[Kernel-packages] [Bug 2032164] Re: A general-proteciton exception during guest migration to unsupported PKRU machine

2024-03-26 Thread Chengen Du
Mantic has already included this two commits in #2049202 [1]. c95b65ba744d x86/fpu: Allow caller to constrain xfeatures when copying to uabi buffer 97cdceb46fb3 KVM: x86: Constrain guest-supported xfeatures only at KVM_GET_XSAVE{2} [1] https://bugs.launchpad.net/bugs/2049202 -- You

[Kernel-packages] [Bug 2032164] Re: A general-proteciton exception during guest migration to unsupported PKRU machine

2024-03-15 Thread Chengen Du
We have backported the following two patches in Jammy and waiting for review: 18164f66e6c5 x86/fpu: Allow caller to constrain xfeatures when copying to uabi buffer 8647c52e9504 KVM: x86: Constrain guest-supported xfeatures only at KVM_GET_XSAVE{2} The fix will also apply to

[Kernel-packages] [Bug 2032164] Re: A general-proteciton exception during guest migration to unsupported PKRU machine

2024-03-15 Thread Chengen Du
** Description changed: [Impact] When a host that supports PKRU initiates a guest that lacks PKRU support, the flag is enabled on the guest's fpstate. This information is then passed to userspace through the vcpu ioctl KVM_GET_XSAVE. However, a problem arises when the user opts to

[Kernel-packages] [Bug 2047382] Re: Hotplugging SCSI disk in QEMU VM fails

2024-01-10 Thread Chengen Du
Both Lunar (6.2.0-41.42) and Mantic (6.5.0-16.16) successfully verified by the test plan. root@ubuntu:~# dmesg -wT [Wed Jan 10 08:28:27 2024] pci :08:00.0: [1af4:1042] type 00 class 0x01 [Wed Jan 10 08:28:27 2024] pci :08:00.0: reg 0x14: [mem 0x-0x0fff] [Wed Jan 10

[Kernel-packages] [Bug 2046534] Re: Page fault in RDMA ODP triggers BUG_ON during MMU notifier registration

2024-01-09 Thread Chengen Du
The verification of jammy (5.4.0-171.189) was conducted using a custom approach due to the absence of an InfiniBand environment for testing the patch. The patch specifically altered the count of mm->mm_users within a function. To ensure that this modification did not impact the original logic, a

[Kernel-packages] [Bug 2047382] Re: Hotplugging SCSI disk in QEMU VM fails

2024-01-08 Thread Chengen Du
Both Focal (5.4.0-171.189) and Jammy (5.15.0-93.103) successfully verified by the test plan. root@ubuntu:~# dmesg -wT [Tue Jan 9 03:23:18 2024] pci :08:00.0: [1af4:1042] type 00 class 0x01 [Tue Jan 9 03:23:18 2024] pci :08:00.0: reg 0x14: [mem 0x-0x0fff] [Tue Jan 9

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2024-01-04 Thread Chengen Du
Hi Mauricio, Thank you for your ongoing assistance. I have revised the patches and would appreciate it if you could take a look. Please don't hesitate to let me know if there is anything else that needs correction. -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2024-01-04 Thread Chengen Du
Debdiff for Lunar ** Patch added: "lp2038249-crash-lunar.debdiff" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736415/+files/lp2038249-crash-lunar.debdiff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2024-01-04 Thread Chengen Du
Debdiff for Mantic ** Patch added: "lp2038249-crash-mantic.debdiff" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736416/+files/lp2038249-crash-mantic.debdiff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2024-01-04 Thread Chengen Du
The merged test plan for reference. ** Attachment added: "crash_test_plan.txt" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736417/+files/crash_test_plan.txt ** Changed in: crash (Ubuntu Jammy) Status: Incomplete => In Progress ** Changed in: crash

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2024-01-04 Thread Chengen Du
Debdiff for Jammy. I have included the structural changes from Linux kernel 6.5. ** Patch added: "lp2038249-crash-jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736414/+files/lp2038249-crash-jammy.debdiff -- You received this bug notification

[Kernel-packages] [Bug 2047382] Re: Hotplugging SCSI disk in QEMU VM fails

2023-12-25 Thread Chengen Du
** Changed in: linux (Ubuntu Focal) Status: New => In Progress ** Changed in: linux (Ubuntu Jammy) Status: New => In Progress ** Changed in: linux (Ubuntu Lunar) Status: New => In Progress ** Changed in: linux (Ubuntu Mantic) Status: New => In Progress ** Changed

