[Bug 2054218] Re: kvm: Running perf against qemu processes results in page fault inside guest
This bug is awaiting verification that the linux-raspi/6.5.0-1014.17 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-mantic-linux-raspi' to 'verification-done- mantic-linux-raspi'. If the problem still exists, change the tag 'verification-needed-mantic-linux-raspi' to 'verification-failed-mantic- linux-raspi'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-mantic-linux-raspi-v2 verification-needed-mantic-linux-raspi -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2054218 Title: kvm: Running perf against qemu processes results in page fault inside guest To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2054218/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2054218] Re: kvm: Running perf against qemu processes results in page fault inside guest
This bug was fixed in the package linux - 6.5.0-27.28 --- linux (6.5.0-27.28) mantic; urgency=medium * mantic/linux: 6.5.0-27.28 -proposed tracker (LP: #2055584) * Packaging resync (LP: #1786013) - [Packaging] drop ABI data - [Packaging] update annotations scripts - debian.master/dkms-versions -- update from kernel-versions (main/2024.03.04) * CVE-2024-26597 - net: qualcomm: rmnet: fix global oob in rmnet_policy * CVE-2024-26599 - pwm: Fix out-of-bounds access in of_pwm_single_xlate() * Drop ABI checks from kernel build (LP: #2055686) - [Packaging] Remove in-tree abi checks * Cranky update-dkms-versions rollout (LP: #2055685) - [Packaging] remove update-dkms-versions - Move debian/dkms-versions to debian.master/dkms-versions - [Packaging] Replace debian/dkms-versions with $(DEBIAN)/dkms-versions * linux: please move erofs.ko (CONFIG_EROFS for EROFS support) from linux- modules-extra to linux-modules (LP: #2054809) - UBUNTU [Packaging]: Include erofs in linux-modules instead of linux-modules- extra * performance: Scheduler: ratelimit updating of load_avg (LP: #2053251) - sched/fair: Ratelimit update to tg->load_avg * IB peer memory feature regressed in 6.5 (LP: #2055082) - SAUCE: RDMA/core: Introduce peer memory interface * linux-tools-common: man page of usbip[d] is misplaced (LP: #2054094) - [Packaging] rules: Put usbip manpages in the correct directory * CVE-2024-23851 - dm: limit the number of targets and parameter size area * CVE-2024-23850 - btrfs: do not ASSERT() if the newly created subvolume already got read * x86: performance: tsc: Extend watchdog check exemption to 4-Sockets platform (LP: #2054699) - x86/tsc: Extend watchdog check exemption to 4-Sockets platform * linux: please move dmi-sysfs.ko (CONFIG_DMI_SYSFS for SMBIOS support) from linux-modules-extra to linux-modules (LP: #2045561) - [Packaging] Move dmi-sysfs.ko into linux-modules * Fix AMD brightness issue on AUO panel (LP: #2054773) - drm/amdgpu: make damage clips support configurable * Mantic update: upstream stable patchset 2024-02-28 (LP: #2055199) - f2fs: explicitly null-terminate the xattr list - pinctrl: lochnagar: Don't build on MIPS - ALSA: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro - mptcp: fix uninit-value in mptcp_incoming_options - wifi: cfg80211: lock wiphy mutex for rfkill poll - wifi: avoid offset calculation on NULL pointer - wifi: mac80211: handle 320 MHz in ieee80211_ht_cap_ie_to_sta_ht_cap - debugfs: fix automount d_fsdata usage - nvme-core: fix a memory leak in nvme_ns_info_from_identify() - drm/amd/display: update dcn315 lpddr pstate latency - drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer - smb: client, common: fix fortify warnings - blk-mq: don't count completed flush data request as inflight in case of quiesce - nvme-core: check for too small lba shift - hwtracing: hisi_ptt: Handle the interrupt in hardirq context - hwtracing: hisi_ptt: Don't try to attach a task - ASoC: wm8974: Correct boost mixer inputs - arm64: dts: rockchip: fix rk356x pcie msg interrupt name - ASoC: Intel: Skylake: Fix mem leak in few functions - ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 - ASoC: Intel: Skylake: mem leak in skl register function - ASoC: cs43130: Fix the position of const qualifier - ASoC: cs43130: Fix incorrect frame delay configuration - ASoC: rt5650: add mutex to avoid the jack detection failure - ASoC: Intel: skl_hda_dsp_generic: Drop HDMI routes when HDMI is not available - nouveau/tu102: flush all pdbs on vmm flush - ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 - ASoC: hdac_hda: Conditionally register dais for HDMI and Analog - net/tg3: fix race condition in tg3_reset_task() - ASoC: da7219: Support low DC impedance headset - nvme: introduce helper function to get ctrl state - nvme: prevent potential spectre v1 gadget - arm64: dts: rockchip: Fix PCI node addresses on rk3399-gru - drm/amdgpu: Add NULL checks for function pointers - drm/exynos: fix a potential error pointer dereference - drm/exynos: fix a wrong error checking - hwmon: (corsair-psu) Fix probe when built-in - LoongArch: Preserve syscall nr across execve() - clk: rockchip: rk3568: Add PLL rate for 292.5MHz - clk: rockchip: rk3128: Fix HCLK_OTG gate register - jbd2: correct the printing of write_flags in jbd2_write_superblock() - jbd2: increase the journal IO's priority - drm/crtc: Fix uninit-value bug in drm_mode_setcrtc - neighbour: Don't let neigh_forced_gc() disable preemption for long - platform/x86: intel-vbtn: Fix missing tablet-mode-switch events - jbd2: fix soft lockup in journal_finish_inode_data_buffe
[Bug 2054218] Re: kvm: Running perf against qemu processes results in page fault inside guest
Performing verification for mantic. I deployed mantic onto a bare metal server, with kernel 6.5.0-26-generic from -updates. I installed a KVM stack, synced a cloud image, and tested VM creation. $ uvt-kvm create --cpu 4 --memory 4096 --disk 10 jammy-a release=jammy arch=amd64 $ uvt-kvm ssh jammy-a Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 5.15.0-101-generic x86_64) From there, I found the PID of the VM: $ ps aux | grep qemu libvirt+1799 107 1.5 9642380 1044752 ? Sl 03:21 0:38 /usr/bin/qemu-system-x86_64 -name guest=jammy-a,debug-threads=on -S -object {"qom-ty We run perf: $ sudo perf top -p 1799 $ virsh console jammy-a Connected to domain 'jammy-a' Escape character is ^] (Ctrl + ]) [ 161.413890] BUG: unable to handle page fault for address: fe18cdb1c028 [ 161.419474] #PF: supervisor read access in kernel mode [ 161.423707] #PF: error_code(0x) - not-present page [ 161.427949] PGD 17ffca0[ 161.429508] BUG: unable to handle page fault for address: fe18cdb1c028 [ 161.429513] #PF: supervisor read access in kernel mode [ 161.429516] #PF: error_code(0x) - n The VM suffers a page fault and crashes, and is not accessible over ssh. $ uvt-kvm ssh jammy-a (no response). I then enabled -proposed, and installed 6.5.0-27-generic: $ uname -rv 6.5.0-27-generic #28-Ubuntu SMP PREEMPT_DYNAMIC Thu Mar 7 18:21:00 UTC 2024 $ uvt-kvm create --cpu 4 --memory 4096 --disk 10 jammy-a release=jammy arch=amd64 $ uvt-kvm ssh jammy-a Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 5.15.0-101-generic x86_64) We get the pid of the VM: $ ps aux | grep qemu libvirt+1786 42.5 1.5 7960876 1022308 ? Sl 03:37 0:40 /usr/bin/qemu-system-x86_64 -name guest=jammy-a,debug-threads=on -S -object {"qom-ty We run perf: $ sudo perf top -p 1786 This time, the VM does not crash, and stays running: $ virsh console jammy-a Connected to domain 'jammy-a' Escape character is ^] (Ctrl + ]) jammy-a login: jammy-a login: We can also ssh to the VM just fine: $ uvt-kvm ssh jammy-a Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 5.15.0-101-generic x86_64) This is much better. The kernel in -proposed fixes the issue, happy to mark verified for mantic. ** Tags removed: verification-needed-mantic-linux ** Tags added: verification-done-mantic-linux -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2054218 Title: kvm: Running perf against qemu processes results in page fault inside guest To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2054218/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2054218] Re: kvm: Running perf against qemu processes results in page fault inside guest
This bug is awaiting verification that the linux/6.5.0-27.28 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-mantic-linux' to 'verification-done-mantic-linux'. If the problem still exists, change the tag 'verification-needed-mantic- linux' to 'verification-failed-mantic-linux'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-mantic-linux-v2 verification-needed-mantic-linux -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2054218 Title: kvm: Running perf against qemu processes results in page fault inside guest To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2054218/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2054218] Re: kvm: Running perf against qemu processes results in page fault inside guest
** Changed in: linux (Ubuntu Mantic) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2054218 Title: kvm: Running perf against qemu processes results in page fault inside guest To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2054218/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs