[Bug 2064809] [NEW] zstd support not enabled in makedumpfile

2024-05-04 Thread Heitor Alves de Siqueira
Public bug reported:

Zstd support seems to be missing from the latest makedumpfile versions.
Although it seemed to have been introduced after bug 1949395, this is
what I get in a Debian sid VM:

halves@sid:~$ makedumpfile -v
makedumpfile: version 1.7.5 (released on 12 Apr 2024)
lzo enabled
snappy  disabled
zstddisabled

The same is the case in a fresh Noble container:
halves@noble:~$ makedumpfile -v
makedumpfile: version 1.7.5 (released on 12 Apr 2024)
lzo enabled
snappy  disabled
zstddisabled

halves@noble:~$ dpkg -l | grep makedumpfile
ii  makedumpfile   1:1.7.5-1amd64VMcore extraction tool

** Affects: makedumpfile (Ubuntu)
 Importance: Medium
 Assignee: Heitor Alves de Siqueira (halves)
 Status: In Progress

** Changed in: makedumpfile (Ubuntu)
   Status: Confirmed => In Progress

** Changed in: makedumpfile (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064809

Title:
  zstd support not enabled in makedumpfile

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/2064809/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1916303] Re: [RFE] kdump memory estimator

2024-05-04 Thread Heitor Alves de Siqueira
Thanks, gpiccoli!

This is fixed in kdump-tools 1.10, so I'm marking it as Fix Released
(Noble and Oracular already ship with version 1.10.3ubuntu2). I'm also
marking makedumpfile as Invalid, since kdump-tools was split from that
source package.

** Changed in: makedumpfile (Ubuntu)
   Status: Fix Committed => Invalid

** Also affects: kdump-tools (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: kdump-tools (Ubuntu)
   Status: New => Fix Released

** Changed in: kdump-tools (Ubuntu)
 Assignee: (unassigned) => Guilherme G. Piccoli (gpiccoli)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1916303

Title:
  [RFE] kdump memory estimator

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kdump-tools/+bug/1916303/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061825] Re: [SRU] ucf fails to work for local diversions on Jammy

2024-04-30 Thread Heitor Alves de Siqueira
Thanks for the confirmation on Focal, @pponnuvel!

I've tested your debdiff, and it seems to work correctly. Patch is also
a straightforward cherry-pick from Debian.

Sponsored for Jammy, with the update-maintainer changes.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061825

Title:
  [SRU] ucf fails to work for local diversions on Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ucf/+bug/2061825/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953572] Re: Broken links in the View Trends and the View Histogram menu

2024-04-30 Thread Heitor Alves de Siqueira
** Changed in: nagios4 (Ubuntu Noble)
   Status: Incomplete => In Progress

** Changed in: nagios4 (Ubuntu)
   Status: Incomplete => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953572

Title:
  Broken links in the View Trends and the View Histogram menu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1953572/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1919154] Re: Enable CONFIG_NO_HZ_FULL on supported architectures

2024-04-30 Thread Heitor Alves de Siqueira
** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1919154

Title:
  Enable CONFIG_NO_HZ_FULL on supported architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1919154/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2036761] Re: [mantic] ppa-purge no longer purges what add-apt-repository adds

2024-04-30 Thread Heitor Alves de Siqueira
Marking as verified according to comment #21

** Tags removed: verification-needed verification-needed-mantic
** Tags added: verification-done verification-done-mantic

** Changed in: software-properties (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: software-properties (Ubuntu Mantic)
   Status: Confirmed => Invalid

** Changed in: software-properties (Ubuntu Noble)
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2036761

Title:
  [mantic] ppa-purge no longer purges what add-apt-repository adds

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ppa-purge/+bug/2036761/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2016881] Re: Building for Focal fails on riscv64

2024-04-25 Thread Heitor Alves de Siqueira
Bionic is EoL, if RISC-V support is needed there we'll need to target
Pro 18.04.

** Tags removed: patch se-sponsor-halves

** Description changed:

- Building zfs-linux for riscv64 fails on Ubuntu 18.04. There is a single
- patch missing:
- https://github.com/openzfs/zfs/commit/4254e407294b211f3399da2ee131b45fe9f4ac80
+ [Impact]
+  * riscv64 builds fail completely, so users on that architecture can't use 
ZFS.
+ 
+ [Test Plan]
+  * Build zfs-linux on target architecture. No test failure is expected.
+ 
+ [Where problems could occur]
+  * Test failures and bugs that are exclusive to RISCV64 might show up
+ 
+ [Other Info]
+  * Upstream introduced support riscv64 with 4254e407294b
+  * Builds succeed on Jammy and newer, Focal is missing the enablement patch
+ 
+ --
+ [Original Description]
+ Building zfs-linux for riscv64 fails on Ubuntu 18.04. There is a single patch 
missing: 
https://github.com/openzfs/zfs/commit/4254e407294b211f3399da2ee131b45fe9f4ac80

** Changed in: zfs-linux (Ubuntu Bionic)
   Status: Invalid => Won't Fix

** Summary changed:

- Building for Focal fails on riscv64
+ zfs-linux FTBFS for riscv64 on Focal

** Changed in: zfs-linux (Ubuntu Bionic)
   Importance: Medium => Undecided

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2016881

Title:
  zfs-linux FTBFS for riscv64 on Focal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/2016881/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1987052] Re: Running MySQL8 in Docker on ZFS only works if you have ZFS 2.1.5. Ubuntu 22.04 only has 2.1.4 right now.

2024-04-24 Thread Heitor Alves de Siqueira
** Changed in: zfs-linux (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1987052

Title:
  Running MySQL8 in Docker on ZFS only works if you have ZFS 2.1.5.
  Ubuntu 22.04 only has 2.1.4 right now.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1987052/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1980848] Re: arc_summary doesn't work with HWE kernel 5.15

2024-04-24 Thread Heitor Alves de Siqueira
** Also affects: zfs-linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: zfs-linux (Ubuntu Focal)
   Status: New => In Progress

** Changed in: zfs-linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: zfs-linux (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: zfs-linux (Ubuntu)
   Status: Confirmed => Fix Released

** Changed in: zfs-linux (Ubuntu)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: zfs-linux (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1980848

Title:
  arc_summary doesn't work with HWE kernel 5.15

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1980848/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953572] Re: Broken links in the View Trends and the View Histogram menu

2024-04-24 Thread Heitor Alves de Siqueira
Thanks for the debdiff, Jorge! A few comments:

Even though the fix is the same for J/M/N, we'll need separate debdiffs and 
versions for each. We'll need to keep the upgrade path working between each 
release, so I'd suggest something like below (according to [0]):
- 4.4.6-4ubuntu0.22.04.1 for Jammy
- 4.4.6-4ubuntu0.23.10.1 for Mantic
- 4.4.6-4ubuntu0.24.04.1 or 4.4.6-4ubuntu1 for Noble (depending on whether O 
will need fixing as well)

And it's great that you ran the update-maintainer script as well. Would
you be able to add a mention of this in the changelog entries, too?

Finally, I'd really appreciate it if we had any mention of the fix on
the SRU template. Maybe a short section explaining why we're changing
the --with-cgiurl flag, and where that fix came from?

[0]
https://wiki.ubuntu.com/SecurityTeam/UpdatePreparation#Update_the_packaging

** Changed in: nagios4 (Ubuntu Noble)
   Status: Confirmed => Incomplete

** Changed in: nagios4 (Ubuntu Focal)
   Status: New => In Progress

** Changed in: nagios4 (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: nagios4 (Ubuntu Mantic)
   Status: New => In Progress

** Changed in: nagios4 (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: nagios4 (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: nagios4 (Ubuntu Mantic)
   Importance: Undecided => Medium

** Changed in: nagios4 (Ubuntu Noble)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953572

Title:
  Broken links in the View Trends and the View Histogram menu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1953572/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061825] Re: [SRU] ucf fails to work for local diversions on Jammy

2024-04-24 Thread Heitor Alves de Siqueira
Hi Pon,

thanks for the revised debdiff! This seems to be a non-quilt package, so
your approach of directly patching the ucf/ucfr scripts is correct. The
only thing missing is running the update-maintainer script, as the
ubuntu1 version requires having an ubuntu.com address on the maintainers
field. This is something a sponsor can run easily, so don't worry about
fixing it for now (but feel free to do it for future debdiffs!).

Before uploading this, I'd like to check about Focal; is that release
affected at all? If it is, any reason why we shouldn't patch it?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061825

Title:
  [SRU] ucf fails to work for local diversions on Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ucf/+bug/2061825/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061986] Re: Mount CIFS fails with Permission denied

2024-04-24 Thread Heitor Alves de Siqueira
Marking Ubuntu as "Fix Released" according to parent description, as fix
was introduced upstream in v5.16.

** Changed in: linux (Ubuntu Focal)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Jammy)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061986

Title:
  Mount CIFS fails with Permission denied

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2061986/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061986] Re: Mount CIFS fails with Permission denied

2024-04-24 Thread Heitor Alves de Siqueira
** Changed in: linux (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061986

Title:
  Mount CIFS fails with Permission denied

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2061986/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2038453] Re: [SRU] apt snapshot integration backport

2024-04-18 Thread Heitor Alves de Siqueira
** Changed in: ubuntu-pro/18.04
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2038453

Title:
  [SRU] apt snapshot integration backport

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-pro/+bug/2038453/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1855189] Re: usbguard stops responding when recvmsg receives ENOBUFS

2024-04-16 Thread Heitor Alves de Siqueira
# VERIFICATION FOCAL

Validation performed on a 6-core VM with 8Gb or RAM. The following stress-ng 
command was running throughout the test from the description:
# stress-ng --class memory --class vm --all 1 --timeout 96h

Afterwards, the udevadm test loop was executed as below:
# date; while /bin/true; do
sudo udevadm control --reload-rules
sudo udevadm trigger
sudo udevadm settle --timeout=3
  done
Thu Apr 11 19:19:18 UTC 2024
...

A few minutes later, the errors started showing up on journald:
# journalctl --follow -b -u usbguard | grep -A2 "failed to read"
Apr 11 19:21:59 z-rotomvm34 usbguard-daemon[197214]: [1712863318.753] (E) 
ueventProcessRead: failed to read pending uevent: rc=-1 errno=105
Apr 11 19:21:59 z-rotomvm34 usbguard-daemon[197214]: [1712863318.755] (E) 
UEventDeviceManager thread: UEvent device manager: recvmsg: No buffer space 
available

..and usbguard became unresponsive.

This seems good indication that the reproducer is valid. I then upgraded
to the usbguard version from proposed and repeated the tests (plus
stress-ng workload). The VM has been running for many hours since then,
and journald indicates that we've triggered the ENOBUFS issues more than
a few times. usbguard-daemon continued chugging along and responding to
events, so we can mark this as verified.

Below are the verification logs.
###

$ dpkg -l | grep usbguard
ii  libusbguard0  0.7.6+ds-1ubuntu1 
amd64USB device authorization policy framework - shared library
ii  usbguard  0.7.6+ds-1ubuntu1 
amd64USB device authorization policy framework

$ date; while /bin/true; do
  sudo udevadm control --reload-rules
  sudo udevadm trigger
  sudo udevadm settle --timeout=3
done
Tue Apr 16 10:20:33 UTC 2024

# stress-ng --class memory --class vm --all 1 --timeout 96h

$ sudo journalctl -b -u usbguard | grep -A1 "failed to read"
Apr 16 13:40:40 z-rotomvm34 usbguard-daemon[712]: [1713274840.663] (E) 
ueventProcessRead: failed to read pending uevent (returning): rc=
-1 errno=105
Apr 16 13:40:40 z-rotomvm34 usbguard-daemon[712]: [1713274840.827] (A) uid=0 
pid=712 result='SUCCESS' device.rule='allow id 1d6b:0001 se
rial ":00:04.0" name "UHCI Host Controller" hash 
"sKXn6PthDDlGgdxZHdnlUQ9DROkH/YSojkBlfpcnsaU=" parent-hash 
"9Ii0Zm8Mvu2nYz9z/EgAXJ/ed6bLW8Ctv1iUD5rh6qY=" via-port "usb2" with-interface 
09:00:00 with-connect-type ""' 
device.system_name='/devices/pci:00/:00:04.0/usb2' type='Device.Present'
--
Apr 16 14:15:45 z-rotomvm34 usbguard-daemon[712]: [1713276945.707] (E) 
ueventProcessRead: failed to read pending uevent (returning): rc=-1 errno=105
Apr 16 14:15:45 z-rotomvm34 usbguard-daemon[712]: [1713276945.709] (A) uid=0 
pid=712 result='SUCCESS' device.rule='allow id 0627:0001 serial 
"28754-:00:04.7-1" name "QEMU USB Tablet" hash 
"74abnf32ZntGQv1XK1k5t/IqWo3wxePUnjpidwCzMk4=" parent-hash 
"CsKOZ6IY8v3eojsc1fqKDW84V+MMhD6HsjjojcZBjSg=" via-port "1-1" with-interface 
03:00:00 with-connect-type "unknown"' 
device.system_name='/devices/pci:00/:00:04.7/usb1/1-1' 
type='Device.Present'
--
Apr 16 14:43:09 z-rotomvm34 usbguard-daemon[712]: [1713278589.740] (E) 
ueventProcessRead: failed to read pending uevent (returning): rc=-1 errno=105
Apr 16 14:43:10 z-rotomvm34 usbguard-daemon[712]: [1713278590.573] (A) uid=0 
pid=712 result='SUCCESS' device.rule='allow id 1d6b:0001 serial ":00:04.0" 
name "UHCI Host Controller" hash "sKXn6PthDDlGgdxZHdnlUQ9DROkH/YSojkBlfpcnsaU=" 
parent-hash "9Ii0Zm8Mvu2nYz9z/EgAXJ/ed6bLW8Ctv1iUD5rh6qY=" via-port "usb2" 
with-interface 09:00:00 with-connect-type ""' 
device.system_name='/devices/pci:00/:00:04.0/usb2' type='Device.Present'


** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1855189

Title:
  usbguard stops responding when recvmsg receives ENOBUFS

To manage notifications about this bug go to:
https://bugs.launchpad.net/usbguard/+bug/1855189/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1855189] Re: usbguard stops responding when recvmsg receives ENOBUFS

2024-04-11 Thread Heitor Alves de Siqueira
Thanks, Robie! Our users reported that issues usually appear within one
or two hours, but that's likely tied to machine-specific workloads.

I've been able to force this issue to occur in a VM when running the
test script from the description together with stress-ng memory/vm
stressors. The "failed to read" logs then trigger consistently within a
few minutes.

Considering that we do need memory pressure for the ENOBUFS issues to
happen, I think this is a valid test scenario. I'll add this to the test
plan section of the bug, and see if I can do a long duration test with
the package from proposed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1855189

Title:
  usbguard stops responding when recvmsg receives ENOBUFS

To manage notifications about this bug go to:
https://bugs.launchpad.net/usbguard/+bug/1855189/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059197] Re: mount.nfs: Fix minor version parsing when '-t nfs4' and '-o vers=4.x' are used together

2024-04-11 Thread Heitor Alves de Siqueira
Thanks for the revised debdiff, Matthew! And nice work on the extensive
sanity check for the version laddering.

The new debdiff looks good, I've sponsored it for Focal. Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059197

Title:
  mount.nfs: Fix minor version parsing when '-t nfs4' and '-o vers=4.x'
  are used together

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/2059197/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059197] Re: mount.nfs: Fix minor version parsing when '-t nfs4' and '-o vers=4.x' are used together

2024-04-10 Thread Heitor Alves de Siqueira
Hi Matthew,

thanks for the quick follow-up on the regression! Being the sponsor for
the original patch in bug 2049262, I wanted to give this one some deeper
attention. Version parsing seems to have been a difficult area upstream,
with several follow-up fixes indeed, so thank you for detailing the
required commits.

I've done a double-check upstream, and noticed an additional fix that
doesn't seem to be on your list:

https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=5f32083c759b
- 5f32083c mount.nfs: Fix auto protocol negotiation

$ git describe --contains 5f32083c759b
nfs-utils-2-3-2-rc2~9

This fixes a regression with falling back to NFSv3 on servers that don't
support v4, and was introduced by 71b807e1. Could you please confirm
whether we need to pull it in with the ones you already listed for
Focal? It's already present in Jammy and newer.

** Changed in: nfs-utils (Ubuntu Focal)
   Status: In Progress => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059197

Title:
  mount.nfs: Fix minor version parsing when '-t nfs4' and '-o vers=4.x'
  are used together

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/2059197/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2016881] Re: Building for Focal fails on riscv64

2024-04-10 Thread Heitor Alves de Siqueira
** Changed in: zfs-linux (Ubuntu Focal)
   Importance: Medium => Low

** Changed in: zfs-linux (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: zfs-linux (Ubuntu Focal)
   Status: Incomplete => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2016881

Title:
  Building for Focal fails on riscv64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/2016881/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2009885] Re: Timeshift 21.09.1-1 broken after Rsync upgrade to 3.2.7-0ubuntu0.22.04.2

2024-04-10 Thread Heitor Alves de Siqueira
** Changed in: timeshift (Ubuntu)
   Status: Confirmed => Fix Released

** Changed in: timeshift (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: timeshift (Ubuntu Jammy)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2009885

Title:
  Timeshift 21.09.1-1 broken after Rsync upgrade  to
  3.2.7-0ubuntu0.22.04.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/timeshift/+bug/2009885/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1855189] Re: usbguard stops responding when recvmsg receives ENOBUFS

2024-03-28 Thread Heitor Alves de Siqueira
We've had users report this bug under Focal, and the usbguard pkg there
does seem to be missing this fix. I've updated the bug with the SRU
template, and tested the patches (builds available at [0]). Users also
reported that this patched version resolved this issue, so I've pushed
it to the Focal upload queue.

[0] https://launchpad.net/~halves/+archive/ubuntu/test

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1855189

Title:
  usbguard stops responding when recvmsg receives ENOBUFS

To manage notifications about this bug go to:
https://bugs.launchpad.net/usbguard/+bug/1855189/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1855189] Re: usbguard stops responding when recvmsg receives ENOBUFS

2024-03-28 Thread Heitor Alves de Siqueira
** Description changed:

- With 0.7.4+ds-1 from 19.10, usbguard may stop responding to events when
- recvmsg fails with ENOBUFS. To reproduce:
+ [Impact]
+ usbguard-daemon will no longer process device events until restarted
+ 
+ [Test Plan]
+ 1. Spin up a Focal VM with usbguard enabled
+ 2. Run the script below:
+   
+   while /bin/true ; do
+ sudo udevadm control --reload-rules
+ sudo udevadm trigger
+ sudo udevadm settle --timeout=3
+   done
+ 
+ 3. journald logs will indicate the following errors:
+   usbguard-daemon[12488]: ueventProcessRead: failed to read pending uevent: 
rc=-1 errno=105
+   usbguard-daemon[12488]: UEventDeviceManager thread: UEvent device manager: 
recvmsg: No buffer space available
+ 
+ [Where problems could occur]
+ The fix introduces an additional check in the usbguard event handler, so we 
should properly test this path. Potential regressions could cause USB devices 
to not be probed correctly, or usbguard dropping device events. We should also 
make sure the usbguard daemon is recovering from ENOBUFS and other errors 
correctly without needing to be restarted.
+ 
+ [Other Info]
+ The fix has been introduced upstream in version usbguard-0.7.7:
+ $ git describe --contains 5f297079b843
+ usbguard-0.7.7~2
+ 
+ As such, releases starting with Jammy already contain the fix:
+ $ rmadison usbguard
+  usbguard | 0.7.2+ds-1   | bionic/universe | source, amd64, arm64, armhf, 
i386, ppc64el, s390x
+  usbguard | 0.7.6+ds-1build1 | focal/universe  | source, amd64, arm64, armhf, 
ppc64el, riscv64, s390x
+  usbguard | 1.1.1+ds-3   | jammy/universe  | source, amd64, arm64, armhf, 
ppc64el, riscv64, s390x
+  usbguard | 1.1.2+ds-4   | mantic/universe | source, amd64, arm64, armhf, 
ppc64el, riscv64, s390x
+  usbguard | 1.1.2+ds-6   | noble/universe  | source, amd64, arm64, armhf, 
ppc64el, riscv64, s390x
+ 
+ --
+ [Original description]
+ With 0.7.4+ds-1 from 19.10, usbguard may stop responding to events when 
recvmsg fails with ENOBUFS. To reproduce:
  
    while /bin/true ; do
  sudo udevadm control --reload-rules
  sudo udevadm trigger
  sudo udevadm settle --timeout=3
    done
  
  Eventually, this pops out in the journald logs:
  
    usbguard-daemon[12488]: ueventProcessRead: failed to read pending uevent: 
rc=-1 errno=105
    usbguard-daemon[12488]: UEventDeviceManager thread: UEvent device manager: 
recvmsg: No buffer space available
  
  and usbguard will no longer process events until restarted (sudo
  systemctl restart usbguard).
  
  I then installed usbguard 0.7.5 from the desktop team's PPA[1], ran the
  loop and saw the equivalent error pop out:
  
    usbguard-daemon[5958]: [1575487887.438] (E) ueventProcessRead: failed to 
read pending uevent: rc=-1 errno=105
    usbguard-daemon[5958]: [1575487887.438] (E) UEventDeviceManager thread: 
UEvent device manager: recvmsg: No buffer space available
  
  This is coming from
  
https://github.com/USBGuard/usbguard/blob/master/src/Library/UEventDeviceManager.cpp#L528
  where recvmsg() is returning -1 with 'No buffer space available'
  (ENOBUFS). Looking at sysdeps/gnu/errlist.c in glibc, ENOBUFS is
  documented as:
  
    #ifdef ENOBUFS
    /*
    TRANS The kernel's buffers for I/O operations are all in use.  In GNU, this
    TRANS error is always synonymous with @code{ENOMEM}; you may get one or the
    TRANS other from network operations. */
    [ERR_REMAP (ENOBUFS)] = N_("No buffer space available"),
  
  It seems that usbguard should be able to handle transient ENOBUFS
  scenarios with uevent storms and recover when the kernel's buffers are
  back in order. In my testing, I treated ENOBUFS similarly to
  EAGAIN/EWOULDBLOCK by logging a warning and simply returning[2]:
  
    usbguard-daemon[2405]: ueventProcessRead: failed to read pending
  uevent (returning): rc=-1 errno=105
  
  It appears usbguard continues to function (eg, if I do the loop for a
  long time, usbguard remains responsive and processes other uevents, but
  I'm not sure this is the correct approach since, for example,
  UEventDeviceManager::ueventOpen() speaks to this error condition by
  saying: "Set a 1MiB receive buffer on the netlink socket to avoid
  ENOBUFS error in recvmsg").
  
  [1]https://launchpad.net/~ubuntu-desktop/+archive/ubuntu/usbguard
  [2]exploratory patch (do not commit in Ubuntu without upstream confirmation)
  Index: usbguard-0.7.4+ds/src/Library/UEventDeviceManager.cpp
  ===
  --- usbguard-0.7.4+ds.orig/src/Library/UEventDeviceManager.cpp
  +++ usbguard-0.7.4+ds/src/Library/UEventDeviceManager.cpp
  @@ -468,6 +468,12 @@ namespace usbguard
     << "reading from uevent source would block thread execution";
   return;
     }
  +  else if (saved_errno == ENOBUFS) {
  +USBGUARD_LOG(Error) << "ueventProcessRead: "
  +  << "failed to read pending uevent (returning): "
  +  << "rc=" << rc << " 

[Bug 1855189] Re: usbguard stops responding when recvmsg receives ENOBUFS

2024-03-28 Thread Heitor Alves de Siqueira
** Also affects: usbguard (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: usbguard (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: usbguard (Ubuntu Focal)
   Status: New => In Progress

** Changed in: usbguard (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1855189

Title:
  usbguard stops responding when recvmsg receives ENOBUFS

To manage notifications about this bug go to:
https://bugs.launchpad.net/usbguard/+bug/1855189/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2036761] Re: [mantic] ppa-purge no longer purges what add-apt-repository adds

2024-03-27 Thread Heitor Alves de Siqueira
Hi Ghadi,

thanks for the debdiff! I've considered trimming down the new version to
0.2.8+bzr63-0ubuntu1.1 according to [0], but ultimately think your
approach is correct (otherwise it'll be hard to update ppa-purge in
Jammy if we ever need to!).

Tested and sponsored for Mantic.

[0]
https://wiki.ubuntu.com/SecurityTeam/UpdatePreparation#Update_the_packaging

** Changed in: ppa-purge (Ubuntu Mantic)
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2036761

Title:
  [mantic] ppa-purge no longer purges what add-apt-repository adds

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ppa-purge/+bug/2036761/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1993009] Re: usbguard 0.7.8 focal backport request

2024-03-16 Thread Heitor Alves de Siqueira
*** This bug is a duplicate of bug 1855189 ***
https://bugs.launchpad.net/bugs/1855189

This seems to be a duplicate of bug 1855189. Feel free to drop a comment
if this isn't the case, and we can investigate further. Thanks!

** This bug has been marked a duplicate of bug 1855189
   usbguard stops responding when recvmsg receives ENOBUFS

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1993009

Title:
  usbguard 0.7.8 focal backport request

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/usbguard/+bug/1993009/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056802] Re: crypttab does not honor `x-initrd.attach` option

2024-03-11 Thread Heitor Alves de Siqueira
Thank you for the bug, Heather! I'm marking Bionic as "Won't Fix", as it's EOL.
If needed, please re-target against Pro 18.04. Thanks!

** Changed in: systemd (Ubuntu Bionic)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056802

Title:
  crypttab does not honor `x-initrd.attach` option

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/2056802/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1968805] Re: Hibernation fails when an additional swapfile is added due to priority mismatch

2022-05-20 Thread Heitor Alves de Siqueira
Uploaded to the stable series. Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968805

Title:
  Hibernation fails when an additional swapfile is added due to priority
  mismatch

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ec2-hibinit-agent/+bug/1968805/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1968805] Re: Hibernation fails when an additional swapfile is added due to priority mismatch

2022-05-18 Thread Heitor Alves de Siqueira
** Tags removed: sts-sponsor
** Tags added: sts-sponsor-halves

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968805

Title:
  Hibernation fails when an additional swapfile is added due to priority
  mismatch

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ec2-hibinit-agent/+bug/1968805/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1972029] Re: dhclient overriding stub-resolv.conf file on Jammy

2022-05-17 Thread Heitor Alves de Siqueira
** Tags added: sts sts-sponsor-halves

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972029

Title:
  dhclient overriding stub-resolv.conf file on Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1972029/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1965325] Re: upstream patch from opendev - double encoding-decoding

2022-05-09 Thread Heitor Alves de Siqueira
Uploaded to stable releases, thanks!
I had to adjust some minor things (package versions) due to the new kinetic 
upload, but the patches themselves were good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965325

Title:
  upstream patch from opendev - double encoding-decoding

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-etcd3gw/+bug/1965325/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2022-04-26 Thread Heitor Alves de Siqueira
Validated glibc from focal-proposed according to test case from
description:

halves@glibc-zen:~$ ./test_memcpy64 32
32 MB = 1.222535 ms
-Compare match (should be zero):  0

halves@glibc-zen:~$ dpkg -l | grep libc-bin
ii  libc-bin 2.31-0ubuntu9.9amd64   
 GNU C Library: Binaries
halves@glibc-zen:~$ grep -m1 "model name" /proc/cpuinfo
model name  : AMD Ryzen 7 3700X 8-Core Processor

Also validated on an Intel system, and no performance regressions have been 
observed:
halves@halves-focal-glibc-xeon:~$ ./test_memcpy64 32
32 MB = 2.174005 ms
-Compare match (should be zero):  0

halves@halves-focal-glibc-xeon:~$ grep -m1 "model name" /proc/cpuinfo
model name  : Intel(R) Xeon(R) CPU E5-2683 v3 @ 2.00GHz
halves@halves-focal-glibc-xeon:~$ dpkg -l | grep libc-bin
ii  libc-bin 2.31-0ubuntu9.9amd64   
 GNU C Library: Binaries


** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872813] Re: cloud-init fails to detect iSCSI root on focal Oracle instances

2022-04-20 Thread Heitor Alves de Siqueira
Sponsored for Bionic. Thanks for the contribution, @jorge-merlino!

** Changed in: open-iscsi (Ubuntu Bionic)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872813

Title:
  cloud-init fails to detect iSCSI root on focal Oracle instances

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1872813/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1942624] Re: NVMe devices fail to probe due to ACPI power state change

2022-04-13 Thread Heitor Alves de Siqueira
** Description changed:

  [Impact]
  * Specific NVMe devices fail to probe and become unusable after boot
  * Caused by an ACPI regression that doesn't correctly handle power states
  * Upstream regression commit:
    7e4fdeafa61f ACPI: power: Turn off unused power resources unconditionally
  * Regression window for Ubuntu kernels includes 5.13 and 5.14
  
  [Test Plan]
  * Boot affected kernel and validate whether NVMe device is usuble
  * Check kernel logs for failed probe message:
    "can't change power state from D3Cold to D0 (config space inaccessible"
  
  [Fix]
  * Fixed by not turning off power resources in unknown state
  * Fix was introduced by commit:
    bc2836859643 ACPI: PM: Do not turn off power resources in unknown state
- * Ubuntu kernels starting with 5.15 (Jammy) not affected, as they contain the 
fix above
+ * Kernels starting with 5.15 (e.g. Jammy) not affected, as they already 
contain the fix above
  
  [Regression Potential]
  * NVMe devices continue failing to probe
  * Other devices become unusable after power state changes
  * Further regressions would affect power state of devices, possibly after boot
  
  --
  [Original Description]
  NVME "can't change power state from D3Cold to D0 (config space inaccessible)"
  
  Bug with kernels after version 5.11.0-18 on Lenovo Ideapad 330-15ICH.
  The NVME drive with my root partition cannot be mounted at boot with an
  error "can't change power state from D3Cold to D0 (config space
  inaccessible)". I'm willing to help find a root cause if I don't need to
  spent too many hours. All Ubuntu kernels after 5.11.0-18 exhibit this
  bug, but I could boot properly with the official linux kernel 5.13.0.
  Thanks a lot for your help
  
  ProblemType: Bug
  DistroRelease: Ubuntu 21.04
  Package: linux-image-5.11.0-18-generic 5.11.0-18.19
  ProcVersionSignature: Ubuntu 5.11.0-18.19-generic 5.11.17
  Uname: Linux 5.11.0-18-generic x86_64
  ApportVersion: 2.20.11-0ubuntu65.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  chris  7503 F pulseaudio
   /dev/snd/pcmC0D0p:   chris  7503 F...m pulseaudio
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Sep  3 18:46:35 2021
  InstallationDate: Installed on 2019-07-17 (779 days ago)
  InstallationMedia: Ubuntu 19.04 "Disco Dingo" - Release amd64 (20190416)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 5986:210e Acer, Inc EasyCamera
   Bus 001 Device 004: ID 8087:0a2a Intel Corp. Bluetooth wireless interface
   Bus 001 Device 007: ID 1050:0407 Yubico.com Yubikey 4/5 OTP+U2F+CCID
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: LENOVO 81FK
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.11.0-18-generic 
root=UUID=9d963312-3a16-428d-8efd-f1323c6528f1 ro quiet nosplash 
crashkernel=512M-:192M
  RelatedPackageVersions:
   linux-restricted-modules-5.11.0-18-generic N/A
   linux-backports-modules-5.11.0-18-generic  N/A
   linux-firmware 1.197.3
  SourcePackage: linux
  UpgradeStatus: Upgraded to hirsute on 2021-06-03 (92 days ago)
  dmi.bios.date: 10/24/2018
  dmi.bios.release: 1.29
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 7ZCN29WW
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: LNVNB161216
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0J40709 WIN
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo ideapad 330-15ICH
  dmi.ec.firmware.release: 1.29
  dmi.modalias: 
dmi:bvnLENOVO:bvr7ZCN29WW:bd10/24/2018:br1.29:efr1.29:svnLENOVO:pn81FK:pvrLenovoideapad330-15ICH:rvnLENOVO:rnLNVNB161216:rvrSDK0J40709WIN:cvnLENOVO:ct10:cvrLenovoideapad330-15ICH:
  dmi.product.family: ideapad 330-15ICH
  dmi.product.name: 81FK
  dmi.product.sku: LENOVO_MT_81FK_BU_idea_FM_ideapad 330-15ICH
  dmi.product.version: Lenovo ideapad 330-15ICH
  dmi.sys.vendor: LENOVO