[Kernel-packages] [Bug 2047382] Re: Hotplugging SCSI disk in QEMU VM fails

2023-12-25 Thread Chengen Du
** Description changed: [Impact] Hot-plugging SCSI disks for QEMU VMs booting with UEFI and using guest kernels >= 6.5 might be broken. The inconsistency suggests a potential race condition. [Fix] Reverting the two specified commits appears to restore reliability. ==

[Kernel-packages] [Bug 2047382] Re: Hotplugging SCSI disk in QEMU VM fails

2023-12-25 Thread Chengen Du
** Description changed: [Impact] Hot-plugging SCSI disks for QEMU VMs booting with UEFI and using guest kernels >= 6.5 might be broken. The inconsistency suggests a potential race condition. [Fix] Reverting the two specified commits appears to restore reliability. ==

[Kernel-packages] [Bug 2047382] [NEW] Hotplugging SCSI disk in QEMU VM fails

2023-12-25 Thread Chengen Du
Assignee: Chengen Du (chengendu) Status: New ** Affects: linux (Ubuntu Focal) Importance: Undecided Assignee: Chengen Du (chengendu) Status: New ** Affects: linux (Ubuntu Jammy) Importance: Undecided Assignee: Chengen Du (chengendu) Status: New **

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-12-15 Thread Chengen Du
** Changed in: crash (Ubuntu) Status: Incomplete => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to crash in Ubuntu. https://bugs.launchpad.net/bugs/2038249 Title: The dump file parsing issue arises from structural

[Kernel-packages] [Bug 2046534] Re: Page fault in RDMA ODP triggers BUG_ON during MMU notifier registration

2023-12-15 Thread Chengen Du
** Changed in: linux (Ubuntu Focal) Status: New => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2046534 Title: Page fault in RDMA ODP triggers BUG_ON during MMU

[Kernel-packages] [Bug 2046534] Re: Page fault in RDMA ODP triggers BUG_ON during MMU notifier registration

2023-12-15 Thread Chengen Du
** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => Chengen Du (chengendu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubu

[Kernel-packages] [Bug 2046534] [NEW] Page fault in RDMA ODP triggers BUG_ON during MMU notifier registration

2023-12-15 Thread Chengen Du
Public bug reported: [Impact] When a page fault is triggered in RDMA ODP, it registers an MMU notifier during the process. Unfortunately, an error arises due to a race condition where the mm is released while attempting to register a notifier. == Oct 14 23:38:32 bnode001 kernel:

[Kernel-packages] [Bug 2036675] Re: 5.15.0-85 live migration regression

2023-12-06 Thread Chengen Du
This bug only involves a revert to LP#2032164. We are actively working on finding a comprehensive solution to address the live migration issue. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-26 Thread Chengen Du
The crash patch has been successfully merged upstream. Following the resolution of this issue, I'll proceed to create a new bug report. https://github.com/crash-utility/crash/commit/38acd02c7fc09843ffb10fc2d695cccdd10cc7f6 -- You received this bug notification because you are a member of Kernel

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-08 Thread Chengen Du
Regarding the swapped page read failure issue, I've sent a patch upstream for review. Visit the link if you're interested: https://lists.crash-utility.osci.io/archives/list/de...@lists.crash-utility.osci.io/thread/76EA25KPIRKQY5JDFFNYQY2C4CDRLZP2/ -- You received this bug notification because

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-08 Thread Chengen Du
Regarding the swapped page read failure, I've created an upstream PR. If you're interested, please visit the following link: https://github.com/crash-utility/crash/pull/159 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to crash in Ubuntu.

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-06 Thread Chengen Du
Please note that #16 has been tested on Jammy GA. The Jammy HWE uses the same kernel version and package content as Lunar. Refer to Lunar's test plan for Jammy HWE testing. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to crash in Ubuntu.

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-06 Thread Chengen Du
Test plan for Lunar ** Attachment added: "crash_lunar_test_plan.txt" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716334/+files/crash_lunar_test_plan.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-06 Thread Chengen Du
Test plan for Mantic ** Attachment added: "crash_mantic_test_plan.txt.txt" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716336/+files/crash_mantic_test_plan.txt.txt -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-06 Thread Chengen Du
Test plan for Jammy HWE ** Attachment added: "crash_jammy_test_plan.txt.txt" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716332/+files/crash_jammy_test_plan.txt.txt -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-06 Thread Chengen Du
debdiff for Jammy HWE ** Patch added: "lp2038249-crash-jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716331/+files/lp2038249-crash-jammy.debdiff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-06 Thread Chengen Du
debdiff for Lunar ** Patch added: "lp2038249-crash-lunar.debdiff" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716333/+files/lp2038249-crash-lunar.debdiff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-06 Thread Chengen Du
debdiff for Mantic ** Patch added: "lp2038249-crash-mantic.debdiff" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716335/+files/lp2038249-crash-mantic.debdiff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-11-01 Thread Chengen Du
Hi, I'm focusing on resolving all issues caused by structural changes rather than solely ensuring the crash utility functions across different kernel versions. The patch set will be extensive and require additional time for backporting and testing. I'll provide the new patch as soon as possible.

[Kernel-packages] [Bug 2038248] Re: Slab page exclusion issue on Linux 6.2-rc1

2023-10-27 Thread Chengen Du
Hi Andreas, I apologize for the lack of detail. The 5.15 GA kernel for Jammy has already passed testing. Please see the test results below. == # uname -a Linux ubuntu 5.15.0-87-generic #97-Ubuntu SMP Tue Oct 3 09:52:42 UTC 2023 aarch64 aarch64 aarch64 GNU/Linux # apt-cache policy

[Kernel-packages] [Bug 2038248] Re: Slab page exclusion issue on Linux 6.2-rc1

2023-10-17 Thread Chengen Du
The package in -proposed has been successfully tested: 1:1.7.0-1ubuntu0.1 in Jammy, 1:1.7.2-1ubuntu0.1 in Lunar ** Tags removed: verification-needed verification-needed-jammy verification-needed-lunar ** Tags added: verification-done verification-done-jammy verification-done-lunar -- You

[Kernel-packages] [Bug 2035166] Re: NULL Pointer Dereference During KVM MMU Page Invalidation

2023-10-05 Thread Chengen Du
The kernels (5.15.0-88.98) have been tested without any issues. ** Tags removed: verification-needed-jammy-linux ** Tags added: verification-done-jammy-linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 2036675] Re: 5.15.0-85 live migration regression

2023-10-05 Thread Chengen Du
** Tags removed: verification-needed-jammy-linux-aws verification-needed-jammy-linux-azure ** Tags added: verification-done-jammy-linux-aws verification-done-jammy-linux-azure -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in

[Kernel-packages] [Bug 2038248] Re: Slab page exclusion issue on Linux 6.2-rc1

2023-10-03 Thread Chengen Du
debdiff for Lunar ** Patch added: "lp2038248-makedumpfile-lunar.debdiff" https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/2038248/+attachment/5706208/+files/lp2038248-makedumpfile-lunar.debdiff -- You received this bug notification because you are a member of Kernel Packages,

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-10-03 Thread Chengen Du
debdiff for Mantic ** Patch added: "lp2038249-crash-mantic.debdiff" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5706210/+files/lp2038249-crash-mantic.debdiff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed

[Kernel-packages] [Bug 2038249] Re: The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-10-03 Thread Chengen Du
debdiff for Lunar ** Patch added: "lp2038249-crash-lunar.debdiff" https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5706209/+files/lp2038249-crash-lunar.debdiff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 2038248] [NEW] Slab page exclusion issue on Linux 6.2-rc1

2023-10-02 Thread Chengen Du
. However, it's crucial to note that this change may impact the content of the dump file, potentially leading to a situation where the "crash" utility is unable to parse it in the worst-case scenario. ** Affects: makedumpfile (Ubuntu) Importance: Undecided Status: New

[Kernel-packages] [Bug 2038249] [NEW] The dump file parsing issue arises from structural changes in Linux kernel 6.2

2023-10-02 Thread Chengen Du
onality of the "crash" command. However, please be aware that these patches will alter the parsing logic and could potentially result in the "crash" utility being unable to parse the dump file in the worst-case scenario. ** Affects: crash (Ubuntu) Importance: Unde

[Kernel-packages] [Bug 2036675] Re: 5.15.0-85 live migration regression

2023-09-19 Thread Chengen Du
** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Jammy) Status: New => In Progress ** Changed in: linux (Ubuntu Jammy) Assignee: (unassigned) => Chengen Du (chengendu) -- You received this bug notification becau

[Kernel-packages] [Bug 2035166] Re: NULL Pointer Dereference During KVM MMU Page Invalidation

2023-09-12 Thread Chengen Du
** Changed in: linux (Ubuntu) Status: Invalid => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2035166 Title: NULL Pointer Dereference During KVM MMU Page

[Kernel-packages] [Bug 2035166] Re: NULL Pointer Dereference During KVM MMU Page Invalidation

2023-09-12 Thread Chengen Du
** Changed in: linux (Ubuntu Jammy) Status: Incomplete => In Progress ** Changed in: linux (Ubuntu) Status: Incomplete => New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 2035166] [NEW] NULL Pointer Dereference During KVM MMU Page Invalidation

2023-09-11 Thread Chengen Du
ffects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux (Ubuntu Jammy) Importance: Undecided Assignee: Chengen Du (chengendu) Status: New ** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: New ** Changed in: linux (

[Kernel-packages] [Bug 2032164] Re: A general-proteciton exception during guest migration to unsupported PKRU machine

2023-09-07 Thread Chengen Du
The kernels (5.15.0-85.95) have been tested without any issues. ** Tags removed: verification-needed-jammy-linux ** Tags added: verification-done-jammy-linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 2033007] Re: kdump doesn't work with UEFI secure boot and kernel lockdown enabled on ARM64

2023-09-07 Thread Chengen Du
The kernels (5.15.0-85.95/6.2.0-34.34) have been tested without any issues. ** Tags removed: verification-needed-jammy-linux verification-needed-lunar-linux ** Tags added: verification-done-jammy-linux verification-done-lunar-linux -- You received this bug notification because you are a member

[Kernel-packages] [Bug 2020319] Re: Encountering an issue with memcpy_fromio causing failed boot of SEV-enabled guest

2023-05-22 Thread ChengEn, Du
** Changed in: linux (Ubuntu) Status: Incomplete => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020319 Title: Encountering an issue with memcpy_fromio causing

[Kernel-packages] [Bug 2020319] Re: Encountering an issue with memcpy_fromio causing failed boot of SEV-enabled guest

2023-05-22 Thread ChengEn, Du
** Changed in: linux (Ubuntu Focal) Status: New => In Progress ** Changed in: linux (Ubuntu Jammy) Status: New => In Progress ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => ChengEn, Du (chengendu) ** Changed in: linux (Ubuntu Jammy) Assignee: (u

[Kernel-packages] [Bug 2020319] Re: Encountering an issue with memcpy_fromio causing failed boot of SEV-enabled guest

2023-05-22 Thread ChengEn, Du
** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New -- You received this bug notification because

[Kernel-packages] [Bug 2020319] [NEW] Encountering an issue with memcpy_fromio causing failed boot of SEV-enabled guest

2023-05-22 Thread ChengEn, Du
) Importance: Undecided Assignee: ChengEn, Du (chengendu) Status: Incomplete ** Changed in: linux (Ubuntu) Assignee: (unassigned) => ChengEn, Du (chengendu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubu

[Kernel-packages] [Bug 2008971] Re: Do not sort the task scan result from /proc when synthesizing perf events

2023-05-14 Thread ChengEn, Du
** Tags removed: verification-needed-jammy ** Tags added: verification-done-jammy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2008971 Title: Do not sort the task scan result from

[Kernel-packages] [Bug 2008971] Re: Do not sort the task scan result from /proc when synthesizing perf events

2023-05-07 Thread ChengEn, Du
** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2008971 Title: Do not sort the task scan result from

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-05-07 Thread ChengEn, Du
** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/2009325 Title: NFS deathlock with last Kernel

[Kernel-packages] [Bug 2015827] Re: NFS performance issue while clearing the file access cache upon login

2023-05-03 Thread ChengEn, Du
The NFS patchset did resolve the issue our user encountered, but unfortunately introduced some performance overhead that may have significant impacts in certain scenarios. We wanted to let you know that we have submitted a patch

[Kernel-packages] [Bug 2008971] Re: Do not sort the task scan result from /proc when synthesizing perf events

2023-04-25 Thread ChengEn, Du
** Tags removed: verification-needed-jammy ** Tags added: verification-done-jammy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2008971 Title: Do not sort the task scan result from

[Kernel-packages] [Bug 2008971] Re: Do not sort the task scan result from /proc when synthesizing perf events

2023-04-23 Thread ChengEn, Du
The SRU targeted on Jammy only and doesn't need to be tested in Focal. ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-04-10 Thread ChengEn, Du
Hi @krglosse, We have opened a bug to address the performance issue related to NFS. You can find more details about the bug at this link: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2015827. We have also sent a proposal to upstream for their consideration, but unfortunately, we have

[Kernel-packages] [Bug 2015827] Re: NFS performance issue while clearing the file access cache upon login

2023-04-10 Thread ChengEn, Du
** Changed in: linux (Ubuntu) Assignee: (unassigned) => ChengEn, Du (chengendu) ** Changed in: linux (Ubuntu) Status: Incomplete => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 2015827] [NEW] NFS performance issue while clearing the file access cache upon login

2023-04-10 Thread ChengEn, Du
egradation. ** Affects: linux (Ubuntu) Importance: Undecided Assignee: ChengEn, Du (chengendu) Status: In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2015827 Ti

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-30 Thread ChengEn, Du
I would like to begin by expressing my sincere appreciation for your invaluable assistance in identifying the performance issue and presenting us with a clear reproducer for testing. Your contributions have been extremely helpful. We have carefully considered the possibility of reverting the

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-28 Thread ChengEn, Du
I apologize for any confusion that may have arisen. The test kernel 5.15.0-67.74+test20230307b2h2cbb6062f8eb has completely reverted the new mechanism, resulting in the same behavior as before. We understand that this can be concerning, and we want to assure you that we are actively working

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-28 Thread ChengEn, Du
Hi, I would like to share my thoughts on the increase in LOOKUP operations, which may be attributed to a new mechanism introduced in the Linux 6.2-rc3 NFS client side. This mechanism clears the access cache as soon as the cache timestamp becomes older than the user's login time. Its primary

[Kernel-packages] [Bug 2008971] Re: Do not sort the task scan result from /proc when synthesizing perf events

2023-03-27 Thread ChengEn, Du
Tested using the same test plan by linux/5.15.0-70.77 and confirmed that the issue has been resolved. ** Tags removed: verification-needed-jammy ** Tags added: verification-done-jammy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-16 Thread ChengEn, Du
** Also affects: linux (Ubuntu Kinetic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lunar) Importance: Undecided Assignee: ChengEn, Du (chengendu) Status: Confirmed

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-13 Thread ChengEn, Du
A problematic patch has been identified in a bug report, which can lead to issues. The bug report can be found at https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2003053. This patch can affect several kernels, including: linux/4.15.0-206.217 for bionic linux/5.4.0-144.161 for focal

[Kernel-packages] [Bug 2003053] Re: NFS: client permission error after adding user to permissible group

2023-03-09 Thread ChengEn, Du
The issue has been identified in the following bug: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2009325 We have sent a patch upstream (https://lore.kernel.org/lkml/20230308080327.33906-1-chengen...@canonical.com/T/#u). The test kernel proves that the issue has been solved by this patch.

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-08 Thread ChengEn, Du
** Changed in: linux (Ubuntu) Assignee: (unassigned) => ChengEn, Du (chengendu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2009325 Title: NFS deathlock with last Kernel 5.

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-08 Thread ChengEn, Du
The first test kernel (5.15.0-67-generic #74+test20230307b2h2cbb6062f8eb-Ubuntu) merely reverts file access cache-related commits. However, the second test kernel (5.15.0-67-generic #74+test20230308b0h1a13a615ee32-Ubuntu) truly identifies and resolves the problem. The file access cache, which

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-08 Thread ChengEn, Du
I have sent a patch to fix the upstream error (https://lkml.org/lkml/2023/3/8/107), which is intended to resolve the issue of a massive increase in ACCESS operations. I have also prepared a test kernel that includes this patch and would appreciate it if you could use it for testing. To install

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-07 Thread ChengEn, Du
I have prepared a test kernel that reverts the file access cache-related commits. Please follow these steps and give it a try: 1. sudo add-apt-repository ppa:chengendu/jammy-nfs-test 2. sudo apt update 3. sudo apt install linux-headers-5.15.0-67-generic linux-image-unsigned-5.15.0-67-generic

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-07 Thread ChengEn, Du
If the symptom observed is a massive increase in ACCESS operations, it is more likely that the root cause is related to file access cache-related commits. I will build a test kernel without those commits for testing. Thanks for your help. -- You received this bug notification because you are a

[Kernel-packages] [Bug 2009325] Re: NFS deathlock with last Kernel 5.4.0-144.161 and 5.15.0-67.74

2023-03-07 Thread ChengEn, Du
Thank you for bringing this to our attention. The following commits were made between Ubuntu versions 5.15.0-60.66 and 5.15.0-67.74: f391395fb6b1: NFS: Fix up a sparse warning bcf920d0e616: NFS: Judge the file access cache's timestamp in rcu path 2cbb6062f8eb: NFS: Clear the file access cache

