Trusty NVMe boot fails on some systems

Bug #1720867 reported by Kamal Mostafa
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Undecided
Kamal Mostafa
Trusty
Fix Released
Undecided
Kamal Mostafa

Bug Description

Trusty linux (3.13) fails to boot on some NVMe-based cloud instance types.

[Impact]

 * Ubuntu trusty images can't be used on some NVMe-based cloud instance types.

 * Mainline commit a522905 "NVMe: Always use MSI/MSI-x interrupts" fixes the issue; application of this to 3.13 requires a set of prerequisite patches, and a minor backport.

a522905 NVMe: Always use MSI/MSI-x interrupts
e32efbf NVMe: make setup work for devices that don't do INTx
be577fa nvme: Use pci_enable_msi_range() and pci_enable_msix_range()
42f6142 NVMe: per-cpu io queues
4f5099a NVMe: IOCTL path RCU protect queue access
5a92e70 NVMe: RCU protected access to io queues

[Test Case]

 * Verify that a trusty-based image can boot on the affected instance type.

[Regression Potential]

 * This change set affects all users of the NVMe driver, so regression potential is moderate to high. Additional soak testing may be warranted before merging this patch set.

 * The patched NVMe driver has been exercised by Dan Streetman, and given the thumbs-up.

Changed in linux (Ubuntu Trusty):
assignee: nobody → Kamal Mostafa (kamalmostafa)
status: New → In Progress
Changed in linux (Ubuntu):
status: New → In Progress
Revision history for this message
Kamal Mostafa (kamalmostafa) wrote :

Taihsiang Ho (Canonical Cert) has performed the routine desktop certification test plan for SRU, and reports NO REGRESSIONS from the test kernel with this patch set:

------

Test release: 14.04.1

The base kernel: 3.13.0-133.182
The patch kernel: 3.13.0-133.182+nvmemsi

Test platforms:

Dell OptiPlex 7450 AIO (CID 201606-22472)
Sky Lake Xeon E3-1200 v5/E3-1500 v5/6th Gen Core Processor PCIe Controller [8086:1901]
Non-Volatile memory controller [0108]: Device [1c5c:1284]

Dell Computer Corporation Precision 5510 (Code name: Berlinetta P) (CID 201612-25281)
Sky Lake Xeon E3-1200 v5/E3-1500 v5/6th Gen Core Processor PCIe Controller [8086:1901]
Non-Volatile memory controller [0108]: Samsung Electronics Co Ltd Device [144d:a802] (rev 01)

Changed in linux (Ubuntu Trusty):
status: In Progress → Fix Committed
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-trusty' to 'verification-done-trusty'. If the problem still exists, change the tag 'verification-needed-trusty' to 'verification-failed-trusty'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: verification-needed-trusty
tags: added: verification-done-trusty
removed: verification-needed-trusty
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 3.13.0-135.184

---------------
linux (3.13.0-135.184) trusty; urgency=low

  * linux: 3.13.0-135.184 -proposed tracker (LP: #1724500)

  * Trusty NVMe boot fails on some systems (LP: #1720867)
    - NVMe: RCU protected access to io queues
    - NVMe: IOCTL path RCU protect queue access
    - powerpc/mm: fix ".__node_distance" undefined
    - NVMe: per-cpu io queues
    - nvme: Use pci_enable_msi_range() and pci_enable_msix_range()
    - NVMe: make setup work for devices that don't do INTx
    - NVMe: Always use MSI/MSI-x interrupts

linux (3.13.0-134.183) trusty; urgency=low

  * linux: 3.13.0-134.183 -proposed tracker (LP: #1722335)

  [ Thadeu Lima de Souza Cascardo ]
  * CVE-2017-10661
    - timerfd: Protect the might cancel mechanism proper

  * CVE-2017-10662
    - f2fs: sanity check segment count

  * CVE-2017-10663
    - f2fs: sanity check checkpoint segno and blkoff

  * CVE-2017-14340
    - xfs: XFS_IS_REALTIME_INODE() should be false if no rt device present

  * CVE-2017-10911
    - xen-blkback: don't leak stack data via response ring

  * CVE-2017-11176
    - mqueue: fix a use-after-free in sys_mq_notify()

  * CVE-2016-8632
    - tipc: check minimum bearer MTU

 -- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 18 Oct 2017 07:09:04 -0200

Changed in linux (Ubuntu Trusty):
status: Fix Committed → Fix Released
status: Fix Committed → Fix Released
Po-Hsu Lin (cypressyew)
Changed in linux (Ubuntu):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.