[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-11-30 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-70.113

---
linux (3.13.0-70.113) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1516733

  [ Upstream Kernel Changes ]

  * arm64: errata: use KBUILD_CFLAGS_MODULE for erratum #843419
- LP: #1516682

linux (3.13.0-69.112) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1514858

  [ Joseph Salisbury ]

  * SAUCE: storvsc: use small sg_tablesize on x86
- LP: #1495983

  [ Luis Henriques ]

  * [Config] updateconfigs after 3.13.11-ckt28 and 3.13.11-ckt29 stable
updates

  [ Upstream Kernel Changes ]

  * ext4: fix indirect punch hole corruption
- LP: #1292234
  * x86/hyperv: Mark the Hyper-V TSC as unstable
- LP: #1498206
  * namei: permit linking with CAP_FOWNER in userns
- LP: #1498162
  * iwlwifi: pci: add a few more PCI subvendor IDs for the 7265 series
- LP: #1510616
  * Drivers: hv: vmbus: Increase the limit on the number of pfns we can
handle
- LP: #1495983
  * sctp: fix race on protocol/netns initialization
- LP: #1514832
  * [media] v4l: omap3isp: Fix sub-device power management code
- LP: #1514832
  * [media] rc-core: fix remove uevent generation
- LP: #1514832
  * xtensa: fix threadptr reload on return to userspace
- LP: #1514832
  * ARM: OMAP2+: DRA7: clockdomain: change l4per2_7xx_clkdm to SW_WKUP
- LP: #1514832
  * mac80211: enable assoc check for mesh interfaces
- LP: #1514832
  * PCI: Add dev_flags bit to access VPD through function 0
- LP: #1514832
  * PCI: Add VPD function 0 quirk for Intel Ethernet devices
- LP: #1514832
  * usb: dwc3: ep0: Fix mem corruption on OUT transfers of more than 512
bytes
- LP: #1514832
  * serial: 8250_pci: Add support for Pericom PI7C9X795[1248]
- LP: #1514832
  * KVM: MMU: fix validation of mmio page fault
- LP: #1514832
  * auxdisplay: ks0108: fix refcount
- LP: #1514832
  * devres: fix devres_get()
- LP: #1514832
  * iio: adis16400: Fix adis16448 gyroscope scale
- LP: #1514832
  * iio: Add inverse unit conversion macros
- LP: #1514832
  * iio: adis16480: Fix scale factors
- LP: #1514832
  * iio: industrialio-buffer: Fix iio_buffer_poll return value
- LP: #1514832
  * iio: event: Remove negative error code from iio_event_poll
- LP: #1514832
  * NFSv4: don't set SETATTR for O_RDONLY|O_EXCL
- LP: #1514832
  * unshare: Unsharing a thread does not require unsharing a vm
- LP: #1514832
  * ASoC: adav80x: Remove .read_flag_mask setting from
adav80x_regmap_config
- LP: #1514832
  * drivers: usb :fsl: Implement Workaround for USB Erratum A007792
- LP: #1514832
  * drivers: usb: fsl: Workaround for USB erratum-A005275
- LP: #1514832
  * serial: 8250: don't bind to SMSC IrCC IR port
- LP: #1514832
  * staging: comedi: adl_pci7x3x: fix digital output on PCI-7230
- LP: #1514832
  * blk-mq: fix buffer overflow when reading sysfs file of 'pending'
- LP: #1514832
  * xtensa: fix kernel register spilling
- LP: #1514832
  * NFS: nfs_set_pgio_error sometimes misses errors
- LP: #1514832
  * NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2
client
- LP: #1514832
  * usb: host: ehci-sys: delete useless bus_to_hcd conversion
- LP: #1514832
  * USB: symbolserial: Use usb_get_serial_port_data
- LP: #1514832
  * USB: ftdi_sio: Added custom PID for CustomWare products
- LP: #1514832
  * HID: usbhid: Fix the check for HID_RESET_PENDING in hid_io_error
- LP: #1514832
  * eCryptfs: Invalidate dcache entries when lower i_nlink is zero
- LP: #1514832
  * libxfs: readahead of dir3 data blocks should use the read verifier
- LP: #1514832
  * xfs: Fix xfs_attr_leafblock definition
- LP: #1514832
  * arm64: kconfig: Move LIST_POISON to a safe value
- LP: #1514832
  * Btrfs: check if previous transaction aborted to avoid fs corruption
- LP: #1514832
  * DRM - radeon: Don't link train DisplayPort on HPD until we get the dpcd
- LP: #1514832
  * rtlwifi: rtl8192cu: Add new device ID
- LP: #1514832
  * rtlwifi: rtl8192cu: Add new device ID
- LP: #1514832
  * of/address: Don't loop forever in of_find_matching_node_by_address().
- LP: #1514832
  * drivercore: Fix unregistration path of platform devices
- LP: #1514832
  * xfs: return errors from partial I/O failures to files
- LP: #1514832
  * IB/qib: Change lkey table allocation to support more MRs
- LP: #1514832
  * tg3: Fix temperature reporting
- LP: #1514832
  * drm/i915: Always mark the object as dirty when used by the GPU
- LP: #1514832
  * Add radeon suspend/resume quirk for HP Compaq dc5750.
- LP: #1514832
  * IB/uverbs: reject invalid or unknown opcodes
- LP: #1514832
  * hpfs: update ctime and mtime on directory modification
- LP: #1514832
  * Input: evdev - do not report errors form flush()
- LP: #1514832
  * crypto: ghash-clmulni: specify context 

[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-11-30 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.13.0-70.113

---
linux (3.13.0-70.113) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1516733

  [ Upstream Kernel Changes ]

  * arm64: errata: use KBUILD_CFLAGS_MODULE for erratum #843419
- LP: #1516682

linux (3.13.0-69.112) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1514858

  [ Joseph Salisbury ]

  * SAUCE: storvsc: use small sg_tablesize on x86
- LP: #1495983

  [ Luis Henriques ]

  * [Config] updateconfigs after 3.13.11-ckt28 and 3.13.11-ckt29 stable
updates

  [ Upstream Kernel Changes ]

  * ext4: fix indirect punch hole corruption
- LP: #1292234
  * x86/hyperv: Mark the Hyper-V TSC as unstable
- LP: #1498206
  * namei: permit linking with CAP_FOWNER in userns
- LP: #1498162
  * iwlwifi: pci: add a few more PCI subvendor IDs for the 7265 series
- LP: #1510616
  * Drivers: hv: vmbus: Increase the limit on the number of pfns we can
handle
- LP: #1495983
  * sctp: fix race on protocol/netns initialization
- LP: #1514832
  * [media] v4l: omap3isp: Fix sub-device power management code
- LP: #1514832
  * [media] rc-core: fix remove uevent generation
- LP: #1514832
  * xtensa: fix threadptr reload on return to userspace
- LP: #1514832
  * ARM: OMAP2+: DRA7: clockdomain: change l4per2_7xx_clkdm to SW_WKUP
- LP: #1514832
  * mac80211: enable assoc check for mesh interfaces
- LP: #1514832
  * PCI: Add dev_flags bit to access VPD through function 0
- LP: #1514832
  * PCI: Add VPD function 0 quirk for Intel Ethernet devices
- LP: #1514832
  * usb: dwc3: ep0: Fix mem corruption on OUT transfers of more than 512
bytes
- LP: #1514832
  * serial: 8250_pci: Add support for Pericom PI7C9X795[1248]
- LP: #1514832
  * KVM: MMU: fix validation of mmio page fault
- LP: #1514832
  * auxdisplay: ks0108: fix refcount
- LP: #1514832
  * devres: fix devres_get()
- LP: #1514832
  * iio: adis16400: Fix adis16448 gyroscope scale
- LP: #1514832
  * iio: Add inverse unit conversion macros
- LP: #1514832
  * iio: adis16480: Fix scale factors
- LP: #1514832
  * iio: industrialio-buffer: Fix iio_buffer_poll return value
- LP: #1514832
  * iio: event: Remove negative error code from iio_event_poll
- LP: #1514832
  * NFSv4: don't set SETATTR for O_RDONLY|O_EXCL
- LP: #1514832
  * unshare: Unsharing a thread does not require unsharing a vm
- LP: #1514832
  * ASoC: adav80x: Remove .read_flag_mask setting from
adav80x_regmap_config
- LP: #1514832
  * drivers: usb :fsl: Implement Workaround for USB Erratum A007792
- LP: #1514832
  * drivers: usb: fsl: Workaround for USB erratum-A005275
- LP: #1514832
  * serial: 8250: don't bind to SMSC IrCC IR port
- LP: #1514832
  * staging: comedi: adl_pci7x3x: fix digital output on PCI-7230
- LP: #1514832
  * blk-mq: fix buffer overflow when reading sysfs file of 'pending'
- LP: #1514832
  * xtensa: fix kernel register spilling
- LP: #1514832
  * NFS: nfs_set_pgio_error sometimes misses errors
- LP: #1514832
  * NFS: Fix a NULL pointer dereference of migration recovery ops for v4.2
client
- LP: #1514832
  * usb: host: ehci-sys: delete useless bus_to_hcd conversion
- LP: #1514832
  * USB: symbolserial: Use usb_get_serial_port_data
- LP: #1514832
  * USB: ftdi_sio: Added custom PID for CustomWare products
- LP: #1514832
  * HID: usbhid: Fix the check for HID_RESET_PENDING in hid_io_error
- LP: #1514832
  * eCryptfs: Invalidate dcache entries when lower i_nlink is zero
- LP: #1514832
  * libxfs: readahead of dir3 data blocks should use the read verifier
- LP: #1514832
  * xfs: Fix xfs_attr_leafblock definition
- LP: #1514832
  * arm64: kconfig: Move LIST_POISON to a safe value
- LP: #1514832
  * Btrfs: check if previous transaction aborted to avoid fs corruption
- LP: #1514832
  * DRM - radeon: Don't link train DisplayPort on HPD until we get the dpcd
- LP: #1514832
  * rtlwifi: rtl8192cu: Add new device ID
- LP: #1514832
  * rtlwifi: rtl8192cu: Add new device ID
- LP: #1514832
  * of/address: Don't loop forever in of_find_matching_node_by_address().
- LP: #1514832
  * drivercore: Fix unregistration path of platform devices
- LP: #1514832
  * xfs: return errors from partial I/O failures to files
- LP: #1514832
  * IB/qib: Change lkey table allocation to support more MRs
- LP: #1514832
  * tg3: Fix temperature reporting
- LP: #1514832
  * drm/i915: Always mark the object as dirty when used by the GPU
- LP: #1514832
  * Add radeon suspend/resume quirk for HP Compaq dc5750.
- LP: #1514832
  * IB/uverbs: reject invalid or unknown opcodes
- LP: #1514832
  * hpfs: update ctime and mtime on directory modification
- LP: #1514832
  * Input: evdev - do not report errors form flush()
- LP: #1514832
  * crypto: ghash-clmulni: specify context 

[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-11-24 Thread Seth Arnold
I've tested several dozen VM snapshot and revert operations; previously,
I'd have expected all my VMs to be dead by this time. This update makes
libvirt / qemu / with qcow2 images usable again for me. Thanks!

** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-11-23 Thread Seth Arnold
Henrix pointed out that I also needed the linux-image-extras package.
I'm now able to test this, and will report back when I've had a chance
to create the VM images.

Thanks

** Tags removed: verification-failed-trusty
** Tags added: verification-needed-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-11-23 Thread Brad Figg
** Tags removed: verification-failed
** Tags added: verification-failed-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-11-20 Thread Seth Arnold
** Tags removed: verification-needed-trusty
** Tags added: verification-failed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-11-20 Thread Seth Arnold
I was unable to test this specific modification due to significant
regressions in the proposed kernel:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1518509

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-11-16 Thread Luis Henriques
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-26 Thread Brad Figg
** Changed in: linux (Ubuntu Trusty)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-21 Thread Chris J Arges
Ok verified that this fix is in 3.16, 3.19+ kernels. Sent Trusty
backport to ML.

** Changed in: linux (Ubuntu Vivid)
   Status: In Progress => Fix Released

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: In Progress => Fix Released

** Changed in: linux (Ubuntu Vivid)
 Assignee: Chris J Arges (arges) => (unassigned)

** Changed in: linux-lts-utopic (Ubuntu Trusty)
 Assignee: Chris J Arges (arges) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-20 Thread Chris J Arges
** No longer affects: qemu (Ubuntu Trusty)

** No longer affects: qemu (Ubuntu Vivid)

** Also affects: linux-lts-utopic (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-utopic (Ubuntu)
   Status: New => Invalid

** Changed in: linux (Ubuntu Trusty)
 Assignee: (unassigned) => Chris J Arges (arges)

** Changed in: linux (Ubuntu Vivid)
 Assignee: (unassigned) => Chris J Arges (arges)

** Changed in: linux-lts-utopic (Ubuntu Trusty)
 Assignee: (unassigned) => Chris J Arges (arges)

** Changed in: linux (Ubuntu Trusty)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Vivid)
   Importance: Undecided => High

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Trusty)
   Status: New => In Progress

** Changed in: linux (Ubuntu Vivid)
   Status: New => In Progress

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-20 Thread Chris J Arges
** Also affects: qemu (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: qemu (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** No longer affects: qemu (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-20 Thread Chris J Arges
** Also affects: qemu (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: qemu (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** No longer affects: qemu (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-20 Thread Seth Arnold
Chris, please do, I just recreated the issue with the "uvt update -rf"
recipe from earlier; four of six VMs couldn't boot to a login: prompt,
presumably from this bug.

Linux hunt 3.13.0-65-generic #106-Ubuntu SMP Fri Oct 2 22:08:27 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux

(I know, it misses this week's update. I can't keep up on this
treadmill...)

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-20 Thread Seth Arnold
Chris, please do, I just recreated the issue with the "uvt update -rf"
recipe from earlier; four of six VMs couldn't boot to a login: prompt,
presumably from this bug.

Linux hunt 3.13.0-65-generic #106-Ubuntu SMP Fri Oct 2 22:08:27 UTC 2015
x86_64 x86_64 x86_64 GNU/Linux

(I know, it misses this week's update. I can't keep up on this
treadmill...)

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-13 Thread Chris J Arges
The fix is the following:
$ git describe --contains 6f30b7e37a8239f9d27db626a1d3427bc7951908
v4.0-rc1~1^2

I thought this was going to be  queued up for stable, but doesn't look like 
that happened.
If this still affects you in 3.13, 3.16, I can backport this patch. Let me know.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-13 Thread Chris J Arges
The fix is the following:
$ git describe --contains 6f30b7e37a8239f9d27db626a1d3427bc7951908
v4.0-rc1~1^2

I thought this was going to be  queued up for stable, but doesn't look like 
that happened.
If this still affects you in 3.13, 3.16, I can backport this patch. Let me know.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-13 Thread Seth Arnold
Is this still open against the 14.04.1 LTS kernel?

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-10-13 Thread Seth Arnold
Is this still open against the 14.04.1 LTS kernel?

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-04-03 Thread Andy Whitcroft
** Changed in: linux (Ubuntu)
   Status: Confirmed = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-04-03 Thread Andy Whitcroft
** Changed in: linux (Ubuntu)
   Status: Confirmed = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-04-03 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-12.12

---
linux (3.19.0-12.12) vivid; urgency=low

  [ Andy Whitcroft ]

  * [Packaging] do_common_tools should always be on
  * [Packaging] Provides: virtualbox-guest-modules when appropriate
- LP: #1434579

  [ Chris J Arges ]

  * Revert SAUCE: ext4: disable ext4_punch_hole for indirect filesystems
- LP: #1292234

  [ Leann Ogasawara ]

  * Release Tracking Bug
- LP: #1439803

  [ Timo Aaltonen ]

  * SAUCE: i915_bpo: Provide a backport driver for Skylake  Cherryview
graphics
- LP: #1420774
  * SAUCE: i915_bpo: Update intel_ips.h file location
- LP: #1420774
  * SAUCE: i915_bpo: Only support Skylake and Cherryview with the backport
driver
- LP: #1420774
  * SAUCE: i915_bpo: Rename the backport driver to i915_bpo
- LP: #1420774
  * i915_bpo: [Config] Enable CONFIG_DRM_I915_BPO=m
- LP: #1420774
  * SAUCE: i915_bpo: Add i915_bpo_*() calls for ubuntu/i915
- LP: #1420774
  * SAUCE: i915_bpo: Revert drm/i915: remove unused
power_well/get_cdclk_freq api
- LP: #1420774
  * SAUCE: i915_bpo: Add i915_bpo specific power well calls
- LP: #1420774
  * SAUCE: Backport I915_PARAM_MMAP_VERSION and I915_MMAP_WC
- LP: #1420774
  * SAUCE: Partial backport of drm/i915: Add ioctl to set per-context
parameters
- LP: #1420774
  * SAUCE: drm/i915: Specify bsd rings through exec flag
- LP: #1420774
  * SAUCE: drm/i915: add I915_PARAM_HAS_BSD2 to i915_getparam
- LP: #1420774
  * SAUCE: drm/i915: add component support
- LP: #1420774
  * SAUCE: drm/i915: Add tiled framebuffer modifiers
- LP: #1420774
  * SAUCE: Backport new displayable tiling formats
- LP: #1420774
  * SAUCE: Backport drm_crtc_vblank_reset() helper
- LP: #1420774
  * SAUCE: drm/i915: Add I915_PARAM_REVISION
- LP: #1420774
  * SAUCE: drm/i915: Export total subslice and EU counts
- LP: #1420774
  * SAUCE: i915_bpo: Revert drm/mm: Support 4 GiB and larger ranges
- LP: #1420774

  [ Upstream Kernel Changes ]

  * drm/i915/skl: Split the SKL PCI ids by GT
- LP: #1420774
  * drm: Reorganize probed mode validation
- LP: #1420774
  * drm: Perform basic sanity checks on probed modes
- LP: #1420774
  * drm: Do basic sanity checks for user modes
- LP: #1420774
  * drm/atomic-helper: Export both plane and modeset check helpers
- LP: #1420774
  * drm/atomic-helper: Again check modeset *before* plane states
- LP: #1420774
  * drm/atomic: Introduce state-obj backpointers
- LP: #1420774
  * drm: allow property validation for refcnted props
- LP: #1420774
  * drm: store property instead of id in obj attachment
- LP: #1420774
  * drm: get rid of direct property value access
- LP: #1420774
  * drm: add atomic_set_property wrappers
- LP: #1420774
  * drm: tweak getconnector locking
- LP: #1420774
  * drm: add atomic_get_property
- LP: #1420774
  * drm: Remove unneeded braces for single statement blocks
- LP: #1420774
  * drm: refactor getproperties/getconnector
- LP: #1420774
  * drm: add atomic properties
- LP: #1420774
  * drm/atomic: atomic_check functions
- LP: #1420774
  * drm: small property creation cleanup
- LP: #1420774
  * drm/atomic: atomic plane properties
- LP: #1420774
  * drm/atomic: atomic connector properties
- LP: #1420774
  * drm: Atomic modeset ioctl
- LP: #1420774
  * drm/atomic: Hide drm.ko internal interfaces
- LP: #1420774
  * drm: Ensure universal_planes is set for atomic
- LP: #1420774
  * drm: fix mismerge in drm_crtc.c
- LP: #1420774
  * drm: bit of spell-check / editorializing.
- LP: #1420774
  * drm: add support for tiled/compressed/etc modifier in addfb2
- LP: #1420774
  * drm: Add rotation value to plane state
- LP: #1420774
  * drm: add helper to get crtc timings (v5)
- LP: #1420774
  * drm: Adding edp1.4 specific dpcd macros
- LP: #1420774
  * drm/plane-helper: Skip prepare_fb/cleanup_fb when newfb==oldfb
- LP: #1420774
  * next: drm/atomic: Use copy_from_user to copy 64 bit data from user
space
- LP: #1420774
  * powerpc: Add PVR for POWER8NVL processor
- LP: #1438938
  * kernel/sched/clock.c: add another clock for use with the soft lockup
watchdog
- LP: #1427075
  * powerpc: add running_clock for powerpc to prevent spurious softlockup
warnings
- LP: #1427075
  * ext4: fix indirect punch hole corruption
- LP: #1292234
  * fm10k: Clean-up page reuse code
- LP: #1397863
  * net/fm10k: Avoid double setting of NETIF_F_SG for the HW encapsulation
feature mask
- LP: #1397863
  * fm10k: Check tunnel header length in encap offload
- LP: #1397863
  * fm10k: Increase the timeout for the data path reset
- LP: #1397863
  * fm10k: Validate VLAN ID in fm10k_update_xc_addr_pf
- LP: #1397863
  * fm10k: Resolve compile warnings with W=1
- LP: #1397863
  * UBUNTU Config: CONFIG_IXGBE_VXLAN=y
- LP: #1397861
  * ixgbe: 

[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-04-03 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-12.12

---
linux (3.19.0-12.12) vivid; urgency=low

  [ Andy Whitcroft ]

  * [Packaging] do_common_tools should always be on
  * [Packaging] Provides: virtualbox-guest-modules when appropriate
- LP: #1434579

  [ Chris J Arges ]

  * Revert SAUCE: ext4: disable ext4_punch_hole for indirect filesystems
- LP: #1292234

  [ Leann Ogasawara ]

  * Release Tracking Bug
- LP: #1439803

  [ Timo Aaltonen ]

  * SAUCE: i915_bpo: Provide a backport driver for Skylake  Cherryview
graphics
- LP: #1420774
  * SAUCE: i915_bpo: Update intel_ips.h file location
- LP: #1420774
  * SAUCE: i915_bpo: Only support Skylake and Cherryview with the backport
driver
- LP: #1420774
  * SAUCE: i915_bpo: Rename the backport driver to i915_bpo
- LP: #1420774
  * i915_bpo: [Config] Enable CONFIG_DRM_I915_BPO=m
- LP: #1420774
  * SAUCE: i915_bpo: Add i915_bpo_*() calls for ubuntu/i915
- LP: #1420774
  * SAUCE: i915_bpo: Revert drm/i915: remove unused
power_well/get_cdclk_freq api
- LP: #1420774
  * SAUCE: i915_bpo: Add i915_bpo specific power well calls
- LP: #1420774
  * SAUCE: Backport I915_PARAM_MMAP_VERSION and I915_MMAP_WC
- LP: #1420774
  * SAUCE: Partial backport of drm/i915: Add ioctl to set per-context
parameters
- LP: #1420774
  * SAUCE: drm/i915: Specify bsd rings through exec flag
- LP: #1420774
  * SAUCE: drm/i915: add I915_PARAM_HAS_BSD2 to i915_getparam
- LP: #1420774
  * SAUCE: drm/i915: add component support
- LP: #1420774
  * SAUCE: drm/i915: Add tiled framebuffer modifiers
- LP: #1420774
  * SAUCE: Backport new displayable tiling formats
- LP: #1420774
  * SAUCE: Backport drm_crtc_vblank_reset() helper
- LP: #1420774
  * SAUCE: drm/i915: Add I915_PARAM_REVISION
- LP: #1420774
  * SAUCE: drm/i915: Export total subslice and EU counts
- LP: #1420774
  * SAUCE: i915_bpo: Revert drm/mm: Support 4 GiB and larger ranges
- LP: #1420774

  [ Upstream Kernel Changes ]

  * drm/i915/skl: Split the SKL PCI ids by GT
- LP: #1420774
  * drm: Reorganize probed mode validation
- LP: #1420774
  * drm: Perform basic sanity checks on probed modes
- LP: #1420774
  * drm: Do basic sanity checks for user modes
- LP: #1420774
  * drm/atomic-helper: Export both plane and modeset check helpers
- LP: #1420774
  * drm/atomic-helper: Again check modeset *before* plane states
- LP: #1420774
  * drm/atomic: Introduce state-obj backpointers
- LP: #1420774
  * drm: allow property validation for refcnted props
- LP: #1420774
  * drm: store property instead of id in obj attachment
- LP: #1420774
  * drm: get rid of direct property value access
- LP: #1420774
  * drm: add atomic_set_property wrappers
- LP: #1420774
  * drm: tweak getconnector locking
- LP: #1420774
  * drm: add atomic_get_property
- LP: #1420774
  * drm: Remove unneeded braces for single statement blocks
- LP: #1420774
  * drm: refactor getproperties/getconnector
- LP: #1420774
  * drm: add atomic properties
- LP: #1420774
  * drm/atomic: atomic_check functions
- LP: #1420774
  * drm: small property creation cleanup
- LP: #1420774
  * drm/atomic: atomic plane properties
- LP: #1420774
  * drm/atomic: atomic connector properties
- LP: #1420774
  * drm: Atomic modeset ioctl
- LP: #1420774
  * drm/atomic: Hide drm.ko internal interfaces
- LP: #1420774
  * drm: Ensure universal_planes is set for atomic
- LP: #1420774
  * drm: fix mismerge in drm_crtc.c
- LP: #1420774
  * drm: bit of spell-check / editorializing.
- LP: #1420774
  * drm: add support for tiled/compressed/etc modifier in addfb2
- LP: #1420774
  * drm: Add rotation value to plane state
- LP: #1420774
  * drm: add helper to get crtc timings (v5)
- LP: #1420774
  * drm: Adding edp1.4 specific dpcd macros
- LP: #1420774
  * drm/plane-helper: Skip prepare_fb/cleanup_fb when newfb==oldfb
- LP: #1420774
  * next: drm/atomic: Use copy_from_user to copy 64 bit data from user
space
- LP: #1420774
  * powerpc: Add PVR for POWER8NVL processor
- LP: #1438938
  * kernel/sched/clock.c: add another clock for use with the soft lockup
watchdog
- LP: #1427075
  * powerpc: add running_clock for powerpc to prevent spurious softlockup
warnings
- LP: #1427075
  * ext4: fix indirect punch hole corruption
- LP: #1292234
  * fm10k: Clean-up page reuse code
- LP: #1397863
  * net/fm10k: Avoid double setting of NETIF_F_SG for the HW encapsulation
feature mask
- LP: #1397863
  * fm10k: Check tunnel header length in encap offload
- LP: #1397863
  * fm10k: Increase the timeout for the data path reset
- LP: #1397863
  * fm10k: Validate VLAN ID in fm10k_update_xc_addr_pf
- LP: #1397863
  * fm10k: Resolve compile warnings with W=1
- LP: #1397863
  * UBUNTU Config: CONFIG_IXGBE_VXLAN=y
- LP: #1397861
  * ixgbe: 

[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-03-31 Thread Chris J Arges
** Changed in: linux (Ubuntu)
   Status: Fix Released = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-03-31 Thread Chris J Arges
** Changed in: linux (Ubuntu)
   Status: Fix Released = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-03-20 Thread Chris J Arges
** Description changed:

  [Impact]
  Users of non-extent ext4 filesystems (ext4 ^extents, or ext3 w/ 
CONFIG_EXT4_USE_FOR_EXT23=y) can encounter data corruption when using fallocate 
with FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE flags.
  
  [Test Case]
  1) Setup ext4 ^extents, or ext3 filesystem with CONFIG_EXT4_USE_FOR_EXT23=y
  2) Create and install a VM using a qcow2 image and store the file on the 
filesystem
  3) Snapshot the image with qemu-img
  4) Boot the image and do some disk operations (fio,etc)
  5) Shutdown image and delete snapshot
  6) Repeat 3-5 until VM no longer boots due to image corruption, generally 
this takes a few iterations depending on disk operations.
  
  [Fix]
- This is being discussed upstream here:
+ commit 6f30b7e37a8239f9d27db626a1d3427bc7951908 upstream
+ 
+ This has been discussed upstream here:
  http://marc.info/?l=linux-fsdevelm=142264422605440w=2
  
  A temporary fix would be to disable punch_hole for non-extent
  filesystem. This is how the normal ext3 module handles this and it is up
  to userspace to handle the failure. I've run this with the test case and
  was able to run for 600 iterations over 3 days where most failures occur
  within the first 2-20 iterations.
  
  diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c
  index 5653fa4..e14cdfe 100644
  --- a/fs/ext4/inode.c
  +++ b/fs/ext4/inode.c
  @@ -3367,6 +3367,10 @@ int ext4_punch_hole(struct inode *inode, loff_t
  offset, loff_t length)
    unsigned int credits;
    int ret = 0;
  
  + /* EXTENTS required */
  + if (!(ext4_test_inode_flag(inode, EXT4_INODE_EXTENTS)))
  + return -EOPNOTSUPP;
  +
    if (!S_ISREG(inode-i_mode))
     return -EOPNOTSUPP;
  
  --
  
  The security team uses a tool (http://bazaar.launchpad.net/~ubuntu-
  bugcontrol/ubuntu-qa-tools/master/view/head:/vm-tools/uvt) that uses
  libvirt snapshots quite a bit. I noticed after upgrading to trusty some
  time ago that qemu 1.7 (and the qemu 2.0 in the candidate ppa) has had
  stability problems such that the disk/partition table seems to be
  corrupted after removing a libvirt snapshot and then creating another
  with the same name. I don't have a very simple reproducer, but had
  enough that hallyn suggested I file a bug. First off:
  
  qemu-kvm 2.0~git-20140307.4c288ac-0ubuntu2
  
  $ cat /proc/version_signature
  Ubuntu 3.13.0-16.36-generic 3.13.5
  
  $ qemu-img info ./forhallyn-trusty-amd64.img
  image: ./forhallyn-trusty-amd64.img
  file format: qcow2
  virtual size: 8.0G (8589934592 bytes)
  disk size: 4.0G
  cluster_size: 65536
  Format specific information:
  compat: 0.10
  
  Steps to reproduce:
  1. create a virtual machine. For a simplified reproducer, I used virt-manager 
with:
    OS type: Linux
    Version: Ubuntu 14.04
    Memory: 768
    CPUs: 1
  
    Select managed or existing (Browse, new volume)
  Create a new storage volume:
    qcow2
    Max capacity: 8192
    Allocation: 0
  
    Advanced:
  NAT
  kvm
  x86_64
  firmware: default
  
  2. install a VM. I used trusty-desktop-amd64.iso from Jan 23 since it
  seems like I can hit the bug more reliably if I have lots of updates in
  a dist-upgrade. I have seen this with lucid-trusty guests that are i386
  and amd64. After the install, reboot and then cleanly shutdown
  
  3. Backup the image file somewhere since steps 1 and 2 take a while :)
  
  4. Execute the following commands which are based on what our uvt tool
  does:
  
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  $ virsh snapshot-current --name forhallyn-trusty-amd64
  pristine
  $ virsh start forhallyn-trusty-amd64
  $ virsh snapshot-list forhallyn-trusty-amd64 # this is showing as shutoff 
after start, this might be different with qemu 1.5
  
  in guest:
  sudo apt-get update
  sudo apt-get dist-upgrade
  780 upgraded...
  shutdown -h now
  
  $ virsh snapshot-delete forhallyn-trusty-amd64 pristine --children
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  
  $ virsh start forhallyn-trusty-amd64 # this command works, but there is
  often disk corruption
  
  The idea behind the above is to create a new VM with a pristine snapshot
  that we could revert later if we wanted. Instead, we boot the VM, run
  apt-get dist-upgrade, cleanly shutdown and then remove the old
  'pristine' snapshot and create a new 'pristine' snapshot. The intention
  is to update the VM and the pristine snapshot so that when we boot the
  next time, we boot from the updated VM and can revert back to the
  updated VM.
  
  After running 'virsh start' after doing snapshot-delete/snapshot-create-
  as, the disk may be corrupted. This can be seen with grub failing to
  find .mod files, the kernel not booting, init failing, etc.
  
