Activity log for bug #1974017

Date Who What changed Old value New value Message
2022-05-18 11:39:22 bugproxy bug added bug
2022-05-18 11:39:24 bugproxy tags architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004
2022-05-18 11:39:25 bugproxy ubuntu: assignee Skipper Bug Screeners (skipper-screen-team)
2022-05-18 11:39:29 bugproxy affects ubuntu linux (Ubuntu)
2022-05-18 12:19:36 Frank Heimes bug task added ubuntu-z-systems
2022-05-18 12:20:04 Frank Heimes ubuntu-z-systems: assignee Skipper Bug Screeners (skipper-screen-team)
2022-05-18 12:20:11 Frank Heimes ubuntu-z-systems: importance Undecided Medium
2022-05-18 12:28:21 Frank Heimes nominated for series Ubuntu Focal
2022-05-18 12:28:21 Frank Heimes bug task added linux (Ubuntu Focal)
2022-05-18 12:28:21 Frank Heimes nominated for series Ubuntu Jammy
2022-05-18 12:28:21 Frank Heimes bug task added linux (Ubuntu Jammy)
2022-05-18 12:28:21 Frank Heimes nominated for series Ubuntu Impish
2022-05-18 12:28:21 Frank Heimes bug task added linux (Ubuntu Impish)
2022-05-18 14:16:03 Frank Heimes linux (Ubuntu Jammy): assignee Frank Heimes (fheimes)
2022-05-18 14:16:09 Frank Heimes ubuntu-z-systems: status New In Progress
2022-05-18 14:16:13 Frank Heimes linux (Ubuntu Jammy): status New In Progress
2022-05-18 19:58:52 Pedro Principeza bug added subscriber Pedro Principeza
2022-05-19 05:34:22 Frank Heimes description KVM nesting support consumes too much memory When running KVM with nesting support (kvm.nested=1 on the kernel command line) the shadow page table code will produce too many entries in the shadow code. There is an upstream fix that will prevent the majority of the problem: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06afe8383080c630a7a528b8382fc6bb4925b61 The fix is needed for 20.04 and 22.04. SRU Justification: ================== [Impact] * If running KVM with nesting support (e.g. 'kvm.nested=1' on the kernel command line), the shadow page table code will produce too many entries in the shadow code. * The below mentioned upstream fix will prevent the entries from being piled up, by checking for existing entries at insert time. * This measurably reduces the list length and is faster than traversing the list at shutdown time only. [Fix] * a06afe8383080c630a7a528b8382fc6bb4925b61 a06afe838308 "KVM: s390: vsie/gmap: reduce gmap_rmap overhead" [Test Plan] * A IBM zSystems or LinuxONE LPAR on a z13 or newer is needed. * Ubuntu focal, impish or jammy needs to be installed and the Ubuntu LPAR setup as (1st level) KVM host, allowing nested virtualization. * Now setup one (or more) KVM virtual machines, with similar Ubuntu releases, and define one or more of them again as (2nd level) KVM host. * Define several KVM virtual machines on this (2nd level) KVM host in a memory constraint fashion, so that a lot of memory mapping is caused. * Let such a system run for a while under load. * Now shutdown one (or more) 2nd level VMs and notice the time it takes. * With the patch in place this time should be considerably quicker than without. * The result is reduced mapping (gmap_rmap) overhead, less danger of leaking memory and a better responding system. [Where problems could occur] * In case wrong entries are freed up this will harm the virtual memory management and may even lead to crashes. * In case the pointer handling is not done properly, again crashes may occur. * But with net just five new lines the patch is pretty short, readable and the modifications traceable in arch/s390/mm/gmap.c only. * The changes are limited to s390/mm only, hence don't affect other architectures. [Other Info] * The commit was upstream accepted in v5.18-rc6. * Since the planned target kernel for kinetic is 5.19, the kinetic kernel does not need to be patched. * Hence the SRUs are for jammy, impish and focal. __________ KVM nesting support consumes too much memory When running KVM with nesting support (kvm.nested=1 on the kernel command line) the shadow page table code will produce too many entries in the shadow code. There is an upstream fix that will prevent the majority of the problem: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06afe8383080c630a7a528b8382fc6bb4925b61 The fix is needed for 20.04 and 22.04.
2022-05-19 06:43:49 Frank Heimes linux (Ubuntu Impish): status New In Progress
2022-05-19 06:43:53 Frank Heimes linux (Ubuntu Focal): status New In Progress
2022-05-19 06:44:07 Frank Heimes linux (Ubuntu Focal): assignee Canonical Kernel Team (canonical-kernel-team)
2022-05-19 06:44:15 Frank Heimes linux (Ubuntu Impish): assignee Canonical Kernel Team (canonical-kernel-team)
2022-05-19 06:44:26 Frank Heimes linux (Ubuntu Jammy): assignee Frank Heimes (fheimes) Canonical Kernel Team (canonical-kernel-team)
2022-05-19 07:45:34 Stefan Bader linux (Ubuntu Focal): importance Undecided Medium
2022-05-19 07:45:39 Stefan Bader linux (Ubuntu Impish): importance Undecided Medium
2022-05-19 07:45:43 Stefan Bader linux (Ubuntu Jammy): importance Undecided Medium
2022-05-19 07:45:50 Stefan Bader linux (Ubuntu): status New Invalid
2022-05-27 08:42:22 Kleber Sacilotto de Souza linux (Ubuntu Focal): status In Progress Fix Committed
2022-05-27 08:42:24 Kleber Sacilotto de Souza linux (Ubuntu Impish): status In Progress Fix Committed
2022-05-27 08:42:26 Kleber Sacilotto de Souza linux (Ubuntu Jammy): status In Progress Fix Committed
2022-05-27 08:51:34 Frank Heimes ubuntu-z-systems: status In Progress Fix Committed
2022-06-03 10:41:46 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-jammy
2022-06-16 22:16:40 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-jammy architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-focal verification-needed-jammy
2022-06-16 22:42:58 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-focal verification-needed-jammy architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-focal verification-needed-impish verification-needed-jammy
2022-06-20 10:59:54 bugproxy tags architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-focal verification-needed-impish verification-needed-jammy architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-done-impish verification-needed-focal verification-needed-jammy
2022-06-20 11:09:36 bugproxy tags architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-done-impish verification-needed-focal verification-needed-jammy architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-done-focal verification-done-impish verification-done-jammy
2022-06-22 15:04:22 Launchpad Janitor linux (Ubuntu Focal): status Fix Committed Fix Released
2022-06-22 15:04:22 Launchpad Janitor cve linked 2022-28388
2022-06-22 15:04:36 Launchpad Janitor linux (Ubuntu Impish): status Fix Committed Fix Released
2022-06-22 15:04:51 Launchpad Janitor linux (Ubuntu Jammy): status Fix Committed Fix Released
2022-06-22 15:17:04 Frank Heimes ubuntu-z-systems: status Fix Committed Fix Released