports DPO and FUA
[  223.395435] Kernel panic - not syncing: Aiee, killing interrupt handler!
[  223.396802] sd 1:0:0:0: [sdb] Optimal transfer size 262144 bytes
[  223.402387] CPU: 6 PID: 18136 Comm: iscsiadm Kdump: loaded Tainted: G
W 5.4.0-1033-gke #35~18.04.1-Ubuntu
[  223.402388] Hardware name: Google Google Compute Engine/Google Compute 
Engine, BIOS Google 01/01/2011
[  223.402389] Call Trace:
[  223.402395]  dump_stack+0x6d/0x95
[  223.402398]  panic+0xfe/0x2e4
[  223.402400]  do_exit+0x899/0xb90
[  223.402402]  do_group_exit+0x43/0xa0
[  223.402406]  get_signal+0x14f/0x860
[  223.402409]  do_signal+0x34/0x6d0
[  223.402414]  ? __bad_area_nosemaphore+0x149/0x1f0
[  223.457597]  exit_to_usermode_loop+0x8e/0x100
[  223.462090]  prepare_exit_to_usermode+0x91/0xa0
[  223.466782]  retint_user+0x8/0x8
[  223.470131] RIP: 0033:0x555b0ccd95af
[  223.473827] Code: ba 00 02 00 00 48 81 ec 10 04 00 00 48 89 e7 48 8d 9c 24 
00 02 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 08 04 00 00 31 c0  3c ed 
00 00 ba 00 02 00 00 4c 89 ee 48 89 e7 e8 6c ed 00 00 ba
[  223.492991] RSP: 002b:7ffd9fa12e60 EFLAGS: 00010246
[  223.498333] RAX:  RBX: 7ffd9fa13060 RCX: 7f45793ce335
[  223.505579] RDX: 0200 RSI: 555b0cf146a0 RDI: 7ffd9fa12e60
[  223.513025] RBP: 7ffd9fa13ecc R08: 

[Bug 1908264] Re: Disable Atari partition support for cloud kernels

2021-02-17 Thread Khaled El Mously
** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux-gke (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux-oracle (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908264

Title:
  Disable Atari partition support for cloud kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/1908264/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914668] Re: Exploitable vulnerabilities in AF_VSOCK implementation

2021-02-04 Thread Khaled El Mously
** Changed in: linux (Ubuntu Groovy)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Hirsute)
   Status: In Progress => Fix Committed

** Also affects: linux-riscv (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-riscv (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914668

Title:
  Exploitable vulnerabilities in AF_VSOCK implementation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1914668/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1910561] Re: Fix right sounds and mute/micmute LEDs for HP ZBook Fury 15/17 G7 Mobile Workstation

2021-01-22 Thread Khaled El Mously
** Changed in: linux (Ubuntu Groovy)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1910561

Title:
  Fix right sounds and mute/micmute LEDs for HP ZBook Fury 15/17 G7
  Mobile Workstation

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1910561/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1901842] Re: Ubuntu 20.04 - multicast counter is not increased in ip -s

2021-01-21 Thread Khaled El Mously
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Groovy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1901842

Title:
  Ubuntu 20.04 - multicast counter is not increased in ip -s

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1901842/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1908637] Re: psock_snd from net in ubuntu_kernel_selftests failed on G 5.8.0-34.37

2020-12-17 Thread Khaled El Mously
*** This bug is a duplicate of bug 1892213 ***
https://bugs.launchpad.net/bugs/1892213

** This bug has been marked a duplicate of bug 1892213
   psock_snd.sh in net from ubuntu_kernel_selftests ADT failure with focal/linux

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908637

Title:
  psock_snd  from net in ubuntu_kernel_selftests failed on G 5.8.0-34.37

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1908637/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1908637] [NEW] psock_snd from net in ubuntu_kernel_selftests failed on G 5.8.0-34.37

2020-12-17 Thread Khaled El Mously
Public bug reported:

Testing failed on:
amd64: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-groovy/groovy/amd64/l/linux/20201218_030102_175b9@/log.gz
arm64: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-groovy/groovy/arm64/l/linux/20201217_165622_90478@/log.gz
ppc64el: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-groovy/groovy/ppc64el/l/linux/20201217_103407_ff212@/log.gz
s390x: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-groovy/groovy/s390x/l/linux/20201217_095421_b8712@/log.gz