  This does not seem to be related to the machine type used. Ie, pc-
  i440fx-1.5, pc-i440fx-1.7 and pc-i440fx-2.0 all fail with qemu 2.0, pc-
  i440fx-1.5 and pc-i440fx-1.7 fail with qemu 1.7 and 

[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-03-20 Thread Chris J Arges
** Description changed:

  [Impact]
  Users of non-extent ext4 filesystems (ext4 ^extents, or ext3 w/ 
CONFIG_EXT4_USE_FOR_EXT23=y) can encounter data corruption when using fallocate 
with FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE flags.
  
  [Test Case]
  1) Setup ext4 ^extents, or ext3 filesystem with CONFIG_EXT4_USE_FOR_EXT23=y
  2) Create and install a VM using a qcow2 image and store the file on the 
filesystem
  3) Snapshot the image with qemu-img
  4) Boot the image and do some disk operations (fio,etc)
  5) Shutdown image and delete snapshot
  6) Repeat 3-5 until VM no longer boots due to image corruption, generally 
this takes a few iterations depending on disk operations.
  
  [Fix]
- This is being discussed upstream here:
+ commit 6f30b7e37a8239f9d27db626a1d3427bc7951908 upstream
+ 
+ This has been discussed upstream here:
  http://marc.info/?l=linux-fsdevelm=142264422605440w=2
  
  A temporary fix would be to disable punch_hole for non-extent
  filesystem. This is how the normal ext3 module handles this and it is up
  to userspace to handle the failure. I've run this with the test case and
  was able to run for 600 iterations over 3 days where most failures occur
  within the first 2-20 iterations.
  
  diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c
  index 5653fa4..e14cdfe 100644
  --- a/fs/ext4/inode.c
  +++ b/fs/ext4/inode.c
  @@ -3367,6 +3367,10 @@ int ext4_punch_hole(struct inode *inode, loff_t
  offset, loff_t length)
    unsigned int credits;
    int ret = 0;
  
  + /* EXTENTS required */
  + if (!(ext4_test_inode_flag(inode, EXT4_INODE_EXTENTS)))
  + return -EOPNOTSUPP;
  +
    if (!S_ISREG(inode-i_mode))
     return -EOPNOTSUPP;
  
  --
  
  The security team uses a tool (http://bazaar.launchpad.net/~ubuntu-
  bugcontrol/ubuntu-qa-tools/master/view/head:/vm-tools/uvt) that uses
  libvirt snapshots quite a bit. I noticed after upgrading to trusty some
  time ago that qemu 1.7 (and the qemu 2.0 in the candidate ppa) has had
  stability problems such that the disk/partition table seems to be
  corrupted after removing a libvirt snapshot and then creating another
  with the same name. I don't have a very simple reproducer, but had
  enough that hallyn suggested I file a bug. First off:
  
  qemu-kvm 2.0~git-20140307.4c288ac-0ubuntu2
  
  $ cat /proc/version_signature
  Ubuntu 3.13.0-16.36-generic 3.13.5
  
  $ qemu-img info ./forhallyn-trusty-amd64.img
  image: ./forhallyn-trusty-amd64.img
  file format: qcow2
  virtual size: 8.0G (8589934592 bytes)
  disk size: 4.0G
  cluster_size: 65536
  Format specific information:
  compat: 0.10
  
  Steps to reproduce:
  1. create a virtual machine. For a simplified reproducer, I used virt-manager 
with:
    OS type: Linux
    Version: Ubuntu 14.04
    Memory: 768
    CPUs: 1
  
    Select managed or existing (Browse, new volume)
  Create a new storage volume:
    qcow2
    Max capacity: 8192
    Allocation: 0
  
    Advanced:
  NAT
  kvm
  x86_64
  firmware: default
  
  2. install a VM. I used trusty-desktop-amd64.iso from Jan 23 since it
  seems like I can hit the bug more reliably if I have lots of updates in
  a dist-upgrade. I have seen this with lucid-trusty guests that are i386
  and amd64. After the install, reboot and then cleanly shutdown
  
  3. Backup the image file somewhere since steps 1 and 2 take a while :)
  
  4. Execute the following commands which are based on what our uvt tool
  does:
  
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  $ virsh snapshot-current --name forhallyn-trusty-amd64
  pristine
  $ virsh start forhallyn-trusty-amd64
  $ virsh snapshot-list forhallyn-trusty-amd64 # this is showing as shutoff 
after start, this might be different with qemu 1.5
  
  in guest:
  sudo apt-get update
  sudo apt-get dist-upgrade
  780 upgraded...
  shutdown -h now
  
  $ virsh snapshot-delete forhallyn-trusty-amd64 pristine --children
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  
  $ virsh start forhallyn-trusty-amd64 # this command works, but there is
  often disk corruption
  
  The idea behind the above is to create a new VM with a pristine snapshot
  that we could revert later if we wanted. Instead, we boot the VM, run
  apt-get dist-upgrade, cleanly shutdown and then remove the old
  'pristine' snapshot and create a new 'pristine' snapshot. The intention
  is to update the VM and the pristine snapshot so that when we boot the
  next time, we boot from the updated VM and can revert back to the
  updated VM.
  
  After running 'virsh start' after doing snapshot-delete/snapshot-create-
  as, the disk may be corrupted. This can be seen with grub failing to
  find .mod files, the kernel not booting, init failing, etc.
  
  This does not seem to be related to the machine type used. Ie, pc-
  i440fx-1.5, pc-i440fx-1.7 and pc-i440fx-2.0 all fail with qemu 2.0, pc-
  i440fx-1.5 and pc-i440fx-1.7 fail with qemu 1.7 and 

[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-03-20 Thread Chris J Arges
Sent email to upstream stable to apply this bug to affected kernels.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-03-20 Thread Chris J Arges
Sent email to upstream stable to apply this bug to affected kernels.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-11 Thread Jamie Strandboge
Woohoo! *Huge* thanks. This was a tricky one :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-11 Thread Chris J Arges
Note there currently is a patch upstream:
https://lkml.org/lkml/2015/2/10/520

This fixes the original bug correctly without having to disable
ext4_punch_hole for indirect filesystems. Once this lands in Linus'
tree, I'll file an SRU to get this fixed across the board.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-11 Thread Chris J Arges
Note there currently is a patch upstream:
https://lkml.org/lkml/2015/2/10/520

This fixes the original bug correctly without having to disable
ext4_punch_hole for indirect filesystems. Once this lands in Linus'
tree, I'll file an SRU to get this fixed across the board.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-11 Thread Jamie Strandboge
Woohoo! *Huge* thanks. This was a tricky one :)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.18.0-13.14

---
linux (3.18.0-13.14) vivid; urgency=low

  [ Andy Whitcroft ]

  * hyper-v -- fix comment handing in /etc/network/interfaces
- LP: #1413020

  [ Chris J Arges ]

  * [Config] Add ibmvfc to d-i
- LP: #1416001
  * SAUCE: ext4: disable ext4_punch_hole for indirect filesystems
- LP: #1292234

  [ Leann Ogasawara ]

  * rebase to v3.18.5
  * [Config] CONFIG_X86_UP_APIC_MSI=y
  * Release Tracking Bug
- LP: #1417475
 -- Leann Ogasawara leann.ogasaw...@canonical.com   Thu, 05 Feb 2015 09:58:20 
+0200

** Changed in: linux (Ubuntu)
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-09 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.18.0-13.14

---
linux (3.18.0-13.14) vivid; urgency=low

  [ Andy Whitcroft ]

  * hyper-v -- fix comment handing in /etc/network/interfaces
- LP: #1413020

  [ Chris J Arges ]

  * [Config] Add ibmvfc to d-i
- LP: #1416001
  * SAUCE: ext4: disable ext4_punch_hole for indirect filesystems
- LP: #1292234

  [ Leann Ogasawara ]

  * rebase to v3.18.5
  * [Config] CONFIG_X86_UP_APIC_MSI=y
  * Release Tracking Bug
- LP: #1417475
 -- Leann Ogasawara leann.ogasaw...@canonical.com   Thu, 05 Feb 2015 09:58:20 
+0200

** Changed in: linux (Ubuntu)
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-03 Thread Chris J Arges
@josep-m-perez
Yes, this is an upstream bug. So it affects anyone using the right filesystem 
and CONFIGs. Once we fix this upstream, then it will be submitted as a stable 
kernel update and make its way into all stable kernels as applicable.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-03 Thread Chris J Arges
@josep-m-perez
Yes, this is an upstream bug. So it affects anyone using the right filesystem 
and CONFIGs. Once we fix this upstream, then it will be submitted as a stable 
kernel update and make its way into all stable kernels as applicable.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-03 Thread Chris J Arges
** Description changed:

  [Impact]
  Users of non-extent ext4 filesystems (ext4 ^extents, or ext3 w/ 
CONFIG_EXT4_USE_FOR_EXT23=y) can encounter data corruption when using fallocate 
with FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE flags. This seems to be a 
regression in ext4_ind_remove_space introduced in 4f579ae7, whereas commit 
77ea2a4b passes the following test case.
  
