Bug 2110203
Summary: | zerocopy capability can be enabled when set migrate capabilities with multifd and compress/xbzrle together | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Li Xiaohui <xiaohli> | |
Component: | qemu-kvm | Assignee: | Leonardo Bras <leobras> | |
qemu-kvm sub component: | Live Migration | QA Contact: | Li Xiaohui <xiaohli> | |
Status: | CLOSED ERRATA | Docs Contact: | ||
Severity: | medium | |||
Priority: | medium | CC: | chayang, chdong, coli, dgilbert, fjin, jinzhao, juzhang, lcheng, leobras, lijin, mdean, mrezanin, peterx, quintela, virt-maint, ymankad | |
Version: | 8.7 | Keywords: | Triaged, ZStream | |
Target Milestone: | rc | |||
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | qemu-kvm-6.2.0-19.module+el8.7.0+16358+eef3c6a2 | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | 2107466 | |||
: | 2117253 (view as bug list) | Environment: | ||
Last Closed: | 2022-11-08 09:20:55 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 2072049, 2107466 | |||
Bug Blocks: |
Description
Li Xiaohui
2022-07-24 14:21:10 UTC
Leo since you already own the cloned from bug, I'll assign directly to you. (In reply to John Ferlan from comment #1) > Leo since you already own the cloned from bug, I'll assign directly to you. Sure, no problem. It this one completely fixed by the brew I provided in the original bug, right? (In reply to Leonardo Bras from comment #2) > (In reply to John Ferlan from comment #1) > > Leo since you already own the cloned from bug, I'll assign directly to you. > > Sure, no problem. > > It this one completely fixed by the brew I provided in the original bug, > right? This bug is for rhel8.7.0, and the brew you provided in https://bugzilla.redhat.com/show_bug.cgi?id=1968509#c26 have fixed the rhel9 issues. So now you need to fix these issues for RHEL 8.7.0. (In reply to Li Xiaohui from comment #3) [...] > So now you need to fix these issues for RHEL 8.7.0. I have created a MR for those changes on top of rhel8.7: https://gitlab.com/redhat/rhel/src/qemu-kvm/qemu-kvm/-/merge_requests/201 It's still in 'draft' because there is a patch which is still under review upstream: the one that fixes zero-copy-send & tls-creds config order.[1] I have created a brew which already includes the above build, if yoo think it's interesting to test: https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=46761695 [1] http://patchwork.ozlabs.org/project/qemu-devel/patch/20220726010235.342927-1-leobras@redhat.com/) (In reply to Leonardo Bras from comment #2) > (In reply to John Ferlan from comment #1) > > Leo since you already own the cloned from bug, I'll assign directly to you. > > Sure, no problem. > > It this one completely fixed by the brew I provided in the original bug, > right? Feel free to add a needinfo on me for questions... It'll get my attention quicker usually. Essentially you have an upstream set of patches which you need to backport to both RHEL9 (bug 2107466) and RHEL8 (this one). In the long run the order isn't all that important, just that both get the patches. Now that you have this series, I'm going to add ITR=8.7.0 for this bug with a DTM=24 (Developer Target Milestone) which leaves us 2 weeks to get downstream reviews completed. QE then usually adds 2 to the DTM to set ITM (Internal Target Milestone). Our "goal" is to be "done" by ITM=26 and leave essentially critical things beyond that. In RHEL release teams that's when exceptions must be requested. Furthermore, I assume this bug will eventually need a z-stream for 8.6.0 similar to bug 2072049, so I have added that as well with the dependency to that bug. Just trying to make sure everything we need is tracked. A brew that is supposed to fix this bug is already available at MR[1]: https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=47002821 [1] https://gitlab.com/redhat/rhel/src/qemu-kvm/qemu-kvm/-/merge_requests/201 The above MR is ready for merging, only waiting for 1 dev approval. (In reply to Leonardo Bras from comment #7) > A brew that is supposed to fix this bug is already available at MR[1]: > https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=47002821 I have used this scratch build to test zerocopy, following issues has been solved on qemu-kvm-6.2.0-18.el8.root202208061423.x86_64: 1. zerocopy capability can not be enabled when set migrate capabilities with multifd and compress/xbzrle together; 2. compress/xbzrle can not be enabled after zerocopy and multifd enabled; 3. get proper prompt when set tls on tls client after zerocopy enabled: {"execute": "migrate-set-parameters", "arguments": {"tls-creds": "tls0"}, "id": "PAwwXyyu"} {"id": "PAwwXyyu", "error": {"class": "GenericError", "desc": "Zero copy only available for non-compressed non-TLS multifd migration"}} So seems this build has fixed above issues. Thanks Leonardo. > > [1] https://gitlab.com/redhat/rhel/src/qemu-kvm/qemu-kvm/-/merge_requests/201 > The above MR is ready for merging, only waiting for 1 dev approval. QE bot(pre verify): Set 'Verified:Tested,SanityOnly' as gating/tier1 test pass. Verify this bug according to Comment 8 on qemu-kvm-6.2.0-19.module+el8.7.0+16358+eef3c6a2.x86_64, all issues have been fixed. Will mark this bug verified per test results after it's in on_qa status. Now remove 'SanityOnly' from 'Verified' since we have test steps to reproduce this bug Hi Miroslav, can you help add this bug to errata system then it can be changed into on_qa so that QE can mark this bug verified per Comment 11? *** Bug 2114852 has been marked as a duplicate of this bug. *** Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Low: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:7472 |