/srv/irclogs.ubuntu.com/2018/08/07/#ubuntu-devel.txt

mwhudsonwhy would i be getting messages like00:45
mwhudsonqemu-system-x86_64: failed to initialize KVM: Cannot allocate memory00:45
mwhudsonmore often in cosmic?00:46
mwhudsoni have a lot of ram free now00:46
tsimonq2mwhudson: What really grinds my gears about that is that when I go back and adjust the RAM but don't touch anything else, it won't let me install because of the storage being incorrect...00:46
tsimonq2^_^00:46
mwhudsontsimonq2: hmm?00:47
tsimonq2mwhudson: I've encountered that before, but for me it's always been faulty.00:48
=== sergiusens_ is now known as sergiusens
cpaelzermwhudson: I'd not know of a particular reason why you'd fail more often to allocate memory04:03
cpaelzermwhudson: for me - personally - I had to realize that new chrome and KDE seems to hog a bit more ram than in the past04:04
Laneylooks like mariadb-server-10.1 is hanging somewhere in postinst on the arm64 autopkgtests08:28
LaneyLocutusOfBorg: that's your upload - bug #178576708:32
ubottubug 1785767 in mariadb-10.1 (Ubuntu) "1:10.1.34-1 hanging in postinst of mariadb-server-10.1 on arm64" [Undecided,New] https://launchpad.net/bugs/178576708:32
LaneyI'm going to try to do something to make it fail instead of going around forever08:33
=== mwsb1 is now known as mwsb
scienteskvm doesn't bring up a display anymore12:08
scientessudo kvm -m 4096M -drive format=raw,file=/dev/sdd -boot menu=on -cdrom /home/shawn/Downloads/debian-testing-amd64-DVD-1.iso12:08
scientes[sudo] password for shawn:12:08
scientesNo protocol specified12:08
scientesUnable to init server: Could not connect: Connection refused12:08
scientesqemu-system-x86_64: warning: host doesn't support requested feature: CPUID.01H:ECX.vmx [bit 5]12:08
scientesgtk initialization failed12:08
=== sergiusens_ is now known as sergiusens
TJ-scientes: check the host's /proc/cpuinfo flags: field for vmx12:09
TJ-scientes: has it got flipped off in the PC firmware setup?12:10
scientesTJ-, no it works, it worked before i upgraded12:10
scientesand i'm running amd12:10
TJ-scientes: what does "kvm-ok" report?12:10
scientes$ kvm-ok12:11
scientesINFO: /dev/kvm exists12:11
scientesKVM acceleration can be used12:11
TJ-which kernel is this with?12:11
scientes4.17.0-6-generic12:11
scientesamd6412:11
scientesi think kvm works12:11
scientesthe problem is bringing up the graphics12:12
scienteslike qemu-system-x86_64 changed its defaults12:12
TJ-scientes: ahh, OK, the vmx might be just a warning since it's not an Intel CPU... weird though, you'd think it's know the difference between Intel and AMD12:12
TJ-scientes: "connection refused" - check /var/log/auth.log12:13
TJ-scientes: I wonder if it's an apparmor profile issue, dmesg/kern.log/syslog might give a clue12:13
scientesnothing in dmesg12:14
scientesjournalctl -f => nothing12:14
TJ-scientes: the mention of "protocol" makes me think it may simply not know how to connect to the hypervisor.12:15
TJ-scientes: I get a different warning but the GUI console starts "qemu-system-x86_64: warning: TCG doesn't support requested feature: CPUID.01H:ECX.vmx [bit 5]"12:17
TJ-scientes: try runinng it under strace, as in sudo strace -fe trace=file qemu-system-x86_64 ... |& tee /tmp/kvm.log12:18
scientesvirt-manager seems to work12:18
scientesso again I think its a graphics issue12:18
TJ-scientes: try "-display sdl" (I think the default is "-display gtk"12:22
scientesqemu-system-x86_64: Display 'sdl' is not available.12:22
scientesyeah i tried that earlier12:22
scientesi managed to work around the problem with virt-manager12:22
TJ-scientes: does "-display gtk" cause the same issue?12:25
scientesyes12:25
TJ-scientes: ahhh, apparently this is because you're running as root (sudo) and the root user doesn't have access to the display any more. Is this a wayland session by any chance?12:26
scientesyes12:26
scientesbut it worked in wayland before12:26
scientesmaybe cause it was dsl12:26
scientes*sdl12:26
scientesit worked in Bionic12:27
TJ-scientes: possibly it needs the xhost workaround12:28
scienteshmm guess i need that the virt-manager workaround didn't work cause i had to forward the usb stick12:29
scienteswhich must be buggy12:29
scientesinstead of just the raw /dev/sdd12:30
scientesor maybe Ill just install normally12:30
cpaelzerTJ as you found vmx/svm warnings are just not-the-cpu12:36
cpaelzeryes it could detect a lot, but then users would need to set one or the other12:36
cpaelzerthe current form has the annoying warning but works without touching the cpu definitions12:36
cpaelzerand yes sdl->gtk is a cosmic and later thing12:37
scientescpaelzer, how do i install sdl for qemu?12:37
scientesdo i need to build from source?12:37
cpaelzerit was a switch from sdl to gtk backend12:38
cpaelzerso sdl isn't configured anymore atm12:38
cpaelzersdl1 is supposed to fade out12:38
scientesbut it worked!12:38
cpaelzerand sdl2 had too much issues12:38
TJ-cpaelzer: is there a workaround for this running-as-root issue? or should the user be member of an additional group like "disks" to ensure kvm can operate unprivileged?12:39
cpaelzerI need to read the backlog what your problem is, juts a sec ...12:39
TJ-I recall in the dim distant past for kvm unprivileged adding groups disk plugdev cdrom dialout12:40
cpaelzerthat depends on what you are expecteing to have qemu do for you12:40
cpaelzerat the very least kvm to use HW virt12:40
cpaelzercdrom obviously if you want to install from CD and so on ...12:41
TJ-cpaelzer: of course, in this case scientes is accessing raw /dev/sdd so the process would need r/w access to that12:41
cpaelzeryep12:41
cpaelzerbut in general if sudo is wanted, it is not stripping the DISPLAY12:42
cpaelzer"sudo xeyes" (major Prod workload :-) ) - works fine12:43
scientesI'm just installing =nographic like a caveman12:43
scientesnah that doesn't seem to work12:43
scienteswith the debian testing cd12:43
scientesvirt-manager won't load /dev/sdd either12:45
cpaelzergrml - no graphical Cosmic around to try12:45
cpaelzer:-/12:45
cpaelzerstill maybe just needs xhost tweaks or such12:46
cpaelzerbut without retry I can't say for sure12:46
TJ-scientes: is the user a member of the libvirtd group?12:48
scientesi don't have that group12:48
scienteslibvirt:x:130:shawn12:49
scienteslibvirt-qemu:x:64055:libvirt-qemu12:49
cpaelzerin new installs the group is only libvirt I think12:49
cpaelzerand on upgrades it is libvirtd and libvirt on the same GID12:50
=== schout-it_ is now known as schout-it
=== jamespage is now known as JamesPage
=== JamesPage is now known as jamespage
kyrofaHey slangasek, continuing our discussion from yesterday (snaps in armhf autopkgtest), adding fuse got us further, but now we have apparmor issues: https://pastebin.ubuntu.com/p/pVtNGPnfpq/ . Do you know what the host OS is for these tests?15:16
kyrofaslangasek, also, https://git.launchpad.net/~ubuntu-release/autopkgtest/+git/development/tree/tools/autopkgtest-build-lxd doesn't look like it, but any chance this is a privileged container?15:20
kyrofaOr confined in some other way?15:23
slangasekkyrofa: host OS is an LTS, it's probably still xenial rather than bionic; I don't know how privileged the containers are, that's something I would have to look at - I don't think we're doing any handling of lxd profiles the way launchpad does15:26
kyrofaslangasek, huh, xenial should be fine. If they're unprivileged that should also be fine, but sounds like their being privileged would be an issue15:43
slangasekoh interesting15:43
kyrofaslangasek, I'll try to see if I can duplicate on my rpi16:02
jamespageslangasek: hullo - do you think it might be possible to get the python 3.7 in bionic universe to a more maintained status?  there is a bit of a thread going on upstream in openstack about python 3.7 gating for changes, but the  gates always stick on our LTS'es - which currently means python 3.616:05
jamespagethat would also help our interim release work up until 20.04 which I guess we would like to not include python 3.6 :-016:06
slangasekjamespage: er, I think that's square peg, round hole; we should figure out how to get openstack to where it's able to CI against latest python3 without having to SRU newer pythons into an LTS16:07
slangasekI expect python3.8 will happen in 20.04 kind of timeframe, and we don't want to be SRUing that back to 18.04 either16:08
ahasenackany idea what is going on here? https://pastebin.ubuntu.com/p/CBvNgDmp9d/20:20
ahasenackthe python3-sss.install file specifies certain directories and files20:20
ahasenackbut what ends up in the package is something else, mangled20:21
ahasenackusr/lib/python3*/site-packages/pysss.so becomse usr/lib/python3/dist-packages/pysss.cpython-36m-x86_64-linux-gnu.so20:21
ahasenackand the build doesn't fail, not even due to the different directory (site-packages vs dist-packages)20:21
ahasenackwe have a delta with debian (this is the sssd package) that changes {site,dist}-packages/ in *.install files to *-packages/20:22
ahasenackbut without that delta, the build still works, and both packages (with and without the delta) end up with the mangled .so file20:22
TJ-ahasenack: "36m" looks like a shell ANSI colour code, and the rest is an arch triplet20:24
TJ-ahasenack: someone typed a [ or ] instead of { or }20:24
ahasenackit's the same in bionic20:25
ahasenackimport pysss and pysss_murmur works, so that mangling is expected20:29
ahasenackor rather, coped with20:29
TJ-ahasenack: interestingly: ./build/ltmain.sh:498:        tc_blue='';  tc_cyan='36m'20:41
ahasenackodd20:41
TJ-might be a red-herring but I suspect there's a shell script/Makefile with a typo20:42
TJ-because Makefiles use @TRIPLET@ as a replacable for the postinst scripts, as well20:43
ahasenackrun this and you will likely find tons of such files: find /usr/lib/python3/ -name '*.so'20:44
TJ-ahasenack: none... on Bionic20:46
ahasenackI have a ton20:46
ahasenacklike20:46
ahasenackpython3-systemd: /usr/lib/python3/dist-packages/systemd/_journal.cpython-36m-x86_64-linux-gnu.so20:46
TJ-ahaha,I mistyped as .do not .so, yes I see some now :)20:46
ahasenackok :)20:46
TJ-is there a bug in the python build tooling? that really looks strange20:47
ahasenackdon't know20:47
ahasenackI've heard the term "colouring" related to architectures before20:48
ahasenackhardware details, that kind of thing20:48
ahasenackI have to run, will check back later20:48
TJ-ahhh, makes sense, but can't find the 36m part documented20:49
TJ-ahasenack: solved! read the README.rst for the dh-python package, the output of pybuild apparently when set to site-packages is translated to dist-packages20:56
TJ-ahasenack: also it sets the cpython-36m-$TRIPLET into the name20:56
kyrofaslangasek, at long last, I found my rpi, got ubuntu core on there, installed lxd, created an instance... and snaps work fine on it21:01
kyrofaI can't seem to duplicate what we see in autopkgtests21:01
kyrofaslangasek, if I create a privileged container, snaps don't install but with different errors: https://pastebin.ubuntu.com/p/3QZkty2chS/21:19
kyrofaslangasek, I'm out of ideas regarding what's wrong without shell access. Something is odd with apparmor in the armhf autopkgtest runners21:20
slangasekkyrofa: do you want a dump of the container config, to try to replicate?21:22
kyrofaslangasek, wouldn't hurt21:22
kyrofaslangasek, while we continue digging into this, I'd like to land that test suite. It runs everywhere except armhf, and I'd obviously like to get it running there. Is that worth setting up an ignore, you think? Or should I disable those tests for armhf?21:25
slangasekkyrofa: short-term, I think the best approach that doesn't require us to use a huge hammer on the Ubuntu side and cause you to lose all CI gating for armhf, nor require you to hard-code an architecture exclusion list, is to mark that particular test as isolation-machine21:27
slangasekkyrofa: and then either it'll start to work at some future point when armhf stops using containers for autopkgtests, or we figure out what's incompatible and fix it, then drop that constraint from the control21:28
kyrofaslangasek, oh wait, that would run this in a VM?21:28
slangasekkyrofa: no, it would cause the test to be skipped because there is no VM available21:28
kyrofaAh, gotcha21:29
kyrofaslangasek, but the other architectures would continue working, as they're VMs anyway?21:29
slangasekkyrofa: https://paste.ubuntu.com/p/W7VX2SB5Fr/21:32
slangasekkyrofa: correct21:32
kyrofaslangasek, that must be lxd 2.something?21:38
slangasekkyrofa: appears to be 2.21 on xenial21:38
kyrofaslangasek, the raw.lxc looks interesting, but I've got 3.3 from the snap, changing tracks now21:39
kyrofaslangasek, heeey exact same error message, that's it! https://pastebin.ubuntu.com/p/mVBKB7ZSHn/22:00
kyrofaslangasek, do we know the reasoning behind that raw.lxc snippet?22:00
kyrofaslangasek, snaps work without it, and are broken with it22:01
slangasekkyrofa: not offhand.  I'll check vcs history22:01
kyrofaThank you22:01
slangasekkyrofa: nope, it's part of the original VCS import by pitti in 201622:02
slangasekohwait, that's a file rename22:02
kyrofaOh. Darn, less helpful22:02
* slangasek looks further22:02
kyrofaAh22:02
slangasekkyrofa: 94e64ec7287b5e8597037666f1e31223b02a0b4d "- "lxc.aa_profile=unconfined" to allow tests like pbuilder to mount /proc and other virtual file systems. Unprivileged containers can't do seriously bad things anyway, so AppArmor is just a backup line of defence. But that's too strict for several tests."22:03
slangasekso it's been that way since 2015 and it appears we're now in the state that either direction we flip it, some tests will be unhappy22:04
kyrofaslangasek, huh, interesting. Do you see any path toward changing that, or allowing tests to somehow request normal unprivileged containers?22:05
slangasekI would rather we figure out what privileges are missing to let snapd be happy having privileges22:06
kyrofamvo is long EOD, zyga any chance you're around?22:07
kyrofajdstrand could probably help us understand what's happening here, as well22:10
kyrofaAssuming they're all EOD, we can reconvene in the morning slangasek :) . Good progress hunting this down today, thank you!22:13
=== blahdeblah_ is now known as blahdeblah

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!