  [Test Case]
  1) Setup ext4 ^extents, or ext3 filesystem with CONFIG_EXT4_USE_FOR_EXT23=y
  2) Create and install a VM using a qcow2 image and store the file on the 
filesystem
  3) Snapshot the image with qemu-img
  4) Boot the image and do some disk operations (fio,etc)
  5) Shutdown image and delete snapshot
  6) Repeat 3-5 until VM no longer boots due to image corruption, generally 
this takes a few iterations depending on disk operations.
+ 
+ [Fix]
+ This is being discussed upstream here:
+ http://marc.info/?l=linux-fsdevelm=142264422605440w=2
+ 
+ A temporary fix would be to disable punch_hole for non-extent
+ filesystem. This is how the normal ext3 module handles this and it is up
+ to userspace to handle the failure.
+ 
+ diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c
+ index 5653fa4..e14cdfe 100644
+ --- a/fs/ext4/inode.c
+ +++ b/fs/ext4/inode.c
+ @@ -3367,6 +3367,10 @@ int ext4_punch_hole(struct inode *inode, loff_t
+ offset, loff_t length)
+   unsigned int credits;
+   int ret = 0;
+ 
+ + /* EXTENTS required */
+ + if (!(ext4_test_inode_flag(inode, EXT4_INODE_EXTENTS)))
+ + return -EOPNOTSUPP;
+ +
+   if (!S_ISREG(inode-i_mode))
+   return -EOPNOTSUPP;
  
  
  --
  
  The security team uses a tool (http://bazaar.launchpad.net/~ubuntu-
  bugcontrol/ubuntu-qa-tools/master/view/head:/vm-tools/uvt) that uses
  libvirt snapshots quite a bit. I noticed after upgrading to trusty some
  time ago that qemu 1.7 (and the qemu 2.0 in the candidate ppa) has had
  stability problems such that the disk/partition table seems to be
  corrupted after removing a libvirt snapshot and then creating another
  with the same name. I don't have a very simple reproducer, but had
  enough that hallyn suggested I file a bug. First off:
  
  qemu-kvm 2.0~git-20140307.4c288ac-0ubuntu2
  
  $ cat /proc/version_signature
  Ubuntu 3.13.0-16.36-generic 3.13.5
  
  $ qemu-img info ./forhallyn-trusty-amd64.img
  image: ./forhallyn-trusty-amd64.img
  file format: qcow2
  virtual size: 8.0G (8589934592 bytes)
  disk size: 4.0G
  cluster_size: 65536
  Format specific information:
  compat: 0.10
  
  Steps to reproduce:
  1. create a virtual machine. For a simplified reproducer, I used virt-manager 
with:
    OS type: Linux
    Version: Ubuntu 14.04
    Memory: 768
    CPUs: 1
  
    Select managed or existing (Browse, new volume)
  Create a new storage volume:
    qcow2
    Max capacity: 8192
    Allocation: 0
  
    Advanced:
  NAT
  kvm
  x86_64
  firmware: default
  
  2. install a VM. I used trusty-desktop-amd64.iso from Jan 23 since it
  seems like I can hit the bug more reliably if I have lots of updates in
  a dist-upgrade. I have seen this with lucid-trusty guests that are i386
  and amd64. After the install, reboot and then cleanly shutdown
  
  3. Backup the image file somewhere since steps 1 and 2 take a while :)
  
  4. Execute the following commands which are based on what our uvt tool
  does:
  
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  $ virsh snapshot-current --name forhallyn-trusty-amd64
  pristine
  $ virsh start forhallyn-trusty-amd64
  $ virsh snapshot-list forhallyn-trusty-amd64 # this is showing as shutoff 
after start, this might be different with qemu 1.5
  
  in guest:
  sudo apt-get update
  sudo apt-get dist-upgrade
  780 upgraded...
  shutdown -h now
  
  $ virsh snapshot-delete forhallyn-trusty-amd64 pristine --children
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  
  $ virsh start forhallyn-trusty-amd64 # this command works, but there is
  often disk corruption
  
  The idea behind the above is to create a new VM with a pristine snapshot
  that we could revert later if we wanted. Instead, we boot the VM, run
  apt-get dist-upgrade, cleanly shutdown and then remove the old
  'pristine' snapshot and create a new 'pristine' snapshot. The intention
  is to update the VM and the pristine snapshot so that when we boot the
  next time, we boot from the updated VM and can revert back to the
  updated VM.
  
  After running 'virsh start' after doing snapshot-delete/snapshot-create-
  as, the disk may be corrupted. This can be seen with grub failing to
  find .mod files, the kernel not booting, init failing, etc.
  
  This does not seem to be related to the machine type used. Ie, pc-
  i440fx-1.5, pc-i440fx-1.7 and pc-i440fx-2.0 all fail with qemu 2.0, pc-
  i440fx-1.5 and pc-i440fx-1.7 fail with qemu 1.7 and pc-i440fx-1.5 works
  fine with qemu 1.5.
  
  Only workaround I know if is to downgrade 

[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-03 Thread Chris J Arges
** Description changed:

  [Impact]
  Users of non-extent ext4 filesystems (ext4 ^extents, or ext3 w/ 
CONFIG_EXT4_USE_FOR_EXT23=y) can encounter data corruption when using fallocate 
with FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE flags. This seems to be a 
regression in ext4_ind_remove_space introduced in 4f579ae7, whereas commit 
77ea2a4b passes the following test case.
  
  [Test Case]
  1) Setup ext4 ^extents, or ext3 filesystem with CONFIG_EXT4_USE_FOR_EXT23=y
  2) Create and install a VM using a qcow2 image and store the file on the 
filesystem
  3) Snapshot the image with qemu-img
  4) Boot the image and do some disk operations (fio,etc)
  5) Shutdown image and delete snapshot
  6) Repeat 3-5 until VM no longer boots due to image corruption, generally 
this takes a few iterations depending on disk operations.
+ 
+ [Fix]
+ This is being discussed upstream here:
+ http://marc.info/?l=linux-fsdevelm=142264422605440w=2
+ 
+ A temporary fix would be to disable punch_hole for non-extent
+ filesystem. This is how the normal ext3 module handles this and it is up
+ to userspace to handle the failure.
+ 
+ diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c
+ index 5653fa4..e14cdfe 100644
+ --- a/fs/ext4/inode.c
+ +++ b/fs/ext4/inode.c
+ @@ -3367,6 +3367,10 @@ int ext4_punch_hole(struct inode *inode, loff_t
+ offset, loff_t length)
+   unsigned int credits;
+   int ret = 0;
+ 
+ + /* EXTENTS required */
+ + if (!(ext4_test_inode_flag(inode, EXT4_INODE_EXTENTS)))
+ + return -EOPNOTSUPP;
+ +
+   if (!S_ISREG(inode-i_mode))
+   return -EOPNOTSUPP;
  
  
  --
  
  The security team uses a tool (http://bazaar.launchpad.net/~ubuntu-
  bugcontrol/ubuntu-qa-tools/master/view/head:/vm-tools/uvt) that uses
  libvirt snapshots quite a bit. I noticed after upgrading to trusty some
  time ago that qemu 1.7 (and the qemu 2.0 in the candidate ppa) has had
  stability problems such that the disk/partition table seems to be
  corrupted after removing a libvirt snapshot and then creating another
  with the same name. I don't have a very simple reproducer, but had
  enough that hallyn suggested I file a bug. First off:
  
  qemu-kvm 2.0~git-20140307.4c288ac-0ubuntu2
  
  $ cat /proc/version_signature
  Ubuntu 3.13.0-16.36-generic 3.13.5
  
  $ qemu-img info ./forhallyn-trusty-amd64.img
  image: ./forhallyn-trusty-amd64.img
  file format: qcow2
  virtual size: 8.0G (8589934592 bytes)
  disk size: 4.0G
  cluster_size: 65536
  Format specific information:
  compat: 0.10
  