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete


** Tags: kernel-adt-failure

** Tags added: kernel-adt-failure

** Summary changed:

- linux 5.8.0-34.37 ADT test failure with linux 5.8.0-34.37
+ psock_snd  from net in ubuntu_kernel_selftests failed on G 5.8.0-34.37

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908637

Title:
  psock_snd  from net in ubuntu_kernel_selftests failed on G 5.8.0-34.37

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1908637/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1908636] [NEW] udpgso_bench from net in ubuntu_kernel_selftests failed on G 5.8.0-34.37

2020-12-17 Thread Khaled El Mously
Public bug reported:

Testing failed on:
amd64: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-groovy/groovy/amd64/l/linux/20201218_030102_175b9@/log.gz
arm64: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-groovy/groovy/arm64/l/linux/20201217_165622_90478@/log.gz
ppc64el: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-groovy/groovy/ppc64el/l/linux/20201217_103407_ff212@/log.gz
s390x: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-groovy/groovy/s390x/l/linux/20201217_095421_b8712@/log.gz

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete


** Tags: kernel-adt-failure

** Tags added: kernel-adt-failure

** Summary changed:

- linux 5.8.0-34.37 ADT test failure with linux 5.8.0-34.37
+ udpgso_bench from net in ubuntu_kernel_selftests failed on G/H 5.8.0-34.37

** Summary changed:

- udpgso_bench from net in ubuntu_kernel_selftests failed on G/H 5.8.0-34.37
+ udpgso_bench from net in ubuntu_kernel_selftests failed on G 5.8.0-34.37

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908636

Title:
  udpgso_bench from net in ubuntu_kernel_selftests failed on G
  5.8.0-34.37

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1908636/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1896077] Re: lttng-modules-dkms ADT test failure: build error with kernel >= 5.8

2020-12-14 Thread Khaled El Mously
I responded to comment #4 at:

https://bugs.launchpad.net/ubuntu/+source/lttng-
modules/+bug/1903952/comments/4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1896077

Title:
  lttng-modules-dkms ADT test failure: build error with kernel >= 5.8

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lttng-modules/+bug/1896077/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1903952] Re: focal:linux-hwe-5.8 lttng-modules dkms failure

2020-12-14 Thread Khaled El Mously
The upstream lttng-modules project is compatible and buildable on all
>3.0 kernels. The new lttng-modules 2.12.2 code should continue to
function fine on the 5.4 kernel.

I confirmed that the this latest package builds and loads without any
errors or warnings on the 5.4 kernel.

Therefore, it is more accurate to say there is a small potential for
regression on the 5.4 kernel - and that would likely indicate an
upstream bug in lttng-modules itself.

** Description changed:

  Impact: lttng-modules-dkms fail to build on Focal with the linux-hwe-5.8
  kernel.
  
  Fix: Use version 2.12.2 instead of 2.11.2. That would bring it in line
  with the version used in groovy.
  
  Testcase: Attempt to build the currently-available 2.11.2 - observe that
  it fails. Create a new package using the groovy source package, confirm
  that it builds and installs successfully. Furthermore, I was able to
  successfully manually modprobe all the .ko files that were built.
  
- Regression potential: Technically this doesn't work on the 5.8 hwe
- kernel in focal right now, so it cannot be any more broken than it
- currently is. The 2.12.2 version is identical to the one currently used
- in groovy.
+ Regression potential: Technically this doesn't work on the 5.8 hwe kernel in 
focal right now, so it cannot be any more broken than it currently is. The 
2.12.2 version is identical to the one currently used in groovy.
+ EDIT: The upstream lttng-modules project is compatible and buildable on all 
>3.0 kernels. The new 2.12.2 code should continue to function fine on the 5.4 
kernel.
+ 
+ I confirmed that the this latest package builds and loads without any
+ errors or warnings on the 5.4 kernel.
+ 
+ So, there is a small potential for regression on the 5.4 kernel - that
+ would likely indicate an upstream bug in lttng-modules itself.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1903952

Title:
  focal:linux-hwe-5.8 lttng-modules dkms failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lttng-modules/+bug/1903952/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1904654] Re: focal:linux-hwe-5.8 evdi-dkms build failure

2020-12-14 Thread Khaled El Mously
..however, since the upstream project still supports 5.4 I expect
potential for regression to be on the low side

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1904654

Title:
   focal:linux-hwe-5.8 evdi-dkms build failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/1904654/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1904654] Re: focal:linux-hwe-5.8 evdi-dkms build failure

2020-12-14 Thread Khaled El Mously
@Robie,


For this updated source, package, I have compiled it for the 5.4 kernel on 
Focal, and confirmed that:
 a) The module now builds properly on 5.4
 b) The module is loadable into the 5.4 kernel (without errors or warnings)


The upstream evdi project itself is compatible up to kernel 5.9:

https://github.com/DisplayLink/evdi/commit/83046d3e6e55de2069bada70894c633c090f7ddc


So I suppose there is a potential for regression on the 5.4 kernel, and that 
would likely indicate an upstream bug in evdi.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1904654

Title:
   focal:linux-hwe-5.8 evdi-dkms build failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/1904654/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1907262] Re: raid10: discard leads to corrupted file system

2020-12-09 Thread Khaled El Mously
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Groovy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1907262

Title:
  raid10: discard leads to corrupted file system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907262/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1907262] Re: raid10: discard leads to corrupted file system

2020-12-08 Thread Khaled El Mously
** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1907262

Title:
  raid10: discard leads to corrupted file system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907262/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1899832] Re: CONFIG options for (ipip, sit) should not be built-in to the KVM kernels

2020-11-25 Thread Khaled El Mously
** Changed in: linux-kvm (Ubuntu Xenial)
   Status: New => Fix Committed

** Changed in: linux-kvm (Ubuntu Bionic)
   Status: New => Fix Committed

** Changed in: linux-kvm (Ubuntu Focal)
   Status: New => Fix Committed

** Changed in: linux-kvm (Ubuntu Groovy)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1899832

Title:
  CONFIG options for (ipip, sit) should not be built-in to the KVM
  kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-kvm/+bug/1899832/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1899832] Re: CONFIG options for (ipip, sit) should not be built-in to the KVM kernels

2020-11-25 Thread Khaled El Mously
** Description changed:

  CONFIG_NET_IPIP and CONFIG_IPV6_SIT are set to =y in the -kvm kernels.
  
  This means that they are always present in the kernel, and the virtual
  devices they created (tunl0 and sit0) are always present, even when not
  configured and not needed.
  
  This is causing some issues for clouds that use the -kvm flavour, and
  there is no good reason for those configuration options to be =y anyway.
  
  So they should be converted to =m instead.
  
- 
  [Regression potential]
- 
-  - I'm not aware of any. General consensus is that these options should
- have been =m all along.
+  - The only possible regression I can think of by compiling these as modules 
is the possibility that someone's boot setup somehow depended on IP tunneling. 
Such issues would need to be worked out by some initramfs means, etc. 
+  - After this change, the modules (ipip.ko, sit.ko) are present in 
linux-modules.
+  - General consensus was that these options should have been =m all along.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1899832

Title:
  CONFIG options for (ipip, sit) should not be built-in to the KVM
  kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-kvm/+bug/1899832/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1899832] Re: CONFIG options for (ipip, sit) should not be built-in to the KVM kernels

2020-11-20 Thread Khaled El Mously
** Also affects: linux-kvm (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-kvm (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-kvm (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: linux-kvm (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1899832

Title:
  CONFIG options for (ipip, sit) should not be built-in to the KVM
  kernels

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-kvm/+bug/1899832/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1904654] Re: focal:linux-hwe-5.8 evdi-dkms build failure

2020-11-17 Thread Khaled El Mously
Debdiff between 1.7.0+dfsg-1ubuntu1 and 1.7.0+dfsg-1ubuntu1~20.04.1


** Attachment added: "Debdiff between 1.7.0+dfsg-1ubuntu1 and 
1.7.0+dfsg-1ubuntu1~20.04.1"
   
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/1904654/+attachment/5435369/+files/debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1904654

Title:
   focal:linux-hwe-5.8 evdi-dkms build failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/1904654/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1904654] Re: focal:linux-hwe-5.8 evdi-dkms build failure

2020-11-17 Thread Khaled El Mously
debdiff between 1.6.0+dfsg-1 and 1.7.0+dfsg-1ubuntu1~20.04.1

** Attachment added: "debdiff between 1.6.0+dfsg-1 and 
1.7.0+dfsg-1ubuntu1~20.04.1"
   
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/1904654/+attachment/5435374/+files/debdiff2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1904654

Title:
   focal:linux-hwe-5.8 evdi-dkms build failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/1904654/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   8   9   10   >