2022-05-18 11:39:22 |
bugproxy |
bug |
|
|
added bug |
2022-05-18 11:39:24 |
bugproxy |
tags |
|
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 |
|
2022-05-18 11:39:25 |
bugproxy |
ubuntu: assignee |
|
Skipper Bug Screeners (skipper-screen-team) |
|
2022-05-18 11:39:29 |
bugproxy |
affects |
ubuntu |
linux (Ubuntu) |
|
2022-05-18 12:19:36 |
Frank Heimes |
bug task added |
|
ubuntu-z-systems |
|
2022-05-18 12:20:04 |
Frank Heimes |
ubuntu-z-systems: assignee |
|
Skipper Bug Screeners (skipper-screen-team) |
|
2022-05-18 12:20:11 |
Frank Heimes |
ubuntu-z-systems: importance |
Undecided |
Medium |
|
2022-05-18 12:28:21 |
Frank Heimes |
nominated for series |
|
Ubuntu Focal |
|
2022-05-18 12:28:21 |
Frank Heimes |
bug task added |
|
linux (Ubuntu Focal) |
|
2022-05-18 12:28:21 |
Frank Heimes |
nominated for series |
|
Ubuntu Jammy |
|
2022-05-18 12:28:21 |
Frank Heimes |
bug task added |
|
linux (Ubuntu Jammy) |
|
2022-05-18 12:28:21 |
Frank Heimes |
nominated for series |
|
Ubuntu Impish |
|
2022-05-18 12:28:21 |
Frank Heimes |
bug task added |
|
linux (Ubuntu Impish) |
|
2022-05-18 14:16:03 |
Frank Heimes |
linux (Ubuntu Jammy): assignee |
|
Frank Heimes (fheimes) |
|
2022-05-18 14:16:09 |
Frank Heimes |
ubuntu-z-systems: status |
New |
In Progress |
|
2022-05-18 14:16:13 |
Frank Heimes |
linux (Ubuntu Jammy): status |
New |
In Progress |
|
2022-05-18 19:58:52 |
Pedro Principeza |
bug |
|
|
added subscriber Pedro Principeza |
2022-05-19 05:34:22 |
Frank Heimes |
description |
KVM nesting support consumes too much memory
When running KVM with nesting support (kvm.nested=1 on the kernel command line) the shadow page table code will produce too many entries in the shadow code.
There is an upstream fix that will prevent the majority of the problem:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06afe8383080c630a7a528b8382fc6bb4925b61
The fix is needed for 20.04 and 22.04. |
SRU Justification:
==================
[Impact]
* If running KVM with nesting support (e.g. 'kvm.nested=1' on the kernel
command line), the shadow page table code will produce too many entries
in the shadow code.
* The below mentioned upstream fix will prevent the entries from being
piled up, by checking for existing entries at insert time.
* This measurably reduces the list length and is faster than traversing
the list at shutdown time only.
[Fix]
* a06afe8383080c630a7a528b8382fc6bb4925b61 a06afe838308
"KVM: s390: vsie/gmap: reduce gmap_rmap overhead"
[Test Plan]
* A IBM zSystems or LinuxONE LPAR on a z13 or newer is needed.
* Ubuntu focal, impish or jammy needs to be installed
and the Ubuntu LPAR setup as (1st level) KVM host,
allowing nested virtualization.
* Now setup one (or more) KVM virtual machines,
with similar Ubuntu releases,
and define one or more of them again as (2nd level) KVM host.
* Define several KVM virtual machines on this (2nd level) KVM host
in a memory constraint fashion,
so that a lot of memory mapping is caused.
* Let such a system run for a while under load.
* Now shutdown one (or more) 2nd level VMs and notice the
time it takes.
* With the patch in place this time should be considerably
quicker than without.
* The result is reduced mapping (gmap_rmap) overhead,
less danger of leaking memory
and a better responding system.
[Where problems could occur]
* In case wrong entries are freed up this will harm the virtual
memory management and may even lead to crashes.
* In case the pointer handling is not done properly,
again crashes may occur.
* But with net just five new lines the patch is pretty short, readable
and the modifications traceable in arch/s390/mm/gmap.c only.