  Steps to reproduce:
  1. create a virtual machine. For a simplified reproducer, I used virt-manager 
with:
    OS type: Linux
    Version: Ubuntu 14.04
    Memory: 768
    CPUs: 1
  
    Select managed or existing (Browse, new volume)
  Create a new storage volume:
    qcow2
    Max capacity: 8192
    Allocation: 0
  
    Advanced:
  NAT
  kvm
  x86_64
  firmware: default
  
  2. install a VM. I used trusty-desktop-amd64.iso from Jan 23 since it
  seems like I can hit the bug more reliably if I have lots of updates in
  a dist-upgrade. I have seen this with lucid-trusty guests that are i386
  and amd64. After the install, reboot and then cleanly shutdown
  
  3. Backup the image file somewhere since steps 1 and 2 take a while :)
  
  4. Execute the following commands which are based on what our uvt tool
  does:
  
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  $ virsh snapshot-current --name forhallyn-trusty-amd64
  pristine
  $ virsh start forhallyn-trusty-amd64
  $ virsh snapshot-list forhallyn-trusty-amd64 # this is showing as shutoff 
after start, this might be different with qemu 1.5
  
  in guest:
  sudo apt-get update
  sudo apt-get dist-upgrade
  780 upgraded...
  shutdown -h now
  
  $ virsh snapshot-delete forhallyn-trusty-amd64 pristine --children
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  
  $ virsh start forhallyn-trusty-amd64 # this command works, but there is
  often disk corruption
  
  The idea behind the above is to create a new VM with a pristine snapshot
  that we could revert later if we wanted. Instead, we boot the VM, run
  apt-get dist-upgrade, cleanly shutdown and then remove the old
  'pristine' snapshot and create a new 'pristine' snapshot. The intention
  is to update the VM and the pristine snapshot so that when we boot the
  next time, we boot from the updated VM and can revert back to the
  updated VM.
  
  After running 'virsh start' after doing snapshot-delete/snapshot-create-
  as, the disk may be corrupted. This can be seen with grub failing to
  find .mod files, the kernel not booting, init failing, etc.
  
  This does not seem to be related to the machine type used. Ie, pc-
  i440fx-1.5, pc-i440fx-1.7 and pc-i440fx-2.0 all fail with qemu 2.0, pc-
  i440fx-1.5 and pc-i440fx-1.7 fail with qemu 1.7 and pc-i440fx-1.5 works
  fine with qemu 1.5.
  
  Only workaround I know if is to downgrade 

[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-02 Thread Josep M. Perez
Apparently this bug is also present in Debian. In my case the corrupted
image was a windows one. When I run qemu-img check over it it will
complain about lots of clusters, and if I pass it the repair flag, then
it will end up crashing with the following message:

$  qemu-img check -r all windows.img
Repairing cluster 0 refcount=0 reference=1
Repairing cluster 1 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 2 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 3 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 4 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 5 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 6 refcount=0 reference=1
...
Repairing OFLAG_COPIED data cluster: l2_entry=800397a59000 refcount=0
Repairing OFLAG_COPIED data cluster: l2_entry=800397a5a000 refcount=0
Repairing OFLAG_COPIED data cluster: l2_entry=8001b000 refcount=0
The following inconsistencies were found and repaired:

0 leaked clusters
97850 corruptions

Double checking the fixed image now...
[1]27716 segmentation fault (core dumped)  qemu-img check -r all windows.img


Has anyone else tried this over a copy of the corrupted image?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-02-02 Thread Josep M. Perez
Apparently this bug is also present in Debian. In my case the corrupted
image was a windows one. When I run qemu-img check over it it will
complain about lots of clusters, and if I pass it the repair flag, then
it will end up crashing with the following message:

$  qemu-img check -r all windows.img
Repairing cluster 0 refcount=0 reference=1
Repairing cluster 1 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 2 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 3 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 4 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 5 refcount=0 reference=1
qcow2: Preventing invalid write on metadata (overlaps with active L1 table); 
image marked as corrupt.
Repairing cluster 6 refcount=0 reference=1
...
Repairing OFLAG_COPIED data cluster: l2_entry=800397a59000 refcount=0
Repairing OFLAG_COPIED data cluster: l2_entry=800397a5a000 refcount=0
Repairing OFLAG_COPIED data cluster: l2_entry=8001b000 refcount=0
The following inconsistencies were found and repaired:

0 leaked clusters
97850 corruptions

Double checking the fixed image now...
[1]27716 segmentation fault (core dumped)  qemu-img check -r all windows.img


Has anyone else tried this over a copy of the corrupted image?

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-30 Thread Chris J Arges
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) = Chris J Arges (arges)

** Changed in: linux (Ubuntu)
   Importance: Undecided = High

** Changed in: linux (Ubuntu)
   Status: New = In Progress

** Changed in: qemu (Ubuntu)
   Status: In Progress = Invalid

** Changed in: qemu (Ubuntu)
 Assignee: Chris J Arges (arges) = (unassigned)

** Changed in: qemu (Ubuntu)
   Importance: High = Undecided

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-30 Thread Chris J Arges
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) = Chris J Arges (arges)

** Changed in: linux (Ubuntu)
   Importance: Undecided = High

** Changed in: linux (Ubuntu)
   Status: New = In Progress

** Changed in: qemu (Ubuntu)
   Status: In Progress = Invalid

** Changed in: qemu (Ubuntu)
 Assignee: Chris J Arges (arges) = (unassigned)

** Changed in: qemu (Ubuntu)
   Importance: High = Undecided

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-30 Thread Chris J Arges
** Description changed:

+ [Impact]
+ Users of non-extent ext4 filesystems (ext4 ^extents, or ext3 w/ 
CONFIG_EXT4_USE_FOR_EXT23=y) can encounter data corruption when using fallocate 
with FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE flags. This seems to be a 
regression in ext4_ind_remove_space introduced in 4f579ae7, whereas commit 
77ea2a4b passes the following test case.
+ 
+ [Test Case]
+ 1) Setup ext4 ^extents, or ext3 filesystem with CONFIG_EXT4_USE_FOR_EXT23=y
+ 2) Create and install a VM using a qcow2 image and store the file on the 
filesystem
+ 3) Snapshot the image with qemu-img
+ 4) Boot the image and do some disk operations (fio,etc)
+ 5) Shutdown image and delete snapshot
+ 6) Repeat 3-5 until VM no longer boots due to image corruption, generally 
this takes a few iterations depending on disk operations.
+ 
+ 
+ --
+ 
  The security team uses a tool (http://bazaar.launchpad.net/~ubuntu-
  bugcontrol/ubuntu-qa-tools/master/view/head:/vm-tools/uvt) that uses
  libvirt snapshots quite a bit. I noticed after upgrading to trusty some
  time ago that qemu 1.7 (and the qemu 2.0 in the candidate ppa) has had
  stability problems such that the disk/partition table seems to be
  corrupted after removing a libvirt snapshot and then creating another
  with the same name. I don't have a very simple reproducer, but had
  enough that hallyn suggested I file a bug. First off:
  
  qemu-kvm 2.0~git-20140307.4c288ac-0ubuntu2
  
  $ cat /proc/version_signature
  Ubuntu 3.13.0-16.36-generic 3.13.5
  
  $ qemu-img info ./forhallyn-trusty-amd64.img
  image: ./forhallyn-trusty-amd64.img
  file format: qcow2
  virtual size: 8.0G (8589934592 bytes)
  disk size: 4.0G
  cluster_size: 65536
  Format specific information:
  compat: 0.10
  
  Steps to reproduce:
  1. create a virtual machine. For a simplified reproducer, I used virt-manager 
with:
    OS type: Linux
    Version: Ubuntu 14.04
    Memory: 768
    CPUs: 1
  