[Kernel-packages] [Bug 2008971] Re: Do not sort the task scan result from /proc when synthesizing perf events

2023-03-01 Thread ChengEn, Du
** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Assignee: (unassigned) => ChengEn, Du (chengendu) ** Changed in: linux (Ubuntu Jammy) Assignee: (unassigned) => ChengEn, Du (chengendu) ** Changed in: linux (

[Kernel-packages] [Bug 2008971] [NEW] Do not sort the task scan result from /proc when synthesizing perf events

2023-03-01 Thread ChengEn, Du
Public bug reported: [Impact] The perf tool use scandir() to iterate threads and sort in alphabetical order when synthesizing PERF_RECORD_ events. If the process ID is and it has one thread (tid = 1), the thread will be processed before the process. It results in PERF_RECORD_FORK

[Kernel-packages] [Bug 2003053] Re: NFS: client permission error after adding user to permissible group

2023-02-28 Thread ChengEn, Du
The focal-proposed kernel has been tested in linux/5.4.0-144.161. ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 2003053] Re: NFS: client permission error after adding user to permissible group

2023-02-12 Thread ChengEn, Du
I have used the following kernel in -proposed for testing: linux/4.15.0-206.217 for bionic linux/5.4.0-144.161 for focal linux/5.15.0-66.73 for jammy linux/5.19.0-35.36 for kinetic The issue no longer exists by testing with the same test plan. ** Tags removed:

[Kernel-packages] [Bug 2003053] Re: NFS: client permission error after adding user to permissible group

2023-01-18 Thread ChengEn, Du
ncomplete => In Progress ** Changed in: linux (Ubuntu Lunar) Status: Incomplete => In Progress ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => ChengEn, Du (chengendu) ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => ChengEn, Du (chengendu)

[Kernel-packages] [Bug 2003053] [NEW] NFS: client permission error after adding user to permissible group

2023-01-17 Thread ChengEn, Du
Public bug reported: [Impact] The NFS client's access cache becomes stale due to the user's group membership changing on the server after the user has already logged in on the client. The access cache only expires if either NFS_INO_INVALID_ACCESS flag is on or timeout (without delegation).

[Kernel-packages] [Bug 1991774] Re: Memory leak while using NFQUEUE to delegate the decision on TCP packets to userspace processes

2022-10-19 Thread ChengEn, Du
I have used the linux/4.15.0-195.206 kernel in -proposed for testing. The issue no longer exists by testing with the same test plan. ** Tags added: verification-done-bionic -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1991774] Re: Memory leak while using NFQUEUE to delegate the decision on TCP packets to userspace processes

2022-10-06 Thread ChengEn, Du
** Changed in: linux (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1991774 Title: Memory leak while using NFQUEUE to delegate the

[Kernel-packages] [Bug 1991774] Re: Memory leak while using NFQUEUE to delegate the decision on TCP packets to userspace processes

2022-10-05 Thread ChengEn, Du
** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => ChengEn, Du (chengendu) ** Changed in: linux (Ubuntu) Assignee: (unassigned) => ChengEn, Du (chengendu) ** Changed in: linux (Ubuntu) Status: Incomplete => In Progress ** Changed in: linux (Ubun

[Kernel-packages] [Bug 1991774] Re: Memory leak while using NFQUEUE to delegate the decision on TCP packets to userspace processes

2022-10-05 Thread ChengEn, Du
** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1991774 Title: Memory leak while using NFQUEUE to

[Kernel-packages] [Bug 1991774] Re: Memory leak while using NFQUEUE to delegate the decision on TCP packets to userspace processes

2022-10-05 Thread ChengEn, Du
** Description changed: [Impact] Environment: v4.15.0-177-generic Xenial ESM Using NFQUEUE to delegate the decision on TCP packets to userspace processes will cause memory leak. The symptom is that TCP slab objects will accumulate and eventually cause OOM. [Fix] There is

[Kernel-packages] [Bug 1991774] [NEW] Memory leak while using NFQUEUE to delegate the decision on TCP packets to userspace processes

2022-10-05 Thread ChengEn, Du
Public bug reported: [Impact] Environment: v4.15.0-177-generic Xenial ESM Using NFQUEUE to delegate the decision on TCP packets to userspace processes will cause memory leak. The symptom is that TCP slab objects will accumulate and eventually cause OOM. [Fix] There is a discrepancy between