* The changes are limited to s390/mm only,
hence don't affect other architectures.
[Other Info]
* The commit was upstream accepted in v5.18-rc6.
* Since the planned target kernel for kinetic is 5.19,
the kinetic kernel does not need to be patched.
* Hence the SRUs are for jammy, impish and focal.
__________
KVM nesting support consumes too much memory
When running KVM with nesting support (kvm.nested=1 on the kernel command line) the shadow page table code will produce too many entries in the shadow code.
There is an upstream fix that will prevent the majority of the problem:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06afe8383080c630a7a528b8382fc6bb4925b61
The fix is needed for 20.04 and 22.04. |
|
2022-05-19 06:43:49 |
Frank Heimes |
linux (Ubuntu Impish): status |
New |
In Progress |
|
2022-05-19 06:43:53 |
Frank Heimes |
linux (Ubuntu Focal): status |
New |
In Progress |
|
2022-05-19 06:44:07 |
Frank Heimes |
linux (Ubuntu Focal): assignee |
|
Canonical Kernel Team (canonical-kernel-team) |
|
2022-05-19 06:44:15 |
Frank Heimes |
linux (Ubuntu Impish): assignee |
|
Canonical Kernel Team (canonical-kernel-team) |
|
2022-05-19 06:44:26 |
Frank Heimes |
linux (Ubuntu Jammy): assignee |
Frank Heimes (fheimes) |
Canonical Kernel Team (canonical-kernel-team) |
|
2022-05-19 07:45:34 |
Stefan Bader |
linux (Ubuntu Focal): importance |
Undecided |
Medium |
|
2022-05-19 07:45:39 |
Stefan Bader |
linux (Ubuntu Impish): importance |
Undecided |
Medium |
|
2022-05-19 07:45:43 |
Stefan Bader |
linux (Ubuntu Jammy): importance |
Undecided |
Medium |
|
2022-05-19 07:45:50 |
Stefan Bader |
linux (Ubuntu): status |
New |
Invalid |
|
2022-05-27 08:42:22 |
Kleber Sacilotto de Souza |
linux (Ubuntu Focal): status |
In Progress |
Fix Committed |
|
2022-05-27 08:42:24 |
Kleber Sacilotto de Souza |
linux (Ubuntu Impish): status |
In Progress |
Fix Committed |
|
2022-05-27 08:42:26 |
Kleber Sacilotto de Souza |
linux (Ubuntu Jammy): status |
In Progress |
Fix Committed |
|
2022-05-27 08:51:34 |
Frank Heimes |
ubuntu-z-systems: status |
In Progress |
Fix Committed |
|
2022-06-03 10:41:46 |
Ubuntu Kernel Bot |
tags |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-jammy |
|
2022-06-16 22:16:40 |
Ubuntu Kernel Bot |
tags |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-jammy |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-focal verification-needed-jammy |
|
2022-06-16 22:42:58 |
Ubuntu Kernel Bot |
tags |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-focal verification-needed-jammy |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-focal verification-needed-impish verification-needed-jammy |
|
2022-06-20 10:59:54 |
bugproxy |
tags |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-needed-focal verification-needed-impish verification-needed-jammy |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-done-impish verification-needed-focal verification-needed-jammy |
|
2022-06-20 11:09:36 |
bugproxy |
tags |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-done-impish verification-needed-focal verification-needed-jammy |
architecture-s39064 bugnameltc-198271 severity-high targetmilestone-inin2004 verification-done-focal verification-done-impish verification-done-jammy |
|
2022-06-22 15:04:22 |
Launchpad Janitor |
linux (Ubuntu Focal): status |
Fix Committed |
Fix Released |
|
2022-06-22 15:04:22 |
Launchpad Janitor |
cve linked |
|
2022-28388 |
|
2022-06-22 15:04:36 |
Launchpad Janitor |
linux (Ubuntu Impish): status |
Fix Committed |
Fix Released |
|
2022-06-22 15:04:51 |
Launchpad Janitor |
linux (Ubuntu Jammy): status |
Fix Committed |
Fix Released |
|
2022-06-22 15:17:04 |
Frank Heimes |
ubuntu-z-systems: status |
Fix Committed |
Fix Released |
|