    Select managed or existing (Browse, new volume)
  Create a new storage volume:
    qcow2
    Max capacity: 8192
    Allocation: 0
  
    Advanced:
  NAT
  kvm
  x86_64
  firmware: default
  
  2. install a VM. I used trusty-desktop-amd64.iso from Jan 23 since it
  seems like I can hit the bug more reliably if I have lots of updates in
  a dist-upgrade. I have seen this with lucid-trusty guests that are i386
  and amd64. After the install, reboot and then cleanly shutdown
  
  3. Backup the image file somewhere since steps 1 and 2 take a while :)
  
  4. Execute the following commands which are based on what our uvt tool
  does:
  
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  $ virsh snapshot-current --name forhallyn-trusty-amd64
  pristine
  $ virsh start forhallyn-trusty-amd64
  $ virsh snapshot-list forhallyn-trusty-amd64 # this is showing as shutoff 
after start, this might be different with qemu 1.5
  
  in guest:
  sudo apt-get update
  sudo apt-get dist-upgrade
  780 upgraded...
  shutdown -h now
  
  $ virsh snapshot-delete forhallyn-trusty-amd64 pristine --children
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  
  $ virsh start forhallyn-trusty-amd64 # this command works, but there is
  often disk corruption
  
  The idea behind the above is to create a new VM with a pristine snapshot
  that we could revert later if we wanted. Instead, we boot the VM, run
  apt-get dist-upgrade, cleanly shutdown and then remove the old
  'pristine' snapshot and create a new 'pristine' snapshot. The intention
  is to update the VM and the pristine snapshot so that when we boot the
  next time, we boot from the updated VM and can revert back to the
  updated VM.
  
  After running 'virsh start' after doing snapshot-delete/snapshot-create-
  as, the disk may be corrupted. This can be seen with grub failing to
  find .mod files, the kernel not booting, init failing, etc.
  
  This does not seem to be related to the machine type used. Ie, pc-
  i440fx-1.5, pc-i440fx-1.7 and pc-i440fx-2.0 all fail with qemu 2.0, pc-
  i440fx-1.5 and pc-i440fx-1.7 fail with qemu 1.7 and pc-i440fx-1.5 works
  fine with qemu 1.5.
  
  Only workaround I know if is to downgrade qemu to 1.5.0+dfsg-3ubuntu5.4
  from Ubuntu 13.10.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-30 Thread Chris J Arges
** Description changed:

+ [Impact]
+ Users of non-extent ext4 filesystems (ext4 ^extents, or ext3 w/ 
CONFIG_EXT4_USE_FOR_EXT23=y) can encounter data corruption when using fallocate 
with FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE flags. This seems to be a 
regression in ext4_ind_remove_space introduced in 4f579ae7, whereas commit 
77ea2a4b passes the following test case.
+ 
+ [Test Case]
+ 1) Setup ext4 ^extents, or ext3 filesystem with CONFIG_EXT4_USE_FOR_EXT23=y
+ 2) Create and install a VM using a qcow2 image and store the file on the 
filesystem
+ 3) Snapshot the image with qemu-img
+ 4) Boot the image and do some disk operations (fio,etc)
+ 5) Shutdown image and delete snapshot
+ 6) Repeat 3-5 until VM no longer boots due to image corruption, generally 
this takes a few iterations depending on disk operations.
+ 
+ 
+ --
+ 
  The security team uses a tool (http://bazaar.launchpad.net/~ubuntu-
  bugcontrol/ubuntu-qa-tools/master/view/head:/vm-tools/uvt) that uses
  libvirt snapshots quite a bit. I noticed after upgrading to trusty some
  time ago that qemu 1.7 (and the qemu 2.0 in the candidate ppa) has had
  stability problems such that the disk/partition table seems to be
  corrupted after removing a libvirt snapshot and then creating another
  with the same name. I don't have a very simple reproducer, but had
  enough that hallyn suggested I file a bug. First off:
  
  qemu-kvm 2.0~git-20140307.4c288ac-0ubuntu2
  
  $ cat /proc/version_signature
  Ubuntu 3.13.0-16.36-generic 3.13.5
  
  $ qemu-img info ./forhallyn-trusty-amd64.img
  image: ./forhallyn-trusty-amd64.img
  file format: qcow2
  virtual size: 8.0G (8589934592 bytes)
  disk size: 4.0G
  cluster_size: 65536
  Format specific information:
  compat: 0.10
  
  Steps to reproduce:
  1. create a virtual machine. For a simplified reproducer, I used virt-manager 
with:
    OS type: Linux
    Version: Ubuntu 14.04
    Memory: 768
    CPUs: 1
  
    Select managed or existing (Browse, new volume)
  Create a new storage volume:
    qcow2
    Max capacity: 8192
    Allocation: 0
  
    Advanced:
  NAT
  kvm
  x86_64
  firmware: default
  
  2. install a VM. I used trusty-desktop-amd64.iso from Jan 23 since it
  seems like I can hit the bug more reliably if I have lots of updates in
  a dist-upgrade. I have seen this with lucid-trusty guests that are i386
  and amd64. After the install, reboot and then cleanly shutdown
  
  3. Backup the image file somewhere since steps 1 and 2 take a while :)
  
  4. Execute the following commands which are based on what our uvt tool
  does:
  
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  $ virsh snapshot-current --name forhallyn-trusty-amd64
  pristine
  $ virsh start forhallyn-trusty-amd64
  $ virsh snapshot-list forhallyn-trusty-amd64 # this is showing as shutoff 
after start, this might be different with qemu 1.5
  
  in guest:
  sudo apt-get update
  sudo apt-get dist-upgrade
  780 upgraded...
  shutdown -h now
  
  $ virsh snapshot-delete forhallyn-trusty-amd64 pristine --children
  $ virsh snapshot-create-as forhallyn-trusty-amd64 pristine uvt snapshot
  
  $ virsh start forhallyn-trusty-amd64 # this command works, but there is
  often disk corruption
  
  The idea behind the above is to create a new VM with a pristine snapshot
  that we could revert later if we wanted. Instead, we boot the VM, run
  apt-get dist-upgrade, cleanly shutdown and then remove the old
  'pristine' snapshot and create a new 'pristine' snapshot. The intention
  is to update the VM and the pristine snapshot so that when we boot the
  next time, we boot from the updated VM and can revert back to the
  updated VM.
  
  After running 'virsh start' after doing snapshot-delete/snapshot-create-
  as, the disk may be corrupted. This can be seen with grub failing to
  find .mod files, the kernel not booting, init failing, etc.
  
  This does not seem to be related to the machine type used. Ie, pc-
  i440fx-1.5, pc-i440fx-1.7 and pc-i440fx-2.0 all fail with qemu 2.0, pc-
  i440fx-1.5 and pc-i440fx-1.7 fail with qemu 1.7 and pc-i440fx-1.5 works
  fine with qemu 1.5.
  
  Only workaround I know if is to downgrade qemu to 1.5.0+dfsg-3ubuntu5.4
  from Ubuntu 13.10.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-30 Thread Chris J Arges
Sent e-mail upstream about this issue: http://marc.info/?l=linux-
fsdevelm=142264422605440w=2

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-30 Thread Chris J Arges
Sent e-mail upstream about this issue: http://marc.info/?l=linux-
fsdevelm=142264422605440w=2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-28 Thread Chris J Arges
** No longer affects: qemu

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-28 Thread Chris J Arges
** No longer affects: qemu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-16 Thread Chris J Arges
** Summary changed:

- qcow2 image corruption in trusty (qemu 1.7 and 2.0 candidate)
+ qcow2 image corruption on non-extent filesystems (ext3)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1292234/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1292234] Re: qcow2 image corruption on non-extent filesystems (ext3)

2015-01-16 Thread Chris J Arges
** Summary changed:

- qcow2 image corruption in trusty (qemu 1.7 and 2.0 candidate)
+ qcow2 image corruption on non-extent filesystems (ext3)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1292234

Title:
  qcow2 image corruption on non-extent filesystems (ext3)

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1292234/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs