[Bug 2044104] Comment bridged from LTC Bugzilla

2024-07-11 Thread bugproxy
Modify /usr/share/initramfs-tools/hooks/udev (shipped by udev, source:
system) to not copy the udev rules generated by chzdev. So changing:

Where are the initramfs-tools gone? Added them again ...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2044104

Title:
  [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with
  zdev:early=0 set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1982335] Comment bridged from LTC Bugzilla

2024-07-11 Thread bugproxy
--- Comment From ar...@de.ibm.com 2024-07-11 12:51 EDT---
> [...]
> A test build of the new valgrind version is now available here:
> https://launchpad.net/~fheimes/+archive/ubuntu/lp1982335

The build contains the requested support, and I didn't notice any
issues.  Looks good to me.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1982335

Title:
  [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1982335/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071774] Re: zfs-dkms FTBFS on Linux 6.10/s390x

2024-07-10 Thread bugproxy
** Tags added: architecture-s39064 bugnameltc-207402 severity-medium
targetmilestone-inin---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071774

Title:
  zfs-dkms FTBFS on Linux 6.10/s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071774/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064538] Re: Revert back frame pointers for s390x (remove -fno-omit-framepointer but use -mbackchain)

2024-07-10 Thread bugproxy
** Tags added: architecture-s39064 bugnameltc-207400 severity-medium
targetmilestone-inin---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064538

Title:
  Revert back frame pointers for s390x (remove -fno-omit-framepointer
  but use -mbackchain)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2064538/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072641] Comment bridged from LTC Bugzilla

2024-07-10 Thread bugproxy
--- Comment From boris.m...@de.ibm.com 2024-07-10 06:48 EDT---
The bug was introduced with kernel 5.14

The available patch (see upstream-ID in comment above) has been added to
stable for 5.15. which should help to get picked up by Jammy and later
releases.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072641

Title:
  [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072641] [NEW] [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

2024-07-10 Thread bugproxy
Public bug reported:

Description:   KVM: s390: unhandled guest LPSWEY instruction

Symptom:   guest kernel oops on LPSWEY instruction

Problem:   in rare cases like machine check injection with
   PSW disabled, all load PSW instructions are
   intercepted. LPSW and LPSWE are handled by KVM but
   not the new LPSWEY

Solution:  Provide an LPSWEY handler in KVM.

Reproduction:  hotplug a device while a CPU is disabled for machine
   checks, e.g. during early boot

Upstream-ID:   4c6abb7f7b349f00c0f7ed5045bf67759c012892

Preventive:yes
Reported:  upstream
Component: kernel

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Skipper Bug Screeners (skipper-screen-team)
 Status: New


** Tags: architecture-s39064 bugnameltc-207398 severity-medium 
targetmilestone-inin---

** Tags added: architecture-s39064 bugnameltc-207398 severity-medium
targetmilestone-inin---

** Changed in: ubuntu
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072641

Title:
  [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2072641/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062556] Comment bridged from LTC Bugzilla

2024-07-09 Thread bugproxy
--- Comment From kowshik.j...@in.ibm.com 2024-07-09 02:18 EDT---
I have verified the patch. It is working as expected. Please get the patch 
included in the upcoming build.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062556

Title:
  [Ubuntu-24.04] Hugepage memory is not getting released even after
  destroying the guest!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2062556/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060039] Comment bridged from LTC Bugzilla

2024-07-08 Thread bugproxy
--- Comment From hbath...@in.ibm.com 2024-07-08 04:19 EDT---
Fix accepted upstream (powerpc/next):

https://git.kernel.org/powerpc/c/353d7a84c214f
("powerpc/64s/radix/kfence: map __kfence_pool at page granularity")

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060039

Title:
  [Ubuntu-24.04] FADump with recommended crash size is making the L1
  hang

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2060039/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] Comment bridged from LTC Bugzilla

2024-07-03 Thread bugproxy
--- Comment From vanessa.ba...@ibm.com 2024-07-03 13:42 EDT---
Thank you! Will test and update results here :)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Comment bridged from LTC Bugzilla

2024-07-03 Thread bugproxy
--- Comment From niklas.schne...@ibm.com 2024-07-03 06:53 EDT---
(In reply to comment #11)
> Looks like it's not sufficient to have IOMMU_DEFAULT_DMA_LAZY=y only
> in addition IOMMU_DEFAULT_DMA_STRICT=n seems to be needed on top (otherwise
> the build failed for me).
> (Which I think is not super great upstream, one option should be fine --
> with the two kernel options, there are now two unspecific cases: both n and
> both y - anyway ...)
>
> I did a test build in PPA here:
> https://launchpad.net/~fheimes/+archive/ubuntu/lp2071471
> would be great if this can be tried.

I gave this a quick test on a z/VM with a RoCE VF.

root@redacted:~# uname -a
Linux redacted 6.8.0-38-generic #38~lp2071471-Ubuntu SMP Wed Jul  3 07:09:08 
UTC 2024 s390x s390x s390x GNU/Linux
root@redacted:~# cat /sys/bus/pci/devices/18d1\:00\:00.0/iommu_group/type
DMA-FQ

So this uses the DMA Flush Queue mechanism as it should. Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Comment bridged from LTC Bugzilla

2024-07-03 Thread bugproxy
--- Comment From niklas.schne...@ibm.com 2024-07-03 05:24 EDT---
Interesting with "make defconfig" on upstream I get

?
# CONFIG_IOMMU_DEFAULT_DMA_STRICT is not set
CONFIG_IOMMU_DEFAULT_DMA_LAZY=y
?

And that works well.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2050017] Comment bridged from LTC Bugzilla

2024-07-02 Thread bugproxy
--- Comment From boris.m...@de.ibm.com 2024-07-02 09:03 EDT---
Thanks everyone for your work!
With having the solution available as PPA, we can close this bug.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2050017

Title:
  [24.04 FEAT] [SEC2339] HSM protected signing support for Apache httpd
  for openSSL 3.0 with PKCS #11 provider

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2050017/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060939] Comment bridged from LTC Bugzilla

2024-07-02 Thread bugproxy
--- Comment From wint...@de.ibm.com 2024-07-02 03:42 EDT---
Closing this. Comment #9 desribes how customer fixed a network issue.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060939

Title:
  s390x OSA bridging causes network issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2060939/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] Comment bridged from LTC Bugzilla

2024-07-01 Thread bugproxy
--- Comment From vanessa.ba...@ibm.com 2024-07-01 18:35 EDT---
(In reply to comment #26)
> Problem could be fixed by upgrading Ubuntu 24.04 to the latest level (incl.
> kernel) via update, full-upgrade and reboot.

Good day! Back in Comment 6 , we mentioned there was another server
seeing this issue, the same distro, the only difference was that it is a
zVM guest.

The issue was still happening on it (sosreport causing the host to crash)
After updating all available packages and being on the latest kernel, the issue 
was still happening.

It wasn't until the NFS was removed (completely uninstalled) that a
sosreport was able to complete.

This means that this issue is not resolved, rather we have a workaround.
Wanted to point that out in case we want to reopen this ticket or link it to 
the NFS defect mentioned in Comment 24. Let me know what would be the best 
route.

Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070358] Whole Console logs captured during performing the below steps

2024-07-01 Thread bugproxy
--- Comment on attachment From tasmiya.nalat...@ibm.com 2024-07-01 06:29 
EDT---


Team,

I have updated the kernel using below commands as mentioned in
comment-21 and executed sosreport. Issue was reproducible with the
updated kernel as well.

--- Steps Followed ---
sudo apt --yes update
sudo apt --yes full-upgrade
sudo reboot
sosreport


--- uname -a ---
Linux ubuntulp2host 6.8.0-36-generic #36-Ubuntu SMP Mon Jun 10 11:02:49 UTC 
2024 ppc64le ppc64le ppc64le GNU/Linux

--- cat /etc/os-release ---
PRETTY_NAME="Ubuntu 24.04 LTS"
NAME="Ubuntu"
VERSION_ID="24.04"
VERSION="24.04 LTS (Noble Numbat)"
VERSION_CODENAME=noble
ID=ubuntu
ID_LIKE=debian
HOME_URL="https://www.ubuntu.com/;
SUPPORT_URL="https://help.ubuntu.com/;
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/;
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy;
UBUNTU_CODENAME=noble
LOGO=ubuntu-logo

** Attachment added: "Whole Console logs captured during performing the below 
steps"
   
https://bugs.launchpad.net/bugs/2070358/+attachment/5793768/+files/Update_apt_console_logs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070358

Title:
  [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel
  OOPS crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Comment bridged from LTC Bugzilla

2024-07-01 Thread bugproxy
--- Comment From niklas.schne...@ibm.com 2024-07-01 04:49 EDT---
For reference the the CONFIG_DMA_DEFAULT_DMA setting is relevant to s390 only
since upstream commit c76c067e488c ("s390/pci: Use dma-iommu layer").

This commit also includes the following hunk to default to
CONFIG_DEFAULT_DMA_LAZY on s390x. Though I guess this wouldn't overwrite
a pre-existing config value:

diff --git a/drivers/iommu/Kconfig b/drivers/iommu/Kconfig
index cd6727898b11..3199fd54b462 100644
--- a/drivers/iommu/Kconfig
+++ b/drivers/iommu/Kconfig
@@ -91,7 +91,7 @@ config IOMMU_DEBUGFS
choice
prompt "IOMMU default domain type"
depends on IOMMU_API
-   default IOMMU_DEFAULT_DMA_LAZY if X86 || IA64
+   default IOMMU_DEFAULT_DMA_LAZY if X86 || IA64 || S390
default IOMMU_DEFAULT_DMA_STRICT
help
Choose the type of IOMMU domain used to manage DMA API usage by

The line has been modified since to drop IA64 but does contain S390 on current
upstream as well.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] [NEW] [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-06-28 Thread bugproxy
Public bug reported:

Symptom:
Comparing Ubuntu 24.04 (kernelversion: 6.8.0-31-generic) against Ubuntu 22.04, 
all of our PCI-related network measurements on LPAR show massive throughput 
degradations (up to -72%). This shows for almost all workloads and numbers of 
connections, detereorating with the number of connections increasing. 
Especially drastic is the drop for a high number of parallel connections (50 
and 250) and for small and medium-size transactional workloads. However, also 
for streaming-type workloads the degradation is clearly visible (up to 48% 
degradation).

Problem:
With kernel config setting CONFIG_IOMMU_DEFAULT_DMA_STRICT=y, IOMMU DMA mode 
changed from lazy to strict, causing these massive degradations.
Behavior can also be changed with a kernel commandline parameter (iommu.strict) 
for easy verification.

The issue is known and was quickly fixed upstream in December 2023, after being 
present for little less than two weeks.
Upstream fix: 
https://github.com/torvalds/linux/commit/b2b97a62f055dd638f7f02087331a8380d8f139a

Repro:
rr1c-200x1000-250 with rr1c-200x1000-250.xml:

















0) Install uperf on both systems, client and server.
1) Start uperf at server: uperf -s
2) Start uperf at client: uperf -vai 5 -m uperf-profile.xml

3) Switch from strict to lazy mode using kernel commandline parameter 
iommu.strict=0.
4) Repeat steps 1) and 2).

Example:
For the following example, we chose the workload named above 
(rr1c-200x1000-250):

iommu.strict=1 (strict): 233464.914 TPS
iommu.strict=0 (lazy): 835123.193 TPS

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Skipper Bug Screeners (skipper-screen-team)
 Status: New


** Tags: architecture-s39064 bugnameltc-207082 severity-high 
targetmilestone-inin---

** Tags added: architecture-s39064 bugnameltc-207082 severity-high
targetmilestone-inin---

** Changed in: ubuntu
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070358] Comment bridged from LTC Bugzilla

2024-06-26 Thread bugproxy
--- Comment From sthou...@in.ibm.com 2024-06-27 01:08 EDT---
Thanks,

Also, see this reference.

https://lore.kernel.org/linux-
nfs/20240624230734.17084-2-ne...@suse.de/T/#u

I will let tester to test with latest and update here.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070358

Title:
  [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel
  OOPS crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070329] Comment bridged from LTC Bugzilla

2024-06-25 Thread bugproxy
--- Comment From gautam.mengh...@ibm.com 2024-06-25 06:25 EDT---
Thanks for the response.

The patches are there in linux-next already.

1. 
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=55dfb8bed6fe8bda390cc71cca878d11a9407099
2. 
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=54ec2bd9e0173b75daf84675d07c56584f96564b

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070329

Title:
  KOP L2 guest fails to boot with 1 core - SMT8 topology

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070329/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash

2024-06-25 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin2404

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070358

Title:
  [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel
  OOPS crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070358] [NEW] [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash

2024-06-25 Thread bugproxy
Public bug reported:

== Comment: #0 - Tasmiya Nalatwad  - 2024-05-28 
04:35:50 ==
--- Description ---
When sosreport command is executed the kernel OOPS crash is happening and lpar 
is rebooting. As kdump was enabled the dump is captured.

Note : The bug looks similar Bug 206504 Which is seen on z lpars.

--- Lpar Details ---
1. PowerVM
2. FW: FW1060.00 (NH1060_026)
3. OS: Ubuntu 24.04
4. Kernel: 6.8.0-31-generic
5. Mem (free -mh): 47Gi
6. cpus: 40

--- Steps to reproduce ---
1. run sosreport command on the lpar and the crash is seen when the sosreport 
is starting to capture dump.

--- Traces ---
root@ubuntulp2host:~# sosreport
Please note the 'sosreport' command has been deprecated in favor of the new 
'sos' command, E.G. 'sos report'.
Redirecting to 'sos report '

sosreport (version 4.5.6)

This command will collect system configuration and diagnostic
information from this Ubuntu system.

For more information on Canonical visit:

Community Website  : https://www.ubuntu.com/
Commercial Support : https://www.canonical.com

The generated archive may contain data considered sensitive and its
content should be reviewed by the originating organization before being
passed to any third party.

No changes will be made to system configuration.


Press ENTER to continue, or CTRL-C to quit.

Optionally, please enter the case id that you are generating this report
for []:

 Setting up archive ...
 Setting up plugins ...
[plugin:lxd] skipped command 'lxc image list': required kmods missing: 
ip6table_nat, ip6table_raw, bpfilter, iptable_mangle, iptable_filter, 
iptable_raw, ebtable_filter, ip6table_mangle, ebtables, iptable_nat, 
ip6_tables, ip6table_filter.  
[plugin:lxd] skipped command 'lxc list': required kmods missing: ip6table_nat, 
ip6table_raw, bpfilter, iptable_mangle, iptable_filter, iptable_raw, 
ebtable_filter, ip6table_mangle, ebtables, iptable_nat, ip6_tables, 
ip6table_filter.  
[plugin:lxd] skipped command 'lxc network list': required kmods missing: 
ip6table_nat, ip6table_raw, bpfilter, iptable_mangle, iptable_filter, 
iptable_raw, ebtable_filter, ip6table_mangle, ebtables, iptable_nat, 
ip6_tables, ip6table_filter.  
[plugin:lxd] skipped command 'lxc profile list': required kmods missing: 
ip6table_nat, ip6table_raw, bpfilter, iptable_mangle, iptable_filter, 
iptable_raw, ebtable_filter, ip6table_mangle, ebtables, iptable_nat, 
ip6_tables, ip6table_filter.  
[plugin:lxd] skipped command 'lxc storage list': required kmods missing: 
ip6table_nat, ip6table_raw, bpfilter, iptable_mangle, iptable_filter, 
iptable_raw, ebtable_filter, ip6table_mangle, ebtables, iptable_nat, 
ip6_tables, ip6table_filter.  
[plugin:networking] skipped command 'ip -s macsec show': required kmods 
missing: macsec.   Use '--allow-system-changes' to enable collection.
[plugin:networking] skipped command 'ss -peaonmi': required kmods missing: 
af_packet_diag, unix_diag, netlink_diag, udp_diag, inet_diag, tcp_diag, 
xsk_diag.   Use '--allow-system-changes' to enable collection.
Not all environment variables set. Source the environment file for the user 
intended to connect to the OpenStack environment.
[plugin:ufw] skipped command 'ufw status numbered': required kmods missing: 
bpfilter, iptable_filter.  
[plugin:ufw] skipped command 'ufw app list': required kmods missing: bpfilter, 
iptable_filter.  
 Running plugins. Please wait ...

  Starting 21/75 firewall_tables [Running: cloud_init ebpf filesys 
firewall_tables]   [ 1057.076626] Kernel attempted to read user page (0) - 
exploit attempt? (uid: 0)
[ 1057.076645] BUG: Kernel NULL pointer dereference on read at 0x
[ 1057.076650] Faulting instruction address: 0xc16ff114
[ 1057.076655] Oops: Kernel access of bad area, sig: 11 [#1]
[ 1057.076659] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
[ 1057.076665] Modules linked in: rpcsec_gss_krb5 xt_CHECKSUM xt_MASQUERADE 
xt_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp nft_compat nft_chain_nat 
nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 bridge stp llc rdma_ucm 
ib_uverbs qrtr rdma_cm iw_cm ib_cm ib_core cfg80211 binfmt_misc kvm_hv kvm 
vmx_crypto nfsd auth_rpcgss nfs_acl lockd grace nf_tables nvme_fabrics 
dm_multipath nvme_core nvme_auth sunrpc nfnetlink ip_tables x_tables autofs4 
btrfs blake2b_generic raid10 raid456 async_raid6_recov async_memcpy async_pq 
async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 nx_compress_pseries 
nx_compress ibmvscsi 842_decompress ibmveth pseries_rng poly1305_p10_crypto 
chacha_p10_crypto libchacha crct10dif_vpmsum crc32c_vpmsum aes_gcm_p10_crypto
[ 1057.076731] CPU: 25 PID: 6109 Comm: sosreport Kdump: loaded Not tainted 
6.8.0-31-generic #31-Ubuntu
[ 1057.076737] Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf06 
of:IBM,FW1060.00 (NH1060_026) hv:phyp pSeries
[ 1057.076743] NIP:  c16ff114 LR: c16ff108 CTR: c16ff0e0
[ 1057.076747] REGS: c00067e63630 TRAP: 0300   Not tainted  
(6.8.0-31-generic)
[ 

[Bug 2070358] Comment bridged from LTC Bugzilla

2024-06-25 Thread bugproxy
--- Comment From sthou...@in.ibm.com 2024-06-25 05:18 EDT---
please integrate this commit into ubuntu 24.04

Fix is applied to nfsd-next kernel. Likely to hit mainline kernel in next rc.
https://lore.kernel.org/all/znbgbmiqy52id...@tissot.1015granger.net/

** Changed in: ubuntu
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070358

Title:
  [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel
  OOPS crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2070358/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070329] [NEW] KOP L2 guest fails to boot with 1 core - SMT8 topology (Fedora)

2024-06-25 Thread bugproxy
Public bug reported:

== Comment: #0 - SEETEENA THOUFEEK  - 2024-06-25 01:24:11 
==
+++ This bug was initially created as a clone of Bug #205277 +++

---Problem Description---
KOP L2 guest fails to boot with 1 core - SMT8 topology
 
---Additional Hardware Info---
na 

 
---Debugger Data---
na 
 
---Steps to Reproduce---
 KOP L2 guest fails to boot when we set the CPU topology as 1 core - SMT 8

command line used to verify the issue:
#!/bin/sh

QEMU="/home/mgautam/qemu"
qemu-system-ppc64 -s \
-drive file=/root/debian-12-nocloud-ppc64el.qcow2,format=qcow2 \
-m 20G \
-smp 8,cores=1,sockets=1,threads=8 \
-cpu host \
-nographic \
-machine pseries,ic-mode=xics -accel kvm  \
-net nic,model=virtio \
-net user,host=10.0.2.10,hostfwd=tcp:127.0.0.1:10022-:22


NOTE: L2 boots fine when doorbells are turned off in L1 kernel


As per the investigation so far, the doorbell exception is not getting fired 
inside L2 guest. At L1 level, if we set DPDES=1 in the GSB for L2, the guest 
never receives the doorbell and also it is never cleared from the GSB. We are 
discussing this behaviour with phyp team.

The root cause of this issue is lack of DPDES support at L1. I've posted
the fix upstream - https://lore.kernel.org/linuxppc-
dev/20240522084949.123148-1-gau...@linux.ibm.com/T/#u


The fix has been accepted upstream and will be backported for kernels >= 6.7

https://lore.kernel.org/linuxppc-dev/20240605113913.83715-1-gau...@linux.ibm.com/
 
---Patches Installed---
na
 
---System Hang---
 na
 
---uname output---
na
 
Contact Information = na 
 
Machine Type = na 

Userspace rpm: na 
 
Userspace tool common name: na 
 
The userspace tool has the following bit modes: na 

Userspace tool obtained from project website:  na 
 
*Additional Instructions for na: 
-Post a private note with access information to the machine that is currently 
in the debugger.
-Attach ltrace and strace of userspace application.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
 Status: New


** Tags: architecture-ppc64 bugnameltc-207101 severity-high 
targetmilestone-inin---

** Tags added: architecture-ppc64 bugnameltc-207101 severity-high
targetmilestone-inin---

** Changed in: ubuntu
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070329

Title:
  KOP L2 guest fails to boot with 1 core - SMT8 topology (Fedora)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2070329/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] Comment bridged from LTC Bugzilla

2024-06-24 Thread bugproxy
--- Comment From boris.m...@de.ibm.com 2024-06-24 12:21 EDT---
Thanks everyone for your work.

Closing the bug: changing status to "CLOSED"

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] Re: [UBUNTU 24.04] Running sosreport causes the system to crash and produce a dump

2024-06-24 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin2404

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] Comment bridged from LTC Bugzilla

2024-06-24 Thread bugproxy
--- Comment From vanessa.ba...@ibm.com 2024-06-24 11:21 EDT---
(In reply to comment #24)
> Yes, sure the NFS issue is reported here:
> https://bugs.launchpad.net/bugs/2060217

Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070253] [NEW] KVM on PowerVM: L2 Guest-Aggressively entering CEDE results in low performance. Possible tuning opportunity.

2024-06-24 Thread bugproxy
Public bug reported:

KVM on PowerVM: L2 Guest-Aggressively entering CEDE results in low
performance. Possible tuning opportunity.

---uname output---
Linux rhel86edb1 #1 SMP Sun Jan 21 11:45:44 EST 2024 ppc64le ppc64le ppc64le 
GNU/Linux
 
---Steps to Reproduce---
Example: run READ only Test using EDB-PGBENCH and DT7 workloads on
 1. L1-Host 
 2. L2-Guest CEDE ON
 3. L2-Guest CEDE OFF

significant performance drop is observed in L2-Guest CEDE on vs L2-Guest
CEDE off case.

Note: Host and Guest configuration  used performance experiments are
listed below.

Location of EDB-PGBENCH: 
#wget 
http://ci-http-results.aus.stglabs.ibm.com/perfTest/scripts/Bug_Scripts/pgbench_install.sh
#chmod 777 pgbench_install.sh
#./pgbench_install.sh -->> it will install EDB(pgbench) and run edb on target 
lpar. 

Location of DT7 workload:

#wget 
http://ci-http-results.aus.stglabs.ibm.com/perfTest/scripts/Bug_Scripts/DT7-Install.sh
#chmod 777 DT7-Install.sh
#./DT7-Install.sh -->> It will install DT7.

Sample Commands : Once installation was successful run below commands on
target lpar.

EDB-PGBENCH Commands :

# su - enterprisedb
# vi t1.tc -->> copy below lines to t1.tc file . 

##t1.tc##
runname=select
SCALE=100
runtime=300
thread="40"
smtlist="8"
mode=select
recreateinstance=yes
recreateduringrun=yes
warmup=no
perf_stat=yes
PGSQL=/usr/local/pgsql/bin
#PGSQL=/usr/edb/as14/bin
#PGPORT=5432
cores=5
##t1.tc##

#cp t1.tc tc/
#./auto-run-test.sh

DT7 Commands :

After installation of DT7 run below command :
#cd /root
#./DayTrader7_Run.sh -u 20 -l 900 -i 2  

##
Machine Type: Power 10  LPAR (RHEL9.3)
gcc : 11.4.1
Memory  : 300GB
Test type   : pgbench-edb, DT7
##
KVM Host lscpu output : 

# lscpu
Architecture:ppc64le
  Byte Order:Little Endian
CPU(s):  96
  On-line CPU(s) list:   0-39
  Off-line CPU(s) list:  40-95
Model name:  POWER10 (architected), altivec supported
  Model: 2.0 (pvr 0080 0200)
  Thread(s) per core:8
  Core(s) per socket:5
  Socket(s): 1
  Physical sockets:  1
  Physical chips:4
  Physical cores/chip:   12
Virtualization features:
  Hypervisor vendor: pHyp
  Virtualization type:   para
Caches (sum of all):
  L1d:   320 KiB (10 instances)
  L1i:   480 KiB (10 instances)
  L2:10 MiB (10 instances)
  L3:40 MiB (10 instances)
NUMA:
  NUMA node(s):  1
  NUMA node2 CPU(s): 0-39
Vulnerabilities:
  Gather data sampling:  Not affected
  Itlb multihit: Not affected
  L1tf:  Not affected
  Mds:   Not affected
  Meltdown:  Not affected
  Mmio stale data:   Not affected
  Retbleed:  Not affected
  Spec rstack overflow:  Not affected
  Spec store bypass: Not affected
  Spectre v1:Vulnerable, ori31 speculation barrier enabled
  Spectre v2:Vulnerable
  Srbds: Not affected
  Tsx async abort:   Not affected


##

KVM on PowerVM setup:

KVM (Kernel Virtual Machine) is a virtualization module for Linux that
provides the ability of virtualization to Linux i.e. it allows the
kernel to function as a hypervisor.

We used P10 2S4U system for this experiment.

Workloads: DT7 and PGBENCH in details:

DT7 is an open source benchmark application emulating an online stock trading 
system.
DT7 consist of 3 components 
1) Jmeter 
2) WAS (WebSphere Application Server)
3) DB2

DayTrader benchmark/application will be installed/deployed on WAS and
this used DB2 as a backbone database.  Jmeter generate the request and
interact with the WAS. which would be kind of middle ware.

PGBENCH : 
pgbench is a simple program for running benchmark tests on PostgreSQL. It runs 
the same sequence of SQL commands over and over, possibly in multiple 
concurrent database sessions, and then calculates the average transaction rate 
(transactions per second).

Config of KVM Host and L2-Guest:

KVM Host Config : 
# uname -a
Linux  #1 SMP Sun Jan 21 11:45:44 EST 2024 ppc64le ppc64le ppc64le GNU/Linux
# numactl -H
available: 1 nodes (1)
node 1 cpus: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 
25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
node 1 size: 292860 MB
node 1 free: 290979 MB
node distances:
node   1
  1:  10
# cat /proc/cmdline
BOOT_IMAGE=(ieee1275//pci@8002021/pci1014\\,683@0/namespace@1,msdos2)/vmlinuz-6.7.0-nested.1.1a946fcde971.up.ibm.el9.ppc64le
 root=/dev/mapper/rhel_rhel86edb-root ro 
crashkernel=2G-4G:384M,4G-16G:512M,16G-64G:1G,64G-128G:2G,128G-:4G 
rd.lvm.lv=rhel_rhel86edb/root rd.lvm.lv=rhel_rhel86edb/swap biosdevname=0 
mitigations=off doorbell=off
# ppc64_cpu --dscr
DSCR is 23
# cpupower 

[Bug 2068577] Comment bridged from LTC Bugzilla

2024-06-20 Thread bugproxy
--- Comment From vanessa.ba...@ibm.com 2024-06-20 10:24 EDT---
(In reply to comment #21)
> Please feel free to open any new ticket in case this (or anything else)
> happens to your system(s) in future.
Thank you, I appreciate your support and clear responses. If I ever hit this 
again, will do so.
Have a nice one!

--- Comment From vanessa.ba...@ibm.com 2024-06-20 12:21 EDT---
(In reply to comment #19)
> On top I've noticed that there are probably nfs shares active in your system
> (saw that in fstab).
> There is an open issue with nfs.
> Would you mind tearing down (and removing nfs) temporarily and for test
> reasons and run sosreport then again?

An additional question, could you provide the reference on which ticket is this 
defect against NFS being tracked?
Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] Comment bridged from LTC Bugzilla

2024-06-19 Thread bugproxy
--- Comment From vanessa.ba...@ibm.com 2024-06-19 16:28 EDT---
Hello! Thank you very much for your replies!

(In reply to comment #16)
> Hi,
>
> Thank you for the report!
>
> Do you mind testing and verify if you run into the same issue with the
> latest Ubuntu kernel?
> It should be 6.8.0-35.35

I upgraded all packages on the server and I'm currently on 6.8.0-35-generic.
I also tore down all NFS (up to the point of uninstalling packages).
And have tried running sosreport and I'm no longer encountering this issue. The 
reports get generated with no issues.
No dumps are generated.

(In reply to comment #17)
> We would also like to look at the latest sosreport command that was run
> before crashing, can you share the latest /tmp/sos. so that we
> can inspect what is there?
>
> Thank you.
Since I can no longer reproduce this I can dig around to see if I captured this 
information in any earlier instance of this issue.
Is there any value in providing this information now?

(In reply to comment #18)
> Would you please retry (like my colleagues above already mentioned) with the
> latest kernel (means after full-upgrade)? Even if I cannot recreate with the
> GA kernel on my system(s).
>

> Is this really happening for you on an LPAR or in a zVM guest? (since
> dbginfo also incl. zvm data)?

It is an LPAR, not a zVM guest.

(In reply to comment #19)
> On top I've noticed that there are probably nfs shares active in your system
> (saw that in fstab).
> There is an open issue with nfs.
> Would you mind tearing down (and removing nfs) temporarily and for test
> reasons and run sosreport then again?

Removed :)

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060039] Comment bridged from LTC Bugzilla

2024-06-19 Thread bugproxy
--- Comment From hbath...@in.ibm.com 2024-06-19 06:54 EDT---
Posted v2 upstream:

https://lore.kernel.org/linuxppc-dev/20240619104919.20772-1-hbath...@linux.ibm.com/
("[PATCH v2] radix/kfence: map __kfence_pool at page granularity")

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060039

Title:
  [Ubuntu-24.04] FADump with recommended crash size is making the L1
  hang

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060039/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067383] Comment bridged from LTC Bugzilla

2024-06-18 Thread bugproxy
--- Comment From sthou...@in.ibm.com 2024-06-18 02:54 EDT---
distro, any update on this bug?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067383

Title:
  [Ubuntu 24.04] hotplug of 68 or more cpus is making the guest shutoff!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2067383/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069035] Re: [24.10] Please test secure-boot and lockdown on the 6.10 kernel (s390x) for Oracular

2024-06-12 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin2410

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069035

Title:
  [24.10] Please test secure-boot and lockdown on the 6.10 kernel
  (s390x) for Oracular

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2069035/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069129] [NEW] [UBUNTU 24.04] Cannot find or install the 'crypto-policies' package

2024-06-12 Thread bugproxy
Public bug reported:

---Problem Description---
IBM Z Platform (s390x)

On the latest Ubuntu 24.04 LTS stream ( providing the 6.8.0-31-generic
kernel ) we were unable to find or install the 'crypto-policies' package
using the apt commands.

According to the online man page the tool is available for Ubuntu 24.04
LTS. See https://manpages.ubuntu.com/manpages/jammy/en/man7/crypto-
policies.7.html

The available repositories when encountering the situation were:

# apt-get update
Hit:1 http://ports.ubuntu.com/ubuntu-ports noble InRelease
Hit:2 http://ports.ubuntu.com/ubuntu-ports noble-updates InRelease
Hit:3 http://ports.ubuntu.com/ubuntu-ports noble-backports InRelease
Hit:4 http://ports.ubuntu.com/ubuntu-ports noble-security InRelease
Reading package lists... Done

Please investigate. Potentially we need a different repository, please let us 
know if 'crypto-policies' had been moved, but as a user I would expect the 
package to be provided by 'noble-security'.
Thanks.
 
---Debugger---
A debugger is not configured
 
Contact Information = christian.r...@de.ibm.com 
 
---Steps to Reproduce---
1.) Install noble numbat (24.094 LTS) onto an IBM Z s390x platform
with any supported hypervisor (LPAR, z/VM or KVM)
2.) Run:
apt-cache search crypto-policies
 
Machine Type = IBM Type: 3931  Model:704
  A01 
 
---uname output---
Linux system 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:14:26 UTC 2024 s390x 
s390x s390x GNU/Linux
 
The userspace tool has the following bit modes: 64bit 

Userspace rpm: crypto-policies 
 
Userspace tool common name: update-crypto-policies (8)

Userspace tool obtained from project website:  na

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Skipper Bug Screeners (skipper-screen-team)
 Status: New


** Tags: architecture-s39064 bugnameltc-206748 severity-medium 
targetmilestone-inin2404

** Tags added: architecture-s39064 bugnameltc-206748 severity-medium
targetmilestone-inin2404

** Changed in: ubuntu
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069129

Title:
  [UBUNTU 24.04] Cannot find or install the 'crypto-policies' package

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2069129/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069035] Comment bridged from LTC Bugzilla

2024-06-12 Thread bugproxy
--- Comment From grgo.mari...@ibm.com 2024-06-12 04:31 EDT---
We installed from ppa:canonical-kernel-team/unstable:
# cat /etc/os-release
PRETTY_NAME="Ubuntu Oracular Oriole (development branch)"
NAME="Ubuntu"
VERSION_ID="24.10"
VERSION="24.10 (Oracular Oriole)"
VERSION_CODENAME=oracular
...
...
# uname -r
6.10.0-4-generic
# grep [0-9] /sys/firmware/ipl/*sec*
/sys/firmware/ipl/has_secure:1
/sys/firmware/ipl/secure:0

# ls -l /boot/vmlinuz /boot/initrd.img
lrwxrwxrwx 1 root root 27 Jun 12 07:30 /boot/initrd.img -> 
initrd.img-6.10.0-4-generic
lrwxrwxrwx 1 root root 24 Jun 12 07:30 /boot/vmlinuz -> vmlinuz-6.10.0-4-generic

load with kernel vmlinuz-6.10.0-4-generic
- without secure boot enable
- without adding the signature

System version 9.
Watchdog enabled.
Running 'ZBootLoader' version '3.2.4' level 'D51C.D51C_328.17'.
--- Audit message summary start ---
MLOLOA62693210 Audit: Signature verification failure for component 5 in program
0 loaded from device HBA:0.0.1900,WWPN:500507630710572c,LUN:4021402c.
--- Audit message summary end ---
OK Success

load with kernel vmlinuz-6.8.0-2-generic
- with secure boot enable
- without adding the signature

IPB received.
IPB sent.
System version 9.
Watchdog enabled.
Running 'ZBootLoader' version '3.2.4' level 'D51C.D51C_328.17'.
--- Audit message summary start ---
MLOLOA62693210 Audit: Signature verification failure for component 5 in program
0 loaded from device HBA:0.0.1900,WWPN:500507630710572C,LUN:4021402C.
--- Audit message summary end ---
MLOLOA6269321F A security violation error was encountered when loading from devi
ce HBA:0.0.1900,WWPN:500507630710572C,LUN:4021402C.
IPL failed (110).

load with kernel vmlinuz-6.8.0-2-generic
- with secure boot enable
- with adding the signature

IPB received.
IPB sent.
System version 9.
Watchdog enabled.
Running 'ZBootLoader' version '3.2.4' level 'D51C.D51C_328.17'.
OK Success
[0.082046] Linux version 6.10.0-4-generic (buildd@bos01-s390x-019) 
(s390x-linux-gnu-gcc-13 (Ubuntu 13.2.0-25ubuntu1) 13.2.0, GNU ld (GNU Binutils 
for Ubuntu) 2.42) #4-Ubuntu SMP Mon Jun  3 10:28:36 UTC 2024 (Ubuntu 
6.10.0-4.4-generic 6.10.0-rc2)
[0.082048] setup: Linux is running natively in 64-bit mode
[0.082048] setup: Linux is running with Secure-IPL enabled

After secure boot load
# grep [0-9] /sys/firmware/ipl/*sec*
/sys/firmware/ipl/has_secure:1
/sys/firmware/ipl/secure:1

we used these Certificate:
# openssl x509 -text -in sipl1.x509
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
a1:b6:a0:75:09:df:f4:18
Signature Algorithm: sha512WithRSAEncryption
Issuer: CN = PPA canonical-kernel-team unstable SIPL
Validity
Not Before: Aug 23 20:47:25 2019 GMT
Not After : Aug 20 20:47:25 2029 GMT
Subject: CN = PPA canonical-kernel-team unstable SIPL
...
...
# openssl x509 -text -in sipl2.x509
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
ee:61:db:02:41:ef:d1:06
Signature Algorithm: sha512WithRSAEncryption
Issuer: C = GB, ST = Isle of Man, L = Douglas, O = Canonical Ltd., OU = Secure 
Boot, CN = "Canonical Ltd. Secure Boot Signing (ZIPL, 2019)"
Validity
Not Before: May 16 13:50:05 2019 GMT
Not After : May 14 13:50:05 2049 GMT
Subject: C = GB, ST = Isle of Man, L = Douglas, O = Canonical Ltd., OU = Secure 
Boot, CN = "Canonical Ltd. Secure Boot Signing (ZIPL, 2019)"
..

this was tested on our Z16 machine

No problems detected. Secure boot works as expected.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069035

Title:
  [24.10] Please test secure-boot and lockdown on the 6.10 kernel
  (s390x) for Oracular

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2069035/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069035] Re: [24.10] Please test secure-boot and lockdown on the 6.10 kernel (s390x) for Oracular

2024-06-11 Thread bugproxy
** Tags added: architecture-s39064 bugnameltc-206857 severity-high
targetmilestone-inin---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069035

Title:
  [24.10] Please test secure-boot and lockdown on the 6.10 kernel
  (s390x) for Oracular

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2069035/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2045250] Re: pam_lastlog doesn't handle localtime_r related errors properly

2024-06-11 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin2404

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2045250

Title:
  pam_lastlog doesn't handle localtime_r related errors properly

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2045250/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065579] Re: [UBUNTU 22.04] OS guest boot issues on 9p filesystem

2024-06-07 Thread bugproxy
--- Comment From boris.m...@de.ibm.com 2024-06-07 06:53 EDT---
The fix to this bug has been released to -security.

Thanks to everyone for your speedy work to get this fixed.

With this, I am closing this bug: changing the status to ==> CLOSED

** Tags removed: targetmilestone-inin2404
** Tags added: targetmilestone-inin2204

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065579

Title:
  [UBUNTU 22.04] OS guest boot issues on 9p filesystem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2065579/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065579] Re: [UBUNTU 22.04] OS guest boot issues on 9p filesystem

2024-06-07 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin2404

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065579

Title:
  [UBUNTU 22.04] OS guest boot issues on 9p filesystem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2065579/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] failed_sosreport_output_ilabg14_20240515

2024-06-06 Thread bugproxy
Default Comment by Bridge

** Attachment added: "failed_sosreport_output_ilabg14_20240515"
   
https://bugs.launchpad.net/bugs/2068577/+attachment/5786684/+files/failed_sosreport_output_ilabg14_20240515

** Changed in: ubuntu
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] DBGINFO-2024-05-16-10-09-29-ilabg14-2A1A18.tgz

2024-06-06 Thread bugproxy
Default Comment by Bridge

** Attachment added: "DBGINFO-2024-05-16-10-09-29-ilabg14-2A1A18.tgz"
   
https://bugs.launchpad.net/bugs/2068577/+attachment/5786683/+files/DBGINFO-2024-05-16-10-09-29-ilabg14-2A1A18.tgz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] extracted kernel messages from automatically collected kdump

2024-06-06 Thread bugproxy
Default Comment by Bridge

** Attachment added: "extracted kernel messages from automatically collected 
kdump"
   
https://bugs.launchpad.net/bugs/2068577/+attachment/5786682/+files/dmesg.202405151159

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] [NEW] [UBUNTU 24.04] Running sosreport causes the system to crash and produce a dump

2024-06-06 Thread bugproxy
Public bug reported:

== Reported by  ==

---Problem Description---
Good day, we recently installed Ubuntu 24.04 on a z LPAR.
After we run any test we usually collect the debug information in case we need 
it, and what happened is that each time "sosreport" is run on the server
the system crashes and produces a dump.
I'll attach the full output when the "sosreport" command was run, but this is a 
snippet of the last lines captured before it went down:

[plugin:zvm] skipped command 'vmcp ind sp': required kmods missing: vmcp, 
cpint.  
[plugin:zvm] skipped command 'vmcp ind user': required kmods missing: vmcp, 
cpint.  
 Running plugins. Please wait ...

  Starting 21/74 filesys [Running: block btrfs ebpf filesys]  
 
Machine Type = s390x 
 
Contact Information = Vanessa Baeza/vanessa.ba...@ibm.com, Michael 
Finnegan/finne...@us.ibm.com, Daniel Ruiz/daniel.ruiz@ibm.com 
 
---uname output---
Linux ilzlnx10 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:14:26 UTC 2024 
s390x s390x s390x GNU/Linux
 
---Steps to Reproduce---
 Run "sosreport"
 
---Debugger---
A debugger is not configured
 
System Dump Location:
 Access credentials to the server can be provided.
 
Oops output:
 [59770.601165] [ T120907] Kernel panic - not syncing: Fatal exception: 
panic_on_oops
 
Stack trace output:
 [59770.601103] [ T120907] Call Trace:
[59770.601104] [ T120907]  [<000fc7961bf0>] mutex_lock+0x30/0x60
[59770.601107] [ T120907] ([<000fc7961be6>] mutex_lock+0x26/0x60)
[59770.601109] [ T120907]  [<03ff805990f8>] svc_pool_stats_start+0x40/0xd0 
[sunrpc]
[59770.601146] [ T120907]  [<000fc7031704>] seq_read_iter+0x134/0x510 
[59770.601149] [ T120907]  [<000fc7031bfc>] seq_read+0x11c/0x168
[59770.601151] [ T120907]  [<000fc6ff4276>] vfs_read+0x96/0x328
[59770.601154] [ T120907]  [<000fc6ff5058>] ksys_read+0x70/0x128
[59770.601156] [ T120907]  [<000fc7954c26>] __do_syscall+0x246/0x2e8 
[59770.601158] [ T120907]  [<000fc7968510>] system_call+0x70/0x98 
[59770.601161] [ T120907] Last Breaking-Event-Address:
[59770.601162] [ T120907]  [<000fc795fd88>] __cond_resched+0x48/0x90 
[59770.601165] [ T120907] Kernel panic - not syncing: Fatal exception: 
panic_on_oops

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Skipper Bug Screeners (skipper-screen-team)
 Status: New


** Tags: architecture-s39064 bugnameltc-206504 severity-high 
targetmilestone-inin---

** Tags added: architecture-s39064 bugnameltc-206504 severity-high
targetmilestone-inin---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] failed_sosreport_output_20240515

2024-06-06 Thread bugproxy
Default Comment by Bridge

** Attachment added: "failed_sosreport_output_20240515"
   
https://bugs.launchpad.net/bugs/2068577/+attachment/5786681/+files/failed_sosreport_output_20240515.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065579] Comment bridged from LTC Bugzilla

2024-06-04 Thread bugproxy
--- Comment From d.herrendoer...@de.ibm.com 2024-06-04 07:23 EDT---
@sergiodj

My patch went further and also allowed FIFOs.
This patch also passed all my verification with the workload that was 
previously failing.

iff --git a/hw/9pfs/9p-util.h b/hw/9pfs/9p-util.h
index 51c94b0116..d19bb26570 100644
--- a/hw/9pfs/9p-util.h
+++ b/hw/9pfs/9p-util.h
@@ -130,9 +130,9 @@ static inline int close_if_special_file(int fd)
close_preserve_errno(fd);
return -1;
}
-if (!S_ISREG(stbuf.st_mode) && !S_ISDIR(stbuf.st_mode)) {
+if (!S_ISREG(stbuf.st_mode) && !S_ISDIR(stbuf.st_mode) && 
!S_ISSOCK(stbuf.st_mode) && !S_ISFIFO(stbuf.st_mode)) {
error_report_once(
-"9p: broken or compromised client detected; attempt to open "
+"9p: broken or compromised client detected; attempt to open a 
device"
"special file (i.e. neither regular file, nor directory)"
);
close(fd);

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065579

Title:
  [UBUNTU 22.04] OS guest boot issues on 9p filesystem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2065579/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065579] Comment bridged from LTC Bugzilla

2024-06-03 Thread bugproxy
--- Comment From d.herrendoer...@de.ibm.com 2024-06-03 04:09 EDT---
(In reply to comment #13)
> FWIW, I built QEMU with a proposed fix here:
>
> https://launchpad.net/~sergiodj/+archive/ubuntu/qemu-9pfs-fix
>
> It passes the testcase provided in the bug description.  I'd still like to
> hear Marc's opinion here as the Security team person, but at least we have a
> possible fix.
>
> Cheers,

@sergiodj

What was the patch ?

Strictly speaking, this is 9Pfs. Opening device files for read and write
is expected to work for 9P - but for qemu guests running Linux this
might not be obvious.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065579

Title:
  [UBUNTU 22.04] OS guest boot issues on 9p filesystem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2065579/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067383] [NEW] [Ubuntu24.04] hotplug of 68 or more cpus is making the guest shutoff!

2024-05-28 Thread bugproxy
Public bug reported:

== Comment: #0 - Kowshik Jois B S  - 2024-05-21 
01:41:34 ==
I have created a guest with maxcpus as 128 and given current value as 4. When I 
try to hotplug 68 or more cpus, the guest is entering the shut off state.

This behavior was observed initially on the guest with 2G Memory. Then I
increased it to 4G but exactly the same behavior is seen again!

---uname output---
Linux ubuntulp3host 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:05:55 UTC 
2024 ppc64le ppc64le ppc64le GNU/Linux
 
Machine Type = P10 Denali 
 
Contact Information = kowshik.j...@in.ibm.com 
 
---Steps to Reproduce---
1. virsh define hotplug.xml
2. virsh start Ubuntu --console
3. On the other L1 terminal,
virsh setvcpus Ubuntu 68

Expected Output:
68 cpus should be hotplugged.

Actual output:
1. guest session terminated.

2. root@ubuntulp3host:~# virsh setvcpus Ubuntu 68
error: Unable to read from monitor: Connection reset by peer

3. host dmesg:
[257209.825657] audit: type=1400 audit(1716219915.959:190): apparmor="STATUS" 
operation="profile_replace" info="same as current profile, skipping" 
profile="unconfined" name="libvirt-6c80667b-c7e4-42d0-ad6f-13ba24e6b059//passt" 
pid=11594 comm="apparmor_parser"
[257211.741363] virbr0: port 1(vnet0) entered learning state
[257213.761361] virbr0: port 1(vnet0) entered forwarding state
[257213.761369] virbr0: topology change detected, propagating
[257251.720268] KVM: Create Guest vcpu hcall failed, rc=-44
[257251.782307] virbr0: port 1(vnet0) entered disabled state
[257251.782609] vnet0 (unregistering): left allmulticast mode
[257251.782612] vnet0 (unregistering): left promiscuous mode
[257251.782615] virbr0: port 1(vnet0) entered disabled state
[257251.996802] audit: type=1400 audit(1716219958.127:191): apparmor="STATUS" 
operation="profile_remove" profile="unconfined" 
name="libvirt-6c80667b-c7e4-42d0-ad6f-13ba24e6b059" pid=11720 
comm="apparmor_parser"


please include this patch 

https://lore.kernel.org/qemu-
devel/20240516053211.145504-1-hars...@linux.ibm.com/T/#m9081c12e6fb42f34ebff78d91beee9dbfc5990fd

** Affects: ubuntu-power-systems
 Importance: Undecided
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
 Status: New

** Affects: qemu (Ubuntu)
 Importance: Undecided
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
 Status: New


** Tags: architecture-ppc64le bugnameltc-206641 severity-high 
targetmilestone-inin---

** Tags added: architecture-ppc64le bugnameltc-206641 severity-high
targetmilestone-inin---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067383

Title:
  [Ubuntu24.04] hotplug of 68 or more cpus is making the guest shutoff!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2067383/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067383] Guest xml

2024-05-28 Thread bugproxy
Default Comment by Bridge

** Attachment added: "Guest xml"
   
https://bugs.launchpad.net/bugs/2067383/+attachment/5783567/+files/hotplug.xml

** Changed in: ubuntu
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Package changed: ubuntu => qemu (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067383

Title:
  [Ubuntu24.04] hotplug of 68 or more cpus is making the guest shutoff!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2067383/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2044104] Comment bridged from LTC Bugzilla

2024-05-28 Thread bugproxy
--- Comment From vineeth.vija...@ibm.com 2024-05-28 05:00 EDT---
(In reply to comment #28)
> Okay, thanks Vineeth for jumping in!
>
> In other words this will become unblocked once we have s390-tools >= 2.33.0
> in, which I am currently working on (v2.33.1 - based on LP#2067355).

Yes. That's right. Thank you.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2044104

Title:
  [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with
  zdev:early=0 set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2044104] Comment bridged from LTC Bugzilla

2024-05-28 Thread bugproxy
--- Comment From vineeth.vija...@ibm.com 2024-05-28 04:26 EDT---
(In reply to comment #26)
> Hi Peter,
> is this now incl. in s390-tools v2.33.0
> https://github.com/ibm-s390-linux/s390-tools/releases/tag/v2.33.0
> and what I read as:
> "chzdev: Add --is-owner to identify files created by zdev"
> ?

Peter is currently on vacation, but I can confirm that this feature/commit is 
now
included as part of the 2.33.0 release.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2044104

Title:
  [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with
  zdev:early=0 set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2050019] Comment bridged from LTC Bugzilla

2024-05-27 Thread bugproxy
--- Comment From fre...@de.ibm.com 2024-05-27 09:08 EDT---
Installed a ubunutu 24.04 and enabled noble-proposed
In the end I used kernel:

uname -a
Linux a35lp66.lnxne.boe 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:14:26 UTC 
2024 s390x s390x s390x GNU/Linux

As testing this is extremely complicated, instead I run my AP/zcrypt tester to 
verify that the AP bus and zcrypt device driver still work as expected.
Looks ok to me.

verified

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2050019

Title:
  [24.04 FEAT] [SEC2353] zcrypt: extend error recovery to deal with
  device scans

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2050019/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065579] Comment bridged from LTC Bugzilla

2024-05-24 Thread bugproxy
--- Comment From d.herrendoer...@de.ibm.com 2024-05-24 04:00 EDT---
There's absolutely no movement upstream-

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065579

Title:
  [UBUNTU 22.04] OS guest boot issues on 9p filesystem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2065579/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064321] Re: Power guest secure boot with key management: kernel portion

2024-05-23 Thread bugproxy
** Tags removed: targetmilestone-inin2404
** Tags added: targetmilestone-inin2410

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064321

Title:
  Power guest secure boot with key management: kernel portion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064321/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064319] Re: Power guest secure boot with key management: GRUB2 portion

2024-05-23 Thread bugproxy
** Tags removed: targetmilestone-inin2404
** Tags added: targetmilestone-inin2410

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064319

Title:
  Power guest secure boot with key management: GRUB2 portion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064319/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064345] Re: Power guest secure boot with key management: userspace portion

2024-05-23 Thread bugproxy
** Tags removed: targetmilestone-inin2404
** Tags added: targetmilestone-inin2410

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064345

Title:
  Power guest secure boot with key management: userspace portion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059303] Comment bridged from LTC Bugzilla

2024-05-17 Thread bugproxy
--- Comment From steffen.ei...@ibm.com 2024-05-17 09:34 EDT---
Verified that the issue is resolved for all the following Ubuntu version with 
the respective proposed repository.

mantic/23.10 : s390-tools (2.29.0-0ubuntu2.2)
jammy/22.04 : s390-tools (2.20.0-0ubuntu3.3)
focal/20.04 : s390-tools (2.12.0-0ubuntu3.8)

Steffen

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059303

Title:
  [UBUNTU 20.04] SE-tooling: New IBM host-key subject locality
  (s390-tools)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2059303/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2038583] Comment bridged from LTC Bugzilla

2024-05-16 Thread bugproxy
--- Comment From s...@de.ibm.com 2024-05-16 09:03 EDT---
On my Ubuntu 24.04 machine, I'm now using
$ uname -a
Linux a3545029.lnxne.boe 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:14:26 
UTC 2024 s390x s390x s390x GNU/Linux

and indeed compat layer is turned off:
$ file ./hello-s390.old
./hello-s390.old: ELF 32-bit MSB pie executable, IBM S/390, version 1 (SYSV), 
dynamically linked, interpreter /lib/ld.so.1, 
BuildID[sha1]=561b01f83f5198b8680d965a418d0b972fecd066, for GNU/Linux 3.2.0, 
with debug_info, not stripped

$ ./hello-s390.old
bash: ./hello-s390.old: cannot execute binary file: Exec format error

But we still have the 31bit libc6 packages:
https://packages.ubuntu.com/noble/libc6-s390
https://packages.ubuntu.com/noble/libc6-dev-s390
perhaps also the 31bit cross packages.

Shall or can those 31bit packages be removed?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2038583

Title:
  Turning COMPAT_32BIT_TIME off on s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2038583/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2045250] Comment bridged from LTC Bugzilla

2024-05-14 Thread bugproxy
--- Comment From boris.m...@de.ibm.com 2024-05-14 07:46 EDT---
@Canonical / Frank:
In the bug description it was stated that the problem has been observed in all 
Ubuntu releases: focal to noble.
According to comment #13, the fix has been released
"Included in pam | 1.5.3-5ubuntu3." (noble).

Are there any further actions required on our (IBM) side to get it
included in  F, J and M release?  Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2045250

Title:
  pam_lastlog doesn't handle localtime_r related errors properly

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2045250/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2009495] Re: [Ubuntu 22.04] smc_run does not work, libsmc-preload.so cannot be preloaded

2024-05-13 Thread bugproxy
** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2009495

Title:
  [Ubuntu 22.04] smc_run does not work, libsmc-preload.so cannot be
  preloaded

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2009495/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2038583] Re: Turning COMPAT_32BIT_TIME off on s390x

2024-05-13 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin2404

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2038583

Title:
  Turning COMPAT_32BIT_TIME off on s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2038583/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065579] Re: [UBUNTU 22.04] OS guest boot issues on 9p filesystem

2024-05-13 Thread bugproxy
--- Comment From d.herrendoer...@de.ibm.com 2024-05-13 06:57 EDT---
This Bug is the result of the fix to:
CVE-2023-2861: Prohibit opening any special file directly on host

I also opened a Bug in the qemu bugtracker
https://gitlab.com/qemu-project/qemu/-/issues/2337

The containers fail because syslog cannot open its unix domain socket on the 
filesystem.
We tracked the change that provokes this error to a CVE change in qemu that 
forbids opening of special files to
prevent exposing data from the host. Special files should be handled by the 
guest os.
Unix domain socket files are also special files, and they are handled by the 
guest OS in their entirety, and the 9p server in qemu assigns them individual 
inodes so they are safe to open. But they must be opened so their fd can be 
passed to the appropriate connect() or bind() function so the OS can use them.
Socket files don't have a traditional read or write functionality, they are 
mere representatives for a local address.
There is no convention for where domain socket files should go, so there is no 
easy fix by just creating a tmpfs somewhere.
We also see other workloads and services failing for not being able to open 
their local socket files.

The analysis of CVE-2023-2861 in detail reveals
- opening of device files through the 9p server directly grants access to 
read/write functions of those device files. Also device files can be created 
in-place anywhere.
- opening of FIFOs is somewhat unsafe as long as there are possible collisions 
that could expose host data using read/write.
- opening of sockets is safe because the 9p server protects the revealed inode 
and provides no way to connect the file to a socket.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-2861

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065579

Title:
  [UBUNTU 22.04] OS guest boot issues on 9p filesystem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2065579/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065579] [NEW] [UBUNTU 22.04] OS guest boot issues on 9p filesystem

2024-05-13 Thread bugproxy
Public bug reported:

=== Reported by  - 2024-05-13 03:53:01 ===

---Problem Description---
OS guest boot issues on 9p filesystem due to unix domain sockets open failure
 
Contact Information = d.herrendoer...@de.ibm.com 
 
Machine Type = 3931-7G4 
 
---uname output---
5.15.0-92-generic #102-Ubuntu SMP Wed Jan 10 09:35:24 UTC 2024 s390x s390x 
s390x GNU/Linux
 
---Steps to Reproduce---
 #!/bin/bash

# Cleanup target dir
[ -d ./target ] && rm -rf target
mkdir target

# Add configuration updates
mkdir -p ./target/etc/initramfs-tools/
echo 9p >> ./target/etc/initramfs-tools/modules
echo 9pnet_virtio >> ./target/etc/initramfs-tools/modules

# Add the test script
cat > ./target/test_init << EOF
#!/bin/bash

echo "Test for unix domain sockets"

nc -Ul /socket &
sleep 1
echo "Sockets work" | nc -UN /socket || echo "Sockets fail"

echo o > /proc/sysrq-trigger
sleep 999
EOF
chmod 700 ./target/test_init

# Create an Ubuntu 23.10 around it
echo "Creating Ubuntu target OS"
debootstrap --variant=minbase\

--include=udev,kmod,initramfs-tools,systemd,netcat-openbsd,linux-image-generic \
--exclude=man,bash-completion \
mantic ./target > /dev/null || exit 1

# Run the test in 9p forwarded filesystem
echo "Running OS in qemu"
qemu-system-s390x \
  -m 8192 \
  -smp 4 \
  -nodefaults -nographic -no-reboot -no-user-config \
  -kernel ./target/boot/vmlinuz \
  -initrd ./target/boot/initrd.img \
  -append 'root=fsRoot rw rootfstype=9p 
rootflags=trans=virtio,version=9p2000.L,msize=512000,cache=mmap,posixacl 
console=ttysclp0 init=/test_init quiet' \
  -fsdev 
local,security_model=passthrough,multidevs=remap,id=fsdev-fsRoot,path=./target \
  -device virtio-9p-pci,id=fsRoot,fsdev=fsdev-fsRoot,mount_tag=fsRoot \
  -device virtio-serial-ccw -device sclpconsole,chardev=console \
  -chardev stdio,id=console,signal=off 

 
---Debugger---
A debugger is not configured

Userspace rpm: qemu-(current).deb 
 
Userspace tool common name: qemu 

Userspace tool obtained from project website:  na 
 
The userspace tool has the following bit modes: both 
 
*Additional Instructions for d.herrendoer...@de.ibm.com:
-Attach ltrace and strace of userspace application.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Skipper Bug Screeners (skipper-screen-team)
 Status: New


** Tags: architecture-s39064 bugnameltc-206380 severity-critical 
targetmilestone-inin---

** Tags added: architecture-s39064 bugnameltc-206380 severity-critical
targetmilestone-inin---

** Bug watch added: gitlab.com/qemu-project/qemu/-/issues #2337
   https://gitlab.com/qemu-project/qemu/-/issues/2337

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065579

Title:
  [UBUNTU 22.04] OS guest boot issues on 9p filesystem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2065579/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065579] Comment bridged from LTC Bugzilla

2024-05-13 Thread bugproxy
--- Comment From boris.m...@de.ibm.com 2024-05-13 06:24 EDT---
This bug is also described at:
https://gitlab.com/qemu-project/qemu/-/issues/2337
created in the qemu project bugtracker.

** Changed in: ubuntu
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065579

Title:
  [UBUNTU 22.04] OS guest boot issues on 9p filesystem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2065579/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060939] Comment bridged from LTC Bugzilla

2024-05-13 Thread bugproxy
--- Comment From wint...@de.ibm.com 2024-05-13 05:20 EDT---
Hi Phoenyx,

I'm glad to hear that you were able to fix your issue.

I have to admit I don't get the full picture of your analysis:
The firewall gateways you mention, where are they? Inside KVM guests attached 
to your OSA card? Or external to IBM Z?
The pinging device where is that? External connected via a physical switch?
What exactly was the unexptected bahaviour of the OSA cards?

In case you want us to investigate further, I would propose to try and recreate
the issue and reduce it to the minimum failing scenario (just 2 endpoints; can 
we ommit VLAN, bridge, firewall, .. ? The less the better)
And then describe exactly what the expected behaviour is, what the unexpected 
behaviour is and how to reproduce it.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060939

Title:
  s390x OSA bridging causes network issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2060939/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060939] Comment bridged from LTC Bugzilla

2024-05-13 Thread bugproxy
--- Comment From wint...@de.ibm.com 2024-05-13 05:09 EDT---
More information from phoenyx:
"Hi Sandy,

We?ve managed to find what was causing the behaviour of packets being
received on the source interface to occur; however, we do still have a
concern that the behaviour was only present on the OSA card.

We had a device on the network that was attempting to ping the firewall
gateways on each VLAN ? Which were configured to drop ICMP packets. This
was causing the network to have a solid number of broadcast packets
being sent out on each VLAN (2 per second, per VLAN).

The firewalls have been reconfigured to accept ICMP traffic, and now
that the broadcast packets are not being sent out, the OSA is working
exactly as expected.

However, the OSA cards were the only ones to display issues while this
was occurring, all other NICs were functioning despite this network
traffic (x86, RoCE, etc)? And we are not sure why only the OSA was
displaying that behaviour. Would you happen to have any insights on this
at all?

Many thanks,
Nyx"

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060939

Title:
  s390x OSA bridging causes network issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2060939/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064530] Comment bridged from LTC Bugzilla

2024-05-09 Thread bugproxy
--- Comment From jan...@us.ibm.com 2024-05-09 17:13 EDT---
Was able to successfully validate the bootstrapped dotnet8 package .

Here are a few of the tests that were run:

$ uname -a
Linux ltcden12-lp22 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:05:55 UTC 
2024 ppc64le ppc64le ppc64le GNU/Linux

foo@ltcden12-lp22:~/HelloWorld$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 24.04 LTS
Release:24.04
Codename:   noble

$ apt list --installed | grep dotnet

WARNING: apt does not have a stable CLI interface. Use with caution in
scripts.

dotnet-apphost-pack-8.0/noble,now 8.0.4-0ubuntu2~ppa4 ppc64el 
[installed,automatic]
dotnet-host-8.0/noble,now 8.0.4-0ubuntu2~ppa4 ppc64el [installed,automatic]
dotnet-hostfxr-8.0/noble,now 8.0.4-0ubuntu2~ppa4 ppc64el [installed,automatic]
dotnet-runtime-8.0/noble,now 8.0.4-0ubuntu2~ppa4 ppc64el [installed,automatic]
dotnet-sdk-8.0/noble,now 8.0.104-0ubuntu2~ppa4 ppc64el [installed,automatic]
dotnet-targeting-pack-8.0/noble,now 8.0.4-0ubuntu2~ppa4 ppc64el 
[installed,automatic]
dotnet-templates-8.0/noble,now 8.0.104-0ubuntu2~ppa4 ppc64el 
[installed,automatic]
dotnet8/noble,now 8.0.104-8.0.4-0ubuntu2~ppa4 ppc64el [installed]

$ dotnet --info
.NET SDK:
Version:   8.0.104
Commit:034f91fcc0
Workload version:  8.0.100-manifests.cd97f1c9

Runtime Environment:
OS Name: ubuntu
OS Version:  24.04
OS Platform: Linux
RID: ubuntu.24.04-ppc64le
Base Path:   /usr/lib/dotnet/sdk/8.0.104/

.NET workloads installed:
Workload version: 8.0.100-manifests.cd97f1c9
There are no installed workloads to display.

Host:
Version:  8.0.4
Architecture: ppc64le
Commit:   2d7eea2529

.NET SDKs installed:
8.0.104 [/usr/lib/dotnet/sdk]

.NET runtimes installed:
Microsoft.AspNetCore.App 8.0.4 [/usr/lib/dotnet/shared/Microsoft.AspNetCore.App]
Microsoft.NETCore.App 8.0.4 [/usr/lib/dotnet/shared/Microsoft.NETCore.App]

Other architectures found:
None

Environment variables:
Not set

global.json file:
Not found

Learn more:
https://aka.ms/dotnet/info

Download .NET:

$ dotnet new console -o HelloWorld

Welcome to .NET 8.0!
-
SDK Version: 8.0.104


Installed an ASP.NET Core HTTPS development certificate.
To trust the certificate, view the instructions: 
https://aka.ms/dotnet-https-linux


Write your first app: https://aka.ms/dotnet-hello-world
Find out what's new: https://aka.ms/dotnet-whats-new
Explore documentation: https://aka.ms/dotnet-docs
Report issues and find source on GitHub: https://github.com/dotnet/core
Use 'dotnet --help' to see available commands or visit: 
https://aka.ms/dotnet-cli
--
The template "Console App" was created successfully.

Processing post-creation actions...
Restoring /home/foo/HelloWorld/HelloWorld.csproj:
Determining projects to restore...
Restored /home/foo/HelloWorld/HelloWorld.csproj (in 980 ms).
Restore succeeded.

foo@ltcden12-lp22:~$ cd HelloWorld/
foo@ltcden12-lp22:~/HelloWorld$ dotnet run
Hello, World!

$ dotnet new console -lang "F#" -o FSharpHelloWorld
The template "Console App" was created successfully.

Processing post-creation actions...
Restoring /home/foo/HelloWorld/FSharpHelloWorld/FSharpHelloWorld.fsproj:
Determining projects to restore...
Restored /home/foo/HelloWorld/FSharpHelloWorld/FSharpHelloWorld.fsproj (in 575 
ms).
Restore succeeded.

$ cd FSharpHelloWorld/
$ dotnet run
Hello from F#

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064530

Title:
  Include support for .NET 8 for Ubuntu on Power

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064530/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064530] Comment bridged from LTC Bugzilla

2024-05-07 Thread bugproxy
--- Comment From jan...@us.ibm.com 2024-05-07 13:41 EDT---
Thanks for the quick turnaround. We will test it and report the results.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064530

Title:
  Include support for .NET 8 for Ubuntu on Power

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064530/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061913] Re: PMDK FTBFS on ppc64el obj_basic_integration/TEST5 crashed

2024-05-07 Thread bugproxy
** Tags added: architecture-ppc64le bugnameltc-206197 severity-medium
targetmilestone-inin---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061913

Title:
  PMDK FTBFS on ppc64el obj_basic_integration/TEST5 crashed

To manage notifications about this bug go to:
https://bugs.launchpad.net/pmdk/+bug/2061913/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062556] Comment bridged from LTC Bugzilla

2024-05-06 Thread bugproxy
--- Comment From kowshik.j...@in.ibm.com 2024-05-06 14:39 EDT---
Frank has confirmed in his previous comment that the fix will be part kernel 
6.8.0-31.31.

I also verified the bug on the same level of kernel and updated my
comments above that the fix is working as expected.

Since it is a generic kernel, I believe that the Fix is already a part
of the source code. If not, please get this included in the upcoming
release.

*** I have verified the Fix and is working as expected ***

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062556

Title:
  [Ubuntu-24.04] Hugepage memory is not getting released even after
  destroying the guest!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2062556/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062556] Comment bridged from LTC Bugzilla

2024-05-06 Thread bugproxy
--- Comment From kowshik.j...@in.ibm.com 2024-05-06 06:50 EDT---
I have verified this bug on the latest available Ubuntu 24.04 host. The issue 
has been fixed and is not getting reproduced anymore!

kernel: 6.8.0-31-generic #31-Ubuntu

Before guest creation:

HugePages_Total:   0
HugePages_Free:0
HugePages_Rsvd:0
HugePages_Surp:0
Hugepagesize:   2048 kB

After guest creation:

HugePages_Total:   20480
HugePages_Free:15360
HugePages_Rsvd:0
HugePages_Surp:0
Hugepagesize:   2048 kB

After destroying the Before guest:

HugePages_Total:   20480
HugePages_Free:20480
HugePages_Rsvd:0
HugePages_Surp:0
Hugepagesize:   2048 kB

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062556

Title:
  [Ubuntu-24.04] Hugepage memory is not getting released even after
  destroying the guest!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2062556/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2052696] Re: [UBUNTU 24.04] Haskell LLVM Backend: Objects of data section are missing alignment

2024-05-06 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin2404

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2052696

Title:
  [UBUNTU 24.04] Haskell LLVM Backend: Objects of data section are
  missing alignment

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2052696/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064530] [NEW] Include support for .NET 8 for Ubuntu on Power

2024-05-01 Thread bugproxy
Public bug reported:

== Comment: #0 - JAMIE L. DOLAN  - 2024-05-01
12:19:47 ==

This is a bug to track adding the feature of .NET 8 to Ubuntu 24.04

- This has already been added for s390x
- Customer survey showed strong interest in .NET on Linux on Power, having .NET 
on Ubuntu on Power will help in adoption of .NET on Power

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
 Status: New


** Tags: architecture-ppc64le bugnameltc-206154 severity-medium 
targetmilestone-inin2404

** Tags added: architecture-ppc64le bugnameltc-206154 severity-medium
targetmilestone-inin2404

** Changed in: ubuntu
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064530

Title:
  Include support for .NET 8 for Ubuntu on Power

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2064530/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064345] [NEW] Power guest secure boot with key management: userspace portion

2024-04-30 Thread bugproxy
Public bug reported:

Covering the userspace portion (secvarctl)

Feature:

This feature comprises PowerVM LPAR guest OS kernel verification to
extend the chain of trust from partition firmware to the OS kernel and
includes key management.  GRUB and the host OS kernel are signed with 2
separate public key pairs.  Partition firmware includes the the public
verification key for GRUB in its build and uses it to verify GRUB.  GRUB
includes the public verification key for the OS kernel in its build and
uses it to verify the OS kernel image

Test case:

If secure boot is switched off, any GRUB and kernel boots.
If secure boot is switched on:
  - Properly signed GRUB boots.
  - Improperly signed GRUB does not boot.
  - Tampered signed GRUB does not boot.
  - Properly signed kernels boot.
  - Improperly signed kernels do not boot.
  - Tampered signed kernels do not boot.
TPM PCRs are extended roughly following the TCG PC Client and UEFI specs as 
they apply to POWER.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
 Status: New


** Tags: architecture-ppc64le bugnameltc-205843 severity-critical 
targetmilestone-inin2404

** Tags added: architecture-ppc64le bugnameltc-205843 severity-critical
targetmilestone-inin2404

** Changed in: ubuntu
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064345

Title:
  Power guest secure boot with key management: userspace portion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2064345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064321] [NEW] Power guest secure boot with key management: kernel portion

2024-04-30 Thread bugproxy
Public bug reported:

Covering the kernel portion

Feature:

This feature comprises PowerVM LPAR guest OS kernel verification using
static keys to extend the chain of trust from partition firmware to the
OS kernel.  GRUB and the host OS kernel are signed with 2 separate
public key pairs.  Partition firmware includes the the public
verification key for GRUB in its build and uses it to verify GRUB.  GRUB
includes the public verification key for the OS kernel in its build and
uses it to verify the OS kernel image

Test case:

If secure boot is switched off, any GRUB and kernel boots.
If secure boot is switched on:
  - Properly signed GRUB boots.
  - Improperly signed GRUB does not boot.
  - Tampered signed GRUB does not boot.
  - Properly signed kernels boot.
  - Improperly signed kernels do not boot.
  - Tampered signed kernels do not boot.
TPM PCRs are extended roughly following the TCG PC Client and UEFI specs as 
they apply to POWER.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
 Status: New


** Tags: architecture-ppc64le bugnameltc-205842 severity-critical 
targetmilestone-inin2404

** Tags added: architecture-ppc64le bugnameltc-205842 severity-critical
targetmilestone-inin2404

** Changed in: ubuntu
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064321

Title:
  Power guest secure boot with key management: kernel portion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2064321/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064319] [NEW] Power guest secure boot with key management: GRUB2 portion

2024-04-30 Thread bugproxy
Public bug reported:

Covering the GRUB2 portion:

Feature:

This feature comprises PowerVM LPAR guest OS kernel verification using
static keys to extend the chain of trust from partition firmware to the
OS kernel.  GRUB and the host OS kernel are signed with 2 separate
public key pairs.  Partition firmware includes the the public
verification key for GRUB in its build and uses it to verify GRUB.  GRUB
includes the public verification key for the OS kernel in its build and
uses it to verify the OS kernel image

Test case:

If secure boot is switched off, any GRUB and kernel boots.
If secure boot is switched on:
  - Properly signed GRUB boots.
  - Improperly signed GRUB does not boot.
  - Tampered signed GRUB does not boot.
  - Properly signed kernels boot.
  - Improperly signed kernels do not boot.
  - Tampered signed kernels do not boot.
TPM PCRs are extended roughly following the TCG PC Client and UEFI specs as 
they apply to POWER.

** Affects: grub2 (Ubuntu)
 Importance: Undecided
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
 Status: New


** Tags: architecture-ppc64le bugnameltc-205841 severity-critical 
targetmilestone-inin2404

** Tags added: architecture-ppc64le bugnameltc-205841 severity-critical
targetmilestone-inin2404

** Changed in: ubuntu
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Package changed: ubuntu => grub2 (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064319

Title:
  Power guest secure boot with key management: GRUB2 portion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2064319/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060939] Comment bridged from LTC Bugzilla

2024-04-29 Thread bugproxy
--- Comment From wint...@de.ibm.com 2024-04-29 05:15 EDT---
I got the reply from Phoenyx:
Hi Sandy,

We?ve made the suggested changes to arp_ignore and arp_announce, but
this does not seem to have had any effect on the issue unfortunately ?
There has been no reduction in the number of packets that giving the
?received packet on vlan2011 with own address as source address? error.

We could certainly look at setting up 1 bridge with multiple bridgeports
to test that configuration, it was set up this way to replicate our
working Z14 environment. I?m not sure what the original decision was
that led to that setup though.

Kind regards,
Phoenyx

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060939

Title:
  s390x OSA bridging causes network issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2060939/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060039] Comment bridged from LTC Bugzilla

2024-04-24 Thread bugproxy
--- Comment From hbath...@in.ibm.com 2024-04-24 12:23 EDT---
Posted the patches to reduce memory consumption for KFENCE upstream:

https://lore.kernel.org/all/20240424110926.184077-1-hbath...@linux.ibm.com/
("[PATCH 1/2] radix/kfence: map __kfence_pool at page granularity")

https://lore.kernel.org/all/20240424110926.184077-1-hbath...@linux.ibm.com/
("[PATCH 2/2] radix/kfence: support late __kfence_pool allocation")

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060039

Title:
  [Ubuntu-24.04] FADump with recommended crash size is making the L1
  hang

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060039/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] Comment bridged from LTC Bugzilla

2024-04-24 Thread bugproxy
--- Comment From david_pa...@uk.ibm.com 2024-04-24 02:47 EDT---
Hi,
We have had a reply from the AIX support team (see below) explaining the RENEW 
requests. Do you have any further questions for the AIX support team or can we 
supply any further diagnostic information to progress this issue ?

Regarding the comment/question about RENEW reqs from Linux:

RENEW is done when half the lease period has elapsed without any state
operation going on.

Here, the Linux server's lease is 90 seconds. From an NFS perspective,
there is nothing strange or remarkable about the pattern of RENEW reqs
sent in the good & bad cases. If there is a specific question about
renews in the latest captures let us know.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056485] Comment bridged from LTC Bugzilla

2024-04-19 Thread bugproxy
--- Comment From jldo...@us.ibm.com 2024-04-19 13:51 EDT---
It was decided internally that the Novalink team will be taking a patched socat 
.deb and placing it within their own repo to provide the correct behavior in 
their customer environments.

Thank you to everyone that spent time on this bug.

We are awaiting confirmation from the Novalink team that this method of
providing the correct behavior is working successfully. Thank you to
Frank for building the .deb that will be used.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056485

Title:
  Behaviour of socat in Ubuntu 20.04 unexpected

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2056485/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062556] [NEW] [Ubuntu-24.04] Hugepage memory is not getting released even after destroying the guest!

2024-04-19 Thread bugproxy
Public bug reported:

---Problem Description---

Hugepages memory is not getting released even after destroying the guest
 
Machine Type = P10 Denali LPAR 
 
---uname output---
Linux ubuntu2404lp3 6.8.0-22-generic #22-Ubuntu SMP Thu Apr  4 22:47:57 UTC 
2024 ppc64le ppc64le ppc64le GNU/Linux

 
---Steps to Reproduce---
1. Create a guest which is backed by hugepages.
2. Destroy the guest
3. execute "free -h" or "cat /proc/meminfo" to see that Hugepage memory is 
still getting held.
 
 
HugePages_Total:   20480
HugePages_Free:20419
HugePages_Rsvd:0
HugePages_Surp:0
Hugepagesize:   2048 kB
Hugetlb:41943040 kB
DirectMap4k:   0 kB
DirectMap64k:52428800 kB
DirectMap2M:   0 kB
DirectMap1G:   0 kB
root@ubuntu2404lp3:~# virsh list --all
 Id   Name   State
---
 -ramlp2g1   shut off
 -ramlp2g2   shut off
 -ramlp2g3   shut off
 -ramlp3g3   shut off

root@ubuntu2404lp3:~# free -h
   totalusedfree  shared  buff/cache   available
Mem:48Gi43Gi   4.6Gi   2.6Mi   277Mi   4.6Gi
Swap:  8.0Gi   243Mi   7.8Gi
root@ubuntu2404lp3:~#


This is an issue created by commit 1b151e2435fc ("block: Remove special-casing 
of compound pages") that moved the direct-io hugetlb handling from compound 
pages to folios.

Following commit has been proposed and merged into 6.9-rc1 which fixes this 
issue.
38b43539d64b2fa020b3b9a752a986769f87f7a6("block: Fix page refcounts for 
unaligned buffers in __bio_release_pages()")

So the same needs to be backported to the Ubuntu24.04 kernel as well.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
 Status: New


** Tags: architecture-ppc64le bugnameltc-206058 severity-high 
targetmilestone-inin2404

** Tags added: architecture-ppc64le bugnameltc-206058 severity-high
targetmilestone-inin2404

** Changed in: ubuntu
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062556

Title:
  [Ubuntu-24.04] Hugepage memory is not getting released even after
  destroying the guest!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2062556/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055003] Comment bridged from LTC Bugzilla

2024-04-18 Thread bugproxy
--- Comment From kowshik.j...@in.ibm.com 2024-04-18 11:45 EDT---
I have verified this bug on latest Ubuntu24.04 Host and the issue is not 
getting reproduced anymore!

root@ubuntu2404lp2:~# qemu-system-ppc64 -accel tcg -smp 10,maxcpus=9000
qemu-system-ppc64: Invalid SMP CPUs 9000. The max CPUs supported by machine 
'pseries-noble' is 4096

root@ubuntu2404lp2:~# qemu-system-ppc64 -accel tcg -smp 10,maxcpus=123456789
qemu-system-ppc64: Invalid SMP CPUs 123456789. The max CPUs supported by 
machine 'pseries-noble' is 4096

kernel: 6.8.0-22-generic ppc64le ppc64le GNU/Linux
qemu: QEMU emulator version 8.2.2 (Debian 1:8.2.2+ds-0ubuntu1)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055003

Title:
  Qemu cmdline core dumped with more(8193 or more) cpus

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2055003/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] Comment bridged from LTC Bugzilla

2024-04-18 Thread bugproxy
--- Comment From david_pa...@uk.ibm.com 2024-04-18 11:00 EDT---
Hi,
Thanks for looking at the logs. I agree that both syslogs (AIX 7.2 and 7.3) 
contain multiple "TCP recvfrom got EAGAIN" entries.

To clarify the information in the attachments, I have updated the
comment for the attachments of the syslog for the non-working AIX 7.3
pair (amaliada and adamsongrunter. The syslog is in two parts because
the Bugzilla file uploader couldn't handle such a large file. It is NOT
mixed with the AIX 7.2 syslog.

The syslog for the working pair AIX 7.2 (adia and amberjack) was
smaller, so it is a single file attachment.

I will ask the IBM AIX support team about the NFS Client lease renewal
in both AIX 7.2 and 7.3.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062118] Re: autopkgtests fail on s390x (segfault)

2024-04-18 Thread bugproxy
** Tags added: architecture-s39064 bugnameltc-206054 severity-high
targetmilestone-inin---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062118

Title:
  autopkgtests fail on s390x (segfault)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2062118/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] Comment bridged from LTC Bugzilla

2024-04-17 Thread bugproxy
--- Comment From david_pa...@uk.ibm.com 2024-04-17 13:11 EDT---
Here are the details of the IP addresses for the tcpdump files

AIX 7.3
9.20.120.112name = amaliada.v6.hursley.ibm.com   -- Primary
9.20.120.153   name = adamsongrunter.v6.hursley.ibm.com  ? Partner

AIX 7.2
9.20.120.127name = adia.v6.hursley.ibm.com   -- Primary
9.20.121.46 name = amberjack.v6.hursley.ibm.com  ? Partner

NFSv4 server
9.20.32.85 name =   duckseason.hursley.ibm.com

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] tcpdump for aix 7.2 testing part 4 of 4

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:19 
EDT---


** Attachment added: "tcpdump for aix 7.2 testing part 4 of 4"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766767/+files/tcpdump17_04_2024_09H_10M3.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] tcpdump for aix 7.2 testing part 3 of 4

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:18 
EDT---


** Attachment added: "tcpdump for aix 7.2 testing part 3 of 4"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766766/+files/tcpdump17_04_2024_09H_10M2.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] tcpdump for aix 7.3 testing part 5 of 5

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:16 
EDT---


** Attachment added: "tcpdump for aix 7.3 testing part 5 of 5"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766763/+files/tcpdump16_04_2024_14H_03M4.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] tcpdump for aix 7.2 testing part 2 of 4

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:18 
EDT---


** Attachment added: "tcpdump for aix 7.2 testing part 2 of 4"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766765/+files/tcpdump17_04_2024_09H_10M1.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] tcpdump for aix 7.2 testing part 1 of 4

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:17 
EDT---


** Attachment added: "tcpdump for aix 7.2 testing part 1 of 4"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766764/+files/tcpdump17_04_2024_09H_10M.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] tcpdump for aix 7.3 testing part 4 of 5

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:16 
EDT---


** Attachment added: "tcpdump for aix 7.3 testing part 4 of 5"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766762/+files/tcpdump16_04_2024_14H_03M3.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] tcpdump for aix 7.3 testing part 3 of 5

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:15 
EDT---


** Attachment added: "tcpdump for aix 7.3 testing part 3 of 5"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766761/+files/tcpdump16_04_2024_14H_03M2.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] tcpdump for aix 7.3 testing part 2 of 5

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:15 
EDT---


** Attachment added: "tcpdump for aix 7.3 testing part 2 of 5"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766760/+files/tcpdump16_04_2024_14H_03M1.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] tcpdump for aix 7.3 testing part 1 of 5

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:14 
EDT---


** Attachment added: "tcpdump for aix 7.3 testing part 1 of 5"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766759/+files/tcpdump16_04_2024_14H_03M.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] Syslog for AIX 7.2 primary and partner

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:12 
EDT---


** Attachment added: "Syslog for AIX 7.2 primary and partner"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766758/+files/syslog_17042024_adia_primary_amberjack_partner_both_aix72.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] Syslog and tcpdump file covering a working AIX 7.2 and non-working AIX 7.3 pair of machines using the same NFSv4 server

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:11 
EDT---


** Attachment added: "Syslog and tcpdump file covering a working AIX 7.2 and 
non-working AIX 7.3 pair of machines  using the same NFSv4 server"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766757/+files/syslog_16042024_amaliada_primary_adamsongrunter_partner_both_aix73_part2.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] Syslog and tcpdump file covering a working AIX 7.2 and non-working AIX 7.3 pair of machines using the same NFSv4 server

2024-04-17 Thread bugproxy
--- Comment (attachment only) From david_pa...@uk.ibm.com 2024-04-17 06:10 
EDT---


** Attachment added: "Syslog and tcpdump file covering a working AIX 7.2 and 
non-working AIX 7.3 pair of machines  using the same NFSv4 server"
   
https://bugs.launchpad.net/bugs/2042363/+attachment/5766756/+files/syslog_16042024_amaliada_primary_adamsongrunter_partner_both_aix73_part1.zip

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2042363] Comment bridged from LTC Bugzilla

2024-04-17 Thread bugproxy
--- Comment From david_pa...@uk.ibm.com 2024-04-17 05:37 EDT---
Hi,
I have run the same MQ HA test on a working(AIX 7.2) and non working(AIX 7.3) 
pair of machines with the same Linux NVSv4 Ubuntu 20.04 (kernel updated to 
5.4.0-176-generic). I used the same RPC debug trace options as previously.

Here are the details of the uploaded tar.gz file called
CASE_TS012306761.tar.gz. I do have other trace files if you need them.

AIX 7.3 test was between machine amaliada and partner adamsongrunter on
16/04/2024 starting at 14:01 and failing at 14:04:07:971116 with a
failure to write a file on the shared NFSv4 server.

There is a partial syslog from the Linux NVSv4 server duckseason
covering that period called
TS012306761/syslog_16042024_amaliada_primary_adamsongrunter_partner_both_aix73.log

Covering the same period, there are a set of tcpdump files in subfolder
TS012306761/tcpdumps_amaliada_primary_admasongrunter_partner_both_aix73/


AIX 7.2 test was between primary machine adia and partner amberjack on 
17/04/2024 starting at 09:09:48 and ending successfully at 09:16:29.

There is a partial syslog from the linux NVSv4 server duckseason
covering that period called
TS012306761/syslog_17042024_adia_primary_amberjack_partner_both_aix72.log

Covering the same period, there are a set of tcpdump files in subfolder
TS012306761/tcpdumps_adia_primary_amberjack_partner_both_aix72/

We are happy to supply further info to help resolve this issue. Thanks
for your help and advice.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2042363

Title:
  AIX 7.3 NFS client frequently returns an EIO error to an application
  when reading or writing to a file that has been locked with fcntl() on
  a Ubuntu 20.04 NFSV4 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2042363/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059303] Comment bridged from LTC Bugzilla

2024-04-17 Thread bugproxy
--- Comment From steffen.ei...@ibm.com 2024-04-17 04:28 EDT---
Thanks Frank and Marc.

Verified for focal with the focal-package in PPA at
http://ppa.launchpad.net/fheimes/lp2059303/ubuntu (2.12.0-0ubuntu3.8)

-> verified for all releases in service.
focal, jammy, mantic, and noble.

Steffen

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059303

Title:
  [UBUNTU 20.04] SE-tooling: New IBM host-key subject locality
  (s390-tools)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2059303/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059303] Comment bridged from LTC Bugzilla

2024-04-16 Thread bugproxy
--- Comment From mhart...@de.ibm.com 2024-04-16 05:22 EDT---
Can you please pick this commit:

https://github.com/ibm-s390-linux/s390-tools/commit/f5744b95db93fa9d5cfd6fb206767ad2dcc3c804

?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059303

Title:
  [UBUNTU 20.04] SE-tooling: New IBM host-key subject locality
  (s390-tools)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2059303/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056491] Re: not able to install noble on PowerVM LPARs `Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block`

2024-04-15 Thread bugproxy
** Tags removed: targetmilestone-inin---
** Tags added: targetmilestone-inin2004

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056491

Title:
  not able to install noble on PowerVM LPARs `Kernel panic - not
  syncing: VFS: Unable to mount root fs on unknown-block`

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2056491/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060939] Comment bridged from LTC Bugzilla

2024-04-15 Thread bugproxy
--- Comment From wint...@de.ibm.com 2024-04-15 02:52 EDT---
A reply I sent via email to Phoenix Cameron and others:

I had an look at the data attached to the bugzilla.
I don?t really understand the setup. Why do have 30 bridges on top of 30 VLAN 
interfaces all connected to the same OSA interface?
Why not 1 bridge with 30 vlan-bridgeports ?

I am wondering whether this could be related to the infamous arp flux issue.
Maybe you want to try setting
net.ipv4.conf.all.arp_ignore=1
net.ipv4.conf.all.arp_announce=2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060939

Title:
  s390x OSA bridging causes network issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2060939/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   8   9   10   >