** Description changed:

  [Impact]
  * Specific NVMe devices fail to probe and become unusable after boot
  * Caused by an ACPI regression that doesn't correctly handle power states
  * Upstream regression commit:
    7e4fdeafa61f ACPI: power: Turn off unused power resources unconditionally
  * Regression window for Ubuntu kernels includes 5.13 and 5.14
  
  [Test Plan]
- * Boot affected kernel and validate whether NVMe device is usuble
+ * Boot affected kernel and validate whether NVMe device is usable
  * Check kernel logs for failed probe message:
-   "can't change power state from D3Cold to D0 (config space inaccessible"
+   "can't change power state from D3Cold to D0 (config space inaccessible)"
  
  [Fix]
  * Fixed by not turning off power resources in unknown state
  * Fix was introduced by commit:
    bc2836859643 ACPI: PM: Do not turn off power resources in unknown state
  * Kernels starting with 5.15 (e.g. Jammy) not affected, as they already 
contain the fix 

[Bug 1942624] Re: NVMe devices fail to probe due to ACPI power state change

2022-04-13 Thread Heitor Alves de Siqueira
** Summary changed:

- NVME "can't change power state from D3Cold to D0 (config space inaccessible)"
+ NVMe devices fail to probe due to ACPI power state change

** Description changed:

+ [Impact]
+ * Specific NVMe devices fail to probe and become unusable after boot
+ * Caused by an ACPI regression that doesn't correctly handle power states
+ * Upstream regression commit:
+   7e4fdeafa61f ACPI: power: Turn off unused power resources unconditionally
+ 
+ [Test Plan]
+ * Boot affected kernel and validate whether NVMe device is usuble
+ * Check kernel logs for failed probe message:
+   "can't change power state from D3Cold to D0 (config space inaccessible"
+ 
+ [Fix]
+ * Fixed by not turning off power resources in unknown state
+ * Fix was introduced by commit:
+   bc2836859643 ACPI: PM: Do not turn off power resources in unknown state
+ 
+ [Regression Potential]
+ * NVMe devices continue failing to probe
+ * Other devices become unusable after power state changes
+ * Further regressions would affect power state of devices, possibly after boot
+ 
+ --
+ [Original Description]
+ NVME "can't change power state from D3Cold to D0 (config space inaccessible)"
+ 
  Bug with kernels after version 5.11.0-18 on Lenovo Ideapad 330-15ICH.
  The NVME drive with my root partition cannot be mounted at boot with an
  error "can't change power state from D3Cold to D0 (config space
  inaccessible)". I'm willing to help find a root cause if I don't need to
  spent too many hours. All Ubuntu kernels after 5.11.0-18 exhibit this
  bug, but I could boot properly with the official linux kernel 5.13.0.
  Thanks a lot for your help
  
  ProblemType: Bug
  DistroRelease: Ubuntu 21.04
  Package: linux-image-5.11.0-18-generic 5.11.0-18.19
  ProcVersionSignature: Ubuntu 5.11.0-18.19-generic 5.11.17
  Uname: Linux 5.11.0-18-generic x86_64
  ApportVersion: 2.20.11-0ubuntu65.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  chris  7503 F pulseaudio
   /dev/snd/pcmC0D0p:   chris  7503 F...m pulseaudio
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Sep  3 18:46:35 2021
  InstallationDate: Installed on 2019-07-17 (779 days ago)
  InstallationMedia: Ubuntu 19.04 "Disco Dingo" - Release amd64 (20190416)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 5986:210e Acer, Inc EasyCamera
   Bus 001 Device 004: ID 8087:0a2a Intel Corp. Bluetooth wireless interface
   Bus 001 Device 007: ID 1050:0407 Yubico.com Yubikey 4/5 OTP+U2F+CCID
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: LENOVO 81FK
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.11.0-18-generic 
root=UUID=9d963312-3a16-428d-8efd-f1323c6528f1 ro quiet nosplash 
crashkernel=512M-:192M
  RelatedPackageVersions:
   linux-restricted-modules-5.11.0-18-generic N/A
   linux-backports-modules-5.11.0-18-generic  N/A
   linux-firmware 1.197.3
  SourcePackage: linux
  UpgradeStatus: Upgraded to hirsute on 2021-06-03 (92 days ago)
  dmi.bios.date: 10/24/2018
  dmi.bios.release: 1.29
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 7ZCN29WW
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: LNVNB161216
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0J40709 WIN
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo ideapad 330-15ICH
  dmi.ec.firmware.release: 1.29
  dmi.modalias: 
dmi:bvnLENOVO:bvr7ZCN29WW:bd10/24/2018:br1.29:efr1.29:svnLENOVO:pn81FK:pvrLenovoideapad330-15ICH:rvnLENOVO:rnLNVNB161216:rvrSDK0J40709WIN:cvnLENOVO:ct10:cvrLenovoideapad330-15ICH:
  dmi.product.family: ideapad 330-15ICH
  dmi.product.name: 81FK
  dmi.product.sku: LENOVO_MT_81FK_BU_idea_FM_ideapad 330-15ICH
  dmi.product.version: Lenovo ideapad 330-15ICH
  dmi.sys.vendor: LENOVO

** Description changed:

  [Impact]
  * Specific NVMe devices fail to probe and become unusable after boot
  * Caused by an ACPI regression that doesn't correctly handle power states
  * Upstream regression commit:
-   7e4fdeafa61f ACPI: power: Turn off unused power resources unconditionally
+   7e4fdeafa61f ACPI: power: Turn off unused power resources unconditionally
+ * Regression window for Ubuntu kernels includes 5.13 and 5.14
  
  [Test Plan]
  * Boot affected kernel and validate whether NVMe device is usuble
  * Check kernel logs for failed probe message:
-   "can't change power state from D3Cold to D0 (config space inaccessible"
+   "can't change power state from D3Cold to D0 (config space inaccessible"
  
  [Fix]
  * Fixed by not turning off power resources in unknown state
  * Fix was introduced by commit:
-   bc2836859643 ACPI: PM: Do not turn off power resources in unknown state
+   bc2836859643 ACPI: PM: Do not turn off power resources in unknown state
+ * Ubuntu kernels starting with 5.15 (Jammy) not affected, as they contain the 
fix above
  
  

[Bug 1964512] Re: Low RX performance for 40G Solarflare NICs

2022-04-11 Thread Heitor Alves de Siqueira
In addition to my own validations above, impacted users that have 40G
NICs have also confirmed the patch behaves as expected without major
regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964512

Title:
  Low RX performance for 40G Solarflare NICs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1964512/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964512] Re: Low RX performance for 40G Solarflare NICs

2022-04-11 Thread Heitor Alves de Siqueira
Validated for Ubuntu Impish with the current kernel from impish-proposed.
Tested on a 10G NIC that's affected by this patch (device ID 0x0903). iperf3 
shows that we're able to almost saturate the NIC successfully in both standard 
and reverse sender mode:

[ ID] Interval   Transfer Bitrate Retr
[  5]   0.00-10.00  sec  10.1 GBytes  8.69 Gbits/sec  990 sender
[  5]   0.00-9.99   sec  10.1 GBytes  8.69 Gbits/sec  receiver

[ ID] Interval   Transfer Bitrate Retr
[  5]   0.00-10.00  sec  10.8 GBytes  9.30 Gbits/sec  155 sender
[  5]   0.00-10.00  sec  10.8 GBytes  9.30 Gbits/sec  receiver

ubuntu@duduo:~$ uname -rv
5.13.0-40-generic #45-Ubuntu SMP Tue Mar 29 14:48:14 UTC 2022

Other basic smoke testing confirms no major regressions.


** Tags removed: verification-needed-impish
** Tags added: verification-done-impish

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964512

Title:
  Low RX performance for 40G Solarflare NICs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1964512/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964512] Re: Low RX performance for 40G Solarflare NICs

2022-04-11 Thread Heitor Alves de Siqueira
Validated for Ubuntu Bionic with the current HWE kernel from bionic-proposed.
Tested on a 10G NIC that's affected by this patch (device ID 0x0903). iperf3 
shows that we're able to almost saturate the NIC successfully in both standard 
and reverse sender mode:

[ ID] Interval   Transfer Bitrate Retr
[  5]   0.00-10.00  sec  10.2 GBytes  8.80 Gbits/sec  376 sender
[  5]   0.00-10.00  sec  10.2 GBytes  8.80 Gbits/sec  receiver

[ ID] Interval   Transfer Bitrate Retr
[  5]   0.00-10.00  sec  10.9 GBytes  9.39 Gbits/sec0 sender
[  5]   0.00-10.00  sec  10.9 GBytes  9.38 Gbits/sec  receiver

ubuntu@duduo:~$ uname -rv
5.4.0-108-generic #122~18.04.1-Ubuntu SMP Wed Apr 6 16:57:12 UTC 2022

Other basic smoke testing confirms no major regressions.


** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964512

Title:
  Low RX performance for 40G Solarflare NICs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1964512/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964512] Re: Low RX performance for 40G Solarflare NICs

2022-04-11 Thread Heitor Alves de Siqueira
Validated for Ubuntu Focal with the current kernel from focal-proposed.
Tested on a 10G NIC that's affected by this patch (device ID 0x0903). iperf3 
shows that we're able to almost saturate the NIC successfully in both standard 
and reverse sender mode:

[ ID] Interval   Transfer Bitrate Retr
[  5]   0.00-10.00  sec  10.3 GBytes  8.83 Gbits/sec  266 sender
[  5]   0.00-10.00  sec  10.3 GBytes  8.82 Gbits/sec  receiver

[ ID] Interval   Transfer Bitrate Retr
[  5]   0.00-10.00  sec  10.8 GBytes  9.30 Gbits/sec0 sender
[  5]   0.00-10.00  sec  10.8 GBytes  9.30 Gbits/sec  receiver

ubuntu@duduo:~$ uname -rv
5.4.0-109-generic #123-Ubuntu SMP Fri Apr 8 09:10:54 UTC 2022


** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964512

Title:
  Low RX performance for 40G Solarflare NICs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1964512/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1872813] Re: cloud-init fails to detect iSCSI root on focal Oracle instances

2022-04-09 Thread Heitor Alves de Siqueira
** Tags added: sts-sponsor-halves

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872813

Title:
  cloud-init fails to detect iSCSI root on focal Oracle instances

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1872813/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1965325] Re: upstream patch from opendev - double encoding-decoding

2022-04-05 Thread Heitor Alves de Siqueira
** Tags removed: sts-sponsor
** Tags added: sts-sponsor-halves

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965325

Title:
  upstream patch from opendev - double encoding-decoding

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-etcd3gw/+bug/1965325/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1942624] Re: NVME "can't change power state from D3Cold to D0 (config space inaccessible)"

2022-03-23 Thread Heitor Alves de Siqueira
Hi all,

This seems to be related to a regression introduced by the following commit:
* 7e4fdeafa61f ACPI: power: Turn off unused power resources unconditionally

The fix seems to indeed be the commit @sclarkson mentioned:
* bc2836859643 ACPI: PM: Do not turn off power resources in unknown state

Looking at our kernels, it seems the affected version window is between v5.12 
and v5.15. I've tagged the relevant packages in this bug, and have built a set 
of test kernels to validate the fixes. For the 5.13 kernels, we additionally 
require the commit below:
* 9b7ff25d129d ACPI: power: Refine turning off unused power resources

I'd greatly appreciate if anyone affected by this could give these test
kernels a try, as I don't have the appropriate hardware to test it
myself. I've uploaded packages for Focal-HWE/Impish (5.13) and Focal-OEM
(5.14) to a public PPA, but please consider these packages for testing
purposes only. If you can reproduce this bug on a different kernel,
please add a comment and I'll look into backporting the required patches
there as well.

Cheers,
Heitor

[0] https://launchpad.net/~halves/+archive/ubuntu/test-1942624

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942624

Title:
  NVME "can't change power state from D3Cold to D0 (config space
  inaccessible)"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1942624/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1942624] Re: NVME "can't change power state from D3Cold to D0 (config space inaccessible)"

2022-03-21 Thread Heitor Alves de Siqueira
** Changed in: linux (Ubuntu Impish)
   Status: Confirmed => In Progress

** Changed in: linux-oem-5.14 (Ubuntu Focal)
   Status: Confirmed => In Progress

** Changed in: linux-oem-5.14 (Ubuntu)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942624

Title:
  NVME "can't change power state from D3Cold to D0 (config space
  inaccessible)"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1942624/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1942624] Re: NVME "can't change power state from D3Cold to D0 (config space inaccessible)"

2022-03-21 Thread Heitor Alves de Siqueira
** Also affects: linux-oem-5.14 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-oem-5.14 (Ubuntu)
   Status: New => Confirmed

** Also affects: linux (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Also affects: linux-oem-5.14 (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: Confirmed => Fix Released

** Changed in: linux (Ubuntu Impish)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Impish)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Impish)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux-oem-5.14 (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Focal)
   Status: New => Invalid

** Changed in: linux-oem-5.14 (Ubuntu Impish)
   Status: New => Invalid

** Changed in: linux-oem-5.14 (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: linux-oem-5.14 (Ubuntu)
   Importance: Undecided => Medium

** Changed in: linux-oem-5.14 (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: linux-oem-5.14 (Ubuntu)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: linux-oem-5.14 (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Tags added: sts

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942624

Title:
  NVME "can't change power state from D3Cold to D0 (config space
  inaccessible)"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1942624/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964992] Re: ZFS ignores ARC sizes below allmem/32

2022-03-21 Thread Heitor Alves de Siqueira
** Patch added: "lp1964992-focal.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1964992/+attachment/5571326/+files/lp1964992-focal.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964992

Title:
  ZFS ignores ARC sizes below allmem/32

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1964992/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964992] Re: ZFS ignores ARC sizes below allmem/32

2022-03-21 Thread Heitor Alves de Siqueira
This doesn't seem to be reproducible in Bionic, marking it as fixed
accordingly.

** Changed in: zfs-linux (Ubuntu Bionic)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964992

Title:
  ZFS ignores ARC sizes below allmem/32

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1964992/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964992] [NEW] ZFS ignores ARC sizes below allmem/32

2022-03-15 Thread Heitor Alves de Siqueira
Public bug reported:

[Impact]
ZFS ignores tunable "zfs_arc_max" due to it being below allmem/32 threshold. 
This prevents users from properly restraining ARC sizes, and can cause 
increased memory contention in some systems.

[Test Plan]
1. Deploy test system with ZFS storage and 32GB RAM
2. Add ARC tunables to /etc/modprobe.d/99-zfs-arc.conf
   # cat /etc/modprobe.d/99-zfs-arc.conf
   options zfs zfs_arc_min=536870912
   options zfs zfs_arc_max=966367641
3. Reboot system
4. Verify ARC sizes through "arc_summary"
   # arc_summary | grep -A3 "ARC size"
   ARC size (current):   < 0.1 %1.3 MiB
   Target size (adaptive):   100.0 %   15.7 GiB
   Min size (hard limit):  3.2 %  512.0 MiB
   Max size (high water):   31:1   15.7 GiB

For a 32GB test system, we should be able to set max ARC sizes below
1GB.

[Fix]
This has been fixed by upstream commit:
 - 36a6e2335c45 "Don't ignore zfs_arc_max below allmem/32"

The commit has been introduced in upstream zfs-2.0.0, so it's needed for
Bionic and Focal. Releases starting with Impish already have this commit
by default:

$ git describe --contains 36a6e2335c45
zfs-2.0.0-rc1~332
$ rmadison zfs-linux
 zfs-linux | 0.7.5-1ubuntu15| bionic  | source
 zfs-linux | 0.7.5-1ubuntu16.12 | bionic-updates  | source
 zfs-linux | 0.8.3-1ubuntu12| focal   | source
 zfs-linux | 0.8.3-1ubuntu12.9  | focal-security  | source
 zfs-linux | 0.8.3-1ubuntu12.13 | focal-updates   | source
 zfs-linux | 0.8.3-1ubuntu12.14 | focal-proposed  | source
 zfs-linux | 2.0.6-1ubuntu2 | impish  | source
 zfs-linux | 2.0.6-1ubuntu2.1   | impish-updates  | source
 zfs-linux | 2.1.2-1ubuntu3 | jammy   | source

[Regression Potential]
The introduced commit essentially removes the limitation of setting ARC 
tunables below allmem/32, and re-arranges the order of how some of the tunables 
are parsed. Regressions would possibly show up as other tunables being ignored 
or not being set correctly due to parsing errors. We should validate whether 
other ARC related tunables are still being set correctly, and whether ZFS is 
using the set values for the ARC memory thresholds.

** Affects: zfs-linux (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: zfs-linux (Ubuntu Bionic)
     Importance: Medium
 Assignee: Heitor Alves de Siqueira (halves)
 Status: Confirmed

** Affects: zfs-linux (Ubuntu Focal)
     Importance: Medium
 Assignee: Heitor Alves de Siqueira (halves)
 Status: Confirmed


** Tags: sts

** Changed in: zfs-linux (Ubuntu)
   Status: New => Fix Released

** Also affects: zfs-linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: zfs-linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: zfs-linux (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: zfs-linux (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: zfs-linux (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: zfs-linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: zfs-linux (Ubuntu Bionic)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: zfs-linux (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Description changed:

  [Impact]
- ZFS ignores tunable "zfs_arc_max" due to it being below allmem/32
- threshold. This prevents users from properly restraining ARC sizes, and can
- cause increased memory contention in some systems.
+ ZFS ignores tunable "zfs_arc_max" due to it being below allmem/32 threshold. 
This prevents users from properly restraining ARC sizes, and can cause 
increased memory contention in some systems.
  
  [Test Plan]
  1. Deploy test system with ZFS storage and 32GB RAM
  2. Add ARC tunables to /etc/modprobe.d/99-zfs-arc.conf
-# cat /etc/modprobe.d/99-zfs-arc.conf
-options zfs zfs_arc_min=536870912
-options zfs zfs_arc_max=966367641
+    # cat /etc/modprobe.d/99-zfs-arc.conf
+    options zfs zfs_arc_min=536870912
+    options zfs zfs_arc_max=966367641
  3. Reboot system
  4. Verify ARC sizes through "arc_summary"
-# arc_summary | grep -A3 "ARC size"
-ARC size (current):   < 0.1 %1.3 MiB
-Target size (adaptive):   100.0 %   15.7 GiB
-Min size (hard limit):  3.2 %  512.0 MiB
-Max size (high water):   31:1   15.7 GiB
+    # arc_summary | grep -A3 "ARC size"
+    ARC size (current):   < 0.1 %1.3 MiB
+    Target size (adaptive):   100.0 %   15.7 GiB
+    Min size (hard limit):

[Bug 1964512] Re: Low RX performance for 40G Solarflare NICs

2022-03-10 Thread Heitor Alves de Siqueira
** Changed in: linux (Ubuntu Impish)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Impish)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: linux (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: linux (Ubuntu Impish)
   Status: New => In Progress

** Changed in: linux (Ubuntu Jammy)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Focal)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964512

Title:
  Low RX performance for 40G Solarflare NICs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1964512/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1964512] [NEW] Low RX performance for 40G Solarflare NICs

2022-03-10 Thread Heitor Alves de Siqueira
Public bug reported:

[Impact]
* Some 40G Solarflare NICs have low RX performance in some cases, due
  low RX recycle ring size
* RX recycle ring size is either 4096 for IOMMU, 16 for NOIOMMU
* The low fixed sizes can cause a high number of calls to alloc_pages,
  tanking performance for higher link speeds

[Test Plan]
* Users report that iperf3 is sufficient to showcase the bad RX performance
* For some setups, RX performance was around 15Gbps while TX stayed
  consistently above 30Gbps

[Fix]
* This patch sets the RX recycle ring size according to an adapter's
  maximum link speed
* Fix was introduced by commit:
  000fe940e51f "sfc: The size of the RX recycle ring should be more flexible"
* --!-- Commit is from net-next --!--

[Regression Potential]
* Regressions would show primarily as performance issues, as we're
  effectively changing ring sizes for all RX traffic
* It's possible to see increased calls to alloc_pages if ring sizes
  aren't being set correctly
* We should look out for excessive memory usage in the sfc driver due to
  the increased ring sizes

** Affects: linux (Ubuntu)
 Importance: High
 Assignee: Heitor Alves de Siqueira (halves)
 Status: Confirmed

** Affects: linux (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Impish)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Jammy)
 Importance: High
 Assignee: Heitor Alves de Siqueira (halves)
 Status: Confirmed


** Tags: sts

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Jammy)
   Importance: High
 Assignee: Heitor Alves de Siqueira (halves)
   Status: Confirmed

** Also affects: linux (Ubuntu Impish)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964512

Title:
  Low RX performance for 40G Solarflare NICs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1964512/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953610] Re: cnf-update-db creates unreadable database if wrong umask

2022-03-07 Thread Heitor Alves de Siqueira
t
- behaves incorrectly or unexpectedly once the behavior is corrected.
+ In general, regressions due to this bug would continue showing up as file 
access errors, either in automated tooling that currently works around the 
faulty database permissions, or in other packages relying on CNF. 
+ 
+ Admins could be relying on the incorrect behavior for some reason (e.g.
+ security), and some users could have existing automation in place to
+ correct the issue manually. We'd expect the fix to have little impact on
+ such scenarios, and the patches have been tested for these cases.

** Changed in: command-not-found (Ubuntu Bionic)
   Status: Confirmed => In Progress

** Changed in: command-not-found (Ubuntu Impish)
   Status: Confirmed => In Progress

** Changed in: command-not-found (Ubuntu Bionic)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: command-not-found (Ubuntu Focal)
   Status: Confirmed => In Progress

** Changed in: command-not-found (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: command-not-found (Ubuntu Impish)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953610

Title:
  cnf-update-db creates unreadable database if wrong umask

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/command-not-found/+bug/1953610/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953610] Re: cnf-update-db creates unreadable database if wrong umask

2022-03-07 Thread Heitor Alves de Siqueira
** Tags added: sts

** Changed in: command-not-found (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: command-not-found (Ubuntu Impish)
   Importance: Undecided => Medium

** Changed in: command-not-found (Ubuntu Focal)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953610

Title:
  cnf-update-db creates unreadable database if wrong umask

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/command-not-found/+bug/1953610/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1863930] Re: SSH 1.99 clients fail to connect to openssh-server 1:7.6p1-4ubuntu0.3

2022-02-15 Thread Heitor Alves de Siqueira
Validated according to test case from description:

root@bionic-ssh:~# python3 test_bug_1863930.py localhost
Server is patched
root@bionic-ssh:~# dpkg -l | grep openssh
ii  openssh-client   1:7.6p1-4ubuntu0.6  amd64  
  secure shell (SSH) client, for secure access to remote machines
ii  openssh-server   1:7.6p1-4ubuntu0.6  amd64  
  secure shell (SSH) server, for secure access from remote machines
ii  openssh-sftp-server  1:7.6p1-4ubuntu0.6  amd64  
  secure shell (SSH) sftp server module, for SFTP access from remote 
machines

Given we have an ACK from both Server and Security and this is affecting
multiple users, I'll remove the blocked tag as well.

** Tags removed: block-proposed-bionic verification-needed 
verification-needed-bionic
** Tags added: verification-done verification-done-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863930

Title:
  SSH 1.99 clients fail to connect to openssh-server 1:7.6p1-4ubuntu0.3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1863930/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1953610] Re: cnf-update-db creates unreadable database if wrong umask

2022-02-08 Thread Heitor Alves de Siqueira
** Tags removed: sts-sponsor
** Tags added: sts-sponsor-halves

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953610

Title:
  cnf-update-db creates unreadable database if wrong umask

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/command-not-found/+bug/1953610/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1863930] Re: SSH 1.99 clients fail to connect to openssh-server 1:7.6p1-4ubuntu0.3

2022-02-02 Thread Heitor Alves de Siqueira
** Changed in: openssh (Ubuntu Bionic)
   Status: Incomplete => In Progress

** Tags added: sts sts-sponsor-halves

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863930

Title:
  SSH 1.99 clients fail to connect to openssh-server 1:7.6p1-4ubuntu0.3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1863930/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1863930] Re: SSH 1.99 clients fail to connect to openssh-server 1:7.6p1-4ubuntu0.3

2022-01-27 Thread Heitor Alves de Siqueira
** Changed in: openssh (Ubuntu Bionic)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: openssh (Ubuntu Bionic)
   Importance: Low => High

** Changed in: openssh (Ubuntu Bionic)
   Importance: High => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863930

Title:
  SSH 1.99 clients fail to connect to openssh-server 1:7.6p1-4ubuntu0.3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1863930/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956849] Re: Almost all USB ports suddenly stopped working; unbootable

2022-01-09 Thread Heitor Alves de Siqueira
@dgatwood would you be able to upload kernel logs and lsusb output from
the -44 kernel? From what you're describing it seems like a possible
issue with host controllers, but it's hard to tell without looking at
what is going in the kernel.

You can use `apport-collect 1956849` to upload relevant data directly to
this LP bug.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956849

Title:
  Almost all USB ports suddenly stopped working; unbootable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1956849/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1955129] Re: trace-cmd report buffer overflow detected

2021-12-18 Thread Heitor Alves de Siqueira
@joalif thank you for the debdiff! There are some minor nitpicks about
the patch file that I'd like to confirm with you:

- The 'Origin:' tag in your patch file seems to be missing the patch 
identifier. From the commit id, would it be appropriate to point it towards [0]?
- I've seen you added a line that says "Backported from upstream commit 
". If this required changes, please adjust the 'Origin:' tag with a 
"backport" prefix instead of "upstream" (you could then omit that additional 
line)

[0] https://git.kernel.org/pub/scm/utils/trace-cmd/trace-
cmd.git/commit/?id=1375d98d8017

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955129

Title:
  trace-cmd report buffer overflow detected

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/trace-cmd/+bug/1955129/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1955129] Re: trace-cmd report buffer overflow detected

2021-12-17 Thread Heitor Alves de Siqueira
** Tags added: sts-sponsor-halves

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955129

Title:
  trace-cmd report buffer overflow detected

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/trace-cmd/+bug/1955129/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-12-15 Thread Heitor Alves de Siqueira
Validated glibc from -proposed according to test case from description:

halves@focal-proposed:~$ grep -m1 "model name" /proc/cpuinfo
model name  : AMD Ryzen 7 3700X 8-Core Processor
halves@focal-proposed:~$ ./test_memcpy64 32
32 MB = 1.340379 ms
-Compare match (should be zero):  0

halves@focal-proposed:~$ dpkg -l | rg libc-bin
ii  libc-bin 2.31-0ubuntu9.4   
amd64GNU C Library: Binaries


I've also checked benchmark results on an Intel system, and no performance 
regressions have been observed there either:
root@halves-focal-glibc-xeon:~# grep -m1 "model name" /proc/cpuinfo
model name  : Intel(R) Xeon(R) CPU E5-2683 v3 @ 2.00GHz
root@halves-focal-glibc-xeon:~# ./test_memcpy64 32
32 MB = 2.167214 ms
-Compare match (should be zero):  0

root@halves-focal-glibc-xeon:~# dpkg -l | rg libc-bin
ii  libc-bin 2.31-0ubuntu9.4   
amd64GNU C Library: Binaries

** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1800544] Re: nvme-cli drops bash completion file in wrong location

2021-12-01 Thread Heitor Alves de Siqueira
Validated package from -proposed according to test case from
description. Tab completion works correctly, and the bash completion
script is found under the correct location:

$ dpkg -l | grep nvme-cli
ii  nvme-cli 1.5-1ubuntu1.2  amd64  
  userspace tooling to control NVMe drives

$ nvme 
admin-passthru   delete-nsflushget-ns-idio-passthru 
 memblaze resv-report  smart-log-add
attach-nsdetach-nsformat   get_feature  list
 read security-recvsubsystem-reset
compare  disconnect   fw-activate  help list-ctrl   
 resetsecurity-sendversion
connect  discover fw-download  id-ctrl  list-ns 
 resv-acquire set-feature  write
connect-all  dsm  fw-log   id-nslist-subsys 
 resv-registershow-regswrite-uncor
create-nserror-logget-log  intellnvm
 resv-release smart-logwrite-zeroes

$ file /usr/share/bash-completion/completions/nvme
/usr/share/bash-completion/completions/nvme: ASCII text


** Tags removed: verification-needed verification-needed-bionic
** Tags added: verification-done verification-done-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1800544

Title:
  nvme-cli drops bash completion file in wrong location

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvme-cli/+bug/1800544/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-11-26 Thread Heitor Alves de Siqueira
It's been some time since the original benchmarks, so I'm repeating the
test from the description. I haven't used hyperfine for the comparisons
below, so they won't have the same statistical reliability but should
nevertheless be sufficient for validation.

Binaries have been compiled as below:
$ gcc -mtune=generic -march=x86-64 -g -O3 test_memcpy.c -o test_memcpy64

 AMD 
$ grep -m1 "model name" /proc/cpuinfo
model name  : AMD Ryzen 7 3700X 8-Core Processor

$ dpkg -l | grep -m1 libc6
ii  libc6:amd64  2.31-0ubuntu9.2   
amd64GNU C Library: Shared libraries
$ ./test_memcpy64 32
32 MB = 2.506206 ms
-Compare match (should be zero):  0

$ dpkg -l | grep -m1 libc6
ii  libc6:amd64  2.31-0ubuntu9.4~20210524ppa1  
amd64GNU C Library: Shared libraries
$ ./test_memcpy64 32
32 MB = 1.384115 ms
-Compare match (should be zero):  0

So, for AMD it's a very noticeable improvement (1.38ms vs 2.51ms).

 Intel 
$ grep -m1 "model name" /proc/cpuinfo
model name  : Intel(R) Xeon(R) CPU E5-2683 v3 @ 2.00GHz

$ dpkg -l | grep -m1 libc6
ii  libc6:amd64  2.31-0ubuntu9.2   
amd64GNU C Library: Shared libraries
$ ./test_memcpy64 32
32 MB = 2.304554 ms
-Compare match (should be zero):  0

$ dpkg -l | grep -m1 libc6
ii  libc6:amd64  2.31-0ubuntu9.4~20210524ppa1  
amd64GNU C Library: Shared libraries
$ ./test_memcpy64 32
32 MB = 2.209747 ms
-Compare match (should be zero):  0

For Intel the difference isn't very significant, but there are also no
performance regressions (2.30ms vs 2.21ms).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1800544] Re: nvme-cli drops bash completion file in wrong location

2021-11-24 Thread Heitor Alves de Siqueira
** Tags removed: sts-sponsor-volunteer
** Tags added: sts-sponsor-halves

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1800544

Title:
  nvme-cli drops bash completion file in wrong location

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvme-cli/+bug/1800544/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1800544] Re: nvme-cli drops bash completion file in wrong location

2021-11-24 Thread Heitor Alves de Siqueira
** Changed in: nvme-cli (Ubuntu Bionic)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: nvme-cli (Ubuntu Bionic)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1800544

Title:
  nvme-cli drops bash completion file in wrong location

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvme-cli/+bug/1800544/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1948862] Re: KVM emulation failure when booting into VM crash kernel with multiple CPUs

2021-11-12 Thread Heitor Alves de Siqueira
Verified for Focal according to test case from description. A standard
multipass VM with 8 vCPUs configured was able to capture a kernel dump
without errors.

Additionally, since the 5.4 kernel doesn't hit the MMU/reset bug
directly, I've done some additional testing to ensure we didn't
introduce any weird regressions. These scenarios included:

- default crash kernel config
- nested VM crash kernel with multiple CPUs
- nested VM crash kernel with default config
- basic smoke testing of VM up/down through virsh
- basic smoke testing of reboots from within the VM

All of these behaved as expected and showed no issues.

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948862

Title:
  KVM emulation failure when booting into  VM crash kernel with multiple
  CPUs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1948862/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1948862] Re: KVM emulation failure when booting into VM crash kernel with multiple CPUs

2021-10-27 Thread Heitor Alves de Siqueira
For future reference, this bug has been reported in Ubuntu KVM hosts
outside of the specific kdump test scenario (i.e. when running actual
VMs in production-like setups). The "kdump with multiple CPUs" case was
discovered as an alternative that hits the same MMU context bug, without
needing complex hypervisor setups or fancy configuration.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948862

Title:
  KVM emulation failure when booting into  VM crash kernel with multiple
  CPUs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1948862/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1948862] Re: KVM emulation failure when booting into VM crash kernel with multiple CPUs

2021-10-27 Thread Heitor Alves de Siqueira
** Changed in: linux (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948862

Title:
  KVM emulation failure when booting into  VM crash kernel with multiple
  CPUs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1948862/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1948862] Re: KVM emulation failure when booting into VM crash kernel with multiple CPUs

2021-10-27 Thread Heitor Alves de Siqueira
** Description changed:

  [Impact]
  When kexec'ing into a crash kernel with ncpus > 1, VMs can raise a KVM 
emulation failure. This will cause the VM to go into the "paused" state, and 
prevents it from being restored without a full VM restart.
  
  This happens only when there are multiple enabled CPUs in the crash
  kernel command-line, regardless of whether `nr_cpus` or `maxcpus` is
  being used. Due to the vCPU MMU state not being cleaned up correctly,
  the secondary CPUs try to access virtual addresses with a faulty MMU
  context that will result in the emulation failure. This shows up with a
  similar spew as below:
  
  $ sudo tail -n20 /var/log/libvirt/qemu/focal-vm.log
  KVM internal error. Suberror: 1
  emulation failure
  EAX=de8f EBX= ECX=008f EDX=0600
  ESI= EDI= EBP= ESP=f90c
  EIP=cdb1 EFL=0002 [---] CPL=0 II=0 A20=1 SMM=0 HLT=0
  ES =   9300
  CS =f000 000f  9b00
  SS =de00 000de000  9300
  DS =de00 000de000  9300
  FS =   9300
  GS =   9300
  LDT=   8200
  TR =   8b00
  GDT=  
  IDT=  
  CR0=6010 CR2= CR3=290b8001 CR4=
  DR0= DR1= DR2= 
DR3=
  DR6=0ff0 DR7=0400
  EFER=
  Code=66 83 c4 28 66 5b 66 c3 66 56 66 53 66 52 b1 8f 88 c8 e6 70  71 66 
0f b6 f0 66 89 f2 67 88 54 24 03 88 c8 e6 70 66 31 db 88 d8 e6 71 66 56 66 68 1a
  
  [Test Plan]
  1. Boot an Ubuntu guest VM with e.g. multipass:
  $ multipass launch daily:focal -c8 -m16g -n focal-vm
  
  2. Configure guest crash kernel command-line with `nr_cpus=8`:
  ubuntu@focal-vm:~$ grep CMDLINE_APPEND /etc/default/kdump-tools
  # KDUMP_CMDLINE_APPEND - Additional arguments to append to the command line
  KDUMP_CMDLINE_APPEND="reset_devices systemd.unit=kdump-tools-dump.service 
nr_cpus=8 irqpoll nousb ata_piix.prefer_ms_hyperv=0"
  
  3. Crash guest VM and watch for the KVM emulation failure:
  ubuntu@focal-vm:~$ echo c | sudo tee /proc/sysrq-trigger
  
  [Where problems could occur]
  As we're resetting MMU context on vCPUs, potential regressions would show up 
in workloads relying on KVM guests. We should properly test the scenario 
mentioned in the bug to make sure secondary CPUs are being cleaned up properly, 
and that no other regressions have been introduced when rebooting or kexec'ing 
into different kernels.
  Since we're adding an MMU reset at kvm_vcpu_reset(), the overall regression 
potential should be fairly low and contained to starting/resetting vCPUs (i.e. 
VM start and reboot).
  
  [Other info]
  This has been fixed by upstream commit:
-   0aa1837533e5 KVM: x86: Properly reset MMU context at vCPU RESET/INIT
+   0aa1837533e5 KVM: x86: Properly reset MMU context at vCPU RESET/INIT
  
- And the two follow up commits, which revert the vendor-specific resets:
-   5d2d7e41e3b8 KVM: SVM: Drop explicit MMU reset at RESET/INIT
-   61152cd907d5 KVM: VMX: Remove explicit MMU reset in enter_rmode()
+ The commit above has been picked up by stable trees up until 5.11, so it's 
only needed in Bionic and Focal (4.15 and 5.4 kernels). There are also two 
follow up commits, which revert the vendor-specific resets:
+   5d2d7e41e3b8 KVM: SVM: Drop explicit MMU reset at RESET/INIT
+   61152cd907d5 KVM: VMX: Remove explicit MMU reset in enter_rmode()
  
- These commits have been introduced during the upstream 5.14 and 5.15 release 
candidates. They have been picked up by upstream stable up until 5.11, so 
backports are only needed for Bionic and Focal (4.15 and 5.4 kernels).
- $ git describe --contains 0aa1837533e5 5d2d7e41e3b8 61152cd907d5
- v5.14-rc1~166^2~58
- v5.15-rc1~65^2~119
- v5.15-rc1~65^2~120
+ These follow ups have not been picked up in stable trees due to the risk of
+ regressions. According to the original fix, they have been introduced 
primarily to aid bisection in case there are workflows relying on the vendor 
resets. As these are not required for the fix and don't conflict with the 
backport, we should leave them out to prevent potential regressions in the 
older kernels.

** Changed in: linux (Ubuntu)
   Status: Incomplete => Fix Released

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: linux (Ubuntu Focal)
     Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

-- 
You received this bug notification because you are a memb

[Bug 1948862] Re: KVM emulation failure when booting into VM crash kernel with multiple CPUs

2021-10-27 Thread Heitor Alves de Siqueira
** Description changed:

  [Impact]
  When kexec'ing into a crash kernel with ncpus > 1, VMs can raise a KVM 
emulation failure. This will cause the VM to go into the "paused" state, and 
prevents it from being restored without a full VM restart.
  
  This happens only when there are multiple enabled CPUs in the crash
  kernel command-line, regardless of whether `nr_cpus` or `maxcpus` is
  being used. Due to the vCPU MMU state not being cleaned up correctly,
  the secondary CPUs try to access virtual addresses with a faulty MMU
  context that will result in the emulation failure. This shows up with a
  similar spew as below:
  
  $ sudo tail -n20 /var/log/libvirt/qemu/focal-vm.log
  KVM internal error. Suberror: 1
  emulation failure
  EAX=de8f EBX= ECX=008f EDX=0600
  ESI= EDI= EBP= ESP=f90c
  EIP=cdb1 EFL=0002 [---] CPL=0 II=0 A20=1 SMM=0 HLT=0
  ES =   9300
  CS =f000 000f  9b00
  SS =de00 000de000  9300
  DS =de00 000de000  9300
  FS =   9300
  GS =   9300
  LDT=   8200
  TR =   8b00
  GDT=  
  IDT=  
  CR0=6010 CR2= CR3=290b8001 CR4=
  DR0= DR1= DR2= 
DR3=
  DR6=0ff0 DR7=0400
  EFER=
  Code=66 83 c4 28 66 5b 66 c3 66 56 66 53 66 52 b1 8f 88 c8 e6 70  71 66 
0f b6 f0 66 89 f2 67 88 54 24 03 88 c8 e6 70 66 31 db 88 d8 e6 71 66 56 66 68 1a
  
  [Test Plan]
  1. Boot an Ubuntu guest VM with e.g. multipass:
  $ multipass launch daily:focal -c8 -m16g -n focal-vm
  
  2. Configure guest crash kernel command-line with `nr_cpus=8`:
  ubuntu@focal-vm:~$ grep CMDLINE_APPEND /etc/default/kdump-tools
  # KDUMP_CMDLINE_APPEND - Additional arguments to append to the command line
  KDUMP_CMDLINE_APPEND="reset_devices systemd.unit=kdump-tools-dump.service 
nr_cpus=8 irqpoll nousb ata_piix.prefer_ms_hyperv=0"
  
  3. Crash guest VM and watch for the KVM emulation failure:
  ubuntu@focal-vm:~$ echo c | sudo tee /proc/sysrq-trigger
  
  [Where problems could occur]
  As we're resetting MMU context on vCPUs, potential regressions would show up 
in workloads relying on KVM guests. We should properly test the scenario 
mentioned in the bug to make sure secondary CPUs are being cleaned up properly, 
and that no other regressions have been introduced when rebooting or kexec'ing 
into different kernels.
  Since we're adding an MMU reset at kvm_vcpu_reset(), the overall regression 
potential should be fairly low and contained to starting/resetting vCPUs (i.e. 
VM start and reboot).
  
  [Other info]
  This has been fixed by upstream commit:
    0aa1837533e5 KVM: x86: Properly reset MMU context at vCPU RESET/INIT
  
  And the two follow up commits, which revert the vendor-specific resets:
    5d2d7e41e3b8 KVM: SVM: Drop explicit MMU reset at RESET/INIT
    61152cd907d5 KVM: VMX: Remove explicit MMU reset in enter_rmode()
  
- These commits have been introduced during the upstream 5.14 and 5.15 release 
candidates, and as such should be backported to previous supported kernels.
+ These commits have been introduced during the upstream 5.14 and 5.15 release 
candidates. They have been picked up by upstream stable up until 5.11, so 
backports are only needed for Bionic and Focal (4.15 and 5.4 kernels).
  $ git describe --contains 0aa1837533e5 5d2d7e41e3b8 61152cd907d5
  v5.14-rc1~166^2~58
  v5.15-rc1~65^2~119
  v5.15-rc1~65^2~120

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948862

Title:
  KVM emulation failure when booting into  VM crash kernel with multiple
  CPUs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1948862/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1948862] Re: KVM emulation failure when booting into VM crash kernel with multiple CPUs

2021-10-27 Thread Heitor Alves de Siqueira
** Description changed:

  [Impact]
- When kexec'ing into a crash kernel with `ncpus` > 1, VMs can raise a KVM
- emulation failure. This will cause the VM to go into the "paused" state, and
- prevents it from being restored without a full VM restart.
+ When kexec'ing into a crash kernel with ncpus > 1, VMs can raise a KVM 
emulation failure. This will cause the VM to go into the "paused" state, and 
prevents it from being restored without a full VM restart.
  
- This happens only when there are multiple enabled CPUs in the crash kernel
- command-line, regardless of whether `nr_cpus` or `maxcpus` is being used. Due 
to
- the vCPU MMU state not being cleaned up correctly, the secondary CPUs try to
- access virtual addresses with a faulty MMU context that will result in the
- emulation failure. This shows up with a similar spew as below:
+ This happens only when there are multiple enabled CPUs in the crash
+ kernel command-line, regardless of whether `nr_cpus` or `maxcpus` is
+ being used. Due to the vCPU MMU state not being cleaned up correctly,
+ the secondary CPUs try to access virtual addresses with a faulty MMU
+ context that will result in the emulation failure. This shows up with a
+ similar spew as below:
  
  $ sudo tail -n20 /var/log/libvirt/qemu/focal-vm.log
  KVM internal error. Suberror: 1
  emulation failure
  EAX=de8f EBX= ECX=008f EDX=0600
  ESI= EDI= EBP= ESP=f90c
  EIP=cdb1 EFL=0002 [---] CPL=0 II=0 A20=1 SMM=0 HLT=0
  ES =   9300
  CS =f000 000f  9b00
  SS =de00 000de000  9300
  DS =de00 000de000  9300
  FS =   9300
  GS =   9300
  LDT=   8200
  TR =   8b00
  GDT=  
  IDT=  
  CR0=6010 CR2= CR3=290b8001 CR4=
  DR0= DR1= DR2= 
DR3=
  DR6=0ff0 DR7=0400
  EFER=
  Code=66 83 c4 28 66 5b 66 c3 66 56 66 53 66 52 b1 8f 88 c8 e6 70  71 66 
0f b6 f0 66 89 f2 67 88 54 24 03 88 c8 e6 70 66 31 db 88 d8 e6 71 66 56 66 68 1a
  
  [Test Plan]
  1. Boot an Ubuntu guest VM with e.g. multipass:
  $ multipass launch daily:focal -c8 -m16g -n focal-vm
  
  2. Configure guest crash kernel command-line with `nr_cpus=8`:
  ubuntu@focal-vm:~$ grep CMDLINE_APPEND /etc/default/kdump-tools
  # KDUMP_CMDLINE_APPEND - Additional arguments to append to the command line
  KDUMP_CMDLINE_APPEND="reset_devices systemd.unit=kdump-tools-dump.service 
nr_cpus=8 irqpoll nousb ata_piix.prefer_ms_hyperv=0"
  
  3. Crash guest VM and watch for the KVM emulation failure:
  ubuntu@focal-vm:~$ echo c | sudo tee /proc/sysrq-trigger
  
  [Where problems could occur]
- As we're resetting MMU context on vCPUs, potential regressions would show up 
in
- workloads relying on KVM guests. We should properly test the scenario 
mentioned
- in the bug to make sure secondary CPUs are being cleaned up properly, and that
- no other regressions have been introduced when rebooting or kexec'ing into
- different kernels.
- Since we're adding an MMU reset at kvm_vcpu_reset(), the overall regression
- potential should be fairly low and contained to starting/resetting vCPUs
- (i.e. VM start and reboot).
+ As we're resetting MMU context on vCPUs, potential regressions would show up 
in workloads relying on KVM guests. We should properly test the scenario 
mentioned in the bug to make sure secondary CPUs are being cleaned up properly, 
and that no other regressions have been introduced when rebooting or kexec'ing 
into different kernels.
+ Since we're adding an MMU reset at kvm_vcpu_reset(), the overall regression 
potential should be fairly low and contained to starting/resetting vCPUs (i.e. 
VM start and reboot).
  
  [Other info]
  This has been fixed by upstream commit:
-   0aa1837533e5 KVM: x86: Properly reset MMU context at vCPU RESET/INIT
+   0aa1837533e5 KVM: x86: Properly reset MMU context at vCPU RESET/INIT
  
  And the two follow up commits, which revert the vendor-specific resets:
-   5d2d7e41e3b8 KVM: SVM: Drop explicit MMU reset at RESET/INIT
-   61152cd907d5 KVM: VMX: Remove explicit MMU reset in enter_rmode()
+   5d2d7e41e3b8 KVM: SVM: Drop explicit MMU reset at RESET/INIT
+   61152cd907d5 KVM: VMX: Remove explicit MMU reset in enter_rmode()
  
- These commits have been introduced during the upstream 5.14 and 5.15 release
- candidates, and as such should be backported to previous supported kernels.
+ These commits have been introduced during the upstream 5.14 and 5.15 release 
candidates, and as such should be backported to previous supported kernels.
  $ git describe --contains 0aa1837533e5 5d2d7e41e3b8 61152cd907d5
  v5.14-rc1~166^2~58
  v5.15-rc1~65^2~119
  v5.15-rc1~65^2~120

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which 

[Bug 1948862] [NEW] KVM emulation failure when booting into VM crash kernel with multiple CPUs

2021-10-26 Thread Heitor Alves de Siqueira
Public bug reported:

[Impact]
When kexec'ing into a crash kernel with `ncpus` > 1, VMs can raise a KVM
emulation failure. This will cause the VM to go into the "paused" state, and
prevents it from being restored without a full VM restart.

This happens only when there are multiple enabled CPUs in the crash kernel
command-line, regardless of whether `nr_cpus` or `maxcpus` is being used. Due to
the vCPU MMU state not being cleaned up correctly, the secondary CPUs try to
access virtual addresses with a faulty MMU context that will result in the
emulation failure. This shows up with a similar spew as below:

$ sudo tail -n20 /var/log/libvirt/qemu/focal-vm.log
KVM internal error. Suberror: 1
emulation failure
EAX=de8f EBX= ECX=008f EDX=0600
ESI= EDI= EBP= ESP=f90c
EIP=cdb1 EFL=0002 [---] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =   9300
CS =f000 000f  9b00
SS =de00 000de000  9300
DS =de00 000de000  9300
FS =   9300
GS =   9300
LDT=   8200
TR =   8b00
GDT=  
IDT=  
CR0=6010 CR2= CR3=290b8001 CR4=
DR0= DR1= DR2= 
DR3=
DR6=0ff0 DR7=0400
EFER=
Code=66 83 c4 28 66 5b 66 c3 66 56 66 53 66 52 b1 8f 88 c8 e6 70  71 66 0f 
b6 f0 66 89 f2 67 88 54 24 03 88 c8 e6 70 66 31 db 88 d8 e6 71 66 56 66 68 1a

[Test Plan]
1. Boot an Ubuntu guest VM with e.g. multipass:
$ multipass launch daily:focal -c8 -m16g -n focal-vm

2. Configure guest crash kernel command-line with `nr_cpus=8`:
ubuntu@focal-vm:~$ grep CMDLINE_APPEND /etc/default/kdump-tools
# KDUMP_CMDLINE_APPEND - Additional arguments to append to the command line
KDUMP_CMDLINE_APPEND="reset_devices systemd.unit=kdump-tools-dump.service 
nr_cpus=8 irqpoll nousb ata_piix.prefer_ms_hyperv=0"

3. Crash guest VM and watch for the KVM emulation failure:
ubuntu@focal-vm:~$ echo c | sudo tee /proc/sysrq-trigger

[Where problems could occur]
As we're resetting MMU context on vCPUs, potential regressions would show up in
workloads relying on KVM guests. We should properly test the scenario mentioned
in the bug to make sure secondary CPUs are being cleaned up properly, and that
no other regressions have been introduced when rebooting or kexec'ing into
different kernels.
Since we're adding an MMU reset at kvm_vcpu_reset(), the overall regression
potential should be fairly low and contained to starting/resetting vCPUs
(i.e. VM start and reboot).

[Other info]
This has been fixed by upstream commit:
  0aa1837533e5 KVM: x86: Properly reset MMU context at vCPU RESET/INIT

And the two follow up commits, which revert the vendor-specific resets:
  5d2d7e41e3b8 KVM: SVM: Drop explicit MMU reset at RESET/INIT
  61152cd907d5 KVM: VMX: Remove explicit MMU reset in enter_rmode()

These commits have been introduced during the upstream 5.14 and 5.15 release
candidates, and as such should be backported to previous supported kernels.
$ git describe --contains 0aa1837533e5 5d2d7e41e3b8 61152cd907d5
v5.14-rc1~166^2~58
v5.15-rc1~65^2~119
v5.15-rc1~65^2~120

** Affects: linux (Ubuntu)
 Importance: High
 Assignee: Heitor Alves de Siqueira (halves)
 Status: New


** Tags: sts

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948862

Title:
  KVM emulation failure when booting into  VM crash kernel with multiple
  CPUs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1948862/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875577] Re: Encrypted swap won't load on 20.04 with zfs root

2021-08-02 Thread Heitor Alves de Siqueira
Validated with ZFS from focal-proposed, according to test case from description:
ubuntu@z-rotomvm34:~$ dpkg -l | grep zfsutils
ii  zfsutils-linux   0.8.3-1ubuntu12.12
amd64command-line tools to manage OpenZFS filesystems
ubuntu@z-rotomvm34:~$ zfs list
NAME USED  AVAIL REFER  MOUNTPOINT
rpool   2.50G  25.6G  176K  /
rpool/ROOT  2.50G  25.6G  176K  none
rpool/ROOT/zfsroot  2.50G  25.6G 2.50G  /
ubuntu@z-rotomvm34:~$ sudo journalctl -b | grep -i ordering
ubuntu@z-rotomvm34:~$ lsblk -e 7
NAMEMAJ:MIN RM  SIZE RO TYPE  MOUNTPOINT
vda 252:00   30G  0 disk
├─vda1  252:10  512M  0 part  /boot/efi
└─vda2  252:20 29.5G  0 part
nvme0n1 259:00  9.8G  0 disk
└─nvme0n1p1 259:10  9.8G  0 part
  └─swap253:00  9.8G  0 crypt [SWAP]

In addition to the test above, I've also tested the configurations
suggested in the [Test Plan] section. Besides validating the ordering
bug, I've also done basic smoke tests and verified that the ZFS pools
are working as expected.

- Encrypted rootfs on LVM + separate ZFS partitions:
ubuntu@ubuntu-focal:~$ zfs list
NAME   USED  AVAIL REFER  MOUNTPOINT
zfspool492K  4.36G   96K  /mnt/zfspool
zfspool/tank96K  4.36G   96K  /mnt/zfspool/tank
ubuntu@ubuntu-focal:~$ dpkg -l | grep zfsutils
ii  zfsutils-linux   0.8.3-1ubuntu12.12
amd64command-line tools to manage OpenZFS filesystems
ubuntu@ubuntu-focal:~$ zfs list
NAME   USED  AVAIL REFER  MOUNTPOINT
zfspool492K  4.36G   96K  /mnt/zfspool
zfspool/tank96K  4.36G   96K  /mnt/zfspool/tank
ubuntu@ubuntu-focal:~$ sudo journalctl -b | grep -i ordering
ubuntu@ubuntu-focal:~$ lsblk -e7
NAME MAJ:MIN RM  SIZE RO TYPE  MOUNTPOINT
sr0   11:01 1024M  0 rom
vda  252:00   30G  0 disk
├─vda1   252:10  512M  0 part  /boot/efi
├─vda2   252:201K  0 part
├─vda5   252:50  731M  0 part  /boot
└─vda6   252:60 28.8G  0 part
  └─vda6_crypt   253:00 28.8G  0 crypt
├─vgubuntu--focal-root   253:10 27.8G  0 lvm   /
└─vgubuntu--focal-swap_1 253:20  980M  0 lvm   [SWAP]
vdb  252:16   05G  0 disk
├─vdb1   252:17   05G  0 part
└─vdb9   252:25   08M  0 part

- ZFS on LUKS
ubuntu@z-rotomvm33:~$ dpkg -l | grep zfsutils
ii  zfsutils-linux   0.8.3-1ubuntu12.12
amd64command-line tools to manage OpenZFS filesystems
ubuntu@z-rotomvm33:~$ zfs list
NAME   USED  AVAIL REFER  MOUNTPOINT
zfspool612K  9.20G   96K  /mnt/zfspool
zfspool/tank96K  9.20G   96K  /mnt/zfspool/tank
ubuntu@z-rotomvm33:~$ sudo journalctl -b | grep -i ordering
ubuntu@z-rotomvm33:~$ lsblk -e7
NAMEMAJ:MIN RM  SIZE RO TYPE  MOUNTPOINT
vda 252:00   30G  0 disk
├─vda1  252:10  512M  0 part  /boot/efi
└─vda2  252:20 29.5G  0 part  /
nvme0n1 259:00  9.8G  0 disk
└─nvme0n1p1 259:10  9.8G  0 part
  └─zfspool 253:00  9.8G  0 crypt
ubuntu@z-rotomvm33:~$ cat /etc/crypttab
# 
zfspool /dev/nvme0n1p1 /etc/keyfile luks

- ZFS on dm-raid
ubuntu@z-rotomvm33:~$ dpkg -l | grep zfsutils
ii  zfsutils-linux   0.8.3-1ubuntu12.12
amd64command-line tools to manage OpenZFS filesystems
ubuntu@z-rotomvm33:~$ zfs list
NAME   USED  AVAIL REFER  MOUNTPOINT
zfspool612K  9.20G   96K  /mnt/zfspool
zfspool/tank96K  9.20G   96K  /mnt/zfspool/tank
ubuntu@z-rotomvm33:~$ sudo journalctl -b | grep -i ordering
ubuntu@z-rotomvm33:~$ lsblk -e7
NAMEMAJ:MIN RM  SIZE RO TYPE  MOUNTPOINT
vda 252:00   30G  0 disk
├─vda1  252:10  512M  0 part  /boot/efi
└─vda2  252:20 29.5G  0 part  /
nvme0n1 259:00  9.8G  0 disk
└─md127   9:127  0  9.8G  0 raid0
  ├─md127p1 259:10  9.8G  0 part
  └─md127p9 259:208M  0 part


** Tags added: verification-done verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875577

Title:
  Encrypted swap won't load on 20.04 with zfs root

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1875577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-07-28 Thread Heitor Alves de Siqueira
Verified Hirsute according to test case from description:

root@h-sos:~# dpkg -l | grep sos
ii  sosreport   4.1-1ubuntu1.2  
 amd64Set of tools to gather troubleshooting 
data from a system
root@h-sos:~# lsmod | grep -i devlink
root@h-sos:~# sos report -o networking
[...]
root@h-sos:~# lsmod | grep -i devlink
root@h-sos:~#

** Tags removed: verification-needed verification-needed-hirsute
** Tags added: verification-done verification-done-hirsute

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-07-28 Thread Heitor Alves de Siqueira
Verified Focal according to test case from description:

root@f-sos:~# dpkg -l | grep sosreport
ii  sosreport  4.1-1ubuntu0.20.04.3  amd64  
  Set of tools to gather troubleshooting data from a system
root@f-sos:~# lsmod | grep -i devlink
root@f-sos:~# sos report -o networking
[...]
root@f-sos:~# lsmod | grep -i devlink
root@f-sos:~#

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-07-28 Thread Heitor Alves de Siqueira
Verified Bionic according to test case from description:

root@b-sos:~# dpkg -l | grep sosreport
ii  sosreport4.1-1ubuntu0.18.04.3   
 amd64Set of tools to gather troubleshooting data from a system
root@b-sos:~# lsmod | grep -i devlink
root@b-sos:~# sos report -o networking
[...]
root@b-sos:~# lsmod | grep -i devlink
root@b-sos:~#

** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875577] Re: Encrypted swap won't load on 20.04 with zfs root

2021-07-14 Thread Heitor Alves de Siqueira
** Description changed:

  [Impact]
  Encrypted swap partitions may not load correctly with ZFS root, due to 
ordering cycle on zfs-mount.service.
  
  [Test Plan]
  1. Install Ubuntu 20.04 using ZFS-on-root
  2. Add encrypted partition to /etc/crypttab:
-swap/dev/nvme0n1p1  /dev/urandom
swap,cipher=aes-xts-plain64,size=256
+    swap/dev/nvme0n1p1  /dev/urandom
swap,cipher=aes-xts-plain64,size=256
  3. Add swap partition to /etc/fstab:
-/dev/mapper/swapnoneswapsw  0 0
+    /dev/mapper/swapnoneswapsw  0 0
  4. Reboot and check whether swap has loaded correctly, and whether boot logs 
show ordering cycle:
  [6.638228] systemd[1]: systemd-random-seed.service: Found ordering cycle 
on zfs-mount.service/start
  [6.639418] systemd[1]: systemd-random-seed.service: Found dependency on 
zfs-import.target/start
  [6.640474] systemd[1]: systemd-random-seed.service: Found dependency on 
zfs-import-cache.service/start
  [6.641637] systemd[1]: systemd-random-seed.service: Found dependency on 
cryptsetup.target/start
  [6.642734] systemd[1]: systemd-random-seed.service: Found dependency on 
systemd-cryptsetup@swap.service/start
  [6.643951] systemd[1]: systemd-random-seed.service: Found dependency on 
systemd-random-seed.service/start
  [6.645098] systemd[1]: systemd-random-seed.service: Job 
zfs-mount.service/start deleted to break ordering cycle starting with 
systemd-random-seed.service/start
  [ SKIP ] Ordering cycle found, skipping Mount ZFS filesystems
  
  [Where problems could occur]
  Since we're changing the zfs-mount-generator service, regressions could show 
up during mounting of ZFS partitions. We should thoroughly test different 
scenarios of ZFS such as ZFS-on-root, separate ZFS partitions and the presence 
of swap, to make sure all partitions are mounted correctly and no ordering 
cycles are present.
  
+ Below is a list of suggested test scenarios that we should check for 
regressions:
+ 1. ZFS-on-root + encrypted swap (see "Test Plan" section above)
+ 2. Encrypted root + separate ZFS partitions
+ 3. ZFS on LUKS
+ 4. ZFS on dm-raid
+ 
+ Although scenario 4 is usually advised against (ZFS itself should handle
+ RAID), it's a good smoke test to validate that mount order is being
+ handled correctly.
+ 
  [Other Info]
  This has been fixed upstream by the following commits:
  * ec41cafee1da Fix a dependency loop [0]
  * 62663fb7ec19 Fix another dependency loop [1]
  
  The patches above have been introduced in version 2.1.0, with upstream
  backports to zfs-2.0. In Ubuntu, it's present in Groovy and later
  releases, so it's still needed in Focal.
  
  $ rmadison -a source zfs-linux
-  zfs-linux | 0.8.3-1ubuntu12| focal   | source
-  zfs-linux | 0.8.3-1ubuntu12.9  | focal-security  | source
-  zfs-linux | 0.8.3-1ubuntu12.10 | focal-updates   | source
-  zfs-linux | 0.8.4-1ubuntu11| groovy  | source
-  zfs-linux | 0.8.4-1ubuntu11.2  | groovy-updates  | source
-  zfs-linux | 2.0.2-1ubuntu5 | hirsute | source
-  zfs-linux | 2.0.3-8ubuntu5 | impish  | source
+  zfs-linux | 0.8.3-1ubuntu12| focal   | source
+  zfs-linux | 0.8.3-1ubuntu12.9  | focal-security  | source
+  zfs-linux | 0.8.3-1ubuntu12.10 | focal-updates   | source
+  zfs-linux | 0.8.4-1ubuntu11| groovy  | source
+  zfs-linux | 0.8.4-1ubuntu11.2  | groovy-updates  | source
+  zfs-linux | 2.0.2-1ubuntu5 | hirsute | source
+  zfs-linux | 2.0.3-8ubuntu5 | impish  | source
  
  [0] https://github.com/openzfs/zfs/commit/ec41cafee1da
  [1] https://github.com/openzfs/zfs/commit/62663fb7ec19
  
  ORIGINAL DESCRIPTION
  
  
  root@eu1:/var/log# lsb_release -a
  No LSB modules are available.
  Distributor ID:   Ubuntu
  Description:  Ubuntu 20.04 LTS
  Release:  20.04
  Codename: focal
  
  root@eu1:/var/log# apt-cache policy cryptsetup
  cryptsetup:
    Installed: (none)
    Candidate: 2:2.2.2-3ubuntu2
    Version table:
   2:2.2.2-3ubuntu2 500
  500 http://archive.ubuntu.com/ubuntu focal/main amd64 Packages
  
  OTHER BACKGROUND INFO:
  ==
  
  1. machine has 2 drives. each drive is partitioned into 2 partitions,
  zfs and swap
  
  2. Ubuntu 20.04 installed on ZFS root using debootstrap
  (debootstrap_1.0.118ubuntu1_all)
  
  3. The ZFS root pool is a 2 partition mirror (the first partition of
  each disk)
  
  4. /etc/crypttab is set up as follows:
  
  swap  
/dev/disk/by-id/nvme-SAMSUNG_MZVLB1T0HALR-0_S3W6NX0M802914-part2
/dev/urandom   swap,cipher=aes-xts-plain64,size=256
  swap  
/dev/disk/by-id/nvme-SAMSUNG_MZVLB1T0HALR-0_S3W6NX0M802933-part2
/dev/urandom   swap,cipher=aes-xts-plain64,size=256
  
  WHAT I EXPECTED
  ===
  
  I expected machine would reboot and have encrypted swap that used two
  devices under /dev/mapper
  
  WHAT HAPPENED INSTEAD
  

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-07-12 Thread Heitor Alves de Siqueira
** Patch added: "lp1923661-h.debdiff"
   
https://bugs.launchpad.net/ubuntu/focal/+source/sosreport/+bug/1923661/+attachment/5510566/+files/lp1923661-h.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-07-12 Thread Heitor Alves de Siqueira
** Patch added: "lp1923661-g.debdiff"
   
https://bugs.launchpad.net/ubuntu/focal/+source/sosreport/+bug/1923661/+attachment/5510565/+files/lp1923661-g.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-07-12 Thread Heitor Alves de Siqueira
** Patch added: "lp1923661-f.debdiff"
   
https://bugs.launchpad.net/ubuntu/focal/+source/sosreport/+bug/1923661/+attachment/5510564/+files/lp1923661-f.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-07-12 Thread Heitor Alves de Siqueira
** Patch added: "lp1923661-b.debdiff"
   
https://bugs.launchpad.net/ubuntu/focal/+source/sosreport/+bug/1923661/+attachment/5510563/+files/lp1923661-b.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1875577] Re: Encrypted swap won't load on 20.04 with zfs root

2021-07-12 Thread Heitor Alves de Siqueira
** Description changed:

+ [Impact]
+ Encrypted swap partitions may not load correctly with ZFS root, due to 
ordering cycle on zfs-mount.service.
+ 
+ [Test Plan]
+ 1. Install Ubuntu 20.04 using ZFS-on-root
+ 2. Add encrypted partition to /etc/crypttab:
+swap/dev/nvme0n1p1  /dev/urandom
swap,cipher=aes-xts-plain64,size=256
+ 3. Add swap partition to /etc/fstab:
+/dev/mapper/swapnoneswapsw  0 0
+ 4. Reboot and check whether swap has loaded correctly, and whether boot logs 
show ordering cycle:
+ [6.638228] systemd[1]: systemd-random-seed.service: Found ordering cycle 
on zfs-mount.service/start
+ [6.639418] systemd[1]: systemd-random-seed.service: Found dependency on 
zfs-import.target/start
+ [6.640474] systemd[1]: systemd-random-seed.service: Found dependency on 
zfs-import-cache.service/start
+ [6.641637] systemd[1]: systemd-random-seed.service: Found dependency on 
cryptsetup.target/start
+ [6.642734] systemd[1]: systemd-random-seed.service: Found dependency on 
systemd-cryptsetup@swap.service/start
+ [6.643951] systemd[1]: systemd-random-seed.service: Found dependency on 
systemd-random-seed.service/start
+ [6.645098] systemd[1]: systemd-random-seed.service: Job 
zfs-mount.service/start deleted to break ordering cycle starting with 
systemd-random-seed.service/start
+ [ SKIP ] Ordering cycle found, skipping Mount ZFS filesystems
+ 
+ [Where problems could occur]
+ Since we're changing the zfs-mount-generator service, regressions could show 
up during mounting of ZFS partitions. We should thoroughly test different 
scenarios of ZFS such as ZFS-on-root, separate ZFS partitions and the presence 
of swap, to make sure all partitions are mounted correctly and no ordering 
cycles are present.
+ 
+ [Other Info]
+ This has been fixed upstream by the following commits:
+ * ec41cafee1da Fix a dependency loop [0]
+ * 62663fb7ec19 Fix another dependency loop [1]
+ 
+ The patches above have been introduced in version 2.1.0, with upstream
+ backports to zfs-2.0. In Ubuntu, it's present in Groovy and later
+ releases, so it's still needed in Focal.
+ 
+ $ rmadison -a source zfs-linux
+  zfs-linux | 0.8.3-1ubuntu12| focal   | source
+  zfs-linux | 0.8.3-1ubuntu12.9  | focal-security  | source
+  zfs-linux | 0.8.3-1ubuntu12.10 | focal-updates   | source
+  zfs-linux | 0.8.4-1ubuntu11| groovy  | source
+  zfs-linux | 0.8.4-1ubuntu11.2  | groovy-updates  | source
+  zfs-linux | 2.0.2-1ubuntu5 | hirsute | source
+  zfs-linux | 2.0.3-8ubuntu5 | impish  | source
+ 
+ [0] https://github.com/openzfs/zfs/commit/ec41cafee1da
+ [1] https://github.com/openzfs/zfs/commit/62663fb7ec19
+ 
+ ORIGINAL DESCRIPTION
+ 
+ 
  root@eu1:/var/log# lsb_release -a
  No LSB modules are available.
  Distributor ID:   Ubuntu
  Description:  Ubuntu 20.04 LTS
  Release:  20.04
  Codename: focal
  
  root@eu1:/var/log# apt-cache policy cryptsetup
  cryptsetup:
-   Installed: (none)
-   Candidate: 2:2.2.2-3ubuntu2
-   Version table:
-  2:2.2.2-3ubuntu2 500
- 500 http://archive.ubuntu.com/ubuntu focal/main amd64 Packages
+   Installed: (none)
+   Candidate: 2:2.2.2-3ubuntu2
+   Version table:
+  2:2.2.2-3ubuntu2 500
+ 500 http://archive.ubuntu.com/ubuntu focal/main amd64 Packages
  
  OTHER BACKGROUND INFO:
  ==
  
  1. machine has 2 drives. each drive is partitioned into 2 partitions,
  zfs and swap
  
+ 2. Ubuntu 20.04 installed on ZFS root using debootstrap
+ (debootstrap_1.0.118ubuntu1_all)
  
- 2. Ubuntu 20.04 installed on ZFS root using debootstrap 
(debootstrap_1.0.118ubuntu1_all)
- 
- 
- 3. The ZFS root pool is a 2 partition mirror (the first partition of each 
disk)
- 
+ 3. The ZFS root pool is a 2 partition mirror (the first partition of
+ each disk)
  
  4. /etc/crypttab is set up as follows:
  
  swap  
/dev/disk/by-id/nvme-SAMSUNG_MZVLB1T0HALR-0_S3W6NX0M802914-part2
/dev/urandom   swap,cipher=aes-xts-plain64,size=256
  swap  
/dev/disk/by-id/nvme-SAMSUNG_MZVLB1T0HALR-0_S3W6NX0M802933-part2
/dev/urandom   swap,cipher=aes-xts-plain64,size=256
- 
- 
  
  WHAT I EXPECTED
  ===
  
  I expected machine would reboot and have encrypted swap that used two
  devices under /dev/mapper
  
- 
  WHAT HAPPENED INSTEAD
  =
  
- 
- On reboot, swap setup fails with the following messages in /var/log/syslog:
+ On reboot, swap setup fails with the following messages in
+ /var/log/syslog:
  
  Apr 28 17:13:01 eu1 kernel: [5.360793] systemd[1]: cryptsetup.target: 
Found ordering cycle on systemd-cryptsetup@swap.service/start
  Apr 28 17:13:01 eu1 kernel: [5.360795] systemd[1]: cryptsetup.target: 
Found dependency on systemd-random-seed.service/start
  Apr 28 17:13:01 eu1 kernel: [5.360796] systemd[1]: cryptsetup.target: 
Found dependency on zfs-mount.service/start
  Apr 28 17:13:01 eu1 kernel: [5.360797] 

[Bug 1875577] Re: Encrypted swap won't load on 20.04 with zfs root

2021-07-12 Thread Heitor Alves de Siqueira
** Changed in: zfs-linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: zfs-linux (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875577

Title:
  Encrypted swap won't load on 20.04 with zfs root

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1875577/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920047] Re: sanlock global lock creation fail

2021-07-07 Thread Heitor Alves de Siqueira
We've determined this to be due to using disks with mixed sector sizes
(i.e. different physical and logical sector sizes). The mentioned patch
[0] enables lvmlockd to create shared leases in mixed sector sized
disks, but additional support is needed in sanlock for these to work
correctly.

The required sanlock patches are:
* d5e4def0d087 - sanlock: add flags to specify sector size [1]
* 445e86700fa3 - configurable sector size and align size [2]

If we don't have these additional sanlock patches, sanlock isn't able to
find the written leases due to alignment issues and ultimately those are
handled as invalid. Unfortunately, both sanlock patches are extensive
and change a lot of low-level internal structures, so providing them as
SRU updates would be prone to backporting errors and regressions.

Since both lvm2 and sanlock are working as expected with non-mixed
sector sizes, and the current versions actively prevent leases to be
written to mixed sector disks, we can consider that things are working
correctly. Support for mixed sector sizes should be considered a
"feature" instead, which is available starting with the versions below:

- lvm2: 2.03.10
- sanlock: 3.8.0

These versions are available in Ubuntu releases starting with Hirsute,
and have been provided as backports in focal-backports and groovy-
backports. Please refer to bug #1929432 and bug #1928708 for further
details on the -backports versions.

[0] https://sourceware.org/git/?p=lvm2.git;a=commitdiff;h=2d1fe38d84d4
[1] https://pagure.io/sanlock/c/d5e4def0d087
[2] https://pagure.io/sanlock/c/445e86700fa3


** Changed in: lvm2 (Ubuntu Focal)
   Status: Confirmed => Won't Fix

** Changed in: lvm2 (Ubuntu Groovy)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920047

Title:
  sanlock global lock creation fail

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lvm2/+bug/1920047/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927547] Re: seabios missing NMI disable in rtc_mask()

2021-06-18 Thread Heitor Alves de Siqueira
Since we don't have a reliable test procedure for triggering the KVM
emulation failures, I did basic smoke tests on VMs using seabios from
mitaka-proposed. Things look good, and general NMI functionality seems
to be working correctly.

I've also confirmed with affected users that this version has fixed
those specific instances of KVM emulation failures for them, so they
also confirmed the fix is working as intended.


** Tags removed: verification-mitaka-needed
** Tags added: verification-mitaka-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927547

Title:
  seabios missing NMI disable in rtc_mask()

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1927547/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-06-15 Thread Heitor Alves de Siqueira
There's currently a pending SRU for glibc on Groovy, which I based my
debdiff on. Although that SRU has already cleared the 7 day grace
period, there are still a few pending bugs for verification which we
would need to clear before being able to upload a fix for this one.

Since Groovy is going EOL in a couple of weeks, I don't think we should
spend too much effort for that release. Marking as "won't fix"
accordingly.


** Changed in: glibc (Ubuntu Groovy)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-06-10 Thread Heitor Alves de Siqueira
** Description changed:

  [Impact]
  
  sos's networking plugin may trigger the devlink kernel module to load.
  We don't want sos to modify/change/alter the state of a machine
  whatsoever, especially during troubleshooting. But it may be the case
  for the networking plugin, depending on the running kernel
  configuration.
  
  As a side note, this is also causing Bionic autopkgtest to fails as it
  is tested w/ 4.15 series kernel by default. 'simple.sh' (sos testsuite
  part of the autopkgtest) will report a failure as follows:
  
  "new kernel modules loaded during execution"
  
  [Test case]
  
  On a 4.15 kernel (Bionic)
  
  On a bare metal system:
  root@srv:~# lsmod | grep -i devlink
  root@srv:~# sos report -o networking
  root@srv:~# lsmod | grep -i devlink
  devlink 45056 0
  
  Not reproducible on Bionic w/ 5.4 kernel for instance
  
  Reason:
  config-4.15.0-140-generic:CONFIG_MAY_USE_DEVLINK=m
  config-5.4.0-70-generic:CONFIG_NET_DEVLINK=y
  
  CONFIG_MAY_USE_DEVLINK:
  Drivers using the devlink infrastructure should have a dependency on 
MAY_USE_DEVLINK to ensure they do not cause link errors when devlink is a 
loadable module and the driver using it is built-in.
  
  [Where problem could occur]
+ The fix first checks for /sys/class/devlink before adding the devlink 
commands to the networking plugin. If this path changes in future kernels, or 
it becomes possible to collect devlink information without this path being 
present, we'll miss that information in sosreports. It's also possible that in 
future kernels, additional modules get loaded due to the devlink commands, so 
we should also be on the lookout for those changing the system state between 
sos executions.
+ 
+ The above are very unlikely scenarios in any case, and we should get
+ previous notice of such changes. The patchset will also be tested with
+ the now fixed autopkgtests, and that should give a bit more confidence
+ in the fixes.
  
  [Other information]
+ This is fixed by upstream commit:
+ - c90315e23c57 "[networking] check for the presence of devlink"
  
  Upstream issues:
  
https://github.com/sosreport/sos/commit/e7801c5bf50d129f93559f8c459a3c96bba1375e

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-06-10 Thread Heitor Alves de Siqueira
** Description changed:

  [Impact]
  On AMD Zen systems, memcpy() calls see a heavy performance regression in 
Focal and Groovy, due to the way __x86_non_temporal_threshold is calculated.
  
  Before 'glibc-2.33~455', cache values were calculated taking into
  consideration the number of hardware threads in the CPU. On AMD Ryzen
  and EPYC systems, this can be counter-productive if the number of
  threads is high enough for the last-level caches to "overrun" each other
  and cause cache line flushes. The solution is to reduce the allocated
  size for these non_temporal stores, removing the number of threads from
  the equation.
  
  [Test Plan]
  Attached to this bug is a short C program that exercises memcpy() calls in 
buffers of variable length. This has been obtained from a similar bug report 
for Red Hat, and is publicly available at [0].
  This test program was compiled with gcc 10.2.0, using the following flags:
  $ gcc -mtune=generic -march=x86_64 -g -03 test_memcpy.c -o test_memcpy64
  
  Tests were performed with the following criteria:
  - use 32Mb buffers ("./test_memcpy64 32")
  - benchmark with the hyperfine tool [1], as it calculates relevant statistics 
automatically
  - benchmark with at least 10 runs in the same environment, to minimize 
variance
  - measure on AMD Zen (3700X) and on Intel Xeon (E5-2683), to ensure we don't 
penalize one x86 vendor in favor of the other
  
  Below is a comparison between two Focal containers, leveraging LXD to
  make use of different libc versions on the same host:
  
  $ hyperfine -n libc-2.31-0ubuntu9.2 'lxc exec focal ./test_memcpy64 32' -n 
libc-patched 'lxc exec focal-patched ./test_memcpy64 32'
  Benchmark #1: libc-2.31-0ubuntu9.2
    Time (mean ± σ):  2.723 s ±  0.013 s[User: 4.7 ms, System: 5.1 ms]
    Range (min … max):2.693 s …  2.735 s10 runs
  
  Benchmark #2: libc-patched
    Time (mean ± σ):  1.522 s ±  0.004 s[User: 3.9 ms, System: 5.6 ms]
    Range (min … max):1.515 s …  1.528 s10 runs
  
  Summary
    'libc-patched' ran
  1.79 ± 0.01 times faster than 'libc-2.31-0ubuntu9.2'
  $ head -n5 /proc/cpuinfo
  processor   : 0
  vendor_id   : AuthenticAMD
  cpu family  : 23
  model   : 113
  model name  : AMD Ryzen 7 3700X 8-Core Processor
  
  [0] https://bugzilla.redhat.com/show_bug.cgi?id=1880670
  [1] https://github.com/sharkdp/hyperfine/
  
  [Where problems could occur]
  Since we're messing with the cacheinfo for x86 in general, we need to be 
careful not to introduce further performance regressions on memory-heavy 
workloads. Even though initial results might reveal improvement on AMD Ryzen 
and EPYC hardware, we should also validate different configurations (e.g. 
Intel, different buffer sizes, etc) to make sure we won't hurt performance in 
other non-AMD environments.
  
  [Other Info]
- This has been fixed by the following upstream commit:
+ This issue has been fixed by the following upstream commit:
  - d3c57027470b (Reversing calculation of __x86_shared_non_temporal_threshold)
  
  $ git describe --contains d3c57027470b
  glibc-2.33~455
  $ rmadison glibc -s focal,focal-updates,groovy,groovy-proposed,hirsute
   glibc | 2.31-0ubuntu9   | focal   | source
   glibc | 2.31-0ubuntu9.2 | focal-updates   | source
   glibc | 2.32-0ubuntu3   | groovy  | source
   glibc | 2.32-0ubuntu3.2 | groovy-proposed | source
   glibc | 2.33-0ubuntu5   | hirsute | source
  
  Affected releases include Ubuntu Focal and Groovy. Bionic is not
  affected, and releases starting with Hirsute already ship the upstream
  patch to fix this regression.
+ 
+ glibc exports this specific variable as a tunable, so we could also tweak it 
with the GLIBC_TUNABLES env var:
+ $ hyperfine -n clean-env 'lxc exec focal env ./test_memcpy64 32' -n tunables 
'lxc exec focal env 
GLIBC_TUNABLES=glibc.cpu.x86_non_temporal_threshold=1024*1024*3*4 
./test_memcpy64 32'
+ Benchmark #1: clean-env
+   Time (mean ± σ):  2.529 s ±  0.061 s[User: 6.0 ms, System: 4.7 ms]
+   Range (min … max):2.457 s …  2.615 s10 runs
+ 
+ Benchmark #2: tunables
+   Time (mean ± σ):  1.427 s ±  0.030 s[User: 6.5 ms, System: 3.8 ms]
+   Range (min … max):1.402 s …  1.482 s10 runs
+ 
+ Summary
+   'tunables' ran
+ 1.77 ± 0.06 times faster than 'clean-env'
+ 
+ This solution is not ideal, but it offers a secondary way of fixing the
+ performance issues. However, the speed gains for memcpy() are noticeable
+ enough that we should strongly consider changing the defaults in the
+ Focal LTS release, so that it performs similarly to Bionic and future
+ Ubuntu releases starting with Hirsute.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-06-08 Thread Heitor Alves de Siqueira
** Changed in: sosreport (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: sosreport (Ubuntu Groovy)
   Importance: Undecided => Medium

** Changed in: sosreport (Ubuntu Hirsute)
   Importance: Undecided => Medium

** Changed in: sosreport (Ubuntu Focal)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1923661] Re: [sos41][networking] May invoke devlink module when not loaded depending on how the kernel is configured

2021-06-08 Thread Heitor Alves de Siqueira
** Changed in: sosreport (Ubuntu Bionic)
 Assignee: Eric Desrochers (slashd) => Heitor Alves de Siqueira (halves)

** Changed in: sosreport (Ubuntu Focal)
 Assignee: Eric Desrochers (slashd) => Heitor Alves de Siqueira (halves)

** Changed in: sosreport (Ubuntu Groovy)
 Assignee: Eric Desrochers (slashd) => Heitor Alves de Siqueira (halves)

** Changed in: sosreport (Ubuntu Hirsute)
 Assignee: Eric Desrochers (slashd) => Heitor Alves de Siqueira (halves)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923661

Title:
  [sos41][networking] May invoke devlink module when not loaded
  depending on how the kernel is configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1923661/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-06-08 Thread Heitor Alves de Siqueira
** Patch added: "lp1928508-groovy-v2.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+attachment/5503158/+files/lp1928508-groovy-v2.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-06-08 Thread Heitor Alves de Siqueira
** Patch removed: "lp1928508-focal.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+attachment/5502960/+files/lp1928508-focal.debdiff

** Patch removed: "lp1928508-groovy.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+attachment/5502961/+files/lp1928508-groovy.debdiff

** Patch added: "lp1928508-focal-v2.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+attachment/5503157/+files/lp1928508-focal-v2.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-06-07 Thread Heitor Alves de Siqueira
** Patch added: "lp1928508-groovy.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+attachment/5502961/+files/lp1928508-groovy.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-06-07 Thread Heitor Alves de Siqueira
** Patch added: "lp1928508-focal.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+attachment/5502960/+files/lp1928508-focal.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-05-28 Thread Heitor Alves de Siqueira
I've ran the same test on an Intel system, to ensure we aren't
introducing any regressions there. Besides basic smoke tests, the
benchmarks from the description showed that the performance on Intel is
not significantly affected by this patch.

halves@rotom:~$ head -n5 /proc/cpuinfo
processor   : 0
vendor_id   : GenuineIntel
cpu family  : 6
model   : 63
model name  : Intel(R) Xeon(R) CPU E5-2683 v3 @ 2.00GHz

halves@rotom:~$ .cargo/bin/hyperfine -n focal-2.31-0ubuntu9.2 'lxc exec 
halves-focal ./test_memcpy64 32' -n focal-patched 'lxc exec 
halves-focal-patched ./test_memcpy64 32'
Benchmark #1: focal-2.31-0ubuntu9.2
  Time (mean ± σ):  2.662 s ±  0.058 s[User: 53.4 ms, System: 79.6 ms]
  Range (min … max):2.559 s …  2.718 s10 runs

Benchmark #2: focal-patched
  Time (mean ± σ):  2.650 s ±  0.074 s[User: 61.5 ms, System: 76.1 ms]
  Range (min … max):2.558 s …  2.759 s10 runs

Summary
  'focal-patched' ran
1.00 ± 0.04 times faster than 'focal-2.31-0ubuntu9.2'

halves@rotom:~$ .cargo/bin/hyperfine -n groovy-2.32-0ubuntu3 'lxc exec 
halves-groovy ./test_memcpy64 32' -n groovy-patched 'lxc exec 
halves-groovy-patched ./test_memcpy64 32'
Benchmark #1: groovy-2.32-0ubuntu3
  Time (mean ± σ):  2.643 s ±  0.044 s[User: 52.4 ms, System: 76.0 ms]
  Range (min … max):2.575 s …  2.746 s10 runs

Benchmark #2: groovy-patched
  Time (mean ± σ):  2.626 s ±  0.036 s[User: 63.1 ms, System: 79.7 ms]
  Range (min … max):2.590 s …  2.701 s10 runs

Summary
  'groovy-patched' ran
1.01 ± 0.02 times faster than 'groovy-2.32-0ubuntu3'

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-05-28 Thread Heitor Alves de Siqueira
Below is the same benchmark from the case description, validating the
performance regression on Groovy. Patched glibc builds for both Focal
and Groovy amd64/i386 are available at ppa:halves/lp1928508-test [0].

$ hyperfine -n groovy-2.32-0ubuntu3 'lxc exec groovy ./test_memcpy64 32' -n 
groovy-patched 'lxc exec groovy-patched ./test_memcpy64 32'
Benchmark #1: groovy-2.32-0ubuntu3
  Time (mean ± σ):  2.392 s ±  0.039 s[User: 4.8 ms, System: 5.4 ms]
  Range (min … max):2.366 s …  2.494 s10 runs

Benchmark #2: groovy-patched
  Time (mean ± σ):  1.381 s ±  0.010 s[User: 6.1 ms, System: 4.3 ms]
  Range (min … max):1.372 s …  1.407 s10 runs

Summary
  'groovy-patched' ran
1.73 ± 0.03 times faster than 'groovy-2.32-0ubuntu3'

$ head -n5 /proc/cpuinfo
processor   : 0
vendor_id   : AuthenticAMD
cpu family  : 23
model   : 113
model name  : AMD Ryzen 7 3700X 8-Core Processor

[0] https://launchpad.net/~halves/+archive/ubuntu/lp1928508-test

** Changed in: glibc (Ubuntu Focal)
   Status: Confirmed => In Progress

** Changed in: glibc (Ubuntu Groovy)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920047] Re: sanlock global lock creation fail

2021-05-24 Thread Heitor Alves de Siqueira
** Changed in: lvm2 (Ubuntu)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: lvm2 (Ubuntu)
   Importance: Undecided => High

** Changed in: lvm2 (Ubuntu)
   Status: New => Fix Released

** Also affects: lvm2 (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: lvm2 (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Changed in: lvm2 (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: lvm2 (Ubuntu Groovy)
   Status: New => Confirmed

** Changed in: lvm2 (Ubuntu Focal)
   Importance: Undecided => High

** Changed in: lvm2 (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: lvm2 (Ubuntu Groovy)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: lvm2 (Ubuntu Groovy)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920047

Title:
  sanlock global lock creation fail

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lvm2/+bug/1920047/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-05-18 Thread Heitor Alves de Siqueira
** Description changed:

  [Impact]
  On AMD Zen systems, memcpy() calls see a heavy performance regression in 
Focal and Groovy, due to the way __x86_non_temporal_threshold is calculated.
  
- Before 'glibc-2.33~455', cache values were calculated taking into 
consideration the number of hardware threads in the CPU. On AMD Ryzen and EPYC 
systems, this can be counter-productive if the number of threads is high enough 
for the last-level caches to "overrun" each other and cause cache line flushes. 
The solution is to reduce the allocated size for these non_temporal stores, 
removing
- the number of threads from the equation.
+ Before 'glibc-2.33~455', cache values were calculated taking into
+ consideration the number of hardware threads in the CPU. On AMD Ryzen
+ and EPYC systems, this can be counter-productive if the number of
+ threads is high enough for the last-level caches to "overrun" each other
+ and cause cache line flushes. The solution is to reduce the allocated
+ size for these non_temporal stores, removing the number of threads from
+ the equation.
  
  [Test Plan]
  Attached to this bug is a short C program that exercises memcpy() calls in 
buffers of variable length. This has been obtained from a similar bug report 
for Red Hat, and is publicly available at [0].
  This test program was compiled with gcc 10.2.0, using the following flags:
  $ gcc -mtune=generic -march=x86_64 -g -03 test_memcpy.c -o test_memcpy64
  
  Tests were performed with the following criteria:
  - use 32Mb buffers ("./test_memcpy64 32")
  - benchmark with the hyperfine tool [1], as it calculates relevant statistics 
automatically
  - benchmark with at least 10 runs in the same environment, to minimize 
variance
  - measure on AMD Zen (3700X) and on Intel Xeon (E5-2683), to ensure we don't 
penalize one x86 vendor in favor of the other
  
  Below is a comparison between two Focal containers, leveraging LXD to
  make use of different libc versions on the same host:
  
  $ hyperfine -n libc-2.31-0ubuntu9.2 'lxc exec focal ./test_memcpy64 32' -n 
libc-patched 'lxc exec focal-patched ./test_memcpy64 32'
  Benchmark #1: libc-2.31-0ubuntu9.2
    Time (mean ± σ):  2.723 s ±  0.013 s[User: 4.7 ms, System: 5.1 ms]
    Range (min … max):2.693 s …  2.735 s10 runs
  
  Benchmark #2: libc-patched
    Time (mean ± σ):  1.522 s ±  0.004 s[User: 3.9 ms, System: 5.6 ms]
    Range (min … max):1.515 s …  1.528 s10 runs
  
  Summary
    'libc-patched' ran
  1.79 ± 0.01 times faster than 'libc-2.31-0ubuntu9.2'
  $ head -n5 /proc/cpuinfo
  processor   : 0
  vendor_id   : AuthenticAMD
  cpu family  : 23
  model   : 113
  model name  : AMD Ryzen 7 3700X 8-Core Processor
  
  [0] https://bugzilla.redhat.com/show_bug.cgi?id=1880670
  [1] https://github.com/sharkdp/hyperfine/
  
  [Where problems could occur]
  Since we're messing with the cacheinfo for x86 in general, we need to be 
careful not to introduce further performance regressions on memory-heavy 
workloads. Even though initial results might reveal improvement on AMD Ryzen 
and EPYC hardware, we should also validate different configurations (e.g. 
Intel, different buffer sizes, etc) to make sure we won't hurt performance in 
other non-AMD environments.
  
  [Other Info]
  This has been fixed by the following upstream commit:
  - d3c57027470b (Reversing calculation of __x86_shared_non_temporal_threshold)
  
  $ git describe --contains d3c57027470b
  glibc-2.33~455
  $ rmadison glibc -s focal,focal-updates,groovy,groovy-proposed,hirsute
   glibc | 2.31-0ubuntu9   | focal   | source
   glibc | 2.31-0ubuntu9.2 | focal-updates   | source
   glibc | 2.32-0ubuntu3   | groovy  | source
   glibc | 2.32-0ubuntu3.2 | groovy-proposed | source
   glibc | 2.33-0ubuntu5   | hirsute | source
  
  Affected releases include Ubuntu Focal and Groovy. Bionic is not
  affected, and releases starting with Hirsute already ship the upstream
  patch to fix this regression.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] Re: Performance regression on memcpy() calls for AMD Zen

2021-05-14 Thread Heitor Alves de Siqueira
** Attachment added: "test_memcpy.c"
   
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+attachment/5497631/+files/test_memcpy.c

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928508

Title:
  Performance regression on memcpy() calls for AMD Zen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1928508/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1928508] [NEW] Performance regression on memcpy() calls for AMD Zen

2021-05-14 Thread Heitor Alves de Siqueira
Public bug reported:

[Impact]
On AMD Zen systems, memcpy() calls see a heavy performance regression in Focal 
and Groovy, due to the way __x86_non_temporal_threshold is calculated.

Before 'glibc-2.33~455', cache values were calculated taking into consideration 
the number of hardware threads in the CPU. On AMD Ryzen and EPYC systems, this 
can be counter-productive if the number of threads is high enough for the 
last-level caches to "overrun" each other and cause cache line flushes. The 
solution is to reduce the allocated size for these non_temporal stores, removing
the number of threads from the equation.

[Test Plan]
Attached to this bug is a short C program that exercises memcpy() calls in 
buffers of variable length. This has been obtained from a similar bug report 
for Red Hat, and is publicly available at [0].
This test program was compiled with gcc 10.2.0, using the following flags:
$ gcc -mtune=generic -march=x86_64 -g -03 test_memcpy.c -o test_memcpy64

Tests were performed with the following criteria:
- use 32Mb buffers ("./test_memcpy64 32")
- benchmark with the hyperfine tool [1], as it calculates relevant statistics 
automatically
- benchmark with at least 10 runs in the same environment, to minimize variance
- measure on AMD Zen (3700X) and on Intel Xeon (E5-2683), to ensure we don't 
penalize one x86 vendor in favor of the other

Below is a comparison between two Focal containers, leveraging LXD to
make use of different libc versions on the same host:

$ hyperfine -n libc-2.31-0ubuntu9.2 'lxc exec focal ./test_memcpy64 32' -n 
libc-patched 'lxc exec focal-patched ./test_memcpy64 32'
Benchmark #1: libc-2.31-0ubuntu9.2
  Time (mean ± σ):  2.723 s ±  0.013 s[User: 4.7 ms, System: 5.1 ms]
  Range (min … max):2.693 s …  2.735 s10 runs

Benchmark #2: libc-patched
  Time (mean ± σ):  1.522 s ±  0.004 s[User: 3.9 ms, System: 5.6 ms]
  Range (min … max):1.515 s …  1.528 s10 runs

Summary
  'libc-patched' ran
1.79 ± 0.01 times faster than 'libc-2.31-0ubuntu9.2'
$ head -n5 /proc/cpuinfo
processor   : 0
vendor_id   : AuthenticAMD
cpu family  : 23
model   : 113
model name  : AMD Ryzen 7 3700X 8-Core Processor

[0] https://bugzilla.redhat.com/show_bug.cgi?id=1880670
[1] https://github.com/sharkdp/hyperfine/

[Where problems could occur]
Since we're messing with the cacheinfo for x86 in general, we need to be 
careful not to introduce further performance regressions on memory-heavy 
workloads. Even though initial results might reveal improvement on AMD Ryzen 
and EPYC hardware, we should also validate different configurations (e.g. 
Intel, different buffer sizes, etc) to make sure we won't hurt performance in 
other non-AMD environments.

[Other Info]
This has been fixed by the following upstream commit:
- d3c57027470b (Reversing calculation of __x86_shared_non_temporal_threshold)

$ git describe --contains d3c57027470b
glibc-2.33~455
$ rmadison glibc -s focal,focal-updates,groovy,groovy-proposed,hirsute
 glibc | 2.31-0ubuntu9   | focal   | source
 glibc | 2.31-0ubuntu9.2 | focal-updates   | source
 glibc | 2.32-0ubuntu3   | groovy  | source
 glibc | 2.32-0ubuntu3.2 | groovy-proposed | source
 glibc | 2.33-0ubuntu5   | hirsute | source

Affected releases include Ubuntu Focal and Groovy. Bionic is not
affected, and releases starting with Hirsute already ship the upstream
patch to fix this regression.

** Affects: glibc (Ubuntu)
 Importance: High
     Assignee: Heitor Alves de Siqueira (halves)
 Status: Fix Released

** Affects: glibc (Ubuntu Focal)
 Importance: High
     Assignee: Heitor Alves de Siqueira (halves)
 Status: Confirmed

** Affects: glibc (Ubuntu Groovy)
 Importance: High
     Assignee: Heitor Alves de Siqueira (halves)
 Status: Confirmed


** Tags: sts

** Also affects: glibc (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: glibc (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: glibc (Ubuntu Focal)
   Importance: Undecided => High

** Changed in: glibc (Ubuntu Groovy)
   Importance: Undecided => High

** Changed in: glibc (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: glibc (Ubuntu Groovy)
   Status: New => Won't Fix

** Changed in: glibc (Ubuntu Groovy)
   Status: Won't Fix => Confirmed

** Changed in: glibc (Ubuntu)
   Status: New => Fix Released

** Changed in: glibc (Ubuntu Focal)
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: glibc (Ubuntu Groovy)
     Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Description changed:

  [Impact]
  On AMD Zen systems, memcpy() calls see a heavy performance regression in 
Focal and Groovy, due to the way __x86_non_temporal_threshold is calculated.
  
  Before 'glibc-2.33~455', cache values were calculated taking into 
consideration the number of hardwa

[Bug 1927547] Re: seabios missing NMI disable in rtc_mask()

2021-05-13 Thread Heitor Alves de Siqueira
** Also affects: cloud-archive
   Importance: Undecided
   Status: New

** Also affects: cloud-archive/mitaka
   Importance: Undecided
   Status: New

** Changed in: cloud-archive
   Status: New => Fix Released

** Changed in: cloud-archive
   Importance: Undecided => High

** Changed in: cloud-archive/mitaka
   Importance: Undecided => High

** Changed in: cloud-archive/mitaka
   Status: New => Confirmed

** Changed in: cloud-archive/mitaka
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

** Changed in: cloud-archive
 Assignee: (unassigned) => Heitor Alves de Siqueira (halves)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927547

Title:
  seabios missing NMI disable in rtc_mask()

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1927547/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927547] Re: seabios missing NMI disable in rtc_mask()

2021-05-13 Thread Heitor Alves de Siqueira
Fixes are now available under the "ESM Infrastructure Security" PPA for
Trusty and Xenial, according to the versions below:

Trusty -- 1.7.4-4ubuntu1+esm1 
Xenial -- 1.8.2-1ubuntu1+esm1

** Changed in: seabios (Ubuntu Trusty)
   Status: In Progress => Fix Released

** Changed in: seabios (Ubuntu Xenial)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927547

Title:
  seabios missing NMI disable in rtc_mask()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/seabios/+bug/1927547/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1927547] Re: seabios missing NMI disable in rtc_mask()

2021-05-13 Thread Heitor Alves de Siqueira
** Patch added: "lp1927547-xenial.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/seabios/+bug/1927547/+attachment/5497092/+files/lp1927547-xenial.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927547

Title:
  seabios missing NMI disable in rtc_mask()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/seabios/+bug/1927547/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   >